[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.LNX.2.11.1407202350500.31021@titan.int.lan.stealer.net>
Date: Sun, 20 Jul 2014 23:51:52 +0200 (CEST)
From: Sven Wegener <sven.wegener@...aler.net>
To: "H. Peter Anvin" <hpa@...or.com>
cc: X86 ML <x86@...nel.org>,
Linux Kernel <linux-kernel@...r.kernel.org>
Subject: [PATCH] x86_32, entry: use syscall_badsys from syscall_trace_entry
Bring syscall_trace_entry in line with the other syscall_* error
handling code and use syscall_badsys for setting -ENOSYS.
Signed-off-by: Sven Wegener <sven.wegener@...aler.net>
---
arch/x86/kernel/entry_32.S | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kernel/entry_32.S b/arch/x86/kernel/entry_32.S
index 0d0c9d4..793f6c9 100644
--- a/arch/x86/kernel/entry_32.S
+++ b/arch/x86/kernel/entry_32.S
@@ -644,13 +644,12 @@ END(work_pending)
# perform syscall exit tracing
ALIGN
syscall_trace_entry:
- movl $-ENOSYS,PT_EAX(%esp)
movl %esp, %eax
call syscall_trace_enter
/* What it returned is what we'll actually use. */
cmpl $(NR_syscalls), %eax
- jnae syscall_call
- jmp syscall_exit
+ jae syscall_badsys
+ jmp syscall_call
END(syscall_trace_entry)
# perform syscall exit tracing
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists