bcee9c391c
Gregory Nutt has submitted the SGA and we can mograte the licenses to Apache. Signed-off-by: Alin Jerpelea <alin.jerpelea@sony.com>
189 lines
6.4 KiB
C
189 lines
6.4 KiB
C
/****************************************************************************
|
|
* mm/shm/shmat.c
|
|
*
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
* this work for additional information regarding copyright ownership. The
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
* "License"); you may not use this file except in compliance with the
|
|
* License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
* License for the specific language governing permissions and limitations
|
|
* under the License.
|
|
*
|
|
****************************************************************************/
|
|
|
|
/****************************************************************************
|
|
* Included Files
|
|
****************************************************************************/
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
#include <sys/shm.h>
|
|
#include <errno.h>
|
|
|
|
#include <nuttx/sched.h>
|
|
#include <nuttx/arch.h>
|
|
#include <nuttx/pgalloc.h>
|
|
|
|
#include "shm/shm.h"
|
|
|
|
#ifdef CONFIG_MM_SHM
|
|
|
|
/****************************************************************************
|
|
* Public Functions
|
|
****************************************************************************/
|
|
|
|
/****************************************************************************
|
|
* Name: shmat
|
|
*
|
|
* Description:
|
|
* The shmat() function attaches the shared memory segment associated with
|
|
* the shared memory identifier specified by shmid to the address space of
|
|
* the calling process. The segment is attached at the address specified
|
|
* by one of the following criteria:
|
|
*
|
|
* - If shmaddr is a null pointer, the segment is attached at the first
|
|
* available address as selected by the system.
|
|
* - If shmaddr is not a null pointer and (shmflg & SHM_RND) is non-
|
|
* zero, the segment is attached at the address given by
|
|
* (shmaddr - ((uintptr_t)shmaddr % SHMLBA)).
|
|
* - If shmaddr is not a null pointer and (shmflg & SHM_RND) is 0, the
|
|
* segment is attached at the address given by shmaddr.
|
|
* - The segment is attached for reading if (shmflg & SHM_RDONLY) is
|
|
* non-zero and the calling process has read permission; otherwise, if
|
|
* it is 0 and the calling process has read and write permission, the
|
|
* segment is attached for reading and writing.
|
|
*
|
|
* Input Parameters:
|
|
* shmid - Shared memory identifier
|
|
* smaddr - Determines mapping of the shared memory region
|
|
* shmflg - See SHM_* definitions in include/sys/shm.h. Only SHM_RDONLY
|
|
* and SHM_RND are supported.
|
|
*
|
|
* Returned Value:
|
|
* Upon successful completion, shmat() will increment the value of
|
|
* shm_nattch in the data structure associated with the shared memory ID
|
|
* of the attached shared memory segment and return the segment's start
|
|
* address.
|
|
*
|
|
* Otherwise, the shared memory segment will not be attached, shmat() will
|
|
* return -1, and errno will be set to indicate the error.
|
|
*
|
|
* - EACCES
|
|
* Operation permission is denied to the calling process
|
|
* - EINVAL
|
|
* The value of shmid is not a valid shared memory identifier, the
|
|
* shmaddr is not a null pointer, and the value of
|
|
* (shmaddr -((uintptr_t)shmaddr % SHMLBA)) is an illegal address for
|
|
* attaching shared memory; or the shmaddr is not a null pointer,
|
|
* (shmflg & SHM_RND) is 0, and the value of shmaddr is an illegal
|
|
* address for attaching shared memory.
|
|
* - EMFILE
|
|
* The number of shared memory segments attached to the calling
|
|
* process would exceed the system-imposed limit.
|
|
* - ENOMEM
|
|
* The available data space is not large enough to accommodate the
|
|
* shared memory segment.
|
|
*
|
|
****************************************************************************/
|
|
|
|
FAR void *shmat(int shmid, FAR const void *shmaddr, int shmflg)
|
|
{
|
|
FAR struct shm_region_s *region;
|
|
FAR struct task_group_s *group;
|
|
FAR struct tcb_s *tcb;
|
|
uintptr_t vaddr;
|
|
unsigned int npages;
|
|
int ret;
|
|
|
|
/* Get the region associated with the shmid */
|
|
|
|
DEBUGASSERT(shmid >= 0 && shmid < CONFIG_ARCH_SHM_MAXREGIONS);
|
|
region = &g_shminfo.si_region[shmid];
|
|
DEBUGASSERT((region->sr_flags & SRFLAG_INUSE) != 0);
|
|
|
|
/* Get the TCB and group containing our virtual memory allocator */
|
|
|
|
tcb = nxsched_self();
|
|
DEBUGASSERT(tcb && tcb->group);
|
|
group = tcb->group;
|
|
DEBUGASSERT(group->tg_shm.gs_handle != NULL &&
|
|
group->tg_shm.gs_vaddr[shmid] == 0);
|
|
|
|
/* Get exclusive access to the region data structure */
|
|
|
|
ret = nxsem_wait(®ion->sr_sem);
|
|
if (ret < 0)
|
|
{
|
|
shmerr("ERROR: nxsem_wait failed: %d\n", ret);
|
|
goto errout_with_ret;
|
|
}
|
|
|
|
/* Set aside a virtual address space to span this physical region */
|
|
|
|
vaddr = (uintptr_t)gran_alloc(group->tg_shm.gs_handle,
|
|
region->sr_ds.shm_segsz);
|
|
if (vaddr == 0)
|
|
{
|
|
shmerr("ERROR: gran_alloc() failed\n");
|
|
ret = -ENOMEM;
|
|
goto errout_with_semaphore;
|
|
}
|
|
|
|
/* Convert the region size to pages */
|
|
|
|
npages = MM_NPAGES(region->sr_ds.shm_segsz);
|
|
|
|
/* Attach, i.e, map, on shared memory region to the user virtual address. */
|
|
|
|
ret = up_shmat(region->sr_pages, npages, vaddr);
|
|
if (ret < 0)
|
|
{
|
|
shmerr("ERROR: up_shmat() failed\n");
|
|
goto errout_with_vaddr;
|
|
}
|
|
|
|
/* Save the virtual address of the region. We will need that in shmat()
|
|
* to do the reverse lookup: Give the virtual address of the region to
|
|
* detach, we need to get the region table index.
|
|
*/
|
|
|
|
group->tg_shm.gs_vaddr[shmid] = vaddr;
|
|
|
|
/* Increment the count of processes attached to this region */
|
|
|
|
region->sr_ds.shm_nattch++;
|
|
|
|
/* Save the process ID of the last operation */
|
|
|
|
region->sr_ds.shm_lpid = tcb->pid;
|
|
|
|
/* Save the time of the last shmat() */
|
|
|
|
region->sr_ds.shm_atime = time(NULL);
|
|
|
|
/* Release our lock on the entry */
|
|
|
|
nxsem_post(®ion->sr_sem);
|
|
return (FAR void *)vaddr;
|
|
|
|
errout_with_vaddr:
|
|
gran_free(group->tg_shm.gs_handle, (FAR void *)vaddr,
|
|
region->sr_ds.shm_segsz);
|
|
|
|
errout_with_semaphore:
|
|
nxsem_post(®ion->sr_sem);
|
|
|
|
errout_with_ret:
|
|
set_errno(-ret);
|
|
return (FAR void *)ERROR;
|
|
}
|
|
|
|
#endif /* CONFIG_MM_SHM */
|