[BACK]Return to sysv_shm.c CVS log [TXT][DIR] Up to [local] / sys / kern

Annotation of sys/kern/sysv_shm.c, Revision 1.1.1.1

1.1       nbrk        1: /*     $OpenBSD: sysv_shm.c,v 1.47 2007/05/29 10:44:28 sturm Exp $     */
                      2: /*     $NetBSD: sysv_shm.c,v 1.50 1998/10/21 22:24:29 tron Exp $       */
                      3:
                      4: /*
                      5:  * Copyright (c) 2002 Todd C. Miller <Todd.Miller@courtesan.com>
                      6:  *
                      7:  * Permission to use, copy, modify, and distribute this software for any
                      8:  * purpose with or without fee is hereby granted, provided that the above
                      9:  * copyright notice and this permission notice appear in all copies.
                     10:  *
                     11:  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
                     12:  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
                     13:  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
                     14:  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
                     15:  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
                     16:  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
                     17:  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
                     18:  *
                     19:  * Sponsored in part by the Defense Advanced Research Projects
                     20:  * Agency (DARPA) and Air Force Research Laboratory, Air Force
                     21:  * Materiel Command, USAF, under agreement number F39502-99-1-0512.
                     22:  */
                     23: /*
                     24:  * Copyright (c) 1994 Adam Glass and Charles M. Hannum.  All rights reserved.
                     25:  *
                     26:  * Redistribution and use in source and binary forms, with or without
                     27:  * modification, are permitted provided that the following conditions
                     28:  * are met:
                     29:  * 1. Redistributions of source code must retain the above copyright
                     30:  *    notice, this list of conditions and the following disclaimer.
                     31:  * 2. Redistributions in binary form must reproduce the above copyright
                     32:  *    notice, this list of conditions and the following disclaimer in the
                     33:  *    documentation and/or other materials provided with the distribution.
                     34:  * 3. All advertising materials mentioning features or use of this software
                     35:  *    must display the following acknowledgement:
                     36:  *     This product includes software developed by Adam Glass and Charles M.
                     37:  *     Hannum.
                     38:  * 4. The names of the authors may not be used to endorse or promote products
                     39:  *    derived from this software without specific prior written permission.
                     40:  *
                     41:  * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR
                     42:  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
                     43:  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
                     44:  * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT,
                     45:  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                     46:  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
                     47:  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
                     48:  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
                     49:  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
                     50:  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
                     51:  */
                     52:
                     53: #include <sys/param.h>
                     54: #include <sys/kernel.h>
                     55: #include <sys/shm.h>
                     56: #include <sys/proc.h>
                     57: #include <sys/uio.h>
                     58: #include <sys/time.h>
                     59: #include <sys/malloc.h>
                     60: #include <sys/mman.h>
                     61: #include <sys/pool.h>
                     62: #include <sys/systm.h>
                     63: #include <sys/sysctl.h>
                     64: #include <sys/stat.h>
                     65:
                     66: #include <sys/mount.h>
                     67: #include <sys/syscallargs.h>
                     68:
                     69: #include <uvm/uvm_extern.h>
                     70:
                     71: extern struct shminfo shminfo;
                     72: struct shmid_ds **shmsegs;     /* linear mapping of shmid -> shmseg */
                     73: struct pool shm_pool;
                     74: unsigned short *shmseqs;       /* array of shm sequence numbers */
                     75:
                     76: struct shmid_ds *shm_find_segment_by_shmid(int);
                     77:
                     78: /*
                     79:  * Provides the following externally accessible functions:
                     80:  *
                     81:  * shminit(void);                               initialization
