2003-11-19 19:49:41 +01:00
|
|
|
/* bsd_helper.cc
|
|
|
|
|
2012-10-25 10:08:39 +02:00
|
|
|
Copyright 2003, 2004, 2005, 2007, 2012 Red Hat Inc.
|
2003-11-19 19:49:41 +01:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
#ifdef __OUTSIDE_CYGWIN__
|
|
|
|
#include "woutsup.h"
|
2004-09-15 12:17:53 +02:00
|
|
|
#include <errno.h>
|
2003-11-19 19:49:41 +01:00
|
|
|
#define _KERNEL 1
|
|
|
|
#define __BSD_VISIBLE 1
|
|
|
|
#include <sys/smallprint.h>
|
|
|
|
#include <sys/cygwin.h>
|
|
|
|
#include <sys/ipc.h>
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/msg.h>
|
|
|
|
#include <sys/queue.h>
|
|
|
|
#include <malloc.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
|
|
|
|
#include "cygserver.h"
|
|
|
|
#include "process.h"
|
|
|
|
#include "cygserver_ipc.h"
|
|
|
|
#include "cygserver_msg.h"
|
|
|
|
#include "cygserver_sem.h"
|
|
|
|
#include "cygserver_shm.h"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copy a piece of memory from the client process into the server process.
|
|
|
|
* Returns an error code.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
win_copyin (struct thread *td, const void *client_src,
|
|
|
|
void *server_tgt, size_t len)
|
|
|
|
{
|
|
|
|
if (!ReadProcessMemory (td->client->handle (), client_src, server_tgt,
|
|
|
|
len, NULL))
|
|
|
|
return cygwin_internal (CW_GET_ERRNO_FROM_WINERROR,
|
|
|
|
GetLastError (), EINVAL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copy a piece of memory from the server process into the client process.
|
|
|
|
* Returns an error code.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
win_copyout (struct thread *td, const void *server_src,
|
|
|
|
void *client_tgt, size_t len)
|
|
|
|
{
|
|
|
|
if (!WriteProcessMemory (td->client->handle (), client_tgt, server_src,
|
|
|
|
len, NULL))
|
|
|
|
return cygwin_internal (CW_GET_ERRNO_FROM_WINERROR,
|
|
|
|
GetLastError (), EINVAL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define enter_critical_section(c) _enter_critical_section((c),__FILE__,__LINE__)
|
|
|
|
static void
|
|
|
|
_enter_critical_section (LPCRITICAL_SECTION pcs, const char *file, int line)
|
|
|
|
{
|
|
|
|
_log (file, line, LOG_DEBUG, "Try enter critical section(%p)", pcs);
|
|
|
|
EnterCriticalSection (pcs);
|
|
|
|
_log (file, line, LOG_DEBUG, "Entered critical section(%p)", pcs);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define leave_critical_section(c) _leave_critical_section((c),__FILE__,__LINE__)
|
|
|
|
static void
|
|
|
|
_leave_critical_section (LPCRITICAL_SECTION pcs, const char *file, int line)
|
|
|
|
{
|
|
|
|
LeaveCriticalSection (pcs);
|
|
|
|
_log (file, line, LOG_DEBUG, "Left critical section(%p)", pcs);
|
|
|
|
}
|
|
|
|
|
|
|
|
CRITICAL_SECTION ipcht_cs;
|
|
|
|
|
|
|
|
struct ipc_hookthread_storage {
|
|
|
|
HANDLE process_hdl;
|
|
|
|
proc ipcblk;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct ipc_hookthread {
|
2004-07-20 18:06:14 +02:00
|
|
|
SLIST_ENTRY (ipc_hookthread) sht_next;
|
2003-11-19 19:49:41 +01:00
|
|
|
HANDLE thread;
|
|
|
|
DWORD winpid;
|
|
|
|
struct vmspace vmspace;
|
|
|
|
};
|
2004-07-20 18:06:14 +02:00
|
|
|
static SLIST_HEAD (, ipc_hookthread) ipcht_list; /* list of hook threads */
|
2003-11-19 19:49:41 +01:00
|
|
|
|
|
|
|
static HANDLE ipcexit_event;
|
|
|
|
|
|
|
|
struct vmspace *
|
|
|
|
ipc_p_vmspace (struct proc *proc)
|
|
|
|
{
|
|
|
|
struct vmspace *ret = NULL;
|
|
|
|
ipc_hookthread *ipcht_entry;
|
|
|
|
enter_critical_section (&ipcht_cs);
|
|
|
|
SLIST_FOREACH (ipcht_entry, &ipcht_list, sht_next)
|
|
|
|
{
|
|
|
|
if (ipcht_entry->winpid == proc->winpid)
|
|
|
|
{
|
|
|
|
ret = proc->p_vmspace = &ipcht_entry->vmspace;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
leave_critical_section (&ipcht_cs);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static DWORD WINAPI
|
2004-07-20 18:06:14 +02:00
|
|
|
ipcexit_hookthread (const LPVOID param)
|
2003-11-19 19:49:41 +01:00
|
|
|
{
|
|
|
|
ipc_hookthread_storage *shs = (ipc_hookthread_storage *) param;
|
|
|
|
HANDLE obj[2] = { ipcexit_event, shs->process_hdl };
|
|
|
|
switch (WaitForMultipleObjects (2, obj, FALSE, INFINITE))
|
|
|
|
{
|
|
|
|
case WAIT_OBJECT_0:
|
|
|
|
/* Cygserver shutdown. */
|
|
|
|
/*FALLTHRU*/
|
|
|
|
case WAIT_OBJECT_0 + 1:
|
|
|
|
/* Process exited. Call semexit_myhook to handle SEM_UNDOs for the
|
|
|
|
exiting process and shmexit_myhook to keep track of shared
|
|
|
|
memory. */
|
|
|
|
if (Giant.owner == shs->ipcblk.winpid)
|
2005-04-06 13:11:07 +02:00
|
|
|
mtx_unlock (&Giant);
|
2003-11-19 19:49:41 +01:00
|
|
|
if (support_semaphores == TUN_TRUE)
|
|
|
|
semexit_myhook (NULL, &shs->ipcblk);
|
|
|
|
if (support_sharedmem == TUN_TRUE)
|
|
|
|
{
|
|
|
|
_mtx_lock (&Giant, shs->ipcblk.winpid, __FILE__, __LINE__);
|
|
|
|
ipc_p_vmspace (&shs->ipcblk);
|
|
|
|
shmexit_myhook (shs->ipcblk.p_vmspace);
|
|
|
|
mtx_unlock (&Giant);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* FIXME: Panic? */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
CloseHandle (shs->process_hdl);
|
|
|
|
ipc_hookthread *ipcht_entry, *sav_entry;
|
|
|
|
enter_critical_section (&ipcht_cs);
|
|
|
|
SLIST_FOREACH_SAFE (ipcht_entry, &ipcht_list, sht_next, sav_entry)
|
|
|
|
{
|
|
|
|
if (ipcht_entry->winpid == shs->ipcblk.winpid)
|
|
|
|
{
|
|
|
|
SLIST_REMOVE (&ipcht_list, ipcht_entry, ipc_hookthread, sht_next);
|
2005-04-06 13:11:07 +02:00
|
|
|
CloseHandle (ipcht_entry->thread);
|
2003-11-19 19:49:41 +01:00
|
|
|
delete ipcht_entry;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
leave_critical_section (&ipcht_cs);
|
|
|
|
delete shs;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Deletes all pending hook threads. Called by ipcunload() which in turn
|
|
|
|
is called by the cygserver main routine. */
|
|
|
|
static void
|
2004-07-20 18:06:14 +02:00
|
|
|
ipcexit_dispose_hookthreads (void)
|
2003-11-19 19:49:41 +01:00
|
|
|
{
|
|
|
|
SetEvent (ipcexit_event);
|
|
|
|
ipc_hookthread *ipcht_entry;
|
|
|
|
enter_critical_section (&ipcht_cs);
|
|
|
|
SLIST_FOREACH (ipcht_entry, &ipcht_list, sht_next)
|
|
|
|
{
|
|
|
|
WaitForSingleObject (ipcht_entry->thread, 1000);
|
|
|
|
/* Don't bother removing the linked list on cygserver shutdown. */
|
|
|
|
/* FIXME: Error handling? */
|
|
|
|
}
|
|
|
|
leave_critical_section (&ipcht_cs);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Creates the per process wait thread. Called by semget() under locked
|
|
|
|
Giant mutex condition. */
|
|
|
|
int
|
2004-07-20 18:06:14 +02:00
|
|
|
ipcexit_creat_hookthread (struct thread *td)
|
2003-11-19 19:49:41 +01:00
|
|
|
{
|
|
|
|
ipc_hookthread *ipcht_entry;
|
|
|
|
int ret = -1;
|
|
|
|
enter_critical_section (&ipcht_cs);
|
|
|
|
SLIST_FOREACH (ipcht_entry, &ipcht_list, sht_next)
|
|
|
|
{
|
|
|
|
if (ipcht_entry->winpid == td->ipcblk->winpid)
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
leave_critical_section (&ipcht_cs);
|
|
|
|
if (!ret)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
DWORD tid;
|
|
|
|
ipc_hookthread_storage *shs = new ipc_hookthread_storage;
|
|
|
|
if (!DuplicateHandle (GetCurrentProcess (), td->client->handle (),
|
|
|
|
GetCurrentProcess (), &shs->process_hdl,
|
|
|
|
0, FALSE, DUPLICATE_SAME_ACCESS))
|
|
|
|
{
|
|
|
|
log (LOG_CRIT, "failed to duplicate process handle, error = %lu",
|
|
|
|
GetLastError ());
|
|
|
|
return cygwin_internal (CW_GET_ERRNO_FROM_WINERROR,
|
|
|
|
GetLastError (), ENOMEM);
|
|
|
|
}
|
|
|
|
shs->ipcblk = *td->ipcblk;
|
|
|
|
HANDLE thread = CreateThread (NULL, 0, ipcexit_hookthread, shs, 0, &tid);
|
|
|
|
if (!thread)
|
|
|
|
{
|
|
|
|
log (LOG_CRIT, "failed to create thread, error = %lu", GetLastError ());
|
|
|
|
return cygwin_internal (CW_GET_ERRNO_FROM_WINERROR,
|
|
|
|
GetLastError (), ENOMEM);
|
|
|
|
}
|
|
|
|
ipcht_entry = new ipc_hookthread;
|
|
|
|
ipcht_entry->thread = thread;
|
|
|
|
ipcht_entry->winpid = td->ipcblk->winpid;
|
|
|
|
ipcht_entry->vmspace.vm_map = NULL;
|
|
|
|
ipcht_entry->vmspace.vm_shm = NULL;
|
|
|
|
enter_critical_section (&ipcht_cs);
|
|
|
|
SLIST_INSERT_HEAD (&ipcht_list, ipcht_entry, sht_next);
|
|
|
|
leave_critical_section (&ipcht_cs);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Need the admins group SID to compare with groups in client token.
|
|
|
|
*/
|
|
|
|
PSID admininstrator_group_sid;
|
|
|
|
|
|
|
|
static void
|
|
|
|
init_admin_sid (void)
|
|
|
|
{
|
2007-02-23 12:43:48 +01:00
|
|
|
SID_IDENTIFIER_AUTHORITY nt_auth = {SECURITY_NT_AUTHORITY};
|
|
|
|
if (! AllocateAndInitializeSid (&nt_auth, 2, 32, 544, 0, 0, 0, 0, 0, 0,
|
|
|
|
&admininstrator_group_sid))
|
|
|
|
panic ("failed to create well known sids, error = %lu",
|
|
|
|
GetLastError ());
|
2003-11-19 19:49:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_DESCRIPTOR sec_all_nih_sd;
|
|
|
|
SECURITY_ATTRIBUTES sec_all_nih = { sizeof (SECURITY_ATTRIBUTES),
|
|
|
|
&sec_all_nih_sd,
|
|
|
|
FALSE };
|
|
|
|
|
2005-11-10 16:04:06 +01:00
|
|
|
void
|
|
|
|
securityinit ()
|
|
|
|
{
|
|
|
|
InitializeSecurityDescriptor (&sec_all_nih_sd, SECURITY_DESCRIPTOR_REVISION);
|
|
|
|
SetSecurityDescriptorDacl (&sec_all_nih_sd, TRUE, 0, FALSE);
|
|
|
|
init_admin_sid ();
|
|
|
|
}
|
|
|
|
|
2003-11-19 19:49:41 +01:00
|
|
|
/* Global vars, determining whether the IPC stuff should be started or not. */
|
|
|
|
tun_bool_t support_sharedmem = TUN_UNDEF;
|
|
|
|
tun_bool_t support_msgqueues = TUN_UNDEF;
|
|
|
|
tun_bool_t support_semaphores = TUN_UNDEF;
|
|
|
|
|
|
|
|
void
|
|
|
|
ipcinit ()
|
|
|
|
{
|
2004-07-20 18:06:14 +02:00
|
|
|
mtx_init (&Giant, "Giant", NULL, MTX_DEF);
|
2003-11-19 19:49:41 +01:00
|
|
|
msleep_init ();
|
|
|
|
ipcexit_event = CreateEvent (NULL, TRUE, FALSE, NULL);
|
|
|
|
if (!ipcexit_event)
|
|
|
|
panic ("Failed to create ipcexit event object");
|
|
|
|
InitializeCriticalSection (&ipcht_cs);
|
|
|
|
if (support_msgqueues == TUN_TRUE)
|
|
|
|
msginit ();
|
|
|
|
if (support_semaphores == TUN_TRUE)
|
|
|
|
seminit ();
|
|
|
|
if (support_sharedmem == TUN_TRUE)
|
|
|
|
shminit ();
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
ipcunload ()
|
|
|
|
{
|
2004-07-20 18:06:14 +02:00
|
|
|
ipcexit_dispose_hookthreads ();
|
2003-11-19 19:49:41 +01:00
|
|
|
CloseHandle (ipcexit_event);
|
|
|
|
wakeup_all ();
|
|
|
|
if (support_semaphores == TUN_TRUE)
|
|
|
|
semunload ();
|
|
|
|
if (support_sharedmem == TUN_TRUE)
|
|
|
|
shmunload ();
|
|
|
|
if (support_msgqueues == TUN_TRUE)
|
2004-07-20 18:06:14 +02:00
|
|
|
msgunload ();
|
|
|
|
mtx_destroy (&Giant);
|
2003-11-19 19:49:41 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Helper function to find a gid in a list of gids.
|
|
|
|
*/
|
|
|
|
static bool
|
|
|
|
is_grp_member (gid_t grp, gid_t *grplist, int listsize)
|
|
|
|
{
|
|
|
|
if (grplist)
|
|
|
|
for (; listsize > 0; --listsize)
|
|
|
|
if (grp == grplist[listsize - 1])
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Helper function to get a specific token information from a token.
|
|
|
|
* This function mallocs the necessary buffer spcae by itself. It
|
|
|
|
* must be free'd by the calling function.
|
|
|
|
*/
|
2008-11-26 11:18:53 +01:00
|
|
|
void *
|
2003-11-19 19:49:41 +01:00
|
|
|
get_token_info (HANDLE tok, TOKEN_INFORMATION_CLASS tic)
|
|
|
|
{
|
|
|
|
void *buf;
|
|
|
|
DWORD size;
|
|
|
|
|
|
|
|
if (!GetTokenInformation (tok, tic, NULL, 0, &size)
|
|
|
|
&& GetLastError () != ERROR_INSUFFICIENT_BUFFER)
|
|
|
|
return NULL;
|
|
|
|
if (!(buf = malloc (size)))
|
|
|
|
return NULL;
|
|
|
|
if (!GetTokenInformation (tok, tic, buf, size, &size))
|
|
|
|
{
|
|
|
|
free (buf);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if client user helds "mode" permission when accessing object
|
|
|
|
* associated with "perm" permission record.
|
|
|
|
* Returns an error code.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
ipcperm (struct thread *td, ipc_perm *perm, unsigned int mode)
|
|
|
|
{
|
|
|
|
proc *p = td->ipcblk;
|
|
|
|
|
|
|
|
if (!suser (td))
|
|
|
|
return 0;
|
|
|
|
if (mode & IPC_M)
|
|
|
|
{
|
|
|
|
return (p->uid != perm->cuid && p->uid != perm->uid)
|
|
|
|
? EACCES : 0;
|
|
|
|
}
|
|
|
|
if (p->uid != perm->cuid && p->uid != perm->uid)
|
|
|
|
{
|
|
|
|
/* If the user is a member of the creator or owner group, test
|
|
|
|
against group bits, otherwise against other bits. */
|
|
|
|
mode >>= p->gid != perm->gid && p->gid != perm->cgid
|
|
|
|
&& !is_grp_member (perm->gid, p->gidlist, p->gidcnt)
|
|
|
|
&& !is_grp_member (perm->cgid, p->gidlist, p->gidcnt)
|
|
|
|
? 6 : 3;
|
|
|
|
}
|
|
|
|
return (mode & perm->mode) != mode ? EACCES : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check for client user being superuser.
|
|
|
|
* Returns an error code.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
suser (struct thread *td)
|
|
|
|
{
|
|
|
|
/* This value has been set at ImpersonateNamedPipeClient() time
|
|
|
|
using the token information. See adjust_identity_info() below. */
|
|
|
|
return td->ipcblk->is_admin ? 0 : EACCES;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Retrieves user and group info from impersonated token and creates the
|
|
|
|
* correct uid, gid, gidlist and is_admin entries in p from that.
