6e0f3b3bda
sys_umap now supports only: - looking up the physical address of a virtual address in the address space of the caller; - looking up the physical address of a grant for which the caller is the grantee. This is enough for nearly all umap users. The new sys_umap_remote supports lookups in arbitrary address spaces and grants for arbitrary grantees.
1558 lines
37 KiB
C
1558 lines
37 KiB
C
/* Utility to start or stop system services. Requests are sent to the
|
|
* reincarnation server that does the actual work.
|
|
*
|
|
* Changes:
|
|
* Nov 22, 2009: added basic live update support (Cristiano Giuffrida)
|
|
* Jul 22, 2005: Created (Jorrit N. Herder)
|
|
*/
|
|
|
|
#include <stdarg.h>
|
|
#include <assert.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <pwd.h>
|
|
#include <unistd.h>
|
|
#include <limits.h>
|
|
#include <lib.h>
|
|
#include <minix/config.h>
|
|
#include <minix/com.h>
|
|
#include <minix/const.h>
|
|
#include <minix/type.h>
|
|
#include <minix/ipc.h>
|
|
#include <minix/rs.h>
|
|
#include <minix/syslib.h>
|
|
#include <minix/bitmap.h>
|
|
#include <paths.h>
|
|
#include <minix/sef.h>
|
|
#include <minix/dmap.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <configfile.h>
|
|
|
|
#include <machine/archtypes.h>
|
|
#include <timers.h>
|
|
#include "kernel/proc.h"
|
|
|
|
|
|
/* This array defines all known requests. */
|
|
PRIVATE char *known_requests[] = {
|
|
"up",
|
|
"down",
|
|
"refresh",
|
|
"restart",
|
|
"shutdown",
|
|
"update",
|
|
"clone",
|
|
"edit",
|
|
"catch for illegal requests"
|
|
};
|
|
#define ILLEGAL_REQUEST sizeof(known_requests)/sizeof(char *)
|
|
|
|
/* Global error number set for failed system calls. */
|
|
#define OK 0
|
|
|
|
#define RUN_CMD "run"
|
|
#define RUN_SCRIPT "/etc/rs.single" /* Default script for 'run' */
|
|
#define SELF_BINARY "self"
|
|
#define SELF_REQ_PATH "/dev/null"
|
|
#define PATH_CONFIG _PATH_SYSTEM_CONF /* Default config file */
|
|
#define DEFAULT_LU_STATE SEF_LU_STATE_WORK_FREE /* Default lu state */
|
|
#define DEFAULT_LU_MAXTIME 0 /* Default lu max time */
|
|
|
|
/* Define names for options provided to this utility. */
|
|
#define OPT_COPY "-c" /* copy executable image */
|
|
#define OPT_REUSE "-r" /* reuse executable image */
|
|
#define OPT_NOBLOCK "-n" /* unblock caller immediately */
|
|
#define OPT_REPLICA "-p" /* create replica for the service */
|
|
|
|
/* Define names for arguments provided to this utility. The first few
|
|
* arguments are required and have a known index. Thereafter, some optional
|
|
* argument pairs like "-args arglist" follow.
|
|
*/
|
|
#define ARG_NAME 0 /* own application name */
|
|
|
|
/* The following are relative to optind */
|
|
#define ARG_REQUEST 0 /* request to perform */
|
|
#define ARG_PATH 1 /* system service */
|
|
#define ARG_LABEL 1 /* name of system service */
|
|
|
|
#define MIN_ARG_COUNT 1 /* require an action */
|
|
|
|
#define ARG_ARGS "-args" /* list of arguments to be passed */
|
|
#define ARG_DEV "-dev" /* major device number for drivers */
|
|
#define ARG_MAJOR "-major" /* major number */
|
|
#define ARG_DEVSTYLE "-devstyle" /* device style */
|
|
#define ARG_PERIOD "-period" /* heartbeat period in ticks */
|
|
#define ARG_SCRIPT "-script" /* name of the script to restart a
|
|
* system service
|
|
*/
|
|
#define ARG_LABELNAME "-label" /* custom label name */
|
|
#define ARG_CONFIG "-config" /* name of the file with the resource
|
|
* configuration
|
|
*/
|
|
|
|
#define ARG_LU_STATE "-state" /* the live update state required */
|
|
#define ARG_LU_MAXTIME "-maxtime" /* max time to prepare for the update */
|
|
#define ARG_DEVMANID "-devid" /* the id of the devman device this
|
|
driver should be able to access */
|
|
|
|
#define SERVICE_LOGIN "service" /* passwd file entry for services */
|
|
|
|
#define MAX_CLASS_RECURS 100 /* Max nesting level for classes */
|
|
|
|
/* The function parse_arguments() verifies and parses the command line
|
|
* parameters passed to this utility. Request parameters that are needed
|
|
* are stored globally in the following variables:
|
|
*/
|
|
PRIVATE int req_type;
|
|
PRIVATE int do_run= 0; /* 'run' command instead of 'up' */
|
|
PRIVATE char *req_label = NULL;
|
|
PRIVATE char *req_path = NULL;
|
|
PRIVATE char *req_path_self = SELF_REQ_PATH;
|
|
PRIVATE char *req_args = "";
|
|
PRIVATE int req_major = 0;
|
|
PRIVATE int devman_id = 0;
|
|
PRIVATE int req_dev_style = STYLE_NDEV;
|
|
PRIVATE long req_period = 0;
|
|
PRIVATE char *req_script = NULL;
|
|
PRIVATE char *req_ipc = NULL;
|
|
PRIVATE char *req_config = PATH_CONFIG;
|
|
PRIVATE int custom_config_file = 0;
|
|
PRIVATE int class_recurs; /* Nesting level of class statements */
|
|
PRIVATE int req_lu_state = DEFAULT_LU_STATE;
|
|
PRIVATE int req_lu_maxtime = DEFAULT_LU_MAXTIME;
|
|
|
|
/* Buffer to build "/command arg1 arg2 ..." string to pass to RS server. */
|
|
PRIVATE char command[4096];
|
|
|
|
/* Arguments for RS to start a new service */
|
|
PRIVATE struct rs_start rs_start;
|
|
|
|
/* An error occurred. Report the problem, print the usage, and exit.
