2005-05-03 17:35:52 +02:00
|
|
|
/* Miscellaneous system calls. Author: Kees J. Bot
|
|
|
|
* 31 Mar 2000
|
|
|
|
* The entry points into this file are:
|
|
|
|
* do_reboot: kill all processes, then reboot system
|
2005-05-13 10:57:08 +02:00
|
|
|
* do_svrctl: process manager control
|
2005-06-02 14:43:21 +02:00
|
|
|
* do_getsysinfo: request copy of PM data structure (Jorrit N. Herder)
|
|
|
|
* do_getprocnr: lookup process slot number (Jorrit N. Herder)
|
|
|
|
* do_memalloc: allocate a chunk of memory (Jorrit N. Herder)
|
|
|
|
* do_memfree: deallocate a chunk of memory (Jorrit N. Herder)
|
2005-07-01 19:58:29 +02:00
|
|
|
* do_getsetpriority: get/set process priority
|
2005-05-03 17:35:52 +02:00
|
|
|
*/
|
|
|
|
|
2005-05-13 10:57:08 +02:00
|
|
|
#include "pm.h"
|
2005-05-03 17:35:52 +02:00
|
|
|
#include <minix/callnr.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <sys/svrctl.h>
|
2005-07-01 19:58:29 +02:00
|
|
|
#include <sys/resource.h>
|
2005-05-03 17:35:52 +02:00
|
|
|
#include <minix/com.h>
|
2005-10-13 14:48:43 +02:00
|
|
|
#include <minix/config.h>
|
|
|
|
#include <minix/type.h>
|
2005-05-03 17:35:52 +02:00
|
|
|
#include <string.h>
|
|
|
|
#include "mproc.h"
|
|
|
|
#include "param.h"
|
|
|
|
|
2005-06-03 15:55:06 +02:00
|
|
|
/*===========================================================================*
|
2005-09-11 18:45:46 +02:00
|
|
|
* do_allocmem *
|
2005-06-03 15:55:06 +02:00
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC int do_allocmem()
|
2005-06-02 14:43:21 +02:00
|
|
|
{
|
|
|
|
vir_clicks mem_clicks;
|
|
|
|
phys_clicks mem_base;
|
|
|
|
|
|
|
|
mem_clicks = (m_in.memsize + CLICK_SIZE -1 ) >> CLICK_SHIFT;
|
|
|
|
mem_base = alloc_mem(mem_clicks);
|
|
|
|
if (mem_base == NO_MEM) return(ENOMEM);
|
|
|
|
mp->mp_reply.membase = (phys_bytes) (mem_base << CLICK_SHIFT);
|
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|
2005-06-03 15:55:06 +02:00
|
|
|
/*===========================================================================*
|
2005-09-11 18:45:46 +02:00
|
|
|
* do_freemem *
|
2005-06-03 15:55:06 +02:00
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC int do_freemem()
|
2005-06-02 14:43:21 +02:00
|
|
|
{
|
2005-06-03 15:55:06 +02:00
|
|
|
vir_clicks mem_clicks;
|
|
|
|
phys_clicks mem_base;
|
|
|
|
|
|
|
|
mem_clicks = (m_in.memsize + CLICK_SIZE -1 ) >> CLICK_SHIFT;
|
|
|
|
mem_base = (m_in.membase + CLICK_SIZE -1 ) >> CLICK_SHIFT;
|
|
|
|
free_mem(mem_base, mem_clicks);
|
2005-06-02 14:43:21 +02:00
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|
2005-06-06 15:51:50 +02:00
|
|
|
/*===========================================================================*
|
2005-09-11 18:45:46 +02:00
|
|
|
* do_getsysinfo *
|
2005-06-06 15:51:50 +02:00
|
|
|
*===========================================================================*/
|
2005-05-03 17:35:52 +02:00
|
|
|
PUBLIC int do_getsysinfo()
|
|
|
|
{
|
2005-06-06 15:51:50 +02:00
|
|
|
struct mproc *proc_addr;
|
|
|
|
vir_bytes src_addr, dst_addr;
|
|
|
|
struct kinfo kinfo;
|
2005-11-14 16:50:46 +01:00
|
|
|
struct loadinfo loadinfo;
|
2005-06-06 15:51:50 +02:00
|
|
|
size_t len;
|
2005-10-18 19:21:11 +02:00
|
|
|
static struct pm_mem_info pmi;
|
2005-10-13 14:48:43 +02:00
|
|
|
int s, r;
|
|
|
|
size_t holesize;
|
2005-06-06 15:51:50 +02:00
|
|
|
|
|
|
|
switch(m_in.info_what) {
|
|
|
|
case SI_KINFO: /* kernel info is obtained via PM */
|
|
|
|
sys_getkinfo(&kinfo);
|
|
|
|
src_addr = (vir_bytes) &kinfo;
|
|
|
|
len = sizeof(struct kinfo);
|
|
|
|
break;
|
|
|
|
case SI_PROC_ADDR: /* get address of PM process table */
|
|
|
|
proc_addr = &mproc[0];
|
|
|
|
src_addr = (vir_bytes) &proc_addr;
|
|
|
|
len = sizeof(struct mproc *);
|
|
|
|
break;
|
2005-06-07 16:43:35 +02:00
|
|
|
case SI_PROC_TAB: /* copy entire process table */
|
|
|
|
src_addr = (vir_bytes) mproc;
|
|
|
|
len = sizeof(struct mproc) * NR_PROCS;
|
|
|
|
break;
|
2005-10-13 14:48:43 +02:00
|
|
|
case SI_MEM_ALLOC:
|
2005-10-18 19:21:11 +02:00
|
|
|
holesize = sizeof(pmi.pmi_holes);
|
|
|
|
if((r=mem_holes_copy(pmi.pmi_holes, &holesize,
|
|
|
|
&pmi.pmi_hi_watermark)) != OK)
|
|
|
|
return r;
|
|
|
|
src_addr = (vir_bytes) &pmi;
|
|
|
|
len = sizeof(pmi);
|
2005-10-13 14:48:43 +02:00
|
|
|
break;
|
2005-11-14 16:50:46 +01:00
|
|
|
case SI_LOADINFO: /* loadinfo is obtained via PM */
|
|
|
|
sys_getloadinfo(&loadinfo);
|
|
|
|
src_addr = (vir_bytes) &loadinfo;
|
|
|
|
len = sizeof(struct loadinfo);
|
|
|
|
break;
|
2005-06-06 15:51:50 +02:00
|
|
|
default:
|
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
dst_addr = (vir_bytes) m_in.info_where;
|
|
|
|
if (OK != (s=sys_datacopy(SELF, src_addr, who, dst_addr, len)))
|
|
|
|
return(s);
|
2005-05-03 17:35:52 +02:00
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|
2005-06-06 15:51:50 +02:00
|
|
|
/*===========================================================================*
|
2005-09-11 18:45:46 +02:00
|
|
|
* do_getprocnr *
|
2005-06-06 15:51:50 +02:00
|
|
|
*===========================================================================*/
|
2005-05-19 11:38:29 +02:00
|
|
|
PUBLIC int do_getprocnr()
|
|
|
|
{
|
2005-06-02 14:43:21 +02:00
|
|
|
register struct mproc *rmp;
|
2005-06-20 11:35:23 +02:00
|
|
|
static char search_key[PROC_NAME_LEN+1];
|
2005-06-02 14:43:21 +02:00
|
|
|
int key_len;
|
|
|
|
int s;
|
|
|
|
|
2005-10-12 17:07:38 +02:00
|
|
|
if (m_in.pid >= 0) { /* lookup process by pid */
|
2005-08-02 17:29:17 +02:00
|
|
|
for (rmp = &mproc[0]; rmp < &mproc[NR_PROCS]; rmp++) {
|
|
|
|
if ((rmp->mp_flags & IN_USE) && (rmp->mp_pid==m_in.pid)) {
|
|
|
|
mp->mp_reply.procnr = (int) (rmp - mproc);
|
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return(ESRCH);
|
2005-10-12 17:07:38 +02:00
|
|
|
} else if (m_in.namelen > 0) { /* lookup process by name */
|
2005-06-20 11:35:23 +02:00
|
|
|
key_len = MIN(m_in.namelen, PROC_NAME_LEN);
|
2005-06-02 14:43:21 +02:00
|
|
|
if (OK != (s=sys_datacopy(who, (vir_bytes) m_in.addr,
|
|
|
|
SELF, (vir_bytes) search_key, key_len)))
|
|
|
|
return(s);
|
|
|
|
search_key[key_len] = '\0'; /* terminate for safety */
|
|
|
|
for (rmp = &mproc[0]; rmp < &mproc[NR_PROCS]; rmp++) {
|
2005-10-17 15:20:07 +02:00
|
|
|
if (((rmp->mp_flags & (IN_USE | ZOMBIE)) == IN_USE) &&
|
2005-06-02 14:43:21 +02:00
|
|
|
strncmp(rmp->mp_name, search_key, key_len)==0) {
|
|
|
|
mp->mp_reply.procnr = (int) (rmp - mproc);
|
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return(ESRCH);
|
2005-10-12 17:07:38 +02:00
|
|
|
} else { /* return own/parent process number */
|
2005-06-02 14:43:21 +02:00
|
|
|
mp->mp_reply.procnr = who;
|
2005-10-12 17:07:38 +02:00
|
|
|
mp->mp_reply.pprocnr = mp->mp_parent;
|
2005-06-02 14:43:21 +02:00
|
|
|
}
|
2005-05-19 11:38:29 +02:00
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|
2005-09-11 18:45:46 +02:00
|
|
|
/*===========================================================================*
|
|
|
|
* do_reboot *
|
|
|
|
*===========================================================================*/
|
2005-06-24 18:21:21 +02:00
|
|
|
#define REBOOT_CODE "delay; boot"
|
2005-05-03 17:35:52 +02:00
|
|
|
PUBLIC int do_reboot()
|
|
|
|
{
|
2005-06-24 18:21:21 +02:00
|
|
|
char monitor_code[32*sizeof(char *)];
|
|
|
|
int code_len;
|
|
|
|
int abort_flag;
|
2005-05-03 17:35:52 +02:00
|
|
|
|
2005-06-24 18:21:21 +02:00
|
|
|
if (mp->mp_effuid != SUPER_USER) return(EPERM);
|
2005-05-03 17:35:52 +02:00
|
|
|
|
|
|
|
switch (m_in.reboot_flag) {
|
|
|
|
case RBT_HALT:
|
|
|
|
case RBT_PANIC:
|
|
|
|
case RBT_RESET:
|
2005-06-24 18:21:21 +02:00
|
|
|
abort_flag = m_in.reboot_flag;
|
|
|
|
break;
|
|
|
|
case RBT_REBOOT:
|
|
|
|
code_len = strlen(REBOOT_CODE) + 1;
|
|
|
|
strncpy(monitor_code, REBOOT_CODE, code_len);
|
|
|
|
abort_flag = RBT_MONITOR;
|
2005-05-03 17:35:52 +02:00
|
|
|
break;
|
|
|
|
case RBT_MONITOR:
|
2005-06-24 18:21:21 +02:00
|
|
|
code_len = m_in.reboot_strlen + 1;
|
|
|
|
if (code_len > sizeof(monitor_code)) return(EINVAL);
|
2005-05-03 17:35:52 +02:00
|
|
|
if (sys_datacopy(who, (vir_bytes) m_in.reboot_code,
|
|
|
|
PM_PROC_NR, (vir_bytes) monitor_code,
|
2005-06-24 18:21:21 +02:00
|
|
|
(phys_bytes) (code_len)) != OK) return(EFAULT);
|
|
|
|
if (monitor_code[code_len-1] != 0) return(EINVAL);
|
|
|
|
abort_flag = RBT_MONITOR;
|
2005-05-03 17:35:52 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
2005-10-21 13:10:16 +02:00
|
|
|
/* Order matters here. When FS is told to reboot, it exits all its
|
|
|
|
* processes, and then would be confused if they're exited again by
|
|
|
|
* SIGKILL. So first kill, then reboot.
