Home
last modified time | relevance | path

Searched refs:stack (Results 1 – 22 of 22) sorted by relevance

/bionic/libfdtrack/
Dfdtrack.cpp253 auto& stack = stacks->data[stacks->count++]; in fdtrack_dump_impl() local
254 stack.hash = hash; in fdtrack_dump_impl()
255 stack.count = 1; in fdtrack_dump_impl()
256 stack.stack_depth = stack_depth; in fdtrack_dump_impl()
258 stack.function_names[i] = function_names[i]; in fdtrack_dump_impl()
259 stack.function_offsets[i] = function_offsets[i]; in fdtrack_dump_impl()
272 StackInfo* stack = nullptr; in fdtrack_dump_impl() local
275 stack = &stacks.data[i]; in fdtrack_dump_impl()
276 max = stack->count; in fdtrack_dump_impl()
282 if (!stack) { in fdtrack_dump_impl()
[all …]
/bionic/libc/arch-arm/bionic/
D__bionic_clone.S34 # save registers to parent stack
45 # Push 'fn' and 'arg' onto the child stack.
/bionic/libc/arch-riscv64/bionic/
D__bionic_clone.S34 # Push 'fn' and 'arg' onto the child stack.
61 # Call __start_thread with the 'fn' and 'arg' we stored on the child stack.
/bionic/libc/bionic/
Dlibc_init_static.cpp162 const ElfW(Addr) load_bias, bool* stack) { in __get_memtag_level_from_note() argument
179 *stack = (note_val & NT_MEMTAG_STACK) != 0; in __get_memtag_level_from_note()
259 uintptr_t load_bias, bool* stack) { in __get_tagging_level() argument
284 *stack = memtag_dynamic_entries->memtag_stack; in __get_tagging_level()
287 load_bias, stack); in __get_tagging_level()
294 *stack = false; in __get_tagging_level()
/bionic/libc/arch-common/bionic/
Dcrtend.S37 .section .note.GNU-stack, "", %progbits
Dcrtend_so.S35 .section .note.GNU-stack, "", %progbits
/bionic/libc/arch-arm64/bionic/
D__bionic_clone.S34 # Push 'fn' and 'arg' onto the child stack.
/bionic/libc/arch-x86_64/bionic/
D__bionic_clone.S33 # Copy 'fn' and 'arg' onto the child stack.
/bionic/linker/
DAndroid.bp40 "-fno-stack-protector",
87 "-fno-stack-protector",
98 "-fno-stack-protector",
295 // Leave the symbols in the shared library so that stack unwinders can produce
304 // Leave the symbols in the shared library so that stack unwinders can produce
313 // Leave the symbols in the shared library so that stack unwinders can produce
322 // Leave the symbols in the shared library so that stack unwinders can produce
/bionic/libc/kernel/uapi/linux/
Dsched.h45 __aligned_u64 stack; member
/bionic/libc/arch-x86/bionic/
D__bionic_clone.S22 # Copy 'fn' and 'arg' onto the child stack
/bionic/libc/malloc_hooks/
DAndroid.bp43 "-fno-stack-protector",
/bionic/libc/malloc_debug/
DAndroid.bp106 "-fno-stack-protector",
DREADME.md780 something like the <code>ndk-stack</code> tool.
/bionic/libc/
DAndroid.bp158 // libc_bootstrap.a - -fno-stack-protector and -ffreestanding
161 // Code that implements the stack protector (or that runs before TLS has been set up) needs to be
162 // compiled with -fno-stack-protector, since it accesses the stack canary TLS slot. In the linker,
195 "-fno-stack-protector",
206 // libc_init_static.cpp and libc_init_dynamic.cpp need to be built without stack protector.
208 // the stack protector global variable.
218 "-fno-stack-protector",
230 cflags: ["-fno-stack-protector"],
252 // Don't use ridiculous amounts of stack.
1404 "-fno-stack-protector",
[all …]
DSYSCALLS.TXT22 # socketcall(__NR_socket, 1, *(rest of args on stack)).
/bionic/tests/
Dpthread_test.cpp170 void* stack = mmap(nullptr, stack_size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0); in TEST() local
171 ASSERT_NE(MAP_FAILED, stack); in TEST()
172 memset(stack, 0xff, stack_size); in TEST()
176 ASSERT_EQ(0, pthread_attr_setstack(&attr, stack, stack_size)); in TEST()
185 ASSERT_EQ(0, munmap(stack, stack_size)); in TEST()
199 std::unique_ptr<char[]> stack(new (std::align_val_t(getpagesize())) char[stack_size]); in TEST() local
200 memset(stack.get(), '\xff', stack_size); in TEST()
204 ASSERT_EQ(0, pthread_attr_setstack(&attr, stack.get(), stack_size)); in TEST()
736 void* stack = mmap(nullptr, stack_size, PROT_READ|PROT_WRITE, MAP_ANON|MAP_PRIVATE, -1, 0); in TEST() local
740 pthread_attr_setstack(&a, stack, stack_size); in TEST()
[all …]
DAndroid.bp72 // Ensure that the tests exercise shadow call stack support.
78 cflags: ["-fsanitize=shadow-call-stack"],
81 cflags: ["-fsanitize=shadow-call-stack"],
/bionic/docs/
Dlibc_assembler.md156 verify that when registers are pushed on the stack that there is cfi
Dstatus.md104 * New helper to allow the zygote to give each zygote child its own stack
358 along with its stack, so the dereference isn't safe.
Delf-tls.md519 region, along with a thread's stack if it needs one allocated. It doesn't place TLS memory on a
520 preallocated stack (either the main thread's stack or one provided with `pthread_attr_setstack`).
753 * We would reserve at least 6 words to cover the stack guard
/bionic/
Dandroid-changes-for-ndk-developers.md11 for details about changes in stack unwinding (crash dumps) between