Hello: This patch was applied to bpf/bpf-next.git (master) by Daniel Borkmann <daniel@xxxxxxxxxxxxx>: On Wed, 25 Oct 2023 03:11:44 +0000 you wrote: > When we configure the kernel command line with 'mitigations=off' and set > the sysctl knob 'kernel.unprivileged_bpf_disabled' to 0, the commit > bc5bc309db45 ("bpf: Inherit system settings for CPU security mitigations") > causes issues in the execution of `test_progs -t verifier`. This is because > 'mitigations=off' bypasses Spectre v1 and Spectre v4 protections. > > Currently, when a program requests to run in unprivileged mode > (kernel.unprivileged_bpf_disabled = 0), the BPF verifier may prevent it > from running due to the following conditions not being enabled: > > [...] Here is the summary with links: - [v3,bpf-next] selftests/bpf: Fix selftests broken by mitigations=off https://git.kernel.org/bpf/bpf-next/c/399f6185a1c0 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html