Home
last modified time | relevance | path

Searched full:stack (Results 1 – 25 of 4047) sorted by relevance

12345678910>>...162

/OK3568_Linux_fs/buildroot/dl/qt5location/git/src/3rdparty/mapbox-gl-native/deps/boost/1.65.1/include/boost/fusion/iterator/detail/
H A Dsegmented_next_impl.hpp28 template <typename Sequence, typename Stack>
31 //bool is_invalid(stack)
33 // return empty(car(stack));
36 template <typename Stack>
39 typename Stack::car_type::begin_type,
40 typename Stack::car_type::end_type
45 ////top of a stack of iterator ranges. Return the
46 ////new stack.
47 //auto pop_front_car(stack)
49 // return cons(iterator_range(next(begin(car(stack))), end(car(stack))), cdr(stack));
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/libcxx/include/
H A Dstack2 //===---------------------------- stack -----------------------------------===//
15 stack synopsis
21 class stack
34 stack() = default;
35 ~stack() = default;
37 stack(const stack& q) = default;
38 stack(stack&& q) = default;
40 stack& operator=(const stack& q) = default;
41 stack& operator=(stack&& q) = default;
43 explicit stack(const container_type& c);
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/libcxx/include/
H A Dstack2 //===---------------------------- stack -----------------------------------===//
15 stack synopsis
21 class stack
34 stack() = default;
35 ~stack() = default;
37 stack(const stack& q) = default;
38 stack(stack&& q) = default;
40 stack& operator=(const stack& q) = default;
41 stack& operator=(stack&& q) = default;
43 explicit stack(const container_type& c);
[all …]
/OK3568_Linux_fs/kernel/drivers/misc/altera-stapl/
H A Daltera.c119 /* This function checks if enough parameters are available on the stack. */
213 long *stack = astate->stack; in altera_execute() local
528 stack[stack_ptr] = stack[stack_ptr - 1]; in altera_execute()
534 long_tmp = stack[stack_ptr - 2]; in altera_execute()
535 stack[stack_ptr - 2] = stack[stack_ptr - 1]; in altera_execute()
536 stack[stack_ptr - 1] = long_tmp; in altera_execute()
542 stack[stack_ptr - 1] += stack[stack_ptr]; in altera_execute()
548 stack[stack_ptr - 1] -= stack[stack_ptr]; in altera_execute()
554 stack[stack_ptr - 1] *= stack[stack_ptr]; in altera_execute()
560 stack[stack_ptr - 1] /= stack[stack_ptr]; in altera_execute()
[all …]
/OK3568_Linux_fs/buildroot/package/openpowerlink/
H A D0001-install-the-stack-libraries-to-lib-subdirectory.patch4 Subject: [PATCH] install the stack libraries to "lib" subdirectory
6 Using '.' to install the stack libraries is not correct since
14 the stack directory to be a "local staging" directory which
16 stack project are installed in stack/lib by default.
42 stack/proj/linux/liboplkcn-sim/CMakeLists.txt | 2 +-
43 stack/proj/linux/liboplkcn/CMakeLists.txt | 2 +-
44 stack/proj/linux/liboplkcnapp-kernelintf/CMakeLists.txt | 2 +-
45 stack/proj/linux/liboplkcnapp-userintf/CMakeLists.txt | 2 +-
46 stack/proj/linux/liboplkcndrv-pcap/CMakeLists.txt | 2 +-
47 stack/proj/linux/liboplkmn-sim/CMakeLists.txt | 2 +-
[all …]
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/include/c++/10.3.1/bits/
H A Dstl_stack.h1 // Stack implementation -*- C++ -*-
53 * Do not attempt to use it directly. @headername{stack}
85 * first-in-last-out %stack behavior. in _GLIBCXX_VISIBILITY()
95 * push, @c pop, and @c top, which are standard %stack/FILO in _GLIBCXX_VISIBILITY()
99 class stack in _GLIBCXX_VISIBILITY()
113 operator==(const stack<_Tp1, _Seq1>&, const stack<_Tp1, _Seq1>&); in _GLIBCXX_VISIBILITY()
117 operator<(const stack<_Tp1, _Seq1>&, const stack<_Tp1, _Seq1>&); in _GLIBCXX_VISIBILITY()
122 operator<=>(const stack<_Tp1, _Seq1>&, const stack<_Tp1, _Seq1>&); in _GLIBCXX_VISIBILITY()
157 stack(const _Sequence& __c = _Sequence()) in _GLIBCXX_VISIBILITY()
162 stack() in _GLIBCXX_VISIBILITY()
[all …]
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/include/c++/10.3.1/bits/
H A Dstl_stack.h1 // Stack implementation -*- C++ -*-
53 * Do not attempt to use it directly. @headername{stack}
85 * first-in-last-out %stack behavior. in _GLIBCXX_VISIBILITY()
95 * push, @c pop, and @c top, which are standard %stack/FILO in _GLIBCXX_VISIBILITY()
99 class stack in _GLIBCXX_VISIBILITY()
113 operator==(const stack<_Tp1, _Seq1>&, const stack<_Tp1, _Seq1>&); in _GLIBCXX_VISIBILITY()
117 operator<(const stack<_Tp1, _Seq1>&, const stack<_Tp1, _Seq1>&); in _GLIBCXX_VISIBILITY()
122 operator<=>(const stack<_Tp1, _Seq1>&, const stack<_Tp1, _Seq1>&); in _GLIBCXX_VISIBILITY()
157 stack(const _Sequence& __c = _Sequence()) in _GLIBCXX_VISIBILITY()
162 stack() in _GLIBCXX_VISIBILITY()
[all …]
/OK3568_Linux_fs/kernel/arch/x86/kernel/
H A Ddumpstack_32.c38 static bool in_hardirq_stack(unsigned long *stack, struct stack_info *info) in in_hardirq_stack() argument
44 * This is a software stack, so 'end' can be a valid stack pointer. in in_hardirq_stack()
45 * It just means the stack is empty. in in_hardirq_stack()
47 if (stack < begin || stack > end) in in_hardirq_stack()
55 * See irq_32.c -- the next stack pointer is stored at the beginning of in in_hardirq_stack()
56 * the stack. in in_hardirq_stack()
63 static bool in_softirq_stack(unsigned long *stack, struct stack_info *info) in in_softirq_stack() argument
69 * This is a software stack, so 'end' can be a valid stack pointer. in in_softirq_stack()
70 * It just means the stack is empty. in in_softirq_stack()
72 if (stack < begin || stack > end) in in_softirq_stack()
[all …]
H A Ddumpstack_64.c40 * On 64-bit, we have a generic entry stack that we in stack_type_name()
55 * @offs: Offset from the start of the exception stack area
56 * @size: Size of the exception stack
73 * Array of exception stack page descriptors. If the stack is larger than
74 * PAGE_SIZE, all pages covering a particular stack will have the same
75 * info. The guard pages including the not mapped DB2 stack are zeroed
88 static __always_inline bool in_exception_stack(unsigned long *stack, struct stack_info *info) in in_exception_stack() argument
90 unsigned long begin, end, stk = (unsigned long)stack; in in_exception_stack()
99 * Handle the case where stack trace is collected _before_ in in_exception_stack()
106 /* Bail if @stack is outside the exception stack area. */ in in_exception_stack()
[all …]
H A Ddumpstack.c32 bool noinstr in_task_stack(unsigned long *stack, struct task_struct *task, in in_task_stack() argument
38 if (stack < begin || stack >= end) in in_task_stack()
50 bool noinstr in_entry_stack(unsigned long *stack, struct stack_info *info) in in_entry_stack() argument
57 if ((void *)stack < begin || (void *)stack >= end) in in_entry_stack()
134 /* No access to the user space stack of other tasks. Ignore. */ in show_opcodes()
166 * ordering reasons: if the registers are on the next stack, we don't in show_regs_if_on_stack()
168 * the wrong stack. Later, when show_trace_log_lvl() switches to the in show_regs_if_on_stack()
169 * next stack, this function will be called again with the same regs so in show_regs_if_on_stack()
187 unsigned long *stack, const char *log_lvl) in show_trace_log_lvl() argument
197 unwind_start(&state, task, regs, stack); in show_trace_log_lvl()
[all …]
/OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/verifier/
H A Dprecise.c43 regs=4 stack=0 before 25\
44 regs=4 stack=0 before 24\
45 regs=4 stack=0 before 23\
46 regs=4 stack=0 before 22\
47 regs=4 stack=0 before 20\
48 parent didn't have regs=4 stack=0 marks\
50 regs=4 stack=0 before 19\
51 regs=200 stack=0 before 18\
52 regs=300 stack=0 before 17\
53 regs=201 stack=0 before 15\
[all …]
H A Dvar_off.c21 "variable-offset stack read, priv vs unpriv",
23 /* Fill the top 8 bytes of the stack */
34 /* dereference it for a stack read */
41 .errstr_unpriv = "R2 variable stack access prohibited for !root",
45 "variable-offset stack read, uninitialized",
56 /* dereference it for a stack read */
62 .errstr = "invalid variable-offset read from stack R2",
66 "variable-offset stack write, priv vs unpriv",
77 /* Dereference it for a stack write */
89 /* Variable stack access is rejected for unprivileged.
[all …]
/OK3568_Linux_fs/kernel/arch/um/os-Linux/skas/
H A Dmem.c26 unsigned long *stack) in check_init_stack() argument
28 if (stack == NULL) { in check_init_stack()
29 stack = (unsigned long *) mm_idp->stack + 2; in check_init_stack()
30 *stack = 0; in check_init_stack()
32 return stack; in check_init_stack()
74 * beginning of the stack: in do_syscall_stub()
78 ret = *((unsigned long *) mm_idp->stack); in do_syscall_stub()
79 offset = *((unsigned long *) mm_idp->stack + 1); in do_syscall_stub()
81 data = (unsigned long *)(mm_idp->stack + offset - STUB_DATA); in do_syscall_stub()
114 unsigned long *stack = check_init_stack(mm_idp, *addr); in run_syscall_stub() local
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/
H A Dstack.h69 // A stack, in OpenSSL, is an array of pointers. They are the most commonly
72 // This file defines macros for type safe use of the stack functions. A stack
83 // Although note that the stack will contain /pointers/ to |FOO|.
116 // These are the raw stack functions, you shouldn't be using them. Rather you
117 // should be using the type stack macros implemented above.
119 // sk_new creates a new, empty stack with the given comparison function, which
120 // may be zero. It returns the new stack or NULL on allocation failure.
123 // sk_new_null creates a new, empty stack. It returns the new stack or NULL on
142 // sk_free frees the given stack and array of pointers, but does nothing to
146 // sk_pop_free calls |free_func| on each element in the stack and then frees
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/
H A Dstack.h69 // A stack, in OpenSSL, is an array of pointers. They are the most commonly
72 // This file defines macros for type safe use of the stack functions. A stack
83 // Although note that the stack will contain /pointers/ to |FOO|.
116 // These are the raw stack functions, you shouldn't be using them. Rather you
117 // should be using the type stack macros implemented above.
119 // sk_new creates a new, empty stack with the given comparison function, which
120 // may be zero. It returns the new stack or NULL on allocation failure.
123 // sk_new_null creates a new, empty stack. It returns the new stack or NULL on
142 // sk_free frees the given stack and array of pointers, but does nothing to
146 // sk_pop_free calls |free_func| on each element in the stack and then frees
[all …]
/OK3568_Linux_fs/buildroot/dl/qt5location/git/src/3rdparty/mapbox-gl-native/deps/boost/1.65.1/include/boost/fusion/view/iterator_range/detail/
H A Dsegmented_iterator_range.hpp30 // - Each segmented iterator has a stack
31 // - Each value in the stack is an iterator range
32 // - The range at the top of the stack points to values
34 // - The front of each range in the stack (besides the
96 template <typename Stack, std::size_t Size = Stack::size::value>
109 typename Stack::car_type::begin_type
117 , typename Stack::cdr_type::car_type::end_type
123 typename Stack::cdr_type::car_type::begin_type
132 typename Stack::car_type::begin_type
144 make_segment_sequence_front<typename Stack::cdr_type>
[all …]
/OK3568_Linux_fs/kernel/security/
H A DKconfig.hardening8 stack variable initializations, this warning is silenced for
38 prompt "Initialize kernel stack variables at function entry"
44 This option enables initialization of stack variables at
56 bool "no automatic stack variable initialization (weakest)"
58 Disable automatic stack variable initialization.
60 classes of uninitialized stack variable exploits
68 Zero-initialize any structures on the stack containing
70 uninitialized stack variable exploits and information
80 Zero-initialize any structures on the stack that may
83 of uninitialized stack variable exploits and information
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/
H A Dstack.h69 // A stack, in OpenSSL, is an array of pointers. They are the most commonly
72 // This file defines macros for type safe use of the stack functions. A stack
83 // Although note that the stack will contain /pointers/ to |FOO|.
89 // stack_free_func is a function that frees an element in a stack. Note its
94 // stack_copy_func is a function that copies an element in a stack. Note its
129 // These are the raw stack functions, you shouldn't be using them. Rather you
130 // should be using the type stack macros implemented above.
132 // sk_new creates a new, empty stack with the given comparison function, which
133 // may be zero. It returns the new stack or NULL on allocation failure.
136 // sk_new_null creates a new, empty stack. It returns the new stack or NULL on
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/
H A Dstack.h69 // A stack, in OpenSSL, is an array of pointers. They are the most commonly
72 // This file defines macros for type safe use of the stack functions. A stack
83 // Although note that the stack will contain /pointers/ to |FOO|.
89 // stack_free_func is a function that frees an element in a stack. Note its
94 // stack_copy_func is a function that copies an element in a stack. Note its
129 // These are the raw stack functions, you shouldn't be using them. Rather you
130 // should be using the type stack macros implemented above.
132 // sk_new creates a new, empty stack with the given comparison function, which
133 // may be zero. It returns the new stack or NULL on allocation failure.
136 // sk_new_null creates a new, empty stack. It returns the new stack or NULL on
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/
H A Dstack.h69 // A stack, in OpenSSL, is an array of pointers. They are the most commonly
72 // This file defines macros for type safe use of the stack functions. A stack
83 // Although note that the stack will contain /pointers/ to |FOO|.
89 // stack_free_func is a function that frees an element in a stack. Note its
94 // stack_copy_func is a function that copies an element in a stack. Note its
129 // These are the raw stack functions, you shouldn't be using them. Rather you
130 // should be using the type stack macros implemented above.
132 // sk_new creates a new, empty stack with the given comparison function, which
133 // may be zero. It returns the new stack or NULL on allocation failure.
136 // sk_new_null creates a new, empty stack. It returns the new stack or NULL on
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/
H A Dstack.h69 // A stack, in OpenSSL, is an array of pointers. They are the most commonly
72 // This file defines macros for type safe use of the stack functions. A stack
83 // Although note that the stack will contain /pointers/ to |FOO|.
89 // stack_free_func is a function that frees an element in a stack. Note its
94 // stack_copy_func is a function that copies an element in a stack. Note its
129 // These are the raw stack functions, you shouldn't be using them. Rather you
130 // should be using the type stack macros implemented above.
132 // sk_new creates a new, empty stack with the given comparison function, which
133 // may be zero. It returns the new stack or NULL on allocation failure.
136 // sk_new_null creates a new, empty stack. It returns the new stack or NULL on
[all …]
/OK3568_Linux_fs/kernel/arch/x86/entry/
H A Dentry_32.S7 * Stack layout while running C code:
8 * ptrace needs to have all registers on the stack.
59 * %gs is used for userland TLS and kernel only uses it for stack
200 * When we're here from kernel mode; the (exception) stack looks like:
248 * so any attempt to access the stack needs to use SS. (except for
257 * middle doesn't scribble our stack.
313 /* Switch to kernel stack if necessary */
409 * Setup and switch to ESPFIX stack
411 * We're returning to userspace with a 16 bit stack. The CPU will not
445 * entry-stack, it will overwrite the task-stack and everything we
[all …]
/OK3568_Linux_fs/kernel/Documentation/x86/
H A Dkernel-stacks.rst14 Like all other architectures, x86_64 has a kernel stack for every
17 zombie. While the thread is in user space the kernel stack is empty
25 * Interrupt stack. IRQ_STACK_SIZE
29 kernel switches from the current task to the interrupt stack. Like
32 of every per thread stack.
34 The interrupt stack is also used when processing a softirq.
36 Switching to the kernel interrupt stack is done by software based on a
41 to automatically switch to a new stack for designated events such as
43 events on x86_64. This feature is called the Interrupt Stack Table
46 point to dedicated stacks; each stack can be a different size.
[all …]
/OK3568_Linux_fs/kernel/lib/
H A Dstackdepot.c3 * Generic stack depot for storing stack traces.
5 * Some debugging tools need to save stack traces of certain events which can
7 * free stacks for each object, but storing two stack traces per object
11 * Instead, stack depot maintains a hashtable of unique stacktraces. Since alloc
39 #define STACK_ALLOC_ORDER 2 /* 'Slab' size order for stack depot, 4 pages */
64 u32 size; /* Number of frames in the stack */
104 /* Allocation of a new stack in raw storage */
108 struct stack_record *stack; in depot_alloc_stack() local
109 size_t required_size = struct_size(stack, entries, size); in depot_alloc_stack()
115 WARN_ONCE(1, "Stack depot reached limit capacity"); in depot_alloc_stack()
[all …]
/OK3568_Linux_fs/kernel/kernel/trace/
H A Dtrace_stack.c58 * The stack tracer looks for a maximum stack at each call from a function. It
59 * registers a callback from ftrace, and in that callback it examines the stack
60 * size. It determines the stack size from the variable passed in, which is the
62 * The stack size is calculated by the address of the local variable to the top
63 * of the current stack. If that size is smaller than the currently saved max
64 * stack size, nothing more is done.
66 * If the size of the stack is greater than the maximum recorded size, then the
70 * saving the function's local variables, the stack will look something like
73 * [ top of stack ]
80 * 31: [ do trace stack here ]
[all …]

12345678910>>...162