/arch/arm/kernel/ |
H A D | opcodes.c | 46 * opcode space from v5 onwards 55 asmlinkage unsigned int arm_check_condition(u32 opcode, u32 psr) argument 57 u32 cc_bits = opcode >> 28;
|
H A D | insn.c | 38 unsigned long opcode = 0xea000000; local 42 opcode |= 1 << 24; 52 return opcode | offset;
|
H A D | probes-thumb.c | 846 static void __kprobes thumb16_singlestep(probes_opcode_t opcode, argument 851 asi->insn_handler(opcode, asi, regs); 855 static void __kprobes thumb32_singlestep(probes_opcode_t opcode, argument 860 asi->insn_handler(opcode, asi, regs);
|
/arch/arm/nwfpe/ |
H A D | fpa11.c | 47 int8 SetRoundingMode(const unsigned int opcode) argument 49 switch (opcode & MASK_ROUNDING_MODE) { 65 int8 SetRoundingPrecision(const unsigned int opcode) argument 68 switch (opcode & MASK_ROUNDING_PRECISION) { 96 /* Emulate the instruction in the opcode. */ 97 unsigned int EmulateAll(unsigned int opcode) argument 102 printk("NWFPE: emulating opcode %08x\n", opcode); 104 code = opcode & 0x00000f00; 107 code = opcode [all...] |
H A D | fpa11_cpdo.c | 26 unsigned int SingleCPDO(struct roundingData *roundData, const unsigned int opcode, FPREG * rFd); 27 unsigned int DoubleCPDO(struct roundingData *roundData, const unsigned int opcode, FPREG * rFd); 28 unsigned int ExtendedCPDO(struct roundingData *roundData, const unsigned int opcode, FPREG * rFd); 30 unsigned int EmulateCPDO(const unsigned int opcode) argument 39 nDest = getDestinationSize(opcode); 43 roundData.mode = SetRoundingMode(opcode); 44 roundData.precision = SetRoundingPrecision(opcode); 52 if (MONADIC_INSTRUCTION(opcode)) 55 nType = fpa11->fType[getFn(opcode)]; 57 if (!CONSTANT_FM(opcode)) { [all...] |
H A D | fpa11_cprt.c | 30 unsigned int PerformFLT(const unsigned int opcode); 31 unsigned int PerformFIX(const unsigned int opcode); 33 static unsigned int PerformComparison(const unsigned int opcode); 35 unsigned int EmulateCPRT(const unsigned int opcode) argument 38 if (opcode & 0x800000) { 43 return PerformComparison(opcode); 47 switch ((opcode & 0x700000) >> 20) { 49 return PerformFLT(opcode); 52 return PerformFIX(opcode); 56 writeFPSR(readRegister(getRd(opcode))); 69 PerformFLT(const unsigned int opcode) argument 112 PerformFIX(const unsigned int opcode) argument 154 PerformComparison(const unsigned int opcode) argument [all...] |
H A D | extended_cpdo.c | 90 unsigned int ExtendedCPDO(struct roundingData *roundData, const unsigned int opcode, FPREG * rFd) argument 96 Fm = getFm(opcode); 97 if (CONSTANT_FM(opcode)) { 118 opc_mask_shift = (opcode & MASK_ARITHMETIC_OPCODE) >> 20; 119 if (!MONADIC_INSTRUCTION(opcode)) { 120 unsigned int Fn = getFn(opcode);
|
H A D | single_cpdo.c | 88 unsigned int SingleCPDO(struct roundingData *roundData, const unsigned int opcode, FPREG * rFd) argument 94 Fm = getFm(opcode); 95 if (CONSTANT_FM(opcode)) { 103 opc_mask_shift = (opcode & MASK_ARITHMETIC_OPCODE) >> 20; 104 if (!MONADIC_INSTRUCTION(opcode)) { 105 unsigned int Fn = getFn(opcode);
|
