Lines Matching full:jump
3 * Kernel Probes Jump Optimization (Optprobes)
45 /* This function only handles jump-optimized kprobe */ in __recover_optprobed_insn()
58 * overwritten by jump destination address. In this case, original in __recover_optprobed_insn()
227 /* Check whether insn is indirect jump */
231 (X86_MODRM_REG(insn->modrm.value) & 6) == 4) || /* Jump */ in __insn_is_indirect_jump()
232 insn->opcode.bytes[0] == 0xea); /* Segment based jump */ in __insn_is_indirect_jump()
245 case 0xe9: /* near relative jump */ in insn_jump_into_range()
246 case 0xeb: /* short relative jump */ in insn_jump_into_range()
268 * Jump to x86_indirect_thunk_* is treated as an indirect jump. in insn_is_indirect_jump()
270 * older gcc may use indirect jump. So we add this check instead of in insn_is_indirect_jump()
271 * replace indirect-jump check. in insn_is_indirect_jump()
295 /* Decode whole function to ensure any instructions don't jump into target */
314 /* Check there is enough space for a relative jump. */ in can_optimize()
349 /* Check any instructions don't jump into target */ in can_optimize()
433 * a relative jump. in arch_prepare_optimized_kprobe()
504 /* Backup instructions which will be replaced by jump address */ in arch_optimize_kprobes()
518 * Replace a relative jump (JMP.d32) with a breakpoint (INT3).