From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 77F79C2D0E4 for ; Sun, 15 Nov 2020 08:45:58 +0000 (UTC) Received: from ml01.01.org (ml01.01.org [198.145.21.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 112502242E for ; Sun, 15 Nov 2020 08:45:57 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="mvUrkC8D" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 112502242E Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-nvdimm-bounces@lists.01.org Received: from ml01.vlan13.01.org (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id C77C2100EF270; Sun, 15 Nov 2020 00:45:57 -0800 (PST) Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=198.145.29.99; helo=mail.kernel.org; envelope-from=rppt@kernel.org; receiver= Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 64ED1100EF26E for ; Sun, 15 Nov 2020 00:45:55 -0800 (PST) Received: from kernel.org (unknown [77.125.7.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AC352223FB; Sun, 15 Nov 2020 08:45:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605429954; bh=I2e6oiG56Ipc+LYVEf48Tzpdu9e5X2SPeAjMkXGJ+FY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=mvUrkC8DbWSBeGtX5LmBQbQw3erYKhs5cOaKJid6GDJMPM7nXXubIxoNcBB3oGNe7 rCwIs49LamtntTc1amgIjfXRya2sb8UfoqlV6jooN7E3J+NN/S80wRZL4M8ZXWanKD tXrCqT3L+M5TGE/FDZPfoLrZTF0AQQmH6gi3Hxpk= Date: Sun, 15 Nov 2020 10:45:39 +0200 From: Mike Rapoport To: Matthew Wilcox Subject: Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas Message-ID: <20201115084539.GU4758@kernel.org> References: <20201110151444.20662-1-rppt@kernel.org> <20201110151444.20662-5-rppt@kernel.org> <20201113140656.GG17076@casper.infradead.org> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <20201113140656.GG17076@casper.infradead.org> Message-ID-Hash: IBHF3DZGQU6JJQH5PGD63AUVKC5N2774 X-Message-ID-Hash: IBHF3DZGQU6JJQH5PGD63AUVKC5N2774 X-MailFrom: rppt@kernel.org X-Mailman-Rule-Hits: nonmember-moderation X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation CC: Andrew Morton , Alexander Viro , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Catalin Marinas , Christopher Lameter , Dave Hansen , David Hildenbrand , Elena Reshetova , "H. Peter Anvin" , Ingo Molnar , James Bottomley , "Kirill A. Shutemov" , Mark Rutland , Mike Rapoport , Michael Kerrisk , Palmer Dabbelt , Paul Walmsley , Peter Zijlstra , Rick Edgecombe , Shuah Khan , Thomas Gleixner , Tycho Andersen , Will Deacon , linux-api@vger.kernel.org, linux-arch@vger.ker nel.org, linux-arm-kernel@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-nvdimm@lists.01.org, linux-riscv@lists.infradead.org, x86@kernel.org, Hagen Paul Pfeifer X-Mailman-Version: 3.1.1 Precedence: list List-Id: "Linux-nvdimm developer list." Archived-At: List-Archive: List-Help: List-Post: List-Subscribe: List-Unsubscribe: Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit On Fri, Nov 13, 2020 at 02:06:56PM +0000, Matthew Wilcox wrote: > On Tue, Nov 10, 2020 at 05:14:39PM +0200, Mike Rapoport wrote: > > diff --git a/mm/Kconfig b/mm/Kconfig > > index c89c5444924b..d8d170fa5210 100644 > > --- a/mm/Kconfig > > +++ b/mm/Kconfig > > @@ -884,4 +884,7 @@ config ARCH_HAS_HUGEPD > > config MAPPING_DIRTY_HELPERS > > bool > > > > +config SECRETMEM > > + def_bool ARCH_HAS_SET_DIRECT_MAP && !EMBEDDED > > So I now have to build this in, whether I want it or not? Why wouldn't anybody want this nice feature? ;-) Now, seriously, I hesitated a lot about having a prompt here, but in the end I've decided to go without it. The added footprint is not so big, with x86 defconfig it's less than 8K and with distro (I've checked with Fedora) config the difference is less than 1k because they anyway have CMA=y. As this is "security" feature, disros most probably would have this enabled anyway, and I believe users that will see something like "Allow hiding memory from the kernel" will hit Y there. -- Sincerely yours, Mike. _______________________________________________ Linux-nvdimm mailing list -- linux-nvdimm@lists.01.org To unsubscribe send an email to linux-nvdimm-leave@lists.01.org