2008/7/15 Ingo Weinhold <ingo_weinhold@xxxxxx>: >> But what if some programs do share IPC keys for different kinds of IPC >> subsystems? >> Wouldn't that result in a bug from the application POV? > > I don't see what kind of potential bug you're thinking of. > If it's ok with you, I'd like to investigate a bit more on this before removing the special case and use an ipc table for each subsystem, because although the standard does not say explicitly to use the same ipc table for all subsystems it does provide an error code for the above situation [ENOENT] A semaphore identifier does not exist for the argument key and (semflg &IPC_CREAT) is equal to 0. and keys gets created on any {sem,msg,shm}get call. Anyway, I've attached a patch that (hopefully) fix all previous issue, and also (hopefully) add the rest of missing features without any other mistakes. It's still not 100% complete though. I'll look into a test application next. Regards, -- Salvatore Benedetto (a.k.a. emitrax) Student of Computer Engineer University of Pisa www.haiku-os.it
Index: src/system/kernel/main.cpp =================================================================== --- src/system/kernel/main.cpp (revision 26439) +++ src/system/kernel/main.cpp (working copy) @@ -36,6 +36,7 @@ #include <Notifications.h> #include <port.h> #include <posix/realtime_sem.h> +#include <posix/xsi_semaphore.h> #include <real_time_clock.h> #include <sem.h> #include <smp.h> @@ -170,7 +171,9 @@ TRACE("init kernel daemons\n"); kernel_daemon_init(); arch_platform_init_post_thread(&sKernelArgs); + TRACE("init posix semaphores\n"); realtime_sem_init(); + xsi_ipc_init(); TRACE("init VM threads\n"); vm_init_post_thread(&sKernelArgs); Index: src/system/kernel/posix/Jamfile =================================================================== --- src/system/kernel/posix/Jamfile (revision 26439) +++ src/system/kernel/posix/Jamfile (working copy) @@ -4,6 +4,7 @@ KernelMergeObject kernel_posix.o : realtime_sem.cpp + xsi_semaphore.cpp : $(TARGET_KERNEL_PIC_CCFLAGS) ; Index: src/system/kernel/posix/xsi_semaphore.cpp =================================================================== --- src/system/kernel/posix/xsi_semaphore.cpp (revision 0) +++ src/system/kernel/posix/xsi_semaphore.cpp (revision 0) @@ -0,0 +1,842 @@ +/* + * Copyright 2008, Haiku Inc. All rights reserved. + * Distributed under the terms of the MIT License. + * + * Authors: + * Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx> + */ + +#include <posix/xsi_semaphore.h> + +#include <new> + +#include <sys/ipc.h> +#include <sys/types.h> + +#include <OS.h> + +#include <kernel.h> +#include <syscall_restart.h> + +#include <util/AutoLock.h> +#include <util/DoublyLinkedList.h> +#include <util/OpenHashTable.h> +#include <util/Vector.h> + + +//#define TRACE_XSI_SEM +#ifdef TRACE_XSI_SEM +# define TRACE(x) dprintf x +# define TRACE_ERROR(x) dprintf x +#else +# define TRACE(x) /* nothing */ +# define TRACE_ERROR(x) dprintf x +#endif + +//#define KTRACE_XSI_SEM +#ifdef KTRACE_XSI_SEM +# define KTRACE(x...) ktrace_printf(x) +#else +# define KTRACE(x...) +#endif + +// Queue for holding blocked threads +struct queued_thread : DoublyLinkedListLinkImpl<queued_thread> { + queued_thread(struct thread *thread, int32 count) + : + thread(thread), + count(count), + queued(false) + { + } + + struct thread *thread; + int32 count; + bool queued; +}; + +typedef DoublyLinkedList<queued_thread> ThreadQueue; + + +// Xsi semaphore definition +class XsiSemaphore { +public: + XsiSemaphore() + : fLastPidOperation(0), + fThreadsWaitingToIncrease(0), + fThreadsWaitingToBeZero(0), + fValue(0) + { + } + + ~XsiSemaphore() + { + // For some reason the semaphore is getting destroyed. + // Wake up any remaing awaiting threads + InterruptsSpinLocker _(thread_spinlock); + while (queued_thread *entry = fWaitingToIncreaseQueue.RemoveHead()) { + entry->queued = false; + thread_unblock_locked(entry->thread, EIDRM); + } + while (queued_thread *entry = fWaitingToBeZeroQueue.RemoveHead()) { + entry->queued = false; + thread_unblock_locked(entry->thread, EIDRM); + } + } + + // We return true in case the operation causes the + // caller to wait, so it can undo all the operations + // previously done + bool Add(short value) + { + if ((int)(fValue + value) < 0) { + TRACE(("XsiSemaphore::Add: going to sleep\n")); + return true; + } else { + fValue += value; + if (fValue == 0 && fThreadsWaitingToBeZero > 0) + WakeUpThread(true); + else if (fValue > 0 && fThreadsWaitingToIncrease > 0) + WakeUpThread(false); + return false; + } + } + + pid_t LastPid() const + { + return fLastPidOperation; + } + + void Revert(short value) + { + fValue -= value; + } + + ushort ThreadsWaitingToIncrease() const + { + return fThreadsWaitingToIncrease; + } + + ushort ThreadsWaitingToBeZero() const + { + return fThreadsWaitingToBeZero; + } + + ushort Value() const + { + return fValue; + } + + void SetPid(pid_t pid) + { + fLastPidOperation = pid; + } + + void SetValue(ushort value) + { + // TODO: the semadj value corresponding to the + // specified semaphore in all processes is cleared + fValue = value; + } + + status_t Wait(int32 count, bool waitForZero) + { + // enqueue the thread in the appropriate + // queue and get ready to wait + struct thread *thread = thread_get_current_thread(); + queued_thread queueEntry(thread, count); + if (waitForZero) { + fWaitingToBeZeroQueue.Add(&queueEntry); + fThreadsWaitingToBeZero++; + } else { + fWaitingToIncreaseQueue.Add(&queueEntry); + fThreadsWaitingToIncrease++; + } + queueEntry.queued = true; + + thread_prepare_to_block(thread, B_CAN_INTERRUPT, + THREAD_BLOCK_TYPE_OTHER, (void*)"xsi semaphore"); + + InterruptsSpinLocker _(thread_spinlock); + status_t result = thread_block_locked(thread); + + return result; + } + + void WakeUpThread(bool waitingForZero) + { + queued_thread *entry; + bool unblock = false; + + InterruptsSpinLocker _(thread_spinlock); + if (waitingForZero) { + unblock = true; + entry = fWaitingToBeZeroQueue.RemoveHead(); + } else { + entry = fWaitingToIncreaseQueue.Head(); + if ((entry->count + fValue) >= 0) { + unblock = true; + entry = fWaitingToIncreaseQueue.RemoveHead(); + } + } + if (unblock) { + entry->queued = false; + thread_unblock_locked(entry->thread, 0); + } + } + +private: + pid_t fLastPidOperation; // sempid + ushort fThreadsWaitingToIncrease; // semncnt + ushort fThreadsWaitingToBeZero; // semzcnt + short fValue; // semval + + ThreadQueue fWaitingToIncreaseQueue; + ThreadQueue fWaitingToBeZeroQueue; +}; + +#define MAX_XSI_SEMS_PER_TEAM 128 + +// Xsi semaphore set definition (semid_ds) +class XsiSemaphoreSet { +public: + XsiSemaphoreSet(int nsems, int flags) + : fLastSemctlTime((time_t)real_time_clock()), + fLastSemopTime(0), + fNumberOfSemaphores(nsems), + fSemaphores(0) + { + SetID(); + SetIpcKey((key_t)-1); + SetPermissions(flags); + fSemaphores = new(std::nothrow) XsiSemaphore[nsems]; + + if (fSemaphores == NULL) { + TRACE_ERROR(("XsiSemaphoreSet::XsiSemaphore(): failed to allocate " + "XsiSemaphore object\n")); + return; + } + } + + ~XsiSemaphoreSet() + { + delete []fSemaphores; + } + + void DoIpcSet(struct semid_ds *result) + { + fPermissions.uid = result->sem_perm.uid; + fPermissions.gid = result->sem_perm.gid; + fPermissions.mode = (fPermissions.mode & ~0x01ff) + | (result->sem_perm.mode & 0x01ff); + } + + int ID() const + { + return fID; + } + + key_t IpcKey() const + { + return fPermissions.key; + } + + struct ipc_perm IpcPermission() const + { + return fPermissions; + } + + time_t LastSemctlTime() const + { + return fLastSemctlTime; + } + + time_t LastSemopTime() const + { + return fLastSemopTime; + } + + ushort NumberOfSemaphores() const + { + return fNumberOfSemaphores; + } + + XsiSemaphore* Semaphore(int nth) const + { + return &fSemaphores[nth]; + } + + // Implemented after sSemaphoreHashTable is declared + void SetID(); + + void SetIpcKey(key_t key) + { + fPermissions.key = key; + } + + void SetLastSemctlTime() + { + fLastSemctlTime = real_time_clock(); + } + + void SetLastSemopTime() + { + fLastSemopTime = real_time_clock(); + } + + void SetPermissions(int flags) + { + fPermissions.uid = fPermissions.cuid = geteuid(); + fPermissions.gid = fPermissions.cgid = getegid(); + fPermissions.mode = (flags & 0x01ff); + } + + bool HasPermission() const + { + if ((fPermissions.mode & S_IWOTH) != 0) + return true; + + uid_t uid = geteuid(); + if (uid == 0 || (uid == fPermissions.uid + && (fPermissions.mode & S_IWUSR) != 0)) + return true; + + gid_t gid = getegid(); + if (gid == fPermissions.gid && (fPermissions.mode & S_IWGRP) != 0) + return true; + + return false; + } + + bool HasReadPermission() const + { + // TODO: fix this + return HasPermission(); + } + + HashTableLink<XsiSemaphoreSet>* Link() + { + return &fLink; + } + +private: + int fID; // semaphore set id + time_t fLastSemctlTime; // sem_ctime + time_t fLastSemopTime; // sem_otime + ushort fNumberOfSemaphores; // sem_nsems + struct ipc_perm fPermissions; // sem_perm + XsiSemaphore *fSemaphores; + + ::HashTableLink<XsiSemaphoreSet> fLink; +}; + +// Xsi semaphore set hash table +struct SemaphoreHashTableDefinition { + typedef int KeyType; + typedef XsiSemaphoreSet ValueType; + + size_t HashKey (const int key) const + { + return (size_t)key; + } + size_t Hash(XsiSemaphoreSet *variable) const + { + return (size_t)variable->ID(); + } + bool Compare(const int key, XsiSemaphoreSet *variable) const + { + return (int)key == (int)variable->ID(); + } + HashTableLink<XsiSemaphoreSet>* GetLink(XsiSemaphoreSet *variable) const + { + return variable->Link(); + } +}; + + +// IPC class +class Ipc { +public: + Ipc(key_t key) + : fKey(key), + fSemaphoreSetId(-1) + { + } + + key_t Key() const + { + return fKey; + } + + int SemaphoreSetID() const + { + return fSemaphoreSetId; + } + + void SetSemaphoreSetID(XsiSemaphoreSet *semaphoreSet) + { + fSemaphoreSetId = semaphoreSet->ID(); + } + + bool HasSemaphoreSet() + { + if (fSemaphoreSetId != -1) + return true; + return false; + } + + HashTableLink<Ipc>* Link() + { + return &fLink; + } + +private: + key_t fKey; + int fSemaphoreSetId; + HashTableLink<Ipc> fLink; +}; + + +struct IpcHashTableDefinition { + typedef key_t KeyType; + typedef Ipc ValueType; + + size_t HashKey (const key_t key) const + { + return (size_t)(key); + } + size_t Hash(Ipc *variable) const + { + return (size_t)HashKey(variable->Key()); + } + bool Compare(const key_t key, Ipc *variable) const + { + return (key_t)key == (key_t)variable->Key(); + } + HashTableLink<Ipc>* GetLink(Ipc *variable) const + { + return variable->Link(); + } +}; + +// Arbitrary limit +#define MAX_XSI_SEMAPHORE 512 +static OpenHashTable<IpcHashTableDefinition> sIpcHashTable; +static OpenHashTable<SemaphoreHashTableDefinition> sSemaphoreHashTable; + +static mutex sXsiSemaphoreSetLock; +static mutex sIpcLock; +static vint32 sNextAvailableID = 0; +static vint32 sTotalNumberOfXsiSemaphores = 0; + + +void +XsiSemaphoreSet::SetID() +{ + // The lock is held upon creation of the object + while (true) { + if (sSemaphoreHashTable.Lookup(sNextAvailableID) == NULL) + break; + sNextAvailableID++; + } + fID = sNextAvailableID++; +} + + +void +xsi_ipc_init() +{ + // Initialize hash tables + status_t status = sIpcHashTable.Init(); + if (status != B_OK) + panic("xsi_ipc_init() failed to initialized ipc hash table\n"); + status = sSemaphoreHashTable.Init(); + if (status != B_OK) + panic("xsi_ipc_init() failed to initialized semaphore hash table\n"); + + mutex_init(&sIpcLock, "global Posix IPC table"); + mutex_init(&sXsiSemaphoreSetLock, "global Posix xsi sem table"); +} + + +int +_user_xsi_semget(key_t key, int numberOfSemaphores, int flags) +{ + XsiSemaphoreSet *semaphoreSet = NULL; + Ipc *ipcKey = NULL; + // Default assumptions + bool isPrivate = true; + bool create = true; + + MutexLocker _(sIpcLock); + if (key != IPC_PRIVATE) { + isPrivate = false; + // Check if key already have a semaphore + // associated with it + ipcKey = sIpcHashTable.Lookup(key); + if (ipcKey == NULL) { + // The ipc key have probably just been created + // by the caller, add it to the system + ipcKey = new(std::nothrow) Ipc(key); + if (ipcKey == NULL) { + TRACE_ERROR(("xsi_semget: failed to create new Ipc object " + "for key %d\n", (int)key)); + return ENOMEM; + } + sIpcHashTable.Insert(ipcKey); + } else if (ipcKey->HasSemaphoreSet()) { + // The IPC key exist and it already has a semaphore + if ((flags & IPC_CREAT) && (flags & IPC_EXCL)) { + TRACE_ERROR(("xsi_semget: key %d already exist\n", (int)key)); + return EEXIST; + } + int semaphoreSetID = ipcKey->SemaphoreSetID(); + + MutexLocker _(sXsiSemaphoreSetLock); + semaphoreSet = sSemaphoreHashTable.Lookup(semaphoreSetID); + if (!semaphoreSet->HasPermission()) { + TRACE_ERROR(("xsi_semget: calling process has not permission " + "on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + if (semaphoreSet->NumberOfSemaphores() >= numberOfSemaphores + && numberOfSemaphores != 0) { + TRACE_ERROR(("xsi_semget: nsems greater than the one " + "associated with semaphore %d, key %d\n", + semaphoreSet->ID(), (int)semaphoreSet->IpcKey())); + return EINVAL; + } + create = false; + } else { + // The IPC key exist but it has not semaphore associated with it + if (!(flags & IPC_CREAT)) { + TRACE_ERROR(("xsi_semget: key %d has not semaphore associated " + "with it and caller did not ask for creation\n",(int)key)); + return ENOENT; + } + } + } + + if (create) { + // Create a new sempahore for this key + if (numberOfSemaphores < 0 + || numberOfSemaphores >= MAX_XSI_SEMS_PER_TEAM) { + TRACE_ERROR(("xsi_semget: nsems out of range\n")); + return EINVAL; + } + if (sTotalNumberOfXsiSemaphores >= MAX_XSI_SEMAPHORE) { + TRACE_ERROR(("xsi_semget: reached limit of maximum number of " + "semaphores allowed\n")); + return ENOSPC; + } + atomic_add(&sTotalNumberOfXsiSemaphores, 1); + + MutexLocker _(sXsiSemaphoreSetLock); + semaphoreSet = new(std::nothrow) XsiSemaphoreSet(numberOfSemaphores, + flags); + if (semaphoreSet == NULL) { + TRACE_ERROR(("xsi_semget: failed to allocate a new xsi " + "semaphore set\n")); + atomic_add(&sTotalNumberOfXsiSemaphores, -1); + return ENOMEM; + } + if (isPrivate) + semaphoreSet->SetIpcKey((key_t)-1); + else { + semaphoreSet->SetIpcKey(key); + ipcKey->SetSemaphoreSetID(semaphoreSet); + sSemaphoreHashTable.Insert(semaphoreSet); + } + } + + return semaphoreSet->ID(); +} + + +int +_user_xsi_semctl(int semaphoreID, int semaphoreNumber, int command, + union semun *args) +{ + MutexLocker _(sXsiSemaphoreSetLock); + XsiSemaphoreSet *semaphoreSet = sSemaphoreHashTable.Lookup(semaphoreID); + if (semaphoreSet == NULL) { + TRACE_ERROR(("xsi_semctl: semaphore set id %d not valid\n", + semaphoreID)); + return EINVAL; + } + if (semaphoreNumber < 0 + || semaphoreNumber >= semaphoreSet->NumberOfSemaphores()) { + TRACE_ERROR(("xsi_semctl: semaphore number %d not valid for " + "semaphore %d\n", semaphoreNumber, semaphoreID)); + return EINVAL; + } + + if (args != 0 && !IS_USER_ADDRESS(args)) { + TRACE_ERROR(("xsi_semctl: semun address is not valid\n")); + return B_BAD_ADDRESS; + } + + XsiSemaphore *semaphore = semaphoreSet->Semaphore(semaphoreNumber); + switch (command) { + case GETVAL: + if (!semaphoreSet->HasReadPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not permission " + "on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + return semaphore->Value(); + + case SETVAL: + if (!semaphoreSet->HasPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not permission " + "on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + int value; + if (user_memcpy(&value, &args->val, sizeof(int) < B_OK)) { + TRACE_ERROR(("xsi_semctl: user_memcpy failed\n")); + return B_BAD_ADDRESS; + } + if (value > USHRT_MAX) { + TRACE_ERROR(("xsi_semctl: value %d out of range\n", value)); + return ERANGE; + } + semaphore->SetValue(value); + return 0; + + case GETPID: + if (!semaphoreSet->HasReadPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not permission " + "on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + return semaphore->LastPid(); + + case GETNCNT: + if (!semaphoreSet->HasReadPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not permission " + "on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + return semaphore->ThreadsWaitingToIncrease(); + + case GETZCNT: + if (!semaphoreSet->HasReadPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not permission " + "on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + return semaphore->ThreadsWaitingToBeZero(); + + case GETALL: { + if (!semaphoreSet->HasReadPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not read " + "permission on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + for (int i = 0; i < semaphoreSet->NumberOfSemaphores(); i++) { + semaphore = semaphoreSet->Semaphore(i); + unsigned short value = semaphore->Value(); + if (user_memcpy(&args->array[i], &value, sizeof(unsigned short)) + < B_OK) { + TRACE_ERROR(("xsi_semctl: user_memcpy failed\n")); + return B_BAD_ADDRESS; + } + } + return 0; + } + + case SETALL: { + if (!semaphoreSet->HasPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not permission " + "on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + for (int i = 0; i < semaphoreSet->NumberOfSemaphores(); i++) { + semaphore = semaphoreSet->Semaphore(i); + unsigned short value; + if (user_memcpy(&value, &args->array[i], sizeof(unsigned short)) + < B_OK) { + TRACE_ERROR(("xsi_semctl: user_memcpy failed\n")); + return B_BAD_ADDRESS; + } + semaphore->SetValue(value); + } + return 0; + } + + case IPC_STAT: { + if (!semaphoreSet->HasReadPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not read " + "permission on semaphore %d, key %d\n", semaphoreSet->ID(), + (int)semaphoreSet->IpcKey())); + return EACCES; + } + struct semid_ds result; + result.sem_perm = semaphoreSet->IpcPermission(); + result.sem_nsems = semaphoreSet->NumberOfSemaphores(); + result.sem_otime = semaphoreSet->LastSemopTime(); + result.sem_ctime = semaphoreSet->LastSemctlTime(); + if (user_memcpy(args->buf, &result, sizeof(struct semid_ds)) + < B_OK) { + TRACE_ERROR(("xsi_semctl: user_memcpy failed\n")); + return B_BAD_ADDRESS; + } + return 0; + } + + case IPC_SET: { + if (!semaphoreSet->HasPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not " + "permission on semaphore %d, key %d\n", + semaphoreSet->ID(), (int)semaphoreSet->IpcKey())); + return EACCES; + } + struct semid_ds result; + if (user_memcpy(&result, args->buf, sizeof(struct semid_ds)) + < B_OK) { + TRACE_ERROR(("xsi_semctl: user_memcpy failed\n")); + return B_BAD_ADDRESS; + } + semaphoreSet->DoIpcSet(&result); + return 0; + } + + case IPC_RMID: { + if (!semaphoreSet->HasPermission()) { + TRACE_ERROR(("xsi_semctl: calling process has not " + "permission on semaphore %d, key %d\n", + semaphoreSet->ID(), (int)semaphoreSet->IpcKey())); + return EACCES; + } + MutexLocker _(sIpcLock); + key_t key = semaphoreSet->IpcKey(); + Ipc *ipcKey = sIpcHashTable.Lookup(key); + sSemaphoreHashTable.Remove(semaphoreSet); + sIpcHashTable.Remove(ipcKey); + atomic_add(&sTotalNumberOfXsiSemaphores, + semaphoreSet->NumberOfSemaphores()); + // Wake up of threads waiting on this set + // happens in the destructor + delete semaphoreSet; + delete ipcKey; + return 0; + } + + default: + TRACE_ERROR(("xsi_semctl: command %d not valid\n", command)); + return EINVAL; + } +} + + +status_t +_user_xsi_semop(int semaphoreID, struct sembuf *sops, size_t nsops) +{ + XsiSemaphoreSet *semaphoreSet = sSemaphoreHashTable.Lookup(semaphoreID); + if (semaphoreSet == NULL) { + TRACE_ERROR(("xsi_semop: semaphore set id %d not valid\n", semaphoreID)); + return EINVAL; + } + + if (!IS_USER_ADDRESS(sops)) { + TRACE_ERROR(("xsi_semop: sembuf address is not valid\n")); + return B_BAD_ADDRESS; + } + + struct sembuf operations[nsops]; + if (user_memcpy(&operations[0], sops, + (sizeof(struct sembuf) * nsops)) < B_OK) { + TRACE_ERROR(("xsi_semop: user_memcpy failed\n")); + return B_BAD_ADDRESS; + } + + /* + * We won't do partial request. If we must wait on a + * semaphore, we undo all the operations already done + * and go to sleep. + */ + bool notDone = true; + bool goToSleep = false; + status_t result = 0; + while (notDone) { + XsiSemaphore *semaphore = NULL; + short numberOfSemaphores = semaphoreSet->NumberOfSemaphores(); + + uint32 i = 0; + for (; i < nsops; i++) { + short semaphoreNumber = operations[i].sem_num; + if (semaphoreNumber >= numberOfSemaphores) { + TRACE_ERROR(("xsi_semop: %d invalid semaphore number\n", i)); + result = EINVAL; + break; + } + semaphore = semaphoreSet->Semaphore(semaphoreNumber); + unsigned short value = semaphore->Value(); + short operation = operations[i].sem_op; + if (operation < 0) { + if (semaphore->Add(operation)) { + goToSleep = true; + break; + } + } else if (operation == 0) { + if (value == 0) + continue; + else if (operations[i].sem_flg & IPC_NOWAIT) { + result = EAGAIN; + break; + } else { + goToSleep = true; + break; + } + } else { + // Operation must be greater than zero, + // just add the value and continue + semaphore->Add(operation); + } + } + + // Either we have to wait or an error occured + if (goToSleep || result != 0) { + // Undo all previosly done operations + for (int j = 0; j < i; j++) { + short semaphoreNumber = operations[j].sem_num; + semaphore = semaphoreSet->Semaphore(semaphoreNumber); + short operation = operations[j].sem_op; + if (operation != 0) + semaphore->Revert(operation); + } + if (result != 0) + return result; + + bool waitOnZero = true; + if (operations[i].sem_op != 0) + waitOnZero = false; + + result = semaphore->Wait((int32)operations[i].sem_op, waitOnZero); + + // We are back to life. + // Find out why! + semaphoreSet = sSemaphoreHashTable.Lookup(semaphoreID); + if (semaphoreSet == NULL || result == EIDRM + || result == B_INTERRUPTED) { + TRACE_ERROR(("xsi_semop: semaphore set id %d got destroyed\n", + semaphoreID)); + result = EIDRM; + notDone = false; + } + } else + // everything worked like a charm + notDone = false; + // TODO: Handle SEM_UNDO requests + } + return result; +} Index: src/system/kernel/syscalls.cpp =================================================================== --- src/system/kernel/syscalls.cpp (revision 26439) +++ src/system/kernel/syscalls.cpp (working copy) @@ -17,6 +17,7 @@ #include <vm.h> #include <thread.h> #include <posix/realtime_sem.h> +#include <posix/xsi_semaphore.h> #include <sem.h> #include <port.h> #include <cpu.h> Index: src/system/libroot/posix/sys/ftok.c =================================================================== --- src/system/libroot/posix/sys/ftok.c (revision 0) +++ src/system/libroot/posix/sys/ftok.c (revision 0) @@ -0,0 +1,22 @@ +/* + * Copyright 2008, Haiku Inc. All rights reserved. + * Distributed under the terms of the MIT License. + * + * Authors: + * Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx> + */ + +#include <sys/ipc.h> +#include <sys/types.h> +#include <sys/stat.h> + +key_t +ftok(const char *path, int id) +{ + struct stat st; + + if (stat(path,&st) < 0) + return (key_t)-1; + + return (key_t)(id << 24 | (st.st_dev & 0xff) << 16 | (st.st_ino & 0xffff)); +} Index: src/system/libroot/posix/sys/xsi_sem.cpp =================================================================== --- src/system/libroot/posix/sys/xsi_sem.cpp (revision 0) +++ src/system/libroot/posix/sys/xsi_sem.cpp (revision 0) @@ -0,0 +1,75 @@ +/* + * Copyright 2008, Haiku Inc. All rights reserved. + * Distributed under the terms of the MIT License. + * + * Authors: + * Salvatore Benedetto <salvatore.benedetto@xxxxxxxxx> + */ + +#include <sys/sem.h> + +#include <errno.h> +#include <fcntl.h> +#include <stdarg.h> +#include <stdlib.h> + +#include <OS.h> + +#include <posix/realtime_sem_defs.h> +#include <syscall_utils.h> +#include <syscalls.h> + + +/* + * For the semctl option argument, the user + * should declare explicitly the following union + */ +union semun { + int val; + struct semid_ds *buf; + unsigned short *array; +}; + + +int +semget(key_t key, int num_sems, int sem_flags) +{ + RETURN_AND_SET_ERRNO(_kern_xsi_semget(key, num_sems, sem_flags)); +} + + +int +semctl(int semId, int sem_num, int command, ...) +{ + union semun arg; + va_list args; + + switch (command) { + case GETVAL: + case GETPID: + case GETNCNT: + case GETZCNT: + case IPC_RMID: + RETURN_AND_SET_ERRNO(_kern_xsi_semctl(semId, sem_num, command, 0)); + + case SETVAL: + case GETALL: + case SETALL: + case IPC_STAT: + case IPC_SET: + va_start(args, command); + arg = va_arg(args, union semun); + va_end(args); + RETURN_AND_SET_ERRNO(_kern_xsi_semctl(semId, sem_num, command, + &arg)); + default: + return EINVAL; + } +} + + +int +semop(int sem_id, struct sembuf *sem_ops, size_t num_sem_ops) +{ + RETURN_AND_SET_ERRNO(_kern_xsi_semop(sem_id, sem_ops, num_sem_ops)); +} Index: src/system/libroot/posix/sys/Jamfile =================================================================== --- src/system/libroot/posix/sys/Jamfile (revision 26439) +++ src/system/libroot/posix/sys/Jamfile (working copy) @@ -7,6 +7,7 @@ chmod.c flock.c ftime.c + ftok.c getrusage.c gettimeofday.c itimer.c @@ -23,4 +24,5 @@ uname.c utimes.c wait.c + xsi_sem.cpp ; Index: headers/posix/sys/ipc.h =================================================================== --- headers/posix/sys/ipc.h (revision 26439) +++ headers/posix/sys/ipc.h (working copy) @@ -6,8 +6,8 @@ #define _SYS_IPC_H +#include <sys/cdefs.h> #include <sys/types.h> -#error functionality has not yet been implemented /* Mode bits for msgget(), semget(), and shmget() */ @@ -17,15 +17,15 @@ /* Control commands for msgctl(), semctl(), and shmctl() */ #define IPC_RMID 0 /* remove identifier */ -#define IPC_SET 1 -#define IPC_STAT 2 +#define IPC_SET 1 /* set options */ +#define IPC_STAT 2 /* get options */ /* Private key */ -#define IPC_PRIVATE 0 +#define IPC_PRIVATE (key_t)0 struct ipc_perm { - key_t key; + key_t key; /* IPC identifier */ uid_t uid; /* owner's user ID */ gid_t gid; /* owner's group ID */ uid_t cuid; /* creator's user ID */ @@ -34,14 +34,10 @@ }; -#ifdef __cplusplus -extern "C" { -#endif +__BEGIN_DECLS key_t ftok(const char *path, int id); -#ifdef __cplusplus -} -#endif +__END_DECLS #endif /* _SYS_IPC_H */ Index: headers/posix/sys/sem.h =================================================================== --- headers/posix/sys/sem.h (revision 0) +++ headers/posix/sys/sem.h (revision 0) @@ -0,0 +1,65 @@ +/* + * Copyright 2008, Haiku Inc. All Rights Reserved. + * Distributed under the terms of the MIT License. + */ +#ifndef _SYS_SEM_H +#define _SYS_SEM_H + +#include <sys/cdefs.h> +#include <sys/ipc.h> +#include <sys/types.h> + + +/* Semaphore operation flags */ +#define SEM_UNDO 10 + +/* Command definition for semctl */ +#define GETPID 3 /* Get process ID of last element manipulating */ +#define GETVAL 4 /* Get semval */ +#define GETALL 5 /* Get all semval */ +#define GETNCNT 6 /* Get semncnt */ +#define GETZCNT 7 /* Get semzcnt */ +#define SETVAL 8 /* Set semval */ +#define SETALL 9 /* Set all semval */ + +struct semid_ds { + struct ipc_perm sem_perm; /* Operation permission structure */ + unsigned short sem_nsems; /* Number of semaphores in set */ + time_t sem_otime; /* Last semop */ + time_t sem_ctime; /* Last time changed by semctl */ +}; + +/* Structure passed as parameter to the semop function */ +struct sembuf { + unsigned short sem_num; /* Semaphore number */ + short sem_op; /* Semaphore operation */ + short sem_flg; /* Operation flags */ +}; + +/* + * Semaphore info structure. Useful for the ipcs + * standard utily + */ +struct seminfo { + int semmni; /* Number of semaphore identifies */ + int semmns; /* Number of semaphore in system */ + int semmnu; /* Number of undo structures in system */ + int semmsl; /* Max number of semaphores per id */ + int semopm; /* Max number of operations per semop call */ + int semume; /* Max number of undo entries per process */ + int semusz; /* Size in bytes of undo structure */ + int semvmx; /* Semaphore maximum valure */ + int semaem; /* adjust on exit max value */ +}; + + +__BEGIN_DECLS + +int semctl(int sem_id, int sem_num, int command, ...); +int semget(key_t key, int num_sems, int sem_flags); +int semop(int sem_id, struct sembuf *sem_ops, size_t num_sem_ops); + +__END_DECLS + + +#endif /* _SYS_SEM_H */ Index: headers/private/kernel/posix/xsi_semaphore.h =================================================================== --- headers/private/kernel/posix/xsi_semaphore.h (revision 0) +++ headers/private/kernel/posix/xsi_semaphore.h (revision 0) @@ -0,0 +1,32 @@ +/* + * Copyright 2008, Haiku Inc. All rights reserved. + * Distributed under the terms of the MIT License. + */ +#ifndef KERNEL_XSI_H +#define KERNEL_XSI_H + +#include <sys/sem.h> +#include <sys/cdefs.h> + +#include <OS.h> + + +union semun { + int val; + struct semid_ds *buf; + unsigned short *array; +}; + +__BEGIN_DECLS + +extern void xsi_ipc_init(); + +/* user calls */ +int _user_xsi_semget(key_t key, int numberOfSemaphores, int flags); +int _user_xsi_semctl(int semaphoreID, int semaphoreNumber, int command, + union semun* args); +status_t _user_xsi_semop(int semaphoreID, struct sembuf *sops, size_t nsops); + +__END_DECLS + +#endif /* KERNEL_XSI_H */ Index: headers/private/system/syscalls.h =================================================================== --- headers/private/system/syscalls.h (revision 26439) +++ headers/private/system/syscalls.h (working copy) @@ -27,6 +27,7 @@ struct net_stat; struct pollfd; struct rlimit; +struct sembuf; struct sigaction; struct stat; struct _sem_t; @@ -38,6 +39,8 @@ struct user_disk_device_job_info; struct user_disk_system_info; +union semun; + // This marks the beginning of the syscalls prototypes for gensyscallinfos. // NOTE: // * Nothing but those prototypes may live here. @@ -89,6 +92,14 @@ extern status_t _kern_realtime_sem_post(sem_id semID); extern status_t _kern_realtime_sem_wait(sem_id semID, bigtime_t timeout); +/* POSIX XSI sem syscalls */ +extern int _kern_xsi_semget(key_t key, int numberOfSemaphores, + int flags); +extern int _kern_xsi_semctl(int semaphoreID, int semaphoreNumber, + int command, union semun* args); +extern status_t _kern_xsi_semop(int semaphoreID, struct sembuf *sops, + size_t nsops); + /* team & thread syscalls */ extern thread_id _kern_load_image(const char* const* flatArgs,