1TRACEHOOK_REPORT_SYS(9)        Kernel Internals        TRACEHOOK_REPORT_SYS(9)
2
3
4

NAME

6       tracehook_report_syscall_entry - task is about to attempt a system call
7

SYNOPSIS

9       __must_check int tracehook_report_syscall_entry(struct pt_regs * regs);
10

ARGUMENTS

12       regs
13           user register state of current task
14

DESCRIPTION

16       This will be called if TIF_SYSCALL_TRACE has been set, when the current
17       task has just entered the kernel for a system call. Full user register
18       state is available here. Changing the values in regs can affect the
19       system call number and arguments to be tried. It is safe to block here,
20       preventing the system call from beginning.
21
22       Returns zero normally, or nonzero if the calling arch code should abort
23       the system call. That must prevent normal entry so no system call is
24       made. If task ever returns to user mode after this, its register state
25       is unspecified, but should be something harmless like an ENOSYS error
26       return. It should preserve enough information so that syscall_rollback
27       can work (see asm-generic/syscall.h).
28
29       Called without locks, just after entering kernel mode.
30
31
32
33Kernel Hackers Manual 2.6.         June 2019           TRACEHOOK_REPORT_SYS(9)
Impressum