diff options
author | Mark Brown <broonie@kernel.org> | 2024-10-05 03:17:18 +0300 |
---|---|---|
committer | Catalin Marinas <catalin.marinas@arm.com> | 2024-10-16 16:59:50 +0300 |
commit | 48f8d9cef766f8ed4bbccc0d759710262d34f40b (patch) | |
tree | 979d54e3ca499af1204f88b0cafc92c301ad2bca /tools/perf/scripts/python/event_analyzing_sample.py | |
parent | bb9ae1a66c85eeb626864efd812c62026e126ec0 (diff) | |
download | linux-48f8d9cef766f8ed4bbccc0d759710262d34f40b.tar.xz |
kselftest/arm64: Validate that GCS push and write permissions work
Add trivial assembly programs which give themselves the appropriate
permissions and then execute GCSPUSHM and GCSSTR, they will report errors
by generating signals on the non-permitted instructions. Not using libc
minimises the interaction with any policy set for the system but we skip on
failure to get the permissions in case the system is locked down to make
them inaccessible.
Signed-off-by: Mark Brown <broonie@kernel.org>
Link: https://lore.kernel.org/r/20241005-arm64-gcs-test-flags-v1-1-03cb9786c5cd@kernel.org
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions