Logo
Explore Help
Register Sign In
Evolution-x-devices/kernel_google_b1c1
2
0
Fork 0
You've already forked kernel_google_b1c1
mirror of https://github.com/Evolution-X-Devices/kernel_google_b1c1 synced 2026-02-13 22:38:07 +00:00
Code Issues Packages Projects Releases Wiki Activity
Files
38da1703060a520e69b00405f9bdf765d1396cd0
kernel_google_b1c1/tools/testing/selftests/user/Makefile

14 lines
282 B
Makefile
Raw Normal View History

test: check copy_to/from_user boundary validation To help avoid an architecture failing to correctly check kernel/user boundaries when handling copy_to_user, copy_from_user, put_user, or get_user, perform some simple tests and fail to load if any of them behave unexpectedly. Specifically, this is to make sure there is a way to notice if things like what was fixed in commit 8404663f81d2 ("ARM: 7527/1: uaccess: explicitly check __user pointer when !CPU_USE_DOMAINS") ever regresses again, for any architecture. Additionally, adds new "user" selftest target, which loads this module. Signed-off-by: Kees Cook <keescook@chromium.org> Cc: Rusty Russell <rusty@rustcorp.com.au> Cc: Joe Perches <joe@perches.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2014-01-23 15:54:38 -08:00
# Makefile for user memory selftests
# No binaries, but make sure arg-less "make" doesn't trigger "run_tests"
all:
run_tests: all
@if /sbin/modprobe test_user_copy ; then \
rmmod test_user_copy; \
echo "user_copy: ok"; \
else \
echo "user_copy: [FAIL]"; \
exit 1; \
fi
Reference in New Issue Copy Permalink
Powered by Gitea Version: 1.25.3 Page: 1926ms Template: 1ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API