svn commit: r333425 - in head/sys: cddl/compat/opensolaris/sys cddl/contrib/opensolaris/uts/common/fs/zfs compat/cloudabi compat/linux compat/linuxkpi/common/include/linux dev/filemon dev/hwpmc fs/...
Matt Macy
mmacy at FreeBSD.org
Wed May 9 18:47:30 UTC 2018
Author: mmacy
Date: Wed May 9 18:47:24 2018
New Revision: 333425
URL: https://svnweb.freebsd.org/changeset/base/333425
Log:
Eliminate the overhead of gratuitous repeated reinitialization of cap_rights
- Add macros to allow preinitialization of cap_rights_t.
- Convert most commonly used code paths to use preinitialized cap_rights_t.
A 3.6% speedup in fstat was measured with this change.
Reported by: mjg
Reviewed by: oshogbo
Approved by: sbruno
MFC after: 1 month
Modified:
head/sys/cddl/compat/opensolaris/sys/file.h
head/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_ioctl.c
head/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_onexit.c
head/sys/compat/cloudabi/cloudabi_file.c
head/sys/compat/linux/linux_event.c
head/sys/compat/linux/linux_file.c
head/sys/compat/linux/linux_ioctl.c
head/sys/compat/linux/linux_mmap.c
head/sys/compat/linux/linux_socket.c
head/sys/compat/linux/linux_stats.c
head/sys/compat/linuxkpi/common/include/linux/file.h
head/sys/dev/filemon/filemon.c
head/sys/dev/hwpmc/hwpmc_logging.c
head/sys/fs/fdescfs/fdesc_vnops.c
head/sys/fs/fuse/fuse_vfsops.c
head/sys/kern/kern_descrip.c
head/sys/kern/kern_event.c
head/sys/kern/kern_exec.c
head/sys/kern/kern_sendfile.c
head/sys/kern/kern_sig.c
head/sys/kern/subr_capability.c
head/sys/kern/sys_generic.c
head/sys/kern/sys_procdesc.c
head/sys/kern/uipc_mqueue.c
head/sys/kern/uipc_sem.c
head/sys/kern/uipc_syscalls.c
head/sys/kern/vfs_aio.c
head/sys/kern/vfs_syscalls.c
head/sys/netsmb/smb_dev.c
head/sys/sys/capsicum.h
Modified: head/sys/cddl/compat/opensolaris/sys/file.h
==============================================================================
--- head/sys/cddl/compat/opensolaris/sys/file.h Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/cddl/compat/opensolaris/sys/file.h Wed May 9 18:47:24 2018 (r333425)
@@ -52,10 +52,9 @@ static __inline void
releasef(int fd)
{
struct file *fp;
- cap_rights_t rights;
/* No CAP_ rights required, as we're only releasing. */
- if (fget(curthread, fd, cap_rights_init(&rights), &fp) == 0) {
+ if (fget(curthread, fd, &cap_no_rights, &fp) == 0) {
fdrop(fp, curthread);
fdrop(fp, curthread);
}
Modified: head/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_ioctl.c
==============================================================================
--- head/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_ioctl.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_ioctl.c Wed May 9 18:47:24 2018 (r333425)
@@ -4446,7 +4446,6 @@ zfs_ioc_recv(zfs_cmd_t *zc)
char *origin = NULL;
char *tosnap;
char tofs[ZFS_MAX_DATASET_NAME_LEN];
- cap_rights_t rights;
boolean_t first_recvd_props = B_FALSE;
if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0 ||
@@ -4467,7 +4466,7 @@ zfs_ioc_recv(zfs_cmd_t *zc)
#ifdef illumos
fp = getf(fd);
#else
- fget_read(curthread, fd, cap_rights_init(&rights, CAP_PREAD), &fp);
+ fget_read(curthread, fd, &cap_pread_rights, &fp);
#endif
if (fp == NULL) {
nvlist_free(props);
@@ -4744,13 +4743,11 @@ zfs_ioc_send(zfs_cmd_t *zc)
dsl_pool_rele(dp, FTAG);
} else {
file_t *fp;
- cap_rights_t rights;
#ifdef illumos
fp = getf(zc->zc_cookie);
#else
- fget_write(curthread, zc->zc_cookie,
- cap_rights_init(&rights, CAP_WRITE), &fp);
+ fget_write(curthread, zc->zc_cookie, &cap_write_rights, &fp);
#endif
if (fp == NULL)
return (SET_ERROR(EBADF));
@@ -5387,15 +5384,13 @@ static int
zfs_ioc_diff(zfs_cmd_t *zc)
{
file_t *fp;
- cap_rights_t rights;
offset_t off;
int error;
#ifdef illumos
fp = getf(zc->zc_cookie);
#else
- fget_write(curthread, zc->zc_cookie,
- cap_rights_init(&rights, CAP_WRITE), &fp);
+ fget_write(curthread, zc->zc_cookie, &cap_write_rights, &fp);
#endif
if (fp == NULL)
return (SET_ERROR(EBADF));
@@ -5787,7 +5782,6 @@ zfs_ioc_unjail(zfs_cmd_t *zc)
static int
zfs_ioc_send_new(const char *snapname, nvlist_t *innvl, nvlist_t *outnvl)
{
- cap_rights_t rights;
file_t *fp;
int error;
offset_t off;
@@ -5815,7 +5809,7 @@ zfs_ioc_send_new(const char *snapname, nvlist_t *innvl
#ifdef illumos
file_t *fp = getf(fd);
#else
- fget_write(curthread, fd, cap_rights_init(&rights, CAP_WRITE), &fp);
+ fget_write(curthread, fd, &cap_write_rights, &fp);
#endif
if (fp == NULL)
return (SET_ERROR(EBADF));
Modified: head/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_onexit.c
==============================================================================
--- head/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_onexit.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_onexit.c Wed May 9 18:47:24 2018 (r333425)
@@ -126,7 +126,7 @@ zfs_onexit_fd_hold(int fd, minor_t *minorp)
void *data;
int error;
- fp = getf(fd, cap_rights_init(&rights));
+ fp = getf(fd, &cap_no_rights);
if (fp == NULL)
return (SET_ERROR(EBADF));
Modified: head/sys/compat/cloudabi/cloudabi_file.c
==============================================================================
--- head/sys/compat/cloudabi/cloudabi_file.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/compat/cloudabi/cloudabi_file.c Wed May 9 18:47:24 2018 (r333425)
@@ -390,12 +390,11 @@ cloudabi_sys_file_readdir(struct thread *td,
struct file *fp;
struct vnode *vp;
void *readbuf;
- cap_rights_t rights;
cloudabi_dircookie_t offset;
int error;
/* Obtain directory vnode. */
- error = getvnode(td, uap->fd, cap_rights_init(&rights, CAP_READ), &fp);
+ error = getvnode(td, uap->fd, &cap_read_rights, &fp);
if (error != 0) {
if (error == EINVAL)
return (ENOTDIR);
@@ -559,14 +558,13 @@ cloudabi_sys_file_stat_fget(struct thread *td,
struct stat sb;
cloudabi_filestat_t csb;
struct file *fp;
- cap_rights_t rights;
cloudabi_filetype_t filetype;
int error;
memset(&csb, 0, sizeof(csb));
/* Fetch file descriptor attributes. */
- error = fget(td, uap->fd, cap_rights_init(&rights, CAP_FSTAT), &fp);
+ error = fget(td, uap->fd, &cap_fstat_rights, &fp);
if (error != 0)
return (error);
error = fo_stat(fp, &sb, td->td_ucred, td);
Modified: head/sys/compat/linux/linux_event.c
==============================================================================
--- head/sys/compat/linux/linux_event.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/compat/linux/linux_event.c Wed May 9 18:47:24 2018 (r333425)
@@ -1190,14 +1190,13 @@ linux_timerfd_curval(struct timerfd *tfd, struct itime
int
linux_timerfd_gettime(struct thread *td, struct linux_timerfd_gettime_args *args)
{
- cap_rights_t rights;
struct l_itimerspec lots;
struct itimerspec ots;
struct timerfd *tfd;
struct file *fp;
int error;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_READ), &fp);
+ error = fget(td, args->fd, &cap_read_rights, &fp);
if (error != 0)
return (error);
tfd = fp->f_data;
@@ -1225,7 +1224,6 @@ linux_timerfd_settime(struct thread *td, struct linux_
struct l_itimerspec lots;
struct itimerspec nts, ots;
struct timespec cts, ts;
- cap_rights_t rights;
struct timerfd *tfd;
struct timeval tv;
struct file *fp;
@@ -1241,7 +1239,7 @@ linux_timerfd_settime(struct thread *td, struct linux_
if (error != 0)
return (error);
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_WRITE), &fp);
+ error = fget(td, args->fd, &cap_write_rights, &fp);
if (error != 0)
return (error);
tfd = fp->f_data;
Modified: head/sys/compat/linux/linux_file.c
==============================================================================
--- head/sys/compat/linux/linux_file.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/compat/linux/linux_file.c Wed May 9 18:47:24 2018 (r333425)
@@ -89,7 +89,6 @@ linux_creat(struct thread *td, struct linux_creat_args
static int
linux_common_open(struct thread *td, int dirfd, char *path, int l_flags, int mode)
{
- cap_rights_t rights;
struct proc *p = td->td_proc;
struct file *fp;
int fd;
@@ -144,7 +143,7 @@ linux_common_open(struct thread *td, int dirfd, char *
* checking below.
*/
fd = td->td_retval[0];
- if (fget(td, fd, cap_rights_init(&rights, CAP_IOCTL), &fp) == 0) {
+ if (fget(td, fd, &cap_ioctl_rights, &fp) == 0) {
if (fp->f_type != DTYPE_VNODE) {
fdrop(fp, td);
goto done;
@@ -263,13 +262,12 @@ linux_llseek(struct thread *td, struct linux_llseek_ar
static int
linux_getdents_error(struct thread *td, int fd, int err)
{
- cap_rights_t rights;
struct vnode *vp;
struct file *fp;
int error;
/* Linux return ENOTDIR in case when fd is not a directory. */
- error = getvnode(td, fd, cap_rights_init(&rights, CAP_READ), &fp);
+ error = getvnode(td, fd, &cap_read_rights, &fp);
if (error != 0)
return (error);
vp = fp->f_vnode;
@@ -985,15 +983,13 @@ linux_fdatasync(td, uap)
int
linux_pread(struct thread *td, struct linux_pread_args *uap)
{
- cap_rights_t rights;
struct vnode *vp;
int error;
error = kern_pread(td, uap->fd, uap->buf, uap->nbyte, uap->offset);
if (error == 0) {
/* This seems to violate POSIX but Linux does it. */
- error = fgetvp(td, uap->fd,
- cap_rights_init(&rights, CAP_PREAD), &vp);
+ error = fgetvp(td, uap->fd, &cap_pread_rights, &vp);
if (error != 0)
return (error);
if (vp->v_type == VDIR) {
@@ -1275,7 +1271,6 @@ fcntl_common(struct thread *td, struct linux_fcntl_arg
{
struct l_flock linux_flock;
struct flock bsd_flock;
- cap_rights_t rights;
struct file *fp;
long arg;
int error, result;
@@ -1379,7 +1374,7 @@ fcntl_common(struct thread *td, struct linux_fcntl_arg
* pipes under Linux-2.2.35 at least).
