Home
last modified time | relevance | path

Searched refs:JMP (Results 1 – 12 of 12) sorted by relevance

/openbmc/linux/arch/x86/kernel/
H A Dstatic_call.c10 JMP = 2, /* tramp / site tail-call */ enumerator
61 if ((type == JMP || type == RET) && (op = __is_Jcc(insn))) in __static_call_transform()
79 case JMP: in __static_call_transform()
/openbmc/linux/kernel/bpf/
H A Dcore.c1568 INSN_2(JMP, CALL), \
1570 INSN_2(JMP, EXIT), \
1598 INSN_3(JMP, JEQ, X), \
1599 INSN_3(JMP, JNE, X), \
1600 INSN_3(JMP, JGT, X), \
1601 INSN_3(JMP, JLT, X), \
1602 INSN_3(JMP, JGE, X), \
1603 INSN_3(JMP, JLE, X), \
1604 INSN_3(JMP, JSGT, X), \
1605 INSN_3(JMP, JSLT, X), \
[all …]
/openbmc/qemu/target/avr/
H A Dinsn.decode93 JMP 1001 010 ..... 110 . imm=%imm_call
H A Ddisas.c164 INSN(JMP, "0x%x", a->imm * 2)
/openbmc/qemu/target/rx/
H A Dinsns.decode297 # JMP rs
298 JMP 0111 1111 0000 rs:4 &jreg
/openbmc/linux/Documentation/arch/x86/
H A Dshstk.rst20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended
/openbmc/linux/Documentation/livepatch/
H A Dreliable-stacktrace.rst232 with a JMP instruction which targets the associated optprobe trampoline. When
/openbmc/linux/tools/arch/x86/lib/
H A Dx86-opcode-map.txt297 e9: JMP-near Jz (f64)
298 ea: JMP-far Ap (i64)
299 eb: JMP-short Jb (f64)
/openbmc/linux/arch/x86/lib/
H A Dx86-opcode-map.txt297 e9: JMP-near Jz (f64)
298 ea: JMP-far Ap (i64)
299 eb: JMP-short Jb (f64)
/openbmc/qemu/target/i386/tcg/
H A Ddecode-new.c.inc1852 [0xE9] = X86_OP_ENTRYr(JMP, J,z_f64),
1854 [0xEB] = X86_OP_ENTRYr(JMP, J,b),
/openbmc/qemu/tests/tcg/i386/
H A Dx86.csv871 "JMP rel16","JMP rel16","jmp rel16","E9 cw","V","N.S.","","operand16","r","Y",""
872 "JMP rel32","JMP rel32","jmp rel32","E9 cd","N.S.","V","","default64","r","Y",""
873 "JMP rel32","JMP rel32","jmp rel32","E9 cd","V","N.S.","","operand32","r","Y",""
874 "JMP rel8","JMP rel8","jmp rel8","EB cb","N.S.","V","","default64","r","Y",""
875 "JMP rel8","JMP rel8","jmp rel8","EB cb","V","N.S.","","","r","Y",""
876 "JMP r/m32","JMPL* r/m32","jmpl* r/m32","FF /4","V","N.S.","","operand32","r","Y","32"
877 "JMP r/m64","JMPQ* r/m64","jmpq* r/m64","FF /4","N.S.","V","","","r","Y","64"
878 "JMP r/m16","JMPW* r/m16","jmpw* r/m16","FF /4","V","N.S.","","operand16","r","Y","16"
/openbmc/openbmc/poky/meta/recipes-bsp/v86d/v86d/
H A DUpdate-x86emu-from-X.org.patch10153 DECODE_PRINTF("JMP\t");
10189 DECODE_PRINTF("JMP\tFAR ");
10218 DECODE_PRINTF("JMP\t");