Re: [PATCH bpf-next v3 00/11] bpf: Mitigate Spectre v1 using barriers

2025-05-09 Thread Alexei Starovoitov
On Fri, May 9, 2025 at 11:39 AM wrote: > > Hello: > > This series was applied to bpf/bpf-next.git (master) > by Alexei Starovoitov : > > On Thu, 1 May 2025 09:35:51 +0200 you wrote: > > This improves the expressiveness of unprivileged BPF by inserting > > speculation barriers instead of rejecting

Re: [PATCH bpf-next v3 00/11] bpf: Mitigate Spectre v1 using barriers

2025-05-09 Thread patchwork-bot+netdevbpf
Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov : On Thu, 1 May 2025 09:35:51 +0200 you wrote: > This improves the expressiveness of unprivileged BPF by inserting > speculation barriers instead of rejecting the programs. > > The approach was previously presente

[PATCH bpf-next v3 00/11] bpf: Mitigate Spectre v1 using barriers

2025-05-01 Thread Luis Gerhorst
This improves the expressiveness of unprivileged BPF by inserting speculation barriers instead of rejecting the programs. The approach was previously presented at LPC'24 [1] and RAID'24 [2]. To mitigate the Spectre v1 (PHT) vulnerability, the kernel rejects potentially-dangerous unprivileged BPF