]> git.saurik.com Git - apple/xnu.git/blame - osfmk/kern/ipc_host.c
xnu-3789.51.2.tar.gz
[apple/xnu.git] / osfmk / kern / ipc_host.c
CommitLineData
1c79356b 1/*
b0d623f7 2 * Copyright (c) 2000-2009 Apple Inc. All rights reserved.
1c79356b 3 *
2d21ac55 4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
1c79356b 5 *
2d21ac55
A
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
8f6c56a5 14 *
2d21ac55
A
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
8f6c56a5
A
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
2d21ac55
A
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
8f6c56a5 25 *
2d21ac55 26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
1c79356b
A
27 */
28/*
29 * @OSF_COPYRIGHT@
30 */
31/*
32 * Mach Operating System
33 * Copyright (c) 1991,1990,1989,1988 Carnegie Mellon University
34 * All Rights Reserved.
35 *
36 * Permission to use, copy, modify and distribute this software and its
37 * documentation is hereby granted, provided that both the copyright
38 * notice and this permission notice appear in all copies of the
39 * software, derivative works or modified versions, and any portions
40 * thereof, and that both notices appear in supporting documentation.
41 *
42 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
43 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
44 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
45 *
46 * Carnegie Mellon requests users of this software to return to
47 *
48 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
49 * School of Computer Science
50 * Carnegie Mellon University
51 * Pittsburgh PA 15213-3890
52 *
53 * any improvements or extensions that they make and grant Carnegie Mellon
54 * the rights to redistribute these changes.
55 */
56/*
57 */
58
59/*
60 * kern/ipc_host.c
61 *
62 * Routines to implement host ports.
63 */
64#include <mach/message.h>
65#include <mach/mach_traps.h>
66#include <mach/mach_host_server.h>
91447636 67#include <mach/host_priv_server.h>
1c79356b
A
68#include <kern/host.h>
69#include <kern/processor.h>
70#include <kern/task.h>
71#include <kern/thread.h>
72#include <kern/ipc_host.h>
73#include <kern/ipc_kobject.h>
74#include <kern/misc_protos.h>
75#include <kern/spl.h>
76#include <ipc/ipc_port.h>
77#include <ipc/ipc_space.h>
78
3e170ce0
A
79#if CONFIG_MACF
80#include <security/mac_mach_internal.h>
81#endif
82
1c79356b
A
83/*
84 * Forward declarations
85 */
86
1c79356b
A
87boolean_t
88ref_pset_port_locked(
89 ipc_port_t port, boolean_t matchn, processor_set_t *ppset);
90
91/*
92 * ipc_host_init: set up various things.
93 */
94
b0d623f7
A
95extern lck_grp_t host_notify_lock_grp;
96extern lck_attr_t host_notify_lock_attr;
97
1c79356b
A
98void ipc_host_init(void)
99{
100 ipc_port_t port;
101 int i;
102
b0d623f7 103 lck_mtx_init(&realhost.lock, &host_notify_lock_grp, &host_notify_lock_attr);
0b4e3aa0 104
1c79356b
A
105 /*
106 * Allocate and set up the two host ports.
107 */
108 port = ipc_port_alloc_kernel();
109 if (port == IP_NULL)
110 panic("ipc_host_init");
111
55e303ae
A
112 ipc_kobject_set(port, (ipc_kobject_t) &realhost, IKOT_HOST_SECURITY);
113 kernel_set_special_port(&realhost, HOST_SECURITY_PORT,
114 ipc_port_make_send(port));
1c79356b
A
115
116 port = ipc_port_alloc_kernel();
117 if (port == IP_NULL)
118 panic("ipc_host_init");
119
55e303ae
A
120 ipc_kobject_set(port, (ipc_kobject_t) &realhost, IKOT_HOST);
121 kernel_set_special_port(&realhost, HOST_PORT,
122 ipc_port_make_send(port));
1c79356b
A
123
124 port = ipc_port_alloc_kernel();
125 if (port == IP_NULL)
126 panic("ipc_host_init");
127
55e303ae
A
128 ipc_kobject_set(port, (ipc_kobject_t) &realhost, IKOT_HOST_PRIV);
129 kernel_set_special_port(&realhost, HOST_PRIV_PORT,
130 ipc_port_make_send(port));
1c79356b 131
55e303ae 132 /* the rest of the special ports will be set up later */
1c79356b
A
133
134 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++) {
135 realhost.exc_actions[i].port = IP_NULL;
39037602
A
136 realhost.exc_actions[i].label = NULL;
137 /* The mac framework is not yet initialized, so we defer
138 * initializing the labels to later, when they are set
139 * for the first time. */
1c79356b
A
140 }/* for */
141
142 /*
143 * Set up ipc for default processor set.
144 */
2d21ac55
A
145 ipc_pset_init(&pset0);
146 ipc_pset_enable(&pset0);
1c79356b
A
147
148 /*
149 * And for master processor
150 */
151 ipc_processor_init(master_processor);
152 ipc_processor_enable(master_processor);
153}
154
155/*
156 * Routine: host_self_trap [mach trap]
157 * Purpose:
158 * Give the caller send rights for his own host port.
159 * Conditions:
160 * Nothing locked.
161 * Returns:
162 * MACH_PORT_NULL if there are any resource failures
163 * or other errors.
164 */
165
166mach_port_name_t
91447636
A
167host_self_trap(
168 __unused struct host_self_trap_args *args)
1c79356b 169{
eee35659 170 task_t self = current_task();
1c79356b 171 ipc_port_t sright;
91447636 172 mach_port_name_t name;
1c79356b 173
eee35659
A
174 itk_lock(self);
175 sright = ipc_port_copy_send(self->itk_host);
176 itk_unlock(self);
91447636
A
177 name = ipc_port_copyout_send(sright, current_space());
178 return name;
1c79356b
A
179}
180
181/*
182 * ipc_processor_init:
183 *
184 * Initialize ipc access to processor by allocating port.
185 */
186
187void
188ipc_processor_init(
189 processor_t processor)
190{
191 ipc_port_t port;
192
193 port = ipc_port_alloc_kernel();
194 if (port == IP_NULL)
195 panic("ipc_processor_init");
196 processor->processor_self = port;
197}
198
199/*
200 * ipc_processor_enable:
201 *
202 * Enable ipc control of processor by setting port object.
203 */
204void
205ipc_processor_enable(
206 processor_t processor)
207{
208 ipc_port_t myport;
209
210 myport = processor->processor_self;
211 ipc_kobject_set(myport, (ipc_kobject_t) processor, IKOT_PROCESSOR);
212}
1c79356b
A
213
214/*
215 * ipc_pset_init:
216 *
217 * Initialize ipc control of a processor set by allocating its ports.
218 */
219
220void
221ipc_pset_init(
222 processor_set_t pset)
223{
224 ipc_port_t port;
225
226 port = ipc_port_alloc_kernel();
227 if (port == IP_NULL)
228 panic("ipc_pset_init");
229 pset->pset_self = port;
230
231 port = ipc_port_alloc_kernel();
232 if (port == IP_NULL)
233 panic("ipc_pset_init");
234 pset->pset_name_self = port;
235}
236
237/*
238 * ipc_pset_enable:
239 *
240 * Enable ipc access to a processor set.
241 */
242void
243ipc_pset_enable(
244 processor_set_t pset)
245{
2d21ac55
A
246 ipc_kobject_set(pset->pset_self, (ipc_kobject_t) pset, IKOT_PSET);
247 ipc_kobject_set(pset->pset_name_self, (ipc_kobject_t) pset, IKOT_PSET_NAME);
1c79356b
A
248}
249
250/*
2d21ac55 251 * processor_set_default:
1c79356b 252 *
2d21ac55 253 * Return ports for manipulating default_processor set.
1c79356b
A
254 */
255kern_return_t
256processor_set_default(
257 host_t host,
258 processor_set_t *pset)
259{
260 if (host == HOST_NULL)
261 return(KERN_INVALID_ARGUMENT);
262
2d21ac55
A
263 *pset = &pset0;
264
265 return (KERN_SUCCESS);
1c79356b
A
266}
267
268/*
269 * Routine: convert_port_to_host
270 * Purpose:
271 * Convert from a port to a host.
272 * Doesn't consume the port ref; the host produced may be null.
273 * Conditions:
274 * Nothing locked.
275 */
276
277host_t
278convert_port_to_host(
279 ipc_port_t port)
280{
281 host_t host = HOST_NULL;
282
283 if (IP_VALID(port)) {
39037602
A
284 if (ip_kotype(port) == IKOT_HOST ||
285 ip_kotype(port) == IKOT_HOST_PRIV) {
1c79356b 286 host = (host_t) port->ip_kobject;
39037602
A
287 assert(ip_active(port));
288 }
1c79356b 289 }
1c79356b
A
290 return host;
291}
292
293/*
294 * Routine: convert_port_to_host_priv
295 * Purpose:
296 * Convert from a port to a host.
297 * Doesn't consume the port ref; the host produced may be null.
298 * Conditions:
299 * Nothing locked.
300 */
301
302host_t
303convert_port_to_host_priv(
304 ipc_port_t port)
305{
306 host_t host = HOST_NULL;
307
308 if (IP_VALID(port)) {
309 ip_lock(port);
310 if (ip_active(port) &&
311 (ip_kotype(port) == IKOT_HOST_PRIV))
312 host = (host_t) port->ip_kobject;
313 ip_unlock(port);
314 }
315
316 return host;
317}
318
319/*
320 * Routine: convert_port_to_processor
321 * Purpose:
322 * Convert from a port to a processor.
323 * Doesn't consume the port ref;
324 * the processor produced may be null.
325 * Conditions:
326 * Nothing locked.
327 */
328
329processor_t
330convert_port_to_processor(
331 ipc_port_t port)
332{
333 processor_t processor = PROCESSOR_NULL;
334
335 if (IP_VALID(port)) {
336 ip_lock(port);
337 if (ip_active(port) &&
338 (ip_kotype(port) == IKOT_PROCESSOR))
339 processor = (processor_t) port->ip_kobject;
340 ip_unlock(port);
341 }
342
343 return processor;
344}
345
346/*
347 * Routine: convert_port_to_pset
348 * Purpose:
349 * Convert from a port to a pset.
350 * Doesn't consume the port ref; produces a pset ref,
351 * which may be null.
352 * Conditions:
353 * Nothing locked.
354 */
355
356processor_set_t
357convert_port_to_pset(
358 ipc_port_t port)
359{
360 boolean_t r;
361 processor_set_t pset = PROCESSOR_SET_NULL;
362
363 r = FALSE;
364 while (!r && IP_VALID(port)) {
365 ip_lock(port);
366 r = ref_pset_port_locked(port, FALSE, &pset);
367 /* port unlocked */
368 }
369 return pset;
370}
371
372/*
373 * Routine: convert_port_to_pset_name
374 * Purpose:
375 * Convert from a port to a pset.
376 * Doesn't consume the port ref; produces a pset ref,
377 * which may be null.
378 * Conditions:
379 * Nothing locked.
380 */
381
382processor_set_name_t
383convert_port_to_pset_name(
384 ipc_port_t port)
385{
386 boolean_t r;
387 processor_set_t pset = PROCESSOR_SET_NULL;
388
389 r = FALSE;
390 while (!r && IP_VALID(port)) {
391 ip_lock(port);
392 r = ref_pset_port_locked(port, TRUE, &pset);
393 /* port unlocked */
394 }
395 return pset;
396}
397
398boolean_t
399ref_pset_port_locked(ipc_port_t port, boolean_t matchn, processor_set_t *ppset)
400{
401 processor_set_t pset;
402
403 pset = PROCESSOR_SET_NULL;
404 if (ip_active(port) &&
405 ((ip_kotype(port) == IKOT_PSET) ||
2d21ac55 406 (matchn && (ip_kotype(port) == IKOT_PSET_NAME)))) {
1c79356b 407 pset = (processor_set_t) port->ip_kobject;
1c79356b 408 }
2d21ac55 409
1c79356b
A
410 *ppset = pset;
411 ip_unlock(port);
2d21ac55 412
1c79356b
A
413 return (TRUE);
414}
415
416/*
417 * Routine: convert_host_to_port
418 * Purpose:
419 * Convert from a host to a port.
420 * Produces a naked send right which may be invalid.
421 * Conditions:
422 * Nothing locked.
423 */
424
425ipc_port_t
426convert_host_to_port(
427 host_t host)
428{
429 ipc_port_t port;
430
55e303ae 431 host_get_host_port(host, &port);
1c79356b
A
432 return port;
433}
434
435/*
436 * Routine: convert_processor_to_port
437 * Purpose:
438 * Convert from a processor to a port.
439 * Produces a naked send right which may be invalid.
b0d623f7 440 * Processors are not reference counted, so nothing to release.
1c79356b
A
441 * Conditions:
442 * Nothing locked.
443 */
444
445ipc_port_t
446convert_processor_to_port(
447 processor_t processor)
448{
b0d623f7 449 ipc_port_t port = processor->processor_self;
1c79356b 450
b0d623f7
A
451 if (port != IP_NULL)
452 port = ipc_port_make_send(port);
1c79356b
A
453 return port;
454}
455
456/*
457 * Routine: convert_pset_to_port
458 * Purpose:
459 * Convert from a pset to a port.
b0d623f7
A
460 * Produces a naked send right which may be invalid.
461 * Processor sets are not reference counted, so nothing to release.
1c79356b
A
462 * Conditions:
463 * Nothing locked.
464 */
465
466ipc_port_t
467convert_pset_to_port(
468 processor_set_t pset)
469{
2d21ac55 470 ipc_port_t port = pset->pset_self;
1c79356b 471
2d21ac55
A
472 if (port != IP_NULL)
473 port = ipc_port_make_send(port);
1c79356b 474
1c79356b
A
475 return port;
476}
477
478/*
479 * Routine: convert_pset_name_to_port
480 * Purpose:
481 * Convert from a pset to a port.
b0d623f7
A
482 * Produces a naked send right which may be invalid.
483 * Processor sets are not reference counted, so nothing to release.
1c79356b
A
484 * Conditions:
485 * Nothing locked.
486 */
487
488ipc_port_t
489convert_pset_name_to_port(
490 processor_set_name_t pset)
491{
2d21ac55 492 ipc_port_t port = pset->pset_name_self;
1c79356b 493
2d21ac55
A
494 if (port != IP_NULL)
495 port = ipc_port_make_send(port);
1c79356b 496
1c79356b
A
497 return port;
498}
499
500/*
501 * Routine: convert_port_to_host_security
502 * Purpose:
503 * Convert from a port to a host security.
504 * Doesn't consume the port ref; the port produced may be null.
505 * Conditions:
506 * Nothing locked.
507 */
508
509host_t
510convert_port_to_host_security(
511 ipc_port_t port)
512{
513 host_t host = HOST_NULL;
514
515 if (IP_VALID(port)) {
516 ip_lock(port);
517 if (ip_active(port) &&
518 (ip_kotype(port) == IKOT_HOST_SECURITY))
519 host = (host_t) port->ip_kobject;
520 ip_unlock(port);
521 }
522
523 return host;
524}
525
526/*
527 * Routine: host_set_exception_ports [kernel call]
528 * Purpose:
529 * Sets the host exception port, flavor and
530 * behavior for the exception types specified by the mask.
531 * There will be one send right per exception per valid
532 * port.
533 * Conditions:
534 * Nothing locked. If successful, consumes
535 * the supplied send right.
536 * Returns:
537 * KERN_SUCCESS Changed the special port.
538 * KERN_INVALID_ARGUMENT The host_priv is not valid,
539 * Illegal mask bit set.
540 * Illegal exception behavior
541 */
542kern_return_t
543host_set_exception_ports(
3e170ce0 544 host_priv_t host_priv,
1c79356b
A
545 exception_mask_t exception_mask,
546 ipc_port_t new_port,
547 exception_behavior_t new_behavior,
548 thread_state_flavor_t new_flavor)
549{
39037602 550 int i;
1c79356b
A
551 ipc_port_t old_port[EXC_TYPES_COUNT];
552
553 if (host_priv == HOST_PRIV_NULL) {
554 return KERN_INVALID_ARGUMENT;
555 }
556
b0d623f7 557 if (exception_mask & ~EXC_MASK_VALID) {
1c79356b
A
558 return KERN_INVALID_ARGUMENT;
559 }
560
561 if (IP_VALID(new_port)) {
2d21ac55 562 switch (new_behavior & ~MACH_EXCEPTION_CODES) {
1c79356b
A
563 case EXCEPTION_DEFAULT:
564 case EXCEPTION_STATE:
565 case EXCEPTION_STATE_IDENTITY:
566 break;
567 default:
568 return KERN_INVALID_ARGUMENT;
569 }
570 }
fe8ab488
A
571
572 /*
573 * Check the validity of the thread_state_flavor by calling the
574 * VALID_THREAD_STATE_FLAVOR architecture dependent macro defined in
575 * osfmk/mach/ARCHITECTURE/thread_status.h
1c79356b 576 */
fe8ab488
A
577 if (new_flavor != 0 && !VALID_THREAD_STATE_FLAVOR(new_flavor))
578 return (KERN_INVALID_ARGUMENT);
579
3e170ce0
A
580#if CONFIG_MACF
581 if (mac_task_check_set_host_exception_ports(current_task(), exception_mask) != 0)
582 return KERN_NO_ACCESS;
583#endif
584
585 assert(host_priv == &realhost);
586
1c79356b
A
587 host_lock(host_priv);
588
589 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++) {
39037602
A
590#if CONFIG_MACF
591 if (host_priv->exc_actions[i].label == NULL) {
592 // Lazy initialization (see ipc_port_init).
593 mac_exc_action_label_init(host_priv->exc_actions + i);
594 }
595#endif
596
597 if ((exception_mask & (1 << i))
598#if CONFIG_MACF
599 && mac_exc_action_label_update(current_task(), host_priv->exc_actions + i) == 0
600#endif
601 ) {
1c79356b 602 old_port[i] = host_priv->exc_actions[i].port;
39037602 603
1c79356b
A
604 host_priv->exc_actions[i].port =
605 ipc_port_copy_send(new_port);
606 host_priv->exc_actions[i].behavior = new_behavior;
607 host_priv->exc_actions[i].flavor = new_flavor;
39037602 608 } else {
1c79356b 609 old_port[i] = IP_NULL;
39037602 610 }
1c79356b
A
611 }/* for */
612
613 /*
614 * Consume send rights without any lock held.
615 */
616 host_unlock(host_priv);
617 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++)
618 if (IP_VALID(old_port[i]))
619 ipc_port_release_send(old_port[i]);
620 if (IP_VALID(new_port)) /* consume send right */
621 ipc_port_release_send(new_port);
622
623 return KERN_SUCCESS;
624}
625
626/*
627 * Routine: host_get_exception_ports [kernel call]
628 * Purpose:
629 * Clones a send right for each of the host's exception
630 * ports specified in the mask and returns the behaviour
631 * and flavor of said port.
632 *
633 * Returns upto [in} CountCnt elements.
634 *
635 * Conditions:
636 * Nothing locked.
637 * Returns:
638 * KERN_SUCCESS Extracted a send right.
639 * KERN_INVALID_ARGUMENT Invalid host_priv specified,
640 * Invalid special port,
641 * Illegal mask bit set.
642 * KERN_FAILURE The thread is dead.
643 */
644kern_return_t
645host_get_exception_ports(
646 host_priv_t host_priv,
647 exception_mask_t exception_mask,
648 exception_mask_array_t masks,
649 mach_msg_type_number_t * CountCnt,
650 exception_port_array_t ports,
651 exception_behavior_array_t behaviors,
652 thread_state_flavor_array_t flavors )
653{
91447636 654 unsigned int i, j, count;
1c79356b
A
655
656 if (host_priv == HOST_PRIV_NULL)
657 return KERN_INVALID_ARGUMENT;
658
b0d623f7 659 if (exception_mask & ~EXC_MASK_VALID) {
1c79356b
A
660 return KERN_INVALID_ARGUMENT;
661 }
662
663 assert (host_priv == &realhost);
664
665 host_lock(host_priv);
666
667 count = 0;
668
669 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++) {
39037602
A
670#if CONFIG_MACF
671 if (host_priv->exc_actions[i].label == NULL) {
672 // Lazy initialization (see ipc_port_init).
673 mac_exc_action_label_init(host_priv->exc_actions + i);
674 }
675#endif
676
1c79356b
A
677 if (exception_mask & (1 << i)) {
678 for (j = 0; j < count; j++) {
679/*
680 * search for an identical entry, if found
681 * set corresponding mask for this exception.
682 */
683 if (host_priv->exc_actions[i].port == ports[j] &&
684 host_priv->exc_actions[i].behavior == behaviors[j]
685 && host_priv->exc_actions[i].flavor == flavors[j])
686 {
687 masks[j] |= (1 << i);
688 break;
689 }
690 }/* for */
691 if (j == count) {
692 masks[j] = (1 << i);
693 ports[j] =
694 ipc_port_copy_send(host_priv->exc_actions[i].port);
695 behaviors[j] = host_priv->exc_actions[i].behavior;
696 flavors[j] = host_priv->exc_actions[i].flavor;
697 count++;
698 if (count > *CountCnt) {
699 break;
700 }
701 }
702 }
703 }/* for */
704 host_unlock(host_priv);
705
706 *CountCnt = count;
707 return KERN_SUCCESS;
708}
709
710kern_return_t
711host_swap_exception_ports(
3e170ce0 712 host_priv_t host_priv,
1c79356b
A
713 exception_mask_t exception_mask,
714 ipc_port_t new_port,
715 exception_behavior_t new_behavior,
716 thread_state_flavor_t new_flavor,
717 exception_mask_array_t masks,
718 mach_msg_type_number_t * CountCnt,
719 exception_port_array_t ports,
720 exception_behavior_array_t behaviors,
721 thread_state_flavor_array_t flavors )
722{
91447636 723 unsigned int i,
1c79356b
A
724 j,
725 count;
726 ipc_port_t old_port[EXC_TYPES_COUNT];
727
728 if (host_priv == HOST_PRIV_NULL)
729 return KERN_INVALID_ARGUMENT;
730
b0d623f7 731 if (exception_mask & ~EXC_MASK_VALID) {
1c79356b
A
732 return KERN_INVALID_ARGUMENT;
733 }
734
735 if (IP_VALID(new_port)) {
736 switch (new_behavior) {
737 case EXCEPTION_DEFAULT:
738 case EXCEPTION_STATE:
739 case EXCEPTION_STATE_IDENTITY:
740 break;
741 default:
742 return KERN_INVALID_ARGUMENT;
743 }
744 }
39236c6e 745
fe8ab488
A
746 if (new_flavor != 0 && !VALID_THREAD_STATE_FLAVOR(new_flavor))
747 return (KERN_INVALID_ARGUMENT);
1c79356b 748
3e170ce0
A
749#if CONFIG_MACF
750 if (mac_task_check_set_host_exception_ports(current_task(), exception_mask) != 0)
751 return KERN_NO_ACCESS;
752#endif /* CONFIG_MACF */
753
1c79356b
A
754 host_lock(host_priv);
755
39236c6e
A
756 assert(EXC_TYPES_COUNT > FIRST_EXCEPTION);
757 for (count=0, i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT && count < *CountCnt; i++) {
39037602
A
758#if CONFIG_MACF
759 if (host_priv->exc_actions[i].label == NULL) {
760 // Lazy initialization (see ipc_port_init).
761 mac_exc_action_label_init(host_priv->exc_actions + i);
762 }
763#endif
764
765 if ((exception_mask & (1 << i))
766#if CONFIG_MACF
767 && mac_exc_action_label_update(current_task(), host_priv->exc_actions + i) == 0
768#endif
769 ) {
1c79356b
A
770 for (j = 0; j < count; j++) {
771/*
772 * search for an identical entry, if found
773 * set corresponding mask for this exception.
774 */
775 if (host_priv->exc_actions[i].port == ports[j] &&
776 host_priv->exc_actions[i].behavior == behaviors[j]
777 && host_priv->exc_actions[i].flavor == flavors[j])
778 {
779 masks[j] |= (1 << i);
780 break;
781 }
782 }/* for */
783 if (j == count) {
784 masks[j] = (1 << i);
785 ports[j] =
786 ipc_port_copy_send(host_priv->exc_actions[i].port);
787 behaviors[j] = host_priv->exc_actions[i].behavior;
788 flavors[j] = host_priv->exc_actions[i].flavor;
789 count++;
790 }
791 old_port[i] = host_priv->exc_actions[i].port;
792 host_priv->exc_actions[i].port =
793 ipc_port_copy_send(new_port);
794 host_priv->exc_actions[i].behavior = new_behavior;
795 host_priv->exc_actions[i].flavor = new_flavor;
1c79356b
A
796 } else
797 old_port[i] = IP_NULL;
798 }/* for */
799 host_unlock(host_priv);
800
801 /*
802 * Consume send rights without any lock held.
803 */
39236c6e 804 while (--i >= FIRST_EXCEPTION) {
1c79356b
A
805 if (IP_VALID(old_port[i]))
806 ipc_port_release_send(old_port[i]);
39236c6e
A
807 }
808
1c79356b
A
809 if (IP_VALID(new_port)) /* consume send right */
810 ipc_port_release_send(new_port);
811 *CountCnt = count;
812
813 return KERN_SUCCESS;
814}