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
adjust_identity_info (struct proc *p)
|
|
|
|
{
|
|
|
|
HANDLE tok;
|
|
|
|
|
|
|
|
if (!OpenThreadToken (GetCurrentThread (), TOKEN_READ, TRUE, &tok))
|
|
|
|
{
|
|
|
|
debug ("Failed to open worker thread access token for pid %d, winpid %d",
|
|
|
|
p->cygpid, p->winpid);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get uid from user SID in token. */
|
|
|
|
PTOKEN_USER user;
|
|
|
|
if (!(user = (PTOKEN_USER)get_token_info (tok, TokenUser)))
|
|
|
|
goto faulty;
|
|
|
|
p->uid = cygwin_internal (CW_GET_UID_FROM_SID, user->User.Sid);
|
|
|
|
free (user);
|
|
|
|
if (p->uid == (uid_t)-1)
|
|
|
|
log (LOG_WARNING, "WARNING: User not found in /etc/passwd! Using uid -1!");
|
|
|
|
|
|
|
|
/* Get gid from primary group SID in token. */
|
|
|
|
PTOKEN_PRIMARY_GROUP pgrp;
|
|
|
|
if (!(pgrp = (PTOKEN_PRIMARY_GROUP)get_token_info (tok, TokenPrimaryGroup)))
|
|
|
|
goto faulty;
|
|
|
|
p->gid = cygwin_internal (CW_GET_GID_FROM_SID, pgrp->PrimaryGroup);
|
|
|
|
free (pgrp);
|
|
|
|
if (p->gid == (gid_t)-1)
|
2012-10-25 10:08:39 +02:00
|
|
|
log (LOG_WARNING,"WARNING: Group not found in /etc/group! Using gid -1!");
|
2003-11-19 19:49:41 +01:00
|
|
|
|
|
|
|
/* Generate gid list from token group's SID list. Also look if the token
|
|
|
|
has an enabled admin group SID. That means, the process has admin
|
|
|
|
privileges. That knowledge is used in suser(). */
|
|
|
|
PTOKEN_GROUPS gsids;
|
|
|
|
if (!(gsids = (PTOKEN_GROUPS)get_token_info (tok, TokenGroups)))
|
|
|
|
goto faulty;
|
|
|
|
if (gsids->GroupCount)
|
|
|
|
{
|
|
|
|
p->gidlist = (gid_t *) calloc (gsids->GroupCount, sizeof (gid_t));
|
|
|
|
if (p->gidlist)
|
|
|
|
p->gidcnt = gsids->GroupCount;
|
|
|
|
}
|
|
|
|
for (DWORD i = 0; i < gsids->GroupCount; ++i)
|
|
|
|
{
|
|
|
|
if (p->gidlist)
|
|
|
|
p->gidlist[i] = cygwin_internal (CW_GET_GID_FROM_SID,
|
|
|
|
gsids->Groups[i].Sid);
|
|
|
|
if (EqualSid (gsids->Groups[i].Sid, admininstrator_group_sid)
|
|
|
|
&& (gsids->Groups[i].Attributes & SE_GROUP_ENABLED))
|
|
|
|
p->is_admin = true;
|
|
|
|
}
|
|
|
|
free (gsids);
|
|
|
|
|
|
|
|
CloseHandle (tok);
|
|
|
|
return true;
|
|
|
|
|
|
|
|
faulty:
|
|
|
|
CloseHandle (tok);
|
|
|
|
log (LOG_CRIT, "Failed to get token information for pid %d, winpid %d",
|
|
|
|
p->cygpid, p->winpid);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Windows wrapper implementation of the VM functions called by sysv_shm.cc.
|
|
|
|
*/
|
|
|
|
|
|
|
|
vm_object_t
|
|
|
|
_vm_pager_allocate (int size, int shmflg)
|
|
|
|
{
|
|
|
|
/* Create the file mapping object with full access for everyone. This is
|
|
|
|
necessary to allow later calls to shmctl(..., IPC_SET,...) to
|
|
|
|
change the access rights and ownership of a shared memory region.
|
|
|
|
The access rights are tested at the beginning of every shm... function.
