p1003_1b.c revision 77183
1/*
2 * Copyright (c) 1996, 1997, 1998
3 *	HD Associates, Inc.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 *    must display the following acknowledgement:
15 *	This product includes software developed by HD Associates, Inc
16 * 4. Neither the name of the author nor the names of any co-contributors
17 *    may be used to endorse or promote products derived from this software
18 *    without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY HD ASSOCIATES AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED.  IN NO EVENT SHALL HD ASSOCIATES OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 *
32 * $FreeBSD: head/sys/kern/p1003_1b.c 77183 2001-05-25 16:59:11Z rwatson $
33 */
34
35/* p1003_1b: Real Time common code.
36 */
37
38#include <sys/param.h>
39#include <sys/systm.h>
40#include <sys/kernel.h>
41#include <sys/lock.h>
42#include <sys/module.h>
43#include <sys/mutex.h>
44#include <sys/proc.h>
45#include <sys/sysctl.h>
46#include <sys/sysent.h>
47#include <sys/syslog.h>
48#include <sys/sysproto.h>
49
50#include <posix4/posix4.h>
51
52MALLOC_DEFINE(M_P31B, "p1003.1b", "Posix 1003.1B");
53
54/* p31b_proc: Return a proc struct corresponding to a pid to operate on.
55 *
56 * Enforce permission policy.
57 *
58 * The policy is the same as for sending signals except there
59 * is no notion of process groups.
60 *
61 * pid == 0 means my process.
62 *
63 * This is disabled until I've got a permission gate in again:
64 * only root can do this.
65 */
66
67#if 0
68/*
69 * This is stolen from CANSIGNAL in kern_sig:
70 *
71 * Can process with credential cr1 do "write flavor" operations to credential
72 * cr2.  This check needs to use generalized checks.
73 */
74#define CAN_AFFECT(cr1, cr2) \
75	(!suser_xxx(cr1, NULL, PRISON_ROOT) || \
76	    (c1)->cr_ruid == (cr2)->cr_ruid || \
77	    (c1)->cr_uid == (cr2)->cr_ruid || \
78	    (c1)->cr_ruid == (cr2)->cr_uid || \
79	    (c1)->cr_uid == (cr2)->cr_uid)
80#else
81#define CAN_AFFECT(cr1, cr2) (!suser_xxx(cr1, NULL, PRISON_ROOT))
82#endif
83
84/*
85 * p31b_proc: Look up a proc from a PID.  If proc is 0 it is
86 * my own proc.
87 */
88int p31b_proc(struct proc *p, pid_t pid, struct proc **pp)
89{
90	int ret = 0;
91	struct proc *other_proc = 0;
92
93	if (pid == 0) {
94		other_proc = p;
95		PROC_LOCK(p);
96	} else
97		other_proc = pfind(pid);
98
99	if (other_proc)
100	{
101		/* Enforce permission policy.
102		 */
103		if (CAN_AFFECT(p->p_ucred, other_proc->p_ucred))
104			*pp = other_proc;
105		else
106			ret = EPERM;
107		PROC_UNLOCK(other_proc);
108	}
109	else
110		ret = ESRCH;
111
112	return ret;
113}
114
115/* The system calls return ENOSYS if an entry is called that is
116 * not run-time supported.  I am also logging since some programs
117 * start to use this when they shouldn't.  That will be removed if annoying.
118 */
119int
120syscall_not_present(struct proc *p, const char *s, struct nosys_args *uap)
121{
122	log(LOG_ERR, "cmd %s pid %d tried to use non-present %s\n",
123			p->p_comm, p->p_pid, s);
124
125	/* a " return nosys(p, uap); " here causes a core dump.
126	 */
127
128	return ENOSYS;
129}
130
131#if !defined(_KPOSIX_PRIORITY_SCHEDULING)
132
133/* Not configured but loadable via a module:
134 */
135
136static int sched_attach(void)
137{
138	return 0;
139}
140
141SYSCALL_NOT_PRESENT_GEN(sched_setparam)
142SYSCALL_NOT_PRESENT_GEN(sched_getparam)
143SYSCALL_NOT_PRESENT_GEN(sched_setscheduler)
144SYSCALL_NOT_PRESENT_GEN(sched_getscheduler)
145SYSCALL_NOT_PRESENT_GEN(sched_yield)
146SYSCALL_NOT_PRESENT_GEN(sched_get_priority_max)
147SYSCALL_NOT_PRESENT_GEN(sched_get_priority_min)
148SYSCALL_NOT_PRESENT_GEN(sched_rr_get_interval)
149
150#else
151
152/* Configured in kernel version:
153 */
154static struct ksched *ksched;
155
156static int sched_attach(void)
157{
158	int ret = ksched_attach(&ksched);
159
160	if (ret == 0)
161		p31b_setcfg(CTL_P1003_1B_PRIORITY_SCHEDULING, 1);
162
163	return ret;
164}
165
166int sched_setparam(struct proc *p,
167	struct sched_setparam_args *uap)
168{
169	int e;
170
171	struct sched_param sched_param;
172	copyin(uap->param, &sched_param, sizeof(sched_param));
173
174	(void) (0
175	|| (e = p31b_proc(p, uap->pid, &p))
176	|| (e = ksched_setparam(&p->p_retval[0], ksched, p,
177		(const struct sched_param *)&sched_param))
178	);
179
180	return e;
181}
182
183int sched_getparam(struct proc *p,
184	struct sched_getparam_args *uap)
185{
186	int e;
187	struct sched_param sched_param;
188
189	(void) (0
190	|| (e = p31b_proc(p, uap->pid, &p))
191	|| (e = ksched_getparam(&p->p_retval[0], ksched, p, &sched_param))
192	);
193
194	if (!e)
195		copyout(&sched_param, uap->param, sizeof(sched_param));
196
197	return e;
198}
199int sched_setscheduler(struct proc *p,
200	struct sched_setscheduler_args *uap)
201{
202	int e;
203
204	struct sched_param sched_param;
205	copyin(uap->param, &sched_param, sizeof(sched_param));
206
207	(void) (0
208	|| (e = p31b_proc(p, uap->pid, &p))
209	|| (e = ksched_setscheduler(&p->p_retval[0],
210	ksched, p, uap->policy,
211		(const struct sched_param *)&sched_param))
212	);
213
214	return e;
215}
216int sched_getscheduler(struct proc *p,
217	struct sched_getscheduler_args *uap)
218{
219	int e;
220	(void) (0
221	|| (e = p31b_proc(p, uap->pid, &p))
222	|| (e = ksched_getscheduler(&p->p_retval[0], ksched, p))
223	);
224
225	return e;
226}
227int sched_yield(struct proc *p,
228	struct sched_yield_args *uap)
229{
230	return ksched_yield(&p->p_retval[0], ksched);
231}
232int sched_get_priority_max(struct proc *p,
233	struct sched_get_priority_max_args *uap)
234{
235	return ksched_get_priority_max(&p->p_retval[0],
236	ksched, uap->policy);
237}
238int sched_get_priority_min(struct proc *p,
239	struct sched_get_priority_min_args *uap)
240{
241	return ksched_get_priority_min(&p->p_retval[0],
242	ksched, uap->policy);
243}
244int sched_rr_get_interval(struct proc *p,
245	struct sched_rr_get_interval_args *uap)
246{
247	int e;
248
249	(void) (0
250	|| (e = p31b_proc(p, uap->pid, &p))
251	|| (e = ksched_rr_get_interval(&p->p_retval[0], ksched,
252	p, uap->interval))
253	);
254
255	return e;
256}
257
258#endif
259
260static void p31binit(void *notused)
261{
262	(void) sched_attach();
263	p31b_setcfg(CTL_P1003_1B_PAGESIZE, PAGE_SIZE);
264}
265
266SYSINIT(p31b, SI_SUB_P1003_1B, SI_ORDER_FIRST, p31binit, NULL);
267