mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-22 20:23:57 +08:00
174b5c9923
Not all parts support trapa #0xff, so use something within the debug trap range that's accessible on all parts. Signed-off-by: Paul Mundt <lethal@linux-sh.org>
59 lines
1.5 KiB
C
59 lines
1.5 KiB
C
#ifndef __ASM_SH_KPROBES_H
|
|
#define __ASM_SH_KPROBES_H
|
|
|
|
#ifdef CONFIG_KPROBES
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/ptrace.h>
|
|
|
|
typedef u16 kprobe_opcode_t;
|
|
#define BREAKPOINT_INSTRUCTION 0xc33a
|
|
|
|
#define MAX_INSN_SIZE 16
|
|
#define MAX_STACK_SIZE 64
|
|
#define MIN_STACK_SIZE(ADDR) (((MAX_STACK_SIZE) < \
|
|
(((unsigned long)current_thread_info()) + THREAD_SIZE - (ADDR))) \
|
|
? (MAX_STACK_SIZE) \
|
|
: (((unsigned long)current_thread_info()) + THREAD_SIZE - (ADDR)))
|
|
|
|
#define regs_return_value(regs) ((regs)->regs[0])
|
|
#define flush_insn_slot(p) do { } while (0)
|
|
#define kretprobe_blacklist_size 0
|
|
|
|
struct kprobe;
|
|
|
|
void arch_remove_kprobe(struct kprobe *);
|
|
void kretprobe_trampoline(void);
|
|
void jprobe_return_end(void);
|
|
|
|
/* Architecture specific copy of original instruction*/
|
|
struct arch_specific_insn {
|
|
/* copy of the original instruction */
|
|
kprobe_opcode_t insn[MAX_INSN_SIZE];
|
|
};
|
|
|
|
struct prev_kprobe {
|
|
struct kprobe *kp;
|
|
unsigned long status;
|
|
};
|
|
|
|
/* per-cpu kprobe control block */
|
|
struct kprobe_ctlblk {
|
|
unsigned long kprobe_status;
|
|
unsigned long jprobe_saved_r15;
|
|
struct pt_regs jprobe_saved_regs;
|
|
kprobe_opcode_t jprobes_stack[MAX_STACK_SIZE];
|
|
struct prev_kprobe prev_kprobe;
|
|
};
|
|
|
|
extern int kprobe_fault_handler(struct pt_regs *regs, int trapnr);
|
|
extern int kprobe_exceptions_notify(struct notifier_block *self,
|
|
unsigned long val, void *data);
|
|
extern int kprobe_handle_illslot(unsigned long pc);
|
|
#else
|
|
|
|
#define kprobe_handle_illslot(pc) (-1)
|
|
|
|
#endif /* CONFIG_KPROBES */
|
|
#endif /* __ASM_SH_KPROBES_H */
|