Home
last modified time | relevance | path

Searched full:int3 (Results 1 – 25 of 155) sorted by relevance

1234567

/kernel/linux/linux-6.6/arch/x86/lib/
Dretpoline.S22 int3
41 … __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg; int3), X86_FEATURE_RETPOLINE_LFENCE, \
86 int3
112 int3
168 int3
204 int3
205 int3
228 int3
283 * As part of the TEST above, RET is the ModRM byte, and INT3 the imm8.
288 * no branch) which is halted by the INT3.
[all …]
/kernel/linux/linux-5.10/arch/x86/lib/
Dretpoline.S37 … __stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg; int3), X86_FEATURE_RETPOLINE_LFENCE, \
109 int3
118 int3
178 * As part of the TEST above, RET is the ModRM byte, and INT3 the imm8.
183 * no branch) which is halted by the INT3.
189 * which will be contained safely by the INT3.
193 int3
203 * INT3 is for SLS protection.
206 int3
234 int3
[all …]
/kernel/linux/linux-5.10/arch/x86/entry/vsyscall/
Dvsyscall_emu_64.S23 int3
29 int3
35 int3
/kernel/linux/linux-6.6/arch/x86/entry/vsyscall/
Dvsyscall_emu_64.S23 int3
29 int3
35 int3
/kernel/linux/linux-6.6/tools/testing/selftests/x86/
Dsigreturn.c93 * An aligned int3 instruction used as a trampoline. Some of the tests
95 * before the int3.
98 ".type int3, @function\n\t"
100 "int3:\n\t"
102 "int3\n\t"
103 ".size int3, . - int3\n\t"
106 extern char int3[4096];
113 * - code16_sel: A 16-bit LDT code segment pointing to int3.
115 * - npcode32_sel: A 32-bit not-present LDT code segment pointing to int3.
178 if ((unsigned long)int3 > (1ULL << 32) - sizeof(int3)) in setup_ldt()
[all …]
Dmov_ss_trap.c12 * - INT $N, INT3, INTO, SYSCALL, SYSENTER: enter the kernel and then
160 printf("[RUN]\tMOV SS; INT3\n"); in main()
161 asm volatile ("mov %[ss], %%ss; int3" :: [ss] "m" (ss)); in main()
166 printf("[RUN]\tMOV SS; CS CS INT3\n"); in main()
167 asm volatile ("mov %[ss], %%ss; .byte 0x2e, 0x2e; int3" :: [ss] "m" (ss)); in main()
169 printf("[RUN]\tMOV SS; CSx14 INT3\n"); in main()
170 asm volatile ("mov %[ss], %%ss; .fill 14,1,0x2e; int3" :: [ss] "m" (ss)); in main()
Dentry_from_vm86.c86 "int3\n\t"
94 "int3\n\t"
116 "int3\n\t"
121 "int3\n\t"
202 /* UMIP -- exit with INT3 unless kernel emulation did not trap #GP */ in do_umip_tests()
321 /* INT3 -- should cause #BP */ in main()
322 do_test(&v86, vmcode_int3 - vmcode, VM86_TRAP, 3, "INT3"); in main()
/kernel/linux/linux-5.10/tools/testing/selftests/x86/
Dsigreturn.c93 * An aligned int3 instruction used as a trampoline. Some of the tests
95 * before the int3.
98 ".type int3, @function\n\t"
100 "int3:\n\t"
102 "int3\n\t"
103 ".size int3, . - int3\n\t"
106 extern char int3[4096];
113 * - code16_sel: A 16-bit LDT code segment pointing to int3.
115 * - npcode32_sel: A 32-bit not-present LDT code segment pointing to int3.
181 if ((unsigned long)int3 > (1ULL << 32) - sizeof(int3)) in setup_ldt()
[all …]
Dmov_ss_trap.c12 * - INT $N, INT3, INTO, SYSCALL, SYSENTER: enter the kernel and then
161 printf("[RUN]\tMOV SS; INT3\n"); in main()
162 asm volatile ("mov %[ss], %%ss; int3" :: [ss] "m" (ss)); in main()
167 printf("[RUN]\tMOV SS; CS CS INT3\n"); in main()
168 asm volatile ("mov %[ss], %%ss; .byte 0x2e, 0x2e; int3" :: [ss] "m" (ss)); in main()
170 printf("[RUN]\tMOV SS; CSx14 INT3\n"); in main()
171 asm volatile ("mov %[ss], %%ss; .fill 14,1,0x2e; int3" :: [ss] "m" (ss)); in main()
Dentry_from_vm86.c86 "int3\n\t"
94 "int3\n\t"
116 "int3\n\t"
121 "int3\n\t"
202 /* UMIP -- exit with INT3 unless kernel emulation did not trap #GP */ in do_umip_tests()
321 /* INT3 -- should cause #BP */ in main()
322 do_test(&v86, vmcode_int3 - vmcode, VM86_TRAP, 3, "INT3"); in main()
/kernel/linux/linux-5.10/arch/x86/kernel/
Dalternative.c933 * Self-test for the INT3 based CALL emulation code.
935 * This exercises int3_emulate_call() to make sure INT3 pt_regs are set up
936 * properly and that there is a stack gap between the INT3 frame and the
938 * stack would corrupt the INT3 IRET frame.
994 * Stick the address of the INT3 instruction into int3_selftest_ip, in int3_selftest()
995 * then trigger the INT3, padded with NOPs to match a CALL instruction in int3_selftest()
998 asm volatile ("1: int3; nop; nop; nop; nop\n\t" in int3_selftest()
1394 * Having observed our INT3 instruction, we now must observe in poke_int3_handler()
1397 * bp_desc.refs = 1 INT3 in poke_int3_handler()
1399 * write INT3 if (bp_desc.refs != 0) in poke_int3_handler()
[all …]
Drelocate_kernel_64.S110 int3
199 int3
220 int3
243 int3
302 int3
Drelocate_kernel_32.S98 int3
168 int3
202 int3
222 int3
287 int3
/kernel/linux/linux-5.10/arch/x86/kernel/kprobes/
Dcore.c224 * by int3. And the instruction at kp->addr is not modified by kprobes in __recover_probed_insn()
375 /* Prepare reljump or int3 right after instruction */
393 /* Otherwise, put an int3 for trapping singlestep */ in prepare_singlestep()
596 * int3 single stepping. in prepare_emulation()
609 case 0xcc: /* int3 */ in prepare_emulation()
716 /* Add int3 for single-step or booster jmp */ in arch_copy_kprobe()
761 u8 int3 = INT3_INSN_OPCODE; in arch_arm_kprobe() local
763 text_poke(p->addr, &int3, 1); in arch_arm_kprobe()
765 perf_event_text_poke(p->addr, &p->opcode, 1, &int3, 1); in arch_arm_kprobe()
770 u8 int3 = INT3_INSN_OPCODE; in arch_disarm_kprobe() local
[all …]
/kernel/linux/linux-6.6/arch/x86/kernel/kprobes/
Dcore.c217 * by int3. And the instruction at kp->addr is not modified by kprobes in __recover_probed_insn()
426 /* Prepare reljump or int3 right after instruction */
444 /* Otherwise, put an int3 for trapping singlestep */ in prepare_singlestep()
612 * int3 single stepping. in prepare_emulation()
625 case 0xcc: /* int3 */ in prepare_emulation()
734 /* Add int3 for single-step or booster jmp */ in arch_copy_kprobe()
779 u8 int3 = INT3_INSN_OPCODE; in arch_arm_kprobe() local
781 text_poke(p->addr, &int3, 1); in arch_arm_kprobe()
783 perf_event_text_poke(p->addr, &p->opcode, 1, &int3, 1); in arch_arm_kprobe()
788 u8 int3 = INT3_INSN_OPCODE; in arch_disarm_kprobe() local
[all …]
/kernel/linux/linux-6.6/arch/x86/kernel/
Drelocate_kernel_32.S98 int3
168 int3
202 int3
222 int3
287 int3
Drelocate_kernel_64.S113 int3
210 int3
231 int3
262 int3
321 int3
Dalternative.c137 /* Initialize a thunk with the "jmp *reg; int3" instructions. */
265 * each single-byte NOPs). If @len to fill out is > ASM_NOP_MAX, pad with INT3 and
832 * The compiler is supposed to EMIT an INT3 after every unconditional in patch_retpoline()
834 * or SLS isn't enabled, we still need an INT3 after indirect JMPs in patch_retpoline()
1664 * Self-test for the INT3 based CALL emulation code.
1666 * This exercises int3_emulate_call() to make sure INT3 pt_regs are set up
1667 * properly and that there is a stack gap between the INT3 frame and the
1669 * stack would corrupt the INT3 IRET frame.
1730 * INT3 padded with NOP to CALL_INSN_SIZE. The int3_exception_nb in int3_selftest()
1735 " int3; nop; nop; nop; nop\n\t" in int3_selftest()
[all …]
/kernel/linux/linux-5.10/arch/x86/include/asm/
Dlinkage.h25 #define RET ret; int3
37 #define ASM_RET "ret; int3\n\t"
/kernel/linux/linux-5.10/arch/mips/sgi-ip22/
Dip22-hpc.c49 /* Guiness comes with INT3 which is part of IOC */ in sgihpc_init()
50 sgint = &sgioc->int3; in sgihpc_init()
/kernel/linux/linux-6.6/arch/mips/sgi-ip22/
Dip22-hpc.c49 /* Guiness comes with INT3 which is part of IOC */ in sgihpc_init()
50 sgint = &sgioc->int3; in sgihpc_init()
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/x86_64/
Ddebug_regs.c27 * NOTE: sw_bp need to be before the cmd here, because int3 is an in guest_code()
31 asm volatile("sw_bp: int3"); in guest_code()
91 /* Test software BPs - int3 */ in main()
99 "INT3: exit %d exception %d rip 0x%llx (should be 0x%llx)", in main()
/kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/
Ddebug_regs.c33 * NOTE: sw_bp need to be before the cmd here, because int3 is an in guest_code()
37 asm volatile("sw_bp: int3"); in guest_code()
103 /* Test software BPs - int3 */ in main()
111 "INT3: exit %d exception %d rip 0x%llx (should be 0x%llx)", in main()
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/interrupt-controller/
Dloongson,liointc.yaml43 - const: int3
88 <0x00000000>; /* int3 */
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/interrupt-controller/
Dloongson,liointc.yaml51 - const: int3
115 <0x00000000>; /* int3 */

1234567