/foundation/arkui/ace_engine/frameworks/bridge/declarative_frontend/jsview/models/ |
H A D | text_timer_model_impl.cpp | 109 auto* stack = ViewStackProcessor::GetInstance(); in GetComponent() local 110 if (!stack) { in GetComponent() 113 auto component = AceType::DynamicCast<TextTimerComponent>(stack->GetMainComponent()); in GetComponent()
|
/foundation/arkui/ace_engine/test/unittest/core/base/ |
H A D | view_abstract_test_ng.h | 108 auto* stack = ViewStackProcessor::GetInstance(); variable 109 auto nodeId = stack->ClaimNodeId(); 112 stack->Push(frameNode);
|
/foundation/arkui/ace_engine/frameworks/core/components_ng/pattern/text/ |
H A D | symbol_span_model_ng.cpp | 37 auto* stack = ViewStackProcessor::GetInstance(); in Create() local 38 auto nodeId = stack->ClaimNodeId(); in Create() 41 stack->Push(spanNode); in Create()
|
/foundation/arkui/ace_engine/frameworks/core/components_ng/pattern/qrcode/ |
H A D | qrcode_model_ng.cpp | 30 auto* stack = ViewStackProcessor::GetInstance(); in Create() local 31 int32_t nodeId = (stack == nullptr ? 0 : stack->ClaimNodeId()); in Create()
|
/foundation/arkui/ace_engine/frameworks/core/components_ng/pattern/stepper/ |
H A D | stepper_model_ng.cpp | 25 auto* stack = ViewStackProcessor::GetInstance(); in Create() local 26 auto nodeId = stack->ClaimNodeId(); in Create() 30 stack->Push(stepperNode); in Create()
|
/foundation/arkui/ace_engine/frameworks/core/components_ng/pattern/symbol/ |
H A D | symbol_model_ng.cpp | 24 auto* stack = ViewStackProcessor::GetInstance(); in Create() local 25 auto nodeId = stack->ClaimNodeId(); in Create() 29 stack->Push(symbolNode); in Create()
|
/foundation/graphic/graphic_2d/rosen/modules/render_service_base/include/transaction/ |
H A D | rs_transaction_proxy.h | 21 #include <stack> 94 std::stack<std::unique_ptr<RSTransactionData>> implicitCommonTransactionDataStack_; 95 std::stack<std::unique_ptr<RSTransactionData>> implicitRemoteTransactionDataStack_;
|
/kernel/linux/linux-5.10/arch/sh/kernel/ |
H A D | dumpstack.c | 143 unsigned long stack; in show_stack() local 152 stack = (unsigned long)sp; in show_stack() 153 dump_mem("Stack: ", loglvl, stack, THREAD_SIZE + in show_stack()
|
/kernel/linux/linux-5.10/arch/x86/kernel/ |
H A D | irq_32.c | 30 /* Debugging check for stack overflow: is there less than 1KB free? */ 43 printk(KERN_WARNING "low stack detected by irq handler\n"); in print_stack_overflow() 46 panic("low stack detected by irq handler - check messages\n"); in print_stack_overflow() 57 static void call_on_stack(void *func, void *stack) in call_on_stack() argument 62 : "=b" (stack) in call_on_stack() 63 : "0" (stack), in call_on_stack() 82 * this is where we switch to the IRQ stack. However, if we are in execute_on_irq_stack() 83 * already using the IRQ stack (because we interrupted a hardirq in execute_on_irq_stack() 85 * current stack (which is the irq stack alread in execute_on_irq_stack() [all...] |
/kernel/linux/linux-5.10/arch/x86/mm/ |
H A D | Makefile | 25 CFLAGS_physaddr.o := -fno-stack-protector 26 CFLAGS_setup_nx.o := -fno-stack-protector 27 CFLAGS_mem_encrypt_identity.o := -fno-stack-protector
|
/kernel/linux/linux-6.6/arch/sh/kernel/ |
H A D | dumpstack.c | 143 unsigned long stack; in show_stack() local 152 stack = (unsigned long)sp; in show_stack() 153 dump_mem("Stack: ", loglvl, stack, THREAD_SIZE + in show_stack()
|
/kernel/linux/linux-5.10/samples/pidfd/ |
H A D | pidfd-metadata.c | 37 char *stack[1024] = { 0 }; in pidfd_clone() local 40 return __clone2(do_child, stack, stack_size, flags | SIGCHLD, NULL, pidfd); in pidfd_clone() 42 return clone(do_child, stack + stack_size, flags | SIGCHLD, NULL, pidfd); in pidfd_clone()
|
/kernel/linux/linux-5.10/tools/perf/scripts/python/ |
H A D | flamegraph.py | 44 self.stack = Node("root") 70 node = self.find_or_create_node(self.stack, event["comm"], None) 81 json_str = json.dumps(self.stack, default=lambda x: x.toJSON())
|
/kernel/linux/linux-6.6/arch/x86/kernel/ |
H A D | irq_32.c | 31 /* Debugging check for stack overflow: is there less than 1KB free? */ 44 printk(KERN_WARNING "low stack detected by irq handler\n"); in print_stack_overflow() 47 panic("low stack detected by irq handler - check messages\n"); in print_stack_overflow() 55 static void call_on_stack(void *func, void *stack) in call_on_stack() argument 60 : "=b" (stack) in call_on_stack() 61 : "0" (stack), in call_on_stack() 80 * this is where we switch to the IRQ stack. However, if we are in execute_on_irq_stack() 81 * already using the IRQ stack (because we interrupted a hardirq in execute_on_irq_stack() 83 * current stack (which is the irq stack alread in execute_on_irq_stack() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/x86/ |
