2005-04-21 16:53:53 +02:00
|
|
|
#include "../kernel.h"
|
2005-05-31 11:50:51 +02:00
|
|
|
#include "../ipc.h"
|
2005-04-21 16:53:53 +02:00
|
|
|
#include "../system.h"
|
|
|
|
#include "../protect.h"
|
|
|
|
#include <sys/svrctl.h>
|
|
|
|
#include "../sendmask.h"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* The system call implemented in this file:
|
|
|
|
* m_type: SYS_SVRCTL
|
|
|
|
*
|
|
|
|
* The parameters for this system call are:
|
|
|
|
* m2_i1: CTL_PROC_NR (process number of caller)
|
|
|
|
* m2_i2: CTL_REQUEST (request type)
|
|
|
|
* m2_i3: CTL_MM_PRIV (privilege)
|
|
|
|
* m2_l1: CTL_SEND_MASK (new send mask to be installed)
|
|
|
|
* m2_l2: CTL_PROC_TYPE (new process type)
|
|
|
|
* m2_p1: CTL_ARG_PTR (argument pointer)
|
|
|
|
*/
|
|
|
|
|
2005-05-02 16:30:04 +02:00
|
|
|
/* NOTE: this call will radically change! */
|
2005-04-21 16:53:53 +02:00
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* do_svrctl *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC int do_svrctl(m_ptr)
|
|
|
|
message *m_ptr; /* pointer to request message */
|
|
|
|
{
|
|
|
|
register struct proc *rp;
|
|
|
|
int proc_nr, priv;
|
|
|
|
int request;
|
|
|
|
vir_bytes argp;
|
|
|
|
|
|
|
|
/* Extract message parameters. */
|
|
|
|
proc_nr = m_ptr->CTL_PROC_NR;
|
|
|
|
if (proc_nr == SELF) proc_nr = m_ptr->m_source;
|
|
|
|
if (! isokprocn(proc_nr)) return(EINVAL);
|
|
|
|
|
|
|
|
request = m_ptr->CTL_REQUEST;
|
|
|
|
priv = m_ptr->CTL_MM_PRIV;
|
|
|
|
argp = (vir_bytes) m_ptr->CTL_ARG_PTR;
|
|
|
|
rp = proc_addr(proc_nr);
|
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
/* Check if the PM privileges are super user. */
|
2005-04-21 16:53:53 +02:00
|
|
|
if (!priv || !isuserp(rp))
|
|
|
|
return(EPERM);
|
|
|
|
|
|
|
|
/* See what is requested and handle the request. */
|
|
|
|
switch (request) {
|
|
|
|
case SYSSIGNON: {
|
|
|
|
/* Make this process a server. The system processes should be able
|
|
|
|
* to communicate with this new server, so update their send masks
|
|
|
|
* as well.
|
|
|
|
*/
|
|
|
|
/* fall through */
|
|
|
|
}
|
|
|
|
case SYSSENDMASK: {
|
2005-05-31 11:50:51 +02:00
|
|
|
rp->p_call_mask = SYSTEM_CALL_MASK;
|
2005-04-21 16:53:53 +02:00
|
|
|
rp->p_sendmask = ALLOW_ALL_MASK;
|
2005-05-11 11:02:00 +02:00
|
|
|
send_mask_allow(proc_addr(USR8139)->p_sendmask, proc_nr);
|
2005-04-29 17:36:43 +02:00
|
|
|
send_mask_allow(proc_addr(PM_PROC_NR)->p_sendmask, proc_nr);
|
2005-04-21 16:53:53 +02:00
|
|
|
send_mask_allow(proc_addr(FS_PROC_NR)->p_sendmask, proc_nr);
|
|
|
|
send_mask_allow(proc_addr(IS_PROC_NR)->p_sendmask, proc_nr);
|
|
|
|
send_mask_allow(proc_addr(CLOCK)->p_sendmask, proc_nr);
|
|
|
|
send_mask_allow(proc_addr(SYSTASK)->p_sendmask, proc_nr);
|
2005-05-20 14:39:36 +02:00
|
|
|
send_mask_allow(proc_addr(FXP)->p_sendmask, proc_nr);
|
2005-04-21 16:53:53 +02:00
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The system call implemented in this file:
|
2005-04-29 17:36:43 +02:00
|
|
|
* m_type: SYS_SEGCTL
|
2005-04-21 16:53:53 +02:00
|
|
|
*
|
|
|
|
* The parameters for this system call are:
|
|
|
|
* m4_l3: SEG_PHYS (physical base address)
|
|
|
|
* m4_l4: SEG_SIZE (size of segment)
|
|
|
|
* m4_l1: SEG_SELECT (return segment selector here)
|
|
|
|
* m4_l2: SEG_OFFSET (return offset within segment here)
|
|
|
|
* m4_l5: SEG_INDEX (return index into remote memory map here)
|
|
|
|
*
|
|
|
|
* Author:
|
|
|
|
* Jorrit N. Herder <jnherder@cs.vu.nl>
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*===========================================================================*
|
2005-04-29 17:36:43 +02:00
|
|
|
* do_segctl *
|
2005-04-21 16:53:53 +02:00
|
|
|
*===========================================================================*/
|
2005-04-29 17:36:43 +02:00
|
|
|
PUBLIC int do_segctl(m_ptr)
|
2005-04-21 16:53:53 +02:00
|
|
|
register message *m_ptr; /* pointer to request message */
|
|
|
|
{
|
|
|
|
/* Return a segment selector and offset that can be used to reach a physical
|
|
|
|
* address, for use by a driver doing memory I/O in the A0000 - DFFFF range.
|
|
|
|
*/
|
|
|
|
u16_t selector;
|
|
|
|
vir_bytes offset;
|
2005-04-29 17:36:43 +02:00
|
|
|
int i, index;
|
2005-04-21 16:53:53 +02:00
|
|
|
register struct proc *rp;
|
|
|
|
phys_bytes phys = (phys_bytes) m_ptr->SEG_PHYS;
|
|
|
|
vir_bytes size = (vir_bytes) m_ptr->SEG_SIZE;
|
|
|
|
int result;
|
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
/* First check if there is a slot available for this segment. */
|
|
|
|
rp = proc_addr(m_ptr->m_source);
|
|
|
|
index = -1;
|
|
|
|
for (i=0; i < NR_REMOTE_SEGS; i++) {
|
|
|
|
if (! rp->p_farmem[i].in_use) {
|
|
|
|
index = i;
|
|
|
|
rp->p_farmem[i].in_use = TRUE;
|
|
|
|
rp->p_farmem[i].mem_phys = phys;
|
|
|
|
rp->p_farmem[i].mem_len = size;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (index < 0) return(ENOSPC);
|
|
|
|
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
if (! machine.protected) {
|
2005-04-21 16:53:53 +02:00
|
|
|
selector = phys / HCLICK_SIZE;
|
|
|
|
offset = phys % HCLICK_SIZE;
|
|
|
|
result = OK;
|
|
|
|
} else {
|
|
|
|
/* Check if the segment size can be recorded in bytes, that is, check
|
|
|
|
* if descriptor's limit field can delimited the allowed memory region
|
|
|
|
* precisely. This works up to 1MB. If the size is larger, 4K pages
|
|
|
|
* instead of bytes are used.
|
|
|
|
*/
|
|
|
|
if (size < BYTE_GRAN_MAX) {
|
2005-04-29 17:36:43 +02:00
|
|
|
init_dataseg(&rp->p_ldt[EXTRA_LDT_INDEX+i], phys, size,
|
2005-04-21 16:53:53 +02:00
|
|
|
USER_PRIVILEGE);
|
2005-04-29 17:36:43 +02:00
|
|
|
selector = ((EXTRA_LDT_INDEX+i)*0x08) | (1*0x04) | USER_PRIVILEGE;
|
2005-04-21 16:53:53 +02:00
|
|
|
offset = 0;
|
|
|
|
result = OK;
|
|
|
|
} else {
|
2005-04-29 17:36:43 +02:00
|
|
|
init_dataseg(&rp->p_ldt[EXTRA_LDT_INDEX+i], phys & ~0xFFFF, 0,
|
2005-04-21 16:53:53 +02:00
|
|
|
USER_PRIVILEGE);
|
2005-04-29 17:36:43 +02:00
|
|
|
selector = ((EXTRA_LDT_INDEX+i)*0x08) | (1*0x04) | USER_PRIVILEGE;
|
2005-04-21 16:53:53 +02:00
|
|
|
offset = phys & 0xFFFF;
|
|
|
|
result = OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
/* Request successfully done. Now return the result. */
|
|
|
|
m_ptr->SEG_INDEX = index | REMOTE_SEG;
|
2005-04-21 16:53:53 +02:00
|
|
|
m_ptr->SEG_SELECT = selector;
|
|
|
|
m_ptr->SEG_OFFSET = offset;
|
|
|
|
return(result);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* The system call implemented in this file:
|
|
|
|
* m_type: SYS_IOPENABLE
|
|
|
|
*
|
|
|
|
* The parameters for this system call are:
|
|
|
|
* m2_i2: PROC_NR (process to give I/O Protection Level bits)
|
|
|
|
*
|
|
|
|
* Author:
|
|
|
|
* Jorrit N. Herder <jnherder@cs.vu.nl>
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* do_iopenable *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC int do_iopenable(m_ptr)
|
|
|
|
register message *m_ptr; /* pointer to request message */
|
|
|
|
{
|
|
|
|
#if ENABLE_USERPRIV && ENABLE_USERIOPL
|
|
|
|
enable_iop(proc_addr(m_ptr->PROC_NR));
|
|
|
|
return(OK);
|
|
|
|
#else
|
|
|
|
return(EPERM);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|