/tools/lib/traceevent/plugins/ |
D | plugin_function.c | 30 char **stack; member 60 static void add_child(struct func_stack *stack, const char *child, int pos) in add_child() argument 67 if (pos < stack->size) in add_child() 68 free(stack->stack[pos]); in add_child() 72 ptr = realloc(stack->stack, sizeof(char *) * in add_child() 73 (stack->size + STK_BLK)); in add_child() 79 stack->stack = ptr; in add_child() 81 for (i = stack->size; i < stack->size + STK_BLK; i++) in add_child() 82 stack->stack[i] = NULL; in add_child() 83 stack->size += STK_BLK; in add_child() [all …]
|
/tools/testing/selftests/vDSO/ |
D | vdso_standalone_test_x86.c | 75 __attribute__((externally_visible)) void c_main(void **stack) in c_main() argument 78 long argc = (long)*stack; in c_main() 79 stack += argc + 2; in c_main() 82 while(*stack) in c_main() 83 stack++; in c_main() 84 stack++; in c_main() 87 vdso_init_from_auxv((void *)stack); in c_main()
|
D | Makefile | 14 CFLAGS_vdso_standalone_test_x86 := -nostdlib -fno-asynchronous-unwind-tables -fno-stack-protector
|
/tools/perf/scripts/python/ |
D | stackcollapse.py | 97 stack = list() 103 stack.append(tidy_function_name(entry['sym']['name'], 108 stack.append(tidy_function_name(param_dict['symbol'], 119 stack.append(comm) 121 stack_string = ';'.join(reversed(stack)) 126 for stack in list: 127 print("%s %d" % (stack, lines[stack]))
|
/tools/testing/selftests/proc/ |
D | thread-self.c | 51 void *stack; in main() local 56 stack = mmap(NULL, 2 * PAGE_SIZE, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0); in main() 57 assert(stack != MAP_FAILED); in main() 59 pid = clone(f, stack + PAGE_SIZE, CLONE_THREAD|CLONE_SIGHAND|CLONE_VM, (void *)1); in main()
|
/tools/perf/util/ |
D | thread-stack.c | 85 struct thread_stack_entry *stack; member 118 new_stack = realloc(ts->stack, sz); in thread_stack__grow() 122 ts->stack = new_stack; in thread_stack__grow() 178 if (!ts->stack && in thread_stack__new() 197 if (!ts->stack) in thread__cpu_stack() 228 ts->stack[ts->cnt].trace_end = trace_end; in thread_stack__push() 229 ts->stack[ts->cnt++].ret_addr = ret_addr; in thread_stack__push() 248 if (ts->stack[--i].ret_addr == ret_addr) { in thread_stack__pop() 260 if (ts->stack[--i].trace_end) in thread_stack__pop_trace_end() 272 return ts->stack[ts->cnt - 1].cp->in_kernel; in thread_stack__in_kernel() [all …]
|
D | unwind-libdw.c | 155 struct stack_dump *stack = &ui->sample->user_stack; in memory_read() local 164 end = start + stack->size; in memory_read() 182 *result = *(Dwarf_Word *)&stack->data[offset]; in memory_read()
|
/tools/testing/selftests/bpf/progs/ |
D | test_get_stack_rawtp_err.c | 11 __u64 stack[MAX_STACK_RAWTP]; in bpf_prog2() local 15 error = bpf_get_stack(ctx, stack, 0, -1); in bpf_prog2()
|
/tools/perf/arch/arm64/tests/ |
D | dwarf-unwind.c | 16 struct stack_dump *stack = &sample->user_stack; in sample_ustack() local 40 stack->data = (char *) buf; in sample_ustack() 41 stack->size = stack_size; in sample_ustack()
|
/tools/perf/arch/powerpc/tests/ |
D | dwarf-unwind.c | 17 struct stack_dump *stack = &sample->user_stack; in sample_ustack() local 41 stack->data = (char *) buf; in sample_ustack() 42 stack->size = stack_size; in sample_ustack()
|
/tools/perf/arch/arm/tests/ |
D | dwarf-unwind.c | 16 struct stack_dump *stack = &sample->user_stack; in sample_ustack() local 40 stack->data = (char *) buf; in sample_ustack() 41 stack->size = stack_size; in sample_ustack()
|
/tools/perf/arch/x86/tests/ |
D | dwarf-unwind.c | 17 struct stack_dump *stack = &sample->user_stack; in sample_ustack() local 41 stack->data = (char *) buf; in sample_ustack() 42 stack->size = stack_size; in sample_ustack()
