Patch Series

Subject riscv control-flow integrity for usermode
Author debug@rivosinc.com
Date 2025-10-13 21:55:53 +0000 UTC
Version 20
Cc a.hindborg@kernel.org akpm@linux-foundation.org alex.gaynor@gmail.com alexghiti@rivosinc.com aliceryhl@google.com alistair.francis@wdc.com andybnac@gmail.com aou@eecs.berkeley.edu arnd@arndb.de atishp@rivosinc.com bjorn3_gh@protonmail.com boqun.feng@gmail.com bp@alien8.de brauner@kernel.org broonie@kernel.org charlie@rivosinc.com cleger@rivosinc.com conor@kernel.org corbet@lwn.net dave.hansen@linux.intel.com david@redhat.com debug@rivosinc.com devicetree@vger.kernel.org ebiederm@xmission.com evan@rivosinc.com gary@garyguo.net hpa@zytor.com jannh@google.com jim.shu@sifive.com kees@kernel.org kito.cheng@sifive.com krzk@kernel.org liam.howlett@oracle.com linux-arch@vger.kernel.org linux-doc@vger.kernel.org linux-fsdevel@vger.kernel.org linux-kernel@vger.kernel.org linux-kselftest@vger.kernel.org linux-mm@kvack.org linux-riscv@lists.infradead.org lorenzo.stoakes@oracle.com lossin@kernel.org mingo@redhat.com ojeda@kernel.org oleg@redhat.com palmer@dabbelt.com paul.walmsley@sifive.com peterz@infradead.org richard.henderson@linaro.org rick.p.edgecombe@intel.com robh@kernel.org

Patches (28)

Name Content
[PATCH v20 01/28] mm: VM_SHADOW_STACK definition for riscv [Body]
[PATCH v20 02/28] dt-bindings: riscv: zicfilp and zicfiss in dt-bindings (extensions.yaml) [Body]
[PATCH v20 03/28] riscv: zicfiss / zicfilp enumeration [Body]
[PATCH v20 04/28] riscv: zicfiss / zicfilp extension csr and bit definitions [Body]
[PATCH v20 05/28] riscv: usercfi state for task and save/restore of CSR_SSP on trap entry/exit [Body]
[PATCH v20 06/28] riscv/mm : ensure PROT_WRITE leads to VM_READ | VM_WRITE [Body]
[PATCH v20 07/28] riscv/mm: manufacture shadow stack pte [Body]
[PATCH v20 08/28] riscv/mm: teach pte_mkwrite to manufacture shadow stack PTEs [Body]
[PATCH v20 09/28] riscv/mm: write protect and shadow stack [Body]
[PATCH v20 10/28] riscv/mm: Implement map_shadow_stack() syscall [Body]
[PATCH v20 11/28] riscv/shstk: If needed allocate a new shadow stack on clone [Body]
[PATCH v20 12/28] riscv: Implements arch agnostic shadow stack prctls [Body]
[PATCH v20 13/28] prctl: arch-agnostic prctl for indirect branch tracking [Body]
[PATCH v20 14/28] riscv: Implements arch agnostic indirect branch tracking prctls [Body]
[PATCH v20 15/28] riscv/traps: Introduce software check exception and uprobe handling [Body]
[PATCH v20 16/28] riscv: signal: abstract header saving for setup_sigcontext [Body]
[PATCH v20 17/28] riscv/signal: save and restore of shadow stack for signal [Body]
[PATCH v20 18/28] riscv/kernel: update __show_regs to print shadow stack register [Body]
[PATCH v20 19/28] riscv/ptrace: riscv cfi status and state via ptrace and in core files [Body]
[PATCH v20 20/28] riscv/hwprobe: zicfilp / zicfiss enumeration in hwprobe [Body]
[PATCH v20 21/28] riscv: kernel command line option to opt out of user cfi [Body]
[PATCH v20 22/28] riscv: enable kernel access to shadow stack memory via FWFT sbi call [Body]
[PATCH v20 23/28] arch/riscv: compile vdso with landing pad and shadow stack note [Body]
[PATCH v20 24/28] arch/riscv: dual vdso creation logic and select vdso based on hw [Body]
[PATCH v20 25/28] riscv: create a config for shadow stack and landing pad instr support [Body]
[PATCH v20 26/28] riscv: Documentation for landing pad / indirect branch tracking [Body]
[PATCH v20 27/28] riscv: Documentation for shadow stack on riscv [Body]
[PATCH v20 28/28] kselftest/riscv: kselftest for user mode cfi [Body]

Session 2025-10-13

ID (for dev) 0c66eab5-0b76-4b9d-be56-0eebd3a1d753
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 0d97f2067c166eb495771fede9f7b73999c67f66 [Config] passed [Log]
[KASAN] Boot test: Base 0d97f2067c166eb495771fede9f7b73999c67f66 [Config] passed
[KASAN] Build Patched 0d97f2067c166eb495771fede9f7b73999c67f66 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 0d97f2067c166eb495771fede9f7b73999c67f66 [Config] [patched] passed
[KASAN] Fuzzing 0d97f2067c166eb495771fede9f7b73999c67f66 [Config] 0d97f2067c166eb495771fede9f7b73999c67f66 [Config] [patched] passed [Log] [Artifacts]