提交 8534f17e 编写于 作者: E Emmanuel Gil Peyrot 提交者: Yongqiang Liu

ARM: fix build error when BPF_SYSCALL is disabled

stable inclusion
from stable-v4.19.234
commit fffcf80d055c4f619ae9cd8bf3a8b67319317100
category: bugfix
bugzilla: 186460, https://gitee.com/src-openeuler/kernel/issues/I53MHA
CVE: CVE-2022-23960

--------------------------------

commit 330f4c53 upstream.

It was missing a semicolon.
Signed-off-by: NEmmanuel Gil Peyrot <linkmauve@linkmauve.fr>
Reviewed-by: NNathan Chancellor <nathan@kernel.org>
Fixes: 25875aa7 ("ARM: include unprivileged BPF status in Spectre V2 reporting").
Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Reviewed-by: NXiu Jianfeng <xiujianfeng@huawei.com>
Reviewed-by: NLiao Chang <liaochang1@huawei.com>
Signed-off-by: NYongqiang Liu <liuyongqiang13@huawei.com>
上级 a16c8564
...@@ -10,7 +10,7 @@ static bool _unprivileged_ebpf_enabled(void) ...@@ -10,7 +10,7 @@ static bool _unprivileged_ebpf_enabled(void)
#ifdef CONFIG_BPF_SYSCALL #ifdef CONFIG_BPF_SYSCALL
return !sysctl_unprivileged_bpf_disabled; return !sysctl_unprivileged_bpf_disabled;
#else #else
return false return false;
#endif #endif
} }
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册