vmscan: limit VM_EXEC protection to file pages
authorWu Fengguang <fengguang.wu@intel.com>
Mon, 26 Oct 2009 23:49:53 +0000 (16:49 -0700)
committerLinus Torvalds <torvalds@linux-foundation.org>
Thu, 29 Oct 2009 14:39:27 +0000 (07:39 -0700)
commit41e20983fe553b39bc2b00e07c7a379f0c86a4bc
tree685433b37a7ebe5a61ac7315dc8017706227345b
parentb76146ed1ae7d7acae1d51f9342e31d00c8d5a12
vmscan: limit VM_EXEC protection to file pages

It is possible to have !Anon but SwapBacked pages, and some apps could
create huge number of such pages with MAP_SHARED|MAP_ANONYMOUS.  These
pages go into the ANON lru list, and hence shall not be protected: we only
care mapped executable files.  Failing to do so may trigger OOM.

Tested-by: Christian Borntraeger <borntraeger@de.ibm.com>
Reviewed-by: Rik van Riel <riel@redhat.com>
Signed-off-by: Wu Fengguang <fengguang.wu@intel.com>
Cc: Hugh Dickins <hugh.dickins@tiscali.co.uk>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
mm/vmscan.c