diff options
author | 2022-05-18 14:06:51 -0400 | |
---|---|---|
committer | 2022-05-18 14:06:51 -0400 | |
commit | 2836b33bd7a45294e3f04239606b2eea62d1d2fa (patch) | |
tree | d98a2557dfbc04e8cf1da9c287f2290815997eb3 | |
parent | 14d0502f3da68e7219e6a6532537762fb3e0d39f (diff) | |
parent | 77aa9e489eafdd700df399b2e47a0ff313a91870 (diff) | |
download | linux-yocto-v5.15/standard/tiny/x86.tar.gz linux-yocto-v5.15/standard/tiny/x86.tar.bz2 linux-yocto-v5.15/standard/tiny/x86.zip |
Merge branch 'v5.15/standard/base' into v5.15/standard/tiny/x86v5.15/standard/tiny/x86
-rw-r--r-- | kernel/bpf/Kconfig | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/kernel/bpf/Kconfig b/kernel/bpf/Kconfig index a82d6de86522..d24d518ddd63 100644 --- a/kernel/bpf/Kconfig +++ b/kernel/bpf/Kconfig @@ -64,6 +64,7 @@ config BPF_JIT_DEFAULT_ON config BPF_UNPRIV_DEFAULT_OFF bool "Disable unprivileged BPF by default" + default y depends on BPF_SYSCALL help Disables unprivileged BPF by default by setting the corresponding @@ -72,6 +73,12 @@ config BPF_UNPRIV_DEFAULT_OFF disable it by setting it to 1 (from which no other transition to 0 is possible anymore). + Unprivileged BPF could be used to exploit certain potential + speculative execution side-channel vulnerabilities on unmitigated + affected hardware. + + If you are unsure how to answer this question, answer Y. + source "kernel/bpf/preload/Kconfig" config BPF_LSM |