mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-24 04:20:53 +07:00
2522fe45a1
Based on 1 normalized pattern(s): this copyrighted material is made available to anyone wishing to use modify copy or redistribute it subject to the terms and conditions of the gnu general public license v 2 extracted by the scancode license scanner the SPDX license identifier GPL-2.0-only has been chosen to replace the boilerplate/reference in 45 file(s). Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Richard Fontana <rfontana@redhat.com> Reviewed-by: Allison Randal <allison@lohutok.net> Reviewed-by: Steve Winslow <swinslow@gmail.com> Reviewed-by: Alexios Zavras <alexios.zavras@intel.com> Cc: linux-spdx@vger.kernel.org Link: https://lkml.kernel.org/r/20190528170027.342746075@linutronix.de Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
6306 lines
157 KiB
C
6306 lines
157 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/******************************************************************************
|
|
*******************************************************************************
|
|
**
|
|
** Copyright (C) 2005-2010 Red Hat, Inc. All rights reserved.
|
|
**
|
|
**
|
|
*******************************************************************************
|
|
******************************************************************************/
|
|
|
|
/* Central locking logic has four stages:
|
|
|
|
dlm_lock()
|
|
dlm_unlock()
|
|
|
|
request_lock(ls, lkb)
|
|
convert_lock(ls, lkb)
|
|
unlock_lock(ls, lkb)
|
|
cancel_lock(ls, lkb)
|
|
|
|
_request_lock(r, lkb)
|
|
_convert_lock(r, lkb)
|
|
_unlock_lock(r, lkb)
|
|
_cancel_lock(r, lkb)
|
|
|
|
do_request(r, lkb)
|
|
do_convert(r, lkb)
|
|
do_unlock(r, lkb)
|
|
do_cancel(r, lkb)
|
|
|
|
Stage 1 (lock, unlock) is mainly about checking input args and
|
|
splitting into one of the four main operations:
|
|
|
|
dlm_lock = request_lock
|
|
dlm_lock+CONVERT = convert_lock
|
|
dlm_unlock = unlock_lock
|
|
dlm_unlock+CANCEL = cancel_lock
|
|
|
|
Stage 2, xxxx_lock(), just finds and locks the relevant rsb which is
|
|
provided to the next stage.
|
|
|
|
Stage 3, _xxxx_lock(), determines if the operation is local or remote.
|
|
When remote, it calls send_xxxx(), when local it calls do_xxxx().
|
|
|
|
Stage 4, do_xxxx(), is the guts of the operation. It manipulates the
|
|
given rsb and lkb and queues callbacks.
|
|
|
|
For remote operations, send_xxxx() results in the corresponding do_xxxx()
|
|
function being executed on the remote node. The connecting send/receive
|
|
calls on local (L) and remote (R) nodes:
|
|
|
|
L: send_xxxx() -> R: receive_xxxx()
|
|
R: do_xxxx()
|
|
L: receive_xxxx_reply() <- R: send_xxxx_reply()
|
|
*/
|
|
#include <linux/types.h>
|
|
#include <linux/rbtree.h>
|
|
#include <linux/slab.h>
|
|
#include "dlm_internal.h"
|
|
#include <linux/dlm_device.h>
|
|
#include "memory.h"
|
|
#include "lowcomms.h"
|
|
#include "requestqueue.h"
|
|
#include "util.h"
|
|
#include "dir.h"
|
|
#include "member.h"
|
|
#include "lockspace.h"
|
|
#include "ast.h"
|
|
#include "lock.h"
|
|
#include "rcom.h"
|
|
#include "recover.h"
|
|
#include "lvb_table.h"
|
|
#include "user.h"
|
|
#include "config.h"
|
|
|
|
static int send_request(struct dlm_rsb *r, struct dlm_lkb *lkb);
|
|
static int send_convert(struct dlm_rsb *r, struct dlm_lkb *lkb);
|
|
static int send_unlock(struct dlm_rsb *r, struct dlm_lkb *lkb);
|
|
static int send_cancel(struct dlm_rsb *r, struct dlm_lkb *lkb);
|
|
static int send_grant(struct dlm_rsb *r, struct dlm_lkb *lkb);
|
|
static int send_bast(struct dlm_rsb *r, struct dlm_lkb *lkb, int mode);
|
|
static int send_lookup(struct dlm_rsb *r, struct dlm_lkb *lkb);
|
|
static int send_remove(struct dlm_rsb *r);
|
|
static int _request_lock(struct dlm_rsb *r, struct dlm_lkb *lkb);
|
|
static int _cancel_lock(struct dlm_rsb *r, struct dlm_lkb *lkb);
|
|
static void __receive_convert_reply(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms);
|
|
static int receive_extralen(struct dlm_message *ms);
|
|
static void do_purge(struct dlm_ls *ls, int nodeid, int pid);
|
|
static void del_timeout(struct dlm_lkb *lkb);
|
|
static void toss_rsb(struct kref *kref);
|
|
|
|
/*
|
|
* Lock compatibilty matrix - thanks Steve
|
|
* UN = Unlocked state. Not really a state, used as a flag
|
|
* PD = Padding. Used to make the matrix a nice power of two in size
|
|
* Other states are the same as the VMS DLM.
|
|
* Usage: matrix[grmode+1][rqmode+1] (although m[rq+1][gr+1] is the same)
|
|
*/
|
|
|
|
static const int __dlm_compat_matrix[8][8] = {
|
|
/* UN NL CR CW PR PW EX PD */
|
|
{1, 1, 1, 1, 1, 1, 1, 0}, /* UN */
|
|
{1, 1, 1, 1, 1, 1, 1, 0}, /* NL */
|
|
{1, 1, 1, 1, 1, 1, 0, 0}, /* CR */
|
|
{1, 1, 1, 1, 0, 0, 0, 0}, /* CW */
|
|
{1, 1, 1, 0, 1, 0, 0, 0}, /* PR */
|
|
{1, 1, 1, 0, 0, 0, 0, 0}, /* PW */
|
|
{1, 1, 0, 0, 0, 0, 0, 0}, /* EX */
|
|
{0, 0, 0, 0, 0, 0, 0, 0} /* PD */
|
|
};
|
|
|
|
/*
|
|
* This defines the direction of transfer of LVB data.
|
|
* Granted mode is the row; requested mode is the column.
|
|
* Usage: matrix[grmode+1][rqmode+1]
|
|
* 1 = LVB is returned to the caller
|
|
* 0 = LVB is written to the resource
|
|
* -1 = nothing happens to the LVB
|
|
*/
|
|
|
|
const int dlm_lvb_operations[8][8] = {
|
|
/* UN NL CR CW PR PW EX PD*/
|
|
{ -1, 1, 1, 1, 1, 1, 1, -1 }, /* UN */
|
|
{ -1, 1, 1, 1, 1, 1, 1, 0 }, /* NL */
|
|
{ -1, -1, 1, 1, 1, 1, 1, 0 }, /* CR */
|
|
{ -1, -1, -1, 1, 1, 1, 1, 0 }, /* CW */
|
|
{ -1, -1, -1, -1, 1, 1, 1, 0 }, /* PR */
|
|
{ -1, 0, 0, 0, 0, 0, 1, 0 }, /* PW */
|
|
{ -1, 0, 0, 0, 0, 0, 0, 0 }, /* EX */
|
|
{ -1, 0, 0, 0, 0, 0, 0, 0 } /* PD */
|
|
};
|
|
|
|
#define modes_compat(gr, rq) \
|
|
__dlm_compat_matrix[(gr)->lkb_grmode + 1][(rq)->lkb_rqmode + 1]
|
|
|
|
int dlm_modes_compat(int mode1, int mode2)
|
|
{
|
|
return __dlm_compat_matrix[mode1 + 1][mode2 + 1];
|
|
}
|
|
|
|
/*
|
|
* Compatibility matrix for conversions with QUECVT set.
|
|
* Granted mode is the row; requested mode is the column.
|
|
* Usage: matrix[grmode+1][rqmode+1]
|
|
*/
|
|
|
|
static const int __quecvt_compat_matrix[8][8] = {
|
|
/* UN NL CR CW PR PW EX PD */
|
|
{0, 0, 0, 0, 0, 0, 0, 0}, /* UN */
|
|
{0, 0, 1, 1, 1, 1, 1, 0}, /* NL */
|
|
{0, 0, 0, 1, 1, 1, 1, 0}, /* CR */
|
|
{0, 0, 0, 0, 1, 1, 1, 0}, /* CW */
|
|
{0, 0, 0, 1, 0, 1, 1, 0}, /* PR */
|
|
{0, 0, 0, 0, 0, 0, 1, 0}, /* PW */
|
|
{0, 0, 0, 0, 0, 0, 0, 0}, /* EX */
|
|
{0, 0, 0, 0, 0, 0, 0, 0} /* PD */
|
|
};
|
|
|
|
void dlm_print_lkb(struct dlm_lkb *lkb)
|
|
{
|
|
printk(KERN_ERR "lkb: nodeid %d id %x remid %x exflags %x flags %x "
|
|
"sts %d rq %d gr %d wait_type %d wait_nodeid %d seq %llu\n",
|
|
lkb->lkb_nodeid, lkb->lkb_id, lkb->lkb_remid, lkb->lkb_exflags,
|
|
lkb->lkb_flags, lkb->lkb_status, lkb->lkb_rqmode,
|
|
lkb->lkb_grmode, lkb->lkb_wait_type, lkb->lkb_wait_nodeid,
|
|
(unsigned long long)lkb->lkb_recover_seq);
|
|
}
|
|
|
|
static void dlm_print_rsb(struct dlm_rsb *r)
|
|
{
|
|
printk(KERN_ERR "rsb: nodeid %d master %d dir %d flags %lx first %x "
|
|
"rlc %d name %s\n",
|
|
r->res_nodeid, r->res_master_nodeid, r->res_dir_nodeid,
|
|
r->res_flags, r->res_first_lkid, r->res_recover_locks_count,
|
|
r->res_name);
|
|
}
|
|
|
|
void dlm_dump_rsb(struct dlm_rsb *r)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
|
|
dlm_print_rsb(r);
|
|
|
|
printk(KERN_ERR "rsb: root_list empty %d recover_list empty %d\n",
|
|
list_empty(&r->res_root_list), list_empty(&r->res_recover_list));
|
|
printk(KERN_ERR "rsb lookup list\n");
|
|
list_for_each_entry(lkb, &r->res_lookup, lkb_rsb_lookup)
|
|
dlm_print_lkb(lkb);
|
|
printk(KERN_ERR "rsb grant queue:\n");
|
|
list_for_each_entry(lkb, &r->res_grantqueue, lkb_statequeue)
|
|
dlm_print_lkb(lkb);
|
|
printk(KERN_ERR "rsb convert queue:\n");
|
|
list_for_each_entry(lkb, &r->res_convertqueue, lkb_statequeue)
|
|
dlm_print_lkb(lkb);
|
|
printk(KERN_ERR "rsb wait queue:\n");
|
|
list_for_each_entry(lkb, &r->res_waitqueue, lkb_statequeue)
|
|
dlm_print_lkb(lkb);
|
|
}
|
|
|
|
/* Threads cannot use the lockspace while it's being recovered */
|
|
|
|
static inline void dlm_lock_recovery(struct dlm_ls *ls)
|
|
{
|
|
down_read(&ls->ls_in_recovery);
|
|
}
|
|
|
|
void dlm_unlock_recovery(struct dlm_ls *ls)
|
|
{
|
|
up_read(&ls->ls_in_recovery);
|
|
}
|
|
|
|
int dlm_lock_recovery_try(struct dlm_ls *ls)
|
|
{
|
|
return down_read_trylock(&ls->ls_in_recovery);
|
|
}
|
|
|
|
static inline int can_be_queued(struct dlm_lkb *lkb)
|
|
{
|
|
return !(lkb->lkb_exflags & DLM_LKF_NOQUEUE);
|
|
}
|
|
|
|
static inline int force_blocking_asts(struct dlm_lkb *lkb)
|
|
{
|
|
return (lkb->lkb_exflags & DLM_LKF_NOQUEUEBAST);
|
|
}
|
|
|
|
static inline int is_demoted(struct dlm_lkb *lkb)
|
|
{
|
|
return (lkb->lkb_sbflags & DLM_SBF_DEMOTED);
|
|
}
|
|
|
|
static inline int is_altmode(struct dlm_lkb *lkb)
|
|
{
|
|
return (lkb->lkb_sbflags & DLM_SBF_ALTMODE);
|
|
}
|
|
|
|
static inline int is_granted(struct dlm_lkb *lkb)
|
|
{
|
|
return (lkb->lkb_status == DLM_LKSTS_GRANTED);
|
|
}
|
|
|
|
static inline int is_remote(struct dlm_rsb *r)
|
|
{
|
|
DLM_ASSERT(r->res_nodeid >= 0, dlm_print_rsb(r););
|
|
return !!r->res_nodeid;
|
|
}
|
|
|
|
static inline int is_process_copy(struct dlm_lkb *lkb)
|
|
{
|
|
return (lkb->lkb_nodeid && !(lkb->lkb_flags & DLM_IFL_MSTCPY));
|
|
}
|
|
|
|
static inline int is_master_copy(struct dlm_lkb *lkb)
|
|
{
|
|
return (lkb->lkb_flags & DLM_IFL_MSTCPY) ? 1 : 0;
|
|
}
|
|
|
|
static inline int middle_conversion(struct dlm_lkb *lkb)
|
|
{
|
|
if ((lkb->lkb_grmode==DLM_LOCK_PR && lkb->lkb_rqmode==DLM_LOCK_CW) ||
|
|
(lkb->lkb_rqmode==DLM_LOCK_PR && lkb->lkb_grmode==DLM_LOCK_CW))
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static inline int down_conversion(struct dlm_lkb *lkb)
|
|
{
|
|
return (!middle_conversion(lkb) && lkb->lkb_rqmode < lkb->lkb_grmode);
|
|
}
|
|
|
|
static inline int is_overlap_unlock(struct dlm_lkb *lkb)
|
|
{
|
|
return lkb->lkb_flags & DLM_IFL_OVERLAP_UNLOCK;
|
|
}
|
|
|
|
static inline int is_overlap_cancel(struct dlm_lkb *lkb)
|
|
{
|
|
return lkb->lkb_flags & DLM_IFL_OVERLAP_CANCEL;
|
|
}
|
|
|
|
static inline int is_overlap(struct dlm_lkb *lkb)
|
|
{
|
|
return (lkb->lkb_flags & (DLM_IFL_OVERLAP_UNLOCK |
|
|
DLM_IFL_OVERLAP_CANCEL));
|
|
}
|
|
|
|
static void queue_cast(struct dlm_rsb *r, struct dlm_lkb *lkb, int rv)
|
|
{
|
|
if (is_master_copy(lkb))
|
|
return;
|
|
|
|
del_timeout(lkb);
|
|
|
|
DLM_ASSERT(lkb->lkb_lksb, dlm_print_lkb(lkb););
|
|
|
|
/* if the operation was a cancel, then return -DLM_ECANCEL, if a
|
|
timeout caused the cancel then return -ETIMEDOUT */
|
|
if (rv == -DLM_ECANCEL && (lkb->lkb_flags & DLM_IFL_TIMEOUT_CANCEL)) {
|
|
lkb->lkb_flags &= ~DLM_IFL_TIMEOUT_CANCEL;
|
|
rv = -ETIMEDOUT;
|
|
}
|
|
|
|
if (rv == -DLM_ECANCEL && (lkb->lkb_flags & DLM_IFL_DEADLOCK_CANCEL)) {
|
|
lkb->lkb_flags &= ~DLM_IFL_DEADLOCK_CANCEL;
|
|
rv = -EDEADLK;
|
|
}
|
|
|
|
dlm_add_cb(lkb, DLM_CB_CAST, lkb->lkb_grmode, rv, lkb->lkb_sbflags);
|
|
}
|
|
|
|
static inline void queue_cast_overlap(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
queue_cast(r, lkb,
|
|
is_overlap_unlock(lkb) ? -DLM_EUNLOCK : -DLM_ECANCEL);
|
|
}
|
|
|
|
static void queue_bast(struct dlm_rsb *r, struct dlm_lkb *lkb, int rqmode)
|
|
{
|
|
if (is_master_copy(lkb)) {
|
|
send_bast(r, lkb, rqmode);
|
|
} else {
|
|
dlm_add_cb(lkb, DLM_CB_BAST, rqmode, 0, 0);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Basic operations on rsb's and lkb's
|
|
*/
|
|
|
|
/* This is only called to add a reference when the code already holds
|
|
a valid reference to the rsb, so there's no need for locking. */
|
|
|
|
static inline void hold_rsb(struct dlm_rsb *r)
|
|
{
|
|
kref_get(&r->res_ref);
|
|
}
|
|
|
|
void dlm_hold_rsb(struct dlm_rsb *r)
|
|
{
|
|
hold_rsb(r);
|
|
}
|
|
|
|
/* When all references to the rsb are gone it's transferred to
|
|
the tossed list for later disposal. */
|
|
|
|
static void put_rsb(struct dlm_rsb *r)
|
|
{
|
|
struct dlm_ls *ls = r->res_ls;
|
|
uint32_t bucket = r->res_bucket;
|
|
|
|
spin_lock(&ls->ls_rsbtbl[bucket].lock);
|
|
kref_put(&r->res_ref, toss_rsb);
|
|
spin_unlock(&ls->ls_rsbtbl[bucket].lock);
|
|
}
|
|
|
|
void dlm_put_rsb(struct dlm_rsb *r)
|
|
{
|
|
put_rsb(r);
|
|
}
|
|
|
|
static int pre_rsb_struct(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_rsb *r1, *r2;
|
|
int count = 0;
|
|
|
|
spin_lock(&ls->ls_new_rsb_spin);
|
|
if (ls->ls_new_rsb_count > dlm_config.ci_new_rsb_count / 2) {
|
|
spin_unlock(&ls->ls_new_rsb_spin);
|
|
return 0;
|
|
}
|
|
spin_unlock(&ls->ls_new_rsb_spin);
|
|
|
|
r1 = dlm_allocate_rsb(ls);
|
|
r2 = dlm_allocate_rsb(ls);
|
|
|
|
spin_lock(&ls->ls_new_rsb_spin);
|
|
if (r1) {
|
|
list_add(&r1->res_hashchain, &ls->ls_new_rsb);
|
|
ls->ls_new_rsb_count++;
|
|
}
|
|
if (r2) {
|
|
list_add(&r2->res_hashchain, &ls->ls_new_rsb);
|
|
ls->ls_new_rsb_count++;
|
|
}
|
|
count = ls->ls_new_rsb_count;
|
|
spin_unlock(&ls->ls_new_rsb_spin);
|
|
|
|
if (!count)
|
|
return -ENOMEM;
|
|
return 0;
|
|
}
|
|
|
|
/* If ls->ls_new_rsb is empty, return -EAGAIN, so the caller can
|
|
unlock any spinlocks, go back and call pre_rsb_struct again.
|
|
Otherwise, take an rsb off the list and return it. */
|
|
|
|
static int get_rsb_struct(struct dlm_ls *ls, char *name, int len,
|
|
struct dlm_rsb **r_ret)
|
|
{
|
|
struct dlm_rsb *r;
|
|
int count;
|
|
|
|
spin_lock(&ls->ls_new_rsb_spin);
|
|
if (list_empty(&ls->ls_new_rsb)) {
|
|
count = ls->ls_new_rsb_count;
|
|
spin_unlock(&ls->ls_new_rsb_spin);
|
|
log_debug(ls, "find_rsb retry %d %d %s",
|
|
count, dlm_config.ci_new_rsb_count, name);
|
|
return -EAGAIN;
|
|
}
|
|
|
|
r = list_first_entry(&ls->ls_new_rsb, struct dlm_rsb, res_hashchain);
|
|
list_del(&r->res_hashchain);
|
|
/* Convert the empty list_head to a NULL rb_node for tree usage: */
|
|
memset(&r->res_hashnode, 0, sizeof(struct rb_node));
|
|
ls->ls_new_rsb_count--;
|
|
spin_unlock(&ls->ls_new_rsb_spin);
|
|
|
|
r->res_ls = ls;
|
|
r->res_length = len;
|
|
memcpy(r->res_name, name, len);
|
|
mutex_init(&r->res_mutex);
|
|
|
|
INIT_LIST_HEAD(&r->res_lookup);
|
|
INIT_LIST_HEAD(&r->res_grantqueue);
|
|
INIT_LIST_HEAD(&r->res_convertqueue);
|
|
INIT_LIST_HEAD(&r->res_waitqueue);
|
|
INIT_LIST_HEAD(&r->res_root_list);
|
|
INIT_LIST_HEAD(&r->res_recover_list);
|
|
|
|
*r_ret = r;
|
|
return 0;
|
|
}
|
|
|
|
static int rsb_cmp(struct dlm_rsb *r, const char *name, int nlen)
|
|
{
|
|
char maxname[DLM_RESNAME_MAXLEN];
|
|
|
|
memset(maxname, 0, DLM_RESNAME_MAXLEN);
|
|
memcpy(maxname, name, nlen);
|
|
return memcmp(r->res_name, maxname, DLM_RESNAME_MAXLEN);
|
|
}
|
|
|
|
int dlm_search_rsb_tree(struct rb_root *tree, char *name, int len,
|
|
struct dlm_rsb **r_ret)
|
|
{
|
|
struct rb_node *node = tree->rb_node;
|
|
struct dlm_rsb *r;
|
|
int rc;
|
|
|
|
while (node) {
|
|
r = rb_entry(node, struct dlm_rsb, res_hashnode);
|
|
rc = rsb_cmp(r, name, len);
|
|
if (rc < 0)
|
|
node = node->rb_left;
|
|
else if (rc > 0)
|
|
node = node->rb_right;
|
|
else
|
|
goto found;
|
|
}
|
|
*r_ret = NULL;
|
|
return -EBADR;
|
|
|
|
found:
|
|
*r_ret = r;
|
|
return 0;
|
|
}
|
|
|
|
static int rsb_insert(struct dlm_rsb *rsb, struct rb_root *tree)
|
|
{
|
|
struct rb_node **newn = &tree->rb_node;
|
|
struct rb_node *parent = NULL;
|
|
int rc;
|
|
|
|
while (*newn) {
|
|
struct dlm_rsb *cur = rb_entry(*newn, struct dlm_rsb,
|
|
res_hashnode);
|
|
|
|
parent = *newn;
|
|
rc = rsb_cmp(cur, rsb->res_name, rsb->res_length);
|
|
if (rc < 0)
|
|
newn = &parent->rb_left;
|
|
else if (rc > 0)
|
|
newn = &parent->rb_right;
|
|
else {
|
|
log_print("rsb_insert match");
|
|
dlm_dump_rsb(rsb);
|
|
dlm_dump_rsb(cur);
|
|
return -EEXIST;
|
|
}
|
|
}
|
|
|
|
rb_link_node(&rsb->res_hashnode, parent, newn);
|
|
rb_insert_color(&rsb->res_hashnode, tree);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Find rsb in rsbtbl and potentially create/add one
|
|
*
|
|
* Delaying the release of rsb's has a similar benefit to applications keeping
|
|
* NL locks on an rsb, but without the guarantee that the cached master value
|
|
* will still be valid when the rsb is reused. Apps aren't always smart enough
|
|
* to keep NL locks on an rsb that they may lock again shortly; this can lead
|
|
* to excessive master lookups and removals if we don't delay the release.
|
|
*
|
|
* Searching for an rsb means looking through both the normal list and toss
|
|
* list. When found on the toss list the rsb is moved to the normal list with
|
|
* ref count of 1; when found on normal list the ref count is incremented.
|
|
*
|
|
* rsb's on the keep list are being used locally and refcounted.
|
|
* rsb's on the toss list are not being used locally, and are not refcounted.
|
|
*
|
|
* The toss list rsb's were either
|
|
* - previously used locally but not any more (were on keep list, then
|
|
* moved to toss list when last refcount dropped)
|
|
* - created and put on toss list as a directory record for a lookup
|
|
* (we are the dir node for the res, but are not using the res right now,
|
|
* but some other node is)
|
|
*
|
|
* The purpose of find_rsb() is to return a refcounted rsb for local use.
|
|
* So, if the given rsb is on the toss list, it is moved to the keep list
|
|
* before being returned.
|
|
*
|
|
* toss_rsb() happens when all local usage of the rsb is done, i.e. no
|
|
* more refcounts exist, so the rsb is moved from the keep list to the
|
|
* toss list.
|
|
*
|
|
* rsb's on both keep and toss lists are used for doing a name to master
|
|
* lookups. rsb's that are in use locally (and being refcounted) are on
|
|
* the keep list, rsb's that are not in use locally (not refcounted) and
|
|
* only exist for name/master lookups are on the toss list.
|
|
*
|
|
* rsb's on the toss list who's dir_nodeid is not local can have stale
|
|
* name/master mappings. So, remote requests on such rsb's can potentially
|
|
* return with an error, which means the mapping is stale and needs to
|
|
* be updated with a new lookup. (The idea behind MASTER UNCERTAIN and
|
|
* first_lkid is to keep only a single outstanding request on an rsb
|
|
* while that rsb has a potentially stale master.)
|
|
*/
|
|
|
|
static int find_rsb_dir(struct dlm_ls *ls, char *name, int len,
|
|
uint32_t hash, uint32_t b,
|
|
int dir_nodeid, int from_nodeid,
|
|
unsigned int flags, struct dlm_rsb **r_ret)
|
|
{
|
|
struct dlm_rsb *r = NULL;
|
|
int our_nodeid = dlm_our_nodeid();
|
|
int from_local = 0;
|
|
int from_other = 0;
|
|
int from_dir = 0;
|
|
int create = 0;
|
|
int error;
|
|
|
|
if (flags & R_RECEIVE_REQUEST) {
|
|
if (from_nodeid == dir_nodeid)
|
|
from_dir = 1;
|
|
else
|
|
from_other = 1;
|
|
} else if (flags & R_REQUEST) {
|
|
from_local = 1;
|
|
}
|
|
|
|
/*
|
|
* flags & R_RECEIVE_RECOVER is from dlm_recover_master_copy, so
|
|
* from_nodeid has sent us a lock in dlm_recover_locks, believing
|
|
* we're the new master. Our local recovery may not have set
|
|
* res_master_nodeid to our_nodeid yet, so allow either. Don't
|
|
* create the rsb; dlm_recover_process_copy() will handle EBADR
|
|
* by resending.
|
|
*
|
|
* If someone sends us a request, we are the dir node, and we do
|
|
* not find the rsb anywhere, then recreate it. This happens if
|
|
* someone sends us a request after we have removed/freed an rsb
|
|
* from our toss list. (They sent a request instead of lookup
|
|
* because they are using an rsb from their toss list.)
|
|
*/
|
|
|
|
if (from_local || from_dir ||
|
|
(from_other && (dir_nodeid == our_nodeid))) {
|
|
create = 1;
|
|
}
|
|
|
|
retry:
|
|
if (create) {
|
|
error = pre_rsb_struct(ls);
|
|
if (error < 0)
|
|
goto out;
|
|
}
|
|
|
|
spin_lock(&ls->ls_rsbtbl[b].lock);
|
|
|
|
error = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].keep, name, len, &r);
|
|
if (error)
|
|
goto do_toss;
|
|
|
|
/*
|
|
* rsb is active, so we can't check master_nodeid without lock_rsb.
|
|
*/
|
|
|
|
kref_get(&r->res_ref);
|
|
error = 0;
|
|
goto out_unlock;
|
|
|
|
|
|
do_toss:
|
|
error = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].toss, name, len, &r);
|
|
if (error)
|
|
goto do_new;
|
|
|
|
/*
|
|
* rsb found inactive (master_nodeid may be out of date unless
|
|
* we are the dir_nodeid or were the master) No other thread
|
|
* is using this rsb because it's on the toss list, so we can
|
|
* look at or update res_master_nodeid without lock_rsb.
|
|
*/
|
|
|
|
if ((r->res_master_nodeid != our_nodeid) && from_other) {
|
|
/* our rsb was not master, and another node (not the dir node)
|
|
has sent us a request */
|
|
log_debug(ls, "find_rsb toss from_other %d master %d dir %d %s",
|
|
from_nodeid, r->res_master_nodeid, dir_nodeid,
|
|
r->res_name);
|
|
error = -ENOTBLK;
|
|
goto out_unlock;
|
|
}
|
|
|
|
if ((r->res_master_nodeid != our_nodeid) && from_dir) {
|
|
/* don't think this should ever happen */
|
|
log_error(ls, "find_rsb toss from_dir %d master %d",
|
|
from_nodeid, r->res_master_nodeid);
|
|
dlm_print_rsb(r);
|
|
/* fix it and go on */
|
|
r->res_master_nodeid = our_nodeid;
|
|
r->res_nodeid = 0;
|
|
rsb_clear_flag(r, RSB_MASTER_UNCERTAIN);
|
|
r->res_first_lkid = 0;
|
|
}
|
|
|
|
if (from_local && (r->res_master_nodeid != our_nodeid)) {
|
|
/* Because we have held no locks on this rsb,
|
|
res_master_nodeid could have become stale. */
|
|
rsb_set_flag(r, RSB_MASTER_UNCERTAIN);
|
|
r->res_first_lkid = 0;
|
|
}
|
|
|
|
rb_erase(&r->res_hashnode, &ls->ls_rsbtbl[b].toss);
|
|
error = rsb_insert(r, &ls->ls_rsbtbl[b].keep);
|
|
goto out_unlock;
|
|
|
|
|
|
do_new:
|
|
/*
|
|
* rsb not found
|
|
*/
|
|
|
|
if (error == -EBADR && !create)
|
|
goto out_unlock;
|
|
|
|
error = get_rsb_struct(ls, name, len, &r);
|
|
if (error == -EAGAIN) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
goto retry;
|
|
}
|
|
if (error)
|
|
goto out_unlock;
|
|
|
|
r->res_hash = hash;
|
|
r->res_bucket = b;
|
|
r->res_dir_nodeid = dir_nodeid;
|
|
kref_init(&r->res_ref);
|
|
|
|
if (from_dir) {
|
|
/* want to see how often this happens */
|
|
log_debug(ls, "find_rsb new from_dir %d recreate %s",
|
|
from_nodeid, r->res_name);
|
|
r->res_master_nodeid = our_nodeid;
|
|
r->res_nodeid = 0;
|
|
goto out_add;
|
|
}
|
|
|
|
if (from_other && (dir_nodeid != our_nodeid)) {
|
|
/* should never happen */
|
|
log_error(ls, "find_rsb new from_other %d dir %d our %d %s",
|
|
from_nodeid, dir_nodeid, our_nodeid, r->res_name);
|
|
dlm_free_rsb(r);
|
|
r = NULL;
|
|
error = -ENOTBLK;
|
|
goto out_unlock;
|
|
}
|
|
|
|
if (from_other) {
|
|
log_debug(ls, "find_rsb new from_other %d dir %d %s",
|
|
from_nodeid, dir_nodeid, r->res_name);
|
|
}
|
|
|
|
if (dir_nodeid == our_nodeid) {
|
|
/* When we are the dir nodeid, we can set the master
|
|
node immediately */
|
|
r->res_master_nodeid = our_nodeid;
|
|
r->res_nodeid = 0;
|
|
} else {
|
|
/* set_master will send_lookup to dir_nodeid */
|
|
r->res_master_nodeid = 0;
|
|
r->res_nodeid = -1;
|
|
}
|
|
|
|
out_add:
|
|
error = rsb_insert(r, &ls->ls_rsbtbl[b].keep);
|
|
out_unlock:
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
out:
|
|
*r_ret = r;
|
|
return error;
|
|
}
|
|
|
|
/* During recovery, other nodes can send us new MSTCPY locks (from
|
|
dlm_recover_locks) before we've made ourself master (in
|
|
dlm_recover_masters). */
|
|
|
|
static int find_rsb_nodir(struct dlm_ls *ls, char *name, int len,
|
|
uint32_t hash, uint32_t b,
|
|
int dir_nodeid, int from_nodeid,
|
|
unsigned int flags, struct dlm_rsb **r_ret)
|
|
{
|
|
struct dlm_rsb *r = NULL;
|
|
int our_nodeid = dlm_our_nodeid();
|
|
int recover = (flags & R_RECEIVE_RECOVER);
|
|
int error;
|
|
|
|
retry:
|
|
error = pre_rsb_struct(ls);
|
|
if (error < 0)
|
|
goto out;
|
|
|
|
spin_lock(&ls->ls_rsbtbl[b].lock);
|
|
|
|
error = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].keep, name, len, &r);
|
|
if (error)
|
|
goto do_toss;
|
|
|
|
/*
|
|
* rsb is active, so we can't check master_nodeid without lock_rsb.
|
|
*/
|
|
|
|
kref_get(&r->res_ref);
|
|
goto out_unlock;
|
|
|
|
|
|
do_toss:
|
|
error = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].toss, name, len, &r);
|
|
if (error)
|
|
goto do_new;
|
|
|
|
/*
|
|
* rsb found inactive. No other thread is using this rsb because
|
|
* it's on the toss list, so we can look at or update
|
|
* res_master_nodeid without lock_rsb.
|
|
*/
|
|
|
|
if (!recover && (r->res_master_nodeid != our_nodeid) && from_nodeid) {
|
|
/* our rsb is not master, and another node has sent us a
|
|
request; this should never happen */
|
|
log_error(ls, "find_rsb toss from_nodeid %d master %d dir %d",
|
|
from_nodeid, r->res_master_nodeid, dir_nodeid);
|
|
dlm_print_rsb(r);
|
|
error = -ENOTBLK;
|
|
goto out_unlock;
|
|
}
|
|
|
|
if (!recover && (r->res_master_nodeid != our_nodeid) &&
|
|
(dir_nodeid == our_nodeid)) {
|
|
/* our rsb is not master, and we are dir; may as well fix it;
|
|
this should never happen */
|
|
log_error(ls, "find_rsb toss our %d master %d dir %d",
|
|
our_nodeid, r->res_master_nodeid, dir_nodeid);
|
|
dlm_print_rsb(r);
|
|
r->res_master_nodeid = our_nodeid;
|
|
r->res_nodeid = 0;
|
|
}
|
|
|
|
rb_erase(&r->res_hashnode, &ls->ls_rsbtbl[b].toss);
|
|
error = rsb_insert(r, &ls->ls_rsbtbl[b].keep);
|
|
goto out_unlock;
|
|
|
|
|
|
do_new:
|
|
/*
|
|
* rsb not found
|
|
*/
|
|
|
|
error = get_rsb_struct(ls, name, len, &r);
|
|
if (error == -EAGAIN) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
goto retry;
|
|
}
|
|
if (error)
|
|
goto out_unlock;
|
|
|
|
r->res_hash = hash;
|
|
r->res_bucket = b;
|
|
r->res_dir_nodeid = dir_nodeid;
|
|
r->res_master_nodeid = dir_nodeid;
|
|
r->res_nodeid = (dir_nodeid == our_nodeid) ? 0 : dir_nodeid;
|
|
kref_init(&r->res_ref);
|
|
|
|
error = rsb_insert(r, &ls->ls_rsbtbl[b].keep);
|
|
out_unlock:
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
out:
|
|
*r_ret = r;
|
|
return error;
|
|
}
|
|
|
|
static int find_rsb(struct dlm_ls *ls, char *name, int len, int from_nodeid,
|
|
unsigned int flags, struct dlm_rsb **r_ret)
|
|
{
|
|
uint32_t hash, b;
|
|
int dir_nodeid;
|
|
|
|
if (len > DLM_RESNAME_MAXLEN)
|
|
return -EINVAL;
|
|
|
|
hash = jhash(name, len, 0);
|
|
b = hash & (ls->ls_rsbtbl_size - 1);
|
|
|
|
dir_nodeid = dlm_hash2nodeid(ls, hash);
|
|
|
|
if (dlm_no_directory(ls))
|
|
return find_rsb_nodir(ls, name, len, hash, b, dir_nodeid,
|
|
from_nodeid, flags, r_ret);
|
|
else
|
|
return find_rsb_dir(ls, name, len, hash, b, dir_nodeid,
|
|
from_nodeid, flags, r_ret);
|
|
}
|
|
|
|
/* we have received a request and found that res_master_nodeid != our_nodeid,
|
|
so we need to return an error or make ourself the master */
|
|
|
|
static int validate_master_nodeid(struct dlm_ls *ls, struct dlm_rsb *r,
|
|
int from_nodeid)
|
|
{
|
|
if (dlm_no_directory(ls)) {
|
|
log_error(ls, "find_rsb keep from_nodeid %d master %d dir %d",
|
|
from_nodeid, r->res_master_nodeid,
|
|
r->res_dir_nodeid);
|
|
dlm_print_rsb(r);
|
|
return -ENOTBLK;
|
|
}
|
|
|
|
if (from_nodeid != r->res_dir_nodeid) {
|
|
/* our rsb is not master, and another node (not the dir node)
|
|
has sent us a request. this is much more common when our
|
|
master_nodeid is zero, so limit debug to non-zero. */
|
|
|
|
if (r->res_master_nodeid) {
|
|
log_debug(ls, "validate master from_other %d master %d "
|
|
"dir %d first %x %s", from_nodeid,
|
|
r->res_master_nodeid, r->res_dir_nodeid,
|
|
r->res_first_lkid, r->res_name);
|
|
}
|
|
return -ENOTBLK;
|
|
} else {
|
|
/* our rsb is not master, but the dir nodeid has sent us a
|
|
request; this could happen with master 0 / res_nodeid -1 */
|
|
|
|
if (r->res_master_nodeid) {
|
|
log_error(ls, "validate master from_dir %d master %d "
|
|
"first %x %s",
|
|
from_nodeid, r->res_master_nodeid,
|
|
r->res_first_lkid, r->res_name);
|
|
}
|
|
|
|
r->res_master_nodeid = dlm_our_nodeid();
|
|
r->res_nodeid = 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* We're the dir node for this res and another node wants to know the
|
|
* master nodeid. During normal operation (non recovery) this is only
|
|
* called from receive_lookup(); master lookups when the local node is
|
|
* the dir node are done by find_rsb().
|
|
*
|
|
* normal operation, we are the dir node for a resource
|
|
* . _request_lock
|
|
* . set_master
|
|
* . send_lookup
|
|
* . receive_lookup
|
|
* . dlm_master_lookup flags 0
|
|
*
|
|
* recover directory, we are rebuilding dir for all resources
|
|
* . dlm_recover_directory
|
|
* . dlm_rcom_names
|
|
* remote node sends back the rsb names it is master of and we are dir of
|
|
* . dlm_master_lookup RECOVER_DIR (fix_master 0, from_master 1)
|
|
* we either create new rsb setting remote node as master, or find existing
|
|
* rsb and set master to be the remote node.
|
|
*
|
|
* recover masters, we are finding the new master for resources
|
|
* . dlm_recover_masters
|
|
* . recover_master
|
|
* . dlm_send_rcom_lookup
|
|
* . receive_rcom_lookup
|
|
* . dlm_master_lookup RECOVER_MASTER (fix_master 1, from_master 0)
|
|
*/
|
|
|
|
int dlm_master_lookup(struct dlm_ls *ls, int from_nodeid, char *name, int len,
|
|
unsigned int flags, int *r_nodeid, int *result)
|
|
{
|
|
struct dlm_rsb *r = NULL;
|
|
uint32_t hash, b;
|
|
int from_master = (flags & DLM_LU_RECOVER_DIR);
|
|
int fix_master = (flags & DLM_LU_RECOVER_MASTER);
|
|
int our_nodeid = dlm_our_nodeid();
|
|
int dir_nodeid, error, toss_list = 0;
|
|
|
|
if (len > DLM_RESNAME_MAXLEN)
|
|
return -EINVAL;
|
|
|
|
if (from_nodeid == our_nodeid) {
|
|
log_error(ls, "dlm_master_lookup from our_nodeid %d flags %x",
|
|
our_nodeid, flags);
|
|
return -EINVAL;
|
|
}
|
|
|
|
hash = jhash(name, len, 0);
|
|
b = hash & (ls->ls_rsbtbl_size - 1);
|
|
|
|
dir_nodeid = dlm_hash2nodeid(ls, hash);
|
|
if (dir_nodeid != our_nodeid) {
|
|
log_error(ls, "dlm_master_lookup from %d dir %d our %d h %x %d",
|
|
from_nodeid, dir_nodeid, our_nodeid, hash,
|
|
ls->ls_num_nodes);
|
|
*r_nodeid = -1;
|
|
return -EINVAL;
|
|
}
|
|
|
|
retry:
|
|
error = pre_rsb_struct(ls);
|
|
if (error < 0)
|
|
return error;
|
|
|
|
spin_lock(&ls->ls_rsbtbl[b].lock);
|
|
error = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].keep, name, len, &r);
|
|
if (!error) {
|
|
/* because the rsb is active, we need to lock_rsb before
|
|
checking/changing re_master_nodeid */
|
|
|
|
hold_rsb(r);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
lock_rsb(r);
|
|
goto found;
|
|
}
|
|
|
|
error = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].toss, name, len, &r);
|
|
if (error)
|
|
goto not_found;
|
|
|
|
/* because the rsb is inactive (on toss list), it's not refcounted
|
|
and lock_rsb is not used, but is protected by the rsbtbl lock */
|
|
|
|
toss_list = 1;
|
|
found:
|
|
if (r->res_dir_nodeid != our_nodeid) {
|
|
/* should not happen, but may as well fix it and carry on */
|
|
log_error(ls, "dlm_master_lookup res_dir %d our %d %s",
|
|
r->res_dir_nodeid, our_nodeid, r->res_name);
|
|
r->res_dir_nodeid = our_nodeid;
|
|
}
|
|
|
|
if (fix_master && dlm_is_removed(ls, r->res_master_nodeid)) {
|
|
/* Recovery uses this function to set a new master when
|
|
the previous master failed. Setting NEW_MASTER will
|
|
force dlm_recover_masters to call recover_master on this
|
|
rsb even though the res_nodeid is no longer removed. */
|
|
|
|
r->res_master_nodeid = from_nodeid;
|
|
r->res_nodeid = from_nodeid;
|
|
rsb_set_flag(r, RSB_NEW_MASTER);
|
|
|
|
if (toss_list) {
|
|
/* I don't think we should ever find it on toss list. */
|
|
log_error(ls, "dlm_master_lookup fix_master on toss");
|
|
dlm_dump_rsb(r);
|
|
}
|
|
}
|
|
|
|
if (from_master && (r->res_master_nodeid != from_nodeid)) {
|
|
/* this will happen if from_nodeid became master during
|
|
a previous recovery cycle, and we aborted the previous
|
|
cycle before recovering this master value */
|
|
|
|
log_limit(ls, "dlm_master_lookup from_master %d "
|
|
"master_nodeid %d res_nodeid %d first %x %s",
|
|
from_nodeid, r->res_master_nodeid, r->res_nodeid,
|
|
r->res_first_lkid, r->res_name);
|
|
|
|
if (r->res_master_nodeid == our_nodeid) {
|
|
log_error(ls, "from_master %d our_master", from_nodeid);
|
|
dlm_dump_rsb(r);
|
|
goto out_found;
|
|
}
|
|
|
|
r->res_master_nodeid = from_nodeid;
|
|
r->res_nodeid = from_nodeid;
|
|
rsb_set_flag(r, RSB_NEW_MASTER);
|
|
}
|
|
|
|
if (!r->res_master_nodeid) {
|
|
/* this will happen if recovery happens while we're looking
|
|
up the master for this rsb */
|
|
|
|
log_debug(ls, "dlm_master_lookup master 0 to %d first %x %s",
|
|
from_nodeid, r->res_first_lkid, r->res_name);
|
|
r->res_master_nodeid = from_nodeid;
|
|
r->res_nodeid = from_nodeid;
|
|
}
|
|
|
|
if (!from_master && !fix_master &&
|
|
(r->res_master_nodeid == from_nodeid)) {
|
|
/* this can happen when the master sends remove, the dir node
|
|
finds the rsb on the keep list and ignores the remove,
|
|
and the former master sends a lookup */
|
|
|
|
log_limit(ls, "dlm_master_lookup from master %d flags %x "
|
|
"first %x %s", from_nodeid, flags,
|
|
r->res_first_lkid, r->res_name);
|
|
}
|
|
|
|
out_found:
|
|
*r_nodeid = r->res_master_nodeid;
|
|
if (result)
|
|
*result = DLM_LU_MATCH;
|
|
|
|
if (toss_list) {
|
|
r->res_toss_time = jiffies;
|
|
/* the rsb was inactive (on toss list) */
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
} else {
|
|
/* the rsb was active */
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
}
|
|
return 0;
|
|
|
|
not_found:
|
|
error = get_rsb_struct(ls, name, len, &r);
|
|
if (error == -EAGAIN) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
goto retry;
|
|
}
|
|
if (error)
|
|
goto out_unlock;
|
|
|
|
r->res_hash = hash;
|
|
r->res_bucket = b;
|
|
r->res_dir_nodeid = our_nodeid;
|
|
r->res_master_nodeid = from_nodeid;
|
|
r->res_nodeid = from_nodeid;
|
|
kref_init(&r->res_ref);
|
|
r->res_toss_time = jiffies;
|
|
|
|
error = rsb_insert(r, &ls->ls_rsbtbl[b].toss);
|
|
if (error) {
|
|
/* should never happen */
|
|
dlm_free_rsb(r);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
goto retry;
|
|
}
|
|
|
|
if (result)
|
|
*result = DLM_LU_ADD;
|
|
*r_nodeid = from_nodeid;
|
|
error = 0;
|
|
out_unlock:
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
return error;
|
|
}
|
|
|
|
static void dlm_dump_rsb_hash(struct dlm_ls *ls, uint32_t hash)
|
|
{
|
|
struct rb_node *n;
|
|
struct dlm_rsb *r;
|
|
int i;
|
|
|
|
for (i = 0; i < ls->ls_rsbtbl_size; i++) {
|
|
spin_lock(&ls->ls_rsbtbl[i].lock);
|
|
for (n = rb_first(&ls->ls_rsbtbl[i].keep); n; n = rb_next(n)) {
|
|
r = rb_entry(n, struct dlm_rsb, res_hashnode);
|
|
if (r->res_hash == hash)
|
|
dlm_dump_rsb(r);
|
|
}
|
|
spin_unlock(&ls->ls_rsbtbl[i].lock);
|
|
}
|
|
}
|
|
|
|
void dlm_dump_rsb_name(struct dlm_ls *ls, char *name, int len)
|
|
{
|
|
struct dlm_rsb *r = NULL;
|
|
uint32_t hash, b;
|
|
int error;
|
|
|
|
hash = jhash(name, len, 0);
|
|
b = hash & (ls->ls_rsbtbl_size - 1);
|
|
|
|
spin_lock(&ls->ls_rsbtbl[b].lock);
|
|
error = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].keep, name, len, &r);
|
|
if (!error)
|
|
goto out_dump;
|
|
|
|
error = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].toss, name, len, &r);
|
|
if (error)
|
|
goto out;
|
|
out_dump:
|
|
dlm_dump_rsb(r);
|
|
out:
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
}
|
|
|
|
static void toss_rsb(struct kref *kref)
|
|
{
|
|
struct dlm_rsb *r = container_of(kref, struct dlm_rsb, res_ref);
|
|
struct dlm_ls *ls = r->res_ls;
|
|
|
|
DLM_ASSERT(list_empty(&r->res_root_list), dlm_print_rsb(r););
|
|
kref_init(&r->res_ref);
|
|
rb_erase(&r->res_hashnode, &ls->ls_rsbtbl[r->res_bucket].keep);
|
|
rsb_insert(r, &ls->ls_rsbtbl[r->res_bucket].toss);
|
|
r->res_toss_time = jiffies;
|
|
ls->ls_rsbtbl[r->res_bucket].flags |= DLM_RTF_SHRINK;
|
|
if (r->res_lvbptr) {
|
|
dlm_free_lvb(r->res_lvbptr);
|
|
r->res_lvbptr = NULL;
|
|
}
|
|
}
|
|
|
|
/* See comment for unhold_lkb */
|
|
|
|
static void unhold_rsb(struct dlm_rsb *r)
|
|
{
|
|
int rv;
|
|
rv = kref_put(&r->res_ref, toss_rsb);
|
|
DLM_ASSERT(!rv, dlm_dump_rsb(r););
|
|
}
|
|
|
|
static void kill_rsb(struct kref *kref)
|
|
{
|
|
struct dlm_rsb *r = container_of(kref, struct dlm_rsb, res_ref);
|
|
|
|
/* All work is done after the return from kref_put() so we
|
|
can release the write_lock before the remove and free. */
|
|
|
|
DLM_ASSERT(list_empty(&r->res_lookup), dlm_dump_rsb(r););
|
|
DLM_ASSERT(list_empty(&r->res_grantqueue), dlm_dump_rsb(r););
|
|
DLM_ASSERT(list_empty(&r->res_convertqueue), dlm_dump_rsb(r););
|
|
DLM_ASSERT(list_empty(&r->res_waitqueue), dlm_dump_rsb(r););
|
|
DLM_ASSERT(list_empty(&r->res_root_list), dlm_dump_rsb(r););
|
|
DLM_ASSERT(list_empty(&r->res_recover_list), dlm_dump_rsb(r););
|
|
}
|
|
|
|
/* Attaching/detaching lkb's from rsb's is for rsb reference counting.
|
|
The rsb must exist as long as any lkb's for it do. */
|
|
|
|
static void attach_lkb(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
hold_rsb(r);
|
|
lkb->lkb_resource = r;
|
|
}
|
|
|
|
static void detach_lkb(struct dlm_lkb *lkb)
|
|
{
|
|
if (lkb->lkb_resource) {
|
|
put_rsb(lkb->lkb_resource);
|
|
lkb->lkb_resource = NULL;
|
|
}
|
|
}
|
|
|
|
static int create_lkb(struct dlm_ls *ls, struct dlm_lkb **lkb_ret)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
int rv;
|
|
|
|
lkb = dlm_allocate_lkb(ls);
|
|
if (!lkb)
|
|
return -ENOMEM;
|
|
|
|
lkb->lkb_nodeid = -1;
|
|
lkb->lkb_grmode = DLM_LOCK_IV;
|
|
kref_init(&lkb->lkb_ref);
|
|
INIT_LIST_HEAD(&lkb->lkb_ownqueue);
|
|
INIT_LIST_HEAD(&lkb->lkb_rsb_lookup);
|
|
INIT_LIST_HEAD(&lkb->lkb_time_list);
|
|
INIT_LIST_HEAD(&lkb->lkb_cb_list);
|
|
mutex_init(&lkb->lkb_cb_mutex);
|
|
INIT_WORK(&lkb->lkb_cb_work, dlm_callback_work);
|
|
|
|
idr_preload(GFP_NOFS);
|
|
spin_lock(&ls->ls_lkbidr_spin);
|
|
rv = idr_alloc(&ls->ls_lkbidr, lkb, 1, 0, GFP_NOWAIT);
|
|
if (rv >= 0)
|
|
lkb->lkb_id = rv;
|
|
spin_unlock(&ls->ls_lkbidr_spin);
|
|
idr_preload_end();
|
|
|
|
if (rv < 0) {
|
|
log_error(ls, "create_lkb idr error %d", rv);
|
|
dlm_free_lkb(lkb);
|
|
return rv;
|
|
}
|
|
|
|
*lkb_ret = lkb;
|
|
return 0;
|
|
}
|
|
|
|
static int find_lkb(struct dlm_ls *ls, uint32_t lkid, struct dlm_lkb **lkb_ret)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
|
|
spin_lock(&ls->ls_lkbidr_spin);
|
|
lkb = idr_find(&ls->ls_lkbidr, lkid);
|
|
if (lkb)
|
|
kref_get(&lkb->lkb_ref);
|
|
spin_unlock(&ls->ls_lkbidr_spin);
|
|
|
|
*lkb_ret = lkb;
|
|
return lkb ? 0 : -ENOENT;
|
|
}
|
|
|
|
static void kill_lkb(struct kref *kref)
|
|
{
|
|
struct dlm_lkb *lkb = container_of(kref, struct dlm_lkb, lkb_ref);
|
|
|
|
/* All work is done after the return from kref_put() so we
|
|
can release the write_lock before the detach_lkb */
|
|
|
|
DLM_ASSERT(!lkb->lkb_status, dlm_print_lkb(lkb););
|
|
}
|
|
|
|
/* __put_lkb() is used when an lkb may not have an rsb attached to
|
|
it so we need to provide the lockspace explicitly */
|
|
|
|
static int __put_lkb(struct dlm_ls *ls, struct dlm_lkb *lkb)
|
|
{
|
|
uint32_t lkid = lkb->lkb_id;
|
|
|
|
spin_lock(&ls->ls_lkbidr_spin);
|
|
if (kref_put(&lkb->lkb_ref, kill_lkb)) {
|
|
idr_remove(&ls->ls_lkbidr, lkid);
|
|
spin_unlock(&ls->ls_lkbidr_spin);
|
|
|
|
detach_lkb(lkb);
|
|
|
|
/* for local/process lkbs, lvbptr points to caller's lksb */
|
|
if (lkb->lkb_lvbptr && is_master_copy(lkb))
|
|
dlm_free_lvb(lkb->lkb_lvbptr);
|
|
dlm_free_lkb(lkb);
|
|
return 1;
|
|
} else {
|
|
spin_unlock(&ls->ls_lkbidr_spin);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
int dlm_put_lkb(struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_ls *ls;
|
|
|
|
DLM_ASSERT(lkb->lkb_resource, dlm_print_lkb(lkb););
|
|
DLM_ASSERT(lkb->lkb_resource->res_ls, dlm_print_lkb(lkb););
|
|
|
|
ls = lkb->lkb_resource->res_ls;
|
|
return __put_lkb(ls, lkb);
|
|
}
|
|
|
|
/* This is only called to add a reference when the code already holds
|
|
a valid reference to the lkb, so there's no need for locking. */
|
|
|
|
static inline void hold_lkb(struct dlm_lkb *lkb)
|
|
{
|
|
kref_get(&lkb->lkb_ref);
|
|
}
|
|
|
|
/* This is called when we need to remove a reference and are certain
|
|
it's not the last ref. e.g. del_lkb is always called between a
|
|
find_lkb/put_lkb and is always the inverse of a previous add_lkb.
|
|
put_lkb would work fine, but would involve unnecessary locking */
|
|
|
|
static inline void unhold_lkb(struct dlm_lkb *lkb)
|
|
{
|
|
int rv;
|
|
rv = kref_put(&lkb->lkb_ref, kill_lkb);
|
|
DLM_ASSERT(!rv, dlm_print_lkb(lkb););
|
|
}
|
|
|
|
static void lkb_add_ordered(struct list_head *new, struct list_head *head,
|
|
int mode)
|
|
{
|
|
struct dlm_lkb *lkb = NULL;
|
|
|
|
list_for_each_entry(lkb, head, lkb_statequeue)
|
|
if (lkb->lkb_rqmode < mode)
|
|
break;
|
|
|
|
__list_add(new, lkb->lkb_statequeue.prev, &lkb->lkb_statequeue);
|
|
}
|
|
|
|
/* add/remove lkb to rsb's grant/convert/wait queue */
|
|
|
|
static void add_lkb(struct dlm_rsb *r, struct dlm_lkb *lkb, int status)
|
|
{
|
|
kref_get(&lkb->lkb_ref);
|
|
|
|
DLM_ASSERT(!lkb->lkb_status, dlm_print_lkb(lkb););
|
|
|
|
lkb->lkb_timestamp = ktime_get();
|
|
|
|
lkb->lkb_status = status;
|
|
|
|
switch (status) {
|
|
case DLM_LKSTS_WAITING:
|
|
if (lkb->lkb_exflags & DLM_LKF_HEADQUE)
|
|
list_add(&lkb->lkb_statequeue, &r->res_waitqueue);
|
|
else
|
|
list_add_tail(&lkb->lkb_statequeue, &r->res_waitqueue);
|
|
break;
|
|
case DLM_LKSTS_GRANTED:
|
|
/* convention says granted locks kept in order of grmode */
|
|
lkb_add_ordered(&lkb->lkb_statequeue, &r->res_grantqueue,
|
|
lkb->lkb_grmode);
|
|
break;
|
|
case DLM_LKSTS_CONVERT:
|
|
if (lkb->lkb_exflags & DLM_LKF_HEADQUE)
|
|
list_add(&lkb->lkb_statequeue, &r->res_convertqueue);
|
|
else
|
|
list_add_tail(&lkb->lkb_statequeue,
|
|
&r->res_convertqueue);
|
|
break;
|
|
default:
|
|
DLM_ASSERT(0, dlm_print_lkb(lkb); printk("sts=%d\n", status););
|
|
}
|
|
}
|
|
|
|
static void del_lkb(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
lkb->lkb_status = 0;
|
|
list_del(&lkb->lkb_statequeue);
|
|
unhold_lkb(lkb);
|
|
}
|
|
|
|
static void move_lkb(struct dlm_rsb *r, struct dlm_lkb *lkb, int sts)
|
|
{
|
|
hold_lkb(lkb);
|
|
del_lkb(r, lkb);
|
|
add_lkb(r, lkb, sts);
|
|
unhold_lkb(lkb);
|
|
}
|
|
|
|
static int msg_reply_type(int mstype)
|
|
{
|
|
switch (mstype) {
|
|
case DLM_MSG_REQUEST:
|
|
return DLM_MSG_REQUEST_REPLY;
|
|
case DLM_MSG_CONVERT:
|
|
return DLM_MSG_CONVERT_REPLY;
|
|
case DLM_MSG_UNLOCK:
|
|
return DLM_MSG_UNLOCK_REPLY;
|
|
case DLM_MSG_CANCEL:
|
|
return DLM_MSG_CANCEL_REPLY;
|
|
case DLM_MSG_LOOKUP:
|
|
return DLM_MSG_LOOKUP_REPLY;
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
static int nodeid_warned(int nodeid, int num_nodes, int *warned)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < num_nodes; i++) {
|
|
if (!warned[i]) {
|
|
warned[i] = nodeid;
|
|
return 0;
|
|
}
|
|
if (warned[i] == nodeid)
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void dlm_scan_waiters(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
s64 us;
|
|
s64 debug_maxus = 0;
|
|
u32 debug_scanned = 0;
|
|
u32 debug_expired = 0;
|
|
int num_nodes = 0;
|
|
int *warned = NULL;
|
|
|
|
if (!dlm_config.ci_waitwarn_us)
|
|
return;
|
|
|
|
mutex_lock(&ls->ls_waiters_mutex);
|
|
|
|
list_for_each_entry(lkb, &ls->ls_waiters, lkb_wait_reply) {
|
|
if (!lkb->lkb_wait_time)
|
|
continue;
|
|
|
|
debug_scanned++;
|
|
|
|
us = ktime_to_us(ktime_sub(ktime_get(), lkb->lkb_wait_time));
|
|
|
|
if (us < dlm_config.ci_waitwarn_us)
|
|
continue;
|
|
|
|
lkb->lkb_wait_time = 0;
|
|
|
|
debug_expired++;
|
|
if (us > debug_maxus)
|
|
debug_maxus = us;
|
|
|
|
if (!num_nodes) {
|
|
num_nodes = ls->ls_num_nodes;
|
|
warned = kcalloc(num_nodes, sizeof(int), GFP_KERNEL);
|
|
}
|
|
if (!warned)
|
|
continue;
|
|
if (nodeid_warned(lkb->lkb_wait_nodeid, num_nodes, warned))
|
|
continue;
|
|
|
|
log_error(ls, "waitwarn %x %lld %d us check connection to "
|
|
"node %d", lkb->lkb_id, (long long)us,
|
|
dlm_config.ci_waitwarn_us, lkb->lkb_wait_nodeid);
|
|
}
|
|
mutex_unlock(&ls->ls_waiters_mutex);
|
|
kfree(warned);
|
|
|
|
if (debug_expired)
|
|
log_debug(ls, "scan_waiters %u warn %u over %d us max %lld us",
|
|
debug_scanned, debug_expired,
|
|
dlm_config.ci_waitwarn_us, (long long)debug_maxus);
|
|
}
|
|
|
|
/* add/remove lkb from global waiters list of lkb's waiting for
|
|
a reply from a remote node */
|
|
|
|
static int add_to_waiters(struct dlm_lkb *lkb, int mstype, int to_nodeid)
|
|
{
|
|
struct dlm_ls *ls = lkb->lkb_resource->res_ls;
|
|
int error = 0;
|
|
|
|
mutex_lock(&ls->ls_waiters_mutex);
|
|
|
|
if (is_overlap_unlock(lkb) ||
|
|
(is_overlap_cancel(lkb) && (mstype == DLM_MSG_CANCEL))) {
|
|
error = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
if (lkb->lkb_wait_type || is_overlap_cancel(lkb)) {
|
|
switch (mstype) {
|
|
case DLM_MSG_UNLOCK:
|
|
lkb->lkb_flags |= DLM_IFL_OVERLAP_UNLOCK;
|
|
break;
|
|
case DLM_MSG_CANCEL:
|
|
lkb->lkb_flags |= DLM_IFL_OVERLAP_CANCEL;
|
|
break;
|
|
default:
|
|
error = -EBUSY;
|
|
goto out;
|
|
}
|
|
lkb->lkb_wait_count++;
|
|
hold_lkb(lkb);
|
|
|
|
log_debug(ls, "addwait %x cur %d overlap %d count %d f %x",
|
|
lkb->lkb_id, lkb->lkb_wait_type, mstype,
|
|
lkb->lkb_wait_count, lkb->lkb_flags);
|
|
goto out;
|
|
}
|
|
|
|
DLM_ASSERT(!lkb->lkb_wait_count,
|
|
dlm_print_lkb(lkb);
|
|
printk("wait_count %d\n", lkb->lkb_wait_count););
|
|
|
|
lkb->lkb_wait_count++;
|
|
lkb->lkb_wait_type = mstype;
|
|
lkb->lkb_wait_time = ktime_get();
|
|
lkb->lkb_wait_nodeid = to_nodeid; /* for debugging */
|
|
hold_lkb(lkb);
|
|
list_add(&lkb->lkb_wait_reply, &ls->ls_waiters);
|
|
out:
|
|
if (error)
|
|
log_error(ls, "addwait error %x %d flags %x %d %d %s",
|
|
lkb->lkb_id, error, lkb->lkb_flags, mstype,
|
|
lkb->lkb_wait_type, lkb->lkb_resource->res_name);
|
|
mutex_unlock(&ls->ls_waiters_mutex);
|
|
return error;
|
|
}
|
|
|
|
/* We clear the RESEND flag because we might be taking an lkb off the waiters
|
|
list as part of process_requestqueue (e.g. a lookup that has an optimized
|
|
request reply on the requestqueue) between dlm_recover_waiters_pre() which
|
|
set RESEND and dlm_recover_waiters_post() */
|
|
|
|
static int _remove_from_waiters(struct dlm_lkb *lkb, int mstype,
|
|
struct dlm_message *ms)
|
|
{
|
|
struct dlm_ls *ls = lkb->lkb_resource->res_ls;
|
|
int overlap_done = 0;
|
|
|
|
if (is_overlap_unlock(lkb) && (mstype == DLM_MSG_UNLOCK_REPLY)) {
|
|
log_debug(ls, "remwait %x unlock_reply overlap", lkb->lkb_id);
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_UNLOCK;
|
|
overlap_done = 1;
|
|
goto out_del;
|
|
}
|
|
|
|
if (is_overlap_cancel(lkb) && (mstype == DLM_MSG_CANCEL_REPLY)) {
|
|
log_debug(ls, "remwait %x cancel_reply overlap", lkb->lkb_id);
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_CANCEL;
|
|
overlap_done = 1;
|
|
goto out_del;
|
|
}
|
|
|
|
/* Cancel state was preemptively cleared by a successful convert,
|
|
see next comment, nothing to do. */
|
|
|
|
if ((mstype == DLM_MSG_CANCEL_REPLY) &&
|
|
(lkb->lkb_wait_type != DLM_MSG_CANCEL)) {
|
|
log_debug(ls, "remwait %x cancel_reply wait_type %d",
|
|
lkb->lkb_id, lkb->lkb_wait_type);
|
|
return -1;
|
|
}
|
|
|
|
/* Remove for the convert reply, and premptively remove for the
|
|
cancel reply. A convert has been granted while there's still
|
|
an outstanding cancel on it (the cancel is moot and the result
|
|
in the cancel reply should be 0). We preempt the cancel reply
|
|
because the app gets the convert result and then can follow up
|
|
with another op, like convert. This subsequent op would see the
|
|
lingering state of the cancel and fail with -EBUSY. */
|
|
|
|
if ((mstype == DLM_MSG_CONVERT_REPLY) &&
|
|
(lkb->lkb_wait_type == DLM_MSG_CONVERT) &&
|
|
is_overlap_cancel(lkb) && ms && !ms->m_result) {
|
|
log_debug(ls, "remwait %x convert_reply zap overlap_cancel",
|
|
lkb->lkb_id);
|
|
lkb->lkb_wait_type = 0;
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_CANCEL;
|
|
lkb->lkb_wait_count--;
|
|
goto out_del;
|
|
}
|
|
|
|
/* N.B. type of reply may not always correspond to type of original
|
|
msg due to lookup->request optimization, verify others? */
|
|
|
|
if (lkb->lkb_wait_type) {
|
|
lkb->lkb_wait_type = 0;
|
|
goto out_del;
|
|
}
|
|
|
|
log_error(ls, "remwait error %x remote %d %x msg %d flags %x no wait",
|
|
lkb->lkb_id, ms ? ms->m_header.h_nodeid : 0, lkb->lkb_remid,
|
|
mstype, lkb->lkb_flags);
|
|
return -1;
|
|
|
|
out_del:
|
|
/* the force-unlock/cancel has completed and we haven't recvd a reply
|
|
to the op that was in progress prior to the unlock/cancel; we
|
|
give up on any reply to the earlier op. FIXME: not sure when/how
|
|
this would happen */
|
|
|
|
if (overlap_done && lkb->lkb_wait_type) {
|
|
log_error(ls, "remwait error %x reply %d wait_type %d overlap",
|
|
lkb->lkb_id, mstype, lkb->lkb_wait_type);
|
|
lkb->lkb_wait_count--;
|
|
lkb->lkb_wait_type = 0;
|
|
}
|
|
|
|
DLM_ASSERT(lkb->lkb_wait_count, dlm_print_lkb(lkb););
|
|
|
|
lkb->lkb_flags &= ~DLM_IFL_RESEND;
|
|
lkb->lkb_wait_count--;
|
|
if (!lkb->lkb_wait_count)
|
|
list_del_init(&lkb->lkb_wait_reply);
|
|
unhold_lkb(lkb);
|
|
return 0;
|
|
}
|
|
|
|
static int remove_from_waiters(struct dlm_lkb *lkb, int mstype)
|
|
{
|
|
struct dlm_ls *ls = lkb->lkb_resource->res_ls;
|
|
int error;
|
|
|
|
mutex_lock(&ls->ls_waiters_mutex);
|
|
error = _remove_from_waiters(lkb, mstype, NULL);
|
|
mutex_unlock(&ls->ls_waiters_mutex);
|
|
return error;
|
|
}
|
|
|
|
/* Handles situations where we might be processing a "fake" or "stub" reply in
|
|
which we can't try to take waiters_mutex again. */
|
|
|
|
static int remove_from_waiters_ms(struct dlm_lkb *lkb, struct dlm_message *ms)
|
|
{
|
|
struct dlm_ls *ls = lkb->lkb_resource->res_ls;
|
|
int error;
|
|
|
|
if (ms->m_flags != DLM_IFL_STUB_MS)
|
|
mutex_lock(&ls->ls_waiters_mutex);
|
|
error = _remove_from_waiters(lkb, ms->m_type, ms);
|
|
if (ms->m_flags != DLM_IFL_STUB_MS)
|
|
mutex_unlock(&ls->ls_waiters_mutex);
|
|
return error;
|
|
}
|
|
|
|
/* If there's an rsb for the same resource being removed, ensure
|
|
that the remove message is sent before the new lookup message.
|
|
It should be rare to need a delay here, but if not, then it may
|
|
be worthwhile to add a proper wait mechanism rather than a delay. */
|
|
|
|
static void wait_pending_remove(struct dlm_rsb *r)
|
|
{
|
|
struct dlm_ls *ls = r->res_ls;
|
|
restart:
|
|
spin_lock(&ls->ls_remove_spin);
|
|
if (ls->ls_remove_len &&
|
|
!rsb_cmp(r, ls->ls_remove_name, ls->ls_remove_len)) {
|
|
log_debug(ls, "delay lookup for remove dir %d %s",
|
|
r->res_dir_nodeid, r->res_name);
|
|
spin_unlock(&ls->ls_remove_spin);
|
|
msleep(1);
|
|
goto restart;
|
|
}
|
|
spin_unlock(&ls->ls_remove_spin);
|
|
}
|
|
|
|
/*
|
|
* ls_remove_spin protects ls_remove_name and ls_remove_len which are
|
|
* read by other threads in wait_pending_remove. ls_remove_names
|
|
* and ls_remove_lens are only used by the scan thread, so they do
|
|
* not need protection.
|
|
*/
|
|
|
|
static void shrink_bucket(struct dlm_ls *ls, int b)
|
|
{
|
|
struct rb_node *n, *next;
|
|
struct dlm_rsb *r;
|
|
char *name;
|
|
int our_nodeid = dlm_our_nodeid();
|
|
int remote_count = 0;
|
|
int need_shrink = 0;
|
|
int i, len, rv;
|
|
|
|
memset(&ls->ls_remove_lens, 0, sizeof(int) * DLM_REMOVE_NAMES_MAX);
|
|
|
|
spin_lock(&ls->ls_rsbtbl[b].lock);
|
|
|
|
if (!(ls->ls_rsbtbl[b].flags & DLM_RTF_SHRINK)) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
return;
|
|
}
|
|
|
|
for (n = rb_first(&ls->ls_rsbtbl[b].toss); n; n = next) {
|
|
next = rb_next(n);
|
|
r = rb_entry(n, struct dlm_rsb, res_hashnode);
|
|
|
|
/* If we're the directory record for this rsb, and
|
|
we're not the master of it, then we need to wait
|
|
for the master node to send us a dir remove for
|
|
before removing the dir record. */
|
|
|
|
if (!dlm_no_directory(ls) &&
|
|
(r->res_master_nodeid != our_nodeid) &&
|
|
(dlm_dir_nodeid(r) == our_nodeid)) {
|
|
continue;
|
|
}
|
|
|
|
need_shrink = 1;
|
|
|
|
if (!time_after_eq(jiffies, r->res_toss_time +
|
|
dlm_config.ci_toss_secs * HZ)) {
|
|
continue;
|
|
}
|
|
|
|
if (!dlm_no_directory(ls) &&
|
|
(r->res_master_nodeid == our_nodeid) &&
|
|
(dlm_dir_nodeid(r) != our_nodeid)) {
|
|
|
|
/* We're the master of this rsb but we're not
|
|
the directory record, so we need to tell the
|
|
dir node to remove the dir record. */
|
|
|
|
ls->ls_remove_lens[remote_count] = r->res_length;
|
|
memcpy(ls->ls_remove_names[remote_count], r->res_name,
|
|
DLM_RESNAME_MAXLEN);
|
|
remote_count++;
|
|
|
|
if (remote_count >= DLM_REMOVE_NAMES_MAX)
|
|
break;
|
|
continue;
|
|
}
|
|
|
|
if (!kref_put(&r->res_ref, kill_rsb)) {
|
|
log_error(ls, "tossed rsb in use %s", r->res_name);
|
|
continue;
|
|
}
|
|
|
|
rb_erase(&r->res_hashnode, &ls->ls_rsbtbl[b].toss);
|
|
dlm_free_rsb(r);
|
|
}
|
|
|
|
if (need_shrink)
|
|
ls->ls_rsbtbl[b].flags |= DLM_RTF_SHRINK;
|
|
else
|
|
ls->ls_rsbtbl[b].flags &= ~DLM_RTF_SHRINK;
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
|
|
/*
|
|
* While searching for rsb's to free, we found some that require
|
|
* remote removal. We leave them in place and find them again here
|
|
* so there is a very small gap between removing them from the toss
|
|
* list and sending the removal. Keeping this gap small is
|
|
* important to keep us (the master node) from being out of sync
|
|
* with the remote dir node for very long.
|
|
*
|
|
* From the time the rsb is removed from toss until just after
|
|
* send_remove, the rsb name is saved in ls_remove_name. A new
|
|
* lookup checks this to ensure that a new lookup message for the
|
|
* same resource name is not sent just before the remove message.
|
|
*/
|
|
|
|
for (i = 0; i < remote_count; i++) {
|
|
name = ls->ls_remove_names[i];
|
|
len = ls->ls_remove_lens[i];
|
|
|
|
spin_lock(&ls->ls_rsbtbl[b].lock);
|
|
rv = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].toss, name, len, &r);
|
|
if (rv) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
log_debug(ls, "remove_name not toss %s", name);
|
|
continue;
|
|
}
|
|
|
|
if (r->res_master_nodeid != our_nodeid) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
log_debug(ls, "remove_name master %d dir %d our %d %s",
|
|
r->res_master_nodeid, r->res_dir_nodeid,
|
|
our_nodeid, name);
|
|
continue;
|
|
}
|
|
|
|
if (r->res_dir_nodeid == our_nodeid) {
|
|
/* should never happen */
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
log_error(ls, "remove_name dir %d master %d our %d %s",
|
|
r->res_dir_nodeid, r->res_master_nodeid,
|
|
our_nodeid, name);
|
|
continue;
|
|
}
|
|
|
|
if (!time_after_eq(jiffies, r->res_toss_time +
|
|
dlm_config.ci_toss_secs * HZ)) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
log_debug(ls, "remove_name toss_time %lu now %lu %s",
|
|
r->res_toss_time, jiffies, name);
|
|
continue;
|
|
}
|
|
|
|
if (!kref_put(&r->res_ref, kill_rsb)) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
log_error(ls, "remove_name in use %s", name);
|
|
continue;
|
|
}
|
|
|
|
rb_erase(&r->res_hashnode, &ls->ls_rsbtbl[b].toss);
|
|
|
|
/* block lookup of same name until we've sent remove */
|
|
spin_lock(&ls->ls_remove_spin);
|
|
ls->ls_remove_len = len;
|
|
memcpy(ls->ls_remove_name, name, DLM_RESNAME_MAXLEN);
|
|
spin_unlock(&ls->ls_remove_spin);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
|
|
send_remove(r);
|
|
|
|
/* allow lookup of name again */
|
|
spin_lock(&ls->ls_remove_spin);
|
|
ls->ls_remove_len = 0;
|
|
memset(ls->ls_remove_name, 0, DLM_RESNAME_MAXLEN);
|
|
spin_unlock(&ls->ls_remove_spin);
|
|
|
|
dlm_free_rsb(r);
|
|
}
|
|
}
|
|
|
|
void dlm_scan_rsbs(struct dlm_ls *ls)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ls->ls_rsbtbl_size; i++) {
|
|
shrink_bucket(ls, i);
|
|
if (dlm_locking_stopped(ls))
|
|
break;
|
|
cond_resched();
|
|
}
|
|
}
|
|
|
|
static void add_timeout(struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_ls *ls = lkb->lkb_resource->res_ls;
|
|
|
|
if (is_master_copy(lkb))
|
|
return;
|
|
|
|
if (test_bit(LSFL_TIMEWARN, &ls->ls_flags) &&
|
|
!(lkb->lkb_exflags & DLM_LKF_NODLCKWT)) {
|
|
lkb->lkb_flags |= DLM_IFL_WATCH_TIMEWARN;
|
|
goto add_it;
|
|
}
|
|
if (lkb->lkb_exflags & DLM_LKF_TIMEOUT)
|
|
goto add_it;
|
|
return;
|
|
|
|
add_it:
|
|
DLM_ASSERT(list_empty(&lkb->lkb_time_list), dlm_print_lkb(lkb););
|
|
mutex_lock(&ls->ls_timeout_mutex);
|
|
hold_lkb(lkb);
|
|
list_add_tail(&lkb->lkb_time_list, &ls->ls_timeout);
|
|
mutex_unlock(&ls->ls_timeout_mutex);
|
|
}
|
|
|
|
static void del_timeout(struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_ls *ls = lkb->lkb_resource->res_ls;
|
|
|
|
mutex_lock(&ls->ls_timeout_mutex);
|
|
if (!list_empty(&lkb->lkb_time_list)) {
|
|
list_del_init(&lkb->lkb_time_list);
|
|
unhold_lkb(lkb);
|
|
}
|
|
mutex_unlock(&ls->ls_timeout_mutex);
|
|
}
|
|
|
|
/* FIXME: is it safe to look at lkb_exflags, lkb_flags, lkb_timestamp, and
|
|
lkb_lksb_timeout without lock_rsb? Note: we can't lock timeout_mutex
|
|
and then lock rsb because of lock ordering in add_timeout. We may need
|
|
to specify some special timeout-related bits in the lkb that are just to
|
|
be accessed under the timeout_mutex. */
|
|
|
|
void dlm_scan_timeout(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_rsb *r;
|
|
struct dlm_lkb *lkb;
|
|
int do_cancel, do_warn;
|
|
s64 wait_us;
|
|
|
|
for (;;) {
|
|
if (dlm_locking_stopped(ls))
|
|
break;
|
|
|
|
do_cancel = 0;
|
|
do_warn = 0;
|
|
mutex_lock(&ls->ls_timeout_mutex);
|
|
list_for_each_entry(lkb, &ls->ls_timeout, lkb_time_list) {
|
|
|
|
wait_us = ktime_to_us(ktime_sub(ktime_get(),
|
|
lkb->lkb_timestamp));
|
|
|
|
if ((lkb->lkb_exflags & DLM_LKF_TIMEOUT) &&
|
|
wait_us >= (lkb->lkb_timeout_cs * 10000))
|
|
do_cancel = 1;
|
|
|
|
if ((lkb->lkb_flags & DLM_IFL_WATCH_TIMEWARN) &&
|
|
wait_us >= dlm_config.ci_timewarn_cs * 10000)
|
|
do_warn = 1;
|
|
|
|
if (!do_cancel && !do_warn)
|
|
continue;
|
|
hold_lkb(lkb);
|
|
break;
|
|
}
|
|
mutex_unlock(&ls->ls_timeout_mutex);
|
|
|
|
if (!do_cancel && !do_warn)
|
|
break;
|
|
|
|
r = lkb->lkb_resource;
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
if (do_warn) {
|
|
/* clear flag so we only warn once */
|
|
lkb->lkb_flags &= ~DLM_IFL_WATCH_TIMEWARN;
|
|
if (!(lkb->lkb_exflags & DLM_LKF_TIMEOUT))
|
|
del_timeout(lkb);
|
|
dlm_timeout_warn(lkb);
|
|
}
|
|
|
|
if (do_cancel) {
|
|
log_debug(ls, "timeout cancel %x node %d %s",
|
|
lkb->lkb_id, lkb->lkb_nodeid, r->res_name);
|
|
lkb->lkb_flags &= ~DLM_IFL_WATCH_TIMEWARN;
|
|
lkb->lkb_flags |= DLM_IFL_TIMEOUT_CANCEL;
|
|
del_timeout(lkb);
|
|
_cancel_lock(r, lkb);
|
|
}
|
|
|
|
unlock_rsb(r);
|
|
unhold_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
}
|
|
|
|
/* This is only called by dlm_recoverd, and we rely on dlm_ls_stop() stopping
|
|
dlm_recoverd before checking/setting ls_recover_begin. */
|
|
|
|
void dlm_adjust_timeouts(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
u64 adj_us = jiffies_to_usecs(jiffies - ls->ls_recover_begin);
|
|
|
|
ls->ls_recover_begin = 0;
|
|
mutex_lock(&ls->ls_timeout_mutex);
|
|
list_for_each_entry(lkb, &ls->ls_timeout, lkb_time_list)
|
|
lkb->lkb_timestamp = ktime_add_us(lkb->lkb_timestamp, adj_us);
|
|
mutex_unlock(&ls->ls_timeout_mutex);
|
|
|
|
if (!dlm_config.ci_waitwarn_us)
|
|
return;
|
|
|
|
mutex_lock(&ls->ls_waiters_mutex);
|
|
list_for_each_entry(lkb, &ls->ls_waiters, lkb_wait_reply) {
|
|
if (ktime_to_us(lkb->lkb_wait_time))
|
|
lkb->lkb_wait_time = ktime_get();
|
|
}
|
|
mutex_unlock(&ls->ls_waiters_mutex);
|
|
}
|
|
|
|
/* lkb is master or local copy */
|
|
|
|
static void set_lvb_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int b, len = r->res_ls->ls_lvblen;
|
|
|
|
/* b=1 lvb returned to caller
|
|
b=0 lvb written to rsb or invalidated
|
|
b=-1 do nothing */
|
|
|
|
b = dlm_lvb_operations[lkb->lkb_grmode + 1][lkb->lkb_rqmode + 1];
|
|
|
|
if (b == 1) {
|
|
if (!lkb->lkb_lvbptr)
|
|
return;
|
|
|
|
if (!(lkb->lkb_exflags & DLM_LKF_VALBLK))
|
|
return;
|
|
|
|
if (!r->res_lvbptr)
|
|
return;
|
|
|
|
memcpy(lkb->lkb_lvbptr, r->res_lvbptr, len);
|
|
lkb->lkb_lvbseq = r->res_lvbseq;
|
|
|
|
} else if (b == 0) {
|
|
if (lkb->lkb_exflags & DLM_LKF_IVVALBLK) {
|
|
rsb_set_flag(r, RSB_VALNOTVALID);
|
|
return;
|
|
}
|
|
|
|
if (!lkb->lkb_lvbptr)
|
|
return;
|
|
|
|
if (!(lkb->lkb_exflags & DLM_LKF_VALBLK))
|
|
return;
|
|
|
|
if (!r->res_lvbptr)
|
|
r->res_lvbptr = dlm_allocate_lvb(r->res_ls);
|
|
|
|
if (!r->res_lvbptr)
|
|
return;
|
|
|
|
memcpy(r->res_lvbptr, lkb->lkb_lvbptr, len);
|
|
r->res_lvbseq++;
|
|
lkb->lkb_lvbseq = r->res_lvbseq;
|
|
rsb_clear_flag(r, RSB_VALNOTVALID);
|
|
}
|
|
|
|
if (rsb_flag(r, RSB_VALNOTVALID))
|
|
lkb->lkb_sbflags |= DLM_SBF_VALNOTVALID;
|
|
}
|
|
|
|
static void set_lvb_unlock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
if (lkb->lkb_grmode < DLM_LOCK_PW)
|
|
return;
|
|
|
|
if (lkb->lkb_exflags & DLM_LKF_IVVALBLK) {
|
|
rsb_set_flag(r, RSB_VALNOTVALID);
|
|
return;
|
|
}
|
|
|
|
if (!lkb->lkb_lvbptr)
|
|
return;
|
|
|
|
if (!(lkb->lkb_exflags & DLM_LKF_VALBLK))
|
|
return;
|
|
|
|
if (!r->res_lvbptr)
|
|
r->res_lvbptr = dlm_allocate_lvb(r->res_ls);
|
|
|
|
if (!r->res_lvbptr)
|
|
return;
|
|
|
|
memcpy(r->res_lvbptr, lkb->lkb_lvbptr, r->res_ls->ls_lvblen);
|
|
r->res_lvbseq++;
|
|
rsb_clear_flag(r, RSB_VALNOTVALID);
|
|
}
|
|
|
|
/* lkb is process copy (pc) */
|
|
|
|
static void set_lvb_lock_pc(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms)
|
|
{
|
|
int b;
|
|
|
|
if (!lkb->lkb_lvbptr)
|
|
return;
|
|
|
|
if (!(lkb->lkb_exflags & DLM_LKF_VALBLK))
|
|
return;
|
|
|
|
b = dlm_lvb_operations[lkb->lkb_grmode + 1][lkb->lkb_rqmode + 1];
|
|
if (b == 1) {
|
|
int len = receive_extralen(ms);
|
|
if (len > r->res_ls->ls_lvblen)
|
|
len = r->res_ls->ls_lvblen;
|
|
memcpy(lkb->lkb_lvbptr, ms->m_extra, len);
|
|
lkb->lkb_lvbseq = ms->m_lvbseq;
|
|
}
|
|
}
|
|
|
|
/* Manipulate lkb's on rsb's convert/granted/waiting queues
|
|
remove_lock -- used for unlock, removes lkb from granted
|
|
revert_lock -- used for cancel, moves lkb from convert to granted
|
|
grant_lock -- used for request and convert, adds lkb to granted or
|
|
moves lkb from convert or waiting to granted
|
|
|
|
Each of these is used for master or local copy lkb's. There is
|
|
also a _pc() variation used to make the corresponding change on
|
|
a process copy (pc) lkb. */
|
|
|
|
static void _remove_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
del_lkb(r, lkb);
|
|
lkb->lkb_grmode = DLM_LOCK_IV;
|
|
/* this unhold undoes the original ref from create_lkb()
|
|
so this leads to the lkb being freed */
|
|
unhold_lkb(lkb);
|
|
}
|
|
|
|
static void remove_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
set_lvb_unlock(r, lkb);
|
|
_remove_lock(r, lkb);
|
|
}
|
|
|
|
static void remove_lock_pc(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
_remove_lock(r, lkb);
|
|
}
|
|
|
|
/* returns: 0 did nothing
|
|
1 moved lock to granted
|
|
-1 removed lock */
|
|
|
|
static int revert_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int rv = 0;
|
|
|
|
lkb->lkb_rqmode = DLM_LOCK_IV;
|
|
|
|
switch (lkb->lkb_status) {
|
|
case DLM_LKSTS_GRANTED:
|
|
break;
|
|
case DLM_LKSTS_CONVERT:
|
|
move_lkb(r, lkb, DLM_LKSTS_GRANTED);
|
|
rv = 1;
|
|
break;
|
|
case DLM_LKSTS_WAITING:
|
|
del_lkb(r, lkb);
|
|
lkb->lkb_grmode = DLM_LOCK_IV;
|
|
/* this unhold undoes the original ref from create_lkb()
|
|
so this leads to the lkb being freed */
|
|
unhold_lkb(lkb);
|
|
rv = -1;
|
|
break;
|
|
default:
|
|
log_print("invalid status for revert %d", lkb->lkb_status);
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
static int revert_lock_pc(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
return revert_lock(r, lkb);
|
|
}
|
|
|
|
static void _grant_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
if (lkb->lkb_grmode != lkb->lkb_rqmode) {
|
|
lkb->lkb_grmode = lkb->lkb_rqmode;
|
|
if (lkb->lkb_status)
|
|
move_lkb(r, lkb, DLM_LKSTS_GRANTED);
|
|
else
|
|
add_lkb(r, lkb, DLM_LKSTS_GRANTED);
|
|
}
|
|
|
|
lkb->lkb_rqmode = DLM_LOCK_IV;
|
|
lkb->lkb_highbast = 0;
|
|
}
|
|
|
|
static void grant_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
set_lvb_lock(r, lkb);
|
|
_grant_lock(r, lkb);
|
|
}
|
|
|
|
static void grant_lock_pc(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms)
|
|
{
|
|
set_lvb_lock_pc(r, lkb, ms);
|
|
_grant_lock(r, lkb);
|
|
}
|
|
|
|
/* called by grant_pending_locks() which means an async grant message must
|
|
be sent to the requesting node in addition to granting the lock if the
|
|
lkb belongs to a remote node. */
|
|
|
|
static void grant_lock_pending(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
grant_lock(r, lkb);
|
|
if (is_master_copy(lkb))
|
|
send_grant(r, lkb);
|
|
else
|
|
queue_cast(r, lkb, 0);
|
|
}
|
|
|
|
/* The special CONVDEADLK, ALTPR and ALTCW flags allow the master to
|
|
change the granted/requested modes. We're munging things accordingly in
|
|
the process copy.
|
|
CONVDEADLK: our grmode may have been forced down to NL to resolve a
|
|
conversion deadlock
|
|
ALTPR/ALTCW: our rqmode may have been changed to PR or CW to become
|
|
compatible with other granted locks */
|
|
|
|
static void munge_demoted(struct dlm_lkb *lkb)
|
|
{
|
|
if (lkb->lkb_rqmode == DLM_LOCK_IV || lkb->lkb_grmode == DLM_LOCK_IV) {
|
|
log_print("munge_demoted %x invalid modes gr %d rq %d",
|
|
lkb->lkb_id, lkb->lkb_grmode, lkb->lkb_rqmode);
|
|
return;
|
|
}
|
|
|
|
lkb->lkb_grmode = DLM_LOCK_NL;
|
|
}
|
|
|
|
static void munge_altmode(struct dlm_lkb *lkb, struct dlm_message *ms)
|
|
{
|
|
if (ms->m_type != DLM_MSG_REQUEST_REPLY &&
|
|
ms->m_type != DLM_MSG_GRANT) {
|
|
log_print("munge_altmode %x invalid reply type %d",
|
|
lkb->lkb_id, ms->m_type);
|
|
return;
|
|
}
|
|
|
|
if (lkb->lkb_exflags & DLM_LKF_ALTPR)
|
|
lkb->lkb_rqmode = DLM_LOCK_PR;
|
|
else if (lkb->lkb_exflags & DLM_LKF_ALTCW)
|
|
lkb->lkb_rqmode = DLM_LOCK_CW;
|
|
else {
|
|
log_print("munge_altmode invalid exflags %x", lkb->lkb_exflags);
|
|
dlm_print_lkb(lkb);
|
|
}
|
|
}
|
|
|
|
static inline int first_in_list(struct dlm_lkb *lkb, struct list_head *head)
|
|
{
|
|
struct dlm_lkb *first = list_entry(head->next, struct dlm_lkb,
|
|
lkb_statequeue);
|
|
if (lkb->lkb_id == first->lkb_id)
|
|
return 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Check if the given lkb conflicts with another lkb on the queue. */
|
|
|
|
static int queue_conflict(struct list_head *head, struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_lkb *this;
|
|
|
|
list_for_each_entry(this, head, lkb_statequeue) {
|
|
if (this == lkb)
|
|
continue;
|
|
if (!modes_compat(this, lkb))
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* "A conversion deadlock arises with a pair of lock requests in the converting
|
|
* queue for one resource. The granted mode of each lock blocks the requested
|
|
* mode of the other lock."
|
|
*
|
|
* Part 2: if the granted mode of lkb is preventing an earlier lkb in the
|
|
* convert queue from being granted, then deadlk/demote lkb.
|
|
*
|
|
* Example:
|
|
* Granted Queue: empty
|
|
* Convert Queue: NL->EX (first lock)
|
|
* PR->EX (second lock)
|
|
*
|
|
* The first lock can't be granted because of the granted mode of the second
|
|
* lock and the second lock can't be granted because it's not first in the
|
|
* list. We either cancel lkb's conversion (PR->EX) and return EDEADLK, or we
|
|
* demote the granted mode of lkb (from PR to NL) if it has the CONVDEADLK
|
|
* flag set and return DEMOTED in the lksb flags.
|
|
*
|
|
* Originally, this function detected conv-deadlk in a more limited scope:
|
|
* - if !modes_compat(lkb1, lkb2) && !modes_compat(lkb2, lkb1), or
|
|
* - if lkb1 was the first entry in the queue (not just earlier), and was
|
|
* blocked by the granted mode of lkb2, and there was nothing on the
|
|
* granted queue preventing lkb1 from being granted immediately, i.e.
|
|
* lkb2 was the only thing preventing lkb1 from being granted.
|
|
*
|
|
* That second condition meant we'd only say there was conv-deadlk if
|
|
* resolving it (by demotion) would lead to the first lock on the convert
|
|
* queue being granted right away. It allowed conversion deadlocks to exist
|
|
* between locks on the convert queue while they couldn't be granted anyway.
|
|
*
|
|
* Now, we detect and take action on conversion deadlocks immediately when
|
|
* they're created, even if they may not be immediately consequential. If
|
|
* lkb1 exists anywhere in the convert queue and lkb2 comes in with a granted
|
|
* mode that would prevent lkb1's conversion from being granted, we do a
|
|
* deadlk/demote on lkb2 right away and don't let it onto the convert queue.
|
|
* I think this means that the lkb_is_ahead condition below should always
|
|
* be zero, i.e. there will never be conv-deadlk between two locks that are
|
|
* both already on the convert queue.
|
|
*/
|
|
|
|
static int conversion_deadlock_detect(struct dlm_rsb *r, struct dlm_lkb *lkb2)
|
|
{
|
|
struct dlm_lkb *lkb1;
|
|
int lkb_is_ahead = 0;
|
|
|
|
list_for_each_entry(lkb1, &r->res_convertqueue, lkb_statequeue) {
|
|
if (lkb1 == lkb2) {
|
|
lkb_is_ahead = 1;
|
|
continue;
|
|
}
|
|
|
|
if (!lkb_is_ahead) {
|
|
if (!modes_compat(lkb2, lkb1))
|
|
return 1;
|
|
} else {
|
|
if (!modes_compat(lkb2, lkb1) &&
|
|
!modes_compat(lkb1, lkb2))
|
|
return 1;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Return 1 if the lock can be granted, 0 otherwise.
|
|
* Also detect and resolve conversion deadlocks.
|
|
*
|
|
* lkb is the lock to be granted
|
|
*
|
|
* now is 1 if the function is being called in the context of the
|
|
* immediate request, it is 0 if called later, after the lock has been
|
|
* queued.
|
|
*
|
|
* recover is 1 if dlm_recover_grant() is trying to grant conversions
|
|
* after recovery.
|
|
*
|
|
* References are from chapter 6 of "VAXcluster Principles" by Roy Davis
|
|
*/
|
|
|
|
static int _can_be_granted(struct dlm_rsb *r, struct dlm_lkb *lkb, int now,
|
|
int recover)
|
|
{
|
|
int8_t conv = (lkb->lkb_grmode != DLM_LOCK_IV);
|
|
|
|
/*
|
|
* 6-10: Version 5.4 introduced an option to address the phenomenon of
|
|
* a new request for a NL mode lock being blocked.
|
|
*
|
|
* 6-11: If the optional EXPEDITE flag is used with the new NL mode
|
|
* request, then it would be granted. In essence, the use of this flag
|
|
* tells the Lock Manager to expedite theis request by not considering
|
|
* what may be in the CONVERTING or WAITING queues... As of this
|
|
* writing, the EXPEDITE flag can be used only with new requests for NL
|
|
* mode locks. This flag is not valid for conversion requests.
|
|
*
|
|
* A shortcut. Earlier checks return an error if EXPEDITE is used in a
|
|
* conversion or used with a non-NL requested mode. We also know an
|
|
* EXPEDITE request is always granted immediately, so now must always
|
|
* be 1. The full condition to grant an expedite request: (now &&
|
|
* !conv && lkb->rqmode == DLM_LOCK_NL && (flags & EXPEDITE)) can
|
|
* therefore be shortened to just checking the flag.
|
|
*/
|
|
|
|
if (lkb->lkb_exflags & DLM_LKF_EXPEDITE)
|
|
return 1;
|
|
|
|
/*
|
|
* A shortcut. Without this, !queue_conflict(grantqueue, lkb) would be
|
|
* added to the remaining conditions.
|
|
*/
|
|
|
|
if (queue_conflict(&r->res_grantqueue, lkb))
|
|
return 0;
|
|
|
|
/*
|
|
* 6-3: By default, a conversion request is immediately granted if the
|
|
* requested mode is compatible with the modes of all other granted
|
|
* locks
|
|
*/
|
|
|
|
if (queue_conflict(&r->res_convertqueue, lkb))
|
|
return 0;
|
|
|
|
/*
|
|
* The RECOVER_GRANT flag means dlm_recover_grant() is granting
|
|
* locks for a recovered rsb, on which lkb's have been rebuilt.
|
|
* The lkb's may have been rebuilt on the queues in a different
|
|
* order than they were in on the previous master. So, granting
|
|
* queued conversions in order after recovery doesn't make sense
|
|
* since the order hasn't been preserved anyway. The new order
|
|
* could also have created a new "in place" conversion deadlock.
|
|
* (e.g. old, failed master held granted EX, with PR->EX, NL->EX.
|
|
* After recovery, there would be no granted locks, and possibly
|
|
* NL->EX, PR->EX, an in-place conversion deadlock.) So, after
|
|
* recovery, grant conversions without considering order.
|
|
*/
|
|
|
|
if (conv && recover)
|
|
return 1;
|
|
|
|
/*
|
|
* 6-5: But the default algorithm for deciding whether to grant or
|
|
* queue conversion requests does not by itself guarantee that such
|
|
* requests are serviced on a "first come first serve" basis. This, in
|
|
* turn, can lead to a phenomenon known as "indefinate postponement".
|
|
*
|
|
* 6-7: This issue is dealt with by using the optional QUECVT flag with
|
|
* the system service employed to request a lock conversion. This flag
|
|
* forces certain conversion requests to be queued, even if they are
|
|
* compatible with the granted modes of other locks on the same
|
|
* resource. Thus, the use of this flag results in conversion requests
|
|
* being ordered on a "first come first servce" basis.
|
|
*
|
|
* DCT: This condition is all about new conversions being able to occur
|
|
* "in place" while the lock remains on the granted queue (assuming
|
|
* nothing else conflicts.) IOW if QUECVT isn't set, a conversion
|
|
* doesn't _have_ to go onto the convert queue where it's processed in
|
|
* order. The "now" variable is necessary to distinguish converts
|
|
* being received and processed for the first time now, because once a
|
|
* convert is moved to the conversion queue the condition below applies
|
|
* requiring fifo granting.
|
|
*/
|
|
|
|
if (now && conv && !(lkb->lkb_exflags & DLM_LKF_QUECVT))
|
|
return 1;
|
|
|
|
/*
|
|
* Even if the convert is compat with all granted locks,
|
|
* QUECVT forces it behind other locks on the convert queue.
|
|
*/
|
|
|
|
if (now && conv && (lkb->lkb_exflags & DLM_LKF_QUECVT)) {
|
|
if (list_empty(&r->res_convertqueue))
|
|
return 1;
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* The NOORDER flag is set to avoid the standard vms rules on grant
|
|
* order.
|
|
*/
|
|
|
|
if (lkb->lkb_exflags & DLM_LKF_NOORDER)
|
|
return 1;
|
|
|
|
/*
|
|
* 6-3: Once in that queue [CONVERTING], a conversion request cannot be
|
|
* granted until all other conversion requests ahead of it are granted
|
|
* and/or canceled.
|
|
*/
|
|
|
|
if (!now && conv && first_in_list(lkb, &r->res_convertqueue))
|
|
return 1;
|
|
|
|
/*
|
|
* 6-4: By default, a new request is immediately granted only if all
|
|
* three of the following conditions are satisfied when the request is
|
|
* issued:
|
|
* - The queue of ungranted conversion requests for the resource is
|
|
* empty.
|
|
* - The queue of ungranted new requests for the resource is empty.
|
|
* - The mode of the new request is compatible with the most
|
|
* restrictive mode of all granted locks on the resource.
|
|
*/
|
|
|
|
if (now && !conv && list_empty(&r->res_convertqueue) &&
|
|
list_empty(&r->res_waitqueue))
|
|
return 1;
|
|
|
|
/*
|
|
* 6-4: Once a lock request is in the queue of ungranted new requests,
|
|
* it cannot be granted until the queue of ungranted conversion
|
|
* requests is empty, all ungranted new requests ahead of it are
|
|
* granted and/or canceled, and it is compatible with the granted mode
|
|
* of the most restrictive lock granted on the resource.
|
|
*/
|
|
|
|
if (!now && !conv && list_empty(&r->res_convertqueue) &&
|
|
first_in_list(lkb, &r->res_waitqueue))
|
|
return 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int can_be_granted(struct dlm_rsb *r, struct dlm_lkb *lkb, int now,
|
|
int recover, int *err)
|
|
{
|
|
int rv;
|
|
int8_t alt = 0, rqmode = lkb->lkb_rqmode;
|
|
int8_t is_convert = (lkb->lkb_grmode != DLM_LOCK_IV);
|
|
|
|
if (err)
|
|
*err = 0;
|
|
|
|
rv = _can_be_granted(r, lkb, now, recover);
|
|
if (rv)
|
|
goto out;
|
|
|
|
/*
|
|
* The CONVDEADLK flag is non-standard and tells the dlm to resolve
|
|
* conversion deadlocks by demoting grmode to NL, otherwise the dlm
|
|
* cancels one of the locks.
|
|
*/
|
|
|
|
if (is_convert && can_be_queued(lkb) &&
|
|
conversion_deadlock_detect(r, lkb)) {
|
|
if (lkb->lkb_exflags & DLM_LKF_CONVDEADLK) {
|
|
lkb->lkb_grmode = DLM_LOCK_NL;
|
|
lkb->lkb_sbflags |= DLM_SBF_DEMOTED;
|
|
} else if (err) {
|
|
*err = -EDEADLK;
|
|
} else {
|
|
log_print("can_be_granted deadlock %x now %d",
|
|
lkb->lkb_id, now);
|
|
dlm_dump_rsb(r);
|
|
}
|
|
goto out;
|
|
}
|
|
|
|
/*
|
|
* The ALTPR and ALTCW flags are non-standard and tell the dlm to try
|
|
* to grant a request in a mode other than the normal rqmode. It's a
|
|
* simple way to provide a big optimization to applications that can
|
|
* use them.
|
|
*/
|
|
|
|
if (rqmode != DLM_LOCK_PR && (lkb->lkb_exflags & DLM_LKF_ALTPR))
|
|
alt = DLM_LOCK_PR;
|
|
else if (rqmode != DLM_LOCK_CW && (lkb->lkb_exflags & DLM_LKF_ALTCW))
|
|
alt = DLM_LOCK_CW;
|
|
|
|
if (alt) {
|
|
lkb->lkb_rqmode = alt;
|
|
rv = _can_be_granted(r, lkb, now, 0);
|
|
if (rv)
|
|
lkb->lkb_sbflags |= DLM_SBF_ALTMODE;
|
|
else
|
|
lkb->lkb_rqmode = rqmode;
|
|
}
|
|
out:
|
|
return rv;
|
|
}
|
|
|
|
/* Returns the highest requested mode of all blocked conversions; sets
|
|
cw if there's a blocked conversion to DLM_LOCK_CW. */
|
|
|
|
static int grant_pending_convert(struct dlm_rsb *r, int high, int *cw,
|
|
unsigned int *count)
|
|
{
|
|
struct dlm_lkb *lkb, *s;
|
|
int recover = rsb_flag(r, RSB_RECOVER_GRANT);
|
|
int hi, demoted, quit, grant_restart, demote_restart;
|
|
int deadlk;
|
|
|
|
quit = 0;
|
|
restart:
|
|
grant_restart = 0;
|
|
demote_restart = 0;
|
|
hi = DLM_LOCK_IV;
|
|
|
|
list_for_each_entry_safe(lkb, s, &r->res_convertqueue, lkb_statequeue) {
|
|
demoted = is_demoted(lkb);
|
|
deadlk = 0;
|
|
|
|
if (can_be_granted(r, lkb, 0, recover, &deadlk)) {
|
|
grant_lock_pending(r, lkb);
|
|
grant_restart = 1;
|
|
if (count)
|
|
(*count)++;
|
|
continue;
|
|
}
|
|
|
|
if (!demoted && is_demoted(lkb)) {
|
|
log_print("WARN: pending demoted %x node %d %s",
|
|
lkb->lkb_id, lkb->lkb_nodeid, r->res_name);
|
|
demote_restart = 1;
|
|
continue;
|
|
}
|
|
|
|
if (deadlk) {
|
|
/*
|
|
* If DLM_LKB_NODLKWT flag is set and conversion
|
|
* deadlock is detected, we request blocking AST and
|
|
* down (or cancel) conversion.
|
|
*/
|
|
if (lkb->lkb_exflags & DLM_LKF_NODLCKWT) {
|
|
if (lkb->lkb_highbast < lkb->lkb_rqmode) {
|
|
queue_bast(r, lkb, lkb->lkb_rqmode);
|
|
lkb->lkb_highbast = lkb->lkb_rqmode;
|
|
}
|
|
} else {
|
|
log_print("WARN: pending deadlock %x node %d %s",
|
|
lkb->lkb_id, lkb->lkb_nodeid,
|
|
r->res_name);
|
|
dlm_dump_rsb(r);
|
|
}
|
|
continue;
|
|
}
|
|
|
|
hi = max_t(int, lkb->lkb_rqmode, hi);
|
|
|
|
if (cw && lkb->lkb_rqmode == DLM_LOCK_CW)
|
|
*cw = 1;
|
|
}
|
|
|
|
if (grant_restart)
|
|
goto restart;
|
|
if (demote_restart && !quit) {
|
|
quit = 1;
|
|
goto restart;
|
|
}
|
|
|
|
return max_t(int, high, hi);
|
|
}
|
|
|
|
static int grant_pending_wait(struct dlm_rsb *r, int high, int *cw,
|
|
unsigned int *count)
|
|
{
|
|
struct dlm_lkb *lkb, *s;
|
|
|
|
list_for_each_entry_safe(lkb, s, &r->res_waitqueue, lkb_statequeue) {
|
|
if (can_be_granted(r, lkb, 0, 0, NULL)) {
|
|
grant_lock_pending(r, lkb);
|
|
if (count)
|
|
(*count)++;
|
|
} else {
|
|
high = max_t(int, lkb->lkb_rqmode, high);
|
|
if (lkb->lkb_rqmode == DLM_LOCK_CW)
|
|
*cw = 1;
|
|
}
|
|
}
|
|
|
|
return high;
|
|
}
|
|
|
|
/* cw of 1 means there's a lock with a rqmode of DLM_LOCK_CW that's blocked
|
|
on either the convert or waiting queue.
|
|
high is the largest rqmode of all locks blocked on the convert or
|
|
waiting queue. */
|
|
|
|
static int lock_requires_bast(struct dlm_lkb *gr, int high, int cw)
|
|
{
|
|
if (gr->lkb_grmode == DLM_LOCK_PR && cw) {
|
|
if (gr->lkb_highbast < DLM_LOCK_EX)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
if (gr->lkb_highbast < high &&
|
|
!__dlm_compat_matrix[gr->lkb_grmode+1][high+1])
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static void grant_pending_locks(struct dlm_rsb *r, unsigned int *count)
|
|
{
|
|
struct dlm_lkb *lkb, *s;
|
|
int high = DLM_LOCK_IV;
|
|
int cw = 0;
|
|
|
|
if (!is_master(r)) {
|
|
log_print("grant_pending_locks r nodeid %d", r->res_nodeid);
|
|
dlm_dump_rsb(r);
|
|
return;
|
|
}
|
|
|
|
high = grant_pending_convert(r, high, &cw, count);
|
|
high = grant_pending_wait(r, high, &cw, count);
|
|
|
|
if (high == DLM_LOCK_IV)
|
|
return;
|
|
|
|
/*
|
|
* If there are locks left on the wait/convert queue then send blocking
|
|
* ASTs to granted locks based on the largest requested mode (high)
|
|
* found above.
|
|
*/
|
|
|
|
list_for_each_entry_safe(lkb, s, &r->res_grantqueue, lkb_statequeue) {
|
|
if (lkb->lkb_bastfn && lock_requires_bast(lkb, high, cw)) {
|
|
if (cw && high == DLM_LOCK_PR &&
|
|
lkb->lkb_grmode == DLM_LOCK_PR)
|
|
queue_bast(r, lkb, DLM_LOCK_CW);
|
|
else
|
|
queue_bast(r, lkb, high);
|
|
lkb->lkb_highbast = high;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int modes_require_bast(struct dlm_lkb *gr, struct dlm_lkb *rq)
|
|
{
|
|
if ((gr->lkb_grmode == DLM_LOCK_PR && rq->lkb_rqmode == DLM_LOCK_CW) ||
|
|
(gr->lkb_grmode == DLM_LOCK_CW && rq->lkb_rqmode == DLM_LOCK_PR)) {
|
|
if (gr->lkb_highbast < DLM_LOCK_EX)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
if (gr->lkb_highbast < rq->lkb_rqmode && !modes_compat(gr, rq))
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
static void send_bast_queue(struct dlm_rsb *r, struct list_head *head,
|
|
struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_lkb *gr;
|
|
|
|
list_for_each_entry(gr, head, lkb_statequeue) {
|
|
/* skip self when sending basts to convertqueue */
|
|
if (gr == lkb)
|
|
continue;
|
|
if (gr->lkb_bastfn && modes_require_bast(gr, lkb)) {
|
|
queue_bast(r, gr, lkb->lkb_rqmode);
|
|
gr->lkb_highbast = lkb->lkb_rqmode;
|
|
}
|
|
}
|
|
}
|
|
|
|
static void send_blocking_asts(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
send_bast_queue(r, &r->res_grantqueue, lkb);
|
|
}
|
|
|
|
static void send_blocking_asts_all(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
send_bast_queue(r, &r->res_grantqueue, lkb);
|
|
send_bast_queue(r, &r->res_convertqueue, lkb);
|
|
}
|
|
|
|
/* set_master(r, lkb) -- set the master nodeid of a resource
|
|
|
|
The purpose of this function is to set the nodeid field in the given
|
|
lkb using the nodeid field in the given rsb. If the rsb's nodeid is
|
|
known, it can just be copied to the lkb and the function will return
|
|
0. If the rsb's nodeid is _not_ known, it needs to be looked up
|
|
before it can be copied to the lkb.
|
|
|
|
When the rsb nodeid is being looked up remotely, the initial lkb
|
|
causing the lookup is kept on the ls_waiters list waiting for the
|
|
lookup reply. Other lkb's waiting for the same rsb lookup are kept
|
|
on the rsb's res_lookup list until the master is verified.
|
|
|
|
Return values:
|
|
0: nodeid is set in rsb/lkb and the caller should go ahead and use it
|
|
1: the rsb master is not available and the lkb has been placed on
|
|
a wait queue
|
|
*/
|
|
|
|
static int set_master(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int our_nodeid = dlm_our_nodeid();
|
|
|
|
if (rsb_flag(r, RSB_MASTER_UNCERTAIN)) {
|
|
rsb_clear_flag(r, RSB_MASTER_UNCERTAIN);
|
|
r->res_first_lkid = lkb->lkb_id;
|
|
lkb->lkb_nodeid = r->res_nodeid;
|
|
return 0;
|
|
}
|
|
|
|
if (r->res_first_lkid && r->res_first_lkid != lkb->lkb_id) {
|
|
list_add_tail(&lkb->lkb_rsb_lookup, &r->res_lookup);
|
|
return 1;
|
|
}
|
|
|
|
if (r->res_master_nodeid == our_nodeid) {
|
|
lkb->lkb_nodeid = 0;
|
|
return 0;
|
|
}
|
|
|
|
if (r->res_master_nodeid) {
|
|
lkb->lkb_nodeid = r->res_master_nodeid;
|
|
return 0;
|
|
}
|
|
|
|
if (dlm_dir_nodeid(r) == our_nodeid) {
|
|
/* This is a somewhat unusual case; find_rsb will usually
|
|
have set res_master_nodeid when dir nodeid is local, but
|
|
there are cases where we become the dir node after we've
|
|
past find_rsb and go through _request_lock again.
|
|
confirm_master() or process_lookup_list() needs to be
|
|
called after this. */
|
|
log_debug(r->res_ls, "set_master %x self master %d dir %d %s",
|
|
lkb->lkb_id, r->res_master_nodeid, r->res_dir_nodeid,
|
|
r->res_name);
|
|
r->res_master_nodeid = our_nodeid;
|
|
r->res_nodeid = 0;
|
|
lkb->lkb_nodeid = 0;
|
|
return 0;
|
|
}
|
|
|
|
wait_pending_remove(r);
|
|
|
|
r->res_first_lkid = lkb->lkb_id;
|
|
send_lookup(r, lkb);
|
|
return 1;
|
|
}
|
|
|
|
static void process_lookup_list(struct dlm_rsb *r)
|
|
{
|
|
struct dlm_lkb *lkb, *safe;
|
|
|
|
list_for_each_entry_safe(lkb, safe, &r->res_lookup, lkb_rsb_lookup) {
|
|
list_del_init(&lkb->lkb_rsb_lookup);
|
|
_request_lock(r, lkb);
|
|
schedule();
|
|
}
|
|
}
|
|
|
|
/* confirm_master -- confirm (or deny) an rsb's master nodeid */
|
|
|
|
static void confirm_master(struct dlm_rsb *r, int error)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
|
|
if (!r->res_first_lkid)
|
|
return;
|
|
|
|
switch (error) {
|
|
case 0:
|
|
case -EINPROGRESS:
|
|
r->res_first_lkid = 0;
|
|
process_lookup_list(r);
|
|
break;
|
|
|
|
case -EAGAIN:
|
|
case -EBADR:
|
|
case -ENOTBLK:
|
|
/* the remote request failed and won't be retried (it was
|
|
a NOQUEUE, or has been canceled/unlocked); make a waiting
|
|
lkb the first_lkid */
|
|
|
|
r->res_first_lkid = 0;
|
|
|
|
if (!list_empty(&r->res_lookup)) {
|
|
lkb = list_entry(r->res_lookup.next, struct dlm_lkb,
|
|
lkb_rsb_lookup);
|
|
list_del_init(&lkb->lkb_rsb_lookup);
|
|
r->res_first_lkid = lkb->lkb_id;
|
|
_request_lock(r, lkb);
|
|
}
|
|
break;
|
|
|
|
default:
|
|
log_error(r->res_ls, "confirm_master unknown error %d", error);
|
|
}
|
|
}
|
|
|
|
static int set_lock_args(int mode, struct dlm_lksb *lksb, uint32_t flags,
|
|
int namelen, unsigned long timeout_cs,
|
|
void (*ast) (void *astparam),
|
|
void *astparam,
|
|
void (*bast) (void *astparam, int mode),
|
|
struct dlm_args *args)
|
|
{
|
|
int rv = -EINVAL;
|
|
|
|
/* check for invalid arg usage */
|
|
|
|
if (mode < 0 || mode > DLM_LOCK_EX)
|
|
goto out;
|
|
|
|
if (!(flags & DLM_LKF_CONVERT) && (namelen > DLM_RESNAME_MAXLEN))
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_CANCEL)
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_QUECVT && !(flags & DLM_LKF_CONVERT))
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_CONVDEADLK && !(flags & DLM_LKF_CONVERT))
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_CONVDEADLK && flags & DLM_LKF_NOQUEUE)
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_EXPEDITE && flags & DLM_LKF_CONVERT)
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_EXPEDITE && flags & DLM_LKF_QUECVT)
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_EXPEDITE && flags & DLM_LKF_NOQUEUE)
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_EXPEDITE && mode != DLM_LOCK_NL)
|
|
goto out;
|
|
|
|
if (!ast || !lksb)
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_VALBLK && !lksb->sb_lvbptr)
|
|
goto out;
|
|
|
|
if (flags & DLM_LKF_CONVERT && !lksb->sb_lkid)
|
|
goto out;
|
|
|
|
/* these args will be copied to the lkb in validate_lock_args,
|
|
it cannot be done now because when converting locks, fields in
|
|
an active lkb cannot be modified before locking the rsb */
|
|
|
|
args->flags = flags;
|
|
args->astfn = ast;
|
|
args->astparam = astparam;
|
|
args->bastfn = bast;
|
|
args->timeout = timeout_cs;
|
|
args->mode = mode;
|
|
args->lksb = lksb;
|
|
rv = 0;
|
|
out:
|
|
return rv;
|
|
}
|
|
|
|
static int set_unlock_args(uint32_t flags, void *astarg, struct dlm_args *args)
|
|
{
|
|
if (flags & ~(DLM_LKF_CANCEL | DLM_LKF_VALBLK | DLM_LKF_IVVALBLK |
|
|
DLM_LKF_FORCEUNLOCK))
|
|
return -EINVAL;
|
|
|
|
if (flags & DLM_LKF_CANCEL && flags & DLM_LKF_FORCEUNLOCK)
|
|
return -EINVAL;
|
|
|
|
args->flags = flags;
|
|
args->astparam = astarg;
|
|
return 0;
|
|
}
|
|
|
|
static int validate_lock_args(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_args *args)
|
|
{
|
|
int rv = -EINVAL;
|
|
|
|
if (args->flags & DLM_LKF_CONVERT) {
|
|
if (lkb->lkb_flags & DLM_IFL_MSTCPY)
|
|
goto out;
|
|
|
|
if (args->flags & DLM_LKF_QUECVT &&
|
|
!__quecvt_compat_matrix[lkb->lkb_grmode+1][args->mode+1])
|
|
goto out;
|
|
|
|
rv = -EBUSY;
|
|
if (lkb->lkb_status != DLM_LKSTS_GRANTED)
|
|
goto out;
|
|
|
|
if (lkb->lkb_wait_type)
|
|
goto out;
|
|
|
|
if (is_overlap(lkb))
|
|
goto out;
|
|
}
|
|
|
|
lkb->lkb_exflags = args->flags;
|
|
lkb->lkb_sbflags = 0;
|
|
lkb->lkb_astfn = args->astfn;
|
|
lkb->lkb_astparam = args->astparam;
|
|
lkb->lkb_bastfn = args->bastfn;
|
|
lkb->lkb_rqmode = args->mode;
|
|
lkb->lkb_lksb = args->lksb;
|
|
lkb->lkb_lvbptr = args->lksb->sb_lvbptr;
|
|
lkb->lkb_ownpid = (int) current->pid;
|
|
lkb->lkb_timeout_cs = args->timeout;
|
|
rv = 0;
|
|
out:
|
|
if (rv)
|
|
log_debug(ls, "validate_lock_args %d %x %x %x %d %d %s",
|
|
rv, lkb->lkb_id, lkb->lkb_flags, args->flags,
|
|
lkb->lkb_status, lkb->lkb_wait_type,
|
|
lkb->lkb_resource->res_name);
|
|
return rv;
|
|
}
|
|
|
|
/* when dlm_unlock() sees -EBUSY with CANCEL/FORCEUNLOCK it returns 0
|
|
for success */
|
|
|
|
/* note: it's valid for lkb_nodeid/res_nodeid to be -1 when we get here
|
|
because there may be a lookup in progress and it's valid to do
|
|
cancel/unlockf on it */
|
|
|
|
static int validate_unlock_args(struct dlm_lkb *lkb, struct dlm_args *args)
|
|
{
|
|
struct dlm_ls *ls = lkb->lkb_resource->res_ls;
|
|
int rv = -EINVAL;
|
|
|
|
if (lkb->lkb_flags & DLM_IFL_MSTCPY) {
|
|
log_error(ls, "unlock on MSTCPY %x", lkb->lkb_id);
|
|
dlm_print_lkb(lkb);
|
|
goto out;
|
|
}
|
|
|
|
/* an lkb may still exist even though the lock is EOL'ed due to a
|
|
cancel, unlock or failed noqueue request; an app can't use these
|
|
locks; return same error as if the lkid had not been found at all */
|
|
|
|
if (lkb->lkb_flags & DLM_IFL_ENDOFLIFE) {
|
|
log_debug(ls, "unlock on ENDOFLIFE %x", lkb->lkb_id);
|
|
rv = -ENOENT;
|
|
goto out;
|
|
}
|
|
|
|
/* an lkb may be waiting for an rsb lookup to complete where the
|
|
lookup was initiated by another lock */
|
|
|
|
if (!list_empty(&lkb->lkb_rsb_lookup)) {
|
|
if (args->flags & (DLM_LKF_CANCEL | DLM_LKF_FORCEUNLOCK)) {
|
|
log_debug(ls, "unlock on rsb_lookup %x", lkb->lkb_id);
|
|
list_del_init(&lkb->lkb_rsb_lookup);
|
|
queue_cast(lkb->lkb_resource, lkb,
|
|
args->flags & DLM_LKF_CANCEL ?
|
|
-DLM_ECANCEL : -DLM_EUNLOCK);
|
|
unhold_lkb(lkb); /* undoes create_lkb() */
|
|
}
|
|
/* caller changes -EBUSY to 0 for CANCEL and FORCEUNLOCK */
|
|
rv = -EBUSY;
|
|
goto out;
|
|
}
|
|
|
|
/* cancel not allowed with another cancel/unlock in progress */
|
|
|
|
if (args->flags & DLM_LKF_CANCEL) {
|
|
if (lkb->lkb_exflags & DLM_LKF_CANCEL)
|
|
goto out;
|
|
|
|
if (is_overlap(lkb))
|
|
goto out;
|
|
|
|
/* don't let scand try to do a cancel */
|
|
del_timeout(lkb);
|
|
|
|
if (lkb->lkb_flags & DLM_IFL_RESEND) {
|
|
lkb->lkb_flags |= DLM_IFL_OVERLAP_CANCEL;
|
|
rv = -EBUSY;
|
|
goto out;
|
|
}
|
|
|
|
/* there's nothing to cancel */
|
|
if (lkb->lkb_status == DLM_LKSTS_GRANTED &&
|
|
!lkb->lkb_wait_type) {
|
|
rv = -EBUSY;
|
|
goto out;
|
|
}
|
|
|
|
switch (lkb->lkb_wait_type) {
|
|
case DLM_MSG_LOOKUP:
|
|
case DLM_MSG_REQUEST:
|
|
lkb->lkb_flags |= DLM_IFL_OVERLAP_CANCEL;
|
|
rv = -EBUSY;
|
|
goto out;
|
|
case DLM_MSG_UNLOCK:
|
|
case DLM_MSG_CANCEL:
|
|
goto out;
|
|
}
|
|
/* add_to_waiters() will set OVERLAP_CANCEL */
|
|
goto out_ok;
|
|
}
|
|
|
|
/* do we need to allow a force-unlock if there's a normal unlock
|
|
already in progress? in what conditions could the normal unlock
|
|
fail such that we'd want to send a force-unlock to be sure? */
|
|
|
|
if (args->flags & DLM_LKF_FORCEUNLOCK) {
|
|
if (lkb->lkb_exflags & DLM_LKF_FORCEUNLOCK)
|
|
goto out;
|
|
|
|
if (is_overlap_unlock(lkb))
|
|
goto out;
|
|
|
|
/* don't let scand try to do a cancel */
|
|
del_timeout(lkb);
|
|
|
|
if (lkb->lkb_flags & DLM_IFL_RESEND) {
|
|
lkb->lkb_flags |= DLM_IFL_OVERLAP_UNLOCK;
|
|
rv = -EBUSY;
|
|
goto out;
|
|
}
|
|
|
|
switch (lkb->lkb_wait_type) {
|
|
case DLM_MSG_LOOKUP:
|
|
case DLM_MSG_REQUEST:
|
|
lkb->lkb_flags |= DLM_IFL_OVERLAP_UNLOCK;
|
|
rv = -EBUSY;
|
|
goto out;
|
|
case DLM_MSG_UNLOCK:
|
|
goto out;
|
|
}
|
|
/* add_to_waiters() will set OVERLAP_UNLOCK */
|
|
goto out_ok;
|
|
}
|
|
|
|
/* normal unlock not allowed if there's any op in progress */
|
|
rv = -EBUSY;
|
|
if (lkb->lkb_wait_type || lkb->lkb_wait_count)
|
|
goto out;
|
|
|
|
out_ok:
|
|
/* an overlapping op shouldn't blow away exflags from other op */
|
|
lkb->lkb_exflags |= args->flags;
|
|
lkb->lkb_sbflags = 0;
|
|
lkb->lkb_astparam = args->astparam;
|
|
rv = 0;
|
|
out:
|
|
if (rv)
|
|
log_debug(ls, "validate_unlock_args %d %x %x %x %x %d %s", rv,
|
|
lkb->lkb_id, lkb->lkb_flags, lkb->lkb_exflags,
|
|
args->flags, lkb->lkb_wait_type,
|
|
lkb->lkb_resource->res_name);
|
|
return rv;
|
|
}
|
|
|
|
/*
|
|
* Four stage 4 varieties:
|
|
* do_request(), do_convert(), do_unlock(), do_cancel()
|
|
* These are called on the master node for the given lock and
|
|
* from the central locking logic.
|
|
*/
|
|
|
|
static int do_request(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int error = 0;
|
|
|
|
if (can_be_granted(r, lkb, 1, 0, NULL)) {
|
|
grant_lock(r, lkb);
|
|
queue_cast(r, lkb, 0);
|
|
goto out;
|
|
}
|
|
|
|
if (can_be_queued(lkb)) {
|
|
error = -EINPROGRESS;
|
|
add_lkb(r, lkb, DLM_LKSTS_WAITING);
|
|
add_timeout(lkb);
|
|
goto out;
|
|
}
|
|
|
|
error = -EAGAIN;
|
|
queue_cast(r, lkb, -EAGAIN);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
static void do_request_effects(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
int error)
|
|
{
|
|
switch (error) {
|
|
case -EAGAIN:
|
|
if (force_blocking_asts(lkb))
|
|
send_blocking_asts_all(r, lkb);
|
|
break;
|
|
case -EINPROGRESS:
|
|
send_blocking_asts(r, lkb);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static int do_convert(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int error = 0;
|
|
int deadlk = 0;
|
|
|
|
/* changing an existing lock may allow others to be granted */
|
|
|
|
if (can_be_granted(r, lkb, 1, 0, &deadlk)) {
|
|
grant_lock(r, lkb);
|
|
queue_cast(r, lkb, 0);
|
|
goto out;
|
|
}
|
|
|
|
/* can_be_granted() detected that this lock would block in a conversion
|
|
deadlock, so we leave it on the granted queue and return EDEADLK in
|
|
the ast for the convert. */
|
|
|
|
if (deadlk && !(lkb->lkb_exflags & DLM_LKF_NODLCKWT)) {
|
|
/* it's left on the granted queue */
|
|
revert_lock(r, lkb);
|
|
queue_cast(r, lkb, -EDEADLK);
|
|
error = -EDEADLK;
|
|
goto out;
|
|
}
|
|
|
|
/* is_demoted() means the can_be_granted() above set the grmode
|
|
to NL, and left us on the granted queue. This auto-demotion
|
|
(due to CONVDEADLK) might mean other locks, and/or this lock, are
|
|
now grantable. We have to try to grant other converting locks
|
|
before we try again to grant this one. */
|
|
|
|
if (is_demoted(lkb)) {
|
|
grant_pending_convert(r, DLM_LOCK_IV, NULL, NULL);
|
|
if (_can_be_granted(r, lkb, 1, 0)) {
|
|
grant_lock(r, lkb);
|
|
queue_cast(r, lkb, 0);
|
|
goto out;
|
|
}
|
|
/* else fall through and move to convert queue */
|
|
}
|
|
|
|
if (can_be_queued(lkb)) {
|
|
error = -EINPROGRESS;
|
|
del_lkb(r, lkb);
|
|
add_lkb(r, lkb, DLM_LKSTS_CONVERT);
|
|
add_timeout(lkb);
|
|
goto out;
|
|
}
|
|
|
|
error = -EAGAIN;
|
|
queue_cast(r, lkb, -EAGAIN);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
static void do_convert_effects(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
int error)
|
|
{
|
|
switch (error) {
|
|
case 0:
|
|
grant_pending_locks(r, NULL);
|
|
/* grant_pending_locks also sends basts */
|
|
break;
|
|
case -EAGAIN:
|
|
if (force_blocking_asts(lkb))
|
|
send_blocking_asts_all(r, lkb);
|
|
break;
|
|
case -EINPROGRESS:
|
|
send_blocking_asts(r, lkb);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static int do_unlock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
remove_lock(r, lkb);
|
|
queue_cast(r, lkb, -DLM_EUNLOCK);
|
|
return -DLM_EUNLOCK;
|
|
}
|
|
|
|
static void do_unlock_effects(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
int error)
|
|
{
|
|
grant_pending_locks(r, NULL);
|
|
}
|
|
|
|
/* returns: 0 did nothing, -DLM_ECANCEL canceled lock */
|
|
|
|
static int do_cancel(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int error;
|
|
|
|
error = revert_lock(r, lkb);
|
|
if (error) {
|
|
queue_cast(r, lkb, -DLM_ECANCEL);
|
|
return -DLM_ECANCEL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static void do_cancel_effects(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
int error)
|
|
{
|
|
if (error)
|
|
grant_pending_locks(r, NULL);
|
|
}
|
|
|
|
/*
|
|
* Four stage 3 varieties:
|
|
* _request_lock(), _convert_lock(), _unlock_lock(), _cancel_lock()
|
|
*/
|
|
|
|
/* add a new lkb to a possibly new rsb, called by requesting process */
|
|
|
|
static int _request_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int error;
|
|
|
|
/* set_master: sets lkb nodeid from r */
|
|
|
|
error = set_master(r, lkb);
|
|
if (error < 0)
|
|
goto out;
|
|
if (error) {
|
|
error = 0;
|
|
goto out;
|
|
}
|
|
|
|
if (is_remote(r)) {
|
|
/* receive_request() calls do_request() on remote node */
|
|
error = send_request(r, lkb);
|
|
} else {
|
|
error = do_request(r, lkb);
|
|
/* for remote locks the request_reply is sent
|
|
between do_request and do_request_effects */
|
|
do_request_effects(r, lkb, error);
|
|
}
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
/* change some property of an existing lkb, e.g. mode */
|
|
|
|
static int _convert_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int error;
|
|
|
|
if (is_remote(r)) {
|
|
/* receive_convert() calls do_convert() on remote node */
|
|
error = send_convert(r, lkb);
|
|
} else {
|
|
error = do_convert(r, lkb);
|
|
/* for remote locks the convert_reply is sent
|
|
between do_convert and do_convert_effects */
|
|
do_convert_effects(r, lkb, error);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
/* remove an existing lkb from the granted queue */
|
|
|
|
static int _unlock_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int error;
|
|
|
|
if (is_remote(r)) {
|
|
/* receive_unlock() calls do_unlock() on remote node */
|
|
error = send_unlock(r, lkb);
|
|
} else {
|
|
error = do_unlock(r, lkb);
|
|
/* for remote locks the unlock_reply is sent
|
|
between do_unlock and do_unlock_effects */
|
|
do_unlock_effects(r, lkb, error);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
/* remove an existing lkb from the convert or wait queue */
|
|
|
|
static int _cancel_lock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int error;
|
|
|
|
if (is_remote(r)) {
|
|
/* receive_cancel() calls do_cancel() on remote node */
|
|
error = send_cancel(r, lkb);
|
|
} else {
|
|
error = do_cancel(r, lkb);
|
|
/* for remote locks the cancel_reply is sent
|
|
between do_cancel and do_cancel_effects */
|
|
do_cancel_effects(r, lkb, error);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* Four stage 2 varieties:
|
|
* request_lock(), convert_lock(), unlock_lock(), cancel_lock()
|
|
*/
|
|
|
|
static int request_lock(struct dlm_ls *ls, struct dlm_lkb *lkb, char *name,
|
|
int len, struct dlm_args *args)
|
|
{
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
error = validate_lock_args(ls, lkb, args);
|
|
if (error)
|
|
return error;
|
|
|
|
error = find_rsb(ls, name, len, 0, R_REQUEST, &r);
|
|
if (error)
|
|
return error;
|
|
|
|
lock_rsb(r);
|
|
|
|
attach_lkb(r, lkb);
|
|
lkb->lkb_lksb->sb_lkid = lkb->lkb_id;
|
|
|
|
error = _request_lock(r, lkb);
|
|
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
return error;
|
|
}
|
|
|
|
static int convert_lock(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_args *args)
|
|
{
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
r = lkb->lkb_resource;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_lock_args(ls, lkb, args);
|
|
if (error)
|
|
goto out;
|
|
|
|
error = _convert_lock(r, lkb);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
return error;
|
|
}
|
|
|
|
static int unlock_lock(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_args *args)
|
|
{
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
r = lkb->lkb_resource;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_unlock_args(lkb, args);
|
|
if (error)
|
|
goto out;
|
|
|
|
error = _unlock_lock(r, lkb);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
return error;
|
|
}
|
|
|
|
static int cancel_lock(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_args *args)
|
|
{
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
r = lkb->lkb_resource;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_unlock_args(lkb, args);
|
|
if (error)
|
|
goto out;
|
|
|
|
error = _cancel_lock(r, lkb);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* Two stage 1 varieties: dlm_lock() and dlm_unlock()
|
|
*/
|
|
|
|
int dlm_lock(dlm_lockspace_t *lockspace,
|
|
int mode,
|
|
struct dlm_lksb *lksb,
|
|
uint32_t flags,
|
|
void *name,
|
|
unsigned int namelen,
|
|
uint32_t parent_lkid,
|
|
void (*ast) (void *astarg),
|
|
void *astarg,
|
|
void (*bast) (void *astarg, int mode))
|
|
{
|
|
struct dlm_ls *ls;
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_args args;
|
|
int error, convert = flags & DLM_LKF_CONVERT;
|
|
|
|
ls = dlm_find_lockspace_local(lockspace);
|
|
if (!ls)
|
|
return -EINVAL;
|
|
|
|
dlm_lock_recovery(ls);
|
|
|
|
if (convert)
|
|
error = find_lkb(ls, lksb->sb_lkid, &lkb);
|
|
else
|
|
error = create_lkb(ls, &lkb);
|
|
|
|
if (error)
|
|
goto out;
|
|
|
|
error = set_lock_args(mode, lksb, flags, namelen, 0, ast,
|
|
astarg, bast, &args);
|
|
if (error)
|
|
goto out_put;
|
|
|
|
if (convert)
|
|
error = convert_lock(ls, lkb, &args);
|
|
else
|
|
error = request_lock(ls, lkb, name, namelen, &args);
|
|
|
|
if (error == -EINPROGRESS)
|
|
error = 0;
|
|
out_put:
|
|
if (convert || error)
|
|
__put_lkb(ls, lkb);
|
|
if (error == -EAGAIN || error == -EDEADLK)
|
|
error = 0;
|
|
out:
|
|
dlm_unlock_recovery(ls);
|
|
dlm_put_lockspace(ls);
|
|
return error;
|
|
}
|
|
|
|
int dlm_unlock(dlm_lockspace_t *lockspace,
|
|
uint32_t lkid,
|
|
uint32_t flags,
|
|
struct dlm_lksb *lksb,
|
|
void *astarg)
|
|
{
|
|
struct dlm_ls *ls;
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_args args;
|
|
int error;
|
|
|
|
ls = dlm_find_lockspace_local(lockspace);
|
|
if (!ls)
|
|
return -EINVAL;
|
|
|
|
dlm_lock_recovery(ls);
|
|
|
|
error = find_lkb(ls, lkid, &lkb);
|
|
if (error)
|
|
goto out;
|
|
|
|
error = set_unlock_args(flags, astarg, &args);
|
|
if (error)
|
|
goto out_put;
|
|
|
|
if (flags & DLM_LKF_CANCEL)
|
|
error = cancel_lock(ls, lkb, &args);
|
|
else
|
|
error = unlock_lock(ls, lkb, &args);
|
|
|
|
if (error == -DLM_EUNLOCK || error == -DLM_ECANCEL)
|
|
error = 0;
|
|
if (error == -EBUSY && (flags & (DLM_LKF_CANCEL | DLM_LKF_FORCEUNLOCK)))
|
|
error = 0;
|
|
out_put:
|
|
dlm_put_lkb(lkb);
|
|
out:
|
|
dlm_unlock_recovery(ls);
|
|
dlm_put_lockspace(ls);
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* send/receive routines for remote operations and replies
|
|
*
|
|
* send_args
|
|
* send_common
|
|
* send_request receive_request
|
|
* send_convert receive_convert
|
|
* send_unlock receive_unlock
|
|
* send_cancel receive_cancel
|
|
* send_grant receive_grant
|
|
* send_bast receive_bast
|
|
* send_lookup receive_lookup
|
|
* send_remove receive_remove
|
|
*
|
|
* send_common_reply
|
|
* receive_request_reply send_request_reply
|
|
* receive_convert_reply send_convert_reply
|
|
* receive_unlock_reply send_unlock_reply
|
|
* receive_cancel_reply send_cancel_reply
|
|
* receive_lookup_reply send_lookup_reply
|
|
*/
|
|
|
|
static int _create_message(struct dlm_ls *ls, int mb_len,
|
|
int to_nodeid, int mstype,
|
|
struct dlm_message **ms_ret,
|
|
struct dlm_mhandle **mh_ret)
|
|
{
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
char *mb;
|
|
|
|
/* get_buffer gives us a message handle (mh) that we need to
|
|
pass into lowcomms_commit and a message buffer (mb) that we
|
|
write our data into */
|
|
|
|
mh = dlm_lowcomms_get_buffer(to_nodeid, mb_len, GFP_NOFS, &mb);
|
|
if (!mh)
|
|
return -ENOBUFS;
|
|
|
|
memset(mb, 0, mb_len);
|
|
|
|
ms = (struct dlm_message *) mb;
|
|
|
|
ms->m_header.h_version = (DLM_HEADER_MAJOR | DLM_HEADER_MINOR);
|
|
ms->m_header.h_lockspace = ls->ls_global_id;
|
|
ms->m_header.h_nodeid = dlm_our_nodeid();
|
|
ms->m_header.h_length = mb_len;
|
|
ms->m_header.h_cmd = DLM_MSG;
|
|
|
|
ms->m_type = mstype;
|
|
|
|
*mh_ret = mh;
|
|
*ms_ret = ms;
|
|
return 0;
|
|
}
|
|
|
|
static int create_message(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
int to_nodeid, int mstype,
|
|
struct dlm_message **ms_ret,
|
|
struct dlm_mhandle **mh_ret)
|
|
{
|
|
int mb_len = sizeof(struct dlm_message);
|
|
|
|
switch (mstype) {
|
|
case DLM_MSG_REQUEST:
|
|
case DLM_MSG_LOOKUP:
|
|
case DLM_MSG_REMOVE:
|
|
mb_len += r->res_length;
|
|
break;
|
|
case DLM_MSG_CONVERT:
|
|
case DLM_MSG_UNLOCK:
|
|
case DLM_MSG_REQUEST_REPLY:
|
|
case DLM_MSG_CONVERT_REPLY:
|
|
case DLM_MSG_GRANT:
|
|
if (lkb && lkb->lkb_lvbptr)
|
|
mb_len += r->res_ls->ls_lvblen;
|
|
break;
|
|
}
|
|
|
|
return _create_message(r->res_ls, mb_len, to_nodeid, mstype,
|
|
ms_ret, mh_ret);
|
|
}
|
|
|
|
/* further lowcomms enhancements or alternate implementations may make
|
|
the return value from this function useful at some point */
|
|
|
|
static int send_message(struct dlm_mhandle *mh, struct dlm_message *ms)
|
|
{
|
|
dlm_message_out(ms);
|
|
dlm_lowcomms_commit_buffer(mh);
|
|
return 0;
|
|
}
|
|
|
|
static void send_args(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms)
|
|
{
|
|
ms->m_nodeid = lkb->lkb_nodeid;
|
|
ms->m_pid = lkb->lkb_ownpid;
|
|
ms->m_lkid = lkb->lkb_id;
|
|
ms->m_remid = lkb->lkb_remid;
|
|
ms->m_exflags = lkb->lkb_exflags;
|
|
ms->m_sbflags = lkb->lkb_sbflags;
|
|
ms->m_flags = lkb->lkb_flags;
|
|
ms->m_lvbseq = lkb->lkb_lvbseq;
|
|
ms->m_status = lkb->lkb_status;
|
|
ms->m_grmode = lkb->lkb_grmode;
|
|
ms->m_rqmode = lkb->lkb_rqmode;
|
|
ms->m_hash = r->res_hash;
|
|
|
|
/* m_result and m_bastmode are set from function args,
|
|
not from lkb fields */
|
|
|
|
if (lkb->lkb_bastfn)
|
|
ms->m_asts |= DLM_CB_BAST;
|
|
if (lkb->lkb_astfn)
|
|
ms->m_asts |= DLM_CB_CAST;
|
|
|
|
/* compare with switch in create_message; send_remove() doesn't
|
|
use send_args() */
|
|
|
|
switch (ms->m_type) {
|
|
case DLM_MSG_REQUEST:
|
|
case DLM_MSG_LOOKUP:
|
|
memcpy(ms->m_extra, r->res_name, r->res_length);
|
|
break;
|
|
case DLM_MSG_CONVERT:
|
|
case DLM_MSG_UNLOCK:
|
|
case DLM_MSG_REQUEST_REPLY:
|
|
case DLM_MSG_CONVERT_REPLY:
|
|
case DLM_MSG_GRANT:
|
|
if (!lkb->lkb_lvbptr)
|
|
break;
|
|
memcpy(ms->m_extra, lkb->lkb_lvbptr, r->res_ls->ls_lvblen);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static int send_common(struct dlm_rsb *r, struct dlm_lkb *lkb, int mstype)
|
|
{
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
int to_nodeid, error;
|
|
|
|
to_nodeid = r->res_nodeid;
|
|
|
|
error = add_to_waiters(lkb, mstype, to_nodeid);
|
|
if (error)
|
|
return error;
|
|
|
|
error = create_message(r, lkb, to_nodeid, mstype, &ms, &mh);
|
|
if (error)
|
|
goto fail;
|
|
|
|
send_args(r, lkb, ms);
|
|
|
|
error = send_message(mh, ms);
|
|
if (error)
|
|
goto fail;
|
|
return 0;
|
|
|
|
fail:
|
|
remove_from_waiters(lkb, msg_reply_type(mstype));
|
|
return error;
|
|
}
|
|
|
|
static int send_request(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
return send_common(r, lkb, DLM_MSG_REQUEST);
|
|
}
|
|
|
|
static int send_convert(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
int error;
|
|
|
|
error = send_common(r, lkb, DLM_MSG_CONVERT);
|
|
|
|
/* down conversions go without a reply from the master */
|
|
if (!error && down_conversion(lkb)) {
|
|
remove_from_waiters(lkb, DLM_MSG_CONVERT_REPLY);
|
|
r->res_ls->ls_stub_ms.m_flags = DLM_IFL_STUB_MS;
|
|
r->res_ls->ls_stub_ms.m_type = DLM_MSG_CONVERT_REPLY;
|
|
r->res_ls->ls_stub_ms.m_result = 0;
|
|
__receive_convert_reply(r, lkb, &r->res_ls->ls_stub_ms);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
/* FIXME: if this lkb is the only lock we hold on the rsb, then set
|
|
MASTER_UNCERTAIN to force the next request on the rsb to confirm
|
|
that the master is still correct. */
|
|
|
|
static int send_unlock(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
return send_common(r, lkb, DLM_MSG_UNLOCK);
|
|
}
|
|
|
|
static int send_cancel(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
return send_common(r, lkb, DLM_MSG_CANCEL);
|
|
}
|
|
|
|
static int send_grant(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
int to_nodeid, error;
|
|
|
|
to_nodeid = lkb->lkb_nodeid;
|
|
|
|
error = create_message(r, lkb, to_nodeid, DLM_MSG_GRANT, &ms, &mh);
|
|
if (error)
|
|
goto out;
|
|
|
|
send_args(r, lkb, ms);
|
|
|
|
ms->m_result = 0;
|
|
|
|
error = send_message(mh, ms);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
static int send_bast(struct dlm_rsb *r, struct dlm_lkb *lkb, int mode)
|
|
{
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
int to_nodeid, error;
|
|
|
|
to_nodeid = lkb->lkb_nodeid;
|
|
|
|
error = create_message(r, NULL, to_nodeid, DLM_MSG_BAST, &ms, &mh);
|
|
if (error)
|
|
goto out;
|
|
|
|
send_args(r, lkb, ms);
|
|
|
|
ms->m_bastmode = mode;
|
|
|
|
error = send_message(mh, ms);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
static int send_lookup(struct dlm_rsb *r, struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
int to_nodeid, error;
|
|
|
|
to_nodeid = dlm_dir_nodeid(r);
|
|
|
|
error = add_to_waiters(lkb, DLM_MSG_LOOKUP, to_nodeid);
|
|
if (error)
|
|
return error;
|
|
|
|
error = create_message(r, NULL, to_nodeid, DLM_MSG_LOOKUP, &ms, &mh);
|
|
if (error)
|
|
goto fail;
|
|
|
|
send_args(r, lkb, ms);
|
|
|
|
error = send_message(mh, ms);
|
|
if (error)
|
|
goto fail;
|
|
return 0;
|
|
|
|
fail:
|
|
remove_from_waiters(lkb, DLM_MSG_LOOKUP_REPLY);
|
|
return error;
|
|
}
|
|
|
|
static int send_remove(struct dlm_rsb *r)
|
|
{
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
int to_nodeid, error;
|
|
|
|
to_nodeid = dlm_dir_nodeid(r);
|
|
|
|
error = create_message(r, NULL, to_nodeid, DLM_MSG_REMOVE, &ms, &mh);
|
|
if (error)
|
|
goto out;
|
|
|
|
memcpy(ms->m_extra, r->res_name, r->res_length);
|
|
ms->m_hash = r->res_hash;
|
|
|
|
error = send_message(mh, ms);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
static int send_common_reply(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
int mstype, int rv)
|
|
{
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
int to_nodeid, error;
|
|
|
|
to_nodeid = lkb->lkb_nodeid;
|
|
|
|
error = create_message(r, lkb, to_nodeid, mstype, &ms, &mh);
|
|
if (error)
|
|
goto out;
|
|
|
|
send_args(r, lkb, ms);
|
|
|
|
ms->m_result = rv;
|
|
|
|
error = send_message(mh, ms);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
static int send_request_reply(struct dlm_rsb *r, struct dlm_lkb *lkb, int rv)
|
|
{
|
|
return send_common_reply(r, lkb, DLM_MSG_REQUEST_REPLY, rv);
|
|
}
|
|
|
|
static int send_convert_reply(struct dlm_rsb *r, struct dlm_lkb *lkb, int rv)
|
|
{
|
|
return send_common_reply(r, lkb, DLM_MSG_CONVERT_REPLY, rv);
|
|
}
|
|
|
|
static int send_unlock_reply(struct dlm_rsb *r, struct dlm_lkb *lkb, int rv)
|
|
{
|
|
return send_common_reply(r, lkb, DLM_MSG_UNLOCK_REPLY, rv);
|
|
}
|
|
|
|
static int send_cancel_reply(struct dlm_rsb *r, struct dlm_lkb *lkb, int rv)
|
|
{
|
|
return send_common_reply(r, lkb, DLM_MSG_CANCEL_REPLY, rv);
|
|
}
|
|
|
|
static int send_lookup_reply(struct dlm_ls *ls, struct dlm_message *ms_in,
|
|
int ret_nodeid, int rv)
|
|
{
|
|
struct dlm_rsb *r = &ls->ls_stub_rsb;
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
int error, nodeid = ms_in->m_header.h_nodeid;
|
|
|
|
error = create_message(r, NULL, nodeid, DLM_MSG_LOOKUP_REPLY, &ms, &mh);
|
|
if (error)
|
|
goto out;
|
|
|
|
ms->m_lkid = ms_in->m_lkid;
|
|
ms->m_result = rv;
|
|
ms->m_nodeid = ret_nodeid;
|
|
|
|
error = send_message(mh, ms);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
/* which args we save from a received message depends heavily on the type
|
|
of message, unlike the send side where we can safely send everything about
|
|
the lkb for any type of message */
|
|
|
|
static void receive_flags(struct dlm_lkb *lkb, struct dlm_message *ms)
|
|
{
|
|
lkb->lkb_exflags = ms->m_exflags;
|
|
lkb->lkb_sbflags = ms->m_sbflags;
|
|
lkb->lkb_flags = (lkb->lkb_flags & 0xFFFF0000) |
|
|
(ms->m_flags & 0x0000FFFF);
|
|
}
|
|
|
|
static void receive_flags_reply(struct dlm_lkb *lkb, struct dlm_message *ms)
|
|
{
|
|
if (ms->m_flags == DLM_IFL_STUB_MS)
|
|
return;
|
|
|
|
lkb->lkb_sbflags = ms->m_sbflags;
|
|
lkb->lkb_flags = (lkb->lkb_flags & 0xFFFF0000) |
|
|
(ms->m_flags & 0x0000FFFF);
|
|
}
|
|
|
|
static int receive_extralen(struct dlm_message *ms)
|
|
{
|
|
return (ms->m_header.h_length - sizeof(struct dlm_message));
|
|
}
|
|
|
|
static int receive_lvb(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms)
|
|
{
|
|
int len;
|
|
|
|
if (lkb->lkb_exflags & DLM_LKF_VALBLK) {
|
|
if (!lkb->lkb_lvbptr)
|
|
lkb->lkb_lvbptr = dlm_allocate_lvb(ls);
|
|
if (!lkb->lkb_lvbptr)
|
|
return -ENOMEM;
|
|
len = receive_extralen(ms);
|
|
if (len > ls->ls_lvblen)
|
|
len = ls->ls_lvblen;
|
|
memcpy(lkb->lkb_lvbptr, ms->m_extra, len);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static void fake_bastfn(void *astparam, int mode)
|
|
{
|
|
log_print("fake_bastfn should not be called");
|
|
}
|
|
|
|
static void fake_astfn(void *astparam)
|
|
{
|
|
log_print("fake_astfn should not be called");
|
|
}
|
|
|
|
static int receive_request_args(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms)
|
|
{
|
|
lkb->lkb_nodeid = ms->m_header.h_nodeid;
|
|
lkb->lkb_ownpid = ms->m_pid;
|
|
lkb->lkb_remid = ms->m_lkid;
|
|
lkb->lkb_grmode = DLM_LOCK_IV;
|
|
lkb->lkb_rqmode = ms->m_rqmode;
|
|
|
|
lkb->lkb_bastfn = (ms->m_asts & DLM_CB_BAST) ? &fake_bastfn : NULL;
|
|
lkb->lkb_astfn = (ms->m_asts & DLM_CB_CAST) ? &fake_astfn : NULL;
|
|
|
|
if (lkb->lkb_exflags & DLM_LKF_VALBLK) {
|
|
/* lkb was just created so there won't be an lvb yet */
|
|
lkb->lkb_lvbptr = dlm_allocate_lvb(ls);
|
|
if (!lkb->lkb_lvbptr)
|
|
return -ENOMEM;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int receive_convert_args(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms)
|
|
{
|
|
if (lkb->lkb_status != DLM_LKSTS_GRANTED)
|
|
return -EBUSY;
|
|
|
|
if (receive_lvb(ls, lkb, ms))
|
|
return -ENOMEM;
|
|
|
|
lkb->lkb_rqmode = ms->m_rqmode;
|
|
lkb->lkb_lvbseq = ms->m_lvbseq;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int receive_unlock_args(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms)
|
|
{
|
|
if (receive_lvb(ls, lkb, ms))
|
|
return -ENOMEM;
|
|
return 0;
|
|
}
|
|
|
|
/* We fill in the stub-lkb fields with the info that send_xxxx_reply()
|
|
uses to send a reply and that the remote end uses to process the reply. */
|
|
|
|
static void setup_stub_lkb(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb = &ls->ls_stub_lkb;
|
|
lkb->lkb_nodeid = ms->m_header.h_nodeid;
|
|
lkb->lkb_remid = ms->m_lkid;
|
|
}
|
|
|
|
/* This is called after the rsb is locked so that we can safely inspect
|
|
fields in the lkb. */
|
|
|
|
static int validate_message(struct dlm_lkb *lkb, struct dlm_message *ms)
|
|
{
|
|
int from = ms->m_header.h_nodeid;
|
|
int error = 0;
|
|
|
|
switch (ms->m_type) {
|
|
case DLM_MSG_CONVERT:
|
|
case DLM_MSG_UNLOCK:
|
|
case DLM_MSG_CANCEL:
|
|
if (!is_master_copy(lkb) || lkb->lkb_nodeid != from)
|
|
error = -EINVAL;
|
|
break;
|
|
|
|
case DLM_MSG_CONVERT_REPLY:
|
|
case DLM_MSG_UNLOCK_REPLY:
|
|
case DLM_MSG_CANCEL_REPLY:
|
|
case DLM_MSG_GRANT:
|
|
case DLM_MSG_BAST:
|
|
if (!is_process_copy(lkb) || lkb->lkb_nodeid != from)
|
|
error = -EINVAL;
|
|
break;
|
|
|
|
case DLM_MSG_REQUEST_REPLY:
|
|
if (!is_process_copy(lkb))
|
|
error = -EINVAL;
|
|
else if (lkb->lkb_nodeid != -1 && lkb->lkb_nodeid != from)
|
|
error = -EINVAL;
|
|
break;
|
|
|
|
default:
|
|
error = -EINVAL;
|
|
}
|
|
|
|
if (error)
|
|
log_error(lkb->lkb_resource->res_ls,
|
|
"ignore invalid message %d from %d %x %x %x %d",
|
|
ms->m_type, from, lkb->lkb_id, lkb->lkb_remid,
|
|
lkb->lkb_flags, lkb->lkb_nodeid);
|
|
return error;
|
|
}
|
|
|
|
static void send_repeat_remove(struct dlm_ls *ls, char *ms_name, int len)
|
|
{
|
|
char name[DLM_RESNAME_MAXLEN + 1];
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
struct dlm_rsb *r;
|
|
uint32_t hash, b;
|
|
int rv, dir_nodeid;
|
|
|
|
memset(name, 0, sizeof(name));
|
|
memcpy(name, ms_name, len);
|
|
|
|
hash = jhash(name, len, 0);
|
|
b = hash & (ls->ls_rsbtbl_size - 1);
|
|
|
|
dir_nodeid = dlm_hash2nodeid(ls, hash);
|
|
|
|
log_error(ls, "send_repeat_remove dir %d %s", dir_nodeid, name);
|
|
|
|
spin_lock(&ls->ls_rsbtbl[b].lock);
|
|
rv = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].keep, name, len, &r);
|
|
if (!rv) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
log_error(ls, "repeat_remove on keep %s", name);
|
|
return;
|
|
}
|
|
|
|
rv = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].toss, name, len, &r);
|
|
if (!rv) {
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
log_error(ls, "repeat_remove on toss %s", name);
|
|
return;
|
|
}
|
|
|
|
/* use ls->remove_name2 to avoid conflict with shrink? */
|
|
|
|
spin_lock(&ls->ls_remove_spin);
|
|
ls->ls_remove_len = len;
|
|
memcpy(ls->ls_remove_name, name, DLM_RESNAME_MAXLEN);
|
|
spin_unlock(&ls->ls_remove_spin);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
|
|
rv = _create_message(ls, sizeof(struct dlm_message) + len,
|
|
dir_nodeid, DLM_MSG_REMOVE, &ms, &mh);
|
|
if (rv)
|
|
return;
|
|
|
|
memcpy(ms->m_extra, name, len);
|
|
ms->m_hash = hash;
|
|
|
|
send_message(mh, ms);
|
|
|
|
spin_lock(&ls->ls_remove_spin);
|
|
ls->ls_remove_len = 0;
|
|
memset(ls->ls_remove_name, 0, DLM_RESNAME_MAXLEN);
|
|
spin_unlock(&ls->ls_remove_spin);
|
|
}
|
|
|
|
static int receive_request(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int from_nodeid;
|
|
int error, namelen = 0;
|
|
|
|
from_nodeid = ms->m_header.h_nodeid;
|
|
|
|
error = create_lkb(ls, &lkb);
|
|
if (error)
|
|
goto fail;
|
|
|
|
receive_flags(lkb, ms);
|
|
lkb->lkb_flags |= DLM_IFL_MSTCPY;
|
|
error = receive_request_args(ls, lkb, ms);
|
|
if (error) {
|
|
__put_lkb(ls, lkb);
|
|
goto fail;
|
|
}
|
|
|
|
/* The dir node is the authority on whether we are the master
|
|
for this rsb or not, so if the master sends us a request, we should
|
|
recreate the rsb if we've destroyed it. This race happens when we
|
|
send a remove message to the dir node at the same time that the dir
|
|
node sends us a request for the rsb. */
|
|
|
|
namelen = receive_extralen(ms);
|
|
|
|
error = find_rsb(ls, ms->m_extra, namelen, from_nodeid,
|
|
R_RECEIVE_REQUEST, &r);
|
|
if (error) {
|
|
__put_lkb(ls, lkb);
|
|
goto fail;
|
|
}
|
|
|
|
lock_rsb(r);
|
|
|
|
if (r->res_master_nodeid != dlm_our_nodeid()) {
|
|
error = validate_master_nodeid(ls, r, from_nodeid);
|
|
if (error) {
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
__put_lkb(ls, lkb);
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
attach_lkb(r, lkb);
|
|
error = do_request(r, lkb);
|
|
send_request_reply(r, lkb, error);
|
|
do_request_effects(r, lkb, error);
|
|
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
|
|
if (error == -EINPROGRESS)
|
|
error = 0;
|
|
if (error)
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
|
|
fail:
|
|
/* TODO: instead of returning ENOTBLK, add the lkb to res_lookup
|
|
and do this receive_request again from process_lookup_list once
|
|
we get the lookup reply. This would avoid a many repeated
|
|
ENOTBLK request failures when the lookup reply designating us
|
|
as master is delayed. */
|
|
|
|
/* We could repeatedly return -EBADR here if our send_remove() is
|
|
delayed in being sent/arriving/being processed on the dir node.
|
|
Another node would repeatedly lookup up the master, and the dir
|
|
node would continue returning our nodeid until our send_remove
|
|
took effect.
|
|
|
|
We send another remove message in case our previous send_remove
|
|
was lost/ignored/missed somehow. */
|
|
|
|
if (error != -ENOTBLK) {
|
|
log_limit(ls, "receive_request %x from %d %d",
|
|
ms->m_lkid, from_nodeid, error);
|
|
}
|
|
|
|
if (namelen && error == -EBADR) {
|
|
send_repeat_remove(ls, ms->m_extra, namelen);
|
|
msleep(1000);
|
|
}
|
|
|
|
setup_stub_lkb(ls, ms);
|
|
send_request_reply(&ls->ls_stub_rsb, &ls->ls_stub_lkb, error);
|
|
return error;
|
|
}
|
|
|
|
static int receive_convert(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int error, reply = 1;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
goto fail;
|
|
|
|
if (lkb->lkb_remid != ms->m_lkid) {
|
|
log_error(ls, "receive_convert %x remid %x recover_seq %llu "
|
|
"remote %d %x", lkb->lkb_id, lkb->lkb_remid,
|
|
(unsigned long long)lkb->lkb_recover_seq,
|
|
ms->m_header.h_nodeid, ms->m_lkid);
|
|
error = -ENOENT;
|
|
dlm_put_lkb(lkb);
|
|
goto fail;
|
|
}
|
|
|
|
r = lkb->lkb_resource;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
receive_flags(lkb, ms);
|
|
|
|
error = receive_convert_args(ls, lkb, ms);
|
|
if (error) {
|
|
send_convert_reply(r, lkb, error);
|
|
goto out;
|
|
}
|
|
|
|
reply = !down_conversion(lkb);
|
|
|
|
error = do_convert(r, lkb);
|
|
if (reply)
|
|
send_convert_reply(r, lkb, error);
|
|
do_convert_effects(r, lkb, error);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
|
|
fail:
|
|
setup_stub_lkb(ls, ms);
|
|
send_convert_reply(&ls->ls_stub_rsb, &ls->ls_stub_lkb, error);
|
|
return error;
|
|
}
|
|
|
|
static int receive_unlock(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
goto fail;
|
|
|
|
if (lkb->lkb_remid != ms->m_lkid) {
|
|
log_error(ls, "receive_unlock %x remid %x remote %d %x",
|
|
lkb->lkb_id, lkb->lkb_remid,
|
|
ms->m_header.h_nodeid, ms->m_lkid);
|
|
error = -ENOENT;
|
|
dlm_put_lkb(lkb);
|
|
goto fail;
|
|
}
|
|
|
|
r = lkb->lkb_resource;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
receive_flags(lkb, ms);
|
|
|
|
error = receive_unlock_args(ls, lkb, ms);
|
|
if (error) {
|
|
send_unlock_reply(r, lkb, error);
|
|
goto out;
|
|
}
|
|
|
|
error = do_unlock(r, lkb);
|
|
send_unlock_reply(r, lkb, error);
|
|
do_unlock_effects(r, lkb, error);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
|
|
fail:
|
|
setup_stub_lkb(ls, ms);
|
|
send_unlock_reply(&ls->ls_stub_rsb, &ls->ls_stub_lkb, error);
|
|
return error;
|
|
}
|
|
|
|
static int receive_cancel(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
goto fail;
|
|
|
|
receive_flags(lkb, ms);
|
|
|
|
r = lkb->lkb_resource;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
error = do_cancel(r, lkb);
|
|
send_cancel_reply(r, lkb, error);
|
|
do_cancel_effects(r, lkb, error);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
|
|
fail:
|
|
setup_stub_lkb(ls, ms);
|
|
send_cancel_reply(&ls->ls_stub_rsb, &ls->ls_stub_lkb, error);
|
|
return error;
|
|
}
|
|
|
|
static int receive_grant(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
return error;
|
|
|
|
r = lkb->lkb_resource;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
receive_flags_reply(lkb, ms);
|
|
if (is_altmode(lkb))
|
|
munge_altmode(lkb, ms);
|
|
grant_lock_pc(r, lkb, ms);
|
|
queue_cast(r, lkb, 0);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
}
|
|
|
|
static int receive_bast(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
return error;
|
|
|
|
r = lkb->lkb_resource;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
queue_bast(r, lkb, ms->m_bastmode);
|
|
lkb->lkb_highbast = ms->m_bastmode;
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
}
|
|
|
|
static void receive_lookup(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
int len, error, ret_nodeid, from_nodeid, our_nodeid;
|
|
|
|
from_nodeid = ms->m_header.h_nodeid;
|
|
our_nodeid = dlm_our_nodeid();
|
|
|
|
len = receive_extralen(ms);
|
|
|
|
error = dlm_master_lookup(ls, from_nodeid, ms->m_extra, len, 0,
|
|
&ret_nodeid, NULL);
|
|
|
|
/* Optimization: we're master so treat lookup as a request */
|
|
if (!error && ret_nodeid == our_nodeid) {
|
|
receive_request(ls, ms);
|
|
return;
|
|
}
|
|
send_lookup_reply(ls, ms, ret_nodeid, error);
|
|
}
|
|
|
|
static void receive_remove(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
char name[DLM_RESNAME_MAXLEN+1];
|
|
struct dlm_rsb *r;
|
|
uint32_t hash, b;
|
|
int rv, len, dir_nodeid, from_nodeid;
|
|
|
|
from_nodeid = ms->m_header.h_nodeid;
|
|
|
|
len = receive_extralen(ms);
|
|
|
|
if (len > DLM_RESNAME_MAXLEN) {
|
|
log_error(ls, "receive_remove from %d bad len %d",
|
|
from_nodeid, len);
|
|
return;
|
|
}
|
|
|
|
dir_nodeid = dlm_hash2nodeid(ls, ms->m_hash);
|
|
if (dir_nodeid != dlm_our_nodeid()) {
|
|
log_error(ls, "receive_remove from %d bad nodeid %d",
|
|
from_nodeid, dir_nodeid);
|
|
return;
|
|
}
|
|
|
|
/* Look for name on rsbtbl.toss, if it's there, kill it.
|
|
If it's on rsbtbl.keep, it's being used, and we should ignore this
|
|
message. This is an expected race between the dir node sending a
|
|
request to the master node at the same time as the master node sends
|
|
a remove to the dir node. The resolution to that race is for the
|
|
dir node to ignore the remove message, and the master node to
|
|
recreate the master rsb when it gets a request from the dir node for
|
|
an rsb it doesn't have. */
|
|
|
|
memset(name, 0, sizeof(name));
|
|
memcpy(name, ms->m_extra, len);
|
|
|
|
hash = jhash(name, len, 0);
|
|
b = hash & (ls->ls_rsbtbl_size - 1);
|
|
|
|
spin_lock(&ls->ls_rsbtbl[b].lock);
|
|
|
|
rv = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].toss, name, len, &r);
|
|
if (rv) {
|
|
/* verify the rsb is on keep list per comment above */
|
|
rv = dlm_search_rsb_tree(&ls->ls_rsbtbl[b].keep, name, len, &r);
|
|
if (rv) {
|
|
/* should not happen */
|
|
log_error(ls, "receive_remove from %d not found %s",
|
|
from_nodeid, name);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
return;
|
|
}
|
|
if (r->res_master_nodeid != from_nodeid) {
|
|
/* should not happen */
|
|
log_error(ls, "receive_remove keep from %d master %d",
|
|
from_nodeid, r->res_master_nodeid);
|
|
dlm_print_rsb(r);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
return;
|
|
}
|
|
|
|
log_debug(ls, "receive_remove from %d master %d first %x %s",
|
|
from_nodeid, r->res_master_nodeid, r->res_first_lkid,
|
|
name);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
return;
|
|
}
|
|
|
|
if (r->res_master_nodeid != from_nodeid) {
|
|
log_error(ls, "receive_remove toss from %d master %d",
|
|
from_nodeid, r->res_master_nodeid);
|
|
dlm_print_rsb(r);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
return;
|
|
}
|
|
|
|
if (kref_put(&r->res_ref, kill_rsb)) {
|
|
rb_erase(&r->res_hashnode, &ls->ls_rsbtbl[b].toss);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
dlm_free_rsb(r);
|
|
} else {
|
|
log_error(ls, "receive_remove from %d rsb ref error",
|
|
from_nodeid);
|
|
dlm_print_rsb(r);
|
|
spin_unlock(&ls->ls_rsbtbl[b].lock);
|
|
}
|
|
}
|
|
|
|
static void receive_purge(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
do_purge(ls, ms->m_nodeid, ms->m_pid);
|
|
}
|
|
|
|
static int receive_request_reply(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int error, mstype, result;
|
|
int from_nodeid = ms->m_header.h_nodeid;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
return error;
|
|
|
|
r = lkb->lkb_resource;
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
mstype = lkb->lkb_wait_type;
|
|
error = remove_from_waiters(lkb, DLM_MSG_REQUEST_REPLY);
|
|
if (error) {
|
|
log_error(ls, "receive_request_reply %x remote %d %x result %d",
|
|
lkb->lkb_id, from_nodeid, ms->m_lkid, ms->m_result);
|
|
dlm_dump_rsb(r);
|
|
goto out;
|
|
}
|
|
|
|
/* Optimization: the dir node was also the master, so it took our
|
|
lookup as a request and sent request reply instead of lookup reply */
|
|
if (mstype == DLM_MSG_LOOKUP) {
|
|
r->res_master_nodeid = from_nodeid;
|
|
r->res_nodeid = from_nodeid;
|
|
lkb->lkb_nodeid = from_nodeid;
|
|
}
|
|
|
|
/* this is the value returned from do_request() on the master */
|
|
result = ms->m_result;
|
|
|
|
switch (result) {
|
|
case -EAGAIN:
|
|
/* request would block (be queued) on remote master */
|
|
queue_cast(r, lkb, -EAGAIN);
|
|
confirm_master(r, -EAGAIN);
|
|
unhold_lkb(lkb); /* undoes create_lkb() */
|
|
break;
|
|
|
|
case -EINPROGRESS:
|
|
case 0:
|
|
/* request was queued or granted on remote master */
|
|
receive_flags_reply(lkb, ms);
|
|
lkb->lkb_remid = ms->m_lkid;
|
|
if (is_altmode(lkb))
|
|
munge_altmode(lkb, ms);
|
|
if (result) {
|
|
add_lkb(r, lkb, DLM_LKSTS_WAITING);
|
|
add_timeout(lkb);
|
|
} else {
|
|
grant_lock_pc(r, lkb, ms);
|
|
queue_cast(r, lkb, 0);
|
|
}
|
|
confirm_master(r, result);
|
|
break;
|
|
|
|
case -EBADR:
|
|
case -ENOTBLK:
|
|
/* find_rsb failed to find rsb or rsb wasn't master */
|
|
log_limit(ls, "receive_request_reply %x from %d %d "
|
|
"master %d dir %d first %x %s", lkb->lkb_id,
|
|
from_nodeid, result, r->res_master_nodeid,
|
|
r->res_dir_nodeid, r->res_first_lkid, r->res_name);
|
|
|
|
if (r->res_dir_nodeid != dlm_our_nodeid() &&
|
|
r->res_master_nodeid != dlm_our_nodeid()) {
|
|
/* cause _request_lock->set_master->send_lookup */
|
|
r->res_master_nodeid = 0;
|
|
r->res_nodeid = -1;
|
|
lkb->lkb_nodeid = -1;
|
|
}
|
|
|
|
if (is_overlap(lkb)) {
|
|
/* we'll ignore error in cancel/unlock reply */
|
|
queue_cast_overlap(r, lkb);
|
|
confirm_master(r, result);
|
|
unhold_lkb(lkb); /* undoes create_lkb() */
|
|
} else {
|
|
_request_lock(r, lkb);
|
|
|
|
if (r->res_master_nodeid == dlm_our_nodeid())
|
|
confirm_master(r, 0);
|
|
}
|
|
break;
|
|
|
|
default:
|
|
log_error(ls, "receive_request_reply %x error %d",
|
|
lkb->lkb_id, result);
|
|
}
|
|
|
|
if (is_overlap_unlock(lkb) && (result == 0 || result == -EINPROGRESS)) {
|
|
log_debug(ls, "receive_request_reply %x result %d unlock",
|
|
lkb->lkb_id, result);
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_UNLOCK;
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_CANCEL;
|
|
send_unlock(r, lkb);
|
|
} else if (is_overlap_cancel(lkb) && (result == -EINPROGRESS)) {
|
|
log_debug(ls, "receive_request_reply %x cancel", lkb->lkb_id);
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_UNLOCK;
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_CANCEL;
|
|
send_cancel(r, lkb);
|
|
} else {
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_CANCEL;
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_UNLOCK;
|
|
}
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
}
|
|
|
|
static void __receive_convert_reply(struct dlm_rsb *r, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms)
|
|
{
|
|
/* this is the value returned from do_convert() on the master */
|
|
switch (ms->m_result) {
|
|
case -EAGAIN:
|
|
/* convert would block (be queued) on remote master */
|
|
queue_cast(r, lkb, -EAGAIN);
|
|
break;
|
|
|
|
case -EDEADLK:
|
|
receive_flags_reply(lkb, ms);
|
|
revert_lock_pc(r, lkb);
|
|
queue_cast(r, lkb, -EDEADLK);
|
|
break;
|
|
|
|
case -EINPROGRESS:
|
|
/* convert was queued on remote master */
|
|
receive_flags_reply(lkb, ms);
|
|
if (is_demoted(lkb))
|
|
munge_demoted(lkb);
|
|
del_lkb(r, lkb);
|
|
add_lkb(r, lkb, DLM_LKSTS_CONVERT);
|
|
add_timeout(lkb);
|
|
break;
|
|
|
|
case 0:
|
|
/* convert was granted on remote master */
|
|
receive_flags_reply(lkb, ms);
|
|
if (is_demoted(lkb))
|
|
munge_demoted(lkb);
|
|
grant_lock_pc(r, lkb, ms);
|
|
queue_cast(r, lkb, 0);
|
|
break;
|
|
|
|
default:
|
|
log_error(r->res_ls, "receive_convert_reply %x remote %d %x %d",
|
|
lkb->lkb_id, ms->m_header.h_nodeid, ms->m_lkid,
|
|
ms->m_result);
|
|
dlm_print_rsb(r);
|
|
dlm_print_lkb(lkb);
|
|
}
|
|
}
|
|
|
|
static void _receive_convert_reply(struct dlm_lkb *lkb, struct dlm_message *ms)
|
|
{
|
|
struct dlm_rsb *r = lkb->lkb_resource;
|
|
int error;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
/* stub reply can happen with waiters_mutex held */
|
|
error = remove_from_waiters_ms(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
__receive_convert_reply(r, lkb, ms);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
}
|
|
|
|
static int receive_convert_reply(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
int error;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
return error;
|
|
|
|
_receive_convert_reply(lkb, ms);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
}
|
|
|
|
static void _receive_unlock_reply(struct dlm_lkb *lkb, struct dlm_message *ms)
|
|
{
|
|
struct dlm_rsb *r = lkb->lkb_resource;
|
|
int error;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
/* stub reply can happen with waiters_mutex held */
|
|
error = remove_from_waiters_ms(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
/* this is the value returned from do_unlock() on the master */
|
|
|
|
switch (ms->m_result) {
|
|
case -DLM_EUNLOCK:
|
|
receive_flags_reply(lkb, ms);
|
|
remove_lock_pc(r, lkb);
|
|
queue_cast(r, lkb, -DLM_EUNLOCK);
|
|
break;
|
|
case -ENOENT:
|
|
break;
|
|
default:
|
|
log_error(r->res_ls, "receive_unlock_reply %x error %d",
|
|
lkb->lkb_id, ms->m_result);
|
|
}
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
}
|
|
|
|
static int receive_unlock_reply(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
int error;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
return error;
|
|
|
|
_receive_unlock_reply(lkb, ms);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
}
|
|
|
|
static void _receive_cancel_reply(struct dlm_lkb *lkb, struct dlm_message *ms)
|
|
{
|
|
struct dlm_rsb *r = lkb->lkb_resource;
|
|
int error;
|
|
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_message(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
/* stub reply can happen with waiters_mutex held */
|
|
error = remove_from_waiters_ms(lkb, ms);
|
|
if (error)
|
|
goto out;
|
|
|
|
/* this is the value returned from do_cancel() on the master */
|
|
|
|
switch (ms->m_result) {
|
|
case -DLM_ECANCEL:
|
|
receive_flags_reply(lkb, ms);
|
|
revert_lock_pc(r, lkb);
|
|
queue_cast(r, lkb, -DLM_ECANCEL);
|
|
break;
|
|
case 0:
|
|
break;
|
|
default:
|
|
log_error(r->res_ls, "receive_cancel_reply %x error %d",
|
|
lkb->lkb_id, ms->m_result);
|
|
}
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
}
|
|
|
|
static int receive_cancel_reply(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
int error;
|
|
|
|
error = find_lkb(ls, ms->m_remid, &lkb);
|
|
if (error)
|
|
return error;
|
|
|
|
_receive_cancel_reply(lkb, ms);
|
|
dlm_put_lkb(lkb);
|
|
return 0;
|
|
}
|
|
|
|
static void receive_lookup_reply(struct dlm_ls *ls, struct dlm_message *ms)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int error, ret_nodeid;
|
|
int do_lookup_list = 0;
|
|
|
|
error = find_lkb(ls, ms->m_lkid, &lkb);
|
|
if (error) {
|
|
log_error(ls, "receive_lookup_reply no lkid %x", ms->m_lkid);
|
|
return;
|
|
}
|
|
|
|
/* ms->m_result is the value returned by dlm_master_lookup on dir node
|
|
FIXME: will a non-zero error ever be returned? */
|
|
|
|
r = lkb->lkb_resource;
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = remove_from_waiters(lkb, DLM_MSG_LOOKUP_REPLY);
|
|
if (error)
|
|
goto out;
|
|
|
|
ret_nodeid = ms->m_nodeid;
|
|
|
|
/* We sometimes receive a request from the dir node for this
|
|
rsb before we've received the dir node's loookup_reply for it.
|
|
The request from the dir node implies we're the master, so we set
|
|
ourself as master in receive_request_reply, and verify here that
|
|
we are indeed the master. */
|
|
|
|
if (r->res_master_nodeid && (r->res_master_nodeid != ret_nodeid)) {
|
|
/* This should never happen */
|
|
log_error(ls, "receive_lookup_reply %x from %d ret %d "
|
|
"master %d dir %d our %d first %x %s",
|
|
lkb->lkb_id, ms->m_header.h_nodeid, ret_nodeid,
|
|
r->res_master_nodeid, r->res_dir_nodeid,
|
|
dlm_our_nodeid(), r->res_first_lkid, r->res_name);
|
|
}
|
|
|
|
if (ret_nodeid == dlm_our_nodeid()) {
|
|
r->res_master_nodeid = ret_nodeid;
|
|
r->res_nodeid = 0;
|
|
do_lookup_list = 1;
|
|
r->res_first_lkid = 0;
|
|
} else if (ret_nodeid == -1) {
|
|
/* the remote node doesn't believe it's the dir node */
|
|
log_error(ls, "receive_lookup_reply %x from %d bad ret_nodeid",
|
|
lkb->lkb_id, ms->m_header.h_nodeid);
|
|
r->res_master_nodeid = 0;
|
|
r->res_nodeid = -1;
|
|
lkb->lkb_nodeid = -1;
|
|
} else {
|
|
/* set_master() will set lkb_nodeid from r */
|
|
r->res_master_nodeid = ret_nodeid;
|
|
r->res_nodeid = ret_nodeid;
|
|
}
|
|
|
|
if (is_overlap(lkb)) {
|
|
log_debug(ls, "receive_lookup_reply %x unlock %x",
|
|
lkb->lkb_id, lkb->lkb_flags);
|
|
queue_cast_overlap(r, lkb);
|
|
unhold_lkb(lkb); /* undoes create_lkb() */
|
|
goto out_list;
|
|
}
|
|
|
|
_request_lock(r, lkb);
|
|
|
|
out_list:
|
|
if (do_lookup_list)
|
|
process_lookup_list(r);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
|
|
static void _receive_message(struct dlm_ls *ls, struct dlm_message *ms,
|
|
uint32_t saved_seq)
|
|
{
|
|
int error = 0, noent = 0;
|
|
|
|
if (!dlm_is_member(ls, ms->m_header.h_nodeid)) {
|
|
log_limit(ls, "receive %d from non-member %d %x %x %d",
|
|
ms->m_type, ms->m_header.h_nodeid, ms->m_lkid,
|
|
ms->m_remid, ms->m_result);
|
|
return;
|
|
}
|
|
|
|
switch (ms->m_type) {
|
|
|
|
/* messages sent to a master node */
|
|
|
|
case DLM_MSG_REQUEST:
|
|
error = receive_request(ls, ms);
|
|
break;
|
|
|
|
case DLM_MSG_CONVERT:
|
|
error = receive_convert(ls, ms);
|
|
break;
|
|
|
|
case DLM_MSG_UNLOCK:
|
|
error = receive_unlock(ls, ms);
|
|
break;
|
|
|
|
case DLM_MSG_CANCEL:
|
|
noent = 1;
|
|
error = receive_cancel(ls, ms);
|
|
break;
|
|
|
|
/* messages sent from a master node (replies to above) */
|
|
|
|
case DLM_MSG_REQUEST_REPLY:
|
|
error = receive_request_reply(ls, ms);
|
|
break;
|
|
|
|
case DLM_MSG_CONVERT_REPLY:
|
|
error = receive_convert_reply(ls, ms);
|
|
break;
|
|
|
|
case DLM_MSG_UNLOCK_REPLY:
|
|
error = receive_unlock_reply(ls, ms);
|
|
break;
|
|
|
|
case DLM_MSG_CANCEL_REPLY:
|
|
error = receive_cancel_reply(ls, ms);
|
|
break;
|
|
|
|
/* messages sent from a master node (only two types of async msg) */
|
|
|
|
case DLM_MSG_GRANT:
|
|
noent = 1;
|
|
error = receive_grant(ls, ms);
|
|
break;
|
|
|
|
case DLM_MSG_BAST:
|
|
noent = 1;
|
|
error = receive_bast(ls, ms);
|
|
break;
|
|
|
|
/* messages sent to a dir node */
|
|
|
|
case DLM_MSG_LOOKUP:
|
|
receive_lookup(ls, ms);
|
|
break;
|
|
|
|
case DLM_MSG_REMOVE:
|
|
receive_remove(ls, ms);
|
|
break;
|
|
|
|
/* messages sent from a dir node (remove has no reply) */
|
|
|
|
case DLM_MSG_LOOKUP_REPLY:
|
|
receive_lookup_reply(ls, ms);
|
|
break;
|
|
|
|
/* other messages */
|
|
|
|
case DLM_MSG_PURGE:
|
|
receive_purge(ls, ms);
|
|
break;
|
|
|
|
default:
|
|
log_error(ls, "unknown message type %d", ms->m_type);
|
|
}
|
|
|
|
/*
|
|
* When checking for ENOENT, we're checking the result of
|
|
* find_lkb(m_remid):
|
|
*
|
|
* The lock id referenced in the message wasn't found. This may
|
|
* happen in normal usage for the async messages and cancel, so
|
|
* only use log_debug for them.
|
|
*
|
|
* Some errors are expected and normal.
|
|
*/
|
|
|
|
if (error == -ENOENT && noent) {
|
|
log_debug(ls, "receive %d no %x remote %d %x saved_seq %u",
|
|
ms->m_type, ms->m_remid, ms->m_header.h_nodeid,
|
|
ms->m_lkid, saved_seq);
|
|
} else if (error == -ENOENT) {
|
|
log_error(ls, "receive %d no %x remote %d %x saved_seq %u",
|
|
ms->m_type, ms->m_remid, ms->m_header.h_nodeid,
|
|
ms->m_lkid, saved_seq);
|
|
|
|
if (ms->m_type == DLM_MSG_CONVERT)
|
|
dlm_dump_rsb_hash(ls, ms->m_hash);
|
|
}
|
|
|
|
if (error == -EINVAL) {
|
|
log_error(ls, "receive %d inval from %d lkid %x remid %x "
|
|
"saved_seq %u",
|
|
ms->m_type, ms->m_header.h_nodeid,
|
|
ms->m_lkid, ms->m_remid, saved_seq);
|
|
}
|
|
}
|
|
|
|
/* If the lockspace is in recovery mode (locking stopped), then normal
|
|
messages are saved on the requestqueue for processing after recovery is
|
|
done. When not in recovery mode, we wait for dlm_recoverd to drain saved
|
|
messages off the requestqueue before we process new ones. This occurs right
|
|
after recovery completes when we transition from saving all messages on
|
|
requestqueue, to processing all the saved messages, to processing new
|
|
messages as they arrive. */
|
|
|
|
static void dlm_receive_message(struct dlm_ls *ls, struct dlm_message *ms,
|
|
int nodeid)
|
|
{
|
|
if (dlm_locking_stopped(ls)) {
|
|
/* If we were a member of this lockspace, left, and rejoined,
|
|
other nodes may still be sending us messages from the
|
|
lockspace generation before we left. */
|
|
if (!ls->ls_generation) {
|
|
log_limit(ls, "receive %d from %d ignore old gen",
|
|
ms->m_type, nodeid);
|
|
return;
|
|
}
|
|
|
|
dlm_add_requestqueue(ls, nodeid, ms);
|
|
} else {
|
|
dlm_wait_requestqueue(ls);
|
|
_receive_message(ls, ms, 0);
|
|
}
|
|
}
|
|
|
|
/* This is called by dlm_recoverd to process messages that were saved on
|
|
the requestqueue. */
|
|
|
|
void dlm_receive_message_saved(struct dlm_ls *ls, struct dlm_message *ms,
|
|
uint32_t saved_seq)
|
|
{
|
|
_receive_message(ls, ms, saved_seq);
|
|
}
|
|
|
|
/* This is called by the midcomms layer when something is received for
|
|
the lockspace. It could be either a MSG (normal message sent as part of
|
|
standard locking activity) or an RCOM (recovery message sent as part of
|
|
lockspace recovery). */
|
|
|
|
void dlm_receive_buffer(union dlm_packet *p, int nodeid)
|
|
{
|
|
struct dlm_header *hd = &p->header;
|
|
struct dlm_ls *ls;
|
|
int type = 0;
|
|
|
|
switch (hd->h_cmd) {
|
|
case DLM_MSG:
|
|
dlm_message_in(&p->message);
|
|
type = p->message.m_type;
|
|
break;
|
|
case DLM_RCOM:
|
|
dlm_rcom_in(&p->rcom);
|
|
type = p->rcom.rc_type;
|
|
break;
|
|
default:
|
|
log_print("invalid h_cmd %d from %u", hd->h_cmd, nodeid);
|
|
return;
|
|
}
|
|
|
|
if (hd->h_nodeid != nodeid) {
|
|
log_print("invalid h_nodeid %d from %d lockspace %x",
|
|
hd->h_nodeid, nodeid, hd->h_lockspace);
|
|
return;
|
|
}
|
|
|
|
ls = dlm_find_lockspace_global(hd->h_lockspace);
|
|
if (!ls) {
|
|
if (dlm_config.ci_log_debug) {
|
|
printk_ratelimited(KERN_DEBUG "dlm: invalid lockspace "
|
|
"%u from %d cmd %d type %d\n",
|
|
hd->h_lockspace, nodeid, hd->h_cmd, type);
|
|
}
|
|
|
|
if (hd->h_cmd == DLM_RCOM && type == DLM_RCOM_STATUS)
|
|
dlm_send_ls_not_ready(nodeid, &p->rcom);
|
|
return;
|
|
}
|
|
|
|
/* this rwsem allows dlm_ls_stop() to wait for all dlm_recv threads to
|
|
be inactive (in this ls) before transitioning to recovery mode */
|
|
|
|
down_read(&ls->ls_recv_active);
|
|
if (hd->h_cmd == DLM_MSG)
|
|
dlm_receive_message(ls, &p->message, nodeid);
|
|
else
|
|
dlm_receive_rcom(ls, &p->rcom, nodeid);
|
|
up_read(&ls->ls_recv_active);
|
|
|
|
dlm_put_lockspace(ls);
|
|
}
|
|
|
|
static void recover_convert_waiter(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_message *ms_stub)
|
|
{
|
|
if (middle_conversion(lkb)) {
|
|
hold_lkb(lkb);
|
|
memset(ms_stub, 0, sizeof(struct dlm_message));
|
|
ms_stub->m_flags = DLM_IFL_STUB_MS;
|
|
ms_stub->m_type = DLM_MSG_CONVERT_REPLY;
|
|
ms_stub->m_result = -EINPROGRESS;
|
|
ms_stub->m_header.h_nodeid = lkb->lkb_nodeid;
|
|
_receive_convert_reply(lkb, ms_stub);
|
|
|
|
/* Same special case as in receive_rcom_lock_args() */
|
|
lkb->lkb_grmode = DLM_LOCK_IV;
|
|
rsb_set_flag(lkb->lkb_resource, RSB_RECOVER_CONVERT);
|
|
unhold_lkb(lkb);
|
|
|
|
} else if (lkb->lkb_rqmode >= lkb->lkb_grmode) {
|
|
lkb->lkb_flags |= DLM_IFL_RESEND;
|
|
}
|
|
|
|
/* lkb->lkb_rqmode < lkb->lkb_grmode shouldn't happen since down
|
|
conversions are async; there's no reply from the remote master */
|
|
}
|
|
|
|
/* A waiting lkb needs recovery if the master node has failed, or
|
|
the master node is changing (only when no directory is used) */
|
|
|
|
static int waiter_needs_recovery(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
int dir_nodeid)
|
|
{
|
|
if (dlm_no_directory(ls))
|
|
return 1;
|
|
|
|
if (dlm_is_removed(ls, lkb->lkb_wait_nodeid))
|
|
return 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Recovery for locks that are waiting for replies from nodes that are now
|
|
gone. We can just complete unlocks and cancels by faking a reply from the
|
|
dead node. Requests and up-conversions we flag to be resent after
|
|
recovery. Down-conversions can just be completed with a fake reply like
|
|
unlocks. Conversions between PR and CW need special attention. */
|
|
|
|
void dlm_recover_waiters_pre(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_lkb *lkb, *safe;
|
|
struct dlm_message *ms_stub;
|
|
int wait_type, stub_unlock_result, stub_cancel_result;
|
|
int dir_nodeid;
|
|
|
|
ms_stub = kmalloc(sizeof(*ms_stub), GFP_KERNEL);
|
|
if (!ms_stub)
|
|
return;
|
|
|
|
mutex_lock(&ls->ls_waiters_mutex);
|
|
|
|
list_for_each_entry_safe(lkb, safe, &ls->ls_waiters, lkb_wait_reply) {
|
|
|
|
dir_nodeid = dlm_dir_nodeid(lkb->lkb_resource);
|
|
|
|
/* exclude debug messages about unlocks because there can be so
|
|
many and they aren't very interesting */
|
|
|
|
if (lkb->lkb_wait_type != DLM_MSG_UNLOCK) {
|
|
log_debug(ls, "waiter %x remote %x msg %d r_nodeid %d "
|
|
"lkb_nodeid %d wait_nodeid %d dir_nodeid %d",
|
|
lkb->lkb_id,
|
|
lkb->lkb_remid,
|
|
lkb->lkb_wait_type,
|
|
lkb->lkb_resource->res_nodeid,
|
|
lkb->lkb_nodeid,
|
|
lkb->lkb_wait_nodeid,
|
|
dir_nodeid);
|
|
}
|
|
|
|
/* all outstanding lookups, regardless of destination will be
|
|
resent after recovery is done */
|
|
|
|
if (lkb->lkb_wait_type == DLM_MSG_LOOKUP) {
|
|
lkb->lkb_flags |= DLM_IFL_RESEND;
|
|
continue;
|
|
}
|
|
|
|
if (!waiter_needs_recovery(ls, lkb, dir_nodeid))
|
|
continue;
|
|
|
|
wait_type = lkb->lkb_wait_type;
|
|
stub_unlock_result = -DLM_EUNLOCK;
|
|
stub_cancel_result = -DLM_ECANCEL;
|
|
|
|
/* Main reply may have been received leaving a zero wait_type,
|
|
but a reply for the overlapping op may not have been
|
|
received. In that case we need to fake the appropriate
|
|
reply for the overlap op. */
|
|
|
|
if (!wait_type) {
|
|
if (is_overlap_cancel(lkb)) {
|
|
wait_type = DLM_MSG_CANCEL;
|
|
if (lkb->lkb_grmode == DLM_LOCK_IV)
|
|
stub_cancel_result = 0;
|
|
}
|
|
if (is_overlap_unlock(lkb)) {
|
|
wait_type = DLM_MSG_UNLOCK;
|
|
if (lkb->lkb_grmode == DLM_LOCK_IV)
|
|
stub_unlock_result = -ENOENT;
|
|
}
|
|
|
|
log_debug(ls, "rwpre overlap %x %x %d %d %d",
|
|
lkb->lkb_id, lkb->lkb_flags, wait_type,
|
|
stub_cancel_result, stub_unlock_result);
|
|
}
|
|
|
|
switch (wait_type) {
|
|
|
|
case DLM_MSG_REQUEST:
|
|
lkb->lkb_flags |= DLM_IFL_RESEND;
|
|
break;
|
|
|
|
case DLM_MSG_CONVERT:
|
|
recover_convert_waiter(ls, lkb, ms_stub);
|
|
break;
|
|
|
|
case DLM_MSG_UNLOCK:
|
|
hold_lkb(lkb);
|
|
memset(ms_stub, 0, sizeof(struct dlm_message));
|
|
ms_stub->m_flags = DLM_IFL_STUB_MS;
|
|
ms_stub->m_type = DLM_MSG_UNLOCK_REPLY;
|
|
ms_stub->m_result = stub_unlock_result;
|
|
ms_stub->m_header.h_nodeid = lkb->lkb_nodeid;
|
|
_receive_unlock_reply(lkb, ms_stub);
|
|
dlm_put_lkb(lkb);
|
|
break;
|
|
|
|
case DLM_MSG_CANCEL:
|
|
hold_lkb(lkb);
|
|
memset(ms_stub, 0, sizeof(struct dlm_message));
|
|
ms_stub->m_flags = DLM_IFL_STUB_MS;
|
|
ms_stub->m_type = DLM_MSG_CANCEL_REPLY;
|
|
ms_stub->m_result = stub_cancel_result;
|
|
ms_stub->m_header.h_nodeid = lkb->lkb_nodeid;
|
|
_receive_cancel_reply(lkb, ms_stub);
|
|
dlm_put_lkb(lkb);
|
|
break;
|
|
|
|
default:
|
|
log_error(ls, "invalid lkb wait_type %d %d",
|
|
lkb->lkb_wait_type, wait_type);
|
|
}
|
|
schedule();
|
|
}
|
|
mutex_unlock(&ls->ls_waiters_mutex);
|
|
kfree(ms_stub);
|
|
}
|
|
|
|
static struct dlm_lkb *find_resend_waiter(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
int found = 0;
|
|
|
|
mutex_lock(&ls->ls_waiters_mutex);
|
|
list_for_each_entry(lkb, &ls->ls_waiters, lkb_wait_reply) {
|
|
if (lkb->lkb_flags & DLM_IFL_RESEND) {
|
|
hold_lkb(lkb);
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
mutex_unlock(&ls->ls_waiters_mutex);
|
|
|
|
if (!found)
|
|
lkb = NULL;
|
|
return lkb;
|
|
}
|
|
|
|
/* Deal with lookups and lkb's marked RESEND from _pre. We may now be the
|
|
master or dir-node for r. Processing the lkb may result in it being placed
|
|
back on waiters. */
|
|
|
|
/* We do this after normal locking has been enabled and any saved messages
|
|
(in requestqueue) have been processed. We should be confident that at
|
|
this point we won't get or process a reply to any of these waiting
|
|
operations. But, new ops may be coming in on the rsbs/locks here from
|
|
userspace or remotely. */
|
|
|
|
/* there may have been an overlap unlock/cancel prior to recovery or after
|
|
recovery. if before, the lkb may still have a pos wait_count; if after, the
|
|
overlap flag would just have been set and nothing new sent. we can be
|
|
confident here than any replies to either the initial op or overlap ops
|
|
prior to recovery have been received. */
|
|
|
|
int dlm_recover_waiters_post(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_rsb *r;
|
|
int error = 0, mstype, err, oc, ou;
|
|
|
|
while (1) {
|
|
if (dlm_locking_stopped(ls)) {
|
|
log_debug(ls, "recover_waiters_post aborted");
|
|
error = -EINTR;
|
|
break;
|
|
}
|
|
|
|
lkb = find_resend_waiter(ls);
|
|
if (!lkb)
|
|
break;
|
|
|
|
r = lkb->lkb_resource;
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
mstype = lkb->lkb_wait_type;
|
|
oc = is_overlap_cancel(lkb);
|
|
ou = is_overlap_unlock(lkb);
|
|
err = 0;
|
|
|
|
log_debug(ls, "waiter %x remote %x msg %d r_nodeid %d "
|
|
"lkb_nodeid %d wait_nodeid %d dir_nodeid %d "
|
|
"overlap %d %d", lkb->lkb_id, lkb->lkb_remid, mstype,
|
|
r->res_nodeid, lkb->lkb_nodeid, lkb->lkb_wait_nodeid,
|
|
dlm_dir_nodeid(r), oc, ou);
|
|
|
|
/* At this point we assume that we won't get a reply to any
|
|
previous op or overlap op on this lock. First, do a big
|
|
remove_from_waiters() for all previous ops. */
|
|
|
|
lkb->lkb_flags &= ~DLM_IFL_RESEND;
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_UNLOCK;
|
|
lkb->lkb_flags &= ~DLM_IFL_OVERLAP_CANCEL;
|
|
lkb->lkb_wait_type = 0;
|
|
lkb->lkb_wait_count = 0;
|
|
mutex_lock(&ls->ls_waiters_mutex);
|
|
list_del_init(&lkb->lkb_wait_reply);
|
|
mutex_unlock(&ls->ls_waiters_mutex);
|
|
unhold_lkb(lkb); /* for waiters list */
|
|
|
|
if (oc || ou) {
|
|
/* do an unlock or cancel instead of resending */
|
|
switch (mstype) {
|
|
case DLM_MSG_LOOKUP:
|
|
case DLM_MSG_REQUEST:
|
|
queue_cast(r, lkb, ou ? -DLM_EUNLOCK :
|
|
-DLM_ECANCEL);
|
|
unhold_lkb(lkb); /* undoes create_lkb() */
|
|
break;
|
|
case DLM_MSG_CONVERT:
|
|
if (oc) {
|
|
queue_cast(r, lkb, -DLM_ECANCEL);
|
|
} else {
|
|
lkb->lkb_exflags |= DLM_LKF_FORCEUNLOCK;
|
|
_unlock_lock(r, lkb);
|
|
}
|
|
break;
|
|
default:
|
|
err = 1;
|
|
}
|
|
} else {
|
|
switch (mstype) {
|
|
case DLM_MSG_LOOKUP:
|
|
case DLM_MSG_REQUEST:
|
|
_request_lock(r, lkb);
|
|
if (is_master(r))
|
|
confirm_master(r, 0);
|
|
break;
|
|
case DLM_MSG_CONVERT:
|
|
_convert_lock(r, lkb);
|
|
break;
|
|
default:
|
|
err = 1;
|
|
}
|
|
}
|
|
|
|
if (err) {
|
|
log_error(ls, "waiter %x msg %d r_nodeid %d "
|
|
"dir_nodeid %d overlap %d %d",
|
|
lkb->lkb_id, mstype, r->res_nodeid,
|
|
dlm_dir_nodeid(r), oc, ou);
|
|
}
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
static void purge_mstcpy_list(struct dlm_ls *ls, struct dlm_rsb *r,
|
|
struct list_head *list)
|
|
{
|
|
struct dlm_lkb *lkb, *safe;
|
|
|
|
list_for_each_entry_safe(lkb, safe, list, lkb_statequeue) {
|
|
if (!is_master_copy(lkb))
|
|
continue;
|
|
|
|
/* don't purge lkbs we've added in recover_master_copy for
|
|
the current recovery seq */
|
|
|
|
if (lkb->lkb_recover_seq == ls->ls_recover_seq)
|
|
continue;
|
|
|
|
del_lkb(r, lkb);
|
|
|
|
/* this put should free the lkb */
|
|
if (!dlm_put_lkb(lkb))
|
|
log_error(ls, "purged mstcpy lkb not released");
|
|
}
|
|
}
|
|
|
|
void dlm_purge_mstcpy_locks(struct dlm_rsb *r)
|
|
{
|
|
struct dlm_ls *ls = r->res_ls;
|
|
|
|
purge_mstcpy_list(ls, r, &r->res_grantqueue);
|
|
purge_mstcpy_list(ls, r, &r->res_convertqueue);
|
|
purge_mstcpy_list(ls, r, &r->res_waitqueue);
|
|
}
|
|
|
|
static void purge_dead_list(struct dlm_ls *ls, struct dlm_rsb *r,
|
|
struct list_head *list,
|
|
int nodeid_gone, unsigned int *count)
|
|
{
|
|
struct dlm_lkb *lkb, *safe;
|
|
|
|
list_for_each_entry_safe(lkb, safe, list, lkb_statequeue) {
|
|
if (!is_master_copy(lkb))
|
|
continue;
|
|
|
|
if ((lkb->lkb_nodeid == nodeid_gone) ||
|
|
dlm_is_removed(ls, lkb->lkb_nodeid)) {
|
|
|
|
/* tell recover_lvb to invalidate the lvb
|
|
because a node holding EX/PW failed */
|
|
if ((lkb->lkb_exflags & DLM_LKF_VALBLK) &&
|
|
(lkb->lkb_grmode >= DLM_LOCK_PW)) {
|
|
rsb_set_flag(r, RSB_RECOVER_LVB_INVAL);
|
|
}
|
|
|
|
del_lkb(r, lkb);
|
|
|
|
/* this put should free the lkb */
|
|
if (!dlm_put_lkb(lkb))
|
|
log_error(ls, "purged dead lkb not released");
|
|
|
|
rsb_set_flag(r, RSB_RECOVER_GRANT);
|
|
|
|
(*count)++;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Get rid of locks held by nodes that are gone. */
|
|
|
|
void dlm_recover_purge(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_rsb *r;
|
|
struct dlm_member *memb;
|
|
int nodes_count = 0;
|
|
int nodeid_gone = 0;
|
|
unsigned int lkb_count = 0;
|
|
|
|
/* cache one removed nodeid to optimize the common
|
|
case of a single node removed */
|
|
|
|
list_for_each_entry(memb, &ls->ls_nodes_gone, list) {
|
|
nodes_count++;
|
|
nodeid_gone = memb->nodeid;
|
|
}
|
|
|
|
if (!nodes_count)
|
|
return;
|
|
|
|
down_write(&ls->ls_root_sem);
|
|
list_for_each_entry(r, &ls->ls_root_list, res_root_list) {
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
if (is_master(r)) {
|
|
purge_dead_list(ls, r, &r->res_grantqueue,
|
|
nodeid_gone, &lkb_count);
|
|
purge_dead_list(ls, r, &r->res_convertqueue,
|
|
nodeid_gone, &lkb_count);
|
|
purge_dead_list(ls, r, &r->res_waitqueue,
|
|
nodeid_gone, &lkb_count);
|
|
}
|
|
unlock_rsb(r);
|
|
unhold_rsb(r);
|
|
cond_resched();
|
|
}
|
|
up_write(&ls->ls_root_sem);
|
|
|
|
if (lkb_count)
|
|
log_rinfo(ls, "dlm_recover_purge %u locks for %u nodes",
|
|
lkb_count, nodes_count);
|
|
}
|
|
|
|
static struct dlm_rsb *find_grant_rsb(struct dlm_ls *ls, int bucket)
|
|
{
|
|
struct rb_node *n;
|
|
struct dlm_rsb *r;
|
|
|
|
spin_lock(&ls->ls_rsbtbl[bucket].lock);
|
|
for (n = rb_first(&ls->ls_rsbtbl[bucket].keep); n; n = rb_next(n)) {
|
|
r = rb_entry(n, struct dlm_rsb, res_hashnode);
|
|
|
|
if (!rsb_flag(r, RSB_RECOVER_GRANT))
|
|
continue;
|
|
if (!is_master(r)) {
|
|
rsb_clear_flag(r, RSB_RECOVER_GRANT);
|
|
continue;
|
|
}
|
|
hold_rsb(r);
|
|
spin_unlock(&ls->ls_rsbtbl[bucket].lock);
|
|
return r;
|
|
}
|
|
spin_unlock(&ls->ls_rsbtbl[bucket].lock);
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Attempt to grant locks on resources that we are the master of.
