Full emulation


vsyscall table for legacy applications
└─>Full emulation
In linux kernel since version 3.10 (release Date: 2013-06-30)  
The kernel traps and emulates calls into the fixed vsyscall
address mapping. This makes the mapping non-executable, but
it still contains readable known contents, which could be
used in certain rare security vulnerability exploits. This
configuration is recommended when using legacy userspace
that still uses vsyscalls along with legacy binary
instrumentation tools that require code to be readable.

An example of this type of legacy userspace is running
Pin on an old binary that still uses vsyscalls.