2 * Copyright (c) 2003,2004,2009 The DragonFly Project. All rights reserved.
4 * This code is derived from software contributed to The DragonFly Project
5 * by Matthew Dillon <dillon@backplane.com>
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in
15 * the documentation and/or other materials provided with the
17 * 3. Neither the name of The DragonFly Project nor the names of its
18 * contributors may be used to endorse or promote products derived
19 * from this software without specific, prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
24 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
25 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
26 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
27 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
28 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
29 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
30 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
31 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * lwkt_token - Implement soft token locks.
38 * Tokens are locks which serialize a thread only while the thread is
39 * running. If the thread blocks all tokens are released, then reacquired
40 * when the thread resumes.
42 * This implementation requires no critical sections or spin locks, but
43 * does use atomic_cmpset_ptr().
45 * Tokens may be recursively acquired by the same thread. However the
46 * caller must be sure to release such tokens in reverse order.
48 #include <sys/param.h>
49 #include <sys/systm.h>
50 #include <sys/kernel.h>
52 #include <sys/rtprio.h>
53 #include <sys/queue.h>
54 #include <sys/sysctl.h>
56 #include <sys/kthread.h>
57 #include <machine/cpu.h>
60 #include <sys/spinlock.h>
62 #include <sys/thread2.h>
63 #include <sys/spinlock2.h>
64 #include <sys/mplock2.h>
67 #include <vm/vm_param.h>
68 #include <vm/vm_kern.h>
69 #include <vm/vm_object.h>
70 #include <vm/vm_page.h>
71 #include <vm/vm_map.h>
72 #include <vm/vm_pager.h>
73 #include <vm/vm_extern.h>
74 #include <vm/vm_zone.h>
76 #include <machine/stdarg.h>
77 #include <machine/smp.h>
79 #ifndef LWKT_NUM_POOL_TOKENS
80 #define LWKT_NUM_POOL_TOKENS 1024 /* power of 2 */
82 #define LWKT_MASK_POOL_TOKENS (LWKT_NUM_POOL_TOKENS - 1)
85 static int token_debug = 0;
88 static lwkt_token pool_tokens[LWKT_NUM_POOL_TOKENS];
90 #define TOKEN_STRING "REF=%p TOK=%p TD=%p"
91 #define CONTENDED_STRING "REF=%p TOK=%p TD=%p (contention started)"
92 #define UNCONTENDED_STRING "REF=%p TOK=%p TD=%p (contention stopped)"
93 #if !defined(KTR_TOKENS)
94 #define KTR_TOKENS KTR_ALL
97 KTR_INFO_MASTER(tokens);
98 KTR_INFO(KTR_TOKENS, tokens, fail, 0, TOKEN_STRING, sizeof(void *) * 3);
99 KTR_INFO(KTR_TOKENS, tokens, succ, 1, TOKEN_STRING, sizeof(void *) * 3);
101 KTR_INFO(KTR_TOKENS, tokens, release, 2, TOKEN_STRING, sizeof(void *) * 3);
102 KTR_INFO(KTR_TOKENS, tokens, remote, 3, TOKEN_STRING, sizeof(void *) * 3);
103 KTR_INFO(KTR_TOKENS, tokens, reqremote, 4, TOKEN_STRING, sizeof(void *) * 3);
104 KTR_INFO(KTR_TOKENS, tokens, reqfail, 5, TOKEN_STRING, sizeof(void *) * 3);
105 KTR_INFO(KTR_TOKENS, tokens, drain, 6, TOKEN_STRING, sizeof(void *) * 3);
106 KTR_INFO(KTR_TOKENS, tokens, contention_start, 7, CONTENDED_STRING, sizeof(void *) * 3);
107 KTR_INFO(KTR_TOKENS, tokens, contention_stop, 7, UNCONTENDED_STRING, sizeof(void *) * 3);
110 #define logtoken(name, ref) \
111 KTR_LOG(tokens_ ## name, ref, ref->tr_tok, curthread)
114 SYSCTL_INT(_lwkt, OID_AUTO, token_debug, CTLFLAG_RW, &token_debug, 0, "");
118 * Global tokens. These replace the MP lock for major subsystem locking.
119 * These tokens are initially used to lockup both global and individual
122 * Once individual structures get their own locks these tokens are used
123 * only to protect global lists & other variables and to interlock
124 * allocations and teardowns and such.
126 * The UP initializer causes token acquisition to also acquire the MP lock
127 * for maximum compatibility. The feature may be enabled and disabled at
128 * any time, the MP state is copied to the tokref when the token is acquired
129 * and will not race against sysctl changes.
131 struct lwkt_token pmap_token = LWKT_TOKEN_UP_INITIALIZER;
132 struct lwkt_token dev_token = LWKT_TOKEN_UP_INITIALIZER;
133 struct lwkt_token vm_page_token = LWKT_TOKEN_UP_INITIALIZER;
134 struct lwkt_token vm_object_token = LWKT_TOKEN_UP_INITIALIZER;
135 struct lwkt_token vm_map_token = LWKT_TOKEN_UP_INITIALIZER;
136 struct lwkt_token proc_token = LWKT_TOKEN_UP_INITIALIZER;
137 struct lwkt_token tty_token = LWKT_TOKEN_UP_INITIALIZER;
138 struct lwkt_token vnode_token = LWKT_TOKEN_UP_INITIALIZER;
140 SYSCTL_INT(_lwkt, OID_AUTO, pmap_mpsafe,
141 CTLFLAG_RW, &pmap_token.t_flags, 0, "");
142 SYSCTL_INT(_lwkt, OID_AUTO, dev_mpsafe,
143 CTLFLAG_RW, &dev_token.t_flags, 0, "");
144 SYSCTL_INT(_lwkt, OID_AUTO, vm_page_mpsafe,
145 CTLFLAG_RW, &vm_page_token.t_flags, 0, "");
146 SYSCTL_INT(_lwkt, OID_AUTO, vm_object_mpsafe,
147 CTLFLAG_RW, &vm_object_token.t_flags, 0, "");
148 SYSCTL_INT(_lwkt, OID_AUTO, vm_map_mpsafe,
149 CTLFLAG_RW, &vm_map_token.t_flags, 0, "");
150 SYSCTL_INT(_lwkt, OID_AUTO, proc_mpsafe,
151 CTLFLAG_RW, &proc_token.t_flags, 0, "");
152 SYSCTL_INT(_lwkt, OID_AUTO, tty_mpsafe,
153 CTLFLAG_RW, &tty_token.t_flags, 0, "");
154 SYSCTL_INT(_lwkt, OID_AUTO, vnode_mpsafe,
155 CTLFLAG_RW, &vnode_token.t_flags, 0, "");
158 * The collision count is bumped every time the LWKT scheduler fails
159 * to acquire needed tokens in addition to a normal lwkt_gettoken()
162 SYSCTL_LONG(_lwkt, OID_AUTO, pmap_collisions,
163 CTLFLAG_RW, &pmap_token.t_collisions, 0, "");
164 SYSCTL_LONG(_lwkt, OID_AUTO, dev_collisions,
165 CTLFLAG_RW, &dev_token.t_collisions, 0, "");
166 SYSCTL_LONG(_lwkt, OID_AUTO, vm_page_collisions,
167 CTLFLAG_RW, &vm_page_token.t_collisions, 0, "");
168 SYSCTL_LONG(_lwkt, OID_AUTO, vm_object_collisions,
169 CTLFLAG_RW, &vm_object_token.t_collisions, 0, "");
170 SYSCTL_LONG(_lwkt, OID_AUTO, vm_map_collisions,
171 CTLFLAG_RW, &vm_map_token.t_collisions, 0, "");
172 SYSCTL_LONG(_lwkt, OID_AUTO, proc_collisions,
173 CTLFLAG_RW, &proc_token.t_collisions, 0, "");
174 SYSCTL_LONG(_lwkt, OID_AUTO, tty_collisions,
175 CTLFLAG_RW, &tty_token.t_collisions, 0, "");
176 SYSCTL_LONG(_lwkt, OID_AUTO, vnode_collisions,
177 CTLFLAG_RW, &vnode_token.t_collisions, 0, "");
180 * Return a pool token given an address
184 _lwkt_token_pool_lookup(void *ptr)
188 i = ((int)(intptr_t)ptr >> 2) ^ ((int)(intptr_t)ptr >> 12);
189 return(&pool_tokens[i & LWKT_MASK_POOL_TOKENS]);
193 * Initialize a tokref_t prior to making it visible in the thread's
198 _lwkt_tokref_init(lwkt_tokref_t ref, lwkt_token_t tok, thread_t td)
202 ref->tr_flags = tok->t_flags;
206 * Obtain all the tokens required by the specified thread on the current
207 * cpu, return 0 on failure and non-zero on success. If a failure occurs
208 * any partially acquired tokens will be released prior to return.
210 * lwkt_getalltokens is called by the LWKT scheduler to acquire all
211 * tokens that the thread had acquired prior to going to sleep.
213 * The scheduler is responsible for maintaining the MP lock count, so
214 * we don't need to deal with tr_flags here. We also do not do any
215 * logging here. The logging done by lwkt_gettoken() is plenty good
216 * enough to get a feel for it.
218 * Called from a critical section.
221 lwkt_getalltokens(thread_t td)
228 * Acquire tokens in forward order, assign or validate tok->t_ref.
230 for (scan = &td->td_toks_base; scan < td->td_toks_stop; ++scan) {
234 * Try to acquire the token if we do not already have
237 * NOTE: If atomic_cmpset_ptr() fails we have to
238 * loop and try again. It just means we
243 if (atomic_cmpset_ptr(&tok->t_ref, NULL, scan))
249 * Test if ref is already recursively held by this
250 * thread. We cannot safely dereference tok->t_ref
251 * (it might belong to another thread and is thus
252 * unstable), but we don't have to. We can simply
255 if (ref >= &td->td_toks_base && ref < td->td_toks_stop)
259 * Otherwise we failed to acquire all the tokens.
262 atomic_add_long(&tok->t_collisions, 1);
263 lwkt_relalltokens(td);
271 * Release all tokens owned by the specified thread on the current cpu.
273 * This code is really simple. Even in cases where we own all the tokens
274 * note that t_ref may not match the scan for recursively held tokens,
275 * or for the case where a lwkt_getalltokens() failed.
277 * The scheduler is responsible for maintaining the MP lock count, so
278 * we don't need to deal with tr_flags here.
280 * Called from a critical section.
283 lwkt_relalltokens(thread_t td)
288 for (scan = &td->td_toks_base; scan < td->td_toks_stop; ++scan) {
290 if (tok->t_ref == scan)
296 * Token acquisition helper function. The caller must have already
297 * made nref visible by adjusting td_toks_stop and will be responsible
298 * for the disposition of nref on either success or failure.
300 * When acquiring tokens recursively we want tok->t_ref to point to
301 * the outer (first) acquisition so it gets cleared only on the last
306 _lwkt_trytokref2(lwkt_tokref_t nref, thread_t td)
311 KKASSERT(td->td_gd->gd_intr_nesting_level == 0);
314 * Make sure the compiler does not reorder prior instructions
315 * beyond this demark.
320 * Attempt to gain ownership
325 * Try to acquire the token if we do not already have
331 * NOTE: If atomic_cmpset_ptr() fails we have to
332 * loop and try again. It just means we
335 if (atomic_cmpset_ptr(&tok->t_ref, NULL, nref))
341 * Test if ref is already recursively held by this
342 * thread. We cannot safely dereference tok->t_ref
343 * (it might belong to another thread and is thus
344 * unstable), but we don't have to. We can simply
347 if (ref >= &td->td_toks_base && ref < td->td_toks_stop)
351 * Otherwise we failed.
358 * Acquire a serializing token. This routine does not block.
362 _lwkt_trytokref(lwkt_tokref_t ref, thread_t td)
364 if ((ref->tr_flags & LWKT_TOKEN_MPSAFE) == 0) {
365 if (try_mplock() == 0)
368 if (_lwkt_trytokref2(ref, td) == FALSE) {
370 * Cleanup, deactivate the failed token.
