Home
last modified time | relevance | path

Searched refs:RIP (Results 1 – 14 of 14) sorted by relevance

/Linux-v4.19/arch/x86/um/
Dptrace_64.c32 [RIP >> 3] = HOST_IP,
72 case RIP: in putreg()
153 case RIP: in getreg()
Duser-offsets.c85 DEFINE_LONGS(HOST_IP, RIP); in foo()
/Linux-v4.19/arch/x86/entry/
Dentry_64.S248 movq RIP(%rsp), %r11
741 testb $4, (SS-RIP)(%rsp)
1285 cmpq %rcx, RIP+8(%rsp)
1288 cmpq %rax, RIP+8(%rsp)
1290 cmpq $.Lgs_change, RIP+8(%rsp)
1304 movq %rcx, RIP+8(%rsp)
1388 testb $3, CS-RIP+8(%rsp)
Dentry_64_compat.S268 movq RIP(%rsp), %rcx /* pt_regs->ip (in rcx) */
Dcalling.h92 #define RIP 16*8 macro
/Linux-v4.19/arch/x86/include/uapi/asm/
Dptrace-abi.h55 #define RIP 128 macro
/Linux-v4.19/arch/x86/kernel/
Dftrace_64.S125 movq %rdi, RIP(%rsp)
236 movq RIP(%rsp), %rax
/Linux-v4.19/Documentation/fault-injection/
Dnvme-fault-injection.txt51 RIP: 0010:native_safe_halt+0x2/0x10
104 RIP: 0010:native_safe_halt+0x2/0x10
/Linux-v4.19/arch/x86/um/os-Linux/
Dmcontext.c26 COPY(RIP); in get_regs_from_mc()
/Linux-v4.19/tools/objtool/arch/x86/lib/
Dx86-opcode-map.txt282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation
295 # but is not truncated to 16 bits, unlike RIP.
/Linux-v4.19/tools/perf/util/intel-pt-decoder/
Dx86-opcode-map.txt282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation
295 # but is not truncated to 16 bits, unlike RIP.
/Linux-v4.19/arch/x86/lib/
Dx86-opcode-map.txt282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation
295 # but is not truncated to 16 bits, unlike RIP.
/Linux-v4.19/arch/x86/crypto/
Daesni-intel_asm.S808 MOVADQ ONE(%RIP),\TMP1
880 MOVADQ ONE(%RIP),\TMP1
/Linux-v4.19/Documentation/admin-guide/
Dkernel-parameters.txt4853 targets for exploits that can control RIP.