Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1940388pxp; Thu, 10 Mar 2022 15:35:23 -0800 (PST) X-Google-Smtp-Source: ABdhPJyJ4qnxVUnLGbvJS3eV86QiJgf9kSDXzKyLJAiM7zPbzpz1ghdJ8pOSMQHp0uTblpxa9vP1 X-Received: by 2002:a05:6a00:15d5:b0:4f0:fbeb:6007 with SMTP id o21-20020a056a0015d500b004f0fbeb6007mr7537838pfu.17.1646955322963; Thu, 10 Mar 2022 15:35:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646955322; cv=none; d=google.com; s=arc-20160816; b=P1vJFc1XhL+ho60h2eFHY0yMGIqZPQ+GwDjGVevfwOPQ0r3kHYn2RRwg2P9vDSDyzn lxjLXhr+vKHYeR+DDrU0u6nMghuguCIHzJa6XXRDYcKDnH+SoHURJG05f8eCsMgr6rbe xJ+4zADpsgxs4fbXEzvno2SzyzqywLptDGXEYdyAVF0/dq014M40nZc6SoxGgfsKXcPF LGVsWqar5EdFjJpbxZbzwFHvfiEzdVRDchsTa1OVeSX8IDqq2Q6R70LiqA3jyE93wN18 Y5ZCqUb+rnO+kEC8o6mcZ0DDKQ0F/0DX+tkmsP7MDg3KK0+bn+pgvFteTjwLrzZBl4YI plXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=q/rA8NrHkKl6u9EPnFVwANqg4RCcGNlWtxm+eX12Z6U=; b=gU5L16r0r1y9pi+u9RZ26fMLSueengDA7+sVsB7/VL1L5z5TMgUPDqAbC4cIBZhiXX AlAaqCFYB0WJUoqin39dgEzdYr/mKTBiiPRYCyVRsUP61f/WtRn9lKjF1Kt/RXBipx9s dhm72Bss+SQMUQkCuOuhGdDI9jLdZdo9pcc2olKwcDWX12PcJnYocbwHA0LuYjXq5cia vyOiJJcSGReowj//Wl/9COspYREOYGF4DmU8t9P+hnKLLIT2UE2lYXDqSWUpT4y5/6b0 wPqOGt/0IKJhLTzPdtHeRTnFmktMPpSluV2yXcQ4CtGZPzKymwppAzLpZ7DClNb1Z+se o9VQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wTnznO68; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 192-20020a6301c9000000b0038053979fdasi5901173pgb.517.2022.03.10.15.35.06; Thu, 10 Mar 2022 15:35:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wTnznO68; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234442AbiCJOXW (ORCPT + 99 others); Thu, 10 Mar 2022 09:23:22 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46458 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244350AbiCJOTL (ORCPT ); Thu, 10 Mar 2022 09:19:11 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7B220B8B52; Thu, 10 Mar 2022 06:16:07 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 486C261B63; Thu, 10 Mar 2022 14:16:06 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5707AC340E8; Thu, 10 Mar 2022 14:16:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1646921765; bh=YYTxn4Nwrg6CuOgCloYwoSlfT43YKOmCi0fRD30gcL8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wTnznO68SjKNfoXctdLF0OdNFUJ41sRjENk7V4uKvgAtOwC3tjX39vnk+7Hm21OpE SLDYTWZjcmHvnxFjS+uXcnFnvlu+pp/IDmE7HKaxPzq22bfXZXgFqTo8ZIpYtxy9qS 2wGv2wa/xu6U5kbIbUvnIiVLLQKoMDd/zLNIlckM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Russell King (Oracle)" Subject: [PATCH 4.9 23/38] ARM: include unprivileged BPF status in Spectre V2 reporting Date: Thu, 10 Mar 2022 15:13:36 +0100 Message-Id: <20220310140808.814428235@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220310140808.136149678@linuxfoundation.org> References: <20220310140808.136149678@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Russell King (Oracle) commit 25875aa71dfefd1959f07e626c4d285b88b27ac2 upstream. The mitigations for Spectre-BHB are only applied when an exception is taken, but when unprivileged BPF is enabled, userspace can load BPF programs that can be used to exploit the problem. When unprivileged BPF is enabled, report the vulnerable status via the spectre_v2 sysfs file. Signed-off-by: Russell King (Oracle) Signed-off-by: Greg Kroah-Hartman --- arch/arm/kernel/spectre.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) --- a/arch/arm/kernel/spectre.c +++ b/arch/arm/kernel/spectre.c @@ -1,9 +1,19 @@ // SPDX-License-Identifier: GPL-2.0-only +#include #include #include #include +static bool _unprivileged_ebpf_enabled(void) +{ +#ifdef CONFIG_BPF_SYSCALL + return !sysctl_unprivileged_bpf_disabled; +#else + return false +#endif +} + ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, char *buf) { @@ -31,6 +41,9 @@ ssize_t cpu_show_spectre_v2(struct devic if (spectre_v2_state != SPECTRE_MITIGATED) return sprintf(buf, "%s\n", "Vulnerable"); + if (_unprivileged_ebpf_enabled()) + return sprintf(buf, "Vulnerable: Unprivileged eBPF enabled\n"); + switch (spectre_v2_methods) { case SPECTRE_V2_METHOD_BPIALL: method = "Branch predictor hardening";