Searched refs:RIP (Results 1 – 21 of 21) sorted by relevance
/linux-6.3-rc2/arch/x86/um/ |
A D | ptrace_64.c | 33 [RIP >> 3] = HOST_IP, 65 case RIP: in putreg() 143 case RIP: in getreg()
|
A D | user-offsets.c | 72 DEFINE_LONGS(HOST_IP, RIP); in foo()
|
/linux-6.3-rc2/arch/x86/entry/ |
A D | entry_64.S | 133 movq RIP(%rsp), %r11 700 testb $4, (SS-RIP)(%rsp) 1087 cmpq %rcx, RIP+8(%rsp) 1090 cmpq %rax, RIP+8(%rsp) 1092 cmpq $.Lgs_change, RIP+8(%rsp) 1115 movq %rcx, RIP+8(%rsp) 1203 testb $3, CS-RIP+8(%rsp)
|
A D | entry_64_compat.S | 232 movq RIP(%rsp), %rcx /* pt_regs->ip (in rcx) */
|
/linux-6.3-rc2/arch/x86/kernel/ |
A D | ftrace_64.S | 107 movq %rdi, RIP(%rsp) 181 movq RIP(%rsp), %rax 249 movq RIP(%rsp), %rax
|
/linux-6.3-rc2/arch/x86/include/uapi/asm/ |
A D | ptrace-abi.h | 55 #define RIP 128 macro
|
/linux-6.3-rc2/Documentation/fault-injection/ |
A D | nvme-fault-injection.rst | 53 RIP: 0010:native_safe_halt+0x2/0x10 108 RIP: 0010:native_safe_halt+0x2/0x10 159 RIP: 0010:cpuidle_enter_state+0xc5/0x460
|
/linux-6.3-rc2/arch/x86/um/os-Linux/ |
A D | mcontext.c | 26 COPY(RIP); in get_regs_from_mc()
|
/linux-6.3-rc2/Documentation/translations/zh_CN/admin-guide/ |
A D | tainted-kernels.rst | 35 RIP: 0010:my_oops_init+0x13/0x1000 [kpanic]
|
A D | reporting-issues.rst | 769 [ 68.387301] RIP: 0010:test_module_init+0x5/0xffa [test_module] 773 …[ 68.387301] RIP: 0010:test_module_init (/home/username/linux-5.10.5/test-module/test-module.c:1…
|
/linux-6.3-rc2/Documentation/translations/zh_TW/admin-guide/ |
A D | tainted-kernels.rst | 38 RIP: 0010:my_oops_init+0x13/0x1000 [kpanic]
|
A D | reporting-issues.rst | 775 [ 68.387301] RIP: 0010:test_module_init+0x5/0xffa [test_module] 779 …[ 68.387301] RIP: 0010:test_module_init (/home/username/linux-5.10.5/test-module/test-module.c:1…
|
/linux-6.3-rc2/Documentation/translations/zh_CN/dev-tools/ |
A D | kasan.rst | 159 RIP: 0033:0x7f96443109da
|
/linux-6.3-rc2/Documentation/admin-guide/ |
A D | tainted-kernels.rst | 32 RIP: 0010:my_oops_init+0x13/0x1000 [kpanic]
|
A D | perf-security.rst | 37 4. Content of architectural execution context registers (e.g., RIP, RSP,
|
A D | reporting-issues.rst | 991 [ 68.387301] RIP: 0010:test_module_init+0x5/0xffa [test_module] 995 …[ 68.387301] RIP: 0010:test_module_init (/home/username/linux-5.10.5/test-module/test-module.c:1…
|
A D | kernel-parameters.txt | 6816 targets for exploits that can control RIP.
|
/linux-6.3-rc2/Documentation/dev-tools/ |
A D | kasan.rst | 185 RIP: 0033:0x7f96443109da
|
/linux-6.3-rc2/arch/x86/lib/ |
A D | x86-opcode-map.txt | 282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation 295 # but is not truncated to 16 bits, unlike RIP.
|
/linux-6.3-rc2/tools/arch/x86/lib/ |
A D | x86-opcode-map.txt | 282 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation 295 # but is not truncated to 16 bits, unlike RIP.
|
/linux-6.3-rc2/arch/x86/crypto/ |
A D | aesni-intel_asm.S | 799 MOVADQ ONE(%RIP),\TMP1 871 MOVADQ ONE(%RIP),\TMP1
|
Completed in 40 milliseconds