Home | History | Annotate | Line # | Download | only in kern
uipc_sem.c revision 1.51.2.2
      1  1.51.2.2    martin /*	$NetBSD: uipc_sem.c,v 1.51.2.2 2020/04/08 14:08:52 martin Exp $	*/
      2       1.3   thorpej 
      3       1.3   thorpej /*-
      4  1.51.2.1  christos  * Copyright (c) 2011, 2019 The NetBSD Foundation, Inc.
      5       1.3   thorpej  * All rights reserved.
      6       1.3   thorpej  *
      7       1.3   thorpej  * This code is derived from software contributed to The NetBSD Foundation
      8  1.51.2.1  christos  * by Mindaugas Rasiukevicius and Jason R. Thorpe.
      9       1.3   thorpej  *
     10       1.3   thorpej  * Redistribution and use in source and binary forms, with or without
     11       1.3   thorpej  * modification, are permitted provided that the following conditions
     12       1.3   thorpej  * are met:
     13       1.3   thorpej  * 1. Redistributions of source code must retain the above copyright
     14       1.3   thorpej  *    notice, this list of conditions and the following disclaimer.
     15       1.3   thorpej  * 2. Redistributions in binary form must reproduce the above copyright
     16       1.3   thorpej  *    notice, this list of conditions and the following disclaimer in the
     17       1.3   thorpej  *    documentation and/or other materials provided with the distribution.
     18       1.3   thorpej  *
     19       1.3   thorpej  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20       1.3   thorpej  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21       1.3   thorpej  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22       1.3   thorpej  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23       1.3   thorpej  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24       1.3   thorpej  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25       1.3   thorpej  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26       1.3   thorpej  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27       1.3   thorpej  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28       1.3   thorpej  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29       1.3   thorpej  * POSSIBILITY OF SUCH DAMAGE.
     30       1.3   thorpej  */
     31       1.1  christos 
     32       1.1  christos /*
     33       1.1  christos  * Copyright (c) 2002 Alfred Perlstein <alfred (at) FreeBSD.org>
     34       1.1  christos  * All rights reserved.
     35       1.1  christos  *
     36       1.1  christos  * Redistribution and use in source and binary forms, with or without
     37       1.1  christos  * modification, are permitted provided that the following conditions
     38       1.1  christos  * are met:
     39       1.1  christos  * 1. Redistributions of source code must retain the above copyright
     40       1.1  christos  *    notice, this list of conditions and the following disclaimer.
     41       1.1  christos  * 2. Redistributions in binary form must reproduce the above copyright
     42       1.1  christos  *    notice, this list of conditions and the following disclaimer in the
     43       1.1  christos  *    documentation and/or other materials provided with the distribution.
     44       1.1  christos  *
     45       1.1  christos  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
     46       1.1  christos  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     47       1.1  christos  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     48       1.1  christos  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     49       1.1  christos  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     50       1.1  christos  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     51       1.1  christos  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     52       1.1  christos  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     53       1.1  christos  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     54       1.1  christos  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     55       1.1  christos  * SUCH DAMAGE.
     56       1.1  christos  */
     57       1.9     lukem 
     58      1.30     rmind /*
     59      1.30     rmind  * Implementation of POSIX semaphore.
     60      1.30     rmind  */
     61      1.30     rmind 
     62       1.9     lukem #include <sys/cdefs.h>
     63  1.51.2.2    martin __KERNEL_RCSID(0, "$NetBSD: uipc_sem.c,v 1.51.2.2 2020/04/08 14:08:52 martin Exp $");
     64       1.1  christos 
     65       1.1  christos #include <sys/param.h>
     66       1.1  christos #include <sys/kernel.h>
     67      1.34     rmind 
     68      1.34     rmind #include <sys/atomic.h>
     69       1.1  christos #include <sys/proc.h>
     70  1.51.2.1  christos #include <sys/lwp.h>
     71       1.1  christos #include <sys/ksem.h>
     72       1.1  christos #include <sys/syscall.h>
     73       1.1  christos #include <sys/stat.h>
     74      1.21        ad #include <sys/kmem.h>
     75       1.1  christos #include <sys/fcntl.h>
     76      1.30     rmind #include <sys/file.h>
     77      1.30     rmind #include <sys/filedesc.h>
     78      1.14      elad #include <sys/kauth.h>
     79      1.27        ad #include <sys/module.h>
     80       1.1  christos #include <sys/mount.h>
     81  1.51.2.1  christos #include <sys/mutex.h>
     82  1.51.2.1  christos #include <sys/rwlock.h>
     83      1.45  dholland #include <sys/semaphore.h>
     84      1.27        ad #include <sys/syscall.h>
     85       1.1  christos #include <sys/syscallargs.h>
     86      1.27        ad #include <sys/syscallvar.h>
     87      1.43  pgoyette #include <sys/sysctl.h>
     88  1.51.2.1  christos #include <sys/uidinfo.h>
     89  1.51.2.1  christos #include <sys/cprng.h>
     90       1.1  christos 
     91      1.30     rmind MODULE(MODULE_CLASS_MISC, ksem, NULL);
     92      1.30     rmind 
     93      1.49  christos #define	SEM_MAX_NAMELEN		NAME_MAX
     94       1.1  christos 
     95      1.30     rmind #define	KS_UNLINKED		0x01
     96       1.4   thorpej 
     97      1.30     rmind static kmutex_t		ksem_lock	__cacheline_aligned;
     98      1.30     rmind static LIST_HEAD(,ksem)	ksem_head	__cacheline_aligned;
     99      1.34     rmind static u_int		nsems_total	__cacheline_aligned;
    100      1.30     rmind static u_int		nsems		__cacheline_aligned;
    101      1.30     rmind 
    102  1.51.2.1  christos static krwlock_t	ksem_pshared_lock __cacheline_aligned;
    103  1.51.2.1  christos static LIST_HEAD(, ksem) *ksem_pshared_hashtab __cacheline_aligned;
    104  1.51.2.1  christos static u_long		ksem_pshared_hashmask __read_mostly;
    105  1.51.2.1  christos 
    106  1.51.2.1  christos #define	KSEM_PSHARED_HASHSIZE	32
    107  1.51.2.1  christos 
    108      1.38      elad static kauth_listener_t	ksem_listener;
    109      1.38      elad 
    110      1.30     rmind static int		ksem_sysinit(void);
    111      1.30     rmind static int		ksem_sysfini(bool);
    112      1.30     rmind static int		ksem_modcmd(modcmd_t, void *);
    113      1.30     rmind static int		ksem_close_fop(file_t *);
    114      1.39  christos static int		ksem_stat_fop(file_t *, struct stat *);
    115      1.39  christos static int		ksem_read_fop(file_t *, off_t *, struct uio *,
