/* Miscellaneous system calls. Author: Kees J. Bot * 31 Mar 2000 * The entry points into this file are: * do_reboot: kill all processes, then reboot system * do_svrctl: process manager control * do_getsysinfo: request copy of PM data structure (Jorrit N. Herder) * do_getprocnr: lookup process slot number (Jorrit N. Herder) * do_memalloc: allocate a chunk of memory (Jorrit N. Herder) * do_memfree: deallocate a chunk of memory (Jorrit N. Herder) */ #include "pm.h" #include #include #include #include #include #include #include "mproc.h" #include "param.h" /*===========================================================================* * do_allocmem * *===========================================================================*/ PUBLIC int do_allocmem() { vir_clicks mem_clicks; phys_clicks mem_base; mem_clicks = (m_in.memsize + CLICK_SIZE -1 ) >> CLICK_SHIFT; mem_base = alloc_mem(mem_clicks); if (mem_base == NO_MEM) return(ENOMEM); mp->mp_reply.membase = (phys_bytes) (mem_base << CLICK_SHIFT); return(OK); } /*===========================================================================* * do_freemem * *===========================================================================*/ PUBLIC int do_freemem() { vir_clicks mem_clicks; phys_clicks mem_base; mem_clicks = (m_in.memsize + CLICK_SIZE -1 ) >> CLICK_SHIFT; mem_base = (m_in.membase + CLICK_SIZE -1 ) >> CLICK_SHIFT; free_mem(mem_base, mem_clicks); return(OK); } /*===========================================================================* * do_getsysinfo * *===========================================================================*/ PUBLIC int do_getsysinfo() { struct mproc *proc_addr; vir_bytes src_addr, dst_addr; struct kinfo kinfo; size_t len; int s; switch(m_in.info_what) { case SI_KINFO: /* kernel info is obtained via PM */ sys_getkinfo(&kinfo); src_addr = (vir_bytes) &kinfo; len = sizeof(struct kinfo); break; case SI_PROC_ADDR: /* get address of PM process table */ proc_addr = &mproc[0]; src_addr = (vir_bytes) &proc_addr; len = sizeof(struct mproc *); break; case SI_PROC_TAB: /* copy entire process table */ src_addr = (vir_bytes) mproc; len = sizeof(struct mproc) * NR_PROCS; break; default: return(EINVAL); } dst_addr = (vir_bytes) m_in.info_where; if (OK != (s=sys_datacopy(SELF, src_addr, who, dst_addr, len))) return(s); return(OK); } /*===========================================================================* * do_getprocnr * *===========================================================================*/ PUBLIC int do_getprocnr() { register struct mproc *rmp; static char search_key[PROC_NAME_LEN]; int key_len; int s; if (m_in.namelen > 0) { /* lookup process by name */ key_len = MAX(m_in.namelen, PROC_NAME_LEN); if (OK != (s=sys_datacopy(who, (vir_bytes) m_in.addr, SELF, (vir_bytes) search_key, key_len))) return(s); search_key[key_len] = '\0'; /* terminate for safety */ for (rmp = &mproc[0]; rmp < &mproc[NR_PROCS]; rmp++) { if (rmp->mp_flags & IN_USE && strncmp(rmp->mp_name, search_key, key_len)==0) { mp->mp_reply.procnr = (int) (rmp - mproc); return(OK); } } return(ESRCH); } else { /* return own process number */ mp->mp_reply.procnr = who; } return(OK); } /*=====================================================================* * do_reboot * *=====================================================================*/ PUBLIC int do_reboot() { register struct mproc *rmp = mp; char monitor_code[32*sizeof(char *)]; if (rmp->mp_effuid != SUPER_USER) return(EPERM); switch (m_in.reboot_flag) { case RBT_HALT: case RBT_REBOOT: case RBT_PANIC: case RBT_RESET: break; case RBT_MONITOR: if (m_in.reboot_size >= sizeof(monitor_code)) return(EINVAL); if (sys_datacopy(who, (vir_bytes) m_in.reboot_code, PM_PROC_NR, (vir_bytes) monitor_code, (phys_bytes) (m_in.reboot_size+1)) != OK) return(EFAULT); if (monitor_code[m_in.reboot_size] != 0) return(EINVAL); break; default: return(EINVAL); } tell_fs(REBOOT,0,0,0); /* tell FS to prepare for shutdown */ check_sig(-1, SIGKILL); /* kill all processes except init */ /* Ask the kernel to abort. All system services, including the PM, will * get a HARD_STOP notification. Await the notification in the main loop. */ sys_abort(m_in.reboot_flag, PM_PROC_NR, monitor_code, m_in.reboot_size); return(SUSPEND); /* don't reply to killed process */ } /*=====================================================================* * do_svrctl * *=====================================================================*/ PUBLIC int do_svrctl() { int s, req; vir_bytes ptr; req = m_in.svrctl_req; ptr = (vir_bytes) m_in.svrctl_argp; /* Is the request for the kernel? Forward it, except for SYSGETENV. */ if (((req >> 8) & 0xFF) == 'S') { /* Binary compatibility check. */ if (req == SYSGETENV) { printf("SYSGETENV by %d (fix!)\n", who); req = MMGETPARAM; } else /* Simply forward call to the SYSTEM task. */ return(sys_svrctl(who, req, mp->mp_effuid == SUPER_USER, ptr)); } /* Control operations local to the PM. */ switch(req) { case MMGETPARAM: { struct sysgetenv sysgetenv; char search_key[64]; char *val_start; size_t val_len; size_t copy_len; /* Copy sysgetenv structure to PM. */ if (sys_datacopy(who, ptr, SELF, (vir_bytes) &sysgetenv, sizeof(sysgetenv)) != OK) return(EFAULT); if (sysgetenv.keylen == 0) { /* copy all parameters */ val_start = monitor_params; val_len = sizeof(monitor_params); } else { /* lookup value for key */ /* Try to get a copy of the requested key. */ if (sysgetenv.keylen > sizeof(search_key)) return(EINVAL); if ((s = sys_datacopy(who, (vir_bytes) sysgetenv.key, SELF, (vir_bytes) search_key, sysgetenv.keylen)) != OK) return(s); /* Make sure key is null-terminated and lookup value. */ search_key[sysgetenv.keylen-1]= '\0'; if ((val_start = find_param(search_key)) == NULL) return(ESRCH); val_len = strlen(val_start) + 1; } /* Value found, make the actual copy (as far as possible). */ copy_len = MAX(val_len, sysgetenv.vallen); if ((s=sys_datacopy(SELF, (vir_bytes) val_start, who, (vir_bytes) sysgetenv.val, copy_len)) != OK) return(s); /* See if it fits in the client's buffer. */ return (copy_len > sysgetenv.vallen) ? E2BIG : OK; } case MMSIGNON: { /* A user process becomes a task. Simulate an exit by * releasing a waiting parent and disinheriting children. */ struct mproc *rmp; pid_t pidarg; if (mp->mp_effuid != SUPER_USER) return(EPERM); rmp = &mproc[mp->mp_parent]; tell_fs(EXIT, who, 0, 0); pidarg = rmp->mp_wpid; if ((rmp->mp_flags & WAITING) && (pidarg == -1 || pidarg == mp->mp_pid || -pidarg == mp->mp_procgrp)) { /* Wake up the parent. */ rmp->mp_reply.reply_res2 = 0; setreply(mp->mp_parent, mp->mp_pid); rmp->mp_flags &= ~WAITING; } /* Disinherit children. */ for (rmp = &mproc[0]; rmp < &mproc[NR_PROCS]; rmp++) { if (rmp->mp_flags & IN_USE && rmp->mp_parent == who) { rmp->mp_parent = INIT_PROC_NR; } } /* Become like PM and FS. */ mp->mp_pid = mp->mp_procgrp = 0; mp->mp_parent = 0; return(OK); } #if ENABLE_SWAP case MMSWAPON: { struct mmswapon swapon; if (mp->mp_effuid != SUPER_USER) return(EPERM); if (sys_datacopy(who, (phys_bytes) ptr, PM_PROC_NR, (phys_bytes) &swapon, (phys_bytes) sizeof(swapon)) != OK) return(EFAULT); return(swap_on(swapon.file, swapon.offset, swapon.size)); } case MMSWAPOFF: { if (mp->mp_effuid != SUPER_USER) return(EPERM); return(swap_off()); } #endif /* SWAP */ default: return(EINVAL); } }