aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBruce Ashfield <bruce.ashfield@gmail.com>2022-05-18 14:06:53 -0400
committerBruce Ashfield <bruce.ashfield@gmail.com>2022-05-18 14:06:53 -0400
commit108a6f150ec499ed05ec57520f766ca88d2c20c3 (patch)
tree9ec726c1f20e0871301934902f0e87ff2be7eae1
parent671cafce7fe3fe880becffc5a424e067ac520b11 (diff)
parent77aa9e489eafdd700df399b2e47a0ff313a91870 (diff)
downloadlinux-yocto-v5.15/standard/x86.tar.gz
linux-yocto-v5.15/standard/x86.tar.bz2
linux-yocto-v5.15/standard/x86.zip
Merge branch 'v5.15/standard/base' into v5.15/standard/x86v5.15/standard/x86
-rw-r--r--kernel/bpf/Kconfig7
1 files changed, 7 insertions, 0 deletions
diff --git a/kernel/bpf/Kconfig b/kernel/bpf/Kconfig
index a82d6de86522..d24d518ddd63 100644
--- a/kernel/bpf/Kconfig
+++ b/kernel/bpf/Kconfig
@@ -64,6 +64,7 @@ config BPF_JIT_DEFAULT_ON
config BPF_UNPRIV_DEFAULT_OFF
bool "Disable unprivileged BPF by default"
+ default y
depends on BPF_SYSCALL
help
Disables unprivileged BPF by default by setting the corresponding
@@ -72,6 +73,12 @@ config BPF_UNPRIV_DEFAULT_OFF
disable it by setting it to 1 (from which no other transition to
0 is possible anymore).
+ Unprivileged BPF could be used to exploit certain potential
+ speculative execution side-channel vulnerabilities on unmitigated
+ affected hardware.
+
+ If you are unsure how to answer this question, answer Y.
+
source "kernel/bpf/preload/Kconfig"
config BPF_LSM