blob: 6f01d35a5145a66ffac5e7852c943df3b0f66c10 [file] [log] [blame]
Christoph Hellwig3dcf60b2019-04-30 14:42:43 -04001// SPDX-License-Identifier: GPL-2.0
Jens Axboe22e2c502005-06-27 10:55:12 +02002/*
3 * fs/ioprio.c
4 *
Jens Axboe0fe23472006-09-04 15:41:16 +02005 * Copyright (C) 2004 Jens Axboe <axboe@kernel.dk>
Jens Axboe22e2c502005-06-27 10:55:12 +02006 *
7 * Helper functions for setting/querying io priorities of processes. The
8 * system calls closely mimmick getpriority/setpriority, see the man page for
9 * those. The prio argument is a composite of prio class and prio data, where
10 * the data argument has meaning within that class. The standard scheduling
11 * classes have 8 distinct prio levels, with 0 being the highest prio and 7
12 * being the lowest.
13 *
14 * IOW, setting BE scheduling class with prio 2 is done ala:
15 *
16 * unsigned int prio = (IOPRIO_CLASS_BE << IOPRIO_CLASS_SHIFT) | 2;
17 *
18 * ioprio_set(PRIO_PROCESS, pid, prio);
19 *
Mauro Carvalho Chehab898bd372019-04-18 19:45:00 -030020 * See also Documentation/block/ioprio.rst
Jens Axboe22e2c502005-06-27 10:55:12 +020021 *
22 */
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090023#include <linux/gfp.h>
Jens Axboe22e2c502005-06-27 10:55:12 +020024#include <linux/kernel.h>
Paul Gortmakerafeacc82011-05-26 16:00:52 -040025#include <linux/export.h>
Jens Axboe22e2c502005-06-27 10:55:12 +020026#include <linux/ioprio.h>
Ingo Molnar5b825c32017-02-02 17:54:15 +010027#include <linux/cred.h>
Jens Axboe22e2c502005-06-27 10:55:12 +020028#include <linux/blkdev.h>
Randy Dunlap16f7e0f2006-01-11 12:17:46 -080029#include <linux/capability.h>
Ingo Molnar8703e8a2017-02-08 18:51:30 +010030#include <linux/sched/user.h>
Ingo Molnarf719ff9b2017-02-06 10:57:33 +010031#include <linux/sched/task.h>
Adrian Bunk9abdc4c2005-11-08 16:57:02 +010032#include <linux/syscalls.h>
James Morris03e68062006-06-23 02:03:58 -070033#include <linux/security.h>
Pavel Emelyanovb4888932007-10-18 23:40:14 -070034#include <linux/pid_namespace.h>
Jens Axboe22e2c502005-06-27 10:55:12 +020035
Theodore Ts'ob3881f72009-01-05 22:46:26 -050036int set_task_ioprio(struct task_struct *task, int ioprio)
Jens Axboe22e2c502005-06-27 10:55:12 +020037{
James Morris03e68062006-06-23 02:03:58 -070038 int err;
Jens Axboe22e2c502005-06-27 10:55:12 +020039 struct io_context *ioc;
David Howellsc69e8d92008-11-14 10:39:19 +110040 const struct cred *cred = current_cred(), *tcred;
Jens Axboe22e2c502005-06-27 10:55:12 +020041
David Howellsc69e8d92008-11-14 10:39:19 +110042 rcu_read_lock();
43 tcred = __task_cred(task);
Eric W. Biederman8e96e3b2012-03-03 21:17:15 -080044 if (!uid_eq(tcred->uid, cred->euid) &&
45 !uid_eq(tcred->uid, cred->uid) && !capable(CAP_SYS_NICE)) {
David Howellsc69e8d92008-11-14 10:39:19 +110046 rcu_read_unlock();
Jens Axboe22e2c502005-06-27 10:55:12 +020047 return -EPERM;
David Howellsc69e8d92008-11-14 10:39:19 +110048 }
49 rcu_read_unlock();
Jens Axboe22e2c502005-06-27 10:55:12 +020050
James Morris03e68062006-06-23 02:03:58 -070051 err = security_task_setioprio(task, ioprio);
52 if (err)
53 return err;
54
Tejun Heo6e736be2011-12-14 00:33:38 +010055 ioc = get_task_io_context(task, GFP_ATOMIC, NUMA_NO_NODE);
56 if (ioc) {
Tejun Heo2b566fa2012-03-19 15:10:59 -070057 ioc->ioprio = ioprio;
Tejun Heo11a31222012-02-07 07:51:30 +010058 put_io_context(ioc);
Jens Axboefd0928d2008-01-24 08:52:45 +010059 }
Jens Axboe22e2c502005-06-27 10:55:12 +020060
Jens Axboefd0928d2008-01-24 08:52:45 +010061 return err;
Jens Axboe22e2c502005-06-27 10:55:12 +020062}
Theodore Ts'ob3881f72009-01-05 22:46:26 -050063EXPORT_SYMBOL_GPL(set_task_ioprio);
Jens Axboe22e2c502005-06-27 10:55:12 +020064
Adam Manzanaresaa434572018-05-22 10:52:17 -070065int ioprio_check_cap(int ioprio)
Jens Axboe22e2c502005-06-27 10:55:12 +020066{
67 int class = IOPRIO_PRIO_CLASS(ioprio);
68 int data = IOPRIO_PRIO_DATA(ioprio);
Jens Axboe22e2c502005-06-27 10:55:12 +020069
70 switch (class) {
71 case IOPRIO_CLASS_RT:
Alistair Delva94c4b4f2021-11-15 18:16:55 +000072 /*
73 * Originally this only checked for CAP_SYS_ADMIN,
74 * which was implicitly allowed for pid 0 by security
75 * modules such as SELinux. Make sure we check
76 * CAP_SYS_ADMIN first to avoid a denial/avc for
77 * possibly missing CAP_SYS_NICE permission.
78 */
79 if (!capable(CAP_SYS_ADMIN) && !capable(CAP_SYS_NICE))
Jens Axboe22e2c502005-06-27 10:55:12 +020080 return -EPERM;
Gustavo A. R. Silvadf561f662020-08-23 17:36:59 -050081 fallthrough;
Bart Van Asschee29387e2017-06-21 09:40:11 -070082 /* rt has prio field too */
Jens Axboe22e2c502005-06-27 10:55:12 +020083 case IOPRIO_CLASS_BE:
Damien Le Moal202bc942021-08-11 12:37:01 +090084 if (data >= IOPRIO_NR_LEVELS || data < 0)
Jens Axboe22e2c502005-06-27 10:55:12 +020085 return -EINVAL;
Jens Axboe22e2c502005-06-27 10:55:12 +020086 break;
87 case IOPRIO_CLASS_IDLE:
88 break;
Jens Axboe8ec680e2007-11-07 13:54:07 +010089 case IOPRIO_CLASS_NONE:
90 if (data)
91 return -EINVAL;
92 break;
Jens Axboe22e2c502005-06-27 10:55:12 +020093 default:
94 return -EINVAL;
95 }
96
Adam Manzanaresaa434572018-05-22 10:52:17 -070097 return 0;
98}
99
100SYSCALL_DEFINE3(ioprio_set, int, which, int, who, int, ioprio)
101{
102 struct task_struct *p, *g;
103 struct user_struct *user;
104 struct pid *pgrp;
105 kuid_t uid;
106 int ret;
107
108 ret = ioprio_check_cap(ioprio);
109 if (ret)
110 return ret;
111
Jens Axboe22e2c502005-06-27 10:55:12 +0200112 ret = -ESRCH;
Greg Thelend69b78b2010-11-15 10:20:52 +0100113 rcu_read_lock();
Jens Axboe22e2c502005-06-27 10:55:12 +0200114 switch (which) {
115 case IOPRIO_WHO_PROCESS:
116 if (!who)
117 p = current;
118 else
Pavel Emelyanov228ebcb2007-10-18 23:40:16 -0700119 p = find_task_by_vpid(who);
Jens Axboe22e2c502005-06-27 10:55:12 +0200120 if (p)
121 ret = set_task_ioprio(p, ioprio);
122 break;
123 case IOPRIO_WHO_PGRP:
124 if (!who)
Eric W. Biederman41487c62007-02-12 00:53:01 -0800125 pgrp = task_pgrp(current);
126 else
Pavel Emelyanovb4888932007-10-18 23:40:14 -0700127 pgrp = find_vpid(who);
Peter Zijlstra40c7fd32021-04-08 11:46:12 +0200128
129 read_lock(&tasklist_lock);
Ken Chen2d70b682008-08-20 14:09:17 -0700130 do_each_pid_thread(pgrp, PIDTYPE_PGID, p) {
Jens Axboe22e2c502005-06-27 10:55:12 +0200131 ret = set_task_ioprio(p, ioprio);
Peter Zijlstra40c7fd32021-04-08 11:46:12 +0200132 if (ret) {
133 read_unlock(&tasklist_lock);
134 goto out;
135 }
Ken Chen2d70b682008-08-20 14:09:17 -0700136 } while_each_pid_thread(pgrp, PIDTYPE_PGID, p);
Peter Zijlstra40c7fd32021-04-08 11:46:12 +0200137 read_unlock(&tasklist_lock);
138
Jens Axboe22e2c502005-06-27 10:55:12 +0200139 break;
140 case IOPRIO_WHO_USER:
Eric W. Biederman7b44ab92011-11-16 23:20:58 -0800141 uid = make_kuid(current_user_ns(), who);
142 if (!uid_valid(uid))
143 break;
Jens Axboe22e2c502005-06-27 10:55:12 +0200144 if (!who)
David Howells86a264a2008-11-14 10:39:18 +1100145 user = current_user();
Jens Axboe22e2c502005-06-27 10:55:12 +0200146 else
Eric W. Biederman7b44ab92011-11-16 23:20:58 -0800147 user = find_user(uid);
Jens Axboe22e2c502005-06-27 10:55:12 +0200148
149 if (!user)
150 break;
151
Tetsuo Handa612dafa2017-02-22 15:40:50 -0800152 for_each_process_thread(g, p) {
Ben Segall8639b462015-11-06 16:32:48 -0800153 if (!uid_eq(task_uid(p), uid) ||
154 !task_pid_vnr(p))
Jens Axboe22e2c502005-06-27 10:55:12 +0200155 continue;
156 ret = set_task_ioprio(p, ioprio);
157 if (ret)
Oleg Nesterov78bd4d42006-08-21 08:33:23 +0200158 goto free_uid;
Tetsuo Handa612dafa2017-02-22 15:40:50 -0800159 }
Oleg Nesterov78bd4d42006-08-21 08:33:23 +0200160free_uid:
Jens Axboe22e2c502005-06-27 10:55:12 +0200161 if (who)
162 free_uid(user);
163 break;
164 default:
165 ret = -EINVAL;
166 }
167
Peter Zijlstra40c7fd32021-04-08 11:46:12 +0200168out:
Greg Thelend69b78b2010-11-15 10:20:52 +0100169 rcu_read_unlock();
Jens Axboe22e2c502005-06-27 10:55:12 +0200170 return ret;
171}
172
David Quigleya1836a42006-06-30 01:55:49 -0700173static int get_task_ioprio(struct task_struct *p)
174{
175 int ret;
176
177 ret = security_task_getioprio(p);
178 if (ret)
179 goto out;
Damien Le Moale70344c2021-08-11 12:37:02 +0900180 ret = IOPRIO_DEFAULT;
Omar Sandoval8ba86822016-07-01 00:39:35 -0700181 task_lock(p);
Jens Axboefd0928d2008-01-24 08:52:45 +0100182 if (p->io_context)
183 ret = p->io_context->ioprio;
Omar Sandoval8ba86822016-07-01 00:39:35 -0700184 task_unlock(p);
David Quigleya1836a42006-06-30 01:55:49 -0700185out:
186 return ret;
187}
188
Oleg Nesterove014ff82006-08-21 10:02:50 +0200189int ioprio_best(unsigned short aprio, unsigned short bprio)
190{
Jan Karaece9c722014-10-30 20:43:38 +0100191 if (!ioprio_valid(aprio))
Damien Le Moale70344c2021-08-11 12:37:02 +0900192 aprio = IOPRIO_DEFAULT;
Jan Karaece9c722014-10-30 20:43:38 +0100193 if (!ioprio_valid(bprio))
Damien Le Moale70344c2021-08-11 12:37:02 +0900194 bprio = IOPRIO_DEFAULT;
Oleg Nesterove014ff82006-08-21 10:02:50 +0200195
Bart Van Assche9a871822017-04-19 14:01:28 -0700196 return min(aprio, bprio);
Oleg Nesterove014ff82006-08-21 10:02:50 +0200197}
198
Heiko Carstens938bb9f2009-01-14 14:14:30 +0100199SYSCALL_DEFINE2(ioprio_get, int, which, int, who)
Jens Axboe22e2c502005-06-27 10:55:12 +0200200{
201 struct task_struct *g, *p;
202 struct user_struct *user;
