<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>81510a0e - selftests/proc: add PROCMAP_QUERY ioctl tests</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#81510a0e</link>
        <description>selftests/proc: add PROCMAP_QUERY ioctl testsExtend existing proc-pid-vm.c tests with PROCMAP_QUERY ioctl() API.  Testa few successful and negative cases, validating querying filtering andexact vs next VMA logic works as expected.Link: https://lkml.kernel.org/r/20240627170900.1672542-7-andrii@kernel.orgSigned-off-by: Andrii Nakryiko &lt;andrii@kernel.org&gt;Acked-by: Liam R. Howlett &lt;Liam.Howlett@Oracle.com&gt;Cc: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;Cc: Christian Brauner &lt;brauner@kernel.org&gt;Cc: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Cc: Mike Rapoport (IBM) &lt;rppt@kernel.org&gt;Cc: Suren Baghdasaryan &lt;surenb@google.com&gt;Cc: Andi Kleen &lt;ak@linux.intel.com&gt;Cc: Arnd Bergmann &lt;arnd@arndb.de&gt;Cc: Stephen Rothwell &lt;sfr@canb.auug.org.au&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Thu, 27 Jun 2024 17:08:58 +0000</pubDate>
        <dc:creator>Andrii Nakryiko &lt;andrii@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cc937dad - selftests: centralize -D_GNU_SOURCE= to CFLAGS in lib.mk</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#cc937dad</link>
        <description>selftests: centralize -D_GNU_SOURCE= to CFLAGS in lib.mkCentralize the _GNU_SOURCE definition to CFLAGS in lib.mk.  Removeredundant defines from Makefiles that import lib.mk.  Convert any usage of&quot;#define _GNU_SOURCE 1&quot; to &quot;#define _GNU_SOURCE&quot;.This uses the form &quot;-D_GNU_SOURCE=&quot;, which is equivalent to&quot;#define _GNU_SOURCE&quot;.Otherwise using &quot;-D_GNU_SOURCE&quot; is equivalent to &quot;-D_GNU_SOURCE=1&quot; and&quot;#define _GNU_SOURCE 1&quot;, which is less commonly seen in source code andwould require many changes in selftests to avoid redefinition warnings.Link: https://lkml.kernel.org/r/20240625223454.1586259-2-edliaw@google.comSigned-off-by: Edward Liaw &lt;edliaw@google.com&gt;Suggested-by: John Hubbard &lt;jhubbard@nvidia.com&gt;Acked-by: Shuah Khan &lt;skhan@linuxfoundation.org&gt;Reviewed-by: Muhammad Usama Anjum &lt;usama.anjum@collabora.com&gt;Cc: Albert Ou &lt;aou@eecs.berkeley.edu&gt;Cc: Andr&#233; Almeida &lt;andrealmeid@igalia.com&gt;Cc: Darren Hart &lt;dvhart@infradead.org&gt;Cc: Dave Hansen &lt;dave.hansen@linux.intel.com&gt;Cc: Davidlohr Bueso &lt;dave@stgolabs.net&gt;Cc: David S. Miller &lt;davem@davemloft.net&gt;Cc: Eric Dumazet &lt;edumazet@google.com&gt;Cc: Eric W. Biederman &lt;ebiederm@xmission.com&gt;Cc: Fenghua Yu &lt;fenghua.yu@intel.com&gt;Cc: Ingo Molnar &lt;mingo@redhat.com&gt;Cc: Jakub Kicinski &lt;kuba@kernel.org&gt;Cc: Jarkko Sakkinen &lt;jarkko@kernel.org&gt;Cc: Jason Gunthorpe &lt;jgg@ziepe.ca&gt;Cc: Kees Cook &lt;kees@kernel.org&gt;Cc: Kevin Tian &lt;kevin.tian@intel.com&gt;Cc: Palmer Dabbelt &lt;palmer@dabbelt.com&gt;Cc: Paolo Abeni &lt;pabeni@redhat.com&gt;Cc: Paolo Bonzini &lt;pbonzini@redhat.com&gt;Cc: Paul Walmsley &lt;paul.walmsley@sifive.com&gt;Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;Cc: Reinette Chatre &lt;reinette.chatre@intel.com&gt;Cc: Sean Christopherson &lt;seanjc@google.com&gt;Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 25 Jun 2024 22:34:45 +0000</pubDate>
        <dc:creator>Edward Liaw &lt;edliaw@google.com&gt;</dc:creator>
    </item>
<item>
        <title>e7679a5c - proc: test &quot;Kthread:&quot; field</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#e7679a5c</link>
        <description>proc: test &quot;Kthread:&quot; field/proc/${pid}/status got Kthread field recently.Test that userspace program is not reported as kernel thread.Test that kernel thread is reported as kernel thread.Use kthreadd with pid 2 for this.Link: https://lkml.kernel.org/r/818c4c41-8668-4566-97a9-7254abf819ee@p183Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Chunguang Wu &lt;fullspring2018@gmail.com&gt;Cc: Shuah Khan &lt;shuah@kernel.org&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Fri, 07 Jun 2024 15:14:29 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>5bc73bb3 - proc: test how it holds up with mapping&apos;less process</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#5bc73bb3</link>
        <description>proc: test how it holds up with mapping&apos;less processCreate process without mappings and check	/proc/*/maps	/proc/*/numa_maps	/proc/*/smaps	/proc/*/smaps_rollupThey must be empty (excluding vsyscall page) or full of zeroes.Retroactively this test should&apos;ve caught embarassing /proc/*/smaps_rollupoops:[17752.703567] BUG: kernel NULL pointer dereference, address: 0000000000000000[17752.703580] #PF: supervisor read access in kernel mode[17752.703583] #PF: error_code(0x0000) - not-present page[17752.703587] PGD 0 P4D 0[17752.703593] Oops: 0000 [#1] PREEMPT SMP PTI[17752.703598] CPU: 0 PID: 60649 Comm: cat Tainted: G        W         5.19.9-100.fc35.x86_64 #1[17752.703603] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./X99 Extreme6/3.1, BIOS P3.30 08/05/2016[17752.703607] RIP: 0010:show_smaps_rollup+0x159/0x2e0Note 1:	ProtectionKey field in /proc/*/smaps is optional,	so check most of its contents, not everything.Note 2:	due to the nature of this test, child process hardly can signal	its readiness (after unmapping everything!) to parent.	I feel like &quot;sleep(1)&quot; is justified.	If you know how to do it without sleep please tell me.Note 3:	/proc/*/statm is not tested but can be.Link: https://lkml.kernel.org/r/Yz3liL6Dn+n2SD8Q@localhost.localdomainSigned-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Wed, 05 Oct 2022 20:14:00 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>0658a096 - procfs: do not list TID 0 in /proc/&lt;pid&gt;/task</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#0658a096</link>
        <description>procfs: do not list TID 0 in /proc/&lt;pid&gt;/taskIf a task exits concurrently, task_pid_nr_ns may return 0.[akpm@linux-foundation.org: coding style tweaks][adobriyan@gmail.com: test that /proc/*/task doesn&apos;t contain &quot;0&quot;]  Link: https://lkml.kernel.org/r/YV88AnVzHxPafQ9o@localhost.localdomainLink: https://lkml.kernel.org/r/8735pn5dx7.fsf@oldenburg.str.redhat.comSigned-off-by: Florian Weimer &lt;fweimer@redhat.com&gt;Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Acked-by: Christian Brauner &lt;christian.brauner@ubuntu.com&gt;Reviewed-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Kees Cook &lt;keescook@chromium.org&gt;Cc: &quot;Eric W. Biederman&quot; &lt;ebiederm@xmission.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 09 Nov 2021 02:31:30 +0000</pubDate>
        <dc:creator>Florian Weimer &lt;fweimer@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>268af17a - selftests: proc: test subset=pid</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#268af17a</link>
        <description>selftests: proc: test subset=pidTest that /proc instance mounted with	mount -t proc -o subset=pidcontains only &quot;.&quot;, &quot;..&quot;, &quot;self&quot;, &quot;thread-self&quot; and pid directories.Note:Currently &quot;subset=pid&quot; doesn&apos;t return &quot;.&quot; and &quot;..&quot; via readdir.This must be a bug.Link: https://lkml.kernel.org/r/YFYZZ7WGaZlsnChS@localhost.localdomainSigned-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Acked-by: Alexey Gladkov &lt;gladkov.alexey@gmail.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Fri, 07 May 2021 01:02:21 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>1c6c4d11 - proc: use human-readable values for hidepid</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#1c6c4d11</link>
        <description>proc: use human-readable values for hidepidThe hidepid parameter values are becoming more and more and it becomesdifficult to remember what each new magic number means.Backward compatibility is preserved since it is possible to specifynumerical value for the hidepid parameter. This does not break thefsconfig since it is not possible to specify a numerical value throughit. All numeric values are converted to a string. The typeFSCONFIG_SET_BINARY cannot be used to indicate a numerical value.Selftest has been added to verify this behavior.Suggested-by: Andy Lutomirski &lt;luto@kernel.org&gt;Signed-off-by: Alexey Gladkov &lt;gladkov.alexey@gmail.com&gt;Reviewed-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt;Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Sun, 19 Apr 2020 14:10:56 +0000</pubDate>
        <dc:creator>Alexey Gladkov &lt;gladkov.alexey@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>fa10fed3 - proc: allow to mount many instances of proc in one pid namespace</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#fa10fed3</link>
        <description>proc: allow to mount many instances of proc in one pid namespaceThis patch allows to have multiple procfs instances inside thesame pid namespace. The aim here is lightweight sandboxes, and to allowthat we have to modernize procfs internals.1) The main aim of this work is to have on embedded systems onesupervisor for apps. Right now we have some lightweight sandbox support,however if we create pid namespacess we have to manages all theprocesses inside too, where our goal is to be able to run a bunch ofapps each one inside its own mount namespace without being able tonotice each other. We only want to use mount namespaces, and we wantprocfs to behave more like a real mount point.2) Linux Security Modules have multiple ptrace paths inside somesubsystems, however inside procfs, the implementation does not guaranteethat the ptrace() check which triggers the security_ptrace_check() hookwill always run. We have the &apos;hidepid&apos; mount option that can be used toforce the ptrace_may_access() check inside has_pid_permissions() to run.The problem is that &apos;hidepid&apos; is per pid namespace and not attached tothe mount point, any remount or modification of &apos;hidepid&apos; will propagateto all other procfs mounts.This also does not allow to support Yama LSM easily in desktop and usersessions. Yama ptrace scope which restricts ptrace and some othersyscalls to be allowed only on inferiors, can be updated to have aper-task context, where the context will be inherited during fork(),clone() and preserved across execve(). If we support multiple privateprocfs instances, then we may force the ptrace_may_access() on/proc/&lt;pids&gt;/ to always run inside that new procfs instances. This willallow to specifiy on user sessions if we should populate procfs withpids that the user can ptrace or not.By using Yama ptrace scope, some restricted users will only be able to seeinferiors inside /proc, they won&apos;t even be able to see their otherprocesses. Some software like Chromium, Firefox&apos;s crash handler, Wineand others are already using Yama to restrict which processes can beptracable. With this change this will give the possibility to restrict/proc/&lt;pids&gt;/ but more importantly this will give desktop users ageneric and usuable way to specifiy which users should see all processesand which users can not.Side notes:* This covers the lack of seccomp where it is not able to parsearguments, it is easy to install a seccomp filter on direct syscallsthat operate on pids, however /proc/&lt;pid&gt;/ is a Linux ABI usingfilesystem syscalls. With this change LSMs should be able to analyzeopen/read/write/close...In the new patch set version I removed the &apos;newinstance&apos; optionas suggested by Eric W. Biederman.Selftest has been added to verify new behavior.Signed-off-by: Alexey Gladkov &lt;gladkov.alexey@gmail.com&gt;Reviewed-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt;Signed-off-by: Eric W. Biederman &lt;ebiederm@xmission.com&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Sun, 19 Apr 2020 14:10:52 +0000</pubDate>
        <dc:creator>Alexey Gladkov &lt;gladkov.alexey@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>7dbbade1 - proc: test /proc/sysvipc vs setns(CLONE_NEWIPC)</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#7dbbade1</link>
        <description>proc: test /proc/sysvipc vs setns(CLONE_NEWIPC)I thought that /proc/sysvipc has the same bug as /proc/net	commit 1fde6f21d90f8ba5da3cb9c54ca991ed72696c43	proc: fix /proc/net/* after setns(2)However, it doesn&apos;t! /proc/sysvipc files do	get_ipc_ns(current-&gt;nsproxy-&gt;ipc_ns);in their open() hook and avoid the problem.Keep the test, maybe /proc/sysvipc will become broken someday :-\Link: http://lkml.kernel.org/r/20190706180146.GA21015@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 16 Jul 2019 23:26:48 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>ec8f24b7 - treewide: Add SPDX license identifier - Makefile/Kconfig</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#ec8f24b7</link>
        <description>treewide: Add SPDX license identifier - Makefile/KconfigAdd SPDX license identifiers to all Make/Kconfig files which: - Have no license information of any formThese files fall under the project license, GPL v2 only. The resulting SPDXlicense identifier is:  GPL-2.0-onlySigned-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Sun, 19 May 2019 12:07:45 +0000</pubDate>
        <dc:creator>Thomas Gleixner &lt;tglx@linutronix.de&gt;</dc:creator>
    </item>
<item>
        <title>e483b020 - proc: test /proc/*/maps, smaps, smaps_rollup, statm</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#e483b020</link>
        <description>proc: test /proc/*/maps, smaps, smaps_rollup, statmStart testing VM related fiels found in per-process files.Do it by jiting small executable which brings its address space toprecisely known state, then comparing /proc/*/maps, smaps, smaps_rollup,and statm files to expected values.Currently only x86_64 is supported.[adobriyan@gmail.com: exit correctly in /proc/*/maps test]  Link: http://lkml.kernel.org/r/20190206073659.GB15311@avx2Link: http://lkml.kernel.org/r/20190203165806.GA14568@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Shuah Khan &lt;shuah@kernel.org&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 05 Mar 2019 23:50:39 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>1fde6f21 - proc: fix /proc/net/* after setns(2)</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#1fde6f21</link>
        <description>proc: fix /proc/net/* after setns(2)/proc entries under /proc/net/* can&apos;t be cached into dcache becausesetns(2) can change current net namespace.[akpm@linux-foundation.org: coding-style fixes][akpm@linux-foundation.org: avoid vim miscolorization][adobriyan@gmail.com: write test, add dummy -&gt;d_revalidate hook: necessary if /proc/net/* is pinned at setns time]  Link: http://lkml.kernel.org/r/20190108192350.GA12034@avx2Link: http://lkml.kernel.org/r/20190107162336.GA9239@avx2Fixes: 1da4d377f943fe4194ffb9fb9c26cc58fad4dd24 (&quot;proc: revalidate misc dentries&quot;)Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Reported-by: Mateusz St&#281;pie&#324; &lt;mateusz.stepien@netrounds.com&gt;Reported-by: Ahmad Fatoum &lt;a.fatoum@pengutronix.de&gt;Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Fri, 01 Feb 2019 22:20:01 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>2cd36fb3 - proc: test /proc/thread-self symlink</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#2cd36fb3</link>
        <description>proc: test /proc/thread-self symlinkSame story: I have WIP patch to make it faster, so better have a testas well.Link: http://lkml.kernel.org/r/20180627195209.GC18113@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Shuah Khan &lt;shuahkh@osg.samsung.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Wed, 22 Aug 2018 04:54:20 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>61d47c4e - proc: test /proc/self symlink</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#61d47c4e</link>
        <description>proc: test /proc/self symlinkThere are plans to change how /proc/self result is calculated,for that a test is necessary.Use direct system call because of this whole getpid caching story.Link: http://lkml.kernel.org/r/20180627195103.GB18113@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Shuah Khan &lt;shuahkh@osg.samsung.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Wed, 22 Aug 2018 04:54:16 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>b2f5de03 - tools/testing/selftests/proc: test /proc/*/fd a bit (+ PF_KTHREAD is ABI!)</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#b2f5de03</link>
        <description>tools/testing/selftests/proc: test /proc/*/fd a bit (+ PF_KTHREAD is ABI!)* Test lookup in /proc/self/fd.  &quot;map_files&quot; lookup story showed that lookup is not that simple.* Test that all those symlinks open the same file.  Check with (st_dev, st_info).* Test that kernel threads do not have anything in their /proc/*/fd/  directory.Now this is where things get interesting.First, kernel threads aren&apos;t pinned by /proc/self or equivalent,thus some &quot;atomicity&quot; is required.Second, -&gt;comm can contain whitespace and &apos;)&apos;.No, they are not escaped.Third, the only reliable way to check if process is kernel threadappears to be field #9 in /proc/*/stat.This field is struct task_struct::flags in decimal!Check is done by testing PF_KTHREAD flags like we do in kernel.	PF_KTREAD value is a part of userspace ABI !!!Other methods for determining kernel threadness are not reliable:* RSS can be 0 if everything is swapped, even while reading  from /proc/self.* -&gt;total_vm CAN BE ZERO if process is finishing	munmap(NULL, whole address space);* /proc/*/maps and similar files can be empty because unmapping  everything works. Read returning 0 can&apos;t distinguish between  kernel thread and such suicide process.Link: http://lkml.kernel.org/r/20180505000414.GA15090@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Fri, 08 Jun 2018 00:10:20 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>1f5bd054 - proc: selftests: test /proc/uptime</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#1f5bd054</link>
        <description>proc: selftests: test /proc/uptimeThe only tests I could come up with for /proc/uptime are: - test that values increase monotonically for 1 second, - bounce around CPUs and test the same thing.Avoid glibc like plague for affinity given patches like this:https://marc.info/?l=linux-kernel&amp;m=152130031912594&amp;w=4Link: http://lkml.kernel.org/r/20180317165235.GB3445@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Shuah Khan &lt;shuah@kernel.org&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 10 Apr 2018 23:43:28 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>05c3f292 - proc: selftests: shotgun testing of read/readdir/readlink/write</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#05c3f292</link>
        <description>proc: selftests: shotgun testing of read/readdir/readlink/writePerform reads with nearly everything in /proc, and some writing as well.Hopefully memleak checkers and KASAN will find something.[adobriyan@gmail.com: /proc/kmsg can and will block if read under root]  Link: http://lkml.kernel.org/r/20180316232147.GA20146@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;[adobriyan@gmail.com: /proc/sysrq-trigger lives on the ground floor]  Link: http://lkml.kernel.org/r/20180317164911.GA3445@avx2Link: http://lkml.kernel.org/r/20180315201251.GA12396@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 10 Apr 2018 23:46:19 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>5de3d401 - proc: add selftest for last field of /proc/loadavg</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#5de3d401</link>
        <description>proc: add selftest for last field of /proc/loadavgTest fork counter formerly known as -&gt;last_pid, the only part of/proc/loadavg which can be tested.Testing in init pid namespace is not reliable because of backgroundactivity.Link: http://lkml.kernel.org/r/20180311152241.GA26247@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Shuah Khan &lt;shuah@kernel.org&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 10 Apr 2018 23:42:23 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>35318db5 - proc: fix /proc/*/map_files lookup some more</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#35318db5</link>
        <description>proc: fix /proc/*/map_files lookup some moreI totally forgot that _parse_integer() accepts arbitrary amount ofleading zeroes leading to the following lookups:		OK	# readlink /proc/1/map_files/56427ecba000-56427eddc000	/lib/systemd/systemd		bogus	# readlink /proc/1/map_files/00000000000056427ecba000-56427eddc000	/lib/systemd/systemd	# readlink /proc/1/map_files/56427ecba000-00000000000056427eddc000	/lib/systemd/systemdLink: http://lkml.kernel.org/r/20180303215130.GA23480@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Reviewed-by: Cyrill Gorcunov &lt;gorcunov@gmail.com&gt;Reviewed-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Cc: Pavel Emelyanov &lt;xemul@virtuozzo.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 10 Apr 2018 23:41:14 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>c4219edf - proc: test /proc/self/syscall</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/proc/Makefile#c4219edf</link>
        <description>proc: test /proc/self/syscallRead from /proc/self/syscall should yield read system call and correctargs in the output as current is reading /proc/self/syscall.Link: http://lkml.kernel.org/r/20180226212145.GB742@avx2Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;Cc: Shuah Khan &lt;shuah@kernel.org&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/proc/Makefile</description>
        <pubDate>Tue, 10 Apr 2018 23:31:48 +0000</pubDate>
        <dc:creator>Alexey Dobriyan &lt;adobriyan@gmail.com&gt;</dc:creator>
    </item>
</channel>
</rss>
