x86_64: fix ia32 AMD syscall audit fast-path
authorRoland McGrath <roland@redhat.com>
Sat, 26 Jul 2008 03:00:10 +0000 (20:00 -0700)
committerRoland McGrath <roland@redhat.com>
Sat, 26 Jul 2008 03:02:41 +0000 (20:02 -0700)
commit024e8ac04453b3525448c31ef39848cf675ba6db
treebc4d59f57ce315bcb16dad5491ab9983ab122d8a
parent1ff8419871ea757ae0298aa296bcff9b2ca48561
x86_64: fix ia32 AMD syscall audit fast-path

The new code in commit 5cbf1565f29eb57a86a305b08836613508e294d7
has a bug in the version supporting the AMD 'syscall' instruction.
It clobbers the user's %ecx register value (with the %ebp value).

This change fixes it.

Signed-off-by: Roland McGrath <roland@redhat.com>
arch/x86/ia32/ia32entry.S