/openbmc/linux/arch/x86/kernel/ |
H A D | static_call.c | 10 JMP = 2, /* tramp / site tail-call */ enumerator 61 if ((type == JMP || type == RET) && (op = __is_Jcc(insn))) in __static_call_transform() 79 case JMP: in __static_call_transform()
|
/openbmc/linux/kernel/bpf/ |
H A D | core.c | 1568 INSN_2(JMP, CALL), \ 1570 INSN_2(JMP, EXIT), \ 1598 INSN_3(JMP, JEQ, X), \ 1599 INSN_3(JMP, JNE, X), \ 1600 INSN_3(JMP, JGT, X), \ 1601 INSN_3(JMP, JLT, X), \ 1602 INSN_3(JMP, JGE, X), \ 1603 INSN_3(JMP, JLE, X), \ 1604 INSN_3(JMP, JSGT, X), \ 1605 INSN_3(JMP, JSLT, X), \ [all …]
|
/openbmc/qemu/target/avr/ |
H A D | insn.decode | 93 JMP 1001 010 ..... 110 . imm=%imm_call
|
H A D | disas.c | 164 INSN(JMP, "0x%x", a->imm * 2)
|
/openbmc/qemu/target/rx/ |
H A D | insns.decode | 297 # JMP rs 298 JMP 0111 1111 0000 rs:4 &jreg
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | shstk.rst | 20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
|
/openbmc/linux/Documentation/livepatch/ |
H A D | reliable-stacktrace.rst | 232 with a JMP instruction which targets the associated optprobe trampoline. When
|
/openbmc/linux/tools/arch/x86/lib/ |
H A D | x86-opcode-map.txt | 297 e9: JMP-near Jz (f64) 298 ea: JMP-far Ap (i64) 299 eb: JMP-short Jb (f64)
|
/openbmc/linux/arch/x86/lib/ |
H A D | x86-opcode-map.txt | 297 e9: JMP-near Jz (f64) 298 ea: JMP-far Ap (i64) 299 eb: JMP-short Jb (f64)
|
/openbmc/qemu/target/i386/tcg/ |
H A D | decode-new.c.inc | 1852 [0xE9] = X86_OP_ENTRYr(JMP, J,z_f64), 1854 [0xEB] = X86_OP_ENTRYr(JMP, J,b),
|
/openbmc/qemu/tests/tcg/i386/ |
H A D | x86.csv | 871 "JMP rel16","JMP rel16","jmp rel16","E9 cw","V","N.S.","","operand16","r","Y","" 872 "JMP rel32","JMP rel32","jmp rel32","E9 cd","N.S.","V","","default64","r","Y","" 873 "JMP rel32","JMP rel32","jmp rel32","E9 cd","V","N.S.","","operand32","r","Y","" 874 "JMP rel8","JMP rel8","jmp rel8","EB cb","N.S.","V","","default64","r","Y","" 875 "JMP rel8","JMP rel8","jmp rel8","EB cb","V","N.S.","","","r","Y","" 876 "JMP r/m32","JMPL* r/m32","jmpl* r/m32","FF /4","V","N.S.","","operand32","r","Y","32" 877 "JMP r/m64","JMPQ* r/m64","jmpq* r/m64","FF /4","N.S.","V","","","r","Y","64" 878 "JMP r/m16","JMPW* r/m16","jmpw* r/m16","FF /4","V","N.S.","","operand16","r","Y","16"
|
/openbmc/openbmc/poky/meta/recipes-bsp/v86d/v86d/ |
H A D | Update-x86emu-from-X.org.patch | 10153 DECODE_PRINTF("JMP\t"); 10189 DECODE_PRINTF("JMP\tFAR "); 10218 DECODE_PRINTF("JMP\t");
|