boot/efi: Sync our TianoCore EDK II headers with the edk2-stable202002 tag.
[dragonfly.git] / sys / kern / kern_p1003_1b.c
blobbc2baf4de74e0e0706844d0982aa181c1fb9a13f
1 /*
2 * Copyright (c) 1996, 1997, 1998
3 * HD Associates, Inc. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by HD Associates, Inc
16 * 4. Neither the name of the author nor the names of any co-contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY HD ASSOCIATES AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL HD ASSOCIATES OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
32 * $FreeBSD: src/sys/posix4/p1003_1b.c,v 1.5.2.2 2003/03/25 06:13:35 rwatson Exp $
35 /* p1003_1b: Real Time common code.
38 #include <sys/param.h>
39 #include <sys/systm.h>
40 #include <sys/kernel.h>
41 #include <sys/sysent.h>
42 #include <sys/malloc.h>
43 #include <sys/posix4.h>
44 #include <sys/proc.h>
45 #include <sys/syslog.h>
46 #include <sys/module.h>
47 #include <sys/sysproto.h>
48 #include <sys/sysctl.h>
49 #include <sys/unistd.h>
51 MALLOC_DEFINE(M_P31B, "p1003.1b", "Posix 1003.1B");
54 * p31b_proc: Return a proc struct corresponding to a pid to operate on.
56 * Enforce permission policy.
58 * The policy is the same as for sending signals except there
59 * is no notion of process groups.
61 * pid == 0 means my process.
63 * This is disabled until I've got a permission gate in again:
64 * only root can do this.
67 #if 0
69 * This is stolen from CANSIGNAL in kern_sig:
71 * Can process p, with pcred pc, do "write flavor" operations to process q?
73 #define CAN_AFFECT(p, cr, q) \
74 ((cr)->cr_uid == 0 || \
75 (cr)->cr_ruid == (q)->p_ucred->cr_ruid || \
76 (cr)->cr_uid == (q)->p_ucred->cr_ruid || \
77 (cr)->cr_ruid == (q)->p_ucred->cr_uid || \
78 (cr)->cr_uid == (q)->p_ucred->cr_uid)
79 #else
80 #define CAN_AFFECT(p, cr, q) ((cr)->cr_uid == 0)
81 #endif
83 #if !defined(_KPOSIX_PRIORITY_SCHEDULING)
85 int syscall_not_present(const char *s);
87 /* The system calls return ENOSYS if an entry is called that is
88 * not run-time supported. I am also logging since some programs
89 * start to use this when they shouldn't. That will be removed if annoying.
91 int syscall_not_present(const char *s)
93 struct proc *p = curproc;
94 log(LOG_ERR, "cmd %s pid %d tried to use non-present %s\n",
95 p->p_comm, p->p_pid, s);
97 /* a " return nosys(p, uap); " here causes a core dump.
100 return ENOSYS;
103 /* Not configured but loadable via a module:
106 static int sched_attach(void)
108 return 0;
111 #define SYSCALL_NOT_PRESENT_GEN(SC) \
112 int sys_##SC (struct SC##_args *uap) \
114 return syscall_not_present(#SC); \
117 SYSCALL_NOT_PRESENT_GEN(sched_setparam)
118 SYSCALL_NOT_PRESENT_GEN(sched_getparam)
119 SYSCALL_NOT_PRESENT_GEN(sched_setscheduler)
120 SYSCALL_NOT_PRESENT_GEN(sched_getscheduler)
121 SYSCALL_NOT_PRESENT_GEN(sched_yield)
122 SYSCALL_NOT_PRESENT_GEN(sched_get_priority_max)
123 SYSCALL_NOT_PRESENT_GEN(sched_get_priority_min)
124 SYSCALL_NOT_PRESENT_GEN(sched_rr_get_interval)
126 #else
129 * p31b_proc: Look up a proc from a PID. If proc is 0 it is
130 * my own proc.
132 * Returns a held process in *pp.
134 static
136 p31b_proc(pid_t pid, struct proc **pp)
138 int ret = 0;
139 struct proc *p = curproc;
140 struct proc *other_proc;
142 if (pid == 0) {
143 other_proc = p;
144 if (other_proc)
145 PHOLD(other_proc);
146 } else {
147 other_proc = pfind(pid);
148 /* ref from pfind() */
151 if (other_proc) {
152 /* Enforce permission policy.
154 if (CAN_AFFECT(p, p->p_ucred, other_proc)) {
155 *pp = other_proc;
156 lwkt_gettoken(&other_proc->p_token);
157 } else {
158 *pp = NULL;
159 ret = EPERM;
160 PRELE(other_proc);
162 } else {
163 *pp = NULL;
164 ret = ESRCH;
166 return ret;
169 static
170 void
171 p31b_proc_done(struct proc *other_proc)
173 if (other_proc) {
174 lwkt_reltoken(&other_proc->p_token);
175 PRELE(other_proc);
179 /* Configured in kernel version:
181 static struct ksched *ksched;
183 static int sched_attach(void)
185 int ret = ksched_attach(&ksched);
187 if (ret == 0)
188 p31b_setcfg(CTL_P1003_1B_PRIORITY_SCHEDULING, 1);
190 return ret;
194 sys_sched_setparam(struct sched_setparam_args *uap)
196 struct proc *p;
197 struct lwp *lp;
198 struct sched_param sched_param;
199 int e;
201 copyin(uap->param, &sched_param, sizeof(sched_param));
203 if ((e = p31b_proc(uap->pid, &p)) == 0) {
204 lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */
205 if (lp) {
206 LWPHOLD(lp);
207 lwkt_gettoken(&lp->lwp_token);
208 e = ksched_setparam(&uap->sysmsg_reg, ksched, lp,
209 (const struct sched_param *)&sched_param);
210 lwkt_reltoken(&lp->lwp_token);
211 LWPRELE(lp);
212 } else {
213 e = ESRCH;
215 p31b_proc_done(p);
217 return e;
221 sys_sched_getparam(struct sched_getparam_args *uap)
223 struct proc *targetp;
224 struct lwp *lp;
225 struct sched_param sched_param;
226 int e;
228 if ((e = p31b_proc(uap->pid, &targetp)) == 0) {
229 lp = FIRST_LWP_IN_PROC(targetp); /* XXX lwp */
230 if (lp) {
231 LWPHOLD(lp);
232 lwkt_gettoken(&lp->lwp_token);
233 e = ksched_getparam(&uap->sysmsg_reg, ksched,
234 lp, &sched_param);
235 lwkt_reltoken(&lp->lwp_token);
236 LWPRELE(lp);
237 } else {
238 e = ESRCH;
240 p31b_proc_done(targetp);
242 if (e == 0)
243 copyout(&sched_param, uap->param, sizeof(sched_param));
244 return e;
248 sys_sched_setscheduler(struct sched_setscheduler_args *uap)
250 struct proc *p;
251 struct lwp *lp;
252 int e;
253 struct sched_param sched_param;
255 copyin(uap->param, &sched_param, sizeof(sched_param));
257 if ((e = p31b_proc(uap->pid, &p)) == 0) {
258 lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */
259 if (lp) {
260 LWPHOLD(lp);
261 lwkt_gettoken(&lp->lwp_token);
262 e = ksched_setscheduler(&uap->sysmsg_reg, ksched,
263 lp, uap->policy,
264 (const struct sched_param *)&sched_param);
265 lwkt_reltoken(&lp->lwp_token);
266 LWPRELE(lp);
267 } else {
268 e = ESRCH;
270 p31b_proc_done(p);
272 return e;
276 sys_sched_getscheduler(struct sched_getscheduler_args *uap)
278 struct proc *targetp;
279 struct lwp *lp;
280 int e;
282 if ((e = p31b_proc(uap->pid, &targetp)) == 0) {
283 lp = FIRST_LWP_IN_PROC(targetp); /* XXX lwp */
284 if (lp) {
285 LWPHOLD(lp);
