From: "Dmitry V. Levin" <ldv@altlinux.org> To: Arnd Bergmann <arnd@arndb.de>, Oleg Nesterov <oleg@redhat.com>, Geert Uytterhoeven <geert@linux-m68k.org> Cc: Elvira Khabirova <lineprinter@altlinux.org>, Eugene Syromyatnikov <esyr@redhat.com>, Andy Lutomirski <luto@kernel.org>, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v7 01/22] asm-generic/syscall.h: prepare for inclusion by other files Date: Mon, 7 Jan 2019 05:52:36 +0300 [thread overview] Message-ID: <20190107025236.GA1207@altlinux.org> (raw) In-Reply-To: 20190107025101.GA1182@altlinux.org From the very beginning and up to now asm-generic/syscall.h is used for documentation purposes only, it could not be included by arch-specific asm/syscall.h files due to static/non-static conflict of function prototypes. Cc: Arnd Bergmann <arnd@arndb.de> Cc: Oleg Nesterov <oleg@redhat.com> Cc: Geert Uytterhoeven <geert@linux-m68k.org> Cc: Elvira Khabirova <lineprinter@altlinux.org> Cc: Eugene Syromyatnikov <esyr@redhat.com> Cc: linux-arch@vger.kernel.org Signed-off-by: Dmitry V. Levin <ldv@altlinux.org> --- Notes: v7: unchanged v6: initial revision include/asm-generic/syscall.h | 39 +++++++++++++++++++++-------------- 1 file changed, 24 insertions(+), 15 deletions(-) diff --git a/include/asm-generic/syscall.h b/include/asm-generic/syscall.h index 0c938a4354f6..9863a5f8fbe8 100644 --- a/include/asm-generic/syscall.h +++ b/include/asm-generic/syscall.h @@ -16,8 +16,8 @@ * cannot return to user mode while we are looking at it. */ -#ifndef _ASM_SYSCALL_H -#define _ASM_SYSCALL_H 1 +#ifndef _ASM_GENERIC_SYSCALL_H +#define _ASM_GENERIC_SYSCALL_H 1 struct task_struct; struct pt_regs; @@ -38,7 +38,8 @@ struct pt_regs; * * It's only valid to call this when @task is known to be blocked. */ -int syscall_get_nr(struct task_struct *task, struct pt_regs *regs); +static int +syscall_get_nr(struct task_struct *task, struct pt_regs *regs); /** * syscall_rollback - roll back registers after an aborted system call @@ -56,7 +57,8 @@ int syscall_get_nr(struct task_struct *task, struct pt_regs *regs); * system call instruction. This may not be the same as what the * register state looked like at system call entry tracing. */ -void syscall_rollback(struct task_struct *task, struct pt_regs *regs); +static void +syscall_rollback(struct task_struct *task, struct pt_regs *regs); /** * syscall_get_error - check result of traced system call @@ -68,7 +70,8 @@ void syscall_rollback(struct task_struct *task, struct pt_regs *regs); * It's only valid to call this when @task is stopped for tracing on exit * from a system call, due to %TIF_SYSCALL_TRACE or %TIF_SYSCALL_AUDIT. */ -long syscall_get_error(struct task_struct *task, struct pt_regs *regs); +static long +syscall_get_error(struct task_struct *task, struct pt_regs *regs); /** * syscall_get_return_value - get the return value of a traced system call @@ -81,7 +84,8 @@ long syscall_get_error(struct task_struct *task, struct pt_regs *regs); * It's only valid to call this when @task is stopped for tracing on exit * from a system call, due to %TIF_SYSCALL_TRACE or %TIF_SYSCALL_AUDIT. */ -long syscall_get_return_value(struct task_struct *task, struct pt_regs *regs); +static long +syscall_get_return_value(struct