Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys Load struct filedesc::fd_dt with atomic_load_consume.
details: https://anonhg.NetBSD.org/src/rev/211c9d414133
branches: trunk
changeset: 968901:211c9d414133
user: riastradh <riastradh%NetBSD.org@localhost>
date: Sat Feb 01 02:23:03 2020 +0000
description:
Load struct filedesc::fd_dt with atomic_load_consume.
Exceptions: when fd_refcnt <= 1, or when holding fd_lock.
While here:
- Restore KASSERT(mutex_owned(&fdp->fd_lock)) in fd_unused.
=> This is used only in fd_close and fd_abort, where it holds.
- Move bounds check assertion in fd_putfile to where it matters.
- Store fd_dt with atomic_store_release.
- Move load of fd_dt under lock in knote_fdclose.
- Omit membar_consumer in fdesc_readdir.
=> atomic_load_consume serves the same purpose now.
=> Was needed only on alpha anyway.
diffstat:
sys/compat/netbsd32/netbsd32_ioctl.c | 7 ++--
sys/ddb/db_xxx.c | 7 ++--
sys/kern/kern_descrip.c | 52 ++++++++++++++++++------------------
sys/kern/kern_event.c | 6 ++--
sys/kern/kern_sig.c | 6 ++--
sys/kern/subr_exec_fd.c | 9 +++--
sys/kern/sys_aio.c | 6 ++--
sys/kern/sys_descrip.c | 8 +++--
sys/kern/sys_select.c | 6 ++--
sys/kern/uipc_socket2.c | 6 ++--
sys/kern/uipc_usrreq.c | 8 +++--
sys/miscfs/fdesc/fdesc_vnops.c | 9 ++---
sys/miscfs/procfs/procfs_vnops.c | 7 ++--
13 files changed, 72 insertions(+), 65 deletions(-)
diffs (truncated from 590 to 300 lines):
diff -r f898bdc7ff98 -r 211c9d414133 sys/compat/netbsd32/netbsd32_ioctl.c
--- a/sys/compat/netbsd32/netbsd32_ioctl.c Fri Jan 31 23:12:13 2020 +0000
+++ b/sys/compat/netbsd32/netbsd32_ioctl.c Sat Feb 01 02:23:03 2020 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: netbsd32_ioctl.c,v 1.106 2019/11/18 04:17:08 rin Exp $ */
+/* $NetBSD: netbsd32_ioctl.c,v 1.107 2020/02/01 02:23:03 riastradh Exp $ */
/*
* Copyright (c) 1998, 2001 Matthew R. Green
@@ -31,13 +31,14 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: netbsd32_ioctl.c,v 1.106 2019/11/18 04:17:08 rin Exp $");
+__KERNEL_RCSID(0, "$NetBSD: netbsd32_ioctl.c,v 1.107 2020/02/01 02:23:03 riastradh Exp $");
#if defined(_KERNEL_OPT)
#include "opt_ntp.h"
#endif
#include <sys/param.h>
+#include <sys/atomic.h>
#include <sys/systm.h>
#include <sys/filedesc.h>
#include <sys/ioctl.h>
@@ -1132,7 +1133,7 @@
goto out;
}
- ff = fdp->fd_dt->dt_ff[SCARG(uap, fd)];
+ ff = atomic_load_consume(&fdp->fd_dt)->dt_ff[SCARG(uap, fd)];
switch (com = SCARG(uap, com)) {
case FIOCLEX:
ff->ff_exclose = true;
diff -r f898bdc7ff98 -r 211c9d414133 sys/ddb/db_xxx.c
--- a/sys/ddb/db_xxx.c Fri Jan 31 23:12:13 2020 +0000
+++ b/sys/ddb/db_xxx.c Sat Feb 01 02:23:03 2020 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: db_xxx.c,v 1.71 2015/02/27 00:47:30 ozaki-r Exp $ */
+/* $NetBSD: db_xxx.c,v 1.72 2020/02/01 02:23:04 riastradh Exp $ */
/*
* Copyright (c) 1982, 1986, 1989, 1991, 1993
@@ -37,7 +37,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: db_xxx.c,v 1.71 2015/02/27 00:47:30 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: db_xxx.c,v 1.72 2020/02/01 02:23:04 riastradh Exp $");
#ifdef _KERNEL_OPT
#include "opt_kgdb.h"
@@ -50,6 +50,7 @@
#endif
#include <sys/param.h>
+#include <sys/atomic.h>
#include <sys/systm.h>
#include <sys/kernel.h>
#include <sys/proc.h>
@@ -173,7 +174,7 @@
p = (struct proc *) (uintptr_t) addr;
fdp = p->p_fd;
- dt = fdp->fd_dt;
+ dt = atomic_load_consume(&fdp->fd_dt);
for (i = 0; i < dt->dt_nfiles; i++) {
if ((ff = dt->dt_ff[i]) == NULL)
continue;
diff -r f898bdc7ff98 -r 211c9d414133 sys/kern/kern_descrip.c
--- a/sys/kern/kern_descrip.c Fri Jan 31 23:12:13 2020 +0000
+++ b/sys/kern/kern_descrip.c Sat Feb 01 02:23:03 2020 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: kern_descrip.c,v 1.243 2019/02/20 19:42:14 christos Exp $ */
+/* $NetBSD: kern_descrip.c,v 1.244 2020/02/01 02:23:04 riastradh Exp $ */
/*-
* Copyright (c) 2008, 2009 The NetBSD Foundation, Inc.
