/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | uprobe_multi.c | 13 #define CALL(name, idx) NAME(name, idx)(); macro 49 F10000(CALL, uprobe_multi_func_, 0) in bench() 50 F10000(CALL, uprobe_multi_func_, 1) in bench() 51 F10000(CALL, uprobe_multi_func_, 2) in bench() 52 F10000(CALL, uprobe_multi_func_, 3) in bench() 53 F10000(CALL, uprobe_multi_func_, 4) in bench()
|
/openbmc/u-boot/arch/arm/cpu/arm926ejs/mxs/ |
H A D | mxsimage.mx23.cfg | 5 CALL 0x1000 0x0 7 CALL 0x40002000 0x0
|
H A D | mxsimage.mx28.cfg | 6 CALL HAB 0x8000 0x0 9 CALL HAB 0x8000 0x0
|
H A D | mxsimage-signed.cfg | 7 CALL HAB 0x8000 0x0 11 CALL HAB 0x40001000 0x0
|
H A D | mxsimage-spl.mx23.cfg | 5 CALL 0x1000 0x0
|
H A D | mxsimage-spl.mx28.cfg | 6 CALL HAB 0x8000 0x0
|
/openbmc/linux/drivers/scsi/ |
H A D | 53c700.scr | 244 CALL SendMessage 283 CALL ProcessReceiveMessage 308 CALL ProcessReceiveMessage 314 CALL SGScriptStartAddress 327 CALL SGScriptStartAddress 338 CALL ProcessReceiveMessage 373 CALL ProcessReceiveMessage 400 CALL ProcessReceiveMessage
|
H A D | 53c700_d.h_shipped | 409 CALL SendMessage 517 CALL ProcessReceiveMessage 584 CALL ProcessReceiveMessage 602 CALL SGScriptStartAddress 639 CALL SGScriptStartAddress 674 CALL ProcessReceiveMessage 763 CALL ProcessReceiveMessage 835 CALL ProcessReceiveMessage
|
/openbmc/linux/arch/x86/kernel/ |
H A D | static_call.c | 8 CALL = 0, /* site call */ enumerator 65 case CALL: in __static_call_transform()
|
H A D | ftrace_64.S | 301 CALL .Ldo_rebalance
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | srso.rst | 15 CALL instruction (i.e., an instruction predicted to be a CALL but is 16 not actually a CALL) can create an entry in the RAP which may be used 21 non-architectural CALL instructions in kernel space and use this to
|
H A D | cross-thread-rsb.rst | 61 An attack can be mounted on affected processors by performing a series of CALL 70 targets by performing a sequence of CALL instructions.
|
/openbmc/linux/drivers/gpu/drm/nouveau/include/nvif/ |
H A D | push206e.h | 9 PUSH_DATA__((p), NVDEF(NV206E, DMA, OPCODE2, CALL) | \
|
/openbmc/linux/drivers/media/v4l2-core/ |
H A D | videobuf-core.c | 50 #define CALL(q, f, arg...) \ macro 127 return CALL(q, iolock, q, vb, fbuf); in videobuf_iolock() 724 CALL(q, sync, q, buf); in videobuf_dqbuf() 816 CALL(q, sync, q, q->read_buf); in videobuf_read_zerocopy() 930 CALL(q, sync, q, q->read_buf); in videobuf_read_one() 1190 rc = CALL(q, mmap_mapper, q, buf, vma); in videobuf_mmap_mapper()
|
/openbmc/u-boot/doc/ |
H A D | README.commands.spl | 16 TYPICAL CALL
|
/openbmc/u-boot/doc/imx/mkimage/ |
H A D | mxsimage.txt | 81 CALL [HAB] u32_address [u32_r0_arg] 83 one difference. The CALL instruction does allow returning into the 157 C -- CALL instruction
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | text-patching.h | 83 __CASE(CALL); in text_opcode_size()
|
H A D | perf_event_p4.h | 723 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL, 2), 728 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_BRANCH_TYPE, CALL, 2),
|
/openbmc/linux/ |
H A D | Kbuild | 39 quiet_cmd_syscalls = CALL $<
|
/openbmc/linux/arch/m68k/ifpsp060/ |
H A D | iskeleton.S | 43 | (1) EXAMPLE CALL-OUTS # 309 | (3) EXAMPLE CALL-OUT SECTION #
|
H A D | fskeleton.S | 40 | (1) EXAMPLE CALL-OUTS # 300 | (3) EXAMPLE CALL-OUT SECTION #
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | shstk.rst | 16 applications. When executing a CALL instruction, the processor pushes the 20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
|
/openbmc/qemu/target/avr/ |
H A D | insn.decode | 97 CALL 1001 010 ..... 111 . imm=%imm_call
|
H A D | disas.c | 168 INSN(CALL, "0x%x", a->imm * 2)
|
/openbmc/linux/arch/x86/events/intel/ |
H A D | p4.c | 350 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL) | 360 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) | 688 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |
|