/*
* Copyright (c) 2003 Apple Computer, Inc. All rights reserved.
*
* @APPLE_LICENSE_HEADER_START@
*
* "Portions Copyright (c) 2003 Apple Computer, Inc. All Rights
* Reserved. This file contains Original Code and/or Modifications of
* Original Code as defined in and that are subject to the Apple Public
* Source License Version 1.0 (the 'License'). You may not use this file
* except in compliance with the License. Please obtain a copy of the
* License at http://www.apple.com/publicsource and read it before using
* this file.
*
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
* License for the specific language governing rights and limitations
* under the License."
*
* @APPLE_LICENSE_HEADER_END@
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "notify.h"
#include "daemon.h"
#include "service.h"
#include "notify_ipc.h"
#include <mach/mach_traps.h>
#include <pthread.h>
extern uint32_t _notify_lib_check_controlled_access();
static void
register_session(task_t task)
{
mach_port_t previous;
if (ns == NULL) return;
if (server_port == MACH_PORT_NULL) return;
/* register for port death notification */
mach_port_request_notification(mach_task_self(), task, MACH_NOTIFY_DEAD_NAME, 0, server_port, MACH_MSG_TYPE_MAKE_SEND_ONCE, &previous);
mach_port_deallocate(mach_task_self(), previous);
}
void
cancel_session(task_t task)
{
client_t *c, *a, *p;
name_info_t *n;
void *tt;
list_t *l, *x;
a = NULL;
x = NULL;
p = NULL;
if (ns == NULL) return;
/* Release all clients for this session */
tt = _nc_table_traverse_start(ns->name_table);
while (tt != NULL)
{
n = _nc_table_traverse(ns->name_table, tt);
if (n == NULL) break;
for (l = n->client_list; l != NULL; l = _nc_list_next(l))
{
c = _nc_list_data(l);
if ((c->info != NULL) && (c->info->session == task))
{
a = (client_t *)calloc(1, sizeof(client_t));
if (a == NULL) return;
a->client_id = c->client_id;
a->info = c->info;
x = _nc_list_prepend(x, _nc_list_new(a));
}
}
}
_nc_table_traverse_end(ns->name_table, tt);
for (l = x; l != NULL; l = _nc_list_next(l))
{
c = _nc_list_data(l);
if (c->info != NULL)
{
if (c->info->private != NULL)
{
service_close((svc_info_t *)c->info->private, NULL);
c->info->private = NULL;
}
n = c->info->name_info;
if ((n != NULL) && (n->refcount == 1))
{
service_close((svc_info_t *)n->private, n->name);
n->private = NULL;
}
if (c->info->notify_type == NOTIFY_TYPE_MEMORY)
{
shm_refcount[n->slot]--;
}
}
_notify_lib_cancel(ns, c->client_id);
free(c);
}
_nc_list_release_list(x);
/* Release the task port */
mach_port_destroy(mach_task_self(), task);
}
kern_return_t __notify_server_post
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
int *status,
security_token_t *token
)
{
if ((ns == NULL) || (name == NULL))
{
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_post %s", name);
*status = _notify_lib_check_controlled_access(ns, name, token->val[0], token->val[1], NOTIFY_ACCESS_WRITE);
if (*status != NOTIFY_STATUS_OK)
{
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
*status = daemon_post(name, token->val[0], token->val[1]);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
kern_return_t __notify_server_register_plain
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
task_t task,
int *client_id,
int *status,
security_token_t *token
)
{
if ((ns == NULL) || (name == NULL))
{
*client_id = 0;
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_register_plain %s", name);
*status = _notify_lib_register_plain(ns, name, task, -1, token->val[0], token->val[1], client_id);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
if (*status != NOTIFY_STATUS_OK) return KERN_SUCCESS;
register_session(task);
return KERN_SUCCESS;
}
kern_return_t __notify_server_register_check
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
task_t task,
int *size,
int *slot,
int *client_id,
int *status,
security_token_t *token
)
{
name_info_t *n;
uint32_t i, j, x, new_slot;
if ((ns == NULL) || (name == NULL))
{
*size = 0;
*slot = 0;
*client_id = 0;
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_register_check %s", name);
if (shm_enabled == 0)
{
*size = -1;
*slot = -1;
return __notify_server_register_plain(server, name, nameCnt, task, client_id, status, token);
}
x = (uint32_t)-1;
n = (name_info_t *)_nc_table_find(ns->name_table, name);
if (n != NULL) x = n->slot;
new_slot = 0;
if (x == (uint32_t)-1)
{
/* find a slot */
new_slot = 1;
for (i = 0, j = slot_id + 1; i < nslots; i++, j++)
{
if (j >= nslots) j = 0;
if (shm_refcount[j] == 0)
{
x = j;
break;
}
}
if (x == (uint32_t)-1)
{
/* Ran out of slots! */
slot_id++;
if (slot_id >= nslots) slot_id = 0;
if (debug_log) log_message(LOG_ERR, "reused shared memory slot %u", slot_id);
else log_message(LOG_INFO, "reused shared memory slot %u", slot_id);
x = slot_id;
}
else
{
if (x == (slot_id + 1)) slot_id = x;
}
}
if (new_slot == 1) shm_base[x] = 1;
shm_refcount[x]++;
*size = nslots * sizeof(uint32_t);
*slot = x;
*status = _notify_lib_register_plain(ns, name, task, x, token->val[0], token->val[1], client_id);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
if (*status != NOTIFY_STATUS_OK) return KERN_SUCCESS;
register_session(task);
return KERN_SUCCESS;
}
kern_return_t __notify_server_register_signal
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
task_t task,
int sig,
int *client_id,
int *status,
security_token_t *token
)
{
if ((ns == NULL) || (name == NULL))
{
*client_id = 0;
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_register_signal %s", name);
*status = _notify_lib_register_signal(ns, name, task, sig, token->val[0], token->val[1], client_id);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
if (*status != NOTIFY_STATUS_OK) return KERN_SUCCESS;
register_session(task);
return KERN_SUCCESS;
}
kern_return_t __notify_server_register_file_descriptor
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
task_t task,
int udp_port,
int ntoken,
int *client_id,
int *status,
security_token_t *token
)
{
if ((ns == NULL) || (name == NULL))
{
*client_id = 0;
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_register_file_descriptor %s", name);
*status = _notify_lib_register_file_descriptor(ns, name, task, udp_port, ntoken, token->val[0], token->val[1], client_id);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
if (*status != NOTIFY_STATUS_OK) return KERN_SUCCESS;
register_session(task);
return KERN_SUCCESS;
}
kern_return_t __notify_server_register_mach_port
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
task_t task,
mach_port_t port,
int ntoken,
int *client_id,
int *status,
security_token_t *token
)
{
if ((ns == NULL) || (name == NULL))
{
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_register_mach_port %s", name);
*status = _notify_lib_register_mach_port(ns, name, task, port, ntoken, token->val[0], token->val[1], client_id);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
if (*status != NOTIFY_STATUS_OK) return KERN_SUCCESS;
register_session(task);
return KERN_SUCCESS;
}
kern_return_t __notify_server_cancel
(
mach_port_t server,
int client_id,
int *status,
security_token_t *token
)
{
client_t *c;
name_info_t *n;
if (ns == NULL)
{
*status = NOTIFY_STATUS_FAILED;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_cancel %u", client_id);
*status = NOTIFY_STATUS_OK;
c = _nc_table_find_n(ns->client_table, client_id);
if (c == NULL) return KERN_SUCCESS;
service_close((svc_info_t *)c->info->private, NULL);
c->info->private = NULL;
n = c->info->name_info;
if (n == NULL) return KERN_SUCCESS;
if (c->info->notify_type == NOTIFY_TYPE_MEMORY)
{
shm_refcount[n->slot]--;
}
if (n->refcount == 1)
{
service_close((svc_info_t *)n->private, n->name);
n->private = NULL;
}
_notify_lib_cancel(ns, client_id);
return KERN_SUCCESS;
}
kern_return_t __notify_server_check
(
mach_port_t server,
int client_id,
int *check,
int *status,
security_token_t *token
)
{
if (debug_log) log_message(LOG_ERR, "__notify_server_check %u", client_id);
*status = _notify_lib_check(ns, client_id, check);
return KERN_SUCCESS;
}
kern_return_t __notify_server_get_state
(
mach_port_t server,
int client_id,
int *state,
int *status,
security_token_t *token
)
{
if (debug_log) log_message(LOG_ERR, "__notify_server_get_state %u", client_id);
*status = _notify_lib_get_state(ns, client_id, state);
return KERN_SUCCESS;
}
kern_return_t __notify_server_set_state
(
mach_port_t server,
int client_id,
int state,
int *status,
security_token_t *token
)
{
if (debug_log) log_message(LOG_ERR, "__notify_server_set_state %u", client_id);
*status = _notify_lib_set_state(ns, client_id, state, token->val[0], token->val[1]);
return KERN_SUCCESS;
}
kern_return_t __notify_server_set_owner
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
int uid,
int gid,
int *status,
security_token_t *token
)
{
if ((ns == NULL) || (name == NULL))
{
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_set_owner %s %u %u", name, uid, gid);
/* only root may set owner for names */
if (token->val[0] != 0)
{
*status = NOTIFY_STATUS_NOT_AUTHORIZED;
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
*status = _notify_lib_set_owner(ns, name, uid, gid);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
kern_return_t __notify_server_get_owner
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
int *uid,
int *gid,
int *status,
security_token_t *token
)
{
if ((ns == NULL) || (name == NULL))
{
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_get_owner %s", name);
*status = _notify_lib_get_owner(ns, name, uid, gid);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
kern_return_t __notify_server_set_access
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
int mode,
int *status,
security_token_t *token
)
{
uint32_t u, g;
if ((ns == NULL) || (name == NULL))
{
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_set_access %s 0x%03x", name, mode);
_notify_lib_get_owner(ns, name, &u, &g);
/* only root and owner may set access for names */
if ((token->val[0] != 0) && (token->val[0] != u))
{
*status = NOTIFY_STATUS_NOT_AUTHORIZED;
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
*status = _notify_lib_set_access(ns, name, mode);
if ((u != 0) || (g != 0)) *status = _notify_lib_set_owner(ns, name, u, g);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
kern_return_t __notify_server_get_access
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
int *mode,
int *status,
security_token_t *token
)
{
if ((ns == NULL) || (name == NULL))
{
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_get_access %s", name);
*status = _notify_lib_get_access(ns, name, mode);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
kern_return_t __notify_server_release_name
(
mach_port_t server,
caddr_t name,
mach_msg_type_number_t nameCnt,
int *status,
security_token_t *token
)
{
uint32_t u, g;
if ((ns == NULL) || (name == NULL))
{
*status = NOTIFY_STATUS_INVALID_NAME;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_release_name %s", name);
_notify_lib_get_owner(ns, name, &u, &g);
/* only root and owner may release names */
if ((token->val[0] != 0) && (token->val[0] != u))
{
*status = NOTIFY_STATUS_NOT_AUTHORIZED;
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
*status = _notify_lib_release_name(ns, name, token->val[0], token->val[1]);
vm_deallocate(mach_task_self(), (vm_address_t)name, nameCnt);
return KERN_SUCCESS;
}
kern_return_t __notify_server_monitor_file
(
mach_port_t server,
int client_id,
caddr_t path,
mach_msg_type_number_t nameCnt,
int flags,
int *status,
security_token_t *token
)
{
client_t *c;
name_info_t *n;
if (ns == NULL)
{
*status = NOTIFY_STATUS_FAILED;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_monitor_file %d %s %d", client_id, (path == NULL) ? "NULL" : path, flags);
c = _nc_table_find_n(ns->client_table, client_id);
if (c == NULL)
{
*status = NOTIFY_STATUS_INVALID_REQUEST;
if (path != NULL) vm_deallocate(mach_task_self(), (vm_address_t)path, nameCnt);
return KERN_SUCCESS;
}
n = c->info->name_info;
if (n == NULL)
{
*status = NOTIFY_STATUS_INVALID_REQUEST;
return KERN_SUCCESS;
}
*status = service_open_file(client_id, n->name, path, flags, token->val[0], token->val[1]);
if (path != NULL) vm_deallocate(mach_task_self(), (vm_address_t)path, nameCnt);
return KERN_SUCCESS;
}
kern_return_t __notify_server_get_event
(
mach_port_t server,
int client_id,
int *event_type,
inline_data_t name,
mach_msg_type_number_t *nameCnt,
int *status,
security_token_t *token
)
{
client_t *c;
svc_info_t *s;
w_event_t *e;
uint32_t len;
if (ns == NULL)
{
*status = NOTIFY_STATUS_FAILED;
return KERN_SUCCESS;
}
if (debug_log) log_message(LOG_ERR, "__notify_server_get_event %u", client_id);
*status = NOTIFY_STATUS_INVALID_REQUEST;
*event_type = 0;
*nameCnt = 0;
c = _nc_table_find_n(ns->client_table, client_id);
if (c == NULL) return KERN_SUCCESS;
s = (svc_info_t *)c->info->private;
if (s == NULL) return KERN_SUCCESS;
e = service_get_event(s);
*status = NOTIFY_STATUS_OK;
if (e == NULL) return KERN_SUCCESS;
*event_type = e->type;
len = strlen(e->name) + 1;
memcpy(name, e->name, len);
*nameCnt = len;
w_event_release(e);
return KERN_SUCCESS;
}
syntax highlighted by Code2HTML, v. 0.9.1