    116      1.39  christos     kauth_cred_t, int);
    117      1.30     rmind 
    118      1.30     rmind static const struct fileops semops = {
    119      1.48  christos 	.fo_name = "sem",
    120      1.39  christos 	.fo_read = ksem_read_fop,
    121      1.30     rmind 	.fo_write = fbadop_write,
    122      1.30     rmind 	.fo_ioctl = fbadop_ioctl,
    123      1.30     rmind 	.fo_fcntl = fnullop_fcntl,
    124      1.30     rmind 	.fo_poll = fnullop_poll,
    125      1.39  christos 	.fo_stat = ksem_stat_fop,
    126      1.30     rmind 	.fo_close = ksem_close_fop,
    127      1.30     rmind 	.fo_kqfilter = fnullop_kqfilter,
    128      1.30     rmind 	.fo_restart = fnullop_restart,
    129      1.30     rmind };
    130      1.27        ad 
    131      1.27        ad static const struct syscall_package ksem_syscalls[] = {
    132      1.27        ad 	{ SYS__ksem_init, 0, (sy_call_t *)sys__ksem_init },
    133      1.27        ad 	{ SYS__ksem_open, 0, (sy_call_t *)sys__ksem_open },
    134      1.27        ad 	{ SYS__ksem_unlink, 0, (sy_call_t *)sys__ksem_unlink },
    135      1.27        ad 	{ SYS__ksem_close, 0, (sy_call_t *)sys__ksem_close },
    136      1.27        ad 	{ SYS__ksem_post, 0, (sy_call_t *)sys__ksem_post },
    137      1.27        ad 	{ SYS__ksem_wait, 0, (sy_call_t *)sys__ksem_wait },
    138      1.27        ad 	{ SYS__ksem_trywait, 0, (sy_call_t *)sys__ksem_trywait },
    139      1.27        ad 	{ SYS__ksem_getvalue, 0, (sy_call_t *)sys__ksem_getvalue },
    140      1.27        ad 	{ SYS__ksem_destroy, 0, (sy_call_t *)sys__ksem_destroy },
    141      1.36     joerg 	{ SYS__ksem_timedwait, 0, (sy_call_t *)sys__ksem_timedwait },
    142      1.27        ad 	{ 0, 0, NULL },
    143      1.27        ad };
    144       1.1  christos 
    145      1.43  pgoyette struct sysctllog *ksem_clog;
    146  1.51.2.2    martin int ksem_max = KSEM_MAX;
    147      1.43  pgoyette 
    148      1.30     rmind static int
    149      1.51  christos name_copyin(const char *uname, char **name)
    150      1.51  christos {
    151      1.51  christos 	*name = kmem_alloc(SEM_MAX_NAMELEN, KM_SLEEP);
    152      1.51  christos 
    153      1.51  christos 	int error = copyinstr(uname, *name, SEM_MAX_NAMELEN, NULL);
    154      1.51  christos 	if (error)
    155      1.51  christos 		kmem_free(*name, SEM_MAX_NAMELEN);
    156      1.51  christos 
    157      1.51  christos 	return error;
    158      1.51  christos }
    159      1.51  christos 
    160      1.51  christos static void
    161      1.51  christos name_destroy(char **name)
    162      1.51  christos {
    163      1.51  christos 	if (!*name)
    164      1.51  christos 		return;
    165      1.51  christos 
    166      1.51  christos 	kmem_free(*name, SEM_MAX_NAMELEN);
    167      1.51  christos 	*name = NULL;
    168      1.51  christos }
    169      1.51  christos 
    170      1.51  christos static int
    171      1.38      elad ksem_listener_cb(kauth_cred_t cred, kauth_action_t action, void *cookie,
    172      1.38      elad     void *arg0, void *arg1, void *arg2, void *arg3)
    173      1.38      elad {
    174      1.38      elad 	ksem_t *ks;
    175      1.38      elad 	mode_t mode;
    176      1.38      elad 
    177      1.38      elad 	if (action != KAUTH_SYSTEM_SEMAPHORE)
    178      1.38      elad 		return KAUTH_RESULT_DEFER;
    179      1.38      elad 
    180      1.38      elad 	ks = arg1;
    181      1.38      elad 	mode = ks->ks_mode;
    182      1.38      elad 
    183      1.38      elad 	if ((kauth_cred_geteuid(cred) == ks->ks_uid && (mode & S_IWUSR) != 0) ||
    184      1.38      elad 	    (kauth_cred_getegid(cred) == ks->ks_gid && (mode & S_IWGRP) != 0) ||
    185      1.38      elad 	    (mode & S_IWOTH) != 0)
    186      1.38      elad 		return KAUTH_RESULT_ALLOW;
    187      1.38      elad 
    188      1.38      elad 	return KAUTH_RESULT_DEFER;
    189      1.38      elad }
    190      1.38      elad 
    191      1.38      elad static int
    192      1.30     rmind ksem_sysinit(void)
    193       1.3   thorpej {
    194      1.30     rmind 	int error;
    195      1.43  pgoyette 	const struct sysctlnode *rnode;
    196       1.1  christos 
    197      1.30     rmind 	mutex_init(&ksem_lock, MUTEX_DEFAULT, IPL_NONE);
    198      1.30     rmind 	LIST_INIT(&ksem_head);
    199      1.34     rmind 	nsems_total = 0;
    200      1.34     rmind 	nsems = 0;
    201      1.20        ad 
    202  1.51.2.1  christos 	rw_init(&ksem_pshared_lock);
    203  1.51.2.1  christos 	ksem_pshared_hashtab = hashinit(KSEM_PSHARED_HASHSIZE, HASH_LIST,
    204  1.51.2.1  christos 	    true, &ksem_pshared_hashmask);
    205  1.51.2.1  christos 	KASSERT(ksem_pshared_hashtab != NULL);
    206  1.51.2.1  christos 
    207      1.38      elad 	ksem_listener = kauth_listen_scope(KAUTH_SCOPE_SYSTEM,
    208      1.38      elad 	    ksem_listener_cb, NULL);
    209      1.38      elad 
    210      1.43  pgoyette 	/* Define module-specific sysctl tree */
    211      1.43  pgoyette 
    212      1.43  pgoyette 	ksem_clog = NULL;
    213      1.43  pgoyette 
    214      1.43  pgoyette 	sysctl_createv(&ksem_clog, 0, NULL, &rnode,
    215      1.43  pgoyette 			CTLFLAG_PERMANENT,
    216      1.43  pgoyette 			CTLTYPE_NODE, "posix",
    217      1.43  pgoyette 			SYSCTL_DESCR("POSIX options"),
    218      1.43  pgoyette 			NULL, 0, NULL, 0,
    219      1.43  pgoyette 			CTL_KERN, CTL_CREATE, CTL_EOL);
    220      1.43  pgoyette 	sysctl_createv(&ksem_clog, 0, &rnode, NULL,
    221      1.43  pgoyette 			CTLFLAG_PERMANENT | CTLFLAG_READWRITE,
    222      1.43  pgoyette 			CTLTYPE_INT, "semmax",
    223      1.43  pgoyette 			SYSCTL_DESCR("Maximal number of semaphores"),
    224      1.43  pgoyette 			NULL, 0, &ksem_max, 0,
    225      1.43  pgoyette 			CTL_CREATE, CTL_EOL);
    226      1.43  pgoyette 	sysctl_createv(&ksem_clog, 0, &rnode, NULL,
    227      1.44  pgoyette 			CTLFLAG_PERMANENT | CTLFLAG_READONLY,
    228      1.43  pgoyette 			CTLTYPE_INT, "semcnt",
    229      1.43  pgoyette 			SYSCTL_DESCR("Current number of semaphores"),
    230      1.43  pgoyette 			NULL, 0, &nsems, 0,
    231      1.43  pgoyette 			CTL_CREATE, CTL_EOL);
    232      1.43  pgoyette 
    233  1.51.2.2    martin 	error = syscall_establish(NULL, ksem_syscalls);
    234  1.51.2.2    martin 	if (error) {
    235  1.51.2.2    martin 		(void)ksem_sysfini(false);
    236  1.51.2.2    martin 	}
    237  1.51.2.2    martin 
    238      1.30     rmind 	return error;
    239       1.3   thorpej }
    240       1.1  christos 
    241      1.30     rmind static int
    242      1.30     rmind ksem_sysfini(bool interface)
    243       1.1  christos {
    244      1.30     rmind 	int error;
    245       1.1  christos 
    246      1.30     rmind 	if (interface) {
    247      1.30     rmind 		error = syscall_disestablish(NULL, ksem_syscalls);
    248      1.30     rmind 		if (error != 0) {
    249      1.30     rmind 			return error;
    250      1.30     rmind 		}
    251      1.34     rmind 		/*
    252      1.34     rmind 		 * Make sure that no semaphores are in use.  Note: semops
    253      1.34     rmind 		 * must be unused at this point.
    254      1.34     rmind 		 */
    255      1.34     rmind 		if (nsems_total) {
    256      1.30     rmind 			error = syscall_establish(NULL, ksem_syscalls);
    257      1.30     rmind 			KASSERT(error == 0);
    258      1.30     rmind 			return EBUSY;
    259      1.30     rmind 		}
    260       1.3   thorpej 	}
    261      1.38      elad 	kauth_unlisten_scope(ksem_listener);
    262  1.51.2.1  christos 	hashdone(ksem_pshared_hashtab, HASH_LIST, ksem_pshared_hashmask);
    263  1.51.2.1  christos 	rw_destroy(&ksem_pshared_lock);
    264      1.30     rmind 	mutex_destroy(&ksem_lock);
    265      1.43  pgoyette 	sysctl_teardown(&ksem_clog);
    266      1.30     rmind 	return 0;
    267       1.3   thorpej }
    268       1.3   thorpej 
    269      1.30     rmind static int
    270      1.30     rmind ksem_modcmd(modcmd_t cmd, void *arg)
    271       1.3   thorpej {
    272       1.3   thorpej 
    273      1.30     rmind 	switch (cmd) {
    274      1.30     rmind 	case MODULE_CMD_INIT:
    275      1.30     rmind 		return ksem_sysinit();
    276       1.3   thorpej 
    277      1.30     rmind 	case MODULE_CMD_FINI:
    278      1.30     rmind 		return ksem_sysfini(true);
    279       1.1  christos 
    280      1.30     rmind 	default:
    281      1.30     rmind 		return ENOTTY;
    282      1.16   thorpej 	}
    283      1.16   thorpej }
    284      1.16   thorpej 
    285      1.30     rmind static ksem_t *
    286      1.30     rmind ksem_lookup(const char *name)
    287       1.3   thorpej {
    288      1.30     rmind 	ksem_t *ks;
    289       1.3   thorpej 
    290      1.30     rmind 	KASSERT(mutex_owned(&ksem_lock));
    291       1.3   thorpej 
    292      1.30     rmind 	LIST_FOREACH(ks, &ksem_head, ks_entry) {
    293      1.30     rmind 		if (strcmp(ks->ks_name, name) == 0) {
    294      1.30     rmind 			mutex_enter(&ks->ks_lock);
    295      1.30     rmind 			return ks;
    296       1.3   thorpej 		}
    297       1.1  christos 	}
    298      1.30     rmind 	return NULL;
    299       1.1  christos }
    300       1.1  christos 
    301       1.3   thorpej static int
    302      1.30     rmind ksem_perm(lwp_t *l, ksem_t *ks)
    303       1.3   thorpej {
    304      1.30     rmind 	kauth_cred_t uc = l->l_cred;
    305       1.3   thorpej 
    306      1.30     rmind 	KASSERT(mutex_owned(&ks->ks_lock));
    307      1.30     rmind 
    308      1.38      elad 	if (kauth_authorize_system(uc, KAUTH_SYSTEM_SEMAPHORE, 0, ks, NULL, NULL) != 0)
    309      1.38      elad 		return EACCES;
    310      1.38      elad 
    311      1.38      elad 	return 0;
    312       1.3   thorpej }
    313       1.3   thorpej 
    314      1.30     rmind /*
    315  1.51.2.1  christos  * Bits 1..23 are random, just pluck a few of those and assume the
    316  1.51.2.1  christos  * distribution is going to be pretty good.
    317  1.51.2.1  christos  */
    318  1.51.2.1  christos #define	KSEM_PSHARED_HASH(id)	(((id) >> 1) & ksem_pshared_hashmask)
    319  1.51.2.1  christos 
    320  1.51.2.1  christos static void
    321  1.51.2.1  christos ksem_remove_pshared(ksem_t *ksem)
    322  1.51.2.1  christos {
    323  1.51.2.1  christos 	rw_enter(&ksem_pshared_lock, RW_WRITER);
    324  1.51.2.1  christos 	LIST_REMOVE(ksem, ks_entry);
    325  1.51.2.1  christos 	rw_exit(&ksem_pshared_lock);
    326  1.51.2.1  christos }
    327  1.51.2.1  christos 
    328  1.51.2.1  christos static ksem_t *
    329  1.51.2.1  christos ksem_lookup_pshared_locked(intptr_t id)
    330  1.51.2.1  christos {
    331  1.51.2.1  christos 	u_long bucket = KSEM_PSHARED_HASH(id);
    332  1.51.2.1  christos 	ksem_t *ksem = NULL;
    333  1.51.2.1  christos 
    334  1.51.2.1  christos 	/* ksem_t is locked and referenced upon return. */
    335  1.51.2.1  christos 
    336  1.51.2.1  christos 	LIST_FOREACH(ksem, &ksem_pshared_hashtab[bucket], ks_entry) {
    337  1.51.2.1  christos 		if (ksem->ks_pshared_id == id) {
    338  1.51.2.1  christos 			mutex_enter(&ksem->ks_lock);
    339  1.51.2.1  christos 			if (ksem->ks_pshared_proc == NULL) {
    340  1.51.2.1  christos 				/*
    341  1.51.2.1  christos 				 * This entry is dead, and in the process
    342  1.51.2.1  christos 				 * of being torn down; skip it.
    343  1.51.2.1  christos 				 */
    344  1.51.2.1  christos 				mutex_exit(&ksem->ks_lock);
    345  1.51.2.1  christos 				continue;
    346  1.51.2.1  christos 			}
    347  1.51.2.1  christos 			ksem->ks_ref++;
    348  1.51.2.1  christos 			KASSERT(ksem->ks_ref != 0);
    349  1.51.2.1  christos 			return ksem;
    350  1.51.2.1  christos 		}
    351  1.51.2.1  christos 	}
    352  1.51.2.1  christos 
    353  1.51.2.1  christos 	return NULL;
    354  1.51.2.1  christos }
    355  1.51.2.1  christos 
    356  1.51.2.1  christos static ksem_t *
    357  1.51.2.1  christos ksem_lookup_pshared(intptr_t id)
    358  1.51.2.1  christos {
    359  1.51.2.1  christos 	rw_enter(&ksem_pshared_lock, RW_READER);
    360  1.51.2.1  christos 	ksem_t *ksem = ksem_lookup_pshared_locked(id);
    361  1.51.2.1  christos 	rw_exit(&ksem_pshared_lock);
    362  1.51.2.1  christos 	return ksem;
    363  1.51.2.1  christos }
    364  1.51.2.1  christos 
    365  1.51.2.1  christos static void
    366  1.51.2.1  christos ksem_alloc_pshared_id(ksem_t *ksem)
    367  1.51.2.1  christos {
    368  1.51.2.1  christos 	uint32_t try;
    369  1.51.2.1  christos 
    370  1.51.2.1  christos 	KASSERT(ksem->ks_pshared_proc != NULL);
    371  1.51.2.1  christos 
    372  1.51.2.1  christos 	rw_enter(&ksem_pshared_lock, RW_WRITER);
    373  1.51.2.1  christos 	for (;;) {
    374  1.51.2.1  christos 		try = (cprng_fast32() & ~KSEM_MARKER_MASK) |
    375  1.51.2.1  christos 		    KSEM_PSHARED_MARKER;
    376  1.51.2.1  christos 
    377  1.51.2.1  christos 		if (ksem_lookup_pshared_locked(try) == NULL) {
    378  1.51.2.1  christos 			/* Got it! */
    379  1.51.2.1  christos 			break;
    380  1.51.2.1  christos 		}
    381  1.51.2.1  christos 	}
    382  1.51.2.1  christos 	ksem->ks_pshared_id = try;
    383  1.51.2.1  christos 	u_long bucket = KSEM_PSHARED_HASH(ksem->ks_pshared_id);
    384  1.51.2.1  christos 	LIST_INSERT_HEAD(&ksem_pshared_hashtab[bucket], ksem, ks_entry);
    385  1.51.2.1  christos 	rw_exit(&ksem_pshared_lock);
    386  1.51.2.1  christos }
    387  1.51.2.1  christos 
    388  1.51.2.1  christos /*
    389      1.30     rmind  * ksem_get: get the semaphore from the descriptor.
    390      1.30     rmind  *
    391  1.51.2.1  christos  * => locks the semaphore, if found, and holds an extra reference.
    392      1.30     rmind  * => holds a reference on the file descriptor.
    393      1.30     rmind  */
    394      1.30     rmind static int
    395  1.51.2.1  christos ksem_get(intptr_t id, ksem_t **ksret, int *fdp)
    396      1.13      cube {
    397      1.30     rmind 	ksem_t *ks;
    398  1.51.2.1  christos 	int fd;
    399      1.13      cube 
    400  1.51.2.1  christos 	if ((id & KSEM_MARKER_MASK) == KSEM_PSHARED_MARKER) {
    401  1.51.2.1  christos 		/*
    402  1.51.2.1  christos 		 * ksem_lookup_pshared() returns the ksem_t *
    403  1.51.2.1  christos 		 * locked and referenced.
    404  1.51.2.1  christos 		 */
    405  1.51.2.1  christos 		ks = ksem_lookup_pshared(id);
    406  1.51.2.1  christos 		if (ks == NULL)
    407  1.51.2.1  christos 			return EINVAL;
    408  1.51.2.1  christos 		KASSERT(ks->ks_pshared_id == id);
    409  1.51.2.1  christos 		KASSERT(ks->ks_pshared_proc != NULL);
    410  1.51.2.1  christos 		fd = -1;
    411  1.51.2.1  christos 	} else if (id <= INT_MAX) {
    412  1.51.2.1  christos 		fd = (int)id;
    413  1.51.2.1  christos 		file_t *fp = fd_getfile(fd);
    414  1.51.2.1  christos 
    415  1.51.2.1  christos 		if (__predict_false(fp == NULL))
    416  1.51.2.1  christos 			return EINVAL;
    417  1.51.2.1  christos 		if (__predict_false(fp->f_type != DTYPE_SEM)) {
    418  1.51.2.1  christos 			fd_putfile(fd);
    419  1.51.2.1  christos 			return EINVAL;
    420  1.51.2.1  christos 		}
    421  1.51.2.1  christos 		ks = fp->f_ksem;
    422  1.51.2.1  christos 		mutex_enter(&ks->ks_lock);
    423  1.51.2.1  christos 		ks->ks_ref++;
    424  1.51.2.1  christos 	} else {
    425      1.37     joerg 		return EINVAL;
    426      1.13      cube 	}
    427      1.13      cube 
    428      1.30     rmind 	*ksret = ks;
    429  1.51.2.1  christos 	*fdp = fd;
    430      1.30     rmind 	return 0;
    431       1.1  christos }
    432       1.1  christos 
    433      1.30     rmind /*
    434      1.30     rmind  * ksem_create: allocate and setup a new semaphore structure.
    435      1.30     rmind  */
    436       1.1  christos static int
    437      1.30     rmind ksem_create(lwp_t *l, const char *name, ksem_t **ksret, mode_t mode, u_int val)
    438       1.1  christos {
    439      1.30     rmind 	ksem_t *ks;
    440      1.14      elad 	kauth_cred_t uc;
    441      1.30     rmind 	char *kname;
    442       1.1  christos 	size_t len;
    443       1.1  christos 
    444      1.30     rmind 	/* Pre-check for the limit. */
    445      1.30     rmind 	if (nsems >= ksem_max) {
    446      1.30     rmind 		return ENFILE;
    447      1.30     rmind 	}
    448      1.30     rmind 
    449      1.30     rmind 	if (val > SEM_VALUE_MAX) {
    450      1.30     rmind 		return EINVAL;
    451      1.30     rmind 	}
    452      1.30     rmind 
    453       1.1  christos 	if (name != NULL) {
    454       1.1  christos 		len = strlen(name);
    455       1.1  christos 		if (len > SEM_MAX_NAMELEN) {
    456      1.30     rmind 			return ENAMETOOLONG;
    457       1.1  christos 		}
    458      1.30     rmind 		/* Name must start with a '/' but not contain one. */
    459       1.1  christos 		if (*name != '/' || len < 2 || strchr(name + 1, '/') != NULL) {
    460      1.30     rmind 			return EINVAL;
    461       1.1  christos 		}
    462      1.30     rmind 		kname = kmem_alloc(++len, KM_SLEEP);
    463      1.30     rmind 		strlcpy(kname, name, len);
    464      1.30     rmind 	} else {
    465      1.30     rmind 		kname = NULL;
    466      1.30     rmind 		len = 0;
    467      1.30     rmind 	}
    468      1.30     rmind 
    469  1.51.2.2    martin 	chgsemcnt(kauth_cred_getuid(l->l_cred), 1);
    470      1.46  christos 
    471      1.30     rmind 	ks = kmem_zalloc(sizeof(ksem_t), KM_SLEEP);
    472      1.30     rmind 	mutex_init(&ks->ks_lock, MUTEX_DEFAULT, IPL_NONE);
    473      1.30     rmind 	cv_init(&ks->ks_cv, "psem");
    474      1.30     rmind 	ks->ks_name = kname;
    475      1.30     rmind 	ks->ks_namelen = len;
    476      1.30     rmind 	ks->ks_mode = mode;
    477      1.30     rmind 	ks->ks_value = val;
    478      1.30     rmind 	ks->ks_ref = 1;
    479      1.30     rmind 
    480      1.30     rmind 	uc = l->l_cred;
    481      1.30     rmind 	ks->ks_uid = kauth_cred_geteuid(uc);
    482      1.30     rmind 	ks->ks_gid = kauth_cred_getegid(uc);
    483      1.30     rmind 
    484      1.34     rmind 	atomic_inc_uint(&nsems_total);
    485      1.30     rmind 	*ksret = ks;
    486      1.30     rmind 	return 0;
    487      1.30     rmind }
    488      1.30     rmind 
    489      1.30     rmind static void
    490      1.30     rmind ksem_free(ksem_t *ks)
    491      1.30     rmind {
    492       1.3   thorpej 
    493      1.34     rmind 	KASSERT(!cv_has_waiters(&ks->ks_cv));
    494      1.34     rmind 
    495  1.51.2.1  christos 	if (ks->ks_pshared_id) {
    496  1.51.2.1  christos 		KASSERT(ks->ks_pshared_proc == NULL);
    497  1.51.2.1  christos 		ksem_remove_pshared(ks);
    498  1.51.2.1  christos 	}
    499      1.30     rmind 	if (ks->ks_name) {
    500      1.30     rmind 		KASSERT(ks->ks_namelen > 0);
    501      1.30     rmind 		kmem_free(ks->ks_name, ks->ks_namelen);
    502      1.13      cube 	}
    503      1.30     rmind 	mutex_destroy(&ks->ks_lock);
    504      1.30     rmind 	cv_destroy(&ks->ks_cv);
    505      1.30     rmind 	kmem_free(ks, sizeof(ksem_t));
    506      1.34     rmind 
    507      1.34     rmind 	atomic_dec_uint(&nsems_total);
    508  1.51.2.1  christos 	chgsemcnt(kauth_cred_getuid(curproc->p_cred), -1);
    509  1.51.2.1  christos }
    510  1.51.2.1  christos 
    511  1.51.2.1  christos #define	KSEM_ID_IS_PSHARED(id)		\
    512  1.51.2.1  christos 	(((id) & KSEM_MARKER_MASK) == KSEM_PSHARED_MARKER)
    513  1.51.2.1  christos 
    514  1.51.2.1  christos static void
    515  1.51.2.1  christos ksem_release(ksem_t *ksem, int fd)
    516  1.51.2.1  christos {
    517  1.51.2.1  christos 	bool destroy = false;
    518  1.51.2.1  christos 
    519  1.51.2.1  christos 	KASSERT(mutex_owned(&ksem->ks_lock));
    520  1.51.2.1  christos 
    521  1.51.2.1  christos 	KASSERT(ksem->ks_ref > 0);
    522  1.51.2.1  christos 	if (--ksem->ks_ref == 0) {
    523  1.51.2.1  christos 		/*
    524  1.51.2.1  christos 		 * Destroy if the last reference and semaphore is unnamed,
    525  1.51.2.1  christos 		 * or unlinked (for named semaphore).
