/glibc-2.36/sysdeps/unix/sysv/linux/csky/ |
D | sysdep.h | 473 # define PTR_MANGLE(dst, src, guard) \ 476 lrw guard, 1b@GOTPC; \ 477 addu t0, guard; \ 478 lrw guard, __pointer_chk_guard_local@GOT; \ 479 ldr.w guard, (t0, guard << 0); \ 480 ldw guard, (guard, 0); \ 481 xor dst, src, guard; 482 # define PTR_DEMANGLE(dst, src, guard) PTR_MANGLE (dst, src, guard) 483 # define PTR_MANGLE2(dst, src, guard) \ 484 xor dst, src, guard [all …]
|
/glibc-2.36/sysdeps/unix/sysv/linux/aarch64/ |
D | sysdep.h | 243 # define PTR_MANGLE(dst, src, guard, tmp) \ 244 LDST_PCREL (ldr, guard, tmp, C_SYMBOL_NAME(__pointer_chk_guard_local)); \ 245 PTR_MANGLE2 (dst, src, guard) 247 # define PTR_MANGLE2(dst, src, guard)\ 248 eor x##dst, x##src, x##guard 249 # define PTR_DEMANGLE(dst, src, guard, tmp)\ 250 PTR_MANGLE (dst, src, guard, tmp) 251 # define PTR_DEMANGLE2(dst, src, guard)\ 252 PTR_MANGLE2 (dst, src, guard) 263 # define PTR_MANGLE(dst, src, guard, tmp) \ [all …]
|
/glibc-2.36/sysdeps/arm/ |
D | sysdep.h | 301 # define PTR_MANGLE_LOAD(guard, tmp) \ 302 LDR_HIDDEN (guard, tmp, C_SYMBOL_NAME(__pointer_chk_guard_local), 0) 303 # define PTR_MANGLE(dst, src, guard, tmp) \ 304 PTR_MANGLE_LOAD(guard, tmp); \ 305 PTR_MANGLE2(dst, src, guard) 307 # define PTR_MANGLE2(dst, src, guard) \ 308 eor dst, src, guard 309 # define PTR_DEMANGLE(dst, src, guard, tmp) \ 310 PTR_MANGLE (dst, src, guard, tmp) 311 # define PTR_DEMANGLE2(dst, src, guard) \ [all …]
|
/glibc-2.36/nptl/ |
D | tst-context1.c | 36 unsigned long guard[3]; member 61 if ((ctx[n][0].guard[0] != GUARD_PATTERN) in fct() 62 || (ctx[n][0].guard[1] != GUARD_PATTERN) in fct() 63 || (ctx[n][0].guard[2] != GUARD_PATTERN)) in fct() 69 if ((ctx[n][1].guard[0] != GUARD_PATTERN) in fct() 70 || (ctx[n][1].guard[1] != GUARD_PATTERN) in fct() 71 || (ctx[n][1].guard[2] != GUARD_PATTERN)) in fct() 96 ctx[n][0].guard[0] = GUARD_PATTERN; in tf() 97 ctx[n][0].guard[1] = GUARD_PATTERN; in tf() 98 ctx[n][0].guard[2] = GUARD_PATTERN; in tf() [all …]
|
D | allocatestack.c | 163 setup_stack_prot (char *mem, size_t size, char *guard, size_t guardsize, in setup_stack_prot() argument 166 char *guardend = guard + guardsize; in setup_stack_prot() 173 size_t mprots1 = (uintptr_t) guard - (uintptr_t) mem; in setup_stack_prot() 391 char *guard = guard_position (mem, size, guardsize, pd, in allocate_stack() local 393 if (setup_stack_prot (mem, size, guard, guardsize, prot) != 0) in allocate_stack() 473 char *guard = guard_position (mem, size, guardsize, pd, in allocate_stack() local 475 if (__mprotect (guard, guardsize, PROT_NONE) != 0) in allocate_stack() 506 char *guard = mem + (((size - guardsize) / 2) & ~pagesize_m1); in allocate_stack() local 509 if (oldguard < guard in allocate_stack() 510 && __mprotect (oldguard, guard - oldguard, prot) != 0) in allocate_stack() [all …]
|
D | tst-default-attr.c | 270 size_t guard; in verify_guardsize_result() local 272 RETURN_IF_FAIL (pthread_attr_getguardsize, attr, &guard); in verify_guardsize_result() 274 if (guardsize != guard) in verify_guardsize_result() 276 printf ("failed to set guardsize (%zu, %zu)\n", guardsize, guard); in verify_guardsize_result()
|
/glibc-2.36/benchtests/ |
D | thread_create-inputs | 6 ## name: stack=1024,guard=1 8 ## name: stack=1024,guard=2 11 ## name: stack=2048,guard=1 13 ## name: stack=2048,guard=2
|
/glibc-2.36/sysdeps/unix/sysv/linux/nios2/ |
D | sysdep.h | 229 # define PTR_MANGLE_GUARD(guard) ldw guard, POINTER_GUARD(r23) 230 # define PTR_MANGLE(dst, src, guard) xor dst, src, guard 231 # define PTR_DEMANGLE(dst, src, guard) PTR_MANGLE (dst, src, guard)
|
/glibc-2.36/sysdeps/s390/s390-32/ |
D | __longjmp.c | 32 uintptr_t guard = THREAD_GET_POINTER_GUARD (); in __longjmp() local 34 CHECK_SP (env, guard); in __longjmp() 41 register uintptr_t r3 __asm__ ("%r3") = guard; in __longjmp()
