xref: /dragonfly/sys/kern/kern_p1003_1b.c (revision 92fc8b5c)
1 /*
2  * Copyright (c) 1996, 1997, 1998
3  *	HD Associates, Inc.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by HD Associates, Inc
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY HD ASSOCIATES AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL HD ASSOCIATES OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  *
32  * $FreeBSD: src/sys/posix4/p1003_1b.c,v 1.5.2.2 2003/03/25 06:13:35 rwatson Exp $
33  * $DragonFly: src/sys/kern/kern_p1003_1b.c,v 1.10 2007/06/26 19:31:08 dillon Exp $
34  */
35 
36 /* p1003_1b: Real Time common code.
37  */
38 
39 #include <sys/param.h>
40 #include <sys/systm.h>
41 #include <sys/kernel.h>
42 #include <sys/sysent.h>
43 #include <sys/posix4.h>
44 #include <sys/proc.h>
45 #include <sys/syslog.h>
46 #include <sys/module.h>
47 #include <sys/sysproto.h>
48 #include <sys/sysctl.h>
49 #include <sys/unistd.h>
50 
51 #include <sys/mplock2.h>
52 
53 MALLOC_DEFINE(M_P31B, "p1003.1b", "Posix 1003.1B");
54 
55 /* p31b_proc: Return a proc struct corresponding to a pid to operate on.
56  *
57  * Enforce permission policy.
58  *
59  * The policy is the same as for sending signals except there
60  * is no notion of process groups.
61  *
62  * pid == 0 means my process.
63  *
64  * This is disabled until I've got a permission gate in again:
65  * only root can do this.
66  */
67 
68 #if 0
69 /*
70  * This is stolen from CANSIGNAL in kern_sig:
71  *
72  * Can process p, with pcred pc, do "write flavor" operations to process q?
73  */
74 #define CAN_AFFECT(p, cr, q) \
75 	((cr)->cr_uid == 0 || \
76 	    (cr)->cr_ruid == (q)->p_ucred->cr_ruid || \
77 	    (cr)->cr_uid == (q)->p_ucred->cr_ruid || \
78 	    (cr)->cr_ruid == (q)->p_ucred->cr_uid || \
79 	    (cr)->cr_uid == (q)->p_ucred->cr_uid)
80 #else
81 #define CAN_AFFECT(p, cr, q) ((cr)->cr_uid == 0)
82 #endif
83 
84 /*
85  * p31b_proc: Look up a proc from a PID.  If proc is 0 it is
86  * my own proc.
87  */
88 int p31b_proc(struct proc *p, pid_t pid, struct proc **pp)
89 {
90 	int ret = 0;
91 	struct proc *other_proc = 0;
92 
93 	if (pid == 0) {
94 		other_proc = p;
95 		if (other_proc)
96 			PHOLD(other_proc);
97 	} else {
98 		other_proc = pfind(pid);
99 		/* ref from pfind() */
100 	}
101 
102 	if (other_proc) {
103 		/* Enforce permission policy.
104 		 */
105 		if (CAN_AFFECT(p, p->p_ucred, other_proc))
106 			*pp = other_proc;
107 		else
108 			ret = EPERM;
109 		PRELE(other_proc);
110 	} else {
111 		ret = ESRCH;
112 	}
113 
114 	return ret;
115 }
116 
117 
118 #if !defined(_KPOSIX_PRIORITY_SCHEDULING)
119 
120 int syscall_not_present(const char *s);
121 
122 /* The system calls return ENOSYS if an entry is called that is
123  * not run-time supported.  I am also logging since some programs
124  * start to use this when they shouldn't.  That will be removed if annoying.
125  */
126 int syscall_not_present(const char *s)
127 {
128 	struct proc *p = curproc;
129 	log(LOG_ERR, "cmd %s pid %d tried to use non-present %s\n",
130 			p->p_comm, p->p_pid, s);
131 
132 	/* a " return nosys(p, uap); " here causes a core dump.
