diff options
author | Thomas Gleixner <[email protected]> | 2023-12-04 11:31:39 +0300 |
---|---|---|
committer | Dave Hansen <[email protected]> | 2023-12-07 09:51:29 -0800 |
commit | be5341eb0d43b1e754799498bd2e8756cc167a41 (patch) | |
tree | c43b402710a38cd0a16cf3706145ce06182f424e /scripts/generate_rust_analyzer.py | |
parent | b82a8dbd3d2f4563156f7150c6f2ecab6e960b30 (diff) |
x86/entry: Convert INT 0x80 emulation to IDTENTRY
There is no real reason to have a separate ASM entry point implementation
for the legacy INT 0x80 syscall emulation on 64-bit.
IDTENTRY provides all the functionality needed with the only difference
that it does not:
- save the syscall number (AX) into pt_regs::orig_ax
- set pt_regs::ax to -ENOSYS
Both can be done safely in the C code of an IDTENTRY before invoking any of
the syscall related functions which depend on this convention.
Aside of ASM code reduction this prepares for detecting and handling a
local APIC injected vector 0x80.
[ kirill.shutemov: More verbose comments ]
Suggested-by: Linus Torvalds <[email protected]>
Signed-off-by: Thomas Gleixner <[email protected]>
Signed-off-by: Kirill A. Shutemov <[email protected]>
Signed-off-by: Dave Hansen <[email protected]>
Reviewed-by: Borislav Petkov (AMD) <[email protected]>
Cc: <[email protected]> # v6.0+
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions