From: Mike Rapoport <rppt@kernel.org> To: linux-kernel@vger.kernel.org Cc: Alexey Dobriyan <adobriyan@gmail.com>, Andrew Morton <akpm@linux-foundation.org>, Andy Lutomirski <luto@kernel.org>, Arnd Bergmann <arnd@arndb.de>, Borislav Petkov <bp@alien8.de>, Dave Hansen <dave.hansen@linux.intel.com>, James Bottomley <jejb@linux.ibm.com>, Mike Rapoport <rppt@kernel.org>, Peter Zijlstra <peterz@infradead.org>, Steven Rostedt <rostedt@goodmis.org>, Thomas Gleixner <tglx@linutronix.de>, Ingo Molnar <mingo@redhat.com>, "H. Peter Anvin" <hpa@zytor.com>, linux-api@vger.kernel.org, linux-mm@kvack.org, x86@kernel.org, Mike Rapoport <rppt@linux.ibm.com> Subject: [PATCH RFC] mm: add MAP_EXCLUSIVE to create exclusive user mappings Date: Sun, 27 Oct 2019 12:17:31 +0200 [thread overview] Message-ID: <1572171452-7958-1-git-send-email-rppt@kernel.org> (raw) From: Mike Rapoport <rppt@linux.ibm.com> Hi, The patch below aims to allow applications to create mappins that have pages visible only to the owning process. Such mappings could be used to store secrets so that these secrets are not visible neither to other processes nor to the kernel. I've only tested the basic functionality, the changes should be verified against THP/migration/compaction. Yet, I'd appreciate early feedback. Mike Rapoport (1): mm: add MAP_EXCLUSIVE to create exclusive user mappings arch/x86/mm/fault.c | 14 ++++++++++ fs/proc/task_mmu.c | 1 + include/linux/mm.h | 9 +++++++ include/linux/page-flags.h | 7 +++++ include/linux/page_excl.h | 49 ++++++++++++++++++++++++++++++++++ include/trace/events/mmflags.h | 9 ++++++- include/uapi/asm-generic/mman-common.h | 1 + kernel/fork.c | 3 ++- mm/Kconfig | 3 +++ mm/gup.c | 8 ++++++ mm/memory.c | 3 +++ mm/mmap.c | 16 +++++++++++ mm/page_alloc.c | 5 ++++ 13 files changed, 126 insertions(+), 2 deletions(-) create mode 100644 include/linux/page_excl.h -- 2.7.4
next reply other threads:[~2019-10-27 10:17 UTC|newest] Thread overview: 60+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-10-27 10:17 Mike Rapoport [this message] 2019-10-27 10:17 ` Mike Rapoport 2019-10-28 12:31 ` Kirill A. Shutemov 2019-10-28 13:00 ` Mike Rapoport 2019-10-28 13:16 ` Kirill A. Shutemov 2019-10-28 13:55 ` Peter Zijlstra 2019-10-28 19:59 ` Edgecombe, Rick P 2019-10-28 21:00 ` Peter Zijlstra 2019-10-29 17:27 ` Edgecombe, Rick P 2019-10-30 10:04 ` Peter Zijlstra 2019-10-30 15:35 ` Alexei Starovoitov 2019-10-30 18:39 ` Peter Zijlstra 2019-10-30 18:52 ` Alexei Starovoitov 2019-10-30 17:48 ` Edgecombe, Rick P 2019-10-30 17:58 ` Dave Hansen 2019-10-30 18:01 ` Dave Hansen 2019-10-29 5:43 ` Dan Williams 2019-10-29 6:43 ` Kirill A. Shutemov 2019-10-29 8:56 ` Peter Zijlstra 2019-10-29 11:00 ` Kirill A. Shutemov 2019-10-29 12:39 ` AMD TLB errata, (Was: [PATCH RFC] mm: add MAP_EXCLUSIVE to create exclusive user mappings) Peter Zijlstra 2019-11-15 14:12 ` Tom Lendacky 2019-11-15 14:31 ` Peter Zijlstra 2019-10-29 19:43 ` [PATCH RFC] mm: add MAP_EXCLUSIVE to create exclusive user mappings Dan Williams 2019-10-29 20:07 ` Dave Hansen 2019-10-29 7:08 ` Christopher Lameter 2019-10-29 8:55 ` Mike Rapoport 2019-10-29 10:12 ` Christopher Lameter 2019-10-30 7:11 ` Mike Rapoport 2019-10-30 12:09 ` Christopher Lameter 2019-10-28 14:55 ` David Hildenbrand 2019-10-28 17:12 ` Dave Hansen 2019-10-28 17:32 ` Sean Christopherson 2019-10-28 18:08 ` Matthew Wilcox 2019-10-29 9:28 ` Mike Rapoport 2019-10-29 9:19 ` Mike Rapoport 2019-10-28 18:02 ` Andy Lutomirski 2019-10-29 11:02 ` David Hildenbrand 2019-10-30 8:15 ` Mike Rapoport 2019-10-30 8:19 ` David Hildenbrand 2019-10-31 19:16 ` Mike Rapoport 2019-10-31 21:52 ` Dan Williams 2019-10-27 10:30 ` Florian Weimer 2019-10-27 11:00 ` Mike Rapoport 2019-10-28 20:23 ` Florian Weimer 2019-10-29 9:01 ` Mike Rapoport 2019-10-28 20:44 ` Andy Lutomirski 2019-10-29 9:32 ` Mike Rapoport 2019-10-29 17:00 ` Andy Lutomirski 2019-10-30 8:40 ` Mike Rapoport 2019-10-30 21:28 ` Andy Lutomirski 2019-10-31 7:21 ` Mike Rapoport 2019-12-05 15:34 ` Mike Rapoport 2019-12-08 14:10 ` [PATCH] mm: extend memfd with ability to create secret memory kbuild test robot 2019-10-29 11:25 ` [PATCH RFC] mm: add MAP_EXCLUSIVE to create exclusive user mappings Reshetova, Elena 2019-10-29 15:13 ` Tycho Andersen 2019-10-29 17:03 ` Andy Lutomirski 2019-10-29 17:37 ` Alan Cox 2019-10-29 17:43 ` James Bottomley 2019-10-29 18:10 ` Andy Lutomirski
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=1572171452-7958-1-git-send-email-rppt@kernel.org \ --to=rppt@kernel.org \ --cc=adobriyan@gmail.com \ --cc=akpm@linux-foundation.org \ --cc=arnd@arndb.de \ --cc=bp@alien8.de \ --cc=dave.hansen@linux.intel.com \ --cc=hpa@zytor.com \ --cc=jejb@linux.ibm.com \ --cc=linux-api@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=luto@kernel.org \ --cc=mingo@redhat.com \ --cc=peterz@infradead.org \ --cc=rostedt@goodmis.org \ --cc=rppt@linux.ibm.com \ --cc=tglx@linutronix.de \ --cc=x86@kernel.org \ --subject='Re: [PATCH RFC] mm: add MAP_EXCLUSIVE to create exclusive user mappings' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).