• A
    x86/entry/syscalls: Wire up 32-bit direct socket calls · 9dea5dc9
    Andy Lutomirski 提交于
    On x86_64, there's no socketcall syscall; instead all of the
    socket calls are real syscalls.  For 32-bit programs, we're
    stuck offering the socketcall syscall, but it would be nice to
    expose the direct calls as well.  This will enable seccomp to
    filter socket calls (for new userspace only, but that's fine for
    some applications) and it will provide a tiny performance boost.
    Signed-off-by: NAndy Lutomirski <luto@kernel.org>
    Cc: Alexander Larsson <alexl@redhat.com>
    Cc: Andy Lutomirski <luto@amacapital.net>
    Cc: Cosimo Cecchi <cosimo@endlessm.com>
    Cc: Dan Nicholson <nicholson@endlessm.com>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Rajalakshmi Srinivasaraghavan <raji@linux.vnet.ibm.com>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Cc: Tulio Magno Quites Machado Filho <tuliom@linux.vnet.ibm.com>
    Cc: libc-alpha <libc-alpha@sourceware.org>
    Link: http://lkml.kernel.org/r/cb5138299d37d5800e2d135b01a7667fa6115854.1436912629.git.luto@kernel.orgSigned-off-by: NIngo Molnar <mingo@kernel.org>
    9dea5dc9
syscall_32.tbl 14.9 KB