On Sat, 05 Oct 2024 01:17:18 +0100, Mark Brown wrote:
Add trivial assembly programs which give themselves the appropriate permissions and then execute GCSPUSHM and GCSSTR, they will report errors by generating signals on the non-permitted instructions. Not using libc minimises the interaction with any policy set for the system but we skip on failure to get the permissions in case the system is locked down to make them inaccessible.
[...]
Applied to arm64 (for-next/gcs), thanks!
[1/1] kselftest/arm64: Validate that GCS push and write permissions work https://git.kernel.org/arm64/c/48f8d9cef766