Searched refs:RIP (Results 1 – 16 of 16) sorted by relevance
| /linux/tools/testing/selftests/x86/ |
| H A D | nx_stack.c | 102 #define RIP REG_RIP macro 106 #define RIP REG_EIP macro 129 uc->uc_mcontext.gregs[RIP] = (uintptr_t)&make_stack2; in sigsegv() 138 uc->uc_mcontext.gregs[RIP] = stack_max_addr - PAGE_SIZE; in sigsegv() 142 uc->uc_mcontext.gregs[RIP] -= PAGE_SIZE; in sigsegv() 143 if (uc->uc_mcontext.gregs[RIP] == stack_min_addr) { in sigsegv() 156 unsigned long rip = uc->uc_mcontext.gregs[RIP]; in sigtrap()
|
| /linux/arch/x86/um/ |
| H A D | ptrace_64.c | 34 [RIP >> 3] = HOST_IP, 66 case RIP: in putreg() 144 case RIP: in getreg()
|
| H A D | user-offsets.c | 67 DEFINE_LONGS(HOST_IP, RIP); in foo()
|
| /linux/Documentation/fault-injection/ |
| H A D | nvme-fault-injection.rst | 53 RIP: 0010:native_safe_halt+0x2/0x10 108 RIP: 0010:native_safe_halt+0x2/0x10 159 RIP: 0010:cpuidle_enter_state+0xc5/0x460
|
| /linux/arch/x86/um/os-Linux/ |
| H A D | mcontext.c | 35 COPY(RIP); in get_regs_from_mc() 75 COPY(RIP); in get_mc_from_regs()
|
| /linux/Documentation/translations/zh_CN/admin-guide/ |
| H A D | tainted-kernels.rst | 35 RIP: 0010:my_oops_init+0x13/0x1000 [kpanic]
|
| H A D | reporting-issues.rst | 769 [ 68.387301] RIP: 0010:test_module_init+0x5/0xffa [test_module] 773 …[ 68.387301] RIP: 0010:test_module_init (/home/username/linux-5.10.5/test-module/test-module.c:1…
|
| /linux/Documentation/translations/zh_TW/admin-guide/ |
| H A D | tainted-kernels.rst | 38 RIP: 0010:my_oops_init+0x13/0x1000 [kpanic]
|
| H A D | reporting-issues.rst | 770 [ 68.387301] RIP: 0010:test_module_init+0x5/0xffa [test_module] 774 …[ 68.387301] RIP: 0010:test_module_init (/home/username/linux-5.10.5/test-module/test-module.c:1…
|
| /linux/Documentation/admin-guide/ |
| H A D | tainted-kernels.rst | 32 RIP: 0010:my_oops_init+0x13/0x1000 [kpanic]
|
| H A D | perf-security.rst | 37 4. Content of architectural execution context registers (e.g., RIP, RSP,
|
| H A D | kernel-parameters.txt | 8375 targets for exploits that can control RIP.
|
| /linux/Documentation/dev-tools/ |
| H A D | kasan.rst | 194 RIP: 0033:0x7f96443109da
|
| /linux/tools/arch/x86/lib/ |
| H A D | x86-opcode-map.txt | 292 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation 305 # but is not truncated to 16 bits, unlike RIP.
|
| /linux/arch/x86/lib/ |
| H A D | x86-opcode-map.txt | 292 # in 64-bit mode. AMD CPUs accept 0x66 prefix, it causes RIP truncation 305 # but is not truncated to 16 bits, unlike RIP.
|
| /linux/tools/arch/x86/kcpuid/ |
| H A D | cpuid.csv | 887 0x8000001b, 0, eax, 7, ibs_rip_invalid_chk , IBS invalid RIP indication supported
|