]> git.saurik.com Git - apple/xnu.git/blob - osfmk/kern/ipc_host.c
xnu-1504.7.4.tar.gz
[apple/xnu.git] / osfmk / kern / ipc_host.c
1 /*
2 * Copyright (c) 2000-2009 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28 /*
29 * @OSF_COPYRIGHT@
30 */
31 /*
32 * Mach Operating System
33 * Copyright (c) 1991,1990,1989,1988 Carnegie Mellon University
34 * All Rights Reserved.
35 *
36 * Permission to use, copy, modify and distribute this software and its
37 * documentation is hereby granted, provided that both the copyright
38 * notice and this permission notice appear in all copies of the
39 * software, derivative works or modified versions, and any portions
40 * thereof, and that both notices appear in supporting documentation.
41 *
42 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
43 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
44 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
45 *
46 * Carnegie Mellon requests users of this software to return to
47 *
48 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
49 * School of Computer Science
50 * Carnegie Mellon University
51 * Pittsburgh PA 15213-3890
52 *
53 * any improvements or extensions that they make and grant Carnegie Mellon
54 * the rights to redistribute these changes.
55 */
56 /*
57 */
58
59 /*
60 * kern/ipc_host.c
61 *
62 * Routines to implement host ports.
63 */
64 #include <mach/message.h>
65 #include <mach/mach_traps.h>
66 #include <mach/mach_host_server.h>
67 #include <mach/host_priv_server.h>
68 #include <kern/host.h>
69 #include <kern/processor.h>
70 #include <kern/lock.h>
71 #include <kern/task.h>
72 #include <kern/thread.h>
73 #include <kern/ipc_host.h>
74 #include <kern/ipc_kobject.h>
75 #include <kern/misc_protos.h>
76 #include <kern/spl.h>
77 #include <ipc/ipc_port.h>
78 #include <ipc/ipc_space.h>
79
80 /*
81 * Forward declarations
82 */
83
84 boolean_t
85 ref_pset_port_locked(
86 ipc_port_t port, boolean_t matchn, processor_set_t *ppset);
87
88 /*
89 * ipc_host_init: set up various things.
90 */
91
92 extern lck_grp_t host_notify_lock_grp;
93 extern lck_attr_t host_notify_lock_attr;
94
95 void ipc_host_init(void)
96 {
97 ipc_port_t port;
98 int i;
99
100 lck_mtx_init(&realhost.lock, &host_notify_lock_grp, &host_notify_lock_attr);
101
102 /*
103 * Allocate and set up the two host ports.
104 */
105 port = ipc_port_alloc_kernel();
106 if (port == IP_NULL)
107 panic("ipc_host_init");
108
109 ipc_kobject_set(port, (ipc_kobject_t) &realhost, IKOT_HOST_SECURITY);
110 kernel_set_special_port(&realhost, HOST_SECURITY_PORT,
111 ipc_port_make_send(port));
112
113 port = ipc_port_alloc_kernel();
114 if (port == IP_NULL)
115 panic("ipc_host_init");
116
117 ipc_kobject_set(port, (ipc_kobject_t) &realhost, IKOT_HOST);
118 kernel_set_special_port(&realhost, HOST_PORT,
119 ipc_port_make_send(port));
120
121 port = ipc_port_alloc_kernel();
122 if (port == IP_NULL)
123 panic("ipc_host_init");
124
125 ipc_kobject_set(port, (ipc_kobject_t) &realhost, IKOT_HOST_PRIV);
126 kernel_set_special_port(&realhost, HOST_PRIV_PORT,
127 ipc_port_make_send(port));
128
129 /* the rest of the special ports will be set up later */
130
131 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++) {
132 realhost.exc_actions[i].port = IP_NULL;
133 }/* for */
134
135 /*
136 * Set up ipc for default processor set.
137 */
138 ipc_pset_init(&pset0);
139 ipc_pset_enable(&pset0);
140
141 /*
142 * And for master processor
143 */
144 ipc_processor_init(master_processor);
145 ipc_processor_enable(master_processor);
146 }
147
148 /*
149 * Routine: host_self_trap [mach trap]
150 * Purpose:
151 * Give the caller send rights for his own host port.
152 * Conditions:
153 * Nothing locked.
154 * Returns:
155 * MACH_PORT_NULL if there are any resource failures
156 * or other errors.
157 */
158
159 mach_port_name_t
160 host_self_trap(
161 __unused struct host_self_trap_args *args)
162 {
163 ipc_port_t sright;
164 mach_port_name_t name;
165
166 sright = ipc_port_copy_send(current_task()->itk_host);
167 name = ipc_port_copyout_send(sright, current_space());
168 return name;
169 }
170
171 /*
172 * ipc_processor_init:
173 *
174 * Initialize ipc access to processor by allocating port.
175 */
176
177 void
178 ipc_processor_init(
179 processor_t processor)
180 {
181 ipc_port_t port;
182
183 port = ipc_port_alloc_kernel();
184 if (port == IP_NULL)
185 panic("ipc_processor_init");
186 processor->processor_self = port;
187 }
188
189 /*
190 * ipc_processor_enable:
191 *
192 * Enable ipc control of processor by setting port object.
193 */
194 void
195 ipc_processor_enable(
196 processor_t processor)
197 {
198 ipc_port_t myport;
199
200 myport = processor->processor_self;
201 ipc_kobject_set(myport, (ipc_kobject_t) processor, IKOT_PROCESSOR);
202 }
203
204 /*
205 * ipc_pset_init:
206 *
207 * Initialize ipc control of a processor set by allocating its ports.
208 */
209
210 void
211 ipc_pset_init(
212 processor_set_t pset)
213 {
214 ipc_port_t port;
215
216 port = ipc_port_alloc_kernel();
217 if (port == IP_NULL)
218 panic("ipc_pset_init");
219 pset->pset_self = port;
220
221 port = ipc_port_alloc_kernel();
222 if (port == IP_NULL)
223 panic("ipc_pset_init");
224 pset->pset_name_self = port;
225 }
226
227 /*
228 * ipc_pset_enable:
229 *
230 * Enable ipc access to a processor set.
231 */
232 void
233 ipc_pset_enable(
234 processor_set_t pset)
235 {
236 ipc_kobject_set(pset->pset_self, (ipc_kobject_t) pset, IKOT_PSET);
237 ipc_kobject_set(pset->pset_name_self, (ipc_kobject_t) pset, IKOT_PSET_NAME);
238 }
239
240 /*
241 * processor_set_default:
242 *
243 * Return ports for manipulating default_processor set.
244 */
245 kern_return_t
246 processor_set_default(
247 host_t host,
248 processor_set_t *pset)
249 {
250 if (host == HOST_NULL)
251 return(KERN_INVALID_ARGUMENT);
252
253 *pset = &pset0;
254
255 return (KERN_SUCCESS);
256 }
257
258 /*
259 * Routine: convert_port_to_host
260 * Purpose:
261 * Convert from a port to a host.
262 * Doesn't consume the port ref; the host produced may be null.
263 * Conditions:
264 * Nothing locked.
265 */
266
267 host_t
268 convert_port_to_host(
269 ipc_port_t port)
270 {
271 host_t host = HOST_NULL;
272
273 if (IP_VALID(port)) {
274 ip_lock(port);
275 if (ip_active(port) &&
276 ((ip_kotype(port) == IKOT_HOST) ||
277 (ip_kotype(port) == IKOT_HOST_PRIV)
278 ))
279 host = (host_t) port->ip_kobject;
280 ip_unlock(port);
281 }
282
283 return host;
284 }
285
286 /*
287 * Routine: convert_port_to_host_priv
288 * Purpose:
289 * Convert from a port to a host.
290 * Doesn't consume the port ref; the host produced may be null.
291 * Conditions:
292 * Nothing locked.
293 */
294
295 host_t
296 convert_port_to_host_priv(
297 ipc_port_t port)
298 {
299 host_t host = HOST_NULL;
300
301 if (IP_VALID(port)) {
302 ip_lock(port);
303 if (ip_active(port) &&
304 (ip_kotype(port) == IKOT_HOST_PRIV))
305 host = (host_t) port->ip_kobject;
306 ip_unlock(port);
307 }
308
309 return host;
310 }
311
312 /*
313 * Routine: convert_port_to_processor
314 * Purpose:
315 * Convert from a port to a processor.
316 * Doesn't consume the port ref;
317 * the processor produced may be null.
318 * Conditions:
319 * Nothing locked.
320 */
321
322 processor_t
323 convert_port_to_processor(
324 ipc_port_t port)
325 {
326 processor_t processor = PROCESSOR_NULL;
327
328 if (IP_VALID(port)) {
329 ip_lock(port);
330 if (ip_active(port) &&
331 (ip_kotype(port) == IKOT_PROCESSOR))
332 processor = (processor_t) port->ip_kobject;
333 ip_unlock(port);
334 }
335
336 return processor;
337 }
338
339 /*
340 * Routine: convert_port_to_pset
341 * Purpose:
342 * Convert from a port to a pset.
343 * Doesn't consume the port ref; produces a pset ref,
344 * which may be null.
345 * Conditions:
346 * Nothing locked.
347 */
348
349 processor_set_t
350 convert_port_to_pset(
351 ipc_port_t port)
352 {
353 boolean_t r;
354 processor_set_t pset = PROCESSOR_SET_NULL;
355
356 r = FALSE;
357 while (!r && IP_VALID(port)) {
358 ip_lock(port);
359 r = ref_pset_port_locked(port, FALSE, &pset);
360 /* port unlocked */
361 }
362 return pset;
363 }
364
365 /*
366 * Routine: convert_port_to_pset_name
367 * Purpose:
368 * Convert from a port to a pset.
369 * Doesn't consume the port ref; produces a pset ref,
370 * which may be null.
371 * Conditions:
372 * Nothing locked.
373 */
374
375 processor_set_name_t
376 convert_port_to_pset_name(
377 ipc_port_t port)
378 {
379 boolean_t r;
380 processor_set_t pset = PROCESSOR_SET_NULL;
381
382 r = FALSE;
383 while (!r && IP_VALID(port)) {
384 ip_lock(port);
385 r = ref_pset_port_locked(port, TRUE, &pset);
386 /* port unlocked */
387 }
388 return pset;
389 }
390
391 boolean_t
392 ref_pset_port_locked(ipc_port_t port, boolean_t matchn, processor_set_t *ppset)
393 {
394 processor_set_t pset;
395
396 pset = PROCESSOR_SET_NULL;
397 if (ip_active(port) &&
398 ((ip_kotype(port) == IKOT_PSET) ||
399 (matchn && (ip_kotype(port) == IKOT_PSET_NAME)))) {
400 pset = (processor_set_t) port->ip_kobject;
401 }
402
403 *ppset = pset;
404 ip_unlock(port);
405
406 return (TRUE);
407 }
408
409 /*
410 * Routine: convert_host_to_port
411 * Purpose:
412 * Convert from a host to a port.
413 * Produces a naked send right which may be invalid.
414 * Conditions:
415 * Nothing locked.
416 */
417
418 ipc_port_t
419 convert_host_to_port(
420 host_t host)
421 {
422 ipc_port_t port;
423
424 host_get_host_port(host, &port);
425 return port;
426 }
427
428 /*
429 * Routine: convert_processor_to_port
430 * Purpose:
431 * Convert from a processor to a port.
432 * Produces a naked send right which may be invalid.
433 * Processors are not reference counted, so nothing to release.
434 * Conditions:
435 * Nothing locked.
436 */
437
438 ipc_port_t
439 convert_processor_to_port(
440 processor_t processor)
441 {
442 ipc_port_t port = processor->processor_self;
443
444 if (port != IP_NULL)
445 port = ipc_port_make_send(port);
446 return port;
447 }
448
449 /*
450 * Routine: convert_pset_to_port
451 * Purpose:
452 * Convert from a pset to a port.
453 * Produces a naked send right which may be invalid.
454 * Processor sets are not reference counted, so nothing to release.
455 * Conditions:
456 * Nothing locked.
457 */
458
459 ipc_port_t
460 convert_pset_to_port(
461 processor_set_t pset)
462 {
463 ipc_port_t port = pset->pset_self;
464
465 if (port != IP_NULL)
466 port = ipc_port_make_send(port);
467
468 return port;
469 }
470
471 /*
472 * Routine: convert_pset_name_to_port
473 * Purpose:
474 * Convert from a pset to a port.
475 * Produces a naked send right which may be invalid.
476 * Processor sets are not reference counted, so nothing to release.
477 * Conditions:
478 * Nothing locked.
479 */
480
481 ipc_port_t
482 convert_pset_name_to_port(
483 processor_set_name_t pset)
484 {
485 ipc_port_t port = pset->pset_name_self;
486
487 if (port != IP_NULL)
488 port = ipc_port_make_send(port);
489
490 return port;
491 }
492
493 /*
494 * Routine: convert_port_to_host_security
495 * Purpose:
496 * Convert from a port to a host security.
497 * Doesn't consume the port ref; the port produced may be null.
498 * Conditions:
499 * Nothing locked.
500 */
501
502 host_t
503 convert_port_to_host_security(
504 ipc_port_t port)
505 {
506 host_t host = HOST_NULL;
507
508 if (IP_VALID(port)) {
509 ip_lock(port);
510 if (ip_active(port) &&
511 (ip_kotype(port) == IKOT_HOST_SECURITY))
512 host = (host_t) port->ip_kobject;
513 ip_unlock(port);
514 }
515
516 return host;
517 }
518
519 /*
520 * Routine: host_set_exception_ports [kernel call]
521 * Purpose:
522 * Sets the host exception port, flavor and
523 * behavior for the exception types specified by the mask.
524 * There will be one send right per exception per valid
525 * port.
526 * Conditions:
527 * Nothing locked. If successful, consumes
528 * the supplied send right.
529 * Returns:
530 * KERN_SUCCESS Changed the special port.
531 * KERN_INVALID_ARGUMENT The host_priv is not valid,
532 * Illegal mask bit set.
533 * Illegal exception behavior
534 */
535 kern_return_t
536 host_set_exception_ports(
537 host_priv_t host_priv,
538 exception_mask_t exception_mask,
539 ipc_port_t new_port,
540 exception_behavior_t new_behavior,
541 thread_state_flavor_t new_flavor)
542 {
543 register int i;
544 ipc_port_t old_port[EXC_TYPES_COUNT];
545
546 if (host_priv == HOST_PRIV_NULL) {
547 return KERN_INVALID_ARGUMENT;
548 }
549
550 assert(host_priv == &realhost);
551
552 if (exception_mask & ~EXC_MASK_VALID) {
553 return KERN_INVALID_ARGUMENT;
554 }
555
556 if (IP_VALID(new_port)) {
557 switch (new_behavior & ~MACH_EXCEPTION_CODES) {
558 case EXCEPTION_DEFAULT:
559 case EXCEPTION_STATE:
560 case EXCEPTION_STATE_IDENTITY:
561 break;
562 default:
563 return KERN_INVALID_ARGUMENT;
564 }
565 }
566 /* Cannot easily check "new_flavor", but that just means that
567 * the flavor in the generated exception message might be garbage:
568 * GIGO
569 */
570 host_lock(host_priv);
571
572 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++) {
573 if (exception_mask & (1 << i)) {
574 old_port[i] = host_priv->exc_actions[i].port;
575 host_priv->exc_actions[i].port =
576 ipc_port_copy_send(new_port);
577 host_priv->exc_actions[i].behavior = new_behavior;
578 host_priv->exc_actions[i].flavor = new_flavor;
579 } else
580 old_port[i] = IP_NULL;
581 }/* for */
582
583 /*
584 * Consume send rights without any lock held.
585 */
586 host_unlock(host_priv);
587 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++)
588 if (IP_VALID(old_port[i]))
589 ipc_port_release_send(old_port[i]);
590 if (IP_VALID(new_port)) /* consume send right */
591 ipc_port_release_send(new_port);
592
593 return KERN_SUCCESS;
594 }
595
596 /*
597 * Routine: host_get_exception_ports [kernel call]
598 * Purpose:
599 * Clones a send right for each of the host's exception
600 * ports specified in the mask and returns the behaviour
601 * and flavor of said port.
602 *
603 * Returns upto [in} CountCnt elements.
604 *
605 * Conditions:
606 * Nothing locked.
607 * Returns:
608 * KERN_SUCCESS Extracted a send right.
609 * KERN_INVALID_ARGUMENT Invalid host_priv specified,
610 * Invalid special port,
611 * Illegal mask bit set.
612 * KERN_FAILURE The thread is dead.
613 */
614 kern_return_t
615 host_get_exception_ports(
616 host_priv_t host_priv,
617 exception_mask_t exception_mask,
618 exception_mask_array_t masks,
619 mach_msg_type_number_t * CountCnt,
620 exception_port_array_t ports,
621 exception_behavior_array_t behaviors,
622 thread_state_flavor_array_t flavors )
623 {
624 unsigned int i, j, count;
625
626 if (host_priv == HOST_PRIV_NULL)
627 return KERN_INVALID_ARGUMENT;
628
629 if (exception_mask & ~EXC_MASK_VALID) {
630 return KERN_INVALID_ARGUMENT;
631 }
632
633 assert (host_priv == &realhost);
634
635 host_lock(host_priv);
636
637 count = 0;
638
639 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++) {
640 if (exception_mask & (1 << i)) {
641 for (j = 0; j < count; j++) {
642 /*
643 * search for an identical entry, if found
644 * set corresponding mask for this exception.
645 */
646 if (host_priv->exc_actions[i].port == ports[j] &&
647 host_priv->exc_actions[i].behavior == behaviors[j]
648 && host_priv->exc_actions[i].flavor == flavors[j])
649 {
650 masks[j] |= (1 << i);
651 break;
652 }
653 }/* for */
654 if (j == count) {
655 masks[j] = (1 << i);
656 ports[j] =
657 ipc_port_copy_send(host_priv->exc_actions[i].port);
658 behaviors[j] = host_priv->exc_actions[i].behavior;
659 flavors[j] = host_priv->exc_actions[i].flavor;
660 count++;
661 if (count > *CountCnt) {
662 break;
663 }
664 }
665 }
666 }/* for */
667 host_unlock(host_priv);
668
669 *CountCnt = count;
670 return KERN_SUCCESS;
671 }
672
673 kern_return_t
674 host_swap_exception_ports(
675 host_priv_t host_priv,
676 exception_mask_t exception_mask,
677 ipc_port_t new_port,
678 exception_behavior_t new_behavior,
679 thread_state_flavor_t new_flavor,
680 exception_mask_array_t masks,
681 mach_msg_type_number_t * CountCnt,
682 exception_port_array_t ports,
683 exception_behavior_array_t behaviors,
684 thread_state_flavor_array_t flavors )
685 {
686 unsigned int i,
687 j,
688 count;
689 ipc_port_t old_port[EXC_TYPES_COUNT];
690
691 if (host_priv == HOST_PRIV_NULL)
692 return KERN_INVALID_ARGUMENT;
693
694 if (exception_mask & ~EXC_MASK_VALID) {
695 return KERN_INVALID_ARGUMENT;
696 }
697
698 if (IP_VALID(new_port)) {
699 switch (new_behavior) {
700 case EXCEPTION_DEFAULT:
701 case EXCEPTION_STATE:
702 case EXCEPTION_STATE_IDENTITY:
703 break;
704 default:
705 return KERN_INVALID_ARGUMENT;
706 }
707 }
708 /* Cannot easily check "new_flavor", but that just means that
709 * the flavor in the generated exception message might be garbage:
710 * GIGO */
711
712 host_lock(host_priv);
713
714 count = 0;
715
716 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++) {
717 if (exception_mask & (1 << i)) {
718 for (j = 0; j < count; j++) {
719 /*
720 * search for an identical entry, if found
721 * set corresponding mask for this exception.
722 */
723 if (host_priv->exc_actions[i].port == ports[j] &&
724 host_priv->exc_actions[i].behavior == behaviors[j]
725 && host_priv->exc_actions[i].flavor == flavors[j])
726 {
727 masks[j] |= (1 << i);
728 break;
729 }
730 }/* for */
731 if (j == count) {
732 masks[j] = (1 << i);
733 ports[j] =
734 ipc_port_copy_send(host_priv->exc_actions[i].port);
735 behaviors[j] = host_priv->exc_actions[i].behavior;
736 flavors[j] = host_priv->exc_actions[i].flavor;
737 count++;
738 }
739 old_port[i] = host_priv->exc_actions[i].port;
740 host_priv->exc_actions[i].port =
741 ipc_port_copy_send(new_port);
742 host_priv->exc_actions[i].behavior = new_behavior;
743 host_priv->exc_actions[i].flavor = new_flavor;
744 if (count > *CountCnt) {
745 break;
746 }
747 } else
748 old_port[i] = IP_NULL;
749 }/* for */
750 host_unlock(host_priv);
751
752 /*
753 * Consume send rights without any lock held.
754 */
755 for (i = FIRST_EXCEPTION; i < EXC_TYPES_COUNT; i++)
756 if (IP_VALID(old_port[i]))
757 ipc_port_release_send(old_port[i]);
758 if (IP_VALID(new_port)) /* consume send right */
759 ipc_port_release_send(new_port);
760 *CountCnt = count;
761
762 return KERN_SUCCESS;
763 }