Searched refs:stack (Results 1 – 17 of 17) sorted by relevance
/lib/ |
A D | stackdepot.c | 389 return stack; in depot_pop_free_pool() 415 return stack; in depot_pop_free() 456 if (!stack) { in depot_alloc_stack() 458 if (!stack) in depot_alloc_stack() 463 stack->hash = hash; in depot_alloc_stack() 485 return stack; in depot_alloc_stack() 509 stack = pool + offset; in depot_fetch_stack() 513 return stack; in depot_fetch_stack() 602 if (stack->hash != hash || stack->size != size) in find_stack() 624 ret = stack; in find_stack() [all …]
|
A D | Kconfig.kasan | 19 Disables both inline and stack instrumentation. Selected by 157 Disables stack instrumentation and thus KASAN's ability to detect 158 out-of-bounds bugs in stack variables. 160 With Clang, stack instrumentation has a problem that causes excessive 161 stack usage, see https://llvm.org/pr38809. Thus, 165 avoid cluttering the log with stack overflow warnings. 167 With GCC, enabling stack instrumentation is assumed to be safe. 170 ARCH_DISABLE_KASAN_INLINE, stack instrumentation gets disabled
|
A D | ref_tracker.c | 85 depot_stack_handle_t stack = tracker->alloc_stack_handle; in ref_tracker_get_stats() local 90 if (stats->stacks[i].stack_handle == stack) in ref_tracker_get_stats() 95 stats->stacks[i].stack_handle = stack; in ref_tracker_get_stats() 147 depot_stack_handle_t stack; in __ref_tracker_dir_pr_ostream() local 165 stack = stats->stacks[i].stack_handle; in __ref_tracker_dir_pr_ostream() 166 if (sbuf && !stack_depot_snprint(stack, sbuf, STACK_BUF_SIZE, 4)) in __ref_tracker_dir_pr_ostream()
|
A D | Kconfig | 398 bool "Force CPU masks off stack" if DEBUG_PER_CPU_MAPS 401 them on the stack. This is a bit more expensive, but avoids 402 stack overflow. 572 Stack depot: stack trace storage that avoids duplication 578 Always initialize stack depot during early boot 581 int "Maximum number of frames in trace saved in stack depot"
|
A D | Makefile | 33 CFLAGS_string.o += -fno-stack-protector 311 CFLAGS_ubsan.o := -fno-stack-protector $(DISABLE_KSTACK_ERASE)
|
A D | Kconfig.debug | 442 int "Warn for stack frames larger than" 559 bool "Compile-time stack metadata validation" 565 runtime stack traces are more reliable. 799 used more stack space than previously exiting processes. 804 bool "Detect stack corruption on calls to schedule()" 991 bool "Check for stack overflows" 1100 chance to run. The current stack trace is displayed upon 1245 current stack trace (which you should report), but the 1642 and relevant stack traces. 1690 every process, showing its current stack trace. [all …]
|
A D | Kconfig.kgdb | 19 CONFIG_FRAME_POINTER to aid in producing more reliable stack
|
/lib/crypto/x86/ |
A D | sha512-avx-asm.S | 73 # Local variables (stack frame) 97 # Message Schedule (stack frame) 100 # W[t]+K[t] (stack frame)
|
A D | sha512-ssse3-asm.S | 73 # Local variables (stack frame) 95 # Message Schedule (stack frame) 98 # W[t]+K[t] (stack frame)
|
A D | sha256-avx-asm.S | 356 subq $STACK_SIZE, %rsp # allocate stack space 357 and $~15, %rsp # align stack pointer
|
A D | chacha-avx2-x86_64.S | 543 # scratch registers, we save the first four registers on the stack. The 552 # 4 * 32 byte stack, 32-byte aligned 575 # x0..3 on stack
|
A D | chacha-ssse3-x86_64.S | 232 # registers, we save the first four registers on the stack. The 270 # x0..3 on stack
|
A D | sha1-ssse3-and-avx.S | 78 and $~15, %rsp # align stack
|
A D | sha512-avx2-asm.S | 71 # 1st arg is %rdi, which is saved to the stack and accessed later via %r12 99 # Local variables (stack frame)
|
/lib/kunit/ |
A D | Kconfig | 34 trigger a kernel BUG(), and the associated stack trace, even when they
|
/lib/tests/ |
A D | fortify_kunit.c | 87 char stack[80] = "Test!"; in fortify_test_known_sizes() local 89 KUNIT_EXPECT_FALSE(test, __is_constexpr(__builtin_strlen(stack))); in fortify_test_known_sizes() 90 KUNIT_EXPECT_EQ(test, __compiletime_strlen(stack), 5); in fortify_test_known_sizes()
|
/lib/crypto/arm/ |
A D | sha1-armv4-large.S | 488 add sp,sp,#80*4 @ "deallocate" stack frame
|
Completed in 28 milliseconds