/*
- * Copyright 2000, International Business Machines Corporation and others.
+ * Copyrigh 2000, International Business Machines Corporation and others.
* All Rights Reserved.
*
* This software has been released under the terms of the IBM Public
#include <afsconfig.h>
#include "afs/param.h"
-RCSID
- ("$Header$");
#include "afs/sysincludes.h" /* Standard vendor system headers */
#include "afsincludes.h" /* Afs-based standard headers */
#include <sys/adspace.h> /* for vm_att(), vm_det() */
#endif
-static char memZero; /* address of 0 bytes for kmem_alloc */
-
-struct osimem {
- struct osimem *next;
-};
-
/* osi_Init -- do once per kernel installation initialization.
* -- On Solaris this is called from modload initialization.
* -- On AIX called from afs_config.
* -- On HP called from afsc_link.
* -- On SGI called from afs_init. */
+afs_lock_t afs_ftf; /* flush text lock */
+
#ifdef AFS_SGI53_ENV
lock_t afs_event_lock;
#endif
flid_t osi_flid;
#endif
-struct AFS_UCRED *afs_osi_credp;
+afs_ucred_t *afs_osi_credp;
+
+#if defined(AFS_SUN5_ENV) || defined(AFS_SGI_ENV)
+kmutex_t afs_global_lock;
+#endif
+
+#if defined(AFS_SGI_ENV) && !defined(AFS_SGI64_ENV)
+long afs_global_owner;
+#endif
+
+#if defined(AFS_DARWIN_ENV)
+#ifdef AFS_DARWIN80_ENV
+lck_mtx_t *afs_global_lock;
+#else
+struct lock__bsd__ afs_global_lock;
+#endif
+#endif
+
+#if defined(AFS_XBSD_ENV) && !defined(AFS_FBSD50_ENV)
+struct lock afs_global_lock;
+afs_proc_t *afs_global_owner;
+#endif
+#ifdef AFS_FBSD50_ENV
+struct mtx afs_global_mtx;
+#endif
+
+#if defined(AFS_DARWIN_ENV)
+thread_t afs_global_owner;
+#endif /* AFS_DARWIN_ENV */
+
+#if defined(AFS_AIX41_ENV)
+simple_lock_data afs_global_lock;
+#endif
void
osi_Init(void)
#if defined(AFS_GLOBAL_SUNLOCK)
#if defined(AFS_SGI62_ENV)
mutex_init(&afs_global_lock, MUTEX_DEFAULT, "afs_global_lock");
-#elif defined(AFS_OSF_ENV)
- usimple_lock_init(&afs_global_lock);
- afs_global_owner = (thread_t) 0;
+#elif defined(AFS_FBSD50_ENV)
+#if defined(AFS_FBSD80_ENV) && defined(WITNESS)
+ /* "lock_initalized" (sic) can panic, checks a flag bit
+ * is unset _before_ init */
+ memset(&afs_global_mtx, 0, sizeof(struct mtx));
+#endif
+ mtx_init(&afs_global_mtx, "AFS global lock", NULL, MTX_DEF);
#elif defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
+#if !defined(AFS_DARWIN80_ENV)
lockinit(&afs_global_lock, PLOCK, "afs global lock", 0, 0);
+#endif
afs_global_owner = 0;
#elif defined(AFS_AIX41_ENV)
lock_alloc((void *)&afs_global_lock, LOCK_ALLOC_PIN, 1, 1);
/* Linux initialization in osi directory. Should move the others. */
mutex_init(&afs_global_lock, "afs_global_lock", MUTEX_DEFAULT, NULL);
#endif
- /* afs_rxglobal_lock is initialized in rx_Init. */
#endif /* AFS_GLOBAL_SUNLOCK */
#endif /* AFS_HPUX_ENV */
if (!afs_osicred_initialized) {
-#ifdef AFS_XBSD_ENV
+#if defined(AFS_DARWIN80_ENV)
+ afs_osi_ctxtp_initialized = 0;
+ afs_osi_ctxtp = NULL; /* initialized in afs_Daemon since it has
+ a proc reference that cannot be changed */
+#endif
+#if defined(AFS_XBSD_ENV)
/* Can't just invent one, must use crget() because of mutex */
afs_osi_credp = crdup(osi_curcred());
#else
- memset(&afs_osi_cred, 0, sizeof(struct AFS_UCRED));
+ memset(&afs_osi_cred, 0, sizeof(afs_ucred_t));
+#if defined(AFS_LINUX26_ENV)
+ afs_set_cr_group_info(&afs_osi_cred, groups_alloc(0));
+#endif
+#if defined(AFS_DARWIN80_ENV)
+ afs_osi_cred.cr_ref = 1; /* kauth_cred_get_ref needs 1 existing ref */
+#else
crhold(&afs_osi_cred); /* don't let it evaporate */
+#endif
+
afs_osi_credp = &afs_osi_cred;
#endif
afs_osicred_initialized = 1;
init_et_to_sys_error();
}
-int
-osi_Active(register struct vcache *avc)
+/* mask signals in afsds */
+void
+afs_osi_MaskSignals(void)
{
- AFS_STATCNT(osi_Active);
-#if defined(AFS_SUN_ENV) || defined(AFS_AIX_ENV) || defined(AFS_OSF_ENV) || defined(AFS_SUN5_ENV) || (AFS_LINUX20_ENV) || defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
- if ((avc->opens > 0) || (avc->states & CMAPPED))
- return 1; /* XXX: Warning, verify this XXX */
-#elif defined(AFS_MACH_ENV)
- if (avc->opens > 0
- || ((avc->v.v_flag & VTEXT) && !inode_uncache_try(avc)))
- return 1;
-#elif defined(AFS_SGI_ENV)
- if ((avc->opens > 0) || AFS_VN_MAPPED(AFSTOV(avc)))
- return 1;
-#else
- if (avc->opens > 0 || (AFSTOV(avc)->v_flag & VTEXT))
- return (1);
+#ifdef AFS_LINUX22_ENV
+ osi_linux_mask();
#endif
- return 0;
}
-/* this call, unlike osi_FlushText, is supposed to discard caches that may
- contain invalid information if a file is written remotely, but that may
- contain valid information that needs to be written back if the file is
- being written locally. It doesn't subsume osi_FlushText, since the latter
- function may be needed to flush caches that are invalidated by local writes.
-
- avc->pvnLock is already held, avc->lock is guaranteed not to be held (by
- us, of course).
-*/
+/* unmask signals in rxk listener */
void
-osi_FlushPages(register struct vcache *avc, struct AFS_UCRED *credp)
+afs_osi_UnmaskRxkSignals(void)
{
- afs_hyper_t origDV;
- ObtainReadLock(&avc->lock);
- /* If we've already purged this version, or if we're the ones
- * writing this version, don't flush it (could lose the
- * data we're writing). */
- if ((hcmp((avc->m.DataVersion), (avc->mapDV)) <= 0)
- || ((avc->execsOrWriters > 0) && afs_DirtyPages(avc))) {
- ReleaseReadLock(&avc->lock);
- return;
- }
- ReleaseReadLock(&avc->lock);
- ObtainWriteLock(&avc->lock, 10);
- /* Check again */
- if ((hcmp((avc->m.DataVersion), (avc->mapDV)) <= 0)
- || ((avc->execsOrWriters > 0) && afs_DirtyPages(avc))) {
- ReleaseWriteLock(&avc->lock);
- return;
- }
- if (hiszero(avc->mapDV)) {
- hset(avc->mapDV, avc->m.DataVersion);
- ReleaseWriteLock(&avc->lock);
- return;
- }
-
- AFS_STATCNT(osi_FlushPages);
- hset(origDV, avc->m.DataVersion);
- afs_Trace3(afs_iclSetp, CM_TRACE_FLUSHPAGES, ICL_TYPE_POINTER, avc,
- ICL_TYPE_INT32, origDV.low, ICL_TYPE_INT32, avc->m.Length);
-
- ReleaseWriteLock(&avc->lock);
- AFS_GUNLOCK();
- osi_VM_FlushPages(avc, credp);
- AFS_GLOCK();
- ObtainWriteLock(&avc->lock, 88);
-
- /* do this last, and to original version, since stores may occur
- * while executing above PUTPAGE call */
- hset(avc->mapDV, origDV);
- ReleaseWriteLock(&avc->lock);
}
-afs_lock_t afs_ftf; /* flush text lock */
-
-#ifdef AFS_TEXT_ENV
-
-/* This call is supposed to flush all caches that might be invalidated
- * by either a local write operation or a write operation done on
- * another client. This call may be called repeatedly on the same
- * version of a file, even while a file is being written, so it
- * shouldn't do anything that would discard newly written data before
- * it is written to the file system. */
-
-void
-osi_FlushText_really(register struct vcache *vp)
+/* Two hacks to try and fix afsdb */
+void
+afs_osi_MaskUserLoop()
{
- afs_hyper_t fdv; /* version before which we'll flush */
-
- AFS_STATCNT(osi_FlushText);
- /* see if we've already flushed this data version */
- if (hcmp(vp->m.DataVersion, vp->flushDV) <= 0)
- return;
-
-#ifdef AFS_DEC_ENV
- {
- void afs_gfs_FlushText();
- afs_gfs_FlushText(vp);
- return;
- }
+#ifdef AFS_DARWIN_ENV
+ afs_osi_Invisible();
+ afs_osi_fullSigMask();
#else
-
- MObtainWriteLock(&afs_ftf, 317);
- hset(fdv, vp->m.DataVersion);
-
- /* why this disgusting code below?
