blob: f574b1856bc6daf46b691f68a08c8720970dde55 [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001// SPDX-License-Identifier: GPL-2.0
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/*
3 * Copyright (C) 2002 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00004 */
5
6#include <linux/kernel.h>
7#include <linux/ptrace.h>
8#include <linux/seccomp.h>
9#include <kern_util.h>
10#include <sysdep/ptrace.h>
11#include <sysdep/ptrace_user.h>
12#include <sysdep/syscalls.h>
David Brazdil0f672f62019-12-10 10:32:29 +000013#include <shared/timer-internal.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000014
15void handle_syscall(struct uml_pt_regs *r)
16{
17 struct pt_regs *regs = container_of(r, struct pt_regs, regs);
18 int syscall;
19
David Brazdil0f672f62019-12-10 10:32:29 +000020 /*
21 * If we have infinite CPU resources, then make every syscall also a
22 * preemption point, since we don't have any other preemption in this
23 * case, and kernel threads would basically never run until userspace
24 * went to sleep, even if said userspace interacts with the kernel in
25 * various ways.
26 */
27 if (time_travel_mode == TT_MODE_INFCPU)
28 schedule();
29
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000030 /* Initialize the syscall number and default return value. */
31 UPT_SYSCALL_NR(r) = PT_SYSCALL_NR(r->gp);
32 PT_REGS_SET_SYSCALL_RETURN(regs, -ENOSYS);
33
34 if (syscall_trace_enter(regs))
35 goto out;
36
37 /* Do the seccomp check after ptrace; failures should be fast. */
38 if (secure_computing(NULL) == -1)
39 goto out;
40
41 syscall = UPT_SYSCALL_NR(r);
42 if (syscall >= 0 && syscall <= __NR_syscall_max)
43 PT_REGS_SET_SYSCALL_RETURN(regs,
44 EXECUTE_SYSCALL(syscall, regs));
45
46out:
47 syscall_trace_leave(regs);
48}