| /optee_os/lib/libunw/include/unw/ |
| H A D | unwind.h | 58 vaddr_t stack, size_t stack_size); 61 vaddr_t stack, size_t stack_size); 64 vaddr_t stack __unused, in unwind_stack_arm32() 71 vaddr_t stack __unused, in print_stack_arm32() 97 vaddr_t stack, size_t stack_size); 100 vaddr_t stack, size_t stack_size); 103 vaddr_t stack __unused, in unwind_stack_arm64() 110 vaddr_t stack __unused, in print_stack_arm64() 129 vaddr_t stack, size_t stack_size); 132 vaddr_t stack, size_t stack_size); [all …]
|
| /optee_os/lib/libunw/ |
| H A D | unwind_riscv.c | 20 vaddr_t stack, size_t stack_size) in unwind_stack_riscv() argument 25 if (fp < stack) in unwind_stack_riscv() 27 if (fp > stack + stack_size) in unwind_stack_riscv() 68 vaddr_t stack, size_t stack_size) in print_stack_riscv() argument 78 } while (unwind_stack_riscv(state, stack, stack_size)); in print_stack_riscv()
|
| H A D | unwind_arm32.c | 176 static bool pop_vsp(uint32_t *reg, vaddr_t *vsp, vaddr_t stack, in pop_vsp() argument 179 if (*vsp < stack) in pop_vsp() 181 if (*vsp + sizeof(*reg) > stack + stack_size) in pop_vsp() 191 static bool unwind_exec_insn(struct unwind_state_arm32 *state, vaddr_t stack, in unwind_exec_insn() argument 228 stack, stack_size)) in unwind_exec_insn() 257 stack, stack_size)) in unwind_exec_insn() 265 stack, stack_size)) in unwind_exec_insn() 289 stack, stack_size)) in unwind_exec_insn() 317 static bool unwind_tab(struct unwind_state_arm32 *state, vaddr_t stack, in unwind_tab() argument 346 if (!unwind_exec_insn(state, stack, stack_size)) in unwind_tab() [all …]
|
| H A D | unwind_arm64.c | 53 vaddr_t stack, size_t stack_size) in unwind_stack_arm64() argument 57 if (fp < stack) in unwind_stack_arm64() 59 if (fp + sizeof(uint64_t) * 3 > stack + stack_size) in unwind_stack_arm64() 82 vaddr_t stack, size_t stack_size) in print_stack_arm64() argument 94 } while (unwind_stack_arm64(state, stack, stack_size)); in print_stack_arm64()
|
| /optee_os/lib/libutee/arch/arm/ |
| H A D | utee_syscalls_a32.S | 10 .section .note.GNU-stack,"",%progbits 36 @ No arguments passed on stack 39 @ Tell number of arguments passed on the stack
|
| /optee_os/ldelf/ |
| H A D | syscalls_a32.S | 26 @ No arguments passed on stack 29 @ Tell number of arguments passed on the stack
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | unwind_arm64.c | 55 uaddr_t stack = thread_stack_start(); in unw_get_kernel_stack() local 62 while (unwind_stack_arm64(&state, stack, stack_size)) { in unw_get_kernel_stack()
|
| H A D | unwind_arm32.c | 63 vaddr_t stack = thread_stack_start(); in unw_get_kernel_stack() local 84 while (unwind_stack_arm32(&state, stack, stack_size)) { in unw_get_kernel_stack()
|
| /optee_os/ta/arch/arm/ |
| H A D | ta_entry_a32.S | 8 .section .note.GNU-stack,"",%progbits
|
| /optee_os/lib/libutils/isoc/arch/arm/ |
| H A D | arm32_aeabi_divmod_a32.S | 8 .section .note.GNU-stack,"",%progbits
|
| H A D | arm32_aeabi_ldivmod_a32.S | 8 .section .note.GNU-stack,"",%progbits
|
| H A D | setjmp_a32.S | 54 .section .note.GNU-stack,"",%progbits
|
| /optee_os/core/kernel/ |
| H A D | lockdep.c | 45 static vaddr_t *dup_call_stack(vaddr_t *stack) in dup_call_stack() argument 50 if (!stack) in dup_call_stack() 53 while (stack[n]) in dup_call_stack() 60 memcpy(nstack, stack, (n + 1) * sizeof(vaddr_t)); in dup_call_stack() 65 static void lockdep_print_call_stack(vaddr_t *stack) in lockdep_print_call_stack() argument 73 for (p = stack; p && *p; p++) in lockdep_print_call_stack()
|
| H A D | thread.c | 64 #define GET_STACK_BOTTOM(stack, n) ((vaddr_t)&(stack)[n] + sizeof(stack[n]) - \ argument 68 #define GET_STACK_BOTTOM(stack, n) 0 argument
|
| /optee_os/lib/libutils/ext/arch/arm/ |
| H A D | atomic_a32.S | 8 .section .note.GNU-stack,"",%progbits
|
| H A D | mcount_a32.S | 10 .section .note.GNU-stack,"",%progbits
|
| /optee_os/core/ |
| H A D | core.mk | 49 core-stackp-cflags-y := -fno-stack-protector 68 cflags_kasan += --param asan-stack=1
|
| /optee_os/lib/libutils/isoc/arch/riscv/ |
| H A D | setjmp_rv.S | 68 #error longjmp() stack unpoisoning not implemented for RISC-V with ASAN
|
| /optee_os/ta/ |
| H A D | ta.mk | 20 ta-stackp-cflags-y := -fno-stack-protector
|
| /optee_os/core/lib/qcbor/ |
| H A D | README.md | 381 All QCBOR_DISABLE_XXX are set and compiler stack frame checking is disabled 421 The gcc compiler output is usually smaller than llvm because stack 424 stack gaurds with llvm. It is safe to turn off stack gaurds with this
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | README.md | 147 - `ASanDbg`. Same as ASan but slower, with debug information and better stack traces. 149 - `MemSanDbg`. Same as MemSan but slower, with debug information, better stack traces and origin …
|
| H A D | ChangeLog | 287 * Fix a stack buffer overflow in mbedtls_ecdsa_der_to_raw() and 531 * Fix a stack buffer overread (less than 256 bytes) when parsing a TLS 1.3 623 This reduces stack usage significantly for writing a public/private 889 * Fix very high stack usage in SSL debug code. Reported by Maximilian 950 This reduces stack usage significantly for RSA signature 2377 * Fix a stack buffer overflow with mbedtls_net_poll() and 2572 * Reduce stack usage significantly during sliding window exponentiation. 2679 * Reduce the stack consumption of mbedtls_x509write_csr_der() which 2680 previously could lead to stack overflow on constrained devices. 3099 * Avoid use of statically sized stack buffers for certificate writing. [all …]
|
| /optee_os/ |
| H A D | CHANGELOG.md | 826 to commit [0e1c6e8e][commit_0e1c6e8e] ("Dump call stack on TA panic"). 948 * Dump TA call stack on panic ([#1858]) 1069 * Dump call stack of user TAs on abort ([#1552]) 1325 * Print call stack in panic() 1362 * arm32: fix call stack unwinding (`print_stack()`) 1465 * Add macros to unwind and print the call stack of TEE core 1496 * [#1069][issue1069] armv7/Aarch32: crash in stack unwind (DPRINT_STACK())
|