Christoph Hellwig | 3dcf60b | 2019-04-30 14:42:43 -0400 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0 |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 2 | /* |
| 3 | * fs/ioprio.c |
| 4 | * |
Jens Axboe | 0fe2347 | 2006-09-04 15:41:16 +0200 | [diff] [blame] | 5 | * Copyright (C) 2004 Jens Axboe <axboe@kernel.dk> |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 6 | * |
| 7 | * Helper functions for setting/querying io priorities of processes. The |
| 8 | * system calls closely mimmick getpriority/setpriority, see the man page for |
| 9 | * those. The prio argument is a composite of prio class and prio data, where |
| 10 | * the data argument has meaning within that class. The standard scheduling |
| 11 | * classes have 8 distinct prio levels, with 0 being the highest prio and 7 |
| 12 | * being the lowest. |
| 13 | * |
| 14 | * IOW, setting BE scheduling class with prio 2 is done ala: |
| 15 | * |
| 16 | * unsigned int prio = (IOPRIO_CLASS_BE << IOPRIO_CLASS_SHIFT) | 2; |
| 17 | * |
| 18 | * ioprio_set(PRIO_PROCESS, pid, prio); |
| 19 | * |
Mauro Carvalho Chehab | 898bd37 | 2019-04-18 19:45:00 -0300 | [diff] [blame] | 20 | * See also Documentation/block/ioprio.rst |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 21 | * |
| 22 | */ |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 23 | #include <linux/gfp.h> |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 24 | #include <linux/kernel.h> |
| 25 | #include <linux/ioprio.h> |
Ingo Molnar | 5b825c3 | 2017-02-02 17:54:15 +0100 | [diff] [blame] | 26 | #include <linux/cred.h> |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 27 | #include <linux/blkdev.h> |
Randy Dunlap | 16f7e0f | 2006-01-11 12:17:46 -0800 | [diff] [blame] | 28 | #include <linux/capability.h> |
Adrian Bunk | 9abdc4c | 2005-11-08 16:57:02 +0100 | [diff] [blame] | 29 | #include <linux/syscalls.h> |
James Morris | 03e6806 | 2006-06-23 02:03:58 -0700 | [diff] [blame] | 30 | #include <linux/security.h> |
Pavel Emelyanov | b488893 | 2007-10-18 23:40:14 -0700 | [diff] [blame] | 31 | #include <linux/pid_namespace.h> |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 32 | |
Adam Manzanares | aa43457 | 2018-05-22 10:52:17 -0700 | [diff] [blame] | 33 | int ioprio_check_cap(int ioprio) |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 34 | { |
| 35 | int class = IOPRIO_PRIO_CLASS(ioprio); |
| 36 | int data = IOPRIO_PRIO_DATA(ioprio); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 37 | |
| 38 | switch (class) { |
| 39 | case IOPRIO_CLASS_RT: |
Alistair Delva | 94c4b4f | 2021-11-15 18:16:55 +0000 | [diff] [blame] | 40 | /* |
| 41 | * Originally this only checked for CAP_SYS_ADMIN, |
| 42 | * which was implicitly allowed for pid 0 by security |
| 43 | * modules such as SELinux. Make sure we check |
| 44 | * CAP_SYS_ADMIN first to avoid a denial/avc for |
| 45 | * possibly missing CAP_SYS_NICE permission. |
| 46 | */ |
| 47 | if (!capable(CAP_SYS_ADMIN) && !capable(CAP_SYS_NICE)) |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 48 | return -EPERM; |
Gustavo A. R. Silva | df561f66 | 2020-08-23 17:36:59 -0500 | [diff] [blame] | 49 | fallthrough; |
Bart Van Assche | e29387e | 2017-06-21 09:40:11 -0700 | [diff] [blame] | 50 | /* rt has prio field too */ |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 51 | case IOPRIO_CLASS_BE: |
