2 * Copyright (c) 2003 Matthew Dillon <dillon@backplane.com>
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * $DragonFly: src/sys/kern/lwkt_caps.c,v 1.2 2004/03/06 22:14:09 dillon Exp $
30 * This module implements the DragonFly LWKT IPC rendezvous and message
31 * passing API which operates between userland processes, between userland
32 * threads, and between userland processes and kernel threads. This API
33 * is known as the CAPS interface.
35 * Generally speaking this module abstracts the LWKT message port interface
36 * into userland Clients and Servers rendezvous through ports named
37 * by or wildcarded by (name,uid,gid). The kernel provides system calls
38 * which may be assigned to the mp_* fields in a userland-supplied
39 * kernel-managed port, and a registration interface which associates an
40 * upcall with a userland port. The kernel tracks authentication information
41 * and deals with connection failures by automatically replying to unreplied
44 * From the userland perspective a client/server connection involves two
45 * message ports on the client and two message ports on the server.
48 #include <sys/param.h>
49 #include <sys/systm.h>
50 #include <sys/kernel.h>
51 #include <sys/sysproto.h>
52 #include <sys/malloc.h>
54 #include <sys/ucred.h>
56 #include <sys/sysctl.h>
58 #include <vm/vm_extern.h>
60 static int caps_process_msg(caps_kinfo_t caps, caps_kmsg_t msg, struct caps_sys_get_args *uap);
61 static void caps_free(caps_kinfo_t caps);
62 static void caps_free_msg(caps_kmsg_t msg);
63 static int caps_name_check(const char *name, int len);
64 static caps_kinfo_t caps_free_msg_mcaps(caps_kmsg_t msg);
65 static caps_kinfo_t kern_caps_sys_service(const char *name, uid_t uid,
66 gid_t gid, struct ucred *cred,
67 int flags, int *error);
68 static caps_kinfo_t kern_caps_sys_client(const char *name, uid_t uid,
69 gid_t gid, struct ucred *cred, int flags, int *error);
72 #define CAPS_HMASK (CAPS_HSIZE - 1)
74 static caps_kinfo_t caps_hash_ary[CAPS_HSIZE];
75 static int caps_waitsvc;
77 MALLOC_DEFINE(M_CAPS, "caps", "caps IPC messaging");
79 static int caps_enabled;
80 SYSCTL_INT(_kern, OID_AUTO, caps_enabled,
81 CTLFLAG_RW, &caps_enabled, 0, "Enable CAPS");
83 /************************************************************************
84 * INLINE SUPPORT FUNCTIONS *
85 ************************************************************************/
89 caps_hash(const char *name, int len)
94 hv = (hv << 5) ^ name[len] ^ (hv >> 23);
95 return(&caps_hash_ary[(hv ^ (hv >> 16)) & CAPS_HMASK]);
100 caps_hold(caps_kinfo_t caps)
107 caps_drop(caps_kinfo_t caps)
109 if (--caps->ci_refs == 0)
113 /************************************************************************
114 * STATIC SUPPORT FUNCTIONS *
115 ************************************************************************/
119 caps_find(const char *name, int len, uid_t uid, gid_t gid)
122 struct caps_kinfo **chash;
124 chash = caps_hash(name, len);
125 for (caps = *chash; caps; caps = caps->ci_hnext) {
126 if ((uid == (uid_t)-1 || uid == caps->ci_uid) &&
127 (gid == (gid_t)-1 || gid == caps->ci_gid) &&
128 len == caps->ci_namelen &&
129 bcmp(name, caps->ci_name, len) == 0
140 caps_find_id(thread_t td, int id)
144 for (caps = td->td_caps; caps; caps = caps->ci_tdnext) {
145 if (caps->ci_id == id) {
155 caps_alloc(thread_t td, const char *name, int len, uid_t uid, gid_t gid,
156 int flags, caps_type_t type)
158 struct caps_kinfo **chash;
162 caps = malloc(offsetof(struct caps_kinfo, ci_name[len+1]),
163 M_CAPS, M_WAITOK|M_ZERO);
164 TAILQ_INIT(&caps->ci_msgpendq);
165 TAILQ_INIT(&caps->ci_msguserq);
166 caps->ci_uid = uid; /* -1 == not registered for uid search */
167 caps->ci_gid = gid; /* -1 == not registered for gid search */
168 caps->ci_type = type;
169 caps->ci_refs = 1; /* CAPKF_TDLIST reference */
170 caps->ci_namelen = len;
171 caps->ci_flags = flags;
172 bcopy(name, caps->ci_name, len + 1);
173 if (type == CAPT_SERVICE) {
174 chash = caps_hash(caps->ci_name, len);
175 caps->ci_hnext = *chash;
177 caps->ci_flags |= CAPKF_HLIST;
180 caps->ci_id = td->td_caps->ci_id + 1;
181 if (caps->ci_id < 0) {
183 * It is virtually impossible for this case to occur.
186 while ((ctmp = caps_find_id(td, caps->ci_id)) != NULL) {
194 caps->ci_flags |= CAPKF_TDLIST;
195 caps->ci_tdnext = td->td_caps;
203 caps_alloc_msg(caps_kinfo_t caps)
207 msg = malloc(sizeof(struct caps_kmsg), M_CAPS, M_WAITOK|M_ZERO);
208 msg->km_msgid.c_id = (off_t)(uintptr_t)msg;
214 caps_find_msg(caps_kinfo_t caps, off_t msgid)
218 TAILQ_FOREACH(msg, &caps->ci_msguserq, km_node) {
219 if (msg->km_msgid.c_id == msgid)
222 TAILQ_FOREACH(msg, &caps->ci_msgpendq, km_node) {
223 if (msg->km_msgid.c_id == msgid)
231 caps_load_ccr(caps_kinfo_t caps, caps_kmsg_t msg, struct proc *p, void *udata, int ubytes)
234 struct ucred *cr = p->p_ucred;
238 * replace km_mcaps with new VM state, return the old km_mcaps. We
239 * dereference the old mcap's mrefs but do not drop its main ref count.
240 * The caller is expected to do that.
242 rcaps = caps_free_msg_mcaps(msg); /* can be NULL */
245 msg->km_mcaps = caps;
246 msg->km_umsg = udata;
247 msg->km_umsg_size = ubytes;
249 msg->km_ccr.pid = p ? p->p_pid : -1;
250 msg->km_ccr.uid = cr->cr_ruid;
251 msg->km_ccr.euid = cr->cr_uid;
252 msg->km_ccr.gid = cr->cr_rgid;
253 msg->km_ccr.ngroups = MIN(cr->cr_ngroups, CAPS_MAXGROUPS);
254 for (i = 0; i < msg->km_ccr.ngroups; ++i)
255 msg->km_ccr.groups[i] = cr->cr_groups[i];
260 caps_dequeue_msg(caps_kinfo_t caps, caps_kmsg_t msg)
262 if (msg->km_flags & CAPKMF_ONUSERQ)
263 TAILQ_REMOVE(&caps->ci_msguserq, msg, km_node);
264 if (msg->km_flags & CAPKMF_ONPENDQ)
265 TAILQ_REMOVE(&caps->ci_msgpendq, msg, km_node);
266 msg->km_flags &= ~(CAPKMF_ONPENDQ|CAPKMF_ONUSERQ);
270 caps_put_msg(caps_kinfo_t caps, caps_kmsg_t msg, caps_msg_state_t state)
272 KKASSERT((msg->km_flags & (CAPKMF_ONUSERQ|CAPKMF_ONPENDQ)) == 0);
274 msg->km_flags |= CAPKMF_ONPENDQ;
275 msg->km_flags &= ~CAPKMF_PEEKED;
276 msg->km_state = state;
277 TAILQ_INSERT_TAIL(&caps->ci_msgpendq, msg, km_node);
280 * Instead of waking up the service for both new messages and disposals,
281 * just wakeup the service for new messages and it will process the
282 * previous disposal in the same loop, reducing the number of context
283 * switches required to run an IPC.
