[PATCH] x86_32, entry: use syscall_badsys from syscall_trace_entry

From: Sven Wegener
Date: Sun Jul 20 2014 - 17:52:21 EST


Bring syscall_trace_entry in line with the other syscall_* error
handling code and use syscall_badsys for setting -ENOSYS.

Signed-off-by: Sven Wegener <sven.wegener@xxxxxxxxxxx>
---
arch/x86/kernel/entry_32.S | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/arch/x86/kernel/entry_32.S b/arch/x86/kernel/entry_32.S
index 0d0c9d4..793f6c9 100644
--- a/arch/x86/kernel/entry_32.S
+++ b/arch/x86/kernel/entry_32.S
@@ -644,13 +644,12 @@ END(work_pending)
# perform syscall exit tracing
ALIGN
syscall_trace_entry:
- movl $-ENOSYS,PT_EAX(%esp)
movl %esp, %eax
call syscall_trace_enter
/* What it returned is what we'll actually use. */
cmpl $(NR_syscalls), %eax
- jnae syscall_call
- jmp syscall_exit
+ jae syscall_badsys
+ jmp syscall_call
END(syscall_trace_entry)

# perform syscall exit tracing
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/