diff options
author | Nir Lichtman <nir@lichtman.org> | 2024-06-19 23:45:14 +0200 |
---|---|---|
committer | Jonathan Corbet <corbet@lwn.net> | 2024-06-27 00:55:49 +0200 |
commit | 27a0781a31ef8ed5c98a6b59db4349b0f8a57a41 (patch) | |
tree | 769550d35bf99658ce334d0d2e218044da67a97f /Documentation/mm | |
parent | docs: verify/bisect: Fix rendered version URL (diff) | |
download | linux-27a0781a31ef8ed5c98a6b59db4349b0f8a57a41.tar.xz linux-27a0781a31ef8ed5c98a6b59db4349b0f8a57a41.zip |
Documentation: English corrections in vmalloced kernel stacks
Minor grammar fixes in vmalloced-kernel-stacks
Signed-off-by: Nir Lichtman <nir@lichtman.org>
Reviewed-by: Randy Dunlap <rdunlap@infradead.org>
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Link: https://lore.kernel.org/r/20240619215944.GA3571421@lichtman.org
Diffstat (limited to 'Documentation/mm')
-rw-r--r-- | Documentation/mm/vmalloced-kernel-stacks.rst | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/Documentation/mm/vmalloced-kernel-stacks.rst b/Documentation/mm/vmalloced-kernel-stacks.rst index fc8c67833af6..4edca515bfd7 100644 --- a/Documentation/mm/vmalloced-kernel-stacks.rst +++ b/Documentation/mm/vmalloced-kernel-stacks.rst @@ -22,7 +22,7 @@ Kernel stack overflows are often hard to debug and make the kernel susceptible to exploits. Problems could show up at a later time making it difficult to isolate and root-cause. -Virtually-mapped kernel stacks with guard pages causes kernel stack +Virtually mapped kernel stacks with guard pages cause kernel stack overflows to be caught immediately rather than causing difficult to diagnose corruptions. @@ -57,7 +57,7 @@ enable this bool configuration option. The requirements are: VMAP_STACK ---------- -VMAP_STACK bool configuration option when enabled allocates virtually +When enabled, the VMAP_STACK bool configuration option allocates virtually mapped task stacks. This option depends on HAVE_ARCH_VMAP_STACK. - Enable this if you want the use virtually-mapped kernel stacks @@ -83,7 +83,7 @@ the latest code base: Allocation ----------- -When a new kernel thread is created, thread stack is allocated from +When a new kernel thread is created, a thread stack is allocated from virtually contiguous memory pages from the page level allocator. These pages are mapped into contiguous kernel virtual space with PAGE_KERNEL protections. @@ -103,8 +103,8 @@ with PAGE_KERNEL protections. - This does not address interrupt stacks - according to the original patch Thread stack allocation is initiated from clone(), fork(), vfork(), -kernel_thread() via kernel_clone(). Leaving a few hints for searching -the code base to understand when and how thread stack is allocated. +kernel_thread() via kernel_clone(). These are a few hints for searching +the code base to understand when and how a thread stack is allocated. Bulk of the code is in: `kernel/fork.c <https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/kernel/fork.c>`. |