*/
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_FCNTL), &fp);
+ &cap_fcntl_rights, &fp);
if (error)
return (error);
if (fp->f_type == DTYPE_PIPE) {
Modified: head/sys/compat/linux/linux_ioctl.c
==============================================================================
--- head/sys/compat/linux/linux_ioctl.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/compat/linux/linux_ioctl.c Wed May 9 18:47:24 2018 (r333425)
@@ -194,13 +194,12 @@ struct linux_hd_big_geometry {
static int
linux_ioctl_hdio(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
int error;
u_int sectorsize, fwcylinders, fwheads, fwsectors;
off_t mediasize, bytespercyl;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
switch (args->cmd & 0xffff) {
@@ -278,13 +277,12 @@ linux_ioctl_hdio(struct thread *td, struct linux_ioctl
static int
linux_ioctl_disk(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
int error;
u_int sectorsize;
off_t mediasize;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
switch (args->cmd & 0xffff) {
@@ -717,11 +715,10 @@ linux_ioctl_termio(struct thread *td, struct linux_ioc
struct termios bios;
struct linux_termios lios;
struct linux_termio lio;
- cap_rights_t rights;
struct file *fp;
int error;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
@@ -1461,11 +1458,10 @@ bsd_to_linux_dvd_authinfo(struct dvd_authinfo *bp, l_d
static int
linux_ioctl_cdrom(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
int error;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
switch (args->cmd & 0xffff) {
@@ -1998,11 +1994,10 @@ linux_ioctl_sound(struct thread *td, struct linux_ioct
static int
linux_ioctl_console(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
int error;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
switch (args->cmd & 0xffff) {
@@ -2411,7 +2406,6 @@ static int
linux_ioctl_socket(struct thread *td, struct linux_ioctl_args *args)
{
char lifname[LINUX_IFNAMSIZ], ifname[IFNAMSIZ];
- cap_rights_t rights;
struct ifnet *ifp;
struct file *fp;
int error, type;
@@ -2419,7 +2413,7 @@ linux_ioctl_socket(struct thread *td, struct linux_ioc
ifp = NULL;
error = 0;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
type = fp->f_type;
@@ -2649,11 +2643,10 @@ linux_ioctl_socket(struct thread *td, struct linux_ioc
static int
linux_ioctl_private(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
int error, type;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
type = fp->f_type;
@@ -2685,11 +2678,10 @@ linux_ioctl_sg_io(struct thread *td, struct linux_ioct
{
struct sg_io_hdr io;
struct sg_io_hdr32 io32;
- cap_rights_t rights;
struct file *fp;
int error;
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0) {
printf("sg_linux_ioctl: fget returned %d\n", error);
return (error);
@@ -2997,7 +2989,6 @@ linux_v4l_cliplist_copy(struct l_video_window *lvw, st
static int
linux_ioctl_v4l(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
int error;
struct video_tuner vtun;
@@ -3016,7 +3007,7 @@ linux_ioctl_v4l(struct thread *td, struct linux_ioctl_
case LINUX_VIDIOCGTUNER:
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
error = copyin((void *) args->arg, &l_vtun, sizeof(l_vtun));
@@ -3036,7 +3027,7 @@ linux_ioctl_v4l(struct thread *td, struct linux_ioctl_
case LINUX_VIDIOCSTUNER:
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
error = copyin((void *) args->arg, &l_vtun, sizeof(l_vtun));
@@ -3055,7 +3046,7 @@ linux_ioctl_v4l(struct thread *td, struct linux_ioctl_
case LINUX_VIDIOCGWIN:
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
error = fo_ioctl(fp, VIDIOCGWIN, &vwin, td->td_ucred, td);
@@ -3069,7 +3060,7 @@ linux_ioctl_v4l(struct thread *td, struct linux_ioctl_
case LINUX_VIDIOCSWIN:
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
error = copyin((void *) args->arg, &l_vwin, sizeof(l_vwin));
@@ -3094,7 +3085,7 @@ linux_ioctl_v4l(struct thread *td, struct linux_ioctl_
case LINUX_VIDIOCGFBUF:
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
error = fo_ioctl(fp, VIDIOCGFBUF, &vbuf, td->td_ucred, td);
@@ -3108,7 +3099,7 @@ linux_ioctl_v4l(struct thread *td, struct linux_ioctl_
case LINUX_VIDIOCSFBUF:
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
error = copyin((void *) args->arg, &l_vbuf, sizeof(l_vbuf));
@@ -3138,7 +3129,7 @@ linux_ioctl_v4l(struct thread *td, struct linux_ioctl_
case LINUX_VIDIOCSMICROCODE:
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
error = copyin((void *) args->arg, &l_vcode, sizeof(l_vcode));
@@ -3302,7 +3293,6 @@ bsd_to_linux_v4l2_format(struct v4l2_format *vf, struc
static int
linux_ioctl_v4l2(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
int error;
struct v4l2_format vformat;
