628 lines
17 KiB
C
628 lines
17 KiB
C
/* This file contains a collection of miscellaneous procedures. Some of them
|
|
* perform simple system calls. Some others do a little part of system calls
|
|
* that are mostly performed by the Memory Manager.
|
|
*
|
|
* The entry points into this file are
|
|
* do_dup: perform the DUP system call
|
|
* do_fcntl: perform the FCNTL system call
|
|
* do_sync: perform the SYNC system call
|
|
* do_fsync: perform the FSYNC system call
|
|
* do_reboot: sync disks and prepare for shutdown
|
|
* do_fork: adjust the tables after PM has performed a FORK system call
|
|
* do_exec: handle files with FD_CLOEXEC on after PM has done an EXEC
|
|
* do_exit: a process has exited; note that in the tables
|
|
* do_set: set uid or gid for some process
|
|
* do_revive: revive a process that was waiting for something (e.g. TTY)
|
|
* do_svrctl: file system control
|
|
* do_getsysinfo: request copy of FS data structure
|
|
* pm_dumpcore: create a core dump
|
|
*/
|
|
|
|
#include "fs.h"
|
|
#include <fcntl.h>
|
|
#include <assert.h>
|
|
#include <unistd.h> /* cc runs out of memory with unistd.h :-( */
|
|
#include <minix/callnr.h>
|
|
#include <minix/safecopies.h>
|
|
#include <minix/endpoint.h>
|
|
#include <minix/com.h>
|
|
#include <minix/u64.h>
|
|
#include <sys/ptrace.h>
|
|
#include <sys/svrctl.h>
|
|
#include "file.h"
|
|
#include "fproc.h"
|
|
#include "param.h"
|
|
#include <minix/vfsif.h>
|
|
#include "vnode.h"
|
|
#include "vmnt.h"
|
|
|
|
#define CORE_NAME "core"
|
|
#define CORE_MODE 0777 /* mode to use on core image files */
|
|
|
|
#if ENABLE_SYSCALL_STATS
|
|
PUBLIC unsigned long calls_stats[NCALLS];
|
|
#endif
|
|
|
|
FORWARD _PROTOTYPE( void free_proc, (struct fproc *freed, int flags) );
|
|
FORWARD _PROTOTYPE( void unmount_all, (void) );
|
|
/*
|
|
FORWARD _PROTOTYPE( int dumpcore, (int proc_e, struct mem_map *seg_ptr) );
|
|
FORWARD _PROTOTYPE( int write_bytes, (struct inode *rip, off_t off,
|
|
char *buf, size_t bytes) );
|
|
FORWARD _PROTOTYPE( int write_seg, (struct inode *rip, off_t off, int proc_e,
|
|
int seg, off_t seg_off, phys_bytes seg_bytes) );
|
|
*/
|
|
|
|
#define FP_EXITING 1
|
|
|
|
|
|
/*===========================================================================*
|
|
* do_getsysinfo *
|
|
*===========================================================================*/
|
|
PUBLIC int do_getsysinfo()
|
|
{
|
|
struct fproc *proc_addr;
|
|
vir_bytes src_addr, dst_addr;
|
|
size_t len;
|
|
int s;
|
|
|
|
/* Only su may call do_getsysinfo. This call may leak information (and is not
|
|
* stable enough to be part of the API/ABI).
|
|
*/
|
|
|
|
if (!super_user) return(EPERM);
|
|
|
|
switch(m_in.info_what) {
|
|
case SI_PROC_ADDR:
|
|
proc_addr = &fproc[0];
|
|
src_addr = (vir_bytes) &proc_addr;
|
|
len = sizeof(struct fproc *);
|
|
break;
|
|
case SI_PROC_TAB:
|
|
src_addr = (vir_bytes) fproc;
|
|
len = sizeof(struct fproc) * NR_PROCS;
|
|
break;
|
|
case SI_DMAP_TAB:
|
|
src_addr = (vir_bytes) dmap;
|
|
len = sizeof(struct dmap) * NR_DEVICES;
|
|
break;
|
|
#if ENABLE_SYSCALL_STATS
|
|
case SI_CALL_STATS:
|
|
src_addr = (vir_bytes) calls_stats;
|
|
len = sizeof(calls_stats);
|
|
break;
|
|
#endif
|
|
default:
|
|
return(EINVAL);
|
|
}
|
|
|
|
dst_addr = (vir_bytes) m_in.info_where;
|
|
if (OK != (s = sys_datacopy(SELF, src_addr, who_e, dst_addr, len))) return(s);
|
|
return(OK);
|
|
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* do_dup *
|
|
*===========================================================================*/
|
|
PUBLIC int do_dup()
|
|
{
|
|
/* Perform the dup(fd) or dup2(fd,fd2) system call. These system calls are
|
|
* obsolete. In fact, it is not even possible to invoke them using the
|
|
* current library because the library routines call fcntl(). They are
|
|
* provided to permit old binary programs to continue to run.
|
|
*/
|
|
|
|
register int rfd;
|
|
register struct filp *f;
|
|
struct filp *dummy;
|
|
int r;
|
|
|
|
/* Is the file descriptor valid? */
|
|
rfd = m_in.fd & ~DUP_MASK; /* kill off dup2 bit, if on */
|
|
if ((f = get_filp(rfd)) == NULL) return(err_code);
|
|
|
|
/* Distinguish between dup and dup2. */
|
|
if (m_in.fd == rfd) { /* bit not on */
|
|
/* dup(fd) */
|
|
if ((r = get_fd(0, 0, &m_in.fd2, &dummy)) != OK) return(r);
|
|
} else {
|
|
/* dup2(fd, fd2) */
|
|
if (m_in.fd2 < 0 || m_in.fd2 >= OPEN_MAX) return(EBADF);
|
|
if (rfd == m_in.fd2) return(m_in.fd2); /* ignore the call: dup2(x, x) */
|
|
m_in.fd = m_in.fd2; /* prepare to close fd2 */
|
|
(void) do_close(); /* cannot fail */
|
|
}
|
|
|
|
/* Success. Set up new file descriptors. */
|
|
f->filp_count++;
|
|
fp->fp_filp[m_in.fd2] = f;
|
|
FD_SET(m_in.fd2, &fp->fp_filp_inuse);
|
|
return(m_in.fd2);
|
|
}
|
|
|
|
|
|
/*===========================================================================*
|
|
* do_fcntl *
|
|
*===========================================================================*/
|
|
PUBLIC int do_fcntl()
|
|
{
|
|
/* Perform the fcntl(fd, request, ...) system call. */
|
|
|
|
register struct filp *f;
|
|
int new_fd, r, fl;
|
|
struct filp *dummy;
|
|
|
|
/* Is the file descriptor valid? */
|
|
if ((f = get_filp(m_in.fd)) == NULL) return(err_code);
|
|
|
|
switch (m_in.request) {
|
|
case F_DUPFD:
|
|
/* This replaces the old dup() system call. */
|
|
if (m_in.addr < 0 || m_in.addr >= OPEN_MAX) return(EINVAL);
|
|
if ((r = get_fd(m_in.addr, 0, &new_fd, &dummy)) != OK) return(r);
|
|
f->filp_count++;
|
|
fp->fp_filp[new_fd] = f;
|
|
return(new_fd);
|
|
|
|
case F_GETFD:
|
|
/* Get close-on-exec flag (FD_CLOEXEC in POSIX Table 6-2). */
|
|
return( FD_ISSET(m_in.fd, &fp->fp_cloexec_set) ? FD_CLOEXEC : 0);
|
|
|
|
case F_SETFD:
|
|
/* Set close-on-exec flag (FD_CLOEXEC in POSIX Table 6-2). */
|
|
if(m_in.addr & FD_CLOEXEC)
|
|
FD_SET(m_in.fd, &fp->fp_cloexec_set);
|
|
else
|
|
FD_CLR(m_in.fd, &fp->fp_cloexec_set);
|
|
return(OK);
|
|
|
|
case F_GETFL:
|
|
/* Get file status flags (O_NONBLOCK and O_APPEND). */
|
|
fl = f->filp_flags & (O_NONBLOCK | O_APPEND | O_ACCMODE);
|
|
return(fl);
|
|
|
|
case F_SETFL:
|
|
/* Set file status flags (O_NONBLOCK and O_APPEND). */
|
|
fl = O_NONBLOCK | O_APPEND | O_REOPEN;
|
|
f->filp_flags = (f->filp_flags & ~fl) | (m_in.addr & fl);
|
|
return(OK);
|
|
|
|
case F_GETLK:
|
|
case F_SETLK:
|
|
case F_SETLKW:
|
|
/* Set or clear a file lock. */
|
|
r = lock_op(f, m_in.request);
|
|
return(r);
|
|
|
|
case F_FREESP:
|
|
{
|
|
/* Free a section of a file. Preparation is done here, actual freeing
|
|
* in freesp_inode().
|
|
*/
|
|
off_t start, end;
|
|
struct flock flock_arg;
|
|
signed long offset;
|
|
|
|
/* Check if it's a regular file. */
|
|
if((f->filp_vno->v_mode & I_TYPE) != I_REGULAR) return(EINVAL);
|
|
if (!(f->filp_mode & W_BIT)) return(EBADF);
|
|
|
|
/* Copy flock data from userspace. */
|
|
if((r = sys_datacopy(who_e, (vir_bytes) m_in.name1, SELF,
|
|
(vir_bytes) &flock_arg, (phys_bytes) sizeof(flock_arg))) != OK)
|
|
return(r);
|
|
|
|
/* Convert starting offset to signed. */
|
|
offset = (signed long) flock_arg.l_start;
|
|
|
|
/* Figure out starting position base. */
|
|
switch(flock_arg.l_whence) {
|
|
case SEEK_SET: start = 0; break;
|
|
case SEEK_CUR:
|
|
if (ex64hi(f->filp_pos) != 0)
|
|
panic("do_fcntl: position in file too high");
|
|
start = ex64lo(f->filp_pos);
|
|
break;
|
|
case SEEK_END: start = f->filp_vno->v_size; break;
|
|
default: return EINVAL;
|
|
}
|
|
|
|
/* Check for overflow or underflow. */
|
|
if(offset > 0 && start + offset < start) return EINVAL;
|
|
if(offset < 0 && start + offset > start) return EINVAL;
|
|
start += offset;
|
|
if(start < 0) return EINVAL;
|
|
|
|
if(flock_arg.l_len != 0) {
|
|
if(start >= f->filp_vno->v_size) return EINVAL;
|
|
end = start + flock_arg.l_len;
|
|
if(end <= start) return EINVAL;
|
|
if(end > f->filp_vno->v_size) end = f->filp_vno->v_size;
|
|
} else {
|
|
end = 0;
|
|
}
|
|
|
|
r = req_ftrunc(f->filp_vno->v_fs_e, f->filp_vno->v_inode_nr, start,
|
|
end);
|
|
|
|
if(r == OK && flock_arg.l_len == 0)
|
|
f->filp_vno->v_size = start;
|
|
|
|
return(r);
|
|
}
|
|
|
|
default:
|
|
return(EINVAL);
|
|
}
|
|
}
|
|
|
|
|
|
/*===========================================================================*
|
|
* do_sync *
|
|
*===========================================================================*/
|
|
PUBLIC int do_sync()
|
|
{
|
|
struct vmnt *vmp;
|
|
for (vmp = &vmnt[0]; vmp < &vmnt[NR_MNTS]; ++vmp)
|
|
if (vmp->m_dev != NO_DEV)
|
|
req_sync(vmp->m_fs_e);
|
|
|
|
return(OK);
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* do_fsync *
|
|
*===========================================================================*/
|
|
PUBLIC int do_fsync()
|
|
{
|
|
/* Perform the fsync() system call. For now, don't be unnecessarily smart. */
|
|
|
|
do_sync();
|
|
return(OK);
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* unmount_all *
|
|
*===========================================================================*/
|
|
PRIVATE void unmount_all(void)
|
|
{
|
|
/* Unmount all filesystems. File systems are mounted on other file systems,
|
|
* so you have to pull off the loose bits repeatedly to get it all undone.
|
|
*/
|
|
|
|
int i;
|
|
for (i= 0; i < NR_MNTS; i++) {
|
|
struct vmnt *vmp;
|
|
|
|
/* Unmount at least one. */
|
|
for (vmp = &vmnt[0]; vmp < &vmnt[NR_MNTS]; vmp++) {
|
|
if (vmp->m_dev != NO_DEV)
|
|
unmount(vmp->m_dev, NULL);
|
|
}
|
|
}
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* pm_reboot *
|
|
*===========================================================================*/
|
|
PUBLIC void pm_reboot()
|
|
{
|
|
/* Perform the FS side of the reboot call. */
|
|
int i;
|
|
|
|
do_sync();
|
|
|
|
SANITYCHECK;
|
|
|
|
/* Do exit processing for all leftover processes and servers,
|
|
* but don't actually exit them (if they were really gone, PM
|
|
* will tell us about it).
|
|
*/
|
|
for (i = 0; i < NR_PROCS; i++)
|
|
if((m_in.endpt1 = fproc[i].fp_endpoint) != NONE) {
|
|
/* No FP_EXITING, just free the resources, otherwise
|
|
* consistency check for fp_endpoint (set to NONE) will
|
|
* fail if process wants to do something in the (short)
|
|
* future.
|
|
*/
|
|
free_proc(&fproc[i], 0);
|
|
}
|
|
SANITYCHECK;
|
|
|
|
unmount_all();
|
|
|
|
SANITYCHECK;
|
|
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* pm_fork *
|
|
*===========================================================================*/
|
|
PUBLIC void pm_fork(pproc, cproc, cpid)
|
|
int pproc; /* Parent process */
|
|
int cproc; /* Child process */
|
|
int cpid; /* Child process id */
|
|
{
|
|
/* Perform those aspects of the fork() system call that relate to files.
|
|
* In particular, let the child inherit its parent's file descriptors.
|
|
* The parent and child parameters tell who forked off whom. The file
|
|
* system uses the same slot numbers as the kernel. Only PM makes this call.
|
|
*/
|
|
|
|
register struct fproc *cp;
|
|
int i, parentno, childno;
|
|
|
|
/* Check up-to-dateness of fproc. */
|
|
okendpt(pproc, &parentno);
|
|
|
|
/* PM gives child endpoint, which implies process slot information.
|
|
* Don't call isokendpt, because that will verify if the endpoint
|
|
* number is correct in fproc, which it won't be.
|
|
*/
|
|
childno = _ENDPOINT_P(cproc);
|
|
if(childno < 0 || childno >= NR_PROCS)
|
|
panic("FS: bogus child for forking: %d", m_in.child_endpt);
|
|
if(fproc[childno].fp_pid != PID_FREE)
|
|
panic("FS: forking on top of in-use child: %d", childno);
|
|
|
|
/* Copy the parent's fproc struct to the child. */
|
|
fproc[childno] = fproc[parentno];
|
|
|
|
/* Increase the counters in the 'filp' table. */
|
|
cp = &fproc[childno];
|
|
fp = &fproc[parentno];
|
|
|
|
for (i = 0; i < OPEN_MAX; i++)
|
|
if (cp->fp_filp[i] != NULL) cp->fp_filp[i]->filp_count++;
|
|
|
|
/* Fill in new process and endpoint id. */
|
|
cp->fp_pid = cpid;
|
|
cp->fp_endpoint = cproc;
|
|
|
|
/* A forking process never has an outstanding grant,
|
|
* as it isn't blocking on i/o.
|
|
*/
|
|
if(GRANT_VALID(fp->fp_grant)) {
|
|
printf("vfs: fork: fp (endpoint %d) has grant %d\n", fp->fp_endpoint, fp->fp_grant);
|
|
panic("fp contains valid grant");
|
|
}
|
|
if(GRANT_VALID(cp->fp_grant)) {
|
|
printf("vfs: fork: cp (endpoint %d) has grant %d\n", cp->fp_endpoint, cp->fp_grant);
|
|
panic("cp contains valid grant");
|
|
}
|
|
|
|
/* A child is not a process leader. */
|
|
cp->fp_sesldr = 0;
|
|
|
|
/* This child has not exec()ced yet. */
|
|
cp->fp_execced = 0;
|
|
|
|
/* Record the fact that both root and working dir have another user. */
|
|
if(cp->fp_rd) dup_vnode(cp->fp_rd);
|
|
if(cp->fp_wd) dup_vnode(cp->fp_wd);
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* free_proc *
|
|
*===========================================================================*/
|
|
PRIVATE void free_proc(struct fproc *exiter, int flags)
|
|
{
|
|
int i;
|
|
register struct fproc *rfp;
|
|
register struct filp *rfilp;
|
|
register struct vnode *vp;
|
|
dev_t dev;
|
|
|
|
SANITYCHECK;
|
|
|
|
fp = exiter; /* get_filp() needs 'fp' */
|
|
|
|
if(fp->fp_endpoint == NONE) {
|
|
panic("free_proc: already free");
|
|
}
|
|
|
|
if (fp_is_blocked(fp)) {
|
|
SANITYCHECK;
|
|
unpause(fp->fp_endpoint);
|
|
SANITYCHECK;
|
|
}
|
|
|
|
SANITYCHECK;
|
|
|
|
/* Loop on file descriptors, closing any that are open. */
|
|
for (i = 0; i < OPEN_MAX; i++) {
|
|
(void) close_fd(fp, i);
|
|
}
|
|
|
|
/* Check if any process is SUSPENDed on this driver.
|
|
* If a driver exits, unmap its entries in the dmap table.
|
|
* (unmapping has to be done after the first step, because the
|
|
* dmap table is used in the first step.)
|
|
*/
|
|
unsuspend_by_endpt(fp->fp_endpoint);
|
|
|
|
/* Release root and working directories. */
|
|
if(fp->fp_rd) { put_vnode(fp->fp_rd); fp->fp_rd = NULL; }
|
|
if(fp->fp_wd) { put_vnode(fp->fp_wd); fp->fp_wd = NULL; }
|
|
|
|
/* The rest of these actions is only done when processes actually
|
|
* exit.
|
|
*/
|
|
if(!(flags & FP_EXITING)) {
|
|
SANITYCHECK;
|
|
return;
|
|
}
|
|
|
|
/* Invalidate endpoint number for error and sanity checks. */
|
|
fp->fp_endpoint = NONE;
|
|
|
|
/* If a session leader exits and it has a controlling tty, then revoke
|
|
* access to its controlling tty from all other processes using it.
|
|
*/
|
|
if (fp->fp_sesldr && fp->fp_tty != 0) {
|
|
|
|
dev = fp->fp_tty;
|
|
|
|
for (rfp = &fproc[0]; rfp < &fproc[NR_PROCS]; rfp++) {
|
|
if(rfp->fp_pid == PID_FREE) continue;
|
|
if (rfp->fp_tty == dev) rfp->fp_tty = 0;
|
|
|
|
for (i = 0; i < OPEN_MAX; i++) {
|
|
if ((rfilp = rfp->fp_filp[i]) == NULL) continue;
|
|
if (rfilp->filp_mode == FILP_CLOSED) continue;
|
|
vp = rfilp->filp_vno;
|
|
if ((vp->v_mode & I_TYPE) != I_CHAR_SPECIAL) continue;
|
|
if ((dev_t) vp->v_sdev != dev) continue;
|
|
|
|
(void) dev_close(dev, rfilp-filp);
|
|
/* Ignore any errors, even SUSPEND. */
|
|
|
|
rfilp->filp_mode = FILP_CLOSED;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Exit done. Mark slot as free. */
|
|
fp->fp_pid = PID_FREE;
|
|
|
|
SANITYCHECK;
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* pm_exit *
|
|
*===========================================================================*/
|
|
PUBLIC void pm_exit(proc)
|
|
int proc;
|
|
{
|
|
int exitee_p;
|
|
/* Perform the file system portion of the exit(status) system call. */
|
|
|
|
/* Nevertheless, pretend that the call came from the user. */
|
|
okendpt(proc, &exitee_p);
|
|
free_proc(&fproc[exitee_p], FP_EXITING);
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* pm_setgid *
|
|
*===========================================================================*/
|
|
PUBLIC void pm_setgid(proc_e, egid, rgid)
|
|
int proc_e;
|
|
int egid;
|
|
int rgid;
|
|
{
|
|
register struct fproc *tfp;
|
|
int slot;
|
|
|
|
okendpt(proc_e, &slot);
|
|
tfp = &fproc[slot];
|
|
|
|
tfp->fp_effgid = egid;
|
|
tfp->fp_realgid = rgid;
|
|
}
|
|
|
|
|
|
/*===========================================================================*
|
|
* pm_setgroups *
|
|
*===========================================================================*/
|
|
PUBLIC void pm_setgroups(proc_e, ngroups, groups)
|
|
int proc_e;
|
|
int ngroups;
|
|
gid_t *groups;
|
|
{
|
|
struct fproc *rfp;
|
|
int slot;
|
|
|
|
okendpt(proc_e, &slot);
|
|
rfp = &fproc[slot];
|
|
if (ngroups * sizeof(gid_t) > sizeof(rfp->fp_sgroups))
|
|
panic("VFS: pm_setgroups: too much data to copy");
|
|
if(sys_datacopy(who_e, (vir_bytes) groups, SELF, (vir_bytes) rfp->fp_sgroups,
|
|
ngroups * sizeof(gid_t)) == OK) {
|
|
rfp->fp_ngroups = ngroups;
|
|
} else
|
|
panic("VFS: pm_setgroups: datacopy failed");
|
|
}
|
|
|
|
|
|
/*===========================================================================*
|
|
* pm_setuid *
|
|
*===========================================================================*/
|
|
PUBLIC void pm_setuid(proc_e, euid, ruid)
|
|
int proc_e;
|
|
int euid;
|
|
int ruid;
|
|
{
|
|
register struct fproc *tfp;
|
|
int slot;
|
|
|
|
okendpt(proc_e, &slot);
|
|
tfp = &fproc[slot];
|
|
|
|
tfp->fp_effuid = euid;
|
|
tfp->fp_realuid = ruid;
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* do_svrctl *
|
|
*===========================================================================*/
|
|
PUBLIC int do_svrctl()
|
|
{
|
|
switch (m_in.svrctl_req) {
|
|
/* No control request implemented yet. */
|
|
default:
|
|
return(EINVAL);
|
|
}
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* pm_dumpcore *
|
|
*===========================================================================*/
|
|
PUBLIC int pm_dumpcore(proc_e, seg_ptr)
|
|
int proc_e;
|
|
struct mem_map *seg_ptr;
|
|
{
|
|
int proc_s;
|
|
|
|
/* Terminate the process */
|
|
okendpt(proc_e, &proc_s);
|
|
free_proc(&fproc[proc_s], FP_EXITING);
|
|
|
|
return OK;
|
|
}
|
|
|
|
/*===========================================================================*
|
|
* ds_event *
|
|
*===========================================================================*/
|
|
PUBLIC void ds_event()
|
|
{
|
|
char key[DS_MAX_KEYLEN];
|
|
char *driver_prefix = "drv.vfs.";
|
|
u32_t value;
|
|
int type;
|
|
endpoint_t owner_endpoint;
|
|
int r;
|
|
|
|
/* Get the event and the owner from DS. */
|
|
r = ds_check(key, &type, &owner_endpoint);
|
|
if(r != OK) {
|
|
if(r != ENOENT)
|
|
printf("vfs: ds_event: ds_check failed: %d\n", r);
|
|
return;
|
|
}
|
|
r = ds_retrieve_u32(key, &value);
|
|
if(r != OK) {
|
|
printf("vfs: ds_event: ds_retrieve_u32 failed\n");
|
|
return;
|
|
}
|
|
|
|
/* Only check for VFS driver up events. */
|
|
if(strncmp(key, driver_prefix, sizeof(driver_prefix))
|
|
|| value != DS_DRIVER_UP) {
|
|
return;
|
|
}
|
|
|
|
/* Perform up. */
|
|
dmap_endpt_up(owner_endpoint);
|
|
}
|
|
|