Home
last modified time | relevance | path

Searched refs:CALL (Results 1 – 25 of 33) sorted by relevance

12

/linux/tools/testing/selftests/bpf/
A Duprobe_multi.c26 #define CALL(name, idx) NAME(name, idx)(); macro
62 F10000(CALL, uprobe_multi_func_, 0) in bench()
63 F10000(CALL, uprobe_multi_func_, 1) in bench()
64 F10000(CALL, uprobe_multi_func_, 2) in bench()
65 F10000(CALL, uprobe_multi_func_, 3) in bench()
66 F10000(CALL, uprobe_multi_func_, 4) in bench()
/linux/drivers/scsi/
A D53c700.scr244 CALL SendMessage
283 CALL ProcessReceiveMessage
308 CALL ProcessReceiveMessage
314 CALL SGScriptStartAddress
327 CALL SGScriptStartAddress
338 CALL ProcessReceiveMessage
373 CALL ProcessReceiveMessage
400 CALL ProcessReceiveMessage
A D53c700_d.h_shipped409 CALL SendMessage
517 CALL ProcessReceiveMessage
584 CALL ProcessReceiveMessage
602 CALL SGScriptStartAddress
639 CALL SGScriptStartAddress
674 CALL ProcessReceiveMessage
763 CALL ProcessReceiveMessage
835 CALL ProcessReceiveMessage
/linux/arch/x86/kernel/
A Dstatic_call.c8 CALL = 0, /* site call */ enumerator
65 case CALL: in __static_call_transform()
A Dftrace_64.S301 CALL .Ldo_rebalance
/linux/drivers/gpu/drm/nouveau/include/nvif/
A Dpush206e.h9 PUSH_DATA__((p), NVDEF(NV206E, DMA, OPCODE2, CALL) | \
/linux/Documentation/admin-guide/hw-vuln/
A Dsrso.rst15 CALL instruction (i.e., an instruction predicted to be a CALL but is
16 not actually a CALL) can create an entry in the RAP which may be used
21 non-architectural CALL instructions in kernel space and use this to
A Dcross-thread-rsb.rst61 An attack can be mounted on affected processors by performing a series of CALL
70 targets by performing a sequence of CALL instructions.
/linux/Documentation/bpf/standardization/
A Dinstruction-set.rst499CALL 0x8 0x0 call helper function by static ID {CALL, K, JMP} only, see `Helper func…
500CALL 0x8 0x1 call PC += imm {CALL, K, JMP} only, see `Program-loc…
501CALL 0x8 0x2 call helper function by BTF ID {CALL, K, JMP} only, see `Helper func…
502 EXIT 0x9 0x0 return {CALL, K, JMP} only
540 All ``CALL`` and ``JA`` instructions belong to the
/linux/arch/x86/include/asm/
A Dtext-patching.h73 __CASE(CALL); in text_opcode_size()
A Dperf_event_p4.h723 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL, 2),
728 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_BRANCH_TYPE, CALL, 2),
/linux/
A DKbuild39 quiet_cmd_syscalls = CALL $<
/linux/arch/m68k/ifpsp060/
A Diskeleton.S43 | (1) EXAMPLE CALL-OUTS #
309 | (3) EXAMPLE CALL-OUT SECTION #
A Dfskeleton.S40 | (1) EXAMPLE CALL-OUTS #
300 | (3) EXAMPLE CALL-OUT SECTION #
A Dos.S38 | EXAMPLE CALL-OUTS #
/linux/Documentation/arch/x86/
A Dshstk.rst16 applications. When executing a CALL instruction, the processor pushes the
20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
/linux/arch/x86/events/intel/
A Dp4.c350 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL) |
360 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |
688 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |
/linux/scripts/gcc-plugins/
A Dstackleak_plugin.c302 if (GET_CODE(body) != CALL) in remove_stack_tracking_gcall()
/linux/arch/sparc/net/
A Dbpf_jit_comp_32.c85 #define CALL F1(1) macro
243 *prog++ = CALL | (((_off) >> 2) & 0x3fffffff); \
A Dbpf_jit_comp_64.c161 #define CALL F1(1) macro
251 ctx->image[ctx->idx] = CALL | ((off >> 2) & 0x3fffffff); in emit_call()
/linux/include/linux/ceph/
A Drados.h314 f(CALL, __CEPH_OSD_OP(RD, EXEC, 1), "call") \
/linux/tools/perf/util/
A Dperf_event_attr_fprintf.c58 bit_name(CALL), bit_name(NO_FLAGS), bit_name(NO_CYCLES), in __p_branch_sample_type()
A Ddlfilter.c371 CHECK_FLAG(CALL); in dlfilter__init()
/linux/Documentation/translations/ko_KR/
A Dmemory-barriers.txt2366 CALL wakeup
2407 CALL wakeup
/linux/tools/arch/x86/lib/
A Dx86-opcode-map.txt298 # in "near" jumps and calls is 16-bit. For CALL,
301 e8: CALL Jz (f64) (!REX2)
480 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
1165 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).

Completed in 59 milliseconds

12