@@ -3395,7 +3385,7 @@ linux_ioctl_v4l2(struct thread *td, struct linux_ioctl
if (error)
return (error);
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error)
return (error);
if (linux_to_bsd_v4l2_format(&l_vformat, &vformat) != 0)
@@ -3420,7 +3410,7 @@ linux_ioctl_v4l2(struct thread *td, struct linux_ioctl
return (error);
linux_to_bsd_v4l2_standard(&l_vstd, &vstd);
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error)
return (error);
error = fo_ioctl(fp, VIDIOC_ENUMSTD, (caddr_t)&vstd,
@@ -3444,7 +3434,7 @@ linux_ioctl_v4l2(struct thread *td, struct linux_ioctl
if (error != 0)
return (error);
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
error = fo_ioctl(fp, VIDIOC_ENUMINPUT, (caddr_t)&vinp,
@@ -3465,7 +3455,7 @@ linux_ioctl_v4l2(struct thread *td, struct linux_ioctl
if (error)
return (error);
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error)
return (error);
linux_to_bsd_v4l2_buffer(&l_vbuf, &vbuf);
@@ -3640,7 +3630,6 @@ linux_ioctl_fbsd_usb(struct thread *td, struct linux_i
static int
linux_ioctl_evdev(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
clockid_t clock;
int error;
@@ -3668,7 +3657,7 @@ linux_ioctl_evdev(struct thread *td, struct linux_ioct
return (error);
error = fget(td, args->fd,
- cap_rights_init(&rights, CAP_IOCTL), &fp);
+ &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
@@ -3694,7 +3683,6 @@ linux_ioctl_evdev(struct thread *td, struct linux_ioct
int
linux_ioctl(struct thread *td, struct linux_ioctl_args *args)
{
- cap_rights_t rights;
struct file *fp;
struct handler_element *he;
int error, cmd;
@@ -3705,7 +3693,7 @@ linux_ioctl(struct thread *td, struct linux_ioctl_args
(unsigned long)args->cmd);
#endif
- error = fget(td, args->fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
+ error = fget(td, args->fd, &cap_ioctl_rights, &fp);
if (error != 0)
return (error);
if ((fp->f_flag & (FREAD|FWRITE)) == 0) {
Modified: head/sys/compat/linux/linux_mmap.c
==============================================================================
--- head/sys/compat/linux/linux_mmap.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/compat/linux/linux_mmap.c Wed May 9 18:47:24 2018 (r333425)
@@ -72,7 +72,6 @@ linux_mmap_common(struct thread *td, uintptr_t addr, s
int bsd_flags, error;
struct file *fp;
- cap_rights_t rights;
LINUX_CTR6(mmap2, "0x%lx, %ld, %ld, 0x%08lx, %ld, 0x%lx",
addr, len, prot, flags, fd, pos);
@@ -126,7 +125,7 @@ linux_mmap_common(struct thread *td, uintptr_t addr, s
* protection options specified.
*/
- error = fget(td, fd, cap_rights_init(&rights, CAP_MMAP), &fp);
+ error = fget(td, fd, &cap_mmap_rights, &fp);
if (error != 0)
return (error);
if (fp->f_type != DTYPE_VNODE && fp->f_type != DTYPE_DEV) {
Modified: head/sys/compat/linux/linux_socket.c
==============================================================================
--- head/sys/compat/linux/linux_socket.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/compat/linux/linux_socket.c Wed May 9 18:47:24 2018 (r333425)
@@ -766,7 +766,6 @@ linux_bind(struct thread *td, struct linux_bind_args *
int
linux_connect(struct thread *td, struct linux_connect_args *args)
{
- cap_rights_t rights;
struct socket *so;
struct sockaddr *sa;
struct file *fp;
@@ -788,7 +787,7 @@ linux_connect(struct thread *td, struct linux_connect_
* when on a non-blocking socket. Instead it returns the
* error getsockopt(SOL_SOCKET, SO_ERROR) would return on BSD.
*/
- error = getsock_cap(td, args->s, cap_rights_init(&rights, CAP_CONNECT),
+ error = getsock_cap(td, args->s, &cap_connect_rights,
&fp, &fflag, NULL);
if (error != 0)
return (error);
@@ -824,7 +823,6 @@ linux_accept_common(struct thread *td, int s, l_uintpt
socklen_t * __restrict anamelen;
int flags;
} */ bsd_args;
- cap_rights_t rights;
struct socket *so;
struct file *fp;
int error, error1;
@@ -842,8 +840,7 @@ linux_accept_common(struct thread *td, int s, l_uintpt
if (error == EFAULT && namelen != sizeof(struct sockaddr_in))
return (EINVAL);
if (error == EINVAL) {
- error1 = getsock_cap(td, s,
- cap_rights_init(&rights, CAP_ACCEPT), &fp, NULL, NULL);
+ error1 = getsock_cap(td, s, &cap_accept_rights, &fp, NULL, NULL);
if (error1 != 0)
return (error1);
so = fp->f_data;
Modified: head/sys/compat/linux/linux_stats.c
==============================================================================
--- head/sys/compat/linux/linux_stats.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/compat/linux/linux_stats.c Wed May 9 18:47:24 2018 (r333425)
@@ -103,14 +103,13 @@ translate_fd_major_minor(struct thread *td, int fd, st
{
struct file *fp;
struct vnode *vp;
- cap_rights_t rights;
int major, minor;
/*
* No capability rights required here.
