Searched refs:stack (Results 1 - 15 of 15) sorted by relevance

/bionic/libc/arch-common/bionic/
H A Dcrtend.S41 .section .note.GNU-stack,"",%progbits
H A Dcrtend_so.S40 .section .note.GNU-stack,"",%progbits
/bionic/libc/arch-mips64/bionic/
H A D__bionic_clone.S46 PTR_SUBU sp, FRAMESZ # allocate stack frame
50 # set up child stack
58 PTR_L t0,FRAME_GP(sp) # copy gp to child stack
87 * For O32 etc the child stack must have space for a0..a3 to be stored
88 * For N64 etc, the child stack can be restored to the original value
H A Dsyscall.S39 PTR_SUBU sp, FRAMESZ # allocate stack frame
H A Dsetjmp.S50 PTR_SUBU sp, FRAMESZ # allocate stack frame
/bionic/libc/arch-arm64/bionic/
H A D__bionic_clone.S34 # Copy 'fn' and 'arg' onto the child stack.
56 # ...and call __start_thread with the 'fn' and 'arg' we stored on the child stack.
/bionic/libc/arch-arm/bionic/
H A D__bionic_clone.S34 # save registers to parent stack
45 # store 'fn' and 'arg' to the child stack
/bionic/libc/arch-mips/bionic/
H A D__bionic_clone.S39 # set up child stack
H A Dsetjmp.S50 PTR_SUBU sp, FRAMESZ # allocate stack frame
/bionic/libc/arch-x86_64/bionic/
H A D__bionic_clone.S33 # Copy 'fn' and 'arg' onto the child stack.
66 # with the arguments from the child stack moved into
/bionic/libc/bionic/
H A Dpthread_create.cpp55 // We don't know where the user got their stack, so assume the worst and zero the TLS area.
62 // GCC looks in the TLS for the stack guard on x86, so copy it there from our global.
67 // Create and set an alternate signal stack.
108 void* stack = mmap(NULL, thread->attr.stack_size, prot, flags, -1, 0); local
109 if (stack == MAP_FAILED) {
112 "pthread_create failed: couldn't allocate %zd-byte stack: %s",
117 // Set the guard region at the end of the stack to PROT_NONE.
118 if (mprotect(stack, thread->attr.guard_size, PROT_NONE) == -1) {
120 "pthread_create failed: couldn't mprotect PROT_NONE %zd-byte stack guard region: %s",
122 munmap(stack, threa
[all...]
/bionic/libc/arch-x86/bionic/
H A D__bionic_clone.S16 # Copy 'fn' and 'arg' onto the child stack
/bionic/linker/
H A DAndroid.mk27 -fno-stack-protector \
60 # Leave the symbols in the shared library so that stack unwinders can produce
/bionic/tests/
H A Dpthread_test.cpp120 void* stack = mmap(NULL, stack_size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0); local
121 ASSERT_NE(MAP_FAILED, stack);
122 memset(stack, 0xff, stack_size);
126 ASSERT_EQ(0, pthread_attr_setstack(&attr, stack, stack_size));
135 ASSERT_EQ(0, munmap(stack, stack_size));
517 // If the joiner unmapped the thread's stack, that could lead to SIGSEGV in the thread.
520 void* stack = mmap(NULL, stack_size, PROT_READ|PROT_WRITE, MAP_ANON|MAP_PRIVATE, -1, 0); local
524 pthread_attr_setstack(&a, stack, stack_size);
529 ASSERT_EQ(0, munmap(stack, stack_size));
595 // Get the default stack siz
[all...]
/bionic/libc/
H A DAndroid.mk569 # libc_stack_protector.a - stack protector code
572 # The stack protector code needs to be compiled
573 # with -fno-stack-protector, since it modifies the
574 # stack canary.
579 LOCAL_CFLAGS := $(libc_common_cflags) -fno-stack-protector
605 # Don't use ridiculous amounts of stack.
1016 # Leave the symbols in the shared library so that stack unwinders can produce

Completed in 228 milliseconds