Blame SOURCES/man-pages-4.15-proc.5-Speculation_Store_Bypass.patch

06400e
From 2d5049d33ee608c48efd0c02e48d135ddb766fa2 Mon Sep 17 00:00:00 2001
06400e
From: =?UTF-8?q?Nikola=20Forr=C3=B3?= <nforro@redhat.com>
06400e
Date: Mon, 23 Jul 2018 14:02:18 +0200
06400e
Subject: [PATCH 2/2] proc.5: Document /proc/[pid]/status
06400e
 Speculation_Store_Bypass field
06400e
MIME-Version: 1.0
06400e
Content-Type: text/plain; charset=UTF-8
06400e
Content-Transfer-Encoding: 8bit
06400e
06400e
Signed-off-by: Nikola Forró <nforro@redhat.com>
06400e
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
06400e
---
06400e
 man5/proc.5 | 7 +++++++
06400e
 1 file changed, 7 insertions(+)
06400e
06400e
diff --git a/man5/proc.5 b/man5/proc.5
06400e
index 9ae9e02..dc83c22 100644
06400e
--- a/man5/proc.5
06400e
+++ b/man5/proc.5
06400e
@@ -2262,6 +2262,7 @@ CapBnd: ffffffffffffffff
06400e
 CapAmb:	0000000000000000
06400e
 NoNewPrivs:     0
06400e
 Seccomp:        0
06400e
+Speculation_Store_Bypass:       vulnerable
06400e
 Cpus_allowed:   00000001
06400e
 Cpus_allowed_list:      0
06400e
 Mems_allowed:   1
06400e
@@ -2485,6 +2486,12 @@ This field is provided only if the kernel was built with the
06400e
 .BR CONFIG_SECCOMP
06400e
 kernel configuration option enabled.
06400e
 .IP *
06400e
+.IR Speculation_Store_Bypass :
06400e
+.\" commit fae1fa0fc6cca8beee3ab8ed71d54f9a78fa3f64
06400e
+Speculation flaw mitigation state
06400e
+(since Linux 4.17, see
06400e
+.BR prctl (2)).
06400e
+.IP *
06400e
 .IR Cpus_allowed :
06400e
 Mask of CPUs on which this process may run
06400e
 (since Linux 2.6.24, see
06400e
-- 
06400e
2.17.1
06400e