133 	 */
134 
135 	return ENOSYS;
136 }
137 
138 /* Not configured but loadable via a module:
139  */
140 
141 static int sched_attach(void)
142 {
143 	return 0;
144 }
145 
146 #define SYSCALL_NOT_PRESENT_GEN(SC) \
147 int sys_##SC (struct SC##_args *uap) \
148 { \
149 	return syscall_not_present(#SC); \
150 }
151 
152 SYSCALL_NOT_PRESENT_GEN(sched_setparam)
153 SYSCALL_NOT_PRESENT_GEN(sched_getparam)
154 SYSCALL_NOT_PRESENT_GEN(sched_setscheduler)
155 SYSCALL_NOT_PRESENT_GEN(sched_getscheduler)
156 SYSCALL_NOT_PRESENT_GEN(sched_yield)
157 SYSCALL_NOT_PRESENT_GEN(sched_get_priority_max)
158 SYSCALL_NOT_PRESENT_GEN(sched_get_priority_min)
159 SYSCALL_NOT_PRESENT_GEN(sched_rr_get_interval)
160 
161 #else
162 
163 /* Configured in kernel version:
164  */
165 static struct ksched *ksched;
166 
167 static int sched_attach(void)
168 {
169 	int ret = ksched_attach(&ksched);
170 
171 	if (ret == 0)
172 		p31b_setcfg(CTL_P1003_1B_PRIORITY_SCHEDULING, 1);
173 
174 	return ret;
175 }
176 
177 /*
178  * MPALMOSTSAFE
179  */
180 int
181 sys_sched_setparam(struct sched_setparam_args *uap)
182 {
183 	struct proc *p = curproc;
184 	struct lwp *lp;
185 	int e;
186 	struct sched_param sched_param;
187 
188 	copyin(uap->param, &sched_param, sizeof(sched_param));
189 
190 	get_mplock();
191 	if ((e = p31b_proc(p, uap->pid, &p)) == 0) {
192 		lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */
193 		e = ksched_setparam(&uap->sysmsg_reg, ksched, lp,
194 				    (const struct sched_param *)&sched_param);
195 	}
196 	rel_mplock();
197 	return e;
198 }
199 
200 /*
201  * MPALMOSTSAFE
202  */
203 int
204 sys_sched_getparam(struct sched_getparam_args *uap)
205 {
206 	struct proc *p = curproc;
207 	struct proc *targetp;
208 	struct lwp *lp;
209 	struct sched_param sched_param;
210 	int e;
211 
212 	get_mplock();
213 	if (uap->pid != 0 && uap->pid != p->p_pid) {
214 		e = p31b_proc(p, uap->pid, &targetp);
215 		if (e)
216 			goto done;
217 	} else {
218 		targetp = p;
219 	}
220 
221 	lp = FIRST_LWP_IN_PROC(targetp); /* XXX lwp */
222 	e = ksched_getparam(&uap->sysmsg_reg, ksched, lp, &sched_param);
223 done:
224 	rel_mplock();
225 	if (e == 0)
226 		copyout(&sched_param, uap->param, sizeof(sched_param));
227 	return e;
228 }
229 
230 /*
231  * MPALMOSTSAFE
232  */
233 int
234 sys_sched_setscheduler(struct sched_setscheduler_args *uap)
235 {
236 	struct proc *p = curproc;
237 	struct lwp *lp;
238 	int e;
239 	struct sched_param sched_param;
240 
241 	copyin(uap->param, &sched_param, sizeof(sched_param));
242 
243 	get_mplock();
244 	if ((e = p31b_proc(p, uap->pid, &p)) == 0) {
245 		lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */
246 		e = ksched_setscheduler(&uap->sysmsg_reg, ksched, lp,
247 					uap->policy,
248 				    (const struct sched_param *)&sched_param);
249 	}
250 	rel_mplock();
251 	return e;
252 }
253 
254 /*
255  * MPALMOSTSAFE
256  */
257 int
258 sys_sched_getscheduler(struct sched_getscheduler_args *uap)
259 {
260 	struct proc *p = curproc;
261 	struct proc *targetp;
262 	struct lwp *lp;
263 	int e;
264 
265 	get_mplock();
266 	if (uap->pid != 0 && uap->pid != p->p_pid) {
267 		e = p31b_proc(p, uap->pid, &targetp);
268 		if (e)
269 			goto done;
270 	} else {
271 		targetp = p;
272 	}
273 
274 	lp = FIRST_LWP_IN_PROC(targetp); /* XXX lwp */
275 	e = ksched_getscheduler(&uap->sysmsg_reg, ksched, lp);
276 done:
277 	rel_mplock();
278 	return e;
279 }
280 
281 /*
282  * MPSAFE
283  */
284 int
285 sys_sched_yield(struct sched_yield_args *uap)
286 {
287 	return ksched_yield(&uap->sysmsg_reg, ksched);
288 }
289 
290 /*
291  * MPSAFE
292  */
293 int
294 sys_sched_get_priority_max(struct sched_get_priority_max_args *uap)
295 {
296 	return ksched_get_priority_max(&uap->sysmsg_reg, ksched, uap->policy);
297 }
298 
299 /*
300  * MPSAFE
301  */
302 int
303 sys_sched_get_priority_min(struct sched_get_priority_min_args *uap)
304 {
305 	return ksched_get_priority_min(&uap->sysmsg_reg, ksched, uap->policy);
306 }
307 
308 /*
309  * MPALMOSTSAFE
310  */
311 int
312 sys_sched_rr_get_interval(struct sched_rr_get_interval_args *uap)
313 {
314 	int e;
315 	struct proc *p = curproc;
316 	struct lwp *lp = curthread->td_lwp;
317 	struct timespec ts;
318 
319 	get_mplock();
320 	if ((e = p31b_proc(p, uap->pid, &p)) == 0) {
321 		e = ksched_rr_get_interval(&uap->sysmsg_reg, ksched, lp, &ts);
322 		if (e == 0)
323 			e = copyout(&ts, uap->interval, sizeof(ts));
324 	}
325 	rel_mplock();
326 	return e;
327 }
328 
329 #endif
330 
331 static void
332 p31binit(void *notused)
333 {
334 	(void) sched_attach();
335 	p31b_setcfg(CTL_P1003_1B_PAGESIZE, PAGE_SIZE);
336 	p31b_setcfg(CTL_P1003_1B_ASYNCHRONOUS_IO, -1);
337 	p31b_setcfg(CTL_P1003_1B_MESSAGE_PASSING, _POSIX_MESSAGE_PASSING);
338 }
339 
340 SYSINIT(p31b, SI_SUB_P1003_1B, SI_ORDER_FIRST, p31binit, NULL);
341