Home
last modified time | relevance | path

Searched refs:code (Results 1 – 13 of 13) sorted by relevance

/kernel/bpf/
Dverifier.c320 u8 class = BPF_CLASS(insn->code); in print_bpf_insn()
323 if (BPF_SRC(insn->code) == BPF_X) in print_bpf_insn()
325 insn->code, class == BPF_ALU ? "(u32) " : "", in print_bpf_insn()
327 bpf_alu_string[BPF_OP(insn->code) >> 4], in print_bpf_insn()
332 insn->code, class == BPF_ALU ? "(u32) " : "", in print_bpf_insn()
334 bpf_alu_string[BPF_OP(insn->code) >> 4], in print_bpf_insn()
338 if (BPF_MODE(insn->code) == BPF_MEM) in print_bpf_insn()
340 insn->code, in print_bpf_insn()
341 bpf_ldst_string[BPF_SIZE(insn->code) >> 3], in print_bpf_insn()
344 else if (BPF_MODE(insn->code) == BPF_XADD) in print_bpf_insn()
[all …]
Dcore.c303 goto *jumptable[insn->code]; in __bpf_prog_run()
614 WARN_RATELIMIT(1, "unknown opcode %02x\n", insn->code); in __bpf_prog_run()
Dsyscall.c377 if (insn->code == (BPF_JMP | BPF_CALL)) { in fixup_bpf_calls()
/kernel/
Djump_label.c130 if (entry->code <= (unsigned long)end && in addr_conflict()
131 entry->code + JUMP_LABEL_NOP_SIZE > (unsigned long)start) in addr_conflict()
176 if (entry->code && kernel_text_address(entry->code)) in __jump_label_update()
367 if (within_module_init(iter->code, mod)) in jump_label_invalidate_module_init()
368 iter->code = 0; in jump_label_invalidate_module_init()
DKconfig.preempt23 "explicit preemption points" to the kernel code. These new
42 all kernel code (that is not executing in a critical section)
49 and a slight runtime overhead to kernel code.
Dseccomp.c105 u16 code = ftest->code; in seccomp_check_filter() local
108 switch (code) { in seccomp_check_filter()
110 ftest->code = BPF_LDX | BPF_W | BPF_ABS; in seccomp_check_filter()
116 ftest->code = BPF_LD | BPF_IMM; in seccomp_check_filter()
120 ftest->code = BPF_LDX | BPF_IMM; in seccomp_check_filter()
Dexit.c670 void do_exit(long code) in do_exit() argument
695 ptrace_event(PTRACE_EVENT_EXIT, code); in do_exit()
746 acct_collect(code, group_dead); in do_exit()
751 tsk->exit_code = code; in do_exit()
855 void complete_and_exit(struct completion *comp, long code) in complete_and_exit() argument
860 do_exit(code); in complete_and_exit()
Dauditsc.c2508 void __audit_seccomp(unsigned long syscall, long signr, int code) in __audit_seccomp() argument
2518 KSTK_EIP(current), code); in __audit_seccomp()
Dmodule.c214 void __module_put_and_exit(struct module *mod, long code) in __module_put_and_exit() argument
217 do_exit(code); in __module_put_and_exit()
/kernel/gcov/
DKconfig9 This option enables gcov-based code profiling (e.g. for code coverage
/kernel/irq/
DKconfig2 # Options selectable by the architecture code
25 # and should not be used in new code. Use irq domains instead.
/kernel/power/
DKconfig164 code. This is helpful when debugging and reporting PM bugs, like
209 This enables code to save the last PM event point across
213 The architecture specific code must provide the extern
227 This enables some cheesy code to save the last PM event point in the
/kernel/debug/
Ddebug_core.c860 dbg_notify_reboot(struct notifier_block *this, unsigned long code, void *x) in dbg_notify_reboot() argument
875 gdbstub_exit(code); in dbg_notify_reboot()