Home
last modified time | relevance | path

Searched refs:stack (Results 1 – 17 of 17) sorted by relevance

/lib/
A Dstackdepot.c389 return stack; in depot_pop_free_pool()
415 return stack; in depot_pop_free()
456 if (!stack) { in depot_alloc_stack()
458 if (!stack) in depot_alloc_stack()
463 stack->hash = hash; in depot_alloc_stack()
485 return stack; in depot_alloc_stack()
509 stack = pool + offset; in depot_fetch_stack()
513 return stack; in depot_fetch_stack()
602 if (stack->hash != hash || stack->size != size) in find_stack()
624 ret = stack; in find_stack()
[all …]
A DKconfig.kasan19 Disables both inline and stack instrumentation. Selected by
157 Disables stack instrumentation and thus KASAN's ability to detect
158 out-of-bounds bugs in stack variables.
160 With Clang, stack instrumentation has a problem that causes excessive
161 stack usage, see https://llvm.org/pr38809. Thus,
165 avoid cluttering the log with stack overflow warnings.
167 With GCC, enabling stack instrumentation is assumed to be safe.
170 ARCH_DISABLE_KASAN_INLINE, stack instrumentation gets disabled
A Dref_tracker.c85 depot_stack_handle_t stack = tracker->alloc_stack_handle; in ref_tracker_get_stats() local
90 if (stats->stacks[i].stack_handle == stack) in ref_tracker_get_stats()
95 stats->stacks[i].stack_handle = stack; in ref_tracker_get_stats()
147 depot_stack_handle_t stack; in __ref_tracker_dir_pr_ostream() local
165 stack = stats->stacks[i].stack_handle; in __ref_tracker_dir_pr_ostream()
166 if (sbuf && !stack_depot_snprint(stack, sbuf, STACK_BUF_SIZE, 4)) in __ref_tracker_dir_pr_ostream()
A DKconfig398 bool "Force CPU masks off stack" if DEBUG_PER_CPU_MAPS
401 them on the stack. This is a bit more expensive, but avoids
402 stack overflow.
572 Stack depot: stack trace storage that avoids duplication
578 Always initialize stack depot during early boot
581 int "Maximum number of frames in trace saved in stack depot"
A DMakefile33 CFLAGS_string.o += -fno-stack-protector
311 CFLAGS_ubsan.o := -fno-stack-protector $(DISABLE_KSTACK_ERASE)
A DKconfig.debug442 int "Warn for stack frames larger than"
559 bool "Compile-time stack metadata validation"
565 runtime stack traces are more reliable.
799 used more stack space than previously exiting processes.
804 bool "Detect stack corruption on calls to schedule()"
991 bool "Check for stack overflows"
1100 chance to run. The current stack trace is displayed upon
1245 current stack trace (which you should report), but the
1642 and relevant stack traces.
1690 every process, showing its current stack trace.
[all …]
A DKconfig.kgdb19 CONFIG_FRAME_POINTER to aid in producing more reliable stack
/lib/crypto/x86/
A Dsha512-avx-asm.S73 # Local variables (stack frame)
97 # Message Schedule (stack frame)
100 # W[t]+K[t] (stack frame)
A Dsha512-ssse3-asm.S73 # Local variables (stack frame)
95 # Message Schedule (stack frame)
98 # W[t]+K[t] (stack frame)
A Dsha256-avx-asm.S356 subq $STACK_SIZE, %rsp # allocate stack space
357 and $~15, %rsp # align stack pointer
A Dchacha-avx2-x86_64.S543 # scratch registers, we save the first four registers on the stack. The
552 # 4 * 32 byte stack, 32-byte aligned
575 # x0..3 on stack
A Dchacha-ssse3-x86_64.S232 # registers, we save the first four registers on the stack. The
270 # x0..3 on stack
A Dsha1-ssse3-and-avx.S78 and $~15, %rsp # align stack
A Dsha512-avx2-asm.S71 # 1st arg is %rdi, which is saved to the stack and accessed later via %r12
99 # Local variables (stack frame)
/lib/kunit/
A DKconfig34 trigger a kernel BUG(), and the associated stack trace, even when they
/lib/tests/
A Dfortify_kunit.c87 char stack[80] = "Test!"; in fortify_test_known_sizes() local
89 KUNIT_EXPECT_FALSE(test, __is_constexpr(__builtin_strlen(stack))); in fortify_test_known_sizes()
90 KUNIT_EXPECT_EQ(test, __compiletime_strlen(stack), 5); in fortify_test_known_sizes()
/lib/crypto/arm/
A Dsha1-armv4-large.S488 add sp,sp,#80*4 @ "deallocate" stack frame

Completed in 28 milliseconds