RTFP.txt 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387
  1. Read the F-ing Papers!
  2. This document describes RCU-related publications, and is followed by
  3. the corresponding bibtex entries.
  4. The first thing resembling RCU was published in 1980, when Kung and Lehman
  5. [Kung80] recommended use of a garbage collector to defer destruction
  6. of nodes in a parallel binary search tree in order to simplify its
  7. implementation. This works well in environments that have garbage
  8. collectors, but current production garbage collectors incur significant
  9. read-side overhead.
  10. In 1982, Manber and Ladner [Manber82,Manber84] recommended deferring
  11. destruction until all threads running at that time have terminated, again
  12. for a parallel binary search tree. This approach works well in systems
  13. with short-lived threads, such as the K42 research operating system.
  14. However, Linux has long-lived tasks, so more is needed.
  15. In 1986, Hennessy, Osisek, and Seigh [Hennessy89] introduced passive
  16. serialization, which is an RCU-like mechanism that relies on the presence
  17. of "quiescent states" in the VM/XA hypervisor that are guaranteed not
  18. to be referencing the data structure. However, this mechanism was not
  19. optimized for modern computer systems, which is not surprising given
  20. that these overheads were not so expensive in the mid-80s. Nonetheless,
  21. passive serialization appears to be the first deferred-destruction
  22. mechanism to be used in production. Furthermore, the relevant patent has
  23. lapsed, so this approach may be used in non-GPL software, if desired.
  24. (In contrast, use of RCU is permitted only in software licensed under
  25. GPL. Sorry!!!)
  26. In 1990, Pugh [Pugh90] noted that explicitly tracking which threads
  27. were reading a given data structure permitted deferred free to operate
  28. in the presence of non-terminating threads. However, this explicit
  29. tracking imposes significant read-side overhead, which is undesirable
  30. in read-mostly situations. This algorithm does take pains to avoid
  31. write-side contention and parallelize the other write-side overheads by
  32. providing a fine-grained locking design, however, it would be interesting
  33. to see how much of the performance advantage reported in 1990 remains
  34. in 2004.
  35. At about this same time, Adams [Adams91] described ``chaotic relaxation'',
  36. where the normal barriers between successive iterations of convergent
  37. numerical algorithms are relaxed, so that iteration $n$ might use
  38. data from iteration $n-1$ or even $n-2$. This introduces error,
  39. which typically slows convergence and thus increases the number of
  40. iterations required. However, this increase is sometimes more than made
  41. up for by a reduction in the number of expensive barrier operations,
  42. which are otherwise required to synchronize the threads at the end
  43. of each iteration. Unfortunately, chaotic relaxation requires highly
  44. structured data, such as the matrices used in scientific programs, and
  45. is thus inapplicable to most data structures in operating-system kernels.
  46. In 1993, Jacobson [Jacobson93] verbally described what is perhaps the
  47. simplest deferred-free technique: simply waiting a fixed amount of time
  48. before freeing blocks awaiting deferred free. Jacobson did not describe
  49. any write-side changes he might have made in this work using SGI's Irix
  50. kernel. Aju John published a similar technique in 1995 [AjuJohn95].
  51. This works well if there is a well-defined upper bound on the length of
  52. time that reading threads can hold references, as there might well be in
  53. hard real-time systems. However, if this time is exceeded, perhaps due
  54. to preemption, excessive interrupts, or larger-than-anticipated load,
  55. memory corruption can ensue, with no reasonable means of diagnosis.
  56. Jacobson's technique is therefore inappropriate for use in production
  57. operating-system kernels, except when such kernels can provide hard
  58. real-time response guarantees for all operations.
  59. Also in 1995, Pu et al. [Pu95a] applied a technique similar to that of Pugh's
  60. read-side-tracking to permit replugging of algorithms within a commercial
  61. Unix operating system. However, this replugging permitted only a single
  62. reader at a time. The following year, this same group of researchers
  63. extended their technique to allow for multiple readers [Cowan96a].
  64. Their approach requires memory barriers (and thus pipeline stalls),
  65. but reduces memory latency, contention, and locking overheads.
  66. 1995 also saw the first publication of DYNIX/ptx's RCU mechanism
  67. [Slingwine95], which was optimized for modern CPU architectures,
  68. and was successfully applied to a number of situations within the
  69. DYNIX/ptx kernel. The corresponding conference paper appeared in 1998
  70. [McKenney98].
