| /arch/powerpc/mm/book3s64/ |
| A D | pkeys.c | 415 static bool pkey_access_permitted(int pkey, bool write, bool execute) in pkey_access_permitted() argument 421 if (execute) in pkey_access_permitted() 431 bool arch_pte_access_permitted(u64 pte, bool write, bool execute) in arch_pte_access_permitted() argument 436 return pkey_access_permitted(pte_to_pkey_bits(pte), write, execute); in arch_pte_access_permitted() 448 bool execute, bool foreign) in arch_vma_access_permitted() argument 458 return pkey_access_permitted(vma_pkey(vma), write, execute); in arch_vma_access_permitted()
|
| /arch/arm64/include/asm/ |
| A D | mmu_context.h | 311 bool write, bool execute, bool foreign) in arch_vma_access_permitted() argument 320 return por_el0_allows_pkey(vma_pkey(vma), write, execute); in arch_vma_access_permitted()
|
| A D | pgtable.h | 234 static inline bool por_el0_allows_pkey(u8 pkey, bool write, bool execute) in por_el0_allows_pkey() argument 246 if (execute) in por_el0_allows_pkey()
|
| /arch/x86/include/asm/ |
| A D | mmu_context.h | 270 bool write, bool execute, bool foreign) in arch_vma_access_permitted() argument 273 if (execute) in arch_vma_access_permitted()
|
| /arch/powerpc/include/asm/ |
| A D | mmu_context.h | 262 bool execute, bool foreign); 266 bool write, bool execute, bool foreign) in arch_vma_access_permitted() argument
|
| /arch/arm/boot/compressed/ |
| A D | efi-header.S | 21 @ will not execute those instructions, but the ARM/Linux
|
| /arch/m68k/ifpsp060/ |
| A D | TEST.DOC | 92 routine would simply execute a "bsr" or "jsr" that jumped to the selected 96 itest.sa data and execute something similar to:
|
| A D | fpsp.doc | 97 would simply execute a "bra" or "jmp" that jumped to the selected function 101 (vector #11), the operating system should execute something similar to:
|
| A D | isp.doc | 105 would simply execute a "bra" or "jmp" that jumped to the selected function 109 exception (vector #61), the operating system should execute something
|
| A D | fskeleton.S | 61 | simply execute an "rte" as with the sample code below.
|
| /arch/powerpc/boot/dts/ |
| A D | microwatt.dts | 68 no-execute {
|
| /arch/powerpc/platforms/ |
| A D | Kconfig.cputype | 368 processes can execute altivec instructions. 385 processes can execute VSX instructions. 405 'spe enable' bit so user processes can execute SPE instructions.
|
| /arch/x86/kvm/ |
| A D | kvm_emulate.h | 355 int (*execute)(struct x86_emulate_ctxt *ctxt); member
|
| A D | emulate.c | 198 int (*execute)(struct x86_emulate_ctxt *ctxt); member 3970 #define I(_f, _e) { .flags = (_f), .u.execute = (_e) } 3973 { .flags = (_f)|Intercept, .u.execute = (_e), .intercept = x86_intercept_##_i } 3975 { .flags = (_f)|Intercept|CheckPerm, .u.execute = (_e), \ 4944 ctxt->execute = opcode.u.execute; in x86_decode_insn() 5258 if (ctxt->execute) { in x86_emulate_insn() 5262 rc = ctxt->execute(ctxt); in x86_emulate_insn()
|
| /arch/ |
| A D | Kconfig | 87 execute a callback function. register_kprobe() establishes 99 conditions even cheaper to execute within the kernel. 108 nop will be converted to a jump instruction to execute the 609 prompt "Enable seccomp to safely execute untrusted bytecode" 620 disabled and the task is only allowed to execute a few safe 1088 with read-only execute permissions. Architecture must implement 1094 Architecture doesn't only execute the irq handler on the irq stack
|
| /arch/powerpc/include/asm/book3s/64/ |
| A D | pgtable.h | 513 extern bool arch_pte_access_permitted(u64 pte, bool write, bool execute); 515 static inline bool arch_pte_access_permitted(u64 pte, bool write, bool execute) in arch_pte_access_permitted() argument
|
| /arch/m68k/fpsp040/ |
| A D | get_op.S | 616 | ;re-execute the inst. without taking
|
| A D | decbin.S | 13 | Speed: The program decbin takes ??? cycles to execute.
|
| A D | fpsp.h | 48 | On exit, the handlers execute:
|
| A D | res_func.S | 1968 | the 040 uses the dtag to execute the correct microcode.
|
| /arch/m68k/ifpsp060/src/ |
| A D | fpsp.S | 11628 fmul.x FP_SCR0(%a6),%fp0 # execute multiply 11668 fmul.x FP_SCR0(%a6),%fp0 # execute multiply 13346 fintrz.x SRC(%a0),%fp0 # execute fintrz 14669 fadd.x FP_SCR0(%a6),%fp0 # execute add 14762 fadd.x FP_SCR0(%a6),%fp0 # execute add 14780 fadd.x FP_SCR0(%a6),%fp0 # execute add 14876 fadd.x FP_SCR0(%a6),%fp1 # execute add 15005 bra.w fadd_zero_entry # go execute fadd 15015 bra.w fadd_zero_entry # go execute fadd 15457 bra.w fsub_zero_entry # go execute fsub [all …]
|
| /arch/arm/ |
| A D | Kconfig | 872 bool "ARM errata: Cache maintenance by set/way operations can execute out of order" 876 operations that do not specify an address execute, relative to 1199 to execute a legacy ABI binary then the result will be 1454 Say Y here if you intend to execute your compressed kernel image
|
| /arch/arm64/ |
| A D | Kconfig | 794 Affected Neoverse-N1 cores could execute a stale instruction when 1747 that you will only be able to execute AArch32 binaries that were compiled 1750 If you want to execute 32-bit userspace applications, say Y.
|
| /arch/riscv/ |
| A D | Kconfig | 1106 If you want to execute 32-bit userspace applications, say Y.
|
| /arch/mips/ |
| A D | Kconfig | 2570 # may cause ll / sc and lld / scd sequences to execute non-atomically.
|