On Sat, 05 Oct 2024 01:17:18 +0100, Mark Brown wrote: > Add trivial assembly programs which give themselves the appropriate > permissions and then execute GCSPUSHM and GCSSTR, they will report errors > by generating signals on the non-permitted instructions. Not using libc > minimises the interaction with any policy set for the system but we skip on > failure to get the permissions in case the system is locked down to make > them inaccessible. > > [...] Applied to arm64 (for-next/gcs), thanks! [1/1] kselftest/arm64: Validate that GCS push and write permissions work https://git.kernel.org/arm64/c/48f8d9cef766 -- Catalin