Hello: This patch was applied to bpf/bpf-next.git (master) by Daniel Borkmann <daniel@xxxxxxxxxxxxx>: On Thu, 5 Oct 2023 08:41:23 +0000 you wrote: > Currently, there exists a system-wide setting related to CPU security > mitigations, denoted as 'mitigations='. When set to 'mitigations=off', it > deactivates all optional CPU mitigations. Therefore, if we implement a > system-wide 'mitigations=off' setting, it should inherently bypass Spectre > v1 and Spectre v4 in the BPF subsystem. > > Please note that there is also a 'nospectre_v1' setting on x86 and ppc > architectures, though it is not currently exported. For the time being, > let's disregard it. > > [...] Here is the summary with links: - [bpf-next] bpf: Inherit system settings for CPU security mitigations https://git.kernel.org/bpf/bpf-next/c/bc5bc309db45 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html