[PATCH v2 0/4] KVM: riscv: Fix Spectre-v1 vulnerabilities in register access
patchwork-bot+linux-riscv at kernel.org
patchwork-bot+linux-riscv at kernel.org
Mon Mar 23 23:07:30 PDT 2026
Hello:
This series was applied to riscv/linux.git (for-next)
by Anup Patel <anup at brainfault.org>:
On Tue, 3 Mar 2026 15:19:40 +0100 you wrote:
> This series adds array_index_nospec() to RISC-V KVM to prevent
> speculative out-of-bounds access to kernel memory.
>
> Similar fixes exist for x86 (ioapic, lapic, PMU) and arm64 (vgic).
>
> Signed-off-by: Lukas Gerlach <lukas.gerlach at cispa.de>
>
> [...]
Here is the summary with links:
- [v2,1/4] KVM: riscv: Fix Spectre-v1 in ONE_REG register access
https://git.kernel.org/riscv/c/f9e26fc32541
- [v2,2/4] KVM: riscv: Fix Spectre-v1 in AIA CSR access
https://git.kernel.org/riscv/c/ec87a82ca874
- [v2,3/4] KVM: riscv: Fix Spectre-v1 in floating-point register access
https://git.kernel.org/riscv/c/8f0c15c4b14f
- [v2,4/4] KVM: riscv: Fix Spectre-v1 in PMU counter access
https://git.kernel.org/riscv/c/2dda6a9e09ee
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
More information about the linux-riscv
mailing list