Searched refs:RIP (Results 1 – 16 of 16) sorted by relevance
/Linux-v5.10/arch/x86/entry/ |
D | entry_64.S | 128 movq RIP(%rsp), %r11 635 testb $4, (SS-RIP)(%rsp) 1051 cmpq %rcx, RIP+8(%rsp) 1054 cmpq %rax, RIP+8(%rsp) 1056 cmpq $.Lgs_change, RIP+8(%rsp) 1070 movq %rcx, RIP+8(%rsp) 1154 testb $3, CS-RIP+8(%rsp)
|
D | entry_64_compat.S | 270 movq RIP(%rsp), %rcx /* pt_regs->ip (in rcx) */
|
D | calling.h | 92 #define RIP 16*8 macro
|
/Linux-v5.10/arch/x86/um/ |
D | ptrace_64.c | 32 [RIP >> 3] = HOST_IP, 64 case RIP: in putreg() 142 case RIP: in getreg()
|
D | user-offsets.c | 73 DEFINE_LONGS(HOST_IP, RIP); in foo()
|
/Linux-v5.10/arch/x86/include/uapi/asm/ |
D | ptrace-abi.h | 55 #define RIP 128 macro
|
/Linux-v5.10/Documentation/fault-injection/ |
D | nvme-fault-injection.rst | 53 RIP: 0010:native_safe_halt+0x2/0x10 108 RIP: 0010:native_safe_halt+0x2/0x10 159 RIP: 0010:cpuidle_enter_state+0xc5/0x460
|
/Linux-v5.10/arch/x86/kernel/ |
D | ftrace_64.S | 105 movq %rdi, RIP(%rsp) 224 movq RIP(%rsp), %rax
|
/Linux-v5.10/arch/x86/um/os-Linux/ |
D | mcontext.c | 26 COPY(RIP); in get_regs_from_mc()
|
/Linux-v5.10/Documentation/admin-guide/ |
D | tainted-kernels.rst | 32 RIP: 0010:my_oops_init+0x13/0x1000 [kpanic]
|
D | perf-security.rst | 37 4. Content of architectural execution context registers (e.g., RIP, RSP,
|
D | kernel-parameters.txt | 5803 targets for exploits that can control RIP.
|
/Linux-v5.10/Documentation/dev-tools/ |
D | kasan.rst | 80 RIP: 0033:0x7f96443109da
|
/Linux-v5.10/arch/x86/lib/ |
D | x86-opcode-map.txt | 282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation 295 # but is not truncated to 16 bits, unlike RIP.
|
/Linux-v5.10/tools/arch/x86/lib/ |
D | x86-opcode-map.txt | 282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation 295 # but is not truncated to 16 bits, unlike RIP.
|
/Linux-v5.10/arch/x86/crypto/ |
D | aesni-intel_asm.S | 803 MOVADQ ONE(%RIP),\TMP1 875 MOVADQ ONE(%RIP),\TMP1
|