xref: /freebsd/sys/kern/uipc_sem.c (revision 6aeb05d7)
19454b2d8SWarner Losh /*-
2efaa6588SAlfred Perlstein  * Copyright (c) 2002 Alfred Perlstein <alfred@FreeBSD.org>
352648411SRobert Watson  * Copyright (c) 2003-2005 SPARTA, Inc.
4590f242cSRobert Watson  * Copyright (c) 2005 Robert N. M. Watson
5efaa6588SAlfred Perlstein  * All rights reserved.
6efaa6588SAlfred Perlstein  *
752648411SRobert Watson  * This software was developed for the FreeBSD Project in part by Network
852648411SRobert Watson  * Associates Laboratories, the Security Research Division of Network
952648411SRobert Watson  * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
1052648411SRobert Watson  * as part of the DARPA CHATS research program.
1152648411SRobert Watson  *
12efaa6588SAlfred Perlstein  * Redistribution and use in source and binary forms, with or without
13efaa6588SAlfred Perlstein  * modification, are permitted provided that the following conditions
14efaa6588SAlfred Perlstein  * are met:
15efaa6588SAlfred Perlstein  * 1. Redistributions of source code must retain the above copyright
16efaa6588SAlfred Perlstein  *    notice, this list of conditions and the following disclaimer.
17efaa6588SAlfred Perlstein  * 2. Redistributions in binary form must reproduce the above copyright
18efaa6588SAlfred Perlstein  *    notice, this list of conditions and the following disclaimer in the
19efaa6588SAlfred Perlstein  *    documentation and/or other materials provided with the distribution.
20efaa6588SAlfred Perlstein  *
21efaa6588SAlfred Perlstein  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
22efaa6588SAlfred Perlstein  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23efaa6588SAlfred Perlstein  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24efaa6588SAlfred Perlstein  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
25efaa6588SAlfred Perlstein  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26efaa6588SAlfred Perlstein  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27efaa6588SAlfred Perlstein  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28efaa6588SAlfred Perlstein  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29efaa6588SAlfred Perlstein  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30efaa6588SAlfred Perlstein  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31efaa6588SAlfred Perlstein  * SUCH DAMAGE.
32efaa6588SAlfred Perlstein  */
33efaa6588SAlfred Perlstein 
34677b542eSDavid E. O'Brien #include <sys/cdefs.h>
35677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$");
36677b542eSDavid E. O'Brien 
3752648411SRobert Watson #include "opt_mac.h"
38efaa6588SAlfred Perlstein #include "opt_posix.h"
39efaa6588SAlfred Perlstein 
40efaa6588SAlfred Perlstein #include <sys/param.h>
41efaa6588SAlfred Perlstein #include <sys/systm.h>
42efaa6588SAlfred Perlstein #include <sys/sysproto.h>
4375b8b3b2SJohn Baldwin #include <sys/eventhandler.h>
44efaa6588SAlfred Perlstein #include <sys/kernel.h>
456aeb05d7STom Rhodes #include <sys/ksem.h>
46acd3428bSRobert Watson #include <sys/priv.h>
47efaa6588SAlfred Perlstein #include <sys/proc.h>
486aeb05d7STom Rhodes #include <sys/posix4.h>
49efaa6588SAlfred Perlstein #include <sys/lock.h>
50efaa6588SAlfred Perlstein #include <sys/mutex.h>
5177409fe1SPoul-Henning Kamp #include <sys/module.h>
52efaa6588SAlfred Perlstein #include <sys/condvar.h>
53efaa6588SAlfred Perlstein #include <sys/sem.h>
54efaa6588SAlfred Perlstein #include <sys/uio.h>
556aeb05d7STom Rhodes #include <sys/semaphore.h>
56efaa6588SAlfred Perlstein #include <sys/syscall.h>
57efaa6588SAlfred Perlstein #include <sys/stat.h>
58efaa6588SAlfred Perlstein #include <sys/sysent.h>
59efaa6588SAlfred Perlstein #include <sys/sysctl.h>
60aae94fbbSDaniel Eischen #include <sys/time.h>
61efaa6588SAlfred Perlstein #include <sys/malloc.h>
62efaa6588SAlfred Perlstein #include <sys/fcntl.h>
636aeb05d7STom Rhodes #include <sys/_semaphore.h>
64efaa6588SAlfred Perlstein 
65aed55708SRobert Watson #include <security/mac/mac_framework.h>
66aed55708SRobert Watson 
67590f242cSRobert Watson static int sem_count_proc(struct proc *p);
68efaa6588SAlfred Perlstein static struct ksem *sem_lookup_byname(const char *name);
69efaa6588SAlfred Perlstein static int sem_create(struct thread *td, const char *name,
70efaa6588SAlfred Perlstein     struct ksem **ksret, mode_t mode, unsigned int value);
71efaa6588SAlfred Perlstein static void sem_free(struct ksem *ksnew);
72b2546660SJohn Baldwin static int sem_perm(struct thread *td, struct ksem *ks);
73efaa6588SAlfred Perlstein static void sem_enter(struct proc *p, struct ksem *ks);
74efaa6588SAlfred Perlstein static int sem_leave(struct proc *p, struct ksem *ks);
75993182e5SAlexander Leidinger static void sem_exechook(void *arg, struct proc *p, struct image_params *imgp);
7675b8b3b2SJohn Baldwin static void sem_exithook(void *arg, struct proc *p);
77590f242cSRobert Watson static void sem_forkhook(void *arg, struct proc *p1, struct proc *p2,
78590f242cSRobert Watson     int flags);
79b2546660SJohn Baldwin static int sem_hasopen(struct thread *td, struct ksem *ks);
80efaa6588SAlfred Perlstein 
81efaa6588SAlfred Perlstein static int kern_sem_close(struct thread *td, semid_t id);
82efaa6588SAlfred Perlstein static int kern_sem_post(struct thread *td, semid_t id);
83aae94fbbSDaniel Eischen static int kern_sem_wait(struct thread *td, semid_t id, int tryflag,
84aae94fbbSDaniel Eischen     struct timespec *abstime);
85efaa6588SAlfred Perlstein static int kern_sem_init(struct thread *td, int dir, unsigned int value,
86efaa6588SAlfred Perlstein     semid_t *idp);
87efaa6588SAlfred Perlstein static int kern_sem_open(struct thread *td, int dir, const char *name,
88efaa6588SAlfred Perlstein     int oflag, mode_t mode, unsigned int value, semid_t *idp);
89efaa6588SAlfred Perlstein static int kern_sem_unlink(struct thread *td, const char *name);
90efaa6588SAlfred Perlstein 
91efaa6588SAlfred Perlstein #ifndef SEM_MAX
92efaa6588SAlfred Perlstein #define SEM_MAX	30
93efaa6588SAlfred Perlstein #endif
94efaa6588SAlfred Perlstein 
95efaa6588SAlfred Perlstein #define SEM_MAX_NAMELEN	14
96efaa6588SAlfred Perlstein 
97efaa6588SAlfred Perlstein #define SEM_TO_ID(x)	((intptr_t)(x))
98efaa6588SAlfred Perlstein #define ID_TO_SEM(x)	id_to_sem(x)
99efaa6588SAlfred Perlstein 
100efaa6588SAlfred Perlstein /*
101efaa6588SAlfred Perlstein  * available semaphores go here, this includes sem_init and any semaphores
102efaa6588SAlfred Perlstein  * created via sem_open that have not yet been unlinked.
103efaa6588SAlfred Perlstein  */
104efaa6588SAlfred Perlstein LIST_HEAD(, ksem) ksem_head = LIST_HEAD_INITIALIZER(&ksem_head);
105efaa6588SAlfred Perlstein /*
106efaa6588SAlfred Perlstein  * semaphores still in use but have been sem_unlink()'d go here.