H A D | double_cpdo.c | 111 unsigned int DoubleCPDO(struct roundingData *roundData, const unsigned int opcode, FPREG * rFd) argument 117 Fm = getFm(opcode); 118 if (CONSTANT_FM(opcode)) { 135 opc_mask_shift = (opcode & MASK_ARITHMETIC_OPCODE) >> 20; 136 if (!MONADIC_INSTRUCTION(opcode)) { 137 unsigned int Fn = getFn(opcode);
|
H A D | fpa11_cpdt.c | 224 unsigned int PerformLDF(const unsigned int opcode) argument 227 unsigned int nRc = 1, write_back = WRITE_BACK(opcode); 229 pBase = (unsigned int __user *) readRegister(getRn(opcode)); 230 if (REG_PC == getRn(opcode)) { 236 if (BIT_UP_SET(opcode)) 237 pFinal += getOffset(opcode); 239 pFinal -= getOffset(opcode); 241 if (PREINDEXED(opcode)) 246 switch (opcode & MASK_TRANSFER_LENGTH) { 248 loadSingle(getFd(opcode), pAddres 267 PerformSTF(const unsigned int opcode) argument 318 PerformLFM(const unsigned int opcode) argument 354 PerformSFM(const unsigned int opcode) argument 390 EmulateCPDT(const unsigned int opcode) argument [all...] |
/arch/powerpc/platforms/powernv/ |
H A D | opal-tracepoints.c | 44 void __trace_opal_entry(unsigned long opcode, unsigned long *args) argument 58 trace_opal_entry(opcode, args); 65 void __trace_opal_exit(long opcode, unsigned long retval) argument 78 trace_opal_exit(opcode, retval);
|
/arch/s390/kernel/ |
H A D | jump_label.c | 16 u16 opcode; member in struct:insn 33 insn.opcode = 0xc0f4; 37 insn.opcode = 0xc004;
|
/arch/x86/lib/ |
H A D | inat.c | 23 /* Attribute tables are generated from opcode map */ 27 insn_attr_t inat_get_opcode_attribute(insn_byte_t opcode) argument 29 return inat_primary_table[opcode]; 40 insn_attr_t inat_get_escape_attribute(insn_byte_t opcode, int lpfx_id, argument 51 if (inat_has_variant(table[opcode]) && lpfx_id) { 56 return table[opcode]; 79 insn_attr_t inat_get_avx_attribute(insn_byte_t opcode, insn_byte_t vex_m, argument 89 if (!inat_is_group(table[opcode]) && vex_p) { 95 return table[opcode];
|
/arch/blackfin/kernel/ |
H A D | dumpstack.c | 21 unsigned int opcode; local 23 if (!get_instruction(&opcode, addr)) 26 if ((opcode >= 0x0060 && opcode <= 0x0067) || 27 (opcode >= 0x0070 && opcode <= 0x0077) || 28 (opcode >= 0xE3000000 && opcode <= 0xE3FFFFFF))
|
H A D | traps.c | 74 int opcode; local 211 * then just execute a illegal opcode failure (like normal). 214 if (!kernel_mode_regs(fp) && get_instruction(&opcode, (unsigned short *)fp->pc)) { 215 if (execute_pseudodbg_assert(fp, opcode)) 217 if (execute_pseudodbg(fp, opcode)) 567 unsigned int opcode; local 569 if (!get_instruction(&opcode, (unsigned short *)addr)) 572 return opcode == BFIN_BUG_OPCODE;
|
H A D | pseudodbg.c | 106 bool execute_pseudodbg_assert(struct pt_regs *fp, unsigned int opcode) argument 108 int expected = ((opcode >> PseudoDbg_Assert_expected_bits) & PseudoDbg_Assert_expected_mask); 109 int dbgop = ((opcode >> (PseudoDbg_Assert_dbgop_bits)) & PseudoDbg_Assert_dbgop_mask); 110 int grp = ((opcode >> (PseudoDbg_Assert_grp_bits)) & PseudoDbg_Assert_grp_mask); 111 int regtest = ((opcode >> (PseudoDbg_Assert_regtest_bits)) & PseudoDbg_Assert_regtest_mask); 114 if ((opcode & 0xFF000000) != PseudoDbg_Assert_opcode) 158 bool execute_pseudodbg(struct pt_regs *fp, unsigned int opcode) argument 163 if ((opcode & 0xFF000000) != PseudoDbg_opcode) 166 opcode >>= 16; 167 grp = ((opcode >> PseudoDbg_grp_bit [all...] |
/arch/powerpc/xmon/ |
H A D | ppc-dis.c | 33 const struct powerpc_opcode *opcode; local 50 /* Get the major opcode of the instruction. */ 53 /* Find the first match in the opcode table. We could speed this up 54 a bit by doing a binary search on the major opcode. */ 57 for (opcode = powerpc_opcodes; opcode < opcode_end; opcode++) 66 table_op = PPC_OP (opcode->opcode); 72 if ((insn & opcode [all...] |
H A D | spu-dis.c | 41 /* If two instructions have the same opcode then we prefer the first 45 int o = spu_opcodes[i].opcode; 58 unsigned int opcode = insn >> (32-11); local 60 /* Init the table. This assumes that element 0/opcode 0 (currently 65 if ((index = spu_disassemble_table[opcode & 0x780]) != 0 69 if ((index = spu_disassemble_table[opcode & 0x7f0]) != 0 73 if ((index = spu_disassemble_table[opcode & 0x7f8]) != 0 77 if ((index = spu_disassemble_table[opcode & 0x7fc]) != 0 81 if ((index = spu_disassemble_table[opcode & 0x7fe]) != 0 85 if ((index = spu_disassemble_table[opcode [all...] |
/arch/sh/kernel/ |
H A D | traps.c | 111 insn_size_t opcode; local 115 if (probe_kernel_address((insn_size_t *)addr, opcode)) 117 if (opcode == TRAPA_BUG_OPCODE)
|
/arch/c6x/kernel/ |
H A D | module.c | 19 u32 opcode; local 26 opcode = *ip; 27 opcode &= ~(mask << shift); 28 opcode |= ((delta & mask) << shift); 29 *ip = opcode; 31 pr_debug("REL PCR_S%d[%p] dest[%p] opcode[%08x]\n", 32 maskbits, ip, (void *)dest, opcode); 53 u32 *location, opcode; local 88 opcode = *location; 89 opcode [all...] |
/arch/ia64/kernel/ |
H A D | brl_emu.c | 58 unsigned long opcode, btype, qp, offset, cpl; local 81 opcode = (bundle[1] >> 60); 91 switch(opcode) { 180 * Unknown opcode.
|
/arch/x86/kernel/ |
H A D | step.c | 53 unsigned char opcode[15]; local 56 copied = access_process_vm(child, addr, opcode, sizeof(opcode), 0); 58 switch (opcode[i]) { 65 /* opcode and address size prefixes */
|
/arch/avr32/kernel/ |
H A D | traps.c | 175 unsigned short opcode; local 179 if (probe_kernel_address((u16 *)pc, opcode)) 182 return opcode == AVR32_BUG_OPCODE;
|
/arch/cris/arch-v32/kernel/ |
H A D | ptrace.c | 277 unsigned long opcode; local 281 /* Read the opcode at pc (do what PTRACE_PEEKTEXT would do). */ 282 copied = access_process_vm(child, pc, &opcode, sizeof(opcode), 0); 283 if (copied != sizeof(opcode)) 286 switch ((opcode & 0x0f00) >> 8) { 298 if ((opcode & 0xff) == 0xff) 304 panic("ERROR: Couldn't find size of opcode 0x%lx at 0x%lx\n", 305 opcode, pc);
|
/arch/powerpc/platforms/pseries/ |
H A D | hvCall_inst.c | 106 static void probe_hcall_entry(void *ignored, unsigned long opcode, unsigned long *args) argument 110 if (opcode > MAX_HCALL_OPCODE) 113 h = &__get_cpu_var(hcall_stats)[opcode / 4]; 118 static void probe_hcall_exit(void *ignored, unsigned long opcode, unsigned long retval, argument 123 if (opcode > MAX_HCALL_OPCODE) 126 h = &__get_cpu_var(hcall_stats)[opcode / 4];
|