Hi,
A serious flaw still exists and can affect thousands of VF2's deployed so far.
Dirtypipe is easily exploitable, allows to overwrite any file in filesystem not normally writable (permissions check bypass, immutable flag bypass), without touching it's ctime field (change goes completely unnoticed if not audited offline on another trustworthy system) most likely privileges can be raised to root by a wild available exploit.
I tested last HEAD from JH7110_VisionFive2_devel on a real VF2 and it works - I can overwrite instructions in /bin/ls for example at my will.
Please see https://dirtypipe.cm4all.com/ for further details.
Patch closing this "backdoor": https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9d2231c5d74e13b2a0546fee6737ee4446017903
I've sent PR #92
Thanks.