Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
bpf: Inherit system settings for CPU security mitigations
Currently, there exists a system-wide setting related to CPU security mitigations, denoted as 'mitigations='. When set to 'mitigations=off', it deactivates all optional CPU mitigations. Therefore, if we implement a system-wide 'mitigations=off' setting, it should inherently bypass Spectre v1 and Spectre v4 in the BPF subsystem. Please note that there is also a more specific 'nospectre_v1' setting on x86 and ppc architectures, though it is not currently exported. For the time being, let's disregard more fine-grained options. This idea emerged during our discussion about potential Spectre v1 attacks with Luis [0]. [0] https://lore.kernel.org/bpf/[email protected] Signed-off-by: Yafang Shao <[email protected]> Signed-off-by: Daniel Borkmann <[email protected]> Acked-by: Stanislav Fomichev <[email protected]> Acked-by: Song Liu <[email protected]> Acked-by: KP Singh <[email protected]> Cc: Luis Gerhorst <[email protected]> Link: https://lore.kernel.org/bpf/[email protected]
- Loading branch information