    526  1.51.2.1  christos 		 */
    527  1.51.2.1  christos 		destroy = (ksem->ks_flags & KS_UNLINKED) ||
    528  1.51.2.1  christos 		    (ksem->ks_name == NULL);
    529  1.51.2.1  christos 	}
    530  1.51.2.1  christos 	mutex_exit(&ksem->ks_lock);
    531  1.51.2.1  christos 
    532  1.51.2.1  christos 	if (destroy) {
    533  1.51.2.1  christos 		ksem_free(ksem);
    534  1.51.2.1  christos 	}
    535  1.51.2.1  christos 	if (fd != -1) {
    536  1.51.2.1  christos 		fd_putfile(fd);
    537  1.51.2.1  christos 	}
    538       1.1  christos }
    539       1.1  christos 
    540       1.1  christos int
    541      1.30     rmind sys__ksem_init(struct lwp *l, const struct sys__ksem_init_args *uap,
    542      1.30     rmind     register_t *retval)
    543       1.1  christos {
    544      1.23       dsl 	/* {
    545       1.1  christos 		unsigned int value;
    546      1.29        ad 		intptr_t *idp;
    547      1.23       dsl 	} */
    548      1.13      cube 
    549  1.51.2.1  christos 	return do_ksem_init(l, SCARG(uap, value), SCARG(uap, idp),
    550  1.51.2.1  christos 	    copyin, copyout);
    551      1.13      cube }
    552      1.13      cube 
    553      1.13      cube int
    554  1.51.2.1  christos do_ksem_init(lwp_t *l, u_int val, intptr_t *idp, copyin_t docopyin,
    555  1.51.2.1  christos     copyout_t docopyout)
    556      1.13      cube {
    557      1.30     rmind 	proc_t *p = l->l_proc;
    558      1.30     rmind 	ksem_t *ks;
    559      1.30     rmind 	file_t *fp;
    560  1.51.2.1  christos 	intptr_t id, arg;
    561      1.30     rmind 	int fd, error;
    562       1.1  christos 
    563  1.51.2.1  christos 	/*
    564  1.51.2.1  christos 	 * Newer versions of librt / libpthread pass us 'PSRD' in *idp to
    565  1.51.2.1  christos 	 * indicate that a pshared semaphore is wanted.  In that case we
    566  1.51.2.1  christos 	 * allocate globally unique ID and return that, rather than the
    567  1.51.2.1  christos 	 * process-scoped file descriptor ID.
    568  1.51.2.1  christos 	 */
    569  1.51.2.1  christos 	error = (*docopyin)(idp, &arg, sizeof(*idp));
    570  1.51.2.1  christos 	if (error) {
    571  1.51.2.1  christos 		return error;
    572  1.51.2.1  christos 	}
    573  1.51.2.1  christos 
    574      1.30     rmind 	error = fd_allocfile(&fp, &fd);
    575       1.1  christos 	if (error) {
    576      1.30     rmind 		return error;
    577       1.1  christos 	}
    578      1.30     rmind 	fp->f_type = DTYPE_SEM;
    579      1.30     rmind 	fp->f_flag = FREAD | FWRITE;
    580      1.30     rmind 	fp->f_ops = &semops;
    581       1.3   thorpej 
    582  1.51.2.1  christos 	if (fd >= KSEM_MARKER_MIN) {
    583  1.51.2.1  christos 		/*
    584  1.51.2.1  christos 		 * This is super-unlikely, but we check for it anyway
    585  1.51.2.1  christos 		 * because potential collisions with the pshared marker
    586  1.51.2.1  christos 		 * would be bad.
    587  1.51.2.1  christos 		 */
    588      1.30     rmind 		fd_abort(p, fp, fd);
    589  1.51.2.1  christos 		return EMFILE;
    590      1.30     rmind 	}
    591       1.3   thorpej 
    592      1.30     rmind 	/* Note the mode does not matter for anonymous semaphores. */
    593      1.30     rmind 	error = ksem_create(l, NULL, &ks, 0, val);
    594      1.30     rmind 	if (error) {
    595      1.30     rmind 		fd_abort(p, fp, fd);
    596      1.30     rmind 		return error;
    597      1.30     rmind 	}
    598  1.51.2.1  christos 
    599  1.51.2.1  christos 	if (arg == KSEM_PSHARED) {
    600  1.51.2.1  christos 		ks->ks_pshared_proc = curproc;
    601  1.51.2.1  christos 		ks->ks_pshared_fd = fd;
    602  1.51.2.1  christos 		ksem_alloc_pshared_id(ks);
    603  1.51.2.1  christos 		id = ks->ks_pshared_id;
    604  1.51.2.1  christos 	} else {
    605  1.51.2.1  christos 		id = (intptr_t)fd;
    606  1.51.2.1  christos 	}
    607  1.51.2.1  christos 
    608  1.51.2.1  christos 	error = (*docopyout)(&id, idp, sizeof(*idp));
    609  1.51.2.1  christos 	if (error) {
    610  1.51.2.1  christos 		ksem_free(ks);
    611  1.51.2.1  christos 		fd_abort(p, fp, fd);
    612  1.51.2.1  christos 		return error;
    613  1.51.2.1  christos 	}
    614  1.51.2.1  christos 
    615      1.42      matt 	fp->f_ksem = ks;
    616      1.30     rmind 	fd_affix(p, fp, fd);
    617      1.30     rmind 	return error;
    618       1.1  christos }
    619       1.1  christos 
    620       1.1  christos int
    621      1.30     rmind sys__ksem_open(struct lwp *l, const struct sys__ksem_open_args *uap,
    622      1.30     rmind     register_t *retval)
    623       1.1  christos {
    624      1.23       dsl 	/* {
    625       1.1  christos 		const char *name;
    626       1.1  christos 		int oflag;
    627       1.1  christos 		mode_t mode;
    628       1.1  christos 		unsigned int value;
    629      1.29        ad 		intptr_t *idp;
    630      1.23       dsl 	} */
    631      1.13      cube 
    632      1.13      cube 	return do_ksem_open(l, SCARG(uap, name), SCARG(uap, oflag),
    633      1.13      cube 	    SCARG(uap, mode), SCARG(uap, value), SCARG(uap, idp), copyout);
    634      1.13      cube }
    635      1.13      cube 
    636      1.13      cube int
    637      1.13      cube do_ksem_open(struct lwp *l, const char *semname, int oflag, mode_t mode,
    638      1.29        ad      unsigned int value, intptr_t *idp, copyout_t docopyout)
    639      1.13      cube {
    640      1.51  christos 	char *name;
    641      1.30     rmind 	proc_t *p = l->l_proc;
    642      1.30     rmind 	ksem_t *ksnew = NULL, *ks;
    643      1.30     rmind 	file_t *fp;
    644      1.29        ad 	intptr_t id;
    645      1.30     rmind 	int fd, error;
    646       1.1  christos 
    647      1.51  christos 	error = name_copyin(semname, &name);
    648      1.30     rmind 	if (error) {
    649      1.30     rmind 		return error;
    650      1.30     rmind 	}
    651      1.30     rmind 	error = fd_allocfile(&fp, &fd);
    652      1.30     rmind 	if (error) {
    653      1.51  christos 		name_destroy(&name);
    654      1.30     rmind 		return error;
    655      1.30     rmind 	}
    656      1.30     rmind 	fp->f_type = DTYPE_SEM;
    657      1.30     rmind 	fp->f_flag = FREAD | FWRITE;
    658      1.30     rmind 	fp->f_ops = &semops;
    659      1.30     rmind 
    660  1.51.2.1  christos 	if (fd >= KSEM_MARKER_MIN) {
    661  1.51.2.1  christos 		/*
    662  1.51.2.1  christos 		 * This is super-unlikely, but we check for it anyway
    663  1.51.2.1  christos 		 * because potential collisions with the pshared marker
    664  1.51.2.1  christos 		 * would be bad.
    665  1.51.2.1  christos 		 */
    666  1.51.2.1  christos 		fd_abort(p, fp, fd);
    667  1.51.2.1  christos 		return EMFILE;
    668  1.51.2.1  christos 	}
    669  1.51.2.1  christos 
    670      1.30     rmind 	/*
    671      1.30     rmind 	 * The ID (file descriptor number) can be stored early.
    672      1.30     rmind 	 * Note that zero is a special value for libpthread.
    673      1.30     rmind 	 */
    674      1.30     rmind 	id = (intptr_t)fd;
    675      1.30     rmind 	error = (*docopyout)(&id, idp, sizeof(*idp));
    676      1.30     rmind 	if (error) {
    677      1.30     rmind 		goto err;
    678      1.30     rmind 	}
    679      1.30     rmind 
    680      1.30     rmind 	if (oflag & O_CREAT) {
    681      1.30     rmind 		/* Create a new semaphore. */
    682      1.30     rmind 		error = ksem_create(l, name, &ksnew, mode, value);
    683      1.30     rmind 		if (error) {
    684      1.30     rmind 			goto err;
    685      1.30     rmind 		}
    686      1.30     rmind 		KASSERT(ksnew != NULL);
    687      1.30     rmind 	}
    688       1.1  christos 
    689      1.30     rmind 	/* Lookup for a semaphore with such name. */
    690      1.30     rmind 	mutex_enter(&ksem_lock);
    691      1.30     rmind 	ks = ksem_lookup(name);
    692      1.51  christos 	name_destroy(&name);
    693      1.30     rmind 	if (ks) {
    694      1.30     rmind 		KASSERT(mutex_owned(&ks->ks_lock));
    695      1.30     rmind 		mutex_exit(&ksem_lock);
    696       1.3   thorpej 
    697       1.3   thorpej 		/* Check for exclusive create. */
    698      1.13      cube 		if (oflag & O_EXCL) {
    699      1.30     rmind 			mutex_exit(&ks->ks_lock);
    700      1.30     rmind 			error = EEXIST;
    701      1.30     rmind 			goto err;
    702       1.1  christos 		}
    703       1.1  christos 		/*
    704      1.30     rmind 		 * Verify permissions.  If we can access it,
    705      1.30     rmind 		 * add the reference of this thread.
    706       1.1  christos 		 */
    707      1.15        ad 		error = ksem_perm(l, ks);
    708      1.30     rmind 		if (error == 0) {
    709      1.30     rmind 			ks->ks_ref++;
    710      1.30     rmind 		}
    711      1.30     rmind 		mutex_exit(&ks->ks_lock);
    712       1.1  christos 		if (error) {
    713      1.30     rmind 			goto err;
    714      1.30     rmind 		}
    715      1.30     rmind 	} else {
    716      1.30     rmind 		/* Fail if not found and not creating. */
    717      1.30     rmind 		if ((oflag & O_CREAT) == 0) {
    718      1.30     rmind 			mutex_exit(&ksem_lock);
    719      1.30     rmind 			KASSERT(ksnew == NULL);
    720      1.31     rmind 			error = ENOENT;
    721      1.31     rmind 			goto err;
    722       1.1  christos 		}
    723       1.3   thorpej 
    724      1.30     rmind 		/* Check for the limit locked. */
    725      1.30     rmind 		if (nsems >= ksem_max) {
    726      1.30     rmind 			mutex_exit(&ksem_lock);
    727      1.30     rmind 			error = ENFILE;
    728      1.30     rmind 			goto err;
    729      1.30     rmind 		}
    730       1.3   thorpej 
    731      1.30     rmind 		/*
    732      1.32     rmind 		 * Finally, insert semaphore into the list.
    733      1.30     rmind 		 * Note: it already has the initial reference.
    734      1.30     rmind 		 */
    735      1.30     rmind 		ks = ksnew;
    736      1.30     rmind 		LIST_INSERT_HEAD(&ksem_head, ks, ks_entry);
    737      1.30     rmind 		nsems++;
    738      1.30     rmind 		mutex_exit(&ksem_lock);
    739      1.30     rmind 
    740      1.30     rmind 		ksnew = NULL;
    741      1.30     rmind 	}
    742      1.30     rmind 	KASSERT(ks != NULL);
    743      1.42      matt 	fp->f_ksem = ks;
    744      1.30     rmind 	fd_affix(p, fp, fd);
    745      1.30     rmind err:
    746      1.51  christos 	name_destroy(&name);
    747      1.30     rmind 	if (error) {
    748      1.30     rmind 		fd_abort(p, fp, fd);
    749       1.3   thorpej 	}
    750      1.30     rmind 	if (ksnew) {
    751      1.30     rmind 		ksem_free(ksnew);
    752       1.1  christos 	}
    753      1.30     rmind 	return error;
    754      1.30     rmind }
    755       1.1  christos 
    756      1.30     rmind int
    757      1.30     rmind sys__ksem_close(struct lwp *l, const struct sys__ksem_close_args *uap,
    758      1.30     rmind     register_t *retval)
    759      1.30     rmind {
    760      1.30     rmind 	/* {
    761      1.30     rmind 		intptr_t id;
    762      1.30     rmind 	} */
    763  1.51.2.1  christos 	intptr_t id = SCARG(uap, id);
    764  1.51.2.1  christos 	int fd, error;
    765  1.51.2.1  christos 	ksem_t *ks;
    766  1.51.2.1  christos 
    767  1.51.2.1  christos 	error = ksem_get(id, &ks, &fd);
    768  1.51.2.1  christos 	if (error) {
    769  1.51.2.1  christos 		return error;
    770  1.51.2.1  christos 	}
    771      1.33     rmind 
    772  1.51.2.1  christos 	/* This is only for named semaphores. */
    773  1.51.2.1  christos 	if (ks->ks_name == NULL) {
    774  1.51.2.1  christos 		error = EINVAL;
    775  1.51.2.1  christos 	}
    776  1.51.2.1  christos 	ksem_release(ks, -1);
    777  1.51.2.1  christos 	if (error) {
    778  1.51.2.1  christos 		if (fd != -1)
    779  1.51.2.1  christos 			fd_putfile(fd);
    780  1.51.2.1  christos 		return error;
    781      1.33     rmind 	}
    782      1.33     rmind 	return fd_close(fd);
    783       1.1  christos }
    784       1.1  christos 
    785      1.30     rmind static int
    786      1.39  christos ksem_read_fop(file_t *fp, off_t *offset, struct uio *uio, kauth_cred_t cred,
    787      1.39  christos     int flags)
    788      1.39  christos {
    789      1.39  christos 	size_t len;
    790      1.39  christos 	char *name;
    791      1.42      matt 	ksem_t *ks = fp->f_ksem;
    792      1.39  christos 
    793      1.39  christos 	mutex_enter(&ks->ks_lock);
    794      1.39  christos 	len = ks->ks_namelen;
    795      1.39  christos 	name = ks->ks_name;
    796      1.39  christos 	mutex_exit(&ks->ks_lock);
    797      1.39  christos 	if (name == NULL || len == 0)
    798      1.39  christos 		return 0;
    799      1.39  christos 	return uiomove(name, len, uio);
    800      1.39  christos }
    801      1.39  christos 
    802      1.39  christos static int
    803      1.39  christos ksem_stat_fop(file_t *fp, struct stat *ub)
    804      1.39  christos {
    805      1.42      matt 	ksem_t *ks = fp->f_ksem;
    806      1.39  christos 
    807      1.39  christos 	mutex_enter(&ks->ks_lock);
    808      1.39  christos 
    809      1.39  christos 	memset(ub, 0, sizeof(*ub));
    810      1.39  christos 
    811      1.39  christos 	ub->st_mode = ks->ks_mode | ((ks->ks_name && ks->ks_namelen)
    812      1.39  christos 	    ? _S_IFLNK : _S_IFREG);
    813      1.39  christos 	ub->st_uid = ks->ks_uid;
    814      1.39  christos 	ub->st_gid = ks->ks_gid;
    815      1.39  christos 	ub->st_size = ks->ks_value;
    816      1.39  christos 	ub->st_blocks = (ub->st_size) ? 1 : 0;
    817      1.39  christos 	ub->st_nlink = ks->ks_ref;
    818      1.39  christos 	ub->st_blksize = 4096;
    819      1.39  christos 
    820      1.39  christos 	nanotime(&ub->st_atimespec);
    821      1.39  christos 	ub->st_mtimespec = ub->st_ctimespec = ub->st_birthtimespec =
    822      1.39  christos 	    ub->st_atimespec;
    823      1.39  christos 
    824      1.39  christos 	/*
    825      1.39  christos 	 * Left as 0: st_dev, st_ino, st_rdev, st_flags, st_gen.
