mirror of
https://gitlab.com/sortix/sortix.git
synced 2023-02-13 20:55:38 -05:00
db7182ddc3
This change refactors the process group implementation and adds support for sessions. The setsid(2) and getsid(2) system calls were added. psctl(2) now has PSCTL_TTYNAME, which lets you get the name of a process's terminal, and ps(1) now uses it. The initial terminal is now called /dev/tty1. /dev/tty is now a factory for the current terminal. A global lock now protects the process hierarchy which makes it safe to access other processes. This refactor removes potential vulnerabilities and increases system robustness. A number of terminal ioctls have been added. This is a compatible ABI change.
161 lines
4.3 KiB
C++
161 lines
4.3 KiB
C++
/*
|
|
* Copyright (c) 2013, 2014, 2016 Jonas 'Sortie' Termansen.
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*
|
|
* resource.cpp
|
|
* Resource limits and operations.
|
|
*/
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <errno.h>
|
|
#include <limits.h>
|
|
|
|
#include <sortix/resource.h>
|
|
|
|
#include <sortix/kernel/copy.h>
|
|
#include <sortix/kernel/kernel.h>
|
|
#include <sortix/kernel/process.h>
|
|
#include <sortix/kernel/ptable.h>
|
|
#include <sortix/kernel/syscall.h>
|
|
|
|
namespace Sortix {
|
|
|
|
static int GetProcessPriority(pid_t who)
|
|
{
|
|
if ( who < 0 )
|
|
return errno = EINVAL, -1;
|
|
Process* process = who ? CurrentProcess()->GetPTable()->Get(who) : CurrentProcess();
|
|
if ( !process )
|
|
return errno = ESRCH, -1;
|
|
ScopedLock lock(&process->nicelock);
|
|
return process->nice;
|
|
}
|
|
|
|
static int SetProcessPriority(pid_t who, int prio)
|
|
{
|
|
if ( who < 0 )
|
|
return errno = EINVAL, -1;
|
|
Process* process = who ? CurrentProcess()->GetPTable()->Get(who) : CurrentProcess();
|
|
if ( !process )
|
|
return errno = ESRCH, -1;
|
|
ScopedLock lock(&process->nicelock);
|
|
process->nice = prio;
|
|
return 0;
|
|
}
|
|
|
|
static Process* CurrentProcessGroup()
|
|
{
|
|
return CurrentProcess()->group;
|
|
}
|
|
|
|
static int GetProcessGroupPriority(pid_t who)
|
|
{
|
|
if ( who < 0 )
|
|
return errno = EINVAL, -1;
|
|
Process* group = who ? CurrentProcess()->GetPTable()->Get(who) : CurrentProcessGroup();
|
|
if ( !group )
|
|
return errno = ESRCH, -1;
|
|
int lowest = INT_MAX;
|
|
for ( Process* process = group->groupfirst; process; process = process->groupnext )
|
|
{
|
|
ScopedLock lock(&process->nicelock);
|
|
if ( process->nice < lowest )
|
|
lowest = process->nice;
|
|
}
|
|
return lowest;
|
|
}
|
|
|
|
static int SetProcessGroupPriority(pid_t who, int prio)
|
|
{
|
|
if ( who < 0 )
|
|
return errno = EINVAL, -1;
|
|
Process* group = who ? CurrentProcess()->GetPTable()->Get(who) : CurrentProcessGroup();
|
|
if ( !group )
|
|
return errno = ESRCH, -1;
|
|
for ( Process* process = group->groupfirst; process; process = process->groupnext )
|
|
{
|
|
ScopedLock lock(&process->nicelock);
|
|
process->nice = prio;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int GetUserPriority(uid_t /*who*/)
|
|
{
|
|
return errno = ENOSYS, -1;
|
|
}
|
|
|
|
static int SetUserPriority(uid_t /*who*/, int /*prio*/)
|
|
{
|
|
return errno = ENOSYS, -1;
|
|
}
|
|
|
|
int sys_getpriority(int which, id_t who)
|
|
{
|
|
ScopedLock lock(&process_family_lock);
|
|
switch ( which )
|
|
{
|
|
case PRIO_PROCESS: return GetProcessPriority(who);
|
|
case PRIO_PGRP: return GetProcessGroupPriority(who);
|
|
case PRIO_USER: return GetUserPriority(who);
|
|
default: return errno = EINVAL, -1;
|
|
}
|
|
}
|
|
|
|
int sys_setpriority(int which, id_t who, int prio)
|
|
{
|
|
ScopedLock lock(&process_family_lock);
|
|
switch ( which )
|
|
{
|
|
case PRIO_PROCESS: return SetProcessPriority(who, prio);
|
|
case PRIO_PGRP: return SetProcessGroupPriority(who, prio);
|
|
case PRIO_USER: return SetUserPriority(who, prio);
|
|
default: return errno = EINVAL, -1;
|
|
}
|
|
}
|
|
|
|
int sys_prlimit(pid_t pid,
|
|
int resource,
|
|
const struct rlimit* user_new_limit,
|
|
struct rlimit* user_old_limit)
|
|
{
|
|
if ( pid < 0 )
|
|
return errno = EINVAL, -1;
|
|
if ( resource < 0 || RLIMIT_NUM_DECLARED <= resource )
|
|
return errno = EINVAL, -1;
|
|
ScopedLock family_lock(&process_family_lock);
|
|
Process* process = pid ? CurrentProcess()->GetPTable()->Get(pid) : CurrentProcess();
|
|
if ( !process )
|
|
return errno = ESRCH, -1;
|
|
ScopedLock lock(&process->resource_limits_lock);
|
|
struct rlimit* limit = &process->resource_limits[resource];
|
|
if ( user_old_limit )
|
|
{
|
|
if ( !CopyToUser(user_old_limit, limit, sizeof(struct rlimit)) )
|
|
return -1;
|
|
}
|
|
if ( user_new_limit )
|
|
{
|
|
struct rlimit new_limit;
|
|
if ( !CopyFromUser(&new_limit, user_new_limit, sizeof(struct rlimit)) )
|
|
return -1;
|
|
if ( new_limit.rlim_max < new_limit.rlim_cur )
|
|
return errno = EINVAL, -1;
|
|
*limit = new_limit;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
} // namespace Sortix
|