2005-01-06 23:35:40 +00:00
|
|
|
/*-
|
2017-11-27 15:20:12 +00:00
|
|
|
* SPDX-License-Identifier: BSD-4-Clause AND BSD-2-Clause-FreeBSD
|
|
|
|
*
|
1994-09-13 14:47:38 +00:00
|
|
|
* Copyright (c) 1994 Adam Glass and Charles Hannum. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by Adam Glass and Charles
|
|
|
|
* Hannum.
|
|
|
|
* 4. The names of the authors may not be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
2017-12-31 03:34:00 +00:00
|
|
|
*
|
|
|
|
* $NetBSD: sysv_shm.c,v 1.39 1997/10/07 10:02:03 drochner Exp $
|
1994-09-13 14:47:38 +00:00
|
|
|
*/
|
2005-01-22 19:10:25 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 2003-2005 McAfee, Inc.
|
2017-03-30 22:26:15 +00:00
|
|
|
* Copyright (c) 2016-2017 Robert N. M. Watson
|
2005-01-22 19:10:25 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This software was developed for the FreeBSD Project in part by McAfee
|
|
|
|
* Research, the Security Research Division of McAfee, Inc under DARPA/SPAWAR
|
|
|
|
* contract N66001-01-C-8035 ("CBOSS"), as part of the DARPA CHATS research
|
|
|
|
* program.
|
|
|
|
*
|
2017-03-30 22:26:15 +00:00
|
|
|
* Portions of this software were developed by BAE Systems, the University of
|
|
|
|
* Cambridge Computer Laboratory, and Memorial University under DARPA/AFRL
|
|
|
|
* contract FA8650-15-C-7558 ("CADETS"), as part of the DARPA Transparent
|
|
|
|
* Computing (TC) research program.
|
|
|
|
*
|
2005-01-22 19:10:25 +00:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2003-06-11 00:56:59 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
2000-03-30 07:17:05 +00:00
|
|
|
#include "opt_sysvipc.h"
|
1996-01-05 16:38:03 +00:00
|
|
|
|
1994-09-13 14:47:38 +00:00
|
|
|
#include <sys/param.h>
|
1995-10-21 19:50:00 +00:00
|
|
|
#include <sys/systm.h>
|
2020-04-14 20:30:48 +00:00
|
|
|
#include <sys/abi_compat.h>
|
1994-09-13 14:47:38 +00:00
|
|
|
#include <sys/kernel.h>
|
2009-06-24 21:10:52 +00:00
|
|
|
#include <sys/limits.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
#include <sys/lock.h>
|
2000-03-30 07:17:05 +00:00
|
|
|
#include <sys/sysctl.h>
|
1994-09-13 14:47:38 +00:00
|
|
|
#include <sys/shm.h>
|
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mman.h>
|
2004-05-30 20:34:58 +00:00
|
|
|
#include <sys/module.h>
|
2001-05-21 18:52:02 +00:00
|
|
|
#include <sys/mutex.h>
|
2011-04-06 18:11:24 +00:00
|
|
|
#include <sys/racct.h>
|
2004-06-19 14:46:13 +00:00
|
|
|
#include <sys/resourcevar.h>
|
2013-03-09 02:32:23 +00:00
|
|
|
#include <sys/rwlock.h>
|
1994-09-13 14:47:38 +00:00
|
|
|
#include <sys/stat.h>
|
2000-12-01 08:57:47 +00:00
|
|
|
#include <sys/syscall.h>
|
2003-05-05 09:22:58 +00:00
|
|
|
#include <sys/syscallsubr.h>
|
1995-10-21 19:50:00 +00:00
|
|
|
#include <sys/sysent.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
#include <sys/sysproto.h>
|
2000-10-31 01:34:00 +00:00
|
|
|
#include <sys/jail.h>
|
2006-10-22 11:52:19 +00:00
|
|
|
|
2017-03-29 23:31:35 +00:00
|
|
|
#include <security/audit/audit.h>
|
2006-10-22 11:52:19 +00:00
|
|
|
#include <security/mac/mac_framework.h>
|
1994-09-13 14:47:38 +00:00
|
|
|
|
|
|
|
#include <vm/vm.h>
|
1995-12-07 12:48:31 +00:00
|
|
|
#include <vm/vm_param.h>
|
|
|
|
#include <vm/pmap.h>
|
1996-09-07 03:24:44 +00:00
|
|
|
#include <vm/vm_object.h>
|
1994-09-13 14:47:38 +00:00
|
|
|
#include <vm/vm_map.h>
|
1999-01-21 08:29:12 +00:00
|
|
|
#include <vm/vm_page.h>
|
1996-09-10 01:42:34 +00:00
|
|
|
#include <vm/vm_pager.h>
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2011-02-25 10:11:01 +00:00
|
|
|
FEATURE(sysv_shm, "System V shared memory segments support");
|
|
|
|
|
1997-10-12 20:26:33 +00:00
|
|
|
static MALLOC_DEFINE(M_SHM, "shm", "SVID compatible shared memory segments");
|
1997-10-11 18:31:40 +00:00
|
|
|
|
1994-09-13 14:47:38 +00:00
|
|
|
#define SHMSEG_FREE 0x0200
|
|
|
|
#define SHMSEG_REMOVED 0x0400
|
|
|
|
#define SHMSEG_ALLOCATED 0x0800
|
|
|
|
|
2009-03-02 18:53:30 +00:00
|
|
|
static int shm_last_free, shm_nused, shmalloced;
|
2009-03-05 11:45:42 +00:00
|
|
|
vm_size_t shm_committed;
|
2016-04-25 17:06:50 +00:00
|
|
|
static struct shmid_kernel *shmsegs;
|
|
|
|
static unsigned shm_prison_slot;
|
1994-09-13 14:47:38 +00:00
|
|
|
|
|
|
|
struct shmmap_state {
|
|
|
|
vm_offset_t va;
|
|
|
|
int shmid;
|
|
|
|
};
|
|
|
|
|
2004-11-12 13:23:47 +00:00
|
|
|
static void shm_deallocate_segment(struct shmid_kernel *);
|
2016-04-25 17:06:50 +00:00
|
|
|
static int shm_find_segment_by_key(struct prison *, key_t);
|
|
|
|
static struct shmid_kernel *shm_find_segment(struct prison *, int, bool);
|
2003-01-13 23:04:32 +00:00
|
|
|
static int shm_delete_mapping(struct vmspace *vm, struct shmmap_state *);
|
2020-11-03 19:14:03 +00:00
|
|
|
static int shmget_allocate_segment(struct thread *td, key_t key, size_t size,
|
|
|
|
int mode);
|
|
|
|
static int shmget_existing(struct thread *td, size_t size, int shmflg,
|
|
|
|
int mode, int segnum);
|
2002-03-19 21:25:46 +00:00
|
|
|
static void shmrealloc(void);
|
2010-03-19 11:04:42 +00:00
|
|
|
static int shminit(void);
|
2002-03-19 21:25:46 +00:00
|
|
|
static int sysvshm_modload(struct module *, int, void *);
|
|
|
|
static int shmunload(void);
|
2019-05-04 19:05:30 +00:00
|
|
|
#ifndef SYSVSHM
|
2003-01-13 23:04:32 +00:00
|
|
|
static void shmexit_myhook(struct vmspace *vm);
|
2002-03-19 21:25:46 +00:00
|
|
|
static void shmfork_myhook(struct proc *p1, struct proc *p2);
|
2019-05-04 19:05:30 +00:00
|
|
|
#endif
|
2002-03-19 21:25:46 +00:00
|
|
|
static int sysctl_shmsegs(SYSCTL_HANDLER_ARGS);
|
2016-04-25 17:06:50 +00:00
|
|
|
static void shm_remove(struct shmid_kernel *, int);
|
|
|
|
static struct prison *shm_find_prison(struct ucred *);
|
|
|
|
static int shm_prison_cansee(struct prison *, struct shmid_kernel *);
|
|
|
|
static int shm_prison_check(void *, void *);
|
|
|
|
static int shm_prison_set(void *, void *);
|
|
|
|
static int shm_prison_get(void *, void *);
|
|
|
|
static int shm_prison_remove(void *, void *);
|
|
|
|
static void shm_prison_cleanup(struct prison *);
|
2000-03-30 07:17:05 +00:00
|
|
|
|
|
|
|
/*
|
2001-05-23 23:38:05 +00:00
|
|
|
* Tuneable values.
|
2000-03-30 07:17:05 +00:00
|
|
|
*/
|
|
|
|
#ifndef SHMMAXPGS
|
2010-06-11 09:27:33 +00:00
|
|
|
#define SHMMAXPGS 131072 /* Note: sysv shared memory is swap backed. */
|
2000-03-30 07:17:05 +00:00
|
|
|
#endif
|
|
|
|
#ifndef SHMMAX
|
|
|
|
#define SHMMAX (SHMMAXPGS*PAGE_SIZE)
|
|
|
|
#endif
|
|
|
|
#ifndef SHMMIN
|
|
|
|
#define SHMMIN 1
|
|
|
|
#endif
|
|
|
|
#ifndef SHMMNI
|
2001-05-04 18:43:19 +00:00
|
|
|
#define SHMMNI 192
|
2000-03-30 07:17:05 +00:00
|
|
|
#endif
|
|
|
|
#ifndef SHMSEG
|
2001-05-04 18:43:19 +00:00
|
|
|
#define SHMSEG 128
|
2000-03-30 07:17:05 +00:00
|
|
|
#endif
|
|
|
|
#ifndef SHMALL
|
|
|
|
#define SHMALL (SHMMAXPGS)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
struct shminfo shminfo = {
|
2014-06-28 03:56:17 +00:00
|
|
|
.shmmax = SHMMAX,
|
|
|
|
.shmmin = SHMMIN,
|
|
|
|
.shmmni = SHMMNI,
|
|
|
|
.shmseg = SHMSEG,
|
|
|
|
.shmall = SHMALL
|
2000-03-30 07:17:05 +00:00
|
|
|
};
|
|
|
|
|
2000-05-29 22:40:54 +00:00
|
|
|
static int shm_use_phys;
|
2015-10-10 09:29:47 +00:00
|
|
|
static int shm_allow_removed = 1;
|
2000-05-29 22:40:54 +00:00
|
|
|
|
2014-06-28 03:56:17 +00:00
|
|
|
SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmax, CTLFLAG_RWTUN, &shminfo.shmmax, 0,
|
2005-02-12 01:22:39 +00:00
|
|
|
"Maximum shared memory segment size");
|
2014-06-28 03:56:17 +00:00
|
|
|
SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmin, CTLFLAG_RWTUN, &shminfo.shmmin, 0,
|
2005-02-12 01:22:39 +00:00
|
|
|
"Minimum shared memory segment size");
|
2005-08-06 07:20:18 +00:00
|
|
|
SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmmni, CTLFLAG_RDTUN, &shminfo.shmmni, 0,
|
2005-02-12 01:22:39 +00:00
|
|
|
"Number of shared memory identifiers");
|
2005-08-06 07:20:18 +00:00
|
|
|
SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmseg, CTLFLAG_RDTUN, &shminfo.shmseg, 0,
|
2005-02-12 01:22:39 +00:00
|
|
|
"Number of segments per process");
|
2014-06-28 03:56:17 +00:00
|
|
|
SYSCTL_ULONG(_kern_ipc, OID_AUTO, shmall, CTLFLAG_RWTUN, &shminfo.shmall, 0,
|
2005-02-12 01:22:39 +00:00
|
|
|
"Maximum number of pages available for shared memory");
|
2014-06-28 03:56:17 +00:00
|
|
|
SYSCTL_INT(_kern_ipc, OID_AUTO, shm_use_phys, CTLFLAG_RWTUN,
|
2005-02-12 01:22:39 +00:00
|
|
|
&shm_use_phys, 0, "Enable/Disable locking of shared memory pages in core");
|
2014-06-28 03:56:17 +00:00
|
|
|
SYSCTL_INT(_kern_ipc, OID_AUTO, shm_allow_removed, CTLFLAG_RWTUN,
|
2005-02-12 01:22:39 +00:00
|
|
|
&shm_allow_removed, 0,
|
|
|
|
"Enable/Disable attachment to attached segments marked for removal");
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSCTL_PROC(_kern_ipc, OID_AUTO, shmsegs, CTLTYPE_OPAQUE | CTLFLAG_RD |
|
|
|
|
CTLFLAG_MPSAFE, NULL, 0, sysctl_shmsegs, "",
|
2018-02-18 19:19:36 +00:00
|
|
|
"Array of struct shmid_kernel for each potential shared memory segment");
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
static struct sx sysvshmsx;
|
|
|
|
#define SYSVSHM_LOCK() sx_xlock(&sysvshmsx)
|
|
|
|
#define SYSVSHM_UNLOCK() sx_xunlock(&sysvshmsx)
|
|
|
|
#define SYSVSHM_ASSERT_LOCKED() sx_assert(&sysvshmsx, SA_XLOCKED)
|
|
|
|
|
1994-09-13 14:47:38 +00:00
|
|
|
static int
|
2016-04-25 17:06:50 +00:00
|
|
|
shm_find_segment_by_key(struct prison *pr, key_t key)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2000-03-30 07:17:05 +00:00
|
|
|
for (i = 0; i < shmalloced; i++)
|
2004-11-12 13:23:47 +00:00
|
|
|
if ((shmsegs[i].u.shm_perm.mode & SHMSEG_ALLOCATED) &&
|
2016-04-25 17:06:50 +00:00
|
|
|
shmsegs[i].cred != NULL &&
|
|
|
|
shmsegs[i].cred->cr_prison == pr &&
|
2004-11-12 13:23:47 +00:00
|
|
|
shmsegs[i].u.shm_perm.key == key)
|
2002-08-15 02:10:12 +00:00
|
|
|
return (i);
|
|
|
|
return (-1);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
/*
|
|
|
|
* Finds segment either by shmid if is_shmid is true, or by segnum if
|
|
|
|
* is_shmid is false.
|
|
|
|
*/
|
2004-11-12 13:23:47 +00:00
|
|
|
static struct shmid_kernel *
|
2016-04-25 17:06:50 +00:00
|
|
|
shm_find_segment(struct prison *rpr, int arg, bool is_shmid)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2004-11-12 13:23:47 +00:00
|
|
|
struct shmid_kernel *shmseg;
|
2015-03-21 15:01:19 +00:00
|
|
|
int segnum;
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
segnum = is_shmid ? IPCID_TO_IX(arg) : arg;
|
2000-03-30 07:17:05 +00:00
|
|
|
if (segnum < 0 || segnum >= shmalloced)
|
2002-08-15 02:10:12 +00:00
|
|
|
return (NULL);
|
1994-09-13 14:47:38 +00:00
|
|
|
shmseg = &shmsegs[segnum];
|
2004-11-12 13:23:47 +00:00
|
|
|
if ((shmseg->u.shm_perm.mode & SHMSEG_ALLOCATED) == 0 ||
|
2003-11-05 01:53:10 +00:00
|
|
|
(!shm_allow_removed &&
|
2015-07-02 19:14:30 +00:00
|
|
|
(shmseg->u.shm_perm.mode & SHMSEG_REMOVED) != 0) ||
|
2016-04-25 17:06:50 +00:00
|
|
|
(is_shmid && shmseg->u.shm_perm.seq != IPCID_TO_SEQ(arg)) ||
|
2016-04-25 22:30:10 +00:00
|
|
|
shm_prison_cansee(rpr, shmseg) != 0)
|
2002-08-15 02:10:12 +00:00
|
|
|
return (NULL);
|
|
|
|
return (shmseg);
|
2001-10-28 09:29:10 +00:00
|
|
|
}
|
|
|
|
|
1994-09-13 14:47:38 +00:00
|
|
|
static void
|
2015-03-21 15:01:19 +00:00
|
|
|
shm_deallocate_segment(struct shmid_kernel *shmseg)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2009-03-05 11:45:42 +00:00
|
|
|
vm_size_t size;
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_ASSERT_LOCKED();
|
2001-07-04 16:20:28 +00:00
|
|
|
|
2009-06-24 21:10:52 +00:00
|
|
|
vm_object_deallocate(shmseg->object);
|
|
|
|
shmseg->object = NULL;
|
|
|
|
size = round_page(shmseg->u.shm_segsz);
|
1994-09-13 14:47:38 +00:00
|
|
|
shm_committed -= btoc(size);
|
|
|
|
shm_nused--;
|
2004-11-12 13:23:47 +00:00
|
|
|
shmseg->u.shm_perm.mode = SHMSEG_FREE;
|
2005-01-22 19:10:25 +00:00
|
|
|
#ifdef MAC
|
2007-10-24 19:04:04 +00:00
|
|
|
mac_sysvshm_cleanup(shmseg);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
2011-04-06 18:11:24 +00:00
|
|
|
racct_sub_cred(shmseg->cred, RACCT_NSHM, 1);
|
|
|
|
racct_sub_cred(shmseg->cred, RACCT_SHMSIZE, size);
|
2011-04-06 16:59:54 +00:00
|
|
|
crfree(shmseg->cred);
|
|
|
|
shmseg->cred = NULL;
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2003-01-13 23:04:32 +00:00
|
|
|
shm_delete_mapping(struct vmspace *vm, struct shmmap_state *shmmap_s)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2004-11-12 13:23:47 +00:00
|
|
|
struct shmid_kernel *shmseg;
|
1994-09-13 14:47:38 +00:00
|
|
|
int segnum, result;
|
2009-03-05 11:45:42 +00:00
|
|
|
vm_size_t size;
|
1995-05-30 08:16:23 +00:00
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_ASSERT_LOCKED();
|
1994-09-13 14:47:38 +00:00
|
|
|
segnum = IPCID_TO_IX(shmmap_s->shmid);
|
2015-03-21 15:01:19 +00:00
|
|
|
KASSERT(segnum >= 0 && segnum < shmalloced,
|
|
|
|
("segnum %d shmalloced %d", segnum, shmalloced));
|
|
|
|
|
1994-09-13 14:47:38 +00:00
|
|
|
shmseg = &shmsegs[segnum];
|
2009-06-24 21:10:52 +00:00
|
|
|
size = round_page(shmseg->u.shm_segsz);
|
2003-01-13 23:04:32 +00:00
|
|
|
result = vm_map_remove(&vm->vm_map, shmmap_s->va, shmmap_s->va + size);
|
1994-09-13 14:47:38 +00:00
|
|
|
if (result != KERN_SUCCESS)
|
2002-08-15 02:10:12 +00:00
|
|
|
return (EINVAL);
|
1994-09-13 14:47:38 +00:00
|
|
|
shmmap_s->shmid = -1;
|
2004-11-12 13:23:47 +00:00
|
|
|
shmseg->u.shm_dtime = time_second;
|
2016-07-26 17:23:49 +00:00
|
|
|
if (--shmseg->u.shm_nattch == 0 &&
|
2004-11-12 13:23:47 +00:00
|
|
|
(shmseg->u.shm_perm.mode & SHMSEG_REMOVED)) {
|
1994-09-13 14:47:38 +00:00
|
|
|
shm_deallocate_segment(shmseg);
|
|
|
|
shm_last_free = segnum;
|
|
|
|
}
|
2002-08-15 02:10:12 +00:00
|
|
|
return (0);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
2016-04-25 17:06:50 +00:00
|
|
|
static void
|
|
|
|
shm_remove(struct shmid_kernel *shmseg, int segnum)
|
|
|
|
{
|
|
|
|
|
|
|
|
shmseg->u.shm_perm.key = IPC_PRIVATE;
|
|
|
|
shmseg->u.shm_perm.mode |= SHMSEG_REMOVED;
|
2016-07-26 17:23:49 +00:00
|
|
|
if (shmseg->u.shm_nattch == 0) {
|
2016-04-25 17:06:50 +00:00
|
|
|
shm_deallocate_segment(shmseg);
|
|
|
|
shm_last_free = segnum;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct prison *
|
|
|
|
shm_find_prison(struct ucred *cred)
|
|
|
|
{
|
|
|
|
struct prison *pr, *rpr;
|
|
|
|
|
|
|
|
pr = cred->cr_prison;
|
|
|
|
prison_lock(pr);
|
|
|
|
rpr = osd_jail_get(pr, shm_prison_slot);
|
|
|
|
prison_unlock(pr);
|
|
|
|
return rpr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
shm_prison_cansee(struct prison *rpr, struct shmid_kernel *shmseg)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (shmseg->cred == NULL ||
|
|
|
|
!(rpr == shmseg->cred->cr_prison ||
|
|
|
|
prison_ischild(rpr, shmseg->cred->cr_prison)))
|
|
|
|
return (EINVAL);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
static int
|
|
|
|
kern_shmdt_locked(struct thread *td, const void *shmaddr)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2001-09-12 08:38:13 +00:00
|
|
|
struct proc *p = td->td_proc;
|
1994-09-13 14:47:38 +00:00
|
|
|
struct shmmap_state *shmmap_s;
|
2017-03-30 22:26:15 +00:00
|
|
|
#ifdef MAC
|
2015-07-02 19:14:30 +00:00
|
|
|
int error;
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
2015-07-02 19:14:30 +00:00
|
|
|
int i;
|
2001-08-31 00:02:18 +00:00
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_ASSERT_LOCKED();
|
2016-04-25 17:06:50 +00:00
|
|
|
if (shm_find_prison(td->td_ucred) == NULL)
|
2002-03-05 18:57:36 +00:00
|
|
|
return (ENOSYS);
|
2002-07-22 16:22:27 +00:00
|
|
|
shmmap_s = p->p_vmspace->vm_shm;
|
2015-03-21 15:01:19 +00:00
|
|
|
if (shmmap_s == NULL)
|
|
|
|
return (EINVAL);
|
2017-03-30 22:26:15 +00:00
|
|
|
AUDIT_ARG_SVIPC_ID(shmmap_s->shmid);
|
2001-08-31 00:02:18 +00:00
|
|
|
for (i = 0; i < shminfo.shmseg; i++, shmmap_s++) {
|
1994-09-13 14:47:38 +00:00
|
|
|
if (shmmap_s->shmid != -1 &&
|
2015-03-21 15:01:19 +00:00
|
|
|
shmmap_s->va == (vm_offset_t)shmaddr) {
|
1994-09-13 14:47:38 +00:00
|
|
|
break;
|
2001-08-31 00:02:18 +00:00
|
|
|
}
|
|
|
|
}
|
2015-03-21 15:01:19 +00:00
|
|
|
if (i == shminfo.shmseg)
|
|
|
|
return (EINVAL);
|
2017-03-30 22:26:15 +00:00
|
|
|
#ifdef MAC
|
2018-11-11 00:21:28 +00:00
|
|
|
error = mac_sysvshm_check_shmdt(td->td_ucred,
|
|
|
|
&shmsegs[IPCID_TO_IX(shmmap_s->shmid)]);
|
2006-09-20 13:40:00 +00:00
|
|
|
if (error != 0)
|
2015-03-21 15:01:19 +00:00
|
|
|
return (error);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
2015-07-02 19:14:30 +00:00
|
|
|
return (shm_delete_mapping(p->p_vmspace, shmmap_s));
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
1995-12-15 05:00:31 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
2015-03-21 15:01:19 +00:00
|
|
|
struct shmdt_args {
|
2003-01-25 21:33:05 +00:00
|
|
|
const void *shmaddr;
|
1994-09-13 14:47:38 +00:00
|
|
|
};
|
1995-12-15 05:00:31 +00:00
|
|
|
#endif
|
1994-09-13 14:47:38 +00:00
|
|
|
int
|
2015-03-21 15:01:19 +00:00
|
|
|
sys_shmdt(struct thread *td, struct shmdt_args *uap)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
|
|
|
|
SYSVSHM_LOCK();
|
|
|
|
error = kern_shmdt_locked(td, uap->shmaddr);
|
|
|
|
SYSVSHM_UNLOCK();
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
kern_shmat_locked(struct thread *td, int shmid, const void *shmaddr,
|
|
|
|
int shmflg)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2016-04-25 17:06:50 +00:00
|
|
|
struct prison *rpr;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct proc *p = td->td_proc;
|
2004-11-12 13:23:47 +00:00
|
|
|
struct shmid_kernel *shmseg;
|
2015-04-04 08:44:20 +00:00
|
|
|
struct shmmap_state *shmmap_s;
|
1994-09-13 14:47:38 +00:00
|
|
|
vm_offset_t attach_va;
|
|
|
|
vm_prot_t prot;
|
|
|
|
vm_size_t size;
|
2019-01-16 05:15:57 +00:00
|
|
|
int cow, error, find_space, i, rv;
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2017-03-30 22:26:15 +00:00
|
|
|
AUDIT_ARG_SVIPC_ID(shmid);
|
|
|
|
AUDIT_ARG_VALUE(shmflg);
|
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_ASSERT_LOCKED();
|
2016-04-25 17:06:50 +00:00
|
|
|
rpr = shm_find_prison(td->td_ucred);
|
|
|
|
if (rpr == NULL)
|
2002-03-05 18:57:36 +00:00
|
|
|
return (ENOSYS);
|
2002-07-22 16:22:27 +00:00
|
|
|
shmmap_s = p->p_vmspace->vm_shm;
|
1994-09-13 14:47:38 +00:00
|
|
|
if (shmmap_s == NULL) {
|
2009-03-05 11:45:42 +00:00
|
|
|
shmmap_s = malloc(shminfo.shmseg * sizeof(struct shmmap_state),
|
|
|
|
M_SHM, M_WAITOK);
|
2015-03-21 15:01:19 +00:00
|
|
|
for (i = 0; i < shminfo.shmseg; i++)
|
|
|
|
shmmap_s[i].shmid = -1;
|
|
|
|
KASSERT(p->p_vmspace->vm_shm == NULL, ("raced"));
|
|
|
|
p->p_vmspace->vm_shm = shmmap_s;
|
2001-08-31 00:02:18 +00:00
|
|
|
}
|
2016-04-25 17:06:50 +00:00
|
|
|
shmseg = shm_find_segment(rpr, shmid, true);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (shmseg == NULL)
|
|
|
|
return (EINVAL);
|
2004-11-12 13:23:47 +00:00
|
|
|
error = ipcperm(td, &shmseg->u.shm_perm,
|
2003-05-05 09:22:58 +00:00
|
|
|
(shmflg & SHM_RDONLY) ? IPC_R : IPC_R|IPC_W);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
2005-01-22 19:10:25 +00:00
|
|
|
#ifdef MAC
|
2007-10-24 19:04:04 +00:00
|
|
|
error = mac_sysvshm_check_shmat(td->td_ucred, shmseg, shmflg);
|
2006-09-20 13:40:00 +00:00
|
|
|
if (error != 0)
|
2015-03-21 15:01:19 +00:00
|
|
|
return (error);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
1994-09-13 14:47:38 +00:00
|
|
|
for (i = 0; i < shminfo.shmseg; i++) {
|
|
|
|
if (shmmap_s->shmid == -1)
|
|
|
|
break;
|
|
|
|
shmmap_s++;
|
|
|
|
}
|
2015-03-21 15:01:19 +00:00
|
|
|
if (i >= shminfo.shmseg)
|
|
|
|
return (EMFILE);
|
2009-06-24 21:10:52 +00:00
|
|
|
size = round_page(shmseg->u.shm_segsz);
|
1994-09-13 14:47:38 +00:00
|
|
|
prot = VM_PROT_READ;
|
2019-01-16 05:15:57 +00:00
|
|
|
cow = MAP_INHERIT_SHARE | MAP_PREFAULT_PARTIAL;
|
2003-05-05 09:22:58 +00:00
|
|
|
if ((shmflg & SHM_RDONLY) == 0)
|
1994-09-13 14:47:38 +00:00
|
|
|
prot |= VM_PROT_WRITE;
|
2015-03-21 15:01:19 +00:00
|
|
|
if (shmaddr != NULL) {
|
|
|
|
if ((shmflg & SHM_RND) != 0)
|
2016-04-21 19:57:40 +00:00
|
|
|
attach_va = rounddown2((vm_offset_t)shmaddr, SHMLBA);
|
2015-03-21 15:01:19 +00:00
|
|
|
else if (((vm_offset_t)shmaddr & (SHMLBA-1)) == 0)
|
2003-05-05 09:22:58 +00:00
|
|
|
attach_va = (vm_offset_t)shmaddr;
|
2015-03-21 15:01:19 +00:00
|
|
|
else
|
|
|
|
return (EINVAL);
|
2019-01-16 05:15:57 +00:00
|
|
|
if ((shmflg & SHM_REMAP) != 0)
|
|
|
|
cow |= MAP_REMAP;
|
|
|
|
find_space = VMFS_NO_SPACE;
|
1994-09-13 14:47:38 +00:00
|
|
|
} else {
|
2001-05-23 23:38:05 +00:00
|
|
|
/*
|
|
|
|
* This is just a hint to vm_map_find() about where to
|
|
|
|
* put it.
|
|
|
|
*/
|
2004-06-19 14:46:13 +00:00
|
|
|
attach_va = round_page((vm_offset_t)p->p_vmspace->vm_daddr +
|
2015-07-02 19:03:44 +00:00
|
|
|
lim_max(td, RLIMIT_DATA));
|
2019-01-16 05:15:57 +00:00
|
|
|
find_space = VMFS_OPTIMAL_SPACE;
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
1996-09-07 03:24:44 +00:00
|
|
|
|
2009-06-24 21:10:52 +00:00
|
|
|
vm_object_reference(shmseg->object);
|
2014-08-31 17:38:41 +00:00
|
|
|
rv = vm_map_find(&p->p_vmspace->vm_map, shmseg->object, 0, &attach_va,
|
2019-01-16 05:15:57 +00:00
|
|
|
size, 0, find_space, prot, prot, cow);
|
1996-09-07 03:24:44 +00:00
|
|
|
if (rv != KERN_SUCCESS) {
|
2009-06-24 21:10:52 +00:00
|
|
|
vm_object_deallocate(shmseg->object);
|
2015-03-21 15:01:19 +00:00
|
|
|
return (ENOMEM);
|
1996-09-07 03:24:44 +00:00
|
|
|
}
|
1996-09-10 22:35:25 +00:00
|
|
|
|
1994-09-13 14:47:38 +00:00
|
|
|
shmmap_s->va = attach_va;
|
2003-05-05 09:22:58 +00:00
|
|
|
shmmap_s->shmid = shmid;
|
2004-11-12 13:23:47 +00:00
|
|
|
shmseg->u.shm_lpid = p->p_pid;
|
|
|
|
shmseg->u.shm_atime = time_second;
|
|
|
|
shmseg->u.shm_nattch++;
|
2001-09-12 08:38:13 +00:00
|
|
|
td->td_retval[0] = attach_va;
|
2001-08-31 00:02:18 +00:00
|
|
|
return (error);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
2003-11-07 04:47:14 +00:00
|
|
|
int
|
2015-03-21 15:01:19 +00:00
|
|
|
kern_shmat(struct thread *td, int shmid, const void *shmaddr, int shmflg)
|
2003-05-05 09:22:58 +00:00
|
|
|
{
|
2015-03-21 15:01:19 +00:00
|
|
|
int error;
|
|
|
|
|
|
|
|
SYSVSHM_LOCK();
|
|
|
|
error = kern_shmat_locked(td, shmid, shmaddr, shmflg);
|
|
|
|
SYSVSHM_UNLOCK();
|
|
|
|
return (error);
|
2003-05-05 09:22:58 +00:00
|
|
|
}
|
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
|
|
|
struct shmat_args {
|
2003-05-05 09:22:58 +00:00
|
|
|
int shmid;
|
2015-03-21 15:01:19 +00:00
|
|
|
const void *shmaddr;
|
|
|
|
int shmflg;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
int
|
|
|
|
sys_shmat(struct thread *td, struct shmat_args *uap)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (kern_shmat(td, uap->shmid, uap->shmaddr, uap->shmflg));
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
kern_shmctl_locked(struct thread *td, int shmid, int cmd, void *buf,
|
|
|
|
size_t *bufsz)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2016-04-25 17:06:50 +00:00
|
|
|
struct prison *rpr;
|
2004-11-12 13:23:47 +00:00
|
|
|
struct shmid_kernel *shmseg;
|
2015-03-21 15:01:19 +00:00
|
|
|
struct shmid_ds *shmidp;
|
|
|
|
struct shm_info shm_info;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
SYSVSHM_ASSERT_LOCKED();
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2016-04-25 17:06:50 +00:00
|
|
|
rpr = shm_find_prison(td->td_ucred);
|
|
|
|
if (rpr == NULL)
|
2002-03-05 18:57:36 +00:00
|
|
|
return (ENOSYS);
|
2003-05-05 09:22:58 +00:00
|
|
|
|
2017-03-30 22:26:15 +00:00
|
|
|
AUDIT_ARG_SVIPC_ID(shmid);
|
|
|
|
AUDIT_ARG_SVIPC_CMD(cmd);
|
|
|
|
|
2003-05-05 09:22:58 +00:00
|
|
|
switch (cmd) {
|
2008-02-12 20:55:03 +00:00
|
|
|
/*
|
|
|
|
* It is possible that kern_shmctl is being called from the Linux ABI
|
|
|
|
* layer, in which case, we will need to implement IPC_INFO. It should
|
|
|
|
* be noted that other shmctl calls will be funneled through here for
|
|
|
|
* Linix binaries as well.
|
|
|
|
*
|
|
|
|
* NB: The Linux ABI layer will convert this data to structure(s) more
|
|
|
|
* consistent with the Linux ABI.
|
|
|
|
*/
|
2001-10-28 09:29:10 +00:00
|
|
|
case IPC_INFO:
|
2003-05-05 09:22:58 +00:00
|
|
|
memcpy(buf, &shminfo, sizeof(shminfo));
|
|
|
|
if (bufsz)
|
|
|
|
*bufsz = sizeof(shminfo);
|
2001-10-28 09:29:10 +00:00
|
|
|
td->td_retval[0] = shmalloced;
|
2015-03-21 15:01:19 +00:00
|
|
|
return (0);
|
2001-10-28 09:29:10 +00:00
|
|
|
case SHM_INFO: {
|
|
|
|
shm_info.used_ids = shm_nused;
|
|
|
|
shm_info.shm_rss = 0; /*XXX where to get from ? */
|
|
|
|
shm_info.shm_tot = 0; /*XXX where to get from ? */
|
|
|
|
shm_info.shm_swp = 0; /*XXX where to get from ? */
|
|
|
|
shm_info.swap_attempts = 0; /*XXX where to get from ? */
|
|
|
|
shm_info.swap_successes = 0; /*XXX where to get from ? */
|
2003-05-05 09:22:58 +00:00
|
|
|
memcpy(buf, &shm_info, sizeof(shm_info));
|
2015-03-21 15:01:19 +00:00
|
|
|
if (bufsz != NULL)
|
2003-05-05 09:22:58 +00:00
|
|
|
*bufsz = sizeof(shm_info);
|
2001-10-28 09:29:10 +00:00
|
|
|
td->td_retval[0] = shmalloced;
|
2015-03-21 15:01:19 +00:00
|
|
|
return (0);
|
2001-10-28 09:29:10 +00:00
|
|
|
}
|
2001-08-31 00:02:18 +00:00
|
|
|
}
|
2016-04-25 17:06:50 +00:00
|
|
|
shmseg = shm_find_segment(rpr, shmid, cmd != SHM_STAT);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (shmseg == NULL)
|
|
|
|
return (EINVAL);
|
2005-01-22 19:10:25 +00:00
|
|
|
#ifdef MAC
|
2007-10-24 19:04:04 +00:00
|
|
|
error = mac_sysvshm_check_shmctl(td->td_ucred, shmseg, cmd);
|
2006-09-20 13:40:00 +00:00
|
|
|
if (error != 0)
|
2015-03-21 15:01:19 +00:00
|
|
|
return (error);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
2003-05-05 09:22:58 +00:00
|
|
|
switch (cmd) {
|
2001-10-28 09:29:10 +00:00
|
|
|
case SHM_STAT:
|
1994-09-13 14:47:38 +00:00
|
|
|
case IPC_STAT:
|
2016-04-25 17:06:50 +00:00
|
|
|
shmidp = (struct shmid_ds *)buf;
|
2004-11-12 13:23:47 +00:00
|
|
|
error = ipcperm(td, &shmseg->u.shm_perm, IPC_R);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
2016-04-25 17:06:50 +00:00
|
|
|
memcpy(shmidp, &shmseg->u, sizeof(struct shmid_ds));
|
|
|
|
if (td->td_ucred->cr_prison != shmseg->cred->cr_prison)
|
|
|
|
shmidp->shm_perm.key = IPC_PRIVATE;
|
2015-03-21 15:01:19 +00:00
|
|
|
if (bufsz != NULL)
|
2003-05-05 09:22:58 +00:00
|
|
|
*bufsz = sizeof(struct shmid_ds);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (cmd == SHM_STAT) {
|
|
|
|
td->td_retval[0] = IXSEQ_TO_IPCID(shmid,
|
|
|
|
shmseg->u.shm_perm);
|
|
|
|
}
|
1994-09-13 14:47:38 +00:00
|
|
|
break;
|
2015-03-21 15:01:19 +00:00
|
|
|
case IPC_SET:
|
|
|
|
shmidp = (struct shmid_ds *)buf;
|
2017-03-30 22:26:15 +00:00
|
|
|
AUDIT_ARG_SVIPC_PERM(&shmidp->shm_perm);
|
2004-11-12 13:23:47 +00:00
|
|
|
error = ipcperm(td, &shmseg->u.shm_perm, IPC_M);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
|
|
|
shmseg->u.shm_perm.uid = shmidp->shm_perm.uid;
|
|
|
|
shmseg->u.shm_perm.gid = shmidp->shm_perm.gid;
|
2004-11-12 13:23:47 +00:00
|
|
|
shmseg->u.shm_perm.mode =
|
|
|
|
(shmseg->u.shm_perm.mode & ~ACCESSPERMS) |
|
2015-03-21 15:01:19 +00:00
|
|
|
(shmidp->shm_perm.mode & ACCESSPERMS);
|
2004-11-12 13:23:47 +00:00
|
|
|
shmseg->u.shm_ctime = time_second;
|
1994-09-13 14:47:38 +00:00
|
|
|
break;
|
|
|
|
case IPC_RMID:
|
2004-11-12 13:23:47 +00:00
|
|
|
error = ipcperm(td, &shmseg->u.shm_perm, IPC_M);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
2016-04-25 17:06:50 +00:00
|
|
|
shm_remove(shmseg, IPCID_TO_IX(shmid));
|
1994-09-13 14:47:38 +00:00
|
|
|
break;
|
|
|
|
#if 0
|
|
|
|
case SHM_LOCK:
|
|
|
|
case SHM_UNLOCK:
|
|
|
|
#endif
|
|
|
|
default:
|
2001-08-31 00:02:18 +00:00
|
|
|
error = EINVAL;
|
|
|
|
break;
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
2001-08-31 00:02:18 +00:00
|
|
|
return (error);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
int
|
|
|
|
kern_shmctl(struct thread *td, int shmid, int cmd, void *buf, size_t *bufsz)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
|
|
|
|
SYSVSHM_LOCK();
|
|
|
|
error = kern_shmctl_locked(td, shmid, cmd, buf, bufsz);
|
|
|
|
SYSVSHM_UNLOCK();
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2009-06-24 13:35:38 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
|
|
|
struct shmctl_args {
|
|
|
|
int shmid;
|
|
|
|
int cmd;
|
|
|
|
struct shmid_ds *buf;
|
|
|
|
};
|
|
|
|
#endif
|
2003-05-05 09:22:58 +00:00
|
|
|
int
|
2015-03-21 15:01:19 +00:00
|
|
|
sys_shmctl(struct thread *td, struct shmctl_args *uap)
|
2003-05-05 09:22:58 +00:00
|
|
|
{
|
2015-07-02 19:14:30 +00:00
|
|
|
int error;
|
2003-05-05 09:22:58 +00:00
|
|
|
struct shmid_ds buf;
|
|
|
|
size_t bufsz;
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2008-02-12 20:55:03 +00:00
|
|
|
/*
|
|
|
|
* The only reason IPC_INFO, SHM_INFO, SHM_STAT exists is to support
|
|
|
|
* Linux binaries. If we see the call come through the FreeBSD ABI,
|
|
|
|
* return an error back to the user since we do not to support this.
|
|
|
|
*/
|
|
|
|
if (uap->cmd == IPC_INFO || uap->cmd == SHM_INFO ||
|
|
|
|
uap->cmd == SHM_STAT)
|
|
|
|
return (EINVAL);
|
|
|
|
|
2003-05-05 09:22:58 +00:00
|
|
|
/* IPC_SET needs to copyin the buffer before calling kern_shmctl */
|
|
|
|
if (uap->cmd == IPC_SET) {
|
|
|
|
if ((error = copyin(uap->buf, &buf, sizeof(struct shmid_ds))))
|
|
|
|
goto done;
|
|
|
|
}
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2003-11-05 01:53:10 +00:00
|
|
|
error = kern_shmctl(td, uap->shmid, uap->cmd, (void *)&buf, &bufsz);
|
2003-05-05 09:22:58 +00:00
|
|
|
if (error)
|
|
|
|
goto done;
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2003-05-05 09:22:58 +00:00
|
|
|
/* Cases in which we need to copyout */
|
|
|
|
switch (uap->cmd) {
|
|
|
|
case IPC_STAT:
|
|
|
|
error = copyout(&buf, uap->buf, bufsz);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (error) {
|
|
|
|
/* Invalidate the return value */
|
|
|
|
td->td_retval[0] = -1;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1994-09-13 14:47:38 +00:00
|
|
|
static int
|
2020-11-03 19:14:03 +00:00
|
|
|
shmget_existing(struct thread *td, size_t size, int shmflg, int mode,
|
2015-03-21 15:01:19 +00:00
|
|
|
int segnum)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2004-11-12 13:23:47 +00:00
|
|
|
struct shmid_kernel *shmseg;
|
2015-03-21 16:16:17 +00:00
|
|
|
#ifdef MAC
|
1994-09-13 14:47:38 +00:00
|
|
|
int error;
|
2015-03-21 16:16:17 +00:00
|
|
|
#endif
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_ASSERT_LOCKED();
|
|
|
|
KASSERT(segnum >= 0 && segnum < shmalloced,
|
|
|
|
("segnum %d shmalloced %d", segnum, shmalloced));
|
1994-09-13 14:47:38 +00:00
|
|
|
shmseg = &shmsegs[segnum];
|
2020-11-03 19:14:03 +00:00
|
|
|
if ((shmflg & (IPC_CREAT | IPC_EXCL)) == (IPC_CREAT | IPC_EXCL))
|
2002-08-15 02:10:12 +00:00
|
|
|
return (EEXIST);
|
2005-01-22 19:10:25 +00:00
|
|
|
#ifdef MAC
|
2020-11-03 19:14:03 +00:00
|
|
|
error = mac_sysvshm_check_shmget(td->td_ucred, shmseg, shmflg);
|
2006-09-20 13:40:00 +00:00
|
|
|
if (error != 0)
|
2005-10-04 16:40:20 +00:00
|
|
|
return (error);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
2020-11-03 19:14:03 +00:00
|
|
|
if (size != 0 && size > shmseg->u.shm_segsz)
|
2002-08-15 02:10:12 +00:00
|
|
|
return (EINVAL);
|
2004-11-12 13:23:47 +00:00
|
|
|
td->td_retval[0] = IXSEQ_TO_IPCID(segnum, shmseg->u.shm_perm);
|
2002-08-15 02:10:12 +00:00
|
|
|
return (0);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-11-03 19:14:03 +00:00
|
|
|
shmget_allocate_segment(struct thread *td, key_t key, size_t size, int mode)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2002-02-27 18:32:23 +00:00
|
|
|
struct ucred *cred = td->td_ucred;
|
2004-11-12 13:23:47 +00:00
|
|
|
struct shmid_kernel *shmseg;
|
2004-07-09 05:28:38 +00:00
|
|
|
vm_object_t shm_object;
|
2015-03-21 15:01:19 +00:00
|
|
|
int i, segnum;
|
1995-05-30 08:16:23 +00:00
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_ASSERT_LOCKED();
|
2001-07-04 16:20:28 +00:00
|
|
|
|
2020-11-03 19:14:03 +00:00
|
|
|
if (size < shminfo.shmmin || size > shminfo.shmmax)
|
2002-08-15 02:10:12 +00:00
|
|
|
return (EINVAL);
|
2001-05-23 23:38:05 +00:00
|
|
|
if (shm_nused >= shminfo.shmmni) /* Any shmids left? */
|
2002-08-15 02:10:12 +00:00
|
|
|
return (ENOSPC);
|
2020-11-03 19:14:03 +00:00
|
|
|
size = round_page(size);
|
1994-09-13 14:47:38 +00:00
|
|
|
if (shm_committed + btoc(size) > shminfo.shmall)
|
2002-08-15 02:10:12 +00:00
|
|
|
return (ENOMEM);
|
1994-09-13 14:47:38 +00:00
|
|
|
if (shm_last_free < 0) {
|
2001-05-23 23:38:05 +00:00
|
|
|
shmrealloc(); /* Maybe expand the shmsegs[] array. */
|
2000-03-30 07:17:05 +00:00
|
|
|
for (i = 0; i < shmalloced; i++)
|
2004-11-12 13:23:47 +00:00
|
|
|
if (shmsegs[i].u.shm_perm.mode & SHMSEG_FREE)
|
1994-09-13 14:47:38 +00:00
|
|
|
break;
|
2000-03-30 07:17:05 +00:00
|
|
|
if (i == shmalloced)
|
2002-08-15 02:10:12 +00:00
|
|
|
return (ENOSPC);
|
1994-09-13 14:47:38 +00:00
|
|
|
segnum = i;
|
|
|
|
} else {
|
|
|
|
segnum = shm_last_free;
|
|
|
|
shm_last_free = -1;
|
|
|
|
}
|
2015-03-21 15:01:19 +00:00
|
|
|
KASSERT(segnum >= 0 && segnum < shmalloced,
|
|
|
|
("segnum %d shmalloced %d", segnum, shmalloced));
|
1994-09-13 14:47:38 +00:00
|
|
|
shmseg = &shmsegs[segnum];
|
2011-07-06 20:06:44 +00:00
|
|
|
#ifdef RACCT
|
2015-04-29 10:23:02 +00:00
|
|
|
if (racct_enable) {
|
|
|
|
PROC_LOCK(td->td_proc);
|
|
|
|
if (racct_add(td->td_proc, RACCT_NSHM, 1)) {
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
|
|
|
return (ENOSPC);
|
|
|
|
}
|
|
|
|
if (racct_add(td->td_proc, RACCT_SHMSIZE, size)) {
|
|
|
|
racct_sub(td->td_proc, RACCT_NSHM, 1);
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
|
|
|
return (ENOMEM);
|
|
|
|
}
|
2011-04-06 18:11:24 +00:00
|
|
|
PROC_UNLOCK(td->td_proc);
|
|
|
|
}
|
2011-07-06 20:06:44 +00:00
|
|
|
#endif
|
2015-03-21 15:01:19 +00:00
|
|
|
|
1996-09-10 01:42:34 +00:00
|
|
|
/*
|
|
|
|
* We make sure that we have allocated a pager before we need
|
|
|
|
* to.
|
|
|
|
*/
|
Implement global and per-uid accounting of the anonymous memory. Add
rlimit RLIMIT_SWAP that limits the amount of swap that may be reserved
for the uid.
The accounting information (charge) is associated with either map entry,
or vm object backing the entry, assuming the object is the first one
in the shadow chain and entry does not require COW. Charge is moved
from entry to object on allocation of the object, e.g. during the mmap,
assuming the object is allocated, or on the first page fault on the
entry. It moves back to the entry on forks due to COW setup.
The per-entry granularity of accounting makes the charge process fair
for processes that change uid during lifetime, and decrements charge
for proper uid when region is unmapped.
The interface of vm_pager_allocate(9) is extended by adding struct ucred *,
that is used to charge appropriate uid when allocation if performed by
kernel, e.g. md(4).
Several syscalls, among them is fork(2), may now return ENOMEM when
global or per-uid limits are enforced.
In collaboration with: pho
Reviewed by: alc
Approved by: re (kensmith)
2009-06-23 20:45:22 +00:00
|
|
|
shm_object = vm_pager_allocate(shm_use_phys ? OBJT_PHYS : OBJT_SWAP,
|
|
|
|
0, size, VM_PROT_DEFAULT, 0, cred);
|
2011-04-06 18:11:24 +00:00
|
|
|
if (shm_object == NULL) {
|
2011-07-06 20:06:44 +00:00
|
|
|
#ifdef RACCT
|
2015-04-29 10:23:02 +00:00
|
|
|
if (racct_enable) {
|
|
|
|
PROC_LOCK(td->td_proc);
|
|
|
|
racct_sub(td->td_proc, RACCT_NSHM, 1);
|
|
|
|
racct_sub(td->td_proc, RACCT_SHMSIZE, size);
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
|
|
|
}
|
2011-07-06 20:06:44 +00:00
|
|
|
#endif
|
Implement global and per-uid accounting of the anonymous memory. Add
rlimit RLIMIT_SWAP that limits the amount of swap that may be reserved
for the uid.
The accounting information (charge) is associated with either map entry,
or vm object backing the entry, assuming the object is the first one
in the shadow chain and entry does not require COW. Charge is moved
from entry to object on allocation of the object, e.g. during the mmap,
assuming the object is allocated, or on the first page fault on the
entry. It moves back to the entry on forks due to COW setup.
The per-entry granularity of accounting makes the charge process fair
for processes that change uid during lifetime, and decrements charge
for proper uid when region is unmapped.
The interface of vm_pager_allocate(9) is extended by adding struct ucred *,
that is used to charge appropriate uid when allocation if performed by
kernel, e.g. md(4).
Several syscalls, among them is fork(2), may now return ENOMEM when
global or per-uid limits are enforced.
In collaboration with: pho
Reviewed by: alc
Approved by: re (kensmith)
2009-06-23 20:45:22 +00:00
|
|
|
return (ENOMEM);
|
2011-04-06 18:11:24 +00:00
|
|
|
}
|
1998-05-04 03:01:44 +00:00
|
|
|
|
2009-06-24 21:10:52 +00:00
|
|
|
shmseg->object = shm_object;
|
2004-11-12 13:23:47 +00:00
|
|
|
shmseg->u.shm_perm.cuid = shmseg->u.shm_perm.uid = cred->cr_uid;
|
|
|
|
shmseg->u.shm_perm.cgid = shmseg->u.shm_perm.gid = cred->cr_gid;
|
2015-03-21 15:01:19 +00:00
|
|
|
shmseg->u.shm_perm.mode = (mode & ACCESSPERMS) | SHMSEG_ALLOCATED;
|
2020-11-03 19:14:03 +00:00
|
|
|
shmseg->u.shm_perm.key = key;
|
2015-03-21 15:01:19 +00:00
|
|
|
shmseg->u.shm_perm.seq = (shmseg->u.shm_perm.seq + 1) & 0x7fff;
|
2011-04-06 19:08:50 +00:00
|
|
|
shmseg->cred = crhold(cred);
|
2020-11-03 19:14:03 +00:00
|
|
|
shmseg->u.shm_segsz = size;
|
2004-11-12 13:23:47 +00:00
|
|
|
shmseg->u.shm_cpid = td->td_proc->p_pid;
|
|
|
|
shmseg->u.shm_lpid = shmseg->u.shm_nattch = 0;
|
|
|
|
shmseg->u.shm_atime = shmseg->u.shm_dtime = 0;
|
2005-01-22 19:10:25 +00:00
|
|
|
#ifdef MAC
|
2007-10-24 19:04:04 +00:00
|
|
|
mac_sysvshm_create(cred, shmseg);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
2004-11-12 13:23:47 +00:00
|
|
|
shmseg->u.shm_ctime = time_second;
|
1994-09-13 14:47:38 +00:00
|
|
|
shm_committed += btoc(size);
|
|
|
|
shm_nused++;
|
2015-03-21 15:01:19 +00:00
|
|
|
td->td_retval[0] = IXSEQ_TO_IPCID(segnum, shmseg->u.shm_perm);
|
|
|
|
|
2002-08-15 02:10:12 +00:00
|
|
|
return (0);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
2009-06-24 13:35:38 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
|
|
|
struct shmget_args {
|
|
|
|
key_t key;
|
|
|
|
size_t size;
|
|
|
|
int shmflg;
|
|
|
|
};
|
|
|
|
#endif
|
1994-09-13 14:47:38 +00:00
|
|
|
int
|
2015-03-21 15:01:19 +00:00
|
|
|
sys_shmget(struct thread *td, struct shmget_args *uap)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2001-08-31 00:02:18 +00:00
|
|
|
int segnum, mode;
|
|
|
|
int error;
|
1994-09-13 14:47:38 +00:00
|
|
|
|
2016-04-25 17:06:50 +00:00
|
|
|
if (shm_find_prison(td->td_ucred) == NULL)
|
2002-03-05 18:57:36 +00:00
|
|
|
return (ENOSYS);
|
1994-09-13 14:47:38 +00:00
|
|
|
mode = uap->shmflg & ACCESSPERMS;
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_LOCK();
|
|
|
|
if (uap->key == IPC_PRIVATE) {
|
2020-11-03 19:14:03 +00:00
|
|
|
error = shmget_allocate_segment(td, uap->key, uap->size, mode);
|
2015-03-21 15:01:19 +00:00
|
|
|
} else {
|
2016-04-25 17:06:50 +00:00
|
|
|
segnum = shm_find_segment_by_key(td->td_ucred->cr_prison,
|
|
|
|
uap->key);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (segnum >= 0)
|
2020-11-03 19:14:03 +00:00
|
|
|
error = shmget_existing(td, uap->size, uap->shmflg,
|
|
|
|
mode, segnum);
|
2015-03-21 15:01:19 +00:00
|
|
|
else if ((uap->shmflg & IPC_CREAT) == 0)
|
2001-08-31 00:02:18 +00:00
|
|
|
error = ENOENT;
|
2015-03-21 15:01:19 +00:00
|
|
|
else
|
2020-11-03 19:14:03 +00:00
|
|
|
error = shmget_allocate_segment(td, uap->key,
|
|
|
|
uap->size, mode);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_UNLOCK();
|
2001-08-31 00:02:18 +00:00
|
|
|
return (error);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
2019-05-04 19:05:30 +00:00
|
|
|
#ifdef SYSVSHM
|
|
|
|
void
|
|
|
|
shmfork(struct proc *p1, struct proc *p2)
|
|
|
|
#else
|
2000-12-01 08:57:47 +00:00
|
|
|
static void
|
2015-03-21 15:01:19 +00:00
|
|
|
shmfork_myhook(struct proc *p1, struct proc *p2)
|
2019-05-04 19:05:30 +00:00
|
|
|
#endif
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
|
|
|
struct shmmap_state *shmmap_s;
|
|
|
|
size_t size;
|
|
|
|
int i;
|
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_LOCK();
|
1994-09-13 14:47:38 +00:00
|
|
|
size = shminfo.shmseg * sizeof(struct shmmap_state);
|
2003-02-19 05:47:46 +00:00
|
|
|
shmmap_s = malloc(size, M_SHM, M_WAITOK);
|
2002-07-22 16:12:55 +00:00
|
|
|
bcopy(p1->p_vmspace->vm_shm, shmmap_s, size);
|
|
|
|
p2->p_vmspace->vm_shm = shmmap_s;
|
2015-03-21 15:01:19 +00:00
|
|
|
for (i = 0; i < shminfo.shmseg; i++, shmmap_s++) {
|
|
|
|
if (shmmap_s->shmid != -1) {
|
|
|
|
KASSERT(IPCID_TO_IX(shmmap_s->shmid) >= 0 &&
|
|
|
|
IPCID_TO_IX(shmmap_s->shmid) < shmalloced,
|
|
|
|
("segnum %d shmalloced %d",
|
|
|
|
IPCID_TO_IX(shmmap_s->shmid), shmalloced));
|
2004-11-12 13:23:47 +00:00
|
|
|
shmsegs[IPCID_TO_IX(shmmap_s->shmid)].u.shm_nattch++;
|
2015-03-21 15:01:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
SYSVSHM_UNLOCK();
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
2019-05-04 19:05:30 +00:00
|
|
|
#ifdef SYSVSHM
|
|
|
|
void
|
|
|
|
shmexit(struct vmspace *vm)
|
|
|
|
#else
|
2000-12-01 08:57:47 +00:00
|
|
|
static void
|
2003-01-13 23:04:32 +00:00
|
|
|
shmexit_myhook(struct vmspace *vm)
|
2019-05-04 19:05:30 +00:00
|
|
|
#endif
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2003-01-13 23:04:32 +00:00
|
|
|
struct shmmap_state *base, *shm;
|
1994-09-13 14:47:38 +00:00
|
|
|
int i;
|
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
base = vm->vm_shm;
|
|
|
|
if (base != NULL) {
|
2003-01-13 23:04:32 +00:00
|
|
|
vm->vm_shm = NULL;
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_LOCK();
|
2003-01-13 23:04:32 +00:00
|
|
|
for (i = 0, shm = base; i < shminfo.shmseg; i++, shm++) {
|
|
|
|
if (shm->shmid != -1)
|
|
|
|
shm_delete_mapping(vm, shm);
|
|
|
|
}
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_UNLOCK();
|
2003-01-13 23:04:32 +00:00
|
|
|
free(base, M_SHM);
|
|
|
|
}
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
|
2000-03-30 07:17:05 +00:00
|
|
|
static void
|
|
|
|
shmrealloc(void)
|
|
|
|
{
|
2004-11-12 13:23:47 +00:00
|
|
|
struct shmid_kernel *newsegs;
|
2015-03-21 15:01:19 +00:00
|
|
|
int i;
|
|
|
|
|
|
|
|
SYSVSHM_ASSERT_LOCKED();
|
2000-03-30 07:17:05 +00:00
|
|
|
|
|
|
|
if (shmalloced >= shminfo.shmmni)
|
|
|
|
return;
|
|
|
|
|
2018-02-02 18:03:12 +00:00
|
|
|
newsegs = malloc(shminfo.shmmni * sizeof(*newsegs), M_SHM,
|
|
|
|
M_WAITOK | M_ZERO);
|
2000-03-30 07:17:05 +00:00
|
|
|
for (i = 0; i < shmalloced; i++)
|
|
|
|
bcopy(&shmsegs[i], &newsegs[i], sizeof(newsegs[0]));
|
|
|
|
for (; i < shminfo.shmmni; i++) {
|
2015-07-02 19:00:22 +00:00
|
|
|
newsegs[i].u.shm_perm.mode = SHMSEG_FREE;
|
|
|
|
newsegs[i].u.shm_perm.seq = 0;
|
2005-01-22 19:10:25 +00:00
|
|
|
#ifdef MAC
|
2015-07-02 19:00:22 +00:00
|
|
|
mac_sysvshm_init(&newsegs[i]);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
2000-03-30 07:17:05 +00:00
|
|
|
}
|
|
|
|
free(shmsegs, M_SHM);
|
|
|
|
shmsegs = newsegs;
|
|
|
|
shmalloced = shminfo.shmmni;
|
|
|
|
}
|
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
static struct syscall_helper_data shm_syscalls[] = {
|
|
|
|
SYSCALL_INIT_HELPER(shmat),
|
|
|
|
SYSCALL_INIT_HELPER(shmctl),
|
|
|
|
SYSCALL_INIT_HELPER(shmdt),
|
|
|
|
SYSCALL_INIT_HELPER(shmget),
|
|
|
|
#if defined(COMPAT_FREEBSD4) || defined(COMPAT_FREEBSD5) || \
|
|
|
|
defined(COMPAT_FREEBSD6) || defined(COMPAT_FREEBSD7)
|
2011-09-16 13:58:51 +00:00
|
|
|
SYSCALL_INIT_HELPER_COMPAT(freebsd7_shmctl),
|
2010-03-19 11:04:42 +00:00
|
|
|
#endif
|
|
|
|
#if defined(__i386__) && (defined(COMPAT_FREEBSD4) || defined(COMPAT_43))
|
|
|
|
SYSCALL_INIT_HELPER(shmsys),
|
|
|
|
#endif
|
|
|
|
SYSCALL_INIT_LAST
|
|
|
|
};
|
|
|
|
|
|
|
|
#ifdef COMPAT_FREEBSD32
|
|
|
|
#include <compat/freebsd32/freebsd32.h>
|
|
|
|
#include <compat/freebsd32/freebsd32_ipc.h>
|
|
|
|
#include <compat/freebsd32/freebsd32_proto.h>
|
|
|
|
#include <compat/freebsd32/freebsd32_signal.h>
|
|
|
|
#include <compat/freebsd32/freebsd32_syscall.h>
|
|
|
|
#include <compat/freebsd32/freebsd32_util.h>
|
|
|
|
|
|
|
|
static struct syscall_helper_data shm32_syscalls[] = {
|
2011-09-16 13:58:51 +00:00
|
|
|
SYSCALL32_INIT_HELPER_COMPAT(shmat),
|
|
|
|
SYSCALL32_INIT_HELPER_COMPAT(shmdt),
|
|
|
|
SYSCALL32_INIT_HELPER_COMPAT(shmget),
|
2010-03-19 11:04:42 +00:00
|
|
|
SYSCALL32_INIT_HELPER(freebsd32_shmsys),
|
|
|
|
SYSCALL32_INIT_HELPER(freebsd32_shmctl),
|
|
|
|
#if defined(COMPAT_FREEBSD4) || defined(COMPAT_FREEBSD5) || \
|
|
|
|
defined(COMPAT_FREEBSD6) || defined(COMPAT_FREEBSD7)
|
|
|
|
SYSCALL32_INIT_HELPER(freebsd7_freebsd32_shmctl),
|
|
|
|
#endif
|
|
|
|
SYSCALL_INIT_LAST
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static int
|
2015-03-21 15:01:19 +00:00
|
|
|
shminit(void)
|
1994-09-13 14:47:38 +00:00
|
|
|
{
|
2016-04-25 17:06:50 +00:00
|
|
|
struct prison *pr;
|
2016-04-26 19:57:35 +00:00
|
|
|
void **rsv;
|
2010-03-19 11:04:42 +00:00
|
|
|
int i, error;
|
2016-04-25 17:06:50 +00:00
|
|
|
osd_method_t methods[PR_MAXMETHOD] = {
|
|
|
|
[PR_METHOD_CHECK] = shm_prison_check,
|
|
|
|
[PR_METHOD_SET] = shm_prison_set,
|
|
|
|
[PR_METHOD_GET] = shm_prison_get,
|
|
|
|
[PR_METHOD_REMOVE] = shm_prison_remove,
|
|
|
|
};
|
2000-03-30 07:17:05 +00:00
|
|
|
|
2009-10-24 19:00:58 +00:00
|
|
|
#ifndef BURN_BRIDGES
|
|
|
|
if (TUNABLE_ULONG_FETCH("kern.ipc.shmmaxpgs", &shminfo.shmall) != 0)
|
|
|
|
printf("kern.ipc.shmmaxpgs is now called kern.ipc.shmall!\n");
|
|
|
|
#endif
|
2014-06-28 03:56:17 +00:00
|
|
|
if (shminfo.shmmax == SHMMAX) {
|
2012-02-08 09:18:22 +00:00
|
|
|
/* Initialize shmmax dealing with possible overflow. */
|
2014-06-28 03:56:17 +00:00
|
|
|
for (i = PAGE_SIZE; i != 0; i--) {
|
2012-02-08 09:18:22 +00:00
|
|
|
shminfo.shmmax = shminfo.shmall * i;
|
2014-06-28 03:56:17 +00:00
|
|
|
if ((shminfo.shmmax / shminfo.shmall) == (u_long)i)
|
2012-02-08 09:18:22 +00:00
|
|
|
break;
|
|
|
|
}
|
2003-02-16 06:08:55 +00:00
|
|
|
}
|
2000-03-30 07:17:05 +00:00
|
|
|
shmalloced = shminfo.shmmni;
|
2018-02-02 18:03:12 +00:00
|
|
|
shmsegs = malloc(shmalloced * sizeof(shmsegs[0]), M_SHM,
|
|
|
|
M_WAITOK|M_ZERO);
|
2000-03-30 07:17:05 +00:00
|
|
|
for (i = 0; i < shmalloced; i++) {
|
2004-11-12 13:23:47 +00:00
|
|
|
shmsegs[i].u.shm_perm.mode = SHMSEG_FREE;
|
|
|
|
shmsegs[i].u.shm_perm.seq = 0;
|
2005-01-22 19:10:25 +00:00
|
|
|
#ifdef MAC
|
2007-10-24 19:04:04 +00:00
|
|
|
mac_sysvshm_init(&shmsegs[i]);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
|
|
|
shm_last_free = 0;
|
|
|
|
shm_nused = 0;
|
|
|
|
shm_committed = 0;
|
2015-03-21 15:01:19 +00:00
|
|
|
sx_init(&sysvshmsx, "sysvshmsx");
|
2019-05-04 19:05:30 +00:00
|
|
|
#ifndef SYSVSHM
|
2000-12-01 08:57:47 +00:00
|
|
|
shmexit_hook = &shmexit_myhook;
|
|
|
|
shmfork_hook = &shmfork_myhook;
|
2019-05-04 19:05:30 +00:00
|
|
|
#endif
|
2010-03-19 11:04:42 +00:00
|
|
|
|
2016-04-25 17:06:50 +00:00
|
|
|
/* Set current prisons according to their allow.sysvipc. */
|
|
|
|
shm_prison_slot = osd_jail_register(NULL, methods);
|
|
|
|
rsv = osd_reserve(shm_prison_slot);
|
|
|
|
prison_lock(&prison0);
|
|
|
|
(void)osd_jail_set_reserved(&prison0, shm_prison_slot, rsv, &prison0);
|
|
|
|
prison_unlock(&prison0);
|
|
|
|
rsv = NULL;
|
|
|
|
sx_slock(&allprison_lock);
|
|
|
|
TAILQ_FOREACH(pr, &allprison, pr_list) {
|
|
|
|
if (rsv == NULL)
|
|
|
|
rsv = osd_reserve(shm_prison_slot);
|
|
|
|
prison_lock(pr);
|
|
|
|
if ((pr->pr_allow & PR_ALLOW_SYSVIPC) && pr->pr_ref > 0) {
|
|
|
|
(void)osd_jail_set_reserved(pr, shm_prison_slot, rsv,
|
|
|
|
&prison0);
|
|
|
|
rsv = NULL;
|
|
|
|
}
|
|
|
|
prison_unlock(pr);
|
|
|
|
}
|
|
|
|
if (rsv != NULL)
|
|
|
|
osd_free_reserved(rsv);
|
|
|
|
sx_sunlock(&allprison_lock);
|
|
|
|
|
2014-10-26 19:42:44 +00:00
|
|
|
error = syscall_helper_register(shm_syscalls, SY_THR_STATIC_KLD);
|
2010-03-19 11:04:42 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
|
|
|
#ifdef COMPAT_FREEBSD32
|
2014-10-26 19:42:44 +00:00
|
|
|
error = syscall32_helper_register(shm32_syscalls, SY_THR_STATIC_KLD);
|
2010-03-19 11:04:42 +00:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
|
|
|
#endif
|
|
|
|
return (0);
|
2000-12-01 08:57:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2015-03-21 15:01:19 +00:00
|
|
|
shmunload(void)
|
2000-12-01 08:57:47 +00:00
|
|
|
{
|
2015-07-02 19:14:30 +00:00
|
|
|
int i;
|
2000-12-01 08:57:47 +00:00
|
|
|
|
|
|
|
if (shm_nused > 0)
|
|
|
|
return (EBUSY);
|
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
#ifdef COMPAT_FREEBSD32
|
|
|
|
syscall32_helper_unregister(shm32_syscalls);
|
|
|
|
#endif
|
|
|
|
syscall_helper_unregister(shm_syscalls);
|
2016-04-25 17:06:50 +00:00
|
|
|
if (shm_prison_slot != 0)
|
|
|
|
osd_jail_deregister(shm_prison_slot);
|
2010-03-19 11:04:42 +00:00
|
|
|
|
2010-06-28 18:12:42 +00:00
|
|
|
for (i = 0; i < shmalloced; i++) {
|
2005-01-22 19:10:25 +00:00
|
|
|
#ifdef MAC
|
2007-10-24 19:04:04 +00:00
|
|
|
mac_sysvshm_destroy(&shmsegs[i]);
|
2005-01-22 19:10:25 +00:00
|
|
|
#endif
|
2010-06-28 18:12:42 +00:00
|
|
|
/*
|
|
|
|
* Objects might be still mapped into the processes
|
|
|
|
* address spaces. Actual free would happen on the
|
|
|
|
* last mapping destruction.
|
|
|
|
*/
|
|
|
|
if (shmsegs[i].u.shm_perm.mode != SHMSEG_FREE)
|
|
|
|
vm_object_deallocate(shmsegs[i].object);
|
|
|
|
}
|
2000-12-01 08:57:47 +00:00
|
|
|
free(shmsegs, M_SHM);
|
2019-05-04 19:05:30 +00:00
|
|
|
#ifndef SYSVSHM
|
2000-12-01 08:57:47 +00:00
|
|
|
shmexit_hook = NULL;
|
|
|
|
shmfork_hook = NULL;
|
2019-05-04 19:05:30 +00:00
|
|
|
#endif
|
2015-03-21 15:01:19 +00:00
|
|
|
sx_destroy(&sysvshmsx);
|
2000-12-01 08:57:47 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2001-05-30 03:28:59 +00:00
|
|
|
static int
|
|
|
|
sysctl_shmsegs(SYSCTL_HANDLER_ARGS)
|
|
|
|
{
|
2016-04-26 18:17:44 +00:00
|
|
|
struct shmid_kernel tshmseg;
|
2018-02-02 18:03:12 +00:00
|
|
|
#ifdef COMPAT_FREEBSD32
|
|
|
|
struct shmid_kernel32 tshmseg32;
|
|
|
|
#endif
|
2016-04-26 18:17:44 +00:00
|
|
|
struct prison *pr, *rpr;
|
2018-02-02 18:03:12 +00:00
|
|
|
void *outaddr;
|
|
|
|
size_t outsize;
|
2016-04-25 17:06:50 +00:00
|
|
|
int error, i;
|
2001-05-30 03:28:59 +00:00
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_LOCK();
|
2016-04-26 18:17:44 +00:00
|
|
|
pr = req->td->td_ucred->cr_prison;
|
2016-04-25 17:06:50 +00:00
|
|
|
rpr = shm_find_prison(req->td->td_ucred);
|
2016-04-26 18:17:44 +00:00
|
|
|
error = 0;
|
2016-04-25 17:06:50 +00:00
|
|
|
for (i = 0; i < shmalloced; i++) {
|
2016-04-26 18:17:44 +00:00
|
|
|
if ((shmsegs[i].u.shm_perm.mode & SHMSEG_ALLOCATED) == 0 ||
|
2016-04-25 17:06:50 +00:00
|
|
|
rpr == NULL || shm_prison_cansee(rpr, &shmsegs[i]) != 0) {
|
2016-04-26 18:17:44 +00:00
|
|
|
bzero(&tshmseg, sizeof(tshmseg));
|
|
|
|
tshmseg.u.shm_perm.mode = SHMSEG_FREE;
|
|
|
|
} else {
|
|
|
|
tshmseg = shmsegs[i];
|
|
|
|
if (tshmseg.cred->cr_prison != pr)
|
|
|
|
tshmseg.u.shm_perm.key = IPC_PRIVATE;
|
2016-04-25 17:06:50 +00:00
|
|
|
}
|
2018-02-02 18:03:12 +00:00
|
|
|
#ifdef COMPAT_FREEBSD32
|
|
|
|
if (SV_CURPROC_FLAG(SV_ILP32)) {
|
|
|
|
bzero(&tshmseg32, sizeof(tshmseg32));
|
|
|
|
freebsd32_ipcperm_out(&tshmseg.u.shm_perm,
|
|
|
|
&tshmseg32.u.shm_perm);
|
|
|
|
CP(tshmseg, tshmseg32, u.shm_segsz);
|
|
|
|
CP(tshmseg, tshmseg32, u.shm_lpid);
|
|
|
|
CP(tshmseg, tshmseg32, u.shm_cpid);
|
|
|
|
CP(tshmseg, tshmseg32, u.shm_nattch);
|
|
|
|
CP(tshmseg, tshmseg32, u.shm_atime);
|
|
|
|
CP(tshmseg, tshmseg32, u.shm_dtime);
|
|
|
|
CP(tshmseg, tshmseg32, u.shm_ctime);
|
|
|
|
/* Don't copy object, label, or cred */
|
|
|
|
outaddr = &tshmseg32;
|
|
|
|
outsize = sizeof(tshmseg32);
|
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
tshmseg.object = NULL;
|
|
|
|
tshmseg.label = NULL;
|
|
|
|
tshmseg.cred = NULL;
|
|
|
|
outaddr = &tshmseg;
|
|
|
|
outsize = sizeof(tshmseg);
|
|
|
|
}
|
|
|
|
error = SYSCTL_OUT(req, outaddr, outsize);
|
2016-04-26 18:17:44 +00:00
|
|
|
if (error != 0)
|
|
|
|
break;
|
2016-04-25 17:06:50 +00:00
|
|
|
}
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_UNLOCK();
|
|
|
|
return (error);
|
2001-05-30 03:28:59 +00:00
|
|
|
}
|
|
|
|
|
2016-04-25 17:06:50 +00:00
|
|
|
static int
|
|
|
|
shm_prison_check(void *obj, void *data)
|
|
|
|
{
|
|
|
|
struct prison *pr = obj;
|
|
|
|
struct prison *prpr;
|
|
|
|
struct vfsoptlist *opts = data;
|
|
|
|
int error, jsys;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sysvshm is a jailsys integer.
|
|
|
|
* It must be "disable" if the parent jail is disabled.
|
|
|
|
*/
|
|
|
|
error = vfs_copyopt(opts, "sysvshm", &jsys, sizeof(jsys));
|
|
|
|
if (error != ENOENT) {
|
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
|
|
|
switch (jsys) {
|
|
|
|
case JAIL_SYS_DISABLE:
|
|
|
|
break;
|
|
|
|
case JAIL_SYS_NEW:
|
|
|
|
case JAIL_SYS_INHERIT:
|
|
|
|
prison_lock(pr->pr_parent);
|
|
|
|
prpr = osd_jail_get(pr->pr_parent, shm_prison_slot);
|
|
|
|
prison_unlock(pr->pr_parent);
|
|
|
|
if (prpr == NULL)
|
|
|
|
return (EPERM);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
shm_prison_set(void *obj, void *data)
|
|
|
|
{
|
|
|
|
struct prison *pr = obj;
|
|
|
|
struct prison *tpr, *orpr, *nrpr, *trpr;
|
|
|
|
struct vfsoptlist *opts = data;
|
|
|
|
void *rsv;
|
|
|
|
int jsys, descend;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sysvshm controls which jail is the root of the associated segments
|
|
|
|
* (this jail or same as the parent), or if the feature is available
|
|
|
|
* at all.
|
|
|
|
*/
|
|
|
|
if (vfs_copyopt(opts, "sysvshm", &jsys, sizeof(jsys)) == ENOENT)
|
|
|
|
jsys = vfs_flagopt(opts, "allow.sysvipc", NULL, 0)
|
|
|
|
? JAIL_SYS_INHERIT
|
|
|
|
: vfs_flagopt(opts, "allow.nosysvipc", NULL, 0)
|
|
|
|
? JAIL_SYS_DISABLE
|
|
|
|
: -1;
|
|
|
|
if (jsys == JAIL_SYS_DISABLE) {
|
|
|
|
prison_lock(pr);
|
|
|
|
orpr = osd_jail_get(pr, shm_prison_slot);
|
|
|
|
if (orpr != NULL)
|
|
|
|
osd_jail_del(pr, shm_prison_slot);
|
|
|
|
prison_unlock(pr);
|
|
|
|
if (orpr != NULL) {
|
|
|
|
if (orpr == pr)
|
|
|
|
shm_prison_cleanup(pr);
|
|
|
|
/* Disable all child jails as well. */
|
|
|
|
FOREACH_PRISON_DESCENDANT(pr, tpr, descend) {
|
|
|
|
prison_lock(tpr);
|
|
|
|
trpr = osd_jail_get(tpr, shm_prison_slot);
|
|
|
|
if (trpr != NULL) {
|
|
|
|
osd_jail_del(tpr, shm_prison_slot);
|
|
|
|
prison_unlock(tpr);
|
|
|
|
if (trpr == tpr)
|
|
|
|
shm_prison_cleanup(tpr);
|
|
|
|
} else {
|
|
|
|
prison_unlock(tpr);
|
|
|
|
descend = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if (jsys != -1) {
|
|
|
|
if (jsys == JAIL_SYS_NEW)
|
|
|
|
nrpr = pr;
|
|
|
|
else {
|
|
|
|
prison_lock(pr->pr_parent);
|
|
|
|
nrpr = osd_jail_get(pr->pr_parent, shm_prison_slot);
|
|
|
|
prison_unlock(pr->pr_parent);
|
|
|
|
}
|
|
|
|
rsv = osd_reserve(shm_prison_slot);
|
|
|
|
prison_lock(pr);
|
|
|
|
orpr = osd_jail_get(pr, shm_prison_slot);
|
|
|
|
if (orpr != nrpr)
|
|
|
|
(void)osd_jail_set_reserved(pr, shm_prison_slot, rsv,
|
|
|
|
nrpr);
|
|
|
|
else
|
|
|
|
osd_free_reserved(rsv);
|
|
|
|
prison_unlock(pr);
|
|
|
|
if (orpr != nrpr) {
|
|
|
|
if (orpr == pr)
|
|
|
|
shm_prison_cleanup(pr);
|
|
|
|
if (orpr != NULL) {
|
|
|
|
/* Change child jails matching the old root, */
|
|
|
|
FOREACH_PRISON_DESCENDANT(pr, tpr, descend) {
|
|
|
|
prison_lock(tpr);
|
|
|
|
trpr = osd_jail_get(tpr,
|
|
|
|
shm_prison_slot);
|
|
|
|
if (trpr == orpr) {
|
|
|
|
(void)osd_jail_set(tpr,
|
|
|
|
shm_prison_slot, nrpr);
|
|
|
|
prison_unlock(tpr);
|
|
|
|
if (trpr == tpr)
|
|
|
|
shm_prison_cleanup(tpr);
|
|
|
|
} else {
|
|
|
|
prison_unlock(tpr);
|
|
|
|
descend = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
shm_prison_get(void *obj, void *data)
|
|
|
|
{
|
|
|
|
struct prison *pr = obj;
|
|
|
|
struct prison *rpr;
|
|
|
|
struct vfsoptlist *opts = data;
|
|
|
|
int error, jsys;
|
|
|
|
|
|
|
|
/* Set sysvshm based on the jail's root prison. */
|
|
|
|
prison_lock(pr);
|
|
|
|
rpr = osd_jail_get(pr, shm_prison_slot);
|
|
|
|
prison_unlock(pr);
|
|
|
|
jsys = rpr == NULL ? JAIL_SYS_DISABLE
|
|
|
|
: rpr == pr ? JAIL_SYS_NEW : JAIL_SYS_INHERIT;
|
|
|
|
error = vfs_setopt(opts, "sysvshm", &jsys, sizeof(jsys));
|
|
|
|
if (error == ENOENT)
|
|
|
|
error = 0;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
shm_prison_remove(void *obj, void *data __unused)
|
|
|
|
{
|
|
|
|
struct prison *pr = obj;
|
|
|
|
struct prison *rpr;
|
|
|
|
|
|
|
|
SYSVSHM_LOCK();
|
|
|
|
prison_lock(pr);
|
|
|
|
rpr = osd_jail_get(pr, shm_prison_slot);
|
|
|
|
prison_unlock(pr);
|
|
|
|
if (rpr == pr)
|
|
|
|
shm_prison_cleanup(pr);
|
|
|
|
SYSVSHM_UNLOCK();
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
shm_prison_cleanup(struct prison *pr)
|
|
|
|
{
|
|
|
|
struct shmid_kernel *shmseg;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* Remove any segments that belong to this jail. */
|
|
|
|
for (i = 0; i < shmalloced; i++) {
|
|
|
|
shmseg = &shmsegs[i];
|
|
|
|
if ((shmseg->u.shm_perm.mode & SHMSEG_ALLOCATED) &&
|
|
|
|
shmseg->cred != NULL && shmseg->cred->cr_prison == pr) {
|
|
|
|
shm_remove(shmseg, i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
SYSCTL_JAIL_PARAM_SYS_NODE(sysvshm, CTLFLAG_RW, "SYSV shared memory");
|
|
|
|
|
2009-06-24 20:01:13 +00:00
|
|
|
#if defined(__i386__) && (defined(COMPAT_FREEBSD4) || defined(COMPAT_43))
|
|
|
|
struct oshmid_ds {
|
|
|
|
struct ipc_perm_old shm_perm; /* operation perms */
|
|
|
|
int shm_segsz; /* size of segment (bytes) */
|
|
|
|
u_short shm_cpid; /* pid, creator */
|
|
|
|
u_short shm_lpid; /* pid, last operation */
|
|
|
|
short shm_nattch; /* no. of current attaches */
|
|
|
|
time_t shm_atime; /* last attach time */
|
|
|
|
time_t shm_dtime; /* last detach time */
|
|
|
|
time_t shm_ctime; /* last change time */
|
|
|
|
void *shm_handle; /* internal handle for shm segment */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct oshmctl_args {
|
|
|
|
int shmid;
|
|
|
|
int cmd;
|
|
|
|
struct oshmid_ds *ubuf;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2009-06-25 13:36:57 +00:00
|
|
|
oshmctl(struct thread *td, struct oshmctl_args *uap)
|
2009-06-24 20:01:13 +00:00
|
|
|
{
|
|
|
|
#ifdef COMPAT_43
|
|
|
|
int error = 0;
|
2016-04-25 17:06:50 +00:00
|
|
|
struct prison *rpr;
|
2009-06-24 20:01:13 +00:00
|
|
|
struct shmid_kernel *shmseg;
|
|
|
|
struct oshmid_ds outbuf;
|
|
|
|
|
2016-04-25 17:06:50 +00:00
|
|
|
rpr = shm_find_prison(td->td_ucred);
|
|
|
|
if (rpr == NULL)
|
2009-06-24 20:01:13 +00:00
|
|
|
return (ENOSYS);
|
2015-04-27 11:12:51 +00:00
|
|
|
if (uap->cmd != IPC_STAT) {
|
|
|
|
return (freebsd7_shmctl(td,
|
|
|
|
(struct freebsd7_shmctl_args *)uap));
|
|
|
|
}
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_LOCK();
|
2016-04-25 17:06:50 +00:00
|
|
|
shmseg = shm_find_segment(rpr, uap->shmid, true);
|
2009-06-24 20:01:13 +00:00
|
|
|
if (shmseg == NULL) {
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_UNLOCK();
|
2015-04-04 23:56:38 +00:00
|
|
|
return (EINVAL);
|
2009-06-24 20:01:13 +00:00
|
|
|
}
|
2015-04-27 11:12:51 +00:00
|
|
|
error = ipcperm(td, &shmseg->u.shm_perm, IPC_R);
|
|
|
|
if (error != 0) {
|
|
|
|
SYSVSHM_UNLOCK();
|
|
|
|
return (error);
|
|
|
|
}
|
2009-06-24 20:01:13 +00:00
|
|
|
#ifdef MAC
|
2015-04-27 11:12:51 +00:00
|
|
|
error = mac_sysvshm_check_shmctl(td->td_ucred, shmseg, uap->cmd);
|
|
|
|
if (error != 0) {
|
|
|
|
SYSVSHM_UNLOCK();
|
|
|
|
return (error);
|
2009-06-24 20:01:13 +00:00
|
|
|
}
|
2015-04-27 11:12:51 +00:00
|
|
|
#endif
|
|
|
|
ipcperm_new2old(&shmseg->u.shm_perm, &outbuf.shm_perm);
|
|
|
|
outbuf.shm_segsz = shmseg->u.shm_segsz;
|
|
|
|
outbuf.shm_cpid = shmseg->u.shm_cpid;
|
|
|
|
outbuf.shm_lpid = shmseg->u.shm_lpid;
|
|
|
|
outbuf.shm_nattch = shmseg->u.shm_nattch;
|
|
|
|
outbuf.shm_atime = shmseg->u.shm_atime;
|
|
|
|
outbuf.shm_dtime = shmseg->u.shm_dtime;
|
|
|
|
outbuf.shm_ctime = shmseg->u.shm_ctime;
|
|
|
|
outbuf.shm_handle = shmseg->object;
|
2015-03-21 15:01:19 +00:00
|
|
|
SYSVSHM_UNLOCK();
|
2015-07-02 19:14:30 +00:00
|
|
|
return (copyout(&outbuf, uap->ubuf, sizeof(outbuf)));
|
2009-06-24 20:01:13 +00:00
|
|
|
#else
|
|
|
|
return (EINVAL);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/* XXX casting to (sy_call_t *) is bogus, as usual. */
|
|
|
|
static sy_call_t *shmcalls[] = {
|
2011-09-16 13:58:51 +00:00
|
|
|
(sy_call_t *)sys_shmat, (sy_call_t *)oshmctl,
|
|
|
|
(sy_call_t *)sys_shmdt, (sy_call_t *)sys_shmget,
|
2009-06-24 21:10:52 +00:00
|
|
|
(sy_call_t *)freebsd7_shmctl
|
2009-06-24 20:01:13 +00:00
|
|
|
};
|
|
|
|
|
2015-03-21 15:01:19 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
|
|
|
/* XXX actually varargs. */
|
|
|
|
struct shmsys_args {
|
|
|
|
int which;
|
|
|
|
int a2;
|
|
|
|
int a3;
|
|
|
|
int a4;
|
|
|
|
};
|
|
|
|
#endif
|
2009-06-24 20:01:13 +00:00
|
|
|
int
|
2015-03-21 15:01:19 +00:00
|
|
|
sys_shmsys(struct thread *td, struct shmsys_args *uap)
|
2009-06-24 20:01:13 +00:00
|
|
|
{
|
|
|
|
|
2017-03-29 23:31:35 +00:00
|
|
|
AUDIT_ARG_SVIPC_WHICH(uap->which);
|
2015-03-21 15:01:19 +00:00
|
|
|
if (uap->which < 0 || uap->which >= nitems(shmcalls))
|
2009-06-24 20:01:13 +00:00
|
|
|
return (EINVAL);
|
2015-07-02 19:14:30 +00:00
|
|
|
return ((*shmcalls[uap->which])(td, &uap->a2));
|
2009-06-24 20:01:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* i386 && (COMPAT_FREEBSD4 || COMPAT_43) */
|
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
#ifdef COMPAT_FREEBSD32
|
|
|
|
|
|
|
|
int
|
|
|
|
freebsd32_shmsys(struct thread *td, struct freebsd32_shmsys_args *uap)
|
|
|
|
{
|
|
|
|
|
2009-06-24 21:10:52 +00:00
|
|
|
#if defined(COMPAT_FREEBSD4) || defined(COMPAT_FREEBSD5) || \
|
|
|
|
defined(COMPAT_FREEBSD6) || defined(COMPAT_FREEBSD7)
|
2017-03-29 23:31:35 +00:00
|
|
|
AUDIT_ARG_SVIPC_WHICH(uap->which);
|
2010-03-19 11:04:42 +00:00
|
|
|
switch (uap->which) {
|
|
|
|
case 0: { /* shmat */
|
|
|
|
struct shmat_args ap;
|
|
|
|
|
|
|
|
ap.shmid = uap->a2;
|
|
|
|
ap.shmaddr = PTRIN(uap->a3);
|
|
|
|
ap.shmflg = uap->a4;
|
|
|
|
return (sysent[SYS_shmat].sy_call(td, &ap));
|
|
|
|
}
|
|
|
|
case 2: { /* shmdt */
|
|
|
|
struct shmdt_args ap;
|
2009-06-24 21:10:52 +00:00
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
ap.shmaddr = PTRIN(uap->a2);
|
|
|
|
return (sysent[SYS_shmdt].sy_call(td, &ap));
|
|
|
|
}
|
|
|
|
case 3: { /* shmget */
|
|
|
|
struct shmget_args ap;
|
2009-06-24 21:10:52 +00:00
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
ap.key = uap->a2;
|
|
|
|
ap.size = uap->a3;
|
|
|
|
ap.shmflg = uap->a4;
|
|
|
|
return (sysent[SYS_shmget].sy_call(td, &ap));
|
|
|
|
}
|
|
|
|
case 4: { /* shmctl */
|
|
|
|
struct freebsd7_freebsd32_shmctl_args ap;
|
|
|
|
|
|
|
|
ap.shmid = uap->a2;
|
|
|
|
ap.cmd = uap->a3;
|
|
|
|
ap.buf = PTRIN(uap->a4);
|
|
|
|
return (freebsd7_freebsd32_shmctl(td, &ap));
|
|
|
|
}
|
|
|
|
case 1: /* oshmctl */
|
|
|
|
default:
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
return (nosys(td, NULL));
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(COMPAT_FREEBSD4) || defined(COMPAT_FREEBSD5) || \
|
|
|
|
defined(COMPAT_FREEBSD6) || defined(COMPAT_FREEBSD7)
|
|
|
|
int
|
|
|
|
freebsd7_freebsd32_shmctl(struct thread *td,
|
|
|
|
struct freebsd7_freebsd32_shmctl_args *uap)
|
|
|
|
{
|
2015-07-02 19:14:30 +00:00
|
|
|
int error;
|
2010-03-19 11:04:42 +00:00
|
|
|
union {
|
|
|
|
struct shmid_ds shmid_ds;
|
|
|
|
struct shm_info shm_info;
|
|
|
|
struct shminfo shminfo;
|
|
|
|
} u;
|
|
|
|
union {
|
|
|
|
struct shmid_ds32_old shmid_ds32;
|
|
|
|
struct shm_info32 shm_info32;
|
|
|
|
struct shminfo32 shminfo32;
|
|
|
|
} u32;
|
|
|
|
size_t sz;
|
|
|
|
|
|
|
|
if (uap->cmd == IPC_SET) {
|
|
|
|
if ((error = copyin(uap->buf, &u32.shmid_ds32,
|
|
|
|
sizeof(u32.shmid_ds32))))
|
|
|
|
goto done;
|
|
|
|
freebsd32_ipcperm_old_in(&u32.shmid_ds32.shm_perm,
|
|
|
|
&u.shmid_ds.shm_perm);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_segsz);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_lpid);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_cpid);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_nattch);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_atime);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_dtime);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_ctime);
|
|
|
|
}
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
error = kern_shmctl(td, uap->shmid, uap->cmd, (void *)&u, &sz);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
/* Cases in which we need to copyout */
|
|
|
|
switch (uap->cmd) {
|
|
|
|
case IPC_INFO:
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmmax);
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmmin);
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmmni);
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmseg);
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmall);
|
|
|
|
error = copyout(&u32.shminfo32, uap->buf,
|
|
|
|
sizeof(u32.shminfo32));
|
|
|
|
break;
|
|
|
|
case SHM_INFO:
|
|
|
|
CP(u.shm_info, u32.shm_info32, used_ids);
|
|
|
|
CP(u.shm_info, u32.shm_info32, shm_rss);
|
|
|
|
CP(u.shm_info, u32.shm_info32, shm_tot);
|
|
|
|
CP(u.shm_info, u32.shm_info32, shm_swp);
|
|
|
|
CP(u.shm_info, u32.shm_info32, swap_attempts);
|
|
|
|
CP(u.shm_info, u32.shm_info32, swap_successes);
|
|
|
|
error = copyout(&u32.shm_info32, uap->buf,
|
|
|
|
sizeof(u32.shm_info32));
|
|
|
|
break;
|
|
|
|
case SHM_STAT:
|
|
|
|
case IPC_STAT:
|
2018-03-27 18:05:51 +00:00
|
|
|
memset(&u32.shmid_ds32, 0, sizeof(u32.shmid_ds32));
|
2010-03-19 11:04:42 +00:00
|
|
|
freebsd32_ipcperm_old_out(&u.shmid_ds.shm_perm,
|
|
|
|
&u32.shmid_ds32.shm_perm);
|
|
|
|
if (u.shmid_ds.shm_segsz > INT32_MAX)
|
|
|
|
u32.shmid_ds32.shm_segsz = INT32_MAX;
|
|
|
|
else
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_segsz);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_lpid);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_cpid);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_nattch);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_atime);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_dtime);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_ctime);
|
|
|
|
u32.shmid_ds32.shm_internal = 0;
|
|
|
|
error = copyout(&u32.shmid_ds32, uap->buf,
|
|
|
|
sizeof(u32.shmid_ds32));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (error) {
|
|
|
|
/* Invalidate the return value */
|
|
|
|
td->td_retval[0] = -1;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int
|
|
|
|
freebsd32_shmctl(struct thread *td, struct freebsd32_shmctl_args *uap)
|
|
|
|
{
|
2015-07-02 19:14:30 +00:00
|
|
|
int error;
|
2010-03-19 11:04:42 +00:00
|
|
|
union {
|
|
|
|
struct shmid_ds shmid_ds;
|
|
|
|
struct shm_info shm_info;
|
|
|
|
struct shminfo shminfo;
|
|
|
|
} u;
|
|
|
|
union {
|
|
|
|
struct shmid_ds32 shmid_ds32;
|
|
|
|
struct shm_info32 shm_info32;
|
|
|
|
struct shminfo32 shminfo32;
|
|
|
|
} u32;
|
|
|
|
size_t sz;
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
if (uap->cmd == IPC_SET) {
|
|
|
|
if ((error = copyin(uap->buf, &u32.shmid_ds32,
|
|
|
|
sizeof(u32.shmid_ds32))))
|
|
|
|
goto done;
|
|
|
|
freebsd32_ipcperm_in(&u32.shmid_ds32.shm_perm,
|
|
|
|
&u.shmid_ds.shm_perm);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_segsz);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_lpid);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_cpid);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_nattch);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_atime);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_dtime);
|
|
|
|
CP(u32.shmid_ds32, u.shmid_ds, shm_ctime);
|
|
|
|
}
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
error = kern_shmctl(td, uap->shmid, uap->cmd, (void *)&u, &sz);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2010-03-19 11:04:42 +00:00
|
|
|
/* Cases in which we need to copyout */
|
|
|
|
switch (uap->cmd) {
|
|
|
|
case IPC_INFO:
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmmax);
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmmin);
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmmni);
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmseg);
|
|
|
|
CP(u.shminfo, u32.shminfo32, shmall);
|
|
|
|
error = copyout(&u32.shminfo32, uap->buf,
|
|
|
|
sizeof(u32.shminfo32));
|
|
|
|
break;
|
|
|
|
case SHM_INFO:
|
|
|
|
CP(u.shm_info, u32.shm_info32, used_ids);
|
|
|
|
CP(u.shm_info, u32.shm_info32, shm_rss);
|
|
|
|
CP(u.shm_info, u32.shm_info32, shm_tot);
|
|
|
|
CP(u.shm_info, u32.shm_info32, shm_swp);
|
|
|
|
CP(u.shm_info, u32.shm_info32, swap_attempts);
|
|
|
|
CP(u.shm_info, u32.shm_info32, swap_successes);
|
|
|
|
error = copyout(&u32.shm_info32, uap->buf,
|
|
|
|
sizeof(u32.shm_info32));
|
|
|
|
break;
|
|
|
|
case SHM_STAT:
|
|
|
|
case IPC_STAT:
|
|
|
|
freebsd32_ipcperm_out(&u.shmid_ds.shm_perm,
|
|
|
|
&u32.shmid_ds32.shm_perm);
|
|
|
|
if (u.shmid_ds.shm_segsz > INT32_MAX)
|
|
|
|
u32.shmid_ds32.shm_segsz = INT32_MAX;
|
|
|
|
else
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_segsz);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_lpid);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_cpid);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_nattch);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_atime);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_dtime);
|
|
|
|
CP(u.shmid_ds, u32.shmid_ds32, shm_ctime);
|
|
|
|
error = copyout(&u32.shmid_ds32, uap->buf,
|
|
|
|
sizeof(u32.shmid_ds32));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (error) {
|
|
|
|
/* Invalidate the return value */
|
|
|
|
td->td_retval[0] = -1;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(COMPAT_FREEBSD4) || defined(COMPAT_FREEBSD5) || \
|
|
|
|
defined(COMPAT_FREEBSD6) || defined(COMPAT_FREEBSD7)
|
|
|
|
|
2009-06-24 21:10:52 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
|
|
|
struct freebsd7_shmctl_args {
|
|
|
|
int shmid;
|
|
|
|
int cmd;
|
|
|
|
struct shmid_ds_old *buf;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
int
|
2015-03-21 15:01:19 +00:00
|
|
|
freebsd7_shmctl(struct thread *td, struct freebsd7_shmctl_args *uap)
|
2009-06-24 21:10:52 +00:00
|
|
|
{
|
2015-07-02 19:14:30 +00:00
|
|
|
int error;
|
2009-06-24 21:10:52 +00:00
|
|
|
struct shmid_ds_old old;
|
|
|
|
struct shmid_ds buf;
|
|
|
|
size_t bufsz;
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2009-06-24 21:10:52 +00:00
|
|
|
/*
|
|
|
|
* The only reason IPC_INFO, SHM_INFO, SHM_STAT exists is to support
|
|
|
|
* Linux binaries. If we see the call come through the FreeBSD ABI,
|
|
|
|
* return an error back to the user since we do not to support this.
|
|
|
|
*/
|
|
|
|
if (uap->cmd == IPC_INFO || uap->cmd == SHM_INFO ||
|
|
|
|
uap->cmd == SHM_STAT)
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
/* IPC_SET needs to copyin the buffer before calling kern_shmctl */
|
|
|
|
if (uap->cmd == IPC_SET) {
|
|
|
|
if ((error = copyin(uap->buf, &old, sizeof(old))))
|
|
|
|
goto done;
|
|
|
|
ipcperm_old2new(&old.shm_perm, &buf.shm_perm);
|
|
|
|
CP(old, buf, shm_segsz);
|
|
|
|
CP(old, buf, shm_lpid);
|
|
|
|
CP(old, buf, shm_cpid);
|
|
|
|
CP(old, buf, shm_nattch);
|
|
|
|
CP(old, buf, shm_atime);
|
|
|
|
CP(old, buf, shm_dtime);
|
|
|
|
CP(old, buf, shm_ctime);
|
|
|
|
}
|
2015-07-02 19:14:30 +00:00
|
|
|
|
2009-06-24 21:10:52 +00:00
|
|
|
error = kern_shmctl(td, uap->shmid, uap->cmd, (void *)&buf, &bufsz);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* Cases in which we need to copyout */
|
|
|
|
switch (uap->cmd) {
|
|
|
|
case IPC_STAT:
|
2018-03-27 18:05:51 +00:00
|
|
|
memset(&old, 0, sizeof(old));
|
2009-06-24 21:10:52 +00:00
|
|
|
ipcperm_new2old(&buf.shm_perm, &old.shm_perm);
|
|
|
|
if (buf.shm_segsz > INT_MAX)
|
|
|
|
old.shm_segsz = INT_MAX;
|
|
|
|
else
|
|
|
|
CP(buf, old, shm_segsz);
|
|
|
|
CP(buf, old, shm_lpid);
|
|
|
|
CP(buf, old, shm_cpid);
|
|
|
|
if (buf.shm_nattch > SHRT_MAX)
|
|
|
|
old.shm_nattch = SHRT_MAX;
|
|
|
|
else
|
|
|
|
CP(buf, old, shm_nattch);
|
|
|
|
CP(buf, old, shm_atime);
|
|
|
|
CP(buf, old, shm_dtime);
|
|
|
|
CP(buf, old, shm_ctime);
|
|
|
|
old.shm_internal = NULL;
|
|
|
|
error = copyout(&old, uap->buf, sizeof(old));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (error) {
|
|
|
|
/* Invalidate the return value */
|
|
|
|
td->td_retval[0] = -1;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* COMPAT_FREEBSD4 || COMPAT_FREEBSD5 || COMPAT_FREEBSD6 ||
|
|
|
|
COMPAT_FREEBSD7 */
|
|
|
|
|
2000-12-01 08:57:47 +00:00
|
|
|
static int
|
|
|
|
sysvshm_modload(struct module *module, int cmd, void *arg)
|
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case MOD_LOAD:
|
2010-03-19 11:04:42 +00:00
|
|
|
error = shminit();
|
|
|
|
if (error != 0)
|
|
|
|
shmunload();
|
2000-12-01 08:57:47 +00:00
|
|
|
break;
|
|
|
|
case MOD_UNLOAD:
|
|
|
|
error = shmunload();
|
|
|
|
break;
|
|
|
|
case MOD_SHUTDOWN:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return (error);
|
1994-09-13 14:47:38 +00:00
|
|
|
}
|
2000-12-01 08:57:47 +00:00
|
|
|
|
2001-01-14 18:04:30 +00:00
|
|
|
static moduledata_t sysvshm_mod = {
|
|
|
|
"sysvshm",
|
2000-12-01 08:57:47 +00:00
|
|
|
&sysvshm_modload,
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
2009-06-24 13:35:38 +00:00
|
|
|
DECLARE_MODULE(sysvshm, sysvshm_mod, SI_SUB_SYSV_SHM, SI_ORDER_FIRST);
|
2001-01-14 18:04:30 +00:00
|
|
|
MODULE_VERSION(sysvshm, 1);
|