2008-07-26 02:45:59 +00:00
|
|
|
#include <linux/ptrace.h>
|
|
|
|
#include <linux/sched.h>
|
2017-02-08 17:51:37 +00:00
|
|
|
#include <linux/sched/task_stack.h>
|
2011-11-17 02:29:17 +00:00
|
|
|
#include <linux/export.h>
|
2008-07-26 02:45:59 +00:00
|
|
|
#include <asm/syscall.h>
|
|
|
|
|
|
|
|
static int collect_syscall(struct task_struct *target, long *callno,
|
|
|
|
unsigned long args[6], unsigned int maxargs,
|
|
|
|
unsigned long *sp, unsigned long *pc)
|
|
|
|
{
|
2016-09-16 05:45:47 +00:00
|
|
|
struct pt_regs *regs;
|
|
|
|
|
|
|
|
if (!try_get_task_stack(target)) {
|
|
|
|
/* Task has no stack, so the task isn't in a syscall. */
|
2017-03-23 22:46:16 +00:00
|
|
|
*sp = *pc = 0;
|
2016-09-16 05:45:47 +00:00
|
|
|
*callno = -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
regs = task_pt_regs(target);
|
|
|
|
if (unlikely(!regs)) {
|
|
|
|
put_task_stack(target);
|
2008-07-26 02:45:59 +00:00
|
|
|
return -EAGAIN;
|
2016-09-16 05:45:47 +00:00
|
|
|
}
|
2008-07-26 02:45:59 +00:00
|
|
|
|
|
|
|
*sp = user_stack_pointer(regs);
|
|
|
|
*pc = instruction_pointer(regs);
|
|
|
|
|
|
|
|
*callno = syscall_get_nr(target, regs);
|
|
|
|
if (*callno != -1L && maxargs > 0)
|
|
|
|
syscall_get_arguments(target, regs, 0, maxargs, args);
|
|
|
|
|
2016-09-16 05:45:47 +00:00
|
|
|
put_task_stack(target);
|
2008-07-26 02:45:59 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* task_current_syscall - Discover what a blocked task is doing.
|
|
|
|
* @target: thread to examine
|
|
|
|
* @callno: filled with system call number or -1
|
|
|
|
* @args: filled with @maxargs system call arguments
|
|
|
|
* @maxargs: number of elements in @args to fill
|
|
|
|
* @sp: filled with user stack pointer
|
|
|
|
* @pc: filled with user PC
|
|
|
|
*
|
|
|
|
* If @target is blocked in a system call, returns zero with *@callno
|
|
|
|
* set to the the call's number and @args filled in with its arguments.
|
|
|
|
* Registers not used for system call arguments may not be available and
|
|
|
|
* it is not kosher to use &struct user_regset calls while the system
|
|
|
|
* call is still in progress. Note we may get this result if @target
|
|
|
|
* has finished its system call but not yet returned to user mode, such
|
|
|
|
* as when it's stopped for signal handling or syscall exit tracing.
|
|
|
|
*
|
|
|
|
* If @target is blocked in the kernel during a fault or exception,
|
|
|
|
* returns zero with *@callno set to -1 and does not fill in @args.
|
|
|
|
* If so, it's now safe to examine @target using &struct user_regset
|
|
|
|
* get() calls as long as we're sure @target won't return to user mode.
|
|
|
|
*
|
|
|
|
* Returns -%EAGAIN if @target does not remain blocked.
|
|
|
|
*
|
|
|
|
* Returns -%EINVAL if @maxargs is too large (maximum is six).
|
|
|
|
*/
|
|
|
|
int task_current_syscall(struct task_struct *target, long *callno,
|
|
|
|
unsigned long args[6], unsigned int maxargs,
|
|
|
|
unsigned long *sp, unsigned long *pc)
|
|
|
|
{
|
|
|
|
long state;
|
|
|
|
unsigned long ncsw;
|
|
|
|
|
|
|
|
if (unlikely(maxargs > 6))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (target == current)
|
|
|
|
return collect_syscall(target, callno, args, maxargs, sp, pc);
|
|
|
|
|
|
|
|
state = target->state;
|
|
|
|
if (unlikely(!state))
|
|
|
|
return -EAGAIN;
|
|
|
|
|
|
|
|
ncsw = wait_task_inactive(target, state);
|
|
|
|
if (unlikely(!ncsw) ||
|
|
|
|
unlikely(collect_syscall(target, callno, args, maxargs, sp, pc)) ||
|
|
|
|
unlikely(wait_task_inactive(target, state) != ncsw))
|
|
|
|
return -EAGAIN;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|