summaryrefslogtreecommitdiff
path: root/arch/arc
diff options
context:
space:
mode:
authorAndy Lutomirski <luto@kernel.org>2018-06-26 22:17:17 -0700
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2018-08-24 13:26:56 +0200
commit9a406f22b050bd41e803ede3ced9750d6eeaf61f (patch)
treeb0aeb233104c5cc6f3d39425a55d9a02ac4c5d55 /arch/arc
parent7cef243ef30b20c9ba802af138e0fa1c3e5d0ebc (diff)
selftests/x86/sigreturn/64: Fix spurious failures on AMD CPUs
[ Upstream commit ec348020566009d3da9b99f07c05814d13969c78 ] When I wrote the sigreturn test, I didn't realize that AMD's busted IRET behavior was different from Intel's busted IRET behavior: On AMD CPUs, the CPU leaks the high 32 bits of the kernel stack pointer to certain userspace contexts. Gee, thanks. There's very little the kernel can do about it. Modify the test so it passes. Signed-off-by: Andy Lutomirski <luto@kernel.org> Cc: Borislav Petkov <bp@alien8.de> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Thomas Gleixner <tglx@linutronix.de> Link: http://lkml.kernel.org/r/86e7fd3564497f657de30a36da4505799eebef01.1530076529.git.luto@kernel.org Signed-off-by: Ingo Molnar <mingo@kernel.org> Signed-off-by: Sasha Levin <alexander.levin@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'arch/arc')
0 files changed, 0 insertions, 0 deletions