/src/usr.bin/dc/ |
stack.c | 1 /* $NetBSD: stack.c,v 1.2 2017/04/10 16:37:48 christos Exp $ */ 2 /* $OpenBSD: stack.c,v 1.14 2016/03/27 15:55:13 otto Exp $ */ 20 __RCSID("$NetBSD: stack.c,v 1.2 2017/04/10 16:37:48 christos Exp $"); 28 static __inline bool stack_empty(const struct stack *); 29 static void stack_grow(struct stack *); 38 stack_init(struct stack *stack) 40 stack->size = 0; 41 stack->sp = -1; 42 stack->stack = NULL [all...] |
extern.h | 42 /* stack.c */ 43 void stack_init(struct stack *); 46 void stack_swap(struct stack *); 47 size_t stack_size(const struct stack *); 48 void stack_dup(struct stack *); 49 void stack_pushnumber(struct stack *, struct number *); 50 void stack_pushstring(struct stack *stack, char *); 51 void stack_push(struct stack *, struct value *); 52 void stack_set_tos(struct stack *, struct value *) [all...] |
/src/usr.bin/make/unit-tests/ |
hanoi-include.exp | 1 Move the upper disk from stack A to stack C. 2 Move the upper disk from stack A to stack B. 3 Move the upper disk from stack C to stack B. 4 Move the upper disk from stack A to stack C. 5 Move the upper disk from stack B to stack A [all...] |
/src/lib/libc/sys/ |
Lint___clone.c | 12 __clone(int (*func)(void *), void *stack, int flags, void *arg)
|
Lint_clone.c | 13 clone(int (*func)(void *), void *stack, int flags, void *arg)
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_allocator_report.h | 24 const StackTrace *stack); 25 void NORETURN ReportPvallocOverflow(uptr size, const StackTrace *stack); 27 const StackTrace *stack); 29 const StackTrace *stack); 31 const StackTrace *stack); 33 const StackTrace *stack); 34 void NORETURN ReportOutOfMemory(uptr requested_size, const StackTrace *stack);
|
sanitizer_allocator_report.cc | 27 stack(stack_) { 32 stack->Print(); 34 ReportErrorSummary(error_summary, stack); 40 const StackTrace* const stack; member in class:__sanitizer::ScopedAllocatorErrorReport 45 const StackTrace *stack) { 47 ScopedAllocatorErrorReport report("calloc-overflow", stack); 55 void NORETURN ReportPvallocOverflow(uptr size, const StackTrace *stack) { 57 ScopedAllocatorErrorReport report("pvalloc-overflow", stack); 66 const StackTrace *stack) { 68 ScopedAllocatorErrorReport report("invalid-allocation-alignment", stack); [all...] |
/src/common/lib/libprop/ |
prop_stack.c | 36 _prop_stack_init(prop_stack_t stack) 38 stack->used_intern_elems = 0; 39 SLIST_INIT(&stack->extern_elems); 43 _prop_stack_push(prop_stack_t stack, prop_object_t obj, void *data1, 49 if (stack->used_intern_elems == PROP_STACK_INTERN_ELEMS) { 60 SLIST_INSERT_HEAD(&stack->extern_elems, eelem, stack_link); 65 _PROP_ASSERT(stack->used_intern_elems < PROP_STACK_INTERN_ELEMS); 66 _PROP_ASSERT(SLIST_EMPTY(&stack->extern_elems)); 68 ielem = &stack->intern_elems[stack->used_intern_elems] [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
asan_stack.h | 30 // Get the stack trace with the given pc and bp. 31 // The pc will be in the position 0 of the resulting stack trace. 34 void GetStackTrace(BufferedStackTrace *stack, uptr max_depth, uptr pc, uptr bp, 37 stack->Unwind(max_depth, pc, bp, context, 0, 0, fast); 40 stack->size = 0; 47 stack->Unwind(max_depth, pc, bp, context, stack_top, stack_bottom, 52 stack->Unwind(max_depth, pc, bp, context, 0, 0, false); 60 // NOTE: A Rule of thumb is to retrieve stack trace in the interceptors 62 // don't want stack trace to contain functions from ASan internals. 65 BufferedStackTrace stack; \ [all...] |
asan_suppressions.h | 25 bool IsStackTraceSuppressed(const StackTrace *stack);
|
asan_report.h | 45 // on the memory type (shadow/heap/stack/global). 61 void ReportMallocUsableSizeNotOwned(uptr addr, BufferedStackTrace *stack); 63 BufferedStackTrace *stack); 64 void ReportCallocOverflow(uptr count, uptr size, BufferedStackTrace *stack); 65 void ReportPvallocOverflow(uptr size, BufferedStackTrace *stack); 67 BufferedStackTrace *stack); 69 BufferedStackTrace *stack); 71 BufferedStackTrace *stack); 73 BufferedStackTrace *stack); 74 void ReportRssLimitExceeded(BufferedStackTrace *stack); [all...] |
asan_malloc_mac.cc | 31 void *p = asan_memalign(alignment, size, &stack, FROM_MALLOC) 34 void *p = asan_malloc(size, &stack) 37 void *p = asan_realloc(ptr, size, &stack); 40 void *p = asan_calloc(count, size, &stack); 43 int res = asan_posix_memalign(memptr, alignment, size, &stack); 46 void *p = asan_memalign(GetPageSizeCached(), size, &stack, FROM_MALLOC); 49 asan_free(ptr, &stack, FROM_MALLOC); 59 ReportMacMzReallocUnknown((uptr)ptr, (uptr)zone_ptr, zone_name, &stack);
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_scalarmult/curve25519/sandy2x/ |
sandy2x.S | 14 .section .note.GNU-stack,"",%progbits
|
/src/tests/usr.bin/c++/ |
t_asan_off_by_one.sh | 48 asan_test_case off_by_one "Off by one example" stack-buffer-overflow
|
/src/tests/usr.bin/cc/ |
t_asan_off_by_one.sh | 48 asan_test_case off_by_one "Off by one example" stack-buffer-overflow
|
/src/sys/external/bsd/compiler_rt/dist/lib/ubsan/ |
ubsan_diag_standalone.cc | 31 BufferedStackTrace stack; local in function:__sanitizer_print_stack_trace 32 stack.Unwind(kStackTraceMax, pc, bp, nullptr, top, bottom, 34 stack.Print();
|
/src/sys/external/bsd/sljit/dist/sljit_src/ |
sljitUtils.c | 4 * Stack-less Just-In-Time compiler 188 /* Stack */ 251 struct sljit_stack *stack; local in function:sljit_allocate_stack 280 stack = (struct sljit_stack*)SLJIT_MALLOC(sizeof(struct sljit_stack), allocator_data); 281 if (!stack) 290 SLJIT_FREE(stack, allocator_data); 293 stack->max_limit = (sljit_u8 *)ptr; 294 stack->base = stack->max_limit + max_limit; 295 stack->limit = stack->base [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
sanitizer_stackdepot_test.cc | 24 StackTrace stack = StackDepotGet(i1); local in function:__sanitizer::TEST 25 EXPECT_NE(stack.trace, (uptr*)0); 26 EXPECT_EQ(ARRAY_SIZE(array), stack.size); 27 EXPECT_EQ(0, internal_memcmp(stack.trace, array, sizeof(array))); 31 StackTrace stack = StackDepotGet((1 << 30) - 1); local in function:__sanitizer::TEST 32 EXPECT_EQ((uptr*)0, stack.trace); 37 StackTrace stack = StackDepotGet(i1); local in function:__sanitizer::TEST 38 EXPECT_EQ((uptr*)0, stack.trace); 42 StackTrace stack = StackDepotGet(0); local in function:__sanitizer::TEST 43 EXPECT_EQ((uptr*)0, stack.trace) 52 StackTrace stack = StackDepotGet(i1); local in function:__sanitizer::TEST 86 StackTrace stack = StackDepotGet(ids[i]); local in function:__sanitizer::TEST [all...] |
/src/sys/ddb/ |
db_lwp.c | 66 uintptr_t stack; local in function:db_lwp_whatis 71 stack = (uintptr_t)KSTACK_LOWEST_ADDR((&l)); 72 if (addr < stack || stack + KSTACK_SIZE <= addr) { 75 (*pr)("%p is %p+%zu, LWP %p's stack\n", 76 (void *)addr, (void *)stack, 77 (size_t)(addr - stack), lp);
|
/src/sys/arch/shark/shark/ |
hat.h | 65 stack = stack for hatFn 73 unsigned char *stack, void (*wedgeFn)(int));
|
/src/sys/external/bsd/compiler_rt/dist/lib/msan/ |
msan_report.h | 24 void ReportUMR(StackTrace *stack, u32 origin); 25 void ReportExpectedUMRNotFound(StackTrace *stack);
|
msan_poisoning.h | 32 void CopyOrigin(const void *dst, const void *src, uptr size, StackTrace *stack); 37 StackTrace *stack); 42 StackTrace *stack); 46 void CopyMemory(void *dst, const void *src, uptr size, StackTrace *stack); 55 void PoisonMemory(const void *dst, uptr size, StackTrace *stack);
|
/src/sys/arch/i386/stand/ |
Makefile.inc | 14 -fno-stack-protector
|
/src/tests/lib/libc/sys/ |
t_clone.c | 60 void *stack = mmap(NULL, STACKSIZE, PROT_READ|PROT_WRITE, local in function:getstack 62 ATF_REQUIRE_ERRNO(errno, stack != MAP_FAILED); 64 stack = (char *)stack + STACKSIZE; 66 return stack; 70 putstack(void *stack) 73 stack = (char *)stack - STACKSIZE; 75 ATF_REQUIRE_ERRNO(errno, munmap(stack, STACKSIZE) != -1); 90 printf("child: stack ~= %p, frobme = %p\n", &frobp, frobp) 119 void *stack = getstack(); local in function:ATF_TC_BODY 205 void *stack = getstack(); local in function:ATF_TC_BODY 230 char *stack = getstack(); local in function:ATF_TC_BODY [all...] |
/src/lib/libexecinfo/ |
builtin.c | 58 void *stack = &stack; local in function:backtrace 61 if ((const void *)frame BELOW stack)
|