From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752563AbdHJNXJ (ORCPT ); Thu, 10 Aug 2017 09:23:09 -0400 Received: from mail-yw0-f176.google.com ([209.85.161.176]:33411 "EHLO mail-yw0-f176.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752311AbdHJNXH (ORCPT ); Thu, 10 Aug 2017 09:23:07 -0400 MIME-Version: 1.0 In-Reply-To: <20170810130531.GS23863@dhcp22.suse.cz> References: <20170806140425.20937-1-riel@redhat.com> <20170807132257.GH32434@dhcp22.suse.cz> <20170807134648.GI32434@dhcp22.suse.cz> <1502117991.6577.13.camel@redhat.com> <20170810130531.GS23863@dhcp22.suse.cz> From: =?UTF-8?Q?Colm_MacC=C3=A1rthaigh?= Date: Thu, 10 Aug 2017 15:23:05 +0200 Message-ID: Subject: Re: [PATCH v2 0/2] mm,fork,security: introduce MADV_WIPEONFORK To: Michal Hocko Cc: Rik van Riel , linux-kernel@vger.kernel.org, Mike Kravetz , linux-mm@kvack.org, Florian Weimer , akpm@linux-foundation.org, Kees Cook , luto@amacapital.net, Will Drewry , mingo@kernel.org, kirill@shutemov.name, dave.hansen@intel.com, linux-api@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Aug 10, 2017 at 3:05 PM, Michal Hocko wrote: >> Too late for that. VM_DONTFORK is already implemented >> through MADV_DONTFORK & MADV_DOFORK, in a way that is >> very similar to the MADV_WIPEONFORK from these patches. > > Yeah, those two seem to be breaking the "madvise as an advise" semantic as > well but that doesn't mean we should follow that pattern any further. I would imagine that many of the crypto applications using MADV_WIPEONFORK will also be using MADV_DONTDUMP. In cases where it's for protecting secret keys, I'd like to use both in my code, for example. Though that doesn't really help decide this. There is also at least one case for being able to turn WIPEONFORK on/off with an existing page; a process that uses privilege separation often goes through the following flow: 1. [ Access privileged keys as a power user and initialize memory ] 2. [ Fork a child process that actually does the work ] 3. [ Child drops privileges and uses the memory to do work ] 4. [ Parent hangs around to re-spawn a child if it crashes ] In that mode it would be convenient to be able to mark the memory as WIPEONFORK in the child, but not the parent. -- Colm