Home
last modified time | relevance | path

Searched refs:stack (Results 101 – 125 of 168) sorted by relevance

1234567

/php-src/ext/json/tests/
H A D007.phpt27 string(28) "Maximum stack depth exceeded"
H A Djson_validate_002.phpt32 string(28) "Maximum stack depth exceeded"
/php-src/ext/standard/tests/serialize/
H A Dbug69793.phpt2 Bug #69793: Remotely triggerable stack exhaustion via recursive method calls
/php-src/Zend/asm/
H A Djump_riscv64_sysv_elf_gas.S66 # prepare stack for GP + FPU
144 # restore stack from GP + FPU
H A Dmake_arm_aapcs_macho_gas.S48 @ reserve space for context-data on context-stack
H A Dmake_x86_64_ms_pe_masm.asm119 ; save address of context stack limit as 'dealloction stack'
H A Dmake_ppc32_sysv_elf_gas.S66 # reserve space on context-stack, including 16 bytes of linkage
146 .section .note.GNU-stack,"",%progbits
H A Djump_i386_sysv_elf_gas.S93 .section .note.GNU-stack,"",%progbits
H A Dmake_arm_aapcs_elf_gas.S51 @ reserve space for context-data on context-stack
H A Dmake_i386_sysv_elf_gas.S113 .section .note.GNU-stack,"",%progbits
H A Djump_ppc64_sysv_macho_gas.S74 ; reserve space on stack
144 ; adjust stack
/php-src/sapi/phpdbg/
H A Dphpdbg_prompt.c98 if (stack->type == STACK_PARAM) { in phpdbg_call_register()
101 name = stack->next; in phpdbg_call_register()
255 phpdbg_param_t stack; in phpdbg_line_init() local
257 phpdbg_init_param(&stack, STACK_PARAM); in phpdbg_line_init()
261 if (phpdbg_do_parse(&stack, input) <= 0) { in phpdbg_line_init()
279 phpdbg_stack_free(&stack); in phpdbg_line_init()
1527 phpdbg_param_t stack; in phpdbg_interactive() local
1541 phpdbg_init_param(&stack, STACK_PARAM); in phpdbg_interactive()
1549 phpdbg_stack_free(&stack); in phpdbg_interactive()
1581 phpdbg_stack_free(&stack); in phpdbg_interactive()
[all …]
H A Dconfig.w3219 ADD_FLAG("LDFLAGS_PHPDBG", "/stack:8388608");
H A Dphpdbg_parser.y188 int phpdbg_do_parse(phpdbg_param_t *stack, char *input) { in phpdbg_do_parse() argument
198 phpdbg_init_lexer(stack, input); in phpdbg_do_parse()
/php-src/Zend/tests/
H A Dbug77345_gc_1.phpt2 Bug #77345 (Segmentation faults stack overflow in cyclic garbage collector) (Bug #77427)
H A Dbug77345_gc_2.phpt2 Bug #77345 (Segmentation faults stack overflow in cyclic garbage collector) (Bug #77427)
/php-src/sapi/cgi/tests/
H A Dapache_request_headers.phpt2 apache_request_headers() stack overflow.
/php-src/Zend/tests/stack_limit/
H A Dstack_limit_012.phpt41 Fatal error: Maximum call stack size of %d bytes (zend.max_allowed_stack_size - zend.reserved_stack…
H A Dstack_limit_007.phpt44 Maximum call stack size of %d bytes (zend.max_allowed_stack_size - zend.reserved_stack_size) reache…
H A Dstack_limit_008.phpt58 Maximum call stack size of %d bytes (zend.max_allowed_stack_size - zend.reserved_stack_size) reache…
/php-src/ext/reflection/tests/
H A DReflectionFiber_notrace_2.phpt2 ReflectionFiber should not segfault when inspecting fibers where the previous stack frame is a nati…
/php-src/ext/gd/tests/
H A Dgithub_bug_215.phpt2 Github #215 (imagefilltoborder stack overflow when invalid pallete index used)
/php-src/Zend/tests/named_params/
H A Ddefaults.phpt23 // NB: We also want to test the stack trace.
/php-src/sapi/phpdbg/tests/
H A Dexceptions_002.phpt29 prompt> [The stack contains nothing !]
/php-src/ext/zend_test/
H A Dtest.c558 zend_call_stack stack; in ZEND_FUNCTION() local
562 if (zend_call_stack_get(&stack)) { in ZEND_FUNCTION()
567 str = strpprintf(0, "%p", stack.base); in ZEND_FUNCTION()
570 str = strpprintf(0, "0x%zx", stack.max_size); in ZEND_FUNCTION()
598 zend_call_stack stack; in ZEND_FUNCTION() local
602 if (!zend_call_stack_get(&stack)) { in ZEND_FUNCTION()
608 void *limit = zend_call_stack_limit(stack.base, stack.max_size, 4096); in ZEND_FUNCTION()

Completed in 36 milliseconds

1234567