Blame view

Documentation/filesystems/gfs2-glocks.txt 10.5 KB
9f1585cb0   Steven Whitehouse   [GFS2] Glock docu...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
                     Glock internal locking rules
                    ------------------------------
  
  This documents the basic principles of the glock state machine
  internals. Each glock (struct gfs2_glock in fs/gfs2/incore.h)
  has two main (internal) locks:
  
   1. A spinlock (gl_spin) which protects the internal state such
      as gl_state, gl_target and the list of holders (gl_holders)
   2. A non-blocking bit lock, GLF_LOCK, which is used to prevent other
      threads from making calls to the DLM, etc. at the same time. If a
      thread takes this lock, it must then call run_queue (usually via the
      workqueue) when it releases it in order to ensure any pending tasks
      are completed.
  
  The gl_holders list contains all the queued lock requests (not
  just the holders) associated with the glock. If there are any
  held locks, then they will be contiguous entries at the head
  of the list. Locks are granted in strictly the order that they
  are queued, except for those marked LM_FLAG_PRIORITY which are
  used only during recovery, and even then only for journal locks.
  
  There are three lock states that users of the glock layer can request,
  namely shared (SH), deferred (DF) and exclusive (EX). Those translate
  to the following DLM lock modes:
  
  Glock mode    | DLM lock mode
  ------------------------------
      UN        |    IV/NL  Unlocked (no DLM lock associated with glock) or NL
      SH        |    PR     (Protected read)
      DF        |    CW     (Concurrent write)
      EX        |    EX     (Exclusive)
  
  Thus DF is basically a shared mode which is incompatible with the "normal"
  shared lock mode, SH. In GFS2 the DF mode is used exclusively for direct I/O
  operations. The glocks are basically a lock plus some routines which deal
  with cache management. The following rules apply for the cache:
  
  Glock mode   |  Cache data | Cache Metadata | Dirty Data | Dirty Metadata
  --------------------------------------------------------------------------
      UN       |     No      |       No       |     No     |      No
      SH       |     Yes     |       Yes      |     No     |      No
      DF       |     No      |       Yes      |     No     |      No
      EX       |     Yes     |       Yes      |     Yes    |      Yes
  
  These rules are implemented using the various glock operations which
  are defined for each type of glock. Not all types of glocks use
  all the modes. Only inode glocks use the DF mode for example.
  
  Table of glock operations and per type constants:
  
  Field            | Purpose
  ----------------------------------------------------------------------------
  go_xmote_th      | Called before remote state change (e.g. to sync dirty data)
  go_xmote_bh      | Called after remote state change (e.g. to refill cache)
  go_inval         | Called if remote state change requires invalidating the cache
  go_demote_ok     | Returns boolean value of whether its ok to demote a glock
                   | (e.g. checks timeout, and that there is no cached data)
  go_lock          | Called for the first local holder of a lock
  go_unlock        | Called on the final local unlock of a lock
  go_dump          | Called to print content of object for debugfs file, or on
                   | error to dump glock to the log.
e9ccb73ab   Steven Whitehouse   GFS2: Update docs
63
  go_type          | The type of the glock, LM_TYPE_.....
2ebc3f8b3   Steven Whitehouse   GFS2: Update gloc...
64
65
66
  go_callback	 | Called if the DLM sends a callback to drop this lock
  go_flags	 | GLOF_ASPACE is set, if the glock has an address space
                   | associated with it
9f1585cb0   Steven Whitehouse   [GFS2] Glock docu...
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
  
  The minimum hold time for each lock is the time after a remote lock
  grant for which we ignore remote demote requests. This is in order to
  prevent a situation where locks are being bounced around the cluster
  from node to node with none of the nodes making any progress. This
  tends to show up most with shared mmaped files which are being written
  to by multiple nodes. By delaying the demotion in response to a
  remote callback, that gives the userspace program time to make
  some progress before the pages are unmapped.
  
  There is a plan to try and remove the go_lock and go_unlock callbacks
  if possible, in order to try and speed up the fast path though the locking.
  Also, eventually we hope to make the glock "EX" mode locally shared
  such that any local locking will be done with the i_mutex as required
  rather than via the glock.
  
  Locking rules for glock operations:
  
  Operation     |  GLF_LOCK bit lock held |  gl_spin spinlock held
  -----------------------------------------------------------------
  go_xmote_th   |       Yes               |       No
  go_xmote_bh   |       Yes               |       No
  go_inval      |       Yes               |       No
  go_demote_ok  |       Sometimes         |       Yes
  go_lock       |       Yes               |       No
  go_unlock     |       Yes               |       No
  go_dump       |       Sometimes         |       Yes
2ebc3f8b3   Steven Whitehouse   GFS2: Update gloc...
94
  go_callback   |       Sometimes (N/A)   |       Yes
9f1585cb0   Steven Whitehouse   [GFS2] Glock docu...
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
  
  N.B. Operations must not drop either the bit lock or the spinlock
  if its held on entry. go_dump and do_demote_ok must never block.
  Note that go_dump will only be called if the glock's state
  indicates that it is caching uptodate data.
  
  Glock locking order within GFS2:
  
   1. i_mutex (if required)
   2. Rename glock (for rename only)
   3. Inode glock(s)
      (Parents before children, inodes at "same level" with same parent in
       lock number order)
   4. Rgrp glock(s) (for (de)allocation operations)
   5. Transaction glock (via gfs2_trans_begin) for non-read operations
   6. Page lock  (always last, very important!)
  
  There are two glocks per inode. One deals with access to the inode
  itself (locking order as above), and the other, known as the iopen
  glock is used in conjunction with the i_nlink field in the inode to
  determine the lifetime of the inode in question. Locking of inodes
  is on a per-inode basis. Locking of rgrps is on a per rgrp basis.
2ebc3f8b3   Steven Whitehouse   GFS2: Update gloc...
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
  In general we prefer to lock local locks prior to cluster locks.
  
                              Glock Statistics
                             ------------------
  
  The stats are divided into two sets: those relating to the
  super block and those relating to an individual glock. The
  super block stats are done on a per cpu basis in order to
  try and reduce the overhead of gathering them. They are also
  further divided by glock type. All timings are in nanoseconds.
  
  In the case of both the super block and glock statistics,
  the same information is gathered in each case. The super
  block timing statistics are used to provide default values for
  the glock timing statistics, so that newly created glocks
  should have, as far as possible, a sensible starting point.
  The per-glock counters are initialised to zero when the
  glock is created. The per-glock statistics are lost when
  the glock is ejected from memory.
  
  The statistics are divided into three pairs of mean and
  variance, plus two counters. The mean/variance pairs are
  smoothed exponential estimates and the algorithm used is
  one which will be very familiar to those used to calculation
  of round trip times in network code. See "TCP/IP Illustrated,
  Volume 1", W. Richard Stevens, sect 21.3, "Round-Trip Time Measurement",
  p. 299 and onwards. Also, Volume 2, Sect. 25.10, p. 838 and onwards.
  Unlike the TCP/IP Illustrated case, the mean and variance are
  not scaled, but are in units of integer nanoseconds.
  
  The three pairs of mean/variance measure the following
  things:
  
   1. DLM lock time (non-blocking requests)
   2. DLM lock time (blocking requests)
   3. Inter-request time (again to the DLM)
  
  A non-blocking request is one which will complete right
  away, whatever the state of the DLM lock in question. That
  currently means any requests when (a) the current state of
  the lock is exclusive, i.e. a lock demotion (b) the requested
  state is either null or unlocked (again, a demotion) or (c) the
  "try lock" flag is set. A blocking request covers all the other
  lock requests.
  
  There are two counters. The first is there primarily to show
  how many lock requests have been made, and thus how much data
  has gone into the mean/variance calculations. The other counter
  is counting queuing of holders at the top layer of the glock
  code. Hopefully that number will be a lot larger than the number
  of dlm lock requests issued.
  
  So why gather these statistics? There are several reasons
  we'd like to get a better idea of these timings:
  
  1. To be able to better set the glock "min hold time"
  2. To spot performance issues more easily
  3. To improve the algorithm for selecting resource groups for
  allocation (to base it on lock wait time, rather than blindly
  using a "try lock")
  
  Due to the smoothing action of the updates, a step change in
  some input quantity being sampled will only fully be taken
  into account after 8 samples (or 4 for the variance) and this
  needs to be carefully considered when interpreting the
  results.
  
  Knowing both the time it takes a lock request to complete and
  the average time between lock requests for a glock means we
  can compute the total percentage of the time for which the
  node is able to use a glock vs. time that the rest of the
  cluster has its share. That will be very useful when setting
  the lock min hold time.
  
  Great care has been taken to ensure that we
  measure exactly the quantities that we want, as accurately
  as possible. There are always inaccuracies in any
  measuring system, but I hope this is as accurate as we
  can reasonably make it.
  
  Per sb stats can be found here:
  /sys/kernel/debug/gfs2/<fsname>/sbstats
  Per glock stats can be found here:
  /sys/kernel/debug/gfs2/<fsname>/glstats
  
  Assuming that debugfs is mounted on /sys/kernel/debug and also
  that <fsname> is replaced with the name of the gfs2 filesystem
  in question.
  
  The abbreviations used in the output as are follows:
  
  srtt     - Smoothed round trip time for non-blocking dlm requests
  srttvar  - Variance estimate for srtt
  srttb    - Smoothed round trip time for (potentially) blocking dlm requests
  srttvarb - Variance estimate for srttb
  sirt     - Smoothed inter-request time (for dlm requests)
  sirtvar  - Variance estimate for sirt
  dlm      - Number of dlm requests made (dcnt in glstats file)
  queue    - Number of glock requests queued (qcnt in glstats file)
  
  The sbstats file contains a set of these stats for each glock type (so 8 lines
  for each type) and for each cpu (one column per cpu). The glstats file contains
  a set of these stats for each glock in a similar format to the glocks file, but
  using the format mean/variance for each of the timing stats.
  
  The gfs2_glock_lock_time tracepoint prints out the current values of the stats
  for the glock in question, along with some addition information on each dlm
  reply that is received:
  
  status - The status of the dlm request
  flags  - The dlm request flags
  tdiff  - The time taken by this specific request
  (remaining fields as per above list)
9f1585cb0   Steven Whitehouse   [GFS2] Glock docu...
230