3f685e8824
Instead of embedding a lock bit in rtree leaf elements, we associate extents with a small set of mutexes. This gets us two things: - We can use the system mutexes. This (hypothetically) protects us from priority inversion, and lets us stop doing a backoff/sleep loop, instead opting for precise wakeups from the mutex. - Cuts down on the number of mutex acquisitions we have to do (from 4 in the worst case to two). We end up simplifying most of the rtree code (which no longer has to deal with locking or concurrency at all), at the cost of additional complexity in the extent code: since the mutex protecting the rtree leaf elements is determined by reading the extent out of those elements, the initial read is racy, so that we may acquire an out of date mutex. We re-check the extent in the leaf after acquiring the mutex to protect us from this race. |
||
---|---|---|
.. | ||
internal | ||
jemalloc_defs.h.in | ||
jemalloc_macros.h.in | ||
jemalloc_mangle.sh | ||
jemalloc_protos.h.in | ||
jemalloc_rename.sh | ||
jemalloc_typedefs.h.in | ||
jemalloc.sh |