insn_size_t        20 arch/sh/include/asm/alignment.h extern void unaligned_fixups_notify(struct task_struct *, insn_size_t, struct pt_regs *);
insn_size_t        14 arch/sh/include/asm/kprobes.h typedef insn_size_t kprobe_opcode_t;
insn_size_t       156 arch/sh/include/asm/uaccess.h int handle_unaligned_access(insn_size_t instruction, struct pt_regs *regs,
insn_size_t       271 arch/sh/kernel/io_trapped.c 	insn_size_t instruction;
insn_size_t        49 arch/sh/kernel/kgdb.c 	insn_size_t op = __raw_readw(linux_regs->pc);
insn_size_t       136 arch/sh/kernel/kgdb.c static insn_size_t stepped_opcode;
insn_size_t       117 arch/sh/kernel/traps.c 	insn_size_t opcode;
insn_size_t       121 arch/sh/kernel/traps.c 	if (probe_kernel_address((insn_size_t *)addr, opcode))
insn_size_t       163 arch/sh/kernel/traps.c 		insn_size_t insn = *(insn_size_t *)instruction_pointer(regs);
insn_size_t        85 arch/sh/kernel/traps_32.c static int handle_unaligned_ins(insn_size_t instruction, struct pt_regs *regs,
insn_size_t       266 arch/sh/kernel/traps_32.c 				   insn_size_t old_instruction,
insn_size_t       269 arch/sh/kernel/traps_32.c 	insn_size_t instruction;
insn_size_t       302 arch/sh/kernel/traps_32.c int handle_unaligned_access(insn_size_t instruction, struct pt_regs *regs,
insn_size_t       477 arch/sh/kernel/traps_32.c 	insn_size_t instruction;
insn_size_t       495 arch/sh/kernel/traps_32.c 		if (copy_from_user(&instruction, (insn_size_t *)(regs->pc & ~1),
insn_size_t        33 arch/sh/kernel/traps_64.c static int read_opcode(reg_size_t pc, insn_size_t *result_opcode, int from_user_mode)
insn_size_t        37 arch/sh/kernel/traps_64.c 	insn_size_t opcode;
insn_size_t        43 arch/sh/kernel/traps_64.c 			if (!access_ok(aligned_pc, sizeof(insn_size_t))) {
insn_size_t        46 arch/sh/kernel/traps_64.c 				get_user_error = __get_user(opcode, (insn_size_t *)aligned_pc);
insn_size_t        54 arch/sh/kernel/traps_64.c 			*result_opcode = *(insn_size_t *)aligned_pc;
insn_size_t        82 arch/sh/kernel/traps_64.c 				      insn_size_t opcode,
insn_size_t       164 arch/sh/kernel/traps_64.c 			   insn_size_t opcode,
insn_size_t       239 arch/sh/kernel/traps_64.c 			    insn_size_t opcode,
insn_size_t       310 arch/sh/kernel/traps_64.c 			   insn_size_t opcode,
insn_size_t       382 arch/sh/kernel/traps_64.c 			   insn_size_t opcode,
insn_size_t       456 arch/sh/kernel/traps_64.c 	insn_size_t opcode;
insn_size_t       647 arch/sh/kernel/traps_64.c 	insn_size_t opcode = 0x6ff4fff0; /* guaranteed reserved opcode */
insn_size_t       666 arch/sh/kernel/traps_64.c 	if (!access_ok(aligned_pc, sizeof(insn_size_t)))
insn_size_t       669 arch/sh/kernel/traps_64.c 		get_user_error = __get_user(opcode, (insn_size_t *)aligned_pc);
insn_size_t        96 arch/sh/mm/alignment.c void unaligned_fixups_notify(struct task_struct *tsk, insn_size_t insn,