/arch/sh/kernel/cpu/sh2a/ |
H A D | entry.S | 22 /* Offsets to the stack */ 39 ! stack 58 add r2,r0 ! r0 = kernel stack tail 59 mov r15,r2 ! r2 = user stack top 60 mov r0,r15 ! switch kernel stack 74 mov r2,r8 ! r8 = previus stack top 76 ! restore previous stack 87 mov r2,r8 ! r8 = previous stack top 155 /* Unwind the stack and jmp to the debug entry */
|
/arch/sh/kernel/cpu/sh3/ |
H A D | entry.S | 41 * ptrace needs to have all regs on the stack. 47 * r15 = stack pointer 57 /* Offsets to the stack */ 99 ! It can be valid access, such as stack grow and/or C-O-W. 191 /* Unwind the stack and jmp to the debug entry */ 210 ! - restore r0, r1, r2, r3, r4, r5, r6, r7 from the stack 212 ! - restore r8, r9, r10, r11, r12, r13, r14, r15 from the stack 216 ! k4 returns original stack pointer 242 mov.l @r15+, k4 ! original stack pointer 305 ! - switch to kernel stack [all...] |
/arch/tile/include/gxio/ |
H A D | mpipe.h | 79 * this information is then used to choose which buffer stack will be 83 * The rules by which the buffer stack and bucket are chosen can be 119 * mPIPE DMA engine pops at least one buffer off of the 'buffer stack' 121 * that buffer. Each buffer stack provides a hardware-accelerated 122 * stack of data buffers with the same size. If the packet data is 123 * larger than the buffers provided by the chosen buffer stack, the 131 * Applications can push buffers onto a buffer stack by calling 134 * buffers should be returned to the stack. 143 * a given buffer stack. Since each buffer stack i 457 gxio_mpipe_push_buffer(gxio_mpipe_context_t *context, unsigned int stack, void *buffer) argument 487 gxio_mpipe_pop_buffer(gxio_mpipe_context_t *context, unsigned int stack) argument [all...] |
/arch/arm/kernel/ |
H A D | entry-header.S | 20 @ Most of the stack format comes from struct pt_regs, but with 27 * The SWI code relies on the fact that R0 is at the bottom of the stack 61 * automatically saved on the current stack (32 words) before 62 * switching to the exception stack (SP_main). 78 @ exception happend that is either on the main or the process stack. 79 @ Bit 2 of EXC_RETURN stored in the lr register specifies which stack 90 @ Linux expects to have irqs off. Do it here before taking stack space 102 @ calculate the original stack pointer value. 105 @ The cpu might automatically 8-byte align the stack. Bit 9 106 @ of the saved xPSR specifies if stack alignin [all...] |
/arch/m68k/fpsp040/ |
H A D | skeleton.S | 74 movel %sp,%sp@- | stack frame pointer argument 132 | We do not have the bug 1232 case. Clean up the stack and call 165 movel %sp,%sp@- | stack frame pointer argument 191 movel %sp,%sp@- | stack frame pointer argument 217 movel %sp,%sp@- | stack frame pointer argument 239 movel %sp,%sp@- | stack frame pointer argument 261 movel %sp,%sp@- | stack frame pointer argument 289 movel %sp,%sp@- | stack frame pointer argument 310 movel %sp,%sp@- | stack frame pointer argument 332 movel %sp,%sp@- | stack fram [all...] |
H A D | sgetem.S | 17 | the floating-point save stack. 84 movew %d0,LOCAL_EX(%a0) |move the sign & exp back to fsave stack 97 movel %d0,LOCAL_HI(%a0) |put ms mant back on stack 98 movel %d1,LOCAL_LO(%a0) |put ls mant back on stack
|
/arch/um/kernel/ |
H A D | process.c | 55 void free_stack(unsigned long stack, int order) argument 57 free_pages(stack, order); 219 unsigned long stack; local 221 stack = sp & (PAGE_MASK << CONFIG_KERNEL_STACK_ORDER); 222 return stack != (unsigned long) current_thread_info(); 384 /* Bail if the process has no kernel stack for some reason */ 390 * Bail if the stack pointer is below the bottom of the kernel 391 * stack for some reason
|
/arch/ |
H A D | Kconfig | 228 the API needed to access registers and stack entries from pt_regs, 275 Support user stack dumps for perf event samples. This needs 276 access to the user stack pointer which is not unified across 352 - it has implemented a stack canary (e.g. __stack_chk_guard) 357 Set when a stack-protector mode is enabled, so that the build 365 This option turns on the "stack-protector" GCC feature. This 367 the stack just before the return address, and validates 376 Disable "stack-protector" GCC feature. 382 Functions will have the stack-protector canary logic added if they 383 have an 8-byte or larger character array on the stack [all...] |
/arch/m32r/kernel/ |
H A D | ptrace.c | 36 * This routine will get a word off of the process kernel stack. 41 unsigned long *stack; local 43 stack = (unsigned long *)task_pt_regs(task); 45 return stack[offset]; 49 * This routine will put a word on the process kernel stack. 54 unsigned long *stack; local 56 stack = (unsigned long *)task_pt_regs(task); 57 stack[offset] = data; 69 * actually access the pt_regs stored on the kernel stack.
