Searched refs:stack (Results 1 – 13 of 13) sorted by relevance
/kernel/ |
D | fork.c | 225 void *stack; in alloc_thread_stack_node() local 239 stack = kasan_reset_tag(s->addr); in alloc_thread_stack_node() 242 memset(stack, 0, THREAD_SIZE); in alloc_thread_stack_node() 245 tsk->stack = stack; in alloc_thread_stack_node() 246 return stack; in alloc_thread_stack_node() 254 stack = __vmalloc_node_range(THREAD_SIZE, THREAD_ALIGN, in alloc_thread_stack_node() 265 if (stack) { in alloc_thread_stack_node() 266 stack = kasan_reset_tag(stack); in alloc_thread_stack_node() 267 tsk->stack_vm_area = find_vm_area(stack); in alloc_thread_stack_node() 268 tsk->stack = stack; in alloc_thread_stack_node() [all …]
|
D | Makefile | 43 CFLAGS_kcov.o := $(call cc-option, -fno-conserve-stack) -fno-stack-protector
|
/kernel/trace/ |
D | trace_stack.c | 155 static void check_stack(unsigned long ip, unsigned long *stack) in check_stack() argument 162 this_size = ((unsigned long)stack) & (THREAD_SIZE-1); in check_stack() 171 if (!object_is_on_stack(stack)) in check_stack() 212 start = stack; in check_stack() 249 tracer_frame = (p - stack) * in check_stack() 295 unsigned long stack; in stack_trace_call() local 310 check_stack(ip, &stack); in stack_trace_call()
|
D | Kconfig | 37 If this is set, then arguments and stack can be found from 186 address on the current task structure into a stack of calls. 241 bool "Trace max stack" 247 This special tracer records the maximum stack footprint of the 251 kernel executes, and keeping a maximum stack depth value and 252 stack-trace saved. If this is configured with DYNAMIC_FTRACE 253 then it will not have any overhead while the stack tracer 256 To enable the stack tracer on bootup, pass in 'stacktrace' 259 The stack tracer can also be enabled or disabled via the
|
D | trace_events_synth.c | 473 long *stack, in trace_stack() argument 485 if (!stack[len]) in trace_stack() 497 memcpy(data_loc, stack, len); in trace_stack() 561 long *stack = (long *)(long)var_ref_vals[val_idx]; in trace_event_raw_event_synth() local 563 len = trace_stack(entry, event, stack, in trace_event_raw_event_synth()
|
/kernel/kcsan/ |
D | Makefile | 10 CFLAGS_core.o := $(call cc-option,-fno-conserve-stack) \ 11 -fno-stack-protector -DDISABLE_BRANCH_PROFILING
|
/kernel/bpf/ |
D | verifier.c | 618 static bool is_spilled_reg(const struct bpf_stack_state *stack) in is_spilled_reg() argument 620 return stack->slot_type[BPF_REG_SIZE - 1] == STACK_SPILL; in is_spilled_reg() 722 if (state->stack[i].slot_type[j] != STACK_INVALID) in print_verifier_state() 725 state->stack[i].slot_type[j]]; in print_verifier_state() 731 print_liveness(env, state->stack[i].spilled_ptr.live); in print_verifier_state() 732 if (is_spilled_reg(&state->stack[i])) { in print_verifier_state() 733 reg = &state->stack[i].spilled_ptr; in print_verifier_state() 827 dst->stack = copy_array(dst->stack, src->stack, n, sizeof(struct bpf_stack_state), in copy_stack_state() 829 if (!dst->stack) in copy_stack_state() 854 state->stack = realloc_array(state->stack, old_n, n, sizeof(struct bpf_stack_state)); in grow_stack_state() [all …]
|
D | core.c | 1752 u64 stack[stack_size / sizeof(u64)]; \ 1755 FP = (u64) (unsigned long) &stack[ARRAY_SIZE(stack)]; \ 1765 u64 stack[stack_size / sizeof(u64)]; \ 1768 FP = (u64) (unsigned long) &stack[ARRAY_SIZE(stack)]; \
|
D | btf.c | 259 struct resolve_vertex stack[MAX_RESOLVE_DEPTH]; member 1643 v = &env->stack[env->top_stack++]; in env_stack_push() 1661 env->stack[env->top_stack - 1].next_member = next_member; in env_stack_set_next_member() 1668 u32 type_id = env->stack[--(env->top_stack)].type_id; in env_stack_pop_resolved() 1679 return env->top_stack ? &env->stack[env->top_stack - 1] : NULL; in env_stack_peak()
|
/kernel/entry/ |
D | Makefile | 10 CFLAGS_common.o += -fno-stack-protector
|
/kernel/debug/kdb/ |
D | kdb_cmds | 3 # processes. Commands that require process data (including stack or
|
/kernel/dma/ |
D | debug.c | 1072 addr = (u8 *)current->stack + i * PAGE_SIZE + offset; in check_for_stack()
|
/kernel/events/ |
D | uprobes.c | 1913 ri->stack = user_stack_pointer(regs); in prepare_uretprobe()
|