162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * fs/ioprio.c
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2004 Jens Axboe <axboe@kernel.dk>
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Helper functions for setting/querying io priorities of processes. The
862306a36Sopenharmony_ci * system calls closely mimmick getpriority/setpriority, see the man page for
962306a36Sopenharmony_ci * those. The prio argument is a composite of prio class and prio data, where
1062306a36Sopenharmony_ci * the data argument has meaning within that class. The standard scheduling
1162306a36Sopenharmony_ci * classes have 8 distinct prio levels, with 0 being the highest prio and 7
1262306a36Sopenharmony_ci * being the lowest.
1362306a36Sopenharmony_ci *
1462306a36Sopenharmony_ci * IOW, setting BE scheduling class with prio 2 is done ala:
1562306a36Sopenharmony_ci *
1662306a36Sopenharmony_ci * unsigned int prio = (IOPRIO_CLASS_BE << IOPRIO_CLASS_SHIFT) | 2;
1762306a36Sopenharmony_ci *
1862306a36Sopenharmony_ci * ioprio_set(PRIO_PROCESS, pid, prio);
1962306a36Sopenharmony_ci *
2062306a36Sopenharmony_ci * See also Documentation/block/ioprio.rst
2162306a36Sopenharmony_ci *
2262306a36Sopenharmony_ci */
2362306a36Sopenharmony_ci#include <linux/gfp.h>
2462306a36Sopenharmony_ci#include <linux/kernel.h>
2562306a36Sopenharmony_ci#include <linux/ioprio.h>
2662306a36Sopenharmony_ci#include <linux/cred.h>
2762306a36Sopenharmony_ci#include <linux/blkdev.h>
2862306a36Sopenharmony_ci#include <linux/capability.h>
2962306a36Sopenharmony_ci#include <linux/syscalls.h>
3062306a36Sopenharmony_ci#include <linux/security.h>
3162306a36Sopenharmony_ci#include <linux/pid_namespace.h>
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_ciint ioprio_check_cap(int ioprio)
3462306a36Sopenharmony_ci{
3562306a36Sopenharmony_ci	int class = IOPRIO_PRIO_CLASS(ioprio);
3662306a36Sopenharmony_ci	int level = IOPRIO_PRIO_LEVEL(ioprio);
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_ci	switch (class) {
3962306a36Sopenharmony_ci		case IOPRIO_CLASS_RT:
4062306a36Sopenharmony_ci			/*
4162306a36Sopenharmony_ci			 * Originally this only checked for CAP_SYS_ADMIN,
4262306a36Sopenharmony_ci			 * which was implicitly allowed for pid 0 by security
4362306a36Sopenharmony_ci			 * modules such as SELinux. Make sure we check
4462306a36Sopenharmony_ci			 * CAP_SYS_ADMIN first to avoid a denial/avc for
4562306a36Sopenharmony_ci			 * possibly missing CAP_SYS_NICE permission.
4662306a36Sopenharmony_ci			 */
4762306a36Sopenharmony_ci			if (!capable(CAP_SYS_ADMIN) && !capable(CAP_SYS_NICE))
4862306a36Sopenharmony_ci				return -EPERM;
4962306a36Sopenharmony_ci			fallthrough;
5062306a36Sopenharmony_ci			/* rt has prio field too */
5162306a36Sopenharmony_ci		case IOPRIO_CLASS_BE:
5262306a36Sopenharmony_ci			if (level >= IOPRIO_NR_LEVELS)
5362306a36Sopenharmony_ci				return -EINVAL;
5462306a36Sopenharmony_ci			break;
5562306a36Sopenharmony_ci		case IOPRIO_CLASS_IDLE:
5662306a36Sopenharmony_ci			break;
5762306a36Sopenharmony_ci		case IOPRIO_CLASS_NONE:
5862306a36Sopenharmony_ci			if (level)
5962306a36Sopenharmony_ci				return -EINVAL;
6062306a36Sopenharmony_ci			break;
6162306a36Sopenharmony_ci		case IOPRIO_CLASS_INVALID:
6262306a36Sopenharmony_ci		default:
6362306a36Sopenharmony_ci			return -EINVAL;
6462306a36Sopenharmony_ci	}
6562306a36Sopenharmony_ci
6662306a36Sopenharmony_ci	return 0;
6762306a36Sopenharmony_ci}
