-
Notifications
You must be signed in to change notification settings - Fork 577
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't generate a mutex for each Locked<T>, share one per object #10117
base: master
Are you sure you want to change the base?
Conversation
This misses part of what #10113 asked for:
We have a vague "Icinga 2 uses more memory in newer versions", so how much does this affect the total memory use of the whole process? Might this be the answer or is it just a small puzzle piece? Also, what made you choose adding that Lines 52 to 73 in 585b357
Whereas with this PR, exposing the underlying mutex, this gets more spread out in the code base. |
The more fields, especially objects, share one mutex, the slower they can proceed. I prefer 1+ mutex per separate object.
You're right. One wrong move on the mutex and... 🙈 |
250635f
to
b7611ed
Compare
lib/base/atomic.hpp
Outdated
/** | ||
* Classic spinlock mutex based on std::atomic_flag. | ||
* | ||
* @ingroup base | ||
*/ | ||
class SpinMutex | ||
{ | ||
public: | ||
SpinMutex() = default; | ||
SpinMutex(const SpinMutex&) = delete; | ||
SpinMutex(SpinMutex&&) = delete; | ||
SpinMutex& operator=(const SpinMutex&) = delete; | ||
SpinMutex& operator=(SpinMutex&&) = delete; | ||
|
||
void lock() noexcept | ||
{ | ||
while (m_State.test_and_set(std::memory_order_acquire)) { | ||
} | ||
} | ||
|
||
void unlock() noexcept | ||
{ | ||
m_State.clear(std::memory_order_release); | ||
} | ||
|
||
private: | ||
std::atomic_flag m_State = ATOMIC_FLAG_INIT; | ||
}; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do you think a spinlock is a good idea here?
Let me quote cppreference.com for std::atomic_flag
:
A spinlock mutex demo can be implemented in userspace using an atomic_flag. Do note that spinlock mutexes are extremely dubious in practice.
And we even had problems in Icinga 2 in the past due to a spinlock, see #8507/#8488. So I have doubts that would be a good idea this time.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do you think a spinlock is a good idea here?
std::mutex is 5 pointers large on x64, whereas std::atomic_flag at most one.
spinlock mutexes are extremely dubious in practice.
But the lock scope here is very small, isn't it? Not to mention how unlikely you'll hit the slow path at all in our case...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But the lock scope here is very small, isn't it?
Depends on what's inside. If it's an intrusive pointer, it just needs to increment the reference count, if it's a string though, it has to copy it, including allocating memory for it.
Not to mention how unlikely you'll hit the slow path at all in our case...
How did you conclude it's unlikely? #9364 was done for a reason, there were random crashes because. Crash means concurrent access, so that will go into the slow path. Also note that not every concurrent access resulted in a crash, so there will be more "hitting the slow path" than there were crashes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this change hidden in a big rebase push related to this conversation? If so, please comment why you think this resolves it. Otherwise, what was the motivation for that change and how will you address this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But the lock scope here is very small, isn't it?
Depends on what's inside. If it's an intrusive pointer, it just needs to increment the reference count, if it's a string though, it has to copy it, including allocating memory for it.
You're right. Especially the latter case can take a few more CPU cycles. So instead of wasting them on pure spinning in a waiting thread, the latter now says "after you" while something's locked. This shall bring the mutex holder in foreground and let it finish and unlock.
b7611ed
to
37b4d10
Compare
37b4d10
to
be761c1
Compare
Please use a search engine of your choice to search for the keywords "userspace" and "spinlock". Seems like the majority isn't too positive about that idea. And as already said, Icinga 2 already had a negative experience with spinlocks itself. What makes you believe that now is a good time to use a spinlock in userspace? By the way, Linus Torvalds' rant post (the one linked from cppreference.com) even has a follow-up from him on yield. Apart from that, the current version of the PR seems to restrict the use of that suggested spinlock to just
However, while there may be a large number of objects, the number of CPU cores and thereby threads we start is typically much smaller. And that actually limits the total contention. There won't be a thread for each single object trying to lock it. |
This reduces RAM usage per object by sizeof(mutex)*(FIELDS-1).
be761c1
to
d33f5ef
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
However, while there may be a large number of objects, the number of CPU cores and thereby threads we start is typically much smaller. And that actually limits the total contention. There won't be a thread for each single object trying to lock it.
