RE: [PATCH v5 1/2] x86/speculation: apply IBPB more strictly to avoid cross-process data leak
From: Jiri Kosina
Date: Mon Sep 10 2018 - 15:14:17 EST
On Mon, 10 Sep 2018, Schaufler, Casey wrote:
> Why are you dropping the LSM check here, when in v4 you fixed the
> SELinux audit locking issue? We can avoid introducing an LSM hook
> and all the baggage around it if you can do the security_ptrace_access_check()
> here.
So what guarantees that none of the hooks that
security_ptrace_access_check() is invoking will not be taking locks (from
scheduler context in this case)?
Thanks,
--
Jiri Kosina
SUSE Labs