Loading CREDITS +1 −1 Original line number Original line Diff line number Diff line Loading @@ -3101,7 +3101,7 @@ S: Minto, NSW, 2566 S: Australia S: Australia N: Stephen Smalley N: Stephen Smalley E: sds@epoch.ncsc.mil E: sds@tycho.nsa.gov D: portions of the Linux Security Module (LSM) framework and security modules D: portions of the Linux Security Module (LSM) framework and security modules N: Chris Smith N: Chris Smith Loading Documentation/RCU/RTFP.txt +14 −11 Original line number Original line Diff line number Diff line Loading @@ -90,16 +90,20 @@ at OLS. The resulting abundance of RCU patches was presented the following year [McKenney02a], and use of RCU in dcache was first following year [McKenney02a], and use of RCU in dcache was first described that same year [Linder02a]. described that same year [Linder02a]. Also in 2002, Michael [Michael02b,Michael02a] presented techniques Also in 2002, Michael [Michael02b,Michael02a] presented "hazard-pointer" that defer the destruction of data structures to simplify non-blocking techniques that defer the destruction of data structures to simplify synchronization (wait-free synchronization, lock-free synchronization, non-blocking synchronization (wait-free synchronization, lock-free and obstruction-free synchronization are all examples of non-blocking synchronization, and obstruction-free synchronization are all examples of synchronization). In particular, this technique eliminates locking, non-blocking synchronization). In particular, this technique eliminates reduces contention, reduces memory latency for readers, and parallelizes locking, reduces contention, reduces memory latency for readers, and pipeline stalls and memory latency for writers. However, these parallelizes pipeline stalls and memory latency for writers. However, techniques still impose significant read-side overhead in the form of these techniques still impose significant read-side overhead in the memory barriers. Researchers at Sun worked along similar lines in the form of memory barriers. Researchers at Sun worked along similar lines same timeframe [HerlihyLM02,HerlihyLMS03]. in the same timeframe [HerlihyLM02,HerlihyLMS03]. These techniques can be thought of as inside-out reference counts, where the count is represented by the number of hazard pointers referencing a given data structure (rather than the more conventional counter field within the data structure itself). In 2003, the K42 group described how RCU could be used to create In 2003, the K42 group described how RCU could be used to create hot-pluggable implementations of operating-system functions. Later that hot-pluggable implementations of operating-system functions. Later that Loading @@ -113,7 +117,6 @@ number of operating-system kernels [PaulEdwardMcKenneyPhD], a paper describing how to make RCU safe for soft-realtime applications [Sarma04c], describing how to make RCU safe for soft-realtime applications [Sarma04c], and a paper describing SELinux performance with RCU [JamesMorris04b]. and a paper describing SELinux performance with RCU [JamesMorris04b]. 2005 has seen further adaptation of RCU to realtime use, permitting 2005 has seen further adaptation of RCU to realtime use, permitting preemption of RCU realtime critical sections [PaulMcKenney05a, preemption of RCU realtime critical sections [PaulMcKenney05a, PaulMcKenney05b]. PaulMcKenney05b]. Loading Documentation/RCU/checklist.txt +6 −0 Original line number Original line Diff line number Diff line Loading @@ -177,3 +177,9 @@ over a rather long period of time, but improvements are always welcome! If you want to wait for some of these other things, you might If you want to wait for some of these other things, you might instead need to use synchronize_irq() or synchronize_sched(). instead need to use synchronize_irq() or synchronize_sched(). 12. Any lock acquired by an RCU callback must be acquired elsewhere with irq disabled, e.g., via spin_lock_irqsave(). Failing to disable irq on a given acquisition of that lock will result in deadlock as soon as the RCU callback happens to interrupt that acquisition's critical section. Documentation/RCU/listRCU.txt +12 −9 Original line number Original line Diff line number Diff line Loading @@ -275,8 +275,8 @@ flag under the spinlock as follows: { { struct audit_entry *e; struct audit_entry *e; /* Do not use the _rcu iterator here, since this is the only /* Do not need to use the _rcu iterator here, since this * deletion routine. */ * is the only deletion routine. */ list_for_each_entry(e, list, list) { list_for_each_entry(e, list, list) { if (!audit_compare_rule(rule, &e->rule)) { if (!audit_compare_rule(rule, &e->rule)) { spin_lock(&e->lock); spin_lock(&e->lock); Loading Loading @@ -304,9 +304,12 @@ function to reject newly deleted data. Answer to Quick Quiz Answer to Quick Quiz Why does the search function need to return holding the per-entry If the search function drops the per-entry lock before returning, then lock for this deleted-flag technique to be helpful? the caller will be processing stale data in any case. If it is really OK to be processing stale data, then you don't need a "deleted" flag. If the search function drops the per-entry lock before returning, If processing stale data really is a problem, then you need to hold the then the caller will be processing stale data in any case. If it per-entry lock across all of the code that uses the value looked up. is really OK to be processing stale data, then you don't need a "deleted" flag. If processing stale data really is a problem, then you need to hold the per-entry lock across all of the code that uses the value that was returned. Documentation/RCU/rcu.txt +5 −0 Original line number Original line Diff line number Diff line Loading @@ -111,6 +111,11 @@ o What are all these files in this directory? You are reading it! You are reading it! rcuref.txt Describes how to combine use of reference counts with RCU. whatisRCU.txt whatisRCU.txt Overview of how the RCU implementation works. Along Overview of how the RCU implementation works. Along Loading Loading