    826      1.39  christos 	 * XXX (st_dev, st_ino) should be unique.
    827      1.39  christos 	 */
    828      1.39  christos 	mutex_exit(&ks->ks_lock);
    829      1.39  christos 	return 0;
    830      1.39  christos }
    831      1.39  christos 
    832      1.39  christos static int
    833      1.30     rmind ksem_close_fop(file_t *fp)
    834       1.1  christos {
    835      1.42      matt 	ksem_t *ks = fp->f_ksem;
    836       1.1  christos 
    837      1.30     rmind 	mutex_enter(&ks->ks_lock);
    838       1.3   thorpej 
    839  1.51.2.1  christos 	if (ks->ks_pshared_id) {
    840  1.51.2.1  christos 		if (ks->ks_pshared_proc != curproc) {
    841  1.51.2.1  christos 			/* Do nothing if this is not the creator. */
    842  1.51.2.1  christos 			mutex_exit(&ks->ks_lock);
    843  1.51.2.1  christos 			return 0;
    844  1.51.2.1  christos 		}
    845  1.51.2.1  christos 		/* Mark this semaphore as dead. */
    846  1.51.2.1  christos 		ks->ks_pshared_proc = NULL;
    847      1.30     rmind 	}
    848  1.51.2.1  christos 
    849  1.51.2.1  christos 	ksem_release(ks, -1);
    850      1.30     rmind 	return 0;
    851       1.1  christos }
    852       1.1  christos 
    853       1.1  christos int
    854      1.30     rmind sys__ksem_unlink(struct lwp *l, const struct sys__ksem_unlink_args *uap,
    855      1.30     rmind     register_t *retval)
    856       1.1  christos {
    857      1.23       dsl 	/* {
    858       1.1  christos 		const char *name;
    859      1.23       dsl 	} */
    860      1.51  christos 	char *name;
    861      1.30     rmind 	ksem_t *ks;
    862      1.30     rmind 	u_int refcnt;
    863       1.1  christos 	int error;
    864       1.1  christos 
    865      1.51  christos 	error = name_copyin(SCARG(uap, name), &name);
    866       1.1  christos 	if (error)
    867       1.1  christos 		return error;
    868       1.1  christos 
    869      1.30     rmind 	mutex_enter(&ksem_lock);
    870      1.30     rmind 	ks = ksem_lookup(name);
    871      1.51  christos 	name_destroy(&name);
    872       1.3   thorpej 	if (ks == NULL) {
    873      1.30     rmind 		mutex_exit(&ksem_lock);
    874      1.30     rmind 		return ENOENT;
    875       1.1  christos 	}
    876      1.30     rmind 	KASSERT(mutex_owned(&ks->ks_lock));
    877       1.3   thorpej 
    878      1.30     rmind 	/* Verify permissions. */
    879      1.30     rmind 	error = ksem_perm(l, ks);
    880      1.30     rmind 	if (error) {
    881      1.30     rmind 		mutex_exit(&ks->ks_lock);
    882      1.30     rmind 		mutex_exit(&ksem_lock);
    883      1.30     rmind 		return error;
    884      1.30     rmind 	}
    885       1.3   thorpej 
    886      1.31     rmind 	/* Remove from the global list. */
    887       1.3   thorpej 	LIST_REMOVE(ks, ks_entry);
    888      1.30     rmind 	nsems--;
    889      1.31     rmind 	mutex_exit(&ksem_lock);
    890       1.3   thorpej 
    891      1.30     rmind 	refcnt = ks->ks_ref;
    892      1.30     rmind 	if (refcnt) {
    893      1.30     rmind 		/* Mark as unlinked, if there are references. */
    894      1.30     rmind 		ks->ks_flags |= KS_UNLINKED;
    895      1.30     rmind 	}
    896      1.30     rmind 	mutex_exit(&ks->ks_lock);
    897       1.3   thorpej 
    898      1.30     rmind 	if (refcnt == 0) {
    899       1.3   thorpej 		ksem_free(ks);
    900      1.30     rmind 	}
    901      1.30     rmind 	return 0;
    902       1.1  christos }
    903       1.1  christos 
    904       1.1  christos int
    905      1.30     rmind sys__ksem_post(struct lwp *l, const struct sys__ksem_post_args *uap,
    906      1.30     rmind     register_t *retval)
    907       1.1  christos {
    908      1.23       dsl 	/* {
    909      1.29        ad 		intptr_t id;
    910      1.23       dsl 	} */
    911  1.51.2.1  christos 	int fd, error;
    912      1.30     rmind 	ksem_t *ks;
    913       1.1  christos 
    914  1.51.2.1  christos 	error = ksem_get(SCARG(uap, id), &ks, &fd);
    915      1.30     rmind 	if (error) {
    916      1.30     rmind 		return error;
    917       1.3   thorpej 	}
    918      1.30     rmind 	KASSERT(mutex_owned(&ks->ks_lock));
    919       1.1  christos 	if (ks->ks_value == SEM_VALUE_MAX) {
    920       1.1  christos 		error = EOVERFLOW;
    921       1.3   thorpej 		goto out;
    922       1.1  christos 	}
    923      1.30     rmind 	ks->ks_value++;
    924      1.30     rmind 	if (ks->ks_waiters) {
    925      1.20        ad 		cv_broadcast(&ks->ks_cv);
    926      1.30     rmind 	}
    927      1.30     rmind out:
    928  1.51.2.1  christos 	ksem_release(ks, fd);
    929      1.30     rmind 	return error;
    930       1.3   thorpej }
    931       1.3   thorpej 
    932      1.36     joerg int
    933      1.41      matt do_ksem_wait(lwp_t *l, intptr_t id, bool try_p, struct timespec *abstime)
    934       1.3   thorpej {
    935  1.51.2.1  christos 	int fd, error, timeo;
    936      1.30     rmind 	ksem_t *ks;
    937       1.3   thorpej 
    938  1.51.2.1  christos 	error = ksem_get(id, &ks, &fd);
    939      1.30     rmind 	if (error) {
    940      1.30     rmind 		return error;
    941      1.30     rmind 	}
    942      1.30     rmind 	KASSERT(mutex_owned(&ks->ks_lock));
    943       1.3   thorpej 	while (ks->ks_value == 0) {
    944       1.3   thorpej 		ks->ks_waiters++;
    945      1.41      matt 		if (!try_p && abstime != NULL) {
    946      1.40  christos 			error = ts2timo(CLOCK_REALTIME, TIMER_ABSTIME, abstime,
    947      1.40  christos 			    &timeo, NULL);
    948      1.36     joerg 			if (error != 0)
    949      1.36     joerg 				goto out;
    950      1.36     joerg 		} else {
    951      1.36     joerg 			timeo = 0;
    952      1.36     joerg 		}
    953      1.41      matt 		error = try_p ? EAGAIN : cv_timedwait_sig(&ks->ks_cv,
    954      1.36     joerg 		    &ks->ks_lock, timeo);
    955       1.3   thorpej 		ks->ks_waiters--;
    956       1.3   thorpej 		if (error)
    957       1.3   thorpej 			goto out;
    958       1.3   thorpej 	}
    959       1.3   thorpej 	ks->ks_value--;
    960      1.30     rmind out:
    961  1.51.2.1  christos 	ksem_release(ks, fd);
    962      1.30     rmind 	return error;
    963       1.1  christos }
    964       1.1  christos 
    965       1.1  christos int
    966      1.30     rmind sys__ksem_wait(struct lwp *l, const struct sys__ksem_wait_args *uap,
    967      1.30     rmind     register_t *retval)
    968       1.1  christos {
    969      1.23       dsl 	/* {
    970      1.29        ad 		intptr_t id;
    971      1.23       dsl 	} */
    972       1.1  christos 
    973      1.36     joerg 	return do_ksem_wait(l, SCARG(uap, id), false, NULL);
    974      1.36     joerg }
    975      1.36     joerg 
    976      1.36     joerg int
    977      1.36     joerg sys__ksem_timedwait(struct lwp *l, const struct sys__ksem_timedwait_args *uap,
    978      1.36     joerg     register_t *retval)
    979      1.36     joerg {
    980      1.36     joerg 	/* {
    981      1.36     joerg 		intptr_t id;
    982      1.36     joerg 		const struct timespec *abstime;
    983      1.36     joerg 	} */
    984      1.36     joerg 	struct timespec ts;
    985      1.36     joerg 	int error;
    986      1.36     joerg 
    987      1.36     joerg 	error = copyin(SCARG(uap, abstime), &ts, sizeof(ts));
    988      1.36     joerg 	if (error != 0)
    989      1.36     joerg 		return error;
    990      1.36     joerg 
    991      1.36     joerg 	if (ts.tv_sec < 0 || ts.tv_nsec < 0 || ts.tv_nsec >= 1000000000)
    992      1.36     joerg 		return EINVAL;
    993      1.36     joerg 
    994      1.36     joerg 	error = do_ksem_wait(l, SCARG(uap, id), false, &ts);
    995      1.36     joerg 	if (error == EWOULDBLOCK)
    996      1.36     joerg 		error = ETIMEDOUT;
    997      1.36     joerg 	return error;
    998       1.1  christos }
    999       1.1  christos 
   1000       1.1  christos int
   1001      1.30     rmind sys__ksem_trywait(struct lwp *l, const struct sys__ksem_trywait_args *uap,
   1002      1.30     rmind     register_t *retval)
   1003       1.1  christos {
   1004      1.23       dsl 	/* {
   1005      1.29        ad 		intptr_t id;
   1006      1.23       dsl 	} */
   1007       1.1  christos 
   1008      1.36     joerg 	return do_ksem_wait(l, SCARG(uap, id), true, NULL);
   1009       1.1  christos }
   1010       1.1  christos 
   1011       1.1  christos int
   1012      1.30     rmind sys__ksem_getvalue(struct lwp *l, const struct sys__ksem_getvalue_args *uap,
   1013      1.30     rmind     register_t *retval)
   1014       1.1  christos {
   1015      1.23       dsl 	/* {
   1016      1.29        ad 		intptr_t id;
   1017       1.1  christos 		unsigned int *value;
   1018      1.23       dsl 	} */
   1019  1.51.2.1  christos 	int fd, error;
   1020      1.30     rmind 	ksem_t *ks;
   1021       1.1  christos 	unsigned int val;
   1022       1.1  christos 
   1023  1.51.2.1  christos 	error = ksem_get(SCARG(uap, id), &ks, &fd);
   1024      1.30     rmind 	if (error) {
   1025      1.30     rmind 		return error;
   1026      1.30     rmind 	}
   1027      1.30     rmind 	KASSERT(mutex_owned(&ks->ks_lock));
   1028       1.1  christos 	val = ks->ks_value;
   1029  1.51.2.1  christos 	ksem_release(ks, fd);
   1030       1.3   thorpej 
   1031      1.30     rmind 	return copyout(&val, SCARG(uap, value), sizeof(val));
   1032       1.1  christos }
   1033       1.1  christos 
   1034       1.1  christos int
   1035      1.30     rmind sys__ksem_destroy(struct lwp *l, const struct sys__ksem_destroy_args *uap,
   1036      1.30     rmind     register_t *retval)
   1037       1.1  christos {
   1038      1.23       dsl 	/* {
   1039      1.29        ad 		intptr_t id;
   1040      1.23       dsl 	} */
   1041  1.51.2.1  christos 	int fd, error;
   1042      1.30     rmind 	ksem_t *ks;
   1043       1.1  christos 
   1044  1.51.2.1  christos 	intptr_t id = SCARG(uap, id);
   1045  1.51.2.1  christos 
   1046  1.51.2.1  christos 	error = ksem_get(id, &ks, &fd);
   1047      1.30     rmind 	if (error) {
   1048      1.30     rmind 		return error;
   1049       1.3   thorpej 	}
   1050      1.30     rmind 	KASSERT(mutex_owned(&ks->ks_lock));
   1051       1.3   thorpej 
   1052      1.30     rmind 	/* Operation is only for unnamed semaphores. */
   1053       1.3   thorpej 	if (ks->ks_name != NULL) {
   1054      1.30     rmind 		error = EINVAL;
   1055      1.30     rmind 		goto out;
   1056       1.3   thorpej 	}
   1057      1.30     rmind 	/* Cannot destroy if there are waiters. */
   1058       1.3   thorpej 	if (ks->ks_waiters) {
   1059      1.30     rmind 		error = EBUSY;
   1060      1.30     rmind 		goto out;
   1061       1.3   thorpej 	}
   1062  1.51.2.1  christos 	if (KSEM_ID_IS_PSHARED(id)) {
   1063  1.51.2.1  christos 		/* Cannot destroy if we did't create it. */
   1064  1.51.2.1  christos 		KASSERT(fd == -1);
   1065  1.51.2.1  christos 		KASSERT(ks->ks_pshared_proc != NULL);
   1066  1.51.2.1  christos 		if (ks->ks_pshared_proc != curproc) {
   1067  1.51.2.1  christos 			error = EINVAL;
   1068  1.51.2.1  christos 			goto out;
   1069  1.51.2.1  christos 		}
   1070  1.51.2.1  christos 		fd = ks->ks_pshared_fd;
   1071  1.51.2.1  christos 
   1072  1.51.2.1  christos 		/* Mark it dead so subsequent lookups fail. */
   1073  1.51.2.1  christos 		ks->ks_pshared_proc = NULL;
   1074  1.51.2.1  christos 
   1075  1.51.2.1  christos 		/* Do an fd_getfile() to for the benefit of fd_close(). */
   1076  1.51.2.1  christos 		file_t *fp __diagused = fd_getfile(fd);
   1077  1.51.2.1  christos 		KASSERT(fp != NULL);
   1078  1.51.2.1  christos 		KASSERT(fp->f_ksem == ks);
   1079  1.51.2.1  christos 	}
   1080      1.30     rmind out:
   1081  1.51.2.1  christos 	ksem_release(ks, -1);
   1082      1.30     rmind 	if (error) {
   1083  1.51.2.1  christos 		if (!KSEM_ID_IS_PSHARED(id))
   1084  1.51.2.1  christos 			fd_putfile(fd);
   1085      1.27        ad 		return error;
   1086      1.27        ad 	}
   1087      1.32     rmind 	return fd_close(fd);
   1088      1.22     rmind }
   1089