Author: trasz
Date: Sun Oct 18 14:01:20 2015
New Revision: 289505
URL: https://svnweb.freebsd.org/changeset/base/289505

Log:
  MFC r281726:
  
  Optimize the O_NOCTTY handling hack in linux_common_open().
  
  MFC r281728:
  
  Add back fdrop() missed in r281726.
  
  Sponsored by: The FreeBSD Foundation

Modified:
  stable/10/sys/compat/linux/linux_file.c
Directory Properties:
  stable/10/   (props changed)

Modified: stable/10/sys/compat/linux/linux_file.c
==============================================================================
--- stable/10/sys/compat/linux/linux_file.c     Sun Oct 18 13:58:17 2015        
(r289504)
+++ stable/10/sys/compat/linux/linux_file.c     Sun Oct 18 14:01:20 2015        
(r289505)
@@ -132,39 +132,39 @@ linux_common_open(struct thread *td, int
     /* XXX LINUX_O_NOATIME: unable to be easily implemented. */
 
     error = kern_openat(td, dirfd, path, UIO_SYSSPACE, bsd_flags, mode);
+    if (error != 0)
+           goto done;
 
-    if (!error) {
-           fd = td->td_retval[0];
-           /*
-            * XXX In between kern_open() and fget(), another process
-            * having the same filedesc could use that fd without
-            * checking below.
-            */
-           error = fget(td, fd, cap_rights_init(&rights, CAP_IOCTL), &fp);
-           if (!error) {
-                   sx_slock(&proctree_lock);
-                   PROC_LOCK(p);
-                   if (!(bsd_flags & O_NOCTTY) &&
-                       SESS_LEADER(p) && !(p->p_flag & P_CONTROLT)) {
-                           PROC_UNLOCK(p);
-                           sx_unlock(&proctree_lock);
-                           /* XXXPJD: Verify if TIOCSCTTY is allowed. */
-                           if (fp->f_type == DTYPE_VNODE)
-                                   (void) fo_ioctl(fp, TIOCSCTTY, (caddr_t) 0,
-                                            td->td_ucred, td);
-                   } else {
-                           PROC_UNLOCK(p);
-                           sx_sunlock(&proctree_lock);
-                   }
+    if (bsd_flags & O_NOCTTY)
+           goto done;
+
+    /*
+     * XXX In between kern_open() and fget(), another process
+     * having the same filedesc could use that fd without
+     * checking below.
+     */
+    fd = td->td_retval[0];
+    if (fget(td, fd, cap_rights_init(&rights, CAP_IOCTL), &fp) == 0) {
+           if (fp->f_type != DTYPE_VNODE) {
                    fdrop(fp, td);
-                   /*
-                    * XXX as above, fdrop()/kern_close() pair is racy.
-                    */
-                   if (error)
-                           kern_close(td, fd);
+                   goto done;
+           }
+           sx_slock(&proctree_lock);
+           PROC_LOCK(p);
+           if (SESS_LEADER(p) && !(p->p_flag & P_CONTROLT)) {
+                   PROC_UNLOCK(p);
+                   sx_sunlock(&proctree_lock);
+                   /* XXXPJD: Verify if TIOCSCTTY is allowed. */
+                   (void) fo_ioctl(fp, TIOCSCTTY, (caddr_t) 0,
+                       td->td_ucred, td);
+           } else {
+                   PROC_UNLOCK(p);
+                   sx_sunlock(&proctree_lock);
            }
+           fdrop(fp, td);
     }
 
+done:
 #ifdef DEBUG
     if (ldebug(open))
            printf(LMSG("open returns error %d"), error);
_______________________________________________
[email protected] mailing list
https://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to "[email protected]"

Reply via email to