lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20231122211200.31620-12-gregory.price@memverge.com>
Date:   Wed, 22 Nov 2023 16:12:00 -0500
From:   Gregory Price <gourry.memverge@...il.com>
To:     linux-mm@...ck.org
Cc:     linux-doc@...r.kernel.org, linux-fsdevel@...r.kernel.org,
        linux-api@...r.kernel.org, linux-arch@...r.kernel.org,
        linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
        arnd@...db.de, tglx@...utronix.de, luto@...nel.org,
        mingo@...hat.com, bp@...en8.de, dave.hansen@...ux.intel.com,
        x86@...nel.org, hpa@...or.com, mhocko@...nel.org, tj@...nel.org,
        ying.huang@...el.com, Gregory Price <gregory.price@...verge.com>
Subject: [RFC PATCH 11/11] fs/proc: Add mempolicy attribute to allow read/write of task mempolicy

Expose mempolicy via procfs, and utilize the existing mpol_parse_str
format to allow external tasks to change the policies of another task.

mpol_parse_str format:
	<mode>[=<flags>][:<nodelist>]

valid settings:
  "prefer"	(without a nodemask, aliases to 'local')
  "prefer:node"
  "interleave:nodelist"
  "local"
  "default"
  "prefer (many):nodelist"
  "bind:nodelist"

flags are either "=static" or "=relative", and cannot be used with
"prefer" or "local"  ("prefer=flag:nodelist" is valid).

Signed-off-by: Gregory Price <gregory.price@...verge.com>
---
 fs/proc/Makefile    |   1 +
 fs/proc/base.c      |   1 +
 fs/proc/internal.h  |   1 +
 fs/proc/mempolicy.c | 117 ++++++++++++++++++++++++++++++++++++++++++++
 4 files changed, 120 insertions(+)
 create mode 100644 fs/proc/mempolicy.c

diff --git a/fs/proc/Makefile b/fs/proc/Makefile
index bd08616ed8ba..272d22d9022f 100644
--- a/fs/proc/Makefile
+++ b/fs/proc/Makefile
@@ -27,6 +27,7 @@ proc-y	+= softirqs.o
 proc-y	+= namespaces.o
 proc-y	+= self.o
 proc-y	+= thread_self.o
+proc-y	+= mempolicy.o
 proc-$(CONFIG_PROC_SYSCTL)	+= proc_sysctl.o
 proc-$(CONFIG_NET)		+= proc_net.o
 proc-$(CONFIG_PROC_KCORE)	+= kcore.o
diff --git a/fs/proc/base.c b/fs/proc/base.c
index dd31e3b6bf77..3eb3d6d81a8e 100644
--- a/fs/proc/base.c
+++ b/fs/proc/base.c
@@ -3279,6 +3279,7 @@ static const struct pid_entry tgid_base_stuff[] = {
 	REG("maps",       S_IRUGO, proc_pid_maps_operations),
 #ifdef CONFIG_NUMA
 	REG("numa_maps",  S_IRUGO, proc_pid_numa_maps_operations),
+	REG("mempolicy",  S_IRUSR|S_IWUSR, proc_mempolicy_operations),
 #endif
 	REG("mem",        S_IRUSR|S_IWUSR, proc_mem_operations),
 	LNK("cwd",        proc_cwd_link),
diff --git a/fs/proc/internal.h b/fs/proc/internal.h
index 9a8f32f21ff5..e8e81629a8d8 100644
--- a/fs/proc/internal.h
+++ b/fs/proc/internal.h
@@ -303,6 +303,7 @@ extern const struct file_operations proc_pid_smaps_operations;
 extern const struct file_operations proc_pid_smaps_rollup_operations;
 extern const struct file_operations proc_clear_refs_operations;
 extern const struct file_operations proc_pagemap_operations;
+extern const struct file_operations proc_mempolicy_operations;
 
 extern unsigned long task_vsize(struct mm_struct *);
 extern unsigned long task_statm(struct mm_struct *,
diff --git a/fs/proc/mempolicy.c b/fs/proc/mempolicy.c
new file mode 100644
index 000000000000..417c2c8046d9
--- /dev/null
+++ b/fs/proc/mempolicy.c
@@ -0,0 +1,117 @@
+// SPDX-License-Identifier: GPL-2.0
+#ifdef CONFIG_NUMA
+#include <linux/fs.h>
+#include <linux/proc_fs.h>
+#include <linux/sched.h>
+#include <linux/mempolicy.h>
+#include <linux/uaccess.h>
+#include <linux/nodemask.h>
+
+#include "internal.h"
+
+#define MPOL_STR_SIZE 4096
+static ssize_t mempolicy_read_proc(struct file *file, char __user *buf,
+		size_t count, loff_t *ppos)
+{
+	struct task_struct *task;
+	struct mempolicy *policy;
+	char *buffer;
+	ssize_t rv = 0;
+	size_t outlen;
+
+	buffer = kzalloc(MPOL_STR_SIZE, GFP_KERNEL);
+	if (!buffer)
+		return -ENOMEM;
+
+	task = get_proc_task(file_inode(file));
+	if (!task) {
+		rv = -ESRCH;
+		goto freebuf;
+	}
+
+	task_lock(task);
+	policy = get_task_policy(task);
+	mpol_get(policy);
+	task_unlock(task);
+
+	if (!policy)
+		goto out;
+
+	mpol_to_str(buffer, MPOL_STR_SIZE, policy);
+
+	buffer[MPOL_STR_SIZE-1] = '\0';
+	outlen = strlen(buffer);
+	if (outlen < MPOL_STR_SIZE - 1) {
+		buffer[outlen] = '\n';
+		buffer[outlen + 1] = '\0';
+		outlen++;
+	}
+	rv = simple_read_from_buffer(buf, count, ppos, buffer, outlen);
+	mpol_put(policy);
+out:
+	put_task_struct(task);
+freebuf:
+	kfree(buffer);
+	return rv;
+}
+
+static ssize_t mempolicy_write_proc(struct file *file, const char __user *buf,
+				    size_t count, loff_t *ppos)
+{
+	struct task_struct *task;
+	struct mempolicy *new_policy = NULL;
+	char *mempolicy_str, *nl;
+	nodemask_t nodes;
+	int err;
+
+	mempolicy_str = kmalloc(count + 1, GFP_KERNEL);
+	if (!mempolicy_str)
+		return -ENOMEM;
+
+	if (copy_from_user(mempolicy_str, buf, count)) {
+		kfree(mempolicy_str);
+		return -EFAULT;
+	}
+	mempolicy_str[count] = '\0';
+
+	/* strip new line characters for simplicity of handling by parser */
+	nl = strchr(mempolicy_str, '\n');
+	if (nl)
+		*nl = '\0';
+	nl = strchr(mempolicy_str, '\r');
+	if (nl)
+		*nl = '\0';
+
+	err = mpol_parse_str(mempolicy_str, &new_policy);
+	if (err) {
+		kfree(mempolicy_str);
+		return err;
+	}
+
+	/* If no error and no policy, it was 'default', clear node list */
+	if (new_policy)
+		nodes = new_policy->nodes;
+	else
+		nodes_clear(nodes);
+
+	task = get_proc_task(file_inode(file));
+	if (!task) {
+		mpol_put(new_policy);
+		kfree(mempolicy_str);
+		return -ESRCH;
+	}
+
+	err = replace_mempolicy(task, new_policy, &nodes);
+
+	put_task_struct(task);
+	kfree(mempolicy_str);
+
+	return err ? err : count;
+}
+
+const struct file_operations proc_mempolicy_operations = {
+	.read = mempolicy_read_proc,
+	.write = mempolicy_write_proc,
+	.llseek = noop_llseek,
+};
+#endif /* CONFIG_NUMA */
-- 
2.39.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