2005-04-21 16:53:53 +02:00
|
|
|
/* This task handles the interface between the kernel and user-level servers.
|
|
|
|
* System services can be accessed by doing a system call. System calls are
|
|
|
|
* transformed into request messages, which are handled by this task. By
|
|
|
|
* convention, a sys_call() is transformed in a SYS_CALL request message that
|
|
|
|
* is handled in a function named do_call().
|
|
|
|
*
|
|
|
|
* A private call vector is used to map all system calls to the functions that
|
|
|
|
* handle them. The actual handler functions are contained in separate files
|
|
|
|
* to keep this file clean. The call vector is used in the system task's main
|
|
|
|
* loop to handle all incoming requests.
|
|
|
|
*
|
|
|
|
* In addition to the main sys_task() entry point, which starts the main loop,
|
|
|
|
* there are several other minor entry points:
|
2005-07-26 14:48:34 +02:00
|
|
|
* get_priv: assign privilege structure to user or system process
|
2005-07-21 20:36:40 +02:00
|
|
|
* send_sig: send a signal directly to a system process
|
2005-07-19 14:21:36 +02:00
|
|
|
* cause_sig: take action to cause a signal to occur via PM
|
2005-04-21 16:53:53 +02:00
|
|
|
* umap_local: map virtual address in LOCAL_SEG to physical
|
|
|
|
* umap_remote: map virtual address in REMOTE_SEG to physical
|
|
|
|
* umap_bios: map virtual address in BIOS_SEG to physical
|
|
|
|
* virtual_copy: copy bytes from one virtual address to another
|
2005-06-03 15:55:06 +02:00
|
|
|
* get_randomness: accumulate randomness in a buffer
|
2005-04-21 16:53:53 +02:00
|
|
|
*
|
|
|
|
* Changes:
|
2005-10-14 11:13:52 +02:00
|
|
|
* Aug 04, 2005 check if system call is allowed (Jorrit N. Herder)
|
2005-08-04 11:26:36 +02:00
|
|
|
* Jul 20, 2005 send signal to services with message (Jorrit N. Herder)
|
|
|
|
* Jan 15, 2005 new, generalized virtual copy function (Jorrit N. Herder)
|
2005-04-21 16:53:53 +02:00
|
|
|
* Oct 10, 2004 dispatch system calls from call vector (Jorrit N. Herder)
|
|
|
|
* Sep 30, 2004 source code documentation updated (Jorrit N. Herder)
|
|
|
|
*/
|
|
|
|
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
#include "debug.h"
|
2005-04-21 16:53:53 +02:00
|
|
|
#include "kernel.h"
|
|
|
|
#include "system.h"
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/sigcontext.h>
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
#include <minix/endpoint.h>
|
2005-04-21 16:53:53 +02:00
|
|
|
#if (CHIP == INTEL)
|
2005-04-29 17:36:43 +02:00
|
|
|
#include <ibm/memory.h>
|
2005-04-21 16:53:53 +02:00
|
|
|
#include "protect.h"
|
|
|
|
#endif
|
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
/* Declaration of the call vector that defines the mapping of system calls
|
|
|
|
* to handler functions. The vector is initialized in sys_init() with map(),
|
|
|
|
* which makes sure the system call numbers are ok. No space is allocated,
|
|
|
|
* because the dummy is declared extern. If an illegal call is given, the
|
|
|
|
* array size will be negative and this won't compile.
|
2005-04-21 16:53:53 +02:00
|
|
|
*/
|
2005-04-29 17:36:43 +02:00
|
|
|
PUBLIC int (*call_vec[NR_SYS_CALLS])(message *m_ptr);
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
#define map(call_nr, handler) \
|
2005-07-26 16:54:49 +02:00
|
|
|
{extern int dummy[NR_SYS_CALLS>(unsigned)(call_nr-KERNEL_CALL) ? 1:-1];} \
|
|
|
|
call_vec[(call_nr-KERNEL_CALL)] = (handler)
|
2005-04-29 17:36:43 +02:00
|
|
|
|
|
|
|
FORWARD _PROTOTYPE( void initialize, (void));
|
2005-04-21 16:53:53 +02:00
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* sys_task *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC void sys_task()
|
|
|
|
{
|
|
|
|
/* Main entry point of sys_task. Get the message and dispatch on type. */
|
2005-04-29 17:36:43 +02:00
|
|
|
static message m;
|
2005-06-24 18:24:40 +02:00
|
|
|
register int result;
|
2005-08-04 21:23:03 +02:00
|
|
|
register struct proc *caller_ptr;
|
|
|
|
unsigned int call_nr;
|
|
|
|
int s;
|
2005-04-21 16:53:53 +02:00
|
|
|
|
|
|
|
/* Initialize the system task. */
|
|
|
|
initialize();
|
|
|
|
|
|
|
|
while (TRUE) {
|
2005-08-04 21:23:03 +02:00
|
|
|
/* Get work. Block and wait until a request message arrives. */
|
|
|
|
receive(ANY, &m);
|
|
|
|
call_nr = (unsigned) m.m_type - KERNEL_CALL;
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
who_e = m.m_source;
|
|
|
|
okendpt(who_e, &who_p);
|
|
|
|
caller_ptr = proc_addr(who_p);
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-08-04 21:23:03 +02:00
|
|
|
/* See if the caller made a valid request and try to handle it. */
|
2005-11-04 18:06:49 +01:00
|
|
|
if (! (priv(caller_ptr)->s_call_mask & (1<<call_nr))) {
|
2005-10-18 18:13:12 +02:00
|
|
|
#if DEBUG_ENABLE_IPC_WARNINGS
|
2005-08-04 21:23:03 +02:00
|
|
|
kprintf("SYSTEM: request %d from %d denied.\n", call_nr,m.m_source);
|
2005-10-18 18:13:12 +02:00
|
|
|
#endif
|
2005-08-04 21:23:03 +02:00
|
|
|
result = ECALLDENIED; /* illegal message type */
|
2005-09-20 14:24:19 +02:00
|
|
|
} else if (call_nr >= NR_SYS_CALLS) { /* check call number */
|
2005-10-18 18:13:12 +02:00
|
|
|
#if DEBUG_ENABLE_IPC_WARNINGS
|
2005-08-04 21:23:03 +02:00
|
|
|
kprintf("SYSTEM: illegal request %d from %d.\n", call_nr,m.m_source);
|
2005-10-18 18:13:12 +02:00
|
|
|
#endif
|
2005-04-21 16:53:53 +02:00
|
|
|
result = EBADREQUEST; /* illegal message type */
|
2005-08-04 21:23:03 +02:00
|
|
|
}
|
|
|
|
else {
|
2005-10-14 11:13:52 +02:00
|
|
|
result = (*call_vec[call_nr])(&m); /* handle the system call */
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
|
2005-05-18 12:36:23 +02:00
|
|
|
/* Send a reply, unless inhibited by a handler function. Use the kernel
|
|
|
|
* function lock_send() to prevent a system call trap. The destination
|
|
|
|
* is known to be blocked waiting for a message.
|
|
|
|
*/
|
2005-04-21 16:53:53 +02:00
|
|
|
if (result != EDONTREPLY) {
|
2005-07-14 17:12:12 +02:00
|
|
|
m.m_type = result; /* report status of call */
|
2005-08-04 21:23:03 +02:00
|
|
|
if (OK != (s=lock_send(m.m_source, &m))) {
|
|
|
|
kprintf("SYSTEM, reply to %d failed: %d\n", m.m_source, s);
|
2005-05-27 14:44:14 +02:00
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*===========================================================================*
|
2005-09-11 18:44:06 +02:00
|
|
|
* initialize *
|
2005-04-21 16:53:53 +02:00
|
|
|
*===========================================================================*/
|
|
|
|
PRIVATE void initialize(void)
|
|
|
|
{
|
2005-07-14 17:12:12 +02:00
|
|
|
register struct priv *sp;
|
2005-04-21 16:53:53 +02:00
|
|
|
int i;
|
|
|
|
|
2005-05-02 16:30:04 +02:00
|
|
|
/* Initialize IRQ handler hooks. Mark all hooks available. */
|
|
|
|
for (i=0; i<NR_IRQ_HOOKS; i++) {
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
irq_hooks[i].proc_nr_e = NONE;
|
2005-05-02 16:30:04 +02:00
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
|
|
|
|
/* Initialize all alarm timers for all processes. */
|
2005-07-14 17:12:12 +02:00
|
|
|
for (sp=BEG_PRIV_ADDR; sp < END_PRIV_ADDR; sp++) {
|
|
|
|
tmr_inittimer(&(sp->s_alarm_timer));
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
2005-04-29 17:36:43 +02:00
|
|
|
|
|
|
|
/* Initialize the call vector to a safe default handler. Some system calls
|
|
|
|
* may be disabled or nonexistant. Then explicitely map known calls to their
|
|
|
|
* handler functions. This is done with a macro that gives a compile error
|
|
|
|
* if an illegal call number is used. The ordering is not important here.
