222 lines
		
	
	
		
			6.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			222 lines
		
	
	
		
			6.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* Miscellaneous system calls.				Author: Kees J. Bot
 | |
|  *								31 Mar 2000
 | |
|  * The entry points into this file are:
 | |
|  *   do_reboot: kill all processes, then reboot system
 | |
|  *   do_svrctl: memory manager control
 | |
|  *   do_getsysinfo: request copy of MM data structure
 | |
|  */
 | |
| 
 | |
| #include "mm.h"
 | |
| #include <minix/callnr.h>
 | |
| #include <signal.h>
 | |
| #include <sys/svrctl.h>
 | |
| #include <minix/com.h>
 | |
| #include <minix/utils.h>
 | |
| #include <string.h>
 | |
| #include "mproc.h"
 | |
| #include "param.h"
 | |
| 
 | |
| FORWARD _PROTOTYPE( char *find_key, (const char *params, const char *key));
 | |
| 
 | |
| /* MM gets a copy of all boot monitor parameters. */
 | |
| PRIVATE char monitor_params[128*sizeof(char *)];
 | |
| 
 | |
| /*=====================================================================*
 | |
|  *			    do_getsysinfo			       *
 | |
|  *=====================================================================*/
 | |
| PUBLIC int do_getsysinfo()
 | |
| {
 | |
|   return(OK);
 | |
| }
 | |
| 
 | |
| 
 | |
| /*=====================================================================*
 | |
|  *			    do_reboot				       *
 | |
|  *=====================================================================*/
 | |
| PUBLIC int do_reboot()
 | |
| {
 | |
|   register struct mproc *rmp = mp;
 | |
|   char monitor_code[32*sizeof(char *)];
 | |
| 
 | |
|   if (rmp->mp_effuid != SUPER_USER) return(EPERM);
 | |
| 
 | |
|   switch (m_in.reboot_flag) {
 | |
|   case RBT_HALT:
 | |
|   case RBT_REBOOT:
 | |
|   case RBT_PANIC:
 | |
|   case RBT_RESET:
 | |
| 	break;
 | |
|   case RBT_MONITOR:
 | |
| 	if (m_in.reboot_size >= sizeof(monitor_code)) return(EINVAL);
 | |
| 	if (sys_datacopy(who, (vir_bytes) m_in.reboot_code,
 | |
| 		PM_PROC_NR, (vir_bytes) monitor_code,
 | |
| 		(phys_bytes) (m_in.reboot_size+1)) != OK) return(EFAULT);
 | |
| 	if (monitor_code[m_in.reboot_size] != 0) return(EINVAL);
 | |
| 	break;
 | |
|   default:
 | |
| 	return(EINVAL);
 | |
|   }
 | |
| 
 | |
|   check_sig(-1, SIGKILL); 		/* kill all processes except init */
 | |
|   tell_fs(REBOOT,0,0,0);		/* tell FS to prepare for shutdown */
 | |
| 
 | |
|   sys_abort(m_in.reboot_flag, PM_PROC_NR, monitor_code, m_in.reboot_size);
 | |
|   sys_exit(0);
 | |
| }
 | |
| 
 | |
| /*=====================================================================*
 | |
|  *			    do_svrctl				       *
 | |
|  *=====================================================================*/
 | |
| PUBLIC int do_svrctl()
 | |
| {
 | |
|   static int initialized = 0;
 | |
|   int s, req;
 | |
|   vir_bytes ptr;
 | |
|   req = m_in.svrctl_req;
 | |
|   ptr = (vir_bytes) m_in.svrctl_argp;
 | |
| 
 | |
|   /* Initialize private copy of monitor parameters on first call. */
 | |
|   if (! initialized) {
 | |
|       if ((s=sys_getmonparams(monitor_params, sizeof(monitor_params))) != OK)
 | |
|           printf("MM: Warning couldn't get copy of monitor params: %d\n",s);
 | |
|       else
 | |
|           initialized = 1;
 | |
|   }
 | |
| 
 | |
|   /* Binary compatibility check. */
 | |
|   if (req == SYSGETENV) {
 | |
| #if DEAD_CODE
 | |
| 	printf("SYSGETENV by %d (fix!)\n", who);
 | |
| #endif
 | |
|   	req = MMGETPARAM;
 | |
|   }
 | |
| 
 | |
|   /* Is the request for the kernel? Forward it, except for SYSGETENV. */
 | |
|   if (((req >> 8) & 0xFF) == 'S') {
 | |
| 
 | |
|       /* Simply forward call to the SYSTEM task. */
 | |
|       return(sys_svrctl(who, req, mp->mp_effuid == SUPER_USER, ptr));
 | |
|   }
 | |
| 
 | |
|   /* Control operations local to the MM. */
 | |
|   switch(req) {
 | |
|   case MMGETPARAM: {
 | |
|       struct sysgetenv sysgetenv;
 | |
|       char search_key[64];
 | |
|       char *val_start;
 | |
|       size_t val_len;
 | |
|       size_t copy_len;
 | |
| 
 | |
|       /* Check if boot monitor parameters are in place. */
 | |
|       if (! initialized) return(EAGAIN);
 | |
| 
 | |
|       /* Copy sysgetenv structure to MM. */
 | |
|       if (sys_datacopy(who, ptr, SELF, (vir_bytes) &sysgetenv, 
 | |
|               sizeof(sysgetenv)) != OK) return(EFAULT);  
 | |
| 
 | |
|       if (sysgetenv.keylen == 0) {	/* copy all parameters */
 | |
|           val_start = monitor_params;
 | |
|           val_len = sizeof(monitor_params);
 | |
|       } 
 | |
|       else {				/* lookup value for key */
 | |
|           /* Try to get a copy of the requested key. */
 | |
|           if (sysgetenv.keylen > sizeof(search_key)) return(EINVAL);
 | |
|           if ((s = sys_datacopy(who, (vir_bytes) sysgetenv.key,
 | |
|                   SELF, (vir_bytes) search_key, sysgetenv.keylen)) != OK)
 | |
|               return(s);
 | |
| 
 | |
|           /* Make sure key is null-terminated and lookup value. */
 | |
|           search_key[sysgetenv.keylen-1]= '\0';
 | |
|           if ((val_start = find_key(monitor_params, search_key)) == NULL)
 | |
|                return(ESRCH);
 | |
|           val_len = strlen(val_start) + 1;
 | |
|       }
 | |
| 
 | |
|       /* Value found, make the actual copy (as far as possible). */
 | |
|       copy_len = MAX(val_len, sysgetenv.vallen); 
 | |
|       if ((s=sys_datacopy(SELF, (vir_bytes) val_start, 
 | |
|               who, (vir_bytes) sysgetenv.val, copy_len)) != OK)
 | |
|           return(s);
 | |
| 
 | |
|       /* See if it fits in the client's buffer. */
 | |
|       return (copy_len > sysgetenv.vallen) ? E2BIG : OK;
 | |
|   }
 | |
|   case MMSIGNON: {
 | |
| 	/* A user process becomes a task.  Simulate an exit by
 | |
| 	 * releasing a waiting parent and disinheriting children.
 | |
| 	 */
 | |
| 	struct mproc *rmp;
 | |
| 	pid_t pidarg;
 | |
| 
 | |
| 	if (mp->mp_effuid != SUPER_USER) return(EPERM);
 | |
| 
 | |
| 	rmp = &mproc[mp->mp_parent];
 | |
| 	tell_fs(EXIT, who, 0, 0);
 | |
| 
 | |
| 	pidarg = rmp->mp_wpid;
 | |
| 	if ((rmp->mp_flags & WAITING) && (pidarg == -1
 | |
| 		|| pidarg == mp->mp_pid || -pidarg == mp->mp_procgrp))
 | |
| 	{
 | |
| 		/* Wake up the parent. */
 | |
| 		rmp->mp_reply.reply_res2 = 0;
 | |
| 		setreply(mp->mp_parent, mp->mp_pid);
 | |
| 		rmp->mp_flags &= ~WAITING;
 | |
| 	}
 | |
| 
 | |
| 	/* Disinherit children. */
 | |
| 	for (rmp = &mproc[0]; rmp < &mproc[NR_PROCS]; rmp++) {
 | |
| 		if (rmp->mp_flags & IN_USE && rmp->mp_parent == who) {
 | |
| 			rmp->mp_parent = INIT_PROC_NR;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	/* Become like MM and FS. */
 | |
| 	mp->mp_pid = mp->mp_procgrp = 0;
 | |
| 	mp->mp_parent = 0;
 | |
| 	return(OK); }
 | |
| 
 | |
| #if ENABLE_SWAP
 | |
|   case MMSWAPON: {
 | |
| 	struct mmswapon swapon;
 | |
| 
 | |
| 	if (mp->mp_effuid != SUPER_USER) return(EPERM);
 | |
| 
 | |
| 	if (sys_datacopy(who, (phys_bytes) ptr,
 | |
| 		PM_PROC_NR, (phys_bytes) &swapon,
 | |
| 		(phys_bytes) sizeof(swapon)) != OK) return(EFAULT);
 | |
| 
 | |
| 	return(swap_on(swapon.file, swapon.offset, swapon.size)); }
 | |
| 
 | |
|   case MMSWAPOFF: {
 | |
| 	if (mp->mp_effuid != SUPER_USER) return(EPERM);
 | |
| 
 | |
| 	return(swap_off()); }
 | |
| #endif /* SWAP */
 | |
| 
 | |
|   default:
 | |
| 	return(EINVAL);
 | |
|   }
 | |
| }
 | |
| 
 | |
| /*==========================================================================*
 | |
|  *				find_key					    *
 | |
|  *==========================================================================*/
 | |
| PRIVATE char *find_key(params,name)
 | |
| const char *params;
 | |
| const char *name;
 | |
| {
 | |
|   register const char *namep;
 | |
|   register char *envp;
 | |
| 
 | |
|   for (envp = (char *) params; *envp != 0;) {
 | |
| 	for (namep = name; *namep != 0 && *namep == *envp; namep++, envp++)
 | |
| 		;
 | |
| 	if (*namep == '\0' && *envp == '=') 
 | |
| 		return(envp + 1);
 | |
| 	while (*envp++ != 0)
 | |
| 		;
 | |
|   }
 | |
|   return(NULL);
 | |
| }
 | |
| 
 | 
