lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1367966343.1770.3.camel@buesod1.americas.hpqcorp.net>
Date:	Tue, 07 May 2013 15:39:03 -0700
From:	Davidlohr Bueso <davidlohr.bueso@...com>
To:	Michel Lespinasse <walken@...gle.com>
Cc:	Linus Torvalds <torvalds@...ux-foundation.org>,
	David Howells <dhowells@...hat.com>,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	Ingo Molnar <mingo@...nel.org>, Rik van Riel <riel@...hat.com>,
	Peter Hurley <peter@...leysoftware.com>,
	Alex Shi <alex.shi@...el.com>,
	Yuanhan Liu <yuanhan.liu@...ux.intel.com>,
	Andrew Morton <akpm@...ux-foundation.org>,
	linux-kernel@...r.kernel.org
Subject: [PATCH v3 15/14] rwsem: check counter to avoid cmpxchg calls

On Tue, 2013-05-07 at 06:45 -0700, Michel Lespinasse wrote:
> (Davidlohr also has one additional patch which further improves throughput,
> though I will ask him to send it directly to you as I have suggested some
> minor changes).

From: Davidlohr Bueso <davidlohr.bueso@...com>

This patch tries to reduce the amount of cmpxchg calls in the
writer failed path by checking the counter value first before
issuing the instruction. If ->count is not set to RWSEM_WAITING_BIAS
then there is no point wasting a cmpxchg call.

Furthermore, Michel states "I suppose it helps due to the case where
someone else steals the lock while we're trying to acquire sem->wait_lock."

Two very different workloads and machines were used to see how this
patch improves throughput: pgbench on a quad-core laptop and aim7 on a
large 8 socket box with 80 cores.

Some results comparing Michel's fast-path write lock stealing
(tps-rwsem) on a quad-core laptop running pgbench:

| db_size | clients  |  tps-rwsem     |   tps-patch  |
+---------+----------+----------------+--------------+
| 160 MB   |       1 |           6906 |         9153 | + 32.5
| 160 MB   |       2 |          15931 |        22487 | + 41.1%
| 160 MB   |       4 |          33021 |        32503 |
| 160 MB   |       8 |          34626 |        34695 |
| 160 MB   |      16 |          33098 |        34003 |
| 160 MB   |      20 |          31343 |        31440 |
| 160 MB   |      30 |          28961 |        28987 |
| 160 MB   |      40 |          26902 |        26970 |
| 160 MB   |      50 |          25760 |        25810 |
------------------------------------------------------
| 1.6 GB   |       1 |           7729 |         7537 |
| 1.6 GB   |       2 |          19009 |        23508 | + 23.7%
| 1.6 GB   |       4 |          33185 |        32666 |
| 1.6 GB   |       8 |          34550 |        34318 |
| 1.6 GB   |      16 |          33079 |        32689 |
| 1.6 GB   |      20 |          31494 |        31702 |
| 1.6 GB   |      30 |          28535 |        28755 |
| 1.6 GB   |      40 |          27054 |        27017 |
| 1.6 GB   |      50 |          25591 |        25560 |
------------------------------------------------------
| 7.6 GB   |       1 |           6224 |         7469 | + 20.0%
| 7.6 GB   |       2 |          13611 |        12778 |
| 7.6 GB   |       4 |          33108 |        32927 |
| 7.6 GB   |       8 |          34712 |        34878 |
| 7.6 GB   |      16 |          32895 |        33003 |
| 7.6 GB   |      20 |          31689 |        31974 |
| 7.6 GB   |      30 |          29003 |        28806 |
| 7.6 GB   |      40 |          26683 |        26976 |
| 7.6 GB   |      50 |          25925 |        25652 |
------------------------------------------------------

For the aim7 worloads, they overall improved on top of Michel's
patchset. For full graphs on how the rwsem series plus this patch
behaves on a large 8 socket machine against a vanilla kernel:
http://stgolabs.net/rwsem-aim7-results.tar.gz

Signed-off-by: Davidlohr Bueso <davidlohr.bueso@...com>
---
 lib/rwsem.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/lib/rwsem.c b/lib/rwsem.c
index cf0ad2a..19c5fa9 100644
--- a/lib/rwsem.c
+++ b/lib/rwsem.c
@@ -223,7 +223,9 @@ struct rw_semaphore __sched *rwsem_down_write_failed(struct rw_semaphore *sem)
 			count = RWSEM_ACTIVE_WRITE_BIAS;
 			if (!list_is_singular(&sem->wait_list))
 				count += RWSEM_WAITING_BIAS;
-			if (cmpxchg(&sem->count, RWSEM_WAITING_BIAS, count) ==
+
+			if (sem->count == RWSEM_WAITING_BIAS &&
+			    cmpxchg(&sem->count, RWSEM_WAITING_BIAS, count) ==
 							RWSEM_WAITING_BIAS)
 				break;
 		}
-- 
1.7.11.7



--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