4 /* Declaration of the system privileges structure. It defines flags, system
5 * call masks, an synchronous alarm timer, I/O privileges, pending hardware
6 * interrupts and notifications, and so on.
7 * System processes each get their own structure with properties, whereas all
8 * user processes share one structure. This setup provides a clear separation
9 * between common and privileged process fields and is very space efficient.
12 * Jul 01, 2005 Created. (Jorrit N. Herder)
14 #include <minix/com.h>
18 /* Max. number of I/O ranges that can be assigned to a process */
19 #define NR_IO_RANGE 32
21 /* Max. number of device memory ranges that can be assigned to a process */
22 #define NR_MEM_RANGE 10
24 /* Max. number of IRQs that can be assigned to a process */
28 proc_nr_t s_proc_nr
; /* number of associated process */
29 sys_id_t s_id
; /* index of this system structure */
30 short s_flags
; /* PREEMTIBLE, BILLABLE, etc. */
32 short s_trap_mask
; /* allowed system call traps */
33 sys_map_t s_ipc_from
; /* allowed callers to receive from */
34 sys_map_t s_ipc_to
; /* allowed destination processes */
36 /* allowed kernel calls */
37 #define CALL_MASK_SIZE BITMAP_CHUNKS(NR_SYS_CALLS)
38 bitchunk_t s_k_call_mask
[CALL_MASK_SIZE
];
40 sys_map_t s_notify_pending
; /* bit map with pending notifications */
41 irq_id_t s_int_pending
; /* pending hardware interrupts */
42 sigset_t s_sig_pending
; /* pending signals */
44 timer_t s_alarm_timer
; /* synchronous alarm timer */
45 struct far_mem s_farmem
[NR_REMOTE_SEGS
]; /* remote memory map */
46 reg_t
*s_stack_guard
; /* stack guard word for kernel tasks */
48 int s_nr_io_range
; /* allowed I/O ports */
49 struct io_range s_io_tab
[NR_IO_RANGE
];
51 int s_nr_mem_range
; /* allowed memory ranges */
52 struct mem_range s_mem_tab
[NR_MEM_RANGE
];
54 int s_nr_irq
; /* allowed IRQ lines */
55 int s_irq_tab
[NR_IRQ
];
56 vir_bytes s_grant_table
; /* grant table address of process, or 0 */
57 int s_grant_entries
; /* no. of entries, or 0 */
60 /* Guard word for task stacks. */
61 #define STACK_GUARD ((reg_t) (sizeof(reg_t) == 2 ? 0xBEEF : 0xDEADBEEF))
63 /* Bits for the system property flags. */
64 #define PREEMPTIBLE 0x02 /* kernel tasks are not preemptible */
65 #define BILLABLE 0x04 /* some processes are not billable */
67 #define SYS_PROC 0x10 /* system processes have own priv structure */
68 #define CHECK_IO_PORT 0x20 /* check if I/O request is allowed */
69 #define CHECK_IRQ 0x40 /* check if IRQ can be used */
70 #define CHECK_MEM 0x80 /* check if (VM) mem map request is allowed */
72 /* Magic system structure table addresses. */
73 #define BEG_PRIV_ADDR (&priv[0])
74 #define END_PRIV_ADDR (&priv[NR_SYS_PROCS])
76 #define priv_addr(i) (ppriv_addr)[(i)]
77 #define priv_id(rp) ((rp)->p_priv->s_id)
78 #define priv(rp) ((rp)->p_priv)
80 #define id_to_nr(id) priv_addr(id)->s_proc_nr
81 #define nr_to_id(nr) priv(proc_addr(nr))->s_id
83 /* The system structures table and pointers to individual table slots. The
84 * pointers allow faster access because now a process entry can be found by
85 * indexing the psys_addr array, while accessing an element i requires a
86 * multiplication with sizeof(struct sys) to determine the address.
88 EXTERN
struct priv priv
[NR_SYS_PROCS
]; /* system properties table */
89 EXTERN
struct priv
*ppriv_addr
[NR_SYS_PROCS
]; /* direct slot pointers */
91 /* Unprivileged user processes all share the same privilege structure.
92 * This id must be fixed because it is used to check send mask entries.
94 #define USER_PRIV_ID 0
96 /* Make sure the system can boot. The following sanity check verifies that
97 * the system privileges table is large enough for the number of processes
100 #if (NR_BOOT_PROCS > NR_SYS_PROCS)
101 #error NR_SYS_PROCS must be larger than NR_BOOT_PROCS