Home
last modified time | relevance | path

Searched full:eip (Results 1 – 25 of 69) sorted by relevance

123

/linux/Documentation/devicetree/bindings/crypto/
H A Dinside-secure,safexcel-eip93.yaml7 title: Inside Secure SafeXcel EIP-93 cryptographic engine
13 The Inside Secure SafeXcel EIP-93 is a cryptographic engine IP block
23 EIP-93 models:
24 - EIP-93i: (basic) DES/Triple DES, AES, PRNG, IPsec ESP, SRTP, SHA1
25 - EIP-93ie: i + SHA224/256, AES-192/256
26 - EIP-93is: i + SSL/DTLS/DTLS, MD5, ARC4
27 - EIP-93ies: i + e + s
28 - EIP-93iw: i + AES-XCB-MAC, AES-CCM
H A Dinside-secure,safexcel.yaml37 - const: eip
85 interrupt-names = "ring0", "ring1", "ring2", "ring3", "eip", "mem";
/linux/tools/perf/pmu-events/arch/x86/silvermont/
H A Dpipeline.json8 "PublicDescription": "ALL_BRANCHES counts the number of any branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP. The BPU can efficiently predict the following branch types: conditional branches, direct calls and jumps, indirect calls and jumps, returns.",
17 "PublicDescription": "ALL_TAKEN_BRANCHES counts the number of all taken branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP. The BPU can efficiently predict the following branch types: conditional branches, direct calls and jumps, indirect calls and jumps, returns.",
27 "PublicDescription": "CALL counts the number of near CALL branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP. The BPU can efficiently predict the following branch types: conditional branches, direct calls and jumps, indirect calls and jumps, returns.",
37 "PublicDescription": "FAR counts the number of far branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP. The BPU can efficiently predict the following branch types: conditional branches, direct calls and jumps, indirect calls and jumps, returns.",
47 "PublicDescription": "IND_CALL counts the number of near indirect CALL branch instructions retired. Branch prediction predicts the branch target and enables the processor to begin executing instructions long before the branch true execution path is known. All branches utilize the branch prediction unit (BPU) for prediction. This unit predicts the target address not only based on the EIP of the branch but also based on the execution path through which execution reached this EIP
[all...]
/linux/arch/riscv/kvm/
H A Daia_imsic.c24 unsigned long eip[BITS_PER_TYPE(u64) / BITS_PER_LONG]; member
261 imsic_mrif_atomic_read(mrif, &eix->eip[0]); in imsic_mrif_topei()
264 imsic_mrif_atomic_read(mrif, &eix->eip[1]); in imsic_mrif_topei()
344 ei = (pend) ? &eix->eip[0] : &eix->eie[0]; in imsic_mrif_rmw()
346 ei = (pend) ? &eix->eip[num & 0x1] : &eix->eie[num & 0x1]; in imsic_mrif_rmw()
397 eix->eip[0] = imsic_eix_swap(IMSIC_EIP0 + i * 2, 0); in imsic_vsfile_local_read()
400 eix->eip[1] = imsic_eix_swap(IMSIC_EIP0 + i * 2 + 1, 0); in imsic_vsfile_local_read()
409 eix->eip[0] = imsic_eix_read(IMSIC_EIP0 + i * 2); in imsic_vsfile_local_read()
412 eix->eip[1] = imsic_eix_read(IMSIC_EIP0 + i * 2 + 1); in imsic_vsfile_local_read()
575 imsic_eix_set(IMSIC_EIP0 + i * 2, eix->eip[ in imsic_vsfile_local_update()
[all...]
/linux/tools/testing/selftests/x86/
H A Dentry_from_vm86.c114 static bool do_test(struct vm86plus_struct *v86, unsigned long eip, in do_test() argument
121 v86->regs.eip = eip; in do_test()
