| /src/sys/arch/ia64/stand/ia64/ski/ |
| start.S | 44 add r2=@gprel(stack),gp 64 stack: .skip STACKSIZE label
|
| /src/sys/external/bsd/compiler_rt/dist/lib/ubsan/ |
| ubsan_diag_standalone.cc | 31 BufferedStackTrace stack; local 32 stack.Unwind(kStackTraceMax, pc, bp, nullptr, top, bottom, 34 stack.Print();
|
| /src/sys/ddb/ |
| db_lwp.c | 66 uintptr_t stack; local 71 stack = (uintptr_t)KSTACK_LOWEST_ADDR((&l)); 72 if (addr < stack || stack + KSTACK_SIZE <= addr) { 75 (*pr)("%p is %p+%zu, LWP %p's stack\n", 76 (void *)addr, (void *)stack, 77 (size_t)(addr - stack), lp);
|
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/tests/unit/ |
| tsan_stack_test.cc | 23 uptr stack[128]; local 24 thr.shadow_stack = &stack[0]; 25 thr.shadow_stack_pos = &stack[0]; 26 thr.shadow_stack_end = &stack[128]; 53 uptr stack[kShadowStackSize]; local 54 thr.shadow_stack = &stack[0]; 55 thr.shadow_stack_pos = &stack[0]; 56 thr.shadow_stack_end = &stack[kShadowStackSize];
|
| tsan_shadow_test.cc | 51 int stack; local 56 CHECK(IsAppMem((uptr)&stack)); 60 CHECK(IsShadowMem(MemToShadow((uptr)&stack)));
|
| /src/lib/libexecinfo/ |
| builtin.c | 58 void *stack = &stack; local 61 if ((const void *)frame BELOW stack)
|
| /src/sys/external/bsd/compiler_rt/dist/lib/asan/tests/ |
| asan_benchmarks_test.cc | 73 int stack[1000]; local 74 Ident(stack);
|
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvif/ |
| nouveau_nvif_mem.c | 56 u8 stack[128]; local 63 if (sizeof(*args) + argc > sizeof(stack)) { 67 args = (void *)stack; 84 if (args != (void *)stack)
|
| nouveau_nvif_vmm.c | 45 u8 stack[48]; local 48 if (sizeof(*args) + argc > sizeof(stack)) { 52 args = (void *)stack; 64 if (args != (void *)stack)
|
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
| sanitizer_allocator_report.cc | 27 stack(stack_) { 32 stack->Print(); 34 ReportErrorSummary(error_summary, stack); 40 const StackTrace* const stack; member in class:__sanitizer::ScopedAllocatorErrorReport 45 const StackTrace *stack) { 47 ScopedAllocatorErrorReport report("calloc-overflow", stack); 55 void NORETURN ReportPvallocOverflow(uptr size, const StackTrace *stack) { 57 ScopedAllocatorErrorReport report("pvalloc-overflow", stack); 66 const StackTrace *stack) { 68 ScopedAllocatorErrorReport report("invalid-allocation-alignment", stack); [all...] |
| sanitizer_symbolizer_markup.cc | 64 // to render stack frames, but that should be changed to use 107 BufferedStackTrace *stack; member in struct:__sanitizer::UnwindTraceArg 113 CHECK_LT(arg->stack->size, arg->max_depth); 116 arg->stack->trace_buffer[arg->stack->size++] = pc; 117 return (arg->stack->size == arg->max_depth ? _URC_NORMAL_STOP 130 // unless there is only 1 frame in the stack trace (1 frame is always better
|
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
| sanitizer_stackdepot_test.cc | 24 StackTrace stack = StackDepotGet(i1); local 25 EXPECT_NE(stack.trace, (uptr*)0); 26 EXPECT_EQ(ARRAY_SIZE(array), stack.size); 27 EXPECT_EQ(0, internal_memcmp(stack.trace, array, sizeof(array))); 31 StackTrace stack = StackDepotGet((1 << 30) - 1); local 32 EXPECT_EQ((uptr*)0, stack.trace); 37 StackTrace stack = StackDepotGet(i1); local 38 EXPECT_EQ((uptr*)0, stack.trace); 42 StackTrace stack = StackDepotGet(0); local 43 EXPECT_EQ((uptr*)0, stack.trace) 52 StackTrace stack = StackDepotGet(i1); local 86 StackTrace stack = StackDepotGet(ids[i]); local [all...] |
| /src/sys/external/bsd/drm2/dist/drm/i915/selftests/ |
| i915_random.c | 53 char stack[128]; local 55 if (WARN_ON(elsz > sizeof(stack) || count > U32_MAX)) 69 memcpy(stack, arr + count * elsz, elsz); 71 memcpy(arr + swp * elsz, stack, elsz);
