linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* [BUG?] mm/secretmem: memory address mapped to memfd_secret can be used in write syscall.
@ 2023-11-08 11:47 David Wang
  2023-11-13  9:15 ` David Hildenbrand
  0 siblings, 1 reply; 5+ messages in thread
From: David Wang @ 2023-11-08 11:47 UTC (permalink / raw)
  To: akpm, linux-mm, linux-kernel


Hi,
According to https://lwn.net/Articles/865256/, 
the memory address got from memfd_secret/ftruncate/mmap should not be used by syscalls, since it is not accessible even by kernel.

But my test result shows that the "secret" memory could be used in  syscall write, is this expected behavior?
This is my test code:

int main() {
	int fd = syscall(__NR_memfd_secret, 0);
	if (fd < 0) {
		perror("Fail to create secret");
		return -1;
	}
	if (ftruncate(fd, 1024) < 0) {
		perror("Fail to size the secret");
		return -1;
	}
	char *key = mmap(NULL, 1024, PROT_READ|PROT_WRITE, MAP_SHARED, fd, 0);
	if (key == MAP_FAILED) {
		perror("Fail to mmap");
		return -1;
	}
	// should be some secure channel
	strcpy(key, "ThisIsAKey");
	// printf("[%d]key(%s) ready: %p\n", getpid(), key, key);
	// getchar();
	// make syscall, should err
	write(STDOUT_FILENO, key, strlen(key));  //<-- Here the key shows up on stdout.

	return 0;
}

Thanks
David



^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2023-11-13 15:43 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-11-08 11:47 [BUG?] mm/secretmem: memory address mapped to memfd_secret can be used in write syscall David Wang
2023-11-13  9:15 ` David Hildenbrand
2023-11-13 13:26   ` Theodore Ts'o
2023-11-13 14:42     ` David Hildenbrand
2023-11-13 15:42     ` David Wang

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox