From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 990D4CF394B for ; Wed, 19 Nov 2025 16:40:54 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 03E886B00C1; Wed, 19 Nov 2025 11:40:54 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 0165F6B00C3; Wed, 19 Nov 2025 11:40:53 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id E95056B00CA; Wed, 19 Nov 2025 11:40:53 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id D7CED6B00C1 for ; Wed, 19 Nov 2025 11:40:53 -0500 (EST) Received: from smtpin22.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 9B73813B362 for ; Wed, 19 Nov 2025 16:40:53 +0000 (UTC) X-FDA: 84127920786.22.644BF9E Received: from tor.source.kernel.org (tor.source.kernel.org [172.105.4.254]) by imf23.hostedemail.com (Postfix) with ESMTP id CAB52140008 for ; Wed, 19 Nov 2025 16:40:51 +0000 (UTC) Authentication-Results: imf23.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=lLhT6SzF; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf23.hostedemail.com: domain of patchwork-bot+linux-riscv@kernel.org designates 172.105.4.254 as permitted sender) smtp.mailfrom=patchwork-bot+linux-riscv@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1763570452; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=8GbOVaz+/s61R+WywSkU7ZyxU4arEylQcxyFZ64uwIE=; b=K/Yzl9bClegOtKp7nip1PqOJJWBmVRJE1npWSdiRT46LgZNpAhTtLu4hIGg9X/rskud0I8 IGtwx/+ppFHJEIrO/tVjLn3Q7mwmmDBaNzVzq38VbVpamKsZn0dQ0htmU0voy9JkN3VH3i gcwt3rC2sSV6bCaamN03/R4d7vnFKus= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1763570452; a=rsa-sha256; cv=none; b=peFkGpJBD2lvhC3XbFP1EqpOwZOVIl07XhoLgeglSBXHcqVBJmvsXSBWw8Wg9i++EovcXv WzcMXb7yFf+Ygb84du3suCG4C8StPqebZaM8QvVE2i7cp/9dUDj1jjFRU/3AQeNrSv2HCU IwIfYT7wHj7SiWJD0ycO59n1INdWIlo= ARC-Authentication-Results: i=1; imf23.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=lLhT6SzF; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf23.hostedemail.com: domain of patchwork-bot+linux-riscv@kernel.org designates 172.105.4.254 as permitted sender) smtp.mailfrom=patchwork-bot+linux-riscv@kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by tor.source.kernel.org (Postfix) with ESMTP id 12EF260171; Wed, 19 Nov 2025 16:40:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A8644C4CEF5; Wed, 19 Nov 2025 16:40:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1763570450; bh=JFhkn6lZcnccDk/Xiy7qQSi9rib1FbFLEz39Orxm4zU=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=lLhT6SzFU8YnGXsRaD9WXB6PNnLJLV37WDNGmrJy2H1ItVpSERaHHYDaFiYKNaTV8 +sVhKIOM1aK6VFMCTMiiclyoJ6FbkMoHm8GmYVEwqN8HqysKqiYA2qFxVtt1FCV6GL rQM3sW9biWpOtyldb5TOmuVQUiSaD48/zJmmAJb/OOdI1uJLtgsMGUt9P8LO0zJ0gD RROcbYYeQdiQrEUnH79JiJ1PCp3fssgXZm7EtH+v7vliUypYK83hjFbI8kc/+cf1u4 f3y9tcnYDpu4hBC/zI/fNyQ2y390nUQBi/LQeDuSFAw6ek1nW6BuEi3Ur+HX4anYRQ Gf66G4uOfb/ig== Received: from [10.30.226.235] (localhost [IPv6:::1]) by aws-us-west-2-korg-oddjob-rhel9-1.codeaurora.org (Postfix) with ESMTP id ADF0F39D0C22; Wed, 19 Nov 2025 16:40:17 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH v23 00/28] riscv control-flow integrity for usermode From: patchwork-bot+linux-riscv@kernel.org Message-Id: <176357041649.873046.14385292158343476261.git-patchwork-notify@kernel.org> Date: Wed, 19 Nov 2025 16:40:16 +0000 References: <20251112-v5_user_cfi_series-v23-0-b55691eacf4f@rivosinc.com> In-Reply-To: <20251112-v5_user_cfi_series-v23-0-b55691eacf4f@rivosinc.com> To: Deepak Gupta Cc: linux-riscv@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, akpm@linux-foundation.org, Liam.Howlett@oracle.com, vbabka@suse.cz, lorenzo.stoakes@oracle.com, paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, conor@kernel.org, robh@kernel.org, krzk+dt@kernel.org, arnd@arndb.de, brauner@kernel.org, peterz@infradead.org, oleg@redhat.com, ebiederm@xmission.com, kees@kernel.org, corbet@lwn.net, shuah@kernel.org, jannh@google.com, conor+dt@kernel.org, ojeda@kernel.org, alex.gaynor@gmail.com, boqun.feng@gmail.com, gary@garyguo.net, bjorn3_gh@protonmail.com, a.hindborg@kernel.org, aliceryhl@google.com, tmgross@umich.edu, lossin@kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, devicetree@vger.kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, alistair.francis@wdc.com, richard.henderson@linaro.org, jim.shu@sifive.com, andybnac@gmail.com, kito.cheng@sifive.com, charlie@rivosinc.com, atishp@rivosinc.com, evan@rivosinc.com, cleger@rivosinc.com, alexghiti@rivosinc.com, samitolvanen@google.com, broonie@kernel.org, rick.p.edgecombe@intel.com, rust-for-linux@vger.kernel.org, zong.li@sifive.com, david@redhat.com, cmirabil@redhat.com