ARM: include unprivileged BPF status in Spectre V2 reporting
The mitigations for Spectre-BHB are only applied when an exception
is taken, but when unprivileged BPF is enabled, userspace can
load BPF programs that can be used to exploit the problem.
When unprivileged BPF is enabled, report the vulnerable status via
the spectre_v2 sysfs file.
Signed-off-by:
Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
Loading
-
mentioned in commit bd237683
-
mentioned in commit a4e68d43
-
mentioned in commit 593c0ba4
-
mentioned in commit db8af3b9
-
mentioned in commit c16f47ad
-
mentioned in commit ef359d62
-
mentioned in commit ac6cd6c9
-
mentioned in commit 81cb2e64
-
mentioned in commit 2ead5150
-
mentioned in commit 3f2f5cb4
Please sign in to comment