X-Git-Url: https://pintos-os.org/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=doc%2Fuserprog.texi;h=9db073776ab70c7fadb9e711325b991a23e5e552;hb=05b6f677e17b8bd2239009cdc6796c71e0327314;hp=a92697d1b4fe209cbe78b6a2d2b6965bcac41854;hpb=fcb5d5ae90ae9d5319a3e4b7aed2c751e1dfaadf;p=pintos-anon diff --git a/doc/userprog.texi b/doc/userprog.texi index a92697d..9db0737 100644 --- a/doc/userprog.texi +++ b/doc/userprog.texi @@ -516,9 +516,9 @@ recommend against modifying code in the @file{filesys} directory.} We have provided you a user-level function for each system call in @file{lib/user/syscall.c}. These provide a way for user processes to -invoke each system call from a C program. Each of them calls an -assembly language routine in @file{lib/user/syscall-stub.S}, which in -turn invokes the system call interrupt and returns. +invoke each system call from a C program. Each uses a little inline +assembly code to invoke the system call and (if appropriate) returns the +system call's return value. When you're done with this part, and forevermore, Pintos should be bulletproof. Nothing that a user program can do should ever cause the