ktrdump - Parse format string manually, implement %s
[dragonfly.git] / sys / kern / kern_p1003_1b.c
... / ...
CommitLineData
1/*
2 * Copyright (c) 1996, 1997, 1998
3 * HD Associates, Inc. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by HD Associates, Inc
16 * 4. Neither the name of the author nor the names of any co-contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY HD ASSOCIATES AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL HD ASSOCIATES OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 *
32 * $FreeBSD: src/sys/posix4/p1003_1b.c,v 1.5.2.2 2003/03/25 06:13:35 rwatson Exp $
33 * $DragonFly: src/sys/kern/kern_p1003_1b.c,v 1.10 2007/06/26 19:31:08 dillon Exp $
34 */
35
36/* p1003_1b: Real Time common code.
37 */
38
39#include <sys/param.h>
40#include <sys/systm.h>
41#include <sys/kernel.h>
42#include <sys/sysent.h>
43#include <sys/posix4.h>
44#include <sys/proc.h>
45#include <sys/syslog.h>
46#include <sys/module.h>
47#include <sys/sysproto.h>
48#include <sys/sysctl.h>
49#include <sys/unistd.h>
50
51MALLOC_DEFINE(M_P31B, "p1003.1b", "Posix 1003.1B");
52
53/* p31b_proc: Return a proc struct corresponding to a pid to operate on.
54 *
55 * Enforce permission policy.
56 *
57 * The policy is the same as for sending signals except there
58 * is no notion of process groups.
59 *
60 * pid == 0 means my process.
61 *
62 * This is disabled until I've got a permission gate in again:
63 * only root can do this.
64 */
65
66#if 0
67/*
68 * This is stolen from CANSIGNAL in kern_sig:
69 *
70 * Can process p, with pcred pc, do "write flavor" operations to process q?
71 */
72#define CAN_AFFECT(p, cr, q) \
73 ((cr)->cr_uid == 0 || \
74 (cr)->cr_ruid == (q)->p_ucred->cr_ruid || \
75 (cr)->cr_uid == (q)->p_ucred->cr_ruid || \
76 (cr)->cr_ruid == (q)->p_ucred->cr_uid || \
77 (cr)->cr_uid == (q)->p_ucred->cr_uid)
78#else
79#define CAN_AFFECT(p, cr, q) ((cr)->cr_uid == 0)
80#endif
81
82/*
83 * p31b_proc: Look up a proc from a PID. If proc is 0 it is
84 * my own proc.
85 */
86int p31b_proc(struct proc *p, pid_t pid, struct proc **pp)
87{
88 int ret = 0;
89 struct proc *other_proc = 0;
90
91 if (pid == 0)
92 other_proc = p;
93 else
94 other_proc = pfind(pid);
95
96 if (other_proc)
97 {
98 /* Enforce permission policy.
99 */
100 if (CAN_AFFECT(p, p->p_ucred, other_proc))
101 *pp = other_proc;
102 else
103 ret = EPERM;
104 }
105 else
106 ret = ESRCH;
107
108 return ret;
109}
110
111
112#if !defined(_KPOSIX_PRIORITY_SCHEDULING)
113
114int syscall_not_present(const char *s);
115
116/* The system calls return ENOSYS if an entry is called that is
117 * not run-time supported. I am also logging since some programs
118 * start to use this when they shouldn't. That will be removed if annoying.
119 */
120int syscall_not_present(const char *s)
121{
122 struct proc *p = curproc;
123 log(LOG_ERR, "cmd %s pid %d tried to use non-present %s\n",
124 p->p_comm, p->p_pid, s);
125
126 /* a " return nosys(p, uap); " here causes a core dump.
127 */
128
129 return ENOSYS;
130}
131
132/* Not configured but loadable via a module:
133 */
134
135static int sched_attach(void)
136{
137 return 0;
138}
139
140#define SYSCALL_NOT_PRESENT_GEN(SC) \
141int SC (struct SC##_args *uap) \
142{ \
143 return syscall_not_present(#SC); \
144}
145
146SYSCALL_NOT_PRESENT_GEN(sched_setparam)
147SYSCALL_NOT_PRESENT_GEN(sched_getparam)
148SYSCALL_NOT_PRESENT_GEN(sched_setscheduler)
149SYSCALL_NOT_PRESENT_GEN(sched_getscheduler)
150SYSCALL_NOT_PRESENT_GEN(sched_yield)
151SYSCALL_NOT_PRESENT_GEN(sched_get_priority_max)
152SYSCALL_NOT_PRESENT_GEN(sched_get_priority_min)
153SYSCALL_NOT_PRESENT_GEN(sched_rr_get_interval)
154
155#else
156
157/* Configured in kernel version:
158 */
159static struct ksched *ksched;
160
161static int sched_attach(void)
162{
163 int ret = ksched_attach(&ksched);
164
165 if (ret == 0)
166 p31b_setcfg(CTL_P1003_1B_PRIORITY_SCHEDULING, 1);
167
168 return ret;
169}
170
171/*
172 * MPALMOSTSAFE
173 */
174int
175sys_sched_setparam(struct sched_setparam_args *uap)
176{
177 struct proc *p = curproc;
178 struct lwp *lp;
179 int e;
180 struct sched_param sched_param;
181
182 copyin(uap->param, &sched_param, sizeof(sched_param));
183
184 get_mplock();
185 if ((e = p31b_proc(p, uap->pid, &p)) == 0) {
186 lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */
187 e = ksched_setparam(&uap->sysmsg_reg, ksched, lp,
188 (const struct sched_param *)&sched_param);
189 }
190 rel_mplock();
191 return e;
192}
193
194/*
195 * MPALMOSTSAFE
196 */
197int
198sys_sched_getparam(struct sched_getparam_args *uap)
199{
200 struct proc *p = curproc;
201 struct proc *targetp;
202 struct lwp *lp;
203 struct sched_param sched_param;
204 int e;
205
206 get_mplock();
207 if (uap->pid != 0 && uap->pid != p->p_pid) {
208 e = p31b_proc(p, uap->pid, &targetp);
209 if (e)
210 goto done;
211 } else {
212 targetp = p;
213 }
214
215 lp = FIRST_LWP_IN_PROC(targetp); /* XXX lwp */
216 e = ksched_getparam(&uap->sysmsg_reg, ksched, lp, &sched_param);
217done:
218 rel_mplock();
219 if (e == 0)
220 copyout(&sched_param, uap->param, sizeof(sched_param));
221 return e;
222}
223
224/*
225 * MPALMOSTSAFE
226 */
227int
228sys_sched_setscheduler(struct sched_setscheduler_args *uap)
229{
230 struct proc *p = curproc;
231 struct lwp *lp;
232 int e;
233 struct sched_param sched_param;
234
235 copyin(uap->param, &sched_param, sizeof(sched_param));
236
237 get_mplock();
238 if ((e = p31b_proc(p, uap->pid, &p)) == 0) {
239 lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */
240 e = ksched_setscheduler(&uap->sysmsg_reg, ksched, lp,
241 uap->policy,
242 (const struct sched_param *)&sched_param);
243 }
244 rel_mplock();
245 return e;
246}
247
248/*
249 * MPALMOSTSAFE
250 */
251int
252sys_sched_getscheduler(struct sched_getscheduler_args *uap)
253{
254 struct proc *p = curproc;
255 struct proc *targetp;
256 struct lwp *lp;
257 int e;
258
259 get_mplock();
260 if (uap->pid != 0 && uap->pid != p->p_pid) {
261 e = p31b_proc(p, uap->pid, &targetp);
262 if (e)
263 goto done;
264 } else {
265 targetp = p;
266 }
267
268 lp = FIRST_LWP_IN_PROC(targetp); /* XXX lwp */
269 e = ksched_getscheduler(&uap->sysmsg_reg, ksched, lp);
270done:
271 rel_mplock();
272 return e;
273}
274
275/*
276 * MPSAFE
277 */
278int
279sys_sched_yield(struct sched_yield_args *uap)
280{
281 return ksched_yield(&uap->sysmsg_reg, ksched);
282}
283
284/*
285 * MPSAFE
286 */
287int
288sys_sched_get_priority_max(struct sched_get_priority_max_args *uap)
289{
290 return ksched_get_priority_max(&uap->sysmsg_reg, ksched, uap->policy);
291}
292
293/*
294 * MPSAFE
295 */
296int
297sys_sched_get_priority_min(struct sched_get_priority_min_args *uap)
298{
299 return ksched_get_priority_min(&uap->sysmsg_reg, ksched, uap->policy);
300}
301
302/*
303 * MPALMOSTSAFE
304 */
305int
306sys_sched_rr_get_interval(struct sched_rr_get_interval_args *uap)
307{
308 int e;
309 struct proc *p = curproc;
310 struct lwp *lp = curthread->td_lwp;
311
312 get_mplock();
313 if ((e = p31b_proc(p, uap->pid, &p)) == 0) {
314 e = ksched_rr_get_interval(&uap->sysmsg_reg, ksched,
315 lp, uap->interval);
316 }
317 rel_mplock();
318 return e;
319}
320
321#endif
322
323static void
324p31binit(void *notused)
325{
326 (void) sched_attach();
327 p31b_setcfg(CTL_P1003_1B_PAGESIZE, PAGE_SIZE);
328 p31b_setcfg(CTL_P1003_1B_MESSAGE_PASSING, _POSIX_MESSAGE_PASSING);
329}
330
331SYSINIT(p31b, SI_SUB_P1003_1B, SI_ORDER_FIRST, p31binit, NULL);