107efaa6588SAlfred Perlstein  */
108efaa6588SAlfred Perlstein LIST_HEAD(, ksem) ksem_deadhead = LIST_HEAD_INITIALIZER(&ksem_deadhead);
109efaa6588SAlfred Perlstein 
110efaa6588SAlfred Perlstein static struct mtx sem_lock;
111efaa6588SAlfred Perlstein static MALLOC_DEFINE(M_SEM, "sems", "semaphore data");
112efaa6588SAlfred Perlstein 
113efaa6588SAlfred Perlstein static int nsems = 0;
114efaa6588SAlfred Perlstein SYSCTL_DECL(_p1003_1b);
115efaa6588SAlfred Perlstein SYSCTL_INT(_p1003_1b, OID_AUTO, nsems, CTLFLAG_RD, &nsems, 0, "");
116efaa6588SAlfred Perlstein 
117590f242cSRobert Watson static eventhandler_tag sem_exit_tag, sem_exec_tag, sem_fork_tag;
11875b8b3b2SJohn Baldwin 
119c814aa3fSAlfred Perlstein #ifdef SEM_DEBUG
120c814aa3fSAlfred Perlstein #define DP(x)	printf x
121c814aa3fSAlfred Perlstein #else
122c814aa3fSAlfred Perlstein #define DP(x)
123c814aa3fSAlfred Perlstein #endif
124c814aa3fSAlfred Perlstein 
125efaa6588SAlfred Perlstein static __inline
126efaa6588SAlfred Perlstein void
127efaa6588SAlfred Perlstein sem_ref(struct ksem *ks)
128efaa6588SAlfred Perlstein {
129efaa6588SAlfred Perlstein 
1300fddf92dSRobert Watson 	mtx_assert(&sem_lock, MA_OWNED);
131efaa6588SAlfred Perlstein 	ks->ks_ref++;
132c814aa3fSAlfred Perlstein 	DP(("sem_ref: ks = %p, ref = %d\n", ks, ks->ks_ref));
133efaa6588SAlfred Perlstein }
134efaa6588SAlfred Perlstein 
135efaa6588SAlfred Perlstein static __inline
136efaa6588SAlfred Perlstein void
137efaa6588SAlfred Perlstein sem_rel(struct ksem *ks)
138efaa6588SAlfred Perlstein {
139efaa6588SAlfred Perlstein 
1400fddf92dSRobert Watson 	mtx_assert(&sem_lock, MA_OWNED);
141c814aa3fSAlfred Perlstein 	DP(("sem_rel: ks = %p, ref = %d\n", ks, ks->ks_ref - 1));
142efaa6588SAlfred Perlstein 	if (--ks->ks_ref == 0)
143efaa6588SAlfred Perlstein 		sem_free(ks);
144efaa6588SAlfred Perlstein }
145efaa6588SAlfred Perlstein 
146efaa6588SAlfred Perlstein static __inline struct ksem *id_to_sem(semid_t id);
147efaa6588SAlfred Perlstein 
148efaa6588SAlfred Perlstein static __inline
149efaa6588SAlfred Perlstein struct ksem *
150c1250af6SRobert Watson id_to_sem(semid_t id)
151efaa6588SAlfred Perlstein {
152efaa6588SAlfred Perlstein 	struct ksem *ks;
153efaa6588SAlfred Perlstein 
154955ec415SRobert Watson 	mtx_assert(&sem_lock, MA_OWNED);
155c814aa3fSAlfred Perlstein 	DP(("id_to_sem: id = %0x,%p\n", id, (struct ksem *)id));
156efaa6588SAlfred Perlstein 	LIST_FOREACH(ks, &ksem_head, ks_entry) {
157c814aa3fSAlfred Perlstein 		DP(("id_to_sem: ks = %p\n", ks));
158efaa6588SAlfred Perlstein 		if (ks == (struct ksem *)id)
159efaa6588SAlfred Perlstein 			return (ks);
160efaa6588SAlfred Perlstein 	}
161efaa6588SAlfred Perlstein 	return (NULL);
162efaa6588SAlfred Perlstein }
163efaa6588SAlfred Perlstein 
164c3053131SPoul-Henning Kamp static struct ksem *
165c1250af6SRobert Watson sem_lookup_byname(const char *name)
166efaa6588SAlfred Perlstein {
167efaa6588SAlfred Perlstein 	struct ksem *ks;
168efaa6588SAlfred Perlstein 
169955ec415SRobert Watson 	mtx_assert(&sem_lock, MA_OWNED);
170efaa6588SAlfred Perlstein 	LIST_FOREACH(ks, &ksem_head, ks_entry)
171efaa6588SAlfred Perlstein 		if (ks->ks_name != NULL && strcmp(ks->ks_name, name) == 0)
172efaa6588SAlfred Perlstein 			return (ks);
173efaa6588SAlfred Perlstein 	return (NULL);
174efaa6588SAlfred Perlstein }
175efaa6588SAlfred Perlstein 
176c3053131SPoul-Henning Kamp static int
177c1250af6SRobert Watson sem_create(struct thread *td, const char *name, struct ksem **ksret,
178c1250af6SRobert Watson     mode_t mode, unsigned int value)
179efaa6588SAlfred Perlstein {
180efaa6588SAlfred Perlstein 	struct ksem *ret;
181efaa6588SAlfred Perlstein 	struct proc *p;
182efaa6588SAlfred Perlstein 	struct ucred *uc;
183efaa6588SAlfred Perlstein 	size_t len;
184efaa6588SAlfred Perlstein 	int error;
185efaa6588SAlfred Perlstein 
186c814aa3fSAlfred Perlstein 	DP(("sem_create\n"));
187efaa6588SAlfred Perlstein 	p = td->td_proc;
188b2546660SJohn Baldwin 	uc = td->td_ucred;
189efaa6588SAlfred Perlstein 	if (value > SEM_VALUE_MAX)
190efaa6588SAlfred Perlstein 		return (EINVAL);
191a163d034SWarner Losh 	ret = malloc(sizeof(*ret), M_SEM, M_WAITOK | M_ZERO);
192efaa6588SAlfred Perlstein 	if (name != NULL) {
193efaa6588SAlfred Perlstein 		len = strlen(name);
194efaa6588SAlfred Perlstein 		if (len > SEM_MAX_NAMELEN) {
195efaa6588SAlfred Perlstein 			free(ret, M_SEM);
196efaa6588SAlfred Perlstein 			return (ENAMETOOLONG);
197efaa6588SAlfred Perlstein 		}
198efaa6588SAlfred Perlstein 		/* name must start with a '/' but not contain one. */
199efaa6588SAlfred Perlstein 		if (*name != '/' || len < 2 || index(name + 1, '/') != NULL) {
200efaa6588SAlfred Perlstein 			free(ret, M_SEM);
201efaa6588SAlfred Perlstein 			return (EINVAL);
202efaa6588SAlfred Perlstein 		}
203a163d034SWarner Losh 		ret->ks_name = malloc(len + 1, M_SEM, M_WAITOK);
204efaa6588SAlfred Perlstein 		strcpy(ret->ks_name, name);
205efaa6588SAlfred Perlstein 	} else {
206efaa6588SAlfred Perlstein 		ret->ks_name = NULL;
207efaa6588SAlfred Perlstein 	}
208efaa6588SAlfred Perlstein 	ret->ks_mode = mode;
209efaa6588SAlfred Perlstein 	ret->ks_value = value;
210efaa6588SAlfred Perlstein 	ret->ks_ref = 1;
211efaa6588SAlfred Perlstein 	ret->ks_waiters = 0;
212efaa6588SAlfred Perlstein 	ret->ks_uid = uc->cr_uid;
213efaa6588SAlfred Perlstein 	ret->ks_gid = uc->cr_gid;
214efaa6588SAlfred Perlstein 	ret->ks_onlist = 0;
215efaa6588SAlfred Perlstein 	cv_init(&ret->ks_cv, "sem");
216efaa6588SAlfred Perlstein 	LIST_INIT(&ret->ks_users);
21752648411SRobert Watson #ifdef MAC
21852648411SRobert Watson 	mac_init_posix_sem(ret);
21952648411SRobert Watson 	mac_create_posix_sem(uc, ret);
22052648411SRobert Watson #endif
221efaa6588SAlfred Perlstein 	if (name != NULL)
222efaa6588SAlfred Perlstein 		sem_enter(td->td_proc, ret);
223efaa6588SAlfred Perlstein 	*ksret = ret;
224efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
225efaa6588SAlfred Perlstein 	if (nsems >= p31b_getcfg(CTL_P1003_1B_SEM_NSEMS_MAX)) {
226efaa6588SAlfred Perlstein 		sem_leave(td->td_proc, ret);
227efaa6588SAlfred Perlstein 		sem_free(ret);
228efaa6588SAlfred Perlstein 		error = ENFILE;
229efaa6588SAlfred Perlstein 	} else {
230efaa6588SAlfred Perlstein 		nsems++;
231efaa6588SAlfred Perlstein 		error = 0;
232efaa6588SAlfred Perlstein 	}
233efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
234efaa6588SAlfred Perlstein 	return (error);
235efaa6588SAlfred Perlstein }