|
| /src/tests/lib/libc/sys/ |
| t_lwp_create.c | 108 void *stack; local 111 stack = malloc(ssize); 112 _lwp_makecontext(&uc, lwp_main_func, NULL, NULL, stack, ssize); 134 void *stack; local 137 stack = malloc(ssize); 138 _lwp_makecontext(&uc, lwp_main_func, NULL, NULL, stack, ssize);
|
| t_swapcontext.c | 40 char stack[STACKSIZE]; variable 81 nctx.uc_stack.ss_sp = stack; 82 nctx.uc_stack.ss_size = sizeof(stack);
|
| t_clone.c | 60 void *stack = mmap(NULL, STACKSIZE, PROT_READ|PROT_WRITE, local 62 ATF_REQUIRE_ERRNO(errno, stack != MAP_FAILED); 64 stack = (char *)stack + STACKSIZE; 66 return stack; 70 putstack(void *stack) 73 stack = (char *)stack - STACKSIZE; 75 ATF_REQUIRE_ERRNO(errno, munmap(stack, STACKSIZE) != -1); 90 printf("child: stack ~= %p, frobme = %p\n", &frobp, frobp) 119 void *stack = getstack(); local 205 void *stack = getstack(); local 230 char *stack = getstack(); local [all...] |
| t_fork.c | 280 void *stack, *stack_base; local 282 stack = malloc(stack_size); 283 ATF_REQUIRE(stack != NULL); 286 stack_base = stack; 288 stack_base = (char *)stack + stack_size;
|
| /src/tests/lib/libpthread/ |
| t_swapcontext.c | 45 char stack[STACKSIZE]; variable 70 nctx.uc_stack.ss_sp = stack; 71 nctx.uc_stack.ss_size = sizeof(stack);
|
| /src/tests/usr.bin/xlint/lint1/ |
| d_typefun.c | 21 _STACK stack; member in struct:stack_st_OPENSSL_BLOCK
|
| /src/sys/external/bsd/sljit/dist/sljit_src/ |
| sljitUtils.c | 4 * Stack-less Just-In-Time compiler 188 /* Stack */ 251 struct sljit_stack *stack; local 280 stack = (struct sljit_stack*)SLJIT_MALLOC(sizeof(struct sljit_stack), allocator_data); 281 if (!stack) 290 SLJIT_FREE(stack, allocator_data); 293 stack->max_limit = (sljit_u8 *)ptr; 294 stack->base = stack->max_limit + max_limit; 295 stack->limit = stack->base [all...] |
| /src/common/lib/libprop/ |
| prop_object.c | 119 * free that. Do not recurse to avoid stack overflows. 184 struct _prop_stack stack; local 189 _prop_stack_init(&stack); 213 ret = (po->po_type->pot_free)(&stack, &obj); 225 } while (_prop_stack_pop(&stack, &obj, NULL, NULL, NULL)); 261 struct _prop_stack stack; local 264 _prop_stack_init(&stack); 284 if (!_prop_stack_pop(&stack, &obj1, &obj2, 293 if (!_prop_stack_push(&stack, obj1, obj2, 304 while (_prop_stack_pop(&stack, &obj1, &obj2, NULL, NULL)) [all...] |
| /src/sys/arch/i386/stand/mbr/ |
| gptmbr.S | 52 stack = 0x7c00 define 55 phdr = stack /* Above the stack, overwritten by bootsect */ 79 movw $stack, %sp 125 pushw %cx /* -2(%bp) Save sectors on the stack */ 130 /* Save sectors/cylinder on the stack */ 230 * partition information in memory. The top word on the stack
|
| /src/sys/dev/wscons/ |
| wskbdutil.c | 494 const struct wscons_keydesc *mp, *stack[10]; local 507 if (stack_ptr == __arraycount(stack)) 513 stack[stack_ptr] = mp; 518 mp = stack[s]; 527 mp = stack[s];
|
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/dd/ |
| dd_rtl.cc | 23 BufferedStackTrace stack; local 25 stack.Unwind(1000, 0, 0, 0, 0, 0, false); 27 if (stack.size <= skip) 29 return StackDepotPut(StackTrace(stack.trace + skip, stack.size - skip)); 33 StackTrace stack = StackDepotGet(stk); local 35 stack.Print();
|
| /src/sys/lib/libunwind/ |
| DwarfInstructions.hpp | 153 // The CFA is defined as the stack pointer at the call site. 175 pint_t stack[100]; local 176 pint_t *sp = stack; 193 // pop stack, dereference, push result 267 // push top of stack 307 // pop stack, dereference, push result 363 // pop stack, add uelb128 constant, push result 552 // pop stack, dereference, push result
|