/fuchsia/zircon/third_party/ulib/uboringssl/ |
H A D | stack-note.S | 3 // executable stack and cause a PT_GNU_STACK program header that says so. 5 .section .note.GNU-stack,""
|
/fuchsia/zircon/kernel/vm/ |
H A D | kstack.cpp | 27 // Allocates and maps a kernel stack with one page of padding before and after the mapping. 31 LTRACEF("allocating %s stack\n", unsafe ? "unsafe" : "safe"); 37 // Create a VMO for our stack 42 TRACEF("error allocating %s stack for thread\n", 46 const char* name = unsafe ? "unsafe-stack" : "safe-stack"; 49 // create a vmar with enough padding for a page before and after the stack 70 LTRACEF("%s stack vmar at %#" PRIxPTR "\n", 86 LTRACEF("%s stack mapping at %#" PRIxPTR "\n", 89 // fault in all the pages so we dont demand fault in the stack 104 vm_allocate_kstack(kstack_t* stack) argument 143 vm_free_kstack(kstack_t* stack) argument [all...] |
/fuchsia/zircon/kernel/vm/include/vm/ |
H A D | kstack.h | 13 // kstack encapsulates a kernel stack. 21 // When non-null, |vmar| (and, if safe-stack is enabled, |unsafe_vmar|) points to a ref-counted 33 // Allocates a kernel stack with appropriate overrun padding. 35 // Assumes stack has been zero-initialized. 36 zx_status_t vm_allocate_kstack(kstack_t* stack); 38 // Frees a stack allocated by |vm_allocate_kstack|. 39 zx_status_t vm_free_kstack(kstack_t* stack);
|
/fuchsia/zircon/system/utest/core/stack/ |
H A D | rules.mk | 14 $(LOCAL_DIR)/stack-test.c \ 16 MODULE_NAME := stack-test 24 MODULE_COMPILEFLAGS += -fsanitize=safe-stack -fstack-protector-all
|
/fuchsia/zircon/third_party/ulib/musl/third_party/tre/ |
H A D | regcomp.c | 212 from tre-stack.c and tre-stack.h 217 /* Creates a new stack object. `size' is initial size in bytes, `max_size' 219 allocated with realloc() if all space gets used up. Returns the stack 223 /* Frees the stack object. */ 226 /* Returns the current number of objects in the stack. */ 230 `value' on top of stack `s'. Returns REG_ESPACE if out of memory. 240 element off of stack `s' and returns it. The stack must not be 278 union tre_stack_item* stack; member in struct:tre_stack_rec 359 tre_stack_t* stack; member in struct:__anon1861 906 tre_stack_t* stack = ctx->stack; local 1122 tre_add_tags(tre_mem_t mem, tre_stack_t* stack, tre_ast_node_t* tree, tre_tnfa_t* tnfa) argument 1553 tre_copy_ast(tre_mem_t mem, tre_stack_t* stack, tre_ast_node_t* ast, int flags, int* pos_add, tre_tag_direction_t* tag_directions, tre_ast_node_t** copy, int* max_pos) argument 1680 tre_expand_ast(tre_mem_t mem, tre_stack_t* stack, tre_ast_node_t* ast, int* position, tre_tag_direction_t* tag_directions) argument 1953 tre_match_empty(tre_stack_t* stack, tre_ast_node_t* node, int* tags, int* assertions, int* num_tags_seen) argument 2052 tre_compute_nfl(tre_mem_t mem, tre_stack_t* stack, tre_ast_node_t* tree) argument 2439 tre_stack_t* stack; local [all...] |
H A D | regexec.c | 188 everything in a single large block from the stack frame using alloca() 406 match. This can be spectacularly expensive and may run out of stack 442 #define BT_STACK_MBSTATE_IN stack->item.mbstate = (mbstate) 443 #define BT_STACK_MBSTATE_OUT (mbstate) = stack->item.mbstate 456 if (!stack->next) { \ 469 s->prev = stack; \ 482 stack->next = s; \ 483 stack = s; \ 485 stack = stack 549 tre_backtrack_t stack; local [all...] |
/fuchsia/zircon/system/fidl/fuchsia-net-stack/ |
H A D | rules.mk | 13 MODULE_FIDL_LIBRARY := fuchsia.net.stack 17 MODULE_SRCS += $(LOCAL_DIR)/stack.fidl
|
/fuchsia/zircon/kernel/arch/arm64/ |
H A D | arch.cpp | 65 // fake arch_thread in the thread pointer, so that safe-stack 66 // and stack-protector code can work early. The thread pointer 102 // Allocate a stack, indexed by CPU num so that |arm64_secondary_entry| can find it. 105 kstack_t* stack = &_init_thread[cpu_num - 1].stack; local 106 DEBUG_ASSERT(stack->base == 0); 107 zx_status_t status = vm_allocate_kstack(stack); 112 // Get the stack pointers. 113 void* sp = reinterpret_cast<void*>(stack->top); 116 DEBUG_ASSERT(stack 145 kstack_t* stack = &_init_thread[cpu_num - 1].stack; local [all...] |
H A D | thread.cpp | 38 // stack alignment requirements per ABI 47 // create a default stack frame on the stack 48 vaddr_t stack_top = t->stack.top; 50 // make sure the top of the stack is 16 byte aligned for EABI compliance 52 t->stack.top = stack_top; 65 // set the stack pointer 69 ROUNDDOWN(t->stack.unsafe_base + t->stack.size, 16); 85 // our callers don't have to avoid safe-stack cod [all...] |
/fuchsia/zircon/system/ulib/zx/ |
H A D | process.cpp | 25 uintptr_t stack, handle arg_handle, 27 return zx_process_start(get(), thread_handle.get(), entry, stack, arg_handle.release(), arg2); 24 start(const thread& thread_handle, uintptr_t entry, uintptr_t stack, handle arg_handle, uintptr_t arg2) const argument
|
/fuchsia/zircon/system/ulib/zx/include/lib/zx/ |
H A D | thread.h | 44 zx_status_t start(uintptr_t thread_entry, uintptr_t stack, uintptr_t arg1, argument 46 return zx_thread_start(get(), thread_entry, stack, arg1, arg2); 49 void* stack, uintptr_t arg1, uintptr_t arg2) { 52 reinterpret_cast<uintptr_t>(stack), arg1, arg2); 48 start(void (*thread_entry)(uintptr_t arg1, uintptr_t arg2), void* stack, uintptr_t arg1, uintptr_t arg2) argument
|
/fuchsia/zircon/kernel/target/pc/multiboot/ |
H A D | multiboot-start.S | 33 // environment with flat segments, but does not provide a stack. 47 // Switch to our stack. 52 // get a triple-fault. We've just cleared the bss containing the stack, 67 .section .bss.stack,"aw",%nobits 68 DATA(stack) 72 END_DATA(stack)
|
/fuchsia/zircon/system/utest/thread-initial-state/ |
H A D | init-state.c | 26 // preallocated stack to satisfy the thread we create 27 static uint8_t stack[1024] __ALIGNED(16); 35 (uintptr_t)stack + sizeof(stack),
|
/fuchsia/zircon/third_party/ulib/uboringssl/include/openssl/ |
H A D | ex_data.h | 114 #include <openssl/stack.h>
|
/fuchsia/zircon/kernel/target/arm64/boot-shim/ |
H A D | boot-shim.S | 46 // setup stack 60 LOCAL_DATA(stack) 63 END_DATA(stack)
|
/fuchsia/zircon/kernel/arch/x86/ |
H A D | thread.cpp | 25 // create a default stack frame on the stack 26 vaddr_t stack_top = t->stack.top; 28 // make sure the top of the stack is 16 byte aligned for ABI compliance 30 t->stack.top = stack_top; 33 // of the way the context switch will pop the return address off the stack. After the first 34 // context switch, this leaves the stack unaligned relative to how a called function expects it. 57 // set the stack pointer 61 ROUNDDOWN(t->stack.unsafe_base + t->stack [all...] |
H A D | smp.cpp | 39 vm_free_kstack(&t->stack); 89 status = vm_allocate_kstack(&thread->stack); 90 bootstrap_data->per_cpu[i].kstack_base = thread->stack.base;
|
/fuchsia/zircon/kernel/arch/arm64/hypervisor/ |
H A D | el2_cpu_state.cpp | 63 El2Stack& stack = cpu_state->stacks_[cpu_num]; local 65 zx_status_t status = arm64_el2_on(table.Base(), stack.Top()); 95 // Allocate EL2 stack for each CPU. 101 for (auto& stack : el2_stacks) { 102 zx_status_t status = stack.Alloc();
|
/fuchsia/zircon/third_party/ulib/musl/src/math/x86_64/ |
H A D | expl.S | 48 # fpu stack: 2^hi x hi 67 # fpu stack: 2^hi x hi xh xl yh 78 # fpu stack: 2^hi x lo xh xl yl 92 # fpu stack: 2^hi x lo log2e_lo
|
/fuchsia/zircon/system/ulib/fzl/ |
H A D | memory-probe.cpp | 44 void* stack = thread_stack + sizeof(thread_stack); local 60 thread.start(&except_thread_func, stack, static_cast<uintptr_t>(op), reinterpret_cast<uintptr_t>(addr));
|
/fuchsia/zircon/system/ulib/runtime/ |
H A D | rules.mk | 26 # This code is used in early startup, where safe-stack setup is not ready yet.
|
/fuchsia/zircon/system/utest/core/threads/thread-functions/ |
H A D | rules.mk | 12 # -fno-stack-protector
|
/fuchsia/zircon/system/ulib/lockdep/include/lockdep/ |
H A D | lock_class_state.h | 191 // Linked list node for the loop detector's active node stack. The use 250 // The head of the stack of active nodes in a path traversal. The bottom 251 // of the stack is marked with the sentinel value 1 instead of nullptr 252 // to simplify determining whether a node is on the stack. Every node on 253 // the stack has LoopNode::next != nulltpr. 254 LoopNode* stack{reinterpret_cast<LoopNode*>(1)}; 290 // the stack are merged into this set. 309 // Pushes a node on the active nodes stack. 312 node->next = stack; 313 stack [all...] |
/fuchsia/zircon/kernel/kernel/ |
H A D | thread.cpp | 182 zx_status_t status = vm_allocate_kstack(&t->stack); 190 // save whether or not we need to free the thread struct and/or stack 197 // set up the initial stack frame 215 if (t->stack.vmar != nullptr) { 217 DEBUG_ASSERT(t->stack.unsafe_vmar != nullptr); 219 zx_status_t status = vm_free_kstack(&t->stack); 383 // we can unwind the stack in order to get the state of userland's 455 // called back in the DPC worker thread to free the stack and/or the thread structure 475 // create a dpc on the stack to queue up a free. 477 // reusing the stack befor 1083 kstack_t stack = t->stack; local [all...] |
/fuchsia/zircon/third_party/lib/jitterentropy/ |
H A D | rules.mk | 22 # Several flags related to stack-protection were removed, for compiler
|