  71. In 1999, the Tornado and K42 groups described their "generations"
  72. mechanism, which quite similar to RCU [Gamsa99]. These operating systems
  73. made pervasive use of RCU in place of "existence locks", which greatly
  74. simplifies locking hierarchies.
  75. 2001 saw the first RCU presentation involving Linux [McKenney01a]
  76. at OLS. The resulting abundance of RCU patches was presented the
  77. following year [McKenney02a], and use of RCU in dcache was first
  78. described that same year [Linder02a].
  79. Also in 2002, Michael [Michael02b,Michael02a] presented techniques
  80. that defer the destruction of data structures to simplify non-blocking
  81. synchronization (wait-free synchronization, lock-free synchronization,
  82. and obstruction-free synchronization are all examples of non-blocking
  83. synchronization). In particular, this technique eliminates locking,
  84. reduces contention, reduces memory latency for readers, and parallelizes
  85. pipeline stalls and memory latency for writers. However, these
  86. techniques still impose significant read-side overhead in the form of
  87. memory barriers. Researchers at Sun worked along similar lines in the
  88. same timeframe [HerlihyLM02,HerlihyLMS03].
  89. In 2003, the K42 group described how RCU could be used to create
  90. hot-pluggable implementations of operating-system functions. Later that
  91. year saw a paper describing an RCU implementation of System V IPC
  92. [Arcangeli03], and an introduction to RCU in Linux Journal [McKenney03a].
  93. 2004 has seen a Linux-Journal article on use of RCU in dcache
  94. [McKenney04a], a performance comparison of locking to RCU on several
  95. different CPUs [McKenney04b], a dissertation describing use of RCU in a
  96. number of operating-system kernels [PaulEdwardMcKenneyPhD], and a paper
  97. describing how to make RCU safe for soft-realtime applications [Sarma04c].
  98. Bibtex Entries
  99. @article{Kung80
  100. ,author="H. T. Kung and Q. Lehman"
  101. ,title="Concurrent Maintenance of Binary Search Trees"
  102. ,Year="1980"
  103. ,Month="September"
  104. ,journal="ACM Transactions on Database Systems"
  105. ,volume="5"
  106. ,number="3"
  107. ,pages="354-382"
  108. }
  109. @techreport{Manber82
  110. ,author="Udi Manber and Richard E. Ladner"
  111. ,title="Concurrency Control in a Dynamic Search Structure"
  112. ,institution="Department of Computer Science, University of Washington"
  113. ,address="Seattle, Washington"
  114. ,year="1982"
  115. ,number="82-01-01"
  116. ,month="January"
  117. ,pages="28"
  118. }
  119. @article{Manber84
  120. ,author="Udi Manber and Richard E. Ladner"
  121. ,title="Concurrency Control in a Dynamic Search Structure"
  122. ,Year="1984"
  123. ,Month="September"
  124. ,journal="ACM Transactions on Database Systems"
  125. ,volume="9"
  126. ,number="3"
  127. ,pages="439-455"
  128. }
  129. @techreport{Hennessy89
  130. ,author="James P. Hennessy and Damian L. Osisek and Joseph W. {Seigh II}"
  131. ,title="Passive Serialization in a Multitasking Environment"
  132. ,institution="US Patent and Trademark Office"
  133. ,address="Washington, DC"
  134. ,year="1989"
  135. ,number="US Patent 4,809,168 (lapsed)"
  136. ,month="February"
  137. ,pages="11"
  138. }
  139. @techreport{Pugh90
  140. ,author="William Pugh"
  141. ,title="Concurrent Maintenance of Skip Lists"
  142. ,institution="Institute of Advanced Computer Science Studies, Department of Computer Science, University of Maryland"
  143. ,address="College Park, Maryland"
  144. ,year="1990"
  145. ,number="CS-TR-2222.1"
  146. ,month="June"
  147. }
  148. @Book{Adams91
  149. ,Author="Gregory R. Adams"
  150. ,title="Concurrent Programming, Principles, and Practices"
  151. ,Publisher="Benjamin Cummins"
  152. ,Year="1991"
  153. }
  154. @unpublished{Jacobson93
  155. ,author="Van Jacobson"
  156. ,title="Avoid Read-Side Locking Via Delayed Free"
  157. ,year="1993"
  158. ,month="September"
  159. ,note="Verbal discussion"
  160. }
  161. @Conference{AjuJohn95
  162. ,Author="Aju John"
  163. ,Title="Dynamic vnodes -- Design and Implementation"
  164. ,Booktitle="{USENIX Winter 1995}"
  165. ,Publisher="USENIX Association"
  166. ,Month="January"
  167. ,Year="1995"
  168. ,pages="11-23"
  169. ,Address="New Orleans, LA"
  170. }
  171. @techreport{Slingwine95
  172. ,author="John D. Slingwine and Paul E. McKenney"
  173. ,title="Apparatus and Method for Achieving Reduced Overhead Mutual
  174. Exclusion and Maintaining Coherency in a Multiprocessor System
  175. Utilizing Execution History and Thread Monitoring"
  176. ,institution="US Patent and Trademark Office"
  177. ,address="Washington, DC"
  178. ,year="1995"
  179. ,number="US Patent 5,442,758 (contributed under GPL)"
  180. ,month="August"
  181. }
  182. @techreport{Slingwine97
  183. ,author="John D. Slingwine and Paul E. McKenney"
  184. ,title="Method for maintaining data coherency using thread
  185. activity summaries in a multicomputer system"
  186. ,institution="US Patent and Trademark Office"
  187. ,address="Washington, DC"
  188. ,year="1997"
  189. ,number="US Patent 5,608,893 (contributed under GPL)"
  190. ,month="March"
  191. }
  192. @techreport{Slingwine98
  193. ,author="John D. Slingwine and Paul E. McKenney"
  194. ,title="Apparatus and method for achieving reduced overhead
  195. mutual exclusion and maintaining coherency in a multiprocessor
  196. system utilizing execution history and thread monitoring"
  197. ,institution="US Patent and Trademark Office"
  198. ,address="Washington, DC"
  199. ,year="1998"
  200. ,number="US Patent 5,727,209 (contributed under GPL)"
  201. ,month="March"
  202. }
  203. @Conference{McKenney98
  204. ,Author="Paul E. McKenney and John D. Slingwine"
  205. ,Title="Read-Copy Update: Using Execution History to Solve Concurrency
  206. Problems"
  207. ,Booktitle="{Parallel and Distributed Computing and Systems}"
  208. ,Month="October"
  209. ,Year="1998"
  210. ,pages="509-518"
  211. ,Address="Las Vegas, NV"
  212. }
  213. @Conference{Gamsa99
  214. ,Author="Ben Gamsa and Orran Krieger and Jonathan Appavoo and Michael Stumm"
  215. ,Title="Tornado: Maximizing Locality and Concurrency in a Shared Memory
  216. Multiprocessor Operating System"
  217. ,Booktitle="{Proceedings of the 3\textsuperscript{rd} Symposium on
  218. Operating System Design and Implementation}"
  219. ,Month="February"
  220. ,Year="1999"
  221. ,pages="87-100"
  222. ,Address="New Orleans, LA"
  223. }
  224. @techreport{Slingwine01
  225. ,author="John D. Slingwine and Paul E. McKenney"
  226. ,title="Apparatus and method for achieving reduced overhead
  227. mutual exclusion and maintaining coherency in a multiprocessor
  228. system utilizing execution history and thread monitoring"
  229. ,institution="US Patent and Trademark Office"
  230. ,address="Washington, DC"
  231. ,year="2001"
  232. ,number="US Patent 5,219,690 (contributed under GPL)"
  233. ,month="April"
  234. }
  235. @Conference{McKenney01a
  236. ,Author="Paul E. McKenney and Jonathan Appavoo and Andi Kleen and
  237. Orran Krieger and Rusty Russell and Dipankar Sarma and Maneesh Soni"
  238. ,Title="Read-Copy Update"
  239. ,Booktitle="{Ottawa Linux Symposium}"
  240. ,Month="July"
  241. ,Year="2001"
  242. ,note="Available:
  243. \url{http://www.linuxsymposium.org/2001/abstracts/readcopy.php}
  244. \url{http://www.rdrop.com/users/paulmck/rclock/rclock_OLS.2001.05.01c.pdf}
  245. [Viewed June 23, 2004]"
  246. annotation="
  247. Described RCU, and presented some patches implementing and using it in
  248. the Linux kernel.
