更新日期: 2022/06/01 来源: https://gitee.com/weharmony/kernel_liteos_a_note
kill_shellcmd.c 文件参考

浏览源代码.

函数

LITE_OS_SEC_TEXT_MINOR VOID OsPrintKillUsage (VOID)
 
LITE_OS_SEC_TEXT_MINOR UINT32 OsShellCmdKill (INT32 argc, const CHAR **argv)
 
 SHELLCMD_ENTRY (kill_shellcmd, CMD_TYPE_EX, "kill", 2,(CmdCallBackFunc) OsShellCmdKill)
 

函数说明

◆ OsPrintKillUsage()

LITE_OS_SEC_TEXT_MINOR VOID OsPrintKillUsage ( VOID  )

在文件 kill_shellcmd.c51 行定义.

52{
53 PRINTK("\nkill: usage: kill [sigspec] [pid]\n");
54}
这是这个函数的调用关系图:

◆ OsShellCmdKill()

LITE_OS_SEC_TEXT_MINOR UINT32 OsShellCmdKill ( INT32  argc,
const CHAR **  argv 
)

在文件 kill_shellcmd.c72 行定义.

73{
74#define ARG_NUM 2
75 INT32 sigNo = 0;
76 INT32 pidNo = 0;
77 INT32 ret;
78 CHAR *endPtr = NULL;
79
80 if (argc == ARG_NUM) {
81 sigNo = strtoul(argv[0], &endPtr, 0);
82 if (*endPtr != 0) {
83 PRINT_ERR("\nsigNo can't access %s.\n", argv[0]);
84 goto ERROR;
85 }
86 endPtr = NULL;
87 pidNo = strtoul(argv[1], &endPtr, 0);
88 if (*endPtr != 0) {
89 PRINT_ERR("\npidNo can't access %s.\n", argv[1]);
90 goto ERROR;
91 }
92
93 ret = OsKill(pidNo, abs(sigNo), OS_USER_KILL_PERMISSION);
94 HILOG_INFO(LOG_CORE, "Send signal(%d) to pidNo = %d!\n", abs(sigNo), pidNo);
95 if (ret == -1) {
96 HILOG_ERROR(LOG_CORE, "Kill fail ret = %d! Operation not permitted\n", ret);
97 goto ERROR;
98 }
99 if (ret < 0) {
100 PRINT_ERR("\n Kill fail ret = %d! process not exist or sigNo is invalid\n", ret);
101 goto ERROR;
102 }
103 } else {
104 PRINT_ERR("\nPara number errno!\n");
105 goto ERROR;
106 }
107 return 0;
108ERROR:
110 return 0;
111}
LITE_OS_SEC_TEXT_MINOR VOID OsPrintKillUsage(VOID)
Definition: kill_shellcmd.c:51
int OsKill(pid_t pid, int sig, int permission)
Definition: los_signal.c:450
signed int INT32
Definition: los_typedef.h:60
char CHAR
Definition: los_typedef.h:63
函数调用图:

◆ SHELLCMD_ENTRY()

SHELLCMD_ENTRY ( kill_shellcmd  ,
CMD_TYPE_EX  ,
"kill"  ,
,
(CmdCallBackFunc OsShellCmdKill 
)