cregit-Linux how code gets into the kernel

Release 4.14 arch/x86/include/asm/vsyscall.h

/* SPDX-License-Identifier: GPL-2.0 */
#ifndef _ASM_X86_VSYSCALL_H

#define _ASM_X86_VSYSCALL_H

#include <linux/seqlock.h>
#include <uapi/asm/vsyscall.h>

#ifdef CONFIG_X86_VSYSCALL_EMULATION
extern void map_vsyscall(void);

/*
 * Called on instruction fetch fault in vsyscall page.
 * Returns true if handled.
 */
extern bool emulate_vsyscall(struct pt_regs *regs, unsigned long address);
#else

static inline void map_vsyscall(void) {}

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski8100.00%1100.00%
Total8100.00%1100.00%


static inline bool emulate_vsyscall(struct pt_regs *regs, unsigned long address) { return false; }

Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski19100.00%1100.00%
Total19100.00%1100.00%

#endif #endif /* _ASM_X86_VSYSCALL_H */

Overall Contributors

PersonTokensPropCommitsCommitProp
Andrew Lutomirski4968.06%225.00%
Ingo Molnar79.72%112.50%
Andi Kleen68.33%112.50%
David Howells34.17%112.50%
H. Peter Anvin34.17%112.50%
David Woodhouse34.17%112.50%
Greg Kroah-Hartman11.39%112.50%
Total72100.00%8100.00%
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.