* [PATCH v2 1/8] x86/vsyscall: Remove the vsyscall=native documentation [not found] <cover.1561610354.git.luto@kernel.org> @ 2019-06-27 4:45 ` Andy Lutomirski 2019-06-27 17:26 ` Kees Cook 0 siblings, 1 reply; 2+ messages in thread From: Andy Lutomirski @ 2019-06-27 4:45 UTC (permalink / raw) To: x86 Cc: LKML, Kees Cook, Florian Weimer, Jann Horn, Andy Lutomirski, stable, Borislav Petkov, Kernel Hardening, Peter Zijlstra, Thomas Gleixner The vsyscall=native feature is gone -- remove the docs. Fixes: 076ca272a14c ("x86/vsyscall/64: Drop "native" vsyscalls") Cc: stable@vger.kernel.org Cc: Kees Cook <keescook@chromium.org> Cc: Borislav Petkov <bp@alien8.de> Cc: Kernel Hardening <kernel-hardening@lists.openwall.com> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Andy Lutomirski <luto@kernel.org> --- Documentation/admin-guide/kernel-parameters.txt | 6 ------ 1 file changed, 6 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 138f6664b2e2..0082d1e56999 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -5102,12 +5102,6 @@ emulate [default] Vsyscalls turn into traps and are emulated reasonably safely. - native Vsyscalls are native syscall instructions. - This is a little bit faster than trapping - and makes a few dynamic recompilers work - better than they would in emulation mode. - It also makes exploits much easier to write. - none Vsyscalls don't work at all. This makes them quite hard to use for exploits but might break your system. -- 2.21.0 ^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH v2 1/8] x86/vsyscall: Remove the vsyscall=native documentation 2019-06-27 4:45 ` [PATCH v2 1/8] x86/vsyscall: Remove the vsyscall=native documentation Andy Lutomirski @ 2019-06-27 17:26 ` Kees Cook 0 siblings, 0 replies; 2+ messages in thread From: Kees Cook @ 2019-06-27 17:26 UTC (permalink / raw) To: Andy Lutomirski Cc: x86, LKML, Florian Weimer, Jann Horn, stable, Borislav Petkov, Kernel Hardening, Peter Zijlstra, Thomas Gleixner On Wed, Jun 26, 2019 at 09:45:02PM -0700, Andy Lutomirski wrote: > The vsyscall=native feature is gone -- remove the docs. > > Fixes: 076ca272a14c ("x86/vsyscall/64: Drop "native" vsyscalls") > Cc: stable@vger.kernel.org > Cc: Kees Cook <keescook@chromium.org> > Cc: Borislav Petkov <bp@alien8.de> > Cc: Kernel Hardening <kernel-hardening@lists.openwall.com> > Cc: Peter Zijlstra <peterz@infradead.org> > Cc: Thomas Gleixner <tglx@linutronix.de> > Signed-off-by: Andy Lutomirski <luto@kernel.org> Acked-by: Kees Cook <keescook@chromium.org> -Kees > --- > Documentation/admin-guide/kernel-parameters.txt | 6 ------ > 1 file changed, 6 deletions(-) > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > index 138f6664b2e2..0082d1e56999 100644 > --- a/Documentation/admin-guide/kernel-parameters.txt > +++ b/Documentation/admin-guide/kernel-parameters.txt > @@ -5102,12 +5102,6 @@ > emulate [default] Vsyscalls turn into traps and are > emulated reasonably safely. > > - native Vsyscalls are native syscall instructions. > - This is a little bit faster than trapping > - and makes a few dynamic recompilers work > - better than they would in emulation mode. > - It also makes exploits much easier to write. > - > none Vsyscalls don't work at all. This makes > them quite hard to use for exploits but > might break your system. > -- > 2.21.0 > -- Kees Cook ^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2019-06-27 17:26 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <cover.1561610354.git.luto@kernel.org>
2019-06-27 4:45 ` [PATCH v2 1/8] x86/vsyscall: Remove the vsyscall=native documentation Andy Lutomirski
2019-06-27 17:26 ` Kees Cook
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox