13d903220SDoug Rabson /* $NetBSD: sysv_shm.c,v 1.23 1994/07/04 23:25:12 glass Exp $ */ 29454b2d8SWarner Losh /*- 33d903220SDoug Rabson * Copyright (c) 1994 Adam Glass and Charles Hannum. All rights reserved. 43d903220SDoug Rabson * 53d903220SDoug Rabson * Redistribution and use in source and binary forms, with or without 63d903220SDoug Rabson * modification, are permitted provided that the following conditions 73d903220SDoug Rabson * are met: 83d903220SDoug Rabson * 1. Redistributions of source code must retain the above copyright 93d903220SDoug Rabson * notice, this list of conditions and the following disclaimer. 103d903220SDoug Rabson * 2. Redistributions in binary form must reproduce the above copyright 113d903220SDoug Rabson * notice, this list of conditions and the following disclaimer in the 123d903220SDoug Rabson * documentation and/or other materials provided with the distribution. 133d903220SDoug Rabson * 3. All advertising materials mentioning features or use of this software 143d903220SDoug Rabson * must display the following acknowledgement: 153d903220SDoug Rabson * This product includes software developed by Adam Glass and Charles 163d903220SDoug Rabson * Hannum. 173d903220SDoug Rabson * 4. The names of the authors may not be used to endorse or promote products 183d903220SDoug Rabson * derived from this software without specific prior written permission. 193d903220SDoug Rabson * 203d903220SDoug Rabson * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 213d903220SDoug Rabson * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 223d903220SDoug Rabson * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 233d903220SDoug Rabson * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, 243d903220SDoug Rabson * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 253d903220SDoug Rabson * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 263d903220SDoug Rabson * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 273d903220SDoug Rabson * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 283d903220SDoug Rabson * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 293d903220SDoug Rabson * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 303d903220SDoug Rabson */ 3114cedfc8SRobert Watson /*- 3214cedfc8SRobert Watson * Copyright (c) 2003-2005 McAfee, Inc. 3314cedfc8SRobert Watson * All rights reserved. 3414cedfc8SRobert Watson * 3514cedfc8SRobert Watson * This software was developed for the FreeBSD Project in part by McAfee 3614cedfc8SRobert Watson * Research, the Security Research Division of McAfee, Inc under DARPA/SPAWAR 3714cedfc8SRobert Watson * contract N66001-01-C-8035 ("CBOSS"), as part of the DARPA CHATS research 3814cedfc8SRobert Watson * program. 3914cedfc8SRobert Watson * 4014cedfc8SRobert Watson * Redistribution and use in source and binary forms, with or without 4114cedfc8SRobert Watson * modification, are permitted provided that the following conditions 4214cedfc8SRobert Watson * are met: 4314cedfc8SRobert Watson * 1. Redistributions of source code must retain the above copyright 4414cedfc8SRobert Watson * notice, this list of conditions and the following disclaimer. 4514cedfc8SRobert Watson * 2. Redistributions in binary form must reproduce the above copyright 4614cedfc8SRobert Watson * notice, this list of conditions and the following disclaimer in the 4714cedfc8SRobert Watson * documentation and/or other materials provided with the distribution. 4814cedfc8SRobert Watson * 4914cedfc8SRobert Watson * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 5014cedfc8SRobert Watson * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 5114cedfc8SRobert Watson * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 5214cedfc8SRobert Watson * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 5314cedfc8SRobert Watson * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 5414cedfc8SRobert Watson * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 5514cedfc8SRobert Watson * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 5614cedfc8SRobert Watson * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 5714cedfc8SRobert Watson * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 5814cedfc8SRobert Watson * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 5914cedfc8SRobert Watson * SUCH DAMAGE. 6014cedfc8SRobert Watson */ 613d903220SDoug Rabson 62677b542eSDavid E. O'Brien #include <sys/cdefs.h> 63677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 64677b542eSDavid E. O'Brien 655591b823SEivind Eklund #include "opt_compat.h" 66255108f3SPeter Wemm #include "opt_sysvipc.h" 67511b67b7SGarrett Wollman 683d903220SDoug Rabson #include <sys/param.h> 69725db531SBruce Evans #include <sys/systm.h> 703d903220SDoug Rabson #include <sys/kernel.h> 71b648d480SJohn Baldwin #include <sys/limits.h> 72fb919e4dSMark Murray #include <sys/lock.h> 73255108f3SPeter Wemm #include <sys/sysctl.h> 743d903220SDoug Rabson #include <sys/shm.h> 753d903220SDoug Rabson #include <sys/proc.h> 763d903220SDoug Rabson #include <sys/malloc.h> 773d903220SDoug Rabson #include <sys/mman.h> 7877409fe1SPoul-Henning Kamp #include <sys/module.h> 799dceb26bSJohn Baldwin #include <sys/mutex.h> 8068ba7a1dSTim J. Robbins #include <sys/resourcevar.h> 813d903220SDoug Rabson #include <sys/stat.h> 8278525ce3SAlfred Perlstein #include <sys/syscall.h> 83f130dcf2SMartin Blapp #include <sys/syscallsubr.h> 84725db531SBruce Evans #include <sys/sysent.h> 85fb919e4dSMark Murray #include <sys/sysproto.h> 86cb1f0db9SRobert Watson #include <sys/jail.h> 87aed55708SRobert Watson 88aed55708SRobert Watson #include <security/mac/mac_framework.h> 893d903220SDoug Rabson 903d903220SDoug Rabson #include <vm/vm.h> 91efeaf95aSDavid Greenman #include <vm/vm_param.h> 92efeaf95aSDavid Greenman #include <vm/pmap.h> 93a51f7119SJohn Dyson #include <vm/vm_object.h> 943d903220SDoug Rabson #include <vm/vm_map.h> 951c7c3c6aSMatthew Dillon #include <vm/vm_page.h> 96ae9b8c3aSJohn Dyson #include <vm/vm_pager.h> 973d903220SDoug Rabson 98a1c995b6SPoul-Henning Kamp static MALLOC_DEFINE(M_SHM, "shm", "SVID compatible shared memory segments"); 9955166637SPoul-Henning Kamp 1004d77a549SAlfred Perlstein static int shmget_allocate_segment(struct thread *td, 1014d77a549SAlfred Perlstein struct shmget_args *uap, int mode); 1024d77a549SAlfred Perlstein static int shmget_existing(struct thread *td, struct shmget_args *uap, 1034d77a549SAlfred Perlstein int mode, int segnum); 104725db531SBruce Evans 1053d903220SDoug Rabson #define SHMSEG_FREE 0x0200 1063d903220SDoug Rabson #define SHMSEG_REMOVED 0x0400 1073d903220SDoug Rabson #define SHMSEG_ALLOCATED 0x0800 1083d903220SDoug Rabson #define SHMSEG_WANTED 0x1000 1093d903220SDoug Rabson 11065067cc8SKonstantin Belousov static int shm_last_free, shm_nused, shmalloced; 11145329b60SKonstantin Belousov vm_size_t shm_committed; 112921d05b9SRobert Watson static struct shmid_kernel *shmsegs; 1133d903220SDoug Rabson 1143d903220SDoug Rabson struct shmmap_state { 1153d903220SDoug Rabson vm_offset_t va; 1163d903220SDoug Rabson int shmid; 1173d903220SDoug Rabson }; 1183d903220SDoug Rabson 119921d05b9SRobert Watson static void shm_deallocate_segment(struct shmid_kernel *); 1204d77a549SAlfred Perlstein static int shm_find_segment_by_key(key_t); 121921d05b9SRobert Watson static struct shmid_kernel *shm_find_segment_by_shmid(int); 122921d05b9SRobert Watson static struct shmid_kernel *shm_find_segment_by_shmidx(int); 1233db161e0SMatthew Dillon static int shm_delete_mapping(struct vmspace *vm, struct shmmap_state *); 1244d77a549SAlfred Perlstein static void shmrealloc(void); 1254d77a549SAlfred Perlstein static void shminit(void); 1264d77a549SAlfred Perlstein static int sysvshm_modload(struct module *, int, void *); 1274d77a549SAlfred Perlstein static int shmunload(void); 1283db161e0SMatthew Dillon static void shmexit_myhook(struct vmspace *vm); 1294d77a549SAlfred Perlstein static void shmfork_myhook(struct proc *p1, struct proc *p2); 1304d77a549SAlfred Perlstein static int sysctl_shmsegs(SYSCTL_HANDLER_ARGS); 131255108f3SPeter Wemm 132255108f3SPeter Wemm /* 133028f979dSDima Dorfman * Tuneable values. 134255108f3SPeter Wemm */ 135255108f3SPeter Wemm #ifndef SHMMAXPGS 136028f979dSDima Dorfman #define SHMMAXPGS 8192 /* Note: sysv shared memory is swap backed. */ 137255108f3SPeter Wemm #endif 138255108f3SPeter Wemm #ifndef SHMMAX 139255108f3SPeter Wemm #define SHMMAX (SHMMAXPGS*PAGE_SIZE) 140255108f3SPeter Wemm #endif 141255108f3SPeter Wemm #ifndef SHMMIN 142255108f3SPeter Wemm #define SHMMIN 1 143255108f3SPeter Wemm #endif 144255108f3SPeter Wemm #ifndef SHMMNI 1451766b2e5SMatthew Dillon #define SHMMNI 192 146255108f3SPeter Wemm #endif 147255108f3SPeter Wemm #ifndef SHMSEG 1481766b2e5SMatthew Dillon #define SHMSEG 128 149255108f3SPeter Wemm #endif 150255108f3SPeter Wemm #ifndef SHMALL 151255108f3SPeter Wemm #define SHMALL (SHMMAXPGS) 152255108f3SPeter Wemm #endif 153255108f3SPeter Wemm 154255108f3SPeter Wemm struct shminfo shminfo = { 155255108f3SPeter Wemm SHMMAX, 156255108f3SPeter Wemm SHMMIN, 157255108f3SPeter Wemm SHMMNI, 158255108f3SPeter Wemm SHMSEG, 159255108f3SPeter Wemm SHMALL 160255108f3SPeter Wemm }; 161255108f3SPeter Wemm 1628b03c8edSMatthew Dillon static int shm_use_phys; 1632332251cSMax Khon static int shm_allow_removed; 1648b03c8edSMatthew Dillon 1659baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmax, CTLFLAG_RW, &shminfo.shmmax, 0, 16684f85aedSChristian S.J. Peron "Maximum shared memory segment size"); 1679baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmin, CTLFLAG_RW, &shminfo.shmmin, 0, 16884f85aedSChristian S.J. Peron "Minimum shared memory segment size"); 1699baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmni, CTLFLAG_RDTUN, &shminfo.shmmni, 0, 17084f85aedSChristian S.J. Peron "Number of shared memory identifiers"); 1719baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmseg, CTLFLAG_RDTUN, &shminfo.shmseg, 0, 17284f85aedSChristian S.J. Peron "Number of segments per process"); 1739baea4b4SChristian S.J. Peron SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmall, CTLFLAG_RW, &shminfo.shmall, 0, 17484f85aedSChristian S.J. Peron "Maximum number of pages available for shared memory"); 175028f979dSDima Dorfman SYSCTL_INT(_kern_ipc, OID_AUTO, shm_use_phys, CTLFLAG_RW, 17684f85aedSChristian S.J. Peron &shm_use_phys, 0, "Enable/Disable locking of shared memory pages in core"); 1772332251cSMax Khon SYSCTL_INT(_kern_ipc, OID_AUTO, shm_allow_removed, CTLFLAG_RW, 17884f85aedSChristian S.J. Peron &shm_allow_removed, 0, 17984f85aedSChristian S.J. Peron "Enable/Disable attachment to attached segments marked for removal"); 180a723c4e1SDima Dorfman SYSCTL_PROC(_kern_ipc, OID_AUTO, shmsegs, CTLFLAG_RD, 18184f85aedSChristian S.J. Peron NULL, 0, sysctl_shmsegs, "", 18284f85aedSChristian S.J. Peron "Current number of shared memory segments allocated"); 1833d903220SDoug Rabson 1843d903220SDoug Rabson static int 1853d903220SDoug Rabson shm_find_segment_by_key(key) 1863d903220SDoug Rabson key_t key; 1873d903220SDoug Rabson { 1883d903220SDoug Rabson int i; 1893d903220SDoug Rabson 190255108f3SPeter Wemm for (i = 0; i < shmalloced; i++) 191921d05b9SRobert Watson if ((shmsegs[i].u.shm_perm.mode & SHMSEG_ALLOCATED) && 192921d05b9SRobert Watson shmsegs[i].u.shm_perm.key == key) 193b618bb96SAlfred Perlstein return (i); 194b618bb96SAlfred Perlstein return (-1); 1953d903220SDoug Rabson } 1963d903220SDoug Rabson 197921d05b9SRobert Watson static struct shmid_kernel * 1982332251cSMax Khon shm_find_segment_by_shmid(int shmid) 1993d903220SDoug Rabson { 2003d903220SDoug Rabson int segnum; 201921d05b9SRobert Watson struct shmid_kernel *shmseg; 2023d903220SDoug Rabson 2033d903220SDoug Rabson segnum = IPCID_TO_IX(shmid); 204255108f3SPeter Wemm if (segnum < 0 || segnum >= shmalloced) 205b618bb96SAlfred Perlstein return (NULL); 2063d903220SDoug Rabson shmseg = &shmsegs[segnum]; 207921d05b9SRobert Watson if ((shmseg->u.shm_perm.mode & SHMSEG_ALLOCATED) == 0 || 2082332251cSMax Khon (!shm_allow_removed && 209921d05b9SRobert Watson (shmseg->u.shm_perm.mode & SHMSEG_REMOVED) != 0) || 210921d05b9SRobert Watson shmseg->u.shm_perm.seq != IPCID_TO_SEQ(shmid)) 211b618bb96SAlfred Perlstein return (NULL); 212b618bb96SAlfred Perlstein return (shmseg); 2133d903220SDoug Rabson } 2143d903220SDoug Rabson 215921d05b9SRobert Watson static struct shmid_kernel * 2162332251cSMax Khon shm_find_segment_by_shmidx(int segnum) 217491dec93SMichael Reifenberger { 218921d05b9SRobert Watson struct shmid_kernel *shmseg; 219491dec93SMichael Reifenberger 220491dec93SMichael Reifenberger if (segnum < 0 || segnum >= shmalloced) 221b618bb96SAlfred Perlstein return (NULL); 222491dec93SMichael Reifenberger shmseg = &shmsegs[segnum]; 223921d05b9SRobert Watson if ((shmseg->u.shm_perm.mode & SHMSEG_ALLOCATED) == 0 || 2242332251cSMax Khon (!shm_allow_removed && 225921d05b9SRobert Watson (shmseg->u.shm_perm.mode & SHMSEG_REMOVED) != 0)) 226b618bb96SAlfred Perlstein return (NULL); 227b618bb96SAlfred Perlstein return (shmseg); 228491dec93SMichael Reifenberger } 229491dec93SMichael Reifenberger 2303d903220SDoug Rabson static void 2313d903220SDoug Rabson shm_deallocate_segment(shmseg) 232921d05b9SRobert Watson struct shmid_kernel *shmseg; 2333d903220SDoug Rabson { 23445329b60SKonstantin Belousov vm_size_t size; 2353d903220SDoug Rabson 2360cddd8f0SMatthew Dillon GIANT_REQUIRED; 2370cddd8f0SMatthew Dillon 238b648d480SJohn Baldwin vm_object_deallocate(shmseg->object); 239b648d480SJohn Baldwin shmseg->object = NULL; 240b648d480SJohn Baldwin size = round_page(shmseg->u.shm_segsz); 2413d903220SDoug Rabson shm_committed -= btoc(size); 2423d903220SDoug Rabson shm_nused--; 243921d05b9SRobert Watson shmseg->u.shm_perm.mode = SHMSEG_FREE; 24414cedfc8SRobert Watson #ifdef MAC 24530d239bcSRobert Watson mac_sysvshm_cleanup(shmseg); 24614cedfc8SRobert Watson #endif 2473d903220SDoug Rabson } 2483d903220SDoug Rabson 2493d903220SDoug Rabson static int 2503db161e0SMatthew Dillon shm_delete_mapping(struct vmspace *vm, struct shmmap_state *shmmap_s) 2513d903220SDoug Rabson { 252921d05b9SRobert Watson struct shmid_kernel *shmseg; 2533d903220SDoug Rabson int segnum, result; 25445329b60SKonstantin Belousov vm_size_t size; 2553d903220SDoug Rabson 2560cddd8f0SMatthew Dillon GIANT_REQUIRED; 257028f979dSDima Dorfman 2583d903220SDoug Rabson segnum = IPCID_TO_IX(shmmap_s->shmid); 2593d903220SDoug Rabson shmseg = &shmsegs[segnum]; 260b648d480SJohn Baldwin size = round_page(shmseg->u.shm_segsz); 2613db161e0SMatthew Dillon result = vm_map_remove(&vm->vm_map, shmmap_s->va, shmmap_s->va + size); 2623d903220SDoug Rabson if (result != KERN_SUCCESS) 263b618bb96SAlfred Perlstein return (EINVAL); 2643d903220SDoug Rabson shmmap_s->shmid = -1; 265921d05b9SRobert Watson shmseg->u.shm_dtime = time_second; 266921d05b9SRobert Watson if ((--shmseg->u.shm_nattch <= 0) && 267921d05b9SRobert Watson (shmseg->u.shm_perm.mode & SHMSEG_REMOVED)) { 2683d903220SDoug Rabson shm_deallocate_segment(shmseg); 2693d903220SDoug Rabson shm_last_free = segnum; 2703d903220SDoug Rabson } 271b618bb96SAlfred Perlstein return (0); 2723d903220SDoug Rabson } 2733d903220SDoug Rabson 274b5d5c0c9SPeter Wemm #ifndef _SYS_SYSPROTO_H_ 2753d903220SDoug Rabson struct shmdt_args { 276e1d7d0bbSAlfred Perlstein const void *shmaddr; 2773d903220SDoug Rabson }; 278b5d5c0c9SPeter Wemm #endif 2793d903220SDoug Rabson int 280b40ce416SJulian Elischer shmdt(td, uap) 281b40ce416SJulian Elischer struct thread *td; 2823d903220SDoug Rabson struct shmdt_args *uap; 2833d903220SDoug Rabson { 284b40ce416SJulian Elischer struct proc *p = td->td_proc; 2853d903220SDoug Rabson struct shmmap_state *shmmap_s; 28614cedfc8SRobert Watson #ifdef MAC 28714cedfc8SRobert Watson struct shmid_kernel *shmsegptr; 28814cedfc8SRobert Watson #endif 2893d903220SDoug Rabson int i; 290b6a4b4f9SMatthew Dillon int error = 0; 2913d903220SDoug Rabson 2920304c731SJamie Gritton if (!prison_allow(td->td_ucred, PR_ALLOW_SYSVIPC)) 293c6f55f33SJohn Baldwin return (ENOSYS); 294b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 2958209f090SAlfred Perlstein shmmap_s = p->p_vmspace->vm_shm; 296b6a4b4f9SMatthew Dillon if (shmmap_s == NULL) { 297b6a4b4f9SMatthew Dillon error = EINVAL; 298b6a4b4f9SMatthew Dillon goto done2; 299b6a4b4f9SMatthew Dillon } 300b6a4b4f9SMatthew Dillon for (i = 0; i < shminfo.shmseg; i++, shmmap_s++) { 3013d903220SDoug Rabson if (shmmap_s->shmid != -1 && 302b6a4b4f9SMatthew Dillon shmmap_s->va == (vm_offset_t)uap->shmaddr) { 3033d903220SDoug Rabson break; 304b6a4b4f9SMatthew Dillon } 305b6a4b4f9SMatthew Dillon } 306b6a4b4f9SMatthew Dillon if (i == shminfo.shmseg) { 307b6a4b4f9SMatthew Dillon error = EINVAL; 308b6a4b4f9SMatthew Dillon goto done2; 309b6a4b4f9SMatthew Dillon } 31014cedfc8SRobert Watson #ifdef MAC 31114cedfc8SRobert Watson shmsegptr = &shmsegs[IPCID_TO_IX(shmmap_s->shmid)]; 31230d239bcSRobert Watson error = mac_sysvshm_check_shmdt(td->td_ucred, shmsegptr); 313f50c4fd8SRobert Watson if (error != 0) 31414cedfc8SRobert Watson goto done2; 31514cedfc8SRobert Watson #endif 3163db161e0SMatthew Dillon error = shm_delete_mapping(p->p_vmspace, shmmap_s); 317b6a4b4f9SMatthew Dillon done2: 318b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 319b6a4b4f9SMatthew Dillon return (error); 3203d903220SDoug Rabson } 3213d903220SDoug Rabson 322b5d5c0c9SPeter Wemm #ifndef _SYS_SYSPROTO_H_ 3233d903220SDoug Rabson struct shmat_args { 3243d903220SDoug Rabson int shmid; 325e1d7d0bbSAlfred Perlstein const void *shmaddr; 3263d903220SDoug Rabson int shmflg; 3273d903220SDoug Rabson }; 328b5d5c0c9SPeter Wemm #endif 3293d903220SDoug Rabson int 3302332251cSMax Khon kern_shmat(td, shmid, shmaddr, shmflg) 331b40ce416SJulian Elischer struct thread *td; 332f130dcf2SMartin Blapp int shmid; 333f130dcf2SMartin Blapp const void *shmaddr; 334f130dcf2SMartin Blapp int shmflg; 3353d903220SDoug Rabson { 336b40ce416SJulian Elischer struct proc *p = td->td_proc; 337b6a4b4f9SMatthew Dillon int i, flags; 338921d05b9SRobert Watson struct shmid_kernel *shmseg; 3393d903220SDoug Rabson struct shmmap_state *shmmap_s = NULL; 3403d903220SDoug Rabson vm_offset_t attach_va; 3413d903220SDoug Rabson vm_prot_t prot; 3423d903220SDoug Rabson vm_size_t size; 343a51f7119SJohn Dyson int rv; 344b6a4b4f9SMatthew Dillon int error = 0; 3453d903220SDoug Rabson 3460304c731SJamie Gritton if (!prison_allow(td->td_ucred, PR_ALLOW_SYSVIPC)) 347c6f55f33SJohn Baldwin return (ENOSYS); 348b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 3498209f090SAlfred Perlstein shmmap_s = p->p_vmspace->vm_shm; 3503d903220SDoug Rabson if (shmmap_s == NULL) { 35145329b60SKonstantin Belousov shmmap_s = malloc(shminfo.shmseg * sizeof(struct shmmap_state), 35245329b60SKonstantin Belousov M_SHM, M_WAITOK); 3533d903220SDoug Rabson for (i = 0; i < shminfo.shmseg; i++) 3543d903220SDoug Rabson shmmap_s[i].shmid = -1; 3552cc593fdSAlfred Perlstein p->p_vmspace->vm_shm = shmmap_s; 3563d903220SDoug Rabson } 3572332251cSMax Khon shmseg = shm_find_segment_by_shmid(shmid); 358b6a4b4f9SMatthew Dillon if (shmseg == NULL) { 359b6a4b4f9SMatthew Dillon error = EINVAL; 360b6a4b4f9SMatthew Dillon goto done2; 361b6a4b4f9SMatthew Dillon } 362921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, 363f130dcf2SMartin Blapp (shmflg & SHM_RDONLY) ? IPC_R : IPC_R|IPC_W); 364797f2d22SPoul-Henning Kamp if (error) 365b6a4b4f9SMatthew Dillon goto done2; 36614cedfc8SRobert Watson #ifdef MAC 36730d239bcSRobert Watson error = mac_sysvshm_check_shmat(td->td_ucred, shmseg, shmflg); 368f50c4fd8SRobert Watson if (error != 0) 36914cedfc8SRobert Watson goto done2; 37014cedfc8SRobert Watson #endif 3713d903220SDoug Rabson for (i = 0; i < shminfo.shmseg; i++) { 3723d903220SDoug Rabson if (shmmap_s->shmid == -1) 3733d903220SDoug Rabson break; 3743d903220SDoug Rabson shmmap_s++; 3753d903220SDoug Rabson } 376b6a4b4f9SMatthew Dillon if (i >= shminfo.shmseg) { 377b6a4b4f9SMatthew Dillon error = EMFILE; 378b6a4b4f9SMatthew Dillon goto done2; 379b6a4b4f9SMatthew Dillon } 380b648d480SJohn Baldwin size = round_page(shmseg->u.shm_segsz); 3813d903220SDoug Rabson prot = VM_PROT_READ; 382f130dcf2SMartin Blapp if ((shmflg & SHM_RDONLY) == 0) 3833d903220SDoug Rabson prot |= VM_PROT_WRITE; 3843d903220SDoug Rabson flags = MAP_ANON | MAP_SHARED; 385f130dcf2SMartin Blapp if (shmaddr) { 3863d903220SDoug Rabson flags |= MAP_FIXED; 387f130dcf2SMartin Blapp if (shmflg & SHM_RND) { 388f130dcf2SMartin Blapp attach_va = (vm_offset_t)shmaddr & ~(SHMLBA-1); 389f130dcf2SMartin Blapp } else if (((vm_offset_t)shmaddr & (SHMLBA-1)) == 0) { 390f130dcf2SMartin Blapp attach_va = (vm_offset_t)shmaddr; 391b6a4b4f9SMatthew Dillon } else { 392b6a4b4f9SMatthew Dillon error = EINVAL; 393b6a4b4f9SMatthew Dillon goto done2; 394b6a4b4f9SMatthew Dillon } 3953d903220SDoug Rabson } else { 396028f979dSDima Dorfman /* 397028f979dSDima Dorfman * This is just a hint to vm_map_find() about where to 398028f979dSDima Dorfman * put it. 399028f979dSDima Dorfman */ 40068ba7a1dSTim J. Robbins PROC_LOCK(p); 40168ba7a1dSTim J. Robbins attach_va = round_page((vm_offset_t)p->p_vmspace->vm_daddr + 40268ba7a1dSTim J. Robbins lim_max(p, RLIMIT_DATA)); 40368ba7a1dSTim J. Robbins PROC_UNLOCK(p); 4043d903220SDoug Rabson } 405a51f7119SJohn Dyson 406b648d480SJohn Baldwin vm_object_reference(shmseg->object); 407b648d480SJohn Baldwin rv = vm_map_find(&p->p_vmspace->vm_map, shmseg->object, 40865067cc8SKonstantin Belousov 0, &attach_va, size, (flags & MAP_FIXED) ? VMFS_NO_SPACE : 40965067cc8SKonstantin Belousov VMFS_ANY_SPACE, prot, prot, 0); 410a51f7119SJohn Dyson if (rv != KERN_SUCCESS) { 411b648d480SJohn Baldwin vm_object_deallocate(shmseg->object); 412b6a4b4f9SMatthew Dillon error = ENOMEM; 413b6a4b4f9SMatthew Dillon goto done2; 414a51f7119SJohn Dyson } 4150463028cSJohn Dyson vm_map_inherit(&p->p_vmspace->vm_map, 4160463028cSJohn Dyson attach_va, attach_va + size, VM_INHERIT_SHARE); 4170463028cSJohn Dyson 4183d903220SDoug Rabson shmmap_s->va = attach_va; 419f130dcf2SMartin Blapp shmmap_s->shmid = shmid; 420921d05b9SRobert Watson shmseg->u.shm_lpid = p->p_pid; 421921d05b9SRobert Watson shmseg->u.shm_atime = time_second; 422921d05b9SRobert Watson shmseg->u.shm_nattch++; 423b40ce416SJulian Elischer td->td_retval[0] = attach_va; 424b6a4b4f9SMatthew Dillon done2: 425b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 426b6a4b4f9SMatthew Dillon return (error); 4273d903220SDoug Rabson } 4283d903220SDoug Rabson 429f130dcf2SMartin Blapp int 430f130dcf2SMartin Blapp shmat(td, uap) 431f130dcf2SMartin Blapp struct thread *td; 432f130dcf2SMartin Blapp struct shmat_args *uap; 433f130dcf2SMartin Blapp { 4342332251cSMax Khon return kern_shmat(td, uap->shmid, uap->shmaddr, uap->shmflg); 435f130dcf2SMartin Blapp } 436f130dcf2SMartin Blapp 4373d903220SDoug Rabson int 4382332251cSMax Khon kern_shmctl(td, shmid, cmd, buf, bufsz) 439b40ce416SJulian Elischer struct thread *td; 440f130dcf2SMartin Blapp int shmid; 441f130dcf2SMartin Blapp int cmd; 442f130dcf2SMartin Blapp void *buf; 443f130dcf2SMartin Blapp size_t *bufsz; 4443d903220SDoug Rabson { 445b6a4b4f9SMatthew Dillon int error = 0; 446921d05b9SRobert Watson struct shmid_kernel *shmseg; 4473d903220SDoug Rabson 4480304c731SJamie Gritton if (!prison_allow(td->td_ucred, PR_ALLOW_SYSVIPC)) 449c6f55f33SJohn Baldwin return (ENOSYS); 450f130dcf2SMartin Blapp 451b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 452f130dcf2SMartin Blapp switch (cmd) { 4534f18813fSChristian S.J. Peron /* 4544f18813fSChristian S.J. Peron * It is possible that kern_shmctl is being called from the Linux ABI 4554f18813fSChristian S.J. Peron * layer, in which case, we will need to implement IPC_INFO. It should 4564f18813fSChristian S.J. Peron * be noted that other shmctl calls will be funneled through here for 4574f18813fSChristian S.J. Peron * Linix binaries as well. 4584f18813fSChristian S.J. Peron * 4594f18813fSChristian S.J. Peron * NB: The Linux ABI layer will convert this data to structure(s) more 4604f18813fSChristian S.J. Peron * consistent with the Linux ABI. 4614f18813fSChristian S.J. Peron */ 462491dec93SMichael Reifenberger case IPC_INFO: 463f130dcf2SMartin Blapp memcpy(buf, &shminfo, sizeof(shminfo)); 464f130dcf2SMartin Blapp if (bufsz) 465f130dcf2SMartin Blapp *bufsz = sizeof(shminfo); 466491dec93SMichael Reifenberger td->td_retval[0] = shmalloced; 467491dec93SMichael Reifenberger goto done2; 468491dec93SMichael Reifenberger case SHM_INFO: { 469491dec93SMichael Reifenberger struct shm_info shm_info; 470491dec93SMichael Reifenberger shm_info.used_ids = shm_nused; 471491dec93SMichael Reifenberger shm_info.shm_rss = 0; /*XXX where to get from ? */ 472491dec93SMichael Reifenberger shm_info.shm_tot = 0; /*XXX where to get from ? */ 473491dec93SMichael Reifenberger shm_info.shm_swp = 0; /*XXX where to get from ? */ 474491dec93SMichael Reifenberger shm_info.swap_attempts = 0; /*XXX where to get from ? */ 475491dec93SMichael Reifenberger shm_info.swap_successes = 0; /*XXX where to get from ? */ 476f130dcf2SMartin Blapp memcpy(buf, &shm_info, sizeof(shm_info)); 477f130dcf2SMartin Blapp if (bufsz) 478f130dcf2SMartin Blapp *bufsz = sizeof(shm_info); 479491dec93SMichael Reifenberger td->td_retval[0] = shmalloced; 480491dec93SMichael Reifenberger goto done2; 481491dec93SMichael Reifenberger } 482491dec93SMichael Reifenberger } 483f130dcf2SMartin Blapp if (cmd == SHM_STAT) 4842332251cSMax Khon shmseg = shm_find_segment_by_shmidx(shmid); 485491dec93SMichael Reifenberger else 4862332251cSMax Khon shmseg = shm_find_segment_by_shmid(shmid); 487b6a4b4f9SMatthew Dillon if (shmseg == NULL) { 488b6a4b4f9SMatthew Dillon error = EINVAL; 489b6a4b4f9SMatthew Dillon goto done2; 490b6a4b4f9SMatthew Dillon } 49114cedfc8SRobert Watson #ifdef MAC 49230d239bcSRobert Watson error = mac_sysvshm_check_shmctl(td->td_ucred, shmseg, cmd); 493f50c4fd8SRobert Watson if (error != 0) 49414cedfc8SRobert Watson goto done2; 49514cedfc8SRobert Watson #endif 496f130dcf2SMartin Blapp switch (cmd) { 497491dec93SMichael Reifenberger case SHM_STAT: 4983d903220SDoug Rabson case IPC_STAT: 499921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, IPC_R); 500797f2d22SPoul-Henning Kamp if (error) 501b6a4b4f9SMatthew Dillon goto done2; 502921d05b9SRobert Watson memcpy(buf, &shmseg->u, sizeof(struct shmid_ds)); 503f130dcf2SMartin Blapp if (bufsz) 504f130dcf2SMartin Blapp *bufsz = sizeof(struct shmid_ds); 505f130dcf2SMartin Blapp if (cmd == SHM_STAT) 506921d05b9SRobert Watson td->td_retval[0] = IXSEQ_TO_IPCID(shmid, shmseg->u.shm_perm); 5073d903220SDoug Rabson break; 508f130dcf2SMartin Blapp case IPC_SET: { 509f130dcf2SMartin Blapp struct shmid_ds *shmid; 510f130dcf2SMartin Blapp 511f130dcf2SMartin Blapp shmid = (struct shmid_ds *)buf; 512921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, IPC_M); 513797f2d22SPoul-Henning Kamp if (error) 514b6a4b4f9SMatthew Dillon goto done2; 515921d05b9SRobert Watson shmseg->u.shm_perm.uid = shmid->shm_perm.uid; 516921d05b9SRobert Watson shmseg->u.shm_perm.gid = shmid->shm_perm.gid; 517921d05b9SRobert Watson shmseg->u.shm_perm.mode = 518921d05b9SRobert Watson (shmseg->u.shm_perm.mode & ~ACCESSPERMS) | 519f130dcf2SMartin Blapp (shmid->shm_perm.mode & ACCESSPERMS); 520921d05b9SRobert Watson shmseg->u.shm_ctime = time_second; 5213d903220SDoug Rabson break; 522f130dcf2SMartin Blapp } 5233d903220SDoug Rabson case IPC_RMID: 524921d05b9SRobert Watson error = ipcperm(td, &shmseg->u.shm_perm, IPC_M); 525797f2d22SPoul-Henning Kamp if (error) 526b6a4b4f9SMatthew Dillon goto done2; 527921d05b9SRobert Watson shmseg->u.shm_perm.key = IPC_PRIVATE; 528921d05b9SRobert Watson shmseg->u.shm_perm.mode |= SHMSEG_REMOVED; 529921d05b9SRobert Watson if (shmseg->u.shm_nattch <= 0) { 5303d903220SDoug Rabson shm_deallocate_segment(shmseg); 531f130dcf2SMartin Blapp shm_last_free = IPCID_TO_IX(shmid); 5323d903220SDoug Rabson } 5333d903220SDoug Rabson break; 5343d903220SDoug Rabson #if 0 5353d903220SDoug Rabson case SHM_LOCK: 5363d903220SDoug Rabson case SHM_UNLOCK: 5373d903220SDoug Rabson #endif 5383d903220SDoug Rabson default: 539b6a4b4f9SMatthew Dillon error = EINVAL; 540b6a4b4f9SMatthew Dillon break; 5413d903220SDoug Rabson } 542b6a4b4f9SMatthew Dillon done2: 543b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 544b6a4b4f9SMatthew Dillon return (error); 5453d903220SDoug Rabson } 5463d903220SDoug Rabson 54771361470SJohn Baldwin #ifndef _SYS_SYSPROTO_H_ 54871361470SJohn Baldwin struct shmctl_args { 54971361470SJohn Baldwin int shmid; 55071361470SJohn Baldwin int cmd; 55171361470SJohn Baldwin struct shmid_ds *buf; 55271361470SJohn Baldwin }; 55371361470SJohn Baldwin #endif 554f130dcf2SMartin Blapp int 555f130dcf2SMartin Blapp shmctl(td, uap) 556f130dcf2SMartin Blapp struct thread *td; 557f130dcf2SMartin Blapp struct shmctl_args *uap; 558f130dcf2SMartin Blapp { 559f130dcf2SMartin Blapp int error = 0; 560f130dcf2SMartin Blapp struct shmid_ds buf; 561f130dcf2SMartin Blapp size_t bufsz; 562f130dcf2SMartin Blapp 5634f18813fSChristian S.J. Peron /* 5644f18813fSChristian S.J. Peron * The only reason IPC_INFO, SHM_INFO, SHM_STAT exists is to support 5654f18813fSChristian S.J. Peron * Linux binaries. If we see the call come through the FreeBSD ABI, 5664f18813fSChristian S.J. Peron * return an error back to the user since we do not to support this. 5674f18813fSChristian S.J. Peron */ 5684f18813fSChristian S.J. Peron if (uap->cmd == IPC_INFO || uap->cmd == SHM_INFO || 5694f18813fSChristian S.J. Peron uap->cmd == SHM_STAT) 5704f18813fSChristian S.J. Peron return (EINVAL); 5714f18813fSChristian S.J. Peron 572f130dcf2SMartin Blapp /* IPC_SET needs to copyin the buffer before calling kern_shmctl */ 573f130dcf2SMartin Blapp if (uap->cmd == IPC_SET) { 574f130dcf2SMartin Blapp if ((error = copyin(uap->buf, &buf, sizeof(struct shmid_ds)))) 575f130dcf2SMartin Blapp goto done; 576f130dcf2SMartin Blapp } 577f130dcf2SMartin Blapp 5782332251cSMax Khon error = kern_shmctl(td, uap->shmid, uap->cmd, (void *)&buf, &bufsz); 579f130dcf2SMartin Blapp if (error) 580f130dcf2SMartin Blapp goto done; 581f130dcf2SMartin Blapp 582f130dcf2SMartin Blapp /* Cases in which we need to copyout */ 583f130dcf2SMartin Blapp switch (uap->cmd) { 584f130dcf2SMartin Blapp case IPC_STAT: 585f130dcf2SMartin Blapp error = copyout(&buf, uap->buf, bufsz); 586f130dcf2SMartin Blapp break; 587f130dcf2SMartin Blapp } 588f130dcf2SMartin Blapp 589f130dcf2SMartin Blapp done: 590f130dcf2SMartin Blapp if (error) { 591f130dcf2SMartin Blapp /* Invalidate the return value */ 592f130dcf2SMartin Blapp td->td_retval[0] = -1; 593f130dcf2SMartin Blapp } 594f130dcf2SMartin Blapp return (error); 595f130dcf2SMartin Blapp } 596f130dcf2SMartin Blapp 597f130dcf2SMartin Blapp 5983d903220SDoug Rabson static int 599b40ce416SJulian Elischer shmget_existing(td, uap, mode, segnum) 600b40ce416SJulian Elischer struct thread *td; 6013d903220SDoug Rabson struct shmget_args *uap; 6023d903220SDoug Rabson int mode; 6033d903220SDoug Rabson int segnum; 6043d903220SDoug Rabson { 605921d05b9SRobert Watson struct shmid_kernel *shmseg; 6063d903220SDoug Rabson int error; 6073d903220SDoug Rabson 6083d903220SDoug Rabson shmseg = &shmsegs[segnum]; 609921d05b9SRobert Watson if (shmseg->u.shm_perm.mode & SHMSEG_REMOVED) { 6103d903220SDoug Rabson /* 6113d903220SDoug Rabson * This segment is in the process of being allocated. Wait 6123d903220SDoug Rabson * until it's done, and look the key up again (in case the 6133d903220SDoug Rabson * allocation failed or it was freed). 6143d903220SDoug Rabson */ 615921d05b9SRobert Watson shmseg->u.shm_perm.mode |= SHMSEG_WANTED; 6162cc593fdSAlfred Perlstein error = tsleep(shmseg, PLOCK | PCATCH, "shmget", 0); 617797f2d22SPoul-Henning Kamp if (error) 618b618bb96SAlfred Perlstein return (error); 619b618bb96SAlfred Perlstein return (EAGAIN); 6203d903220SDoug Rabson } 621dc92aa57SAlan Cox if ((uap->shmflg & (IPC_CREAT | IPC_EXCL)) == (IPC_CREAT | IPC_EXCL)) 622b618bb96SAlfred Perlstein return (EEXIST); 62314cedfc8SRobert Watson #ifdef MAC 62430d239bcSRobert Watson error = mac_sysvshm_check_shmget(td->td_ucred, shmseg, uap->shmflg); 625f50c4fd8SRobert Watson if (error != 0) 6267723d5edSRobert Watson return (error); 62714cedfc8SRobert Watson #endif 628b648d480SJohn Baldwin if (uap->size != 0 && uap->size > shmseg->u.shm_segsz) 629b618bb96SAlfred Perlstein return (EINVAL); 630921d05b9SRobert Watson td->td_retval[0] = IXSEQ_TO_IPCID(segnum, shmseg->u.shm_perm); 631b618bb96SAlfred Perlstein return (0); 6323d903220SDoug Rabson } 6333d903220SDoug Rabson 6343d903220SDoug Rabson static int 635b40ce416SJulian Elischer shmget_allocate_segment(td, uap, mode) 636b40ce416SJulian Elischer struct thread *td; 6373d903220SDoug Rabson struct shmget_args *uap; 6383d903220SDoug Rabson int mode; 6393d903220SDoug Rabson { 64065067cc8SKonstantin Belousov int i, segnum, shmid; 64165067cc8SKonstantin Belousov size_t size; 642a854ed98SJohn Baldwin struct ucred *cred = td->td_ucred; 643921d05b9SRobert Watson struct shmid_kernel *shmseg; 6440049f8b2SAlan Cox vm_object_t shm_object; 6453d903220SDoug Rabson 6460cddd8f0SMatthew Dillon GIANT_REQUIRED; 6470cddd8f0SMatthew Dillon 6483d903220SDoug Rabson if (uap->size < shminfo.shmmin || uap->size > shminfo.shmmax) 649b618bb96SAlfred Perlstein return (EINVAL); 650028f979dSDima Dorfman if (shm_nused >= shminfo.shmmni) /* Any shmids left? */ 651b618bb96SAlfred Perlstein return (ENOSPC); 6529e609ddeSJoerg Wunsch size = round_page(uap->size); 6533d903220SDoug Rabson if (shm_committed + btoc(size) > shminfo.shmall) 654b618bb96SAlfred Perlstein return (ENOMEM); 6553d903220SDoug Rabson if (shm_last_free < 0) { 656028f979dSDima Dorfman shmrealloc(); /* Maybe expand the shmsegs[] array. */ 657255108f3SPeter Wemm for (i = 0; i < shmalloced; i++) 658921d05b9SRobert Watson if (shmsegs[i].u.shm_perm.mode & SHMSEG_FREE) 6593d903220SDoug Rabson break; 660255108f3SPeter Wemm if (i == shmalloced) 661b618bb96SAlfred Perlstein return (ENOSPC); 6623d903220SDoug Rabson segnum = i; 6633d903220SDoug Rabson } else { 6643d903220SDoug Rabson segnum = shm_last_free; 6653d903220SDoug Rabson shm_last_free = -1; 6663d903220SDoug Rabson } 6673d903220SDoug Rabson shmseg = &shmsegs[segnum]; 6683d903220SDoug Rabson /* 6693d903220SDoug Rabson * In case we sleep in malloc(), mark the segment present but deleted 6703d903220SDoug Rabson * so that noone else tries to create the same key. 6713d903220SDoug Rabson */ 672921d05b9SRobert Watson shmseg->u.shm_perm.mode = SHMSEG_ALLOCATED | SHMSEG_REMOVED; 673921d05b9SRobert Watson shmseg->u.shm_perm.key = uap->key; 674921d05b9SRobert Watson shmseg->u.shm_perm.seq = (shmseg->u.shm_perm.seq + 1) & 0x7fff; 675921d05b9SRobert Watson shmid = IXSEQ_TO_IPCID(segnum, shmseg->u.shm_perm); 676a51f7119SJohn Dyson 677ae9b8c3aSJohn Dyson /* 678ae9b8c3aSJohn Dyson * We make sure that we have allocated a pager before we need 679ae9b8c3aSJohn Dyson * to. 680ae9b8c3aSJohn Dyson */ 6813364c323SKonstantin Belousov shm_object = vm_pager_allocate(shm_use_phys ? OBJT_PHYS : OBJT_SWAP, 6823364c323SKonstantin Belousov 0, size, VM_PROT_DEFAULT, 0, cred); 6833364c323SKonstantin Belousov if (shm_object == NULL) 6843364c323SKonstantin Belousov return (ENOMEM); 6850049f8b2SAlan Cox VM_OBJECT_LOCK(shm_object); 6860049f8b2SAlan Cox vm_object_clear_flag(shm_object, OBJ_ONEMAPPING); 6870049f8b2SAlan Cox vm_object_set_flag(shm_object, OBJ_NOSPLIT); 6880049f8b2SAlan Cox VM_OBJECT_UNLOCK(shm_object); 689cbd8ec09SJohn Dyson 690b648d480SJohn Baldwin shmseg->object = shm_object; 691921d05b9SRobert Watson shmseg->u.shm_perm.cuid = shmseg->u.shm_perm.uid = cred->cr_uid; 692921d05b9SRobert Watson shmseg->u.shm_perm.cgid = shmseg->u.shm_perm.gid = cred->cr_gid; 693921d05b9SRobert Watson shmseg->u.shm_perm.mode = (shmseg->u.shm_perm.mode & SHMSEG_WANTED) | 6943d903220SDoug Rabson (mode & ACCESSPERMS) | SHMSEG_ALLOCATED; 695921d05b9SRobert Watson shmseg->u.shm_segsz = uap->size; 696921d05b9SRobert Watson shmseg->u.shm_cpid = td->td_proc->p_pid; 697921d05b9SRobert Watson shmseg->u.shm_lpid = shmseg->u.shm_nattch = 0; 698921d05b9SRobert Watson shmseg->u.shm_atime = shmseg->u.shm_dtime = 0; 69914cedfc8SRobert Watson #ifdef MAC 70030d239bcSRobert Watson mac_sysvshm_create(cred, shmseg); 70114cedfc8SRobert Watson #endif 702921d05b9SRobert Watson shmseg->u.shm_ctime = time_second; 7033d903220SDoug Rabson shm_committed += btoc(size); 7043d903220SDoug Rabson shm_nused++; 705921d05b9SRobert Watson if (shmseg->u.shm_perm.mode & SHMSEG_WANTED) { 7063d903220SDoug Rabson /* 7073d903220SDoug Rabson * Somebody else wanted this key while we were asleep. Wake 7083d903220SDoug Rabson * them up now. 7093d903220SDoug Rabson */ 710921d05b9SRobert Watson shmseg->u.shm_perm.mode &= ~SHMSEG_WANTED; 7112cc593fdSAlfred Perlstein wakeup(shmseg); 7123d903220SDoug Rabson } 713b40ce416SJulian Elischer td->td_retval[0] = shmid; 714b618bb96SAlfred Perlstein return (0); 7153d903220SDoug Rabson } 7163d903220SDoug Rabson 71771361470SJohn Baldwin #ifndef _SYS_SYSPROTO_H_ 71871361470SJohn Baldwin struct shmget_args { 71971361470SJohn Baldwin key_t key; 72071361470SJohn Baldwin size_t size; 72171361470SJohn Baldwin int shmflg; 72271361470SJohn Baldwin }; 72371361470SJohn Baldwin #endif 7243d903220SDoug Rabson int 725b40ce416SJulian Elischer shmget(td, uap) 726b40ce416SJulian Elischer struct thread *td; 7273d903220SDoug Rabson struct shmget_args *uap; 7283d903220SDoug Rabson { 729b6a4b4f9SMatthew Dillon int segnum, mode; 730b6a4b4f9SMatthew Dillon int error; 7313d903220SDoug Rabson 7320304c731SJamie Gritton if (!prison_allow(td->td_ucred, PR_ALLOW_SYSVIPC)) 733c6f55f33SJohn Baldwin return (ENOSYS); 734b6a4b4f9SMatthew Dillon mtx_lock(&Giant); 7353d903220SDoug Rabson mode = uap->shmflg & ACCESSPERMS; 7363d903220SDoug Rabson if (uap->key != IPC_PRIVATE) { 7373d903220SDoug Rabson again: 7383d903220SDoug Rabson segnum = shm_find_segment_by_key(uap->key); 7393d903220SDoug Rabson if (segnum >= 0) { 740b40ce416SJulian Elischer error = shmget_existing(td, uap, mode, segnum); 7413d903220SDoug Rabson if (error == EAGAIN) 7423d903220SDoug Rabson goto again; 743b6a4b4f9SMatthew Dillon goto done2; 7443d903220SDoug Rabson } 745b6a4b4f9SMatthew Dillon if ((uap->shmflg & IPC_CREAT) == 0) { 746b6a4b4f9SMatthew Dillon error = ENOENT; 747b6a4b4f9SMatthew Dillon goto done2; 7483d903220SDoug Rabson } 749b6a4b4f9SMatthew Dillon } 750b40ce416SJulian Elischer error = shmget_allocate_segment(td, uap, mode); 751b6a4b4f9SMatthew Dillon done2: 752b6a4b4f9SMatthew Dillon mtx_unlock(&Giant); 753b6a4b4f9SMatthew Dillon return (error); 7543d903220SDoug Rabson } 7553d903220SDoug Rabson 75678525ce3SAlfred Perlstein static void 75778525ce3SAlfred Perlstein shmfork_myhook(p1, p2) 7583d903220SDoug Rabson struct proc *p1, *p2; 7593d903220SDoug Rabson { 7603d903220SDoug Rabson struct shmmap_state *shmmap_s; 7613d903220SDoug Rabson size_t size; 7623d903220SDoug Rabson int i; 7633d903220SDoug Rabson 76494ddc707SAlan Cox mtx_lock(&Giant); 7653d903220SDoug Rabson size = shminfo.shmseg * sizeof(struct shmmap_state); 766a163d034SWarner Losh shmmap_s = malloc(size, M_SHM, M_WAITOK); 7672cc593fdSAlfred Perlstein bcopy(p1->p_vmspace->vm_shm, shmmap_s, size); 7682cc593fdSAlfred Perlstein p2->p_vmspace->vm_shm = shmmap_s; 7693d903220SDoug Rabson for (i = 0; i < shminfo.shmseg; i++, shmmap_s++) 7703d903220SDoug Rabson if (shmmap_s->shmid != -1) 771921d05b9SRobert Watson shmsegs[IPCID_TO_IX(shmmap_s->shmid)].u.shm_nattch++; 77294ddc707SAlan Cox mtx_unlock(&Giant); 7733d903220SDoug Rabson } 7743d903220SDoug Rabson 77578525ce3SAlfred Perlstein static void 7763db161e0SMatthew Dillon shmexit_myhook(struct vmspace *vm) 7773d903220SDoug Rabson { 7783db161e0SMatthew Dillon struct shmmap_state *base, *shm; 7793d903220SDoug Rabson int i; 7803d903220SDoug Rabson 7813db161e0SMatthew Dillon if ((base = vm->vm_shm) != NULL) { 7823db161e0SMatthew Dillon vm->vm_shm = NULL; 7831a276a3fSAlan Cox mtx_lock(&Giant); 7843db161e0SMatthew Dillon for (i = 0, shm = base; i < shminfo.shmseg; i++, shm++) { 7853db161e0SMatthew Dillon if (shm->shmid != -1) 7863db161e0SMatthew Dillon shm_delete_mapping(vm, shm); 7873db161e0SMatthew Dillon } 7881a276a3fSAlan Cox mtx_unlock(&Giant); 7893db161e0SMatthew Dillon free(base, M_SHM); 7903db161e0SMatthew Dillon } 7913d903220SDoug Rabson } 7923d903220SDoug Rabson 793255108f3SPeter Wemm static void 794255108f3SPeter Wemm shmrealloc(void) 795255108f3SPeter Wemm { 796255108f3SPeter Wemm int i; 797921d05b9SRobert Watson struct shmid_kernel *newsegs; 798255108f3SPeter Wemm 799255108f3SPeter Wemm if (shmalloced >= shminfo.shmmni) 800255108f3SPeter Wemm return; 801255108f3SPeter Wemm 802a163d034SWarner Losh newsegs = malloc(shminfo.shmmni * sizeof(*newsegs), M_SHM, M_WAITOK); 803255108f3SPeter Wemm if (newsegs == NULL) 804255108f3SPeter Wemm return; 805255108f3SPeter Wemm for (i = 0; i < shmalloced; i++) 806255108f3SPeter Wemm bcopy(&shmsegs[i], &newsegs[i], sizeof(newsegs[0])); 807255108f3SPeter Wemm for (; i < shminfo.shmmni; i++) { 808921d05b9SRobert Watson shmsegs[i].u.shm_perm.mode = SHMSEG_FREE; 809921d05b9SRobert Watson shmsegs[i].u.shm_perm.seq = 0; 81014cedfc8SRobert Watson #ifdef MAC 81130d239bcSRobert Watson mac_sysvshm_init(&shmsegs[i]); 81214cedfc8SRobert Watson #endif 813255108f3SPeter Wemm } 814255108f3SPeter Wemm free(shmsegs, M_SHM); 815255108f3SPeter Wemm shmsegs = newsegs; 816255108f3SPeter Wemm shmalloced = shminfo.shmmni; 817255108f3SPeter Wemm } 818255108f3SPeter Wemm 819255108f3SPeter Wemm static void 82078525ce3SAlfred Perlstein shminit() 8213d903220SDoug Rabson { 8223d903220SDoug Rabson int i; 823255108f3SPeter Wemm 8244d9d1e82SRuslan Ermilov #ifndef BURN_BRIDGES 8254d9d1e82SRuslan Ermilov if (TUNABLE_ULONG_FETCH("kern.ipc.shmmaxpgs", &shminfo.shmall) != 0) 8264d9d1e82SRuslan Ermilov printf("kern.ipc.shmmaxpgs is now called kern.ipc.shmall!\n"); 8274d9d1e82SRuslan Ermilov #endif 8284d9d1e82SRuslan Ermilov TUNABLE_ULONG_FETCH("kern.ipc.shmall", &shminfo.shmall); 8294d9d1e82SRuslan Ermilov 8304d9d1e82SRuslan Ermilov /* Initialize shmmax dealing with possible overflow. */ 8319d4156aeSAlfred Perlstein for (i = PAGE_SIZE; i > 0; i--) { 832a4c24c66SJohn Baldwin shminfo.shmmax = shminfo.shmall * i; 8335015c68aSAlfred Perlstein if (shminfo.shmmax >= shminfo.shmall) 8345015c68aSAlfred Perlstein break; 8355015c68aSAlfred Perlstein } 8364d9d1e82SRuslan Ermilov 8379baea4b4SChristian S.J. Peron TUNABLE_ULONG_FETCH("kern.ipc.shmmin", &shminfo.shmmin); 8389baea4b4SChristian S.J. Peron TUNABLE_ULONG_FETCH("kern.ipc.shmmni", &shminfo.shmmni); 8399baea4b4SChristian S.J. Peron TUNABLE_ULONG_FETCH("kern.ipc.shmseg", &shminfo.shmseg); 840b3a4bc42SMichael Reifenberger TUNABLE_INT_FETCH("kern.ipc.shm_use_phys", &shm_use_phys); 841b3a4bc42SMichael Reifenberger 842255108f3SPeter Wemm shmalloced = shminfo.shmmni; 843a163d034SWarner Losh shmsegs = malloc(shmalloced * sizeof(shmsegs[0]), M_SHM, M_WAITOK); 844255108f3SPeter Wemm if (shmsegs == NULL) 845255108f3SPeter Wemm panic("cannot allocate initial memory for sysvshm"); 846255108f3SPeter Wemm for (i = 0; i < shmalloced; i++) { 847921d05b9SRobert Watson shmsegs[i].u.shm_perm.mode = SHMSEG_FREE; 848921d05b9SRobert Watson shmsegs[i].u.shm_perm.seq = 0; 84914cedfc8SRobert Watson #ifdef MAC 85030d239bcSRobert Watson mac_sysvshm_init(&shmsegs[i]); 85114cedfc8SRobert Watson #endif 8523d903220SDoug Rabson } 8533d903220SDoug Rabson shm_last_free = 0; 8543d903220SDoug Rabson shm_nused = 0; 8553d903220SDoug Rabson shm_committed = 0; 85678525ce3SAlfred Perlstein shmexit_hook = &shmexit_myhook; 85778525ce3SAlfred Perlstein shmfork_hook = &shmfork_myhook; 8583d903220SDoug Rabson } 85978525ce3SAlfred Perlstein 86078525ce3SAlfred Perlstein static int 86178525ce3SAlfred Perlstein shmunload() 86278525ce3SAlfred Perlstein { 86314cedfc8SRobert Watson #ifdef MAC 86414cedfc8SRobert Watson int i; 86514cedfc8SRobert Watson #endif 86678525ce3SAlfred Perlstein 86778525ce3SAlfred Perlstein if (shm_nused > 0) 86878525ce3SAlfred Perlstein return (EBUSY); 86978525ce3SAlfred Perlstein 87014cedfc8SRobert Watson #ifdef MAC 87114cedfc8SRobert Watson for (i = 0; i < shmalloced; i++) 87230d239bcSRobert Watson mac_sysvshm_destroy(&shmsegs[i]); 87314cedfc8SRobert Watson #endif 87478525ce3SAlfred Perlstein free(shmsegs, M_SHM); 87578525ce3SAlfred Perlstein shmexit_hook = NULL; 87678525ce3SAlfred Perlstein shmfork_hook = NULL; 87778525ce3SAlfred Perlstein return (0); 87878525ce3SAlfred Perlstein } 87978525ce3SAlfred Perlstein 88078525ce3SAlfred Perlstein static int 881a723c4e1SDima Dorfman sysctl_shmsegs(SYSCTL_HANDLER_ARGS) 882a723c4e1SDima Dorfman { 883a723c4e1SDima Dorfman 884a723c4e1SDima Dorfman return (SYSCTL_OUT(req, shmsegs, shmalloced * sizeof(shmsegs[0]))); 885a723c4e1SDima Dorfman } 886a723c4e1SDima Dorfman 88745f48220SJohn Baldwin #if defined(__i386__) && (defined(COMPAT_FREEBSD4) || defined(COMPAT_43)) 88845f48220SJohn Baldwin struct oshmid_ds { 88945f48220SJohn Baldwin struct ipc_perm_old shm_perm; /* operation perms */ 89045f48220SJohn Baldwin int shm_segsz; /* size of segment (bytes) */ 89145f48220SJohn Baldwin u_short shm_cpid; /* pid, creator */ 89245f48220SJohn Baldwin u_short shm_lpid; /* pid, last operation */ 89345f48220SJohn Baldwin short shm_nattch; /* no. of current attaches */ 89445f48220SJohn Baldwin time_t shm_atime; /* last attach time */ 89545f48220SJohn Baldwin time_t shm_dtime; /* last detach time */ 89645f48220SJohn Baldwin time_t shm_ctime; /* last change time */ 89745f48220SJohn Baldwin void *shm_handle; /* internal handle for shm segment */ 89845f48220SJohn Baldwin }; 89945f48220SJohn Baldwin 90045f48220SJohn Baldwin struct oshmctl_args { 90145f48220SJohn Baldwin int shmid; 90245f48220SJohn Baldwin int cmd; 90345f48220SJohn Baldwin struct oshmid_ds *ubuf; 90445f48220SJohn Baldwin }; 90545f48220SJohn Baldwin 90645f48220SJohn Baldwin static int 907ca998284SJohn Baldwin oshmctl(struct thread *td, struct oshmctl_args *uap) 90845f48220SJohn Baldwin { 90945f48220SJohn Baldwin #ifdef COMPAT_43 91045f48220SJohn Baldwin int error = 0; 91145f48220SJohn Baldwin struct shmid_kernel *shmseg; 91245f48220SJohn Baldwin struct oshmid_ds outbuf; 91345f48220SJohn Baldwin 91445f48220SJohn Baldwin if (!prison_allow(td->td_ucred, PR_ALLOW_SYSVIPC)) 91545f48220SJohn Baldwin return (ENOSYS); 91645f48220SJohn Baldwin mtx_lock(&Giant); 91745f48220SJohn Baldwin shmseg = shm_find_segment_by_shmid(uap->shmid); 91845f48220SJohn Baldwin if (shmseg == NULL) { 91945f48220SJohn Baldwin error = EINVAL; 92045f48220SJohn Baldwin goto done2; 92145f48220SJohn Baldwin } 92245f48220SJohn Baldwin switch (uap->cmd) { 92345f48220SJohn Baldwin case IPC_STAT: 92445f48220SJohn Baldwin error = ipcperm(td, &shmseg->u.shm_perm, IPC_R); 92545f48220SJohn Baldwin if (error) 92645f48220SJohn Baldwin goto done2; 92745f48220SJohn Baldwin #ifdef MAC 92845f48220SJohn Baldwin error = mac_sysvshm_check_shmctl(td->td_ucred, shmseg, uap->cmd); 92945f48220SJohn Baldwin if (error != 0) 93045f48220SJohn Baldwin goto done2; 93145f48220SJohn Baldwin #endif 93245f48220SJohn Baldwin ipcperm_new2old(&shmseg->u.shm_perm, &outbuf.shm_perm); 93345f48220SJohn Baldwin outbuf.shm_segsz = shmseg->u.shm_segsz; 93445f48220SJohn Baldwin outbuf.shm_cpid = shmseg->u.shm_cpid; 93545f48220SJohn Baldwin outbuf.shm_lpid = shmseg->u.shm_lpid; 93645f48220SJohn Baldwin outbuf.shm_nattch = shmseg->u.shm_nattch; 93745f48220SJohn Baldwin outbuf.shm_atime = shmseg->u.shm_atime; 93845f48220SJohn Baldwin outbuf.shm_dtime = shmseg->u.shm_dtime; 93945f48220SJohn Baldwin outbuf.shm_ctime = shmseg->u.shm_ctime; 94045f48220SJohn Baldwin outbuf.shm_handle = shmseg->object; 94145f48220SJohn Baldwin error = copyout(&outbuf, uap->ubuf, sizeof(outbuf)); 94245f48220SJohn Baldwin if (error) 94345f48220SJohn Baldwin goto done2; 94445f48220SJohn Baldwin break; 94545f48220SJohn Baldwin default: 946af88b2c2SJohn Baldwin error = freebsd7_shmctl(td, (struct freebsd7_shmctl_args *)uap); 94745f48220SJohn Baldwin break; 94845f48220SJohn Baldwin } 94945f48220SJohn Baldwin done2: 95045f48220SJohn Baldwin mtx_unlock(&Giant); 95145f48220SJohn Baldwin return (error); 95245f48220SJohn Baldwin #else 95345f48220SJohn Baldwin return (EINVAL); 95445f48220SJohn Baldwin #endif 95545f48220SJohn Baldwin } 95645f48220SJohn Baldwin 95745f48220SJohn Baldwin /* XXX casting to (sy_call_t *) is bogus, as usual. */ 95845f48220SJohn Baldwin static sy_call_t *shmcalls[] = { 95945f48220SJohn Baldwin (sy_call_t *)shmat, (sy_call_t *)oshmctl, 96045f48220SJohn Baldwin (sy_call_t *)shmdt, (sy_call_t *)shmget, 961b648d480SJohn Baldwin (sy_call_t *)freebsd7_shmctl 96245f48220SJohn Baldwin }; 96345f48220SJohn Baldwin 96445f48220SJohn Baldwin int 96545f48220SJohn Baldwin shmsys(td, uap) 96645f48220SJohn Baldwin struct thread *td; 96745f48220SJohn Baldwin /* XXX actually varargs. */ 96845f48220SJohn Baldwin struct shmsys_args /* { 96945f48220SJohn Baldwin int which; 97045f48220SJohn Baldwin int a2; 97145f48220SJohn Baldwin int a3; 97245f48220SJohn Baldwin int a4; 97345f48220SJohn Baldwin } */ *uap; 97445f48220SJohn Baldwin { 97545f48220SJohn Baldwin int error; 97645f48220SJohn Baldwin 97745f48220SJohn Baldwin if (!prison_allow(td->td_ucred, PR_ALLOW_SYSVIPC)) 97845f48220SJohn Baldwin return (ENOSYS); 97945f48220SJohn Baldwin if (uap->which < 0 || 98045f48220SJohn Baldwin uap->which >= sizeof(shmcalls)/sizeof(shmcalls[0])) 98145f48220SJohn Baldwin return (EINVAL); 98245f48220SJohn Baldwin mtx_lock(&Giant); 98345f48220SJohn Baldwin error = (*shmcalls[uap->which])(td, &uap->a2); 98445f48220SJohn Baldwin mtx_unlock(&Giant); 98545f48220SJohn Baldwin return (error); 98645f48220SJohn Baldwin } 98745f48220SJohn Baldwin 98845f48220SJohn Baldwin SYSCALL_MODULE_HELPER(shmsys); 98945f48220SJohn Baldwin #endif /* i386 && (COMPAT_FREEBSD4 || COMPAT_43) */ 99045f48220SJohn Baldwin 991b648d480SJohn Baldwin #if defined(COMPAT_FREEBSD4) || defined(COMPAT_FREEBSD5) || \ 992b648d480SJohn Baldwin defined(COMPAT_FREEBSD6) || defined(COMPAT_FREEBSD7) 993b648d480SJohn Baldwin 994b648d480SJohn Baldwin #define CP(src, dst, fld) do { (dst).fld = (src).fld; } while (0) 995b648d480SJohn Baldwin 996b648d480SJohn Baldwin 997b648d480SJohn Baldwin #ifndef _SYS_SYSPROTO_H_ 998b648d480SJohn Baldwin struct freebsd7_shmctl_args { 999b648d480SJohn Baldwin int shmid; 1000b648d480SJohn Baldwin int cmd; 1001b648d480SJohn Baldwin struct shmid_ds_old *buf; 1002b648d480SJohn Baldwin }; 1003b648d480SJohn Baldwin #endif 1004b648d480SJohn Baldwin int 1005b648d480SJohn Baldwin freebsd7_shmctl(td, uap) 1006b648d480SJohn Baldwin struct thread *td; 1007b648d480SJohn Baldwin struct freebsd7_shmctl_args *uap; 1008b648d480SJohn Baldwin { 1009b648d480SJohn Baldwin int error = 0; 1010b648d480SJohn Baldwin struct shmid_ds_old old; 1011b648d480SJohn Baldwin struct shmid_ds buf; 1012b648d480SJohn Baldwin size_t bufsz; 1013b648d480SJohn Baldwin 1014b648d480SJohn Baldwin /* 1015b648d480SJohn Baldwin * The only reason IPC_INFO, SHM_INFO, SHM_STAT exists is to support 1016b648d480SJohn Baldwin * Linux binaries. If we see the call come through the FreeBSD ABI, 1017b648d480SJohn Baldwin * return an error back to the user since we do not to support this. 1018b648d480SJohn Baldwin */ 1019b648d480SJohn Baldwin if (uap->cmd == IPC_INFO || uap->cmd == SHM_INFO || 1020b648d480SJohn Baldwin uap->cmd == SHM_STAT) 1021b648d480SJohn Baldwin return (EINVAL); 1022b648d480SJohn Baldwin 1023b648d480SJohn Baldwin /* IPC_SET needs to copyin the buffer before calling kern_shmctl */ 1024b648d480SJohn Baldwin if (uap->cmd == IPC_SET) { 1025b648d480SJohn Baldwin if ((error = copyin(uap->buf, &old, sizeof(old)))) 1026b648d480SJohn Baldwin goto done; 1027b648d480SJohn Baldwin ipcperm_old2new(&old.shm_perm, &buf.shm_perm); 1028b648d480SJohn Baldwin CP(old, buf, shm_segsz); 1029b648d480SJohn Baldwin CP(old, buf, shm_lpid); 1030b648d480SJohn Baldwin CP(old, buf, shm_cpid); 1031b648d480SJohn Baldwin CP(old, buf, shm_nattch); 1032b648d480SJohn Baldwin CP(old, buf, shm_atime); 1033b648d480SJohn Baldwin CP(old, buf, shm_dtime); 1034b648d480SJohn Baldwin CP(old, buf, shm_ctime); 1035b648d480SJohn Baldwin } 1036b648d480SJohn Baldwin 1037b648d480SJohn Baldwin error = kern_shmctl(td, uap->shmid, uap->cmd, (void *)&buf, &bufsz); 1038b648d480SJohn Baldwin if (error) 1039b648d480SJohn Baldwin goto done; 1040b648d480SJohn Baldwin 1041b648d480SJohn Baldwin /* Cases in which we need to copyout */ 1042b648d480SJohn Baldwin switch (uap->cmd) { 1043b648d480SJohn Baldwin case IPC_STAT: 1044b648d480SJohn Baldwin ipcperm_new2old(&buf.shm_perm, &old.shm_perm); 1045b648d480SJohn Baldwin if (buf.shm_segsz > INT_MAX) 1046b648d480SJohn Baldwin old.shm_segsz = INT_MAX; 1047b648d480SJohn Baldwin else 1048b648d480SJohn Baldwin CP(buf, old, shm_segsz); 1049b648d480SJohn Baldwin CP(buf, old, shm_lpid); 1050b648d480SJohn Baldwin CP(buf, old, shm_cpid); 1051b648d480SJohn Baldwin if (buf.shm_nattch > SHRT_MAX) 1052b648d480SJohn Baldwin old.shm_nattch = SHRT_MAX; 1053b648d480SJohn Baldwin else 1054b648d480SJohn Baldwin CP(buf, old, shm_nattch); 1055b648d480SJohn Baldwin CP(buf, old, shm_atime); 1056b648d480SJohn Baldwin CP(buf, old, shm_dtime); 1057b648d480SJohn Baldwin CP(buf, old, shm_ctime); 1058b648d480SJohn Baldwin old.shm_internal = NULL; 1059b648d480SJohn Baldwin error = copyout(&old, uap->buf, sizeof(old)); 1060b648d480SJohn Baldwin break; 1061b648d480SJohn Baldwin } 1062b648d480SJohn Baldwin 1063b648d480SJohn Baldwin done: 1064b648d480SJohn Baldwin if (error) { 1065b648d480SJohn Baldwin /* Invalidate the return value */ 1066b648d480SJohn Baldwin td->td_retval[0] = -1; 1067b648d480SJohn Baldwin } 1068b648d480SJohn Baldwin return (error); 1069b648d480SJohn Baldwin } 1070b648d480SJohn Baldwin 1071b648d480SJohn Baldwin SYSCALL_MODULE_HELPER(freebsd7_shmctl); 1072b648d480SJohn Baldwin 1073b648d480SJohn Baldwin #undef CP 1074b648d480SJohn Baldwin 1075b648d480SJohn Baldwin #endif /* COMPAT_FREEBSD4 || COMPAT_FREEBSD5 || COMPAT_FREEBSD6 || 1076b648d480SJohn Baldwin COMPAT_FREEBSD7 */ 1077b648d480SJohn Baldwin 1078a723c4e1SDima Dorfman static int 107978525ce3SAlfred Perlstein sysvshm_modload(struct module *module, int cmd, void *arg) 108078525ce3SAlfred Perlstein { 108178525ce3SAlfred Perlstein int error = 0; 108278525ce3SAlfred Perlstein 108378525ce3SAlfred Perlstein switch (cmd) { 108478525ce3SAlfred Perlstein case MOD_LOAD: 108578525ce3SAlfred Perlstein shminit(); 108678525ce3SAlfred Perlstein break; 108778525ce3SAlfred Perlstein case MOD_UNLOAD: 108878525ce3SAlfred Perlstein error = shmunload(); 108978525ce3SAlfred Perlstein break; 109078525ce3SAlfred Perlstein case MOD_SHUTDOWN: 109178525ce3SAlfred Perlstein break; 109278525ce3SAlfred Perlstein default: 109378525ce3SAlfred Perlstein error = EINVAL; 109478525ce3SAlfred Perlstein break; 109578525ce3SAlfred Perlstein } 109678525ce3SAlfred Perlstein return (error); 109778525ce3SAlfred Perlstein } 109878525ce3SAlfred Perlstein 1099faa784b7SDag-Erling Smørgrav static moduledata_t sysvshm_mod = { 1100faa784b7SDag-Erling Smørgrav "sysvshm", 110178525ce3SAlfred Perlstein &sysvshm_modload, 110278525ce3SAlfred Perlstein NULL 110378525ce3SAlfred Perlstein }; 110478525ce3SAlfred Perlstein 110521d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmat); 110621d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmctl); 110721d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmdt); 110821d56e9cSAlfred Perlstein SYSCALL_MODULE_HELPER(shmget); 110978525ce3SAlfred Perlstein 111071361470SJohn Baldwin DECLARE_MODULE(sysvshm, sysvshm_mod, SI_SUB_SYSV_SHM, SI_ORDER_FIRST); 1111faa784b7SDag-Erling Smørgrav MODULE_VERSION(sysvshm, 1); 1112