Subversion Repositories HelenOS

Rev

Rev 3343 | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 3343 Rev 3862
1
/*
1
/*
2
 * Copyright (c) 2006 Jakub Jermar
2
 * Copyright (c) 2006 Jakub Jermar
3
 * All rights reserved.
3
 * All rights reserved.
4
 *
4
 *
5
 * Redistribution and use in source and binary forms, with or without
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
6
 * modification, are permitted provided that the following conditions
7
 * are met:
7
 * are met:
8
 *
8
 *
9
 * - Redistributions of source code must retain the above copyright
9
 * - Redistributions of source code must retain the above copyright
10
 *   notice, this list of conditions and the following disclaimer.
10
 *   notice, this list of conditions and the following disclaimer.
11
 * - Redistributions in binary form must reproduce the above copyright
11
 * - Redistributions in binary form must reproduce the above copyright
12
 *   notice, this list of conditions and the following disclaimer in the
12
 *   notice, this list of conditions and the following disclaimer in the
13
 *   documentation and/or other materials provided with the distribution.
13
 *   documentation and/or other materials provided with the distribution.
14
 * - The name of the author may not be used to endorse or promote products
14
 * - The name of the author may not be used to endorse or promote products
15
 *   derived from this software without specific prior written permission.
15
 *   derived from this software without specific prior written permission.
16
 *
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
 */
27
 */
28
 
28
 
29
/** @addtogroup generic
29
/** @addtogroup generic
30
 * @{
30
 * @{
31
 */
31
 */
32
 
32
 
33
/**
33
/**
34
 * @file    cap.c
34
 * @file    cap.c
35
 * @brief   Capabilities control.
35
 * @brief   Capabilities control.
36
 *
36
 *
37
 * @see cap.h
37
 * @see cap.h
38
 */
38
 */
39
 
39
 
40
#include <security/cap.h>
40
#include <security/cap.h>
41
#include <proc/task.h>
41
#include <proc/task.h>
42
#include <synch/spinlock.h>
42
#include <synch/spinlock.h>
43
#include <syscall/sysarg64.h>
43
#include <syscall/sysarg64.h>
44
#include <syscall/copy.h>
44
#include <syscall/copy.h>
45
#include <arch.h>
45
#include <arch.h>
-
 
46
#include <arch/asm.h>
46
#include <errno.h>
47
#include <errno.h>
47
 
48
 
48
/** Set capabilities.
49
/** Set capabilities.
49
 *
50
 *
50
 * @param t Task whose capabilities are to be changed.
51
 * @param t Task whose capabilities are to be changed.
51
 * @param caps New set of capabilities.
52
 * @param caps New set of capabilities.
52
 */
53
 */
53
void cap_set(task_t *t, cap_t caps)
54
void cap_set(task_t *t, cap_t caps)
54
{
55
{
55
    ipl_t ipl;
56
    ipl_t ipl;
56
   
57
   
57
    ipl = interrupts_disable();
58
    ipl = interrupts_disable();
58
    spinlock_lock(&t->lock);
59
    spinlock_lock(&t->lock);
59
   
60
   
60
    t->capabilities = caps;
61
    t->capabilities = caps;
61
   
62
   
62
    spinlock_unlock(&t->lock);
63
    spinlock_unlock(&t->lock);
63
    interrupts_restore(ipl);
64
    interrupts_restore(ipl);
64
}
65
}
65
 
66
 
66
/** Get capabilities.
67
/** Get capabilities.
67
 *
68
 *
68
 * @param t Task whose capabilities are to be returned.
69
 * @param t Task whose capabilities are to be returned.
69
 * @return Task's capabilities.
70
 * @return Task's capabilities.
70
 */
71
 */
71
cap_t cap_get(task_t *t)
72
cap_t cap_get(task_t *t)
72
{
73
{
73
    ipl_t ipl;
74
    ipl_t ipl;
74
    cap_t caps;
75
    cap_t caps;
75
   
76
   
76
    ipl = interrupts_disable();
77
    ipl = interrupts_disable();
77
    spinlock_lock(&t->lock);
78
    spinlock_lock(&t->lock);
78
   
79
   
79
    caps = t->capabilities;
80
    caps = t->capabilities;
80
   
81
   
81
    spinlock_unlock(&t->lock);
82
    spinlock_unlock(&t->lock);
82
    interrupts_restore(ipl);
83
    interrupts_restore(ipl);
83
   
84
   
84
    return caps;
85
    return caps;
85
}
86
}
86
 
87
 
87
/** Grant capabilities to a task.
88
/** Grant capabilities to a task.
88
 *
89
 *
89
 * The calling task must have the CAP_CAP capability.
90
 * The calling task must have the CAP_CAP capability.
90
 *
91
 *
91
 * @param uspace_taskid_arg Userspace structure holding destination task ID.
92
 * @param uspace_taskid_arg Userspace structure holding destination task ID.
92
 * @param caps Capabilities to grant.
93
 * @param caps Capabilities to grant.
93
 *
94
 *
94
 * @return Zero on success or an error code from @ref errno.h.
95
 * @return Zero on success or an error code from @ref errno.h.
95
 */
96
 */
96
unative_t sys_cap_grant(sysarg64_t *uspace_taskid_arg, cap_t caps)
97
unative_t sys_cap_grant(sysarg64_t *uspace_taskid_arg, cap_t caps)
97
{
98
{
98
    sysarg64_t taskid_arg;
99
    sysarg64_t taskid_arg;
99
    task_t *t;
100
    task_t *t;
100
    ipl_t ipl;
101
    ipl_t ipl;
101
    int rc;
102
    int rc;
102
   
103
   
103
    if (!(cap_get(TASK) & CAP_CAP))
104
    if (!(cap_get(TASK) & CAP_CAP))
104
        return (unative_t) EPERM;
105
        return (unative_t) EPERM;
105
   
106
   
106
    rc = copy_from_uspace(&taskid_arg, uspace_taskid_arg, sizeof(sysarg64_t));
107
    rc = copy_from_uspace(&taskid_arg, uspace_taskid_arg, sizeof(sysarg64_t));
107
    if (rc != 0)
108
    if (rc != 0)
108
        return (unative_t) rc;
109
        return (unative_t) rc;
109
       
110
       
110
    ipl = interrupts_disable();
111
    ipl = interrupts_disable();
111
    spinlock_lock(&tasks_lock);
112
    spinlock_lock(&tasks_lock);
112
    t = task_find_by_id((task_id_t) taskid_arg.value);
113
    t = task_find_by_id((task_id_t) taskid_arg.value);
113
    if ((!t) || (!context_check(CONTEXT, t->context))) {
114
    if ((!t) || (!context_check(CONTEXT, t->context))) {
114
        spinlock_unlock(&tasks_lock);
115
        spinlock_unlock(&tasks_lock);
115
        interrupts_restore(ipl);
116
        interrupts_restore(ipl);
116
        return (unative_t) ENOENT;
117
        return (unative_t) ENOENT;
117
    }
118
    }
118
   
119
   
119
    spinlock_lock(&t->lock);
120
    spinlock_lock(&t->lock);
120
    cap_set(t, cap_get(t) | caps);
121
    cap_set(t, cap_get(t) | caps);
121
    spinlock_unlock(&t->lock);
122
    spinlock_unlock(&t->lock);
122
   
123
   
123
    spinlock_unlock(&tasks_lock);
124
    spinlock_unlock(&tasks_lock);
124
    interrupts_restore(ipl);   
125
    interrupts_restore(ipl);   
125
    return 0;
126
    return 0;
126
}
127
}
127
 
128
 
128
/** Revoke capabilities from a task.
129
/** Revoke capabilities from a task.
129
 *
130
 *
130
 * The calling task must have the CAP_CAP capability or the caller must
131
 * The calling task must have the CAP_CAP capability or the caller must
131
 * attempt to revoke capabilities from itself.
132
 * attempt to revoke capabilities from itself.
132
 *
133
 *
133
 * @param uspace_taskid_arg Userspace structure holding destination task ID.
134
 * @param uspace_taskid_arg Userspace structure holding destination task ID.
134
 * @param caps Capabilities to revoke.
135
 * @param caps Capabilities to revoke.
135
 *
136
 *
136
 * @return Zero on success or an error code from @ref errno.h.
137
 * @return Zero on success or an error code from @ref errno.h.
137
 */
138
 */
138
unative_t sys_cap_revoke(sysarg64_t *uspace_taskid_arg, cap_t caps)
139
unative_t sys_cap_revoke(sysarg64_t *uspace_taskid_arg, cap_t caps)
139
{
140
{
140
    sysarg64_t taskid_arg;
141
    sysarg64_t taskid_arg;
141
    task_t *t;
142
    task_t *t;
142
    ipl_t ipl;
143
    ipl_t ipl;
143
    int rc;
144
    int rc;
144
   
145
   
145
    rc = copy_from_uspace(&taskid_arg, uspace_taskid_arg, sizeof(sysarg64_t));
146
    rc = copy_from_uspace(&taskid_arg, uspace_taskid_arg, sizeof(sysarg64_t));
146
    if (rc != 0)
147
    if (rc != 0)
147
        return (unative_t) rc;
148
        return (unative_t) rc;
148
 
149
 
149
    ipl = interrupts_disable();
150
    ipl = interrupts_disable();
150
    spinlock_lock(&tasks_lock);
151
    spinlock_lock(&tasks_lock);
151
    t = task_find_by_id((task_id_t) taskid_arg.value);
152
    t = task_find_by_id((task_id_t) taskid_arg.value);
152
    if ((!t) || (!context_check(CONTEXT, t->context))) {
153
    if ((!t) || (!context_check(CONTEXT, t->context))) {
153
        spinlock_unlock(&tasks_lock);
154
        spinlock_unlock(&tasks_lock);
154
        interrupts_restore(ipl);
155
        interrupts_restore(ipl);
155
        return (unative_t) ENOENT;
156
        return (unative_t) ENOENT;
156
    }
157
    }
157
 
158
 
158
    /*
159
    /*
159
     * Revoking capabilities is different from granting them in that
160
     * Revoking capabilities is different from granting them in that
160
     * a task can revoke capabilities from itself even if it
161
     * a task can revoke capabilities from itself even if it
161
     * doesn't have CAP_CAP.
162
     * doesn't have CAP_CAP.
162
     */
163
     */
163
    if (!(cap_get(TASK) & CAP_CAP) || !(t == TASK)) {
164
    if (!(cap_get(TASK) & CAP_CAP) || !(t == TASK)) {
164
        spinlock_unlock(&tasks_lock);
165
        spinlock_unlock(&tasks_lock);
165
        interrupts_restore(ipl);
166
        interrupts_restore(ipl);
166
        return (unative_t) EPERM;
167
        return (unative_t) EPERM;
167
    }
168
    }
168
   
169
   
169
    spinlock_lock(&t->lock);
170
    spinlock_lock(&t->lock);
170
    cap_set(t, cap_get(t) & ~caps);
171
    cap_set(t, cap_get(t) & ~caps);
171
    spinlock_unlock(&t->lock);
172
    spinlock_unlock(&t->lock);
172
 
173
 
173
    spinlock_unlock(&tasks_lock);
174
    spinlock_unlock(&tasks_lock);
174
 
175
 
175
    interrupts_restore(ipl);
176
    interrupts_restore(ipl);
176
    return 0;
177
    return 0;
177
}
178
}
178
 
179
 
179
/** @}
180
/** @}
180
 */
181
 */
181
 
182
 
182
 
183