aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/include/linux/spinlock.h
diff options
context:
space:
mode:
authorAndy Lutomirski <luto@kernel.org>2015-07-14 15:24:24 -0700
committerIngo Molnar <mingo@kernel.org>2015-07-21 10:11:04 +0200
commit9dea5dc921b5f4045a18c63eb92e84dc274d17eb (patch)
treeb8bc8881b17c04173a71455b5dec1b4a454659df /include/linux/spinlock.h
parentx86/entry/vm86: Move userspace accesses to do_sys_vm86() (diff)
downloadwireguard-linux-9dea5dc921b5f4045a18c63eb92e84dc274d17eb.tar.xz
wireguard-linux-9dea5dc921b5f4045a18c63eb92e84dc274d17eb.zip
x86/entry/syscalls: Wire up 32-bit direct socket calls
On x86_64, there's no socketcall syscall; instead all of the socket calls are real syscalls. For 32-bit programs, we're stuck offering the socketcall syscall, but it would be nice to expose the direct calls as well. This will enable seccomp to filter socket calls (for new userspace only, but that's fine for some applications) and it will provide a tiny performance boost. Signed-off-by: Andy Lutomirski <luto@kernel.org> Cc: Alexander Larsson <alexl@redhat.com> Cc: Andy Lutomirski <luto@amacapital.net> Cc: Cosimo Cecchi <cosimo@endlessm.com> Cc: Dan Nicholson <nicholson@endlessm.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Rajalakshmi Srinivasaraghavan <raji@linux.vnet.ibm.com> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: Tulio Magno Quites Machado Filho <tuliom@linux.vnet.ibm.com> Cc: libc-alpha <libc-alpha@sourceware.org> Link: http://lkml.kernel.org/r/cb5138299d37d5800e2d135b01a7667fa6115854.1436912629.git.luto@kernel.org Signed-off-by: Ingo Molnar <mingo@kernel.org>
Diffstat (limited to 'include/linux/spinlock.h')
0 files changed, 0 insertions, 0 deletions