This sounds nice in theory, but I'd prefer a solution much more predicable, especially for large setups. I mean my one mutex per object idea.
/** | ||
* Wraps std::mutex, so that only Locked<T> can (un)lock it. | ||
* | ||
* The latter tiny lock scope is enforced this way to prevent deadlocks while passing around mutexes. | ||
* | ||
* @ingroup base | ||
*/ | ||
class LockedMutex | ||
{ | ||
template<class T> | ||
friend class Locked; | ||
|
||
private: | ||
std::mutex m_Mutex; | ||
}; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not a big fan of how random code (see the changes to
lib/icingadb/
now has to access some internal attribute generated by mkclass. A nice aspect of the current implementation is that it's very easy to reason that it won't deadlock, all the magic happens here:Lines 52 to 73 in 585b357
template<typename T> class Locked { public: inline T load() const { std::unique_lock<std::mutex> lock(m_Mutex); return m_Value; } inline void store(T desired) { std::unique_lock<std::mutex> lock(m_Mutex); m_Value = std::move(desired); } private: mutable std::mutex m_Mutex; T m_Value; }; Whereas with this PR, exposing the underlying mutex, this gets more spread out in the code base.
I've fixed it. :)
|
||
if (klass.Parent.empty()) { | ||
m_Header << "protected:" << std::endl | ||
<< "\tmutable LockedMutex m_FieldsMutex;" << std::endl << std::endl; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
And the cool "side" effect here is that the amount of mutexes scales linear with the amount of objects. So, in contrast to a central array of mutexes created at reload time, you guaranteed won't ever have too few mutexes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do you think there would be a problem with "too few mutexes"? Like you'll have a more or less fixed number of threads started by Icinga 2, so that limits the concurrency and would be a good candidate for sizing the number of mutexes in a std::atomic
/libatomic-like implementation.
I'm not opposed to the idea of using one mutex per object, however, the current PR introduces a quite strange interface with AtomicPseudoLocked
where you have to specify a mutex which then is ignored and has to be specified in the custom get {{{ }}}
implementations. What if mkclass would just emit the required locking code in the relevant getter methods instead? Like depending on the type, it will either be an atomic load or a lock + non-atomic load + unlock. (And similar for the setters of course.)
Nonetheless, I still don't think that would be necessary and having a global array of mutexes would suffice and keep the implementation simpler.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do you think there would be a problem with "too few mutexes"?
No. I don't. I don't know.
I don't know how many mutexes are enough – O(?)
.
I don't know the hashing algorithm mapping tons of Locked<> in memory to the O(?)
mutexes in your scenario and how fair it "schedules".
And beyond the things which I know and the (above) ones I know that I don't know, there are things I don't know that I don't know.
The more radically you change a running system in an amount of time, the more likely you hit a (delayed) black swan. Like JSON-RPC crash one (v2.11.3), JSON-RPC crash two (v2.11.4), IcingaDB(?) OOM ref/NC/820479 (v2.?) ...
I'm not opposed to the idea of using one mutex per object,
👍
Btw. I'm neither opposed to yours.
I just lack the knowledge to implement it by myself properly enough to sleep well afterwards.
AtomicPseudoLocked
where you have to specify a mutex which then is ignored and has to be specified in the customget {{{ }}}
implementations
No, yes and no.
AtomicPseudoLocked<T>
just extends std::atomic<T>
with two additional LockedMutex-compliant methods you can call if you wish. They indeed ignore the mutex (God bless compiler optimization!) and call their (public) equivalents which don't take one. Custom get {{{ }}}
implementations can also call the latter, not specifying any mutex, but all .ti files in the current diff override get {{{ }}}
for strings. So they need the mutex and they actually lock it.
What if mkclass would just emit the required locking code in the relevant getter methods instead? Like depending on the type, it will either be an atomic load or a lock + non-atomic load + unlock.
mkclass is surely a good tool for stuff that would be significantly(?) more difficult in vanilla C++.
But from my experience I'd prefer "native solutions" (e.g vanilla C++) if applicable easily enough.
This reduces RAM usage per object by sizeof(mutex)*(FIELDS-1).
The
atomic_load(const std::shared_ptr<T>*)
idea would, without doubt, also consume less RAM. However, it would scale worse, the more objects you have, with a fixed number of mutexes. Neither one SpinMutex per property, nor one std::mutex per object suffer from this limitation.