diff options
author | Andy Lutomirski <[email protected]> | 2019-11-20 11:58:32 -0800 |
---|---|---|
committer | Peter Zijlstra <[email protected]> | 2019-11-21 21:55:59 +0100 |
commit | 4d2fa82d98d2d296043a04eb517d7dbade5b13b8 (patch) | |
tree | 22cbeb0e35d67cd39a7b3d9bdb8550e3d535f322 /tools/perf/util/trace-event-scripting.c | |
parent | 8caa016bfc129f2c925d52da43022171d1d1de91 (diff) |
selftests/x86/sigreturn/32: Invalidate DS and ES when abusing the kernel
If the kernel accidentally uses DS or ES while the user values are
loaded, it will work fine for sane userspace. In the interest of
simulating maximally insane userspace, make sigreturn_32 zero out DS
and ES for the nasty parts so that inadvertent use of these segments
will crash.
Signed-off-by: Andy Lutomirski <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Cc: [email protected]
Diffstat (limited to 'tools/perf/util/trace-event-scripting.c')
0 files changed, 0 insertions, 0 deletions