| /kernel/linux/linux-5.10/arch/x86/lib/ |
| D | retpoline.S | 36 … __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg; int3), X86_FEATURE_RETPOLINE_LFENCE, \ 107 * As part of the TEST above, RET is the ModRM byte, and INT3 the imm8. 112 * no branch) which is halted by the INT3. 118 * which will be contained safely by the INT3. 122 int3 132 * INT3 is for SLS protection. 135 int3
|
| /kernel/linux/linux-5.10/arch/x86/entry/vsyscall/ |
| D | vsyscall_emu_64.S | 23 int3 29 int3 35 int3
|
| /kernel/linux/linux-5.10/tools/testing/selftests/x86/ |
| D | sigreturn.c | 93 * An aligned int3 instruction used as a trampoline. Some of the tests 95 * before the int3. 98 ".type int3, @function\n\t" 100 "int3:\n\t" 102 "int3\n\t" 103 ".size int3, . - int3\n\t" 106 extern char int3[4096]; 113 * - code16_sel: A 16-bit LDT code segment pointing to int3. 115 * - npcode32_sel: A 32-bit not-present LDT code segment pointing to int3. 181 if ((unsigned long)int3 > (1ULL << 32) - sizeof(int3)) in setup_ldt() [all …]
|
| D | mov_ss_trap.c | 12 * - INT $N, INT3, INTO, SYSCALL, SYSENTER: enter the kernel and then 161 printf("[RUN]\tMOV SS; INT3\n"); in main() 162 asm volatile ("mov %[ss], %%ss; int3" :: [ss] "m" (ss)); in main() 167 printf("[RUN]\tMOV SS; CS CS INT3\n"); in main() 168 asm volatile ("mov %[ss], %%ss; .byte 0x2e, 0x2e; int3" :: [ss] "m" (ss)); in main() 170 printf("[RUN]\tMOV SS; CSx14 INT3\n"); in main() 171 asm volatile ("mov %[ss], %%ss; .fill 14,1,0x2e; int3" :: [ss] "m" (ss)); in main()
|
| D | entry_from_vm86.c | 86 "int3\n\t" 94 "int3\n\t" 116 "int3\n\t" 121 "int3\n\t" 202 /* UMIP -- exit with INT3 unless kernel emulation did not trap #GP */ in do_umip_tests() 321 /* INT3 -- should cause #BP */ in main() 322 do_test(&v86, vmcode_int3 - vmcode, VM86_TRAP, 3, "INT3"); in main()
|
| /kernel/linux/linux-4.19/tools/testing/selftests/x86/ |
| D | sigreturn.c | 101 * An aligned int3 instruction used as a trampoline. Some of the tests 103 * before the int3. 106 ".type int3, @function\n\t" 108 "int3:\n\t" 110 "int3\n\t" 111 ".size int3, . - int3\n\t" 114 extern char int3[4096]; 121 * - code16_sel: A 16-bit LDT code segment pointing to int3. 123 * - npcode32_sel: A 32-bit not-present LDT code segment pointing to int3. 189 if ((unsigned long)int3 > (1ULL << 32) - sizeof(int3)) in setup_ldt() [all …]
|
| D | mov_ss_trap.c | 12 * - INT $N, INT3, INTO, SYSCALL, SYSENTER: enter the kernel and then 161 printf("[RUN]\tMOV SS; INT3\n"); in main() 162 asm volatile ("mov %[ss], %%ss; int3" :: [ss] "m" (ss)); in main() 167 printf("[RUN]\tMOV SS; CS CS INT3\n"); in main() 168 asm volatile ("mov %[ss], %%ss; .byte 0x2e, 0x2e; int3" :: [ss] "m" (ss)); in main() 170 printf("[RUN]\tMOV SS; CSx14 INT3\n"); in main() 171 asm volatile ("mov %[ss], %%ss; .fill 14,1,0x2e; int3" :: [ss] "m" (ss)); in main()
|
| D | entry_from_vm86.c | 87 "int3\n\t" 95 "int3\n\t" 117 "int3\n\t" 122 "int3\n\t" 203 /* UMIP -- exit with INT3 unless kernel emulation did not trap #GP */ in do_umip_tests() 322 /* INT3 -- should cause #BP */ in main() 323 do_test(&v86, vmcode_int3 - vmcode, VM86_TRAP, 3, "INT3"); in main()
|
| /kernel/linux/linux-4.19/arch/x86/kernel/ |
| D | alternative.c | 756 * Having observed our INT3 instruction, we now must observe in poke_int3_handler() 759 * in_progress = TRUE INT3 in poke_int3_handler() 761 * write INT3 if (in_progress) in poke_int3_handler() 787 * Modify multi-byte instruction by using int3 breakpoint on SMP. 789 * synchronization using int3 breakpoint. 792 * - add a int3 trap to the address that will be patched 796 * - replace the first byte (int3) by the first byte of 802 unsigned char int3 = 0xcc; in text_poke_bp() local 805 bp_int3_addr = (u8 *)addr + sizeof(int3); in text_poke_bp() 811 * Corresponding read barrier in int3 notifier for making sure the in text_poke_bp() [all …]
|
| /kernel/linux/linux-5.10/arch/x86/kernel/ |
| D | alternative.c | 868 * Self-test for the INT3 based CALL emulation code. 870 * This exercises int3_emulate_call() to make sure INT3 pt_regs are set up 871 * properly and that there is a stack gap between the INT3 frame and the 873 * stack would corrupt the INT3 IRET frame. 929 * Stick the address of the INT3 instruction into int3_selftest_ip, in int3_selftest() 930 * then trigger the INT3, padded with NOPs to match a CALL instruction in int3_selftest() 933 asm volatile ("1: int3; nop; nop; nop; nop\n\t" in int3_selftest() 1328 * Having observed our INT3 instruction, we now must observe in poke_int3_handler() 1331 * bp_desc = desc INT3 in poke_int3_handler() 1333 * write INT3 if (desc) in poke_int3_handler() [all …]
|
| D | relocate_kernel_32.S | 98 int3 168 int3 202 int3 222 int3 287 int3
|
| D | relocate_kernel_64.S | 110 int3 199 int3 220 int3 243 int3 302 int3
|
| /kernel/linux/linux-5.10/arch/x86/include/asm/ |
| D | linkage.h | 25 #define RET ret; int3 37 #define ASM_RET "ret; int3\n\t"
|
| D | text-patching.h | 78 __CASE(INT3); in text_opcode_size() 135 * The int3 handler in entry_64.S adds a gap between the in int3_emulate_push()
|
| /kernel/linux/linux-5.10/arch/x86/kernel/kprobes/ |
| D | opt.c | 328 * a padding INT3 between functions. Let's check that all the in can_optimize() 329 * rest of the bytes are also INT3. in can_optimize() 474 * Replace breakpoints (INT3) with relative jumps (JMP.d32). 479 * the 4 bytes after the INT3 are unused and can now be overwritten. 506 * Replace a relative jump (JMP.d32) with a breakpoint (INT3). 508 * After that, we can restore the 4 bytes after the INT3 to undo what 510 * unused once the INT3 lands.
|
| D | core.c | 244 * by int3. And the instruction at kp->addr is not modified by kprobes in __recover_probed_insn() 517 u8 int3 = INT3_INSN_OPCODE; in arch_arm_kprobe() local 519 text_poke(p->addr, &int3, 1); in arch_arm_kprobe() 521 perf_event_text_poke(p->addr, &p->opcode, 1, &int3, 1); in arch_arm_kprobe() 526 u8 int3 = INT3_INSN_OPCODE; in arch_disarm_kprobe() local 528 perf_event_text_poke(p->addr, &int3, 1, &p->opcode, 1); in arch_disarm_kprobe() 635 /* single step inline if the instruction is an int3 */ in setup_singlestep() 694 * processing. Since int3 and debug trap disables irqs and we clear in kprobe_int3_handler() 729 * Back up over the (now missing) int3 and run in kprobe_int3_handler()
|
| /kernel/linux/linux-4.19/arch/mips/sgi-ip22/ |
| D | ip22-hpc.c | 49 /* Guiness comes with INT3 which is part of IOC */ in sgihpc_init() 50 sgint = &sgioc->int3; in sgihpc_init()
|
| /kernel/linux/linux-5.10/arch/mips/sgi-ip22/ |
| D | ip22-hpc.c | 49 /* Guiness comes with INT3 which is part of IOC */ in sgihpc_init() 50 sgint = &sgioc->int3; in sgihpc_init()
|
| /kernel/linux/linux-5.10/tools/testing/selftests/kvm/x86_64/ |
| D | debug_regs.c | 27 * NOTE: sw_bp need to be before the cmd here, because int3 is an in guest_code() 31 asm volatile("sw_bp: int3"); in guest_code() 91 /* Test software BPs - int3 */ in main() 99 "INT3: exit %d exception %d rip 0x%llx (should be 0x%llx)", in main()
|
| /kernel/linux/linux-5.10/Documentation/devicetree/bindings/interrupt-controller/ |
| D | loongson,liointc.yaml | 43 - const: int3 88 <0x00000000>; /* int3 */
|
| /kernel/linux/linux-5.10/arch/x86/mm/ |
| D | mem_encrypt_boot.S | 71 int3 160 int3
|
| /kernel/linux/linux-5.10/arch/x86/um/ |
| D | stub_32.S | 51 int3
|
| D | stub_64.S | 51 int3
|
| /kernel/linux/linux-4.19/arch/x86/um/ |
| D | stub_32.S | 51 int3
|
| D | stub_64.S | 51 int3
|