Searched refs:call (Results 176 - 200 of 385) sorted by relevance

1234567891011>>

/freebsd-11-stable/sys/i386/i386/
H A Dlocore.s232 call recover_bootinfo
269 call identify_cpu
270 call create_pagetables
314 call init386 /* wire 386 chip for unix operation */
326 call mi_startup /* autoconfiguration, mountroot etc */
609 /* Greater than Pentium...call it a Pentium Pro */
H A Dmpboot.s125 call init_secondary /* load i386 tables */
263 * GDT pointer for the lgdt call
/freebsd-11-stable/crypto/openssl/crypto/bn/asm/
H A Drsaz-x86_64.pl504 call __rsaz_512_reduce
516 call __rsaz_512_subtract
781 call __rsaz_512_reducex
793 call __rsaz_512_subtract
850 call __rsaz_512_mul
864 call __rsaz_512_reduce
873 call __rsaz_512_mulx
888 call __rsaz_512_reducex
902 call __rsaz_512_subtract
1188 call __rsaz_512_reduc
[all...]
H A Dx86_64-mont5.pl519 call mul4x_internal
1142 call __bn_sqr8x_internal
1143 call __bn_post4x_internal
1144 call __bn_sqr8x_internal
1145 call __bn_post4x_internal
1146 call __bn_sqr8x_internal
1147 call __bn_post4x_internal
1148 call __bn_sqr8x_internal
1149 call __bn_post4x_internal
1150 call __bn_sqr8x_interna
[all...]
/freebsd-11-stable/contrib/gcc/
H A Dcgraphunit.c47 In the unit-at-a-time the call-graph construction and local function
53 compilation units to be parsed at once and it should call function each
74 via assembly code and marked by attribute "used"), the call-graph data structure
101 analyzed. During analysis the call-graph edges from reachable
105 mark_referenced call in assemble_variable functions referenced by
111 assemble_variable no longer call mark_referenced.
113 Finally the call-graph is topologically sorted and all reachable functions
134 Functions are output early using call of
137 uninlininable static functions are needed too. During the call-graph
182 once because it gets a new htab upon each recursive call fro
598 tree call = get_call_expr_in (stmt); local
673 tree call = get_call_expr_in (stmt); local
795 tree call = get_call_expr_in (stmt); local
[all...]
H A Drtl.c276 RTX_FLAG (copy, call) = RTX_FLAG (orig, call);
/freebsd-11-stable/secure/lib/libcrypto/amd64/
H A Drsaz-x86_64.S377 call __rsaz_512_reduce
389 call __rsaz_512_subtract
651 call __rsaz_512_reducex
663 call __rsaz_512_subtract
708 call __rsaz_512_mul
722 call __rsaz_512_reduce
729 call __rsaz_512_mulx
744 call __rsaz_512_reducex
756 call __rsaz_512_subtract
1019 call __rsaz_512_reduc
[all...]
H A Dx86_64-gf2m.S250 call _mul_1x1
256 call _mul_1x1
264 call _mul_1x1
/freebsd-11-stable/contrib/libxo/xohtml/external/
H A Djquery.js152 jQuery.fn.attr.call( selector, context, true );
227 return slice.call( this, 0 );
303 "slice", slice.call(arguments).join(",") );
308 return callback.call( elem, i, elem );
514 class2type[ toString.call(obj) ] || "object";
528 !hasOwn.call(obj, "constructor") &&
529 !hasOwn.call(obj.constructor.prototype, "isPrototypeOf") ) {
543 return key === undefined || hasOwn.call( obj, key );
614 window[ "eval" ].call( window, data );
654 if ( callback.call( objec
[all...]
/freebsd-11-stable/secure/lib/libcrypto/i386/
H A Dx86cpuid.S157 call .L009PIC_me_up
172 call .L011PIC_me_up
233 call .L015PIC_me_up
298 call *8(%ebp)
374 call OPENSSL_cpuid_setup
661 call *8(%ebp)
737 call OPENSSL_cpuid_setup
/freebsd-11-stable/stand/i386/pmbr/
