Knowledge

Call stack

Source 📝

434:, which are allowed to access the context of their enclosing routines, i.e., the parameters and local variables within the scope of the outer routines. Such static nesting can repeat (a function declared within a function declared within a function…). The implementation must provide a means by which a called function at any given static nesting level can reference the enclosing frame at each enclosing nesting level. This reference is commonly implemented by a pointer to the frame of the most recently activated instance of the enclosing function, called a "downstack link" or "static link", to distinguish it from the "dynamic link" that refers to the immediate caller (which need not be the static parent function). 673:(as it keeps track of static nesting during dynamic and recursive calls) and provides the routine (as well as any other routines it may invoke) access to the local data of its encapsulating routines at every nesting level. Some architectures, compilers, or optimization cases store one link for each enclosing level (not just the immediately enclosing), so that deeply nested routines that access shallow data do not have to traverse several links; this strategy is often called a "display". 896: 512: 25: 756:
branch to the instruction at the return address. Under many calling conventions, the items popped off the stack by the epilogue include the original argument values, in which case there usually are no further stack manipulations that need to be done by the caller. With some calling conventions, however, it is the caller's responsibility to remove the arguments from the stack after the return.
610:, the value of the stack pointer just before the function was called. Each stack frame contains a stack pointer to the top of the frame immediately below. The stack pointer is a mutable register shared between all invocations. A frame pointer of a given invocation of a function is a copy of the stack pointer as it was before the function was invoked. 855:
In a language with free pointers or non-checked array writes (such as in C), the mixing of control flow data which affects the execution of code (the return addresses or the saved frame pointers) and simple program data (parameters or return values) in a call stack is a security risk, and is possibly
832:
The call stack can sometimes be inspected as the program is running. Depending on how the program is written and compiled, the information on the stack can be used to determine intermediate values and function call traces. This has been used to generate fine-grained automated tests, and in cases like
630:
uses (not shown in the diagram above). The value is saved upon entry to the subroutine. Having such a field in a known location in the stack frame enables code to access each frame successively underneath the currently executing routine's frame, and also allows the routine to easily restore the frame
227:
the return address off the call stack and transfers control to that address. If a called subroutine calls on yet another subroutine, it will push another return address onto the call stack, and so on, with the information stacking up and unstacking as the program dictates. If the pushing consumes all
180:
A call stack is used for several related purposes, but the main reason for having one is to keep track of the point to which each active subroutine should return control when it finishes executing. An active subroutine is one that has been called, but is yet to complete execution, after which control
735:
For instruction set architectures in which the instruction used to call a subroutine puts the return address into a register, rather than pushing it onto the stack, the prologue will commonly save the return address by pushing the value onto the call stack, although if the called subroutine does not
613:
The locations of all other fields in the frame can be defined relative either to the top of the frame, as negative offsets of the stack pointer, or relative to the top of the frame below, as positive offsets of the frame pointer. The location of the frame pointer itself must inherently be defined as
871:
One such attack involves filling one buffer with arbitrary executable code, and then overflowing this or some other buffer to overwrite some return address with a value that points directly to the executable code. As a result, when the function returns, the computer executes that code. This kind of
441:
which is indexed to locate a desired frame. The depth of a routine's lexical nesting is a known constant, so the size of a routine's display is fixed. Also, the number of containing scopes to traverse is known, the index into the display is also fixed. Usually, a routine's display is located in its
385:
will be used to pass the values, but if there are more parameters than can be handled this way, memory space will be needed. The call stack works well as a place for these parameters, especially since each call to a subroutine, which will have differing values for parameters, will be given separate
755:
When a subroutine is ready to return, it executes an epilogue that undoes the steps of the prologue. This will typically restore saved register values (such as the frame pointer value) from the stack frame, pop the entire stack frame off the stack by changing the stack pointer value, and finally
715:
Usually the call stack manipulation needed at the site of a call to a subroutine is minimal (which is good since there can be many call sites for each subroutine to be called). The values for the actual arguments are evaluated at the call site, since they are specific to the particular call, and
693:
For some purposes, the stack frame of a subroutine and that of its caller can be considered to overlap, the overlap consisting of the area where the parameters are passed from the caller to the callee. In some environments, the caller pushes each argument onto the stack, thus extending its stack
570:
A diagram like this can be drawn in either direction as long as the placement of the top, and so direction of stack growth, is understood. Architectures differ as to whether call stacks grow towards higher addresses or towards lower addresses, so the logic of any diagram is not dependent on this
470:
Beside the return address, in some environments there may be other machine or software states that need to be restored when a subroutine returns. This might include things like privilege level, exception-handling information, arithmetic modes, and so on. If needed, this may be stored in the call
784:
statement to transfer control out of a nested function and into a previously invoked outer function. This operation requires the stack to be unwound, removing as many stack frames as necessary to restore the proper context to transfer control to the target statement within the enclosing outer
810:, the stack is (logically) unwound and then rewound with the stack of the continuation. This is not the only way to implement continuations; for example, using multiple, explicit stacks, application of a continuation can simply activate its stack and wind a value to be passed. The 449:
The display entries denoting containing scopes are obtained from the appropriate prefix of the caller's display. An inner routine which recurses creates separate call frames for each invocation. In this case, all of the inner routine's static links point to the same outer routine
840:
Taking regular-time samples of the call stack can be useful in profiling the performance of programs as, if a subroutine's address appears in the call stack sampling data many times, it is likely to act as a code bottleneck and should be inspected for performance problems.
363:, the variables that are known only within the active subroutine and do not retain values after it returns. It is often convenient to allocate space for this use by simply moving the top of the stack by enough to provide the space. This is very fast when compared to 348:
is automatically supported. When a function calls itself recursively, a return address needs to be stored for each activation of the function so that it can later be used to return from the function activation. Stack structures provide this capability automatically.
676:
Access links can be optimized away when an inner function does not access any (non-constant) local data in the encapsulation, as is the case with pure functions communicating only via arguments and return values, for example. Some historical computers, such as the
407:
Operands for arithmetic or logical operations are most often placed into registers and operated on there. However, in some situations the operands may be stacked up to an arbitrary depth, which means something more than registers must be used (this is the case of
574:
The stack frame at the top of the stack is for the currently executing routine, which can access information within its frame (such as parameters or local variables) in any order. The stack frame usually includes at least the following items (in push order):
773:. In this case, the stack frame of a function contains one or more entries specifying exception handlers. When an exception is thrown, the stack is unwound until a handler is found that is prepared to handle (catch) the type of the thrown exception. 739:
If frame pointers are being used, the prologue will typically set the new value of the frame pointer register from the stack pointer. Space on the stack for local variables can then be allocated by incrementally changing the stack pointer.
332:. When a subroutine is called, the location (address) of the instruction at which the calling routine can later resume must be saved somewhere. Using a stack to save the return address has important advantages over some alternative 764:
Returning from the called function will pop the top frame off the stack, perhaps leaving a return value. The more general act of popping one or more frames off the stack to resume execution elsewhere in the program is called
694:
frame, then invokes the callee. In other environments, the caller has a preallocated area at the top of its stack frame to hold the arguments it supplies to other subroutines it calls. This area is sometimes termed the
685:, had special "display registers" to support nested functions, while compilers for most modern machines (such as the ubiquitous x86) simply reserve a few words on the stack for the pointers, as needed. 559:-dependent data structures containing subroutine state information. Each stack frame corresponds to a call to a subroutine which has not yet terminated with a return. For example, if a subroutine named 487:), although any data can be temporarily placed there using special return-stack handling code so long as the needs of calls and returns are respected; parameters are ordinarily stored on a separate 464:, a block within a procedure may have its own local variables, allocated on block entry and freed on block exit. Similarly, the block may have its own exception handlers, deactivated at block exit. 602:
When stack frame sizes can differ, such as between different functions or between invocations of a particular function, popping a frame off the stack does not constitute a fixed decrement of the
381:
be supplied to them by the code which calls them, and it is not uncommon that space for these parameters may be laid out in the call stack. Generally if there are only a few small parameters,
336:, such as saving the return address before the beginning of the called subroutine or in some other fixed location. One is that each task can have its own stack, and thus the subroutine can be 181:
should be handed back to the point of call. Such activations of subroutines may be nested to any level (recursive as a special case), hence the stack structure. For example, if a subroutine
1210: 483:, for example, ordinarily only the return address, counted loop parameters and indexes, and possibly local variables are stored on the call stack (which in that environment is named the 290:, the specifics of the call stack are usually hidden from the programmer. They are given access only to a set of functions, and not the memory on the stack itself. This is an example of 622:
In most systems a stack frame has a field to contain the previous value of the frame pointer register, the value it had while the caller was executing. For example, the stack frame of
884:. Various mitigations have been proposed, such as storing arrays in a completely separate location from the return stack, as is the case in the Forth programming language. 1283: 1246: 499:
stack in Forth terminology even though there is a call stack since it is usually accessed more explicitly. Some Forths also have a third stack for
1197: 736:
call any other routines it may leave the value in the register. Similarly, the current stack pointer and/or frame pointer values may be pushed.
