/* Miscellaneous system calls. Author: Kees J. Bot * 31 Mar 2000 * The entry points into this file are: * do_reboot: kill all processes, then reboot system * do_procstat: request process status (Jorrit N. Herder) * do_getsysinfo: request copy of PM data structure (Jorrit N. Herder) * do_getprocnr: lookup process slot number (Jorrit N. Herder) * do_getepinfo: get the pid/uid/gid of a process given its endpoint * do_allocmem: allocate a chunk of memory (Jorrit N. Herder) * do_freemem: deallocate a chunk of memory (Jorrit N. Herder) * do_getsetpriority: get/set process priority * do_svrctl: process manager control */ #define brk _brk #include "pm.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "mproc.h" #include "param.h" #include "../../kernel/proc.h" PUBLIC struct utsname uts_val = { "Minix", /* system name */ "noname", /* node/network name */ OS_RELEASE, /* O.S. release (e.g. 1.5) */ OS_VERSION, /* O.S. version (e.g. 10) */ "xyzzy", /* machine (cpu) type (filled in later) */ #if __i386 "i386", /* architecture */ #else #error /* oops, no 'uname -mk' */ #endif }; PRIVATE char *uts_tbl[] = { uts_val.arch, NULL, /* No kernel architecture */ uts_val.machine, NULL, /* No hostname */ uts_val.nodename, uts_val.release, uts_val.version, uts_val.sysname, NULL, /* No bus */ /* No bus */ }; #if ENABLE_SYSCALL_STATS PUBLIC unsigned long calls_stats[NCALLS]; #endif FORWARD _PROTOTYPE( int getpciinfo, (struct pciinfo *pciinfo) ); /*===========================================================================* * do_allocmem * *===========================================================================*/ PUBLIC int do_allocmem() { int r; phys_bytes retmembase; r = vm_allocmem(m_in.memsize, (phys_clicks *) &retmembase); if(r == OK) mp->mp_reply.membase = retmembase; return r; } /*===========================================================================* * do_freemem * *===========================================================================*/ PUBLIC int do_freemem() { #if 1 return ENOSYS; #else vir_clicks mem_clicks; phys_clicks mem_base; /* This call is dangerous. Even memory belonging to other processes can * be freed. */ if (mp->mp_effuid != 0) { printf("PM: unauthorized call of do_freemem by proc %d\n", mp->mp_endpoint); sys_sysctl_stacktrace(mp->mp_endpoint); return EPERM; } mem_clicks = (m_in.memsize + CLICK_SIZE -1 ) >> CLICK_SHIFT; mem_base = (m_in.membase + CLICK_SIZE -1 ) >> CLICK_SHIFT; free_mem(mem_base, mem_clicks); return(OK); #endif } /*===========================================================================* * do_procstat * *===========================================================================*/ PUBLIC int do_procstat() { /* For the moment, this is only used to return pending signals to * system processes that request the PM for their own status. * * Future use might include the FS requesting for process status of * any user process. */ /* This call should be removed, or made more general. */ if (m_in.stat_nr == SELF) { mp->mp_reply.sig_set = mp->mp_sigpending; sigemptyset(&mp->mp_sigpending); } else { return(ENOSYS); } return(OK); } /*===========================================================================* * do_sysuname * *===========================================================================*/ PUBLIC int do_sysuname() { /* Set or get uname strings. */ int r; size_t n; char *string; #if 0 /* for updates */ char tmp[sizeof(uts_val.nodename)]; static short sizes[] = { 0, /* arch, (0 = read-only) */ 0, /* kernel */ 0, /* machine */ 0, /* sizeof(uts_val.hostname), */ sizeof(uts_val.nodename), 0, /* release */ 0, /* version */ 0, /* sysname */ }; #endif if ((unsigned) m_in.sysuname_field >= _UTS_MAX) return(EINVAL); string = uts_tbl[m_in.sysuname_field]; if (string == NULL) return EINVAL; /* Unsupported field */ switch (m_in.sysuname_req) { case _UTS_GET: /* Copy an uname string to the user. */ n = strlen(string) + 1; if (n > m_in.sysuname_len) n = m_in.sysuname_len; r = sys_vircopy(SELF, D, (phys_bytes) string, mp->mp_endpoint, D, (phys_bytes) m_in.sysuname_value, (phys_bytes) n); if (r < 0) return(r); break; #if 0 /* no updates yet */ case _UTS_SET: /* Set an uname string, needs root power. */ len = sizes[m_in.sysuname_field]; if (mp->mp_effuid != 0 || len == 0) return(EPERM); n = len < m_in.sysuname_len ? len : m_in.sysuname_len; if (n <= 0) return(EINVAL); r = sys_vircopy(mp->mp_endpoint, D, (phys_bytes) m_in.sysuname_value, SELF, D, (phys_bytes) tmp, (phys_bytes) n); if (r < 0) return(r); tmp[n-1] = 0; strcpy(string, tmp); break; #endif default: return(EINVAL); } /* Return the number of bytes moved. */ return(n); } /*===========================================================================* * do_getsysinfo * *===========================================================================*/ PUBLIC int do_getsysinfo() { struct mproc *proc_addr; vir_bytes src_addr, dst_addr; struct kinfo kinfo; struct loadinfo loadinfo; struct pciinfo pciinfo; static struct proc proctab[NR_PROCS+NR_TASKS]; size_t len; int s, r; /* This call leaks important information (the contents of registers). */ if (mp->mp_effuid != 0) { printf("PM: unauthorized call of do_getsysinfo by proc %d '%s'\n", mp->mp_endpoint, mp->mp_name); sys_sysctl_stacktrace(mp->mp_endpoint); return EPERM; } switch(m_in.info_what) { case SI_KINFO: /* kernel info is obtained via PM */ sys_getkinfo(&kinfo); src_addr = (vir_bytes) &kinfo; len = sizeof(struct kinfo); break; case SI_PROC_ADDR: /* get address of PM process table */ proc_addr = &mproc[0]; src_addr = (vir_bytes) &proc_addr; len = sizeof(struct mproc *); break; case SI_PROC_TAB: /* copy entire process table */ src_addr = (vir_bytes) mproc; len = sizeof(struct mproc) * NR_PROCS; break; case SI_KPROC_TAB: /* copy entire process table */ if((r=sys_getproctab(proctab)) != OK) return r; src_addr = (vir_bytes) proctab; len = sizeof(proctab); break; case SI_LOADINFO: /* loadinfo is obtained via PM */ sys_getloadinfo(&loadinfo); src_addr = (vir_bytes) &loadinfo; len = sizeof(struct loadinfo); break; case SI_PCI_INFO: /* PCI info is obtained via PM */ if ((r=getpciinfo(&pciinfo)) != OK) return r; src_addr = (vir_bytes) &pciinfo; len = sizeof(struct pciinfo); break; #if ENABLE_SYSCALL_STATS case SI_CALL_STATS: src_addr = (vir_bytes) calls_stats; len = sizeof(calls_stats); break; #endif default: return(EINVAL); } dst_addr = (vir_bytes) m_in.info_where; if (OK != (s=sys_datacopy(SELF, src_addr, who_e, dst_addr, len))) return(s); return(OK); } /*===========================================================================* * do_getsysinfo_up * *===========================================================================*/ PUBLIC int do_getsysinfo_up() { vir_bytes src_addr, dst_addr; struct loadinfo loadinfo; size_t len, real_len; int s; switch(m_in.SIU_WHAT) { case SIU_LOADINFO: /* loadinfo is obtained via PM */ sys_getloadinfo(&loadinfo); src_addr = (vir_bytes) &loadinfo; real_len = sizeof(struct loadinfo); break; case SIU_SYSTEMHZ: src_addr = (vir_bytes) &system_hz; real_len = sizeof(system_hz); break; default: return(EINVAL); } /* Let application know what the length was. */ len = real_len; if(len > m_in.SIU_LEN) len = m_in.SIU_LEN; dst_addr = (vir_bytes) m_in.SIU_WHERE; if (OK != (s=sys_datacopy(SELF, src_addr, who_e, dst_addr, len))) return(s); return(real_len); } /*===========================================================================* * do_getprocnr * *===========================================================================*/ PUBLIC int do_getprocnr() { register struct mproc *rmp; static char search_key[PROC_NAME_LEN+1]; int key_len; int s; /* This call should be moved to DS. */ if (mp->mp_effuid != 0) { /* For now, allow non-root processes to request their own endpoint. */ if (m_in.pid < 0 && m_in.namelen == 0) { mp->mp_reply.PM_ENDPT = who_e; mp->mp_reply.PM_PENDPT = NONE; return OK; } printf("PM: unauthorized call of do_getprocnr by proc %d\n", mp->mp_endpoint); sys_sysctl_stacktrace(mp->mp_endpoint); return EPERM; } #if 0 printf("PM: do_getprocnr(%d) call from endpoint %d, %s\n", m_in.pid, mp->mp_endpoint, mp->mp_name); #endif if (m_in.pid >= 0) { /* lookup process by pid */ if ((rmp = find_proc(m_in.pid)) != NIL_MPROC) { mp->mp_reply.PM_ENDPT = rmp->mp_endpoint; #if 0 printf("PM: pid result: %d\n", rmp->mp_endpoint); #endif return(OK); } return(ESRCH); } else if (m_in.namelen > 0) { /* lookup process by name */ key_len = MIN(m_in.namelen, PROC_NAME_LEN); if (OK != (s=sys_datacopy(who_e, (vir_bytes) m_in.PMBRK_ADDR, SELF, (vir_bytes) search_key, key_len))) return(s); search_key[key_len] = '\0'; /* terminate for safety */ for (rmp = &mproc[0]; rmp < &mproc[NR_PROCS]; rmp++) { if (((rmp->mp_flags & (IN_USE | EXITING)) == IN_USE) && strncmp(rmp->mp_name, search_key, key_len)==0) { mp->mp_reply.PM_ENDPT = rmp->mp_endpoint; return(OK); } } return(ESRCH); } else { /* return own/parent process number */ #if 0 printf("PM: endpt result: %d\n", mp->mp_reply.PM_ENDPT); #endif mp->mp_reply.PM_ENDPT = who_e; mp->mp_reply.PM_PENDPT = mproc[mp->mp_parent].mp_endpoint; } return(OK); } /*===========================================================================* * do_getepinfo * *===========================================================================*/ PUBLIC int do_getepinfo() { register struct mproc *rmp; endpoint_t ep; /* This call should be moved to DS. */ if (mp->mp_effuid != 0) { printf("PM: unauthorized call of do_getepinfo by proc %d\n", mp->mp_endpoint); sys_sysctl_stacktrace(mp->mp_endpoint); return EPERM; } ep= m_in.PM_ENDPT; for (rmp = &mproc[0]; rmp < &mproc[NR_PROCS]; rmp++) { if ((rmp->mp_flags & IN_USE) && (rmp->mp_endpoint == ep)) { mp->mp_reply.reply_res2 = rmp->mp_effuid; mp->mp_reply.reply_res3 = rmp->mp_effgid; return(rmp->mp_pid); } } /* Process not found */ return(ESRCH); } /*===========================================================================* * do_reboot * *===========================================================================*/ PUBLIC int do_reboot() { message m; int r; /* Check permission to abort the system. */ if (mp->mp_effuid != SUPER_USER) return(EPERM); /* See how the system should be aborted. */ abort_flag = (unsigned) m_in.reboot_flag; if (abort_flag >= RBT_INVALID) return(EINVAL); if (RBT_MONITOR == abort_flag) { int r; if(m_in.reboot_strlen >= sizeof(monitor_code)) return EINVAL; if((r = sys_datacopy(who_e, (vir_bytes) m_in.reboot_code, SELF, (vir_bytes) monitor_code, m_in.reboot_strlen)) != OK) return r; monitor_code[m_in.reboot_strlen] = '\0'; } else monitor_code[0] = '\0'; /* Order matters here. When FS is told to reboot, it exits all its * processes, and then would be confused if they're exited again by * SIGKILL. So first kill, then reboot. */ check_sig(-1, SIGKILL); /* kill all users except init */ sys_stop(INIT_PROC_NR); /* stop init, but keep it around */ /* Tell FS to reboot */ m.m_type = PM_REBOOT; tell_fs(&mproc[FS_PROC_NR], &m); return(SUSPEND); /* don't reply to caller */ } /*===========================================================================* * do_getsetpriority * *===========================================================================*/ PUBLIC int do_getsetpriority() { int r, arg_which, arg_who, arg_pri; struct mproc *rmp; arg_which = m_in.m1_i1; arg_who = m_in.m1_i2; arg_pri = m_in.m1_i3; /* for SETPRIORITY */ /* Code common to GETPRIORITY and SETPRIORITY. */ /* Only support PRIO_PROCESS for now. */ if (arg_which != PRIO_PROCESS) return(EINVAL); if (arg_who == 0) rmp = mp; else if ((rmp = find_proc(arg_who)) == NIL_MPROC) return(ESRCH); if (mp->mp_effuid != SUPER_USER && mp->mp_effuid != rmp->mp_effuid && mp->mp_effuid != rmp->mp_realuid) return EPERM; /* If GET, that's it. */ if (call_nr == GETPRIORITY) { return(rmp->mp_nice - PRIO_MIN); } /* Only root is allowed to reduce the nice level. */ if (rmp->mp_nice > arg_pri && mp->mp_effuid != SUPER_USER) return(EACCES); /* We're SET, and it's allowed. */ if ((r = sys_nice(rmp->mp_endpoint, arg_pri)) != OK) return(r); rmp->mp_nice = arg_pri; return(OK); } /*===========================================================================* * do_svrctl * *===========================================================================*/ PUBLIC int do_svrctl() { int s, req; vir_bytes ptr; #define MAX_LOCAL_PARAMS 2 static struct { char name[30]; char value[30]; } local_param_overrides[MAX_LOCAL_PARAMS]; static int local_params = 0; req = m_in.svrctl_req; ptr = (vir_bytes) m_in.svrctl_argp; /* Is the request indeed for the MM? */ if (((req >> 8) & 0xFF) != 'M') return(EINVAL); /* Control operations local to the PM. */ switch(req) { case MMSETPARAM: case MMGETPARAM: { struct sysgetenv sysgetenv; char search_key[64]; char *val_start; size_t val_len; size_t copy_len; /* Copy sysgetenv structure to PM. */ if (sys_datacopy(who_e, ptr, SELF, (vir_bytes) &sysgetenv, sizeof(sysgetenv)) != OK) return(EFAULT); /* Set a param override? */ if (req == MMSETPARAM) { if (local_params >= MAX_LOCAL_PARAMS) return ENOSPC; if (sysgetenv.keylen <= 0 || sysgetenv.keylen >= sizeof(local_param_overrides[local_params].name) || sysgetenv.vallen <= 0 || sysgetenv.vallen >= sizeof(local_param_overrides[local_params].value)) return EINVAL; if ((s = sys_datacopy(who_e, (vir_bytes) sysgetenv.key, SELF, (vir_bytes) local_param_overrides[local_params].name, sysgetenv.keylen)) != OK) return s; if ((s = sys_datacopy(who_e, (vir_bytes) sysgetenv.val, SELF, (vir_bytes) local_param_overrides[local_params].value, sysgetenv.vallen)) != OK) return s; local_param_overrides[local_params].name[sysgetenv.keylen] = '\0'; local_param_overrides[local_params].value[sysgetenv.vallen] = '\0'; local_params++; return OK; } if (sysgetenv.keylen == 0) { /* copy all parameters */ val_start = monitor_params; val_len = sizeof(monitor_params); } else { /* lookup value for key */ int p; /* Try to get a copy of the requested key. */ if (sysgetenv.keylen > sizeof(search_key)) return(EINVAL); if ((s = sys_datacopy(who_e, (vir_bytes) sysgetenv.key, SELF, (vir_bytes) search_key, sysgetenv.keylen)) != OK) return(s); /* Make sure key is null-terminated and lookup value. * First check local overrides. */ search_key[sysgetenv.keylen-1]= '\0'; for(p = 0; p < local_params; p++) { if (!strcmp(search_key, local_param_overrides[p].name)) { val_start = local_param_overrides[p].value; break; } } if (p >= local_params && (val_start = find_param(search_key)) == NULL) return(ESRCH); val_len = strlen(val_start) + 1; } /* See if it fits in the client's buffer. */ if (val_len > sysgetenv.vallen) return E2BIG; /* Value found, make the actual copy (as far as possible). */ copy_len = MIN(val_len, sysgetenv.vallen); if ((s=sys_datacopy(SELF, (vir_bytes) val_start, who_e, (vir_bytes) sysgetenv.val, copy_len)) != OK) return(s); return OK; } default: return(EINVAL); } } /*===========================================================================* * _brk * *===========================================================================*/ extern char *_brksize; PUBLIC int brk(brk_addr) char *brk_addr; { int r; /* PM wants to call brk() itself. */ if((r=vm_brk(PM_PROC_NR, brk_addr)) != OK) { #if 0 printf("PM: own brk(%p) failed: vm_brk() returned %d\n", brk_addr, r); #endif return -1; } _brksize = brk_addr; return 0; } /*===========================================================================* * getpciinfo * *===========================================================================*/ PRIVATE int getpciinfo(pciinfo) struct pciinfo *pciinfo; { int devind, r; struct pciinfo_entry *entry; char *name; u16_t vid, did; /* look up PCI process number */ pci_init(); /* start enumerating devices */ entry = pciinfo->pi_entries; r = pci_first_dev(&devind, &vid, &did); while (r) { /* fetch device name */ name = pci_dev_name(vid, did); if (!name) name = ""; /* store device information in table */ assert((char *) entry < (char *) (pciinfo + 1)); entry->pie_vid = vid; entry->pie_did = did; strncpy(entry->pie_name, name, sizeof(entry->pie_name)); entry->pie_name[sizeof(entry->pie_name) - 1] = 0; entry++; /* continue with the next device */ r = pci_next_dev(&devind, &vid, &did); } /* store number of entries */ pciinfo->pi_count = entry - pciinfo->pi_entries; return OK; }