| /linux/arch/x86/lib/ |
| H A D | bhi.S | 32 int3 42 int3 49 int3 60 int3 72 int3 85 int3 99 int3 106 int3 121 int3 137 int3
|
| H A D | retpoline.S | 21 int3 40 … __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg; int3), X86_FEATURE_RETPOLINE_LFENCE, \ 87 int3 113 int3 150 int3 214 int3 250 int3 251 int3 273 int3 329 * As part of the TEST above, RET is the ModRM byte, and INT3 the imm8. [all …]
|
| /linux/arch/x86/entry/vsyscall/ |
| H A D | vsyscall_emu_64.S | 23 int3 29 int3 35 int3
|
| /linux/arch/x86/kernel/kprobes/ |
| H A D | core.c | 228 * by int3. And the instruction at kp->addr is not modified by kprobes in __recover_probed_insn() 277 /* INT3 / INT n / INTO / INT1 */ in is_exception_insn() 455 /* Prepare reljump or int3 right after instruction */ 473 /* Otherwise, put an int3 for trapping singlestep */ in prepare_singlestep() 623 * int3 single stepping. in prepare_emulation() 636 case 0xcc: /* int3 */ in prepare_emulation() 745 /* Add int3 for single-step or booster jmp */ in arch_copy_kprobe() 790 u8 int3 = INT3_INSN_OPCODE; in arch_arm_kprobe() local 792 text_poke(p->addr, &int3, 1); in arch_arm_kprobe() 794 perf_event_text_poke(p->addr, &p->opcode, 1, &int3, 1); in arch_arm_kprobe() [all …]
|
| /linux/arch/x86/kernel/ |
| H A D | alternative.c | 138 /* Initialize a thunk with the "jmp *reg; int3" instructions. */ 253 * The ITS thunk contains an indirect jump and an int3 instruction so in its_allocate_thunk() 321 * each single-byte NOPs). If @len to fill out is > ASM_NOP_MAX, pad with INT3 and 716 * [CS]{,3} CALL/JMP *%\reg [INT3]* 765 bytes[i++] = 0xcc; /* INT3 */ in emit_indirect() 2035 * 23: cc int3 in decode_fineibt_paranoid() 2237 * Self-test for the INT3 based CALL emulation code. 2239 * This exercises int3_emulate_call() to make sure INT3 pt_regs are set up 2240 * properly and that there is a stack gap between the INT3 frame and the 2242 * stack would corrupt the INT3 IRET frame. [all …]
|
| H A D | ftrace_64.S | 305 int3 309 __stringify(ANNOTATE_UNRET_SAFE; ret; int3), \ 379 int3 383 __stringify(ANNOTATE_UNRET_SAFE; ret; int3), \
|
| H A D | uprobes.c | 64 * cc - int3. SIGTRAP if used in userspace 135 * cc - int3. SIGTRAP if used in userspace 339 "int3\n" 895 "int3\n" 927 * the underlying instruction is as expected - either int3 or call. 952 * Modify multi-byte instructions by using INT3 breakpoints on SMP. 954 * synchronization using INT3 breakpoints and SMP cross-calls. 958 * - Add an INT3 trap to the address that will be patched 962 * - Replace the first byte (INT3) by the first byte of the replacing opcode 968 uprobe_opcode_t int3 = UPROBE_SWBP_INSN; in int3_update() local [all …]
|
| H A D | traps.c | 858 if (kgdb_ll_trap(DIE_INT3, "int3", regs, 0, X86_TRAP_BP, in do_int3() 867 res = notify_die(DIE_INT3, "int3", regs, 0, X86_TRAP_BP, SIGTRAP); in do_int3() 879 do_trap(X86_TRAP_BP, SIGTRAP, "int3", regs, 0, 0, NULL); in do_int3_user() 888 * INT3. in DEFINE_IDTENTRY_RAW() 895 * and therefore can trigger INT3, hence smp_text_poke_int3_handler() must in DEFINE_IDTENTRY_RAW() 897 * nmi_enter() because the INT3 could have been hit in any context in DEFINE_IDTENTRY_RAW() 911 die("int3", regs, 0); in DEFINE_IDTENTRY_RAW()
|
| /linux/arch/mips/sgi-ip22/ |
| H A D | ip22-hpc.c | 49 /* Guiness comes with INT3 which is part of IOC */ in sgihpc_init() 50 sgint = &sgioc->int3; in sgihpc_init()
|
| /linux/tools/testing/selftests/x86/ |
| H A D | nx_stack.c | 20 * Fill the stack with INT3's and then try to execute some of them: 24 * Test doesn't exit SIGSEGV handler after first fault at INT3. 208 * Unreachable, but if _this_ INT3 is ever reached, it's a bug somewhere. in main()
|
| /linux/arch/x86/mm/ |
| H A D | mem_encrypt_boot.S | 71 int3 161 int3
|
| /linux/arch/x86/include/asm/ |
| H A D | text-patching.h | 72 __CASE(INT3); in text_opcode_size() 145 * The INT3 handler in entry_64.S adds a gap between the in int3_emulate_push()
|
| H A D | trapnr.h | 14 #define EVENT_TYPE_SWEXC 6 // INTO, INT3
|
| H A D | static_call.h | 54 __ARCH_DEFINE_STATIC_CALL_TRAMP(name, "ret; int3; nop; nop; nop")
|
| /linux/arch/mips/boot/dts/loongson/ |
| H A D | loongson64g-package.dtsi | 38 <0x00000000>; /* int3 */
|
| H A D | loongson64c-package.dtsi | 41 <0x00000000>; /* int3 */
|
| H A D | loongson64-2k1000.dtsi | 76 <0x00000000>; /* int3 */ 96 <0x00000000>; /* int3 */
|
| H A D | loongson64v_4core_virtio.dts | 40 <0x00000000>; /* int3 */
|
| /linux/arch/m68k/include/asm/ |
| H A D | traps.h | 248 unsigned short int3[2]; member 258 unsigned short int3[4]; member
|
| /linux/Documentation/devicetree/bindings/interrupt-controller/ |
| H A D | loongson,liointc.yaml | 121 <0x00000000>; /* int3 */
|
| /linux/sound/soc/qcom/qdsp6/ |
| H A D | q6prm.h | 43 /* Clock ID for INT3 I2S IBIT */
|
| /linux/arch/x86/platform/efi/ |
| H A D | efi_thunk_64.S | 88 int3
|
| /linux/arch/x86/include/uapi/asm/ |
| H A D | vm86.h | 36 #define VM86_INTx 2 /* int3/int x instruction (ARG = x) */
|
| /linux/arch/mips/include/asm/sgi/ |
| H A D | ip22.h | 68 #define SGI_VERT_IRQ SGINT_LOCAL2 + 0 /* INT3: newport vertical status */
|
| /linux/arch/x86/um/shared/sysdep/ |
| H A D | stub_64.h | 113 __asm("int3"); in trap_myself()
|