kernel: fix sanity check
[minix.git] / kernel / priv.h
blobf053c3b5902db0bb622ad62861f3f2ecfeb60498
1 #ifndef PRIV_H
2 #define PRIV_H
4 /* Declaration of the system privileges structure. It defines flags, system
5 * call masks, an synchronous alarm timer, I/O privileges, pending hardware
6 * interrupts and notifications, and so on.
7 * System processes each get their own structure with properties, whereas all
8 * user processes share one structure. This setup provides a clear separation
9 * between common and privileged process fields and is very space efficient.
11 * Changes:
12 * Nov 22, 2009 rewrite of privilege management (Cristiano Giuffrida)
13 * Jul 01, 2005 Created. (Jorrit N. Herder)
15 #include <minix/com.h>
16 #include <minix/const.h>
17 #include <minix/priv.h>
18 #include "kernel/const.h"
19 #include "kernel/type.h"
21 struct priv {
22 proc_nr_t s_proc_nr; /* number of associated process */
23 sys_id_t s_id; /* index of this system structure */
24 short s_flags; /* PREEMTIBLE, BILLABLE, etc. */
26 /* Asynchronous sends */
27 vir_bytes s_asyntab; /* addr. of table in process' address space */
28 size_t s_asynsize; /* number of elements in table. 0 when not in
29 * use
32 short s_trap_mask; /* allowed system call traps */
33 sys_map_t s_ipc_to; /* allowed destination processes */
35 /* allowed kernel calls */
36 bitchunk_t s_k_call_mask[SYS_CALL_MASK_SIZE];
38 endpoint_t s_sig_mgr; /* signal manager for system signals */
39 endpoint_t s_bak_sig_mgr; /* backup signal manager for system signals */
40 sys_map_t s_notify_pending; /* bit map with pending notifications */
41 sys_map_t s_asyn_pending; /* bit map with pending asyn messages */
42 irq_id_t s_int_pending; /* pending hardware interrupts */
43 sigset_t s_sig_pending; /* pending signals */
45 timer_t s_alarm_timer; /* synchronous alarm timer */
46 reg_t *s_stack_guard; /* stack guard word for kernel tasks */
48 int s_nr_io_range; /* allowed I/O ports */
49 struct io_range s_io_tab[NR_IO_RANGE];
51 int s_nr_mem_range; /* allowed memory ranges */
52 struct minix_mem_range s_mem_tab[NR_MEM_RANGE];
54 int s_nr_irq; /* allowed IRQ lines */
55 int s_irq_tab[NR_IRQ];
56 vir_bytes s_grant_table; /* grant table address of process, or 0 */
57 int s_grant_entries; /* no. of entries, or 0 */
60 /* Guard word for task stacks. */
61 #define STACK_GUARD ((reg_t) (sizeof(reg_t) == 2 ? 0xBEEF : 0xDEADBEEF))
63 /* Magic system structure table addresses. */
64 #define BEG_PRIV_ADDR (&priv[0])
65 #define END_PRIV_ADDR (&priv[NR_SYS_PROCS])
66 #define BEG_STATIC_PRIV_ADDR BEG_PRIV_ADDR
67 #define END_STATIC_PRIV_ADDR (BEG_STATIC_PRIV_ADDR + NR_STATIC_PRIV_IDS)
68 #define BEG_DYN_PRIV_ADDR END_STATIC_PRIV_ADDR
69 #define END_DYN_PRIV_ADDR END_PRIV_ADDR
71 #define priv_addr(i) (ppriv_addr)[(i)]
72 #define priv_id(rp) ((rp)->p_priv->s_id)
73 #define priv(rp) ((rp)->p_priv)
75 #define id_to_nr(id) priv_addr(id)->s_proc_nr
76 #define nr_to_id(nr) priv(proc_addr(nr))->s_id
78 #define may_send_to(rp, nr) (get_sys_bit(priv(rp)->s_ipc_to, nr_to_id(nr)))
80 /* The system structures table and pointers to individual table slots. The
81 * pointers allow faster access because now a process entry can be found by
82 * indexing the psys_addr array, while accessing an element i requires a
83 * multiplication with sizeof(struct sys) to determine the address.
85 EXTERN struct priv priv[NR_SYS_PROCS]; /* system properties table */
86 EXTERN struct priv *ppriv_addr[NR_SYS_PROCS]; /* direct slot pointers */
88 /* Make sure the system can boot. The following sanity check verifies that
89 * the system privileges table is large enough for the number of processes
90 * in the boot image.
92 #if (NR_BOOT_PROCS > NR_SYS_PROCS)
93 #error NR_SYS_PROCS must be larger than NR_BOOT_PROCS
94 #endif
96 #endif /* PRIV_H */