6862306a36Sopenharmony_ci
6962306a36Sopenharmony_ciSYSCALL_DEFINE3(ioprio_set, int, which, int, who, int, ioprio)
7062306a36Sopenharmony_ci{
7162306a36Sopenharmony_ci	struct task_struct *p, *g;
7262306a36Sopenharmony_ci	struct user_struct *user;
7362306a36Sopenharmony_ci	struct pid *pgrp;
7462306a36Sopenharmony_ci	kuid_t uid;
7562306a36Sopenharmony_ci	int ret;
7662306a36Sopenharmony_ci
7762306a36Sopenharmony_ci	ret = ioprio_check_cap(ioprio);
7862306a36Sopenharmony_ci	if (ret)
7962306a36Sopenharmony_ci		return ret;
8062306a36Sopenharmony_ci
8162306a36Sopenharmony_ci	ret = -ESRCH;
8262306a36Sopenharmony_ci	rcu_read_lock();
8362306a36Sopenharmony_ci	switch (which) {
8462306a36Sopenharmony_ci		case IOPRIO_WHO_PROCESS:
8562306a36Sopenharmony_ci			if (!who)
8662306a36Sopenharmony_ci				p = current;
8762306a36Sopenharmony_ci			else
8862306a36Sopenharmony_ci				p = find_task_by_vpid(who);
8962306a36Sopenharmony_ci			if (p)
9062306a36Sopenharmony_ci				ret = set_task_ioprio(p, ioprio);
9162306a36Sopenharmony_ci			break;
9262306a36Sopenharmony_ci		case IOPRIO_WHO_PGRP:
9362306a36Sopenharmony_ci			if (!who)
9462306a36Sopenharmony_ci				pgrp = task_pgrp(current);
9562306a36Sopenharmony_ci			else
9662306a36Sopenharmony_ci				pgrp = find_vpid(who);
9762306a36Sopenharmony_ci
9862306a36Sopenharmony_ci			read_lock(&tasklist_lock);
9962306a36Sopenharmony_ci			do_each_pid_thread(pgrp, PIDTYPE_PGID, p) {
10062306a36Sopenharmony_ci				ret = set_task_ioprio(p, ioprio);
10162306a36Sopenharmony_ci				if (ret) {
10262306a36Sopenharmony_ci					read_unlock(&tasklist_lock);
10362306a36Sopenharmony_ci					goto out;
10462306a36Sopenharmony_ci				}
10562306a36Sopenharmony_ci			} while_each_pid_thread(pgrp, PIDTYPE_PGID, p);
10662306a36Sopenharmony_ci			read_unlock(&tasklist_lock);
10762306a36Sopenharmony_ci
10862306a36Sopenharmony_ci			break;
10962306a36Sopenharmony_ci		case IOPRIO_WHO_USER:
11062306a36Sopenharmony_ci			uid = make_kuid(current_user_ns(), who);
11162306a36Sopenharmony_ci			if (!uid_valid(uid))
11262306a36Sopenharmony_ci				break;
11362306a36Sopenharmony_ci			if (!who)
11462306a36Sopenharmony_ci				user = current_user();
11562306a36Sopenharmony_ci			else
11662306a36Sopenharmony_ci				user = find_user(uid);
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci			if (!user)
11962306a36Sopenharmony_ci				break;
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci			for_each_process_thread(g, p) {
12262306a36Sopenharmony_ci				if (!uid_eq(task_uid(p), uid) ||
12362306a36Sopenharmony_ci				    !task_pid_vnr(p))
12462306a36Sopenharmony_ci					continue;
12562306a36Sopenharmony_ci				ret = set_task_ioprio(p, ioprio);
12662306a36Sopenharmony_ci				if (ret)
12762306a36Sopenharmony_ci					goto free_uid;
12862306a36Sopenharmony_ci			}
12962306a36Sopenharmony_cifree_uid:
13062306a36Sopenharmony_ci			if (who)
13162306a36Sopenharmony_ci				free_uid(user);
13262306a36Sopenharmony_ci			break;
13362306a36Sopenharmony_ci		default:
13462306a36Sopenharmony_ci			ret = -EINVAL;
13562306a36Sopenharmony_ci	}
13662306a36Sopenharmony_ci
13762306a36Sopenharmony_ciout:
13862306a36Sopenharmony_ci	rcu_read_unlock();
13962306a36Sopenharmony_ci	return ret;
14062306a36Sopenharmony_ci}
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci/*
14362306a36Sopenharmony_ci * If the task has set an I/O priority, use that. Otherwise, return
14462306a36Sopenharmony_ci * the default I/O priority.
14562306a36Sopenharmony_ci *
14662306a36Sopenharmony_ci * Expected to be called for current task or with task_lock() held to keep
14762306a36Sopenharmony_ci * io_context stable.
14862306a36Sopenharmony_ci */
14962306a36Sopenharmony_ciint __get_task_ioprio(struct task_struct *p)
15062306a36Sopenharmony_ci{
15162306a36Sopenharmony_ci	struct io_context *ioc = p->io_context;
15262306a36Sopenharmony_ci	int prio;
15362306a36Sopenharmony_ci
15462306a36Sopenharmony_ci	if (p != current)
15562306a36Sopenharmony_ci		lockdep_assert_held(&p->alloc_lock);
15662306a36Sopenharmony_ci	if (ioc)
15762306a36Sopenharmony_ci		prio = ioc->ioprio;
15862306a36Sopenharmony_ci	else
15962306a36Sopenharmony_ci		prio = IOPRIO_DEFAULT;
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci	if (IOPRIO_PRIO_CLASS(prio) == IOPRIO_CLASS_NONE)
16262306a36Sopenharmony_ci		prio = IOPRIO_PRIO_VALUE(task_nice_ioclass(p),
16362306a36Sopenharmony_ci					 task_nice_ioprio(p));
16462306a36Sopenharmony_ci	return prio;
16562306a36Sopenharmony_ci}
16662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(__get_task_ioprio);
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_cistatic int get_task_ioprio(struct task_struct *p)
16962306a36Sopenharmony_ci{
17062306a36Sopenharmony_ci	int ret;
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_ci	ret = security_task_getioprio(p);
17362306a36Sopenharmony_ci	if (ret)
17462306a36Sopenharmony_ci		goto out;
17562306a36Sopenharmony_ci	task_lock(p);
17662306a36Sopenharmony_ci	ret = __get_task_ioprio(p);
17762306a36Sopenharmony_ci	task_unlock(p);
17862306a36Sopenharmony_ciout:
17962306a36Sopenharmony_ci	return ret;
18062306a36Sopenharmony_ci}
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_ci/*
18362306a36Sopenharmony_ci * Return raw IO priority value as set by userspace. We use this for
18462306a36Sopenharmony_ci * ioprio_get(pid, IOPRIO_WHO_PROCESS) so that we keep historical behavior and
18562306a36Sopenharmony_ci * also so that userspace can distinguish unset IO priority (which just gets
18662306a36Sopenharmony_ci * overriden based on task's nice value) from IO priority set to some value.
18762306a36Sopenharmony_ci */
18862306a36Sopenharmony_cistatic int get_task_raw_ioprio(struct task_struct *p)
18962306a36Sopenharmony_ci{
19062306a36Sopenharmony_ci	int ret;
19162306a36Sopenharmony_ci
19262306a36Sopenharmony_ci	ret = security_task_getioprio(p);
19362306a36Sopenharmony_ci	if (ret)
19462306a36Sopenharmony_ci		goto out;
19562306a36Sopenharmony_ci	task_lock(p);
19662306a36Sopenharmony_ci	if (p->io_context)
19762306a36Sopenharmony_ci		ret = p->io_context->ioprio;
19862306a36Sopenharmony_ci	else
19962306a36Sopenharmony_ci		ret = IOPRIO_DEFAULT;
20062306a36Sopenharmony_ci	task_unlock(p);
20162306a36Sopenharmony_ciout:
20262306a36Sopenharmony_ci	return ret;
20362306a36Sopenharmony_ci}
20462306a36Sopenharmony_ci
20562306a36Sopenharmony_cistatic int ioprio_best(unsigned short aprio, unsigned short bprio)
20662306a36Sopenharmony_ci{
20762306a36Sopenharmony_ci	return min(aprio, bprio);
20862306a36Sopenharmony_ci}
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ciSYSCALL_DEFINE2(ioprio_get, int, which, int, who)
21162306a36Sopenharmony_ci{
21262306a36Sopenharmony_ci	struct task_struct *g, *p;
21362306a36Sopenharmony_ci	struct user_struct *user;
21462306a36Sopenharmony_ci	struct pid *pgrp;
21562306a36Sopenharmony_ci	kuid_t uid;
21662306a36Sopenharmony_ci	int ret = -ESRCH;
21762306a36Sopenharmony_ci	int tmpio;
21862306a36Sopenharmony_ci
21962306a36Sopenharmony_ci	rcu_read_lock();
22062306a36Sopenharmony_ci	switch (which) {
22162306a36Sopenharmony_ci		case IOPRIO_WHO_PROCESS:
22262306a36Sopenharmony_ci			if (!who)
22362306a36Sopenharmony_ci				p = current;
22462306a36Sopenharmony_ci			else
22562306a36Sopenharmony_ci				p = find_task_by_vpid(who);
22662306a36Sopenharmony_ci			if (p)
22762306a36Sopenharmony_ci				ret = get_task_raw_ioprio(p);
22862306a36Sopenharmony_ci			break;
22962306a36Sopenharmony_ci		case IOPRIO_WHO_PGRP:
23062306a36Sopenharmony_ci			if (!who)
23162306a36Sopenharmony_ci				pgrp = task_pgrp(current);
23262306a36Sopenharmony_ci			else
23362306a36Sopenharmony_ci				pgrp = find_vpid(who);
23462306a36Sopenharmony_ci			read_lock(&tasklist_lock);
23562306a36Sopenharmony_ci			do_each_pid_thread(pgrp, PIDTYPE_PGID, p) {
23662306a36Sopenharmony_ci				tmpio = get_task_ioprio(p);
23762306a36Sopenharmony_ci				if (tmpio < 0)
23862306a36Sopenharmony_ci					continue;
23962306a36Sopenharmony_ci				if (ret == -ESRCH)
24062306a36Sopenharmony_ci					ret = tmpio;
24162306a36Sopenharmony_ci				else
24262306a36Sopenharmony_ci					ret = ioprio_best(ret, tmpio);
24362306a36Sopenharmony_ci			} while_each_pid_thread(pgrp, PIDTYPE_PGID, p);
24462306a36Sopenharmony_ci			read_unlock(&tasklist_lock);
24562306a36Sopenharmony_ci
24662306a36Sopenharmony_ci			break;
24762306a36Sopenharmony_ci		case IOPRIO_WHO_USER:
24862306a36Sopenharmony_ci			uid = make_kuid(current_user_ns(), who);
24962306a36Sopenharmony_ci			if (!who)
25062306a36Sopenharmony_ci				user = current_user();
25162306a36Sopenharmony_ci			else
25262306a36Sopenharmony_ci				user = find_user(uid);
25362306a36Sopenharmony_ci
25462306a36Sopenharmony_ci			if (!user)
25562306a36Sopenharmony_ci				break;
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci			for_each_process_thread(g, p) {
25862306a36Sopenharmony_ci				if (!uid_eq(task_uid(p), user->uid) ||
25962306a36Sopenharmony_ci				    !task_pid_vnr(p))
26062306a36Sopenharmony_ci					continue;
26162306a36Sopenharmony_ci				tmpio = get_task_ioprio(p);
26262306a36Sopenharmony_ci				if (tmpio < 0)
26362306a36Sopenharmony_ci					continue;
26462306a36Sopenharmony_ci				if (ret == -ESRCH)
26562306a36Sopenharmony_ci					ret = tmpio;
26662306a36Sopenharmony_ci				else
26762306a36Sopenharmony_ci					ret = ioprio_best(ret, tmpio);
26862306a36Sopenharmony_ci			}
26962306a36Sopenharmony_ci
27062306a36Sopenharmony_ci			if (who)
27162306a36Sopenharmony_ci				free_uid(user);
27262306a36Sopenharmony_ci			break;
27362306a36Sopenharmony_ci		default:
27462306a36Sopenharmony_ci			ret = -EINVAL;
27562306a36Sopenharmony_ci	}
27662306a36Sopenharmony_ci
27762306a36Sopenharmony_ci	rcu_read_unlock();
27862306a36Sopenharmony_ci	return ret;
27962306a36Sopenharmony_ci}
280