1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ 28 /* All Rights Reserved */ 29 30 /* 31 * University Copyright- Copyright (c) 1982, 1986, 1988 32 * The Regents of the University of California 33 * All Rights Reserved 34 * 35 * University Acknowledgment- Portions of this document are derived from 36 * software developed by the University of California, Berkeley, and its 37 * contributors. 38 */ 39 40 /* 41 * Inter-Process Communication Shared Memory Facility. 42 * 43 * See os/ipc.c for a description of common IPC functionality. 44 * 45 * Resource controls 46 * ----------------- 47 * 48 * Control: zone.max-shm-ids (rc_zone_shmmni) 49 * Description: Maximum number of shared memory ids allowed a zone. 50 * 51 * When shmget() is used to allocate a shared memory segment, one id 52 * is allocated. If the id allocation doesn't succeed, shmget() 53 * fails and errno is set to ENOSPC. Upon successful shmctl(, 54 * IPC_RMID) the id is deallocated. 55 * 56 * Control: project.max-shm-ids (rc_project_shmmni) 57 * Description: Maximum number of shared memory ids allowed a project. 58 * 59 * When shmget() is used to allocate a shared memory segment, one id 60 * is allocated. If the id allocation doesn't succeed, shmget() 61 * fails and errno is set to ENOSPC. Upon successful shmctl(, 62 * IPC_RMID) the id is deallocated. 63 * 64 * Control: zone.max-shm-memory (rc_zone_shmmax) 65 * Description: Total amount of shared memory allowed a zone. 66 * 67 * When shmget() is used to allocate a shared memory segment, the 68 * segment's size is allocated against this limit. If the space 69 * allocation doesn't succeed, shmget() fails and errno is set to 70 * EINVAL. The size will be deallocated once the last process has 71 * detached the segment and the segment has been successfully 72 * shmctl(, IPC_RMID)ed. 73 * 74 * Control: project.max-shm-memory (rc_project_shmmax) 75 * Description: Total amount of shared memory allowed a project. 76 * 77 * When shmget() is used to allocate a shared memory segment, the 78 * segment's size is allocated against this limit. If the space 79 * allocation doesn't succeed, shmget() fails and errno is set to 80 * EINVAL. The size will be deallocated once the last process has 81 * detached the segment and the segment has been successfully 82 * shmctl(, IPC_RMID)ed. 83 */ 84 85 #include <sys/types.h> 86 #include <sys/param.h> 87 #include <sys/cred.h> 88 #include <sys/errno.h> 89 #include <sys/time.h> 90 #include <sys/kmem.h> 91 #include <sys/user.h> 92 #include <sys/proc.h> 93 #include <sys/systm.h> 94 #include <sys/prsystm.h> 95 #include <sys/sysmacros.h> 96 #include <sys/tuneable.h> 97 #include <sys/vm.h> 98 #include <sys/mman.h> 99 #include <sys/swap.h> 100 #include <sys/cmn_err.h> 101 #include <sys/debug.h> 102 #include <sys/lwpchan_impl.h> 103 #include <sys/avl.h> 104 #include <sys/modctl.h> 105 #include <sys/syscall.h> 106 #include <sys/task.h> 107 #include <sys/project.h> 108 #include <sys/policy.h> 109 #include <sys/zone.h> 110 #include <sys/rctl.h> 111 112 #include <sys/ipc.h> 113 #include <sys/ipc_impl.h> 114 #include <sys/shm.h> 115 #include <sys/shm_impl.h> 116 117 #include <vm/hat.h> 118 #include <vm/seg.h> 119 #include <vm/as.h> 120 #include <vm/seg_vn.h> 121 #include <vm/anon.h> 122 #include <vm/page.h> 123 #include <vm/vpage.h> 124 #include <vm/seg_spt.h> 125 126 #include <c2/audit.h> 127 128 static int shmem_lock(kshmid_t *sp, struct anon_map *amp); 129 static void shmem_unlock(kshmid_t *sp, struct anon_map *amp); 130 static void sa_add(struct proc *pp, caddr_t addr, size_t len, ulong_t flags, 131 kshmid_t *id); 132 static void shm_rm_amp(kshmid_t *sp); 133 static void shm_dtor(kipc_perm_t *); 134 static void shm_rmid(kipc_perm_t *); 135 static void shm_remove_zone(zoneid_t, void *); 136 137 /* 138 * Semantics for share_page_table and ism_off: 139 * 140 * These are hooks in /etc/system - only for internal testing purpose. 141 * 142 * Setting share_page_table automatically turns on the SHM_SHARE_MMU (ISM) flag 143 * in a call to shmat(2). In other words, with share_page_table set, you always 144 * get ISM, even if say, DISM is specified. It should really be called "ism_on". 145 * 146 * Setting ism_off turns off the SHM_SHARE_MMU flag from the flags passed to 147 * shmat(2). 148 * 149 * If both share_page_table and ism_off are set, share_page_table prevails. 150 * 151 * Although these tunables should probably be removed, they do have some 152 * external exposure; as long as they exist, they should at least work sensibly. 153 */ 154 155 int share_page_table; 156 int ism_off; 157 158 /* 159 * The following tunables are obsolete. Though for compatibility we 160 * still read and interpret shminfo_shmmax and shminfo_shmmni (see 161 * os/project.c), the preferred mechanism for administrating the IPC 162 * Shared Memory facility is through the resource controls described at 163 * the top of this file. 164 */ 165 size_t shminfo_shmmax = 0x800000; /* (obsolete) */ 166 int shminfo_shmmni = 100; /* (obsolete) */ 167 size_t shminfo_shmmin = 1; /* (obsolete) */ 168 int shminfo_shmseg = 6; /* (obsolete) */ 169 170 extern rctl_hndl_t rc_zone_shmmax; 171 extern rctl_hndl_t rc_zone_shmmni; 172 extern rctl_hndl_t rc_project_shmmax; 173 extern rctl_hndl_t rc_project_shmmni; 174 static ipc_service_t *shm_svc; 175 static zone_key_t shm_zone_key; 176 177 /* 178 * Module linkage information for the kernel. 179 */ 180 static uintptr_t shmsys(int, uintptr_t, uintptr_t, uintptr_t); 181 182 static struct sysent ipcshm_sysent = { 183 4, 184 #ifdef _SYSCALL32_IMPL 185 SE_ARGC | SE_NOUNLOAD | SE_64RVAL, 186 #else /* _SYSCALL32_IMPL */ 187 SE_ARGC | SE_NOUNLOAD | SE_32RVAL1, 188 #endif /* _SYSCALL32_IMPL */ 189 (int (*)())shmsys 190 }; 191 192 #ifdef _SYSCALL32_IMPL 193 static struct sysent ipcshm_sysent32 = { 194 4, 195 SE_ARGC | SE_NOUNLOAD | SE_32RVAL1, 196 (int (*)())shmsys 197 }; 198 #endif /* _SYSCALL32_IMPL */ 199 200 static struct modlsys modlsys = { 201 &mod_syscallops, "System V shared memory", &ipcshm_sysent 202 }; 203 204 #ifdef _SYSCALL32_IMPL 205 static struct modlsys modlsys32 = { 206 &mod_syscallops32, "32-bit System V shared memory", &ipcshm_sysent32 207 }; 208 #endif /* _SYSCALL32_IMPL */ 209 210 static struct modlinkage modlinkage = { 211 MODREV_1, 212 &modlsys, 213 #ifdef _SYSCALL32_IMPL 214 &modlsys32, 215 #endif 216 NULL 217 }; 218 219 220 int 221 _init(void) 222 { 223 int result; 224 225 shm_svc = ipcs_create("shmids", rc_project_shmmni, rc_zone_shmmni, 226 sizeof (kshmid_t), shm_dtor, shm_rmid, AT_IPC_SHM, 227 offsetof(ipc_rqty_t, ipcq_shmmni)); 228 zone_key_create(&shm_zone_key, NULL, shm_remove_zone, NULL); 229 230 if ((result = mod_install(&modlinkage)) == 0) 231 return (0); 232 233 (void) zone_key_delete(shm_zone_key); 234 ipcs_destroy(shm_svc); 235 236 return (result); 237 } 238 239 int 240 _fini(void) 241 { 242 return (EBUSY); 243 } 244 245 int 246 _info(struct modinfo *modinfop) 247 { 248 return (mod_info(&modlinkage, modinfop)); 249 } 250 251 /* 252 * Shmat (attach shared segment) system call. 253 */ 254 static int 255 shmat(int shmid, caddr_t uaddr, int uflags, uintptr_t *rvp) 256 { 257 kshmid_t *sp; /* shared memory header ptr */ 258 size_t size; 259 int error = 0; 260 proc_t *pp = curproc; 261 struct as *as = pp->p_as; 262 struct segvn_crargs crargs; /* segvn create arguments */ 263 kmutex_t *lock; 264 struct seg *segspt = NULL; 265 caddr_t addr = uaddr; 266 int flags = (uflags & SHMAT_VALID_FLAGS_MASK); 267 int useISM; 268 uchar_t prot = PROT_ALL; 269 int result; 270 271 if ((lock = ipc_lookup(shm_svc, shmid, (kipc_perm_t **)&sp)) == NULL) 272 return (EINVAL); 273 if (error = ipcperm_access(&sp->shm_perm, SHM_R, CRED())) 274 goto errret; 275 if ((flags & SHM_RDONLY) == 0 && 276 (error = ipcperm_access(&sp->shm_perm, SHM_W, CRED()))) 277 goto errret; 278 if (spt_invalid(flags)) { 279 error = EINVAL; 280 goto errret; 281 } 282 if (ism_off) 283 flags = flags & ~SHM_SHARE_MMU; 284 if (share_page_table) { 285 flags = flags & ~SHM_PAGEABLE; 286 flags = flags | SHM_SHARE_MMU; 287 } 288 useISM = (spt_locked(flags) || spt_pageable(flags)); 289 if (useISM && (error = ipcperm_access(&sp->shm_perm, SHM_W, CRED()))) 290 goto errret; 291 if (useISM && isspt(sp)) { 292 uint_t newsptflags = flags | spt_flags(sp->shm_sptseg); 293 /* 294 * If trying to change an existing {D}ISM segment from ISM 295 * to DISM or vice versa, return error. Note that this 296 * validation of flags needs to be done after the effect of 297 * tunables such as ism_off and share_page_table, for 298 * semantics that are consistent with the tunables' settings. 299 */ 300 if (spt_invalid(newsptflags)) { 301 error = EINVAL; 302 goto errret; 303 } 304 } 305 ANON_LOCK_ENTER(&sp->shm_amp->a_rwlock, RW_WRITER); 306 size = sp->shm_amp->size; 307 ANON_LOCK_EXIT(&sp->shm_amp->a_rwlock); 308 309 /* somewhere to record spt info for final detach */ 310 if (sp->shm_sptinfo == NULL) 311 sp->shm_sptinfo = kmem_zalloc(sizeof (sptinfo_t), KM_SLEEP); 312 313 as_rangelock(as); 314 315 if (useISM) { 316 /* 317 * Handle ISM 318 */ 319 uint_t share_szc; 320 size_t share_size; 321 struct shm_data ssd; 322 uintptr_t align_hint; 323 324 /* 325 * Pick a share pagesize to use, if (!isspt(sp)). 326 * Otherwise use the already chosen page size. 327 * 328 * For the initial shmat (!isspt(sp)), where sptcreate is 329 * called, map_pgsz is called to recommend a [D]ISM pagesize, 330 * important for systems which offer more than one potential 331 * [D]ISM pagesize. 332 * If the shmat is just to attach to an already created 333 * [D]ISM segment, then use the previously selected page size. 334 */ 335 if (!isspt(sp)) { 336 share_size = map_pgsz(MAPPGSZ_ISM, pp, addr, size, 0); 337 if (share_size == 0) { 338 as_rangeunlock(as); 339 error = EINVAL; 340 goto errret; 341 } 342 share_szc = page_szc(share_size); 343 } else { 344 share_szc = sp->shm_sptseg->s_szc; 345 share_size = page_get_pagesize(share_szc); 346 } 347 size = P2ROUNDUP(size, share_size); 348 349 align_hint = share_size; 350 #if defined(__i386) || defined(__amd64) 351 /* 352 * For x86, we want to share as much of the page table tree 353 * as possible. We use a large align_hint at first, but 354 * if that fails, then the code below retries with align_hint 355 * set to share_size. 356 * 357 * The explicit extern here is due to the difficulties 358 * of getting to platform dependent includes. When/if the 359 * platform dependent bits of this function are cleaned up, 360 * another way of doing this should found. 361 */ 362 { 363 extern uint_t ptes_per_table; 364 365 while (size >= ptes_per_table * (uint64_t)align_hint) 366 align_hint *= ptes_per_table; 367 } 368 #endif /* __i386 || __amd64 */ 369 370 #if defined(__sparcv9) 371 if (addr == 0 && 372 pp->p_model == DATAMODEL_LP64 && AS_TYPE_64BIT(as)) { 373 /* 374 * If no address has been passed in, and this is a 375 * 64-bit process, we'll try to find an address 376 * in the predict-ISM zone. 377 */ 378 caddr_t predbase = (caddr_t)PREDISM_1T_BASE; 379 size_t len = PREDISM_BOUND - PREDISM_1T_BASE; 380 381 as_purge(as); 382 if (as_gap(as, size + share_size, &predbase, &len, 383 AH_LO, (caddr_t)NULL) != -1) { 384 /* 385 * We found an address which looks like a 386 * candidate. We want to round it up, and 387 * then check that it's a valid user range. 388 * This assures that we won't fail below. 389 */ 390 addr = (caddr_t)P2ROUNDUP((uintptr_t)predbase, 391 share_size); 392 393 if (valid_usr_range(addr, size, prot, 394 as, as->a_userlimit) != RANGE_OKAY) { 395 addr = 0; 396 } 397 } 398 } 399 #endif /* __sparcv9 */ 400 401 if (addr == 0) { 402 for (;;) { 403 addr = (caddr_t)align_hint; 404 map_addr(&addr, size, 0ll, 1, MAP_ALIGN); 405 if (addr != NULL || align_hint == share_size) 406 break; 407 align_hint = share_size; 408 } 409 if (addr == NULL) { 410 as_rangeunlock(as); 411 error = ENOMEM; 412 goto errret; 413 } 414 ASSERT(((uintptr_t)addr & (align_hint - 1)) == 0); 415 } else { 416 /* Use the user-supplied attach address */ 417 caddr_t base; 418 size_t len; 419 420 /* 421 * Check that the address range 422 * 1) is properly aligned 423 * 2) is correct in unix terms 424 * 3) is within an unmapped address segment 425 */ 426 base = addr; 427 len = size; /* use spt aligned size */ 428 /* XXX - in SunOS, is sp->shm_segsz */ 429 if ((uintptr_t)base & (share_size - 1)) { 430 error = EINVAL; 431 as_rangeunlock(as); 432 goto errret; 433 } 434 result = valid_usr_range(base, len, prot, as, 435 as->a_userlimit); 436 if (result == RANGE_BADPROT) { 437 /* 438 * We try to accomodate processors which 439 * may not support execute permissions on 440 * all ISM segments by trying the check 441 * again but without PROT_EXEC. 442 */ 443 prot &= ~PROT_EXEC; 444 result = valid_usr_range(base, len, prot, as, 445 as->a_userlimit); 446 } 447 as_purge(as); 448 if (result != RANGE_OKAY || 449 as_gap(as, len, &base, &len, AH_LO, 450 (caddr_t)NULL) != 0) { 451 error = EINVAL; 452 as_rangeunlock(as); 453 goto errret; 454 } 455 } 456 457 if (!isspt(sp)) { 458 error = sptcreate(size, &segspt, sp->shm_amp, prot, 459 flags, share_szc); 460 if (error) { 461 as_rangeunlock(as); 462 goto errret; 463 } 464 sp->shm_sptinfo->sptas = segspt->s_as; 465 sp->shm_sptseg = segspt; 466 sp->shm_sptprot = prot; 467 } else if ((prot & sp->shm_sptprot) != sp->shm_sptprot) { 468 /* 469 * Ensure we're attaching to an ISM segment with 470 * fewer or equal permissions than what we're 471 * allowed. Fail if the segment has more 472 * permissions than what we're allowed. 473 */ 474 error = EACCES; 475 as_rangeunlock(as); 476 goto errret; 477 } 478 479 ssd.shm_sptseg = sp->shm_sptseg; 480 ssd.shm_sptas = sp->shm_sptinfo->sptas; 481 ssd.shm_amp = sp->shm_amp; 482 error = as_map(as, addr, size, segspt_shmattach, &ssd); 483 if (error == 0) 484 sp->shm_ismattch++; /* keep count of ISM attaches */ 485 } else { 486 487 /* 488 * Normal case. 489 */ 490 if (flags & SHM_RDONLY) 491 prot &= ~PROT_WRITE; 492 493 if (addr == 0) { 494 /* Let the system pick the attach address */ 495 map_addr(&addr, size, 0ll, 1, 0); 496 if (addr == NULL) { 497 as_rangeunlock(as); 498 error = ENOMEM; 499 goto errret; 500 } 501 } else { 502 /* Use the user-supplied attach address */ 503 caddr_t base; 504 size_t len; 505 506 if (flags & SHM_RND) 507 addr = (caddr_t)((uintptr_t)addr & 508 ~(SHMLBA - 1)); 509 /* 510 * Check that the address range 511 * 1) is properly aligned 512 * 2) is correct in unix terms 513 * 3) is within an unmapped address segment 514 */ 515 base = addr; 516 len = size; /* use aligned size */ 517 /* XXX - in SunOS, is sp->shm_segsz */ 518 if ((uintptr_t)base & PAGEOFFSET) { 519 error = EINVAL; 520 as_rangeunlock(as); 521 goto errret; 522 } 523 result = valid_usr_range(base, len, prot, as, 524 as->a_userlimit); 525 if (result == RANGE_BADPROT) { 526 prot &= ~PROT_EXEC; 527 result = valid_usr_range(base, len, prot, as, 528 as->a_userlimit); 529 } 530 as_purge(as); 531 if (result != RANGE_OKAY || 532 as_gap(as, len, &base, &len, 533 AH_LO, (caddr_t)NULL) != 0) { 534 error = EINVAL; 535 as_rangeunlock(as); 536 goto errret; 537 } 538 } 539 540 /* Initialize the create arguments and map the segment */ 541 crargs = *(struct segvn_crargs *)zfod_argsp; 542 crargs.offset = 0; 543 crargs.type = MAP_SHARED; 544 crargs.amp = sp->shm_amp; 545 crargs.prot = prot; 546 crargs.maxprot = crargs.prot; 547 crargs.flags = 0; 548 549 error = as_map(as, addr, size, segvn_create, &crargs); 550 } 551 552 as_rangeunlock(as); 553 if (error) 554 goto errret; 555 556 /* record shmem range for the detach */ 557 sa_add(pp, addr, (size_t)size, useISM ? SHMSA_ISM : 0, sp); 558 *rvp = (uintptr_t)addr; 559 560 sp->shm_atime = gethrestime_sec(); 561 sp->shm_lpid = pp->p_pid; 562 ipc_hold(shm_svc, (kipc_perm_t *)sp); 563 564 /* 565 * Tell machine specific code that lwp has mapped shared memory 566 */ 567 LWP_MMODEL_SHARED_AS(addr, size); 568 569 errret: 570 mutex_exit(lock); 571 return (error); 572 } 573 574 static void 575 shm_dtor(kipc_perm_t *perm) 576 { 577 kshmid_t *sp = (kshmid_t *)perm; 578 uint_t cnt; 579 size_t rsize; 580 581 if (sp->shm_lkcnt > 0) { 582 shmem_unlock(sp, sp->shm_amp); 583 sp->shm_lkcnt = 0; 584 } 585 586 if (sp->shm_sptinfo) { 587 if (isspt(sp)) 588 sptdestroy(sp->shm_sptinfo->sptas, sp->shm_amp); 589 kmem_free(sp->shm_sptinfo, sizeof (sptinfo_t)); 590 } 591 592 ANON_LOCK_ENTER(&sp->shm_amp->a_rwlock, RW_WRITER); 593 cnt = --sp->shm_amp->refcnt; 594 ANON_LOCK_EXIT(&sp->shm_amp->a_rwlock); 595 ASSERT(cnt == 0); 596 shm_rm_amp(sp); 597 598 if (sp->shm_perm.ipc_id != IPC_ID_INVAL) { 599 rsize = ptob(btopr(sp->shm_segsz)); 600 ipcs_lock(shm_svc); 601 sp->shm_perm.ipc_proj->kpj_data.kpd_shmmax -= rsize; 602 sp->shm_perm.ipc_zone->zone_shmmax -= rsize; 603 ipcs_unlock(shm_svc); 604 } 605 } 606 607 /* ARGSUSED */ 608 static void 609 shm_rmid(kipc_perm_t *perm) 610 { 611 /* nothing to do */ 612 } 613 614 /* 615 * Shmctl system call. 616 */ 617 /* ARGSUSED */ 618 static int 619 shmctl(int shmid, int cmd, void *arg) 620 { 621 kshmid_t *sp; /* shared memory header ptr */ 622 STRUCT_DECL(shmid_ds, ds); /* for SVR4 IPC_SET */ 623 int error = 0; 624 struct cred *cr = CRED(); 625 kmutex_t *lock; 626 model_t mdl = get_udatamodel(); 627 struct shmid_ds64 ds64; 628 shmatt_t nattch; 629 630 STRUCT_INIT(ds, mdl); 631 632 /* 633 * Perform pre- or non-lookup actions (e.g. copyins, RMID). 634 */ 635 switch (cmd) { 636 case IPC_SET: 637 if (copyin(arg, STRUCT_BUF(ds), STRUCT_SIZE(ds))) 638 return (EFAULT); 639 break; 640 641 case IPC_SET64: 642 if (copyin(arg, &ds64, sizeof (struct shmid_ds64))) 643 return (EFAULT); 644 break; 645 646 case IPC_RMID: 647 return (ipc_rmid(shm_svc, shmid, cr)); 648 } 649 650 if ((lock = ipc_lookup(shm_svc, shmid, (kipc_perm_t **)&sp)) == NULL) 651 return (EINVAL); 652 653 switch (cmd) { 654 /* Set ownership and permissions. */ 655 case IPC_SET: 656 if (error = ipcperm_set(shm_svc, cr, &sp->shm_perm, 657 &STRUCT_BUF(ds)->shm_perm, mdl)) 658 break; 659 sp->shm_ctime = gethrestime_sec(); 660 break; 661 662 case IPC_STAT: 663 if (error = ipcperm_access(&sp->shm_perm, SHM_R, cr)) 664 break; 665 666 nattch = sp->shm_perm.ipc_ref - 1; 667 668 ipcperm_stat(&STRUCT_BUF(ds)->shm_perm, &sp->shm_perm, mdl); 669 STRUCT_FSET(ds, shm_segsz, sp->shm_segsz); 670 STRUCT_FSETP(ds, shm_amp, NULL); /* kernel addr */ 671 STRUCT_FSET(ds, shm_lkcnt, sp->shm_lkcnt); 672 STRUCT_FSET(ds, shm_lpid, sp->shm_lpid); 673 STRUCT_FSET(ds, shm_cpid, sp->shm_cpid); 674 STRUCT_FSET(ds, shm_nattch, nattch); 675 STRUCT_FSET(ds, shm_cnattch, sp->shm_ismattch); 676 STRUCT_FSET(ds, shm_atime, sp->shm_atime); 677 STRUCT_FSET(ds, shm_dtime, sp->shm_dtime); 678 STRUCT_FSET(ds, shm_ctime, sp->shm_ctime); 679 680 mutex_exit(lock); 681 if (copyout(STRUCT_BUF(ds), arg, STRUCT_SIZE(ds))) 682 return (EFAULT); 683 684 return (0); 685 686 case IPC_SET64: 687 if (error = ipcperm_set64(shm_svc, cr, 688 &sp->shm_perm, &ds64.shmx_perm)) 689 break; 690 sp->shm_ctime = gethrestime_sec(); 691 break; 692 693 case IPC_STAT64: 694 nattch = sp->shm_perm.ipc_ref - 1; 695 696 ipcperm_stat64(&ds64.shmx_perm, &sp->shm_perm); 697 ds64.shmx_segsz = sp->shm_segsz; 698 ds64.shmx_lkcnt = sp->shm_lkcnt; 699 ds64.shmx_lpid = sp->shm_lpid; 700 ds64.shmx_cpid = sp->shm_cpid; 701 ds64.shmx_nattch = nattch; 702 ds64.shmx_cnattch = sp->shm_ismattch; 703 ds64.shmx_atime = sp->shm_atime; 704 ds64.shmx_dtime = sp->shm_dtime; 705 ds64.shmx_ctime = sp->shm_ctime; 706 707 mutex_exit(lock); 708 if (copyout(&ds64, arg, sizeof (struct shmid_ds64))) 709 return (EFAULT); 710 711 return (0); 712 713 /* Lock segment in memory */ 714 case SHM_LOCK: 715 if ((error = secpolicy_lock_memory(cr)) != 0) 716 break; 717 718 /* protect against overflow */ 719 if (sp->shm_lkcnt >= USHRT_MAX) { 720 error = ENOMEM; 721 break; 722 } 723 if (!isspt(sp) && (sp->shm_lkcnt++ == 0)) { 724 if (error = shmem_lock(sp, sp->shm_amp)) { 725 ANON_LOCK_ENTER(&sp->shm_amp->a_rwlock, 726 RW_WRITER); 727 cmn_err(CE_NOTE, "shmctl - couldn't lock %ld" 728 " pages into memory", sp->shm_amp->size); 729 ANON_LOCK_EXIT(&sp->shm_amp->a_rwlock); 730 error = ENOMEM; 731 sp->shm_lkcnt--; 732 } 733 } 734 break; 735 736 /* Unlock segment */ 737 case SHM_UNLOCK: 738 if ((error = secpolicy_lock_memory(cr)) != 0) 739 break; 740 741 if (sp->shm_lkcnt && (--sp->shm_lkcnt == 0)) { 742 shmem_unlock(sp, sp->shm_amp); 743 } 744 break; 745 746 default: 747 error = EINVAL; 748 break; 749 } 750 mutex_exit(lock); 751 return (error); 752 } 753 754 static void 755 shm_detach(proc_t *pp, segacct_t *sap) 756 { 757 kshmid_t *sp = sap->sa_id; 758 size_t len = sap->sa_len; 759 caddr_t addr = sap->sa_addr; 760 761 /* 762 * Discard lwpchan mappings. 763 */ 764 if (pp->p_lcp != NULL) 765 lwpchan_delete_mapping(pp, addr, addr + len); 766 (void) as_unmap(pp->p_as, addr, len); 767 768 /* 769 * Perform some detach-time accounting. 770 */ 771 (void) ipc_lock(shm_svc, sp->shm_perm.ipc_id); 772 if (sap->sa_flags & SHMSA_ISM) 773 sp->shm_ismattch--; 774 sp->shm_dtime = gethrestime_sec(); 775 sp->shm_lpid = pp->p_pid; 776 ipc_rele(shm_svc, (kipc_perm_t *)sp); /* Drops lock */ 777 778 kmem_free(sap, sizeof (segacct_t)); 779 } 780 781 static int 782 shmdt(caddr_t addr) 783 { 784 proc_t *pp = curproc; 785 segacct_t *sap, template; 786 787 mutex_enter(&pp->p_lock); 788 prbarrier(pp); /* block /proc. See shmgetid(). */ 789 790 template.sa_addr = addr; 791 template.sa_len = 0; 792 if ((pp->p_segacct == NULL) || 793 ((sap = avl_find(pp->p_segacct, &template, NULL)) == NULL)) { 794 mutex_exit(&pp->p_lock); 795 return (EINVAL); 796 } 797 if (sap->sa_addr != addr) { 798 mutex_exit(&pp->p_lock); 799 return (EINVAL); 800 } 801 avl_remove(pp->p_segacct, sap); 802 mutex_exit(&pp->p_lock); 803 804 shm_detach(pp, sap); 805 806 return (0); 807 } 808 809 /* 810 * Remove all shared memory segments associated with a given zone. 811 * Called by zone_shutdown when the zone is halted. 812 */ 813 /*ARGSUSED1*/ 814 static void 815 shm_remove_zone(zoneid_t zoneid, void *arg) 816 { 817 ipc_remove_zone(shm_svc, zoneid); 818 } 819 820 /* 821 * Shmget (create new shmem) system call. 822 */ 823 static int 824 shmget(key_t key, size_t size, int shmflg, uintptr_t *rvp) 825 { 826 proc_t *pp = curproc; 827 kshmid_t *sp; 828 kmutex_t *lock; 829 int error; 830 831 top: 832 if (error = ipc_get(shm_svc, key, shmflg, (kipc_perm_t **)&sp, &lock)) 833 return (error); 834 835 if (!IPC_FREE(&sp->shm_perm)) { 836 /* 837 * A segment with the requested key exists. 838 */ 839 if (size > sp->shm_segsz) { 840 mutex_exit(lock); 841 return (EINVAL); 842 } 843 } else { 844 /* 845 * A new segment should be created. 846 */ 847 size_t npages = btopr(size); 848 size_t rsize = ptob(npages); 849 850 /* 851 * Check rsize and the per-project and per-zone limit on 852 * shared memory. Checking rsize handles both the size == 0 853 * case and the size < ULONG_MAX & PAGEMASK case (i.e. 854 * rounding up wraps a size_t). 855 */ 856 if (rsize == 0 || 857 (rctl_test(rc_project_shmmax, 858 pp->p_task->tk_proj->kpj_rctls, pp, rsize, 859 RCA_SAFE) & RCT_DENY) || 860 (rctl_test(rc_zone_shmmax, 861 pp->p_zone->zone_rctls, pp, rsize, 862 RCA_SAFE) & RCT_DENY)) { 863 864 mutex_exit(&pp->p_lock); 865 mutex_exit(lock); 866 ipc_cleanup(shm_svc, (kipc_perm_t *)sp); 867 return (EINVAL); 868 } 869 mutex_exit(&pp->p_lock); 870 mutex_exit(lock); 871 872 if (anon_resv(rsize) == 0) { 873 ipc_cleanup(shm_svc, (kipc_perm_t *)sp); 874 return (ENOMEM); 875 } 876 877 /* 878 * If any new failure points are introduced between the 879 * the above anon_resv() and the below ipc_commit_begin(), 880 * these failure points will need to unreserve the anon 881 * reserved using anon_unresv(). 882 * 883 * Once ipc_commit_begin() is called, the anon reserved 884 * above will be automatically unreserved by future calls to 885 * ipcs_cleanup() -> shm_dtor() -> shm_rm_amp(). If 886 * ipc_commit_begin() fails, it internally calls shm_dtor(), 887 * unreserving the above anon, and freeing the below amp. 888 */ 889 890 sp->shm_amp = anonmap_alloc(rsize, rsize, ANON_SLEEP); 891 sp->shm_amp->a_sp = sp; 892 /* 893 * Store the original user's requested size, in bytes, 894 * rather than the page-aligned size. The former is 895 * used for IPC_STAT and shmget() lookups. The latter 896 * is saved in the anon_map structure and is used for 897 * calls to the vm layer. 898 */ 899 sp->shm_segsz = size; 900 sp->shm_atime = sp->shm_dtime = 0; 901 sp->shm_ctime = gethrestime_sec(); 902 sp->shm_lpid = (pid_t)0; 903 sp->shm_cpid = curproc->p_pid; 904 sp->shm_ismattch = 0; 905 sp->shm_sptinfo = NULL; 906 /* 907 * Check limits one last time, push id into global 908 * visibility, and update resource usage counts. 909 */ 910 if (error = ipc_commit_begin(shm_svc, key, shmflg, 911 (kipc_perm_t *)sp)) { 912 if (error == EAGAIN) 913 goto top; 914 return (error); 915 } 916 917 if ((rctl_test(rc_project_shmmax, 918 sp->shm_perm.ipc_proj->kpj_rctls, pp, rsize, 919 RCA_SAFE) & RCT_DENY) || 920 (rctl_test(rc_zone_shmmax, 921 sp->shm_perm.ipc_zone->zone_rctls, pp, rsize, 922 RCA_SAFE) & RCT_DENY)) { 923 ipc_cleanup(shm_svc, (kipc_perm_t *)sp); 924 return (EINVAL); 925 } 926 sp->shm_perm.ipc_proj->kpj_data.kpd_shmmax += rsize; 927 sp->shm_perm.ipc_zone->zone_shmmax += rsize; 928 929 lock = ipc_commit_end(shm_svc, &sp->shm_perm); 930 } 931 932 if (audit_active) 933 audit_ipcget(AT_IPC_SHM, (void *)sp); 934 935 *rvp = (uintptr_t)(sp->shm_perm.ipc_id); 936 937 mutex_exit(lock); 938 return (0); 939 } 940 941 /* 942 * shmids system call. 943 */ 944 static int 945 shmids(int *buf, uint_t nids, uint_t *pnids) 946 { 947 return (ipc_ids(shm_svc, buf, nids, pnids)); 948 } 949 950 /* 951 * System entry point for shmat, shmctl, shmdt, and shmget system calls. 952 */ 953 static uintptr_t 954 shmsys(int opcode, uintptr_t a0, uintptr_t a1, uintptr_t a2) 955 { 956 int error; 957 uintptr_t r_val = 0; 958 959 switch (opcode) { 960 case SHMAT: 961 error = shmat((int)a0, (caddr_t)a1, (int)a2, &r_val); 962 break; 963 case SHMCTL: 964 error = shmctl((int)a0, (int)a1, (void *)a2); 965 break; 966 case SHMDT: 967 error = shmdt((caddr_t)a0); 968 break; 969 case SHMGET: 970 error = shmget((key_t)a0, (size_t)a1, (int)a2, &r_val); 971 break; 972 case SHMIDS: 973 error = shmids((int *)a0, (uint_t)a1, (uint_t *)a2); 974 break; 975 default: 976 error = EINVAL; 977 break; 978 } 979 980 if (error) 981 return ((uintptr_t)set_errno(error)); 982 983 return (r_val); 984 } 985 986 /* 987 * segacct_t comparator 988 * This works as expected, with one minor change: the first of two real 989 * segments with equal addresses is considered to be 'greater than' the 990 * second. We only return equal when searching using a template, in 991 * which case we explicitly set the template segment's length to 0 992 * (which is invalid for a real segment). 993 */ 994 static int 995 shm_sacompar(const void *x, const void *y) 996 { 997 segacct_t *sa1 = (segacct_t *)x; 998 segacct_t *sa2 = (segacct_t *)y; 999 1000 if (sa1->sa_addr < sa2->sa_addr) { 1001 return (-1); 1002 } else if (sa2->sa_len != 0) { 1003 if (sa1->sa_addr >= sa2->sa_addr + sa2->sa_len) { 1004 return (1); 1005 } else if (sa1->sa_len != 0) { 1006 return (1); 1007 } else { 1008 return (0); 1009 } 1010 } else if (sa1->sa_addr > sa2->sa_addr) { 1011 return (1); 1012 } else { 1013 return (0); 1014 } 1015 } 1016 1017 /* 1018 * add this record to the segacct list. 1019 */ 1020 static void 1021 sa_add(struct proc *pp, caddr_t addr, size_t len, ulong_t flags, kshmid_t *id) 1022 { 1023 segacct_t *nsap; 1024 avl_tree_t *tree = NULL; 1025 avl_index_t where; 1026 1027 nsap = kmem_alloc(sizeof (segacct_t), KM_SLEEP); 1028 nsap->sa_addr = addr; 1029 nsap->sa_len = len; 1030 nsap->sa_flags = flags; 1031 nsap->sa_id = id; 1032 1033 if (pp->p_segacct == NULL) 1034 tree = kmem_alloc(sizeof (avl_tree_t), KM_SLEEP); 1035 1036 mutex_enter(&pp->p_lock); 1037 prbarrier(pp); /* block /proc. See shmgetid(). */ 1038 1039 if (pp->p_segacct == NULL) { 1040 avl_create(tree, shm_sacompar, sizeof (segacct_t), 1041 offsetof(segacct_t, sa_tree)); 1042 pp->p_segacct = tree; 1043 } else if (tree) { 1044 kmem_free(tree, sizeof (avl_tree_t)); 1045 } 1046 1047 /* 1048 * We can ignore the result of avl_find, as the comparator will 1049 * never return equal for segments with non-zero length. This 1050 * is a necessary hack to get around the fact that we do, in 1051 * fact, have duplicate keys. 1052 */ 1053 (void) avl_find(pp->p_segacct, nsap, &where); 1054 avl_insert(pp->p_segacct, nsap, where); 1055 1056 mutex_exit(&pp->p_lock); 1057 } 1058 1059 /* 1060 * Duplicate parent's segacct records in child. 1061 */ 1062 void 1063 shmfork(struct proc *ppp, struct proc *cpp) 1064 { 1065 segacct_t *sap; 1066 kshmid_t *sp; 1067 kmutex_t *mp; 1068 1069 ASSERT(ppp->p_segacct != NULL); 1070 1071 /* 1072 * We are the only lwp running in the parent so nobody can 1073 * mess with our p_segacct list. Thus it is safe to traverse 1074 * the list without holding p_lock. This is essential because 1075 * we can't hold p_lock during a KM_SLEEP allocation. 1076 */ 1077 for (sap = (segacct_t *)avl_first(ppp->p_segacct); sap != NULL; 1078 sap = (segacct_t *)AVL_NEXT(ppp->p_segacct, sap)) { 1079 sa_add(cpp, sap->sa_addr, sap->sa_len, sap->sa_flags, 1080 sap->sa_id); 1081 sp = sap->sa_id; 1082 mp = ipc_lock(shm_svc, sp->shm_perm.ipc_id); 1083 if (sap->sa_flags & SHMSA_ISM) 1084 sp->shm_ismattch++; 1085 ipc_hold(shm_svc, (kipc_perm_t *)sp); 1086 mutex_exit(mp); 1087 } 1088 } 1089 1090 /* 1091 * Detach shared memory segments from exiting process. 1092 */ 1093 void 1094 shmexit(struct proc *pp) 1095 { 1096 segacct_t *sap; 1097 avl_tree_t *tree; 1098 void *cookie = NULL; 1099 1100 ASSERT(pp->p_segacct != NULL); 1101 1102 mutex_enter(&pp->p_lock); 1103 prbarrier(pp); 1104 tree = pp->p_segacct; 1105 pp->p_segacct = NULL; 1106 mutex_exit(&pp->p_lock); 1107 1108 while ((sap = avl_destroy_nodes(tree, &cookie)) != NULL) 1109 (void) shm_detach(pp, sap); 1110 1111 avl_destroy(tree); 1112 kmem_free(tree, sizeof (avl_tree_t)); 1113 } 1114 1115 /* 1116 * At this time pages should be in memory, so just lock them. 1117 */ 1118 static void 1119 lock_again(size_t npages, kshmid_t *sp, struct anon_map *amp) 1120 { 1121 struct anon *ap; 1122 struct page *pp; 1123 struct vnode *vp; 1124 u_offset_t off; 1125 ulong_t anon_idx; 1126 anon_sync_obj_t cookie; 1127 1128 mutex_enter(&sp->shm_mlock); 1129 ANON_LOCK_ENTER(&->a_rwlock, RW_READER); 1130 for (anon_idx = 0; npages != 0; anon_idx++, npages--) { 1131 1132 anon_array_enter(amp, anon_idx, &cookie); 1133 ap = anon_get_ptr(amp->ahp, anon_idx); 1134 ASSERT(ap != NULL); 1135 swap_xlate(ap, &vp, &off); 1136 anon_array_exit(&cookie); 1137 1138 pp = page_lookup(vp, off, SE_SHARED); 1139 if (pp == NULL) { 1140 panic("lock_again: page not in the system"); 1141 /*NOTREACHED*/ 1142 } 1143 /* page should already be locked by caller */ 1144 ASSERT(pp->p_lckcnt > 0); 1145 (void) page_pp_lock(pp, 0, 0); 1146 page_unlock(pp); 1147 } 1148 ANON_LOCK_EXIT(&->a_rwlock); 1149 mutex_exit(&sp->shm_mlock); 1150 } 1151 1152 /* 1153 * Attach the shared memory segment to the process 1154 * address space and lock the pages. 1155 */ 1156 static int 1157 shmem_lock(kshmid_t *sp, struct anon_map *amp) 1158 { 1159 size_t npages = btopr(amp->size); 1160 struct as *as; 1161 struct segvn_crargs crargs; 1162 uint_t error; 1163 1164 /* 1165 * A later ISM/DISM attach may increase the size of the amp, so 1166 * cache the number of pages locked for the future shmem_unlock() 1167 */ 1168 sp->shm_lkpages = npages; 1169 1170 as = as_alloc(); 1171 /* Initialize the create arguments and map the segment */ 1172 crargs = *(struct segvn_crargs *)zfod_argsp; /* structure copy */ 1173 crargs.offset = (u_offset_t)0; 1174 crargs.type = MAP_SHARED; 1175 crargs.amp = amp; 1176 crargs.prot = PROT_ALL; 1177 crargs.maxprot = crargs.prot; 1178 crargs.flags = 0; 1179 error = as_map(as, 0x0, amp->size, segvn_create, &crargs); 1180 if (!error) { 1181 if ((error = as_ctl(as, 0x0, amp->size, MC_LOCK, 0, 0, 1182 NULL, 0)) == 0) { 1183 lock_again(npages, sp, amp); 1184 } 1185 (void) as_unmap(as, 0x0, amp->size); 1186 } 1187 as_free(as); 1188 return (error); 1189 } 1190 1191 1192 /* 1193 * Unlock shared memory 1194 */ 1195 static void 1196 shmem_unlock(kshmid_t *sp, struct anon_map *amp) 1197 { 1198 struct anon *ap; 1199 pgcnt_t npages = sp->shm_lkpages; 1200 struct vnode *vp; 1201 struct page *pp; 1202 u_offset_t off; 1203 ulong_t anon_idx; 1204 size_t unlocked_bytes = 0; 1205 kproject_t *proj; 1206 anon_sync_obj_t cookie; 1207 1208 proj = sp->shm_perm.ipc_proj; 1209 mutex_enter(&sp->shm_mlock); 1210 ANON_LOCK_ENTER(&->a_rwlock, RW_READER); 1211 for (anon_idx = 0; anon_idx < npages; anon_idx++) { 1212 1213 anon_array_enter(amp, anon_idx, &cookie); 1214 if ((ap = anon_get_ptr(amp->ahp, anon_idx)) == NULL) { 1215 panic("shmem_unlock: null app"); 1216 /*NOTREACHED*/ 1217 } 1218 swap_xlate(ap, &vp, &off); 1219 anon_array_exit(&cookie); 1220 pp = page_lookup(vp, off, SE_SHARED); 1221 if (pp == NULL) { 1222 panic("shmem_unlock: page not in the system"); 1223 /*NOTREACHED*/ 1224 } 1225 /* 1226 * Page should at least have once lock from previous 1227 * shmem_lock 1228 */ 1229 ASSERT(pp->p_lckcnt > 0); 1230 page_pp_unlock(pp, 0, 0); 1231 if (pp->p_lckcnt == 0) 1232 unlocked_bytes += PAGESIZE; 1233 1234 page_unlock(pp); 1235 } 1236 1237 if (unlocked_bytes > 0) { 1238 rctl_decr_locked_mem(NULL, proj, unlocked_bytes, 0); 1239 } 1240 1241 ANON_LOCK_EXIT(&->a_rwlock); 1242 mutex_exit(&sp->shm_mlock); 1243 } 1244 1245 /* 1246 * We call this routine when we have removed all references to this 1247 * amp. This means all shmdt()s and the IPC_RMID have been done. 1248 */ 1249 static void 1250 shm_rm_amp(kshmid_t *sp) 1251 { 1252 struct anon_map *amp = sp->shm_amp; 1253 zone_t *zone; 1254 1255 zone = sp->shm_perm.ipc_zone; 1256 ASSERT(zone != NULL); 1257 /* 1258 * Free up the anon_map. 1259 */ 1260 lgrp_shm_policy_fini(amp, NULL); 1261 ANON_LOCK_ENTER(&->a_rwlock, RW_WRITER); 1262 anonmap_purge(amp); 1263 if (amp->a_szc != 0) { 1264 anon_shmap_free_pages(amp, 0, amp->size); 1265 } else { 1266 anon_free(amp->ahp, 0, amp->size); 1267 } 1268 ANON_LOCK_EXIT(&->a_rwlock); 1269 anon_unresv_zone(amp->swresv, zone); 1270 anonmap_free(amp); 1271 } 1272 1273 /* 1274 * Return the shared memory id for the process's virtual address. 1275 * Return SHMID_NONE if addr is not within a SysV shared memory segment. 1276 * Return SHMID_FREE if addr's SysV shared memory segment's id has been freed. 1277 * 1278 * shmgetid() is called from code in /proc with the process locked but 1279 * with pp->p_lock not held. The address space lock is held, so we 1280 * cannot grab pp->p_lock here due to lock-ordering constraints. 1281 * Because of all this, modifications to the p_segacct list must only 1282 * be made after calling prbarrier() to ensure the process is not locked. 1283 * See shmdt() and sa_add(), above. shmgetid() may also be called on a 1284 * thread's own process without the process locked. 1285 */ 1286 int 1287 shmgetid(proc_t *pp, caddr_t addr) 1288 { 1289 segacct_t *sap, template; 1290 1291 ASSERT(MUTEX_NOT_HELD(&pp->p_lock)); 1292 ASSERT((pp->p_proc_flag & P_PR_LOCK) || pp == curproc); 1293 1294 if (pp->p_segacct == NULL) 1295 return (SHMID_NONE); 1296 1297 template.sa_addr = addr; 1298 template.sa_len = 0; 1299 if ((sap = avl_find(pp->p_segacct, &template, NULL)) == NULL) 1300 return (SHMID_NONE); 1301 1302 if (IPC_FREE(&sap->sa_id->shm_perm)) 1303 return (SHMID_FREE); 1304 1305 return (sap->sa_id->shm_perm.ipc_id); 1306 } 1307