From: "Américo Wang" <xiyou.wangcong@gmail.com>
To: Neil Horman <nhorman@tuxdriver.com>
Cc: linux-kernel@vger.kernel.org, akpm@linux-foundation.org,
marcin.slusarz@gmail.com
Subject: Re: [PATCH 2/3] extend get/setrlimit to support setting rlimits external to a process (v4)
Date: Mon, 5 Oct 2009 09:57:56 +0800 [thread overview]
Message-ID: <20091005015756.GA2758@hack> (raw)
In-Reply-To: <20091005005405.GB7180@localhost.localdomain>
On Sun, Oct 04, 2009 at 08:54:05PM -0400, Neil Horman wrote:
>Add syscall infrastructure for getprlimit/setprlimit
>
>This patch adds the definitions for the get/setprlimit syscalls. They are
>identical to the get/setlimit calls, except that they allow the caller to
>manipulate limits for processes other than themselves.
>
>Signed-off-by: Neil Horman <nhorman@tuxdriver.com>
Hello, Neil.
What is your point of adding two new syscalls?
Why not add them to prctl(2)? :-)
Thanks.
>
>
> include/linux/syscalls.h | 4 ++
> kernel/sys.c | 84 +++++++++++++++++++++++++++++++++++++++++++++++
> 2 files changed, 88 insertions(+)
>
>diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h
>index 80de700..535210a 100644
>--- a/include/linux/syscalls.h
>+++ b/include/linux/syscalls.h
>@@ -584,11 +584,15 @@ asmlinkage long sys_newuname(struct new_utsname __user *name);
>
> asmlinkage long sys_getrlimit(unsigned int resource,
> struct rlimit __user *rlim);
>+asmlinkage long sys_getprlimit(pid_t pid, unsigned int resource,
>+ struct rlimit __user *rlim);
> #if defined(COMPAT_RLIM_OLD_INFINITY) || !(defined(CONFIG_IA64))
> asmlinkage long sys_old_getrlimit(unsigned int resource, struct rlimit __user *rlim);
> #endif
> asmlinkage long sys_setrlimit(unsigned int resource,
> struct rlimit __user *rlim);
>+asmlinkage long sys_setprlimit(pid_t pid, unsigned int resource,
>+ struct rlimit __user *rlim);
> asmlinkage long sys_getrusage(int who, struct rusage __user *ru);
> asmlinkage long sys_umask(int mask);
>
>diff --git a/kernel/sys.c b/kernel/sys.c
>index 05bd22a..4fe1140 100644
>--- a/kernel/sys.c
>+++ b/kernel/sys.c
>@@ -1211,6 +1211,50 @@ SYSCALL_DEFINE2(getrlimit, unsigned int, resource, struct rlimit __user *, rlim)
> }
> }
>
>+SYSCALL_DEFINE3(getprlimit, pid_t, pid, unsigned int, resource,
>+ struct rlimit __user *, rlim)
>+{
>+ unsigned long flags;
>+ struct task_struct *tsk;
>+ struct pid *ppid;
>+ int retval = -EINVAL;
>+
>+ ppid = find_get_pid(pid);
>+ if (!ppid)
>+ goto out;
>+
>+ tsk = get_pid_task(ppid, PIDTYPE_PID);
>+
>+ if (!tsk)
>+ goto out_put_pid;
>+
>+ if (resource >= RLIM_NLIMITS)
>+ goto out_put_all;
>+
>+ retval = -EBUSY;
>+ if (!lock_task_sighand(tsk, &flags))
>+ goto out_put_all;
>+
>+ else {
>+ struct rlimit val;
>+
>+ task_lock(tsk->group_leader);
>+ val = current->signal->rlim[resource];
>+ task_unlock(tsk->group_leader);
>+ retval = copy_to_user(rlim, &val, sizeof(*rlim)) ? -EFAULT : 0;
>+ }
>+
>+ unlock_task_sighand(tsk, &flags);
>+
>+out_put_all:
>+ put_task_struct(tsk);
>+out_put_pid:
>+ put_pid(ppid);
>+out:
>+ return retval;
>+}
>+
>+
> #ifdef __ARCH_WANT_SYS_OLD_GETRLIMIT
>
> /*
>@@ -1301,6 +1345,46 @@ SYSCALL_DEFINE2(setrlimit, unsigned int, resource, struct rlimit __user *, rlim)
> return do_setrlimit(resource, &new_rlim, current);
> }
>
>+SYSCALL_DEFINE3(setprlimit, pid_t, pid, unsigned int, resource,
>+ struct rlimit __user *, rlim)
>+{
>+ struct task_struct *tsk;
>+ struct pid *ppid;
>+ unsigned long flags;
>+ struct rlimit new_rlim;
>+ int retval = -EINVAL;
>+
>+ ppid = find_get_pid(pid);
>+ if (!ppid)
>+ goto out;
>+
>+ tsk = get_pid_task(ppid, PIDTYPE_PID);
>+
>+ if (!tsk)
>+ goto out_put_pid;
>+
>+ if (resource >= RLIM_NLIMITS)
>+ goto out_put_all;
>+
>+ retval = -EFAULT;
>+ if (copy_from_user(&new_rlim, rlim, sizeof(*rlim)))
>+ goto out_put_all;
>+
>+ if (!lock_task_sighand(tsk, &flags))
>+ goto out_put_all;
>+
>+ retval = do_setrlimit(resource, &new_rlim, tsk);
>+
>+ unlock_task_sighand(tsk, &flags);
>+
>+out_put_all:
>+ put_task_struct(tsk);
>+out_put_pid:
>+ put_pid(ppid);
>+out:
>+ return retval;
>+}
>+
> /*
> * It would make sense to put struct rusage in the task_struct,
> * except that would make the task_struct be *really big*. After
>--
>To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
>the body of a message to majordomo@vger.kernel.org
>More majordomo info at http://vger.kernel.org/majordomo-info.html
>Please read the FAQ at http://www.tux.org/lkml/
--
Live like a child, think like the god.
next prev parent reply other threads:[~2009-10-05 1:54 UTC|newest]
Thread overview: 96+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-09-28 20:06 [PATCH] proc: augment /proc/pid/limits to allow setting of process limits Neil Horman
2009-09-28 22:44 ` Andrew Morton
2009-09-29 1:14 ` Neil Horman
2009-09-29 20:25 ` [PATCH] proc: augment /proc/pid/limits to allow setting of process limits (v2) Neil Horman
2009-09-29 20:46 ` Andrew Morton
2009-09-30 0:59 ` Neil Horman
2009-10-01 17:15 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v3) Neil Horman
2009-10-01 17:16 ` [PATCH 1/3] " Neil Horman
2009-10-04 12:14 ` Marcin Slusarz
2009-10-04 16:50 ` Neil Horman
2009-10-04 20:04 ` Marcin Slusarz
2009-10-04 23:10 ` Neil Horman
2009-10-04 20:30 ` Marcin Slusarz
2009-10-01 17:21 ` [PATCH 2/3] " Neil Horman
2009-10-01 17:22 ` [PATCH 3/3] " Neil Horman
2009-10-05 0:26 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v4) Neil Horman
2009-10-05 0:53 ` [PATCH 1/3] " Neil Horman
2009-10-08 21:32 ` Marcin Slusarz
2009-10-09 2:00 ` Neil Horman
2009-10-05 0:54 ` [PATCH 2/3] " Neil Horman
2009-10-05 1:57 ` Américo Wang [this message]
2009-10-05 12:32 ` Neil Horman
2009-10-05 0:54 ` [PATCH 3/3] " Neil Horman
2009-10-12 16:13 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v5) Neil Horman
2009-10-12 16:20 ` [PATCH 1/3] " Neil Horman
2009-10-12 16:25 ` [PATCH 2/3] " Neil Horman
2009-10-12 16:27 ` [PATCH 3/3] " Neil Horman
2009-10-12 20:13 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v6) Neil Horman
2009-10-12 20:20 ` [PATCH 1/3] " Neil Horman
2009-10-12 20:23 ` [PATCH 2/3] " Neil Horman
2009-10-12 20:25 ` [PATCH 3/3] " Neil Horman
2009-10-20 0:52 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v7) Neil Horman
2009-10-20 0:53 ` [PATCH 1/3] " Neil Horman
2009-10-20 0:54 ` [PATCH 2/3] " Neil Horman
