netbsd32_sem.c revision 1.12
1/* $NetBSD: netbsd32_sem.c,v 1.12 2019/02/03 03:20:23 thorpej Exp $ */ 2 3/* 4 * Copyright (c) 2006 The NetBSD Foundation. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26 * POSSIBILITY OF SUCH DAMAGE. 27 */ 28 29#include <sys/cdefs.h> 30__KERNEL_RCSID(0, "$NetBSD: netbsd32_sem.c,v 1.12 2019/02/03 03:20:23 thorpej Exp $"); 31 32#include <sys/types.h> 33#include <sys/param.h> 34#include <sys/systm.h> 35#include <sys/kernel.h> 36#include <sys/dirent.h> 37#include <sys/condvar.h> 38#include <sys/ksem.h> 39#include <sys/mount.h> 40#include <sys/proc.h> 41#include <sys/syscallargs.h> 42 43#include <compat/netbsd32/netbsd32.h> 44#include <compat/netbsd32/netbsd32_syscallargs.h> 45#include <compat/netbsd32/netbsd32_conv.h> 46 47static int 48netbsd32_ksem_copyin(const void *src, void *dst, size_t size) 49{ 50 intptr_t *argp = dst; 51 netbsd32_intptr_t arg32; 52 int error; 53 54 KASSERT(size == sizeof(intptr_t)); 55 56 if ((error = copyin(src, &arg32, sizeof(arg32))) != 0) 57 return error; 58 *argp = arg32; 59 return 0; 60} 61 62static int 63netbsd32_ksem_copyout(const void *src, void *dst, size_t size) 64{ 65 const intptr_t *idp = src; 66 netbsd32_intptr_t id32, *outidp = dst; 67 68 KASSERT(size == sizeof(intptr_t)); 69 70 /* Returning a kernel pointer to userspace sucks badly :-( */ 71 /* (Luckily, it's not actually a pointer. --thorpej */ 72 id32 = (netbsd32_intptr_t)*idp; 73 return copyout(&id32, outidp, sizeof(id32)); 74} 75 76int 77netbsd32__ksem_init(struct lwp *l, const struct netbsd32__ksem_init_args *uap, register_t *retval) 78{ 79 /* { 80 syscallarg(unsigned int) value; 81 syscallarg(netbsd32_semidp_t) idp; 82 } */ 83 84 return do_ksem_init(l, SCARG(uap, value), 85 SCARG_P32(uap, idp), netbsd32_ksem_copyin, netbsd32_ksem_copyout); 86} 87 88int 89netbsd32__ksem_open(struct lwp *l, const struct netbsd32__ksem_open_args *uap, register_t *retval) 90{ 91 /* { 92 syscallarg(const netbsd32_charp) name; 93 syscallarg(int) oflag; 94 syscallarg(mode_t) mode; 95 syscallarg(unsigned int) value; 96 syscallarg(netbsd32_semidp_t) idp; 97 } */ 98 99 return do_ksem_open(l, SCARG_P32(uap, name), 100 SCARG(uap, oflag), SCARG(uap, mode), SCARG(uap, value), 101 SCARG_P32(uap, idp), netbsd32_ksem_copyout); 102} 103 104int 105netbsd32__ksem_unlink(struct lwp *l, const struct netbsd32__ksem_unlink_args *uap, register_t *retval) 106{ 107 /* { 108 syscallarg(const netbsd32_charp) name; 109 } */ 110 struct sys__ksem_unlink_args ua; 111 112 NETBSD32TOP_UAP(name, const char); 113 return sys__ksem_unlink(l, &ua, retval); 114} 115 116int 117netbsd32__ksem_close(struct lwp *l, const struct netbsd32__ksem_close_args *uap, register_t *retval) 118{ 119 /* { 120 syscallarg(netbsd32_intptr_t) id; 121 } */ 122 struct sys__ksem_close_args ua; 123 124 NETBSD32TOX_UAP(id, intptr_t); 125 return sys__ksem_close(l, &ua, retval); 126} 127 128int 129netbsd32__ksem_post(struct lwp *l, const struct netbsd32__ksem_post_args *uap, register_t *retval) 130{ 131 /* { 132 syscallarg(netbsd32_intptr_t) id; 133 } */ 134 struct sys__ksem_post_args ua; 135 136 NETBSD32TOX_UAP(id, intptr_t); 137 return sys__ksem_post(l, &ua, retval); 138} 139 140int 141netbsd32__ksem_wait(struct lwp *l, const struct netbsd32__ksem_wait_args *uap, register_t *retval) 142{ 143 /* { 144 syscallarg(netbsd32_intptr_t) id; 145 } */ 146 147 return do_ksem_wait(l, SCARG(uap, id), false, NULL); 148} 149 150int 151netbsd32__ksem_trywait(struct lwp *l, const struct netbsd32__ksem_trywait_args *uap, register_t *retval) 152{ 153 /* { 154 syscallarg(netbsd32_intptr_t) id; 155 } */ 156 157 return do_ksem_wait(l, SCARG(uap, id), true, NULL); 158} 159 160int 161netbsd32__ksem_timedwait(struct lwp *l, const struct netbsd32__ksem_timedwait_args *uap, 162 register_t *retval) 163{ 164 /* { 165 intptr_t id; 166 const netbsd32_timespecp_t abstime; 167 } */ 168 struct netbsd32_timespec ts32; 169 struct timespec ts; 170 intptr_t id; 171 int error; 172 173 id = SCARG(uap, id); 174 175 error = copyin(SCARG_P32(uap, abstime), &ts32, sizeof(ts32)); 176 if (error != 0) 177 return error; 178 netbsd32_to_timespec(&ts32, &ts); 179 180 if (ts.tv_sec < 0 || ts.tv_nsec < 0 || ts.tv_nsec >= 1000000000) 181 return EINVAL; 182 183 error = do_ksem_wait(l, id, false, &ts); 184 if (error == EWOULDBLOCK) 185 error = ETIMEDOUT; 186 return error; 187} 188 189int 190netbsd32__ksem_destroy(struct lwp *l, const struct netbsd32__ksem_destroy_args *uap, register_t *retval) 191{ 192 /* { 193 syscallarg(netbsd32_intptr_t) id; 194 } */ 195 struct sys__ksem_destroy_args ua; 196 197 NETBSD32TOX_UAP(id, intptr_t); 198 return sys__ksem_destroy(l, &ua, retval); 199} 200 201int 202netbsd32__ksem_getvalue(struct lwp *l, const struct netbsd32__ksem_getvalue_args *uap, register_t *retval) 203{ 204 /* { 205 syscallarg(netbsd32_intptr_t) id; 206 syscallarg(netbsd32_intp) value; 207 } */ 208 struct sys__ksem_getvalue_args ua; 209 210 NETBSD32TOX_UAP(id, intptr_t); 211 NETBSD32TOP_UAP(value, unsigned int); 212 return sys__ksem_getvalue(l, &ua, retval); 213} 214