cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

rt-mutex-design.rst (22102B)


      1==============================
      2RT-mutex implementation design
      3==============================
      4
      5Copyright (c) 2006 Steven Rostedt
      6
      7Licensed under the GNU Free Documentation License, Version 1.2
      8
      9
     10This document tries to describe the design of the rtmutex.c implementation.
     11It doesn't describe the reasons why rtmutex.c exists. For that please see
     12Documentation/locking/rt-mutex.rst.  Although this document does explain problems
     13that happen without this code, but that is in the concept to understand
     14what the code actually is doing.
     15
     16The goal of this document is to help others understand the priority
     17inheritance (PI) algorithm that is used, as well as reasons for the
     18decisions that were made to implement PI in the manner that was done.
     19
     20
     21Unbounded Priority Inversion
     22----------------------------
     23
     24Priority inversion is when a lower priority process executes while a higher
     25priority process wants to run.  This happens for several reasons, and
     26most of the time it can't be helped.  Anytime a high priority process wants
     27to use a resource that a lower priority process has (a mutex for example),
     28the high priority process must wait until the lower priority process is done
     29with the resource.  This is a priority inversion.  What we want to prevent
     30is something called unbounded priority inversion.  That is when the high
     31priority process is prevented from running by a lower priority process for
     32an undetermined amount of time.
     33
     34The classic example of unbounded priority inversion is where you have three
     35processes, let's call them processes A, B, and C, where A is the highest
     36priority process, C is the lowest, and B is in between. A tries to grab a lock
     37that C owns and must wait and lets C run to release the lock. But in the
     38meantime, B executes, and since B is of a higher priority than C, it preempts C,
     39but by doing so, it is in fact preempting A which is a higher priority process.
     40Now there's no way of knowing how long A will be sleeping waiting for C
     41to release the lock, because for all we know, B is a CPU hog and will
     42never give C a chance to release the lock.  This is called unbounded priority
     43inversion.
     44
     45Here's a little ASCII art to show the problem::
     46
     47     grab lock L1 (owned by C)
     48       |
     49  A ---+
     50          C preempted by B
     51            |
     52  C    +----+
     53
     54  B         +-------->
     55                  B now keeps A from running.
     56
     57
     58Priority Inheritance (PI)
     59-------------------------
     60
     61There are several ways to solve this issue, but other ways are out of scope
     62for this document.  Here we only discuss PI.
     63
     64PI is where a process inherits the priority of another process if the other
     65process blocks on a lock owned by the current process.  To make this easier
     66to understand, let's use the previous example, with processes A, B, and C again.
     67
     68This time, when A blocks on the lock owned by C, C would inherit the priority
     69of A.  So now if B becomes runnable, it would not preempt C, since C now has
     70the high priority of A.  As soon as C releases the lock, it loses its
     71inherited priority, and A then can continue with the resource that C had.
     72
     73Terminology
     74-----------
     75
     76Here I explain some terminology that is used in this document to help describe
     77the design that is used to implement PI.
     78
     79PI chain
     80         - The PI chain is an ordered series of locks and processes that cause
     81           processes to inherit priorities from a previous process that is
     82           blocked on one of its locks.  This is described in more detail
     83           later in this document.
     84
     85mutex
     86         - In this document, to differentiate from locks that implement
     87           PI and spin locks that are used in the PI code, from now on
     88           the PI locks will be called a mutex.
     89
     90lock
     91         - In this document from now on, I will use the term lock when
     92           referring to spin locks that are used to protect parts of the PI
     93           algorithm.  These locks disable preemption for UP (when
     94           CONFIG_PREEMPT is enabled) and on SMP prevents multiple CPUs from
     95           entering critical sections simultaneously.
     96
     97spin lock
     98         - Same as lock above.
     99
    100waiter
    101         - A waiter is a struct that is stored on the stack of a blocked
    102           process.  Since the scope of the waiter is within the code for
    103           a process being blocked on the mutex, it is fine to allocate
    104           the waiter on the process's stack (local variable).  This
    105           structure holds a pointer to the task, as well as the mutex that
    106           the task is blocked on.  It also has rbtree node structures to
    107           place the task in the waiters rbtree of a mutex as well as the
    108           pi_waiters rbtree of a mutex owner task (described below).
    109
    110           waiter is sometimes used in reference to the task that is waiting
    111           on a mutex. This is the same as waiter->task.
    112
    113waiters
    114         - A list of processes that are blocked on a mutex.
    115
    116top waiter
    117         - The highest priority process waiting on a specific mutex.
    118
    119top pi waiter
    120              - The highest priority process waiting on one of the mutexes
    121                that a specific process owns.
    122
    123Note:
    124       task and process are used interchangeably in this document, mostly to
    125       differentiate between two processes that are being described together.
    126
    127
    128PI chain
    129--------
    130
    131The PI chain is a list of processes and mutexes that may cause priority
    132inheritance to take place.  Multiple chains may converge, but a chain
    133would never diverge, since a process can't be blocked on more than one
    134mutex at a time.
    135
    136Example::
    137
    138   Process:  A, B, C, D, E
    139   Mutexes:  L1, L2, L3, L4
    140
    141   A owns: L1
    142           B blocked on L1
    143           B owns L2
    144                  C blocked on L2
    145                  C owns L3
    146                         D blocked on L3
    147                         D owns L4
    148                                E blocked on L4
    149
    150The chain would be::
    151
    152   E->L4->D->L3->C->L2->B->L1->A
    153
    154To show where two chains merge, we could add another process F and
    155another mutex L5 where B owns L5 and F is blocked on mutex L5.
    156
    157The chain for F would be::
    158
    159   F->L5->B->L1->A
    160
    161Since a process may own more than one mutex, but never be blocked on more than
    162one, the chains merge.
    163
    164Here we show both chains::
    165
    166   E->L4->D->L3->C->L2-+
    167                       |
    168                       +->B->L1->A
    169                       |
    170                 F->L5-+
    171
    172For PI to work, the processes at the right end of these chains (or we may
    173also call it the Top of the chain) must be equal to or higher in priority
    174than the processes to the left or below in the chain.
    175
    176Also since a mutex may have more than one process blocked on it, we can
    177have multiple chains merge at mutexes.  If we add another process G that is
    178blocked on mutex L2::
    179
    180  G->L2->B->L1->A
    181
    182And once again, to show how this can grow I will show the merging chains
    183again::
    184
    185   E->L4->D->L3->C-+
    186                   +->L2-+
    187                   |     |
    188                 G-+     +->B->L1->A
    189                         |
    190                   F->L5-+
    191
    192If process G has the highest priority in the chain, then all the tasks up
    193the chain (A and B in this example), must have their priorities increased
    194to that of G.
    195
    196Mutex Waiters Tree
    197------------------
    198
    199Every mutex keeps track of all the waiters that are blocked on itself. The
    200mutex has a rbtree to store these waiters by priority.  This tree is protected
    201by a spin lock that is located in the struct of the mutex. This lock is called
    202wait_lock.
    203
    204
    205Task PI Tree
    206------------
    207
    208To keep track of the PI chains, each process has its own PI rbtree.  This is
    209a tree of all top waiters of the mutexes that are owned by the process.
    210Note that this tree only holds the top waiters and not all waiters that are
    211blocked on mutexes owned by the process.
    212
    213The top of the task's PI tree is always the highest priority task that
    214is waiting on a mutex that is owned by the task.  So if the task has
    215inherited a priority, it will always be the priority of the task that is
    216at the top of this tree.
    217
    218This tree is stored in the task structure of a process as a rbtree called
    219pi_waiters.  It is protected by a spin lock also in the task structure,
    220called pi_lock.  This lock may also be taken in interrupt context, so when
    221locking the pi_lock, interrupts must be disabled.
    222
    223
    224Depth of the PI Chain
    225---------------------
    226
    227The maximum depth of the PI chain is not dynamic, and could actually be
    228defined.  But is very complex to figure it out, since it depends on all
    229the nesting of mutexes.  Let's look at the example where we have 3 mutexes,
    230L1, L2, and L3, and four separate functions func1, func2, func3 and func4.
    231The following shows a locking order of L1->L2->L3, but may not actually
    232be directly nested that way::
    233
    234  void func1(void)
    235  {
    236	mutex_lock(L1);
    237
    238	/* do anything */
    239
    240	mutex_unlock(L1);
    241  }
    242
    243  void func2(void)
    244  {
    245	mutex_lock(L1);
    246	mutex_lock(L2);
    247
    248	/* do something */
    249
    250	mutex_unlock(L2);
    251	mutex_unlock(L1);
    252  }
    253
    254  void func3(void)
    255  {
    256	mutex_lock(L2);
    257	mutex_lock(L3);
    258
    259	/* do something else */
    260
    261	mutex_unlock(L3);
    262	mutex_unlock(L2);
    263  }
    264
    265  void func4(void)
    266  {
    267	mutex_lock(L3);
    268
    269	/* do something again */
    270
    271	mutex_unlock(L3);
    272  }
    273
    274Now we add 4 processes that run each of these functions separately.
    275Processes A, B, C, and D which run functions func1, func2, func3 and func4
    276respectively, and such that D runs first and A last.  With D being preempted
    277in func4 in the "do something again" area, we have a locking that follows::
    278
    279  D owns L3
    280         C blocked on L3
    281         C owns L2
    282                B blocked on L2
    283                B owns L1
    284                       A blocked on L1
    285
    286  And thus we have the chain A->L1->B->L2->C->L3->D.
    287
    288This gives us a PI depth of 4 (four processes), but looking at any of the
    289functions individually, it seems as though they only have at most a locking
    290depth of two.  So, although the locking depth is defined at compile time,
    291it still is very difficult to find the possibilities of that depth.
    292
    293Now since mutexes can be defined by user-land applications, we don't want a DOS
    294type of application that nests large amounts of mutexes to create a large
    295PI chain, and have the code holding spin locks while looking at a large
    296amount of data.  So to prevent this, the implementation not only implements
    297a maximum lock depth, but also only holds at most two different locks at a
    298time, as it walks the PI chain.  More about this below.
    299
    300
    301Mutex owner and flags
    302---------------------
    303
    304The mutex structure contains a pointer to the owner of the mutex.  If the
    305mutex is not owned, this owner is set to NULL.  Since all architectures
    306have the task structure on at least a two byte alignment (and if this is
    307not true, the rtmutex.c code will be broken!), this allows for the least
    308significant bit to be used as a flag.  Bit 0 is used as the "Has Waiters"
    309flag. It's set whenever there are waiters on a mutex.
    310
    311See Documentation/locking/rt-mutex.rst for further details.
    312
    313cmpxchg Tricks
    314--------------
    315
    316Some architectures implement an atomic cmpxchg (Compare and Exchange).  This
    317is used (when applicable) to keep the fast path of grabbing and releasing
    318mutexes short.
    319
    320cmpxchg is basically the following function performed atomically::
    321
    322  unsigned long _cmpxchg(unsigned long *A, unsigned long *B, unsigned long *C)
    323  {
    324	unsigned long T = *A;
    325	if (*A == *B) {
    326		*A = *C;
    327	}
    328	return T;
    329  }
    330  #define cmpxchg(a,b,c) _cmpxchg(&a,&b,&c)
    331
    332This is really nice to have, since it allows you to only update a variable
    333if the variable is what you expect it to be.  You know if it succeeded if
    334the return value (the old value of A) is equal to B.
    335
    336The macro rt_mutex_cmpxchg is used to try to lock and unlock mutexes. If
    337the architecture does not support CMPXCHG, then this macro is simply set
    338to fail every time.  But if CMPXCHG is supported, then this will
    339help out extremely to keep the fast path short.
    340
    341The use of rt_mutex_cmpxchg with the flags in the owner field help optimize
    342the system for architectures that support it.  This will also be explained
    343later in this document.
    344
    345
    346Priority adjustments
    347--------------------
    348
    349The implementation of the PI code in rtmutex.c has several places that a
    350process must adjust its priority.  With the help of the pi_waiters of a
    351process this is rather easy to know what needs to be adjusted.
    352
    353The functions implementing the task adjustments are rt_mutex_adjust_prio
    354and rt_mutex_setprio. rt_mutex_setprio is only used in rt_mutex_adjust_prio.
    355
    356rt_mutex_adjust_prio examines the priority of the task, and the highest
    357priority process that is waiting any of mutexes owned by the task. Since
    358the pi_waiters of a task holds an order by priority of all the top waiters
    359of all the mutexes that the task owns, we simply need to compare the top
    360pi waiter to its own normal/deadline priority and take the higher one.
    361Then rt_mutex_setprio is called to adjust the priority of the task to the
    362new priority. Note that rt_mutex_setprio is defined in kernel/sched/core.c
    363to implement the actual change in priority.
    364
    365Note:
    366	For the "prio" field in task_struct, the lower the number, the
    367	higher the priority. A "prio" of 5 is of higher priority than a
    368	"prio" of 10.
    369
    370It is interesting to note that rt_mutex_adjust_prio can either increase
    371or decrease the priority of the task.  In the case that a higher priority
    372process has just blocked on a mutex owned by the task, rt_mutex_adjust_prio
    373would increase/boost the task's priority.  But if a higher priority task
    374were for some reason to leave the mutex (timeout or signal), this same function
    375would decrease/unboost the priority of the task.  That is because the pi_waiters
    376always contains the highest priority task that is waiting on a mutex owned
    377by the task, so we only need to compare the priority of that top pi waiter
    378to the normal priority of the given task.
    379
    380
    381High level overview of the PI chain walk
    382----------------------------------------
    383
    384The PI chain walk is implemented by the function rt_mutex_adjust_prio_chain.
    385
    386The implementation has gone through several iterations, and has ended up
    387with what we believe is the best.  It walks the PI chain by only grabbing
    388at most two locks at a time, and is very efficient.
    389
    390The rt_mutex_adjust_prio_chain can be used either to boost or lower process
    391priorities.
    392
    393rt_mutex_adjust_prio_chain is called with a task to be checked for PI
    394(de)boosting (the owner of a mutex that a process is blocking on), a flag to
    395check for deadlocking, the mutex that the task owns, a pointer to a waiter
    396that is the process's waiter struct that is blocked on the mutex (although this
    397parameter may be NULL for deboosting), a pointer to the mutex on which the task
    398is blocked, and a top_task as the top waiter of the mutex.
    399
    400For this explanation, I will not mention deadlock detection. This explanation
    401will try to stay at a high level.
    402
    403When this function is called, there are no locks held.  That also means
    404that the state of the owner and lock can change when entered into this function.
    405
    406Before this function is called, the task has already had rt_mutex_adjust_prio
    407performed on it.  This means that the task is set to the priority that it
    408should be at, but the rbtree nodes of the task's waiter have not been updated
    409with the new priorities, and this task may not be in the proper locations
    410in the pi_waiters and waiters trees that the task is blocked on. This function
    411solves all that.
    412
    413The main operation of this function is summarized by Thomas Gleixner in
    414rtmutex.c. See the 'Chain walk basics and protection scope' comment for further
    415details.
    416
    417Taking of a mutex (The walk through)
    418------------------------------------
    419
    420OK, now let's take a look at the detailed walk through of what happens when
    421taking a mutex.
    422
    423The first thing that is tried is the fast taking of the mutex.  This is
    424done when we have CMPXCHG enabled (otherwise the fast taking automatically
    425fails).  Only when the owner field of the mutex is NULL can the lock be
    426taken with the CMPXCHG and nothing else needs to be done.
    427
    428If there is contention on the lock, we go about the slow path
    429(rt_mutex_slowlock).
    430
    431The slow path function is where the task's waiter structure is created on
    432the stack.  This is because the waiter structure is only needed for the
    433scope of this function.  The waiter structure holds the nodes to store
    434the task on the waiters tree of the mutex, and if need be, the pi_waiters
    435tree of the owner.
    436
    437The wait_lock of the mutex is taken since the slow path of unlocking the
    438mutex also takes this lock.
    439
    440We then call try_to_take_rt_mutex.  This is where the architecture that
    441does not implement CMPXCHG would always grab the lock (if there's no
    442contention).
    443
    444try_to_take_rt_mutex is used every time the task tries to grab a mutex in the
    445slow path.  The first thing that is done here is an atomic setting of
    446the "Has Waiters" flag of the mutex's owner field. By setting this flag
    447now, the current owner of the mutex being contended for can't release the mutex
    448without going into the slow unlock path, and it would then need to grab the
    449wait_lock, which this code currently holds. So setting the "Has Waiters" flag
    450forces the current owner to synchronize with this code.
    451
    452The lock is taken if the following are true:
    453
    454   1) The lock has no owner
    455   2) The current task is the highest priority against all other
    456      waiters of the lock
    457
    458If the task succeeds to acquire the lock, then the task is set as the
    459owner of the lock, and if the lock still has waiters, the top_waiter
    460(highest priority task waiting on the lock) is added to this task's
    461pi_waiters tree.
    462
    463If the lock is not taken by try_to_take_rt_mutex(), then the
    464task_blocks_on_rt_mutex() function is called. This will add the task to
    465the lock's waiter tree and propagate the pi chain of the lock as well
    466as the lock's owner's pi_waiters tree. This is described in the next
    467section.
    468
    469Task blocks on mutex
    470--------------------
    471
    472The accounting of a mutex and process is done with the waiter structure of
    473the process.  The "task" field is set to the process, and the "lock" field
    474to the mutex.  The rbtree node of waiter are initialized to the processes
    475current priority.
