diff options
author | 2022-05-18 14:06:44 -0400 | |
---|---|---|
committer | 2022-05-18 14:06:44 -0400 | |
commit | 7634999026eab44243818f49cd91582b0fb6526c (patch) | |
tree | d98a2557dfbc04e8cf1da9c287f2290815997eb3 | |
parent | 2dfd387092f5994a665c1efc6e6792e217a7b04d (diff) | |
parent | 77aa9e489eafdd700df399b2e47a0ff313a91870 (diff) | |
download | linux-yocto-v5.15/standard/ti-am335x.tar.gz linux-yocto-v5.15/standard/ti-am335x.tar.bz2 linux-yocto-v5.15/standard/ti-am335x.zip |
Merge branch 'v5.15/standard/base' into v5.15/standard/ti-am335xv5.15/standard/ti-am335x
-rw-r--r-- | kernel/bpf/Kconfig | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/kernel/bpf/Kconfig b/kernel/bpf/Kconfig index a82d6de86522..d24d518ddd63 100644 --- a/kernel/bpf/Kconfig +++ b/kernel/bpf/Kconfig @@ -64,6 +64,7 @@ config BPF_JIT_DEFAULT_ON config BPF_UNPRIV_DEFAULT_OFF bool "Disable unprivileged BPF by default" + default y depends on BPF_SYSCALL help Disables unprivileged BPF by default by setting the corresponding @@ -72,6 +73,12 @@ config BPF_UNPRIV_DEFAULT_OFF disable it by setting it to 1 (from which no other transition to 0 is possible anymore). + Unprivileged BPF could be used to exploit certain potential + speculative execution side-channel vulnerabilities on unmitigated + affected hardware. + + If you are unsure how to answer this question, answer Y. + source "kernel/bpf/preload/Kconfig" config BPF_LSM |