2000-04-16 19:02:08 +00:00
|
|
|
/*-
|
2001-02-24 01:44:03 +00:00
|
|
|
* Copyright (c) 1999,2000,2001 Jonathan Lemon <jlemon@FreeBSD.org>
|
2000-04-16 19:02:08 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
2000-07-18 19:31:52 +00:00
|
|
|
* $FreeBSD$
|
2000-04-16 19:02:08 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/kernel.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
#include <sys/lock.h>
|
|
|
|
#include <sys/mutex.h>
|
2000-04-16 19:02:08 +00:00
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/unistd.h>
|
|
|
|
#include <sys/file.h>
|
|
|
|
#include <sys/fcntl.h>
|
2001-01-09 04:33:49 +00:00
|
|
|
#include <sys/selinfo.h>
|
2000-04-16 19:02:08 +00:00
|
|
|
#include <sys/queue.h>
|
|
|
|
#include <sys/event.h>
|
|
|
|
#include <sys/eventvar.h>
|
|
|
|
#include <sys/poll.h>
|
|
|
|
#include <sys/protosw.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/socketvar.h>
|
|
|
|
#include <sys/stat.h>
|
2001-09-29 17:48:39 +00:00
|
|
|
#include <sys/sysctl.h>
|
2000-04-16 19:02:08 +00:00
|
|
|
#include <sys/sysproto.h>
|
|
|
|
#include <sys/uio.h>
|
|
|
|
|
2002-03-20 04:09:59 +00:00
|
|
|
#include <vm/uma.h>
|
2000-04-16 19:02:08 +00:00
|
|
|
|
2001-09-29 17:48:39 +00:00
|
|
|
MALLOC_DEFINE(M_KQUEUE, "kqueue", "memory for kqueue system");
|
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
static int kqueue_scan(struct file *fp, int maxevents,
|
2000-07-28 22:32:25 +00:00
|
|
|
struct kevent *ulistp, const struct timespec *timeout,
|
2001-09-12 08:38:13 +00:00
|
|
|
struct thread *td);
|
2000-04-16 19:02:08 +00:00
|
|
|
static int kqueue_read(struct file *fp, struct uio *uio,
|
In order to better support flexible and extensible access control,
make a series of modifications to the credential arguments relating
to file read and write operations to cliarfy which credential is
used for what:
- Change fo_read() and fo_write() to accept "active_cred" instead of
"cred", and change the semantics of consumers of fo_read() and
fo_write() to pass the active credential of the thread requesting
an operation rather than the cached file cred. The cached file
cred is still available in fo_read() and fo_write() consumers
via fp->f_cred. These changes largely in sys_generic.c.
For each implementation of fo_read() and fo_write(), update cred
usage to reflect this change and maintain current semantics:
- badfo_readwrite() unchanged
- kqueue_read/write() unchanged
pipe_read/write() now authorize MAC using active_cred rather
than td->td_ucred
- soo_read/write() unchanged
- vn_read/write() now authorize MAC using active_cred but
VOP_READ/WRITE() with fp->f_cred
Modify vn_rdwr() to accept two credential arguments instead of a
single credential: active_cred and file_cred. Use active_cred
for MAC authorization, and select a credential for use in
VOP_READ/WRITE() based on whether file_cred is NULL or not. If
file_cred is provided, authorize the VOP using that cred,
otherwise the active credential, matching current semantics.
Modify current vn_rdwr() consumers to pass a file_cred if used
in the context of a struct file, and to always pass active_cred.
When vn_rdwr() is used without a file_cred, pass NOCRED.
These changes should maintain current semantics for read/write,
but avoid a redundant passing of fp->f_cred, as well as making
it more clear what the origin of each credential is in file
descriptor read/write operations.
Follow-up commits will make similar changes to other file descriptor
operations, and modify the MAC framework to pass both credentials
to MAC policy modules so they can implement either semantic for
revocation.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-15 20:55:08 +00:00
|
|
|
struct ucred *active_cred, int flags, struct thread *td);
|
2000-04-16 19:02:08 +00:00
|
|
|
static int kqueue_write(struct file *fp, struct uio *uio,
|
In order to better support flexible and extensible access control,
make a series of modifications to the credential arguments relating
to file read and write operations to cliarfy which credential is
used for what:
- Change fo_read() and fo_write() to accept "active_cred" instead of
"cred", and change the semantics of consumers of fo_read() and
fo_write() to pass the active credential of the thread requesting
an operation rather than the cached file cred. The cached file
cred is still available in fo_read() and fo_write() consumers
via fp->f_cred. These changes largely in sys_generic.c.
For each implementation of fo_read() and fo_write(), update cred
usage to reflect this change and maintain current semantics:
- badfo_readwrite() unchanged
- kqueue_read/write() unchanged
pipe_read/write() now authorize MAC using active_cred rather
than td->td_ucred
- soo_read/write() unchanged
- vn_read/write() now authorize MAC using active_cred but
VOP_READ/WRITE() with fp->f_cred
Modify vn_rdwr() to accept two credential arguments instead of a
single credential: active_cred and file_cred. Use active_cred
for MAC authorization, and select a credential for use in
VOP_READ/WRITE() based on whether file_cred is NULL or not. If
file_cred is provided, authorize the VOP using that cred,
otherwise the active credential, matching current semantics.
Modify current vn_rdwr() consumers to pass a file_cred if used
in the context of a struct file, and to always pass active_cred.
When vn_rdwr() is used without a file_cred, pass NOCRED.
These changes should maintain current semantics for read/write,
but avoid a redundant passing of fp->f_cred, as well as making
it more clear what the origin of each credential is in file
descriptor read/write operations.
Follow-up commits will make similar changes to other file descriptor
operations, and modify the MAC framework to pass both credentials
to MAC policy modules so they can implement either semantic for
revocation.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-15 20:55:08 +00:00
|
|
|
struct ucred *active_cred, int flags, struct thread *td);
|
2002-06-29 01:50:25 +00:00
|
|
|
static int kqueue_ioctl(struct file *fp, u_long com, void *data,
|
2002-08-17 02:36:16 +00:00
|
|
|
struct ucred *active_cred, struct thread *td);
|
Make similar changes to fo_stat() and fo_poll() as made earlier to
fo_read() and fo_write(): explicitly use the cred argument to fo_poll()
as "active_cred" using the passed file descriptor's f_cred reference
to provide access to the file credential. Add an active_cred
argument to fo_stat() so that implementers have access to the active
credential as well as the file credential. Generally modify callers
of fo_stat() to pass in td->td_ucred rather than fp->f_cred, which
was redundantly provided via the fp argument. This set of modifications
also permits threads to perform these operations on behalf of another
thread without modifying their credential.
Trickle this change down into fo_stat/poll() implementations:
- badfo_poll(), badfo_stat(): modify/add arguments.
- kqueue_poll(), kqueue_stat(): modify arguments.
- pipe_poll(), pipe_stat(): modify/add arguments, pass active_cred to
MAC checks rather than td->td_ucred.
- soo_poll(), soo_stat(): modify/add arguments, pass fp->f_cred rather
than cred to pru_sopoll() to maintain current semantics.
- sopoll(): moidfy arguments.
- vn_poll(), vn_statfile(): modify/add arguments, pass new arguments
to vn_stat(). Pass active_cred to MAC and fp->f_cred to VOP_POLL()
to maintian current semantics.
- vn_close(): rename cred to file_cred to reflect reality while I'm here.
- vn_stat(): Add active_cred and file_cred arguments to vn_stat()
and consumers so that this distinction is maintained at the VFS
as well as 'struct file' layer. Pass active_cred instead of
td->td_ucred to MAC and to VOP_GETATTR() to maintain current semantics.
- fifofs: modify the creation of a "filetemp" so that the file
credential is properly initialized and can be used in the socket
code if desired. Pass ap->a_td->td_ucred as the active
credential to soo_poll(). If we teach the vnop interface about
the distinction between file and active credentials, we would use
the active credential here.
Note that current inconsistent passing of active_cred vs. file_cred to
VOP's is maintained. It's not clear why GETATTR would be authorized
using active_cred while POLL would be authorized using file_cred at
the file system level.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-16 12:52:03 +00:00
|
|
|
static int kqueue_poll(struct file *fp, int events,
|
|
|
|
struct ucred *active_cred, struct thread *td);
|
2001-02-15 16:34:11 +00:00
|
|
|
static int kqueue_kqfilter(struct file *fp, struct knote *kn);
|
Make similar changes to fo_stat() and fo_poll() as made earlier to
fo_read() and fo_write(): explicitly use the cred argument to fo_poll()
as "active_cred" using the passed file descriptor's f_cred reference
to provide access to the file credential. Add an active_cred
argument to fo_stat() so that implementers have access to the active
credential as well as the file credential. Generally modify callers
of fo_stat() to pass in td->td_ucred rather than fp->f_cred, which
was redundantly provided via the fp argument. This set of modifications
also permits threads to perform these operations on behalf of another
thread without modifying their credential.
Trickle this change down into fo_stat/poll() implementations:
- badfo_poll(), badfo_stat(): modify/add arguments.
- kqueue_poll(), kqueue_stat(): modify arguments.
- pipe_poll(), pipe_stat(): modify/add arguments, pass active_cred to
MAC checks rather than td->td_ucred.
- soo_poll(), soo_stat(): modify/add arguments, pass fp->f_cred rather
than cred to pru_sopoll() to maintain current semantics.
- sopoll(): moidfy arguments.
- vn_poll(), vn_statfile(): modify/add arguments, pass new arguments
to vn_stat(). Pass active_cred to MAC and fp->f_cred to VOP_POLL()
to maintian current semantics.
- vn_close(): rename cred to file_cred to reflect reality while I'm here.
- vn_stat(): Add active_cred and file_cred arguments to vn_stat()
and consumers so that this distinction is maintained at the VFS
as well as 'struct file' layer. Pass active_cred instead of
td->td_ucred to MAC and to VOP_GETATTR() to maintain current semantics.
- fifofs: modify the creation of a "filetemp" so that the file
credential is properly initialized and can be used in the socket
code if desired. Pass ap->a_td->td_ucred as the active
credential to soo_poll(). If we teach the vnop interface about
the distinction between file and active credentials, we would use
the active credential here.
Note that current inconsistent passing of active_cred vs. file_cred to
VOP's is maintained. It's not clear why GETATTR would be authorized
using active_cred while POLL would be authorized using file_cred at
the file system level.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-16 12:52:03 +00:00
|
|
|
static int kqueue_stat(struct file *fp, struct stat *st,
|
|
|
|
struct ucred *active_cred, struct thread *td);
|
2001-09-12 08:38:13 +00:00
|
|
|
static int kqueue_close(struct file *fp, struct thread *td);
|
2000-04-16 19:02:08 +00:00
|
|
|
static void kqueue_wakeup(struct kqueue *kq);
|
|
|
|
|
2001-02-15 16:34:11 +00:00
|
|
|
static struct fileops kqueueops = {
|
|
|
|
kqueue_read,
|
|
|
|
kqueue_write,
|
|
|
|
kqueue_ioctl,
|
|
|
|
kqueue_poll,
|
|
|
|
kqueue_kqfilter,
|
|
|
|
kqueue_stat,
|
|
|
|
kqueue_close
|
|
|
|
};
|
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
static void knote_attach(struct knote *kn, struct filedesc *fdp);
|
2001-09-12 08:38:13 +00:00
|
|
|
static void knote_drop(struct knote *kn, struct thread *td);
|
2000-04-16 19:02:08 +00:00
|
|
|
static void knote_enqueue(struct knote *kn);
|
|
|
|
static void knote_dequeue(struct knote *kn);
|
|
|
|
static void knote_init(void);
|
|
|
|
static struct knote *knote_alloc(void);
|
|
|
|
static void knote_free(struct knote *kn);
|
|
|
|
|
2001-02-15 16:34:11 +00:00
|
|
|
static void filt_kqdetach(struct knote *kn);
|
|
|
|
static int filt_kqueue(struct knote *kn, long hint);
|
|
|
|
static int filt_procattach(struct knote *kn);
|
|
|
|
static void filt_procdetach(struct knote *kn);
|
|
|
|
static int filt_proc(struct knote *kn, long hint);
|
|
|
|
static int filt_fileattach(struct knote *kn);
|
2001-07-19 18:34:40 +00:00
|
|
|
static void filt_timerexpire(void *knx);
|
|
|
|
static int filt_timerattach(struct knote *kn);
|
|
|
|
static void filt_timerdetach(struct knote *kn);
|
|
|
|
static int filt_timer(struct knote *kn, long hint);
|
2001-02-15 16:34:11 +00:00
|
|
|
|
2001-07-19 18:34:40 +00:00
|
|
|
static struct filterops file_filtops =
|
|
|
|
{ 1, filt_fileattach, NULL, NULL };
|
2001-02-15 16:34:11 +00:00
|
|
|
static struct filterops kqread_filtops =
|
|
|
|
{ 1, NULL, filt_kqdetach, filt_kqueue };
|
|
|
|
static struct filterops proc_filtops =
|
|
|
|
{ 0, filt_procattach, filt_procdetach, filt_proc };
|
2001-07-19 18:34:40 +00:00
|
|
|
static struct filterops timer_filtops =
|
|
|
|
{ 0, filt_timerattach, filt_timerdetach, filt_timer };
|
2001-02-15 16:34:11 +00:00
|
|
|
|
2002-03-20 04:09:59 +00:00
|
|
|
static uma_zone_t knote_zone;
|
2001-09-29 17:48:39 +00:00
|
|
|
static int kq_ncallouts = 0;
|
|
|
|
static int kq_calloutmax = (4 * 1024);
|
|
|
|
SYSCTL_INT(_kern, OID_AUTO, kq_calloutmax, CTLFLAG_RW,
|
|
|
|
&kq_calloutmax, 0, "Maximum number of callouts allocated for kqueue");
|
2000-04-16 19:02:08 +00:00
|
|
|
|
|
|
|
#define KNOTE_ACTIVATE(kn) do { \
|
|
|
|
kn->kn_status |= KN_ACTIVE; \
|
|
|
|
if ((kn->kn_status & (KN_QUEUED | KN_DISABLED)) == 0) \
|
|
|
|
knote_enqueue(kn); \
|
|
|
|
} while(0)
|
|
|
|
|
|
|
|
#define KN_HASHSIZE 64 /* XXX should be tunable */
|
|
|
|
#define KN_HASH(val, mask) (((val) ^ (val >> 8)) & (mask))
|
|
|
|
|
2001-12-29 07:13:47 +00:00
|
|
|
static int
|
|
|
|
filt_nullattach(struct knote *kn)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (ENXIO);
|
|
|
|
};
|
|
|
|
|
|
|
|
struct filterops null_filtops =
|
|
|
|
{ 0, filt_nullattach, NULL, NULL };
|
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
extern struct filterops sig_filtops;
|
|
|
|
|
|
|
|
/*
|
2001-02-15 16:34:11 +00:00
|
|
|
* Table for for all system-defined filters.
|
2000-04-16 19:02:08 +00:00
|
|
|
*/
|
|
|
|
static struct filterops *sysfilt_ops[] = {
|
2001-02-15 16:34:11 +00:00
|
|
|
&file_filtops, /* EVFILT_READ */
|
|
|
|
&file_filtops, /* EVFILT_WRITE */
|
2001-12-29 07:13:47 +00:00
|
|
|
&null_filtops, /* EVFILT_AIO */
|
2001-02-15 16:34:11 +00:00
|
|
|
&file_filtops, /* EVFILT_VNODE */
|
2000-04-16 19:02:08 +00:00
|
|
|
&proc_filtops, /* EVFILT_PROC */
|
|
|
|
&sig_filtops, /* EVFILT_SIGNAL */
|
2001-07-19 18:34:40 +00:00
|
|
|
&timer_filtops, /* EVFILT_TIMER */
|
2002-01-24 17:20:55 +00:00
|
|
|
&file_filtops, /* EVFILT_NETDEV */
|
2000-04-16 19:02:08 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2001-02-15 16:34:11 +00:00
|
|
|
filt_fileattach(struct knote *kn)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
2001-02-15 16:34:11 +00:00
|
|
|
|
|
|
|
return (fo_kqfilter(kn->kn_fp, kn));
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
|
2001-02-15 16:34:11 +00:00
|
|
|
/*ARGSUSED*/
|
2000-04-16 19:02:08 +00:00
|
|
|
static int
|
2001-02-15 16:34:11 +00:00
|
|
|
kqueue_kqfilter(struct file *fp, struct knote *kn)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
|
|
|
struct kqueue *kq = (struct kqueue *)kn->kn_fp->f_data;
|
|
|
|
|
2001-02-15 16:34:11 +00:00
|
|
|
if (kn->kn_filter != EVFILT_READ)
|
|
|
|
return (1);
|
|
|
|
|
|
|
|
kn->kn_fop = &kqread_filtops;
|
2000-04-16 19:02:08 +00:00
|
|
|
SLIST_INSERT_HEAD(&kq->kq_sel.si_note, kn, kn_selnext);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
filt_kqdetach(struct knote *kn)
|
|
|
|
{
|
|
|
|
struct kqueue *kq = (struct kqueue *)kn->kn_fp->f_data;
|
|
|
|
|
2000-05-26 02:09:24 +00:00
|
|
|
SLIST_REMOVE(&kq->kq_sel.si_note, kn, knote, kn_selnext);
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
|
|
|
filt_kqueue(struct knote *kn, long hint)
|
|
|
|
{
|
|
|
|
struct kqueue *kq = (struct kqueue *)kn->kn_fp->f_data;
|
|
|
|
|
|
|
|
kn->kn_data = kq->kq_count;
|
|
|
|
return (kn->kn_data > 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
filt_procattach(struct knote *kn)
|
|
|
|
{
|
|
|
|
struct proc *p;
|
2001-04-12 21:32:02 +00:00
|
|
|
int error;
|
2000-04-16 19:02:08 +00:00
|
|
|
|
|
|
|
p = pfind(kn->kn_id);
|
|
|
|
if (p == NULL)
|
|
|
|
return (ESRCH);
|
2002-05-19 00:14:50 +00:00
|
|
|
if ((error = p_cansee(curthread, p))) {
|
2001-04-24 00:51:53 +00:00
|
|
|
PROC_UNLOCK(p);
|
2001-04-12 21:32:02 +00:00
|
|
|
return (error);
|
2001-04-24 00:51:53 +00:00
|
|
|
}
|
2000-04-16 19:02:08 +00:00
|
|
|
|
|
|
|
kn->kn_ptr.p_proc = p;
|
|
|
|
kn->kn_flags |= EV_CLEAR; /* automatically set */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* internal flag indicating registration done by kernel
|
|
|
|
*/
|
|
|
|
if (kn->kn_flags & EV_FLAG1) {
|
|
|
|
kn->kn_data = kn->kn_sdata; /* ppid */
|
|
|
|
kn->kn_fflags = NOTE_CHILD;
|
|
|
|
kn->kn_flags &= ~EV_FLAG1;
|
|
|
|
}
|
|
|
|
|
|
|
|
SLIST_INSERT_HEAD(&p->p_klist, kn, kn_selnext);
|
2001-01-24 00:35:12 +00:00
|
|
|
PROC_UNLOCK(p);
|
2000-04-16 19:02:08 +00:00
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The knote may be attached to a different process, which may exit,
|
|
|
|
* leaving nothing for the knote to be attached to. So when the process
|
|
|
|
* exits, the knote is marked as DETACHED and also flagged as ONESHOT so
|
|
|
|
* it will be deleted when read out. However, as part of the knote deletion,
|
|
|
|
* this routine is called, so a check is needed to avoid actually performing
|
|
|
|
* a detach, because the original process does not exist any more.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
filt_procdetach(struct knote *kn)
|
|
|
|
{
|
|
|
|
struct proc *p = kn->kn_ptr.p_proc;
|
|
|
|
|
|
|
|
if (kn->kn_status & KN_DETACHED)
|
|
|
|
return;
|
|
|
|
|
2001-01-24 00:35:12 +00:00
|
|
|
PROC_LOCK(p);
|
2000-05-26 02:09:24 +00:00
|
|
|
SLIST_REMOVE(&p->p_klist, kn, knote, kn_selnext);
|
2001-01-24 00:35:12 +00:00
|
|
|
PROC_UNLOCK(p);
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
filt_proc(struct knote *kn, long hint)
|
|
|
|
{
|
|
|
|
u_int event;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* mask off extra data
|
|
|
|
*/
|
|
|
|
event = (u_int)hint & NOTE_PCTRLMASK;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if the user is interested in this event, record it.
|
|
|
|
*/
|
|
|
|
if (kn->kn_sfflags & event)
|
|
|
|
kn->kn_fflags |= event;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* process is gone, so flag the event as finished.
|
|
|
|
*/
|
|
|
|
if (event == NOTE_EXIT) {
|
|
|
|
kn->kn_status |= KN_DETACHED;
|
|
|
|
kn->kn_flags |= (EV_EOF | EV_ONESHOT);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* process forked, and user wants to track the new process,
|
|
|
|
* so attach a new knote to it, and immediately report an
|
|
|
|
* event with the parent's pid.
|
|
|
|
*/
|
|
|
|
if ((event == NOTE_FORK) && (kn->kn_sfflags & NOTE_TRACK)) {
|
|
|
|
struct kevent kev;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* register knote with new process.
|
|
|
|
*/
|
|
|
|
kev.ident = hint & NOTE_PDATAMASK; /* pid */
|
|
|
|
kev.filter = kn->kn_filter;
|
|
|
|
kev.flags = kn->kn_flags | EV_ADD | EV_ENABLE | EV_FLAG1;
|
|
|
|
kev.fflags = kn->kn_sfflags;
|
|
|
|
kev.data = kn->kn_id; /* parent */
|
2000-06-22 18:39:31 +00:00
|
|
|
kev.udata = kn->kn_kevent.udata; /* preserve udata */
|
2000-04-16 19:02:08 +00:00
|
|
|
error = kqueue_register(kn->kn_kq, &kev, NULL);
|
|
|
|
if (error)
|
|
|
|
kn->kn_fflags |= NOTE_TRACKERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (kn->kn_fflags != 0);
|
|
|
|
}
|
|
|
|
|
2001-07-19 18:34:40 +00:00
|
|
|
static void
|
|
|
|
filt_timerexpire(void *knx)
|
|
|
|
{
|
|
|
|
struct knote *kn = knx;
|
2001-09-29 17:48:39 +00:00
|
|
|
struct callout *calloutp;
|
2001-07-19 18:34:40 +00:00
|
|
|
struct timeval tv;
|
|
|
|
int tticks;
|
|
|
|
|
|
|
|
kn->kn_data++;
|
|
|
|
KNOTE_ACTIVATE(kn);
|
|
|
|
|
|
|
|
if ((kn->kn_flags & EV_ONESHOT) == 0) {
|
|
|
|
tv.tv_sec = kn->kn_sdata / 1000;
|
|
|
|
tv.tv_usec = (kn->kn_sdata % 1000) * 1000;
|
|
|
|
tticks = tvtohz(&tv);
|
2001-09-29 17:48:39 +00:00
|
|
|
calloutp = (struct callout *)kn->kn_hook;
|
|
|
|
callout_reset(calloutp, tticks, filt_timerexpire, kn);
|
2001-07-19 18:34:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* data contains amount of time to sleep, in milliseconds
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
filt_timerattach(struct knote *kn)
|
|
|
|
{
|
2001-09-29 17:48:39 +00:00
|
|
|
struct callout *calloutp;
|
2001-07-19 18:34:40 +00:00
|
|
|
struct timeval tv;
|
|
|
|
int tticks;
|
|
|
|
|
2001-09-29 17:48:39 +00:00
|
|
|
if (kq_ncallouts >= kq_calloutmax)
|
|
|
|
return (ENOMEM);
|
|
|
|
kq_ncallouts++;
|
|
|
|
|
2001-07-19 18:34:40 +00:00
|
|
|
tv.tv_sec = kn->kn_sdata / 1000;
|
|
|
|
tv.tv_usec = (kn->kn_sdata % 1000) * 1000;
|
|
|
|
tticks = tvtohz(&tv);
|
|
|
|
|
|
|
|
kn->kn_flags |= EV_CLEAR; /* automatically set */
|
2001-09-29 17:48:39 +00:00
|
|
|
MALLOC(calloutp, struct callout *, sizeof(*calloutp),
|
|
|
|
M_KQUEUE, M_WAITOK);
|
|
|
|
callout_init(calloutp, 0);
|
|
|
|
callout_reset(calloutp, tticks, filt_timerexpire, kn);
|
2002-06-29 00:29:12 +00:00
|
|
|
kn->kn_hook = calloutp;
|
2001-07-19 18:34:40 +00:00
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
filt_timerdetach(struct knote *kn)
|
|
|
|
{
|
2001-09-29 17:48:39 +00:00
|
|
|
struct callout *calloutp;
|
2001-07-19 18:34:40 +00:00
|
|
|
|
2001-09-29 17:48:39 +00:00
|
|
|
calloutp = (struct callout *)kn->kn_hook;
|
|
|
|
callout_stop(calloutp);
|
|
|
|
FREE(calloutp, M_KQUEUE);
|
|
|
|
kq_ncallouts--;
|
2001-07-19 18:34:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
filt_timer(struct knote *kn, long hint)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (kn->kn_data != 0);
|
|
|
|
}
|
|
|
|
|
2001-09-01 03:04:31 +00:00
|
|
|
/*
|
|
|
|
* MPSAFE
|
|
|
|
*/
|
2000-06-10 01:51:18 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
kqueue(struct thread *td, struct kqueue_args *uap)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
2001-09-01 03:04:31 +00:00
|
|
|
struct filedesc *fdp;
|
2000-04-16 19:02:08 +00:00
|
|
|
struct kqueue *kq;
|
2000-06-10 01:51:18 +00:00
|
|
|
struct file *fp;
|
|
|
|
int fd, error;
|
|
|
|
|
2001-09-01 03:04:31 +00:00
|
|
|
mtx_lock(&Giant);
|
2001-09-12 08:38:13 +00:00
|
|
|
fdp = td->td_proc->p_fd;
|
|
|
|
error = falloc(td, &fp, &fd);
|
2000-06-10 01:51:18 +00:00
|
|
|
if (error)
|
2001-09-01 03:04:31 +00:00
|
|
|
goto done2;
|
2002-01-13 11:58:06 +00:00
|
|
|
kq = malloc(sizeof(struct kqueue), M_KQUEUE, M_WAITOK | M_ZERO);
|
|
|
|
TAILQ_INIT(&kq->kq_head);
|
|
|
|
FILE_LOCK(fp);
|
2000-06-10 01:51:18 +00:00
|
|
|
fp->f_flag = FREAD | FWRITE;
|
|
|
|
fp->f_type = DTYPE_KQUEUE;
|
|
|
|
fp->f_ops = &kqueueops;
|
2000-04-16 19:02:08 +00:00
|
|
|
TAILQ_INIT(&kq->kq_head);
|
2002-06-29 00:29:12 +00:00
|
|
|
fp->f_data = kq;
|
2002-01-13 11:58:06 +00:00
|
|
|
FILE_UNLOCK(fp);
|
|
|
|
FILEDESC_LOCK(fdp);
|
2001-09-12 08:38:13 +00:00
|
|
|
td->td_retval[0] = fd;
|
2000-07-18 21:41:47 +00:00
|
|
|
if (fdp->fd_knlistsize < 0)
|
|
|
|
fdp->fd_knlistsize = 0; /* this process has a kq */
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_UNLOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
kq->kq_fdp = fdp;
|
2001-09-01 03:04:31 +00:00
|
|
|
done2:
|
|
|
|
mtx_unlock(&Giant);
|
2000-06-10 01:51:18 +00:00
|
|
|
return (error);
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
|
|
|
struct kevent_args {
|
|
|
|
int fd;
|
2000-07-28 22:32:25 +00:00
|
|
|
const struct kevent *changelist;
|
2000-04-16 19:02:08 +00:00
|
|
|
int nchanges;
|
|
|
|
struct kevent *eventlist;
|
2000-07-18 19:31:52 +00:00
|
|
|
int nevents;
|
2000-07-28 22:32:25 +00:00
|
|
|
const struct timespec *timeout;
|
2000-04-16 19:02:08 +00:00
|
|
|
};
|
|
|
|
#endif
|
2001-09-01 03:04:31 +00:00
|
|
|
/*
|
|
|
|
* MPSAFE
|
|
|
|
*/
|
2000-04-16 19:02:08 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
kevent(struct thread *td, struct kevent_args *uap)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
2000-07-18 19:31:52 +00:00
|
|
|
struct kevent *kevp;
|
2000-04-16 19:02:08 +00:00
|
|
|
struct kqueue *kq;
|
2001-11-14 06:30:36 +00:00
|
|
|
struct file *fp;
|
2000-04-16 19:02:08 +00:00
|
|
|
struct timespec ts;
|
|
|
|
int i, n, nerrors, error;
|
|
|
|
|
2002-01-14 00:13:45 +00:00
|
|
|
if ((error = fget(td, uap->fd, &fp)) != 0)
|
|
|
|
return (error);
|
|
|
|
if (fp->f_type != DTYPE_KQUEUE) {
|
|
|
|
fdrop(fp, td);
|
2002-01-13 11:58:06 +00:00
|
|
|
return (EBADF);
|
2001-09-01 03:04:31 +00:00
|
|
|
}
|
2000-04-16 19:02:08 +00:00
|
|
|
if (uap->timeout != NULL) {
|
2000-07-18 19:31:52 +00:00
|
|
|
error = copyin(uap->timeout, &ts, sizeof(ts));
|
2000-04-16 19:02:08 +00:00
|
|
|
if (error)
|
2002-01-13 11:58:06 +00:00
|
|
|
goto done_nogiant;
|
2000-04-16 19:02:08 +00:00
|
|
|
uap->timeout = &ts;
|
|
|
|
}
|
2002-01-13 11:58:06 +00:00
|
|
|
mtx_lock(&Giant);
|
2000-04-16 19:02:08 +00:00
|
|
|
|
|
|
|
kq = (struct kqueue *)fp->f_data;
|
|
|
|
nerrors = 0;
|
|
|
|
|
|
|
|
while (uap->nchanges > 0) {
|
|
|
|
n = uap->nchanges > KQ_NEVENTS ? KQ_NEVENTS : uap->nchanges;
|
2000-07-18 19:31:52 +00:00
|
|
|
error = copyin(uap->changelist, kq->kq_kev,
|
|
|
|
n * sizeof(struct kevent));
|
2000-04-16 19:02:08 +00:00
|
|
|
if (error)
|
2000-11-18 21:01:04 +00:00
|
|
|
goto done;
|
2000-04-16 19:02:08 +00:00
|
|
|
for (i = 0; i < n; i++) {
|
2000-07-18 19:31:52 +00:00
|
|
|
kevp = &kq->kq_kev[i];
|
|
|
|
kevp->flags &= ~EV_SYSFLAGS;
|
2001-09-12 08:38:13 +00:00
|
|
|
error = kqueue_register(kq, kevp, td);
|
2000-04-16 19:02:08 +00:00
|
|
|
if (error) {
|
|
|
|
if (uap->nevents != 0) {
|
2000-07-18 19:31:52 +00:00
|
|
|
kevp->flags = EV_ERROR;
|
|
|
|
kevp->data = error;
|
2002-06-29 00:29:12 +00:00
|
|
|
(void) copyout(kevp,
|
|
|
|
uap->eventlist,
|
2000-07-18 19:31:52 +00:00
|
|
|
sizeof(*kevp));
|
2000-04-16 19:02:08 +00:00
|
|
|
uap->eventlist++;
|
|
|
|
uap->nevents--;
|
|
|
|
nerrors++;
|
|
|
|
} else {
|
2000-11-18 21:01:04 +00:00
|
|
|
goto done;
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
uap->nchanges -= n;
|
|
|
|
uap->changelist += n;
|
|
|
|
}
|
|
|
|
if (nerrors) {
|
2001-09-12 08:38:13 +00:00
|
|
|
td->td_retval[0] = nerrors;
|
2000-11-18 21:01:04 +00:00
|
|
|
error = 0;
|
|
|
|
goto done;
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
error = kqueue_scan(fp, uap->nevents, uap->eventlist, uap->timeout, td);
|
2000-11-18 21:01:04 +00:00
|
|
|
done:
|
2002-01-13 11:58:06 +00:00
|
|
|
mtx_unlock(&Giant);
|
|
|
|
done_nogiant:
|
2000-11-18 21:01:04 +00:00
|
|
|
if (fp != NULL)
|
2001-09-12 08:38:13 +00:00
|
|
|
fdrop(fp, td);
|
2000-04-16 19:02:08 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2001-12-29 07:13:47 +00:00
|
|
|
int
|
|
|
|
kqueue_add_filteropts(int filt, struct filterops *filtops)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (filt > 0)
|
|
|
|
panic("filt(%d) > 0", filt);
|
|
|
|
if (filt + EVFILT_SYSCOUNT < 0)
|
|
|
|
panic("filt(%d) + EVFILT_SYSCOUNT(%d) == %d < 0",
|
|
|
|
filt, EVFILT_SYSCOUNT, filt + EVFILT_SYSCOUNT);
|
|
|
|
if (sysfilt_ops[~filt] != &null_filtops)
|
|
|
|
panic("sysfilt_ops[~filt(%d)] != &null_filtops", filt);
|
|
|
|
sysfilt_ops[~filt] = filtops;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
kqueue_del_filteropts(int filt)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (filt > 0)
|
|
|
|
panic("filt(%d) > 0", filt);
|
|
|
|
if (filt + EVFILT_SYSCOUNT < 0)
|
|
|
|
panic("filt(%d) + EVFILT_SYSCOUNT(%d) == %d < 0",
|
|
|
|
filt, EVFILT_SYSCOUNT, filt + EVFILT_SYSCOUNT);
|
|
|
|
if (sysfilt_ops[~filt] == &null_filtops)
|
|
|
|
panic("sysfilt_ops[~filt(%d)] != &null_filtops", filt);
|
|
|
|
sysfilt_ops[~filt] = &null_filtops;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
kqueue_register(struct kqueue *kq, struct kevent *kev, struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
|
|
|
struct filedesc *fdp = kq->kq_fdp;
|
|
|
|
struct filterops *fops;
|
|
|
|
struct file *fp = NULL;
|
|
|
|
struct knote *kn = NULL;
|
|
|
|
int s, error = 0;
|
|
|
|
|
|
|
|
if (kev->filter < 0) {
|
|
|
|
if (kev->filter + EVFILT_SYSCOUNT < 0)
|
|
|
|
return (EINVAL);
|
|
|
|
fops = sysfilt_ops[~kev->filter]; /* to 0-base index */
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* XXX
|
|
|
|
* filter attach routine is responsible for insuring that
|
|
|
|
* the identifier can be attached to it.
|
|
|
|
*/
|
|
|
|
printf("unknown filter: %d\n", kev->filter);
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_LOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
if (fops->f_isfd) {
|
2000-08-07 16:45:42 +00:00
|
|
|
/* validate descriptor */
|
2000-04-16 19:02:08 +00:00
|
|
|
if ((u_int)kev->ident >= fdp->fd_nfiles ||
|
2002-01-13 11:58:06 +00:00
|
|
|
(fp = fdp->fd_ofiles[kev->ident]) == NULL) {
|
|
|
|
FILEDESC_UNLOCK(fdp);
|
2000-08-07 16:45:42 +00:00
|
|
|
return (EBADF);
|
2002-01-13 11:58:06 +00:00
|
|
|
}
|
2000-11-18 21:01:04 +00:00
|
|
|
fhold(fp);
|
2000-04-16 19:02:08 +00:00
|
|
|
|
|
|
|
if (kev->ident < fdp->fd_knlistsize) {
|
|
|
|
SLIST_FOREACH(kn, &fdp->fd_knlist[kev->ident], kn_link)
|
|
|
|
if (kq == kn->kn_kq &&
|
|
|
|
kev->filter == kn->kn_filter)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (fdp->fd_knhashmask != 0) {
|
|
|
|
struct klist *list;
|
|
|
|
|
|
|
|
list = &fdp->fd_knhash[
|
|
|
|
KN_HASH((u_long)kev->ident, fdp->fd_knhashmask)];
|
|
|
|
SLIST_FOREACH(kn, list, kn_link)
|
|
|
|
if (kev->ident == kn->kn_id &&
|
|
|
|
kq == kn->kn_kq &&
|
|
|
|
kev->filter == kn->kn_filter)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_UNLOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
|
2000-11-18 21:01:04 +00:00
|
|
|
if (kn == NULL && ((kev->flags & EV_ADD) == 0)) {
|
|
|
|
error = ENOENT;
|
|
|
|
goto done;
|
|
|
|
}
|
2000-04-16 19:02:08 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* kn now contains the matching knote, or NULL if no match
|
|
|
|
*/
|
|
|
|
if (kev->flags & EV_ADD) {
|
|
|
|
|
|
|
|
if (kn == NULL) {
|
|
|
|
kn = knote_alloc();
|
2000-11-18 21:01:04 +00:00
|
|
|
if (kn == NULL) {
|
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
|
|
|
}
|
2000-04-16 19:02:08 +00:00
|
|
|
kn->kn_fp = fp;
|
|
|
|
kn->kn_kq = kq;
|
|
|
|
kn->kn_fop = fops;
|
|
|
|
|
2000-11-18 21:01:04 +00:00
|
|
|
/*
|
2001-02-23 20:32:42 +00:00
|
|
|
* apply reference count to knote structure, and
|
2000-11-18 21:01:04 +00:00
|
|
|
* do not release it at the end of this routine.
|
|
|
|
*/
|
|
|
|
fp = NULL;
|
|
|
|
|
2000-06-22 18:39:31 +00:00
|
|
|
kn->kn_sfflags = kev->fflags;
|
|
|
|
kn->kn_sdata = kev->data;
|
|
|
|
kev->fflags = 0;
|
|
|
|
kev->data = 0;
|
|
|
|
kn->kn_kevent = *kev;
|
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
knote_attach(kn, fdp);
|
|
|
|
if ((error = fops->f_attach(kn)) != 0) {
|
2001-09-12 08:38:13 +00:00
|
|
|
knote_drop(kn, td);
|
2000-04-16 19:02:08 +00:00
|
|
|
goto done;
|
|
|
|
}
|
2000-06-22 18:39:31 +00:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* The user may change some filter values after the
|
|
|
|
* initial EV_ADD, but doing so will not reset any
|
|
|
|
* filter which have already been triggered.
|
|
|
|
*/
|
|
|
|
kn->kn_sfflags = kev->fflags;
|
|
|
|
kn->kn_sdata = kev->data;
|
|
|
|
kn->kn_kevent.udata = kev->udata;
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
2000-06-22 18:39:31 +00:00
|
|
|
|
2000-05-04 20:19:17 +00:00
|
|
|
s = splhigh();
|
2000-04-16 19:02:08 +00:00
|
|
|
if (kn->kn_fop->f_event(kn, 0))
|
|
|
|
KNOTE_ACTIVATE(kn);
|
2000-05-04 20:19:17 +00:00
|
|
|
splx(s);
|
2000-06-22 18:39:31 +00:00
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
} else if (kev->flags & EV_DELETE) {
|
|
|
|
kn->kn_fop->f_detach(kn);
|
2001-09-12 08:38:13 +00:00
|
|
|
knote_drop(kn, td);
|
2000-04-16 19:02:08 +00:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((kev->flags & EV_DISABLE) &&
|
|
|
|
((kn->kn_status & KN_DISABLED) == 0)) {
|
|
|
|
s = splhigh();
|
|
|
|
kn->kn_status |= KN_DISABLED;
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((kev->flags & EV_ENABLE) && (kn->kn_status & KN_DISABLED)) {
|
|
|
|
s = splhigh();
|
|
|
|
kn->kn_status &= ~KN_DISABLED;
|
|
|
|
if ((kn->kn_status & KN_ACTIVE) &&
|
|
|
|
((kn->kn_status & KN_QUEUED) == 0))
|
|
|
|
knote_enqueue(kn);
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
2000-11-18 21:01:04 +00:00
|
|
|
if (fp != NULL)
|
2001-09-12 08:38:13 +00:00
|
|
|
fdrop(fp, td);
|
2000-04-16 19:02:08 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
kqueue_scan(struct file *fp, int maxevents, struct kevent *ulistp,
|
2001-09-12 08:38:13 +00:00
|
|
|
const struct timespec *tsp, struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
2002-01-13 11:58:06 +00:00
|
|
|
struct kqueue *kq;
|
2000-04-16 19:02:08 +00:00
|
|
|
struct kevent *kevp;
|
|
|
|
struct timeval atv, rtv, ttv;
|
|
|
|
struct knote *kn, marker;
|
|
|
|
int s, count, timeout, nkev = 0, error = 0;
|
|
|
|
|
2002-01-13 11:58:06 +00:00
|
|
|
FILE_LOCK_ASSERT(fp, MA_NOTOWNED);
|
|
|
|
|
|
|
|
kq = (struct kqueue *)fp->f_data;
|
2000-04-16 19:02:08 +00:00
|
|
|
count = maxevents;
|
|
|
|
if (count == 0)
|
|
|
|
goto done;
|
|
|
|
|
2000-08-07 16:45:42 +00:00
|
|
|
if (tsp != NULL) {
|
2000-04-16 19:02:08 +00:00
|
|
|
TIMESPEC_TO_TIMEVAL(&atv, tsp);
|
2000-08-07 16:45:42 +00:00
|
|
|
if (itimerfix(&atv)) {
|
2000-04-16 19:02:08 +00:00
|
|
|
error = EINVAL;
|
|
|
|
goto done;
|
|
|
|
}
|
2000-08-07 16:45:42 +00:00
|
|
|
if (tsp->tv_sec == 0 && tsp->tv_nsec == 0)
|
|
|
|
timeout = -1;
|
|
|
|
else
|
|
|
|
timeout = atv.tv_sec > 24 * 60 * 60 ?
|
|
|
|
24 * 60 * 60 * hz : tvtohz(&atv);
|
|
|
|
getmicrouptime(&rtv);
|
|
|
|
timevaladd(&atv, &rtv);
|
|
|
|
} else {
|
|
|
|
atv.tv_sec = 0;
|
|
|
|
atv.tv_usec = 0;
|
2000-04-16 19:02:08 +00:00
|
|
|
timeout = 0;
|
|
|
|
}
|
|
|
|
goto start;
|
|
|
|
|
|
|
|
retry:
|
2000-08-07 16:45:42 +00:00
|
|
|
if (atv.tv_sec || atv.tv_usec) {
|
2000-04-16 19:02:08 +00:00
|
|
|
getmicrouptime(&rtv);
|
|
|
|
if (timevalcmp(&rtv, &atv, >=))
|
|
|
|
goto done;
|
|
|
|
ttv = atv;
|
|
|
|
timevalsub(&ttv, &rtv);
|
|
|
|
timeout = ttv.tv_sec > 24 * 60 * 60 ?
|
|
|
|
24 * 60 * 60 * hz : tvtohz(&ttv);
|
|
|
|
}
|
|
|
|
|
|
|
|
start:
|
|
|
|
kevp = kq->kq_kev;
|
|
|
|
s = splhigh();
|
|
|
|
if (kq->kq_count == 0) {
|
2000-08-07 16:45:42 +00:00
|
|
|
if (timeout < 0) {
|
|
|
|
error = EWOULDBLOCK;
|
|
|
|
} else {
|
|
|
|
kq->kq_state |= KQ_SLEEP;
|
|
|
|
error = tsleep(kq, PSOCK | PCATCH, "kqread", timeout);
|
|
|
|
}
|
2000-04-16 19:02:08 +00:00
|
|
|
splx(s);
|
2000-08-01 04:27:50 +00:00
|
|
|
if (error == 0)
|
2000-04-16 19:02:08 +00:00
|
|
|
goto retry;
|
2000-08-01 04:27:50 +00:00
|
|
|
/* don't restart after signals... */
|
|
|
|
if (error == ERESTART)
|
|
|
|
error = EINTR;
|
|
|
|
else if (error == EWOULDBLOCK)
|
2000-04-16 19:02:08 +00:00
|
|
|
error = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
TAILQ_INSERT_TAIL(&kq->kq_head, &marker, kn_tqe);
|
|
|
|
while (count) {
|
|
|
|
kn = TAILQ_FIRST(&kq->kq_head);
|
|
|
|
TAILQ_REMOVE(&kq->kq_head, kn, kn_tqe);
|
|
|
|
if (kn == &marker) {
|
|
|
|
splx(s);
|
|
|
|
if (count == maxevents)
|
|
|
|
goto retry;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
if (kn->kn_status & KN_DISABLED) {
|
|
|
|
kn->kn_status &= ~KN_QUEUED;
|
|
|
|
kq->kq_count--;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if ((kn->kn_flags & EV_ONESHOT) == 0 &&
|
|
|
|
kn->kn_fop->f_event(kn, 0) == 0) {
|
|
|
|
kn->kn_status &= ~(KN_QUEUED | KN_ACTIVE);
|
|
|
|
kq->kq_count--;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
*kevp = kn->kn_kevent;
|
|
|
|
kevp++;
|
|
|
|
nkev++;
|
|
|
|
if (kn->kn_flags & EV_ONESHOT) {
|
|
|
|
kn->kn_status &= ~KN_QUEUED;
|
|
|
|
kq->kq_count--;
|
|
|
|
splx(s);
|
|
|
|
kn->kn_fop->f_detach(kn);
|
2001-09-12 08:38:13 +00:00
|
|
|
knote_drop(kn, td);
|
2000-04-16 19:02:08 +00:00
|
|
|
s = splhigh();
|
|
|
|
} else if (kn->kn_flags & EV_CLEAR) {
|
|
|
|
kn->kn_data = 0;
|
|
|
|
kn->kn_fflags = 0;
|
|
|
|
kn->kn_status &= ~(KN_QUEUED | KN_ACTIVE);
|
|
|
|
kq->kq_count--;
|
|
|
|
} else {
|
|
|
|
TAILQ_INSERT_TAIL(&kq->kq_head, kn, kn_tqe);
|
|
|
|
}
|
|
|
|
count--;
|
|
|
|
if (nkev == KQ_NEVENTS) {
|
|
|
|
splx(s);
|
2002-06-29 00:29:12 +00:00
|
|
|
error = copyout(&kq->kq_kev, ulistp,
|
2000-04-16 19:02:08 +00:00
|
|
|
sizeof(struct kevent) * nkev);
|
|
|
|
ulistp += nkev;
|
|
|
|
nkev = 0;
|
|
|
|
kevp = kq->kq_kev;
|
|
|
|
s = splhigh();
|
2000-05-04 20:19:17 +00:00
|
|
|
if (error)
|
|
|
|
break;
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
TAILQ_REMOVE(&kq->kq_head, &marker, kn_tqe);
|
|
|
|
splx(s);
|
|
|
|
done:
|
|
|
|
if (nkev != 0)
|
2002-06-29 00:29:12 +00:00
|
|
|
error = copyout(&kq->kq_kev, ulistp,
|
2000-04-16 19:02:08 +00:00
|
|
|
sizeof(struct kevent) * nkev);
|
2001-09-12 08:38:13 +00:00
|
|
|
td->td_retval[0] = maxevents - count;
|
2000-04-16 19:02:08 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX
|
|
|
|
* This could be expanded to call kqueue_scan, if desired.
|
|
|
|
*/
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
In order to better support flexible and extensible access control,
make a series of modifications to the credential arguments relating
to file read and write operations to cliarfy which credential is
used for what:
- Change fo_read() and fo_write() to accept "active_cred" instead of
"cred", and change the semantics of consumers of fo_read() and
fo_write() to pass the active credential of the thread requesting
an operation rather than the cached file cred. The cached file
cred is still available in fo_read() and fo_write() consumers
via fp->f_cred. These changes largely in sys_generic.c.
For each implementation of fo_read() and fo_write(), update cred
usage to reflect this change and maintain current semantics:
- badfo_readwrite() unchanged
- kqueue_read/write() unchanged
pipe_read/write() now authorize MAC using active_cred rather
than td->td_ucred
- soo_read/write() unchanged
- vn_read/write() now authorize MAC using active_cred but
VOP_READ/WRITE() with fp->f_cred
Modify vn_rdwr() to accept two credential arguments instead of a
single credential: active_cred and file_cred. Use active_cred
for MAC authorization, and select a credential for use in
VOP_READ/WRITE() based on whether file_cred is NULL or not. If
file_cred is provided, authorize the VOP using that cred,
otherwise the active credential, matching current semantics.
Modify current vn_rdwr() consumers to pass a file_cred if used
in the context of a struct file, and to always pass active_cred.
When vn_rdwr() is used without a file_cred, pass NOCRED.
These changes should maintain current semantics for read/write,
but avoid a redundant passing of fp->f_cred, as well as making
it more clear what the origin of each credential is in file
descriptor read/write operations.
Follow-up commits will make similar changes to other file descriptor
operations, and modify the MAC framework to pass both credentials
to MAC policy modules so they can implement either semantic for
revocation.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-15 20:55:08 +00:00
|
|
|
kqueue_read(struct file *fp, struct uio *uio, struct ucred *active_cred,
|
2001-09-12 08:38:13 +00:00
|
|
|
int flags, struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
|
|
|
return (ENXIO);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
In order to better support flexible and extensible access control,
make a series of modifications to the credential arguments relating
to file read and write operations to cliarfy which credential is
used for what:
- Change fo_read() and fo_write() to accept "active_cred" instead of
"cred", and change the semantics of consumers of fo_read() and
fo_write() to pass the active credential of the thread requesting
an operation rather than the cached file cred. The cached file
cred is still available in fo_read() and fo_write() consumers
via fp->f_cred. These changes largely in sys_generic.c.
For each implementation of fo_read() and fo_write(), update cred
usage to reflect this change and maintain current semantics:
- badfo_readwrite() unchanged
- kqueue_read/write() unchanged
pipe_read/write() now authorize MAC using active_cred rather
than td->td_ucred
- soo_read/write() unchanged
- vn_read/write() now authorize MAC using active_cred but
VOP_READ/WRITE() with fp->f_cred
Modify vn_rdwr() to accept two credential arguments instead of a
single credential: active_cred and file_cred. Use active_cred
for MAC authorization, and select a credential for use in
VOP_READ/WRITE() based on whether file_cred is NULL or not. If
file_cred is provided, authorize the VOP using that cred,
otherwise the active credential, matching current semantics.
Modify current vn_rdwr() consumers to pass a file_cred if used
in the context of a struct file, and to always pass active_cred.
When vn_rdwr() is used without a file_cred, pass NOCRED.
These changes should maintain current semantics for read/write,
but avoid a redundant passing of fp->f_cred, as well as making
it more clear what the origin of each credential is in file
descriptor read/write operations.
Follow-up commits will make similar changes to other file descriptor
operations, and modify the MAC framework to pass both credentials
to MAC policy modules so they can implement either semantic for
revocation.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-15 20:55:08 +00:00
|
|
|
kqueue_write(struct file *fp, struct uio *uio, struct ucred *active_cred,
|
2001-09-12 08:38:13 +00:00
|
|
|
int flags, struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
|
|
|
return (ENXIO);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
2002-08-17 02:36:16 +00:00
|
|
|
kqueue_ioctl(struct file *fp, u_long com, void *data,
|
|
|
|
struct ucred *active_cred, struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
|
|
|
return (ENOTTY);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
Make similar changes to fo_stat() and fo_poll() as made earlier to
fo_read() and fo_write(): explicitly use the cred argument to fo_poll()
as "active_cred" using the passed file descriptor's f_cred reference
to provide access to the file credential. Add an active_cred
argument to fo_stat() so that implementers have access to the active
credential as well as the file credential. Generally modify callers
of fo_stat() to pass in td->td_ucred rather than fp->f_cred, which
was redundantly provided via the fp argument. This set of modifications
also permits threads to perform these operations on behalf of another
thread without modifying their credential.
Trickle this change down into fo_stat/poll() implementations:
- badfo_poll(), badfo_stat(): modify/add arguments.
- kqueue_poll(), kqueue_stat(): modify arguments.
- pipe_poll(), pipe_stat(): modify/add arguments, pass active_cred to
MAC checks rather than td->td_ucred.
- soo_poll(), soo_stat(): modify/add arguments, pass fp->f_cred rather
than cred to pru_sopoll() to maintain current semantics.
- sopoll(): moidfy arguments.
- vn_poll(), vn_statfile(): modify/add arguments, pass new arguments
to vn_stat(). Pass active_cred to MAC and fp->f_cred to VOP_POLL()
to maintian current semantics.
- vn_close(): rename cred to file_cred to reflect reality while I'm here.
- vn_stat(): Add active_cred and file_cred arguments to vn_stat()
and consumers so that this distinction is maintained at the VFS
as well as 'struct file' layer. Pass active_cred instead of
td->td_ucred to MAC and to VOP_GETATTR() to maintain current semantics.
- fifofs: modify the creation of a "filetemp" so that the file
credential is properly initialized and can be used in the socket
code if desired. Pass ap->a_td->td_ucred as the active
credential to soo_poll(). If we teach the vnop interface about
the distinction between file and active credentials, we would use
the active credential here.
Note that current inconsistent passing of active_cred vs. file_cred to
VOP's is maintained. It's not clear why GETATTR would be authorized
using active_cred while POLL would be authorized using file_cred at
the file system level.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-16 12:52:03 +00:00
|
|
|
kqueue_poll(struct file *fp, int events, struct ucred *active_cred,
|
2002-08-16 14:12:40 +00:00
|
|
|
struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
2002-01-13 11:58:06 +00:00
|
|
|
struct kqueue *kq;
|
2000-04-16 19:02:08 +00:00
|
|
|
int revents = 0;
|
|
|
|
int s = splnet();
|
|
|
|
|
2002-01-13 11:58:06 +00:00
|
|
|
kq = (struct kqueue *)fp->f_data;
|
2000-04-16 19:02:08 +00:00
|
|
|
if (events & (POLLIN | POLLRDNORM)) {
|
|
|
|
if (kq->kq_count) {
|
|
|
|
revents |= events & (POLLIN | POLLRDNORM);
|
|
|
|
} else {
|
2001-09-21 22:46:54 +00:00
|
|
|
selrecord(td, &kq->kq_sel);
|
2000-04-16 19:02:08 +00:00
|
|
|
kq->kq_state |= KQ_SEL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
splx(s);
|
|
|
|
return (revents);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
Make similar changes to fo_stat() and fo_poll() as made earlier to
fo_read() and fo_write(): explicitly use the cred argument to fo_poll()
as "active_cred" using the passed file descriptor's f_cred reference
to provide access to the file credential. Add an active_cred
argument to fo_stat() so that implementers have access to the active
credential as well as the file credential. Generally modify callers
of fo_stat() to pass in td->td_ucred rather than fp->f_cred, which
was redundantly provided via the fp argument. This set of modifications
also permits threads to perform these operations on behalf of another
thread without modifying their credential.
Trickle this change down into fo_stat/poll() implementations:
- badfo_poll(), badfo_stat(): modify/add arguments.
- kqueue_poll(), kqueue_stat(): modify arguments.
- pipe_poll(), pipe_stat(): modify/add arguments, pass active_cred to
MAC checks rather than td->td_ucred.
- soo_poll(), soo_stat(): modify/add arguments, pass fp->f_cred rather
than cred to pru_sopoll() to maintain current semantics.
- sopoll(): moidfy arguments.
- vn_poll(), vn_statfile(): modify/add arguments, pass new arguments
to vn_stat(). Pass active_cred to MAC and fp->f_cred to VOP_POLL()
to maintian current semantics.
- vn_close(): rename cred to file_cred to reflect reality while I'm here.
- vn_stat(): Add active_cred and file_cred arguments to vn_stat()
and consumers so that this distinction is maintained at the VFS
as well as 'struct file' layer. Pass active_cred instead of
td->td_ucred to MAC and to VOP_GETATTR() to maintain current semantics.
- fifofs: modify the creation of a "filetemp" so that the file
credential is properly initialized and can be used in the socket
code if desired. Pass ap->a_td->td_ucred as the active
credential to soo_poll(). If we teach the vnop interface about
the distinction between file and active credentials, we would use
the active credential here.
Note that current inconsistent passing of active_cred vs. file_cred to
VOP's is maintained. It's not clear why GETATTR would be authorized
using active_cred while POLL would be authorized using file_cred at
the file system level.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-16 12:52:03 +00:00
|
|
|
kqueue_stat(struct file *fp, struct stat *st, struct ucred *active_cred,
|
2002-08-16 14:12:40 +00:00
|
|
|
struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
2002-01-13 11:58:06 +00:00
|
|
|
struct kqueue *kq;
|
2000-04-16 19:02:08 +00:00
|
|
|
|
2002-01-13 11:58:06 +00:00
|
|
|
kq = (struct kqueue *)fp->f_data;
|
2000-04-16 19:02:08 +00:00
|
|
|
bzero((void *)st, sizeof(*st));
|
|
|
|
st->st_size = kq->kq_count;
|
|
|
|
st->st_blksize = sizeof(struct kevent);
|
2000-06-28 19:16:27 +00:00
|
|
|
st->st_mode = S_IFIFO;
|
2000-04-16 19:02:08 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
2001-09-12 08:38:13 +00:00
|
|
|
kqueue_close(struct file *fp, struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
|
|
|
struct kqueue *kq = (struct kqueue *)fp->f_data;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct filedesc *fdp = td->td_proc->p_fd;
|
2000-04-16 19:02:08 +00:00
|
|
|
struct knote **knp, *kn, *kn0;
|
|
|
|
int i;
|
|
|
|
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_LOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
for (i = 0; i < fdp->fd_knlistsize; i++) {
|
|
|
|
knp = &SLIST_FIRST(&fdp->fd_knlist[i]);
|
|
|
|
kn = *knp;
|
|
|
|
while (kn != NULL) {
|
|
|
|
kn0 = SLIST_NEXT(kn, kn_link);
|
|
|
|
if (kq == kn->kn_kq) {
|
|
|
|
kn->kn_fop->f_detach(kn);
|
|
|
|
*knp = kn0;
|
2002-01-13 11:58:06 +00:00
|
|
|
FILE_LOCK(kn->kn_fp);
|
|
|
|
FILEDESC_UNLOCK(fdp);
|
|
|
|
fdrop_locked(kn->kn_fp, td);
|
|
|
|
knote_free(kn);
|
|
|
|
FILEDESC_LOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
} else {
|
|
|
|
knp = &SLIST_NEXT(kn, kn_link);
|
|
|
|
}
|
|
|
|
kn = kn0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (fdp->fd_knhashmask != 0) {
|
|
|
|
for (i = 0; i < fdp->fd_knhashmask + 1; i++) {
|
|
|
|
knp = &SLIST_FIRST(&fdp->fd_knhash[i]);
|
|
|
|
kn = *knp;
|
|
|
|
while (kn != NULL) {
|
|
|
|
kn0 = SLIST_NEXT(kn, kn_link);
|
|
|
|
if (kq == kn->kn_kq) {
|
|
|
|
kn->kn_fop->f_detach(kn);
|
2002-01-13 11:58:06 +00:00
|
|
|
*knp = kn0;
|
2000-04-16 19:02:08 +00:00
|
|
|
/* XXX non-fd release of kn->kn_ptr */
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_UNLOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
knote_free(kn);
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_LOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
} else {
|
|
|
|
knp = &SLIST_NEXT(kn, kn_link);
|
|
|
|
}
|
|
|
|
kn = kn0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_UNLOCK(fdp);
|
2001-09-29 17:48:39 +00:00
|
|
|
free(kq, M_KQUEUE);
|
2000-04-16 19:02:08 +00:00
|
|
|
fp->f_data = NULL;
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
kqueue_wakeup(struct kqueue *kq)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (kq->kq_state & KQ_SLEEP) {
|
|
|
|
kq->kq_state &= ~KQ_SLEEP;
|
|
|
|
wakeup(kq);
|
|
|
|
}
|
|
|
|
if (kq->kq_state & KQ_SEL) {
|
|
|
|
kq->kq_state &= ~KQ_SEL;
|
|
|
|
selwakeup(&kq->kq_sel);
|
|
|
|
}
|
|
|
|
KNOTE(&kq->kq_sel.si_note, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* walk down a list of knotes, activating them if their event has triggered.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
knote(struct klist *list, long hint)
|
|
|
|
{
|
|
|
|
struct knote *kn;
|
|
|
|
|
|
|
|
SLIST_FOREACH(kn, list, kn_selnext)
|
|
|
|
if (kn->kn_fop->f_event(kn, hint))
|
|
|
|
KNOTE_ACTIVATE(kn);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* remove all knotes from a specified klist
|
|
|
|
*/
|
|
|
|
void
|
2001-09-12 08:38:13 +00:00
|
|
|
knote_remove(struct thread *td, struct klist *list)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
|
|
|
struct knote *kn;
|
|
|
|
|
|
|
|
while ((kn = SLIST_FIRST(list)) != NULL) {
|
|
|
|
kn->kn_fop->f_detach(kn);
|
2001-09-12 08:38:13 +00:00
|
|
|
knote_drop(kn, td);
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* remove all knotes referencing a specified fd
|
|
|
|
*/
|
|
|
|
void
|
2001-09-12 08:38:13 +00:00
|
|
|
knote_fdclose(struct thread *td, int fd)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
2001-09-12 08:38:13 +00:00
|
|
|
struct filedesc *fdp = td->td_proc->p_fd;
|
2002-01-13 11:58:06 +00:00
|
|
|
struct klist *list;
|
2000-04-16 19:02:08 +00:00
|
|
|
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_LOCK(fdp);
|
|
|
|
list = &fdp->fd_knlist[fd];
|
|
|
|
FILEDESC_UNLOCK(fdp);
|
2001-09-12 08:38:13 +00:00
|
|
|
knote_remove(td, list);
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
knote_attach(struct knote *kn, struct filedesc *fdp)
|
|
|
|
{
|
2002-10-03 06:03:26 +00:00
|
|
|
struct klist *list, *oldlist, *tmp_knhash;
|
|
|
|
u_long tmp_knhashmask;
|
2002-01-13 11:58:06 +00:00
|
|
|
int size, newsize;
|
|
|
|
|
|
|
|
FILEDESC_LOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
|
|
|
|
if (! kn->kn_fop->f_isfd) {
|
2002-10-03 06:03:26 +00:00
|
|
|
if (fdp->fd_knhashmask == 0) {
|
|
|
|
FILEDESC_UNLOCK(fdp);
|
|
|
|
tmp_knhash = hashinit(KN_HASHSIZE, M_KQUEUE,
|
|
|
|
&tmp_knhashmask);
|
|
|
|
FILEDESC_LOCK(fdp);
|
|
|
|
if (fdp->fd_knhashmask == 0) {
|
|
|
|
fdp->fd_knhash = tmp_knhash;
|
|
|
|
fdp->fd_knhashmask = tmp_knhashmask;
|
|
|
|
} else {
|
|
|
|
FILEDESC_UNLOCK(fdp);
|
|
|
|
free(tmp_knhash, M_KQUEUE);
|
|
|
|
FILEDESC_LOCK(fdp);
|
|
|
|
}
|
|
|
|
}
|
2000-04-16 19:02:08 +00:00
|
|
|
list = &fdp->fd_knhash[KN_HASH(kn->kn_id, fdp->fd_knhashmask)];
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fdp->fd_knlistsize <= kn->kn_id) {
|
2002-01-13 11:58:06 +00:00
|
|
|
retry:
|
2000-04-16 19:02:08 +00:00
|
|
|
size = fdp->fd_knlistsize;
|
|
|
|
while (size <= kn->kn_id)
|
|
|
|
size += KQEXTENT;
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_UNLOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
MALLOC(list, struct klist *,
|
2001-09-29 17:48:39 +00:00
|
|
|
size * sizeof(struct klist *), M_KQUEUE, M_WAITOK);
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_LOCK(fdp);
|
|
|
|
newsize = fdp->fd_knlistsize;
|
|
|
|
while (newsize <= kn->kn_id)
|
|
|
|
newsize += KQEXTENT;
|
|
|
|
if (newsize != size) {
|
|
|
|
FILEDESC_UNLOCK(fdp);
|
|
|
|
free(list, M_TEMP);
|
|
|
|
FILEDESC_LOCK(fdp);
|
|
|
|
goto retry;
|
|
|
|
}
|
2002-06-29 00:29:12 +00:00
|
|
|
bcopy(fdp->fd_knlist, list,
|
2000-04-16 19:02:08 +00:00
|
|
|
fdp->fd_knlistsize * sizeof(struct klist *));
|
|
|
|
bzero((caddr_t)list +
|
|
|
|
fdp->fd_knlistsize * sizeof(struct klist *),
|
|
|
|
(size - fdp->fd_knlistsize) * sizeof(struct klist *));
|
|
|
|
if (fdp->fd_knlist != NULL)
|
2002-01-13 11:58:06 +00:00
|
|
|
oldlist = fdp->fd_knlist;
|
|
|
|
else
|
|
|
|
oldlist = NULL;
|
2000-04-16 19:02:08 +00:00
|
|
|
fdp->fd_knlistsize = size;
|
|
|
|
fdp->fd_knlist = list;
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_UNLOCK(fdp);
|
|
|
|
if (oldlist != NULL)
|
|
|
|
FREE(oldlist, M_KQUEUE);
|
|
|
|
FILEDESC_LOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
list = &fdp->fd_knlist[kn->kn_id];
|
|
|
|
done:
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_UNLOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
SLIST_INSERT_HEAD(list, kn, kn_link);
|
|
|
|
kn->kn_status = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* should be called at spl == 0, since we don't want to hold spl
|
|
|
|
* while calling fdrop and free.
|
|
|
|
*/
|
|
|
|
static void
|
2001-09-12 08:38:13 +00:00
|
|
|
knote_drop(struct knote *kn, struct thread *td)
|
2000-04-16 19:02:08 +00:00
|
|
|
{
|
2001-09-12 08:38:13 +00:00
|
|
|
struct filedesc *fdp = td->td_proc->p_fd;
|
2000-04-16 19:02:08 +00:00
|
|
|
struct klist *list;
|
|
|
|
|
2002-01-13 11:58:06 +00:00
|
|
|
FILEDESC_LOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
if (kn->kn_fop->f_isfd)
|
|
|
|
list = &fdp->fd_knlist[kn->kn_id];
|
|
|
|
else
|
|
|
|
list = &fdp->fd_knhash[KN_HASH(kn->kn_id, fdp->fd_knhashmask)];
|
2002-01-13 11:58:06 +00:00
|
|
|
if (kn->kn_fop->f_isfd)
|
|
|
|
FILE_LOCK(kn->kn_fp);
|
|
|
|
FILEDESC_UNLOCK(fdp);
|
2000-04-16 19:02:08 +00:00
|
|
|
|
2000-05-26 02:09:24 +00:00
|
|
|
SLIST_REMOVE(list, kn, knote, kn_link);
|
2000-04-16 19:02:08 +00:00
|
|
|
if (kn->kn_status & KN_QUEUED)
|
|
|
|
knote_dequeue(kn);
|
|
|
|
if (kn->kn_fop->f_isfd)
|
2002-01-13 11:58:06 +00:00
|
|
|
fdrop_locked(kn->kn_fp, td);
|
2000-04-16 19:02:08 +00:00
|
|
|
knote_free(kn);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
knote_enqueue(struct knote *kn)
|
|
|
|
{
|
|
|
|
struct kqueue *kq = kn->kn_kq;
|
|
|
|
int s = splhigh();
|
|
|
|
|
2000-05-04 20:19:17 +00:00
|
|
|
KASSERT((kn->kn_status & KN_QUEUED) == 0, ("knote already queued"));
|
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
TAILQ_INSERT_TAIL(&kq->kq_head, kn, kn_tqe);
|
|
|
|
kn->kn_status |= KN_QUEUED;
|
|
|
|
kq->kq_count++;
|
|
|
|
splx(s);
|
|
|
|
kqueue_wakeup(kq);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
knote_dequeue(struct knote *kn)
|
|
|
|
{
|
|
|
|
struct kqueue *kq = kn->kn_kq;
|
|
|
|
int s = splhigh();
|
|
|
|
|
2000-05-04 20:19:17 +00:00
|
|
|
KASSERT(kn->kn_status & KN_QUEUED, ("knote not queued"));
|
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
TAILQ_REMOVE(&kq->kq_head, kn, kn_tqe);
|
|
|
|
kn->kn_status &= ~KN_QUEUED;
|
|
|
|
kq->kq_count--;
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
knote_init(void)
|
|
|
|
{
|
2002-03-20 04:09:59 +00:00
|
|
|
knote_zone = uma_zcreate("KNOTE", sizeof(struct knote), NULL, NULL,
|
|
|
|
NULL, NULL, UMA_ALIGN_PTR, 0);
|
|
|
|
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
SYSINIT(knote, SI_SUB_PSEUDO, SI_ORDER_ANY, knote_init, NULL)
|
|
|
|
|
|
|
|
static struct knote *
|
|
|
|
knote_alloc(void)
|
|
|
|
{
|
2002-03-20 04:09:59 +00:00
|
|
|
return ((struct knote *)uma_zalloc(knote_zone, M_WAITOK));
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
knote_free(struct knote *kn)
|
|
|
|
{
|
2002-03-20 04:09:59 +00:00
|
|
|
uma_zfree(knote_zone, kn);
|
2000-04-16 19:02:08 +00:00
|
|
|
}
|