Home
last modified time | relevance | path

Searched refs:CALL (Results 1 – 25 of 51) sorted by relevance

123

/openbmc/linux/tools/testing/selftests/bpf/
H A Duprobe_multi.c13 #define CALL(name, idx) NAME(name, idx)(); macro
49 F10000(CALL, uprobe_multi_func_, 0) in bench()
50 F10000(CALL, uprobe_multi_func_, 1) in bench()
51 F10000(CALL, uprobe_multi_func_, 2) in bench()
52 F10000(CALL, uprobe_multi_func_, 3) in bench()
53 F10000(CALL, uprobe_multi_func_, 4) in bench()
/openbmc/u-boot/arch/arm/cpu/arm926ejs/mxs/
H A Dmxsimage.mx23.cfg5 CALL 0x1000 0x0
7 CALL 0x40002000 0x0
H A Dmxsimage.mx28.cfg6 CALL HAB 0x8000 0x0
9 CALL HAB 0x8000 0x0
H A Dmxsimage-signed.cfg7 CALL HAB 0x8000 0x0
11 CALL HAB 0x40001000 0x0
H A Dmxsimage-spl.mx23.cfg5 CALL 0x1000 0x0
H A Dmxsimage-spl.mx28.cfg6 CALL HAB 0x8000 0x0
/openbmc/linux/drivers/scsi/
H A D53c700.scr244 CALL SendMessage
283 CALL ProcessReceiveMessage
308 CALL ProcessReceiveMessage
314 CALL SGScriptStartAddress
327 CALL SGScriptStartAddress
338 CALL ProcessReceiveMessage
373 CALL ProcessReceiveMessage
400 CALL ProcessReceiveMessage
H A D53c700_d.h_shipped409 CALL SendMessage
517 CALL ProcessReceiveMessage
584 CALL ProcessReceiveMessage
602 CALL SGScriptStartAddress
639 CALL SGScriptStartAddress
674 CALL ProcessReceiveMessage
763 CALL ProcessReceiveMessage
835 CALL ProcessReceiveMessage
/openbmc/linux/arch/x86/kernel/
H A Dstatic_call.c8 CALL = 0, /* site call */ enumerator
65 case CALL: in __static_call_transform()
H A Dftrace_64.S301 CALL .Ldo_rebalance
/openbmc/linux/Documentation/admin-guide/hw-vuln/
H A Dsrso.rst15 CALL instruction (i.e., an instruction predicted to be a CALL but is
16 not actually a CALL) can create an entry in the RAP which may be used
21 non-architectural CALL instructions in kernel space and use this to
H A Dcross-thread-rsb.rst61 An attack can be mounted on affected processors by performing a series of CALL
70 targets by performing a sequence of CALL instructions.
/openbmc/linux/drivers/gpu/drm/nouveau/include/nvif/
H A Dpush206e.h9 PUSH_DATA__((p), NVDEF(NV206E, DMA, OPCODE2, CALL) | \
/openbmc/linux/drivers/media/v4l2-core/
H A Dvideobuf-core.c50 #define CALL(q, f, arg...) \ macro
127 return CALL(q, iolock, q, vb, fbuf); in videobuf_iolock()
724 CALL(q, sync, q, buf); in videobuf_dqbuf()
816 CALL(q, sync, q, q->read_buf); in videobuf_read_zerocopy()
930 CALL(q, sync, q, q->read_buf); in videobuf_read_one()
1190 rc = CALL(q, mmap_mapper, q, buf, vma); in videobuf_mmap_mapper()
/openbmc/u-boot/doc/
H A DREADME.commands.spl16 TYPICAL CALL
/openbmc/u-boot/doc/imx/mkimage/
H A Dmxsimage.txt81 CALL [HAB] u32_address [u32_r0_arg]
83 one difference. The CALL instruction does allow returning into the
157 C -- CALL instruction
/openbmc/linux/arch/x86/include/asm/
H A Dtext-patching.h83 __CASE(CALL); in text_opcode_size()
H A Dperf_event_p4.h723 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL, 2),
728 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_BRANCH_TYPE, CALL, 2),
/openbmc/linux/
H A DKbuild39 quiet_cmd_syscalls = CALL $<
/openbmc/linux/arch/m68k/ifpsp060/
H A Diskeleton.S43 | (1) EXAMPLE CALL-OUTS #
309 | (3) EXAMPLE CALL-OUT SECTION #
H A Dfskeleton.S40 | (1) EXAMPLE CALL-OUTS #
300 | (3) EXAMPLE CALL-OUT SECTION #
/openbmc/linux/Documentation/arch/x86/
H A Dshstk.rst16 applications. When executing a CALL instruction, the processor pushes the
20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
/openbmc/qemu/target/avr/
H A Dinsn.decode97 CALL 1001 010 ..... 111 . imm=%imm_call
H A Ddisas.c168 INSN(CALL, "0x%x", a->imm * 2)
/openbmc/linux/arch/x86/events/intel/
H A Dp4.c350 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL) |
360 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |
688 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |

123