* m_type: SYS_PRIVCTL
*
* The parameters for this system call are:
- * m2_i1: CTL_PROC_NR (process number of caller)
+ * m1_i1: PR_PROC_NR (process number of caller)
*/
#include "../system.h"
#include "../ipc.h"
+#include <signal.h>
#if USE_PRIVCTL
+#define FILLED_MASK (~0)
+
/*===========================================================================*
* do_privctl *
*===========================================================================*/
/* Handle sys_privctl(). Update a process' privileges. If the process is not
* yet a system process, make sure it gets its own privilege structure.
*/
+ register struct proc *caller_ptr;
register struct proc *rp;
register struct priv *sp;
int proc_nr;
+ int priv_id;
+ int old_flags;
int i;
- /* Extract message parameters. */
- proc_nr = m_ptr->CTL_PROC_NR;
- if (proc_nr == SELF) proc_nr = m_ptr->m_source;
+ /* Check whether caller is allowed to make this call. Privileged proceses
+ * can only update the privileges of processes that are inhibited from
+ * running by the NO_PRIV flag. This flag is set when a privileged process
+ * forks.
+ */
+ caller_ptr = proc_addr(m_ptr->m_source);
+ if (! (priv(caller_ptr)->s_flags & SYS_PROC)) return(EPERM);
+ proc_nr = m_ptr->PR_PROC_NR;
if (! isokprocn(proc_nr)) return(EINVAL);
-
rp = proc_addr(proc_nr);
+ if (! (rp->p_rts_flags & NO_PRIV)) return(EPERM);
- /* Make sure this process has its own privileges structure. */
- if (! (priv(rp)->s_flags & SYS_PROC))
- if ((i=get_priv(rp, SYS_PROC)) != OK) return(i);
+ /* Make sure this process has its own privileges structure. This may fail,
+ * since there are only a limited number of system processes. Then copy the
+ * privileges from the caller and restore some defaults.
+ */
+ if ((i=get_priv(rp, SYS_PROC)) != OK) return(i);
+ priv_id = priv(rp)->s_id; /* backup privilege id */
+ *priv(rp) = *priv(caller_ptr); /* copy privileges */
+ priv(rp)->s_id = priv_id; /* restore privilege id */
+ priv(rp)->s_proc_nr = proc_nr; /* reassociate process nr */
+
+ for (i=0; i< BITMAP_CHUNKS(NR_SYS_PROCS); i++) /* remove pending: */
+ priv(rp)->s_notify_pending.chunk[i] = 0; /* - notifications */
+ priv(rp)->s_int_pending = 0; /* - interrupts */
+ sigemptyset(&priv(rp)->s_sig_pending); /* - signals */
/* Now update the process' privileges as requested. */
rp->p_priv->s_call_mask = FILLED_MASK;
set_sys_bit(priv_addr(i)->s_send_mask, priv_id(rp));
}
}
+
+ /* Done. Privileges have been set. Allow process to run again. */
+ old_flags = rp->p_rts_flags; /* save value of the flags */
+ rp->p_rts_flags &= ~NO_PRIV;
+ if (old_flags != 0 && rp->p_rts_flags == 0) lock_ready(rp);
return(OK);
}
* Oct 17, 2004 updated above and tasktab comments (Jorrit N. Herder)
* May 01, 2004 changed struct for system image (Jorrit N. Herder)
*/
-
#define _TABLE
#include "kernel.h"
#include <minix/com.h>
#include <ibm/int86.h>
-/* Define stack sizes for all tasks included in the system image. */
+/* Define stack sizes for the kernel tasks included in the system image. */
#define NO_STACK 0
#define SMALL_STACK (128 * sizeof(char *))
-#if (CHIP == INTEL) /* 3 intr, 3 temps, 4 db */
-#define IDLE_S ((3+3+4) * sizeof(char *))
-#else
-#define IDLE_S SMALL_STACK
-#endif
-#define HARDWARE_S NO_STACK /* dummy task, uses kernel stack */
-#define SYSTEM_S SMALL_STACK
-#define CLOCK_S SMALL_STACK
+#define IDLE_S SMALL_STACK /* 3 intr, 3 temps, 4 db for Intel */
+#define HRDW_S NO_STACK /* dummy task, uses kernel stack */
+#define TASK_S SMALL_STACK /* system and clock task */
/* Stack space for all the task stacks. Declared as (char *) to align it. */
-#define TOT_STACK_SPACE (IDLE_S + HARDWARE_S + CLOCK_S + SYSTEM_S)
+#define TOT_STACK_SPACE (IDLE_S + HRDW_S + (2 * TASK_S))
PUBLIC char *t_stack[TOT_STACK_SPACE / sizeof(char *)];
+/* Define flags for the various process types. */
+#define IDLE_F (BILLABLE | SYS_PROC) /* idle task */
+#define TASK_F (SYS_PROC) /* kernel tasks */
+#define SERV_F (PREEMPTIBLE | SYS_PROC) /* system services */
+#define USER_F (PREEMPTIBLE | BILLABLE) /* user processes */
+
+/* Define system call traps for the various process types. These call masks
+ * determine what system call traps a process is allowed to make.
+ */
+#define TASK_T (1 << RECEIVE) /* clock and system */
+#define SERV_T (~0) /* system services */
+#define USER_T ((1 << SENDREC) | (1 << ECHO)) /* user processes */
+
/* The system image table lists all programs that are part of the boot image.
* The order of the entries here MUST agree with the order of the programs
* in the boot image and all kernel tasks must come first.
- * Each entry provides the process number, type, scheduling priority, send
- * mask, and a name for the process table. For kernel processes, the startup
- * routine and stack size is also provided.
+ * Each entry provides the process number, flags, quantum size (qs), scheduling
+ * queue, allowed traps, ipc mask, and a name for the process table. The
+ * initial program counter and stack size is also provided for kernel tasks.
*/
-#define USER_F (PREEMPTIBLE | BILLABLE)
-#define IDLE_F (BILLABLE | SYS_PROC)
-#define SYS_F (PREEMPTIBLE | SYS_PROC)
-#define TASK_F (SYS_PROC)
-
-#define IDLE_T 32 /* ticks */
-#define USER_T 8 /* ticks */
-#define SYS_T 16 /* ticks */
-
PUBLIC struct boot_image image[] = {
- { IDLE, idle_task, IDLE_F, IDLE_T, IDLE_Q, IDLE_S, EMPTY_MASK, EMPTY_MASK, "IDLE" },
- { CLOCK, clock_task, TASK_F, SYS_T, TASK_Q, CLOCK_S, TASK_CALL_MASK, SYSTEM_SEND_MASK, "CLOCK" },
- { SYSTEM, sys_task, TASK_F, SYS_T, TASK_Q, SYSTEM_S, TASK_CALL_MASK, SYSTEM_SEND_MASK, "SYSTEM" },
- { HARDWARE, 0, TASK_F, SYS_T, TASK_Q, HARDWARE_S, EMPTY_MASK, SYSTEM_SEND_MASK, "KERNEL" },
- { PM_PROC_NR, 0, SYS_F, SYS_T, 3, 0, FILLED_MASK, SERVER_SEND_MASK, "PM" },
- { FS_PROC_NR, 0, SYS_F, SYS_T, 4, 0, FILLED_MASK, SERVER_SEND_MASK, "FS" },
- { SM_PROC_NR, 0, SYS_F, SYS_T, 3, 0, FILLED_MASK, SYSTEM_SEND_MASK, "SM" },
- { IS_PROC_NR, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, DRIVER_SEND_MASK, "IS" },
- { TTY, 0, SYS_F, SYS_T, 1, 0, FILLED_MASK, SYSTEM_SEND_MASK, "TTY" },
- { MEMORY, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, DRIVER_SEND_MASK, "MEMORY" },
+/* process nr, pc, flags, qs, queue, stack, traps, ipc mask, name */
+ { IDLE, idle_task, IDLE_F, 32, IDLE_Q, IDLE_S, 0, 0, "IDLE" },
+ { CLOCK, clock_task, TASK_F, 0, TASK_Q, TASK_S, TASK_T, 0, "CLOCK" },
+ { SYSTEM, sys_task, TASK_F, 0, TASK_Q, TASK_S, TASK_T, 0, "SYSTEM" },
+ { HARDWARE, 0, TASK_F, 0, TASK_Q, HRDW_S, 0, 0, "KERNEL" },
+ { PM_PROC_NR, 0, SERV_F, 16, 3, 0, SERV_T, SERV_M, "PM" },
+ { FS_PROC_NR, 0, SERV_F, 16, 4, 0, SERV_T, SERV_M, "FS" },
+ { SM_PROC_NR, 0, SERV_F, 16, 3, 0, SERV_T, SYST_M, "SM" },
+ { TTY, 0, SERV_F, 16, 1, 0, SERV_T, SYST_M, "TTY" },
+ { MEMORY, 0, SERV_F, 16, 2, 0, SERV_T, DRIV_M, "MEMORY" },
+ { LOG_PROC_NR, 0, SERV_F, 16, 2, 0, SERV_T, SYST_M, "LOG" },
#if ENABLE_AT_WINI
- { AT_WINI, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, DRIVER_SEND_MASK, "AT_WINI" },
-#endif
-#if ENABLE_FLOPPY
- { FLOPPY, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, DRIVER_SEND_MASK, "FLOPPY" },
-#endif
-#if ENABLE_PRINTER
- { PRINTER, 0, SYS_F, SYS_T, 3, 0, FILLED_MASK, DRIVER_SEND_MASK, "PRINTER" },
-#endif
-#if ENABLE_RTL8139
- { RTL8139, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, DRIVER_SEND_MASK, "RTL8139" },
-#endif
-#if ENABLE_FXP
- { FXP, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, DRIVER_SEND_MASK, "FXP" },
-#endif
-#if ENABLE_DPETH
- { DPETH, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, DRIVER_SEND_MASK, "DPETH" },
-#endif
-#if ENABLE_LOG
- { LOG_PROC_NR, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, SYSTEM_SEND_MASK, "LOG" },
+ { AT_WINI, 0, SERV_F, 16, 2, 0, SERV_T, DRIV_M, "AT_WINI" },
#endif
#if ENABLE_BIOS_WINI
- { BIOS_WINI, 0, SYS_F, SYS_T, 2, 0, FILLED_MASK, SYSTEM_SEND_MASK, "BIOS" },
+ { BIOS_WINI, 0, SERV_F, 16, 2, 0, SERV_T, SYST_M, "BIOS" },
#endif
- { INIT_PROC_NR, 0, USER_F, USER_T, USER_Q, 0, USER_CALL_MASK, USER_SEND_MASK, "INIT" },
+ { INIT_PROC_NR, 0, USER_F, 8, USER_Q, 0, USER_T, USER_M, "INIT" },
};
/* Verify the size of the system image table at compile time. If the number