/kernel/linux/linux-6.6/arch/arc/include/asm/ |
H A D | entry-arcv2.h | 12 * Interrupt/Exception stack layout (pt_regs) for ARCv2 52 ; 1. SP auto-switched to kernel mode stack 54 ; 3. Auto save: (mandatory) Push PC and STAT32 on stack variable 65 ; carve pt_regs on stack (case #3), PC/STAT32 already on stack 70 ; carve pt_regs on stack (case #4), which grew partially already 81 ; 1. SP auto-switched to kernel mode stack 158 ; Auto stack switch works 196 ; - for K mode, it will be implicitly restored as stack is unwound
|
/third_party/python/Modules/_ctypes/libffi_osx/x86/ |
H A D | x86-ffi_darwin.c | 35 /* ffi_prep_args is called by the assembly routine once stack space 38 void ffi_prep_args(char *stack, extended_cif *ecif); 40 void ffi_prep_args(char *stack, extended_cif *ecif) in ffi_prep_args() argument 47 argp = stack; in ffi_prep_args() 228 static void ffi_prep_incoming_args_SYSV (char *stack, void **ret, 254 * value on the stack; and if the function returns 266 ffi_prep_incoming_args_SYSV(char *stack, void **rvalue, void **avalue, in ffi_prep_incoming_args_SYSV() argument 274 argp = stack; in ffi_prep_incoming_args_SYSV() 378 ffi_prep_args_raw(char *stack, extended_cif *ecif) in ffi_prep_args_raw() argument 380 memcpy (stack, eci in ffi_prep_args_raw() [all...] |
/kernel/linux/linux-6.6/arch/m68k/kernel/ |
H A D | entry.S | 95 | stack contents: 101 | stack contents now: 109 | stack contents now is just [syscall return address] [pt_regs] [frame] 117 movel %sp,%sp@- | stack frame pointer argument 125 movel %sp,%sp@- | stack frame pointer argument 156 movel %sp,%sp@- /* stack frame pointer argument */ 249 | kernel stack, otherwise stack overflow can occur during 300 movel %d0,%sp@- | put vector # on stack 303 addql #8,%sp | pop parameters off stack [all...] |
/third_party/cups-filters/cupsfilters/ |
H A D | image-gif.c | 550 *stack = NULL, /* Output stack */ in gif_read_lzw() local 551 *sp; /* Current stack pointer */ in gif_read_lzw() 578 if (stack == NULL) in gif_read_lzw() 579 stack = calloc(8192, sizeof(short)); in gif_read_lzw() 581 if (stack == NULL) in gif_read_lzw() 599 sp = stack; in gif_read_lzw() 618 if (sp > stack) in gif_read_lzw() 637 sp = stack; in gif_read_lzw() 657 if (sp < (stack in gif_read_lzw() [all...] |
/kernel/linux/linux-5.10/arch/s390/kernel/ |
H A D | dumpstack.c | 58 unsigned long stack; in in_task_stack() local 60 stack = (unsigned long) task_stack_page(task); in in_task_stack() 61 return in_stack(sp, info, STACK_TYPE_TASK, stack, stack + THREAD_SIZE); in in_task_stack() 101 /* Check per-task stack */ in get_stack_info() 116 * Make sure we don't iterate through any given stack more than once. in get_stack_info() 118 * just break out and report an unknown stack type. in get_stack_info() 129 void show_stack(struct task_struct *task, unsigned long *stack, in show_stack() argument 135 unwind_for_each_frame(&state, task, NULL, (unsigned long) stack) in show_stack() 177 /* Show stack backtrac in show_regs() [all...] |
/kernel/linux/linux-5.10/arch/s390/purgatory/ |
H A D | head.S | 34 #define bufsz purgatory_end-stack 92 /* Setup stack */ 150 * behind the point of no return it can re-use the stack as buffer. 153 larl %r12,stack 171 larl %r7,stack 172 aghi %r10,stack-purgatory_start 269 stack: label 271 .skip stack-purgatory_start
|
/kernel/linux/linux-5.10/arch/s390/include/asm/ |
H A D | stacktrace.h | 47 * Stack layout of a C stack frame. 67 * current_frame_address() returns function stack frame address, which matches 69 * allocates stack for local variables or new stack frame to call other 111 #define CALL_ON_STACK(fn, stack, nr, args...) \ 124 : [_stack] "R" (stack), \ 191 * stack. Proper sign and zero extension of function arguments is 194 * rc = call_on_stack(nr, stack, rettype, fn, t1, a1, t2, a2, ...) 197 * - stack specifies the stack t [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/pidfd/ |
H A D | pidfd_fdinfo_test.c | 87 char *stack; member 101 ret.stack = mmap(NULL, CHILD_STACK_SIZE, PROT_READ | PROT_WRITE, in clone_newns() 103 if (ret.stack == MAP_FAILED) { in clone_newns() 104 error_set(err, -1, "mmap of stack failed (errno %d)", errno); in clone_newns() 109 ret.pid = __clone2(fn, ret.stack, CHILD_STACK_SIZE, flags, args, &ret.fd); in clone_newns() 111 ret.pid = clone(fn, ret.stack + CHILD_STACK_SIZE, flags, args, &ret.fd); in clone_newns() 141 if (munmap(child->stack, CHILD_STACK_SIZE)) { in child_join() 142 error_set(err, -1, "munmap of child stack failed (errno %d)", errno); in child_join()
|
/kernel/linux/linux-5.10/drivers/misc/lkdtm/ |
H A D | bugs.c | 25 * Make sure our attempts to over run the kernel stack doesn't trigger 41 * Make sure compiler does not optimize this function or stack frame away: 43 * - stack variables are marked volatile 44 * - stack variables are written (memset()) and read (pr_info()) 107 pr_info("FAIL: survived without exhausting stack?!\n"); in lkdtm_EXHAUST_STACK() 110 static noinline void __lkdtm_CORRUPT_STACK(void *stack) in __lkdtm_CORRUPT_STACK() argument 112 memset(stack, '\xff', 64); in __lkdtm_CORRUPT_STACK() 115 /* This should trip the stack canary, not corrupt the return address. */ 118 /* Use default char array length that triggers stack protection. */ in lkdtm_CORRUPT_STACK() 121 pr_info("Corrupting stack containin in lkdtm_CORRUPT_STACK() 326 const unsigned char *stack = task_stack_page(current); lkdtm_STACK_GUARD_PAGE_LEADING() local 340 const unsigned char *stack = task_stack_page(current); lkdtm_STACK_GUARD_PAGE_TRAILING() local [all...] |
/kernel/uniproton/src/arch/cpu/armv7-m/cortex-m4/ |
H A D | prt_vector.S | 98 LDR R0, =g_stackEnd @top of stack 99 LDR R1, =g_stackStart @bottom of stack 101 CMP R0, #4 @stack length <4? 104 LOOP1: @the condition of stack length >=4 114 LOOP2: @the condition of stack length <4 164 @* code for defining the stack and heap memory locations.