@@ -70,7 +70,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: kern_descrip.c,v 1.243 2019/02/20 19:42:14 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: kern_descrip.c,v 1.244 2020/02/01 02:23:04 riastradh Exp $");
#include <sys/param.h>
#include <sys/systm.h>
@@ -186,7 +186,7 @@
{
u_int off = fd >> NDENTRYSHIFT;
- KASSERT(fd < fdp->fd_dt->dt_nfiles);
+ KASSERT(fd < atomic_load_consume(&fdp->fd_dt)->dt_nfiles);
return (fdp->fd_lomap[off] & (1U << (fd & NDENTRYMASK))) != 0;
}
@@ -201,6 +201,8 @@
fdtab_t *dt;
u_int fd;
+ KASSERT(fdp->fd_refcnt <= 1 || mutex_owned(&fdp->fd_lock));
+
dt = fdp->fd_dt;
if (fdp->fd_refcnt == -1) {
/*
@@ -324,13 +326,7 @@
ff = fdp->fd_dt->dt_ff[fd];
- /*
- * Don't assert the lock is held here, as we may be copying
- * the table during exec() and it is not needed there.
- * procfs and sysctl are locked out by proc::p_reflock.
- *
- * KASSERT(mutex_owned(&fdp->fd_lock));
- */
+ KASSERT(mutex_owned(&fdp->fd_lock));
KASSERT(ff != NULL);
KASSERT(ff->ff_file == NULL);
KASSERT(ff->ff_allocated);
@@ -373,7 +369,7 @@
* We are doing this unlocked. See fd_tryexpand().
*/
fdp = curlwp->l_fd;
- dt = fdp->fd_dt;
+ dt = atomic_load_consume(&fdp->fd_dt);
if (__predict_false(fd >= dt->dt_nfiles)) {
return NULL;
}
@@ -426,9 +422,9 @@
u_int u, v;
fdp = curlwp->l_fd;
- ff = fdp->fd_dt->dt_ff[fd];
+ KASSERT(fd < atomic_load_consume(&fdp->fd_dt)->dt_nfiles);
+ ff = atomic_load_consume(&fdp->fd_dt)->dt_ff[fd];
- KASSERT(fd < fdp->fd_dt->dt_nfiles);
KASSERT(ff != NULL);
KASSERT((ff->ff_refcnt & FR_MASK) > 0);
KASSERT(fd >= NDFDFILE || ff == (fdfile_t *)fdp->fd_dfdfile[fd]);
@@ -593,7 +589,7 @@
l = curlwp;
p = l->l_proc;
fdp = l->l_fd;
- ff = fdp->fd_dt->dt_ff[fd];
+ ff = atomic_load_consume(&fdp->fd_dt)->dt_ff[fd];
KASSERT(fd >= NDFDFILE || ff == (fdfile_t *)fdp->fd_dfdfile[fd]);
@@ -726,6 +722,7 @@
fd_dup(file_t *fp, int minfd, int *newp, bool exclose)
{
proc_t *p = curproc;
+ fdtab_t *dt;
int error;
while ((error = fd_alloc(p, minfd, newp)) != 0) {
@@ -735,7 +732,8 @@
fd_tryexpand(p);
}
- curlwp->l_fd->fd_dt->dt_ff[*newp]->ff_exclose = exclose;
+ dt = atomic_load_consume(&curlwp->l_fd->fd_dt);
+ dt->dt_ff[*newp]->ff_exclose = exclose;
fd_affix(p, fp, *newp);
return 0;
}
@@ -756,7 +754,7 @@
* Ensure there are enough slots in the descriptor table,
* and allocate an fdfile_t up front in case we need it.
*/
- while (newfd >= fdp->fd_dt->dt_nfiles) {
+ while (newfd >= atomic_load_consume(&fdp->fd_dt)->dt_nfiles) {
fd_tryexpand(curproc);
}
ff = pool_cache_get(fdfile_cache, PR_WAITOK);
@@ -1003,7 +1001,7 @@
fdp = p->p_fd;
newhimap = NULL;
newlomap = NULL;
- oldnfiles = fdp->fd_dt->dt_nfiles;
+ oldnfiles = atomic_load_consume(&fdp->fd_dt)->dt_nfiles;
if (oldnfiles < NDEXTENT)
numfiles = NDEXTENT;
@@ -1070,8 +1068,7 @@
* All other modifications must become globally visible before
* the change to fd_dt. See fd_getfile().
*/
- membar_producer();
- fdp->fd_dt = newdt;
+ atomic_store_release(&fdp->fd_dt, newdt);
KASSERT(newdt->dt_ff[0] == (fdfile_t *)fdp->fd_dfdfile[0]);
fd_checkmaps(fdp);
mutex_exit(&fdp->fd_lock);
@@ -1138,6 +1135,7 @@
{
fdfile_t *ff;
filedesc_t *fdp;
+ fdtab_t *dt;
KASSERT(p == curproc || p == &proc0);
@@ -1155,7 +1153,8 @@
* current process.
*/
fdp = p->p_fd;
- ff = fdp->fd_dt->dt_ff[fd];
+ dt = atomic_load_consume(&fdp->fd_dt);
+ ff = dt->dt_ff[fd];
KASSERT(ff != NULL);
KASSERT(ff->ff_file == NULL);
@@ -1179,7 +1178,7 @@
KASSERT(p == curproc || p == &proc0);
fdp = p->p_fd;
- ff = fdp->fd_dt->dt_ff[fd];
+ ff = atomic_load_consume(&fdp->fd_dt)->dt_ff[fd];
ff->ff_exclose = false;
KASSERT(fd >= NDFDFILE || ff == (fdfile_t *)fdp->fd_dfdfile[fd]);
@@ -1525,7 +1524,8 @@
filedesc_t * const fdp = l->l_fd;
const bool noadvlock = (l->l_proc->p_flag & PK_ADVLOCK) == 0;
- KASSERT(fdp->fd_dt->dt_ff[0] == (fdfile_t *)fdp->fd_dfdfile[0]);
+ KASSERT(atomic_load_consume(&fdp->fd_dt)->dt_ff[0] ==
+ (fdfile_t *)fdp->fd_dfdfile[0]);
KASSERT(fdp->fd_dtbuiltin.dt_nfiles == NDFILE);
KASSERT(fdp->fd_dtbuiltin.dt_link == NULL);
@@ -1657,7 +1657,7 @@
return EBADF;
}
fdp = curlwp->l_fd;
- dt = fdp->fd_dt;
+ dt = atomic_load_consume(&fdp->fd_dt);
ff = dt->dt_ff[old];
/*
@@ -1730,7 +1730,7 @@
return;
}
fdp->fd_exclose = false;
- dt = fdp->fd_dt;
+ dt = atomic_load_consume(&fdp->fd_dt);
for (fd = 0; fd <= fdp->fd_lastfile; fd++) {
if ((ff = dt->dt_ff[fd]) == NULL) {
@@ -1793,7 +1793,7 @@
fd_set_exclose(struct lwp *l, int fd, bool exclose)
{
filedesc_t *fdp = l->l_fd;
- fdfile_t *ff = fdp->fd_dt->dt_ff[fd];
+ fdfile_t *ff = atomic_load_consume(&fdp->fd_dt)->dt_ff[fd];
ff->ff_exclose = exclose;
if (exclose)
@@ -1868,7 +1868,7 @@
fp->f_flag = flag & FMASK;
fdp = curproc->p_fd;
- ff = fdp->fd_dt->dt_ff[fd];
+ ff = atomic_load_consume(&fdp->fd_dt)->dt_ff[fd];
KASSERT(ff != NULL);
ff->ff_exclose = (flag & O_CLOEXEC) != 0;
fp->f_type = DTYPE_MISC;
diff -r f898bdc7ff98 -r 211c9d414133 sys/kern/kern_event.c
--- a/sys/kern/kern_event.c Fri Jan 31 23:12:13 2020 +0000
+++ b/sys/kern/kern_event.c Sat Feb 01 02:23:03 2020 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: kern_event.c,v 1.105 2019/10/18 19:43:49 christos Exp $ */
+/* $NetBSD: kern_event.c,v 1.106 2020/02/01 02:23:04 riastradh Exp $ */
/*-
* Copyright (c) 2008, 2009 The NetBSD Foundation, Inc.
@@ -58,7 +58,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: kern_event.c,v 1.105 2019/10/18 19:43:49 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: kern_event.c,v 1.106 2020/02/01 02:23:04 riastradh Exp $");
#include <sys/param.h>
#include <sys/systm.h>
@@ -1671,8 +1671,8 @@
filedesc_t *fdp;
fdp = curlwp->l_fd;
+ mutex_enter(&fdp->fd_lock);
list = (struct klist *)&fdp->fd_dt->dt_ff[fd]->ff_knlist;
- mutex_enter(&fdp->fd_lock);
while ((kn = SLIST_FIRST(list)) != NULL) {
knote_detach(kn, fdp, true);
mutex_enter(&fdp->fd_lock);
diff -r f898bdc7ff98 -r 211c9d414133 sys/kern/kern_sig.c
--- a/sys/kern/kern_sig.c Fri Jan 31 23:12:13 2020 +0000
+++ b/sys/kern/kern_sig.c Sat Feb 01 02:23:03 2020 +0000
Home |
Main Index |
Thread Index |
Old Index