|
/arch/m68k/kernel/ |
H A D | traps.c | 230 /* after an exception in a writeback the stack frame corresponding 679 * exception stack frame into the error_code value needed by 813 void show_trace(unsigned long *stack) argument 820 addr = (unsigned long)stack + THREAD_SIZE - 1; 823 while (stack + 1 <= endstack) { 824 addr = *stack++; 937 void show_stack(struct task_struct *task, unsigned long *stack) argument 943 if (!stack) { 945 stack = (unsigned long *)task->thread.esp0; 947 stack [all...] |
/arch/m68k/ifpsp060/ |
H A D | iskeleton.S | 61 | can do any clean-up desired. The stack frame is the 62 | Unimplemented Integer Instruction stack frame with 87 | a CHK exception stack frame from the Unimplemented Integer Instrcution 88 | stack frame and branches to this routine. 122 | creates a Divide-by-zero exception stack frame from the Unimplemented 123 | Integer Instruction stack frame and branches to this routine. 127 | then it create a Trace exception stack frame from the "chk" exception 128 | stack frame and branches to the _real_trace() entry point.
|
/arch/s390/ |
H A D | Makefile | 72 ifeq ($(call cc-option-yn,-mpacked-stack),y) 73 cflags-$(CONFIG_PACK_STACK) += -mpacked-stack -D__PACK_STACK
|
/arch/um/ |
H A D | Makefile | 122 $(call cc-option, -fno-stack-protector,) \ 123 $(call cc-option, -fno-stack-protector-all,)
|
/arch/um/drivers/ |
H A D | line.c | 601 unsigned long stack; member in struct:winch 612 if (winch->stack != 0) 613 free_stack(winch->stack, 0); 671 unsigned long stack) 686 .stack = stack }); 706 if (stack != 0) 707 free_stack(stack, 0); 670 register_winch_irq(int fd, int tty_fd, int pid, struct tty_port *port, unsigned long stack) argument
|
/arch/x86/kernel/ |
H A D | stacktrace.c | 47 .stack = save_stack_stack, 53 .stack = save_stack_stack, 59 * Save stack-backtrace addresses into a stack_trace buffer. 138 * Trace user stack if we are not a kernel thread
|
/arch/arc/kernel/ |
H A D | asm-offsets.c | 21 DEFINE(TASK_THREAD_INFO, offsetof(struct task_struct, stack));
|
/arch/arm/mach-omap1/ |
H A D | sram.S | 26 stmfd sp!, {r0 - r12, lr} @ save registers on stack
|
/arch/frv/kernel/ |
H A D | vmlinux.lds.S | 117 .bss..stack : { *(.bss) }
|
/arch/m68k/math-emu/ |
H A D | fp_entry.S | 110 | directly, others are on the stack, as we read/write the stack 112 | instruction decoding, otherwise the stack pointer is incorrect 113 | and the stack gets corrupted.
|
/arch/mips/include/asm/ |
H A D | thread_info.h | 20 * - this struct shares the supervisor stack pages 58 #define init_stack (init_thread_union.stack)
|
/arch/mn10300/include/asm/ |
H A D | thread_info.h | 32 * - this struct shares the supervisor stack pages 89 #define init_stack (init_thread_union.stack) 115 /* how to get the current stack pointer from C */
|
/arch/mn10300/kernel/ |
H A D | smp-low.S | 86 # get stack
|
/arch/s390/include/asm/ |
H A D | compat.h | 292 unsigned long stack; local 294 stack = KSTK_ESP(current); 296 stack &= 0x7fffffffUL; 297 return (void __user *) (stack - len);
|
/arch/tile/kernel/ |
H A D | Makefile | 8 setup.o signal.o single_step.o stack.o sys.o \
|
/arch/unicore32/include/asm/ |
H A D | thread_info.h | 98 #define init_stack (init_thread_union.stack)
|