87b526d349
This fixes two issues that could cause incompatibility between kernel versions: - If a tracer uses SECCOMP_RET_TRACE to select a syscall number higher than the largest known syscall, emulate the unknown vsyscall by returning -ENOSYS. (This is unlikely to make a noticeable difference on x86-64 due to the way the system call entry works.) - On x86-64 with vsyscall=emulate, skipped vsyscalls were buggy. This updates the documentation accordingly. Signed-off-by: Andy Lutomirski <luto@amacapital.net> Acked-by: Will Drewry <wad@chromium.org> Signed-off-by: James Morris <james.l.morris@oracle.com> |
||
---|---|---|
.. | ||
disable-tsc-ctxt-sw-stress-test.c | ||
disable-tsc-on-off-stress-test.c | ||
disable-tsc-test.c | ||
no_new_privs.txt | ||
seccomp_filter.txt |