From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932122AbbGUJl7 (ORCPT ); Tue, 21 Jul 2015 05:41:59 -0400 Received: from terminus.zytor.com ([198.137.202.10]:40511 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755340AbbGUJl4 (ORCPT ); Tue, 21 Jul 2015 05:41:56 -0400 Date: Tue, 21 Jul 2015 02:41:15 -0700 From: tip-bot for Andy Lutomirski Message-ID: Cc: torvalds@linux-foundation.org, cosimo@endlessm.com, luto@amacapital.net, nicholson@endlessm.com, tuliom@linux.vnet.ibm.com, tglx@linutronix.de, peterz@infradead.org, hpa@zytor.com, luto@kernel.org, raji@linux.vnet.ibm.com, linux-kernel@vger.kernel.org, alexl@redhat.com, mingo@kernel.org, libc-alpha@sourceware.org Reply-To: tuliom@linux.vnet.ibm.com, hpa@zytor.com, peterz@infradead.org, tglx@linutronix.de, nicholson@endlessm.com, cosimo@endlessm.com, luto@amacapital.net, torvalds@linux-foundation.org, mingo@kernel.org, libc-alpha@sourceware.org, raji@linux.vnet.ibm.com, alexl@redhat.com, linux-kernel@vger.kernel.org, luto@kernel.org In-Reply-To: References: To: linux-tip-commits@vger.kernel.org Subject: [tip:x86/asm] x86/entry/syscalls: Wire up 32-bit direct socket calls Git-Commit-ID: 9dea5dc921b5f4045a18c63eb92e84dc274d17eb X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit-ID: 9dea5dc921b5f4045a18c63eb92e84dc274d17eb Gitweb: http://git.kernel.org/tip/9dea5dc921b5f4045a18c63eb92e84dc274d17eb Author: Andy Lutomirski AuthorDate: Tue, 14 Jul 2015 15:24:24 -0700 Committer: Ingo Molnar CommitDate: Tue, 21 Jul 2015 10:11:04 +0200 x86/entry/syscalls: Wire up 32-bit direct socket calls On x86_64, there's no socketcall syscall; instead all of the socket calls are real syscalls. For 32-bit programs, we're stuck offering the socketcall syscall, but it would be nice to expose the direct calls as well. This will enable seccomp to filter socket calls (for new userspace only, but that's fine for some applications) and it will provide a tiny performance boost. Signed-off-by: Andy Lutomirski Cc: Alexander Larsson Cc: Andy Lutomirski Cc: Cosimo Cecchi Cc: Dan Nicholson Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Rajalakshmi Srinivasaraghavan Cc: Thomas Gleixner Cc: Tulio Magno Quites Machado Filho Cc: libc-alpha Link: http://lkml.kernel.org/r/cb5138299d37d5800e2d135b01a7667fa6115854.1436912629.git.luto@kernel.org Signed-off-by: Ingo Molnar --- arch/x86/entry/syscalls/syscall_32.tbl | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/arch/x86/entry/syscalls/syscall_32.tbl b/arch/x86/entry/syscalls/syscall_32.tbl index ef8187f..25e3cf1 100644 --- a/arch/x86/entry/syscalls/syscall_32.tbl +++ b/arch/x86/entry/syscalls/syscall_32.tbl @@ -365,3 +365,18 @@ 356 i386 memfd_create sys_memfd_create 357 i386 bpf sys_bpf 358 i386 execveat sys_execveat stub32_execveat +359 i386 socket sys_socket +360 i386 socketpair sys_socketpair +361 i386 bind sys_bind +362 i386 connect sys_connect +363 i386 listen sys_listen +364 i386 accept4 sys_accept4 +365 i386 getsockopt sys_getsockopt compat_sys_getsockopt +366 i386 setsockopt sys_setsockopt compat_sys_setsockopt +367 i386 getsockname sys_getsockname +368 i386 getpeername sys_getpeername +369 i386 sendto sys_sendto +370 i386 sendmsg sys_sendmsg compat_sys_sendmsg +371 i386 recvfrom sys_recvfrom compat_sys_recvfrom +372 i386 recvmsg sys_recvmsg compat_sys_recvmsg +373 i386 shutdown sys_shutdown