Lines Matching full:jump
3 * Kernel Probes Jump Optimization (Optprobes)
46 /* This function only handles jump-optimized kprobe */ in __recover_optprobed_insn()
59 * overwritten by jump destination address. In this case, original in __recover_optprobed_insn()
228 /* Check whether insn is indirect jump */
232 (X86_MODRM_REG(insn->modrm.value) & 6) == 4) || /* Jump */ in insn_is_indirect_jump()
233 insn->opcode.bytes[0] == 0xea); /* Segment based jump */ in insn_is_indirect_jump()
246 case 0xe9: /* near relative jump */ in insn_jump_into_range()
247 case 0xeb: /* short relative jump */ in insn_jump_into_range()
263 /* Decode whole function to ensure any instructions don't jump into target */
282 /* Check there is enough space for a relative jump. */ in can_optimize()
318 * Check any instructions don't jump into target, indirectly or in can_optimize()
321 * The indirect case is present to handle a code with jump in can_optimize()
324 * However, the kernel built with retpolines or IBT has jump in can_optimize()
413 * a relative jump. in arch_prepare_optimized_kprobe()
484 /* Backup instructions which will be replaced by jump address */ in arch_optimize_kprobes()
498 * Replace a relative jump (JMP.d32) with a breakpoint (INT3).