Lines Matching full:jump
3 * Kernel Probes Jump Optimization (Optprobes)
46 /* This function only handles jump-optimized kprobe */ in __recover_optprobed_insn()
59 * overwritten by jump destination address. In this case, original in __recover_optprobed_insn()
221 /* Check whether insn is indirect jump */
225 (X86_MODRM_REG(insn->modrm.value) & 6) == 4) || /* Jump */ in __insn_is_indirect_jump()
226 insn->opcode.bytes[0] == 0xea); /* Segment based jump */ in __insn_is_indirect_jump()
239 case 0xe9: /* near relative jump */ in insn_jump_into_range()
240 case 0xeb: /* short relative jump */ in insn_jump_into_range()
262 * Jump to x86_indirect_thunk_* is treated as an indirect jump. in insn_is_indirect_jump()
264 * older gcc may use indirect jump. So we add this check instead of in insn_is_indirect_jump()
265 * replace indirect-jump check. in insn_is_indirect_jump()
276 /* Decode whole function to ensure any instructions don't jump into target */
295 /* Check there is enough space for a relative jump. */ in can_optimize()
330 /* Check any instructions don't jump into target */ in can_optimize()
414 * a relative jump. in arch_prepare_optimized_kprobe()
485 /* Backup instructions which will be replaced by jump address */ in arch_optimize_kprobes()
499 * Replace a relative jump (JMP.d32) with a breakpoint (INT3).