Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp2955557rwl; Fri, 6 Jan 2023 13:18:05 -0800 (PST) X-Google-Smtp-Source: AMrXdXs3JvNcz9y7/0RWlAhPw3fUfULsR1USk9z/ohJymclJu3uM7/soltpzR76IQoF9OZxjuvub X-Received: by 2002:a62:7bcd:0:b0:581:1c64:92bc with SMTP id w196-20020a627bcd000000b005811c6492bcmr44081993pfc.3.1673039885165; Fri, 06 Jan 2023 13:18:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673039885; cv=none; d=google.com; s=arc-20160816; b=mwW/TQhJAPHhKQvbV8AVzHbYkV0zcMsu6AFFfZ7Fc2D/T6/lIuRAn5ItF5BwCw/kaS Ttuz4mA8G477KilMV301X0SJxFVNaOIXlj1vbR+P4okNDrSNhxFqrcCDEDRwiu7dyRI0 OrEfnS2LF5/yaNOlWD10n5sSnzsnU0z2NEdvP6PotUB/I1ickgs2CyP5cTS1e4MpRK2Y ruuCSnquC56yB/WpCrcxVknhr7xwfXZQn2mofRa4JJW1xqz50ZC+Aj3v/lZzllkCrt+d jULqlKzf0fDZzJvmqpJAQLowjqToPsnOMzl2BkY2qW8efnve2Z449gMGwkepA6Y4zklu uamw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=6TxHKlwJQCLSbYZxgdJdZSJ5mNfa7xbEinv+9m+b8dU=; b=D/8R37Jw4cd6GwwOsSx0mxgMclm7NIjaGYNNx0BIUXjKujc56wqSIGteJ22K1HHA1/ +oOATj3La302KBHNQyf2D0LutkpA0ekQ4b4W0BqFt8fPx+M5qI0zq8e6wMIN2vG3rf5M cUHh/kzhWlxWfj3eCrFyl0jxXQh35fCixHW0nGU0KER+alVb2LGDyQaemjJTtSl7Ud6C KiXpI6TBFQI3IZGYmSI61Gi0L0EC1h5HiXQpmA4fOXgy0KYr9WmTOAHXnR9ap91bK+cl rZv7ZWvEOtJ4c1/ruu2sYoNHc8rV443zKF79RLjkR51gihH/7t1+/nv6jCGDhbCRE6br +e2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=google header.b=JkoJF2oW; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i125-20020a625483000000b005820c13b6e6si2227757pfb.320.2023.01.06.13.17.46; Fri, 06 Jan 2023 13:18:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=google header.b=JkoJF2oW; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235998AbjAFVLJ (ORCPT + 99 others); Fri, 6 Jan 2023 16:11:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51878 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236050AbjAFVLI (ORCPT ); Fri, 6 Jan 2023 16:11:08 -0500 Received: from mail-vs1-xe2b.google.com (mail-vs1-xe2b.google.com [IPv6:2607:f8b0:4864:20::e2b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9E44A81C24 for ; Fri, 6 Jan 2023 13:11:04 -0800 (PST) Received: by mail-vs1-xe2b.google.com with SMTP id k4so2781024vsc.4 for ; Fri, 06 Jan 2023 13:11:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux-foundation.org; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=6TxHKlwJQCLSbYZxgdJdZSJ5mNfa7xbEinv+9m+b8dU=; b=JkoJF2oW8oodyFdhhEZiE+zCQjJRSe8qbnBn4Ts4FFiwa0sekyPhwMSBKHbEAYUHQ3 r06xF755O1aHQhg/uNyi+N/5KDBJ+uaAZmpigEg23rzOQ2HcFrMDLG9jJMUNcJHfKiAj dE34EO7JXggOKr+Oq4bXZx2m6WRZXthUX8U5I= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=6TxHKlwJQCLSbYZxgdJdZSJ5mNfa7xbEinv+9m+b8dU=; b=227rpQ6CTuXW6NCAafVQuY+vSovyTYoDCTffidX8evkc855JWcXM/YCTbYPZIE9uku bJn8RvgxDRQVOWm5WTRPt8b+jNOVKDeWvDrV7zI0rj3HIZEBwjny1KoSq6JkTmQmda2j mCpbudiSmHy8vvSlsMwTTvQf23eghCxUSaIr08Q1AK8w9gMLo/BMDMTrGsJJzPOW+boX duL0DxSux03a4yRhlRXu4WJyITtSNBt/PKqFJzmFKLa6KrTzvB5dymU0if1luyIsQy/h wI16ltFLv4gg2zkR9IeEb98Tmj5YtOeKtK4gyQXHlRQVpRQqCETzi4zSUn/FvEYUbC/m auDw== X-Gm-Message-State: AFqh2krUogRiDR+ZSf0e0NYIxKU6PwNatbf0Pc+Xy1pCBlFI2Dnnhu4d 7mKrvIpvZdBBn6kLl/cu+PdNrG9WcCwC1Opl X-Received: by 2002:a67:ff03:0:b0:3ce:bb3f:f7d0 with SMTP id v3-20020a67ff03000000b003cebb3ff7d0mr6164519vsp.16.1673039463542; Fri, 06 Jan 2023 13:11:03 -0800 (PST) Received: from mail-qk1-f173.google.com (mail-qk1-f173.google.com. [209.85.222.173]) by smtp.gmail.com with ESMTPSA id v7-20020a05620a440700b006fb112f512csm1102556qkp.74.2023.01.06.13.11.01 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 06 Jan 2023 13:11:01 -0800 (PST) Received: by mail-qk1-f173.google.com with SMTP id pa22so1338905qkn.9 for ; Fri, 06 Jan 2023 13:11:01 -0800 (PST) X-Received: by 2002:a05:620a:4720:b0:6ff:cbda:a128 with SMTP id bs32-20020a05620a472000b006ffcbdaa128mr2770302qkb.697.1673039460720; Fri, 06 Jan 2023 13:11:00 -0800 (PST) MIME-Version: 1.0 References: <20230101162910.710293-3-Jason@zx2c4.com> <10302240-51ec-0854-2c86-16752d67a9be@opteya.com> In-Reply-To: From: Linus Torvalds Date: Fri, 6 Jan 2023 13:10:44 -0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v14 2/7] mm: add VM_DROPPABLE for designating always lazily freeable mappings To: Andy Lutomirski Cc: "Jason A. Donenfeld" , Yann Droneaud , Ingo Molnar , Linux Kernel Mailing List , patches@lists.linux.dev, Thomas Gleixner , Linux Crypto Mailing List , Linux API , "the arch/x86 maintainers" , Greg Kroah-Hartman , Adhemerval Zanella Netto , "Carlos O'Donell" , Florian Weimer , Arnd Bergmann , Jann Horn , Christian Brauner , linux-mm@kvack.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, Jan 6, 2023 at 12:54 PM Andy Lutomirski wrote: > > I'm going to suggest a very very different approach: fix secret > storage in memory for real. That is, don't lock "super secret > sensitive stuff" into memory, and don't wipe it either. *Encrypt* it. I don't think you're wrong, but people will complain about key management, and worry about that part instead. Honestly, this is what SGX and CPU enclaves is _supposed_ to all do for you, but then nobody uses it for various reasons. Linus