Blame view
fs/ioprio.c
5.17 KB
22e2c507c [PATCH] Update cf... |
1 2 3 |
/* * fs/ioprio.c * |
0fe234795 [PATCH] Update ax... |
4 |
* Copyright (C) 2004 Jens Axboe <axboe@kernel.dk> |
22e2c507c [PATCH] Update cf... |
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 |
* * Helper functions for setting/querying io priorities of processes. The * system calls closely mimmick getpriority/setpriority, see the man page for * those. The prio argument is a composite of prio class and prio data, where * the data argument has meaning within that class. The standard scheduling * classes have 8 distinct prio levels, with 0 being the highest prio and 7 * being the lowest. * * IOW, setting BE scheduling class with prio 2 is done ala: * * unsigned int prio = (IOPRIO_CLASS_BE << IOPRIO_CLASS_SHIFT) | 2; * * ioprio_set(PRIO_PROCESS, pid, prio); * * See also Documentation/block/ioprio.txt * */ #include <linux/kernel.h> #include <linux/ioprio.h> #include <linux/blkdev.h> |
16f7e0fe2 [PATCH] capable/c... |
25 |
#include <linux/capability.h> |
9abdc4cd8 fs/ioprio.c shoul... |
26 |
#include <linux/syscalls.h> |
03e680606 [PATCH] lsm: add ... |
27 |
#include <linux/security.h> |
b488893a3 pid namespaces: c... |
28 |
#include <linux/pid_namespace.h> |
22e2c507c [PATCH] Update cf... |
29 |
|
b3881f74b ext4: Add mount o... |
30 |
int set_task_ioprio(struct task_struct *task, int ioprio) |
22e2c507c [PATCH] Update cf... |
31 |
{ |
03e680606 [PATCH] lsm: add ... |
32 |
int err; |
22e2c507c [PATCH] Update cf... |
33 |
struct io_context *ioc; |
c69e8d9c0 CRED: Use RCU to ... |
34 |
const struct cred *cred = current_cred(), *tcred; |
22e2c507c [PATCH] Update cf... |
35 |
|
c69e8d9c0 CRED: Use RCU to ... |
36 37 38 39 40 |
rcu_read_lock(); tcred = __task_cred(task); if (tcred->uid != cred->euid && tcred->uid != cred->uid && !capable(CAP_SYS_NICE)) { rcu_read_unlock(); |
22e2c507c [PATCH] Update cf... |
41 |
return -EPERM; |
c69e8d9c0 CRED: Use RCU to ... |
42 43 |
} rcu_read_unlock(); |
22e2c507c [PATCH] Update cf... |
44 |
|
03e680606 [PATCH] lsm: add ... |
45 46 47 |
err = security_task_setioprio(task, ioprio); if (err) return err; |
22e2c507c [PATCH] Update cf... |
48 |
task_lock(task); |
fd0928df9 ioprio: move io p... |
49 50 51 52 53 54 |
do { ioc = task->io_context; /* see wmb() in current_io_context() */ smp_read_barrier_depends(); if (ioc) break; |
22e2c507c [PATCH] Update cf... |
55 |
|
fd0928df9 ioprio: move io p... |
56 57 58 59 60 61 |
ioc = alloc_io_context(GFP_ATOMIC, -1); if (!ioc) { err = -ENOMEM; break; } task->io_context = ioc; |
fd0928df9 ioprio: move io p... |
62 |
} while (1); |
9f83e45eb [PATCH] Fix curre... |
63 |
|
fd0928df9 ioprio: move io p... |
64 65 |
if (!err) { ioc->ioprio = ioprio; |
fc46379da [PATCH] cfq-iosch... |
66 |
ioc->ioprio_changed = 1; |
fd0928df9 ioprio: move io p... |
67 |
} |
22e2c507c [PATCH] Update cf... |
68 69 |
task_unlock(task); |
fd0928df9 ioprio: move io p... |
70 |
return err; |
22e2c507c [PATCH] Update cf... |
71 |
} |
b3881f74b ext4: Add mount o... |
72 |
EXPORT_SYMBOL_GPL(set_task_ioprio); |
22e2c507c [PATCH] Update cf... |
73 |
|
938bb9f5e [CVE-2009-0029] S... |
74 |
SYSCALL_DEFINE3(ioprio_set, int, which, int, who, int, ioprio) |
22e2c507c [PATCH] Update cf... |
75 76 77 78 79 |
{ int class = IOPRIO_PRIO_CLASS(ioprio); int data = IOPRIO_PRIO_DATA(ioprio); struct task_struct *p, *g; struct user_struct *user; |
41487c65b [PATCH] pid: repl... |
80 |
struct pid *pgrp; |
22e2c507c [PATCH] Update cf... |
81 82 83 84 85 86 87 88 89 90 91 92 93 94 |
int ret; switch (class) { case IOPRIO_CLASS_RT: if (!capable(CAP_SYS_ADMIN)) return -EPERM; /* fall through, rt has prio field too */ case IOPRIO_CLASS_BE: if (data >= IOPRIO_BE_NR || data < 0) return -EINVAL; break; case IOPRIO_CLASS_IDLE: break; |
8ec680e4c ioprio: allow sys... |
95 96 97 98 |
case IOPRIO_CLASS_NONE: if (data) return -EINVAL; break; |
22e2c507c [PATCH] Update cf... |
99 100 101 102 103 |
default: return -EINVAL; } ret = -ESRCH; |
cf342e52e [PATCH] Don't nee... |
104 105 106 107 108 109 |
/* * We want IOPRIO_WHO_PGRP/IOPRIO_WHO_USER to be "atomic", * so we can't use rcu_read_lock(). See re-copy of ->ioprio * in copy_process(). */ read_lock(&tasklist_lock); |
22e2c507c [PATCH] Update cf... |
110 111 112 113 114 |
switch (which) { case IOPRIO_WHO_PROCESS: if (!who) p = current; else |
228ebcbe6 Uninline find_tas... |
115 |
p = find_task_by_vpid(who); |
22e2c507c [PATCH] Update cf... |
116 117 118 119 120 |
if (p) ret = set_task_ioprio(p, ioprio); break; case IOPRIO_WHO_PGRP: if (!who) |
41487c65b [PATCH] pid: repl... |
121 122 |
pgrp = task_pgrp(current); else |
b488893a3 pid namespaces: c... |
123 |
pgrp = find_vpid(who); |
2d70b68d4 fix setpriority(P... |
124 |
do_each_pid_thread(pgrp, PIDTYPE_PGID, p) { |
22e2c507c [PATCH] Update cf... |
125 126 127 |
ret = set_task_ioprio(p, ioprio); if (ret) break; |
2d70b68d4 fix setpriority(P... |
128 |
} while_each_pid_thread(pgrp, PIDTYPE_PGID, p); |
22e2c507c [PATCH] Update cf... |
129 130 131 |
break; case IOPRIO_WHO_USER: if (!who) |
86a264abe CRED: Wrap curren... |
132 |
user = current_user(); |
22e2c507c [PATCH] Update cf... |
133 134 135 136 137 138 139 |
else user = find_user(who); if (!user) break; do_each_thread(g, p) { |
c69e8d9c0 CRED: Use RCU to ... |
140 |
if (__task_cred(p)->uid != who) |
22e2c507c [PATCH] Update cf... |
141 142 143 |
continue; ret = set_task_ioprio(p, ioprio); if (ret) |
78bd4d484 [PATCH] sys_iopri... |
144 |
goto free_uid; |
22e2c507c [PATCH] Update cf... |
145 |
} while_each_thread(g, p); |
78bd4d484 [PATCH] sys_iopri... |
146 |
free_uid: |
22e2c507c [PATCH] Update cf... |
147 148 149 150 151 152 |
if (who) free_uid(user); break; default: ret = -EINVAL; } |
cf342e52e [PATCH] Don't nee... |
153 |
read_unlock(&tasklist_lock); |
22e2c507c [PATCH] Update cf... |
154 155 |
return ret; } |
a1836a42d [PATCH] SELinux: ... |
156 157 158 159 160 161 162 |
static int get_task_ioprio(struct task_struct *p) { int ret; ret = security_task_getioprio(p); if (ret) goto out; |
fd0928df9 ioprio: move io p... |
163 164 165 |
ret = IOPRIO_PRIO_VALUE(IOPRIO_CLASS_NONE, IOPRIO_NORM); if (p->io_context) ret = p->io_context->ioprio; |
a1836a42d [PATCH] SELinux: ... |
