lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1260403316-5679-1-git-send-email-brgerst@gmail.com>
Date:	Wed,  9 Dec 2009 19:01:50 -0500
From:	Brian Gerst <brgerst@...il.com>
To:	hpa@...or.com
Cc:	Ingo Molnar <mingo@...e.hu>, x86@...nel.org,
	torvalds@...ux-foundation.org, jeremy@...p.org,
	linux-kernel@...r.kernel.org
Subject: [PATCH 0/6] x86: Merge pt_regs using syscalls

This patch set converts the 32-bit syscalls that need pt_regs to
match the same prototype as 64-bit, using regparm(3) and adding 
the pt_regs pointer as an extra argument.  This allows these
syscalls to be merged.

[PATCH 1/6] x86, 32-bit: Add new pt_regs stubs
[PATCH 2/6] x86: Merge sys_iopl
[PATCH 3/6] x86: Merge sys_execve
[PATCH 4/6] x86: Merge sys_sigaltstack
[PATCH 5/6] x86, 32-bit: Convert sys_vm86 & sys_vm86old
[PATCH 6/6] x86: Merge sys_clone

 arch/x86/include/asm/syscalls.h |   32 ++++++--------------
 arch/x86/kernel/entry_32.S      |   61 ++++++++++++++++++++++++++++++++-------
 arch/x86/kernel/ioport.c        |   28 +++--------------
 arch/x86/kernel/process.c       |   35 ++++++++++++++++++++++
 arch/x86/kernel/process_32.c    |   40 -------------------------
 arch/x86/kernel/process_64.c    |   28 ------------------
 arch/x86/kernel/signal.c        |   12 +-------
 arch/x86/kernel/vm86_32.c       |   11 +++----
 8 files changed, 106 insertions(+), 141 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