7e73260cf5
told to kernel - makes VM ask the kernel if a certain process is allowed to map in a range of physical memory (VM rounds it to page boundaries afterwards - but it's impossible to map anything smaller otherwise so I assume this is safe, i.e. there won't be anything else in that page; certainly no regular memory) - VM permission check cleanup (no more hardcoded calls, less hardcoded logic, more readable main loop), a loose end left by GQ - remove do_copy warning, as the ipc server triggers this but it's no more harmful than the special cases already excluded explicitly (VFS, PM, etc).
57 lines
1.1 KiB
C
57 lines
1.1 KiB
C
|
|
#define _SYSTEM 1
|
|
|
|
#define VERBOSE 0
|
|
|
|
#include <minix/callnr.h>
|
|
#include <minix/com.h>
|
|
#include <minix/config.h>
|
|
#include <minix/const.h>
|
|
#include <minix/ds.h>
|
|
#include <minix/endpoint.h>
|
|
#include <minix/keymap.h>
|
|
#include <minix/minlib.h>
|
|
#include <minix/type.h>
|
|
#include <minix/ipc.h>
|
|
#include <minix/sysutil.h>
|
|
#include <minix/syslib.h>
|
|
#include <minix/safecopies.h>
|
|
#include <minix/bitmap.h>
|
|
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <env.h>
|
|
#include <stdio.h>
|
|
|
|
#include "glo.h"
|
|
#include "proto.h"
|
|
#include "util.h"
|
|
|
|
/*===========================================================================*
|
|
* do_rs_set_priv *
|
|
*===========================================================================*/
|
|
PUBLIC int do_rs_set_priv(message *m)
|
|
{
|
|
int r, n, nr;
|
|
struct vmproc *vmp;
|
|
|
|
nr = m->VM_RS_NR;
|
|
|
|
if ((r = vm_isokendpt(nr, &n)) != OK) {
|
|
printf("do_rs_set_priv: message from strange source %d\n", nr);
|
|
return EINVAL;
|
|
}
|
|
|
|
vmp = &vmproc[n];
|
|
|
|
if (m->VM_RS_BUF) {
|
|
r = sys_datacopy(m->m_source, (vir_bytes) m->VM_RS_BUF,
|
|
SELF, (vir_bytes) vmp->vm_call_priv_mask,
|
|
sizeof(vmp->vm_call_priv_mask));
|
|
if (r != OK)
|
|
return r;
|
|
}
|
|
|
|
return OK;
|
|
}
|
|
|