285 if (state != CAPMS_DISPOSE)
291 * caps_free_msg_mcaps()
293 * Free the vmspace reference relating to the data associated with the
294 * message (this prevents the target process from exiting too early).
295 * Return and clear km_mcaps. The caller is responsible for dropping the
296 * reference to the returned caps.
300 caps_free_msg_mcaps(caps_kmsg_t msg)
304 if ((mcaps = msg->km_mcaps) != NULL) {
305 msg->km_mcaps = NULL;
306 if (--mcaps->ci_mrefs == 0 && (mcaps->ci_flags & CAPKF_MWAIT))
315 * Free a caps placeholder message. The message must not be on any queues.
318 caps_free_msg(caps_kmsg_t msg)
322 if ((rcaps = caps_free_msg_mcaps(msg)) != NULL)
328 * Validate the service name
331 caps_name_check(const char *name, int len)
336 for (i = len - 1; i >= 0; --i) {
338 if (c >= '0' && c <= '9')
340 if (c >= 'a' && c <= 'z')
342 if (c >= 'A' && c <= 'Z')
344 if (c == '_' || c == '.')
354 * Terminate portions of a caps info structure. This is used to close
355 * an end-point or to flush particular messages on an end-point.
357 * This function should not be called with CAPKF_TDLIST unless the caller
358 * has an additional hold on the caps structure.
361 caps_term(caps_kinfo_t caps, int flags, caps_kinfo_t cflush)
363 struct caps_kinfo **scan;
366 if (flags & CAPKF_TDLIST)
367 caps->ci_flags |= CAPKF_CLOSED;
369 if (flags & CAPKF_FLUSH) {
371 struct caps_kmsg_queue tmpuserq;
372 struct caps_kmsg_queue tmppendq;
375 TAILQ_INIT(&tmpuserq);
376 TAILQ_INIT(&tmppendq);
378 while ((msg = TAILQ_FIRST(&caps->ci_msgpendq)) != NULL ||
379 (msg = TAILQ_FIRST(&caps->ci_msguserq)) != NULL
381 mflags = msg->km_flags & (CAPKMF_ONUSERQ|CAPKMF_ONPENDQ);
382 caps_dequeue_msg(caps, msg);
384 if (cflush && msg->km_mcaps != cflush) {
385 if (mflags & CAPKMF_ONUSERQ)
386 TAILQ_INSERT_TAIL(&tmpuserq, msg, km_node);
388 TAILQ_INSERT_TAIL(&tmppendq, msg, km_node);
391 * Dispose of the message. If the received message is a
392 * request we must reply it. If the received message is
393 * a reply we must return it for disposal. If the
394 * received message is a disposal request we simply free it.
396 switch(msg->km_state) {
398 case CAPMS_REQUEST_RETRY:
399 rcaps = caps_load_ccr(caps, msg, curproc, NULL, 0);
400 if (rcaps->ci_flags & CAPKF_CLOSED) {
402 * can't reply, if we never read the message (its on
403 * the pending queue), or if we are closed ourselves,
404 * we can just free the message. Otherwise we have
405 * to send ourselves a disposal request (multi-threaded
406 * services have to deal with disposal requests for
407 * messages that might be in progress).
409 if ((caps->ci_flags & CAPKF_CLOSED) ||
410 (mflags & CAPKMF_ONPENDQ)
417 caps_put_msg(caps, msg, CAPMS_DISPOSE);
421 * auto-reply to the originator.
423 caps_put_msg(rcaps, msg, CAPMS_REPLY);
427 case CAPMS_REPLY_RETRY:
428 rcaps = caps_load_ccr(caps, msg, curproc, NULL, 0);
429 if (caps == rcaps || (rcaps->ci_flags & CAPKF_CLOSED)) {
430 caps_free_msg(msg); /* degenerate disposal case */
433 caps_put_msg(rcaps, msg, CAPMS_DISPOSE);
442 while ((msg = TAILQ_FIRST(&tmpuserq)) != NULL) {
443 TAILQ_REMOVE(&tmpuserq, msg, km_node);
444 TAILQ_INSERT_TAIL(&caps->ci_msguserq, msg, km_node);
445 msg->km_flags |= CAPKMF_ONUSERQ;
447 while ((msg = TAILQ_FIRST(&tmppendq)) != NULL) {
448 TAILQ_REMOVE(&tmppendq, msg, km_node);
449 TAILQ_INSERT_TAIL(&caps->ci_msgpendq, msg, km_node);
450 msg->km_flags |= CAPKMF_ONPENDQ;
453 if ((flags & CAPKF_HLIST) && (caps->ci_flags & CAPKF_HLIST)) {
454 for (scan = caps_hash(caps->ci_name, caps->ci_namelen);
456 scan = &(*scan)->ci_hnext
458 KKASSERT(*scan != NULL);
460 *scan = caps->ci_hnext;
461 caps->ci_hnext = (void *)-1;
462 caps->ci_flags &= ~CAPKF_HLIST;
464 if ((flags & CAPKF_TDLIST) && (caps->ci_flags & CAPKF_TDLIST)) {
465 while (caps->ci_mrefs) {
466 caps->ci_flags |= CAPKF_MWAIT;
467 tsleep(caps, 0, "cexit", 0);
469 for (scan = &caps->ci_td->td_caps;
471 scan = &(*scan)->ci_tdnext
473 KKASSERT(*scan != NULL);
475 *scan = caps->ci_tdnext;
476 caps->ci_flags &= ~CAPKF_TDLIST;
477 caps->ci_tdnext = (void *)-1;
481 if ((flags & CAPKF_RCAPS) && (caps->ci_flags & CAPKF_RCAPS)) {
484 caps->ci_flags &= ~CAPKF_RCAPS;
485 if ((ctmp = caps->ci_rcaps)) {
486 caps->ci_rcaps = NULL;
487 caps_term(ctmp, CAPKF_FLUSH, caps);
494 caps_free(caps_kinfo_t caps)
496 KKASSERT(TAILQ_EMPTY(&caps->ci_msgpendq));
497 KKASSERT(TAILQ_EMPTY(&caps->ci_msguserq));
498 KKASSERT((caps->ci_flags & (CAPKF_HLIST|CAPKF_TDLIST)) == 0);
502 /************************************************************************
503 * PROCESS SUPPORT FUNCTIONS *
504 ************************************************************************/
507 * Create dummy entries in p2 so we can return the appropriate
508 * error code. Robust userland code will check the error for a
509 * forked condition and reforge the connection.
512 caps_fork(struct proc *p1, struct proc *p2, int flags)
523 * Create dummy entries with the same id's as the originals. Note
524 * that service entries are not re-added to the hash table. The
525 * dummy entries return an ENOTCONN error allowing userland code to
526 * detect that a fork occured. Userland must reconnect to the service.
528 for (caps1 = td1->td_caps; caps1; caps1 = caps1->ci_tdnext) {
529 if (caps1->ci_flags & CAPF_NOFORK)
531 caps2 = caps_alloc(td2,
532 caps1->ci_name, caps1->ci_namelen,
533 caps1->ci_uid, caps1->ci_gid,
534 caps1->ci_flags & CAPF_UFLAGS, CAPT_FORKED);
535 caps2->ci_id = caps1->ci_id;
539 * Reverse the list order to maintain highest-id-first
541 caps2 = td2->td_caps;
544 caps1 = caps2->ci_tdnext;
545 caps2->ci_tdnext = td2->td_caps;
546 td2->td_caps = caps2;
552 caps_exit(struct thread *td)
556 while ((caps = td->td_caps) != NULL) {
558 caps_term(caps, CAPKF_TDLIST|CAPKF_HLIST|CAPKF_FLUSH|CAPKF_RCAPS, NULL);
563 /************************************************************************
565 ************************************************************************/
568 * caps_sys_service(name, uid, gid, upcid, flags);
570 * Create an IPC service using the specified name, uid, gid, and flags.
