17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5*a5f69788Scraigm * Common Development and Distribution License (the "License"). 6*a5f69788Scraigm * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 21*a5f69788Scraigm 22*a5f69788Scraigm /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ 23*a5f69788Scraigm /* All Rights Reserved */ 24*a5f69788Scraigm 257c478bd9Sstevel@tonic-gate /* 2661b4b1efSpraks * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 277c478bd9Sstevel@tonic-gate * Use is subject to license terms. 287c478bd9Sstevel@tonic-gate */ 297c478bd9Sstevel@tonic-gate 307c478bd9Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI" 317c478bd9Sstevel@tonic-gate 327c478bd9Sstevel@tonic-gate #include <sys/types.h> 337c478bd9Sstevel@tonic-gate #include <sys/sysmacros.h> 347c478bd9Sstevel@tonic-gate #include <sys/param.h> 357c478bd9Sstevel@tonic-gate #include <sys/systm.h> 367c478bd9Sstevel@tonic-gate #include <sys/errno.h> 377c478bd9Sstevel@tonic-gate #include <sys/signal.h> 387c478bd9Sstevel@tonic-gate #include <sys/cred.h> 397c478bd9Sstevel@tonic-gate #include <sys/user.h> 407c478bd9Sstevel@tonic-gate #include <sys/conf.h> 417c478bd9Sstevel@tonic-gate #include <sys/vfs.h> 427c478bd9Sstevel@tonic-gate #include <sys/vnode.h> 437c478bd9Sstevel@tonic-gate #include <sys/pathname.h> 447c478bd9Sstevel@tonic-gate #include <sys/file.h> 457c478bd9Sstevel@tonic-gate #include <sys/proc.h> 467c478bd9Sstevel@tonic-gate #include <sys/var.h> 477c478bd9Sstevel@tonic-gate #include <sys/cpuvar.h> 487c478bd9Sstevel@tonic-gate #include <sys/open.h> 497c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h> 507c478bd9Sstevel@tonic-gate #include <sys/priocntl.h> 517c478bd9Sstevel@tonic-gate #include <sys/procset.h> 527c478bd9Sstevel@tonic-gate #include <sys/prsystm.h> 537c478bd9Sstevel@tonic-gate #include <sys/debug.h> 547c478bd9Sstevel@tonic-gate #include <sys/kmem.h> 557c478bd9Sstevel@tonic-gate #include <sys/atomic.h> 567c478bd9Sstevel@tonic-gate #include <sys/fcntl.h> 577c478bd9Sstevel@tonic-gate #include <sys/poll.h> 587c478bd9Sstevel@tonic-gate #include <sys/rctl.h> 597c478bd9Sstevel@tonic-gate #include <sys/port_impl.h> 607c478bd9Sstevel@tonic-gate 617c478bd9Sstevel@tonic-gate #include <c2/audit.h> 627c478bd9Sstevel@tonic-gate #include <sys/nbmlock.h> 637c478bd9Sstevel@tonic-gate 647c478bd9Sstevel@tonic-gate #ifdef DEBUG 657c478bd9Sstevel@tonic-gate 667c478bd9Sstevel@tonic-gate static uint32_t afd_maxfd; /* # of entries in maximum allocated array */ 677c478bd9Sstevel@tonic-gate static uint32_t afd_alloc; /* count of kmem_alloc()s */ 687c478bd9Sstevel@tonic-gate static uint32_t afd_free; /* count of kmem_free()s */ 697c478bd9Sstevel@tonic-gate static uint32_t afd_wait; /* count of waits on non-zero ref count */ 707c478bd9Sstevel@tonic-gate #define MAXFD(x) (afd_maxfd = ((afd_maxfd >= (x))? afd_maxfd : (x))) 717c478bd9Sstevel@tonic-gate #define COUNT(x) atomic_add_32(&x, 1) 727c478bd9Sstevel@tonic-gate 737c478bd9Sstevel@tonic-gate #else /* DEBUG */ 747c478bd9Sstevel@tonic-gate 757c478bd9Sstevel@tonic-gate #define MAXFD(x) 767c478bd9Sstevel@tonic-gate #define COUNT(x) 777c478bd9Sstevel@tonic-gate 787c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 797c478bd9Sstevel@tonic-gate 807c478bd9Sstevel@tonic-gate kmem_cache_t *file_cache; 817c478bd9Sstevel@tonic-gate static int vpsetattr(vnode_t *, vattr_t *, int); 827c478bd9Sstevel@tonic-gate 8361b4b1efSpraks static void port_close_fd(portfd_t *); 847c478bd9Sstevel@tonic-gate 857c478bd9Sstevel@tonic-gate /* 867c478bd9Sstevel@tonic-gate * File descriptor allocation. 877c478bd9Sstevel@tonic-gate * 887c478bd9Sstevel@tonic-gate * fd_find(fip, minfd) finds the first available descriptor >= minfd. 897c478bd9Sstevel@tonic-gate * The most common case is open(2), in which minfd = 0, but we must also 907c478bd9Sstevel@tonic-gate * support fcntl(fd, F_DUPFD, minfd). 917c478bd9Sstevel@tonic-gate * 927c478bd9Sstevel@tonic-gate * The algorithm is as follows: we keep all file descriptors in an infix 937c478bd9Sstevel@tonic-gate * binary tree in which each node records the number of descriptors 947c478bd9Sstevel@tonic-gate * allocated in its right subtree, including itself. Starting at minfd, 957c478bd9Sstevel@tonic-gate * we ascend the tree until we find a non-fully allocated right subtree. 967c478bd9Sstevel@tonic-gate * We then descend that subtree in a binary search for the smallest fd. 977c478bd9Sstevel@tonic-gate * Finally, we ascend the tree again to increment the allocation count 987c478bd9Sstevel@tonic-gate * of every subtree containing the newly-allocated fd. Freeing an fd 997c478bd9Sstevel@tonic-gate * requires only the last step: we ascend the tree to decrement allocation 1007c478bd9Sstevel@tonic-gate * counts. Each of these three steps (ascent to find non-full subtree, 1017c478bd9Sstevel@tonic-gate * descent to find lowest fd, ascent to update allocation counts) is 1027c478bd9Sstevel@tonic-gate * O(log n), thus the algorithm as a whole is O(log n). 1037c478bd9Sstevel@tonic-gate * 1047c478bd9Sstevel@tonic-gate * We don't implement the fd tree using the customary left/right/parent 1057c478bd9Sstevel@tonic-gate * pointers, but instead take advantage of the glorious mathematics of 1067c478bd9Sstevel@tonic-gate * full infix binary trees. For reference, here's an illustration of the 1077c478bd9Sstevel@tonic-gate * logical structure of such a tree, rooted at 4 (binary 100), covering 1087c478bd9Sstevel@tonic-gate * the range 1-7 (binary 001-111). Our canonical trees do not include 1097c478bd9Sstevel@tonic-gate * fd 0; we'll deal with that later. 1107c478bd9Sstevel@tonic-gate * 1117c478bd9Sstevel@tonic-gate * 100 1127c478bd9Sstevel@tonic-gate * / \ 1137c478bd9Sstevel@tonic-gate * / \ 1147c478bd9Sstevel@tonic-gate * 010 110 1157c478bd9Sstevel@tonic-gate * / \ / \ 1167c478bd9Sstevel@tonic-gate * 001 011 101 111 1177c478bd9Sstevel@tonic-gate * 1187c478bd9Sstevel@tonic-gate * We make the following observations, all of which are easily proven by 1197c478bd9Sstevel@tonic-gate * induction on the depth of the tree: 1207c478bd9Sstevel@tonic-gate * 1217c478bd9Sstevel@tonic-gate * (T1) The least-significant bit (LSB) of any node is equal to its level 1227c478bd9Sstevel@tonic-gate * in the tree. In our example, nodes 001, 011, 101 and 111 are at 1237c478bd9Sstevel@tonic-gate * level 0; nodes 010 and 110 are at level 1; and node 100 is at level 2. 1247c478bd9Sstevel@tonic-gate * 1257c478bd9Sstevel@tonic-gate * (T2) The child size (CSIZE) of node N -- that is, the total number of 1267c478bd9Sstevel@tonic-gate * right-branch descendants in a child of node N, including itself -- is 1277c478bd9Sstevel@tonic-gate * given by clearing all but the least significant bit of N. This 1287c478bd9Sstevel@tonic-gate * follows immediately from (T1). Applying this rule to our example, we 1297c478bd9Sstevel@tonic-gate * see that CSIZE(100) = 100, CSIZE(x10) = 10, and CSIZE(xx1) = 1. 1307c478bd9Sstevel@tonic-gate * 1317c478bd9Sstevel@tonic-gate * (T3) The nearest left ancestor (LPARENT) of node N -- that is, the nearest 1327c478bd9Sstevel@tonic-gate * ancestor containing node N in its right child -- is given by clearing 1337c478bd9Sstevel@tonic-gate * the LSB of N. For example, LPARENT(111) = 110 and LPARENT(110) = 100. 1347c478bd9Sstevel@tonic-gate * Clearing the LSB of nodes 001, 010 or 100 yields zero, reflecting 1357c478bd9Sstevel@tonic-gate * the fact that these are leftmost nodes. Note that this algorithm 1367c478bd9Sstevel@tonic-gate * automatically skips generations as necessary. For example, the parent 1377c478bd9Sstevel@tonic-gate * of node 101 is 110, which is a *right* ancestor (not what we want); 1387c478bd9Sstevel@tonic-gate * but its grandparent is 100, which is a left ancestor. Clearing the LSB 1397c478bd9Sstevel@tonic-gate * of 101 gets us to 100 directly, skipping right past the uninteresting 1407c478bd9Sstevel@tonic-gate * generation (110). 1417c478bd9Sstevel@tonic-gate * 1427c478bd9Sstevel@tonic-gate * Note that since LPARENT clears the LSB, whereas CSIZE clears all *but* 1437c478bd9Sstevel@tonic-gate * the LSB, we can express LPARENT() nicely in terms of CSIZE(): 1447c478bd9Sstevel@tonic-gate * 1457c478bd9Sstevel@tonic-gate * LPARENT(N) = N - CSIZE(N) 1467c478bd9Sstevel@tonic-gate * 1477c478bd9Sstevel@tonic-gate * (T4) The nearest right ancestor (RPARENT) of node N is given by: 1487c478bd9Sstevel@tonic-gate * 1497c478bd9Sstevel@tonic-gate * RPARENT(N) = N + CSIZE(N) 1507c478bd9Sstevel@tonic-gate * 1517c478bd9Sstevel@tonic-gate * (T5) For every interior node, the children differ from their parent by 1527c478bd9Sstevel@tonic-gate * CSIZE(parent) / 2. In our example, CSIZE(100) / 2 = 2 = 10 binary, 1537c478bd9Sstevel@tonic-gate * and indeed, the children of 100 are 100 +/- 10 = 010 and 110. 1547c478bd9Sstevel@tonic-gate * 1557c478bd9Sstevel@tonic-gate * Next, we'll need a few two's-complement math tricks. Suppose a number, 1567c478bd9Sstevel@tonic-gate * N, has the following form: 1577c478bd9Sstevel@tonic-gate * 1587c478bd9Sstevel@tonic-gate * N = xxxx10...0 1597c478bd9Sstevel@tonic-gate * 1607c478bd9Sstevel@tonic-gate * That is, the binary representation of N consists of some string of bits, 1617c478bd9Sstevel@tonic-gate * then a 1, then all zeroes. This amounts to nothing more than saying that 1627c478bd9Sstevel@tonic-gate * N has a least-significant bit, which is true for any N != 0. If we look 1637c478bd9Sstevel@tonic-gate * at N and N - 1 together, we see that we can combine them in useful ways: 1647c478bd9Sstevel@tonic-gate * 1657c478bd9Sstevel@tonic-gate * N = xxxx10...0 1667c478bd9Sstevel@tonic-gate * N - 1 = xxxx01...1 1677c478bd9Sstevel@tonic-gate * ------------------------ 1687c478bd9Sstevel@tonic-gate * N & (N - 1) = xxxx000000 1697c478bd9Sstevel@tonic-gate * N | (N - 1) = xxxx111111 1707c478bd9Sstevel@tonic-gate * N ^ (N - 1) = 111111 1717c478bd9Sstevel@tonic-gate * 1727c478bd9Sstevel@tonic-gate * In particular, this suggests several easy ways to clear all but the LSB, 1737c478bd9Sstevel@tonic-gate * which by (T2) is exactly what we need to determine CSIZE(N) = 10...0. 1747c478bd9Sstevel@tonic-gate * We'll opt for this formulation: 1757c478bd9Sstevel@tonic-gate * 1767c478bd9Sstevel@tonic-gate * (C1) CSIZE(N) = (N - 1) ^ (N | (N - 1)) 1777c478bd9Sstevel@tonic-gate * 1787c478bd9Sstevel@tonic-gate * Similarly, we have an easy way to determine LPARENT(N), which requires 1797c478bd9Sstevel@tonic-gate * that we clear the LSB of N: 1807c478bd9Sstevel@tonic-gate * 1817c478bd9Sstevel@tonic-gate * (L1) LPARENT(N) = N & (N - 1) 1827c478bd9Sstevel@tonic-gate * 1837c478bd9Sstevel@tonic-gate * We note in the above relations that (N | (N - 1)) - N = CSIZE(N) - 1. 1847c478bd9Sstevel@tonic-gate * When combined with (T4), this yields an easy way to compute RPARENT(N): 1857c478bd9Sstevel@tonic-gate * 1867c478bd9Sstevel@tonic-gate * (R1) RPARENT(N) = (N | (N - 1)) + 1 1877c478bd9Sstevel@tonic-gate * 1887c478bd9Sstevel@tonic-gate * Finally, to accommodate fd 0 we must adjust all of our results by +/-1 to 1897c478bd9Sstevel@tonic-gate * move the fd range from [1, 2^n) to [0, 2^n - 1). This is straightforward, 1907c478bd9Sstevel@tonic-gate * so there's no need to belabor the algebra; the revised relations become: 1917c478bd9Sstevel@tonic-gate * 1927c478bd9Sstevel@tonic-gate * (C1a) CSIZE(N) = N ^ (N | (N + 1)) 1937c478bd9Sstevel@tonic-gate * 1947c478bd9Sstevel@tonic-gate * (L1a) LPARENT(N) = (N & (N + 1)) - 1 1957c478bd9Sstevel@tonic-gate * 1967c478bd9Sstevel@tonic-gate * (R1a) RPARENT(N) = N | (N + 1) 1977c478bd9Sstevel@tonic-gate * 1987c478bd9Sstevel@tonic-gate * This completes the mathematical framework. We now have all the tools 1997c478bd9Sstevel@tonic-gate * we need to implement fd_find() and fd_reserve(). 2007c478bd9Sstevel@tonic-gate * 2017c478bd9Sstevel@tonic-gate * fd_find(fip, minfd) finds the smallest available file descriptor >= minfd. 2027c478bd9Sstevel@tonic-gate * It does not actually allocate the descriptor; that's done by fd_reserve(). 2037c478bd9Sstevel@tonic-gate * fd_find() proceeds in two steps: 2047c478bd9Sstevel@tonic-gate * 2057c478bd9Sstevel@tonic-gate * (1) Find the leftmost subtree that contains a descriptor >= minfd. 2067c478bd9Sstevel@tonic-gate * We start at the right subtree rooted at minfd. If this subtree is 2077c478bd9Sstevel@tonic-gate * not full -- if fip->fi_list[minfd].uf_alloc != CSIZE(minfd) -- then 2087c478bd9Sstevel@tonic-gate * step 1 is done. Otherwise, we know that all fds in this subtree 2097c478bd9Sstevel@tonic-gate * are taken, so we ascend to RPARENT(minfd) using (R1a). We repeat 2107c478bd9Sstevel@tonic-gate * this process until we either find a candidate subtree or exceed 2117c478bd9Sstevel@tonic-gate * fip->fi_nfiles. We use (C1a) to compute CSIZE(). 2127c478bd9Sstevel@tonic-gate * 2137c478bd9Sstevel@tonic-gate * (2) Find the smallest fd in the subtree discovered by step 1. 2147c478bd9Sstevel@tonic-gate * Starting at the root of this subtree, we descend to find the 2157c478bd9Sstevel@tonic-gate * smallest available fd. Since the left children have the smaller 2167c478bd9Sstevel@tonic-gate * fds, we will descend rightward only when the left child is full. 2177c478bd9Sstevel@tonic-gate * 2187c478bd9Sstevel@tonic-gate * We begin by comparing the number of allocated fds in the root 2197c478bd9Sstevel@tonic-gate * to the number of allocated fds in its right child; if they differ 2207c478bd9Sstevel@tonic-gate * by exactly CSIZE(child), we know the left subtree is full, so we 2217c478bd9Sstevel@tonic-gate * descend right; that is, the right child becomes the search root. 2227c478bd9Sstevel@tonic-gate * Otherwise we leave the root alone and start following the right 2237c478bd9Sstevel@tonic-gate * child's left children. As fortune would have it, this is very 2247c478bd9Sstevel@tonic-gate * simple computationally: by (T5), the right child of fd is just 2257c478bd9Sstevel@tonic-gate * fd + size, where size = CSIZE(fd) / 2. Applying (T5) again, 2267c478bd9Sstevel@tonic-gate * we find that the right child's left child is fd + size - (size / 2) = 2277c478bd9Sstevel@tonic-gate * fd + (size / 2); *its* left child is fd + (size / 2) - (size / 4) = 2287c478bd9Sstevel@tonic-gate * fd + (size / 4), and so on. In general, fd's right child's 2297c478bd9Sstevel@tonic-gate * leftmost nth descendant is fd + (size >> n). Thus, to follow 2307c478bd9Sstevel@tonic-gate * the right child's left descendants, we just halve the size in 2317c478bd9Sstevel@tonic-gate * each iteration of the search. 2327c478bd9Sstevel@tonic-gate * 2337c478bd9Sstevel@tonic-gate * When we descend leftward, we must keep track of the number of fds 2347c478bd9Sstevel@tonic-gate * that were allocated in all the right subtrees we rejected, so we 2357c478bd9Sstevel@tonic-gate * know how many of the root fd's allocations are in the remaining 2367c478bd9Sstevel@tonic-gate * (as yet unexplored) leftmost part of its right subtree. When we 2377c478bd9Sstevel@tonic-gate * encounter a fully-allocated left child -- that is, when we find 2387c478bd9Sstevel@tonic-gate * that fip->fi_list[fd].uf_alloc == ralloc + size -- we descend right 2397c478bd9Sstevel@tonic-gate * (as described earlier), resetting ralloc to zero. 2407c478bd9Sstevel@tonic-gate * 2417c478bd9Sstevel@tonic-gate * fd_reserve(fip, fd, incr) either allocates or frees fd, depending 2427c478bd9Sstevel@tonic-gate * on whether incr is 1 or -1. Starting at fd, fd_reserve() ascends 2437c478bd9Sstevel@tonic-gate * the leftmost ancestors (see (T3)) and updates the allocation counts. 2447c478bd9Sstevel@tonic-gate * At each step we use (L1a) to compute LPARENT(), the next left ancestor. 2457c478bd9Sstevel@tonic-gate * 2467c478bd9Sstevel@tonic-gate * flist_minsize() finds the minimal tree that still covers all 2477c478bd9Sstevel@tonic-gate * used fds; as long as the allocation count of a root node is zero, we 2487c478bd9Sstevel@tonic-gate * don't need that node or its right subtree. 2497c478bd9Sstevel@tonic-gate * 2507c478bd9Sstevel@tonic-gate * flist_nalloc() counts the number of allocated fds in the tree, by starting 2517c478bd9Sstevel@tonic-gate * at the top of the tree and summing the right-subtree allocation counts as 2527c478bd9Sstevel@tonic-gate * it descends leftwards. 2537c478bd9Sstevel@tonic-gate * 2547c478bd9Sstevel@tonic-gate * Note: we assume that flist_grow() will keep fip->fi_nfiles of the form 2557c478bd9Sstevel@tonic-gate * 2^n - 1. This ensures that the fd trees are always full, which saves 2567c478bd9Sstevel@tonic-gate * quite a bit of boundary checking. 2577c478bd9Sstevel@tonic-gate */ 2587c478bd9Sstevel@tonic-gate static int 2597c478bd9Sstevel@tonic-gate fd_find(uf_info_t *fip, int minfd) 2607c478bd9Sstevel@tonic-gate { 2617c478bd9Sstevel@tonic-gate int size, ralloc, fd; 2627c478bd9Sstevel@tonic-gate 2637c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 2647c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 2657c478bd9Sstevel@tonic-gate 2667c478bd9Sstevel@tonic-gate for (fd = minfd; (uint_t)fd < fip->fi_nfiles; fd |= fd + 1) { 2677c478bd9Sstevel@tonic-gate size = fd ^ (fd | (fd + 1)); 2687c478bd9Sstevel@tonic-gate if (fip->fi_list[fd].uf_alloc == size) 2697c478bd9Sstevel@tonic-gate continue; 2707c478bd9Sstevel@tonic-gate for (ralloc = 0, size >>= 1; size != 0; size >>= 1) { 2717c478bd9Sstevel@tonic-gate ralloc += fip->fi_list[fd + size].uf_alloc; 2727c478bd9Sstevel@tonic-gate if (fip->fi_list[fd].uf_alloc == ralloc + size) { 2737c478bd9Sstevel@tonic-gate fd += size; 2747c478bd9Sstevel@tonic-gate ralloc = 0; 2757c478bd9Sstevel@tonic-gate } 2767c478bd9Sstevel@tonic-gate } 2777c478bd9Sstevel@tonic-gate return (fd); 2787c478bd9Sstevel@tonic-gate } 2797c478bd9Sstevel@tonic-gate return (-1); 2807c478bd9Sstevel@tonic-gate } 2817c478bd9Sstevel@tonic-gate 2827c478bd9Sstevel@tonic-gate static void 2837c478bd9Sstevel@tonic-gate fd_reserve(uf_info_t *fip, int fd, int incr) 2847c478bd9Sstevel@tonic-gate { 2857c478bd9Sstevel@tonic-gate int pfd; 2867c478bd9Sstevel@tonic-gate uf_entry_t *ufp = &fip->fi_list[fd]; 2877c478bd9Sstevel@tonic-gate 2887c478bd9Sstevel@tonic-gate ASSERT((uint_t)fd < fip->fi_nfiles); 2897c478bd9Sstevel@tonic-gate ASSERT((ufp->uf_busy == 0 && incr == 1) || 2907c478bd9Sstevel@tonic-gate (ufp->uf_busy == 1 && incr == -1)); 2917c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&ufp->uf_lock)); 2927c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 2937c478bd9Sstevel@tonic-gate 2947c478bd9Sstevel@tonic-gate for (pfd = fd; pfd >= 0; pfd = (pfd & (pfd + 1)) - 1) 2957c478bd9Sstevel@tonic-gate fip->fi_list[pfd].uf_alloc += incr; 2967c478bd9Sstevel@tonic-gate 2977c478bd9Sstevel@tonic-gate ufp->uf_busy += incr; 2987c478bd9Sstevel@tonic-gate } 2997c478bd9Sstevel@tonic-gate 3007c478bd9Sstevel@tonic-gate static int 3017c478bd9Sstevel@tonic-gate flist_minsize(uf_info_t *fip) 3027c478bd9Sstevel@tonic-gate { 3037c478bd9Sstevel@tonic-gate int fd; 3047c478bd9Sstevel@tonic-gate 3057c478bd9Sstevel@tonic-gate /* 3067c478bd9Sstevel@tonic-gate * We'd like to ASSERT(MUTEX_HELD(&fip->fi_lock)), but we're called 3077c478bd9Sstevel@tonic-gate * by flist_fork(), which relies on other mechanisms for mutual 3087c478bd9Sstevel@tonic-gate * exclusion. 3097c478bd9Sstevel@tonic-gate */ 3107c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 3117c478bd9Sstevel@tonic-gate 3127c478bd9Sstevel@tonic-gate for (fd = fip->fi_nfiles; fd != 0; fd >>= 1) 3137c478bd9Sstevel@tonic-gate if (fip->fi_list[fd >> 1].uf_alloc != 0) 3147c478bd9Sstevel@tonic-gate break; 3157c478bd9Sstevel@tonic-gate 3167c478bd9Sstevel@tonic-gate return (fd); 3177c478bd9Sstevel@tonic-gate } 3187c478bd9Sstevel@tonic-gate 3197c478bd9Sstevel@tonic-gate static int 3207c478bd9Sstevel@tonic-gate flist_nalloc(uf_info_t *fip) 3217c478bd9Sstevel@tonic-gate { 3227c478bd9Sstevel@tonic-gate int fd; 3237c478bd9Sstevel@tonic-gate int nalloc = 0; 3247c478bd9Sstevel@tonic-gate 3257c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fip->fi_lock)); 3267c478bd9Sstevel@tonic-gate ASSERT((fip->fi_nfiles & (fip->fi_nfiles + 1)) == 0); 3277c478bd9Sstevel@tonic-gate 3287c478bd9Sstevel@tonic-gate for (fd = fip->fi_nfiles; fd != 0; fd >>= 1) 3297c478bd9Sstevel@tonic-gate nalloc += fip->fi_list[fd >> 1].uf_alloc; 3307c478bd9Sstevel@tonic-gate 3317c478bd9Sstevel@tonic-gate return (nalloc); 3327c478bd9Sstevel@tonic-gate } 3337c478bd9Sstevel@tonic-gate 3347c478bd9Sstevel@tonic-gate /* 3357c478bd9Sstevel@tonic-gate * Increase size of the fi_list array to accommodate at least maxfd. 3367c478bd9Sstevel@tonic-gate * We keep the size of the form 2^n - 1 for benefit of fd_find(). 3377c478bd9Sstevel@tonic-gate */ 3387c478bd9Sstevel@tonic-gate static void 3397c478bd9Sstevel@tonic-gate flist_grow(int maxfd) 3407c478bd9Sstevel@tonic-gate { 3417c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 3427c478bd9Sstevel@tonic-gate int newcnt, oldcnt; 3437c478bd9Sstevel@tonic-gate uf_entry_t *src, *dst, *newlist, *oldlist, *newend, *oldend; 3447c478bd9Sstevel@tonic-gate uf_rlist_t *urp; 3457c478bd9Sstevel@tonic-gate 3467c478bd9Sstevel@tonic-gate for (newcnt = 1; newcnt <= maxfd; newcnt = (newcnt << 1) | 1) 3477c478bd9Sstevel@tonic-gate continue; 3487c478bd9Sstevel@tonic-gate 3497c478bd9Sstevel@tonic-gate newlist = kmem_zalloc(newcnt * sizeof (uf_entry_t), KM_SLEEP); 3507c478bd9Sstevel@tonic-gate 3517c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 3527c478bd9Sstevel@tonic-gate oldcnt = fip->fi_nfiles; 3537c478bd9Sstevel@tonic-gate if (newcnt <= oldcnt) { 3547c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 3557c478bd9Sstevel@tonic-gate kmem_free(newlist, newcnt * sizeof (uf_entry_t)); 3567c478bd9Sstevel@tonic-gate return; 3577c478bd9Sstevel@tonic-gate } 3587c478bd9Sstevel@tonic-gate ASSERT((newcnt & (newcnt + 1)) == 0); 3597c478bd9Sstevel@tonic-gate oldlist = fip->fi_list; 3607c478bd9Sstevel@tonic-gate oldend = oldlist + oldcnt; 3617c478bd9Sstevel@tonic-gate newend = newlist + oldcnt; /* no need to lock beyond old end */ 3627c478bd9Sstevel@tonic-gate 3637c478bd9Sstevel@tonic-gate /* 3647c478bd9Sstevel@tonic-gate * fi_list and fi_nfiles cannot change while any uf_lock is held, 3657c478bd9Sstevel@tonic-gate * so we must grab all the old locks *and* the new locks up to oldcnt. 3667c478bd9Sstevel@tonic-gate * (Locks beyond the end of oldcnt aren't visible until we store 3677c478bd9Sstevel@tonic-gate * the new fi_nfiles, which is the last thing we do before dropping 3687c478bd9Sstevel@tonic-gate * all the locks, so there's no need to acquire these locks). 3697c478bd9Sstevel@tonic-gate * Holding the new locks is necessary because when fi_list changes 3707c478bd9Sstevel@tonic-gate * to point to the new list, fi_nfiles won't have been stored yet. 3717c478bd9Sstevel@tonic-gate * If we *didn't* hold the new locks, someone doing a UF_ENTER() 3727c478bd9Sstevel@tonic-gate * could see the new fi_list, grab the new uf_lock, and then see 3737c478bd9Sstevel@tonic-gate * fi_nfiles change while the lock is held -- in violation of 3747c478bd9Sstevel@tonic-gate * UF_ENTER() semantics. 3757c478bd9Sstevel@tonic-gate */ 3767c478bd9Sstevel@tonic-gate for (src = oldlist; src < oldend; src++) 3777c478bd9Sstevel@tonic-gate mutex_enter(&src->uf_lock); 3787c478bd9Sstevel@tonic-gate 3797c478bd9Sstevel@tonic-gate for (dst = newlist; dst < newend; dst++) 3807c478bd9Sstevel@tonic-gate mutex_enter(&dst->uf_lock); 3817c478bd9Sstevel@tonic-gate 3827c478bd9Sstevel@tonic-gate for (src = oldlist, dst = newlist; src < oldend; src++, dst++) { 3837c478bd9Sstevel@tonic-gate dst->uf_file = src->uf_file; 3847c478bd9Sstevel@tonic-gate dst->uf_fpollinfo = src->uf_fpollinfo; 3857c478bd9Sstevel@tonic-gate dst->uf_refcnt = src->uf_refcnt; 3867c478bd9Sstevel@tonic-gate dst->uf_alloc = src->uf_alloc; 3877c478bd9Sstevel@tonic-gate dst->uf_flag = src->uf_flag; 3887c478bd9Sstevel@tonic-gate dst->uf_busy = src->uf_busy; 3897c478bd9Sstevel@tonic-gate dst->uf_portfd = src->uf_portfd; 3907c478bd9Sstevel@tonic-gate } 3917c478bd9Sstevel@tonic-gate 3927c478bd9Sstevel@tonic-gate /* 3937c478bd9Sstevel@tonic-gate * As soon as we store the new flist, future locking operations 3947c478bd9Sstevel@tonic-gate * will use it. Therefore, we must ensure that all the state 3957c478bd9Sstevel@tonic-gate * we've just established reaches global visibility before the 3967c478bd9Sstevel@tonic-gate * new flist does. 3977c478bd9Sstevel@tonic-gate */ 3987c478bd9Sstevel@tonic-gate membar_producer(); 3997c478bd9Sstevel@tonic-gate fip->fi_list = newlist; 4007c478bd9Sstevel@tonic-gate 4017c478bd9Sstevel@tonic-gate /* 4027c478bd9Sstevel@tonic-gate * Routines like getf() make an optimistic check on the validity 4037c478bd9Sstevel@tonic-gate * of the supplied file descriptor: if it's less than the current 4047c478bd9Sstevel@tonic-gate * value of fi_nfiles -- examined without any locks -- then it's 4057c478bd9Sstevel@tonic-gate * safe to attempt a UF_ENTER() on that fd (which is a valid 4067c478bd9Sstevel@tonic-gate * assumption because fi_nfiles only increases). Therefore, it 4077c478bd9Sstevel@tonic-gate * is critical that the new value of fi_nfiles not reach global 4087c478bd9Sstevel@tonic-gate * visibility until after the new fi_list: if it happened the 4097c478bd9Sstevel@tonic-gate * other way around, getf() could see the new fi_nfiles and attempt 4107c478bd9Sstevel@tonic-gate * a UF_ENTER() on the old fi_list, which would write beyond its 4117c478bd9Sstevel@tonic-gate * end if the fd exceeded the old fi_nfiles. 4127c478bd9Sstevel@tonic-gate */ 4137c478bd9Sstevel@tonic-gate membar_producer(); 4147c478bd9Sstevel@tonic-gate fip->fi_nfiles = newcnt; 4157c478bd9Sstevel@tonic-gate 4167c478bd9Sstevel@tonic-gate /* 4177c478bd9Sstevel@tonic-gate * The new state is consistent now, so we can drop all the locks. 4187c478bd9Sstevel@tonic-gate */ 4197c478bd9Sstevel@tonic-gate for (dst = newlist; dst < newend; dst++) 4207c478bd9Sstevel@tonic-gate mutex_exit(&dst->uf_lock); 4217c478bd9Sstevel@tonic-gate 4227c478bd9Sstevel@tonic-gate for (src = oldlist; src < oldend; src++) { 4237c478bd9Sstevel@tonic-gate /* 4247c478bd9Sstevel@tonic-gate * If any threads are blocked on the old cvs, wake them. 4257c478bd9Sstevel@tonic-gate * This will force them to wake up, discover that fi_list 4267c478bd9Sstevel@tonic-gate * has changed, and go back to sleep on the new cvs. 4277c478bd9Sstevel@tonic-gate */ 4287c478bd9Sstevel@tonic-gate cv_broadcast(&src->uf_wanted_cv); 4297c478bd9Sstevel@tonic-gate cv_broadcast(&src->uf_closing_cv); 4307c478bd9Sstevel@tonic-gate mutex_exit(&src->uf_lock); 4317c478bd9Sstevel@tonic-gate } 4327c478bd9Sstevel@tonic-gate 4337c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 4347c478bd9Sstevel@tonic-gate 4357c478bd9Sstevel@tonic-gate /* 4367c478bd9Sstevel@tonic-gate * Retire the old flist. We can't actually kmem_free() it now 4377c478bd9Sstevel@tonic-gate * because someone may still have a pointer to it. Instead, 4387c478bd9Sstevel@tonic-gate * we link it onto a list of retired flists. The new flist 4397c478bd9Sstevel@tonic-gate * is at least double the size of the previous flist, so the 4407c478bd9Sstevel@tonic-gate * total size of all retired flists will be less than the size 4417c478bd9Sstevel@tonic-gate * of the current one (to prove, consider the sum of a geometric 4427c478bd9Sstevel@tonic-gate * series in powers of 2). exit() frees the retired flists. 4437c478bd9Sstevel@tonic-gate */ 4447c478bd9Sstevel@tonic-gate urp = kmem_zalloc(sizeof (uf_rlist_t), KM_SLEEP); 4457c478bd9Sstevel@tonic-gate urp->ur_list = oldlist; 4467c478bd9Sstevel@tonic-gate urp->ur_nfiles = oldcnt; 4477c478bd9Sstevel@tonic-gate 4487c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 4497c478bd9Sstevel@tonic-gate urp->ur_next = fip->fi_rlist; 4507c478bd9Sstevel@tonic-gate fip->fi_rlist = urp; 4517c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 4527c478bd9Sstevel@tonic-gate } 4537c478bd9Sstevel@tonic-gate 4547c478bd9Sstevel@tonic-gate /* 4557c478bd9Sstevel@tonic-gate * Utility functions for keeping track of the active file descriptors. 4567c478bd9Sstevel@tonic-gate */ 4577c478bd9Sstevel@tonic-gate void 4587c478bd9Sstevel@tonic-gate clear_stale_fd() /* called from post_syscall() */ 4597c478bd9Sstevel@tonic-gate { 4607c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 4617c478bd9Sstevel@tonic-gate int i; 4627c478bd9Sstevel@tonic-gate 4637c478bd9Sstevel@tonic-gate /* uninitialized is ok here, a_nfd is then zero */ 4647c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 4657c478bd9Sstevel@tonic-gate /* assert that this should not be necessary */ 4667c478bd9Sstevel@tonic-gate ASSERT(afd->a_fd[i] == -1); 4677c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 4687c478bd9Sstevel@tonic-gate } 4697c478bd9Sstevel@tonic-gate afd->a_stale = 0; 4707c478bd9Sstevel@tonic-gate } 4717c478bd9Sstevel@tonic-gate 4727c478bd9Sstevel@tonic-gate void 4737c478bd9Sstevel@tonic-gate free_afd(afd_t *afd) /* called below and from thread_free() */ 4747c478bd9Sstevel@tonic-gate { 4757c478bd9Sstevel@tonic-gate int i; 4767c478bd9Sstevel@tonic-gate 4777c478bd9Sstevel@tonic-gate /* free the buffer if it was kmem_alloc()ed */ 4787c478bd9Sstevel@tonic-gate if (afd->a_nfd > sizeof (afd->a_buf) / sizeof (afd->a_buf[0])) { 4797c478bd9Sstevel@tonic-gate COUNT(afd_free); 4807c478bd9Sstevel@tonic-gate kmem_free(afd->a_fd, afd->a_nfd * sizeof (afd->a_fd[0])); 4817c478bd9Sstevel@tonic-gate } 4827c478bd9Sstevel@tonic-gate 4837c478bd9Sstevel@tonic-gate /* (re)initialize the structure */ 4847c478bd9Sstevel@tonic-gate afd->a_fd = &afd->a_buf[0]; 4857c478bd9Sstevel@tonic-gate afd->a_nfd = sizeof (afd->a_buf) / sizeof (afd->a_buf[0]); 4867c478bd9Sstevel@tonic-gate afd->a_stale = 0; 4877c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) 4887c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 4897c478bd9Sstevel@tonic-gate } 4907c478bd9Sstevel@tonic-gate 4917c478bd9Sstevel@tonic-gate static void 4927c478bd9Sstevel@tonic-gate set_active_fd(int fd) 4937c478bd9Sstevel@tonic-gate { 4947c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 4957c478bd9Sstevel@tonic-gate int i; 4967c478bd9Sstevel@tonic-gate int *old_fd; 4977c478bd9Sstevel@tonic-gate int old_nfd; 4987c478bd9Sstevel@tonic-gate 4997c478bd9Sstevel@tonic-gate if (afd->a_nfd == 0) /* first time initialization */ 5007c478bd9Sstevel@tonic-gate free_afd(afd); 5017c478bd9Sstevel@tonic-gate 5027c478bd9Sstevel@tonic-gate /* insert fd into vacant slot, if any */ 5037c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 5047c478bd9Sstevel@tonic-gate if (afd->a_fd[i] == -1) { 5057c478bd9Sstevel@tonic-gate afd->a_fd[i] = fd; 5067c478bd9Sstevel@tonic-gate return; 5077c478bd9Sstevel@tonic-gate } 5087c478bd9Sstevel@tonic-gate } 5097c478bd9Sstevel@tonic-gate 5107c478bd9Sstevel@tonic-gate /* 5117c478bd9Sstevel@tonic-gate * Reallocate the a_fd[] array to add one more slot. 5127c478bd9Sstevel@tonic-gate */ 5137c478bd9Sstevel@tonic-gate old_fd = afd->a_fd; 5147c478bd9Sstevel@tonic-gate old_nfd = afd->a_nfd; 5157c478bd9Sstevel@tonic-gate afd->a_nfd = old_nfd + 1; 5167c478bd9Sstevel@tonic-gate MAXFD(afd->a_nfd); 5177c478bd9Sstevel@tonic-gate COUNT(afd_alloc); 5187c478bd9Sstevel@tonic-gate afd->a_fd = kmem_alloc(afd->a_nfd * sizeof (afd->a_fd[0]), KM_SLEEP); 5197c478bd9Sstevel@tonic-gate for (i = 0; i < old_nfd; i++) 5207c478bd9Sstevel@tonic-gate afd->a_fd[i] = old_fd[i]; 5217c478bd9Sstevel@tonic-gate afd->a_fd[i] = fd; 5227c478bd9Sstevel@tonic-gate 5237c478bd9Sstevel@tonic-gate if (old_nfd > sizeof (afd->a_buf) / sizeof (afd->a_buf[0])) { 5247c478bd9Sstevel@tonic-gate COUNT(afd_free); 5257c478bd9Sstevel@tonic-gate kmem_free(old_fd, old_nfd * sizeof (afd->a_fd[0])); 5267c478bd9Sstevel@tonic-gate } 5277c478bd9Sstevel@tonic-gate } 5287c478bd9Sstevel@tonic-gate 5297c478bd9Sstevel@tonic-gate void 5307c478bd9Sstevel@tonic-gate clear_active_fd(int fd) /* called below and from aio.c */ 5317c478bd9Sstevel@tonic-gate { 5327c478bd9Sstevel@tonic-gate afd_t *afd = &curthread->t_activefd; 5337c478bd9Sstevel@tonic-gate int i; 5347c478bd9Sstevel@tonic-gate 5357c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 5367c478bd9Sstevel@tonic-gate if (afd->a_fd[i] == fd) { 5377c478bd9Sstevel@tonic-gate afd->a_fd[i] = -1; 5387c478bd9Sstevel@tonic-gate break; 5397c478bd9Sstevel@tonic-gate } 5407c478bd9Sstevel@tonic-gate } 5417c478bd9Sstevel@tonic-gate ASSERT(i < afd->a_nfd); /* not found is not ok */ 5427c478bd9Sstevel@tonic-gate } 5437c478bd9Sstevel@tonic-gate 5447c478bd9Sstevel@tonic-gate /* 5457c478bd9Sstevel@tonic-gate * Does this thread have this fd active? 5467c478bd9Sstevel@tonic-gate */ 5477c478bd9Sstevel@tonic-gate static int 5487c478bd9Sstevel@tonic-gate is_active_fd(kthread_t *t, int fd) 5497c478bd9Sstevel@tonic-gate { 5507c478bd9Sstevel@tonic-gate afd_t *afd = &t->t_activefd; 5517c478bd9Sstevel@tonic-gate int i; 5527c478bd9Sstevel@tonic-gate 5537c478bd9Sstevel@tonic-gate /* uninitialized is ok here, a_nfd is then zero */ 5547c478bd9Sstevel@tonic-gate for (i = 0; i < afd->a_nfd; i++) { 5557c478bd9Sstevel@tonic-gate if (afd->a_fd[i] == fd) 5567c478bd9Sstevel@tonic-gate return (1); 5577c478bd9Sstevel@tonic-gate } 5587c478bd9Sstevel@tonic-gate return (0); 5597c478bd9Sstevel@tonic-gate } 5607c478bd9Sstevel@tonic-gate 5617c478bd9Sstevel@tonic-gate /* 5627c478bd9Sstevel@tonic-gate * Convert a user supplied file descriptor into a pointer to a file 5637c478bd9Sstevel@tonic-gate * structure. Only task is to check range of the descriptor (soft 5647c478bd9Sstevel@tonic-gate * resource limit was enforced at open time and shouldn't be checked 5657c478bd9Sstevel@tonic-gate * here). 5667c478bd9Sstevel@tonic-gate */ 5677c478bd9Sstevel@tonic-gate file_t * 5687c478bd9Sstevel@tonic-gate getf(int fd) 5697c478bd9Sstevel@tonic-gate { 5707c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 5717c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 5727c478bd9Sstevel@tonic-gate file_t *fp; 5737c478bd9Sstevel@tonic-gate 5747c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 5757c478bd9Sstevel@tonic-gate return (NULL); 5767c478bd9Sstevel@tonic-gate 5777c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 5787c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 5797c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 580*a5f69788Scraigm 581*a5f69788Scraigm if (fd == fip->fi_badfd && fip->fi_action > 0) 582*a5f69788Scraigm tsignal(curthread, fip->fi_action); 583*a5f69788Scraigm 5847c478bd9Sstevel@tonic-gate return (NULL); 5857c478bd9Sstevel@tonic-gate } 5867c478bd9Sstevel@tonic-gate ufp->uf_refcnt++; 5877c478bd9Sstevel@tonic-gate 5887c478bd9Sstevel@tonic-gate #ifdef C2_AUDIT 5897c478bd9Sstevel@tonic-gate /* 5907c478bd9Sstevel@tonic-gate * archive per file audit data 5917c478bd9Sstevel@tonic-gate */ 5927c478bd9Sstevel@tonic-gate if (audit_active) 5937c478bd9Sstevel@tonic-gate (void) audit_getf(fd); 5947c478bd9Sstevel@tonic-gate #endif 5957c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 5967c478bd9Sstevel@tonic-gate 5977c478bd9Sstevel@tonic-gate set_active_fd(fd); /* record the active file descriptor */ 5987c478bd9Sstevel@tonic-gate 5997c478bd9Sstevel@tonic-gate return (fp); 6007c478bd9Sstevel@tonic-gate } 6017c478bd9Sstevel@tonic-gate 6027c478bd9Sstevel@tonic-gate /* 6037c478bd9Sstevel@tonic-gate * Close whatever file currently occupies the file descriptor slot 6047c478bd9Sstevel@tonic-gate * and install the new file, usually NULL, in the file descriptor slot. 6057c478bd9Sstevel@tonic-gate * The close must complete before we release the file descriptor slot. 606*a5f69788Scraigm * If newfp != NULL we only return an error if we can't allocate the 607*a5f69788Scraigm * slot so the caller knows that it needs to free the filep; 608*a5f69788Scraigm * in the other cases we return the error number from closef(). 6097c478bd9Sstevel@tonic-gate */ 6107c478bd9Sstevel@tonic-gate int 6117c478bd9Sstevel@tonic-gate closeandsetf(int fd, file_t *newfp) 6127c478bd9Sstevel@tonic-gate { 6137c478bd9Sstevel@tonic-gate proc_t *p = curproc; 6147c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 6157c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 6167c478bd9Sstevel@tonic-gate file_t *fp; 6177c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 6187c478bd9Sstevel@tonic-gate portfd_t *pfd; 6197c478bd9Sstevel@tonic-gate int error; 6207c478bd9Sstevel@tonic-gate 6217c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) { 6227c478bd9Sstevel@tonic-gate if (newfp == NULL) 6237c478bd9Sstevel@tonic-gate return (EBADF); 6247c478bd9Sstevel@tonic-gate flist_grow(fd); 6257c478bd9Sstevel@tonic-gate } 6267c478bd9Sstevel@tonic-gate 6277c478bd9Sstevel@tonic-gate if (newfp != NULL) { 6287c478bd9Sstevel@tonic-gate /* 6297c478bd9Sstevel@tonic-gate * If ufp is reserved but has no file pointer, it's in the 6307c478bd9Sstevel@tonic-gate * transition between ufalloc() and setf(). We must wait 6317c478bd9Sstevel@tonic-gate * for this transition to complete before assigning the 6327c478bd9Sstevel@tonic-gate * new non-NULL file pointer. 6337c478bd9Sstevel@tonic-gate */ 6347c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 635*a5f69788Scraigm if (fd == fip->fi_badfd) { 636*a5f69788Scraigm mutex_exit(&fip->fi_lock); 637*a5f69788Scraigm if (fip->fi_action > 0) 638*a5f69788Scraigm tsignal(curthread, fip->fi_action); 639*a5f69788Scraigm return (EBADF); 640*a5f69788Scraigm } 6417c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6427c478bd9Sstevel@tonic-gate while (ufp->uf_busy && ufp->uf_file == NULL) { 6437c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6447c478bd9Sstevel@tonic-gate cv_wait_stop(&ufp->uf_wanted_cv, &ufp->uf_lock, 250); 6457c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6467c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 6477c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6487c478bd9Sstevel@tonic-gate } 6497c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 6507c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 6517c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_flag == 0); 6527c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, 1); 6537c478bd9Sstevel@tonic-gate ufp->uf_file = newfp; 6547c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6557c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6567c478bd9Sstevel@tonic-gate return (0); 6577c478bd9Sstevel@tonic-gate } 6587c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 6597c478bd9Sstevel@tonic-gate } else { 6607c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 6617c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) { 6627c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6637c478bd9Sstevel@tonic-gate return (EBADF); 6647c478bd9Sstevel@tonic-gate } 6657c478bd9Sstevel@tonic-gate } 6667c478bd9Sstevel@tonic-gate 6677c478bd9Sstevel@tonic-gate #ifdef C2_AUDIT 6687c478bd9Sstevel@tonic-gate /* 6697c478bd9Sstevel@tonic-gate * archive per file audit data 6707c478bd9Sstevel@tonic-gate */ 6717c478bd9Sstevel@tonic-gate if (audit_active) 6727c478bd9Sstevel@tonic-gate (void) audit_getf(fd); 6737c478bd9Sstevel@tonic-gate #endif 6747c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_busy); 6757c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 6767c478bd9Sstevel@tonic-gate ufp->uf_flag = 0; 6777c478bd9Sstevel@tonic-gate 6787c478bd9Sstevel@tonic-gate /* 6797c478bd9Sstevel@tonic-gate * If the file descriptor reference count is non-zero, then 6807c478bd9Sstevel@tonic-gate * some other lwp in the process is performing system call 6817c478bd9Sstevel@tonic-gate * activity on the file. To avoid blocking here for a long 6827c478bd9Sstevel@tonic-gate * time (the other lwp might be in a long term sleep in its 6837c478bd9Sstevel@tonic-gate * system call), we stop all other lwps in the process and 6847c478bd9Sstevel@tonic-gate * scan them to find the ones with this fd as one of their 6857c478bd9Sstevel@tonic-gate * active fds and set their a_stale flag so they will emerge 6867c478bd9Sstevel@tonic-gate * from their system calls immediately. post_syscall() will 6877c478bd9Sstevel@tonic-gate * test the a_stale flag and set errno to EBADF. 6887c478bd9Sstevel@tonic-gate */ 6897c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt == 0 || p->p_lwpcnt > 1); 6907c478bd9Sstevel@tonic-gate if (ufp->uf_refcnt > 0) { 6917c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 6927c478bd9Sstevel@tonic-gate COUNT(afd_wait); 6937c478bd9Sstevel@tonic-gate 6947c478bd9Sstevel@tonic-gate /* 6957c478bd9Sstevel@tonic-gate * Make all other lwps hold in place, as if doing fork1(). 6967c478bd9Sstevel@tonic-gate * holdlwps(SHOLDFORK1) fails only if another lwp wants to 6977c478bd9Sstevel@tonic-gate * perform a forkall() or the process is exiting. In either 6987c478bd9Sstevel@tonic-gate * case, all other lwps are either returning from their 6997c478bd9Sstevel@tonic-gate * system calls (because of SHOLDFORK) or calling lwp_exit() 7007c478bd9Sstevel@tonic-gate * (because of SEXITLWPS) so we don't need to scan them. 7017c478bd9Sstevel@tonic-gate */ 7027c478bd9Sstevel@tonic-gate if (holdlwps(SHOLDFORK1)) { 7037c478bd9Sstevel@tonic-gate kthread_t *t; 7047c478bd9Sstevel@tonic-gate 7057c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 7067c478bd9Sstevel@tonic-gate for (t = curthread->t_forw; t != curthread; 7077c478bd9Sstevel@tonic-gate t = t->t_forw) { 7087c478bd9Sstevel@tonic-gate if (is_active_fd(t, fd)) { 7097c478bd9Sstevel@tonic-gate t->t_activefd.a_stale = 1; 7107c478bd9Sstevel@tonic-gate t->t_post_sys = 1; 7117c478bd9Sstevel@tonic-gate } 7127c478bd9Sstevel@tonic-gate } 7137c478bd9Sstevel@tonic-gate continuelwps(p); 7147c478bd9Sstevel@tonic-gate mutex_exit(&p->p_lock); 7157c478bd9Sstevel@tonic-gate } 7167c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7177c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_file == NULL); 7187c478bd9Sstevel@tonic-gate } 7197c478bd9Sstevel@tonic-gate 7207c478bd9Sstevel@tonic-gate /* 7217c478bd9Sstevel@tonic-gate * Wait for other lwps to stop using this file descriptor. 7227c478bd9Sstevel@tonic-gate */ 7237c478bd9Sstevel@tonic-gate while (ufp->uf_refcnt > 0) { 7247c478bd9Sstevel@tonic-gate cv_wait_stop(&ufp->uf_closing_cv, &ufp->uf_lock, 250); 7257c478bd9Sstevel@tonic-gate /* 7267c478bd9Sstevel@tonic-gate * cv_wait_stop() drops ufp->uf_lock, so the file list 7277c478bd9Sstevel@tonic-gate * can change. Drop the lock on our (possibly) stale 7287c478bd9Sstevel@tonic-gate * ufp and let UF_ENTER() find and lock the current ufp. 7297c478bd9Sstevel@tonic-gate */ 7307c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7317c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7327c478bd9Sstevel@tonic-gate } 7337c478bd9Sstevel@tonic-gate 7347c478bd9Sstevel@tonic-gate #ifdef DEBUG 7357c478bd9Sstevel@tonic-gate /* 7367c478bd9Sstevel@tonic-gate * catch a watchfd on device's pollhead list but not on fpollinfo list 7377c478bd9Sstevel@tonic-gate */ 7387c478bd9Sstevel@tonic-gate if (ufp->uf_fpollinfo != NULL) 7397c478bd9Sstevel@tonic-gate checkwfdlist(fp->f_vnode, ufp->uf_fpollinfo); 7407c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 7417c478bd9Sstevel@tonic-gate 7427c478bd9Sstevel@tonic-gate /* 7437c478bd9Sstevel@tonic-gate * We may need to cleanup some cached poll states in t_pollstate 7447c478bd9Sstevel@tonic-gate * before the fd can be reused. It is important that we don't 7457c478bd9Sstevel@tonic-gate * access a stale thread structure. We will do the cleanup in two 7467c478bd9Sstevel@tonic-gate * phases to avoid deadlock and holding uf_lock for too long. 7477c478bd9Sstevel@tonic-gate * In phase 1, hold the uf_lock and call pollblockexit() to set 7487c478bd9Sstevel@tonic-gate * state in t_pollstate struct so that a thread does not exit on 7497c478bd9Sstevel@tonic-gate * us. In phase 2, we drop the uf_lock and call pollcacheclean(). 7507c478bd9Sstevel@tonic-gate */ 7517c478bd9Sstevel@tonic-gate pfd = ufp->uf_portfd; 7527c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 7537c478bd9Sstevel@tonic-gate fpip = ufp->uf_fpollinfo; 7547c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = NULL; 7557c478bd9Sstevel@tonic-gate if (fpip != NULL) 7567c478bd9Sstevel@tonic-gate pollblockexit(fpip); 7577c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7587c478bd9Sstevel@tonic-gate if (fpip != NULL) 7597c478bd9Sstevel@tonic-gate pollcacheclean(fpip, fd); 7607c478bd9Sstevel@tonic-gate if (pfd) 76161b4b1efSpraks port_close_fd(pfd); 7627c478bd9Sstevel@tonic-gate 7637c478bd9Sstevel@tonic-gate /* 7647c478bd9Sstevel@tonic-gate * Keep the file descriptor entry reserved across the closef(). 7657c478bd9Sstevel@tonic-gate */ 7667c478bd9Sstevel@tonic-gate error = closef(fp); 7677c478bd9Sstevel@tonic-gate 7687c478bd9Sstevel@tonic-gate setf(fd, newfp); 7697c478bd9Sstevel@tonic-gate 770*a5f69788Scraigm /* Only return closef() error when closing is all we do */ 771*a5f69788Scraigm return (newfp == NULL ? error : 0); 7727c478bd9Sstevel@tonic-gate } 7737c478bd9Sstevel@tonic-gate 7747c478bd9Sstevel@tonic-gate /* 7757c478bd9Sstevel@tonic-gate * Decrement uf_refcnt; wakeup anyone waiting to close the file. 7767c478bd9Sstevel@tonic-gate */ 7777c478bd9Sstevel@tonic-gate void 7787c478bd9Sstevel@tonic-gate releasef(int fd) 7797c478bd9Sstevel@tonic-gate { 7807c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 7817c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 7827c478bd9Sstevel@tonic-gate 7837c478bd9Sstevel@tonic-gate clear_active_fd(fd); /* clear the active file descriptor */ 7847c478bd9Sstevel@tonic-gate 7857c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 7867c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt > 0); 7877c478bd9Sstevel@tonic-gate if (--ufp->uf_refcnt == 0) 7887c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_closing_cv); 7897c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 7907c478bd9Sstevel@tonic-gate } 7917c478bd9Sstevel@tonic-gate 7927c478bd9Sstevel@tonic-gate /* 7937c478bd9Sstevel@tonic-gate * Identical to releasef() but can be called from another process. 7947c478bd9Sstevel@tonic-gate */ 7957c478bd9Sstevel@tonic-gate void 7967c478bd9Sstevel@tonic-gate areleasef(int fd, uf_info_t *fip) 7977c478bd9Sstevel@tonic-gate { 7987c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 7997c478bd9Sstevel@tonic-gate 8007c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 8017c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt > 0); 8027c478bd9Sstevel@tonic-gate if (--ufp->uf_refcnt == 0) 8037c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_closing_cv); 8047c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 8057c478bd9Sstevel@tonic-gate } 8067c478bd9Sstevel@tonic-gate 8077c478bd9Sstevel@tonic-gate /* 8087c478bd9Sstevel@tonic-gate * Duplicate all file descriptors across a fork. 8097c478bd9Sstevel@tonic-gate */ 8107c478bd9Sstevel@tonic-gate void 8117c478bd9Sstevel@tonic-gate flist_fork(uf_info_t *pfip, uf_info_t *cfip) 8127c478bd9Sstevel@tonic-gate { 8137c478bd9Sstevel@tonic-gate int fd, nfiles; 8147c478bd9Sstevel@tonic-gate uf_entry_t *pufp, *cufp; 8157c478bd9Sstevel@tonic-gate 8167c478bd9Sstevel@tonic-gate mutex_init(&cfip->fi_lock, NULL, MUTEX_DEFAULT, NULL); 8177c478bd9Sstevel@tonic-gate cfip->fi_rlist = NULL; 8187c478bd9Sstevel@tonic-gate 8197c478bd9Sstevel@tonic-gate /* 8207c478bd9Sstevel@tonic-gate * We don't need to hold fi_lock because all other lwp's in the 8217c478bd9Sstevel@tonic-gate * parent have been held. 8227c478bd9Sstevel@tonic-gate */ 8237c478bd9Sstevel@tonic-gate cfip->fi_nfiles = nfiles = flist_minsize(pfip); 8247c478bd9Sstevel@tonic-gate 8257c478bd9Sstevel@tonic-gate cfip->fi_list = kmem_zalloc(nfiles * sizeof (uf_entry_t), KM_SLEEP); 8267c478bd9Sstevel@tonic-gate 8277c478bd9Sstevel@tonic-gate for (fd = 0, pufp = pfip->fi_list, cufp = cfip->fi_list; fd < nfiles; 8287c478bd9Sstevel@tonic-gate fd++, pufp++, cufp++) { 8297c478bd9Sstevel@tonic-gate cufp->uf_file = pufp->uf_file; 8307c478bd9Sstevel@tonic-gate cufp->uf_alloc = pufp->uf_alloc; 8317c478bd9Sstevel@tonic-gate cufp->uf_flag = pufp->uf_flag; 8327c478bd9Sstevel@tonic-gate cufp->uf_busy = pufp->uf_busy; 8337c478bd9Sstevel@tonic-gate if (pufp->uf_file == NULL) { 8347c478bd9Sstevel@tonic-gate ASSERT(pufp->uf_flag == 0); 8357c478bd9Sstevel@tonic-gate if (pufp->uf_busy) { 8367c478bd9Sstevel@tonic-gate /* 8377c478bd9Sstevel@tonic-gate * Grab locks to appease ASSERTs in fd_reserve 8387c478bd9Sstevel@tonic-gate */ 8397c478bd9Sstevel@tonic-gate mutex_enter(&cfip->fi_lock); 8407c478bd9Sstevel@tonic-gate mutex_enter(&cufp->uf_lock); 8417c478bd9Sstevel@tonic-gate fd_reserve(cfip, fd, -1); 8427c478bd9Sstevel@tonic-gate mutex_exit(&cufp->uf_lock); 8437c478bd9Sstevel@tonic-gate mutex_exit(&cfip->fi_lock); 8447c478bd9Sstevel@tonic-gate } 8457c478bd9Sstevel@tonic-gate } 8467c478bd9Sstevel@tonic-gate } 8477c478bd9Sstevel@tonic-gate } 8487c478bd9Sstevel@tonic-gate 8497c478bd9Sstevel@tonic-gate /* 8507c478bd9Sstevel@tonic-gate * Close all open file descriptors for the current process. 8517c478bd9Sstevel@tonic-gate * This is only called from exit(), which is single-threaded, 8527c478bd9Sstevel@tonic-gate * so we don't need any locking. 8537c478bd9Sstevel@tonic-gate */ 8547c478bd9Sstevel@tonic-gate void 8557c478bd9Sstevel@tonic-gate closeall(uf_info_t *fip) 8567c478bd9Sstevel@tonic-gate { 8577c478bd9Sstevel@tonic-gate int fd; 8587c478bd9Sstevel@tonic-gate file_t *fp; 8597c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 8607c478bd9Sstevel@tonic-gate 8617c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 8627c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++, ufp++) { 8637c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL) { 8647c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 8657c478bd9Sstevel@tonic-gate if (ufp->uf_portfd != NULL) { 86661b4b1efSpraks portfd_t *pfd; 8677c478bd9Sstevel@tonic-gate /* remove event port association */ 86861b4b1efSpraks pfd = ufp->uf_portfd; 8697c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 87061b4b1efSpraks port_close_fd(pfd); 8717c478bd9Sstevel@tonic-gate } 8727c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 8737c478bd9Sstevel@tonic-gate (void) closef(fp); 8747c478bd9Sstevel@tonic-gate } 8757c478bd9Sstevel@tonic-gate } 8767c478bd9Sstevel@tonic-gate 8777c478bd9Sstevel@tonic-gate kmem_free(fip->fi_list, fip->fi_nfiles * sizeof (uf_entry_t)); 8787c478bd9Sstevel@tonic-gate fip->fi_list = NULL; 8797c478bd9Sstevel@tonic-gate fip->fi_nfiles = 0; 8807c478bd9Sstevel@tonic-gate while (fip->fi_rlist != NULL) { 8817c478bd9Sstevel@tonic-gate uf_rlist_t *urp = fip->fi_rlist; 8827c478bd9Sstevel@tonic-gate fip->fi_rlist = urp->ur_next; 8837c478bd9Sstevel@tonic-gate kmem_free(urp->ur_list, urp->ur_nfiles * sizeof (uf_entry_t)); 8847c478bd9Sstevel@tonic-gate kmem_free(urp, sizeof (uf_rlist_t)); 8857c478bd9Sstevel@tonic-gate } 8867c478bd9Sstevel@tonic-gate } 8877c478bd9Sstevel@tonic-gate 8887c478bd9Sstevel@tonic-gate /* 8897c478bd9Sstevel@tonic-gate * Internal form of close. Decrement reference count on file 8907c478bd9Sstevel@tonic-gate * structure. Decrement reference count on the vnode following 8917c478bd9Sstevel@tonic-gate * removal of the referencing file structure. 8927c478bd9Sstevel@tonic-gate */ 8937c478bd9Sstevel@tonic-gate int 8947c478bd9Sstevel@tonic-gate closef(file_t *fp) 8957c478bd9Sstevel@tonic-gate { 8967c478bd9Sstevel@tonic-gate vnode_t *vp; 8977c478bd9Sstevel@tonic-gate int error; 8987c478bd9Sstevel@tonic-gate int count; 8997c478bd9Sstevel@tonic-gate int flag; 9007c478bd9Sstevel@tonic-gate offset_t offset; 9017c478bd9Sstevel@tonic-gate 9027c478bd9Sstevel@tonic-gate #ifdef C2_AUDIT 9037c478bd9Sstevel@tonic-gate /* 9047c478bd9Sstevel@tonic-gate * audit close of file (may be exit) 9057c478bd9Sstevel@tonic-gate */ 9067c478bd9Sstevel@tonic-gate if (audit_active) 9077c478bd9Sstevel@tonic-gate audit_closef(fp); 9087c478bd9Sstevel@tonic-gate #endif 9097c478bd9Sstevel@tonic-gate ASSERT(MUTEX_NOT_HELD(&P_FINFO(curproc)->fi_lock)); 9107c478bd9Sstevel@tonic-gate 9117c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 9127c478bd9Sstevel@tonic-gate 9137c478bd9Sstevel@tonic-gate ASSERT(fp->f_count > 0); 9147c478bd9Sstevel@tonic-gate 9157c478bd9Sstevel@tonic-gate count = fp->f_count--; 9167c478bd9Sstevel@tonic-gate flag = fp->f_flag; 9177c478bd9Sstevel@tonic-gate offset = fp->f_offset; 9187c478bd9Sstevel@tonic-gate 9197c478bd9Sstevel@tonic-gate vp = fp->f_vnode; 9207c478bd9Sstevel@tonic-gate 9217c478bd9Sstevel@tonic-gate error = VOP_CLOSE(vp, flag, count, offset, fp->f_cred); 9227c478bd9Sstevel@tonic-gate 9237c478bd9Sstevel@tonic-gate if (count > 1) { 9247c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 9257c478bd9Sstevel@tonic-gate return (error); 9267c478bd9Sstevel@tonic-gate } 9277c478bd9Sstevel@tonic-gate ASSERT(fp->f_count == 0); 9287c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 9297c478bd9Sstevel@tonic-gate 9307c478bd9Sstevel@tonic-gate VN_RELE(vp); 9317c478bd9Sstevel@tonic-gate #ifdef C2_AUDIT 9327c478bd9Sstevel@tonic-gate /* 9337c478bd9Sstevel@tonic-gate * deallocate resources to audit_data 9347c478bd9Sstevel@tonic-gate */ 9357c478bd9Sstevel@tonic-gate if (audit_active) 9367c478bd9Sstevel@tonic-gate audit_unfalloc(fp); 9377c478bd9Sstevel@tonic-gate #endif 9387c478bd9Sstevel@tonic-gate crfree(fp->f_cred); 9397c478bd9Sstevel@tonic-gate kmem_cache_free(file_cache, fp); 9407c478bd9Sstevel@tonic-gate return (error); 9417c478bd9Sstevel@tonic-gate } 9427c478bd9Sstevel@tonic-gate 9437c478bd9Sstevel@tonic-gate /* 9447c478bd9Sstevel@tonic-gate * This is a combination of ufalloc() and setf(). 9457c478bd9Sstevel@tonic-gate */ 9467c478bd9Sstevel@tonic-gate int 9477c478bd9Sstevel@tonic-gate ufalloc_file(int start, file_t *fp) 9487c478bd9Sstevel@tonic-gate { 9497c478bd9Sstevel@tonic-gate proc_t *p = curproc; 9507c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 9517c478bd9Sstevel@tonic-gate int filelimit; 9527c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 9537c478bd9Sstevel@tonic-gate int nfiles; 9547c478bd9Sstevel@tonic-gate int fd; 9557c478bd9Sstevel@tonic-gate 9567c478bd9Sstevel@tonic-gate /* 9577c478bd9Sstevel@tonic-gate * Assertion is to convince the correctness of the following 9587c478bd9Sstevel@tonic-gate * assignment for filelimit after casting to int. 9597c478bd9Sstevel@tonic-gate */ 9607c478bd9Sstevel@tonic-gate ASSERT(p->p_fno_ctl <= INT_MAX); 9617c478bd9Sstevel@tonic-gate filelimit = (int)p->p_fno_ctl; 9627c478bd9Sstevel@tonic-gate 9637c478bd9Sstevel@tonic-gate for (;;) { 9647c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 9657c478bd9Sstevel@tonic-gate fd = fd_find(fip, start); 966*a5f69788Scraigm if (fd >= 0 && fd == fip->fi_badfd) { 967*a5f69788Scraigm start = fd + 1; 968*a5f69788Scraigm mutex_exit(&fip->fi_lock); 969*a5f69788Scraigm continue; 970*a5f69788Scraigm } 9717c478bd9Sstevel@tonic-gate if ((uint_t)fd < filelimit) 9727c478bd9Sstevel@tonic-gate break; 9737c478bd9Sstevel@tonic-gate if (fd >= filelimit) { 9747c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 9757c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 9767c478bd9Sstevel@tonic-gate (void) rctl_action(rctlproc_legacy[RLIMIT_NOFILE], 9777c478bd9Sstevel@tonic-gate p->p_rctls, p, RCA_SAFE); 9787c478bd9Sstevel@tonic-gate mutex_exit(&p->p_lock); 9797c478bd9Sstevel@tonic-gate return (-1); 9807c478bd9Sstevel@tonic-gate } 9817c478bd9Sstevel@tonic-gate /* fd_find() returned -1 */ 9827c478bd9Sstevel@tonic-gate nfiles = fip->fi_nfiles; 9837c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 9847c478bd9Sstevel@tonic-gate flist_grow(MAX(start, nfiles)); 9857c478bd9Sstevel@tonic-gate } 9867c478bd9Sstevel@tonic-gate 9877c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 9887c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, 1); 9897c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_file == NULL); 9907c478bd9Sstevel@tonic-gate ufp->uf_file = fp; 9917c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 9927c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 9937c478bd9Sstevel@tonic-gate return (fd); 9947c478bd9Sstevel@tonic-gate } 9957c478bd9Sstevel@tonic-gate 9967c478bd9Sstevel@tonic-gate /* 9977c478bd9Sstevel@tonic-gate * Allocate a user file descriptor greater than or equal to "start". 9987c478bd9Sstevel@tonic-gate */ 9997c478bd9Sstevel@tonic-gate int 10007c478bd9Sstevel@tonic-gate ufalloc(int start) 10017c478bd9Sstevel@tonic-gate { 10027c478bd9Sstevel@tonic-gate return (ufalloc_file(start, NULL)); 10037c478bd9Sstevel@tonic-gate } 10047c478bd9Sstevel@tonic-gate 10057c478bd9Sstevel@tonic-gate /* 10067c478bd9Sstevel@tonic-gate * Check that a future allocation of count fds on proc p has a good 10077c478bd9Sstevel@tonic-gate * chance of succeeding. If not, do rctl processing as if we'd failed 10087c478bd9Sstevel@tonic-gate * the allocation. 10097c478bd9Sstevel@tonic-gate * 10107c478bd9Sstevel@tonic-gate * Our caller must guarantee that p cannot disappear underneath us. 10117c478bd9Sstevel@tonic-gate */ 10127c478bd9Sstevel@tonic-gate int 10137c478bd9Sstevel@tonic-gate ufcanalloc(proc_t *p, uint_t count) 10147c478bd9Sstevel@tonic-gate { 10157c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(p); 10167c478bd9Sstevel@tonic-gate int filelimit; 10177c478bd9Sstevel@tonic-gate int current; 10187c478bd9Sstevel@tonic-gate 10197c478bd9Sstevel@tonic-gate if (count == 0) 10207c478bd9Sstevel@tonic-gate return (1); 10217c478bd9Sstevel@tonic-gate 10227c478bd9Sstevel@tonic-gate ASSERT(p->p_fno_ctl <= INT_MAX); 10237c478bd9Sstevel@tonic-gate filelimit = (int)p->p_fno_ctl; 10247c478bd9Sstevel@tonic-gate 10257c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 10267c478bd9Sstevel@tonic-gate current = flist_nalloc(fip); /* # of in-use descriptors */ 10277c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 10287c478bd9Sstevel@tonic-gate 10297c478bd9Sstevel@tonic-gate /* 10307c478bd9Sstevel@tonic-gate * If count is a positive integer, the worst that can happen is 10317c478bd9Sstevel@tonic-gate * an overflow to a negative value, which is caught by the >= 0 check. 10327c478bd9Sstevel@tonic-gate */ 10337c478bd9Sstevel@tonic-gate current += count; 10347c478bd9Sstevel@tonic-gate if (count <= INT_MAX && current >= 0 && current <= filelimit) 10357c478bd9Sstevel@tonic-gate return (1); 10367c478bd9Sstevel@tonic-gate 10377c478bd9Sstevel@tonic-gate mutex_enter(&p->p_lock); 10387c478bd9Sstevel@tonic-gate (void) rctl_action(rctlproc_legacy[RLIMIT_NOFILE], 10397c478bd9Sstevel@tonic-gate p->p_rctls, p, RCA_SAFE); 10407c478bd9Sstevel@tonic-gate mutex_exit(&p->p_lock); 10417c478bd9Sstevel@tonic-gate return (0); 10427c478bd9Sstevel@tonic-gate } 10437c478bd9Sstevel@tonic-gate 10447c478bd9Sstevel@tonic-gate /* 10457c478bd9Sstevel@tonic-gate * Allocate a user file descriptor and a file structure. 10467c478bd9Sstevel@tonic-gate * Initialize the descriptor to point at the file structure. 10477c478bd9Sstevel@tonic-gate * If fdp is NULL, the user file descriptor will not be allocated. 10487c478bd9Sstevel@tonic-gate */ 10497c478bd9Sstevel@tonic-gate int 10507c478bd9Sstevel@tonic-gate falloc(vnode_t *vp, int flag, file_t **fpp, int *fdp) 10517c478bd9Sstevel@tonic-gate { 10527c478bd9Sstevel@tonic-gate file_t *fp; 10537c478bd9Sstevel@tonic-gate int fd; 10547c478bd9Sstevel@tonic-gate 10557c478bd9Sstevel@tonic-gate if (fdp) { 10567c478bd9Sstevel@tonic-gate if ((fd = ufalloc(0)) == -1) 10577c478bd9Sstevel@tonic-gate return (EMFILE); 10587c478bd9Sstevel@tonic-gate } 10597c478bd9Sstevel@tonic-gate fp = kmem_cache_alloc(file_cache, KM_SLEEP); 10607c478bd9Sstevel@tonic-gate /* 10617c478bd9Sstevel@tonic-gate * Note: falloc returns the fp locked 10627c478bd9Sstevel@tonic-gate */ 10637c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 10647c478bd9Sstevel@tonic-gate fp->f_count = 1; 10657c478bd9Sstevel@tonic-gate fp->f_flag = (ushort_t)flag; 10667c478bd9Sstevel@tonic-gate fp->f_vnode = vp; 10677c478bd9Sstevel@tonic-gate fp->f_offset = 0; 10687c478bd9Sstevel@tonic-gate fp->f_audit_data = 0; 10697c478bd9Sstevel@tonic-gate crhold(fp->f_cred = CRED()); 10707c478bd9Sstevel@tonic-gate #ifdef C2_AUDIT 10717c478bd9Sstevel@tonic-gate /* 10727c478bd9Sstevel@tonic-gate * allocate resources to audit_data 10737c478bd9Sstevel@tonic-gate */ 10747c478bd9Sstevel@tonic-gate if (audit_active) 10757c478bd9Sstevel@tonic-gate audit_falloc(fp); 10767c478bd9Sstevel@tonic-gate #endif 10777c478bd9Sstevel@tonic-gate *fpp = fp; 10787c478bd9Sstevel@tonic-gate if (fdp) 10797c478bd9Sstevel@tonic-gate *fdp = fd; 10807c478bd9Sstevel@tonic-gate return (0); 10817c478bd9Sstevel@tonic-gate } 10827c478bd9Sstevel@tonic-gate 10837c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 10847c478bd9Sstevel@tonic-gate static int 10857c478bd9Sstevel@tonic-gate file_cache_constructor(void *buf, void *cdrarg, int kmflags) 10867c478bd9Sstevel@tonic-gate { 10877c478bd9Sstevel@tonic-gate file_t *fp = buf; 10887c478bd9Sstevel@tonic-gate 10897c478bd9Sstevel@tonic-gate mutex_init(&fp->f_tlock, NULL, MUTEX_DEFAULT, NULL); 10907c478bd9Sstevel@tonic-gate return (0); 10917c478bd9Sstevel@tonic-gate } 10927c478bd9Sstevel@tonic-gate 10937c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 10947c478bd9Sstevel@tonic-gate static void 10957c478bd9Sstevel@tonic-gate file_cache_destructor(void *buf, void *cdrarg) 10967c478bd9Sstevel@tonic-gate { 10977c478bd9Sstevel@tonic-gate file_t *fp = buf; 10987c478bd9Sstevel@tonic-gate 10997c478bd9Sstevel@tonic-gate mutex_destroy(&fp->f_tlock); 11007c478bd9Sstevel@tonic-gate } 11017c478bd9Sstevel@tonic-gate 11027c478bd9Sstevel@tonic-gate void 11037c478bd9Sstevel@tonic-gate finit() 11047c478bd9Sstevel@tonic-gate { 11057c478bd9Sstevel@tonic-gate file_cache = kmem_cache_create("file_cache", sizeof (file_t), 0, 11067c478bd9Sstevel@tonic-gate file_cache_constructor, file_cache_destructor, NULL, NULL, NULL, 0); 11077c478bd9Sstevel@tonic-gate } 11087c478bd9Sstevel@tonic-gate 11097c478bd9Sstevel@tonic-gate void 11107c478bd9Sstevel@tonic-gate unfalloc(file_t *fp) 11117c478bd9Sstevel@tonic-gate { 11127c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&fp->f_tlock)); 11137c478bd9Sstevel@tonic-gate if (--fp->f_count <= 0) { 11147c478bd9Sstevel@tonic-gate #ifdef C2_AUDIT 11157c478bd9Sstevel@tonic-gate /* 11167c478bd9Sstevel@tonic-gate * deallocate resources to audit_data 11177c478bd9Sstevel@tonic-gate */ 11187c478bd9Sstevel@tonic-gate if (audit_active) 11197c478bd9Sstevel@tonic-gate audit_unfalloc(fp); 11207c478bd9Sstevel@tonic-gate #endif 11217c478bd9Sstevel@tonic-gate crfree(fp->f_cred); 11227c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 11237c478bd9Sstevel@tonic-gate kmem_cache_free(file_cache, fp); 11247c478bd9Sstevel@tonic-gate } else 11257c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 11267c478bd9Sstevel@tonic-gate } 11277c478bd9Sstevel@tonic-gate 11287c478bd9Sstevel@tonic-gate /* 11297c478bd9Sstevel@tonic-gate * Given a file descriptor, set the user's 11307c478bd9Sstevel@tonic-gate * file pointer to the given parameter. 11317c478bd9Sstevel@tonic-gate */ 11327c478bd9Sstevel@tonic-gate void 11337c478bd9Sstevel@tonic-gate setf(int fd, file_t *fp) 11347c478bd9Sstevel@tonic-gate { 11357c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 11367c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 11377c478bd9Sstevel@tonic-gate 11387c478bd9Sstevel@tonic-gate #ifdef C2_AUDIT 11397c478bd9Sstevel@tonic-gate if (audit_active) 11407c478bd9Sstevel@tonic-gate audit_setf(fp, fd); 11417c478bd9Sstevel@tonic-gate #endif /* C2_AUDIT */ 11427c478bd9Sstevel@tonic-gate 11437c478bd9Sstevel@tonic-gate if (fp == NULL) { 11447c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 11457c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11467c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, -1); 11477c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 11487c478bd9Sstevel@tonic-gate } else { 11497c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11507c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_busy); 11517c478bd9Sstevel@tonic-gate } 11527c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_fpollinfo == NULL); 11537c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_flag == 0); 11547c478bd9Sstevel@tonic-gate ufp->uf_file = fp; 11557c478bd9Sstevel@tonic-gate cv_broadcast(&ufp->uf_wanted_cv); 11567c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 11577c478bd9Sstevel@tonic-gate } 11587c478bd9Sstevel@tonic-gate 11597c478bd9Sstevel@tonic-gate /* 11607c478bd9Sstevel@tonic-gate * Given a file descriptor, return the file table flags, plus, 11617c478bd9Sstevel@tonic-gate * if this is a socket in asynchronous mode, the FASYNC flag. 11627c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_getfl(). 11637c478bd9Sstevel@tonic-gate */ 11647c478bd9Sstevel@tonic-gate int 11657c478bd9Sstevel@tonic-gate f_getfl(int fd, int *flagp) 11667c478bd9Sstevel@tonic-gate { 11677c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 11687c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 11697c478bd9Sstevel@tonic-gate file_t *fp; 11707c478bd9Sstevel@tonic-gate int error; 11717c478bd9Sstevel@tonic-gate 11727c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 11737c478bd9Sstevel@tonic-gate error = EBADF; 11747c478bd9Sstevel@tonic-gate else { 11757c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 11767c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) 11777c478bd9Sstevel@tonic-gate error = EBADF; 11787c478bd9Sstevel@tonic-gate else { 11797c478bd9Sstevel@tonic-gate vnode_t *vp = fp->f_vnode; 11807c478bd9Sstevel@tonic-gate int flag = fp->f_flag; 11817c478bd9Sstevel@tonic-gate 11827c478bd9Sstevel@tonic-gate /* 11837c478bd9Sstevel@tonic-gate * BSD fcntl() FASYNC compatibility. 11847c478bd9Sstevel@tonic-gate * 11857c478bd9Sstevel@tonic-gate * SCTP doesn't have an associated stream and thus 11867c478bd9Sstevel@tonic-gate * doesn't store flags on it. 11877c478bd9Sstevel@tonic-gate */ 11887c478bd9Sstevel@tonic-gate if ((vp->v_type == VSOCK) && (vp->v_stream != NULL)) 11897c478bd9Sstevel@tonic-gate flag |= sock_getfasync(vp); 11907c478bd9Sstevel@tonic-gate *flagp = flag; 11917c478bd9Sstevel@tonic-gate error = 0; 11927c478bd9Sstevel@tonic-gate } 11937c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 11947c478bd9Sstevel@tonic-gate } 11957c478bd9Sstevel@tonic-gate 11967c478bd9Sstevel@tonic-gate return (error); 11977c478bd9Sstevel@tonic-gate } 11987c478bd9Sstevel@tonic-gate 11997c478bd9Sstevel@tonic-gate /* 12007c478bd9Sstevel@tonic-gate * Given a file descriptor, return the user's file flags. 12017c478bd9Sstevel@tonic-gate * Force the FD_CLOEXEC flag for writable self-open /proc files. 12027c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_getfd_error(). 12037c478bd9Sstevel@tonic-gate */ 12047c478bd9Sstevel@tonic-gate int 12057c478bd9Sstevel@tonic-gate f_getfd_error(int fd, int *flagp) 12067c478bd9Sstevel@tonic-gate { 12077c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 12087c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 12097c478bd9Sstevel@tonic-gate file_t *fp; 12107c478bd9Sstevel@tonic-gate int flag; 12117c478bd9Sstevel@tonic-gate int error; 12127c478bd9Sstevel@tonic-gate 12137c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 12147c478bd9Sstevel@tonic-gate error = EBADF; 12157c478bd9Sstevel@tonic-gate else { 12167c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 12177c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) == NULL) 12187c478bd9Sstevel@tonic-gate error = EBADF; 12197c478bd9Sstevel@tonic-gate else { 12207c478bd9Sstevel@tonic-gate flag = ufp->uf_flag; 12217c478bd9Sstevel@tonic-gate if ((fp->f_flag & FWRITE) && pr_isself(fp->f_vnode)) 12227c478bd9Sstevel@tonic-gate flag |= FD_CLOEXEC; 12237c478bd9Sstevel@tonic-gate *flagp = flag; 12247c478bd9Sstevel@tonic-gate error = 0; 12257c478bd9Sstevel@tonic-gate } 12267c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 12277c478bd9Sstevel@tonic-gate } 12287c478bd9Sstevel@tonic-gate 12297c478bd9Sstevel@tonic-gate return (error); 12307c478bd9Sstevel@tonic-gate } 12317c478bd9Sstevel@tonic-gate 12327c478bd9Sstevel@tonic-gate /* 12337c478bd9Sstevel@tonic-gate * getf() must have been called before calling f_getfd(). 12347c478bd9Sstevel@tonic-gate */ 12357c478bd9Sstevel@tonic-gate char 12367c478bd9Sstevel@tonic-gate f_getfd(int fd) 12377c478bd9Sstevel@tonic-gate { 12387c478bd9Sstevel@tonic-gate int flag = 0; 12397c478bd9Sstevel@tonic-gate (void) f_getfd_error(fd, &flag); 12407c478bd9Sstevel@tonic-gate return ((char)flag); 12417c478bd9Sstevel@tonic-gate } 12427c478bd9Sstevel@tonic-gate 12437c478bd9Sstevel@tonic-gate /* 12447c478bd9Sstevel@tonic-gate * Given a file descriptor and file flags, set the user's file flags. 12457c478bd9Sstevel@tonic-gate * At present, the only valid flag is FD_CLOEXEC. 12467c478bd9Sstevel@tonic-gate * getf() may or may not have been called before calling f_setfd_error(). 12477c478bd9Sstevel@tonic-gate */ 12487c478bd9Sstevel@tonic-gate int 12497c478bd9Sstevel@tonic-gate f_setfd_error(int fd, int flags) 12507c478bd9Sstevel@tonic-gate { 12517c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 12527c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 12537c478bd9Sstevel@tonic-gate int error; 12547c478bd9Sstevel@tonic-gate 12557c478bd9Sstevel@tonic-gate if ((uint_t)fd >= fip->fi_nfiles) 12567c478bd9Sstevel@tonic-gate error = EBADF; 12577c478bd9Sstevel@tonic-gate else { 12587c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 12597c478bd9Sstevel@tonic-gate if (ufp->uf_file == NULL) 12607c478bd9Sstevel@tonic-gate error = EBADF; 12617c478bd9Sstevel@tonic-gate else { 12627c478bd9Sstevel@tonic-gate ufp->uf_flag = flags & FD_CLOEXEC; 12637c478bd9Sstevel@tonic-gate error = 0; 12647c478bd9Sstevel@tonic-gate } 12657c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 12667c478bd9Sstevel@tonic-gate } 12677c478bd9Sstevel@tonic-gate return (error); 12687c478bd9Sstevel@tonic-gate } 12697c478bd9Sstevel@tonic-gate 12707c478bd9Sstevel@tonic-gate void 12717c478bd9Sstevel@tonic-gate f_setfd(int fd, char flags) 12727c478bd9Sstevel@tonic-gate { 12737c478bd9Sstevel@tonic-gate (void) f_setfd_error(fd, flags); 12747c478bd9Sstevel@tonic-gate } 12757c478bd9Sstevel@tonic-gate 1276*a5f69788Scraigm #define BADFD_MIN 3 1277*a5f69788Scraigm #define BADFD_MAX 255 1278*a5f69788Scraigm 1279*a5f69788Scraigm /* 1280*a5f69788Scraigm * Attempt to allocate a file descriptor which is bad and which 1281*a5f69788Scraigm * is "poison" to the application. It cannot be closed (except 1282*a5f69788Scraigm * on exec), allocated for a different use, etc. 1283*a5f69788Scraigm */ 1284*a5f69788Scraigm int 1285*a5f69788Scraigm f_badfd(int start, int *fdp, int action) 1286*a5f69788Scraigm { 1287*a5f69788Scraigm int fdr; 1288*a5f69788Scraigm int badfd; 1289*a5f69788Scraigm uf_info_t *fip = P_FINFO(curproc); 1290*a5f69788Scraigm 1291*a5f69788Scraigm #ifdef _LP64 1292*a5f69788Scraigm /* No restrictions on 64 bit _file */ 1293*a5f69788Scraigm if (get_udatamodel() != DATAMODEL_ILP32) 1294*a5f69788Scraigm return (EINVAL); 1295*a5f69788Scraigm #endif 1296*a5f69788Scraigm 1297*a5f69788Scraigm if (start > BADFD_MAX || start < BADFD_MIN) 1298*a5f69788Scraigm return (EINVAL); 1299*a5f69788Scraigm 1300*a5f69788Scraigm if (action >= NSIG || action < 0) 1301*a5f69788Scraigm return (EINVAL); 1302*a5f69788Scraigm 1303*a5f69788Scraigm mutex_enter(&fip->fi_lock); 1304*a5f69788Scraigm badfd = fip->fi_badfd; 1305*a5f69788Scraigm mutex_exit(&fip->fi_lock); 1306*a5f69788Scraigm 1307*a5f69788Scraigm if (badfd != -1) 1308*a5f69788Scraigm return (EAGAIN); 1309*a5f69788Scraigm 1310*a5f69788Scraigm fdr = ufalloc(start); 1311*a5f69788Scraigm 1312*a5f69788Scraigm if (fdr > BADFD_MAX) { 1313*a5f69788Scraigm setf(fdr, NULL); 1314*a5f69788Scraigm return (EMFILE); 1315*a5f69788Scraigm } 1316*a5f69788Scraigm if (fdr < 0) 1317*a5f69788Scraigm return (EMFILE); 1318*a5f69788Scraigm 1319*a5f69788Scraigm mutex_enter(&fip->fi_lock); 1320*a5f69788Scraigm if (fip->fi_badfd != -1) { 1321*a5f69788Scraigm /* Lost race */ 1322*a5f69788Scraigm mutex_exit(&fip->fi_lock); 1323*a5f69788Scraigm setf(fdr, NULL); 1324*a5f69788Scraigm return (EAGAIN); 1325*a5f69788Scraigm } 1326*a5f69788Scraigm fip->fi_action = action; 1327*a5f69788Scraigm fip->fi_badfd = fdr; 1328*a5f69788Scraigm mutex_exit(&fip->fi_lock); 1329*a5f69788Scraigm setf(fdr, NULL); 1330*a5f69788Scraigm 1331*a5f69788Scraigm *fdp = fdr; 1332*a5f69788Scraigm 1333*a5f69788Scraigm return (0); 1334*a5f69788Scraigm } 1335*a5f69788Scraigm 13367c478bd9Sstevel@tonic-gate /* 13377c478bd9Sstevel@tonic-gate * Allocate a file descriptor and assign it to the vnode "*vpp", 13387c478bd9Sstevel@tonic-gate * performing the usual open protocol upon it and returning the 13397c478bd9Sstevel@tonic-gate * file descriptor allocated. It is the responsibility of the 13407c478bd9Sstevel@tonic-gate * caller to dispose of "*vpp" if any error occurs. 13417c478bd9Sstevel@tonic-gate */ 13427c478bd9Sstevel@tonic-gate int 13437c478bd9Sstevel@tonic-gate fassign(vnode_t **vpp, int mode, int *fdp) 13447c478bd9Sstevel@tonic-gate { 13457c478bd9Sstevel@tonic-gate file_t *fp; 13467c478bd9Sstevel@tonic-gate int error; 13477c478bd9Sstevel@tonic-gate int fd; 13487c478bd9Sstevel@tonic-gate 13497c478bd9Sstevel@tonic-gate if (error = falloc((vnode_t *)NULL, mode, &fp, &fd)) 13507c478bd9Sstevel@tonic-gate return (error); 13517c478bd9Sstevel@tonic-gate if (error = VOP_OPEN(vpp, mode, fp->f_cred)) { 13527c478bd9Sstevel@tonic-gate setf(fd, NULL); 13537c478bd9Sstevel@tonic-gate unfalloc(fp); 13547c478bd9Sstevel@tonic-gate return (error); 13557c478bd9Sstevel@tonic-gate } 13567c478bd9Sstevel@tonic-gate fp->f_vnode = *vpp; 13577c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 13587c478bd9Sstevel@tonic-gate /* 13597c478bd9Sstevel@tonic-gate * Fill in the slot falloc reserved. 13607c478bd9Sstevel@tonic-gate */ 13617c478bd9Sstevel@tonic-gate setf(fd, fp); 13627c478bd9Sstevel@tonic-gate *fdp = fd; 13637c478bd9Sstevel@tonic-gate return (0); 13647c478bd9Sstevel@tonic-gate } 13657c478bd9Sstevel@tonic-gate 13667c478bd9Sstevel@tonic-gate /* 13677c478bd9Sstevel@tonic-gate * When a process forks it must increment the f_count of all file pointers 13687c478bd9Sstevel@tonic-gate * since there is a new process pointing at them. fcnt_add(fip, 1) does this. 13697c478bd9Sstevel@tonic-gate * Since we are called when there is only 1 active lwp we don't need to 13707c478bd9Sstevel@tonic-gate * hold fi_lock or any uf_lock. If the fork fails, fork_fail() calls 13717c478bd9Sstevel@tonic-gate * fcnt_add(fip, -1) to restore the counts. 13727c478bd9Sstevel@tonic-gate */ 13737c478bd9Sstevel@tonic-gate void 13747c478bd9Sstevel@tonic-gate fcnt_add(uf_info_t *fip, int incr) 13757c478bd9Sstevel@tonic-gate { 13767c478bd9Sstevel@tonic-gate int i; 13777c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 13787c478bd9Sstevel@tonic-gate file_t *fp; 13797c478bd9Sstevel@tonic-gate 13807c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 13817c478bd9Sstevel@tonic-gate for (i = 0; i < fip->fi_nfiles; i++, ufp++) { 13827c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL) { 13837c478bd9Sstevel@tonic-gate mutex_enter(&fp->f_tlock); 13847c478bd9Sstevel@tonic-gate ASSERT((incr == 1 && fp->f_count >= 1) || 13857c478bd9Sstevel@tonic-gate (incr == -1 && fp->f_count >= 2)); 13867c478bd9Sstevel@tonic-gate fp->f_count += incr; 13877c478bd9Sstevel@tonic-gate mutex_exit(&fp->f_tlock); 13887c478bd9Sstevel@tonic-gate } 13897c478bd9Sstevel@tonic-gate } 13907c478bd9Sstevel@tonic-gate } 13917c478bd9Sstevel@tonic-gate 13927c478bd9Sstevel@tonic-gate /* 13937c478bd9Sstevel@tonic-gate * This is called from exec to close all fd's that have the FD_CLOEXEC flag 13947c478bd9Sstevel@tonic-gate * set and also to close all self-open for write /proc file descriptors. 13957c478bd9Sstevel@tonic-gate */ 13967c478bd9Sstevel@tonic-gate void 13977c478bd9Sstevel@tonic-gate close_exec(uf_info_t *fip) 13987c478bd9Sstevel@tonic-gate { 13997c478bd9Sstevel@tonic-gate int fd; 14007c478bd9Sstevel@tonic-gate file_t *fp; 14017c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 14027c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 14037c478bd9Sstevel@tonic-gate portfd_t *pfd; 14047c478bd9Sstevel@tonic-gate 14057c478bd9Sstevel@tonic-gate ufp = fip->fi_list; 14067c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++, ufp++) { 14077c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 14087c478bd9Sstevel@tonic-gate ((ufp->uf_flag & FD_CLOEXEC) || 14097c478bd9Sstevel@tonic-gate ((fp->f_flag & FWRITE) && pr_isself(fp->f_vnode)))) { 14107c478bd9Sstevel@tonic-gate fpip = ufp->uf_fpollinfo; 14117c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 14127c478bd9Sstevel@tonic-gate mutex_enter(&ufp->uf_lock); 14137c478bd9Sstevel@tonic-gate fd_reserve(fip, fd, -1); 14147c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 14157c478bd9Sstevel@tonic-gate ufp->uf_file = NULL; 14167c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = NULL; 14177c478bd9Sstevel@tonic-gate ufp->uf_flag = 0; 14187c478bd9Sstevel@tonic-gate /* 14197c478bd9Sstevel@tonic-gate * We may need to cleanup some cached poll states 14207c478bd9Sstevel@tonic-gate * in t_pollstate before the fd can be reused. It 14217c478bd9Sstevel@tonic-gate * is important that we don't access a stale thread 14227c478bd9Sstevel@tonic-gate * structure. We will do the cleanup in two 14237c478bd9Sstevel@tonic-gate * phases to avoid deadlock and holding uf_lock for 14247c478bd9Sstevel@tonic-gate * too long. In phase 1, hold the uf_lock and call 14257c478bd9Sstevel@tonic-gate * pollblockexit() to set state in t_pollstate struct 14267c478bd9Sstevel@tonic-gate * so that a thread does not exit on us. In phase 2, 14277c478bd9Sstevel@tonic-gate * we drop the uf_lock and call pollcacheclean(). 14287c478bd9Sstevel@tonic-gate */ 14297c478bd9Sstevel@tonic-gate pfd = ufp->uf_portfd; 14307c478bd9Sstevel@tonic-gate ufp->uf_portfd = NULL; 14317c478bd9Sstevel@tonic-gate if (fpip != NULL) 14327c478bd9Sstevel@tonic-gate pollblockexit(fpip); 14337c478bd9Sstevel@tonic-gate mutex_exit(&ufp->uf_lock); 14347c478bd9Sstevel@tonic-gate if (fpip != NULL) 14357c478bd9Sstevel@tonic-gate pollcacheclean(fpip, fd); 14367c478bd9Sstevel@tonic-gate if (pfd) 143761b4b1efSpraks port_close_fd(pfd); 14387c478bd9Sstevel@tonic-gate (void) closef(fp); 14397c478bd9Sstevel@tonic-gate } 14407c478bd9Sstevel@tonic-gate } 1441*a5f69788Scraigm 1442*a5f69788Scraigm /* Reset bad fd */ 1443*a5f69788Scraigm fip->fi_badfd = -1; 1444*a5f69788Scraigm fip->fi_action = -1; 14457c478bd9Sstevel@tonic-gate } 14467c478bd9Sstevel@tonic-gate 14477c478bd9Sstevel@tonic-gate /* 14487c478bd9Sstevel@tonic-gate * Common routine for modifying attributes of named files. 14497c478bd9Sstevel@tonic-gate */ 14507c478bd9Sstevel@tonic-gate int 14517c478bd9Sstevel@tonic-gate namesetattr(char *fnamep, enum symfollow followlink, vattr_t *vap, int flags) 14527c478bd9Sstevel@tonic-gate { 14537c478bd9Sstevel@tonic-gate vnode_t *vp; 14547c478bd9Sstevel@tonic-gate int error = 0; 14557c478bd9Sstevel@tonic-gate 14567c478bd9Sstevel@tonic-gate if (error = lookupname(fnamep, UIO_USERSPACE, followlink, NULLVPP, &vp)) 14577c478bd9Sstevel@tonic-gate return (set_errno(error)); 14587c478bd9Sstevel@tonic-gate if (error = vpsetattr(vp, vap, flags)) 14597c478bd9Sstevel@tonic-gate (void) set_errno(error); 14607c478bd9Sstevel@tonic-gate VN_RELE(vp); 14617c478bd9Sstevel@tonic-gate return (error); 14627c478bd9Sstevel@tonic-gate } 14637c478bd9Sstevel@tonic-gate 14647c478bd9Sstevel@tonic-gate /* 14657c478bd9Sstevel@tonic-gate * Common routine for modifying attributes of files referenced 14667c478bd9Sstevel@tonic-gate * by descriptor. 14677c478bd9Sstevel@tonic-gate */ 14687c478bd9Sstevel@tonic-gate int 14697c478bd9Sstevel@tonic-gate fdsetattr(int fd, vattr_t *vap) 14707c478bd9Sstevel@tonic-gate { 14717c478bd9Sstevel@tonic-gate file_t *fp; 14727c478bd9Sstevel@tonic-gate vnode_t *vp; 14737c478bd9Sstevel@tonic-gate int error = 0; 14747c478bd9Sstevel@tonic-gate 14757c478bd9Sstevel@tonic-gate if ((fp = getf(fd)) != NULL) { 14767c478bd9Sstevel@tonic-gate vp = fp->f_vnode; 14777c478bd9Sstevel@tonic-gate if (error = vpsetattr(vp, vap, 0)) { 14787c478bd9Sstevel@tonic-gate (void) set_errno(error); 14797c478bd9Sstevel@tonic-gate } 14807c478bd9Sstevel@tonic-gate releasef(fd); 14817c478bd9Sstevel@tonic-gate } else 14827c478bd9Sstevel@tonic-gate error = set_errno(EBADF); 14837c478bd9Sstevel@tonic-gate return (error); 14847c478bd9Sstevel@tonic-gate } 14857c478bd9Sstevel@tonic-gate 14867c478bd9Sstevel@tonic-gate /* 14877c478bd9Sstevel@tonic-gate * Common routine to set the attributes for the given vnode. 14887c478bd9Sstevel@tonic-gate * If the vnode is a file and the filesize is being manipulated, 14897c478bd9Sstevel@tonic-gate * this makes sure that there are no conflicting non-blocking 14907c478bd9Sstevel@tonic-gate * mandatory locks in that region. 14917c478bd9Sstevel@tonic-gate */ 14927c478bd9Sstevel@tonic-gate static int 14937c478bd9Sstevel@tonic-gate vpsetattr(vnode_t *vp, vattr_t *vap, int flags) 14947c478bd9Sstevel@tonic-gate { 14957c478bd9Sstevel@tonic-gate int error = 0; 14967c478bd9Sstevel@tonic-gate int in_crit = 0; 14977c478bd9Sstevel@tonic-gate u_offset_t begin; 14987c478bd9Sstevel@tonic-gate vattr_t vattr; 14997c478bd9Sstevel@tonic-gate ssize_t length; 15007c478bd9Sstevel@tonic-gate 15017c478bd9Sstevel@tonic-gate if (vn_is_readonly(vp)) { 15027c478bd9Sstevel@tonic-gate error = EROFS; 15037c478bd9Sstevel@tonic-gate } 15047c478bd9Sstevel@tonic-gate if (!error && (vap->va_mask & AT_SIZE) && 15057c478bd9Sstevel@tonic-gate nbl_need_check(vp)) { 15067c478bd9Sstevel@tonic-gate nbl_start_crit(vp, RW_READER); 15077c478bd9Sstevel@tonic-gate in_crit = 1; 15087c478bd9Sstevel@tonic-gate vattr.va_mask = AT_SIZE; 15097c478bd9Sstevel@tonic-gate if (!(error = VOP_GETATTR(vp, &vattr, 0, CRED()))) { 15107c478bd9Sstevel@tonic-gate begin = vap->va_size > vattr.va_size ? 15117c478bd9Sstevel@tonic-gate vattr.va_size : vap->va_size; 15127c478bd9Sstevel@tonic-gate length = vattr.va_size > vap->va_size ? 15137c478bd9Sstevel@tonic-gate vattr.va_size - vap->va_size : 15147c478bd9Sstevel@tonic-gate vap->va_size - vattr.va_size; 15157c478bd9Sstevel@tonic-gate 15167c478bd9Sstevel@tonic-gate if (nbl_conflict(vp, NBL_WRITE, begin, length, 0)) { 15177c478bd9Sstevel@tonic-gate error = EACCES; 15187c478bd9Sstevel@tonic-gate } 15197c478bd9Sstevel@tonic-gate } 15207c478bd9Sstevel@tonic-gate } 15217c478bd9Sstevel@tonic-gate if (!error) 15227c478bd9Sstevel@tonic-gate error = VOP_SETATTR(vp, vap, flags, CRED(), NULL); 15237c478bd9Sstevel@tonic-gate 15247c478bd9Sstevel@tonic-gate if (in_crit) 15257c478bd9Sstevel@tonic-gate nbl_end_crit(vp); 15267c478bd9Sstevel@tonic-gate 15277c478bd9Sstevel@tonic-gate return (error); 15287c478bd9Sstevel@tonic-gate } 15297c478bd9Sstevel@tonic-gate 15307c478bd9Sstevel@tonic-gate /* 15317c478bd9Sstevel@tonic-gate * Return true if the given vnode is referenced by any 15327c478bd9Sstevel@tonic-gate * entry in the current process's file descriptor table. 15337c478bd9Sstevel@tonic-gate */ 15347c478bd9Sstevel@tonic-gate int 15357c478bd9Sstevel@tonic-gate fisopen(vnode_t *vp) 15367c478bd9Sstevel@tonic-gate { 15377c478bd9Sstevel@tonic-gate int fd; 15387c478bd9Sstevel@tonic-gate file_t *fp; 15397c478bd9Sstevel@tonic-gate vnode_t *ovp; 15407c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 15417c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 15427c478bd9Sstevel@tonic-gate 15437c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 15447c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 15457c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 15467c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 15477c478bd9Sstevel@tonic-gate (ovp = fp->f_vnode) != NULL && VN_CMP(vp, ovp)) { 15487c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 15497c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 15507c478bd9Sstevel@tonic-gate return (1); 15517c478bd9Sstevel@tonic-gate } 15527c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 15537c478bd9Sstevel@tonic-gate } 15547c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 15557c478bd9Sstevel@tonic-gate return (0); 15567c478bd9Sstevel@tonic-gate } 15577c478bd9Sstevel@tonic-gate 15587c478bd9Sstevel@tonic-gate /* 15597c478bd9Sstevel@tonic-gate * Return zero if at least one file currently open (by curproc) shouldn't be 15607c478bd9Sstevel@tonic-gate * allowed to change zones. 15617c478bd9Sstevel@tonic-gate */ 15627c478bd9Sstevel@tonic-gate int 15637c478bd9Sstevel@tonic-gate files_can_change_zones(void) 15647c478bd9Sstevel@tonic-gate { 15657c478bd9Sstevel@tonic-gate int fd; 15667c478bd9Sstevel@tonic-gate file_t *fp; 15677c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 15687c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 15697c478bd9Sstevel@tonic-gate 15707c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 15717c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 15727c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 15737c478bd9Sstevel@tonic-gate if ((fp = ufp->uf_file) != NULL && 15747c478bd9Sstevel@tonic-gate !vn_can_change_zones(fp->f_vnode)) { 15757c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 15767c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 15777c478bd9Sstevel@tonic-gate return (0); 15787c478bd9Sstevel@tonic-gate } 15797c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 15807c478bd9Sstevel@tonic-gate } 15817c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 15827c478bd9Sstevel@tonic-gate return (1); 15837c478bd9Sstevel@tonic-gate } 15847c478bd9Sstevel@tonic-gate 15857c478bd9Sstevel@tonic-gate #ifdef DEBUG 15867c478bd9Sstevel@tonic-gate 15877c478bd9Sstevel@tonic-gate /* 15887c478bd9Sstevel@tonic-gate * The following functions are only used in ASSERT()s elsewhere. 15897c478bd9Sstevel@tonic-gate * They do not modify the state of the system. 15907c478bd9Sstevel@tonic-gate */ 15917c478bd9Sstevel@tonic-gate 15927c478bd9Sstevel@tonic-gate /* 15937c478bd9Sstevel@tonic-gate * Return true (1) if the current thread is in the fpollinfo 15947c478bd9Sstevel@tonic-gate * list for this file descriptor, else false (0). 15957c478bd9Sstevel@tonic-gate */ 15967c478bd9Sstevel@tonic-gate static int 15977c478bd9Sstevel@tonic-gate curthread_in_plist(uf_entry_t *ufp) 15987c478bd9Sstevel@tonic-gate { 15997c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 16007c478bd9Sstevel@tonic-gate 16017c478bd9Sstevel@tonic-gate ASSERT(MUTEX_HELD(&ufp->uf_lock)); 16027c478bd9Sstevel@tonic-gate for (fpip = ufp->uf_fpollinfo; fpip; fpip = fpip->fp_next) 16037c478bd9Sstevel@tonic-gate if (fpip->fp_thread == curthread) 16047c478bd9Sstevel@tonic-gate return (1); 16057c478bd9Sstevel@tonic-gate return (0); 16067c478bd9Sstevel@tonic-gate } 16077c478bd9Sstevel@tonic-gate 16087c478bd9Sstevel@tonic-gate /* 16097c478bd9Sstevel@tonic-gate * Sanity check to make sure that after lwp_exit(), 16107c478bd9Sstevel@tonic-gate * curthread does not appear on any fd's fpollinfo list. 16117c478bd9Sstevel@tonic-gate */ 16127c478bd9Sstevel@tonic-gate void 16137c478bd9Sstevel@tonic-gate checkfpollinfo(void) 16147c478bd9Sstevel@tonic-gate { 16157c478bd9Sstevel@tonic-gate int fd; 16167c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16177c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 16187c478bd9Sstevel@tonic-gate 16197c478bd9Sstevel@tonic-gate mutex_enter(&fip->fi_lock); 16207c478bd9Sstevel@tonic-gate for (fd = 0; fd < fip->fi_nfiles; fd++) { 16217c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16227c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 16237c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16247c478bd9Sstevel@tonic-gate } 16257c478bd9Sstevel@tonic-gate mutex_exit(&fip->fi_lock); 16267c478bd9Sstevel@tonic-gate } 16277c478bd9Sstevel@tonic-gate 16287c478bd9Sstevel@tonic-gate /* 16297c478bd9Sstevel@tonic-gate * Return true (1) if the current thread is in the fpollinfo 16307c478bd9Sstevel@tonic-gate * list for this file descriptor, else false (0). 16317c478bd9Sstevel@tonic-gate * This is the same as curthread_in_plist(), 16327c478bd9Sstevel@tonic-gate * but is called w/o holding uf_lock. 16337c478bd9Sstevel@tonic-gate */ 16347c478bd9Sstevel@tonic-gate int 16357c478bd9Sstevel@tonic-gate infpollinfo(int fd) 16367c478bd9Sstevel@tonic-gate { 16377c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16387c478bd9Sstevel@tonic-gate uf_entry_t *ufp; 16397c478bd9Sstevel@tonic-gate int rc; 16407c478bd9Sstevel@tonic-gate 16417c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16427c478bd9Sstevel@tonic-gate rc = curthread_in_plist(ufp); 16437c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16447c478bd9Sstevel@tonic-gate return (rc); 16457c478bd9Sstevel@tonic-gate } 16467c478bd9Sstevel@tonic-gate 16477c478bd9Sstevel@tonic-gate #endif /* DEBUG */ 16487c478bd9Sstevel@tonic-gate 16497c478bd9Sstevel@tonic-gate /* 16507c478bd9Sstevel@tonic-gate * Add the curthread to fpollinfo list, meaning this fd is currently in the 16517c478bd9Sstevel@tonic-gate * thread's poll cache. Each lwp polling this file descriptor should call 16527c478bd9Sstevel@tonic-gate * this routine once. 16537c478bd9Sstevel@tonic-gate */ 16547c478bd9Sstevel@tonic-gate void 16557c478bd9Sstevel@tonic-gate addfpollinfo(int fd) 16567c478bd9Sstevel@tonic-gate { 16577c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 16587c478bd9Sstevel@tonic-gate fpollinfo_t *fpip; 16597c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16607c478bd9Sstevel@tonic-gate 16617c478bd9Sstevel@tonic-gate fpip = kmem_zalloc(sizeof (fpollinfo_t), KM_SLEEP); 16627c478bd9Sstevel@tonic-gate fpip->fp_thread = curthread; 16637c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16647c478bd9Sstevel@tonic-gate /* 16657c478bd9Sstevel@tonic-gate * Assert we are not already on the list, that is, that 16667c478bd9Sstevel@tonic-gate * this lwp did not call addfpollinfo twice for the same fd. 16677c478bd9Sstevel@tonic-gate */ 16687c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 16697c478bd9Sstevel@tonic-gate /* 16707c478bd9Sstevel@tonic-gate * addfpollinfo is always done inside the getf/releasef pair. 16717c478bd9Sstevel@tonic-gate */ 16727c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 16737c478bd9Sstevel@tonic-gate fpip->fp_next = ufp->uf_fpollinfo; 16747c478bd9Sstevel@tonic-gate ufp->uf_fpollinfo = fpip; 16757c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16767c478bd9Sstevel@tonic-gate } 16777c478bd9Sstevel@tonic-gate 16787c478bd9Sstevel@tonic-gate /* 16797c478bd9Sstevel@tonic-gate * delete curthread from fpollinfo list. 16807c478bd9Sstevel@tonic-gate */ 16817c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 16827c478bd9Sstevel@tonic-gate void 16837c478bd9Sstevel@tonic-gate delfpollinfo(int fd) 16847c478bd9Sstevel@tonic-gate { 16857c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 16867c478bd9Sstevel@tonic-gate struct fpollinfo *fpip; 16877c478bd9Sstevel@tonic-gate struct fpollinfo **fpipp; 16887c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 16897c478bd9Sstevel@tonic-gate 16907c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 16917c478bd9Sstevel@tonic-gate if (ufp->uf_fpollinfo == NULL) { 16927c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 16937c478bd9Sstevel@tonic-gate return; 16947c478bd9Sstevel@tonic-gate } 16957c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_busy); 16967c478bd9Sstevel@tonic-gate /* 16977c478bd9Sstevel@tonic-gate * Find and delete curthread from the list. 16987c478bd9Sstevel@tonic-gate */ 16997c478bd9Sstevel@tonic-gate fpipp = &ufp->uf_fpollinfo; 17007c478bd9Sstevel@tonic-gate while ((fpip = *fpipp)->fp_thread != curthread) 17017c478bd9Sstevel@tonic-gate fpipp = &fpip->fp_next; 17027c478bd9Sstevel@tonic-gate *fpipp = fpip->fp_next; 17037c478bd9Sstevel@tonic-gate kmem_free(fpip, sizeof (fpollinfo_t)); 17047c478bd9Sstevel@tonic-gate /* 17057c478bd9Sstevel@tonic-gate * Assert that we are not still on the list, that is, that 17067c478bd9Sstevel@tonic-gate * this lwp did not call addfpollinfo twice for the same fd. 17077c478bd9Sstevel@tonic-gate */ 17087c478bd9Sstevel@tonic-gate ASSERT(!curthread_in_plist(ufp)); 17097c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 17107c478bd9Sstevel@tonic-gate } 17117c478bd9Sstevel@tonic-gate 17127c478bd9Sstevel@tonic-gate /* 17137c478bd9Sstevel@tonic-gate * fd is associated with a port. pfd is a pointer to the fd entry in the 17147c478bd9Sstevel@tonic-gate * cache of the port. 17157c478bd9Sstevel@tonic-gate */ 17167c478bd9Sstevel@tonic-gate 17177c478bd9Sstevel@tonic-gate void 17187c478bd9Sstevel@tonic-gate addfd_port(int fd, portfd_t *pfd) 17197c478bd9Sstevel@tonic-gate { 17207c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 17217c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 17227c478bd9Sstevel@tonic-gate 17237c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 17247c478bd9Sstevel@tonic-gate /* 17257c478bd9Sstevel@tonic-gate * addfd_port is always done inside the getf/releasef pair. 17267c478bd9Sstevel@tonic-gate */ 17277c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 17287c478bd9Sstevel@tonic-gate if (ufp->uf_portfd == NULL) { 17297c478bd9Sstevel@tonic-gate /* first entry */ 17307c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd; 17317c478bd9Sstevel@tonic-gate pfd->pfd_next = NULL; 17327c478bd9Sstevel@tonic-gate } else { 17337c478bd9Sstevel@tonic-gate pfd->pfd_next = ufp->uf_portfd; 17347c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd; 17357c478bd9Sstevel@tonic-gate pfd->pfd_next->pfd_prev = pfd; 17367c478bd9Sstevel@tonic-gate } 17377c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 17387c478bd9Sstevel@tonic-gate } 17397c478bd9Sstevel@tonic-gate 17407c478bd9Sstevel@tonic-gate void 17417c478bd9Sstevel@tonic-gate delfd_port(int fd, portfd_t *pfd) 17427c478bd9Sstevel@tonic-gate { 17437c478bd9Sstevel@tonic-gate struct uf_entry *ufp; 17447c478bd9Sstevel@tonic-gate uf_info_t *fip = P_FINFO(curproc); 17457c478bd9Sstevel@tonic-gate 17467c478bd9Sstevel@tonic-gate UF_ENTER(ufp, fip, fd); 17477c478bd9Sstevel@tonic-gate /* 17487c478bd9Sstevel@tonic-gate * delfd_port is always done inside the getf/releasef pair. 17497c478bd9Sstevel@tonic-gate */ 17507c478bd9Sstevel@tonic-gate ASSERT(ufp->uf_refcnt >= 1); 17517c478bd9Sstevel@tonic-gate if (ufp->uf_portfd == pfd) { 17527c478bd9Sstevel@tonic-gate /* remove first entry */ 17537c478bd9Sstevel@tonic-gate ufp->uf_portfd = pfd->pfd_next; 17547c478bd9Sstevel@tonic-gate } else { 17557c478bd9Sstevel@tonic-gate pfd->pfd_prev->pfd_next = pfd->pfd_next; 17567c478bd9Sstevel@tonic-gate if (pfd->pfd_next != NULL) 17577c478bd9Sstevel@tonic-gate pfd->pfd_next->pfd_prev = pfd->pfd_prev; 17587c478bd9Sstevel@tonic-gate } 17597c478bd9Sstevel@tonic-gate UF_EXIT(ufp); 17607c478bd9Sstevel@tonic-gate } 17617c478bd9Sstevel@tonic-gate 17627c478bd9Sstevel@tonic-gate static void 176361b4b1efSpraks port_close_fd(portfd_t *pfd) 17647c478bd9Sstevel@tonic-gate { 17657c478bd9Sstevel@tonic-gate portfd_t *pfdn; 17667c478bd9Sstevel@tonic-gate 176761b4b1efSpraks /* 176861b4b1efSpraks * At this point, no other thread should access 176961b4b1efSpraks * the portfd_t list for this fd. The uf_file, uf_portfd 177061b4b1efSpraks * pointers in the uf_entry_t struct for this fd would 177161b4b1efSpraks * be set to NULL. 177261b4b1efSpraks */ 17737c478bd9Sstevel@tonic-gate for (; pfd != NULL; pfd = pfdn) { 17747c478bd9Sstevel@tonic-gate pfdn = pfd->pfd_next; 17757c478bd9Sstevel@tonic-gate port_close_pfd(pfd); 17767c478bd9Sstevel@tonic-gate } 17777c478bd9Sstevel@tonic-gate } 1778