Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1062539pxb; Wed, 27 Oct 2021 18:33:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwApgWvnrrldTS4QiDJbXx2nAMXu3Tc2gYCC+PzQ7z6e3OlfZT75zWPIk9Rwo9EC04RuD7g X-Received: by 2002:a17:906:9d05:: with SMTP id fn5mr1390419ejc.347.1635384813274; Wed, 27 Oct 2021 18:33:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635384813; cv=none; d=google.com; s=arc-20160816; b=HhFG/FJz0Jk3jFW3fAzARlnkgG2zphO9An22wlvMTyewFmRJbkaUhRWXGQI9KwAUns +aMcEQYqxaSaqR7LHaz7ZY0ZG1ygqoLfDmn4MEnskoTQmu7bnvYQi50A4mKQT2I1WvUa 32KqEGzoCYroCx9ok81175uD2bccsvQIu4P/mB3rBQU4uhfBhSFPCAMJx3o+hj1RqoRJ UTZv+Fyd7rV8HRO/s5fn0EnhGgdtDDOx5jpduyBOfFbgLbqnkhMtWoNDZp0baB1/sqZQ Bo8SeOfzB9uJ+1rGJGq5n2tTUtqna+hOYIuC4l8N1kZQWcFyw4flkQIYhZs3efnIHaDA 8o8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date; bh=r7kc7KRLY6TEnj+jaaylOsWJj3cw12vrmH1fB7XcPlw=; b=V6J2bHj2ppASEc9Q8l+yQC242uvYz+XupKepjHflGL51Pj+h6kE+7xXfKaGEtXGNBb nGX058gftX071uNjvDulrfxWNu69ORev7IMGaFTS3SzpDGM4mOQEI/KVl2QoBBe7uwFt T2YBsUpVUiP/nRxyCGn+dneq9xXthWvyw32G3xrV7UlJZCoaiOe+QsKxUNVg5tzCzZgy GrJwg2WXvXvBq6VbIrkseQNtkfap2KZ7qkJIPvCYuaOw6h4Mw0ddp5ZSEoZjWRuGdOYt vHZDg767b1EhSY4vu/85XcL6StGUQGTGecVsra8Xk3aqtZuTRkVm3+HFR2Btznunz/kQ 0L/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e10si2007672edl.605.2021.10.27.18.33.10; Wed, 27 Oct 2021 18:33:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229785AbhJ1BcL (ORCPT + 99 others); Wed, 27 Oct 2021 21:32:11 -0400 Received: from mga06.intel.com ([134.134.136.31]:34992 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229505AbhJ1BcK (ORCPT ); Wed, 27 Oct 2021 21:32:10 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10150"; a="291138656" X-IronPort-AV: E=Sophos;i="5.87,188,1631602800"; d="scan'208";a="291138656" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Oct 2021 18:29:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.87,188,1631602800"; d="scan'208";a="447466689" Received: from gupta-dev2.jf.intel.com (HELO gupta-dev2.localdomain) ([10.54.74.119]) by orsmga006.jf.intel.com with ESMTP; 27 Oct 2021 18:29:43 -0700 Date: Wed, 27 Oct 2021 18:32:00 -0700 From: Pawan Gupta To: Alexei Starovoitov , Daniel Borkmann Cc: Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, antonio.gomez.iglesias@intel.com, tony.luck@intel.com, dave.hansen@linux.intel.com Subject: [PATCH ebpf v2 0/2] Unprivileged BPF default Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, This is a two patch series to make the compile time default of unprivileged BPF depend on CONFIG_CPU_SPECTRE. First patch makes ARM's CONFIG_CPU_SPECTRE available for all architectures. The second patch sets CONFIG_BPF_UNPRIV_DEFAULT_OFF=y by default when CONFIG_CPU_SPECTRE=y. v2: - Generalize ARM's CONFIG_CPU_SPECTRE to be available for all architectures. - Make CONFIG_BPF_UNPRIV_DEFAULT_OFF depend on CONFIG_CPU_SPECTRE. - Updated commit message to reflect the dependency on CONFIG_CPU_SPECTRE. - Add reference to BPF spectre presentation in commit message. v1: https://lore.kernel.org/all/d37b01e70e65dced2659561ed5bc4b2ed1a50711.1635367330.git.pawan.kumar.gupta@linux.intel.com/ Pawan Gupta (2): arch/Kconfig: Make CONFIG_CPU_SPECTRE available for all architectures bpf: Make unprivileged bpf depend on CONFIG_CPU_SPECTRE arch/Kconfig | 3 +++ arch/arm/mm/Kconfig | 3 --- arch/x86/Kconfig | 1 + kernel/bpf/Kconfig | 5 +++++ 4 files changed, 9 insertions(+), 3 deletions(-) -- 2.31.1