/fuchsia/zircon/kernel/arch/x86/ |
H A D | arch.cpp | 72 LTRACEF("entry %#" PRIxPTR " user stack %#" PRIxPTR "\n", entry_point, sp); 73 LTRACEF("kernel stack %#" PRIxPTR "\n", x86_get_percpu()->default_tss.rsp0); 86 /* check that the kernel stack is set properly */ 125 // besides our thread_t and stack, since this is the checkpoint the 165 // want to generate stack-protector prologue/epilogue code, 188 // that x86_init_percpu can use safe-stack and/or stack-protector code. 192 // Copy the stack-guard value from the boot CPU's perpcu. 196 // Set up the initial unsafe stack pointer. 199 ROUNDDOWN(thread->stack [all...] |
H A D | faults.cpp | 59 // dump the bottom of the current stack 60 void* stack = frame; local 63 dprintf(CRITICAL, "bottom of kernel stack at %p:\n", stack); 64 hexdump(stack, 128); 91 // try to dump the user stack 95 printf("bottom of user stack at 0x%lx:\n", (vaddr_t)frame->user_sp); 494 // try to dump the user stack 498 printf("bottom of user stack at 0x%lx:\n", (vaddr_t)context->frame->user_sp);
|
H A D | rules.mk | 111 GLOBAL_CFLAGS += $(call cc-option,$(CC),-fno-stack-protector,) 138 # Clang needs -mcmodel=kernel to tell it to use the right safe-stack ABI for
|
/fuchsia/zircon/system/utest/core/ |
H A D | rules.mk | 28 # -fno-stack-protector
|
/fuchsia/zircon/kernel/arch/arm64/ |
H A D | rules.mk | 100 # Clang needs -mcmodel=kernel to tell it to use the right safe-stack ABI for 107 # for things like -fsanitize=shadow-call-stack. In the kernel,
|
/fuchsia/zircon/system/ulib/zx/include/lib/zx/ |
H A D | process.h | 42 uintptr_t stack, handle arg_handle, uintptr_t arg2) const;
|
/fuchsia/zircon/system/utest/core/interrupt/ |
H A D | interrupt-test.c | 163 // preallocated stack to satisfy the thread we create 164 static uint8_t stack[1024] __ALIGNED(16); 174 (uintptr_t)stack + sizeof(stack),
|
/fuchsia/zircon/system/core/userboot/ |
H A D | rules.mk | 49 # We don't have normal setup, so safe-stack is a non-starter. 52 # system/ulib/runtime is compiled without safe-stack. We can't use any other 53 # static libs, because they might be built with safe-stack or other
|
H A D | start.c | 14 #include <zircon/stack.h> 27 #define STACK_VMO_NAME "userboot-child-initial-stack" 64 // allocating the initial stack) stay out of this area, and then destroyed. 95 // 3. Create the initial thread and allocate a stack for it. 215 // TODO(mdempsky): Push further down the stack? Seems unnecessary to 257 // Allocate the stack for the child. 262 fail(log, "zx_vmo_create failed for child stack: %d", status); 268 check(log, status, "zx_vmar_map failed for child stack"); 271 // This is our own stack VMO handle, but we don't need it for anything.
|
/fuchsia/zircon/third_party/ulib/musl/src/internal/ |
H A D | threads_impl.h | 15 #include <zircon/stack.h> 51 // unsafe_stack describe just the actual stack block between the
|
/fuchsia/zircon/system/ulib/zircon/ |
H A D | rules.mk | 51 # does not need any writable data (except its caller's stack).
