/openbmc/linux/arch/openrisc/include/asm/ |
H A D | unwinder.h | 16 void unwind_stack(void *data, unsigned long *stack,
|
/openbmc/linux/tools/testing/selftests/lkdtm/ |
H A D | tests.txt | 15 REPORT_STACK_CANARY repeat:2 ok: stack canaries differ 75 STACKLEAK_ERASING OK: the rest of the thread stack is properly erased
|
/openbmc/linux/arch/riscv/kernel/probes/ |
H A D | uprobes.c | 124 return regs->sp <= ret->stack; in arch_uretprobe_is_alive() 126 return regs->sp < ret->stack; in arch_uretprobe_is_alive()
|
/openbmc/linux/arch/loongarch/kernel/ |
H A D | uprobes.c | 112 return regs->regs[3] <= ret->stack; in arch_uretprobe_is_alive() 114 return regs->regs[3] < ret->stack; in arch_uretprobe_is_alive()
|
/openbmc/linux/arch/powerpc/include/asm/ |
H A D | thread_info.h | 200 static inline int arch_within_stack_frames(const void * const stack, in arch_within_stack_frames() argument 219 while (stack <= frame && frame < stackend) { in arch_within_stack_frames()
|
/openbmc/linux/arch/arm64/kernel/probes/ |
H A D | uprobes.c | 144 return regs->sp <= ret->stack; in arch_uretprobe_is_alive() 146 return regs->sp < ret->stack; in arch_uretprobe_is_alive()
|
/openbmc/linux/arch/loongarch/vdso/ |
H A D | Makefile | 26 -fno-stack-protector -fno-jump-tables -DDISABLE_BRANCH_PROFILING \ 28 $(call cc-option, -fno-stack-protector)
|
/openbmc/linux/arch/um/include/shared/skas/ |
H A D | mm_id.h | 14 unsigned long stack; member
|
H A D | skas.h | 13 extern int user_thread(unsigned long stack, int flags);
|
/openbmc/openbmc/poky/meta/recipes-core/glib-2.0/glib-2.0/meson.cross.d/ |
H A D | common | 2 # On all known supported architectures the stack grows down
|
/openbmc/libbej/include/libbej/ |
H A D | bej_encoder_metadata.h | 30 struct BejPointerStackCallback* stack);
|
/openbmc/linux/arch/arm/common/ |
H A D | bL_switcher.c | 126 void *stack = current_thread_info() + 1; in bL_switchpoint() local 127 stack = PTR_ALIGN(stack, L1_CACHE_BYTES); in bL_switchpoint() 128 stack += clusterid * STACK_SIZE + STACK_SIZE; in bL_switchpoint() 129 call_with_stack(bL_do_switch, (void *)_arg, stack); in bL_switchpoint()
|
/openbmc/linux/arch/s390/kernel/ |
H A D | entry.S | 185 stg %r15,__THREAD_ksp(%r1,%r2) # store kernel stack of prev 186 lg %r15,0(%r4,%r3) # start of kernel stack of next 187 agr %r15,%r5 # end of kernel stack of next 189 stg %r15,__LC_KERNEL_STACK # store end of kernel stack 190 lg %r15,__THREAD_ksp(%r1,%r3) # load kernel stack of next
|
/openbmc/linux/arch/sh/include/asm/ |
H A D | stacktrace.h | 18 unsigned long *stack,
|
/openbmc/u-boot/doc/ |
H A D | README.SPL | 77 Estimating stack usage 81 stack usage at various points in run sequence of SPL. The -fstack-usage option 83 will give stack usage information and cflow can construct program flow.
|
H A D | README.xtensa | 63 file and reserves a stack frame. This is an integral part of the 67 register arguments and adjust the stack to handle arguments that cannot 71 instruction to determine the stack frame size, and adjusting the stack
|
/openbmc/linux/arch/x86/coco/ |
H A D | Makefile | 4 CFLAGS_core.o += -fno-stack-protector
|
/openbmc/qemu/configs/targets/ |
H A D | microblazeel-softmmu.mak | 4 TARGET_XML_FILES=gdb-xml/microblaze-core.xml gdb-xml/microblaze-stack-protect.xml
|
/openbmc/linux/tools/perf/bench/ |
H A D | mem-memset-x86-64-asm.S | 15 .section .note.GNU-stack,"",@progbits
|
/openbmc/openbmc/poky/meta/recipes-support/libunwind/libunwind/ |
H A D | 0001-src-Gtrace-remove-unguarded-print-calls.patch | 40 /* Resume stack at signal restoration point. The stack is not
|
/openbmc/linux/arch/xtensa/ |
H A D | Kconfig.debug | 39 This option allows you to set the stack depth that the kernel 40 prints in stack traces.
|
/openbmc/linux/tools/perf/Documentation/ |
H A D | perf-top.txt | 184 Enables call-graph (stack chain/backtrace) recording. 187 Setup and enable call-graph (stack chain/backtrace) recording, 198 --max-stack:: 199 Set the stack depth limit when parsing the callchain, anything 202 workloads that can have a very long callchain stack. 238 Enable taken branch stack sampling. Any type of taken branch may be sampled. 243 Enable taken branch stack sampling. Each sample captures a series of consecutive 252 levels are subject to permissions. When sampling on multiple events, branch stack sampling 345 Disabled by default. In common cases with call stack overflows, 346 it can recreate better call stacks than the default lbr call stack
|
/openbmc/linux/arch/arm/kernel/ |
H A D | setup.c | 136 struct stack { struct 144 static struct stack stacks[NR_CPUS]; argument 535 struct stack *stk = &stacks[cpu]; in cpu_init() 582 "I" (offsetof(struct stack, irq[0])), in cpu_init() 584 "I" (offsetof(struct stack, abt[0])), in cpu_init() 586 "I" (offsetof(struct stack, und[0])), in cpu_init() 588 "I" (offsetof(struct stack, fiq[0])), in cpu_init()
|
/openbmc/linux/arch/m68k/ifpsp060/ |
H A D | CHANGES | 73 the package creates a 16-byte access error stack frame 74 from the current exception stack frame and exits 81 VOFF = $4008 (stack frame format type) 103 VOFF = $4008 (stack frame format type)
|
/openbmc/u-boot/arch/x86/cpu/ |
H A D | mp_init.c | 221 char *stack; in load_sipi_vector() local 246 stack = memalign(4096, size); in load_sipi_vector() 247 if (!stack) in load_sipi_vector() 249 params->stack_top = (u32)(stack + size); in load_sipi_vector()
|