17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5a5f69788Scraigm * Common Development and Distribution License (the "License"). 6a5f69788Scraigm * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 21a5f69788Scraigm 22a5f69788Scraigm /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ 23a5f69788Scraigm /* All Rights Reserved */ 24a5f69788Scraigm 257c478bd9Sstevel@tonic-gate /* 26*0f1702c5SYu Xiangning * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 277c478bd9Sstevel@tonic-gate * Use is subject to license terms. 287c478bd9Sstevel@tonic-gate */ 297c478bd9Sstevel@tonic-gate 307c478bd9Sstevel@tonic-gate #include <sys/types.h> 317c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h> 327c478bd9Sstevel@tonic-gate #include <sys/param.h> 337c478bd9Sstevel@tonic-gate #include <sys/systm.h> 347c478bd9Sstevel@tonic-gate #include <sys/errno.h> 357c478bd9Sstevel@tonic-gate #include <sys/signal.h> 367c478bd9Sstevel@tonic-gate #include <sys/cred.h> 377c478bd9Sstevel@tonic-gate #include <sys/user.h> 387c478bd9Sstevel@tonic-gate #include <sys/conf.h> 397c478bd9Sstevel@tonic-gate #include <sys/vfs.h> 407c478bd9Sstevel@tonic-gate #include <sys/vnode.h> 417c478bd9Sstevel@tonic-gate #include <sys/pathname.h> 427c478bd9Sstevel@tonic-gate #include <sys/file.h> 437c478bd9Sstevel@tonic-gate #include <sys/proc.h> 447c478bd9Sstevel@tonic-gate #include <sys/var.h> 457c478bd9Sstevel@tonic-gate #include <sys/cpuvar.h> 467c478bd9Sstevel@tonic-gate #include <sys/open.h> 477c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h> 487c478bd9Sstevel@tonic-gate #include <sys/priocntl.h> 497c478bd9Sstevel@tonic-gate #include <sys/procset.h> 507c478bd9Sstevel@tonic-gate #include <sys/prsystm.h> 517c478bd9Sstevel@tonic-gate #include <sys/debug.h> 527c478bd9Sstevel@tonic-gate #include <sys/kmem.h> 537c478bd9Sstevel@tonic-gate #include <sys/atomic.h> 547c478bd9Sstevel@tonic-gate #include <sys/fcntl.h> 557c478bd9Sstevel@tonic-gate #include <sys/poll.h> 567c478bd9Sstevel@tonic-gate #include <sys/rctl.h> 577c478bd9Sstevel@tonic-gate #include <sys/port_impl.h> 587c478bd9Sstevel@tonic-gate 597c478bd9Sstevel@tonic-gate #include <c2/audit.h> 607c478bd9Sstevel@tonic-gate #include <sys/nbmlock.h> 617c478bd9Sstevel@tonic-gate 627c478bd9Sstevel@tonic-gate #ifdef DEBUG 637c478bd9Sstevel@tonic-gate 647c478bd9Sstevel@tonic-gate static uint32_t afd_maxfd; /* # of entries in maximum allocated array */ 657c478bd9Sstevel@tonic-gate static uint32_t afd_alloc; /* count of kmem_alloc()s */ 667c478bd9Sstevel@tonic-gate static uint32_t afd_free; /* count of kmem_free()s */ 677c478bd9Sstevel@tonic-gate static uint32_t afd_wait; /* count of waits on non-zero ref count */ 687c478bd9Sstevel@tonic-gate #define MAXFD(x) (afd_maxfd = ((afd_maxfd >= (x))? afd_maxfd : (x))) 697c478bd9Sstevel@tonic-gate #define COUNT(x) atomic_add_32(&x, 1) 707c478bd9Sstevel@tonic-gate 717c478bd9Sstevel@tonic-gate #else /* DEBUG */ 727c478bd9Sstevel@tonic-gate 737c478bd9Sstevel@tonic-gate #define MAXFD(x) 747c478bd9Sstevel@tonic-gate #define COUNT(x) 757c478bd9Sstevel@tonic-gate 767c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 777c478bd9Sstevel@tonic-gate 787c478bd9Sstevel@tonic-gate kmem_cache_t *file_cache; 797c478bd9Sstevel@tonic-gate static int vpsetattr(vnode_t *, vattr_t *, int); 807c478bd9Sstevel@tonic-gate 8161b4b1efSpraks static void port_close_fd(portfd_t *); 827c478bd9Sstevel@tonic-gate 837c478bd9Sstevel@tonic-gate /* 847c478bd9Sstevel@tonic-gate * File descriptor allocation. 857c478bd9Sstevel@tonic-gate * 867c478bd9Sstevel@tonic-gate * fd_find(fip, minfd) finds the first available descriptor >= minfd. 877c478bd9Sstevel@tonic-gate * The most common case is open(2), in which minfd = 0, but we must also 887c478bd9Sstevel@tonic-gate * support fcntl(fd, F_DUPFD, minfd). 897c478bd9Sstevel@tonic-gate * 907c478bd9Sstevel@tonic-gate * The algorithm is as follows: we keep all file descriptors in an infix 917c478bd9Sstevel@tonic-gate * binary tree in which each node records the number of descriptors 927c478bd9Sstevel@tonic-gate * allocated in its right subtree, including itself. Starting at minfd, 937c478bd9Sstevel@tonic-gate * we ascend the tree until we find a non-fully allocated right subtree. 947c478bd9Sstevel@tonic-gate * We then descend that subtree in a binary search for the smallest fd. 957c478bd9Sstevel@tonic-gate * Finally, we ascend the tree again to increment the allocation count 967c478bd9Sstevel@tonic-gate * of every subtree containing the newly-allocated fd. Freeing an fd 977c478bd9Sstevel@tonic-gate * requires only the last step: we ascend the tree to decrement allocation 987c478bd9Sstevel@tonic-gate * counts. Each of these three steps (ascent to find non-full subtree, 997c478bd9Sstevel@tonic-gate * descent to find lowest fd, ascent to update allocation counts) is 1007c478bd9Sstevel@tonic-gate * O(log n), thus the algorithm as a whole is O(log n). 1017c478bd9Sstevel@tonic-gate * 1027c478bd9Sstevel@tonic-gate * We don't implement the fd tree using the customary left/right/parent 1037c478bd9Sstevel@tonic-gate * pointers, but instead take advantage of the glorious mathematics of 1047c478bd9Sstevel@tonic-gate * full infix binary trees. For reference, here's an illustration of the 1057c478bd9Sstevel@tonic-gate * logical structure of such a tree, rooted at 4 (binary 100), covering 1067c478bd9Sstevel@tonic-gate * the range 1-7 (binary 001-111). Our canonical trees do not include 1077c478bd9Sstevel@tonic-gate * fd 0; we'll deal with that later. 1087c478bd9Sstevel@tonic-gate * 1097c478bd9Sstevel@tonic-gate * 100 1107c478bd9Sstevel@tonic-gate * / \ 1117c478bd9Sstevel@tonic-gate * / \ 1127c478bd9Sstevel@tonic-gate * 010 110 1137c478bd9Sstevel@tonic-gate * / \ / \ 1147c478bd9Sstevel@tonic-gate * 001 011 101 111 1157c478bd9Sstevel@tonic-gate * 1167c478bd9Sstevel@tonic-gate * We make the following observations, all of which are easily proven by 1177c478bd9Sstevel@tonic-gate * induction on the depth of the tree: 1187c478bd9Sstevel@tonic-gate * 1197c478bd9Sstevel@tonic-gate * (T1) The least-significant bit (LSB) of any node is equal to its level 1207c478bd9Sstevel@tonic-gate * in the tree. In our example, nodes 001, 011, 101 and 111 are at 1217c478bd9Sstevel@tonic-gate * level 0; nodes 010 and 110 are at level 1; and node 100 is at level 2. 1227c478bd9Sstevel@tonic-gate * 1237c478bd9Sstevel@tonic-gate * (T2) The child size (CSIZE) of node N -- that is, the total number of 1247c478bd9Sstevel@tonic-gate * right-branch descendants in a child of node N, including itself -- is 1257c478bd9Sstevel@tonic-gate * given by clearing all but the least significant bit of N. This 1267c478bd9Sstevel@tonic-gate * follows immediately from (T1). Applying this rule to our example, we 1277c478bd9Sstevel@tonic-gate * see that CSIZE(100) = 100, CSIZE(x10) = 10, and CSIZE(xx1) = 1. 1287c478bd9Sstevel@tonic-gate * 1297c478bd9Sstevel@tonic-gate * (T3) The nearest left ancestor (LPARENT) of node N -- that is, the nearest 1307c478bd9Sstevel@tonic-gate * ancestor containing node N in its right child -- is given by clearing 1317c478bd9Sstevel@tonic-gate * the LSB of N. For example, LPARENT(111) = 110 and LPARENT(110) = 100. 1327c478bd9Sstevel@tonic-gate * Clearing the LSB of nodes 001, 010 or 100 yields zero, reflecting 1337c478bd9Sstevel@tonic-gate * the fact that these are leftmost nodes. Note that this algorithm 1347c478bd9Sstevel@tonic-gate * automatically skips generations as necessary. For example, the parent 1357c478bd9Sstevel@tonic-gate * of node 101 is 110, which is a *right* ancestor (not what we want); 1367c478bd9Sstevel@tonic-gate * but its grandparent is 100, which is a left ancestor. Clearing the LSB 1377c478bd9Sstevel@tonic-gate * of 101 gets us to 100 directly, skipping right past the uninteresting 1387c478bd9Sstevel@tonic-gate * generation (110). 1397c478bd9Sstevel@tonic-gate * 1407c478bd9Sstevel@tonic-gate * Note that since LPARENT clears the LSB, whereas CSIZE clears all *but* 1417c478bd9Sstevel@tonic-gate * the LSB, we can express LPARENT() nicely in terms of CSIZE(): 1427c478bd9Sstevel@tonic-gate * 1437c478bd9Sstevel@tonic-gate * LPARENT(N) = N - CSIZE(N) 1447c478bd9Sstevel@tonic-gate * 1457c478bd9Sstevel@tonic-gate * (T4) The nearest right ancestor (RPARENT) of node N is given by: 1467c478bd9Sstevel@tonic-gate * 1477c478bd9Sstevel@tonic-gate * RPARENT(N) = N + CSIZE(N) 1487c478bd9Sstevel@tonic-gate * 1497c478bd9Sstevel@tonic-gate * (T5) For every interior node, the children differ from their parent by 1507c478bd9Sstevel@tonic-gate * CSIZE(parent) / 2. In our example, CSIZE(100) / 2 = 2 = 10 binary, 1517c478bd9Sstevel@tonic-gate * and indeed, the children of 100 are 100 +/- 10 = 010 and 110. 1527c478bd9Sstevel@tonic-gate * 1537c478bd9Sstevel@tonic-gate * Next, we'll need a few two's-complement math tricks. Suppose a number, 1547c478bd9Sstevel@tonic-gate * N, has the following form: 1557c478bd9Sstevel@tonic-gate * 1567c478bd9Sstevel@tonic-gate * N = xxxx10...0 1577c478bd9Sstevel@tonic-gate * 1587c478bd9Sstevel@tonic-gate * That is, the binary representation of N consists of some string of bits, 1597c478bd9Sstevel@tonic-gate * then a 1, then all zeroes. This amounts to nothing more than saying that 1607c478bd9Sstevel@tonic-gate * N has a least-significant bit, which is true for any N != 0. If we look 1617c478bd9Sstevel@tonic-gate * at N and N - 1 together, we see that we can combine them in useful ways: 1627c478bd9Sstevel@tonic-gate * 1637c478bd9Sstevel@tonic-gate * N = xxxx10...0 1647c478bd9Sstevel@tonic-gate * N - 1 = xxxx01...1 1657c478bd9Sstevel@tonic-gate * ------------------------ 1667c478bd9Sstevel@tonic-gate * N & (N - 1) = xxxx000000 1677c478bd9Sstevel@tonic-gate * N | (N - 1) = xxxx111111 1687c478bd9Sstevel@tonic-gate * N ^ (N - 1) = 111111 1697c478bd9Sstevel@tonic-gate * 1707c478bd9Sstevel@tonic-gate * In particular, this suggests several easy ways to clear all but the LSB, 1717c478bd9Sstevel@tonic-gate * which by (T2) is exactly what we need to determine CSIZE(N) = 10...0. 1727c478bd9Sstevel@tonic-gate * We'll opt for this formulation: 1737c478bd9Sstevel@tonic-gate * 1747c478bd9Sstevel@tonic-gate * (C1) CSIZE(N) = (N - 1) ^ (N | (N - 1)) 1757c478bd9Sstevel@tonic-gate * 1767c478bd9Sstevel@tonic-gate * Similarly, we have an easy way to determine LPARENT(N), which requires 1777c478bd9Sstevel@tonic-gate * that we clear the LSB of N: 1787c478bd9Sstevel@tonic-gate * 1797c478bd9Sstevel@tonic-gate * (L1) LPARENT(N) = N & (N - 1) 1807c478bd9Sstevel@tonic-gate * 1817c478bd9Sstevel@tonic-gate * We note in the above relations that (N | (N - 1)) - N = CSIZE(N) - 1. 1827c478bd9Sstevel@tonic-gate * When combined with (T4), this yields an easy way to compute RPARENT(N): 1837c478bd9Sstevel@tonic-gate * 1847c478bd9Sstevel@tonic-gate * (R1) RPARENT(N) = (N | (N - 1)) + 1 1857c478bd9Sstevel@tonic-gate * 1867c478bd9Sstevel@tonic-gate * Finally, to accommodate fd 0 we must adjust all of our results by +/-1 to 1877c478bd9Sstevel@tonic-gate * move the fd range from [1, 2^n) to [0, 2^n - 1). This is straightforward, 1887c478bd9Sstevel@tonic-gate * so there's no need to belabor the algebra; the revised relations become: 1897c478bd9Sstevel@tonic-gate * 1907c478bd9Sstevel@tonic-gate * (C1a) CSIZE(N) = N ^ (N | (N + 1)) 1917c478bd9Sstevel@tonic-gate * 1927c478bd9Sstevel@tonic-gate * (L1a) LPARENT(N) = (N & (N + 1)) - 1 1937c478bd9Sstevel@tonic-gate * 1947c478bd9Sstevel@tonic-gate * (R1a) RPARENT(N) = N | (N + 1) 1957c478bd9Sstevel@tonic-gate * 1967c478bd9Sstevel@tonic-gate * This completes the mathematical framework. We now have all the tools 1977c478bd9Sstevel@tonic-gate * we need to implement fd_find() and fd_reserve(). 1987c478bd9Sstevel@tonic-gate * 1997c478bd9Sstevel@tonic-gate * fd_find(fip, minfd) finds the smallest available file descriptor >= minfd. 2007c478bd9Sstevel@tonic-gate * It does not actually allocate the descriptor; that's done by fd_reserve(). 2017c478bd9Sstevel@tonic-gate * fd_find() proceeds in two steps: 2027c478bd9Sstevel@tonic-gate * 2037c478bd9Sstevel@tonic-gate * (1) Find the leftmost subtree that contains a descriptor >= minfd. 2047c478bd9Sstevel@tonic-gate * We start at the right subtree rooted at minfd. If this subtree is 2057c478bd9Sstevel@tonic-gate * not full -- if fip->fi_list[minfd].uf_alloc != CSIZE(minfd) -- then 2067c478bd9Sstevel@tonic-gate * step 1 is done. Otherwise, we know that all fds in this subtree 2077c478bd9Sstevel@tonic-gate * are taken, so we ascend to RPARENT(minfd) using (R1a). We repeat 2087c478bd9Sstevel@tonic-gate * this process until we either find a candidate subtree or exceed 2097c478bd9Sstevel@tonic-gate * fip->fi_nfiles. We use (C1a) to compute CSIZE(). 2107c478bd9Sstevel@tonic-gate * 2117c478bd9Sstevel@tonic-gate * (2) Find the smallest fd in the subtree discovered by step 1. 2127c478bd9Sstevel@tonic-gate * Starting at the root of this subtree, we descend to find the 2137c478bd9Sstevel@tonic-gate * smallest available fd. Since the left children have the smaller 2147c478bd9Sstevel@tonic-gate * fds, we will descend rightward only when the left child is full. 2157c478bd9Sstevel@tonic-gate * 2167c478bd9Sstevel@tonic-gate * We begin by comparing the number of allocated fds in the root 2177c478bd9Sstevel@tonic-gate * to the number of allocated fds in its right child; if they differ 2187c478bd9Sstevel@tonic-gate * by exactly CSIZE(child), we know the left subtree is full, so we 2197c478bd9Sstevel@tonic-gate * descend right; that is, the right child becomes the search root. 2207c478bd9Sstevel@tonic-gate * Otherwise we leave the root alone and start following the right 2217c478bd9Sstevel@tonic-gate * child's left children. As fortune would have it, this is very 2227c478bd9Sstevel@tonic-gate * simple computationally: by (T5), the right child of fd is just 2237c478bd9Sstevel@tonic-gate * fd + size, where size = CSIZE(fd) / 2. Applying (T5) again, 2247c478bd9Sstevel@tonic-gate * we find that the right child's left child is fd + size - (size / 2) = 2257c478bd9Sstevel@tonic-gate * fd + (size / 2); *its* left child is fd + (size / 2) - (size / 4) = 2267c478bd9Sstevel@tonic-gate * fd + (size / 4), and so on. In general, fd's right child's 2277c478bd9Sstevel@tonic-gate * leftmost nth descendant is fd + (size >> n). Thus, to follow 2287c478bd9Sstevel@tonic-gate * the right child's left descendants, we just halve the size in 2297c478bd9Sstevel@tonic-gate * each iteration of the search. 2307c478bd9Sstevel@tonic-gate * 2317c478bd9Sstevel@tonic-gate * When we descend leftward, we must keep track of the number of fds 2327c478bd9Sstevel@tonic-gate * that were allocated in all the right subtrees we rejected, so we 2337c478bd9Sstevel@tonic-gate * know how many of the root fd's allocations are in the remaining 2347c478bd9Sstevel@tonic-gate * (as yet unexplored) leftmost part of its right subtree. When we 2357c478bd9Sstevel@tonic-gate * encounter a fully-allocated left child -- that is, when we find 2367c478bd9Sstevel@tonic-gate * that fip->fi_list[fd].uf_alloc == ralloc + size -- we descend right 2377c478bd9Sstevel@tonic-gate * (as described earlier), resetting ralloc to zero. 2387c478bd9Sstevel@tonic-gate * 2397c478bd9Sstevel@tonic-gate * fd_reserve(fip, fd, incr) either allocates or frees fd, depending 2407c478bd9Sstevel@tonic-gate * on whether incr is 1 or -1. Starting at fd, fd_reserve() ascends 2417c478bd9Sstevel@tonic-gate * the leftmost ancestors (see (T3)) and updates the allocation counts. 2427c478bd9Sstevel@tonic-gate * At each step we use (L1a) to compute LPARENT(), the next left ancestor. 2437c478bd9Sstevel@tonic-gate * 2447c478bd9Sstevel@tonic-gate * flist_minsize() finds the minimal tree that still covers all 2457c478bd9Sstevel@tonic-gate * used fds; as long as the allocation count of a root node is zero, we 2467c478bd9Sstevel@tonic-gate * don't need that node or its right subtree. 2477c478bd9Sstevel@tonic-gate * 2487c478bd9Sstevel@tonic-gate * flist_nalloc() counts the number of allocated fds in the tree, by starting 2497c478bd9Sstevel@tonic-gate * at the top of the tree and summing the right-subtree allocation counts as 2507c478bd9Sstevel@tonic-gate * it descends leftwards. 2517c478bd9Sstevel@tonic-gate * 2527c478bd9Sstevel@tonic-gate * Note: we assume that flist_grow() will keep fip->fi_nfiles of the form 2537c478bd9Sstevel@tonic-gate * 2^n - 1. This ensures that the fd trees are always full, which saves 2547c478bd9Sstevel@tonic-gate * quite a bit of boundary checking. 2557c478bd9Sstevel@tonic-gate */ 2567c478bd9Sstevel@tonic-gate static int 2577c478bd9Sstevel@tonic-gate fd_find(uf_info_t *fip, int minfd) 2587c478bd9Sstevel@tonic-gate { 2597c478bd9Sstevel@tonic-gate int size, ralloc, fd; 2607c478bd9Sstevel@tonic-gate 2617c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 2627c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 2637c478bd9Sstevel@tonic-gate 2647c478bd9Sstevel@tonic-gate for (fd = minfd; (uint_t)fd < fip->fi_nfiles; fd |= fd + 1) { 2657c478bd9Sstevel@tonic-gate size = fd ^ (fd | (fd + 1)); 2667c478bd9Sstevel@tonic-gate if (fip->fi_list[fd].uf_alloc == size) 2677c478bd9Sstevel@tonic-gate continue; 2687c478bd9Sstevel@tonic-gate for (ralloc = 0, size >>= 1; size != 0; size >>= 1) { 2697c478bd9Sstevel@tonic-gate ralloc += fip->fi_list[fd + size].uf_alloc; 2707c478bd9Sstevel@tonic-gate if (fip->fi_list[fd].uf_alloc == ralloc + size) { 2717c478bd9Sstevel@tonic-gate fd += size; 2727c478bd9Sstevel@tonic-gate ralloc = 0; 2737c478bd9Sstevel@tonic-gate } 2747c478bd9Sstevel@tonic-gate } 2757c478bd9Sstevel@tonic-gate return (fd); 2767c478bd9Sstevel@tonic-gate } 2777c478bd9Sstevel@tonic-gate return (-1); 2787c478bd9Sstevel@tonic-gate } 2797c478bd9Sstevel@tonic-gate 2807c478bd9Sstevel@tonic-gate static void 2817c478bd9Sstevel@tonic-gate fd_reserve(uf_info_t *fip, int fd, int incr) 2827c478bd9Sstevel@tonic-gate { 2837c478bd9Sstevel@tonic-gate int pfd; 2847c478bd9Sstevel@tonic-gate uf_entry_t *ufp = &fip->fi_list[fd]; 2857c478bd9Sstevel@tonic-gate 2867c478bd9Sstevel@tonic-gate ASSERT((uint_t)fd < fip->fi_nfiles); 2877c478bd9Sstevel@tonic-gate ASSERT((ufp->uf_busy == 0 && incr == 1) || 2887c478bd9Sstevel@tonic-gate (ufp->uf_busy == 1 && incr == -1)); 2897c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&ufp->uf_lock)); 2907c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 2917c478bd9Sstevel@tonic-gate 2927c478bd9Sstevel@tonic-gate for (pfd = fd; pfd >= 0; pfd = (pfd & (pfd + 1)) - 1) 2937c478bd9Sstevel@tonic-gate fip->fi_list[pfd].uf_alloc += incr; 2947c478bd9Sstevel@tonic-gate 2957c478bd9Sstevel@tonic-gate ufp->uf_busy += incr; 2967c478bd9Sstevel@tonic-gate } 2977c478bd9Sstevel@tonic-gate 2987c478bd9Sstevel@tonic-gate static int 2997c478bd9Sstevel@tonic-gate flist_minsize(uf_info_t *fip) 3007c478bd9Sstevel@tonic-gate { 3017c478bd9Sstevel@tonic-gate int fd; 3027c478bd9Sstevel@tonic-gate 3037c478bd9Sstevel@tonic-gate /* 3047c478bd9Sstevel@tonic-gate * We'd like to ASSERT(MUTEX_HELD(&fip->fi_lock)), but we're called 3057c478bd9Sstevel@tonic-gate * by flist_fork(), which relies on other mechanisms for mutual 3067c478bd9Sstevel@tonic-gate * exclusion. 3077c478bd9Sstevel@tonic-gate */ 3087c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 3097c478bd9Sstevel@tonic-gate 3107c478bd9Sstevel@tonic-gate for (fd = fip->fi_nfiles; fd != 0; fd >>= 1) 3117c478bd9Sstevel@tonic-gate if (fip->fi_list[fd >> 1].uf_alloc != 0) 3127c478bd9Sstevel@tonic-gate break; 3137c478bd9Sstevel@tonic-gate 3147c478bd9Sstevel@tonic-gate return (fd); 3157c478bd9Sstevel@tonic-gate } 3167c478bd9Sstevel@tonic-gate 3177c478bd9Sstevel@tonic-gate static int 3187c478bd9Sstevel@tonic-gate flist_nalloc(uf_info_t *fip) 3197c478bd9Sstevel@tonic-gate { 3207c478bd9Sstevel@tonic-gate int fd; 3217c478bd9Sstevel@tonic-gate int nalloc = 0; 3227c478bd9Sstevel@tonic-gate 3237c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 3247c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 3257c478bd9Sstevel@tonic-gate 3267c478bd9Sstevel@tonic-gate for (fd = fip->fi_nfiles; fd != 0; fd >>= 1) 3277c478bd9Sstevel@tonic-gate nalloc += fip->fi_list[fd >> 1].uf_alloc; 3287c478bd9Sstevel@tonic-gate 3297c478bd9Sstevel@tonic-gate return (nalloc); 3307c478bd9Sstevel@tonic-gate } 3317c478bd9Sstevel@tonic-gate 3327c478bd9Sstevel@tonic-gate /* 3337c478bd9Sstevel@tonic-gate * Increase size of the fi_list array to accommodate at least maxfd. 3347c478bd9Sstevel@tonic-gate * We keep the size of the form 2^n - 1 for benefit of fd_find(). 3357c478bd9Sstevel@tonic-gate */ 3367c478bd9Sstevel@tonic-gate static void 3377c478bd9Sstevel@tonic-gate flist_grow(int maxfd) 3387c478bd9Sstevel@tonic-gate { 3397c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 3407c478bd9Sstevel@tonic-gate int newcnt, oldcnt; 3417c478bd9Sstevel@tonic-gate uf_entry_t *src, *dst, *newlist, *oldlist, *newend, *oldend; 3427c478bd9Sstevel@tonic-gate uf_rlist_t *urp; 3437c478bd9Sstevel@tonic-gate 3447c478bd9Sstevel@tonic-gate for (newcnt = 1; newcnt <= maxfd; newcnt = (newcnt << 1) | 1) 3457c478bd9Sstevel@tonic-gate continue; 3467c478bd9Sstevel@tonic-gate 3477c478bd9Sstevel@tonic-gate newlist = kmem_zalloc(newcnt * sizeof (uf_entry_t), KM_SLEEP); 3487c478bd9Sstevel@tonic-gate 3497c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 3507c478bd9Sstevel@tonic-gate oldcnt = fip->fi_nfiles; 3517c478bd9Sstevel@tonic-gate if (newcnt <= oldcnt) { 3527c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 3537c478bd9Sstevel@tonic-gate kmem_free(newlist, newcnt * sizeof (uf_entry_t)); 3547c478bd9Sstevel@tonic-gate return; 3557c478bd9Sstevel@tonic-gate } 3567c478bd9Sstevel@tonic-gate ASSERT((newcnt & (newcnt + 1)) == 0); 3577c478bd9Sstevel@tonic-gate oldlist = fip->fi_list; 3587c478bd9Sstevel@tonic-gate oldend = oldlist + oldcnt; 3597c478bd9Sstevel@tonic-gate newend = newlist + oldcnt; /* no need to lock beyond old end */ 3607c478bd9Sstevel@tonic-gate 3617c478bd9Sstevel@tonic-gate /* 3627c478bd9Sstevel@tonic-gate * fi_list and fi_nfiles cannot change while any uf_lock is held, 3637c478bd9Sstevel@tonic-gate * so we must grab all the old locks *and* the new locks up to oldcnt. 3647c478bd9Sstevel@tonic-gate * (Locks beyond the end of oldcnt aren't visible until we store 3657c478bd9Sstevel@tonic-gate * the new fi_nfiles, which is the last thing we do before dropping 3667c478bd9Sstevel@tonic-gate * all the locks, so there's no need to acquire these locks). 3677c478bd9Sstevel@tonic-gate * Holding the new locks is necessary because when fi_list changes 3687c478bd9Sstevel@tonic-gate * to point to the new list, fi_nfiles won't have been stored yet. 3697c478bd9Sstevel@tonic-gate * If we *didn't* hold the new locks, someone doing a UF_ENTER() 3707c478bd9Sstevel@tonic-gate * could see the new fi_list, grab the new uf_lock, and then see 3717c478bd9Sstevel@tonic-gate * fi_nfiles change while the lock is held -- in violation of 3727c478bd9Sstevel@tonic-gate * UF_ENTER() semantics. 