Searched refs:code (Results 1 – 13 of 13) sorted by relevance
/kernel/bpf/ |
D | verifier.c | 320 u8 class = BPF_CLASS(insn->code); in print_bpf_insn() 323 if (BPF_SRC(insn->code) == BPF_X) in print_bpf_insn() 325 insn->code, class == BPF_ALU ? "(u32) " : "", in print_bpf_insn() 327 bpf_alu_string[BPF_OP(insn->code) >> 4], in print_bpf_insn() 332 insn->code, class == BPF_ALU ? "(u32) " : "", in print_bpf_insn() 334 bpf_alu_string[BPF_OP(insn->code) >> 4], in print_bpf_insn() 338 if (BPF_MODE(insn->code) == BPF_MEM) in print_bpf_insn() 340 insn->code, in print_bpf_insn() 341 bpf_ldst_string[BPF_SIZE(insn->code) >> 3], in print_bpf_insn() 344 else if (BPF_MODE(insn->code) == BPF_XADD) in print_bpf_insn() [all …]
|
D | core.c | 303 goto *jumptable[insn->code]; in __bpf_prog_run() 614 WARN_RATELIMIT(1, "unknown opcode %02x\n", insn->code); in __bpf_prog_run()
|
D | syscall.c | 377 if (insn->code == (BPF_JMP | BPF_CALL)) { in fixup_bpf_calls()
|
/kernel/ |
D | jump_label.c | 130 if (entry->code <= (unsigned long)end && in addr_conflict() 131 entry->code + JUMP_LABEL_NOP_SIZE > (unsigned long)start) in addr_conflict() 176 if (entry->code && kernel_text_address(entry->code)) in __jump_label_update() 367 if (within_module_init(iter->code, mod)) in jump_label_invalidate_module_init() 368 iter->code = 0; in jump_label_invalidate_module_init()
|
D | Kconfig.preempt | 23 "explicit preemption points" to the kernel code. These new 42 all kernel code (that is not executing in a critical section) 49 and a slight runtime overhead to kernel code.
|
D | seccomp.c | 105 u16 code = ftest->code; in seccomp_check_filter() local 108 switch (code) { in seccomp_check_filter() 110 ftest->code = BPF_LDX | BPF_W | BPF_ABS; in seccomp_check_filter() 116 ftest->code = BPF_LD | BPF_IMM; in seccomp_check_filter() 120 ftest->code = BPF_LDX | BPF_IMM; in seccomp_check_filter()
|
D | exit.c | 670 void do_exit(long code) in do_exit() argument 695 ptrace_event(PTRACE_EVENT_EXIT, code); in do_exit() 746 acct_collect(code, group_dead); in do_exit() 751 tsk->exit_code = code; in do_exit() 855 void complete_and_exit(struct completion *comp, long code) in complete_and_exit() argument 860 do_exit(code); in complete_and_exit()
|
D | auditsc.c | 2508 void __audit_seccomp(unsigned long syscall, long signr, int code) in __audit_seccomp() argument 2518 KSTK_EIP(current), code); in __audit_seccomp()
|
D | module.c | 214 void __module_put_and_exit(struct module *mod, long code) in __module_put_and_exit() argument 217 do_exit(code); in __module_put_and_exit()
|
/kernel/gcov/ |
D | Kconfig | 9 This option enables gcov-based code profiling (e.g. for code coverage
|
/kernel/irq/ |
D | Kconfig | 2 # Options selectable by the architecture code 25 # and should not be used in new code. Use irq domains instead.
|
/kernel/power/ |
D | Kconfig | 164 code. This is helpful when debugging and reporting PM bugs, like 209 This enables code to save the last PM event point across 213 The architecture specific code must provide the extern 227 This enables some cheesy code to save the last PM event point in the
|
/kernel/debug/ |
D | debug_core.c | 860 dbg_notify_reboot(struct notifier_block *this, unsigned long code, void *x) in dbg_notify_reboot() argument 875 gdbstub_exit(code); in dbg_notify_reboot()
|