Damien Le Moal | 202bc94 | 2021-08-11 12:37:01 +0900 | [diff] [blame] | 52 | if (data >= IOPRIO_NR_LEVELS || data < 0) |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 53 | return -EINVAL; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 54 | break; |
| 55 | case IOPRIO_CLASS_IDLE: |
| 56 | break; |
Jens Axboe | 8ec680e | 2007-11-07 13:54:07 +0100 | [diff] [blame] | 57 | case IOPRIO_CLASS_NONE: |
| 58 | if (data) |
| 59 | return -EINVAL; |
| 60 | break; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 61 | default: |
| 62 | return -EINVAL; |
| 63 | } |
| 64 | |
Adam Manzanares | aa43457 | 2018-05-22 10:52:17 -0700 | [diff] [blame] | 65 | return 0; |
| 66 | } |
| 67 | |
| 68 | SYSCALL_DEFINE3(ioprio_set, int, which, int, who, int, ioprio) |
| 69 | { |
| 70 | struct task_struct *p, *g; |
| 71 | struct user_struct *user; |
| 72 | struct pid *pgrp; |
| 73 | kuid_t uid; |
| 74 | int ret; |
| 75 | |
| 76 | ret = ioprio_check_cap(ioprio); |
| 77 | if (ret) |
| 78 | return ret; |
| 79 | |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 80 | ret = -ESRCH; |
Greg Thelen | d69b78b | 2010-11-15 10:20:52 +0100 | [diff] [blame] | 81 | rcu_read_lock(); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 82 | switch (which) { |
| 83 | case IOPRIO_WHO_PROCESS: |
| 84 | if (!who) |
| 85 | p = current; |
| 86 | else |
Pavel Emelyanov | 228ebcb | 2007-10-18 23:40:16 -0700 | [diff] [blame] | 87 | p = find_task_by_vpid(who); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 88 | if (p) |
| 89 | ret = set_task_ioprio(p, ioprio); |
| 90 | break; |
| 91 | case IOPRIO_WHO_PGRP: |
| 92 | if (!who) |
Eric W. Biederman | 41487c6 | 2007-02-12 00:53:01 -0800 | [diff] [blame] | 93 | pgrp = task_pgrp(current); |
| 94 | else |
Pavel Emelyanov | b488893 | 2007-10-18 23:40:14 -0700 | [diff] [blame] | 95 | pgrp = find_vpid(who); |
Peter Zijlstra | 40c7fd3 | 2021-04-08 11:46:12 +0200 | [diff] [blame] | 96 | |
| 97 | read_lock(&tasklist_lock); |
Ken Chen | 2d70b68 | 2008-08-20 14:09:17 -0700 | [diff] [blame] | 98 | do_each_pid_thread(pgrp, PIDTYPE_PGID, p) { |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 99 | ret = set_task_ioprio(p, ioprio); |
Peter Zijlstra | 40c7fd3 | 2021-04-08 11:46:12 +0200 | [diff] [blame] | 100 | if (ret) { |
| 101 | read_unlock(&tasklist_lock); |
| 102 | goto out; |
| 103 | } |
Ken Chen | 2d70b68 | 2008-08-20 14:09:17 -0700 | [diff] [blame] | 104 | } while_each_pid_thread(pgrp, PIDTYPE_PGID, p); |
Peter Zijlstra | 40c7fd3 | 2021-04-08 11:46:12 +0200 | [diff] [blame] | 105 | read_unlock(&tasklist_lock); |
| 106 | |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 107 | break; |
| 108 | case IOPRIO_WHO_USER: |
Eric W. Biederman | 7b44ab9 | 2011-11-16 23:20:58 -0800 | [diff] [blame] | 109 | uid = make_kuid(current_user_ns(), who); |
| 110 | if (!uid_valid(uid)) |
| 111 | break; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 112 | if (!who) |
David Howells | 86a264a | 2008-11-14 10:39:18 +1100 | [diff] [blame] | 113 | user = current_user(); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 114 | else |
Eric W. Biederman | 7b44ab9 | 2011-11-16 23:20:58 -0800 | [diff] [blame] | 115 | user = find_user(uid); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 116 | |
| 117 | if (!user) |
| 118 | break; |
| 119 | |
Tetsuo Handa | 612dafa | 2017-02-22 15:40:50 -0800 | [diff] [blame] | 120 | for_each_process_thread(g, p) { |
Ben Segall | 8639b46 | 2015-11-06 16:32:48 -0800 | [diff] [blame] | 121 | if (!uid_eq(task_uid(p), uid) || |
| 122 | !task_pid_vnr(p)) |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 123 | continue; |
| 124 | ret = set_task_ioprio(p, ioprio); |
| 125 | if (ret) |
Oleg Nesterov | 78bd4d4 | 2006-08-21 08:33:23 +0200 | [diff] [blame] | 126 | goto free_uid; |
Tetsuo Handa | 612dafa | 2017-02-22 15:40:50 -0800 | [diff] [blame] | 127 | } |
Oleg Nesterov | 78bd4d4 | 2006-08-21 08:33:23 +0200 | [diff] [blame] | 128 | free_uid: |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 129 | if (who) |
| 130 | free_uid(user); |
| 131 | break; |
| 132 | default: |
| 133 | ret = -EINVAL; |
| 134 | } |
| 135 | |
Peter Zijlstra | 40c7fd3 | 2021-04-08 11:46:12 +0200 | [diff] [blame] | 136 | out: |
Greg Thelen | d69b78b | 2010-11-15 10:20:52 +0100 | [diff] [blame] | 137 | rcu_read_unlock(); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 138 | return ret; |
| 139 | } |
| 140 | |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 141 | static int get_task_ioprio(struct task_struct *p) |
| 142 | { |
| 143 | int ret; |
| 144 | |
| 145 | ret = security_task_getioprio(p); |
| 146 | if (ret) |
| 147 | goto out; |
Damien Le Moal | e70344c | 2021-08-11 12:37:02 +0900 | [diff] [blame] | 148 | ret = IOPRIO_DEFAULT; |
Omar Sandoval | 8ba8682 | 2016-07-01 00:39:35 -0700 | [diff] [blame] | 149 | task_lock(p); |
Jens Axboe | fd0928d | 2008-01-24 08:52:45 +0100 | [diff] [blame] | 150 | if (p->io_context) |
| 151 | ret = p->io_context->ioprio; |
Omar Sandoval | 8ba8682 | 2016-07-01 00:39:35 -0700 | [diff] [blame] | 152 | task_unlock(p); |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 153 | out: |
| 154 | return ret; |
| 155 | } |
| 156 | |
Oleg Nesterov | e014ff8 | 2006-08-21 10:02:50 +0200 | [diff] [blame] | 157 | int ioprio_best(unsigned short aprio, unsigned short bprio) |
| 158 | { |
Jan Kara | ece9c72 | 2014-10-30 20:43:38 +0100 | [diff] [blame] | 159 | if (!ioprio_valid(aprio)) |
Damien Le Moal | e70344c | 2021-08-11 12:37:02 +0900 | [diff] [blame] | 160 | aprio = IOPRIO_DEFAULT; |
Jan Kara | ece9c72 | 2014-10-30 20:43:38 +0100 | [diff] [blame] | 161 | if (!ioprio_valid(bprio)) |
Damien Le Moal | e70344c | 2021-08-11 12:37:02 +0900 | [diff] [blame] | 162 | bprio = IOPRIO_DEFAULT; |
Oleg Nesterov | e014ff8 | 2006-08-21 10:02:50 +0200 | [diff] [blame] | 163 | |
Bart Van Assche | 9a87182 | 2017-04-19 14:01:28 -0700 | [diff] [blame] | 164 | return min(aprio, bprio); |
Oleg Nesterov | e014ff8 | 2006-08-21 10:02:50 +0200 | [diff] [blame] | 165 | } |
| 166 | |
Heiko Carstens | 938bb9f | 2009-01-14 14:14:30 +0100 | [diff] [blame] | 167 | SYSCALL_DEFINE2(ioprio_get, int, which, int, who) |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 168 | { |
| 169 | struct task_struct *g, *p; |
| 170 | struct user_struct *user; |
Eric W. Biederman | 41487c6 | 2007-02-12 00:53:01 -0800 | [diff] [blame] | 171 | struct pid *pgrp; |
Eric W. Biederman | 7b44ab9 | 2011-11-16 23:20:58 -0800 | [diff] [blame] | 172 | kuid_t uid; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 173 | int ret = -ESRCH; |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 174 | int tmpio; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 175 | |
Greg Thelen | d69b78b | 2010-11-15 10:20:52 +0100 | [diff] [blame] | 176 | rcu_read_lock(); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 177 | switch (which) { |
| 178 | case IOPRIO_WHO_PROCESS: |
| 179 | if (!who) |
| 180 | p = current; |
| 181 | else |
