Deutsch English Français Italiano |
<vfmesn$k6mn$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder2.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: jseigh <jseigh_es00@xemaps.com> Newsgroups: comp.lang.c++ Subject: Re: smrproxy v2 Date: Sun, 27 Oct 2024 18:29:43 -0400 Organization: A noiseless patient Spider Lines: 96 Message-ID: <vfmesn$k6mn$1@dont-email.me> References: <vequrc$2o7qc$1@dont-email.me> <verr04$2stfq$1@dont-email.me> <verubk$2t9bs$1@dont-email.me> <ves78h$2ugvm$2@dont-email.me> <vetj1f$39iuv$1@dont-email.me> <vfh4dh$3bnuq$1@dont-email.me> <vfh7mg$3c2hs$1@dont-email.me> <vfm4iq$ill4$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Sun, 27 Oct 2024 23:29:44 +0100 (CET) Injection-Info: dont-email.me; posting-host="40ae489777769ec126674cb50aebe862"; logging-data="662231"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19C47NdPVOARC1ySDI6DvE8" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:XgZ7WvY4TPRKlLltXKS4UetYmto= In-Reply-To: <vfm4iq$ill4$1@dont-email.me> Content-Language: en-US Bytes: 5412 On 10/27/24 15:33, Chris M. Thomasson wrote: > On 10/25/2024 3:56 PM, jseigh wrote: >> On 10/25/24 18:00, Chris M. Thomasson wrote: >>> On 10/18/2024 5:07 AM, jseigh wrote: >>>> On 10/17/24 19:40, Chris M. Thomasson wrote: >>>>> On 10/17/2024 2:08 PM, jseigh wrote: >>>>>> On 10/17/24 16:10, Chris M. Thomasson wrote: >>>>>>> On 10/17/2024 5:10 AM, jseigh wrote: >>>>>>>> I replaced the hazard pointer logic in smrproxy. It's now wait- >>>>>>>> free >>>>>>>> instead of mostly wait-free. The reader lock logic after loading >>>>>>>> the address of the reader lock object into a register is now 2 >>>>>>>> instructions a load followed by a store. The unlock is same >>>>>>>> as before, just a store. >>>>>>>> >>>>>>>> It's way faster now. >>>>>>>> >>>>>>>> It's on the feature/003 branch as a POC. I'm working on porting >>>>>>>> it to c++ and don't want to waste any more time on c version. >>>>>>>> >>>>>>>> No idea of it's a new algorithm. I suspect that since I use >>>>>>>> the term epoch that it will be claimed that it's ebr, epoch >>>>>>>> based reclamation, and that all ebr algorithms are equivalent. >>>>>>>> Though I suppose you could argue it's qsbr if I point out what >>>>>>>> the quiescent states are. >>>>>>> >>>>>>> I have to take a look at it! Been really busy lately. Shit happens. >>>>>>> >>>>>> >>>>>> There's a quick and dirty explanation at >>>>>> http://threadnought.wordpress.com/ >>>>>> >>>>>> repo at https://github.com/jseigh/smrproxy >>>>>> >>>>>> I'll need to create some memory access diagrams that >>>>>> visualize how it works at some point. >>>>>> >>>>>> Anyway if it's new, another algorithm to use without >>>>>> attribution. >>>>> >>>>> Interesting. From a quick view, it kind of reminds me of a >>>>> distributed seqlock for some reason. Are you using an asymmetric >>>>> membar in here? in smr_poll ? >>>> >>>> Yes, linux membarrier() in smr_poll. >>>> >>>> Not seqlock, not least for the reason that exiting the critical region >>>> is 3 instructions unless you use atomics which are expensive and have >>>> memory barriers usually. >>>> >>>> A lot of the qsbr and ebr reader lock/unlock code is going to look >>>> somewhat similar so you have to know how the reclaim logic uses it. >>>> In this case I am slingshotting off of the asymmetric memory barrier. >>>> >>>> Earlier at one point I was going to have smrproxy use hazard pointer >>>> logic or qsbr logic as a config option, but the extra code complexity >>>> and the fact that qsbr required 2 grace periods kind of made that >>>> unfeasible. The qsbr logic was mostly ripped out but there were still >>>> some pieces there. >>>> >>>> Anyway I'm working a c++ version which involves a lot of extra work >>>> besides just rewriting smrproxy. There coming up with an api for >>>> proxies and testcases which tend to be more work than the code that >>>> they are testing. >>> >>> Damn! I almost missed this post! Fucking Thunderbird... Will get back >>> to you. Working on something else right now Joe, thanks. >>> >>> https://www.facebook.com/share/p/ydGSuPLDxjkY9TAQ/ >> >> >> No problem. The c++ work is progressing pretty slowly, not least in >> part because the documentation is not always clear as to what >> something does or even what problem it is supposed to solve. >> To think I took a pass on on rust because I though it was >> more complicated than it needed to be. > > Never even tried Rust, shit, I am behind the times. ;^) > > Humm... I don't think we can get 100% C++ because of the damn asymmetric > membar for these rather "specialized" algorithms? > > Is C++ thinking about creating a standard way to gain an asymmetric membar? I don't think so. It's platform dependent. Apart from linux, mostly it's done with a call to some virtual memory function that flushes the TLBs (translation lookaside buffers) which involves IPI calls to all the processors and those have memory barriers. This is old, 1973, patent 3,947,823 cited by the patent I did. Anyway, I version the code so there's a asymmetric memory barrier version and an explicit memory barrier version, the latter being much slower. Joe Seigh