Home
last modified time | relevance | path

Searched refs:CALL (Results 1 – 25 of 35) sorted by relevance

12

/linux-6.15/tools/testing/selftests/bpf/
H A Duprobe_multi.c30 #define CALL(name, idx) NAME(name, idx)(); macro
66 F10000(CALL, uprobe_multi_func_, 0) in bench()
67 F10000(CALL, uprobe_multi_func_, 1) in bench()
68 F10000(CALL, uprobe_multi_func_, 2) in bench()
69 F10000(CALL, uprobe_multi_func_, 3) in bench()
70 F10000(CALL, uprobe_multi_func_, 4) in bench()
/linux-6.15/drivers/scsi/
H A D53c700.scr244 CALL SendMessage
283 CALL ProcessReceiveMessage
308 CALL ProcessReceiveMessage
314 CALL SGScriptStartAddress
327 CALL SGScriptStartAddress
338 CALL ProcessReceiveMessage
373 CALL ProcessReceiveMessage
400 CALL ProcessReceiveMessage
H A D53c700_d.h_shipped409 CALL SendMessage
517 CALL ProcessReceiveMessage
584 CALL ProcessReceiveMessage
602 CALL SGScriptStartAddress
639 CALL SGScriptStartAddress
674 CALL ProcessReceiveMessage
763 CALL ProcessReceiveMessage
835 CALL ProcessReceiveMessage
/linux-6.15/arch/x86/kernel/
H A Dstatic_call.c8 CALL = 0, /* site call */ enumerator
65 case CALL: in __static_call_transform()
H A Dftrace_64.S304 CALL .Ldo_rebalance
/linux-6.15/drivers/gpu/drm/nouveau/include/nvif/
H A Dpush206e.h9 PUSH_DATA__((p), NVDEF(NV206E, DMA, OPCODE2, CALL) | \
/linux-6.15/Documentation/admin-guide/hw-vuln/
H A Dsrso.rst15 CALL instruction (i.e., an instruction predicted to be a CALL but is
16 not actually a CALL) can create an entry in the RAP which may be used
21 non-architectural CALL instructions in kernel space and use this to
H A Dcross-thread-rsb.rst61 An attack can be mounted on affected processors by performing a series of CALL
70 targets by performing a sequence of CALL instructions.
/linux-6.15/Documentation/bpf/standardization/
H A Dinstruction-set.rst507CALL 0x8 0x0 call helper function by static ID {CALL, K, JMP} only, see `Helper func…
508CALL 0x8 0x1 call PC += imm {CALL, K, JMP} only, see `Program-loc…
509CALL 0x8 0x2 call helper function by BTF ID {CALL, K, JMP} only, see `Helper func…
510 EXIT 0x9 0x0 return {CALL, K, JMP} only
548 All ``CALL`` and ``JA`` instructions belong to the
/linux-6.15/arch/x86/include/asm/
H A Dtext-patching.h74 __CASE(CALL); in text_opcode_size()
H A Dperf_event_p4.h723 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL, 2),
728 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_BRANCH_TYPE, CALL, 2),
/linux-6.15/
H A DKbuild39 quiet_cmd_syscalls = CALL $<
/linux-6.15/arch/m68k/ifpsp060/
H A Diskeleton.S43 | (1) EXAMPLE CALL-OUTS #
309 | (3) EXAMPLE CALL-OUT SECTION #
H A Dfskeleton.S40 | (1) EXAMPLE CALL-OUTS #
300 | (3) EXAMPLE CALL-OUT SECTION #
H A Dos.S38 | EXAMPLE CALL-OUTS #
/linux-6.15/Documentation/arch/x86/
H A Dshstk.rst16 applications. When executing a CALL instruction, the processor pushes the
20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
/linux-6.15/arch/x86/events/intel/
H A Dp4.c351 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL) |
361 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |
689 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |
/linux-6.15/scripts/gcc-plugins/
H A Dstackleak_plugin.c302 if (GET_CODE(body) != CALL) in remove_stack_tracking_gcall()
/linux-6.15/arch/sparc/net/
H A Dbpf_jit_comp_32.c85 #define CALL F1(1) macro
243 *prog++ = CALL | (((_off) >> 2) & 0x3fffffff); \
H A Dbpf_jit_comp_64.c161 #define CALL F1(1) macro
251 ctx->image[ctx->idx] = CALL | ((off >> 2) & 0x3fffffff); in emit_call()
/linux-6.15/include/linux/ceph/
H A Drados.h314 f(CALL, __CEPH_OSD_OP(RD, EXEC, 1), "call") \
/linux-6.15/tools/perf/util/
H A Dperf_event_attr_fprintf.c58 bit_name(CALL), bit_name(NO_FLAGS), bit_name(NO_CYCLES), in __p_branch_sample_type()
H A Ddlfilter.c372 CHECK_FLAG(CALL); in dlfilter__init()
/linux-6.15/Documentation/translations/ko_KR/
H A Dmemory-barriers.txt2366 CALL wakeup
2407 CALL wakeup
/linux-6.15/arch/x86/lib/
H A Dx86-opcode-map.txt298 # in "near" jumps and calls is 16-bit. For CALL,
301 e8: CALL Jz (f64) (!REX2)
480 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
1165 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).

12