Subj : [$] Injecting speculation barriers into BPF programs To : All From : LWN.net Date : Mon May 05 2025 20:15:08 [$] Injecting speculation barriers into BPF programs Date: Mon, 05 May 2025 19:04:44 +0000 Description: The disclosure of the Spectre class of hardware vulnerabilities created a lot of pain for kernel developers (and many others). That pain was especially acutely felt in the BPF community. While an attacker might have to painfully search the kernel code base for exploitable code, an attacker using BPF can simply write and load their own speculation gadgets, which is a much more efficient way of operating. The BPF community reacted by, among other things, disallowing the loading of programs that may include speculation gadgets. Luis Gerhorst would like to change that situation with this patch series that takes a more direct approach to the problem. ====================================================================== Link to news story: https://lwn.net/Articles/1018494/ --- Mystic BBS v1.12 A47 (Linux/64) * Origin: tqwNet UK HUB @ hub.uk.erb.pw (1337:1/100) .