Searched refs:stack (Results 1 – 13 of 13) sorted by relevance
/kernel/ |
D | fork.c | 232 struct vm_stack *vm_stack = tsk->stack; in thread_stack_delayed_free() 284 void *stack; in alloc_thread_stack_node() local 298 stack = kasan_reset_tag(s->addr); in alloc_thread_stack_node() 301 memset(stack, 0, THREAD_SIZE); in alloc_thread_stack_node() 309 tsk->stack = stack; in alloc_thread_stack_node() 318 stack = __vmalloc_node_range(THREAD_SIZE, THREAD_ALIGN, in alloc_thread_stack_node() 323 if (!stack) in alloc_thread_stack_node() 326 vm = find_vm_area(stack); in alloc_thread_stack_node() 328 vfree(stack); in alloc_thread_stack_node() 337 stack = kasan_reset_tag(stack); in alloc_thread_stack_node() [all …]
|
D | Makefile | 42 CFLAGS_kcov.o := $(call cc-option, -fno-conserve-stack) -fno-stack-protector
|
/kernel/trace/ |
D | trace_stack.c | 155 static void check_stack(unsigned long ip, unsigned long *stack) in check_stack() argument 162 this_size = ((unsigned long)stack) & (THREAD_SIZE-1); in check_stack() 171 if (!object_is_on_stack(stack)) in check_stack() 212 start = stack; in check_stack() 249 tracer_frame = (p - stack) * in check_stack() 295 unsigned long stack; in stack_trace_call() local 310 check_stack(ip, &stack); in stack_trace_call()
|
D | Kconfig | 48 If this is set, then arguments and stack can be found from 218 address on the current task structure into a stack of calls. 288 bool "Trace max stack" 294 This special tracer records the maximum stack footprint of the 298 kernel executes, and keeping a maximum stack depth value and 299 stack-trace saved. If this is configured with DYNAMIC_FTRACE 300 then it will not have any overhead while the stack tracer 303 To enable the stack tracer on bootup, pass in 'stacktrace' 306 The stack tracer can also be enabled or disabled via the
|
D | trace_events_synth.c | 492 long *stack, in trace_stack() argument 504 if (!stack[len]) in trace_stack() 516 memcpy(data_loc, stack, len); in trace_stack() 580 long *stack = (long *)(long)var_ref_vals[val_idx]; in trace_event_raw_event_synth() local 582 len = trace_stack(entry, event, stack, in trace_event_raw_event_synth()
|
/kernel/kcsan/ |
D | Makefile | 10 CFLAGS_core.o := $(call cc-option,-fno-conserve-stack) \ 12 -fno-stack-protector -DDISABLE_BRANCH_PROFILING
|
/kernel/bpf/ |
D | verifier.c | 722 state->stack[spi].slot_type[i] = STACK_DYNPTR; in mark_stack_slots_dynptr() 723 state->stack[spi - 1].slot_type[i] = STACK_DYNPTR; in mark_stack_slots_dynptr() 730 state->stack[spi].spilled_ptr.dynptr.first_slot = true; in mark_stack_slots_dynptr() 731 state->stack[spi].spilled_ptr.dynptr.type = type; in mark_stack_slots_dynptr() 732 state->stack[spi - 1].spilled_ptr.dynptr.type = type; in mark_stack_slots_dynptr() 740 state->stack[spi].spilled_ptr.id = id; in mark_stack_slots_dynptr() 741 state->stack[spi - 1].spilled_ptr.id = id; in mark_stack_slots_dynptr() 758 state->stack[spi].slot_type[i] = STACK_INVALID; in unmark_stack_slots_dynptr() 759 state->stack[spi - 1].slot_type[i] = STACK_INVALID; in unmark_stack_slots_dynptr() 763 if (dynptr_type_refcounted(state->stack[spi].spilled_ptr.dynptr.type)) { in unmark_stack_slots_dynptr() [all …]
|
D | core.c | 2012 u64 stack[stack_size / sizeof(u64)]; \ 2015 FP = (u64) (unsigned long) &stack[ARRAY_SIZE(stack)]; \ 2025 u64 stack[stack_size / sizeof(u64)]; \ 2028 FP = (u64) (unsigned long) &stack[ARRAY_SIZE(stack)]; \
|
D | btf.c | 285 struct resolve_vertex stack[MAX_RESOLVE_DEPTH]; member 1778 v = &env->stack[env->top_stack++]; in env_stack_push() 1796 env->stack[env->top_stack - 1].next_member = next_member; in env_stack_set_next_member() 1803 u32 type_id = env->stack[--(env->top_stack)].type_id; in env_stack_pop_resolved() 1814 return env->top_stack ? &env->stack[env->top_stack - 1] : NULL; in env_stack_peak()
|
/kernel/entry/ |
D | Makefile | 10 CFLAGS_common.o += -fno-stack-protector
|
/kernel/debug/kdb/ |
D | kdb_cmds | 3 # processes. Commands that require process data (including stack or
|
/kernel/dma/ |
D | debug.c | 1070 addr = (u8 *)current->stack + i * PAGE_SIZE + offset; in check_for_stack()
|
/kernel/events/ |
D | uprobes.c | 1912 ri->stack = user_stack_pointer(regs); in prepare_uretprobe()
|