Lines Matching refs:stack
627 …- add stack debug information to assembly routines ([f832885](https://review.trustedfirmware.org/p…
806 …- fix 32-bit builds with stack protector ([e57ca89](https://review.trustedfirmware.org/plugins/git…
1809 …- support guarded control stack ([688ab57](https://review.trustedfirmware.org/plugins/gitiles/TF-A…
2007 …- make stack size configurable ([5753665](https://review.trustedfirmware.org/plugins/gitiles/TF-A/…
2246 …- increase BL31's stack size for DRTM support ([44df105](https://review.trustedfirmware.org/plugin…
2473 …- increase stack size for tsp ([5b7bd2a](https://review.trustedfirmware.org/plugins/gitiles/TF-A/t…
3039 …- backtrace stack unwind misses lr adjustment ([a149eb4](https://review.trustedfirmware.org/plugin…
3915 …- change stack size of BL31 ([d544dfc](https://review.trustedfirmware.org/plugins/gitiles/TF-A/tru…
4436 …- enabling stack protector for diphda ([c7e4f1c](https://review.trustedfirmware.org/plugins/gitile…
4550 …- add a USB DFU stack ([efbd65f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-f…
4724 …- add a USB device stack ([859bfd8](https://review.trustedfirmware.org/plugins/gitiles/TF-A/truste…
4813 …- bump BL2 stack size ([d22f1d3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-f…
4880 …- do not keep mmc_device_info in stack ([99d37c8](https://review.trustedfirmware.org/plugins/gitil…
5412 - Added support for stack protector
5712 - Avoid duplicates in extension stack
5776 - Do not keep mmc_device_info in stack
5783 - Do not keep mmc_device_info in stack
5785 - Do not keep mmc_device_info in stack
5818 - Free X509_EXTENSION structures on stack to avoid leaking them
5942 - Added support for stack protection
6329 - arm/corstone700: Add support for mhuv2 and stack protector
6470 stack size for bl1 and bl2, remove re-definition of topology related build
6562 - el3_runtime: Fix stack pointer maintenance on EA handling path, fixup
6651 - Add support for default stack-protector flag
6881 - rpi: rpi3: Fix compilation error when stack protector is enabled
7978 - Added support for GCC stack protection. A new build option
7983 returns a value used to initialize the canary for stack corruption detection.
8362 software stack to use either GICv2 or GICv3; hybrid GIC software systems are
8605 - Implemented a leaner `tf_printf()` function, allowing the stack to be
8610 - Reworked the crash reporting in BL3-1 to use less stack.
8615 - As a result of some of the above, reduced the runtime stack size in all BL
8747 - Updated BL1 and BL2 to use a single coherent stack each, rather than one per
8894 stack pointers for determining the type of exception, managing general purpose
8956 correctly. Other filesystem versions on the same software stack do not exhibit