x86/entry/syscalls: Wire up 32-bit direct socket calls
authorAndy Lutomirski <luto@kernel.org>
Tue, 14 Jul 2015 22:24:24 +0000 (15:24 -0700)
committerIngo Molnar <mingo@kernel.org>
Tue, 21 Jul 2015 08:11:04 +0000 (10:11 +0200)
commit9dea5dc921b5f4045a18c63eb92e84dc274d17eb
treeb8bc8881b17c04173a71455b5dec1b4a454659df
parented0b2edb61ba4e557de759093d965654186f28b2
x86/entry/syscalls: Wire up 32-bit direct socket calls

On x86_64, there's no socketcall syscall; instead all of the
socket calls are real syscalls.  For 32-bit programs, we're
stuck offering the socketcall syscall, but it would be nice to
expose the direct calls as well.  This will enable seccomp to
filter socket calls (for new userspace only, but that's fine for
some applications) and it will provide a tiny performance boost.

Signed-off-by: Andy Lutomirski <luto@kernel.org>
Cc: Alexander Larsson <alexl@redhat.com>
Cc: Andy Lutomirski <luto@amacapital.net>
Cc: Cosimo Cecchi <cosimo@endlessm.com>
Cc: Dan Nicholson <nicholson@endlessm.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Rajalakshmi Srinivasaraghavan <raji@linux.vnet.ibm.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Tulio Magno Quites Machado Filho <tuliom@linux.vnet.ibm.com>
Cc: libc-alpha <libc-alpha@sourceware.org>
Link: http://lkml.kernel.org/r/cb5138299d37d5800e2d135b01a7667fa6115854.1436912629.git.luto@kernel.org
Signed-off-by: Ingo Molnar <mingo@kernel.org>
arch/x86/entry/syscalls/syscall_32.tbl