Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752584AbdF2RyZ (ORCPT ); Thu, 29 Jun 2017 13:54:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55154 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751936AbdF2RyS (ORCPT ); Thu, 29 Jun 2017 13:54:18 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 6561FC0B2013 Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=riel@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 6561FC0B2013 Message-ID: <1498758853.6130.2.camel@redhat.com> Subject: Re: [PATCH v2] mm: Add SLUB free list pointer obfuscation From: Rik van Riel To: Kees Cook , Christoph Lameter Cc: Andrew Morton , Laura Abbott , Daniel Micay , Pekka Enberg , David Rientjes , Joonsoo Kim , "Paul E. McKenney" , Ingo Molnar , Josh Triplett , Andy Lutomirski , Nicolas Pitre , Tejun Heo , Daniel Mack , Sebastian Andrzej Siewior , Sergey Senozhatsky , Helge Deller , LKML , Linux-MM , "kernel-hardening@lists.openwall.com" Date: Thu, 29 Jun 2017 13:54:13 -0400 In-Reply-To: References: <20170623015010.GA137429@beast> Organization: Red Hat, Inc Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Thu, 29 Jun 2017 17:54:18 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1271 Lines: 32 On Thu, 2017-06-29 at 10:47 -0700, Kees Cook wrote: > On Thu, Jun 29, 2017 at 10:05 AM, Christoph Lameter > wrote: > > On Sun, 25 Jun 2017, Kees Cook wrote: > > > > > The difference gets lost in the noise, but if the above is > > > sensible, > > > it's 0.07% slower. ;) > > > > Hmmm... These differences add up. Also in a repetative benchmark > > like that > > you do not see the impact that the additional cacheline use in the > > cpu > > cache has on larger workloads. Those may be pushed over the edge of > > l1 or > > l2 capacity at some point which then causes drastic regressions. > > Even if that is true, it may be worth it to some people to have the > protection. Given that is significantly hampers a large class of heap > overflow attacks[1], I think it's an important change to have. I'm > not > suggesting this be on by default, it's cleanly behind > CONFIG-controlled macros, and is very limited in scope. If you can > Ack > it we can let system builders decide if they want to risk a possible > performance hit. I'm pretty sure most distros would like to have this > protection. I could certainly see it being useful for all kinds of portable and network-connected systems where security is simply much more important than performance.