Home
last modified time | relevance | path

Searched refs:fstack (Results 1 – 25 of 788) sorted by relevance

12345678910>>...32

/OK3568_Linux_fs/kernel/tools/lib/traceevent/plugins/
H A Dplugin_function.c16 } *fstack; variable
92 ptr = realloc(fstack, sizeof(*fstack) * (cpu + 1)); in add_and_get_index()
98 fstack = ptr; in add_and_get_index()
102 memset(&fstack[i], 0, sizeof(fstack[i])); in add_and_get_index()
106 for (i = 0; i < fstack[cpu].size && fstack[cpu].stack[i]; i++) { in add_and_get_index()
107 if (strcmp(parent, fstack[cpu].stack[i]) == 0) { in add_and_get_index()
108 add_child(&fstack[cpu], child, i+1); in add_and_get_index()
114 add_child(&fstack[cpu], parent, 0); in add_and_get_index()
115 add_child(&fstack[cpu], child, 1); in add_and_get_index()
272 for (x = 0; x < fstack[i].size && fstack[i].stack[x]; x++) in TEP_PLUGIN_UNLOADER()
[all …]
/OK3568_Linux_fs/kernel/arch/xtensa/boot/lib/
H A DMakefile20 CFLAGS_REMOVE_inflate.o += -fstack-protector -fstack-protector-strong
21 CFLAGS_REMOVE_zmem.o += -fstack-protector -fstack-protector-strong
22 CFLAGS_REMOVE_inftrees.o += -fstack-protector -fstack-protector-strong
23 CFLAGS_REMOVE_inffast.o += -fstack-protector -fstack-protector-strong
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/gcc/gcc/
H A D0020-Add-ssp_nonshared-to-link-commandline-for-musl-targe.patch6 when -fstack-protector options are enabled we need to
35 +#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
36 + "|fstack-protector-strong|fstack-protector-explicit" \
55 +#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
56 + "|fstack-protector-strong|fstack-protector-explicit" \
76 +#define LINK_SSP_SPEC "%{fstack-protector|fstack-protector-all" \
77 + "|fstack-protector-strong|fstack-protector-explicit" \
/OK3568_Linux_fs/buildroot/package/libopenh264/
H A D0001-Add-USE_STACK_PROTECTOR-option.patch6 -fstack-protector-all is not supported on all linux toolchains so add an
42 -CFLAGS += -DANDROID_NDK -fpic --sysroot=$(SYSROOT) -MMD -MP -fstack-protector-all
45 +CFLAGS +=-fstack-protector-all
58 -CFLAGS += -fPIC -fstack-protector-all
61 +CFLAGS += -fstack-protector-all
74 -CFLAGS += -Wall -fPIC -MMD -MP -fstack-protector-all
77 +CFLAGS += -fstack-protector-all
90 -CFLAGS += -Wall -fno-strict-aliasing -fPIC -MMD -MP -fstack-protector-all
93 +CFLAGS += -fstack-protector-all
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/ssiapi/ssiapi/
H A D0004-Do-not-override-flags-coming-from-build-environment.patch22 -CPPFLAGS="-g3 -gdwarf-2 -Wall -Werror -fvisibility=hidden -D_GNU_SOURCE -O3 -fstack-protector -D_F…
23 -CFLAGS="-std=gnu99 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
24 -CXXFLAGS="-std=gnu++98 -fvisibility-inlines-hidden -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wfor…
25 +#CPPFLAGS="-g3 -gdwarf-2 -Wall -Werror -fvisibility=hidden -D_GNU_SOURCE -O3 -fstack-protector -D_…
26 +#CFLAGS="-std=gnu99 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
27 +#CXXFLAGS="-std=gnu++98 -fvisibility-inlines-hidden -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wfo…
/OK3568_Linux_fs/buildroot/package/vte/
H A D0002-build-Fix-check-for-fstack-protector-compiler-support.patch4 Subject: [PATCH] build: Fix check for -fstack-protector* compiler support
25 - '-fstack-protector',
26 - '-fstack-protector-strong',
36 + ['-fstack-protector', false],
37 + ['-fstack-protector-strong', false],
/OK3568_Linux_fs/buildroot/boot/grub2/
H A D0133-kern-efi-Add-initial-stack-protector-implementation.patch35 -dnl Check if the C compiler supports `-fstack-protector'.
41 AC_MSG_CHECKING([whether `$CC' accepts `-fstack-protector'])
49 +AC_MSG_CHECKING([whether `$CC' accepts `-fstack-protector-strong'])
56 +if eval "$ac_compile -S -fstack-protector-strong -o conftest.s" 2> /dev/null; then]
73 +if eval "$ac_compile -S -fstack-protector -mstack-protector-guard=global -o conftest.s" 2> /dev/nu…
115 { $as_echo "$as_me:${as_lineno-$LINENO}: checking whether \`$CC' accepts \`-fstack-protector'" >&5
116 $as_echo_n "checking whether \`$CC' accepts \`-fstack-protector'... " >&6; }
123 +{ $as_echo "$as_me:${as_lineno-$LINENO}: checking whether \`$CC' accepts \`-fstack-protector-stron…
124 +$as_echo_n "checking whether \`$CC' accepts \`-fstack-protector-strong'... " >&6; }
130 -# `-fstack-protector' in the default specs.
[all …]
/OK3568_Linux_fs/buildroot/package/intel-mediadriver/
H A D0001-Add-MEDIA-BUILD-HARDENING-option.patch29 -set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} ${CPP_STANDARD_OPTION} -fPIC -fpermissive -fstack-protecto…
34 -set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${CPP_STANDARD_OPTION} -fPIC -fpermissive -fstack-protector-al…
40 + set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} ${CMAKE_CXX_FLAGS} -fstack-protector-all")
42 + set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${CMAKE_C_FLAGS} -fstack-protector-all")
56 - -fstack-protector
67 + -fstack-protector)
95 …OPERTIES LINK_FLAGS "-Wl,--no-as-needed -Wl,--gc-sections -z relro -z now -fstack-protector -fPIC")
99 + set(MEDIA_LINK_FLAGS "${MEDIA_LINK_FLAGS} -fstack-protector")
/OK3568_Linux_fs/buildroot/package/powertop/
H A D0001-dont-force-stack-smashing-protection.patch1 Do not pass -fstack-protector unconditionally
3 Using -fstack-protector only works when the toolchain has SSP support.
15 - -fstack-protector \
/OK3568_Linux_fs/buildroot/package/davfs2/
H A D0001-src-Makefile.am-do-not-hardcode-fstack-protector-str.patch4 Subject: [PATCH] src/Makefile.am: do not hardcode -fstack-protector-strong
6 davfs2 does not truly require -fstack-protector-strong, so do not hardcode
24 - -fstack-protector-strong --param=ssp-buffer-size=4
38 - -fstack-protector-strong --param=ssp-buffer-size=4
/OK3568_Linux_fs/external/camera_engine_rkaiq/rkaiq/cmake/
H A DCompileOptions.cmake47 set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} -fstack-protector-strong")
48 set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} -fstack-clash-protection")
49 set(CMAKE_CXX_FLAGS_MINSIZEREL "${CMAKE_CXX_FLAGS_MINSIZEREL} -fstack-protector-strong")
50 set(CMAKE_CXX_FLAGS_MINSIZEREL "${CMAKE_CXX_FLAGS_MINSIZEREL} -fstack-clash-protection")
64 set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} -fstack-protector-strong")
65 set(CMAKE_CXX_FLAGS_MINSIZEREL "${CMAKE_CXX_FLAGS_MINSIZEREL} -fstack-protector-strong")
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/multipath-tools/files/
H A D0024-RH-use-rpm-optflags-if-present.patch34 -STACKPROT := $(call TEST_CC_OPTION,-fstack-protector-strong,-fstack-protector)
38 + STACKPROT := $(call TEST_CC_OPTION,-fstack-protector-strong,-fstack-protector)
/OK3568_Linux_fs/buildroot/package/intel-mediasdk/
H A D0001-Don-t-force-fstack-protector.patch4 Subject: [PATCH] Don't force -fstack-protector
25 …,now,-z,noexecstack -Wl,--version-script=${CMAKE_CURRENT_SOURCE_DIR}/libmfx.map -fstack-protector")
38 - append_property( ${ARGV0} LINK_FLAGS "${link_flags_list} ${MFX_LDFLAGS} -fstack-protector" )
47 …S "${SCOPE_LINKFLAGS} -Wl,--no-undefined,-z,relro,-z,now,-z,noexecstack -fstack-protector" PARENT_…
/OK3568_Linux_fs/kernel/kernel/entry/
H A DMakefile9 CFLAGS_REMOVE_common.o = -fstack-protector -fstack-protector-strong
/OK3568_Linux_fs/buildroot/package/sox/
H A D0002-configure.ac-put-back-disable-stack-protector.patch33 -AX_APPEND_COMPILE_FLAGS([-fstack-protector-strong])
35 + AS_HELP_STRING([--disable-stack-protector], [Disable -fstack-protector-strong]),
38 + [AX_APPEND_COMPILE_FLAGS([-fstack-protector-strong])])
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/opensaf/opensaf/
H A D0001-configure-Pass-linker-specific-options-with-Wl.patch23 - OSAF_HARDEN_FLAGS="${OSAF_HARDEN_FLAGS} -fstack-protector --param ssp-buffer-size=4 -fPIE -pie -z…
24 + OSAF_HARDEN_FLAGS="${OSAF_HARDEN_FLAGS} -fstack-protector --param ssp-buffer-size=4 -fPIE -pie -W…
/OK3568_Linux_fs/buildroot/package/jitterentropy-library/
H A D0003-Makefile-allow-the-user-to-disable-stack-protector.patch28 -CFLAGS +=-fstack-protector-all -fwrapv --param ssp-buffer-size=4
29 +CFLAGS ?=-fstack-protector-all --param ssp-buffer-size=4
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/libtool/libtool/
H A D0001-ltmain.in-Parse-additional-clang-options.patch24 - -O*|-g*|-flto*|-fwhopr*|-fuse-linker-plugin|-fstack-protector*|-stdlib=*| \
25 + -O*|-g*|-flto*|-fwhopr*|-fuse-linker-plugin|-fstack-protector*|-stdlib=*|-rtlib=*|--unwindli…
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/exiv2/exiv2/
H A D0001-Use-compiler-fcf-protection-only-if-compiler-arch-su.patch28 - add_compile_options(-fstack-clash-protection -fcf-protection)
34 + add_compile_options(-fstack-clash-protection)
/OK3568_Linux_fs/kernel/arch/x86/purgatory/
H A DMakefile47 PURGATORY_CFLAGS_REMOVE += -fstack-protector
51 PURGATORY_CFLAGS_REMOVE += -fstack-protector-strong
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/libatasmart/files/
H A D0001-Makefile.am-add-CFLAGS-and-LDFLAGS-definiton.patch15 …em../build/tmp/sysroots/x86_64-linux/usr/include -O2 -pipe -O2 -pipe -g -fstack-protector-strong -…
16 | gcc: error: unrecognized command line option ‘-fstack-protector-strong’
/OK3568_Linux_fs/buildroot/package/usbredir/
H A D0002-meson-add-stack_protector-option.patch32 - '-fstack-protector',
36 + '-fstack-protector',
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/grpc/grpc/
H A D0001-Revert-Changed-GRPCPP_ABSEIL_SYNC-to-GPR_ABSEIL_SYNC.patch13 …/x86_64-oe-linux-g++ -m64 -march=core2 -mtune=core2 -msse3 -mfpmath=sse -fstack-protector-strong …
16 …lity-inlines-hidden -m64 -march=core2 -mtune=core2 -msse3 -mfpmath=sse -fstack-protector-strong …
17 …t-aliasing -DNDEBUG -m64 -march=core2 -mtune=core2 -msse3 -mfpmath=sse -fstack-protector-strong …
20 …lity-inlines-hidden -m64 -march=core2 -mtune=core2 -msse3 -mfpmath=sse -fstack-protector-strong …
/OK3568_Linux_fs/buildroot/package/exiv2/
H A D0001-add-BUILD_WITH_STACK_PROTECTOR-option.patch11 Indeed, support for -fstack-protector-strong can't be detected through
49 add_compile_options(-fstack-protector-strong)
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/android-tools/android-tools/libselinux/
H A D0001-libselinux-Do-not-define-gettid-if-glibc-2.30-is-use.patch13fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -spec…

12345678910>>...32