Home
last modified time | relevance | path

Searched full:int3 (Results 1 – 25 of 91) sorted by relevance

1234

/linux-6.15/arch/x86/lib/
Dbhi.S32 int3
42 int3
49 int3
60 int3
72 int3
85 int3
99 int3
106 int3
121 int3
137 int3
Dretpoline.S22 int3
41 … __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg; int3), X86_FEATURE_RETPOLINE_LFENCE, \
86 int3
112 int3
175 int3
211 int3
212 int3
234 int3
290 * As part of the TEST above, RET is the ModRM byte, and INT3 the imm8.
295 * no branch) which is halted by the INT3.
[all …]
/linux-6.15/tools/testing/selftests/x86/
Dsigreturn.c95 * An aligned int3 instruction used as a trampoline. Some of the tests
97 * before the int3.
100 ".type int3, @function\n\t"
102 "int3:\n\t"
104 "int3\n\t"
105 ".size int3, . - int3\n\t"
108 extern char int3[4096];
115 * - code16_sel: A 16-bit LDT code segment pointing to int3.
117 * - npcode32_sel: A 32-bit not-present LDT code segment pointing to int3.
158 if ((unsigned long)int3 > (1ULL << 32) - sizeof(int3)) in setup_ldt()
[all …]
Dmov_ss_trap.c12 * - INT $N, INT3, INTO, SYSCALL, SYSENTER: enter the kernel and then
148 printf("[RUN]\tMOV SS; INT3\n"); in main()
149 asm volatile ("mov %[ss], %%ss; int3" :: [ss] "m" (ss)); in main()
154 printf("[RUN]\tMOV SS; CS CS INT3\n"); in main()
155 asm volatile ("mov %[ss], %%ss; .byte 0x2e, 0x2e; int3" :: [ss] "m" (ss)); in main()
157 printf("[RUN]\tMOV SS; CSx14 INT3\n"); in main()
158 asm volatile ("mov %[ss], %%ss; .fill 14,1,0x2e; int3" :: [ss] "m" (ss)); in main()
Dentry_from_vm86.c66 "int3\n\t"
74 "int3\n\t"
96 "int3\n\t"
101 "int3\n\t"
182 /* UMIP -- exit with INT3 unless kernel emulation did not trap #GP */ in do_umip_tests()
301 /* INT3 -- should cause #BP */ in main()
302 do_test(&v86, vmcode_int3 - vmcode, VM86_TRAP, 3, "INT3"); in main()
Dnx_stack.c20 * Fill the stack with INT3's and then try to execute some of them:
24 * Test doesn't exit SIGSEGV handler after first fault at INT3.
208 * Unreachable, but if _this_ INT3 is ever reached, it's a bug somewhere. in main()
/linux-6.15/arch/x86/entry/vsyscall/
Dvsyscall_emu_64.S23 int3
29 int3
35 int3
/linux-6.15/arch/x86/kernel/kprobes/
Dcore.c228 * by int3. And the instruction at kp->addr is not modified by kprobes in __recover_probed_insn()
277 /* INT3 / INT n / INTO / INT1 */ in is_exception_insn()
455 /* Prepare reljump or int3 right after instruction */
473 /* Otherwise, put an int3 for trapping singlestep */ in prepare_singlestep()
641 * int3 single stepping. in prepare_emulation()
654 case 0xcc: /* int3 */ in prepare_emulation()
763 /* Add int3 for single-step or booster jmp */ in arch_copy_kprobe()
808 u8 int3 = INT3_INSN_OPCODE; in arch_arm_kprobe() local
810 text_poke(p->addr, &int3, 1); in arch_arm_kprobe()
812 perf_event_text_poke(p->addr, &p->opcode, 1, &int3, 1); in arch_arm_kprobe()
[all …]
Dopt.c466 * Replace breakpoints (INT3) with relative jumps (JMP.d32).
471 * the 4 bytes after the INT3 are unused and can now be overwritten.
498 * Replace a relative jump (JMP.d32) with a breakpoint (INT3).
500 * After that, we can restore the 4 bytes after the INT3 to undo what
502 * unused once the INT3 lands.
/linux-6.15/arch/x86/kernel/
Drelocate_kernel_32.S98 int3
168 int3
202 int3
222 int3
287 int3
