1 /* This file contains a collection of miscellaneous procedures. Some of them
2 * perform simple system calls. Some others do a little part of system calls
3 * that are mostly performed by the Memory Manager.
5 * The entry points into this file are
6 * do_fcntl: perform the FCNTL system call
7 * do_sync: perform the SYNC system call
8 * do_fsync: perform the FSYNC system call
9 * pm_setsid: perform VFS's side of setsid system call
10 * pm_reboot: sync disks and prepare for shutdown
11 * pm_fork: adjust the tables after PM has performed a FORK system call
12 * do_exec: handle files with FD_CLOEXEC on after PM has done an EXEC
13 * do_exit: a process has exited; note that in the tables
14 * do_set: set uid or gid for some process
15 * do_revive: revive a process that was waiting for something (e.g. TTY)
16 * do_svrctl: file system control
17 * do_getsysinfo: request copy of FS data structure
18 * pm_dumpcore: create a core dump
26 #include <minix/callnr.h>
27 #include <minix/safecopies.h>
28 #include <minix/endpoint.h>
29 #include <minix/com.h>
30 #include <minix/sysinfo.h>
31 #include <minix/u64.h>
32 #include <sys/ptrace.h>
33 #include <sys/svrctl.h>
34 #include <sys/resource.h>
36 #include "scratchpad.h"
37 #include <minix/vfsif.h>
41 #define CORE_NAME "core"
42 #define CORE_MODE 0777 /* mode to use on core image files */
44 #if ENABLE_SYSCALL_STATS
45 unsigned long calls_stats
[NR_VFS_CALLS
];
48 static void free_proc(int flags
);
50 /*===========================================================================*
52 *===========================================================================*/
53 int do_getsysinfo(void)
55 vir_bytes src_addr
, dst_addr
;
59 what
= job_m_in
.SI_WHAT
;
60 dst_addr
= (vir_bytes
) job_m_in
.SI_WHERE
;
61 buf_size
= (size_t) job_m_in
.SI_SIZE
;
63 /* Only su may call do_getsysinfo. This call may leak information (and is not
64 * stable enough to be part of the API/ABI). In the future, requests from
65 * non-system processes should be denied.
68 if (!super_user
) return(EPERM
);
72 src_addr
= (vir_bytes
) fproc
;
73 len
= sizeof(struct fproc
) * NR_PROCS
;
76 src_addr
= (vir_bytes
) dmap
;
77 len
= sizeof(struct dmap
) * NR_DEVICES
;
79 #if ENABLE_SYSCALL_STATS
81 src_addr
= (vir_bytes
) calls_stats
;
82 len
= sizeof(calls_stats
);
92 return sys_datacopy(SELF
, src_addr
, who_e
, dst_addr
, len
);
95 /*===========================================================================*
97 *===========================================================================*/
100 /* Perform the fcntl(fd, cmd, ...) system call. */
102 register struct filp
*f
;
103 int new_fd
, fl
, r
= OK
, fcntl_req
, fcntl_argx
;
104 tll_access_t locktype
;
106 scratch(fp
).file
.fd_nr
= job_m_in
.VFS_FCNTL_FD
;
107 scratch(fp
).io
.io_buffer
= job_m_in
.VFS_FCNTL_ARG_PTR
;
108 scratch(fp
).io
.io_nbytes
= job_m_in
.VFS_FCNTL_CMD
;
109 fcntl_req
= job_m_in
.VFS_FCNTL_CMD
;
110 fcntl_argx
= job_m_in
.VFS_FCNTL_ARG_INT
;
112 /* Is the file descriptor valid? */
113 locktype
= (fcntl_req
== F_FREESP
) ? VNODE_WRITE
: VNODE_READ
;
114 if ((f
= get_filp(scratch(fp
).file
.fd_nr
, locktype
)) == NULL
)
119 /* This replaces the old dup() system call. */
120 if (fcntl_argx
< 0 || fcntl_argx
>= OPEN_MAX
) r
= EINVAL
;
121 else if ((r
= get_fd(fp
, fcntl_argx
, 0, &new_fd
, NULL
)) == OK
) {
123 fp
->fp_filp
[new_fd
] = f
;
129 /* Get close-on-exec flag (FD_CLOEXEC in POSIX Table 6-2). */
131 if (FD_ISSET(scratch(fp
).file
.fd_nr
, &fp
->fp_cloexec_set
))
136 /* Set close-on-exec flag (FD_CLOEXEC in POSIX Table 6-2). */
137 if (fcntl_argx
& FD_CLOEXEC
)
138 FD_SET(scratch(fp
).file
.fd_nr
, &fp
->fp_cloexec_set
);
140 FD_CLR(scratch(fp
).file
.fd_nr
, &fp
->fp_cloexec_set
);
144 /* Get file status flags (O_NONBLOCK and O_APPEND). */
145 fl
= f
->filp_flags
& (O_NONBLOCK
| O_APPEND
| O_ACCMODE
);
150 /* Set file status flags (O_NONBLOCK and O_APPEND). */
151 fl
= O_NONBLOCK
| O_APPEND
| O_REOPEN
;
152 f
->filp_flags
= (f
->filp_flags
& ~fl
) | (fcntl_argx
& fl
);
158 /* Set or clear a file lock. */
159 r
= lock_op(f
, fcntl_req
);
164 /* Free a section of a file */
165 off_t start
, end
, offset
;
166 struct flock flock_arg
;
168 /* Check if it's a regular file. */
169 if (!S_ISREG(f
->filp_vno
->v_mode
)) r
= EINVAL
;
170 else if (!(f
->filp_mode
& W_BIT
)) r
= EBADF
;
172 /* Copy flock data from userspace. */
173 r
= sys_datacopy(who_e
, (vir_bytes
) scratch(fp
).io
.io_buffer
,
174 SELF
, (vir_bytes
) &flock_arg
, sizeof(flock_arg
));
179 /* Convert starting offset to signed. */
180 offset
= (off_t
) flock_arg
.l_start
;
182 /* Figure out starting position base. */
183 switch(flock_arg
.l_whence
) {
184 case SEEK_SET
: start
= 0; break;
185 case SEEK_CUR
: start
= f
->filp_pos
; break;
186 case SEEK_END
: start
= f
->filp_vno
->v_size
; break;
191 /* Check for overflow or underflow. */
192 if (offset
> 0 && start
+ offset
< start
) r
= EINVAL
;
193 else if (offset
< 0 && start
+ offset
> start
) r
= EINVAL
;
196 if (start
< 0) r
= EINVAL
;
200 if (flock_arg
.l_len
!= 0) {
201 if (start
>= f
->filp_vno
->v_size
) r
= EINVAL
;
202 else if ((end
= start
+ flock_arg
.l_len
) <= start
) r
= EINVAL
;
203 else if (end
> f
->filp_vno
->v_size
) end
= f
->filp_vno
->v_size
;
209 r
= req_ftrunc(f
->filp_vno
->v_fs_e
, f
->filp_vno
->v_inode_nr
,start
,end
);
211 if (r
== OK
&& flock_arg
.l_len
== 0)
212 f
->filp_vno
->v_size
= start
;
217 /* POSIX: return value other than -1 is flag is set, else -1 */
219 if (f
->filp_flags
& O_NOSIGPIPE
)
224 f
->filp_flags
= (f
->filp_flags
& ~fl
) | (fcntl_argx
& fl
);
234 /*===========================================================================*
236 *===========================================================================*/
242 for (vmp
= &vmnt
[0]; vmp
< &vmnt
[NR_MNTS
]; ++vmp
) {
243 if ((r
= lock_vmnt(vmp
, VMNT_READ
)) != OK
)
245 if (vmp
->m_dev
!= NO_DEV
&& vmp
->m_fs_e
!= NONE
&&
246 vmp
->m_root_node
!= NULL
) {
247 req_sync(vmp
->m_fs_e
);
255 /*===========================================================================*
257 *===========================================================================*/
260 /* Perform the fsync() system call. */
266 scratch(fp
).file
.fd_nr
= job_m_in
.VFS_FSYNC_FD
;
268 if ((rfilp
= get_filp(scratch(fp
).file
.fd_nr
, VNODE_READ
)) == NULL
)
271 dev
= rfilp
->filp_vno
->v_dev
;
274 for (vmp
= &vmnt
[0]; vmp
< &vmnt
[NR_MNTS
]; ++vmp
) {
275 if (vmp
->m_dev
!= dev
) continue;
276 if ((r
= lock_vmnt(vmp
, VMNT_READ
)) != OK
)
278 if (vmp
->m_dev
