| /linux-6.15/tools/perf/tests/shell/ |
| H A D | stat_bpf_counters.sh | 44 …base_instructions=$(perf stat --no-big-num -e instructions -- $workload 2>&1 | awk '/instructions/… 45 …bpf_instructions=$(perf stat --no-big-num --bpf-counters -e instructions -- $workload 2>&1 | awk … 54 …stat_output=$(perf stat --no-big-num -e instructions/name=base_instructions/,instructions/name=bpf… 63 if ! perf stat -e instructions --bpf-counters true > /dev/null 2>&1; then 66 perf --no-pager stat -e instructions --bpf-counters true || true
|
| H A D | stat+shadow_stat.sh | 17 perf stat -a --no-big-num -e cycles,instructions sleep 1 2>&1 | \ 18 grep -e cycles -e instructions | \ 56 perf stat -a -A --no-big-num -e cycles,instructions sleep 1 2>&1 | \
|
| /linux-6.15/Documentation/arch/arm64/ |
| H A D | legacy_instructions.rst | 2 Legacy instructions 6 emulation of instructions which have been deprecated, or obsoleted in 18 Generates undefined instruction abort. Default for instructions that 27 instructions, .e.g., CP15 barriers 34 instructions. Using hardware execution generally provides better 36 about the use of the deprecated instructions. 39 architecture. Deprecated instructions should default to emulation 40 while obsolete instructions must be undefined by default. 45 Supported legacy instructions
|
| H A D | pointer-authentication.rst | 25 The extension adds instructions to insert a valid PAC into a pointer, 30 A subset of these instructions have been allocated from the HINT 32 these instructions behave as NOPs. Applications and libraries using 33 these instructions operate correctly regardless of the presence of the 57 with HINT space pointer authentication instructions protecting 107 register. Any attempt to use the Pointer Authentication instructions will 128 instructions to sign and authenticate function pointers and other pointers 135 but before executing any PAC instructions.
|
| /linux-6.15/Documentation/bpf/standardization/ |
| H A D | instruction-set.rst | 146 and modulo instructions. 287 Arithmetic and jump instructions 315 Arithmetic instructions 325 .. table:: Arithmetic instructions 382 Note that most arithmetic instructions have 'offset' set to 0. Only three instructions 435 Byte swap instructions 449 .. table:: Byte swap instructions 484 Jump instructions 493 .. table:: Jump instructions 578 Load and store instructions [all …]
|
| /linux-6.15/drivers/watchdog/ |
| H A D | wdat_wdt.c | 119 if (action >= ARRAY_SIZE(wdat->instructions)) in wdat_wdt_run_action() 122 if (!wdat->instructions[action]) in wdat_wdt_run_action() 376 struct list_head *instructions; in wdat_wdt_probe() local 423 instructions = wdat->instructions[action]; in wdat_wdt_probe() 424 if (!instructions) { in wdat_wdt_probe() 425 instructions = devm_kzalloc(dev, in wdat_wdt_probe() 426 sizeof(*instructions), in wdat_wdt_probe() 428 if (!instructions) in wdat_wdt_probe() 431 INIT_LIST_HEAD(instructions); in wdat_wdt_probe() 432 wdat->instructions[action] = instructions; in wdat_wdt_probe() [all …]
|
| /linux-6.15/Documentation/bpf/ |
| H A D | linux-notes.rst | 10 Byte swap instructions 15 Jump instructions 45 Legacy BPF Packet access instructions 49 <instruction-set.html#legacy-bpf-packet-access-instructions>`_, 50 Linux has special eBPF instructions for access to packet data that have been 54 The instructions come in two forms: ``BPF_ABS | <size> | BPF_LD`` and 57 These instructions are used to access packet data and can only be used when 63 These instructions have seven implicit operands: 72 These instructions have an implicit program exit condition as well. If an
|
| H A D | bpf_design_QA.rst | 93 It's the maximum number of instructions that the unprivileged bpf 95 Like the maximum number of instructions that can be explored during 119 Q: LD_ABS and LD_IND instructions vs C code 129 Q: BPF instructions mapping not one-to-one to native CPU 131 Q: It seems not all BPF instructions are one-to-one to native CPU. 149 of LD_ABS insn). Those instructions need to invoke epilogue and 156 due to lack of these compare instructions and they were added. 157 These two instructions is a perfect example what kind of new BPF 158 instructions are acceptable and can be added in the future. 159 These two already had equivalent instructions in native CPUs. [all …]
|
| H A D | clang-notes.rst | 17 Arithmetic instructions 23 Jump instructions 32 Clang can generate atomic instructions by default when ``-mcpu=v3`` is
|
| /linux-6.15/Documentation/devicetree/bindings/riscv/ |
| H A D | extensions.yaml | 462 instructions, as ratified in the 20191213 version of the 507 instructions, as ratified in commit 56ed795 ("Update 513 instructions, as ratified in commit 56ed795 ("Update 573 instructions, as ratified in commit 56ed795 ("Update 597 instructions, as ratified in commit 56ed795 ("Update 603 instructions, as ratified in commit 56ed795 ("Update 609 hash (SHA-256 only) instructions, as ratified in commit 621 instructions, as ratified in commit 56ed795 ("Update 633 instructions, as ratified in commit 56ed795 ("Update 639 instructions, as ratified in commit 56ed795 ("Update [all …]
|
| /linux-6.15/tools/perf/Documentation/ |
| H A D | itrace.txt | 1 i synthesize instructions events 34 for instructions events can be specified in units of: 36 i instructions 42 Also the call chain size (default 16, max. 1024) for instructions or 46 instructions or transactions events can be specified. 52 It is also possible to skip events generated (instructions, branches, transactions, 57 skips the first million instructions.
|
| H A D | intel-hybrid.txt | 29 [Fixed Counter: Counts the number of instructions retired. Unit: cpu_atom] 31 [Number of instructions retired. Fixed Counter - architectural event. Unit: cpu_core] 184 cpu_core/instructions/, 185 cpu_atom/instructions/, 199 perf stat -e cpu_core/cycles/,cpu_atom/instructions/ 200 perf stat -e '{cpu_core/cycles/,cpu_core/instructions/}' 202 But '{cpu_core/cycles/,cpu_atom/instructions/}' will return
|
| /linux-6.15/Documentation/arch/arm/ |
| H A D | swp_emulation.rst | 4 ARMv6 architecture deprecates use of the SWP/SWPB instructions, and recommends 5 moving to the load-locked/store-conditional instructions LDREX and STREX. 8 instructions, triggering an undefined instruction exception when executed. 9 Trapped instructions are emulated using an LDREX/STREX or LDREXB/STREXB
|
| H A D | kernel_mode_neon.rst | 7 * Use only NEON instructions, or VFP instructions that don't rely on support 19 It is possible to use NEON instructions (and in some cases, VFP instructions) in 24 may call schedule()], as NEON or VFP instructions will be executed in a 43 should be called before any kernel mode NEON or VFP instructions are issued. 74 Such software assistance is currently not implemented for VFP instructions 82 kernel_neon_end(), i.e., that it is only allowed to issue NEON/VFP instructions 84 instructions of its own at -O3 level if -mfpu=neon is selected, and even if the 86 instructions appearing in unexpected places if no special care is taken. 98 both NEON and VFP instructions will only ever appear in designated compilation
|
| /linux-6.15/Documentation/arch/x86/x86_64/ |
| H A D | fsgs.rst | 69 Accessing FS/GS base with the FSGSBASE instructions 73 instructions to access the FS and GS base registers directly from user 74 space. These instructions are also supported on AMD Family 17H CPUs. The 75 following instructions are available: 90 FSGSBASE instructions enablement 92 The instructions are enumerated in CPUID leaf 7, bit 0 of EBX. If 95 The availability of the instructions does not enable them 103 instructions will fault with a #UD exception. 107 kernel has FSGSBASE instructions enabled and applications can use them. 125 FSGSBASE instructions compiler support [all …]
|
| /linux-6.15/tools/testing/selftests/powerpc/pmu/ |
| H A D | count_instructions.c | 29 static int do_count_loop(struct event *events, u64 instructions, in do_count_loop() argument 38 thirty_two_instruction_loop(instructions >> 5); in do_count_loop() 45 expected = instructions + overhead; in do_count_loop() 53 printf("Looped for %llu instructions, overhead %llu\n", instructions, overhead); in do_count_loop()
|
| H A D | count_stcx_fail.c | 29 static int do_count_loop(struct event *events, u64 instructions, in do_count_loop() argument 39 thirty_two_instruction_loop_with_ll_sc(instructions >> 5, &dummy); in do_count_loop() 47 expected = instructions + overhead + (events[2].result.value * 10); in do_count_loop() 57 printf("Looped for %llu instructions, overhead %llu\n", instructions, overhead); in do_count_loop()
|
| /linux-6.15/tools/testing/selftests/powerpc/pmu/ebb/ |
| H A D | instruction_count_test.c | 25 static int do_count_loop(struct event *event, uint64_t instructions, in do_count_loop() argument 37 thirty_two_instruction_loop(instructions >> 5); in do_count_loop() 46 expected = instructions + overhead; in do_count_loop() 51 printf("Looped for %lu instructions, overhead %lu\n", instructions, overhead); in do_count_loop()
|
| /linux-6.15/arch/sparc/crypto/ |
| H A D | Kconfig | 27 Architecture: sparc64 using crypto instructions, when available 47 Architecture: sparc64 using crypto instructions, when available 57 Architecture: sparc64 using crypto instructions, when available 67 Architecture: sparc64 using crypto instructions
|
| /linux-6.15/Documentation/virt/kvm/ |
| H A D | ppc-pv.rst | 9 instructions and can emulate them accordingly. 12 instructions that needlessly return us to the hypervisor even though they 15 This is what the PPC PV interface helps with. It takes privileged instructions 35 'hypercall-instructions'. This property contains at most 4 opcodes that make 36 up the hypercall. To call a hypercall, just call these instructions. 138 Patched instructions 141 The "ld" and "std" instructions are transformed to "lwz" and "stw" instructions 147 also act on the shared page. So calling privileged instructions still works as 187 Some instructions require more logic to determine what's going on than a load 189 RAM around where we can live translate instructions to. What happens is the
|
| /linux-6.15/arch/mips/crypto/ |
| H A D | Kconfig | 24 Architecture: mips OCTEON using crypto instructions, when available 44 Architecture: mips OCTEON using crypto instructions, when available 54 Architecture: mips OCTEON using crypto instructions, when available
|
| /linux-6.15/tools/memory-model/ |
| H A D | linux-kernel.bell | 21 instructions R[Accesses] 22 instructions W[Accesses] 23 instructions RMW[Accesses] 37 instructions F[Barriers] 52 instructions SRCU[SRCU]
|
| /linux-6.15/Documentation/virt/ |
| H A D | paravirt_ops.rst | 16 corresponding to low-level critical instructions and high-level 28 Usually these operations correspond to low-level critical instructions. They 34 because they include sensitive instructions or some code paths in
|
| /linux-6.15/arch/arm/kernel/ |
| H A D | phys2virt.S | 41 mov r0, r3, lsr #21 @ constant for add/sub instructions 77 @ In the non-LPAE case, all patchable instructions are MOVW 78 @ instructions, where we need to patch in the offset into the 131 @ in BE8, we load data in BE, but instructions still in LE 155 @ In the non-LPAE case, all patchable instructions are ADD or SUB 156 @ instructions, where we need to patch in the offset into the 173 @ instructions based on bits 23:22 of the opcode, and ADD/SUB can be
|
| /linux-6.15/tools/testing/selftests/kvm/x86/ |
| H A D | nested_emulation_test.c | 20 static struct emulated_instruction instructions[] = { variable 82 for (i = 0; i < ARRAY_SIZE(instructions); i++) { in guest_code() 83 struct emulated_instruction *insn = &instructions[i]; in guest_code()
|