summaryrefslogtreecommitdiffstats
path: root/Documentation/DocBook/kernel-hacking.tmpl
diff options
context:
space:
mode:
authorAndy Lutomirski <luto@mit.edu>2011-08-10 11:15:32 -0400
committerH. Peter Anvin <hpa@linux.intel.com>2011-08-10 19:26:46 -0500
commit3ae36655b97a03fa1decf72f04078ef945647c1a (patch)
treef6f5fbc743909d66e6823c9325ddba9d9d3646ad /Documentation/DocBook/kernel-hacking.tmpl
parentfce8dc06423d6fb2709469dc5c55b04e09c1d126 (diff)
downloadlinux-3ae36655b97a03fa1decf72f04078ef945647c1a.tar.gz
linux-3ae36655b97a03fa1decf72f04078ef945647c1a.tar.bz2
linux-3ae36655b97a03fa1decf72f04078ef945647c1a.zip
x86-64: Rework vsyscall emulation and add vsyscall= parameter
There are three choices: vsyscall=native: Vsyscalls are native code that issues the corresponding syscalls. vsyscall=emulate (default): Vsyscalls are emulated by instruction fault traps, tested in the bad_area path. The actual contents of the vsyscall page is the same as the vsyscall=native case except that it's marked NX. This way programs that make assumptions about what the code in the page does will not be confused when they read that code. vsyscall=none: Trying to execute a vsyscall will segfault. Signed-off-by: Andy Lutomirski <luto@mit.edu> Link: http://lkml.kernel.org/r/8449fb3abf89851fd6b2260972666a6f82542284.1312988155.git.luto@mit.edu Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
Diffstat (limited to 'Documentation/DocBook/kernel-hacking.tmpl')
0 files changed, 0 insertions, 0 deletions