diff options
Diffstat (limited to 'Kernel/Syscalls/profiling.cpp')
-rw-r--r-- | Kernel/Syscalls/profiling.cpp | 61 |
1 files changed, 61 insertions, 0 deletions
diff --git a/Kernel/Syscalls/profiling.cpp b/Kernel/Syscalls/profiling.cpp new file mode 100644 index 0000000000..8e31fbbf54 --- /dev/null +++ b/Kernel/Syscalls/profiling.cpp @@ -0,0 +1,61 @@ +/* + * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org> + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, this + * list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include <Kernel/Process.h> +#include <Kernel/Profiling.h> + +namespace Kernel { + +int Process::sys$profiling_enable(pid_t pid) +{ + REQUIRE_NO_PROMISES; + ScopedSpinLock lock(g_processes_lock); + auto* process = Process::from_pid(pid); + if (!process) + return -ESRCH; + if (process->is_dead()) + return -ESRCH; + if (!is_superuser() && process->uid() != m_uid) + return -EPERM; + Profiling::start(*process); + process->set_profiling(true); + return 0; +} + +int Process::sys$profiling_disable(pid_t pid) +{ + ScopedSpinLock lock(g_processes_lock); + auto* process = Process::from_pid(pid); + if (!process) + return -ESRCH; + if (!is_superuser() && process->uid() != m_uid) + return -EPERM; + process->set_profiling(false); + Profiling::stop(); + return 0; +} + +} |