aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBruce Ashfield <bruce.ashfield@gmail.com>2022-05-18 14:06:51 -0400
committerBruce Ashfield <bruce.ashfield@gmail.com>2022-05-18 14:06:51 -0400
commit2836b33bd7a45294e3f04239606b2eea62d1d2fa (patch)
treed98a2557dfbc04e8cf1da9c287f2290815997eb3
parent14d0502f3da68e7219e6a6532537762fb3e0d39f (diff)
parent77aa9e489eafdd700df399b2e47a0ff313a91870 (diff)
downloadlinux-yocto-v5.15/standard/tiny/x86.tar.gz
linux-yocto-v5.15/standard/tiny/x86.tar.bz2
linux-yocto-v5.15/standard/tiny/x86.zip
Merge branch 'v5.15/standard/base' into v5.15/standard/tiny/x86v5.15/standard/tiny/x86
-rw-r--r--kernel/bpf/Kconfig7
1 files changed, 7 insertions, 0 deletions
diff --git a/kernel/bpf/Kconfig b/kernel/bpf/Kconfig
index a82d6de86522..d24d518ddd63 100644
--- a/kernel/bpf/Kconfig
+++ b/kernel/bpf/Kconfig
@@ -64,6 +64,7 @@ config BPF_JIT_DEFAULT_ON
config BPF_UNPRIV_DEFAULT_OFF
bool "Disable unprivileged BPF by default"
+ default y
depends on BPF_SYSCALL
help
Disables unprivileged BPF by default by setting the corresponding
@@ -72,6 +73,12 @@ config BPF_UNPRIV_DEFAULT_OFF
disable it by setting it to 1 (from which no other transition to
0 is possible anymore).
+ Unprivileged BPF could be used to exploit certain potential
+ speculative execution side-channel vulnerabilities on unmitigated
+ affected hardware.
+
+ If you are unsure how to answer this question, answer Y.
+
source "kernel/bpf/preload/Kconfig"
config BPF_LSM