svn commit: r367927 - in head: sys/kern tests/sys/kern

Kyle Evans kevans at freebsd.org
Sun Nov 22 17:25:14 UTC 2020


On Sun, Nov 22, 2020 at 10:36 AM Kyle Evans <kevans at freebsd.org> wrote:
>
> On Sun, Nov 22, 2020 at 9:54 AM Guy Yur <guyyur at gmail.com> wrote:
> >
> > On 22/11/20 7:00 am, Robert Wing wrote:
> > > Author: rew
> > > Date: Sun Nov 22 05:00:28 2020
> > > New Revision: 367927
> > > URL: https://svnweb.freebsd.org/changeset/base/367927
> > >
> > > Log:
> > >    fd: free old file descriptor tables when not shared
> > >
> > >    During the life of a process, new file descriptor tables may be allocated. When
> > >    a new table is allocated, the old table is placed in a free list and held onto
> > >    until all processes referencing them exit.
> > >
> > >    When a new file descriptor table is allocated, the old file descriptor table
> > >    can be freed when the current process has a single-thread and the file
> > >    descriptor table is not being shared with any other processes.
> > >
> > >    Reviewed by:    kevans
> > >    Approved by:    kevans (mentor)
> > >    Differential Revision:  https://reviews.freebsd.org/D18617
> > >
> > > Added:
> > >    head/tests/sys/kern/fdgrowtable_test.c   (contents, props changed)
> > > Modified:
> > >    head/sys/kern/kern_descrip.c
> > >    head/tests/sys/kern/Makefile
> >
> > Hi,
> >
> > I am getting a kernel panic with this commit when building
> > devel/gmake port and it runs dup2 test in configure script.
> >
> > panic: fc_ioctls != NULL, but fc_nioctls=-16162
> > ...
> > #10 0xffffffff80655c72 in vpanic (fmt=<optimized out>, ap=<optimized out>)
> >      at /usr/src/sys/kern/kern_shutdown.c:907
> > #11 0xffffffff80655a03 in panic (
> >      fmt=0xffffffff80eb2b78 <cnputs_mtx> "헝\200\377\377\377\377")
> >      at /usr/src/sys/kern/kern_shutdown.c:843
> > #12 0xffffffff805fff9a in filecaps_copy_prep (src=<optimized out>)
> >      at /usr/src/sys/kern/kern_descrip.c:1629
> > #13 kern_dup (td=<optimized out>, mode=<optimized out>, flags=0,
> >      old=<optimized out>, new=256) at /usr/src/sys/kern/kern_descrip.c:970
> > #14 0xffffffff8094a5de in syscallenter (td=<optimized out>)
> >      at /usr/src/sys/amd64/amd64/../../kern/subr_syscall.c:189
> > #15 amd64_syscall (td=0xfffffe00513f8500, traced=0)
> >      at /usr/src/sys/amd64/amd64/trap.c:1156
> >
> >
> > Simplified test program that causes panic:
> > #include <unistd.h>
> > #include <limits.h>
> >
> > int main ()
> > {
> >    int bad_fd = INT_MAX;
> >    dup2 (1, 1);
> >    close (0);
> >    dup2 (0, 0);
> >    dup2 (2, bad_fd);
> >    dup2 (2, -1);
> >    dup2 (2, 255);
> >    dup2 (2, 256);
> >    return 0;
> > }
> >
>
> Whoops. =\
>
> It looks like kern_dup grows the file table but assumes that it can
> continue using oldfe that it fetched from the now-freed table. I
> suspect we just need to refetch oldfde after the grow operation, and
> it might be a good idea (under INVARIANTS) to grab the fp from oldfde
> before we grow the table and assert that the new entry we fetch is the
> same underlying file.
>

I can confirm that the below fixes it and no other growth spots keep
pointers into the old table around, I'll give it a little bit for any
objections to be raised then commit.

diff --git a/sys/kern/kern_descrip.c b/sys/kern/kern_descrip.c
index b5680bd79e1..1a3a5cafbea 100644
--- a/sys/kern/kern_descrip.c
+++ b/sys/kern/kern_descrip.c
@@ -936,6 +936,12 @@ kern_dup(struct thread *td, u_int mode, int
flags, int old, int new)
                break;
        case FDDUP_FIXED:
                if (new >= fdp->fd_nfiles) {
+#ifdef INVARIANTS
+                       struct file *ofp;
+
+                       ofp = oldfde->fde_file;
+#endif
+
                        /*
                         * The resource limits are here instead of e.g.
                         * fdalloc(), because the file descriptor table may be
@@ -955,6 +961,11 @@ kern_dup(struct thread *td, u_int mode, int
flags, int old, int new)
                        }
 #endif
                        fdgrowtable_exp(fdp, new + 1);
+                       /* Refetch; old entry may be invalid. */
+                       oldfde = &fdp->fd_ofiles[old];
+                       KASSERT(ofp == oldfde->fde_file,
+                           ("fdt_ofiles shift from growth observed at fd %d",
+                           old));
                }
                if (!fdisused(fdp, new))
                        fdused(fdp, new);


More information about the svn-src-all mailing list