Searched refs:stack (Results 101 - 125 of 318) sorted by relevance

1234567891011>>

/arch/sh/kernel/cpu/sh2a/
H A Dentry.S22 /* Offsets to the stack */
39 ! stack
58 add r2,r0 ! r0 = kernel stack tail
59 mov r15,r2 ! r2 = user stack top
60 mov r0,r15 ! switch kernel stack
74 mov r2,r8 ! r8 = previus stack top
76 ! restore previous stack
87 mov r2,r8 ! r8 = previous stack top
155 /* Unwind the stack and jmp to the debug entry */
/arch/sh/kernel/cpu/sh3/
H A Dentry.S41 * ptrace needs to have all regs on the stack.
47 * r15 = stack pointer
57 /* Offsets to the stack */
99 ! It can be valid access, such as stack grow and/or C-O-W.
191 /* Unwind the stack and jmp to the debug entry */
210 ! - restore r0, r1, r2, r3, r4, r5, r6, r7 from the stack
212 ! - restore r8, r9, r10, r11, r12, r13, r14, r15 from the stack
216 ! k4 returns original stack pointer
242 mov.l @r15+, k4 ! original stack pointer
305 ! - switch to kernel stack
[all...]
/arch/tile/include/gxio/
H A Dmpipe.h79 * this information is then used to choose which buffer stack will be
83 * The rules by which the buffer stack and bucket are chosen can be
119 * mPIPE DMA engine pops at least one buffer off of the 'buffer stack'
121 * that buffer. Each buffer stack provides a hardware-accelerated
122 * stack of data buffers with the same size. If the packet data is
123 * larger than the buffers provided by the chosen buffer stack, the
131 * Applications can push buffers onto a buffer stack by calling
134 * buffers should be returned to the stack.
143 * a given buffer stack. Since each buffer stack i
457 gxio_mpipe_push_buffer(gxio_mpipe_context_t *context, unsigned int stack, void *buffer) argument
487 gxio_mpipe_pop_buffer(gxio_mpipe_context_t *context, unsigned int stack) argument
[all...]
/arch/arm/kernel/
H A Dentry-header.S20 @ Most of the stack format comes from struct pt_regs, but with
27 * The SWI code relies on the fact that R0 is at the bottom of the stack
61 * automatically saved on the current stack (32 words) before
62 * switching to the exception stack (SP_main).
78 @ exception happend that is either on the main or the process stack.
79 @ Bit 2 of EXC_RETURN stored in the lr register specifies which stack
90 @ Linux expects to have irqs off. Do it here before taking stack space
102 @ calculate the original stack pointer value.
105 @ The cpu might automatically 8-byte align the stack. Bit 9
106 @ of the saved xPSR specifies if stack alignin
[all...]
/arch/m68k/fpsp040/
H A Dskeleton.S74 movel %sp,%sp@- | stack frame pointer argument
132 | We do not have the bug 1232 case. Clean up the stack and call
165 movel %sp,%sp@- | stack frame pointer argument
191 movel %sp,%sp@- | stack frame pointer argument
217 movel %sp,%sp@- | stack frame pointer argument
239 movel %sp,%sp@- | stack frame pointer argument
261 movel %sp,%sp@- | stack frame pointer argument
289 movel %sp,%sp@- | stack frame pointer argument
310 movel %sp,%sp@- | stack frame pointer argument
332 movel %sp,%sp@- | stack fram
[all...]
H A Dsgetem.S17 | the floating-point save stack.
84 movew %d0,LOCAL_EX(%a0) |move the sign & exp back to fsave stack
97 movel %d0,LOCAL_HI(%a0) |put ms mant back on stack
98 movel %d1,LOCAL_LO(%a0) |put ls mant back on stack
/arch/um/kernel/
H A Dprocess.c55 void free_stack(unsigned long stack, int order) argument
57 free_pages(stack, order);
219 unsigned long stack; local
221 stack = sp & (PAGE_MASK << CONFIG_KERNEL_STACK_ORDER);
222 return stack != (unsigned long) current_thread_info();
384 /* Bail if the process has no kernel stack for some reason */
390 * Bail if the stack pointer is below the bottom of the kernel
391 * stack for some reason
/arch/
H A DKconfig228 the API needed to access registers and stack entries from pt_regs,
275 Support user stack dumps for perf event samples. This needs
276 access to the user stack pointer which is not unified across
352 - it has implemented a stack canary (e.g. __stack_chk_guard)
