17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5a5f69788Scraigm * Common Development and Distribution License (the "License"). 6a5f69788Scraigm * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 21a5f69788Scraigm 227c478bd9Sstevel@tonic-gate /* 23f57e3e4cSRoger A. Faulkner * Copyright (c) 1989, 2010, Oracle and/or its affiliates. All rights reserved. 24b0f673c4SBryan Cantrill * Copyright (c) 2012, Joyent Inc. All rights reserved. 257c478bd9Sstevel@tonic-gate */ 267c478bd9Sstevel@tonic-gate 27236317e1SRoger A. Faulkner /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ 28236317e1SRoger A. Faulkner /* All Rights Reserved */ 29236317e1SRoger A. Faulkner 307c478bd9Sstevel@tonic-gate #include <sys/types.h> 317c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h> 327c478bd9Sstevel@tonic-gate #include <sys/param.h> 337c478bd9Sstevel@tonic-gate #include <sys/systm.h> 347c478bd9Sstevel@tonic-gate #include <sys/errno.h> 357c478bd9Sstevel@tonic-gate #include <sys/signal.h> 367c478bd9Sstevel@tonic-gate #include <sys/cred.h> 377c478bd9Sstevel@tonic-gate #include <sys/user.h> 387c478bd9Sstevel@tonic-gate #include <sys/conf.h> 397c478bd9Sstevel@tonic-gate #include <sys/vfs.h> 407c478bd9Sstevel@tonic-gate #include <sys/vnode.h> 417c478bd9Sstevel@tonic-gate #include <sys/pathname.h> 427c478bd9Sstevel@tonic-gate #include <sys/file.h> 437c478bd9Sstevel@tonic-gate #include <sys/proc.h> 447c478bd9Sstevel@tonic-gate #include <sys/var.h> 457c478bd9Sstevel@tonic-gate #include <sys/cpuvar.h> 467c478bd9Sstevel@tonic-gate #include <sys/open.h> 477c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h> 487c478bd9Sstevel@tonic-gate #include <sys/priocntl.h> 497c478bd9Sstevel@tonic-gate #include <sys/procset.h> 507c478bd9Sstevel@tonic-gate #include <sys/prsystm.h> 517c478bd9Sstevel@tonic-gate #include <sys/debug.h> 527c478bd9Sstevel@tonic-gate #include <sys/kmem.h> 537c478bd9Sstevel@tonic-gate #include <sys/atomic.h> 547c478bd9Sstevel@tonic-gate #include <sys/fcntl.h> 557c478bd9Sstevel@tonic-gate #include <sys/poll.h> 567c478bd9Sstevel@tonic-gate #include <sys/rctl.h> 577c478bd9Sstevel@tonic-gate #include <sys/port_impl.h> 58b0f673c4SBryan Cantrill #include <sys/dtrace.h> 597c478bd9Sstevel@tonic-gate 607c478bd9Sstevel@tonic-gate #include <c2/audit.h> 617c478bd9Sstevel@tonic-gate #include <sys/nbmlock.h> 627c478bd9Sstevel@tonic-gate 637c478bd9Sstevel@tonic-gate #ifdef DEBUG 647c478bd9Sstevel@tonic-gate 657c478bd9Sstevel@tonic-gate static uint32_t afd_maxfd; /* # of entries in maximum allocated array */ 667c478bd9Sstevel@tonic-gate static uint32_t afd_alloc; /* count of kmem_alloc()s */ 677c478bd9Sstevel@tonic-gate static uint32_t afd_free; /* count of kmem_free()s */ 687c478bd9Sstevel@tonic-gate static uint32_t afd_wait; /* count of waits on non-zero ref count */ 697c478bd9Sstevel@tonic-gate #define MAXFD(x) (afd_maxfd = ((afd_maxfd >= (x))? afd_maxfd : (x))) 701a5e258fSJosef 'Jeff' Sipek #define COUNT(x) atomic_inc_32(&x) 717c478bd9Sstevel@tonic-gate 727c478bd9Sstevel@tonic-gate #else /* DEBUG */ 737c478bd9Sstevel@tonic-gate 747c478bd9Sstevel@tonic-gate #define MAXFD(x) 757c478bd9Sstevel@tonic-gate #define COUNT(x) 767c478bd9Sstevel@tonic-gate 777c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 787c478bd9Sstevel@tonic-gate 797c478bd9Sstevel@tonic-gate kmem_cache_t *file_cache; 807c478bd9Sstevel@tonic-gate 8161b4b1efSpraks static void port_close_fd(portfd_t *); 827c478bd9Sstevel@tonic-gate 837c478bd9Sstevel@tonic-gate /* 847c478bd9Sstevel@tonic-gate * File descriptor allocation. 857c478bd9Sstevel@tonic-gate * 867c478bd9Sstevel@tonic-gate * fd_find(fip, minfd) finds the first available descriptor >= minfd. 877c478bd9Sstevel@tonic-gate * The most common case is open(2), in which minfd = 0, but we must also 887c478bd9Sstevel@tonic-gate * support fcntl(fd, F_DUPFD, minfd). 897c478bd9Sstevel@tonic-gate * 907c478bd9Sstevel@tonic-gate * The algorithm is as follows: we keep all file descriptors in an infix 917c478bd9Sstevel@tonic-gate * binary tree in which each node records the number of descriptors 927c478bd9Sstevel@tonic-gate * allocated in its right subtree, including itself. Starting at minfd, 937c478bd9Sstevel@tonic-gate * we ascend the tree until we find a non-fully allocated right subtree. 947c478bd9Sstevel@tonic-gate * We then descend that subtree in a binary search for the smallest fd. 957c478bd9Sstevel@tonic-gate * Finally, we ascend the tree again to increment the allocation count 967c478bd9Sstevel@tonic-gate * of every subtree containing the newly-allocated fd. Freeing an fd 977c478bd9Sstevel@tonic-gate * requires only the last step: we ascend the tree to decrement allocation 987c478bd9Sstevel@tonic-gate * counts. Each of these three steps (ascent to find non-full subtree, 997c478bd9Sstevel@tonic-gate * descent to find lowest fd, ascent to update allocation counts) is 1007c478bd9Sstevel@tonic-gate * O(log n), thus the algorithm as a whole is O(log n). 1017c478bd9Sstevel@tonic-gate * 1027c478bd9Sstevel@tonic-gate * We don't implement the fd tree using the customary left/right/parent 1037c478bd9Sstevel@tonic-gate * pointers, but instead take advantage of the glorious mathematics of 1047c478bd9Sstevel@tonic-gate * full infix binary trees. For reference, here's an illustration of the 1057c478bd9Sstevel@tonic-gate * logical structure of such a tree, rooted at 4 (binary 100), covering 1067c478bd9Sstevel@tonic-gate * the range 1-7 (binary 001-111). Our canonical trees do not include 1077c478bd9Sstevel@tonic-gate * fd 0; we'll deal with that later. 1087c478bd9Sstevel@tonic-gate * 1097c478bd9Sstevel@tonic-gate * 100 1107c478bd9Sstevel@tonic-gate * / \ 1117c478bd9Sstevel@tonic-gate * / \ 1127c478bd9Sstevel@tonic-gate * 010 110 1137c478bd9Sstevel@tonic-gate * / \ / \ 1147c478bd9Sstevel@tonic-gate * 001 011 101 111 1157c478bd9Sstevel@tonic-gate * 1167c478bd9Sstevel@tonic-gate * We make the following observations, all of which are easily proven by 1177c478bd9Sstevel@tonic-gate * induction on the depth of the tree: 1187c478bd9Sstevel@tonic-gate * 1197c478bd9Sstevel@tonic-gate * (T1) The least-significant bit (LSB) of any node is equal to its level 1207c478bd9Sstevel@tonic-gate * in the tree. In our example, nodes 001, 011, 101 and 111 are at 1217c478bd9Sstevel@tonic-gate * level 0; nodes 010 and 110 are at level 1; and node 100 is at level 2. 1227c478bd9Sstevel@tonic-gate * 1237c478bd9Sstevel@tonic-gate * (T2) The child size (CSIZE) of node N -- that is, the total number of 1247c478bd9Sstevel@tonic-gate * right-branch descendants in a child of node N, including itself -- is 1257c478bd9Sstevel@tonic-gate * given by clearing all but the least significant bit of N. This 1267c478bd9Sstevel@tonic-gate * follows immediately from (T1). Applying this rule to our example, we 1277c478bd9Sstevel@tonic-gate * see that CSIZE(100) = 100, CSIZE(x10) = 10, and CSIZE(xx1) = 1. 1287c478bd9Sstevel@tonic-gate * 1297c478bd9Sstevel@tonic-gate * (T3) The nearest left ancestor (LPARENT) of node N -- that is, the nearest 1307c478bd9Sstevel@tonic-gate * ancestor containing node N in its right child -- is given by clearing 1317c478bd9Sstevel@tonic-gate * the LSB of N. For example, LPARENT(111) = 110 and LPARENT(110) = 100. 1327c478bd9Sstevel@tonic-gate * Clearing the LSB of nodes 001, 010 or 100 yields zero, reflecting 1337c478bd9Sstevel@tonic-gate * the fact that these are leftmost nodes. Note that this algorithm 1347c478bd9Sstevel@tonic-gate * automatically skips generations as necessary. For example, the parent 1357c478bd9Sstevel@tonic-gate * of node 101 is 110, which is a *right* ancestor (not what we want); 1367c478bd9Sstevel@tonic-gate * but its grandparent is 100, which is a left ancestor. Clearing the LSB 1377c478bd9Sstevel@tonic-gate * of 101 gets us to 100 directly, skipping right past the uninteresting 1387c478bd9Sstevel@tonic-gate * generation (110). 1397c478bd9Sstevel@tonic-gate * 1407c478bd9Sstevel@tonic-gate * Note that since LPARENT clears the LSB, whereas CSIZE clears all *but* 1417c478bd9Sstevel@tonic-gate * the LSB, we can express LPARENT() nicely in terms of CSIZE(): 1427c478bd9Sstevel@tonic-gate * 1437c478bd9Sstevel@tonic-gate * LPARENT(N) = N - CSIZE(N) 1447c478bd9Sstevel@tonic-gate * 1457c478bd9Sstevel@tonic-gate * (T4) The nearest right ancestor (RPARENT) of node N is given by: 1467c478bd9Sstevel@tonic-gate * 1477c478bd9Sstevel@tonic-gate * RPARENT(N) = N + CSIZE(N) 1487c478bd9Sstevel@tonic-gate * 1497c478bd9Sstevel@tonic-gate * (T5) For every interior node, the children differ from their parent by 1507c478bd9Sstevel@tonic-gate * CSIZE(parent) / 2. In our example, CSIZE(100) / 2 = 2 = 10 binary, 1517c478bd9Sstevel@tonic-gate * and indeed, the children of 100 are 100 +/- 10 = 010 and 110. 1527c478bd9Sstevel@tonic-gate * 1537c478bd9Sstevel@tonic-gate * Next, we'll need a few two's-complement math tricks. Suppose a number, 1547c478bd9Sstevel@tonic-gate * N, has the following form: 1557c478bd9Sstevel@tonic-gate * 1567c478bd9Sstevel@tonic-gate * N = xxxx10...0 1577c478bd9Sstevel@tonic-gate * 1587c478bd9Sstevel@tonic-gate * That is, the binary representation of N consists of some string of bits, 1597c478bd9Sstevel@tonic-gate * then a 1, then all zeroes. This amounts to nothing more than saying that 1607c478bd9Sstevel@tonic-gate * N has a least-significant bit, which is true for any N != 0. If we look 1617c478bd9Sstevel@tonic-gate * at N and N - 1 together, we see that we can combine them in useful ways: 1627c478bd9Sstevel@tonic-gate * 1637c478bd9Sstevel@tonic-gate * N = xxxx10...0 1647c478bd9Sstevel@tonic-gate * N - 1 = xxxx01...1 1657c478bd9Sstevel@tonic-gate * ------------------------ 1667c478bd9Sstevel@tonic-gate * N & (N - 1) = xxxx000000 1677c478bd9Sstevel@tonic-gate * N | (N - 1) = xxxx111111 1687c478bd9Sstevel@tonic-gate * N ^ (N - 1) = 111111 1697c478bd9Sstevel@tonic-gate * 1707c478bd9Sstevel@tonic-gate * In particular, this suggests several easy ways to clear all but the LSB, 1717c478bd9Sstevel@tonic-gate * which by (T2) is exactly what we need to determine CSIZE(N) = 10...0. 1727c478bd9Sstevel@tonic-gate * We'll opt for this formulation: 1737c478bd9Sstevel@tonic-gate * 1747c478bd9Sstevel@tonic-gate * (C1) CSIZE(N) = (N - 1) ^ (N | (N - 1)) 1757c478bd9Sstevel@tonic-gate * 1767c478bd9Sstevel@tonic-gate * Similarly, we have an easy way to determine LPARENT(N), which requires 1777c478bd9Sstevel@tonic-gate * that we clear the LSB of N: 1787c478bd9Sstevel@tonic-gate * 1797c478bd9Sstevel@tonic-gate * (L1) LPARENT(N) = N & (N - 1) 1807c478bd9Sstevel@tonic-gate * 1817c478bd9Sstevel@tonic-gate * We note in the above relations that (N | (N - 1)) - N = CSIZE(N) - 1. 1827c478bd9Sstevel@tonic-gate * When combined with (T4), this yields an easy way to compute RPARENT(N): 1837c478bd9Sstevel@tonic-gate * 1847c478bd9Sstevel@tonic-gate * (R1) RPARENT(N) = (N | (N - 1)) + 1 1857c478bd9Sstevel@tonic-gate * 1867c478bd9Sstevel@tonic-gate * Finally, to accommodate fd 0 we must adjust all of our results by +/-1 to 1877c478bd9Sstevel@tonic-gate * move the fd range from [1, 2^n) to [0, 2^n - 1). This is straightforward, 1887c478bd9Sstevel@tonic-gate * so there's no need to belabor the algebra; the revised relations become: 1897c478bd9Sstevel@tonic-gate * 1907c478bd9Sstevel@tonic-gate * (C1a) CSIZE(N) = N ^ (N | (N + 1)) 1917c478bd9Sstevel@tonic-gate * 1927c478bd9Sstevel@tonic-gate * (L1a) LPARENT(N) = (N & (N + 1)) - 1 1937c478bd9Sstevel@tonic-gate * 1947c478bd9Sstevel@tonic-gate * (R1a) RPARENT(N) = N | (N + 1) 1957c478bd9Sstevel@tonic-gate * 1967c478bd9Sstevel@tonic-gate * This completes the mathematical framework. We now have all the tools 1977c478bd9Sstevel@tonic-gate * we need to implement fd_find() and fd_reserve(). 1987c478bd9Sstevel@tonic-gate * 1997c478bd9Sstevel@tonic-gate * fd_find(fip, minfd) finds the smallest available file descriptor >= minfd. 2007c478bd9Sstevel@tonic-gate * It does not actually allocate the descriptor; that's done by fd_reserve(). 2017c478bd9Sstevel@tonic-gate * fd_find() proceeds in two steps: 2027c478bd9Sstevel@tonic-gate * 2037c478bd9Sstevel@tonic-gate * (1) Find the leftmost subtree that contains a descriptor >= minfd. 2047c478bd9Sstevel@tonic-gate * We start at the right subtree rooted at minfd. If this subtree is 2057c478bd9Sstevel@tonic-gate * not full -- if fip->fi_list[minfd].uf_alloc != CSIZE(minfd) -- then 2067c478bd9Sstevel@tonic-gate * step 1 is done. Otherwise, we know that all fds in this subtree 2077c478bd9Sstevel@tonic-gate * are taken, so we ascend to RPARENT(minfd) using (R1a). We repeat 2087c478bd9Sstevel@tonic-gate * this process until we either find a candidate subtree or exceed 2097c478bd9Sstevel@tonic-gate * fip->fi_nfiles. We use (C1a) to compute CSIZE(). 2107c478bd9Sstevel@tonic-gate * 2117c478bd9Sstevel@tonic-gate * (2) Find the smallest fd in the subtree discovered by step 1. 2127c478bd9Sstevel@tonic-gate * Starting at the root of this subtree, we descend to find the 2137c478bd9Sstevel@tonic-gate * smallest available fd. Since the left children have the smaller 2147c478bd9Sstevel@tonic-gate * fds, we will descend rightward only when the left child is full. 2157c478bd9Sstevel@tonic-gate * 2167c478bd9Sstevel@tonic-gate * We begin by comparing the number of allocated fds in the root 2177c478bd9Sstevel@tonic-gate * to the number of allocated fds in its right child; if they differ 2187c478bd9Sstevel@tonic-gate * by exactly CSIZE(child), we know the left subtree is full, so we 2197c478bd9Sstevel@tonic-gate * descend right; that is, the right child becomes the search root. 2207c478bd9Sstevel@tonic-gate * Otherwise we leave the root alone and start following the right 2217c478bd9Sstevel@tonic-gate * child's left children. As fortune would have it, this is very 2227c478bd9Sstevel@tonic-gate * simple computationally: by (T5), the right child of fd is just 2237c478bd9Sstevel@tonic-gate * fd + size, where size = CSIZE(fd) / 2. Applying (T5) again, 2247c478bd9Sstevel@tonic-gate * we find that the right child's left child is fd + size - (size / 2) = 2257c478bd9Sstevel@tonic-gate * fd + (size / 2); *its* left child is fd + (size / 2) - (size / 4) = 2267c478bd9Sstevel@tonic-gate * fd + (size / 4), and so on. In general, fd's right child's 2277c478bd9Sstevel@tonic-gate * leftmost nth descendant is fd + (size >> n). Thus, to follow 2287c478bd9Sstevel@tonic-gate * the right child's left descendants, we just halve the size in 2297c478bd9Sstevel@tonic-gate * each iteration of the search. 2307c478bd9Sstevel@tonic-gate * 2317c478bd9Sstevel@tonic-gate * When we descend leftward, we must keep track of the number of fds 2327c478bd9Sstevel@tonic-gate * that were allocated in all the right subtrees we rejected, so we 2337c478bd9Sstevel@tonic-gate * know how many of the root fd's allocations are in the remaining 2347c478bd9Sstevel@tonic-gate * (as yet unexplored) leftmost part of its right subtree. When we 2357c478bd9Sstevel@tonic-gate * encounter a fully-allocated left child -- that is, when we find 2367c478bd9Sstevel@tonic-gate * that fip->fi_list[fd].uf_alloc == ralloc + size -- we descend right 2377c478bd9Sstevel@tonic-gate * (as described earlier), resetting ralloc to zero. 2387c478bd9Sstevel@tonic-gate * 2397c478bd9Sstevel@tonic-gate * fd_reserve(fip, fd, incr) either allocates or frees fd, depending 2407c478bd9Sstevel@tonic-gate * on whether incr is 1 or -1. Starting at fd, fd_reserve() ascends 2417c478bd9Sstevel@tonic-gate * the leftmost ancestors (see (T3)) and updates the allocation counts. 2427c478bd9Sstevel@tonic-gate * At each step we use (L1a) to compute LPARENT(), the next left ancestor. 2437c478bd9Sstevel@tonic-gate * 2447c478bd9Sstevel@tonic-gate * flist_minsize() finds the minimal tree that still covers all 2457c478bd9Sstevel@tonic-gate * used fds; as long as the allocation count of a root node is zero, we 2467c478bd9Sstevel@tonic-gate * don't need that node or its right subtree. 2477c478bd9Sstevel@tonic-gate * 2487c478bd9Sstevel@tonic-gate * flist_nalloc() counts the number of allocated fds in the tree, by starting 2497c478bd9Sstevel@tonic-gate * at the top of the tree and summing the right-subtree allocation counts as 2507c478bd9Sstevel@tonic-gate * it descends leftwards. 2517c478bd9Sstevel@tonic-gate * 2527c478bd9Sstevel@tonic-gate * Note: we assume that flist_grow() will keep fip->fi_nfiles of the form 2537c478bd9Sstevel@tonic-gate * 2^n - 1. This ensures that the fd trees are always full, which saves 2547c478bd9Sstevel@tonic-gate * quite a bit of boundary checking. 2557c478bd9Sstevel@tonic-gate */ 2567c478bd9Sstevel@tonic-gate static int 2577c478bd9Sstevel@tonic-gate fd_find(uf_info_t *fip, int minfd) 2587c478bd9Sstevel@tonic-gate { 2597c478bd9Sstevel@tonic-gate int size, ralloc, fd; 2607c478bd9Sstevel@tonic-gate 2617c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 2627c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 2637c478bd9Sstevel@tonic-gate 2647c478bd9Sstevel@tonic-gate for (fd = minfd; (uint_t)fd < fip->fi_nfiles; fd |= fd + 1) { 2657c478bd9Sstevel@tonic-gate size = fd ^ (fd | (fd + 1)); 2667c478bd9Sstevel@tonic-gate if (fip->fi_list[fd].uf_alloc == size) 2677c478bd9Sstevel@tonic-gate continue; 2687c478bd9Sstevel@tonic-gate for (ralloc = 0, size >>= 1; size != 0; size >>= 1) { 2697c478bd9Sstevel@tonic-gate ralloc += fip->fi_list[fd + size].uf_alloc; 2707c478bd9Sstevel@tonic-gate if (fip->fi_list[fd].uf_alloc == ralloc + size) { 2717c478bd9Sstevel@tonic-gate fd += size; 2727c478bd9Sstevel@tonic-gate ralloc = 0; 2737c478bd9Sstevel@tonic-gate } 2747c478bd9Sstevel@tonic-gate } 2757c478bd9Sstevel@tonic-gate return (fd); 2767c478bd9Sstevel@tonic-gate } 2777c478bd9Sstevel@tonic-gate return (-1); 2787c478bd9Sstevel@tonic-gate } 2797c478bd9Sstevel@tonic-gate 2807c478bd9Sstevel@tonic-gate static void 2817c478bd9Sstevel@tonic-gate fd_reserve(uf_info_t *fip, int fd, int incr) 2827c478bd9Sstevel@tonic-gate { 2837c478bd9Sstevel@tonic-gate int pfd; 2847c478bd9Sstevel@tonic-gate uf_entry_t *ufp = &fip->fi_list[fd]; 2857c478bd9Sstevel@tonic-gate 2867c478bd9Sstevel@tonic-gate ASSERT((uint_t)fd < fip->fi_nfiles); 2877c478bd9Sstevel@tonic-gate ASSERT((ufp->uf_busy == 0 && incr == 1) || 2887c478bd9Sstevel@tonic-gate (ufp->uf_busy == 1 && incr == -1)); 2897c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&ufp->uf_lock)); 2907c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 2917c478bd9Sstevel@tonic-gate 2927c478bd9Sstevel@tonic-gate for (pfd = fd; pfd >= 0; pfd = (pfd & (pfd + 1)) - 1) 2937c478bd9Sstevel@tonic-gate fip->fi_list[pfd].uf_alloc += incr; 2947c478bd9Sstevel@tonic-gate 2957c478bd9Sstevel@tonic-gate ufp->uf_busy += incr; 2967c478bd9Sstevel@tonic-gate } 2977c478bd9Sstevel@tonic-gate 2987c478bd9Sstevel@tonic-gate static int 2997c478bd9Sstevel@tonic-gate flist_minsize(uf_info_t *fip) 3007c478bd9Sstevel@tonic-gate { 3017c478bd9Sstevel@tonic-gate int fd; 3027c478bd9Sstevel@tonic-gate 3037c478bd9Sstevel@tonic-gate /* 3047c478bd9Sstevel@tonic-gate * We'd like to ASSERT(MUTEX_HELD(&fip->fi_lock)), but we're called 3057c478bd9Sstevel@tonic-gate * by flist_fork(), which relies on other mechanisms for mutual 3067c478bd9Sstevel@tonic-gate * exclusion. 3077c478bd9Sstevel@tonic-gate */ 3087c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 3097c478bd9Sstevel@tonic-gate 3107c478bd9Sstevel@tonic-gate for (fd = fip->fi_nfiles; fd != 0; fd >>= 1) 3117c478bd9Sstevel@tonic-gate if (fip->fi_list[fd >> 1].uf_alloc != 0) 3127c478bd9Sstevel@tonic-gate break; 3137c478bd9Sstevel@tonic-gate 3147c478bd9Sstevel@tonic-gate return (fd); 3157c478bd9Sstevel@tonic-gate } 3167c478bd9Sstevel@tonic-gate 3177c478bd9Sstevel@tonic-gate static int 3187c478bd9Sstevel@tonic-gate flist_nalloc(uf_info_t *fip) 3197c478bd9Sstevel@tonic-gate { 3207c478bd9Sstevel@tonic-gate int fd; 3217c478bd9Sstevel@tonic-gate int nalloc = 0; 3227c478bd9Sstevel@tonic-gate 3237c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 3247c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 3257c478bd9Sstevel@tonic-gate 3267c478bd9Sstevel@tonic-gate for (fd = fip->fi_nfiles; fd != 0; fd >>= 1) 3277c478bd9Sstevel@tonic-gate nalloc += fip->fi_list[fd >> 1].uf_alloc; 3287c478bd9Sstevel@tonic-gate 3297c478bd9Sstevel@tonic-gate return (nalloc); 3307c478bd9Sstevel@tonic-gate } 3317c478bd9Sstevel@tonic-gate 3327c478bd9Sstevel@tonic-gate /* 3337c478bd9Sstevel@tonic-gate * Increase size of the fi_list array to accommodate at least maxfd. 3347c478bd9Sstevel@tonic-gate * We keep the size of the form 2^n - 1 for benefit of fd_find(). 3357c478bd9Sstevel@tonic-gate */ 3367c478bd9Sstevel@tonic-gate static void 3377c478bd9Sstevel@tonic-gate flist_grow(int maxfd) 3387c478bd9Sstevel@tonic-gate { 3397c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 3407c478bd9Sstevel@tonic-gate int newcnt, oldcnt; 3417c478bd9Sstevel@tonic-gate uf_entry_t *src, *dst, *newlist, *oldlist, *newend, *oldend; 3427c478bd9Sstevel@tonic-gate uf_rlist_t *urp; 3437c478bd9Sstevel@tonic-gate 3447c478bd9Sstevel@tonic-gate for (newcnt = 1; newcnt <= maxfd; newcnt = (newcnt << 1) | 1) 3457c478bd9Sstevel@tonic-gate continue; 3467c478bd9Sstevel@tonic-gate 3477c478bd9Sstevel@tonic-gate newlist = kmem_zalloc(newcnt * sizeof (uf_entry_t), KM_SLEEP); 3487c478bd9Sstevel@tonic-gate 3497c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 3507c478bd9Sstevel@tonic-gate oldcnt = fip->fi_nfiles; 3517c478bd9Sstevel@tonic-gate if (newcnt <= oldcnt) { 3527c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 3537c478bd9Sstevel@tonic-gate kmem_free(newlist, newcnt * sizeof (uf_entry_t)); 3547c478bd9Sstevel@tonic-gate return; 3557c478bd9Sstevel@tonic-gate } 3567c478bd9Sstevel@tonic-gate ASSERT((newcnt & (newcnt + 1)) == 0); 3577c478bd9Sstevel@tonic-gate oldlist = fip->fi_list; 3587c478bd9Sstevel@tonic-gate oldend = oldlist + oldcnt; 3597c478bd9Sstevel@tonic-gate newend = newlist + oldcnt; /* no need to lock beyond old end */ 3607c478bd9Sstevel@tonic-gate 3617c478bd9Sstevel@tonic-gate /* 3627c478bd9Sstevel@tonic-gate * fi_list and fi_nfiles cannot change while any uf_lock is held, 3637c478bd9Sstevel@tonic-gate * so we must grab all the old locks *and* the new locks up to oldcnt. 3647c478bd9Sstevel@tonic-gate * (Locks beyond the end of oldcnt aren't visible until we store 3657c478bd9Sstevel@tonic-gate * the new fi_nfiles, which is the last thing we do before dropping 3667c478bd9Sstevel@tonic-gate * all the locks, so there's no need to acquire these locks). 3677c478bd9Sstevel@tonic-gate * Holding the new locks is necessary because when fi_list changes 3687c478bd9Sstevel@tonic-gate * to point to the new list, fi_nfiles won't have been stored yet. 3697c478bd9Sstevel@tonic-gate * If we *didn't* hold the new locks, someone doing a UF_ENTER() 3707c478bd9Sstevel@tonic-gate * could see the new fi_list, grab the new uf_lock, and then see 3717c478bd9Sstevel@tonic-gate * fi_nfiles change while the lock is held -- in violation of 3727c478bd9Sstevel@tonic-gate * UF_ENTER() semantics. 3737c478bd9Sstevel@tonic-gate */ 3747c478bd9Sstevel@tonic-gate for (src = oldlist; src < oldend; src++) 3757c478bd9Sstevel@tonic-gate mutex_enter(&src->uf_lock); 3767c478bd9Sstevel@tonic-gate 3777c478bd9Sstevel@tonic-gate for (dst = newlist; dst < newend; dst++) 3787c478bd9Sstevel@tonic-gate mutex_enter(&dst->uf_lock); 3797c478bd9Sstevel@tonic-gate 3807c478bd9Sstevel@tonic-gate for (src = oldlist, dst = newlist; src < oldend; src++, dst++) { 3817c478bd9Sstevel@tonic-gate dst->uf_file = src->uf_file; 3827c478bd9Sstevel@tonic-gate dst->uf_fpollinfo = src->uf_fpollinfo; 3837c478bd9Sstevel@tonic-gate dst->uf_refcnt = src->uf_refcnt; 3847c478bd9Sstevel@tonic-gate dst->uf_alloc = src->uf_alloc; 3857c478bd9Sstevel@tonic-gate dst->uf_flag = src->uf_flag; 3867c478bd9Sstevel@tonic-gate dst->uf_busy = src->uf_busy; 3877c478bd9Sstevel@tonic-gate dst->uf_portfd = src->uf_portfd; 3887c478bd9Sstevel@tonic-gate } 3897c478bd9Sstevel@tonic-gate 3907c478bd9Sstevel@tonic-gate /* 3917c478bd9Sstevel@tonic-gate * As soon as we store the new flist, future locking operations 3927c478bd9Sstevel@tonic-gate * will use it. Therefore, we must ensure that all the state 3937c478bd9Sstevel@tonic-gate * we've just established reaches global visibility before the 3947c478bd9Sstevel@tonic-gate * new flist does. 3957c478bd9Sstevel@tonic-gate */ 3967c478bd9Sstevel@tonic-gate membar_producer(); 3977c478bd9Sstevel@tonic-gate fip->fi_list = newlist; 3987c478bd9Sstevel@tonic-gate 3997c478bd9Sstevel@tonic-gate /* 4007c478bd9Sstevel@tonic-gate * Routines like getf() make an optimistic check on the validity 4017c478bd9Sstevel@tonic-gate * of the supplied file descriptor: if it's less than the current 4027c478bd9Sstevel@tonic-gate * value of fi_nfiles -- examined without any locks -- then it's 4037c478bd9Sstevel@tonic-gate * safe to attempt a UF_ENTER() on that fd (which is a valid 4047c478bd9Sstevel@tonic-gate * assumption because fi_nfiles only increases). Therefore, it 4057c478bd9Sstevel@tonic-gate * is critical that the new value of fi_nfiles not reach global 4067c478bd9Sstevel@tonic-gate * visibility until after the new fi_list: if it happened the 4077c478bd9Sstevel@tonic-gate * other way around, getf() could see the new fi_nfiles and attempt 4087c478bd9Sstevel@tonic-gate * a UF_ENTER() on the old fi_list, which would write beyond its 4097c478bd9Sstevel@tonic-gate * end if the fd exceeded the old fi_nfiles. 4107c478bd9Sstevel@tonic-gate */ 4117c478bd9Sstevel@tonic-gate membar_producer(); 4127c478bd9Sstevel@tonic-gate fip->fi_nfiles = newcnt; 4137c478bd9Sstevel@tonic-gate 4147c478bd9Sstevel@tonic-gate /* 4157c478bd9Sstevel@tonic-gate * The new state is consistent now, so we can drop all the locks. 4167c478bd9Sstevel@tonic-gate */ 4177c478bd9Sstevel@tonic-gate for (dst = newlist; dst < newend; dst++) 4187c478bd9Sstevel@tonic-gate mutex_exit(&dst->uf_lock); 4197c478bd9Sstevel@tonic-gate 4207c478bd9Sstevel@tonic-gate for (src = oldlist; src < oldend; src++) { 4217c478bd9Sstevel@tonic-gate /* 4227c478bd9Sstevel@tonic-gate * If any threads are blocked on the old cvs, wake them. 4237c478bd9Sstevel@tonic-gate * This will force them to wake up, discover that fi_list 4247c478bd9Sstevel@tonic-gate * has changed, and go back to sleep on the new cvs. 4257c478bd9Sstevel@tonic-gate */ 4267c478bd9Sstevel@tonic-gate cv_broadcast(&src->uf_wanted_cv); 4277c478bd9Sstevel@tonic-gate cv_broadcast(&src->uf_closing_cv); 4287c478bd9Sstevel@tonic-gate mutex_exit(&src->uf_lock); 4297c478bd9Sstevel@tonic-gate } 4307c478bd9Sstevel@tonic-gate 4317c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 4327c478bd9Sstevel@tonic-gate 4337c478bd9Sstevel@tonic-gate /* 4347c478bd9Sstevel@tonic-gate * Retire the old flist. We can't actually kmem_free() it now 4357c478bd9Sstevel@tonic-gate * because someone may still have a pointer to it. Instead, 4367c478bd9Sstevel@tonic-gate * we link it onto a list of retired flists. The new flist 4377c478bd9Sstevel@tonic-gate * is at least double the size of the previous flist, so the 4387c478bd9Sstevel@tonic-gate * total size of all retired flists will be less than the size 4397c478bd9Sstevel@tonic-gate * of the current one (to prove, consider the sum of a geometric 4407c478bd9Sstevel@tonic-gate * series in powers of 2). exit() frees the retired flists. 4417c478bd9Sstevel@tonic-gate */ 4427c478bd9Sstevel@tonic-gate urp = kmem_zalloc(sizeof (uf_rlist_t), KM_SLEEP); 4437c478bd9Sstevel@tonic-gate urp->ur_list = oldlist; 4447c478bd9Sstevel@tonic-gate urp->ur_nfiles = oldcnt; 4457c478bd9Sstevel@tonic-gate 4467c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 4477c478bd9Sstevel@tonic-gate urp->ur_next = fip->fi_rlist; 4487c478bd9Sstevel@tonic-gate fip->fi_rlist = urp; 4497c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 4507c478bd9Sstevel@tonic-gate } 4517c478bd9Sstevel@tonic-gate 4527c478bd9Sstevel@tonic-gate /* 4537c478bd9Sstevel@tonic-gate * Utility functions for keeping track of the active file descriptors. 4547c478bd9Sstevel@tonic-gate */ 4557c478bd9Sstevel@tonic-gate void 4567c478bd9Sstevel@tonic-gate clear_stale_fd() /* called from post_syscall() */ 4577c478bd9Sstevel@tonic-gate { 4587c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 4597c478bd9Sstevel@tonic-gate int i; 4607c478bd9Sstevel@tonic-gate 4617c478bd9Sstevel@tonic-gate /* uninitialized is ok here, a_nfd is then zero */ 4627c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 4637c478bd9Sstevel@tonic-gate /* assert that this should not be necessary */ 4647c478bd9Sstevel@tonic-gate ASSERT(afd->a_fd[i] == -1); 4657c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 4667c478bd9Sstevel@tonic-gate } 4677c478bd9Sstevel@tonic-gate afd->a_stale = 0; 4687c478bd9Sstevel@tonic-gate } 4697c478bd9Sstevel@tonic-gate 4707c478bd9Sstevel@tonic-gate void 4717c478bd9Sstevel@tonic-gate free_afd(afd_t *afd) /* called below and from thread_free() */ 4727c478bd9Sstevel@tonic-gate { 4737c478bd9Sstevel@tonic-gate int i; 4747c478bd9Sstevel@tonic-gate 4757c478bd9Sstevel@tonic-gate /* free the buffer if it was kmem_alloc()ed */ 4767c478bd9Sstevel@tonic-gate if (afd->a_nfd > sizeof (afd->a_buf) / sizeof (afd->a_buf[0])) { 4777c478bd9Sstevel@tonic-gate COUNT(afd_free); 4787c478bd9Sstevel@tonic-gate kmem_free(afd->a_fd, afd->a_nfd * sizeof (afd->a_fd[0])); 4797c478bd9Sstevel@tonic-gate } 4807c478bd9Sstevel@tonic-gate 4817c478bd9Sstevel@tonic-gate /* (re)initialize the structure */ 4827c478bd9Sstevel@tonic-gate afd->a_fd = &afd->a_buf[0]; 4837c478bd9Sstevel@tonic-gate afd->a_nfd = sizeof (afd->a_buf) / sizeof (afd->a_buf[0]); 4847c478bd9Sstevel@tonic-gate afd->a_stale = 0; 4857c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) 4867c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 4877c478bd9Sstevel@tonic-gate } 4887c478bd9Sstevel@tonic-gate 4897c478bd9Sstevel@tonic-gate static void 4907c478bd9Sstevel@tonic-gate set_active_fd(int fd) 4917c478bd9Sstevel@tonic-gate { 4927c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 4937c478bd9Sstevel@tonic-gate int i; 4947c478bd9Sstevel@tonic-gate int *old_fd; 4957c478bd9Sstevel@tonic-gate int old_nfd; 496236317e1SRoger A. Faulkner int *new_fd; 497236317e1SRoger A. Faulkner int new_nfd; 4987c478bd9Sstevel@tonic-gate 499236317e1SRoger A. Faulkner if (afd->a_nfd == 0) { /* first time initialization */ 500236317e1SRoger A. Faulkner ASSERT(fd == -1); 501236317e1SRoger A. Faulkner mutex_enter(&afd->a_fdlock); 5027c478bd9Sstevel@tonic-gate free_afd(afd); 503236317e1SRoger A. Faulkner mutex_exit(&afd->a_fdlock); 504236317e1SRoger A. Faulkner } 5057c478bd9Sstevel@tonic-gate 5067c478bd9Sstevel@tonic-gate /* insert fd into vacant slot, if any */ 5077c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 5087c478bd9Sstevel@tonic-gate if (afd->a_fd[i] == -1) { 5097c478bd9Sstevel@tonic-gate afd->a_fd[i] = fd; 5107c478bd9Sstevel@tonic-gate return; 5117c478bd9Sstevel@tonic-gate } 5127c478bd9Sstevel@tonic-gate } 5137c478bd9Sstevel@tonic-gate 5147c478bd9Sstevel@tonic-gate /* 5157c478bd9Sstevel@tonic-gate * Reallocate the a_fd[] array to add one more slot. 5167c478bd9Sstevel@tonic-gate */ 517236317e1SRoger A. Faulkner ASSERT(fd == -1); 5187c478bd9Sstevel@tonic-gate old_nfd = afd->a_nfd; 519236317e1SRoger A. Faulkner old_fd = afd->a_fd; 520236317e1SRoger A. Faulkner new_nfd = old_nfd + 1; 521236317e1SRoger A. Faulkner new_fd = kmem_alloc(new_nfd * sizeof (afd->a_fd[0]), KM_SLEEP); 522236317e1SRoger A. Faulkner MAXFD(new_nfd); 5237c478bd9Sstevel@tonic-gate COUNT(afd_alloc); 524236317e1SRoger A. Faulkner 525236317e1SRoger A. Faulkner mutex_enter(&afd->a_fdlock); 526236317e1SRoger A. Faulkner afd->a_fd = new_fd; 527236317e1SRoger A. Faulkner afd->a_nfd = new_nfd; 5287c478bd9Sstevel@tonic-gate for (i = 0; i < old_nfd; i++) 5297c478bd9Sstevel@tonic-gate afd->a_fd[i] = old_fd[i]; 5307c478bd9Sstevel@tonic-gate afd->a_fd[i] = fd; 531236317e1SRoger A. Faulkner mutex_exit(&afd->a_fdlock); 5327c478bd9Sstevel@tonic-gate 5337c478bd9Sstevel@tonic-gate if (old_nfd > sizeof (afd->a_buf) / sizeof (afd->a_buf[0])) { 5347c478bd9Sstevel@tonic-gate COUNT(afd_free); 5357c478bd9Sstevel@tonic-gate kmem_free(old_fd, old_nfd * sizeof (afd->a_fd[0])); 5367c478bd9Sstevel@tonic-gate } 5377c478bd9Sstevel@tonic-gate } 5387c478bd9Sstevel@tonic-gate 5397c478bd9Sstevel@tonic-gate void 5407c478bd9Sstevel@tonic-gate clear_active_fd(int fd) /* called below and from aio.c */ 5417c478bd9Sstevel@tonic-gate { 5427c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 5437c478bd9Sstevel@tonic-gate int i; 5447c478bd9Sstevel@tonic-gate 5457c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 5467c478bd9Sstevel@tonic-gate if (afd->a_fd[i] == fd) { 5477c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 5487c478bd9Sstevel@tonic-gate break; 5497c478bd9Sstevel@tonic-gate } 5507c478bd9Sstevel@tonic-gate } 5517c478bd9Sstevel@tonic-gate ASSERT(i < afd->a_nfd); /* not found is not ok */ 5527c478bd9Sstevel@tonic-gate } 5537c478bd9Sstevel@tonic-gate 5547c478bd9Sstevel@tonic-gate /* 5557c478bd9Sstevel@tonic-gate * Does this thread have this fd active? 5567c478bd9Sstevel@tonic-gate */ 5577c478bd9Sstevel@tonic-gate static int 5587c478bd9Sstevel@tonic-gate is_active_fd(kthread_t *t, int fd) 5597c478bd9Sstevel@tonic-gate { 5607c478bd9Sstevel@tonic-gate afd_t *afd = &t->t_activefd; 5617c478bd9Sstevel@tonic-gate int i; 5627c478bd9Sstevel@tonic-gate 563236317e1SRoger A. Faulkner ASSERT(t != curthread); 564236317e1SRoger A. Faulkner mutex_enter(&afd->a_fdlock); 5657c478bd9Sstevel@tonic-gate /* uninitialized is ok here, a_nfd is then zero */ 5667c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 567236317e1SRoger A. Faulkner if (afd->a_fd[i] == fd) { 568236317e1SRoger A. Faulkner mutex_exit(&afd->a_fdlock); 5697c478bd9Sstevel@tonic-gate return (1); 5707c478bd9Sstevel@tonic-gate } 571236317e1SRoger A. Faulkner } 572236317e1SRoger A. Faulkner mutex_exit(&afd->a_fdlock); 5737c478bd9Sstevel@tonic-gate return (0); 5747c478bd9Sstevel@tonic-gate } 5757c478bd9Sstevel@tonic-gate 5767c478bd9Sstevel@tonic-gate /* 5777c478bd9Sstevel@tonic-gate * Convert a user supplied file descriptor into a pointer to a file 5787c478bd9Sstevel@tonic-gate * structure. Only task is to check range of the descriptor (soft 5797c478bd9Sstevel@tonic-gate * resource limit was enforced at open time and shouldn't be checked 5807c478bd9Sstevel@tonic-gate * here). 5817c478bd9Sstevel@tonic-gate */ 5827c478bd9Sstevel@tonic-gate file_t * 5837c478bd9Sstevel@tonic-gate getf(int fd) 5847c478bd9Sstevel@tonic-gate { 5857c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 5867c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 5877c478bd9Sstevel@tonic-gate file_t *fp; 5887c478bd9Sstevel@tonic-gate 5897c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 5907c478bd9Sstevel@tonic-gate return (NULL); 5917c478bd9Sstevel@tonic-gate 592236317e1SRoger A. Faulkner /* 593236317e1SRoger A. Faulkner * Reserve a slot in the active fd array now so we can call 594236317e1SRoger A. Faulkner * set_active_fd(fd) for real below, while still inside UF_ENTER(). 595236317e1SRoger A. Faulkner */ 596236317e1SRoger A. Faulkner set_active_fd(-1); 597236317e1SRoger A. Faulkner 5987c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 599236317e1SRoger A. Faulkner 6007c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 6017c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 602a5f69788Scraigm 603a5f69788Scraigm if (fd == fip->fi_badfd && fip->fi_action > 0) 604a5f69788Scraigm tsignal(curthread, fip->fi_action); 605a5f69788Scraigm 6067c478bd9Sstevel@tonic-gate return (NULL); 6077c478bd9Sstevel@tonic-gate } 6087c478bd9Sstevel@tonic-gate ufp->uf_refcnt++; 6097c478bd9Sstevel@tonic-gate 6107c478bd9Sstevel@tonic-gate set_active_fd(fd); /* record the active file descriptor */ 6117c478bd9Sstevel@tonic-gate 612236317e1SRoger A. Faulkner UF_EXIT(ufp); 613236317e1SRoger A. Faulkner 6147c478bd9Sstevel@tonic-gate return (fp); 6157c478bd9Sstevel@tonic-gate } 6167c478bd9Sstevel@tonic-gate 6177c478bd9Sstevel@tonic-gate /* 6187c478bd9Sstevel@tonic-gate * Close whatever file currently occupies the file descriptor slot 6197c478bd9Sstevel@tonic-gate * and install the new file, usually NULL, in the file descriptor slot. 6207c478bd9Sstevel@tonic-gate * The close must complete before we release the file descriptor slot. 621a5f69788Scraigm * If newfp != NULL we only return an error if we can't allocate the 622a5f69788Scraigm * slot so the caller knows that it needs to free the filep; 623a5f69788Scraigm * in the other cases we return the error number from closef(). 6247c478bd9Sstevel@tonic-gate */ 6257c478bd9Sstevel@tonic-gate int 6267c478bd9Sstevel@tonic-gate closeandsetf(int fd, file_t *newfp) 6277c478bd9Sstevel@tonic-gate { 6287c478bd9Sstevel@tonic-gate proc_t *p = curproc; 6297c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 6307c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 6317c478bd9Sstevel@tonic-gate file_t *fp; 6327c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 6337c478bd9Sstevel@tonic-gate portfd_t *pfd; 6347c478bd9Sstevel@tonic-gate int error; 6357c478bd9Sstevel@tonic-gate 6367c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) { 6377c478bd9Sstevel@tonic-gate if (newfp == NULL) 6387c478bd9Sstevel@tonic-gate return (EBADF); 6397c478bd9Sstevel@tonic-gate flist_grow(fd); 6407c478bd9Sstevel@tonic-gate } 6417c478bd9Sstevel@tonic-gate 6427c478bd9Sstevel@tonic-gate if (newfp != NULL) { 6437c478bd9Sstevel@tonic-gate /* 6447c478bd9Sstevel@tonic-gate * If ufp is reserved but has no file pointer, it's in the 6457c478bd9Sstevel@tonic-gate * transition between ufalloc() and setf(). We must wait 6467c478bd9Sstevel@tonic-gate * for this transition to complete before assigning the 6477c478bd9Sstevel@tonic-gate * new non-NULL file pointer. 6487c478bd9Sstevel@tonic-gate */ 6497c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 650a5f69788Scraigm if (fd == fip->fi_badfd) { 651a5f69788Scraigm mutex_exit(&fip->fi_lock); 652a5f69788Scraigm if (fip->fi_action > 0) 653a5f69788Scraigm tsignal(curthread, fip->fi_action); 654a5f69788Scraigm return (EBADF); 655a5f69788Scraigm } 6567c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6577c478bd9Sstevel@tonic-gate while (ufp->uf_busy && ufp->uf_file == NULL) { 6587c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6597c478bd9Sstevel@tonic-gate cv_wait_stop(&ufp->uf_wanted_cv, &ufp->uf_lock, 250); 6607c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6617c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 6627c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6637c478bd9Sstevel@tonic-gate } 6647c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 6657c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 6667c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_flag == 0); 6677c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, 1); 6687c478bd9Sstevel@tonic-gate ufp->uf_file = newfp; 6697c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6707c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6717c478bd9Sstevel@tonic-gate return (0); 6727c478bd9Sstevel@tonic-gate } 6737c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6747c478bd9Sstevel@tonic-gate } else { 6757c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6767c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 6777c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6787c478bd9Sstevel@tonic-gate return (EBADF); 6797c478bd9Sstevel@tonic-gate } 6807c478bd9Sstevel@tonic-gate } 6817c478bd9Sstevel@tonic-gate 6827c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_busy); 6837c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 6847c478bd9Sstevel@tonic-gate ufp->uf_flag = 0; 6857c478bd9Sstevel@tonic-gate 6867c478bd9Sstevel@tonic-gate /* 6877c478bd9Sstevel@tonic-gate * If the file descriptor reference count is non-zero, then 6887c478bd9Sstevel@tonic-gate * some other lwp in the process is performing system call 6897c478bd9Sstevel@tonic-gate * activity on the file. To avoid blocking here for a long 6907c478bd9Sstevel@tonic-gate * time (the other lwp might be in a long term sleep in its 691236317e1SRoger A. Faulkner * system call), we scan all other lwps in the process to 692236317e1SRoger A. Faulkner * find the ones with this fd as one of their active fds, 693236317e1SRoger A. Faulkner * set their a_stale flag, and set them running if they 694236317e1SRoger A. Faulkner * are in an interruptible sleep so they will emerge from 695236317e1SRoger A. Faulkner * their system calls immediately. post_syscall() will 6967c478bd9Sstevel@tonic-gate * test the a_stale flag and set errno to EBADF. 6977c478bd9Sstevel@tonic-gate */ 6987c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt == 0 || p->p_lwpcnt > 1); 6997c478bd9Sstevel@tonic-gate if (ufp->uf_refcnt > 0) { 700236317e1SRoger A. Faulkner kthread_t *t; 701236317e1SRoger A. Faulkner 702236317e1SRoger A. Faulkner /* 703236317e1SRoger A. Faulkner * We call sprlock_proc(p) to ensure that the thread 704236317e1SRoger A. Faulkner * list will not change while we are scanning it. 705236317e1SRoger A. Faulkner * To do this, we must drop ufp->uf_lock and then 706236317e1SRoger A. Faulkner * reacquire it (so we are not holding both p->p_lock 707236317e1SRoger A. Faulkner * and ufp->uf_lock at the same time). ufp->uf_lock 708236317e1SRoger A. Faulkner * must be held for is_active_fd() to be correct 709236317e1SRoger A. Faulkner * (set_active_fd() is called while holding ufp->uf_lock). 710236317e1SRoger A. Faulkner * 711236317e1SRoger A. Faulkner * This is a convoluted dance, but it is better than 712236317e1SRoger A. Faulkner * the old brute-force method of stopping every thread 713236317e1SRoger A. Faulkner * in the process by calling holdlwps(SHOLDFORK1). 714236317e1SRoger A. Faulkner */ 715236317e1SRoger A. Faulkner 7167c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7177c478bd9Sstevel@tonic-gate COUNT(afd_wait); 7187c478bd9Sstevel@tonic-gate 7197c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 720236317e1SRoger A. Faulkner sprlock_proc(p); 721236317e1SRoger A. Faulkner mutex_exit(&p->p_lock); 722236317e1SRoger A. Faulkner 723236317e1SRoger A. Faulkner UF_ENTER(ufp, fip, fd); 724236317e1SRoger A. Faulkner ASSERT(ufp->uf_file == NULL); 725236317e1SRoger A. Faulkner 726236317e1SRoger A. Faulkner if (ufp->uf_refcnt > 0) { 727236317e1SRoger A. Faulkner for (t = curthread->t_forw; 728236317e1SRoger A. Faulkner t != curthread; 7297c478bd9Sstevel@tonic-gate t = t->t_forw) { 7307c478bd9Sstevel@tonic-gate if (is_active_fd(t, fd)) { 731236317e1SRoger A. Faulkner thread_lock(t); 7327c478bd9Sstevel@tonic-gate t->t_activefd.a_stale = 1; 7337c478bd9Sstevel@tonic-gate t->t_post_sys = 1; 734236317e1SRoger A. Faulkner if (ISWAKEABLE(t)) 735236317e1SRoger A. Faulkner setrun_locked(t); 736236317e1SRoger A. Faulkner thread_unlock(t); 7377c478bd9Sstevel@tonic-gate } 7387c478bd9Sstevel@tonic-gate } 7397c478bd9Sstevel@tonic-gate } 740236317e1SRoger A. Faulkner 741236317e1SRoger A. Faulkner UF_EXIT(ufp); 742236317e1SRoger A. Faulkner 743236317e1SRoger A. Faulkner mutex_enter(&p->p_lock); 744236317e1SRoger A. Faulkner sprunlock(p); 745236317e1SRoger A. Faulkner 7467c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7477c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_file == NULL); 7487c478bd9Sstevel@tonic-gate } 7497c478bd9Sstevel@tonic-gate 7507c478bd9Sstevel@tonic-gate /* 7517c478bd9Sstevel@tonic-gate * Wait for other lwps to stop using this file descriptor. 7527c478bd9Sstevel@tonic-gate */ 7537c478bd9Sstevel@tonic-gate while (ufp->uf_refcnt > 0) { 7547c478bd9Sstevel@tonic-gate cv_wait_stop(&ufp->uf_closing_cv, &ufp->uf_lock, 250); 7557c478bd9Sstevel@tonic-gate /* 7567c478bd9Sstevel@tonic-gate * cv_wait_stop() drops ufp->uf_lock, so the file list 7577c478bd9Sstevel@tonic-gate * can change. Drop the lock on our (possibly) stale 7587c478bd9Sstevel@tonic-gate * ufp and let UF_ENTER() find and lock the current ufp. 7597c478bd9Sstevel@tonic-gate */ 7607c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7617c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7627c478bd9Sstevel@tonic-gate } 7637c478bd9Sstevel@tonic-gate 7647c478bd9Sstevel@tonic-gate #ifdef DEBUG 7657c478bd9Sstevel@tonic-gate /* 7667c478bd9Sstevel@tonic-gate * catch a watchfd on device's pollhead list but not on fpollinfo list 7677c478bd9Sstevel@tonic-gate */ 7687c478bd9Sstevel@tonic-gate if (ufp->uf_fpollinfo != NULL) 7697c478bd9Sstevel@tonic-gate checkwfdlist(fp->f_vnode, ufp->uf_fpollinfo); 7707c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 7717c478bd9Sstevel@tonic-gate 7727c478bd9Sstevel@tonic-gate /* 7737c478bd9Sstevel@tonic-gate * We may need to cleanup some cached poll states in t_pollstate 7747c478bd9Sstevel@tonic-gate * before the fd can be reused. It is important that we don't 7757c478bd9Sstevel@tonic-gate * access a stale thread structure. We will do the cleanup in two 7767c478bd9Sstevel@tonic-gate * phases to avoid deadlock and holding uf_lock for too long. 7777c478bd9Sstevel@tonic-gate * In phase 1, hold the uf_lock and call pollblockexit() to set 7787c478bd9Sstevel@tonic-gate * state in t_pollstate struct so that a thread does not exit on 7797c478bd9Sstevel@tonic-gate * us. In phase 2, we drop the uf_lock and call pollcacheclean(). 7807c478bd9Sstevel@tonic-gate */ 7817c478bd9Sstevel@tonic-gate pfd = ufp->uf_portfd; 7827c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 7837c478bd9Sstevel@tonic-gate fpip = ufp->uf_fpollinfo; 7847c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = NULL; 7857c478bd9Sstevel@tonic-gate if (fpip != NULL) 7867c478bd9Sstevel@tonic-gate pollblockexit(fpip); 7877c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7887c478bd9Sstevel@tonic-gate if (fpip != NULL) 7897c478bd9Sstevel@tonic-gate pollcacheclean(fpip, fd); 7907c478bd9Sstevel@tonic-gate if (pfd) 79161b4b1efSpraks port_close_fd(pfd); 7927c478bd9Sstevel@tonic-gate 7937c478bd9Sstevel@tonic-gate /* 7947c478bd9Sstevel@tonic-gate * Keep the file descriptor entry reserved across the closef(). 7957c478bd9Sstevel@tonic-gate */ 7967c478bd9Sstevel@tonic-gate error = closef(fp); 7977c478bd9Sstevel@tonic-gate 7987c478bd9Sstevel@tonic-gate setf(fd, newfp); 7997c478bd9Sstevel@tonic-gate 800a5f69788Scraigm /* Only return closef() error when closing is all we do */ 801a5f69788Scraigm return (newfp == NULL ? error : 0); 8027c478bd9Sstevel@tonic-gate } 8037c478bd9Sstevel@tonic-gate 8047c478bd9Sstevel@tonic-gate /* 8057c478bd9Sstevel@tonic-gate * Decrement uf_refcnt; wakeup anyone waiting to close the file. 8067c478bd9Sstevel@tonic-gate */ 8077c478bd9Sstevel@tonic-gate void 8087c478bd9Sstevel@tonic-gate releasef(int fd) 8097c478bd9Sstevel@tonic-gate { 8107c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 8117c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 8127c478bd9Sstevel@tonic-gate 8137c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 8147c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt > 0); 815236317e1SRoger A. Faulkner clear_active_fd(fd); /* clear the active file descriptor */ 8167c478bd9Sstevel@tonic-gate if (--ufp->uf_refcnt == 0) 8177c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_closing_cv); 8187c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 8197c478bd9Sstevel@tonic-gate } 8207c478bd9Sstevel@tonic-gate 8217c478bd9Sstevel@tonic-gate /* 8227c478bd9Sstevel@tonic-gate * Identical to releasef() but can be called from another process. 8237c478bd9Sstevel@tonic-gate */ 8247c478bd9Sstevel@tonic-gate void 8257c478bd9Sstevel@tonic-gate areleasef(int fd, uf_info_t *fip) 8267c478bd9Sstevel@tonic-gate { 8277c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 8287c478bd9Sstevel@tonic-gate 8297c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 8307c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt > 0); 8317c478bd9Sstevel@tonic-gate if (--ufp->uf_refcnt == 0) 8327c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_closing_cv); 8337c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 8347c478bd9Sstevel@tonic-gate } 8357c478bd9Sstevel@tonic-gate 8367c478bd9Sstevel@tonic-gate /* 8377c478bd9Sstevel@tonic-gate * Duplicate all file descriptors across a fork. 8387c478bd9Sstevel@tonic-gate */ 8397c478bd9Sstevel@tonic-gate void 8407c478bd9Sstevel@tonic-gate flist_fork(uf_info_t *pfip, uf_info_t *cfip) 8417c478bd9Sstevel@tonic-gate { 8427c478bd9Sstevel@tonic-gate int fd, nfiles; 8437c478bd9Sstevel@tonic-gate uf_entry_t *pufp, *cufp; 8447c478bd9Sstevel@tonic-gate 8457c478bd9Sstevel@tonic-gate mutex_init(&cfip->fi_lock, NULL, MUTEX_DEFAULT, NULL); 8467c478bd9Sstevel@tonic-gate cfip->fi_rlist = NULL; 8477c478bd9Sstevel@tonic-gate 8487c478bd9Sstevel@tonic-gate /* 8497c478bd9Sstevel@tonic-gate * We don't need to hold fi_lock because all other lwp's in the 8507c478bd9Sstevel@tonic-gate * parent have been held. 8517c478bd9Sstevel@tonic-gate */ 8527c478bd9Sstevel@tonic-gate cfip->fi_nfiles = nfiles = flist_minsize(pfip); 8537c478bd9Sstevel@tonic-gate 8547c478bd9Sstevel@tonic-gate cfip->fi_list = kmem_zalloc(nfiles * sizeof (uf_entry_t), KM_SLEEP); 8557c478bd9Sstevel@tonic-gate 8567c478bd9Sstevel@tonic-gate for (fd = 0, pufp = pfip->fi_list, cufp = cfip->fi_list; fd < nfiles; 8577c478bd9Sstevel@tonic-gate fd++, pufp++, cufp++) { 8587c478bd9Sstevel@tonic-gate cufp->uf_file = pufp->uf_file; 8597c478bd9Sstevel@tonic-gate cufp->uf_alloc = pufp->uf_alloc; 8607c478bd9Sstevel@tonic-gate cufp->uf_flag = pufp->uf_flag; 8617c478bd9Sstevel@tonic-gate cufp->uf_busy = pufp->uf_busy; 8627c478bd9Sstevel@tonic-gate if (pufp->uf_file == NULL) { 8637c478bd9Sstevel@tonic-gate ASSERT(pufp->uf_flag == 0); 8647c478bd9Sstevel@tonic-gate if (pufp->uf_busy) { 8657c478bd9Sstevel@tonic-gate /* 8667c478bd9Sstevel@tonic-gate * Grab locks to appease ASSERTs in fd_reserve 8677c478bd9Sstevel@tonic-gate */ 8687c478bd9Sstevel@tonic-gate mutex_enter(&cfip->fi_lock); 8697c478bd9Sstevel@tonic-gate mutex_enter(&cufp->uf_lock); 8707c478bd9Sstevel@tonic-gate fd_reserve(cfip, fd, -1); 8717c478bd9Sstevel@tonic-gate mutex_exit(&cufp->uf_lock); 8727c478bd9Sstevel@tonic-gate mutex_exit(&cfip->fi_lock); 8737c478bd9Sstevel@tonic-gate } 8747c478bd9Sstevel@tonic-gate } 8757c478bd9Sstevel@tonic-gate } 8767c478bd9Sstevel@tonic-gate } 8777c478bd9Sstevel@tonic-gate 8787c478bd9Sstevel@tonic-gate /* 8797c478bd9Sstevel@tonic-gate * Close all open file descriptors for the current process. 8807c478bd9Sstevel@tonic-gate * This is only called from exit(), which is single-threaded, 8817c478bd9Sstevel@tonic-gate * so we don't need any locking. 8827c478bd9Sstevel@tonic-gate */ 8837c478bd9Sstevel@tonic-gate void 8847c478bd9Sstevel@tonic-gate closeall(uf_info_t *fip) 8857c478bd9Sstevel@tonic-gate { 8867c478bd9Sstevel@tonic-gate int fd; 8877c478bd9Sstevel@tonic-gate file_t *fp; 8887c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 8897c478bd9Sstevel@tonic-gate 8907c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 8917c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++, ufp++) { 8927c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL) { 8937c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 8947c478bd9Sstevel@tonic-gate if (ufp->uf_portfd != NULL) { 89561b4b1efSpraks portfd_t *pfd; 8967c478bd9Sstevel@tonic-gate /* remove event port association */ 89761b4b1efSpraks pfd = ufp->uf_portfd; 8987c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 89961b4b1efSpraks port_close_fd(pfd); 9007c478bd9Sstevel@tonic-gate } 9017c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 9027c478bd9Sstevel@tonic-gate (void) closef(fp); 9037c478bd9Sstevel@tonic-gate } 9047c478bd9Sstevel@tonic-gate } 9057c478bd9Sstevel@tonic-gate 9067c478bd9Sstevel@tonic-gate kmem_free(fip->fi_list, fip->fi_nfiles * sizeof (uf_entry_t)); 9077c478bd9Sstevel@tonic-gate fip->fi_list = NULL; 9087c478bd9Sstevel@tonic-gate fip->fi_nfiles = 0; 9097c478bd9Sstevel@tonic-gate while (fip->fi_rlist != NULL) { 9107c478bd9Sstevel@tonic-gate uf_rlist_t *urp = fip->fi_rlist; 9117c478bd9Sstevel@tonic-gate fip->fi_rlist = urp->ur_next; 9127c478bd9Sstevel@tonic-gate kmem_free(urp->ur_list, urp->ur_nfiles * sizeof (uf_entry_t)); 9137c478bd9Sstevel@tonic-gate kmem_free(urp, sizeof (uf_rlist_t)); 9147c478bd9Sstevel@tonic-gate } 9157c478bd9Sstevel@tonic-gate } 9167c478bd9Sstevel@tonic-gate 9177c478bd9Sstevel@tonic-gate /* 9187c478bd9Sstevel@tonic-gate * Internal form of close. Decrement reference count on file 9197c478bd9Sstevel@tonic-gate * structure. Decrement reference count on the vnode following 9207c478bd9Sstevel@tonic-gate * removal of the referencing file structure. 9217c478bd9Sstevel@tonic-gate */ 9227c478bd9Sstevel@tonic-gate int 9237c478bd9Sstevel@tonic-gate closef(file_t *fp) 9247c478bd9Sstevel@tonic-gate { 9257c478bd9Sstevel@tonic-gate vnode_t *vp; 9267c478bd9Sstevel@tonic-gate int error; 9277c478bd9Sstevel@tonic-gate int count; 9287c478bd9Sstevel@tonic-gate int flag; 9297c478bd9Sstevel@tonic-gate offset_t offset; 9307c478bd9Sstevel@tonic-gate 9317c478bd9Sstevel@tonic-gate /* 9327c478bd9Sstevel@tonic-gate * audit close of file (may be exit) 9337c478bd9Sstevel@tonic-gate */ 934005d3febSMarek Pospisil if (AU_AUDITING()) 9357c478bd9Sstevel@tonic-gate audit_closef(fp); 9367c478bd9Sstevel@tonic-gate ASSERT(MUTEX_NOT_HELD(&P_FINFO(curproc)->fi_lock)); 9377c478bd9Sstevel@tonic-gate 9387c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 9397c478bd9Sstevel@tonic-gate 9407c478bd9Sstevel@tonic-gate ASSERT(fp->f_count > 0); 9417c478bd9Sstevel@tonic-gate 9427c478bd9Sstevel@tonic-gate count = fp->f_count--; 9437c478bd9Sstevel@tonic-gate flag = fp->f_flag; 9447c478bd9Sstevel@tonic-gate offset = fp->f_offset; 9457c478bd9Sstevel@tonic-gate 9467c478bd9Sstevel@tonic-gate vp = fp->f_vnode; 9477c478bd9Sstevel@tonic-gate 948da6c28aaSamw error = VOP_CLOSE(vp, flag, count, offset, fp->f_cred, NULL); 9497c478bd9Sstevel@tonic-gate 9507c478bd9Sstevel@tonic-gate if (count > 1) { 9517c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 9527c478bd9Sstevel@tonic-gate return (error); 9537c478bd9Sstevel@tonic-gate } 9547c478bd9Sstevel@tonic-gate ASSERT(fp->f_count == 0); 9557c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 9567c478bd9Sstevel@tonic-gate 957b0f673c4SBryan Cantrill /* 958b0f673c4SBryan Cantrill * If DTrace has getf() subroutines active, it will set dtrace_closef 959b0f673c4SBryan Cantrill * to point to code that implements a barrier with respect to probe 960b0f673c4SBryan Cantrill * context. This must be called before the file_t is freed (and the 961b0f673c4SBryan Cantrill * vnode that it refers to is released) -- but it must be after the 962b0f673c4SBryan Cantrill * file_t has been removed from the uf_entry_t. That is, there must 963b0f673c4SBryan Cantrill * be no way for a racing getf() in probe context to yield the fp that 964b0f673c4SBryan Cantrill * we're operating upon. 965b0f673c4SBryan Cantrill */ 966b0f673c4SBryan Cantrill if (dtrace_closef != NULL) 967b0f673c4SBryan Cantrill (*dtrace_closef)(); 968b0f673c4SBryan Cantrill 9697c478bd9Sstevel@tonic-gate VN_RELE(vp); 9707c478bd9Sstevel@tonic-gate /* 9717c478bd9Sstevel@tonic-gate * deallocate resources to audit_data 9727c478bd9Sstevel@tonic-gate */ 9737c478bd9Sstevel@tonic-gate if (audit_active) 9747c478bd9Sstevel@tonic-gate audit_unfalloc(fp); 9757c478bd9Sstevel@tonic-gate crfree(fp->f_cred); 9767c478bd9Sstevel@tonic-gate kmem_cache_free(file_cache, fp); 9777c478bd9Sstevel@tonic-gate return (error); 9787c478bd9Sstevel@tonic-gate } 9797c478bd9Sstevel@tonic-gate 9807c478bd9Sstevel@tonic-gate /* 9817c478bd9Sstevel@tonic-gate * This is a combination of ufalloc() and setf(). 9827c478bd9Sstevel@tonic-gate */ 9837c478bd9Sstevel@tonic-gate int 9847c478bd9Sstevel@tonic-gate ufalloc_file(int start, file_t *fp) 9857c478bd9Sstevel@tonic-gate { 9867c478bd9Sstevel@tonic-gate proc_t *p = curproc; 9877c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 9887c478bd9Sstevel@tonic-gate int filelimit; 9897c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 9907c478bd9Sstevel@tonic-gate int nfiles; 9917c478bd9Sstevel@tonic-gate int fd; 9927c478bd9Sstevel@tonic-gate 9937c478bd9Sstevel@tonic-gate /* 9947c478bd9Sstevel@tonic-gate * Assertion is to convince the correctness of the following 9957c478bd9Sstevel@tonic-gate * assignment for filelimit after casting to int. 9967c478bd9Sstevel@tonic-gate */ 9977c478bd9Sstevel@tonic-gate ASSERT(p->p_fno_ctl <= INT_MAX); 9987c478bd9Sstevel@tonic-gate filelimit = (int)p->p_fno_ctl; 9997c478bd9Sstevel@tonic-gate 10007c478bd9Sstevel@tonic-gate for (;;) { 10017c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 10027c478bd9Sstevel@tonic-gate fd = fd_find(fip, start); 1003a5f69788Scraigm if (fd >= 0 && fd == fip->fi_badfd) { 1004a5f69788Scraigm start = fd + 1; 1005a5f69788Scraigm mutex_exit(&fip->fi_lock); 1006a5f69788Scraigm continue; 1007a5f69788Scraigm } 10087c478bd9Sstevel@tonic-gate if ((uint_t)fd < filelimit) 10097c478bd9Sstevel@tonic-gate break; 10107c478bd9Sstevel@tonic-gate if (fd >= filelimit) { 10117c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 10127c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 10137c478bd9Sstevel@tonic-gate (void) rctl_action(rctlproc_legacy[RLIMIT_NOFILE], 10147c478bd9Sstevel@tonic-gate p->p_rctls, p, RCA_SAFE); 10157c478bd9Sstevel@tonic-gate mutex_exit(&p->p_lock); 10167c478bd9Sstevel@tonic-gate return (-1); 10177c478bd9Sstevel@tonic-gate } 10187c478bd9Sstevel@tonic-gate /* fd_find() returned -1 */ 10197c478bd9Sstevel@tonic-gate nfiles = fip->fi_nfiles; 10207c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 10217c478bd9Sstevel@tonic-gate flist_grow(MAX(start, nfiles)); 10227c478bd9Sstevel@tonic-gate } 10237c478bd9Sstevel@tonic-gate 10247c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 10257c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, 1); 10267c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_file == NULL); 10277c478bd9Sstevel@tonic-gate ufp->uf_file = fp; 10287c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 10297c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 10307c478bd9Sstevel@tonic-gate return (fd); 10317c478bd9Sstevel@tonic-gate } 10327c478bd9Sstevel@tonic-gate 10337c478bd9Sstevel@tonic-gate /* 10347c478bd9Sstevel@tonic-gate * Allocate a user file descriptor greater than or equal to "start". 10357c478bd9Sstevel@tonic-gate */ 10367c478bd9Sstevel@tonic-gate int 10377c478bd9Sstevel@tonic-gate ufalloc(int start) 10387c478bd9Sstevel@tonic-gate { 10397c478bd9Sstevel@tonic-gate return (ufalloc_file(start, NULL)); 10407c478bd9Sstevel@tonic-gate } 10417c478bd9Sstevel@tonic-gate 10427c478bd9Sstevel@tonic-gate /* 10437c478bd9Sstevel@tonic-gate * Check that a future allocation of count fds on proc p has a good 10447c478bd9Sstevel@tonic-gate * chance of succeeding. If not, do rctl processing as if we'd failed 10457c478bd9Sstevel@tonic-gate * the allocation. 10467c478bd9Sstevel@tonic-gate * 10477c478bd9Sstevel@tonic-gate * Our caller must guarantee that p cannot disappear underneath us. 10487c478bd9Sstevel@tonic-gate */ 10497c478bd9Sstevel@tonic-gate int 10507c478bd9Sstevel@tonic-gate ufcanalloc(proc_t *p, uint_t count) 10517c478bd9Sstevel@tonic-gate { 10527c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 10537c478bd9Sstevel@tonic-gate int filelimit; 10547c478bd9Sstevel@tonic-gate int current; 10557c478bd9Sstevel@tonic-gate 10567c478bd9Sstevel@tonic-gate if (count == 0) 10577c478bd9Sstevel@tonic-gate return (1); 10587c478bd9Sstevel@tonic-gate 10597c478bd9Sstevel@tonic-gate ASSERT(p->p_fno_ctl <= INT_MAX); 10607c478bd9Sstevel@tonic-gate filelimit = (int)p->p_fno_ctl; 10617c478bd9Sstevel@tonic-gate 10627c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 10637c478bd9Sstevel@tonic-gate current = flist_nalloc(fip); /* # of in-use descriptors */ 10647c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 10657c478bd9Sstevel@tonic-gate 10667c478bd9Sstevel@tonic-gate /* 10677c478bd9Sstevel@tonic-gate * If count is a positive integer, the worst that can happen is 10687c478bd9Sstevel@tonic-gate * an overflow to a negative value, which is caught by the >= 0 check. 10697c478bd9Sstevel@tonic-gate */ 10707c478bd9Sstevel@tonic-gate current += count; 10717c478bd9Sstevel@tonic-gate if (count <= INT_MAX && current >= 0 && current <= filelimit) 10727c478bd9Sstevel@tonic-gate return (1); 10737c478bd9Sstevel@tonic-gate 10747c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 10757c478bd9Sstevel@tonic-gate (void) rctl_action(rctlproc_legacy[RLIMIT_NOFILE], 10767c478bd9Sstevel@tonic-gate p->p_rctls, p, RCA_SAFE); 10777c478bd9Sstevel@tonic-gate mutex_exit(&p->p_lock); 10787c478bd9Sstevel@tonic-gate return (0); 10797c478bd9Sstevel@tonic-gate } 10807c478bd9Sstevel@tonic-gate 10817c478bd9Sstevel@tonic-gate /* 10827c478bd9Sstevel@tonic-gate * Allocate a user file descriptor and a file structure. 10837c478bd9Sstevel@tonic-gate * Initialize the descriptor to point at the file structure. 10847c478bd9Sstevel@tonic-gate * If fdp is NULL, the user file descriptor will not be allocated. 10857c478bd9Sstevel@tonic-gate */ 10867c478bd9Sstevel@tonic-gate int 10877c478bd9Sstevel@tonic-gate falloc(vnode_t *vp, int flag, file_t **fpp, int *fdp) 10887c478bd9Sstevel@tonic-gate { 10897c478bd9Sstevel@tonic-gate file_t *fp; 10907c478bd9Sstevel@tonic-gate int fd; 10917c478bd9Sstevel@tonic-gate 10927c478bd9Sstevel@tonic-gate if (fdp) { 10937c478bd9Sstevel@tonic-gate if ((fd = ufalloc(0)) == -1) 10947c478bd9Sstevel@tonic-gate return (EMFILE); 10957c478bd9Sstevel@tonic-gate } 10967c478bd9Sstevel@tonic-gate fp = kmem_cache_alloc(file_cache, KM_SLEEP); 10977c478bd9Sstevel@tonic-gate /* 10987c478bd9Sstevel@tonic-gate * Note: falloc returns the fp locked 10997c478bd9Sstevel@tonic-gate */ 11007c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 11017c478bd9Sstevel@tonic-gate fp->f_count = 1; 11027c478bd9Sstevel@tonic-gate fp->f_flag = (ushort_t)flag; 1103794f0adbSRoger A. Faulkner fp->f_flag2 = (flag & (FSEARCH|FEXEC)) >> 16; 11047c478bd9Sstevel@tonic-gate fp->f_vnode = vp; 11057c478bd9Sstevel@tonic-gate fp->f_offset = 0; 11067c478bd9Sstevel@tonic-gate fp->f_audit_data = 0; 11077c478bd9Sstevel@tonic-gate crhold(fp->f_cred = CRED()); 11087c478bd9Sstevel@tonic-gate /* 11097c478bd9Sstevel@tonic-gate * allocate resources to audit_data 11107c478bd9Sstevel@tonic-gate */ 11117c478bd9Sstevel@tonic-gate if (audit_active) 11127c478bd9Sstevel@tonic-gate audit_falloc(fp); 11137c478bd9Sstevel@tonic-gate *fpp = fp; 11147c478bd9Sstevel@tonic-gate if (fdp) 11157c478bd9Sstevel@tonic-gate *fdp = fd; 11167c478bd9Sstevel@tonic-gate return (0); 11177c478bd9Sstevel@tonic-gate } 11187c478bd9Sstevel@tonic-gate 11197c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 11207c478bd9Sstevel@tonic-gate static int 11217c478bd9Sstevel@tonic-gate file_cache_constructor(void *buf, void *cdrarg, int kmflags) 11227c478bd9Sstevel@tonic-gate { 11237c478bd9Sstevel@tonic-gate file_t *fp = buf; 11247c478bd9Sstevel@tonic-gate 11257c478bd9Sstevel@tonic-gate mutex_init(&fp->f_tlock, NULL, MUTEX_DEFAULT, NULL); 11267c478bd9Sstevel@tonic-gate return (0); 11277c478bd9Sstevel@tonic-gate } 11287c478bd9Sstevel@tonic-gate 11297c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 11307c478bd9Sstevel@tonic-gate static void 11317c478bd9Sstevel@tonic-gate file_cache_destructor(void *buf, void *cdrarg) 11327c478bd9Sstevel@tonic-gate { 11337c478bd9Sstevel@tonic-gate file_t *fp = buf; 11347c478bd9Sstevel@tonic-gate 11357c478bd9Sstevel@tonic-gate mutex_destroy(&fp->f_tlock); 11367c478bd9Sstevel@tonic-gate } 11377c478bd9Sstevel@tonic-gate 11387c478bd9Sstevel@tonic-gate void 11397c478bd9Sstevel@tonic-gate finit() 11407c478bd9Sstevel@tonic-gate { 11417c478bd9Sstevel@tonic-gate file_cache = kmem_cache_create("file_cache", sizeof (file_t), 0, 11427c478bd9Sstevel@tonic-gate file_cache_constructor, file_cache_destructor, NULL, NULL, NULL, 0); 11437c478bd9Sstevel@tonic-gate } 11447c478bd9Sstevel@tonic-gate 11457c478bd9Sstevel@tonic-gate void 11467c478bd9Sstevel@tonic-gate unfalloc(file_t *fp) 11477c478bd9Sstevel@tonic-gate { 11487c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fp->f_tlock)); 11497c478bd9Sstevel@tonic-gate if (--fp->f_count <= 0) { 11507c478bd9Sstevel@tonic-gate /* 11517c478bd9Sstevel@tonic-gate * deallocate resources to audit_data 11527c478bd9Sstevel@tonic-gate */ 11537c478bd9Sstevel@tonic-gate if (audit_active) 11547c478bd9Sstevel@tonic-gate audit_unfalloc(fp); 11557c478bd9Sstevel@tonic-gate crfree(fp->f_cred); 11567c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 11577c478bd9Sstevel@tonic-gate kmem_cache_free(file_cache, fp); 11587c478bd9Sstevel@tonic-gate } else 11597c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 11607c478bd9Sstevel@tonic-gate } 11617c478bd9Sstevel@tonic-gate 11627c478bd9Sstevel@tonic-gate /* 11637c478bd9Sstevel@tonic-gate * Given a file descriptor, set the user's 11647c478bd9Sstevel@tonic-gate * file pointer to the given parameter. 11657c478bd9Sstevel@tonic-gate */ 11667c478bd9Sstevel@tonic-gate void 11677c478bd9Sstevel@tonic-gate setf(int fd, file_t *fp) 11687c478bd9Sstevel@tonic-gate { 11697c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 11707c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 11717c478bd9Sstevel@tonic-gate 1172005d3febSMarek Pospisil if (AU_AUDITING()) 11737c478bd9Sstevel@tonic-gate audit_setf(fp, fd); 11747c478bd9Sstevel@tonic-gate 11757c478bd9Sstevel@tonic-gate if (fp == NULL) { 11767c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 11777c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11787c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, -1); 11797c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 11807c478bd9Sstevel@tonic-gate } else { 11817c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11827c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_busy); 11837c478bd9Sstevel@tonic-gate } 11847c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 11857c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_flag == 0); 11867c478bd9Sstevel@tonic-gate ufp->uf_file = fp; 11877c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_wanted_cv); 11887c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 11897c478bd9Sstevel@tonic-gate } 11907c478bd9Sstevel@tonic-gate 11917c478bd9Sstevel@tonic-gate /* 11927c478bd9Sstevel@tonic-gate * Given a file descriptor, return the file table flags, plus, 11937c478bd9Sstevel@tonic-gate * if this is a socket in asynchronous mode, the FASYNC flag. 11947c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_getfl(). 11957c478bd9Sstevel@tonic-gate */ 11967c478bd9Sstevel@tonic-gate int 11977c478bd9Sstevel@tonic-gate f_getfl(int fd, int *flagp) 11987c478bd9Sstevel@tonic-gate { 11997c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 12007c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 12017c478bd9Sstevel@tonic-gate file_t *fp; 12027c478bd9Sstevel@tonic-gate int error; 12037c478bd9Sstevel@tonic-gate 12047c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 12057c478bd9Sstevel@tonic-gate error = EBADF; 12067c478bd9Sstevel@tonic-gate else { 12077c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 12087c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) 12097c478bd9Sstevel@tonic-gate error = EBADF; 12107c478bd9Sstevel@tonic-gate else { 12117c478bd9Sstevel@tonic-gate vnode_t *vp = fp->f_vnode; 1212*a5eb7107SBryan Cantrill int flag = fp->f_flag | 1213*a5eb7107SBryan Cantrill ((fp->f_flag2 & ~FEPOLLED) << 16); 12147c478bd9Sstevel@tonic-gate 12157c478bd9Sstevel@tonic-gate /* 12167c478bd9Sstevel@tonic-gate * BSD fcntl() FASYNC compatibility. 12177c478bd9Sstevel@tonic-gate */ 12180f1702c5SYu Xiangning if (vp->v_type == VSOCK) 12197c478bd9Sstevel@tonic-gate flag |= sock_getfasync(vp); 12207c478bd9Sstevel@tonic-gate *flagp = flag; 12217c478bd9Sstevel@tonic-gate error = 0; 12227c478bd9Sstevel@tonic-gate } 12237c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 12247c478bd9Sstevel@tonic-gate } 12257c478bd9Sstevel@tonic-gate 12267c478bd9Sstevel@tonic-gate return (error); 12277c478bd9Sstevel@tonic-gate } 12287c478bd9Sstevel@tonic-gate 12297c478bd9Sstevel@tonic-gate /* 12307c478bd9Sstevel@tonic-gate * Given a file descriptor, return the user's file flags. 12317c478bd9Sstevel@tonic-gate * Force the FD_CLOEXEC flag for writable self-open /proc files. 12327c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_getfd_error(). 12337c478bd9Sstevel@tonic-gate */ 12347c478bd9Sstevel@tonic-gate int 12357c478bd9Sstevel@tonic-gate f_getfd_error(int fd, int *flagp) 12367c478bd9Sstevel@tonic-gate { 12377c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 12387c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 12397c478bd9Sstevel@tonic-gate file_t *fp; 12407c478bd9Sstevel@tonic-gate int flag; 12417c478bd9Sstevel@tonic-gate int error; 12427c478bd9Sstevel@tonic-gate 12437c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 12447c478bd9Sstevel@tonic-gate error = EBADF; 12457c478bd9Sstevel@tonic-gate else { 12467c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 12477c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) 12487c478bd9Sstevel@tonic-gate error = EBADF; 12497c478bd9Sstevel@tonic-gate else { 12507c478bd9Sstevel@tonic-gate flag = ufp->uf_flag; 12517c478bd9Sstevel@tonic-gate if ((fp->f_flag & FWRITE) && pr_isself(fp->f_vnode)) 12527c478bd9Sstevel@tonic-gate flag |= FD_CLOEXEC; 12537c478bd9Sstevel@tonic-gate *flagp = flag; 12547c478bd9Sstevel@tonic-gate error = 0; 12557c478bd9Sstevel@tonic-gate } 12567c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 12577c478bd9Sstevel@tonic-gate } 12587c478bd9Sstevel@tonic-gate 12597c478bd9Sstevel@tonic-gate return (error); 12607c478bd9Sstevel@tonic-gate } 12617c478bd9Sstevel@tonic-gate 12627c478bd9Sstevel@tonic-gate /* 12637c478bd9Sstevel@tonic-gate * getf() must have been called before calling f_getfd(). 12647c478bd9Sstevel@tonic-gate */ 12657c478bd9Sstevel@tonic-gate char 12667c478bd9Sstevel@tonic-gate f_getfd(int fd) 12677c478bd9Sstevel@tonic-gate { 12687c478bd9Sstevel@tonic-gate int flag = 0; 12697c478bd9Sstevel@tonic-gate (void) f_getfd_error(fd, &flag); 12707c478bd9Sstevel@tonic-gate return ((char)flag); 12717c478bd9Sstevel@tonic-gate } 12727c478bd9Sstevel@tonic-gate 12737c478bd9Sstevel@tonic-gate /* 12747c478bd9Sstevel@tonic-gate * Given a file descriptor and file flags, set the user's file flags. 12757c478bd9Sstevel@tonic-gate * At present, the only valid flag is FD_CLOEXEC. 12767c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_setfd_error(). 12777c478bd9Sstevel@tonic-gate */ 12787c478bd9Sstevel@tonic-gate int 12797c478bd9Sstevel@tonic-gate f_setfd_error(int fd, int flags) 12807c478bd9Sstevel@tonic-gate { 12817c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 12827c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 12837c478bd9Sstevel@tonic-gate int error; 12847c478bd9Sstevel@tonic-gate 12857c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 12867c478bd9Sstevel@tonic-gate error = EBADF; 12877c478bd9Sstevel@tonic-gate else { 12887c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 12897c478bd9Sstevel@tonic-gate if (ufp->uf_file == NULL) 12907c478bd9Sstevel@tonic-gate error = EBADF; 12917c478bd9Sstevel@tonic-gate else { 12927c478bd9Sstevel@tonic-gate ufp->uf_flag = flags & FD_CLOEXEC; 12937c478bd9Sstevel@tonic-gate error = 0; 12947c478bd9Sstevel@tonic-gate } 12957c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 12967c478bd9Sstevel@tonic-gate } 12977c478bd9Sstevel@tonic-gate return (error); 12987c478bd9Sstevel@tonic-gate } 12997c478bd9Sstevel@tonic-gate 13007c478bd9Sstevel@tonic-gate void 13017c478bd9Sstevel@tonic-gate f_setfd(int fd, char flags) 13027c478bd9Sstevel@tonic-gate { 13037c478bd9Sstevel@tonic-gate (void) f_setfd_error(fd, flags); 13047c478bd9Sstevel@tonic-gate } 13057c478bd9Sstevel@tonic-gate 1306a5f69788Scraigm #define BADFD_MIN 3 1307a5f69788Scraigm #define BADFD_MAX 255 1308a5f69788Scraigm 1309a5f69788Scraigm /* 1310a5f69788Scraigm * Attempt to allocate a file descriptor which is bad and which 1311a5f69788Scraigm * is "poison" to the application. It cannot be closed (except 1312a5f69788Scraigm * on exec), allocated for a different use, etc. 1313a5f69788Scraigm */ 1314a5f69788Scraigm int 1315a5f69788Scraigm f_badfd(int start, int *fdp, int action) 1316a5f69788Scraigm { 1317a5f69788Scraigm int fdr; 1318a5f69788Scraigm int badfd; 1319a5f69788Scraigm uf_info_t *fip = P_FINFO(curproc); 1320a5f69788Scraigm 1321a5f69788Scraigm #ifdef _LP64 1322a5f69788Scraigm /* No restrictions on 64 bit _file */ 1323a5f69788Scraigm if (get_udatamodel() != DATAMODEL_ILP32) 1324a5f69788Scraigm return (EINVAL); 1325a5f69788Scraigm #endif 1326a5f69788Scraigm 1327a5f69788Scraigm if (start > BADFD_MAX || start < BADFD_MIN) 1328a5f69788Scraigm return (EINVAL); 1329a5f69788Scraigm 1330a5f69788Scraigm if (action >= NSIG || action < 0) 1331a5f69788Scraigm return (EINVAL); 1332a5f69788Scraigm 1333a5f69788Scraigm mutex_enter(&fip->fi_lock); 1334a5f69788Scraigm badfd = fip->fi_badfd; 1335a5f69788Scraigm mutex_exit(&fip->fi_lock); 1336a5f69788Scraigm 1337a5f69788Scraigm if (badfd != -1) 1338a5f69788Scraigm return (EAGAIN); 1339a5f69788Scraigm 1340a5f69788Scraigm fdr = ufalloc(start); 1341a5f69788Scraigm 1342a5f69788Scraigm if (fdr > BADFD_MAX) { 1343a5f69788Scraigm setf(fdr, NULL); 1344a5f69788Scraigm return (EMFILE); 1345a5f69788Scraigm } 1346a5f69788Scraigm if (fdr < 0) 1347a5f69788Scraigm return (EMFILE); 1348a5f69788Scraigm 1349a5f69788Scraigm mutex_enter(&fip->fi_lock); 1350a5f69788Scraigm if (fip->fi_badfd != -1) { 1351a5f69788Scraigm /* Lost race */ 1352a5f69788Scraigm mutex_exit(&fip->fi_lock); 1353a5f69788Scraigm setf(fdr, NULL); 1354a5f69788Scraigm return (EAGAIN); 1355a5f69788Scraigm } 1356a5f69788Scraigm fip->fi_action = action; 1357a5f69788Scraigm fip->fi_badfd = fdr; 1358a5f69788Scraigm mutex_exit(&fip->fi_lock); 1359a5f69788Scraigm setf(fdr, NULL); 1360a5f69788Scraigm 1361a5f69788Scraigm *fdp = fdr; 1362a5f69788Scraigm 1363a5f69788Scraigm return (0); 1364a5f69788Scraigm } 1365a5f69788Scraigm 13667c478bd9Sstevel@tonic-gate /* 13677c478bd9Sstevel@tonic-gate * Allocate a file descriptor and assign it to the vnode "*vpp", 13687c478bd9Sstevel@tonic-gate * performing the usual open protocol upon it and returning the 13697c478bd9Sstevel@tonic-gate * file descriptor allocated. It is the responsibility of the 13707c478bd9Sstevel@tonic-gate * caller to dispose of "*vpp" if any error occurs. 13717c478bd9Sstevel@tonic-gate */ 13727c478bd9Sstevel@tonic-gate int 13737c478bd9Sstevel@tonic-gate fassign(vnode_t **vpp, int mode, int *fdp) 13747c478bd9Sstevel@tonic-gate { 13757c478bd9Sstevel@tonic-gate file_t *fp; 13767c478bd9Sstevel@tonic-gate int error; 13777c478bd9Sstevel@tonic-gate int fd; 13787c478bd9Sstevel@tonic-gate 13797c478bd9Sstevel@tonic-gate if (error = falloc((vnode_t *)NULL, mode, &fp, &fd)) 13807c478bd9Sstevel@tonic-gate return (error); 1381da6c28aaSamw if (error = VOP_OPEN(vpp, mode, fp->f_cred, NULL)) { 13827c478bd9Sstevel@tonic-gate setf(fd, NULL); 13837c478bd9Sstevel@tonic-gate unfalloc(fp); 13847c478bd9Sstevel@tonic-gate return (error); 13857c478bd9Sstevel@tonic-gate } 13867c478bd9Sstevel@tonic-gate fp->f_vnode = *vpp; 13877c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 13887c478bd9Sstevel@tonic-gate /* 13897c478bd9Sstevel@tonic-gate * Fill in the slot falloc reserved. 13907c478bd9Sstevel@tonic-gate */ 13917c478bd9Sstevel@tonic-gate setf(fd, fp); 13927c478bd9Sstevel@tonic-gate *fdp = fd; 13937c478bd9Sstevel@tonic-gate return (0); 13947c478bd9Sstevel@tonic-gate } 13957c478bd9Sstevel@tonic-gate 13967c478bd9Sstevel@tonic-gate /* 13977c478bd9Sstevel@tonic-gate * When a process forks it must increment the f_count of all file pointers 13987c478bd9Sstevel@tonic-gate * since there is a new process pointing at them. fcnt_add(fip, 1) does this. 13997c478bd9Sstevel@tonic-gate * Since we are called when there is only 1 active lwp we don't need to 14007c478bd9Sstevel@tonic-gate * hold fi_lock or any uf_lock. If the fork fails, fork_fail() calls 14017c478bd9Sstevel@tonic-gate * fcnt_add(fip, -1) to restore the counts. 14027c478bd9Sstevel@tonic-gate */ 14037c478bd9Sstevel@tonic-gate void 14047c478bd9Sstevel@tonic-gate fcnt_add(uf_info_t *fip, int incr) 14057c478bd9Sstevel@tonic-gate { 14067c478bd9Sstevel@tonic-gate int i; 14077c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 14087c478bd9Sstevel@tonic-gate file_t *fp; 14097c478bd9Sstevel@tonic-gate 14107c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 14117c478bd9Sstevel@tonic-gate for (i = 0; i < fip->fi_nfiles; i++, ufp++) { 14127c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL) { 14137c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 14147c478bd9Sstevel@tonic-gate ASSERT((incr == 1 && fp->f_count >= 1) || 14157c478bd9Sstevel@tonic-gate (incr == -1 && fp->f_count >= 2)); 14167c478bd9Sstevel@tonic-gate fp->f_count += incr; 14177c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 14187c478bd9Sstevel@tonic-gate } 14197c478bd9Sstevel@tonic-gate } 14207c478bd9Sstevel@tonic-gate } 14217c478bd9Sstevel@tonic-gate 14227c478bd9Sstevel@tonic-gate /* 14237c478bd9Sstevel@tonic-gate * This is called from exec to close all fd's that have the FD_CLOEXEC flag 14247c478bd9Sstevel@tonic-gate * set and also to close all self-open for write /proc file descriptors. 14257c478bd9Sstevel@tonic-gate */ 14267c478bd9Sstevel@tonic-gate void 14277c478bd9Sstevel@tonic-gate close_exec(uf_info_t *fip) 14287c478bd9Sstevel@tonic-gate { 14297c478bd9Sstevel@tonic-gate int fd; 14307c478bd9Sstevel@tonic-gate file_t *fp; 14317c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 14327c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 14337c478bd9Sstevel@tonic-gate portfd_t *pfd; 14347c478bd9Sstevel@tonic-gate 14357c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 14367c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++, ufp++) { 14377c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 14387c478bd9Sstevel@tonic-gate ((ufp->uf_flag & FD_CLOEXEC) || 14397c478bd9Sstevel@tonic-gate ((fp->f_flag & FWRITE) && pr_isself(fp->f_vnode)))) { 14407c478bd9Sstevel@tonic-gate fpip = ufp->uf_fpollinfo; 14417c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 14427c478bd9Sstevel@tonic-gate mutex_enter(&ufp->uf_lock); 14437c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, -1); 14447c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 14457c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 14467c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = NULL; 14477c478bd9Sstevel@tonic-gate ufp->uf_flag = 0; 14487c478bd9Sstevel@tonic-gate /* 14497c478bd9Sstevel@tonic-gate * We may need to cleanup some cached poll states 14507c478bd9Sstevel@tonic-gate * in t_pollstate before the fd can be reused. It 14517c478bd9Sstevel@tonic-gate * is important that we don't access a stale thread 14527c478bd9Sstevel@tonic-gate * structure. We will do the cleanup in two 14537c478bd9Sstevel@tonic-gate * phases to avoid deadlock and holding uf_lock for 14547c478bd9Sstevel@tonic-gate * too long. In phase 1, hold the uf_lock and call 14557c478bd9Sstevel@tonic-gate * pollblockexit() to set state in t_pollstate struct 14567c478bd9Sstevel@tonic-gate * so that a thread does not exit on us. In phase 2, 14577c478bd9Sstevel@tonic-gate * we drop the uf_lock and call pollcacheclean(). 14587c478bd9Sstevel@tonic-gate */ 14597c478bd9Sstevel@tonic-gate pfd = ufp->uf_portfd; 14607c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 14617c478bd9Sstevel@tonic-gate if (fpip != NULL) 14627c478bd9Sstevel@tonic-gate pollblockexit(fpip); 14637c478bd9Sstevel@tonic-gate mutex_exit(&ufp->uf_lock); 14647c478bd9Sstevel@tonic-gate if (fpip != NULL) 14657c478bd9Sstevel@tonic-gate pollcacheclean(fpip, fd); 14667c478bd9Sstevel@tonic-gate if (pfd) 146761b4b1efSpraks port_close_fd(pfd); 14687c478bd9Sstevel@tonic-gate (void) closef(fp); 14697c478bd9Sstevel@tonic-gate } 14707c478bd9Sstevel@tonic-gate } 1471a5f69788Scraigm 1472a5f69788Scraigm /* Reset bad fd */ 1473a5f69788Scraigm fip->fi_badfd = -1; 1474a5f69788Scraigm fip->fi_action = -1; 14757c478bd9Sstevel@tonic-gate } 14767c478bd9Sstevel@tonic-gate 14777c478bd9Sstevel@tonic-gate /* 1478794f0adbSRoger A. Faulkner * Utility function called by most of the *at() system call interfaces. 1479794f0adbSRoger A. Faulkner * 1480794f0adbSRoger A. Faulkner * Generate a starting vnode pointer for an (fd, path) pair where 'fd' 1481794f0adbSRoger A. Faulkner * is an open file descriptor for a directory to be used as the starting 1482794f0adbSRoger A. Faulkner * point for the lookup of the relative pathname 'path' (or, if path is 1483794f0adbSRoger A. Faulkner * NULL, generate a vnode pointer for the direct target of the operation). 1484794f0adbSRoger A. Faulkner * 1485794f0adbSRoger A. Faulkner * If we successfully return a non-NULL startvp, it has been the target 1486794f0adbSRoger A. Faulkner * of VN_HOLD() and the caller must call VN_RELE() on it. 14877c478bd9Sstevel@tonic-gate */ 14887c478bd9Sstevel@tonic-gate int 1489794f0adbSRoger A. Faulkner fgetstartvp(int fd, char *path, vnode_t **startvpp) 14907c478bd9Sstevel@tonic-gate { 1491794f0adbSRoger A. Faulkner vnode_t *startvp; 1492794f0adbSRoger A. Faulkner file_t *startfp; 1493794f0adbSRoger A. Faulkner char startchar; 14947c478bd9Sstevel@tonic-gate 1495794f0adbSRoger A. Faulkner if (fd == AT_FDCWD && path == NULL) 1496794f0adbSRoger A. Faulkner return (EFAULT); 14977c478bd9Sstevel@tonic-gate 1498794f0adbSRoger A. Faulkner if (fd == AT_FDCWD) { 14997c478bd9Sstevel@tonic-gate /* 1500794f0adbSRoger A. Faulkner * Start from the current working directory. 15017c478bd9Sstevel@tonic-gate */ 1502794f0adbSRoger A. Faulkner startvp = NULL; 1503794f0adbSRoger A. Faulkner } else { 1504794f0adbSRoger A. Faulkner if (path == NULL) 1505794f0adbSRoger A. Faulkner startchar = '\0'; 1506794f0adbSRoger A. Faulkner else if (copyin(path, &startchar, sizeof (char))) 1507794f0adbSRoger A. Faulkner return (EFAULT); 15087c478bd9Sstevel@tonic-gate 1509794f0adbSRoger A. Faulkner if (startchar == '/') { 1510794f0adbSRoger A. Faulkner /* 1511794f0adbSRoger A. Faulkner * 'path' is an absolute pathname. 1512794f0adbSRoger A. Faulkner */ 1513794f0adbSRoger A. Faulkner startvp = NULL; 1514794f0adbSRoger A. Faulkner } else { 1515794f0adbSRoger A. Faulkner /* 1516794f0adbSRoger A. Faulkner * 'path' is a relative pathname or we will 1517794f0adbSRoger A. Faulkner * be applying the operation to 'fd' itself. 1518794f0adbSRoger A. Faulkner */ 1519794f0adbSRoger A. Faulkner if ((startfp = getf(fd)) == NULL) 1520794f0adbSRoger A. Faulkner return (EBADF); 1521794f0adbSRoger A. Faulkner startvp = startfp->f_vnode; 1522794f0adbSRoger A. Faulkner VN_HOLD(startvp); 15237c478bd9Sstevel@tonic-gate releasef(fd); 1524794f0adbSRoger A. Faulkner } 1525794f0adbSRoger A. Faulkner } 1526794f0adbSRoger A. Faulkner *startvpp = startvp; 1527794f0adbSRoger A. Faulkner return (0); 15287c478bd9Sstevel@tonic-gate } 15297c478bd9Sstevel@tonic-gate 15307c478bd9Sstevel@tonic-gate /* 1531794f0adbSRoger A. Faulkner * Called from fchownat() and fchmodat() to set ownership and mode. 1532794f0adbSRoger A. Faulkner * The contents of *vap must be set before calling here. 15337c478bd9Sstevel@tonic-gate */ 1534794f0adbSRoger A. Faulkner int 1535794f0adbSRoger A. Faulkner fsetattrat(int fd, char *path, int flags, struct vattr *vap) 15367c478bd9Sstevel@tonic-gate { 1537794f0adbSRoger A. Faulkner vnode_t *startvp; 1538794f0adbSRoger A. Faulkner vnode_t *vp; 1539794f0adbSRoger A. Faulkner int error; 1540794f0adbSRoger A. Faulkner 1541794f0adbSRoger A. Faulkner /* 1542794f0adbSRoger A. Faulkner * Since we are never called to set the size of a file, we don't 1543794f0adbSRoger A. Faulkner * need to check for non-blocking locks (via nbl_need_check(vp)). 1544794f0adbSRoger A. Faulkner */ 1545794f0adbSRoger A. Faulkner ASSERT(!(vap->va_mask & AT_SIZE)); 1546794f0adbSRoger A. Faulkner 1547794f0adbSRoger A. Faulkner if ((error = fgetstartvp(fd, path, &startvp)) != 0) 1548794f0adbSRoger A. Faulkner return (error); 1549794f0adbSRoger A. Faulkner if (AU_AUDITING() && startvp != NULL) 1550794f0adbSRoger A. Faulkner audit_setfsat_path(1); 1551794f0adbSRoger A. Faulkner 1552794f0adbSRoger A. Faulkner /* 1553794f0adbSRoger A. Faulkner * Do lookup for fchownat/fchmodat when path not NULL 1554794f0adbSRoger A. Faulkner */ 1555794f0adbSRoger A. Faulkner if (path != NULL) { 1556794f0adbSRoger A. Faulkner if (error = lookupnameat(path, UIO_USERSPACE, 1557794f0adbSRoger A. Faulkner (flags == AT_SYMLINK_NOFOLLOW) ? 1558794f0adbSRoger A. Faulkner NO_FOLLOW : FOLLOW, 1559794f0adbSRoger A. Faulkner NULLVPP, &vp, startvp)) { 1560794f0adbSRoger A. Faulkner if (startvp != NULL) 1561794f0adbSRoger A. Faulkner VN_RELE(startvp); 1562794f0adbSRoger A. Faulkner return (error); 1563794f0adbSRoger A. Faulkner } 1564794f0adbSRoger A. Faulkner } else { 1565794f0adbSRoger A. Faulkner vp = startvp; 1566794f0adbSRoger A. Faulkner ASSERT(vp); 1567794f0adbSRoger A. Faulkner VN_HOLD(vp); 1568794f0adbSRoger A. Faulkner } 15697c478bd9Sstevel@tonic-gate 15707c478bd9Sstevel@tonic-gate if (vn_is_readonly(vp)) { 15717c478bd9Sstevel@tonic-gate error = EROFS; 1572794f0adbSRoger A. Faulkner } else { 1573794f0adbSRoger A. Faulkner error = VOP_SETATTR(vp, vap, 0, CRED(), NULL); 15747c478bd9Sstevel@tonic-gate } 15757c478bd9Sstevel@tonic-gate 1576794f0adbSRoger A. Faulkner if (startvp != NULL) 1577794f0adbSRoger A. Faulkner VN_RELE(startvp); 1578794f0adbSRoger A. Faulkner VN_RELE(vp); 15797c478bd9Sstevel@tonic-gate 15807c478bd9Sstevel@tonic-gate return (error); 15817c478bd9Sstevel@tonic-gate } 15827c478bd9Sstevel@tonic-gate 15837c478bd9Sstevel@tonic-gate /* 15847c478bd9Sstevel@tonic-gate * Return true if the given vnode is referenced by any 15857c478bd9Sstevel@tonic-gate * entry in the current process's file descriptor table. 15867c478bd9Sstevel@tonic-gate */ 15877c478bd9Sstevel@tonic-gate int 15887c478bd9Sstevel@tonic-gate fisopen(vnode_t *vp) 15897c478bd9Sstevel@tonic-gate { 15907c478bd9Sstevel@tonic-gate int fd; 15917c478bd9Sstevel@tonic-gate file_t *fp; 15927c478bd9Sstevel@tonic-gate vnode_t *ovp; 15937c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 15947c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 15957c478bd9Sstevel@tonic-gate 15967c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 15977c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 15987c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 15997c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 16007c478bd9Sstevel@tonic-gate (ovp = fp->f_vnode) != NULL && VN_CMP(vp, ovp)) { 16017c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16027c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 16037c478bd9Sstevel@tonic-gate return (1); 16047c478bd9Sstevel@tonic-gate } 16057c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16067c478bd9Sstevel@tonic-gate } 16077c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 16087c478bd9Sstevel@tonic-gate return (0); 16097c478bd9Sstevel@tonic-gate } 16107c478bd9Sstevel@tonic-gate 16117c478bd9Sstevel@tonic-gate /* 16127c478bd9Sstevel@tonic-gate * Return zero if at least one file currently open (by curproc) shouldn't be 16137c478bd9Sstevel@tonic-gate * allowed to change zones. 16147c478bd9Sstevel@tonic-gate */ 16157c478bd9Sstevel@tonic-gate int 16167c478bd9Sstevel@tonic-gate files_can_change_zones(void) 16177c478bd9Sstevel@tonic-gate { 16187c478bd9Sstevel@tonic-gate int fd; 16197c478bd9Sstevel@tonic-gate file_t *fp; 16207c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16217c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 16227c478bd9Sstevel@tonic-gate 16237c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 16247c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 16257c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16267c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 16277c478bd9Sstevel@tonic-gate !vn_can_change_zones(fp->f_vnode)) { 16287c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16297c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 16307c478bd9Sstevel@tonic-gate return (0); 16317c478bd9Sstevel@tonic-gate } 16327c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16337c478bd9Sstevel@tonic-gate } 16347c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 16357c478bd9Sstevel@tonic-gate return (1); 16367c478bd9Sstevel@tonic-gate } 16377c478bd9Sstevel@tonic-gate 16387c478bd9Sstevel@tonic-gate #ifdef DEBUG 16397c478bd9Sstevel@tonic-gate 16407c478bd9Sstevel@tonic-gate /* 16417c478bd9Sstevel@tonic-gate * The following functions are only used in ASSERT()s elsewhere. 16427c478bd9Sstevel@tonic-gate * They do not modify the state of the system. 16437c478bd9Sstevel@tonic-gate */ 16447c478bd9Sstevel@tonic-gate 16457c478bd9Sstevel@tonic-gate /* 16467c478bd9Sstevel@tonic-gate * Return true (1) if the current thread is in the fpollinfo 16477c478bd9Sstevel@tonic-gate * list for this file descriptor, else false (0). 16487c478bd9Sstevel@tonic-gate */ 16497c478bd9Sstevel@tonic-gate static int 16507c478bd9Sstevel@tonic-gate curthread_in_plist(uf_entry_t *ufp) 16517c478bd9Sstevel@tonic-gate { 16527c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 16537c478bd9Sstevel@tonic-gate 16547c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&ufp->uf_lock)); 16557c478bd9Sstevel@tonic-gate for (fpip = ufp->uf_fpollinfo; fpip; fpip = fpip->fp_next) 16567c478bd9Sstevel@tonic-gate if (fpip->fp_thread == curthread) 16577c478bd9Sstevel@tonic-gate return (1); 16587c478bd9Sstevel@tonic-gate return (0); 16597c478bd9Sstevel@tonic-gate } 16607c478bd9Sstevel@tonic-gate 16617c478bd9Sstevel@tonic-gate /* 16627c478bd9Sstevel@tonic-gate * Sanity check to make sure that after lwp_exit(), 16637c478bd9Sstevel@tonic-gate * curthread does not appear on any fd's fpollinfo list. 16647c478bd9Sstevel@tonic-gate */ 16657c478bd9Sstevel@tonic-gate void 16667c478bd9Sstevel@tonic-gate checkfpollinfo(void) 16677c478bd9Sstevel@tonic-gate { 16687c478bd9Sstevel@tonic-gate int fd; 16697c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16707c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 16717c478bd9Sstevel@tonic-gate 16727c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 16737c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 16747c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16757c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 16767c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16777c478bd9Sstevel@tonic-gate } 16787c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 16797c478bd9Sstevel@tonic-gate } 16807c478bd9Sstevel@tonic-gate 16817c478bd9Sstevel@tonic-gate /* 16827c478bd9Sstevel@tonic-gate * Return true (1) if the current thread is in the fpollinfo 16837c478bd9Sstevel@tonic-gate * list for this file descriptor, else false (0). 16847c478bd9Sstevel@tonic-gate * This is the same as curthread_in_plist(), 16857c478bd9Sstevel@tonic-gate * but is called w/o holding uf_lock. 16867c478bd9Sstevel@tonic-gate */ 16877c478bd9Sstevel@tonic-gate int 16887c478bd9Sstevel@tonic-gate infpollinfo(int fd) 16897c478bd9Sstevel@tonic-gate { 16907c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16917c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 16927c478bd9Sstevel@tonic-gate int rc; 16937c478bd9Sstevel@tonic-gate 16947c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16957c478bd9Sstevel@tonic-gate rc = curthread_in_plist(ufp); 16967c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16977c478bd9Sstevel@tonic-gate return (rc); 16987c478bd9Sstevel@tonic-gate } 16997c478bd9Sstevel@tonic-gate 17007c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 17017c478bd9Sstevel@tonic-gate 17027c478bd9Sstevel@tonic-gate /* 17037c478bd9Sstevel@tonic-gate * Add the curthread to fpollinfo list, meaning this fd is currently in the 17047c478bd9Sstevel@tonic-gate * thread's poll cache. Each lwp polling this file descriptor should call 17057c478bd9Sstevel@tonic-gate * this routine once. 17067c478bd9Sstevel@tonic-gate */ 17077c478bd9Sstevel@tonic-gate void 17087c478bd9Sstevel@tonic-gate addfpollinfo(int fd) 17097c478bd9Sstevel@tonic-gate { 17107c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 17117c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 17127c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 17137c478bd9Sstevel@tonic-gate 17147c478bd9Sstevel@tonic-gate fpip = kmem_zalloc(sizeof (fpollinfo_t), KM_SLEEP); 17157c478bd9Sstevel@tonic-gate fpip->fp_thread = curthread; 17167c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 17177c478bd9Sstevel@tonic-gate /* 17187c478bd9Sstevel@tonic-gate * Assert we are not already on the list, that is, that 17197c478bd9Sstevel@tonic-gate * this lwp did not call addfpollinfo twice for the same fd. 17207c478bd9Sstevel@tonic-gate */ 17217c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 17227c478bd9Sstevel@tonic-gate /* 17237c478bd9Sstevel@tonic-gate * addfpollinfo is always done inside the getf/releasef pair. 17247c478bd9Sstevel@tonic-gate */ 17257c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 17267c478bd9Sstevel@tonic-gate fpip->fp_next = ufp->uf_fpollinfo; 17277c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = fpip; 17287c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 17297c478bd9Sstevel@tonic-gate } 17307c478bd9Sstevel@tonic-gate 17317c478bd9Sstevel@tonic-gate /* 1732f57e3e4cSRoger A. Faulkner * Delete curthread from fpollinfo list if it is there. 17337c478bd9Sstevel@tonic-gate */ 17347c478bd9Sstevel@tonic-gate void 17357c478bd9Sstevel@tonic-gate delfpollinfo(int fd) 17367c478bd9Sstevel@tonic-gate { 17377c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 17387c478bd9Sstevel@tonic-gate struct fpollinfo *fpip; 17397c478bd9Sstevel@tonic-gate struct fpollinfo **fpipp; 17407c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 17417c478bd9Sstevel@tonic-gate 17427c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 1743f57e3e4cSRoger A. Faulkner for (fpipp = &ufp->uf_fpollinfo; 1744f57e3e4cSRoger A. Faulkner (fpip = *fpipp) != NULL; 1745f57e3e4cSRoger A. Faulkner fpipp = &fpip->fp_next) { 1746f57e3e4cSRoger A. Faulkner if (fpip->fp_thread == curthread) { 17477c478bd9Sstevel@tonic-gate *fpipp = fpip->fp_next; 17487c478bd9Sstevel@tonic-gate kmem_free(fpip, sizeof (fpollinfo_t)); 1749f57e3e4cSRoger A. Faulkner break; 1750f57e3e4cSRoger A. Faulkner } 1751f57e3e4cSRoger A. Faulkner } 17527c478bd9Sstevel@tonic-gate /* 17537c478bd9Sstevel@tonic-gate * Assert that we are not still on the list, that is, that 17547c478bd9Sstevel@tonic-gate * this lwp did not call addfpollinfo twice for the same fd. 17557c478bd9Sstevel@tonic-gate */ 17567c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 17577c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 17587c478bd9Sstevel@tonic-gate } 17597c478bd9Sstevel@tonic-gate 17607c478bd9Sstevel@tonic-gate /* 17617c478bd9Sstevel@tonic-gate * fd is associated with a port. pfd is a pointer to the fd entry in the 17627c478bd9Sstevel@tonic-gate * cache of the port. 17637c478bd9Sstevel@tonic-gate */ 17647c478bd9Sstevel@tonic-gate 17657c478bd9Sstevel@tonic-gate void 17667c478bd9Sstevel@tonic-gate addfd_port(int fd, portfd_t *pfd) 17677c478bd9Sstevel@tonic-gate { 17687c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 17697c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 17707c478bd9Sstevel@tonic-gate 17717c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 17727c478bd9Sstevel@tonic-gate /* 17737c478bd9Sstevel@tonic-gate * addfd_port is always done inside the getf/releasef pair. 17747c478bd9Sstevel@tonic-gate */ 17757c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 17767c478bd9Sstevel@tonic-gate if (ufp->uf_portfd == NULL) { 17777c478bd9Sstevel@tonic-gate /* first entry */ 17787c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd; 17797c478bd9Sstevel@tonic-gate pfd->pfd_next = NULL; 17807c478bd9Sstevel@tonic-gate } else { 17817c478bd9Sstevel@tonic-gate pfd->pfd_next = ufp->uf_portfd; 17827c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd; 17837c478bd9Sstevel@tonic-gate pfd->pfd_next->pfd_prev = pfd; 17847c478bd9Sstevel@tonic-gate } 17857c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 17867c478bd9Sstevel@tonic-gate } 17877c478bd9Sstevel@tonic-gate 17887c478bd9Sstevel@tonic-gate void 17897c478bd9Sstevel@tonic-gate delfd_port(int fd, portfd_t *pfd) 17907c478bd9Sstevel@tonic-gate { 17917c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 17927c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 17937c478bd9Sstevel@tonic-gate 17947c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 17957c478bd9Sstevel@tonic-gate /* 17967c478bd9Sstevel@tonic-gate * delfd_port is always done inside the getf/releasef pair. 17977c478bd9Sstevel@tonic-gate */ 17987c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 17997c478bd9Sstevel@tonic-gate if (ufp->uf_portfd == pfd) { 18007c478bd9Sstevel@tonic-gate /* remove first entry */ 18017c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd->pfd_next; 18027c478bd9Sstevel@tonic-gate } else { 18037c478bd9Sstevel@tonic-gate pfd->pfd_prev->pfd_next = pfd->pfd_next; 18047c478bd9Sstevel@tonic-gate if (pfd->pfd_next != NULL) 18057c478bd9Sstevel@tonic-gate pfd->pfd_next->pfd_prev = pfd->pfd_prev; 18067c478bd9Sstevel@tonic-gate } 18077c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 18087c478bd9Sstevel@tonic-gate } 18097c478bd9Sstevel@tonic-gate 18107c478bd9Sstevel@tonic-gate static void 181161b4b1efSpraks port_close_fd(portfd_t *pfd) 18127c478bd9Sstevel@tonic-gate { 18137c478bd9Sstevel@tonic-gate portfd_t *pfdn; 18147c478bd9Sstevel@tonic-gate 181561b4b1efSpraks /* 181661b4b1efSpraks * At this point, no other thread should access 181761b4b1efSpraks * the portfd_t list for this fd. The uf_file, uf_portfd 181861b4b1efSpraks * pointers in the uf_entry_t struct for this fd would 181961b4b1efSpraks * be set to NULL. 182061b4b1efSpraks */ 18217c478bd9Sstevel@tonic-gate for (; pfd != NULL; pfd = pfdn) { 18227c478bd9Sstevel@tonic-gate pfdn = pfd->pfd_next; 18237c478bd9Sstevel@tonic-gate port_close_pfd(pfd); 18247c478bd9Sstevel@tonic-gate } 18257c478bd9Sstevel@tonic-gate } 1826