|
/kernel/liteos_a/testsuites/unittest/container/smoke/ |
H A D | It_ipc_container_004.cpp | 77 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in childFunc() local 78 if (stack == nullptr) { in childFunc() 81 char *stackTop = stack + STACK_SIZE; in childFunc() 159 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItIpcContainer004() local 160 ASSERT_NE(stack, nullptr); in ItIpcContainer004() 161 char *stackTop = stack + STACK_SIZE; in ItIpcContainer004()
|
H A D | It_pid_container_025.cpp | 45 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItPidContainer025() local 46 ASSERT_NE(stack, nullptr); in ItPidContainer025() 47 char *stackTop = stack + STACK_SIZE; in ItPidContainer025()
|
H A D | It_time_container_001.cpp | 49 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItTimeContainer001() local 50 ASSERT_NE(stack, nullptr); in ItTimeContainer001() 51 char *stackTop = stack + STACK_SIZE; in ItTimeContainer001()
|
H A D | It_pid_container_026.cpp | 46 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItPidContainer026() local 47 ASSERT_NE(stack, nullptr); in ItPidContainer026() 48 char *stackTop = stack + STACK_SIZE; in ItPidContainer026()
|
H A D | It_time_container_010.cpp | 48 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItTimeContainer010() local 49 ASSERT_NE(stack, nullptr); in ItTimeContainer010() 50 char *stackTop = stack + STACK_SIZE; in ItTimeContainer010()
|
/third_party/skia/third_party/externals/spirv-tools/source/val/ |
H A D | construct.cpp | 88 std::vector<BasicBlock*> stack; in blocks() local 89 stack.push_back(const_cast<BasicBlock*>(header)); in blocks() 90 while (!stack.empty()) { in blocks() 91 BasicBlock* block = stack.back(); in blocks() 92 stack.pop_back(); in blocks() 127 stack.push_back(succ); in blocks()
|
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/val/ |
H A D | construct.cpp | 88 std::vector<BasicBlock*> stack; in blocks() local 89 stack.push_back(const_cast<BasicBlock*>(header)); in blocks() 90 while (!stack.empty()) { in blocks() 91 BasicBlock* block = stack.back(); in blocks() 92 stack.pop_back(); in blocks() 127 stack.push_back(succ); in blocks()
|
/third_party/python/Lib/test/ |
H A D | test_code_module.py | 21 # use exit stack to match patch context managers to addCleanup 22 stack = ExitStack() 23 self.addCleanup(stack.close) 24 self.infunc = stack.enter_context(mock.patch('code.input', 26 self.stdout = stack.enter_context(mock.patch('code.sys.stdout')) 27 self.stderr = stack.enter_context(mock.patch('code.sys.stderr')) 29 self.sysmod = stack.enter_context(prepatch)
|
/third_party/spirv-tools/source/val/ |
H A D | construct.cpp | 82 std::vector<BasicBlock*> stack; in blocks() local 83 stack.push_back(const_cast<BasicBlock*>(header)); in blocks() 85 while (!stack.empty()) { in blocks() 86 auto* block = stack.back(); in blocks() 87 stack.pop_back(); in blocks() 111 stack.push_back(succ); in blocks()
|
/kernel/linux/linux-5.10/mm/ |
H A D | usercopy.c | 26 * stack frame (if possible). 29 * NOT_STACK: not at all on the stack 30 * GOOD_FRAME: fully within a valid stack frame 31 * GOOD_STACK: fully on the stack (when can't do frame-checking) 32 * BAD_STACK: error condition (invalid stack position or bad stack frame) 36 const void * const stack = task_stack_page(current); in check_stack_object() local 37 const void * const stackend = stack + THREAD_SIZE; in check_stack_object() 40 /* Object is not on the stack at all. */ in check_stack_object() 41 if (obj + len <= stack || stacken in check_stack_object() [all...] |
/kernel/linux/linux-6.6/mm/ |
