Re: [PATCH v2 0/4] KVM: riscv: Fix Spectre-v1 vulnerabilities in register access
From: patchwork-bot+linux-riscv
Date: Tue Mar 24 2026 - 02:15:52 EST
Hello:
This series was applied to riscv/linux.git (for-next)
by Anup Patel <anup@xxxxxxxxxxxxxx>:
On Tue, 3 Mar 2026 15:19:40 +0100 you wrote:
> This series adds array_index_nospec() to RISC-V KVM to prevent
> speculative out-of-bounds access to kernel memory.
>
> Similar fixes exist for x86 (ioapic, lapic, PMU) and arm64 (vgic).
>
> Signed-off-by: Lukas Gerlach <lukas.gerlach@xxxxxxxx>
>
> [...]
Here is the summary with links:
- [v2,1/4] KVM: riscv: Fix Spectre-v1 in ONE_REG register access
https://git.kernel.org/riscv/c/f9e26fc32541
- [v2,2/4] KVM: riscv: Fix Spectre-v1 in AIA CSR access
https://git.kernel.org/riscv/c/ec87a82ca874
- [v2,3/4] KVM: riscv: Fix Spectre-v1 in floating-point register access
https://git.kernel.org/riscv/c/8f0c15c4b14f
- [v2,4/4] KVM: riscv: Fix Spectre-v1 in PMU counter access
https://git.kernel.org/riscv/c/2dda6a9e09ee
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html