!= NO_DEV
&& vmp
->m_dev
== dev
&&
279 vmp
->m_fs_e
!= NONE
&& vmp
->m_root_node
!= NULL
) {
281 req_sync(vmp
->m_fs_e
);
289 int dupvm(struct fproc
*rfp
, int pfd
, int *vmfd
, struct filp
**newfilp
)
292 struct filp
*f
= NULL
;
293 struct fproc
*vmf
= fproc_addr(VM_PROC_NR
);
297 if ((f
= get_filp2(rfp
, pfd
, VNODE_READ
)) == NULL
) {
298 printf("VFS dupvm: get_filp2 failed\n");
302 if(!(f
->filp_vno
->v_vmnt
->m_fs_flags
& RES_HASPEEK
)) {
304 #if 0 /* Noisy diagnostic for mmap() by ld.so */
305 printf("VFS dupvm: no peek available\n");
311 assert(f
->filp_vno
->v_vmnt
);
313 if (!S_ISREG(f
->filp_vno
->v_mode
) && !S_ISBLK(f
->filp_vno
->v_mode
)) {
314 printf("VFS: mmap regular/blockdev only; dev 0x%llx ino %llu has mode 0%o\n",
315 f
->filp_vno
->v_dev
, f
->filp_vno
->v_inode_nr
, f
->filp_vno
->v_mode
);
320 /* get free FD in VM */
321 if((result
=get_fd(vmf
, 0, 0, &procfd
, NULL
)) != OK
) {
323 printf("VFS dupvm: getfd failed\n");
330 assert(f
->filp_count
> 0);
331 vmf
->fp_filp
[procfd
] = f
;
338 /*===========================================================================*
340 *===========================================================================*/
343 /* A call that VM does to VFS.
344 * We must reply with the fixed type VM_VFS_REPLY (and put our result info
345 * in the rest of the message) so VM can tell the difference between a
346 * request from VFS and a reply to this call.
348 int req
= job_m_in
.VFS_VMCALL_REQ
;
349 int req_fd
= job_m_in
.VFS_VMCALL_FD
;
350 u32_t req_id
= job_m_in
.VFS_VMCALL_REQID
;
351 endpoint_t ep
= job_m_in
.VFS_VMCALL_ENDPOINT
;
352 u64_t offset
= make64(job_m_in
.VFS_VMCALL_OFFSET_LO
,
353 job_m_in
.VFS_VMCALL_OFFSET_HI
);
354 u32_t length
= job_m_in
.VFS_VMCALL_LENGTH
;
357 struct fproc
*rfp
, *vmf
;
358 struct filp
*f
= NULL
;
361 if(job_m_in
.m_source
!= VM_PROC_NR
)
364 if(isokendpt(ep
, &slot
) != OK
) rfp
= NULL
;
365 else rfp
= &fproc
[slot
];
367 vmf
= fproc_addr(VM_PROC_NR
);
372 case VMVFSREQ_FDLOOKUP
:
376 /* Lookup fd in referenced process. */
379 printf("VFS: why isn't ep %d here?!\n", ep
);
384 if((result
= dupvm(rfp
, req_fd
, &procfd
, &f
)) != OK
) {
385 #if 0 /* Noisy diagnostic for mmap() by ld.so */
386 printf("vfs: dupvm failed\n");
391 if(S_ISBLK(f
->filp_vno
->v_mode
)) {
392 assert(f
->filp_vno
->v_sdev
!= NO_DEV
);
393 job_m_out
.VMV_DEV
= f
->filp_vno
->v_sdev
;
394 job_m_out
.VMV_INO
= VMC_NO_INODE
;
395 job_m_out
.VMV_SIZE_PAGES
= LONG_MAX
;
397 job_m_out
.VMV_DEV
= f
->filp_vno
->v_dev
;
398 job_m_out
.VMV_INO
= f
->filp_vno
->v_inode_nr
;
399 job_m_out
.VMV_SIZE_PAGES
=
400 roundup(f
->filp_vno
->v_size
,
401 PAGE_SIZE
)/PAGE_SIZE
;
404 job_m_out
.VMV_FD
= procfd
;
410 case VMVFSREQ_FDCLOSE
:
412 result
= close_fd(fp
, req_fd
);
414 printf("VFS: VM fd close for fd %d, %d (%d)\n",
415 req_fd
, fp
->fp_endpoint
, result
);
421 result
= actual_lseek(fp
, req_fd
, SEEK_SET
, offset
,
425 result
= actual_read_write_peek(fp
, PEEKING
,
426 req_fd
, NULL
, length
);
432 panic("VFS: bad request code from VM\n");
440 /* fp is VM still. */
442 job_m_out
.VMV_ENDPOINT
= ep
;
443 job_m_out
.VMV_RESULT
= result
;
444 job_m_out
.VMV_REQID
= req_id
;
446 /* Reply asynchronously as VM may not be able to receive
447 * an ipc_sendnb() message.
449 job_m_out
.m_type
= VM_VFS_REPLY
;
450 r
= asynsend3(VM_PROC_NR
, &job_m_out
, 0);
451 if(r
!= OK
) printf("VFS: couldn't asynsend3() to VM\n");
453 /* VFS does not reply any further */
457 /*===========================================================================*
459 *===========================================================================*/
462 /* Perform the VFS side of the reboot call. This call is performed from the PM
467 struct fproc
*rfp
, *pmfp
;
473 /* Do exit processing for all leftover processes and servers, but don't
474 * actually exit them (if they were really gone, PM will tell us about it).
475 * Skip processes that handle parts of the file system; we first need to give
476 * them the chance to unmount (which should be possible as all normal
477 * processes have no open files anymore).
479 /* This is the only place where we allow special modification of "fp". The
480 * reboot procedure should really be implemented as a PM message broadcasted
481 * to all processes, so that each process will be shut down cleanly by a
482 * thread operating on its behalf. Doing everything here is simpler, but it
483 * requires an exception to the strict model of having "fp" be the process
484 * that owns the current worker thread.
486 for (i
= 0; i
< NR_PROCS
; i
++) {
489 /* Don't just free the proc right away, but let it finish what it was
491 if (rfp
!= fp
) lock_proc(rfp
);
492 if (rfp
->fp_endpoint
!= NONE
&& find_vmnt(rfp
->fp_endpoint
) == NULL
) {
493 worker_set_proc(rfp
); /* temporarily fake process context */
495 worker_set_proc(pmfp
); /* restore original process context */
497 if (rfp
!= fp
) unlock_proc(rfp
);
501 unmount_all(0 /* Don't force */);
503 /* Try to exit all processes again including File Servers */
504 for (i
= 0; i
< NR_PROCS
; i
++) {
507 /* Don't just free the proc right away, but let it finish what it was
509 if (rfp
!= fp
) lock_proc(rfp
);
510 if (rfp
->fp_endpoint
!= NONE
) {
511 worker_set_proc(rfp
); /* temporarily fake process context */
513 worker_set_proc(pmfp
); /* restore original process context */
515 if (rfp
!= fp
) unlock_proc(rfp
);
519 unmount_all(1 /* Force */);
521 /* Reply to PM for synchronization */
522 memset(&m_out
, 0, sizeof(m_out
));
524 m_out
.m_type
= VFS_PM_REBOOT_REPLY
;
526 if ((r
= ipc_send(PM_PROC_NR
, &m_out
)) != OK
)
527 panic("pm_reboot: ipc_send failed: %d", r
);
530 /*===========================================================================*
532 *===========================================================================*/
533 void pm_fork(endpoint_t pproc
, endpoint_t cproc
, pid_t cpid
)
535 /* Perform those aspects of the fork() system call that relate to files.
536 * In particular, let the child inherit its parent's file descriptors.
537 * The parent and child parameters tell who forked off whom. The file
538 * system uses the same slot numbers as the kernel. Only PM makes this call.
541 struct fproc
*cp
, *pp
;
542 int i
, parentno
, childno
;
545 /* Check up-to-dateness of fproc. */
546 okendpt(pproc
, &parentno
);
548 /* PM gives child endpoint, which implies process slot information.
549 * Don't call isokendpt, because that will verify if the endpoint
550 * number is correct in fproc, which it won't be.
552 childno
= _ENDPOINT_P(cproc
);
553 if (childno
< 0 || childno
>= NR_PROCS
)
554 panic("VFS: bogus child for forking: %d", cproc
);
555 if (fproc
[childno
].fp_pid
!= PID_FREE
)
556 panic("VFS: forking on top of in-use child: %d", childno
);
558 /* Copy the parent's fproc struct to the child. */
559 /* However, the mutex variables belong to a slot and must stay the same. */
560 c_fp_lock
= fproc
[childno
].fp_lock
;
561 fproc
[childno
] = fproc
[parentno
];
562 fproc
[childno
].fp_lock
= c_fp_lock
;
564 /* Increase the counters in the 'filp' table. */
565 cp
= &fproc
[childno
];
566 pp
= &fproc
[parentno
];
568 for (i
= 0; i
< OPEN_MAX
; i
++)
569 if (cp
->fp_filp
[i
] != NULL
) cp
->fp_filp
[i
]->filp_count
++;
571 /* Fill in new process and endpoint id. */
573 cp
->fp_endpoint
= cproc
;
575 /* A forking process never has an outstanding grant, as it isn't blocking on
577 if (GRANT_VALID(pp
->fp_grant
)) {
578 panic("VFS: fork: pp (endpoint %d) has grant %d\n", pp
->fp_endpoint
,
581 if (GRANT_VALID(cp
->fp_grant
)) {
582 panic("VFS: fork: cp (endpoint %d) has grant %d\n", cp
->fp_endpoint
,
586 /* A child is not a process leader, not being revived, etc. */
587 cp
->fp_flags
= FP_NOFLAGS
;
589 /* Record the fact that both root and working dir have another user. */
590 if (cp
->fp_rd
) dup_vnode(cp
->fp_rd
);
591 if (cp
->fp_wd
) dup_vnode(cp
->fp_wd
);
594 /*===========================================================================*
596 *===========================================================================*/
597 static void free_proc(int flags
)
600 register struct fproc
*rfp
;
601 register struct filp
*rfilp
;
602 register struct vnode
*vp
;
605 if (fp
->fp_endpoint
== NONE
)
606 panic("free_proc: already free");
608 if (fp_is_blocked(fp
))
611 /* Loop on file descriptors, closing any that are open. */
612 for (i
= 0; i
< OPEN_MAX
; i
++) {
613 (void) close_fd(fp
, i
);
616 /* Release root and working directories. */
617 if (fp
->fp_rd
) { put_vnode(fp
->fp_rd
); fp
->fp_rd
= NULL
; }
618 if (fp
->fp_wd
) { put_vnode(fp
->fp_wd
); fp
->fp_wd
= NULL
; }
620 /* The rest of these actions is only done when processes actually exit. */
621 if (!(flags
& FP_EXITING
)) return;
623 fp
->fp_flags
|= FP_EXITING
;
625 /* Check if any process is SUSPENDed on this driver.
626 * If a driver exits, unmap its entries in the dmap table.
627 * (unmapping has to be done after the first step, because the
628 * dmap table is used in the first step.)
630 unsuspend_by_endpt(fp
->fp_endpoint
);
631 dmap_unmap_by_endpt(fp
->fp_endpoint
);
633 worker_stop_by_endpt(fp
->fp_endpoint
); /* Unblock waiting threads */
634 vmnt_unmap_by_endpt(fp
->fp_endpoint
); /* Invalidate open files if this
635 * was an active FS */
637 /* If a session leader exits and it has a controlling tty, then revoke
638 * access to its controlling tty from all other processes using it.
640 if ((fp
->fp_flags
& FP_SESLDR
) && fp
->fp_tty
!= 0) {
642 for (rfp
= &fproc
[0]; rfp
< &fproc
[NR_PROCS
]; rfp
++) {
643 if(rfp
->fp_pid
== PID_FREE
) continue;
644 if (rfp
->fp_tty
== dev
) rfp
->fp_tty
= 0;
646 for (i
= 0; i
< OPEN_MAX
; i
++) {
647 if ((rfilp
= rfp
->fp_filp
[i
]) == NULL
) continue;
648 if (rfilp
->filp_mode
== FILP_CLOSED
) continue;
649 vp
= rfilp
->filp_vno
;
650 if (!S_ISCHR(vp
->v_mode
)) continue;
651 if (vp
->v_sdev
!= dev
) continue;
652 lock_filp(rfilp
, VNODE_READ
);
653 (void) cdev_close(dev
); /* Ignore any errors. */
655 rfilp
->filp_mode
= FILP_CLOSED
;
661 /* Exit done. Mark slot as free. */
662 fp
->fp_endpoint
= NONE
;
663 fp
->fp_pid
= PID_FREE
;
664 fp
->fp_flags
= FP_NOFLAGS
;
667 /*===========================================================================*
669 *===========================================================================*/
672 /* Perform the file system portion of the exit(status) system call.
