Symbol: regs64
arch/x86/kernel/kexec-bzimage64.c
487
struct kexec_entry64_regs regs64;
arch/x86/kernel/kexec-bzimage64.c
657
ret = kexec_purgatory_get_set_symbol(image, "entry64_regs", &regs64,
arch/x86/kernel/kexec-bzimage64.c
658
sizeof(regs64), 1);
arch/x86/kernel/kexec-bzimage64.c
662
regs64.rbx = 0; /* Bootstrap Processor */
arch/x86/kernel/kexec-bzimage64.c
663
regs64.rsi = bootparam_load_addr;
arch/x86/kernel/kexec-bzimage64.c
664
regs64.rip = kernel_load_addr + 0x200;
arch/x86/kernel/kexec-bzimage64.c
672
regs64.rsp = (unsigned long)stack;
arch/x86/kernel/kexec-bzimage64.c
673
ret = kexec_purgatory_get_set_symbol(image, "entry64_regs", &regs64,
arch/x86/kernel/kexec-bzimage64.c
674
sizeof(regs64), 0);
tools/testing/selftests/x86/test_syscall_vdso.c
119
printf("ax:%016llx bx:%016llx cx:%016llx dx:%016llx\n", regs64.rax, regs64.rbx, regs64.rcx, regs64.rdx);
tools/testing/selftests/x86/test_syscall_vdso.c
120
printf("si:%016llx di:%016llx bp:%016llx sp:%016llx\n", regs64.rsi, regs64.rdi, regs64.rbp, regs64.rsp);
tools/testing/selftests/x86/test_syscall_vdso.c
121
printf(" 8:%016llx 9:%016llx 10:%016llx 11:%016llx\n", regs64.r8 , regs64.r9 , regs64.r10, regs64.r11);
tools/testing/selftests/x86/test_syscall_vdso.c
122
printf("12:%016llx 13:%016llx 14:%016llx 15:%016llx\n", regs64.r12, regs64.r13, regs64.r14, regs64.r15);
tools/testing/selftests/x86/test_syscall_vdso.c
129
uint64_t *r64 = &regs64.r8;
tools/testing/selftests/x86/test_syscall_vdso.c
298
memset(&regs64, 0x77, sizeof(regs64));
tools/testing/selftests/x86/test_syscall_vdso.c
64
struct regs64 regs64;