Home
last modified time | relevance | path

Searched full:int3 (Results 1 – 25 of 73) sorted by relevance

123

/linux/arch/x86/lib/
H A Dbhi.S32 int3
42 int3
49 int3
60 int3
72 int3
85 int3
99 int3
106 int3
121 int3
137 int3
H A Dretpoline.S21 int3
40 … __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg; int3), X86_FEATURE_RETPOLINE_LFENCE, \
87 int3
113 int3
150 int3
214 int3
250 int3
251 int3
273 int3
329 * As part of the TEST above, RET is the ModRM byte, and INT3 the imm8.
[all …]
/linux/arch/x86/entry/vsyscall/
H A Dvsyscall_emu_64.S23 int3
29 int3
35 int3
/linux/arch/x86/kernel/kprobes/
H A Dcore.c228 * by int3. And the instruction at kp->addr is not modified by kprobes in __recover_probed_insn()
277 /* INT3 / INT n / INTO / INT1 */ in is_exception_insn()
455 /* Prepare reljump or int3 right after instruction */
473 /* Otherwise, put an int3 for trapping singlestep */ in prepare_singlestep()
623 * int3 single stepping. in prepare_emulation()
636 case 0xcc: /* int3 */ in prepare_emulation()
745 /* Add int3 for single-step or booster jmp */ in arch_copy_kprobe()
790 u8 int3 = INT3_INSN_OPCODE; in arch_arm_kprobe() local
792 text_poke(p->addr, &int3, 1); in arch_arm_kprobe()
794 perf_event_text_poke(p->addr, &p->opcode, 1, &int3, 1); in arch_arm_kprobe()
[all …]
/linux/arch/x86/kernel/
H A Dalternative.c138 /* Initialize a thunk with the "jmp *reg; int3" instructions. */
253 * The ITS thunk contains an indirect jump and an int3 instruction so in its_allocate_thunk()
321 * each single-byte NOPs). If @len to fill out is > ASM_NOP_MAX, pad with INT3 and
716 * [CS]{,3} CALL/JMP *%\reg [INT3]*
765 bytes[i++] = 0xcc; /* INT3 */ in emit_indirect()
2035 * 23: cc int3 in decode_fineibt_paranoid()
2237 * Self-test for the INT3 based CALL emulation code.
2239 * This exercises int3_emulate_call() to make sure INT3 pt_regs are set up
2240 * properly and that there is a stack gap between the INT3 frame and the
2242 * stack would corrupt the INT3 IRET frame.
[all …]
H A Dftrace_64.S305 int3
309 __stringify(ANNOTATE_UNRET_SAFE; ret; int3), \
379 int3
383 __stringify(ANNOTATE_UNRET_SAFE; ret; int3), \
H A Duprobes.c64 * cc - int3. SIGTRAP if used in userspace
135 * cc - int3. SIGTRAP if used in userspace
339 "int3\n"
895 "int3\n"
927 * the underlying instruction is as expected - either int3 or call.
952 * Modify multi-byte instructions by using INT3 breakpoints on SMP.
954 * synchronization using INT3 breakpoints and SMP cross-calls.
958 * - Add an INT3 trap to the address that will be patched
962 * - Replace the first byte (INT3) by the first byte of the replacing opcode
968 uprobe_opcode_t int3 = UPROBE_SWBP_INSN; in int3_update() local
[all …]
H A Dtraps.c858 if (kgdb_ll_trap(DIE_INT3, "int3", regs, 0, X86_TRAP_BP, in do_int3()
867 res = notify_die(DIE_INT3, "int3", regs, 0, X86_TRAP_BP, SIGTRAP); in do_int3()
879 do_trap(X86_TRAP_BP, SIGTRAP, "int3", regs, 0, 0, NULL); in do_int3_user()
888 * INT3. in DEFINE_IDTENTRY_RAW()
895 * and therefore can trigger INT3, hence smp_text_poke_int3_handler() must in DEFINE_IDTENTRY_RAW()
897 * nmi_enter() because the INT3 could have been hit in any context in DEFINE_IDTENTRY_RAW()
911 die("int3", regs, 0); in DEFINE_IDTENTRY_RAW()
/linux/arch/mips/sgi-ip22/
H A Dip22-hpc.c49 /* Guiness comes with INT3 which is part of IOC */ in sgihpc_init()
50 sgint = &sgioc->int3; in sgihpc_init()
/linux/tools/testing/selftests/x86/
H A Dnx_stack.c20 * Fill the stack with INT3's and then try to execute some of them:
24 * Test doesn't exit SIGSEGV handler after first fault at INT3.
208 * Unreachable, but if _this_ INT3 is ever reached, it's a bug somewhere. in main()
/linux/arch/x86/mm/
H A Dmem_encrypt_boot.S71 int3
161 int3
/linux/arch/x86/include/asm/
H A Dtext-patching.h72 __CASE(INT3); in text_opcode_size()
145 * The INT3 handler in entry_64.S adds a gap between the in int3_emulate_push()
H A Dtrapnr.h14 #define EVENT_TYPE_SWEXC 6 // INTO, INT3
H A Dstatic_call.h54 __ARCH_DEFINE_STATIC_CALL_TRAMP(name, "ret; int3; nop; nop; nop")
/linux/arch/mips/boot/dts/loongson/
H A Dloongson64g-package.dtsi38 <0x00000000>; /* int3 */
H A Dloongson64c-package.dtsi41 <0x00000000>; /* int3 */
H A Dloongson64-2k1000.dtsi76 <0x00000000>; /* int3 */
96 <0x00000000>; /* int3 */
H A Dloongson64v_4core_virtio.dts40 <0x00000000>; /* int3 */
/linux/arch/m68k/include/asm/
H A Dtraps.h248 unsigned short int3[2]; member
258 unsigned short int3[4]; member
/linux/Documentation/devicetree/bindings/interrupt-controller/
H A Dloongson,liointc.yaml121 <0x00000000>; /* int3 */
/linux/sound/soc/qcom/qdsp6/
H A Dq6prm.h43 /* Clock ID for INT3 I2S IBIT */
/linux/arch/x86/platform/efi/
H A Defi_thunk_64.S88 int3
/linux/arch/x86/include/uapi/asm/
H A Dvm86.h36 #define VM86_INTx 2 /* int3/int x instruction (ARG = x) */
/linux/arch/mips/include/asm/sgi/
H A Dip22.h68 #define SGI_VERT_IRQ SGINT_LOCAL2 + 0 /* INT3: newport vertical status */
/linux/arch/x86/um/shared/sysdep/
H A Dstub_64.h113 __asm("int3"); in trap_myself()

123