|
Message-ID: <20190208151502.GC32494@hirez.programming.kicks-ass.net> Date: Fri, 8 Feb 2019 16:15:02 +0100 From: Peter Zijlstra <peterz@...radead.org> To: "Reshetova, Elena" <elena.reshetova@...el.com> Cc: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, "luto@...nel.org" <luto@...nel.org>, "tglx@...utronix.de" <tglx@...utronix.de>, "mingo@...hat.com" <mingo@...hat.com>, "bp@...en8.de" <bp@...en8.de>, "keescook@...omium.org" <keescook@...omium.org>, "tytso@....edu" <tytso@....edu> Subject: Re: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon system call On Fri, Feb 08, 2019 at 01:20:09PM +0000, Reshetova, Elena wrote: > > On Fri, Feb 08, 2019 at 02:15:49PM +0200, Elena Reshetova wrote: > I can measure the impact with rdtsc(), I think it is *very* small. > Btw, what should be the good measurement test? > I am not that happy with just looping on fopen-fclose, too > much noise. IIRC amluto had a nice micro-bench for 'pure' syscall overhead somewhere. Something like getpid/gettid in a loop should work fairly well, that's a really light syscall to make.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.