/linux-6.12.1/Documentation/arch/x86/ |
D | kernel-stacks.rst | 7 Kernel stacks on x86-64 bit 15 active thread. These thread stacks are THREAD_SIZE (4*PAGE_SIZE) big. 16 These stacks contain useful data as long as a thread is alive or a 20 In addition to the per thread stacks, there are specialized stacks 21 associated with each CPU. These stacks are only used while the kernel 23 specialized stacks contain no useful data. The main CPU stacks are: 30 the split thread and interrupt stacks on i386, this gives more room 38 hardware stacks cannot nest without races. 46 point to dedicated stacks; each stack can be a different size. 58 Events with different IST codes (i.e. with different stacks) can be [all …]
|
D | index.rst | 16 kernel-stacks
|
D | xstate.rst | 18 alternate signal stacks, often using MINSIGSTKSZ which is typically 2KB. 23 However, that means that the size of signal stacks is dynamic, not static,
|
/linux-6.12.1/lib/ |
D | ref_tracker.c | 28 } stacks[]; member 37 stats = kmalloc(struct_size(stats, stacks, limit), in ref_tracker_get_stats() 50 if (stats->stacks[i].stack_handle == stack) in ref_tracker_get_stats() 55 stats->stacks[i].stack_handle = stack; in ref_tracker_get_stats() 56 stats->stacks[i].count = 0; in ref_tracker_get_stats() 59 ++stats->stacks[i].count; in ref_tracker_get_stats() 107 stack = stats->stacks[i].stack_handle; in __ref_tracker_dir_pr_ostream() 111 stats->stacks[i].count, stats->total, sbuf); in __ref_tracker_dir_pr_ostream() 112 skipped -= stats->stacks[i].count; in __ref_tracker_dir_pr_ostream()
|
/linux-6.12.1/Documentation/mm/ |
D | vmalloced-kernel-stacks.rst | 25 Virtually mapped kernel stacks with guard pages cause kernel stack 30 support for virtually mapped stacks with guard pages. This feature 45 - vmalloc space must be large enough to hold many kernel stacks. This 61 mapped task stacks. This option depends on HAVE_ARCH_VMAP_STACK. 63 - Enable this if you want the use virtually-mapped kernel stacks 94 - Allocated stacks are cached and later reused by new threads, so memcg 95 accounting is performed manually on assigning/releasing stacks to tasks. 100 - On arm64, all VMAP's stacks need to have the same alignment to ensure 103 - This does not address interrupt stacks - according to the original patch 114 virtually mapped kernel stacks are enabled. [all …]
|
D | index.rst | 63 vmalloced-kernel-stacks
|
D | page_owner.rst | 27 It can also be used to show all the stacks and their current number of 76 cat /sys/kernel/debug/page_owner_stacks/show_stacks > stacks.txt 77 cat stacks.txt
|
/linux-6.12.1/arch/arm64/kvm/hyp/nvhe/ |
D | stacktrace.c | 123 struct stack_info stacks[] = { in pkvm_save_backtrace() local 128 .stacks = stacks, in pkvm_save_backtrace() 129 .nr_stacks = ARRAY_SIZE(stacks), in pkvm_save_backtrace()
|
/linux-6.12.1/arch/arm64/kvm/ |
D | stacktrace.c | 181 struct stack_info stacks[] = { in hyp_dump_backtrace() local 186 .stacks = stacks, in hyp_dump_backtrace() 187 .nr_stacks = ARRAY_SIZE(stacks), in hyp_dump_backtrace()
|
/linux-6.12.1/samples/fprobe/ |
D | fprobe_example.c | 44 unsigned long stacks[BACKTRACE_DEPTH]; in show_backtrace() local 47 len = stack_trace_save(stacks, BACKTRACE_DEPTH, 2); in show_backtrace() 48 stack_trace_print(stacks, len, 24); in show_backtrace()
|
/linux-6.12.1/arch/sh/ |
D | Kconfig.debug | 37 bool "Use 4Kb for kernel stacks instead of 8Kb" 44 will also use IRQ stacks to compensate for the reduced stackspace. 47 bool "Use separate kernel stacks when processing interrupts" 50 If you say Y here the kernel will use separate kernel stacks 52 overflowing the process kernel stacks.
|
/linux-6.12.1/arch/arm64/include/asm/stacktrace/ |
D | common.h | 34 struct stack_info *stacks; member 68 struct stack_info *info = &state->stacks[i]; in unwind_find_next_stack()
|
/linux-6.12.1/drivers/gpu/drm/panthor/ |
D | panthor_device.c | 33 ptdev->clks.stacks = devm_clk_get_optional(ptdev->base.dev, "stacks"); in panthor_clk_init() 34 if (IS_ERR(ptdev->clks.stacks)) in panthor_clk_init() 36 PTR_ERR(ptdev->clks.stacks), in panthor_clk_init() 432 ret = clk_prepare_enable(ptdev->clks.stacks); in panthor_device_resume() 484 clk_disable_unprepare(ptdev->clks.stacks); in panthor_device_resume() 544 clk_disable_unprepare(ptdev->clks.stacks); in panthor_device_suspend()
|
D | panthor_device.h | 88 struct clk *stacks; member
|
/linux-6.12.1/arch/arm64/kernel/ |
D | stacktrace.c | 214 struct stack_info stacks[] = { in kunwind_stack_walk() local 230 .stacks = stacks, in kunwind_stack_walk() 231 .nr_stacks = ARRAY_SIZE(stacks), in kunwind_stack_walk()
|
/linux-6.12.1/arch/arc/ |
D | Kconfig.debug | 4 bool "Use 16Kb for kernel stacks instead of 8Kb"
|
/linux-6.12.1/tools/perf/util/ |
D | bpf_lock_contention.c | 35 bpf_map__set_value_size(skel->maps.stacks, con->max_stack * sizeof(u64)); in lock_contention_prepare() 45 bpf_map__set_max_entries(skel->maps.stacks, con->map_nr_entries); in lock_contention_prepare() 47 bpf_map__set_max_entries(skel->maps.stacks, 1); in lock_contention_prepare() 417 stack = bpf_map__fd(skel->maps.stacks); in lock_contention_read()
|
/linux-6.12.1/tools/perf/util/bpf_skel/ |
D | off_cpu.bpf.c | 40 } stacks SEC(".maps"); 198 stack_id = bpf_get_stackid(ctx, &stacks, in off_cpu_stat()
|
D | lock_contention.bpf.c | 28 } stacks SEC(".maps"); 377 pelem->stack_id = bpf_get_stackid(ctx, &stacks, in contention_begin()
|
/linux-6.12.1/Documentation/translations/zh_CN/mm/ |
D | index.rst | 58 vmalloced-kernel-stacks
|
D | vmalloced-kernel-stacks.rst | 4 :Original: Documentation/mm/vmalloced-kernel-stacks.rst
|
/linux-6.12.1/security/yama/ |
D | Kconfig | 10 Like capabilities, this security module stacks with other LSMs.
|
/linux-6.12.1/Documentation/dev-tools/ |
D | kmemleak.rst | 47 enable the task stacks scanning (default) 49 disable the tasks stacks scanning 101 2. scan the memory starting with the data section and stacks, checking 186 kmemleak_erase functions (see above). The task stacks also increase the 197 stacks. Kmemleak defines MSECS_MIN_AGE (defaulting to 1000) representing
|
/linux-6.12.1/arch/parisc/ |
D | Kconfig | 332 bool "Use separate kernel stacks when processing interrupts" 335 If you say Y here the kernel will use separate kernel stacks 337 overflowing the process kernel stacks.
|
/linux-6.12.1/Documentation/arch/x86/x86_64/ |
D | mm.rst | 61 ffffff0000000000 | -1 TB | ffffff7fffffffff | 0.5 TB | %esp fixup stacks 120 ffffff0000000000 | -1 TB | ffffff7fffffffff | 0.5 TB | %esp fixup stacks
|