summaryrefslogtreecommitdiff
path: root/security/selinux
diff options
context:
space:
mode:
authorArd Biesheuvel <ardb@kernel.org>2022-11-30 19:37:17 +0300
committerArd Biesheuvel <ardb@kernel.org>2022-12-01 16:48:26 +0300
commit7572ac3c979d4d0fb42d73a72d2608656516ff4f (patch)
tree1f5d452d5b93e3ac525dbaa04ed9106aa9ba4b18 /security/selinux
parent9b9eaee9828fe98b030cf43ac50065a54a2f5d52 (diff)
downloadlinux-7572ac3c979d4d0fb42d73a72d2608656516ff4f.tar.xz
arm64: efi: Revert "Recover from synchronous exceptions ..."
This reverts commit 23715a26c8d81291, which introduced some code in assembler that manipulates both the ordinary and the shadow call stack pointer in a way that could potentially be taken advantage of. So let's revert it, and do a better job the next time around. Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Diffstat (limited to 'security/selinux')
0 files changed, 0 insertions, 0 deletions