/bionic/libfdtrack/ |
D | fdtrack.cpp | 253 auto& stack = stacks->data[stacks->count++]; in fdtrack_dump_impl() local 254 stack.hash = hash; in fdtrack_dump_impl() 255 stack.count = 1; in fdtrack_dump_impl() 256 stack.stack_depth = stack_depth; in fdtrack_dump_impl() 258 stack.function_names[i] = function_names[i]; in fdtrack_dump_impl() 259 stack.function_offsets[i] = function_offsets[i]; in fdtrack_dump_impl() 272 StackInfo* stack = nullptr; in fdtrack_dump_impl() local 275 stack = &stacks.data[i]; in fdtrack_dump_impl() 276 max = stack->count; in fdtrack_dump_impl() 282 if (!stack) { in fdtrack_dump_impl() [all …]
|
/bionic/libc/arch-arm/bionic/ |
D | __bionic_clone.S | 34 # save registers to parent stack 45 # Push 'fn' and 'arg' onto the child stack.
|
/bionic/libc/arch-riscv64/bionic/ |
D | __bionic_clone.S | 34 # Push 'fn' and 'arg' onto the child stack. 61 # Call __start_thread with the 'fn' and 'arg' we stored on the child stack.
|
/bionic/libc/bionic/ |
D | libc_init_static.cpp | 162 const ElfW(Addr) load_bias, bool* stack) { in __get_memtag_level_from_note() argument 179 *stack = (note_val & NT_MEMTAG_STACK) != 0; in __get_memtag_level_from_note() 259 uintptr_t load_bias, bool* stack) { in __get_tagging_level() argument 284 *stack = memtag_dynamic_entries->memtag_stack; in __get_tagging_level() 287 load_bias, stack); in __get_tagging_level() 294 *stack = false; in __get_tagging_level()
|
/bionic/libc/arch-common/bionic/ |
D | crtend.S | 37 .section .note.GNU-stack, "", %progbits
|
D | crtend_so.S | 35 .section .note.GNU-stack, "", %progbits
|
/bionic/libc/arch-arm64/bionic/ |
D | __bionic_clone.S | 34 # Push 'fn' and 'arg' onto the child stack.
|
/bionic/libc/arch-x86_64/bionic/ |
D | __bionic_clone.S | 33 # Copy 'fn' and 'arg' onto the child stack.
|
/bionic/linker/ |
D | Android.bp | 40 "-fno-stack-protector", 87 "-fno-stack-protector", 98 "-fno-stack-protector", 295 // Leave the symbols in the shared library so that stack unwinders can produce 304 // Leave the symbols in the shared library so that stack unwinders can produce 313 // Leave the symbols in the shared library so that stack unwinders can produce 322 // Leave the symbols in the shared library so that stack unwinders can produce
|
/bionic/libc/kernel/uapi/linux/ |
D | sched.h | 45 __aligned_u64 stack; member
|
/bionic/libc/arch-x86/bionic/ |
D | __bionic_clone.S | 22 # Copy 'fn' and 'arg' onto the child stack
|
/bionic/libc/malloc_hooks/ |
D | Android.bp | 43 "-fno-stack-protector",
|
/bionic/libc/malloc_debug/ |
D | Android.bp | 106 "-fno-stack-protector",
|
D | README.md | 780 something like the <code>ndk-stack</code> tool.
|
/bionic/libc/ |
D | Android.bp | 158 // libc_bootstrap.a - -fno-stack-protector and -ffreestanding 161 // Code that implements the stack protector (or that runs before TLS has been set up) needs to be 162 // compiled with -fno-stack-protector, since it accesses the stack canary TLS slot. In the linker, 195 "-fno-stack-protector", 206 // libc_init_static.cpp and libc_init_dynamic.cpp need to be built without stack protector. 208 // the stack protector global variable. 218 "-fno-stack-protector", 230 cflags: ["-fno-stack-protector"], 252 // Don't use ridiculous amounts of stack. 1404 "-fno-stack-protector", [all …]
|
D | SYSCALLS.TXT | 22 # socketcall(__NR_socket, 1, *(rest of args on stack)).
|
/bionic/tests/ |
D | pthread_test.cpp | 170 void* stack = mmap(nullptr, stack_size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0); in TEST() local 171 ASSERT_NE(MAP_FAILED, stack); in TEST() 172 memset(stack, 0xff, stack_size); in TEST() 176 ASSERT_EQ(0, pthread_attr_setstack(&attr, stack, stack_size)); in TEST() 185 ASSERT_EQ(0, munmap(stack, stack_size)); in TEST() 199 std::unique_ptr<char[]> stack(new (std::align_val_t(getpagesize())) char[stack_size]); in TEST() local 200 memset(stack.get(), '\xff', stack_size); in TEST() 204 ASSERT_EQ(0, pthread_attr_setstack(&attr, stack.get(), stack_size)); in TEST() 736 void* stack = mmap(nullptr, stack_size, PROT_READ|PROT_WRITE, MAP_ANON|MAP_PRIVATE, -1, 0); in TEST() local 740 pthread_attr_setstack(&a, stack, stack_size); in TEST() [all …]
|
D | Android.bp | 72 // Ensure that the tests exercise shadow call stack support. 78 cflags: ["-fsanitize=shadow-call-stack"], 81 cflags: ["-fsanitize=shadow-call-stack"],
|
/bionic/docs/ |
D | libc_assembler.md | 156 verify that when registers are pushed on the stack that there is cfi
|
D | status.md | 104 * New helper to allow the zygote to give each zygote child its own stack 358 along with its stack, so the dereference isn't safe.
|
D | elf-tls.md | 519 region, along with a thread's stack if it needs one allocated. It doesn't place TLS memory on a 520 preallocated stack (either the main thread's stack or one provided with `pthread_attr_setstack`). 753 * We would reserve at least 6 words to cover the stack guard
|
/bionic/ |
D | android-changes-for-ndk-developers.md | 11 for details about changes in stack unwinding (crash dumps) between
|