Re: [PATCH bpf-next v4 0/9] bpf: Mitigate Spectre v1 using barriers

2025-06-09 Thread patchwork-bot+netdevbpf
Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov : On Tue, 3 Jun 2025 22:57:51 +0200 you wrote: > This improves the expressiveness of unprivileged BPF by inserting > speculation barriers instead of rejecting the programs. > > The approach was previously presente

Re: [PATCH bpf-next v4 0/9] bpf: Mitigate Spectre v1 using barriers

2025-06-09 Thread Kumar Kartikeya Dwivedi
On Tue, 3 Jun 2025 at 23:04, Luis Gerhorst wrote: > > This improves the expressiveness of unprivileged BPF by inserting > speculation barriers instead of rejecting the programs. > > The approach was previously presented at LPC'24 [1] and RAID'24 [2]. > > To mitigate the Spectre v1 (PHT) vulnerabil

[PATCH bpf-next v4 0/9] bpf: Mitigate Spectre v1 using barriers

2025-06-03 Thread Luis Gerhorst
This improves the expressiveness of unprivileged BPF by inserting speculation barriers instead of rejecting the programs. The approach was previously presented at LPC'24 [1] and RAID'24 [2]. To mitigate the Spectre v1 (PHT) vulnerability, the kernel rejects potentially-dangerous unprivileged BPF