[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e0884a6b-78bc-209d-bc9a-90f69839189e@intel.com>
Date: Fri, 14 Jun 2019 11:26:10 -0700
From: Dave Hansen <dave.hansen@...el.com>
To: Alison Schofield <alison.schofield@...el.com>,
Peter Zijlstra <peterz@...radead.org>
Cc: "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
Andrew Morton <akpm@...ux-foundation.org>, x86@...nel.org,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>,
"H. Peter Anvin" <hpa@...or.com>, Borislav Petkov <bp@...en8.de>,
Andy Lutomirski <luto@...capital.net>,
David Howells <dhowells@...hat.com>,
Kees Cook <keescook@...omium.org>,
Kai Huang <kai.huang@...ux.intel.com>,
Jacob Pan <jacob.jun.pan@...ux.intel.com>, linux-mm@...ck.org,
kvm@...r.kernel.org, keyrings@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH, RFC 44/62] x86/mm: Set KeyIDs in encrypted VMAs for MKTME
On 6/14/19 10:33 AM, Alison Schofield wrote:
> Preserving the data across encryption key changes has not
> been a requirement. I'm not clear if it was ever considered
> and rejected. I believe that copying in order to preserve
> the data was never considered.
We could preserve the data pretty easily. It's just annoying, though.
Right now, our only KeyID conversions happen in the page allocator. If
we were to convert in-place, we'd need something along the lines of:
1. Allocate a scratch page
2. Unmap target page, or at least make it entirely read-only
3. Copy plaintext into scratch page
4. Do cache KeyID conversion of page being converted:
Flush caches, change page_ext metadata
5. Copy plaintext back into target page from scratch area
6. Re-establish PTEs with new KeyID
#2 is *really* hard. It's similar to the problems that the poor
filesystem guys are having with RDMA these days when RDMA is doing writes.
What we have here (destroying existing data) is certainly the _simplest_
semantic. We can certainly give it a different name, or even non-PROT_*
semantics where it shares none of mprotect()'s functionality.
Doesn't really matter to me at all.
Powered by blists - more mailing lists