aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBruce Ashfield <bruce.ashfield@gmail.com>2022-05-18 14:06:44 -0400
committerBruce Ashfield <bruce.ashfield@gmail.com>2022-05-18 14:06:44 -0400
commit7634999026eab44243818f49cd91582b0fb6526c (patch)
treed98a2557dfbc04e8cf1da9c287f2290815997eb3
parent2dfd387092f5994a665c1efc6e6792e217a7b04d (diff)
parent77aa9e489eafdd700df399b2e47a0ff313a91870 (diff)
downloadlinux-yocto-v5.15/standard/ti-am335x.tar.gz
linux-yocto-v5.15/standard/ti-am335x.tar.bz2
linux-yocto-v5.15/standard/ti-am335x.zip
Merge branch 'v5.15/standard/base' into v5.15/standard/ti-am335xv5.15/standard/ti-am335x
-rw-r--r--kernel/bpf/Kconfig7
1 files changed, 7 insertions, 0 deletions
diff --git a/kernel/bpf/Kconfig b/kernel/bpf/Kconfig
index a82d6de86522..d24d518ddd63 100644
--- a/kernel/bpf/Kconfig
+++ b/kernel/bpf/Kconfig
@@ -64,6 +64,7 @@ config BPF_JIT_DEFAULT_ON
config BPF_UNPRIV_DEFAULT_OFF
bool "Disable unprivileged BPF by default"
+ default y
depends on BPF_SYSCALL
help
Disables unprivileged BPF by default by setting the corresponding
@@ -72,6 +73,12 @@ config BPF_UNPRIV_DEFAULT_OFF
disable it by setting it to 1 (from which no other transition to
0 is possible anymore).
+ Unprivileged BPF could be used to exploit certain potential
+ speculative execution side-channel vulnerabilities on unmitigated
+ affected hardware.
+
+ If you are unsure how to answer this question, answer Y.
+
source "kernel/bpf/preload/Kconfig"
config BPF_LSM