um/ptrace: run seccomp after ptrace
[linux-2.6-block.git] / arch / um / kernel / skas / syscall.c
CommitLineData
e32dacb9 1/*
ba180fd4 2 * Copyright (C) 2002 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
e32dacb9
JD
3 * Licensed under the GPL
4 */
5
37185b33
AV
6#include <linux/kernel.h>
7#include <linux/ptrace.h>
c50b4659 8#include <linux/seccomp.h>
37185b33
AV
9#include <kern_util.h>
10#include <sysdep/ptrace.h>
e04c989e 11#include <sysdep/ptrace_user.h>
37185b33 12#include <sysdep/syscalls.h>
e32dacb9 13
77bf4400 14void handle_syscall(struct uml_pt_regs *r)
e32dacb9
JD
15{
16 struct pt_regs *regs = container_of(r, struct pt_regs, regs);
e32dacb9 17 int syscall;
e32dacb9 18
e04c989e
MS
19 /* Initialize the syscall number and default return value. */
20 UPT_SYSCALL_NR(r) = PT_SYSCALL_NR(r->gp);
21 PT_REGS_SET_SYSCALL_RETURN(regs, -ENOSYS);
22
26703c63 23 if (syscall_trace_enter(regs))
c50b4659
MS
24 return;
25
26703c63
KC
26 /* Do the seccomp check after ptrace; failures should be fast. */
27 if (secure_computing(NULL) == -1)
28 return;
e32dacb9 29
e04c989e
MS
30 /* Update the syscall number after orig_ax has potentially been updated
31 * with ptrace.
32 */
33 UPT_SYSCALL_NR(r) = PT_SYSCALL_NR(r->gp);
34 syscall = UPT_SYSCALL_NR(r);
1d80f0cd 35
e04c989e
MS
36 if (syscall >= 0 && syscall <= __NR_syscall_max)
37 PT_REGS_SET_SYSCALL_RETURN(regs,
38 EXECUTE_SYSCALL(syscall, regs));
e32dacb9 39
1bfa2317 40 syscall_trace_leave(regs);
e32dacb9 41}