Searched refs:insn_buf (Results 1 – 3 of 3) sorted by relevance
/arch/x86/tools/ |
D | insn_sanity.c | 99 unsigned char *insn_buf, struct insn *insn) in dump_stream() argument 112 fprintf(fp, " %02x", insn_buf[i]); in dump_stream() 140 static int read_next_insn(unsigned char *insn_buf) in read_next_insn() argument 150 insn_buf[i] = (unsigned char)strtoul(tmp, &tmp, 16); in read_next_insn() 158 static int generate_insn(unsigned char *insn_buf) in generate_insn() argument 163 return read_next_insn(insn_buf); in generate_insn() 167 *(unsigned short *)(&insn_buf[i]) = random() & 0xffff; in generate_insn() 170 insn_buf[i++] = random() & 0xff; in generate_insn() 242 unsigned char insn_buf[MAX_INSN_SIZE * 2]; in main() local 247 memset(insn_buf + MAX_INSN_SIZE, INSN_NOP, MAX_INSN_SIZE); in main() [all …]
|
D | test_get_len.c | 114 unsigned char insn_buf[16]; in main() local 133 memset(insn_buf, 0, 16); in main() 146 insn_buf[nb++] = (unsigned char) b; in main() 152 insn_init(&insn, insn_buf, x86_64); in main()
|
/arch/x86/kernel/ |
D | kprobes-opt.c | 381 u8 *insn_buf, in setup_optimize_kprobe() argument 391 insn_buf[0] = RELATIVEJUMP_OPCODE; in setup_optimize_kprobe() 392 *(s32 *)(&insn_buf[1]) = rel; in setup_optimize_kprobe() 395 tprm->opcode = insn_buf; in setup_optimize_kprobe() 427 u8 *insn_buf, in setup_unoptimize_kprobe() argument 431 insn_buf[0] = BREAKPOINT_INSTRUCTION; in setup_unoptimize_kprobe() 432 memcpy(insn_buf + 1, op->optinsn.copied_insn, RELATIVE_ADDR_SIZE); in setup_unoptimize_kprobe() 435 tprm->opcode = insn_buf; in setup_unoptimize_kprobe()
|