/linux/Documentation/devicetree/bindings/crypto/ |
H A D | inside-secure,safexcel-eip93.yaml | 7 title: Inside Secure SafeXcel EIP-93 cryptographic engine 13 The Inside Secure SafeXcel EIP-93 is a cryptographic engine IP block 23 EIP-93 models: 24 - EIP-93i: (basic) DES/Triple DES, AES, PRNG, IPsec ESP, SRTP, SHA1 25 - EIP-93ie: i + SHA224/256, AES-192/256 26 - EIP-93is: i + SSL/DTLS/DTLS, MD5, ARC4 27 - EIP-93ies: i + e + s 28 - EIP-93iw: i + AES-XCB-MAC, AES-CCM
|
H A D | inside-secure,safexcel.yaml | 37 - const: eip 85 interrupt-names = "ring0", "ring1", "ring2", "ring3", "eip", "mem";
|
/linux/tools/perf/pmu-events/arch/x86/silvermont/ |
H A D | pipeline.json | 8 "PublicDescription": "ALL_BRANCHES counts the number of any branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP. The BPU can efficiently predict the following branch types: conditional branches, direct calls and jumps, indirect calls and jumps, returns.", 17 "PublicDescription": "ALL_TAKEN_BRANCHES counts the number of all taken branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP. The BPU can efficiently predict the following branch types: conditional branches, direct calls and jumps, indirect calls and jumps, returns.", 27 "PublicDescription": "CALL counts the number of near CALL branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP. The BPU can efficiently predict the following branch types: conditional branches, direct calls and jumps, indirect calls and jumps, returns.", 37 "PublicDescription": "FAR counts the number of far branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP. The BPU can efficiently predict the following branch types: conditional branches, direct calls and jumps, indirect calls and jumps, returns.", 47 "PublicDescription": "IND_CALL counts the number of near indirect CALL branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP [all...] |
/linux/arch/riscv/kvm/ |
H A D | aia_imsic.c | 24 unsigned long eip[BITS_PER_TYPE(u64) / BITS_PER_LONG]; member 261 imsic_mrif_atomic_read(mrif, &eix->eip[0]); in imsic_mrif_topei() 264 imsic_mrif_atomic_read(mrif, &eix->eip[1]); in imsic_mrif_topei() 344 ei = (pend) ? &eix->eip[0] : &eix->eie[0]; in imsic_mrif_rmw() 346 ei = (pend) ? &eix->eip[num & 0x1] : &eix->eie[num & 0x1]; in imsic_mrif_rmw() 397 eix->eip[0] = imsic_eix_swap(IMSIC_EIP0 + i * 2, 0); in imsic_vsfile_local_read() 400 eix->eip[1] = imsic_eix_swap(IMSIC_EIP0 + i * 2 + 1, 0); in imsic_vsfile_local_read() 409 eix->eip[0] = imsic_eix_read(IMSIC_EIP0 + i * 2); in imsic_vsfile_local_read() 412 eix->eip[1] = imsic_eix_read(IMSIC_EIP0 + i * 2 + 1); in imsic_vsfile_local_read() 575 imsic_eix_set(IMSIC_EIP0 + i * 2, eix->eip[ in imsic_vsfile_local_update() [all...] |
/linux/tools/testing/selftests/x86/ |
H A D | entry_from_vm86.c | 114 static bool do_test(struct vm86plus_struct *v86, unsigned long eip, in do_test() argument 121 v86->regs.eip = eip; in do_test() 161 printf("[FAIL]\tIncorrect return reason (started at eip = 0x%lx, ended at eip = 0x%lx)\n", eip, v86->regs.eip); in do_test()
|
/linux/tools/testing/selftests/coredump/ |
H A D | README.rst | 26 * commit 0a1eb2d474ed ("fs/proc: Stop reporting eip and esp in /proc/PID/stat") changed kstkesp to 29 * commit fd7d56270b52 ("fs/proc: Report eip/esp in /prod/PID/stat for coredumping") fixed it for the 32 * commit cb8f381f1613 ("fs/proc/array.c: allow reporting eip/esp for all coredumping threads") fixed
|
/linux/arch/x86/include/asm/xen/ |
H A D | interface_32.h | 59 uint32_t eip; member 82 unsigned long eip; member 87 ((struct xen_callback){ .cs = (__cs), .eip = (unsigned long)(__eip) })
|
/linux/arch/um/kernel/ |
H A D | exec.c | 31 void start_thread(struct pt_regs *regs, unsigned long eip, unsigned long esp) in start_thread() argument 33 PT_REGS_IP(regs) = eip; in start_thread()
|
/linux/arch/m68k/include/asm/ |
H A D | processor.h | 168 unsigned long eip = 0; \ 171 eip = ((struct pt_regs *) (tsk)->thread.esp0)->pc; \ 172 eip; })
|
/linux/arch/x86/um/ |
H A D | ptrace_32.c | 43 [EIP] = HOST_IP, 62 case EIP: in putreg() 133 case EIP: in getreg()
|
H A D | sysrq_32.c | 17 printk("EIP: %04lx:[<%08lx>] CPU: %d %s", in show_regs()
|
/linux/Documentation/translations/zh_CN/admin-guide/ |
H A D | bug-hunting.rst | 119 EIP: 0060:[<c021e50e>] Not tainted VLI 128 EIP is at vt_ioctl+0xda8/0x1482 200 EIP is at +0x14/0x4c0 320 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
|
/linux/Documentation/admin-guide/ |
H A D | bug-hunting.rst | 120 EIP value from the OOPS:: 122 EIP: 0060:[<c021e50e>] Not tainted VLI 132 EIP is at vt_ioctl+0xda8/0x1482 210 EIP is at +0x14/0x4c0 359 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
|
/linux/scripts/ |
H A D | markup_oops.pl | 35 # Parse the oops to find the EIP value 158 if ($line =~ /EIP: 0060:\[\<([a-z0-9]+)\>\]/) { 164 if ($line =~ /EIP is at ([a-zA-Z0-9\_]+)\+0x([0-9a-f]+)\/0x[a-f0-9]/) { 174 if ($line =~ /EIP is at ([a-zA-Z0-9\_]+)\+(0x[0-9a-f]+)\/0x[a-f0-9]+\W\[([a-zA-Z0-9\_\-]+)\]/) {
|
/linux/arch/x86/kvm/ |
H A D | tss.h | 14 u32 eip; member
|
/linux/include/uapi/video/ |
H A D | uvesafb.h | 15 __u32 eip; member
|
/linux/arch/x86/include/uapi/asm/ |
H A D | ptrace.h | 31 long eip; member
|
H A D | ptrace-abi.h | 19 #define EIP 12 macro
|
/linux/fs/proc/ |
H A D | array.c | 470 unsigned long vsize, eip, esp, wchan = 0; in do_task_stat() local 489 vsize = eip = esp = 0; in do_task_stat() 495 * esp and eip are intentionally zeroed out. There is no in do_task_stat() 505 eip = KSTK_EIP(task); in do_task_stat() 620 seq_put_decimal_ull(m, " ", eip); in do_task_stat()
|
/linux/Documentation/arch/x86/ |
H A D | exception-tables.rst | 51 (i.e. regs->eip) to find an address where the execution can continue 53 return address (again regs->eip) and returns. The execution will 287 #. kernelmode_fixup_or_oops() calls fixup_exception() (regs->eip == c017e7a5);
|
/linux/tools/testing/selftests/capabilities/ |
H A D | test_execve.c | 348 ksft_print_msg("[RUN]\tRoot +i => eip\n"); in do_tests() 390 "[RUN]\tRoot, gid != 0, +ia, sgidroot => eip\n"); in do_tests() 398 ksft_print_msg("[RUN]\tRoot +ia, sgidnonroot => eip\n"); in do_tests()
|
/linux/arch/x86/include/asm/ |
H A D | user32.h | 40 __u32 orig_eax, eip; member
|
H A D | kgdb.h | 36 GDB_PC, /* 8 also known as eip */
|
/linux/tools/firmware/ |
H A D | ihex2fw.c | 68 fprintf(stderr, " -j: include records for CS:IP/EIP address\n"); in usage() 238 /* These records contain the CS/IP or EIP where execution in process_ihex()
|
/linux/include/xen/interface/hvm/ |
H A D | hvm_vcpu.h | 20 uint32_t eip; member
|