Patch Series

Subject riscv control-flow integrity for usermode
Author devnull@kernel.org
Date 2025-10-23 16:51:06 +0000 UTC
Version 22
Cc a.hindborg@kernel.org akpm@linux-foundation.org alex.gaynor@gmail.com alexghiti@rivosinc.com aliceryhl@google.com alistair.francis@wdc.com andybnac@gmail.com aou@eecs.berkeley.edu arnd@arndb.de atishp@rivosinc.com bjorn3_gh@protonmail.com boqun.feng@gmail.com bp@alien8.de brauner@kernel.org broonie@kernel.org charlie@rivosinc.com cleger@rivosinc.com cmirabil@redhat.com conor@kernel.org corbet@lwn.net dave.hansen@linux.intel.com david@redhat.com debug@rivosinc.com devicetree@vger.kernel.org devnull@kernel.org ebiederm@xmission.com evan@rivosinc.com gary@garyguo.net hpa@zytor.com jannh@google.com jim.shu@sifive.com kees@kernel.org kito.cheng@sifive.com krzk@kernel.org liam.howlett@oracle.com linux-arch@vger.kernel.org linux-doc@vger.kernel.org linux-fsdevel@vger.kernel.org linux-kernel@vger.kernel.org linux-kselftest@vger.kernel.org linux-mm@kvack.org linux-riscv@lists.infradead.org lorenzo.stoakes@oracle.com lossin@kernel.org mingo@redhat.com ojeda@kernel.org oleg@redhat.com palmer@dabbelt.com paul.walmsley@sifive.com peterz@infradead.org richard.henderson@linaro.org rick.p.edgecombe@intel.com

Patches (28)

Name Content
[PATCH v22 01/28] mm: VM_SHADOW_STACK definition for riscv [Body]
[PATCH v22 02/28] dt-bindings: riscv: zicfilp and zicfiss in dt-bindings (extensions.yaml) [Body]
[PATCH v22 03/28] riscv: zicfiss / zicfilp enumeration [Body]
[PATCH v22 04/28] riscv: zicfiss / zicfilp extension csr and bit definitions [Body]
[PATCH v22 05/28] riscv: usercfi state for task and save/restore of CSR_SSP on trap entry/exit [Body]
[PATCH v22 06/28] riscv/mm : ensure PROT_WRITE leads to VM_READ | VM_WRITE [Body]
[PATCH v22 07/28] riscv/mm: manufacture shadow stack pte [Body]
[PATCH v22 08/28] riscv/mm: teach pte_mkwrite to manufacture shadow stack PTEs [Body]
[PATCH v22 09/28] riscv/mm: write protect and shadow stack [Body]
[PATCH v22 10/28] riscv/mm: Implement map_shadow_stack() syscall [Body]
[PATCH v22 11/28] riscv/shstk: If needed allocate a new shadow stack on clone [Body]
[PATCH v22 12/28] riscv: Implements arch agnostic shadow stack prctls [Body]
[PATCH v22 13/28] prctl: arch-agnostic prctl for indirect branch tracking [Body]
[PATCH v22 14/28] riscv: Implements arch agnostic indirect branch tracking prctls [Body]
[PATCH v22 15/28] riscv/traps: Introduce software check exception and uprobe handling [Body]
[PATCH v22 16/28] riscv: signal: abstract header saving for setup_sigcontext [Body]
[PATCH v22 17/28] riscv/signal: save and restore of shadow stack for signal [Body]
[PATCH v22 18/28] riscv/kernel: update __show_regs to print shadow stack register [Body]
[PATCH v22 19/28] riscv/ptrace: riscv cfi status and state via ptrace and in core files [Body]
[PATCH v22 20/28] riscv/hwprobe: zicfilp / zicfiss enumeration in hwprobe [Body]
[PATCH v22 21/28] riscv: kernel command line option to opt out of user cfi [Body]
[PATCH v22 22/28] riscv: enable kernel access to shadow stack memory via FWFT sbi call [Body]
[PATCH v22 23/28] arch/riscv: compile vdso with landing pad and shadow stack note [Body]
[PATCH v22 24/28] arch/riscv: dual vdso creation logic and select vdso based on hw [Body]
[PATCH v22 25/28] riscv: create a config for shadow stack and landing pad instr support [Body]
[PATCH v22 26/28] riscv: Documentation for landing pad / indirect branch tracking [Body]
[PATCH v22 27/28] riscv: Documentation for shadow stack on riscv [Body]
[PATCH v22 28/28] kselftest/riscv: kselftest for user mode cfi [Body]

Session 2025-10-23

ID (for dev) 6233d252-3e46-441c-a53c-cd2976cd8902
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 2183c135f1550d85233cee150d7dec363a212740 [Config] passed [Log]
[KASAN] Boot test: Base 2183c135f1550d85233cee150d7dec363a212740 [Config] passed
[KASAN] Build Patched 2183c135f1550d85233cee150d7dec363a212740 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 2183c135f1550d85233cee150d7dec363a212740 [Config] [patched] passed
[KASAN] Fuzzing 2183c135f1550d85233cee150d7dec363a212740 [Config] 2183c135f1550d85233cee150d7dec363a212740 [Config] [patched] passed [Log] [Artifacts]