571 * Either uid or gid can be -1, but not both. The port identifier is
574 * upcid can either be an upcall or a kqueue identifier (XXX)
577 caps_sys_service(struct caps_sys_service_args *uap)
579 struct ucred *cred = curproc->p_ucred;
580 char name[CAPS_MAXNAMELEN];
585 if (caps_enabled == 0)
587 if ((error = copyinstr(uap->name, name, CAPS_MAXNAMELEN, &len)) != 0)
591 if ((error = caps_name_check(name, len)) != 0)
594 caps = kern_caps_sys_service(name, uap->uid, uap->gid, cred,
595 uap->flags & CAPF_UFLAGS, &error);
597 uap->sysmsg_result = caps->ci_id;
602 * caps_sys_client(name, uid, gid, upcid, flags);
604 * Create an IPC client connected to the specified service. Either uid or gid
605 * may be -1, indicating a wildcard, but not both. The port identifier is
608 * upcid can either be an upcall or a kqueue identifier (XXX)
611 caps_sys_client(struct caps_sys_client_args *uap)
613 struct ucred *cred = curproc->p_ucred;
614 char name[CAPS_MAXNAMELEN];
619 if (caps_enabled == 0)
621 if ((error = copyinstr(uap->name, name, CAPS_MAXNAMELEN, &len)) != 0)
625 if ((error = caps_name_check(name, len)) != 0)
628 caps = kern_caps_sys_client(name, uap->uid, uap->gid, cred,
629 uap->flags & CAPF_UFLAGS, &error);
631 uap->sysmsg_result = caps->ci_id;
636 caps_sys_close(struct caps_sys_close_args *uap)
640 if ((caps = caps_find_id(curthread, uap->portid)) == NULL)
642 caps_term(caps, CAPKF_TDLIST|CAPKF_HLIST|CAPKF_FLUSH|CAPKF_RCAPS, NULL);
648 caps_sys_setgen(struct caps_sys_setgen_args *uap)
652 if ((caps = caps_find_id(curthread, uap->portid)) == NULL)
654 if (caps->ci_type == CAPT_FORKED)
656 caps->ci_gen = uap->gen;
661 caps_sys_getgen(struct caps_sys_getgen_args *uap)
665 if ((caps = caps_find_id(curthread, uap->portid)) == NULL)
667 if (caps->ci_type == CAPT_FORKED)
669 if (caps->ci_rcaps == NULL)
671 uap->sysmsg_result64 = caps->ci_rcaps->ci_gen;
676 * caps_sys_put(portid, msg, msgsize)
678 * Send an opaque message of the specified size to the specified port. This
679 * function may only be used with a client port. The message id is returned.
682 caps_sys_put(struct caps_sys_put_args *uap)
686 struct proc *p = curproc;
689 if (uap->msgsize < 0)
691 if ((caps = caps_find_id(curthread, uap->portid)) == NULL)
693 if (caps->ci_type == CAPT_FORKED)
695 if (caps->ci_rcaps == NULL) {
701 * If this client has queued a large number of messages return
702 * ENOBUFS. The client must process some replies before it can
703 * send new messages. The server can also throttle a client by
704 * holding its replies. XXX allow a server to refuse messages from
707 if (caps->ci_cmsgcount > CAPS_MAXINPROG) {
711 msg = caps_alloc_msg(caps);
712 uap->sysmsg_offset = msg->km_msgid.c_id;
715 * If the remote end is closed return ENOTCONN immediately, otherwise
716 * send it to the remote end.
718 * Note: since this is a new message, caps_load_ccr() returns a remote
722 if (caps->ci_rcaps->ci_flags & CAPKF_CLOSED) {
726 caps_load_ccr(caps, msg, p, NULL, 0); /* returns NULL */
728 caps_put_msg(caps, msg, CAPMS_REPLY); /* drops caps */
731 caps_load_ccr(caps, msg, p, uap->msg, uap->msgsize); /* returns NULL */
732 caps_hold(caps->ci_rcaps); /* need ref */
733 ++caps->ci_cmsgcount;
734 caps_put_msg(caps->ci_rcaps, msg, CAPMS_REQUEST); /* drops rcaps */
741 * caps_sys_reply(portid, msg, msgsize, msgid)
743 * Reply to the message referenced by the specified msgid, supplying opaque
744 * data back to the originator.
747 caps_sys_reply(struct caps_sys_reply_args *uap)
754 if (uap->msgsize < 0)
756 if ((caps = caps_find_id(curthread, uap->portid)) == NULL)
758 if (caps->ci_type == CAPT_FORKED)
762 * Can't find message to reply to
764 if ((msg = caps_find_msg(caps, uap->msgcid)) == NULL) {
770 * Trying to reply to a non-replyable message
772 if ((msg->km_flags & CAPKMF_ONUSERQ) == 0) {
778 * If the remote end is closed requeue to ourselves for disposal.
779 * Otherwise send the reply to the other end (the other end will
780 * return a passive DISPOSE to us when it has eaten the data)
782 caps_dequeue_msg(caps, msg);
784 if (msg->km_mcaps->ci_flags & CAPKF_CLOSED) {
785 caps_drop(caps_load_ccr(caps, msg, p, NULL, 0));
787 caps_put_msg(caps, msg, CAPMS_DISPOSE); /* drops caps */
789 rcaps = caps_load_ccr(caps, msg, p, uap->msg, uap->msgsize);
790 caps_put_msg(rcaps, msg, CAPMS_REPLY);
797 * caps_sys_get(portid, msg, maxsize, msgid, ccr)
799 * Retrieve the next ready message on the port, store its message id in
800 * uap->msgid and return the length of the message. If the message is too
801 * large to fit the message id, length, and creds are still returned, but
802 * the message is not dequeued (the caller is expected to call again with
803 * a larger buffer or to reply the messageid if it does not want to handle
806 * EWOULDBLOCK is returned if no messages are pending. Note that 0-length
807 * messages are perfectly acceptable so 0 can be legitimately returned.
810 caps_sys_get(struct caps_sys_get_args *uap)
815 if (uap->maxsize < 0)
817 if ((caps = caps_find_id(curthread, uap->portid)) == NULL)
819 if (caps->ci_type == CAPT_FORKED)
821 if ((msg = TAILQ_FIRST(&caps->ci_msgpendq)) == NULL) {
825 return(caps_process_msg(caps, msg, uap));
829 * caps_sys_wait(portid, msg, maxsize, msgid, ccr)
831 * Retrieve the next ready message on the port, store its message id in
832 * uap->msgid and return the length of the message. If the message is too
833 * large to fit the message id, length, and creds are still returned, but
834 * the message is not dequeued (the caller is expected to call again with
835 * a larger buffer or to reply the messageid if it does not want to handle
838 * This function blocks until interrupted or a message is received.
839 * Note that 0-length messages are perfectly acceptable so 0 can be
840 * legitimately returned.
843 caps_sys_wait(struct caps_sys_wait_args *uap)
849 if (uap->maxsize < 0)
851 if ((caps = caps_find_id(curthread, uap->portid)) == NULL)
853 if (caps->ci_type == CAPT_FORKED)
855 while ((msg = TAILQ_FIRST(&caps->ci_msgpendq)) == NULL) {
856 if ((error = tsleep(caps, PCATCH, "caps", 0)) != 0) {
861 return(caps_process_msg(caps, msg, (struct caps_sys_get_args *)uap));
865 caps_process_msg(caps_kinfo_t caps, caps_kmsg_t msg, struct caps_sys_get_args *uap)
871 msg->km_flags |= CAPKMF_PEEKED;
872 msgsize = msg->km_umsg_size;
873 if (msgsize <= uap->maxsize)
874 caps_dequeue_msg(caps, msg);
876 if (msg->km_umsg_size != 0) {
877 struct proc *rp = msg->km_mcaps->ci_td->td_proc;
878 KKASSERT(rp != NULL);
879 error = vmspace_copy(rp->p_vmspace, (vm_offset_t)msg->km_umsg,
880 curproc->p_vmspace, (vm_offset_t)uap->msg,
881 min(msgsize, uap->maxsize), uap->maxsize);
883 printf("vmspace_copy: error %d from proc %d\n", error, rp->p_pid);
884 if (msgsize > uap->maxsize)
885 caps_dequeue_msg(caps, msg);
892 error = copyout(&msg->km_msgid, uap->msgid, sizeof(msg->km_msgid));
894 error = copyout(&msg->km_ccr, uap->ccr, sizeof(msg->km_ccr));
896 uap->sysmsg_result = msgsize;
899 * If the message was dequeued we must deal with it.