|
|
*/
|
|
PRIVATE void print_usage(char *app_name, char *problem)
|
|
{
|
|
fprintf(stderr, "Warning, %s\n", problem);
|
|
fprintf(stderr, "Usage:\n");
|
|
fprintf(stderr,
|
|
" %s [%s %s %s %s] (up|run|edit|update) <binary|%s> [%s <args>] [%s <special>] [%s <style>] [%s <major_nr>] [%s <dev_id>] [%s <ticks>] [%s <path>] [%s <name>] [%s <path>] [%s <state>] [%s <time>]\n",
|
|
app_name, OPT_COPY, OPT_REUSE, OPT_NOBLOCK, OPT_REPLICA, SELF_BINARY,
|
|
ARG_ARGS, ARG_DEV, ARG_DEVSTYLE, ARG_MAJOR, ARG_DEVMANID, ARG_PERIOD, ARG_SCRIPT,
|
|
ARG_LABELNAME, ARG_CONFIG, ARG_LU_STATE, ARG_LU_MAXTIME);
|
|
fprintf(stderr, " %s down <label>\n", app_name);
|
|
fprintf(stderr, " %s refresh <label>\n", app_name);
|
|
fprintf(stderr, " %s restart <label>\n", app_name);
|
|
fprintf(stderr, " %s clone <label>\n", app_name);
|
|
fprintf(stderr, " %s shutdown\n", app_name);
|
|
fprintf(stderr, "\n");
|
|
}
|
|
|
|
/* A request to the RS server failed. Report and exit.
|
|
*/
|
|
PRIVATE void failure(int request)
|
|
{
|
|
fprintf(stderr, "Request 0x%x to RS failed: %s (error %d)\n", request, strerror(errno), errno);
|
|
exit(errno);
|
|
}
|
|
|
|
|
|
/* Parse and verify correctness of arguments. Report problem and exit if an
|
|
* error is found. Store needed parameters in global variables.
|
|
*/
|
|
PRIVATE int parse_arguments(int argc, char **argv)
|
|
{
|
|
struct stat stat_buf;
|
|
char *hz, *buff;
|
|
int req_nr;
|
|
int c, i, j;
|
|
int c_flag, r_flag, n_flag, p_flag;
|
|
int label_required;
|
|
|
|
c_flag = 0;
|
|
r_flag = 0;
|
|
n_flag = 0;
|
|
p_flag = 0;
|
|
while (c= getopt(argc, argv, "rcnp?"), c != -1)
|
|
{
|
|
switch(c)
|
|
{
|
|
case '?':
|
|
print_usage(argv[ARG_NAME], "wrong number of arguments");
|
|
exit(EINVAL);
|
|
case 'c':
|
|
c_flag = 1;
|
|
break;
|
|
case 'r':
|
|
c_flag = 1; /* -r implies -c */
|
|
r_flag = 1;
|
|
break;
|
|
case 'n':
|
|
n_flag = 1;
|
|
break;
|
|
case 'p':
|
|
p_flag = 1;
|
|
break;
|
|
default:
|
|
fprintf(stderr, "%s: getopt failed: %c\n",
|
|
argv[ARG_NAME], c);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
/* Verify argument count. */
|
|
if (argc < optind+MIN_ARG_COUNT) {
|
|
print_usage(argv[ARG_NAME], "wrong number of arguments");
|
|
exit(EINVAL);
|
|
}
|
|
|
|
if (strcmp(argv[optind+ARG_REQUEST], RUN_CMD) == 0)
|
|
{
|
|
req_nr= RS_UP;
|
|
do_run= TRUE;
|
|
}
|
|
else
|
|
{
|
|
/* Verify request type. */
|
|
for (req_type=0; req_type< ILLEGAL_REQUEST; req_type++) {
|
|
if (strcmp(known_requests[req_type],argv[optind+ARG_REQUEST])==0)
|
|
break;
|
|
}
|
|
if (req_type == ILLEGAL_REQUEST) {
|
|
print_usage(argv[ARG_NAME], "illegal request type");
|
|
exit(ENOSYS);
|
|
}
|
|
req_nr = RS_RQ_BASE + req_type;
|
|
}
|
|
|
|
rs_start.rss_flags = RSS_SYS_BASIC_CALLS | RSS_VM_BASIC_CALLS;
|
|
if (req_nr == RS_UP || req_nr == RS_UPDATE || req_nr == RS_EDIT) {
|
|
u32_t system_hz;
|
|
|
|
if (c_flag)
|
|
rs_start.rss_flags |= RSS_COPY;
|
|
|
|
if(r_flag)
|
|
rs_start.rss_flags |= RSS_REUSE;
|
|
|
|
if(n_flag)
|
|
rs_start.rss_flags |= RSS_NOBLOCK;
|
|
|
|
if(p_flag)
|
|
rs_start.rss_flags |= RSS_REPLICA;
|
|
|
|
req_path = argv[optind+ARG_PATH];
|
|
if(req_nr == RS_UPDATE && !strcmp(req_path, SELF_BINARY)) {
|
|
/* Self update needs no real path or configuration file. */
|
|
req_config = NULL;
|
|
req_path = req_path_self;
|
|
rs_start.rss_flags |= RSS_SELF_LU;
|
|
}
|
|
|
|
if (do_run)
|
|
{
|
|
/* Set default recovery script for RUN */
|
|
req_script = RUN_SCRIPT;
|
|
}
|
|
|
|
/* Verify argument count. */
|
|
if (argc - 1 < optind+ARG_PATH) {
|
|
print_usage(argv[ARG_NAME], "action requires a binary to start");
|
|
exit(EINVAL);
|
|
}
|
|
|
|
/* Verify the name of the binary of the system service. */
|
|
if(!(rs_start.rss_flags & RSS_SELF_LU)) {
|
|
if (req_path[0] != '/') {
|
|
print_usage(argv[ARG_NAME], "binary should be absolute path");
|
|
exit(EINVAL);
|
|
}
|
|
if (stat(req_path, &stat_buf) == -1) {
|
|
perror(req_path);
|
|
fprintf(stderr, "couldn't get stat binary\n");
|
|
exit(errno);
|
|
}
|
|
if (! (stat_buf.st_mode & S_IFREG)) {
|
|
print_usage(argv[ARG_NAME], "binary is not a regular file");
|
|
exit(EINVAL);
|
|
}
|
|
}
|
|
|
|
/* Get HZ. */
|
|
system_hz = (u32_t) sysconf(_SC_CLK_TCK);
|
|
|
|
/* Check optional arguments that come in pairs like "-args arglist". */
|
|
for (i=optind+MIN_ARG_COUNT+1; i<argc; i=i+2) {
|
|
if (! (i+1 < argc)) {
|
|
print_usage(argv[ARG_NAME], "optional argument not complete");
|
|
exit(EINVAL);
|
|
}
|
|
if (strcmp(argv[i], ARG_ARGS)==0) {
|
|
req_args = argv[i+1];
|
|
}
|
|
else if (strcmp(argv[i], ARG_PERIOD)==0) {
|
|
req_period = strtol(argv[i+1], &hz, 10);
|
|
if (strcmp(hz,"HZ")==0) req_period *= system_hz;
|
|
if (req_period < 0) {
|
|
print_usage(argv[ARG_NAME], "bad period argument");
|
|
exit(EINVAL);
|
|
}
|
|
}
|
|
else if (strcmp(argv[i], ARG_DEV)==0) {
|
|
if (stat(argv[i+1], &stat_buf) == -1) {
|
|
perror(argv[i+1]);
|
|
print_usage(argv[ARG_NAME], "couldn't get status of device");
|
|
exit(errno);
|
|
}
|
|
if ( ! (stat_buf.st_mode & (S_IFBLK | S_IFCHR))) {
|
|
print_usage(argv[ARG_NAME], "special file is not a device");
|
|
exit(EINVAL);
|
|
}
|
|
if (req_major != 0) {
|
|
print_usage(argv[ARG_NAME], "major already set");
|
|
exit(EINVAL);
|
|
}
|
|
req_major = (stat_buf.st_rdev >> MAJOR) & BYTE;
|
|
if(req_dev_style == STYLE_NDEV) {
|
|
req_dev_style = STYLE_DEV;
|
|
}
|
|
}
|
|
else if (strcmp(argv[i], ARG_MAJOR)==0) {
|
|
if (req_major != 0) {
|
|
print_usage(argv[ARG_NAME], "major already set");
|
|
exit(EINVAL);
|
|
}
|
|
if (i+1 < argc) {
|
|
req_major = atoi(argv[i+1]);
|
|
} else {
|
|
exit(EINVAL);
|
|
}
|
|
if(req_dev_style == STYLE_NDEV) {
|
|
req_dev_style = STYLE_DEV;
|
|
}
|
|
}
|
|
else if (strcmp(argv[i], ARG_DEVSTYLE)==0) {
|
|
char* dev_style_keys[] = { "STYLE_DEV", "STYLE_DEVA", "STYLE_TTY",
|
|
"STYLE_CTTY", "STYLE_CLONE", NULL };
|
|
int dev_style_values[] = { STYLE_DEV, STYLE_DEVA, STYLE_TTY,
|
|
STYLE_CTTY, STYLE_CLONE };
|
|
for(j=0;dev_style_keys[j]!=NULL;j++) {
|
|
if(!strcmp(dev_style_keys[j], argv[i+1])) {
|
|
break;
|
|
}
|
|
}
|
|
if(dev_style_keys[j] == NULL) {
|
|
print_usage(argv[ARG_NAME], "bad device style");
|
|
exit(EINVAL);
|
|
}
|
|
req_dev_style = dev_style_values[j];
|
|
}
|
|
else if (strcmp(argv[i], ARG_SCRIPT)==0) {
|
|
req_script = argv[i+1];
|
|
}
|
|
else if (strcmp(argv[i], ARG_LABELNAME)==0) {
|
|
req_label = argv[i+1];
|
|
}
|
|
else if (strcmp(argv[i], ARG_CONFIG)==0) {
|
|
req_config = argv[i+1];
|
|
custom_config_file = 1;
|
|
}
|
|
else if (strcmp(argv[i], ARG_LU_STATE)==0) {
|
|
errno=0;
|
|
req_lu_state = strtol(argv[i+1], &buff, 10);
|
|
if(errno || strcmp(buff, "")) {
|
|
print_usage(argv[ARG_NAME], "bad live update state");
|
|
exit(EINVAL);
|
|
}
|
|
if(req_lu_state == SEF_LU_STATE_NULL) {
|
|
print_usage(argv[ARG_NAME], "null live update state");
|
|
exit(EINVAL);
|
|
}
|
|
}
|
|
else if (strcmp(argv[i], ARG_LU_MAXTIME)==0) {
|
|
errno=0;
|
|
req_lu_maxtime = strtol(argv[i+1], &hz, 10);
|
|
if(errno || (strcmp(hz, "") && strcmp(hz, "HZ"))
|
|
|| req_lu_maxtime<0) {
|
|
print_usage(argv[ARG_NAME],
|
|
"bad live update max time");
|
|
exit(EINVAL);
|
|
}
|
|
if (strcmp(hz,"HZ")==0) req_lu_maxtime *= system_hz;
|
|
} else if (strcmp(argv[i], ARG_DEVMANID) == 0) {
|
|
if (i+1 < argc) {
|
|
devman_id = atoi(argv[i+1]);
|
|
} else {
|
|
exit(EINVAL);
|
|
}
|
|
} else {
|
|
print_usage(argv[ARG_NAME], "unknown optional argument given");
|
|
exit(EINVAL);
|
|
}
|
|
}
|
|
}
|
|
else if (req_nr == RS_DOWN || req_nr == RS_REFRESH || req_nr == RS_RESTART
|
|
|| req_nr == RS_CLONE) {
|
|
|
|
/* Verify argument count. */
|
|
if (argc - 1 < optind+ARG_LABEL) {
|
|
print_usage(argv[ARG_NAME], "action requires a target label");
|
|
exit(EINVAL);
|
|
}
|
|
req_label= argv[optind+ARG_LABEL];
|
|
}
|
|
else if (req_nr == RS_SHUTDOWN) {
|
|
/* no extra arguments required */
|
|
}
|
|
|
|
label_required = (rs_start.rss_flags & RSS_SELF_LU) || (req_nr == RS_EDIT);
|
|
if(label_required && !req_label) {
|
|
print_usage(argv[ARG_NAME], "label option mandatory for target action");
|
|
exit(EINVAL);
|
|
}
|
|
|
|
/* Return the request number if no error were found. */
|
|
return(req_nr);
|
|
}
|
|
|
|
PRIVATE void fatal(char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
fprintf(stderr, "fatal error: ");
|
|
va_start(ap, fmt);
|
|
vfprintf(stderr, fmt, ap);
|
|
va_end(ap);
|
|
fprintf(stderr, "\n");
|
|
|
|
exit(1);
|
|
}
|
|
|
|
#define KW_SERVICE "service"
|
|
#define KW_UID "uid"
|
|
#define KW_SIGMGR "sigmgr"
|
|
#define KW_SCHEDULER "scheduler"
|
|
#define KW_PRIORITY "priority"
|
|
#define KW_QUANTUM "quantum"
|
|
#define KW_CPU "cpu"
|
|
#define KW_IRQ "irq"
|
|
#define KW_IO "io"
|
|
#define KW_PCI "pci"
|
|
#define KW_DEVICE "device"
|
|
#define KW_CLASS "class"
|
|
#define KW_SYSTEM "system"
|
|
#define KW_IPC "ipc"
|
|
#define KW_VM "vm"
|
|
#define KW_CONTROL "control"
|
|
#define KW_ALL "ALL"
|
|
#define KW_ALL_SYS "ALL_SYS"
|
|
#define KW_NONE "NONE"
|
|
#define KW_BASIC "BASIC"
|
|
|
|
FORWARD void do_service(config_t *cpe, config_t *config);
|
|
|
|
PRIVATE void do_class(config_t *cpe, config_t *config)
|
|
{
|
|
config_t *cp, *cp1;
|
|
|
|
if (class_recurs > MAX_CLASS_RECURS)
|
|
{
|
|
fatal(
|
|
"do_class: nesting level too high for class '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
class_recurs++;
|
|
|
|
/* Process classes */
|
|
for (; cpe; cpe= cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_class: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_uid: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
/* Find entry for the class */
|
|
for (cp= config; cp; cp= cp->next)
|
|
{
|
|
if (!(cp->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_class: expected list at %s:%d",
|
|
cp->file, cp->line);
|
|
}
|
|
cp1= cp->list;
|
|
if ((cp1->flags & CFG_STRING) ||
|
|
(cp1->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_class: expected word at %s:%d",
|
|
cp1->file, cp1->line);
|
|
}
|
|
|
|
/* At this place we expect the word KW_SERVICE */
|
|
if (strcmp(cp1->word, KW_SERVICE) != 0)
|
|
fatal("do_class: exected word '%S' at %s:%d",
|
|
KW_SERVICE, cp1->file, cp1->line);
|
|
|
|
cp1= cp1->next;
|
|
if ((cp1->flags & CFG_STRING) ||
|
|
(cp1->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_class: expected word at %s:%d",
|
|
cp1->file, cp1->line);
|
|
}
|
|
|
|
/* At this place we expect the name of the service */
|
|
if (strcmp(cp1->word, cpe->word) == 0)
|
|
break;
|
|
}
|
|
if (cp == NULL)
|
|
{
|
|
fatal(
|
|
"do_class: no entry found for class '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
do_service(cp1->next, config);
|
|
}
|
|
|
|
class_recurs--;
|
|
}
|
|
|
|
PRIVATE void do_uid(config_t *cpe)
|
|
{
|
|
uid_t uid;
|
|
struct passwd *pw;
|
|
char *check;
|
|
|
|
/* Process a uid */
|
|
if (cpe->next != NULL)
|
|
{
|
|
fatal("do_uid: just one uid/login expected at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_uid: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_uid: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
pw= getpwnam(cpe->word);
|
|
if (pw != NULL)
|
|
uid= pw->pw_uid;
|
|
else
|
|
{
|
|
uid= strtol(cpe->word, &check, 0);
|
|
if (check[0] != '\0')
|
|
{
|
|
fatal("do_uid: bad uid/login '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
}
|
|
|
|
rs_start.rss_uid= uid;
|
|
}
|
|
|
|
PRIVATE void do_sigmgr(config_t *cpe)
|
|
{
|
|
endpoint_t sigmgr_ep;
|
|
int r;
|
|
|
|
/* Process a signal manager value */
|
|
if (cpe->next != NULL)
|
|
{
|
|
fatal("do_sigmgr: just one sigmgr value expected at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_sigmgr: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_sigmgr: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
if(!strcmp(cpe->word, "SELF")) {
|
|
sigmgr_ep = SELF;
|
|
}
|
|
else {
|
|
r = minix_rs_lookup(cpe->word, &sigmgr_ep);
|
|
if(r != OK) {
|
|
fatal("do_sigmgr: unknown sigmgr %s at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
}
|
|
|
|
rs_start.rss_sigmgr= sigmgr_ep;
|
|
}
|
|
|
|
PRIVATE void do_scheduler(config_t *cpe)
|
|
{
|
|
endpoint_t scheduler_ep;
|
|
int r;
|
|
|
|
/* Process a scheduler value */
|
|
if (cpe->next != NULL)
|
|
{
|
|
fatal("do_scheduler: just one scheduler value expected at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_scheduler: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_scheduler: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
if(!strcmp(cpe->word, "KERNEL")) {
|
|
scheduler_ep = KERNEL;
|
|
}
|
|
else {
|
|
r = minix_rs_lookup(cpe->word, &scheduler_ep);
|
|
if(r != OK) {
|
|
fatal("do_scheduler: unknown scheduler %s at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
}
|
|
|
|
rs_start.rss_scheduler= scheduler_ep;
|
|
}
|
|
|
|
PRIVATE void do_priority(config_t *cpe)
|
|
{
|
|
int priority_val;
|
|
char *check;
|
|
|
|
/* Process a priority value */
|
|
if (cpe->next != NULL)
|
|
{
|
|
fatal("do_priority: just one priority value expected at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_priority: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_priority: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
priority_val= strtol(cpe->word, &check, 0);
|
|
if (check[0] != '\0')
|
|
{
|
|
fatal("do_priority: bad priority value '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
|
|
if (priority_val < 0 || priority_val >= NR_SCHED_QUEUES)
|
|
{
|
|
fatal("do_priority: priority %d out of range at %s:%d",
|
|
priority_val, cpe->file, cpe->line);
|
|
}
|
|
rs_start.rss_priority= priority_val;
|
|
}
|
|
|
|
PRIVATE void do_quantum(config_t *cpe)
|
|
{
|
|
int quantum_val;
|
|
char *check;
|
|
|
|
/* Process a quantum value */
|
|
if (cpe->next != NULL)
|
|
{
|
|
fatal("do_quantum: just one quantum value expected at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_quantum: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_quantum: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
quantum_val= strtol(cpe->word, &check, 0);
|
|
if (check[0] != '\0')
|
|
{
|
|
fatal("do_quantum: bad quantum value '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
|
|
if (quantum_val <= 0)
|
|
{
|
|
fatal("do_quantum: quantum %d out of range at %s:%d",
|
|
quantum_val, cpe->file, cpe->line);
|
|
}
|
|
rs_start.rss_quantum= quantum_val;
|
|
}
|
|
|
|
PRIVATE void do_cpu(config_t *cpe)
|
|
{
|
|
int cpu;
|
|
char *check;
|
|
|
|
/* Process a quantum value */
|
|
if (cpe->next != NULL)
|
|
{
|
|
fatal("do_cpu: just one value expected at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_cpu: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_cpu: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
cpu= strtol(cpe->word, &check, 0);
|
|
if (check[0] != '\0')
|
|
{
|
|
fatal("do_cpu: bad value '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
|
|
if (cpu < 0)
|
|
{
|
|
fatal("do_cpu: %d out of range at %s:%d",
|
|
cpu, cpe->file, cpe->line);
|
|
}
|
|
rs_start.rss_cpu= cpu;
|
|
}
|
|
|
|
PRIVATE void do_irq(config_t *cpe)
|
|
{
|
|
int irq;
|
|
int first;
|
|
char *check;
|
|
|
|
/* Process a list of IRQs */
|
|
first = TRUE;
|
|
for (; cpe; cpe= cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_irq: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_irq: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
/* No IRQ allowed? (default) */
|
|
if(!strcmp(cpe->word, KW_NONE)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_irq: %s keyword not allowed in list",
|
|
KW_NONE);
|
|
}
|
|
break;
|
|
}
|
|
|
|
/* All IRQs are allowed? */
|
|
if(!strcmp(cpe->word, KW_ALL)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_irq: %s keyword not allowed in list",
|
|
KW_ALL);
|
|
}
|
|
rs_start.rss_nr_irq = RSS_IO_ALL;
|
|
break;
|
|
}
|
|
|
|
/* Set single IRQs as specified in the configuration. */
|
|
irq= strtoul(cpe->word, &check, 0);
|
|
if (check[0] != '\0')
|
|
{
|
|
fatal("do_irq: bad irq '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
if (rs_start.rss_nr_irq >= RSS_NR_IRQ)
|
|
fatal("do_irq: too many IRQs (max %d)", RSS_NR_IRQ);
|
|
rs_start.rss_irq[rs_start.rss_nr_irq]= irq;
|
|
rs_start.rss_nr_irq++;
|
|
first = FALSE;
|
|
}
|
|
}
|
|
|
|
PRIVATE void do_io(config_t *cpe)
|
|
{
|
|
unsigned base, len;
|
|
int first;
|
|
char *check;
|
|
|
|
/* Process a list of I/O ranges */
|
|
first = TRUE;
|
|
for (; cpe; cpe= cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_io: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_io: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
/* No range allowed? (default) */
|
|
if(!strcmp(cpe->word, KW_NONE)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_io: %s keyword not allowed in list",
|
|
KW_NONE);
|
|
}
|
|
break;
|
|
}
|
|
|
|
/* All ranges are allowed? */
|
|
if(!strcmp(cpe->word, KW_ALL)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_io: %s keyword not allowed in list",
|
|
KW_ALL);
|
|
}
|
|
rs_start.rss_nr_io = RSS_IO_ALL;
|
|
break;
|
|
}
|
|
|
|
/* Set single ranges as specified in the configuration. */
|
|
base= strtoul(cpe->word, &check, 0x10);
|
|
len= 1;
|
|
if (check[0] == ':')
|
|
{
|
|
len= strtoul(check+1, &check, 0x10);
|
|
}
|
|
if (check[0] != '\0')
|
|
{
|
|
fatal("do_io: bad I/O range '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
|
|
if (rs_start.rss_nr_io >= RSS_NR_IO)
|
|
fatal("do_io: too many I/O ranges (max %d)", RSS_NR_IO);
|
|
rs_start.rss_io[rs_start.rss_nr_io].base= base;
|
|
rs_start.rss_io[rs_start.rss_nr_io].len= len;
|
|
rs_start.rss_nr_io++;
|
|
first = FALSE;
|
|
}
|
|
}
|
|
|
|
PRIVATE void do_pci_device(config_t *cpe)
|
|
{
|
|
u16_t vid, did;
|
|
char *check, *check2;
|
|
|
|
/* Process a list of PCI device IDs */
|
|
for (; cpe; cpe= cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_pci_device: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_pci_device: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
vid= strtoul(cpe->word, &check, 0x10);
|
|
if (check[0] == '/')
|
|
did= strtoul(check+1, &check2, 0x10);
|
|
if (check[0] != '/' || check2[0] != '\0')
|
|
{
|
|
fatal("do_pci_device: bad ID '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
if (rs_start.rss_nr_pci_id >= RS_NR_PCI_DEVICE)
|
|
{
|
|
fatal("do_pci_device: too many device IDs (max %d)",
|
|
RS_NR_PCI_DEVICE);
|
|
}
|
|
rs_start.rss_pci_id[rs_start.rss_nr_pci_id].vid= vid;
|
|
rs_start.rss_pci_id[rs_start.rss_nr_pci_id].did= did;
|
|
rs_start.rss_nr_pci_id++;
|
|
}
|
|
}
|
|
|
|
PRIVATE void do_pci_class(config_t *cpe)
|
|
{
|
|
u8_t baseclass, subclass, interface;
|
|
u32_t class_id, mask;
|
|
char *check;
|
|
|
|
/* Process a list of PCI device class IDs */
|
|
for (; cpe; cpe= cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_pci_device: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_pci_device: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
baseclass= strtoul(cpe->word, &check, 0x10);
|
|
subclass= 0;
|
|
interface= 0;
|
|
mask= 0xff0000;
|
|
if (check[0] == '/')
|
|
{
|
|
subclass= strtoul(check+1, &check, 0x10);
|
|
mask= 0xffff00;
|
|
if (check[0] == '/')
|
|
{
|
|
interface= strtoul(check+1, &check, 0x10);
|
|
mask= 0xffffff;
|
|
}
|
|
}
|
|
|
|
if (check[0] != '\0')
|
|
{
|
|
fatal("do_pci_class: bad class ID '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
class_id= (baseclass << 16) | (subclass << 8) | interface;
|
|
if (rs_start.rss_nr_pci_class >= RS_NR_PCI_CLASS)
|
|
{
|
|
fatal("do_pci_class: too many class IDs (max %d)",
|
|
RS_NR_PCI_CLASS);
|
|
}
|
|
rs_start.rss_pci_class[rs_start.rss_nr_pci_class].pciclass=
|
|
class_id;
|
|
rs_start.rss_pci_class[rs_start.rss_nr_pci_class].mask= mask;
|
|
rs_start.rss_nr_pci_class++;
|
|
}
|
|
}
|
|
|
|
PRIVATE void do_pci(config_t *cpe)
|
|
{
|
|
if (cpe == NULL)
|
|
return; /* Empty PCI statement */
|
|
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_pci: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_pci: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
if (strcmp(cpe->word, KW_DEVICE) == 0)
|
|
{
|
|
do_pci_device(cpe->next);
|
|
return;
|
|
}
|
|
if (strcmp(cpe->word, KW_CLASS) == 0)
|
|
{
|
|
do_pci_class(cpe->next);
|
|
return;
|
|
}
|
|
fatal("do_pci: unexpected word '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
}
|
|
|
|
PRIVATE void do_ipc(config_t *cpe)
|
|
{
|
|
char *list, *word;
|
|
char *word_all = RSS_IPC_ALL;
|
|
char *word_all_sys = RSS_IPC_ALL_SYS;
|
|
size_t listsize, wordlen;
|
|
int first;
|
|
|
|
list= NULL;
|
|
listsize= 1;
|
|
list= malloc(listsize);
|
|
if (list == NULL)
|
|
fatal("do_ipc: unable to malloc %d bytes", listsize);
|
|
list[0]= '\0';
|
|
|
|
/* Process a list of process names that are allowed to be
|
|
* contacted
|
|
*/
|
|
first = TRUE;
|
|
for (; cpe; cpe= cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_ipc: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_ipc: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
word = cpe->word;
|
|
|
|
/* All (system) ipc targets are allowed? */
|
|
if(!strcmp(word, KW_ALL) || !strcmp(word, KW_ALL_SYS)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_ipc: %s keyword not allowed in list",
|
|
word);
|
|
}
|
|
word = !strcmp(word, KW_ALL) ? word_all : word_all_sys;
|
|
}
|
|
|
|
wordlen= strlen(word);
|
|
|
|
listsize += 1 + wordlen;
|
|
list= realloc(list, listsize);
|
|
if (list == NULL)
|
|
{
|
|
fatal("do_ipc: unable to realloc %d bytes",
|
|
listsize);
|
|
}
|
|
strcat(list, " ");
|
|
strcat(list, word);
|
|
first = FALSE;
|
|
}
|
|
#if 0
|
|
printf("do_ipc: got list '%s'\n", list);
|
|
#endif
|
|
|
|
if (req_ipc)
|
|
fatal("do_ipc: req_ipc is set");
|
|
req_ipc= list;
|
|
}
|
|
|
|
struct
|
|
{
|
|
char *label;
|
|
int call_nr;
|
|
} vm_table[] =
|
|
{
|
|
{ "EXIT", VM_EXIT },
|
|
{ "FORK", VM_FORK },
|
|
{ "BRK", VM_BRK },
|
|
{ "EXEC_NEWMEM", VM_EXEC_NEWMEM },
|
|
{ "PUSH_SIG", VM_PUSH_SIG },
|
|
{ "WILLEXIT", VM_WILLEXIT },
|
|
{ "ADDDMA", VM_ADDDMA },
|
|
{ "DELDMA", VM_DELDMA },
|
|
{ "GETDMA", VM_GETDMA },
|
|
{ "REMAP", VM_REMAP },
|
|
{ "SHM_UNMAP", VM_SHM_UNMAP },
|
|
{ "GETPHYS", VM_GETPHYS },
|
|
{ "GETREF", VM_GETREF },
|
|
{ "RS_SET_PRIV", VM_RS_SET_PRIV },
|
|
{ "QUERY_EXIT", VM_QUERY_EXIT },
|
|
{ "NOTIFY_SIG", VM_NOTIFY_SIG },
|
|
{ "INFO", VM_INFO },
|
|
{ "RS_UPDATE", VM_RS_UPDATE },
|
|
{ "RS_MEMCTL", VM_RS_MEMCTL },
|
|
{ NULL, 0 },
|
|
};
|
|
|
|
PRIVATE void do_vm(config_t *cpe)
|
|
{
|
|
int i, first;
|
|
|
|
first = TRUE;
|
|
for (; cpe; cpe = cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_vm: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_vm: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
/* Only basic calls allowed? (default). */
|
|
if(!strcmp(cpe->word, KW_BASIC)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_vm: %s keyword not allowed in list",
|
|
KW_NONE);
|
|
}
|
|
break;
|
|
}
|
|
|
|
/* No calls allowed? */
|
|
if(!strcmp(cpe->word, KW_NONE)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_vm: %s keyword not allowed in list",
|
|
KW_NONE);
|
|
}
|
|
rs_start.rss_flags &= ~RSS_VM_BASIC_CALLS;
|
|
break;
|
|
}
|
|
|
|
/* All calls are allowed? */
|
|
if(!strcmp(cpe->word, KW_ALL)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_vm: %s keyword not allowed in list",
|
|
KW_ALL);
|
|
}
|
|
for (i = 0; i < NR_VM_CALLS; i++)
|
|
SET_BIT(rs_start.rss_vm, i);
|
|
break;
|
|
}
|
|
|
|
/* Set single calls as specified in the configuration. */
|
|
for (i = 0; vm_table[i].label != NULL; i++)
|
|
if (!strcmp(cpe->word, vm_table[i].label))
|
|
break;
|
|
if (vm_table[i].label == NULL)
|
|
fatal("do_vm: unknown call '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
SET_BIT(rs_start.rss_vm, vm_table[i].call_nr - VM_RQ_BASE);
|
|
first = FALSE;
|
|
}
|
|
}
|
|
|
|
struct
|
|
{
|
|
char *label;
|
|
int call_nr;
|
|
} system_tab[]=
|
|
{
|
|
{ "PRIVCTL", SYS_PRIVCTL },
|
|
{ "TRACE", SYS_TRACE },
|
|
{ "KILL", SYS_KILL },
|
|
{ "UMAP", SYS_UMAP },
|
|
{ "VIRCOPY", SYS_VIRCOPY },
|
|
{ "PHYSCOPY", SYS_PHYSCOPY },
|
|
{ "UMAP_REMOTE", SYS_UMAP_REMOTE },
|
|
{ "IRQCTL", SYS_IRQCTL },
|
|
{ "INT86", SYS_INT86 },
|
|
{ "DEVIO", SYS_DEVIO },
|
|
{ "SDEVIO", SYS_SDEVIO },
|
|
{ "VDEVIO", SYS_VDEVIO },
|
|
{ "ABORT", SYS_ABORT },
|
|
{ "IOPENABLE", SYS_IOPENABLE },
|
|
{ "READBIOS", SYS_READBIOS },
|
|
{ "STIME", SYS_STIME },
|
|
{ "VMCTL", SYS_VMCTL },
|
|
{ NULL, 0 }
|
|
};
|
|
|
|
PRIVATE void do_system(config_t *cpe)
|
|
{
|
|
int i, first;
|
|
|
|
/* Process a list of 'system' calls that are allowed */
|
|
first = TRUE;
|
|
for (; cpe; cpe= cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_system: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_system: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
/* Only basic calls allowed? (default). */
|
|
if(!strcmp(cpe->word, KW_BASIC)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_system: %s keyword not allowed in list",
|
|
KW_NONE);
|
|
}
|
|
break;
|
|
}
|
|
|
|
/* No calls allowed? */
|
|
if(!strcmp(cpe->word, KW_NONE)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_system: %s keyword not allowed in list",
|
|
KW_NONE);
|
|
}
|
|
rs_start.rss_flags &= ~RSS_SYS_BASIC_CALLS;
|
|
break;
|
|
}
|
|
|
|
/* All calls are allowed? */
|
|
if(!strcmp(cpe->word, KW_ALL)) {
|
|
if(!first || cpe->next) {
|
|
fatal("do_system: %s keyword not allowed in list",
|
|
KW_ALL);
|
|
}
|
|
for (i = 0; i < NR_SYS_CALLS; i++)
|
|
SET_BIT(rs_start.rss_system, i);
|
|
break;
|
|
}
|
|
|
|
/* Set single calls as specified in the configuration. */
|
|
for (i = 0; system_tab[i].label != NULL; i++)
|
|
if (!strcmp(cpe->word, system_tab[i].label))
|
|
break;
|
|
if (system_tab[i].label == NULL)
|
|
fatal("do_system: unknown call '%s' at %s:%d",
|
|
cpe->word, cpe->file, cpe->line);
|
|
SET_BIT(rs_start.rss_system, system_tab[i].call_nr - KERNEL_CALL);
|
|
first = FALSE;
|
|
}
|
|
}
|
|
|
|
PRIVATE void do_control(config_t *cpe)
|
|
{
|
|
int nr_control = 0;
|
|
|
|
/* Process a list of 'control' labels. */
|
|
for (; cpe; cpe= cpe->next)
|
|
{
|
|
if (cpe->flags & CFG_SUBLIST)
|
|
{
|
|
fatal("do_control: unexpected sublist at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->flags & CFG_STRING)
|
|
{
|
|
fatal("do_control: unexpected string at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (nr_control >= RS_NR_CONTROL)
|
|
{
|
|
fatal(
|
|
"do_control: RS_NR_CONTROL is too small (%d needed)",
|
|
nr_control+1);
|
|
}
|
|
|
|
rs_start.rss_control[nr_control].l_addr = (char*) cpe->word;
|
|
rs_start.rss_control[nr_control].l_len = strlen(cpe->word);
|
|
rs_start.rss_nr_control = ++nr_control;
|
|
}
|
|
}
|
|
|
|
PRIVATE void do_service(config_t *cpe, config_t *config)
|
|
{
|
|
config_t *cp;
|
|
|
|
/* At this point we expect one sublist that contains the varios
|
|
* resource allocations
|
|
*/
|
|
if (!(cpe->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_service: expected list at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
if (cpe->next != NULL)
|
|
{
|
|
cpe= cpe->next;
|
|
fatal("do_service: expected end of list at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
cpe= cpe->list;
|
|
|
|
/* Process the list */
|
|
for (cp= cpe; cp; cp= cp->next)
|
|
{
|
|
if (!(cp->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_service: expected list at %s:%d",
|
|
cp->file, cp->line);
|
|
}
|
|
cpe= cp->list;
|
|
if ((cpe->flags & CFG_STRING) || (cpe->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_service: expected word at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
if (strcmp(cpe->word, KW_CLASS) == 0)
|
|
{
|
|
do_class(cpe->next, config);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_UID) == 0)
|
|
{
|
|
do_uid(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_SIGMGR) == 0)
|
|
{
|
|
do_sigmgr(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_SCHEDULER) == 0)
|
|
{
|
|
do_scheduler(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_PRIORITY) == 0)
|
|
{
|
|
do_priority(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_QUANTUM) == 0)
|
|
{
|
|
do_quantum(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_CPU) == 0)
|
|
{
|
|
do_cpu(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_IRQ) == 0)
|
|
{
|
|
do_irq(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_IO) == 0)
|
|
{
|
|
do_io(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_PCI) == 0)
|
|
{
|
|
do_pci(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_SYSTEM) == 0)
|
|
{
|
|
do_system(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_IPC) == 0)
|
|
{
|
|
do_ipc(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_VM) == 0)
|
|
{
|
|
do_vm(cpe->next);
|
|
continue;
|
|
}
|
|
if (strcmp(cpe->word, KW_CONTROL) == 0)
|
|
{
|
|
do_control(cpe->next);
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
PRIVATE int do_config(char *label, char *filename)
|
|
{
|
|
config_t *config, *cp, *cpe;
|
|
|
|
config= config_read(filename, 0, NULL);
|
|
if (config == NULL)
|
|
{
|
|
/* config file read failed. */
|
|
return 1;
|
|
}
|
|
|
|
/* Find an entry for our service */
|
|
for (cp= config; cp; cp= cp->next)
|
|
{
|
|
if (!(cp->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_config: expected list at %s:%d",
|
|
cp->file, cp->line);
|
|
}
|
|
cpe= cp->list;
|
|
if ((cpe->flags & CFG_STRING) || (cpe->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_config: expected word at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
/* At this place we expect the word KW_SERVICE */
|
|
if (strcmp(cpe->word, KW_SERVICE) != 0)
|
|
fatal("do_config: exected word '%S' at %s:%d",
|
|
KW_SERVICE, cpe->file, cpe->line);
|
|
|
|
cpe= cpe->next;
|
|
if ((cpe->flags & CFG_STRING) || (cpe->flags & CFG_SUBLIST))
|
|
{
|
|
fatal("do_config: expected word at %s:%d",
|
|
cpe->file, cpe->line);
|
|
}
|
|
|
|
/* At this place we expect the name of the service. */
|
|
if (strcmp(cpe->word, label) == 0)
|
|
break;
|
|
}
|
|
if (cp == NULL)
|
|
{
|
|
fprintf(stderr, "service: service '%s' not found in '%s'\n",
|
|
label, filename);
|
|
exit(1);
|
|
}
|
|
|
|
cpe= cpe->next;
|
|
|
|
do_service(cpe, config);
|
|
|
|
/* config file read ok. */
|
|
return 0;
|
|
}
|
|
|
|
/* Main program.
|
|
*/
|
|
PUBLIC int main(int argc, char **argv)
|
|
{
|
|
message m;
|
|
int result = EXIT_SUCCESS;
|
|
int request;
|
|
char *progname = NULL;
|
|
struct passwd *pw;
|
|
|
|
/* Verify and parse the command line arguments. All arguments are checked
|
|
* here. If an error occurs, the problem is reported and exit(2) is called.
|
|
* all needed parameters to perform the request are extracted and stored
|
|
* global variables.
|
|
*/
|
|
request = parse_arguments(argc, argv);
|
|
|
|
/* Arguments seem fine. Try to perform the request. Only valid requests
|
|
* should end up here. The default is used for not yet supported requests.
|
|
*/
|
|
result = OK;
|
|
switch(request) {
|
|
case RS_UPDATE:
|
|
m.RS_LU_STATE = req_lu_state;
|
|
m.RS_LU_PREPARE_MAXTIME = req_lu_maxtime;
|
|
/* fall through */
|
|
case RS_UP:
|
|
case RS_EDIT:
|
|
/* Build space-separated command string to be passed to RS server. */
|
|
progname = strrchr(req_path, '/');
|
|
assert(progname); /* an absolute path was required */
|
|
progname++; /* skip last slash */
|
|
strcpy(command, req_path);
|
|
command[strlen(req_path)] = ' ';
|
|
strcpy(command+strlen(req_path)+1, req_args);
|
|
|
|
rs_start.rss_cmd= command;
|
|
rs_start.rss_cmdlen= strlen(command);
|
|
rs_start.rss_major= req_major;
|
|
rs_start.rss_dev_style= req_dev_style;
|
|
rs_start.rss_period= req_period;
|
|
rs_start.rss_script= req_script;
|
|
rs_start.devman_id= devman_id;
|
|
if(req_label) {
|
|
rs_start.rss_label.l_addr = req_label;
|
|
rs_start.rss_label.l_len = strlen(req_label);
|
|
} else {
|
|
rs_start.rss_label.l_addr = progname;
|
|
rs_start.rss_label.l_len = strlen(progname);
|
|
}
|
|
if (req_script)
|
|
rs_start.rss_scriptlen= strlen(req_script);
|
|
else
|
|
rs_start.rss_scriptlen= 0;
|
|
|
|
pw= getpwnam(SERVICE_LOGIN);
|
|
if (pw == NULL)
|
|
fatal("no passwd file entry for '%s'", SERVICE_LOGIN);
|
|
rs_start.rss_uid= pw->pw_uid;
|
|
|
|
rs_start.rss_sigmgr= DSRV_SM;
|
|
rs_start.rss_scheduler= DSRV_SCH;
|
|
rs_start.rss_priority= DSRV_Q;
|
|
rs_start.rss_quantum= DSRV_QT;
|
|
rs_start.rss_cpu = DSRV_CPU;
|
|
|
|
if (req_config) {
|
|
int config_fail = 0;
|
|
assert(progname);
|
|
if(custom_config_file) {
|
|
config_fail = do_config(progname, req_config);
|
|
} else {
|
|
char *specificconfig;
|
|
if(asprintf(&specificconfig, "%s/%s", _PATH_SYSTEM_CONF_DIR,
|
|
progname) < 0) {
|
|
errx(1, "no memory");
|
|
}
|
|
|
|
/* Try specific config filename first,
|
|
* and only if it fails, the global system one.
|
|
*/
|
|
config_fail =
|
|
do_config(progname, specificconfig) &&
|
|
do_config(progname, req_config);
|
|
}
|
|
|
|
if(config_fail) {
|
|
fprintf(stderr, "config_read failed for %s\n", progname);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
assert(rs_start.rss_priority < NR_SCHED_QUEUES);
|
|
assert(rs_start.rss_quantum > 0);
|
|
|
|
if (req_ipc)
|
|
{
|
|
rs_start.rss_ipc= req_ipc+1; /* Skip initial space */
|
|
rs_start.rss_ipclen= strlen(rs_start.rss_ipc);
|
|
}
|
|
else
|
|
{
|
|
char *default_ipc = RSS_IPC_ALL_SYS;
|
|
rs_start.rss_ipc= default_ipc;
|
|
rs_start.rss_ipclen= strlen(default_ipc);
|
|
}
|
|
|
|
m.RS_CMD_ADDR = (char *) &rs_start;
|
|
break;
|
|
case RS_DOWN:
|
|
case RS_REFRESH:
|
|
case RS_RESTART:
|
|
case RS_CLONE:
|
|
m.RS_CMD_ADDR = req_label;
|
|
m.RS_CMD_LEN = strlen(req_label);
|
|
break;
|
|
case RS_SHUTDOWN:
|
|
break;
|
|
default:
|
|
print_usage(argv[ARG_NAME], "request is not yet supported");
|
|
result = EGENERIC;
|
|
}
|
|
|
|
/* Build request message and send the request. */
|
|
if(result == OK) {
|
|
if (_syscall(RS_PROC_NR, request, &m) == -1)
|
|
failure(request);
|
|
result = m.m_type;
|
|
}
|
|
|
|
return(result);
|
|
}
|
|
|