|
|
|
|
*/
|
|
|
|
|
2005-05-13 10:57:08 +02:00
|
|
|
check_sig(-1, SIGKILL); /* kill all processes except init */
|
2005-10-21 13:07:33 +02:00
|
|
|
tell_fs(REBOOT, 0, 0, 0); /* tell FS to synchronize */
|
2005-05-03 17:35:52 +02:00
|
|
|
|
2005-05-27 15:10:58 +02:00
|
|
|
/* Ask the kernel to abort. All system services, including the PM, will
|
|
|
|
* get a HARD_STOP notification. Await the notification in the main loop.
|
|
|
|
*/
|
2005-06-24 18:21:21 +02:00
|
|
|
sys_abort(abort_flag, PM_PROC_NR, monitor_code, code_len);
|
2005-05-30 11:29:48 +02:00
|
|
|
return(SUSPEND); /* don't reply to killed process */
|
2005-05-03 17:35:52 +02:00
|
|
|
}
|
|
|
|
|
2005-09-11 18:45:46 +02:00
|
|
|
/*===========================================================================*
|
|
|
|
* do_getsetpriority *
|
|
|
|
*===========================================================================*/
|
2005-07-01 19:58:29 +02:00
|
|
|
PUBLIC int do_getsetpriority()
|
|
|
|
{
|
|
|
|
int arg_which, arg_who, arg_pri;
|
|
|
|
int rmp_nr;
|
|
|
|
struct mproc *rmp;
|
|
|
|
|
|
|
|
arg_which = m_in.m1_i1;
|
|
|
|
arg_who = m_in.m1_i2;
|
|
|
|
arg_pri = m_in.m1_i3; /* for SETPRIORITY */
|
|
|
|
|
|
|
|
/* Code common to GETPRIORITY and SETPRIORITY. */
|
|
|
|
|
|
|
|
/* Only support PRIO_PROCESS for now. */
|
2005-09-11 18:45:46 +02:00
|
|
|
if (arg_which != PRIO_PROCESS)
|
2005-07-19 14:11:11 +02:00
|
|
|
return(EINVAL);
|
2005-07-01 19:58:29 +02:00
|
|
|
|
2005-09-11 18:45:46 +02:00
|
|
|
if (arg_who == 0)
|
2005-07-01 19:58:29 +02:00
|
|
|
rmp_nr = who;
|
|
|
|
else
|
2005-09-11 18:45:46 +02:00
|
|
|
if ((rmp_nr = proc_from_pid(arg_who)) < 0)
|
2005-07-19 14:11:11 +02:00
|
|
|
return(ESRCH);
|
2005-07-01 19:58:29 +02:00
|
|
|
|
|
|
|
rmp = &mproc[rmp_nr];
|
|
|
|
|
2005-09-11 18:45:46 +02:00
|
|
|
if (mp->mp_effuid != SUPER_USER &&
|
2005-07-01 19:58:29 +02:00
|
|
|
mp->mp_effuid != rmp->mp_effuid && mp->mp_effuid != rmp->mp_realuid)
|
|
|
|
return EPERM;
|
|
|
|
|
|
|
|
/* If GET, that's it. */
|
2005-09-11 18:45:46 +02:00
|
|
|
if (call_nr == GETPRIORITY) {
|
2005-07-19 14:11:11 +02:00
|
|
|
return(rmp->mp_nice - PRIO_MIN);
|
2005-07-01 19:58:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Only root is allowed to reduce the nice level. */
|
2005-09-11 18:45:46 +02:00
|
|
|
if (rmp->mp_nice > arg_pri && mp->mp_effuid != SUPER_USER)
|
2005-07-19 14:11:11 +02:00
|
|
|
return(EACCES);
|
|
|
|
|
2005-07-01 19:58:29 +02:00
|
|
|
/* We're SET, and it's allowed. Do it and tell kernel. */
|
|
|
|
rmp->mp_nice = arg_pri;
|
2005-07-19 14:11:11 +02:00
|
|
|
return sys_nice(rmp_nr, arg_pri);
|
2005-07-01 19:58:29 +02:00
|
|
|
}
|
|
|
|
|
2005-09-11 18:45:46 +02:00
|
|
|
/*===========================================================================*
|
|
|
|
* do_svrctl *
|
|
|
|
*===========================================================================*/
|
2005-05-03 17:35:52 +02:00
|
|
|
PUBLIC int do_svrctl()
|
|
|
|
{
|
|
|
|
int s, req;
|
|
|
|
vir_bytes ptr;
|
2005-07-22 20:29:58 +02:00
|
|
|
#define MAX_LOCAL_PARAMS 2
|
|
|
|
static struct {
|
|
|
|
char name[30];
|
|
|
|
char value[30];
|
|
|
|
} local_param_overrides[MAX_LOCAL_PARAMS];
|
|
|
|
static int local_params = 0;
|
|
|
|
|
2005-05-03 17:35:52 +02:00
|
|
|
req = m_in.svrctl_req;
|
|
|
|
ptr = (vir_bytes) m_in.svrctl_argp;
|
|
|
|
|
2005-08-03 18:58:22 +02:00
|
|
|
/* Is the request indeed for the MM? */
|
|
|
|
if (((req >> 8) & 0xFF) != 'M') return(EINVAL);
|
2005-05-03 17:35:52 +02:00
|
|
|
|
2005-05-13 10:57:08 +02:00
|
|
|
/* Control operations local to the PM. */
|
2005-05-03 17:35:52 +02:00
|
|
|
switch(req) {
|
2005-07-22 20:29:58 +02:00
|
|
|
case MMSETPARAM:
|
2005-05-03 17:35:52 +02:00
|
|
|
case MMGETPARAM: {
|
|
|
|
struct sysgetenv sysgetenv;
|
|
|
|
char search_key[64];
|
|
|
|
char *val_start;
|
|
|
|
size_t val_len;
|
|
|
|
size_t copy_len;
|
|
|
|
|
2005-05-13 10:57:08 +02:00
|
|
|
/* Copy sysgetenv structure to PM. */
|
2005-05-03 17:35:52 +02:00
|
|
|
if (sys_datacopy(who, ptr, SELF, (vir_bytes) &sysgetenv,
|
|
|
|
sizeof(sysgetenv)) != OK) return(EFAULT);
|
|
|
|
|
2005-07-22 20:29:58 +02:00
|
|
|
/* Set a param override? */
|
2005-09-11 18:45:46 +02:00
|
|
|
if (req == MMSETPARAM) {
|
|
|
|
if (local_params >= MAX_LOCAL_PARAMS) return ENOSPC;
|
|
|
|
if (sysgetenv.keylen <= 0
|
2005-08-29 18:47:18 +02:00
|
|
|
|| sysgetenv.keylen >=
|
|
|
|
sizeof(local_param_overrides[local_params].name)
|
|
|
|
|| sysgetenv.vallen <= 0
|
|
|
|
|| sysgetenv.vallen >=
|
|
|
|
sizeof(local_param_overrides[local_params].value))
|
|
|
|
return EINVAL;
|
2005-07-22 20:29:58 +02:00
|
|
|
|
2005-08-29 18:47:18 +02:00
|
|
|
if ((s = sys_datacopy(who, (vir_bytes) sysgetenv.key,
|
|
|
|
SELF, (vir_bytes) local_param_overrides[local_params].name,
|
|
|
|
sysgetenv.keylen)) != OK)
|
|
|
|
return s;
|
|
|
|
if ((s = sys_datacopy(who, (vir_bytes) sysgetenv.val,
|
|
|
|
SELF, (vir_bytes) local_param_overrides[local_params].value,
|
|
|
|
sysgetenv.keylen)) != OK)
|
|
|
|
return s;
|
|
|
|
local_param_overrides[local_params].name[sysgetenv.keylen] = '\0';
|
|
|
|
local_param_overrides[local_params].value[sysgetenv.vallen] = '\0';
|
|
|
|
|
|
|
|
local_params++;
|
|
|
|
|
|
|
|
return OK;
|
2005-07-22 20:29:58 +02:00
|
|
|
}
|
|
|
|
|
2005-05-03 17:35:52 +02:00
|
|
|
if (sysgetenv.keylen == 0) { /* copy all parameters */
|
|
|
|
val_start = monitor_params;
|
|
|
|
val_len = sizeof(monitor_params);
|
|
|
|
}
|
|
|
|
else { /* lookup value for key */
|
2005-07-22 20:29:58 +02:00
|
|
|
int p;
|
2005-05-03 17:35:52 +02:00
|
|
|
/* Try to get a copy of the requested key. */
|
|
|
|
if (sysgetenv.keylen > sizeof(search_key)) return(EINVAL);
|
|
|
|
if ((s = sys_datacopy(who, (vir_bytes) sysgetenv.key,
|
|
|
|
SELF, (vir_bytes) search_key, sysgetenv.keylen)) != OK)
|
|
|
|
return(s);
|
|
|
|
|
2005-07-22 20:29:58 +02:00
|
|
|
/* Make sure key is null-terminated and lookup value.
|
|
|
|
* First check local overrides.
|
|
|
|
*/
|
2005-05-03 17:35:52 +02:00
|
|
|
search_key[sysgetenv.keylen-1]= '\0';
|
2005-07-22 20:29:58 +02:00
|
|
|
for(p = 0; p < local_params; p++) {
|
2005-09-11 18:45:46 +02:00
|
|
|
if (!strcmp(search_key, local_param_overrides[p].name)) {
|
2005-07-22 20:29:58 +02:00
|
|
|
val_start = local_param_overrides[p].value;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2005-09-11 18:45:46 +02:00
|
|
|
if (p >= local_params && (val_start = find_param(search_key)) == NULL)
|
2005-05-03 17:35:52 +02:00
|
|
|
return(ESRCH);
|
|
|
|
val_len = strlen(val_start) + 1;
|
|
|
|
}
|
|
|
|
|
2005-06-20 11:35:23 +02:00
|
|
|
/* See if it fits in the client's buffer. */
|
|
|
|
if (val_len > sysgetenv.vallen)
|
|
|
|
return E2BIG;
|
|
|
|
|
2005-05-03 17:35:52 +02:00
|
|
|
/* Value found, make the actual copy (as far as possible). */
|
2005-06-20 11:35:23 +02:00
|
|
|
copy_len = MIN(val_len, sysgetenv.vallen);
|
2005-05-03 17:35:52 +02:00
|
|
|
if ((s=sys_datacopy(SELF, (vir_bytes) val_start,
|
|
|
|
who, (vir_bytes) sysgetenv.val, copy_len)) != OK)
|
|
|
|
return(s);
|
|
|
|
|
2005-06-20 11:35:23 +02:00
|
|
|
return OK;
|
2005-05-03 17:35:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#if ENABLE_SWAP
|
|
|
|
case MMSWAPON: {
|
|
|
|
struct mmswapon swapon;
|
|
|
|
|
|
|
|
if (mp->mp_effuid != SUPER_USER) return(EPERM);
|
|
|
|
|
|
|
|
if (sys_datacopy(who, (phys_bytes) ptr,
|
|
|
|
PM_PROC_NR, (phys_bytes) &swapon,
|
|
|
|
(phys_bytes) sizeof(swapon)) != OK) return(EFAULT);
|
|
|
|
|
|
|
|
return(swap_on(swapon.file, swapon.offset, swapon.size)); }
|
|
|
|
|
|
|
|
case MMSWAPOFF: {
|
|
|
|
if (mp->mp_effuid != SUPER_USER) return(EPERM);
|
|
|
|
|
|
|
|
return(swap_off()); }
|
|
|
|
#endif /* SWAP */
|
|
|
|
|
|
|
|
default:
|
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|