/Linux-v6.6/arch/sh/kernel/ |
D | traps_32.c | 102 static int handle_unaligned_ins(insn_size_t instruction, struct pt_regs *regs, in handle_unaligned_ins() argument 110 index = (instruction>>8)&15; /* 0x0F00 */ in handle_unaligned_ins() 113 index = (instruction>>4)&15; /* 0x00F0 */ in handle_unaligned_ins() 116 count = 1<<(instruction&3); in handle_unaligned_ins() 126 switch (instruction>>12) { in handle_unaligned_ins() 128 if (instruction & 8) { in handle_unaligned_ins() 160 dstu += (instruction&0x000F)<<2; in handle_unaligned_ins() 168 if (instruction & 4) in handle_unaligned_ins() 182 srcu += (instruction & 0x000F) << 2; in handle_unaligned_ins() 193 if (instruction & 4) in handle_unaligned_ins() [all …]
|
/Linux-v6.6/tools/objtool/include/objtool/ |
D | check.h | 30 struct instruction *first_insn, *last_insn, *nop; 43 struct instruction { struct 70 struct instruction *jump_dest; argument 71 struct instruction *first_jump_src; argument 82 static inline struct symbol *insn_func(struct instruction *insn) in insn_func() argument 97 static inline bool is_static_jump(struct instruction *insn) in is_static_jump() 103 static inline bool is_dynamic_jump(struct instruction *insn) in is_dynamic_jump() 109 static inline bool is_jump(struct instruction *insn) in is_jump() 114 struct instruction *find_insn(struct objtool_file *file, 117 struct instruction *next_insn_same_sec(struct objtool_file *file, struct instruction *insn);
|
D | arch.h | 70 struct instruction; 78 struct instruction *insn); 82 unsigned long arch_jump_destination(struct instruction *insn);
|
/Linux-v6.6/drivers/media/usb/gspca/ |
D | jl2005bcd.c | 107 static u8 instruction[2] = {0x95, 0x00}; in jl2005c_read_reg() local 109 instruction[1] = reg; in jl2005c_read_reg() 111 retval = jl2005c_write2(gspca_dev, instruction); in jl2005c_read_reg() 125 static u8 instruction[2] = {0x7f, 0x01}; in jl2005c_start_new_frame() local 127 retval = jl2005c_write2(gspca_dev, instruction); in jl2005c_start_new_frame() 152 u8 instruction[2]; in jl2005c_write_reg() local 154 instruction[0] = reg; in jl2005c_write_reg() 155 instruction[1] = value; in jl2005c_write_reg() 157 retval = jl2005c_write2(gspca_dev, instruction); in jl2005c_write_reg() 202 static u8 instruction[][2] = { in jl2005c_stream_start_vga_lg() local [all …]
|
/Linux-v6.6/Documentation/virt/kvm/s390/ |
D | s390-pv.rst | 26 the behavior of the SIE instruction. A new format 4 state description 48 of an instruction emulation by KVM, e.g. we can never inject a 65 With the format 4 state description for PVMs, the SIE instruction already 67 to interpret every instruction, but needs to hand some tasks to KVM; 73 the instruction data, such as I/O data structures, are filtered. 78 Only GR values needed to emulate an instruction will be copied into this 82 the bytes of the instruction text, but with pre-set register values 83 instead of the actual ones. I.e. each instruction always uses the same 84 instruction text, in order not to leak guest instruction text. 88 The Secure Instruction Data Area contains instruction storage [all …]
|
/Linux-v6.6/arch/arm/nwfpe/ |
D | entry.S | 79 bne next @ get the next instruction; 82 bl EmulateAll @ emulate the instruction 88 .Lx1: ldrt r6, [r5], #4 @ get the next instruction and 105 @ plain LDR instruction. Weird, but it seems harmless. 108 .Lrep: str r4, [sp, #S_PC] @ retry current instruction 118 @ Check whether the instruction is a co-processor instruction. 126 @ lr = unrecognised instruction return address 131 sub r4, r4, #4 @ ARM instruction at user PC - 4 133 ARM_BE8(rev r0, r0) @ little endian instruction 175 @ r0 = instruction [all …]
|
/Linux-v6.6/tools/objtool/ |
D | check.c | 26 struct instruction *insn; 37 struct instruction *find_insn(struct objtool_file *file, in find_insn() 40 struct instruction *insn; in find_insn() 50 struct instruction *next_insn_same_sec(struct objtool_file *file, in next_insn_same_sec() 51 struct instruction *insn) in next_insn_same_sec() 63 static struct instruction *next_insn_same_func(struct objtool_file *file, in next_insn_same_func() 64 struct instruction *insn) in next_insn_same_func() 66 struct instruction *next = next_insn_same_sec(file, insn); in next_insn_same_func() 83 static struct instruction *prev_insn_same_sec(struct objtool_file *file, in prev_insn_same_sec() 84 struct instruction *insn) in prev_insn_same_sec() [all …]
|
/Linux-v6.6/net/nfc/hci/ |
D | hcp.c | 22 u8 type, u8 instruction, in nfc_hci_hcp_message_tx() argument 75 packet->message.header = HCP_HEADER(type, instruction); in nfc_hci_hcp_message_tx() 118 u8 instruction, struct sk_buff *skb) in nfc_hci_hcp_message_rx() argument 122 nfc_hci_resp_received(hdev, instruction, skb); in nfc_hci_hcp_message_rx() 125 nfc_hci_cmd_received(hdev, pipe, instruction, skb); in nfc_hci_hcp_message_rx() 128 nfc_hci_event_received(hdev, pipe, instruction, skb); in nfc_hci_hcp_message_rx() 132 type, instruction); in nfc_hci_hcp_message_rx()
|
/Linux-v6.6/Documentation/bpf/ |
D | bpf_licensing.rst | 11 http://www.tcpdump.org/papers/bpf-usenix93.pdf. The corresponding instruction 13 instruction set is now known as "classic BPF". 15 However an instruction set is a specification for machine-language interaction, 18 instruction set may enjoy no copyright protection. 20 * eBPF (extended BPF) instruction set continues to be BSD 22 In 2014, the classic BPF instruction set was significantly extended. We 23 typically refer to this instruction set as eBPF to disambiguate it from cBPF. 24 The eBPF instruction set is still BSD licensed. 29 Using the eBPF instruction set requires implementing code in both kernel space 52 The HW can choose to execute eBPF instruction natively and provide eBPF runtime [all …]
|
D | linux-notes.rst | 8 …ment provides more details specific to the Linux kernel implementation of the eBPF instruction set. 20 by the verifier. Any programs with this instruction will fail to load 34 The following 64-bit immediate instruction specifies that a variable address, 49 <instruction-set.html#legacy-bpf-packet-access-instructions>`_, 70 instruction.
|
/Linux-v6.6/drivers/video/backlight/ |
D | otm3225a.c | 160 struct otm3225a_spi_instruction *instruction, in otm3225a_write() argument 169 buf[2] = instruction->reg; in otm3225a_write() 174 buf[1] = (instruction->value >> 8) & 0xff; in otm3225a_write() 175 buf[2] = instruction->value & 0xff; in otm3225a_write() 179 if (instruction->delay) in otm3225a_write() 180 msleep(instruction->delay); in otm3225a_write() 181 instruction++; in otm3225a_write()
|
/Linux-v6.6/arch/nios2/platform/ |
D | Kconfig.platform | 64 bool "Enable MUL instruction" 67 instruction. This will enable the -mhw-mul compiler flag. 70 bool "Enable MULX instruction" 73 instruction. Enables the -mhw-mulx compiler flag. 76 bool "Enable DIV instruction" 79 instruction. Enables the -mhw-div compiler flag. 103 bool "Byteswap custom instruction" 105 Use the byteswap (endian converter) Nios II custom instruction provided 110 int "Byteswap custom instruction number" if NIOS2_CI_SWAB_SUPPORT 113 Number of the instruction as configured in QSYS Builder. [all …]
|
/Linux-v6.6/arch/openrisc/ |
D | Kconfig | 98 bool "Have instruction l.ff1" 101 Select this if your implementation has the Class II instruction l.ff1 104 bool "Have instruction l.fl1" 107 Select this if your implementation has the Class II instruction l.fl1 110 bool "Have instruction l.mul for hardware multiply" 113 Select this if your implementation has a hardware multiply instruction 116 bool "Have instruction l.div for hardware divide" 119 Select this if your implementation has a hardware divide instruction 122 bool "Have instruction l.cmov for conditional move" 130 l.cmov conistional move instruction. [all …]
|
/Linux-v6.6/Documentation/arch/arm64/ |
D | legacy_instructions.rst | 7 the architecture. The infrastructure code uses undefined instruction 9 the instruction execution in hardware. 18 Generates undefined instruction abort. Default for instructions that 25 usage of emulated instruction is traced as well as rate limited 38 The default mode depends on the status of the instruction in the 43 individual instruction notes for further information.
|
/Linux-v6.6/Documentation/staging/ |
D | lzo.rst | 22 the operands for the instruction, whose size and position depend on the 23 opcode and on the number of literals copied by previous instruction. The 59 After any instruction except the large literal copy, 0, 1, 2 or 3 literals 60 are copied before starting the next instruction. The number of literals that 61 were copied may change the meaning and behaviour of the next instruction. In 62 practice, only one instruction needs to know whether 0, less than 4, or more 65 generally encoded in the last two bits of the instruction but may also be 69 instruction may encode this distance (0001HLLL), it takes one LE16 operand 100 0..16 : follow regular instruction encoding, see below. It is worth 123 Depends on the number of literals copied by the last instruction. [all …]
|
/Linux-v6.6/drivers/crypto/intel/keembay/ |
D | ocs-aes.c | 527 enum ocs_instruction instruction) in set_ocs_aes_command() argument 554 val = (cipher << 14) | (mode << 8) | (instruction << 6) | in set_ocs_aes_command() 562 enum ocs_instruction instruction) in ocs_aes_init() argument 571 set_ocs_aes_command(aes_dev, cipher, mode, instruction); in ocs_aes_init() 605 enum ocs_instruction instruction, in ocs_aes_validate_inputs() argument 617 if (instruction != OCS_ENCRYPT && instruction != OCS_DECRYPT && in ocs_aes_validate_inputs() 618 instruction != OCS_EXPAND && instruction != OCS_BYPASS) in ocs_aes_validate_inputs() 628 if (instruction == OCS_BYPASS) { in ocs_aes_validate_inputs() 746 if (instruction == OCS_DECRYPT) { in ocs_aes_validate_inputs() 799 enum ocs_instruction instruction, in ocs_aes_op() argument [all …]
|
D | keembay-ocs-aes-core.c | 83 enum ocs_instruction instruction; member 310 enum ocs_instruction instruction, in kmb_ocs_sk_common() argument 328 if (instruction == OCS_ENCRYPT) in kmb_ocs_sk_common() 358 rctx->instruction = instruction; in kmb_ocs_sk_common() 413 if (rctx->mode == OCS_MODE_CBC && rctx->instruction == OCS_DECRYPT) in kmb_ocs_sk_prepare_inplace() 418 if (rctx->cts_swap && rctx->instruction == OCS_DECRYPT) in kmb_ocs_sk_prepare_inplace() 489 if (!(rctx->cts_swap && rctx->instruction == OCS_DECRYPT)) in kmb_ocs_sk_prepare_notinplace() 549 rc = ocs_aes_op(aes_dev, rctx->mode, tctx->cipher, rctx->instruction, in kmb_ocs_sk_run() 559 if (rctx->cts_swap && rctx->instruction == OCS_ENCRYPT) { in kmb_ocs_sk_run() 569 if (rctx->instruction == OCS_ENCRYPT) { in kmb_ocs_sk_run() [all …]
|
/Linux-v6.6/Documentation/powerpc/ |
D | syscall64-abi.rst | 10 The syscall is made with the sc instruction, and returns with execution 11 continuing at the instruction following the sc instruction. 14 scv 0 instruction is an alternative that may provide better performance, 32 - For the sc instruction, both a value and an error condition are returned. 38 - For the scv 0 instruction, the return value indicates failure if it is 52 For the sc instruction, the differences from the ELF ABI are as follows: 70 For the scv 0 instruction, the differences from the ELF ABI are as follows: 119 performed with the sc instruction, if it is 0x3000 then the system call was 120 performed with the scv 0 instruction. 147 The vsyscall is performed with a branch-with-link instruction to the vsyscall
|
/Linux-v6.6/arch/arm/probes/kprobes/ |
D | test-core.h | 155 #define TEST_INSTRUCTION(instruction) \ argument 157 "1: "instruction" \n\t" \ 160 #define TEST_BRANCH_F(instruction) \ argument 161 TEST_INSTRUCTION(instruction) \ 165 #define TEST_BRANCH_B(instruction) \ argument 170 TEST_INSTRUCTION(instruction) 172 #define TEST_BRANCH_FX(instruction, codex) \ argument 173 TEST_INSTRUCTION(instruction) \ 179 #define TEST_BRANCH_BX(instruction, codex) \ argument 185 TEST_INSTRUCTION(instruction)
|
/Linux-v6.6/arch/s390/kvm/ |
D | trace.h | 157 __field(__u64, instruction) 162 __entry->instruction = ((__u64)ipa << 48) | 167 __entry->instruction, 168 __print_symbolic(icpt_insn_decoder(__entry->instruction), 424 __field(__u64, instruction) 429 __entry->instruction = ((__u64)ipa << 48) | 434 __entry->instruction, 435 __print_symbolic(icpt_insn_decoder(__entry->instruction),
|
/Linux-v6.6/Documentation/bpf/standardization/ |
D | instruction-set.rst | 8 This document specifies version 1.0 of the BPF instruction set. 103 BPF has two instruction encodings: 105 * the basic instruction encoding, which uses 64 bits to encode an instruction 106 * the wide instruction encoding, which appends a second 64-bit immediate (i.e., 107 constant) value after the basic instruction for a total of 128 bits. 109 The fields conforming an encoded basic instruction are stored in the 147 instruction uses a 64-bit immediate value that is constructed as follows. 148 The 64 bits following the basic instruction contain a pseudo instruction 160 pseudo instruction 166 where 'next_imm' refers to the imm value of the pseudo instruction [all …]
|
/Linux-v6.6/arch/m68k/fpsp040/ |
D | bugfix.S | 247 | dest and the dest of the xu. We must clear the instruction in 248 | the cu and restore the state, allowing the instruction in the 249 | xu to complete. Remember, the instruction in the nu 251 | If the result of the xu instruction is not exceptional, we can 252 | restore the instruction from the cu to the frame and continue 275 | Check if the instruction which just completed was exceptional. 280 | It is necessary to isolate the result of the instruction in the 369 | dest and the dest of the xu. We must clear the instruction in 370 | the cu and restore the state, allowing the instruction in the 371 | xu to complete. Remember, the instruction in the nu [all …]
|
/Linux-v6.6/Documentation/trace/ |
D | kprobes.rst | 38 any instruction in the kernel. A return probe fires when a specified 65 instruction and replaces the first byte(s) of the probed instruction 66 with a breakpoint instruction (e.g., int3 on i386 and x86_64). 68 When a CPU hits the breakpoint instruction, a trap occurs, the CPU's 74 Next, Kprobes single-steps its copy of the probed instruction. 75 (It would be simpler to single-step the actual instruction in place, 77 instruction. This would open a small time window when another CPU 80 After the instruction is single-stepped, Kprobes executes the 82 Execution then continues with the instruction following the probepoint. 88 register set, including instruction pointer. This operation requires [all …]
|
/Linux-v6.6/arch/m68k/ifpsp060/src/ |
D | isp.S | 1218 mov.l EXC_EXTWPTR(%a6),%a0 # fetch instruction addr 1219 addq.l &0x2,EXC_EXTWPTR(%a6) # incr instruction ptr 1230 mov.l EXC_EXTWPTR(%a6),%a0 # fetch instruction addr 1231 addq.l &0x2,EXC_EXTWPTR(%a6) # incr instruction ptr 1242 mov.l EXC_EXTWPTR(%a6),%a0 # fetch instruction addr 1243 addq.l &0x2,EXC_EXTWPTR(%a6) # incr instruction ptr 1254 mov.l EXC_EXTWPTR(%a6),%a0 # fetch instruction addr 1255 addq.l &0x2,EXC_EXTWPTR(%a6) # incr instruction ptr 1266 mov.l EXC_EXTWPTR(%a6),%a0 # fetch instruction addr 1267 addq.l &0x2,EXC_EXTWPTR(%a6) # incr instruction ptr [all …]
|
D | pfpsp.S | 1228 # the FPIAR holds the "current PC" of the faulting instruction 1232 mov.l EXC_EXTWPTR(%a6),%a0 # fetch instruction addr 1233 addq.l &0x4,EXC_EXTWPTR(%a6) # incr instruction ptr 1234 bsr.l _imem_read_long # fetch the instruction words 1722 # three instruction exceptions don't update the stack pointer. so, if the 2038 # The opclass two PACKED instruction that took an "Unimplemented Data Type" 2371 # _imem_read_long() - read instruction longword # 2384 # fmovm_dynamic() - emulate dynamic fmovm instruction # 2385 # fmovm_ctrl() - emulate fmovm control instruction # 2404 # (2) The "fmovm.x" instruction w/ dynamic register specification. # [all …]
|