Home
last modified time | relevance | path

Searched refs:RIP (Results 1 – 16 of 16) sorted by relevance

/Linux-v5.4/arch/x86/um/
Dptrace_64.c32 [RIP >> 3] = HOST_IP,
72 case RIP: in putreg()
153 case RIP: in getreg()
Duser-offsets.c85 DEFINE_LONGS(HOST_IP, RIP); in foo()
/Linux-v5.4/arch/x86/entry/
Dentry_64.S185 movq RIP(%rsp), %r11
705 testb $4, (SS-RIP)(%rsp)
1327 cmpq %rcx, RIP+8(%rsp)
1330 cmpq %rax, RIP+8(%rsp)
1332 cmpq $.Lgs_change, RIP+8(%rsp)
1347 movq %rcx, RIP+8(%rsp)
1432 testb $3, CS-RIP+8(%rsp)
Dentry_64_compat.S273 movq RIP(%rsp), %rcx /* pt_regs->ip (in rcx) */
Dcalling.h92 #define RIP 16*8 macro
/Linux-v5.4/arch/x86/include/uapi/asm/
Dptrace-abi.h55 #define RIP 128 macro
/Linux-v5.4/arch/x86/kernel/
Dftrace_64.S107 movq %rdi, RIP(%rsp)
220 movq RIP(%rsp), %rax
/Linux-v5.4/Documentation/fault-injection/
Dnvme-fault-injection.rst53 RIP: 0010:native_safe_halt+0x2/0x10
108 RIP: 0010:native_safe_halt+0x2/0x10
159 RIP: 0010:cpuidle_enter_state+0xc5/0x460
/Linux-v5.4/arch/x86/um/os-Linux/
Dmcontext.c26 COPY(RIP); in get_regs_from_mc()
/Linux-v5.4/Documentation/admin-guide/
Dtainted-kernels.rst32 RIP: 0010:my_oops_init+0x13/0x1000 [kpanic]
Dperf-security.rst37 4. Content of architectural execution context registers (e.g., RIP, RSP,
Dkernel-parameters.txt5248 targets for exploits that can control RIP.
/Linux-v5.4/Documentation/dev-tools/
Dkasan.rst83 RIP: 0033:0x7f96443109da
/Linux-v5.4/arch/x86/lib/
Dx86-opcode-map.txt282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation
295 # but is not truncated to 16 bits, unlike RIP.
/Linux-v5.4/tools/arch/x86/lib/
Dx86-opcode-map.txt282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation
295 # but is not truncated to 16 bits, unlike RIP.
/Linux-v5.4/arch/x86/crypto/
Daesni-intel_asm.S804 MOVADQ ONE(%RIP),\TMP1
876 MOVADQ ONE(%RIP),\TMP1