Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp497280pxj; Fri, 14 May 2021 08:29:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz4cg7CY6GuLaH8ojF5mmcnqWinvNiIf0baVZ9g5Fc2c/fX3BCPD1BfIyEFbmNltNMjdWnw X-Received: by 2002:a05:6638:2594:: with SMTP id s20mr25893819jat.140.1621006185411; Fri, 14 May 2021 08:29:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621006185; cv=none; d=google.com; s=arc-20160816; b=B4g686fSiJPy123ez94KblCVUITVEBF48iQuK5bkfJ9WMNLGGjvY/U3RlRGGqNsG5w OF+1VhwzeWCSRVu9rTfuPbYORd6KQBsAAmoYg7ci/RInazsDQgCUrlkqM5D7jYhur/rz 81YDcpGMSP1PwEQM7WMnywe18XQFUcyG5juzP+KXKRQS+/IUZlDBtNa62hUwKgS6E2IJ 8e7NkrbL6P9qte2gmEIqt3ByvbPlpwa8mpmOYCiOgfuu2yAzeKADeazecK2atZ1CLhLJ HYshiDwpnzoLSH6roCyBxxTy8ZMGLWyzQv+xZ4y8UA86a7w9m07y8/aOreUGAD8RiJRO MHEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :from:references:cc:to:subject:dkim-signature; bh=yW2asbdUagGat2ijahWn20ew93BwpmErRmbUGUDMNcY=; b=eQ5+yuwLwq8MdyX2PiuFkyV15I1ZRAyv5zH1o6iLzmC9ToT82l7oTuAVB4sfKbiaoZ duMqhk3cuS3/JvK7AhSIanfIkY9pc2mP2PLgXOgRSu4Q7RpEr9QVsQy7OAwaNfdT4k9L r7vZyeWSJ9jnDx+tGAEzwPPZmIZd5R8l9kqvSxLOtxZxHUFzwhhPR6vdpgwVzGbTUDso 1HvGSDsN9g8DMrWhwuOXeoqX2QrsoFpDEcafmfKkOZWfyVeaeTMDRAQ8mf3lGonc8hyz Ro4MHie5D1JnkoOsKhiTmfRDoo+YEQUfg8Kt6YwKPaN7H0M//84Qh+dA1oQNLgS5ScnD WSqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=E0Y0zG69; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a14si9352346ilm.103.2021.05.14.08.29.32; Fri, 14 May 2021 08:29:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=E0Y0zG69; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231948AbhENJ23 (ORCPT + 99 others); Fri, 14 May 2021 05:28:29 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:52695 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232311AbhENJ22 (ORCPT ); Fri, 14 May 2021 05:28:28 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1620984437; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=yW2asbdUagGat2ijahWn20ew93BwpmErRmbUGUDMNcY=; b=E0Y0zG69Hdn14GBr4g8Ra2Id5yMw/T0DlPFyFP/wbbFgke/h9JL03LQyS/Tf9xrN71u0W6 ZTogIFUtQjVHneG0D2QuzK0SpmQONBPbeqzfZhJqeiZUxRuzMQyyOzZewFBPaQROLHRHsl KYOM7YCvICqKnRigbAawTCqSUyvpSIo= Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-407-XbftvPN1MHqfQ99U87qEBQ-1; Fri, 14 May 2021 05:27:14 -0400 X-MC-Unique: XbftvPN1MHqfQ99U87qEBQ-1 Received: by mail-ed1-f70.google.com with SMTP id i19-20020a05640242d3b0290388cea34ed3so16052086edc.15 for ; Fri, 14 May 2021 02:27:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=yW2asbdUagGat2ijahWn20ew93BwpmErRmbUGUDMNcY=; b=hi6+9ntwDjHK2jTqSFltkW3rdTrVEH/Sh59OGNalswVtcMvi2UKQQp8z2TX/PlJO+/ zA9ARV+DIfGjz2wNidou17qBTIA3av+TGwmo8VjZUs0QhH/y1tK5GEm4eOq7xDLm2OtY Ewo6TK6SOAfq6/jULjRuAu+DJqM1T0w555EudCk/Z2GuNW27vIIswikp60hRE9b/++Yl gUM82yCOeh6IIJQGUqcoOpRDEnvigB055B/PpHqUWRkWmh2AjyAUGsleOBOuxhFVFsvQ PcIHxepf3IIeIqlUQ72Fc4B+aTLmAUxQgIU1MgCheGk6BZDA+lRXx9l5L+vK8ZPTNtTd 9z+Q== X-Gm-Message-State: AOAM530iLA4J0mW5tdAekRePgUKNb8iisLnvMNPxYasRnRSAIhk+bB8E V2E1ncoRkZ6mGjNE/7tzlxbfDlxrEqkwDIzzfvE+EoHm9zfXzUW4G7G54qe76bFIQOu+DwcUMYV KngWW2uDobcpKpap3cPbRsGFv X-Received: by 2002:a05:6402:10c6:: with SMTP id p6mr55735317edu.241.1620984433541; Fri, 14 May 2021 02:27:13 -0700 (PDT) X-Received: by 2002:a05:6402:10c6:: with SMTP id p6mr55735269edu.241.1620984433367; Fri, 14 May 2021 02:27:13 -0700 (PDT) Received: from [192.168.3.132] (p5b0c6501.dip0.t-ipconnect.de. [91.12.101.1]) by smtp.gmail.com with ESMTPSA id m9sm3510728ejj.53.2021.05.14.02.27.11 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 14 May 2021 02:27:13 -0700 (PDT) Subject: Re: [PATCH v19 6/8] PM: hibernate: disable when there are active secretmem users To: Mike Rapoport , Andrew Morton Cc: Alexander Viro , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Catalin Marinas , Christopher Lameter , Dan Williams , Dave Hansen , Elena Reshetova , "H. Peter Anvin" , Hagen Paul Pfeifer , Ingo Molnar , James Bottomley , Kees Cook , "Kirill A. Shutemov" , Matthew Wilcox , Matthew Garrett , Mark Rutland , Michal Hocko , Mike Rapoport , Michael Kerrisk , Palmer Dabbelt , Palmer Dabbelt , Paul Walmsley , Peter Zijlstra , "Rafael J. Wysocki" , Rick Edgecombe , Roman Gushchin , Shakeel Butt , Shuah Khan , Thomas Gleixner , Tycho Andersen , Will Deacon , Yury Norov , linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-nvdimm@lists.01.org, linux-riscv@lists.infradead.org, x86@kernel.org References: <20210513184734.29317-1-rppt@kernel.org> <20210513184734.29317-7-rppt@kernel.org> From: David Hildenbrand Organization: Red Hat Message-ID: Date: Fri, 14 May 2021 11:27:11 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <20210513184734.29317-7-rppt@kernel.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 13.05.21 20:47, Mike Rapoport wrote: > From: Mike Rapoport > > It is unsafe to allow saving of secretmem areas to the hibernation > snapshot as they would be visible after the resume and this essentially > will defeat the purpose of secret memory mappings. > > Prevent hibernation whenever there are active secret memory users. > > Signed-off-by: Mike Rapoport > Cc: Alexander Viro > Cc: Andy Lutomirski > Cc: Arnd Bergmann > Cc: Borislav Petkov > Cc: Catalin Marinas > Cc: Christopher Lameter > Cc: Dan Williams > Cc: Dave Hansen > Cc: David Hildenbrand > Cc: Elena Reshetova > Cc: Hagen Paul Pfeifer > Cc: "H. Peter Anvin" > Cc: Ingo Molnar > Cc: James Bottomley > Cc: "Kirill A. Shutemov" > Cc: Mark Rutland > Cc: Matthew Wilcox > Cc: Michael Kerrisk > Cc: Palmer Dabbelt > Cc: Palmer Dabbelt > Cc: Paul Walmsley > Cc: Peter Zijlstra > Cc: Rick Edgecombe > Cc: Roman Gushchin > Cc: Shakeel Butt > Cc: Shuah Khan > Cc: Thomas Gleixner > Cc: Tycho Andersen > Cc: Will Deacon > --- > include/linux/secretmem.h | 6 ++++++ > kernel/power/hibernate.c | 5 ++++- > mm/secretmem.c | 15 +++++++++++++++ > 3 files changed, 25 insertions(+), 1 deletion(-) > > diff --git a/include/linux/secretmem.h b/include/linux/secretmem.h > index e617b4afcc62..21c3771e6a56 100644 > --- a/include/linux/secretmem.h > +++ b/include/linux/secretmem.h > @@ -30,6 +30,7 @@ static inline bool page_is_secretmem(struct page *page) > } > > bool vma_is_secretmem(struct vm_area_struct *vma); > +bool secretmem_active(void); > > #else > > @@ -43,6 +44,11 @@ static inline bool page_is_secretmem(struct page *page) > return false; > } > > +static inline bool secretmem_active(void) > +{ > + return false; > +} > + > #endif /* CONFIG_SECRETMEM */ > > #endif /* _LINUX_SECRETMEM_H */ > diff --git a/kernel/power/hibernate.c b/kernel/power/hibernate.c > index da0b41914177..559acef3fddb 100644 > --- a/kernel/power/hibernate.c > +++ b/kernel/power/hibernate.c > @@ -31,6 +31,7 @@ > #include > #include > #include > +#include > #include > > #include "power.h" > @@ -81,7 +82,9 @@ void hibernate_release(void) > > bool hibernation_available(void) > { > - return nohibernate == 0 && !security_locked_down(LOCKDOWN_HIBERNATION); > + return nohibernate == 0 && > + !security_locked_down(LOCKDOWN_HIBERNATION) && > + !secretmem_active(); > } > > /** > diff --git a/mm/secretmem.c b/mm/secretmem.c > index 1ae50089adf1..7c2499e4de22 100644 > --- a/mm/secretmem.c > +++ b/mm/secretmem.c > @@ -40,6 +40,13 @@ module_param_named(enable, secretmem_enable, bool, 0400); > MODULE_PARM_DESC(secretmem_enable, > "Enable secretmem and memfd_secret(2) system call"); > > +static atomic_t secretmem_users; > + > +bool secretmem_active(void) > +{ > + return !!atomic_read(&secretmem_users); > +} > + > static vm_fault_t secretmem_fault(struct vm_fault *vmf) > { > struct address_space *mapping = vmf->vma->vm_file->f_mapping; > @@ -94,6 +101,12 @@ static const struct vm_operations_struct secretmem_vm_ops = { > .fault = secretmem_fault, > }; > > +static int secretmem_release(struct inode *inode, struct file *file) > +{ > + atomic_dec(&secretmem_users); > + return 0; > +} > + > static int secretmem_mmap(struct file *file, struct vm_area_struct *vma) > { > unsigned long len = vma->vm_end - vma->vm_start; > @@ -116,6 +129,7 @@ bool vma_is_secretmem(struct vm_area_struct *vma) > } > > static const struct file_operations secretmem_fops = { > + .release = secretmem_release, > .mmap = secretmem_mmap, > }; > > @@ -202,6 +216,7 @@ SYSCALL_DEFINE1(memfd_secret, unsigned int, flags) > file->f_flags |= O_LARGEFILE; > > fd_install(fd, file); > + atomic_inc(&secretmem_users); > return fd; > > err_put_fd: > It looks a bit racy, but I guess we don't really care about these corner cases. Acked-by: David Hildenbrand -- Thanks, David / dhildenb