From owner-freebsd-hackers@FreeBSD.ORG Mon Nov 15 18:33:25 2010 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C5AC7106564A; Mon, 15 Nov 2010 18:33:25 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from out-0.mx.aerioconnect.net (out-0-8.mx.aerioconnect.net [216.240.47.68]) by mx1.freebsd.org (Postfix) with ESMTP id A4E648FC08; Mon, 15 Nov 2010 18:33:25 +0000 (UTC) Received: from idiom.com (postfix@mx0.idiom.com [216.240.32.160]) by out-0.mx.aerioconnect.net (8.13.8/8.13.8) with ESMTP id oAFIXOcT019146; Mon, 15 Nov 2010 10:33:24 -0800 X-Client-Authorized: MaGic Cook1e X-Client-Authorized: MaGic Cook1e X-Client-Authorized: MaGic Cook1e Received: from julian-mac.elischer.org (h-67-100-89-137.snfccasy.static.covad.net [67.100.89.137]) by idiom.com (Postfix) with ESMTP id 7719C2D601A; Mon, 15 Nov 2010 10:33:23 -0800 (PST) Message-ID: <4CE17CF5.6050107@freebsd.org> Date: Mon, 15 Nov 2010 10:33:25 -0800 From: Julian Elischer User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.2.12) Gecko/20101027 Thunderbird/3.1.6 MIME-Version: 1.0 To: Paul LeoNerd Evans References: <20101112184000.GS11110@cel.leo> <201011151125.42697.jhb@freebsd.org> <20101115181211.GV11110@cel.leo> In-Reply-To: <20101115181211.GV11110@cel.leo> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.67 on 216.240.47.51 Cc: freebsd-hackers@freebsd.org Subject: Re: Managing userland data pointers in kqueue/kevent X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 15 Nov 2010 18:33:25 -0000 On 11/15/10 10:12 AM, Paul LeoNerd Evans wrote: > On Mon, Nov 15, 2010 at 11:25:42AM -0500, John Baldwin wrote: >> I think the assumption is that userland actually maintains a reference on the >> specified object (e.g. a file descriptor) and will know to drop the associated >> data when the file descriptor is closed. That is, think of the kevent as a >> member of an eventable object rather than a separate object that has a >> reference to the eventable object. When the eventable object's reference >> count drops to zero in userland, then the kevent should be deleted, either via >> EV_DELETE, or implicitly (e.g. by closing the associated file descriptor). > Ah. Well, that could be considered a bit more awkward for the use case I > wanted to apply. The idea was that the udata would refer effectively > to a closure, to invoke when the event happens. The idea being you can > just add an event watcher by, say: > > $ev->EV_SET( $pid, EVFILT_PROC, 0, NOTE_EXIT, 0, sub { > print STDERR "The child process $pid has now exited\n"; > } ); > > So, the kernel's udata pointer effectively holds the only reference to > this anonymous closure. It's much more flexible this way, especially for > oneshot events like that. > > The beauty is also that the kevents() loop can simply know that the > udata is always a code reference so just has to invoke it to do whatever > the original caller wanted to do. > > Keep in mind my use-case here; I'm not trying to be one specific > application, it's a general-purpose kevent-wrapping library. > >> I think in your case you should not give the kevent a reference to your >> object, but instead remove the associated event for a given object when an >> object's refcount drops to zero. > Well that's certainly doable in longrunning watches, but I don't think > it sounds very convenient for a oneshot event; see the above example for > justification. > > Also it again begs my question, worth repeating here: > > On Friday, November 12, 2010 1:40:00 pm Paul LeoNerd Evans wrote: >> I had >> thought the point of kqueue/kevent is the O(1) nature of it, which is >> among why the kernel is storing that void *udata pointer in the first >> place. If I have to store a mapping from every filter+identity back to >> my data pointer, why does the kernel store one at all? I could just >> ignore the udata field and use my mapping for my own purposes. > If you're saying that in my not-so-rare use case, I don't want to be > using udata, and instead keeping my own mapping, why does the kernel > provide this udata field at all? it was provided for pretty much what you are using it for, so that the userland caller could easily associate the returning event with some private information about the event.