| /Linux-v6.6/tools/testing/selftests/bpf/ |
| D | uprobe_multi.c | 13 #define CALL(name, idx) NAME(name, idx)(); macro 49 F10000(CALL, uprobe_multi_func_, 0) in bench() 50 F10000(CALL, uprobe_multi_func_, 1) in bench() 51 F10000(CALL, uprobe_multi_func_, 2) in bench() 52 F10000(CALL, uprobe_multi_func_, 3) in bench() 53 F10000(CALL, uprobe_multi_func_, 4) in bench()
|
| /Linux-v6.6/drivers/scsi/ |
| D | 53c700.scr | 244 CALL SendMessage 283 CALL ProcessReceiveMessage 308 CALL ProcessReceiveMessage 314 CALL SGScriptStartAddress 327 CALL SGScriptStartAddress 338 CALL ProcessReceiveMessage 373 CALL ProcessReceiveMessage 400 CALL ProcessReceiveMessage
|
| D | 53c700_d.h_shipped | 409 CALL SendMessage 517 CALL ProcessReceiveMessage 584 CALL ProcessReceiveMessage 602 CALL SGScriptStartAddress 639 CALL SGScriptStartAddress 674 CALL ProcessReceiveMessage 763 CALL ProcessReceiveMessage 835 CALL ProcessReceiveMessage
|
| /Linux-v6.6/arch/x86/kernel/ |
| D | static_call.c | 8 CALL = 0, /* site call */ enumerator 65 case CALL: in __static_call_transform()
|
| D | ftrace_64.S | 301 CALL .Ldo_rebalance
|
| /Linux-v6.6/Documentation/admin-guide/hw-vuln/ |
| D | srso.rst | 15 CALL instruction (i.e., an instruction predicted to be a CALL but is 16 not actually a CALL) can create an entry in the RAP which may be used 21 non-architectural CALL instructions in kernel space and use this to
|
| D | cross-thread-rsb.rst | 61 An attack can be mounted on affected processors by performing a series of CALL 70 targets by performing a sequence of CALL instructions.
|
| /Linux-v6.6/drivers/gpu/drm/nouveau/include/nvif/ |
| D | push206e.h | 9 PUSH_DATA__((p), NVDEF(NV206E, DMA, OPCODE2, CALL) | \
|
| /Linux-v6.6/drivers/media/v4l2-core/ |
| D | videobuf-core.c | 50 #define CALL(q, f, arg...) \ macro 127 return CALL(q, iolock, q, vb, fbuf); in videobuf_iolock() 724 CALL(q, sync, q, buf); in videobuf_dqbuf() 816 CALL(q, sync, q, q->read_buf); in videobuf_read_zerocopy() 930 CALL(q, sync, q, q->read_buf); in videobuf_read_one() 1190 rc = CALL(q, mmap_mapper, q, buf, vma); in videobuf_mmap_mapper()
|
| /Linux-v6.6/arch/x86/include/asm/ |
| D | text-patching.h | 83 __CASE(CALL); in text_opcode_size()
|
| D | perf_event_p4.h | 723 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL, 2), 728 P4_GEN_ESCR_EMASK(P4_EVENT_RETIRED_BRANCH_TYPE, CALL, 2),
|
| /Linux-v6.6/ |
| D | Kbuild | 39 quiet_cmd_syscalls = CALL $<
|
| /Linux-v6.6/arch/m68k/ifpsp060/ |
| D | iskeleton.S | 43 | (1) EXAMPLE CALL-OUTS # 309 | (3) EXAMPLE CALL-OUT SECTION #
|
| D | fskeleton.S | 40 | (1) EXAMPLE CALL-OUTS # 300 | (3) EXAMPLE CALL-OUT SECTION #
|
| D | os.S | 38 | EXAMPLE CALL-OUTS #
|
| /Linux-v6.6/Documentation/arch/x86/ |
| D | shstk.rst | 16 applications. When executing a CALL instruction, the processor pushes the 20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
|
| /Linux-v6.6/arch/x86/events/intel/ |
| D | p4.c | 350 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_MISPRED_BRANCH_TYPE, CALL) | 360 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) | 688 P4_ESCR_EMASK_BIT(P4_EVENT_RETIRED_BRANCH_TYPE, CALL) |
|
| /Linux-v6.6/scripts/gcc-plugins/ |
| D | stackleak_plugin.c | 302 if (GET_CODE(body) != CALL) in remove_stack_tracking_gcall()
|
| /Linux-v6.6/arch/sparc/net/ |
| D | bpf_jit_comp_32.c | 85 #define CALL F1(1) macro 243 *prog++ = CALL | (((_off) >> 2) & 0x3fffffff); \
|
| D | bpf_jit_comp_64.c | 161 #define CALL F1(1) macro 251 ctx->image[ctx->idx] = CALL | ((off >> 2) & 0x3fffffff); in emit_call()
|
| /Linux-v6.6/tools/perf/util/ |
| D | perf_event_attr_fprintf.c | 56 bit_name(CALL), bit_name(NO_FLAGS), bit_name(NO_CYCLES), in __p_branch_sample_type()
|
| D | dlfilter.c | 369 CHECK_FLAG(CALL); in dlfilter__init()
|
| /Linux-v6.6/include/linux/ceph/ |
| D | rados.h | 314 f(CALL, __CEPH_OSD_OP(RD, EXEC, 1), "call") \
|
| /Linux-v6.6/Documentation/translations/ko_KR/ |
| D | memory-barriers.txt | 2366 CALL wakeup 2407 CALL wakeup
|
| /Linux-v6.6/arch/x86/lib/ |
| D | x86-opcode-map.txt | 293 # in "near" jumps and calls is 16-bit. For CALL, 296 e8: CALL Jz (f64) 475 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn). 1034 # Note: "forced64" is Intel CPU behavior (see comment about CALL insn).
|