mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-30 23:54:04 +08:00
18be03ef23
The previous commits do exactly what this entry in the TODO file asks for, thus we can remove it now as it is no longer applicable. Signed-off-by: Fernando Ramos <greenfoo@u92.eu> Reviewed-by: Sean Paul <sean@poorly.run> Signed-off-by: Sean Paul <seanpaul@chromium.org> Link: https://patchwork.freedesktop.org/patch/msgid/20210924064324.229457-18-greenfoo@u92.eu
394 lines
15 KiB
ReStructuredText
394 lines
15 KiB
ReStructuredText
======================================
|
|
Wound/Wait Deadlock-Proof Mutex Design
|
|
======================================
|
|
|
|
Please read mutex-design.rst first, as it applies to wait/wound mutexes too.
|
|
|
|
Motivation for WW-Mutexes
|
|
-------------------------
|
|
|
|
GPU's do operations that commonly involve many buffers. Those buffers
|
|
can be shared across contexts/processes, exist in different memory
|
|
domains (for example VRAM vs system memory), and so on. And with
|
|
PRIME / dmabuf, they can even be shared across devices. So there are
|
|
a handful of situations where the driver needs to wait for buffers to
|
|
become ready. If you think about this in terms of waiting on a buffer
|
|
mutex for it to become available, this presents a problem because
|
|
there is no way to guarantee that buffers appear in a execbuf/batch in
|
|
the same order in all contexts. That is directly under control of
|
|
userspace, and a result of the sequence of GL calls that an application
|
|
makes. Which results in the potential for deadlock. The problem gets
|
|
more complex when you consider that the kernel may need to migrate the
|
|
buffer(s) into VRAM before the GPU operates on the buffer(s), which
|
|
may in turn require evicting some other buffers (and you don't want to
|
|
evict other buffers which are already queued up to the GPU), but for a
|
|
simplified understanding of the problem you can ignore this.
|
|
|
|
The algorithm that the TTM graphics subsystem came up with for dealing with
|
|
this problem is quite simple. For each group of buffers (execbuf) that need
|
|
to be locked, the caller would be assigned a unique reservation id/ticket,
|
|
from a global counter. In case of deadlock while locking all the buffers
|
|
associated with a execbuf, the one with the lowest reservation ticket (i.e.
|
|
the oldest task) wins, and the one with the higher reservation id (i.e. the
|
|
younger task) unlocks all of the buffers that it has already locked, and then
|
|
tries again.
|
|
|
|
In the RDBMS literature, a reservation ticket is associated with a transaction.
|
|
and the deadlock handling approach is called Wait-Die. The name is based on
|
|
the actions of a locking thread when it encounters an already locked mutex.
|
|
If the transaction holding the lock is younger, the locking transaction waits.
|
|
If the transaction holding the lock is older, the locking transaction backs off
|
|
and dies. Hence Wait-Die.
|
|
There is also another algorithm called Wound-Wait:
|
|
If the transaction holding the lock is younger, the locking transaction
|
|
wounds the transaction holding the lock, requesting it to die.
|
|
If the transaction holding the lock is older, it waits for the other
|
|
transaction. Hence Wound-Wait.
|
|
The two algorithms are both fair in that a transaction will eventually succeed.
|
|
However, the Wound-Wait algorithm is typically stated to generate fewer backoffs
|
|
compared to Wait-Die, but is, on the other hand, associated with more work than
|
|
Wait-Die when recovering from a backoff. Wound-Wait is also a preemptive
|
|
algorithm in that transactions are wounded by other transactions, and that
|
|
requires a reliable way to pick up the wounded condition and preempt the
|
|
running transaction. Note that this is not the same as process preemption. A
|
|
Wound-Wait transaction is considered preempted when it dies (returning
|
|
-EDEADLK) following a wound.
|
|
|
|
Concepts
|
|
--------
|
|
|
|
Compared to normal mutexes two additional concepts/objects show up in the lock
|
|
interface for w/w mutexes:
|
|
|
|
Acquire context: To ensure eventual forward progress it is important that a task
|
|
trying to acquire locks doesn't grab a new reservation id, but keeps the one it
|
|
acquired when starting the lock acquisition. This ticket is stored in the
|
|
acquire context. Furthermore the acquire context keeps track of debugging state
|
|
to catch w/w mutex interface abuse. An acquire context is representing a
|
|
transaction.
|
|
|
|
W/w class: In contrast to normal mutexes the lock class needs to be explicit for
|
|
w/w mutexes, since it is required to initialize the acquire context. The lock
|
|
class also specifies what algorithm to use, Wound-Wait or Wait-Die.
|
|
|
|
Furthermore there are three different class of w/w lock acquire functions:
|
|
|
|
* Normal lock acquisition with a context, using ww_mutex_lock.
|
|
|
|
* Slowpath lock acquisition on the contending lock, used by the task that just
|
|
killed its transaction after having dropped all already acquired locks.
|
|
These functions have the _slow postfix.
|
|
|
|
From a simple semantics point-of-view the _slow functions are not strictly
|
|
required, since simply calling the normal ww_mutex_lock functions on the
|
|
contending lock (after having dropped all other already acquired locks) will
|
|
work correctly. After all if no other ww mutex has been acquired yet there's
|
|
no deadlock potential and hence the ww_mutex_lock call will block and not
|
|
prematurely return -EDEADLK. The advantage of the _slow functions is in
|
|
interface safety:
|
|
|
|
- ww_mutex_lock has a __must_check int return type, whereas ww_mutex_lock_slow
|
|
has a void return type. Note that since ww mutex code needs loops/retries
|
|
anyway the __must_check doesn't result in spurious warnings, even though the
|
|
very first lock operation can never fail.
|
|
- When full debugging is enabled ww_mutex_lock_slow checks that all acquired
|
|
ww mutex have been released (preventing deadlocks) and makes sure that we
|
|
block on the contending lock (preventing spinning through the -EDEADLK
|
|
slowpath until the contended lock can be acquired).
|
|
|
|
* Functions to only acquire a single w/w mutex, which results in the exact same
|
|
semantics as a normal mutex. This is done by calling ww_mutex_lock with a NULL
|
|
context.
|
|
|
|
Again this is not strictly required. But often you only want to acquire a
|
|
single lock in which case it's pointless to set up an acquire context (and so
|
|
better to avoid grabbing a deadlock avoidance ticket).
|
|
|
|
Of course, all the usual variants for handling wake-ups due to signals are also
|
|
provided.
|
|
|
|
Usage
|
|
-----
|
|
|
|
The algorithm (Wait-Die vs Wound-Wait) is chosen by using either
|
|
DEFINE_WW_CLASS() (Wound-Wait) or DEFINE_WD_CLASS() (Wait-Die)
|
|
As a rough rule of thumb, use Wound-Wait iff you
|
|
expect the number of simultaneous competing transactions to be typically small,
|
|
and you want to reduce the number of rollbacks.
|
|
|
|
Three different ways to acquire locks within the same w/w class. Common
|
|
definitions for methods #1 and #2::
|
|
|
|
static DEFINE_WW_CLASS(ww_class);
|
|
|
|
struct obj {
|
|
struct ww_mutex lock;
|
|
/* obj data */
|
|
};
|
|
|
|
struct obj_entry {
|
|
struct list_head head;
|
|
struct obj *obj;
|
|
};
|
|
|
|
Method 1, using a list in execbuf->buffers that's not allowed to be reordered.
|
|
This is useful if a list of required objects is already tracked somewhere.
|
|
Furthermore the lock helper can use propagate the -EALREADY return code back to
|
|
the caller as a signal that an object is twice on the list. This is useful if
|
|
the list is constructed from userspace input and the ABI requires userspace to
|
|
not have duplicate entries (e.g. for a gpu commandbuffer submission ioctl)::
|
|
|
|
int lock_objs(struct list_head *list, struct ww_acquire_ctx *ctx)
|
|
{
|
|
struct obj *res_obj = NULL;
|
|
struct obj_entry *contended_entry = NULL;
|
|
struct obj_entry *entry;
|
|
|
|
ww_acquire_init(ctx, &ww_class);
|
|
|
|
retry:
|
|
list_for_each_entry (entry, list, head) {
|
|
if (entry->obj == res_obj) {
|
|
res_obj = NULL;
|
|
continue;
|
|
}
|
|
ret = ww_mutex_lock(&entry->obj->lock, ctx);
|
|
if (ret < 0) {
|
|
contended_entry = entry;
|
|
goto err;
|
|
}
|
|
}
|
|
|
|
ww_acquire_done(ctx);
|
|
return 0;
|
|
|
|
err:
|
|
list_for_each_entry_continue_reverse (entry, list, head)
|
|
ww_mutex_unlock(&entry->obj->lock);
|
|
|
|
if (res_obj)
|
|
ww_mutex_unlock(&res_obj->lock);
|
|
|
|
if (ret == -EDEADLK) {
|
|
/* we lost out in a seqno race, lock and retry.. */
|
|
ww_mutex_lock_slow(&contended_entry->obj->lock, ctx);
|
|
res_obj = contended_entry->obj;
|
|
goto retry;
|
|
}
|
|
ww_acquire_fini(ctx);
|
|
|
|
return ret;
|
|
}
|
|
|
|
Method 2, using a list in execbuf->buffers that can be reordered. Same semantics
|
|
of duplicate entry detection using -EALREADY as method 1 above. But the
|
|
list-reordering allows for a bit more idiomatic code::
|
|
|
|
int lock_objs(struct list_head *list, struct ww_acquire_ctx *ctx)
|
|
{
|
|
struct obj_entry *entry, *entry2;
|
|
|
|
ww_acquire_init(ctx, &ww_class);
|
|
|
|
list_for_each_entry (entry, list, head) {
|
|
ret = ww_mutex_lock(&entry->obj->lock, ctx);
|
|
if (ret < 0) {
|
|
entry2 = entry;
|
|
|
|
list_for_each_entry_continue_reverse (entry2, list, head)
|
|
ww_mutex_unlock(&entry2->obj->lock);
|
|
|
|
if (ret != -EDEADLK) {
|
|
ww_acquire_fini(ctx);
|
|
return ret;
|
|
}
|
|
|
|
/* we lost out in a seqno race, lock and retry.. */
|
|
ww_mutex_lock_slow(&entry->obj->lock, ctx);
|
|
|
|
/*
|
|
* Move buf to head of the list, this will point
|
|
* buf->next to the first unlocked entry,
|
|
* restarting the for loop.
|
|
*/
|
|
list_del(&entry->head);
|
|
list_add(&entry->head, list);
|
|
}
|
|
}
|
|
|
|
ww_acquire_done(ctx);
|
|
return 0;
|
|
}
|
|
|
|
Unlocking works the same way for both methods #1 and #2::
|
|
|
|
void unlock_objs(struct list_head *list, struct ww_acquire_ctx *ctx)
|
|
{
|
|
struct obj_entry *entry;
|
|
|
|
list_for_each_entry (entry, list, head)
|
|
ww_mutex_unlock(&entry->obj->lock);
|
|
|
|
ww_acquire_fini(ctx);
|
|
}
|
|
|
|
Method 3 is useful if the list of objects is constructed ad-hoc and not upfront,
|
|
e.g. when adjusting edges in a graph where each node has its own ww_mutex lock,
|
|
and edges can only be changed when holding the locks of all involved nodes. w/w
|
|
mutexes are a natural fit for such a case for two reasons:
|
|
|
|
- They can handle lock-acquisition in any order which allows us to start walking
|
|
a graph from a starting point and then iteratively discovering new edges and
|
|
locking down the nodes those edges connect to.
|
|
- Due to the -EALREADY return code signalling that a given objects is already
|
|
held there's no need for additional book-keeping to break cycles in the graph
|
|
or keep track off which looks are already held (when using more than one node
|
|
as a starting point).
|
|
|
|
Note that this approach differs in two important ways from the above methods:
|
|
|
|
- Since the list of objects is dynamically constructed (and might very well be
|
|
different when retrying due to hitting the -EDEADLK die condition) there's
|
|
no need to keep any object on a persistent list when it's not locked. We can
|
|
therefore move the list_head into the object itself.
|
|
- On the other hand the dynamic object list construction also means that the -EALREADY return
|
|
code can't be propagated.
|
|
|
|
Note also that methods #1 and #2 and method #3 can be combined, e.g. to first lock a
|
|
list of starting nodes (passed in from userspace) using one of the above
|
|
methods. And then lock any additional objects affected by the operations using
|
|
method #3 below. The backoff/retry procedure will be a bit more involved, since
|
|
when the dynamic locking step hits -EDEADLK we also need to unlock all the
|
|
objects acquired with the fixed list. But the w/w mutex debug checks will catch
|
|
any interface misuse for these cases.
|
|
|
|
Also, method 3 can't fail the lock acquisition step since it doesn't return
|
|
-EALREADY. Of course this would be different when using the _interruptible
|
|
variants, but that's outside of the scope of these examples here::
|
|
|
|
struct obj {
|
|
struct ww_mutex ww_mutex;
|
|
struct list_head locked_list;
|
|
};
|
|
|
|
static DEFINE_WW_CLASS(ww_class);
|
|
|
|
void __unlock_objs(struct list_head *list)
|
|
{
|
|
struct obj *entry, *temp;
|
|
|
|
list_for_each_entry_safe (entry, temp, list, locked_list) {
|
|
/* need to do that before unlocking, since only the current lock holder is
|
|
allowed to use object */
|
|
list_del(&entry->locked_list);
|
|
ww_mutex_unlock(entry->ww_mutex)
|
|
}
|
|
}
|
|
|
|
void lock_objs(struct list_head *list, struct ww_acquire_ctx *ctx)
|
|
{
|
|
struct obj *obj;
|
|
|
|
ww_acquire_init(ctx, &ww_class);
|
|
|
|
retry:
|
|
/* re-init loop start state */
|
|
loop {
|
|
/* magic code which walks over a graph and decides which objects
|
|
* to lock */
|
|
|
|
ret = ww_mutex_lock(obj->ww_mutex, ctx);
|
|
if (ret == -EALREADY) {
|
|
/* we have that one already, get to the next object */
|
|
continue;
|
|
}
|
|
if (ret == -EDEADLK) {
|
|
__unlock_objs(list);
|
|
|
|
ww_mutex_lock_slow(obj, ctx);
|
|
list_add(&entry->locked_list, list);
|
|
goto retry;
|
|
}
|
|
|
|
/* locked a new object, add it to the list */
|
|
list_add_tail(&entry->locked_list, list);
|
|
}
|
|
|
|
ww_acquire_done(ctx);
|
|
return 0;
|
|
}
|
|
|
|
void unlock_objs(struct list_head *list, struct ww_acquire_ctx *ctx)
|
|
{
|
|
__unlock_objs(list);
|
|
ww_acquire_fini(ctx);
|
|
}
|
|
|
|
Method 4: Only lock one single objects. In that case deadlock detection and
|
|
prevention is obviously overkill, since with grabbing just one lock you can't
|
|
produce a deadlock within just one class. To simplify this case the w/w mutex
|
|
api can be used with a NULL context.
|
|
|
|
Implementation Details
|
|
----------------------
|
|
|
|
Design:
|
|
^^^^^^^
|
|
|
|
ww_mutex currently encapsulates a struct mutex, this means no extra overhead for
|
|
normal mutex locks, which are far more common. As such there is only a small
|
|
increase in code size if wait/wound mutexes are not used.
|
|
|
|
We maintain the following invariants for the wait list:
|
|
|
|
(1) Waiters with an acquire context are sorted by stamp order; waiters
|
|
without an acquire context are interspersed in FIFO order.
|
|
(2) For Wait-Die, among waiters with contexts, only the first one can have
|
|
other locks acquired already (ctx->acquired > 0). Note that this waiter
|
|
may come after other waiters without contexts in the list.
|
|
|
|
The Wound-Wait preemption is implemented with a lazy-preemption scheme:
|
|
The wounded status of the transaction is checked only when there is
|
|
contention for a new lock and hence a true chance of deadlock. In that
|
|
situation, if the transaction is wounded, it backs off, clears the
|
|
wounded status and retries. A great benefit of implementing preemption in
|
|
this way is that the wounded transaction can identify a contending lock to
|
|
wait for before restarting the transaction. Just blindly restarting the
|
|
transaction would likely make the transaction end up in a situation where
|
|
it would have to back off again.
|
|
|
|
In general, not much contention is expected. The locks are typically used to
|
|
serialize access to resources for devices, and optimization focus should
|
|
therefore be directed towards the uncontended cases.
|
|
|
|
Lockdep:
|
|
^^^^^^^^
|
|
|
|
Special care has been taken to warn for as many cases of api abuse
|
|
as possible. Some common api abuses will be caught with
|
|
CONFIG_DEBUG_MUTEXES, but CONFIG_PROVE_LOCKING is recommended.
|
|
|
|
Some of the errors which will be warned about:
|
|
- Forgetting to call ww_acquire_fini or ww_acquire_init.
|
|
- Attempting to lock more mutexes after ww_acquire_done.
|
|
- Attempting to lock the wrong mutex after -EDEADLK and
|
|
unlocking all mutexes.
|
|
- Attempting to lock the right mutex after -EDEADLK,
|
|
before unlocking all mutexes.
|
|
|
|
- Calling ww_mutex_lock_slow before -EDEADLK was returned.
|
|
|
|
- Unlocking mutexes with the wrong unlock function.
|
|
- Calling one of the ww_acquire_* twice on the same context.
|
|
- Using a different ww_class for the mutex than for the ww_acquire_ctx.
|
|
- Normal lockdep errors that can result in deadlocks.
|
|
|
|
Some of the lockdep errors that can result in deadlocks:
|
|
- Calling ww_acquire_init to initialize a second ww_acquire_ctx before
|
|
having called ww_acquire_fini on the first.
|
|
- 'normal' deadlocks that can occur.
|
|
|
|
FIXME:
|
|
Update this section once we have the TASK_DEADLOCK task state flag magic
|
|
implemented.
|