Home
last modified time | relevance | path

Searched refs:stack (Results 1 – 13 of 13) sorted by relevance

/kernel/
Dfork.c225 void *stack; in alloc_thread_stack_node() local
239 stack = kasan_reset_tag(s->addr); in alloc_thread_stack_node()
242 memset(stack, 0, THREAD_SIZE); in alloc_thread_stack_node()
245 tsk->stack = stack; in alloc_thread_stack_node()
246 return stack; in alloc_thread_stack_node()
254 stack = __vmalloc_node_range(THREAD_SIZE, THREAD_ALIGN, in alloc_thread_stack_node()
265 if (stack) { in alloc_thread_stack_node()
266 stack = kasan_reset_tag(stack); in alloc_thread_stack_node()
267 tsk->stack_vm_area = find_vm_area(stack); in alloc_thread_stack_node()
268 tsk->stack = stack; in alloc_thread_stack_node()
[all …]
DMakefile43 CFLAGS_kcov.o := $(call cc-option, -fno-conserve-stack) -fno-stack-protector
/kernel/trace/
Dtrace_stack.c155 static void check_stack(unsigned long ip, unsigned long *stack) in check_stack() argument
162 this_size = ((unsigned long)stack) & (THREAD_SIZE-1); in check_stack()
171 if (!object_is_on_stack(stack)) in check_stack()
212 start = stack; in check_stack()
249 tracer_frame = (p - stack) * in check_stack()
295 unsigned long stack; in stack_trace_call() local
310 check_stack(ip, &stack); in stack_trace_call()
DKconfig37 If this is set, then arguments and stack can be found from
186 address on the current task structure into a stack of calls.
241 bool "Trace max stack"
247 This special tracer records the maximum stack footprint of the
251 kernel executes, and keeping a maximum stack depth value and
252 stack-trace saved. If this is configured with DYNAMIC_FTRACE
253 then it will not have any overhead while the stack tracer
256 To enable the stack tracer on bootup, pass in 'stacktrace'
259 The stack tracer can also be enabled or disabled via the
Dtrace_events_synth.c473 long *stack, in trace_stack() argument
485 if (!stack[len]) in trace_stack()
497 memcpy(data_loc, stack, len); in trace_stack()
561 long *stack = (long *)(long)var_ref_vals[val_idx]; in trace_event_raw_event_synth() local
563 len = trace_stack(entry, event, stack, in trace_event_raw_event_synth()
/kernel/kcsan/
DMakefile10 CFLAGS_core.o := $(call cc-option,-fno-conserve-stack) \
11 -fno-stack-protector -DDISABLE_BRANCH_PROFILING
/kernel/bpf/
Dverifier.c618 static bool is_spilled_reg(const struct bpf_stack_state *stack) in is_spilled_reg() argument
620 return stack->slot_type[BPF_REG_SIZE - 1] == STACK_SPILL; in is_spilled_reg()
722 if (state->stack[i].slot_type[j] != STACK_INVALID) in print_verifier_state()
725 state->stack[i].slot_type[j]]; in print_verifier_state()
731 print_liveness(env, state->stack[i].spilled_ptr.live); in print_verifier_state()
732 if (is_spilled_reg(&state->stack[i])) { in print_verifier_state()
733 reg = &state->stack[i].spilled_ptr; in print_verifier_state()
827 dst->stack = copy_array(dst->stack, src->stack, n, sizeof(struct bpf_stack_state), in copy_stack_state()
829 if (!dst->stack) in copy_stack_state()
854 state->stack = realloc_array(state->stack, old_n, n, sizeof(struct bpf_stack_state)); in grow_stack_state()
[all …]
Dcore.c1752 u64 stack[stack_size / sizeof(u64)]; \
1755 FP = (u64) (unsigned long) &stack[ARRAY_SIZE(stack)]; \
1765 u64 stack[stack_size / sizeof(u64)]; \
1768 FP = (u64) (unsigned long) &stack[ARRAY_SIZE(stack)]; \
Dbtf.c259 struct resolve_vertex stack[MAX_RESOLVE_DEPTH]; member
1643 v = &env->stack[env->top_stack++]; in env_stack_push()
1661 env->stack[env->top_stack - 1].next_member = next_member; in env_stack_set_next_member()
1668 u32 type_id = env->stack[--(env->top_stack)].type_id; in env_stack_pop_resolved()
1679 return env->top_stack ? &env->stack[env->top_stack - 1] : NULL; in env_stack_peak()
/kernel/entry/
DMakefile10 CFLAGS_common.o += -fno-stack-protector
/kernel/debug/kdb/
Dkdb_cmds3 # processes. Commands that require process data (including stack or
/kernel/dma/
Ddebug.c1072 addr = (u8 *)current->stack + i * PAGE_SIZE + offset; in check_for_stack()
/kernel/events/
Duprobes.c1913 ri->stack = user_stack_pointer(regs); in prepare_uretprobe()