Manual Page Result
0
Command: KERNEL_UNLOCK_ONE | Section: 9 | Source: NetBSD | File: KERNEL_UNLOCK_ONE.9
KERNEL_LOCK(9) FreeBSD Kernel Developer's Manual KERNEL_LOCK(9)
NAME
KERNEL_LOCK - compatibility with legacy uniprocessor code
SYNOPSIS
#include <sys/systm.h>
void
KERNEL_LOCK(int nlocks, struct lwp *l);
void
KERNEL_UNLOCK_ONE(struct lwp *l);
void
KERNEL_UNLOCK_ALL(struct lwp *l, int *nlocksp);
void
KERNEL_UNLOCK_LAST(struct lwp *l);
bool
KERNEL_LOCKED_P();
DESCRIPTION
The KERNEL_LOCK facility serves to gradually transition software from the
kernel's legacy uniprocessor execution model, where the kernel runs on
only a single CPU and never in parallel on multiple CPUs, to a
multiprocessor system.
New code should not use KERNEL_LOCK. KERNEL_LOCK is meant only for
gradual transition of NetBSD to natively MP-safe code, which uses
mutex(9) or other locking(9) facilities to synchronize between threads
and interrupt handlers. Use of KERNEL_LOCK hurts system performance and
responsiveness. This man page exists only to document the legacy API in
order to make it easier to transition away from.
The kernel lock, sometimes also known as `giant lock' or `big lock', is a
recursive exclusive spin-lock that can be held by a CPU at any interrupt
priority level and is dropped while sleeping. This means:
recursive If a CPU already holds the kernel lock, it can be acquired
again and again, as long as it is released an equal number
of times.
exclusive Only one CPU at a time can hold the kernel lock.
spin-lock When one CPU holds the kernel lock and another CPU wants
to hold it, the second CPU `spins', i.e., repeatedly
executes instructions to see if the kernel lock is
available yet, until the first CPU releases it. During
this time, no other threads can run on the spinning CPU.
This means holding the kernel lock for long periods of
time, such as nontrivial computation, must be avoided.
Under LOCKDEBUG kernels, holding the kernel lock for too
long can lead to `spinout' crashes.
held by a CPU The kernel lock is held by a CPU, not by a process,
kthread, LWP, or interrupt handler. It may be shared by a
kthread LWP and several softint LWPs at the same time, for
example, if the softints interrupted the thread on a CPU.
any interrupt priority level
The kernel lock does not block interrupts; subsystems
running with the kernel lock use spl(9) to synchronize
with interrupt handlers.
Interrupt handlers that are not marked MP-safe are always
run with the kernel lock. If the interrupt arrives on a
CPU where the kernel lock is already held, it is simply
taken again recursively on interrupt entry and released to
its original recursion depth on interrupt exit.
dropped while sleeping
Any time the kernel sleeps to let other threads run, for
any reason including tsleep(9) or condvar(9) or even
adaptive mutex(9) locks, it releases the kernel lock
before going to sleep and then reacquires it afterward.
This means, for instance, that although data structures
accessed only under the kernel lock won't be changed
before the sleep, they may be changed by another thread
during the sleep. For example, the following program may
crash on an assertion failure because the sleep in
mutex_enter(9) can allow another CPU to run and change the
global variable x:
KERNEL_LOCK(1, NULL);
x = 42;
mutex_enter(...);
...
mutex_exit(...);
KASSERT(x == 42);
KERNEL_UNLOCK_ONE(NULL);
This means simply introducing calls to mutex_enter(9) and
mutex_exit(9) can break kernel-locked assumptions.
Subsystems need to be consistently converted from
KERNEL_LOCK and spl(9) to mutex(9), condvar(9), etc.;
mixing mutex(9) and KERNEL_LOCK usually doesn't work.
Holding the kernel lock does not prevent other code from running on other
CPUs at the same time. It only prevents other kernel-locked code from
running on other CPUs at the same time.
FUNCTIONS
KERNEL_LOCK(nlocks, l)
Acquire nlocks recursive levels of kernel lock.
If the kernel lock is already held by another CPU, spins until it
can be acquired by this one. If the kernel lock is already held by
this CPU, records the kernel lock recursion depth and returns
immediately.
Most of the time nlocks is 1, but code that deliberately releases
all of the kernel locks held by the current CPU in order to sleep
and later reacquire the same number of kernel locks will pass a
value of nlocks obtained from KERNEL_UNLOCK_ALL().
KERNEL_UNLOCK_ONE(l)
Release one level of the kernel lock. Equivalent to
KERNEL_UNLOCK(1, l, NULL).
KERNEL_UNLOCK_ALL(l, nlocksp)
Store the kernel lock recursion depth at nlocksp and release all
recursive levels of the kernel lock.
This is often used inside logic implementing sleep, around a call
to mi_switch(9), so that the same number of recursive kernel locks
can be reacquired afterward once the thread is reawoken:
int nlocks;
KERNEL_UNLOCK_ALL(l, &nlocks);
... mi_switch(l) ...
KERNEL_LOCK(nlocks, l);
KERNEL_UNLOCK_LAST(l)
Release the kernel lock, which must be held at exactly one level.
This is normally used at the end of a non-MP-safe thread, which was
known to have started with exactly one level of the kernel lock,
and is now about to exit.
KERNEL_LOCKED_P()
True if the kernel lock is held.
To be used only in diagnostic assertions with KASSERT(9).
The legacy argument l must be NULL or curlwp, which mean the same thing.
NOTES
Some NetBSD kernel abstractions execute caller-specified functions with
the kernel lock held by default, for compatibility with legacy code, but
can be explicitly instructed not to hold the kernel lock by passing an
MP-safe flag:
o callout(9), CALLOUT_MPSAFE
o kfilter_register(9) and knote(9), FILTEROPS_MPSAFE
o kthread(9), KTHREAD_MPSAFE
o pci_intr(9), PCI_INTR_MPSAFE
o scsipi(9), SCSIPI_ADAPT_MPSAFE
o softint(9), SOFTINT_MPSAFE
o usbdi(9) pipes, USBD_MPSAFE
o usbdi(9) tasks, USB_TASKQ_MPSAFE
o vnode(9), VV_MPSAFE
o workqueue(9), WQ_MPSAFE
The following NetBSD subsystems are still kernel-locked and need re-
engineering to take advantage of parallelism on multiprocessor systems:
o ata(4), atapi(4), wd(4)
o video(4)
o autoconf(9)
o most of the network stack by default, unless the option NET_MPSAFE is
enabled
o ...
All interrupt handlers at IPL_VM, or lower (spl(9)) run with the kernel
lock on most ports.
SEE ALSO
locking(9), mutex(9), spl(9)
FreeBSD 14.1-RELEASE-p8 February 13, 2022 FreeBSD 14.1-RELEASE-p8