Home
last modified time | relevance | path

Searched refs:vsyscall (Results 1 – 21 of 21) sorted by relevance

/linux-6.15/arch/sh/kernel/vsyscall/
H A DMakefile2 obj-y += vsyscall.o vsyscall-syscall.o vsyscall-syms.o
4 $(obj)/vsyscall-syscall.o: $(obj)/vsyscall-trapa.so
7 targets += vsyscall-trapa.o vsyscall-traps.so
8 targets += vsyscall-note.o vsyscall.lds vsyscall-dummy.o
17 vsyscall-flags = -shared -s -Wl,-soname=linux-gate.so.1 -Wl,--hash-style=sysv
19 SYSCFLAGS_vsyscall-trapa.so = $(vsyscall-flags)
21 $(obj)/vsyscall-trapa.so: \
22 $(obj)/vsyscall-%.so: $(obj)/vsyscall.lds $(obj)/vsyscall-%.o FORCE
29 $(obj)/vsyscall-dummy.o: $(obj)/vsyscall.lds \
30 $(obj)/vsyscall-trapa.o $(obj)/vsyscall-note.o FORCE
[all …]
H A D.gitignore2 vsyscall.lds
/linux-6.15/Documentation/translations/zh_CN/userspace-api/
H A Dseccomp_filter.rst271 在x86-64上,vsyscall模拟默认开启。(vsyscalls是vDSO调用的传统变体。)目前,模拟
274 - ``SECCOMP_RET_TRAP`` 的返回值会设置一个指向给定vsyscall入口的 ``si_call_addr``,
276 已被模拟,(b) 试图恢复系统调用将再次触发标准vsyscall模拟安全检查,使得恢复系统
288 ``siginfo->si_call_addr`` 。)不要检测其他条件:未来内核可能会改进vsyscall模拟,
289 当前内核在vsyscall=native模式下会有不同表现,但在这些情况下, ``0xF...F600{0,4,8,C}00``
/linux-6.15/arch/x86/entry/vsyscall/
H A Dvsyscall_trace.h3 #define TRACE_SYSTEM vsyscall
28 #define TRACE_INCLUDE_PATH ../../arch/x86/entry/vsyscall/
/linux-6.15/Documentation/arch/powerpc/
H A Dsyscall64-abi.rst122 vsyscall chapter
125 vsyscall calling sequence matches the syscall calling sequence, with the
130 r0 is not used as an input. The vsyscall is selected by its address.
134 The vsyscall may or may not use the caller's stack frame save areas.
147 The vsyscall is performed with a branch-with-link instruction to the vsyscall
152 vsyscalls will run in the same transactional state as the caller. A vsyscall
/linux-6.15/arch/x86/kernel/
H A D.gitignore2 vsyscall.lds
/linux-6.15/arch/x86/entry/
H A DMakefile19 obj-y += vsyscall/
/linux-6.15/kernel/time/
H A DMakefile29 obj-$(CONFIG_HAVE_GENERIC_VDSO) += vsyscall.o
H A DKconfig20 # Timekeeping vsyscall support
/linux-6.15/tools/testing/selftests/proc/
H A Dproc-empty-vm.c171 static void vsyscall(void) in vsyscall() function
440 vsyscall(); in main()
H A Dproc-pid-vm.c238 static void vsyscall(void) in vsyscall() function
289 vsyscall(); in main()
/linux-6.15/arch/sh/kernel/
H A DMakefile28 obj-$(CONFIG_VSYSCALL) += vsyscall/
/linux-6.15/Documentation/arch/x86/
H A Delf_auxvec.rst43 AT_SYSINFO is used for locating the vsyscall entry point. It is not
/linux-6.15/Documentation/userspace-api/
H A Dseccomp_filter.rst342 On x86-64, vsyscall emulation is enabled by default. (vsyscalls are
347 the vsyscall entry for the given call and not the address after the
350 trying to resume the syscall will again trigger the standard vsyscall
368 condition: future kernels may improve vsyscall emulation and current
369 kernels in vsyscall=native mode will behave differently, but the
/linux-6.15/Documentation/arch/x86/x86_64/
H A Dmm.rst82 ffffffffff600000 | -10 MB | ffffffffff600fff | 4 kB | legacy vsyscall ABI
152 ffffffffff600000 | -10 MB | ffffffffff600fff | 4 kB | legacy vsyscall ABI
/linux-6.15/arch/sh/mm/
H A DKconfig103 bool "Support vsyscall page"
/linux-6.15/arch/x86/
H A DKconfig1260 bool "Enable vsyscall emulation" if EXPERT
1264 This enables emulation of the legacy vsyscall page. Disabling
1265 it is roughly equivalent to booting with vsyscall=none, except
1267 tries to use a vsyscall. With this option set to N, offending
2251 prompt "vsyscall table for legacy applications"
2261 line parameter vsyscall=[emulate|xonly|none]. Emulate mode
2274 The kernel traps and emulates calls into the fixed vsyscall
2277 legacy vsyscall area but support for legacy binary
2279 certain uses of the vsyscall area as an ASLR-bypassing
2285 There will be no vsyscall mapping at all. This will
[all …]
/linux-6.15/Documentation/mm/
H A Dprocess_addrs.rst28 architectures which use :c:struct:`!vsyscall` and is a global static
/linux-6.15/Documentation/admin-guide/
H A Dkernel-parameters.txt7854 vsyscall= [X86-64,EARLY]
7863 reasonably safely. The vsyscall page is
7867 emulated reasonably safely. The vsyscall
/linux-6.15/Documentation/virt/kvm/
H A Dapi.rst5704 for a given vCPU. This is typically used for guest vsyscall support.
/linux-6.15/
H A DMAINTAINERS10003 F: include/asm-generic/vdso/vsyscall.h
10005 F: kernel/time/vsyscall.c