+/* SPDX-License-Identifier: GPL-2.0 */
+
#include <sys/wait.h>
#include <stdio.h>
#include <inttypes.h>
#include "err.h"
#include "ipc.h"
-static int get_key(const char *config_file)
+#if (defined(__GNUC__) && defined(__i386__))
+#define get16bits(d) (*((const uint16_t *) (d)))
+#else
+#define get16bits(d) ((((uint32_t)(((const uint8_t *)(d))[1])) << 8)\
+ +(uint32_t)(((const uint8_t *)(d))[0]) )
+#endif
+
+/*
+ * SuperFastHash, by Paul Hsieh.
+ * http://www.azillionmonkeys.com/qed/hash.html
+ */
+uint32_t super_fast_hash(const uint8_t *data, uint32_t len, uint32_t hash)
{
- int ret;
-
- assert(config_file);
- ret = ftok(config_file, 'D');
- if (ret >= 0)
- return ret;
- /*
- * This happens if the user did not specify a config file, and the
- * default config file does not exist. Another (unlikely) possibility
- * is that the config file was removed between startup and this call.
- * We don't care about these corner cases too much and just return a
- * fixed key in this case.
- */
- return 0x0D55; /* no magic, this number just looks a bit like DSS */
+ uint32_t tmp;
+ int rem = len & 3;
+
+ len >>= 2;
+
+ for (;len > 0; len--) {
+ hash += get16bits (data);
+ tmp = (get16bits (data+2) << 11) ^ hash;
+ hash = (hash << 16) ^ tmp;
+ data += 2*sizeof (uint16_t);
+ hash += hash >> 11;
+ }
+
+ /* Handle end cases */
+ switch (rem) {
+ case 3:
+ hash += get16bits (data);
+ hash ^= hash << 16;
+ hash ^= data[sizeof (uint16_t)] << 18;
+ hash += hash >> 11;
+ break;
+ case 2:
+ hash += get16bits (data);
+ hash ^= hash << 11;
+ hash += hash >> 17;
+ break;
+ case 1:
+ hash += *data;
+ hash ^= hash << 10;
+ hash += hash >> 1;
+ }
+ /* Force "avalanching" of final 127 bits */
+ hash ^= hash << 3;
+ hash += hash >> 5;
+ hash ^= hash << 4;
+ hash += hash >> 17;
+ hash ^= hash << 25;
+ hash += hash >> 6;
+ return hash;
}
-static int mutex_get(int key, int flags)
+static int mutex_get(key_t key, int flags)
{
int ret;
- DSS_DEBUG_LOG(("getting semaphore 0x%x\n", key));
+ DSS_DEBUG_LOG(("getting semaphore 0x%lx\n", (long)key));
ret = semget(key, 2, flags);
if (ret < 0)
return -ERRNO_TO_DSS_ERROR(errno);
return -ERRNO_TO_DSS_ERROR(errno);
}
-static int mutex_lock(int id)
-{
- struct sembuf sops[4];
-
- DSS_DEBUG_LOG(("locking\n"));
-
- sops[0].sem_num = 0;
- sops[0].sem_op = 0;
- sops[0].sem_flg = SEM_UNDO | IPC_NOWAIT;
-
- sops[1].sem_num = 0;
- sops[1].sem_op = 1;
- sops[1].sem_flg = SEM_UNDO | IPC_NOWAIT;
-
- sops[2].sem_num = 1;
- sops[2].sem_op = 0;
- sops[2].sem_flg = SEM_UNDO | IPC_NOWAIT;
-
- sops[3].sem_num = 1;
- sops[3].sem_op = 1;
- sops[3].sem_flg = SEM_UNDO | IPC_NOWAIT;
-
- return do_semop(id, sops, 4);
-}
-
static bool mutex_is_locked(int id)
{
struct sembuf sops;
return false;
}
-int lock_dss(char *config_file)
+int lock_dss(uint32_t key)
{
- int ret, key = get_key(config_file);
+ int ret, id;
+ struct sembuf sops[4];
ret = mutex_get(key, IPC_CREAT | 0600);
if (ret < 0)
return ret;
- return mutex_lock(ret);
+ id = ret;
+
+ sops[0].sem_num = 0;
+ sops[0].sem_op = 0;
+ sops[0].sem_flg = SEM_UNDO | IPC_NOWAIT;
+
+ sops[1].sem_num = 0;
+ sops[1].sem_op = 1;
+ sops[1].sem_flg = SEM_UNDO | IPC_NOWAIT;
+
+ sops[2].sem_num = 1;
+ sops[2].sem_op = 0;
+ sops[2].sem_flg = SEM_UNDO | IPC_NOWAIT;
+
+ sops[3].sem_num = 1;
+ sops[3].sem_op = 1;
+ sops[3].sem_flg = SEM_UNDO | IPC_NOWAIT;
+
+ return do_semop(id, sops, 4);
}
-int get_dss_pid(char *config_file, pid_t *pid)
+int get_dss_pid(uint32_t key, pid_t *pid)
{
- int ret, semid, key = get_key(config_file);
+ int ret, semid;
if (pid)
*pid = 0;
ret = mutex_get(key, 0);
if (ret < 0)
- return ret;
+ return ret == -ERRNO_TO_DSS_ERROR(ENOENT)? -E_NOT_RUNNING : ret;
semid = ret;
ret = semctl(semid, 1, GETPID);
if (ret < 0)