Searched refs:JMP (Results 1 – 7 of 7) sorted by relevance
| /linux/arch/x86/kernel/ |
| A D | static_call.c | 10 JMP = 2, /* tramp / site tail-call */ enumerator 61 if ((type == JMP || type == RET) && (op = __is_Jcc(insn))) in __static_call_transform() 79 case JMP: in __static_call_transform()
|
| /linux/kernel/bpf/ |
| A D | core.c | 1606 INSN_2(JMP, CALL), \ 1608 INSN_2(JMP, EXIT), \ 1636 INSN_3(JMP, JEQ, X), \ 1637 INSN_3(JMP, JNE, X), \ 1638 INSN_3(JMP, JGT, X), \ 1639 INSN_3(JMP, JLT, X), \ 1640 INSN_3(JMP, JGE, X), \ 1641 INSN_3(JMP, JLE, X), \ 1642 INSN_3(JMP, JSGT, X), \ 1643 INSN_3(JMP, JSLT, X), \ [all …]
|
| /linux/Documentation/bpf/standardization/ |
| A D | instruction-set.rst | 282 JMP 0x5 64-bit jump operations `Arithmetic and jump instructions`_ 290 For arithmetic and jump instructions (``ALU``, ``ALU64``, ``JMP`` and 480 conformance group, while ``JMP`` uses 64-bit wide operands for 490 JA 0x0 0x0 PC += offset {JA, K, JMP} only 499 …CALL 0x8 0x0 call helper function by static ID {CALL, K, JMP} only, see `Helper func… 500 …CALL 0x8 0x1 call PC += imm {CALL, K, JMP} only, see `Program-loc… 501 …CALL 0x8 0x2 call helper function by BTF ID {CALL, K, JMP} only, see `Helper func… 502 EXIT 0x9 0x0 return {CALL, K, JMP} only 523 ``{JLE, K, JMP}`` means:: 534 ``JMP`` class permits a 16-bit jump offset specified by the 'offset'
|
| /linux/Documentation/arch/x86/ |
| A D | shstk.rst | 20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
|
| /linux/Documentation/livepatch/ |
| A D | reliable-stacktrace.rst | 232 with a JMP instruction which targets the associated optprobe trampoline. When
|
| /linux/tools/arch/x86/lib/ |
| A D | x86-opcode-map.txt | 302 e9: JMP-near Jz (f64) (!REX2) 303 ea: JMP-far Ap (i64) (!REX2) 304 eb: JMP-short Jb (f64) (!REX2)
|
| /linux/arch/x86/lib/ |
| A D | x86-opcode-map.txt | 302 e9: JMP-near Jz (f64) (!REX2) 303 ea: JMP-far Ap (i64) (!REX2) 304 eb: JMP-short Jb (f64) (!REX2)
|
Completed in 36 milliseconds