Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934290AbdGKWPE (ORCPT ); Tue, 11 Jul 2017 18:15:04 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:34572 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934226AbdGKWPB (ORCPT ); Tue, 11 Jul 2017 18:15:01 -0400 Date: Tue, 11 Jul 2017 15:14:34 -0700 From: Ram Pai To: Dave Hansen Cc: Benjamin Herrenschmidt , linux-arch@vger.kernel.org, corbet@lwn.net, arnd@arndb.de, linux-doc@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, mingo@redhat.com, paulus@samba.org, aneesh.kumar@linux.vnet.ibm.com, linux-kselftest@vger.kernel.org, akpm@linux-foundation.org, linuxppc-dev@lists.ozlabs.org, khandual@linux.vnet.ibm.com Subject: Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation Reply-To: Ram Pai References: <1499289735-14220-1-git-send-email-linuxram@us.ibm.com> <1499289735-14220-13-git-send-email-linuxram@us.ibm.com> <3bd2ffd4-33ad-ce23-3db1-d1292e69ca9b@intel.com> <1499808577.2865.30.camel@kernel.crashing.org> <20170711215105.GA5542@ram.oc3035372033.ibm.com> <3bdd9083-ef2a-d1da-802c-c6822cf818b3@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3bdd9083-ef2a-d1da-802c-c6822cf818b3@intel.com> User-Agent: Mutt/1.5.20 (2009-12-10) X-TM-AS-GCONF: 00 x-cbid: 17071122-0028-0000-0000-000007FF6D72 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00007351; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000214; SDB=6.00886204; UDB=6.00442341; IPR=6.00666353; BA=6.00005468; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00016185; XFM=3.00000015; UTC=2017-07-11 22:14:49 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17071122-0029-0000-0000-000036A1B8F9 Message-Id: <20170711221434.GB5542@ram.oc3035372033.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-07-11_11:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1706020000 definitions=main-1707110354 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3244 Lines: 86 On Tue, Jul 11, 2017 at 02:57:30PM -0700, Dave Hansen wrote: > On 07/11/2017 02:51 PM, Ram Pai wrote: > > On Wed, Jul 12, 2017 at 07:29:37AM +1000, Benjamin Herrenschmidt wrote: > >> On Tue, 2017-07-11 at 11:11 -0700, Dave Hansen wrote: > >>> On 07/05/2017 02:21 PM, Ram Pai wrote: > >>>> Currently sys_pkey_create() provides the ability to disable read > >>>> and write permission on the key, at creation. powerpc has the > >>>> hardware support to disable execute on a pkey as well.This patch > >>>> enhances the interface to let disable execute at key creation > >>>> time. x86 does not allow this. Hence the next patch will add > >>>> ability in x86 to return error if PKEY_DISABLE_EXECUTE is > >>>> specified. > >> > >> That leads to the question... How do you tell userspace. > >> > >> (apologies if I missed that in an existing patch in the series) > >> > >> How do we inform userspace of the key capabilities ? There are at least > >> two things userspace may want to know already: > >> > >> - What protection bits are supported for a key > > > > the userspace is the one which allocates the keys and enables/disables the > > protection bits on the key. the kernel is just a facilitator. Now if the > > use space wants to know the current permissions on a given key, it can > > just read the AMR/PKRU register on powerpc/intel respectively. > > Let's say I want to execute-disable a region. Can I use protection > keys? Do I do > > pkey_mprotect(... PKEY_DISABLE_EXECUTE); > > and assume that the -EINVAL is because PKEY_DISABLE_EXECUTE is > unsupported, or do I do: > > #ifdef __ppc__ > pkey = pkey_aloc(); > pkey_mprotect(... PKEY_DISABLE_EXECUTE); > #else > mprotect(); > #endif on ppc you could do either pkey = pkey_alloc(..,PKEY_DISABLE_EXECUTE); pkey_mprotect(...,pkey); or you can just do the x86 way mprotect(); > > >> - How many keys exist > > > > There is no standard way of finding this other than trying to allocate > > as many till you fail. A procfs or sysfs file can be added to expose > > this information. > > It's also dynamic. On x86, you lose a key if you've used the > execute-only support. We also reserve the right to steal more in the > future if we want. total number of key supported on the architecture is a constant. How many are reserved by the architecture is also probably known in advance. Now how many does the kernel use to reserve for itself is something the kernel knows too and hence can expose it, though the information may change dynamically as the kernel reserves and releases the key based on its internal needs. So i think we can expose this informaton through procfs/sysfs and let the application decide how it wants to use the information. > > >> - Which keys are available for use by userspace. On PowerPC, the > >> kernel can reserve some keys for itself, so can the hypervisor. In > >> fact, they do. > > > > this information can be exposed through /proc or /sysfs > > > > I am sure there will be more demands and requirements as applications > > start leveraging these feature. > > For 5 bits, I think just having someone run pkey_alloc() in a loop is > fine. I don't think we really need to enumerate it in some other way. -- Ram Pai