These syscalls do two operations: they allocate FDs and some buffers.
Thanks to the work done for sockets the file-related bits are now
mp-safe, so we can push the KERNEL_LOCK() down.

Diff below adds some KERNEL_LOCK/UNLOCK() dances around km_alloc(9) and
km_free(9).  It also makes some counters use atomic operations.

My goals for this diff are to prepare the terrain to unlock read(2) &
write(2) for pipes and push the KERNEL_LOCK() at UVM borders, to
hopefully motivate other hackers to push further down!

Index: kern/sys_pipe.c
===================================================================
RCS file: /cvs/src/sys/kern/sys_pipe.c,v
retrieving revision 1.81
diff -u -p -r1.81 sys_pipe.c
--- kern/sys_pipe.c     18 Jun 2018 09:15:05 -0000      1.81
+++ kern/sys_pipe.c     26 Jun 2018 10:27:51 -0000
@@ -91,8 +91,8 @@ struct filterops pipe_wfiltops =
  * Limit the number of "big" pipes
  */
 #define LIMITBIGPIPES  32
-int nbigpipe;
-static int amountpipekva;
+unsigned int nbigpipe;
+static unsigned int amountpipekva;
 
 struct pool pipe_pool;
 
@@ -214,7 +214,9 @@ pipespace(struct pipe *cpipe, u_int size
 {
        caddr_t buffer;
 
+       KERNEL_LOCK();
        buffer = km_alloc(size, &kv_any, &kp_pageable, &kd_waitok);
+       KERNEL_UNLOCK();
        if (buffer == NULL) {
                return (ENOMEM);
        }
@@ -227,7 +229,7 @@ pipespace(struct pipe *cpipe, u_int size
        cpipe->pipe_buffer.out = 0;
        cpipe->pipe_buffer.cnt = 0;
 
-       amountpipekva += cpipe->pipe_buffer.size;
+       atomic_add_int(&amountpipekva, cpipe->pipe_buffer.size);
 
        return (0);
 }
@@ -443,14 +445,13 @@ pipe_write(struct file *fp, off_t *poff,
         * If it is advantageous to resize the pipe buffer, do
         * so.
         */
-       if ((uio->uio_resid > PIPE_SIZE) &&
-           (nbigpipe < LIMITBIGPIPES) &&
+       if ((uio->uio_resid > PIPE_SIZE) && (nbigpipe < LIMITBIGPIPES) &&
            (wpipe->pipe_buffer.size <= PIPE_SIZE) &&
            (wpipe->pipe_buffer.cnt == 0)) {
 
                if ((error = pipelock(wpipe)) == 0) {
                        if (pipespace(wpipe, BIG_PIPE_SIZE) == 0)
-                               nbigpipe++;
+                               atomic_inc_int(&nbigpipe);
                        pipeunlock(wpipe);
                }
        }
@@ -753,12 +754,15 @@ pipe_close(struct file *fp, struct proc 
 void
 pipe_free_kmem(struct pipe *cpipe)
 {
+       u_int size = cpipe->pipe_buffer.size;
+
        if (cpipe->pipe_buffer.buffer != NULL) {
-               if (cpipe->pipe_buffer.size > PIPE_SIZE)
-                       --nbigpipe;
-               amountpipekva -= cpipe->pipe_buffer.size;
-               km_free(cpipe->pipe_buffer.buffer, cpipe->pipe_buffer.size,
-                   &kv_any, &kp_pageable);
+               if (size > PIPE_SIZE)
+                       atomic_dec_int(&nbigpipe);
+               atomic_sub_int(&amountpipekva, size);
+               KERNEL_LOCK();
+               km_free(cpipe->pipe_buffer.buffer, size, &kv_any, &kp_pageable);
+               KERNEL_UNLOCK();
                cpipe->pipe_buffer.buffer = NULL;
        }
 }
@@ -771,7 +775,6 @@ pipeclose(struct pipe *cpipe)
 {
        struct pipe *ppipe;
        if (cpipe) {
-               
                pipeselwakeup(cpipe);
 
                /*
Index: kern/syscalls.master
===================================================================
RCS file: /cvs/src/sys/kern/syscalls.master,v
retrieving revision 1.182
diff -u -p -r1.182 syscalls.master
--- kern/syscalls.master        20 Jun 2018 10:52:49 -0000      1.182
+++ kern/syscalls.master        26 Jun 2018 09:56:44 -0000
@@ -217,7 +217,7 @@
                            socklen_t namelen); }
 99     STD             { int sys_getdents(int fd, void *buf, size_t buflen); }
 100    STD             { int sys_getpriority(int which, id_t who); }
-101    STD             { int sys_pipe2(int *fdp, int flags); }
+101    STD NOLOCK      { int sys_pipe2(int *fdp, int flags); }
 102    STD             { int sys_dup3(int from, int to, int flags); }
 103    STD             { int sys_sigreturn(struct sigcontext *sigcntxp); }
 104    STD             { int sys_bind(int s, const struct sockaddr *name, \
@@ -447,7 +447,7 @@
 260    UNIMPL
 261    UNIMPL
 262    UNIMPL
-263    STD             { int sys_pipe(int *fdp); }
+263    STD NOLOCK      { int sys_pipe(int *fdp); }
 264    STD             { int sys_fhopen(const fhandle_t *fhp, int flags); }
 265    UNIMPL
 266    UNIMPL

Reply via email to