From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756928AbdEGWTl (ORCPT ); Sun, 7 May 2017 18:19:41 -0400 Received: from mrelay.tugraz.at ([129.27.2.203]:31114 "EHLO mrelay.tugraz.at" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753859AbdEGWTi (ORCPT ); Sun, 7 May 2017 18:19:38 -0400 Subject: Re: [kernel-hardening] Re: [RFC, PATCH] x86_64: KAISER - do not map kernel in user mode To: Richard Weinberger References: <9df77051-ac01-bfe9-3cf7-4c2ecbcb9292@iaik.tugraz.at> <20170504154717.GA24353@infradead.org> <6013bf3f-c3bd-3836-e5e2-ea89cc2e556a@nod.at> CC: Christoph Hellwig , kernel list , "kernel-hardening@lists.openwall.com" , "clementine.maurice@iaik.tugraz.at" , "moritz.lipp@iaik.tugraz.at" , Michael Schwarz , Richard Fellner , "Kirill A. Shutemov" , Ingo Molnar , "anders.fogh@gdata-adan.de" From: Daniel Gruss Message-ID: <8aecf7d4-9767-5367-1bc0-75fbd4b17e46@iaik.tugraz.at> Date: Mon, 8 May 2017 00:18:14 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <6013bf3f-c3bd-3836-e5e2-ea89cc2e556a@nod.at> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [80.110.159.138] X-ClientProxiedBy: EXCG01-EXT.iaik.tugraz.at (2002:811b:98d3::811b:98d3) To EXCG01-INT.iaik.tugraz.at (2002:811b:981a::811b:981a) X-TM-AS-Product-Ver: SMEX-12.0.0.1464-8.100.1062-23056.002 X-TM-AS-Result: No--1.930200-0.000000-31 X-TM-AS-MatchedID: 150567-700075-139010-188198-700502-702020-700104-701848-7 00970-701407-712058-860092-701928-706891-705861-709584-703747-702662-148004 -148040-148133-10019-41000-42000-42003 X-TM-AS-User-Approved-Sender: Yes X-TM-AS-User-Blocked-Sender: No X-TUG-Backscatter-control: IqAlG2Mm08USmfDJcRVXXA X-Spam-Scanner: SpamAssassin 3.003001 X-Spam-Score-relay: -1.9 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2017-05-08 00:02, Richard Weinberger wrote: > Ahh, *very* recent is the keyword then. ;) > I was a bit confused since in your paper the overhead is less than 1%. Yes, only for very recent platforms (Skylake). While working on the paper we were surprised that we found overheads that small. > What platforms did you test? We tested it on multiple platforms for stability, but we only ran longer performance tests on different Skylake i7-6700K systems we mentioned in the paper. > i.e. how does it perform on recent AMD systems? Unfortunately, we don't have any AMD systems at hand. I'm also not sure how AMD is affected by the issue in the first place. Although unlikely, there is the possibility that the problem of KASLR information leakage through microarchitectural side channels might be Intel-specific.