sysv_sem.c revision 1.37 1 /* $NetBSD: sysv_sem.c,v 1.37 2000/05/27 21:00:25 sommerfeld Exp $ */
2
3 /*-
4 * Copyright (c) 1999 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
9 * NASA Ames Research Center.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. All advertising materials mentioning features or use of this software
20 * must display the following acknowledgement:
21 * This product includes software developed by the NetBSD
22 * Foundation, Inc. and its contributors.
23 * 4. Neither the name of The NetBSD Foundation nor the names of its
24 * contributors may be used to endorse or promote products derived
25 * from this software without specific prior written permission.
26 *
27 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
28 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
29 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
30 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
31 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
32 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
33 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
34 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
35 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
36 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
37 * POSSIBILITY OF SUCH DAMAGE.
38 */
39
40 /*
41 * Implementation of SVID semaphores
42 *
43 * Author: Daniel Boulet
44 *
45 * This software is provided ``AS IS'' without any warranties of any kind.
46 */
47
48 #define SYSVSEM
49
50 #include <sys/param.h>
51 #include <sys/systm.h>
52 #include <sys/kernel.h>
53 #include <sys/proc.h>
54 #include <sys/sem.h>
55 #include <sys/malloc.h>
56
57 #include <sys/mount.h>
58 #include <sys/syscallargs.h>
59
60 int semtot = 0;
61
62 #ifdef SEM_DEBUG
63 #define SEM_PRINTF(a) printf a
64 #else
65 #define SEM_PRINTF(a)
66 #endif
67
68 struct sem_undo *semu_alloc __P((struct proc *));
69 int semundo_adjust __P((struct proc *, struct sem_undo **, int, int, int));
70 void semundo_clear __P((int, int));
71
72 /*
73 * XXXSMP Once we go MP, there needs to be a lock for the semaphore system.
74 * Until then, we're saved by being a non-preemptive kernel.
75 */
76
77 void
78 seminit()
79 {
80 int i;
81
82 if (sema == NULL)
83 panic("sema is NULL");
84 if (semu == NULL)
85 panic("semu is NULL");
86
87 for (i = 0; i < seminfo.semmni; i++) {
88 sema[i]._sem_base = 0;
89 sema[i].sem_perm.mode = 0;
90 }
91 for (i = 0; i < seminfo.semmnu; i++) {
92 struct sem_undo *suptr = SEMU(i);
93 suptr->un_proc = NULL;
94 }
95 semu_list = NULL;
96 }
97
98 /*
99 * Placebo.
100 */
101
102 int
103 sys_semconfig(p, v, retval)
104 struct proc *p;
105 void *v;
106 register_t *retval;
107 {
108 *retval = 0;
109 return 0;
110 }
111
112 /*
113 * Allocate a new sem_undo structure for a process
114 * (returns ptr to structure or NULL if no more room)
115 */
116
117 struct sem_undo *
118 semu_alloc(p)
119 struct proc *p;
120 {
121 int i;
122 struct sem_undo *suptr;
123 struct sem_undo **supptr;
124 int attempt;
125
126 /*
127 * Try twice to allocate something.
128 * (we'll purge any empty structures after the first pass so
129 * two passes are always enough)
130 */
131
132 for (attempt = 0; attempt < 2; attempt++) {
133 /*
134 * Look for a free structure.
135 * Fill it in and return it if we find one.
136 */
137
138 for (i = 0; i < seminfo.semmnu; i++) {
139 suptr = SEMU(i);
140 if (suptr->un_proc == NULL) {
141 suptr->un_next = semu_list;
142 semu_list = suptr;
143 suptr->un_cnt = 0;
144 suptr->un_proc = p;
145 return(suptr);
146 }
147 }
148
149 /*
150 * We didn't find a free one, if this is the first attempt
151 * then try to free some structures.
152 */
153
154 if (attempt == 0) {
155 /* All the structures are in use - try to free some */
156 int did_something = 0;
157
158 supptr = &semu_list;
159 while ((suptr = *supptr) != NULL) {
160 if (suptr->un_cnt == 0) {
161 suptr->un_proc = NULL;
162 *supptr = suptr->un_next;
163 did_something = 1;
164 } else
165 supptr = &(suptr->un_next);
166 }
167
168 /* If we didn't free anything then just give-up */
169 if (!did_something)
170 return(NULL);
171 } else {
172 /*
173 * The second pass failed even though we freed
174 * something after the first pass!
175 * This is IMPOSSIBLE!
176 */
177 panic("semu_alloc - second attempt failed");
178 }
179 }
180 return NULL;
181 }
182
183 /*
184 * Adjust a particular entry for a particular proc
185 */
186
187 int
188 semundo_adjust(p, supptr, semid, semnum, adjval)
189 struct proc *p;
190 struct sem_undo **supptr;
191 int semid, semnum;
192 int adjval;
193 {
194 struct sem_undo *suptr;
195 struct undo *sunptr;
196 int i;
197
198 /* Look for and remember the sem_undo if the caller doesn't provide
199 it */
200
201 suptr = *supptr;
202 if (suptr == NULL) {
203 for (suptr = semu_list; suptr != NULL; suptr = suptr->un_next) {
204 if (suptr->un_proc == p) {
205 *supptr = suptr;
206 break;
207 }
208 }
209 if (suptr == NULL) {
210 if (adjval == 0)
211 return(0);
212 suptr = semu_alloc(p);
213 if (suptr == NULL)
214 return(ENOSPC);
215 *supptr = suptr;
216 }
217 }
218
219 /*
220 * Look for the requested entry and adjust it (delete if adjval becomes
221 * 0).
222 */
223 sunptr = &suptr->un_ent[0];
224 for (i = 0; i < suptr->un_cnt; i++, sunptr++) {
225 if (sunptr->un_id != semid || sunptr->un_num != semnum)
226 continue;
227 if (adjval == 0)
228 sunptr->un_adjval = 0;
229 else
230 sunptr->un_adjval += adjval;
231 if (sunptr->un_adjval == 0) {
232 suptr->un_cnt--;
233 if (i < suptr->un_cnt)
234 suptr->un_ent[i] =
235 suptr->un_ent[suptr->un_cnt];
236 }
237 return(0);
238 }
239
240 /* Didn't find the right entry - create it */
241 if (adjval == 0)
242 return(0);
243 if (suptr->un_cnt == SEMUME)
244 return(EINVAL);
245
246 sunptr = &suptr->un_ent[suptr->un_cnt];
247 suptr->un_cnt++;
248 sunptr->un_adjval = adjval;
249 sunptr->un_id = semid;
250 sunptr->un_num = semnum;
251 return(0);
252 }
253
254 void
255 semundo_clear(semid, semnum)
256 int semid, semnum;
257 {
258 struct sem_undo *suptr;
259
260 for (suptr = semu_list; suptr != NULL; suptr = suptr->un_next) {
261 struct undo *sunptr;
262 int i;
263
264 sunptr = &suptr->un_ent[0];
265 for (i = 0; i < suptr->un_cnt; i++, sunptr++) {
266 if (sunptr->un_id == semid) {
267 if (semnum == -1 || sunptr->un_num == semnum) {
268 suptr->un_cnt--;
269 if (i < suptr->un_cnt) {
270 suptr->un_ent[i] =
271 suptr->un_ent[suptr->un_cnt];
272 i--, sunptr--;
273 }
274 }
275 if (semnum != -1)
276 break;
277 }
278 }
279 }
280 }
281
282 int
283 sys_____semctl13(p, v, retval)
284 struct proc *p;
285 void *v;
286 register_t *retval;
287 {
288 struct sys_____semctl13_args /* {
289 syscallarg(int) semid;
290 syscallarg(int) semnum;
291 syscallarg(int) cmd;
292 syscallarg(union __semun *) arg;
293 } */ *uap = v;
294 struct semid_ds sembuf;
295 int cmd, error;
296 void *pass_arg;
297 union __semun karg;
298
299 cmd = SCARG(uap, cmd);
300
301 switch (cmd) {
302 case IPC_SET:
303 case IPC_STAT:
304 pass_arg = &sembuf;
305 break;
306
307 case GETALL:
308 case SETVAL:
309 case SETALL:
310 pass_arg = &karg;
311 break;
312 default:
313 pass_arg = NULL;
314 break;
315 }
316
317 if (pass_arg) {
318 error = copyin(SCARG(uap, arg), &karg, sizeof(karg));
319 if (error)
320 return error;
321 if (cmd == IPC_SET) {
322 error = copyin(karg.buf, &sembuf, sizeof(sembuf));
323 if (error)
324 return (error);
325 }
326 }
327
328 error = semctl1(p, SCARG(uap, semid), SCARG(uap, semnum), cmd,
329 pass_arg, retval);
330
331 if (error == 0 && cmd == IPC_STAT)
332 error = copyout(&sembuf, karg.buf, sizeof(sembuf));
333
334 return (error);
335 }
336
337 int
338 semctl1(p, semid, semnum, cmd, v, retval)
339 struct proc *p;
340 int semid, semnum, cmd;
341 void *v;
342 register_t *retval;
343 {
344 struct ucred *cred = p->p_ucred;
345 union __semun *arg = v;
346 struct semid_ds *sembuf = v, *semaptr;
347 int i, error, ix;
348
349 SEM_PRINTF(("call to semctl(%d, %d, %d, %p)\n",
350 semid, semnum, cmd, v));
351
352 ix = IPCID_TO_IX(semid);
353 if (ix < 0 || ix >= seminfo.semmsl)
354 return (EINVAL);
355
356 semaptr = &sema[ix];
357 if ((semaptr->sem_perm.mode & SEM_ALLOC) == 0 ||
358 semaptr->sem_perm._seq != IPCID_TO_SEQ(semid))
359 return (EINVAL);
360
361 switch (cmd) {
362 case IPC_RMID:
363 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_M)) != 0)
364 return (error);
365 semaptr->sem_perm.cuid = cred->cr_uid;
366 semaptr->sem_perm.uid = cred->cr_uid;
367 semtot -= semaptr->sem_nsems;
368 for (i = semaptr->_sem_base - sem; i < semtot; i++)
369 sem[i] = sem[i + semaptr->sem_nsems];
370 for (i = 0; i < seminfo.semmni; i++) {
371 if ((sema[i].sem_perm.mode & SEM_ALLOC) &&
372 sema[i]._sem_base > semaptr->_sem_base)
373 sema[i]._sem_base -= semaptr->sem_nsems;
374 }
375 semaptr->sem_perm.mode = 0;
376 semundo_clear(ix, -1);
377 wakeup(semaptr);
378 break;
379
380 case IPC_SET:
381 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_M)))
382 return (error);
383 semaptr->sem_perm.uid = sembuf->sem_perm.uid;
384 semaptr->sem_perm.gid = sembuf->sem_perm.gid;
385 semaptr->sem_perm.mode = (semaptr->sem_perm.mode & ~0777) |
386 (sembuf->sem_perm.mode & 0777);
387 semaptr->sem_ctime = time.tv_sec;
388 break;
389
390 case IPC_STAT:
391 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
392 return (error);
393 memcpy(sembuf, semaptr, sizeof(struct semid_ds));
394 break;
395
396 case GETNCNT:
397 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
398 return (error);
399 if (semnum < 0 || semnum >= semaptr->sem_nsems)
400 return (EINVAL);
401 *retval = semaptr->_sem_base[semnum].semncnt;
402 break;
403
404 case GETPID:
405 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
406 return (error);
407 if (semnum < 0 || semnum >= semaptr->sem_nsems)
408 return (EINVAL);
409 *retval = semaptr->_sem_base[semnum].sempid;
410 break;
411
412 case GETVAL:
413 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
414 return (error);
415 if (semnum < 0 || semnum >= semaptr->sem_nsems)
416 return (EINVAL);
417 *retval = semaptr->_sem_base[semnum].semval;
418 break;
419
420 case GETALL:
421 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
422 return (error);
423 for (i = 0; i < semaptr->sem_nsems; i++) {
424 error = copyout(&semaptr->_sem_base[i].semval,
425 &arg->array[i], sizeof(arg->array[i]));
426 if (error != 0)
427 break;
428 }
429 break;
430
431 case GETZCNT:
432 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_R)))
433 return (error);
434 if (semnum < 0 || semnum >= semaptr->sem_nsems)
435 return (EINVAL);
436 *retval = semaptr->_sem_base[semnum].semzcnt;
437 break;
438
439 case SETVAL:
440 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_W)))
441 return (error);
442 if (semnum < 0 || semnum >= semaptr->sem_nsems)
443 return (EINVAL);
444 semaptr->_sem_base[semnum].semval = arg->val;
445 semundo_clear(ix, semnum);
446 wakeup(semaptr);
447 break;
448
449 case SETALL:
450 if ((error = ipcperm(cred, &semaptr->sem_perm, IPC_W)))
451 return (error);
452 for (i = 0; i < semaptr->sem_nsems; i++) {
453 error = copyin(&arg->array[i],
454 &semaptr->_sem_base[i].semval,
455 sizeof(arg->array[i]));
456 if (error != 0)
457 break;
458 }
459 semundo_clear(ix, -1);
460 wakeup(semaptr);
461 break;
462
463 default:
464 return (EINVAL);
465 }
466
467 return (error);
468 }
469
470 int
471 sys_semget(p, v, retval)
472 struct proc *p;
473 void *v;
474 register_t *retval;
475 {
476 struct sys_semget_args /* {
477 syscallarg(key_t) key;
478 syscallarg(int) nsems;
479 syscallarg(int) semflg;
480 } */ *uap = v;
481 int semid, eval;
482 int key = SCARG(uap, key);
483 int nsems = SCARG(uap, nsems);
484 int semflg = SCARG(uap, semflg);
485 struct ucred *cred = p->p_ucred;
486
487 SEM_PRINTF(("semget(0x%x, %d, 0%o)\n", key, nsems, semflg));
488
489 if (key != IPC_PRIVATE) {
490 for (semid = 0; semid < seminfo.semmni; semid++) {
491 if ((sema[semid].sem_perm.mode & SEM_ALLOC) &&
492 sema[semid].sem_perm._key == key)
493 break;
494 }
495 if (semid < seminfo.semmni) {
496 SEM_PRINTF(("found public key\n"));
497 if ((eval = ipcperm(cred, &sema[semid].sem_perm,
498 semflg & 0700)))
499 return(eval);
500 if (nsems > 0 && sema[semid].sem_nsems < nsems) {
501 SEM_PRINTF(("too small\n"));
502 return(EINVAL);
503 }
504 if ((semflg & IPC_CREAT) && (semflg & IPC_EXCL)) {
505 SEM_PRINTF(("not exclusive\n"));
506 return(EEXIST);
507 }
508 goto found;
509 }
510 }
511
512 SEM_PRINTF(("need to allocate the semid_ds\n"));
513 if (key == IPC_PRIVATE || (semflg & IPC_CREAT)) {
514 if (nsems <= 0 || nsems > seminfo.semmsl) {
515 SEM_PRINTF(("nsems out of range (0<%d<=%d)\n", nsems,
516 seminfo.semmsl));
517 return(EINVAL);
518 }
519 if (nsems > seminfo.semmns - semtot) {
520 SEM_PRINTF(("not enough semaphores left (need %d, got %d)\n",
521 nsems, seminfo.semmns - semtot));
522 return(ENOSPC);
523 }
524 for (semid = 0; semid < seminfo.semmni; semid++) {
525 if ((sema[semid].sem_perm.mode & SEM_ALLOC) == 0)
526 break;
527 }
528 if (semid == seminfo.semmni) {
529 SEM_PRINTF(("no more semid_ds's available\n"));
530 return(ENOSPC);
531 }
532 SEM_PRINTF(("semid %d is available\n", semid));
533 sema[semid].sem_perm._key = key;
534 sema[semid].sem_perm.cuid = cred->cr_uid;
535 sema[semid].sem_perm.uid = cred->cr_uid;
536 sema[semid].sem_perm.cgid = cred->cr_gid;
537 sema[semid].sem_perm.gid = cred->cr_gid;
538 sema[semid].sem_perm.mode = (semflg & 0777) | SEM_ALLOC;
539 sema[semid].sem_perm._seq =
540 (sema[semid].sem_perm._seq + 1) & 0x7fff;
541 sema[semid].sem_nsems = nsems;
542 sema[semid].sem_otime = 0;
543 sema[semid].sem_ctime = time.tv_sec;
544 sema[semid]._sem_base = &sem[semtot];
545 semtot += nsems;
546 memset(sema[semid]._sem_base, 0,
547 sizeof(sema[semid]._sem_base[0])*nsems);
548 SEM_PRINTF(("sembase = %p, next = %p\n", sema[semid]._sem_base,
549 &sem[semtot]));
550 } else {
551 SEM_PRINTF(("didn't find it and wasn't asked to create it\n"));
552 return(ENOENT);
553 }
554
555 found:
556 *retval = IXSEQ_TO_IPCID(semid, sema[semid].sem_perm);
557 return(0);
558 }
559
560 int
561 sys_semop(p, v, retval)
562 struct proc *p;
563 void *v;
564 register_t *retval;
565 {
566 struct sys_semop_args /* {
567 syscallarg(int) semid;
568 syscallarg(struct sembuf *) sops;
569 syscallarg(size_t) nsops;
570 } */ *uap = v;
571 int semid = SCARG(uap, semid);
572 int nsops = SCARG(uap, nsops);
573 struct sembuf sops[MAX_SOPS];
574 struct semid_ds *semaptr;
575 struct sembuf *sopptr = NULL;
576 struct __sem *semptr = NULL;
577 struct sem_undo *suptr = NULL;
578 struct ucred *cred = p->p_ucred;
579 int i, j, eval;
580 int do_wakeup, do_undos;
581
582 SEM_PRINTF(("call to semop(%d, %p, %d)\n", semid, sops, nsops));
583
584 semid = IPCID_TO_IX(semid); /* Convert back to zero origin */
585
586 if (semid < 0 || semid >= seminfo.semmsl)
587 return(EINVAL);
588
589 semaptr = &sema[semid];
590 if ((semaptr->sem_perm.mode & SEM_ALLOC) == 0 ||
591 semaptr->sem_perm._seq != IPCID_TO_SEQ(SCARG(uap, semid)))
592 return(EINVAL);
593
594 if ((eval = ipcperm(cred, &semaptr->sem_perm, IPC_W))) {
595 SEM_PRINTF(("eval = %d from ipaccess\n", eval));
596 return(eval);
597 }
598
599 if (nsops > MAX_SOPS) {
600 SEM_PRINTF(("too many sops (max=%d, nsops=%d)\n", MAX_SOPS, nsops));
601 return(E2BIG);
602 }
603
604 if ((eval = copyin(SCARG(uap, sops), sops, nsops * sizeof(sops[0])))
605 != 0) {
606 SEM_PRINTF(("eval = %d from copyin(%p, %p, %d)\n", eval,
607 SCARG(uap, sops), &sops, nsops * sizeof(sops[0])));
608 return(eval);
609 }
610
611 /*
612 * Loop trying to satisfy the vector of requests.
613 * If we reach a point where we must wait, any requests already
614 * performed are rolled back and we go to sleep until some other
615 * process wakes us up. At this point, we start all over again.
616 *
617 * This ensures that from the perspective of other tasks, a set
618 * of requests is atomic (never partially satisfied).
619 */
620 do_undos = 0;
621
622 for (;;) {
623 do_wakeup = 0;
624
625 for (i = 0; i < nsops; i++) {
626 sopptr = &sops[i];
627
628 if (sopptr->sem_num >= semaptr->sem_nsems)
629 return(EFBIG);
630
631 semptr = &semaptr->_sem_base[sopptr->sem_num];
632
633 SEM_PRINTF(("semop: semaptr=%x, sem_base=%x, semptr=%x, sem[%d]=%d : op=%d, flag=%s\n",
634 semaptr, semaptr->_sem_base, semptr,
635 sopptr->sem_num, semptr->semval, sopptr->sem_op,
636 (sopptr->sem_flg & IPC_NOWAIT) ? "nowait" : "wait"));
637
638 if (sopptr->sem_op < 0) {
639 if ((int)(semptr->semval +
640 sopptr->sem_op) < 0) {
641 SEM_PRINTF(("semop: can't do it now\n"));
642 break;
643 } else {
644 semptr->semval += sopptr->sem_op;
645 if (semptr->semval == 0 &&
646 semptr->semzcnt > 0)
647 do_wakeup = 1;
648 }
649 if (sopptr->sem_flg & SEM_UNDO)
650 do_undos = 1;
651 } else if (sopptr->sem_op == 0) {
652 if (semptr->semval > 0) {
653 SEM_PRINTF(("semop: not zero now\n"));
654 break;
655 }
656 } else {
657 if (semptr->semncnt > 0)
658 do_wakeup = 1;
659 semptr->semval += sopptr->sem_op;
660 if (sopptr->sem_flg & SEM_UNDO)
661 do_undos = 1;
662 }
663 }
664
665 /*
666 * Did we get through the entire vector?
667 */
668 if (i >= nsops)
669 goto done;
670
671 /*
672 * No ... rollback anything that we've already done
673 */
674 SEM_PRINTF(("semop: rollback 0 through %d\n", i-1));
675 for (j = 0; j < i; j++)
676 semaptr->_sem_base[sops[j].sem_num].semval -=
677 sops[j].sem_op;
678
679 /*
680 * If the request that we couldn't satisfy has the
681 * NOWAIT flag set then return with EAGAIN.
682 */
683 if (sopptr->sem_flg & IPC_NOWAIT)
684 return(EAGAIN);
685
686 if (sopptr->sem_op == 0)
687 semptr->semzcnt++;
688 else
689 semptr->semncnt++;
690
691 SEM_PRINTF(("semop: good night!\n"));
692 eval = tsleep((caddr_t)semaptr, (PZERO - 4) | PCATCH,
693 "semwait", 0);
694 SEM_PRINTF(("semop: good morning (eval=%d)!\n", eval));
695
696 suptr = NULL; /* sem_undo may have been reallocated */
697
698 if (eval != 0)
699 return(EINTR);
700 SEM_PRINTF(("semop: good morning!\n"));
701
702 /*
703 * Make sure that the semaphore still exists
704 */
705 if ((semaptr->sem_perm.mode & SEM_ALLOC) == 0 ||
706 semaptr->sem_perm._seq != IPCID_TO_SEQ(SCARG(uap, semid))) {
707 /* The man page says to return EIDRM. */
708 /* Unfortunately, BSD doesn't define that code! */
709 #ifdef EIDRM
710 return(EIDRM);
711 #else
712 return(EINVAL);
713 #endif
714 }
715
716 /*
717 * The semaphore is still alive. Readjust the count of
718 * waiting processes.
719 */
720 if (sopptr->sem_op == 0)
721 semptr->semzcnt--;
722 else
723 semptr->semncnt--;
724 }
725
726 done:
727 /*
728 * Process any SEM_UNDO requests.
729 */
730 if (do_undos) {
731 for (i = 0; i < nsops; i++) {
732 /*
733 * We only need to deal with SEM_UNDO's for non-zero
734 * op's.
735 */
736 int adjval;
737
738 if ((sops[i].sem_flg & SEM_UNDO) == 0)
739 continue;
740 adjval = sops[i].sem_op;
741 if (adjval == 0)
742 continue;
743 eval = semundo_adjust(p, &suptr, semid,
744 sops[i].sem_num, -adjval);
745 if (eval == 0)
746 continue;
747
748 /*
749 * Oh-Oh! We ran out of either sem_undo's or undo's.
750 * Rollback the adjustments to this point and then
751 * rollback the semaphore ups and down so we can return
752 * with an error with all structures restored. We
753 * rollback the undo's in the exact reverse order that
754 * we applied them. This guarantees that we won't run
755 * out of space as we roll things back out.
756 */
757 for (j = i - 1; j >= 0; j--) {
758 if ((sops[j].sem_flg & SEM_UNDO) == 0)
759 continue;
760 adjval = sops[j].sem_op;
761 if (adjval == 0)
762 continue;
763 if (semundo_adjust(p, &suptr, semid,
764 sops[j].sem_num, adjval) != 0)
765 panic("semop - can't undo undos");
766 }
767
768 for (j = 0; j < nsops; j++)
769 semaptr->_sem_base[sops[j].sem_num].semval -=
770 sops[j].sem_op;
771
772 SEM_PRINTF(("eval = %d from semundo_adjust\n", eval));
773 return(eval);
774 } /* loop through the sops */
775 } /* if (do_undos) */
776
777 /* We're definitely done - set the sempid's */
778 for (i = 0; i < nsops; i++) {
779 sopptr = &sops[i];
780 semptr = &semaptr->_sem_base[sopptr->sem_num];
781 semptr->sempid = p->p_pid;
782 }
783
784 /* Do a wakeup if any semaphore was up'd. */
785 if (do_wakeup) {
786 SEM_PRINTF(("semop: doing wakeup\n"));
787 #ifdef SEM_WAKEUP
788 sem_wakeup((caddr_t)semaptr);
789 #else
790 wakeup((caddr_t)semaptr);
791 #endif
792 SEM_PRINTF(("semop: back from wakeup\n"));
793 }
794 SEM_PRINTF(("semop: done\n"));
795 *retval = 0;
796 return(0);
797 }
798
799 /*
800 * Go through the undo structures for this process and apply the adjustments to
801 * semaphores.
802 */
803 void
804 semexit(p)
805 struct proc *p;
806 {
807 struct sem_undo *suptr;
808 struct sem_undo **supptr;
809
810 /*
811 * Go through the chain of undo vectors looking for one associated with
812 * this process.
813 */
814
815 for (supptr = &semu_list; (suptr = *supptr) != NULL;
816 supptr = &suptr->un_next) {
817 if (suptr->un_proc == p)
818 break;
819 }
820
821 /*
822 * If there is no undo vector, skip to the end.
823 */
824
825 if (suptr == NULL)
826 return;
827
828 /*
829 * We now have an undo vector for this process.
830 */
831
832 SEM_PRINTF(("proc @%p has undo structure with %d entries\n", p,
833 suptr->un_cnt));
834
835 /*
836 * If there are any active undo elements then process them.
837 */
838 if (suptr->un_cnt > 0) {
839 int ix;
840
841 for (ix = 0; ix < suptr->un_cnt; ix++) {
842 int semid = suptr->un_ent[ix].un_id;
843 int semnum = suptr->un_ent[ix].un_num;
844 int adjval = suptr->un_ent[ix].un_adjval;
845 struct semid_ds *semaptr;
846
847 semaptr = &sema[semid];
848 if ((semaptr->sem_perm.mode & SEM_ALLOC) == 0)
849 panic("semexit - semid not allocated");
850 if (semnum >= semaptr->sem_nsems)
851 panic("semexit - semnum out of range");
852
853 SEM_PRINTF(("semexit: %p id=%d num=%d(adj=%d) ; sem=%d\n",
854 suptr->un_proc, suptr->un_ent[ix].un_id,
855 suptr->un_ent[ix].un_num,
856 suptr->un_ent[ix].un_adjval,
857 semaptr->_sem_base[semnum].semval));
858
859 if (adjval < 0 &&
860 semaptr->_sem_base[semnum].semval < -adjval)
861 semaptr->_sem_base[semnum].semval = 0;
862 else
863 semaptr->_sem_base[semnum].semval += adjval;
864
865 #ifdef SEM_WAKEUP
866 sem_wakeup((caddr_t)semaptr);
867 #else
868 wakeup((caddr_t)semaptr);
869 #endif
870 SEM_PRINTF(("semexit: back from wakeup\n"));
871 }
872 }
873
874 /*
875 * Deallocate the undo vector.
876 */
877 SEM_PRINTF(("removing vector\n"));
878 suptr->un_proc = NULL;
879 *supptr = suptr->un_next;
880 }
881