236efaa6588SAlfred Perlstein 
237efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
238efaa6588SAlfred Perlstein struct ksem_init_args {
239efaa6588SAlfred Perlstein 	unsigned int value;
240efaa6588SAlfred Perlstein 	semid_t *idp;
241efaa6588SAlfred Perlstein };
242efaa6588SAlfred Perlstein int ksem_init(struct thread *td, struct ksem_init_args *uap);
243efaa6588SAlfred Perlstein #endif
244efaa6588SAlfred Perlstein int
245c1250af6SRobert Watson ksem_init(struct thread *td, struct ksem_init_args *uap)
246efaa6588SAlfred Perlstein {
247efaa6588SAlfred Perlstein 	int error;
248efaa6588SAlfred Perlstein 
249efaa6588SAlfred Perlstein 	error = kern_sem_init(td, UIO_USERSPACE, uap->value, uap->idp);
250efaa6588SAlfred Perlstein 	return (error);
251efaa6588SAlfred Perlstein }
252efaa6588SAlfred Perlstein 
253efaa6588SAlfred Perlstein static int
254c1250af6SRobert Watson kern_sem_init(struct thread *td, int dir, unsigned int value, semid_t *idp)
255efaa6588SAlfred Perlstein {
256efaa6588SAlfred Perlstein 	struct ksem *ks;
257efaa6588SAlfred Perlstein 	semid_t id;
258efaa6588SAlfred Perlstein 	int error;
259efaa6588SAlfred Perlstein 
260efaa6588SAlfred Perlstein 	error = sem_create(td, NULL, &ks, S_IRWXU | S_IRWXG, value);
261efaa6588SAlfred Perlstein 	if (error)
262efaa6588SAlfred Perlstein 		return (error);
263efaa6588SAlfred Perlstein 	id = SEM_TO_ID(ks);
264efaa6588SAlfred Perlstein 	if (dir == UIO_USERSPACE) {
265efaa6588SAlfred Perlstein 		error = copyout(&id, idp, sizeof(id));
266efaa6588SAlfred Perlstein 		if (error) {
267efaa6588SAlfred Perlstein 			mtx_lock(&sem_lock);
268efaa6588SAlfred Perlstein 			sem_rel(ks);
269efaa6588SAlfred Perlstein 			mtx_unlock(&sem_lock);
270efaa6588SAlfred Perlstein 			return (error);
271efaa6588SAlfred Perlstein 		}
272efaa6588SAlfred Perlstein 	} else {
273efaa6588SAlfred Perlstein 		*idp = id;
274efaa6588SAlfred Perlstein 	}
275efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
276efaa6588SAlfred Perlstein 	LIST_INSERT_HEAD(&ksem_head, ks, ks_entry);
277efaa6588SAlfred Perlstein 	ks->ks_onlist = 1;
278efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
279efaa6588SAlfred Perlstein 	return (error);
280efaa6588SAlfred Perlstein }
281efaa6588SAlfred Perlstein 
282efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
283efaa6588SAlfred Perlstein struct ksem_open_args {
284efaa6588SAlfred Perlstein 	char *name;
285efaa6588SAlfred Perlstein 	int oflag;
286efaa6588SAlfred Perlstein 	mode_t mode;
287efaa6588SAlfred Perlstein 	unsigned int value;
288efaa6588SAlfred Perlstein 	semid_t *idp;
289efaa6588SAlfred Perlstein };
290efaa6588SAlfred Perlstein int ksem_open(struct thread *td, struct ksem_open_args *uap);
291efaa6588SAlfred Perlstein #endif
292efaa6588SAlfred Perlstein int
293c1250af6SRobert Watson ksem_open(struct thread *td, struct ksem_open_args *uap)
294efaa6588SAlfred Perlstein {
295efaa6588SAlfred Perlstein 	char name[SEM_MAX_NAMELEN + 1];
296efaa6588SAlfred Perlstein 	size_t done;
297efaa6588SAlfred Perlstein 	int error;
298efaa6588SAlfred Perlstein 
299efaa6588SAlfred Perlstein 	error = copyinstr(uap->name, name, SEM_MAX_NAMELEN + 1, &done);
300efaa6588SAlfred Perlstein 	if (error)
301efaa6588SAlfred Perlstein 		return (error);
302c814aa3fSAlfred Perlstein 	DP((">>> sem_open start\n"));
303efaa6588SAlfred Perlstein 	error = kern_sem_open(td, UIO_USERSPACE,
304efaa6588SAlfred Perlstein 	    name, uap->oflag, uap->mode, uap->value, uap->idp);
305c814aa3fSAlfred Perlstein 	DP(("<<< sem_open end\n"));
306efaa6588SAlfred Perlstein 	return (error);
307efaa6588SAlfred Perlstein }
308efaa6588SAlfred Perlstein 
309efaa6588SAlfred Perlstein static int
310c1250af6SRobert Watson kern_sem_open(struct thread *td, int dir, const char *name, int oflag,
311c1250af6SRobert Watson     mode_t mode, unsigned int value, semid_t *idp)
312efaa6588SAlfred Perlstein {
313efaa6588SAlfred Perlstein 	struct ksem *ksnew, *ks;
314efaa6588SAlfred Perlstein 	int error;
315efaa6588SAlfred Perlstein 	semid_t id;
316efaa6588SAlfred Perlstein 
317efaa6588SAlfred Perlstein 	ksnew = NULL;
318efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
319efaa6588SAlfred Perlstein 	ks = sem_lookup_byname(name);
320efaa6588SAlfred Perlstein 	/*
321efaa6588SAlfred Perlstein 	 * If we found it but O_EXCL is set, error.
322efaa6588SAlfred Perlstein 	 */
323efaa6588SAlfred Perlstein 	if (ks != NULL && (oflag & O_EXCL) != 0) {
324efaa6588SAlfred Perlstein 		mtx_unlock(&sem_lock);
325efaa6588SAlfred Perlstein 		return (EEXIST);
326efaa6588SAlfred Perlstein 	}
327efaa6588SAlfred Perlstein 	/*
328efaa6588SAlfred Perlstein 	 * If we didn't find it...
329efaa6588SAlfred Perlstein 	 */
330efaa6588SAlfred Perlstein 	if (ks == NULL) {
331efaa6588SAlfred Perlstein 		/*
332efaa6588SAlfred Perlstein 		 * didn't ask for creation? error.
333efaa6588SAlfred Perlstein 		 */
334efaa6588SAlfred Perlstein 		if ((oflag & O_CREAT) == 0) {
335efaa6588SAlfred Perlstein 			mtx_unlock(&sem_lock);
336efaa6588SAlfred Perlstein 			return (ENOENT);
337efaa6588SAlfred Perlstein 		}
338efaa6588SAlfred Perlstein 		/*
339efaa6588SAlfred Perlstein 		 * We may block during creation, so drop the lock.
340efaa6588SAlfred Perlstein 		 */
341efaa6588SAlfred Perlstein 		mtx_unlock(&sem_lock);
342efaa6588SAlfred Perlstein 		error = sem_create(td, name, &ksnew, mode, value);
343efaa6588SAlfred Perlstein 		if (error != 0)
344efaa6588SAlfred Perlstein 			return (error);
345efaa6588SAlfred Perlstein 		id = SEM_TO_ID(ksnew);
346efaa6588SAlfred Perlstein 		if (dir == UIO_USERSPACE) {
347c814aa3fSAlfred Perlstein 			DP(("about to copyout! %d to %p\n", id, idp));
348efaa6588SAlfred Perlstein 			error = copyout(&id, idp, sizeof(id));
349efaa6588SAlfred Perlstein 			if (error) {
350efaa6588SAlfred Perlstein 				mtx_lock(&sem_lock);
351efaa6588SAlfred Perlstein 				sem_leave(td->td_proc, ksnew);
352efaa6588SAlfred Perlstein 				sem_rel(ksnew);
353efaa6588SAlfred Perlstein 				mtx_unlock(&sem_lock);
354efaa6588SAlfred Perlstein 				return (error);
355efaa6588SAlfred Perlstein 			}
356efaa6588SAlfred Perlstein 		} else {
357c814aa3fSAlfred Perlstein 			DP(("about to set! %d to %p\n", id, idp));
358efaa6588SAlfred Perlstein 			*idp = id;
359efaa6588SAlfred Perlstein 		}
360efaa6588SAlfred Perlstein 		/*
361efaa6588SAlfred Perlstein 		 * We need to make sure we haven't lost a race while
362efaa6588SAlfred Perlstein 		 * allocating during creation.
363efaa6588SAlfred Perlstein 		 */
364efaa6588SAlfred Perlstein 		mtx_lock(&sem_lock);
365efaa6588SAlfred Perlstein 		ks = sem_lookup_byname(name);
366efaa6588SAlfred Perlstein 		if (ks != NULL) {
367efaa6588SAlfred Perlstein 			/* we lost... */
368efaa6588SAlfred Perlstein 			sem_leave(td->td_proc, ksnew);
369efaa6588SAlfred Perlstein 			sem_rel(ksnew);
370efaa6588SAlfred Perlstein 			/* we lost and we can't loose... */
371efaa6588SAlfred Perlstein 			if ((oflag & O_EXCL) != 0) {
372efaa6588SAlfred Perlstein 				mtx_unlock(&sem_lock);
373efaa6588SAlfred Perlstein 				return (EEXIST);
374efaa6588SAlfred Perlstein 			}
375efaa6588SAlfred Perlstein 		} else {
376c814aa3fSAlfred Perlstein 			DP(("sem_create: about to add to list...\n"));
377efaa6588SAlfred Perlstein 			LIST_INSERT_HEAD(&ksem_head, ksnew, ks_entry);
378c814aa3fSAlfred Perlstein 			DP(("sem_create: setting list bit...\n"));
379efaa6588SAlfred Perlstein 			ksnew->ks_onlist = 1;
380c814aa3fSAlfred Perlstein 			DP(("sem_create: done, about to unlock...\n"));
381efaa6588SAlfred Perlstein 		}
382efaa6588SAlfred Perlstein 	} else {
38352648411SRobert Watson #ifdef MAC
38452648411SRobert Watson 		error = mac_check_posix_sem_open(td->td_ucred, ks);
38552648411SRobert Watson 		if (error)
38652648411SRobert Watson 			goto err_open;
38752648411SRobert Watson #endif
388efaa6588SAlfred Perlstein 		/*
389efaa6588SAlfred Perlstein 		 * if we aren't the creator, then enforce permissions.
390efaa6588SAlfred Perlstein 		 */
391b2546660SJohn Baldwin 		error = sem_perm(td, ks);
39252648411SRobert Watson 		if (error)
39352648411SRobert Watson 			goto err_open;
394efaa6588SAlfred Perlstein 		sem_ref(ks);
395efaa6588SAlfred Perlstein 		mtx_unlock(&sem_lock);
396efaa6588SAlfred Perlstein 		id = SEM_TO_ID(ks);
397efaa6588SAlfred Perlstein 		if (dir == UIO_USERSPACE) {
398efaa6588SAlfred Perlstein 			error = copyout(&id, idp, sizeof(id));
399efaa6588SAlfred Perlstein 			if (error) {
400efaa6588SAlfred Perlstein 				mtx_lock(&sem_lock);
401efaa6588SAlfred Perlstein 				sem_rel(ks);
402efaa6588SAlfred Perlstein 				mtx_unlock(&sem_lock);
403efaa6588SAlfred Perlstein 				return (error);
404efaa6588SAlfred Perlstein 			}
405efaa6588SAlfred Perlstein 		} else {
406efaa6588SAlfred Perlstein 			*idp = id;
407efaa6588SAlfred Perlstein 		}
408efaa6588SAlfred Perlstein 		sem_enter(td->td_proc, ks);
409efaa6588SAlfred Perlstein 		mtx_lock(&sem_lock);
410efaa6588SAlfred Perlstein 		sem_rel(ks);
411efaa6588SAlfred Perlstein 	}
41252648411SRobert Watson err_open:
41352648411SRobert Watson 	mtx_unlock(&sem_lock);
414efaa6588SAlfred Perlstein 	return (error);
415efaa6588SAlfred Perlstein }
416efaa6588SAlfred Perlstein 
417c3053131SPoul-Henning Kamp static int
418c1250af6SRobert Watson sem_perm(struct thread *td, struct ksem *ks)
419efaa6588SAlfred Perlstein {
420efaa6588SAlfred Perlstein 	struct ucred *uc;
421efaa6588SAlfred Perlstein 
422acd3428bSRobert Watson 	/*
423acd3428bSRobert Watson 	 * XXXRW: This permission routine appears to be incorrect.  If the
424acd3428bSRobert Watson 	 * user matches, we shouldn't go on to the group if the user
425acd3428bSRobert Watson 	 * permissions don't allow the action?  Not changed for now.  To fix,
426acd3428bSRobert Watson 	 * change from a series of if (); if (); to if () else if () else...
427acd3428bSRobert Watson 	 */
428b2546660SJohn Baldwin 	uc = td->td_ucred;
429c814aa3fSAlfred Perlstein 	DP(("sem_perm: uc(%d,%d) ks(%d,%d,%o)\n",
430efaa6588SAlfred Perlstein 	    uc->cr_uid, uc->cr_gid,
431c814aa3fSAlfred Perlstein 	     ks->ks_uid, ks->ks_gid, ks->ks_mode));
432acd3428bSRobert Watson 	if ((uc->cr_uid == ks->ks_uid) && (ks->ks_mode & S_IWUSR) != 0)
433efaa6588SAlfred Perlstein 		return (0);
434acd3428bSRobert Watson 	if ((uc->cr_gid == ks->ks_gid) && (ks->ks_mode & S_IWGRP) != 0)
435acd3428bSRobert Watson 		return (0);
436acd3428bSRobert Watson 	if ((ks->ks_mode & S_IWOTH) != 0)
437acd3428bSRobert Watson 		return (0);
438acd3428bSRobert Watson 	return (priv_check(td, PRIV_SEM_WRITE));
439efaa6588SAlfred Perlstein }
440efaa6588SAlfred Perlstein 
441c3053131SPoul-Henning Kamp static void
442efaa6588SAlfred Perlstein sem_free(struct ksem *ks)
443efaa6588SAlfred Perlstein {
444efaa6588SAlfred Perlstein 
445efaa6588SAlfred Perlstein 	nsems--;
446efaa6588SAlfred Perlstein 	if (ks->ks_onlist)
447efaa6588SAlfred Perlstein 		LIST_REMOVE(ks, ks_entry);
448efaa6588SAlfred Perlstein 	if (ks->ks_name != NULL)
449efaa6588SAlfred Perlstein 		free(ks->ks_name, M_SEM);
450efaa6588SAlfred Perlstein 	cv_destroy(&ks->ks_cv);
451efaa6588SAlfred Perlstein 	free(ks, M_SEM);
452efaa6588SAlfred Perlstein }
453efaa6588SAlfred Perlstein 
454efaa6588SAlfred Perlstein static __inline struct kuser *sem_getuser(struct proc *p, struct ksem *ks);
455efaa6588SAlfred Perlstein 
456efaa6588SAlfred Perlstein static __inline struct kuser *
457c1250af6SRobert Watson sem_getuser(struct proc *p, struct ksem *ks)
458efaa6588SAlfred Perlstein {
459efaa6588SAlfred Perlstein 	struct kuser *k;
460efaa6588SAlfred Perlstein 
461efaa6588SAlfred Perlstein 	LIST_FOREACH(k, &ks->ks_users, ku_next)
462efaa6588SAlfred Perlstein 		if (k->ku_pid == p->p_pid)
463efaa6588SAlfred Perlstein 			return (k);
464efaa6588SAlfred Perlstein 	return (NULL);
465efaa6588SAlfred Perlstein }
466efaa6588SAlfred Perlstein 
467c3053131SPoul-Henning Kamp static int
468c1250af6SRobert Watson sem_hasopen(struct thread *td, struct ksem *ks)
469efaa6588SAlfred Perlstein {
470efaa6588SAlfred Perlstein 
471aae94fbbSDaniel Eischen 	return ((ks->ks_name == NULL && sem_perm(td, ks) == 0)
472b2546660SJohn Baldwin 	    || sem_getuser(td->td_proc, ks) != NULL);
473efaa6588SAlfred Perlstein }
474efaa6588SAlfred Perlstein 
475c3053131SPoul-Henning Kamp static int
476c1250af6SRobert Watson sem_leave(struct proc *p, struct ksem *ks)
477efaa6588SAlfred Perlstein {
478efaa6588SAlfred Perlstein 	struct kuser *k;
479efaa6588SAlfred Perlstein 
480c814aa3fSAlfred Perlstein 	DP(("sem_leave: ks = %p\n", ks));
481efaa6588SAlfred Perlstein 	k = sem_getuser(p, ks);
482c814aa3fSAlfred Perlstein 	DP(("sem_leave: ks = %p, k = %p\n", ks, k));
483efaa6588SAlfred Perlstein 	if (k != NULL) {
484efaa6588SAlfred Perlstein 		LIST_REMOVE(k, ku_next);
485efaa6588SAlfred Perlstein 		sem_rel(ks);
486c814aa3fSAlfred Perlstein 		DP(("sem_leave: about to free k\n"));
487efaa6588SAlfred Perlstein 		free(k, M_SEM);
488c814aa3fSAlfred Perlstein 		DP(("sem_leave: returning\n"));
489efaa6588SAlfred Perlstein 		return (0);
490efaa6588SAlfred Perlstein 	}
491b3890a1cSAlfred Perlstein 	return (EINVAL);
492efaa6588SAlfred Perlstein }
493efaa6588SAlfred Perlstein 
494c3053131SPoul-Henning Kamp static void
495efaa6588SAlfred Perlstein sem_enter(p, ks)
496efaa6588SAlfred Perlstein 	struct proc *p;
497efaa6588SAlfred Perlstein 	struct ksem *ks;
498efaa6588SAlfred Perlstein {
499efaa6588SAlfred Perlstein 	struct kuser *ku, *k;
500efaa6588SAlfred Perlstein 
501a163d034SWarner Losh 	ku = malloc(sizeof(*ku), M_SEM, M_WAITOK);
502efaa6588SAlfred Perlstein 	ku->ku_pid = p->p_pid;
503efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
504efaa6588SAlfred Perlstein 	k = sem_getuser(p, ks);
505efaa6588SAlfred Perlstein 	if (k != NULL) {
506efaa6588SAlfred Perlstein 		mtx_unlock(&sem_lock);
507efaa6588SAlfred Perlstein 		free(ku, M_TEMP);
508efaa6588SAlfred Perlstein 		return;
509efaa6588SAlfred Perlstein 	}
510efaa6588SAlfred Perlstein 	LIST_INSERT_HEAD(&ks->ks_users, ku, ku_next);
511efaa6588SAlfred Perlstein 	sem_ref(ks);
512efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
513efaa6588SAlfred Perlstein }
514efaa6588SAlfred Perlstein 
515efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
516efaa6588SAlfred Perlstein struct ksem_unlink_args {
517efaa6588SAlfred Perlstein 	char *name;
518efaa6588SAlfred Perlstein };
519efaa6588SAlfred Perlstein int ksem_unlink(struct thread *td, struct ksem_unlink_args *uap);
520efaa6588SAlfred Perlstein #endif
521efaa6588SAlfred Perlstein 
522efaa6588SAlfred Perlstein int
523c1250af6SRobert Watson ksem_unlink(struct thread *td, struct ksem_unlink_args *uap)
524efaa6588SAlfred Perlstein {
525efaa6588SAlfred Perlstein 	char name[SEM_MAX_NAMELEN + 1];
526efaa6588SAlfred Perlstein 	size_t done;
527efaa6588SAlfred Perlstein 	int error;
528efaa6588SAlfred Perlstein 
529efaa6588SAlfred Perlstein 	error = copyinstr(uap->name, name, SEM_MAX_NAMELEN + 1, &done);
530efaa6588SAlfred Perlstein 	return (error ? error :
531efaa6588SAlfred Perlstein 	    kern_sem_unlink(td, name));
532efaa6588SAlfred Perlstein }
533efaa6588SAlfred Perlstein 
534efaa6588SAlfred Perlstein static int
535c1250af6SRobert Watson kern_sem_unlink(struct thread *td, const char *name)
536efaa6588SAlfred Perlstein {
537efaa6588SAlfred Perlstein 	struct ksem *ks;
538efaa6588SAlfred Perlstein 	int error;
539efaa6588SAlfred Perlstein 
540efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
541efaa6588SAlfred Perlstein 	ks = sem_lookup_byname(name);
54252648411SRobert Watson 	if (ks != NULL) {
54352648411SRobert Watson #ifdef MAC
54452648411SRobert Watson 		error = mac_check_posix_sem_unlink(td->td_ucred, ks);
54552648411SRobert Watson 		if (error) {
54652648411SRobert Watson 			mtx_unlock(&sem_lock);
54752648411SRobert Watson 			return (error);
54852648411SRobert Watson 		}
54952648411SRobert Watson #endif
550b2546660SJohn Baldwin 		error = sem_perm(td, ks);
55152648411SRobert Watson 	} else
55252648411SRobert Watson 		error = ENOENT;
553c814aa3fSAlfred Perlstein 	DP(("sem_unlink: '%s' ks = %p, error = %d\n", name, ks, error));
554efaa6588SAlfred Perlstein 	if (error == 0) {
555efaa6588SAlfred Perlstein 		LIST_REMOVE(ks, ks_entry);
556efaa6588SAlfred Perlstein 		LIST_INSERT_HEAD(&ksem_deadhead, ks, ks_entry);
557efaa6588SAlfred Perlstein 		sem_rel(ks);
558efaa6588SAlfred Perlstein 	}
559efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
560efaa6588SAlfred Perlstein 	return (error);
561efaa6588SAlfred Perlstein }
562efaa6588SAlfred Perlstein 
563efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
564efaa6588SAlfred Perlstein struct ksem_close_args {
565efaa6588SAlfred Perlstein 	semid_t id;
566efaa6588SAlfred Perlstein };
567efaa6588SAlfred Perlstein int ksem_close(struct thread *td, struct ksem_close_args *uap);
568efaa6588SAlfred Perlstein #endif
569efaa6588SAlfred Perlstein 
570efaa6588SAlfred Perlstein int
571efaa6588SAlfred Perlstein ksem_close(struct thread *td, struct ksem_close_args *uap)
572efaa6588SAlfred Perlstein {
573efaa6588SAlfred Perlstein 
574efaa6588SAlfred Perlstein 	return (kern_sem_close(td, uap->id));
575efaa6588SAlfred Perlstein }
576efaa6588SAlfred Perlstein 
577c3053131SPoul-Henning Kamp static int
578c1250af6SRobert Watson kern_sem_close(struct thread *td, semid_t id)
579efaa6588SAlfred Perlstein {
580efaa6588SAlfred Perlstein 	struct ksem *ks;
581efaa6588SAlfred Perlstein 	int error;
582efaa6588SAlfred Perlstein 
583efaa6588SAlfred Perlstein 	error = EINVAL;
584efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
585efaa6588SAlfred Perlstein 	ks = ID_TO_SEM(id);
586efaa6588SAlfred Perlstein 	/* this is not a valid operation for unnamed sems */
587efaa6588SAlfred Perlstein 	if (ks != NULL && ks->ks_name != NULL)
588b3890a1cSAlfred Perlstein 		error = sem_leave(td->td_proc, ks);
589efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
590b3890a1cSAlfred Perlstein 	return (error);
591efaa6588SAlfred Perlstein }
592efaa6588SAlfred Perlstein 
593efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
594efaa6588SAlfred Perlstein struct ksem_post_args {
595efaa6588SAlfred Perlstein 	semid_t id;
596efaa6588SAlfred Perlstein };
597efaa6588SAlfred Perlstein int ksem_post(struct thread *td, struct ksem_post_args *uap);
598efaa6588SAlfred Perlstein #endif
599efaa6588SAlfred Perlstein int
600c1250af6SRobert Watson ksem_post(struct thread *td, struct ksem_post_args *uap)
601efaa6588SAlfred Perlstein {
602efaa6588SAlfred Perlstein 
603efaa6588SAlfred Perlstein 	return (kern_sem_post(td, uap->id));
604efaa6588SAlfred Perlstein }
605efaa6588SAlfred Perlstein 
606c3053131SPoul-Henning Kamp static int
607c1250af6SRobert Watson kern_sem_post(struct thread *td, semid_t id)
608efaa6588SAlfred Perlstein {
609efaa6588SAlfred Perlstein 	struct ksem *ks;
610efaa6588SAlfred Perlstein 	int error;
611efaa6588SAlfred Perlstein 
612efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
613efaa6588SAlfred Perlstein 	ks = ID_TO_SEM(id);
614b2546660SJohn Baldwin 	if (ks == NULL || !sem_hasopen(td, ks)) {
615efaa6588SAlfred Perlstein 		error = EINVAL;
616efaa6588SAlfred Perlstein 		goto err;
617efaa6588SAlfred Perlstein 	}
61852648411SRobert Watson #ifdef MAC
61952648411SRobert Watson 	error = mac_check_posix_sem_post(td->td_ucred, ks);
62052648411SRobert Watson 	if (error)
62152648411SRobert Watson 		goto err;
62252648411SRobert Watson #endif
623efaa6588SAlfred Perlstein 	if (ks->ks_value == SEM_VALUE_MAX) {
624efaa6588SAlfred Perlstein 		error = EOVERFLOW;
625efaa6588SAlfred Perlstein 		goto err;
626efaa6588SAlfred Perlstein 	}
627efaa6588SAlfred Perlstein 	++ks->ks_value;
628efaa6588SAlfred Perlstein 	if (ks->ks_waiters > 0)
629efaa6588SAlfred Perlstein 		cv_signal(&ks->ks_cv);
630efaa6588SAlfred Perlstein 	error = 0;
631efaa6588SAlfred Perlstein err:
632efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
633efaa6588SAlfred Perlstein 	return (error);
634efaa6588SAlfred Perlstein }
635efaa6588SAlfred Perlstein 
636efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
637efaa6588SAlfred Perlstein struct ksem_wait_args {
638efaa6588SAlfred Perlstein 	semid_t id;
639efaa6588SAlfred Perlstein };
640efaa6588SAlfred Perlstein int ksem_wait(struct thread *td, struct ksem_wait_args *uap);
641efaa6588SAlfred Perlstein #endif
642efaa6588SAlfred Perlstein 
643efaa6588SAlfred Perlstein int
644c1250af6SRobert Watson ksem_wait(struct thread *td, struct ksem_wait_args *uap)
645efaa6588SAlfred Perlstein {
646efaa6588SAlfred Perlstein 
647aae94fbbSDaniel Eischen 	return (kern_sem_wait(td, uap->id, 0, NULL));
648aae94fbbSDaniel Eischen }
649aae94fbbSDaniel Eischen 
650aae94fbbSDaniel Eischen #ifndef _SYS_SYSPROTO_H_
651aae94fbbSDaniel Eischen struct ksem_timedwait_args {
652aae94fbbSDaniel Eischen 	semid_t id;
653d60e86c8SStefan Farfeleder 	const struct timespec *abstime;
654aae94fbbSDaniel Eischen };
655aae94fbbSDaniel Eischen int ksem_timedwait(struct thread *td, struct ksem_timedwait_args *uap);
656aae94fbbSDaniel Eischen #endif
657aae94fbbSDaniel Eischen int
658c1250af6SRobert Watson ksem_timedwait(struct thread *td, struct ksem_timedwait_args *uap)
659aae94fbbSDaniel Eischen {
660aae94fbbSDaniel Eischen 	struct timespec abstime;
661aae94fbbSDaniel Eischen 	struct timespec *ts;
662aae94fbbSDaniel Eischen 	int error;
663aae94fbbSDaniel Eischen 
664aae94fbbSDaniel Eischen 	/* We allow a null timespec (wait forever). */
665aae94fbbSDaniel Eischen 	if (uap->abstime == NULL)
666aae94fbbSDaniel Eischen 		ts = NULL;
667aae94fbbSDaniel Eischen 	else {
668aae94fbbSDaniel Eischen 		error = copyin(uap->abstime, &abstime, sizeof(abstime));
669aae94fbbSDaniel Eischen 		if (error != 0)
670aae94fbbSDaniel Eischen 			return (error);
671aae94fbbSDaniel Eischen 		if (abstime.tv_nsec >= 1000000000 || abstime.tv_nsec < 0)
672aae94fbbSDaniel Eischen 			return (EINVAL);
673aae94fbbSDaniel Eischen 		ts = &abstime;
674aae94fbbSDaniel Eischen 	}
675aae94fbbSDaniel Eischen 	return (kern_sem_wait(td, uap->id, 0, ts));
676efaa6588SAlfred Perlstein }
677efaa6588SAlfred Perlstein 
678efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
679efaa6588SAlfred Perlstein struct ksem_trywait_args {
680efaa6588SAlfred Perlstein 	semid_t id;
681efaa6588SAlfred Perlstein };
682efaa6588SAlfred Perlstein int ksem_trywait(struct thread *td, struct ksem_trywait_args *uap);
683efaa6588SAlfred Perlstein #endif
684efaa6588SAlfred Perlstein int
685c1250af6SRobert Watson ksem_trywait(struct thread *td, struct ksem_trywait_args *uap)
686efaa6588SAlfred Perlstein {
687efaa6588SAlfred Perlstein 
688aae94fbbSDaniel Eischen 	return (kern_sem_wait(td, uap->id, 1, NULL));
689efaa6588SAlfred Perlstein }
690efaa6588SAlfred Perlstein 
691c3053131SPoul-Henning Kamp static int
692c1250af6SRobert Watson kern_sem_wait(struct thread *td, semid_t id, int tryflag,
693c1250af6SRobert Watson     struct timespec *abstime)
694efaa6588SAlfred Perlstein {
695aae94fbbSDaniel Eischen 	struct timespec ts1, ts2;
696aae94fbbSDaniel Eischen 	struct timeval tv;
697efaa6588SAlfred Perlstein 	struct ksem *ks;
698efaa6588SAlfred Perlstein 	int error;
699efaa6588SAlfred Perlstein 
700c814aa3fSAlfred Perlstein 	DP((">>> kern_sem_wait entered!\n"));
701efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
702efaa6588SAlfred Perlstein 	ks = ID_TO_SEM(id);
703efaa6588SAlfred Perlstein 	if (ks == NULL) {
704c814aa3fSAlfred Perlstein 		DP(("kern_sem_wait ks == NULL\n"));
705efaa6588SAlfred Perlstein 		error = EINVAL;
706efaa6588SAlfred Perlstein 		goto err;
707efaa6588SAlfred Perlstein 	}
708efaa6588SAlfred Perlstein 	sem_ref(ks);
709b2546660SJohn Baldwin 	if (!sem_hasopen(td, ks)) {
710c814aa3fSAlfred Perlstein 		DP(("kern_sem_wait hasopen failed\n"));
711efaa6588SAlfred Perlstein 		error = EINVAL;
712efaa6588SAlfred Perlstein 		goto err;
713efaa6588SAlfred Perlstein 	}
71452648411SRobert Watson #ifdef MAC
71552648411SRobert Watson 	error = mac_check_posix_sem_wait(td->td_ucred, ks);
71652648411SRobert Watson 	if (error) {
71752648411SRobert Watson 		DP(("kern_sem_wait mac failed\n"));
71852648411SRobert Watson 		goto err;
71952648411SRobert Watson 	}
72052648411SRobert Watson #endif
721c814aa3fSAlfred Perlstein 	DP(("kern_sem_wait value = %d, tryflag %d\n", ks->ks_value, tryflag));
722efaa6588SAlfred Perlstein 	if (ks->ks_value == 0) {
723efaa6588SAlfred Perlstein 		ks->ks_waiters++;
724aae94fbbSDaniel Eischen 		if (tryflag != 0)
725aae94fbbSDaniel Eischen 			error = EAGAIN;
726aae94fbbSDaniel Eischen 		else if (abstime == NULL)
727aae94fbbSDaniel Eischen 			error = cv_wait_sig(&ks->ks_cv, &sem_lock);
728aae94fbbSDaniel Eischen 		else {
729aae94fbbSDaniel Eischen 			for (;;) {
730aae94fbbSDaniel Eischen 				ts1 = *abstime;
731aae94fbbSDaniel Eischen 				getnanotime(&ts2);
732aae94fbbSDaniel Eischen 				timespecsub(&ts1, &ts2);
733aae94fbbSDaniel Eischen 				TIMESPEC_TO_TIMEVAL(&tv, &ts1);
734aae94fbbSDaniel Eischen 				if (tv.tv_sec < 0) {
735aae94fbbSDaniel Eischen 					error = ETIMEDOUT;
736aae94fbbSDaniel Eischen 					break;
737aae94fbbSDaniel Eischen 				}
738aae94fbbSDaniel Eischen 				error = cv_timedwait_sig(&ks->ks_cv,
739aae94fbbSDaniel Eischen 				    &sem_lock, tvtohz(&tv));
740aae94fbbSDaniel Eischen 				if (error != EWOULDBLOCK)
741aae94fbbSDaniel Eischen 					break;
742aae94fbbSDaniel Eischen 			}
743aae94fbbSDaniel Eischen 		}
744efaa6588SAlfred Perlstein 		ks->ks_waiters--;
745efaa6588SAlfred Perlstein 		if (error)
746efaa6588SAlfred Perlstein 			goto err;
747efaa6588SAlfred Perlstein 	}
748efaa6588SAlfred Perlstein 	ks->ks_value--;
749efaa6588SAlfred Perlstein 	error = 0;
750efaa6588SAlfred Perlstein err:
751efaa6588SAlfred Perlstein 	if (ks != NULL)
752efaa6588SAlfred Perlstein 		sem_rel(ks);
753efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
754c814aa3fSAlfred Perlstein 	DP(("<<< kern_sem_wait leaving, error = %d\n", error));
755efaa6588SAlfred Perlstein 	return (error);
756efaa6588SAlfred Perlstein }
757efaa6588SAlfred Perlstein 
758efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
759efaa6588SAlfred Perlstein struct ksem_getvalue_args {
760efaa6588SAlfred Perlstein 	semid_t id;
761efaa6588SAlfred Perlstein 	int *val;
762efaa6588SAlfred Perlstein };
763efaa6588SAlfred Perlstein int ksem_getvalue(struct thread *td, struct ksem_getvalue_args *uap);
764efaa6588SAlfred Perlstein #endif
765efaa6588SAlfred Perlstein int
766c1250af6SRobert Watson ksem_getvalue(struct thread *td, struct ksem_getvalue_args *uap)
767efaa6588SAlfred Perlstein {
768efaa6588SAlfred Perlstein 	struct ksem *ks;
769efaa6588SAlfred Perlstein 	int error, val;
770efaa6588SAlfred Perlstein 
771efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
772efaa6588SAlfred Perlstein 	ks = ID_TO_SEM(uap->id);
773b2546660SJohn Baldwin 	if (ks == NULL || !sem_hasopen(td, ks)) {
774efaa6588SAlfred Perlstein 		mtx_unlock(&sem_lock);
775efaa6588SAlfred Perlstein 		return (EINVAL);
776efaa6588SAlfred Perlstein 	}
77752648411SRobert Watson #ifdef MAC
77852648411SRobert Watson 	error = mac_check_posix_sem_getvalue(td->td_ucred, ks);
77952648411SRobert Watson 	if (error) {
78052648411SRobert Watson 		mtx_unlock(&sem_lock);
78152648411SRobert Watson 		return (error);
78252648411SRobert Watson 	}
78352648411SRobert Watson #endif
784efaa6588SAlfred Perlstein 	val = ks->ks_value;
785efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
786efaa6588SAlfred Perlstein 	error = copyout(&val, uap->val, sizeof(val));
787efaa6588SAlfred Perlstein 	return (error);
788efaa6588SAlfred Perlstein }
789efaa6588SAlfred Perlstein 
790efaa6588SAlfred Perlstein #ifndef _SYS_SYSPROTO_H_
791efaa6588SAlfred Perlstein struct ksem_destroy_args {
792efaa6588SAlfred Perlstein 	semid_t id;
793efaa6588SAlfred Perlstein };
794efaa6588SAlfred Perlstein int ksem_destroy(struct thread *td, struct ksem_destroy_args *uap);
795efaa6588SAlfred Perlstein #endif
796efaa6588SAlfred Perlstein int
797c1250af6SRobert Watson ksem_destroy(struct thread *td, struct ksem_destroy_args *uap)
798efaa6588SAlfred Perlstein {
799efaa6588SAlfred Perlstein 	struct ksem *ks;
800efaa6588SAlfred Perlstein 	int error;
801efaa6588SAlfred Perlstein 
802efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
803efaa6588SAlfred Perlstein 	ks = ID_TO_SEM(uap->id);
804b2546660SJohn Baldwin 	if (ks == NULL || !sem_hasopen(td, ks) ||
805efaa6588SAlfred Perlstein 	    ks->ks_name != NULL) {
806efaa6588SAlfred Perlstein 		error = EINVAL;
807efaa6588SAlfred Perlstein 		goto err;
808efaa6588SAlfred Perlstein 	}
80952648411SRobert Watson #ifdef MAC
81052648411SRobert Watson 	error = mac_check_posix_sem_destroy(td->td_ucred, ks);
81152648411SRobert Watson 	if (error)
81252648411SRobert Watson 		goto err;
81352648411SRobert Watson #endif
814efaa6588SAlfred Perlstein 	if (ks->ks_waiters != 0) {
815efaa6588SAlfred Perlstein 		error = EBUSY;
816efaa6588SAlfred Perlstein 		goto err;
817efaa6588SAlfred Perlstein 	}
818efaa6588SAlfred Perlstein 	sem_rel(ks);
819efaa6588SAlfred Perlstein 	error = 0;
820efaa6588SAlfred Perlstein err:
821efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
822efaa6588SAlfred Perlstein 	return (error);
823efaa6588SAlfred Perlstein }
824efaa6588SAlfred Perlstein 
825590f242cSRobert Watson /*
826590f242cSRobert Watson  * Count the number of kusers associated with a proc, so as to guess at how
827590f242cSRobert Watson  * many to allocate when forking.
828590f242cSRobert Watson  */
829590f242cSRobert Watson static int
830c1250af6SRobert Watson sem_count_proc(struct proc *p)
831590f242cSRobert Watson {
832590f242cSRobert Watson 	struct ksem *ks;
833590f242cSRobert Watson 	struct kuser *ku;
834590f242cSRobert Watson 	int count;
835590f242cSRobert Watson 
836590f242cSRobert Watson 	mtx_assert(&sem_lock, MA_OWNED);
837590f242cSRobert Watson 
838590f242cSRobert Watson 	count = 0;
839590f242cSRobert Watson 	LIST_FOREACH(ks, &ksem_head, ks_entry) {
840590f242cSRobert Watson 		LIST_FOREACH(ku, &ks->ks_users, ku_next) {
841590f242cSRobert Watson 			if (ku->ku_pid == p->p_pid)
842590f242cSRobert Watson 				count++;
843590f242cSRobert Watson 		}
844590f242cSRobert Watson 	}
845590f242cSRobert Watson 	LIST_FOREACH(ks, &ksem_deadhead, ks_entry) {
846590f242cSRobert Watson 		LIST_FOREACH(ku, &ks->ks_users, ku_next) {
847590f242cSRobert Watson 			if (ku->ku_pid == p->p_pid)
848590f242cSRobert Watson 				count++;
849590f242cSRobert Watson 		}
850590f242cSRobert Watson 	}
851590f242cSRobert Watson 	return (count);
852590f242cSRobert Watson }
853590f242cSRobert Watson 
854590f242cSRobert Watson /*
855590f242cSRobert Watson  * When a process forks, the child process must gain a reference to each open
856590f242cSRobert Watson  * semaphore in the parent process, whether it is unlinked or not.  This
857590f242cSRobert Watson  * requires allocating a kuser structure for each semaphore reference in the
858590f242cSRobert Watson  * new process.  Because the set of semaphores in the parent can change while
859590f242cSRobert Watson  * the fork is in progress, we have to handle races -- first we attempt to
860590f242cSRobert Watson  * allocate enough storage to acquire references to each of the semaphores,
861590f242cSRobert Watson  * then we enter the semaphores and release the temporary references.
862590f242cSRobert Watson  */
863590f242cSRobert Watson static void
864c1250af6SRobert Watson sem_forkhook(void *arg, struct proc *p1, struct proc *p2, int flags)
865590f242cSRobert Watson {
866590f242cSRobert Watson 	struct ksem *ks, **sem_array;
867590f242cSRobert Watson 	int count, i, new_count;
868590f242cSRobert Watson 	struct kuser *ku;
869590f242cSRobert Watson 
870590f242cSRobert Watson 	mtx_lock(&sem_lock);
871590f242cSRobert Watson 	count = sem_count_proc(p1);
872e2f7a83dSRobert Watson 	if (count == 0) {
873e2f7a83dSRobert Watson 		mtx_unlock(&sem_lock);
874e2f7a83dSRobert Watson 		return;
875e2f7a83dSRobert Watson 	}
876590f242cSRobert Watson race_lost:
877590f242cSRobert Watson 	mtx_assert(&sem_lock, MA_OWNED);
878590f242cSRobert Watson 	mtx_unlock(&sem_lock);
879590f242cSRobert Watson 	sem_array = malloc(sizeof(struct ksem *) * count, M_TEMP, M_WAITOK);
880590f242cSRobert Watson 	mtx_lock(&sem_lock);
881590f242cSRobert Watson 	new_count = sem_count_proc(p1);
882590f242cSRobert Watson 	if (count < new_count) {
883590f242cSRobert Watson 		/* Lost race, repeat and allocate more storage. */
884590f242cSRobert Watson 		free(sem_array, M_TEMP);
885590f242cSRobert Watson 		count = new_count;
886590f242cSRobert Watson 		goto race_lost;
887590f242cSRobert Watson 	}
888590f242cSRobert Watson 	/*
889590f242cSRobert Watson 	 * Given an array capable of storing an adequate number of semaphore
890590f242cSRobert Watson 	 * references, now walk the list of semaphores and acquire a new
891590f242cSRobert Watson 	 * reference for any semaphore opened by p1.
892590f242cSRobert Watson 	 */
893590f242cSRobert Watson 	count = new_count;
894590f242cSRobert Watson 	i = 0;
895590f242cSRobert Watson 	LIST_FOREACH(ks, &ksem_head, ks_entry) {
896590f242cSRobert Watson 		LIST_FOREACH(ku, &ks->ks_users, ku_next) {
897590f242cSRobert Watson 			if (ku->ku_pid == p1->p_pid) {
898590f242cSRobert Watson 				sem_ref(ks);
899590f242cSRobert Watson 				sem_array[i] = ks;
900fa6fc5b8SRobert Watson 				i++;
901590f242cSRobert Watson 				break;
902590f242cSRobert Watson 			}
903590f242cSRobert Watson 		}
904590f242cSRobert Watson 	}
905590f242cSRobert Watson 	LIST_FOREACH(ks, &ksem_deadhead, ks_entry) {
906590f242cSRobert Watson 		LIST_FOREACH(ku, &ks->ks_users, ku_next) {
907590f242cSRobert Watson 			if (ku->ku_pid == p1->p_pid) {
908590f242cSRobert Watson 				sem_ref(ks);
909590f242cSRobert Watson 				sem_array[i] = ks;
910fa6fc5b8SRobert Watson 				i++;
911590f242cSRobert Watson 				break;
912590f242cSRobert Watson 			}
913590f242cSRobert Watson 		}
914590f242cSRobert Watson 	}
915590f242cSRobert Watson 	mtx_unlock(&sem_lock);
916fa6fc5b8SRobert Watson 	KASSERT(i == count, ("sem_forkhook: i != count (%d, %d)", i, count));
917590f242cSRobert Watson 	/*
918590f242cSRobert Watson 	 * Now cause p2 to enter each of the referenced semaphores, then
919590f242cSRobert Watson 	 * release our temporary reference.  This is pretty inefficient.
920590f242cSRobert Watson 	 * Finally, free our temporary array.
921590f242cSRobert Watson 	 */
922590f242cSRobert Watson 	for (i = 0; i < count; i++) {
923590f242cSRobert Watson 		sem_enter(p2, sem_array[i]);
924590f242cSRobert Watson 		mtx_lock(&sem_lock);
925590f242cSRobert Watson 		sem_rel(sem_array[i]);
926590f242cSRobert Watson 		mtx_unlock(&sem_lock);
927590f242cSRobert Watson 	}
928590f242cSRobert Watson 	free(sem_array, M_TEMP);
929590f242cSRobert Watson }
930590f242cSRobert Watson 
931c3053131SPoul-Henning Kamp static void
932e2d70dbaSColin Percival sem_exechook(void *arg, struct proc *p, struct image_params *imgp __unused)
933993182e5SAlexander Leidinger {
934e2d70dbaSColin Percival    	sem_exithook(arg, p);
935993182e5SAlexander Leidinger }
936993182e5SAlexander Leidinger 
937993182e5SAlexander Leidinger static void
938e2d70dbaSColin Percival sem_exithook(void *arg, struct proc *p)
939efaa6588SAlfred Perlstein {
940efaa6588SAlfred Perlstein 	struct ksem *ks, *ksnext;
941efaa6588SAlfred Perlstein 
942efaa6588SAlfred Perlstein 	mtx_lock(&sem_lock);
943efaa6588SAlfred Perlstein 	ks = LIST_FIRST(&ksem_head);
944efaa6588SAlfred Perlstein 	while (ks != NULL) {
945efaa6588SAlfred Perlstein 		ksnext = LIST_NEXT(ks, ks_entry);
946efaa6588SAlfred Perlstein 		sem_leave(p, ks);
947efaa6588SAlfred Perlstein 		ks = ksnext;
948efaa6588SAlfred Perlstein 	}
949efaa6588SAlfred Perlstein 	ks = LIST_FIRST(&ksem_deadhead);
950efaa6588SAlfred Perlstein 	while (ks != NULL) {
951efaa6588SAlfred Perlstein 		ksnext = LIST_NEXT(ks, ks_entry);
952efaa6588SAlfred Perlstein 		sem_leave(p, ks);
953efaa6588SAlfred Perlstein 		ks = ksnext;
954efaa6588SAlfred Perlstein 	}
955efaa6588SAlfred Perlstein 	mtx_unlock(&sem_lock);
956efaa6588SAlfred Perlstein }
957efaa6588SAlfred Perlstein 
958efaa6588SAlfred Perlstein static int
959efaa6588SAlfred Perlstein sem_modload(struct module *module, int cmd, void *arg)
960efaa6588SAlfred Perlstein {
961efaa6588SAlfred Perlstein         int error = 0;
962efaa6588SAlfred Perlstein 
963efaa6588SAlfred Perlstein         switch (cmd) {
964efaa6588SAlfred Perlstein         case MOD_LOAD:
965efaa6588SAlfred Perlstein 		mtx_init(&sem_lock, "sem", "semaphore", MTX_DEF);
966efaa6588SAlfred Perlstein 		p31b_setcfg(CTL_P1003_1B_SEM_NSEMS_MAX, SEM_MAX);
967efaa6588SAlfred Perlstein 		p31b_setcfg(CTL_P1003_1B_SEM_VALUE_MAX, SEM_VALUE_MAX);
96875b8b3b2SJohn Baldwin 		sem_exit_tag = EVENTHANDLER_REGISTER(process_exit, sem_exithook,
96975b8b3b2SJohn Baldwin 		    NULL, EVENTHANDLER_PRI_ANY);
970e2d70dbaSColin Percival 		sem_exec_tag = EVENTHANDLER_REGISTER(process_exec, sem_exechook,
97175b8b3b2SJohn Baldwin 		    NULL, EVENTHANDLER_PRI_ANY);
972590f242cSRobert Watson 		sem_fork_tag = EVENTHANDLER_REGISTER(process_fork, sem_forkhook, NULL, EVENTHANDLER_PRI_ANY);
973efaa6588SAlfred Perlstein                 break;
974efaa6588SAlfred Perlstein         case MOD_UNLOAD:
975efaa6588SAlfred Perlstein 		if (nsems != 0) {
976efaa6588SAlfred Perlstein 			error = EOPNOTSUPP;
977efaa6588SAlfred Perlstein 			break;
978efaa6588SAlfred Perlstein 		}
97975b8b3b2SJohn Baldwin 		EVENTHANDLER_DEREGISTER(process_exit, sem_exit_tag);
98075b8b3b2SJohn Baldwin 		EVENTHANDLER_DEREGISTER(process_exec, sem_exec_tag);
981590f242cSRobert Watson 		EVENTHANDLER_DEREGISTER(process_fork, sem_fork_tag);
982efaa6588SAlfred Perlstein 		mtx_destroy(&sem_lock);
983efaa6588SAlfred Perlstein                 break;
984efaa6588SAlfred Perlstein         case MOD_SHUTDOWN:
985efaa6588SAlfred Perlstein                 break;
986efaa6588SAlfred Perlstein         default:
987efaa6588SAlfred Perlstein                 error = EINVAL;
988efaa6588SAlfred Perlstein                 break;
989efaa6588SAlfred Perlstein         }
990efaa6588SAlfred Perlstein         return (error);
991efaa6588SAlfred Perlstein }
992efaa6588SAlfred Perlstein 
993efaa6588SAlfred Perlstein static moduledata_t sem_mod = {
994efaa6588SAlfred Perlstein         "sem",
995efaa6588SAlfred Perlstein         &sem_modload,
996efaa6588SAlfred Perlstein         NULL
997efaa6588SAlfred Perlstein };
998efaa6588SAlfred Perlstein 
999efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_init);
1000efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_open);
1001efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_unlink);
1002efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_close);
1003efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_post);
1004efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_wait);
1005aae94fbbSDaniel Eischen SYSCALL_MODULE_HELPER(ksem_timedwait);
1006efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_trywait);
1007efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_getvalue);
1008efaa6588SAlfred Perlstein SYSCALL_MODULE_HELPER(ksem_destroy);
1009efaa6588SAlfred Perlstein 
1010efaa6588SAlfred Perlstein DECLARE_MODULE(sem, sem_mod, SI_SUB_SYSV_SEM, SI_ORDER_FIRST);
1011efaa6588SAlfred Perlstein MODULE_VERSION(sem, 1);
1012