|
/glibc-2.36/sysdeps/s390/s390-64/ |
D | __longjmp.c | 32 uintptr_t guard = THREAD_GET_POINTER_GUARD (); in __longjmp() local 34 CHECK_SP (env, guard); in __longjmp() 41 register uintptr_t r3 __asm__ ("%r3") = guard; in __longjmp()
|
/glibc-2.36/support/ |
D | xpthread_once.c | 22 xpthread_once (pthread_once_t *guard, void (*func) (void)) in xpthread_once() argument 24 xpthread_check_return ("pthread_once", pthread_once (guard, func)); in xpthread_once()
|
D | xthread.h | 70 void xpthread_once (pthread_once_t *guard, void (*func) (void));
|
/glibc-2.36/sysdeps/unix/sysv/linux/s390/s390-32/ |
D | ____longjmp_chk.c | 31 #define CHECK_SP(env, guard) \ argument 37 new_sp ^= guard; \
|
/glibc-2.36/sysdeps/unix/sysv/linux/s390/s390-64/ |
D | ____longjmp_chk.c | 31 #define CHECK_SP(env, guard) \ argument 37 new_sp ^= guard; \
|
/glibc-2.36/ChangeLog.old/ |
D | ChangeLog.ports-linux-generic | 78 multiple-inclusion guard.
|
D | ChangeLog.ports-ia64 | 283 Change multiple inclusion guard to _LINUX_IA64_DL_SYSDEP_H.
|
D | ChangeLog.nptl | 506 Change multiple inclusion guard to _LINUX_I686_DL_SYSDEP_H. 513 Change multiple include guard to _LINUX_I386_DL_SYSDEP_H. 4950 HAVE_CLOCK_GETRES_VSYSCALL as guard macro rather than 5834 additional full page available on the stack beside guard, TLS, the 6936 (tst_context_t): Define struct containing ucontext_t & guard words. 6938 (fct): Verify uc_link & guard words are still valid. 6939 (tf): Initialize guard words in ctx. Adjust ctx refs for new struct.
|
D | ChangeLog.19 | 416 Add multiple-include guard. Rewrite the comment explaining what 10570 * include/sys/syslog.h: Add multiple inclusion guard. 10714 * libio/strfile.h: Add multiple inclusion guard. 13977 * sysdeps/arm/fenv_private.h: Change multiple-include guard to 13989 multiple-include guard to [MIPS_FENV_PRIVATE_H]. Remove 13992 guard to [POWERPC_FENV_PRIVATE_H]. Include next <fenv_private.h>. 13997 multiple-include guard to [RISCV_FENV_PRIVATE_H]. Include next 13999 * sysdeps/sparc/fpu/fenv_private.h: Change multiple-include guard 14004 multiple-include guard to [X86_FENV_PRIVATE_H]. Include next 16424 * time/bits/types/struct_timespec.h: Change header inclusion guard to [all …]
|
D | ChangeLog.ports-mips | 2450 multiple inclusion guard.
|
/glibc-2.36/math/ |
D | libm-test-llround.inc | 176 * lround to make sure that a guard bit set during the lround operation
|
D | libm-test-lround.inc | 244 * lround to make sure that a guard bit set during the lround operation
|
/glibc-2.36/manual/ |
D | intro.texi | 525 general rule, in that POSIX mandates the library to guard against data 563 to return values from certain calls. When the library doesn't guard 608 @code{rwlock} associated with the identifier, and guard @emph{all} calls 721 @c failure to guard locale uses is not as fatal as data races in
|
/glibc-2.36/ |
D | NEWS | 1060 [26691] nptl: Use a minimum guard size of 64 KiB on aarch64 3066 [22637] nptl: guard size is subtracted from thread stack size instead of 3292 mode to guard against local privilege escalation attacks (CVE-2017-1000366). 3399 [21361] network: resolv: Reduce advertised EDNS0 buffer size to guard 3474 [21715] nptl: sysdeps/nptl/bits/pthreadtypes.h: typedef guard 4261 the pointer guard feature. It is always enabled. Previously, 4896 * CVE-2013-4788 The pointer guard used for pointer mangling was not 4898 being disabled. The pointer guard is now correctly initialized to a
|
D | Makeconfig | 881 # before the stack check guard is set up. Provide a way to disable stack
|
/glibc-2.36/iconvdata/testdata/ |
D | suntzus | 1065 and carefully guard your line of supplies. Then you
|