2005-04-21 16:53:53 +02:00
|
|
|
/* this file contains the interface of the network software with rest of
|
|
|
|
minix. Furthermore it contains the main loop of the network task.
|
|
|
|
|
|
|
|
Copyright 1995 Philip Homburg
|
|
|
|
|
|
|
|
The valid messages and their parameters are:
|
|
|
|
|
|
|
|
from FS:
|
|
|
|
__________________________________________________________________
|
|
|
|
| | | | | | |
|
|
|
|
| m_type | DEVICE | PROC_NR | COUNT | POSITION | ADDRESS |
|
|
|
|
|_______________|___________|_________|_______|__________|_________|
|
|
|
|
| | | | | | |
|
2011-11-11 13:53:29 +01:00
|
|
|
| DEV_OPEN | minor dev | proc nr | mode | | |
|
2005-04-21 16:53:53 +02:00
|
|
|
|_______________|___________|_________|_______|__________|_________|
|
|
|
|
| | | | | | |
|
2011-11-11 13:53:29 +01:00
|
|
|
| DEV_CLOSE | minor dev | proc nr | | | |
|
2005-04-21 16:53:53 +02:00
|
|
|
|_______________|___________|_________|_______|__________|_________|
|
|
|
|
| | | | | | |
|
2011-11-11 13:53:29 +01:00
|
|
|
| DEV_IOCTL_S | minor dev | proc nr | | NWIO.. | address |
|
2005-04-21 16:53:53 +02:00
|
|
|
|_______________|___________|_________|_______|__________|_________|
|
|
|
|
| | | | | | |
|
2011-11-11 13:53:29 +01:00
|
|
|
| DEV_READ_S | minor dev | proc nr | count | | address |
|
2005-04-21 16:53:53 +02:00
|
|
|
|_______________|___________|_________|_______|__________|_________|
|
|
|
|
| | | | | | |
|
2011-11-11 13:53:29 +01:00
|
|
|
| DEV_WRITE_S | minor dev | proc nr | count | | address |
|
2005-04-21 16:53:53 +02:00
|
|
|
|_______________|___________|_________|_______|__________|_________|
|
|
|
|
| | | | | | |
|
2011-11-11 13:53:29 +01:00
|
|
|
| CANCEL | minor dev | proc nr | | | |
|
2005-04-21 16:53:53 +02:00
|
|
|
|_______________|___________|_________|_______|__________|_________|
|
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
from DL_ETH:
|
2010-05-18 00:22:53 +02:00
|
|
|
(not documented here)
|
2005-04-21 16:53:53 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "inet.h"
|
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
#define _MINIX_SOURCE 1
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
#include <fcntl.h>
|
2005-04-21 16:53:53 +02:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/svrctl.h>
|
2007-05-02 13:30:16 +02:00
|
|
|
#include <minix/ds.h>
|
2009-09-29 20:47:56 +02:00
|
|
|
#include <minix/endpoint.h>
|
Split block/character protocols and libdriver
This patch separates the character and block driver communication
protocols. The old character protocol remains the same, but a new
block protocol is introduced. The libdriver library is replaced by
two new libraries: libchardriver and libblockdriver. Their exposed
API, and drivers that use them, have been updated accordingly.
Together, libbdev and libblockdriver now completely abstract away
the message format used by the block protocol. As the memory driver
is both a character and a block device driver, it now implements its
own message loop.
The most important semantic change made to the block protocol is that
it is no longer possible to return both partial results and an error
for a single transfer. This simplifies the interaction between the
caller and the driver, as the I/O vector no longer needs to be copied
back. Also, drivers are now no longer supposed to decide based on the
layout of the I/O vector when a transfer should be cut short. Put
simply, transfers are now supposed to either succeed completely, or
result in an error.
After this patch, the state of the various pieces is as follows:
- block protocol: stable
- libbdev API: stable for synchronous communication
- libblockdriver API: needs slight revision (the drvlib/partition API
in particular; the threading API will also change shortly)
- character protocol: needs cleanup
- libchardriver API: needs cleanup accordingly
- driver restarts: largely unsupported until endpoint changes are
reintroduced
As a side effect, this patch eliminates several bugs, hacks, and gcc
-Wall and -W warnings all over the place. It probably introduces a
few new ones, too.
Update warning: this patch changes the protocol between MFS and disk
drivers, so in order to use old/new images, the MFS from the ramdisk
must be used to mount all file systems.
2011-11-22 13:27:53 +01:00
|
|
|
#include <minix/chardriver.h>
|
2012-01-27 15:21:10 +01:00
|
|
|
#include <minix/rs.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <pwd.h>
|
2005-04-21 16:53:53 +02:00
|
|
|
|
|
|
|
#include "mq.h"
|
2005-06-28 17:19:58 +02:00
|
|
|
#include "qp.h"
|
2005-04-21 16:53:53 +02:00
|
|
|
#include "proto.h"
|
|
|
|
#include "generic/type.h"
|
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
#include "generic/arp.h"
|
2005-04-21 16:53:53 +02:00
|
|
|
#include "generic/assert.h"
|
|
|
|
#include "generic/buf.h"
|
|
|
|
#include "generic/clock.h"
|
|
|
|
#include "generic/eth.h"
|
|
|
|
#include "generic/event.h"
|
|
|
|
#include "generic/ip.h"
|
|
|
|
#include "generic/psip.h"
|
2005-06-28 17:19:58 +02:00
|
|
|
#include "generic/rand256.h"
|
2005-04-21 16:53:53 +02:00
|
|
|
#include "generic/sr.h"
|
|
|
|
#include "generic/tcp.h"
|
|
|
|
#include "generic/udp.h"
|
|
|
|
|
|
|
|
THIS_FILE
|
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
#define RANDOM_DEV_NAME "/dev/random"
|
|
|
|
|
2010-03-30 16:07:15 +02:00
|
|
|
endpoint_t this_proc; /* Process number of this server. */
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
/* Killing Solaris */
|
|
|
|
int killer_inet= 0;
|
|
|
|
|
2005-04-21 16:53:53 +02:00
|
|
|
#ifdef BUF_CONSISTENCY_CHECK
|
|
|
|
extern int inet_buf_debug;
|
|
|
|
#endif
|
|
|
|
|
2008-12-11 15:54:42 +01:00
|
|
|
#if HZ_DYNAMIC
|
|
|
|
u32_t system_hz;
|
|
|
|
#endif
|
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
FORWARD _PROTOTYPE( void nw_conf, (void) );
|
2005-04-21 16:53:53 +02:00
|
|
|
FORWARD _PROTOTYPE( void nw_init, (void) );
|
2010-04-08 15:41:35 +02:00
|
|
|
FORWARD _PROTOTYPE( void ds_event, (void) );
|
2005-04-21 16:53:53 +02:00
|
|
|
|
Basic System Event Framework (SEF) with ping and live update.
