Home
last modified time | relevance | path

Searched full:eip (Results 1 – 25 of 73) sorted by relevance

123

/linux-6.8/tools/perf/pmu-events/arch/x86/silvermont/
Dpipeline.json7 …ddress not only based on the EIP of the branch but also based on the execution path through which …
15 …ddress not only based on the EIP of the branch but also based on the execution path through which …
24 …ddress not only based on the EIP of the branch but also based on the execution path through which …
33 …ddress not only based on the EIP of the branch but also based on the execution path through which …
42 …ddress not only based on the EIP of the branch but also based on the execution path through which …
51 …ddress not only based on the EIP of the branch but also based on the execution path through which …
60 …ddress not only based on the EIP of the branch but also based on the execution path through which …
69 …ddress not only based on the EIP of the branch but also based on the execution path through which …
78 …ddress not only based on the EIP of the branch but also based on the execution path through which …
87 …ddress not only based on the EIP of the branch but also based on the execution path through which …
/linux-6.8/arch/riscv/kvm/
Daia_imsic.c23 unsigned long eip[BITS_PER_TYPE(u64) / BITS_PER_LONG]; member
260 imsic_mrif_atomic_read(mrif, &eix->eip[0]); in imsic_mrif_topei()
263 imsic_mrif_atomic_read(mrif, &eix->eip[1]); in imsic_mrif_topei()
343 ei = (pend) ? &eix->eip[0] : &eix->eie[0]; in imsic_mrif_rmw()
345 ei = (pend) ? &eix->eip[num & 0x1] : &eix->eie[num & 0x1]; in imsic_mrif_rmw()
396 eix->eip[0] = imsic_eix_swap(IMSIC_EIP0 + i * 2, 0); in imsic_vsfile_local_read()
399 eix->eip[1] = imsic_eix_swap(IMSIC_EIP0 + i * 2 + 1, 0); in imsic_vsfile_local_read()
408 eix->eip[0] = imsic_eix_read(IMSIC_EIP0 + i * 2); in imsic_vsfile_local_read()
411 eix->eip[1] = imsic_eix_read(IMSIC_EIP0 + i * 2 + 1); in imsic_vsfile_local_read()
574 imsic_eix_set(IMSIC_EIP0 + i * 2, eix->eip[0]); in imsic_vsfile_local_update()
[all …]
/linux-6.8/tools/testing/selftests/x86/
Dentry_from_vm86.c134 static bool do_test(struct vm86plus_struct *v86, unsigned long eip, in do_test() argument
141 v86->regs.eip = eip; in do_test()
181 …tf("[FAIL]\tIncorrect return reason (started at eip = 0x%lx, ended at eip = 0x%lx)\n", eip, v86->r… in do_test()
/linux-6.8/arch/x86/include/asm/xen/
Dinterface_32.h59 uint32_t eip; member
82 unsigned long eip; member
87 ((struct xen_callback){ .cs = (__cs), .eip = (unsigned long)(__eip) })
/linux-6.8/arch/m68k/include/asm/
Dprocessor.h154 unsigned long eip = 0; \
157 eip = ((struct pt_regs *) (tsk)->thread.esp0)->pc; \
158 eip; })
/linux-6.8/arch/um/kernel/
Dexec.c42 void start_thread(struct pt_regs *regs, unsigned long eip, unsigned long esp) in start_thread() argument
44 PT_REGS_IP(regs) = eip; in start_thread()
/linux-6.8/Documentation/devicetree/bindings/crypto/
Dinside-secure,safexcel.yaml37 - const: eip
83 interrupt-names = "ring0", "ring1", "ring2", "ring3", "eip", "mem";
/linux-6.8/arch/x86/um/
Dptrace_32.c44 [EIP] = HOST_IP,
63 case EIP: in putreg()
134 case EIP: in getreg()
Dsysrq_32.c18 printk("EIP: %04lx:[<%08lx>] CPU: %d %s", in show_regs()
Duser-offsets.c23 DEFINE(HOST_IP, EIP); in foo()
/linux-6.8/Documentation/translations/zh_TW/admin-guide/
Dbug-hunting.rst122 EIP: 0060:[<c021e50e>] Not tainted VLI
131 EIP is at vt_ioctl+0xda8/0x1482
203 EIP is at +0x14/0x4c0
323 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
/linux-6.8/Documentation/translations/zh_CN/admin-guide/
Dbug-hunting.rst119 EIP: 0060:[<c021e50e>] Not tainted VLI
128 EIP is at vt_ioctl+0xda8/0x1482
200 EIP is at +0x14/0x4c0
320 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
/linux-6.8/Documentation/admin-guide/
Dbug-hunting.rst120 EIP value from the OOPS::
122 EIP: 0060:[<c021e50e>] Not tainted VLI
132 EIP is at vt_ioctl+0xda8/0x1482
210 EIP is at +0x14/0x4c0
358 Aug 29 09:51:01 blizard kernel: EIP: 0010:[oops:_oops+16/3868]
/linux-6.8/scripts/
Dmarkup_oops.pl35 # Parse the oops to find the EIP value
158 if ($line =~ /EIP: 0060:\[\<([a-z0-9]+)\>\]/) {
164 if ($line =~ /EIP is at ([a-zA-Z0-9\_]+)\+0x([0-9a-f]+)\/0x[a-f0-9]/) {
174 if ($line =~ /EIP is at ([a-zA-Z0-9\_]+)\+(0x[0-9a-f]+)\/0x[a-f0-9]+\W\[([a-zA-Z0-9\_\-]+)\]/) {
/linux-6.8/arch/x86/entry/
Dthunk_32.S19 /* Place EIP in the arg1 */
/linux-6.8/arch/x86/kvm/
Dtss.h14 u32 eip; member
/linux-6.8/include/uapi/video/
Duvesafb.h15 __u32 eip; member
/linux-6.8/arch/x86/include/uapi/asm/
Dptrace.h31 long eip; member
Dptrace-abi.h19 #define EIP 12 macro
/linux-6.8/fs/proc/
Darray.c470 unsigned long vsize, eip, esp, wchan = 0; in do_task_stat() local
489 vsize = eip = esp = 0; in do_task_stat()
495 * esp and eip are intentionally zeroed out. There is no in do_task_stat()
505 eip = KSTK_EIP(task); in do_task_stat()
620 seq_put_decimal_ull(m, " ", eip); in do_task_stat()
/linux-6.8/Documentation/arch/x86/
Dexception-tables.rst51 (i.e. regs->eip) to find an address where the execution can continue
53 return address (again regs->eip) and returns. The execution will
287 #. kernelmode_fixup_or_oops() calls fixup_exception() (regs->eip == c017e7a5);
/linux-6.8/tools/testing/selftests/capabilities/
Dtest_execve.c342 ksft_print_msg("[RUN]\tRoot +i => eip\n"); in do_tests()
384 "[RUN]\tRoot, gid != 0, +ia, sgidroot => eip\n"); in do_tests()
392 ksft_print_msg("[RUN]\tRoot +ia, sgidnonroot => eip\n"); in do_tests()
/linux-6.8/arch/x86/um/os-Linux/
Dmcontext.c18 COPY(EIP); COPY_SEG_CPL3(CS); COPY(EFL); COPY_SEG_CPL3(SS); in get_regs_from_mc()
/linux-6.8/tools/firmware/
Dihex2fw.c68 fprintf(stderr, " -j: include records for CS:IP/EIP address\n"); in usage()
238 /* These records contain the CS/IP or EIP where execution in process_ihex()
/linux-6.8/arch/x86/include/asm/
Duser32.h40 __u32 orig_eax, eip; member

123