  249. "
  250. }
  251. @Conference{Linder02a
  252. ,Author="Hanna Linder and Dipankar Sarma and Maneesh Soni"
  253. ,Title="Scalability of the Directory Entry Cache"
  254. ,Booktitle="{Ottawa Linux Symposium}"
  255. ,Month="June"
  256. ,Year="2002"
  257. ,pages="289-300"
  258. }
  259. @Conference{McKenney02a
  260. ,Author="Paul E. McKenney and Dipankar Sarma and
  261. Andrea Arcangeli and Andi Kleen and Orran Krieger and Rusty Russell"
  262. ,Title="Read-Copy Update"
  263. ,Booktitle="{Ottawa Linux Symposium}"
  264. ,Month="June"
  265. ,Year="2002"
  266. ,pages="338-367"
  267. ,note="Available:
  268. \url{http://www.linux.org.uk/~ajh/ols2002_proceedings.pdf.gz}
  269. [Viewed June 23, 2004]"
  270. }
  271. @article{Appavoo03a
  272. ,author="J. Appavoo and K. Hui and C. A. N. Soules and R. W. Wisniewski and
  273. D. M. {Da Silva} and O. Krieger and M. A. Auslander and D. J. Edelsohn and
  274. B. Gamsa and G. R. Ganger and P. McKenney and M. Ostrowski and
  275. B. Rosenburg and M. Stumm and J. Xenidis"
  276. ,title="Enabling Autonomic Behavior in Systems Software With Hot Swapping"
  277. ,Year="2003"
  278. ,Month="January"
  279. ,journal="IBM Systems Journal"
  280. ,volume="42"
  281. ,number="1"
  282. ,pages="60-76"
  283. }
  284. @Conference{Arcangeli03
  285. ,Author="Andrea Arcangeli and Mingming Cao and Paul E. McKenney and
  286. Dipankar Sarma"
  287. ,Title="Using Read-Copy Update Techniques for {System V IPC} in the
  288. {Linux} 2.5 Kernel"
  289. ,Booktitle="Proceedings of the 2003 USENIX Annual Technical Conference
  290. (FREENIX Track)"
  291. ,Publisher="USENIX Association"
  292. ,year="2003"
  293. ,month="June"
  294. ,pages="297-310"
  295. }
  296. @article{McKenney03a
  297. ,author="Paul E. McKenney"
  298. ,title="Using {RCU} in the {Linux} 2.5 Kernel"
  299. ,Year="2003"
  300. ,Month="October"
  301. ,journal="Linux Journal"
  302. ,volume="1"
  303. ,number="114"
  304. ,pages="18-26"
  305. }
  306. @article{McKenney04a
  307. ,author="Paul E. McKenney and Dipankar Sarma and Maneesh Soni"
  308. ,title="Scaling dcache with {RCU}"
  309. ,Year="2004"
  310. ,Month="January"
  311. ,journal="Linux Journal"
  312. ,volume="1"
  313. ,number="118"
  314. ,pages="38-46"
  315. }
  316. @Conference{McKenney04b
  317. ,Author="Paul E. McKenney"
  318. ,Title="{RCU} vs. Locking Performance on Different {CPUs}"
  319. ,Booktitle="{linux.conf.au}"
  320. ,Month="January"
  321. ,Year="2004"
  322. ,Address="Adelaide, Australia"
  323. ,note="Available:
  324. \url{http://www.linux.org.au/conf/2004/abstracts.html#90}
  325. \url{http://www.rdrop.com/users/paulmck/rclock/lockperf.2004.01.17a.pdf}
  326. [Viewed June 23, 2004]"
  327. }
  328. @phdthesis{PaulEdwardMcKenneyPhD
  329. ,author="Paul E. McKenney"
  330. ,title="Exploiting Deferred Destruction:
  331. An Analysis of Read-Copy-Update Techniques
  332. in Operating System Kernels"
  333. ,school="OGI School of Science and Engineering at
  334. Oregon Health and Sciences University"
  335. ,year="2004"
  336. }
  337. @Conference{Sarma04c
  338. ,Author="Dipankar Sarma and Paul E. McKenney"
  339. ,Title="Making RCU Safe for Deep Sub-Millisecond Response Realtime Applications"
  340. ,Booktitle="Proceedings of the 2004 USENIX Annual Technical Conference
  341. (FREENIX Track)"
  342. ,Publisher="USENIX Association"
  343. ,year="2004"
  344. ,month="June"
  345. ,pages="182-191"
  346. }