998: 720:. The actual call instruction, such as "branch and link", is then typically executed to transfer control to the code of the target subroutine. 1090: 352:
Depending on the language, operating system, and machine environment, a call stack may serve additional purposes, including, for example:
1276: 976: 437:
Instead of a static link, the references to the enclosing static frames may be collected into an array of pointers known as a
1269: 1186: 702:. Under this approach, the size of the area is calculated by the compiler to be the largest needed by any called subroutine. 340:, that is, able to be active simultaneously for different tasks doing different things. Another benefit is that by providing 236:. Adding a block's or subroutine's entry to the call stack is sometimes called "winding", and removing entries "unwinding". 1159:
Wilson, P. R.; Johnstone, M. S.; Neely, M.; Boles, D. (1995). "Dynamic storage allocation: A survey and critical review".
89: 298:, on the other hand, require programmers to be involved in manipulating the stack. The actual details of the stack in a 61: 818:
to be executed in specified points on "unwinding" or "rewinding" of the control stack when a continuation is invoked.
1074: 108: 1026: 827: 770: 68: 287: 170: 815: 291: 198: 46: 1243: 935: 811: 423: 323: 75: 1292: 744: 556: 480: 378: 345: 910: 901: 881: 857: 777: 371:. Note that each separate activation of a subroutine gets its own separate space in the stack for locals. 239:
There is usually exactly one call stack associated with a running program (or more accurately, with each
42: 1450: 1397: 732:, since it does the necessary housekeeping before the code for the statements of the routine is begun. 427: 268: 224: 220: 207: 130: 57: 1392: 1361: 364: 244: 1006: 223:, the caller pushes the return address onto the stack, and the called subroutine, when it finishes, 1309: 1199:
MCS-4 Assembly Language Programming Manual - The INTELLEC 4 Microcomputer System Programming Manual
409: 387: 256: 1169: 1057: 1098: 682: 443: 395: 35: 1039: 479:). In some environments there may be more or fewer functions assigned to the call stack. In the 1366: 1164: 1052: 837:(GDB) implements interactive inspection of the call stack of a running, but paused, C program. 341: 877: 861: 850: 1445: 1376: 966: 925: 299: 661:
activation of the procedure that most closely encapsulates the callee, i.e. the immediate
475:
The typical call stack is used for the return address, locals, and parameters (known as a
165:". Although maintenance of the call stack is important for the proper functioning of most 8: 1341: 1324: 769:
and must be performed when non-local control structures are used, such as those used for
446:
implemented such a display in hardware which supported up to 32 levels of static nesting.
248: 82: 1419: 1407: 1314: 1135: 971: 915: 717: 648: 382: 368: 333: 252: 1424: 1261: 1206: 1182: 1070: 729: 552: 295: 233: 1402: 1174: 1147: 1062: 678: 431: 307: 240: 138: 122: 876:, but similar attacks can succeed even with W^X protection enabled, including the 1250: 930: 865: 716:
either pushed onto the stack or placed into registers, as determined by the used
654: 644: 567:, the top part of the call stack might be laid out like in the adjacent picture. 311: 174: 193:
must know where to return when its execution completes. To accomplish this, the
1412: 1356: 1329: 833:
Ruby and Smalltalk, to implement first-class continuations. As an example, the
500: 413: 360: 279:
is accessed more explicitly than the call stack and is commonly referred to as
263:). Since there is only one in this important context, it can be referred to as 229: 194: 1439: 1346: 1178: 940: 776:
Some languages have other control structures that require general unwinding.
747:
allows explicit winding of the call stack (called there the "return stack").
337: 1336: 834: 807: 1066: 657:
also have a field in the call frame that points to the stack frame of the
1371: 1351: 945: 796: 1119: 728:
In the called subroutine, the first code executed is usually termed the
416:, is called an evaluation stack, and may occupy space in the call stack. 1230: 1151: 260: 134: 799:
allows control of what happens when the stack is unwound by using the
920: 359:
A subroutine frequently needs memory space for storing the values of
1163:. Lecture Notes in Computer Science. Vol. 986. pp. 1–116. 1047:. 17th International Symposium on Software Reliability Engineering ( 895: 511: 24: 1255: 786: 606:. At function return, the stack pointer is instead restored to the 457: 303: 166: 626:
would have a memory location holding the frame pointer value that
211:, is pushed onto the top of the call stack as part of each call. 579:
the arguments (parameter values) passed to the routine (if any);
1233:
implements an internal stack rather than an in-memory stack.)
1226: 1048: 582:
the return address back to the routine's caller (e.g. in the
391: 228:
of the space allocated for the call stack, an error called a
617: 873: 781: 461: 1120:"The Forth Programming Language - Why YOU should learn it" 328:
As noted above, the primary purpose of a call stack is to
1158: 563:
is currently running, having been called by a subroutine
133:
data structure that stores information about the active
1291: 1244:
Function Calling and Frame Pointer Operations in 68000
1205:(Preliminary ed.). Santa Clara, California, USA: 593:
space for the local variables of the routine (if any).
515:
Call stack layout for upward-growing stacks after the
412:). The stack of such operands, rather like that in an 177:
provide special instructions for manipulating stacks.
891: 1209:. December 1973. pp. 2-7–2-8. MCS-030-1273-1. 169:, the details are normally hidden and automatic in 49:. Unsourced material may be challenged and removed. 267:stack (implicitly "of the task"); however, in the 251:), although additional stacks may be created for 1437: 1041:Call Stack Coverage for GUI Test-Suite Reduction 723: 394:, the list of parameters may also include the 317: 1277: 1037: 386:space on the call stack for those values. In 964: 638: 597: 531:), which is the currently executing routine 1284: 1270: 377:Subroutines often require that values for 141:. This type of stack is also known as an 1168: 1091:"Debugging with GDB: Examining the Stack" 1056: 618:Storing the address to the caller's frame 232:occurs, generally causing the program to 109:Learn how and when to remove this message 1134: 965:Krzyzanowski, Paul (February 16, 2018). 614:a negative offset of the stack pointer. 510: 16:Data structure used in computer programs 795:functions that act as non-local gotos. 710: 219:Since the call stack is organized as a 1438: 1265: 864:, which are the most common type of 750: 471:stack just as the return address is. 161:, and is often shortened to simply " 47:adding citations to reliable sources 18: 1258:- a platform-independent unwind API 653:Programming languages that support 13: 1128: 422:Some programming languages (e.g., 14: 1462: 1237: 1138:(1960). "Recursive Programming". 1027:Alternative Microprocessor Design 665:of the callee. This is called an 571:addressing choice by convention. 1038:McMaster, S.; Memon, A. (2006). 894: 828:Profiling (computer programming) 288:high-level programming languages 171:high-level programming languages 23: 1216:from the original on 2020-03-01 979:from the original on 2021-08-28 785:function. Similarly, C has the 635:frame, just before it returns. 34:needs additional citations for 1112: 1083: 1031: 1020: 991: 958: 872:an attack can be blocked with 214: 1: 952: 936:Stack-based memory allocation 821: 586:stack frame, an address into 324:Stack-based memory allocation 1293:Application binary interface 1097:. 1997-10-17. Archived from 1005:. 2003-06-22. Archived from 759: 506: 419:Enclosing subroutine context 189:from four different places, 7: 911:Automatic memory allocation 902:Computer programming portal 887: 882:return-oriented programming 880:or the attacks coming from 844: 812:Scheme programming language 724:Subroutine entry processing 318:Functions of the call stack 10: 1469: 1398:Foreign function interface 848: 825: 745:Forth programming language 688: 642: 481:Forth programming language 330:store the return addresses 321: 269:Forth programming language 1393:Binary-code compatibility 1385: 1362:Position-independent code 1300: 999:"Understanding the Stack" 639:Lexically nested routines 456:In some languages, e.g., 442:own stack frame, but the 430:) support declaration of 388:object-oriented languages 365:dynamic memory allocation 1179:10.1007/3-540-60368-9_19 598:Stack and frame pointers 257:cooperative multitasking 696:outgoing arguments area 683:Burroughs large systems 681:and somewhat later the 1051:'06). pp. 33–44. 862:stack buffer overflows 705: 532: 453:Enclosed block context 1256:The libunwind project 1140:Numerische Mathematik 1067:10.1109/ISSRE.2006.19 878:return-to-libc attack 851:Stack buffer overflow 643:Further information: 519:subroutine (shown in 514: 1377:Virtual method table 926:Overhead (computing) 711:Call site processing 310:, and the available 300:programming language 43:improve this article 1342:Memory segmentation 1229:'s 4-bit processor 1095:chemie.fu-berlin.de 730:subroutine prologue 495:, typically called 383:processor registers 334:calling conventions 283:stack (see below). 185:calls a subroutine 1315:Calling convention 1249:2010-07-24 at the 1196:"2.4. The Stack". 1152:10.1007/BF01386232 972:Rutgers University 916:Calling convention 803:special operator. 771:exception handling 718:calling convention 655:nested subroutines 649:Non-local variable 545:activation records 533: 467:Other return state 432:nested subroutines 356:Local data storage 296:assembly languages 1451:Memory management 1433: 1432: 1425:Year 2038 problem 1207:Intel Corporation 1188:978-3-540-60368-9 1161:Memory Management 814:allows arbitrary 751:Return processing 553:machine dependent 549:activation frames 410:register spilling 374:Parameter passing 367:, which uses the 119: 118: 111: 93: 1458: 1403:Language binding 1286: 1279: 1272: 1263: 1262: 1224: 1222: 1221: 1215: 1204: 1192: 1172: 1155: 1123: 1116: 1110: 1109: 1107: 1106: 1087: 1081: 1080: 1060: 1046: 1035: 1029: 1024: 1018: 1017: 1015: 1014: 995: 989: 988: 986: 984: 962: 904: 899: 898: 806:When applying a 802: 793: 789: 780:allows a global 679:Electrologica X8 629: 625: 589: 585: 566: 562: 530: 526: 522: 518: 404:Evaluation stack 398: 308:operating system 302:depend upon the 204: 192: 188: 184: 175:instruction sets 173:. Many computer 139:computer program 123:computer science 114: 107: 103: 100: 94: 92: 51: 27: 19: 1468: 1467: 1461: 1460: 1459: 1457: 1456: 1455: 1436: 1435: 1434: 1429: 1381: 1302: 1296: 1290: 