357 Set when a stack-protector mode is enabled, so that the build
365 This option turns on the "stack-protector" GCC feature. This
367 the stack just before the return address, and validates
376 Disable "stack-protector" GCC feature.
382 Functions will have the stack-protector canary logic added if they
383 have an 8-byte or larger character array on the stack
[all...]
/arch/m32r/kernel/
H A Dptrace.c36 * This routine will get a word off of the process kernel stack.
41 unsigned long *stack; local
43 stack = (unsigned long *)task_pt_regs(task);
45 return stack[offset];
49 * This routine will put a word on the process kernel stack.
54 unsigned long *stack; local
56 stack = (unsigned long *)task_pt_regs(task);
57 stack[offset] = data;
69 * actually access the pt_regs stored on the kernel stack.
/arch/m68k/kernel/
H A Dtraps.c230 /* after an exception in a writeback the stack frame corresponding
679 * exception stack frame into the error_code value needed by
813 void show_trace(unsigned long *stack) argument
820 addr = (unsigned long)stack + THREAD_SIZE - 1;
823 while (stack + 1 <= endstack) {
824 addr = *stack++;
937 void show_stack(struct task_struct *task, unsigned long *stack) argument
943 if (!stack) {
945 stack = (unsigned long *)task->thread.esp0;
947 stack
[all...]
/arch/m68k/ifpsp060/
H A Diskeleton.S61 | can do any clean-up desired. The stack frame is the
62 | Unimplemented Integer Instruction stack frame with
87 | a CHK exception stack frame from the Unimplemented Integer Instrcution
88 | stack frame and branches to this routine.
122 | creates a Divide-by-zero exception stack frame from the Unimplemented
123 | Integer Instruction stack frame and branches to this routine.
127 | then it create a Trace exception stack frame from the "chk" exception
128 | stack frame and branches to the _real_trace() entry point.
/arch/s390/
H A DMakefile72 ifeq ($(call cc-option-yn,-mpacked-stack),y)
73 cflags-$(CONFIG_PACK_STACK) += -mpacked-stack -D__PACK_STACK
/arch/um/
H A DMakefile122 $(call cc-option, -fno-stack-protector,) \
123 $(call cc-option, -fno-stack-protector-all,)
/arch/um/drivers/
H A Dline.c601 unsigned long stack; member in struct:winch
612 if (winch->stack != 0)
613 free_stack(winch->stack, 0);
671 unsigned long stack)
686 .stack = stack });
706 if (stack != 0)
707 free_stack(stack, 0);
670 register_winch_irq(int fd, int tty_fd, int pid, struct tty_port *port, unsigned long stack) argument
/arch/x86/kernel/
H A Dstacktrace.c47 .stack = save_stack_stack,
53 .stack = save_stack_stack,
59 * Save stack-backtrace addresses into a stack_trace buffer.
138 * Trace user stack if we are not a kernel thread
/arch/arc/kernel/
H A Dasm-offsets.c21 DEFINE(TASK_THREAD_INFO, offsetof(struct task_struct, stack));
/arch/arm/mach-omap1/
H A Dsram.S26 stmfd sp!, {r0 - r12, lr} @ save registers on stack
/arch/frv/kernel/
H A Dvmlinux.lds.S117 .bss..stack : { *(.bss) }
/arch/m68k/math-emu/
H A Dfp_entry.S110 | directly, others are on the stack, as we read/write the stack
112 | instruction decoding, otherwise the stack pointer is incorrect
113 | and the stack gets corrupted.
/arch/mips/include/asm/
H A Dthread_info.h20 * - this struct shares the supervisor stack pages
58 #define init_stack (init_thread_union.stack)
/arch/mn10300/include/asm/
H A Dthread_info.h32 * - this struct shares the supervisor stack pages
89 #define init_stack (init_thread_union.stack)
115 /* how to get the current stack pointer from C */
/arch/mn10300/kernel/
H A Dsmp-low.S86 # get stack
/arch/s390/include/asm/
H A Dcompat.h292 unsigned long stack; local
294 stack = KSTK_ESP(current);
296 stack &= 0x7fffffffUL;
297 return (void __user *) (stack - len);
/arch/tile/kernel/
H A DMakefile8 setup.o signal.o single_step.o stack.o sys.o \
/arch/unicore32/include/asm/
H A Dthread_info.h98 #define init_stack (init_thread_union.stack)

Completed in 643 milliseconds

1234567891011>>