Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 8 Jul 2016 10:46:39 +0200
From: Ingo Molnar <>
To: Kees Cook <>
Cc:, Rik van Riel <>,
	Casey Schaufler <>,
	PaX Team <>,
	Brad Spengler <>,
	Russell King <>,
	Catalin Marinas <>,
	Will Deacon <>,
	Ard Biesheuvel <>,
	Benjamin Herrenschmidt <>,
	Michael Ellerman <>,
	Tony Luck <>, Fenghua Yu <>,
	"David S. Miller" <>,,
	Christoph Lameter <>, Pekka Enberg <>,
	David Rientjes <>,
	Joonsoo Kim <>,
	Andrew Morton <>,
	Andy Lutomirski <>, Borislav Petkov <>,
	Mathias Krause <>, Jan Kara <>,
	Vitaly Wool <>,
	Andrea Arcangeli <>,
	Dmitry Vyukov <>,
	Laura Abbott <>,,,,,,,,
	Linus Torvalds <>,
	Thomas Gleixner <>,
	"H. Peter Anvin" <>,
	Peter Zijlstra <>
Subject: Re: [PATCH 0/9] mm: Hardened usercopy

* Kees Cook <> wrote:

> - I couldn't detect a measurable performance change with these features
>   enabled. Kernel build times were unchanged, hackbench was unchanged,
>   etc. I think we could flip this to "on by default" at some point.

Could you please try to find some syscall workload that does many small user 
copies and thus excercises this code path aggressively?

If that measurement works out fine then I'd prefer to enable these security checks 
by default.



Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.