673 * This function is called from the context of the exiting process.
676 free_proc(FP_EXITING
);
679 /*===========================================================================*
681 *===========================================================================*/
682 void pm_setgid(proc_e
, egid
, rgid
)
687 register struct fproc
*tfp
;
690 okendpt(proc_e
, &slot
);
693 tfp
->fp_effgid
= egid
;
694 tfp
->fp_realgid
= rgid
;
698 /*===========================================================================*
700 *===========================================================================*/
701 void pm_setgroups(proc_e
, ngroups
, groups
)
709 okendpt(proc_e
, &slot
);
711 if (ngroups
* sizeof(gid_t
) > sizeof(rfp
->fp_sgroups
))
712 panic("VFS: pm_setgroups: too much data to copy");
713 if (sys_datacopy(who_e
, (vir_bytes
) groups
, SELF
, (vir_bytes
) rfp
->fp_sgroups
,
714 ngroups
* sizeof(gid_t
)) == OK
) {
715 rfp
->fp_ngroups
= ngroups
;
717 panic("VFS: pm_setgroups: datacopy failed");
721 /*===========================================================================*
723 *===========================================================================*/
724 void pm_setuid(proc_e
, euid
, ruid
)
732 okendpt(proc_e
, &slot
);
735 tfp
->fp_effuid
= euid
;
736 tfp
->fp_realuid
= ruid
;
739 /*===========================================================================*
741 *===========================================================================*/
742 void pm_setsid(endpoint_t proc_e
)
744 /* Perform the VFS side of the SETSID call, i.e. get rid of the controlling
745 * terminal of a process, and make the process a session leader.
750 /* Make the process a session leader with no controlling tty. */
751 okendpt(proc_e
, &slot
);
753 rfp
->fp_flags
|= FP_SESLDR
;
757 /*===========================================================================*
759 *===========================================================================*/
765 svrctl
= job_m_in
.SVRCTL_REQ
;
766 ptr
= (vir_bytes
) job_m_in
.SVRCTL_ARG
;
767 if (((svrctl
>> 8) & 0xFF) != 'M') return(EINVAL
);
773 struct sysgetenv sysgetenv
;
778 /* Copy sysgetenv structure to VFS */
779 if (sys_datacopy(who_e
, ptr
, SELF
, (vir_bytes
) &sysgetenv
,
780 sizeof(sysgetenv
)) != OK
)
783 /* Basic sanity checking */
784 if (svrctl
== VFSSETPARAM
) {
785 if (sysgetenv
.keylen
<= 0 ||
786 sysgetenv
.keylen
> (sizeof(search_key
) - 1) ||
787 sysgetenv
.vallen
<= 0 ||
788 sysgetenv
.vallen
>= sizeof(val
)) {
793 /* Copy parameter "key" */
794 if ((s
= sys_datacopy(who_e
, (vir_bytes
) sysgetenv
.key
,
795 SELF
, (vir_bytes
) search_key
,
796 sysgetenv
.keylen
)) != OK
)
798 search_key
[sysgetenv
.keylen
] = '\0'; /* Limit string */
800 /* Is it a parameter we know? */
801 if (svrctl
== VFSSETPARAM
) {
802 if (!strcmp(search_key
, "verbose")) {
804 if ((s
= sys_datacopy(who_e
,
805 (vir_bytes
) sysgetenv
.val
, SELF
,
806 (vir_bytes
) &val
, sysgetenv
.vallen
)) != OK
)
808 val
[sysgetenv
.vallen
] = '\0'; /* Limit string */
809 verbose_val
= atoi(val
);
810 if (verbose_val
< 0 || verbose_val
> 4) {
813 verbose
= verbose_val
;
818 } else { /* VFSGETPARAM */
822 if (!strcmp(search_key
, "print_traces")) {
823 mthread_stacktraces();
825 sysgetenv
.vallen
= 0;
827 } else if (!strcmp(search_key
, "active_threads")) {
828 int active
= NR_WTHREADS
- worker_available();
829 snprintf(small_buf
, sizeof(small_buf
) - 1,
831 sysgetenv
.vallen
= strlen(small_buf
);
836 if ((s
= sys_datacopy(SELF
,
837 (vir_bytes
) &sysgetenv
, who_e
, ptr
,
838 sizeof(sysgetenv
))) != OK
)
840 if (sysgetenv
.val
!= 0) {
841 if ((s
= sys_datacopy(SELF
,
842 (vir_bytes
) small_buf
, who_e
,
843 (vir_bytes
) sysgetenv
.val
,
844 sysgetenv
.vallen
)) != OK
)
857 /*===========================================================================*
859 *===========================================================================*/
860 int pm_dumpcore(int csig
, vir_bytes exe_name
)
864 char core_path
[PATH_MAX
];
865 char proc_name
[PROC_NAME_LEN
];
867 /* if a process is blocked, scratch(fp).file.fd_nr holds the fd it's blocked
868 * on. free it up for use by common_open().
870 if (fp_is_blocked(fp
))
874 snprintf(core_path
, PATH_MAX
, "%s.%d", CORE_NAME
, fp
->fp_pid
);
875 core_fd
= common_open(core_path
, O_WRONLY
| O_CREAT
| O_TRUNC
, CORE_MODE
);
876 if (core_fd
< 0) { r
= core_fd
; goto core_exit
; }
878 /* get process' name */
879 r
= sys_datacopy(PM_PROC_NR
, exe_name
, VFS_PROC_NR
, (vir_bytes
) proc_name
,
881 if (r
!= OK
) goto core_exit
;
882 proc_name
[PROC_NAME_LEN
- 1] = '\0';
884 if ((f
= get_filp(core_fd
, VNODE_WRITE
)) == NULL
) { r
=EBADF
; goto core_exit
; }
885 write_elf_core_file(f
, csig
, proc_name
);
887 (void) close_fd(fp
, core_fd
); /* ignore failure, we're exiting anyway */
891 free_proc(FP_EXITING
);
895 /*===========================================================================*
897 *===========================================================================*/
901 char key
[DS_MAX_KEYLEN
];
902 char *blkdrv_prefix
= "drv.blk.";
903 char *chrdrv_prefix
= "drv.chr.";
906 endpoint_t owner_endpoint
;
908 /* Get the event and the owner from DS. */
909 while ((r
= ds_check(key
, &type
, &owner_endpoint
)) == OK
) {
910 /* Only check for block and character driver up events. */
911 if (!strncmp(key
, blkdrv_prefix
, strlen(blkdrv_prefix
))) {
913 } else if (!strncmp(key
, chrdrv_prefix
, strlen(chrdrv_prefix
))) {
919 if ((r
= ds_retrieve_u32(key
, &value
)) != OK
) {
920 printf("VFS: ds_event: ds_retrieve_u32 failed\n");
923 if (value
!= DS_DRIVER_UP
) continue;
926 dmap_endpt_up(owner_endpoint
, is_blk
);
929 if (r
!= ENOENT
) printf("VFS: ds_event: ds_check failed: %d\n", r
);
932 /* A function to be called on panic(). */
933 void panic_hook(void)
935 printf("VFS mthread stacktraces:\n");
936 mthread_stacktraces();
939 /*===========================================================================*
941 *===========================================================================*/
942 int do_getrusage(void)
945 struct rusage r_usage
;
947 if ((res
= sys_datacopy(who_e
, (vir_bytes
) m_in
.RU_RUSAGE_ADDR
, SELF
,
948 (vir_bytes
) &r_usage
, (vir_bytes
) sizeof(r_usage
))) < 0)
951 r_usage
.ru_inblock
= 0;
952 r_usage
.ru_oublock
= 0;
953 r_usage
.ru_ixrss
= fp
->text_size
;
954 r_usage
.ru_idrss
= fp
->data_size
;
955 r_usage
.ru_isrss
= DEFAULT_STACK_LIMIT
;
957 return sys_datacopy(SELF
, (vir_bytes
) &r_usage
, who_e
,
958 (vir_bytes
) m_in
.RU_RUSAGE_ADDR
, (phys_bytes
) sizeof(r_usage
));