1251:Wayback Machine 1240: 1219: 1217: 1213: 1202: 1195: 1189: 1136:Dijkstra, E. W. 1131: 1129:Further reading 1126: 1117: 1113: 1104: 1102: 1089: 1088: 1084: 1077: 1044: 1036: 1032: 1025: 1021: 1012: 1010: 997: 996: 992: 982: 980: 963: 959: 955: 950: 931:Spaghetti stack 900: 893: 890: 866:buffer overflow 853: 847: 830: 824: 800: 791: 787: 767:stack unwinding 762: 753: 726: 713: 708: 691: 651: 645:Nested function 641: 631:pointer to the 627: 623: 620: 600: 587: 583: 564: 560: 539:is composed of 528: 524: 520: 516: 509: 493:parameter stack 444:Burroughs B6500 396: 361:local variables 326: 320: 312:instruction set 277:parameter stack 217: 202: 190: 186: 182: 143:execution stack 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 1466: 1465: 1454: 1453: 1448: 1431: 1430: 1428: 1427: 1422: 1417: 1416: 1415: 1405: 1400: 1395: 1389: 1387: 1386:Related topics 1383: 1382: 1380: 1379: 1374: 1369: 1364: 1359: 1357:Opaque pointer 1354: 1349: 1344: 1339: 1334: 1333: 1332: 1322: 1317: 1312: 1306: 1304: 1298: 1297: 1289: 1288: 1281: 1274: 1266: 1260: 1259: 1253: 1239: 1238:External links 1236: 1235: 1234: 1193: 1187: 1156: 1146:(1): 312–318. 1130: 1127: 1125: 1124: 1111: 1082: 1075: 1030: 1019: 990: 967:"Stack frames" 956: 954: 951: 949: 948: 943: 938: 933: 928: 923: 918: 913: 907: 906: 905: 889: 886: 849:Main article: 846: 843: 823: 820: 801:unwind-protect 761: 758: 752: 749: 725: 722: 712: 709: 707: 704: 690: 687: 640: 637: 619: 616: 599: 596: 595: 594: 591: 580: 508: 505: 501:floating-point 473: 472: 468: 465: 454: 451: 447: 435: 420: 417: 414:RPN calculator 405: 402: 375: 372: 357: 319: 316: 230:stack overflow 216: 213: 208:return address 201:that jumps to 197:following the 155:run-time stack 117: 116: 99:September 2012 31: 29: 22: 15: 9: 6: 4: 3: 2: 1464: 1463: 1452: 1449: 1447: 1444: 1443: 1441: 1426: 1423: 1421: 1418: 1414: 1411: 1410: 1409: 1406: 1404: 1401: 1399: 1396: 1394: 1391: 1390: 1388: 1384: 1378: 1375: 1373: 1370: 1368: 1365: 1363: 1360: 1358: 1355: 1353: 1350: 1348: 1347:Name mangling 1345: 1343: 1340: 1338: 1335: 1331: 1328: 1327: 1326: 1323: 1321: 1318: 1316: 1313: 1311: 1308: 1307: 1305: 1299: 1294: 1287: 1282: 1280: 1275: 1273: 1268: 1267: 1264: 1257: 1254: 1252: 1248: 1245: 1242: 1241: 1232: 1228: 1212: 1208: 1201: 1200: 1194: 1190: 1184: 1180: 1176: 1171: 1170:10.1.1.47.275 1166: 1162: 1157: 1153: 1149: 1145: 1141: 1137: 1133: 1132: 1121: 1115: 1101:on 2021-04-14 1100: 1096: 1092: 1086: 1078: 1076:0-7695-2684-5 1072: 1068: 1064: 1059: 1058:10.1.1.88.873 1054: 1050: 1043: 1042: 1034: 1028: 1023: 1009:on 2013-02-25 1008: 1004: 1000: 994: 978: 974: 973: 968: 961: 957: 947: 944: 942: 941:Stack machine 939: 937: 934: 932: 929: 927: 924: 922: 919: 917: 914: 912: 909: 908: 903: 897: 892: 885: 883: 879: 875: 869: 867: 863: 859: 852: 842: 838: 836: 829: 819: 817: 813: 809: 804: 798: 794: 783: 779: 774: 772: 768: 757: 748: 746: 741: 737: 733: 731: 721: 719: 703: 701: 697: 686: 684: 680: 674: 672: 668: 664: 660: 656: 650: 646: 636: 634: 615: 611: 609: 608:frame pointer 605: 604:stack pointer 592: 590:'s code); and 581: 578: 577: 576: 572: 568: 558: 554: 551:). These are 550: 546: 543:(also called 542: 538: 513: 504: 502: 498: 494: 490: 486: 482: 478: 469: 466: 463: 459: 455: 452: 448: 445: 440: 436: 433: 429: 425: 421: 418: 415: 411: 406: 403: 400: 393: 389: 384: 380: 376: 373: 370: 366: 362: 358: 355: 354: 353: 350: 347: 343: 339: 335: 331: 325: 315: 313: 309: 305: 301: 297: 293: 289: 284: 282: 278: 274: 270: 266: 262: 258: 254: 250: 246: 242: 237: 235: 231: 226: 225:pulls or pops 222: 212: 210: 209: 200: 196: 178: 176: 172: 168: 164: 160: 159:machine stack 156: 152: 151:control stack 148: 147:program stack 144: 140: 136: 132: 128: 124: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 1337:Machine code 1319: 1218:. Retrieved 1198: 1160: 1143: 1139: 1118:Doug Hoyte. 1114: 1103:. Retrieved 1099:the original 1094: 1085: 1040: 1033: 1022: 1011:. Retrieved 1007:the original 1002: 993: 983:December 19, 981:. Retrieved 970: 960: 870: 854: 839: 835:GNU Debugger 831: 808:continuation 805: 775: 766: 763: 754: 742: 738: 734: 727: 714: 700:callout area 699: 695: 692: 675: 670: 666: 662: 658: 652: 632: 621: 612: 607: 603: 601: 573: 569: 548: 544: 541:stack frames 540: 536: 534: 503:parameters. 496: 492: 488: 485:return stack 484: 476: 474: 438: 351: 329: 327: 285: 280: 276: 272: 264: 255:handling or 238: 218: 206: 179: 162: 158: 154: 150: 146: 142: 126: 120: 105: 96: 86: 79: 72: 65: 58:"Call stack" 53: 41:Please help 36:verification 33: 1446:Subroutines 1372:System call 1352:Object code 1303:conventions 946:Stack trace 858:exploitable 797:Common Lisp 671:static link 667:access link 338:thread-safe 292:abstraction 215:Description 199:instruction 135:subroutines 1440:Categories 1367:Relocation 1320:Call stack 1220:2020-03-02 1105:2014-12-16 1013:2014-05-21 1003:cs.umd.edu 953:References 826:See also: 822:Inspection 628:DrawSquare 588:DrawSquare 565:DrawSquare 537:call stack 527:(shown in 517:DrawSquare 489:data stack 477:call frame 379:parameters 369:heap space 342:reentrancy 322:See also: 273:data stack 261:setcontext 183:DrawSquare 127:call stack 69:newspapers 1310:Alignment 1165:CiteSeerX 1053:CiteSeerX 921:Coroutine 760:Unwinding 523:) called 507:Structure 346:recursion 259:(as with 163:the stack 1247:Archived 1211:Archived 977:Archived 888:See also 860:through 845:Security 633:caller's 624:DrawLine 584:DrawLine 561:DrawLine 525:DrawLine 458:ALGOL 60 450:context. 390:such as 304:compiler 203:DrawLine 191:DrawLine 187:DrawLine 167:software 1413:dynamic 1325:Library 792:longjmp 689:Overlap 439:display 399:pointer 294:. Most 249:process 195:address 83:scholar 1420:Loader 1408:Linker 1330:static 1301:Parts, 1185:  1167:  1073:  1055:  816:thunks 788:setjmp 778:Pascal 659:latest 424:Pascal 253:signal 245:thread 205:, the 85:  78:  71:  64:  56:  1295:(ABI) 1227:Intel 1225:(NB. 1214:(PDF) 1203:(PDF) 1049:ISSRE 1045:(PDF) 663:scope 529:green 247:of a 234:crash 221:stack 157:, or 137:of a 131:stack 129:is a 90:JSTOR 76:books 1231:4004 1183:ISBN 1071:ISBN 985:2021 790:and 782:goto 743:The 647:and 555:and 521:blue 462:PL/I 426:and 397:this 271:the 241:task 125:, a 62:news 1175:doi 1148:doi 1063:doi 874:W^X 706:Use 698:or 669:or 557:ABI 547:or 497:the 491:or 428:Ada 392:C++ 286:In 281:the 275:or 265:the 243:or 121:In 45:by 1442:: 1181:. 1173:. 1142:. 1093:. 1069:. 1061:. 1001:. 975:. 969:. 868:. 535:A 460:, 344:, 314:. 306:, 153:, 149:, 145:, 1285:e 1278:t 1271:v 1223:. 1191:. 1177:: 1154:. 1150:: 1144:2 1122:. 1108:. 1079:. 1065:: 1016:. 987:. 401:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Call stack"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
computer science
stack
subroutines
computer program
software
high-level programming languages
instruction sets
address
instruction
return address
stack
pulls or pops
stack overflow
crash
task
thread
process
signal
cooperative multitasking

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.