Synchronization in Linux COMS W4118 Spring 2008. 2 Kernel Synchronization Can think of the kernel as a server Concurrent requests are possible Synchronization.

Slides:



Advertisements
Similar presentations
Synchronization NOTE to instructors: it is helpful to walk through an example such as readers/writers locks for illustrating the use of condition variables.
Advertisements

1 Lecture 20: Synchronization & Consistency Topics: synchronization, consistency models (Sections )
Synchronization. How to synchronize processes? – Need to protect access to shared data to avoid problems like race conditions – Typical example: Updating.
Global Environment Model. MUTUAL EXCLUSION PROBLEM The operations used by processes to access to common resources (critical sections) must be mutually.
Ch. 7 Process Synchronization (1/2) I Background F Producer - Consumer process :  Compiler, Assembler, Loader, · · · · · · F Bounded buffer.
Chapter 6: Process Synchronization
Background Concurrent access to shared data can lead to inconsistencies Maintaining data consistency among cooperating processes is critical What is wrong.
5.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 5: CPU Scheduling.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 6: Process Synchronization.
Process Synchronization. Module 6: Process Synchronization Background The Critical-Section Problem Peterson’s Solution Synchronization Hardware Semaphores.
Concurrent Programming Introducing the principles of reentrancy, mutual exclusion and thread-synchronication.
Kernel Synchronization
COMS W6998 Spring 2010 Erich Nahum
Synchronization. Shared Memory Thread Synchronization Threads cooperate in multithreaded environments – User threads and kernel threads – Share resources.
By Sarita Adve & Kourosh Gharachorloo Review by Jim Larson Shared Memory Consistency Models: A Tutorial.
Chapter 6: Process Synchronization. Outline Background Critical-Section Problem Peterson’s Solution Synchronization Hardware Semaphores Classic Problems.
CS533 Concepts of Operating Systems Class 4 Linux Kernel Locking Issues.
CS510 Concurrent Systems Class 1
Synchronization Principles. Race Conditions Race Conditions: An Example spooler directory out in 4 7 somefile.txt list.c scores.txt Process.
Concurrent Programming Introducing some principles of reentrancy, mutual exclusion and thread-synchronization.
CS510 Concurrent Systems Class 1 Linux Kernel Locking Techniques.
CS533 Concepts of Operating Systems Class 17 Linux Kernel Locking Techniques.
CPS110: Implementing threads/locks on a uni-processor Landon Cox.
Race Conditions CS550 Operating Systems. Review So far, we have discussed Processes and Threads and talked about multithreading and MPI processes by example.
CS533 Concepts of Operating Systems Linux Kernel Locking Techniques.
Instructor: Umar KalimNUST Institute of Information Technology Operating Systems Process Synchronization.
Synchronization CSCI 444/544 Operating Systems Fall 2008.
Operating Systems CSE 411 CPU Management Oct Lecture 13 Instructor: Bhuvan Urgaonkar.
Cosc 4740 Chapter 6, Part 3 Process Synchronization.
Implementing Synchronization. Synchronization 101 Synchronization constrains the set of possible interleavings: Threads “agree” to stay out of each other’s.
1 Announcements The fixing the bug part of Lab 4’s assignment 2 is now considered extra credit. Comments for the code should be on the parts you wrote.
Operating Systems ECE344 Ashvin Goel ECE University of Toronto Mutual Exclusion.
By Sarita Adve & Kourosh Gharachorloo Slides by Jim Larson Shared Memory Consistency Models: A Tutorial.
Kernel Locking Techniques by Robert Love presented by Scott Price.
Shared Memory Consistency Models. SMP systems support shared memory abstraction: all processors see the whole memory and can perform memory operations.
CS 3204 Operating Systems Godmar Back Lecture 7. 12/12/2015CS 3204 Fall Announcements Project 1 due on Sep 29, 11:59pm Reading: –Read carefully.
Chapter 6: Process Synchronization. 6.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Module 6: Process Synchronization Background The.
CS533 Concepts of Operating Systems Jonathan Walpole.
CS399 New Beginnings Jonathan Walpole. 2 Concurrent Programming & Synchronization Primitives.
CSCI1600: Embedded and Real Time Software Lecture 17: Concurrent Programming Steven Reiss, Fall 2015.
CSC 660: Advanced Operating SystemsSlide #1 CSC 660: Advanced OS Synchronization.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 6: Process Synchronization.
Mutual Exclusion -- Addendum. Mutual Exclusion in Critical Sections.
W4118 Operating Systems Instructor: Junfeng Yang.
Symmetric Multiprocessors: Synchronization and Sequential Consistency
CS703 – Advanced Operating Systems
Background on the need for Synchronization
Kernel Synchronization
SYNCHRONIZATION IN LINUX
Chapter 5: Process Synchronization
Introduction to Operating Systems
Symmetric Multiprocessors: Synchronization and Sequential Consistency
Symmetric Multiprocessors: Synchronization and Sequential Consistency
Shared Memory Consistency Models: A Tutorial
CSCI1600: Embedded and Real Time Software
CS510 Concurrent Systems Class 1a
Kernel Synchronization II
CSE 451: Operating Systems Autumn 2004 Module 6 Synchronization
CSE 451: Operating Systems Autumn 2003 Lecture 7 Synchronization
CSE 451: Operating Systems Autumn 2005 Lecture 7 Synchronization
CSE 451: Operating Systems Winter 2003 Lecture 7 Synchronization
CSE 153 Design of Operating Systems Winter 19
CS333 Intro to Operating Systems
Chapter 6: Synchronization Tools
CSCI1600: Embedded and Real Time Software
CS510 Concurrent Systems Jonathan Walpole.
Linux Kernel Locking Techniques
CSE 542: Operating Systems
CSE 542: Operating Systems
Kernel Synchronization
Presentation transcript:

Synchronization in Linux COMS W4118 Spring 2008

2 Kernel Synchronization Can think of the kernel as a server Concurrent requests are possible Synchronization is (usually) required Need to avoid race conditions Correctness violated by timing changes Need to identify, secure critical section (mutex) kernel vs. userland synch primitives example: semaphore system call vs. in-kernel semaphore Synchronization is complex, subtle Hierarchy of primitives lowest level: hardware primitives higher level: built using lower-level e.g. semaphores use atomic inc, spinlocks, waitqueues

3 Linux Synch Primitives Memory barriers avoids compiler, cpu instruction re-ordering Atomic operations memory bus lock, read-modify-write ops Interrupt/softirq disabling/enabling Local, global Spin locks general, read/write, big reader Semaphores general, read/write

4 Choosing Synch Primitives Avoid synch if possible! (clever instruction ordering) Example: inserting in linked list (needs barrier still) Use atomics or rw spinlocks if possible Use semaphores if you need to sleep Can’t sleep in interrupt context Don’t sleep holding a spinlock! Complicated matrix of choices for protecting data structures accessed by deferred functions

The implementation of the synchronization primitives is extremely architecture dependent. This is because only the hardware can guarantee atomicity of an operation. Each architecture must provide a mechanism for doing an operation that can examine and modify a storage location atomically. Some architectures do not guarantee atomicity, but inform whether the operation attempted was atomic. Architectural Dependence

6 Barriers: Motivation The compiler can: Reorder code as long as it correctly maintains data flow dependencies within a function and with called functions Reorder the execution of code to optimize performance The processor can: Reorder instruction execution as long as it correctly maintains register flow dependencies Reorder memory modification as long as it correctly maintains data flow dependencies Reorder the execution of instructions (for performance optimization)

7 Barriers: Definition Barriers are used to prevent a processor and/or the compiler from reordering instruction execution and memory modification. Barriers are instructions to hardware and/or compiler to complete all pending accesses before issuing any more read memory barrier – acts on read requests write memory barrier – acts on write requests Intel – certain instructions act as barriers: lock, iret, control regs rmb – asm volatile("lock;addl $0,0(%esp)":::"memory") add 0 to top of stack with lock prefix wmb – Intel never re-orders writes, just for compiler

barrier – prevent only compiler reordering mb – prevents load and store reordering rmb – prevents load reordering wmb – prevents store reordering Barrier Operations smp_mb – prevent load and store reordering only in SMP kernel smp_rmb – prevent load reordering only in SMP kernels smp_wmb – prevent store reordering only in SMP kernels set_mb – performs assignment and prevents load and store reordering

9 Atomic Operations Many instructions not atomic in hardware (smp) Read-modify-write instructions: inc, test-and-set, swap unaligned memory access Compiler may not generate atomic code even i++ is not necessarily atomic! If the data that must be protected is a single word, atomic operations can be used. These functions examine and modify the word atomically. The atomic data type is atomic_t. Intel implementation lock prefix byte 0xf0 – locks memory bus

ATOMIC_INIT – initialize an atomic_t variable atomic_read – examine value atomically atomic_set – change value atomically atomic_inc – increment value atomically atomic_dec – decrement value atomically atomic_add - add to value atomically atomic_sub – subtract from value atomically atomic_inc_and_test – increment value and test for zero atomic_dec_and_test – decrement value and test for zero atomic_sub_and_test – subtract from value and test for zero atomic_set_mask – mask bits atomically atomic_clear_mask – clear bits atomically Atomic Operations

11 Serializing with Interrupts Basic primitive in original UNIX Doesn’t protect against other CPUs Intel: “interrupts enabled bit” cli to clear (disable), sti to set (enable) Enabling is often wrong; need to restore local_irq_save() local_irq_restore()

Services used to serialize with interrupts are: local_irq_disable - disables interrupts on the current CPU local_irq_enable - enable interrupts on the current CPU local_save_flags - return the interrupt state of the processor local_restore_flags - restore the interrupt state of the processor Dealing with the full interrupt state of the system is officially discouraged. Locks should be used. Interrupt Operations

13 Disabling Deferred Functions Disabling interrupts disables deferred functions Possible to disable deferred functions but not all interrupts Operations (macros): local_bh_disable() local_bh_enable()

A spin lock is a data structure (spinlock_t ) that is used to synchronize access to critical sections. Only one thread can be holding a spin lock at any moment. All other threads trying to get the lock will “spin” (loop while checking the lock status). Spin locks should not be held for long periods because waiting tasks on other CPUs are spinning, and thus wasting CPU execution time. Spin Locks

15 __raw_spin_lock_string 1: lock; decb %0 # atomically decrement jns 3f # if clear sign bit jump forward to 3 2: rep; nop # wait cmpb $0, %0 # spin – compare to 0 jle 2b # go back to 2 if <= 0 (locked) jmp 1b # unlocked; go back to 1 to try again 3: # we have acquired the lock … From linux/include/asm-i386/spinlock.h spin_unlock merely writes 1 into the lock field.

Functions used to work with spin locks: spin_lock_init – initialize a spin lock before using it for the first time spin_lock – acquire a spin lock, spin waiting if it is not available spin_unlock – release a spin lock spin_unlock_wait – spin waiting for spin lock to become available, but don't acquire it spin_trylock – acquire a spin lock if it is currently free, otherwise return error spin_is_locked – return spin lock state Spin Lock Operations

The spin lock services also provide interfaces that serialize with interrupts (on the current processor): spin_lock_irq - acquire spin lock and disable interrupts spin_unlock_irq - release spin lock and reenable spin_lock_irqsave - acquire spin lock, save interrupt state, and disable spin_unlock_irqrestore - release spin lock and restore interrupt state Spin Locks & Interrupts

A read/write spin lock is a data structure that allows multiple tasks to hold it in "read" state or one task to hold it in "write" state (but not both conditions at the same time). This is convenient when multiple tasks wish to examine a data structure, but don't want to see it in an inconsistent state. A lock may not be held in read state when requesting it for write state. The data type for a read/write spin lock is rwlock_t. Writers can starve waiting behind readers. RW Spin Locks

Several functions are used to work with read/write spin locks: rwlock_init – initialize a read/write lock before using it for the first time read_lock – get a read/write lock for read write_lock – get a read/write lock for write read_unlock – release a read/write lock that was held for read write_unlock – release a read/write lock that was held for write read_trylock, write_trylock – acquire a read/write lock if it is currently free, otherwise return error RW Spin Lock Operations

The read/write lock services also provide interfaces that serialize with interrupts (on the current processor): read_lock_irq - acquire lock for read and disable interrupts read_unlock_irq - release read lock and reenable read_lock_irqsave - acquire lock for read, save interrupt state, and disable read_unlock_irqrestore - release read lock and restore interrupt state Corresponding functions for write exist as well (e.g., write_lock_irqsave). RW Spin Locks & Interrupts

21 The Big Reader Lock Reader optimized RW spinlock RW spinlock suffers cache contention On lock and unlock because of write to rwlock_t Per-CPU, cache-aligned lock arrays One for reader portion, another for writer portion To read: set bit in reader array, spin on writer Acquire when writer lock free; very fast! To write: set bit and scan ALL reader bits Acquire when reader bits all free; very slow!

A semaphore is a data structure that is used to synchronize access to critical sections or other resources. A semaphore allows a fixed number of tasks (generally one for critical sections) to "hold" the semaphore at one time. Any more tasks requesting to hold the semaphore are blocked (put to sleep). A semaphore can be used for serialization only in code that is allowed to block. Semaphores

Operations for manipulating semaphores: up – release the semaphore down – get the semaphore (can block) down_interruptible – get the semaphore, but return whether we blocked down_trylock – try to get the semaphore without blocking, otherwise return an error Semaphore Operations

24 Semaphore Structure Struct semaphore count (atomic_t): > 0: free; = 0: in use, no waiters; < 0: in use, waiters wait: wait queue sleepers: 0 (none), 1 (some), occasionally 2 wait: wait queue implementation requires lower-level synch atomic updates, spinlock, interrupt disabling atomic_t count int sleepers wait_queue_head_t wait locknext struct semaphore prev

25 Semaphores optimized assembly code for normal case (down()) C code for slower “contended” case (__down()) up() is easy atomically increment; wake_up() if necessary uncontended down() is easy atomically decrement; continue contended down() is really complex! basically increment sleepers and sleep loop because of potentially concurrent ups/downs still in down() path when lock is acquired

26 A hypothetical down() spin_lock_irqsave(&sem->wait.lock, flags); add_wait_queue_exclusive_locked(&sem->wait, &wait); for (;;;) { my_count = sem->count--; If (my_count >= 0) { break; } spin_unlock_irqrestore(&sem->wait.lock, flags); tsk->state = TASK_UNINTERRUPTIBLE; schedule(); spin_lock_irqsave(&sem->wait.lock, flags); } remove_wait_queue_locked(&sem->wait, &wait); wake_up_locked(&sem->wait); spin_unlock_irqrestore(&sem->wait.lock, flags); Note: not real code!

27 The Real down(), down_failed() inline down: movl $sem, %ecx# why does this work? lock; decl (%ecx)# atomically decr sem count jns 1f # if not negative jump to 1 lea %ecx, %eax # move into eax call __down_failed# 1: # we have the semaphore from include/asm-i386/semaphore.h and arch/i386/kernel/semaphore.c) down_failed: pushl %edx# push edx onto stack (C) pushl %ecx# push ecx onto stack call __down# call C function popl %ecx# pop ecx popl %edx# pop edx ret

28 __down() tsk->state = TASK_UNINTERRUPTIBLE; spin_lock_irqsave(&sem->wait.lock, flags); add_wait_queue_exclusive_locked(&sem->wait, &wait); sem->sleepers++; for (;;) { int sleepers = sem->sleepers; /* * Add "everybody else" into it. They aren't playing, * because we own the spinlock in the wait_queue head */ if (!atomic_add_negative(sleepers - 1, &sem->count)) { sem->sleepers = 0; break; } sem->sleepers = 1; /* us - see -1 above */ spin_unlock_irqrestore(&sem->wait.lock, flags); schedule(); spin_lock_irqsave(&sem->wait.lock, flags); tsk->state = TASK_UNINTERRUPTIBLE; } remove_wait_queue_locked(&sem->wait, &wait); wake_up_locked(&sem->wait); spin_unlock_irqrestore(&sem->wait.lock, flags); tsk->state = TASK_RUNNING; From linux/ lib/ semaphore- sleepers.c

A rw_semaphore is a semaphore that allows either one writer or any number of readers (but not both at the same time) to hold it. Any writer requesting to hold the rw_semaphore is blocked when there are readers holding it. A rw_semaphore can be used for serialization only in code that is allowed to block. Both types of semaphores are the only synchronization objects that should be held when blocking. Writers will not starve: once a writer arrives, readers queue behind it Increases concurrency; introduced in 2.4 RW Semaphores

Operations for manipulating semaphores: up_read – release a rw_semaphore held for read. up_write – release a rw_semaphore held for write. down_read – get a rw_semaphore for read (can block, if a writer is holding it) down_write – get a rw_semaphore for write (can block, if one or more readers are holding it) RW Semaphore Operations

Operations for manipulating semaphores: down_read_trylock – try to get a rw_semaphore for read without blocking, otherwise return an error down_write_trylock – try to get a rw_semaphore for write without blocking, otherwise return an error downgrade_write – atomically release a rw_semaphore for write and acquire it for read (can't block) More RW Semaphore Ops

A mutex is a data structure that is also used to synchronize access to critical sections or other resources, introduced in Why? ( Documentation/mutex-design.txt ) simpler (lighter weight) tighter code slightly faster, better scalability no fastpath tradeoffs debug support – strict checking of adhering to semantics Mutexes

Mutex -- why not? not the same as semaphores cannot be used from interrupt context cannot be unlocked from a different context than that in which they were locked Mutexes (Continued)

Operations for manipulating mutexes: mutex_unlock – release the mutex mutex_lock – get the mutex (can block) mutex_lock_interruptible – get the mutex, but allow interrupts mutex_trylock – try to get the mutex without blocking, otherwise return an error mutex_is_locked – determine if mutex is locked Mutex Operations

35 Completions Slightly higher-level, FIFO semaphores Solves a subtle synch problem on SMP Up/down may execute concurrently This is a good thing (when possible) Operations: complete(), wait_for_complete() Spinlock and wait_queue Spinlock serializes ops Wait_queue enforces FIFO

Backup Slides

A piece of code is considered reentrant if two tasks can be running in the code at the same time without behaving incorrectly. In the uniprocessor (UP) kernel, when a task is running anywhere in the kernel, no other task can be executing anywhere in the kernel. A piece of code can allow another task to run somewhere in the kernel by blocking or sleeping (saving the task state and running other tasks) in the kernel, waiting for some event to occur. Kernel Synchronization

On an MP system, multiple tasks can be running in the kernel at the same time. Thus, all code must assume that another task can attempt to run in the code. Any code segment that cannot tolerate multiple tasks executing in it is called a critical section. A critical section must block all tasks but one that attempt to execute it. MP Kernel Synchronization

For serialization that is not performance sensitive, the big kernel lock (BKL) was used This mechanism is historical and should generally be avoided. The function lock_kernel gets the big kernel lock. The function unlock_kernel releases the big kernel lock. The function kernel_locked returns whether the kernel lock is currently held by the current task. The big kernel lock itself is a simple lock called kernel_flag. The Big Kernel Lock (BKL)

40 When Synch Is Not Necessary simplifying assumptions (2.4 uniprocessor) kernel is non pre-emptive process holds cpu while in kernel unless it blocks, relinquishes cpu, or interrupt locking only needed against interrupts smp kernels require locking smp locks compile out for uniprocessor kernels no overhead! 2.5 introduces limited kernel pre-emption to reduce scheduler, interrupt latency make Linux more responsive for real-time apps introduces preemption points in kernel code

41 What about ‘cli’? Disabling interrupts will stop time-sharing among tasks on a uniprocessor system But it would be unfair in to allow this in a multi-user system (monopolize the CPU) So cli is a privileged instruction: it cannot normally be executed by user-mode tasks It won’t work for a multiprocessor system

42 Special x86 instructions Need to use x86 assembly-language to implement atomic sync operations Several instruction-choices are possible, but ‘btr’ and ‘bts’ are simplest to use: ‘btr’ means ‘bit-test-and-reset’ ‘bts’ means ‘bit-test-and’set’ Syntax and semantics: asm(“ btr $0, lock “); // acquire the lock asm(“ bts $0, lock “); // release the lock

43 The x86 ‘lock’ prefix In order for the ‘btr’ instruction to perform an ‘atomic’ update (when multiple CPUs are using the same bus to access memory simultaneously), it is necessary to insert an x86 ‘lock’ prefix, like this: asm(“ spin: lock btr $0, mutex “); This instruction ‘locks’ the shared system-bus during this instruction execution -- so another CPU cannot intervene

44 Reentrancy More than one process (or processor) can be safely executing reentrant concurrently It needs to obey two cardinal rules: It contains no ‘self-modifying’ instructions Access to shared variables is ‘exclusive’

45 Program A int flag1 = 0, flag2 = 0; void p1 (void *ignored) { flag1 = 1; if (!flag2) { /* critical section */ } } void p2 (void *ignored) { flag2 = 1; if (!flag1) { /* critical section */ } } Can both critical sections run?

46 Program B int data = 0, ready = 0; void p1 (void *ignored) { data = 2000; ready = 1; } void p2 (void *ignored) { while (!ready) ; use (data); } Can use be called with value 0?

47 Program C int a = 0, b = 0; void p1 (void *ignored) { a = 1; } void p2 (void *ignored) { if (a == 1) b = 1; } void p3 (void *ignored) { if (b == 1) use (a); } Can use be called with value 0?

48 Correct Answers Program A: I don’t know Program B: I don’t know Program C: I don’t know Why? It depends on your hardware If it provides sequential consistency, then answers all No But not all hardware provides sequential consistency [BTW, examples and some other slide content from excellent Tech Report by Adve & Gharachorloo]

49 Sequential Consistency (SC) Sequential consistency: The result of execution is as if all operations were executed in some sequential order, and the operations of each processor occurred in the order specified by the program. [Lamport] Boils down to two requirements: Maintaining program order on individual processors Ensuring write atomicity Why doesn’t all hardware support sequential consistency?

50 SC Limits HW Optimizations Write buffers E.g., read flag n before flag (2 − n) written through in Program A Overlapping write operations can be reordered Concurrent writes to different memory modules Coalescing writes to same cache line Non-blocking reads E.g., speculatively prefetch data in Program B Cache coherence Write completion only after invalidation/update (Program B) Can’t have overlapping updates (Program C)

51 SC Thwarts Compiler Opts Code motion Caching values in registers E.g., ready flag in Program B Common subexpression elimination Loop blocking Software pipelining