Home
last modified time | relevance | path

Searched refs:RIP (Results 1 – 13 of 13) sorted by relevance

/linux-4.1.27/arch/x86/um/
Dptrace_64.c31 [RIP >> 3] = HOST_IP,
71 case RIP: in putreg()
148 case RIP: in getreg()
Duser-offsets.c82 DEFINE_LONGS(HOST_IP, RIP); in foo()
/linux-4.1.27/arch/x86/kernel/
Dentry_64.S288 movq RIP(%rsp),%rcx
422 cmpq %rcx,RIP(%rsp) /* RCX == RIP */
804 testb $4,(SS-RIP)(%rsp)
1349 cmpq %rcx,RIP+8(%rsp)
1352 cmpq %rax,RIP+8(%rsp)
1354 cmpq $gs_change,RIP+8(%rsp)
1360 movq %rcx,RIP+8(%rsp)
1450 testb $3, CS-RIP+8(%rsp)
Dmcount_64.S122 movq %rdi, RIP(%rsp)
230 movq RIP(%rsp), %rax
/linux-4.1.27/arch/x86/include/uapi/asm/
Dptrace-abi.h54 #define RIP 128 macro
/linux-4.1.27/net/ipx/
DKconfig55 disabled. This might break existing applications, especially RIP/SAP
56 daemons. A RIP/SAP daemon that works well with the full internal net
/linux-4.1.27/arch/x86/ia32/
Dia32entry.S200 movl RIP(%rsp),%ecx /* User %eip */
414 movl RIP(%rsp),%ecx
602 CFI_REL_OFFSET rip,RIP
/linux-4.1.27/arch/x86/um/os-Linux/
Dmcontext.c25 COPY(RIP); in get_regs_from_mc()
/linux-4.1.27/arch/x86/include/asm/
Dcalling.h85 #define RIP 16*8 macro
/linux-4.1.27/Documentation/
Dkmemcheck.txt242 RIP: 0010:[<ffffffff8104ede8>] [<ffffffff8104ede8>] __dequeue_signal+0xc8/0x190
260 The single most valuable information in this report is the RIP (or EIP on 32-
353 RIP value, they actually point to the _next_ instruction (they are return
493 that, we'll need the RIP address again:
495 RIP: 0010:[<ffffffff8104ede8>] [<ffffffff8104ede8>] __dequeue_signal+0xc8/0x190
Dkernel-parameters.txt3930 targets for exploits that can control RIP.
/linux-4.1.27/arch/x86/lib/
Dx86-opcode-map.txt277 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation
290 # but is not truncated to 16 bits, unlike RIP.
/linux-4.1.27/arch/x86/crypto/
Daesni-intel_asm.S265 MOVADQ ONE(%RIP),\TMP1
487 MOVADQ ONE(%RIP),\TMP1
551 MOVADQ ONE(%RIP),\TMP1