Hi Daniel, Nice to have this healthy discussion about pros/cons. Adding Waiman to the discussion as well. Curious to hear what Waiman and Peter think about all this. Some more comments inline. On Thu, May 3, 2018 at 10:19 AM Daniel Colascione <dancol@xxxxxxxxxx> wrote: > On Thu, May 3, 2018 at 9:48 AM Joel Fernandes <joelaf@xxxxxxxxxx> wrote: > > > > can skip the manual schedule we were going to perform. > > > By the way, if we eventually find a way to enhance user-space mutexes in > > the > > > fashion you describe here, it would belong to another TLS area, and > would > > > be registered by another system call than rseq. I proposed a more > generic > > Right. Also I still don't see any good reason why optimistic spinning in > > the kernel with FUTEX_LOCK, as Peter described, can't be used instead of > > using the rseq implementation and spinning in userspace, for such a case. > I > > don't really fully buy that we need to design this interface assuming any > > privilege transition level time. > > If privilege level transitions are slow, > > we're going to have bad performance anyway. > That's not the case. There's a large class of program that does useful work > while seldom entering the kernel: just ask the user-space network stack > people. Yes, I am aware of that. I was just saying in general, a system such as an Android embedded system, not an HPC based system does make a lot of system calls. I am not arguing that doing more things in userspace is good or bad here. I am just talking about why do something else for no good reasons (see below) when work has already been done on this area. > It's not wise to design interfaces around system calls being cheap. Even if > system calls are currently cheap enough on some architectures some of the > time, there's no guarantee that they'll stay that way, especially relative > to straight-line user-mode execution. A pure user-space approach, on the > other hand, involves no work in the kernel, and doing nothing is always the > optimal strategy. Besides, there are environments where system calls end up > being more expensive than you might think: consider strace or rr. If the > kernel needs to get involved on some path, it's best that its involvement > be as light as possible. Ofcourse, but I think we shouldn't do a premature optimization here without real data on typical Android devices about the cost of system calls entry/exit, vs spin time. I am not against userspace lock based on rseq if there is data and good reason, before investing significant time on reinventing the wheel. > > we should really stick to using FUTEX_LOCK and > > reuse all the work that went into that area for Android and otherwise (and > > work with Waiman and others on improving that if there are any problems > > with it). > FUTEX_LOCK is a return to the bad old days when systems gave you a fixed > list of synchronization primitives and if you wanted something else, tough. I am not saying we should fix sync. primitives made available to userspace, or anything. I am talking about yours/our usecase and whether another sync primitive interface is needed. For example, have another syscall to register TLS area is a new interface, vs using the existing futex interface. Linus is also against adding new sycalls unnecessarily. > That the latest version of the FUTEX_LOCK patch includes a separate > FUTEX_LOCK_SHARED mode is concerning. The functionality the kernel provides Why? That's just for reader-locks. What's the concern there? I know you had something in mind about efficient userspace rw locks but I am curious either way what you have in mind. > to userspace should be more general-purpose and allow more experimentation > without changes in the kernel. I see no reason to force userspace into 1) > reserving 30 bits of its lockword for a TID and 2) adopting the kernel's Based on our offline chat, this is for only 32-bit only systems though right? Also based on Peter's idea of putting the recursion counter outside, there shouldn't be a space issue? > idea of spin time heuristics and lock stealing when the same basic > functionality can be provided in a generic way while reserving only one > bit. That this mechanism happens to be more efficient as well is a bonus. And also probably easy to get wrong. Heuristics are hard and it would be good to work with community on getting best approach for that and improving existing code. Also about "generic way", that's even more reason in my view to do it in the kernel. > "Mechanism not policy" is still a good design principle. Again, I am not advocating forcing of interfaces anything, but I'm against reinventing the wheel and am all for spending time on improving existing things. thanks! - Joel -- To unsubscribe from this list: send the line "unsubscribe linux-api" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html