]>
Commit | Line | Data |
---|---|---|
1c79356b | 1 | /* |
91447636 | 2 | * Copyright (c) 2000-2004 Apple Computer, Inc. All rights reserved. |
1c79356b | 3 | * |
2d21ac55 | 4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ |
0a7de745 | 5 | * |
2d21ac55 A |
6 | * This file contains Original Code and/or Modifications of Original Code |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
0a7de745 | 14 | * |
2d21ac55 A |
15 | * Please obtain a copy of the License at |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
0a7de745 | 17 | * |
2d21ac55 A |
18 | * The Original Code and all software distributed under the License are |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
8f6c56a5 A |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
2d21ac55 A |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
0a7de745 | 25 | * |
2d21ac55 | 26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ |
1c79356b A |
27 | */ |
28 | /* | |
29 | * @OSF_COPYRIGHT@ | |
30 | */ | |
0a7de745 | 31 | /* |
1c79356b A |
32 | * Mach Operating System |
33 | * Copyright (c) 1991,1990 Carnegie Mellon University | |
34 | * All Rights Reserved. | |
0a7de745 | 35 | * |
1c79356b A |
36 | * Permission to use, copy, modify and distribute this software and its |
37 | * documentation is hereby granted, provided that both the copyright | |
38 | * notice and this permission notice appear in all copies of the | |
39 | * software, derivative works or modified versions, and any portions | |
40 | * thereof, and that both notices appear in supporting documentation. | |
0a7de745 | 41 | * |
1c79356b A |
42 | * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" |
43 | * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR | |
44 | * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. | |
0a7de745 | 45 | * |
1c79356b | 46 | * Carnegie Mellon requests users of this software to return to |
0a7de745 | 47 | * |
1c79356b A |
48 | * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU |
49 | * School of Computer Science | |
50 | * Carnegie Mellon University | |
51 | * Pittsburgh PA 15213-3890 | |
0a7de745 | 52 | * |
1c79356b A |
53 | * any improvements or extensions that they make and grant Carnegie Mellon |
54 | * the rights to redistribute these changes. | |
55 | */ | |
56 | /* | |
57 | */ | |
58 | ||
1c79356b A |
59 | #include <mach/boolean.h> |
60 | #include <mach/port.h> | |
0b4e3aa0 | 61 | #include <mach/mig.h> |
1c79356b A |
62 | #include <mach/mig_errors.h> |
63 | #include <mach/mach_types.h> | |
64 | #include <mach/mach_traps.h> | |
0b4e3aa0 | 65 | |
1c79356b A |
66 | #include <kern/ipc_tt.h> |
67 | #include <kern/ipc_mig.h> | |
91447636 | 68 | #include <kern/kalloc.h> |
1c79356b A |
69 | #include <kern/task.h> |
70 | #include <kern/thread.h> | |
71 | #include <kern/ipc_kobject.h> | |
72 | #include <kern/misc_protos.h> | |
91447636 | 73 | |
1c79356b A |
74 | #include <ipc/port.h> |
75 | #include <ipc/ipc_kmsg.h> | |
76 | #include <ipc/ipc_entry.h> | |
77 | #include <ipc/ipc_object.h> | |
78 | #include <ipc/ipc_mqueue.h> | |
79 | #include <ipc/ipc_space.h> | |
80 | #include <ipc/ipc_port.h> | |
81 | #include <ipc/ipc_pset.h> | |
6d2010ae | 82 | #include <ipc/ipc_notify.h> |
0b4e3aa0 | 83 | #include <vm/vm_map.h> |
1c79356b | 84 | |
b0d623f7 A |
85 | #include <libkern/OSAtomic.h> |
86 | ||
d9a64523 A |
87 | void |
88 | mach_msg_receive_results_complete(ipc_object_t object); | |
89 | ||
1c79356b A |
90 | /* |
91 | * Routine: mach_msg_send_from_kernel | |
92 | * Purpose: | |
93 | * Send a message from the kernel. | |
94 | * | |
95 | * This is used by the client side of KernelUser interfaces | |
96 | * to implement SimpleRoutines. Currently, this includes | |
97 | * memory_object messages. | |
98 | * Conditions: | |
99 | * Nothing locked. | |
100 | * Returns: | |
101 | * MACH_MSG_SUCCESS Sent the message. | |
1c79356b | 102 | * MACH_SEND_INVALID_DEST Bad destination port. |
c910b4d9 A |
103 | * MACH_MSG_SEND_NO_BUFFER Destination port had inuse fixed bufer |
104 | * or destination is above kernel limit | |
1c79356b A |
105 | */ |
106 | ||
b0d623f7 A |
107 | #if IKM_SUPPORT_LEGACY |
108 | ||
109 | #undef mach_msg_send_from_kernel | |
110 | mach_msg_return_t mach_msg_send_from_kernel( | |
0a7de745 A |
111 | mach_msg_header_t *msg, |
112 | mach_msg_size_t send_size); | |
b0d623f7 | 113 | |
1c79356b A |
114 | mach_msg_return_t |
115 | mach_msg_send_from_kernel( | |
0a7de745 A |
116 | mach_msg_header_t *msg, |
117 | mach_msg_size_t send_size) | |
1c79356b A |
118 | { |
119 | ipc_kmsg_t kmsg; | |
120 | mach_msg_return_t mr; | |
121 | ||
0a7de745 | 122 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_START); |
39037602 | 123 | |
b0d623f7 | 124 | mr = ipc_kmsg_get_from_kernel(msg, send_size, &kmsg); |
39037602 | 125 | if (mr != MACH_MSG_SUCCESS) { |
0a7de745 | 126 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
b0d623f7 | 127 | return mr; |
39037602 | 128 | } |
b0d623f7 | 129 | |
6d2010ae A |
130 | mr = ipc_kmsg_copyin_from_kernel_legacy(kmsg); |
131 | if (mr != MACH_MSG_SUCCESS) { | |
132 | ipc_kmsg_free(kmsg); | |
0a7de745 | 133 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
6d2010ae | 134 | return mr; |
0a7de745 | 135 | } |
b0d623f7 | 136 | |
490019cf A |
137 | /* |
138 | * respect the thread's SEND_IMPORTANCE option to allow importance | |
139 | * donation from the kernel-side of user threads | |
140 | * (11938665 & 23925818) | |
141 | */ | |
142 | mach_msg_option_t option = MACH_SEND_KERNEL_DEFAULT; | |
0a7de745 | 143 | if (current_thread()->options & TH_OPT_SEND_IMPORTANCE) { |
490019cf | 144 | option &= ~MACH_SEND_NOIMPORTANCE; |
0a7de745 | 145 | } |
490019cf A |
146 | |
147 | mr = ipc_kmsg_send(kmsg, option, MACH_MSG_TIMEOUT_NONE); | |
b0d623f7 A |
148 | if (mr != MACH_MSG_SUCCESS) { |
149 | ipc_kmsg_destroy(kmsg); | |
0a7de745 | 150 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
b0d623f7 A |
151 | } |
152 | ||
153 | return mr; | |
154 | } | |
155 | ||
156 | #endif /* IKM_SUPPORT_LEGACY */ | |
157 | ||
158 | mach_msg_return_t | |
159 | mach_msg_send_from_kernel_proper( | |
0a7de745 A |
160 | mach_msg_header_t *msg, |
161 | mach_msg_size_t send_size) | |
b0d623f7 A |
162 | { |
163 | ipc_kmsg_t kmsg; | |
164 | mach_msg_return_t mr; | |
165 | ||
0a7de745 | 166 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_START); |
39037602 | 167 | |
1c79356b | 168 | mr = ipc_kmsg_get_from_kernel(msg, send_size, &kmsg); |
39037602 | 169 | if (mr != MACH_MSG_SUCCESS) { |
0a7de745 | 170 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
1c79356b | 171 | return mr; |
39037602 | 172 | } |
1c79356b | 173 | |
6d2010ae A |
174 | mr = ipc_kmsg_copyin_from_kernel(kmsg); |
175 | if (mr != MACH_MSG_SUCCESS) { | |
176 | ipc_kmsg_free(kmsg); | |
0a7de745 | 177 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
6d2010ae A |
178 | return mr; |
179 | } | |
1c79356b | 180 | |
490019cf A |
181 | /* |
182 | * respect the thread's SEND_IMPORTANCE option to force importance | |
183 | * donation from the kernel-side of user threads | |
184 | * (11938665 & 23925818) | |
185 | */ | |
186 | mach_msg_option_t option = MACH_SEND_KERNEL_DEFAULT; | |
0a7de745 | 187 | if (current_thread()->options & TH_OPT_SEND_IMPORTANCE) { |
490019cf | 188 | option &= ~MACH_SEND_NOIMPORTANCE; |
0a7de745 | 189 | } |
490019cf A |
190 | |
191 | mr = ipc_kmsg_send(kmsg, option, MACH_MSG_TIMEOUT_NONE); | |
c910b4d9 A |
192 | if (mr != MACH_MSG_SUCCESS) { |
193 | ipc_kmsg_destroy(kmsg); | |
0a7de745 | 194 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
c910b4d9 A |
195 | } |
196 | ||
197 | return mr; | |
1c79356b A |
198 | } |
199 | ||
39236c6e A |
200 | mach_msg_return_t |
201 | mach_msg_send_from_kernel_with_options( | |
0a7de745 A |
202 | mach_msg_header_t *msg, |
203 | mach_msg_size_t send_size, | |
204 | mach_msg_option_t option, | |
205 | mach_msg_timeout_t timeout_val) | |
39236c6e A |
206 | { |
207 | ipc_kmsg_t kmsg; | |
208 | mach_msg_return_t mr; | |
209 | ||
0a7de745 | 210 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_START); |
39037602 | 211 | |
39236c6e | 212 | mr = ipc_kmsg_get_from_kernel(msg, send_size, &kmsg); |
39037602 | 213 | if (mr != MACH_MSG_SUCCESS) { |
0a7de745 | 214 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
39236c6e | 215 | return mr; |
39037602 | 216 | } |
39236c6e A |
217 | |
218 | mr = ipc_kmsg_copyin_from_kernel(kmsg); | |
219 | if (mr != MACH_MSG_SUCCESS) { | |
220 | ipc_kmsg_free(kmsg); | |
0a7de745 | 221 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
39236c6e A |
222 | return mr; |
223 | } | |
224 | ||
39236c6e A |
225 | /* |
226 | * Until we are sure of its effects, we are disabling | |
227 | * importance donation from the kernel-side of user | |
228 | * threads in importance-donating tasks - unless the | |
490019cf A |
229 | * option to force importance donation is passed in, |
230 | * or the thread's SEND_IMPORTANCE option has been set. | |
231 | * (11938665 & 23925818) | |
39236c6e | 232 | */ |
0a7de745 | 233 | if (current_thread()->options & TH_OPT_SEND_IMPORTANCE) { |
490019cf | 234 | option &= ~MACH_SEND_NOIMPORTANCE; |
0a7de745 | 235 | } else if ((option & MACH_SEND_IMPORTANCE) == 0) { |
39236c6e | 236 | option |= MACH_SEND_NOIMPORTANCE; |
0a7de745 | 237 | } |
490019cf | 238 | |
39236c6e A |
239 | mr = ipc_kmsg_send(kmsg, option, timeout_val); |
240 | ||
241 | if (mr != MACH_MSG_SUCCESS) { | |
242 | ipc_kmsg_destroy(kmsg); | |
0a7de745 | 243 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
39236c6e | 244 | } |
0a7de745 | 245 | |
39236c6e A |
246 | return mr; |
247 | } | |
248 | ||
249 | ||
b0d623f7 A |
250 | #if IKM_SUPPORT_LEGACY |
251 | ||
2d21ac55 | 252 | mach_msg_return_t |
39236c6e | 253 | mach_msg_send_from_kernel_with_options_legacy( |
0a7de745 A |
254 | mach_msg_header_t *msg, |
255 | mach_msg_size_t send_size, | |
256 | mach_msg_option_t option, | |
257 | mach_msg_timeout_t timeout_val) | |
2d21ac55 A |
258 | { |
259 | ipc_kmsg_t kmsg; | |
260 | mach_msg_return_t mr; | |
261 | ||
0a7de745 | 262 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_START); |
39037602 | 263 | |
2d21ac55 | 264 | mr = ipc_kmsg_get_from_kernel(msg, send_size, &kmsg); |
39037602 | 265 | if (mr != MACH_MSG_SUCCESS) { |
0a7de745 | 266 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
2d21ac55 | 267 | return mr; |
39037602 | 268 | } |
2d21ac55 | 269 | |
6d2010ae A |
270 | mr = ipc_kmsg_copyin_from_kernel_legacy(kmsg); |
271 | if (mr != MACH_MSG_SUCCESS) { | |
272 | ipc_kmsg_free(kmsg); | |
0a7de745 | 273 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
6d2010ae A |
274 | return mr; |
275 | } | |
39236c6e | 276 | |
39236c6e A |
277 | /* |
278 | * Until we are sure of its effects, we are disabling | |
279 | * importance donation from the kernel-side of user | |
280 | * threads in importance-donating tasks. | |
490019cf | 281 | * (11938665 & 23925818) |
39236c6e | 282 | */ |
0a7de745 | 283 | if (current_thread()->options & TH_OPT_SEND_IMPORTANCE) { |
490019cf | 284 | option &= ~MACH_SEND_NOIMPORTANCE; |
0a7de745 | 285 | } else { |
490019cf | 286 | option |= MACH_SEND_NOIMPORTANCE; |
0a7de745 | 287 | } |
490019cf | 288 | |
2d21ac55 | 289 | mr = ipc_kmsg_send(kmsg, option, timeout_val); |
39236c6e | 290 | |
2d21ac55 | 291 | if (mr != MACH_MSG_SUCCESS) { |
c910b4d9 | 292 | ipc_kmsg_destroy(kmsg); |
0a7de745 | 293 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
2d21ac55 | 294 | } |
0a7de745 | 295 | |
2d21ac55 A |
296 | return mr; |
297 | } | |
298 | ||
b0d623f7 A |
299 | #endif /* IKM_SUPPORT_LEGACY */ |
300 | ||
1c79356b A |
301 | /* |
302 | * Routine: mach_msg_rpc_from_kernel | |
303 | * Purpose: | |
304 | * Send a message from the kernel and receive a reply. | |
305 | * Uses ith_rpc_reply for the reply port. | |
306 | * | |
307 | * This is used by the client side of KernelUser interfaces | |
308 | * to implement Routines. | |
309 | * Conditions: | |
310 | * Nothing locked. | |
311 | * Returns: | |
312 | * MACH_MSG_SUCCESS Sent the message. | |
313 | * MACH_RCV_PORT_DIED The reply port was deallocated. | |
314 | */ | |
315 | ||
0a7de745 A |
316 | mach_msg_return_t mach_msg_rpc_from_kernel_body(mach_msg_header_t *msg, |
317 | mach_msg_size_t send_size, mach_msg_size_t rcv_size, boolean_t legacy); | |
b0d623f7 A |
318 | |
319 | #if IKM_SUPPORT_LEGACY | |
320 | ||
321 | #undef mach_msg_rpc_from_kernel | |
1c79356b A |
322 | mach_msg_return_t |
323 | mach_msg_rpc_from_kernel( | |
0a7de745 A |
324 | mach_msg_header_t *msg, |
325 | mach_msg_size_t send_size, | |
326 | mach_msg_size_t rcv_size); | |
b0d623f7 A |
327 | |
328 | mach_msg_return_t | |
329 | mach_msg_rpc_from_kernel( | |
0a7de745 A |
330 | mach_msg_header_t *msg, |
331 | mach_msg_size_t send_size, | |
332 | mach_msg_size_t rcv_size) | |
b0d623f7 | 333 | { |
0a7de745 | 334 | return mach_msg_rpc_from_kernel_body(msg, send_size, rcv_size, TRUE); |
b0d623f7 A |
335 | } |
336 | ||
337 | #endif /* IKM_SUPPORT_LEGACY */ | |
338 | ||
339 | mach_msg_return_t | |
340 | mach_msg_rpc_from_kernel_proper( | |
0a7de745 A |
341 | mach_msg_header_t *msg, |
342 | mach_msg_size_t send_size, | |
343 | mach_msg_size_t rcv_size) | |
b0d623f7 | 344 | { |
0a7de745 | 345 | return mach_msg_rpc_from_kernel_body(msg, send_size, rcv_size, FALSE); |
b0d623f7 A |
346 | } |
347 | ||
348 | mach_msg_return_t | |
349 | mach_msg_rpc_from_kernel_body( | |
0a7de745 A |
350 | mach_msg_header_t *msg, |
351 | mach_msg_size_t send_size, | |
352 | mach_msg_size_t rcv_size, | |
b0d623f7 A |
353 | #if !IKM_SUPPORT_LEGACY |
354 | __unused | |
355 | #endif | |
0a7de745 | 356 | boolean_t legacy) |
1c79356b A |
357 | { |
358 | thread_t self = current_thread(); | |
359 | ipc_port_t reply; | |
360 | ipc_kmsg_t kmsg; | |
361 | mach_port_seqno_t seqno; | |
362 | mach_msg_return_t mr; | |
363 | ||
1c79356b A |
364 | assert(msg->msgh_local_port == MACH_PORT_NULL); |
365 | ||
0a7de745 | 366 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_START); |
39037602 | 367 | |
1c79356b | 368 | mr = ipc_kmsg_get_from_kernel(msg, send_size, &kmsg); |
39037602 | 369 | if (mr != MACH_MSG_SUCCESS) { |
0a7de745 | 370 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
1c79356b | 371 | return mr; |
39037602 | 372 | } |
1c79356b | 373 | |
1c79356b A |
374 | reply = self->ith_rpc_reply; |
375 | if (reply == IP_NULL) { | |
1c79356b | 376 | reply = ipc_port_alloc_reply(); |
1c79356b | 377 | if ((reply == IP_NULL) || |
0a7de745 | 378 | (self->ith_rpc_reply != IP_NULL)) { |
1c79356b | 379 | panic("mach_msg_rpc_from_kernel"); |
0a7de745 | 380 | } |
1c79356b A |
381 | self->ith_rpc_reply = reply; |
382 | } | |
383 | ||
384 | /* insert send-once right for the reply port */ | |
91447636 A |
385 | kmsg->ikm_header->msgh_local_port = reply; |
386 | kmsg->ikm_header->msgh_bits |= | |
0a7de745 | 387 | MACH_MSGH_BITS(0, MACH_MSG_TYPE_MAKE_SEND_ONCE); |
1c79356b | 388 | |
b0d623f7 | 389 | #if IKM_SUPPORT_LEGACY |
0a7de745 A |
390 | if (legacy) { |
391 | mr = ipc_kmsg_copyin_from_kernel_legacy(kmsg); | |
392 | } else { | |
393 | mr = ipc_kmsg_copyin_from_kernel(kmsg); | |
394 | } | |
b0d623f7 | 395 | #else |
0a7de745 | 396 | mr = ipc_kmsg_copyin_from_kernel(kmsg); |
b0d623f7 | 397 | #endif |
0a7de745 A |
398 | if (mr != MACH_MSG_SUCCESS) { |
399 | ipc_kmsg_free(kmsg); | |
400 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); | |
401 | return mr; | |
402 | } | |
490019cf A |
403 | |
404 | /* | |
405 | * respect the thread's SEND_IMPORTANCE option to force importance | |
406 | * donation from the kernel-side of user threads | |
407 | * (11938665 & 23925818) | |
408 | */ | |
409 | mach_msg_option_t option = MACH_SEND_KERNEL_DEFAULT; | |
0a7de745 | 410 | if (current_thread()->options & TH_OPT_SEND_IMPORTANCE) { |
490019cf | 411 | option &= ~MACH_SEND_NOIMPORTANCE; |
0a7de745 | 412 | } |
490019cf A |
413 | |
414 | mr = ipc_kmsg_send(kmsg, option, MACH_MSG_TIMEOUT_NONE); | |
c910b4d9 A |
415 | if (mr != MACH_MSG_SUCCESS) { |
416 | ipc_kmsg_destroy(kmsg); | |
0a7de745 | 417 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
c910b4d9 A |
418 | return mr; |
419 | } | |
1c79356b A |
420 | |
421 | for (;;) { | |
422 | ipc_mqueue_t mqueue; | |
423 | ||
3e170ce0 | 424 | assert(reply->ip_in_pset == 0); |
cb323159 | 425 | require_ip_active(reply); |
39236c6e A |
426 | |
427 | /* JMM - why this check? */ | |
3e170ce0 | 428 | if (!self->active && !self->inspection) { |
39236c6e A |
429 | ipc_port_dealloc_reply(reply); |
430 | self->ith_rpc_reply = IP_NULL; | |
1c79356b A |
431 | return MACH_RCV_INTERRUPTED; |
432 | } | |
433 | ||
1c79356b A |
434 | self->ith_continuation = (void (*)(mach_msg_return_t))0; |
435 | ||
39236c6e | 436 | mqueue = &reply->ip_messages; |
1c79356b | 437 | ipc_mqueue_receive(mqueue, |
0a7de745 A |
438 | MACH_MSG_OPTION_NONE, |
439 | MACH_MSG_SIZE_MAX, | |
440 | MACH_MSG_TIMEOUT_NONE, | |
441 | THREAD_INTERRUPTIBLE); | |
1c79356b A |
442 | |
443 | mr = self->ith_state; | |
444 | kmsg = self->ith_kmsg; | |
445 | seqno = self->ith_seqno; | |
446 | ||
cb323159 | 447 | mach_msg_receive_results_complete(ip_to_object(reply)); |
d9a64523 | 448 | |
0a7de745 | 449 | if (mr == MACH_MSG_SUCCESS) { |
1c79356b | 450 | break; |
0a7de745 | 451 | } |
1c79356b A |
452 | |
453 | assert(mr == MACH_RCV_INTERRUPTED); | |
454 | ||
39236c6e A |
455 | assert(reply == self->ith_rpc_reply); |
456 | ||
3e170ce0 | 457 | if (self->ast & AST_APC) { |
39236c6e A |
458 | ipc_port_dealloc_reply(reply); |
459 | self->ith_rpc_reply = IP_NULL; | |
0a7de745 | 460 | return mr; |
1c79356b A |
461 | } |
462 | } | |
1c79356b | 463 | |
0a7de745 | 464 | /* |
2d21ac55 A |
465 | * Check to see how much of the message/trailer can be received. |
466 | * We chose the maximum trailer that will fit, since we don't | |
467 | * have options telling us which trailer elements the caller needed. | |
468 | */ | |
469 | if (rcv_size >= kmsg->ikm_header->msgh_size) { | |
470 | mach_msg_format_0_trailer_t *trailer = (mach_msg_format_0_trailer_t *) | |
0a7de745 | 471 | ((vm_offset_t)kmsg->ikm_header + kmsg->ikm_header->msgh_size); |
2d21ac55 A |
472 | |
473 | if (rcv_size >= kmsg->ikm_header->msgh_size + MAX_TRAILER_SIZE) { | |
474 | /* Enough room for a maximum trailer */ | |
475 | trailer->msgh_trailer_size = MAX_TRAILER_SIZE; | |
0a7de745 A |
476 | } else if (rcv_size < kmsg->ikm_header->msgh_size + |
477 | trailer->msgh_trailer_size) { | |
2d21ac55 A |
478 | /* no room for even the basic (default) trailer */ |
479 | trailer->msgh_trailer_size = 0; | |
480 | } | |
481 | assert(trailer->msgh_trailer_type == MACH_MSG_TRAILER_FORMAT_0); | |
482 | rcv_size = kmsg->ikm_header->msgh_size + trailer->msgh_trailer_size; | |
483 | mr = MACH_MSG_SUCCESS; | |
484 | } else { | |
485 | mr = MACH_RCV_TOO_LARGE; | |
1c79356b | 486 | } |
1c79356b | 487 | |
1c79356b A |
488 | |
489 | /* | |
490 | * We want to preserve rights and memory in reply! | |
491 | * We don't have to put them anywhere; just leave them | |
492 | * as they are. | |
493 | */ | |
b0d623f7 | 494 | #if IKM_SUPPORT_LEGACY |
0a7de745 A |
495 | if (legacy) { |
496 | ipc_kmsg_copyout_to_kernel_legacy(kmsg, ipc_space_reply); | |
497 | } else { | |
498 | ipc_kmsg_copyout_to_kernel(kmsg, ipc_space_reply); | |
499 | } | |
b0d623f7 | 500 | #else |
0a7de745 | 501 | ipc_kmsg_copyout_to_kernel(kmsg, ipc_space_reply); |
b0d623f7 | 502 | #endif |
2d21ac55 A |
503 | ipc_kmsg_put_to_kernel(msg, kmsg, rcv_size); |
504 | return mr; | |
1c79356b A |
505 | } |
506 | ||
e8c3f781 A |
507 | /* |
508 | * Routine: mach_msg_destroy_from_kernel_proper | |
509 | * Purpose: | |
510 | * mach_msg_destroy_from_kernel_proper is used to destroy | |
511 | * an unwanted/unexpected reply message from a MIG | |
512 | * kernel-specific user-side stub. It is like ipc_kmsg_destroy(), | |
513 | * except we no longer have the kmsg - just the contents. | |
514 | */ | |
515 | void | |
516 | mach_msg_destroy_from_kernel_proper(mach_msg_header_t *msg) | |
517 | { | |
0a7de745 | 518 | mach_msg_bits_t mbits = msg->msgh_bits; |
e8c3f781 A |
519 | ipc_object_t object; |
520 | ||
521 | object = (ipc_object_t) msg->msgh_remote_port; | |
522 | if (IO_VALID(object)) { | |
523 | ipc_object_destroy(object, MACH_MSGH_BITS_REMOTE(mbits)); | |
524 | } | |
525 | ||
526 | /* | |
527 | * The destination (now in msg->msgh_local_port via | |
528 | * ipc_kmsg_copyout_to_kernel) has been consumed with | |
529 | * ipc_object_copyout_dest. | |
530 | */ | |
531 | ||
532 | /* MIG kernel users don't receive vouchers */ | |
0a7de745 | 533 | assert(!MACH_MSGH_BITS_VOUCHER(mbits)); |
e8c3f781 A |
534 | |
535 | /* For simple messages, we're done */ | |
536 | if ((mbits & MACH_MSGH_BITS_COMPLEX) == 0) { | |
537 | return; | |
538 | } | |
539 | ||
540 | /* Discard descriptor contents */ | |
541 | mach_msg_body_t *body = (mach_msg_body_t *)(msg + 1); | |
542 | mach_msg_descriptor_t *daddr = (mach_msg_descriptor_t *)(body + 1); | |
543 | mach_msg_size_t i; | |
544 | ||
0a7de745 | 545 | for (i = 0; i < body->msgh_descriptor_count; i++, daddr++) { |
e8c3f781 | 546 | switch (daddr->type.type) { |
e8c3f781 A |
547 | case MACH_MSG_PORT_DESCRIPTOR: { |
548 | mach_msg_port_descriptor_t *dsc = &daddr->port; | |
549 | if (IO_VALID((ipc_object_t) dsc->name)) { | |
550 | ipc_object_destroy((ipc_object_t) dsc->name, dsc->disposition); | |
551 | } | |
552 | break; | |
553 | } | |
554 | case MACH_MSG_OOL_VOLATILE_DESCRIPTOR: | |
0a7de745 | 555 | case MACH_MSG_OOL_DESCRIPTOR: { |
e8c3f781 A |
556 | mach_msg_ool_descriptor_t *dsc = |
557 | (mach_msg_ool_descriptor_t *)&daddr->out_of_line; | |
558 | ||
559 | if (dsc->size > 0) { | |
560 | vm_map_copy_discard((vm_map_copy_t) dsc->address); | |
561 | } else { | |
562 | assert(dsc->address == (void *) 0); | |
563 | } | |
564 | break; | |
565 | } | |
0a7de745 A |
566 | case MACH_MSG_OOL_PORTS_DESCRIPTOR: { |
567 | ipc_object_t *objects; | |
568 | mach_msg_type_number_t j; | |
569 | mach_msg_ool_ports_descriptor_t *dsc; | |
e8c3f781 | 570 | |
0a7de745 | 571 | dsc = (mach_msg_ool_ports_descriptor_t *)&daddr->ool_ports; |
e8c3f781 A |
572 | objects = (ipc_object_t *) dsc->address; |
573 | ||
574 | if (dsc->count == 0) { | |
575 | break; | |
576 | } | |
577 | assert(objects != 0); | |
578 | for (j = 0; j < dsc->count; j++) { | |
579 | object = objects[j]; | |
580 | if (IO_VALID(object)) { | |
581 | ipc_object_destroy(object, dsc->disposition); | |
582 | } | |
583 | } | |
584 | kfree(dsc->address, (vm_size_t) dsc->count * sizeof(mach_port_t)); | |
585 | break; | |
586 | } | |
cb323159 A |
587 | case MACH_MSG_GUARDED_PORT_DESCRIPTOR: { |
588 | mach_msg_guarded_port_descriptor_t *dsc = (mach_msg_guarded_port_descriptor_t *)&daddr->guarded_port; | |
589 | if (IO_VALID((ipc_object_t) dsc->name)) { | |
590 | ipc_object_destroy((ipc_object_t) dsc->name, dsc->disposition); | |
591 | } | |
592 | break; | |
593 | } | |
0a7de745 | 594 | default: |
e8c3f781 A |
595 | break; |
596 | } | |
597 | } | |
598 | } | |
1c79356b | 599 | |
91447636 | 600 | /************** These Calls are set up for kernel-loaded tasks/threads **************/ |
1c79356b A |
601 | |
602 | /* | |
91447636 | 603 | * Routine: mach_msg_overwrite |
1c79356b A |
604 | * Purpose: |
605 | * Like mach_msg_overwrite_trap except that message buffers | |
606 | * live in kernel space. Doesn't handle any options. | |
607 | * | |
608 | * This is used by in-kernel server threads to make | |
609 | * kernel calls, to receive request messages, and | |
610 | * to send reply messages. | |
611 | * Conditions: | |
612 | * Nothing locked. | |
613 | * Returns: | |
614 | */ | |
615 | ||
616 | mach_msg_return_t | |
617 | mach_msg_overwrite( | |
0a7de745 A |
618 | mach_msg_header_t *msg, |
619 | mach_msg_option_t option, | |
620 | mach_msg_size_t send_size, | |
621 | mach_msg_size_t rcv_size, | |
622 | mach_port_name_t rcv_name, | |
623 | __unused mach_msg_timeout_t msg_timeout, | |
624 | mach_msg_priority_t override, | |
625 | __unused mach_msg_header_t *rcv_msg, | |
626 | __unused mach_msg_size_t rcv_msg_size) | |
1c79356b A |
627 | { |
628 | ipc_space_t space = current_space(); | |
629 | vm_map_t map = current_map(); | |
630 | ipc_kmsg_t kmsg; | |
631 | mach_port_seqno_t seqno; | |
632 | mach_msg_return_t mr; | |
316670eb | 633 | mach_msg_trailer_size_t trailer_size; |
1c79356b A |
634 | |
635 | if (option & MACH_SEND_MSG) { | |
0a7de745 A |
636 | mach_msg_size_t msg_and_trailer_size; |
637 | mach_msg_max_trailer_t *max_trailer; | |
91447636 | 638 | |
5ba3f43e A |
639 | if ((send_size & 3) || |
640 | send_size < sizeof(mach_msg_header_t) || | |
cb323159 | 641 | (send_size < sizeof(mach_msg_base_t) && (msg->msgh_bits & MACH_MSGH_BITS_COMPLEX))) { |
91447636 | 642 | return MACH_SEND_MSG_TOO_SMALL; |
0a7de745 | 643 | } |
91447636 | 644 | |
0a7de745 | 645 | if (send_size > MACH_MSG_SIZE_MAX - MAX_TRAILER_SIZE) { |
8ad349bb | 646 | return MACH_SEND_TOO_LARGE; |
0a7de745 | 647 | } |
91447636 | 648 | |
0a7de745 | 649 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_START); |
39037602 | 650 | |
8ad349bb | 651 | msg_and_trailer_size = send_size + MAX_TRAILER_SIZE; |
91447636 A |
652 | kmsg = ipc_kmsg_alloc(msg_and_trailer_size); |
653 | ||
39037602 | 654 | if (kmsg == IKM_NULL) { |
0a7de745 | 655 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, MACH_SEND_NO_BUFFER); |
91447636 | 656 | return MACH_SEND_NO_BUFFER; |
39037602 | 657 | } |
1c79356b | 658 | |
0a7de745 A |
659 | KERNEL_DEBUG_CONSTANT(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_LINK) | DBG_FUNC_NONE, |
660 | (uintptr_t)0, /* this should only be called from the kernel! */ | |
661 | VM_KERNEL_ADDRPERM((uintptr_t)kmsg), | |
662 | 0, 0, | |
663 | 0); | |
91447636 A |
664 | (void) memcpy((void *) kmsg->ikm_header, (const void *) msg, send_size); |
665 | ||
666 | kmsg->ikm_header->msgh_size = send_size; | |
667 | ||
0a7de745 | 668 | /* |
91447636 A |
669 | * Reserve for the trailer the largest space (MAX_TRAILER_SIZE) |
670 | * However, the internal size field of the trailer (msgh_trailer_size) | |
671 | * is initialized to the minimum (sizeof(mach_msg_trailer_t)), to optimize | |
672 | * the cases where no implicit data is requested. | |
673 | */ | |
674 | max_trailer = (mach_msg_max_trailer_t *) ((vm_offset_t)kmsg->ikm_header + send_size); | |
675 | max_trailer->msgh_sender = current_thread()->task->sec_token; | |
676 | max_trailer->msgh_audit = current_thread()->task->audit_token; | |
677 | max_trailer->msgh_trailer_type = MACH_MSG_TRAILER_FORMAT_0; | |
678 | max_trailer->msgh_trailer_size = MACH_MSG_TRAILER_MINIMUM_SIZE; | |
39236c6e | 679 | |
39037602 | 680 | mr = ipc_kmsg_copyin(kmsg, space, map, override, &option); |
39236c6e | 681 | |
1c79356b A |
682 | if (mr != MACH_MSG_SUCCESS) { |
683 | ipc_kmsg_free(kmsg); | |
0a7de745 | 684 | KDBG(MACHDBG_CODE(DBG_MACH_IPC, MACH_IPC_KMSG_INFO) | DBG_FUNC_END, mr); |
1c79356b A |
685 | return mr; |
686 | } | |
687 | ||
39236c6e A |
688 | do { |
689 | mr = ipc_kmsg_send(kmsg, MACH_MSG_OPTION_NONE, MACH_MSG_TIMEOUT_NONE); | |
0a7de745 | 690 | } while (mr == MACH_SEND_INTERRUPTED); |
39236c6e | 691 | |
1c79356b A |
692 | assert(mr == MACH_MSG_SUCCESS); |
693 | } | |
694 | ||
695 | if (option & MACH_RCV_MSG) { | |
696 | thread_t self = current_thread(); | |
697 | ||
698 | do { | |
699 | ipc_object_t object; | |
700 | ipc_mqueue_t mqueue; | |
701 | ||
702 | mr = ipc_mqueue_copyin(space, rcv_name, | |
0a7de745 A |
703 | &mqueue, &object); |
704 | if (mr != MACH_MSG_SUCCESS) { | |
1c79356b | 705 | return mr; |
0a7de745 | 706 | } |
d9a64523 | 707 | |
1c79356b A |
708 | /* hold ref for object */ |
709 | ||
710 | self->ith_continuation = (void (*)(mach_msg_return_t))0; | |
711 | ipc_mqueue_receive(mqueue, | |
0a7de745 A |
712 | MACH_MSG_OPTION_NONE, |
713 | MACH_MSG_SIZE_MAX, | |
714 | MACH_MSG_TIMEOUT_NONE, | |
715 | THREAD_ABORTSAFE); | |
1c79356b A |
716 | mr = self->ith_state; |
717 | kmsg = self->ith_kmsg; | |
718 | seqno = self->ith_seqno; | |
719 | ||
d9a64523 | 720 | mach_msg_receive_results_complete(object); |
316670eb | 721 | io_release(object); |
1c79356b | 722 | } while (mr == MACH_RCV_INTERRUPTED); |
39037602 | 723 | |
0a7de745 | 724 | if (mr != MACH_MSG_SUCCESS) { |
1c79356b | 725 | return mr; |
0a7de745 | 726 | } |
1c79356b | 727 | |
316670eb | 728 | trailer_size = ipc_kmsg_add_trailer(kmsg, space, option, current_thread(), seqno, TRUE, |
0a7de745 | 729 | kmsg->ikm_header->msgh_remote_port->ip_context); |
316670eb A |
730 | |
731 | if (rcv_size < (kmsg->ikm_header->msgh_size + trailer_size)) { | |
1c79356b | 732 | ipc_kmsg_copyout_dest(kmsg, space); |
91447636 A |
733 | (void) memcpy((void *) msg, (const void *) kmsg->ikm_header, sizeof *msg); |
734 | ipc_kmsg_free(kmsg); | |
1c79356b A |
735 | return MACH_RCV_TOO_LARGE; |
736 | } | |
737 | ||
fe8ab488 | 738 | mr = ipc_kmsg_copyout(kmsg, space, map, MACH_MSG_BODY_NULL, option); |
1c79356b | 739 | if (mr != MACH_MSG_SUCCESS) { |
0a7de745 | 740 | if ((mr & ~MACH_MSG_MASK) == MACH_RCV_BODY_ERROR) { |
1c79356b | 741 | ipc_kmsg_put_to_kernel(msg, kmsg, |
0a7de745 | 742 | kmsg->ikm_header->msgh_size + trailer_size); |
1c79356b A |
743 | } else { |
744 | ipc_kmsg_copyout_dest(kmsg, space); | |
91447636 A |
745 | (void) memcpy((void *) msg, (const void *) kmsg->ikm_header, sizeof *msg); |
746 | ipc_kmsg_free(kmsg); | |
1c79356b A |
747 | } |
748 | ||
749 | return mr; | |
750 | } | |
751 | ||
91447636 | 752 | (void) memcpy((void *) msg, (const void *) kmsg->ikm_header, |
0a7de745 | 753 | kmsg->ikm_header->msgh_size + trailer_size); |
91447636 | 754 | ipc_kmsg_free(kmsg); |
1c79356b A |
755 | } |
756 | ||
757 | return MACH_MSG_SUCCESS; | |
758 | } | |
759 | ||
760 | /* | |
761 | * Routine: mig_get_reply_port | |
762 | * Purpose: | |
763 | * Called by client side interfaces living in the kernel | |
91447636 | 764 | * to get a reply port. |
1c79356b A |
765 | */ |
766 | mach_port_t | |
767 | mig_get_reply_port(void) | |
768 | { | |
0a7de745 | 769 | return MACH_PORT_NULL; |
1c79356b A |
770 | } |
771 | ||
772 | /* | |
773 | * Routine: mig_dealloc_reply_port | |
774 | * Purpose: | |
775 | * Called by client side interfaces to get rid of a reply port. | |
1c79356b A |
776 | */ |
777 | ||
778 | void | |
779 | mig_dealloc_reply_port( | |
91447636 | 780 | __unused mach_port_t reply_port) |
1c79356b | 781 | { |
1c79356b A |
782 | } |
783 | ||
784 | /* | |
785 | * Routine: mig_put_reply_port | |
786 | * Purpose: | |
0a7de745 | 787 | * Called by client side interfaces after each RPC to |
1c79356b A |
788 | * let the client recycle the reply port if it wishes. |
789 | */ | |
790 | void | |
791 | mig_put_reply_port( | |
91447636 | 792 | __unused mach_port_t reply_port) |
1c79356b A |
793 | { |
794 | } | |
795 | ||
796 | /* | |
797 | * mig_strncpy.c - by Joshua Block | |
798 | * | |
799 | * mig_strncp -- Bounded string copy. Does what the library routine strncpy | |
0a7de745 | 800 | * OUGHT to do: Copies the (null terminated) string in src into dest, a |
1c79356b A |
801 | * buffer of length len. Assures that the copy is still null terminated |
802 | * and doesn't overflow the buffer, truncating the copy if necessary. | |
803 | * | |
804 | * Parameters: | |
0a7de745 | 805 | * |
1c79356b | 806 | * dest - Pointer to destination buffer. |
0a7de745 | 807 | * |
1c79356b | 808 | * src - Pointer to source string. |
0a7de745 | 809 | * |
1c79356b A |
810 | * len - Length of destination buffer. |
811 | */ | |
0a7de745 | 812 | int |
1c79356b | 813 | mig_strncpy( |
0a7de745 A |
814 | char *dest, |
815 | const char *src, | |
816 | int len) | |
1c79356b | 817 | { |
0a7de745 A |
818 | int i = 0; |
819 | ||
820 | if (len > 0) { | |
821 | if (dest != NULL) { | |
822 | if (src != NULL) { | |
823 | for (i = 1; i < len; i++) { | |
824 | if (!(*dest++ = *src++)) { | |
825 | return i; | |
826 | } | |
827 | } | |
828 | } | |
829 | *dest = '\0'; | |
830 | } | |
1c79356b | 831 | } |
0a7de745 | 832 | return i; |
1c79356b A |
833 | } |
834 | ||
39037602 A |
835 | /* |
836 | * mig_strncpy_zerofill -- Bounded string copy. Does what the | |
837 | * library routine strncpy OUGHT to do: Copies the (null terminated) | |
838 | * string in src into dest, a buffer of length len. Assures that | |
839 | * the copy is still null terminated and doesn't overflow the buffer, | |
840 | * truncating the copy if necessary. If the string in src is smaller | |
841 | * than given length len, it will zero fill the remaining bytes in dest. | |
842 | * | |
843 | * Parameters: | |
844 | * | |
845 | * dest - Pointer to destination buffer. | |
846 | * | |
847 | * src - Pointer to source string. | |
848 | * | |
849 | * len - Length of destination buffer. | |
850 | */ | |
851 | int | |
852 | mig_strncpy_zerofill( | |
0a7de745 A |
853 | char *dest, |
854 | const char *src, | |
855 | int len) | |
39037602 A |
856 | { |
857 | int i = 0; | |
858 | boolean_t terminated = FALSE; | |
859 | int retval = 0; | |
860 | ||
861 | if (len <= 0 || dest == NULL) { | |
862 | return 0; | |
863 | } | |
864 | ||
865 | if (src == NULL) { | |
866 | terminated = TRUE; | |
867 | } | |
868 | ||
869 | for (i = 1; i < len; i++) { | |
870 | if (!terminated) { | |
871 | if (!(*dest++ = *src++)) { | |
872 | retval = i; | |
873 | terminated = TRUE; | |
874 | } | |
875 | } else { | |
876 | *dest++ = '\0'; | |
877 | } | |
878 | } | |
879 | ||
880 | *dest = '\0'; | |
881 | if (!terminated) { | |
882 | retval = i; | |
883 | } | |
884 | ||
885 | return retval; | |
886 | } | |
887 | ||
5ba3f43e | 888 | void * |
1c79356b | 889 | mig_user_allocate( |
0a7de745 | 890 | vm_size_t size) |
1c79356b A |
891 | { |
892 | return (char *)kalloc(size); | |
893 | } | |
894 | ||
895 | void | |
896 | mig_user_deallocate( | |
0a7de745 A |
897 | char *data, |
898 | vm_size_t size) | |
1c79356b | 899 | { |
91447636 | 900 | kfree(data, size); |
1c79356b A |
901 | } |
902 | ||
0b4e3aa0 A |
903 | /* |
904 | * Routine: mig_object_init | |
905 | * Purpose: | |
906 | * Initialize the base class portion of a MIG object. We | |
907 | * will lazy init the port, so just clear it for now. | |
908 | */ | |
909 | kern_return_t | |
910 | mig_object_init( | |
0a7de745 A |
911 | mig_object_t mig_object, |
912 | const IMIGObject *interface) | |
0b4e3aa0 | 913 | { |
0a7de745 | 914 | if (mig_object == MIG_OBJECT_NULL) { |
91447636 | 915 | return KERN_INVALID_ARGUMENT; |
0a7de745 | 916 | } |
91447636 | 917 | mig_object->pVtbl = (const IMIGObjectVtbl *)interface; |
0b4e3aa0 | 918 | mig_object->port = MACH_PORT_NULL; |
91447636 | 919 | return KERN_SUCCESS; |
0b4e3aa0 A |
920 | } |
921 | ||
922 | /* | |
923 | * Routine: mig_object_destroy | |
924 | * Purpose: | |
925 | * The object is being freed. This call lets us clean | |
926 | * up any state we have have built up over the object's | |
927 | * lifetime. | |
928 | * Conditions: | |
929 | * Since notifications and the port hold references on | |
930 | * on the object, neither can exist when this is called. | |
931 | * This is a good place to assert() that condition. | |
932 | */ | |
933 | void | |
934 | mig_object_destroy( | |
0a7de745 | 935 | __assert_only mig_object_t mig_object) |
0b4e3aa0 A |
936 | { |
937 | assert(mig_object->port == MACH_PORT_NULL); | |
938 | return; | |
939 | } | |
940 | ||
941 | /* | |
942 | * Routine: mig_object_reference | |
943 | * Purpose: | |
944 | * Pure virtual helper to invoke the MIG object's AddRef | |
945 | * method. | |
946 | * Conditions: | |
947 | * MIG object port may be locked. | |
948 | */ | |
949 | void | |
950 | mig_object_reference( | |
0a7de745 | 951 | mig_object_t mig_object) |
0b4e3aa0 A |
952 | { |
953 | assert(mig_object != MIG_OBJECT_NULL); | |
954 | mig_object->pVtbl->AddRef((IMIGObject *)mig_object); | |
955 | } | |
956 | ||
957 | /* | |
958 | * Routine: mig_object_deallocate | |
959 | * Purpose: | |
960 | * Pure virtual helper to invoke the MIG object's Release | |
961 | * method. | |
962 | * Conditions: | |
963 | * Nothing locked. | |
964 | */ | |
965 | void | |
966 | mig_object_deallocate( | |
0a7de745 | 967 | mig_object_t mig_object) |
0b4e3aa0 A |
968 | { |
969 | assert(mig_object != MIG_OBJECT_NULL); | |
cb323159 A |
970 | ipc_port_t port = mig_object->port; |
971 | if (mig_object->pVtbl->Release((IMIGObject *)mig_object) == 0) { | |
972 | if (IP_VALID(port)) { | |
973 | assert(!port->ip_srights); | |
974 | ipc_port_dealloc_kernel(port); | |
975 | } | |
976 | } | |
0b4e3aa0 A |
977 | } |
978 | ||
979 | /* | |
980 | * Routine: convert_mig_object_to_port [interface] | |
981 | * Purpose: | |
982 | * Base implementation of MIG outtrans routine to convert from | |
983 | * a mig object reference to a new send right on the object's | |
984 | * port. The object reference is consumed. | |
985 | * Returns: | |
986 | * IP_NULL - Null MIG object supplied | |
987 | * Otherwise, a newly made send right for the port | |
988 | * Conditions: | |
989 | * Nothing locked. | |
990 | */ | |
991 | ipc_port_t | |
992 | convert_mig_object_to_port( | |
0a7de745 | 993 | mig_object_t mig_object) |
0b4e3aa0 | 994 | { |
0a7de745 | 995 | if (mig_object == MIG_OBJECT_NULL) { |
0b4e3aa0 | 996 | return IP_NULL; |
0a7de745 | 997 | } |
0b4e3aa0 | 998 | |
cb323159 A |
999 | /* |
1000 | * make a send right and donate our reference for mig_object_no_senders | |
1001 | * if this is the first send right | |
1002 | */ | |
1003 | if (!ipc_kobject_make_send_lazy_alloc_port(&mig_object->port, | |
1004 | (ipc_kobject_t) mig_object, IKOT_MIG)) { | |
1005 | mig_object_deallocate(mig_object); | |
0a7de745 | 1006 | } |
0b4e3aa0 | 1007 | |
cb323159 | 1008 | return mig_object->port; |
0b4e3aa0 A |
1009 | } |
1010 | ||
1011 | ||
1012 | /* | |
1013 | * Routine: convert_port_to_mig_object [interface] | |
1014 | * Purpose: | |
1015 | * Base implementation of MIG intrans routine to convert from | |
1016 | * an incoming port reference to a new reference on the | |
1017 | * underlying object. A new reference must be created, because | |
1018 | * the port's reference could go away asynchronously. | |
1019 | * Returns: | |
1020 | * NULL - Not an active MIG object port or iid not supported | |
1021 | * Otherwise, a reference to the underlying MIG interface | |
1022 | * Conditions: | |
1023 | * Nothing locked. | |
1024 | */ | |
1025 | mig_object_t | |
1026 | convert_port_to_mig_object( | |
0a7de745 A |
1027 | ipc_port_t port, |
1028 | const MIGIID *iid) | |
0b4e3aa0 | 1029 | { |
0a7de745 A |
1030 | mig_object_t mig_object; |
1031 | void *ppv; | |
0b4e3aa0 | 1032 | |
0a7de745 | 1033 | if (!IP_VALID(port)) { |
0b4e3aa0 | 1034 | return NULL; |
0a7de745 | 1035 | } |
0b4e3aa0 A |
1036 | |
1037 | ip_lock(port); | |
1038 | if (!ip_active(port) || (ip_kotype(port) != IKOT_MIG)) { | |
1039 | ip_unlock(port); | |
1040 | return NULL; | |
1041 | } | |
1042 | ||
1043 | /* | |
1044 | * Our port points to some MIG object interface. Now | |
1045 | * query it to get a reference to the desired interface. | |
1046 | */ | |
1047 | ppv = NULL; | |
1048 | mig_object = (mig_object_t)port->ip_kobject; | |
1049 | mig_object->pVtbl->QueryInterface((IMIGObject *)mig_object, iid, &ppv); | |
1050 | ip_unlock(port); | |
1051 | return (mig_object_t)ppv; | |
1052 | } | |
1053 | ||
1054 | /* | |
1055 | * Routine: mig_object_no_senders [interface] | |
1056 | * Purpose: | |
1057 | * Base implementation of a no-senders notification handler | |
1058 | * for MIG objects. If there truly are no more senders, must | |
1059 | * destroy the port and drop its reference on the object. | |
0b4e3aa0 A |
1060 | * Conditions: |
1061 | * Nothing locked. | |
1062 | */ | |
cb323159 | 1063 | void |
0b4e3aa0 | 1064 | mig_object_no_senders( |
cb323159 | 1065 | ipc_port_t port) |
0b4e3aa0 | 1066 | { |
cb323159 A |
1067 | require_ip_active(port); |
1068 | assert(IKOT_MIG == ip_kotype(port)); | |
0b4e3aa0 | 1069 | |
cb323159 A |
1070 | /* consume the reference donated by convert_mig_object_to_port */ |
1071 | mig_object_deallocate((mig_object_t)port->ip_kobject); | |
0a7de745 | 1072 | } |
0b4e3aa0 A |
1073 | |
1074 | /* | |
1075 | * Kernel implementation of the notification chain for MIG object | |
1076 | * is kept separate from the actual objects, since there are expected | |
1077 | * to be much fewer of them than actual objects. | |
1078 | * | |
1079 | * The implementation of this part of MIG objects is coming | |
1080 | * "Real Soon Now"(TM). | |
1081 | */ |