Conversation

This Tweet was deleted by the Tweet author. Learn more
Replying to
github.com/AndroidHardeni uses it for a relatively unimportant security feature. It's not enabled by default because MPK performed much worse than I expected and I don't think it's worth the cost in this case. I also found a serious bug in the Linux kernel implementation of MPK.
1
Replying to and
I implemented the feature for github.com/AndroidHardeni partly as a proof of concept for MPK. The performance on AWS was awful though. Toggling it on and off is comparable to locking and unlocking a mutex. I think it might have been way faster before assorted Spectre fixes, etc.
This Tweet was deleted by the Tweet author. Learn more
Replying to
Yeah, the measurable performance cost should only be when toggling it on. I'm used to arm64 where execute-only mappings are part of the standard memory permissions, although I still don't think the vanilla Linux kernel exposes it to userspace... but it's just a one line change.
1