/freebsd-11-stable/sys/i386/i386/ |
H A D | locore.s | 232 call recover_bootinfo 269 call identify_cpu 270 call create_pagetables 314 call init386 /* wire 386 chip for unix operation */ 326 call mi_startup /* autoconfiguration, mountroot etc */ 609 /* Greater than Pentium...call it a Pentium Pro */
|
H A D | mpboot.s | 125 call init_secondary /* load i386 tables */ 263 * GDT pointer for the lgdt call
|
/freebsd-11-stable/crypto/openssl/crypto/bn/asm/ |
H A D | rsaz-x86_64.pl | 504 call __rsaz_512_reduce 516 call __rsaz_512_subtract 781 call __rsaz_512_reducex 793 call __rsaz_512_subtract 850 call __rsaz_512_mul 864 call __rsaz_512_reduce 873 call __rsaz_512_mulx 888 call __rsaz_512_reducex 902 call __rsaz_512_subtract 1188 call __rsaz_512_reduc [all...] |
H A D | x86_64-mont5.pl | 519 call mul4x_internal 1142 call __bn_sqr8x_internal 1143 call __bn_post4x_internal 1144 call __bn_sqr8x_internal 1145 call __bn_post4x_internal 1146 call __bn_sqr8x_internal 1147 call __bn_post4x_internal 1148 call __bn_sqr8x_internal 1149 call __bn_post4x_internal 1150 call __bn_sqr8x_interna [all...] |
/freebsd-11-stable/contrib/gcc/ |
H A D | cgraphunit.c | 47 In the unit-at-a-time the call-graph construction and local function 53 compilation units to be parsed at once and it should call function each 74 via assembly code and marked by attribute "used"), the call-graph data structure 101 analyzed. During analysis the call-graph edges from reachable 105 mark_referenced call in assemble_variable functions referenced by 111 assemble_variable no longer call mark_referenced. 113 Finally the call-graph is topologically sorted and all reachable functions 134 Functions are output early using call of 137 uninlininable static functions are needed too. During the call-graph 182 once because it gets a new htab upon each recursive call fro 598 tree call = get_call_expr_in (stmt); local 673 tree call = get_call_expr_in (stmt); local 795 tree call = get_call_expr_in (stmt); local [all...] |
H A D | rtl.c | 276 RTX_FLAG (copy, call) = RTX_FLAG (orig, call);
|
/freebsd-11-stable/secure/lib/libcrypto/amd64/ |
H A D | rsaz-x86_64.S | 377 call __rsaz_512_reduce 389 call __rsaz_512_subtract 651 call __rsaz_512_reducex 663 call __rsaz_512_subtract 708 call __rsaz_512_mul 722 call __rsaz_512_reduce 729 call __rsaz_512_mulx 744 call __rsaz_512_reducex 756 call __rsaz_512_subtract 1019 call __rsaz_512_reduc [all...] |
H A D | x86_64-gf2m.S | 250 call _mul_1x1 256 call _mul_1x1 264 call _mul_1x1
|
/freebsd-11-stable/contrib/libxo/xohtml/external/ |
H A D | jquery.js | 152 jQuery.fn.attr.call( selector, context, true ); 227 return slice.call( this, 0 ); 303 "slice", slice.call(arguments).join(",") ); 308 return callback.call( elem, i, elem ); 514 class2type[ toString.call(obj) ] || "object"; 528 !hasOwn.call(obj, "constructor") && 529 !hasOwn.call(obj.constructor.prototype, "isPrototypeOf") ) { 543 return key === undefined || hasOwn.call( obj, key ); 614 window[ "eval" ].call( window, data ); 654 if ( callback.call( objec [all...] |
/freebsd-11-stable/secure/lib/libcrypto/i386/ |
H A D | x86cpuid.S | 157 call .L009PIC_me_up 172 call .L011PIC_me_up 233 call .L015PIC_me_up 298 call *8(%ebp) 374 call OPENSSL_cpuid_setup 661 call *8(%ebp) 737 call OPENSSL_cpuid_setup
|
/freebsd-11-stable/stand/i386/pmbr/ |
H A D | pmbr.s | 99 main.2: call getdrvparams # Read drive parameters 103 call read # Read header and check GPT sig 128 call read 143 call read
|
/freebsd-11-stable/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker/ |
H A D | RetainCountDiagnostics.cpp | 166 /// Finds argument index of the out paramter in the call {@code S} 231 os << "function call"; 302 os << " (assuming the call returns zero)"; 304 os << " (assuming the call returns non-zero)"; 669 // to it and that reference is overwritten/dropped by another call to 852 // call to GetAllocationSite. This will walk the ExplodedGraph backwards. 869 // implicit call (ex: a destructor call).
|
/freebsd-11-stable/crypto/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 64 call _${alg}${bits}_load_enckey 104 call _${alg}${bits}_encrypt_1x 213 call _${alg}${bits}_encrypt_1x 282 call _${alg}${bits}_load_deckey 321 call _${alg}${bits}_decrypt_1x 423 call _${alg}${bits}_decrypt_2x 558 call _${alg}${bits}_decrypt_2x 622 call _${alg}${bits}_load_enckey 684 call _${alg}${bits}_encrypt_1x+8 769 call [all...] |
H A D | x86masm.pl | 33 sub ::call { &::emit("call",(&::islabel($_[0]) or "$nmdecor$_[0]")); } 34 sub ::call_ptr { &::emit("call",@_); }
|
H A D | x86nasm.pl | 31 sub ::call { &::emit("call",(&::islabel($_[0]) or "$nmdecor$_[0]")); } 32 sub ::call_ptr { &::emit("call",@_); }
|
/freebsd-11-stable/stand/pc98/boot0.5/ |
H A D | start.s | 46 # The instruction 'call 0x9ab' can be here. See also selector.s. 60 call main
|
/freebsd-11-stable/stand/i386/kgzldr/ |
H A D | start.s | 43 call boot # Call C code
|
/freebsd-11-stable/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
H A D | BlockInCriticalSectionChecker.cpp | 45 const CallEvent &call,
|
/freebsd-11-stable/lib/libc/sparc64/sys/ |
H A D | __sparc_utrap_gen.S | 72 call __sparc_utrap
|
/freebsd-11-stable/sys/sparc64/sparc64/ |
H A D | interrupt.S | 51 * being zero. The 2nd data word carries a function to call and the 3rd 214 call %o0
|
/freebsd-11-stable/tools/tools/editing/ |
H A D | freebsd.vim | 39 nmap <silent> <Leader>f :call FreeBSD_Style()<CR>
|
/freebsd-11-stable/contrib/wpa/hs20/client/ |
H A D | Android.mk | 1 LOCAL_PATH := $(call my-dir)
|
/freebsd-11-stable/stand/pc98/btx/btx/ |
H A D | btx.S | 80 .set V86F_CALLF,0x20000 # Emulate far call 227 call sio_init # setup the serial console 399 call dump # buffer 401 call putstr # display 459 * Invoke real mode interrupt/function call from user mode with arguments. 463 * Invoke real mode interrupt/function call from protected mode. 561 intusr.4: testl $V86F_CALLF,%edx # Far call? 565 call putstr # VM86 call 580 * If this is a v86 call, cop [all...] |
/freebsd-11-stable/stand/i386/btx/btx/ |
H A D | btx.S | 82 .set V86F_CALLF,0x20000 # Emulate far call 229 call sio_init # setup the serial console 373 call dump # buffer 375 call putstr # display 433 * Invoke real mode interrupt/function call from user mode with arguments. 437 * Invoke real mode interrupt/function call from protected mode. 535 intusr.4: testl $V86F_CALLF,%edx # Far call? 539 call putstr # VM86 call 554 * If this is a v86 call, cop [all...] |
/freebsd-11-stable/crypto/openssl/crypto/ |
H A D | sparccpuid.S | 32 call .walk.reg.wins 35 call .PIC.zero.up 148 call .walk.reg.wins 182 ! Note that you do not have to link with libthread to call thr_yield, 190 .spin: call YIELD_CPU 530 call OPENSSL_cpuid_setup
|