Home
last modified time | relevance | path

Searched refs:CALL (Results 1 – 25 of 29) sorted by relevance

12

/linux/tools/testing/selftests/bpf/
H A Duprobe_multi.c30 #define CALL(name, idx) NAME(name, idx)(); macro
66 F10000(CALL, uprobe_multi_func_, 0) in bench()
67 F10000(CALL, uprobe_multi_func_, 1) in bench()
68 F10000(CALL, uprobe_multi_func_, 2) in bench()
69 F10000(CALL, uprobe_multi_func_, 3) in bench()
70 F10000(CALL, uprobe_multi_func_, 4) in bench()
/linux/drivers/scsi/
H A D53c700.scr244 CALL SendMessage
283 CALL ProcessReceiveMessage
308 CALL ProcessReceiveMessage
314 CALL SGScriptStartAddress
327 CALL SGScriptStartAddress
338 CALL ProcessReceiveMessage
373 CALL ProcessReceiveMessage
400 CALL ProcessReceiveMessage
H A D53c700_d.h_shipped409 CALL SendMessage
517 CALL ProcessReceiveMessage
584 CALL ProcessReceiveMessage
602 CALL SGScriptStartAddress
639 CALL SGScriptStartAddress
674 CALL ProcessReceiveMessage
763 CALL ProcessReceiveMessage
835 CALL ProcessReceiveMessage
/linux/arch/x86/kernel/
H A Dstatic_call.c8 CALL = 0, /* site call */ enumerator
70 case CALL: in __static_call_transform()
/linux/drivers/gpu/drm/nouveau/include/nvif/
H A Dpush206e.h9 PUSH_DATA__((p), NVDEF(NV206E, DMA, OPCODE2, CALL) | \
/linux/Documentation/admin-guide/hw-vuln/
H A Dcross-thread-rsb.rst61 An attack can be mounted on affected processors by performing a series of CALL
70 targets by performing a sequence of CALL instructions.
H A Drsb.rst132 CALL from the guest can be used to predict the first unbalanced RET.
/linux/Documentation/bpf/standardization/
H A Dinstruction-set.rst507CALL 0x8 0x0 call helper function by static ID {CALL, K, JMP} only, see `Helper func…
508CALL 0x8 0x1 call PC += imm {CALL, K, JMP} only, see `Program-loc…
509CALL 0x8 0x2 call helper function by BTF ID {CALL, K, JMP} only, see `Helper func…
510 EXIT 0x9 0x0 return {CALL, K, JMP} only
548 All ``CALL`` and ``JA`` instructions belong to the
/linux/arch/x86/include/asm/
H A Dtext-patching.h74 __CASE(CALL); in text_opcode_size()
H A Dperf_event_p4.h723 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL, 2),
728 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_BRANCH_TYPE, CALL, 2),
/linux/arch/m68k/ifpsp060/
H A Diskeleton.S43 | (1) EXAMPLE CALL-OUTS #
309 | (3) EXAMPLE CALL-OUT SECTION #
H A Dfskeleton.S40 | (1) EXAMPLE CALL-OUTS #
300 | (3) EXAMPLE CALL-OUT SECTION #
H A Dos.S38 | EXAMPLE CALL-OUTS #
/linux/arch/sparc/net/
H A Dbpf_jit_comp_32.c85 #define CALL F1(1) macro
243 *prog++ = CALL | (((_off) >> 2) & 0x3fffffff); \
H A Dbpf_jit_comp_64.c161 #define CALL F1(1) macro
251 ctx->image[ctx->idx] = CALL | ((off >> 2) & 0x3fffffff); in emit_call()
/linux/scripts/gcc-plugins/
H A Dstackleak_plugin.c302 if (GET_CODE(body) != CALL) in remove_stack_tracking_gcall()
/linux/include/linux/ceph/
H A Drados.h314 f(CALL, __CEPH_OSD_OP(RD, EXEC, 1), "call") \
/linux/tools/perf/util/
H A Dperf_event_attr_fprintf.c58 bit_name(CALL), bit_name(NO_FLAGS), bit_name(NO_CYCLES), in __p_branch_sample_type()
H A Ddlfilter.c371 CHECK_FLAG(CALL); in dlfilter__init()
/linux/lib/
H A DKconfig186 prompt "Enable s390x DEFLATE CONVERSION CALL support for kernel zlib"
/linux/tools/arch/x86/lib/
H A Dx86-opcode-map.txt303 # in "near" jumps and calls is 16-bit. For CALL,
306 e8: CALL Jz (f64),(!REX2)
485 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
1248 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
/linux/arch/x86/lib/
H A Dx86-opcode-map.txt303 # in "near" jumps and calls is 16-bit. For CALL,
306 e8: CALL Jz (f64),(!REX2)
485 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
1248 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
/linux/tools/perf/Documentation/
H A Dperf-script.txt256 TYPE : branch type: COND/UNCOND/IND/CALL/IND_CALL/RET etc.
/linux/Documentation/scsi/
H A DChangeLog.ncr53c8xx459 Use a simple CALL to a launch script in the CCB.
/linux/kernel/bpf/
H A Dcore.c1632 INSN_2(JMP, CALL), \

12