Pavel Emelyanov | 228ebcb | 2007-10-18 23:40:16 -0700 | [diff] [blame] | 182 | p = find_task_by_vpid(who); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 183 | if (p) |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 184 | ret = get_task_ioprio(p); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 185 | break; |
| 186 | case IOPRIO_WHO_PGRP: |
| 187 | if (!who) |
Eric W. Biederman | 41487c6 | 2007-02-12 00:53:01 -0800 | [diff] [blame] | 188 | pgrp = task_pgrp(current); |
| 189 | else |
Pavel Emelyanov | b488893 | 2007-10-18 23:40:14 -0700 | [diff] [blame] | 190 | pgrp = find_vpid(who); |
Davidlohr Bueso | e6a59aa | 2021-12-10 10:20:58 -0800 | [diff] [blame] | 191 | read_lock(&tasklist_lock); |
Ken Chen | 2d70b68 | 2008-08-20 14:09:17 -0700 | [diff] [blame] | 192 | do_each_pid_thread(pgrp, PIDTYPE_PGID, p) { |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 193 | tmpio = get_task_ioprio(p); |
| 194 | if (tmpio < 0) |
| 195 | continue; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 196 | if (ret == -ESRCH) |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 197 | ret = tmpio; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 198 | else |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 199 | ret = ioprio_best(ret, tmpio); |
Ken Chen | 2d70b68 | 2008-08-20 14:09:17 -0700 | [diff] [blame] | 200 | } while_each_pid_thread(pgrp, PIDTYPE_PGID, p); |
Davidlohr Bueso | e6a59aa | 2021-12-10 10:20:58 -0800 | [diff] [blame] | 201 | read_unlock(&tasklist_lock); |
| 202 | |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 203 | break; |
| 204 | case IOPRIO_WHO_USER: |
Eric W. Biederman | 7b44ab9 | 2011-11-16 23:20:58 -0800 | [diff] [blame] | 205 | uid = make_kuid(current_user_ns(), who); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 206 | if (!who) |
David Howells | 86a264a | 2008-11-14 10:39:18 +1100 | [diff] [blame] | 207 | user = current_user(); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 208 | else |
Eric W. Biederman | 7b44ab9 | 2011-11-16 23:20:58 -0800 | [diff] [blame] | 209 | user = find_user(uid); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 210 | |
| 211 | if (!user) |
| 212 | break; |
| 213 | |
Tetsuo Handa | 612dafa | 2017-02-22 15:40:50 -0800 | [diff] [blame] | 214 | for_each_process_thread(g, p) { |
Ben Segall | 8639b46 | 2015-11-06 16:32:48 -0800 | [diff] [blame] | 215 | if (!uid_eq(task_uid(p), user->uid) || |
| 216 | !task_pid_vnr(p)) |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 217 | continue; |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 218 | tmpio = get_task_ioprio(p); |
| 219 | if (tmpio < 0) |
| 220 | continue; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 221 | if (ret == -ESRCH) |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 222 | ret = tmpio; |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 223 | else |
David Quigley | a1836a4 | 2006-06-30 01:55:49 -0700 | [diff] [blame] | 224 | ret = ioprio_best(ret, tmpio); |
Tetsuo Handa | 612dafa | 2017-02-22 15:40:50 -0800 | [diff] [blame] | 225 | } |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 226 | |
| 227 | if (who) |
| 228 | free_uid(user); |
| 229 | break; |
| 230 | default: |
| 231 | ret = -EINVAL; |
| 232 | } |
| 233 | |
Greg Thelen | d69b78b | 2010-11-15 10:20:52 +0100 | [diff] [blame] | 234 | rcu_read_unlock(); |
Jens Axboe | 22e2c50 | 2005-06-27 10:55:12 +0200 | [diff] [blame] | 235 | return ret; |
| 236 | } |