Home
last modified time | relevance | path

Searched refs:stack (Results 1 – 25 of 53) sorted by relevance

123

/bionic/libfdtrack/
Dfdtrack.cpp242 auto& stack = stacks->data[stacks->count++]; in fdtrack_dump_impl() local
243 stack.hash = hash; in fdtrack_dump_impl()
244 stack.count = 1; in fdtrack_dump_impl()
245 stack.stack_depth = stack_depth; in fdtrack_dump_impl()
247 stack.function_names[i] = function_names[i]; in fdtrack_dump_impl()
248 stack.function_offsets[i] = function_offsets[i]; in fdtrack_dump_impl()
261 StackInfo* stack = nullptr; in fdtrack_dump_impl() local
264 stack = &stacks.data[i]; in fdtrack_dump_impl()
265 max = stack->count; in fdtrack_dump_impl()
271 if (!stack) { in fdtrack_dump_impl()
[all …]
/bionic/libc/arch-arm/bionic/
D__bionic_clone.S34 # save registers to parent stack
45 # Push 'fn' and 'arg' onto the child stack.
/bionic/libc/arch-common/bionic/
Dcrtend_so.S36 .section .note.GNU-stack,"",%progbits
Dcrtend.S50 .section .note.GNU-stack,"",%progbits
/bionic/libc/arch-arm64/bionic/
D__bionic_clone.S34 # Push 'fn' and 'arg' onto the child stack.
/bionic/libc/arch-x86_64/bionic/
D__bionic_clone.S33 # Copy 'fn' and 'arg' onto the child stack.
/bionic/libc/kernel/uapi/linux/
Dsched.h57 __aligned_u64 stack; member
/bionic/libc/malloc_hooks/
DAndroid.bp42 "-fno-stack-protector",
/bionic/libc/arch-x86/bionic/
D__bionic_clone.S22 # Copy 'fn' and 'arg' onto the child stack
/bionic/linker/
DAndroid.bp44 "-fno-stack-protector",
93 "-fno-stack-protector",
104 "-fno-stack-protector",
288 // Leave the symbols in the shared library so that stack unwinders can produce
/bionic/libc/malloc_debug/
DAndroid.bp108 "-fno-stack-protector",
/bionic/libm/x86_64/
De_hypot.S194 .section .note.GNU-stack, "",@progbits
De_log10.S787 .section .note.GNU-stack, "",@progbits
Ds_atan.S907 .section .note.GNU-stack, "",@progbits
Ds_cbrt.S734 .section .note.GNU-stack, "",@progbits
/bionic/libm/x86/
De_hypot.S219 .section .note.GNU-stack, "",@progbits
Ds_cos.S891 .section .note.GNU-stack, "",@progbits
Ds_sin.S906 .section .note.GNU-stack, "",@progbits
Ds_cbrt.S737 .section .note.GNU-stack, "",@progbits
De_log10.S794 .section .note.GNU-stack, "",@progbits
Ds_tan.S1765 .section .note.GNU-stack, "",@progbits
Ds_atan.S933 .section .note.GNU-stack, "",@progbits
Ds_log1p.S826 .section .note.GNU-stack, "",@progbits
Ds_tanh.S1360 .section .note.GNU-stack, "",@progbits
/bionic/libc/
DAndroid.bp170 // libc_bootstrap.a - -fno-stack-protector and -ffreestanding
173 // Code that implements the stack protector (or that runs before TLS has been set up) needs to be
174 // compiled with -fno-stack-protector, since it accesses the stack canary TLS slot. In the linker,
203 cflags: ["-fno-stack-protector", "-ffreestanding"],
207 // libc_init_static.cpp and libc_init_dynamic.cpp need to be built without stack protector.
209 // the stack protector global variable.
216 "-fno-stack-protector",
228 cflags: ["-fno-stack-protector"],
246 // Don't use ridiculous amounts of stack.
1518 "-fno-stack-protector",
[all …]

123