Searched refs:stack (Results 1 - 25 of 52) sorted by relevance

123

/fuchsia/zircon/third_party/ulib/uboringssl/
H A Dstack-note.S3 // executable stack and cause a PT_GNU_STACK program header that says so.
5 .section .note.GNU-stack,""
/fuchsia/zircon/kernel/vm/
H A Dkstack.cpp27 // Allocates and maps a kernel stack with one page of padding before and after the mapping.
31 LTRACEF("allocating %s stack\n", unsafe ? "unsafe" : "safe");
37 // Create a VMO for our stack
42 TRACEF("error allocating %s stack for thread\n",
46 const char* name = unsafe ? "unsafe-stack" : "safe-stack";
49 // create a vmar with enough padding for a page before and after the stack
70 LTRACEF("%s stack vmar at %#" PRIxPTR "\n",
86 LTRACEF("%s stack mapping at %#" PRIxPTR "\n",
89 // fault in all the pages so we dont demand fault in the stack
104 vm_allocate_kstack(kstack_t* stack) argument
143 vm_free_kstack(kstack_t* stack) argument
[all...]
/fuchsia/zircon/kernel/vm/include/vm/
H A Dkstack.h13 // kstack encapsulates a kernel stack.
21 // When non-null, |vmar| (and, if safe-stack is enabled, |unsafe_vmar|) points to a ref-counted
33 // Allocates a kernel stack with appropriate overrun padding.
35 // Assumes stack has been zero-initialized.
36 zx_status_t vm_allocate_kstack(kstack_t* stack);
38 // Frees a stack allocated by |vm_allocate_kstack|.
39 zx_status_t vm_free_kstack(kstack_t* stack);
/fuchsia/zircon/system/utest/core/stack/
H A Drules.mk14 $(LOCAL_DIR)/stack-test.c \
16 MODULE_NAME := stack-test
24 MODULE_COMPILEFLAGS += -fsanitize=safe-stack -fstack-protector-all
/fuchsia/zircon/third_party/ulib/musl/third_party/tre/
H A Dregcomp.c212 from tre-stack.c and tre-stack.h
217 /* Creates a new stack object. `size' is initial size in bytes, `max_size'
219 allocated with realloc() if all space gets used up. Returns the stack
223 /* Frees the stack object. */
226 /* Returns the current number of objects in the stack. */
230 `value' on top of stack `s'. Returns REG_ESPACE if out of memory.
240 element off of stack `s' and returns it. The stack must not be
278 union tre_stack_item* stack; member in struct:tre_stack_rec
359 tre_stack_t* stack; member in struct:__anon1861
906 tre_stack_t* stack = ctx->stack; local
1122 tre_add_tags(tre_mem_t mem, tre_stack_t* stack, tre_ast_node_t* tree, tre_tnfa_t* tnfa) argument
1553 tre_copy_ast(tre_mem_t mem, tre_stack_t* stack, tre_ast_node_t* ast, int flags, int* pos_add, tre_tag_direction_t* tag_directions, tre_ast_node_t** copy, int* max_pos) argument
1680 tre_expand_ast(tre_mem_t mem, tre_stack_t* stack, tre_ast_node_t* ast, int* position, tre_tag_direction_t* tag_directions) argument
1953 tre_match_empty(tre_stack_t* stack, tre_ast_node_t* node, int* tags, int* assertions, int* num_tags_seen) argument
2052 tre_compute_nfl(tre_mem_t mem, tre_stack_t* stack, tre_ast_node_t* tree) argument
2439 tre_stack_t* stack; local
[all...]
H A Dregexec.c188 everything in a single large block from the stack frame using alloca()
406 match. This can be spectacularly expensive and may run out of stack
442 #define BT_STACK_MBSTATE_IN stack->item.mbstate = (mbstate)
443 #define BT_STACK_MBSTATE_OUT (mbstate) = stack->item.mbstate
456 if (!stack->next) { \
469 s->prev = stack; \
482 stack->next = s; \
483 stack = s; \
485 stack = stack
549 tre_backtrack_t stack; local
[all...]
/fuchsia/zircon/system/fidl/fuchsia-net-stack/
H A Drules.mk13 MODULE_FIDL_LIBRARY := fuchsia.net.stack
17 MODULE_SRCS += $(LOCAL_DIR)/stack.fidl
/fuchsia/zircon/kernel/arch/arm64/
H A Darch.cpp65 // fake arch_thread in the thread pointer, so that safe-stack
66 // and stack-protector code can work early. The thread pointer
102 // Allocate a stack, indexed by CPU num so that |arm64_secondary_entry| can find it.
105 kstack_t* stack = &_init_thread[cpu_num - 1].stack; local
106 DEBUG_ASSERT(stack->base == 0);
107 zx_status_t status = vm_allocate_kstack(stack);
112 // Get the stack pointers.
113 void* sp = reinterpret_cast<void*>(stack->top);
116 DEBUG_ASSERT(stack
145 kstack_t* stack = &_init_thread[cpu_num - 1].stack; local
[all...]
H A Dthread.cpp38 // stack alignment requirements per ABI
47 // create a default stack frame on the stack
48 vaddr_t stack_top = t->stack.top;
50 // make sure the top of the stack is 16 byte aligned for EABI compliance
52 t->stack.top = stack_top;
65 // set the stack pointer
69 ROUNDDOWN(t->stack.unsafe_base + t->stack.size, 16);
85 // our callers don't have to avoid safe-stack cod
[all...]
/fuchsia/zircon/system/ulib/zx/
