aboutsummaryrefslogtreecommitdiffstats
path: root/fs/proc/array.c
diff options
context:
space:
mode:
authorThomas Gleixner <tglx@linutronix.de>2018-05-03 16:09:15 -0400
committerThomas Gleixner <tglx@linutronix.de>2018-05-04 18:51:43 -0400
commit356e4bfff2c5489e016fdb925adbf12a1e3950ee (patch)
tree27bfbcbf2c23c3d6cfa0219e93ccf35c2e14f5b3 /fs/proc/array.c
parentf9544b2b076ca90d887c5ae5d74fab4c21bb7c13 (diff)
prctl: Add force disable speculation
For certain use cases it is desired to enforce mitigations so they cannot be undone afterwards. That's important for loader stubs which want to prevent a child from disabling the mitigation again. Will also be used for seccomp(). The extra state preserving of the prctl state for SSB is a preparatory step for EBPF dymanic speculation control. Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'fs/proc/array.c')
-rw-r--r--fs/proc/array.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/fs/proc/array.c b/fs/proc/array.c
index 303c155f9b04..d178a0236514 100644
--- a/fs/proc/array.c
+++ b/fs/proc/array.c
@@ -344,6 +344,9 @@ static inline void task_seccomp(struct seq_file *m, struct task_struct *p)
344 case PR_SPEC_NOT_AFFECTED: 344 case PR_SPEC_NOT_AFFECTED:
345 seq_printf(m, "not vulnerable"); 345 seq_printf(m, "not vulnerable");
346 break; 346 break;
347 case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE:
348 seq_printf(m, "thread force mitigated");
349 break;
347 case PR_SPEC_PRCTL | PR_SPEC_DISABLE: 350 case PR_SPEC_PRCTL | PR_SPEC_DISABLE:
348 seq_printf(m, "thread mitigated"); 351 seq_printf(m, "thread mitigated");
349 break; 352 break;