Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp5224974ybl; Tue, 27 Aug 2019 01:05:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqyQsgOAcZPfIJGIVraejIcFSV0yCOPix8H2rn0YsRh2OIWJqztJE+ztel7WkXfvpuxX1Wat X-Received: by 2002:a62:e50c:: with SMTP id n12mr11214167pff.206.1566893152450; Tue, 27 Aug 2019 01:05:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566893152; cv=none; d=google.com; s=arc-20160816; b=pZrGgvswJNzaElUH4MM4Iuiw1tn/FSsXgeVtKP73ulvwWfzEexYZCI/rSnODHTAMw1 yxofd7qev+JXYizdgyZs0lfFm222cWu5hoMkz6AXPmxhiSNQSrYgOwdO7tZ91cLGWPZm ZGLIrbFQg+HJeXj5WnnOHJjTDPSF32UmliW5dBRbBxKrVg3MpM9sXiQgCAE+4n227u8P kgGEYp5Xr1tqFWiMNYoScL3byj8wAiRlDPXhGRi3Yxnx/61/VTY26g8Y45X1hDd708S4 8SrMz7wVRvFu7sXjcPyHX/DmJ067NXKIGnnI8h7VZXHG/5ju5tU5UvQ4qAOROUSNG2Tx qDIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=hv/oxCgFJHsGSRgi6Q6mbU2R0g0vVNuetwzNw0aEK3U=; b=nxXFmFXemgBWe3GkXZN2c4Cf1nRK03d+UUnWoI0fniwWqnf0H6VOsunneUJhoYAkIK +hA57KvKdQVPyYOXbBe9ntFYS2IQShQCCdDTtxaBha8W4pm9wsjooKBEzPeVFGkvvZ3y 91oMA14KqeXydlUX5xFTuA65qMaxhGQgW2BvpqgLR36dLj8ODeKoCLzw/oQ2vkHu1kWk evdTsEgcsEvv4LSbkYqYqiqxUJpaJ4G4htLiQybPh5fW0KKZrh1k9EWb+qj6dj052er7 P8QuYbyd1W7NdXpFaVEbYZlqsPmzH1o3xN93J7nwhbiBt1FUYD8Jn7A3J7CCcUMP5ltq x/wQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Y/0YEeKH"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 29si11223291pgu.584.2019.08.27.01.05.37; Tue, 27 Aug 2019 01:05:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Y/0YEeKH"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731709AbfH0IDL (ORCPT + 99 others); Tue, 27 Aug 2019 04:03:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:60550 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732213AbfH0IDK (ORCPT ); Tue, 27 Aug 2019 04:03:10 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AD4F42184D; Tue, 27 Aug 2019 08:03:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566892989; bh=dyjZHILtQTS0ehIpD3DGAVTw3m4jcFLb84TCYisqpdU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Y/0YEeKHhkRpEGf8uUgPi/6pveJX8HgurArPZLJjdPzYtWh7Rcn5kRsE7IkRw6/xW gJGYZlnNda5/TVBNiMWnIQnQGRSrgdcsgpK53aB1+lFCXJEvNI1fJzsqs0DSrRgubJ X6oSJNITDegYs1crLBdTroKRqckkJkvfbZMo9QrE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nick Kralevich , Suren Baghdasaryan , "Peter Zijlstra (Intel)" , lizefan@huawei.com, mingo@redhat.com, akpm@linux-foundation.org, kernel-team@android.com, dennisszhou@gmail.com, dennis@kernel.org, hannes@cmpxchg.org, axboe@kernel.dk, Sasha Levin Subject: [PATCH 5.2 084/162] sched/psi: Do not require setsched permission from the trigger creator Date: Tue, 27 Aug 2019 09:50:12 +0200 Message-Id: <20190827072741.055271779@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190827072738.093683223@linuxfoundation.org> References: <20190827072738.093683223@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 04e048cf09d7b5fc995817cdc5ae1acd4482429c ] When a process creates a new trigger by writing into /proc/pressure/* files, permissions to write such a file should be used to determine whether the process is allowed to do so or not. Current implementation would also require such a process to have setsched capability. Setting of psi trigger thread's scheduling policy is an implementation detail and should not be exposed to the user level. Remove the permission check by using _nocheck version of the function. Suggested-by: Nick Kralevich Signed-off-by: Suren Baghdasaryan Signed-off-by: Peter Zijlstra (Intel) Cc: lizefan@huawei.com Cc: mingo@redhat.com Cc: akpm@linux-foundation.org Cc: kernel-team@android.com Cc: dennisszhou@gmail.com Cc: dennis@kernel.org Cc: hannes@cmpxchg.org Cc: axboe@kernel.dk Link: https://lkml.kernel.org/r/20190730013310.162367-1-surenb@google.com Signed-off-by: Sasha Levin --- kernel/sched/psi.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/sched/psi.c b/kernel/sched/psi.c index 7fe2c5fd26b54..23fbbcc414d5d 100644 --- a/kernel/sched/psi.c +++ b/kernel/sched/psi.c @@ -1061,7 +1061,7 @@ struct psi_trigger *psi_trigger_create(struct psi_group *group, mutex_unlock(&group->trigger_lock); return ERR_CAST(kworker); } - sched_setscheduler(kworker->task, SCHED_FIFO, ¶m); + sched_setscheduler_nocheck(kworker->task, SCHED_FIFO, ¶m); kthread_init_delayed_work(&group->poll_work, psi_poll_work); rcu_assign_pointer(group->poll_kworker, kworker); -- 2.20.1