summaryrefslogtreecommitdiff
path: root/arch/arm/include/asm/assembler.h
diff options
context:
space:
mode:
authorRussell King (Oracle) <rmk+kernel@armlinux.org.uk>2022-03-07 19:28:32 +0000
committerRussell King (Oracle) <rmk+kernel@armlinux.org.uk>2022-03-08 14:46:08 +0000
commit25875aa71dfefd1959f07e626c4d285b88b27ac2 (patch)
tree85333d5e2e4f143773dc9e455c156a8ad73c3afa /arch/arm/include/asm/assembler.h
parentb9baf5c8c5c356757f4f9d8180b5e9d234065bc3 (diff)
ARM: include unprivileged BPF status in Spectre V2 reporting
The mitigations for Spectre-BHB are only applied when an exception is taken, but when unprivileged BPF is enabled, userspace can load BPF programs that can be used to exploit the problem. When unprivileged BPF is enabled, report the vulnerable status via the spectre_v2 sysfs file. Signed-off-by: Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
Diffstat (limited to 'arch/arm/include/asm/assembler.h')
0 files changed, 0 insertions, 0 deletions