summaryrefslogtreecommitdiffstats
path: root/tools
diff options
context:
space:
mode:
authorPalmer Dabbelt <palmerdabbelt@google.com>2020-10-04 10:14:53 -0700
committerPalmer Dabbelt <palmerdabbelt@google.com>2020-10-04 10:14:53 -0700
commiteee4e23099c37b4e273c583ec8bb0415ad7eba32 (patch)
tree7f141b8697112d23f0e88b3ddd1f0252adb53e65 /tools
parentde22d2107ced3cc5355cc9dbbd85e44183546bd5 (diff)
parent5ae4998b5d6fc703a16c9fa935fb7d335843bf22 (diff)
downloadlinux-stable-eee4e23099c37b4e273c583ec8bb0415ad7eba32.tar.gz
linux-stable-eee4e23099c37b4e273c583ec8bb0415ad7eba32.tar.bz2
linux-stable-eee4e23099c37b4e273c583ec8bb0415ad7eba32.zip
Merge branch 'base.set_fs' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs into for-next
This is a dependency for Christoph's removal of set_fs. * 'base.set_fs' of ssh://gitolite.kernel.org/pub/scm/linux/kernel/git/viro/vfs: powerpc: remove address space overrides using set_fs() powerpc: use non-set_fs based maccess routines x86: remove address space overrides using set_fs() x86: make TASK_SIZE_MAX usable from assembly code x86: move PAGE_OFFSET, TASK_SIZE & friends to page_{32,64}_types.h lkdtm: remove set_fs-based tests test_bitmap: remove user bitmap tests uaccess: add infrastructure for kernel builds with set_fs() fs: don't allow splice read/write without explicit ops fs: don't allow kernel reads and writes without iter ops sysctl: Convert to iter interfaces proc: add a read_iter method to proc proc_ops proc: cleanup the compat vs no compat file ops proc: remove a level of indentation in proc_get_inode
Diffstat (limited to 'tools')
-rw-r--r--tools/testing/selftests/lkdtm/tests.txt2
1 files changed, 0 insertions, 2 deletions
diff --git a/tools/testing/selftests/lkdtm/tests.txt b/tools/testing/selftests/lkdtm/tests.txt
index 9d266e79c6a2..74a8d329a72c 100644
--- a/tools/testing/selftests/lkdtm/tests.txt
+++ b/tools/testing/selftests/lkdtm/tests.txt
@@ -9,7 +9,6 @@ EXCEPTION
#CORRUPT_STACK_STRONG Crashes entire system on success
CORRUPT_LIST_ADD list_add corruption
CORRUPT_LIST_DEL list_del corruption
-CORRUPT_USER_DS Invalid address limit on user-mode return
STACK_GUARD_PAGE_LEADING
STACK_GUARD_PAGE_TRAILING
UNSET_SMEP CR4 bits went missing
@@ -67,6 +66,5 @@ USERCOPY_STACK_FRAME_TO
USERCOPY_STACK_FRAME_FROM
USERCOPY_STACK_BEYOND
USERCOPY_KERNEL
-USERCOPY_KERNEL_DS
STACKLEAK_ERASING OK: the rest of the thread stack is properly erased
CFI_FORWARD_PROTO