Searched refs:U0 (Results 1 – 18 of 18) sorted by relevance
| /linux-4.4.14/arch/metag/include/asm/ |
| D | processor.h | 118 regs->ctx.AX[0].U0 = usp; \ 120 regs->ctx.DX[3].U0 = (int)((int *)argc + 1); /* argv */ \ 123 regs->ctx.DX[2].U0 = 0; /* rtld_fini */ \ 145 ((unsigned long)(tsk)->thread.kernel_context->AX[0].U0) 147 ((unsigned long)(tsk)->thread.kernel_context->AX[1].U0) 152 #define KSTK_ESP(tsk) (task_pt_regs(tsk)->ctx.AX[0].U0) 154 #define user_stack_pointer(regs) ((regs)->ctx.AX[0].U0)
|
| D | syscall.h | 50 unsigned long error = regs->ctx.DX[0].U0; in syscall_get_error() 57 return regs->ctx.DX[0].U0; in syscall_get_return_value() 64 regs->ctx.DX[0].U0 = (long) error ?: val; in syscall_set_return_value() 77 args[j] = regs->ctx.DX[(reg + 1) / 2].U0; in syscall_get_arguments() 93 regs->ctx.DX[(reg + 1) / 2].U0 = args[i]; in syscall_set_arguments()
|
| D | elf.h | 76 do { _r->ctx.AX[0].U0 = 0; } while (0)
|
| D | tbx.h | 227 int U0, U1; member
|
| /linux-4.4.14/arch/metag/kernel/ |
| D | process.c | 148 regs->ctx.AX[i].U0); in show_regs() 159 regs->ctx.Ext.AX2.U0); in show_regs() 165 pr_info(" A0.%d = 0x%08x ", i + 3, regs->ctx.AX3[i].U0); in show_regs() 170 pr_info(" %s = 0x%08x ", DX0_names[i], regs->ctx.DX[i].U0); in show_regs() 174 show_trace(NULL, (unsigned long *)regs->ctx.AX[0].U0, regs); in show_regs() 207 childregs->ctx.AX[0].U0 = (unsigned long) kernel_context; in copy_thread() 224 childregs->ctx.AX[0].U0 = ALIGN(usp, 8); in copy_thread() 228 childregs->ctx.DX[0].U0 = 0; in copy_thread()
|
| D | perf_callchain.c | 61 unsigned long sp = regs->ctx.AX[0].U0; in perf_callchain_user() 91 fr.fp = regs->ctx.AX[1].U0; in perf_callchain_kernel() 92 fr.sp = regs->ctx.AX[0].U0; in perf_callchain_kernel()
|
| D | signal.c | 30 #define REG_RETVAL ctx.DX[0].U0 32 #define REG_SP ctx.AX[0].U0 34 #define REG_ARG2 ctx.DX[3].U0
|
| D | stacktrace.c | 64 fpnew = regs->ctx.AX[1].U0; in unwind_frame()
|
| D | traps.c | 681 regs->ctx.DX[0].U0 = syscall_entry(a1_a2, a3_a4, a5_a6); in switch1_handler() 944 fp = regs->ctx.AX[1].U0; in show_trace() 986 sp = (unsigned long *)tsk->thread.kernel_context->AX[0].U0; in show_stack()
|
| /linux-4.4.14/arch/metag/oprofile/ |
| D | backtrace.c | 53 unsigned long *fp = (unsigned long *)regs->ctx.AX[1].U0; in metag_backtrace() 57 frame.fp = regs->ctx.AX[1].U0; /* A0FrP */ in metag_backtrace()
|
| /linux-4.4.14/arch/alpha/lib/ |
| D | ev67-strchr.S | 58 cttz t0, a2 # U0 : speculative (in case we get a match) 75 cttz t3, a2 # U0 : speculative (in case we get a match)
|
| D | ev67-strlen.S | 44 cttz $2, $3 # U0 :
|
| D | ev67-strcat.S | 48 $found: cttz $2, $3 # U0 :
|
| D | ev67-strncat.S | 54 $found: cttz $2, $3 # U0 :
|
| D | ev67-strrchr.S | 96 ctlz t8, t2 # U0 : Latency=3 (0x40 for t8=0)
|
| D | ev6-memchr.S | 92 cttz $2, $3 # U0 :
|
| /linux-4.4.14/arch/metag/mm/ |
| D | fault.c | 193 regs->ctx.CurrPC, regs->ctx.AX[0].U0, in do_page_fault()
|
| /linux-4.4.14/Documentation/cgroups/ |
| D | unified-hierarchy.txt | 278 Let's say cgroups C0 and C1 have been delegated to user U0 who created 290 that the intention of delegating C0 to U0 is allowing U0 to organize 296 can move the target to the cgroup. In the above example, U0 will not 302 On the unified hierarchy, let's say U0 wants to write the pid of a 304 "C00/cgroup.procs". U0 obviously has write access to the file and 307 points of delegation and U0 would not have write access to its
|