Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp3762132ybg; Mon, 28 Oct 2019 19:00:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqzlYupV17aV5k7im4rXa1yJbAtah1YypZaDWFIJvYNmcwnF62kelSrGgyxSfFEnyUhrGNny X-Received: by 2002:a17:906:e290:: with SMTP id gg16mr909460ejb.280.1572314408796; Mon, 28 Oct 2019 19:00:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572314408; cv=none; d=google.com; s=arc-20160816; b=wr8DCwKOTE3Judj/7CH5ZHQ1nZTVUzKx+jtcJMiH3RTIw9QZ6iYi+SXDIK4DYL6Jpc 585cs8wzPfcrORgn2B0Dn3IwBRZGFF+Tr+tJy/ASDG4VAjQjFQeiBULHVNdlTrSvg37H U9gT4Tdz0FKSsB+IO5ks/v2uMDXtjBvP9V0o0rpH+rSkPr0y6pT9OSkA/MERS9sg6kQ0 Dudg5o4f7Vxe3rDpOOnpk3lHhkUIGSAL2oje5O2ghnPQVIrBDiw8IXy4IpQPOjPiVD2K 3BCJX9CeWNT7olYNwV7WPihRPO06t+b+f/hjImS9KBzj6rxWR2MbfmhwjmCMDTduOzbd XxKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=nOTlgu4WDqJVZqN73p3k8vFBxdGWeLDzWkoFBGm7hAY=; b=tLUUhzUphaO0YjRt9qfW/TqU00rxspTG5qfDkPUw1Vw+bGHfHTZHcwo8GDLCAQWWmc 6vkiDRoRZNwdKCo73oWTrG2r+5lHgKm/u3KrDEwQD1UqitrobL0eWZtEqKcrfTL1vkL6 m59EjLDwgV6MD8wu1B65ze3OaCv86HFCIlIKWmObvGq5dTSwo9Rhr0r9D7BAS4OKuy3i g5s1zoCBcFrl52sernjGznDBH8TmDa7pAATEGCV5coPJGB6Q6EFVMaXwNMyvejNLapqA 61g3f+S2e46OUn68yoD5swOTOZH0FhU37UPY8TkOCTBt3ZCiwryUe+0ITCxr2hAI+qIY xzDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=W+ACpEJt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gq7si7734562ejb.39.2019.10.28.18.59.45; Mon, 28 Oct 2019 19:00:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=W+ACpEJt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729525AbfJ1NA2 (ORCPT + 99 others); Mon, 28 Oct 2019 09:00:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:44120 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726911AbfJ1NA1 (ORCPT ); Mon, 28 Oct 2019 09:00:27 -0400 Received: from rapoport-lnx (unknown [91.217.168.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C4CD220873; Mon, 28 Oct 2019 13:00:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572267626; bh=7B5KqT02XX9UUIrQVYUjxF/tdp4AX2fxoquk/g1eYlg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=W+ACpEJtAVmweITcDAONS+d676IgPfKwQtn05LXqUIkznSdTZHf+QRrS2253omIX6 f4YsmExVRa7lT6Sble5zHX+YPVeEOxeSUnSA2MCF1zYGfMN7ZbZtMsP1sGncjGcRyA H1P+eY3WBy01O4yAzuWeWSC4E50ZtAkaNQbdeAzo= Date: Mon, 28 Oct 2019 14:00:19 +0100 From: Mike Rapoport To: "Kirill A. Shutemov" Cc: linux-kernel@vger.kernel.org, Alexey Dobriyan , Andrew Morton , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Dave Hansen , James Bottomley , Peter Zijlstra , Steven Rostedt , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , linux-api@vger.kernel.org, linux-mm@kvack.org, x86@kernel.org, Mike Rapoport Subject: Re: [PATCH RFC] mm: add MAP_EXCLUSIVE to create exclusive user mappings Message-ID: <20191028130018.GA7192@rapoport-lnx> References: <1572171452-7958-1-git-send-email-rppt@kernel.org> <1572171452-7958-2-git-send-email-rppt@kernel.org> <20191028123124.ogkk5ogjlamvwc2s@box> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191028123124.ogkk5ogjlamvwc2s@box> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 28, 2019 at 03:31:24PM +0300, Kirill A. Shutemov wrote: > On Sun, Oct 27, 2019 at 12:17:32PM +0200, Mike Rapoport wrote: > > From: Mike Rapoport > > > > The mappings created with MAP_EXCLUSIVE are visible only in the context of > > the owning process and can be used by applications to store secret > > information that will not be visible not only to other processes but to the > > kernel as well. > > > > The pages in these mappings are removed from the kernel direct map and > > marked with PG_user_exclusive flag. When the exclusive area is unmapped, > > the pages are mapped back into the direct map. > > I probably blind, but I don't see where you manipulate direct map... __get_user_pages() calls __set_page_user_exclusive() which in turn calls set_direct_map_invalid_noflush() that makes the page not present. > -- > Kirill A. Shutemov -- Sincerely yours, Mike.