2005-10-14 10:58:59 +02:00
|
|
|
/* The kernel call implemented in this file:
|
2005-04-21 16:53:53 +02:00
|
|
|
* m_type: SYS_GETINFO
|
|
|
|
*
|
2005-10-14 10:58:59 +02:00
|
|
|
* The parameters for this kernel call are:
|
2005-04-21 16:53:53 +02:00
|
|
|
* m1_i3: I_REQUEST (what info to get)
|
|
|
|
* m1_p1: I_VAL_PTR (where to put it)
|
|
|
|
* m1_i1: I_VAL_LEN (maximum length expected, optional)
|
2005-07-19 14:21:36 +02:00
|
|
|
* m1_p2: I_VAL_PTR2 (second, optional pointer)
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
* m1_i2: I_VAL_LEN2_E (second length or process nr)
|
2005-04-21 16:53:53 +02:00
|
|
|
*/
|
|
|
|
|
2009-02-05 14:00:03 +01:00
|
|
|
#include <string.h>
|
|
|
|
|
2005-07-14 17:12:12 +02:00
|
|
|
#include "../system.h"
|
2008-11-19 13:26:10 +01:00
|
|
|
#include "../vm.h"
|
Split of architecture-dependent and -independent functions for i386,
mainly in the kernel and headers. This split based on work by
Ingmar Alting <iaalting@cs.vu.nl> done for his Minix PowerPC architecture
port.
. kernel does not program the interrupt controller directly, do any
other architecture-dependent operations, or contain assembly any more,
but uses architecture-dependent functions in arch/$(ARCH)/.
. architecture-dependent constants and types defined in arch/$(ARCH)/include.
. <ibm/portio.h> moved to <minix/portio.h>, as they have become, for now,
architecture-independent functions.
. int86, sdevio, readbios, and iopenable are now i386-specific kernel calls
and live in arch/i386/do_* now.
. i386 arch now supports even less 86 code; e.g. mpx86.s and klib86.s have
gone, and 'machine.protected' is gone (and always taken to be 1 in i386).
If 86 support is to return, it should be a new architecture.
. prototypes for the architecture-dependent functions defined in
kernel/arch/$(ARCH)/*.c but used in kernel/ are in kernel/proto.h
. /etc/make.conf included in makefiles and shell scripts that need to
know the building architecture; it defines ARCH=<arch>, currently only
i386.
. some basic per-architecture build support outside of the kernel (lib)
. in clock.c, only dequeue a process if it was ready
. fixes for new include files
files deleted:
. mpx/klib.s - only for choosing between mpx/klib86 and -386
. klib86.s - only for 86
i386-specific files files moved (or arch-dependent stuff moved) to arch/i386/:
. mpx386.s (entry point)
. klib386.s
. sconst.h
. exception.c
. protect.c
. protect.h
. i8269.c
2006-12-22 16:22:27 +01:00
|
|
|
|
|
|
|
|
2005-07-14 17:12:12 +02:00
|
|
|
#if USE_GETINFO
|
|
|
|
|
2005-04-21 16:53:53 +02:00
|
|
|
/*===========================================================================*
|
|
|
|
* do_getinfo *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC int do_getinfo(m_ptr)
|
|
|
|
register message *m_ptr; /* pointer to request message */
|
|
|
|
{
|
2005-07-21 20:36:40 +02:00
|
|
|
/* Request system information to be copied to caller's address space. This
|
|
|
|
* call simply copies entire data structures to the caller.
|
|
|
|
*/
|
2005-04-21 16:53:53 +02:00
|
|
|
size_t length;
|
2008-11-19 13:26:10 +01:00
|
|
|
vir_bytes src_vir;
|
2008-12-11 15:15:23 +01:00
|
|
|
int proc_nr, nr_e, nr;
|
2008-11-19 13:26:10 +01:00
|
|
|
struct proc *caller;
|
|
|
|
phys_bytes ph;
|
2009-04-02 17:24:44 +02:00
|
|
|
int wipe_rnd_bin = -1;
|
2008-11-19 13:26:10 +01:00
|
|
|
|
|
|
|
caller = proc_addr(who_p);
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-07-19 14:21:36 +02:00
|
|
|
/* Set source address and length based on request type. */
|
2007-04-23 15:28:14 +02:00
|
|
|
switch (m_ptr->I_REQUEST) {
|
2005-04-29 17:36:43 +02:00
|
|
|
case GET_MACHINE: {
|
2005-07-19 14:21:36 +02:00
|
|
|
length = sizeof(struct machine);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) &machine;
|
2005-07-19 14:21:36 +02:00
|
|
|
break;
|
2005-04-29 17:36:43 +02:00
|
|
|
}
|
|
|
|
case GET_KINFO: {
|
2005-07-19 14:21:36 +02:00
|
|
|
length = sizeof(struct kinfo);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) &kinfo;
|
2005-07-19 14:21:36 +02:00
|
|
|
break;
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
2005-11-14 16:50:46 +01:00
|
|
|
case GET_LOADINFO: {
|
|
|
|
length = sizeof(struct loadinfo);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) &kloadinfo;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case GET_HZ: {
|
2008-12-11 15:15:23 +01:00
|
|
|
length = sizeof(system_hz);
|
|
|
|
src_vir = (vir_bytes) &system_hz;
|
2005-11-14 16:50:46 +01:00
|
|
|
break;
|
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
case GET_IMAGE: {
|
2005-07-29 17:26:23 +02:00
|
|
|
length = sizeof(struct boot_image) * NR_BOOT_PROCS;
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) image;
|
2005-04-21 16:53:53 +02:00
|
|
|
break;
|
|
|
|
}
|
2005-05-02 16:30:04 +02:00
|
|
|
case GET_IRQHOOKS: {
|
2005-07-19 14:21:36 +02:00
|
|
|
length = sizeof(struct irq_hook) * NR_IRQ_HOOKS;
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) irq_hooks;
|
2005-04-21 16:53:53 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case GET_SCHEDINFO: {
|
|
|
|
/* This is slightly complicated because we need two data structures
|
|
|
|
* at once, otherwise the scheduling information may be incorrect.
|
|
|
|
* Copy the queue heads and fall through to copy the process table.
|
|
|
|
*/
|
2008-11-19 13:26:10 +01:00
|
|
|
if((ph=umap_local(caller, D, (vir_bytes) m_ptr->I_VAL_PTR2,length)) == 0)
|
|
|
|
return EFAULT;
|
2005-04-21 16:53:53 +02:00
|
|
|
length = sizeof(struct proc *) * NR_SCHED_QUEUES;
|
2008-11-19 13:26:10 +01:00
|
|
|
CHECKRANGE_OR_SUSPEND(proc_addr(who_p), ph, length, 1);
|
|
|
|
data_copy(SYSTEM, (vir_bytes) rdy_head,
|
|
|
|
who_e, (vir_bytes) m_ptr->I_VAL_PTR2, length);
|
|
|
|
/* fall through to GET_PROCTAB */
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
case GET_PROCTAB: {
|
2005-07-19 14:21:36 +02:00
|
|
|
length = sizeof(struct proc) * (NR_PROCS + NR_TASKS);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) proc;
|
2005-04-21 16:53:53 +02:00
|
|
|
break;
|
|
|
|
}
|
2005-07-14 17:12:12 +02:00
|
|
|
case GET_PRIVTAB: {
|
2005-07-19 14:21:36 +02:00
|
|
|
length = sizeof(struct priv) * (NR_SYS_PROCS);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) priv;
|
2005-07-14 17:12:12 +02:00
|
|
|
break;
|
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
case GET_PROC: {
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
nr_e = (m_ptr->I_VAL_LEN2_E == SELF) ?
|
2008-11-19 13:26:10 +01:00
|
|
|
who_e : m_ptr->I_VAL_LEN2_E;
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
if(!isokendpt(nr_e, &nr)) return EINVAL; /* validate request */
|
2005-07-19 14:21:36 +02:00
|
|
|
length = sizeof(struct proc);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) proc_addr(nr);
|
2005-04-21 16:53:53 +02:00
|
|
|
break;
|
|
|
|
}
|
2008-11-19 13:26:10 +01:00
|
|
|
case GET_WHOAMI: {
|
|
|
|
int len;
|
|
|
|
/* GET_WHOAMI uses m3 and only uses the message contents for info. */
|
2008-12-11 15:15:23 +01:00
|
|
|
m_ptr->GIWHO_EP = caller->p_endpoint;
|
2008-11-19 13:26:10 +01:00
|
|
|
len = MIN(sizeof(m_ptr->GIWHO_NAME), sizeof(caller->p_name))-1;
|
|
|
|
strncpy(m_ptr->GIWHO_NAME, caller->p_name, len);
|
|
|
|
m_ptr->GIWHO_NAME[len] = '\0';
|
|
|
|
return OK;
|
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
case GET_MONPARAMS: {
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) params_buffer;
|
|
|
|
length = sizeof(params_buffer);
|
2005-07-19 14:21:36 +02:00
|
|
|
break;
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
2005-06-03 15:55:06 +02:00
|
|
|
case GET_RANDOMNESS: {
|
2009-04-02 17:24:44 +02:00
|
|
|
static struct k_randomness copy; /* copy to keep counters */
|
2005-07-18 17:40:24 +02:00
|
|
|
int i;
|
|
|
|
|
|
|
|
copy = krandom;
|
|
|
|
for (i= 0; i<RANDOM_SOURCES; i++) {
|
|
|
|
krandom.bin[i].r_size = 0; /* invalidate random data */
|
|
|
|
krandom.bin[i].r_next = 0;
|
|
|
|
}
|
2009-04-02 17:24:44 +02:00
|
|
|
length = sizeof(copy);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) ©
|
2005-06-03 15:55:06 +02:00
|
|
|
break;
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
2009-04-02 17:24:44 +02:00
|
|
|
case GET_RANDOMNESS_BIN: {
|
|
|
|
int i, bin = m_ptr->I_VAL_LEN2_E;
|
|
|
|
|
|
|
|
if(bin < 0 || bin >= RANDOM_SOURCES) {
|
|
|
|
kprintf("SYSTEM: GET_RANDOMNESS_BIN: %d out of range\n", bin);
|
|
|
|
return EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(krandom.bin[bin].r_size < RANDOM_ELEMENTS)
|
|
|
|
return ENOENT;
|
|
|
|
|
|
|
|
length = sizeof(krandom.bin[bin]);
|
|
|
|
src_vir = (vir_bytes) &krandom.bin[bin];
|
|
|
|
|
|
|
|
wipe_rnd_bin = bin;
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
case GET_KMESSAGES: {
|
|
|
|
length = sizeof(struct kmessages);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) &kmess;
|
2005-04-21 16:53:53 +02:00
|
|
|
break;
|
|
|
|
}
|
2005-07-14 17:12:12 +02:00
|
|
|
#if DEBUG_TIME_LOCKS
|
2005-06-01 11:37:52 +02:00
|
|
|
case GET_LOCKTIMING: {
|
2005-07-19 14:21:36 +02:00
|
|
|
length = sizeof(timingdata);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) timingdata;
|
2005-07-19 14:21:36 +02:00
|
|
|
break;
|
2005-06-01 11:37:52 +02:00
|
|
|
}
|
|
|
|
#endif
|
Split of architecture-dependent and -independent functions for i386,
mainly in the kernel and headers. This split based on work by
Ingmar Alting <iaalting@cs.vu.nl> done for his Minix PowerPC architecture
port.
. kernel does not program the interrupt controller directly, do any
other architecture-dependent operations, or contain assembly any more,
but uses architecture-dependent functions in arch/$(ARCH)/.
. architecture-dependent constants and types defined in arch/$(ARCH)/include.
. <ibm/portio.h> moved to <minix/portio.h>, as they have become, for now,
architecture-independent functions.
. int86, sdevio, readbios, and iopenable are now i386-specific kernel calls
and live in arch/i386/do_* now.
. i386 arch now supports even less 86 code; e.g. mpx86.s and klib86.s have
gone, and 'machine.protected' is gone (and always taken to be 1 in i386).
If 86 support is to return, it should be a new architecture.
. prototypes for the architecture-dependent functions defined in
kernel/arch/$(ARCH)/*.c but used in kernel/ are in kernel/proto.h
. /etc/make.conf included in makefiles and shell scripts that need to
know the building architecture; it defines ARCH=<arch>, currently only
i386.
. some basic per-architecture build support outside of the kernel (lib)
. in clock.c, only dequeue a process if it was ready
. fixes for new include files
files deleted:
. mpx/klib.s - only for choosing between mpx/klib86 and -386
. klib86.s - only for 86
i386-specific files files moved (or arch-dependent stuff moved) to arch/i386/:
. mpx386.s (entry point)
. klib386.s
. sconst.h
. exception.c
. protect.c
. protect.h
. i8269.c
2006-12-22 16:22:27 +01:00
|
|
|
|
2006-01-12 15:38:51 +01:00
|
|
|
case GET_IRQACTIDS: {
|
|
|
|
length = sizeof(irq_actids);
|
2008-11-19 13:26:10 +01:00
|
|
|
src_vir = (vir_bytes) irq_actids;
|
2006-01-12 15:38:51 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2007-04-23 15:28:14 +02:00
|
|
|
case GET_PRIVID:
|
|
|
|
if (!isokendpt(m_ptr->I_VAL_LEN2_E, &proc_nr))
|
|
|
|
return EINVAL;
|
|
|
|
return proc_addr(proc_nr)->p_priv->s_id;
|
|
|
|
|
2005-04-21 16:53:53 +02:00
|
|
|
default:
|
2007-04-23 15:28:14 +02:00
|
|
|
kprintf("do_getinfo: invalid request %d\n", m_ptr->I_REQUEST);
|
2005-04-21 16:53:53 +02:00
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try to make the actual copy for the requested data. */
|
|
|
|
if (m_ptr->I_VAL_LEN > 0 && length > m_ptr->I_VAL_LEN) return (E2BIG);
|
2008-11-19 13:26:10 +01:00
|
|
|
if((ph=umap_local(caller, D, (vir_bytes) m_ptr->I_VAL_PTR,length)) == 0)
|
|
|
|
return EFAULT;
|
|
|
|
CHECKRANGE_OR_SUSPEND(caller, ph, length, 1);
|
2009-04-02 17:24:44 +02:00
|
|
|
if(data_copy(SYSTEM, src_vir, who_e, (vir_bytes) m_ptr->I_VAL_PTR, length) == OK) {
|
|
|
|
if(wipe_rnd_bin >= 0 && wipe_rnd_bin < RANDOM_SOURCES) {
|
|
|
|
krandom.bin[wipe_rnd_bin].r_size = 0;
|
|
|
|
krandom.bin[wipe_rnd_bin].r_next = 0;
|
|
|
|
}
|
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|
2005-07-14 17:12:12 +02:00
|
|
|
#endif /* USE_GETINFO */
|
2005-04-21 16:53:53 +02:00
|
|
|
|