1 /*- 2 * Implementation of SVID semaphores 3 * 4 * Author: Daniel Boulet 5 * 6 * This software is provided ``AS IS'' without any warranties of any kind. 7 */ 8 /*- 9 * Copyright (c) 2003-2005 McAfee, Inc. 10 * All rights reserved. 11 * 12 * This software was developed for the FreeBSD Project in part by McAfee 13 * Research, the Security Research Division of McAfee, Inc under DARPA/SPAWAR 14 * contract N66001-01-C-8035 ("CBOSS"), as part of the DARPA CHATS research 15 * program. 16 * 17 * Redistribution and use in source and binary forms, with or without 18 * modification, are permitted provided that the following conditions 19 * are met: 20 * 1. Redistributions of source code must retain the above copyright 21 * notice, this list of conditions and the following disclaimer. 22 * 2. Redistributions in binary form must reproduce the above copyright 23 * notice, this list of conditions and the following disclaimer in the 24 * documentation and/or other materials provided with the distribution. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 */ 38 39 #include <sys/cdefs.h> 40 __FBSDID("$FreeBSD$"); 41 42 #include "opt_sysvipc.h" 43 #include "opt_mac.h" 44 45 #include <sys/param.h> 46 #include <sys/systm.h> 47 #include <sys/sysproto.h> 48 #include <sys/eventhandler.h> 49 #include <sys/kernel.h> 50 #include <sys/proc.h> 51 #include <sys/lock.h> 52 #include <sys/module.h> 53 #include <sys/mutex.h> 54 #include <sys/sem.h> 55 #include <sys/syscall.h> 56 #include <sys/syscallsubr.h> 57 #include <sys/sysent.h> 58 #include <sys/sysctl.h> 59 #include <sys/uio.h> 60 #include <sys/malloc.h> 61 #include <sys/jail.h> 62 63 #include <security/mac/mac_framework.h> 64 65 static MALLOC_DEFINE(M_SEM, "sem", "SVID compatible semaphores"); 66 67 #ifdef SEM_DEBUG 68 #define DPRINTF(a) printf a 69 #else 70 #define DPRINTF(a) 71 #endif 72 73 static void seminit(void); 74 static int sysvsem_modload(struct module *, int, void *); 75 static int semunload(void); 76 static void semexit_myhook(void *arg, struct proc *p); 77 static int sysctl_sema(SYSCTL_HANDLER_ARGS); 78 static int semvalid(int semid, struct semid_kernel *semakptr); 79 80 #ifndef _SYS_SYSPROTO_H_ 81 struct __semctl_args; 82 int __semctl(struct thread *td, struct __semctl_args *uap); 83 struct semget_args; 84 int semget(struct thread *td, struct semget_args *uap); 85 struct semop_args; 86 int semop(struct thread *td, struct semop_args *uap); 87 #endif 88 89 static struct sem_undo *semu_alloc(struct thread *td); 90 static int semundo_adjust(struct thread *td, struct sem_undo **supptr, 91 int semid, int semnum, int adjval); 92 static void semundo_clear(int semid, int semnum); 93 94 /* XXX casting to (sy_call_t *) is bogus, as usual. */ 95 static sy_call_t *semcalls[] = { 96 (sy_call_t *)__semctl, (sy_call_t *)semget, 97 (sy_call_t *)semop 98 }; 99 100 static struct mtx sem_mtx; /* semaphore global lock */ 101 static int semtot = 0; 102 static struct semid_kernel *sema; /* semaphore id pool */ 103 static struct mtx *sema_mtx; /* semaphore id pool mutexes*/ 104 static struct sem *sem; /* semaphore pool */ 105 SLIST_HEAD(, sem_undo) semu_list; /* list of active undo structures */ 106 static int *semu; /* undo structure pool */ 107 static eventhandler_tag semexit_tag; 108 109 #define SEMUNDO_MTX sem_mtx 110 #define SEMUNDO_LOCK() mtx_lock(&SEMUNDO_MTX); 111 #define SEMUNDO_UNLOCK() mtx_unlock(&SEMUNDO_MTX); 112 #define SEMUNDO_LOCKASSERT(how) mtx_assert(&SEMUNDO_MTX, (how)); 113 114 struct sem { 115 u_short semval; /* semaphore value */ 116 pid_t sempid; /* pid of last operation */ 117 u_short semncnt; /* # awaiting semval > cval */ 118 u_short semzcnt; /* # awaiting semval = 0 */ 119 }; 120 121 /* 122 * Undo structure (one per process) 123 */ 124 struct sem_undo { 125 SLIST_ENTRY(sem_undo) un_next; /* ptr to next active undo structure */ 126 struct proc *un_proc; /* owner of this structure */ 127 short un_cnt; /* # of active entries */ 128 struct undo { 129 short un_adjval; /* adjust on exit values */ 130 short un_num; /* semaphore # */ 131 int un_id; /* semid */ 132 } un_ent[1]; /* undo entries */ 133 }; 134 135 /* 136 * Configuration parameters 137 */ 138 #ifndef SEMMNI 139 #define SEMMNI 10 /* # of semaphore identifiers */ 140 #endif 141 #ifndef SEMMNS 142 #define SEMMNS 60 /* # of semaphores in system */ 143 #endif 144 #ifndef SEMUME 145 #define SEMUME 10 /* max # of undo entries per process */ 146 #endif 147 #ifndef SEMMNU 148 #define SEMMNU 30 /* # of undo structures in system */ 149 #endif 150 151 /* shouldn't need tuning */ 152 #ifndef SEMMAP 153 #define SEMMAP 30 /* # of entries in semaphore map */ 154 #endif 155 #ifndef SEMMSL 156 #define SEMMSL SEMMNS /* max # of semaphores per id */ 157 #endif 158 #ifndef SEMOPM 159 #define SEMOPM 100 /* max # of operations per semop call */ 160 #endif 161 162 #define SEMVMX 32767 /* semaphore maximum value */ 163 #define SEMAEM 16384 /* adjust on exit max value */ 164 165 /* 166 * Due to the way semaphore memory is allocated, we have to ensure that 167 * SEMUSZ is properly aligned. 168 */ 169 170 #define SEM_ALIGN(bytes) (((bytes) + (sizeof(long) - 1)) & ~(sizeof(long) - 1)) 171 172 /* actual size of an undo structure */ 173 #define SEMUSZ SEM_ALIGN(offsetof(struct sem_undo, un_ent[SEMUME])) 174 175 /* 176 * Macro to find a particular sem_undo vector 177 */ 178 #define SEMU(ix) \ 179 ((struct sem_undo *)(((intptr_t)semu)+ix * seminfo.semusz)) 180 181 /* 182 * semaphore info struct 183 */ 184 struct seminfo seminfo = { 185 SEMMAP, /* # of entries in semaphore map */ 186 SEMMNI, /* # of semaphore identifiers */ 187 SEMMNS, /* # of semaphores in system */ 188 SEMMNU, /* # of undo structures in system */ 189 SEMMSL, /* max # of semaphores per id */ 190 SEMOPM, /* max # of operations per semop call */ 191 SEMUME, /* max # of undo entries per process */ 192 SEMUSZ, /* size in bytes of undo structure */ 193 SEMVMX, /* semaphore maximum value */ 194 SEMAEM /* adjust on exit max value */ 195 }; 196 197 SYSCTL_INT(_kern_ipc, OID_AUTO, semmap, CTLFLAG_RW, &seminfo.semmap, 0, 198 "Number of entries in the semaphore map"); 199 SYSCTL_INT(_kern_ipc, OID_AUTO, semmni, CTLFLAG_RDTUN, &seminfo.semmni, 0, 200 "Number of semaphore identifiers"); 201 SYSCTL_INT(_kern_ipc, OID_AUTO, semmns, CTLFLAG_RDTUN, &seminfo.semmns, 0, 202 "Maximum number of semaphores in the system"); 203 SYSCTL_INT(_kern_ipc, OID_AUTO, semmnu, CTLFLAG_RDTUN, &seminfo.semmnu, 0, 204 "Maximum number of undo structures in the system"); 205 SYSCTL_INT(_kern_ipc, OID_AUTO, semmsl, CTLFLAG_RW, &seminfo.semmsl, 0, 206 "Max semaphores per id"); 207 SYSCTL_INT(_kern_ipc, OID_AUTO, semopm, CTLFLAG_RDTUN, &seminfo.semopm, 0, 208 "Max operations per semop call"); 209 SYSCTL_INT(_kern_ipc, OID_AUTO, semume, CTLFLAG_RDTUN, &seminfo.semume, 0, 210 "Max undo entries per process"); 211 SYSCTL_INT(_kern_ipc, OID_AUTO, semusz, CTLFLAG_RDTUN, &seminfo.semusz, 0, 212 "Size in bytes of undo structure"); 213 SYSCTL_INT(_kern_ipc, OID_AUTO, semvmx, CTLFLAG_RW, &seminfo.semvmx, 0, 214 "Semaphore maximum value"); 215 SYSCTL_INT(_kern_ipc, OID_AUTO, semaem, CTLFLAG_RW, &seminfo.semaem, 0, 216 "Adjust on exit max value"); 217 SYSCTL_PROC(_kern_ipc, OID_AUTO, sema, CTLFLAG_RD, 218 NULL, 0, sysctl_sema, "", ""); 219 220 static void 221 seminit(void) 222 { 223 int i; 224 225 TUNABLE_INT_FETCH("kern.ipc.semmap", &seminfo.semmap); 226 TUNABLE_INT_FETCH("kern.ipc.semmni", &seminfo.semmni); 227 TUNABLE_INT_FETCH("kern.ipc.semmns", &seminfo.semmns); 228 TUNABLE_INT_FETCH("kern.ipc.semmnu", &seminfo.semmnu); 229 TUNABLE_INT_FETCH("kern.ipc.semmsl", &seminfo.semmsl); 230 TUNABLE_INT_FETCH("kern.ipc.semopm", &seminfo.semopm); 231 TUNABLE_INT_FETCH("kern.ipc.semume", &seminfo.semume); 232 TUNABLE_INT_FETCH("kern.ipc.semusz", &seminfo.semusz); 233 TUNABLE_INT_FETCH("kern.ipc.semvmx", &seminfo.semvmx); 234 TUNABLE_INT_FETCH("kern.ipc.semaem", &seminfo.semaem); 235 236 sem = malloc(sizeof(struct sem) * seminfo.semmns, M_SEM, M_WAITOK); 237 sema = malloc(sizeof(struct semid_kernel) * seminfo.semmni, M_SEM, 238 M_WAITOK); 239 sema_mtx = malloc(sizeof(struct mtx) * seminfo.semmni, M_SEM, 240 M_WAITOK | M_ZERO); 241 semu = malloc(seminfo.semmnu * seminfo.semusz, M_SEM, M_WAITOK); 242 243 for (i = 0; i < seminfo.semmni; i++) { 244 sema[i].u.sem_base = 0; 245 sema[i].u.sem_perm.mode = 0; 246 sema[i].u.sem_perm.seq = 0; 247 #ifdef MAC 248 mac_init_sysv_sem(&sema[i]); 249 #endif 250 } 251 for (i = 0; i < seminfo.semmni; i++) 252 mtx_init(&sema_mtx[i], "semid", NULL, MTX_DEF); 253 for (i = 0; i < seminfo.semmnu; i++) { 254 struct sem_undo *suptr = SEMU(i); 255 suptr->un_proc = NULL; 256 } 257 SLIST_INIT(&semu_list); 258 mtx_init(&sem_mtx, "sem", NULL, MTX_DEF); 259 semexit_tag = EVENTHANDLER_REGISTER(process_exit, semexit_myhook, NULL, 260 EVENTHANDLER_PRI_ANY); 261 } 262 263 static int 264 semunload(void) 265 { 266 int i; 267 268 if (semtot != 0) 269 return (EBUSY); 270 271 EVENTHANDLER_DEREGISTER(process_exit, semexit_tag); 272 #ifdef MAC 273 for (i = 0; i < seminfo.semmni; i++) 274 mac_destroy_sysv_sem(&sema[i]); 275 #endif 276 free(sem, M_SEM); 277 free(sema, M_SEM); 278 free(semu, M_SEM); 279 for (i = 0; i < seminfo.semmni; i++) 280 mtx_destroy(&sema_mtx[i]); 281 mtx_destroy(&sem_mtx); 282 return (0); 283 } 284 285 static int 286 sysvsem_modload(struct module *module, int cmd, void *arg) 287 { 288 int error = 0; 289 290 switch (cmd) { 291 case MOD_LOAD: 292 seminit(); 293 break; 294 case MOD_UNLOAD: 295 error = semunload(); 296 break; 297 case MOD_SHUTDOWN: 298 break; 299 default: 300 error = EINVAL; 301 break; 302 } 303 return (error); 304 } 305 306 static moduledata_t sysvsem_mod = { 307 "sysvsem", 308 &sysvsem_modload, 309 NULL 310 }; 311 312 SYSCALL_MODULE_HELPER(semsys); 313 SYSCALL_MODULE_HELPER(__semctl); 314 SYSCALL_MODULE_HELPER(semget); 315 SYSCALL_MODULE_HELPER(semop); 316 317 DECLARE_MODULE(sysvsem, sysvsem_mod, 318 SI_SUB_SYSV_SEM, SI_ORDER_FIRST); 319 MODULE_VERSION(sysvsem, 1); 320 321 /* 322 * Entry point for all SEM calls. 323 */ 324 int 325 semsys(td, uap) 326 struct thread *td; 327 /* XXX actually varargs. */ 328 struct semsys_args /* { 329 int which; 330 int a2; 331 int a3; 332 int a4; 333 int a5; 334 } */ *uap; 335 { 336 int error; 337 338 if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 339 return (ENOSYS); 340 if (uap->which < 0 || 341 uap->which >= sizeof(semcalls)/sizeof(semcalls[0])) 342 return (EINVAL); 343 error = (*semcalls[uap->which])(td, &uap->a2); 344 return (error); 345 } 346 347 /* 348 * Allocate a new sem_undo structure for a process 349 * (returns ptr to structure or NULL if no more room) 350 */ 351 352 static struct sem_undo * 353 semu_alloc(td) 354 struct thread *td; 355 { 356 int i; 357 struct sem_undo *suptr; 358 struct sem_undo **supptr; 359 int attempt; 360 361 SEMUNDO_LOCKASSERT(MA_OWNED); 362 /* 363 * Try twice to allocate something. 364 * (we'll purge an empty structure after the first pass so 365 * two passes are always enough) 366 */ 367 368 for (attempt = 0; attempt < 2; attempt++) { 369 /* 370 * Look for a free structure. 371 * Fill it in and return it if we find one. 372 */ 373 374 for (i = 0; i < seminfo.semmnu; i++) { 375 suptr = SEMU(i); 376 if (suptr->un_proc == NULL) { 377 SLIST_INSERT_HEAD(&semu_list, suptr, un_next); 378 suptr->un_cnt = 0; 379 suptr->un_proc = td->td_proc; 380 return(suptr); 381 } 382 } 383 384 /* 385 * We didn't find a free one, if this is the first attempt 386 * then try to free a structure. 387 */ 388 389 if (attempt == 0) { 390 /* All the structures are in use - try to free one */ 391 int did_something = 0; 392 393 SLIST_FOREACH_PREVPTR(suptr, supptr, &semu_list, 394 un_next) { 395 if (suptr->un_cnt == 0) { 396 suptr->un_proc = NULL; 397 did_something = 1; 398 *supptr = SLIST_NEXT(suptr, un_next); 399 break; 400 } 401 } 402 403 /* If we didn't free anything then just give-up */ 404 if (!did_something) 405 return(NULL); 406 } else { 407 /* 408 * The second pass failed even though we freed 409 * something after the first pass! 410 * This is IMPOSSIBLE! 411 */ 412 panic("semu_alloc - second attempt failed"); 413 } 414 } 415 return (NULL); 416 } 417 418 /* 419 * Adjust a particular entry for a particular proc 420 */ 421 422 static int 423 semundo_adjust(td, supptr, semid, semnum, adjval) 424 struct thread *td; 425 struct sem_undo **supptr; 426 int semid, semnum; 427 int adjval; 428 { 429 struct proc *p = td->td_proc; 430 struct sem_undo *suptr; 431 struct undo *sunptr; 432 int i; 433 434 SEMUNDO_LOCKASSERT(MA_OWNED); 435 /* Look for and remember the sem_undo if the caller doesn't provide 436 it */ 437 438 suptr = *supptr; 439 if (suptr == NULL) { 440 SLIST_FOREACH(suptr, &semu_list, un_next) { 441 if (suptr->un_proc == p) { 442 *supptr = suptr; 443 break; 444 } 445 } 446 if (suptr == NULL) { 447 if (adjval == 0) 448 return(0); 449 suptr = semu_alloc(td); 450 if (suptr == NULL) 451 return(ENOSPC); 452 *supptr = suptr; 453 } 454 } 455 456 /* 457 * Look for the requested entry and adjust it (delete if adjval becomes 458 * 0). 459 */ 460 sunptr = &suptr->un_ent[0]; 461 for (i = 0; i < suptr->un_cnt; i++, sunptr++) { 462 if (sunptr->un_id != semid || sunptr->un_num != semnum) 463 continue; 464 if (adjval != 0) { 465 adjval += sunptr->un_adjval; 466 if (adjval > seminfo.semaem || adjval < -seminfo.semaem) 467 return (ERANGE); 468 } 469 sunptr->un_adjval = adjval; 470 if (sunptr->un_adjval == 0) { 471 suptr->un_cnt--; 472 if (i < suptr->un_cnt) 473 suptr->un_ent[i] = 474 suptr->un_ent[suptr->un_cnt]; 475 } 476 return(0); 477 } 478 479 /* Didn't find the right entry - create it */ 480 if (adjval == 0) 481 return(0); 482 if (adjval > seminfo.semaem || adjval < -seminfo.semaem) 483 return (ERANGE); 484 if (suptr->un_cnt != seminfo.semume) { 485 sunptr = &suptr->un_ent[suptr->un_cnt]; 486 suptr->un_cnt++; 487 sunptr->un_adjval = adjval; 488 sunptr->un_id = semid; sunptr->un_num = semnum; 489 } else 490 return(EINVAL); 491 return(0); 492 } 493 494 static void 495 semundo_clear(semid, semnum) 496 int semid, semnum; 497 { 498 struct sem_undo *suptr; 499 500 SEMUNDO_LOCKASSERT(MA_OWNED); 501 SLIST_FOREACH(suptr, &semu_list, un_next) { 502 struct undo *sunptr = &suptr->un_ent[0]; 503 int i = 0; 504 505 while (i < suptr->un_cnt) { 506 if (sunptr->un_id == semid) { 507 if (semnum == -1 || sunptr->un_num == semnum) { 508 suptr->un_cnt--; 509 if (i < suptr->un_cnt) { 510 suptr->un_ent[i] = 511 suptr->un_ent[suptr->un_cnt]; 512 continue; 513 } 514 } 515 if (semnum != -1) 516 break; 517 } 518 i++, sunptr++; 519 } 520 } 521 } 522 523 static int 524 semvalid(semid, semakptr) 525 int semid; 526 struct semid_kernel *semakptr; 527 { 528 529 return ((semakptr->u.sem_perm.mode & SEM_ALLOC) == 0 || 530 semakptr->u.sem_perm.seq != IPCID_TO_SEQ(semid) ? EINVAL : 0); 531 } 532 533 /* 534 * Note that the user-mode half of this passes a union, not a pointer. 535 */ 536 #ifndef _SYS_SYSPROTO_H_ 537 struct __semctl_args { 538 int semid; 539 int semnum; 540 int cmd; 541 union semun *arg; 542 }; 543 #endif 544 int 545 __semctl(td, uap) 546 struct thread *td; 547 struct __semctl_args *uap; 548 { 549 struct semid_ds dsbuf; 550 union semun arg, semun; 551 register_t rval; 552 int error; 553 554 switch (uap->cmd) { 555 case SEM_STAT: 556 case IPC_SET: 557 case IPC_STAT: 558 case GETALL: 559 case SETVAL: 560 case SETALL: 561 error = copyin(uap->arg, &arg, sizeof(arg)); 562 if (error) 563 return (error); 564 break; 565 } 566 567 switch (uap->cmd) { 568 case SEM_STAT: 569 case IPC_STAT: 570 semun.buf = &dsbuf; 571 break; 572 case IPC_SET: 573 error = copyin(arg.buf, &dsbuf, sizeof(dsbuf)); 574 if (error) 575 return (error); 576 semun.buf = &dsbuf; 577 break; 578 case GETALL: 579 case SETALL: 580 semun.array = arg.array; 581 break; 582 case SETVAL: 583 semun.val = arg.val; 584 break; 585 } 586 587 error = kern_semctl(td, uap->semid, uap->semnum, uap->cmd, &semun, 588 &rval); 589 if (error) 590 return (error); 591 592 switch (uap->cmd) { 593 case SEM_STAT: 594 case IPC_STAT: 595 error = copyout(&dsbuf, arg.buf, sizeof(dsbuf)); 596 break; 597 } 598 599 if (error == 0) 600 td->td_retval[0] = rval; 601 return (error); 602 } 603 604 int 605 kern_semctl(struct thread *td, int semid, int semnum, int cmd, 606 union semun *arg, register_t *rval) 607 { 608 u_short *array; 609 struct ucred *cred = td->td_ucred; 610 int i, error; 611 struct semid_ds *sbuf; 612 struct semid_kernel *semakptr; 613 struct mtx *sema_mtxp; 614 u_short usval, count; 615 int semidx; 616 617 DPRINTF(("call to semctl(%d, %d, %d, 0x%p)\n", 618 semid, semnum, cmd, arg)); 619 if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 620 return (ENOSYS); 621 622 array = NULL; 623 624 switch(cmd) { 625 case SEM_STAT: 626 /* 627 * For this command we assume semid is an array index 628 * rather than an IPC id. 629 */ 630 if (semid < 0 || semid >= seminfo.semmni) 631 return (EINVAL); 632 semakptr = &sema[semid]; 633 sema_mtxp = &sema_mtx[semid]; 634 mtx_lock(sema_mtxp); 635 if ((semakptr->u.sem_perm.mode & SEM_ALLOC) == 0) { 636 error = EINVAL; 637 goto done2; 638 } 639 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_R))) 640 goto done2; 641 #ifdef MAC 642 error = mac_check_sysv_semctl(cred, semakptr, cmd); 643 if (error != 0) 644 goto done2; 645 #endif 646 bcopy(&semakptr->u, arg->buf, sizeof(struct semid_ds)); 647 *rval = IXSEQ_TO_IPCID(semid, semakptr->u.sem_perm); 648 mtx_unlock(sema_mtxp); 649 return (0); 650 } 651 652 semidx = IPCID_TO_IX(semid); 653 if (semidx < 0 || semidx >= seminfo.semmni) 654 return (EINVAL); 655 656 semakptr = &sema[semidx]; 657 sema_mtxp = &sema_mtx[semidx]; 658 mtx_lock(sema_mtxp); 659 #ifdef MAC 660 error = mac_check_sysv_semctl(cred, semakptr, cmd); 661 if (error != 0) 662 goto done2; 663 #endif 664 665 error = 0; 666 *rval = 0; 667 668 switch (cmd) { 669 case IPC_RMID: 670 if ((error = semvalid(semid, semakptr)) != 0) 671 goto done2; 672 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_M))) 673 goto done2; 674 semakptr->u.sem_perm.cuid = cred->cr_uid; 675 semakptr->u.sem_perm.uid = cred->cr_uid; 676 semtot -= semakptr->u.sem_nsems; 677 for (i = semakptr->u.sem_base - sem; i < semtot; i++) 678 sem[i] = sem[i + semakptr->u.sem_nsems]; 679 for (i = 0; i < seminfo.semmni; i++) { 680 if ((sema[i].u.sem_perm.mode & SEM_ALLOC) && 681 sema[i].u.sem_base > semakptr->u.sem_base) 682 sema[i].u.sem_base -= semakptr->u.sem_nsems; 683 } 684 semakptr->u.sem_perm.mode = 0; 685 #ifdef MAC 686 mac_cleanup_sysv_sem(semakptr); 687 #endif 688 SEMUNDO_LOCK(); 689 semundo_clear(semidx, -1); 690 SEMUNDO_UNLOCK(); 691 wakeup(semakptr); 692 break; 693 694 case IPC_SET: 695 if ((error = semvalid(semid, semakptr)) != 0) 696 goto done2; 697 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_M))) 698 goto done2; 699 sbuf = arg->buf; 700 semakptr->u.sem_perm.uid = sbuf->sem_perm.uid; 701 semakptr->u.sem_perm.gid = sbuf->sem_perm.gid; 702 semakptr->u.sem_perm.mode = (semakptr->u.sem_perm.mode & 703 ~0777) | (sbuf->sem_perm.mode & 0777); 704 semakptr->u.sem_ctime = time_second; 705 break; 706 707 case IPC_STAT: 708 if ((error = semvalid(semid, semakptr)) != 0) 709 goto done2; 710 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_R))) 711 goto done2; 712 bcopy(&semakptr->u, arg->buf, sizeof(struct semid_ds)); 713 break; 714 715 case GETNCNT: 716 if ((error = semvalid(semid, semakptr)) != 0) 717 goto done2; 718 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_R))) 719 goto done2; 720 if (semnum < 0 || semnum >= semakptr->u.sem_nsems) { 721 error = EINVAL; 722 goto done2; 723 } 724 *rval = semakptr->u.sem_base[semnum].semncnt; 725 break; 726 727 case GETPID: 728 if ((error = semvalid(semid, semakptr)) != 0) 729 goto done2; 730 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_R))) 731 goto done2; 732 if (semnum < 0 || semnum >= semakptr->u.sem_nsems) { 733 error = EINVAL; 734 goto done2; 735 } 736 *rval = semakptr->u.sem_base[semnum].sempid; 737 break; 738 739 case GETVAL: 740 if ((error = semvalid(semid, semakptr)) != 0) 741 goto done2; 742 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_R))) 743 goto done2; 744 if (semnum < 0 || semnum >= semakptr->u.sem_nsems) { 745 error = EINVAL; 746 goto done2; 747 } 748 *rval = semakptr->u.sem_base[semnum].semval; 749 break; 750 751 case GETALL: 752 /* 753 * Unfortunately, callers of this function don't know 754 * in advance how many semaphores are in this set. 755 * While we could just allocate the maximum size array 756 * and pass the actual size back to the caller, that 757 * won't work for SETALL since we can't copyin() more 758 * data than the user specified as we may return a 759 * spurious EFAULT. 760 * 761 * Note that the number of semaphores in a set is 762 * fixed for the life of that set. The only way that 763 * the 'count' could change while are blocked in 764 * malloc() is if this semaphore set were destroyed 765 * and a new one created with the same index. 766 * However, semvalid() will catch that due to the 767 * sequence number unless exactly 0x8000 (or a 768 * multiple thereof) semaphore sets for the same index 769 * are created and destroyed while we are in malloc! 770 * 771 */ 772 count = semakptr->u.sem_nsems; 773 mtx_unlock(sema_mtxp); 774 array = malloc(sizeof(*array) * count, M_TEMP, M_WAITOK); 775 mtx_lock(sema_mtxp); 776 if ((error = semvalid(semid, semakptr)) != 0) 777 goto done2; 778 KASSERT(count == semakptr->u.sem_nsems, ("nsems changed")); 779 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_R))) 780 goto done2; 781 for (i = 0; i < semakptr->u.sem_nsems; i++) 782 array[i] = semakptr->u.sem_base[i].semval; 783 mtx_unlock(sema_mtxp); 784 error = copyout(array, arg->array, count * sizeof(*array)); 785 mtx_lock(sema_mtxp); 786 break; 787 788 case GETZCNT: 789 if ((error = semvalid(semid, semakptr)) != 0) 790 goto done2; 791 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_R))) 792 goto done2; 793 if (semnum < 0 || semnum >= semakptr->u.sem_nsems) { 794 error = EINVAL; 795 goto done2; 796 } 797 *rval = semakptr->u.sem_base[semnum].semzcnt; 798 break; 799 800 case SETVAL: 801 if ((error = semvalid(semid, semakptr)) != 0) 802 goto done2; 803 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_W))) 804 goto done2; 805 if (semnum < 0 || semnum >= semakptr->u.sem_nsems) { 806 error = EINVAL; 807 goto done2; 808 } 809 if (arg->val < 0 || arg->val > seminfo.semvmx) { 810 error = ERANGE; 811 goto done2; 812 } 813 semakptr->u.sem_base[semnum].semval = arg->val; 814 SEMUNDO_LOCK(); 815 semundo_clear(semidx, semnum); 816 SEMUNDO_UNLOCK(); 817 wakeup(semakptr); 818 break; 819 820 case SETALL: 821 /* 822 * See comment on GETALL for why 'count' shouldn't change 823 * and why we require a userland buffer. 824 */ 825 count = semakptr->u.sem_nsems; 826 mtx_unlock(sema_mtxp); 827 array = malloc(sizeof(*array) * count, M_TEMP, M_WAITOK); 828 error = copyin(arg->array, array, count * sizeof(*array)); 829 if (error) 830 break; 831 mtx_lock(sema_mtxp); 832 if ((error = semvalid(semid, semakptr)) != 0) 833 goto done2; 834 KASSERT(count == semakptr->u.sem_nsems, ("nsems changed")); 835 if ((error = ipcperm(td, &semakptr->u.sem_perm, IPC_W))) 836 goto done2; 837 for (i = 0; i < semakptr->u.sem_nsems; i++) { 838 usval = array[i]; 839 if (usval > seminfo.semvmx) { 840 error = ERANGE; 841 break; 842 } 843 semakptr->u.sem_base[i].semval = usval; 844 } 845 SEMUNDO_LOCK(); 846 semundo_clear(semidx, -1); 847 SEMUNDO_UNLOCK(); 848 wakeup(semakptr); 849 break; 850 851 default: 852 error = EINVAL; 853 break; 854 } 855 856 done2: 857 mtx_unlock(sema_mtxp); 858 if (array != NULL) 859 free(array, M_TEMP); 860 return(error); 861 } 862 863 #ifndef _SYS_SYSPROTO_H_ 864 struct semget_args { 865 key_t key; 866 int nsems; 867 int semflg; 868 }; 869 #endif 870 int 871 semget(td, uap) 872 struct thread *td; 873 struct semget_args *uap; 874 { 875 int semid, error = 0; 876 int key = uap->key; 877 int nsems = uap->nsems; 878 int semflg = uap->semflg; 879 struct ucred *cred = td->td_ucred; 880 881 DPRINTF(("semget(0x%x, %d, 0%o)\n", key, nsems, semflg)); 882 if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 883 return (ENOSYS); 884 885 mtx_lock(&Giant); 886 if (key != IPC_PRIVATE) { 887 for (semid = 0; semid < seminfo.semmni; semid++) { 888 if ((sema[semid].u.sem_perm.mode & SEM_ALLOC) && 889 sema[semid].u.sem_perm.key == key) 890 break; 891 } 892 if (semid < seminfo.semmni) { 893 DPRINTF(("found public key\n")); 894 if ((error = ipcperm(td, &sema[semid].u.sem_perm, 895 semflg & 0700))) { 896 goto done2; 897 } 898 if (nsems > 0 && sema[semid].u.sem_nsems < nsems) { 899 DPRINTF(("too small\n")); 900 error = EINVAL; 901 goto done2; 902 } 903 if ((semflg & IPC_CREAT) && (semflg & IPC_EXCL)) { 904 DPRINTF(("not exclusive\n")); 905 error = EEXIST; 906 goto done2; 907 } 908 #ifdef MAC 909 error = mac_check_sysv_semget(cred, &sema[semid]); 910 if (error != 0) 911 goto done2; 912 #endif 913 goto found; 914 } 915 } 916 917 DPRINTF(("need to allocate the semid_kernel\n")); 918 if (key == IPC_PRIVATE || (semflg & IPC_CREAT)) { 919 if (nsems <= 0 || nsems > seminfo.semmsl) { 920 DPRINTF(("nsems out of range (0<%d<=%d)\n", nsems, 921 seminfo.semmsl)); 922 error = EINVAL; 923 goto done2; 924 } 925 if (nsems > seminfo.semmns - semtot) { 926 DPRINTF(( 927 "not enough semaphores left (need %d, got %d)\n", 928 nsems, seminfo.semmns - semtot)); 929 error = ENOSPC; 930 goto done2; 931 } 932 for (semid = 0; semid < seminfo.semmni; semid++) { 933 if ((sema[semid].u.sem_perm.mode & SEM_ALLOC) == 0) 934 break; 935 } 936 if (semid == seminfo.semmni) { 937 DPRINTF(("no more semid_kernel's available\n")); 938 error = ENOSPC; 939 goto done2; 940 } 941 DPRINTF(("semid %d is available\n", semid)); 942 sema[semid].u.sem_perm.key = key; 943 sema[semid].u.sem_perm.cuid = cred->cr_uid; 944 sema[semid].u.sem_perm.uid = cred->cr_uid; 945 sema[semid].u.sem_perm.cgid = cred->cr_gid; 946 sema[semid].u.sem_perm.gid = cred->cr_gid; 947 sema[semid].u.sem_perm.mode = (semflg & 0777) | SEM_ALLOC; 948 sema[semid].u.sem_perm.seq = 949 (sema[semid].u.sem_perm.seq + 1) & 0x7fff; 950 sema[semid].u.sem_nsems = nsems; 951 sema[semid].u.sem_otime = 0; 952 sema[semid].u.sem_ctime = time_second; 953 sema[semid].u.sem_base = &sem[semtot]; 954 semtot += nsems; 955 bzero(sema[semid].u.sem_base, 956 sizeof(sema[semid].u.sem_base[0])*nsems); 957 #ifdef MAC 958 mac_create_sysv_sem(cred, &sema[semid]); 959 #endif 960 DPRINTF(("sembase = %p, next = %p\n", 961 sema[semid].u.sem_base, &sem[semtot])); 962 } else { 963 DPRINTF(("didn't find it and wasn't asked to create it\n")); 964 error = ENOENT; 965 goto done2; 966 } 967 968 found: 969 td->td_retval[0] = IXSEQ_TO_IPCID(semid, sema[semid].u.sem_perm); 970 done2: 971 mtx_unlock(&Giant); 972 return (error); 973 } 974 975 #ifndef _SYS_SYSPROTO_H_ 976 struct semop_args { 977 int semid; 978 struct sembuf *sops; 979 size_t nsops; 980 }; 981 #endif 982 int 983 semop(td, uap) 984 struct thread *td; 985 struct semop_args *uap; 986 { 987 #define SMALL_SOPS 8 988 struct sembuf small_sops[SMALL_SOPS]; 989 int semid = uap->semid; 990 size_t nsops = uap->nsops; 991 struct sembuf *sops; 992 struct semid_kernel *semakptr; 993 struct sembuf *sopptr = 0; 994 struct sem *semptr = 0; 995 struct sem_undo *suptr; 996 struct mtx *sema_mtxp; 997 size_t i, j, k; 998 int error; 999 int do_wakeup, do_undos; 1000 1001 #ifdef SEM_DEBUG 1002 sops = NULL; 1003 #endif 1004 DPRINTF(("call to semop(%d, %p, %u)\n", semid, sops, nsops)); 1005 1006 if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 1007 return (ENOSYS); 1008 1009 semid = IPCID_TO_IX(semid); /* Convert back to zero origin */ 1010 1011 if (semid < 0 || semid >= seminfo.semmni) 1012 return (EINVAL); 1013 1014 /* Allocate memory for sem_ops */ 1015 if (nsops <= SMALL_SOPS) 1016 sops = small_sops; 1017 else if (nsops <= seminfo.semopm) 1018 sops = malloc(nsops * sizeof(*sops), M_TEMP, M_WAITOK); 1019 else { 1020 DPRINTF(("too many sops (max=%d, nsops=%d)\n", seminfo.semopm, 1021 nsops)); 1022 return (E2BIG); 1023 } 1024 if ((error = copyin(uap->sops, sops, nsops * sizeof(sops[0]))) != 0) { 1025 DPRINTF(("error = %d from copyin(%p, %p, %d)\n", error, 1026 uap->sops, sops, nsops * sizeof(sops[0]))); 1027 if (sops != small_sops) 1028 free(sops, M_SEM); 1029 return (error); 1030 } 1031 1032 semakptr = &sema[semid]; 1033 sema_mtxp = &sema_mtx[semid]; 1034 mtx_lock(sema_mtxp); 1035 if ((semakptr->u.sem_perm.mode & SEM_ALLOC) == 0) { 1036 error = EINVAL; 1037 goto done2; 1038 } 1039 if (semakptr->u.sem_perm.seq != IPCID_TO_SEQ(uap->semid)) { 1040 error = EINVAL; 1041 goto done2; 1042 } 1043 /* 1044 * Initial pass thru sops to see what permissions are needed. 1045 * Also perform any checks that don't need repeating on each 1046 * attempt to satisfy the request vector. 1047 */ 1048 j = 0; /* permission needed */ 1049 do_undos = 0; 1050 for (i = 0; i < nsops; i++) { 1051 sopptr = &sops[i]; 1052 if (sopptr->sem_num >= semakptr->u.sem_nsems) { 1053 error = EFBIG; 1054 goto done2; 1055 } 1056 if (sopptr->sem_flg & SEM_UNDO && sopptr->sem_op != 0) 1057 do_undos = 1; 1058 j |= (sopptr->sem_op == 0) ? SEM_R : SEM_A; 1059 } 1060 1061 if ((error = ipcperm(td, &semakptr->u.sem_perm, j))) { 1062 DPRINTF(("error = %d from ipaccess\n", error)); 1063 goto done2; 1064 } 1065 #ifdef MAC 1066 error = mac_check_sysv_semop(td->td_ucred, semakptr, j); 1067 if (error != 0) 1068 goto done2; 1069 #endif 1070 1071 /* 1072 * Loop trying to satisfy the vector of requests. 1073 * If we reach a point where we must wait, any requests already 1074 * performed are rolled back and we go to sleep until some other 1075 * process wakes us up. At this point, we start all over again. 1076 * 1077 * This ensures that from the perspective of other tasks, a set 1078 * of requests is atomic (never partially satisfied). 1079 */ 1080 for (;;) { 1081 do_wakeup = 0; 1082 error = 0; /* error return if necessary */ 1083 1084 for (i = 0; i < nsops; i++) { 1085 sopptr = &sops[i]; 1086 semptr = &semakptr->u.sem_base[sopptr->sem_num]; 1087 1088 DPRINTF(( 1089 "semop: semakptr=%p, sem_base=%p, " 1090 "semptr=%p, sem[%d]=%d : op=%d, flag=%s\n", 1091 semakptr, semakptr->u.sem_base, semptr, 1092 sopptr->sem_num, semptr->semval, sopptr->sem_op, 1093 (sopptr->sem_flg & IPC_NOWAIT) ? 1094 "nowait" : "wait")); 1095 1096 if (sopptr->sem_op < 0) { 1097 if (semptr->semval + sopptr->sem_op < 0) { 1098 DPRINTF(("semop: can't do it now\n")); 1099 break; 1100 } else { 1101 semptr->semval += sopptr->sem_op; 1102 if (semptr->semval == 0 && 1103 semptr->semzcnt > 0) 1104 do_wakeup = 1; 1105 } 1106 } else if (sopptr->sem_op == 0) { 1107 if (semptr->semval != 0) { 1108 DPRINTF(("semop: not zero now\n")); 1109 break; 1110 } 1111 } else if (semptr->semval + sopptr->sem_op > 1112 seminfo.semvmx) { 1113 error = ERANGE; 1114 break; 1115 } else { 1116 if (semptr->semncnt > 0) 1117 do_wakeup = 1; 1118 semptr->semval += sopptr->sem_op; 1119 } 1120 } 1121 1122 /* 1123 * Did we get through the entire vector? 1124 */ 1125 if (i >= nsops) 1126 goto done; 1127 1128 /* 1129 * No ... rollback anything that we've already done 1130 */ 1131 DPRINTF(("semop: rollback 0 through %d\n", i-1)); 1132 for (j = 0; j < i; j++) 1133 semakptr->u.sem_base[sops[j].sem_num].semval -= 1134 sops[j].sem_op; 1135 1136 /* If we detected an error, return it */ 1137 if (error != 0) 1138 goto done2; 1139 1140 /* 1141 * If the request that we couldn't satisfy has the 1142 * NOWAIT flag set then return with EAGAIN. 1143 */ 1144 if (sopptr->sem_flg & IPC_NOWAIT) { 1145 error = EAGAIN; 1146 goto done2; 1147 } 1148 1149 if (sopptr->sem_op == 0) 1150 semptr->semzcnt++; 1151 else 1152 semptr->semncnt++; 1153 1154 DPRINTF(("semop: good night!\n")); 1155 error = msleep(semakptr, sema_mtxp, (PZERO - 4) | PCATCH, 1156 "semwait", 0); 1157 DPRINTF(("semop: good morning (error=%d)!\n", error)); 1158 /* return code is checked below, after sem[nz]cnt-- */ 1159 1160 /* 1161 * Make sure that the semaphore still exists 1162 */ 1163 if ((semakptr->u.sem_perm.mode & SEM_ALLOC) == 0 || 1164 semakptr->u.sem_perm.seq != IPCID_TO_SEQ(uap->semid)) { 1165 error = EIDRM; 1166 goto done2; 1167 } 1168 1169 /* 1170 * The semaphore is still alive. Readjust the count of 1171 * waiting processes. 1172 */ 1173 if (sopptr->sem_op == 0) 1174 semptr->semzcnt--; 1175 else 1176 semptr->semncnt--; 1177 1178 /* 1179 * Is it really morning, or was our sleep interrupted? 1180 * (Delayed check of msleep() return code because we 1181 * need to decrement sem[nz]cnt either way.) 1182 */ 1183 if (error != 0) { 1184 error = EINTR; 1185 goto done2; 1186 } 1187 DPRINTF(("semop: good morning!\n")); 1188 } 1189 1190 done: 1191 /* 1192 * Process any SEM_UNDO requests. 1193 */ 1194 if (do_undos) { 1195 SEMUNDO_LOCK(); 1196 suptr = NULL; 1197 for (i = 0; i < nsops; i++) { 1198 /* 1199 * We only need to deal with SEM_UNDO's for non-zero 1200 * op's. 1201 */ 1202 int adjval; 1203 1204 if ((sops[i].sem_flg & SEM_UNDO) == 0) 1205 continue; 1206 adjval = sops[i].sem_op; 1207 if (adjval == 0) 1208 continue; 1209 error = semundo_adjust(td, &suptr, semid, 1210 sops[i].sem_num, -adjval); 1211 if (error == 0) 1212 continue; 1213 1214 /* 1215 * Oh-Oh! We ran out of either sem_undo's or undo's. 1216 * Rollback the adjustments to this point and then 1217 * rollback the semaphore ups and down so we can return 1218 * with an error with all structures restored. We 1219 * rollback the undo's in the exact reverse order that 1220 * we applied them. This guarantees that we won't run 1221 * out of space as we roll things back out. 1222 */ 1223 for (j = 0; j < i; j++) { 1224 k = i - j - 1; 1225 if ((sops[k].sem_flg & SEM_UNDO) == 0) 1226 continue; 1227 adjval = sops[k].sem_op; 1228 if (adjval == 0) 1229 continue; 1230 if (semundo_adjust(td, &suptr, semid, 1231 sops[k].sem_num, adjval) != 0) 1232 panic("semop - can't undo undos"); 1233 } 1234 1235 for (j = 0; j < nsops; j++) 1236 semakptr->u.sem_base[sops[j].sem_num].semval -= 1237 sops[j].sem_op; 1238 1239 DPRINTF(("error = %d from semundo_adjust\n", error)); 1240 SEMUNDO_UNLOCK(); 1241 goto done2; 1242 } /* loop through the sops */ 1243 SEMUNDO_UNLOCK(); 1244 } /* if (do_undos) */ 1245 1246 /* We're definitely done - set the sempid's and time */ 1247 for (i = 0; i < nsops; i++) { 1248 sopptr = &sops[i]; 1249 semptr = &semakptr->u.sem_base[sopptr->sem_num]; 1250 semptr->sempid = td->td_proc->p_pid; 1251 } 1252 semakptr->u.sem_otime = time_second; 1253 1254 /* 1255 * Do a wakeup if any semaphore was up'd whilst something was 1256 * sleeping on it. 1257 */ 1258 if (do_wakeup) { 1259 DPRINTF(("semop: doing wakeup\n")); 1260 wakeup(semakptr); 1261 DPRINTF(("semop: back from wakeup\n")); 1262 } 1263 DPRINTF(("semop: done\n")); 1264 td->td_retval[0] = 0; 1265 done2: 1266 mtx_unlock(sema_mtxp); 1267 if (sops != small_sops) 1268 free(sops, M_SEM); 1269 return (error); 1270 } 1271 1272 /* 1273 * Go through the undo structures for this process and apply the adjustments to 1274 * semaphores. 1275 */ 1276 static void 1277 semexit_myhook(arg, p) 1278 void *arg; 1279 struct proc *p; 1280 { 1281 struct sem_undo *suptr; 1282 struct sem_undo **supptr; 1283 1284 /* 1285 * Go through the chain of undo vectors looking for one 1286 * associated with this process. 1287 */ 1288 SEMUNDO_LOCK(); 1289 SLIST_FOREACH_PREVPTR(suptr, supptr, &semu_list, un_next) { 1290 if (suptr->un_proc == p) { 1291 *supptr = SLIST_NEXT(suptr, un_next); 1292 break; 1293 } 1294 } 1295 SEMUNDO_UNLOCK(); 1296 1297 if (suptr == NULL) 1298 return; 1299 1300 DPRINTF(("proc @%p has undo structure with %d entries\n", p, 1301 suptr->un_cnt)); 1302 1303 /* 1304 * If there are any active undo elements then process them. 1305 */ 1306 if (suptr->un_cnt > 0) { 1307 int ix; 1308 1309 for (ix = 0; ix < suptr->un_cnt; ix++) { 1310 int semid = suptr->un_ent[ix].un_id; 1311 int semnum = suptr->un_ent[ix].un_num; 1312 int adjval = suptr->un_ent[ix].un_adjval; 1313 struct semid_kernel *semakptr; 1314 struct mtx *sema_mtxp; 1315 1316 semakptr = &sema[semid]; 1317 sema_mtxp = &sema_mtx[semid]; 1318 mtx_lock(sema_mtxp); 1319 SEMUNDO_LOCK(); 1320 if ((semakptr->u.sem_perm.mode & SEM_ALLOC) == 0) 1321 panic("semexit - semid not allocated"); 1322 if (semnum >= semakptr->u.sem_nsems) 1323 panic("semexit - semnum out of range"); 1324 1325 DPRINTF(( 1326 "semexit: %p id=%d num=%d(adj=%d) ; sem=%d\n", 1327 suptr->un_proc, suptr->un_ent[ix].un_id, 1328 suptr->un_ent[ix].un_num, 1329 suptr->un_ent[ix].un_adjval, 1330 semakptr->u.sem_base[semnum].semval)); 1331 1332 if (adjval < 0) { 1333 if (semakptr->u.sem_base[semnum].semval < 1334 -adjval) 1335 semakptr->u.sem_base[semnum].semval = 0; 1336 else 1337 semakptr->u.sem_base[semnum].semval += 1338 adjval; 1339 } else 1340 semakptr->u.sem_base[semnum].semval += adjval; 1341 1342 wakeup(semakptr); 1343 DPRINTF(("semexit: back from wakeup\n")); 1344 mtx_unlock(sema_mtxp); 1345 SEMUNDO_UNLOCK(); 1346 } 1347 } 1348 1349 /* 1350 * Deallocate the undo vector. 1351 */ 1352 DPRINTF(("removing vector\n")); 1353 SEMUNDO_LOCK(); 1354 suptr->un_proc = NULL; 1355 SEMUNDO_UNLOCK(); 1356 } 1357 1358 static int 1359 sysctl_sema(SYSCTL_HANDLER_ARGS) 1360 { 1361 1362 return (SYSCTL_OUT(req, sema, 1363 sizeof(struct semid_kernel) * seminfo.semmni)); 1364 } 1365