}
 
 struct text_poke_loc {
-       s32 rel_addr; /* addr := _stext + rel_addr */
-       s32 rel32;
+       /* addr := _stext + rel_addr */
+       s32 rel_addr;
+       s32 disp;
+       u8 len;
        u8 opcode;
        const u8 text[POKE_MAX_OPCODE_SIZE];
+       /* see text_poke_bp_batch() */
        u8 old;
 };
 
 static __always_inline
 struct bp_patching_desc *try_get_desc(struct bp_patching_desc **descp)
 {
-       struct bp_patching_desc *desc = __READ_ONCE(*descp); /* rcu_dereference */
+       /* rcu_dereference */
+       struct bp_patching_desc *desc = __READ_ONCE(*descp);
 
        if (!desc || !arch_atomic_inc_not_zero(&desc->refs))
                return NULL;
 {
        struct bp_patching_desc *desc;
        struct text_poke_loc *tp;
-       int len, ret = 0;
+       int ret = 0;
        void *ip;
 
        if (user_mode(regs))
                        goto out_put;
        }
 
-       len = text_opcode_size(tp->opcode);
-       ip += len;
+       ip += tp->len;
 
        switch (tp->opcode) {
        case INT3_INSN_OPCODE:
                break;
 
        case CALL_INSN_OPCODE:
-               int3_emulate_call(regs, (long)ip + tp->rel32);
+               int3_emulate_call(regs, (long)ip + tp->disp);
                break;
 
        case JMP32_INSN_OPCODE:
        case JMP8_INSN_OPCODE:
-               int3_emulate_jmp(regs, (long)ip + tp->rel32);
+               int3_emulate_jmp(regs, (long)ip + tp->disp);
                break;
 
        default:
         */
        for (do_sync = 0, i = 0; i < nr_entries; i++) {
                u8 old[POKE_MAX_OPCODE_SIZE] = { tp[i].old, };
-               int len = text_opcode_size(tp[i].opcode);
+               int len = tp[i].len;
 
                if (len - INT3_INSN_SIZE > 0) {
                        memcpy(old + INT3_INSN_SIZE,
                               const void *opcode, size_t len, const void *emulate)
 {
        struct insn insn;
-       int ret;
+       int ret, i;
 
        memcpy((void *)tp->text, opcode, len);
        if (!emulate)
                emulate = opcode;
 
        ret = insn_decode_kernel(&insn, emulate);
-
        BUG_ON(ret < 0);
-       BUG_ON(len != insn.length);
 
        tp->rel_addr = addr - (void *)_stext;
+       tp->len = len;
        tp->opcode = insn.opcode.bytes[0];
 
+       switch (tp->opcode) {
+       case RET_INSN_OPCODE:
+       case JMP32_INSN_OPCODE:
+       case JMP8_INSN_OPCODE:
+               /*
+                * Control flow instructions without implied execution of the
+                * next instruction can be padded with INT3.
+                */
+               for (i = insn.length; i < len; i++)
+                       BUG_ON(tp->text[i] != INT3_INSN_OPCODE);
+               break;
+
+       default:
+               BUG_ON(len != insn.length);
+       };
+
+
        switch (tp->opcode) {
        case INT3_INSN_OPCODE:
        case RET_INSN_OPCODE:
        case CALL_INSN_OPCODE:
        case JMP32_INSN_OPCODE:
        case JMP8_INSN_OPCODE:
-               tp->rel32 = insn.immediate.value;
+               tp->disp = insn.immediate.value;
                break;
 
        default: /* assume NOP */
                case 2: /* NOP2 -- emulate as JMP8+0 */
                        BUG_ON(memcmp(emulate, x86_nops[len], len));
                        tp->opcode = JMP8_INSN_OPCODE;
-                       tp->rel32 = 0;
+                       tp->disp = 0;
                        break;
 
                case 5: /* NOP5 -- emulate as JMP32+0 */
                        BUG_ON(memcmp(emulate, x86_nops[len], len));
                        tp->opcode = JMP32_INSN_OPCODE;
-                       tp->rel32 = 0;
+                       tp->disp = 0;
                        break;
 
                default: /* unknown instruction */