aboutsummaryrefslogtreecommitdiffstats
path: root/arch/openrisc/kernel/traps.c
diff options
context:
space:
mode:
authorEric W. Biederman <ebiederm@xmission.com>2019-05-23 12:04:24 -0400
committerEric W. Biederman <ebiederm@xmission.com>2019-05-29 10:31:43 -0400
commit2e1661d2673667d886cd40ad9f414cb6db48d8da (patch)
tree5a2c32eb8a5c575bfb5c7013f5d9d427f5c06c34 /arch/openrisc/kernel/traps.c
parent91ca180dbdd687d45fe4aab055b02d29c91b90df (diff)
signal: Remove the task parameter from force_sig_fault
As synchronous exceptions really only make sense against the current task (otherwise how are you synchronous) remove the task parameter from from force_sig_fault to make it explicit that is what is going on. The two known exceptions that deliver a synchronous exception to a stopped ptraced task have already been changed to force_sig_fault_to_task. The callers have been changed with the following emacs regular expression (with obvious variations on the architectures that take more arguments) to avoid typos: force_sig_fault[(]\([^,]+\)[,]\([^,]+\)[,]\([^,]+\)[,]\W+current[)] -> force_sig_fault(\1,\2,\3) Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
Diffstat (limited to 'arch/openrisc/kernel/traps.c')
-rw-r--r--arch/openrisc/kernel/traps.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/arch/openrisc/kernel/traps.c b/arch/openrisc/kernel/traps.c
index 0fad2e46ff43..a4cc6e59c57f 100644
--- a/arch/openrisc/kernel/traps.c
+++ b/arch/openrisc/kernel/traps.c
@@ -249,7 +249,7 @@ void __init trap_init(void)
249 249
250asmlinkage void do_trap(struct pt_regs *regs, unsigned long address) 250asmlinkage void do_trap(struct pt_regs *regs, unsigned long address)
251{ 251{
252 force_sig_fault(SIGTRAP, TRAP_TRACE, (void __user *)address, current); 252 force_sig_fault(SIGTRAP, TRAP_TRACE, (void __user *)address);
253 253
254 regs->pc += 4; 254 regs->pc += 4;
255} 255}
@@ -258,7 +258,7 @@ asmlinkage void do_unaligned_access(struct pt_regs *regs, unsigned long address)
258{ 258{
259 if (user_mode(regs)) { 259 if (user_mode(regs)) {
260 /* Send a SIGBUS */ 260 /* Send a SIGBUS */
261 force_sig_fault(SIGBUS, BUS_ADRALN, (void __user *)address, current); 261 force_sig_fault(SIGBUS, BUS_ADRALN, (void __user *)address);
262 } else { 262 } else {
263 printk("KERNEL: Unaligned Access 0x%.8lx\n", address); 263 printk("KERNEL: Unaligned Access 0x%.8lx\n", address);
264 show_registers(regs); 264 show_registers(regs);
@@ -271,7 +271,7 @@ asmlinkage void do_bus_fault(struct pt_regs *regs, unsigned long address)
271{ 271{
272 if (user_mode(regs)) { 272 if (user_mode(regs)) {
273 /* Send a SIGBUS */ 273 /* Send a SIGBUS */
274 force_sig_fault(SIGBUS, BUS_ADRERR, (void __user *)address, current); 274 force_sig_fault(SIGBUS, BUS_ADRERR, (void __user *)address);
275 } else { /* Kernel mode */ 275 } else { /* Kernel mode */
276 printk("KERNEL: Bus error (SIGBUS) 0x%.8lx\n", address); 276 printk("KERNEL: Bus error (SIGBUS) 0x%.8lx\n", address);
277 show_registers(regs); 277 show_registers(regs);
@@ -466,7 +466,7 @@ asmlinkage void do_illegal_instruction(struct pt_regs *regs,
466 466
467 if (user_mode(regs)) { 467 if (user_mode(regs)) {
468 /* Send a SIGILL */ 468 /* Send a SIGILL */
469 force_sig_fault(SIGILL, ILL_ILLOPC, (void __user *)address, current); 469 force_sig_fault(SIGILL, ILL_ILLOPC, (void __user *)address);
470 } else { /* Kernel mode */ 470 } else { /* Kernel mode */
471 printk("KERNEL: Illegal instruction (SIGILL) 0x%.8lx\n", 471 printk("KERNEL: Illegal instruction (SIGILL) 0x%.8lx\n",
472 address); 472 address);