mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2025-01-07 22:42:04 +00:00
seccomp: Use PR_SPEC_FORCE_DISABLE
Use PR_SPEC_FORCE_DISABLE in seccomp() because seccomp does not allow to widen restrictions. Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
This commit is contained in:
parent
356e4bfff2
commit
b849a812f7
@ -239,7 +239,7 @@ static inline void spec_mitigate(struct task_struct *task,
|
||||
int state = arch_prctl_spec_ctrl_get(task, which);
|
||||
|
||||
if (state > 0 && (state & PR_SPEC_PRCTL))
|
||||
arch_prctl_spec_ctrl_set(task, which, PR_SPEC_DISABLE);
|
||||
arch_prctl_spec_ctrl_set(task, which, PR_SPEC_FORCE_DISABLE);
|
||||
}
|
||||
|
||||
static inline void seccomp_assign_mode(struct task_struct *task,
|
||||
|
Loading…
Reference in New Issue
Block a user