From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-qk0-f197.google.com (mail-qk0-f197.google.com [209.85.220.197]) by kanga.kvack.org (Postfix) with ESMTP id DA6846B000D for ; Mon, 11 Jun 2018 13:29:36 -0400 (EDT) Received: by mail-qk0-f197.google.com with SMTP id c139-v6so19570582qkg.6 for ; Mon, 11 Jun 2018 10:29:36 -0700 (PDT) Received: from mx1.redhat.com (mx3-rdu2.redhat.com. [66.187.233.73]) by mx.google.com with ESMTPS id q76-v6si6171096qke.218.2018.06.11.10.29.35 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 11 Jun 2018 10:29:35 -0700 (PDT) Subject: Re: pkeys on POWER: Access rights not reset on execve References: <20180520191115.GM5479@ram.oc3035372033.ibm.com> <20180603201832.GA10109@ram.oc3035372033.ibm.com> <4e53b91f-80a7-816a-3e9b-56d7be7cd092@redhat.com> <20180604140135.GA10088@ram.oc3035372033.ibm.com> <20180604190229.GB10088@ram.oc3035372033.ibm.com> <30040030-1aa2-623b-beec-dd1ceb3eb9a7@redhat.com> <20180608023441.GA5573@ram.oc3035372033.ibm.com> <2858a8eb-c9b5-42ce-5cfc-74a4b3ad6aa9@redhat.com> <20180611172305.GB5697@ram.oc3035372033.ibm.com> From: Florian Weimer Message-ID: <30f5cb0e-e09a-15e6-f77d-a3afa422a651@redhat.com> Date: Mon, 11 Jun 2018 19:29:33 +0200 MIME-Version: 1.0 In-Reply-To: <20180611172305.GB5697@ram.oc3035372033.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: Ram Pai Cc: Linux-MM , linuxppc-dev , Andy Lutomirski , Dave Hansen On 06/11/2018 07:23 PM, Ram Pai wrote: > On Fri, Jun 08, 2018 at 07:53:51AM +0200, Florian Weimer wrote: >> On 06/08/2018 04:34 AM, Ram Pai wrote: >>>> >>>> So the remaining question at this point is whether the Intel >>>> behavior (default-deny instead of default-allow) is preferable. >>> >>> Florian, remind me what behavior needs to fixed? >> >> See the other thread. The Intel register equivalent to the AMR by >> default disallows access to yet-unallocated keys, so that threads >> which are created before key allocation do not magically gain access >> to a key allocated by another thread. > > Are you referring to the thread > '[PATCH] pkeys: Introduce PKEY_ALLOC_SIGNALINHERIT and change signal semantics' > Otherwise please point me to the URL of that thread. Sorry and thankx. :) No, it's this issue: The UAMOR part has been fixed (thanks), but I think processes still start out with default-allow AMR. Thanks, Florian