1 /* 2 * Copyright (c) 1996, 1997, 1998 3 * HD Associates, Inc. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by HD Associates, Inc 16 * 4. Neither the name of the author nor the names of any co-contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY HD ASSOCIATES AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL HD ASSOCIATES OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * $FreeBSD: src/sys/posix4/p1003_1b.c,v 1.5.2.2 2003/03/25 06:13:35 rwatson Exp $ 33 * $DragonFly: src/sys/kern/kern_p1003_1b.c,v 1.10 2007/06/26 19:31:08 dillon Exp $ 34 */ 35 36 /* p1003_1b: Real Time common code. 37 */ 38 39 #include <sys/param.h> 40 #include <sys/systm.h> 41 #include <sys/kernel.h> 42 #include <sys/sysent.h> 43 #include <sys/posix4.h> 44 #include <sys/proc.h> 45 #include <sys/syslog.h> 46 #include <sys/module.h> 47 #include <sys/sysproto.h> 48 #include <sys/sysctl.h> 49 #include <sys/unistd.h> 50 51 #include <sys/mplock2.h> 52 53 MALLOC_DEFINE(M_P31B, "p1003.1b", "Posix 1003.1B"); 54 55 /* p31b_proc: Return a proc struct corresponding to a pid to operate on. 56 * 57 * Enforce permission policy. 58 * 59 * The policy is the same as for sending signals except there 60 * is no notion of process groups. 61 * 62 * pid == 0 means my process. 63 * 64 * This is disabled until I've got a permission gate in again: 65 * only root can do this. 66 */ 67 68 #if 0 69 /* 70 * This is stolen from CANSIGNAL in kern_sig: 71 * 72 * Can process p, with pcred pc, do "write flavor" operations to process q? 73 */ 74 #define CAN_AFFECT(p, cr, q) \ 75 ((cr)->cr_uid == 0 || \ 76 (cr)->cr_ruid == (q)->p_ucred->cr_ruid || \ 77 (cr)->cr_uid == (q)->p_ucred->cr_ruid || \ 78 (cr)->cr_ruid == (q)->p_ucred->cr_uid || \ 79 (cr)->cr_uid == (q)->p_ucred->cr_uid) 80 #else 81 #define CAN_AFFECT(p, cr, q) ((cr)->cr_uid == 0) 82 #endif 83 84 /* 85 * p31b_proc: Look up a proc from a PID. If proc is 0 it is 86 * my own proc. 87 */ 88 int p31b_proc(struct proc *p, pid_t pid, struct proc **pp) 89 { 90 int ret = 0; 91 struct proc *other_proc = 0; 92 93 if (pid == 0) { 94 other_proc = p; 95 if (other_proc) 96 PHOLD(other_proc); 97 } else { 98 other_proc = pfind(pid); 99 /* ref from pfind() */ 100 } 101 102 if (other_proc) { 103 /* Enforce permission policy. 104 */ 105 if (CAN_AFFECT(p, p->p_ucred, other_proc)) 106 *pp = other_proc; 107 else 108 ret = EPERM; 109 PRELE(other_proc); 110 } else { 111 ret = ESRCH; 112 } 113 114 return ret; 115 } 116 117 118 #if !defined(_KPOSIX_PRIORITY_SCHEDULING) 119 120 int syscall_not_present(const char *s); 121 122 /* The system calls return ENOSYS if an entry is called that is 123 * not run-time supported. I am also logging since some programs 124 * start to use this when they shouldn't. That will be removed if annoying. 125 */ 126 int syscall_not_present(const char *s) 127 { 128 struct proc *p = curproc; 129 log(LOG_ERR, "cmd %s pid %d tried to use non-present %s\n", 130 p->p_comm, p->p_pid, s); 131 132 /* a " return nosys(p, uap); " here causes a core dump. 133 */ 134 135 return ENOSYS; 136 } 137 138 /* Not configured but loadable via a module: 139 */ 140 141 static int sched_attach(void) 142 { 143 return 0; 144 } 145 146 #define SYSCALL_NOT_PRESENT_GEN(SC) \ 147 int sys_##SC (struct SC##_args *uap) \ 148 { \ 149 return syscall_not_present(#SC); \ 150 } 151 152 SYSCALL_NOT_PRESENT_GEN(sched_setparam) 153 SYSCALL_NOT_PRESENT_GEN(sched_getparam) 154 SYSCALL_NOT_PRESENT_GEN(sched_setscheduler) 155 SYSCALL_NOT_PRESENT_GEN(sched_getscheduler) 156 SYSCALL_NOT_PRESENT_GEN(sched_yield) 157 SYSCALL_NOT_PRESENT_GEN(sched_get_priority_max) 158 SYSCALL_NOT_PRESENT_GEN(sched_get_priority_min) 159 SYSCALL_NOT_PRESENT_GEN(sched_rr_get_interval) 160 161 #else 162 163 /* Configured in kernel version: 164 */ 165 static struct ksched *ksched; 166 167 static int sched_attach(void) 168 { 169 int ret = ksched_attach(&ksched); 170 171 if (ret == 0) 172 p31b_setcfg(CTL_P1003_1B_PRIORITY_SCHEDULING, 1); 173 174 return ret; 175 } 176 177 /* 178 * MPALMOSTSAFE 179 */ 180 int 181 sys_sched_setparam(struct sched_setparam_args *uap) 182 { 183 struct proc *p = curproc; 184 struct lwp *lp; 185 int e; 186 struct sched_param sched_param; 187 188 copyin(uap->param, &sched_param, sizeof(sched_param)); 189 190 get_mplock(); 191 if ((e = p31b_proc(p, uap->pid, &p)) == 0) { 192 lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */ 193 e = ksched_setparam(&uap->sysmsg_reg, ksched, lp, 194 (const struct sched_param *)&sched_param); 195 } 196 rel_mplock(); 197 return e; 198 } 199 200 /* 201 * MPALMOSTSAFE 202 */ 203 int 204 sys_sched_getparam(struct sched_getparam_args *uap) 205 { 206 struct proc *p = curproc; 207 struct proc *targetp; 208 struct lwp *lp; 209 struct sched_param sched_param; 210 int e; 211 212 get_mplock(); 213 if (uap->pid != 0 && uap->pid != p->p_pid) { 214 e = p31b_proc(p, uap->pid, &targetp); 215 if (e) 216 goto done; 217 } else { 218 targetp = p; 219 } 220 221 lp = FIRST_LWP_IN_PROC(targetp); /* XXX lwp */ 222 e = ksched_getparam(&uap->sysmsg_reg, ksched, lp, &sched_param); 223 done: 224 rel_mplock(); 225 if (e == 0) 226 copyout(&sched_param, uap->param, sizeof(sched_param)); 227 return e; 228 } 229 230 /* 231 * MPALMOSTSAFE 232 */ 233 int 234 sys_sched_setscheduler(struct sched_setscheduler_args *uap) 235 { 236 struct proc *p = curproc; 237 struct lwp *lp; 238 int e; 239 struct sched_param sched_param; 240 241 copyin(uap->param, &sched_param, sizeof(sched_param)); 242 243 get_mplock(); 244 if ((e = p31b_proc(p, uap->pid, &p)) == 0) { 245 lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */ 246 e = ksched_setscheduler(&uap->sysmsg_reg, ksched, lp, 247 uap->policy, 248 (const struct sched_param *)&sched_param); 249 } 250 rel_mplock(); 251 return e; 252 } 253 254 /* 255 * MPALMOSTSAFE 256 */ 257 int 258 sys_sched_getscheduler(struct sched_getscheduler_args *uap) 259 { 260 struct proc *p = curproc; 261 struct proc *targetp; 262 struct lwp *lp; 263 int e; 264 265 get_mplock(); 266 if (uap->pid != 0 && uap->pid != p->p_pid) { 267 e = p31b_proc(p, uap->pid, &targetp); 268 if (e) 269 goto done; 270 } else { 271 targetp = p; 272 } 273 274 lp = FIRST_LWP_IN_PROC(targetp); /* XXX lwp */ 275 e = ksched_getscheduler(&uap->sysmsg_reg, ksched, lp); 276 done: 277 rel_mplock(); 278 return e; 279 } 280 281 /* 282 * MPSAFE 283 */ 284 int 285 sys_sched_yield(struct sched_yield_args *uap) 286 { 287 return ksched_yield(&uap->sysmsg_reg, ksched); 288 } 289 290 /* 291 * MPSAFE 292 */ 293 int 294 sys_sched_get_priority_max(struct sched_get_priority_max_args *uap) 295 { 296 return ksched_get_priority_max(&uap->sysmsg_reg, ksched, uap->policy); 297 } 298 299 /* 300 * MPSAFE 301 */ 302 int 303 sys_sched_get_priority_min(struct sched_get_priority_min_args *uap) 304 { 305 return ksched_get_priority_min(&uap->sysmsg_reg, ksched, uap->policy); 306 } 307 308 /* 309 * MPALMOSTSAFE 310 */ 311 int 312 sys_sched_rr_get_interval(struct sched_rr_get_interval_args *uap) 313 { 314 int e; 315 struct proc *p = curproc; 316 struct lwp *lp = curthread->td_lwp; 317 struct timespec ts; 318 319 get_mplock(); 320 if ((e = p31b_proc(p, uap->pid, &p)) == 0) { 321 e = ksched_rr_get_interval(&uap->sysmsg_reg, ksched, lp, &ts); 322 if (e == 0) 323 e = copyout(&ts, uap->interval, sizeof(ts)); 324 } 325 rel_mplock(); 326 return e; 327 } 328 329 #endif 330 331 static void 332 p31binit(void *notused) 333 { 334 (void) sched_attach(); 335 p31b_setcfg(CTL_P1003_1B_PAGESIZE, PAGE_SIZE); 336 p31b_setcfg(CTL_P1003_1B_ASYNCHRONOUS_IO, -1); 337 p31b_setcfg(CTL_P1003_1B_MESSAGE_PASSING, _POSIX_MESSAGE_PASSING); 338 } 339 340 SYSINIT(p31b, SI_SUB_P1003_1B, SI_ORDER_FIRST, p31binit, NULL); 341