| /linux/tools/testing/selftests/bpf/ |
| H A D | uprobe_multi.c | 30 #define CALL(name, idx) NAME(name, idx)(); macro 66 F10000(CALL, uprobe_multi_func_, 0) in bench() 67 F10000(CALL, uprobe_multi_func_, 1) in bench() 68 F10000(CALL, uprobe_multi_func_, 2) in bench() 69 F10000(CALL, uprobe_multi_func_, 3) in bench() 70 F10000(CALL, uprobe_multi_func_, 4) in bench()
|
| /linux/drivers/scsi/ |
| H A D | 53c700.scr | 244 CALL SendMessage 283 CALL ProcessReceiveMessage 308 CALL ProcessReceiveMessage 314 CALL SGScriptStartAddress 327 CALL SGScriptStartAddress 338 CALL ProcessReceiveMessage 373 CALL ProcessReceiveMessage 400 CALL ProcessReceiveMessage
|
| H A D | 53c700_d.h_shipped | 409 CALL SendMessage 517 CALL ProcessReceiveMessage 584 CALL ProcessReceiveMessage 602 CALL SGScriptStartAddress 639 CALL SGScriptStartAddress 674 CALL ProcessReceiveMessage 763 CALL ProcessReceiveMessage 835 CALL ProcessReceiveMessage
|
| /linux/arch/x86/kernel/ |
| H A D | static_call.c | 8 CALL = 0, /* site call */ enumerator 70 case CALL: in __static_call_transform()
|
| /linux/drivers/gpu/drm/nouveau/include/nvif/ |
| H A D | push206e.h | 9 PUSH_DATA__((p), NVDEF(NV206E, DMA, OPCODE2, CALL) | \
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | cross-thread-rsb.rst | 61 An attack can be mounted on affected processors by performing a series of CALL 70 targets by performing a sequence of CALL instructions.
|
| H A D | rsb.rst | 132 CALL from the guest can be used to predict the first unbalanced RET.
|
| /linux/Documentation/bpf/standardization/ |
| H A D | instruction-set.rst | 507 …CALL 0x8 0x0 call helper function by static ID {CALL, K, JMP} only, see `Helper func… 508 …CALL 0x8 0x1 call PC += imm {CALL, K, JMP} only, see `Program-loc… 509 …CALL 0x8 0x2 call helper function by BTF ID {CALL, K, JMP} only, see `Helper func… 510 EXIT 0x9 0x0 return {CALL, K, JMP} only 548 All ``CALL`` and ``JA`` instructions belong to the
|
| /linux/arch/x86/include/asm/ |
| H A D | text-patching.h | 74 __CASE(CALL); in text_opcode_size()
|
| H A D | perf_event_p4.h | 723 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL, 2), 728 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_BRANCH_TYPE, CALL, 2),
|
| /linux/arch/m68k/ifpsp060/ |
| H A D | iskeleton.S | 43 | (1) EXAMPLE CALL-OUTS # 309 | (3) EXAMPLE CALL-OUT SECTION #
|
| H A D | fskeleton.S | 40 | (1) EXAMPLE CALL-OUTS # 300 | (3) EXAMPLE CALL-OUT SECTION #
|
| H A D | os.S | 38 | EXAMPLE CALL-OUTS #
|
| /linux/arch/sparc/net/ |
| H A D | bpf_jit_comp_32.c | 85 #define CALL F1(1) macro 243 *prog++ = CALL | (((_off) >> 2) & 0x3fffffff); \
|
| H A D | bpf_jit_comp_64.c | 161 #define CALL F1(1) macro 251 ctx->image[ctx->idx] = CALL | ((off >> 2) & 0x3fffffff); in emit_call()
|
| /linux/scripts/gcc-plugins/ |
| H A D | stackleak_plugin.c | 302 if (GET_CODE(body) != CALL) in remove_stack_tracking_gcall()
|
| /linux/include/linux/ceph/ |
| H A D | rados.h | 314 f(CALL, __CEPH_OSD_OP(RD, EXEC, 1), "call") \
|
| /linux/tools/perf/util/ |
| H A D | perf_event_attr_fprintf.c | 58 bit_name(CALL), bit_name(NO_FLAGS), bit_name(NO_CYCLES), in __p_branch_sample_type()
|
| H A D | dlfilter.c | 371 CHECK_FLAG(CALL); in dlfilter__init()
|
| /linux/lib/ |
| H A D | Kconfig | 186 prompt "Enable s390x DEFLATE CONVERSION CALL support for kernel zlib"
|
| /linux/tools/arch/x86/lib/ |
| H A D | x86-opcode-map.txt | 303 # in "near" jumps and calls is 16-bit. For CALL, 306 e8: CALL Jz (f64),(!REX2) 485 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn). 1248 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
|
| /linux/arch/x86/lib/ |
| H A D | x86-opcode-map.txt | 303 # in "near" jumps and calls is 16-bit. For CALL, 306 e8: CALL Jz (f64),(!REX2) 485 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn). 1248 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
|
| /linux/tools/perf/Documentation/ |
| H A D | perf-script.txt | 256 TYPE : branch type: COND/UNCOND/IND/CALL/IND_CALL/RET etc.
|
| /linux/Documentation/scsi/ |
| H A D | ChangeLog.ncr53c8xx | 459 Use a simple CALL to a launch script in the CCB.
|
| /linux/kernel/bpf/ |
| H A D | core.c | 1632 INSN_2(JMP, CALL), \
|