Andreas Schwab 8474ba7419 m68k: Define asmlinkage_protect
Make sure the compiler does not modify arguments of syscall functions.
This can happen if the compiler generates a tailcall to another
function.  For example, without asmlinkage_protect sys_openat is compiled
into this function:

sys_openat:
	clr.l %d0
	move.w 18(%sp),%d0
	move.l %d0,16(%sp)
	jbra do_sys_open

Note how the fourth argument is modified in place, modifying the register
%d4 that gets restored from this stack slot when the function returns to
user-space.  The caller may expect the register to be unmodified across
system calls.

Signed-off-by: Andreas Schwab <schwab@linux-m68k.org>
Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
Cc: stable@vger.kernel.org
2015-09-28 09:59:45 +02:00
..
2014-04-18 14:20:37 +02:00
2011-12-10 19:52:48 +01:00
2011-03-31 11:26:23 -03:00
2015-05-13 10:55:42 +02:00
2013-08-14 11:46:30 +02:00
2013-02-26 02:46:08 -05:00
2013-09-26 09:54:16 +02:00
2013-11-13 20:21:46 +01:00
2015-08-25 09:59:19 +02:00
2013-12-08 11:01:47 +01:00
2015-09-28 09:59:45 +02:00
2014-09-29 09:56:19 +10:00
2011-03-31 11:26:23 -03:00
2011-12-10 19:52:47 +01:00
2011-12-10 19:52:47 +01:00
2011-04-10 17:01:05 +02:00
2011-04-10 17:01:05 +02:00
2013-03-04 11:08:50 +10:00
2015-03-15 10:23:30 +01:00
2011-03-16 19:10:41 +01:00
2015-01-13 15:24:03 +02:00
2014-06-06 16:08:11 -07:00
2012-03-28 18:30:02 +01:00
2015-01-13 15:23:28 +02:00
2015-09-28 09:59:44 +02:00
2012-04-22 20:16:50 +02:00