diff options
author | Ard Biesheuvel <ardb@kernel.org> | 2022-11-30 19:37:17 +0300 |
---|---|---|
committer | Ard Biesheuvel <ardb@kernel.org> | 2022-12-01 16:48:26 +0300 |
commit | 7572ac3c979d4d0fb42d73a72d2608656516ff4f (patch) | |
tree | 1f5d452d5b93e3ac525dbaa04ed9106aa9ba4b18 /security/selinux | |
parent | 9b9eaee9828fe98b030cf43ac50065a54a2f5d52 (diff) | |
download | linux-7572ac3c979d4d0fb42d73a72d2608656516ff4f.tar.xz |
arm64: efi: Revert "Recover from synchronous exceptions ..."
This reverts commit 23715a26c8d81291, which introduced some code in
assembler that manipulates both the ordinary and the shadow call stack
pointer in a way that could potentially be taken advantage of. So let's
revert it, and do a better job the next time around.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Diffstat (limited to 'security/selinux')
0 files changed, 0 insertions, 0 deletions