regs64            347 arch/x86/kernel/kexec-bzimage64.c 	struct kexec_entry64_regs regs64;
regs64            481 arch/x86/kernel/kexec-bzimage64.c 	ret = kexec_purgatory_get_set_symbol(image, "entry64_regs", &regs64,
regs64            482 arch/x86/kernel/kexec-bzimage64.c 					     sizeof(regs64), 1);
regs64            486 arch/x86/kernel/kexec-bzimage64.c 	regs64.rbx = 0; /* Bootstrap Processor */
regs64            487 arch/x86/kernel/kexec-bzimage64.c 	regs64.rsi = bootparam_load_addr;
regs64            488 arch/x86/kernel/kexec-bzimage64.c 	regs64.rip = kernel_load_addr + 0x200;
regs64            496 arch/x86/kernel/kexec-bzimage64.c 	regs64.rsp = (unsigned long)stack;
regs64            497 arch/x86/kernel/kexec-bzimage64.c 	ret = kexec_purgatory_get_set_symbol(image, "entry64_regs", &regs64,
regs64            498 arch/x86/kernel/kexec-bzimage64.c 					     sizeof(regs64), 0);
regs64             64 tools/testing/selftests/x86/test_syscall_vdso.c struct regs64 regs64;
regs64            119 tools/testing/selftests/x86/test_syscall_vdso.c 	printf("ax:%016llx bx:%016llx cx:%016llx dx:%016llx\n", regs64.rax,  regs64.rbx,  regs64.rcx,  regs64.rdx);
regs64            120 tools/testing/selftests/x86/test_syscall_vdso.c 	printf("si:%016llx di:%016llx bp:%016llx sp:%016llx\n", regs64.rsi,  regs64.rdi,  regs64.rbp,  regs64.rsp);
regs64            121 tools/testing/selftests/x86/test_syscall_vdso.c 	printf(" 8:%016llx  9:%016llx 10:%016llx 11:%016llx\n", regs64.r8 ,  regs64.r9 ,  regs64.r10,  regs64.r11);
regs64            122 tools/testing/selftests/x86/test_syscall_vdso.c 	printf("12:%016llx 13:%016llx 14:%016llx 15:%016llx\n", regs64.r12,  regs64.r13,  regs64.r14,  regs64.r15);
regs64            129 tools/testing/selftests/x86/test_syscall_vdso.c 	uint64_t *r64 = &regs64.r8;
regs64            298 tools/testing/selftests/x86/test_syscall_vdso.c 		memset(&regs64, 0x77, sizeof(regs64));