diff options
author | Roland McGrath <roland@redhat.com> | 2008-07-25 19:45:57 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2008-07-26 12:00:09 -0700 |
commit | 828c365cc8b8d38c346fccb19fa80d28f2240831 (patch) | |
tree | cedb0f1ce389f4b12d7b0975ce52c8af7939cfcd /include/linux/tracehook.h | |
parent | 64b1208d5b0ef8859fd52ea7ae286a3eb994669b (diff) | |
download | op-kernel-dev-828c365cc8b8d38c346fccb19fa80d28f2240831.zip op-kernel-dev-828c365cc8b8d38c346fccb19fa80d28f2240831.tar.gz |
tracehook: asm/syscall.h
This adds asm-generic/syscall.h, which documents what a real
asm-ARCH/syscall.h file should define. This is not used yet, but will
provide all the machine-dependent details of examining a user system call
about to begin, in progress, or just ended.
Each arch should add an asm-ARCH/syscall.h that defines all the entry
points documented in asm-generic/syscall.h, as short inlines if possible.
This lets us write new tracing code that understands user system call
registers, without any new arch-specific work.
Signed-off-by: Roland McGrath <roland@redhat.com>
Cc: Oleg Nesterov <oleg@tv-sign.ru>
Reviewed-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'include/linux/tracehook.h')
-rw-r--r-- | include/linux/tracehook.h | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/include/linux/tracehook.h b/include/linux/tracehook.h index 32867ab..589f429 100644 --- a/include/linux/tracehook.h +++ b/include/linux/tracehook.h @@ -103,7 +103,8 @@ static inline void ptrace_report_syscall(struct pt_regs *regs) * the system call. That must prevent normal entry so no system call is * made. If @task ever returns to user mode after this, its register state * is unspecified, but should be something harmless like an %ENOSYS error - * return. + * return. It should preserve enough information so that syscall_rollback() + * can work (see asm-generic/syscall.h). * * Called without locks, just after entering kernel mode. */ |