/kernel/linux/linux-5.10/arch/x86/mm/ |
H A D | fault.c | 30 #include <asm/cpu_entry_area.h> /* exception stack */ 570 * kernel or IST stack. in show_fault_oops() 683 * stack in the direct map, but that's not an overflow -- check in no_context() 687 (((unsigned long)tsk->stack - 1 - address < PAGE_SIZE) || in no_context() 688 address - ((unsigned long)tsk->stack + THREAD_SIZE) < PAGE_SIZE)) { in no_context() 689 unsigned long stack = __this_cpu_ist_top_va(DF) - sizeof(void *); in no_context() local 691 * We're likely to be running with very little stack space in no_context() 698 * break the console driver and lose most of the stack dump. in no_context() 700 asm volatile ("movq %[stack], %%rsp\n\t" in no_context() 704 : "D" ("kernel stack overflo in no_context() [all...] |
/kernel/linux/linux-5.10/arch/m68k/fpsp040/ |
H A D | gen_except.S | 7 | user_fpcr on the stack with the exception status byte 11 | the stack frame in memory with the exceptional operand(s). 86 | Or in the FPSR from the emulation with the USER_FPSR on the stack. 117 | Or in the FPSR from the emulation with the USER_FPSR on the stack. 133 | Or in the FPSR from the emulation with the USER_FPSR on the stack. 389 | Change integer stack to look like trace stack 391 | exception is already in the integer stack (is 394 | If the current frame is already a 6-word stack then all 396 | If the frame is only a 4-word stack (meanin [all...] |
H A D | x_store.S | 53 | in the USER_FPn variable on the stack because all exception 151 movel %d0,LOCAL_EX(%a1) |put the new exp back on the stack 157 movel %d0,LOCAL_EX(%a1) |put the new exp back on the stack 227 movel %d0,L_SCR1(%a6) |put the new exp back on the stack
|
/kernel/linux/linux-6.6/arch/m68k/fpsp040/ |
H A D | gen_except.S | 7 | user_fpcr on the stack with the exception status byte 11 | the stack frame in memory with the exceptional operand(s). 86 | Or in the FPSR from the emulation with the USER_FPSR on the stack. 117 | Or in the FPSR from the emulation with the USER_FPSR on the stack. 133 | Or in the FPSR from the emulation with the USER_FPSR on the stack. 389 | Change integer stack to look like trace stack 391 | exception is already in the integer stack (is 394 | If the current frame is already a 6-word stack then all 396 | If the frame is only a 4-word stack (meanin [all...] |
H A D | x_store.S | 53 | in the USER_FPn variable on the stack because all exception 151 movel %d0,LOCAL_EX(%a1) |put the new exp back on the stack 157 movel %d0,LOCAL_EX(%a1) |put the new exp back on the stack 227 movel %d0,L_SCR1(%a6) |put the new exp back on the stack
|
/kernel/linux/linux-5.10/sound/soc/sof/intel/ |
H A D | byt.c | 96 u32 *stack, size_t stack_words) in byt_get_registers() 114 /* then get the stack */ in byt_get_registers() 116 sof_mailbox_read(sdev, offset, stack, stack_words * sizeof(u32)); in byt_get_registers() 123 u32 stack[BYT_STACK_DUMP_SIZE]; in byt_dump() local 129 byt_get_registers(sdev, &xoops, &panic_info, stack, in byt_dump() 131 snd_sof_get_status(sdev, status, panic, &xoops, &panic_info, stack, in byt_dump() 93 byt_get_registers(struct snd_sof_dev *sdev, struct sof_ipc_dsp_oops_xtensa *xoops, struct sof_ipc_panic_info *panic_info, u32 *stack, size_t stack_words) byt_get_registers() argument
|
/third_party/node/test/parallel/ |
H A D | test-assert.js | 161 assert.ok(!e.stack.includes('at Function.doesNotThrow')); 313 assert.ok(!e.stack.includes('at Function.throws')); 404 assert.ok(!e.stack.includes('doesNotThrow'), e); 1373 assert(!err.stack.includes('hidden')); 1374 assert(!err2.stack.includes('hidden'));
|
/third_party/node/deps/v8/src/runtime/ |
H A D | runtime-wasm.cc | 203 // Check if this is a real stack overflow. in RUNTIME_FUNCTION() 567 // Stepping can repeatedly create code, and code GC requires stack guards to in RUNTIME_FUNCTION() 721 // Synchronize the stack limit with the active continuation for stack-switching. 722 // This can be done before or after changing the stack pointer itself, as long 723 // as we update both before the next stack check. 727 // at the next stack check. 732 auto stack = Managed<wasm::StackMemory>::cast(continuation.stack()).get(); in SyncStackLimit() local 734 PrintF("Switch to stack # in SyncStackLimit() [all...] |
/third_party/node/deps/v8/src/torque/ |
H A D | instructions.h | 66 void TypeInstruction(Stack<const Type*>* stack, ControlFlowGraph* cfg) \ 193 virtual void TypeInstruction(Stack<const Type*>* stack, 198 void InvalidateTransientTypes(Stack<const Type*>* stack) const; 265 void TypeInstruction(Stack<const Type*>* stack, ControlFlowGraph* cfg) const { in TypeInstruction() argument 266 return instruction_->TypeInstruction(stack, cfg); in TypeInstruction()
|
/third_party/node/deps/openssl/openssl/crypto/ |
H A D | sparccpuid.S | 28 ! Keep in mind that this does not excuse us from wiping the stack! 30 ! resides on the stack, toward lower addresses]. To facilitate for 31 ! stack wiping I return pointer to the top of stack of the *caller*. 133 add %fp,BIAS,%i0 ! return pointer to caller“s top of stack
|
/third_party/openssl/crypto/ |
H A D | sparccpuid.S | 28 ! Keep in mind that this does not excuse us from wiping the stack! 30 ! resides on the stack, toward lower addresses]. To facilitate for 31 ! stack wiping I return pointer to the top of stack of the *caller*. 133 add %fp,BIAS,%i0 ! return pointer to caller“s top of stack
|
/third_party/skia/tests/ |
H A D | SkBlockAllocatorTest.cpp | 76 // Tests stack/member initialization, option #1 described in doc in DEF_TEST() 77 SkBlockAllocator stack{GrowthPolicy::kFixed, 2048}; in DEF_TEST() 78 SkDEBUGCODE(stack.validate();) in DEF_TEST() 80 REPORTER_ASSERT(r, stack.preallocSize() == sizeof(SkBlockAllocator)); in DEF_TEST() 81 REPORTER_ASSERT(r, stack.preallocUsableSpace() == (size_t) stack.currentBlock()->avail()); in DEF_TEST() 268 // Confirm that a bunch of allocations and then releases in stack order fully goes back to the in DEF_TEST() 269 // start of the block (i.e. unwinds the entire stack, and not just the last cursor position) in DEF_TEST()
|
/third_party/skia/third_party/externals/abseil-cpp/absl/synchronization/internal/ |
H A D | graphcycles.cc | 286 int priority; // Priority of recorded stack trace. 287 int nstack; // Depth of recorded stack trace. 288 void* stack[40]; // stack[0,nstack-1] holds stack trace for node. member 355 Vec<int32_t> stack_; // Emulates recursion stack for depth-first searches 533 // Avoid recursion since stack space might be limited. in ForwardDFS() 534 // We instead keep a stack of nodes to visit. in ForwardDFS() 674 int (*get_stack_trace)(void** stack, int)) { in UpdateStackTrace() 679 n->nstack = (*get_stack_trace)(n->stack, ABSL_ARRAYSIZ in UpdateStackTrace() 673 UpdateStackTrace(GraphId id, int priority, int (*get_stack_trace)(void** stack, int)) UpdateStackTrace() argument [all...] |
/third_party/vulkan-loader/loader/ |
H A D | unknown_ext_chain_gas_x86.S | 23 # creating a stack frame, because the actual parameters of the call are not known. Since the first parameter is known to be a 65 sub rsp, 56 # Create the stack frame 72 add rsp, 56 # Clean up the stack frame 99 mov [esp + 4], ecx # Overwrite the wrapped VkPhysicalDevice with the unwrapped one (on the stack) 145 .section .note.GNU-stack,"",%progbits
|
/third_party/node/deps/v8/src/inspector/ |
H A D | value-mirror.cc | 157 // For whatever reason, ASan on MacOS has bigger stack frames. in toProtocolValue() 252 // * Usually return the stack trace found in the {stack} property. 253 // * If the stack trace does not start with the class name of the passed 255 // {message} property and the rest of the stack trace. 256 // (The stack trace is only used if {message} was also found in 257 // said stack trace). 264 v8::base::Optional<String16> stack; in descriptionForError() local 267 if (object->Get(context, toV8String(isolate, "stack")) in descriptionForError() 270 stack in descriptionForError() [all...] |
/third_party/python/Lib/test/ |
H A D | test_traceback.py | 1001 # It also varies depending on the platform (stack size) 2353 stack = Skip_G.extract( 2356 self.assertEqual(len(stack), 1) 2359 stack[0], 2377 self.assertEqual(expected_stack, exc.stack) 2399 self.assertEqual(expected_stack, exc.stack) 2421 self.assertEqual(expected_stack, exc.stack) 2441 self.assertEqual(expected_stack, exc.stack) 2486 self.assertEqual(expected_stack, exc.stack) 2506 self.assertEqual(expected_stack, exc.stack) [all...] |
/kernel/linux/linux-5.10/arch/arm/mach-omap1/ |
H A D | sleep.S | 68 @ save registers on stack 124 * stack. 148 @ save registers on stack 207 * stack, reset the ARM_IDLECT1 and ARM_IDLECT2. 223 @ save registers on stack 355 * stack.