- * xuntext, called by xrele, doesn't notice when it is called
- * with a freed text object. Sun continually calls xrele or xuntext
- * without any locking, as long as VTEXT is set on the
- * corresponding vnode.
- * But, if the text object is locked when you check the VTEXT
- * flag, several processes can wait in xuntext, waiting for the
- * text lock; when the second one finally enters xuntext's
- * critical region, the text object is already free, but the check
- * was already done by xuntext's caller.
- * Even worse, it turns out that xalloc locks the text object
- * before reading or stating a file via the vnode layer. Thus, we
- * could end up in getdcache, being asked to bring in a new
- * version of a file, but the corresponding text object could be
- * locked. We can't flush the text object without causing
- * deadlock, so now we just don't try to lock the text object
- * unless it is guaranteed to work. And we try to flush the text
- * when we need to a bit more often at the vnode layer. Sun
- * really blew the vm-cache flushing interface.
- */
-
-#if defined (AFS_HPUX_ENV)
- if (vp->v.v_flag & VTEXT) {
- xrele(vp);
-
- if (vp->v.v_flag & VTEXT) { /* still has a text object? */
- MReleaseWriteLock(&afs_ftf);
- return;
- }
- }
+ afs_osi_MaskSignals();
#endif
-
- /* next do the stuff that need not check for deadlock problems */
- mpurge(vp);
-
- /* finally, record that we've done it */
- hset(vp->flushDV, fdv);
- MReleaseWriteLock(&afs_ftf);
-
-#endif /* AFS_DEC_ENV */
}
-#ifdef AFS_DEC_ENV
-/* I don't really like using xinval() here, because it kills processes
- * a bit aggressively. Previous incarnations of this functionality
- * used to use xrele() instead of xinval, and didn't invoke
- * cacheinval(). But they would panic. So it might be worth looking
- * into some middle ground...
- */
-static void
-afs_gfs_FlushText(register struct vcache *vp)
-{
- afs_hyper_t fdv; /* version before which we'll flush */
- register struct text *xp;
- struct gnode *gp;
-
- MObtainWriteLock(&afs_ftf, 318);
- hset(fdv, vp->m.DataVersion);
- gp = afs_vntogn(vp);
-
- if (!gp) {
- /* this happens frequently after cores are created. */
- MReleaseWriteLock(&afs_ftf);
- return;
- }
-
- if (gp->g_flag & GTEXT) {
- if (gp->g_textp) {
- xp = (struct text *)gp->g_textp;
- /* if text object is locked, give up */
- if (xp && (xp->x_flag & XLOCK)) {
- MReleaseWriteLock(&afs_ftf);
- return;
- }
- } else
- xp = NULL;
-
- if (gp->g_flag & GTEXT) { /* still has a text object? */
- xinval(gp);
- }
- }
-
- /* next do the stuff that need not check for deadlock problems */
- /* maybe xinval(gp); here instead of above */
- binval(NODEV, gp);
- cacheinval(gp);
- /* finally, record that we've done it */
- hset(vp->flushDV, fdv);
-
- MReleaseWriteLock(&afs_ftf);
-}
-#endif /* AFS_DEC_ENV */
-
-#endif /* AFS_TEXT_ENV */
-
-/* mask signals in afsds */
-void
-afs_osi_MaskSignals(void)
+void
+afs_osi_UnmaskUserLoop(void)
{
-#ifdef AFS_LINUX22_ENV
- osi_linux_mask();
+#ifdef AFS_DARWIN_ENV
+ afs_osi_fullSigRestore();
#endif
}
-/* unmask signals in rxk listener */
-void
-afs_osi_UnmaskRxkSignals(void)
-{
-}
-
/* register rxk listener proc info */
void
afs_osi_RxkRegister(void)
{
-#ifdef AFS_LINUX22_ENV
- osi_linux_rxkreg();
-#endif
}
/* procedure for making our processes as invisible as we can */
{
#ifdef AFS_LINUX22_ENV
afs_osi_MaskSignals();
-#elif defined(AFS_DEC_ENV)
- u.u_procp->p_type |= SSYS;
#elif defined(AFS_SUN5_ENV)
curproc->p_flag |= SSYS;
#elif defined(AFS_HPUX101_ENV) && !defined(AFS_HPUX1123_ENV)
set_system_proc(u.u_procp);
+#elif defined(AFS_DARWIN80_ENV)
#elif defined(AFS_DARWIN_ENV)
/* maybe call init_process instead? */
current_proc()->p_flag |= P_SYSTEM;
AFS_STATCNT(osi_Invisible);
}
+void
+afs_osi_Visible(void)
+{
+#if defined(AFS_SUN5_ENV)
+ curproc->p_flag &= ~SSYS;
+#elif defined(AFS_DARWIN80_ENV)
+#elif defined(AFS_DARWIN_ENV)
+ /* maybe call init_process instead? */
+ current_proc()->p_flag &= ~P_SYSTEM;
+#elif defined(AFS_XBSD_ENV)
+ curproc->p_flag &= ~P_SYSTEM;
+#endif
+}
-#if !defined(AFS_LINUX20_ENV) && !defined(AFS_FBSD_ENV)
+#if !defined(AFS_LINUX20_ENV) && !defined(AFS_XBSD_ENV)
/* set the real time */
void
afs_osi_SetTime(osi_timeval_t * atv)
stime(&sta);
AFS_GLOCK();
#elif defined(AFS_DARWIN_ENV)
+#ifndef AFS_DARWIN80_ENV
AFS_GUNLOCK();
setthetime(atv);
AFS_GLOCK();
+#endif
#else
/* stolen from kern_time.c */
#ifndef AFS_AUX_ENV
#endif /* AFS_LINUX20_ENV */
-void *
-afs_osi_Alloc(size_t x)
-{
- register struct osimem *tm = NULL;
- register int size;
-
- AFS_STATCNT(osi_Alloc);
- /* 0-length allocs may return NULL ptr from AFS_KALLOC, so we special-case
- * things so that NULL returned iff an error occurred */
- if (x == 0)
- return &memZero;
-
- AFS_STATS(afs_stats_cmperf.OutStandingAllocs++);
- AFS_STATS(afs_stats_cmperf.OutStandingMemUsage += x);
-#ifdef AFS_LINUX20_ENV
- return osi_linux_alloc(x, 1);
-#else
- size = x;
- tm = (struct osimem *)AFS_KALLOC(size);
-#ifdef AFS_SUN_ENV
- if (!tm)
- osi_Panic("osi_Alloc: Couldn't allocate %d bytes; out of memory!\n",
- size);
-#endif
- return (void *)tm;
-#endif
-}
-
-#if defined(AFS_SUN_ENV) || defined(AFS_SGI_ENV)
-
-void *
-afs_osi_Alloc_NoSleep(size_t x)
-{
- register struct osimem *tm;
- register int size;
-
- AFS_STATCNT(osi_Alloc);
- /* 0-length allocs may return NULL ptr from AFS_KALLOC, so we special-case
- * things so that NULL returned iff an error occurred */
- if (x == 0)
- return &memZero;
-
- size = x;
- AFS_STATS(afs_stats_cmperf.OutStandingAllocs++);
- AFS_STATS(afs_stats_cmperf.OutStandingMemUsage += x);
- tm = (struct osimem *)AFS_KALLOC_NOSLEEP(size);
- return (void *)tm;
-}
-
-#endif /* SUN || SGI */
-
-void
-afs_osi_Free(void *x, size_t asize)
-{
- AFS_STATCNT(osi_Free);
- if (x == &memZero)
- return; /* check for putting memZero back */
-
- AFS_STATS(afs_stats_cmperf.OutStandingAllocs--);
- AFS_STATS(afs_stats_cmperf.OutStandingMemUsage -= asize);
-#if defined(AFS_LINUX20_ENV)
- osi_linux_free(x);
-#else
- AFS_KFREE((struct osimem *)x, asize);
-#endif
-}
-
-void
-afs_osi_FreeStr(char *x)
-{
- afs_osi_Free(x, strlen(x) + 1);
-}
-
-/* ? is it moderately likely that there are dirty VM pages associated with
- * this vnode?
- *
- * Prereqs: avc must be write-locked
- *
- * System Dependencies: - *must* support each type of system for which
- * memory mapped files are supported, even if all
- * it does is return TRUE;
- *
- * NB: this routine should err on the side of caution for ProcessFS to work
- * correctly (or at least, not to introduce worse bugs than already exist)
- */
-#ifdef notdef
-int
-osi_VMDirty_p(struct vcache *avc)
-{
- int dirtyPages;
-
- if (avc->execsOrWriters <= 0)
- return 0; /* can't be many dirty pages here, I guess */
-
-#if defined (AFS_AIX32_ENV)
-#ifdef notdef
- /* because of the level of hardware involvment with VM and all the
- * warnings about "This routine must be called at VMM interrupt
- * level", I thought it would be safest to disable interrupts while
- * looking at the software page fault table. */
-
- /* convert vm handle into index into array: I think that stoinio is
- * always zero... Look into this XXX */
-#define VMHASH(handle) ( \
- ( ((handle) & ~vmker.stoinio) \
- ^ ((((handle) & ~vmker.stoinio) & vmker.stoimask) << vmker.stoihash) \
- ) & 0x000fffff)
-
- if (avc->segid) {
- unsigned int pagef, pri, index, next;
-
- index = VMHASH(avc->segid);
- if (scb_valid(index)) { /* could almost be an ASSERT */
-
- pri = disable_ints();
- for (pagef = scb_sidlist(index); pagef >= 0; pagef = next) {
- next = pft_sidfwd(pagef);
- if (pft_modbit(pagef)) { /* has page frame been modified? */
- enable_ints(pri);
- return 1;
- }
- }
- enable_ints(pri);
- }
- }
-#undef VMHASH
-#endif
-#endif /* AFS_AIX32_ENV */
-
-#if defined (AFS_SUN_ENV)
- if (avc->states & CMAPPED) {
- struct page *pg;
- for (pg = avc->v.v_s.v_Pages; pg; pg = pg->p_vpnext) {
- if (pg->p_mod) {
- return 1;
- }
- }
- }
-#endif
- return 0;
-}
-#endif /* notdef */
-
-
-/*
- * Solaris osi_ReleaseVM should not drop and re-obtain the vcache entry lock.
- * This leads to bad races when osi_ReleaseVM() is called from
- * afs_InvalidateAllSegments().
-
- * We can do this because Solaris osi_VM_Truncate() doesn't care whether the
- * vcache entry lock is held or not.
- *
- * For other platforms, in some cases osi_VM_Truncate() doesn't care, but
- * there may be cases where it does care. If so, it would be good to fix
- * them so they don't care. Until then, we assume the worst.
- *
- * Locking: the vcache entry lock is held. It is dropped and re-obtained.
- */
-void
-osi_ReleaseVM(struct vcache *avc, struct AFS_UCRED *acred)
-{
-#ifdef AFS_SUN5_ENV
- AFS_GUNLOCK();
- osi_VM_Truncate(avc, 0, acred);
- AFS_GLOCK();
-#else
- ReleaseWriteLock(&avc->lock);
- AFS_GUNLOCK();
- osi_VM_Truncate(avc, 0, acred);
- AFS_GLOCK();
- ObtainWriteLock(&avc->lock, 80);
-#endif
-}
-
-
void
shutdown_osi(void)
{
AFS_STATCNT(shutdown_osi);
+#ifdef AFS_DARWIN80_ENV
+ if (afs_osi_ctxtp_initialized && afs_osi_ctxtp) {
+ vfs_context_rele(afs_osi_ctxtp);
+ afs_osi_ctxtp = NULL;
+ afs_osi_ctxtp_initialized = 0;
+ }
+ shutdown_osisleep();
+#endif
if (afs_cold_shutdown) {
LOCK_INIT(&afs_ftf, "afs_ftf");
}
#ifndef AFS_OBSD_ENV
int
-afs_osi_suser(void *credp)
-{
-#if defined(AFS_SUN5_ENV)
- return afs_suser(credp);
-#else
- return afs_suser();
-#endif
-}
-#endif
-
-#if AFS_GCPAGS
-
-/* afs_osi_TraverseProcTable() - Walk through the systems process
- * table, calling afs_GCPAGs_perproc_func() for each process.
- */
-
-#if defined(AFS_SUN5_ENV)
-void
-afs_osi_TraverseProcTable(void)
-{
- struct proc *prp;
- for (prp = practive; prp != NULL; prp = prp->p_next) {
- afs_GCPAGs_perproc_func(prp);
- }
-}
-#endif
-
-#if defined(AFS_HPUX_ENV)
-
-/*
- * NOTE: h/proc_private.h gives the process table locking rules
- * It indicates that access to p_cred must be protected by
- * mp_mtproc_lock(p);
- * mp_mtproc_unlock(p);
- *
- * The code in sys/pm_prot.c uses pcred_lock() to protect access to
- * the process creds, and uses mp_mtproc_lock() only for audit-related
- * changes. To be safe, we use both.
- */
-
-void
-afs_osi_TraverseProcTable(void)
-{
- register proc_t *p;
- int endchain = 0;
-
- MP_SPINLOCK(activeproc_lock);
- MP_SPINLOCK(sched_lock);
- pcred_lock();
-
- /*
- * Instead of iterating through all of proc[], traverse only
- * the list of active processes. As an example of this,
- * see foreach_process() in sys/vm_sched.c.
- *
- * We hold the locks for the entire scan in order to get a
- * consistent view of the current set of creds.
- */
-
- for (p = proc; endchain == 0; p = &proc[p->p_fandx]) {
- if (p->p_fandx == 0) {
- endchain = 1;
- }
-
- if (system_proc(p))
- continue;
-
- mp_mtproc_lock(p);
- afs_GCPAGs_perproc_func(p);
- mp_mtproc_unlock(p);
- }
-
- pcred_unlock();
- MP_SPINUNLOCK(sched_lock);
- MP_SPINUNLOCK(activeproc_lock);
-}
-#endif
-
-#if defined(AFS_SGI_ENV)
-
-#ifdef AFS_SGI65_ENV
-/* TODO: Fix this later. */
-static int
-SGI_ProcScanFunc(void *p, void *arg, int mode)
-{
- return 0;
-}
-#else /* AFS_SGI65_ENV */
-static int
-SGI_ProcScanFunc(proc_t * p, void *arg, int mode)
-{
- afs_int32(*perproc_func) (struct proc *) = arg;
- int code = 0;
- /* we pass in the function pointer for arg,
- * mode ==0 for startup call, ==1 for each valid proc,
- * and ==2 for terminate call.
- */
- if (mode == 1) {
- code = perproc_func(p);
- }
- return code;
-}
-#endif /* AFS_SGI65_ENV */
-
-void
-afs_osi_TraverseProcTable(void)
-{
- procscan(SGI_ProcScanFunc, afs_GCPAGs_perproc_func);
-}
-#endif /* AFS_SGI_ENV */
-
-#if defined(AFS_AIX_ENV)
-#ifdef AFS_AIX51_ENV
-#define max_proc v.ve_proc
-#endif
-void
-afs_osi_TraverseProcTable(void)
-{
- struct proc *p;
- int i;
-
- /*
- * For binary compatibility, on AIX we need to be careful to use the
- * proper size of a struct proc, even if it is different from what
- * we were compiled with.
- */
- if (!afs_gcpags_procsize)
- return;
-
-#ifndef AFS_AIX51_ENV
- simple_lock(&proc_tbl_lock);
-#endif
- for (p = (struct proc *)v.vb_proc, i = 0; p < max_proc;
- p = (struct proc *)((char *)p + afs_gcpags_procsize), i++) {
-
-#ifdef AFS_AIX51_ENV
- if (p->p_pvprocp->pv_stat == SNONE)
- continue;
- if (p->p_pvprocp->pv_stat == SIDL)
- continue;
- if (p->p_pvprocp->pv_stat == SEXIT)
- continue;
-#else
- if (p->p_stat == SNONE)
- continue;
- if (p->p_stat == SIDL)
- continue;
- if (p->p_stat == SEXIT)
- continue;
-#endif
-
- /* sanity check */
-
- if (PROCMASK(p->p_pid) != i) {
- afs_gcpags = AFS_GCPAGS_EPIDCHECK;
- break;
- }
-
- /* sanity check */
-
- if ((p->p_nice < P_NICE_MIN) || (P_NICE_MAX < p->p_nice)) {
- afs_gcpags = AFS_GCPAGS_ENICECHECK;
- break;
- }
-
- afs_GCPAGs_perproc_func(p);
- }
-#ifndef AFS_AIX51_ENV
- simple_unlock(&proc_tbl_lock);
-#endif
-}
-#endif
-
-#if defined(AFS_OSF_ENV)
-void
-afs_osi_TraverseProcTable(void)
-{
- struct pid_entry *pe;
-#ifdef AFS_DUX50_ENV
-#define pidNPID (pidtab + npid)
-#define PID_LOCK()
-#define PID_UNLOCK()
-#endif
- PID_LOCK();
- for (pe = pidtab; pe < pidNPID; ++pe) {
- if (pe->pe_proc != PROC_NULL)
- afs_GCPAGs_perproc_func(pe->pe_proc);
- }
- PID_UNLOCK();
-}
-#endif
-
-#if defined(AFS_DARWIN_ENV) || defined(AFS_FBSD_ENV)
-void
-afs_osi_TraverseProcTable(void)
-{
- struct proc *p;
- LIST_FOREACH(p, &allproc, p_list) {
- if (p->p_stat == SIDL)
- continue;
- if (p->p_stat == SZOMB)
- continue;
- if (p->p_flag & P_SYSTEM)
- continue;
- afs_GCPAGs_perproc_func(p);
- }
-}
-#endif
-
-#if defined(AFS_LINUX22_ENV)
-void
-afs_osi_TraverseProcTable()
-{
- struct task_struct *p;
-
-#ifdef EXPORTED_TASKLIST_LOCK
- read_lock(&tasklist_lock);
-#endif
-#ifdef DEFINED_FOR_EACH_PROCESS
- for_each_process(p) if (p->pid) {
- if (p->state & TASK_ZOMBIE)
- continue;
- afs_GCPAGs_perproc_func(p);
- }
-#else
- for_each_task(p) if (p->pid) {
- if (p->state & TASK_ZOMBIE)
- continue;
- afs_GCPAGs_perproc_func(p);
- }
-#endif
-#ifdef EXPORTED_TASKLIST_LOCK
- read_unlock(&tasklist_lock);
-#endif
-}
-#endif
-
-/* return a pointer (sometimes a static copy ) to the cred for a
- * given AFS_PROC.
- * subsequent calls may overwrite the previously returned value.
- */
-
-#if defined(AFS_SGI65_ENV)
-const struct AFS_UCRED *
-afs_osi_proc2cred(AFS_PROC * p)
-{
- return NULL;
-}
-#elif defined(AFS_HPUX_ENV)
-const struct AFS_UCRED *
-afs_osi_proc2cred(AFS_PROC * p)
-{
- if (!p)
- return;
-
- /*
- * Cannot use afs_warnuser() here, as the code path
- * eventually wants to grab sched_lock, which is
- * already held here
- */
-
- return p_cred(p);
-}
-#elif defined(AFS_AIX_ENV)
-
-/* GLOBAL DECLARATIONS */
-
-/*
- * LOCKS: the caller must do
- * simple_lock(&proc_tbl_lock);
- * simple_unlock(&proc_tbl_lock);
- * around calls to this function.
- */
-
-const struct AFS_UCRED *
-afs_osi_proc2cred(AFS_PROC * pproc)
+afs_osi_suser(void *cr)
{
- struct AFS_UCRED *pcred = 0;
-
- /*
- * pointer to process user structure valid in *our*
- * address space
- *
- * The user structure for a process is stored in the user
- * address space (as distinct from the kernel address
- * space), and so to refer to the user structure of a
- * different process we must employ special measures.
- *
- * I followed the example used in the AIX getproc() system
- * call in bos/kernel/proc/getproc.c
- */
- struct user *xmem_userp;
-
- struct xmem dp; /* ptr to xmem descriptor */
- int xm; /* xmem result */
-
- if (!pproc) {
- return pcred;
- }
-
- /*
- * The process private segment in which the user
- * area is located may disappear. We need to increment
- * its use count. Therefore we
- * - get the proc_tbl_lock to hold the segment.
- * - get the p_lock to lockout vm_cleardata.
- * - vm_att to load the segment register (no check)
- * - xmattach to bump its use count.
- * - release the p_lock.
- * - release the proc_tbl_lock.
- * - do whatever we need.
- * - xmdetach to decrement the use count.
- * - vm_det to free the segment register (no check)
- */
-
- xmem_userp = NULL;
- xm = XMEM_FAIL;
- /* simple_lock(&proc_tbl_lock); */
-#ifdef __64BIT__
- if (pproc->p_adspace != vm_handle(NULLSEGID, (int32long64_t) 0)) {
-#else
- if (pproc->p_adspace != NULLSEGVAL) {
-#endif
-
-#ifdef AFS_AIX51_ENV
- simple_lock(&pproc->p_pvprocp->pv_lock);
-#else
- simple_lock(&pproc->p_lock);
-#endif
-
- if (pproc->p_threadcount &&
-#ifdef AFS_AIX51_ENV
- pproc->p_pvprocp->pv_threadlist) {
-#else
- pproc->p_threadlist) {
-#endif
-
- /*
- * arbitrarily pick the first thread in pproc
- */
- struct thread *pproc_thread =
-#ifdef AFS_AIX51_ENV
- pproc->p_pvprocp->pv_threadlist;
-#else
- pproc->p_threadlist;
-#endif
-
- /*
- * location of 'struct user' in pproc's
- * address space
- */
- struct user *pproc_userp = pproc_thread->t_userp;
-
- /*
- * create a pointer valid in my own address space
- */
-
- xmem_userp = (struct user *)vm_att(pproc->p_adspace, pproc_userp);
-
- dp.aspace_id = XMEM_INVAL;
- xm = xmattach(xmem_userp, sizeof(*xmem_userp), &dp, SYS_ADSPACE);
- }
-
-#ifdef AFS_AIX51_ENV
- simple_unlock(&pproc->p_pvprocp->pv_lock);
+#if defined(AFS_SUN510_ENV)
+ return (priv_policy(cr, PRIV_SYS_SUSER_COMPAT, B_FALSE, EPERM, NULL) == 0);
+#elif defined(AFS_SUN5_ENV)
+ return afs_suser(cr);
#else
- simple_unlock(&pproc->p_lock);
+ return afs_suser(NULL);
#endif
- }
- /* simple_unlock(&proc_tbl_lock); */
- if (xm == XMEM_SUCC) {
-
- static struct AFS_UCRED cred;
-
- /*
- * What locking should we use to protect access to the user
- * area? If needed also change the code in AIX/osi_groups.c.
- */
-
- /* copy cred to local address space */
- cred = *xmem_userp->U_cred;
- pcred = &cred;
-
- xmdetach(&dp);
- }
- if (xmem_userp) {
- vm_det((void *)xmem_userp);
- }
-
- return pcred;
-}
-
-#elif defined(AFS_OSF_ENV)
-const struct AFS_UCRED *
-afs_osi_proc2cred(AFS_PROC * pr)
-{
- struct AFS_UCRED *rv = NULL;
-
- if (pr == NULL) {
- return NULL;
- }
-
- if ((pr->p_stat == SSLEEP) || (pr->p_stat == SRUN)
- || (pr->p_stat == SSTOP))
- rv = pr->p_rcred;
-
- return rv;
-}
-#elif defined(AFS_DARWIN_ENV) || defined(AFS_FBSD_ENV)
-const struct AFS_UCRED *
-afs_osi_proc2cred(AFS_PROC * pr)
-{
- struct AFS_UCRED *rv = NULL;
- static struct AFS_UCRED cr;
-
- if (pr == NULL) {
- return NULL;
- }
-
- if ((pr->p_stat == SSLEEP) || (pr->p_stat == SRUN)
- || (pr->p_stat == SSTOP)) {
- pcred_readlock(pr);
- cr.cr_ref = 1;
- cr.cr_uid = pr->p_cred->pc_ucred->cr_uid;
- cr.cr_ngroups = pr->p_cred->pc_ucred->cr_ngroups;
- memcpy(cr.cr_groups, pr->p_cred->pc_ucred->cr_groups,
- NGROUPS * sizeof(gid_t));
- pcred_unlock(pr);
- rv = &cr;
- }
-
- return rv;
-}
-#elif defined(AFS_LINUX22_ENV)
-const struct AFS_UCRED *
-afs_osi_proc2cred(AFS_PROC * pr)
-{
- struct AFS_UCRED *rv = NULL;
- static struct AFS_UCRED cr;
-
- if (pr == NULL) {
- return NULL;
- }
-
- if ((pr->state == TASK_RUNNING) || (pr->state == TASK_INTERRUPTIBLE)
- || (pr->state == TASK_UNINTERRUPTIBLE)
- || (pr->state == TASK_STOPPED)) {
- cr.cr_ref = 1;
- cr.cr_uid = pr->uid;
- cr.cr_ngroups = pr->ngroups;
- memcpy(cr.cr_groups, pr->groups, NGROUPS * sizeof(gid_t));
- rv = &cr;
- }
-
- return rv;
-}
-#else
-const struct AFS_UCRED *
-afs_osi_proc2cred(AFS_PROC * pr)
-{
- struct AFS_UCRED *rv = NULL;
-
- if (pr == NULL) {
- return NULL;
- }
- rv = pr->p_cred;
-
- return rv;
}
#endif
-
-#endif /* AFS_GCPAGS */