In container environment, we don't want users to bind their memory to a specific numa node, while we want to unit control memory resource with kubelet. Therefore, add a new lsm hook for set_mempolicy_home_node(2), then we can enforce fine-grained control over memory policy adjustment by the tasks in a container. Signed-off-by: Yafang Shao <laoar.shao@xxxxxxxxx> --- include/linux/lsm_hook_defs.h | 2 ++ include/linux/security.h | 8 ++++++++ mm/mempolicy.c | 5 +++++ security/security.c | 7 +++++++ 4 files changed, 22 insertions(+) diff --git a/include/linux/lsm_hook_defs.h b/include/linux/lsm_hook_defs.h index 725a03d..109883e 100644 --- a/include/linux/lsm_hook_defs.h +++ b/include/linux/lsm_hook_defs.h @@ -425,3 +425,5 @@ unsigned long maxnode, unsigned int flags) LSM_HOOK(int, 0, set_mempolicy, int mode, const unsigned long __user *nmask, unsigned long maxnode) +LSM_HOOK(int, 0, set_mempolicy_home_node, unsigned long start, unsigned long len, + unsigned long home_node, unsigned long flags) diff --git a/include/linux/security.h b/include/linux/security.h index 93c91b6a..7b7096f 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -489,6 +489,8 @@ int security_mbind(unsigned long start, unsigned long len, unsigned long maxnode, unsigned int flags); int security_set_mempolicy(int mode, const unsigned long __user *nmask, unsigned long maxnode); +int security_set_mempolicy_home_node(unsigned long start, unsigned long len, + unsigned long home_node, unsigned long flags); #else /* CONFIG_SECURITY */ static inline int call_blocking_lsm_notifier(enum lsm_event event, void *data) @@ -1413,6 +1415,12 @@ static inline int security_set_mempolicy(int mode, const unsigned long __user *n { return 0; } + +static inline int security_set_mempolicy_home_node(unsigned long start, unsigned long len, + unsigned long home_node, unsigned long flags) +{ + return 0; +} #endif /* CONFIG_SECURITY */ #if defined(CONFIG_SECURITY) && defined(CONFIG_WATCH_QUEUE) diff --git a/mm/mempolicy.c b/mm/mempolicy.c index 0a76cd2..54106e1 100644 --- a/mm/mempolicy.c +++ b/mm/mempolicy.c @@ -1523,6 +1523,11 @@ static long kernel_mbind(unsigned long start, unsigned long len, return -EINVAL; if (end == start) return 0; + + err = security_set_mempolicy_home_node(start, len, home_node, flags); + if (err) + return err; + mmap_write_lock(mm); prev = vma_prev(&vmi); for_each_vma_range(vmi, vma, end) { diff --git a/security/security.c b/security/security.c index 79ae17d..0a2e062 100644 --- a/security/security.c +++ b/security/security.c @@ -5349,3 +5349,10 @@ int security_set_mempolicy(int mode, const unsigned long __user *nmask, unsigned { return call_int_hook(set_mempolicy, 0, mode, nmask, maxnode); } + +int security_set_mempolicy_home_node(unsigned long start, unsigned long len, + unsigned long home_node, unsigned long flags) +{ + + return call_int_hook(set_mempolicy_home_node, 0, start, len, home_node, flags); +} -- 1.8.3.1