linux-hardened/arch/x86/syscalls
Al Viro 07b053457b x86: sys32_kill and sys32_mprotect are pointless
their argument types are identical to those of sys_kill and sys_mprotect
resp., so we are not doing any kind of argument validation, etc. in those -
they turn into unconditional branches to corresponding syscalls.

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2013-03-03 23:00:33 -05:00
..
Makefile UAPI: Plumb the UAPI Kbuilds into the user header installation and checking 2012-10-02 18:01:57 +01:00
syscall_32.tbl x86: sys32_kill and sys32_mprotect are pointless 2013-03-03 23:00:33 -05:00
syscall_64.tbl x86: switch to generic compat rt_sigaction() 2013-02-03 18:16:26 -05:00
syscallhdr.sh x86, syscall: Allow syscall offset to be symbolic 2011-11-18 17:01:19 -08:00
syscalltbl.sh x86: Machine-readable syscall tables and scripts to process them 2011-11-17 13:35:36 -08:00