Searched refs:stack (Results 26 - 50 of 52) sorted by relevance

123

/fuchsia/zircon/kernel/arch/x86/
H A Darch.cpp72 LTRACEF("entry %#" PRIxPTR " user stack %#" PRIxPTR "\n", entry_point, sp);
73 LTRACEF("kernel stack %#" PRIxPTR "\n", x86_get_percpu()->default_tss.rsp0);
86 /* check that the kernel stack is set properly */
125 // besides our thread_t and stack, since this is the checkpoint the
165 // want to generate stack-protector prologue/epilogue code,
188 // that x86_init_percpu can use safe-stack and/or stack-protector code.
192 // Copy the stack-guard value from the boot CPU's perpcu.
196 // Set up the initial unsafe stack pointer.
199 ROUNDDOWN(thread->stack
[all...]
H A Dfaults.cpp59 // dump the bottom of the current stack
60 void* stack = frame; local
63 dprintf(CRITICAL, "bottom of kernel stack at %p:\n", stack);
64 hexdump(stack, 128);
91 // try to dump the user stack
95 printf("bottom of user stack at 0x%lx:\n", (vaddr_t)frame->user_sp);
494 // try to dump the user stack
498 printf("bottom of user stack at 0x%lx:\n", (vaddr_t)context->frame->user_sp);
H A Drules.mk111 GLOBAL_CFLAGS += $(call cc-option,$(CC),-fno-stack-protector,)
138 # Clang needs -mcmodel=kernel to tell it to use the right safe-stack ABI for
/fuchsia/zircon/system/utest/core/
H A Drules.mk28 # -fno-stack-protector
/fuchsia/zircon/kernel/arch/arm64/
H A Drules.mk100 # Clang needs -mcmodel=kernel to tell it to use the right safe-stack ABI for
107 # for things like -fsanitize=shadow-call-stack. In the kernel,
/fuchsia/zircon/system/ulib/zx/include/lib/zx/
H A Dprocess.h42 uintptr_t stack, handle arg_handle, uintptr_t arg2) const;
/fuchsia/zircon/system/utest/core/interrupt/
H A Dinterrupt-test.c163 // preallocated stack to satisfy the thread we create
164 static uint8_t stack[1024] __ALIGNED(16);
174 (uintptr_t)stack + sizeof(stack),
/fuchsia/zircon/system/core/userboot/
H A Drules.mk49 # We don't have normal setup, so safe-stack is a non-starter.
52 # system/ulib/runtime is compiled without safe-stack. We can't use any other
53 # static libs, because they might be built with safe-stack or other
H A Dstart.c14 #include <zircon/stack.h>
27 #define STACK_VMO_NAME "userboot-child-initial-stack"
64 // allocating the initial stack) stay out of this area, and then destroyed.
95 // 3. Create the initial thread and allocate a stack for it.
215 // TODO(mdempsky): Push further down the stack? Seems unnecessary to
257 // Allocate the stack for the child.
262 fail(log, "zx_vmo_create failed for child stack: %d", status);
268 check(log, status, "zx_vmar_map failed for child stack");
271 // This is our own stack VMO handle, but we don't need it for anything.
/fuchsia/zircon/third_party/ulib/musl/src/internal/
H A Dthreads_impl.h15 #include <zircon/stack.h>
51 // unsafe_stack describe just the actual stack block between the
/fuchsia/zircon/system/ulib/zircon/
H A Drules.mk51 # does not need any writable data (except its caller's stack).
/fuchsia/zircon/system/utest/core/threads/
H A Dthreads.cpp127 uintptr_t stack = 0u; local
129 0, thread_stack_vmo, 0, stack_size, &stack), local
142 ASSERT_EQ(zxr_thread_start(thread_out, stack, stack_size, entry, arg),
1092 // A small stack that is used for calling zx_thread_exit().
1093 char stack[1024] __ALIGNED(16);
1095 } stack; local
1097 general_regs.REG_STACK_PTR = (uintptr_t)(stack.stack + sizeof(stack.stack));
[all...]
/fuchsia/zircon/third_party/ulib/ngunwind/src/dwarf/
H A DGexpr.c30 that the stack could at least have a depth of up to 256 elements,