|
/fuchsia/zircon/system/utest/core/threads/ |
H A D | threads.cpp | 127 uintptr_t stack = 0u; local 129 0, thread_stack_vmo, 0, stack_size, &stack), local 142 ASSERT_EQ(zxr_thread_start(thread_out, stack, stack_size, entry, arg), 1092 // A small stack that is used for calling zx_thread_exit(). 1093 char stack[1024] __ALIGNED(16); 1095 } stack; local 1097 general_regs.REG_STACK_PTR = (uintptr_t)(stack.stack + sizeof(stack.stack)); [all...] |
/fuchsia/zircon/third_party/ulib/ngunwind/src/dwarf/ |
H A D | Gexpr.c | 30 that the stack could at least have a depth of up to 256 elements, 201 unw_word_t stack[MAX_EXPR_STACK_SIZE]; local 214 stack[--tos]; \ 224 stack[tos++] = _x; \ 231 Debug (1, "Out-of-stack pick\n"); \ 234 stack[_index]; \
|
/fuchsia/zircon/system/dev/input/hid/ |
H A D | hid.c | 470 static zx_status_t hid_push_global_state(list_node_t* stack, hid_global_state_t* state) { argument 478 list_add_tail(stack, &entry->node); 482 static zx_status_t hid_pop_global_state(list_node_t* stack, hid_global_state_t* state) { argument 483 hid_global_state_t* entry = list_remove_tail_type(stack, hid_global_state_t, node); 494 static void hid_clear_global_state(list_node_t* stack) { argument 496 list_for_every_entry_safe(stack, state, tmp, hid_global_state_t, node) {
|
/fuchsia/zircon/kernel/syscalls/ |
H A D | task.cpp | 190 zx_vaddr_t stack, uintptr_t arg1, uintptr_t arg2) { 193 thread_handle, entry, stack, arg1, arg2); 209 return thread->Start(entry, stack, arg1, arg2, /* initial_thread= */ false); 189 sys_thread_start(zx_handle_t thread_handle, zx_vaddr_t entry, zx_vaddr_t stack, uintptr_t arg1, uintptr_t arg2) argument
|
/fuchsia/zircon/third_party/ulib/uboringssl/ |
H A D | rules.mk | 9 -fvisibility=hidden -Wno-unused-function -include $(LOCAL_DIR)/stack-note.S
|
/fuchsia/zircon/kernel/include/kernel/ |
H A D | thread.h | 153 kstack_t stack; member in struct:thread 219 // stack size
|
/fuchsia/zircon/system/ulib/mini-process/ |
H A D | mini-process.c | 14 #include <zircon/stack.h> 47 // Allocate a single VMO for the child. It doubles as the stack on the top and 49 // stack usage is minimal, like 160 bytes or less. 57 static const char vmo_name[] = "mini-process:stack";
|
/fuchsia/zircon/system/ulib/runtime/ |
H A D | thread.c | 7 #include <zircon/stack.h> 83 // our stack out from under us. Note there is a benign race here still: if 161 // compute the starting address of the stack
|
/fuchsia/zircon/third_party/ulib/jemalloc/bin/ |
H A D | jeprof.in | 37 # <count> <stack trace> 582 # Remove uniniteresting stack items 598 # each stack trace so a given entry exists at most once. 1029 the "focus" regular expression matches a routine name on the stack 1067 the stack trace matches the regular expression in any of the -ignore 2603 # Translate a stack of addresses into a stack of symbols 2633 # the translated stack should contain callees before callers. 2759 # If count is charged to stack [a,b,c,d], in generated profile, 2775 # If count is charged to stack [ [all...] |
/fuchsia/zircon/make/ |
H A D | engine.mk | 262 NO_SAFESTACK := -fno-sanitize=safe-stack -fno-stack-protector 263 NO_SANITIZERS := -fno-sanitize=all -fno-stack-protector 523 # Compile all of userland with ASan. ASan makes safe-stack superfluous 524 # and ASan reporting doesn't really grok safe-stack, so disable it. 526 USER_COMPILEFLAGS += -fsanitize=address -fno-sanitize=safe-stack 776 EFI_COMPILEFLAGS += -fno-stack-protector
|
/fuchsia/zircon/third_party/ulib/uboringssl/crypto/ |
H A D | internal.h | 113 #include <openssl/stack.h>
|
/fuchsia/zircon/kernel/lib/userboot/ |
H A D | userboot.cpp | 34 #include <zircon/stack.h> 42 #define STACK_VMO_NAME "userboot-initial-stack" 379 // Map the stack anywhere.
|
/fuchsia/zircon/system/utest/libzx/ |
H A D | zx-test.cpp | 382 // Make a little stack and start the thread. Note: stack grows down so pass the high address. 384 uint8_t* stack = stack_storage + sizeof(stack_storage); 385 ASSERT_EQ(thread.start(&thread_suspend_test_fn, stack, 0, 0), ZX_OK);
|
/fuchsia/zircon/system/utest/core/vmar/ |
H A D | vmar.cpp | 88 uintptr_t stack = reinterpret_cast<uintptr_t>(thread_stack + sizeof(thread_stack)); local 118 status = zx_thread_start(thread, entry, stack,
|