From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B66EAC352A4 for ; Wed, 12 Feb 2020 21:10:32 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 916F0217F4 for ; Wed, 12 Feb 2020 21:10:32 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728852AbgBLVKc (ORCPT ); Wed, 12 Feb 2020 16:10:32 -0500 Received: from ms.lwn.net ([45.79.88.28]:59066 "EHLO ms.lwn.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727420AbgBLVKb (ORCPT ); Wed, 12 Feb 2020 16:10:31 -0500 Received: from lwn.net (localhost [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ms.lwn.net (Postfix) with ESMTPSA id 94C40740; Wed, 12 Feb 2020 21:10:30 +0000 (UTC) Date: Wed, 12 Feb 2020 14:10:29 -0700 From: Jonathan Corbet To: Mike Rapoport Cc: linux-kernel@vger.kernel.org, Alan Cox , Andrew Morton , Andy Lutomirski , Christopher Lameter , Dave Hansen , James Bottomley , "Kirill A. Shutemov" , Matthew Wilcox , Peter Zijlstra , "Reshetova, Elena" , Thomas Gleixner , Tycho Andersen , linux-api@vger.kernel.org, linux-mm@kvack.org Subject: Re: [RFC PATCH] mm: extend memfd with ability to create "secret" memory areas Message-ID: <20200212141029.7b89acee@lwn.net> In-Reply-To: <20200130162340.GA14232@rapoport-lnx> References: <20200130162340.GA14232@rapoport-lnx> Organization: LWN.net MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 30 Jan 2020 18:23:41 +0200 Mike Rapoport wrote: > Hi, > > This is essentially a resend of my attempt to implement "secret" mappings > using a file descriptor [1]. So one little thing I was curious about as I read through the patch... > +static int secretmem_check_limits(struct vm_fault *vmf) > +{ > + struct secretmem_state *state = vmf->vma->vm_file->private_data; > + struct inode *inode = file_inode(vmf->vma->vm_file); > + unsigned long limit; > + > + if (((loff_t)vmf->pgoff << PAGE_SHIFT) >= i_size_read(inode)) > + return -EINVAL; > + > + limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT; > + if (state->nr_pages + 1 >= limit) > + return -EPERM; > + > + return 0; > +} If I'm not mistaken, this means each memfd can be RLIMIT_MEMLOCK in length, with no global limit on the number of locked pages. What's keeping me from creating 1000 of these things and locking down lots of RAM? Thanks, jon