3737c478bd9Sstevel@tonic-gate */ 3747c478bd9Sstevel@tonic-gate for (src = oldlist; src < oldend; src++) 3757c478bd9Sstevel@tonic-gate mutex_enter(&src->uf_lock); 3767c478bd9Sstevel@tonic-gate 3777c478bd9Sstevel@tonic-gate for (dst = newlist; dst < newend; dst++) 3787c478bd9Sstevel@tonic-gate mutex_enter(&dst->uf_lock); 3797c478bd9Sstevel@tonic-gate 3807c478bd9Sstevel@tonic-gate for (src = oldlist, dst = newlist; src < oldend; src++, dst++) { 3817c478bd9Sstevel@tonic-gate dst->uf_file = src->uf_file; 3827c478bd9Sstevel@tonic-gate dst->uf_fpollinfo = src->uf_fpollinfo; 3837c478bd9Sstevel@tonic-gate dst->uf_refcnt = src->uf_refcnt; 3847c478bd9Sstevel@tonic-gate dst->uf_alloc = src->uf_alloc; 3857c478bd9Sstevel@tonic-gate dst->uf_flag = src->uf_flag; 3867c478bd9Sstevel@tonic-gate dst->uf_busy = src->uf_busy; 3877c478bd9Sstevel@tonic-gate dst->uf_portfd = src->uf_portfd; 3887c478bd9Sstevel@tonic-gate } 3897c478bd9Sstevel@tonic-gate 3907c478bd9Sstevel@tonic-gate /* 3917c478bd9Sstevel@tonic-gate * As soon as we store the new flist, future locking operations 3927c478bd9Sstevel@tonic-gate * will use it. Therefore, we must ensure that all the state 3937c478bd9Sstevel@tonic-gate * we've just established reaches global visibility before the 3947c478bd9Sstevel@tonic-gate * new flist does. 3957c478bd9Sstevel@tonic-gate */ 3967c478bd9Sstevel@tonic-gate membar_producer(); 3977c478bd9Sstevel@tonic-gate fip->fi_list = newlist; 3987c478bd9Sstevel@tonic-gate 3997c478bd9Sstevel@tonic-gate /* 4007c478bd9Sstevel@tonic-gate * Routines like getf() make an optimistic check on the validity 4017c478bd9Sstevel@tonic-gate * of the supplied file descriptor: if it's less than the current 4027c478bd9Sstevel@tonic-gate * value of fi_nfiles -- examined without any locks -- then it's 4037c478bd9Sstevel@tonic-gate * safe to attempt a UF_ENTER() on that fd (which is a valid 4047c478bd9Sstevel@tonic-gate * assumption because fi_nfiles only increases). Therefore, it 4057c478bd9Sstevel@tonic-gate * is critical that the new value of fi_nfiles not reach global 4067c478bd9Sstevel@tonic-gate * visibility until after the new fi_list: if it happened the 4077c478bd9Sstevel@tonic-gate * other way around, getf() could see the new fi_nfiles and attempt 4087c478bd9Sstevel@tonic-gate * a UF_ENTER() on the old fi_list, which would write beyond its 4097c478bd9Sstevel@tonic-gate * end if the fd exceeded the old fi_nfiles. 4107c478bd9Sstevel@tonic-gate */ 4117c478bd9Sstevel@tonic-gate membar_producer(); 4127c478bd9Sstevel@tonic-gate fip->fi_nfiles = newcnt; 4137c478bd9Sstevel@tonic-gate 4147c478bd9Sstevel@tonic-gate /* 4157c478bd9Sstevel@tonic-gate * The new state is consistent now, so we can drop all the locks. 4167c478bd9Sstevel@tonic-gate */ 4177c478bd9Sstevel@tonic-gate for (dst = newlist; dst < newend; dst++) 4187c478bd9Sstevel@tonic-gate mutex_exit(&dst->uf_lock); 4197c478bd9Sstevel@tonic-gate 4207c478bd9Sstevel@tonic-gate for (src = oldlist; src < oldend; src++) { 4217c478bd9Sstevel@tonic-gate /* 4227c478bd9Sstevel@tonic-gate * If any threads are blocked on the old cvs, wake them. 4237c478bd9Sstevel@tonic-gate * This will force them to wake up, discover that fi_list 4247c478bd9Sstevel@tonic-gate * has changed, and go back to sleep on the new cvs. 4257c478bd9Sstevel@tonic-gate */ 4267c478bd9Sstevel@tonic-gate cv_broadcast(&src->uf_wanted_cv); 4277c478bd9Sstevel@tonic-gate cv_broadcast(&src->uf_closing_cv); 4287c478bd9Sstevel@tonic-gate mutex_exit(&src->uf_lock); 4297c478bd9Sstevel@tonic-gate } 4307c478bd9Sstevel@tonic-gate 4317c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 4327c478bd9Sstevel@tonic-gate 4337c478bd9Sstevel@tonic-gate /* 4347c478bd9Sstevel@tonic-gate * Retire the old flist. We can't actually kmem_free() it now 4357c478bd9Sstevel@tonic-gate * because someone may still have a pointer to it. Instead, 4367c478bd9Sstevel@tonic-gate * we link it onto a list of retired flists. The new flist 4377c478bd9Sstevel@tonic-gate * is at least double the size of the previous flist, so the 4387c478bd9Sstevel@tonic-gate * total size of all retired flists will be less than the size 4397c478bd9Sstevel@tonic-gate * of the current one (to prove, consider the sum of a geometric 4407c478bd9Sstevel@tonic-gate * series in powers of 2). exit() frees the retired flists. 4417c478bd9Sstevel@tonic-gate */ 4427c478bd9Sstevel@tonic-gate urp = kmem_zalloc(sizeof (uf_rlist_t), KM_SLEEP); 4437c478bd9Sstevel@tonic-gate urp->ur_list = oldlist; 4447c478bd9Sstevel@tonic-gate urp->ur_nfiles = oldcnt; 4457c478bd9Sstevel@tonic-gate 4467c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 4477c478bd9Sstevel@tonic-gate urp->ur_next = fip->fi_rlist; 4487c478bd9Sstevel@tonic-gate fip->fi_rlist = urp; 4497c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 4507c478bd9Sstevel@tonic-gate } 4517c478bd9Sstevel@tonic-gate 4527c478bd9Sstevel@tonic-gate /* 4537c478bd9Sstevel@tonic-gate * Utility functions for keeping track of the active file descriptors. 4547c478bd9Sstevel@tonic-gate */ 4557c478bd9Sstevel@tonic-gate void 4567c478bd9Sstevel@tonic-gate clear_stale_fd() /* called from post_syscall() */ 4577c478bd9Sstevel@tonic-gate { 4587c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 4597c478bd9Sstevel@tonic-gate int i; 4607c478bd9Sstevel@tonic-gate 4617c478bd9Sstevel@tonic-gate /* uninitialized is ok here, a_nfd is then zero */ 4627c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 4637c478bd9Sstevel@tonic-gate /* assert that this should not be necessary */ 4647c478bd9Sstevel@tonic-gate ASSERT(afd->a_fd[i] == -1); 4657c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 4667c478bd9Sstevel@tonic-gate } 4677c478bd9Sstevel@tonic-gate afd->a_stale = 0; 4687c478bd9Sstevel@tonic-gate } 4697c478bd9Sstevel@tonic-gate 4707c478bd9Sstevel@tonic-gate void 4717c478bd9Sstevel@tonic-gate free_afd(afd_t *afd) /* called below and from thread_free() */ 4727c478bd9Sstevel@tonic-gate { 4737c478bd9Sstevel@tonic-gate int i; 4747c478bd9Sstevel@tonic-gate 4757c478bd9Sstevel@tonic-gate /* free the buffer if it was kmem_alloc()ed */ 4767c478bd9Sstevel@tonic-gate if (afd->a_nfd > sizeof (afd->a_buf) / sizeof (afd->a_buf[0])) { 4777c478bd9Sstevel@tonic-gate COUNT(afd_free); 4787c478bd9Sstevel@tonic-gate kmem_free(afd->a_fd, afd->a_nfd * sizeof (afd->a_fd[0])); 4797c478bd9Sstevel@tonic-gate } 4807c478bd9Sstevel@tonic-gate 4817c478bd9Sstevel@tonic-gate /* (re)initialize the structure */ 4827c478bd9Sstevel@tonic-gate afd->a_fd = &afd->a_buf[0]; 4837c478bd9Sstevel@tonic-gate afd->a_nfd = sizeof (afd->a_buf) / sizeof (afd->a_buf[0]); 4847c478bd9Sstevel@tonic-gate afd->a_stale = 0; 4857c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) 4867c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 4877c478bd9Sstevel@tonic-gate } 4887c478bd9Sstevel@tonic-gate 4897c478bd9Sstevel@tonic-gate static void 4907c478bd9Sstevel@tonic-gate set_active_fd(int fd) 4917c478bd9Sstevel@tonic-gate { 4927c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 4937c478bd9Sstevel@tonic-gate int i; 4947c478bd9Sstevel@tonic-gate int *old_fd; 4957c478bd9Sstevel@tonic-gate int old_nfd; 4967c478bd9Sstevel@tonic-gate 4977c478bd9Sstevel@tonic-gate if (afd->a_nfd == 0) /* first time initialization */ 4987c478bd9Sstevel@tonic-gate free_afd(afd); 4997c478bd9Sstevel@tonic-gate 5007c478bd9Sstevel@tonic-gate /* insert fd into vacant slot, if any */ 5017c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 5027c478bd9Sstevel@tonic-gate if (afd->a_fd[i] == -1) { 5037c478bd9Sstevel@tonic-gate afd->a_fd[i] = fd; 5047c478bd9Sstevel@tonic-gate return; 5057c478bd9Sstevel@tonic-gate } 5067c478bd9Sstevel@tonic-gate } 5077c478bd9Sstevel@tonic-gate 5087c478bd9Sstevel@tonic-gate /* 5097c478bd9Sstevel@tonic-gate * Reallocate the a_fd[] array to add one more slot. 5107c478bd9Sstevel@tonic-gate */ 5117c478bd9Sstevel@tonic-gate old_fd = afd->a_fd; 5127c478bd9Sstevel@tonic-gate old_nfd = afd->a_nfd; 5137c478bd9Sstevel@tonic-gate afd->a_nfd = old_nfd + 1; 5147c478bd9Sstevel@tonic-gate MAXFD(afd->a_nfd); 5157c478bd9Sstevel@tonic-gate COUNT(afd_alloc); 5167c478bd9Sstevel@tonic-gate afd->a_fd = kmem_alloc(afd->a_nfd * sizeof (afd->a_fd[0]), KM_SLEEP); 5177c478bd9Sstevel@tonic-gate for (i = 0; i < old_nfd; i++) 5187c478bd9Sstevel@tonic-gate afd->a_fd[i] = old_fd[i]; 5197c478bd9Sstevel@tonic-gate afd->a_fd[i] = fd; 5207c478bd9Sstevel@tonic-gate 5217c478bd9Sstevel@tonic-gate if (old_nfd > sizeof (afd->a_buf) / sizeof (afd->a_buf[0])) { 5227c478bd9Sstevel@tonic-gate COUNT(afd_free); 5237c478bd9Sstevel@tonic-gate kmem_free(old_fd, old_nfd * sizeof (afd->a_fd[0])); 5247c478bd9Sstevel@tonic-gate } 5257c478bd9Sstevel@tonic-gate } 5267c478bd9Sstevel@tonic-gate 5277c478bd9Sstevel@tonic-gate void 5287c478bd9Sstevel@tonic-gate clear_active_fd(int fd) /* called below and from aio.c */ 5297c478bd9Sstevel@tonic-gate { 5307c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 5317c478bd9Sstevel@tonic-gate int i; 5327c478bd9Sstevel@tonic-gate 5337c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 5347c478bd9Sstevel@tonic-gate if (afd->a_fd[i] == fd) { 5357c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 5367c478bd9Sstevel@tonic-gate break; 5377c478bd9Sstevel@tonic-gate } 5387c478bd9Sstevel@tonic-gate } 5397c478bd9Sstevel@tonic-gate ASSERT(i < afd->a_nfd); /* not found is not ok */ 5407c478bd9Sstevel@tonic-gate } 5417c478bd9Sstevel@tonic-gate 5427c478bd9Sstevel@tonic-gate /* 5437c478bd9Sstevel@tonic-gate * Does this thread have this fd active? 5447c478bd9Sstevel@tonic-gate */ 5457c478bd9Sstevel@tonic-gate static int 5467c478bd9Sstevel@tonic-gate is_active_fd(kthread_t *t, int fd) 5477c478bd9Sstevel@tonic-gate { 5487c478bd9Sstevel@tonic-gate afd_t *afd = &t->t_activefd; 5497c478bd9Sstevel@tonic-gate int i; 5507c478bd9Sstevel@tonic-gate 5517c478bd9Sstevel@tonic-gate /* uninitialized is ok here, a_nfd is then zero */ 5527c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 5537c478bd9Sstevel@tonic-gate if (afd->a_fd[i] == fd) 5547c478bd9Sstevel@tonic-gate return (1); 5557c478bd9Sstevel@tonic-gate } 5567c478bd9Sstevel@tonic-gate return (0); 5577c478bd9Sstevel@tonic-gate } 5587c478bd9Sstevel@tonic-gate 5597c478bd9Sstevel@tonic-gate /* 5607c478bd9Sstevel@tonic-gate * Convert a user supplied file descriptor into a pointer to a file 5617c478bd9Sstevel@tonic-gate * structure. Only task is to check range of the descriptor (soft 5627c478bd9Sstevel@tonic-gate * resource limit was enforced at open time and shouldn't be checked 5637c478bd9Sstevel@tonic-gate * here). 5647c478bd9Sstevel@tonic-gate */ 5657c478bd9Sstevel@tonic-gate file_t * 5667c478bd9Sstevel@tonic-gate getf(int fd) 5677c478bd9Sstevel@tonic-gate { 5687c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 5697c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 5707c478bd9Sstevel@tonic-gate file_t *fp; 5717c478bd9Sstevel@tonic-gate 5727c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 5737c478bd9Sstevel@tonic-gate return (NULL); 5747c478bd9Sstevel@tonic-gate 5757c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 5767c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 5777c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 578a5f69788Scraigm 579a5f69788Scraigm if (fd == fip->fi_badfd && fip->fi_action > 0) 580a5f69788Scraigm tsignal(curthread, fip->fi_action); 581a5f69788Scraigm 5827c478bd9Sstevel@tonic-gate return (NULL); 5837c478bd9Sstevel@tonic-gate } 5847c478bd9Sstevel@tonic-gate ufp->uf_refcnt++; 5857c478bd9Sstevel@tonic-gate 5867c478bd9Sstevel@tonic-gate /* 5877c478bd9Sstevel@tonic-gate * archive per file audit data 5887c478bd9Sstevel@tonic-gate */ 5897c478bd9Sstevel@tonic-gate if (audit_active) 5907c478bd9Sstevel@tonic-gate (void) audit_getf(fd); 5917c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 5927c478bd9Sstevel@tonic-gate 5937c478bd9Sstevel@tonic-gate set_active_fd(fd); /* record the active file descriptor */ 5947c478bd9Sstevel@tonic-gate 5957c478bd9Sstevel@tonic-gate return (fp); 5967c478bd9Sstevel@tonic-gate } 5977c478bd9Sstevel@tonic-gate 5987c478bd9Sstevel@tonic-gate /* 5997c478bd9Sstevel@tonic-gate * Close whatever file currently occupies the file descriptor slot 6007c478bd9Sstevel@tonic-gate * and install the new file, usually NULL, in the file descriptor slot. 6017c478bd9Sstevel@tonic-gate * The close must complete before we release the file descriptor slot. 602a5f69788Scraigm * If newfp != NULL we only return an error if we can't allocate the 603a5f69788Scraigm * slot so the caller knows that it needs to free the filep; 604a5f69788Scraigm * in the other cases we return the error number from closef(). 6057c478bd9Sstevel@tonic-gate */ 6067c478bd9Sstevel@tonic-gate int 6077c478bd9Sstevel@tonic-gate closeandsetf(int fd, file_t *newfp) 6087c478bd9Sstevel@tonic-gate { 6097c478bd9Sstevel@tonic-gate proc_t *p = curproc; 6107c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 6117c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 6127c478bd9Sstevel@tonic-gate file_t *fp; 6137c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 6147c478bd9Sstevel@tonic-gate portfd_t *pfd; 6157c478bd9Sstevel@tonic-gate int error; 6167c478bd9Sstevel@tonic-gate 6177c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) { 6187c478bd9Sstevel@tonic-gate if (newfp == NULL) 6197c478bd9Sstevel@tonic-gate return (EBADF); 6207c478bd9Sstevel@tonic-gate flist_grow(fd); 6217c478bd9Sstevel@tonic-gate } 6227c478bd9Sstevel@tonic-gate 6237c478bd9Sstevel@tonic-gate if (newfp != NULL) { 6247c478bd9Sstevel@tonic-gate /* 6257c478bd9Sstevel@tonic-gate * If ufp is reserved but has no file pointer, it's in the 6267c478bd9Sstevel@tonic-gate * transition between ufalloc() and setf(). We must wait 6277c478bd9Sstevel@tonic-gate * for this transition to complete before assigning the 6287c478bd9Sstevel@tonic-gate * new non-NULL file pointer. 6297c478bd9Sstevel@tonic-gate */ 6307c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 631a5f69788Scraigm if (fd == fip->fi_badfd) { 632a5f69788Scraigm mutex_exit(&fip->fi_lock); 633a5f69788Scraigm if (fip->fi_action > 0) 634a5f69788Scraigm tsignal(curthread, fip->fi_action); 635a5f69788Scraigm return (EBADF); 636a5f69788Scraigm } 6377c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6387c478bd9Sstevel@tonic-gate while (ufp->uf_busy && ufp->uf_file == NULL) { 6397c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6407c478bd9Sstevel@tonic-gate cv_wait_stop(&ufp->uf_wanted_cv, &ufp->uf_lock, 250); 6417c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6427c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 6437c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6447c478bd9Sstevel@tonic-gate } 6457c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 6467c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 6477c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_flag == 0); 6487c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, 1); 6497c478bd9Sstevel@tonic-gate ufp->uf_file = newfp; 6507c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6517c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6527c478bd9Sstevel@tonic-gate return (0); 6537c478bd9Sstevel@tonic-gate } 6547c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6557c478bd9Sstevel@tonic-gate } else { 6567c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6577c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 6587c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6597c478bd9Sstevel@tonic-gate return (EBADF); 6607c478bd9Sstevel@tonic-gate } 6617c478bd9Sstevel@tonic-gate } 6627c478bd9Sstevel@tonic-gate 6637c478bd9Sstevel@tonic-gate /* 6647c478bd9Sstevel@tonic-gate * archive per file audit data 6657c478bd9Sstevel@tonic-gate */ 6667c478bd9Sstevel@tonic-gate if (audit_active) 6677c478bd9Sstevel@tonic-gate (void) audit_getf(fd); 6687c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_busy); 6697c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 6707c478bd9Sstevel@tonic-gate ufp->uf_flag = 0; 6717c478bd9Sstevel@tonic-gate 6727c478bd9Sstevel@tonic-gate /* 6737c478bd9Sstevel@tonic-gate * If the file descriptor reference count is non-zero, then 6747c478bd9Sstevel@tonic-gate * some other lwp in the process is performing system call 6757c478bd9Sstevel@tonic-gate * activity on the file. To avoid blocking here for a long 6767c478bd9Sstevel@tonic-gate * time (the other lwp might be in a long term sleep in its 6777c478bd9Sstevel@tonic-gate * system call), we stop all other lwps in the process and 6787c478bd9Sstevel@tonic-gate * scan them to find the ones with this fd as one of their 6797c478bd9Sstevel@tonic-gate * active fds and set their a_stale flag so they will emerge 6807c478bd9Sstevel@tonic-gate * from their system calls immediately. post_syscall() will 6817c478bd9Sstevel@tonic-gate * test the a_stale flag and set errno to EBADF. 6827c478bd9Sstevel@tonic-gate */ 6837c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt == 0 || p->p_lwpcnt > 1); 6847c478bd9Sstevel@tonic-gate if (ufp->uf_refcnt > 0) { 6857c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6867c478bd9Sstevel@tonic-gate COUNT(afd_wait); 6877c478bd9Sstevel@tonic-gate 6887c478bd9Sstevel@tonic-gate /* 6897c478bd9Sstevel@tonic-gate * Make all other lwps hold in place, as if doing fork1(). 6907c478bd9Sstevel@tonic-gate * holdlwps(SHOLDFORK1) fails only if another lwp wants to 6917c478bd9Sstevel@tonic-gate * perform a forkall() or the process is exiting. In either 6927c478bd9Sstevel@tonic-gate * case, all other lwps are either returning from their 6937c478bd9Sstevel@tonic-gate * system calls (because of SHOLDFORK) or calling lwp_exit() 6947c478bd9Sstevel@tonic-gate * (because of SEXITLWPS) so we don't need to scan them. 6957c478bd9Sstevel@tonic-gate */ 6967c478bd9Sstevel@tonic-gate if (holdlwps(SHOLDFORK1)) { 6977c478bd9Sstevel@tonic-gate kthread_t *t; 6987c478bd9Sstevel@tonic-gate 6997c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 7007c478bd9Sstevel@tonic-gate for (t = curthread->t_forw; t != curthread; 7017c478bd9Sstevel@tonic-gate t = t->t_forw) { 7027c478bd9Sstevel@tonic-gate if (is_active_fd(t, fd)) { 7037c478bd9Sstevel@tonic-gate t->t_activefd.a_stale = 1; 7047c478bd9Sstevel@tonic-gate t->t_post_sys = 1; 7057c478bd9Sstevel@tonic-gate } 7067c478bd9Sstevel@tonic-gate } 7077c478bd9Sstevel@tonic-gate continuelwps(p); 7087c478bd9Sstevel@tonic-gate mutex_exit(&p->p_lock); 7097c478bd9Sstevel@tonic-gate } 7107c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7117c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_file == NULL); 7127c478bd9Sstevel@tonic-gate } 7137c478bd9Sstevel@tonic-gate 7147c478bd9Sstevel@tonic-gate /* 7157c478bd9Sstevel@tonic-gate * Wait for other lwps to stop using this file descriptor. 7167c478bd9Sstevel@tonic-gate */ 7177c478bd9Sstevel@tonic-gate while (ufp->uf_refcnt > 0) { 7187c478bd9Sstevel@tonic-gate cv_wait_stop(&ufp->uf_closing_cv, &ufp->uf_lock, 250); 7197c478bd9Sstevel@tonic-gate /* 7207c478bd9Sstevel@tonic-gate * cv_wait_stop() drops ufp->uf_lock, so the file list 7217c478bd9Sstevel@tonic-gate * can change. Drop the lock on our (possibly) stale 7227c478bd9Sstevel@tonic-gate * ufp and let UF_ENTER() find and lock the current ufp. 7237c478bd9Sstevel@tonic-gate */ 7247c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7257c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7267c478bd9Sstevel@tonic-gate } 7277c478bd9Sstevel@tonic-gate 7287c478bd9Sstevel@tonic-gate #ifdef DEBUG 7297c478bd9Sstevel@tonic-gate /* 7307c478bd9Sstevel@tonic-gate * catch a watchfd on device's pollhead list but not on fpollinfo list 7317c478bd9Sstevel@tonic-gate */ 7327c478bd9Sstevel@tonic-gate if (ufp->uf_fpollinfo != NULL) 7337c478bd9Sstevel@tonic-gate checkwfdlist(fp->f_vnode, ufp->uf_fpollinfo); 7347c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 7357c478bd9Sstevel@tonic-gate 7367c478bd9Sstevel@tonic-gate /* 7377c478bd9Sstevel@tonic-gate * We may need to cleanup some cached poll states in t_pollstate 7387c478bd9Sstevel@tonic-gate * before the fd can be reused. It is important that we don't 7397c478bd9Sstevel@tonic-gate * access a stale thread structure. We will do the cleanup in two 7407c478bd9Sstevel@tonic-gate * phases to avoid deadlock and holding uf_lock for too long. 7417c478bd9Sstevel@tonic-gate * In phase 1, hold the uf_lock and call pollblockexit() to set 7427c478bd9Sstevel@tonic-gate * state in t_pollstate struct so that a thread does not exit on 7437c478bd9Sstevel@tonic-gate * us. In phase 2, we drop the uf_lock and call pollcacheclean(). 7447c478bd9Sstevel@tonic-gate */ 7457c478bd9Sstevel@tonic-gate pfd = ufp->uf_portfd; 7467c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 7477c478bd9Sstevel@tonic-gate fpip = ufp->uf_fpollinfo; 7487c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = NULL; 7497c478bd9Sstevel@tonic-gate if (fpip != NULL) 7507c478bd9Sstevel@tonic-gate pollblockexit(fpip); 7517c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7527c478bd9Sstevel@tonic-gate if (fpip != NULL) 7537c478bd9Sstevel@tonic-gate pollcacheclean(fpip, fd); 7547c478bd9Sstevel@tonic-gate if (pfd) 75561b4b1efSpraks port_close_fd(pfd); 7567c478bd9Sstevel@tonic-gate 7577c478bd9Sstevel@tonic-gate /* 7587c478bd9Sstevel@tonic-gate * Keep the file descriptor entry reserved across the closef(). 7597c478bd9Sstevel@tonic-gate */ 7607c478bd9Sstevel@tonic-gate error = closef(fp); 7617c478bd9Sstevel@tonic-gate 7627c478bd9Sstevel@tonic-gate setf(fd, newfp); 7637c478bd9Sstevel@tonic-gate 764a5f69788Scraigm /* Only return closef() error when closing is all we do */ 765a5f69788Scraigm return (newfp == NULL ? error : 0); 7667c478bd9Sstevel@tonic-gate } 7677c478bd9Sstevel@tonic-gate 7687c478bd9Sstevel@tonic-gate /* 7697c478bd9Sstevel@tonic-gate * Decrement uf_refcnt; wakeup anyone waiting to close the file. 7707c478bd9Sstevel@tonic-gate */ 7717c478bd9Sstevel@tonic-gate void 7727c478bd9Sstevel@tonic-gate releasef(int fd) 7737c478bd9Sstevel@tonic-gate { 7747c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 7757c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 7767c478bd9Sstevel@tonic-gate 7777c478bd9Sstevel@tonic-gate clear_active_fd(fd); /* clear the active file descriptor */ 7787c478bd9Sstevel@tonic-gate 7797c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7807c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt > 0); 7817c478bd9Sstevel@tonic-gate if (--ufp->uf_refcnt == 0) 7827c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_closing_cv); 7837c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7847c478bd9Sstevel@tonic-gate } 7857c478bd9Sstevel@tonic-gate 7867c478bd9Sstevel@tonic-gate /* 7877c478bd9Sstevel@tonic-gate * Identical to releasef() but can be called from another process. 7887c478bd9Sstevel@tonic-gate */ 7897c478bd9Sstevel@tonic-gate void 7907c478bd9Sstevel@tonic-gate areleasef(int fd, uf_info_t *fip) 7917c478bd9Sstevel@tonic-gate { 7927c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 7937c478bd9Sstevel@tonic-gate 7947c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7957c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt > 0); 7967c478bd9Sstevel@tonic-gate if (--ufp->uf_refcnt == 0) 7977c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_closing_cv); 7987c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7997c478bd9Sstevel@tonic-gate } 8007c478bd9Sstevel@tonic-gate 8017c478bd9Sstevel@tonic-gate /* 8027c478bd9Sstevel@tonic-gate * Duplicate all file descriptors across a fork. 8037c478bd9Sstevel@tonic-gate */ 8047c478bd9Sstevel@tonic-gate void 8057c478bd9Sstevel@tonic-gate flist_fork(uf_info_t *pfip, uf_info_t *cfip) 8067c478bd9Sstevel@tonic-gate { 8077c478bd9Sstevel@tonic-gate int fd, nfiles; 8087c478bd9Sstevel@tonic-gate uf_entry_t *pufp, *cufp; 8097c478bd9Sstevel@tonic-gate 8107c478bd9Sstevel@tonic-gate mutex_init(&cfip->fi_lock, NULL, MUTEX_DEFAULT, NULL); 8117c478bd9Sstevel@tonic-gate cfip->fi_rlist = NULL; 8127c478bd9Sstevel@tonic-gate 8137c478bd9Sstevel@tonic-gate /* 8147c478bd9Sstevel@tonic-gate * We don't need to hold fi_lock because all other lwp's in the 8157c478bd9Sstevel@tonic-gate * parent have been held. 8167c478bd9Sstevel@tonic-gate */ 8177c478bd9Sstevel@tonic-gate cfip->fi_nfiles = nfiles = flist_minsize(pfip); 8187c478bd9Sstevel@tonic-gate 8197c478bd9Sstevel@tonic-gate cfip->fi_list = kmem_zalloc(nfiles * sizeof (uf_entry_t), KM_SLEEP); 8207c478bd9Sstevel@tonic-gate 8217c478bd9Sstevel@tonic-gate for (fd = 0, pufp = pfip->fi_list, cufp = cfip->fi_list; fd < nfiles; 8227c478bd9Sstevel@tonic-gate fd++, pufp++, cufp++) { 8237c478bd9Sstevel@tonic-gate cufp->uf_file = pufp->uf_file; 8247c478bd9Sstevel@tonic-gate cufp->uf_alloc = pufp->uf_alloc; 8257c478bd9Sstevel@tonic-gate cufp->uf_flag = pufp->uf_flag; 8267c478bd9Sstevel@tonic-gate cufp->uf_busy = pufp->uf_busy; 8277c478bd9Sstevel@tonic-gate if (pufp->uf_file == NULL) { 8287c478bd9Sstevel@tonic-gate ASSERT(pufp->uf_flag == 0); 8297c478bd9Sstevel@tonic-gate if (pufp->uf_busy) { 8307c478bd9Sstevel@tonic-gate /* 8317c478bd9Sstevel@tonic-gate * Grab locks to appease ASSERTs in fd_reserve 8327c478bd9Sstevel@tonic-gate */ 8337c478bd9Sstevel@tonic-gate mutex_enter(&cfip->fi_lock); 8347c478bd9Sstevel@tonic-gate mutex_enter(&cufp->uf_lock); 8357c478bd9Sstevel@tonic-gate fd_reserve(cfip, fd, -1); 8367c478bd9Sstevel@tonic-gate mutex_exit(&cufp->uf_lock); 8377c478bd9Sstevel@tonic-gate mutex_exit(&cfip->fi_lock); 8387c478bd9Sstevel@tonic-gate } 8397c478bd9Sstevel@tonic-gate } 8407c478bd9Sstevel@tonic-gate } 8417c478bd9Sstevel@tonic-gate } 8427c478bd9Sstevel@tonic-gate 8437c478bd9Sstevel@tonic-gate /* 8447c478bd9Sstevel@tonic-gate * Close all open file descriptors for the current process. 8457c478bd9Sstevel@tonic-gate * This is only called from exit(), which is single-threaded, 8467c478bd9Sstevel@tonic-gate * so we don't need any locking. 8477c478bd9Sstevel@tonic-gate */ 8487c478bd9Sstevel@tonic-gate void 8497c478bd9Sstevel@tonic-gate closeall(uf_info_t *fip) 8507c478bd9Sstevel@tonic-gate { 8517c478bd9Sstevel@tonic-gate int fd; 8527c478bd9Sstevel@tonic-gate file_t *fp; 8537c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 8547c478bd9Sstevel@tonic-gate 8557c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 8567c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++, ufp++) { 8577c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL) { 8587c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 8597c478bd9Sstevel@tonic-gate if (ufp->uf_portfd != NULL) { 86061b4b1efSpraks portfd_t *pfd; 8617c478bd9Sstevel@tonic-gate /* remove event port association */ 86261b4b1efSpraks pfd = ufp->uf_portfd; 8637c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 86461b4b1efSpraks port_close_fd(pfd); 8657c478bd9Sstevel@tonic-gate } 8667c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 8677c478bd9Sstevel@tonic-gate (void) closef(fp); 8687c478bd9Sstevel@tonic-gate } 8697c478bd9Sstevel@tonic-gate } 8707c478bd9Sstevel@tonic-gate 8717c478bd9Sstevel@tonic-gate kmem_free(fip->fi_list, fip->fi_nfiles * sizeof (uf_entry_t)); 8727c478bd9Sstevel@tonic-gate fip->fi_list = NULL; 8737c478bd9Sstevel@tonic-gate fip->fi_nfiles = 0; 8747c478bd9Sstevel@tonic-gate while (fip->fi_rlist != NULL) { 8757c478bd9Sstevel@tonic-gate uf_rlist_t *urp = fip->fi_rlist; 8767c478bd9Sstevel@tonic-gate fip->fi_rlist = urp->ur_next; 8777c478bd9Sstevel@tonic-gate kmem_free(urp->ur_list, urp->ur_nfiles * sizeof (uf_entry_t)); 8787c478bd9Sstevel@tonic-gate kmem_free(urp, sizeof (uf_rlist_t)); 8797c478bd9Sstevel@tonic-gate } 8807c478bd9Sstevel@tonic-gate } 8817c478bd9Sstevel@tonic-gate 8827c478bd9Sstevel@tonic-gate /* 8837c478bd9Sstevel@tonic-gate * Internal form of close. Decrement reference count on file 8847c478bd9Sstevel@tonic-gate * structure. Decrement reference count on the vnode following 8857c478bd9Sstevel@tonic-gate * removal of the referencing file structure. 8867c478bd9Sstevel@tonic-gate */ 8877c478bd9Sstevel@tonic-gate int 8887c478bd9Sstevel@tonic-gate closef(file_t *fp) 8897c478bd9Sstevel@tonic-gate { 8907c478bd9Sstevel@tonic-gate vnode_t *vp; 8917c478bd9Sstevel@tonic-gate int error; 8927c478bd9Sstevel@tonic-gate int count; 8937c478bd9Sstevel@tonic-gate int flag; 8947c478bd9Sstevel@tonic-gate offset_t offset; 8957c478bd9Sstevel@tonic-gate 8967c478bd9Sstevel@tonic-gate /* 8977c478bd9Sstevel@tonic-gate * audit close of file (may be exit) 8987c478bd9Sstevel@tonic-gate */ 8997c478bd9Sstevel@tonic-gate if (audit_active) 9007c478bd9Sstevel@tonic-gate audit_closef(fp); 9017c478bd9Sstevel@tonic-gate ASSERT(MUTEX_NOT_HELD(&P_FINFO(curproc)->fi_lock)); 9027c478bd9Sstevel@tonic-gate 9037c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 9047c478bd9Sstevel@tonic-gate 9057c478bd9Sstevel@tonic-gate ASSERT(fp->f_count > 0); 9067c478bd9Sstevel@tonic-gate 9077c478bd9Sstevel@tonic-gate count = fp->f_count--; 9087c478bd9Sstevel@tonic-gate flag = fp->f_flag; 9097c478bd9Sstevel@tonic-gate offset = fp->f_offset; 9107c478bd9Sstevel@tonic-gate 9117c478bd9Sstevel@tonic-gate vp = fp->f_vnode; 9127c478bd9Sstevel@tonic-gate 913da6c28aaSamw error = VOP_CLOSE(vp, flag, count, offset, fp->f_cred, NULL); 9147c478bd9Sstevel@tonic-gate 9157c478bd9Sstevel@tonic-gate if (count > 1) { 9167c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 9177c478bd9Sstevel@tonic-gate return (error); 9187c478bd9Sstevel@tonic-gate } 9197c478bd9Sstevel@tonic-gate ASSERT(fp->f_count == 0); 9207c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 9217c478bd9Sstevel@tonic-gate 9227c478bd9Sstevel@tonic-gate VN_RELE(vp); 9237c478bd9Sstevel@tonic-gate /* 9247c478bd9Sstevel@tonic-gate * deallocate resources to audit_data 9257c478bd9Sstevel@tonic-gate */ 9267c478bd9Sstevel@tonic-gate if (audit_active) 9277c478bd9Sstevel@tonic-gate audit_unfalloc(fp); 9287c478bd9Sstevel@tonic-gate crfree(fp->f_cred); 9297c478bd9Sstevel@tonic-gate kmem_cache_free(file_cache, fp); 9307c478bd9Sstevel@tonic-gate return (error); 9317c478bd9Sstevel@tonic-gate } 9327c478bd9Sstevel@tonic-gate 9337c478bd9Sstevel@tonic-gate /* 9347c478bd9Sstevel@tonic-gate * This is a combination of ufalloc() and setf(). 9357c478bd9Sstevel@tonic-gate */ 9367c478bd9Sstevel@tonic-gate int 9377c478bd9Sstevel@tonic-gate ufalloc_file(int start, file_t *fp) 9387c478bd9Sstevel@tonic-gate { 9397c478bd9Sstevel@tonic-gate proc_t *p = curproc; 9407c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 9417c478bd9Sstevel@tonic-gate int filelimit; 9427c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 9437c478bd9Sstevel@tonic-gate int nfiles; 9447c478bd9Sstevel@tonic-gate int fd; 9457c478bd9Sstevel@tonic-gate 9467c478bd9Sstevel@tonic-gate /* 9477c478bd9Sstevel@tonic-gate * Assertion is to convince the correctness of the following 9487c478bd9Sstevel@tonic-gate * assignment for filelimit after casting to int. 9497c478bd9Sstevel@tonic-gate */ 9507c478bd9Sstevel@tonic-gate ASSERT(p->p_fno_ctl <= INT_MAX); 9517c478bd9Sstevel@tonic-gate filelimit = (int)p->p_fno_ctl; 9527c478bd9Sstevel@tonic-gate 9537c478bd9Sstevel@tonic-gate for (;;) { 9547c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 9557c478bd9Sstevel@tonic-gate fd = fd_find(fip, start); 956a5f69788Scraigm if (fd >= 0 && fd == fip->fi_badfd) { 957a5f69788Scraigm start = fd + 1; 958a5f69788Scraigm mutex_exit(&fip->fi_lock); 959a5f69788Scraigm continue; 960a5f69788Scraigm } 9617c478bd9Sstevel@tonic-gate if ((uint_t)fd < filelimit) 9627c478bd9Sstevel@tonic-gate break; 9637c478bd9Sstevel@tonic-gate if (fd >= filelimit) { 9647c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 9657c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 9667c478bd9Sstevel@tonic-gate (void) rctl_action(rctlproc_legacy[RLIMIT_NOFILE], 9677c478bd9Sstevel@tonic-gate p->p_rctls, p, RCA_SAFE); 9687c478bd9Sstevel@tonic-gate mutex_exit(&p->p_lock); 9697c478bd9Sstevel@tonic-gate return (-1); 9707c478bd9Sstevel@tonic-gate } 9717c478bd9Sstevel@tonic-gate /* fd_find() returned -1 */ 9727c478bd9Sstevel@tonic-gate nfiles = fip->fi_nfiles; 9737c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 9747c478bd9Sstevel@tonic-gate flist_grow(MAX(start, nfiles)); 9757c478bd9Sstevel@tonic-gate } 9767c478bd9Sstevel@tonic-gate 9777c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 9787c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, 1); 9797c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_file == NULL); 9807c478bd9Sstevel@tonic-gate ufp->uf_file = fp; 9817c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 9827c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 9837c478bd9Sstevel@tonic-gate return (fd); 9847c478bd9Sstevel@tonic-gate } 9857c478bd9Sstevel@tonic-gate 9867c478bd9Sstevel@tonic-gate /* 9877c478bd9Sstevel@tonic-gate * Allocate a user file descriptor greater than or equal to "start". 9887c478bd9Sstevel@tonic-gate */ 9897c478bd9Sstevel@tonic-gate int 9907c478bd9Sstevel@tonic-gate ufalloc(int start) 9917c478bd9Sstevel@tonic-gate { 9927c478bd9Sstevel@tonic-gate return (ufalloc_file(start, NULL)); 9937c478bd9Sstevel@tonic-gate } 9947c478bd9Sstevel@tonic-gate 9957c478bd9Sstevel@tonic-gate /* 9967c478bd9Sstevel@tonic-gate * Check that a future allocation of count fds on proc p has a good 9977c478bd9Sstevel@tonic-gate * chance of succeeding. If not, do rctl processing as if we'd failed 9987c478bd9Sstevel@tonic-gate * the allocation. 9997c478bd9Sstevel@tonic-gate * 10007c478bd9Sstevel@tonic-gate * Our caller must guarantee that p cannot disappear underneath us. 10017c478bd9Sstevel@tonic-gate */ 10027c478bd9Sstevel@tonic-gate int 10037c478bd9Sstevel@tonic-gate ufcanalloc(proc_t *p, uint_t count) 10047c478bd9Sstevel@tonic-gate { 10057c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 10067c478bd9Sstevel@tonic-gate int filelimit; 10077c478bd9Sstevel@tonic-gate int current; 10087c478bd9Sstevel@tonic-gate 10097c478bd9Sstevel@tonic-gate if (count == 0) 10107c478bd9Sstevel@tonic-gate return (1); 10117c478bd9Sstevel@tonic-gate 10127c478bd9Sstevel@tonic-gate ASSERT(p->p_fno_ctl <= INT_MAX); 10137c478bd9Sstevel@tonic-gate filelimit = (int)p->p_fno_ctl; 10147c478bd9Sstevel@tonic-gate 10157c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 10167c478bd9Sstevel@tonic-gate current = flist_nalloc(fip); /* # of in-use descriptors */ 10177c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 10187c478bd9Sstevel@tonic-gate 10197c478bd9Sstevel@tonic-gate /* 10207c478bd9Sstevel@tonic-gate * If count is a positive integer, the worst that can happen is 10217c478bd9Sstevel@tonic-gate * an overflow to a negative value, which is caught by the >= 0 check. 10227c478bd9Sstevel@tonic-gate */ 10237c478bd9Sstevel@tonic-gate current += count; 10247c478bd9Sstevel@tonic-gate if (count <= INT_MAX && current >= 0 && current <= filelimit) 10257c478bd9Sstevel@tonic-gate return (1); 10267c478bd9Sstevel@tonic-gate 10277c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 10287c478bd9Sstevel@tonic-gate (void) rctl_action(rctlproc_legacy[RLIMIT_NOFILE], 10297c478bd9Sstevel@tonic-gate p->p_rctls, p, RCA_SAFE); 10307c478bd9Sstevel@tonic-gate mutex_exit(&p->p_lock); 10317c478bd9Sstevel@tonic-gate return (0); 10327c478bd9Sstevel@tonic-gate } 10337c478bd9Sstevel@tonic-gate 10347c478bd9Sstevel@tonic-gate /* 10357c478bd9Sstevel@tonic-gate * Allocate a user file descriptor and a file structure. 10367c478bd9Sstevel@tonic-gate * Initialize the descriptor to point at the file structure. 10377c478bd9Sstevel@tonic-gate * If fdp is NULL, the user file descriptor will not be allocated. 10387c478bd9Sstevel@tonic-gate */ 10397c478bd9Sstevel@tonic-gate int 10407c478bd9Sstevel@tonic-gate falloc(vnode_t *vp, int flag, file_t **fpp, int *fdp) 10417c478bd9Sstevel@tonic-gate { 10427c478bd9Sstevel@tonic-gate file_t *fp; 10437c478bd9Sstevel@tonic-gate int fd; 10447c478bd9Sstevel@tonic-gate 10457c478bd9Sstevel@tonic-gate if (fdp) { 10467c478bd9Sstevel@tonic-gate if ((fd = ufalloc(0)) == -1) 10477c478bd9Sstevel@tonic-gate return (EMFILE); 10487c478bd9Sstevel@tonic-gate } 10497c478bd9Sstevel@tonic-gate fp = kmem_cache_alloc(file_cache, KM_SLEEP); 10507c478bd9Sstevel@tonic-gate /* 10517c478bd9Sstevel@tonic-gate * Note: falloc returns the fp locked 10527c478bd9Sstevel@tonic-gate */ 10537c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 10547c478bd9Sstevel@tonic-gate fp->f_count = 1; 10557c478bd9Sstevel@tonic-gate fp->f_flag = (ushort_t)flag; 10567c478bd9Sstevel@tonic-gate fp->f_vnode = vp; 10577c478bd9Sstevel@tonic-gate fp->f_offset = 0; 10587c478bd9Sstevel@tonic-gate fp->f_audit_data = 0; 10597c478bd9Sstevel@tonic-gate crhold(fp->f_cred = CRED()); 10607c478bd9Sstevel@tonic-gate /* 10617c478bd9Sstevel@tonic-gate * allocate resources to audit_data 10627c478bd9Sstevel@tonic-gate */ 10637c478bd9Sstevel@tonic-gate if (audit_active) 10647c478bd9Sstevel@tonic-gate audit_falloc(fp); 10657c478bd9Sstevel@tonic-gate *fpp = fp; 10667c478bd9Sstevel@tonic-gate if (fdp) 10677c478bd9Sstevel@tonic-gate *fdp = fd; 10687c478bd9Sstevel@tonic-gate return (0); 10697c478bd9Sstevel@tonic-gate } 10707c478bd9Sstevel@tonic-gate 10717c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 10727c478bd9Sstevel@tonic-gate static int 10737c478bd9Sstevel@tonic-gate file_cache_constructor(void *buf, void *cdrarg, int kmflags) 10747c478bd9Sstevel@tonic-gate { 10757c478bd9Sstevel@tonic-gate file_t *fp = buf; 10767c478bd9Sstevel@tonic-gate 10777c478bd9Sstevel@tonic-gate mutex_init(&fp->f_tlock, NULL, MUTEX_DEFAULT, NULL); 10787c478bd9Sstevel@tonic-gate return (0); 10797c478bd9Sstevel@tonic-gate } 10807c478bd9Sstevel@tonic-gate 10817c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 10827c478bd9Sstevel@tonic-gate static void 10837c478bd9Sstevel@tonic-gate file_cache_destructor(void *buf, void *cdrarg) 10847c478bd9Sstevel@tonic-gate { 10857c478bd9Sstevel@tonic-gate file_t *fp = buf; 10867c478bd9Sstevel@tonic-gate 10877c478bd9Sstevel@tonic-gate mutex_destroy(&fp->f_tlock); 10887c478bd9Sstevel@tonic-gate } 10897c478bd9Sstevel@tonic-gate 10907c478bd9Sstevel@tonic-gate void 10917c478bd9Sstevel@tonic-gate finit() 10927c478bd9Sstevel@tonic-gate { 10937c478bd9Sstevel@tonic-gate file_cache = kmem_cache_create("file_cache", sizeof (file_t), 0, 10947c478bd9Sstevel@tonic-gate file_cache_constructor, file_cache_destructor, NULL, NULL, NULL, 0); 10957c478bd9Sstevel@tonic-gate } 10967c478bd9Sstevel@tonic-gate 10977c478bd9Sstevel@tonic-gate void 10987c478bd9Sstevel@tonic-gate unfalloc(file_t *fp) 10997c478bd9Sstevel@tonic-gate { 11007c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fp->f_tlock)); 11017c478bd9Sstevel@tonic-gate if (--fp->f_count <= 0) { 11027c478bd9Sstevel@tonic-gate /* 11037c478bd9Sstevel@tonic-gate * deallocate resources to audit_data 11047c478bd9Sstevel@tonic-gate */ 11057c478bd9Sstevel@tonic-gate if (audit_active) 11067c478bd9Sstevel@tonic-gate audit_unfalloc(fp); 11077c478bd9Sstevel@tonic-gate crfree(fp->f_cred); 11087c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 11097c478bd9Sstevel@tonic-gate kmem_cache_free(file_cache, fp); 11107c478bd9Sstevel@tonic-gate } else 11117c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 11127c478bd9Sstevel@tonic-gate } 11137c478bd9Sstevel@tonic-gate 11147c478bd9Sstevel@tonic-gate /* 11157c478bd9Sstevel@tonic-gate * Given a file descriptor, set the user's 11167c478bd9Sstevel@tonic-gate * file pointer to the given parameter. 11177c478bd9Sstevel@tonic-gate */ 11187c478bd9Sstevel@tonic-gate void 11197c478bd9Sstevel@tonic-gate setf(int fd, file_t *fp) 11207c478bd9Sstevel@tonic-gate { 11217c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 11227c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 11237c478bd9Sstevel@tonic-gate 11247c478bd9Sstevel@tonic-gate if (audit_active) 11257c478bd9Sstevel@tonic-gate audit_setf(fp, fd); 11267c478bd9Sstevel@tonic-gate 11277c478bd9Sstevel@tonic-gate if (fp == NULL) { 11287c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 11297c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11307c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, -1); 11317c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 11327c478bd9Sstevel@tonic-gate } else { 11337c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11347c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_busy); 11357c478bd9Sstevel@tonic-gate } 11367c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 11377c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_flag == 0); 11387c478bd9Sstevel@tonic-gate ufp->uf_file = fp; 11397c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_wanted_cv); 11407c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 11417c478bd9Sstevel@tonic-gate } 11427c478bd9Sstevel@tonic-gate 11437c478bd9Sstevel@tonic-gate /* 11447c478bd9Sstevel@tonic-gate * Given a file descriptor, return the file table flags, plus, 11457c478bd9Sstevel@tonic-gate * if this is a socket in asynchronous mode, the FASYNC flag. 11467c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_getfl(). 11477c478bd9Sstevel@tonic-gate */ 11487c478bd9Sstevel@tonic-gate int 11497c478bd9Sstevel@tonic-gate f_getfl(int fd, int *flagp) 11507c478bd9Sstevel@tonic-gate { 11517c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 11527c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 11537c478bd9Sstevel@tonic-gate file_t *fp; 11547c478bd9Sstevel@tonic-gate int error; 11557c478bd9Sstevel@tonic-gate 11567c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 11577c478bd9Sstevel@tonic-gate error = EBADF; 11587c478bd9Sstevel@tonic-gate else { 11597c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11607c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) 11617c478bd9Sstevel@tonic-gate error = EBADF; 11627c478bd9Sstevel@tonic-gate else { 11637c478bd9Sstevel@tonic-gate vnode_t *vp = fp->f_vnode; 11647c478bd9Sstevel@tonic-gate int flag = fp->f_flag; 11657c478bd9Sstevel@tonic-gate 11667c478bd9Sstevel@tonic-gate /* 11677c478bd9Sstevel@tonic-gate * BSD fcntl() FASYNC compatibility. 11687c478bd9Sstevel@tonic-gate */ 1169*0f1702c5SYu Xiangning if (vp->v_type == VSOCK) 11707c478bd9Sstevel@tonic-gate flag |= sock_getfasync(vp); 11717c478bd9Sstevel@tonic-gate *flagp = flag; 11727c478bd9Sstevel@tonic-gate error = 0; 11737c478bd9Sstevel@tonic-gate } 11747c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 11757c478bd9Sstevel@tonic-gate } 11767c478bd9Sstevel@tonic-gate 11777c478bd9Sstevel@tonic-gate return (error); 11787c478bd9Sstevel@tonic-gate } 11797c478bd9Sstevel@tonic-gate 11807c478bd9Sstevel@tonic-gate /* 11817c478bd9Sstevel@tonic-gate * Given a file descriptor, return the user's file flags. 11827c478bd9Sstevel@tonic-gate * Force the FD_CLOEXEC flag for writable self-open /proc files. 11837c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_getfd_error(). 11847c478bd9Sstevel@tonic-gate */ 11857c478bd9Sstevel@tonic-gate int 11867c478bd9Sstevel@tonic-gate f_getfd_error(int fd, int *flagp) 11877c478bd9Sstevel@tonic-gate { 11887c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 11897c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 11907c478bd9Sstevel@tonic-gate file_t *fp; 11917c478bd9Sstevel@tonic-gate int flag; 11927c478bd9Sstevel@tonic-gate int error; 11937c478bd9Sstevel@tonic-gate 11947c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 11957c478bd9Sstevel@tonic-gate error = EBADF; 11967c478bd9Sstevel@tonic-gate else { 11977c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11987c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) 11997c478bd9Sstevel@tonic-gate error = EBADF; 12007c478bd9Sstevel@tonic-gate else { 12017c478bd9Sstevel@tonic-gate flag = ufp->uf_flag; 12027c478bd9Sstevel@tonic-gate if ((fp->f_flag & FWRITE) && pr_isself(fp->f_vnode)) 12037c478bd9Sstevel@tonic-gate flag |= FD_CLOEXEC; 12047c478bd9Sstevel@tonic-gate *flagp = flag; 12057c478bd9Sstevel@tonic-gate error = 0; 12067c478bd9Sstevel@tonic-gate } 12077c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 12087c478bd9Sstevel@tonic-gate } 12097c478bd9Sstevel@tonic-gate 12107c478bd9Sstevel@tonic-gate return (error); 12117c478bd9Sstevel@tonic-gate } 12127c478bd9Sstevel@tonic-gate 12137c478bd9Sstevel@tonic-gate /* 12147c478bd9Sstevel@tonic-gate * getf() must have been called before calling f_getfd(). 12157c478bd9Sstevel@tonic-gate */ 12167c478bd9Sstevel@tonic-gate char 12177c478bd9Sstevel@tonic-gate f_getfd(int fd) 12187c478bd9Sstevel@tonic-gate { 12197c478bd9Sstevel@tonic-gate int flag = 0; 12207c478bd9Sstevel@tonic-gate (void) f_getfd_error(fd, &flag); 12217c478bd9Sstevel@tonic-gate return ((char)flag); 12227c478bd9Sstevel@tonic-gate } 12237c478bd9Sstevel@tonic-gate 12247c478bd9Sstevel@tonic-gate /* 12257c478bd9Sstevel@tonic-gate * Given a file descriptor and file flags, set the user's file flags. 12267c478bd9Sstevel@tonic-gate * At present, the only valid flag is FD_CLOEXEC. 12277c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_setfd_error(). 12287c478bd9Sstevel@tonic-gate */ 12297c478bd9Sstevel@tonic-gate int 12307c478bd9Sstevel@tonic-gate f_setfd_error(int fd, int flags) 12317c478bd9Sstevel@tonic-gate { 12327c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 12337c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 12347c478bd9Sstevel@tonic-gate int error; 12357c478bd9Sstevel@tonic-gate 12367c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 12377c478bd9Sstevel@tonic-gate error = EBADF; 12387c478bd9Sstevel@tonic-gate else { 12397c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 12407c478bd9Sstevel@tonic-gate if (ufp->uf_file == NULL) 12417c478bd9Sstevel@tonic-gate error = EBADF; 12427c478bd9Sstevel@tonic-gate else { 12437c478bd9Sstevel@tonic-gate ufp->uf_flag = flags & FD_CLOEXEC; 12447c478bd9Sstevel@tonic-gate error = 0; 12457c478bd9Sstevel@tonic-gate } 12467c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 12477c478bd9Sstevel@tonic-gate } 12487c478bd9Sstevel@tonic-gate return (error); 12497c478bd9Sstevel@tonic-gate } 12507c478bd9Sstevel@tonic-gate 12517c478bd9Sstevel@tonic-gate void 12527c478bd9Sstevel@tonic-gate f_setfd(int fd, char flags) 12537c478bd9Sstevel@tonic-gate { 12547c478bd9Sstevel@tonic-gate (void) f_setfd_error(fd, flags); 12557c478bd9Sstevel@tonic-gate } 12567c478bd9Sstevel@tonic-gate 1257a5f69788Scraigm #define BADFD_MIN 3 1258a5f69788Scraigm #define BADFD_MAX 255 1259a5f69788Scraigm 1260a5f69788Scraigm /* 1261a5f69788Scraigm * Attempt to allocate a file descriptor which is bad and which 1262a5f69788Scraigm * is "poison" to the application. It cannot be closed (except 1263a5f69788Scraigm * on exec), allocated for a different use, etc. 1264a5f69788Scraigm */ 1265a5f69788Scraigm int 1266a5f69788Scraigm f_badfd(int start, int *fdp, int action) 1267a5f69788Scraigm { 1268a5f69788Scraigm int fdr; 1269a5f69788Scraigm int badfd; 1270a5f69788Scraigm uf_info_t *fip = P_FINFO(curproc); 1271a5f69788Scraigm 1272a5f69788Scraigm #ifdef _LP64 1273a5f69788Scraigm /* No restrictions on 64 bit _file */ 1274a5f69788Scraigm if (get_udatamodel() != DATAMODEL_ILP32) 1275a5f69788Scraigm return (EINVAL); 1276a5f69788Scraigm #endif 1277a5f69788Scraigm 1278a5f69788Scraigm if (start > BADFD_MAX || start < BADFD_MIN) 1279a5f69788Scraigm return (EINVAL); 1280a5f69788Scraigm 1281a5f69788Scraigm if (action >= NSIG || action < 0) 1282a5f69788Scraigm return (EINVAL); 1283a5f69788Scraigm 1284a5f69788Scraigm mutex_enter(&fip->fi_lock); 1285a5f69788Scraigm badfd = fip->fi_badfd; 1286a5f69788Scraigm mutex_exit(&fip->fi_lock); 1287a5f69788Scraigm 1288a5f69788Scraigm if (badfd != -1) 1289a5f69788Scraigm return (EAGAIN); 1290a5f69788Scraigm 1291a5f69788Scraigm fdr = ufalloc(start); 1292a5f69788Scraigm 1293a5f69788Scraigm if (fdr > BADFD_MAX) { 1294a5f69788Scraigm setf(fdr, NULL); 1295a5f69788Scraigm return (EMFILE); 1296a5f69788Scraigm } 1297a5f69788Scraigm if (fdr < 0) 1298a5f69788Scraigm return (EMFILE); 1299a5f69788Scraigm 1300a5f69788Scraigm mutex_enter(&fip->fi_lock); 1301a5f69788Scraigm if (fip->fi_badfd != -1) { 1302a5f69788Scraigm /* Lost race */ 1303a5f69788Scraigm mutex_exit(&fip->fi_lock); 1304a5f69788Scraigm setf(fdr, NULL); 1305a5f69788Scraigm return (EAGAIN); 1306a5f69788Scraigm } 1307a5f69788Scraigm fip->fi_action = action; 1308a5f69788Scraigm fip->fi_badfd = fdr; 1309a5f69788Scraigm mutex_exit(&fip->fi_lock); 1310a5f69788Scraigm setf(fdr, NULL); 1311a5f69788Scraigm 1312a5f69788Scraigm *fdp = fdr; 1313a5f69788Scraigm 1314a5f69788Scraigm return (0); 1315a5f69788Scraigm } 1316a5f69788Scraigm 13177c478bd9Sstevel@tonic-gate /* 13187c478bd9Sstevel@tonic-gate * Allocate a file descriptor and assign it to the vnode "*vpp", 13197c478bd9Sstevel@tonic-gate * performing the usual open protocol upon it and returning the 13207c478bd9Sstevel@tonic-gate * file descriptor allocated. It is the responsibility of the 13217c478bd9Sstevel@tonic-gate * caller to dispose of "*vpp" if any error occurs. 13227c478bd9Sstevel@tonic-gate */ 13237c478bd9Sstevel@tonic-gate int 13247c478bd9Sstevel@tonic-gate fassign(vnode_t **vpp, int mode, int *fdp) 13257c478bd9Sstevel@tonic-gate { 13267c478bd9Sstevel@tonic-gate file_t *fp; 13277c478bd9Sstevel@tonic-gate int error; 13287c478bd9Sstevel@tonic-gate int fd; 13297c478bd9Sstevel@tonic-gate 13307c478bd9Sstevel@tonic-gate if (error = falloc((vnode_t *)NULL, mode, &fp, &fd)) 13317c478bd9Sstevel@tonic-gate return (error); 1332da6c28aaSamw if (error = VOP_OPEN(vpp, mode, fp->f_cred, NULL)) { 13337c478bd9Sstevel@tonic-gate setf(fd, NULL); 13347c478bd9Sstevel@tonic-gate unfalloc(fp); 13357c478bd9Sstevel@tonic-gate return (error); 13367c478bd9Sstevel@tonic-gate } 13377c478bd9Sstevel@tonic-gate fp->f_vnode = *vpp; 13387c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 13397c478bd9Sstevel@tonic-gate /* 13407c478bd9Sstevel@tonic-gate * Fill in the slot falloc reserved. 13417c478bd9Sstevel@tonic-gate */ 13427c478bd9Sstevel@tonic-gate setf(fd, fp); 13437c478bd9Sstevel@tonic-gate *fdp = fd; 13447c478bd9Sstevel@tonic-gate return (0); 13457c478bd9Sstevel@tonic-gate } 13467c478bd9Sstevel@tonic-gate 13477c478bd9Sstevel@tonic-gate /* 13487c478bd9Sstevel@tonic-gate * When a process forks it must increment the f_count of all file pointers 13497c478bd9Sstevel@tonic-gate * since there is a new process pointing at them. fcnt_add(fip, 1) does this. 13507c478bd9Sstevel@tonic-gate * Since we are called when there is only 1 active lwp we don't need to 13517c478bd9Sstevel@tonic-gate * hold fi_lock or any uf_lock. If the fork fails, fork_fail() calls 13527c478bd9Sstevel@tonic-gate * fcnt_add(fip, -1) to restore the counts. 13537c478bd9Sstevel@tonic-gate */ 13547c478bd9Sstevel@tonic-gate void 13557c478bd9Sstevel@tonic-gate fcnt_add(uf_info_t *fip, int incr) 13567c478bd9Sstevel@tonic-gate { 13577c478bd9Sstevel@tonic-gate int i; 13587c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 13597c478bd9Sstevel@tonic-gate file_t *fp; 13607c478bd9Sstevel@tonic-gate 13617c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 13627c478bd9Sstevel@tonic-gate for (i = 0; i < fip->fi_nfiles; i++, ufp++) { 13637c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL) { 13647c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 13657c478bd9Sstevel@tonic-gate ASSERT((incr == 1 && fp->f_count >= 1) || 13667c478bd9Sstevel@tonic-gate (incr == -1 && fp->f_count >= 2)); 13677c478bd9Sstevel@tonic-gate fp->f_count += incr; 13687c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 13697c478bd9Sstevel@tonic-gate } 13707c478bd9Sstevel@tonic-gate } 13717c478bd9Sstevel@tonic-gate } 13727c478bd9Sstevel@tonic-gate 13737c478bd9Sstevel@tonic-gate /* 13747c478bd9Sstevel@tonic-gate * This is called from exec to close all fd's that have the FD_CLOEXEC flag 13757c478bd9Sstevel@tonic-gate * set and also to close all self-open for write /proc file descriptors. 13767c478bd9Sstevel@tonic-gate */ 13777c478bd9Sstevel@tonic-gate void 13787c478bd9Sstevel@tonic-gate close_exec(uf_info_t *fip) 13797c478bd9Sstevel@tonic-gate { 13807c478bd9Sstevel@tonic-gate int fd; 13817c478bd9Sstevel@tonic-gate file_t *fp; 13827c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 13837c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 13847c478bd9Sstevel@tonic-gate portfd_t *pfd; 13857c478bd9Sstevel@tonic-gate 13867c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 13877c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++, ufp++) { 13887c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 13897c478bd9Sstevel@tonic-gate ((ufp->uf_flag & FD_CLOEXEC) || 13907c478bd9Sstevel@tonic-gate ((fp->f_flag & FWRITE) && pr_isself(fp->f_vnode)))) { 13917c478bd9Sstevel@tonic-gate fpip = ufp->uf_fpollinfo; 13927c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 13937c478bd9Sstevel@tonic-gate mutex_enter(&ufp->uf_lock); 13947c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, -1); 13957c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 13967c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 13977c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = NULL; 13987c478bd9Sstevel@tonic-gate ufp->uf_flag = 0; 13997c478bd9Sstevel@tonic-gate /* 14007c478bd9Sstevel@tonic-gate * We may need to cleanup some cached poll states 14017c478bd9Sstevel@tonic-gate * in t_pollstate before the fd can be reused. It 14027c478bd9Sstevel@tonic-gate * is important that we don't access a stale thread 14037c478bd9Sstevel@tonic-gate * structure. We will do the cleanup in two 14047c478bd9Sstevel@tonic-gate * phases to avoid deadlock and holding uf_lock for 14057c478bd9Sstevel@tonic-gate * too long. In phase 1, hold the uf_lock and call 14067c478bd9Sstevel@tonic-gate * pollblockexit() to set state in t_pollstate struct 14077c478bd9Sstevel@tonic-gate * so that a thread does not exit on us. In phase 2, 14087c478bd9Sstevel@tonic-gate * we drop the uf_lock and call pollcacheclean(). 14097c478bd9Sstevel@tonic-gate */ 14107c478bd9Sstevel@tonic-gate pfd = ufp->uf_portfd; 14117c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 14127c478bd9Sstevel@tonic-gate if (fpip != NULL) 14137c478bd9Sstevel@tonic-gate pollblockexit(fpip); 14147c478bd9Sstevel@tonic-gate mutex_exit(&ufp->uf_lock); 14157c478bd9Sstevel@tonic-gate if (fpip != NULL) 14167c478bd9Sstevel@tonic-gate pollcacheclean(fpip, fd); 14177c478bd9Sstevel@tonic-gate if (pfd) 141861b4b1efSpraks port_close_fd(pfd); 14197c478bd9Sstevel@tonic-gate (void) closef(fp); 14207c478bd9Sstevel@tonic-gate } 14217c478bd9Sstevel@tonic-gate } 1422a5f69788Scraigm 1423a5f69788Scraigm /* Reset bad fd */ 1424a5f69788Scraigm fip->fi_badfd = -1; 1425a5f69788Scraigm fip->fi_action = -1; 14267c478bd9Sstevel@tonic-gate } 14277c478bd9Sstevel@tonic-gate 14287c478bd9Sstevel@tonic-gate /* 14297c478bd9Sstevel@tonic-gate * Common routine for modifying attributes of named files. 14307c478bd9Sstevel@tonic-gate */ 14317c478bd9Sstevel@tonic-gate int 14327c478bd9Sstevel@tonic-gate namesetattr(char *fnamep, enum symfollow followlink, vattr_t *vap, int flags) 14337c478bd9Sstevel@tonic-gate { 14347c478bd9Sstevel@tonic-gate vnode_t *vp; 14357c478bd9Sstevel@tonic-gate int error = 0; 14367c478bd9Sstevel@tonic-gate 14377c478bd9Sstevel@tonic-gate if (error = lookupname(fnamep, UIO_USERSPACE, followlink, NULLVPP, &vp)) 14387c478bd9Sstevel@tonic-gate return (set_errno(error)); 14397c478bd9Sstevel@tonic-gate if (error = vpsetattr(vp, vap, flags)) 14407c478bd9Sstevel@tonic-gate (void) set_errno(error); 14417c478bd9Sstevel@tonic-gate VN_RELE(vp); 14427c478bd9Sstevel@tonic-gate return (error); 14437c478bd9Sstevel@tonic-gate } 14447c478bd9Sstevel@tonic-gate 14457c478bd9Sstevel@tonic-gate /* 14467c478bd9Sstevel@tonic-gate * Common routine for modifying attributes of files referenced 14477c478bd9Sstevel@tonic-gate * by descriptor. 14487c478bd9Sstevel@tonic-gate */ 14497c478bd9Sstevel@tonic-gate int 14507c478bd9Sstevel@tonic-gate fdsetattr(int fd, vattr_t *vap) 14517c478bd9Sstevel@tonic-gate { 14527c478bd9Sstevel@tonic-gate file_t *fp; 14537c478bd9Sstevel@tonic-gate vnode_t *vp; 14547c478bd9Sstevel@tonic-gate int error = 0; 14557c478bd9Sstevel@tonic-gate 14567c478bd9Sstevel@tonic-gate if ((fp = getf(fd)) != NULL) { 14577c478bd9Sstevel@tonic-gate vp = fp->f_vnode; 14587c478bd9Sstevel@tonic-gate if (error = vpsetattr(vp, vap, 0)) { 14597c478bd9Sstevel@tonic-gate (void) set_errno(error); 14607c478bd9Sstevel@tonic-gate } 14617c478bd9Sstevel@tonic-gate releasef(fd); 14627c478bd9Sstevel@tonic-gate } else 14637c478bd9Sstevel@tonic-gate error = set_errno(EBADF); 14647c478bd9Sstevel@tonic-gate return (error); 14657c478bd9Sstevel@tonic-gate } 14667c478bd9Sstevel@tonic-gate 14677c478bd9Sstevel@tonic-gate /* 14687c478bd9Sstevel@tonic-gate * Common routine to set the attributes for the given vnode. 14697c478bd9Sstevel@tonic-gate * If the vnode is a file and the filesize is being manipulated, 14707c478bd9Sstevel@tonic-gate * this makes sure that there are no conflicting non-blocking 14717c478bd9Sstevel@tonic-gate * mandatory locks in that region. 14727c478bd9Sstevel@tonic-gate */ 14737c478bd9Sstevel@tonic-gate static int 14747c478bd9Sstevel@tonic-gate vpsetattr(vnode_t *vp, vattr_t *vap, int flags) 14757c478bd9Sstevel@tonic-gate { 14767c478bd9Sstevel@tonic-gate int error = 0; 14777c478bd9Sstevel@tonic-gate int in_crit = 0; 14787c478bd9Sstevel@tonic-gate u_offset_t begin; 14797c478bd9Sstevel@tonic-gate vattr_t vattr; 14807c478bd9Sstevel@tonic-gate ssize_t length; 14817c478bd9Sstevel@tonic-gate 14827c478bd9Sstevel@tonic-gate if (vn_is_readonly(vp)) { 14837c478bd9Sstevel@tonic-gate error = EROFS; 14847c478bd9Sstevel@tonic-gate } 14857c478bd9Sstevel@tonic-gate if (!error && (vap->va_mask & AT_SIZE) && 14867c478bd9Sstevel@tonic-gate nbl_need_check(vp)) { 14877c478bd9Sstevel@tonic-gate nbl_start_crit(vp, RW_READER); 14887c478bd9Sstevel@tonic-gate in_crit = 1; 14897c478bd9Sstevel@tonic-gate vattr.va_mask = AT_SIZE; 1490da6c28aaSamw if (!(error = VOP_GETATTR(vp, &vattr, 0, CRED(), NULL))) { 14917c478bd9Sstevel@tonic-gate begin = vap->va_size > vattr.va_size ? 14927c478bd9Sstevel@tonic-gate vattr.va_size : vap->va_size; 14937c478bd9Sstevel@tonic-gate length = vattr.va_size > vap->va_size ? 14947c478bd9Sstevel@tonic-gate vattr.va_size - vap->va_size : 14957c478bd9Sstevel@tonic-gate vap->va_size - vattr.va_size; 14967c478bd9Sstevel@tonic-gate 1497da6c28aaSamw if (nbl_conflict(vp, NBL_WRITE, begin, length, 0, 1498da6c28aaSamw NULL)) { 14997c478bd9Sstevel@tonic-gate error = EACCES; 15007c478bd9Sstevel@tonic-gate } 15017c478bd9Sstevel@tonic-gate } 15027c478bd9Sstevel@tonic-gate } 15037c478bd9Sstevel@tonic-gate if (!error) 15047c478bd9Sstevel@tonic-gate error = VOP_SETATTR(vp, vap, flags, CRED(), NULL); 15057c478bd9Sstevel@tonic-gate 15067c478bd9Sstevel@tonic-gate if (in_crit) 15077c478bd9Sstevel@tonic-gate nbl_end_crit(vp); 15087c478bd9Sstevel@tonic-gate 15097c478bd9Sstevel@tonic-gate return (error); 15107c478bd9Sstevel@tonic-gate } 15117c478bd9Sstevel@tonic-gate 15127c478bd9Sstevel@tonic-gate /* 15137c478bd9Sstevel@tonic-gate * Return true if the given vnode is referenced by any 15147c478bd9Sstevel@tonic-gate * entry in the current process's file descriptor table. 15157c478bd9Sstevel@tonic-gate */ 15167c478bd9Sstevel@tonic-gate int 15177c478bd9Sstevel@tonic-gate fisopen(vnode_t *vp) 15187c478bd9Sstevel@tonic-gate { 15197c478bd9Sstevel@tonic-gate int fd; 15207c478bd9Sstevel@tonic-gate file_t *fp; 15217c478bd9Sstevel@tonic-gate vnode_t *ovp; 15227c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 15237c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 15247c478bd9Sstevel@tonic-gate 15257c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 15267c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 15277c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 15287c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 15297c478bd9Sstevel@tonic-gate (ovp = fp->f_vnode) != NULL && VN_CMP(vp, ovp)) { 15307c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 15317c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 15327c478bd9Sstevel@tonic-gate return (1); 15337c478bd9Sstevel@tonic-gate } 15347c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 15357c478bd9Sstevel@tonic-gate } 15367c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 15377c478bd9Sstevel@tonic-gate return (0); 15387c478bd9Sstevel@tonic-gate } 15397c478bd9Sstevel@tonic-gate 15407c478bd9Sstevel@tonic-gate /* 15417c478bd9Sstevel@tonic-gate * Return zero if at least one file currently open (by curproc) shouldn't be 15427c478bd9Sstevel@tonic-gate * allowed to change zones. 15437c478bd9Sstevel@tonic-gate */ 15447c478bd9Sstevel@tonic-gate int 15457c478bd9Sstevel@tonic-gate files_can_change_zones(void) 15467c478bd9Sstevel@tonic-gate { 15477c478bd9Sstevel@tonic-gate int fd; 15487c478bd9Sstevel@tonic-gate file_t *fp; 15497c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 15507c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 15517c478bd9Sstevel@tonic-gate 15527c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 15537c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 15547c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 15557c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 15567c478bd9Sstevel@tonic-gate !vn_can_change_zones(fp->f_vnode)) { 15577c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 15587c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 15597c478bd9Sstevel@tonic-gate return (0); 15607c478bd9Sstevel@tonic-gate } 15617c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 15627c478bd9Sstevel@tonic-gate } 15637c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 15647c478bd9Sstevel@tonic-gate return (1); 15657c478bd9Sstevel@tonic-gate } 15667c478bd9Sstevel@tonic-gate 15677c478bd9Sstevel@tonic-gate #ifdef DEBUG 15687c478bd9Sstevel@tonic-gate 15697c478bd9Sstevel@tonic-gate /* 15707c478bd9Sstevel@tonic-gate * The following functions are only used in ASSERT()s elsewhere. 15717c478bd9Sstevel@tonic-gate * They do not modify the state of the system. 15727c478bd9Sstevel@tonic-gate */ 15737c478bd9Sstevel@tonic-gate 15747c478bd9Sstevel@tonic-gate /* 15757c478bd9Sstevel@tonic-gate * Return true (1) if the current thread is in the fpollinfo 15767c478bd9Sstevel@tonic-gate * list for this file descriptor, else false (0). 15777c478bd9Sstevel@tonic-gate */ 15787c478bd9Sstevel@tonic-gate static int 15797c478bd9Sstevel@tonic-gate curthread_in_plist(uf_entry_t *ufp) 15807c478bd9Sstevel@tonic-gate { 15817c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 15827c478bd9Sstevel@tonic-gate 15837c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&ufp->uf_lock)); 15847c478bd9Sstevel@tonic-gate for (fpip = ufp->uf_fpollinfo; fpip; fpip = fpip->fp_next) 15857c478bd9Sstevel@tonic-gate if (fpip->fp_thread == curthread) 15867c478bd9Sstevel@tonic-gate return (1); 15877c478bd9Sstevel@tonic-gate return (0); 15887c478bd9Sstevel@tonic-gate } 15897c478bd9Sstevel@tonic-gate 15907c478bd9Sstevel@tonic-gate /* 15917c478bd9Sstevel@tonic-gate * Sanity check to make sure that after lwp_exit(), 15927c478bd9Sstevel@tonic-gate * curthread does not appear on any fd's fpollinfo list. 15937c478bd9Sstevel@tonic-gate */ 15947c478bd9Sstevel@tonic-gate void 15957c478bd9Sstevel@tonic-gate checkfpollinfo(void) 15967c478bd9Sstevel@tonic-gate { 15977c478bd9Sstevel@tonic-gate int fd; 15987c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 15997c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 16007c478bd9Sstevel@tonic-gate 16017c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 16027c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 16037c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16047c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 16057c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16067c478bd9Sstevel@tonic-gate } 16077c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 16087c478bd9Sstevel@tonic-gate } 16097c478bd9Sstevel@tonic-gate 16107c478bd9Sstevel@tonic-gate /* 16117c478bd9Sstevel@tonic-gate * Return true (1) if the current thread is in the fpollinfo 16127c478bd9Sstevel@tonic-gate * list for this file descriptor, else false (0). 16137c478bd9Sstevel@tonic-gate * This is the same as curthread_in_plist(), 16147c478bd9Sstevel@tonic-gate * but is called w/o holding uf_lock. 16157c478bd9Sstevel@tonic-gate */ 16167c478bd9Sstevel@tonic-gate int 16177c478bd9Sstevel@tonic-gate infpollinfo(int fd) 16187c478bd9Sstevel@tonic-gate { 16197c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16207c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 16217c478bd9Sstevel@tonic-gate int rc; 16227c478bd9Sstevel@tonic-gate 16237c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16247c478bd9Sstevel@tonic-gate rc = curthread_in_plist(ufp); 16257c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16267c478bd9Sstevel@tonic-gate return (rc); 16277c478bd9Sstevel@tonic-gate } 16287c478bd9Sstevel@tonic-gate 16297c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 16307c478bd9Sstevel@tonic-gate 16317c478bd9Sstevel@tonic-gate /* 16327c478bd9Sstevel@tonic-gate * Add the curthread to fpollinfo list, meaning this fd is currently in the 16337c478bd9Sstevel@tonic-gate * thread's poll cache. Each lwp polling this file descriptor should call 16347c478bd9Sstevel@tonic-gate * this routine once. 16357c478bd9Sstevel@tonic-gate */ 16367c478bd9Sstevel@tonic-gate void 16377c478bd9Sstevel@tonic-gate addfpollinfo(int fd) 16387c478bd9Sstevel@tonic-gate { 16397c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 16407c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 16417c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16427c478bd9Sstevel@tonic-gate 16437c478bd9Sstevel@tonic-gate fpip = kmem_zalloc(sizeof (fpollinfo_t), KM_SLEEP); 16447c478bd9Sstevel@tonic-gate fpip->fp_thread = curthread; 16457c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16467c478bd9Sstevel@tonic-gate /* 16477c478bd9Sstevel@tonic-gate * Assert we are not already on the list, that is, that 16487c478bd9Sstevel@tonic-gate * this lwp did not call addfpollinfo twice for the same fd. 16497c478bd9Sstevel@tonic-gate */ 16507c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 16517c478bd9Sstevel@tonic-gate /* 16527c478bd9Sstevel@tonic-gate * addfpollinfo is always done inside the getf/releasef pair. 16537c478bd9Sstevel@tonic-gate */ 16547c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 16557c478bd9Sstevel@tonic-gate fpip->fp_next = ufp->uf_fpollinfo; 16567c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = fpip; 16577c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16587c478bd9Sstevel@tonic-gate } 16597c478bd9Sstevel@tonic-gate 16607c478bd9Sstevel@tonic-gate /* 16617c478bd9Sstevel@tonic-gate * delete curthread from fpollinfo list. 16627c478bd9Sstevel@tonic-gate */ 16637c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 16647c478bd9Sstevel@tonic-gate void 16657c478bd9Sstevel@tonic-gate delfpollinfo(int fd) 16667c478bd9Sstevel@tonic-gate { 16677c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 16687c478bd9Sstevel@tonic-gate struct fpollinfo *fpip; 16697c478bd9Sstevel@tonic-gate struct fpollinfo **fpipp; 16707c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16717c478bd9Sstevel@tonic-gate 16727c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16737c478bd9Sstevel@tonic-gate if (ufp->uf_fpollinfo == NULL) { 16747c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16757c478bd9Sstevel@tonic-gate return; 16767c478bd9Sstevel@tonic-gate } 16777c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_busy); 16787c478bd9Sstevel@tonic-gate /* 16797c478bd9Sstevel@tonic-gate * Find and delete curthread from the list. 16807c478bd9Sstevel@tonic-gate */ 16817c478bd9Sstevel@tonic-gate fpipp = &ufp->uf_fpollinfo; 16827c478bd9Sstevel@tonic-gate while ((fpip = *fpipp)->fp_thread != curthread) 16837c478bd9Sstevel@tonic-gate fpipp = &fpip->fp_next; 16847c478bd9Sstevel@tonic-gate *fpipp = fpip->fp_next; 16857c478bd9Sstevel@tonic-gate kmem_free(fpip, sizeof (fpollinfo_t)); 16867c478bd9Sstevel@tonic-gate /* 16877c478bd9Sstevel@tonic-gate * Assert that we are not still on the list, that is, that 16887c478bd9Sstevel@tonic-gate * this lwp did not call addfpollinfo twice for the same fd. 16897c478bd9Sstevel@tonic-gate */ 16907c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 16917c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16927c478bd9Sstevel@tonic-gate } 16937c478bd9Sstevel@tonic-gate 16947c478bd9Sstevel@tonic-gate /* 16957c478bd9Sstevel@tonic-gate * fd is associated with a port. pfd is a pointer to the fd entry in the 16967c478bd9Sstevel@tonic-gate * cache of the port. 16977c478bd9Sstevel@tonic-gate */ 16987c478bd9Sstevel@tonic-gate 16997c478bd9Sstevel@tonic-gate void 17007c478bd9Sstevel@tonic-gate addfd_port(int fd, portfd_t *pfd) 17017c478bd9Sstevel@tonic-gate { 17027c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 17037c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 17047c478bd9Sstevel@tonic-gate 17057c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 17067c478bd9Sstevel@tonic-gate /* 17077c478bd9Sstevel@tonic-gate * addfd_port is always done inside the getf/releasef pair. 17087c478bd9Sstevel@tonic-gate */ 17097c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 17107c478bd9Sstevel@tonic-gate if (ufp->uf_portfd == NULL) { 17117c478bd9Sstevel@tonic-gate /* first entry */ 17127c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd; 17137c478bd9Sstevel@tonic-gate pfd->pfd_next = NULL; 17147c478bd9Sstevel@tonic-gate } else { 17157c478bd9Sstevel@tonic-gate pfd->pfd_next = ufp->uf_portfd; 17167c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd; 17177c478bd9Sstevel@tonic-gate pfd->pfd_next->pfd_prev = pfd; 17187c478bd9Sstevel@tonic-gate } 17197c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 17207c478bd9Sstevel@tonic-gate } 17217c478bd9Sstevel@tonic-gate 17227c478bd9Sstevel@tonic-gate void 17237c478bd9Sstevel@tonic-gate delfd_port(int fd, portfd_t *pfd) 17247c478bd9Sstevel@tonic-gate { 17257c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 17267c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 17277c478bd9Sstevel@tonic-gate 17287c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 17297c478bd9Sstevel@tonic-gate /* 17307c478bd9Sstevel@tonic-gate * delfd_port is always done inside the getf/releasef pair. 17317c478bd9Sstevel@tonic-gate */ 17327c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 17337c478bd9Sstevel@tonic-gate if (ufp->uf_portfd == pfd) { 17347c478bd9Sstevel@tonic-gate /* remove first entry */ 17357c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd->pfd_next; 17367c478bd9Sstevel@tonic-gate } else { 17377c478bd9Sstevel@tonic-gate pfd->pfd_prev->pfd_next = pfd->pfd_next; 17387c478bd9Sstevel@tonic-gate if (pfd->pfd_next != NULL) 17397c478bd9Sstevel@tonic-gate pfd->pfd_next->pfd_prev = pfd->pfd_prev; 17407c478bd9Sstevel@tonic-gate } 17417c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 17427c478bd9Sstevel@tonic-gate } 17437c478bd9Sstevel@tonic-gate 17447c478bd9Sstevel@tonic-gate static void 174561b4b1efSpraks port_close_fd(portfd_t *pfd) 17467c478bd9Sstevel@tonic-gate { 17477c478bd9Sstevel@tonic-gate portfd_t *pfdn; 17487c478bd9Sstevel@tonic-gate 174961b4b1efSpraks /* 175061b4b1efSpraks * At this point, no other thread should access 175161b4b1efSpraks * the portfd_t list for this fd. The uf_file, uf_portfd 175261b4b1efSpraks * pointers in the uf_entry_t struct for this fd would 175361b4b1efSpraks * be set to NULL. 175461b4b1efSpraks */ 17557c478bd9Sstevel@tonic-gate for (; pfd != NULL; pfd = pfdn) { 17567c478bd9Sstevel@tonic-gate pfdn = pfd->pfd_next; 17577c478bd9Sstevel@tonic-gate port_close_pfd(pfd); 17587c478bd9Sstevel@tonic-gate } 17597c478bd9Sstevel@tonic-gate } 1760