Linux Kernel
3.7.1
|
#include <linux/ptrace.h>
#include <linux/sched.h>
#include <linux/export.h>
#include <asm/syscall.h>
Go to the source code of this file.
Functions | |
int | task_current_syscall (struct task_struct *target, long *callno, unsigned long args[6], unsigned int maxargs, unsigned long *sp, unsigned long *pc) |
EXPORT_SYMBOL_GPL (task_current_syscall) | |
EXPORT_SYMBOL_GPL | ( | task_current_syscall | ) |
int task_current_syscall | ( | struct task_struct * | target, |
long * | callno, | ||
unsigned long | args[6], | ||
unsigned int | maxargs, | ||
unsigned long * | sp, | ||
unsigned long * | pc | ||
) |
task_current_syscall - Discover what a blocked task is doing. : thread to examine : filled with system call number or -1 : filled with system call arguments : number of elements in to fill : filled with user stack pointer : filled with user PC
If is blocked in a system call, returns zero with * set to the the call's number and filled in with its arguments. Registers not used for system call arguments may not be available and it is not kosher to use &struct user_regset calls while the system call is still in progress. Note we may get this result if has finished its system call but not yet returned to user mode, such as when it's stopped for signal handling or syscall exit tracing.
If is blocked in the kernel during a fault or exception, returns zero with * set to -1 and does not fill in . If so, it's now safe to examine using &struct user_regset get() calls as long as we're sure won't return to user mode.
Returns -EAGAIN if does not remain blocked.
Returns -EINVAL if is too large (maximum is six).