 fbe1641bd3
			
		
	
	
		fbe1641bd3
		
	
	
	
	
		
			
			- RTL8139 driver moved to user-space; - PCI code moved to user-space; Fixed IRQ hook dump at IS server.
		
			
				
	
	
		
			252 lines
		
	
	
		
			7.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			252 lines
		
	
	
		
			7.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| 
 | |
| /* The system call implemented in this file:
 | |
|  *   m_type:	SYS_EXIT
 | |
|  *
 | |
|  * The parameters for this system call are:
 | |
|  *    m1_i1:	EXIT_STATUS	(exit status, 0 if normal exit)
 | |
|  *
 | |
|  * Author:
 | |
|  *    Jorrit N. Herder <jnherder@cs.vu.nl>
 | |
|  */
 | |
| 
 | |
| #include "../kernel.h"
 | |
| #include "../system.h"
 | |
| #include "../protect.h"
 | |
| #include <sys/svrctl.h>
 | |
| #include "../sendmask.h"
 | |
| 
 | |
| /*===========================================================================*
 | |
|  * 				   do_exit				     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC int do_exit(m_ptr)
 | |
| message *m_ptr;			/* pointer to request message */
 | |
| {
 | |
| /* Handle sys_exit. A server or driver wants to exit. This may happen
 | |
|  * on a panic, but also is done when MINIX is shutdown.
 | |
|  */
 | |
|   register struct proc *rp;
 | |
|   int proc_nr = m_ptr->m_source;	/* can only exit own process */
 | |
| 
 | |
|   if (m_ptr->EXIT_STATUS != 0) {
 | |
|       kprintf("WARNING: system process %d exited with an error.\n", proc_nr );
 | |
|   }
 | |
| 
 | |
|   /* Now call the routine to clean up of the process table slot. This cancels
 | |
|    * outstanding timers, possibly removes the process from the message queues,
 | |
|    * and reset important process table fields.
 | |
|    */
 | |
|   clear_proc(proc_nr);
 | |
| 
 | |
|   /* If the shutdown sequence is active, see if it was awaiting the shutdown
 | |
|    * of this system service. If so, directly continue the stop sequence. 
 | |
|    */
 | |
|   if (shutting_down && shutdown_process == proc_addr(proc_nr)) {
 | |
|       stop_sequence(&shutdown_timer);
 | |
|   }
 | |
|   return(EDONTREPLY);			/* no reply is sent */
 | |
| }
 | |
| 
 | |
| 
 | |
| 
 | |
| /* The system call implemented in this file:
 | |
|  *   m_type:	SYS_SVRCTL
 | |
|  *
 | |
|  * The parameters for this system call are:
 | |
|  *    m2_i1:	CTL_PROC_NR 	(process number of caller)	
 | |
|  *    m2_i2:	CTL_REQUEST	(request type)	
 | |
|  *    m2_i3:	CTL_MM_PRIV 	(privilege)
 | |
|  *    m2_l1:    CTL_SEND_MASK   (new send mask to be installed)
 | |
|  *    m2_l2:    CTL_PROC_TYPE   (new process type)
 | |
|  *    m2_p1:	CTL_ARG_PTR 	(argument pointer)
 | |
|  */
 | |
| 
 | |
| /* NOTE: this call will radically change! */
 | |
| 
 | |
| /*===========================================================================*
 | |
|  *				do_svrctl				     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC int do_svrctl(m_ptr)
 | |
| message *m_ptr;			/* pointer to request message */
 | |
| {
 | |
|   register struct proc *rp;
 | |
|   int proc_nr, priv;
 | |
|   int request;
 | |
|   vir_bytes argp;
 | |
| 
 | |
|   /* Extract message parameters. */
 | |
|   proc_nr = m_ptr->CTL_PROC_NR;
 | |
|   if (proc_nr == SELF) proc_nr = m_ptr->m_source;
 | |
|   if (! isokprocn(proc_nr)) return(EINVAL);
 | |
| 
 | |
|   request = m_ptr->CTL_REQUEST;
 | |
|   priv = m_ptr->CTL_MM_PRIV;
 | |
|   argp = (vir_bytes) m_ptr->CTL_ARG_PTR;
 | |
|   rp = proc_addr(proc_nr);
 | |
| 
 | |
|   /* Check if the PM privileges are super user. */
 | |
|   if (!priv || !isuserp(rp)) 
 | |
|       return(EPERM);
 | |
| 
 | |
|   /* See what is requested and handle the request. */
 | |
|   switch (request) {
 | |
|   case SYSSIGNON: {
 | |
| 	/* Make this process a server. The system processes should be able
 | |
| 	 * to communicate with this new server, so update their send masks
 | |
| 	 * as well.
 | |
| 	 */
 | |
|   	/* fall through */
 | |
|   }
 | |
|   case SYSSENDMASK: {
 | |
| 	rp->p_type = P_SERVER;
 | |
| 	rp->p_sendmask = ALLOW_ALL_MASK;
 | |
| 	send_mask_allow(proc_addr(USR8139)->p_sendmask, proc_nr);
 | |
| 	send_mask_allow(proc_addr(PM_PROC_NR)->p_sendmask, proc_nr);
 | |
| 	send_mask_allow(proc_addr(FS_PROC_NR)->p_sendmask, proc_nr);
 | |
| 	send_mask_allow(proc_addr(IS_PROC_NR)->p_sendmask, proc_nr);
 | |
| 	send_mask_allow(proc_addr(CLOCK)->p_sendmask, proc_nr);
 | |
| 	send_mask_allow(proc_addr(SYSTASK)->p_sendmask, proc_nr);
 | |
| 	return(OK); 
 | |
|   }
 | |
|   default:
 | |
| 	return(EINVAL);
 | |
|   }
 | |
| }
 | |
| 
 | |
| /* The system call implemented in this file:
 | |
|  *   m_type:	SYS_SEGCTL
 | |
|  *
 | |
|  * The parameters for this system call are:
 | |
|  *    m4_l3:	SEG_PHYS	(physical base address)
 | |
|  *    m4_l4:	SEG_SIZE	(size of segment)
 | |
|  *    m4_l1:	SEG_SELECT	(return segment selector here)
 | |
|  *    m4_l2:	SEG_OFFSET	(return offset within segment here)
 | |
|  *    m4_l5:	SEG_INDEX	(return index into remote memory map here)
 | |
|  *
 | |
|  * Author:
 | |
|  *    Jorrit N. Herder <jnherder@cs.vu.nl>
 | |
|  */
 | |
| 
 | |
| /*===========================================================================*
 | |
|  *			        do_segctl				     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC int do_segctl(m_ptr)
 | |
| register message *m_ptr;	/* pointer to request message */
 | |
| {
 | |
| /* Return a segment selector and offset that can be used to reach a physical
 | |
|  * address, for use by a driver doing memory I/O in the A0000 - DFFFF range.
 | |
|  */
 | |
|   u16_t selector;
 | |
|   vir_bytes offset;
 | |
|   int i, index;
 | |
|   register struct proc *rp;
 | |
|   phys_bytes phys = (phys_bytes) m_ptr->SEG_PHYS;
 | |
|   vir_bytes size = (vir_bytes) m_ptr->SEG_SIZE;
 | |
|   int result;
 | |
| 
 | |
|   /* First check if there is a slot available for this segment. */
 | |
|   rp = proc_addr(m_ptr->m_source);
 | |
|   index = -1;
 | |
|   for (i=0; i < NR_REMOTE_SEGS; i++) {
 | |
|   	if (! rp->p_farmem[i].in_use) {
 | |
|   		index = i; 
 | |
|   		rp->p_farmem[i].in_use = TRUE;
 | |
|   		rp->p_farmem[i].mem_phys = phys;
 | |
|   		rp->p_farmem[i].mem_len = size;
 | |
|   		break;
 | |
|   	}
 | |
|   }
 | |
|   if (index < 0) return(ENOSPC);
 | |
| 
 | |
| 
 | |
|   if (! machine.protected) {
 | |
|       selector = phys / HCLICK_SIZE;
 | |
|       offset = phys % HCLICK_SIZE;
 | |
|       result = OK;
 | |
|   } else {
 | |
|       /* Check if the segment size can be recorded in bytes, that is, check
 | |
|        * if descriptor's limit field can delimited the allowed memory region
 | |
|        * precisely. This works up to 1MB. If the size is larger, 4K pages
 | |
|        * instead of bytes are used.
 | |
|        */
 | |
|       if (size < BYTE_GRAN_MAX) {
 | |
|           init_dataseg(&rp->p_ldt[EXTRA_LDT_INDEX+i], phys, size, 
 | |
|           	USER_PRIVILEGE);
 | |
|           selector = ((EXTRA_LDT_INDEX+i)*0x08) | (1*0x04) | USER_PRIVILEGE;
 | |
|           offset = 0;
 | |
|           result = OK;			
 | |
|       } else {
 | |
|           init_dataseg(&rp->p_ldt[EXTRA_LDT_INDEX+i], phys & ~0xFFFF, 0, 
 | |
|           	USER_PRIVILEGE);
 | |
|           selector = ((EXTRA_LDT_INDEX+i)*0x08) | (1*0x04) | USER_PRIVILEGE;
 | |
|           offset = phys & 0xFFFF;
 | |
|           result = OK;
 | |
|       }
 | |
|   }
 | |
| 
 | |
|   /* Request successfully done. Now return the result. */
 | |
|   m_ptr->SEG_INDEX = index | REMOTE_SEG;
 | |
|   m_ptr->SEG_SELECT = selector;
 | |
|   m_ptr->SEG_OFFSET = offset;
 | |
|   return(result);
 | |
| }
 | |
| 
 | |
| 
 | |
| /* The system call implemented in this file:
 | |
|  *   m_type:	SYS_IOPENABLE
 | |
|  *
 | |
|  * The parameters for this system call are:
 | |
|  *    m2_i2:	PROC_NR		(process to give I/O Protection Level bits)
 | |
|  *
 | |
|  * Author:
 | |
|  *    Jorrit N. Herder <jnherder@cs.vu.nl>
 | |
|  */
 | |
| 
 | |
| /*===========================================================================*
 | |
|  *			        do_iopenable				     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC int do_iopenable(m_ptr)
 | |
| register message *m_ptr;	/* pointer to request message */
 | |
| {
 | |
| #if ENABLE_USERPRIV && ENABLE_USERIOPL
 | |
|   enable_iop(proc_addr(m_ptr->PROC_NR)); 
 | |
|   return(OK);
 | |
| #else
 | |
|   return(EPERM);
 | |
| #endif
 | |
| }
 | |
| 
 | |
| 
 | |
| /* The system call implemented in this file:
 | |
|  *   m_type:	SYS_KMALLOC
 | |
|  *
 | |
|  * The parameters for this system call are:
 | |
|  *    m4_l2:	MEM_CHUNK_SIZE	(request a buffer of this size)
 | |
|  *    m4_l1:	MEM_CHUNK_BASE 	(return physical address on success)	
 | |
|  *
 | |
|  * Author:
 | |
|  *    Jorrit N. Herder <jnherder@cs.vu.nl>
 | |
|  */
 | |
| 
 | |
| /*===========================================================================*
 | |
|  *			        do_kmalloc				     *
 | |
|  *===========================================================================*/
 | |
| PUBLIC int do_kmalloc(m_ptr)
 | |
| register message *m_ptr;	/* pointer to request message */
 | |
| {
 | |
| /* Request a (DMA) buffer to be allocated in one of the memory chunks. */
 | |
|   phys_clicks tot_clicks;
 | |
|   struct memory *memp;
 | |
|   
 | |
|   tot_clicks = (m_ptr->MEM_CHUNK_SIZE + CLICK_SIZE-1) >> CLICK_SHIFT;
 | |
|   memp = &mem[NR_MEMS];
 | |
|   while ((--memp)->size < tot_clicks) {
 | |
|       if (memp == mem) {
 | |
|           return(ENOMEM);
 | |
|       }
 | |
|   }
 | |
|   memp->size -= tot_clicks;
 | |
|   m_ptr->MEM_CHUNK_BASE = (memp->base + memp->size) << CLICK_SHIFT; 
 | |
|   return(OK);
 | |
| }
 | |
| 
 |