Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3314261imm; Tue, 29 May 2018 05:13:22 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoANdzLuuRiodGr1/aP0sA+dKjTqaP7dlYRVwHbbLT6hn4VIvw1p9CyCL4B1hvI+VqEmQAk X-Received: by 2002:a63:7905:: with SMTP id u5-v6mr13578123pgc.411.1527596002489; Tue, 29 May 2018 05:13:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527596002; cv=none; d=google.com; s=arc-20160816; b=wZvNTLNPlt1GcrEHNQliVxXJDpDC3/tjfu0UxIRzApxUU4+TVWv4oWPvcVvGY+b3E/ ZXHhgMc2U+vmqn+SvERATtWP5wxbKptvOmhWtZOEkkH9nuuNlBoh+y1VM4D0WifCAkXY /RqC17SQNJ0BJfrBW8I82zn0DYxrELhkfZNHzOkaIGtmuC+UjDc+W9xckX5w9+G6DsK3 t9y2Ud31TkH8PuvJVCnGqQfRA8Txc8qfA8EeqNOSQmnRA7r+6vZdNtcU8j1PtxJ9rhMw 3p/NXQ1ALpbOY2PRDR3V84Lq34g64+nPtduEqNM7n4LkTETHpb84nqYLZlptbtWt63e4 cdIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=SbQ7cBSvIPgvihWxRu7buxae5/fDKWD74WQQDKhVMbk=; b=dZFxNEBKjulRARO9fSXNWMRbFV7AZhIjqvFcBrli/HpVP2JcSTbhCrAN1bjqh4fuaH hwzVSpLsgI7mCzlBAlgn6UYRpUZ20RRp9xDwwz9e0yNlWDnNIungS8uT1AfKRRJt+WnR vSOl2B2JCD/8UvNrcsGJvowNPcoIISJgbvlzgjumvfU5m3MFe3rgEDnXSyVj9WTEvXqV tthqdHC0zwnQJMBGt/2o1XzJvauvAwql//NhfIRUXOkzKK3rnP8uWYgdEeMeRdxt0LAQ JwZI4bSCYcdgMtzib4JwXKA/Yqg9BFa7F7mhvI0q9Ue1DV1hHu0zpymrYS6SWwknuC7D Oqtw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y34-v6si32428131plb.17.2018.05.29.05.13.08; Tue, 29 May 2018 05:13:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933921AbeE2MMW (ORCPT + 99 others); Tue, 29 May 2018 08:12:22 -0400 Received: from foss.arm.com ([217.140.101.70]:38696 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933793AbeE2MMP (ORCPT ); Tue, 29 May 2018 08:12:15 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id DC692174E; Tue, 29 May 2018 05:12:14 -0700 (PDT) Received: from approximate.cambridge.arm.com (approximate.cambridge.arm.com [10.1.206.75]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 84D463F53D; Tue, 29 May 2018 05:12:12 -0700 (PDT) From: Marc Zyngier To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.cs.columbia.edu Cc: Will Deacon , Catalin Marinas , Thomas Gleixner , Andy Lutomirski , Kees Cook , Greg Kroah-Hartman , Christoffer Dall , Randy Dunlap , Dominik Brodowski , Julien Grall , Mark Rutland Subject: [PATCH v2 17/17] arm64: ssbd: Implement arch_seccomp_spec_mitigate Date: Tue, 29 May 2018 13:11:21 +0100 Message-Id: <20180529121121.24927-18-marc.zyngier@arm.com> X-Mailer: git-send-email 2.14.2 In-Reply-To: <20180529121121.24927-1-marc.zyngier@arm.com> References: <20180529121121.24927-1-marc.zyngier@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Now that we have a way to safely implement TIF_SSBD for tasks that are not in the kernel at the point were the flag gets set, let's implement arch_seccomp_spec_mitigate(). Signed-off-by: Marc Zyngier --- arch/arm64/kernel/ssbd.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/arch/arm64/kernel/ssbd.c b/arch/arm64/kernel/ssbd.c index 34eafdc7fb6b..a61da5e1b2ed 100644 --- a/arch/arm64/kernel/ssbd.c +++ b/arch/arm64/kernel/ssbd.c @@ -77,6 +77,13 @@ int arch_prctl_spec_ctrl_set(struct task_struct *task, unsigned long which, } } +#ifdef CONFIG_SECCOMP +void arch_seccomp_spec_mitigate(struct task_struct *task) +{ + ssbd_prctl_set(task, PR_SPEC_FORCE_DISABLE); +} +#endif + static int ssbd_prctl_get(struct task_struct *task) { switch (arm64_get_ssbd_state()) { -- 2.14.2