Home
last modified time | relevance | path

Searched refs:stack (Results 276 - 300 of 3084) sorted by relevance

1...<<11121314151617181920>>...124

/kernel/linux/linux-6.6/arch/arc/include/asm/
H A Dentry-arcv2.h12 * Interrupt/Exception stack layout (pt_regs) for ARCv2
52 ; 1. SP auto-switched to kernel mode stack
54 ; 3. Auto save: (mandatory) Push PC and STAT32 on stack variable
65 ; carve pt_regs on stack (case #3), PC/STAT32 already on stack
70 ; carve pt_regs on stack (case #4), which grew partially already
81 ; 1. SP auto-switched to kernel mode stack
158 ; Auto stack switch works
196 ; - for K mode, it will be implicitly restored as stack is unwound
/third_party/python/Modules/_ctypes/libffi_osx/x86/
H A Dx86-ffi_darwin.c35 /* ffi_prep_args is called by the assembly routine once stack space
38 void ffi_prep_args(char *stack, extended_cif *ecif);
40 void ffi_prep_args(char *stack, extended_cif *ecif) in ffi_prep_args() argument
47 argp = stack; in ffi_prep_args()
228 static void ffi_prep_incoming_args_SYSV (char *stack, void **ret,
254 * value on the stack; and if the function returns
266 ffi_prep_incoming_args_SYSV(char *stack, void **rvalue, void **avalue, in ffi_prep_incoming_args_SYSV() argument
274 argp = stack; in ffi_prep_incoming_args_SYSV()
378 ffi_prep_args_raw(char *stack, extended_cif *ecif) in ffi_prep_args_raw() argument
380 memcpy (stack, eci in ffi_prep_args_raw()
[all...]
/kernel/linux/linux-6.6/arch/m68k/kernel/
H A Dentry.S95 | stack contents:
101 | stack contents now:
109 | stack contents now is just [syscall return address] [pt_regs] [frame]
117 movel %sp,%sp@- | stack frame pointer argument
125 movel %sp,%sp@- | stack frame pointer argument
156 movel %sp,%sp@- /* stack frame pointer argument */
249 | kernel stack, otherwise stack overflow can occur during
300 movel %d0,%sp@- | put vector # on stack
303 addql #8,%sp | pop parameters off stack
[all...]
/third_party/cups-filters/cupsfilters/
H A Dimage-gif.c550 *stack = NULL, /* Output stack */ in gif_read_lzw() local
551 *sp; /* Current stack pointer */ in gif_read_lzw()
578 if (stack == NULL) in gif_read_lzw()
579 stack = calloc(8192, sizeof(short)); in gif_read_lzw()
581 if (stack == NULL) in gif_read_lzw()
599 sp = stack; in gif_read_lzw()
618 if (sp > stack) in gif_read_lzw()
637 sp = stack; in gif_read_lzw()
657 if (sp < (stack in gif_read_lzw()
[all...]
/kernel/linux/linux-5.10/arch/s390/kernel/
H A Ddumpstack.c58 unsigned long stack; in in_task_stack() local
60 stack = (unsigned long) task_stack_page(task); in in_task_stack()
61 return in_stack(sp, info, STACK_TYPE_TASK, stack, stack + THREAD_SIZE); in in_task_stack()
101 /* Check per-task stack */ in get_stack_info()
116 * Make sure we don't iterate through any given stack more than once. in get_stack_info()
118 * just break out and report an unknown stack type. in get_stack_info()
129 void show_stack(struct task_struct *task, unsigned long *stack, in show_stack() argument
135 unwind_for_each_frame(&state, task, NULL, (unsigned long) stack) in show_stack()
177 /* Show stack backtrac in show_regs()
[all...]
/kernel/linux/linux-5.10/arch/s390/purgatory/
H A Dhead.S34 #define bufsz purgatory_end-stack
92 /* Setup stack */
150 * behind the point of no return it can re-use the stack as buffer.
153 larl %r12,stack
171 larl %r7,stack
172 aghi %r10,stack-purgatory_start
269 stack: label
271 .skip stack-purgatory_start
/kernel/linux/linux-5.10/arch/s390/include/asm/
H A Dstacktrace.h47 * Stack layout of a C stack frame.
67 * current_frame_address() returns function stack frame address, which matches
69 * allocates stack for local variables or new stack frame to call other
111 #define CALL_ON_STACK(fn, stack, nr, args...) \
124 : [_stack] "R" (stack), \
191 * stack. Proper sign and zero extension of function arguments is
194 * rc = call_on_stack(nr, stack, rettype, fn, t1, a1, t2, a2, ...)
197 * - stack specifies the stack t
[all...]
/kernel/linux/linux-5.10/tools/testing/selftests/pidfd/
H A Dpidfd_fdinfo_test.c87 char *stack; member
101 ret.stack = mmap(NULL, CHILD_STACK_SIZE, PROT_READ | PROT_WRITE, in clone_newns()
103 if (ret.stack == MAP_FAILED) { in clone_newns()
104 error_set(err, -1, "mmap of stack failed (errno %d)", errno); in clone_newns()
109 ret.pid = __clone2(fn, ret.stack, CHILD_STACK_SIZE, flags, args, &ret.fd); in clone_newns()
111 ret.pid = clone(fn, ret.stack + CHILD_STACK_SIZE, flags, args, &ret.fd); in clone_newns()
141 if (munmap(child->stack, CHILD_STACK_SIZE)) { in child_join()
142 error_set(err, -1, "munmap of child stack failed (errno %d)", errno); in child_join()
/kernel/linux/linux-5.10/drivers/misc/lkdtm/
H A Dbugs.c25 * Make sure our attempts to over run the kernel stack doesn't trigger
41 * Make sure compiler does not optimize this function or stack frame away:
43 * - stack variables are marked volatile
44 * - stack variables are written (memset()) and read (pr_info())
107 pr_info("FAIL: survived without exhausting stack?!\n"); in lkdtm_EXHAUST_STACK()
110 static noinline void __lkdtm_CORRUPT_STACK(void *stack) in __lkdtm_CORRUPT_STACK() argument
112 memset(stack, '\xff', 64); in __lkdtm_CORRUPT_STACK()
115 /* This should trip the stack canary, not corrupt the return address. */
118 /* Use default char array length that triggers stack protection. */ in lkdtm_CORRUPT_STACK()
121 pr_info("Corrupting stack containin in lkdtm_CORRUPT_STACK()
326 const unsigned char *stack = task_stack_page(current); lkdtm_STACK_GUARD_PAGE_LEADING() local
340 const unsigned char *stack = task_stack_page(current); lkdtm_STACK_GUARD_PAGE_TRAILING() local
[all...]
/kernel/uniproton/src/arch/cpu/armv7-m/cortex-m4/
H A Dprt_vector.S98 LDR R0, =g_stackEnd @top of stack
99 LDR R1, =g_stackStart @bottom of stack
101 CMP R0, #4 @stack length <4?
104 LOOP1: @the condition of stack length >=4
114 LOOP2: @the condition of stack length <4
164 @* code for defining the stack and heap memory locations.
/kernel/liteos_a/testsuites/unittest/container/smoke/
H A DIt_ipc_container_004.cpp77 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in childFunc() local
78 if (stack == nullptr) { in childFunc()
81 char *stackTop = stack + STACK_SIZE; in childFunc()
159 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItIpcContainer004() local
160 ASSERT_NE(stack, nullptr); in ItIpcContainer004()
161 char *stackTop = stack + STACK_SIZE; in ItIpcContainer004()
H A DIt_pid_container_025.cpp45 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItPidContainer025() local
46 ASSERT_NE(stack, nullptr); in ItPidContainer025()
47 char *stackTop = stack + STACK_SIZE; in ItPidContainer025()
H A DIt_time_container_001.cpp49 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItTimeContainer001() local
50 ASSERT_NE(stack, nullptr); in ItTimeContainer001()
51 char *stackTop = stack + STACK_SIZE; in ItTimeContainer001()
H A DIt_pid_container_026.cpp46 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItPidContainer026() local
47 ASSERT_NE(stack, nullptr); in ItPidContainer026()
48 char *stackTop = stack + STACK_SIZE; in ItPidContainer026()
H A DIt_time_container_010.cpp48 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItTimeContainer010() local
49 ASSERT_NE(stack, nullptr); in ItTimeContainer010()
50 char *stackTop = stack + STACK_SIZE; in ItTimeContainer010()
/third_party/skia/third_party/externals/spirv-tools/source/val/
H A Dconstruct.cpp88 std::vector<BasicBlock*> stack; in blocks() local
89 stack.push_back(const_cast<BasicBlock*>(header)); in blocks()
90 while (!stack.empty()) { in blocks()
91 BasicBlock* block = stack.back(); in blocks()
92 stack.pop_back(); in blocks()
127 stack.push_back(succ); in blocks()
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/val/
H A Dconstruct.cpp88 std::vector<BasicBlock*> stack; in blocks() local
89 stack.push_back(const_cast<BasicBlock*>(header)); in blocks()
90 while (!stack.empty()) { in blocks()
91 BasicBlock* block = stack.back(); in blocks()
92 stack.pop_back(); in blocks()
127 stack.push_back(succ); in blocks()
/third_party/python/Lib/test/
H A Dtest_code_module.py21 # use exit stack to match patch context managers to addCleanup
22 stack = ExitStack()
23 self.addCleanup(stack.close)
24 self.infunc = stack.enter_context(mock.patch('code.input',
26 self.stdout = stack.enter_context(mock.patch('code.sys.stdout'))
27 self.stderr = stack.enter_context(mock.patch('code.sys.stderr'))
29 self.sysmod = stack.enter_context(prepatch)
/third_party/spirv-tools/source/val/
H A Dconstruct.cpp82 std::vector<BasicBlock*> stack; in blocks() local
83 stack.push_back(const_cast<BasicBlock*>(header)); in blocks()
85 while (!stack.empty()) { in blocks()
86 auto* block = stack.back(); in blocks()
87 stack.pop_back(); in blocks()
111 stack.push_back(succ); in blocks()
/kernel/linux/linux-5.10/mm/
H A Dusercopy.c26 * stack frame (if possible).
29 * NOT_STACK: not at all on the stack
30 * GOOD_FRAME: fully within a valid stack frame
31 * GOOD_STACK: fully on the stack (when can't do frame-checking)
32 * BAD_STACK: error condition (invalid stack position or bad stack frame)
36 const void * const stack = task_stack_page(current); in check_stack_object() local
37 const void * const stackend = stack + THREAD_SIZE; in check_stack_object()
40 /* Object is not on the stack at all. */ in check_stack_object()
41 if (obj + len <= stack || stacken in check_stack_object()
[all...]
/kernel/linux/linux-6.6/mm/
H A Dusercopy.c29 * stack frame (if possible).
32 * NOT_STACK: not at all on the stack
33 * GOOD_FRAME: fully within a valid stack frame
34 * GOOD_STACK: within the current stack (when can't frame-check exactly)
35 * BAD_STACK: error condition (invalid stack position or bad stack frame)
39 const void * const stack = task_stack_page(current); in check_stack_object() local
40 const void * const stackend = stack + THREAD_SIZE; in check_stack_object()
43 /* Object is not on the stack at all. */ in check_stack_object()
44 if (obj + len <= stack || stacken in check_stack_object()
[all...]
/kernel/linux/linux-6.6/sound/soc/sof/amd/
H A Dacp-common.c53 * linenumber and stack.
57 * @stack: Stores the stack dump.
58 * @stack_words: Size of the stack dump.
63 u32 *stack, size_t stack_words) in amd_get_registers()
80 /* then get the stack */ in amd_get_registers()
82 acp_mailbox_read(sdev, offset, stack, stack_words * sizeof(u32)); in amd_get_registers()
95 u32 stack[AMD_STACK_DUMP_SIZE]; in amd_sof_dump() local
113 * number and the stack. in amd_sof_dump()
115 amd_get_registers(sdev, &xoops, &panic_info, stack, AMD_STACK_DUMP_SIZ in amd_sof_dump()
60 amd_get_registers(struct snd_sof_dev *sdev, struct sof_ipc_dsp_oops_xtensa *xoops, struct sof_ipc_panic_info *panic_info, u32 *stack, size_t stack_words) amd_get_registers() argument
[all...]
/kernel/linux/linux-5.10/arch/arm/kernel/
H A Dentry-header.S22 @ Most of the stack format comes from struct pt_regs, but with
29 * The SWI code relies on the fact that R0 is at the bottom of the stack
63 * automatically saved on the current stack (32 words) before
64 * switching to the exception stack (SP_main).
80 @ exception happend that is either on the main or the process stack.
81 @ Bit 2 of EXC_RETURN stored in the lr register specifies which stack
92 @ Linux expects to have irqs off. Do it here before taking stack space
104 @ calculate the original stack pointer value.
107 @ The cpu might automatically 8-byte align the stack. Bit 9
108 @ of the saved xPSR specifies if stack alignin
[all...]
/kernel/linux/linux-5.10/drivers/net/wireguard/
H A Dallowedips.c41 static void push_rcu(struct allowedips_node **stack, in push_rcu() argument
47 stack[(*len)++] = rcu_dereference_raw(p); in push_rcu()
58 struct allowedips_node *node, *stack[MAX_ALLOWEDIPS_DEPTH] = { in root_free_rcu() local
62 while (len > 0 && (node = stack[--len])) { in root_free_rcu()
63 push_rcu(stack, node->bit[0], &len); in root_free_rcu()
64 push_rcu(stack, node->bit[1], &len); in root_free_rcu()
71 struct allowedips_node *node, *stack[MAX_ALLOWEDIPS_DEPTH] = { root }; in root_remove_peer_lists() local
74 while (len > 0 && (node = stack[--len])) { in root_remove_peer_lists()
75 push_rcu(stack, node->bit[0], &len); in root_remove_peer_lists()
76 push_rcu(stack, nod in root_remove_peer_lists()
[all...]
/kernel/linux/linux-6.6/drivers/misc/lkdtm/
H A Dbugs.c25 * Make sure our attempts to over run the kernel stack doesn't trigger
41 * Make sure compiler does not optimize this function or stack frame away:
43 * - stack variables are marked volatile
44 * - stack variables are written (memset()) and read (buf[..] passed as arg)
109 pr_info("FAIL: survived without exhausting stack?!\n"); in lkdtm_EXHAUST_STACK()
112 static noinline void __lkdtm_CORRUPT_STACK(void *stack) in __lkdtm_CORRUPT_STACK() argument
114 memset(stack, '\xff', 64); in __lkdtm_CORRUPT_STACK()
117 /* This should trip the stack canary, not corrupt the return address. */
120 /* Use default char array length that triggers stack protection. */ in lkdtm_CORRUPT_STACK()
123 pr_info("Corrupting stack containin in lkdtm_CORRUPT_STACK()
160 __lkdtm_REPORT_STACK_CANARY(void *stack) __lkdtm_REPORT_STACK_CANARY() argument
470 const unsigned char *stack = task_stack_page(current); lkdtm_STACK_GUARD_PAGE_LEADING() local
484 const unsigned char *stack = task_stack_page(current); lkdtm_STACK_GUARD_PAGE_TRAILING() local
[all...]

Completed in 18 milliseconds

1...<<11121314151617181920>>...124