From: Mike Rapoport <rppt@kernel.org> To: Hagen Paul Pfeifer <hagen@jauu.net> Cc: Mark Rutland <mark.rutland@arm.com>, David Hildenbrand <david@redhat.com>, Peter Zijlstra <peterz@infradead.org>, Catalin Marinas <catalin.marinas@arm.com>, Dave Hansen <dave.hansen@linux.intel.com>, linux-mm@kvack.org, Will Deacon <will@kernel.org>, linux-kselftest@vger.kernel.org, "H. Peter Anvin" <hpa@zytor.com>, Christopher Lameter <cl@linux.com>, Idan Yaniv <idan.yaniv@ibm.com>, Thomas Gleixner <tglx@linutronix.de>, Elena Reshetova <elena.reshetova@intel.com>, linux-arch@vger.kernel.org, Tycho Andersen <tycho@tycho.ws>, linux-nvdimm@lists.01.org, Shuah Khan <shuah@kernel.org>, x86@kernel.org, Matthew Wilcox <willy@infradead.org>, Mike Rapoport <rppt@linux.ibm.com>, Ingo Molnar <mingo@redhat.com>, Michael Kerrisk <mtk.manpages@gmail.com>, Arnd Bergmann <arnd@arndb.de>, James Bottomley <jejb@linux.ibm.com>, Borislav Petkov <bp@alien8.de>, Alexander Viro <viro@zeniv.linux.org.uk>, Andy Lutomirski <luto@kernel.org>, Paul Walmsley <paul.walmsley@sifive.com>, "Kirill A. Shutemov" <kirill@shutemov.name>, Dan Williams <dan.j.williams@intel.com>, linux-arm-kernel@lists.infradead.org, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Palmer Dabbelt <palmer@dabbelt.com>, linux-fsdevel@vger.kernel.org, Andrew Morton <akpm@linux-foundation.org> Subject: Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas Date: Wed, 4 Nov 2020 19:02:47 +0200 Message-ID: <20201104170247.GT4879@kernel.org> (raw) In-Reply-To: <1988407921.138656.1604489953944@office.mailbox.org> On Wed, Nov 04, 2020 at 12:39:13PM +0100, Hagen Paul Pfeifer wrote: > > On 11/03/2020 5:30 PM Mike Rapoport <rppt@kernel.org> wrote: > > > > > > As long as the task share the file descriptor, they can share the > > > > secretmem pages, pretty much like normal memfd. > > > > > > Including process_vm_readv() and process_vm_writev()? Let's take a hypothetical > > > "dbus-daemon-secure" service that receives data from process A and wants to > > > copy/distribute it to data areas of N other processes. Much like dbus but without > > > SOCK_DGRAM rather direct copy into secretmem/mmap pages (ring-buffer). Should be > > > possible, right? > > > > I'm not sure I follow you here. > > For process_vm_readv() and process_vm_writev() secremem will be only > > accessible on the local part, but not on the remote. > > So copying data to secretmem pages using process_vm_writev wouldn't > > work. > > A hypothetical "dbus-daemon-secure" service will not be *process related* with communication > peers. E.g. a password-input process (reading a password into secured-memory page) will > transfer the password to dbus-daemon-secure and this service will hand-over the password to > two additional applications: a IPsec process on CPU0 und CPU1 (which itself use a > secured-memory page). > > So four applications IPC chain: > password-input -> dbus-daemon-secure -> {IPsec0, IPsec1} > > - password-input: uses a secured page to read/save the password locally after reading from TTY > - dbus-daemon-secure: uses a secured page for IPC (legitimate user can write and read into the secured page) > - IPSecN has secured page to save the password locally (and probably other data as well), IPC memory is memset'ed after copy > > Goal: the whole password is never saved/touched on non secured pages during IPC transfer. > > Question: maybe a *file-descriptor passing* mechanism can do the trick? I.e. dbus-daemon-secure > allocates via memfd_secret/mmap secure pages and permitted processes will get the descriptor/mmaped-page > passed so they can use the pages directly? Yes, this will work. The processes that share the memfd_secret file descriptor will have access to the same memory pages, pretty much like with shared memory. > Hagen -- Sincerely yours, Mike. _______________________________________________ linux-riscv mailing list linux-riscv@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-riscv
next prev parent reply index Thread overview: 57+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-09-24 13:28 Mike Rapoport 2020-09-24 13:28 ` [PATCH v6 1/6] mm: add definition of PMD_PAGE_ORDER Mike Rapoport 2020-09-24 13:29 ` [PATCH v6 2/6] mmap: make mlock_future_check() global Mike Rapoport 2020-09-24 13:29 ` [PATCH v6 3/6] mm: introduce memfd_secret system call to create "secret" memory areas Mike Rapoport 2020-09-29 4:58 ` Edgecombe, Rick P 2020-09-29 13:06 ` Mike Rapoport 2020-09-29 20:06 ` Edgecombe, Rick P 2020-09-30 10:35 ` Mike Rapoport 2020-09-30 20:11 ` Edgecombe, Rick P 2020-10-11 9:42 ` Mike Rapoport 2020-09-24 13:29 ` [PATCH v6 4/6] arch, mm: wire up memfd_secret system call were relevant Mike Rapoport 2020-09-24 13:29 ` [PATCH v6 5/6] mm: secretmem: use PMD-size pages to amortize direct map fragmentation Mike Rapoport 2020-09-25 7:41 ` Peter Zijlstra 2020-09-25 9:00 ` David Hildenbrand 2020-09-25 9:50 ` Peter Zijlstra 2020-09-25 10:31 ` Mark Rutland 2020-09-25 14:57 ` Tycho Andersen 2020-09-29 14:04 ` Mike Rapoport 2020-09-29 13:07 ` Mike Rapoport 2020-09-29 13:06 ` Mike Rapoport 2020-09-29 13:05 ` Mike Rapoport 2020-09-29 14:12 ` Peter Zijlstra 2020-09-29 14:31 ` Dave Hansen 2020-09-29 14:58 ` Mike Rapoport 2020-09-29 15:15 ` Peter Zijlstra 2020-09-30 10:27 ` Mike Rapoport 2020-09-30 14:39 ` James Bottomley 2020-09-30 14:45 ` David Hildenbrand 2020-09-30 15:17 ` James Bottomley 2020-09-30 15:25 ` David Hildenbrand 2020-09-30 15:09 ` Matthew Wilcox 2020-10-01 8:14 ` Mike Rapoport 2020-09-29 15:03 ` James Bottomley 2020-09-30 10:20 ` Mike Rapoport 2020-09-30 10:43 ` Peter Zijlstra 2020-09-24 13:29 ` [PATCH v6 6/6] secretmem: test: add basic selftest for memfd_secret(2) Mike Rapoport 2020-09-24 13:35 ` [PATCH] man2: new page describing memfd_secret() system call Mike Rapoport 2020-09-24 14:55 ` Alejandro Colomar 2020-10-03 9:32 ` Alejandro Colomar 2020-10-05 7:32 ` Mike Rapoport 2020-11-16 21:01 ` [PATCH v2] memfd_secret.2: New " Alejandro Colomar 2020-11-17 6:26 ` Mike Rapoport 2020-09-25 2:34 ` [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas Andrew Morton 2020-09-25 6:42 ` Mike Rapoport 2020-11-01 11:09 ` Hagen Paul Pfeifer 2020-11-02 15:40 ` Mike Rapoport 2020-11-03 13:52 ` Hagen Paul Pfeifer 2020-11-03 16:30 ` Mike Rapoport 2020-11-04 11:39 ` Hagen Paul Pfeifer 2020-11-04 17:02 ` Mike Rapoport [this message] 2020-11-09 10:41 ` Hagen Paul Pfeifer 2020-11-02 9:11 ` David Hildenbrand 2020-11-02 9:31 ` David Hildenbrand 2020-11-02 17:43 ` Mike Rapoport 2020-11-02 17:51 ` David Hildenbrand 2020-11-03 9:52 ` Mike Rapoport 2020-11-03 10:11 ` David Hildenbrand
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20201104170247.GT4879@kernel.org \ --to=rppt@kernel.org \ --cc=akpm@linux-foundation.org \ --cc=arnd@arndb.de \ --cc=bp@alien8.de \ --cc=catalin.marinas@arm.com \ --cc=cl@linux.com \ --cc=dan.j.williams@intel.com \ --cc=dave.hansen@linux.intel.com \ --cc=david@redhat.com \ --cc=elena.reshetova@intel.com \ --cc=hagen@jauu.net \ --cc=hpa@zytor.com \ --cc=idan.yaniv@ibm.com \ --cc=jejb@linux.ibm.com \ --cc=kirill@shutemov.name \ --cc=linux-api@vger.kernel.org \ --cc=linux-arch@vger.kernel.org \ --cc=linux-arm-kernel@lists.infradead.org \ --cc=linux-fsdevel@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-kselftest@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=linux-nvdimm@lists.01.org \ --cc=linux-riscv@lists.infradead.org \ --cc=luto@kernel.org \ --cc=mark.rutland@arm.com \ --cc=mingo@redhat.com \ --cc=mtk.manpages@gmail.com \ --cc=palmer@dabbelt.com \ --cc=paul.walmsley@sifive.com \ --cc=peterz@infradead.org \ --cc=rppt@linux.ibm.com \ --cc=shuah@kernel.org \ --cc=tglx@linutronix.de \ --cc=tycho@tycho.ws \ --cc=viro@zeniv.linux.org.uk \ --cc=will@kernel.org \ --cc=willy@infradead.org \ --cc=x86@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
Linux-RISC-V Archive on lore.kernel.org Archives are clonable: git clone --mirror https://lore.kernel.org/linux-riscv/0 linux-riscv/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 linux-riscv linux-riscv/ https://lore.kernel.org/linux-riscv \ linux-riscv@lists.infradead.org public-inbox-index linux-riscv Example config snippet for mirrors Newsgroup available over NNTP: nntp://nntp.lore.kernel.org/org.infradead.lists.linux-riscv AGPL code for this site: git clone https://public-inbox.org/public-inbox.git