diff options
author | H. Peter Anvin (Intel) <hpa@zytor.com> | 2021-05-18 12:12:58 -0700 |
---|---|---|
committer | Thomas Gleixner <tglx@linutronix.de> | 2021-05-20 15:19:48 +0200 |
commit | 15c82d98a0f783bd4b2715ea910f7bb526367f54 (patch) | |
tree | 12c301ddfabbe85f3b8223476a01c7e4ca6d6d27 /tools/debugging | |
parent | 3cba325b358f86357b5ce50eb9e6633183927eee (diff) |
selftests/x86/syscall: Update and extend syscall_numbering_64
Update the syscall_numbering_64 selftest to reflect that a system call is
to be extended from 32 bits. Add a mix of tests for valid and invalid
system calls in 64-bit and x32 space.
Use an explicit system call instruction, because the glibc syscall()
wrapper might intercept instructions, extend the system call number
independently, or anything similar.
Use long long instead of long to make it possible to compile this test
on x32 as well as 64 bits.
Signed-off-by: H. Peter Anvin (Intel) <hpa@zytor.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Link: https://lore.kernel.org/r/20210518191303.4135296-2-hpa@zytor.com
Diffstat (limited to 'tools/debugging')
0 files changed, 0 insertions, 0 deletions