> Doing all of this with MAP_SECRET seems bad to me. If user code > wants > UC memory, it should ask for UC memory -- having the kernel involved > in the decision to use UC memory is a bad idea, because the > performance impact of using UC memory where user code wasn't > expecting The user has no idea that they want UC memory. It varies by platform what this means. There are some systems (eg in order uclinux devices, M68K, old atoms) for which it probably means 'no-op', there are those where UC helps, those it hinders, there are those where WC is probably sufficient. There are platforms where 'secret' memory might best be implemented by using on die memory pools or cache locking. It might even mean 'put me in a non HT cgroup'. Secret might also mean 'not accessible by thunderbolt', or 'do not swap unless swap is encrypted' and other things. IMHO the question is what is the actual semantic here. What are you asking for ? Does it mean "at any cost", what does it guarantee (100% or statistically), what level of guarantee is acceptable, what level is -EOPNOTSUPP or similar ? I'm also wary of the focus always being on keys. If you decrypt a file I'm probably just as interested in the contents so can I mmap a file this way and if so what happens on the unmap. Yes key theft lets me do all sorts of theoretical long term bad stuff, but frequently data theft is sufficient to do lots of practical short term bad stuff. Also as an attacker I'm probably a script, and I don't want to be exposing my master long term because they want the footprints gone. > in gnome-shell. The system slowed down to such an extent that I was > unable to enter the three or so keystrokes to turn it back off.) Yes - and any uncached pages also need to be kept away from anything that the kernel touches under locks, or use in atomic user operations stuff. Copy on write of an uncached page for example is suddenly really slow and there are so many other cases we'd have to find and deal with. > EXCLUSIVE makes sense. Saying "don't ptrace this" makes sense. UC > makes sense. But having one flag to rule them all does not make > sense > to me. We already support not ptracing, and if I can ptrace any of the code I can access all of its code/data so that one isn't hard and the LSM interfaces can do it. That one is easy - minus the fact that malware writers are big fans of anything that stops tracing... Alan