286 lwkt_gettoken(&lp->lwp_token);
287 e = ksched_getscheduler(&uap->sysmsg_reg, ksched, lp);
288 lwkt_reltoken(&lp->lwp_token);
289 LWPRELE(lp);
290 } else {
291 e = ESRCH;
293 p31b_proc_done(targetp);
295 return e;
299 * MPSAFE
302 sys_sched_yield(struct sched_yield_args *uap)
304 return ksched_yield(&uap->sysmsg_reg, ksched);
308 * MPSAFE
311 sys_sched_get_priority_max(struct sched_get_priority_max_args *uap)
313 return ksched_get_priority_max(&uap->sysmsg_reg, ksched, uap->policy);
317 * MPSAFE
320 sys_sched_get_priority_min(struct sched_get_priority_min_args *uap)
322 return ksched_get_priority_min(&uap->sysmsg_reg, ksched, uap->policy);
326 sys_sched_rr_get_interval(struct sched_rr_get_interval_args *uap)
328 int e;
329 struct proc *p;
330 struct lwp *lp;
331 struct timespec ts;
333 if ((e = p31b_proc(uap->pid, &p)) == 0) {
334 lp = FIRST_LWP_IN_PROC(p); /* XXX lwp */
335 if (lp) {
336 LWPHOLD(lp);
337 lwkt_gettoken(&lp->lwp_token);
338 e = ksched_rr_get_interval(&uap->sysmsg_reg, ksched,
339 lp, &ts);
340 if (e == 0)
341 e = copyout(&ts, uap->interval, sizeof(ts));
342 lwkt_reltoken(&lp->lwp_token);
343 LWPRELE(lp);
344 } else {
345 e = ESRCH;
347 p31b_proc_done(p);
349 return e;
352 #endif
354 static void
355 p31binit(void *notused)
357 sched_attach();
358 p31b_setcfg(CTL_P1003_1B_ASYNCHRONOUS_IO, -1);
359 p31b_setcfg(CTL_P1003_1B_FSYNC, _POSIX_FSYNC);
360 p31b_setcfg(CTL_P1003_1B_MAPPED_FILES, _POSIX_MAPPED_FILES);
361 p31b_setcfg(CTL_P1003_1B_MESSAGE_PASSING, _POSIX_MESSAGE_PASSING);
362 p31b_setcfg(CTL_P1003_1B_PAGESIZE, PAGE_SIZE);
363 p31b_setcfg(CTL_P1003_1B_SEMAPHORES, _POSIX_SEMAPHORES);
364 p31b_setcfg(CTL_P1003_1B_SEM_NSEMS_MAX, 256);
365 p31b_setcfg(CTL_P1003_1B_SHARED_MEMORY_OBJECTS,
366 _POSIX_SHARED_MEMORY_OBJECTS);
368 #if 0 /* XXX missing */
369 p31b_setcfg(CTL_P1003_1B_ASYNCHRONOUS_IO, _POSIX_ASYNCHRONOUS_IO);
370 p31b_setcfg(CTL_P1003_1B_AIO_PRIO_DELTA_MAX, 0);
371 p31b_setcfg(CTL_P1003_1B_AIO_MAX, 0);
372 p31b_setcfg(CTL_P1003_1B_AIO_LISTIO_MAX, 0);
373 p31b_setcfg(CTL_P1003_1B_DELAYTIMER_MAX, 0);
374 p31b_setcfg(CTL_P1003_1B_MEMLOCK, 0);
375 p31b_setcfg(CTL_P1003_1B_MEMLOCK_RANGE, 0);
376 p31b_setcfg(CTL_P1003_1B_MEMORY_PROTECTION, 0);
377 p31b_setcfg(CTL_P1003_1B_PRIORITIZED_IO, _POSIX_PRIORITIZED_IO);
378 p31b_setcfg(CTL_P1003_1B_REALTIME_SIGNALS, _POSIX_REALTIME_SIGNALS);
379 p31b_setcfg(CTL_P1003_1B_RTSIG_MAX, SIGRTMAX - SIGRTMIN + 1);
380 p31b_setcfg(CTL_P1003_1B_SIGQUEUE_MAX, 0);
381 p31b_setcfg(CTL_P1003_1B_SYNCHRONIZED_IO, _POSIX_SYNCHRONIZED_IO);
382 p31b_setcfg(CTL_P1003_1B_TIMERS, _POSIX_TIMERS);
383 p31b_setcfg(CTL_P1003_1B_TIMER_MAX, 0);
384 #endif
387 SYSINIT(p31b, SI_SUB_P1003_1B, SI_ORDER_FIRST, p31binit, NULL);