H A D | usercopy.c | 29 * stack frame (if possible). 32 * NOT_STACK: not at all on the stack 33 * GOOD_FRAME: fully within a valid stack frame 34 * GOOD_STACK: within the current stack (when can't frame-check exactly) 35 * BAD_STACK: error condition (invalid stack position or bad stack frame) 39 const void * const stack = task_stack_page(current); in check_stack_object() local 40 const void * const stackend = stack + THREAD_SIZE; in check_stack_object() 43 /* Object is not on the stack at all. */ in check_stack_object() 44 if (obj + len <= stack || stacken in check_stack_object() [all...] |
/kernel/linux/linux-6.6/sound/soc/sof/amd/ |
H A D | acp-common.c | 53 * linenumber and stack. 57 * @stack: Stores the stack dump. 58 * @stack_words: Size of the stack dump. 63 u32 *stack, size_t stack_words) in amd_get_registers() 80 /* then get the stack */ in amd_get_registers() 82 acp_mailbox_read(sdev, offset, stack, stack_words * sizeof(u32)); in amd_get_registers() 95 u32 stack[AMD_STACK_DUMP_SIZE]; in amd_sof_dump() local 113 * number and the stack. in amd_sof_dump() 115 amd_get_registers(sdev, &xoops, &panic_info, stack, AMD_STACK_DUMP_SIZ in amd_sof_dump() 60 amd_get_registers(struct snd_sof_dev *sdev, struct sof_ipc_dsp_oops_xtensa *xoops, struct sof_ipc_panic_info *panic_info, u32 *stack, size_t stack_words) amd_get_registers() argument [all...] |
/kernel/linux/linux-5.10/arch/arm/kernel/ |
H A D | entry-header.S | 22 @ Most of the stack format comes from struct pt_regs, but with 29 * The SWI code relies on the fact that R0 is at the bottom of the stack 63 * automatically saved on the current stack (32 words) before 64 * switching to the exception stack (SP_main). 80 @ exception happend that is either on the main or the process stack. 81 @ Bit 2 of EXC_RETURN stored in the lr register specifies which stack 92 @ Linux expects to have irqs off. Do it here before taking stack space 104 @ calculate the original stack pointer value. 107 @ The cpu might automatically 8-byte align the stack. Bit 9 108 @ of the saved xPSR specifies if stack alignin [all...] |
/kernel/linux/linux-5.10/drivers/net/wireguard/ |
H A D | allowedips.c | 41 static void push_rcu(struct allowedips_node **stack, in push_rcu() argument 47 stack[(*len)++] = rcu_dereference_raw(p); in push_rcu() 58 struct allowedips_node *node, *stack[MAX_ALLOWEDIPS_DEPTH] = { in root_free_rcu() local 62 while (len > 0 && (node = stack[--len])) { in root_free_rcu() 63 push_rcu(stack, node->bit[0], &len); in root_free_rcu() 64 push_rcu(stack, node->bit[1], &len); in root_free_rcu() 71 struct allowedips_node *node, *stack[MAX_ALLOWEDIPS_DEPTH] = { root }; in root_remove_peer_lists() local 74 while (len > 0 && (node = stack[--len])) { in root_remove_peer_lists() 75 push_rcu(stack, node->bit[0], &len); in root_remove_peer_lists() 76 push_rcu(stack, nod in root_remove_peer_lists() [all...] |
/kernel/linux/linux-6.6/drivers/misc/lkdtm/ |
H A D | bugs.c | 25 * Make sure our attempts to over run the kernel stack doesn't trigger 41 * Make sure compiler does not optimize this function or stack frame away: 43 * - stack variables are marked volatile 44 * - stack variables are written (memset()) and read (buf[..] passed as arg) 109 pr_info("FAIL: survived without exhausting stack?!\n"); in lkdtm_EXHAUST_STACK() 112 static noinline void __lkdtm_CORRUPT_STACK(void *stack) in __lkdtm_CORRUPT_STACK() argument 114 memset(stack, '\xff', 64); in __lkdtm_CORRUPT_STACK() 117 /* This should trip the stack canary, not corrupt the return address. */ 120 /* Use default char array length that triggers stack protection. */ in lkdtm_CORRUPT_STACK() 123 pr_info("Corrupting stack containin in lkdtm_CORRUPT_STACK() 160 __lkdtm_REPORT_STACK_CANARY(void *stack) __lkdtm_REPORT_STACK_CANARY() argument 470 const unsigned char *stack = task_stack_page(current); lkdtm_STACK_GUARD_PAGE_LEADING() local 484 const unsigned char *stack = task_stack_page(current); lkdtm_STACK_GUARD_PAGE_TRAILING() local [all...] |