From: Alan Cox Subject: Re: [patch 5/5] Apply the PG_sensitive flag to the CryptoAPI subsystem Date: Sun, 31 May 2009 11:34:04 +0100 Message-ID: <20090531113404.5051114d@lxorguk.ukuu.org.uk> References: <20090520190519.GE10756@oblivion.subreption.com> <20090530180540.GE20013@elte.hu> <4A225887.21178.1C8AE762@pageexec.freemail.hu> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: "Larry H." , Ingo Molnar , linux-kernel@vger.kernel.org, Linus Torvalds , linux-mm@kvack.org, Ingo Molnar , linux-crypto@vger.kernel.org, Pekka Enberg , Peter Zijlstra To: pageexec@freemail.hu Return-path: In-Reply-To: <4A225887.21178.1C8AE762@pageexec.freemail.hu> Sender: owner-linux-mm@kvack.org List-Id: linux-crypto.vger.kernel.org > > Also, there's no discussion about long-lived threads keeping > > sensitive information in there kernel stack indefinitely. > > kernel stack clearing isn't hard to do, just do it on every syscall exit > and in the infinite loop for kernel threads. Actually that is probably not as important. In most cases you would be leaking data between syscalls made by the same thread. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org