*/
if ((!S_ISCHR(buf->st_mode) && !S_ISBLK(buf->st_mode)) ||
- fget(td, fd, cap_rights_init(&rights), &fp) != 0)
+ fget(td, fd, &cap_no_rights, &fp) != 0)
return;
vp = fp->f_vnode;
if (vp != NULL && vp->v_rdev != NULL &&
@@ -680,12 +679,11 @@ linux_newfstatat(struct thread *td, struct linux_newfs
int
linux_syncfs(struct thread *td, struct linux_syncfs_args *args)
{
- cap_rights_t rights;
struct mount *mp;
struct vnode *vp;
int error, save;
- error = fgetvp(td, args->fd, cap_rights_init(&rights, CAP_FSYNC), &vp);
+ error = fgetvp(td, args->fd, &cap_fsync_rights, &vp);
if (error != 0)
/*
* Linux syncfs() returns only EBADF, however fgetvp()
Modified: head/sys/compat/linuxkpi/common/include/linux/file.h
==============================================================================
--- head/sys/compat/linuxkpi/common/include/linux/file.h Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/compat/linuxkpi/common/include/linux/file.h Wed May 9 18:47:24 2018 (r333425)
@@ -50,12 +50,11 @@ extern struct fileops linuxfileops;
static inline struct linux_file *
linux_fget(unsigned int fd)
{
- cap_rights_t rights;
struct file *file;
/* lookup file pointer by file descriptor index */
if (fget_unlocked(curthread->td_proc->p_fd, fd,
- cap_rights_init(&rights), &file, NULL) != 0)
+ &cap_no_rights, &file, NULL) != 0)
return (NULL);
/* check if file handle really belongs to us */
@@ -88,11 +87,10 @@ file_count(struct linux_file *filp)
static inline void
put_unused_fd(unsigned int fd)
{
- cap_rights_t rights;
struct file *file;
if (fget_unlocked(curthread->td_proc->p_fd, fd,
- cap_rights_init(&rights), &file, NULL) != 0) {
+ &cap_no_rights, &file, NULL) != 0) {
return;
}
/*
@@ -109,11 +107,10 @@ put_unused_fd(unsigned int fd)
static inline void
fd_install(unsigned int fd, struct linux_file *filp)
{
- cap_rights_t rights;
struct file *file;
if (fget_unlocked(curthread->td_proc->p_fd, fd,
- cap_rights_init(&rights), &file, NULL) != 0) {
+ &cap_no_rights, &file, NULL) != 0) {
filp->_file = NULL;
} else {
filp->_file = file;
Modified: head/sys/dev/filemon/filemon.c
==============================================================================
--- head/sys/dev/filemon/filemon.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/dev/filemon/filemon.c Wed May 9 18:47:24 2018 (r333425)
@@ -361,7 +361,6 @@ filemon_ioctl(struct cdev *dev, u_long cmd, caddr_t da
int error = 0;
struct filemon *filemon;
struct proc *p;
- cap_rights_t rights;
if ((error = devfs_get_cdevpriv((void **) &filemon)) != 0)
return (error);
@@ -377,7 +376,7 @@ filemon_ioctl(struct cdev *dev, u_long cmd, caddr_t da
}
error = fget_write(td, *(int *)data,
- cap_rights_init(&rights, CAP_PWRITE),
+ &cap_pwrite_rights,
&filemon->fp);
if (error == 0)
/* Write the file header. */
Modified: head/sys/dev/hwpmc/hwpmc_logging.c
==============================================================================
--- head/sys/dev/hwpmc/hwpmc_logging.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/dev/hwpmc/hwpmc_logging.c Wed May 9 18:47:24 2018 (r333425)
@@ -638,7 +638,6 @@ int
pmclog_configure_log(struct pmc_mdep *md, struct pmc_owner *po, int logfd)
{
struct proc *p;
- cap_rights_t rights;
int error;
sx_assert(&pmc_sx, SA_XLOCKED);
@@ -655,8 +654,7 @@ pmclog_configure_log(struct pmc_mdep *md, struct pmc_o
po->po_file));
/* get a reference to the file state */
- error = fget_write(curthread, logfd,
- cap_rights_init(&rights, CAP_WRITE), &po->po_file);
+ error = fget_write(curthread, logfd, &cap_write_rights, &po->po_file);
if (error)
goto error;
Modified: head/sys/fs/fdescfs/fdesc_vnops.c
==============================================================================
--- head/sys/fs/fdescfs/fdesc_vnops.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/fs/fdescfs/fdesc_vnops.c Wed May 9 18:47:24 2018 (r333425)
@@ -286,7 +286,6 @@ fdesc_lookup(struct vop_lookup_args *ap)
struct thread *td = cnp->cn_thread;
struct file *fp;
struct fdesc_get_ino_args arg;
- cap_rights_t rights;
int nlen = cnp->cn_namelen;
u_int fd, fd1;
int error;
@@ -331,7 +330,7 @@ fdesc_lookup(struct vop_lookup_args *ap)
/*
* No rights to check since 'fp' isn't actually used.
*/
- if ((error = fget(td, fd, cap_rights_init(&rights), &fp)) != 0)
+ if ((error = fget(td, fd, &cap_no_rights, &fp)) != 0)
goto bad;
/* Check if we're looking up ourselves. */
@@ -613,7 +612,6 @@ static int
fdesc_readlink(struct vop_readlink_args *va)
{
struct vnode *vp, *vn;
- cap_rights_t rights;
struct thread *td;
struct uio *uio;
struct file *fp;
@@ -631,7 +629,7 @@ fdesc_readlink(struct vop_readlink_args *va)
VOP_UNLOCK(vn, 0);
td = curthread;
- error = fget_cap(td, fd_fd, cap_rights_init(&rights), &fp, NULL);
+ error = fget_cap(td, fd_fd, &cap_no_rights, &fp, NULL);
if (error != 0)
goto out;
Modified: head/sys/fs/fuse/fuse_vfsops.c
==============================================================================
--- head/sys/fs/fuse/fuse_vfsops.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/fs/fuse/fuse_vfsops.c Wed May 9 18:47:24 2018 (r333425)
@@ -222,7 +222,6 @@ fuse_vfsop_mount(struct mount *mp)
struct file *fp, *fptmp;
char *fspec, *subtype;
struct vfsoptlist *opts;
- cap_rights_t rights;
subtype = NULL;
max_read_set = 0;
@@ -292,7 +291,7 @@ fuse_vfsop_mount(struct mount *mp)
FS_DEBUG2G("mntopts 0x%jx\n", (uintmax_t)mntopts);
- err = fget(td, fd, cap_rights_init(&rights, CAP_READ), &fp);
+ err = fget(td, fd, &cap_read_rights, &fp);
if (err != 0) {
FS_DEBUG("invalid or not opened device: data=%p\n", data);
goto out;
Modified: head/sys/kern/kern_descrip.c
==============================================================================
--- head/sys/kern/kern_descrip.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/kern/kern_descrip.c Wed May 9 18:47:24 2018 (r333425)
@@ -490,7 +490,6 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
struct filedescent *fde;
struct proc *p;
struct vnode *vp;
- cap_rights_t rights;
int error, flg, tmp;
uint64_t bsize;
off_t foffset;
@@ -548,8 +547,7 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
break;
case F_GETFL:
- error = fget_fcntl(td, fd,
- cap_rights_init(&rights, CAP_FCNTL), F_GETFL, &fp);
+ error = fget_fcntl(td, fd, &cap_fcntl_rights, F_GETFL, &fp);
if (error != 0)
break;
td->td_retval[0] = OFLAGS(fp->f_flag);
@@ -557,8 +555,7 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
break;
case F_SETFL:
- error = fget_fcntl(td, fd,
- cap_rights_init(&rights, CAP_FCNTL), F_SETFL, &fp);
+ error = fget_fcntl(td, fd, &cap_fcntl_rights, F_SETFL, &fp);
if (error != 0)
break;
do {
@@ -585,8 +582,7 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
break;
case F_GETOWN:
- error = fget_fcntl(td, fd,
- cap_rights_init(&rights, CAP_FCNTL), F_GETOWN, &fp);
+ error = fget_fcntl(td, fd, &cap_fcntl_rights, F_GETOWN, &fp);
if (error != 0)
break;
error = fo_ioctl(fp, FIOGETOWN, &tmp, td->td_ucred, td);
@@ -596,8 +592,7 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
break;
case F_SETOWN:
- error = fget_fcntl(td, fd,
- cap_rights_init(&rights, CAP_FCNTL), F_SETOWN, &fp);
+ error = fget_fcntl(td, fd, &cap_fcntl_rights, F_SETOWN, &fp);
if (error != 0)
break;
tmp = arg;
@@ -618,8 +613,7 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
case F_SETLK:
do_setlk:
- cap_rights_init(&rights, CAP_FLOCK);
- error = fget_unlocked(fdp, fd, &rights, &fp, NULL);
+ error = fget_unlocked(fdp, fd, &cap_flock_rights, &fp, NULL);
if (error != 0)
break;
if (fp->f_type != DTYPE_VNODE) {
@@ -711,7 +705,7 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
* that the closing thread was a bit slower and that the
* advisory lock succeeded before the close.
*/
- error = fget_unlocked(fdp, fd, &rights, &fp2, NULL);
+ error = fget_unlocked(fdp, fd, &cap_no_rights, &fp2, NULL);
if (error != 0) {
fdrop(fp, td);
break;
@@ -729,8 +723,7 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
break;
case F_GETLK:
- error = fget_unlocked(fdp, fd,
- cap_rights_init(&rights, CAP_FLOCK), &fp, NULL);
+ error = fget_unlocked(fdp, fd, &cap_flock_rights, &fp, NULL);
if (error != 0)
break;
if (fp->f_type != DTYPE_VNODE) {
@@ -767,8 +760,7 @@ kern_fcntl(struct thread *td, int fd, int cmd, intptr_
arg = arg ? 128 * 1024: 0;
/* FALLTHROUGH */
case F_READAHEAD:
- error = fget_unlocked(fdp, fd,
- cap_rights_init(&rights), &fp, NULL);
+ error = fget_unlocked(fdp, fd, &cap_no_rights, &fp, NULL);
if (error != 0)
break;
if (fp->f_type != DTYPE_VNODE) {
@@ -1363,12 +1355,11 @@ int
kern_fstat(struct thread *td, int fd, struct stat *sbp)
{
struct file *fp;
- cap_rights_t rights;
int error;
AUDIT_ARG_FD(fd);
- error = fget(td, fd, cap_rights_init(&rights, CAP_FSTAT), &fp);
+ error = fget(td, fd, &cap_fstat_rights, &fp);
if (error != 0)
return (error);
@@ -1445,10 +1436,9 @@ kern_fpathconf(struct thread *td, int fd, int name, lo
{
struct file *fp;
struct vnode *vp;
- cap_rights_t rights;
int error;
- error = fget(td, fd, cap_rights_init(&rights, CAP_FPATHCONF), &fp);
+ error = fget(td, fd, &cap_fpathconf_rights, &fp);
if (error != 0)
return (error);
@@ -2982,10 +2972,9 @@ sys_flock(struct thread *td, struct flock_args *uap)
struct file *fp;
struct vnode *vp;
struct flock lf;
- cap_rights_t rights;
int error;
- error = fget(td, uap->fd, cap_rights_init(&rights, CAP_FLOCK), &fp);
+ error = fget(td, uap->fd, &cap_flock_rights, &fp);
if (error != 0)
return (error);
if (fp->f_type != DTYPE_VNODE) {
@@ -3633,7 +3622,7 @@ kern_proc_filedesc_out(struct proc *p, struct sbuf *s
#ifdef CAPABILITIES
rights = *cap_rights(fdp, i);
#else /* !CAPABILITIES */
- cap_rights_init(&rights);
+ rights = cap_no_rights;
#endif
/*
* Create sysctl entry. It is OK to drop the filedesc
Modified: head/sys/kern/kern_event.c
==============================================================================
--- head/sys/kern/kern_event.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/kern/kern_event.c Wed May 9 18:47:24 2018 (r333425)
@@ -1286,7 +1286,6 @@ kqueue_register(struct kqueue *kq, struct kevent *kev,
struct file *fp;
struct knote *kn, *tkn;
struct knlist *knl;
- cap_rights_t rights;
int error, filt, event;
int haskqglobal, filedesc_unlock;
@@ -1322,8 +1321,7 @@ findkn:
if (kev->ident > INT_MAX)
error = EBADF;
else
- error = fget(td, kev->ident,
- cap_rights_init(&rights, CAP_EVENT), &fp);
+ error = fget(td, kev->ident, &cap_event_rights, &fp);
if (error)
goto done;
Modified: head/sys/kern/kern_exec.c
==============================================================================
--- head/sys/kern/kern_exec.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/kern/kern_exec.c Wed May 9 18:47:24 2018 (r333425)
@@ -374,7 +374,6 @@ do_execve(struct thread *td, struct image_args *args,
struct ucred *tracecred = NULL;
#endif
struct vnode *oldtextvp = NULL, *newtextvp;
- cap_rights_t rights;
int credential_changing;
int textset;
#ifdef MAC
@@ -455,8 +454,7 @@ interpret:
/*
* Descriptors opened only with O_EXEC or O_RDONLY are allowed.
*/
- error = fgetvp_exec(td, args->fd,
- cap_rights_init(&rights, CAP_FEXECVE), &newtextvp);
+ error = fgetvp_exec(td, args->fd, &cap_fexecve_rights, &newtextvp);
if (error)
goto exec_fail;
vn_lock(newtextvp, LK_EXCLUSIVE | LK_RETRY);
Modified: head/sys/kern/kern_sendfile.c
==============================================================================
--- head/sys/kern/kern_sendfile.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/kern/kern_sendfile.c Wed May 9 18:47:24 2018 (r333425)
@@ -511,7 +511,6 @@ static int
sendfile_getsock(struct thread *td, int s, struct file **sock_fp,
struct socket **so)
{
- cap_rights_t rights;
int error;
*sock_fp = NULL;
@@ -520,7 +519,7 @@ sendfile_getsock(struct thread *td, int s, struct file
/*
* The socket must be a stream socket and connected.
*/
- error = getsock_cap(td, s, cap_rights_init(&rights, CAP_SEND),
+ error = getsock_cap(td, s, &cap_send_rights,
sock_fp, NULL, NULL);
if (error != 0)
return (error);
@@ -949,7 +948,6 @@ sendfile(struct thread *td, struct sendfile_args *uap,
struct sf_hdtr hdtr;
struct uio *hdr_uio, *trl_uio;
struct file *fp;
- cap_rights_t rights;
off_t sbytes;
int error;
@@ -1000,10 +998,8 @@ sendfile(struct thread *td, struct sendfile_args *uap,
* sendfile(2) can start at any offset within a file so we require
* CAP_READ+CAP_SEEK = CAP_PREAD.
