Home
last modified time | relevance | path

Searched refs:Stack (Results 1 – 8 of 8) sorted by relevance

/arch/xtensa/
DKconfig.debug36 int "Stack depth to print" if DEBUG_KERNEL
/arch/x86/kvm/
Demulate.c121 #define Stack (1<<14) /* Stack instruction (push/pop) */ macro
4396 I(DstMem | SrcNone | Mov | Stack | IncSP | TwoMemOp, em_pop), N, N, N, N, N, N, N,
4434 I(SrcMem | Stack | TwoMemOp, em_push), D(Undefined),
4602 I(ImplicitOps | Stack | No64 | Src2ES, em_push_sreg),
4603 I(ImplicitOps | Stack | No64 | Src2ES, em_pop_sreg),
4606 I(ImplicitOps | Stack | No64 | Src2CS, em_push_sreg),
4610 I(ImplicitOps | Stack | No64 | Src2SS, em_push_sreg),
4611 I(ImplicitOps | Stack | No64 | Src2SS, em_pop_sreg),
4614 I(ImplicitOps | Stack | No64 | Src2DS, em_push_sreg),
4615 I(ImplicitOps | Stack | No64 | Src2DS, em_pop_sreg),
[all …]
/arch/xtensa/boot/boot-redboot/
Dbootstrap.S173 # a1 Stack
/arch/x86/crypto/
Dsha512-avx-asm.S287 # Allocate Stack Space
352 # Restore Stack Pointer
Dsha512-ssse3-asm.S289 # Allocate Stack Space
354 # Restore Stack Pointer
Dsha512-avx2-asm.S576 # Allocate Stack Space
671 # Restore Stack Pointer
/arch/
DKconfig559 bool "Stack Protector buffer overflow detection"
567 the value just before actually returning. Stack based buffer
583 bool "Strong Stack Protector"
608 Call Stack and implements runtime support for shadow stack
612 bool "Clang Shadow Call Stack"
617 This option enables Clang's Shadow Call Stack, which uses a
/arch/powerpc/
DKconfig.debug20 int "Stack depth to print" if DEBUG_KERNEL