|
Message-ID: <tip-d974ffcfb7447db5f29a4b662a3eaf99a4e1109e@git.kernel.org> Date: Thu, 27 Jun 2019 15:13:09 -0700 From: tip-bot for Andy Lutomirski <tipbot@...or.com> To: linux-tip-commits@...r.kernel.org Cc: bp@...en8.de, fweimer@...hat.com, jannh@...gle.com, hpa@...or.com, kernel-hardening@...ts.openwall.com, mingo@...nel.org, luto@...nel.org, tglx@...utronix.de, keescook@...omium.org, linux-kernel@...r.kernel.org, peterz@...radead.org Subject: [tip:x86/entry] Documentation/admin: Remove the vsyscall=native documentation Commit-ID: d974ffcfb7447db5f29a4b662a3eaf99a4e1109e Gitweb: https://git.kernel.org/tip/d974ffcfb7447db5f29a4b662a3eaf99a4e1109e Author: Andy Lutomirski <luto@...nel.org> AuthorDate: Wed, 26 Jun 2019 21:45:02 -0700 Committer: Thomas Gleixner <tglx@...utronix.de> CommitDate: Fri, 28 Jun 2019 00:04:38 +0200 Documentation/admin: Remove the vsyscall=native documentation The vsyscall=native feature is gone -- remove the docs. Fixes: 076ca272a14c ("x86/vsyscall/64: Drop "native" vsyscalls") Signed-off-by: Andy Lutomirski <luto@...nel.org> Signed-off-by: Thomas Gleixner <tglx@...utronix.de> Acked-by: Kees Cook <keescook@...omium.org> Cc: Florian Weimer <fweimer@...hat.com> Cc: Jann Horn <jannh@...gle.com> Cc: stable@...r.kernel.org Cc: Borislav Petkov <bp@...en8.de> Cc: Kernel Hardening <kernel-hardening@...ts.openwall.com> Cc: Peter Zijlstra <peterz@...radead.org> Link: https://lkml.kernel.org/r/d77c7105eb4c57c1a95a95b6a5b8ba194a18e764.1561610354.git.luto@kernel.org --- Documentation/admin-guide/kernel-parameters.txt | 6 ------ 1 file changed, 6 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 138f6664b2e2..0082d1e56999 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -5102,12 +5102,6 @@ emulate [default] Vsyscalls turn into traps and are emulated reasonably safely. - native Vsyscalls are native syscall instructions. - This is a little bit faster than trapping - and makes a few dynamic recompilers work - better than they would in emulation mode. - It also makes exploits much easier to write. - none Vsyscalls don't work at all. This makes them quite hard to use for exploits but might break your system.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.