Toggle navigation
Patchwork
linux-kselftest
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Series =
bpf: Mitigate Spectre v1 using speculation barriers
| State =
Action Required
| Archived =
No
| 7 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Search
Archived
No
Yes
Both
Delegate
------
Nobody
andy.doan@linaro.org
andy.doan@linaro.org
Apply
Patch
Series
S/W/F
Date
Submitter
Delegate
State
[RFC,9/9] bpf: Cut speculative path verification short
bpf: Mitigate Spectre v1 using speculation barriers
-
-
-
2025-02-24
Luis Gerhorst
New
[RFC,8/9] bpf: Fall back to nospec for sanitization-failures
bpf: Mitigate Spectre v1 using speculation barriers
-
-
-
2025-02-24
Luis Gerhorst
New
[RFC,7/9] bpf: Refactor push_stack to return error code
bpf: Mitigate Spectre v1 using speculation barriers
-
-
-
2025-02-24
Luis Gerhorst
New
[RFC,6/9] bpf: Allow nospec-protected var-offset stack access
bpf: Mitigate Spectre v1 using speculation barriers
-
-
-
2025-02-24
Luis Gerhorst
New
[RFC,5/9] bpf: Fall back to nospec if v1 verification fails
bpf: Mitigate Spectre v1 using speculation barriers
-
-
-
2025-02-24
Luis Gerhorst
New
[RFC,2/9] bpf: Refactor do_check() if/else into do_check_insn()
bpf: Mitigate Spectre v1 using speculation barriers
-
-
-
2025-02-24
Luis Gerhorst
New
[RFC,1/9] bpf/arm64: Unset bypass_spec_v4() instead of ignoring BPF_NOSPEC
bpf: Mitigate Spectre v1 using speculation barriers
-
-
-
2025-02-24
Luis Gerhorst
New