166 167 168 |
out: return ret; } |
e014ff8d4 [PATCH] uninline ... |
169 170 171 172 |
int ioprio_best(unsigned short aprio, unsigned short bprio) { unsigned short aclass = IOPRIO_PRIO_CLASS(aprio); unsigned short bclass = IOPRIO_PRIO_CLASS(bprio); |
e014ff8d4 [PATCH] uninline ... |
173 174 175 176 177 178 179 180 181 182 183 184 |
if (aclass == IOPRIO_CLASS_NONE) aclass = IOPRIO_CLASS_BE; if (bclass == IOPRIO_CLASS_NONE) bclass = IOPRIO_CLASS_BE; if (aclass == bclass) return min(aprio, bprio); if (aclass > bclass) return bprio; else return aprio; } |
938bb9f5e [CVE-2009-0029] S... |
185 |
SYSCALL_DEFINE2(ioprio_get, int, which, int, who) |
22e2c507c [PATCH] Update cf... |
186 187 188 |
{ struct task_struct *g, *p; struct user_struct *user; |
41487c65b [PATCH] pid: repl... |
189 |
struct pid *pgrp; |
22e2c507c [PATCH] Update cf... |
190 |
int ret = -ESRCH; |
a1836a42d [PATCH] SELinux: ... |
191 |
int tmpio; |
22e2c507c [PATCH] Update cf... |
192 |
|
cf342e52e [PATCH] Don't nee... |
193 |
read_lock(&tasklist_lock); |
22e2c507c [PATCH] Update cf... |
194 195 196 197 198 |
switch (which) { case IOPRIO_WHO_PROCESS: if (!who) p = current; else |
228ebcbe6 Uninline find_tas... |
199 |
p = find_task_by_vpid(who); |
22e2c507c [PATCH] Update cf... |
200 |
if (p) |
a1836a42d [PATCH] SELinux: ... |
201 |
ret = get_task_ioprio(p); |
22e2c507c [PATCH] Update cf... |
202 203 204 |
break; case IOPRIO_WHO_PGRP: if (!who) |
41487c65b [PATCH] pid: repl... |
205 206 |
pgrp = task_pgrp(current); else |
b488893a3 pid namespaces: c... |
207 |
pgrp = find_vpid(who); |
2d70b68d4 fix setpriority(P... |
208 |
do_each_pid_thread(pgrp, PIDTYPE_PGID, p) { |
a1836a42d [PATCH] SELinux: ... |
209 210 211 |
tmpio = get_task_ioprio(p); if (tmpio < 0) continue; |
22e2c507c [PATCH] Update cf... |
212 |
if (ret == -ESRCH) |
a1836a42d [PATCH] SELinux: ... |
213 |
ret = tmpio; |
22e2c507c [PATCH] Update cf... |
214 |
else |
a1836a42d [PATCH] SELinux: ... |
215 |
ret = ioprio_best(ret, tmpio); |
2d70b68d4 fix setpriority(P... |
216 |
} while_each_pid_thread(pgrp, PIDTYPE_PGID, p); |
22e2c507c [PATCH] Update cf... |
217 218 219 |
break; case IOPRIO_WHO_USER: if (!who) |
86a264abe CRED: Wrap curren... |
220 |
user = current_user(); |
22e2c507c [PATCH] Update cf... |
221 222 223 224 225 226 227 |
else user = find_user(who); if (!user) break; do_each_thread(g, p) { |
c69e8d9c0 CRED: Use RCU to ... |
228 |
if (__task_cred(p)->uid != user->uid) |
22e2c507c [PATCH] Update cf... |
229 |
continue; |
a1836a42d [PATCH] SELinux: ... |
230 231 232 |
tmpio = get_task_ioprio(p); if (tmpio < 0) continue; |
22e2c507c [PATCH] Update cf... |
233 |
if (ret == -ESRCH) |
a1836a42d [PATCH] SELinux: ... |
234 |
ret = tmpio; |
22e2c507c [PATCH] Update cf... |
235 |
else |
a1836a42d [PATCH] SELinux: ... |
236 |
ret = ioprio_best(ret, tmpio); |
22e2c507c [PATCH] Update cf... |
237 238 239 240 241 242 243 244 |
} while_each_thread(g, p); if (who) free_uid(user); break; default: ret = -EINVAL; } |
cf342e52e [PATCH] Don't nee... |
245 |
read_unlock(&tasklist_lock); |
22e2c507c [PATCH] Update cf... |
246 247 |
return ret; } |