[patch V6 02/12] uaccess: Provide ASM GOTO safe wrappers for unsafe_*_user()

patchwork-bot+linux-riscv at kernel.org patchwork-bot+linux-riscv at kernel.org
Fri Dec 19 19:10:15 AEDT 2025


Hello:

This patch was applied to riscv/linux.git (fixes)
by Peter Zijlstra <peterz at infradead.org>:

On Wed, 29 Oct 2025 10:40:52 +0100 you wrote:
> ASM GOTO is miscompiled by GCC when it is used inside a auto cleanup scope:
> 
> bool foo(u32 __user *p, u32 val)
> {
> 	scoped_guard(pagefault)
> 		unsafe_put_user(val, p, efault);
> 	return true;
> efault:
> 	return false;
> }
> 
> [...]

Here is the summary with links:
  - [V6,02/12] uaccess: Provide ASM GOTO safe wrappers for unsafe_*_user()
    https://git.kernel.org/riscv/c/3eb6660f26d1

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html




More information about the Linuxppc-dev mailing list