|
/tools/testing/selftests/kvm/lib/ |
D | assert.c | 31 void *stack[n]; in test_dump_stack() local 41 n = backtrace(stack, n); in test_dump_stack() 50 c += sprintf(c, " %lx", ((unsigned long) stack[i]) - 1); in test_dump_stack()
|
/tools/objtool/Documentation/ |
D | stack-validation.txt | 1 Compile-time stack metadata validation 10 analyzes every .o file and ensures the validity of its stack metadata. 12 that stack traces can be reliable. 28 Why do we need stack metadata validation? 31 Here are some of the benefits of validating stack metadata: 33 a) More reliable stack traces for frame pointer enabled kernels 36 code and debug tools to be able to walk the stack to determine the 51 For stack traces based on frame pointers to be reliable, all 52 functions which call other functions must first create a stack frame 54 create a stack frame before calling a second function, the *caller* [all …]
|
/tools/testing/selftests/memfd/ |
D | fuse_test.c | 202 uint8_t *stack; in spawn_sealing_thread() local 205 stack = malloc(STACK_SIZE); in spawn_sealing_thread() 206 if (!stack) { in spawn_sealing_thread() 212 stack + STACK_SIZE, in spawn_sealing_thread()
|
/tools/perf/util/intel-pt-decoder/ |
D | intel-pt-decoder.c | 134 struct intel_pt_stack stack; member 281 static void intel_pt_pop_blk(struct intel_pt_stack *stack) in intel_pt_pop_blk() argument 283 struct intel_pt_blk *blk = stack->blk; in intel_pt_pop_blk() 285 stack->blk = blk->prev; in intel_pt_pop_blk() 286 if (!stack->spare) in intel_pt_pop_blk() 287 stack->spare = blk; in intel_pt_pop_blk() 292 static uint64_t intel_pt_pop(struct intel_pt_stack *stack) in intel_pt_pop() argument 294 if (!stack->pos) { in intel_pt_pop() 295 if (!stack->blk) in intel_pt_pop() 297 intel_pt_pop_blk(stack); in intel_pt_pop() [all …]
|
/tools/perf/bench/ |
D | mem-memset-x86-64-asm.S | 12 .section .note.GNU-stack,"",@progbits
|
D | mem-memcpy-x86-64-asm.S | 17 .section .note.GNU-stack,"",@progbits
|
/tools/testing/selftests/x86/ |
D | syscall_arg_fault.c | 124 stack_t stack = { in main() local 128 if (sigaltstack(&stack, NULL) != 0) in main()
|
D | sysret_ss_attrs.c | 36 extern unsigned long call32_from_64(void *stack, void (*function)(void));
|
D | mov_ss_trap.c | 252 stack_t stack = { in main() local 256 if (sigaltstack(&stack, NULL) != 0) in main()
|
/tools/power/pm-graph/config/ |
D | custom-timeline-functions.cfg | 78 # The args are pulled directly from the stack using this architecture's registers 79 # and stack formatting. Three pieces of info are required. The function name, 107 # arglist: A list of arguments from registers/stack addresses. See URL: 143 # The args are pulled directly from the stack using this architecture's registers 144 # and stack formatting. Three pieces of info are required. The function name, 172 # arglist: A list of arguments from registers/stack addresses. See URL:
|
/tools/testing/selftests/powerpc/tm/ |
D | .gitignore | 4 tm-signal-stack
|
/tools/include/uapi/linux/ |
D | sched.h | 68 __aligned_u64 stack; member
|
/tools/perf/Documentation/ |
D | perf-top.txt | 169 Enables call-graph (stack chain/backtrace) recording. 172 Setup and enable call-graph (stack chain/backtrace) recording, 183 --max-stack:: 184 Set the stack depth limit when parsing the callchain, anything 187 workloads that can have a very long callchain stack. 223 Enable taken branch stack sampling. Any type of taken branch may be sampled. 228 Enable taken branch stack sampling. Each sample captures a series of consecutive 237 levels are subject to permissions. When sampling on multiple events, branch stack sampling
|