kern_thr.c revision 293480
1/*-
2 * Copyright (c) 2003, Jeffrey Roberson <jeff@freebsd.org>
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice unmodified, this list of conditions, and the following
10 *    disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 *    notice, this list of conditions and the following disclaimer in the
13 *    documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 */
26
27#include <sys/cdefs.h>
28__FBSDID("$FreeBSD: stable/10/sys/kern/kern_thr.c 293480 2016-01-09 14:36:44Z dchagin $");
29
30#include "opt_compat.h"
31#include "opt_posix.h"
32#include <sys/param.h>
33#include <sys/kernel.h>
34#include <sys/lock.h>
35#include <sys/mutex.h>
36#include <sys/priv.h>
37#include <sys/proc.h>
38#include <sys/posix4.h>
39#include <sys/racct.h>
40#include <sys/resourcevar.h>
41#include <sys/rwlock.h>
42#include <sys/sched.h>
43#include <sys/sysctl.h>
44#include <sys/smp.h>
45#include <sys/syscallsubr.h>
46#include <sys/sysent.h>
47#include <sys/systm.h>
48#include <sys/sysproto.h>
49#include <sys/signalvar.h>
50#include <sys/sysctl.h>
51#include <sys/ucontext.h>
52#include <sys/thr.h>
53#include <sys/rtprio.h>
54#include <sys/umtx.h>
55#include <sys/limits.h>
56
57#include <machine/frame.h>
58
59#include <security/audit/audit.h>
60
61static SYSCTL_NODE(_kern, OID_AUTO, threads, CTLFLAG_RW, 0,
62    "thread allocation");
63
64static int max_threads_per_proc = 1500;
65SYSCTL_INT(_kern_threads, OID_AUTO, max_threads_per_proc, CTLFLAG_RW,
66    &max_threads_per_proc, 0, "Limit on threads per proc");
67
68static int max_threads_hits;
69SYSCTL_INT(_kern_threads, OID_AUTO, max_threads_hits, CTLFLAG_RD,
70    &max_threads_hits, 0, "kern.threads.max_threads_per_proc hit count");
71
72#ifdef COMPAT_FREEBSD32
73
74static inline int
75suword_lwpid(void *addr, lwpid_t lwpid)
76{
77	int error;
78
79	if (SV_CURPROC_FLAG(SV_LP64))
80		error = suword(addr, lwpid);
81	else
82		error = suword32(addr, lwpid);
83	return (error);
84}
85
86#else
87#define suword_lwpid	suword
88#endif
89
90/*
91 * System call interface.
92 */
93
94struct thr_create_initthr_args {
95	ucontext_t ctx;
96	long *tid;
97};
98
99static int
100thr_create_initthr(struct thread *td, void *thunk)
101{
102	struct thr_create_initthr_args *args;
103
104	/* Copy out the child tid. */
105	args = thunk;
106	if (args->tid != NULL && suword_lwpid(args->tid, td->td_tid))
107		return (EFAULT);
108
109	return (set_mcontext(td, &args->ctx.uc_mcontext));
110}
111
112int
113sys_thr_create(struct thread *td, struct thr_create_args *uap)
114    /* ucontext_t *ctx, long *id, int flags */
115{
116	struct thr_create_initthr_args args;
117	int error;
118
119	if ((error = copyin(uap->ctx, &args.ctx, sizeof(args.ctx))))
120		return (error);
121	args.tid = uap->id;
122	return (thread_create(td, NULL, thr_create_initthr, &args));
123}
124
125int
126sys_thr_new(struct thread *td, struct thr_new_args *uap)
127    /* struct thr_param * */
128{
129	struct thr_param param;
130	int error;
131
132	if (uap->param_size < 0 || uap->param_size > sizeof(param))
133		return (EINVAL);
134	bzero(&param, sizeof(param));
135	if ((error = copyin(uap->param, &param, uap->param_size)))
136		return (error);
137	return (kern_thr_new(td, &param));
138}
139
140static int
141thr_new_initthr(struct thread *td, void *thunk)
142{
143	stack_t stack;
144	struct thr_param *param;
145
146	/*
147	 * Here we copy out tid to two places, one for child and one
148	 * for parent, because pthread can create a detached thread,
149	 * if parent wants to safely access child tid, it has to provide
150	 * its storage, because child thread may exit quickly and
151	 * memory is freed before parent thread can access it.
152	 */
153	param = thunk;
154	if ((param->child_tid != NULL &&
155	    suword_lwpid(param->child_tid, td->td_tid)) ||
156	    (param->parent_tid != NULL &&
157	    suword_lwpid(param->parent_tid, td->td_tid)))
158		return (EFAULT);
159
160	/* Set up our machine context. */
161	stack.ss_sp = param->stack_base;
162	stack.ss_size = param->stack_size;
163	/* Set upcall address to user thread entry function. */
164	cpu_set_upcall_kse(td, param->start_func, param->arg, &stack);
165	/* Setup user TLS address and TLS pointer register. */
166	return (cpu_set_user_tls(td, param->tls_base));
167}
168
169int
170kern_thr_new(struct thread *td, struct thr_param *param)
171{
172	struct rtprio rtp, *rtpp;
173	int error;
174
175	rtpp = NULL;
176	if (param->rtp != 0) {
177		error = copyin(param->rtp, &rtp, sizeof(struct rtprio));
178		if (error)
179			return (error);
180		rtpp = &rtp;
181	}
182	return (thread_create(td, rtpp, thr_new_initthr, param));
183}
184
185int
186thread_create(struct thread *td, struct rtprio *rtp,
187    int (*initialize_thread)(struct thread *, void *), void *thunk)
188{
189	struct thread *newtd;
190	struct proc *p;
191	int error;
192
193	p = td->td_proc;
194
195	/* Have race condition but it is cheap. */
196	if (p->p_numthreads >= max_threads_per_proc) {
197		++max_threads_hits;
198		return (EPROCLIM);
199	}
200
201	if (rtp != NULL) {
202		switch(rtp->type) {
203		case RTP_PRIO_REALTIME:
204		case RTP_PRIO_FIFO:
205			/* Only root can set scheduler policy */
206			if (priv_check(td, PRIV_SCHED_SETPOLICY) != 0)
207				return (EPERM);
208			if (rtp->prio > RTP_PRIO_MAX)
209				return (EINVAL);
210			break;
211		case RTP_PRIO_NORMAL:
212			rtp->prio = 0;
213			break;
214		default:
215			return (EINVAL);
216		}
217	}
218
219#ifdef RACCT
220	PROC_LOCK(td->td_proc);
221	error = racct_add(p, RACCT_NTHR, 1);
222	PROC_UNLOCK(td->td_proc);
223	if (error != 0)
224		return (EPROCLIM);
225#endif
226
227	/* Initialize our td */
228	newtd = thread_alloc(0);
229	if (newtd == NULL) {
230		error = ENOMEM;
231		goto fail;
232	}
233
234	cpu_set_upcall(newtd, td);
235
236	bzero(&newtd->td_startzero,
237	    __rangeof(struct thread, td_startzero, td_endzero));
238	newtd->td_su = NULL;
239	bcopy(&td->td_startcopy, &newtd->td_startcopy,
240	    __rangeof(struct thread, td_startcopy, td_endcopy));
241	newtd->td_proc = td->td_proc;
242	newtd->td_ucred = crhold(td->td_ucred);
243	newtd->td_dbg_sc_code = td->td_dbg_sc_code;
244	newtd->td_dbg_sc_narg = td->td_dbg_sc_narg;
245
246	error = initialize_thread(newtd, thunk);
247	if (error != 0) {
248		thread_free(newtd);
249		crfree(td->td_ucred);
250		goto fail;
251	}
252
253	PROC_LOCK(td->td_proc);
254	td->td_proc->p_flag |= P_HADTHREADS;
255	thread_link(newtd, p);
256	bcopy(p->p_comm, newtd->td_name, sizeof(newtd->td_name));
257	thread_lock(td);
258	/* let the scheduler know about these things. */
259	sched_fork_thread(td, newtd);
260	thread_unlock(td);
261	if (P_SHOULDSTOP(p))
262		newtd->td_flags |= TDF_ASTPENDING | TDF_NEEDSUSPCHK;
263	PROC_UNLOCK(p);
264
265	tidhash_add(newtd);
266
267	thread_lock(newtd);
268	if (rtp != NULL) {
269		if (!(td->td_pri_class == PRI_TIMESHARE &&
270		      rtp->type == RTP_PRIO_NORMAL)) {
271			rtp_to_pri(rtp, newtd);
272			sched_prio(newtd, newtd->td_user_pri);
273		} /* ignore timesharing class */
274	}
275	TD_SET_CAN_RUN(newtd);
276	sched_add(newtd, SRQ_BORING);
277	thread_unlock(newtd);
278
279	return (0);
280
281fail:
282#ifdef RACCT
283	if (racct_enable) {
284		PROC_LOCK(p);
285		racct_sub(p, RACCT_NTHR, 1);
286		PROC_UNLOCK(p);
287	}
288#endif
289	return (error);
290}
291
292int
293sys_thr_self(struct thread *td, struct thr_self_args *uap)
294    /* long *id */
295{
296	int error;
297
298	error = suword_lwpid(uap->id, (unsigned)td->td_tid);
299	if (error == -1)
300		return (EFAULT);
301	return (0);
302}
303
304int
305sys_thr_exit(struct thread *td, struct thr_exit_args *uap)
306    /* long *state */
307{
308
309	/* Signal userland that it can free the stack. */
310	if ((void *)uap->state != NULL) {
311		suword_lwpid(uap->state, 1);
312		kern_umtx_wake(td, uap->state, INT_MAX, 0);
313	}
314
315	return (kern_thr_exit(td));
316}
317
318int
319kern_thr_exit(struct thread *td)
320{
321	struct proc *p;
322
323	p = td->td_proc;
324
325	rw_wlock(&tidhash_lock);
326	PROC_LOCK(p);
327
328	if (p->p_numthreads != 1) {
329		racct_sub(p, RACCT_NTHR, 1);
330		LIST_REMOVE(td, td_hash);
331		rw_wunlock(&tidhash_lock);
332		tdsigcleanup(td);
333		umtx_thread_exit(td);
334		PROC_SLOCK(p);
335		thread_stopped(p);
336		thread_exit();
337		/* NOTREACHED */
338	}
339
340	/*
341	 * Ignore attempts to shut down last thread in the proc.  This
342	 * will actually call _exit(2) in the usermode trampoline when
343	 * it returns.
344	 */
345	PROC_UNLOCK(p);
346	rw_wunlock(&tidhash_lock);
347	return (0);
348}
349
350int
351sys_thr_kill(struct thread *td, struct thr_kill_args *uap)
352    /* long id, int sig */
353{
354	ksiginfo_t ksi;
355	struct thread *ttd;
356	struct proc *p;
357	int error;
358
359	p = td->td_proc;
360	ksiginfo_init(&ksi);
361	ksi.ksi_signo = uap->sig;
362	ksi.ksi_code = SI_LWP;
363	ksi.ksi_pid = p->p_pid;
364	ksi.ksi_uid = td->td_ucred->cr_ruid;
365	if (uap->id == -1) {
366		if (uap->sig != 0 && !_SIG_VALID(uap->sig)) {
367			error = EINVAL;
368		} else {
369			error = ESRCH;
370			PROC_LOCK(p);
371			FOREACH_THREAD_IN_PROC(p, ttd) {
372				if (ttd != td) {
373					error = 0;
374					if (uap->sig == 0)
375						break;
376					tdksignal(ttd, uap->sig, &ksi);
377				}
378			}
379			PROC_UNLOCK(p);
380		}
381	} else {
382		error = 0;
383		ttd = tdfind((lwpid_t)uap->id, p->p_pid);
384		if (ttd == NULL)
385			return (ESRCH);
386		if (uap->sig == 0)
387			;
388		else if (!_SIG_VALID(uap->sig))
389			error = EINVAL;
390		else
391			tdksignal(ttd, uap->sig, &ksi);
392		PROC_UNLOCK(ttd->td_proc);
393	}
394	return (error);
395}
396
397int
398sys_thr_kill2(struct thread *td, struct thr_kill2_args *uap)
399    /* pid_t pid, long id, int sig */
400{
401	ksiginfo_t ksi;
402	struct thread *ttd;
403	struct proc *p;
404	int error;
405
406	AUDIT_ARG_SIGNUM(uap->sig);
407
408	ksiginfo_init(&ksi);
409	ksi.ksi_signo = uap->sig;
410	ksi.ksi_code = SI_LWP;
411	ksi.ksi_pid = td->td_proc->p_pid;
412	ksi.ksi_uid = td->td_ucred->cr_ruid;
413	if (uap->id == -1) {
414		if ((p = pfind(uap->pid)) == NULL)
415			return (ESRCH);
416		AUDIT_ARG_PROCESS(p);
417		error = p_cansignal(td, p, uap->sig);
418		if (error) {
419			PROC_UNLOCK(p);
420			return (error);
421		}
422		if (uap->sig != 0 && !_SIG_VALID(uap->sig)) {
423			error = EINVAL;
424		} else {
425			error = ESRCH;
426			FOREACH_THREAD_IN_PROC(p, ttd) {
427				if (ttd != td) {
428					error = 0;
429					if (uap->sig == 0)
430						break;
431					tdksignal(ttd, uap->sig, &ksi);
432				}
433			}
434		}
435		PROC_UNLOCK(p);
436	} else {
437		ttd = tdfind((lwpid_t)uap->id, uap->pid);
438		if (ttd == NULL)
439			return (ESRCH);
440		p = ttd->td_proc;
441		AUDIT_ARG_PROCESS(p);
442		error = p_cansignal(td, p, uap->sig);
443		if (uap->sig == 0)
444			;
445		else if (!_SIG_VALID(uap->sig))
446			error = EINVAL;
447		else
448			tdksignal(ttd, uap->sig, &ksi);
449		PROC_UNLOCK(p);
450	}
451	return (error);
452}
453
454int
455sys_thr_suspend(struct thread *td, struct thr_suspend_args *uap)
456	/* const struct timespec *timeout */
457{
458	struct timespec ts, *tsp;
459	int error;
460
461	tsp = NULL;
462	if (uap->timeout != NULL) {
463		error = umtx_copyin_timeout(uap->timeout, &ts);
464		if (error != 0)
465			return (error);
466		tsp = &ts;
467	}
468
469	return (kern_thr_suspend(td, tsp));
470}
471
472int
473kern_thr_suspend(struct thread *td, struct timespec *tsp)
474{
475	struct proc *p = td->td_proc;
476	struct timeval tv;
477	int error = 0;
478	int timo = 0;
479
480	if (td->td_pflags & TDP_WAKEUP) {
481		td->td_pflags &= ~TDP_WAKEUP;
482		return (0);
483	}
484
485	if (tsp != NULL) {
486		if (tsp->tv_sec == 0 && tsp->tv_nsec == 0)
487			error = EWOULDBLOCK;
488		else {
489			TIMESPEC_TO_TIMEVAL(&tv, tsp);
490			timo = tvtohz(&tv);
491		}
492	}
493
494	PROC_LOCK(p);
495	if (error == 0 && (td->td_flags & TDF_THRWAKEUP) == 0)
496		error = msleep((void *)td, &p->p_mtx,
497			 PCATCH, "lthr", timo);
498
499	if (td->td_flags & TDF_THRWAKEUP) {
500		thread_lock(td);
501		td->td_flags &= ~TDF_THRWAKEUP;
502		thread_unlock(td);
503		PROC_UNLOCK(p);
504		return (0);
505	}
506	PROC_UNLOCK(p);
507	if (error == EWOULDBLOCK)
508		error = ETIMEDOUT;
509	else if (error == ERESTART) {
510		if (timo != 0)
511			error = EINTR;
512	}
513	return (error);
514}
515
516int
517sys_thr_wake(struct thread *td, struct thr_wake_args *uap)
518	/* long id */
519{
520	struct proc *p;
521	struct thread *ttd;
522
523	if (uap->id == td->td_tid) {
524		td->td_pflags |= TDP_WAKEUP;
525		return (0);
526	}
527
528	p = td->td_proc;
529	ttd = tdfind((lwpid_t)uap->id, p->p_pid);
530	if (ttd == NULL)
531		return (ESRCH);
532	thread_lock(ttd);
533	ttd->td_flags |= TDF_THRWAKEUP;
534	thread_unlock(ttd);
535	wakeup((void *)ttd);
536	PROC_UNLOCK(p);
537	return (0);
538}
539
540int
541sys_thr_set_name(struct thread *td, struct thr_set_name_args *uap)
542{
543	struct proc *p;
544	char name[MAXCOMLEN + 1];
545	struct thread *ttd;
546	int error;
547
548	error = 0;
549	name[0] = '\0';
550	if (uap->name != NULL) {
551		error = copyinstr(uap->name, name, sizeof(name),
552			NULL);
553		if (error)
554			return (error);
555	}
556	p = td->td_proc;
557	ttd = tdfind((lwpid_t)uap->id, p->p_pid);
558	if (ttd == NULL)
559		return (ESRCH);
560	strcpy(ttd->td_name, name);
561#ifdef KTR
562	sched_clear_tdname(ttd);
563#endif
564	PROC_UNLOCK(p);
565	return (error);
566}
567