From: Neil Horman <nhorman@tuxdriver.com>
To: linux-kernel@vger.kernel.org
Cc: akpm@linux-foundation.org, marcin.slusarz@gmail.com,
tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com,
nhorman@tuxdriver.com
Subject: Re: [PATCH 1/3] extend get/setrlimit to support setting rlimits external to a process (v7)
Date: Mon, 19 Oct 2009 20:53:29 -0400 [thread overview]
Message-ID: <20091020005329.GB8886@localhost.localdomain> (raw)
In-Reply-To: <20091020005214.GA8886@localhost.localdomain>
Modify setrlimit syscall to accomodate various usages.
Split the sys_setrlimit syscall into two parts:
1) a DEFINE_SYSCALL wrapper that implements the sys_setrlimit function
2) a core do_setrlimit function that accepts as a parameter a task on which to
operate on the limits of
This allows us later to implement sys_setprlimit, which allows us to change the
limits of any process from userspace
Signed-off-by: Neil Horman <nhorman@tuxdriver.com
include/linux/sched.h | 3 +++
kernel/sys.c | 48 ++++++++++++++++++++++++++++++------------------
2 files changed, 33 insertions(+), 18 deletions(-)
diff --git a/include/linux/sched.h b/include/linux/sched.h
index 7755763..ce95005 100644
--- a/include/linux/sched.h
+++ b/include/linux/sched.h
@@ -672,6 +672,9 @@ struct signal_struct {
int oom_adj; /* OOM kill score adjustment (bit shift) */
};
+extern int do_setrlimit(unsigned int resource, struct rlimit *new_rlim,
+ struct task_struct *tsk);
+
/* Context switch must be unlocked if interrupts are to be enabled */
#ifdef __ARCH_WANT_INTERRUPTS_ON_CTXSW
# define __ARCH_WANT_UNLOCKED_CTXSW
diff --git a/kernel/sys.c b/kernel/sys.c
index 1828f8d..0e210a4 100644
--- a/kernel/sys.c
+++ b/kernel/sys.c
@@ -1238,41 +1238,41 @@ SYSCALL_DEFINE2(old_getrlimit, unsigned int, resource,
#endif
-SYSCALL_DEFINE2(setrlimit, unsigned int, resource, struct rlimit __user *, rlim)
+int do_setrlimit(unsigned int resource, struct rlimit *new_rlim,
+ struct task_struct *tsk)
{
- struct rlimit new_rlim, *old_rlim;
int retval;
+ struct rlimit *old_rlim;
- if (resource >= RLIM_NLIMITS)
- return -EINVAL;
- if (copy_from_user(&new_rlim, rlim, sizeof(*rlim)))
- return -EFAULT;
- if (new_rlim.rlim_cur > new_rlim.rlim_max)
+
+ if (new_rlim->rlim_cur > new_rlim->rlim_max)
return -EINVAL;
- old_rlim = current->signal->rlim + resource;
- if ((new_rlim.rlim_max > old_rlim->rlim_max) &&
+ old_rlim = tsk->signal->rlim + resource;
+
+ if ((new_rlim->rlim_max > old_rlim->rlim_max) &&
!capable(CAP_SYS_RESOURCE))
return -EPERM;
- if (resource == RLIMIT_NOFILE && new_rlim.rlim_max > sysctl_nr_open)
+
+ if (resource == RLIMIT_NOFILE && new_rlim->rlim_max > sysctl_nr_open)
return -EPERM;
- retval = security_task_setrlimit(resource, &new_rlim);
+ retval = security_task_setrlimit(resource, new_rlim);
if (retval)
return retval;
- if (resource == RLIMIT_CPU && new_rlim.rlim_cur == 0) {
+ if (resource == RLIMIT_CPU && new_rlim->rlim_cur == 0) {
/*
* The caller is asking for an immediate RLIMIT_CPU
* expiry. But we use the zero value to mean "it was
* never set". So let's cheat and make it one second