H A Dpmbr.s99 main.2: call getdrvparams # Read drive parameters
103 call read # Read header and check GPT sig
128 call read
143 call read
/freebsd-11-stable/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker/
H A DRetainCountDiagnostics.cpp166 /// Finds argument index of the out paramter in the call {@code S}
231 os << "function call";
302 os << " (assuming the call returns zero)";
304 os << " (assuming the call returns non-zero)";
669 // to it and that reference is overwritten/dropped by another call to
852 // call to GetAllocationSite. This will walk the ExplodedGraph backwards.
869 // implicit call (ex: a destructor call).
/freebsd-11-stable/crypto/openssl/crypto/perlasm/
H A Dsparcv9_modes.pl64 call _${alg}${bits}_load_enckey
104 call _${alg}${bits}_encrypt_1x
213 call _${alg}${bits}_encrypt_1x
282 call _${alg}${bits}_load_deckey
321 call _${alg}${bits}_decrypt_1x
423 call _${alg}${bits}_decrypt_2x
558 call _${alg}${bits}_decrypt_2x
622 call _${alg}${bits}_load_enckey
684 call _${alg}${bits}_encrypt_1x+8
769 call
[all...]
H A Dx86masm.pl33 sub ::call { &::emit("call",(&::islabel($_[0]) or "$nmdecor$_[0]")); }
34 sub ::call_ptr { &::emit("call",@_); }
H A Dx86nasm.pl31 sub ::call { &::emit("call",(&::islabel($_[0]) or "$nmdecor$_[0]")); }
32 sub ::call_ptr { &::emit("call",@_); }
/freebsd-11-stable/stand/pc98/boot0.5/
H A Dstart.s46 # The instruction 'call 0x9ab' can be here. See also selector.s.
60 call main
/freebsd-11-stable/stand/i386/kgzldr/
H A Dstart.s43 call boot # Call C code
/freebsd-11-stable/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/
H A DBlockInCriticalSectionChecker.cpp45 const CallEvent &call,
/freebsd-11-stable/lib/libc/sparc64/sys/
H A D__sparc_utrap_gen.S72 call __sparc_utrap
/freebsd-11-stable/sys/sparc64/sparc64/
H A Dinterrupt.S51 * being zero. The 2nd data word carries a function to call and the 3rd
214 call %o0
/freebsd-11-stable/tools/tools/editing/
H A Dfreebsd.vim39 nmap <silent> <Leader>f :call FreeBSD_Style()<CR>
/freebsd-11-stable/contrib/wpa/hs20/client/
H A DAndroid.mk1 LOCAL_PATH := $(call my-dir)
/freebsd-11-stable/stand/pc98/btx/btx/
H A Dbtx.S80 .set V86F_CALLF,0x20000 # Emulate far call
227 call sio_init # setup the serial console
399 call dump # buffer
401 call putstr # display
459 * Invoke real mode interrupt/function call from user mode with arguments.
463 * Invoke real mode interrupt/function call from protected mode.
561 intusr.4: testl $V86F_CALLF,%edx # Far call?
565 call putstr # VM86 call
580 * If this is a v86 call, cop
[all...]
/freebsd-11-stable/stand/i386/btx/btx/
H A Dbtx.S82 .set V86F_CALLF,0x20000 # Emulate far call
229 call sio_init # setup the serial console
373 call dump # buffer
375 call putstr # display
433 * Invoke real mode interrupt/function call from user mode with arguments.
437 * Invoke real mode interrupt/function call from protected mode.
535 intusr.4: testl $V86F_CALLF,%edx # Far call?
539 call putstr # VM86 call
554 * If this is a v86 call, cop
[all...]
/freebsd-11-stable/crypto/openssl/crypto/
H A Dsparccpuid.S32 call .walk.reg.wins
35 call .PIC.zero.up
148 call .walk.reg.wins
182 ! Note that you do not have to link with libthread to call thr_yield,
190 .spin: call YIELD_CPU
530 call OPENSSL_cpuid_setup

Completed in 299 milliseconds

1234567891011>>