| /linux/tools/testing/selftests/bpf/ |
| A D | uprobe_multi.c | 26 #define CALL(name, idx) NAME(name, idx)(); macro 62 F10000(CALL, uprobe_multi_func_, 0) in bench() 63 F10000(CALL, uprobe_multi_func_, 1) in bench() 64 F10000(CALL, uprobe_multi_func_, 2) in bench() 65 F10000(CALL, uprobe_multi_func_, 3) in bench() 66 F10000(CALL, uprobe_multi_func_, 4) in bench()
|
| /linux/drivers/scsi/ |
| A D | 53c700.scr | 244 CALL SendMessage 283 CALL ProcessReceiveMessage 308 CALL ProcessReceiveMessage 314 CALL SGScriptStartAddress 327 CALL SGScriptStartAddress 338 CALL ProcessReceiveMessage 373 CALL ProcessReceiveMessage 400 CALL ProcessReceiveMessage
|
| A D | 53c700_d.h_shipped | 409 CALL SendMessage 517 CALL ProcessReceiveMessage 584 CALL ProcessReceiveMessage 602 CALL SGScriptStartAddress 639 CALL SGScriptStartAddress 674 CALL ProcessReceiveMessage 763 CALL ProcessReceiveMessage 835 CALL ProcessReceiveMessage
|
| /linux/arch/x86/kernel/ |
| A D | static_call.c | 8 CALL = 0, /* site call */ enumerator 65 case CALL: in __static_call_transform()
|
| A D | ftrace_64.S | 301 CALL .Ldo_rebalance
|
| /linux/drivers/gpu/drm/nouveau/include/nvif/ |
| A D | push206e.h | 9 PUSH_DATA__((p), NVDEF(NV206E, DMA, OPCODE2, CALL) | \
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| A D | srso.rst | 15 CALL instruction (i.e., an instruction predicted to be a CALL but is 16 not actually a CALL) can create an entry in the RAP which may be used 21 non-architectural CALL instructions in kernel space and use this to
|
| A D | cross-thread-rsb.rst | 61 An attack can be mounted on affected processors by performing a series of CALL 70 targets by performing a sequence of CALL instructions.
|
| /linux/Documentation/bpf/standardization/ |
| A D | instruction-set.rst | 499 …CALL 0x8 0x0 call helper function by static ID {CALL, K, JMP} only, see `Helper func… 500 …CALL 0x8 0x1 call PC += imm {CALL, K, JMP} only, see `Program-loc… 501 …CALL 0x8 0x2 call helper function by BTF ID {CALL, K, JMP} only, see `Helper func… 502 EXIT 0x9 0x0 return {CALL, K, JMP} only 540 All ``CALL`` and ``JA`` instructions belong to the
|
| /linux/arch/x86/include/asm/ |
| A D | text-patching.h | 73 __CASE(CALL); in text_opcode_size()
|
| A D | perf_event_p4.h | 723 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL, 2), 728 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_BRANCH_TYPE, CALL, 2),
|
| /linux/ |
| A D | Kbuild | 39 quiet_cmd_syscalls = CALL $<
|
| /linux/arch/m68k/ifpsp060/ |
| A D | iskeleton.S | 43 | (1) EXAMPLE CALL-OUTS # 309 | (3) EXAMPLE CALL-OUT SECTION #
|
| A D | fskeleton.S | 40 | (1) EXAMPLE CALL-OUTS # 300 | (3) EXAMPLE CALL-OUT SECTION #
|
| A D | os.S | 38 | EXAMPLE CALL-OUTS #
|
| /linux/Documentation/arch/x86/ |
| A D | shstk.rst | 16 applications. When executing a CALL instruction, the processor pushes the 20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
|
| /linux/arch/x86/events/intel/ |
| A D | p4.c | 350 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL) | 360 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) | 688 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |
|
| /linux/scripts/gcc-plugins/ |
| A D | stackleak_plugin.c | 302 if (GET_CODE(body) != CALL) in remove_stack_tracking_gcall()
|
| /linux/arch/sparc/net/ |
| A D | bpf_jit_comp_32.c | 85 #define CALL F1(1) macro 243 *prog++ = CALL | (((_off) >> 2) & 0x3fffffff); \
|
| A D | bpf_jit_comp_64.c | 161 #define CALL F1(1) macro 251 ctx->image[ctx->idx] = CALL | ((off >> 2) & 0x3fffffff); in emit_call()
|
| /linux/include/linux/ceph/ |
| A D | rados.h | 314 f(CALL, __CEPH_OSD_OP(RD, EXEC, 1), "call") \
|
| /linux/tools/perf/util/ |
| A D | perf_event_attr_fprintf.c | 58 bit_name(CALL), bit_name(NO_FLAGS), bit_name(NO_CYCLES), in __p_branch_sample_type()
|
| A D | dlfilter.c | 371 CHECK_FLAG(CALL); in dlfilter__init()
|
| /linux/Documentation/translations/ko_KR/ |
| A D | memory-barriers.txt | 2366 CALL wakeup 2407 CALL wakeup
|
| /linux/tools/arch/x86/lib/ |
| A D | x86-opcode-map.txt | 298 # in "near" jumps and calls is 16-bit. For CALL, 301 e8: CALL Jz (f64) (!REX2) 480 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn). 1165 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
|