Commit f0104457 authored by Jeff Dike's avatar Jeff Dike Committed by Linus Torvalds

[PATCH] uml: dont check NR_syscalls

Remove an unnecessary and even dangerous check in is_syscall()
The bug was inserted by my patch syscall-security-1.
Signed-off-by: default avatarBodo Stroesser <bstroesser@fujitsu-siemens.com>
Signed-off-by: default avatarJeff Dike <jdike@addtoit.com>
Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
parent 29af4232
...@@ -28,8 +28,8 @@ int is_syscall(unsigned long addr) ...@@ -28,8 +28,8 @@ int is_syscall(unsigned long addr)
addr); addr);
return(0); return(0);
} }
return( (instr == 0x80cd || instr == 0x340f) && /* int 0x80 or sysenter */
PT_REGS_EAX(&current->thread.regs) < NR_syscalls); return((instr == 0x80cd) || (instr == 0x340f));
} }
/* determines which flags the user has access to. */ /* determines which flags the user has access to. */
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment