Lines Matching +full:0 +full:x2e
8 CALL = 0, /* site call */
20 static const u8 tramp_ud[] = { 0x0f, 0xb9, 0xcc };
25 static const u8 xor5rax[] = { 0x2e, 0x2e, 0x2e, 0x31, 0xc0 };
27 static const u8 retinsn[] = { RET_INSN_OPCODE, 0xcc, 0xcc, 0xcc, 0xcc };
31 u8 ret = 0; in __is_Jcc()
33 if (insn[0] == 0x0f) { in __is_Jcc()
35 if ((tmp & 0xf0) == 0x80) in __is_Jcc()
97 buf[0] = 0x0f; in __static_call_transform()
105 if (memcmp(insn, code, size) == 0) in __static_call_transform()
116 u8 opcode = insn[0]; in __static_call_validate()
138 pr_err("unexpected static_call insn opcode 0x%x at %pS\n", opcode, insn); in __static_call_validate()
149 * 0 | 0 | CALL in __sc_insn()
150 * 0 | 1 | NOP in __sc_insn()
151 * 1 | 0 | JMP in __sc_insn()