|
/kernel/linux/linux-5.10/arch/parisc/kernel/ |
H A D | irq.c | 159 seq_puts(p, " Kernel stack usage\n"); in arch_show_interrupts() 164 seq_puts(p, " Interrupt stack usage\n"); in arch_show_interrupts() 380 #define IRQ_STACK_SIZE (4096 << 4) /* 64k irq stack size */ 382 #define IRQ_STACK_SIZE (4096 << 3) /* 32k irq stack size */ 386 unsigned long stack[IRQ_STACK_SIZE/sizeof(unsigned long)]; member 404 /* Our stack starts directly behind the thread_info struct. */ in stack_overflow_check() 412 * to check for stack overflow. We will only check the kernel stack. */ in stack_overflow_check() 420 /* calculate kernel stack usage */ in stack_overflow_check() 424 goto check_kernel_stack; /* found kernel stack */ in stack_overflow_check() [all...] |
/kernel/linux/linux-5.10/arch/powerpc/kernel/ |
H A D | Makefile | 20 CFLAGS_prom_init.o += -fno-stack-protector 178 CFLAGS_setup_64.o += -fno-stack-protector 179 CFLAGS_paca.o += -fno-stack-protector
|
/kernel/linux/linux-5.10/arch/sparc/kernel/ |
H A D | signal_32.c | 53 stack_t stack; member 180 err |= restore_altstack(&sf->stack); in do_rt_sigreturn() 205 * If we are on the alternate signal stack and would overflow it, don't. in get_sigframe() 211 /* This is the X/Open sanctioned signal stack switching. */ in get_sigframe() 214 /* Always align the stack frame. This handles two cases. First, in get_sigframe() 215 * sigaltstack need not be mindful of platform specific stack in get_sigframe() 216 * alignment. Second, if we took this signal because the stack in get_sigframe() 373 err |= __save_altstack(&sf->stack, regs->u_regs[UREG_FP]); in setup_rt_frame() 550 /* If the current stack was set with sigaltstack, don't in do_sys_sigstack() 556 /* Since we don't know the extent of the stack, an in do_sys_sigstack() [all...] |
/kernel/linux/linux-5.10/arch/x86/include/asm/ |
H A D | processor.h | 283 * stack if we were to go through the sysenter path from vm86 373 char stack[PAGE_SIZE]; member 377 struct entry_stack stack; member 426 char stack[IRQ_STACK_SIZE]; member 441 * GCC hardcodes the stack canary as %gs:40. Since the 443 * 48 bytes of the irq stack for the canary. 465 * Make sure stack canary segment base is cached-aligned: 476 /* Per CPU softirq stack pointer */
|
/kernel/linux/linux-5.10/arch/arc/mm/ |
H A D | tlbex.S | 46 ; ARC700 Exception Handling doesn't auto-switch stack and it only provides 55 ; [All of this dance is to avoid stack switching for each TLB Miss, since we 181 ; need to switch to kernel mode stack to call error routine 408 ; (stack switching / save the complete reg-file).
|
/kernel/linux/linux-6.6/arch/parisc/kernel/ |
H A D | irq.c | 139 seq_puts(p, " Kernel stack usage\n"); in arch_show_interrupts() 144 seq_puts(p, " Interrupt stack usage\n"); in arch_show_interrupts() 357 #define IRQ_STACK_SIZE (4096 << 4) /* 64k irq stack size */ 359 #define IRQ_STACK_SIZE (4096 << 3) /* 32k irq stack size */ 363 unsigned long stack[IRQ_STACK_SIZE/sizeof(unsigned long)]; member 388 * to check for stack overflow. We will only check the kernel stack. */ in stack_overflow_check() 396 /* calculate kernel stack usage */ in stack_overflow_check() 400 goto check_kernel_stack; /* found kernel stack */ in stack_overflow_check() 402 /* check irq stack usag in stack_overflow_check() [all...] |
/kernel/linux/linux-6.6/arch/sparc/kernel/ |
H A D | signal_32.c | 53 stack_t stack; member 180 err |= restore_altstack(&sf->stack); in do_rt_sigreturn() 205 * If we are on the alternate signal stack and would overflow it, don't. in get_sigframe() 211 /* This is the X/Open sanctioned signal stack switching. */ in get_sigframe() 214 /* Always align the stack frame. This handles two cases. First, in get_sigframe() 215 * sigaltstack need not be mindful of platform specific stack in get_sigframe() 216 * alignment. Second, if we took this signal because the stack in get_sigframe() 373 err |= __save_altstack(&sf->stack, regs->u_regs[UREG_FP]); in setup_rt_frame() 550 /* If the current stack was set with sigaltstack, don't in do_sys_sigstack() 556 /* Since we don't know the extent of the stack, an in do_sys_sigstack() [all...] |
/kernel/linux/linux-5.10/net/sched/ |
H A D | ematch.c | 18 * causing the current position in the sequence to be pushed onto a stack 21 * marker is reached causing the position to be restored from the stack. 505 int stack[CONFIG_NET_EMATCH_STACK]; in __tcf_em_tree_match() local 515 stack[stackp++] = match_idx; in __tcf_em_tree_match() 530 match_idx = stack[--stackp]; in __tcf_em_tree_match() 547 net_warn_ratelimited("tc ematch: local stack overflow, increase NET_EMATCH_STACK\n"); in __tcf_em_tree_match()
|