*/
- if ((error = fget_read(td, uap->fd,
- cap_rights_init(&rights, CAP_PREAD), &fp)) != 0) {
+ if ((error = fget_read(td, uap->fd, &cap_pread_rights, &fp)) != 0)
goto out;
- }
error = fo_sendfile(fp, uap->s, hdr_uio, trl_uio, uap->offset,
uap->nbytes, &sbytes, uap->flags, td);
Modified: head/sys/kern/kern_sig.c
==============================================================================
--- head/sys/kern/kern_sig.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/kern/kern_sig.c Wed May 9 18:47:24 2018 (r333425)
@@ -1789,7 +1789,6 @@ int
sys_pdkill(struct thread *td, struct pdkill_args *uap)
{
struct proc *p;
- cap_rights_t rights;
int error;
AUDIT_ARG_SIGNUM(uap->signum);
@@ -1797,8 +1796,7 @@ sys_pdkill(struct thread *td, struct pdkill_args *uap)
if ((u_int)uap->signum > _SIG_MAXSIG)
return (EINVAL);
- error = procdesc_find(td, uap->fd,
- cap_rights_init(&rights, CAP_PDKILL), &p);
+ error = procdesc_find(td, uap->fd, &cap_pdkill_rights, &p);
if (error)
return (error);
AUDIT_ARG_PROCESS(p);
Modified: head/sys/kern/subr_capability.c
==============================================================================
--- head/sys/kern/subr_capability.c Wed May 9 18:41:04 2018 (r333424)
+++ head/sys/kern/subr_capability.c Wed May 9 18:47:24 2018 (r333425)
@@ -41,7 +41,7 @@ __FBSDID("$FreeBSD$");
#ifdef _KERNEL
#include <sys/systm.h>
-
+#include <sys/kernel.h>
#include <machine/stdarg.h>
#else /* !_KERNEL */
#include <assert.h>
@@ -53,6 +53,38 @@ __FBSDID("$FreeBSD$");
#ifdef _KERNEL
#define assert(exp) KASSERT((exp), ("%s:%u", __func__, __LINE__))
+
+CAP_RIGHTS_DEFINE1(cap_accept_rights, CAP_ACCEPT);
+CAP_RIGHTS_DEFINE1(cap_bind_rights, CAP_BIND);
+CAP_RIGHTS_DEFINE1(cap_connect_rights, CAP_CONNECT);
+CAP_RIGHTS_DEFINE1(cap_event_rights, CAP_EVENT);
+CAP_RIGHTS_DEFINE1(cap_fchdir_rights, CAP_FCHDIR);
+CAP_RIGHTS_DEFINE1(cap_fcntl_rights, CAP_FCNTL);
+CAP_RIGHTS_DEFINE1(cap_fexecve_rights, CAP_FEXECVE);
+CAP_RIGHTS_DEFINE1(cap_flock_rights, CAP_FLOCK);
+CAP_RIGHTS_DEFINE1(cap_fpathconf_rights, CAP_FPATHCONF);
+CAP_RIGHTS_DEFINE1(cap_fstat_rights, CAP_FSTAT);
+CAP_RIGHTS_DEFINE1(cap_fsync_rights, CAP_FSYNC);
+CAP_RIGHTS_DEFINE1(cap_ftruncate_rights, CAP_FTRUNCATE);
+CAP_RIGHTS_DEFINE1(cap_getpeername_rights, CAP_GETPEERNAME);
+CAP_RIGHTS_DEFINE1(cap_getsockname_rights, CAP_GETSOCKNAME);
+CAP_RIGHTS_DEFINE1(cap_getsockopt_rights, CAP_GETSOCKOPT);
+CAP_RIGHTS_DEFINE1(cap_ioctl_rights, CAP_IOCTL);
+CAP_RIGHTS_DEFINE1(cap_listen_rights, CAP_LISTEN);
+CAP_RIGHTS_DEFINE1(cap_mmap_rights, CAP_MMAP);
+CAP_RIGHTS_DEFINE1(cap_pdgetpid_rights, CAP_PDGETPID);
+CAP_RIGHTS_DEFINE1(cap_pdkill_rights, CAP_PDKILL);
+CAP_RIGHTS_DEFINE1(cap_pread_rights, CAP_PREAD);
+CAP_RIGHTS_DEFINE1(cap_pwrite_rights, CAP_PWRITE);
+CAP_RIGHTS_DEFINE1(cap_read_rights, CAP_READ);
+CAP_RIGHTS_DEFINE1(cap_recv_rights, CAP_RECV);
+CAP_RIGHTS_DEFINE1(cap_send_rights, CAP_SEND);
+CAP_RIGHTS_DEFINE1(cap_setsockopt_rights, CAP_SETSOCKOPT);
+CAP_RIGHTS_DEFINE1(cap_shutdown_rights, CAP_SHUTDOWN);
+CAP_RIGHTS_DEFINE1(cap_write_rights, CAP_WRITE);
+
+__read_mostly cap_rights_t cap_no_rights;
+CAP_RIGHTS_SYSINIT0(cap_no_rights, cap_no_rights);
#endif
#define CAPARSIZE_MIN (CAP_RIGHTS_VERSION_00 + 2)
*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
More information about the svn-src-head
mailing list