2005-04-16 22:20:36 +00:00
|
|
|
#ifndef _LINUX_LINKAGE_H
|
|
|
|
#define _LINUX_LINKAGE_H
|
|
|
|
|
|
|
|
#include <asm/linkage.h>
|
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
#define CPP_ASMLINKAGE extern "C"
|
|
|
|
#else
|
|
|
|
#define CPP_ASMLINKAGE
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef asmlinkage
|
|
|
|
#define asmlinkage CPP_ASMLINKAGE
|
|
|
|
#endif
|
|
|
|
|
2008-01-30 12:33:00 +00:00
|
|
|
#ifndef asmregparm
|
|
|
|
# define asmregparm
|
|
|
|
#endif
|
|
|
|
|
2008-04-11 00:35:23 +00:00
|
|
|
/*
|
|
|
|
* This is used by architectures to keep arguments on the stack
|
|
|
|
* untouched by the compiler by keeping them live until the end.
|
|
|
|
* The argument stack may be owned by the assembly-language
|
|
|
|
* caller, not the callee, and gcc doesn't always understand
|
|
|
|
* that.
|
|
|
|
*
|
|
|
|
* We have the return value, and a maximum of six arguments.
|
|
|
|
*
|
|
|
|
* This should always be followed by a "return ret" for the
|
|
|
|
* protection to work (ie no more work that the compiler might
|
|
|
|
* end up needing stack temporaries for).
|
|
|
|
*/
|
2008-04-11 11:46:54 +00:00
|
|
|
/* Assembly files may be compiled with -traditional .. */
|
|
|
|
#ifndef __ASSEMBLY__
|
2008-04-10 22:37:38 +00:00
|
|
|
#ifndef asmlinkage_protect
|
|
|
|
# define asmlinkage_protect(n, ret, args...) do { } while (0)
|
2005-04-16 22:20:36 +00:00
|
|
|
#endif
|
2008-04-11 11:46:54 +00:00
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
#ifndef __ALIGN
|
|
|
|
#define __ALIGN .align 4,0x90
|
|
|
|
#define __ALIGN_STR ".align 4,0x90"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef __ASSEMBLY__
|
|
|
|
|
|
|
|
#define ALIGN __ALIGN
|
|
|
|
#define ALIGN_STR __ALIGN_STR
|
|
|
|
|
2006-03-24 11:16:17 +00:00
|
|
|
#ifndef ENTRY
|
2005-04-16 22:20:36 +00:00
|
|
|
#define ENTRY(name) \
|
|
|
|
.globl name; \
|
|
|
|
ALIGN; \
|
|
|
|
name:
|
2006-03-24 11:16:17 +00:00
|
|
|
#endif
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2007-10-21 23:41:34 +00:00
|
|
|
#ifndef WEAK
|
|
|
|
#define WEAK(name) \
|
|
|
|
.weak name; \
|
|
|
|
name:
|
|
|
|
#endif
|
|
|
|
|
2005-09-06 22:19:26 +00:00
|
|
|
#define KPROBE_ENTRY(name) \
|
[PATCH] x86: error_code is not safe for kprobes
This patch moves the entry.S:error_entry to .kprobes.text section,
since code marked unsafe for kprobes jumps directly to entry.S::error_entry,
that must be marked unsafe as well.
This patch also moves all the ".previous.text" asm directives to ".previous"
for kprobes section.
AK: Following a similar i386 patch from Chuck Ebbert
AK: Also merged Jeremy's fix in.
+From: Jeremy Fitzhardinge <jeremy@goop.org>
KPROBE_ENTRY does a .section .kprobes.text, and expects its users to
do a .previous at the end of the function.
Unfortunately, if any code within the function switches sections, for
example .fixup, then the .previous ends up putting all subsequent code
into .fixup. Worse, any subsequent .fixup code gets intermingled with
the code its supposed to be fixing (which is also in .fixup). It's
surprising this didn't cause more havok.
The fix is to use .pushsection/.popsection, so this stuff nests
properly. A further cleanup would be to get rid of all
.section/.previous pairs, since they're inherently fragile.
+From: Chuck Ebbert <76306.1226@compuserve.com>
Because code marked unsafe for kprobes jumps directly to
entry.S::error_code, that must be marked unsafe as well.
The easiest way to do that is to move the page fault entry
point to just before error_code and let it inherit the same
section.
Also moved all the ".previous" asm directives for kprobes
sections to column 1 and removed ".text" from them.
Signed-off-by: Chuck Ebbert <76306.1226@compuserve.com>
Signed-off-by: Andi Kleen <ak@suse.de>
2006-09-26 08:52:34 +00:00
|
|
|
.pushsection .kprobes.text, "ax"; \
|
2006-03-24 11:16:17 +00:00
|
|
|
ENTRY(name)
|
2005-09-06 22:19:26 +00:00
|
|
|
|
[PATCH] x86: error_code is not safe for kprobes
This patch moves the entry.S:error_entry to .kprobes.text section,
since code marked unsafe for kprobes jumps directly to entry.S::error_entry,
that must be marked unsafe as well.
This patch also moves all the ".previous.text" asm directives to ".previous"
for kprobes section.
AK: Following a similar i386 patch from Chuck Ebbert
AK: Also merged Jeremy's fix in.
+From: Jeremy Fitzhardinge <jeremy@goop.org>
KPROBE_ENTRY does a .section .kprobes.text, and expects its users to
do a .previous at the end of the function.
Unfortunately, if any code within the function switches sections, for
example .fixup, then the .previous ends up putting all subsequent code
into .fixup. Worse, any subsequent .fixup code gets intermingled with
the code its supposed to be fixing (which is also in .fixup). It's
surprising this didn't cause more havok.
The fix is to use .pushsection/.popsection, so this stuff nests
properly. A further cleanup would be to get rid of all
.section/.previous pairs, since they're inherently fragile.
+From: Chuck Ebbert <76306.1226@compuserve.com>
Because code marked unsafe for kprobes jumps directly to
entry.S::error_code, that must be marked unsafe as well.
The easiest way to do that is to move the page fault entry
point to just before error_code and let it inherit the same
section.
Also moved all the ".previous" asm directives for kprobes
sections to column 1 and removed ".text" from them.
Signed-off-by: Chuck Ebbert <76306.1226@compuserve.com>
Signed-off-by: Andi Kleen <ak@suse.de>
2006-09-26 08:52:34 +00:00
|
|
|
#define KPROBE_END(name) \
|
|
|
|
END(name); \
|
|
|
|
.popsection
|
|
|
|
|
2006-03-24 11:16:17 +00:00
|
|
|
#ifndef END
|
|
|
|
#define END(name) \
|
|
|
|
.size name, .-name
|
|
|
|
#endif
|
|
|
|
|
2008-01-30 12:33:13 +00:00
|
|
|
/* If symbol 'name' is treated as a subroutine (gets called, and returns)
|
|
|
|
* then please use ENDPROC to mark 'name' as STT_FUNC for the benefit of
|
|
|
|
* static analysis tools such as stack depth analyzer.
|
|
|
|
*/
|
2006-03-24 11:16:17 +00:00
|
|
|
#ifndef ENDPROC
|
|
|
|
#define ENDPROC(name) \
|
|
|
|
.type name, @function; \
|
|
|
|
END(name)
|
|
|
|
#endif
|
2005-09-06 22:19:26 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#define NORET_TYPE /**/
|
|
|
|
#define ATTRIB_NORET __attribute__((noreturn))
|
|
|
|
#define NORET_AND noreturn,
|
|
|
|
|
|
|
|
#endif
|