task_struct *task, struct pt_regs *regs); /** * syscall_set_return_value - change the return value of a traced system call @@ -98,8 +102,9 @@ long syscall_get_return_value(struct task_struct *task, struct pt_regs *regs); * It's only valid to call this when @task is stopped for tracing on exit * from a system call, due to %TIF_SYSCALL_TRACE or %TIF_SYSCALL_AUDIT. */ -void syscall_set_return_value(struct task_struct *task, struct pt_regs *regs, - int error, long val); +static void +syscall_set_return_value(struct task_struct *task, struct pt_regs *regs, + int error, long val); /** * syscall_get_arguments - extract system call parameter values @@ -118,8 +123,9 @@ void syscall_set_return_value(struct task_struct *task, struct pt_regs *regs, * It's invalid to call this with @i + @n > 6; we only support system calls * taking up to 6 arguments. */ -void syscall_get_arguments(struct task_struct *task, struct pt_regs *regs, - unsigned int i, unsigned int n, unsigned long *args); +static void +syscall_get_arguments(struct task_struct *task, struct pt_regs *regs, + unsigned int i, unsigned int n, unsigned long *args); /** * syscall_set_arguments - change system call parameter value @@ -138,9 +144,10 @@ void syscall_get_arguments(struct task_struct *task, struct pt_regs *regs, * It's invalid to call this with @i + @n > 6; we only support system calls * taking up to 6 arguments. */ -void syscall_set_arguments(struct task_struct *task, struct pt_regs *regs, - unsigned int i, unsigned int n, - const unsigned long *args); +static void +syscall_set_arguments(struct task_struct *task, struct pt_regs *regs, + unsigned int i, unsigned int n, + const unsigned long *args); /** * syscall_get_arch - return the AUDIT_ARCH for the current system call @@ -153,5 +160,7 @@ void syscall_set_arguments(struct task_struct *task, struct pt_regs *regs, * Architectures which permit CONFIG_HAVE_ARCH_SECCOMP_FILTER must * provide an implementation of this. */ -int syscall_get_arch(void); -#endif /* _ASM_SYSCALL_H */ +static int +syscall_get_arch(void); + +#endif /* _ASM_GENERIC_SYSCALL_H */ -- ldv
WARNING: multiple messages have this Message-ID (diff)
From: "Dmitry V. Levin" <ldv@altlinux.org> To: Arnd Bergmann <arnd@arndb.de>, Oleg Nesterov <oleg@redhat.com>, Geert Uytterhoeven <geert@linux-m68k.org> Cc: Elvira Khabirova <lineprinter@altlinux.org>, Eugene Syromyatnikov <esyr@redhat.com>, Andy Lutomirski <luto@kernel.org>, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v7 01/22] asm-generic/syscall.h: prepare for inclusion by other files Date: Mon, 7 Jan 2019 05:52:36 +0300 [thread overview] Message-ID: <20190107025236.GA1207@altlinux.org> (raw) Message-ID: <20190107025236.XtZcB4Famz2vGJJK3hlXOc6Vgfmlm7145IkeYVI7EBk@z> (raw) In-Reply-To: 20190107025101.GA1182@altlinux.org