Dalternative.c142 /* Initialize a thunk with the "jmp *reg; int3" instructions. */
249 * The ITS thunk contains an indirect jump and an int3 instruction so in its_allocate_thunk()
315 * each single-byte NOPs). If @len to fill out is > ASM_NOP_MAX, pad with INT3 and
928 * The compiler is supposed to EMIT an INT3 after every unconditional in patch_retpoline()
930 * or MITIGATION_SLS isn't enabled, we still need an INT3 after in patch_retpoline()
2016 * 23: cc int3 in decode_fineibt_paranoid()
2216 * Self-test for the INT3 based CALL emulation code.
2218 * This exercises int3_emulate_call() to make sure INT3 pt_regs are set up
2219 * properly and that there is a stack gap between the INT3 frame and the
2221 * stack would corrupt the INT3 IRET frame.
[all …]
Dftrace_64.S305 int3
309 __stringify(ANNOTATE_UNRET_SAFE; ret; int3), \
379 int3
383 __stringify(ANNOTATE_UNRET_SAFE; ret; int3), \
Drelocate_kernel_64.S228 int3
263 int3
295 int3
365 int3
Dtraps.c857 if (kgdb_ll_trap(DIE_INT3, "int3", regs, 0, X86_TRAP_BP, in do_int3()
866 res = notify_die(DIE_INT3, "int3", regs, 0, X86_TRAP_BP, SIGTRAP); in do_int3()
878 do_trap(X86_TRAP_BP, SIGTRAP, "int3", regs, 0, 0, NULL); in do_int3_user()
887 * INT3. in DEFINE_IDTENTRY_RAW()
894 * and therefore can trigger INT3, hence poke_int3_handler() must in DEFINE_IDTENTRY_RAW()
896 * nmi_enter() because the INT3 could have been hit in any context in DEFINE_IDTENTRY_RAW()
910 die("int3", regs, 0); in DEFINE_IDTENTRY_RAW()
/linux-6.15/tools/testing/selftests/kvm/x86/
Ddebug_regs.c33 * NOTE: sw_bp need to be before the cmd here, because int3 is an in guest_code()
37 asm volatile("sw_bp: int3"); in guest_code()
106 /* Test software BPs - int3 */ in main()
114 "INT3: exit %d exception %d rip 0x%llx (should be 0x%llx)", in main()
/linux-6.15/arch/mips/sgi-ip22/
Dip22-hpc.c49 /* Guiness comes with INT3 which is part of IOC */ in sgihpc_init()
50 sgint = &sgioc->int3; in sgihpc_init()
/linux-6.15/arch/x86/include/asm/
Dlinkage.h47 #define RET ret; int3
59 #define ASM_RET "ret; int3\n\t"
Dtext-patching.h72 __CASE(INT3); in text_opcode_size()
145 * The int3 handler in entry_64.S adds a gap between the in int3_emulate_push()
Dtrapnr.h14 #define EVENT_TYPE_SWEXC 6 // INTO, INT3
/linux-6.15/arch/x86/mm/
Dmem_encrypt_boot.S71 int3
161 int3
/linux-6.15/drivers/pinctrl/
Dpinctrl-pic32.c279 FUNCTION(INT3, input0),
389 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 13),
539 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 8),
644 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 5),
671 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 6),
749 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 10),
875 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 7),
926 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 0),
1028 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 14),
1170 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 11),
[all …]
/linux-6.15/arch/mips/boot/dts/loongson/
Dloongson64g-package.dtsi38 <0x00000000>; /* int3 */
Dloongson64c-package.dtsi41 <0x00000000>; /* int3 */
Dloongson64-2k1000.dtsi76 <0x00000000>; /* int3 */
96 <0x00000000>; /* int3 */
/linux-6.15/arch/m68k/include/asm/
Dtraps.h248 unsigned short int3[2]; member
258 unsigned short int3[4]; member

1234