|
|
|
|
*/
|
|
|
|
for (i=0; i<NR_SYS_CALLS; i++) {
|
|
|
|
call_vec[i] = do_unused;
|
|
|
|
}
|
|
|
|
|
2005-08-04 11:26:36 +02:00
|
|
|
/* Process management. */
|
2005-07-14 17:12:12 +02:00
|
|
|
map(SYS_FORK, do_fork); /* a process forked a new process */
|
|
|
|
map(SYS_EXEC, do_exec); /* update process after execute */
|
|
|
|
map(SYS_EXIT, do_exit); /* clean up after process exit */
|
2005-07-19 14:21:36 +02:00
|
|
|
map(SYS_NICE, do_nice); /* set scheduling priority */
|
2005-08-04 11:26:36 +02:00
|
|
|
map(SYS_PRIVCTL, do_privctl); /* system privileges control */
|
2005-07-14 17:12:12 +02:00
|
|
|
map(SYS_TRACE, do_trace); /* request a trace operation */
|
2005-04-29 17:36:43 +02:00
|
|
|
|
|
|
|
/* Signal handling. */
|
|
|
|
map(SYS_KILL, do_kill); /* cause a process to be signaled */
|
2005-07-14 17:12:12 +02:00
|
|
|
map(SYS_GETKSIG, do_getksig); /* PM checks for pending signals */
|
|
|
|
map(SYS_ENDKSIG, do_endksig); /* PM finished processing signal */
|
2005-04-29 17:36:43 +02:00
|
|
|
map(SYS_SIGSEND, do_sigsend); /* start POSIX-style signal */
|
|
|
|
map(SYS_SIGRETURN, do_sigreturn); /* return from POSIX-style signal */
|
|
|
|
|
|
|
|
/* Device I/O. */
|
|
|
|
map(SYS_IRQCTL, do_irqctl); /* interrupt control operations */
|
|
|
|
map(SYS_DEVIO, do_devio); /* inb, inw, inl, outb, outw, outl */
|
|
|
|
map(SYS_SDEVIO, do_sdevio); /* phys_insb, _insw, _outsb, _outsw */
|
|
|
|
map(SYS_VDEVIO, do_vdevio); /* vector with devio requests */
|
2005-08-04 11:26:36 +02:00
|
|
|
map(SYS_INT86, do_int86); /* real-mode BIOS calls */
|
2005-04-29 17:36:43 +02:00
|
|
|
|
2005-08-04 11:26:36 +02:00
|
|
|
/* Memory management. */
|
|
|
|
map(SYS_NEWMAP, do_newmap); /* set up a process memory map */
|
2005-04-29 17:36:43 +02:00
|
|
|
map(SYS_SEGCTL, do_segctl); /* add segment and get selector */
|
2005-08-04 11:26:36 +02:00
|
|
|
map(SYS_MEMSET, do_memset); /* write char to memory area */
|
2005-09-30 14:54:59 +02:00
|
|
|
map(SYS_VM_SETBUF, do_vm_setbuf); /* PM passes buffer for page tables */
|
|
|
|
map(SYS_VM_MAP, do_vm_map); /* Map/unmap physical (device) memory */
|
2005-04-29 17:36:43 +02:00
|
|
|
|
|
|
|
/* Copying. */
|
|
|
|
map(SYS_UMAP, do_umap); /* map virtual to physical address */
|
2005-05-02 16:30:04 +02:00
|
|
|
map(SYS_VIRCOPY, do_vircopy); /* use pure virtual addressing */
|
2005-04-29 17:36:43 +02:00
|
|
|
map(SYS_PHYSCOPY, do_physcopy); /* use physical addressing */
|
|
|
|
map(SYS_VIRVCOPY, do_virvcopy); /* vector with copy requests */
|
2005-05-10 13:06:24 +02:00
|
|
|
map(SYS_PHYSVCOPY, do_physvcopy); /* vector with copy requests */
|
2005-08-04 11:26:36 +02:00
|
|
|
|
|
|
|
/* Clock functionality. */
|
|
|
|
map(SYS_TIMES, do_times); /* get uptime and process times */
|
|
|
|
map(SYS_SETALARM, do_setalarm); /* schedule a synchronous alarm */
|
|
|
|
|
|
|
|
/* System control. */
|
|
|
|
map(SYS_ABORT, do_abort); /* abort MINIX */
|
|
|
|
map(SYS_GETINFO, do_getinfo); /* request system information */
|
2005-09-30 14:54:59 +02:00
|
|
|
map(SYS_IOPENABLE, do_iopenable); /* Enable I/O */
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
|
2005-07-14 17:12:12 +02:00
|
|
|
/*===========================================================================*
|
2005-09-11 18:44:06 +02:00
|
|
|
* get_priv *
|
2005-07-14 17:12:12 +02:00
|
|
|
*===========================================================================*/
|
2005-07-26 14:48:34 +02:00
|
|
|
PUBLIC int get_priv(rc, proc_type)
|
2005-07-20 17:25:38 +02:00
|
|
|
register struct proc *rc; /* new (child) process pointer */
|
2005-07-21 20:36:40 +02:00
|
|
|
int proc_type; /* system or user process flag */
|
2005-07-14 17:12:12 +02:00
|
|
|
{
|
2005-07-21 20:36:40 +02:00
|
|
|
/* Get a privilege structure. All user processes share the same privilege
|
|
|
|
* structure. System processes get their own privilege structure.
|
|
|
|
*/
|
|
|
|
register struct priv *sp; /* privilege structure */
|
|
|
|
|
|
|
|
if (proc_type == SYS_PROC) { /* find a new slot */
|
|
|
|
for (sp = BEG_PRIV_ADDR; sp < END_PRIV_ADDR; ++sp)
|
|
|
|
if (sp->s_proc_nr == NONE && sp->s_id != USER_PRIV_ID) break;
|
|
|
|
if (sp->s_proc_nr != NONE) return(ENOSPC);
|
|
|
|
rc->p_priv = sp; /* assign new slot */
|
|
|
|
rc->p_priv->s_proc_nr = proc_nr(rc); /* set association */
|
2005-07-29 17:26:23 +02:00
|
|
|
rc->p_priv->s_flags = SYS_PROC; /* mark as privileged */
|
2005-07-21 20:36:40 +02:00
|
|
|
} else {
|
|
|
|
rc->p_priv = &priv[USER_PRIV_ID]; /* use shared slot */
|
|
|
|
rc->p_priv->s_proc_nr = INIT_PROC_NR; /* set association */
|
2005-08-04 11:26:36 +02:00
|
|
|
rc->p_priv->s_flags = 0; /* no initial flags */
|
2005-05-30 13:05:42 +02:00
|
|
|
}
|
2005-07-21 20:36:40 +02:00
|
|
|
return(OK);
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
|
2005-06-03 15:55:06 +02:00
|
|
|
/*===========================================================================*
|
2005-09-11 18:44:06 +02:00
|
|
|
* get_randomness *
|
2005-06-03 15:55:06 +02:00
|
|
|
*===========================================================================*/
|
2005-07-18 17:40:24 +02:00
|
|
|
PUBLIC void get_randomness(source)
|
|
|
|
int source;
|
2005-06-03 15:55:06 +02:00
|
|
|
{
|
2005-08-04 11:26:36 +02:00
|
|
|
/* On machines with the RDTSC (cycle counter read instruction - pentium
|
|
|
|
* and up), use that for high-resolution raw entropy gathering. Otherwise,
|
|
|
|
* use the realtime clock (tick resolution).
|
|
|
|
*
|
|
|
|
* Unfortunately this test is run-time - we don't want to bother with
|
|
|
|
* compiling different kernels for different machines.
|
|
|
|
*
|
|
|
|
* On machines without RDTSC, we use read_clock().
|
|
|
|
*/
|
2005-07-18 17:40:24 +02:00
|
|
|
int r_next;
|
2005-07-27 16:32:16 +02:00
|
|
|
unsigned long tsc_high, tsc_low;
|
2005-07-01 11:39:47 +02:00
|
|
|
|
2005-07-18 17:40:24 +02:00
|
|
|
source %= RANDOM_SOURCES;
|
|
|
|
r_next= krandom.bin[source].r_next;
|
2005-09-11 18:44:06 +02:00
|
|
|
if (machine.processor > 486) {
|
2005-07-27 16:32:16 +02:00
|
|
|
read_tsc(&tsc_high, &tsc_low);
|
|
|
|
krandom.bin[source].r_buf[r_next] = tsc_low;
|
|
|
|
} else {
|
|
|
|
krandom.bin[source].r_buf[r_next] = read_clock();
|
|
|
|
}
|
|
|
|
if (krandom.bin[source].r_size < RANDOM_ELEMENTS) {
|
2005-07-18 17:40:24 +02:00
|
|
|
krandom.bin[source].r_size ++;
|
2005-07-27 16:32:16 +02:00
|
|
|
}
|
2005-07-18 17:40:24 +02:00
|
|
|
krandom.bin[source].r_next = (r_next + 1 ) % RANDOM_ELEMENTS;
|
2005-06-03 15:55:06 +02:00
|
|
|
}
|
|
|
|
|
2005-07-19 14:21:36 +02:00
|
|
|
/*===========================================================================*
|
|
|
|
* send_sig *
|
|
|
|
*===========================================================================*/
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
PUBLIC void send_sig(int proc_nr, int sig_nr)
|
2005-07-19 14:21:36 +02:00
|
|
|
{
|
|
|
|
/* Notify a system process about a signal. This is straightforward. Simply
|
|
|
|
* set the signal that is to be delivered in the pending signals map and
|
|
|
|
* send a notification with source SYSTEM.
|
2006-03-09 15:02:56 +01:00
|
|
|
*
|
|
|
|
* Process number is verified to avoid writing in random places, but we
|
|
|
|
* don't kprintf() or panic() because that causes send_sig() invocations.
|
2005-07-19 14:21:36 +02:00
|
|
|
*/
|
|
|
|
register struct proc *rp;
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
static int n;
|
|
|
|
|
2006-03-09 15:02:56 +01:00
|
|
|
if(!isokprocn(proc_nr) || isemptyn(proc_nr))
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
return;
|
2005-07-19 14:21:36 +02:00
|
|
|
|
|
|
|
rp = proc_addr(proc_nr);
|
|
|
|
sigaddset(&priv(rp)->s_sig_pending, sig_nr);
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
lock_notify(SYSTEM, rp->p_endpoint);
|
2005-07-19 14:21:36 +02:00
|
|
|
}
|
|
|
|
|
2005-04-21 16:53:53 +02:00
|
|
|
/*===========================================================================*
|
|
|
|
* cause_sig *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC void cause_sig(proc_nr, sig_nr)
|
|
|
|
int proc_nr; /* process to be signalled */
|
|
|
|
int sig_nr; /* signal to be sent, 1 to _NSIG */
|
|
|
|
{
|
2005-06-17 11:09:54 +02:00
|
|
|
/* A system process wants to send a signal to a process. Examples are:
|
2005-07-14 17:12:12 +02:00
|
|
|
* - HARDWARE wanting to cause a SIGSEGV after a CPU exception
|
|
|
|
* - TTY wanting to cause SIGINT upon getting a DEL
|
|
|
|
* - FS wanting to cause SIGPIPE for a broken pipe
|
2005-06-17 11:09:54 +02:00
|
|
|
* Signals are handled by sending a message to PM. This function handles the
|
2005-04-29 17:36:43 +02:00
|
|
|
* signals and makes sure the PM gets them by sending a notification. The
|
|
|
|
* process being signaled is blocked while PM has not finished all signals
|
2005-06-24 18:24:40 +02:00
|
|
|
* for it.
|
2005-07-19 14:21:36 +02:00
|
|
|
* Race conditions between calls to this function and the system calls that
|
|
|
|
* process pending kernel signals cannot exist. Signal related functions are
|
|
|
|
* only called when a user process causes a CPU exception and from the kernel
|
|
|
|
* process level, which runs to completion.
|
2005-04-21 16:53:53 +02:00
|
|
|
*/
|
2005-06-21 12:47:46 +02:00
|
|
|
register struct proc *rp;
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-06-24 18:24:40 +02:00
|
|
|
/* Check if the signal is already pending. Process it otherwise. */
|
2005-04-21 16:53:53 +02:00
|
|
|
rp = proc_addr(proc_nr);
|
2005-06-24 18:24:40 +02:00
|
|
|
if (! sigismember(&rp->p_pending, sig_nr)) {
|
|
|
|
sigaddset(&rp->p_pending, sig_nr);
|
2005-06-30 17:55:19 +02:00
|
|
|
if (! (rp->p_rts_flags & SIGNALED)) { /* other pending */
|
2005-08-19 18:43:28 +02:00
|
|
|
if (rp->p_rts_flags == 0) lock_dequeue(rp); /* make not ready */
|
2005-06-30 17:55:19 +02:00
|
|
|
rp->p_rts_flags |= SIGNALED | SIG_PENDING; /* update flags */
|
2005-07-19 14:21:36 +02:00
|
|
|
send_sig(PM_PROC_NR, SIGKSIG);
|
2005-06-30 17:55:19 +02:00
|
|
|
}
|
2005-06-24 18:24:40 +02:00
|
|
|
}
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/*===========================================================================*
|
2005-05-24 12:06:17 +02:00
|
|
|
* umap_bios *
|
2005-04-21 16:53:53 +02:00
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC phys_bytes umap_bios(rp, vir_addr, bytes)
|
|
|
|
register struct proc *rp; /* pointer to proc table entry for process */
|
|
|
|
vir_bytes vir_addr; /* virtual address in BIOS segment */
|
|
|
|
vir_bytes bytes; /* # of bytes to be copied */
|
|
|
|
{
|
2005-04-29 17:36:43 +02:00
|
|
|
/* Calculate the physical memory address at the BIOS. Note: currently, BIOS
|
|
|
|
* address zero (the first BIOS interrupt vector) is not considered, as an
|
|
|
|
* error here, but since the physical address will be zero as well, the
|
|
|
|
* calling function will think an error occurred. This is not a problem,
|
|
|
|
* since no one uses the first BIOS interrupt vector.
|
|
|
|
*/
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
/* Check all acceptable ranges. */
|
|
|
|
if (vir_addr >= BIOS_MEM_BEGIN && vir_addr + bytes <= BIOS_MEM_END)
|
|
|
|
return (phys_bytes) vir_addr;
|
2005-07-21 20:36:40 +02:00
|
|
|
else if (vir_addr >= BASE_MEM_TOP && vir_addr + bytes <= UPPER_MEM_END)
|
2005-04-29 17:36:43 +02:00
|
|
|
return (phys_bytes) vir_addr;
|
2005-07-21 20:36:40 +02:00
|
|
|
|
2005-08-04 11:26:36 +02:00
|
|
|
#if DEAD_CODE /* brutal fix, if the above is too restrictive */
|
2005-06-06 13:54:58 +02:00
|
|
|
if (vir_addr >= BIOS_MEM_BEGIN && vir_addr + bytes <= UPPER_MEM_END)
|
|
|
|
return (phys_bytes) vir_addr;
|
|
|
|
#endif
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
kprintf("Warning, error in umap_bios, virtual address 0x%x\n", vir_addr);
|
|
|
|
return 0;
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* umap_local *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC phys_bytes umap_local(rp, seg, vir_addr, bytes)
|
|
|
|
register struct proc *rp; /* pointer to proc table entry for process */
|
|
|
|
int seg; /* T, D, or S segment */
|
|
|
|
vir_bytes vir_addr; /* virtual address in bytes within the seg */
|
|
|
|
vir_bytes bytes; /* # of bytes to be copied */
|
|
|
|
{
|
|
|
|
/* Calculate the physical memory address for a given virtual address. */
|
|
|
|
vir_clicks vc; /* the virtual address in clicks */
|
|
|
|
phys_bytes pa; /* intermediate variables as phys_bytes */
|
|
|
|
#if (CHIP == INTEL)
|
|
|
|
phys_bytes seg_base;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* If 'seg' is D it could really be S and vice versa. T really means T.
|
|
|
|
* If the virtual address falls in the gap, it causes a problem. On the
|
|
|
|
* 8088 it is probably a legal stack reference, since "stackfaults" are
|
|
|
|
* not detected by the hardware. On 8088s, the gap is called S and
|
|
|
|
* accepted, but on other machines it is called D and rejected.
|
|
|
|
* The Atari ST behaves like the 8088 in this respect.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (bytes <= 0) return( (phys_bytes) 0);
|
2005-05-24 14:30:29 +02:00
|
|
|
if (vir_addr + bytes <= vir_addr) return 0; /* overflow */
|
2005-04-21 16:53:53 +02:00
|
|
|
vc = (vir_addr + bytes - 1) >> CLICK_SHIFT; /* last click of data */
|
|
|
|
|
|
|
|
#if (CHIP == INTEL) || (CHIP == M68000)
|
|
|
|
if (seg != T)
|
|
|
|
seg = (vc < rp->p_memmap[D].mem_vir + rp->p_memmap[D].mem_len ? D : S);
|
|
|
|
#else
|
|
|
|
if (seg != T)
|
|
|
|
seg = (vc < rp->p_memmap[S].mem_vir ? D : S);
|
|
|
|
#endif
|
|
|
|
|
2005-09-11 18:44:06 +02:00
|
|
|
if ((vir_addr>>CLICK_SHIFT) >= rp->p_memmap[seg].mem_vir +
|
2005-04-21 16:53:53 +02:00
|
|
|
rp->p_memmap[seg].mem_len) return( (phys_bytes) 0 );
|
2005-05-24 14:30:29 +02:00
|
|
|
|
2005-09-11 18:44:06 +02:00
|
|
|
if (vc >= rp->p_memmap[seg].mem_vir +
|
2005-05-24 14:30:29 +02:00
|
|
|
rp->p_memmap[seg].mem_len) return( (phys_bytes) 0 );
|
|
|
|
|
2005-04-21 16:53:53 +02:00
|
|
|
#if (CHIP == INTEL)
|
|
|
|
seg_base = (phys_bytes) rp->p_memmap[seg].mem_phys;
|
|
|
|
seg_base = seg_base << CLICK_SHIFT; /* segment origin in bytes */
|
|
|
|
#endif
|
|
|
|
pa = (phys_bytes) vir_addr;
|
|
|
|
#if (CHIP != M68000)
|
|
|
|
pa -= rp->p_memmap[seg].mem_vir << CLICK_SHIFT;
|
|
|
|
return(seg_base + pa);
|
|
|
|
#endif
|
|
|
|
#if (CHIP == M68000)
|
|
|
|
pa -= (phys_bytes)rp->p_memmap[seg].mem_vir << CLICK_SHIFT;
|
|
|
|
pa += (phys_bytes)rp->p_memmap[seg].mem_phys << CLICK_SHIFT;
|
|
|
|
return(pa);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* umap_remote *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC phys_bytes umap_remote(rp, seg, vir_addr, bytes)
|
|
|
|
register struct proc *rp; /* pointer to proc table entry for process */
|
|
|
|
int seg; /* index of remote segment */
|
|
|
|
vir_bytes vir_addr; /* virtual address in bytes within the seg */
|
|
|
|
vir_bytes bytes; /* # of bytes to be copied */
|
|
|
|
{
|
|
|
|
/* Calculate the physical memory address for a given virtual address. */
|
2005-04-29 17:36:43 +02:00
|
|
|
struct far_mem *fm;
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-04-29 17:36:43 +02:00
|
|
|
if (bytes <= 0) return( (phys_bytes) 0);
|
|
|
|
if (seg < 0 || seg >= NR_REMOTE_SEGS) return( (phys_bytes) 0);
|
2005-04-21 16:53:53 +02:00
|
|
|
|
2005-07-14 17:12:12 +02:00
|
|
|
fm = &rp->p_priv->s_farmem[seg];
|
2005-04-29 17:36:43 +02:00
|
|
|
if (! fm->in_use) return( (phys_bytes) 0);
|
|
|
|
if (vir_addr + bytes > fm->mem_len) return( (phys_bytes) 0);
|
|
|
|
|
|
|
|
return(fm->mem_phys + (phys_bytes) vir_addr);
|
2005-04-21 16:53:53 +02:00
|
|
|
}
|
|
|
|
|
2005-09-11 18:44:06 +02:00
|
|
|
/*===========================================================================*
|
|
|
|
* virtual_copy *
|
|
|
|
*===========================================================================*/
|
2005-04-21 16:53:53 +02:00
|
|
|
PUBLIC int virtual_copy(src_addr, dst_addr, bytes)
|
|
|
|
struct vir_addr *src_addr; /* source virtual address */
|
|
|
|
struct vir_addr *dst_addr; /* destination virtual address */
|
|
|
|
vir_bytes bytes; /* # of bytes to copy */
|
|
|
|
{
|
|
|
|
/* Copy bytes from virtual address src_addr to virtual address dst_addr.
|
2005-04-29 17:36:43 +02:00
|
|
|
* Virtual addresses can be in ABS, LOCAL_SEG, REMOTE_SEG, or BIOS_SEG.
|
2005-04-21 16:53:53 +02:00
|
|
|
*/
|
2005-08-29 18:47:18 +02:00
|
|
|
struct vir_addr *vir_addr[2]; /* virtual source and destination address */
|
2005-04-21 16:53:53 +02:00
|
|
|
phys_bytes phys_addr[2]; /* absolute source and destination */
|
|
|
|
int seg_index;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* Check copy count. */
|
2005-07-19 14:21:36 +02:00
|
|
|
if (bytes <= 0) return(EDOM);
|
2005-04-21 16:53:53 +02:00
|
|
|
|
|
|
|
/* Do some more checks and map virtual addresses to physical addresses. */
|
|
|
|
vir_addr[_SRC_] = src_addr;
|
|
|
|
vir_addr[_DST_] = dst_addr;
|
|
|
|
for (i=_SRC_; i<=_DST_; i++) {
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
int proc_nr, type;
|
|
|
|
struct proc *p;
|
|
|
|
|
|
|
|
type = vir_addr[i]->segment & SEGMENT_TYPE;
|
|
|
|
if(type != PHYS_SEG && isokendpt(vir_addr[i]->proc_nr_e, &proc_nr))
|
|
|
|
p = proc_addr(proc_nr);
|
|
|
|
else
|
|
|
|
p = NULL;
|
2005-04-21 16:53:53 +02:00
|
|
|
|
|
|
|
/* Get physical address. */
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
switch(type) {
|
2005-04-21 16:53:53 +02:00
|
|
|
case LOCAL_SEG:
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
if(!p) return EDEADSRCDST;
|
2005-04-21 16:53:53 +02:00
|
|
|
seg_index = vir_addr[i]->segment & SEGMENT_INDEX;
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
phys_addr[i] = umap_local(p, seg_index, vir_addr[i]->offset, bytes);
|
2005-04-21 16:53:53 +02:00
|
|
|
break;
|
|
|
|
case REMOTE_SEG:
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
if(!p) return EDEADSRCDST;
|
2005-04-21 16:53:53 +02:00
|
|
|
seg_index = vir_addr[i]->segment & SEGMENT_INDEX;
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
phys_addr[i] = umap_remote(p, seg_index, vir_addr[i]->offset, bytes);
|
2005-04-21 16:53:53 +02:00
|
|
|
break;
|
|
|
|
case BIOS_SEG:
|
'proc number' is process slot, 'endpoint' are generation-aware process
instance numbers, encoded and decoded using macros in <minix/endpoint.h>.
proc number -> endpoint migration
. proc_nr in the interrupt hook is now an endpoint, proc_nr_e.
. m_source for messages and notifies is now an endpoint, instead of
proc number.
. isokendpt() converts an endpoint to a process number, returns
success (but fails if the process number is out of range, the
process slot is not a living process, or the given endpoint
number does not match the endpoint number in the process slot,
indicating an old process).
. okendpt() is the same as isokendpt(), but panic()s if the conversion
fails. This is mainly used for decoding message.m_source endpoints,
and other endpoint numbers in kernel data structures, which should
always be correct.
. if DEBUG_ENABLE_IPC_WARNINGS is enabled, isokendpt() and okendpt()
get passed the __FILE__ and __LINE__ of the calling lines, and
print messages about what is wrong with the endpoint number
(out of range proc, empty proc, or inconsistent endpoint number),
with the caller, making finding where the conversion failed easy
without having to include code for every call to print where things
went wrong. Sometimes this is harmless (wrong arg to a kernel call),
sometimes it's a fatal internal inconsistency (bogus m_source).
. some process table fields have been appended an _e to indicate it's
become and endpoint.
. process endpoint is stored in p_endpoint, without generation number.
it turns out the kernel never needs the generation number, except
when fork()ing, so it's decoded then.
. kernel calls all take endpoints as arguments, not proc numbers.
the one exception is sys_fork(), which needs to know in which slot
to put the child.
2006-03-03 11:00:02 +01:00
|
|
|
if(!p) return EDEADSRCDST;
|
|
|
|
phys_addr[i] = umap_bios(p, vir_addr[i]->offset, bytes );
|
2005-04-21 16:53:53 +02:00
|
|
|
break;
|
2005-04-29 17:36:43 +02:00
|
|
|
case PHYS_SEG:
|
|
|
|
phys_addr[i] = vir_addr[i]->offset;
|
|
|
|
break;
|
2005-04-21 16:53:53 +02:00
|
|
|
default:
|
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if mapping succeeded. */
|
2005-07-19 14:21:36 +02:00
|
|
|
if (phys_addr[i] <= 0 && vir_addr[i]->segment != PHYS_SEG)
|
2005-04-21 16:53:53 +02:00
|
|
|
return(EFAULT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Now copy bytes between physical addresseses. */
|
|
|
|
phys_copy(phys_addr[_SRC_], phys_addr[_DST_], (phys_bytes) bytes);
|
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|