                     82:  * shmexit(struct vmspace *)                     cleanup
                     83:  * shmfork(struct vmspace *, struct vmspace *)   fork handling
                     84:  * shmsys(arg1, arg2, arg3, arg4);         shm{at,ctl,dt,get}(arg2, arg3, arg4)
                     85:  *
                     86:  * Structures:
                     87:  * shmsegs (an array of 'struct shmid_ds *')
                     88:  * per proc 'struct shmmap_head' with an array of 'struct shmmap_state'
                     89:  */
                     90:
                     91: #define        SHMSEG_REMOVED          0x0200          /* can't overlap ACCESSPERMS */
                     92: #define        SHMSEG_RMLINGER         0x0400
                     93:
                     94: int shm_last_free, shm_nused, shm_committed;
                     95:
                     96: struct shm_handle {
                     97:        struct uvm_object *shm_object;
                     98: };
                     99:
                    100: struct shmmap_state {
                    101:        vaddr_t va;
                    102:        int shmid;
                    103: };
                    104:
                    105: struct shmmap_head {
                    106:        int shmseg;
                    107:        struct shmmap_state state[1];
                    108: };
                    109:
                    110: int shm_find_segment_by_key(key_t);
                    111: void shm_deallocate_segment(struct shmid_ds *);
                    112: int shm_delete_mapping(struct vmspace *, struct shmmap_state *);
                    113: int shmget_existing(struct proc *, struct sys_shmget_args *,
                    114:                         int, int, register_t *);
                    115: int shmget_allocate_segment(struct proc *, struct sys_shmget_args *,
                    116:                                 int, register_t *);
                    117:
                    118: int
                    119: shm_find_segment_by_key(key_t key)
                    120: {
                    121:        struct shmid_ds *shmseg;
                    122:        int i;
                    123:
                    124:        for (i = 0; i < shminfo.shmmni; i++) {
                    125:                shmseg = shmsegs[i];
                    126:                if (shmseg != NULL && shmseg->shm_perm.key == key)
                    127:                        return (i);
                    128:        }
                    129:        return (-1);
                    130: }
                    131:
                    132: struct shmid_ds *
                    133: shm_find_segment_by_shmid(int shmid)
                    134: {
                    135:        int segnum;
                    136:        struct shmid_ds *shmseg;
                    137:
                    138:        segnum = IPCID_TO_IX(shmid);
                    139:        if (segnum < 0 || segnum >= shminfo.shmmni ||
                    140:            (shmseg = shmsegs[segnum]) == NULL ||
                    141:            shmseg->shm_perm.seq != IPCID_TO_SEQ(shmid))
                    142:                return (NULL);
                    143:        if ((shmseg->shm_perm.mode & (SHMSEG_REMOVED|SHMSEG_RMLINGER)) == SHMSEG_REMOVED)
                    144:                return (NULL);
                    145:        return (shmseg);
                    146: }
                    147:
                    148: void
                    149: shm_deallocate_segment(struct shmid_ds *shmseg)
                    150: {
                    151:        struct shm_handle *shm_handle;
                    152:        size_t size;
                    153:
                    154:        shm_handle = shmseg->shm_internal;
                    155:        size = round_page(shmseg->shm_segsz);
                    156:        uao_detach(shm_handle->shm_object);
                    157:        pool_put(&shm_pool, shmseg);
                    158:        shm_committed -= btoc(size);
                    159:        shm_nused--;
                    160: }
                    161:
                    162: int
                    163: shm_delete_mapping(struct vmspace *vm, struct shmmap_state *shmmap_s)
                    164: {
                    165:        struct shmid_ds *shmseg;
                    166:        int segnum;
                    167:        size_t size;
                    168:
                    169:        segnum = IPCID_TO_IX(shmmap_s->shmid);
                    170:        if (segnum < 0 || segnum >= shminfo.shmmni ||
                    171:            (shmseg = shmsegs[segnum]) == NULL)
                    172:                return (EINVAL);
                    173:        size = round_page(shmseg->shm_segsz);
                    174:        uvm_deallocate(&vm->vm_map, shmmap_s->va, size);
                    175:        shmmap_s->shmid = -1;
                    176:        shmseg->shm_dtime = time_second;
                    177:        if ((--shmseg->shm_nattch <= 0) &&
                    178:            (shmseg->shm_perm.mode & SHMSEG_REMOVED)) {
                    179:                shm_deallocate_segment(shmseg);
                    180:                shm_last_free = segnum;
                    181:                shmsegs[shm_last_free] = NULL;
                    182:        }
                    183:        return (0);
                    184: }
                    185:
                    186: int
                    187: sys_shmdt(struct proc *p, void *v, register_t *retval)
                    188: {
                    189:        struct sys_shmdt_args /* {
                    190:                syscallarg(const void *) shmaddr;
                    191:        } */ *uap = v;
                    192:        struct shmmap_head *shmmap_h;
                    193:        struct shmmap_state *shmmap_s;
                    194:        int i;
                    195:
                    196:        shmmap_h = (struct shmmap_head *)p->p_vmspace->vm_shm;
                    197:        if (shmmap_h == NULL)
                    198:                return (EINVAL);
                    199:
                    200:        for (i = 0, shmmap_s = shmmap_h->state; i < shmmap_h->shmseg;
                    201:            i++, shmmap_s++)
                    202:                if (shmmap_s->shmid != -1 &&
                    203:                    shmmap_s->va == (vaddr_t)SCARG(uap, shmaddr))
                    204:                        break;
                    205:        if (i == shmmap_h->shmseg)
                    206:                return (EINVAL);
                    207:        return (shm_delete_mapping(p->p_vmspace, shmmap_s));
                    208: }
                    209:
                    210: int
                    211: sys_shmat(struct proc *p, void *v, register_t *retval)
                    212: {
                    213:        struct sys_shmat_args /* {
                    214:                syscallarg(int) shmid;
                    215:                syscallarg(const void *) shmaddr;
                    216:                syscallarg(int) shmflg;
                    217:        } */ *uap = v;
                    218:        int error, i, flags;
                    219:        struct ucred *cred = p->p_ucred;
                    220:        struct shmid_ds *shmseg;
                    221:        struct shmmap_head *shmmap_h;
                    222:        struct shmmap_state *shmmap_s;
                    223:        struct shm_handle *shm_handle;
                    224:        vaddr_t attach_va;
                    225:        vm_prot_t prot;
                    226:        vsize_t size;
                    227:
                    228:        shmmap_h = (struct shmmap_head *)p->p_vmspace->vm_shm;
                    229:        if (shmmap_h == NULL) {
                    230:                size = sizeof(int) +
                    231:                    shminfo.shmseg * sizeof(struct shmmap_state);
                    232:                shmmap_h = malloc(size, M_SHM, M_WAITOK);
                    233:                shmmap_h->shmseg = shminfo.shmseg;
                    234:                for (i = 0, shmmap_s = shmmap_h->state; i < shmmap_h->shmseg;
                    235:                    i++, shmmap_s++)
                    236:                        shmmap_s->shmid = -1;
                    237:                p->p_vmspace->vm_shm = (caddr_t)shmmap_h;
                    238:        }
                    239:        shmseg = shm_find_segment_by_shmid(SCARG(uap, shmid));
                    240:        if (shmseg == NULL)
                    241:                return (EINVAL);
                    242:        error = ipcperm(cred, &shmseg->shm_perm,
                    243:                    (SCARG(uap, shmflg) & SHM_RDONLY) ? IPC_R : IPC_R|IPC_W);
                    244:        if (error)
                    245:                return (error);
                    246:        for (i = 0, shmmap_s = shmmap_h->state; i < shmmap_h->shmseg; i++) {
                    247:                if (shmmap_s->shmid == -1)
                    248:                        break;
                    249:                shmmap_s++;
                    250:        }
                    251:        if (i >= shmmap_h->shmseg)
                    252:                return (EMFILE);
                    253:        size = round_page(shmseg->shm_segsz);
                    254:        prot = VM_PROT_READ;
                    255:        if ((SCARG(uap, shmflg) & SHM_RDONLY) == 0)
                    256:                prot |= VM_PROT_WRITE;
                    257:        flags = MAP_ANON | MAP_SHARED;
                    258:        if (SCARG(uap, shmaddr)) {
                    259:                flags |= MAP_FIXED;
                    260:                if (SCARG(uap, shmflg) & SHM_RND)
                    261:                        attach_va =
                    262:                            (vaddr_t)SCARG(uap, shmaddr) & ~(SHMLBA-1);
                    263:                else if (((vaddr_t)SCARG(uap, shmaddr) & (SHMLBA-1)) == 0)
                    264:                        attach_va = (vaddr_t)SCARG(uap, shmaddr);
                    265:                else
                    266:                        return (EINVAL);
                    267:        } else {
                    268:                /* This is just a hint to uvm_map() about where to put it. */
                    269:                attach_va = uvm_map_hint(p, prot);
                    270:        }
                    271:        shm_handle = shmseg->shm_internal;
                    272:        uao_reference(shm_handle->shm_object);
                    273:        error = uvm_map(&p->p_vmspace->vm_map, &attach_va, size,
                    274:            shm_handle->shm_object, 0, 0, UVM_MAPFLAG(prot, prot,
                    275:            UVM_INH_SHARE, UVM_ADV_RANDOM, 0));
                    276:        if (error) {
                    277:                uao_detach(shm_handle->shm_object);
                    278:                return (error);
                    279:        }
                    280:
                    281:        shmmap_s->va = attach_va;
                    282:        shmmap_s->shmid = SCARG(uap, shmid);
                    283:        shmseg->shm_lpid = p->p_pid;
                    284:        shmseg->shm_atime = time_second;
                    285:        shmseg->shm_nattch++;
                    286:        *retval = attach_va;
                    287:        return (0);
                    288: }
                    289:
                    290: int
                    291: sys_shmctl(struct proc *p, void *v, register_t *retval)
                    292: {
                    293:        struct sys_shmctl_args /* {
                    294:                syscallarg(int) shmid;
                    295:                syscallarg(int) cmd;
                    296:                syscallarg(struct shmid_ds *) buf;
                    297:        } */ *uap = v;
                    298:
                    299:        return (shmctl1(p, SCARG(uap, shmid), SCARG(uap, cmd),
                    300:            (caddr_t)SCARG(uap, buf), copyin, copyout));
                    301: }
                    302:
                    303: int
                    304: shmctl1(struct proc *p, int shmid, int cmd, caddr_t buf,
                    305:     int (*ds_copyin)(const void *, void *, size_t),
                    306:     int (*ds_copyout)(const void *, void *, size_t))
                    307: {
                    308:        struct ucred *cred = p->p_ucred;
                    309:        struct shmid_ds inbuf, *shmseg;
                    310:        int error;
                    311:
                    312:        shmseg = shm_find_segment_by_shmid(shmid);
                    313:        if (shmseg == NULL)
                    314:                return (EINVAL);
                    315:        switch (cmd) {
                    316:        case IPC_STAT:
                    317:                if ((error = ipcperm(cred, &shmseg->shm_perm, IPC_R)) != 0)
                    318:                        return (error);
                    319:                error = ds_copyout(shmseg, buf, sizeof(inbuf));
                    320:                if (error)
                    321:                        return (error);
                    322:                break;
                    323:        case IPC_SET:
                    324:                if ((error = ipcperm(cred, &shmseg->shm_perm, IPC_M)) != 0)
                    325:                        return (error);
                    326:                error = ds_copyin(buf, &inbuf, sizeof(inbuf));
                    327:                if (error)
                    328:                        return (error);
                    329:                shmseg->shm_perm.uid = inbuf.shm_perm.uid;
                    330:                shmseg->shm_perm.gid = inbuf.shm_perm.gid;
                    331:                shmseg->shm_perm.mode =
                    332:                    (shmseg->shm_perm.mode & ~ACCESSPERMS) |
                    333:                    (inbuf.shm_perm.mode & ACCESSPERMS);
                    334:                shmseg->shm_ctime = time_second;
                    335:                break;
                    336:        case IPC_RMID:
                    337:                if ((error = ipcperm(cred, &shmseg->shm_perm, IPC_M)) != 0)
                    338:                        return (error);
                    339:                shmseg->shm_perm.key = IPC_PRIVATE;
                    340:                shmseg->shm_perm.mode |= SHMSEG_REMOVED;
                    341:                if (shmseg->shm_nattch <= 0) {
                    342:                        shm_deallocate_segment(shmseg);
                    343:                        shm_last_free = IPCID_TO_IX(shmid);
                    344:                        shmsegs[shm_last_free] = NULL;
                    345:                }
                    346:                break;
                    347:        case SHM_LOCK:
                    348:        case SHM_UNLOCK:
                    349:        default:
                    350:                return (EINVAL);
                    351:        }
                    352:        return (0);
                    353: }
                    354:
                    355: int
                    356: shmget_existing(struct proc *p,
                    357:        struct sys_shmget_args /* {
                    358:                syscallarg(key_t) key;
                    359:                syscallarg(size_t) size;
                    360:                syscallarg(int) shmflg;
                    361:        } */ *uap,
                    362:        int mode, int segnum, register_t *retval)
                    363: {
                    364:        struct shmid_ds *shmseg;
                    365:        struct ucred *cred = p->p_ucred;
                    366:        int error;
                    367:
                    368:        shmseg = shmsegs[segnum];       /* We assume the segnum is valid */
                    369:        if ((error = ipcperm(cred, &shmseg->shm_perm, mode)) != 0)
                    370:                return (error);
                    371:        if (SCARG(uap, size) && SCARG(uap, size) > shmseg->shm_segsz)
                    372:                return (EINVAL);
                    373:        if ((SCARG(uap, shmflg) & (IPC_CREAT | IPC_EXCL)) ==
                    374:            (IPC_CREAT | IPC_EXCL))
                    375:                return (EEXIST);
                    376:        *retval = IXSEQ_TO_IPCID(segnum, shmseg->shm_perm);
                    377:        return (0);
                    378: }
                    379:
                    380: int
                    381: shmget_allocate_segment(struct proc *p,
                    382:        struct sys_shmget_args /* {
                    383:                syscallarg(key_t) key;
                    384:                syscallarg(size_t) size;
                    385:                syscallarg(int) shmflg;
                    386:        } */ *uap,
                    387:        int mode, register_t *retval)
                    388: {
                    389:        size_t size;
                    390:        key_t key;
                    391:        int segnum;
                    392:        struct ucred *cred = p->p_ucred;
                    393:        struct shmid_ds *shmseg;
                    394:        struct shm_handle *shm_handle;
                    395:        int error = 0;
                    396:
                    397:        if (SCARG(uap, size) < shminfo.shmmin ||
                    398:            SCARG(uap, size) > shminfo.shmmax)
                    399:                return (EINVAL);
                    400:        if (shm_nused >= shminfo.shmmni) /* any shmids left? */
                    401:                return (ENOSPC);
                    402:        size = round_page(SCARG(uap, size));
                    403:        if (shm_committed + btoc(size) > shminfo.shmall)
                    404:                return (ENOMEM);
                    405:        shm_nused++;
                    406:        shm_committed += btoc(size);
                    407:
                    408:        /*
                    409:         * If a key has been specified and we had to wait for memory
                    410:         * to be freed up we need to verify that no one has allocated
                    411:         * the key we want in the meantime.  Yes, this is ugly.
                    412:         */
                    413:        key = SCARG(uap, key);
                    414:        shmseg = pool_get(&shm_pool, key == IPC_PRIVATE ? PR_WAITOK : 0);
                    415:        if (shmseg == NULL) {
                    416:                shmseg = pool_get(&shm_pool, PR_WAITOK);
                    417:                if (shm_find_segment_by_key(key) != -1) {
                    418:                        pool_put(&shm_pool, shmseg);
                    419:                        shm_nused--;
                    420:                        shm_committed -= btoc(size);
                    421:                        return (EAGAIN);
                    422:                }
                    423:        }
                    424:
                    425:        /* XXX - hash shmids instead */
                    426:        if (shm_last_free < 0) {
                    427:                for (segnum = 0; segnum < shminfo.shmmni && shmsegs[segnum];
                    428:                    segnum++)
                    429:                        ;
                    430:                if (segnum == shminfo.shmmni)
                    431:                        panic("shmseg free count inconsistent");
                    432:        } else {
                    433:                segnum = shm_last_free;
                    434:                if (++shm_last_free >= shminfo.shmmni || shmsegs[shm_last_free])
                    435:                        shm_last_free = -1;
                    436:        }
                    437:        shmsegs[segnum] = shmseg;
                    438:
                    439:        shm_handle = (struct shm_handle *)((caddr_t)shmseg + sizeof(*shmseg));
                    440:        shm_handle->shm_object = uao_create(size, 0);
                    441:
                    442:        shmseg->shm_perm.cuid = shmseg->shm_perm.uid = cred->cr_uid;
                    443:        shmseg->shm_perm.cgid = shmseg->shm_perm.gid = cred->cr_gid;
                    444:        shmseg->shm_perm.mode = (mode & (ACCESSPERMS|SHMSEG_RMLINGER));
                    445:        shmseg->shm_perm.seq = shmseqs[segnum] = (shmseqs[segnum] + 1) & 0x7fff;
                    446:        shmseg->shm_perm.key = key;
                    447:        shmseg->shm_segsz = SCARG(uap, size);
                    448:        shmseg->shm_cpid = p->p_pid;
                    449:        shmseg->shm_lpid = shmseg->shm_nattch = 0;
                    450:        shmseg->shm_atime = shmseg->shm_dtime = 0;
                    451:        shmseg->shm_ctime = time_second;
                    452:        shmseg->shm_internal = shm_handle;
                    453:
                    454:        *retval = IXSEQ_TO_IPCID(segnum, shmseg->shm_perm);
                    455:        return (error);
                    456: }
                    457:
                    458: int
                    459: sys_shmget(struct proc *p, void *v, register_t *retval)
                    460: {
                    461:        struct sys_shmget_args /* {
                    462:                syscallarg(key_t) key;
                    463:                syscallarg(size_t) size;
                    464:                syscallarg(int) shmflg;
                    465:        } */ *uap = v;
                    466:        int segnum, mode, error;
                    467:
                    468:        mode = SCARG(uap, shmflg) & ACCESSPERMS;
                    469:        if (SCARG(uap, shmflg) & _SHM_RMLINGER)
                    470:                mode |= SHMSEG_RMLINGER;
                    471:
                    472:        if (SCARG(uap, key) != IPC_PRIVATE) {
                    473:        again:
                    474:                segnum = shm_find_segment_by_key(SCARG(uap, key));
                    475:                if (segnum >= 0)
                    476:                        return (shmget_existing(p, uap, mode, segnum, retval));
                    477:                if ((SCARG(uap, shmflg) & IPC_CREAT) == 0)
                    478:                        return (ENOENT);
                    479:        }
                    480:        error = shmget_allocate_segment(p, uap, mode, retval);
                    481:        if (error == EAGAIN)
                    482:                goto again;
                    483:        return (error);
                    484: }
                    485:
                    486: void
                    487: shmfork(struct vmspace *vm1, struct vmspace *vm2)
                    488: {
                    489:        struct shmmap_head *shmmap_h;
                    490:        struct shmmap_state *shmmap_s;
                    491:        struct shmid_ds *shmseg;
                    492:        size_t size;
                    493:        int i;
                    494:
                    495:        if (vm1->vm_shm == NULL) {
                    496:                vm2->vm_shm = NULL;
                    497:                return;
                    498:        }
                    499:
                    500:        shmmap_h = (struct shmmap_head *)vm1->vm_shm;
                    501:        size = sizeof(int) + shmmap_h->shmseg * sizeof(struct shmmap_state);
                    502:        vm2->vm_shm = malloc(size, M_SHM, M_WAITOK);
                    503:        bcopy(vm1->vm_shm, vm2->vm_shm, size);
                    504:        for (i = 0, shmmap_s = shmmap_h->state; i < shmmap_h->shmseg;
                    505:            i++, shmmap_s++) {
                    506:                if (shmmap_s->shmid != -1 &&
                    507:                    (shmseg = shmsegs[IPCID_TO_IX(shmmap_s->shmid)]) != NULL)
                    508:                        shmseg->shm_nattch++;
                    509:        }
                    510: }
                    511:
                    512: void
                    513: shmexit(struct vmspace *vm)
                    514: {
                    515:        struct shmmap_head *shmmap_h;
                    516:        struct shmmap_state *shmmap_s;
                    517:        int i;
                    518:
                    519:        shmmap_h = (struct shmmap_head *)vm->vm_shm;
                    520:        if (shmmap_h == NULL)
                    521:                return;
                    522:        for (i = 0, shmmap_s = shmmap_h->state; i < shmmap_h->shmseg;
                    523:            i++, shmmap_s++)
                    524:                if (shmmap_s->shmid != -1)
                    525:                        shm_delete_mapping(vm, shmmap_s);
                    526:        free(vm->vm_shm, M_SHM);
                    527:        vm->vm_shm = NULL;
                    528: }
                    529:
                    530: void
                    531: shminit(void)
                    532: {
                    533:
                    534:        pool_init(&shm_pool, sizeof(struct shmid_ds) +
                    535:            sizeof(struct shm_handle), 0, 0, 0, "shmpl",
                    536:            &pool_allocator_nointr);
                    537:        shmsegs = malloc(shminfo.shmmni * sizeof(struct shmid_ds *),
                    538:            M_SHM, M_WAITOK);
                    539:        bzero(shmsegs, shminfo.shmmni * sizeof(struct shmid_ds *));
                    540:        shmseqs = malloc(shminfo.shmmni * sizeof(unsigned short),
                    541:            M_SHM, M_WAITOK);
                    542:        bzero(shmseqs, shminfo.shmmni * sizeof(unsigned short));
                    543:
                    544:        shminfo.shmmax *= PAGE_SIZE;    /* actually in pages */
                    545:        shm_last_free = 0;
                    546:        shm_nused = 0;
                    547:        shm_committed = 0;
                    548: }
                    549:
                    550: /*
                    551:  * Userland access to struct shminfo.
                    552:  */
                    553: int
                    554: sysctl_sysvshm(int *name, u_int namelen, void *oldp, size_t *oldlenp,
                    555:        void *newp, size_t newlen)
                    556: {
                    557:        int error, val;
                    558:        struct shmid_ds **newsegs;
                    559:        unsigned short *newseqs;
                    560:
                    561:        if (namelen != 2) {
                    562:                switch (name[0]) {
                    563:                case KERN_SHMINFO_SHMMAX:
                    564:                case KERN_SHMINFO_SHMMIN:
                    565:                case KERN_SHMINFO_SHMMNI:
                    566:                case KERN_SHMINFO_SHMSEG:
                    567:                case KERN_SHMINFO_SHMALL:
                    568:                        break;
                    569:                default:
                    570:                         return (ENOTDIR);       /* overloaded */
                    571:                 }
                    572:         }
                    573:
                    574:        switch (name[0]) {
                    575:        case KERN_SHMINFO_SHMMAX:
                    576:                if ((error = sysctl_int(oldp, oldlenp, newp, newlen,
                    577:                    &shminfo.shmmax)) || newp == NULL)
                    578:                        return (error);
                    579:
                    580:                /* If new shmmax > shmall, crank shmall */
                    581:                if (btoc(round_page(shminfo.shmmax)) > shminfo.shmall)
                    582:                        shminfo.shmall = btoc(round_page(shminfo.shmmax));
                    583:                return (0);
                    584:        case KERN_SHMINFO_SHMMIN:
                    585:                val = shminfo.shmmin;
                    586:                if ((error = sysctl_int(oldp, oldlenp, newp, newlen, &val)) ||
                    587:                    val == shminfo.shmmin)
                    588:                        return (error);
                    589:                if (val <= 0)
                    590:                        return (EINVAL);        /* shmmin must be >= 1 */
                    591:                shminfo.shmmin = val;
                    592:                return (0);
                    593:        case KERN_SHMINFO_SHMMNI:
                    594:                val = shminfo.shmmni;
                    595:                if ((error = sysctl_int(oldp, oldlenp, newp, newlen, &val)) ||
                    596:                    val == shminfo.shmmni)
                    597:                        return (error);
                    598:
                    599:                if (val < shminfo.shmmni || val > 0xffff)
                    600:                        return (EINVAL);
                    601:
                    602:                /* Expand shmsegs and shmseqs arrays */
                    603:                newsegs = malloc(val * sizeof(struct shmid_ds *),
                    604:                    M_SHM, M_WAITOK);
                    605:                bcopy(shmsegs, newsegs,
                    606:                    shminfo.shmmni * sizeof(struct shmid_ds *));
                    607:                bzero(newsegs + shminfo.shmmni,
                    608:                    (val - shminfo.shmmni) * sizeof(struct shmid_ds *));
                    609:                free(shmsegs, M_SHM);
                    610:                shmsegs = newsegs;
                    611:                newseqs = malloc(val * sizeof(unsigned short), M_SHM, M_WAITOK);
                    612:                bcopy(shmseqs, newseqs,
                    613:                    shminfo.shmmni * sizeof(unsigned short));
                    614:                bzero(newseqs + shminfo.shmmni,
                    615:                    (val - shminfo.shmmni) * sizeof(unsigned short));
                    616:                free(shmseqs, M_SHM);
                    617:                shmseqs = newseqs;
                    618:                shminfo.shmmni = val;
                    619:                return (0);
                    620:        case KERN_SHMINFO_SHMSEG:
                    621:                val = shminfo.shmseg;
                    622:                if ((error = sysctl_int(oldp, oldlenp, newp, newlen, &val)) ||
                    623:                    val == shminfo.shmseg)
                    624:                        return (error);
                    625:                if (val <= 0)
                    626:                        return (EINVAL);        /* shmseg must be >= 1 */
                    627:                shminfo.shmseg = val;
                    628:                return (0);
                    629:        case KERN_SHMINFO_SHMALL:
                    630:                val = shminfo.shmall;
                    631:                if ((error = sysctl_int(oldp, oldlenp, newp, newlen, &val)) ||
                    632:                    val == shminfo.shmall)
                    633:                        return (error);
                    634:                if (val < shminfo.shmall)
                    635:                        return (EINVAL);        /* can't decrease shmall */
                    636:                shminfo.shmall = val;
                    637:                return (0);
                    638:        default:
                    639:                return (EOPNOTSUPP);
                    640:        }
                    641:        /* NOTREACHED */
                    642: }

CVSweb