161 printf("[FAIL]\tIncorrect return reason (started at eip = 0x%lx, ended at eip = 0x%lx)\n", eip, v86->regs.eip); in do_test()
/linux/tools/testing/selftests/coredump/
H A DREADME.rst26 * commit 0a1eb2d474ed ("fs/proc: Stop reporting eip and esp in /proc/PID/stat") changed kstkesp to
29 * commit fd7d56270b52 ("fs/proc: Report eip/esp in /prod/PID/stat for coredumping") fixed it for the
32 * commit cb8f381f1613 ("fs/proc/array.c: allow reporting eip/esp for all coredumping threads") fixed
/linux/arch/x86/include/asm/xen/
H A Dinterface_32.h59 uint32_t eip; member
82 unsigned long eip; member
87 ((struct xen_callback){ .cs = (__cs), .eip = (unsigned long)(__eip) })
/linux/arch/um/kernel/
H A Dexec.c31 void start_thread(struct pt_regs *regs, unsigned long eip, unsigned long esp) in start_thread() argument
33 PT_REGS_IP(regs) = eip; in start_thread()
/linux/arch/m68k/include/asm/
H A Dprocessor.h168 unsigned long eip = 0; \
171 eip = ((struct pt_regs *) (tsk)->thread.esp0)->pc; \
172 eip; })
/linux/arch/x86/um/
H A Dptrace_32.c43 [EIP] = HOST_IP,
62 case EIP: in putreg()
133 case EIP: in getreg()
H A Dsysrq_32.c17 printk("EIP: %04lx:[<%08lx>] CPU: %d %s", in show_regs()
/linux/Documentation/translations/zh_CN/admin-guide/
H A Dbug-hunting.rst119 EIP: 0060:[<c021e50e>] Not tainted VLI
128 EIP is at vt_ioctl+0xda8/0x1482
200 EIP is at +0x14/0x4c0
320 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
/linux/Documentation/admin-guide/
H A Dbug-hunting.rst120 EIP value from the OOPS::
122 EIP: 0060:[<c021e50e>] Not tainted VLI
132 EIP is at vt_ioctl+0xda8/0x1482
210 EIP is at +0x14/0x4c0
359 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
/linux/scripts/
H A Dmarkup_oops.pl35 # Parse the oops to find the EIP value
158 if ($line =~ /EIP: 0060:\[\<([a-z0-9]+)\>\]/) {
164 if ($line =~ /EIP is at ([a-zA-Z0-9\_]+)\+0x([0-9a-f]+)\/0x[a-f0-9]/) {
174 if ($line =~ /EIP is at ([a-zA-Z0-9\_]+)\+(0x[0-9a-f]+)\/0x[a-f0-9]+\W\[([a-zA-Z0-9\_\-]+)\]/) {
/linux/arch/x86/kvm/
H A Dtss.h14 u32 eip; member
/linux/include/uapi/video/
H A Duvesafb.h15 __u32 eip; member
/linux/arch/x86/include/uapi/asm/
H A Dptrace.h31 long eip; member
H A Dptrace-abi.h19 #define EIP 12 macro
/linux/fs/proc/
H A Darray.c470 unsigned long vsize, eip, esp, wchan = 0; in do_task_stat() local
489 vsize = eip = esp = 0; in do_task_stat()
495 * esp and eip are intentionally zeroed out. There is no in do_task_stat()
505 eip = KSTK_EIP(task); in do_task_stat()
620 seq_put_decimal_ull(m, " ", eip); in do_task_stat()
/linux/Documentation/arch/x86/
H A Dexception-tables.rst51 (i.e. regs->eip) to find an address where the execution can continue
53 return address (again regs->eip) and returns. The execution will
287 #. kernelmode_fixup_or_oops() calls fixup_exception() (regs->eip == c017e7a5);
/linux/tools/testing/selftests/capabilities/
H A Dtest_execve.c348 ksft_print_msg("[RUN]\tRoot +i => eip\n"); in do_tests()
390 "[RUN]\tRoot, gid != 0, +ia, sgidroot => eip\n"); in do_tests()
398 ksft_print_msg("[RUN]\tRoot +ia, sgidnonroot => eip\n"); in do_tests()
/linux/arch/x86/include/asm/
H A Duser32.h40 __u32 orig_eax, eip; member
H A Dkgdb.h36 GDB_PC, /* 8 also known as eip */
/linux/tools/firmware/
H A Dihex2fw.c68 fprintf(stderr, " -j: include records for CS:IP/EIP address\n"); in usage()
238 /* These records contain the CS/IP or EIP where execution in process_ihex()
/linux/include/xen/interface/hvm/
H A Dhvm_vcpu.h20 uint32_t eip; member

123