2009-11-02 15:10 ` Ingo Molnar
2009-11-02 17:40 ` Neil Horman
2009-10-20 0:55 ` [PATCH 3/3] " Neil Horman
2009-10-28 14:44 ` [PATCH 0/3] " Neil Horman
2009-10-30 18:24 ` Neil Horman
2009-11-02 15:25 ` Ingo Molnar
2009-11-02 17:54 ` Neil Horman
2009-11-02 18:51 ` Ingo Molnar
2009-11-03 0:23 ` Neil Horman
2009-11-04 11:26 ` Ingo Molnar
2009-11-05 20:48 ` Neil Horman
2009-11-06 9:26 ` Ingo Molnar
2009-11-06 10:00 ` Jiri Slaby
2009-11-08 10:36 ` Ingo Molnar
2009-11-09 0:10 ` Neil Horman
2009-11-09 8:32 ` Jiri Slaby
2009-11-09 13:34 ` Neil Horman
2009-11-09 8:54 ` Jiri Slaby
2009-11-09 9:01 ` Ingo Molnar
2009-11-09 9:22 ` Jiri Slaby
2009-11-09 9:26 ` Ingo Molnar
2009-11-09 13:35 ` Neil Horman
2009-11-09 15:56 ` Jiri Slaby
2009-11-09 16:40 ` Oleg Nesterov
2009-11-09 17:15 ` Jiri Slaby
2009-11-09 17:26 ` Linus Torvalds
2009-11-09 17:36 ` Oleg Nesterov
2009-11-18 14:51 ` Jiri Slaby
2009-11-18 14:51 ` [PATCH 01/16] core: posix-cpu-timers, cleanup rlimits usage Jiri Slaby
2009-11-18 16:48 ` Peter Zijlstra
2009-11-18 14:51 ` [PATCH 02/16] core: do security check under task_lock Jiri Slaby
2009-11-18 21:47 ` James Morris
2009-11-18 14:51 ` [PATCH 03/16] IA64: use ACCESS_ONCE for rlimits Jiri Slaby
2009-11-18 18:56 ` Luck, Tony
2009-11-18 19:48 ` Linus Torvalds
2009-11-19 2:28 ` Ingo Molnar
2009-11-18 14:51 ` [PATCH 04/16] PPC: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 05/16] S390: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 06/16] SPARC: " Jiri Slaby
2009-11-18 17:55 ` David Miller
2009-11-18 18:09 ` Linus Torvalds
2009-11-18 14:51 ` [PATCH 07/16] X86: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 08/16] FS: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 09/16] MM: " Jiri Slaby
2009-11-18 15:29 ` Linus Torvalds
2009-11-18 14:51 ` [PATCH 10/16] core: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 11/16] misc: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 12/16] core: rename setrlimit to do_setrlimit Jiri Slaby
2009-11-20 6:10 ` Américo Wang
2009-11-18 14:51 ` [PATCH 13/16] core: implement getprlimit and setprlimit syscalls Jiri Slaby
2009-11-20 13:14 ` Neil Horman
2009-11-18 14:52 ` [PATCH 14/16] unistd: add __NR_[get|set]prlimit syscall numbers Jiri Slaby
2009-11-18 14:52 ` [PATCH 15/16] COMPAT: add get/put_compat_rlimit Jiri Slaby
2009-12-30 23:55 ` Arnd Bergmann
2010-01-06 9:35 ` Jiri Slaby
2009-11-18 14:52 ` [PATCH 16/16] x86: add ia32 compat prlimit syscalls Jiri Slaby
2009-11-18 23:15 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v7) Oleg Nesterov
2009-11-19 15:43 ` Jiri Slaby
2009-11-20 2:11 ` acct_file_reopen() && do_acct_process() (Was: [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v7)) Oleg Nesterov
2009-11-20 10:27 ` Jiri Slaby
2009-10-12 21:58 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v5) Andrew Morton
2009-10-13 0:06 ` Neil Horman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20091005015756.GA2758@hack \
--to=xiyou.wangcong@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=linux-kernel@vger.kernel.org \
--cc=marcin.slusarz@gmail.com \
--cc=nhorman@tuxdriver.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox