[S390] cleanup program check handler prototypes

Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
This commit is contained in:
Martin Schwidefsky 2011-07-24 10:48:24 +02:00
parent f7850c9288
commit fdb204d1a7
2 changed files with 7 additions and 13 deletions

View file

@ -5,10 +5,9 @@
#include <linux/signal.h> #include <linux/signal.h>
#include <asm/ptrace.h> #include <asm/ptrace.h>
typedef void pgm_check_handler_t(struct pt_regs *, long, unsigned long); void do_protection_exception(struct pt_regs *, long, unsigned long);
extern pgm_check_handler_t *pgm_check_table[128]; void do_dat_exception(struct pt_regs *, long, unsigned long);
pgm_check_handler_t do_protection_exception; void do_asce_exception(struct pt_regs *, long, unsigned long);
pgm_check_handler_t do_dat_exception;
extern int sysctl_userprocess_debug; extern int sysctl_userprocess_debug;

View file

@ -43,14 +43,10 @@
#include <asm/debug.h> #include <asm/debug.h>
#include "entry.h" #include "entry.h"
pgm_check_handler_t *pgm_check_table[128]; void (*pgm_check_table[128])(struct pt_regs *, long, unsigned long);
int show_unhandled_signals; int show_unhandled_signals;
extern pgm_check_handler_t do_protection_exception;
extern pgm_check_handler_t do_dat_exception;
extern pgm_check_handler_t do_asce_exception;
#define stack_pointer ({ void **sp; asm("la %0,0(15)" : "=&d" (sp)); sp; }) #define stack_pointer ({ void **sp; asm("la %0,0(15)" : "=&d" (sp)); sp; })
#ifndef CONFIG_64BIT #ifndef CONFIG_64BIT
@ -489,9 +485,8 @@ static void __kprobes illegal_op(struct pt_regs *regs, long pgm_int_code,
#ifdef CONFIG_MATHEMU #ifdef CONFIG_MATHEMU
asmlinkage void specification_exception(struct pt_regs *regs, void specification_exception(struct pt_regs *regs, long pgm_int_code,
long pgm_int_code, unsigned long trans_exc_code)
unsigned long trans_exc_code)
{ {
__u8 opcode[6]; __u8 opcode[6];
__u16 __user *location = NULL; __u16 __user *location = NULL;
@ -648,7 +643,7 @@ static void space_switch_exception(struct pt_regs *regs, long pgm_int_code,
do_trap(pgm_int_code, SIGILL, "space switch event", regs, &info); do_trap(pgm_int_code, SIGILL, "space switch event", regs, &info);
} }
asmlinkage void __kprobes kernel_stack_overflow(struct pt_regs * regs) void __kprobes kernel_stack_overflow(struct pt_regs * regs)
{ {
bust_spinlocks(1); bust_spinlocks(1);
printk("Kernel stack overflow.\n"); printk("Kernel stack overflow.\n");