Eric W. Biederman41487c62007-02-12 00:53:01 -0800203 struct pid *pgrp;
Eric W. Biederman7b44ab92011-11-16 23:20:58 -0800204 kuid_t uid;
Jens Axboe22e2c502005-06-27 10:55:12 +0200205 int ret = -ESRCH;
David Quigleya1836a42006-06-30 01:55:49 -0700206 int tmpio;
Jens Axboe22e2c502005-06-27 10:55:12 +0200207
Greg Thelend69b78b2010-11-15 10:20:52 +0100208 rcu_read_lock();
Jens Axboe22e2c502005-06-27 10:55:12 +0200209 switch (which) {
210 case IOPRIO_WHO_PROCESS:
211 if (!who)
212 p = current;
213 else
Pavel Emelyanov228ebcb2007-10-18 23:40:16 -0700214 p = find_task_by_vpid(who);
Jens Axboe22e2c502005-06-27 10:55:12 +0200215 if (p)
David Quigleya1836a42006-06-30 01:55:49 -0700216 ret = get_task_ioprio(p);
Jens Axboe22e2c502005-06-27 10:55:12 +0200217 break;
218 case IOPRIO_WHO_PGRP:
219 if (!who)
Eric W. Biederman41487c62007-02-12 00:53:01 -0800220 pgrp = task_pgrp(current);
221 else
Pavel Emelyanovb4888932007-10-18 23:40:14 -0700222 pgrp = find_vpid(who);
Davidlohr Buesoe6a59aa2021-12-10 10:20:58 -0800223 read_lock(&tasklist_lock);
Ken Chen2d70b682008-08-20 14:09:17 -0700224 do_each_pid_thread(pgrp, PIDTYPE_PGID, p) {
David Quigleya1836a42006-06-30 01:55:49 -0700225 tmpio = get_task_ioprio(p);
226 if (tmpio < 0)
227 continue;
Jens Axboe22e2c502005-06-27 10:55:12 +0200228 if (ret == -ESRCH)
David Quigleya1836a42006-06-30 01:55:49 -0700229 ret = tmpio;
Jens Axboe22e2c502005-06-27 10:55:12 +0200230 else
David Quigleya1836a42006-06-30 01:55:49 -0700231 ret = ioprio_best(ret, tmpio);
Ken Chen2d70b682008-08-20 14:09:17 -0700232 } while_each_pid_thread(pgrp, PIDTYPE_PGID, p);
Davidlohr Buesoe6a59aa2021-12-10 10:20:58 -0800233 read_unlock(&tasklist_lock);
234
Jens Axboe22e2c502005-06-27 10:55:12 +0200235 break;
236 case IOPRIO_WHO_USER:
Eric W. Biederman7b44ab92011-11-16 23:20:58 -0800237 uid = make_kuid(current_user_ns(), who);
Jens Axboe22e2c502005-06-27 10:55:12 +0200238 if (!who)
David Howells86a264a2008-11-14 10:39:18 +1100239 user = current_user();
Jens Axboe22e2c502005-06-27 10:55:12 +0200240 else
Eric W. Biederman7b44ab92011-11-16 23:20:58 -0800241 user = find_user(uid);
Jens Axboe22e2c502005-06-27 10:55:12 +0200242
243 if (!user)
244 break;
245
Tetsuo Handa612dafa2017-02-22 15:40:50 -0800246 for_each_process_thread(g, p) {
Ben Segall8639b462015-11-06 16:32:48 -0800247 if (!uid_eq(task_uid(p), user->uid) ||
248 !task_pid_vnr(p))
Jens Axboe22e2c502005-06-27 10:55:12 +0200249 continue;
David Quigleya1836a42006-06-30 01:55:49 -0700250 tmpio = get_task_ioprio(p);
251 if (tmpio < 0)
252 continue;
Jens Axboe22e2c502005-06-27 10:55:12 +0200253 if (ret == -ESRCH)
David Quigleya1836a42006-06-30 01:55:49 -0700254 ret = tmpio;
Jens Axboe22e2c502005-06-27 10:55:12 +0200255 else
David Quigleya1836a42006-06-30 01:55:49 -0700256 ret = ioprio_best(ret, tmpio);
Tetsuo Handa612dafa2017-02-22 15:40:50 -0800257 }
Jens Axboe22e2c502005-06-27 10:55:12 +0200258
259 if (who)
260 free_uid(user);
261 break;
262 default:
263 ret = -EINVAL;
264 }
265
Greg Thelend69b78b2010-11-15 10:20:52 +0100266 rcu_read_unlock();
Jens Axboe22e2c502005-06-27 10:55:12 +0200267 return ret;
268}