insn_size_t 20 arch/sh/include/asm/alignment.h extern void unaligned_fixups_notify(struct task_struct *, insn_size_t, struct pt_regs *); insn_size_t 14 arch/sh/include/asm/kprobes.h typedef insn_size_t kprobe_opcode_t; insn_size_t 156 arch/sh/include/asm/uaccess.h int handle_unaligned_access(insn_size_t instruction, struct pt_regs *regs, insn_size_t 271 arch/sh/kernel/io_trapped.c insn_size_t instruction; insn_size_t 49 arch/sh/kernel/kgdb.c insn_size_t op = __raw_readw(linux_regs->pc); insn_size_t 136 arch/sh/kernel/kgdb.c static insn_size_t stepped_opcode; insn_size_t 117 arch/sh/kernel/traps.c insn_size_t opcode; insn_size_t 121 arch/sh/kernel/traps.c if (probe_kernel_address((insn_size_t *)addr, opcode)) insn_size_t 163 arch/sh/kernel/traps.c insn_size_t insn = *(insn_size_t *)instruction_pointer(regs); insn_size_t 85 arch/sh/kernel/traps_32.c static int handle_unaligned_ins(insn_size_t instruction, struct pt_regs *regs, insn_size_t 266 arch/sh/kernel/traps_32.c insn_size_t old_instruction, insn_size_t 269 arch/sh/kernel/traps_32.c insn_size_t instruction; insn_size_t 302 arch/sh/kernel/traps_32.c int handle_unaligned_access(insn_size_t instruction, struct pt_regs *regs, insn_size_t 477 arch/sh/kernel/traps_32.c insn_size_t instruction; insn_size_t 495 arch/sh/kernel/traps_32.c if (copy_from_user(&instruction, (insn_size_t *)(regs->pc & ~1), insn_size_t 33 arch/sh/kernel/traps_64.c static int read_opcode(reg_size_t pc, insn_size_t *result_opcode, int from_user_mode) insn_size_t 37 arch/sh/kernel/traps_64.c insn_size_t opcode; insn_size_t 43 arch/sh/kernel/traps_64.c if (!access_ok(aligned_pc, sizeof(insn_size_t))) { insn_size_t 46 arch/sh/kernel/traps_64.c get_user_error = __get_user(opcode, (insn_size_t *)aligned_pc); insn_size_t 54 arch/sh/kernel/traps_64.c *result_opcode = *(insn_size_t *)aligned_pc; insn_size_t 82 arch/sh/kernel/traps_64.c insn_size_t opcode, insn_size_t 164 arch/sh/kernel/traps_64.c insn_size_t opcode, insn_size_t 239 arch/sh/kernel/traps_64.c insn_size_t opcode, insn_size_t 310 arch/sh/kernel/traps_64.c insn_size_t opcode, insn_size_t 382 arch/sh/kernel/traps_64.c insn_size_t opcode, insn_size_t 456 arch/sh/kernel/traps_64.c insn_size_t opcode; insn_size_t 647 arch/sh/kernel/traps_64.c insn_size_t opcode = 0x6ff4fff0; /* guaranteed reserved opcode */ insn_size_t 666 arch/sh/kernel/traps_64.c if (!access_ok(aligned_pc, sizeof(insn_size_t))) insn_size_t 669 arch/sh/kernel/traps_64.c get_user_error = __get_user(opcode, (insn_size_t *)aligned_pc); insn_size_t 96 arch/sh/mm/alignment.c void unaligned_fixups_notify(struct task_struct *tsk, insn_size_t insn,