Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 7 Jul 2017 12:06:57 -0500 (CDT)
From: Christoph Lameter <>
To: Kees Cook <>
cc: Rik van Riel <>, Andrew Morton <>, 
    Pekka Enberg <>, David Rientjes <>, 
    Joonsoo Kim <>, 
    "Paul E. McKenney" <>, 
    Ingo Molnar <>, Josh Triplett <>, 
    Andy Lutomirski <>, 
    Nicolas Pitre <>, Tejun Heo <>, 
    Daniel Mack <>, 
    Sebastian Andrzej Siewior <>, 
    Sergey Senozhatsky <>, 
    Helge Deller <>, Linux-MM <>, 
    Tycho Andersen <>, LKML <>, 
    "" <>
Subject: Re: [PATCH v3] mm: Add SLUB free list pointer obfuscation

On Fri, 7 Jul 2017, Kees Cook wrote:

> If we also added a >0 offset, that would make things even less
> deterministic. Though I wonder if it would make the performance impact
> higher. The XOR patch right now is very light.

There would be barely any performance impact if you keep the offset within
a cacheline since most objects start on a cacheline boundary. The
processor has to fetch the cacheline anyways.

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.