Re: [PATCH] x86-64: remove int 0xcc from entry_64.S documentation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Aug 15, 2011 at 6:26 PM, Cesar Eduardo Barros <cesarb@xxxxxxxxxx> wrote:
> Commit 3ae36655b97a03fa1decf72f04078ef945647c1a (x86-64: Rework vsyscall
> emulation and add vsyscall= parameter) removed the special use of the
> 0xcc IDT vector.
>
> Remove it from Documentation/x86/entry_64.txt also.
>
> Cc: Andy Lutomirski <luto@xxxxxxx>
> Cc: Ingo Molnar <mingo@xxxxxxx>
> Signed-off-by: Cesar Eduardo Barros <cesarb@xxxxxxxxxx>
> ---
>  Documentation/x86/entry_64.txt |    3 ---
>  1 files changed, 0 insertions(+), 3 deletions(-)
>
> diff --git a/Documentation/x86/entry_64.txt b/Documentation/x86/entry_64.txt
> index 7869f14..bc7226e 100644
> --- a/Documentation/x86/entry_64.txt
> +++ b/Documentation/x86/entry_64.txt
> @@ -27,9 +27,6 @@ Some of these entries are:
>    magically-generated functions that make their way to do_IRQ with
>    the interrupt number as a parameter.
>
> - - emulate_vsyscall: int 0xcc, a special non-ABI entry used by
> -   vsyscall emulation.
> -
>  - APIC interrupts: Various special-purpose interrupts for things
>    like TLB shootdown.
>

Acked-by: Andy Lutomirski <luto@xxxxxxx>

--Andy
--
To unsubscribe from this list: send the line "unsubscribe linux-doc" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]     [Linux Resources]

  Powered by Linux