[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <55FF88BA.6080006@sr71.net>
Date: Sun, 20 Sep 2015 21:34:02 -0700
From: Dave Hansen <dave@...1.net>
To: Ingo Molnar <mingo@...nel.org>
Cc: x86@...nel.org, linux-kernel@...r.kernel.org, linux-mm@...ck.org,
Linus Torvalds <torvalds@...ux-foundation.org>,
Andrew Morton <akpm@...ux-foundation.org>,
Peter Zijlstra <a.p.zijlstra@...llo.nl>,
Andy Lutomirski <luto@...nel.org>,
Borislav Petkov <bp@...en8.de>
Subject: Re: [PATCH 26/26] x86, pkeys: Documentation
On 09/20/2015 01:55 AM, Ingo Molnar wrote:
> * Dave Hansen <dave@...1.net> wrote:
>> +Memory Protection Keys for Userspace (PKU aka PKEYs) is a CPU feature
>> +which will be found on future Intel CPUs.
>> +
>> +Memory Protection Keys provides a mechanism for enforcing page-based
>> +protections, but without requiring modification of the page tables
>> +when an application changes protection domains. It works by
>> +dedicating 4 previously ignored bits in each page table entry to a
>> +"protection key", giving 16 possible keys.
>
> Wondering how user-space is supposed to discover the number of protection keys,
> is that CPUID leaf based, or hardcoded on the CPU feature bit?
The 16 keys are essentially hard-coded from the cpuid bit.
>> +There is also a new user-accessible register (PKRU) with two separate
>> +bits (Access Disable and Write Disable) for each key. Being a CPU
>> +register, PKRU is inherently thread-local, potentially giving each
>> +thread a different set of protections from every other thread.
>> +
>> +There are two new instructions (RDPKRU/WRPKRU) for reading and writing
>> +to the new register. The feature is only available in 64-bit mode,
>> +even though there is theoretically space in the PAE PTEs. These
>> +permissions are enforced on data access only and have no effect on
>> +instruction fetches.
>
> Another question, related to enumeration as well: I'm wondering whether there's
> any way for the kernel to allocate a bit or two for its own purposes - such as
> protecting crypto keys? Or is the facility fundamentally intended for user-space
> use only?
No, that's not possible with the current setup.
Userspace has complete control over the contents of the PKRU register
with unprivileged instructions. So the kernel can not practically
protect any of its own data with this.
> Similarly, the pmem (persistent memory) driver could employ protection keys to
> keep terabytes of data 'masked out' most of the time - protecting data from kernel
> space memory corruption bugs.
I wish we could do this, but we can not with the current implementation.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists