1 /* 2 * Copyright (c) 1995 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Copyright (C) 1997 6 * John S. Dyson. All rights reserved. 7 * 8 * This code contains ideas from software contributed to Berkeley by 9 * Avadis Tevanian, Jr., Michael Wayne Young, and the Mach Operating 10 * System project at Carnegie-Mellon University. 11 * 12 * Redistribution and use in source and binary forms, with or without 13 * modification, are permitted provided that the following conditions 14 * are met: 15 * 1. Redistributions of source code must retain the above copyright 16 * notice, this list of conditions and the following disclaimer. 17 * 2. Redistributions in binary form must reproduce the above copyright 18 * notice, this list of conditions and the following disclaimer in the 19 * documentation and/or other materials provided with the distribution. 20 * 3. All advertising materials mentioning features or use of this software 21 * must display the following acknowledgement: 22 * This product includes software developed by the University of 23 * California, Berkeley and its contributors. 24 * 4. Neither the name of the University nor the names of its contributors 25 * may be used to endorse or promote products derived from this software 26 * without specific prior written permission. 27 * 28 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 29 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 30 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 31 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 32 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 33 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 34 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 35 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 36 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 37 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 38 * SUCH DAMAGE. 39 * 40 * @(#)kern_lock.c 8.18 (Berkeley) 5/21/95 41 * $FreeBSD$ 42 */ 43 44 #include <sys/param.h> 45 #include <sys/proc.h> 46 #include <sys/kernel.h> 47 #include <sys/ktr.h> 48 #include <sys/lock.h> 49 #include <sys/malloc.h> 50 #include <sys/mutex.h> 51 #include <sys/systm.h> 52 53 /* 54 * Locking primitives implementation. 55 * Locks provide shared/exclusive sychronization. 56 */ 57 58 #define LOCK_WAIT_TIME 100 59 #define LOCK_SAMPLE_WAIT 7 60 61 #if defined(DIAGNOSTIC) 62 #define LOCK_INLINE 63 #else 64 #define LOCK_INLINE __inline 65 #endif 66 67 #define LK_ALL (LK_HAVE_EXCL | LK_WANT_EXCL | LK_WANT_UPGRADE | \ 68 LK_SHARE_NONZERO | LK_WAIT_NONZERO) 69 70 /* 71 * Mutex array variables. Rather than each lockmgr lock having its own mutex, 72 * share a fixed (at boot time) number of mutexes across all lockmgr locks in 73 * order to keep sizeof(struct lock) down. 74 */ 75 int lock_mtx_valid; 76 static struct mtx lock_mtx; 77 78 static int acquire(struct lock *lkp, int extflags, int wanted); 79 static int apause(struct lock *lkp, int flags); 80 static int acquiredrain(struct lock *lkp, int extflags) ; 81 82 static void 83 lockmgr_init(void *dummy __unused) 84 { 85 /* 86 * Initialize the lockmgr protection mutex if it hasn't already been 87 * done. Unless something changes about kernel startup order, VM 88 * initialization will always cause this mutex to already be 89 * initialized in a call to lockinit(). 90 */ 91 if (lock_mtx_valid == 0) { 92 mtx_init(&lock_mtx, "lockmgr", NULL, MTX_DEF); 93 lock_mtx_valid = 1; 94 } 95 } 96 SYSINIT(lmgrinit, SI_SUB_LOCK, SI_ORDER_FIRST, lockmgr_init, NULL) 97 98 static LOCK_INLINE void 99 sharelock(struct lock *lkp, int incr) { 100 lkp->lk_flags |= LK_SHARE_NONZERO; 101 lkp->lk_sharecount += incr; 102 } 103 104 static LOCK_INLINE void 105 shareunlock(struct lock *lkp, int decr) { 106 107 KASSERT(lkp->lk_sharecount >= decr, ("shareunlock: count < decr")); 108 109 if (lkp->lk_sharecount == decr) { 110 lkp->lk_flags &= ~LK_SHARE_NONZERO; 111 if (lkp->lk_flags & (LK_WANT_UPGRADE | LK_WANT_EXCL)) { 112 wakeup(lkp); 113 } 114 lkp->lk_sharecount = 0; 115 } else { 116 lkp->lk_sharecount -= decr; 117 } 118 } 119 120 /* 121 * This is the waitloop optimization. 122 */ 123 static int 124 apause(struct lock *lkp, int flags) 125 { 126 #ifdef SMP 127 int i, lock_wait; 128 #endif 129 130 if ((lkp->lk_flags & flags) == 0) 131 return 0; 132 #ifdef SMP 133 for (lock_wait = LOCK_WAIT_TIME; lock_wait > 0; lock_wait--) { 134 mtx_unlock(lkp->lk_interlock); 135 for (i = LOCK_SAMPLE_WAIT; i > 0; i--) 136 if ((lkp->lk_flags & flags) == 0) 137 break; 138 mtx_lock(lkp->lk_interlock); 139 if ((lkp->lk_flags & flags) == 0) 140 return 0; 141 } 142 #endif 143 return 1; 144 } 145 146 static int 147 acquire(struct lock *lkp, int extflags, int wanted) { 148 int s, error; 149 150 CTR3(KTR_LOCKMGR, 151 "acquire(): lkp == %p, extflags == 0x%x, wanted == 0x%x\n", 152 lkp, extflags, wanted); 153 154 if ((extflags & LK_NOWAIT) && (lkp->lk_flags & wanted)) { 155 return EBUSY; 156 } 157 158 if (((lkp->lk_flags | extflags) & LK_NOPAUSE) == 0) { 159 error = apause(lkp, wanted); 160 if (error == 0) 161 return 0; 162 } 163 164 s = splhigh(); 165 while ((lkp->lk_flags & wanted) != 0) { 166 lkp->lk_flags |= LK_WAIT_NONZERO; 167 lkp->lk_waitcount++; 168 error = msleep(lkp, lkp->lk_interlock, lkp->lk_prio, 169 lkp->lk_wmesg, 170 ((extflags & LK_TIMELOCK) ? lkp->lk_timo : 0)); 171 if (lkp->lk_waitcount == 1) { 172 lkp->lk_flags &= ~LK_WAIT_NONZERO; 173 lkp->lk_waitcount = 0; 174 } else { 175 lkp->lk_waitcount--; 176 } 177 if (error) { 178 splx(s); 179 return error; 180 } 181 if (extflags & LK_SLEEPFAIL) { 182 splx(s); 183 return ENOLCK; 184 } 185 } 186 splx(s); 187 return 0; 188 } 189 190 /* 191 * Set, change, or release a lock. 192 * 193 * Shared requests increment the shared count. Exclusive requests set the 194 * LK_WANT_EXCL flag (preventing further shared locks), and wait for already 195 * accepted shared locks and shared-to-exclusive upgrades to go away. 196 */ 197 int 198 #ifndef DEBUG_LOCKS 199 lockmgr(lkp, flags, interlkp, td) 200 #else 201 debuglockmgr(lkp, flags, interlkp, td, name, file, line) 202 #endif 203 struct lock *lkp; 204 u_int flags; 205 struct mtx *interlkp; 206 struct thread *td; 207 #ifdef DEBUG_LOCKS 208 const char *name; /* Name of lock function */ 209 const char *file; /* Name of file call is from */ 210 int line; /* Line number in file */ 211 #endif 212 { 213 int error; 214 pid_t pid; 215 int extflags, lockflags; 216 217 CTR5(KTR_LOCKMGR, 218 "lockmgr(): lkp == %p (lk_wmesg == \"%s\"), flags == 0x%x, " 219 "interlkp == %p, td == %p", lkp, lkp->lk_wmesg, flags, interlkp, td); 220 221 error = 0; 222 if (td == NULL) 223 pid = LK_KERNPROC; 224 else 225 pid = td->td_proc->p_pid; 226 227 mtx_lock(lkp->lk_interlock); 228 if (flags & LK_INTERLOCK) { 229 mtx_assert(interlkp, MA_OWNED | MA_NOTRECURSED); 230 mtx_unlock(interlkp); 231 } 232 233 if (panicstr != NULL) { 234 mtx_unlock(lkp->lk_interlock); 235 return (0); 236 } 237 238 extflags = (flags | lkp->lk_flags) & LK_EXTFLG_MASK; 239 240 switch (flags & LK_TYPE_MASK) { 241 242 case LK_SHARED: 243 /* 244 * If we are not the exclusive lock holder, we have to block 245 * while there is an exclusive lock holder or while an 246 * exclusive lock request or upgrade request is in progress. 247 * 248 * However, if TDF_DEADLKTREAT is set, we override exclusive 249 * lock requests or upgrade requests ( but not the exclusive 250 * lock itself ). 251 */ 252 if (lkp->lk_lockholder != pid) { 253 lockflags = LK_HAVE_EXCL; 254 mtx_lock_spin(&sched_lock); 255 if (td != NULL && !(td->td_flags & TDF_DEADLKTREAT)) 256 lockflags |= LK_WANT_EXCL | LK_WANT_UPGRADE; 257 mtx_unlock_spin(&sched_lock); 258 error = acquire(lkp, extflags, lockflags); 259 if (error) 260 break; 261 sharelock(lkp, 1); 262 #if defined(DEBUG_LOCKS) 263 lkp->lk_slockholder = pid; 264 lkp->lk_sfilename = file; 265 lkp->lk_slineno = line; 266 lkp->lk_slockername = name; 267 #endif 268 break; 269 } 270 /* 271 * We hold an exclusive lock, so downgrade it to shared. 272 * An alternative would be to fail with EDEADLK. 273 */ 274 sharelock(lkp, 1); 275 /* fall into downgrade */ 276 277 case LK_DOWNGRADE: 278 KASSERT(lkp->lk_lockholder == pid && lkp->lk_exclusivecount != 0, 279 ("lockmgr: not holding exclusive lock " 280 "(owner pid (%d) != pid (%d), exlcnt (%d) != 0", 281 lkp->lk_lockholder, pid, lkp->lk_exclusivecount)); 282 sharelock(lkp, lkp->lk_exclusivecount); 283 lkp->lk_exclusivecount = 0; 284 lkp->lk_flags &= ~LK_HAVE_EXCL; 285 lkp->lk_lockholder = LK_NOPROC; 286 if (lkp->lk_waitcount) 287 wakeup((void *)lkp); 288 break; 289 290 case LK_EXCLUPGRADE: 291 /* 292 * If another process is ahead of us to get an upgrade, 293 * then we want to fail rather than have an intervening 294 * exclusive access. 295 */ 296 if (lkp->lk_flags & LK_WANT_UPGRADE) { 297 shareunlock(lkp, 1); 298 error = EBUSY; 299 break; 300 } 301 /* fall into normal upgrade */ 302 303 case LK_UPGRADE: 304 /* 305 * Upgrade a shared lock to an exclusive one. If another 306 * shared lock has already requested an upgrade to an 307 * exclusive lock, our shared lock is released and an 308 * exclusive lock is requested (which will be granted 309 * after the upgrade). If we return an error, the file 310 * will always be unlocked. 311 */ 312 if ((lkp->lk_lockholder == pid) || (lkp->lk_sharecount <= 0)) 313 panic("lockmgr: upgrade exclusive lock"); 314 shareunlock(lkp, 1); 315 /* 316 * If we are just polling, check to see if we will block. 317 */ 318 if ((extflags & LK_NOWAIT) && 319 ((lkp->lk_flags & LK_WANT_UPGRADE) || 320 lkp->lk_sharecount > 1)) { 321 error = EBUSY; 322 break; 323 } 324 if ((lkp->lk_flags & LK_WANT_UPGRADE) == 0) { 325 /* 326 * We are first shared lock to request an upgrade, so 327 * request upgrade and wait for the shared count to 328 * drop to zero, then take exclusive lock. 329 */ 330 lkp->lk_flags |= LK_WANT_UPGRADE; 331 error = acquire(lkp, extflags, LK_SHARE_NONZERO); 332 lkp->lk_flags &= ~LK_WANT_UPGRADE; 333 334 if (error) 335 break; 336 lkp->lk_flags |= LK_HAVE_EXCL; 337 lkp->lk_lockholder = pid; 338 if (lkp->lk_exclusivecount != 0) 339 panic("lockmgr: non-zero exclusive count"); 340 lkp->lk_exclusivecount = 1; 341 #if defined(DEBUG_LOCKS) 342 lkp->lk_filename = file; 343 lkp->lk_lineno = line; 344 lkp->lk_lockername = name; 345 #endif 346 break; 347 } 348 /* 349 * Someone else has requested upgrade. Release our shared 350 * lock, awaken upgrade requestor if we are the last shared 351 * lock, then request an exclusive lock. 352 */ 353 if ( (lkp->lk_flags & (LK_SHARE_NONZERO|LK_WAIT_NONZERO)) == 354 LK_WAIT_NONZERO) 355 wakeup((void *)lkp); 356 /* fall into exclusive request */ 357 358 case LK_EXCLUSIVE: 359 if (lkp->lk_lockholder == pid && pid != LK_KERNPROC) { 360 /* 361 * Recursive lock. 362 */ 363 if ((extflags & (LK_NOWAIT | LK_CANRECURSE)) == 0) 364 panic("lockmgr: locking against myself"); 365 if ((extflags & LK_CANRECURSE) != 0) { 366 lkp->lk_exclusivecount++; 367 break; 368 } 369 } 370 /* 371 * If we are just polling, check to see if we will sleep. 372 */ 373 if ((extflags & LK_NOWAIT) && 374 (lkp->lk_flags & (LK_HAVE_EXCL | LK_WANT_EXCL | LK_WANT_UPGRADE | LK_SHARE_NONZERO))) { 375 error = EBUSY; 376 break; 377 } 378 /* 379 * Try to acquire the want_exclusive flag. 380 */ 381 error = acquire(lkp, extflags, (LK_HAVE_EXCL | LK_WANT_EXCL)); 382 if (error) 383 break; 384 lkp->lk_flags |= LK_WANT_EXCL; 385 /* 386 * Wait for shared locks and upgrades to finish. 387 */ 388 error = acquire(lkp, extflags, LK_WANT_UPGRADE | LK_SHARE_NONZERO); 389 lkp->lk_flags &= ~LK_WANT_EXCL; 390 if (error) 391 break; 392 lkp->lk_flags |= LK_HAVE_EXCL; 393 lkp->lk_lockholder = pid; 394 if (lkp->lk_exclusivecount != 0) 395 panic("lockmgr: non-zero exclusive count"); 396 lkp->lk_exclusivecount = 1; 397 #if defined(DEBUG_LOCKS) 398 lkp->lk_filename = file; 399 lkp->lk_lineno = line; 400 lkp->lk_lockername = name; 401 #endif 402 break; 403 404 case LK_RELEASE: 405 if (lkp->lk_exclusivecount != 0) { 406 if (lkp->lk_lockholder != pid && 407 lkp->lk_lockholder != LK_KERNPROC) { 408 panic("lockmgr: pid %d, not %s %d unlocking", 409 pid, "exclusive lock holder", 410 lkp->lk_lockholder); 411 } 412 if (lkp->lk_exclusivecount == 1) { 413 lkp->lk_flags &= ~LK_HAVE_EXCL; 414 lkp->lk_lockholder = LK_NOPROC; 415 lkp->lk_exclusivecount = 0; 416 } else { 417 lkp->lk_exclusivecount--; 418 } 419 } else if (lkp->lk_flags & LK_SHARE_NONZERO) 420 shareunlock(lkp, 1); 421 if (lkp->lk_flags & LK_WAIT_NONZERO) 422 wakeup((void *)lkp); 423 break; 424 425 case LK_DRAIN: 426 /* 427 * Check that we do not already hold the lock, as it can 428 * never drain if we do. Unfortunately, we have no way to 429 * check for holding a shared lock, but at least we can 430 * check for an exclusive one. 431 */ 432 if (lkp->lk_lockholder == pid) 433 panic("lockmgr: draining against myself"); 434 435 error = acquiredrain(lkp, extflags); 436 if (error) 437 break; 438 lkp->lk_flags |= LK_DRAINING | LK_HAVE_EXCL; 439 lkp->lk_lockholder = pid; 440 lkp->lk_exclusivecount = 1; 441 #if defined(DEBUG_LOCKS) 442 lkp->lk_filename = file; 443 lkp->lk_lineno = line; 444 lkp->lk_lockername = name; 445 #endif 446 break; 447 448 default: 449 mtx_unlock(lkp->lk_interlock); 450 panic("lockmgr: unknown locktype request %d", 451 flags & LK_TYPE_MASK); 452 /* NOTREACHED */ 453 } 454 if ((lkp->lk_flags & LK_WAITDRAIN) && 455 (lkp->lk_flags & (LK_HAVE_EXCL | LK_WANT_EXCL | LK_WANT_UPGRADE | 456 LK_SHARE_NONZERO | LK_WAIT_NONZERO)) == 0) { 457 lkp->lk_flags &= ~LK_WAITDRAIN; 458 wakeup((void *)&lkp->lk_flags); 459 } 460 mtx_unlock(lkp->lk_interlock); 461 return (error); 462 } 463 464 static int 465 acquiredrain(struct lock *lkp, int extflags) { 466 int error; 467 468 if ((extflags & LK_NOWAIT) && (lkp->lk_flags & LK_ALL)) { 469 return EBUSY; 470 } 471 472 error = apause(lkp, LK_ALL); 473 if (error == 0) 474 return 0; 475 476 while (lkp->lk_flags & LK_ALL) { 477 lkp->lk_flags |= LK_WAITDRAIN; 478 error = msleep(&lkp->lk_flags, lkp->lk_interlock, lkp->lk_prio, 479 lkp->lk_wmesg, 480 ((extflags & LK_TIMELOCK) ? lkp->lk_timo : 0)); 481 if (error) 482 return error; 483 if (extflags & LK_SLEEPFAIL) { 484 return ENOLCK; 485 } 486 } 487 return 0; 488 } 489 490 /* 491 * Initialize a lock; required before use. 492 */ 493 void 494 lockinit(lkp, prio, wmesg, timo, flags) 495 struct lock *lkp; 496 int prio; 497 const char *wmesg; 498 int timo; 499 int flags; 500 { 501 CTR5(KTR_LOCKMGR, "lockinit(): lkp == %p, prio == %d, wmesg == \"%s\", " 502 "timo == %d, flags = 0x%x\n", lkp, prio, wmesg, timo, flags); 503 504 if (lock_mtx_valid == 0) { 505 mtx_init(&lock_mtx, "lockmgr", NULL, MTX_DEF); 506 lock_mtx_valid = 1; 507 } 508 /* 509 * XXX cleanup - make sure mtxpool is always initialized before 510 * this is ever called. 511 */ 512 if (mtx_pool_valid) { 513 mtx_lock(&lock_mtx); 514 lkp->lk_interlock = mtx_pool_alloc(); 515 mtx_unlock(&lock_mtx); 516 } else { 517 lkp->lk_interlock = &lock_mtx; 518 } 519 lkp->lk_flags = (flags & LK_EXTFLG_MASK); 520 lkp->lk_sharecount = 0; 521 lkp->lk_waitcount = 0; 522 lkp->lk_exclusivecount = 0; 523 lkp->lk_prio = prio; 524 lkp->lk_wmesg = wmesg; 525 lkp->lk_timo = timo; 526 lkp->lk_lockholder = LK_NOPROC; 527 } 528 529 /* 530 * Destroy a lock. 531 */ 532 void 533 lockdestroy(lkp) 534 struct lock *lkp; 535 { 536 CTR2(KTR_LOCKMGR, "lockdestroy(): lkp == %p (lk_wmesg == \"%s\")", 537 lkp, lkp->lk_wmesg); 538 } 539 540 /* 541 * Determine the status of a lock. 542 */ 543 int 544 lockstatus(lkp, td) 545 struct lock *lkp; 546 struct thread *td; 547 { 548 int lock_type = 0; 549 550 mtx_lock(lkp->lk_interlock); 551 if (lkp->lk_exclusivecount != 0) { 552 if (td == NULL || lkp->lk_lockholder == td->td_proc->p_pid) 553 lock_type = LK_EXCLUSIVE; 554 else 555 lock_type = LK_EXCLOTHER; 556 } else if (lkp->lk_sharecount != 0) 557 lock_type = LK_SHARED; 558 mtx_unlock(lkp->lk_interlock); 559 return (lock_type); 560 } 561 562 /* 563 * Determine the number of holders of a lock. 564 */ 565 int 566 lockcount(lkp) 567 struct lock *lkp; 568 { 569 int count; 570 571 mtx_lock(lkp->lk_interlock); 572 count = lkp->lk_exclusivecount + lkp->lk_sharecount; 573 mtx_unlock(lkp->lk_interlock); 574 return (count); 575 } 576 577 /* 578 * Print out information about state of a lock. Used by VOP_PRINT 579 * routines to display status about contained locks. 580 */ 581 void 582 lockmgr_printinfo(lkp) 583 struct lock *lkp; 584 { 585 586 if (lkp->lk_sharecount) 587 printf(" lock type %s: SHARED (count %d)", lkp->lk_wmesg, 588 lkp->lk_sharecount); 589 else if (lkp->lk_flags & LK_HAVE_EXCL) 590 printf(" lock type %s: EXCL (count %d) by pid %d", 591 lkp->lk_wmesg, lkp->lk_exclusivecount, lkp->lk_lockholder); 592 if (lkp->lk_waitcount > 0) 593 printf(" with %d pending", lkp->lk_waitcount); 594 } 595