~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/lib/syscall.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 #include <linux/ptrace.h>
  3 #include <linux/sched.h>
  4 #include <linux/sched/task_stack.h>
  5 #include <linux/export.h>
  6 #include <asm/syscall.h>
  7 
  8 static int collect_syscall(struct task_struct *target, struct syscall_info *info)
  9 {
 10         unsigned long args[6] = { };
 11         struct pt_regs *regs;
 12 
 13         if (!try_get_task_stack(target)) {
 14                 /* Task has no stack, so the task isn't in a syscall. */
 15                 memset(info, 0, sizeof(*info));
 16                 info->data.nr = -1;
 17                 return 0;
 18         }
 19 
 20         regs = task_pt_regs(target);
 21         if (unlikely(!regs)) {
 22                 put_task_stack(target);
 23                 return -EAGAIN;
 24         }
 25 
 26         info->sp = user_stack_pointer(regs);
 27         info->data.instruction_pointer = instruction_pointer(regs);
 28 
 29         info->data.nr = syscall_get_nr(target, regs);
 30         if (info->data.nr != -1L)
 31                 syscall_get_arguments(target, regs, args);
 32 
 33         info->data.args[0] = args[0];
 34         info->data.args[1] = args[1];
 35         info->data.args[2] = args[2];
 36         info->data.args[3] = args[3];
 37         info->data.args[4] = args[4];
 38         info->data.args[5] = args[5];
 39 
 40         put_task_stack(target);
 41         return 0;
 42 }
 43 
 44 /**
 45  * task_current_syscall - Discover what a blocked task is doing.
 46  * @target:             thread to examine
 47  * @info:               structure with the following fields:
 48  *                       .sp        - filled with user stack pointer
 49  *                       .data.nr   - filled with system call number or -1
 50  *                       .data.args - filled with @maxargs system call arguments
 51  *                       .data.instruction_pointer - filled with user PC
 52  *
 53  * If @target is blocked in a system call, returns zero with @info.data.nr
 54  * set to the call's number and @info.data.args filled in with its
 55  * arguments. Registers not used for system call arguments may not be available
 56  * and it is not kosher to use &struct user_regset calls while the system
 57  * call is still in progress.  Note we may get this result if @target
 58  * has finished its system call but not yet returned to user mode, such
 59  * as when it's stopped for signal handling or syscall exit tracing.
 60  *
 61  * If @target is blocked in the kernel during a fault or exception,
 62  * returns zero with *@info.data.nr set to -1 and does not fill in
 63  * @info.data.args. If so, it's now safe to examine @target using
 64  * &struct user_regset get() calls as long as we're sure @target won't return
 65  * to user mode.
 66  *
 67  * Returns -%EAGAIN if @target does not remain blocked.
 68  */
 69 int task_current_syscall(struct task_struct *target, struct syscall_info *info)
 70 {
 71         unsigned long ncsw;
 72         unsigned int state;
 73 
 74         if (target == current)
 75                 return collect_syscall(target, info);
 76 
 77         state = READ_ONCE(target->__state);
 78         if (unlikely(!state))
 79                 return -EAGAIN;
 80 
 81         ncsw = wait_task_inactive(target, state);
 82         if (unlikely(!ncsw) ||
 83             unlikely(collect_syscall(target, info)) ||
 84             unlikely(wait_task_inactive(target, state) != ncsw))
 85                 return -EAGAIN;
 86 
 87         return 0;
 88 }
 89 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php