2 * Copyright (c) 2000-2008 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
32 * Mach Operating System
33 * Copyright (c) 1991,1990,1989 Carnegie Mellon University
34 * All Rights Reserved.
36 * Permission to use, copy, modify and distribute this software and its
37 * documentation is hereby granted, provided that both the copyright
38 * notice and this permission notice appear in all copies of the
39 * software, derivative works or modified versions, and any portions
40 * thereof, and that both notices appear in supporting documentation.
42 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
43 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
44 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
46 * Carnegie Mellon requests users of this software to return to
48 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
49 * School of Computer Science
50 * Carnegie Mellon University
51 * Pittsburgh PA 15213-3890
53 * any improvements or extensions that they make and grant Carnegie Mellon
54 * the rights to redistribute these changes.
57 * NOTICE: This file was modified by McAfee Research in 2004 to introduce
58 * support for mandatory and extensible security protections. This notice
59 * is included in support of clause 2.2 (b) of the Apple Public License,
61 * Copyright (c) 2005 SPARTA, Inc.
66 * File: kern/ipc_kobject.c
70 * Functions for letting a port represent a kernel object.
73 #include <mach_debug.h>
74 #include <mach_ipc_test.h>
75 #include <mach_machine_routines.h>
76 #include <norma_task.h>
78 #include <platforms.h>
81 #include <mach/port.h>
82 #include <mach/kern_return.h>
83 #include <mach/message.h>
84 #include <mach/mig_errors.h>
85 #include <mach/notify.h>
87 #include <mach/vm_param.h>
89 #include <mach/mach_vm_server.h>
90 #include <mach/mach_port_server.h>
91 #include <mach/mach_host_server.h>
92 #include <mach/host_priv_server.h>
93 #include <mach/host_security_server.h>
94 #include <mach/clock_server.h>
95 #include <mach/clock_priv_server.h>
96 #include <mach/ledger_server.h>
97 #include <mach/lock_set_server.h>
98 #include <default_pager/default_pager_object_server.h>
99 #include <mach/memory_object_server.h>
100 #include <mach/memory_object_control_server.h>
101 #include <mach/memory_object_default_server.h>
102 #include <mach/memory_object_name_server.h>
103 #include <mach/processor_server.h>
104 #include <mach/processor_set_server.h>
105 #include <mach/task_server.h>
107 #include <mach/vm32_map_server.h>
109 #include <mach/thread_act_server.h>
111 #include <device/device_types.h>
112 #include <device/device_server.h>
114 #include <UserNotification/UNDReplyServer.h>
117 #include <kern/audit_sessionport.h>
120 #if MACH_MACHINE_ROUTINES
121 #include <machine/machine_routines.h>
122 #endif /* MACH_MACHINE_ROUTINES */
124 #include <uk_xkern/xk_uproxy_server.h>
125 #endif /* XK_PROXY */
127 #include <kern/ipc_tt.h>
128 #include <kern/ipc_mig.h>
129 #include <kern/ipc_misc.h>
130 #include <kern/ipc_kobject.h>
131 #include <kern/host_notify.h>
132 #include <kern/mk_timer.h>
133 #include <kern/misc_protos.h>
134 #include <ipc/ipc_kmsg.h>
135 #include <ipc/ipc_port.h>
136 #include <ipc/ipc_labelh.h>
137 #include <kern/counters.h>
139 #include <vm/vm_protos.h>
141 #include <security/mac_mach_internal.h>
144 * Routine: ipc_kobject_notify
146 * Deliver notifications to kobjects that care about them.
150 mach_msg_header_t
*request_header
,
151 mach_msg_header_t
*reply_header
);
155 mig_routine_t routine
;
158 mach_counter_t callcount
;
162 #define MAX_MIG_ENTRIES 1024
163 #define MIG_HASH(x) (x)
166 #define max(a,b) (((a) > (b)) ? (a) : (b))
169 mig_hash_t mig_buckets
[MAX_MIG_ENTRIES
];
170 int mig_table_max_displ
;
171 mach_msg_size_t mig_reply_size
;
174 #include <mach/security_server.h>
179 const struct mig_subsystem
*mig_e
[] = {
180 (const struct mig_subsystem
*)&mach_vm_subsystem
,
181 (const struct mig_subsystem
*)&mach_port_subsystem
,
182 (const struct mig_subsystem
*)&mach_host_subsystem
,
183 (const struct mig_subsystem
*)&host_priv_subsystem
,
184 (const struct mig_subsystem
*)&host_security_subsystem
,
185 (const struct mig_subsystem
*)&clock_subsystem
,
186 (const struct mig_subsystem
*)&clock_priv_subsystem
,
187 (const struct mig_subsystem
*)&processor_subsystem
,
188 (const struct mig_subsystem
*)&processor_set_subsystem
,
189 (const struct mig_subsystem
*)&is_iokit_subsystem
,
190 (const struct mig_subsystem
*)&memory_object_name_subsystem
,
191 (const struct mig_subsystem
*)&lock_set_subsystem
,
192 (const struct mig_subsystem
*)&ledger_subsystem
,
193 (const struct mig_subsystem
*)&task_subsystem
,
194 (const struct mig_subsystem
*)&thread_act_subsystem
,
196 (const struct mig_subsystem
*)&vm32_map_subsystem
,
198 (const struct mig_subsystem
*)&UNDReply_subsystem
,
199 (const struct mig_subsystem
*)&default_pager_object_subsystem
,
202 (const struct mig_subsystem
*)&do_uproxy_xk_uproxy_subsystem
,
203 #endif /* XK_PROXY */
204 #if MACH_MACHINE_ROUTINES
205 (const struct mig_subsystem
*)&MACHINE_SUBSYSTEM
,
206 #endif /* MACH_MACHINE_ROUTINES */
208 (const struct mig_subsystem
*)&mcmsg_info_subsystem
,
209 #endif /* MCMSG && iPSC860 */
212 (const struct mig_subsystem
*)&security_subsystem
,
219 unsigned int i
, n
= sizeof(mig_e
)/sizeof(const struct mig_subsystem
*);
221 mach_msg_id_t j
, pos
, nentry
, range
;
223 for (i
= 0; i
< n
; i
++) {
224 range
= mig_e
[i
]->end
- mig_e
[i
]->start
;
225 if (!mig_e
[i
]->start
|| range
< 0)
226 panic("the msgh_ids in mig_e[] aren't valid!");
227 mig_reply_size
= max(mig_reply_size
, mig_e
[i
]->maxsize
);
229 for (j
= 0; j
< range
; j
++) {
230 if (mig_e
[i
]->routine
[j
].stub_routine
) {
231 /* Only put real entries in the table */
232 nentry
= j
+ mig_e
[i
]->start
;
233 for (pos
= MIG_HASH(nentry
) % MAX_MIG_ENTRIES
, howmany
= 1;
234 mig_buckets
[pos
].num
;
235 pos
++, pos
= pos
% MAX_MIG_ENTRIES
, howmany
++) {
236 if (mig_buckets
[pos
].num
== nentry
) {
237 printf("message id = %d\n", nentry
);
238 panic("multiple entries with the same msgh_id");
240 if (howmany
== MAX_MIG_ENTRIES
)
241 panic("the mig dispatch table is too small");
244 mig_buckets
[pos
].num
= nentry
;
245 mig_buckets
[pos
].routine
= mig_e
[i
]->routine
[j
].stub_routine
;
246 if (mig_e
[i
]->routine
[j
].max_reply_msg
)
247 mig_buckets
[pos
].size
= mig_e
[i
]->routine
[j
].max_reply_msg
;
249 mig_buckets
[pos
].size
= mig_e
[i
]->maxsize
;
251 mig_table_max_displ
= max(howmany
, mig_table_max_displ
);
255 printf("mig_table_max_displ = %d\n", mig_table_max_displ
);
260 * Routine: ipc_kobject_server
262 * Handle a message sent to the kernel.
263 * Generates a reply message.
264 * Version for Untyped IPC.
273 mach_msg_size_t reply_size
;
277 mach_msg_format_0_trailer_t
*trailer
;
278 register mig_hash_t
*ptr
;
281 * Find out corresponding mig_hash entry if any
284 register int key
= request
->ikm_header
->msgh_id
;
285 register int i
= MIG_HASH(key
);
286 register int max_iter
= mig_table_max_displ
;
289 ptr
= &mig_buckets
[i
++ % MAX_MIG_ENTRIES
];
290 while (key
!= ptr
->num
&& ptr
->num
&& --max_iter
);
292 if (!ptr
->routine
|| key
!= ptr
->num
) {
293 ptr
= (mig_hash_t
*)0;
294 reply_size
= mig_reply_size
;
296 reply_size
= ptr
->size
;
303 /* round up for trailer size */
304 reply_size
+= MAX_TRAILER_SIZE
;
305 reply
= ipc_kmsg_alloc(reply_size
);
307 if (reply
== IKM_NULL
) {
308 printf("ipc_kobject_server: dropping request\n");
309 ipc_kmsg_destroy(request
);
314 * Initialize reply message.
317 #define InP ((mach_msg_header_t *) request->ikm_header)
318 #define OutP ((mig_reply_error_t *) reply->ikm_header)
320 OutP
->NDR
= NDR_record
;
321 OutP
->Head
.msgh_size
= sizeof(mig_reply_error_t
);
323 OutP
->Head
.msgh_bits
=
324 MACH_MSGH_BITS(MACH_MSGH_BITS_LOCAL(InP
->msgh_bits
), 0);
325 OutP
->Head
.msgh_remote_port
= InP
->msgh_local_port
;
326 OutP
->Head
.msgh_local_port
= MACH_PORT_NULL
;
327 OutP
->Head
.msgh_id
= InP
->msgh_id
+ 100;
334 * Find the routine to call, and call it
335 * to perform the kernel function
339 (*ptr
->routine
)(request
->ikm_header
, reply
->ikm_header
);
340 kernel_task
->messages_received
++;
343 if (!ipc_kobject_notify(request
->ikm_header
, reply
->ikm_header
)){
345 printf("ipc_kobject_server: bogus kernel message, id=%d\n",
346 request
->ikm_header
->msgh_id
);
347 #endif /* MACH_IPC_TEST */
348 _MIG_MSGID_INVALID(request
->ikm_header
->msgh_id
);
350 ((mig_reply_error_t
*) reply
->ikm_header
)->RetCode
354 kernel_task
->messages_received
++;
356 kernel_task
->messages_sent
++;
360 * Destroy destination. The following code differs from
361 * ipc_object_destroy in that we release the send-once
362 * right instead of generating a send-once notification
363 * (which would bring us here again, creating a loop).
364 * It also differs in that we only expect send or
365 * send-once rights, never receive rights.
367 * We set msgh_remote_port to IP_NULL so that the kmsg
368 * destroy routines don't try to destroy the port twice.
370 destp
= (ipc_port_t
*) &request
->ikm_header
->msgh_remote_port
;
371 switch (MACH_MSGH_BITS_REMOTE(request
->ikm_header
->msgh_bits
)) {
372 case MACH_MSG_TYPE_PORT_SEND
:
373 ipc_port_release_send(*destp
);
376 case MACH_MSG_TYPE_PORT_SEND_ONCE
:
377 ipc_port_release_sonce(*destp
);
381 panic("ipc_kobject_server: strange destination rights");
385 if (!(reply
->ikm_header
->msgh_bits
& MACH_MSGH_BITS_COMPLEX
) &&
386 ((mig_reply_error_t
*) reply
->ikm_header
)->RetCode
!= KERN_SUCCESS
)
387 kr
= ((mig_reply_error_t
*) reply
->ikm_header
)->RetCode
;
391 if ((kr
== KERN_SUCCESS
) || (kr
== MIG_NO_REPLY
)) {
393 * The server function is responsible for the contents
394 * of the message. The reply port right is moved
395 * to the reply message, and we have deallocated
396 * the destination port right, so we just need
399 ipc_kmsg_free(request
);
403 * The message contents of the request are intact.
404 * Destroy everthing except the reply port right,
405 * which is needed in the reply message.
407 request
->ikm_header
->msgh_local_port
= MACH_PORT_NULL
;
408 ipc_kmsg_destroy(request
);
411 if (kr
== MIG_NO_REPLY
) {
413 * The server function will send a reply message
414 * using the reply port right, which it has saved.
417 ipc_kmsg_free(reply
);
420 } else if (!IP_VALID((ipc_port_t
)reply
->ikm_header
->msgh_remote_port
)) {
422 * Can't queue the reply message if the destination
423 * (the reply port) isn't valid.
426 ipc_kmsg_destroy(reply
);
431 trailer
= (mach_msg_format_0_trailer_t
*)
432 ((vm_offset_t
)reply
->ikm_header
+ (int)reply
->ikm_header
->msgh_size
);
434 trailer
->msgh_sender
= KERNEL_SECURITY_TOKEN
;
435 trailer
->msgh_trailer_type
= MACH_MSG_TRAILER_FORMAT_0
;
436 trailer
->msgh_trailer_size
= MACH_MSG_TRAILER_MINIMUM_SIZE
;
442 * Routine: ipc_kobject_set
444 * Make a port represent a kernel object of the given type.
445 * The caller is responsible for handling refs for the
446 * kernel object, if necessary.
448 * Nothing locked. The port must be active if setting
449 * a kobject linkage. Clearing a linkage is OK on an
455 ipc_kobject_t kobject
,
456 ipc_kobject_type_t type
)
459 ipc_kobject_set_atomically(port
, kobject
, type
);
462 mac_port_label_update_kobject (&port
->ip_label
, type
);
469 ipc_kobject_set_atomically(
471 ipc_kobject_t kobject
,
472 ipc_kobject_type_t type
)
474 assert(type
== IKOT_NONE
|| ip_active(port
));
476 port
->ip_spares
[2] = (port
->ip_bits
& IO_BITS_KOTYPE
);
477 #endif /* MACH_ASSERT */
478 port
->ip_bits
= (port
->ip_bits
&~ IO_BITS_KOTYPE
) | type
;
479 port
->ip_kobject
= kobject
;
483 * Routine: ipc_kobject_destroy
485 * Release any kernel object resources associated
486 * with the port, which is being destroyed.
488 * This should only be needed when resources are
489 * associated with a user's port. In the normal case,
490 * when the kernel is the receiver, the code calling
491 * ipc_port_dealloc_kernel should clean up the resources.
493 * The port is not locked, but it is dead.
500 switch (ip_kotype(port
)) {
503 mk_timer_port_destroy(port
);
506 case IKOT_NAMED_ENTRY
:
507 mach_destroy_memory_entry(port
);
510 case IKOT_HOST_NOTIFY
:
511 host_notify_port_destroy(port
);
516 labelh_destroy(port
);
528 mach_msg_header_t
*request_header
,
529 mach_msg_header_t
*reply_header
)
531 ipc_port_t port
= (ipc_port_t
) request_header
->msgh_remote_port
;
533 ((mig_reply_error_t
*) reply_header
)->RetCode
= MIG_NO_REPLY
;
534 switch (request_header
->msgh_id
) {
535 case MACH_NOTIFY_NO_SENDERS
:
536 if(ip_kotype(port
) == IKOT_NAMED_ENTRY
) {
540 * Bring the sequence number and mscount in
541 * line with ipc_port_destroy assertion.
543 port
->ip_mscount
= 0;
544 port
->ip_messages
.imq_seqno
= 0;
545 ipc_port_destroy(port
); /* releases lock */
548 if (ip_kotype(port
) == IKOT_UPL
) {
550 request_header
->msgh_remote_port
,
551 (mach_port_mscount_t
)
552 ((mach_no_senders_notification_t
*)
553 request_header
)->not_count
);
554 reply_header
->msgh_remote_port
= MACH_PORT_NULL
;
558 if (ip_kotype(port
) == IKOT_AU_SESSIONPORT
) {
559 audit_session_nosenders(request_header
);
563 if (ip_kotype(port
) == IKOT_FILEPORT
) {
564 fileport_notify(request_header
);
570 case MACH_NOTIFY_PORT_DELETED
:
571 case MACH_NOTIFY_PORT_DESTROYED
:
572 case MACH_NOTIFY_SEND_ONCE
:
573 case MACH_NOTIFY_DEAD_NAME
:
579 switch (ip_kotype(port
)) {
582 case IKOT_IOKIT_OBJECT
:
583 case IKOT_IOKIT_CONNECT
:
584 case IKOT_IOKIT_SPARE
:
586 return iokit_notify(request_header
);
596 #include <mach_kdb.h>
597 #if MACH_COUNTERS && MACH_KDB
599 #include <ddb/db_output.h>
600 #include <ddb/db_sym.h>
602 #define printf kdbprintf
604 extern void kobjserver_stats(void);
605 extern void bucket_stats_print(mig_hash_t
*bucket
);
607 extern void kobjserver_stats_clear(void);
611 kobjserver_stats_clear(void)
614 for (i
= 0; i
< MAX_MIG_ENTRIES
; i
++) {
615 mig_buckets
[i
].callcount
= 0;
620 kobjserver_stats(void)
622 register unsigned int i
, n
= sizeof(mig_e
)/sizeof(struct mig_subsystem
);
623 register unsigned int howmany
;
624 register mach_msg_id_t j
, pos
, nentry
, range
;
626 db_printf("Kobject server call counts:\n");
627 for (i
= 0; i
< n
; i
++) {
629 db_printsym((vm_offset_t
)mig_e
[i
], DB_STGY_ANY
);
631 range
= mig_e
[i
]->end
- mig_e
[i
]->start
;
632 if (!mig_e
[i
]->start
|| range
< 0) continue;
634 for (j
= 0; j
< range
; j
++) {
635 nentry
= j
+ mig_e
[i
]->start
;
636 for (pos
= MIG_HASH(nentry
) % MAX_MIG_ENTRIES
, howmany
= 1;
637 mig_buckets
[pos
].num
;
638 pos
++, pos
= pos
% MAX_MIG_ENTRIES
, howmany
++) {
639 if (mig_buckets
[pos
].num
== nentry
)
640 bucket_stats_print(&mig_buckets
[pos
]);
647 bucket_stats_print(mig_hash_t
*bucket
)
649 if (bucket
->callcount
) {
651 db_printsym((vm_offset_t
)bucket
->routine
, DB_STGY_ANY
);
652 db_printf(" (%d):\t%d\n", bucket
->num
, bucket
->callcount
);
657 #endif /* MACH_COUNTERS && MACH_KDB */