373 if ((ref->tr_flags & LWKT_TOKEN_MPSAFE) == 0)
381 * Acquire a serializing token. This routine can block.
385 _lwkt_gettokref(lwkt_tokref_t ref, thread_t td)
387 if ((ref->tr_flags & LWKT_TOKEN_MPSAFE) == 0)
389 if (_lwkt_trytokref2(ref, td) == FALSE) {
391 * Give up running if we can't acquire the token right now.
393 * Since the tokref is already active the scheduler now
394 * takes care of acquisition, so we need only call
397 * Since we failed this was not a recursive token so upon
398 * return tr_tok->t_ref should be assigned to this specific
401 atomic_add_long(&ref->tr_tok->t_collisions, 1);
405 KKASSERT(ref->tr_tok->t_ref == ref);
410 lwkt_gettoken(lwkt_token_t tok)
412 thread_t td = curthread;
415 ref = td->td_toks_stop;
416 KKASSERT(ref < &td->td_toks_end);
417 _lwkt_tokref_init(ref, tok, td);
419 _lwkt_gettokref(ref, td);
423 lwkt_getpooltoken(void *ptr)
425 thread_t td = curthread;
429 ref = td->td_toks_stop;
430 KKASSERT(ref < &td->td_toks_end);
431 tok = _lwkt_token_pool_lookup(ptr);
432 _lwkt_tokref_init(ref, tok, td);
434 _lwkt_gettokref(ref, td);
439 lwkt_trytoken(lwkt_token_t tok)
441 thread_t td = curthread;
444 ref = td->td_toks_stop;
445 KKASSERT(ref < &td->td_toks_end);
446 _lwkt_tokref_init(ref, tok, td);
448 return(_lwkt_trytokref(ref, td));
452 * Release a serializing token.
454 * WARNING! All tokens must be released in reverse order. This will be
458 lwkt_reltoken(lwkt_token_t tok)
460 thread_t td = curthread;
464 * Remove ref from thread token list and assert that it matches
465 * the token passed in. Tokens must be released in reverse order.
467 ref = td->td_toks_stop - 1;
468 KKASSERT(ref >= &td->td_toks_base && ref->tr_tok == tok);
469 td->td_toks_stop = ref;
472 * If the token was not MPSAFE release the MP lock.
474 if ((ref->tr_flags & LWKT_TOKEN_MPSAFE) == 0)
478 * Make sure the compiler does not reorder the clearing of
484 * Only clear the token if it matches ref. If ref was a recursively
485 * acquired token it may not match.
487 if (tok->t_ref == ref)
492 * Pool tokens are used to provide a type-stable serializing token
493 * pointer that does not race against disappearing data structures.
495 * This routine is called in early boot just after we setup the BSP's
496 * globaldata structure.
499 lwkt_token_pool_init(void)
503 for (i = 0; i < LWKT_NUM_POOL_TOKENS; ++i)
504 lwkt_token_init(&pool_tokens[i], 1);
508 lwkt_token_pool_lookup(void *ptr)
510 return (_lwkt_token_pool_lookup(ptr));
514 * Initialize the owner and release-to cpu to the current cpu
515 * and reset the generation count.
518 lwkt_token_init(lwkt_token_t tok, int mpsafe)
521 tok->t_flags = mpsafe ? LWKT_TOKEN_MPSAFE : 0;
525 lwkt_token_uninit(lwkt_token_t tok)
532 lwkt_token_is_stale(lwkt_tokref_t ref)
534 lwkt_token_t tok = ref->tr_tok;
536 KKASSERT(tok->t_owner == curthread && ref->tr_state == 1 &&
539 /* Token is not stale */
540 if (tok->t_lastowner == tok->t_owner)
544 * The token is stale. Reset to not stale so that the next call to
545 * lwkt_token_is_stale will return "not stale" unless the token
546 * was acquired in-between by another thread.
548 tok->t_lastowner = tok->t_owner;