SEMOP(2)            Linux Programmer's Manual            SEMOP(2)


NAME
       semop - semaphore operations

SYNOPSIS
       # include <sys/types.h>
       # include <sys/ipc.h>
       # include <sys/sem.h>

       int semop ( int semid, struct sembuf *sops, unsigned nsops
       )

DESCRIPTION
       The function performs operations on  selected  members  of
       the  semaphore  set indicated by semid.  Each of the nsops
       elements in the array pointed to by sops specify an opera­
       tion  to  be  performed  on a semaphore by a struct sembuf
       including the following members:

            short sem_num;  /* semaphore number: 0 = first */
            short sem_op;   /* semaphore operation */
            short sem_flg;  /* operation flags */

       Flags recognized in sem_flg are IPC_NOWAIT  and  SEM_UNDO.
       If  an  operation asserts SEM_UNDO, it will be undone when
       the process exits.

       The system call semantic assures that the operations  will
       be  performed  if  and  only  if all of them will succeed.
       Each operation is performed on the sem_num-th semaphore of
       the  semaphore  set - where the first semaphore of the set
       is semaphore 0 - and is one among the following three.

       If sem_op is a positive integer, the operation  adds  this
       value to semval.  Furthermore, if SEM_UNDO is asserted for
       this operation, the system updates the process undo  count
       for this semaphore.  The operation always goes through, so
       no process sleeping can happen.  The calling process  must
       have alter permissions on the semaphore set.

       If  sem_op is zero, the process must have read access per­
       missions on the semaphore set.  If  semval  is  zero,  the
       operation  goes  through.   Otherwise,  if  IPC_NOWAIT  is
       asserted in sem_flg, the system call  fails  (undoing  all
       previous  actions  performed)  with  errno  set to EAGAIN.
       Otherwise semzcnt is incremented by one  and  the  process
       sleeps until one of the following occurs:


              ·      semval becomes 0, at which time the value of
                     semzcnt is decremented.

              ·      The semaphore set  is  removed:  the  system
                     call fails with errno set to EIDRM.




Linux 0.99.13            November 1, 1993                       1





SEMOP(2)            Linux Programmer's Manual            SEMOP(2)


              ·      The  calling  process receives a signal that
                     has to be caught: the value  of  semzcnt  is
                     decremented  and  the system call fails with
                     errno set to EINTR.

       If sem_op is less than zero, the process must  have  alter
       permissions  on  the  semaphore set.  If semval is greater
       than or equal to the absolute value of sem_op,  the  abso­
       lute  value  of  sem_op is subtracted by semval.  Further­
       more, if SEM_UNDO is asserted for this operation, the sys­
       tem  updates  the  process  undo count for this semaphore.
       Then the operation goes through.  Otherwise, if IPC_NOWAIT
       is asserted in sem_flg, the system call fails (undoing all
       previous actions performed)  with  errno  set  to  EAGAIN.
       Otherwise  semncnt  is  incremented by one and the process
       sleeps until one of the following occurs:


              ·      semval becomes greater or equal to the abso­
                     lute  value  of  sem_op,  at  which time the
                     value of semncnt is decremented,  the  abso­
                     lute value of sem_op is subtracted from sem­
                     val and, if SEM_UNDO is  asserted  for  this
                     operation,  the  system  updates the process
                     undo count for this semaphore.

              ·      The semaphore set is removed from  the  sys­
                     tem: the system call fails with errno set to
                     EIDRM.

              ·      The calling process receives a  signal  that
                     has  to  be  caught: the value of semncnt is
                     decremented and the system call  fails  with
                     errno set to EINTR.

       In case of success, the sempid member of the structure sem
       for each semaphore specified in the array  pointed  to  by
       sops  is  set  to  the  process-ID of the calling process.
       Furthermore both sem_otime and sem_ctime are  set  to  the
       current time.

RETURN VALUE
       If  successful  the  system  call  returns 0, otherwise it
       returns -1 with errno indicating the error.

ERRORS
       For a failing return, errno will be set to one  among  the
       following values:

       E2BIG      The  argument nsops is greater than SEMOPM, the
                  maximum number of operations allowed per system
                  call.

       EACCES     The  calling  process has no access permissions



Linux 0.99.13            November 1, 1993                       2





SEMOP(2)            Linux Programmer's Manual            SEMOP(2)


                  on the semaphore set as required by one of  the
                  specified operations.

       EAGAIN     An   operation   could   not   go  through  and
                  IPC_NOWAIT was asserted in its sem_flg.

       EFAULT     The address pointed to by sops  isn't  accessi­
                  ble.

       EFBIG      For some operation the value of sem_num is less
                  than 0 or greater than or equal to  the  number
                  of semaphores in the set.

       EIDRM      The semaphore set was removed.

       EINTR      Sleeping  on a wait queue, the process received
                  a signal that had to be caught.

       EINVAL     The semaphore set doesn't exist,  or  semid  is
                  less  than  zero,  or  nsops has a non-positive
                  value.

       ENOMEM     The sem_flg of some operation asserted SEM_UNDO
                  and  the  system has not enough memory to allo­
                  cate the undo structure.

       ERANGE     For some operation semop+semval is greater than
                  SEMVMX,  the  implementation  dependent maximum
                  value for semval.

NOTES
       The sem_undo structures of a process aren't  inherited  by
       its child on execution of a fork(2) system call.  They are
       instead inherited by the substituting process resulting by
       the execution of the execve(2) system call.

       The  followings  are  limits  on  semaphore  set resources
       affecting a semop call:

       SEMOPM     Maximum number of operations  allowed  for  one
                  semop call: policy dependent.

       SEMVMX     Maximum allowable value for semval: implementa­
                  tion dependent (32767).

       The implementation has no intrinsic limits for the  adjust
       on  exit  maximum  value (SEMAEM), the system wide maximum
       number of undo structures (SEMMNU)  and  the  per  process
       maximum number of undo entries system parameters.

BUGS
       The  system maintains a per process sem_undo structure for
       each semaphore altered by the process with undo  requests.
       Those  structures  are  free  at  process exit.  One major



Linux 0.99.13            November 1, 1993                       3





SEMOP(2)            Linux Programmer's Manual            SEMOP(2)


       cause for unhappiness with the undo mechanism is  that  it
       does not fit in with the notion of having an atomic set of
       operations an array of semaphores.  The undo requests  for
       an  array and each semaphore therein may have been accumu­
       lated over many semopt calls.  Should  the  process  sleep
       when  exiting,  or  should  all undo operations be applied
       with the IPC_NOWAIT flag in effect?  Currently those  undo
       operations  which  go through immediately are applied, and
       those that require a  wait  are  ignored  silently.   Thus
       harmless  undo usage is guaranteed with private semaphores
       only.

CONFORMING TO
       SVr4, SVID.  SVr4 documents  additional  error  conditions
       EINVAL, EFBIG, ENOSPC.

SEE ALSO
       ipc(5), semctl(2), semget(2).







































Linux 0.99.13            November 1, 1993                       4