    476
    477Since the wait_lock was taken at the entry of the slow lock, we can safely
    478add the waiter to the task waiter tree.  If the current process is the
    479highest priority process currently waiting on this mutex, then we remove the
    480previous top waiter process (if it exists) from the pi_waiters of the owner,
    481and add the current process to that tree.  Since the pi_waiter of the owner
    482has changed, we call rt_mutex_adjust_prio on the owner to see if the owner
    483should adjust its priority accordingly.
    484
    485If the owner is also blocked on a lock, and had its pi_waiters changed
    486(or deadlock checking is on), we unlock the wait_lock of the mutex and go ahead
    487and run rt_mutex_adjust_prio_chain on the owner, as described earlier.
    488
    489Now all locks are released, and if the current process is still blocked on a
    490mutex (waiter "task" field is not NULL), then we go to sleep (call schedule).
    491
    492Waking up in the loop
    493---------------------
    494
    495The task can then wake up for a couple of reasons:
    496  1) The previous lock owner released the lock, and the task now is top_waiter
    497  2) we received a signal or timeout
    498
    499In both cases, the task will try again to acquire the lock. If it
    500does, then it will take itself off the waiters tree and set itself back
    501to the TASK_RUNNING state.
    502
    503In first case, if the lock was acquired by another task before this task
    504could get the lock, then it will go back to sleep and wait to be woken again.
    505
    506The second case is only applicable for tasks that are grabbing a mutex
    507that can wake up before getting the lock, either due to a signal or
    508a timeout (i.e. rt_mutex_timed_futex_lock()). When woken, it will try to
    509take the lock again, if it succeeds, then the task will return with the
    510lock held, otherwise it will return with -EINTR if the task was woken
    511by a signal, or -ETIMEDOUT if it timed out.
    512
    513
    514Unlocking the Mutex
    515-------------------
    516
    517The unlocking of a mutex also has a fast path for those architectures with
    518CMPXCHG.  Since the taking of a mutex on contention always sets the
    519"Has Waiters" flag of the mutex's owner, we use this to know if we need to
    520take the slow path when unlocking the mutex.  If the mutex doesn't have any
    521waiters, the owner field of the mutex would equal the current process and
    522the mutex can be unlocked by just replacing the owner field with NULL.
    523
    524If the owner field has the "Has Waiters" bit set (or CMPXCHG is not available),
    525the slow unlock path is taken.
    526
    527The first thing done in the slow unlock path is to take the wait_lock of the
    528mutex.  This synchronizes the locking and unlocking of the mutex.
    529
    530A check is made to see if the mutex has waiters or not.  On architectures that
    531do not have CMPXCHG, this is the location that the owner of the mutex will
    532determine if a waiter needs to be awoken or not.  On architectures that
    533do have CMPXCHG, that check is done in the fast path, but it is still needed
    534in the slow path too.  If a waiter of a mutex woke up because of a signal
    535or timeout between the time the owner failed the fast path CMPXCHG check and
    536the grabbing of the wait_lock, the mutex may not have any waiters, thus the
    537owner still needs to make this check. If there are no waiters then the mutex
    538owner field is set to NULL, the wait_lock is released and nothing more is
    539needed.
    540
    541If there are waiters, then we need to wake one up.
    542
    543On the wake up code, the pi_lock of the current owner is taken.  The top
    544waiter of the lock is found and removed from the waiters tree of the mutex
    545as well as the pi_waiters tree of the current owner. The "Has Waiters" bit is
    546marked to prevent lower priority tasks from stealing the lock.
    547
    548Finally we unlock the pi_lock of the pending owner and wake it up.
    549
    550
    551Contact
    552-------
    553
    554For updates on this document, please email Steven Rostedt <rostedt@goodmis.org>
    555
    556
    557Credits
    558-------
    559
    560Author:  Steven Rostedt <rostedt@goodmis.org>
    561
    562Updated: Alex Shi <alex.shi@linaro.org>	- 7/6/2017
    563
    564Original Reviewers:
    565		     Ingo Molnar, Thomas Gleixner, Thomas Duetsch, and
    566		     Randy Dunlap
    567
    568Update (7/6/2017) Reviewers: Steven Rostedt and Sebastian Siewior
    569
    570Updates
    571-------
    572
    573This document was originally written for 2.6.17-rc3-mm1
    574was updated on 4.12