Home | History | Annotate | Line # | Download | only in kern
uipc_sem.c revision 1.43
      1 /*	$NetBSD: uipc_sem.c,v 1.43 2015/11/09 01:21:18 pgoyette Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2011 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by Mindaugas Rasiukevicius.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29  * POSSIBILITY OF SUCH DAMAGE.
     30  */
     31 
     32 /*
     33  * Copyright (c) 2002 Alfred Perlstein <alfred (at) FreeBSD.org>
     34  * All rights reserved.
     35  *
     36  * Redistribution and use in source and binary forms, with or without
     37  * modification, are permitted provided that the following conditions
     38  * are met:
     39  * 1. Redistributions of source code must retain the above copyright
     40  *    notice, this list of conditions and the following disclaimer.
     41  * 2. Redistributions in binary form must reproduce the above copyright
     42  *    notice, this list of conditions and the following disclaimer in the
     43  *    documentation and/or other materials provided with the distribution.
     44  *
     45  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
     46  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     47  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     48  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     49  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     50  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     51  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     52  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     53  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     54  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     55  * SUCH DAMAGE.
     56  */
     57 
     58 /*
     59  * Implementation of POSIX semaphore.
     60  */
     61 
     62 #include <sys/cdefs.h>
     63 __KERNEL_RCSID(0, "$NetBSD: uipc_sem.c,v 1.43 2015/11/09 01:21:18 pgoyette Exp $");
     64 
     65 #include <sys/param.h>
     66 #include <sys/kernel.h>
     67 
     68 #include <sys/atomic.h>
     69 #include <sys/proc.h>
     70 #include <sys/ksem.h>
     71 #include <sys/syscall.h>
     72 #include <sys/stat.h>
     73 #include <sys/kmem.h>
     74 #include <sys/fcntl.h>
     75 #include <sys/file.h>
     76 #include <sys/filedesc.h>
     77 #include <sys/kauth.h>
     78 #include <sys/module.h>
     79 #include <sys/mount.h>
     80 #include <sys/syscall.h>
     81 #include <sys/syscallargs.h>
     82 #include <sys/syscallvar.h>
     83 #include <sys/sysctl.h>
     84 
     85 MODULE(MODULE_CLASS_MISC, ksem, NULL);
     86 
     87 #define	SEM_MAX_NAMELEN		14
     88 #define	SEM_VALUE_MAX		(~0U)
     89 
     90 #define	KS_UNLINKED		0x01
     91 
     92 static kmutex_t		ksem_lock	__cacheline_aligned;
     93 static LIST_HEAD(,ksem)	ksem_head	__cacheline_aligned;
     94 static u_int		nsems_total	__cacheline_aligned;
     95 static u_int		nsems		__cacheline_aligned;
     96 
     97 static kauth_listener_t	ksem_listener;
     98 
     99 static int		ksem_sysinit(void);
    100 static int		ksem_sysfini(bool);
    101 static int		ksem_modcmd(modcmd_t, void *);
    102 static int		ksem_close_fop(file_t *);
    103 static int		ksem_stat_fop(file_t *, struct stat *);
    104 static int		ksem_read_fop(file_t *, off_t *, struct uio *,
    105     kauth_cred_t, int);
    106 
    107 static const struct fileops semops = {
    108 	.fo_read = ksem_read_fop,
    109 	.fo_write = fbadop_write,
    110 	.fo_ioctl = fbadop_ioctl,
    111 	.fo_fcntl = fnullop_fcntl,
    112 	.fo_poll = fnullop_poll,
    113 	.fo_stat = ksem_stat_fop,
    114 	.fo_close = ksem_close_fop,
    115 	.fo_kqfilter = fnullop_kqfilter,
    116 	.fo_restart = fnullop_restart,
    117 };
    118 
    119 static const struct syscall_package ksem_syscalls[] = {
    120 	{ SYS__ksem_init, 0, (sy_call_t *)sys__ksem_init },
    121 	{ SYS__ksem_open, 0, (sy_call_t *)sys__ksem_open },
    122 	{ SYS__ksem_unlink, 0, (sy_call_t *)sys__ksem_unlink },
    123 	{ SYS__ksem_close, 0, (sy_call_t *)sys__ksem_close },
    124 	{ SYS__ksem_post, 0, (sy_call_t *)sys__ksem_post },
    125 	{ SYS__ksem_wait, 0, (sy_call_t *)sys__ksem_wait },
    126 	{ SYS__ksem_trywait, 0, (sy_call_t *)sys__ksem_trywait },
    127 	{ SYS__ksem_getvalue, 0, (sy_call_t *)sys__ksem_getvalue },
    128 	{ SYS__ksem_destroy, 0, (sy_call_t *)sys__ksem_destroy },
    129 	{ SYS__ksem_timedwait, 0, (sy_call_t *)sys__ksem_timedwait },
    130 	{ 0, 0, NULL },
    131 };
    132 
    133 struct sysctllog *ksem_clog;
    134 int ksem_max;
    135 
    136 static int
    137 ksem_listener_cb(kauth_cred_t cred, kauth_action_t action, void *cookie,
    138     void *arg0, void *arg1, void *arg2, void *arg3)
    139 {
    140 	ksem_t *ks;
    141 	mode_t mode;
    142 
    143 	if (action != KAUTH_SYSTEM_SEMAPHORE)
    144 		return KAUTH_RESULT_DEFER;
    145 
    146 	ks = arg1;
    147 	mode = ks->ks_mode;
    148 
    149 	if ((kauth_cred_geteuid(cred) == ks->ks_uid && (mode & S_IWUSR) != 0) ||
    150 	    (kauth_cred_getegid(cred) == ks->ks_gid && (mode & S_IWGRP) != 0) ||
    151 	    (mode & S_IWOTH) != 0)
    152 		return KAUTH_RESULT_ALLOW;
    153 
    154 	return KAUTH_RESULT_DEFER;
    155 }
    156 
    157 static int
    158 ksem_sysinit(void)
    159 {
    160 	int error;
    161 	const struct sysctlnode *rnode;
    162 
    163 	mutex_init(&ksem_lock, MUTEX_DEFAULT, IPL_NONE);
    164 	LIST_INIT(&ksem_head);
    165 	nsems_total = 0;
    166 	nsems = 0;
    167 
    168 	error = syscall_establish(NULL, ksem_syscalls);
    169 	if (error) {
    170 		(void)ksem_sysfini(false);
    171 	}
    172 
    173 	ksem_listener = kauth_listen_scope(KAUTH_SCOPE_SYSTEM,
    174 	    ksem_listener_cb, NULL);
    175 
    176 	/* Define module-specific sysctl tree */
    177 
    178 	ksem_max = KSEM_MAX;
    179 	ksem_clog = NULL;
    180 
    181 	sysctl_createv(&ksem_clog, 0, NULL, &rnode,
    182 			CTLFLAG_PERMANENT,
    183 			CTLTYPE_NODE, "posix",
    184 			SYSCTL_DESCR("POSIX options"),
    185 			NULL, 0, NULL, 0,
    186 			CTL_KERN, CTL_CREATE, CTL_EOL);
    187 	sysctl_createv(&ksem_clog, 0, &rnode, NULL,
    188 			CTLFLAG_PERMANENT | CTLFLAG_READWRITE,
    189 			CTLTYPE_INT, "semmax",
    190 			SYSCTL_DESCR("Maximal number of semaphores"),
    191 			NULL, 0, &ksem_max, 0,
    192 			CTL_CREATE, CTL_EOL);
    193 	sysctl_createv(&ksem_clog, 0, &rnode, NULL,
    194 			CTLFLAG_PERMANENT | CTLFLAG_READWRITE,
    195 			CTLTYPE_INT, "semcnt",
    196 			SYSCTL_DESCR("Current number of semaphores"),
    197 			NULL, 0, &nsems, 0,
    198 			CTL_CREATE, CTL_EOL);
    199 
    200 	return error;
    201 }
    202 
    203 static int
    204 ksem_sysfini(bool interface)
    205 {
    206 	int error;
    207 
    208 	if (interface) {
    209 		error = syscall_disestablish(NULL, ksem_syscalls);
    210 		if (error != 0) {
    211 			return error;
    212 		}
    213 		/*
    214 		 * Make sure that no semaphores are in use.  Note: semops
    215 		 * must be unused at this point.
    216 		 */
    217 		if (nsems_total) {
    218 			error = syscall_establish(NULL, ksem_syscalls);
    219 			KASSERT(error == 0);
    220 			return EBUSY;
    221 		}
    222 	}
    223 	kauth_unlisten_scope(ksem_listener);
    224 	mutex_destroy(&ksem_lock);
    225 	sysctl_teardown(&ksem_clog);
    226 	return 0;
    227 }
    228 
    229 static int
    230 ksem_modcmd(modcmd_t cmd, void *arg)
    231 {
    232 
    233 	switch (cmd) {
    234 	case MODULE_CMD_INIT:
    235 		return ksem_sysinit();
    236 
    237 	case MODULE_CMD_FINI:
    238 		return ksem_sysfini(true);
    239 
    240 	default:
    241 		return ENOTTY;
    242 	}
    243 }
    244 
    245 static ksem_t *
    246 ksem_lookup(const char *name)
    247 {
    248 	ksem_t *ks;
    249 
    250 	KASSERT(mutex_owned(&ksem_lock));
    251 
    252 	LIST_FOREACH(ks, &ksem_head, ks_entry) {
    253 		if (strcmp(ks->ks_name, name) == 0) {
    254 			mutex_enter(&ks->ks_lock);
    255 			return ks;
    256 		}
    257 	}
    258 	return NULL;
    259 }
    260 
    261 static int
    262 ksem_perm(lwp_t *l, ksem_t *ks)
    263 {
    264 	kauth_cred_t uc = l->l_cred;
    265 
    266 	KASSERT(mutex_owned(&ks->ks_lock));
    267 
    268 	if (kauth_authorize_system(uc, KAUTH_SYSTEM_SEMAPHORE, 0, ks, NULL, NULL) != 0)
    269 		return EACCES;
    270 
    271 	return 0;
    272 }
    273 
    274 /*
    275  * ksem_get: get the semaphore from the descriptor.
    276  *
    277  * => locks the semaphore, if found.
    278  * => holds a reference on the file descriptor.
    279  */
    280 static int
    281 ksem_get(int fd, ksem_t **ksret)
    282 {
    283 	ksem_t *ks;
    284 	file_t *fp;
    285 
    286 	fp = fd_getfile(fd);
    287 	if (__predict_false(fp == NULL))
    288 		return EINVAL;
    289 	if (__predict_false(fp->f_type != DTYPE_SEM)) {
    290 		fd_putfile(fd);
    291 		return EINVAL;
    292 	}
    293 	ks = fp->f_ksem;
    294 	mutex_enter(&ks->ks_lock);
    295 
    296 	*ksret = ks;
    297 	return 0;
    298 }
    299 
    300 /*
    301  * ksem_create: allocate and setup a new semaphore structure.
    302  */
    303 static int
    304 ksem_create(lwp_t *l, const char *name, ksem_t **ksret, mode_t mode, u_int val)
    305 {
    306 	ksem_t *ks;
    307 	kauth_cred_t uc;
    308 	char *kname;
    309 	size_t len;
    310 
    311 	/* Pre-check for the limit. */
    312 	if (nsems >= ksem_max) {
    313 		return ENFILE;
    314 	}
    315 
    316 	if (val > SEM_VALUE_MAX) {
    317 		return EINVAL;
    318 	}
    319 
    320 	if (name != NULL) {
    321 		len = strlen(name);
    322 		if (len > SEM_MAX_NAMELEN) {
    323 			return ENAMETOOLONG;
    324 		}
    325 		/* Name must start with a '/' but not contain one. */
    326 		if (*name != '/' || len < 2 || strchr(name + 1, '/') != NULL) {
    327 			return EINVAL;
    328 		}
    329 		kname = kmem_alloc(++len, KM_SLEEP);
    330 		strlcpy(kname, name, len);
    331 	} else {
    332 		kname = NULL;
    333 		len = 0;
    334 	}
    335 
    336 	ks = kmem_zalloc(sizeof(ksem_t), KM_SLEEP);
    337 	mutex_init(&ks->ks_lock, MUTEX_DEFAULT, IPL_NONE);
    338 	cv_init(&ks->ks_cv, "psem");
    339 	ks->ks_name = kname;
    340 	ks->ks_namelen = len;
    341 	ks->ks_mode = mode;
    342 	ks->ks_value = val;
    343 	ks->ks_ref = 1;
    344 
    345 	uc = l->l_cred;
    346 	ks->ks_uid = kauth_cred_geteuid(uc);
    347 	ks->ks_gid = kauth_cred_getegid(uc);
    348 
    349 	atomic_inc_uint(&nsems_total);
    350 	*ksret = ks;
    351 	return 0;
    352 }
    353 
    354 static void
    355 ksem_free(ksem_t *ks)
    356 {
    357 
    358 	KASSERT(!cv_has_waiters(&ks->ks_cv));
    359 
    360 	if (ks->ks_name) {
    361 		KASSERT(ks->ks_namelen > 0);
    362 		kmem_free(ks->ks_name, ks->ks_namelen);
    363 	}
    364 	mutex_destroy(&ks->ks_lock);
    365 	cv_destroy(&ks->ks_cv);
    366 	kmem_free(ks, sizeof(ksem_t));
    367 
    368 	atomic_dec_uint(&nsems_total);
    369 }
    370 
    371 int
    372 sys__ksem_init(struct lwp *l, const struct sys__ksem_init_args *uap,
    373     register_t *retval)
    374 {
    375 	/* {
    376 		unsigned int value;
    377 		intptr_t *idp;
    378 	} */
    379 
    380 	return do_ksem_init(l, SCARG(uap, value), SCARG(uap, idp), copyout);
    381 }
    382 
    383 int
    384 do_ksem_init(lwp_t *l, u_int val, intptr_t *idp, copyout_t docopyout)
    385 {
    386 	proc_t *p = l->l_proc;
    387 	ksem_t *ks;
    388 	file_t *fp;
    389 	intptr_t id;
    390 	int fd, error;
    391 
    392 	error = fd_allocfile(&fp, &fd);
    393 	if (error) {
    394 		return error;
    395 	}
    396 	fp->f_type = DTYPE_SEM;
    397 	fp->f_flag = FREAD | FWRITE;
    398 	fp->f_ops = &semops;
    399 
    400 	id = (intptr_t)fd;
    401 	error = (*docopyout)(&id, idp, sizeof(*idp));
    402 	if (error) {
    403 		fd_abort(p, fp, fd);
    404 		return error;
    405 	}
    406 
    407 	/* Note the mode does not matter for anonymous semaphores. */
    408 	error = ksem_create(l, NULL, &ks, 0, val);
    409 	if (error) {
    410 		fd_abort(p, fp, fd);
    411 		return error;
    412 	}
    413 	fp->f_ksem = ks;
    414 	fd_affix(p, fp, fd);
    415 	return error;
    416 }
    417 
    418 int
    419 sys__ksem_open(struct lwp *l, const struct sys__ksem_open_args *uap,
    420     register_t *retval)
    421 {
    422 	/* {
    423 		const char *name;
    424 		int oflag;
    425 		mode_t mode;
    426 		unsigned int value;
    427 		intptr_t *idp;
    428 	} */
    429 
    430 	return do_ksem_open(l, SCARG(uap, name), SCARG(uap, oflag),
    431 	    SCARG(uap, mode), SCARG(uap, value), SCARG(uap, idp), copyout);
    432 }
    433 
    434 int
    435 do_ksem_open(struct lwp *l, const char *semname, int oflag, mode_t mode,
    436      unsigned int value, intptr_t *idp, copyout_t docopyout)
    437 {
    438 	char name[SEM_MAX_NAMELEN + 1];
    439 	proc_t *p = l->l_proc;
    440 	ksem_t *ksnew = NULL, *ks;
    441 	file_t *fp;
    442 	intptr_t id;
    443 	int fd, error;
    444 
    445 	error = copyinstr(semname, name, sizeof(name), NULL);
    446 	if (error) {
    447 		return error;
    448 	}
    449 	error = fd_allocfile(&fp, &fd);
    450 	if (error) {
    451 		return error;
    452 	}
    453 	fp->f_type = DTYPE_SEM;
    454 	fp->f_flag = FREAD | FWRITE;
    455 	fp->f_ops = &semops;
    456 
    457 	/*
    458 	 * The ID (file descriptor number) can be stored early.
    459 	 * Note that zero is a special value for libpthread.
    460 	 */
    461 	id = (intptr_t)fd;
    462 	error = (*docopyout)(&id, idp, sizeof(*idp));
    463 	if (error) {
    464 		goto err;
    465 	}
    466 
    467 	if (oflag & O_CREAT) {
    468 		/* Create a new semaphore. */
    469 		error = ksem_create(l, name, &ksnew, mode, value);
    470 		if (error) {
    471 			goto err;
    472 		}
    473 		KASSERT(ksnew != NULL);
    474 	}
    475 
    476 	/* Lookup for a semaphore with such name. */
    477 	mutex_enter(&ksem_lock);
    478 	ks = ksem_lookup(name);
    479 	if (ks) {
    480 		KASSERT(mutex_owned(&ks->ks_lock));
    481 		mutex_exit(&ksem_lock);
    482 
    483 		/* Check for exclusive create. */
    484 		if (oflag & O_EXCL) {
    485 			mutex_exit(&ks->ks_lock);
    486 			error = EEXIST;
    487 			goto err;
    488 		}
    489 		/*
    490 		 * Verify permissions.  If we can access it,
    491 		 * add the reference of this thread.
    492 		 */
    493 		error = ksem_perm(l, ks);
    494 		if (error == 0) {
    495 			ks->ks_ref++;
    496 		}
    497 		mutex_exit(&ks->ks_lock);
    498 		if (error) {
    499 			goto err;
    500 		}
    501 	} else {
    502 		/* Fail if not found and not creating. */
    503 		if ((oflag & O_CREAT) == 0) {
    504 			mutex_exit(&ksem_lock);
    505 			KASSERT(ksnew == NULL);
    506 			error = ENOENT;
    507 			goto err;
    508 		}
    509 
    510 		/* Check for the limit locked. */
    511 		if (nsems >= ksem_max) {
    512 			mutex_exit(&ksem_lock);
    513 			error = ENFILE;
    514 			goto err;
    515 		}
    516 
    517 		/*
    518 		 * Finally, insert semaphore into the list.
    519 		 * Note: it already has the initial reference.
    520 		 */
    521 		ks = ksnew;
    522 		LIST_INSERT_HEAD(&ksem_head, ks, ks_entry);
    523 		nsems++;
    524 		mutex_exit(&ksem_lock);
    525 
    526 		ksnew = NULL;
    527 	}
    528 	KASSERT(ks != NULL);
    529 	fp->f_ksem = ks;
    530 	fd_affix(p, fp, fd);
    531 err:
    532 	if (error) {
    533 		fd_abort(p, fp, fd);
    534 	}
    535 	if (ksnew) {
    536 		ksem_free(ksnew);
    537 	}
    538 	return error;
    539 }
    540 
    541 int
    542 sys__ksem_close(struct lwp *l, const struct sys__ksem_close_args *uap,
    543     register_t *retval)
    544 {
    545 	/* {
    546 		intptr_t id;
    547 	} */
    548 	int fd = (int)SCARG(uap, id);
    549 
    550 	if (fd_getfile(fd) == NULL) {
    551 		return EBADF;
    552 	}
    553 	return fd_close(fd);
    554 }
    555 
    556 static int
    557 ksem_read_fop(file_t *fp, off_t *offset, struct uio *uio, kauth_cred_t cred,
    558     int flags)
    559 {
    560 	size_t len;
    561 	char *name;
    562 	ksem_t *ks = fp->f_ksem;
    563 
    564 	mutex_enter(&ks->ks_lock);
    565 	len = ks->ks_namelen;
    566 	name = ks->ks_name;
    567 	mutex_exit(&ks->ks_lock);
    568 	if (name == NULL || len == 0)
    569 		return 0;
    570 	return uiomove(name, len, uio);
    571 }
    572 
    573 static int
    574 ksem_stat_fop(file_t *fp, struct stat *ub)
    575 {
    576 	ksem_t *ks = fp->f_ksem;
    577 
    578 	mutex_enter(&ks->ks_lock);
    579 
    580 	memset(ub, 0, sizeof(*ub));
    581 
    582 	ub->st_mode = ks->ks_mode | ((ks->ks_name && ks->ks_namelen)
    583 	    ? _S_IFLNK : _S_IFREG);
    584 	ub->st_uid = ks->ks_uid;
    585 	ub->st_gid = ks->ks_gid;
    586 	ub->st_size = ks->ks_value;
    587 	ub->st_blocks = (ub->st_size) ? 1 : 0;
    588 	ub->st_nlink = ks->ks_ref;
    589 	ub->st_blksize = 4096;
    590 
    591 	nanotime(&ub->st_atimespec);
    592 	ub->st_mtimespec = ub->st_ctimespec = ub->st_birthtimespec =
    593 	    ub->st_atimespec;
    594 
    595 	/*
    596 	 * Left as 0: st_dev, st_ino, st_rdev, st_flags, st_gen.
    597 	 * XXX (st_dev, st_ino) should be unique.
    598 	 */
    599 	mutex_exit(&ks->ks_lock);
    600 	return 0;
    601 }
    602 
    603 static int
    604 ksem_close_fop(file_t *fp)
    605 {
    606 	ksem_t *ks = fp->f_ksem;
    607 	bool destroy = false;
    608 
    609 	mutex_enter(&ks->ks_lock);
    610 	KASSERT(ks->ks_ref > 0);
    611 	if (--ks->ks_ref == 0) {
    612 		/*
    613 		 * Destroy if the last reference and semaphore is unnamed,
    614 		 * or unlinked (for named semaphore).
    615 		 */
    616 		destroy = (ks->ks_flags & KS_UNLINKED) || (ks->ks_name == NULL);
    617 	}
    618 	mutex_exit(&ks->ks_lock);
    619 
    620 	if (destroy) {
    621 		ksem_free(ks);
    622 	}
    623 	return 0;
    624 }
    625 
    626 int
    627 sys__ksem_unlink(struct lwp *l, const struct sys__ksem_unlink_args *uap,
    628     register_t *retval)
    629 {
    630 	/* {
    631 		const char *name;
    632 	} */
    633 	char name[SEM_MAX_NAMELEN + 1];
    634 	ksem_t *ks;
    635 	u_int refcnt;
    636 	int error;
    637 
    638 	error = copyinstr(SCARG(uap, name), name, sizeof(name), NULL);
    639 	if (error)
    640 		return error;
    641 
    642 	mutex_enter(&ksem_lock);
    643 	ks = ksem_lookup(name);
    644 	if (ks == NULL) {
    645 		mutex_exit(&ksem_lock);
    646 		return ENOENT;
    647 	}
    648 	KASSERT(mutex_owned(&ks->ks_lock));
    649 
    650 	/* Verify permissions. */
    651 	error = ksem_perm(l, ks);
    652 	if (error) {
    653 		mutex_exit(&ks->ks_lock);
    654 		mutex_exit(&ksem_lock);
    655 		return error;
    656 	}
    657 
    658 	/* Remove from the global list. */
    659 	LIST_REMOVE(ks, ks_entry);
    660 	nsems--;
    661 	mutex_exit(&ksem_lock);
    662 
    663 	refcnt = ks->ks_ref;
    664 	if (refcnt) {
    665 		/* Mark as unlinked, if there are references. */
    666 		ks->ks_flags |= KS_UNLINKED;
    667 	}
    668 	mutex_exit(&ks->ks_lock);
    669 
    670 	if (refcnt == 0) {
    671 		ksem_free(ks);
    672 	}
    673 	return 0;
    674 }
    675 
    676 int
    677 sys__ksem_post(struct lwp *l, const struct sys__ksem_post_args *uap,
    678     register_t *retval)
    679 {
    680 	/* {
    681 		intptr_t id;
    682 	} */
    683 	int fd = (int)SCARG(uap, id), error;
    684 	ksem_t *ks;
    685 
    686 	error = ksem_get(fd, &ks);
    687 	if (error) {
    688 		return error;
    689 	}
    690 	KASSERT(mutex_owned(&ks->ks_lock));
    691 	if (ks->ks_value == SEM_VALUE_MAX) {
    692 		error = EOVERFLOW;
    693 		goto out;
    694 	}
    695 	ks->ks_value++;
    696 	if (ks->ks_waiters) {
    697 		cv_broadcast(&ks->ks_cv);
    698 	}
    699 out:
    700 	mutex_exit(&ks->ks_lock);
    701 	fd_putfile(fd);
    702 	return error;
    703 }
    704 
    705 int
    706 do_ksem_wait(lwp_t *l, intptr_t id, bool try_p, struct timespec *abstime)
    707 {
    708 	int fd = (int)id, error, timeo;
    709 	ksem_t *ks;
    710 
    711 	error = ksem_get(fd, &ks);
    712 	if (error) {
    713 		return error;
    714 	}
    715 	KASSERT(mutex_owned(&ks->ks_lock));
    716 	while (ks->ks_value == 0) {
    717 		ks->ks_waiters++;
    718 		if (!try_p && abstime != NULL) {
    719 			error = ts2timo(CLOCK_REALTIME, TIMER_ABSTIME, abstime,
    720 			    &timeo, NULL);
    721 			if (error != 0)
    722 				goto out;
    723 		} else {
    724 			timeo = 0;
    725 		}
    726 		error = try_p ? EAGAIN : cv_timedwait_sig(&ks->ks_cv,
    727 		    &ks->ks_lock, timeo);
    728 		ks->ks_waiters--;
    729 		if (error)
    730 			goto out;
    731 	}
    732 	ks->ks_value--;
    733 out:
    734 	mutex_exit(&ks->ks_lock);
    735 	fd_putfile(fd);
    736 	return error;
    737 }
    738 
    739 int
    740 sys__ksem_wait(struct lwp *l, const struct sys__ksem_wait_args *uap,
    741     register_t *retval)
    742 {
    743 	/* {
    744 		intptr_t id;
    745 	} */
    746 
    747 	return do_ksem_wait(l, SCARG(uap, id), false, NULL);
    748 }
    749 
    750 int
    751 sys__ksem_timedwait(struct lwp *l, const struct sys__ksem_timedwait_args *uap,
    752     register_t *retval)
    753 {
    754 	/* {
    755 		intptr_t id;
    756 		const struct timespec *abstime;
    757 	} */
    758 	struct timespec ts;
    759 	int error;
    760 
    761 	error = copyin(SCARG(uap, abstime), &ts, sizeof(ts));
    762 	if (error != 0)
    763 		return error;
    764 
    765 	if (ts.tv_sec < 0 || ts.tv_nsec < 0 || ts.tv_nsec >= 1000000000)
    766 		return EINVAL;
    767 
    768 	error = do_ksem_wait(l, SCARG(uap, id), false, &ts);
    769 	if (error == EWOULDBLOCK)
    770 		error = ETIMEDOUT;
    771 	return error;
    772 }
    773 
    774 int
    775 sys__ksem_trywait(struct lwp *l, const struct sys__ksem_trywait_args *uap,
    776     register_t *retval)
    777 {
    778 	/* {
    779 		intptr_t id;
    780 	} */
    781 
    782 	return do_ksem_wait(l, SCARG(uap, id), true, NULL);
    783 }
    784 
    785 int
    786 sys__ksem_getvalue(struct lwp *l, const struct sys__ksem_getvalue_args *uap,
    787     register_t *retval)
    788 {
    789 	/* {
    790 		intptr_t id;
    791 		unsigned int *value;
    792 	} */
    793 	int fd = (int)SCARG(uap, id), error;
    794 	ksem_t *ks;
    795 	unsigned int val;
    796 
    797 	error = ksem_get(fd, &ks);
    798 	if (error) {
    799 		return error;
    800 	}
    801 	KASSERT(mutex_owned(&ks->ks_lock));
    802 	val = ks->ks_value;
    803 	mutex_exit(&ks->ks_lock);
    804 	fd_putfile(fd);
    805 
    806 	return copyout(&val, SCARG(uap, value), sizeof(val));
    807 }
    808 
    809 int
    810 sys__ksem_destroy(struct lwp *l, const struct sys__ksem_destroy_args *uap,
    811     register_t *retval)
    812 {
    813 	/* {
    814 		intptr_t id;
    815 	} */
    816 	int fd = (int)SCARG(uap, id), error;
    817 	ksem_t *ks;
    818 
    819 	error = ksem_get(fd, &ks);
    820 	if (error) {
    821 		return error;
    822 	}
    823 	KASSERT(mutex_owned(&ks->ks_lock));
    824 
    825 	/* Operation is only for unnamed semaphores. */
    826 	if (ks->ks_name != NULL) {
    827 		error = EINVAL;
    828 		goto out;
    829 	}
    830 	/* Cannot destroy if there are waiters. */
    831 	if (ks->ks_waiters) {
    832 		error = EBUSY;
    833 		goto out;
    834 	}
    835 out:
    836 	mutex_exit(&ks->ks_lock);
    837 	if (error) {
    838 		fd_putfile(fd);
    839 		return error;
    840 	}
    841 	return fd_close(fd);
    842 }
    843