tracehook_report_syscall_entry man page on Scientific

Man page or keyword search:  
man Server   26626 pages
apropos Keyword Search (all sections)
Output format
Scientific logo
[printable version]

TRACEHOOK_REPORT_SYS(9)	       Kernel Internals	       TRACEHOOK_REPORT_SYS(9)

NAME
       tracehook_report_syscall_entry - task is about to attempt a system call

SYNOPSIS
       __must_check int tracehook_report_syscall_entry(struct pt_regs * regs);

ARGUMENTS
       regs
	   user register state of current task

DESCRIPTION
       This will be called if TIF_SYSCALL_TRACE has been set, when the current
       task has just entered the kernel for a system call. Full user register
       state is available here. Changing the values in regs can affect the
       system call number and arguments to be tried. It is safe to block here,
       preventing the system call from beginning.

       Returns zero normally, or nonzero if the calling arch code should abort
       the system call. That must prevent normal entry so no system call is
       made. If task ever returns to user mode after this, its register state
       is unspecified, but should be something harmless like an ENOSYS error
       return. It should preserve enough information so that syscall_rollback
       can work (see asm-generic/syscall.h).

       Called without locks, just after entering kernel mode.

Kernel Hackers Manual 2.6.	 November 2013	       TRACEHOOK_REPORT_SYS(9)
[top]

List of man pages available for Scientific

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net