201 unw_word_t stack[MAX_EXPR_STACK_SIZE]; local
214 stack[--tos]; \
224 stack[tos++] = _x; \
231 Debug (1, "Out-of-stack pick\n"); \
234 stack[_index]; \
/fuchsia/zircon/system/dev/input/hid/
H A Dhid.c470 static zx_status_t hid_push_global_state(list_node_t* stack, hid_global_state_t* state) { argument
478 list_add_tail(stack, &entry->node);
482 static zx_status_t hid_pop_global_state(list_node_t* stack, hid_global_state_t* state) { argument
483 hid_global_state_t* entry = list_remove_tail_type(stack, hid_global_state_t, node);
494 static void hid_clear_global_state(list_node_t* stack) { argument
496 list_for_every_entry_safe(stack, state, tmp, hid_global_state_t, node) {
/fuchsia/zircon/kernel/syscalls/
H A Dtask.cpp190 zx_vaddr_t stack, uintptr_t arg1, uintptr_t arg2) {
193 thread_handle, entry, stack, arg1, arg2);
209 return thread->Start(entry, stack, arg1, arg2, /* initial_thread= */ false);
189 sys_thread_start(zx_handle_t thread_handle, zx_vaddr_t entry, zx_vaddr_t stack, uintptr_t arg1, uintptr_t arg2) argument
/fuchsia/zircon/third_party/ulib/uboringssl/
H A Drules.mk9 -fvisibility=hidden -Wno-unused-function -include $(LOCAL_DIR)/stack-note.S
/fuchsia/zircon/kernel/include/kernel/
H A Dthread.h153 kstack_t stack; member in struct:thread
219 // stack size
/fuchsia/zircon/system/ulib/mini-process/
H A Dmini-process.c14 #include <zircon/stack.h>
47 // Allocate a single VMO for the child. It doubles as the stack on the top and
49 // stack usage is minimal, like 160 bytes or less.
57 static const char vmo_name[] = "mini-process:stack";
/fuchsia/zircon/system/ulib/runtime/
H A Dthread.c7 #include <zircon/stack.h>
83 // our stack out from under us. Note there is a benign race here still: if
161 // compute the starting address of the stack
/fuchsia/zircon/third_party/ulib/jemalloc/bin/
H A Djeprof.in37 # <count> <stack trace>
582 # Remove uniniteresting stack items
598 # each stack trace so a given entry exists at most once.
1029 the "focus" regular expression matches a routine name on the stack
1067 the stack trace matches the regular expression in any of the -ignore
2603 # Translate a stack of addresses into a stack of symbols
2633 # the translated stack should contain callees before callers.
2759 # If count is charged to stack [a,b,c,d], in generated profile,
2775 # If count is charged to stack [
[all...]
/fuchsia/zircon/make/
H A Dengine.mk262 NO_SAFESTACK := -fno-sanitize=safe-stack -fno-stack-protector
263 NO_SANITIZERS := -fno-sanitize=all -fno-stack-protector
523 # Compile all of userland with ASan. ASan makes safe-stack superfluous
524 # and ASan reporting doesn't really grok safe-stack, so disable it.
526 USER_COMPILEFLAGS += -fsanitize=address -fno-sanitize=safe-stack
776 EFI_COMPILEFLAGS += -fno-stack-protector
/fuchsia/zircon/third_party/ulib/uboringssl/crypto/
H A Dinternal.h113 #include <openssl/stack.h>
/fuchsia/zircon/kernel/lib/userboot/
H A Duserboot.cpp34 #include <zircon/stack.h>
42 #define STACK_VMO_NAME "userboot-initial-stack"
379 // Map the stack anywhere.
/fuchsia/zircon/system/utest/libzx/
H A Dzx-test.cpp382 // Make a little stack and start the thread. Note: stack grows down so pass the high address.
384 uint8_t* stack = stack_storage + sizeof(stack_storage);
385 ASSERT_EQ(thread.start(&thread_suspend_test_fn, stack, 0, 0), ZX_OK);
/fuchsia/zircon/system/utest/core/vmar/
H A Dvmar.cpp88 uintptr_t stack = reinterpret_cast<uintptr_t>(thread_stack + sizeof(thread_stack)); local
118 status = zx_thread_start(thread, entry, stack,

Completed in 122 milliseconds

123