SYSLIB CHANGES:
- SEF must be used by every system process and is thereby part of the system
library.
- The framework provides a receive() interface (sef_receive) for system
processes to automatically catch known system even messages and process them.
- SEF provides a default behavior for each type of system event, but allows
system processes to register callbacks to override the default behavior.
- Custom (local to the process) or predefined (provided by SEF) callback
implementations can be registered to SEF.
- SEF currently includes support for 2 types of system events:
1. SEF Ping. The event occurs every time RS sends a ping to figure out
whether a system process is still alive. The default callback implementation
provided by SEF is to notify RS back to let it know the process is alive
and kicking.
2. SEF Live update. The event occurs every time RS sends a prepare to update
message to let a system process know an update is available and to prepare
for it. The live update support is very basic for now. SEF only deals with
verifying if the prepare state can be supported by the process, dumping the
state for debugging purposes, and providing an event-driven programming
model to the process to react to state changes check-in when ready to update.
- SEF should be extended in the future to integrate support for more types of
system events. Ideally, all the cross-cutting concerns should be integrated into
SEF to avoid duplicating code and ease extensibility. Examples include:
* PM notify messages primarily used at shutdown.
* SYSTEM notify messages primarily used for signals.
* CLOCK notify messages used for system alarms.
* Debug messages. IS could still be in charge of fkey handling but would
forward the debug message to the target process (e.g. PM, if the user
requested debug information about PM). SEF would then catch the message and
do nothing unless the process has registered an appropriate callback to
deal with the event. This simplifies the programming model to print debug
information, avoids duplicating code, and reduces the effort to print
debug information.
SYSTEM PROCESSES CHANGES:
- Every system process registers SEF callbacks it needs to override the default
system behavior and calls sef_startup() right after being started.
- sef_startup() does almost nothing now, but will be extended in the future to
support callbacks of its own to let RS control and synchronize with every
system process at initialization time.
- Every system process calls sef_receive() now rather than receive() directly,
to let SEF handle predefined system events.
RS CHANGES:
- RS supports a basic single-component live update protocol now, as follows:
* When an update command is issued (via "service update *"), RS notifies the
target system process to prepare for a specific update state.
* If the process doesn't respond back in time, the update is aborted.
* When the process responds back, RS kills it and marks it for refreshing.
* The process is then automatically restarted as for a buggy process and can
start running again.
* Live update is currently prototyped as a controlled failure.
2009-12-21 15:12:21 +01:00
|
|
|
/* SEF functions and variables. */
|
|
|
|
FORWARD _PROTOTYPE( void sef_local_startup, (void) );
|
Initialization protocol for system services.
SYSLIB CHANGES:
- SEF framework now supports a new SEF Init request type from RS. 3 different
callbacks are available (init_fresh, init_lu, init_restart) to specify
initialization code when a service starts fresh, starts after a live update,
or restarts.
SYSTEM SERVICE CHANGES:
- Initialization code for system services is now enclosed in a callback SEF will
automatically call at init time. The return code of the callback will
tell RS whether the initialization completed successfully.
- Each init callback can access information passed by RS to initialize. As of
now, each system service has access to the public entries of RS's system process
table to gather all the information required to initialize. This design
eliminates many existing or potential races at boot time and provides a uniform
initialization interface to system services. The same interface will be reused
for the upcoming publish/subscribe model to handle dynamic
registration / deregistration of system services.
VM CHANGES:
- Uniform privilege management for all system services. Every service uses the
same call mask format. For boot services, VM copies the call mask from init
data. For dynamic services, VM still receives the call mask via rs_set_priv
call that will be soon replaced by the upcoming publish/subscribe model.
RS CHANGES:
- The system process table has been reorganized and split into private entries
and public entries. Only the latter ones are exposed to system services.
- VM call masks are now entirely configured in rs/table.c
- RS has now its own slot in the system process table. Only kernel tasks and
user processes not included in the boot image are now left out from the system
process table.
- RS implements the initialization protocol for system services.
- For services in the boot image, RS blocks till initialization is complete and
panics when failure is reported back. Services are initialized in their order of
appearance in the boot image priv table and RS blocks to implements synchronous
initialization for every system service having the flag SF_SYNCH_BOOT set.
- For services started dynamically, the initialization protocol is implemented
as though it were the first ping for the service. In this case, if the
system service fails to report back (or reports failure), RS brings the service
down rather than trying to restart it.
2010-01-08 02:20:42 +01:00
|
|
|
FORWARD _PROTOTYPE( int sef_cb_init_fresh, (int type, sef_init_info_t *info) );
|
Basic System Event Framework (SEF) with ping and live update.
SYSLIB CHANGES:
- SEF must be used by every system process and is thereby part of the system
library.
- The framework provides a receive() interface (sef_receive) for system
processes to automatically catch known system even messages and process them.
- SEF provides a default behavior for each type of system event, but allows
system processes to register callbacks to override the default behavior.
- Custom (local to the process) or predefined (provided by SEF) callback
implementations can be registered to SEF.
- SEF currently includes support for 2 types of system events:
1. SEF Ping. The event occurs every time RS sends a ping to figure out
whether a system process is still alive. The default callback implementation
provided by SEF is to notify RS back to let it know the process is alive
and kicking.
2. SEF Live update. The event occurs every time RS sends a prepare to update
message to let a system process know an update is available and to prepare
for it. The live update support is very basic for now. SEF only deals with
verifying if the prepare state can be supported by the process, dumping the
state for debugging purposes, and providing an event-driven programming
model to the process to react to state changes check-in when ready to update.
- SEF should be extended in the future to integrate support for more types of
system events. Ideally, all the cross-cutting concerns should be integrated into
SEF to avoid duplicating code and ease extensibility. Examples include:
* PM notify messages primarily used at shutdown.
* SYSTEM notify messages primarily used for signals.
* CLOCK notify messages used for system alarms.
* Debug messages. IS could still be in charge of fkey handling but would
forward the debug message to the target process (e.g. PM, if the user
requested debug information about PM). SEF would then catch the message and
do nothing unless the process has registered an appropriate callback to
deal with the event. This simplifies the programming model to print debug
information, avoids duplicating code, and reduces the effort to print
debug information.
SYSTEM PROCESSES CHANGES:
- Every system process registers SEF callbacks it needs to override the default
system behavior and calls sef_startup() right after being started.
- sef_startup() does almost nothing now, but will be extended in the future to
support callbacks of its own to let RS control and synchronize with every
system process at initialization time.
- Every system process calls sef_receive() now rather than receive() directly,
to let SEF handle predefined system events.
RS CHANGES:
- RS supports a basic single-component live update protocol now, as follows:
* When an update command is issued (via "service update *"), RS notifies the
target system process to prepare for a specific update state.
* If the process doesn't respond back in time, the update is aborted.
* When the process responds back, RS kills it and marks it for refreshing.
* The process is then automatically restarted as for a buggy process and can
start running again.
* Live update is currently prototyped as a controlled failure.
2009-12-21 15:12:21 +01:00
|
|
|
|
2010-07-02 00:23:25 +02:00
|
|
|
PUBLIC int main(int argc, char *argv[])
|
2005-04-21 16:53:53 +02:00
|
|
|
{
|
|
|
|
mq_t *mq;
|
2010-04-08 15:41:35 +02:00
|
|
|
int ipc_status;
|
2005-04-21 16:53:53 +02:00
|
|
|
int r;
|
2010-03-30 16:07:15 +02:00
|
|
|
endpoint_t source;
|
|
|
|
int m_type;
|
2005-06-28 17:19:58 +02:00
|
|
|
|
Basic System Event Framework (SEF) with ping and live update.
SYSLIB CHANGES:
- SEF must be used by every system process and is thereby part of the system
library.
- The framework provides a receive() interface (sef_receive) for system
processes to automatically catch known system even messages and process them.
- SEF provides a default behavior for each type of system event, but allows
system processes to register callbacks to override the default behavior.
- Custom (local to the process) or predefined (provided by SEF) callback
implementations can be registered to SEF.
- SEF currently includes support for 2 types of system events:
1. SEF Ping. The event occurs every time RS sends a ping to figure out
whether a system process is still alive. The default callback implementation
provided by SEF is to notify RS back to let it know the process is alive
and kicking.
2. SEF Live update. The event occurs every time RS sends a prepare to update
message to let a system process know an update is available and to prepare
for it. The live update support is very basic for now. SEF only deals with
verifying if the prepare state can be supported by the process, dumping the
state for debugging purposes, and providing an event-driven programming
model to the process to react to state changes check-in when ready to update.
- SEF should be extended in the future to integrate support for more types of
system events. Ideally, all the cross-cutting concerns should be integrated into
SEF to avoid duplicating code and ease extensibility. Examples include:
* PM notify messages primarily used at shutdown.
* SYSTEM notify messages primarily used for signals.
* CLOCK notify messages used for system alarms.
* Debug messages. IS could still be in charge of fkey handling but would
forward the debug message to the target process (e.g. PM, if the user
requested debug information about PM). SEF would then catch the message and
do nothing unless the process has registered an appropriate callback to
deal with the event. This simplifies the programming model to print debug
information, avoids duplicating code, and reduces the effort to print
debug information.
SYSTEM PROCESSES CHANGES:
- Every system process registers SEF callbacks it needs to override the default
system behavior and calls sef_startup() right after being started.
- sef_startup() does almost nothing now, but will be extended in the future to
support callbacks of its own to let RS control and synchronize with every
system process at initialization time.
- Every system process calls sef_receive() now rather than receive() directly,
to let SEF handle predefined system events.
RS CHANGES:
- RS supports a basic single-component live update protocol now, as follows:
* When an update command is issued (via "service update *"), RS notifies the
target system process to prepare for a specific update state.
* If the process doesn't respond back in time, the update is aborted.
* When the process responds back, RS kills it and marks it for refreshing.
* The process is then automatically restarted as for a buggy process and can
start running again.
* Live update is currently prototyped as a controlled failure.
2009-12-21 15:12:21 +01:00
|
|
|
/* SEF local startup. */
|
|
|
|
sef_local_startup();
|
|
|
|
|
2005-04-21 16:53:53 +02:00
|
|
|
while (TRUE)
|
|
|
|
{
|
|
|
|
#ifdef BUF_CONSISTENCY_CHECK
|
|
|
|
if (inet_buf_debug)
|
|
|
|
{
|
|
|
|
static int buf_debug_count= 0;
|
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
if (++buf_debug_count >= inet_buf_debug)
|
2005-04-21 16:53:53 +02:00
|
|
|
{
|
|
|
|
buf_debug_count= 0;
|
|
|
|
if (!bf_consistency_check())
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (ev_head)
|
|
|
|
{
|
|
|
|
ev_process();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (clck_call_expire)
|
|
|
|
{
|
|
|
|
clck_expire_timers();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
mq= mq_get();
|
|
|
|
if (!mq)
|
|
|
|
ip_panic(("out of messages"));
|
|
|
|
|
2010-04-08 15:41:35 +02:00
|
|
|
r= sef_receive_status(ANY, &mq->mq_mess, &ipc_status);
|
2005-06-28 17:19:58 +02:00
|
|
|
if (r<0)
|
|
|
|
{
|
2005-04-21 16:53:53 +02:00
|
|
|
ip_panic(("unable to receive: %d", r));
|
|
|
|
}
|
|
|
|
reset_time();
|
|
|
|
source= mq->mq_mess.m_source;
|
2007-04-23 16:49:20 +02:00
|
|
|
m_type= mq->mq_mess.m_type;
|
2010-06-08 15:58:01 +02:00
|
|
|
if (source == VFS_PROC_NR)
|
2005-06-28 17:19:58 +02:00
|
|
|
{
|
2005-04-21 16:53:53 +02:00
|
|
|
sr_rec(mq);
|
2005-06-28 17:19:58 +02:00
|
|
|
}
|
2010-04-08 15:41:35 +02:00
|
|
|
else if (is_ipc_notify(ipc_status))
|
2005-06-28 17:19:58 +02:00
|
|
|
{
|
2010-04-08 15:41:35 +02:00
|
|
|
if (source == CLOCK)
|
2009-09-29 20:47:56 +02:00
|
|
|
{
|
|
|
|
clck_tick(&mq->mq_mess);
|
|
|
|
mq_free(mq);
|
|
|
|
}
|
2010-04-08 15:41:35 +02:00
|
|
|
else if (source == PM_PROC_NR)
|
2009-09-29 20:47:56 +02:00
|
|
|
{
|
|
|
|
/* signaled */
|
|
|
|
/* probably SIGTERM */
|
|
|
|
mq_free(mq);
|
|
|
|
}
|
2010-04-08 15:41:35 +02:00
|
|
|
else if (source == DS_PROC_NR)
|
|
|
|
{
|
|
|
|
/* DS notifies us of an event. */
|
|
|
|
ds_event();
|
|
|
|
mq_free(mq);
|
|
|
|
}
|
2009-09-29 20:47:56 +02:00
|
|
|
else
|
|
|
|
{
|
2010-04-08 15:41:35 +02:00
|
|
|
printf("inet: got unexpected notify from %d\n",
|
|
|
|
mq->mq_mess.m_source);
|
2009-09-29 20:47:56 +02:00
|
|
|
mq_free(mq);
|
|
|
|
}
|
2005-10-21 13:51:45 +02:00
|
|
|
}
|
2007-04-23 16:49:20 +02:00
|
|
|
else if (m_type == DL_CONF_REPLY || m_type == DL_TASK_REPLY ||
|
2010-05-18 00:22:53 +02:00
|
|
|
m_type == DL_STAT_REPLY)
|
2005-04-21 16:53:53 +02:00
|
|
|
{
|
|
|
|
eth_rec(&mq->mq_mess);
|
|
|
|
mq_free(mq);
|
|
|
|
}
|
2006-08-28 14:59:36 +02:00
|
|
|
else
|
|
|
|
{
|
|
|
|
printf("inet: got bad message type 0x%x from %d\n",
|
|
|
|
mq->mq_mess.m_type, mq->mq_mess.m_source);
|
|
|
|
mq_free(mq);
|
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
ip_panic(("task is not allowed to terminate"));
|
2010-07-02 00:23:25 +02:00
|
|
|
return 1;
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
|
Basic System Event Framework (SEF) with ping and live update.
SYSLIB CHANGES:
- SEF must be used by every system process and is thereby part of the system
library.
- The framework provides a receive() interface (sef_receive) for system
processes to automatically catch known system even messages and process them.
- SEF provides a default behavior for each type of system event, but allows
system processes to register callbacks to override the default behavior.
- Custom (local to the process) or predefined (provided by SEF) callback
implementations can be registered to SEF.
- SEF currently includes support for 2 types of system events:
1. SEF Ping. The event occurs every time RS sends a ping to figure out
whether a system process is still alive. The default callback implementation
provided by SEF is to notify RS back to let it know the process is alive
and kicking.
2. SEF Live update. The event occurs every time RS sends a prepare to update
message to let a system process know an update is available and to prepare
for it. The live update support is very basic for now. SEF only deals with
verifying if the prepare state can be supported by the process, dumping the
state for debugging purposes, and providing an event-driven programming
model to the process to react to state changes check-in when ready to update.
- SEF should be extended in the future to integrate support for more types of
system events. Ideally, all the cross-cutting concerns should be integrated into
SEF to avoid duplicating code and ease extensibility. Examples include:
* PM notify messages primarily used at shutdown.
* SYSTEM notify messages primarily used for signals.
* CLOCK notify messages used for system alarms.
* Debug messages. IS could still be in charge of fkey handling but would
forward the debug message to the target process (e.g. PM, if the user
requested debug information about PM). SEF would then catch the message and
do nothing unless the process has registered an appropriate callback to
deal with the event. This simplifies the programming model to print debug
information, avoids duplicating code, and reduces the effort to print
debug information.
SYSTEM PROCESSES CHANGES:
- Every system process registers SEF callbacks it needs to override the default
system behavior and calls sef_startup() right after being started.
- sef_startup() does almost nothing now, but will be extended in the future to
support callbacks of its own to let RS control and synchronize with every
system process at initialization time.
- Every system process calls sef_receive() now rather than receive() directly,
to let SEF handle predefined system events.
RS CHANGES:
- RS supports a basic single-component live update protocol now, as follows:
* When an update command is issued (via "service update *"), RS notifies the
target system process to prepare for a specific update state.
* If the process doesn't respond back in time, the update is aborted.
* When the process responds back, RS kills it and marks it for refreshing.
* The process is then automatically restarted as for a buggy process and can
start running again.
* Live update is currently prototyped as a controlled failure.
2009-12-21 15:12:21 +01:00
|
|
|
/*===========================================================================*
|
|
|
|
* sef_local_startup *
|
|
|
|
*===========================================================================*/
|
|
|
|
PRIVATE void sef_local_startup()
|
|
|
|
{
|
Initialization protocol for system services.
SYSLIB CHANGES:
- SEF framework now supports a new SEF Init request type from RS. 3 different
callbacks are available (init_fresh, init_lu, init_restart) to specify
initialization code when a service starts fresh, starts after a live update,
or restarts.
SYSTEM SERVICE CHANGES:
- Initialization code for system services is now enclosed in a callback SEF will
automatically call at init time. The return code of the callback will
tell RS whether the initialization completed successfully.
- Each init callback can access information passed by RS to initialize. As of
now, each system service has access to the public entries of RS's system process
table to gather all the information required to initialize. This design
eliminates many existing or potential races at boot time and provides a uniform
initialization interface to system services. The same interface will be reused
for the upcoming publish/subscribe model to handle dynamic
registration / deregistration of system services.
VM CHANGES:
- Uniform privilege management for all system services. Every service uses the
same call mask format. For boot services, VM copies the call mask from init
data. For dynamic services, VM still receives the call mask via rs_set_priv
call that will be soon replaced by the upcoming publish/subscribe model.
RS CHANGES:
- The system process table has been reorganized and split into private entries
and public entries. Only the latter ones are exposed to system services.
- VM call masks are now entirely configured in rs/table.c
- RS has now its own slot in the system process table. Only kernel tasks and
user processes not included in the boot image are now left out from the system
process table.
- RS implements the initialization protocol for system services.
- For services in the boot image, RS blocks till initialization is complete and
panics when failure is reported back. Services are initialized in their order of
appearance in the boot image priv table and RS blocks to implements synchronous
initialization for every system service having the flag SF_SYNCH_BOOT set.
- For services started dynamically, the initialization protocol is implemented
as though it were the first ping for the service. In this case, if the
system service fails to report back (or reports failure), RS brings the service
down rather than trying to restart it.
2010-01-08 02:20:42 +01:00
|
|
|
/* Register init callbacks. */
|
|
|
|
sef_setcb_init_fresh(sef_cb_init_fresh);
|
New RS and new signal handling for system processes.
UPDATING INFO:
20100317:
/usr/src/etc/system.conf updated to ignore default kernel calls: copy
it (or merge it) to /etc/system.conf.
The hello driver (/dev/hello) added to the distribution:
# cd /usr/src/commands/scripts && make clean install
# cd /dev && MAKEDEV hello
KERNEL CHANGES:
- Generic signal handling support. The kernel no longer assumes PM as a signal
manager for every process. The signal manager of a given process can now be
specified in its privilege slot. When a signal has to be delivered, the kernel
performs the lookup and forwards the signal to the appropriate signal manager.
PM is the default signal manager for user processes, RS is the default signal
manager for system processes. To enable ptrace()ing for system processes, it
is sufficient to change the default signal manager to PM. This will temporarily
disable crash recovery, though.
- sys_exit() is now split into sys_exit() (i.e. exit() for system processes,
which generates a self-termination signal), and sys_clear() (i.e. used by PM
to ask the kernel to clear a process slot when a process exits).
- Added a new kernel call (i.e. sys_update()) to swap two process slots and
implement live update.
PM CHANGES:
- Posix signal handling is no longer allowed for system processes. System
signals are split into two fixed categories: termination and non-termination
signals. When a non-termination signaled is processed, PM transforms the signal
into an IPC message and delivers the message to the system process. When a
termination signal is processed, PM terminates the process.
- PM no longer assumes itself as the signal manager for system processes. It now
makes sure that every system signal goes through the kernel before being
actually processes. The kernel will then dispatch the signal to the appropriate
signal manager which may or may not be PM.
SYSLIB CHANGES:
- Simplified SEF init and LU callbacks.
- Added additional predefined SEF callbacks to debug crash recovery and
live update.
- Fixed a temporary ack in the SEF init protocol. SEF init reply is now
completely synchronous.
- Added SEF signal event type to provide a uniform interface for system
processes to deal with signals. A sef_cb_signal_handler() callback is
available for system processes to handle every received signal. A
sef_cb_signal_manager() callback is used by signal managers to process
system signals on behalf of the kernel.
- Fixed a few bugs with memory mapping and DS.
VM CHANGES:
- Page faults and memory requests coming from the kernel are now implemented
using signals.
- Added a new VM call to swap two process slots and implement live update.
- The call is used by RS at update time and in turn invokes the kernel call
sys_update().
RS CHANGES:
- RS has been reworked with a better functional decomposition.
- Better kernel call masks. com.h now defines the set of very basic kernel calls
every system service is allowed to use. This makes system.conf simpler and
easier to maintain. In addition, this guarantees a higher level of isolation
for system libraries that use one or more kernel calls internally (e.g. printf).
- RS is the default signal manager for system processes. By default, RS
intercepts every signal delivered to every system process. This makes crash
recovery possible before bringing PM and friends in the loop.
- RS now supports fast rollback when something goes wrong while initializing
the new version during a live update.
- Live update is now implemented by keeping the two versions side-by-side and
swapping the process slots when the old version is ready to update.
- Crash recovery is now implemented by keeping the two versions side-by-side
and cleaning up the old version only when the recovery process is complete.
DS CHANGES:
- Fixed a bug when the process doing ds_publish() or ds_delete() is not known
by DS.
- Fixed the completely broken support for strings. String publishing is now
implemented in the system library and simply wraps publishing of memory ranges.
Ideally, we should adopt a similar approach for other data types as well.
- Test suite fixed.
DRIVER CHANGES:
- The hello driver has been added to the Minix distribution to demonstrate basic
live update and crash recovery functionalities.
- Other drivers have been adapted to conform the new SEF interface.
2010-03-17 02:15:29 +01:00
|
|
|
sef_setcb_init_restart(sef_cb_init_fresh);
|
Initialization protocol for system services.
SYSLIB CHANGES:
- SEF framework now supports a new SEF Init request type from RS. 3 different
callbacks are available (init_fresh, init_lu, init_restart) to specify
initialization code when a service starts fresh, starts after a live update,
or restarts.
SYSTEM SERVICE CHANGES:
- Initialization code for system services is now enclosed in a callback SEF will
automatically call at init time. The return code of the callback will
tell RS whether the initialization completed successfully.
- Each init callback can access information passed by RS to initialize. As of
now, each system service has access to the public entries of RS's system process
table to gather all the information required to initialize. This design
eliminates many existing or potential races at boot time and provides a uniform
initialization interface to system services. The same interface will be reused
for the upcoming publish/subscribe model to handle dynamic
registration / deregistration of system services.
VM CHANGES:
- Uniform privilege management for all system services. Every service uses the
same call mask format. For boot services, VM copies the call mask from init
data. For dynamic services, VM still receives the call mask via rs_set_priv
call that will be soon replaced by the upcoming publish/subscribe model.
RS CHANGES:
- The system process table has been reorganized and split into private entries
and public entries. Only the latter ones are exposed to system services.
- VM call masks are now entirely configured in rs/table.c
- RS has now its own slot in the system process table. Only kernel tasks and
user processes not included in the boot image are now left out from the system
process table.
- RS implements the initialization protocol for system services.
- For services in the boot image, RS blocks till initialization is complete and
panics when failure is reported back. Services are initialized in their order of
appearance in the boot image priv table and RS blocks to implements synchronous
initialization for every system service having the flag SF_SYNCH_BOOT set.
- For services started dynamically, the initialization protocol is implemented
as though it were the first ping for the service. In this case, if the
system service fails to report back (or reports failure), RS brings the service
down rather than trying to restart it.
2010-01-08 02:20:42 +01:00
|
|
|
|
Basic System Event Framework (SEF) with ping and live update.
SYSLIB CHANGES:
- SEF must be used by every system process and is thereby part of the system
library.
- The framework provides a receive() interface (sef_receive) for system
processes to automatically catch known system even messages and process them.
- SEF provides a default behavior for each type of system event, but allows
system processes to register callbacks to override the default behavior.
- Custom (local to the process) or predefined (provided by SEF) callback
implementations can be registered to SEF.
- SEF currently includes support for 2 types of system events:
1. SEF Ping. The event occurs every time RS sends a ping to figure out
whether a system process is still alive. The default callback implementation
provided by SEF is to notify RS back to let it know the process is alive
and kicking.
2. SEF Live update. The event occurs every time RS sends a prepare to update
message to let a system process know an update is available and to prepare
for it. The live update support is very basic for now. SEF only deals with
verifying if the prepare state can be supported by the process, dumping the
state for debugging purposes, and providing an event-driven programming
model to the process to react to state changes check-in when ready to update.
- SEF should be extended in the future to integrate support for more types of
system events. Ideally, all the cross-cutting concerns should be integrated into
SEF to avoid duplicating code and ease extensibility. Examples include:
* PM notify messages primarily used at shutdown.
* SYSTEM notify messages primarily used for signals.
* CLOCK notify messages used for system alarms.
* Debug messages. IS could still be in charge of fkey handling but would
forward the debug message to the target process (e.g. PM, if the user
requested debug information about PM). SEF would then catch the message and
do nothing unless the process has registered an appropriate callback to
deal with the event. This simplifies the programming model to print debug
information, avoids duplicating code, and reduces the effort to print
debug information.
SYSTEM PROCESSES CHANGES:
- Every system process registers SEF callbacks it needs to override the default
system behavior and calls sef_startup() right after being started.
- sef_startup() does almost nothing now, but will be extended in the future to
support callbacks of its own to let RS control and synchronize with every
system process at initialization time.
- Every system process calls sef_receive() now rather than receive() directly,
to let SEF handle predefined system events.
RS CHANGES:
- RS supports a basic single-component live update protocol now, as follows:
* When an update command is issued (via "service update *"), RS notifies the
target system process to prepare for a specific update state.
* If the process doesn't respond back in time, the update is aborted.
* When the process responds back, RS kills it and marks it for refreshing.
* The process is then automatically restarted as for a buggy process and can
start running again.
* Live update is currently prototyped as a controlled failure.
2009-12-21 15:12:21 +01:00
|
|
|
/* No live update support for now. */
|
|
|
|
|
|
|
|
/* Let SEF perform startup. */
|
|
|
|
sef_startup();
|
|
|
|
}
|
|
|
|
|
Initialization protocol for system services.
SYSLIB CHANGES:
- SEF framework now supports a new SEF Init request type from RS. 3 different
callbacks are available (init_fresh, init_lu, init_restart) to specify
initialization code when a service starts fresh, starts after a live update,
or restarts.
SYSTEM SERVICE CHANGES:
- Initialization code for system services is now enclosed in a callback SEF will
automatically call at init time. The return code of the callback will
tell RS whether the initialization completed successfully.
- Each init callback can access information passed by RS to initialize. As of
now, each system service has access to the public entries of RS's system process
table to gather all the information required to initialize. This design
eliminates many existing or potential races at boot time and provides a uniform
initialization interface to system services. The same interface will be reused
for the upcoming publish/subscribe model to handle dynamic
registration / deregistration of system services.
VM CHANGES:
- Uniform privilege management for all system services. Every service uses the
same call mask format. For boot services, VM copies the call mask from init
data. For dynamic services, VM still receives the call mask via rs_set_priv
call that will be soon replaced by the upcoming publish/subscribe model.
RS CHANGES:
- The system process table has been reorganized and split into private entries
and public entries. Only the latter ones are exposed to system services.
- VM call masks are now entirely configured in rs/table.c
- RS has now its own slot in the system process table. Only kernel tasks and
user processes not included in the boot image are now left out from the system
process table.
- RS implements the initialization protocol for system services.
- For services in the boot image, RS blocks till initialization is complete and
panics when failure is reported back. Services are initialized in their order of
appearance in the boot image priv table and RS blocks to implements synchronous
initialization for every system service having the flag SF_SYNCH_BOOT set.
- For services started dynamically, the initialization protocol is implemented
as though it were the first ping for the service. In this case, if the
system service fails to report back (or reports failure), RS brings the service
down rather than trying to restart it.
2010-01-08 02:20:42 +01:00
|
|
|
/*===========================================================================*
|
|
|
|
* sef_cb_init_fresh *
|
|
|
|
*===========================================================================*/
|
|
|
|
PRIVATE int sef_cb_init_fresh(int type, sef_init_info_t *info)
|
|
|
|
{
|
|
|
|
/* Initialize the inet server. */
|
|
|
|
int r;
|
|
|
|
int timerand, fd;
|
|
|
|
u8_t randbits[32];
|
|
|
|
struct timeval tv;
|
2012-01-27 15:21:10 +01:00
|
|
|
struct passwd *pw;
|
Initialization protocol for system services.
SYSLIB CHANGES:
- SEF framework now supports a new SEF Init request type from RS. 3 different
callbacks are available (init_fresh, init_lu, init_restart) to specify
initialization code when a service starts fresh, starts after a live update,
or restarts.
SYSTEM SERVICE CHANGES:
- Initialization code for system services is now enclosed in a callback SEF will
automatically call at init time. The return code of the callback will
tell RS whether the initialization completed successfully.
- Each init callback can access information passed by RS to initialize. As of
now, each system service has access to the public entries of RS's system process
table to gather all the information required to initialize. This design
eliminates many existing or potential races at boot time and provides a uniform
initialization interface to system services. The same interface will be reused
for the upcoming publish/subscribe model to handle dynamic
registration / deregistration of system services.
VM CHANGES:
- Uniform privilege management for all system services. Every service uses the
same call mask format. For boot services, VM copies the call mask from init
data. For dynamic services, VM still receives the call mask via rs_set_priv
call that will be soon replaced by the upcoming publish/subscribe model.
RS CHANGES:
- The system process table has been reorganized and split into private entries
and public entries. Only the latter ones are exposed to system services.
- VM call masks are now entirely configured in rs/table.c
- RS has now its own slot in the system process table. Only kernel tasks and
user processes not included in the boot image are now left out from the system
process table.
- RS implements the initialization protocol for system services.
- For services in the boot image, RS blocks till initialization is complete and
panics when failure is reported back. Services are initialized in their order of
appearance in the boot image priv table and RS blocks to implements synchronous
initialization for every system service having the flag SF_SYNCH_BOOT set.
- For services started dynamically, the initialization protocol is implemented
as though it were the first ping for the service. In this case, if the
system service fails to report back (or reports failure), RS brings the service
down rather than trying to restart it.
2010-01-08 02:20:42 +01:00
|
|
|
|
|
|
|
#if DEBUG
|
|
|
|
printf("Starting inet...\n");
|
|
|
|
printf("%s\n", version);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if HZ_DYNAMIC
|
|
|
|
system_hz = sys_hz();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Read configuration. */
|
|
|
|
nw_conf();
|
|
|
|
|
|
|
|
/* Get a random number */
|
|
|
|
timerand= 1;
|
|
|
|
fd= open(RANDOM_DEV_NAME, O_RDONLY | O_NONBLOCK);
|
|
|
|
if (fd != -1)
|
|
|
|
{
|
|
|
|
r= read(fd, randbits, sizeof(randbits));
|
|
|
|
if (r == sizeof(randbits))
|
|
|
|
timerand= 0;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
printf("inet: unable to read random data from %s: %s\n",
|
|
|
|
RANDOM_DEV_NAME, r == -1 ? strerror(errno) :
|
|
|
|
r == 0 ? "EOF" : "not enough data");
|
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
printf("inet: unable to open random device %s: %s\n",
|
|
|
|
RANDOM_DEV_NAME, strerror(errno));
|
|
|
|
}
|
|
|
|
if (timerand)
|
|
|
|
{
|
|
|
|
printf("inet: using current time for random-number seed\n");
|
|
|
|
r= gettimeofday(&tv, NULL);
|
|
|
|
if (r == -1)
|
|
|
|
{
|
|
|
|
printf("sysutime failed: %s\n", strerror(errno));
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
memcpy(randbits, &tv, sizeof(tv));
|
|
|
|
}
|
|
|
|
init_rand256(randbits);
|
|
|
|
|
|
|
|
/* Our new identity as a server. */
|
2010-07-07 00:05:21 +02:00
|
|
|
this_proc= info->endpoint;
|
Initialization protocol for system services.
SYSLIB CHANGES:
- SEF framework now supports a new SEF Init request type from RS. 3 different
callbacks are available (init_fresh, init_lu, init_restart) to specify
initialization code when a service starts fresh, starts after a live update,
or restarts.
SYSTEM SERVICE CHANGES:
- Initialization code for system services is now enclosed in a callback SEF will
automatically call at init time. The return code of the callback will
tell RS whether the initialization completed successfully.
- Each init callback can access information passed by RS to initialize. As of
now, each system service has access to the public entries of RS's system process
table to gather all the information required to initialize. This design
eliminates many existing or potential races at boot time and provides a uniform
initialization interface to system services. The same interface will be reused
for the upcoming publish/subscribe model to handle dynamic
registration / deregistration of system services.
VM CHANGES:
- Uniform privilege management for all system services. Every service uses the
same call mask format. For boot services, VM copies the call mask from init
data. For dynamic services, VM still receives the call mask via rs_set_priv
call that will be soon replaced by the upcoming publish/subscribe model.
RS CHANGES:
- The system process table has been reorganized and split into private entries
and public entries. Only the latter ones are exposed to system services.
- VM call masks are now entirely configured in rs/table.c
- RS has now its own slot in the system process table. Only kernel tasks and
user processes not included in the boot image are now left out from the system
process table.
- RS implements the initialization protocol for system services.
- For services in the boot image, RS blocks till initialization is complete and
panics when failure is reported back. Services are initialized in their order of
appearance in the boot image priv table and RS blocks to implements synchronous
initialization for every system service having the flag SF_SYNCH_BOOT set.
- For services started dynamically, the initialization protocol is implemented
as though it were the first ping for the service. In this case, if the
system service fails to report back (or reports failure), RS brings the service
down rather than trying to restart it.
2010-01-08 02:20:42 +01:00
|
|
|
|
|
|
|
#ifdef BUF_CONSISTENCY_CHECK
|
|
|
|
inet_buf_debug= (getenv("inetbufdebug") &&
|
|
|
|
(strcmp(getenv("inetbufdebug"), "on") == 0));
|
|
|
|
inet_buf_debug= 100;
|
|
|
|
if (inet_buf_debug)
|
|
|
|
{
|
|
|
|
ip_warning(( "buffer consistency check enabled" ));
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (getenv("killerinet"))
|
|
|
|
{
|
|
|
|
ip_warning(( "killer inet active" ));
|
|
|
|
killer_inet= 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
nw_init();
|
|
|
|
|
2010-04-08 15:41:35 +02:00
|
|
|
/* Subscribe to driver events for network drivers. */
|
2010-04-12 10:39:59 +02:00
|
|
|
r = ds_subscribe("drv\\.net\\..*", DSF_INITIAL | DSF_OVERWRITE);
|
2010-04-08 15:41:35 +02:00
|
|
|
if(r != OK) {
|
|
|
|
ip_panic(("inet: can't subscribe to driver events"));
|
|
|
|
}
|
|
|
|
|
2012-01-27 15:21:10 +01:00
|
|
|
/* Drop root privileges */
|
2012-01-30 16:12:12 +01:00
|
|
|
if ((pw = getpwnam(SERVICE_LOGIN)) == NULL) {
|
|
|
|
printf("inet: unable to retrieve uid of SERVICE_LOGIN, "
|
|
|
|
"still running as root");
|
|
|
|
} else if (setuid(pw->pw_uid) != 0) {
|
2012-01-27 15:21:10 +01:00
|
|
|
ip_panic(("inet: unable to drop privileges"));
|
2012-01-30 16:12:12 +01:00
|
|
|
}
|
2012-01-27 15:21:10 +01:00
|
|
|
|
2010-04-09 23:56:44 +02:00
|
|
|
/* Announce we are up. INET announces its presence to VFS just like
|
Split block/character protocols and libdriver
This patch separates the character and block driver communication
protocols. The old character protocol remains the same, but a new
block protocol is introduced. The libdriver library is replaced by
two new libraries: libchardriver and libblockdriver. Their exposed
API, and drivers that use them, have been updated accordingly.
Together, libbdev and libblockdriver now completely abstract away
the message format used by the block protocol. As the memory driver
is both a character and a block device driver, it now implements its
own message loop.
The most important semantic change made to the block protocol is that
it is no longer possible to return both partial results and an error
for a single transfer. This simplifies the interaction between the
caller and the driver, as the I/O vector no longer needs to be copied
back. Also, drivers are now no longer supposed to decide based on the
layout of the I/O vector when a transfer should be cut short. Put
simply, transfers are now supposed to either succeed completely, or
result in an error.
After this patch, the state of the various pieces is as follows:
- block protocol: stable
- libbdev API: stable for synchronous communication
- libblockdriver API: needs slight revision (the drvlib/partition API
in particular; the threading API will also change shortly)
- character protocol: needs cleanup
- libchardriver API: needs cleanup accordingly
- driver restarts: largely unsupported until endpoint changes are
reintroduced
As a side effect, this patch eliminates several bugs, hacks, and gcc
-Wall and -W warnings all over the place. It probably introduces a
few new ones, too.
Update warning: this patch changes the protocol between MFS and disk
drivers, so in order to use old/new images, the MFS from the ramdisk
must be used to mount all file systems.
2011-11-22 13:27:53 +01:00
|
|
|
* any other character driver.
|
2010-04-09 23:56:44 +02:00
|
|
|
*/
|
Split block/character protocols and libdriver
This patch separates the character and block driver communication
protocols. The old character protocol remains the same, but a new
block protocol is introduced. The libdriver library is replaced by
two new libraries: libchardriver and libblockdriver. Their exposed
API, and drivers that use them, have been updated accordingly.
Together, libbdev and libblockdriver now completely abstract away
the message format used by the block protocol. As the memory driver
is both a character and a block device driver, it now implements its
own message loop.
The most important semantic change made to the block protocol is that
it is no longer possible to return both partial results and an error
for a single transfer. This simplifies the interaction between the
caller and the driver, as the I/O vector no longer needs to be copied
back. Also, drivers are now no longer supposed to decide based on the
layout of the I/O vector when a transfer should be cut short. Put
simply, transfers are now supposed to either succeed completely, or
result in an error.
After this patch, the state of the various pieces is as follows:
- block protocol: stable
- libbdev API: stable for synchronous communication
- libblockdriver API: needs slight revision (the drvlib/partition API
in particular; the threading API will also change shortly)
- character protocol: needs cleanup
- libchardriver API: needs cleanup accordingly
- driver restarts: largely unsupported until endpoint changes are
reintroduced
As a side effect, this patch eliminates several bugs, hacks, and gcc
-Wall and -W warnings all over the place. It probably introduces a
few new ones, too.
Update warning: this patch changes the protocol between MFS and disk
drivers, so in order to use old/new images, the MFS from the ramdisk
must be used to mount all file systems.
2011-11-22 13:27:53 +01:00
|
|
|
chardriver_announce();
|
2010-04-09 23:56:44 +02:00
|
|
|
|
Initialization protocol for system services.
SYSLIB CHANGES:
- SEF framework now supports a new SEF Init request type from RS. 3 different
callbacks are available (init_fresh, init_lu, init_restart) to specify
initialization code when a service starts fresh, starts after a live update,
or restarts.
SYSTEM SERVICE CHANGES:
- Initialization code for system services is now enclosed in a callback SEF will
automatically call at init time. The return code of the callback will
tell RS whether the initialization completed successfully.
- Each init callback can access information passed by RS to initialize. As of
now, each system service has access to the public entries of RS's system process
table to gather all the information required to initialize. This design
eliminates many existing or potential races at boot time and provides a uniform
initialization interface to system services. The same interface will be reused
for the upcoming publish/subscribe model to handle dynamic
registration / deregistration of system services.
VM CHANGES:
- Uniform privilege management for all system services. Every service uses the
same call mask format. For boot services, VM copies the call mask from init
data. For dynamic services, VM still receives the call mask via rs_set_priv
call that will be soon replaced by the upcoming publish/subscribe model.
RS CHANGES:
- The system process table has been reorganized and split into private entries
and public entries. Only the latter ones are exposed to system services.
- VM call masks are now entirely configured in rs/table.c
- RS has now its own slot in the system process table. Only kernel tasks and
user processes not included in the boot image are now left out from the system
process table.
- RS implements the initialization protocol for system services.
- For services in the boot image, RS blocks till initialization is complete and
panics when failure is reported back. Services are initialized in their order of
appearance in the boot image priv table and RS blocks to implements synchronous
initialization for every system service having the flag SF_SYNCH_BOOT set.
- For services started dynamically, the initialization protocol is implemented
as though it were the first ping for the service. In this case, if the
system service fails to report back (or reports failure), RS brings the service
down rather than trying to restart it.
2010-01-08 02:20:42 +01:00
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
PRIVATE void nw_conf()
|
2005-04-21 16:53:53 +02:00
|
|
|
{
|
|
|
|
read_conf();
|
|
|
|
eth_prep();
|
|
|
|
arp_prep();
|
|
|
|
psip_prep();
|
|
|
|
ip_prep();
|
|
|
|
tcp_prep();
|
|
|
|
udp_prep();
|
2005-06-28 17:19:58 +02:00
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-06-28 17:19:58 +02:00
|
|
|
PRIVATE void nw_init()
|
|
|
|
{
|
2005-04-21 16:53:53 +02:00
|
|
|
mq_init();
|
|
|
|
bf_init();
|
|
|
|
clck_init();
|
|
|
|
sr_init();
|
2006-07-13 15:19:48 +02:00
|
|
|
qp_init();
|
2005-04-21 16:53:53 +02:00
|
|
|
eth_init();
|
|
|
|
arp_init();
|
|
|
|
psip_init();
|
|
|
|
ip_init();
|
|
|
|
tcp_init();
|
|
|
|
udp_init();
|
|
|
|
}
|
|
|
|
|
2010-04-08 15:41:35 +02:00
|
|
|
/*===========================================================================*
|
|
|
|
* ds_event *
|
|
|
|
*===========================================================================*/
|
|
|
|
PRIVATE void ds_event()
|
|
|
|
{
|
|
|
|
char key[DS_MAX_KEYLEN];
|
|
|
|
char *driver_prefix = "drv.net.";
|
2010-05-18 00:22:53 +02:00
|
|
|
char *label;
|
2010-04-08 15:41:35 +02:00
|
|
|
u32_t value;
|
|
|
|
int type;
|
|
|
|
endpoint_t owner_endpoint;
|
|
|
|
int r;
|
|
|
|
|
2010-05-18 00:22:53 +02:00
|
|
|
/* We may get one notification for multiple updates from DS. Get events
|
|
|
|
* and owners from DS, until DS tells us that there are no more.
|
|
|
|
*/
|
|
|
|
while ((r = ds_check(key, &type, &owner_endpoint)) == OK) {
|
|
|
|
r = ds_retrieve_u32(key, &value);
|
|
|
|
if(r != OK) {
|
|
|
|
printf("inet: ds_event: ds_retrieve_u32 failed\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Only check for network driver up events. */
|
|
|
|
if(strncmp(key, driver_prefix, sizeof(driver_prefix))
|
|
|
|
|| value != DS_DRIVER_UP) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The driver label comes after the prefix. */
|
|
|
|
label = key + strlen(driver_prefix);
|
2010-04-08 15:41:35 +02:00
|
|
|
|
2010-05-18 00:22:53 +02:00
|
|
|
/* A driver is (re)started. */
|
|
|
|
eth_check_driver(label, owner_endpoint);
|
2010-04-08 15:41:35 +02:00
|
|
|
}
|
|
|
|
|
2010-05-18 00:22:53 +02:00
|
|
|
if(r != ENOENT)
|
|
|
|
printf("inet: ds_event: ds_check failed: %d\n", r);
|
2010-04-08 15:41:35 +02:00
|
|
|
}
|
|
|
|
|
2005-04-21 16:53:53 +02:00
|
|
|
PUBLIC void panic0(file, line)
|
|
|
|
char *file;
|
|
|
|
int line;
|
|
|
|
{
|
|
|
|
printf("panic at %s, %d: ", file, line);
|
|
|
|
}
|
|
|
|
|
2005-06-01 16:31:00 +02:00
|
|
|
PUBLIC void inet_panic()
|
2005-04-21 16:53:53 +02:00
|
|
|
{
|
|
|
|
printf("\ninet stacktrace: ");
|
2008-12-11 15:54:42 +01:00
|
|
|
util_stacktrace();
|
2010-03-05 16:05:11 +01:00
|
|
|
(panic)("aborted due to a panic");
|
2005-06-28 17:19:58 +02:00
|
|
|
for(;;);
|
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
|
|
|
|
#if !NDEBUG
|
|
|
|
PUBLIC void bad_assertion(file, line, what)
|
|
|
|
char *file;
|
|
|
|
int line;
|
|
|
|
char *what;
|
|
|
|
{
|
|
|
|
panic0(file, line);
|
|
|
|
printf("assertion \"%s\" failed", what);
|
2005-06-28 17:19:58 +02:00
|
|
|
panic();
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
PUBLIC void bad_compare(file, line, lhs, what, rhs)
|
|
|
|
char *file;
|
|
|
|
int line;
|
|
|
|
int lhs;
|
|
|
|
char *what;
|
|
|
|
int rhs;
|
|
|
|
{
|
|
|
|
panic0(file, line);
|
|
|
|
printf("compare (%d) %s (%d) failed", lhs, what, rhs);
|
2005-06-28 17:19:58 +02:00
|
|
|
panic();
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
#endif /* !NDEBUG */
|
|
|
|
|
|
|
|
/*
|
2005-06-28 17:19:58 +02:00
|
|
|
* $PchId: inet.c,v 1.23 2005/06/28 14:27:22 philip Exp $
|
2005-04-21 16:53:53 +02:00
|
|
|
*/
|