[PATCH 0/9] mm: Hardened usercopy
Ingo Molnar
mingo at kernel.org
Fri Jul 8 01:46:39 PDT 2016
* Kees Cook <keescook at chromium.org> wrote:
> - I couldn't detect a measurable performance change with these features
> enabled. Kernel build times were unchanged, hackbench was unchanged,
> etc. I think we could flip this to "on by default" at some point.
Could you please try to find some syscall workload that does many small user
copies and thus excercises this code path aggressively?
If that measurement works out fine then I'd prefer to enable these security checks
by default.
Thaks,
Ingo
More information about the linux-arm-kernel
mailing list