mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-25 11:37:56 +00:00
a0240e2cb0
environment. This includes support for multiple KSEs and KSEGs. The ability to create more than 1 KSE via pthread_setconcurrency() is in the works as well as support for PTHREAD_SCOPE_SYSTEM threads. Those should come shortly. There are still some known issues which davidxu and I are working on, but it'll make it easier for us by committing what we have. This library now passes all of the ACE tests that libc_r passes with the exception of one. It also seems to work OK with KDE including konqueror, kwrite, etc. I haven't been able to get mozilla to run due to lack of java plugin, so I'd be interested to see how it works with that. Reviewed by: davidxu
259 lines
5.3 KiB
C
259 lines
5.3 KiB
C
/*
|
|
* Copyright (C) 2000 Jason Evans <jasone@freebsd.org>.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice(s), this list of conditions and the following disclaimer as
|
|
* the first lines of this file unmodified other than the possible
|
|
* addition of one or more copyright notices.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice(s), this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER(S) ``AS IS'' AND ANY
|
|
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) BE
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
|
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
* $FreeBSD$
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <errno.h>
|
|
#include <semaphore.h>
|
|
#include "namespace.h"
|
|
#include <pthread.h>
|
|
#include "un-namespace.h"
|
|
#include "thr_private.h"
|
|
|
|
#define _SEM_CHECK_VALIDITY(sem) \
|
|
if ((*(sem))->magic != SEM_MAGIC) { \
|
|
errno = EINVAL; \
|
|
retval = -1; \
|
|
goto RETURN; \
|
|
}
|
|
|
|
__weak_reference(_sem_init, sem_init);
|
|
__weak_reference(_sem_destroy, sem_destroy);
|
|
__weak_reference(_sem_open, sem_open);
|
|
__weak_reference(_sem_close, sem_close);
|
|
__weak_reference(_sem_unlink, sem_unlink);
|
|
__weak_reference(_sem_wait, sem_wait);
|
|
__weak_reference(_sem_trywait, sem_trywait);
|
|
__weak_reference(_sem_post, sem_post);
|
|
__weak_reference(_sem_getvalue, sem_getvalue);
|
|
|
|
|
|
int
|
|
_sem_init(sem_t *sem, int pshared, unsigned int value)
|
|
{
|
|
int retval;
|
|
|
|
/*
|
|
* Range check the arguments.
|
|
*/
|
|
if (pshared != 0) {
|
|
/*
|
|
* The user wants a semaphore that can be shared among
|
|
* processes, which this implementation can't do. Sounds like a
|
|
* permissions problem to me (yeah right).
|
|
*/
|
|
errno = EPERM;
|
|
retval = -1;
|
|
goto RETURN;
|
|
}
|
|
|
|
if (value > SEM_VALUE_MAX) {
|
|
errno = EINVAL;
|
|
retval = -1;
|
|
goto RETURN;
|
|
}
|
|
|
|
*sem = (sem_t)malloc(sizeof(struct sem));
|
|
if (*sem == NULL) {
|
|
errno = ENOSPC;
|
|
retval = -1;
|
|
goto RETURN;
|
|
}
|
|
|
|
/*
|
|
* Initialize the semaphore.
|
|
*/
|
|
if (_pthread_mutex_init(&(*sem)->lock, NULL) != 0) {
|
|
free(*sem);
|
|
errno = ENOSPC;
|
|
retval = -1;
|
|
goto RETURN;
|
|
}
|
|
|
|
if (_pthread_cond_init(&(*sem)->gtzero, NULL) != 0) {
|
|
_pthread_mutex_destroy(&(*sem)->lock);
|
|
free(*sem);
|
|
errno = ENOSPC;
|
|
retval = -1;
|
|
goto RETURN;
|
|
}
|
|
|
|
(*sem)->count = (u_int32_t)value;
|
|
(*sem)->nwaiters = 0;
|
|
(*sem)->magic = SEM_MAGIC;
|
|
|
|
retval = 0;
|
|
RETURN:
|
|
return (retval);
|
|
}
|
|
|
|
int
|
|
_sem_destroy(sem_t *sem)
|
|
{
|
|
int retval;
|
|
|
|
_SEM_CHECK_VALIDITY(sem);
|
|
|
|
/* Make sure there are no waiters. */
|
|
_pthread_mutex_lock(&(*sem)->lock);
|
|
if ((*sem)->nwaiters > 0) {
|
|
_pthread_mutex_unlock(&(*sem)->lock);
|
|
errno = EBUSY;
|
|
retval = -1;
|
|
goto RETURN;
|
|
}
|
|
_pthread_mutex_unlock(&(*sem)->lock);
|
|
|
|
_pthread_mutex_destroy(&(*sem)->lock);
|
|
_pthread_cond_destroy(&(*sem)->gtzero);
|
|
(*sem)->magic = 0;
|
|
|
|
free(*sem);
|
|
|
|
retval = 0;
|
|
RETURN:
|
|
return (retval);
|
|
}
|
|
|
|
sem_t *
|
|
_sem_open(const char *name, int oflag, ...)
|
|
{
|
|
errno = ENOSYS;
|
|
return (SEM_FAILED);
|
|
}
|
|
|
|
int
|
|
_sem_close(sem_t *sem)
|
|
{
|
|
errno = ENOSYS;
|
|
return (-1);
|
|
}
|
|
|
|
int
|
|
_sem_unlink(const char *name)
|
|
{
|
|
errno = ENOSYS;
|
|
return (-1);
|
|
}
|
|
|
|
int
|
|
_sem_wait(sem_t *sem)
|
|
{
|
|
struct pthread *curthread = _get_curthread();
|
|
int retval;
|
|
|
|
_thr_enter_cancellation_point(curthread);
|
|
|
|
_SEM_CHECK_VALIDITY(sem);
|
|
|
|
_pthread_mutex_lock(&(*sem)->lock);
|
|
|
|
while ((*sem)->count == 0) {
|
|
(*sem)->nwaiters++;
|
|
_pthread_cond_wait(&(*sem)->gtzero, &(*sem)->lock);
|
|
(*sem)->nwaiters--;
|
|
}
|
|
(*sem)->count--;
|
|
|
|
_pthread_mutex_unlock(&(*sem)->lock);
|
|
|
|
retval = 0;
|
|
RETURN:
|
|
_thr_leave_cancellation_point(curthread);
|
|
return (retval);
|
|
}
|
|
|
|
int
|
|
_sem_trywait(sem_t *sem)
|
|
{
|
|
int retval;
|
|
|
|
_SEM_CHECK_VALIDITY(sem);
|
|
|
|
_pthread_mutex_lock(&(*sem)->lock);
|
|
|
|
if ((*sem)->count > 0) {
|
|
(*sem)->count--;
|
|
retval = 0;
|
|
} else {
|
|
errno = EAGAIN;
|
|
retval = -1;
|
|
}
|
|
|
|
_pthread_mutex_unlock(&(*sem)->lock);
|
|
|
|
RETURN:
|
|
return (retval);
|
|
}
|
|
|
|
int
|
|
_sem_post(sem_t *sem)
|
|
{
|
|
kse_critical_t crit;
|
|
int retval;
|
|
|
|
_SEM_CHECK_VALIDITY(sem);
|
|
|
|
/*
|
|
* sem_post() is required to be safe to call from within signal
|
|
* handlers. Thus, we must enter a critical region.
|
|
*/
|
|
crit = _kse_critical_enter();
|
|
|
|
_pthread_mutex_lock(&(*sem)->lock);
|
|
|
|
(*sem)->count++;
|
|
if ((*sem)->nwaiters > 0)
|
|
_pthread_cond_signal(&(*sem)->gtzero);
|
|
|
|
_pthread_mutex_unlock(&(*sem)->lock);
|
|
|
|
_kse_critical_leave(crit);
|
|
retval = 0;
|
|
RETURN:
|
|
return (retval);
|
|
}
|
|
|
|
int
|
|
_sem_getvalue(sem_t *sem, int *sval)
|
|
{
|
|
int retval;
|
|
|
|
_SEM_CHECK_VALIDITY(sem);
|
|
|
|
_pthread_mutex_lock(&(*sem)->lock);
|
|
*sval = (int)(*sem)->count;
|
|
_pthread_mutex_unlock(&(*sem)->lock);
|
|
|
|
retval = 0;
|
|
RETURN:
|
|
return (retval);
|
|
}
|