Linux Audio

Check our new training course

Loading...
v4.17
 
 1/*
 2 * Copyright (C) 2002 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
 3 * Licensed under the GPL
 4 */
 5
 6#include <linux/kernel.h>
 7#include <linux/ptrace.h>
 8#include <linux/seccomp.h>
 9#include <kern_util.h>
10#include <sysdep/ptrace.h>
11#include <sysdep/ptrace_user.h>
12#include <sysdep/syscalls.h>
 
13
14void handle_syscall(struct uml_pt_regs *r)
15{
16	struct pt_regs *regs = container_of(r, struct pt_regs, regs);
17	int syscall;
 
 
 
 
 
 
 
 
 
 
18
19	/* Initialize the syscall number and default return value. */
20	UPT_SYSCALL_NR(r) = PT_SYSCALL_NR(r->gp);
21	PT_REGS_SET_SYSCALL_RETURN(regs, -ENOSYS);
22
23	if (syscall_trace_enter(regs))
24		goto out;
25
26	/* Do the seccomp check after ptrace; failures should be fast. */
27	if (secure_computing(NULL) == -1)
28		goto out;
29
30	syscall = UPT_SYSCALL_NR(r);
31	if (syscall >= 0 && syscall <= __NR_syscall_max)
32		PT_REGS_SET_SYSCALL_RETURN(regs,
33				EXECUTE_SYSCALL(syscall, regs));
34
35out:
36	syscall_trace_leave(regs);
37}
v5.4
 1// SPDX-License-Identifier: GPL-2.0
 2/*
 3 * Copyright (C) 2002 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
 
 4 */
 5
 6#include <linux/kernel.h>
 7#include <linux/ptrace.h>
 8#include <linux/seccomp.h>
 9#include <kern_util.h>
10#include <sysdep/ptrace.h>
11#include <sysdep/ptrace_user.h>
12#include <sysdep/syscalls.h>
13#include <shared/timer-internal.h>
14
15void handle_syscall(struct uml_pt_regs *r)
16{
17	struct pt_regs *regs = container_of(r, struct pt_regs, regs);
18	int syscall;
19
20	/*
21	 * If we have infinite CPU resources, then make every syscall also a
22	 * preemption point, since we don't have any other preemption in this
23	 * case, and kernel threads would basically never run until userspace
24	 * went to sleep, even if said userspace interacts with the kernel in
25	 * various ways.
26	 */
27	if (time_travel_mode == TT_MODE_INFCPU)
28		schedule();
29
30	/* Initialize the syscall number and default return value. */
31	UPT_SYSCALL_NR(r) = PT_SYSCALL_NR(r->gp);
32	PT_REGS_SET_SYSCALL_RETURN(regs, -ENOSYS);
33
34	if (syscall_trace_enter(regs))
35		goto out;
36
37	/* Do the seccomp check after ptrace; failures should be fast. */
38	if (secure_computing(NULL) == -1)
39		goto out;
40
41	syscall = UPT_SYSCALL_NR(r);
42	if (syscall >= 0 && syscall <= __NR_syscall_max)
43		PT_REGS_SET_SYSCALL_RETURN(regs,
44				EXECUTE_SYSCALL(syscall, regs));
45
46out:
47	syscall_trace_leave(regs);
48}