/kernel/linux/linux-5.10/arch/loongarch/vdso/ |
H A D | Makefile | 29 -fno-stack-protector -fno-jump-tables -DDISABLE_BRANCH_PROFILING \ 31 $(call cc-option, -fno-stack-protector)
|
/kernel/linux/linux-5.10/arch/openrisc/kernel/ |
H A D | process.c | 121 * @usp: user stack pointer or fn for kernel thread 126 * At the top of a newly initialized kernel stack are two stacked pt_reg 160 /* Locate userspace context on stack... */ in copy_thread() 192 * _switch wants the kernel stack page in pt_regs->sp so that it in copy_thread() 234 new_ti = new->stack; in __switch_to() 235 old_ti = old->stack; in __switch_to()
|
/kernel/linux/linux-5.10/arch/um/ |
H A D | Makefile | 124 -fno-stack-protector $(call cc-option, -fno-stack-protector-all) 134 # Avoid binutils 2.39+ warnings by marking the stack non-executable and
|
/kernel/linux/linux-5.10/arch/x86/realmode/rm/ |
H A D | trampoline_64.S | 10 * in real mode with no stack, but the rest of the 11 * trampoline page to make our stack and everything else 52 # Setup stack 96 # Setup stack
|
/kernel/linux/linux-6.6/arch/loongarch/vdso/ |
H A D | Makefile | 26 -fno-stack-protector -fno-jump-tables -DDISABLE_BRANCH_PROFILING \ 28 $(call cc-option, -fno-stack-protector)
|
/kernel/linux/linux-5.10/tools/testing/selftests/x86/ |
H A D | single_step_syscall.c | 185 * no stack. The only sane way the kernel can possibly handle in main() 212 stack_t stack = { in main() local 216 if (sigaltstack(&stack, NULL) != 0) in main()
|
/kernel/linux/linux-6.6/arch/um/ |
H A D | Makefile | 124 -fno-stack-protector $(call cc-option, -fno-stack-protector-all) 134 # Avoid binutils 2.39+ warnings by marking the stack non-executable and
|
/third_party/node/lib/internal/process/ |
H A D | warning.js | 101 if (trace && warning.stack) { 102 msg += `${warning.stack}`;
|
/third_party/node/deps/v8/src/compiler/ |
H A D | control-equivalence.h | 77 Node* node; // Node that this stack entry belongs to. 80 // The stack is used during the undirected DFS walk. 93 bool on_stack : 1; // Indicates node is on DFS stack during walk. 164 // Mutates the DFS stack by pushing an entry. 165 void DFSPush(DFSStack& stack, Node* node, Node* from, DFSDirection dir); 167 // Mutates the DFS stack by popping an entry. 168 void DFSPop(DFSStack& stack, Node* node);
|
/third_party/node/deps/openssl/openssl/crypto/perlasm/ |
H A D | x86masm.pl | 115 $::stack=4; 121 $::stack=0;
|
/third_party/openssl/crypto/perlasm/ |
H A D | x86masm.pl | 115 $::stack=4; 121 $::stack=0;
|
/third_party/skia/src/gpu/tessellate/ |
H A D | PatchWriter.h | 181 PatchWriter& w, MiddleOutPolygonTriangulator::PoppedTriangleStack&& stack) { in operator <<() 182 for (auto [p0, p1, p2] : stack) { in operator <<() 180 operator <<( PatchWriter& w, MiddleOutPolygonTriangulator::PoppedTriangleStack&& stack) operator <<() argument
|
/third_party/skia/src/sksl/ |
H A D | SkSLThreadContext.h | 19 #include <stack> 217 std::stack<StackFrame, std::list<StackFrame>> fStack;
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | x509v3.rs | 22 stack!(stack_st_ACCESS_DESCRIPTION); 142 stack!(stack_st_DIST_POINT);
|
/third_party/python/Python/ |
H A D | getargs.c | 75 static int vgetargs1_impl(PyObject *args, PyObject *const *stack, Py_ssize_t nargs, 256 vgetargs1_impl(PyObject *compat_args, PyObject *const *stack, Py_ssize_t nargs, const char *format, in vgetargs1_impl() argument 274 assert(nargs == 0 || stack != NULL); in vgetargs1_impl() 392 msg = convertitem(stack[i], &format, p_va, in vgetargs1_impl() 415 PyObject **stack; in vgetargs1() local 427 stack = _PyTuple_ITEMS(args); in vgetargs1() 431 stack = NULL; in vgetargs1() 435 return vgetargs1_impl(args, stack, nargs, format, p_va, flags); in vgetargs1() 2273 PyObject **stack; in vgetargskeywordsfast() local 2284 stack in vgetargskeywordsfast() 2824 PyObject **stack; PyArg_UnpackTuple() local [all...] |
/kernel/linux/linux-5.10/kernel/bpf/ |
H A D | verifier.c | 40 * instruction by instruction and updates register/stack state. 52 * insn is less then 4K, but there are too many branches that change stack/regs. 74 * that it wants to construct a pointer to some element within stack. 76 * (and -20 constant is saved for further stack bounds checking). 77 * Meaning that this reg is a pointer to stack plus known immediate constant. 105 * 2nd argument should be a pointer to stack, which will be used inside 117 * the stack of eBPF program. 130 * Now verifier checks that [R2, R2 + map's key_size) are within stack limits 164 /* verifier_state + insn_idx are pushed to stack when branch is encountered */ 174 /* length of verifier log at the time this state was pushed on stack */ 571 is_spilled_reg(const struct bpf_stack_state *stack) is_spilled_reg() argument 3465 u16 stack = env->subprog_info[func->subprogno].stack_depth; update_stack_depth() local [all...] |
/kernel/linux/linux-5.10/arch/s390/ |
H A D | Makefile | 31 KBUILD_CFLAGS_DECOMPRESSOR += -fno-stack-protector 84 ifeq ($(call cc-option-yn,-mpacked-stack -mbackchain -msoft-float),y) 85 cflags-$(CONFIG_PACK_STACK) += -mpacked-stack -D__PACK_STACK
|
/kernel/linux/linux-5.10/arch/sparc/kernel/ |
H A D | etrap_32.S | 87 /* From kernel, allocate more kernel stack and 102 mov %t_kstack, %sp ! jump onto new stack 123 /* Save the kernel window onto the corresponding stack. */ 129 mov %t_kstack, %sp ! and onto new kernel stack 193 mov %t_kstack, %sp ! and onto kernel stack 217 /* Call MMU-architecture dependent stack checking 223 /* Architecture specific stack checking routines. When either 225 * as they have been safely stashed on the new kernel stack 243 * stack. Save bad user stack, an [all...] |
/kernel/linux/linux-5.10/arch/alpha/kernel/ |
H A D | process.c | 246 struct switch_stack *childstack, *stack; in copy_thread() local 277 stack = ((struct switch_stack *) regs) - 1; in copy_thread() 278 *childstack = *stack; in copy_thread() 289 /* switch stack follows right below pt_regs: */ in dump_elf_thread() 351 * pointer is the 6th saved long on the kernel stack and that the
|
/kernel/linux/linux-5.10/tools/testing/selftests/pidfd/ |
H A D | pidfd_test.c | 36 char *stack[1024] = { 0 }; in pidfd_clone() local 39 return __clone2(fn, stack, stack_size, flags | SIGCHLD, NULL, pidfd); in pidfd_clone() 41 return clone(fn, stack + stack_size, flags | SIGCHLD, NULL, pidfd); in pidfd_clone()
|
/kernel/linux/linux-5.10/tools/testing/selftests/cgroup/ |
H A D | test_kmem.c | 247 long stack; in spawn_1000_threads() local 262 stack = cg_read_key_long(cgroup, "memory.stat", "kernel_stack "); in spawn_1000_threads() 263 if (stack >= 4096 * 1000) in spawn_1000_threads()
|
/kernel/linux/linux-6.6/arch/sparc/kernel/ |
H A D | etrap_32.S | 87 /* From kernel, allocate more kernel stack and 102 mov %t_kstack, %sp ! jump onto new stack 123 /* Save the kernel window onto the corresponding stack. */ 129 mov %t_kstack, %sp ! and onto new kernel stack 193 mov %t_kstack, %sp ! and onto kernel stack 217 /* Call MMU-architecture dependent stack checking 223 /* Architecture specific stack checking routines. When either 225 * as they have been safely stashed on the new kernel stack 243 * stack. Save bad user stack, an [all...] |
/kernel/linux/linux-6.6/arch/um/include/shared/ |
H A D | os.h | 288 extern int copy_context_skas0(unsigned long stack, int pid); 290 extern void new_thread(void *stack, jmp_buf *buf, void (*handler)(void)); 292 extern int start_idle_thread(void *stack, jmp_buf *switch_buf);
|
/kernel/linux/linux-5.10/tools/perf/util/ |
H A D | unwind-libdw.c | 156 struct stack_dump *stack = &ui->sample->user_stack; in memory_read() local 165 end = start + stack->size; in memory_read() 183 *result = *(Dwarf_Word *)&stack->data[offset]; in memory_read()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | bpf_verifier.h | 23 /* Liveness marks, used for registers and spilled-regs (in stack slots). 139 * R1=fp-8 and R2=fp-8, but one of them points to this function stack 140 * while another to the caller's stack. To differentiate them 'frameno' 156 STACK_INVALID, /* nothing was stored in this stack slot */ 157 STACK_SPILL, /* register spilled into stack */ 181 * type of all registers and stack info 187 /* stack frame number of this function state from pov of 201 struct bpf_stack_state *stack; member 218 /* call stack tracking */ 230 * state is pushed into stack (t [all...] |