/linux-6.12.1/arch/x86/lib/ |
D | retpoline.S | 22 int3 41 … __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg; int3), X86_FEATURE_RETPOLINE_LFENCE, \ 86 int3 112 int3 175 int3 211 int3 212 int3 234 int3 290 * As part of the TEST above, RET is the ModRM byte, and INT3 the imm8. 295 * no branch) which is halted by the INT3. [all …]
|
/linux-6.12.1/tools/testing/selftests/x86/ |
D | sigreturn.c | 93 * An aligned int3 instruction used as a trampoline. Some of the tests 95 * before the int3. 98 ".type int3, @function\n\t" 100 "int3:\n\t" 102 "int3\n\t" 103 ".size int3, . - int3\n\t" 106 extern char int3[4096]; 113 * - code16_sel: A 16-bit LDT code segment pointing to int3. 115 * - npcode32_sel: A 32-bit not-present LDT code segment pointing to int3. 178 if ((unsigned long)int3 > (1ULL << 32) - sizeof(int3)) in setup_ldt() [all …]
|
D | mov_ss_trap.c | 12 * - INT $N, INT3, INTO, SYSCALL, SYSENTER: enter the kernel and then 160 printf("[RUN]\tMOV SS; INT3\n"); in main() 161 asm volatile ("mov %[ss], %%ss; int3" :: [ss] "m" (ss)); in main() 166 printf("[RUN]\tMOV SS; CS CS INT3\n"); in main() 167 asm volatile ("mov %[ss], %%ss; .byte 0x2e, 0x2e; int3" :: [ss] "m" (ss)); in main() 169 printf("[RUN]\tMOV SS; CSx14 INT3\n"); in main() 170 asm volatile ("mov %[ss], %%ss; .fill 14,1,0x2e; int3" :: [ss] "m" (ss)); in main()
|
D | entry_from_vm86.c | 86 "int3\n\t" 94 "int3\n\t" 116 "int3\n\t" 121 "int3\n\t" 202 /* UMIP -- exit with INT3 unless kernel emulation did not trap #GP */ in do_umip_tests() 321 /* INT3 -- should cause #BP */ in main() 322 do_test(&v86, vmcode_int3 - vmcode, VM86_TRAP, 3, "INT3"); in main()
|
D | nx_stack.c | 20 * Fill the stack with INT3's and then try to execute some of them: 24 * Test doesn't exit SIGSEGV handler after first fault at INT3. 208 * Unreachable, but if _this_ INT3 is ever reached, it's a bug somewhere. in main()
|
/linux-6.12.1/arch/x86/entry/vsyscall/ |
D | vsyscall_emu_64.S | 23 int3 29 int3 35 int3
|
/linux-6.12.1/arch/x86/kernel/kprobes/ |
D | core.c | 228 * by int3. And the instruction at kp->addr is not modified by kprobes in __recover_probed_insn() 277 /* INT3 / INT n / INTO / INT1 */ in is_exception_insn() 464 /* Prepare reljump or int3 right after instruction */ 482 /* Otherwise, put an int3 for trapping singlestep */ in prepare_singlestep() 650 * int3 single stepping. in prepare_emulation() 663 case 0xcc: /* int3 */ in prepare_emulation() 772 /* Add int3 for single-step or booster jmp */ in arch_copy_kprobe() 817 u8 int3 = INT3_INSN_OPCODE; in arch_arm_kprobe() local 819 text_poke(p->addr, &int3, 1); in arch_arm_kprobe() 821 perf_event_text_poke(p->addr, &p->opcode, 1, &int3, 1); in arch_arm_kprobe() [all …]
|
D | opt.c | 466 * Replace breakpoints (INT3) with relative jumps (JMP.d32). 471 * the 4 bytes after the INT3 are unused and can now be overwritten. 498 * Replace a relative jump (JMP.d32) with a breakpoint (INT3). 500 * After that, we can restore the 4 bytes after the INT3 to undo what 502 * unused once the INT3 lands.
|
/linux-6.12.1/arch/x86/kernel/ |
D | relocate_kernel_32.S | 98 int3 168 int3 202 int3 222 int3 287 int3
|
D | alternative.c | 147 * each single-byte NOPs). If @len to fill out is > ASM_NOP_MAX, pad with INT3 and 708 * The compiler is supposed to EMIT an INT3 after every unconditional in patch_retpoline() 710 * or MITIGATION_SLS isn't enabled, we still need an INT3 after in patch_retpoline() 1555 * Self-test for the INT3 based CALL emulation code. 1557 * This exercises int3_emulate_call() to make sure INT3 pt_regs are set up 1558 * properly and that there is a stack gap between the INT3 frame and the 1560 * stack would corrupt the INT3 IRET frame. 1621 * INT3 padded with NOP to CALL_INSN_SIZE. The int3_exception_nb in int3_selftest() 1626 " int3; nop; nop; nop; nop\n\t" in int3_selftest() 2158 * Having observed our INT3 instruction, we now must observe in poke_int3_handler() [all …]
|
D | relocate_kernel_64.S | 114 int3 211 int3 232 int3 256 int3 318 int3
|
D | ftrace_64.S | 302 int3 306 __stringify(ANNOTATE_UNRET_SAFE; ret; int3), \ 373 int3 377 __stringify(ANNOTATE_UNRET_SAFE; ret; int3), \
|
D | traps.c | 759 if (kgdb_ll_trap(DIE_INT3, "int3", regs, 0, X86_TRAP_BP, in do_int3() 768 res = notify_die(DIE_INT3, "int3", regs, 0, X86_TRAP_BP, SIGTRAP); in do_int3() 780 do_trap(X86_TRAP_BP, SIGTRAP, "int3", regs, 0, 0, NULL); in do_int3_user() 789 * INT3. in DEFINE_IDTENTRY_RAW() 796 * and therefore can trigger INT3, hence poke_int3_handler() must in DEFINE_IDTENTRY_RAW() 798 * nmi_enter() because the INT3 could have been hit in any context in DEFINE_IDTENTRY_RAW() 812 die("int3", regs, 0); in DEFINE_IDTENTRY_RAW()
|
/linux-6.12.1/tools/testing/selftests/kvm/x86_64/ |
D | debug_regs.c | 33 * NOTE: sw_bp need to be before the cmd here, because int3 is an in guest_code() 37 asm volatile("sw_bp: int3"); in guest_code() 106 /* Test software BPs - int3 */ in main() 114 "INT3: exit %d exception %d rip 0x%llx (should be 0x%llx)", in main()
|
/linux-6.12.1/arch/mips/sgi-ip22/ |
D | ip22-hpc.c | 49 /* Guiness comes with INT3 which is part of IOC */ in sgihpc_init() 50 sgint = &sgioc->int3; in sgihpc_init()
|
/linux-6.12.1/arch/x86/include/asm/ |
D | linkage.h | 47 #define RET ret; int3 59 #define ASM_RET "ret; int3\n\t"
|
D | text-patching.h | 71 __CASE(INT3); in text_opcode_size() 144 * The int3 handler in entry_64.S adds a gap between the in int3_emulate_push()
|
D | trapnr.h | 14 #define EVENT_TYPE_SWEXC 6 // INTO, INT3
|
D | static_call.h | 54 __ARCH_DEFINE_STATIC_CALL_TRAMP(name, "ret; int3; nop; nop; nop")
|
/linux-6.12.1/arch/x86/mm/ |
D | mem_encrypt_boot.S | 71 int3 160 int3
|
/linux-6.12.1/drivers/pinctrl/ |
D | pinctrl-pic32.c | 279 FUNCTION(INT3, input0), 389 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 13), 539 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 8), 644 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 5), 671 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 6), 749 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 10), 875 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 7), 926 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 0), 1028 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 14), 1170 PIC32_PINCTRL_FUNCTION(INT3, INT3R, 11), [all …]
|
/linux-6.12.1/arch/mips/boot/dts/loongson/ |
D | loongson64g-package.dtsi | 38 <0x00000000>; /* int3 */
|
D | loongson64c-package.dtsi | 41 <0x00000000>; /* int3 */
|
D | loongson64-2k1000.dtsi | 76 <0x00000000>; /* int3 */ 96 <0x00000000>; /* int3 */
|
/linux-6.12.1/arch/m68k/include/asm/ |
D | traps.h | 248 unsigned short int3[2]; member 258 unsigned short int3[4]; member
|