regs64 347 arch/x86/kernel/kexec-bzimage64.c struct kexec_entry64_regs regs64; regs64 481 arch/x86/kernel/kexec-bzimage64.c ret = kexec_purgatory_get_set_symbol(image, "entry64_regs", ®s64, regs64 482 arch/x86/kernel/kexec-bzimage64.c sizeof(regs64), 1); regs64 486 arch/x86/kernel/kexec-bzimage64.c regs64.rbx = 0; /* Bootstrap Processor */ regs64 487 arch/x86/kernel/kexec-bzimage64.c regs64.rsi = bootparam_load_addr; regs64 488 arch/x86/kernel/kexec-bzimage64.c regs64.rip = kernel_load_addr + 0x200; regs64 496 arch/x86/kernel/kexec-bzimage64.c regs64.rsp = (unsigned long)stack; regs64 497 arch/x86/kernel/kexec-bzimage64.c ret = kexec_purgatory_get_set_symbol(image, "entry64_regs", ®s64, regs64 498 arch/x86/kernel/kexec-bzimage64.c sizeof(regs64), 0); regs64 64 tools/testing/selftests/x86/test_syscall_vdso.c struct regs64 regs64; regs64 119 tools/testing/selftests/x86/test_syscall_vdso.c printf("ax:%016llx bx:%016llx cx:%016llx dx:%016llx\n", regs64.rax, regs64.rbx, regs64.rcx, regs64.rdx); regs64 120 tools/testing/selftests/x86/test_syscall_vdso.c printf("si:%016llx di:%016llx bp:%016llx sp:%016llx\n", regs64.rsi, regs64.rdi, regs64.rbp, regs64.rsp); regs64 121 tools/testing/selftests/x86/test_syscall_vdso.c printf(" 8:%016llx 9:%016llx 10:%016llx 11:%016llx\n", regs64.r8 , regs64.r9 , regs64.r10, regs64.r11); regs64 122 tools/testing/selftests/x86/test_syscall_vdso.c printf("12:%016llx 13:%016llx 14:%016llx 15:%016llx\n", regs64.r12, regs64.r13, regs64.r14, regs64.r15); regs64 129 tools/testing/selftests/x86/test_syscall_vdso.c uint64_t *r64 = ®s64.r8; regs64 298 tools/testing/selftests/x86/test_syscall_vdso.c memset(®s64, 0x77, sizeof(regs64));