CREDITS +1 −1 Original line number Original line Diff line number Diff line Loading @@ -3101,7 +3101,7 @@ S: Minto, NSW, 2566 S: Australia S: Australia N: Stephen Smalley N: Stephen Smalley E: sds@epoch.ncsc.mil E: sds@tycho.nsa.gov D: portions of the Linux Security Module (LSM) framework and security modules D: portions of the Linux Security Module (LSM) framework and security modules N: Chris Smith N: Chris Smith Loading
Documentation/RCU/RTFP.txt +14 −11 Original line number Original line Diff line number Diff line Loading @@ -90,16 +90,20 @@ at OLS. The resulting abundance of RCU patches was presented the following year [McKenney02a], and use of RCU in dcache was first following year [McKenney02a], and use of RCU in dcache was first described that same year [Linder02a]. described that same year [Linder02a]. Also in 2002, Michael [Michael02b,Michael02a] presented techniques Also in 2002, Michael [Michael02b,Michael02a] presented "hazard-pointer" that defer the destruction of data structures to simplify non-blocking techniques that defer the destruction of data structures to simplify synchronization (wait-free synchronization, lock-free synchronization, non-blocking synchronization (wait-free synchronization, lock-free and obstruction-free synchronization are all examples of non-blocking synchronization, and obstruction-free synchronization are all examples of synchronization). In particular, this technique eliminates locking, non-blocking synchronization). In particular, this technique eliminates reduces contention, reduces memory latency for readers, and parallelizes locking, reduces contention, reduces memory latency for readers, and pipeline stalls and memory latency for writers. However, these parallelizes pipeline stalls and memory latency for writers. However, techniques still impose significant read-side overhead in the form of these techniques still impose significant read-side overhead in the memory barriers. Researchers at Sun worked along similar lines in the form of memory barriers. Researchers at Sun worked along similar lines same timeframe [HerlihyLM02,HerlihyLMS03]. in the same timeframe [HerlihyLM02,HerlihyLMS03]. These techniques can be thought of as inside-out reference counts, where the count is represented by the number of hazard pointers referencing a given data structure (rather than the more conventional counter field within the data structure itself). In 2003, the K42 group described how RCU could be used to create In 2003, the K42 group described how RCU could be used to create hot-pluggable implementations of operating-system functions. Later that hot-pluggable implementations of operating-system functions. Later that Loading @@ -113,7 +117,6 @@ number of operating-system kernels [PaulEdwardMcKenneyPhD], a paper describing how to make RCU safe for soft-realtime applications [Sarma04c], describing how to make RCU safe for soft-realtime applications [Sarma04c], and a paper describing SELinux performance with RCU [JamesMorris04b]. and a paper describing SELinux performance with RCU [JamesMorris04b]. 2005 has seen further adaptation of RCU to realtime use, permitting 2005 has seen further adaptation of RCU to realtime use, permitting preemption of RCU realtime critical sections [PaulMcKenney05a, preemption of RCU realtime critical sections [PaulMcKenney05a, PaulMcKenney05b]. PaulMcKenney05b]. Loading
Documentation/RCU/checklist.txt +6 −0 Original line number Original line Diff line number Diff line Loading @@ -177,3 +177,9 @@ over a rather long period of time, but improvements are always welcome! If you want to wait for some of these other things, you might If you want to wait for some of these other things, you might instead need to use synchronize_irq() or synchronize_sched(). instead need to use synchronize_irq() or synchronize_sched(). 12. Any lock acquired by an RCU callback must be acquired elsewhere with irq disabled, e.g., via spin_lock_irqsave(). Failing to disable irq on a given acquisition of that lock will result in deadlock as soon as the RCU callback happens to interrupt that acquisition's critical section.
Documentation/RCU/listRCU.txt +12 −9 Original line number Original line Diff line number Diff line Loading @@ -275,8 +275,8 @@ flag under the spinlock as follows: { { struct audit_entry *e; struct audit_entry *e; /* Do not use the _rcu iterator here, since this is the only /* Do not need to use the _rcu iterator here, since this * deletion routine. */ * is the only deletion routine. */ list_for_each_entry(e, list, list) { list_for_each_entry(e, list, list) { if (!audit_compare_rule(rule, &e->rule)) { if (!audit_compare_rule(rule, &e->rule)) { spin_lock(&e->lock); spin_lock(&e->lock); Loading Loading @@ -304,9 +304,12 @@ function to reject newly deleted data. Answer to Quick Quiz Answer to Quick Quiz Why does the search function need to return holding the per-entry If the search function drops the per-entry lock before returning, then lock for this deleted-flag technique to be helpful? the caller will be processing stale data in any case. If it is really OK to be processing stale data, then you don't need a "deleted" flag. If the search function drops the per-entry lock before returning, If processing stale data really is a problem, then you need to hold the then the caller will be processing stale data in any case. If it per-entry lock across all of the code that uses the value looked up. is really OK to be processing stale data, then you don't need a "deleted" flag. If processing stale data really is a problem, then you need to hold the per-entry lock across all of the code that uses the value that was returned.
Documentation/RCU/rcu.txt +5 −0 Original line number Original line Diff line number Diff line Loading @@ -111,6 +111,11 @@ o What are all these files in this directory? You are reading it! You are reading it! rcuref.txt Describes how to combine use of reference counts with RCU. whatisRCU.txt whatisRCU.txt Overview of how the RCU implementation works. Along Overview of how the RCU implementation works. Along Loading