/openbmc/linux/tools/perf/ |
H A D | builtin-inject.c | 763 if (thread__find_map(thread, sample->cpumode, sample->ip, &al)) { in perf_event__inject_buildid()
|
H A D | builtin-sched.c | 2821 if (chain->ip >= PERF_CONTEXT_MAX) in callchain__fprintf_folded()
|
H A D | builtin-trace.c | 2955 thread__find_symbol(thread, sample->cpumode, sample->ip, &al);
|
/openbmc/linux/include/linux/ |
H A D | bpf.h | 3180 int bpf_arch_text_poke(void *ip, enum bpf_text_poke_type t,
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | devices.txt | 644 32 = /dev/inet/ip Network access 657 /dev/ip -> /dev/inet/ip
|
H A D | kernel-parameters.txt | 2273 ip= [IP_PNP] 3650 nfsaddrs= [NFS] Deprecated. Use ip= instead. 6374 cache size. See Documentation/networking/ip-sysctl.rst
|
H A D | reporting-issues.rst | 638 the output of ``ip link``. Look for the name of the problematic network
|
/openbmc/linux/kernel/events/ |
H A D | core.c | 1858 size += sizeof(data->ip); in __perf_event_header_size() 7365 perf_output_put(handle, data->ip); in perf_output_sample() 7715 data->ip = perf_instruction_pointer(regs); in perf_prepare_sample() 7845 data->code_page_size = perf_get_page_size(data->ip); in perf_prepare_sample()
|
/openbmc/linux/drivers/net/ethernet/mediatek/ |
H A D | mtk_eth_soc.c | 2859 static void mtk_hwlro_val_ipaddr(struct mtk_eth *eth, int idx, __be32 ip) in mtk_hwlro_val_ipaddr() argument 2868 mtk_w32(eth, ip, MTK_LRO_DIP_DW0_CFG(idx)); in mtk_hwlro_val_ipaddr()
|
/openbmc/linux/Documentation/kernel-hacking/ |
H A D | hacking.rst | 253 printk(KERN_INFO "my ip: %pI4\n", &ipaddress);
|
/openbmc/linux/Documentation/translations/it_IT/kernel-hacking/ |
H A D | hacking.rst | 272 printk(KERN_INFO "my ip: %pI4\n", &ipaddress);
|
/openbmc/linux/tools/perf/util/ |
H A D | evsel.c | 2389 data->ip = *array; in evsel__parse_sample()
|
/openbmc/linux/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_type.h | 3095 __be32 ip; member
|
/openbmc/linux/kernel/bpf/ |
H A D | core.c | 2935 int __weak bpf_arch_text_poke(void *ip, enum bpf_text_poke_type t, in bpf_arch_text_poke() argument
|
/openbmc/linux/arch/x86/kvm/ |
H A D | emulate.c | 2667 tss->ip = ctxt->_eip; in save_state_to_tss16() 2691 ctxt->_eip = tss->ip; in load_state_from_tss16()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/anthy/anthy/ |
H A D | 2ch_t.patch | 60 +�����Ԥ� #T35 ip!
|
/openbmc/qemu/ |
H A D | qemu-options.hx | 2802 $ ip -brief l 3561 select udp encapsulation (default is ip). 3596 # Setup tunnel on linux host using raw ip as encapsulation 3598 ip l2tp add tunnel remote 4.3.2.1 local 1.2.3.4 tunnel_id 1 peer_tunnel_id 1 \\ 3600 ip l2tp add session tunnel_id 1 name vmtunnel0 session_id \\ 4454 ``Example to not wait and listen on ip 192.168.0.100 port 4444``
|
H A D | meson.build | 2744 #include <linux/ip.h>''')
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | packages.rst | 183 bitbake-prserv --host ip --port port --start
|
H A D | debugging.rst | 949 - To use ``debuginfod`` on the target, you need to know the ip:port where
|
/openbmc/linux/drivers/gpu/drm/amd/display/dc/dml/dcn314/ |
H A D | display_mode_vba_314.c | 2582 v->ip.VBlankNomDefaultUS, 5111 v->ip.VBlankNomDefaultUS,
|
/openbmc/linux/Documentation/networking/dsa/ |
H A D | dsa.rst | 491 to the standard iproute2 user space programs (ip-link, bridge), like address
|
/openbmc/linux/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_main.c | 8479 !ipv6_addr_any(&filter->ip.v6.src_ip6)) in i40e_add_del_cloud_filter_big_buf() 8508 !ipv6_addr_any(&filter->ip.v6.dst_ip6)) { in i40e_add_del_cloud_filter_big_buf()
|
/openbmc/qemu/target/i386/tcg/ |
H A D | decode-new.c.inc | 2441 s->rip_offset = 0; /* for relative ip address */
|
/openbmc/linux/lib/ |
H A D | Kconfig.debug | 1937 # ip link set eth0 mtu 1024
|