Home
last modified time | relevance | path

Searched refs:instructions (Results 1 – 25 of 376) sorted by relevance

12345678910>>...16

/linux/tools/perf/tests/shell/
A Dstat_bpf_counters.sh44 …base_instructions=$(perf stat --no-big-num -e instructions -- $workload 2>&1 | awk '/instructions/…
45 …bpf_instructions=$(perf stat --no-big-num --bpf-counters -e instructions -- $workload 2>&1 | awk …
54 …stat_output=$(perf stat --no-big-num -e instructions/name=base_instructions/,instructions/name=bpf…
63 if ! perf stat -e instructions --bpf-counters true > /dev/null 2>&1; then
66 perf --no-pager stat -e instructions --bpf-counters true || true
A Dstat+shadow_stat.sh17 perf stat -a --no-big-num -e cycles,instructions sleep 1 2>&1 | \
18 grep -e cycles -e instructions | \
56 perf stat -a -A --no-big-num -e cycles,instructions sleep 1 2>&1 | \
/linux/Documentation/arch/arm64/
A Dlegacy_instructions.rst2 Legacy instructions
6 emulation of instructions which have been deprecated, or obsoleted in
18 Generates undefined instruction abort. Default for instructions that
27 instructions, .e.g., CP15 barriers
34 instructions. Using hardware execution generally provides better
36 about the use of the deprecated instructions.
39 architecture. Deprecated instructions should default to emulation
40 while obsolete instructions must be undefined by default.
45 Supported legacy instructions
A Dpointer-authentication.rst25 The extension adds instructions to insert a valid PAC into a pointer,
30 A subset of these instructions have been allocated from the HINT
32 these instructions behave as NOPs. Applications and libraries using
33 these instructions operate correctly regardless of the presence of the
57 with HINT space pointer authentication instructions protecting
107 register. Any attempt to use the Pointer Authentication instructions will
128 instructions to sign and authenticate function pointers and other pointers
135 but before executing any PAC instructions.
/linux/Documentation/bpf/standardization/
A Dinstruction-set.rst146 and modulo instructions.
287 Arithmetic and jump instructions
315 Arithmetic instructions
374 Note that most arithmetic instructions have 'offset' set to 0. Only three instructions
427 Byte swap instructions
441 .. table:: Byte swap instructions
476 Jump instructions
485 .. table:: Jump instructions
570 Load and store instructions
588 IMM 0 64-bit immediate instructions `64-bit immediate instructions`_
[all …]
/linux/drivers/watchdog/
A Dwdat_wdt.c119 if (action >= ARRAY_SIZE(wdat->instructions)) in wdat_wdt_run_action()
122 if (!wdat->instructions[action]) in wdat_wdt_run_action()
376 struct list_head *instructions; in wdat_wdt_probe() local
423 instructions = wdat->instructions[action]; in wdat_wdt_probe()
424 if (!instructions) { in wdat_wdt_probe()
425 instructions = devm_kzalloc(dev, in wdat_wdt_probe()
426 sizeof(*instructions), in wdat_wdt_probe()
428 if (!instructions) in wdat_wdt_probe()
431 INIT_LIST_HEAD(instructions); in wdat_wdt_probe()
432 wdat->instructions[action] = instructions; in wdat_wdt_probe()
[all …]
/linux/Documentation/bpf/
A Dlinux-notes.rst10 Byte swap instructions
15 Jump instructions
45 Legacy BPF Packet access instructions
49 <instruction-set.html#legacy-bpf-packet-access-instructions>`_,
50 Linux has special eBPF instructions for access to packet data that have been
54 The instructions come in two forms: ``BPF_ABS | <size> | BPF_LD`` and
57 These instructions are used to access packet data and can only be used when
63 These instructions have seven implicit operands:
72 These instructions have an implicit program exit condition as well. If an
A Dbpf_design_QA.rst93 It's the maximum number of instructions that the unprivileged bpf
95 Like the maximum number of instructions that can be explored during
119 Q: LD_ABS and LD_IND instructions vs C code
