Searched refs:RIP (Results 1 – 13 of 13) sorted by relevance
/linux-4.1.27/arch/x86/um/ |
D | ptrace_64.c | 31 [RIP >> 3] = HOST_IP, 71 case RIP: in putreg() 148 case RIP: in getreg()
|
D | user-offsets.c | 82 DEFINE_LONGS(HOST_IP, RIP); in foo()
|
/linux-4.1.27/arch/x86/kernel/ |
D | entry_64.S | 288 movq RIP(%rsp),%rcx 422 cmpq %rcx,RIP(%rsp) /* RCX == RIP */ 804 testb $4,(SS-RIP)(%rsp) 1349 cmpq %rcx,RIP+8(%rsp) 1352 cmpq %rax,RIP+8(%rsp) 1354 cmpq $gs_change,RIP+8(%rsp) 1360 movq %rcx,RIP+8(%rsp) 1450 testb $3, CS-RIP+8(%rsp)
|
D | mcount_64.S | 122 movq %rdi, RIP(%rsp) 230 movq RIP(%rsp), %rax
|
/linux-4.1.27/arch/x86/include/uapi/asm/ |
D | ptrace-abi.h | 54 #define RIP 128 macro
|
/linux-4.1.27/net/ipx/ |
D | Kconfig | 55 disabled. This might break existing applications, especially RIP/SAP 56 daemons. A RIP/SAP daemon that works well with the full internal net
|
/linux-4.1.27/arch/x86/ia32/ |
D | ia32entry.S | 200 movl RIP(%rsp),%ecx /* User %eip */ 414 movl RIP(%rsp),%ecx 602 CFI_REL_OFFSET rip,RIP
|
/linux-4.1.27/arch/x86/um/os-Linux/ |
D | mcontext.c | 25 COPY(RIP); in get_regs_from_mc()
|
/linux-4.1.27/arch/x86/include/asm/ |
D | calling.h | 85 #define RIP 16*8 macro
|
/linux-4.1.27/Documentation/ |
D | kmemcheck.txt | 242 RIP: 0010:[<ffffffff8104ede8>] [<ffffffff8104ede8>] __dequeue_signal+0xc8/0x190 260 The single most valuable information in this report is the RIP (or EIP on 32- 353 RIP value, they actually point to the _next_ instruction (they are return 493 that, we'll need the RIP address again: 495 RIP: 0010:[<ffffffff8104ede8>] [<ffffffff8104ede8>] __dequeue_signal+0xc8/0x190
|
D | kernel-parameters.txt | 3930 targets for exploits that can control RIP.
|
/linux-4.1.27/arch/x86/lib/ |
D | x86-opcode-map.txt | 277 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation 290 # but is not truncated to 16 bits, unlike RIP.
|
/linux-4.1.27/arch/x86/crypto/ |
D | aesni-intel_asm.S | 265 MOVADQ ONE(%RIP),\TMP1 487 MOVADQ ONE(%RIP),\TMP1 551 MOVADQ ONE(%RIP),\TMP1
|