X-Stat-Signature: c3skoh5pzqjs9isipjhzpj4jinrj5xbd X-Rspam-User: X-Rspamd-Queue-Id: CAB52140008 X-Rspamd-Server: rspam10 X-HE-Tag: 1763570451-473089 X-HE-Meta: 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 8AZRrAmT kva+epsib51aYmoRfs/KtLyuZ3qqnwgTX5fwwczeAZYVM6sGroTbe3Q9INiwL2txt6x3apnW52iESUwgbKotRrMZxT/e1R/7YgA2aIDHPrlRYm85J8/Xgzteq4gU69+I+vamTdFQc1K5a35BO+CUdUAP5FuRpO6+QAC8cZ0WtWGM0B4Ymtuh0ESowcGetqaBFm5bZjIzQpnVIm9Z6fYmf43O/kEwAjpg/j3h0pLJddj0TZ6l/xghxMKTU/UX5YyLMSiFVK/WkoIg8Eh+5dnKivpUlHNBNzJCIMctMtCmtFHBw/t1eNcF+Gqz7VEHBvnWdFOQuZ7HT8KqZcskHfyHhSJiEzYntuRGA0W5ZiGLVYMal5HR7P0dCGuX+pK7H8nkuirxz9vpdMyft5OfNmDxlAzi+wSb/plMlZrzvUmPWJlPOtLukeAHbI/XaZEziDzk/W49z X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hello: This series was applied to riscv/linux.git (for-next) by Paul Walmsley : On Wed, 12 Nov 2025 16:42:58 -0800 you wrote: > v23: > fixed some of the "CHECK:" reported on checkpatch --strict. > Accepted Joel's suggestion for kselftest's Makefile. > CONFIG_RISCV_USER_CFI is enabled when zicfiss, zicfilp and fcf-protection > are all present in toolchain > > v22: fixing build error due to -march=zicfiss being picked in gcc-13 and above > but not actually doing any codegen or recognizing instruction for zicfiss. > Change in v22 makes dependence on `-fcf-protection=full` compiler flag to > ensure that toolchain has support and then only CONFIG_RISCV_USER_CFI will be > visible in menuconfig. > > [...] Here is the summary with links: - [v23,01/28] mm: VM_SHADOW_STACK definition for riscv (no matching commit) - [v23,02/28] dt-bindings: riscv: zicfilp and zicfiss in dt-bindings (extensions.yaml) (no matching commit) - [v23,03/28] riscv: zicfiss / zicfilp enumeration (no matching commit) - [v23,04/28] riscv: zicfiss / zicfilp extension csr and bit definitions (no matching commit) - [v23,05/28] riscv: usercfi state for task and save/restore of CSR_SSP on trap entry/exit (no matching commit) - [v23,06/28] riscv/mm : ensure PROT_WRITE leads to VM_READ | VM_WRITE (no matching commit) - [v23,07/28] riscv/mm: manufacture shadow stack pte (no matching commit) - [v23,08/28] riscv/mm: teach pte_mkwrite to manufacture shadow stack PTEs (no matching commit) - [v23,09/28] riscv/mm: write protect and shadow stack (no matching commit) - [v23,10/28] riscv/mm: Implement map_shadow_stack() syscall (no matching commit) - [v23,11/28] riscv/shstk: If needed allocate a new shadow stack on clone (no matching commit) - [v23,12/28] riscv: Implements arch agnostic shadow stack prctls (no matching commit) - [v23,13/28] prctl: arch-agnostic prctl for indirect branch tracking (no matching commit) - [v23,14/28] riscv: Implements arch agnostic indirect branch tracking prctls (no matching commit) - [v23,15/28] riscv/traps: Introduce software check exception and uprobe handling (no matching commit) - [v23,16/28] riscv: signal: abstract header saving for setup_sigcontext https://git.kernel.org/riscv/c/bfc1388f2753 - [v23,17/28] riscv/signal: save and restore of shadow stack for signal (no matching commit) - [v23,18/28] riscv/kernel: update __show_regs to print shadow stack register (no matching commit) - [v23,19/28] riscv/ptrace: riscv cfi status and state via ptrace and in core files (no matching commit) - [v23,20/28] riscv/hwprobe: zicfilp / zicfiss enumeration in hwprobe (no matching commit) - [v23,21/28] riscv: kernel command line option to opt out of user cfi (no matching commit) - [v23,22/28] riscv: enable kernel access to shadow stack memory via FWFT sbi call (no matching commit) - [v23,23/28] arch/riscv: compile vdso with landing pad and shadow stack note (no matching commit) - [v23,24/28] arch/riscv: dual vdso creation logic and select vdso based on hw (no matching commit) - [v23,25/28] riscv: create a config for shadow stack and landing pad instr support (no matching commit) - [v23,26/28] riscv: Documentation for landing pad / indirect branch tracking (no matching commit) - [v23,27/28] riscv: Documentation for shadow stack on riscv (no matching commit) - [v23,28/28] kselftest/riscv: kselftest for user mode cfi (no matching commit) You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html