129 Q: BPF instructions mapping not one-to-one to native CPU
131 Q: It seems not all BPF instructions are one-to-one to native CPU.
149 of LD_ABS insn). Those instructions need to invoke epilogue and
156 due to lack of these compare instructions and they were added.
157 These two instructions is a perfect example what kind of new BPF
158 instructions are acceptable and can be added in the future.
159 These two already had equivalent instructions in native CPUs.
[all …]
A Dclang-notes.rst17 Arithmetic instructions
23 Jump instructions
32 Clang can generate atomic instructions by default when ``-mcpu=v3`` is
/linux/Documentation/devicetree/bindings/riscv/
A Dextensions.yaml386 instructions, as ratified in the 20191213 version of the
431 instructions, as ratified in commit 56ed795 ("Update
437 instructions, as ratified in commit 56ed795 ("Update
485 instructions, as ratified in commit 56ed795 ("Update
509 instructions, as ratified in commit 56ed795 ("Update
515 instructions, as ratified in commit 56ed795 ("Update
521 hash (SHA-256 only) instructions, as ratified in commit
533 instructions, as ratified in commit 56ed795 ("Update
545 instructions, as ratified in commit 56ed795 ("Update
551 instructions, as ratified in commit 56ed795 ("Update
[all …]
/linux/tools/perf/Documentation/
A Ditrace.txt1 i synthesize instructions events
34 for instructions events can be specified in units of:
36 i instructions
42 Also the call chain size (default 16, max. 1024) for instructions or
46 instructions or transactions events can be specified.
52 It is also possible to skip events generated (instructions, branches, transactions,
57 skips the first million instructions.
A Dintel-hybrid.txt29 [Fixed Counter: Counts the number of instructions retired. Unit: cpu_atom]
31 [Number of instructions retired. Fixed Counter - architectural event. Unit: cpu_core]
184 cpu_core/instructions/,
185 cpu_atom/instructions/,
199 perf stat -e cpu_core/cycles/,cpu_atom/instructions/
200 perf stat -e '{cpu_core/cycles/,cpu_core/instructions/}'
202 But '{cpu_core/cycles/,cpu_atom/instructions/}' will return
/linux/Documentation/arch/arm/
A Dswp_emulation.rst4 ARMv6 architecture deprecates use of the SWP/SWPB instructions, and recommends
5 moving to the load-locked/store-conditional instructions LDREX and STREX.
8 instructions, triggering an undefined instruction exception when executed.
9 Trapped instructions are emulated using an LDREX/STREX or LDREXB/STREXB
A Dkernel_mode_neon.rst7 * Use only NEON instructions, or VFP instructions that don't rely on support
19 It is possible to use NEON instructions (and in some cases, VFP instructions) in
24 may call schedule()], as NEON or VFP instructions will be executed in a
43 should be called before any kernel mode NEON or VFP instructions are issued.
74 Such software assistance is currently not implemented for VFP instructions
82 kernel_neon_end(), i.e., that it is only allowed to issue NEON/VFP instructions
84 instructions of its own at -O3 level if -mfpu=neon is selected, and even if the
86 instructions appearing in unexpected places if no special care is taken.
98 both NEON and VFP instructions will only ever appear in designated compilation
/linux/Documentation/arch/x86/x86_64/
A Dfsgs.rst69 Accessing FS/GS base with the FSGSBASE instructions
73 instructions to access the FS and GS base registers directly from user
74 space. These instructions are also supported on AMD Family 17H CPUs. The
75 following instructions are available:
90 FSGSBASE instructions enablement argument
92 The instructions are enumerated in CPUID leaf 7, bit 0 of EBX. If
95 The availability of the instructions does not enable them
103 instructions will fault with a #UD exception.
107 kernel has FSGSBASE instructions enabled and applications can use them.
125 FSGSBASE instructions compiler support argument
[all …]
/linux/tools/testing/selftests/powerpc/pmu/
A Dcount_instructions.c29 static int do_count_loop(struct event *events, u64 instructions, in do_count_loop() argument
38 thirty_two_instruction_loop(instructions >> 5); in do_count_loop()
45 expected = instructions + overhead; in do_count_loop()
53 printf("Looped for %llu instructions, overhead %llu\n", instructions, overhead); in do_count_loop()
A Dcount_stcx_fail.c29 static int do_count_loop(struct event *events, u64 instructions, in do_count_loop() argument
39 thirty_two_instruction_loop_with_ll_sc(instructions >> 5, &dummy); in do_count_loop()
47 expected = instructions + overhead + (events[2].result.value * 10); in do_count_loop()
57 printf("Looped for %llu instructions, overhead %llu\n", instructions, overhead); in do_count_loop()
/linux/tools/testing/selftests/powerpc/pmu/ebb/
A Dinstruction_count_test.c25 static int do_count_loop(struct event *event, uint64_t instructions, in do_count_loop() argument
37 thirty_two_instruction_loop(instructions >> 5); in do_count_loop()
46 expected = instructions + overhead; in do_count_loop()
51 printf("Looped for %lu instructions, overhead %lu\n", instructions, overhead); in do_count_loop()
/linux/arch/sparc/crypto/
A DKconfig37 Architecture: sparc64 using crypto instructions, when available
57 Architecture: sparc64 using crypto instructions, when available
67 Architecture: sparc64 using crypto instructions, when available
77 Architecture: sparc64 using crypto instructions
/linux/tools/memory-model/
A Dlinux-kernel.bell20 instructions R[{'once,'acquire,'noreturn}]
21 instructions W[{'once,'release}]
22 instructions RMW[{'once,'acquire,'release}]
36 instructions F[Barriers]
40 instructions SRCU[SRCU]
/linux/Documentation/virt/kvm/
A Dppc-pv.rst9 instructions and can emulate them accordingly.
12 instructions that needlessly return us to the hypervisor even though they
15 This is what the PPC PV interface helps with. It takes privileged instructions
35 'hypercall-instructions'. This property contains at most 4 opcodes that make
36 up the hypercall. To call a hypercall, just call these instructions.
138 Patched instructions
141 The "ld" and "std" instructions are transformed to "lwz" and "stw" instructions
147 also act on the shared page. So calling privileged instructions still works as
187 Some instructions require more logic to determine what's going on than a load
189 RAM around where we can live translate instructions to. What happens is the
/linux/arch/mips/crypto/
A DKconfig31 Architecture: mips OCTEON using crypto instructions, when available
51 Architecture: mips OCTEON using crypto instructions, when available
61 Architecture: mips OCTEON using crypto instructions, when available
/linux/Documentation/virt/
A Dparavirt_ops.rst16 corresponding to low-level critical instructions and high-level
28 Usually these operations correspond to low-level critical instructions. They
34 because they include sensitive instructions or some code paths in
/linux/arch/powerpc/crypto/
A DKconfig46 powerpc64 AltiVec extensions (POWER8 vpmsum instructions).
123 Support for cryptographic acceleration instructions on Power10 or
153 bool "Support for VMX cryptographic acceleration instructions"
156 Support for VMX cryptographic acceleration instructions.
168 Support for VMX cryptographic acceleration instructions on Power8 CPU.
/linux/arch/arm/kernel/
A Dphys2virt.S41 mov r0, r3, lsr #21 @ constant for add/sub instructions
77 @ In the non-LPAE case, all patchable instructions are MOVW
78 @ instructions, where we need to patch in the offset into the
131 @ in BE8, we load data in BE, but instructions still in LE
155 @ In the non-LPAE case, all patchable instructions are ADD or SUB
156 @ instructions, where we need to patch in the offset into the
173 @ instructions based on bits 23:22 of the opcode, and ADD/SUB can be

Completed in 38 milliseconds

12345678910>>...16