diff options
author | Palmer Dabbelt <palmerdabbelt@google.com> | 2020-10-04 10:14:53 -0700 |
---|---|---|
committer | Palmer Dabbelt <palmerdabbelt@google.com> | 2020-10-04 10:14:53 -0700 |
commit | eee4e23099c37b4e273c583ec8bb0415ad7eba32 (patch) | |
tree | 7f141b8697112d23f0e88b3ddd1f0252adb53e65 /tools | |
parent | de22d2107ced3cc5355cc9dbbd85e44183546bd5 (diff) | |
parent | 5ae4998b5d6fc703a16c9fa935fb7d335843bf22 (diff) | |
download | linux-stable-eee4e23099c37b4e273c583ec8bb0415ad7eba32.tar.gz linux-stable-eee4e23099c37b4e273c583ec8bb0415ad7eba32.tar.bz2 linux-stable-eee4e23099c37b4e273c583ec8bb0415ad7eba32.zip |
Merge branch 'base.set_fs' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs into for-next
This is a dependency for Christoph's removal of set_fs.
* 'base.set_fs' of ssh://gitolite.kernel.org/pub/scm/linux/kernel/git/viro/vfs:
powerpc: remove address space overrides using set_fs()
powerpc: use non-set_fs based maccess routines
x86: remove address space overrides using set_fs()
x86: make TASK_SIZE_MAX usable from assembly code
x86: move PAGE_OFFSET, TASK_SIZE & friends to page_{32,64}_types.h
lkdtm: remove set_fs-based tests
test_bitmap: remove user bitmap tests
uaccess: add infrastructure for kernel builds with set_fs()
fs: don't allow splice read/write without explicit ops
fs: don't allow kernel reads and writes without iter ops
sysctl: Convert to iter interfaces
proc: add a read_iter method to proc proc_ops
proc: cleanup the compat vs no compat file ops
proc: remove a level of indentation in proc_get_inode
Diffstat (limited to 'tools')
-rw-r--r-- | tools/testing/selftests/lkdtm/tests.txt | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/tools/testing/selftests/lkdtm/tests.txt b/tools/testing/selftests/lkdtm/tests.txt index 9d266e79c6a2..74a8d329a72c 100644 --- a/tools/testing/selftests/lkdtm/tests.txt +++ b/tools/testing/selftests/lkdtm/tests.txt @@ -9,7 +9,6 @@ EXCEPTION #CORRUPT_STACK_STRONG Crashes entire system on success CORRUPT_LIST_ADD list_add corruption CORRUPT_LIST_DEL list_del corruption -CORRUPT_USER_DS Invalid address limit on user-mode return STACK_GUARD_PAGE_LEADING STACK_GUARD_PAGE_TRAILING UNSET_SMEP CR4 bits went missing @@ -67,6 +66,5 @@ USERCOPY_STACK_FRAME_TO USERCOPY_STACK_FRAME_FROM USERCOPY_STACK_BEYOND USERCOPY_KERNEL -USERCOPY_KERNEL_DS STACKLEAK_ERASING OK: the rest of the thread stack is properly erased CFI_FORWARD_PROTO |