summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorjhb <jhb@FreeBSD.org>2001-10-26 08:12:54 +0000
committerjhb <jhb@FreeBSD.org>2001-10-26 08:12:54 +0000
commit46e3f92a5d9268f6cd24fb05657ca80cc78f3aa4 (patch)
treeea93762e897a0b2d2eca0a29032d37f114739a9f
parent83e21bd3fa88980898951b32af3e4126bfa94a29 (diff)
downloadFreeBSD-src-46e3f92a5d9268f6cd24fb05657ca80cc78f3aa4.zip
FreeBSD-src-46e3f92a5d9268f6cd24fb05657ca80cc78f3aa4.tar.gz
Add a per-thread ucred reference for syscalls and synchronous traps from
userland. The per thread ucred reference is immutable and thus needs no locks to be read. However, until all the proc locking associated with writes to p_ucred are completed, it is still not safe to use the per-thread reference. Tested on: x86 (SMP), alpha, sparc64
-rw-r--r--sys/alpha/alpha/trap.c21
-rw-r--r--sys/amd64/amd64/trap.c63
-rw-r--r--sys/i386/i386/trap.c63
-rw-r--r--sys/ia64/ia64/trap.c18
-rw-r--r--sys/kern/init_main.c1
-rw-r--r--sys/kern/kern_exit.c10
-rw-r--r--sys/kern/kern_fork.c5
-rw-r--r--sys/kern/subr_trap.c14
-rw-r--r--sys/sparc64/sparc64/trap.c29
-rw-r--r--sys/sys/proc.h1
10 files changed, 164 insertions, 61 deletions
diff --git a/sys/alpha/alpha/trap.c b/sys/alpha/alpha/trap.c
index d82f455..b86c6ed 100644
--- a/sys/alpha/alpha/trap.c
+++ b/sys/alpha/alpha/trap.c
@@ -293,8 +293,14 @@ trap(a0, a1, a2, entry, framep)
if (user) {
sticks = td->td_kse->ke_sticks;
td->td_frame = framep;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
} else {
sticks = 0; /* XXX bogus -Wuninitialized warning */
+ KASSERT(cold || td->td_ucred != NULL,
+ ("kernel trap doesn't have ucred"));
}
#ifdef DIAGNOSTIC
@@ -615,8 +621,11 @@ out:
if (user) {
framep->tf_regs[FRAME_SP] = alpha_pal_rdusp();
userret(td, framep, sticks);
- if (mtx_owned(&Giant))
- mtx_unlock(&Giant);
+ mtx_assert(&Giant, MA_NOTOWNED);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
}
return;
@@ -685,6 +694,10 @@ syscall(code, framep)
td->td_frame = framep;
opc = framep->tf_regs[FRAME_PC] - 4;
sticks = td->td_kse->ke_sticks;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
#ifdef DIAGNOSTIC
alpha_fpstate_check(p);
@@ -805,6 +818,10 @@ syscall(code, framep)
*/
STOPEVENT(p, S_SCX, code);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
#ifdef WITNESS
if (witness_list(td)) {
panic("system call %s returning with mutex(s) held\n",
diff --git a/sys/amd64/amd64/trap.c b/sys/amd64/amd64/trap.c
index fd4c8fe..714f3f2 100644
--- a/sys/amd64/amd64/trap.c
+++ b/sys/amd64/amd64/trap.c
@@ -216,6 +216,17 @@ trap(frame)
eva = 0;
type = frame.tf_trapno;
code = frame.tf_err;
+ if (type == T_PAGEFLT) {
+ /*
+ * For some Cyrix CPUs, %cr2 is clobbered by
+ * interrupts. This problem is worked around by using
+ * an interrupt gate for the pagefault handler. We
+ * are finally ready to read %cr2 and then must
+ * reenable interrupts.
+ */
+ eva = rcr2();
+ enable_intr();
+ }
if ((ISPL(frame.tf_cs) == SEL_UPL) ||
((frame.tf_eflags & PSL_VM) && !in_vm86call)) {
@@ -223,6 +234,10 @@ trap(frame)
sticks = td->td_kse->ke_sticks;
td->td_frame = &frame;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
switch (type) {
case T_PRIVINFLT: /* privileged instruction fault */
@@ -240,7 +255,7 @@ trap(frame)
#ifdef DEV_NPX
ucode = npxtrap();
if (ucode == -1)
- return;
+ goto userout;
#else
ucode = code;
#endif
@@ -273,15 +288,6 @@ trap(frame)
break;
case T_PAGEFLT: /* page fault */
- /*
- * For some Cyrix CPUs, %cr2 is clobbered by
- * interrupts. This problem is worked around by using
- * an interrupt gate for the pagefault handler. We
- * are finally ready to read %cr2 and then must
- * reenable interrupts.
- */
- eva = rcr2();
- enable_intr();
i = trap_pfault(&frame, TRUE, eva);
#if defined(I586_CPU) && !defined(NO_F00F_HACK)
if (i == -2) {
@@ -299,7 +305,7 @@ trap(frame)
}
#endif
if (i == -1)
- goto out;
+ goto userout;
if (i == 0)
goto user;
@@ -324,7 +330,7 @@ trap(frame)
lastalert = time_second;
}
mtx_unlock(&Giant);
- goto out;
+ goto userout;
#else /* !POWERFAIL_NMI */
/* machine/parity/power fail/"kitchen sink" faults */
/* XXX Giant */
@@ -339,7 +345,7 @@ trap(frame)
kdb_trap (type, 0, &frame);
}
#endif /* DDB */
- goto out;
+ goto userout;
} else if (panic_on_nmi)
panic("NMI indicates hardware failure");
break;
@@ -360,7 +366,7 @@ trap(frame)
#ifdef DEV_NPX
/* transparent fault (due to context switch "late") */
if (npxdna())
- goto out;
+ goto userout;
#endif
if (!pmath_emulate) {
i = SIGFPE;
@@ -372,7 +378,7 @@ trap(frame)
mtx_unlock(&Giant);
if (i == 0) {
if (!(frame.tf_eflags & PSL_T))
- goto out;
+ goto userout;
frame.tf_eflags &= ~PSL_T;
i = SIGTRAP;
}
@@ -392,17 +398,10 @@ trap(frame)
} else {
/* kernel trap */
+ KASSERT(cold || td->td_ucred != NULL,
+ ("kernel trap doesn't have ucred"));
switch (type) {
case T_PAGEFLT: /* page fault */
- /*
- * For some Cyrix CPUs, %cr2 is clobbered by
- * interrupts. This problem is worked around by using
- * an interrupt gate for the pagefault handler. We
- * are finally ready to read %cr2 and then must
- * reenable interrupts.
- */
- eva = rcr2();
- enable_intr();
(void) trap_pfault(&frame, FALSE, eva);
goto out;
@@ -622,8 +621,12 @@ trap(frame)
user:
userret(td, &frame, sticks);
- if (mtx_owned(&Giant)) /* XXX why would Giant be owned here? */
- mtx_unlock(&Giant);
+ mtx_assert(&Giant, MA_NOTOWNED);
+userout:
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
out:
return;
}
@@ -1046,6 +1049,10 @@ syscall(frame)
sticks = td->td_kse->ke_sticks;
td->td_frame = &frame;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
params = (caddr_t)frame.tf_esp + sizeof(int);
code = frame.tf_eax;
@@ -1187,6 +1194,10 @@ bad:
*/
STOPEVENT(p, S_SCX, code);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
#ifdef WITNESS
if (witness_list(td)) {
panic("system call %s returning with mutex(s) held\n",
diff --git a/sys/i386/i386/trap.c b/sys/i386/i386/trap.c
index fd4c8fe..714f3f2 100644
--- a/sys/i386/i386/trap.c
+++ b/sys/i386/i386/trap.c
@@ -216,6 +216,17 @@ trap(frame)
eva = 0;
type = frame.tf_trapno;
code = frame.tf_err;
+ if (type == T_PAGEFLT) {
+ /*
+ * For some Cyrix CPUs, %cr2 is clobbered by
+ * interrupts. This problem is worked around by using
+ * an interrupt gate for the pagefault handler. We
+ * are finally ready to read %cr2 and then must
+ * reenable interrupts.
+ */
+ eva = rcr2();
+ enable_intr();
+ }
if ((ISPL(frame.tf_cs) == SEL_UPL) ||
((frame.tf_eflags & PSL_VM) && !in_vm86call)) {
@@ -223,6 +234,10 @@ trap(frame)
sticks = td->td_kse->ke_sticks;
td->td_frame = &frame;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
switch (type) {
case T_PRIVINFLT: /* privileged instruction fault */
@@ -240,7 +255,7 @@ trap(frame)
#ifdef DEV_NPX
ucode = npxtrap();
if (ucode == -1)
- return;
+ goto userout;
#else
ucode = code;
#endif
@@ -273,15 +288,6 @@ trap(frame)
break;
case T_PAGEFLT: /* page fault */
- /*
- * For some Cyrix CPUs, %cr2 is clobbered by
- * interrupts. This problem is worked around by using
- * an interrupt gate for the pagefault handler. We
- * are finally ready to read %cr2 and then must
- * reenable interrupts.
- */
- eva = rcr2();
- enable_intr();
i = trap_pfault(&frame, TRUE, eva);
#if defined(I586_CPU) && !defined(NO_F00F_HACK)
if (i == -2) {
@@ -299,7 +305,7 @@ trap(frame)
}
#endif
if (i == -1)
- goto out;
+ goto userout;
if (i == 0)
goto user;
@@ -324,7 +330,7 @@ trap(frame)
lastalert = time_second;
}
mtx_unlock(&Giant);
- goto out;
+ goto userout;
#else /* !POWERFAIL_NMI */
/* machine/parity/power fail/"kitchen sink" faults */
/* XXX Giant */
@@ -339,7 +345,7 @@ trap(frame)
kdb_trap (type, 0, &frame);
}
#endif /* DDB */
- goto out;
+ goto userout;
} else if (panic_on_nmi)
panic("NMI indicates hardware failure");
break;
@@ -360,7 +366,7 @@ trap(frame)
#ifdef DEV_NPX
/* transparent fault (due to context switch "late") */
if (npxdna())
- goto out;
+ goto userout;
#endif
if (!pmath_emulate) {
i = SIGFPE;
@@ -372,7 +378,7 @@ trap(frame)
mtx_unlock(&Giant);
if (i == 0) {
if (!(frame.tf_eflags & PSL_T))
- goto out;
+ goto userout;
frame.tf_eflags &= ~PSL_T;
i = SIGTRAP;
}
@@ -392,17 +398,10 @@ trap(frame)
} else {
/* kernel trap */
+ KASSERT(cold || td->td_ucred != NULL,
+ ("kernel trap doesn't have ucred"));
switch (type) {
case T_PAGEFLT: /* page fault */
- /*
- * For some Cyrix CPUs, %cr2 is clobbered by
- * interrupts. This problem is worked around by using
- * an interrupt gate for the pagefault handler. We
- * are finally ready to read %cr2 and then must
- * reenable interrupts.
- */
- eva = rcr2();
- enable_intr();
(void) trap_pfault(&frame, FALSE, eva);
goto out;
@@ -622,8 +621,12 @@ trap(frame)
user:
userret(td, &frame, sticks);
- if (mtx_owned(&Giant)) /* XXX why would Giant be owned here? */
- mtx_unlock(&Giant);
+ mtx_assert(&Giant, MA_NOTOWNED);
+userout:
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
out:
return;
}
@@ -1046,6 +1049,10 @@ syscall(frame)
sticks = td->td_kse->ke_sticks;
td->td_frame = &frame;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
params = (caddr_t)frame.tf_esp + sizeof(int);
code = frame.tf_eax;
@@ -1187,6 +1194,10 @@ bad:
*/
STOPEVENT(p, S_SCX, code);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
#ifdef WITNESS
if (witness_list(td)) {
panic("system call %s returning with mutex(s) held\n",
diff --git a/sys/ia64/ia64/trap.c b/sys/ia64/ia64/trap.c
index 1809306..3b024ed 100644
--- a/sys/ia64/ia64/trap.c
+++ b/sys/ia64/ia64/trap.c
@@ -295,8 +295,14 @@ trap(int vector, int imm, struct trapframe *framep)
if (user) {
sticks = td->td_kse->ke_sticks;
td->td_frame = framep;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
} else {
sticks = 0; /* XXX bogus -Wuninitialized warning */
+ KASSERT(cold || td->td_ucred != NULL,
+ ("kernel trap doesn't have ucred"));
}
switch (vector) {
@@ -552,6 +558,10 @@ out:
if (user) {
userret(td, framep, sticks);
mtx_assert(&Giant, MA_NOTOWNED);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
}
return;
@@ -596,6 +606,10 @@ syscall(int code, u_int64_t *args, struct trapframe *framep)
td->td_frame = framep;
sticks = td->td_kse->ke_sticks;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
/*
* Skip past the break instruction. Remember old address in case
@@ -700,6 +714,10 @@ syscall(int code, u_int64_t *args, struct trapframe *framep)
*/
STOPEVENT(p, S_SCX, code);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
#ifdef WITNESS
if (witness_list(td)) {
panic("system call %s returning with mutex(s) held\n",
diff --git a/sys/kern/init_main.c b/sys/kern/init_main.c
index 5491cef..438f2f9 100644
--- a/sys/kern/init_main.c
+++ b/sys/kern/init_main.c
@@ -347,6 +347,7 @@ proc0_init(void *dummy __unused)
p->p_ucred->cr_uidinfo = uifind(0);
p->p_ucred->cr_ruidinfo = uifind(0);
p->p_ucred->cr_prison = NULL; /* Don't jail it. */
+ td->td_ucred = crhold(p->p_ucred);
/* Create procsig. */
p->p_procsig = &procsig0;
diff --git a/sys/kern/kern_exit.c b/sys/kern/kern_exit.c
index 0793503..20a862f 100644
--- a/sys/kern/kern_exit.c
+++ b/sys/kern/kern_exit.c
@@ -388,6 +388,16 @@ exit1(td, rv)
}
/*
+ * Release this thread's reference to the ucred. The actual proc
+ * reference will stay around until the proc is harvested by
+ * wait(). At this point the ucred is immutable (no other threads
+ * from this proc are around that can change it) so we leave the
+ * per-thread ucred pointer intact in case it is needed although
+ * in theory nothing should be using it at this point.
+ */
+ crfree(td->td_ucred);
+
+ /*
* Finally, call machine-dependent code to release the remaining
* resources including address space, the kernel stack and pcb.
* The address space is released by "vmspace_free(p->p_vmspace)"
diff --git a/sys/kern/kern_fork.c b/sys/kern/kern_fork.c
index 2d1ce60..28f0970 100644
--- a/sys/kern/kern_fork.c
+++ b/sys/kern/kern_fork.c
@@ -472,6 +472,7 @@ again:
*/
PROC_LOCK(p1);
p2->p_ucred = crhold(p1->p_ucred);
+ p2->p_thread.td_ucred = crhold(p2->p_ucred); /* XXXKSE */
if (p2->p_args)
p2->p_args->ar_ref++;
@@ -797,6 +798,10 @@ fork_exit(callout, arg, frame)
kthread_exit(0);
}
PROC_UNLOCK(p);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
mtx_assert(&Giant, MA_NOTOWNED);
}
diff --git a/sys/kern/subr_trap.c b/sys/kern/subr_trap.c
index 908e8f1..a899576 100644
--- a/sys/kern/subr_trap.c
+++ b/sys/kern/subr_trap.c
@@ -135,6 +135,7 @@ ast(framep)
#endif
KASSERT(TRAPF_USERMODE(framep), ("ast in kernel mode"));
+ KASSERT(td->td_ucred == NULL, ("leaked ucred"));
#ifdef WITNESS
if (witness_list(td))
panic("Returning to user mode with mutex(s) held");
@@ -161,10 +162,13 @@ ast(framep)
if (flags & KEF_OWEUPC) {
prticks = p->p_stats->p_prof.pr_ticks;
p->p_stats->p_prof.pr_ticks = 0;
- mtx_unlock_spin(&sched_lock);
+ }
+ mtx_unlock_spin(&sched_lock);
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
+ if (flags & KEF_OWEUPC)
addupc_task(ke, p->p_stats->p_prof.pr_addr, prticks);
- } else
- mtx_unlock_spin(&sched_lock);
if (sflag & PS_ALRMPEND) {
PROC_LOCK(p);
psignal(p, SIGVTALRM);
@@ -187,6 +191,10 @@ ast(framep)
}
userret(td, framep, sticks);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
s = critical_enter();
}
mtx_assert(&Giant, MA_NOTOWNED);
diff --git a/sys/sparc64/sparc64/trap.c b/sys/sparc64/sparc64/trap.c
index 8498b87..57ee443 100644
--- a/sys/sparc64/sparc64/trap.c
+++ b/sys/sparc64/sparc64/trap.c
@@ -150,7 +150,6 @@ trap(struct trapframe *tf)
error = 0;
type = tf->tf_type;
ucode = type; /* XXX */
- sticks = 0;
CTR5(KTR_TRAP, "trap: %s type=%s (%s) ws=%#lx ow=%#lx",
p->p_comm, trap_msg[type & ~T_KERNEL],
@@ -160,6 +159,14 @@ trap(struct trapframe *tf)
if ((type & T_KERNEL) == 0) {
sticks = td->td_kse->ke_sticks;
td->td_frame = tf;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
+ } else {
+ sticks = 0;
+ KASSERT(cold || td->td_ucred != NULL,
+ ("kernel trap doesn't have ucred"));
}
switch (type) {
@@ -206,14 +213,14 @@ trap(struct trapframe *tf)
sigexit(td, SIGILL);
/* Not reached. */
}
- goto out;
+ goto userout;
case T_FILL_RET:
if (rwindow_load(td, tf, 1)) {
PROC_LOCK(p);
sigexit(td, SIGILL);
/* Not reached. */
}
- goto out;
+ goto userout;
case T_INSN_ILLEGAL:
sig = SIGILL;
goto trapsig;
@@ -230,7 +237,7 @@ trap(struct trapframe *tf)
sigexit(td, SIGILL);
/* Not reached. */
}
- goto out;
+ goto userout;
case T_TAG_OVFLW:
sig = SIGEMT;
goto trapsig;
@@ -322,6 +329,12 @@ trapsig:
trapsignal(p, sig, ucode);
user:
userret(td, tf, sticks);
+userout:
+ mtx_assert(&Giant, MA_NOTOWNED);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
out:
CTR1(KTR_TRAP, "trap: td=%p return", td);
return;
@@ -496,6 +509,10 @@ syscall(struct trapframe *tf)
sticks = td->td_kse->ke_sticks;
td->td_frame = tf;
+ KASSERT(td->td_ucred == NULL, ("already have a ucred"));
+ PROC_LOCK(p);
+ td->td_ucred = crhold(p->p_ucred);
+ PROC_UNLOCK(p);
code = tf->tf_global[1];
/*
@@ -631,6 +648,10 @@ bad:
*/
STOPEVENT(p, S_SCX, code);
+ mtx_lock(&Giant);
+ crfree(td->td_ucred);
+ mtx_unlock(&Giant);
+ td->td_ucred = NULL;
#ifdef WITNESS
if (witness_list(td)) {
panic("system call %s returning with mutex(s) held\n",
diff --git a/sys/sys/proc.h b/sys/sys/proc.h
index 6e51586..4008848 100644
--- a/sys/sys/proc.h
+++ b/sys/sys/proc.h
@@ -266,6 +266,7 @@ struct thread {
register_t td_retval[2]; /* (k) Syscall aux returns. */
#define td_endcopy td_pcb
+ struct ucred *td_ucred; /* (k) Reference to credentials. */
struct pcb *td_pcb; /* (k) Kernel VA of pcb and kstack. */
struct callout td_slpcallout; /* (h) Callout for sleep. */
struct trapframe *td_frame; /* (k) */
OpenPOWER on IntegriCloud