2005-10-14 10:58:59 +02:00
|
|
|
/* The kernel call implemented in this file:
|
2005-07-22 11:20:43 +02:00
|
|
|
* m_type: SYS_PRIVCTL
|
|
|
|
*
|
2005-10-14 10:58:59 +02:00
|
|
|
* The parameters for this kernel call are:
|
2009-09-06 14:37:13 +02:00
|
|
|
* m2_i1: CTL_ENDPT (process endpoint of target)
|
|
|
|
* m2_i2: CTL_REQUEST (privilege control request)
|
|
|
|
* m2_p1: CTL_ARG_PTR (pointer to request data)
|
2005-07-22 11:20:43 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "../system.h"
|
|
|
|
#include "../ipc.h"
|
2005-08-02 17:28:09 +02:00
|
|
|
#include <signal.h>
|
2006-10-30 16:53:38 +01:00
|
|
|
#include <string.h>
|
2005-07-22 11:20:43 +02:00
|
|
|
|
|
|
|
#if USE_PRIVCTL
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* do_privctl *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC int do_privctl(m_ptr)
|
|
|
|
message *m_ptr; /* pointer to request message */
|
|
|
|
{
|
|
|
|
/* Handle sys_privctl(). Update a process' privileges. If the process is not
|
|
|
|
* yet a system process, make sure it gets its own privilege structure.
|
|
|
|
*/
|
2005-08-02 17:28:09 +02:00
|
|
|
register struct proc *caller_ptr;
|
2005-07-22 11:20:43 +02:00
|
|
|
register struct proc *rp;
|
|
|
|
int proc_nr;
|
2005-08-02 17:28:09 +02:00
|
|
|
int priv_id;
|
2009-12-11 01:08:19 +01:00
|
|
|
int ipc_to_m, kcalls;
|
2008-11-19 13:26:10 +01:00
|
|
|
int i, r;
|
2006-01-27 14:21:12 +01:00
|
|
|
struct io_range io_range;
|
|
|
|
struct mem_range mem_range;
|
2006-10-20 16:42:48 +02:00
|
|
|
struct priv priv;
|
2009-09-06 14:37:13 +02:00
|
|
|
int irq;
|
2005-07-22 11:20:43 +02:00
|
|
|
|
2005-08-02 17:28:09 +02:00
|
|
|
/* Check whether caller is allowed to make this call. Privileged proceses
|
|
|
|
* can only update the privileges of processes that are inhibited from
|
2009-11-10 10:11:13 +01:00
|
|
|
* running by the RTS_NO_PRIV flag. This flag is set when a privileged process
|
2005-08-02 17:28:09 +02:00
|
|
|
* forks.
|
|
|
|
*/
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
caller_ptr = proc_addr(who_p);
|
2005-08-02 17:28:09 +02:00
|
|
|
if (! (priv(caller_ptr)->s_flags & SYS_PROC)) return(EPERM);
|
2009-09-06 14:37:13 +02:00
|
|
|
if(m_ptr->CTL_ENDPT == SELF) proc_nr = who_p;
|
|
|
|
else if(!isokendpt(m_ptr->CTL_ENDPT, &proc_nr)) return(EINVAL);
|
2005-07-22 11:20:43 +02:00
|
|
|
rp = proc_addr(proc_nr);
|
|
|
|
|
2006-01-27 14:21:12 +01:00
|
|
|
switch(m_ptr->CTL_REQUEST)
|
|
|
|
{
|
2009-12-11 01:08:19 +01:00
|
|
|
case SYS_PRIV_ALLOW:
|
|
|
|
/* Allow process to run. Make sure its privilege structure has already
|
|
|
|
* been set.
|
|
|
|
*/
|
|
|
|
if (!RTS_ISSET(rp, RTS_NO_PRIV) || priv(rp)->s_proc_nr == NONE) {
|
|
|
|
return(EPERM);
|
|
|
|
}
|
|
|
|
RTS_LOCK_UNSET(rp, RTS_NO_PRIV);
|
|
|
|
return(OK);
|
|
|
|
|
|
|
|
case SYS_PRIV_DISALLOW:
|
|
|
|
/* Disallow process from running. */
|
|
|
|
if (RTS_ISSET(rp, RTS_NO_PRIV)) return(EPERM);
|
|
|
|
RTS_LOCK_SET(rp, RTS_NO_PRIV);
|
|
|
|
return(OK);
|
|
|
|
|
|
|
|
case SYS_PRIV_SET_SYS:
|
|
|
|
/* Set a privilege structure of a blocked system process. */
|
2009-11-10 10:11:13 +01:00
|
|
|
if (! RTS_ISSET(rp, RTS_NO_PRIV)) return(EPERM);
|
2005-07-26 14:48:34 +02:00
|
|
|
|
2009-12-11 01:08:19 +01:00
|
|
|
/* Check whether a static or dynamic privilege id must be allocated. */
|
|
|
|
priv_id = NULL_PRIV_ID;
|
|
|
|
if (m_ptr->CTL_ARG_PTR)
|
|
|
|
{
|
|
|
|
/* Copy privilege structure from caller */
|
|
|
|
if((r=data_copy(who_e, (vir_bytes) m_ptr->CTL_ARG_PTR,
|
|
|
|
SYSTEM, (vir_bytes) &priv, sizeof(priv))) != OK)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
/* See if the caller wants to assign a static privilege id. */
|
|
|
|
if(!(priv.s_flags & DYN_PRIV_ID)) {
|
|
|
|
priv_id = priv.s_id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-01-27 14:21:12 +01:00
|
|
|
/* Make sure this process has its own privileges structure. This may
|
|
|
|
* fail, since there are only a limited number of system processes.
|
2009-12-11 01:08:19 +01:00
|
|
|
* Then copy privileges from the caller and restore some defaults.
|
2006-01-27 14:21:12 +01:00
|
|
|
*/
|
2009-12-11 01:08:19 +01:00
|
|
|
if ((i=get_priv(rp, priv_id)) != OK)
|
2008-02-22 11:58:27 +01:00
|
|
|
{
|
2009-12-11 01:08:19 +01:00
|
|
|
kprintf("do_privctl: unable to allocate priv_id %d: %d\n",
|
|
|
|
priv_id, i);
|
2008-02-22 11:58:27 +01:00
|
|
|
return(i);
|
|
|
|
}
|
2006-01-27 14:21:12 +01:00
|
|
|
priv_id = priv(rp)->s_id; /* backup privilege id */
|
|
|
|
*priv(rp) = *priv(caller_ptr); /* copy from caller */
|
|
|
|
priv(rp)->s_id = priv_id; /* restore privilege id */
|
|
|
|
priv(rp)->s_proc_nr = proc_nr; /* reassociate process nr */
|
|
|
|
|
|
|
|
for (i=0; i< BITMAP_CHUNKS(NR_SYS_PROCS); i++) /* remove pending: */
|
|
|
|
priv(rp)->s_notify_pending.chunk[i] = 0; /* - notifications */
|
|
|
|
priv(rp)->s_int_pending = 0; /* - interrupts */
|
|
|
|
sigemptyset(&priv(rp)->s_sig_pending); /* - signals */
|
|
|
|
|
2009-12-11 01:08:19 +01:00
|
|
|
/* Set defaults for privilege bitmaps. */
|
|
|
|
priv(rp)->s_flags= DEF_SYS_F; /* privilege flags */
|
|
|
|
priv(rp)->s_trap_mask= DEF_SYS_T; /* allowed traps */
|
|
|
|
ipc_to_m = DEF_SYS_M; /* allowed targets */
|
|
|
|
kcalls = DEF_SYS_KC; /* allowed kernel calls */
|
|
|
|
for(i = 0; i < CALL_MASK_SIZE; i++) {
|
|
|
|
priv(rp)->s_k_call_mask[i] = (kcalls == NO_C ? 0 : (~0));
|
2007-04-23 15:30:04 +02:00
|
|
|
}
|
|
|
|
|
2009-12-11 01:08:19 +01:00
|
|
|
/* Set defaults for resources: no I/O resources, no memory resources,
|
|
|
|
* no IRQs, no grant table
|
|
|
|
*/
|
2006-01-27 14:21:12 +01:00
|
|
|
priv(rp)->s_nr_io_range= 0;
|
|
|
|
priv(rp)->s_nr_mem_range= 0;
|
|
|
|
priv(rp)->s_nr_irq= 0;
|
2006-06-20 12:03:10 +02:00
|
|
|
priv(rp)->s_grant_table= 0;
|
|
|
|
priv(rp)->s_grant_entries= 0;
|
2006-01-27 14:21:12 +01:00
|
|
|
|
2009-12-11 01:08:19 +01:00
|
|
|
/* Override defaults if the caller has supplied a privilege structure. */
|
2006-10-20 16:42:48 +02:00
|
|
|
if (m_ptr->CTL_ARG_PTR)
|
|
|
|
{
|
2009-12-11 01:08:19 +01:00
|
|
|
/* Copy s_flags. */
|
|
|
|
priv(rp)->s_flags = priv.s_flags;
|
2006-10-20 16:42:48 +02:00
|
|
|
|
|
|
|
/* Copy IRQs */
|
2009-12-11 01:08:19 +01:00
|
|
|
if(priv.s_flags & CHECK_IRQ) {
|
|
|
|
if (priv.s_nr_irq < 0 || priv.s_nr_irq > NR_IRQ)
|
|
|
|
return EINVAL;
|
|
|
|
priv(rp)->s_nr_irq= priv.s_nr_irq;
|
|
|
|
for (i= 0; i<priv.s_nr_irq; i++)
|
|
|
|
{
|
|
|
|
priv(rp)->s_irq_tab[i]= priv.s_irq_tab[i];
|
2007-02-16 16:53:10 +01:00
|
|
|
#if 0
|
2009-12-11 01:08:19 +01:00
|
|
|
kprintf("do_privctl: adding IRQ %d for %d\n",
|
|
|
|
priv(rp)->s_irq_tab[i], rp->p_endpoint);
|
2007-02-16 16:53:10 +01:00
|
|
|
#endif
|
2009-12-11 01:08:19 +01:00
|
|
|
}
|
2006-10-20 16:42:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy I/O ranges */
|
2009-12-11 01:08:19 +01:00
|
|
|
if(priv.s_flags & CHECK_IO_PORT) {
|
|
|
|
if (priv.s_nr_io_range < 0 || priv.s_nr_io_range > NR_IO_RANGE)
|
|
|
|
return EINVAL;
|
|
|
|
priv(rp)->s_nr_io_range= priv.s_nr_io_range;
|
|
|
|
for (i= 0; i<priv.s_nr_io_range; i++)
|
|
|
|
{
|
|
|
|
priv(rp)->s_io_tab[i]= priv.s_io_tab[i];
|
|
|
|
#if 0
|
|
|
|
kprintf("do_privctl: adding I/O range [%x..%x] for %d\n",
|
|
|
|
priv(rp)->s_io_tab[i].ior_base,
|
|
|
|
priv(rp)->s_io_tab[i].ior_limit,
|
|
|
|
rp->p_endpoint);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy memory ranges */
|
|
|
|
if(priv.s_flags & CHECK_MEM) {
|
|
|
|
if (priv.s_nr_mem_range < 0 || priv.s_nr_mem_range > NR_MEM_RANGE)
|
|
|
|
return EINVAL;
|
|
|
|
priv(rp)->s_nr_mem_range= priv.s_nr_mem_range;
|
|
|
|
for (i= 0; i<priv.s_nr_mem_range; i++)
|
|
|
|
{
|
|
|
|
priv(rp)->s_mem_tab[i]= priv.s_mem_tab[i];
|
2007-03-30 17:17:03 +02:00
|
|
|
#if 0
|
2009-12-11 01:08:19 +01:00
|
|
|
kprintf("do_privctl: adding mem range [%x..%x] for %d\n",
|
|
|
|
priv(rp)->s_mem_tab[i].mr_base,
|
|
|
|
priv(rp)->s_mem_tab[i].mr_limit,
|
|
|
|
rp->p_endpoint);
|
2007-03-30 17:17:03 +02:00
|
|
|
#endif
|
2009-12-11 01:08:19 +01:00
|
|
|
}
|
2006-10-20 16:42:48 +02:00
|
|
|
}
|
|
|
|
|
2009-12-11 01:08:19 +01:00
|
|
|
/* Copy trap mask. */
|
|
|
|
priv(rp)->s_trap_mask = priv.s_trap_mask;
|
|
|
|
|
|
|
|
/* Copy target mask. */
|
|
|
|
memcpy(&ipc_to_m, &priv.s_ipc_to, sizeof(ipc_to_m));
|
2006-10-20 16:42:48 +02:00
|
|
|
|
2009-12-11 01:08:19 +01:00
|
|
|
/* Copy kernel call mask. */
|
2006-10-20 16:42:48 +02:00
|
|
|
memcpy(priv(rp)->s_k_call_mask, priv.s_k_call_mask,
|
|
|
|
sizeof(priv(rp)->s_k_call_mask));
|
2009-12-11 01:08:19 +01:00
|
|
|
}
|
2009-07-02 18:25:31 +02:00
|
|
|
|
2009-12-11 01:08:19 +01:00
|
|
|
/* Fill in target mask. */
|
|
|
|
for (i=0; i < NR_SYS_PROCS; i++) {
|
|
|
|
if (ipc_to_m & (1 << i))
|
|
|
|
set_sendto_bit(rp, i);
|
|
|
|
else
|
|
|
|
unset_sendto_bit(rp, i);
|
2006-10-20 16:42:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return(OK);
|
2009-12-11 01:08:19 +01:00
|
|
|
|
|
|
|
case SYS_PRIV_SET_USER:
|
|
|
|
/* Set a privilege structure of a blocked user process. */
|
2009-11-10 10:11:13 +01:00
|
|
|
if (!RTS_ISSET(rp, RTS_NO_PRIV)) return(EPERM);
|
2009-12-11 01:08:19 +01:00
|
|
|
|
|
|
|
/* Link the process to the privilege structure of the root user
|
|
|
|
* process all the user processes share.
|
|
|
|
*/
|
|
|
|
priv(rp) = priv_addr(USER_PRIV_ID);
|
|
|
|
|
2006-01-27 14:21:12 +01:00
|
|
|
return(OK);
|
2006-10-20 16:42:48 +02:00
|
|
|
|
2006-01-27 14:21:12 +01:00
|
|
|
case SYS_PRIV_ADD_IO:
|
2009-11-10 10:11:13 +01:00
|
|
|
if (RTS_ISSET(rp, RTS_NO_PRIV))
|
2006-01-27 14:21:12 +01:00
|
|
|
return(EPERM);
|
|
|
|
|
|
|
|
/* Only system processes get I/O resources? */
|
|
|
|
if (!(priv(rp)->s_flags & SYS_PROC))
|
|
|
|
return EPERM;
|
|
|
|
|
2008-02-22 11:58:27 +01:00
|
|
|
#if 0 /* XXX -- do we need a call for this? */
|
|
|
|
if (strcmp(rp->p_name, "fxp") == 0 ||
|
|
|
|
strcmp(rp->p_name, "rtl8139") == 0)
|
|
|
|
{
|
|
|
|
kprintf("setting ipc_stats_target to %d\n", rp->p_endpoint);
|
|
|
|
ipc_stats_target= rp->p_endpoint;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2006-01-27 14:21:12 +01:00
|
|
|
/* Get the I/O range */
|
2008-11-19 13:26:10 +01:00
|
|
|
data_copy(who_e, (vir_bytes) m_ptr->CTL_ARG_PTR,
|
|
|
|
SYSTEM, (vir_bytes) &io_range, sizeof(io_range));
|
2006-01-27 14:21:12 +01:00
|
|
|
priv(rp)->s_flags |= CHECK_IO_PORT; /* Check I/O accesses */
|
|
|
|
i= priv(rp)->s_nr_io_range;
|
|
|
|
if (i >= NR_IO_RANGE)
|
|
|
|
return ENOMEM;
|
|
|
|
|
|
|
|
priv(rp)->s_io_tab[i].ior_base= io_range.ior_base;
|
|
|
|
priv(rp)->s_io_tab[i].ior_limit= io_range.ior_limit;
|
|
|
|
priv(rp)->s_nr_io_range++;
|
|
|
|
|
|
|
|
return OK;
|
2005-08-02 17:28:09 +02:00
|
|
|
|
2006-01-27 14:21:12 +01:00
|
|
|
case SYS_PRIV_ADD_MEM:
|
2009-11-10 10:11:13 +01:00
|
|
|
if (RTS_ISSET(rp, RTS_NO_PRIV))
|
2006-01-27 14:21:12 +01:00
|
|
|
return(EPERM);
|
|
|
|
|
|
|
|
/* Only system processes get memory resources? */
|
|
|
|
if (!(priv(rp)->s_flags & SYS_PROC))
|
|
|
|
return EPERM;
|
|
|
|
|
|
|
|
/* Get the memory range */
|
2008-11-19 13:26:10 +01:00
|
|
|
if((r=data_copy(who_e, (vir_bytes) m_ptr->CTL_ARG_PTR,
|
|
|
|
SYSTEM, (vir_bytes) &mem_range, sizeof(mem_range))) != OK)
|
|
|
|
return r;
|
2009-11-03 12:12:23 +01:00
|
|
|
priv(rp)->s_flags |= CHECK_MEM; /* Check memory mappings */
|
2006-01-27 14:21:12 +01:00
|
|
|
i= priv(rp)->s_nr_mem_range;
|
|
|
|
if (i >= NR_MEM_RANGE)
|
|
|
|
return ENOMEM;
|
|
|
|
|
|
|
|
priv(rp)->s_mem_tab[i].mr_base= mem_range.mr_base;
|
|
|
|
priv(rp)->s_mem_tab[i].mr_limit= mem_range.mr_limit;
|
|
|
|
priv(rp)->s_nr_mem_range++;
|
|
|
|
|
|
|
|
return OK;
|
|
|
|
|
|
|
|
case SYS_PRIV_ADD_IRQ:
|
2009-11-10 10:11:13 +01:00
|
|
|
if (RTS_ISSET(rp, RTS_NO_PRIV))
|
2006-01-27 14:21:12 +01:00
|
|
|
return(EPERM);
|
|
|
|
|
|
|
|
/* Only system processes get IRQs? */
|
|
|
|
if (!(priv(rp)->s_flags & SYS_PROC))
|
|
|
|
return EPERM;
|
|
|
|
|
2009-09-06 14:37:13 +02:00
|
|
|
data_copy(who_e, (vir_bytes) m_ptr->CTL_ARG_PTR,
|
|
|
|
SYSTEM, (vir_bytes) &irq, sizeof(irq));
|
2006-01-27 14:21:12 +01:00
|
|
|
priv(rp)->s_flags |= CHECK_IRQ; /* Check IRQs */
|
|
|
|
|
|
|
|
i= priv(rp)->s_nr_irq;
|
|
|
|
if (i >= NR_IRQ)
|
|
|
|
return ENOMEM;
|
2009-09-06 14:37:13 +02:00
|
|
|
priv(rp)->s_irq_tab[i]= irq;
|
2006-01-27 14:21:12 +01:00
|
|
|
priv(rp)->s_nr_irq++;
|
|
|
|
|
|
|
|
return OK;
|
2009-11-03 12:12:23 +01:00
|
|
|
case SYS_PRIV_QUERY_MEM:
|
|
|
|
{
|
|
|
|
phys_bytes addr, limit;
|
|
|
|
struct priv *sp;
|
|
|
|
/* See if a certain process is allowed to map in certain physical
|
|
|
|
* memory.
|
|
|
|
*/
|
|
|
|
addr = (phys_bytes) m_ptr->CTL_PHYSSTART;
|
|
|
|
limit = addr + (phys_bytes) m_ptr->CTL_PHYSLEN - 1;
|
|
|
|
if(limit < addr)
|
|
|
|
return EPERM;
|
|
|
|
if(!(sp = priv(rp)))
|
|
|
|
return EPERM;
|
|
|
|
if (!(sp->s_flags & SYS_PROC))
|
|
|
|
return EPERM;
|
|
|
|
for(i = 0; i < sp->s_nr_mem_range; i++) {
|
|
|
|
if(addr >= sp->s_mem_tab[i].mr_base &&
|
|
|
|
limit <= sp->s_mem_tab[i].mr_limit)
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
return EPERM;
|
|
|
|
}
|
2006-01-27 14:21:12 +01:00
|
|
|
default:
|
|
|
|
kprintf("do_privctl: bad request %d\n", m_ptr->CTL_REQUEST);
|
|
|
|
return EINVAL;
|
|
|
|
}
|
2005-07-22 11:20:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* USE_PRIVCTL */
|
|
|
|
|