13d903220SDoug Rabson /* $NetBSD: sysv_shm.c,v 1.23 1994/07/04 23:25:12 glass Exp $ */ 29454b2d8SWarner Losh /*- 33d903220SDoug Rabson * Copyright (c) 1994 Adam Glass and Charles Hannum. All rights reserved. 43d903220SDoug Rabson * 53d903220SDoug Rabson * Redistribution and use in source and binary forms, with or without 63d903220SDoug Rabson * modification, are permitted provided that the following conditions 73d903220SDoug Rabson * are met: 83d903220SDoug Rabson * 1. Redistributions of source code must retain the above copyright 93d903220SDoug Rabson * notice, this list of conditions and the following disclaimer. 103d903220SDoug Rabson * 2. Redistributions in binary form must reproduce the above copyright 113d903220SDoug Rabson * notice, this list of conditions and the following disclaimer in the 123d903220SDoug Rabson * documentation and/or other materials provided with the distribution. 133d903220SDoug Rabson * 3. All advertising materials mentioning features or use of this software 143d903220SDoug Rabson * must display the following acknowledgement: 153d903220SDoug Rabson * This product includes software developed by Adam Glass and Charles 163d903220SDoug Rabson * Hannum. 173d903220SDoug Rabson * 4. The names of the authors may not be used to endorse or promote products 183d903220SDoug Rabson * derived from this software without specific prior written permission. 193d903220SDoug Rabson * 203d903220SDoug Rabson * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 213d903220SDoug Rabson * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 223d903220SDoug Rabson * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 233d903220SDoug Rabson * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, 243d903220SDoug Rabson * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 253d903220SDoug Rabson * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 263d903220SDoug Rabson * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 273d903220SDoug Rabson * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 283d903220SDoug Rabson * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 293d903220SDoug Rabson * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 303d903220SDoug Rabson */ 3114cedfc8SRobert Watson /*- 3214cedfc8SRobert Watson * Copyright (c) 2003-2005 McAfee, Inc. 3314cedfc8SRobert Watson * All rights reserved. 3414cedfc8SRobert Watson * 3514cedfc8SRobert Watson * This software was developed for the FreeBSD Project in part by McAfee 3614cedfc8SRobert Watson * Research, the Security Research Division of McAfee, Inc under DARPA/SPAWAR 3714cedfc8SRobert Watson * contract N66001-01-C-8035 ("CBOSS"), as part of the DARPA CHATS research 3814cedfc8SRobert Watson * program. 3914cedfc8SRobert Watson * 4014cedfc8SRobert Watson * Redistribution and use in source and binary forms, with or without 4114cedfc8SRobert Watson * modification, are permitted provided that the following conditions 4214cedfc8SRobert Watson * are met: 4314cedfc8SRobert Watson * 1. Redistributions of source code must retain the above copyright 4414cedfc8SRobert Watson * notice, this list of conditions and the following disclaimer. 4514cedfc8SRobert Watson * 2. Redistributions in binary form must reproduce the above copyright 4614cedfc8SRobert Watson * notice, this list of conditions and the following disclaimer in the 4714cedfc8SRobert Watson * documentation and/or other materials provided with the distribution. 4814cedfc8SRobert Watson * 4914cedfc8SRobert Watson * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 5014cedfc8SRobert Watson * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 5114cedfc8SRobert Watson * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 5214cedfc8SRobert Watson * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 5314cedfc8SRobert Watson * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 5414cedfc8SRobert Watson * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 5514cedfc8SRobert Watson * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 5614cedfc8SRobert Watson * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 5714cedfc8SRobert Watson * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 5814cedfc8SRobert Watson * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 5914cedfc8SRobert Watson * SUCH DAMAGE. 6014cedfc8SRobert Watson */ 613d903220SDoug Rabson 62677b542eSDavid E. O'Brien #include <sys/cdefs.h> 63677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 64677b542eSDavid E. O'Brien 655591b823SEivind Eklund #include "opt_compat.h" 66255108f3SPeter Wemm #include "opt_sysvipc.h" 6714cedfc8SRobert Watson #include "opt_mac.h" 68511b67b7SGarrett Wollman 693d903220SDoug Rabson #include <sys/param.h> 70725db531SBruce Evans #include <sys/systm.h> 713d903220SDoug Rabson #include <sys/kernel.h> 72fb919e4dSMark Murray #include <sys/lock.h> 73255108f3SPeter Wemm #include <sys/sysctl.h> 743d903220SDoug Rabson #include <sys/shm.h> 753d903220SDoug Rabson #include <sys/proc.h> 763d903220SDoug Rabson #include <sys/malloc.h> 773d903220SDoug Rabson #include <sys/mman.h> 7877409fe1SPoul-Henning Kamp #include <sys/module.h> 799dceb26bSJohn Baldwin #include <sys/mutex.h> 8068ba7a1dSTim J. Robbins #include <sys/resourcevar.h> 813d903220SDoug Rabson #include <sys/stat.h> 8278525ce3SAlfred Perlstein #include <sys/syscall.h> 83f130dcf2SMartin Blapp #include <sys/syscallsubr.h> 84725db531SBruce Evans #include <sys/sysent.h> 85fb919e4dSMark Murray #include <sys/sysproto.h> 86cb1f0db9SRobert Watson #include <sys/jail.h> 87aed55708SRobert Watson 88aed55708SRobert Watson #include <security/mac/mac_framework.h> 893d903220SDoug Rabson 903d903220SDoug Rabson #include <vm/vm.h> 91efeaf95aSDavid Greenman #include <vm/vm_param.h> 92efeaf95aSDavid Greenman #include <vm/pmap.h> 93a51f7119SJohn Dyson #include <vm/vm_object.h> 943d903220SDoug Rabson #include <vm/vm_map.h> 951c7c3c6aSMatthew Dillon #include <vm/vm_page.h> 96ae9b8c3aSJohn Dyson #include <vm/vm_pager.h> 973d903220SDoug Rabson 98a1c995b6SPoul-Henning Kamp static MALLOC_DEFINE(M_SHM, "shm", "SVID compatible shared memory segments"); 9955166637SPoul-Henning Kamp 100fbb273bcSPaul Saab #if defined(__i386__) && (defined(COMPAT_FREEBSD4) || defined(COMPAT_43)) 101725db531SBruce Evans struct oshmctl_args; 1024d77a549SAlfred Perlstein static int oshmctl(struct thread *td, struct oshmctl_args *uap); 103fbb273bcSPaul Saab #endif 104255108f3SPeter Wemm 1054d77a549SAlfred Perlstein static int shmget_allocate_segment(struct thread *td, 1064d77a549SAlfred Perlstein struct shmget_args *uap, int mode); 1074d77a549SAlfred Perlstein static int shmget_existing(struct thread *td, struct shmget_args *uap, 1084d77a549SAlfred Perlstein int mode, int segnum); 109725db531SBruce Evans 110fbb273bcSPaul Saab #if defined(__i386__) && (defined(COMPAT_FREEBSD4) || defined(COMPAT_43)) 111725db531SBruce Evans /* XXX casting to (sy_call_t *) is bogus, as usual. */ 112303b270bSEivind Eklund static sy_call_t *shmcalls[] = { 113725db531SBruce Evans (sy_call_t *)shmat, (sy_call_t *)oshmctl, 114725db531SBruce Evans (sy_call_t *)shmdt, (sy_call_t *)shmget, 115725db531SBruce Evans (sy_call_t *)shmctl 116725db531SBruce Evans }; 117fbb273bcSPaul Saab #endif 1183d903220SDoug Rabson 1193d903220SDoug Rabson #define SHMSEG_FREE 0x0200 1203d903220SDoug Rabson #define SHMSEG_REMOVED 0x0400 1213d903220SDoug Rabson #define SHMSEG_ALLOCATED 0x0800 1223d903220SDoug Rabson #define SHMSEG_WANTED 0x1000 1233d903220SDoug Rabson 12465067cc8SKonstantin Belousov static int shm_last_free, shm_nused, shmalloced; 12545329b60SKonstantin Belousov vm_size_t shm_committed; 126921d05b9SRobert Watson static struct shmid_kernel *shmsegs; 1273d903220SDoug Rabson 1283d903220SDoug Rabson struct shmmap_state { 1293d903220SDoug Rabson vm_offset_t va; 1303d903220SDoug Rabson int shmid; 1313d903220SDoug Rabson }; 1323d903220SDoug Rabson 133921d05b9SRobert Watson static void shm_deallocate_segment(struct shmid_kernel *); 1344d77a549SAlfred Perlstein static int shm_find_segment_by_key(key_t); 135921d05b9SRobert Watson static struct shmid_kernel *shm_find_segment_by_shmid(int); 136921d05b9SRobert Watson static struct shmid_kernel *shm_find_segment_by_shmidx(int); 1373db161e0SMatthew Dillon static int shm_delete_mapping(struct vmspace *vm, struct shmmap_state *); 1384d77a549SAlfred Perlstein static void shmrealloc(void); 1394d77a549SAlfred Perlstein static void shminit(void); 1404d77a549SAlfred Perlstein static int sysvshm_modload(struct module *, int, void *); 1414d77a549SAlfred Perlstein static int shmunload(void); 1423db161e0SMatthew Dillon static void shmexit_myhook(struct vmspace *vm); 1434d77a549SAlfred Perlstein static void shmfork_myhook(struct proc *p1, struct proc *p2); 1444d77a549SAlfred Perlstein static int sysctl_shmsegs(SYSCTL_HANDLER_ARGS); 145255108f3SPeter Wemm 146255108f3SPeter Wemm /* 147028f979dSDima Dorfman * Tuneable values. 148255108f3SPeter Wemm */ 149255108f3SPeter Wemm #ifndef SHMMAXPGS 150028f979dSDima Dorfman #define SHMMAXPGS 8192 /* Note: sysv shared memory is swap backed. */ 151255108f3SPeter Wemm #endif 152255108f3SPeter Wemm #ifndef SHMMAX 153255108f3SPeter Wemm #define SHMMAX (SHMMAXPGS*PAGE_SIZE) 154255108f3SPeter Wemm #endif 155255108f3SPeter Wemm #ifndef SHMMIN 156255108f3SPeter Wemm #define SHMMIN 1 157255108f3SPeter Wemm #endif 158255108f3SPeter Wemm #ifndef SHMMNI 1591766b2e5SMatthew Dillon #define SHMMNI 192 160255108f3SPeter Wemm #endif 161255108f3SPeter Wemm #ifndef SHMSEG 1621766b2e5SMatthew Dillon #define SHMSEG 128 163255108f3SPeter Wemm #endif 164255108f3SPeter Wemm #ifndef SHMALL 165255108f3SPeter Wemm #define SHMALL (SHMMAXPGS) 166255108f3SPeter Wemm #endif 167255108f3SPeter Wemm 168255108f3SPeter Wemm struct shminfo shminfo = { 169255108f3SPeter Wemm SHMMAX, 170255108f3SPeter Wemm SHMMIN, 171255108f3SPeter Wemm SHMMNI, 172255108f3SPeter Wemm SHMSEG, 173255108f3SPeter Wemm SHMALL 174255108f3SPeter Wemm }; 175255108f3SPeter Wemm 1768b03c8edSMatthew Dillon static int shm_use_phys; 1772332251cSMax Khon static int shm_allow_removed; 1788b03c8edSMatthew Dillon 1799baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmax, CTLFLAG_RW, &shminfo.shmmax, 0, 18084f85aedSChristian S.J. Peron "Maximum shared memory segment size"); 1819baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmin, CTLFLAG_RW, &shminfo.shmmin, 0, 18284f85aedSChristian S.J. Peron "Minimum shared memory segment size"); 1839baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmni, CTLFLAG_RDTUN, &shminfo.shmmni, 0, 18484f85aedSChristian S.J. Peron "Number of shared memory identifiers"); 1859baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmseg, CTLFLAG_RDTUN, &shminfo.shmseg, 0, 18684f85aedSChristian S.J. Peron "Number of segments per process"); 1879baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmall, CTLFLAG_RW, &shminfo.shmall, 0, 18884f85aedSChristian S.J. Peron "Maximum number of pages available for shared memory"); 189028f979dSDima Dorfman SYSCTL_INT(_kern_ipc, OID_AUTO, shm_use_phys, CTLFLAG_RW, 19084f85aedSChristian S.J. Peron &shm_use_phys, 0, "Enable/Disable locking of shared memory pages in core"); 1912332251cSMax Khon SYSCTL_INT(_kern_ipc, OID_AUTO, shm_allow_removed, CTLFLAG_RW, 19284f85aedSChristian S.J. Peron &shm_allow_removed, 0, 19384f85aedSChristian S.J. Peron "Enable/Disable attachment to attached segments marked for removal"); 194a723c4e1SDima Dorfman SYSCTL_PROC(_kern_ipc, OID_AUTO, shmsegs, CTLFLAG_RD, 19584f85aedSChristian S.J. Peron NULL, 0, sysctl_shmsegs, "", 19684f85aedSChristian S.J. Peron "Current number of shared memory segments allocated"); 1973d903220SDoug Rabson 1983d903220SDoug Rabson static int 1993d903220SDoug Rabson shm_find_segment_by_key(key) 2003d903220SDoug Rabson key_t key; 2013d903220SDoug Rabson { 2023d903220SDoug Rabson int i; 2033d903220SDoug Rabson 204255108f3SPeter Wemm for (i = 0; i < shmalloced; i++) 205921d05b9SRobert Watson if ((shmsegs[i].u.shm_perm.mode & SHMSEG_ALLOCATED) && 206921d05b9SRobert Watson shmsegs[i].u.shm_perm.key == key) 207b618bb96SAlfred Perlstein return (i); 208b618bb96SAlfred Perlstein return (-1); 2093d903220SDoug Rabson } 2103d903220SDoug Rabson 211921d05b9SRobert Watson static struct shmid_kernel * 2122332251cSMax Khon shm_find_segment_by_shmid(int shmid) 2133d903220SDoug Rabson { 2143d903220SDoug Rabson int segnum; 215921d05b9SRobert Watson struct shmid_kernel *shmseg; 2163d903220SDoug Rabson 2173d903220SDoug Rabson segnum = IPCID_TO_IX(shmid); 218255108f3SPeter Wemm if (segnum < 0 || segnum >= shmalloced) 219b618bb96SAlfred Perlstein return (NULL); 2203d903220SDoug Rabson shmseg = &shmsegs[segnum]; 221921d05b9SRobert Watson if ((shmseg->u.shm_perm.mode & SHMSEG_ALLOCATED) == 0 || 2222332251cSMax Khon (!shm_allow_removed && 223921d05b9SRobert Watson (shmseg->u.shm_perm.mode & SHMSEG_REMOVED) != 0) || 224921d05b9SRobert Watson shmseg->u.shm_perm.seq != IPCID_TO_SEQ(shmid)) 225b618bb96SAlfred Perlstein return (NULL); 226b618bb96SAlfred Perlstein return (shmseg); 2273d903220SDoug Rabson } 2283d903220SDoug Rabson 229921d05b9SRobert Watson static struct shmid_kernel * 2302332251cSMax Khon shm_find_segment_by_shmidx(int segnum) 231491dec93SMichael Reifenberger { 232921d05b9SRobert Watson struct shmid_kernel *shmseg; 233491dec93SMichael Reifenberger 234491dec93SMichael Reifenberger if (segnum < 0 || segnum >= shmalloced) 235b618bb96SAlfred Perlstein return (NULL); 236491dec93SMichael Reifenberger shmseg = &shmsegs[segnum]; 237921d05b9SRobert Watson if ((shmseg->u.shm_perm.mode & SHMSEG_ALLOCATED) == 0 || 2382332251cSMax Khon (!shm_allow_removed && 239921d05b9SRobert Watson (shmseg->u.shm_perm.mode & SHMSEG_REMOVED) != 0)) 240b618bb96SAlfred Perlstein return (NULL); 241b618bb96SAlfred Perlstein return (shmseg); 242491dec93SMichael Reifenberger } 243491dec93SMichael Reifenberger 2443d903220SDoug Rabson static void 2453d903220SDoug Rabson shm_deallocate_segment(shmseg) 246921d05b9SRobert Watson struct shmid_kernel *shmseg; 2473d903220SDoug Rabson { 24845329b60SKonstantin Belousov vm_size_t size; 2493d903220SDoug Rabson 2500cddd8f0SMatthew Dillon GIANT_REQUIRED; 2510cddd8f0SMatthew Dillon 252921d05b9SRobert Watson vm_object_deallocate(shmseg->u.shm_internal); 253921d05b9SRobert Watson shmseg->u.shm_internal = NULL; 25465067cc8SKonstantin Belousov size = round_page(shmseg->shm_bsegsz); 2553d903220SDoug Rabson shm_committed -= btoc(size); 2563d903220SDoug Rabson shm_nused--; 257921d05b9SRobert Watson shmseg->u.shm_perm.mode = SHMSEG_FREE; 25814cedfc8SRobert Watson #ifdef MAC 25930d239bcSRobert Watson mac_sysvshm_cleanup(shmseg); 26014cedfc8SRobert Watson #endif 2613d903220SDoug Rabson } 2623d903220SDoug Rabson 2633d903220SDoug Rabson static int 2643db161e0SMatthew Dillon shm_delete_mapping(struct vmspace *vm, struct shmmap_state *shmmap_s) 2653d903220SDoug Rabson { 266921d05b9SRobert Watson struct shmid_kernel *shmseg; 2673d903220SDoug Rabson int segnum, result; 26845329b60SKonstantin Belousov vm_size_t size; 2693d903220SDoug Rabson 2700cddd8f0SMatthew Dillon GIANT_REQUIRED; 271028f979dSDima Dorfman 2723d903220SDoug Rabson segnum = IPCID_TO_IX(shmmap_s->shmid); 2733d903220SDoug Rabson shmseg = &shmsegs[segnum]; 27465067cc8SKonstantin Belousov size = round_page(shmseg->shm_bsegsz); 2753db161e0SMatthew Dillon result = vm_map_remove(&vm->vm_map, shmmap_s->va, shmmap_s->va + size); 2763d903220SDoug Rabson if (result != KERN_SUCCESS) 277b618bb96SAlfred Perlstein return (EINVAL); 2783d903220SDoug Rabson shmmap_s->shmid = -1; 279921d05b9SRobert Watson shmseg->u.shm_dtime = time_second; 280921d05b9SRobert Watson if ((--shmseg->u.shm_nattch <= 0) && 281921d05b9SRobert Watson (shmseg->u.shm_perm.mode & SHMSEG_REMOVED)) { 2823d903220SDoug Rabson shm_deallocate_segment(shmseg); 2833d903220SDoug Rabson shm_last_free = segnum; 2843d903220SDoug Rabson } 285b618bb96SAlfred Perlstein return (0); 2863d903220SDoug Rabson } 2873d903220SDoug Rabson 288b5d5c0c9SPeter Wemm #ifndef _SYS_SYSPROTO_H_ 2893d903220SDoug Rabson struct shmdt_args { 290e1d7d0bbSAlfred Perlstein const void *shmaddr; 2913d903220SDoug Rabson }; 292b5d5c0c9SPeter Wemm #endif 2933d903220SDoug Rabson int 294b40ce416SJulian Elischer shmdt(td, uap) 295b40ce416SJulian Elischer struct thread *td; 2963d903220SDoug Rabson struct shmdt_args *uap; 2973d903220SDoug Rabson { 298b40ce416SJulian Elischer struct proc *p = td->td_proc; 2993d903220SDoug Rabson struct shmmap_state *shmmap_s; 30014cedfc8SRobert Watson #ifdef MAC 30114cedfc8SRobert Watson struct shmid_kernel *shmsegptr; 30214cedfc8SRobert Watson #endif 3033d903220SDoug Rabson int i; 304b6a4b4f9SMatthew Dillon int error = 0; 3053d903220SDoug Rabson 306c6f55f33SJohn Baldwin if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 307c6f55f33SJohn Baldwin return (ENOSYS); 308b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 3098209f090SAlfred Perlstein shmmap_s = p->p_vmspace->vm_shm; 310b6a4b4f9SMatthew Dillon if (shmmap_s == NULL) { 311b6a4b4f9SMatthew Dillon error = EINVAL; 312b6a4b4f9SMatthew Dillon goto done2; 313b6a4b4f9SMatthew Dillon } 314b6a4b4f9SMatthew Dillon for (i = 0; i < shminfo.shmseg; i++, shmmap_s++) { 3153d903220SDoug Rabson if (shmmap_s->shmid != -1 && 316b6a4b4f9SMatthew Dillon shmmap_s->va == (vm_offset_t)uap->shmaddr) { 3173d903220SDoug Rabson break; 318b6a4b4f9SMatthew Dillon } 319b6a4b4f9SMatthew Dillon } 320b6a4b4f9SMatthew Dillon if (i == shminfo.shmseg) { 321b6a4b4f9SMatthew Dillon error = EINVAL; 322b6a4b4f9SMatthew Dillon goto done2; 323b6a4b4f9SMatthew Dillon } 32414cedfc8SRobert Watson #ifdef MAC 32514cedfc8SRobert Watson shmsegptr = &shmsegs[IPCID_TO_IX(shmmap_s->shmid)]; 32630d239bcSRobert Watson error = mac_sysvshm_check_shmdt(td->td_ucred, shmsegptr); 327f50c4fd8SRobert Watson if (error != 0) 32814cedfc8SRobert Watson goto done2; 32914cedfc8SRobert Watson #endif 3303db161e0SMatthew Dillon error = shm_delete_mapping(p->p_vmspace, shmmap_s); 331b6a4b4f9SMatthew Dillon done2: 332b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 333b6a4b4f9SMatthew Dillon return (error); 3343d903220SDoug Rabson } 3353d903220SDoug Rabson 336b5d5c0c9SPeter Wemm #ifndef _SYS_SYSPROTO_H_ 3373d903220SDoug Rabson struct shmat_args { 3383d903220SDoug Rabson int shmid; 339e1d7d0bbSAlfred Perlstein const void *shmaddr; 3403d903220SDoug Rabson int shmflg; 3413d903220SDoug Rabson }; 342b5d5c0c9SPeter Wemm #endif 3433d903220SDoug Rabson int 3442332251cSMax Khon kern_shmat(td, shmid, shmaddr, shmflg) 345b40ce416SJulian Elischer struct thread *td; 346f130dcf2SMartin Blapp int shmid; 347f130dcf2SMartin Blapp const void *shmaddr; 348f130dcf2SMartin Blapp int shmflg; 3493d903220SDoug Rabson { 350b40ce416SJulian Elischer struct proc *p = td->td_proc; 351b6a4b4f9SMatthew Dillon int i, flags; 352921d05b9SRobert Watson struct shmid_kernel *shmseg; 3533d903220SDoug Rabson struct shmmap_state *shmmap_s = NULL; 3543d903220SDoug Rabson vm_offset_t attach_va; 3553d903220SDoug Rabson vm_prot_t prot; 3563d903220SDoug Rabson vm_size_t size; 357a51f7119SJohn Dyson int rv; 358b6a4b4f9SMatthew Dillon int error = 0; 3593d903220SDoug Rabson 360c6f55f33SJohn Baldwin if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 361c6f55f33SJohn Baldwin return (ENOSYS); 362b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 3638209f090SAlfred Perlstein shmmap_s = p->p_vmspace->vm_shm; 3643d903220SDoug Rabson if (shmmap_s == NULL) { 36545329b60SKonstantin Belousov shmmap_s = malloc(shminfo.shmseg * sizeof(struct shmmap_state), 36645329b60SKonstantin Belousov M_SHM, M_WAITOK); 3673d903220SDoug Rabson for (i = 0; i < shminfo.shmseg; i++) 3683d903220SDoug Rabson shmmap_s[i].shmid = -1; 3692cc593fdSAlfred Perlstein p->p_vmspace->vm_shm = shmmap_s; 3703d903220SDoug Rabson } 3712332251cSMax Khon shmseg = shm_find_segment_by_shmid(shmid); 372b6a4b4f9SMatthew Dillon if (shmseg == NULL) { 373b6a4b4f9SMatthew Dillon error = EINVAL; 374b6a4b4f9SMatthew Dillon goto done2; 375b6a4b4f9SMatthew Dillon } 376921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, 377f130dcf2SMartin Blapp (shmflg & SHM_RDONLY) ? IPC_R : IPC_R|IPC_W); 378797f2d22SPoul-Henning Kamp if (error) 379b6a4b4f9SMatthew Dillon goto done2; 38014cedfc8SRobert Watson #ifdef MAC 38130d239bcSRobert Watson error = mac_sysvshm_check_shmat(td->td_ucred, shmseg, shmflg); 382f50c4fd8SRobert Watson if (error != 0) 38314cedfc8SRobert Watson goto done2; 38414cedfc8SRobert Watson #endif 3853d903220SDoug Rabson for (i = 0; i < shminfo.shmseg; i++) { 3863d903220SDoug Rabson if (shmmap_s->shmid == -1) 3873d903220SDoug Rabson break; 3883d903220SDoug Rabson shmmap_s++; 3893d903220SDoug Rabson } 390b6a4b4f9SMatthew Dillon if (i >= shminfo.shmseg) { 391b6a4b4f9SMatthew Dillon error = EMFILE; 392b6a4b4f9SMatthew Dillon goto done2; 393b6a4b4f9SMatthew Dillon } 39465067cc8SKonstantin Belousov size = round_page(shmseg->shm_bsegsz); 395af25d10cSAlan Cox #ifdef VM_PROT_READ_IS_EXEC 396af25d10cSAlan Cox prot = VM_PROT_READ | VM_PROT_EXECUTE; 397af25d10cSAlan Cox #else 3983d903220SDoug Rabson prot = VM_PROT_READ; 399af25d10cSAlan Cox #endif 400f130dcf2SMartin Blapp if ((shmflg & SHM_RDONLY) == 0) 4013d903220SDoug Rabson prot |= VM_PROT_WRITE; 4023d903220SDoug Rabson flags = MAP_ANON | MAP_SHARED; 403f130dcf2SMartin Blapp if (shmaddr) { 4043d903220SDoug Rabson flags |= MAP_FIXED; 405f130dcf2SMartin Blapp if (shmflg & SHM_RND) { 406f130dcf2SMartin Blapp attach_va = (vm_offset_t)shmaddr & ~(SHMLBA-1); 407f130dcf2SMartin Blapp } else if (((vm_offset_t)shmaddr & (SHMLBA-1)) == 0) { 408f130dcf2SMartin Blapp attach_va = (vm_offset_t)shmaddr; 409b6a4b4f9SMatthew Dillon } else { 410b6a4b4f9SMatthew Dillon error = EINVAL; 411b6a4b4f9SMatthew Dillon goto done2; 412b6a4b4f9SMatthew Dillon } 4133d903220SDoug Rabson } else { 414028f979dSDima Dorfman /* 415028f979dSDima Dorfman * This is just a hint to vm_map_find() about where to 416028f979dSDima Dorfman * put it. 417028f979dSDima Dorfman */ 41868ba7a1dSTim J. Robbins PROC_LOCK(p); 41968ba7a1dSTim J. Robbins attach_va = round_page((vm_offset_t)p->p_vmspace->vm_daddr + 42068ba7a1dSTim J. Robbins lim_max(p, RLIMIT_DATA)); 42168ba7a1dSTim J. Robbins PROC_UNLOCK(p); 4223d903220SDoug Rabson } 423a51f7119SJohn Dyson 424921d05b9SRobert Watson vm_object_reference(shmseg->u.shm_internal); 425921d05b9SRobert Watson rv = vm_map_find(&p->p_vmspace->vm_map, shmseg->u.shm_internal, 42665067cc8SKonstantin Belousov 0, &attach_va, size, (flags & MAP_FIXED) ? VMFS_NO_SPACE : 42765067cc8SKonstantin Belousov VMFS_ANY_SPACE, prot, prot, 0); 428a51f7119SJohn Dyson if (rv != KERN_SUCCESS) { 429921d05b9SRobert Watson vm_object_deallocate(shmseg->u.shm_internal); 430b6a4b4f9SMatthew Dillon error = ENOMEM; 431b6a4b4f9SMatthew Dillon goto done2; 432a51f7119SJohn Dyson } 4330463028cSJohn Dyson vm_map_inherit(&p->p_vmspace->vm_map, 4340463028cSJohn Dyson attach_va, attach_va + size, VM_INHERIT_SHARE); 4350463028cSJohn Dyson 4363d903220SDoug Rabson shmmap_s->va = attach_va; 437f130dcf2SMartin Blapp shmmap_s->shmid = shmid; 438921d05b9SRobert Watson shmseg->u.shm_lpid = p->p_pid; 439921d05b9SRobert Watson shmseg->u.shm_atime = time_second; 440921d05b9SRobert Watson shmseg->u.shm_nattch++; 441b40ce416SJulian Elischer td->td_retval[0] = attach_va; 442b6a4b4f9SMatthew Dillon done2: 443b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 444b6a4b4f9SMatthew Dillon return (error); 4453d903220SDoug Rabson } 4463d903220SDoug Rabson 447f130dcf2SMartin Blapp int 448f130dcf2SMartin Blapp shmat(td, uap) 449f130dcf2SMartin Blapp struct thread *td; 450f130dcf2SMartin Blapp struct shmat_args *uap; 451f130dcf2SMartin Blapp { 4522332251cSMax Khon return kern_shmat(td, uap->shmid, uap->shmaddr, uap->shmflg); 453f130dcf2SMartin Blapp } 454f130dcf2SMartin Blapp 455fbb273bcSPaul Saab #if defined(__i386__) && (defined(COMPAT_FREEBSD4) || defined(COMPAT_43)) 4568bec0921SDoug Rabson struct oshmid_ds { 4578bec0921SDoug Rabson struct ipc_perm shm_perm; /* operation perms */ 4588bec0921SDoug Rabson int shm_segsz; /* size of segment (bytes) */ 4598b149b51SJohn Baldwin u_short shm_cpid; /* pid, creator */ 4608b149b51SJohn Baldwin u_short shm_lpid; /* pid, last operation */ 4618bec0921SDoug Rabson short shm_nattch; /* no. of current attaches */ 4628bec0921SDoug Rabson time_t shm_atime; /* last attach time */ 4638bec0921SDoug Rabson time_t shm_dtime; /* last detach time */ 4648bec0921SDoug Rabson time_t shm_ctime; /* last change time */ 4658bec0921SDoug Rabson void *shm_handle; /* internal handle for shm segment */ 4668bec0921SDoug Rabson }; 4678bec0921SDoug Rabson 4688bec0921SDoug Rabson struct oshmctl_args { 4698bec0921SDoug Rabson int shmid; 4708bec0921SDoug Rabson int cmd; 4718bec0921SDoug Rabson struct oshmid_ds *ubuf; 4728bec0921SDoug Rabson }; 47387b6de2bSPoul-Henning Kamp static int 474b40ce416SJulian Elischer oshmctl(td, uap) 475b40ce416SJulian Elischer struct thread *td; 4768bec0921SDoug Rabson struct oshmctl_args *uap; 4778bec0921SDoug Rabson { 4788bec0921SDoug Rabson #ifdef COMPAT_43 479b6a4b4f9SMatthew Dillon int error = 0; 480921d05b9SRobert Watson struct shmid_kernel *shmseg; 4818bec0921SDoug Rabson struct oshmid_ds outbuf; 4828bec0921SDoug Rabson 483c6f55f33SJohn Baldwin if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 484c6f55f33SJohn Baldwin return (ENOSYS); 485b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 4862332251cSMax Khon shmseg = shm_find_segment_by_shmid(uap->shmid); 487b6a4b4f9SMatthew Dillon if (shmseg == NULL) { 488b6a4b4f9SMatthew Dillon error = EINVAL; 489b6a4b4f9SMatthew Dillon goto done2; 490b6a4b4f9SMatthew Dillon } 4918bec0921SDoug Rabson switch (uap->cmd) { 4928bec0921SDoug Rabson case IPC_STAT: 493921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, IPC_R); 494797f2d22SPoul-Henning Kamp if (error) 495b6a4b4f9SMatthew Dillon goto done2; 49614cedfc8SRobert Watson #ifdef MAC 49730d239bcSRobert Watson error = mac_sysvshm_check_shmctl(td->td_ucred, shmseg, uap->cmd); 498f50c4fd8SRobert Watson if (error != 0) 49914cedfc8SRobert Watson goto done2; 50014cedfc8SRobert Watson #endif 501921d05b9SRobert Watson outbuf.shm_perm = shmseg->u.shm_perm; 502921d05b9SRobert Watson outbuf.shm_segsz = shmseg->u.shm_segsz; 503921d05b9SRobert Watson outbuf.shm_cpid = shmseg->u.shm_cpid; 504921d05b9SRobert Watson outbuf.shm_lpid = shmseg->u.shm_lpid; 505921d05b9SRobert Watson outbuf.shm_nattch = shmseg->u.shm_nattch; 506921d05b9SRobert Watson outbuf.shm_atime = shmseg->u.shm_atime; 507921d05b9SRobert Watson outbuf.shm_dtime = shmseg->u.shm_dtime; 508921d05b9SRobert Watson outbuf.shm_ctime = shmseg->u.shm_ctime; 509921d05b9SRobert Watson outbuf.shm_handle = shmseg->u.shm_internal; 5102cc593fdSAlfred Perlstein error = copyout(&outbuf, uap->ubuf, sizeof(outbuf)); 511797f2d22SPoul-Henning Kamp if (error) 512b6a4b4f9SMatthew Dillon goto done2; 5138bec0921SDoug Rabson break; 5148bec0921SDoug Rabson default: 51500fbcda8SAlexander Kabaev error = shmctl(td, (struct shmctl_args *)uap); 516b6a4b4f9SMatthew Dillon break; 5178bec0921SDoug Rabson } 518b6a4b4f9SMatthew Dillon done2: 519b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 520b6a4b4f9SMatthew Dillon return (error); 5218bec0921SDoug Rabson #else 522b618bb96SAlfred Perlstein return (EINVAL); 5238bec0921SDoug Rabson #endif 5248bec0921SDoug Rabson } 525fbb273bcSPaul Saab #endif 5268bec0921SDoug Rabson 527b5d5c0c9SPeter Wemm #ifndef _SYS_SYSPROTO_H_ 5283d903220SDoug Rabson struct shmctl_args { 5293d903220SDoug Rabson int shmid; 5303d903220SDoug Rabson int cmd; 531b5d5c0c9SPeter Wemm struct shmid_ds *buf; 5323d903220SDoug Rabson }; 533b5d5c0c9SPeter Wemm #endif 5343d903220SDoug Rabson int 5352332251cSMax Khon kern_shmctl(td, shmid, cmd, buf, bufsz) 536b40ce416SJulian Elischer struct thread *td; 537f130dcf2SMartin Blapp int shmid; 538f130dcf2SMartin Blapp int cmd; 539f130dcf2SMartin Blapp void *buf; 540f130dcf2SMartin Blapp size_t *bufsz; 5413d903220SDoug Rabson { 542b6a4b4f9SMatthew Dillon int error = 0; 543921d05b9SRobert Watson struct shmid_kernel *shmseg; 5443d903220SDoug Rabson 545c6f55f33SJohn Baldwin if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 546c6f55f33SJohn Baldwin return (ENOSYS); 547f130dcf2SMartin Blapp 548b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 549f130dcf2SMartin Blapp switch (cmd) { 5504f18813fSChristian S.J. Peron /* 5514f18813fSChristian S.J. Peron * It is possible that kern_shmctl is being called from the Linux ABI 5524f18813fSChristian S.J. Peron * layer, in which case, we will need to implement IPC_INFO. It should 5534f18813fSChristian S.J. Peron * be noted that other shmctl calls will be funneled through here for 5544f18813fSChristian S.J. Peron * Linix binaries as well. 5554f18813fSChristian S.J. Peron * 5564f18813fSChristian S.J. Peron * NB: The Linux ABI layer will convert this data to structure(s) more 5574f18813fSChristian S.J. Peron * consistent with the Linux ABI. 5584f18813fSChristian S.J. Peron */ 559491dec93SMichael Reifenberger case IPC_INFO: 560f130dcf2SMartin Blapp memcpy(buf, &shminfo, sizeof(shminfo)); 561f130dcf2SMartin Blapp if (bufsz) 562f130dcf2SMartin Blapp *bufsz = sizeof(shminfo); 563491dec93SMichael Reifenberger td->td_retval[0] = shmalloced; 564491dec93SMichael Reifenberger goto done2; 565491dec93SMichael Reifenberger case SHM_INFO: { 566491dec93SMichael Reifenberger struct shm_info shm_info; 567491dec93SMichael Reifenberger shm_info.used_ids = shm_nused; 568491dec93SMichael Reifenberger shm_info.shm_rss = 0; /*XXX where to get from ? */ 569491dec93SMichael Reifenberger shm_info.shm_tot = 0; /*XXX where to get from ? */ 570491dec93SMichael Reifenberger shm_info.shm_swp = 0; /*XXX where to get from ? */ 571491dec93SMichael Reifenberger shm_info.swap_attempts = 0; /*XXX where to get from ? */ 572491dec93SMichael Reifenberger shm_info.swap_successes = 0; /*XXX where to get from ? */ 573f130dcf2SMartin Blapp memcpy(buf, &shm_info, sizeof(shm_info)); 574f130dcf2SMartin Blapp if (bufsz) 575f130dcf2SMartin Blapp *bufsz = sizeof(shm_info); 576491dec93SMichael Reifenberger td->td_retval[0] = shmalloced; 577491dec93SMichael Reifenberger goto done2; 578491dec93SMichael Reifenberger } 579491dec93SMichael Reifenberger } 580f130dcf2SMartin Blapp if (cmd == SHM_STAT) 5812332251cSMax Khon shmseg = shm_find_segment_by_shmidx(shmid); 582491dec93SMichael Reifenberger else 5832332251cSMax Khon shmseg = shm_find_segment_by_shmid(shmid); 584b6a4b4f9SMatthew Dillon if (shmseg == NULL) { 585b6a4b4f9SMatthew Dillon error = EINVAL; 586b6a4b4f9SMatthew Dillon goto done2; 587b6a4b4f9SMatthew Dillon } 58814cedfc8SRobert Watson #ifdef MAC 58930d239bcSRobert Watson error = mac_sysvshm_check_shmctl(td->td_ucred, shmseg, cmd); 590f50c4fd8SRobert Watson if (error != 0) 59114cedfc8SRobert Watson goto done2; 59214cedfc8SRobert Watson #endif 593f130dcf2SMartin Blapp switch (cmd) { 594491dec93SMichael Reifenberger case SHM_STAT: 5953d903220SDoug Rabson case IPC_STAT: 596921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, IPC_R); 597797f2d22SPoul-Henning Kamp if (error) 598b6a4b4f9SMatthew Dillon goto done2; 599921d05b9SRobert Watson memcpy(buf, &shmseg->u, sizeof(struct shmid_ds)); 600f130dcf2SMartin Blapp if (bufsz) 601f130dcf2SMartin Blapp *bufsz = sizeof(struct shmid_ds); 602f130dcf2SMartin Blapp if (cmd == SHM_STAT) 603921d05b9SRobert Watson td->td_retval[0] = IXSEQ_TO_IPCID(shmid, shmseg->u.shm_perm); 6043d903220SDoug Rabson break; 605f130dcf2SMartin Blapp case IPC_SET: { 606f130dcf2SMartin Blapp struct shmid_ds *shmid; 607f130dcf2SMartin Blapp 608f130dcf2SMartin Blapp shmid = (struct shmid_ds *)buf; 609921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, IPC_M); 610797f2d22SPoul-Henning Kamp if (error) 611b6a4b4f9SMatthew Dillon goto done2; 612921d05b9SRobert Watson shmseg->u.shm_perm.uid = shmid->shm_perm.uid; 613921d05b9SRobert Watson shmseg->u.shm_perm.gid = shmid->shm_perm.gid; 614921d05b9SRobert Watson shmseg->u.shm_perm.mode = 615921d05b9SRobert Watson (shmseg->u.shm_perm.mode & ~ACCESSPERMS) | 616f130dcf2SMartin Blapp (shmid->shm_perm.mode & ACCESSPERMS); 617921d05b9SRobert Watson shmseg->u.shm_ctime = time_second; 6183d903220SDoug Rabson break; 619f130dcf2SMartin Blapp } 6203d903220SDoug Rabson case IPC_RMID: 621921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, IPC_M); 622797f2d22SPoul-Henning Kamp if (error) 623b6a4b4f9SMatthew Dillon goto done2; 624921d05b9SRobert Watson shmseg->u.shm_perm.key = IPC_PRIVATE; 625921d05b9SRobert Watson shmseg->u.shm_perm.mode |= SHMSEG_REMOVED; 626921d05b9SRobert Watson if (shmseg->u.shm_nattch <= 0) { 6273d903220SDoug Rabson shm_deallocate_segment(shmseg); 628f130dcf2SMartin Blapp shm_last_free = IPCID_TO_IX(shmid); 6293d903220SDoug Rabson } 6303d903220SDoug Rabson break; 6313d903220SDoug Rabson #if 0 6323d903220SDoug Rabson case SHM_LOCK: 6333d903220SDoug Rabson case SHM_UNLOCK: 6343d903220SDoug Rabson #endif 6353d903220SDoug Rabson default: 636b6a4b4f9SMatthew Dillon error = EINVAL; 637b6a4b4f9SMatthew Dillon break; 6383d903220SDoug Rabson } 639b6a4b4f9SMatthew Dillon done2: 640b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 641b6a4b4f9SMatthew Dillon return (error); 6423d903220SDoug Rabson } 6433d903220SDoug Rabson 644f130dcf2SMartin Blapp int 645f130dcf2SMartin Blapp shmctl(td, uap) 646f130dcf2SMartin Blapp struct thread *td; 647f130dcf2SMartin Blapp struct shmctl_args *uap; 648f130dcf2SMartin Blapp { 649f130dcf2SMartin Blapp int error = 0; 650f130dcf2SMartin Blapp struct shmid_ds buf; 651f130dcf2SMartin Blapp size_t bufsz; 652f130dcf2SMartin Blapp 6534f18813fSChristian S.J. Peron /* 6544f18813fSChristian S.J. Peron * The only reason IPC_INFO, SHM_INFO, SHM_STAT exists is to support 6554f18813fSChristian S.J. Peron * Linux binaries. If we see the call come through the FreeBSD ABI, 6564f18813fSChristian S.J. Peron * return an error back to the user since we do not to support this. 6574f18813fSChristian S.J. Peron */ 6584f18813fSChristian S.J. Peron if (uap->cmd == IPC_INFO || uap->cmd == SHM_INFO || 6594f18813fSChristian S.J. Peron uap->cmd == SHM_STAT) 6604f18813fSChristian S.J. Peron return (EINVAL); 6614f18813fSChristian S.J. Peron 662f130dcf2SMartin Blapp /* IPC_SET needs to copyin the buffer before calling kern_shmctl */ 663f130dcf2SMartin Blapp if (uap->cmd == IPC_SET) { 664f130dcf2SMartin Blapp if ((error = copyin(uap->buf, &buf, sizeof(struct shmid_ds)))) 665f130dcf2SMartin Blapp goto done; 666f130dcf2SMartin Blapp } 667f130dcf2SMartin Blapp 6682332251cSMax Khon error = kern_shmctl(td, uap->shmid, uap->cmd, (void *)&buf, &bufsz); 669f130dcf2SMartin Blapp if (error) 670f130dcf2SMartin Blapp goto done; 671f130dcf2SMartin Blapp 672f130dcf2SMartin Blapp /* Cases in which we need to copyout */ 673f130dcf2SMartin Blapp switch (uap->cmd) { 674f130dcf2SMartin Blapp case IPC_STAT: 675f130dcf2SMartin Blapp error = copyout(&buf, uap->buf, bufsz); 676f130dcf2SMartin Blapp break; 677f130dcf2SMartin Blapp } 678f130dcf2SMartin Blapp 679f130dcf2SMartin Blapp done: 680f130dcf2SMartin Blapp if (error) { 681f130dcf2SMartin Blapp /* Invalidate the return value */ 682f130dcf2SMartin Blapp td->td_retval[0] = -1; 683f130dcf2SMartin Blapp } 684f130dcf2SMartin Blapp return (error); 685f130dcf2SMartin Blapp } 686f130dcf2SMartin Blapp 687f130dcf2SMartin Blapp 688b5d5c0c9SPeter Wemm #ifndef _SYS_SYSPROTO_H_ 6893d903220SDoug Rabson struct shmget_args { 6903d903220SDoug Rabson key_t key; 6913d903220SDoug Rabson size_t size; 6923d903220SDoug Rabson int shmflg; 6933d903220SDoug Rabson }; 694b5d5c0c9SPeter Wemm #endif 6953d903220SDoug Rabson static int 696b40ce416SJulian Elischer shmget_existing(td, uap, mode, segnum) 697b40ce416SJulian Elischer struct thread *td; 6983d903220SDoug Rabson struct shmget_args *uap; 6993d903220SDoug Rabson int mode; 7003d903220SDoug Rabson int segnum; 7013d903220SDoug Rabson { 702921d05b9SRobert Watson struct shmid_kernel *shmseg; 7033d903220SDoug Rabson int error; 7043d903220SDoug Rabson 7053d903220SDoug Rabson shmseg = &shmsegs[segnum]; 706921d05b9SRobert Watson if (shmseg->u.shm_perm.mode & SHMSEG_REMOVED) { 7073d903220SDoug Rabson /* 7083d903220SDoug Rabson * This segment is in the process of being allocated. Wait 7093d903220SDoug Rabson * until it's done, and look the key up again (in case the 7103d903220SDoug Rabson * allocation failed or it was freed). 7113d903220SDoug Rabson */ 712921d05b9SRobert Watson shmseg->u.shm_perm.mode |= SHMSEG_WANTED; 7132cc593fdSAlfred Perlstein error = tsleep(shmseg, PLOCK | PCATCH, "shmget", 0); 714797f2d22SPoul-Henning Kamp if (error) 715b618bb96SAlfred Perlstein return (error); 716b618bb96SAlfred Perlstein return (EAGAIN); 7173d903220SDoug Rabson } 718dc92aa57SAlan Cox if ((uap->shmflg & (IPC_CREAT | IPC_EXCL)) == (IPC_CREAT | IPC_EXCL)) 719b618bb96SAlfred Perlstein return (EEXIST); 72014cedfc8SRobert Watson #ifdef MAC 72130d239bcSRobert Watson error = mac_sysvshm_check_shmget(td->td_ucred, shmseg, uap->shmflg); 722f50c4fd8SRobert Watson if (error != 0) 7237723d5edSRobert Watson return (error); 72414cedfc8SRobert Watson #endif 72545329b60SKonstantin Belousov if (uap->size != 0 && uap->size > shmseg->shm_bsegsz) 726b618bb96SAlfred Perlstein return (EINVAL); 727921d05b9SRobert Watson td->td_retval[0] = IXSEQ_TO_IPCID(segnum, shmseg->u.shm_perm); 728b618bb96SAlfred Perlstein return (0); 7293d903220SDoug Rabson } 7303d903220SDoug Rabson 7313d903220SDoug Rabson static int 732b40ce416SJulian Elischer shmget_allocate_segment(td, uap, mode) 733b40ce416SJulian Elischer struct thread *td; 7343d903220SDoug Rabson struct shmget_args *uap; 7353d903220SDoug Rabson int mode; 7363d903220SDoug Rabson { 73765067cc8SKonstantin Belousov int i, segnum, shmid; 73865067cc8SKonstantin Belousov size_t size; 739a854ed98SJohn Baldwin struct ucred *cred = td->td_ucred; 740921d05b9SRobert Watson struct shmid_kernel *shmseg; 7410049f8b2SAlan Cox vm_object_t shm_object; 7423d903220SDoug Rabson 7430cddd8f0SMatthew Dillon GIANT_REQUIRED; 7440cddd8f0SMatthew Dillon 7453d903220SDoug Rabson if (uap->size < shminfo.shmmin || uap->size > shminfo.shmmax) 746b618bb96SAlfred Perlstein return (EINVAL); 747028f979dSDima Dorfman if (shm_nused >= shminfo.shmmni) /* Any shmids left? */ 748b618bb96SAlfred Perlstein return (ENOSPC); 7499e609ddeSJoerg Wunsch size = round_page(uap->size); 7503d903220SDoug Rabson if (shm_committed + btoc(size) > shminfo.shmall) 751b618bb96SAlfred Perlstein return (ENOMEM); 7523d903220SDoug Rabson if (shm_last_free < 0) { 753028f979dSDima Dorfman shmrealloc(); /* Maybe expand the shmsegs[] array. */ 754255108f3SPeter Wemm for (i = 0; i < shmalloced; i++) 755921d05b9SRobert Watson if (shmsegs[i].u.shm_perm.mode & SHMSEG_FREE) 7563d903220SDoug Rabson break; 757255108f3SPeter Wemm if (i == shmalloced) 758b618bb96SAlfred Perlstein return (ENOSPC); 7593d903220SDoug Rabson segnum = i; 7603d903220SDoug Rabson } else { 7613d903220SDoug Rabson segnum = shm_last_free; 7623d903220SDoug Rabson shm_last_free = -1; 7633d903220SDoug Rabson } 7643d903220SDoug Rabson shmseg = &shmsegs[segnum]; 7653d903220SDoug Rabson /* 7663d903220SDoug Rabson * In case we sleep in malloc(), mark the segment present but deleted 7673d903220SDoug Rabson * so that noone else tries to create the same key. 7683d903220SDoug Rabson */ 769921d05b9SRobert Watson shmseg->u.shm_perm.mode = SHMSEG_ALLOCATED | SHMSEG_REMOVED; 770921d05b9SRobert Watson shmseg->u.shm_perm.key = uap->key; 771921d05b9SRobert Watson shmseg->u.shm_perm.seq = (shmseg->u.shm_perm.seq + 1) & 0x7fff; 772921d05b9SRobert Watson shmid = IXSEQ_TO_IPCID(segnum, shmseg->u.shm_perm); 773a51f7119SJohn Dyson 774ae9b8c3aSJohn Dyson /* 775ae9b8c3aSJohn Dyson * We make sure that we have allocated a pager before we need 776ae9b8c3aSJohn Dyson * to. 777ae9b8c3aSJohn Dyson */ 7788b03c8edSMatthew Dillon if (shm_use_phys) { 7790049f8b2SAlan Cox shm_object = 78024488c74SPeter Wemm vm_pager_allocate(OBJT_PHYS, 0, size, VM_PROT_DEFAULT, 0); 7818b03c8edSMatthew Dillon } else { 7820049f8b2SAlan Cox shm_object = 7836cde7a16SDavid Greenman vm_pager_allocate(OBJT_SWAP, 0, size, VM_PROT_DEFAULT, 0); 7848b03c8edSMatthew Dillon } 7850049f8b2SAlan Cox VM_OBJECT_LOCK(shm_object); 7860049f8b2SAlan Cox vm_object_clear_flag(shm_object, OBJ_ONEMAPPING); 7870049f8b2SAlan Cox vm_object_set_flag(shm_object, OBJ_NOSPLIT); 7880049f8b2SAlan Cox VM_OBJECT_UNLOCK(shm_object); 789cbd8ec09SJohn Dyson 790921d05b9SRobert Watson shmseg->u.shm_internal = shm_object; 791921d05b9SRobert Watson shmseg->u.shm_perm.cuid = shmseg->u.shm_perm.uid = cred->cr_uid; 792921d05b9SRobert Watson shmseg->u.shm_perm.cgid = shmseg->u.shm_perm.gid = cred->cr_gid; 793921d05b9SRobert Watson shmseg->u.shm_perm.mode = (shmseg->u.shm_perm.mode & SHMSEG_WANTED) | 7943d903220SDoug Rabson (mode & ACCESSPERMS) | SHMSEG_ALLOCATED; 795921d05b9SRobert Watson shmseg->u.shm_segsz = uap->size; 79665067cc8SKonstantin Belousov shmseg->shm_bsegsz = uap->size; 797921d05b9SRobert Watson shmseg->u.shm_cpid = td->td_proc->p_pid; 798921d05b9SRobert Watson shmseg->u.shm_lpid = shmseg->u.shm_nattch = 0; 799921d05b9SRobert Watson shmseg->u.shm_atime = shmseg->u.shm_dtime = 0; 80014cedfc8SRobert Watson #ifdef MAC 80130d239bcSRobert Watson mac_sysvshm_create(cred, shmseg); 80214cedfc8SRobert Watson #endif 803921d05b9SRobert Watson shmseg->u.shm_ctime = time_second; 8043d903220SDoug Rabson shm_committed += btoc(size); 8053d903220SDoug Rabson shm_nused++; 806921d05b9SRobert Watson if (shmseg->u.shm_perm.mode & SHMSEG_WANTED) { 8073d903220SDoug Rabson /* 8083d903220SDoug Rabson * Somebody else wanted this key while we were asleep. Wake 8093d903220SDoug Rabson * them up now. 8103d903220SDoug Rabson */ 811921d05b9SRobert Watson shmseg->u.shm_perm.mode &= ~SHMSEG_WANTED; 8122cc593fdSAlfred Perlstein wakeup(shmseg); 8133d903220SDoug Rabson } 814b40ce416SJulian Elischer td->td_retval[0] = shmid; 815b618bb96SAlfred Perlstein return (0); 8163d903220SDoug Rabson } 8173d903220SDoug Rabson 8183d903220SDoug Rabson int 819b40ce416SJulian Elischer shmget(td, uap) 820b40ce416SJulian Elischer struct thread *td; 8213d903220SDoug Rabson struct shmget_args *uap; 8223d903220SDoug Rabson { 823b6a4b4f9SMatthew Dillon int segnum, mode; 824b6a4b4f9SMatthew Dillon int error; 8253d903220SDoug Rabson 826c6f55f33SJohn Baldwin if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 827c6f55f33SJohn Baldwin return (ENOSYS); 828b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 8293d903220SDoug Rabson mode = uap->shmflg & ACCESSPERMS; 8303d903220SDoug Rabson if (uap->key != IPC_PRIVATE) { 8313d903220SDoug Rabson again: 8323d903220SDoug Rabson segnum = shm_find_segment_by_key(uap->key); 8333d903220SDoug Rabson if (segnum >= 0) { 834b40ce416SJulian Elischer error = shmget_existing(td, uap, mode, segnum); 8353d903220SDoug Rabson if (error == EAGAIN) 8363d903220SDoug Rabson goto again; 837b6a4b4f9SMatthew Dillon goto done2; 8383d903220SDoug Rabson } 839b6a4b4f9SMatthew Dillon if ((uap->shmflg & IPC_CREAT) == 0) { 840b6a4b4f9SMatthew Dillon error = ENOENT; 841b6a4b4f9SMatthew Dillon goto done2; 8423d903220SDoug Rabson } 843b6a4b4f9SMatthew Dillon } 844b40ce416SJulian Elischer error = shmget_allocate_segment(td, uap, mode); 845b6a4b4f9SMatthew Dillon done2: 846b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 847b6a4b4f9SMatthew Dillon return (error); 8483d903220SDoug Rabson } 8493d903220SDoug Rabson 8503d903220SDoug Rabson int 851b40ce416SJulian Elischer shmsys(td, uap) 852b40ce416SJulian Elischer struct thread *td; 853725db531SBruce Evans /* XXX actually varargs. */ 854725db531SBruce Evans struct shmsys_args /* { 85501b9dc96SJacques Vidrine int which; 856725db531SBruce Evans int a2; 857725db531SBruce Evans int a3; 858725db531SBruce Evans int a4; 859725db531SBruce Evans } */ *uap; 8603d903220SDoug Rabson { 861fbb273bcSPaul Saab #if defined(__i386__) && (defined(COMPAT_FREEBSD4) || defined(COMPAT_43)) 862b6a4b4f9SMatthew Dillon int error; 8633d903220SDoug Rabson 864c6f55f33SJohn Baldwin if (!jail_sysvipc_allowed && jailed(td->td_ucred)) 865c6f55f33SJohn Baldwin return (ENOSYS); 86601b9dc96SJacques Vidrine if (uap->which < 0 || 86701b9dc96SJacques Vidrine uap->which >= sizeof(shmcalls)/sizeof(shmcalls[0])) 868c6f55f33SJohn Baldwin return (EINVAL); 869b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 870b40ce416SJulian Elischer error = (*shmcalls[uap->which])(td, &uap->a2); 871b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 872b6a4b4f9SMatthew Dillon return (error); 873fbb273bcSPaul Saab #else 874fbb273bcSPaul Saab return (nosys(td, NULL)); 875fbb273bcSPaul Saab #endif 8763d903220SDoug Rabson } 8773d903220SDoug Rabson 87878525ce3SAlfred Perlstein static void 87978525ce3SAlfred Perlstein shmfork_myhook(p1, p2) 8803d903220SDoug Rabson struct proc *p1, *p2; 8813d903220SDoug Rabson { 8823d903220SDoug Rabson struct shmmap_state *shmmap_s; 8833d903220SDoug Rabson size_t size; 8843d903220SDoug Rabson int i; 8853d903220SDoug Rabson 88694ddc707SAlan Cox mtx_lock(&Giant); 8873d903220SDoug Rabson size = shminfo.shmseg * sizeof(struct shmmap_state); 888a163d034SWarner Losh shmmap_s = malloc(size, M_SHM, M_WAITOK); 8892cc593fdSAlfred Perlstein bcopy(p1->p_vmspace->vm_shm, shmmap_s, size); 8902cc593fdSAlfred Perlstein p2->p_vmspace->vm_shm = shmmap_s; 8913d903220SDoug Rabson for (i = 0; i < shminfo.shmseg; i++, shmmap_s++) 8923d903220SDoug Rabson if (shmmap_s->shmid != -1) 893921d05b9SRobert Watson shmsegs[IPCID_TO_IX(shmmap_s->shmid)].u.shm_nattch++; 89494ddc707SAlan Cox mtx_unlock(&Giant); 8953d903220SDoug Rabson } 8963d903220SDoug Rabson 89778525ce3SAlfred Perlstein static void 8983db161e0SMatthew Dillon shmexit_myhook(struct vmspace *vm) 8993d903220SDoug Rabson { 9003db161e0SMatthew Dillon struct shmmap_state *base, *shm; 9013d903220SDoug Rabson int i; 9023d903220SDoug Rabson 9033db161e0SMatthew Dillon if ((base = vm->vm_shm) != NULL) { 9043db161e0SMatthew Dillon vm->vm_shm = NULL; 9051a276a3fSAlan Cox mtx_lock(&Giant); 9063db161e0SMatthew Dillon for (i = 0, shm = base; i < shminfo.shmseg; i++, shm++) { 9073db161e0SMatthew Dillon if (shm->shmid != -1) 9083db161e0SMatthew Dillon shm_delete_mapping(vm, shm); 9093db161e0SMatthew Dillon } 9101a276a3fSAlan Cox mtx_unlock(&Giant); 9113db161e0SMatthew Dillon free(base, M_SHM); 9123db161e0SMatthew Dillon } 9133d903220SDoug Rabson } 9143d903220SDoug Rabson 915255108f3SPeter Wemm static void 916255108f3SPeter Wemm shmrealloc(void) 917255108f3SPeter Wemm { 918255108f3SPeter Wemm int i; 919921d05b9SRobert Watson struct shmid_kernel *newsegs; 920255108f3SPeter Wemm 921255108f3SPeter Wemm if (shmalloced >= shminfo.shmmni) 922255108f3SPeter Wemm return; 923255108f3SPeter Wemm 924a163d034SWarner Losh newsegs = malloc(shminfo.shmmni * sizeof(*newsegs), M_SHM, M_WAITOK); 925255108f3SPeter Wemm if (newsegs == NULL) 926255108f3SPeter Wemm return; 927255108f3SPeter Wemm for (i = 0; i < shmalloced; i++) 928255108f3SPeter Wemm bcopy(&shmsegs[i], &newsegs[i], sizeof(newsegs[0])); 929255108f3SPeter Wemm for (; i < shminfo.shmmni; i++) { 930921d05b9SRobert Watson shmsegs[i].u.shm_perm.mode = SHMSEG_FREE; 931921d05b9SRobert Watson shmsegs[i].u.shm_perm.seq = 0; 93214cedfc8SRobert Watson #ifdef MAC 93330d239bcSRobert Watson mac_sysvshm_init(&shmsegs[i]); 93414cedfc8SRobert Watson #endif 935255108f3SPeter Wemm } 936255108f3SPeter Wemm free(shmsegs, M_SHM); 937255108f3SPeter Wemm shmsegs = newsegs; 938255108f3SPeter Wemm shmalloced = shminfo.shmmni; 939255108f3SPeter Wemm } 940255108f3SPeter Wemm 941255108f3SPeter Wemm static void 94278525ce3SAlfred Perlstein shminit() 9433d903220SDoug Rabson { 9443d903220SDoug Rabson int i; 945255108f3SPeter Wemm 9469baea4b4SChristian S.J. Peron TUNABLE_ULONG_FETCH("kern.ipc.shmmaxpgs", &shminfo.shmall); 9479d4156aeSAlfred Perlstein for (i = PAGE_SIZE; i > 0; i--) { 948a4c24c66SJohn Baldwin shminfo.shmmax = shminfo.shmall * i; 9495015c68aSAlfred Perlstein if (shminfo.shmmax >= shminfo.shmall) 9505015c68aSAlfred Perlstein break; 9515015c68aSAlfred Perlstein } 9529baea4b4SChristian S.J. Peron TUNABLE_ULONG_FETCH("kern.ipc.shmmin", &shminfo.shmmin); 9539baea4b4SChristian S.J. Peron TUNABLE_ULONG_FETCH("kern.ipc.shmmni", &shminfo.shmmni); 9549baea4b4SChristian S.J. Peron TUNABLE_ULONG_FETCH("kern.ipc.shmseg", &shminfo.shmseg); 955b3a4bc42SMichael Reifenberger TUNABLE_INT_FETCH("kern.ipc.shm_use_phys", &shm_use_phys); 956b3a4bc42SMichael Reifenberger 957255108f3SPeter Wemm shmalloced = shminfo.shmmni; 958a163d034SWarner Losh shmsegs = malloc(shmalloced * sizeof(shmsegs[0]), M_SHM, M_WAITOK); 959255108f3SPeter Wemm if (shmsegs == NULL) 960255108f3SPeter Wemm panic("cannot allocate initial memory for sysvshm"); 961255108f3SPeter Wemm for (i = 0; i < shmalloced; i++) { 962921d05b9SRobert Watson shmsegs[i].u.shm_perm.mode = SHMSEG_FREE; 963921d05b9SRobert Watson shmsegs[i].u.shm_perm.seq = 0; 96414cedfc8SRobert Watson #ifdef MAC 96530d239bcSRobert Watson mac_sysvshm_init(&shmsegs[i]); 96614cedfc8SRobert Watson #endif 9673d903220SDoug Rabson } 9683d903220SDoug Rabson shm_last_free = 0; 9693d903220SDoug Rabson shm_nused = 0; 9703d903220SDoug Rabson shm_committed = 0; 97178525ce3SAlfred Perlstein shmexit_hook = &shmexit_myhook; 97278525ce3SAlfred Perlstein shmfork_hook = &shmfork_myhook; 9733d903220SDoug Rabson } 97478525ce3SAlfred Perlstein 97578525ce3SAlfred Perlstein static int 97678525ce3SAlfred Perlstein shmunload() 97778525ce3SAlfred Perlstein { 97814cedfc8SRobert Watson #ifdef MAC 97914cedfc8SRobert Watson int i; 98014cedfc8SRobert Watson #endif 98178525ce3SAlfred Perlstein 98278525ce3SAlfred Perlstein if (shm_nused > 0) 98378525ce3SAlfred Perlstein return (EBUSY); 98478525ce3SAlfred Perlstein 98514cedfc8SRobert Watson #ifdef MAC 98614cedfc8SRobert Watson for (i = 0; i < shmalloced; i++) 98730d239bcSRobert Watson mac_sysvshm_destroy(&shmsegs[i]); 98814cedfc8SRobert Watson #endif 98978525ce3SAlfred Perlstein free(shmsegs, M_SHM); 99078525ce3SAlfred Perlstein shmexit_hook = NULL; 99178525ce3SAlfred Perlstein shmfork_hook = NULL; 99278525ce3SAlfred Perlstein return (0); 99378525ce3SAlfred Perlstein } 99478525ce3SAlfred Perlstein 99578525ce3SAlfred Perlstein static int 996a723c4e1SDima Dorfman sysctl_shmsegs(SYSCTL_HANDLER_ARGS) 997a723c4e1SDima Dorfman { 998a723c4e1SDima Dorfman 999a723c4e1SDima Dorfman return (SYSCTL_OUT(req, shmsegs, shmalloced * sizeof(shmsegs[0]))); 1000a723c4e1SDima Dorfman } 1001a723c4e1SDima Dorfman 1002a723c4e1SDima Dorfman static int 100378525ce3SAlfred Perlstein sysvshm_modload(struct module *module, int cmd, void *arg) 100478525ce3SAlfred Perlstein { 100578525ce3SAlfred Perlstein int error = 0; 100678525ce3SAlfred Perlstein 100778525ce3SAlfred Perlstein switch (cmd) { 100878525ce3SAlfred Perlstein case MOD_LOAD: 100978525ce3SAlfred Perlstein shminit(); 101078525ce3SAlfred Perlstein break; 101178525ce3SAlfred Perlstein case MOD_UNLOAD: 101278525ce3SAlfred Perlstein error = shmunload(); 101378525ce3SAlfred Perlstein break; 101478525ce3SAlfred Perlstein case MOD_SHUTDOWN: 101578525ce3SAlfred Perlstein break; 101678525ce3SAlfred Perlstein default: 101778525ce3SAlfred Perlstein error = EINVAL; 101878525ce3SAlfred Perlstein break; 101978525ce3SAlfred Perlstein } 102078525ce3SAlfred Perlstein return (error); 102178525ce3SAlfred Perlstein } 102278525ce3SAlfred Perlstein 1023faa784b7SDag-Erling Smørgrav static moduledata_t sysvshm_mod = { 1024faa784b7SDag-Erling Smørgrav "sysvshm", 102578525ce3SAlfred Perlstein &sysvshm_modload, 102678525ce3SAlfred Perlstein NULL 102778525ce3SAlfred Perlstein }; 102878525ce3SAlfred Perlstein 102921d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmsys); 103021d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmat); 103121d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmctl); 103221d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmdt); 103321d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmget); 103478525ce3SAlfred Perlstein 1035faa784b7SDag-Erling Smørgrav DECLARE_MODULE(sysvshm, sysvshm_mod, 103678525ce3SAlfred Perlstein SI_SUB_SYSV_SHM, SI_ORDER_FIRST); 1037faa784b7SDag-Erling Smørgrav MODULE_VERSION(sysvshm, 1); 1038