H A Dprocess.cpp25 uintptr_t stack, handle arg_handle,
27 return zx_process_start(get(), thread_handle.get(), entry, stack, arg_handle.release(), arg2);
24 start(const thread& thread_handle, uintptr_t entry, uintptr_t stack, handle arg_handle, uintptr_t arg2) const argument
/fuchsia/zircon/system/ulib/zx/include/lib/zx/
H A Dthread.h44 zx_status_t start(uintptr_t thread_entry, uintptr_t stack, uintptr_t arg1, argument
46 return zx_thread_start(get(), thread_entry, stack, arg1, arg2);
49 void* stack, uintptr_t arg1, uintptr_t arg2) {
52 reinterpret_cast<uintptr_t>(stack), arg1, arg2);
48 start(void (*thread_entry)(uintptr_t arg1, uintptr_t arg2), void* stack, uintptr_t arg1, uintptr_t arg2) argument
/fuchsia/zircon/kernel/target/pc/multiboot/
H A Dmultiboot-start.S33 // environment with flat segments, but does not provide a stack.
47 // Switch to our stack.
52 // get a triple-fault. We've just cleared the bss containing the stack,
67 .section .bss.stack,"aw",%nobits
68 DATA(stack)
72 END_DATA(stack)
/fuchsia/zircon/system/utest/thread-initial-state/
H A Dinit-state.c26 // preallocated stack to satisfy the thread we create
27 static uint8_t stack[1024] __ALIGNED(16);
35 (uintptr_t)stack + sizeof(stack),
/fuchsia/zircon/third_party/ulib/uboringssl/include/openssl/
H A Dex_data.h114 #include <openssl/stack.h>
/fuchsia/zircon/kernel/target/arm64/boot-shim/
H A Dboot-shim.S46 // setup stack
60 LOCAL_DATA(stack)
63 END_DATA(stack)
/fuchsia/zircon/kernel/arch/x86/
H A Dthread.cpp25 // create a default stack frame on the stack
26 vaddr_t stack_top = t->stack.top;
28 // make sure the top of the stack is 16 byte aligned for ABI compliance
30 t->stack.top = stack_top;
33 // of the way the context switch will pop the return address off the stack. After the first
34 // context switch, this leaves the stack unaligned relative to how a called function expects it.
57 // set the stack pointer
61 ROUNDDOWN(t->stack.unsafe_base + t->stack
[all...]
H A Dsmp.cpp39 vm_free_kstack(&t->stack);
89 status = vm_allocate_kstack(&thread->stack);
90 bootstrap_data->per_cpu[i].kstack_base = thread->stack.base;
/fuchsia/zircon/kernel/arch/arm64/hypervisor/
H A Del2_cpu_state.cpp63 El2Stack& stack = cpu_state->stacks_[cpu_num]; local
65 zx_status_t status = arm64_el2_on(table.Base(), stack.Top());
95 // Allocate EL2 stack for each CPU.
101 for (auto& stack : el2_stacks) {
102 zx_status_t status = stack.Alloc();
/fuchsia/zircon/third_party/ulib/musl/src/math/x86_64/
H A Dexpl.S48 # fpu stack: 2^hi x hi
67 # fpu stack: 2^hi x hi xh xl yh
78 # fpu stack: 2^hi x lo xh xl yl
92 # fpu stack: 2^hi x lo log2e_lo
/fuchsia/zircon/system/ulib/fzl/
H A Dmemory-probe.cpp44 void* stack = thread_stack + sizeof(thread_stack); local
60 thread.start(&except_thread_func, stack, static_cast<uintptr_t>(op), reinterpret_cast<uintptr_t>(addr));
/fuchsia/zircon/system/ulib/runtime/
H A Drules.mk26 # This code is used in early startup, where safe-stack setup is not ready yet.
/fuchsia/zircon/system/utest/core/threads/thread-functions/
H A Drules.mk12 # -fno-stack-protector
/fuchsia/zircon/system/ulib/lockdep/include/lockdep/
H A Dlock_class_state.h191 // Linked list node for the loop detector's active node stack. The use
250 // The head of the stack of active nodes in a path traversal. The bottom
251 // of the stack is marked with the sentinel value 1 instead of nullptr
252 // to simplify determining whether a node is on the stack. Every node on
253 // the stack has LoopNode::next != nulltpr.
254 LoopNode* stack{reinterpret_cast<LoopNode*>(1)};
290 // the stack are merged into this set.
309 // Pushes a node on the active nodes stack.
312 node->next = stack;
313 stack
[all...]
/fuchsia/zircon/kernel/kernel/
H A Dthread.cpp182 zx_status_t status = vm_allocate_kstack(&t->stack);
190 // save whether or not we need to free the thread struct and/or stack
197 // set up the initial stack frame
215 if (t->stack.vmar != nullptr) {
217 DEBUG_ASSERT(t->stack.unsafe_vmar != nullptr);
219 zx_status_t status = vm_free_kstack(&t->stack);
383 // we can unwind the stack in order to get the state of userland's
455 // called back in the DPC worker thread to free the stack and/or the thread structure
475 // create a dpc on the stack to queue up a free.
477 // reusing the stack befor
1083 kstack_t stack = t->stack; local
[all...]
/fuchsia/zircon/third_party/lib/jitterentropy/
H A Drules.mk22 # Several flags related to stack-protection were removed, for compiler

Completed in 83 milliseconds

123