eaaaeef392
This follows the x86/ppc changes for kprobe-based event tracing on sh. While kprobes is only supported on 32-bit sh, we provide the API for HAVE_REGS_AND_STACK_ACCESS_API for both 32 and 64-bit. Signed-off-by: Paul Mundt <lethal@linux-sh.org>
58 lines
1.4 KiB
C
58 lines
1.4 KiB
C
#ifndef __ASM_SH_KPROBES_H
|
|
#define __ASM_SH_KPROBES_H
|
|
|
|
#ifdef CONFIG_KPROBES
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/ptrace.h>
|
|
|
|
typedef insn_size_t kprobe_opcode_t;
|
|
#define BREAKPOINT_INSTRUCTION 0xc33a
|
|
|
|
#define MAX_INSN_SIZE 16
|
|
#define MAX_STACK_SIZE 64
|
|
#define MIN_STACK_SIZE(ADDR) (((MAX_STACK_SIZE) < \
|
|
(((unsigned long)current_thread_info()) + THREAD_SIZE - (ADDR))) \
|
|
? (MAX_STACK_SIZE) \
|
|
: (((unsigned long)current_thread_info()) + THREAD_SIZE - (ADDR)))
|
|
|
|
#define flush_insn_slot(p) do { } while (0)
|
|
#define kretprobe_blacklist_size 0
|
|
|
|
struct kprobe;
|
|
|
|
void arch_remove_kprobe(struct kprobe *);
|
|
void kretprobe_trampoline(void);
|
|
void jprobe_return_end(void);
|
|
|
|
/* Architecture specific copy of original instruction*/
|
|
struct arch_specific_insn {
|
|
/* copy of the original instruction */
|
|
kprobe_opcode_t insn[MAX_INSN_SIZE];
|
|
};
|
|
|
|
struct prev_kprobe {
|
|
struct kprobe *kp;
|
|
unsigned long status;
|
|
};
|
|
|
|
/* per-cpu kprobe control block */
|
|
struct kprobe_ctlblk {
|
|
unsigned long kprobe_status;
|
|
unsigned long jprobe_saved_r15;
|
|
struct pt_regs jprobe_saved_regs;
|
|
kprobe_opcode_t jprobes_stack[MAX_STACK_SIZE];
|
|
struct prev_kprobe prev_kprobe;
|
|
};
|
|
|
|
extern int kprobe_fault_handler(struct pt_regs *regs, int trapnr);
|
|
extern int kprobe_exceptions_notify(struct notifier_block *self,
|
|
unsigned long val, void *data);
|
|
extern int kprobe_handle_illslot(unsigned long pc);
|
|
#else
|
|
|
|
#define kprobe_handle_illslot(pc) (-1)
|
|
|
|
#endif /* CONFIG_KPROBES */
|
|
#endif /* __ASM_SH_KPROBES_H */
|