[PATCH 0/9] mm: Hardened usercopy

Ingo Molnar mingo at kernel.org
Fri Jul 8 01:46:39 PDT 2016


* Kees Cook <keescook at chromium.org> wrote:

> - I couldn't detect a measurable performance change with these features
>   enabled. Kernel build times were unchanged, hackbench was unchanged,
>   etc. I think we could flip this to "on by default" at some point.

Could you please try to find some syscall workload that does many small user 
copies and thus excercises this code path aggressively?

If that measurement works out fine then I'd prefer to enable these security checks 
by default.

Thaks,

	Ingo



More information about the linux-arm-kernel mailing list