[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200906190457.n5J4vkkT010851@www262.sakura.ne.jp>
Date: Fri, 19 Jun 2009 13:57:46 +0900
From: Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>
To: paulmck@...ux.vnet.ibm.com
Cc: linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] TOMOYO: Add garbage collector support. (v3)
Hello.
The GC thread is a loop of
(1) Take gc_mutex
(2) Remove an element from the list using RCU
(3) Wait for readers without releasing gc_mutex
(4) Free up that element
(5) Release gc_mutex
A new round will not see element which was removed by previous round.
Paul E. McKenney wrote:
> > > Consider the following sequence of events:
> > >
> > > o CPU 0 picks up users_counter_idx int local variable idx.
> > > Let's assume that the value is zero.
> > >
> > > o CPU 0 is now preempted, interrupted, or otherwise delayed.
> > >
o CPU 1 takes gc_mutex.
> > > o CPU 1 starts garbage collection, finding some elements to
> > > delete, thus setting "element_deleted" to true.
> > >
> > > o CPU 1 continues garbage collection, inverting the value of
> > > users_counter_idx, so that the value is now one, waiting
> > > for the value-zero readers, and freeing up the old elements.
>
o CPU 1 releases gc_mutex.
> [1]
>
> > > o CPU 0 continues execution, first atomically incrementing
> > > users_counter[0], then traversing the list, possibly sleeping.
> > >
o CPU 2 takes gc_mutex.
> > > o CPU 2 starts a new round of garbage collection, again finding
> > > some elements to delete, and thus again setting
> > > "elements_deleted" to true. One of the elements deleted
> > > is the one that CPU 0 is currently referencing while asleep.
> > >
> > No. CPU 2 can't start a new round of GC because GC function is exclusively
> > executed because of gc_mutex mutex.
>
> But CPU 1 would have released gc_mutex back at time [1], right?
>
Yes, CPU 1 will release gc_mutex after freeing up elements (which were removed
from the list after gc_mutex was taken).
If CPU 0 sleeps between "idx = atomic_read(&users_counter_idx)" and
"atomic_inc(&users_counter[idx])", CPU 0 will not see the element
removed by CPU 1 because CPU 0 has not started list traversal.
Same result for CPU 0 sleeping between "atomic_inc(&users_counter[idx])"
and "list_for_each_rcu() {".
> > > o CPU 2 continues garbage collection, inverting the value of
> > > users_counter_idx, so that the value is now zero, waiting
> > > for the value-one readers, and freeing up the old elements.
> > > Note that CPU 0 is a value-zero reader, so that CPU 2 will
> > > not wait on it.
> > >
> > > CPU 2 therefore kfree()s the element that CPU 0 is currently
> > > referencing.
> > >
> > CPU 2 won't continue GC, for CPU 2 can't start a new round of GC.
>
> I still don't see why CPU 0 would not have released gc_mutex back
> at point [1].
>
CPU 1 has released gc_mutex at point [1].
In that case, CPU 2 can take gc_mutex and start a new round.
Nobody can start a new round before previous round finishes.
CPU 2 can start a new round, but by that time, CPU 0 finished list traversal
and atomically decremented users_counter[0] . CPU 1 won't finish a GC round
before CPU 0 decrements users_counter[0], and thus CPU 2 won't start
a new GC round before CPU 0 finishes list traversal.
> > > o CPU 0 wakes up, and suffers possibly fatal disappointment upon
> > > attempting to reference an element that has been freed -- and,
> > > worse yet, possibly re-allocated as some other type of
> > > structure.
> > >
> > CPU 0 won't suffer, for first round of GC (by CPU 1) prevents CPU 2 from
> > starting a new round of GC.
>
> Why would CPU 1 be unable to complete its round of GC, thus releasing
> gc_mutex, thus allowing CPU 2 from starting a new one? For that matter,
> CPU 1 could start a new round, correct?
>
Because CPU 1 waits for CPU 0's atomic_dec() without releasing gc_mutex .
> > > Or am I missing something in your pseudocode?
> > I think you missed that GC function is executed exclusively.
> >
> > The race between readers and GC is avoided as below.
>
> If you can tell me why CPU 1 cannot release gc_mutex, I will look at
> the following. Until then, I will stand by my scenario above. ;-)
CPU 1 can release gc_mutex when that round finished (i.e. after freeing up
elements removed by that round).
> > > Also, if you have lots of concurrent readers, you can suffer high memory
> > > contention on the users_counter[] array, correct?
> >
> > Excuse me. I couldn't understand "memory contention"...
> >
> > ( http://www.answers.com/topic/memory-contention )
> > | A situation in which two different programs, or two parts of a program,
> > | try to read items in the same block of memory at the same time.
> > Why suffered by atomic_read() at the same time?
> > Cache invalidation by atomic_inc()/atomic_dec() a shared variable?
>
> Yes, cache invalidation by atomic_inc()/atomic_dec() of a shared
> variable can definitly result in memory contention and extremely
> bad performance.
I have poor knowledge about hardware mechanisms.
Would you please answer within you can?
I experienced 8086 (not 80186 and later) assembly programming a bit
on MS-DOS. My experience says that (I don't know actual cycle numbers)
"mov eax, ebx" takes one CPU cycle.
"mov eax, [ebx]" takes three CPU cycles.
And it seems to me that modifying a shared variable doesn't affect
performance.
But if caching mechanisms exist, "mov eax, [ebx]" takes one CPU cycle if
[ebx] is on cache, three CPU cycles if not on cache, is this correct?
And modifying [ebx] invalidates cache, doesn't it?
Then,
atomic_t counter[NR_CPUS];
atomic_inc(&counter[smp_prosessor_id()]);
shows better performance than
atomic_t counter;
atomic_inc(&counter);
?
Does cache invalidation mechanism invalidate only sizeof(atomic_t) bytes
(or invalidates more bytes nearby &counter)?
Another keyword which is worrisome for me is NUMA.
My understanding is that NUMA splits RAM into nodes and tries to use RAM
in current node.
In NUMA environment, (for example) "mov eax, [ebx]" takes three CPU cycles
if ebx refers current node and hundred CPU cycles if ebx refers other node?
Then, is it preferable to place copy of ACL information to every node
rather than sharing one ACL information?
> > > I recommend that you look into use of SRCU in this case.
> >
> > I have one worry regarding SRCU.
> > Inside synchronize_srcu(), there is a loop
> >
> > while (srcu_readers_active_idx(sp, idx))
> > schedule_timeout_interruptible(1);
> >
> > but the reader's sleeping duration varies from less than one second to
> > more than hours.
> >
> > Checking for counters for every jiffies sounds too much waste of CPU.
> > Delaying kfree() for seconds or minutes won't cause troubles for TOMOYO.
> > It would be nice if checking interval is configurable like
> > "schedule_timeout_interruptible(sp->timeout);".
>
> This would not be a difficult change, and certainly would make sense in
> your case. I would be happy to review a patch from you, or to create a
> patch to SRCU if you would prefer.
>
> I would add a field as you say, and add an API element:
>
> void set_srcu_timeout(struct srcu_struct *sp, unsigned long timeout)
>
> The timeout would default to 1, and a value of 0 would be interpreted
> as 1. In your case, perhaps you would do the following after initializing
> the srcu_struct:
>
> set_srcu_timeout(&tomoyo_srcu, HZ);
>
> Would this work?
Yes. May I?
(I use "long" rather than "unsigned long" because schedule_timeout() rejects
negative timeout value.)
Regards.
--------------------
Subject: [PATCH] SRCU: Allow longer timeout for non-urgent reclaimer.
Currently synchronize_srcu() checks for readers for every jiffies.
But if reader sleeps for long, we don't need to check so frequently.
This patch allows non-urgent SRCU reclaimers (e.g. checking for every second
is sufficient) to use longer timeout.
Signed-off-by: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
---
include/linux/srcu.h | 2 ++
kernel/srcu.c | 14 +++++++++++++-
2 files changed, 15 insertions(+), 1 deletion(-)
--- security-testing-2.6.orig/include/linux/srcu.h
+++ security-testing-2.6/include/linux/srcu.h
@@ -35,6 +35,7 @@ struct srcu_struct {
int completed;
struct srcu_struct_array *per_cpu_ref;
struct mutex mutex;
+ long timeout;
};
#ifndef CONFIG_PREEMPT
@@ -49,5 +50,6 @@ int srcu_read_lock(struct srcu_struct *s
void srcu_read_unlock(struct srcu_struct *sp, int idx) __releases(sp);
void synchronize_srcu(struct srcu_struct *sp);
long srcu_batches_completed(struct srcu_struct *sp);
+void set_srcu_timeout(struct srcu_struct *sp, long timeout);
#endif
--- security-testing-2.6.orig/kernel/srcu.c
+++ security-testing-2.6/kernel/srcu.c
@@ -44,6 +44,7 @@
*/
int init_srcu_struct(struct srcu_struct *sp)
{
+ sp->timeout = 1;
sp->completed = 0;
mutex_init(&sp->mutex);
sp->per_cpu_ref = alloc_percpu(struct srcu_struct_array);
@@ -201,7 +202,7 @@ void synchronize_srcu(struct srcu_struct
*/
while (srcu_readers_active_idx(sp, idx))
- schedule_timeout_interruptible(1);
+ schedule_timeout_interruptible(sp->timeout);
synchronize_sched(); /* Force memory barrier on all CPUs. */
@@ -249,6 +250,17 @@ long srcu_batches_completed(struct srcu_
return sp->completed;
}
+/**
+ * set_srcu_timeout - set checking interval for synchronize_srcu()
+ * @sp: srcu_struct
+ * @timeout: checking interval in jiffies.
+ */
+void set_srcu_timeout(struct srcu_struct *sp, long timeout)
+{
+ if (timeout >= 1 && timeout != MAX_SCHEDULE_TIMEOUT)
+ sp->timeout = timeout;
+}
+
EXPORT_SYMBOL_GPL(init_srcu_struct);
EXPORT_SYMBOL_GPL(cleanup_srcu_struct);
EXPORT_SYMBOL_GPL(srcu_read_lock);
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists