-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC: use atomic reference count to track external in-memory cache record usage #779
Comments
The RFC LGTM. Let me put the background of this RFC here (@MrCroxx correct me if I am wrong):
|
A drawback of using atomic add and atomic sub is that we are not aware of the value of the variable when the operation is actually applied on it. To resolve this drawback, a feasible solution can be using CAS. With CAS, we can be aware of the value before the operation is applied on the atomic variable. A general implementation can be:
|
After discussion, we found that there are several situations that may lead to entry clone:
Therefore, clone is not always initiated by the caller (3), but can also come from 1 and 2, so I'm in favour of adopting the current RFCs to address all the scenarios involved. Since the frequency of locks has been greatly reduced since the RFC, using CAS / Lock is acceptable to me for both. Thanks for the efforts |
I think this optimization does not solve the problem. If I understand incorrectly, please correct me. When the releaser finds itself responsible for releasing the object, it still needs to acquire the mutex lock of the shard. During the gap between the lock guard is actually acquired, there is a chance that another thread calls "get/fetch" on the same key and increases the refs again. |
ABA and Double Free found. e.g.
|
Let me try to solve the case with versioned CAS. |
@arkbriar proposed an exquisite solution. Let me organize and record it. |
If we use CAS to increment the ref count and following the previously mentioned protocol, this won't be the problem.
In the example above, when Thread 2 try to increase ref count from 0 to 1, it should not succeed, and should do other work. |
After rethinking about this proposal, I doubt whether this proposal is necessary. Like summarized in the issue description above, we have two ways to increment the ref count, |
+1, Do we have a scenario that consistently reproduces this issue? |
This RFC is only one part of the optinizations in #778 . #778 also contains optimization that allows get operation only require the read lock if the algorithm don't need to modify the entry. This RFC is a requirement of that. |
I see. Do we have any issue about the general optimization in #778? The PR is quite large, and is quite reviewer-unfriendly without sufficient context about the optimization. |
Sorry about that. I built the new framework from scratch and it is really not easy to see diffs. I'm working on docs and will replace thr origin it with the new framework after trying the idea Ark suggested. |
xD the idea is basically the same as what @wenym1 proposed in #779 (comment) except its release point is in the negative (thread that performs the real free must has successfully |
Atomic Reference Count Management
[
RawCache
] uses an atomic reference count to management the release of an entry.The atomic reference count represents the external references of a cache record.
When the reference count drops to zero, the related cache shard is locked to release to cache record.
It is important to guarantee the correctness of the usage of the atomic reference count. Especially when triggering
the release of a record. Without any other synchronize mechanism, there would be dangling pointers or double frees:
Thankfully, we can prevent it from happening with the usage of the shard lock:
The only ops that will increase the atomic reference count are:
RawCache
] and get external entries. (locked)The op 1 is always guarded by a mutex/rwlock, which means it is impossible to happen while releasing a record with
the shard is locked.
The op 2 is lock-free, but only happens when there is at least 1 external reference. So, it cannot happen while
releasing a record. Because when releasing is happening, there must be no external reference.
So, this case will never happen:
When starting to release a record, after locking the shard, it's still required to check the atomic reference count.
Because this cause still exist:
Although the op1 requires to be locked, but the release operation can be delayed after that. So the release
operation can be ignored after checking the atomic reference count is not zero.
There is no need to be afraid of leaking, there is always to be a release operation following the increasing when
the atomic reference count drops to zero again.
Related issues & PRs
#778
The text was updated successfully, but these errors were encountered: