2014-09-23 15:11:47 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* mm/shm/shmat.c
|
|
|
|
*
|
2021-02-08 13:50:10 +01:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2014-09-23 15:11:47 +02:00
|
|
|
*
|
2021-02-08 13:50:10 +01:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2014-09-23 15:11:47 +02:00
|
|
|
*
|
2021-02-08 13:50:10 +01:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2014-09-23 15:11:47 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <sys/shm.h>
|
2021-06-08 20:00:55 +02:00
|
|
|
#include <assert.h>
|
2022-11-16 13:30:18 +01:00
|
|
|
#include <debug.h>
|
2014-09-23 15:11:47 +02:00
|
|
|
#include <errno.h>
|
|
|
|
|
2014-09-24 00:07:12 +02:00
|
|
|
#include <nuttx/sched.h>
|
|
|
|
#include <nuttx/arch.h>
|
|
|
|
#include <nuttx/pgalloc.h>
|
2022-04-12 14:34:50 +02:00
|
|
|
#include <nuttx/mm/map.h>
|
2014-09-24 00:07:12 +02:00
|
|
|
|
|
|
|
#include "shm/shm.h"
|
|
|
|
|
2014-09-23 15:11:47 +02:00
|
|
|
#ifdef CONFIG_MM_SHM
|
|
|
|
|
2022-04-12 14:34:50 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int munmap_shm(FAR struct task_group_s *group,
|
|
|
|
FAR struct mm_map_entry_s *entry,
|
|
|
|
FAR void *start,
|
|
|
|
size_t length)
|
|
|
|
{
|
2023-01-11 09:26:40 +01:00
|
|
|
FAR void *shmaddr = entry->vaddr;
|
2022-04-12 14:34:50 +02:00
|
|
|
int shmid = entry->priv.i;
|
2023-01-10 14:03:04 +01:00
|
|
|
FAR struct shm_region_s *region;
|
|
|
|
pid_t pid;
|
|
|
|
unsigned int npages;
|
|
|
|
int ret;
|
2022-04-12 14:34:50 +02:00
|
|
|
|
2023-01-10 14:03:04 +01:00
|
|
|
/* Remove the entry from the process' mappings */
|
|
|
|
|
|
|
|
ret = mm_map_remove(get_group_mm(group), entry);
|
|
|
|
if (ret < 0)
|
2022-04-12 14:34:50 +02:00
|
|
|
{
|
2023-01-10 14:03:04 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the region associated with the shmid */
|
|
|
|
|
|
|
|
region = &g_shminfo.si_region[shmid];
|
|
|
|
DEBUGASSERT((region->sr_flags & SRFLAG_INUSE) != 0);
|
|
|
|
|
|
|
|
/* Get exclusive access to the region data structure */
|
|
|
|
|
|
|
|
ret = nxmutex_lock(®ion->sr_lock);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
shmerr("ERROR: nxsem_wait failed: %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (group)
|
|
|
|
{
|
|
|
|
/* Free the virtual address space */
|
|
|
|
|
2023-01-11 09:26:40 +01:00
|
|
|
vm_release_region(get_group_mm(group), shmaddr,
|
|
|
|
region->sr_ds.shm_segsz);
|
2023-01-10 14:03:04 +01:00
|
|
|
|
|
|
|
/* Convert the region size to pages */
|
|
|
|
|
|
|
|
npages = MM_NPAGES(region->sr_ds.shm_segsz);
|
|
|
|
|
|
|
|
/* Detach, i.e, unmap, on shared memory region from a user virtual
|
|
|
|
* address.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = up_shmdt((uintptr_t)shmaddr, npages);
|
|
|
|
|
|
|
|
/* Get pid of this process */
|
|
|
|
|
|
|
|
pid = group->tg_pid;
|
2022-04-12 14:34:50 +02:00
|
|
|
}
|
2023-01-10 14:03:04 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
/* We are in the middle of process destruction and don't know the
|
|
|
|
* context
|
|
|
|
*/
|
|
|
|
|
|
|
|
pid = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Decrement the count of processes attached to this region.
|
|
|
|
* If the count decrements to zero and there is a pending unlink,
|
|
|
|
* then destroy the shared memory region now and stop any further
|
|
|
|
* operations on it.
|
|
|
|
*/
|
|
|
|
|
|
|
|
DEBUGASSERT(region->sr_ds.shm_nattch > 0);
|
|
|
|
if (region->sr_ds.shm_nattch <= 1)
|
|
|
|
{
|
|
|
|
region->sr_ds.shm_nattch = 0;
|
|
|
|
if ((region->sr_flags & SRFLAG_UNLINKED) != 0)
|
|
|
|
{
|
|
|
|
shm_destroy(shmid);
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Just decrement the number of processes attached to the shared
|
|
|
|
* memory region.
|
|
|
|
*/
|
|
|
|
|
|
|
|
region->sr_ds.shm_nattch--;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Save the process ID of the last operation */
|
|
|
|
|
|
|
|
region->sr_ds.shm_lpid = pid;
|
|
|
|
|
|
|
|
/* Save the time of the last shmdt() */
|
|
|
|
|
|
|
|
region->sr_ds.shm_dtime = time(NULL);
|
|
|
|
|
|
|
|
/* Release our lock on the entry */
|
|
|
|
|
|
|
|
nxmutex_unlock(®ion->sr_lock);
|
2022-04-12 14:34:50 +02:00
|
|
|
|
2023-01-10 14:03:04 +01:00
|
|
|
return ret;
|
2022-04-12 14:34:50 +02:00
|
|
|
}
|
|
|
|
|
2014-09-23 15:11:47 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: shmat
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The shmat() function attaches the shared memory segment associated with
|
|
|
|
* the shared memory identifier specified by shmid to the address space of
|
|
|
|
* the calling process. The segment is attached at the address specified
|
|
|
|
* by one of the following criteria:
|
|
|
|
*
|
|
|
|
* - If shmaddr is a null pointer, the segment is attached at the first
|
|
|
|
* available address as selected by the system.
|
|
|
|
* - If shmaddr is not a null pointer and (shmflg & SHM_RND) is non-
|
|
|
|
* zero, the segment is attached at the address given by
|
|
|
|
* (shmaddr - ((uintptr_t)shmaddr % SHMLBA)).
|
|
|
|
* - If shmaddr is not a null pointer and (shmflg & SHM_RND) is 0, the
|
|
|
|
* segment is attached at the address given by shmaddr.
|
|
|
|
* - The segment is attached for reading if (shmflg & SHM_RDONLY) is
|
|
|
|
* non-zero and the calling process has read permission; otherwise, if
|
|
|
|
* it is 0 and the calling process has read and write permission, the
|
|
|
|
* segment is attached for reading and writing.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* shmid - Shared memory identifier
|
|
|
|
* smaddr - Determines mapping of the shared memory region
|
|
|
|
* shmflg - See SHM_* definitions in include/sys/shm.h. Only SHM_RDONLY
|
|
|
|
* and SHM_RND are supported.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Upon successful completion, shmat() will increment the value of
|
|
|
|
* shm_nattch in the data structure associated with the shared memory ID
|
2014-09-24 00:07:12 +02:00
|
|
|
* of the attached shared memory segment and return the segment's start
|
|
|
|
* address.
|
2014-09-23 15:11:47 +02:00
|
|
|
*
|
|
|
|
* Otherwise, the shared memory segment will not be attached, shmat() will
|
|
|
|
* return -1, and errno will be set to indicate the error.
|
|
|
|
*
|
|
|
|
* - EACCES
|
|
|
|
* Operation permission is denied to the calling process
|
|
|
|
* - EINVAL
|
|
|
|
* The value of shmid is not a valid shared memory identifier, the
|
|
|
|
* shmaddr is not a null pointer, and the value of
|
|
|
|
* (shmaddr -((uintptr_t)shmaddr % SHMLBA)) is an illegal address for
|
|
|
|
* attaching shared memory; or the shmaddr is not a null pointer,
|
|
|
|
* (shmflg & SHM_RND) is 0, and the value of shmaddr is an illegal
|
|
|
|
* address for attaching shared memory.
|
|
|
|
* - EMFILE
|
|
|
|
* The number of shared memory segments attached to the calling
|
|
|
|
* process would exceed the system-imposed limit.
|
|
|
|
* - ENOMEM
|
|
|
|
* The available data space is not large enough to accommodate the
|
|
|
|
* shared memory segment.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
FAR void *shmat(int shmid, FAR const void *shmaddr, int shmflg)
|
|
|
|
{
|
2014-09-24 00:07:12 +02:00
|
|
|
FAR struct shm_region_s *region;
|
|
|
|
FAR struct task_group_s *group;
|
|
|
|
FAR struct tcb_s *tcb;
|
2022-11-17 11:03:22 +01:00
|
|
|
FAR void *vaddr;
|
2014-09-24 00:07:12 +02:00
|
|
|
unsigned int npages;
|
|
|
|
int ret;
|
2022-04-12 14:34:50 +02:00
|
|
|
struct mm_map_entry_s entry;
|
2014-09-24 00:07:12 +02:00
|
|
|
|
|
|
|
/* Get the region associated with the shmid */
|
|
|
|
|
|
|
|
DEBUGASSERT(shmid >= 0 && shmid < CONFIG_ARCH_SHM_MAXREGIONS);
|
|
|
|
region = &g_shminfo.si_region[shmid];
|
|
|
|
DEBUGASSERT((region->sr_flags & SRFLAG_INUSE) != 0);
|
|
|
|
|
|
|
|
/* Get the TCB and group containing our virtual memory allocator */
|
|
|
|
|
2020-05-09 16:04:45 +02:00
|
|
|
tcb = nxsched_self();
|
2014-09-24 00:07:12 +02:00
|
|
|
DEBUGASSERT(tcb && tcb->group);
|
2022-04-12 14:34:50 +02:00
|
|
|
|
2014-09-24 00:07:12 +02:00
|
|
|
group = tcb->group;
|
|
|
|
|
|
|
|
/* Get exclusive access to the region data structure */
|
|
|
|
|
2022-09-06 08:18:45 +02:00
|
|
|
ret = nxmutex_lock(®ion->sr_lock);
|
2014-09-24 00:07:12 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2017-10-04 23:22:27 +02:00
|
|
|
shmerr("ERROR: nxsem_wait failed: %d\n", ret);
|
|
|
|
goto errout_with_ret;
|
2014-09-24 00:07:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Set aside a virtual address space to span this physical region */
|
|
|
|
|
2023-01-11 09:26:40 +01:00
|
|
|
vaddr = vm_alloc_region(get_group_mm(group), NULL,
|
|
|
|
region->sr_ds.shm_segsz);
|
2022-11-17 11:03:22 +01:00
|
|
|
if (vaddr == NULL)
|
2014-09-24 00:07:12 +02:00
|
|
|
{
|
2023-01-11 09:26:40 +01:00
|
|
|
shmerr("ERROR: vm_alloc_regioon() failed\n");
|
2014-09-24 00:07:12 +02:00
|
|
|
ret = -ENOMEM;
|
2022-09-06 08:18:45 +02:00
|
|
|
goto errout_with_lock;
|
2014-09-24 00:07:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Convert the region size to pages */
|
|
|
|
|
2019-01-26 17:11:06 +01:00
|
|
|
npages = MM_NPAGES(region->sr_ds.shm_segsz);
|
2014-09-24 00:07:12 +02:00
|
|
|
|
|
|
|
/* Attach, i.e, map, on shared memory region to the user virtual address. */
|
|
|
|
|
2022-11-17 11:03:22 +01:00
|
|
|
ret = up_shmat(region->sr_pages, npages, (uintptr_t)vaddr);
|
2014-09-24 00:07:12 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2016-06-12 17:46:23 +02:00
|
|
|
shmerr("ERROR: up_shmat() failed\n");
|
2014-09-24 00:07:12 +02:00
|
|
|
goto errout_with_vaddr;
|
|
|
|
}
|
|
|
|
|
2022-04-12 14:34:50 +02:00
|
|
|
/* Save the virtual address of the region. We will need that in shmdt()
|
2014-09-24 00:07:12 +02:00
|
|
|
* to do the reverse lookup: Give the virtual address of the region to
|
|
|
|
* detach, we need to get the region table index.
|
|
|
|
*/
|
|
|
|
|
2022-04-12 14:34:50 +02:00
|
|
|
entry.vaddr = vaddr;
|
|
|
|
entry.length = region->sr_ds.shm_segsz;
|
|
|
|
entry.offset = 0;
|
|
|
|
entry.munmap = munmap_shm;
|
|
|
|
entry.priv.i = shmid;
|
|
|
|
|
|
|
|
ret = mm_map_add(&entry);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
shmerr("ERROR: mm_map_add() failed\n");
|
|
|
|
goto errout_with_vaddr;
|
|
|
|
}
|
2014-09-24 00:07:12 +02:00
|
|
|
|
|
|
|
/* Increment the count of processes attached to this region */
|
|
|
|
|
|
|
|
region->sr_ds.shm_nattch++;
|
|
|
|
|
2017-05-11 21:35:56 +02:00
|
|
|
/* Save the process ID of the last operation */
|
2014-09-24 00:07:12 +02:00
|
|
|
|
|
|
|
region->sr_ds.shm_lpid = tcb->pid;
|
|
|
|
|
|
|
|
/* Save the time of the last shmat() */
|
|
|
|
|
|
|
|
region->sr_ds.shm_atime = time(NULL);
|
|
|
|
|
|
|
|
/* Release our lock on the entry */
|
|
|
|
|
2022-09-06 08:18:45 +02:00
|
|
|
nxmutex_unlock(®ion->sr_lock);
|
2022-11-17 11:03:22 +01:00
|
|
|
return vaddr;
|
2014-09-24 00:07:12 +02:00
|
|
|
|
|
|
|
errout_with_vaddr:
|
2023-01-11 09:26:40 +01:00
|
|
|
vm_release_region(get_group_mm(group), vaddr, region->sr_ds.shm_segsz);
|
2017-10-04 23:22:27 +02:00
|
|
|
|
2022-09-06 08:18:45 +02:00
|
|
|
errout_with_lock:
|
|
|
|
nxmutex_unlock(®ion->sr_lock);
|
2017-10-04 23:22:27 +02:00
|
|
|
|
|
|
|
errout_with_ret:
|
2014-09-24 00:07:12 +02:00
|
|
|
set_errno(-ret);
|
2014-09-23 15:11:47 +02:00
|
|
|
return (FAR void *)ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_MM_SHM */
|