On Wed, Sep 05, 2018 at 10:02:41AM +0200, Jiri Kosina wrote: > Yeah, I did more or less that earlier today; my series currently has
Excellent, maybe add a wee comment like so? > +static bool ibpb_needed(struct task_struct *tsk, u64 last_ctx_id) > +{ /* * Check if the current (previous) task has access to the memory * of the @tsk (next) task. If access is denied, make sure to * issue a IBPB to stop user->user Spectre-v2 attacks. * * Note: __ptrace_may_access() returns 0 or -ERRNO. */ > + return (tsk && tsk->mm && tsk->mm->context.ctx_id != last_ctx_id && > + __ptrace_may_access(tsk, PTRACE_MODE_IBPB)); > +}