|
|
|
|
Note that this does not influence the actual read or write access
|
|
|
|
defined in a call to shmat. */
|
|
|
|
vm_object_t object = CreateFileMapping (INVALID_HANDLE_VALUE, &sec_all_nih,
|
|
|
|
PAGE_READWRITE, 0, size, NULL);
|
|
|
|
if (!object)
|
2008-02-06 23:30:38 +01:00
|
|
|
panic ("CreateFileMapping in _vm_pager_allocate failed, %lu", GetLastError ());
|
2003-11-19 19:49:41 +01:00
|
|
|
return object;
|
|
|
|
}
|
|
|
|
|
|
|
|
vm_object_t
|
|
|
|
vm_object_duplicate (struct thread *td, vm_object_t object)
|
|
|
|
{
|
|
|
|
vm_object_t dup_object;
|
2004-07-20 18:06:14 +02:00
|
|
|
if (!DuplicateHandle (GetCurrentProcess (), object,
|
|
|
|
td->client->handle (), &dup_object,
|
|
|
|
0, TRUE, DUPLICATE_SAME_ACCESS))
|
2008-02-06 23:30:38 +01:00
|
|
|
panic ("!DuplicateHandle in vm_object_duplicate failed, %lu", GetLastError ());
|
2003-11-19 19:49:41 +01:00
|
|
|
return dup_object;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
vm_object_deallocate (vm_object_t object)
|
|
|
|
{
|
|
|
|
if (object)
|
|
|
|
CloseHandle (object);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Tunable parameters are read from a system wide cygserver.conf file.
|
|
|
|
* On the first call to tunable_int_fetch, the file is read and the
|
|
|
|
* parameters are set accordingly. Each parameter has default, max and
|
|
|
|
* min settings.
|
|
|
|
*/
|
|
|
|
|
|
|
|
enum tun_params_type {
|
|
|
|
TUN_NULL,
|
|
|
|
TUN_INT,
|
|
|
|
TUN_BOOL
|
|
|
|
};
|
|
|
|
|
|
|
|
union tun_value {
|
|
|
|
long ival;
|
|
|
|
tun_bool_t bval;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct tun_struct {
|
|
|
|
const char *name;
|
|
|
|
tun_params_type type;
|
|
|
|
union tun_value value;
|
|
|
|
union tun_value min;
|
|
|
|
union tun_value max;
|
|
|
|
void (*check_func)(tun_struct *, char *, const char *);
|
|
|
|
};
|
|
|
|
|
|
|
|
static void
|
|
|
|
default_tun_check (tun_struct *that, char *value, const char *fname)
|
|
|
|
{
|
|
|
|
char *c = NULL;
|
|
|
|
tun_value val;
|
|
|
|
switch (that->type)
|
|
|
|
{
|
|
|
|
case TUN_INT:
|
|
|
|
val.ival = strtoul (value, &c, 10);
|
|
|
|
if (!val.ival || (c && *c))
|
|
|
|
panic ("Error in config file %s: Value of parameter %s malformed",
|
|
|
|
fname, that->name);
|
|
|
|
if (val.ival < that->min.ival || val.ival > that->max.ival)
|
|
|
|
panic ("Error in config file %s: Value of parameter %s must be "
|
|
|
|
"between %lu and %lu",
|
|
|
|
fname, that->name, that->min.ival, that->max.ival);
|
|
|
|
if (that->value.ival)
|
|
|
|
panic ("Error in config file %s: Parameter %s set twice.\n",
|
|
|
|
fname, that->name);
|
|
|
|
that->value.ival = val.ival;
|
|
|
|
break;
|
|
|
|
case TUN_BOOL:
|
|
|
|
if (!strcasecmp (value, "no") || !strcasecmp (value, "n")
|
|
|
|
|| !strcasecmp (value, "false") || !strcasecmp (value, "f")
|
|
|
|
|| !strcasecmp (value, "0"))
|
|
|
|
val.bval = TUN_FALSE;
|
|
|
|
else if (!strcasecmp (value, "yes") || !strcasecmp (value, "y")
|
|
|
|
|| !strcasecmp (value, "true") || !strcasecmp (value, "t")
|
|
|
|
|| !strcasecmp (value, "1"))
|
|
|
|
val.bval = TUN_TRUE;
|
|
|
|
else
|
|
|
|
panic ("Error in config file %s: Value of parameter %s malformed\n"
|
|
|
|
"Allowed values: \"yes\", \"no\", \"y\", \"n\", \"true\", \"false\", \"t\", \"f\", \"1\" and \"0\"", fname, that->name);
|
|
|
|
that->value.bval = val.bval;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* Shouldn't happen. */
|
|
|
|
panic ("Internal error: Wrong type of tunable parameter");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static tun_struct tunable_params[] =
|
|
|
|
{
|
|
|
|
/* SRV */
|
2005-11-10 16:04:06 +01:00
|
|
|
{ "kern.srv.cleanup_threads", TUN_INT, {0}, {1}, {32}, default_tun_check},
|
|
|
|
{ "kern.srv.request_threads", TUN_INT, {0}, {1}, {310}, default_tun_check},
|
|
|
|
{ "kern.srv.process_cache_size", TUN_INT, {0}, {1}, {310}, default_tun_check},
|
2003-11-19 19:49:41 +01:00
|
|
|
{ "kern.srv.sharedmem", TUN_BOOL, {TUN_UNDEF}, {TUN_FALSE}, {TUN_TRUE}, default_tun_check},
|
|
|
|
{ "kern.srv.msgqueues", TUN_BOOL, {TUN_UNDEF}, {TUN_FALSE}, {TUN_TRUE}, default_tun_check},
|
|
|
|
{ "kern.srv.semaphores", TUN_BOOL, {TUN_UNDEF}, {TUN_FALSE}, {TUN_TRUE}, default_tun_check},
|
|
|
|
|
|
|
|
/* LOG */
|
|
|
|
{ "kern.log.syslog", TUN_BOOL, {TUN_UNDEF}, {TUN_FALSE}, {TUN_TRUE}, default_tun_check},
|
|
|
|
{ "kern.log.stderr", TUN_BOOL, {TUN_UNDEF}, {TUN_FALSE}, {TUN_TRUE}, default_tun_check},
|
|
|
|
{ "kern.log.debug", TUN_BOOL, {TUN_UNDEF}, {TUN_FALSE}, {TUN_TRUE}, default_tun_check},
|
|
|
|
{ "kern.log.level", TUN_INT, {0}, {1}, {7}, default_tun_check},
|
|
|
|
|
|
|
|
/* MSG */
|
2003-12-16 11:13:34 +01:00
|
|
|
{ "kern.ipc.msgseg", TUN_INT, {0}, {256}, {65535}, default_tun_check},
|
2003-11-19 19:49:41 +01:00
|
|
|
{ "kern.ipc.msgssz", TUN_INT, {0}, {8}, {1024}, default_tun_check},
|
2003-12-16 11:13:34 +01:00
|
|
|
{ "kern.ipc.msgmnb", TUN_INT, {0}, {1}, {65535}, default_tun_check},
|
2003-11-19 19:49:41 +01:00
|
|
|
{ "kern.ipc.msgmni", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
2003-12-16 11:13:34 +01:00
|
|
|
{ "kern.ipc.msgtql", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
2003-11-19 19:49:41 +01:00
|
|
|
|
|
|
|
/* SEM */
|
|
|
|
//{ "kern.ipc.semmap", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
|
|
|
{ "kern.ipc.semmni", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
|
|
|
{ "kern.ipc.semmns", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
|
|
|
{ "kern.ipc.semmnu", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
|
|
|
{ "kern.ipc.semmsl", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
|
|
|
{ "kern.ipc.semopm", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
|
|
|
{ "kern.ipc.semume", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
|
|
|
//{ "kern.ipc.semusz", TUN_INT, {0}, {1}, {1024}, default_tun_check},
|
|
|
|
{ "kern.ipc.semvmx", TUN_INT, {0}, {1}, {32767}, default_tun_check},
|
|
|
|
{ "kern.ipc.semaem", TUN_INT, {0}, {1}, {32767}, default_tun_check},
|
|
|
|
|
|
|
|
/* SHM */
|
|
|
|
{ "kern.ipc.shmmaxpgs", TUN_INT, {0}, {1}, {32767}, default_tun_check},
|
|
|
|
//{ "kern.ipc.shmmin", TUN_INT, {0}, {1}, {32767}, default_tun_check},
|
|
|
|
{ "kern.ipc.shmmni", TUN_INT, {0}, {1}, {32767}, default_tun_check},
|
|
|
|
{ "kern.ipc.shmseg", TUN_INT, {0}, {1}, {32767}, default_tun_check},
|
2007-11-05 16:45:52 +01:00
|
|
|
{ "kern.ipc.shm_allow_removed", TUN_BOOL, {TUN_UNDEF}, {TUN_FALSE}, {TUN_TRUE}, default_tun_check},
|
2003-11-19 19:49:41 +01:00
|
|
|
//{ "kern.ipc.shm_use_phys", TUN_INT, {0}, {1}, {32767}, default_tun_check},
|
|
|
|
{ NULL, TUN_NULL, {0}, {0}, {0}, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
#define skip_whitespace(c) while (*(c) && isspace (*(c))) ++(c)
|
|
|
|
#define skip_nonwhitespace(c) while (*(c) && !isspace (*(c)) && *(c) != '#') ++(c)
|
|
|
|
#define end_of_content(c) (!*(c) || *(c) == '#')
|
|
|
|
|
|
|
|
void
|
|
|
|
tunable_param_init (const char *config_file, bool force)
|
|
|
|
{
|
|
|
|
FILE *fp = fopen (config_file, "rt");
|
|
|
|
if (!fp)
|
|
|
|
{
|
|
|
|
if (force)
|
|
|
|
panic ("can't open config file %s\n", config_file);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
char line[1024];
|
|
|
|
while (fgets (line, 1024, fp))
|
|
|
|
{
|
|
|
|
char *c = strrchr (line, '\n');
|
|
|
|
if (!c)
|
|
|
|
panic ("Line too long in confg file %s\n", config_file);
|
|
|
|
/* Overwrite trailing NL. */
|
|
|
|
*c = '\0';
|
|
|
|
c = line;
|
|
|
|
skip_whitespace (c);
|
|
|
|
if (end_of_content (c))
|
|
|
|
continue;
|
|
|
|
/* So we are on the first character of a parameter name. */
|
|
|
|
char *name = c;
|
|
|
|
/* Find end of name. */
|
|
|
|
skip_nonwhitespace (c);
|
|
|
|
if (end_of_content (c))
|
|
|
|
{
|
|
|
|
*c++ = '\0';
|
|
|
|
panic ("Error in config file %s: Parameter %s has no value.\n",
|
|
|
|
config_file, name);
|
|
|
|
}
|
|
|
|
/* Mark end of name. */
|
|
|
|
*c++ = '\0';
|
|
|
|
skip_whitespace (c);
|
|
|
|
if (end_of_content (c))
|
|
|
|
panic ("Error in config file %s: Parameter %s has no value.\n",
|
|
|
|
config_file, name);
|
|
|
|
/* Now we are on the first character of a parameter's value. */
|
|
|
|
char *value = c;
|
|
|
|
/* This only works for simple parameters. If complex string parameters
|
|
|
|
are added at one point, the scanning routine must be changed here. */
|
|
|
|
/* Find end of value. */
|
|
|
|
skip_nonwhitespace (c);
|
|
|
|
/* Mark end of value. */
|
|
|
|
*c++ = '\0';
|
|
|
|
/* Now look if name is one from our list. */
|
|
|
|
tun_struct *s;
|
|
|
|
for (s = &tunable_params[0]; s->name; ++s)
|
|
|
|
if (!strcmp (name, s->name))
|
|
|
|
{
|
|
|
|
/* Now read value and check for validity. check_func doesn't
|
|
|
|
return on error. */
|
|
|
|
s->check_func (s, value, config_file);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!s->name)
|
|
|
|
panic ("Error in config file %s: Unknown parameter %s.\n",
|
|
|
|
config_file, name);
|
|
|
|
}
|
|
|
|
fclose (fp);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2013-04-23 11:44:36 +02:00
|
|
|
tunable_int_fetch (const char *name, int32_t *tunable_target)
|
2003-11-19 19:49:41 +01:00
|
|
|
{
|
|
|
|
tun_struct *s;
|
|
|
|
for (s = &tunable_params[0]; s->name; ++s)
|
|
|
|
if (!strcmp (name, s->name))
|
|
|
|
break;
|
|
|
|
if (!s) /* Not found */
|
|
|
|
return;
|
|
|
|
if (s->type != TUN_INT) /* Wrong type */
|
|
|
|
return;
|
|
|
|
if (!s->value.ival) /* Not set in config file */
|
|
|
|
return;
|
|
|
|
*tunable_target = s->value.ival;
|
|
|
|
debug ("\nSet %s to %lu\n", name, *tunable_target);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
tunable_bool_fetch (const char *name, tun_bool_t *tunable_target)
|
|
|
|
{
|
|
|
|
tun_struct *s;
|
|
|
|
const char *tun_bool_val_string[] = { "undefined", "no", "yes" };
|
|
|
|
for (s = &tunable_params[0]; s->name; ++s)
|
|
|
|
if (!strcmp (name, s->name))
|
|
|
|
break;
|
|
|
|
if (!s) /* Not found */
|
|
|
|
return;
|
|
|
|
if (s->type != TUN_BOOL) /* Wrong type */
|
|
|
|
return;
|
|
|
|
if (!s->value.ival) /* Not set in config file */
|
|
|
|
return;
|
|
|
|
*tunable_target = s->value.bval;
|
|
|
|
debug ("\nSet %s to %s\n", name, tun_bool_val_string[*tunable_target]);
|
|
|
|
}
|
|
|
|
#endif /* __OUTSIDE_CYGWIN__ */
|