next prev parent reply other threads:[~2019-01-07 2:52 UTC|newest] Thread overview: 54+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-01-07 2:51 [PATCH v7 00/22] ptrace: add PTRACE_GET_SYSCALL_INFO request Dmitry V. Levin 2019-01-07 2:51 ` Dmitry V. Levin 2019-01-07 2:51 ` Dmitry V. Levin 2019-01-07 2:51 ` [OpenRISC] " Dmitry V. Levin 2019-01-07 2:51 ` Dmitry V. Levin 2019-01-07 2:51 ` Dmitry V. Levin 2019-01-07 2:51 ` Dmitry V. Levin 2019-01-07 2:52 ` Dmitry V. Levin [this message] 2019-01-07 2:52 ` [PATCH v7 01/22] asm-generic/syscall.h: prepare for inclusion by other files Dmitry V. Levin 2019-01-07 2:52 ` [PATCH v7 02/22] asm-generic/syscall.h: turn syscall_[gs]et_arguments into wrappers Dmitry V. Levin 2019-01-07 2:52 ` [PATCH v7 03/22] alpha: define remaining syscall_get_* functions Dmitry V. Levin 2019-01-07 7:25 ` kbuild test robot 2019-01-07 2:53 ` [PATCH v7 04/22] Move EM_ARCOMPACT and EM_ARCV2 to uapi/linux/elf-em.h Dmitry V. Levin 2019-01-07 2:53 ` Dmitry V. Levin 2019-01-07 2:53 ` [PATCH v7 05/22] arc: define syscall_get_arch() Dmitry V. Levin 2019-01-07 2:53 ` Dmitry V. Levin 2019-01-07 2:53 ` [PATCH v7 06/22] c6x: " Dmitry V. Levin 2019-01-07 2:53 ` [PATCH v7 07/22] h8300: define remaining syscall_get_* functions Dmitry V. Levin 2019-01-07 2:53 ` [PATCH v7 08/22] Move EM_HEXAGON to uapi/linux/elf-em.h Dmitry V. Levin 2019-01-07 2:53 ` [PATCH v7 09/22] hexagon: define remaining syscall_get_* functions Dmitry V. Levin 2019-01-07 2:53 ` [PATCH v7 10/22] Move EM_NDS32 to uapi/linux/elf-em.h Dmitry V. Levin 2019-01-07 2:53 ` [PATCH v7 11/22] nds32: define syscall_get_arch() Dmitry V. Levin 2019-01-07 2:53 ` [PATCH v7 12/22] nios2: " Dmitry V. Levin 2019-01-07 2:54 ` [PATCH v7 13/22] m68k: add asm/syscall.h Dmitry V. Levin 2019-01-07 2:54 ` [PATCH v7 14/22] mips: define syscall_get_error() Dmitry V. Levin 2019-01-07 2:54 ` [PATCH v7 15/22] parisc: " Dmitry V. Levin 2019-02-28 19:38 ` Dmitry V. Levin 2019-02-28 21:39 ` Helge Deller 2019-01-07 2:54 ` [PATCH v7 16/22] powerpc: " Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin 2019-02-28 19:39 ` Dmitry V. Levin 2019-02-28 19:39 ` Dmitry V. Levin 2019-01-07 2:54 ` [PATCH v7 17/22] riscv: define syscall_get_arch() Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin 2019-01-07 2:54 ` [PATCH v7 18/22] Move EM_UNICORE to uapi/linux/elf-em.h Dmitry V. Levin 2019-01-07 2:54 ` [PATCH v7 19/22] unicore32: add asm/syscall.h Dmitry V. Levin 2019-01-07 2:54 ` [PATCH v7 20/22] syscall_get_arch: add "struct task_struct *" argument Dmitry V. Levin 2019-01-07 2:54 ` [OpenRISC] " Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin 2019-01-07 2:54 ` [PATCH v7 21/22] ptrace: add PTRACE_GET_SYSCALL_INFO request Dmitry V. Levin 2019-01-07 2:54 ` Dmitry V. Levin [not found] ` <20190107025455.GU1207-u2l5PoMzF/Vg9hUCZPvPmw@public.gmane.org> 2019-01-07 6:21 ` kbuild test robot 2019-01-07 12:54 ` [PATCH] nds32: fix asm/syscall.h Dmitry V. Levin 2019-02-28 21:58 ` Dmitry V. Levin 2019-01-07 7:05 ` [PATCH v7 21/22] ptrace: add PTRACE_GET_SYSCALL_INFO request kbuild test robot 2019-01-07 14:58 ` Dmitry V. Levin 2019-01-07 2:55 ` [PATCH v7 22/22] selftests/ptrace: add a test case for PTRACE_GET_SYSCALL_INFO Dmitry V. Levin 2019-01-07 2:55 ` Dmitry V. Levin 2019-01-07 2:55 ` ldv
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20190107025236.GA1207@altlinux.org \ --to=ldv@altlinux.org \ --cc=arnd@arndb.de \ --cc=esyr@redhat.com \ --cc=geert@linux-m68k.org \ --cc=lineprinter@altlinux.org \ --cc=linux-arch@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=luto@kernel.org \ --cc=oleg@redhat.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.