* instead
*/
- new_rlim.rlim_cur = 1;
+ new_rlim->rlim_cur = 1;
}
- task_lock(current->group_leader);
- *old_rlim = new_rlim;
- task_unlock(current->group_leader);
+ task_lock(tsk->group_leader);
+ *old_rlim = *new_rlim;
+ task_unlock(tsk->group_leader);
if (resource != RLIMIT_CPU)
goto out;
@@ -1283,14 +1283,26 @@ SYSCALL_DEFINE2(setrlimit, unsigned int, resource, struct rlimit __user *, rlim)
* very long-standing error, and fixing it now risks breakage of
* applications, so we live with it
*/
- if (new_rlim.rlim_cur == RLIM_INFINITY)
+ if (new_rlim->rlim_cur == RLIM_INFINITY)
goto out;
- update_rlimit_cpu(new_rlim.rlim_cur);
+ update_rlimit_cpu(new_rlim->rlim_cur);
out:
return 0;
}
+SYSCALL_DEFINE2(setrlimit, unsigned int, resource, struct rlimit __user *, rlim)
+{
+ struct rlimit new_rlim;
+
+ if (resource >= RLIM_NLIMITS)
+ return -EINVAL;
+ if (copy_from_user(&new_rlim, rlim, sizeof(*rlim)))
+ return -EFAULT;
+
+ return do_setrlimit(resource, &new_rlim, current);
+}
+
/*
* It would make sense to put struct rusage in the task_struct,
* except that would make the task_struct be *really big*. After
next prev parent reply other threads:[~2009-10-20 0:53 UTC|newest]
Thread overview: 96+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-09-28 20:06 [PATCH] proc: augment /proc/pid/limits to allow setting of process limits Neil Horman
2009-09-28 22:44 ` Andrew Morton
2009-09-29 1:14 ` Neil Horman
2009-09-29 20:25 ` [PATCH] proc: augment /proc/pid/limits to allow setting of process limits (v2) Neil Horman
2009-09-29 20:46 ` Andrew Morton
2009-09-30 0:59 ` Neil Horman
2009-10-01 17:15 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v3) Neil Horman
2009-10-01 17:16 ` [PATCH 1/3] " Neil Horman
2009-10-04 12:14 ` Marcin Slusarz
2009-10-04 16:50 ` Neil Horman
2009-10-04 20:04 ` Marcin Slusarz
2009-10-04 23:10 ` Neil Horman
2009-10-04 20:30 ` Marcin Slusarz
2009-10-01 17:21 ` [PATCH 2/3] " Neil Horman
2009-10-01 17:22 ` [PATCH 3/3] " Neil Horman
2009-10-05 0:26 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v4) Neil Horman
2009-10-05 0:53 ` [PATCH 1/3] " Neil Horman
2009-10-08 21:32 ` Marcin Slusarz
2009-10-09 2:00 ` Neil Horman
2009-10-05 0:54 ` [PATCH 2/3] " Neil Horman
2009-10-05 1:57 ` Américo Wang
2009-10-05 12:32 ` Neil Horman
2009-10-05 0:54 ` [PATCH 3/3] " Neil Horman
2009-10-12 16:13 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v5) Neil Horman
2009-10-12 16:20 ` [PATCH 1/3] " Neil Horman
2009-10-12 16:25 ` [PATCH 2/3] " Neil Horman
2009-10-12 16:27 ` [PATCH 3/3] " Neil Horman
2009-10-12 20:13 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v6) Neil Horman
2009-10-12 20:20 ` [PATCH 1/3] " Neil Horman
2009-10-12 20:23 ` [PATCH 2/3] " Neil Horman
2009-10-12 20:25 ` [PATCH 3/3] " Neil Horman
2009-10-20 0:52 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v7) Neil Horman
2009-10-20 0:53 ` Neil Horman [this message]
2009-10-20 0:54 ` [PATCH 2/3] " Neil Horman
2009-11-02 15:10 ` Ingo Molnar
2009-11-02 17:40 ` Neil Horman
2009-10-20 0:55 ` [PATCH 3/3] " Neil Horman
2009-10-28 14:44 ` [PATCH 0/3] " Neil Horman
2009-10-30 18:24 ` Neil Horman
2009-11-02 15:25 ` Ingo Molnar
2009-11-02 17:54 ` Neil Horman
2009-11-02 18:51 ` Ingo Molnar
2009-11-03 0:23 ` Neil Horman
2009-11-04 11:26 ` Ingo Molnar
2009-11-05 20:48 ` Neil Horman
2009-11-06 9:26 ` Ingo Molnar
2009-11-06 10:00 ` Jiri Slaby
2009-11-08 10:36 ` Ingo Molnar
2009-11-09 0:10 ` Neil Horman
2009-11-09 8:32 ` Jiri Slaby
2009-11-09 13:34 ` Neil Horman
2009-11-09 8:54 ` Jiri Slaby
2009-11-09 9:01 ` Ingo Molnar
2009-11-09 9:22 ` Jiri Slaby
2009-11-09 9:26 ` Ingo Molnar
2009-11-09 13:35 ` Neil Horman
2009-11-09 15:56 ` Jiri Slaby
2009-11-09 16:40 ` Oleg Nesterov
2009-11-09 17:15 ` Jiri Slaby
2009-11-09 17:26 ` Linus Torvalds
2009-11-09 17:36 ` Oleg Nesterov
2009-11-18 14:51 ` Jiri Slaby
2009-11-18 14:51 ` [PATCH 01/16] core: posix-cpu-timers, cleanup rlimits usage Jiri Slaby
2009-11-18 16:48 ` Peter Zijlstra
2009-11-18 14:51 ` [PATCH 02/16] core: do security check under task_lock Jiri Slaby
2009-11-18 21:47 ` James Morris
2009-11-18 14:51 ` [PATCH 03/16] IA64: use ACCESS_ONCE for rlimits Jiri Slaby
2009-11-18 18:56 ` Luck, Tony
2009-11-18 19:48 ` Linus Torvalds
2009-11-19 2:28 ` Ingo Molnar
2009-11-18 14:51 ` [PATCH 04/16] PPC: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 05/16] S390: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 06/16] SPARC: " Jiri Slaby
2009-11-18 17:55 ` David Miller
2009-11-18 18:09 ` Linus Torvalds
2009-11-18 14:51 ` [PATCH 07/16] X86: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 08/16] FS: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 09/16] MM: " Jiri Slaby
2009-11-18 15:29 ` Linus Torvalds
2009-11-18 14:51 ` [PATCH 10/16] core: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 11/16] misc: " Jiri Slaby
2009-11-18 14:51 ` [PATCH 12/16] core: rename setrlimit to do_setrlimit Jiri Slaby
2009-11-20 6:10 ` Américo Wang
2009-11-18 14:51 ` [PATCH 13/16] core: implement getprlimit and setprlimit syscalls Jiri Slaby
2009-11-20 13:14 ` Neil Horman
2009-11-18 14:52 ` [PATCH 14/16] unistd: add __NR_[get|set]prlimit syscall numbers Jiri Slaby
2009-11-18 14:52 ` [PATCH 15/16] COMPAT: add get/put_compat_rlimit Jiri Slaby
2009-12-30 23:55 ` Arnd Bergmann
2010-01-06 9:35 ` Jiri Slaby
2009-11-18 14:52 ` [PATCH 16/16] x86: add ia32 compat prlimit syscalls Jiri Slaby
2009-11-18 23:15 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v7) Oleg Nesterov
2009-11-19 15:43 ` Jiri Slaby
2009-11-20 2:11 ` acct_file_reopen() && do_acct_process() (Was: [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v7)) Oleg Nesterov
2009-11-20 10:27 ` Jiri Slaby
2009-10-12 21:58 ` [PATCH 0/3] extend get/setrlimit to support setting rlimits external to a process (v5) Andrew Morton
2009-10-13 0:06 ` Neil Horman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20091020005329.GB8886@localhost.localdomain \
--to=nhorman@tuxdriver.com \
--cc=akpm@linux-foundation.org \
--cc=hpa@zytor.com \
--cc=linux-kernel@vger.kernel.org \
--cc=marcin.slusarz@gmail.com \
--cc=mingo@redhat.com \
--cc=tglx@linutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox