Re: [PATCH] x86/entry/64: randomize kernel stack offset upon syscall

From: Linus Torvalds
Date: Fri May 03 2019 - 15:19:49 EST

On Fri, May 3, 2019 at 9:40 AM David Laight <David.Laight@xxxxxxxxxx> wrote:
> That gives you 10 system calls per rdrand instruction
> and mostly takes the latency out of line.

Do we really want to do this? What is the attack scenario?

With no VLA's, and the stackleak plugin, what's the upside? Are we
adding random code (literally) "just because"?