H A D | syscall_arg_fault.c | 3 * syscall_arg_fault.c - tests faults 32-bit fast syscall stack args 103 stack_t stack = { in main() local 108 if (sigaltstack(&stack, NULL) != 0) in main() 114 * instead of #PF when the vDSO fails to access the stack when in main() 124 * number and six arguments, and the user stack pointer in main() 128 * ends up on the stack. The stack is user memory, which in main() 234 free(stack.ss_sp); in main()
|
/kernel/liteos_a/kernel/base/misc/ |
H A D | los_stackinfo.c | 88 UINTPTR *stack = NULL;
in OsExcStackInfo() local 94 PrintExcInfo("\n stack name cpu id stack addr total size used size\n"
in OsExcStackInfo() 100 stack = (UINTPTR *)((UINTPTR)stackTop + g_stackInfo[index].stackSize);
in OsExcStackInfo() 101 (VOID)OsStackWaterLineGet(stack, stackTop, &size);
in OsExcStackInfo() 119 /* initialize the task stack, write magic num to stack top */
in OsStackInit() 127 SHELLCMD_ENTRY(stack_shellcmd, CMD_TYPE_EX, "stack", 1, (CmdCallBackFunc)OsExcStackInfo);
|
/kernel/liteos_a/arch/arm/arm/src/ |
H A D | los_hw.c | 126 LITE_OS_SEC_TEXT_INIT VOID OsUserTaskStackInit(TaskContext *context, UINTPTR taskEntry, UINTPTR stack) in OsUserTaskStackInit() argument 135 context->R0 = stack; in OsUserTaskStackInit() 136 context->USP = TRUNCATE(stack, LOSCFG_STACK_POINT_ALIGN_SIZE); in OsUserTaskStackInit()
|
/kernel/linux/linux-6.6/samples/pidfd/ |
H A D | pidfd-metadata.c | 37 char *stack[1024] = { 0 }; in pidfd_clone() local 40 return __clone2(do_child, stack, stack_size, flags | SIGCHLD, NULL, pidfd); in pidfd_clone() 42 return clone(do_child, stack + stack_size, flags | SIGCHLD, NULL, pidfd); in pidfd_clone()
|
/kernel/liteos_a/testsuites/unittest/container/smoke/ |
H A D | It_ipc_container_002.cpp | 85 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS | MAP_STACK,
in ItIpcContainer002() local 87 ASSERT_NE(stack, nullptr);
in ItIpcContainer002() 88 char *stackTop = stack + STACK_SIZE;
in ItIpcContainer002()
|
H A D | It_ipc_container_001.cpp | 84 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS | MAP_STACK, in ItIpcContainer001() local 86 ASSERT_NE(stack, nullptr); in ItIpcContainer001() 87 char *stackTop = stack + STACK_SIZE; in ItIpcContainer001()
|
H A D | It_net_container_002.cpp | 119 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItNetContainer002() local 120 EXPECT_STRNE(stack, NULL); in ItNetContainer002() 121 char *stackTop = stack + STACK_SIZE; in ItNetContainer002()
|
H A D | It_net_container_001.cpp | 110 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in ItNetContainer001() local 111 EXPECT_STRNE(stack, NULL); in ItNetContainer001() 112 char *stackTop = stack + STACK_SIZE; in ItNetContainer001()
|
H A D | It_time_container_002.cpp | 109 char *stack = (char *)mmap(NULL, STACK_SIZE, PROT_READ | PROT_WRITE, CLONE_STACK_MMAP_FLAG, -1, 0); in TimeContainerUnshare() local 110 ASSERT_NE(stack, nullptr); in TimeContainerUnshare() 111 char *stackTop = stack + STACK_SIZE; in TimeContainerUnshare()
|
/third_party/jerryscript/jerry-core/ext/ |
H A D | tracker.c | 100 char* GetStacktraceString(ecma_string_t* stack) in GetStacktraceString() argument 102 if (stack == NULL) { in GetStacktraceString() 106 ECMA_STRING_TO_UTF8_STRING(stack, data, data_size); in GetStacktraceString()
|
/third_party/node/deps/v8/src/heap/base/ |
H A D | stack.cc | 5 #include "src/heap/base/stack.h" 30 // If the slot is part of a fake frame, then it is definitely on the stack. in IsOnStack() 36 // Fall through as there is still a regular stack present even when running in IsOnStack() 56 // "stack-use-after-scope" warnings. 58 // No TSAN support as the stack may not be exclusively owned by the current 66 // When using ASAN fake stack a pointer to the fake frame is kept on the in IterateAsanFakeFrameIfNecessary() 67 // native frame. In case |addr| points to a fake frame of the current stack in IterateAsanFakeFrameIfNecessary() 77 // of this stack. in IterateAsanFakeFrameIfNecessary() 116 // Called by the trampoline that pushes registers on the stack. This method 120 // No ASAN support as method accesses redzones while walking the stack 126 IteratePointersImpl(const Stack* stack, StackVisitor* visitor, intptr_t* stack_end) IteratePointersImpl() argument [all...] |