901 if (msgsize <= uap->maxsize) {
902 switch(msg->km_state) {
904 case CAPMS_REQUEST_RETRY:
905 TAILQ_INSERT_TAIL(&caps->ci_msguserq, msg, km_node);
906 msg->km_flags |= CAPKMF_ONUSERQ;
909 case CAPMS_REPLY_RETRY:
910 --caps->ci_cmsgcount;
911 rcaps = caps_load_ccr(caps, msg, curproc, NULL, 0);
912 if (caps == rcaps || (rcaps->ci_flags & CAPKF_CLOSED)) {
913 /* degenerate disposal case */
917 caps_put_msg(rcaps, msg, CAPMS_DISPOSE);
930 * caps_sys_abort(portid, msgcid, flags)
932 * Abort a previously sent message. You must still wait for the message
933 * to be returned after sending the abort request. This function will
934 * return the appropriate CAPS_ABORT_* code depending on what it had
938 caps_sys_abort(struct caps_sys_abort_args *uap)
940 uap->sysmsg_result = CAPS_ABORT_NOTIMPL;
945 * KERNEL SYSCALL SEPARATION SUPPORT FUNCTIONS
950 kern_caps_sys_service(const char *name, uid_t uid, gid_t gid,
951 struct ucred *cred, int flags, int *error)
959 * Make sure we can use the uid and gid
962 if (cred->cr_uid != 0 && uid != (uid_t)-1 && cred->cr_uid != uid) {
966 if (cred->cr_uid != 0 && gid != (gid_t)-1 && !groupmember(gid, cred)) {
975 if (flags & CAPF_EXCL) {
976 if ((caps = caps_find(name, strlen(name), uid, gid)) != NULL) {
986 caps = caps_alloc(curthread, name, len,
987 uid, gid, flags & CAPF_UFLAGS, CAPT_SERVICE);
988 wakeup(&caps_waitsvc);
994 kern_caps_sys_client(const char *name, uid_t uid, gid_t gid,
995 struct ucred *cred, int flags, int *error)
997 caps_kinfo_t caps, rcaps;
1003 * Locate the CAPS service (rcaps ref is for caps->ci_rcaps)
1006 if ((rcaps = caps_find(name, len, uid, gid)) == NULL) {
1007 if (flags & CAPF_WAITSVC) {
1009 snprintf(cbuf, sizeof(cbuf), "C%s", name);
1010 *error = tsleep(&caps_waitsvc, PCATCH, cbuf, 0);
1024 if ((flags & CAPF_USER) && (rcaps->ci_flags & CAPF_USER)) {
1025 if (rcaps->ci_uid != (uid_t)-1 && rcaps->ci_uid == cred->cr_uid)
1028 if ((flags & CAPF_GROUP) && (rcaps->ci_flags & CAPF_GROUP)) {
1029 if (rcaps->ci_gid != (gid_t)-1 && groupmember(rcaps->ci_gid, cred))
1032 if ((flags & CAPF_WORLD) && (rcaps->ci_flags & CAPF_WORLD)) {
1044 * Allocate the client side and connect to the server
1046 caps = caps_alloc(curthread, name, len,
1047 uid, gid, flags & CAPF_UFLAGS, CAPT_CLIENT);
1048 caps->ci_rcaps = rcaps;
1049 caps->ci_flags |= CAPKF_RCAPS;