Home
last modified time | relevance | path

Searched refs:stacks (Results 1 – 25 of 68) sorted by relevance

123

/linux-6.6.21/Documentation/arch/x86/ !
Dkernel-stacks.rst7 Kernel stacks on x86-64 bit
15 active thread. These thread stacks are THREAD_SIZE (4*PAGE_SIZE) big.
16 These stacks contain useful data as long as a thread is alive or a
20 In addition to the per thread stacks, there are specialized stacks
21 associated with each CPU. These stacks are only used while the kernel
23 specialized stacks contain no useful data. The main CPU stacks are:
30 the split thread and interrupt stacks on i386, this gives more room
38 hardware stacks cannot nest without races.
46 point to dedicated stacks; each stack can be a different size.
58 Events with different IST codes (i.e. with different stacks) can be
[all …]
Dindex.rst16 kernel-stacks
Dxstate.rst18 alternate signal stacks, often using MINSIGSTKSZ which is typically 2KB.
23 However, that means that the size of signal stacks is dynamic, not static,
/linux-6.6.21/lib/ !
Dref_tracker.c28 } stacks[]; member
37 stats = kmalloc(struct_size(stats, stacks, limit), in ref_tracker_get_stats()
50 if (stats->stacks[i].stack_handle == stack) in ref_tracker_get_stats()
55 stats->stacks[i].stack_handle = stack; in ref_tracker_get_stats()
56 stats->stacks[i].count = 0; in ref_tracker_get_stats()
59 ++stats->stacks[i].count; in ref_tracker_get_stats()
107 stack = stats->stacks[i].stack_handle; in __ref_tracker_dir_pr_ostream()
111 stats->stacks[i].count, stats->total, sbuf); in __ref_tracker_dir_pr_ostream()
112 skipped -= stats->stacks[i].count; in __ref_tracker_dir_pr_ostream()
/linux-6.6.21/Documentation/mm/ !
Dvmalloced-kernel-stacks.rst25 Virtually-mapped kernel stacks with guard pages causes kernel stack
30 support for virtually mapped stacks with guard pages. This feature
45 - vmalloc space must be large enough to hold many kernel stacks. This
61 mapped task stacks. This option depends on HAVE_ARCH_VMAP_STACK.
63 - Enable this if you want the use virtually-mapped kernel stacks
94 - Allocated stacks are cached and later reused by new threads, so memcg
95 accounting is performed manually on assigning/releasing stacks to tasks.
100 - On arm64, all VMAP's stacks need to have the same alignment to ensure
103 - This does not address interrupt stacks - according to the original patch
114 virtually mapped kernel stacks are enabled.
[all …]
Dindex.rst65 vmalloced-kernel-stacks
/linux-6.6.21/arch/arm64/kvm/hyp/nvhe/ !
Dstacktrace.c123 struct stack_info stacks[] = { in pkvm_save_backtrace() local
128 .stacks = stacks, in pkvm_save_backtrace()
129 .nr_stacks = ARRAY_SIZE(stacks), in pkvm_save_backtrace()
/linux-6.6.21/arch/arm64/kvm/ !
Dstacktrace.c181 struct stack_info stacks[] = { in hyp_dump_backtrace() local
186 .stacks = stacks, in hyp_dump_backtrace()
187 .nr_stacks = ARRAY_SIZE(stacks), in hyp_dump_backtrace()
/linux-6.6.21/arch/arm64/kernel/ !
Dstacktrace.c179 struct stack_info stacks[] = { in arch_stack_walk() local
194 .stacks = stacks, in arch_stack_walk()
195 .nr_stacks = ARRAY_SIZE(stacks), in arch_stack_walk()
/linux-6.6.21/samples/fprobe/ !
Dfprobe_example.c44 unsigned long stacks[BACKTRACE_DEPTH]; in show_backtrace() local
47 len = stack_trace_save(stacks, BACKTRACE_DEPTH, 2); in show_backtrace()
48 stack_trace_print(stacks, len, 24); in show_backtrace()
/linux-6.6.21/arch/sh/ !
DKconfig.debug37 bool "Use 4Kb for kernel stacks instead of 8Kb"
44 will also use IRQ stacks to compensate for the reduced stackspace.
47 bool "Use separate kernel stacks when processing interrupts"
50 If you say Y here the kernel will use separate kernel stacks
52 overflowing the process kernel stacks.
/linux-6.6.21/drivers/gpu/drm/i915/ !
Dintel_runtime_pm.c77 depot_stack_handle_t stack, *stacks; in track_intel_runtime_pm_wakeref() local
92 stacks = krealloc(rpm->debug.owners, in track_intel_runtime_pm_wakeref()
93 (rpm->debug.count + 1) * sizeof(*stacks), in track_intel_runtime_pm_wakeref()
95 if (stacks) { in track_intel_runtime_pm_wakeref()
96 stacks[rpm->debug.count++] = stack; in track_intel_runtime_pm_wakeref()
97 rpm->debug.owners = stacks; in track_intel_runtime_pm_wakeref()
/linux-6.6.21/arch/arm64/include/asm/stacktrace/ !
Dcommon.h45 struct stack_info *stacks; member
85 struct stack_info *info = &state->stacks[i]; in unwind_find_next_stack()
/linux-6.6.21/Documentation/arch/ia64/ !
Dmca.rst48 have to use their own, per-cpu stacks. The MCA/INIT stacks are
72 rendezvous interrupt are still running on their normal kernel stacks!
90 struct task and the kernel stacks. Then the MCA/INIT data would be
91 chained stacks like i386 interrupt stacks. But that required
95 stacks meant separate "tasks" for the MCA/INIT handlers.
136 stacks. ia64 has the struct task embedded in the single kernel
161 stacks are, which makes it too risky to copy the saved state to a user
/linux-6.6.21/tools/perf/util/ !
Dbpf_lock_contention.c33 bpf_map__set_value_size(skel->maps.stacks, con->max_stack * sizeof(u64)); in lock_contention_prepare()
43 bpf_map__set_max_entries(skel->maps.stacks, con->map_nr_entries); in lock_contention_prepare()
45 bpf_map__set_max_entries(skel->maps.stacks, 1); in lock_contention_prepare()
260 stack = bpf_map__fd(skel->maps.stacks); in lock_contention_read()
/linux-6.6.21/arch/arc/ !
DKconfig.debug4 bool "Use 16Kb for kernel stacks instead of 8Kb"
/linux-6.6.21/security/yama/ !
DKconfig10 Like capabilities, this security module stacks with other LSMs.
/linux-6.6.21/Documentation/translations/zh_CN/mm/ !
Dindex.rst58 vmalloced-kernel-stacks
Dvmalloced-kernel-stacks.rst4 :Original: Documentation/mm/vmalloced-kernel-stacks.rst
/linux-6.6.21/tools/perf/util/bpf_skel/ !
Doff_cpu.bpf.c40 } stacks SEC(".maps");
197 stack_id = bpf_get_stackid(ctx, &stacks, in off_cpu_stat()
Dlock_contention.bpf.c35 } stacks SEC(".maps");
301 pelem->stack_id = bpf_get_stackid(ctx, &stacks, in contention_begin()
/linux-6.6.21/Documentation/dev-tools/ !
Dkmemleak.rst47 enable the task stacks scanning (default)
49 disable the tasks stacks scanning
101 2. scan the memory starting with the data section and stacks, checking
186 kmemleak_erase functions (see above). The task stacks also increase the
197 stacks. Kmemleak defines MSECS_MIN_AGE (defaulting to 1000) representing
/linux-6.6.21/arch/parisc/ !
DKconfig322 bool "Use separate kernel stacks when processing interrupts"
325 If you say Y here the kernel will use separate kernel stacks
327 overflowing the process kernel stacks.
/linux-6.6.21/net/6lowpan/ !
DKconfig7 "6LoWPAN" which is supported by IEEE 802.15.4 or Bluetooth stacks.
/linux-6.6.21/Documentation/ABI/testing/ !
Dsysfs-devices-mapping9 For example, on 4-die Xeon platform with up to 6 IIO stacks per

123