cregit-Linux how code gets into the kernel

Release 4.14 arch/sh/include/asm/kprobes.h

/* SPDX-License-Identifier: GPL-2.0 */
#ifndef __ASM_SH_KPROBES_H

#define __ASM_SH_KPROBES_H

#include <asm-generic/kprobes.h>


#define BREAKPOINT_INSTRUCTION	0xc33a

#ifdef CONFIG_KPROBES

#include <linux/types.h>
#include <linux/ptrace.h>


typedef insn_size_t kprobe_opcode_t;


#define MAX_INSN_SIZE 16

#define MAX_STACK_SIZE 64

#define MIN_STACK_SIZE(ADDR) (((MAX_STACK_SIZE) < \
        (((unsigned long)current_thread_info()) + THREAD_SIZE - (ADDR))) \
        ? (MAX_STACK_SIZE) \
        : (((unsigned long)current_thread_info()) + THREAD_SIZE - (ADDR)))


#define flush_insn_slot(p)		do { } while (0)

#define kretprobe_blacklist_size	0

struct kprobe;

void arch_remove_kprobe(struct kprobe *);
void kretprobe_trampoline(void);
void jprobe_return_end(void);

/* Architecture specific copy of original instruction*/

struct arch_specific_insn {
	/* copy of the original instruction */
	
kprobe_opcode_t insn[MAX_INSN_SIZE];
};


struct prev_kprobe {
	
struct kprobe *kp;
	
unsigned long status;
};

/* per-cpu kprobe control block */

struct kprobe_ctlblk {
	
unsigned long kprobe_status;
	
unsigned long jprobe_saved_r15;
	
struct pt_regs jprobe_saved_regs;
	
kprobe_opcode_t jprobes_stack[MAX_STACK_SIZE];
	
struct prev_kprobe prev_kprobe;
};

extern int kprobe_fault_handler(struct pt_regs *regs, int trapnr);
extern int kprobe_exceptions_notify(struct notifier_block *self,
				    unsigned long val, void *data);
extern int kprobe_handle_illslot(unsigned long pc);
#else


#define kprobe_handle_illslot(pc)	(-1)

#endif /* CONFIG_KPROBES */
#endif /* __ASM_SH_KPROBES_H */

Overall Contributors

PersonTokensPropCommitsCommitProp
Christopher SMITH16488.17%120.00%
Paul Mundt147.53%240.00%
Luis R. Rodriguez73.76%120.00%
Greg Kroah-Hartman10.54%120.00%
Total186100.00%5100.00%
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.