Lines Matching full:int3

622  * Self-test for the INT3 based CALL emulation code.
624 * This exercises int3_emulate_call() to make sure INT3 pt_regs are set up
625 * properly and that there is a stack gap between the INT3 frame and the
627 * stack would corrupt the INT3 IRET frame.
683 * Stick the address of the INT3 instruction into int3_selftest_ip, in int3_selftest()
684 * then trigger the INT3, padded with NOPs to match a CALL instruction in int3_selftest()
687 asm volatile ("1: int3; nop; nop; nop; nop\n\t" in int3_selftest()
1071 * Having observed our INT3 instruction, we now must observe in poke_int3_handler()
1074 * bp_desc = desc INT3 in poke_int3_handler()
1076 * write INT3 if (desc) in poke_int3_handler()
1085 * Discount the INT3. See text_poke_bp_batch(). in poke_int3_handler()
1110 * Someone poked an explicit INT3, they'll want to handle it, in poke_int3_handler()
1148 * Modify multi-byte instruction by using int3 breakpoint on SMP.
1150 * synchronization using int3 breakpoint.
1154 * - add a int3 trap to the address that will be patched
1160 * - replace the first byte (int3) by the first byte of
1171 unsigned char int3 = INT3_INSN_OPCODE; in text_poke_bp_batch() local
1180 * Corresponding read barrier in int3 notifier for making sure the in text_poke_bp_batch()
1186 * First step: add a int3 trap to the address that will be patched. in text_poke_bp_batch()
1190 text_poke(text_poke_addr(&tp[i]), &int3, INT3_INSN_SIZE); in text_poke_bp_batch()
1216 * - write INT3 byte in text_poke_bp_batch()
1220 * INT3 and handler and not hit the old or new instruction. in text_poke_bp_batch()
1221 * Intel PT outputs FUP/TIP packets for the INT3, so the flow in text_poke_bp_batch()
1228 * either the old instruction flow or FUP/TIP of INT3. After the in text_poke_bp_batch()
1230 * new instruction flow or FUP/TIP of INT3. Thus decoders can in text_poke_bp_batch()
1250 * Third step: replace the first byte (int3) by the first byte of in text_poke_bp_batch()