Re: [patch V2 27/28] x86/speculation: Add seccomp Spectre v2 user space protection mode

From: Randy Dunlap
Date: Sun Nov 25 2018 - 14:37:17 EST


Hi,

Can you alter this without publishing a v3?
(see below)

On 11/25/18 10:33 AM, Thomas Gleixner wrote:
> --- a/Documentation/admin-guide/kernel-parameters.txt
> +++ b/Documentation/admin-guide/kernel-parameters.txt
> @@ -4241,9 +4241,16 @@
> per thread. The mitigation control state
> is inherited on fork.
>
> + seccomp
> + - Same as "prctl" above, but all seccomp
> + threads will enable the mitigation unless
> + they explicitly opt out.
> +
> auto - Kernel selects the mitigation depending on
> the available CPU features and vulnerability.
> - Default is prctl.
> +
> + Default mitigation:
> + If CONFIG_SECCOMP=y "seccomp", otherwise "prctl"

If CONFIG_SECCOMP=y then "seccomp", otherwise "prctl".

>
> Not specifying this option is equivalent to
> spectre_v2_user=auto.

g'day.
--
~Randy