treewide: Convert macro and uses of __section(foo) to __section("foo")
Use a more generic form for __section that requires quotes to avoid complications with clang and gcc differences. Remove the quote operator # from compiler_attributes.h __section macro. Convert all unquoted __section(foo) uses to quoted __section("foo"). Also convert __attribute__((section("foo"))) uses to __section("foo") even if the __attribute__ has multiple list entry forms. Conversion done using the script at: https://lore.kernel.org/lkml/75393e5ddc272dc7403de74d645e6c6e0f4e70eb.camel@perches.com/2-convert_section.pl Signed-off-by: Joe Perches <joe@perches.com> Reviewed-by: Nick Desaulniers <ndesaulniers@gooogle.com> Reviewed-by: Miguel Ojeda <ojeda@kernel.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:

committed by
Linus Torvalds

parent
986b9eacb2
commit
33def8498f
@@ -141,7 +141,7 @@ void __warn(const char *file, int line, void *caller, unsigned taint,
|
||||
|
||||
#ifndef WARN_ON_ONCE
|
||||
#define WARN_ON_ONCE(condition) ({ \
|
||||
static bool __section(.data.once) __warned; \
|
||||
static bool __section(".data.once") __warned; \
|
||||
int __ret_warn_once = !!(condition); \
|
||||
\
|
||||
if (unlikely(__ret_warn_once && !__warned)) { \
|
||||
@@ -153,7 +153,7 @@ void __warn(const char *file, int line, void *caller, unsigned taint,
|
||||
#endif
|
||||
|
||||
#define WARN_ONCE(condition, format...) ({ \
|
||||
static bool __section(.data.once) __warned; \
|
||||
static bool __section(".data.once") __warned; \
|
||||
int __ret_warn_once = !!(condition); \
|
||||
\
|
||||
if (unlikely(__ret_warn_once && !__warned)) { \
|
||||
@@ -164,7 +164,7 @@ void __warn(const char *file, int line, void *caller, unsigned taint,
|
||||
})
|
||||
|
||||
#define WARN_TAINT_ONCE(condition, taint, format...) ({ \
|
||||
static bool __section(.data.once) __warned; \
|
||||
static bool __section(".data.once") __warned; \
|
||||
int __ret_warn_once = !!(condition); \
|
||||
\
|
||||
if (unlikely(__ret_warn_once && !__warned)) { \
|
||||
|
@@ -25,7 +25,7 @@ struct pt_regs;
|
||||
*/
|
||||
#define ALLOW_ERROR_INJECTION(fname, _etype) \
|
||||
static struct error_injection_entry __used \
|
||||
__attribute__((__section__("_error_injection_whitelist"))) \
|
||||
__section("_error_injection_whitelist") \
|
||||
_eil_addr_##fname = { \
|
||||
.addr = (unsigned long)fname, \
|
||||
.etype = EI_ETYPE_##_etype, \
|
||||
|
@@ -10,11 +10,11 @@
|
||||
*/
|
||||
# define __NOKPROBE_SYMBOL(fname) \
|
||||
static unsigned long __used \
|
||||
__attribute__((__section__("_kprobe_blacklist"))) \
|
||||
__section("_kprobe_blacklist") \
|
||||
_kbl_addr_##fname = (unsigned long)fname;
|
||||
# define NOKPROBE_SYMBOL(fname) __NOKPROBE_SYMBOL(fname)
|
||||
/* Use this to forbid a kprobes attach on very low level functions */
|
||||
# define __kprobes __attribute__((__section__(".kprobes.text")))
|
||||
# define __kprobes __section(".kprobes.text")
|
||||
# define nokprobe_inline __always_inline
|
||||
#else
|
||||
# define NOKPROBE_SYMBOL(fname)
|
||||
|
Reference in New Issue
Block a user