|
|
* Locks may have become grantable during recovery because locks
|
|
* from departed nodes have been purged (or not rebuilt), allowing
|
|
* previously blocked locks to now be granted. The subset of rsb's
|
|
* we are interested in are those with lkb's on either the convert or
|
|
* waiting queues.
|
|
*
|
|
* Simplest would be to go through each master rsb and check for non-empty
|
|
* convert or waiting queues, and attempt to grant on those rsbs.
|
|
* Checking the queues requires lock_rsb, though, for which we'd need
|
|
* to release the rsbtbl lock. This would make iterating through all
|
|
* rsb's very inefficient. So, we rely on earlier recovery routines
|
|
* to set RECOVER_GRANT on any rsb's that we should attempt to grant
|
|
* locks for.
|
|
*/
|
|
|
|
void dlm_recover_grant(struct dlm_ls *ls)
|
|
{
|
|
struct dlm_rsb *r;
|
|
int bucket = 0;
|
|
unsigned int count = 0;
|
|
unsigned int rsb_count = 0;
|
|
unsigned int lkb_count = 0;
|
|
|
|
while (1) {
|
|
r = find_grant_rsb(ls, bucket);
|
|
if (!r) {
|
|
if (bucket == ls->ls_rsbtbl_size - 1)
|
|
break;
|
|
bucket++;
|
|
continue;
|
|
}
|
|
rsb_count++;
|
|
count = 0;
|
|
lock_rsb(r);
|
|
/* the RECOVER_GRANT flag is checked in the grant path */
|
|
grant_pending_locks(r, &count);
|
|
rsb_clear_flag(r, RSB_RECOVER_GRANT);
|
|
lkb_count += count;
|
|
confirm_master(r, 0);
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
cond_resched();
|
|
}
|
|
|
|
if (lkb_count)
|
|
log_rinfo(ls, "dlm_recover_grant %u locks on %u resources",
|
|
lkb_count, rsb_count);
|
|
}
|
|
|
|
static struct dlm_lkb *search_remid_list(struct list_head *head, int nodeid,
|
|
uint32_t remid)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
|
|
list_for_each_entry(lkb, head, lkb_statequeue) {
|
|
if (lkb->lkb_nodeid == nodeid && lkb->lkb_remid == remid)
|
|
return lkb;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static struct dlm_lkb *search_remid(struct dlm_rsb *r, int nodeid,
|
|
uint32_t remid)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
|
|
lkb = search_remid_list(&r->res_grantqueue, nodeid, remid);
|
|
if (lkb)
|
|
return lkb;
|
|
lkb = search_remid_list(&r->res_convertqueue, nodeid, remid);
|
|
if (lkb)
|
|
return lkb;
|
|
lkb = search_remid_list(&r->res_waitqueue, nodeid, remid);
|
|
if (lkb)
|
|
return lkb;
|
|
return NULL;
|
|
}
|
|
|
|
/* needs at least dlm_rcom + rcom_lock */
|
|
static int receive_rcom_lock_args(struct dlm_ls *ls, struct dlm_lkb *lkb,
|
|
struct dlm_rsb *r, struct dlm_rcom *rc)
|
|
{
|
|
struct rcom_lock *rl = (struct rcom_lock *) rc->rc_buf;
|
|
|
|
lkb->lkb_nodeid = rc->rc_header.h_nodeid;
|
|
lkb->lkb_ownpid = le32_to_cpu(rl->rl_ownpid);
|
|
lkb->lkb_remid = le32_to_cpu(rl->rl_lkid);
|
|
lkb->lkb_exflags = le32_to_cpu(rl->rl_exflags);
|
|
lkb->lkb_flags = le32_to_cpu(rl->rl_flags) & 0x0000FFFF;
|
|
lkb->lkb_flags |= DLM_IFL_MSTCPY;
|
|
lkb->lkb_lvbseq = le32_to_cpu(rl->rl_lvbseq);
|
|
lkb->lkb_rqmode = rl->rl_rqmode;
|
|
lkb->lkb_grmode = rl->rl_grmode;
|
|
/* don't set lkb_status because add_lkb wants to itself */
|
|
|
|
lkb->lkb_bastfn = (rl->rl_asts & DLM_CB_BAST) ? &fake_bastfn : NULL;
|
|
lkb->lkb_astfn = (rl->rl_asts & DLM_CB_CAST) ? &fake_astfn : NULL;
|
|
|
|
if (lkb->lkb_exflags & DLM_LKF_VALBLK) {
|
|
int lvblen = rc->rc_header.h_length - sizeof(struct dlm_rcom) -
|
|
sizeof(struct rcom_lock);
|
|
if (lvblen > ls->ls_lvblen)
|
|
return -EINVAL;
|
|
lkb->lkb_lvbptr = dlm_allocate_lvb(ls);
|
|
if (!lkb->lkb_lvbptr)
|
|
return -ENOMEM;
|
|
memcpy(lkb->lkb_lvbptr, rl->rl_lvb, lvblen);
|
|
}
|
|
|
|
/* Conversions between PR and CW (middle modes) need special handling.
|
|
The real granted mode of these converting locks cannot be determined
|
|
until all locks have been rebuilt on the rsb (recover_conversion) */
|
|
|
|
if (rl->rl_wait_type == cpu_to_le16(DLM_MSG_CONVERT) &&
|
|
middle_conversion(lkb)) {
|
|
rl->rl_status = DLM_LKSTS_CONVERT;
|
|
lkb->lkb_grmode = DLM_LOCK_IV;
|
|
rsb_set_flag(r, RSB_RECOVER_CONVERT);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* This lkb may have been recovered in a previous aborted recovery so we need
|
|
to check if the rsb already has an lkb with the given remote nodeid/lkid.
|
|
If so we just send back a standard reply. If not, we create a new lkb with
|
|
the given values and send back our lkid. We send back our lkid by sending
|
|
back the rcom_lock struct we got but with the remid field filled in. */
|
|
|
|
/* needs at least dlm_rcom + rcom_lock */
|
|
int dlm_recover_master_copy(struct dlm_ls *ls, struct dlm_rcom *rc)
|
|
{
|
|
struct rcom_lock *rl = (struct rcom_lock *) rc->rc_buf;
|
|
struct dlm_rsb *r;
|
|
struct dlm_lkb *lkb;
|
|
uint32_t remid = 0;
|
|
int from_nodeid = rc->rc_header.h_nodeid;
|
|
int error;
|
|
|
|
if (rl->rl_parent_lkid) {
|
|
error = -EOPNOTSUPP;
|
|
goto out;
|
|
}
|
|
|
|
remid = le32_to_cpu(rl->rl_lkid);
|
|
|
|
/* In general we expect the rsb returned to be R_MASTER, but we don't
|
|
have to require it. Recovery of masters on one node can overlap
|
|
recovery of locks on another node, so one node can send us MSTCPY
|
|
locks before we've made ourselves master of this rsb. We can still
|
|
add new MSTCPY locks that we receive here without any harm; when
|
|
we make ourselves master, dlm_recover_masters() won't touch the
|
|
MSTCPY locks we've received early. */
|
|
|
|
error = find_rsb(ls, rl->rl_name, le16_to_cpu(rl->rl_namelen),
|
|
from_nodeid, R_RECEIVE_RECOVER, &r);
|
|
if (error)
|
|
goto out;
|
|
|
|
lock_rsb(r);
|
|
|
|
if (dlm_no_directory(ls) && (dlm_dir_nodeid(r) != dlm_our_nodeid())) {
|
|
log_error(ls, "dlm_recover_master_copy remote %d %x not dir",
|
|
from_nodeid, remid);
|
|
error = -EBADR;
|
|
goto out_unlock;
|
|
}
|
|
|
|
lkb = search_remid(r, from_nodeid, remid);
|
|
if (lkb) {
|
|
error = -EEXIST;
|
|
goto out_remid;
|
|
}
|
|
|
|
error = create_lkb(ls, &lkb);
|
|
if (error)
|
|
goto out_unlock;
|
|
|
|
error = receive_rcom_lock_args(ls, lkb, r, rc);
|
|
if (error) {
|
|
__put_lkb(ls, lkb);
|
|
goto out_unlock;
|
|
}
|
|
|
|
attach_lkb(r, lkb);
|
|
add_lkb(r, lkb, rl->rl_status);
|
|
error = 0;
|
|
ls->ls_recover_locks_in++;
|
|
|
|
if (!list_empty(&r->res_waitqueue) || !list_empty(&r->res_convertqueue))
|
|
rsb_set_flag(r, RSB_RECOVER_GRANT);
|
|
|
|
out_remid:
|
|
/* this is the new value returned to the lock holder for
|
|
saving in its process-copy lkb */
|
|
rl->rl_remid = cpu_to_le32(lkb->lkb_id);
|
|
|
|
lkb->lkb_recover_seq = ls->ls_recover_seq;
|
|
|
|
out_unlock:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
out:
|
|
if (error && error != -EEXIST)
|
|
log_rinfo(ls, "dlm_recover_master_copy remote %d %x error %d",
|
|
from_nodeid, remid, error);
|
|
rl->rl_result = cpu_to_le32(error);
|
|
return error;
|
|
}
|
|
|
|
/* needs at least dlm_rcom + rcom_lock */
|
|
int dlm_recover_process_copy(struct dlm_ls *ls, struct dlm_rcom *rc)
|
|
{
|
|
struct rcom_lock *rl = (struct rcom_lock *) rc->rc_buf;
|
|
struct dlm_rsb *r;
|
|
struct dlm_lkb *lkb;
|
|
uint32_t lkid, remid;
|
|
int error, result;
|
|
|
|
lkid = le32_to_cpu(rl->rl_lkid);
|
|
remid = le32_to_cpu(rl->rl_remid);
|
|
result = le32_to_cpu(rl->rl_result);
|
|
|
|
error = find_lkb(ls, lkid, &lkb);
|
|
if (error) {
|
|
log_error(ls, "dlm_recover_process_copy no %x remote %d %x %d",
|
|
lkid, rc->rc_header.h_nodeid, remid, result);
|
|
return error;
|
|
}
|
|
|
|
r = lkb->lkb_resource;
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
if (!is_process_copy(lkb)) {
|
|
log_error(ls, "dlm_recover_process_copy bad %x remote %d %x %d",
|
|
lkid, rc->rc_header.h_nodeid, remid, result);
|
|
dlm_dump_rsb(r);
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (result) {
|
|
case -EBADR:
|
|
/* There's a chance the new master received our lock before
|
|
dlm_recover_master_reply(), this wouldn't happen if we did
|
|
a barrier between recover_masters and recover_locks. */
|
|
|
|
log_debug(ls, "dlm_recover_process_copy %x remote %d %x %d",
|
|
lkid, rc->rc_header.h_nodeid, remid, result);
|
|
|
|
dlm_send_rcom_lock(r, lkb);
|
|
goto out;
|
|
case -EEXIST:
|
|
case 0:
|
|
lkb->lkb_remid = remid;
|
|
break;
|
|
default:
|
|
log_error(ls, "dlm_recover_process_copy %x remote %d %x %d unk",
|
|
lkid, rc->rc_header.h_nodeid, remid, result);
|
|
}
|
|
|
|
/* an ack for dlm_recover_locks() which waits for replies from
|
|
all the locks it sends to new masters */
|
|
dlm_recovered_lock(r);
|
|
out:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
dlm_put_lkb(lkb);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int dlm_user_request(struct dlm_ls *ls, struct dlm_user_args *ua,
|
|
int mode, uint32_t flags, void *name, unsigned int namelen,
|
|
unsigned long timeout_cs)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_args args;
|
|
int error;
|
|
|
|
dlm_lock_recovery(ls);
|
|
|
|
error = create_lkb(ls, &lkb);
|
|
if (error) {
|
|
kfree(ua);
|
|
goto out;
|
|
}
|
|
|
|
if (flags & DLM_LKF_VALBLK) {
|
|
ua->lksb.sb_lvbptr = kzalloc(DLM_USER_LVB_LEN, GFP_NOFS);
|
|
if (!ua->lksb.sb_lvbptr) {
|
|
kfree(ua);
|
|
__put_lkb(ls, lkb);
|
|
error = -ENOMEM;
|
|
goto out;
|
|
}
|
|
}
|
|
error = set_lock_args(mode, &ua->lksb, flags, namelen, timeout_cs,
|
|
fake_astfn, ua, fake_bastfn, &args);
|
|
if (error) {
|
|
kfree(ua->lksb.sb_lvbptr);
|
|
ua->lksb.sb_lvbptr = NULL;
|
|
kfree(ua);
|
|
__put_lkb(ls, lkb);
|
|
goto out;
|
|
}
|
|
|
|
/* After ua is attached to lkb it will be freed by dlm_free_lkb().
|
|
When DLM_IFL_USER is set, the dlm knows that this is a userspace
|
|
lock and that lkb_astparam is the dlm_user_args structure. */
|
|
lkb->lkb_flags |= DLM_IFL_USER;
|
|
error = request_lock(ls, lkb, name, namelen, &args);
|
|
|
|
switch (error) {
|
|
case 0:
|
|
break;
|
|
case -EINPROGRESS:
|
|
error = 0;
|
|
break;
|
|
case -EAGAIN:
|
|
error = 0;
|
|
/* fall through */
|
|
default:
|
|
__put_lkb(ls, lkb);
|
|
goto out;
|
|
}
|
|
|
|
/* add this new lkb to the per-process list of locks */
|
|
spin_lock(&ua->proc->locks_spin);
|
|
hold_lkb(lkb);
|
|
list_add_tail(&lkb->lkb_ownqueue, &ua->proc->locks);
|
|
spin_unlock(&ua->proc->locks_spin);
|
|
out:
|
|
dlm_unlock_recovery(ls);
|
|
return error;
|
|
}
|
|
|
|
int dlm_user_convert(struct dlm_ls *ls, struct dlm_user_args *ua_tmp,
|
|
int mode, uint32_t flags, uint32_t lkid, char *lvb_in,
|
|
unsigned long timeout_cs)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_args args;
|
|
struct dlm_user_args *ua;
|
|
int error;
|
|
|
|
dlm_lock_recovery(ls);
|
|
|
|
error = find_lkb(ls, lkid, &lkb);
|
|
if (error)
|
|
goto out;
|
|
|
|
/* user can change the params on its lock when it converts it, or
|
|
add an lvb that didn't exist before */
|
|
|
|
ua = lkb->lkb_ua;
|
|
|
|
if (flags & DLM_LKF_VALBLK && !ua->lksb.sb_lvbptr) {
|
|
ua->lksb.sb_lvbptr = kzalloc(DLM_USER_LVB_LEN, GFP_NOFS);
|
|
if (!ua->lksb.sb_lvbptr) {
|
|
error = -ENOMEM;
|
|
goto out_put;
|
|
}
|
|
}
|
|
if (lvb_in && ua->lksb.sb_lvbptr)
|
|
memcpy(ua->lksb.sb_lvbptr, lvb_in, DLM_USER_LVB_LEN);
|
|
|
|
ua->xid = ua_tmp->xid;
|
|
ua->castparam = ua_tmp->castparam;
|
|
ua->castaddr = ua_tmp->castaddr;
|
|
ua->bastparam = ua_tmp->bastparam;
|
|
ua->bastaddr = ua_tmp->bastaddr;
|
|
ua->user_lksb = ua_tmp->user_lksb;
|
|
|
|
error = set_lock_args(mode, &ua->lksb, flags, 0, timeout_cs,
|
|
fake_astfn, ua, fake_bastfn, &args);
|
|
if (error)
|
|
goto out_put;
|
|
|
|
error = convert_lock(ls, lkb, &args);
|
|
|
|
if (error == -EINPROGRESS || error == -EAGAIN || error == -EDEADLK)
|
|
error = 0;
|
|
out_put:
|
|
dlm_put_lkb(lkb);
|
|
out:
|
|
dlm_unlock_recovery(ls);
|
|
kfree(ua_tmp);
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* The caller asks for an orphan lock on a given resource with a given mode.
|
|
* If a matching lock exists, it's moved to the owner's list of locks and
|
|
* the lkid is returned.
|
|
*/
|
|
|
|
int dlm_user_adopt_orphan(struct dlm_ls *ls, struct dlm_user_args *ua_tmp,
|
|
int mode, uint32_t flags, void *name, unsigned int namelen,
|
|
unsigned long timeout_cs, uint32_t *lkid)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_user_args *ua;
|
|
int found_other_mode = 0;
|
|
int found = 0;
|
|
int rv = 0;
|
|
|
|
mutex_lock(&ls->ls_orphans_mutex);
|
|
list_for_each_entry(lkb, &ls->ls_orphans, lkb_ownqueue) {
|
|
if (lkb->lkb_resource->res_length != namelen)
|
|
continue;
|
|
if (memcmp(lkb->lkb_resource->res_name, name, namelen))
|
|
continue;
|
|
if (lkb->lkb_grmode != mode) {
|
|
found_other_mode = 1;
|
|
continue;
|
|
}
|
|
|
|
found = 1;
|
|
list_del_init(&lkb->lkb_ownqueue);
|
|
lkb->lkb_flags &= ~DLM_IFL_ORPHAN;
|
|
*lkid = lkb->lkb_id;
|
|
break;
|
|
}
|
|
mutex_unlock(&ls->ls_orphans_mutex);
|
|
|
|
if (!found && found_other_mode) {
|
|
rv = -EAGAIN;
|
|
goto out;
|
|
}
|
|
|
|
if (!found) {
|
|
rv = -ENOENT;
|
|
goto out;
|
|
}
|
|
|
|
lkb->lkb_exflags = flags;
|
|
lkb->lkb_ownpid = (int) current->pid;
|
|
|
|
ua = lkb->lkb_ua;
|
|
|
|
ua->proc = ua_tmp->proc;
|
|
ua->xid = ua_tmp->xid;
|
|
ua->castparam = ua_tmp->castparam;
|
|
ua->castaddr = ua_tmp->castaddr;
|
|
ua->bastparam = ua_tmp->bastparam;
|
|
ua->bastaddr = ua_tmp->bastaddr;
|
|
ua->user_lksb = ua_tmp->user_lksb;
|
|
|
|
/*
|
|
* The lkb reference from the ls_orphans list was not
|
|
* removed above, and is now considered the reference
|
|
* for the proc locks list.
|
|
*/
|
|
|
|
spin_lock(&ua->proc->locks_spin);
|
|
list_add_tail(&lkb->lkb_ownqueue, &ua->proc->locks);
|
|
spin_unlock(&ua->proc->locks_spin);
|
|
out:
|
|
kfree(ua_tmp);
|
|
return rv;
|
|
}
|
|
|
|
int dlm_user_unlock(struct dlm_ls *ls, struct dlm_user_args *ua_tmp,
|
|
uint32_t flags, uint32_t lkid, char *lvb_in)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_args args;
|
|
struct dlm_user_args *ua;
|
|
int error;
|
|
|
|
dlm_lock_recovery(ls);
|
|
|
|
error = find_lkb(ls, lkid, &lkb);
|
|
if (error)
|
|
goto out;
|
|
|
|
ua = lkb->lkb_ua;
|
|
|
|
if (lvb_in && ua->lksb.sb_lvbptr)
|
|
memcpy(ua->lksb.sb_lvbptr, lvb_in, DLM_USER_LVB_LEN);
|
|
if (ua_tmp->castparam)
|
|
ua->castparam = ua_tmp->castparam;
|
|
ua->user_lksb = ua_tmp->user_lksb;
|
|
|
|
error = set_unlock_args(flags, ua, &args);
|
|
if (error)
|
|
goto out_put;
|
|
|
|
error = unlock_lock(ls, lkb, &args);
|
|
|
|
if (error == -DLM_EUNLOCK)
|
|
error = 0;
|
|
/* from validate_unlock_args() */
|
|
if (error == -EBUSY && (flags & DLM_LKF_FORCEUNLOCK))
|
|
error = 0;
|
|
if (error)
|
|
goto out_put;
|
|
|
|
spin_lock(&ua->proc->locks_spin);
|
|
/* dlm_user_add_cb() may have already taken lkb off the proc list */
|
|
if (!list_empty(&lkb->lkb_ownqueue))
|
|
list_move(&lkb->lkb_ownqueue, &ua->proc->unlocking);
|
|
spin_unlock(&ua->proc->locks_spin);
|
|
out_put:
|
|
dlm_put_lkb(lkb);
|
|
out:
|
|
dlm_unlock_recovery(ls);
|
|
kfree(ua_tmp);
|
|
return error;
|
|
}
|
|
|
|
int dlm_user_cancel(struct dlm_ls *ls, struct dlm_user_args *ua_tmp,
|
|
uint32_t flags, uint32_t lkid)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_args args;
|
|
struct dlm_user_args *ua;
|
|
int error;
|
|
|
|
dlm_lock_recovery(ls);
|
|
|
|
error = find_lkb(ls, lkid, &lkb);
|
|
if (error)
|
|
goto out;
|
|
|
|
ua = lkb->lkb_ua;
|
|
if (ua_tmp->castparam)
|
|
ua->castparam = ua_tmp->castparam;
|
|
ua->user_lksb = ua_tmp->user_lksb;
|
|
|
|
error = set_unlock_args(flags, ua, &args);
|
|
if (error)
|
|
goto out_put;
|
|
|
|
error = cancel_lock(ls, lkb, &args);
|
|
|
|
if (error == -DLM_ECANCEL)
|
|
error = 0;
|
|
/* from validate_unlock_args() */
|
|
if (error == -EBUSY)
|
|
error = 0;
|
|
out_put:
|
|
dlm_put_lkb(lkb);
|
|
out:
|
|
dlm_unlock_recovery(ls);
|
|
kfree(ua_tmp);
|
|
return error;
|
|
}
|
|
|
|
int dlm_user_deadlock(struct dlm_ls *ls, uint32_t flags, uint32_t lkid)
|
|
{
|
|
struct dlm_lkb *lkb;
|
|
struct dlm_args args;
|
|
struct dlm_user_args *ua;
|
|
struct dlm_rsb *r;
|
|
int error;
|
|
|
|
dlm_lock_recovery(ls);
|
|
|
|
error = find_lkb(ls, lkid, &lkb);
|
|
if (error)
|
|
goto out;
|
|
|
|
ua = lkb->lkb_ua;
|
|
|
|
error = set_unlock_args(flags, ua, &args);
|
|
if (error)
|
|
goto out_put;
|
|
|
|
/* same as cancel_lock(), but set DEADLOCK_CANCEL after lock_rsb */
|
|
|
|
r = lkb->lkb_resource;
|
|
hold_rsb(r);
|
|
lock_rsb(r);
|
|
|
|
error = validate_unlock_args(lkb, &args);
|
|
if (error)
|
|
goto out_r;
|
|
lkb->lkb_flags |= DLM_IFL_DEADLOCK_CANCEL;
|
|
|
|
error = _cancel_lock(r, lkb);
|
|
out_r:
|
|
unlock_rsb(r);
|
|
put_rsb(r);
|
|
|
|
if (error == -DLM_ECANCEL)
|
|
error = 0;
|
|
/* from validate_unlock_args() */
|
|
if (error == -EBUSY)
|
|
error = 0;
|
|
out_put:
|
|
dlm_put_lkb(lkb);
|
|
out:
|
|
dlm_unlock_recovery(ls);
|
|
return error;
|
|
}
|
|
|
|
/* lkb's that are removed from the waiters list by revert are just left on the
|
|
orphans list with the granted orphan locks, to be freed by purge */
|
|
|
|
static int orphan_proc_lock(struct dlm_ls *ls, struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_args args;
|
|
int error;
|
|
|
|
hold_lkb(lkb); /* reference for the ls_orphans list */
|
|
mutex_lock(&ls->ls_orphans_mutex);
|
|
list_add_tail(&lkb->lkb_ownqueue, &ls->ls_orphans);
|
|
mutex_unlock(&ls->ls_orphans_mutex);
|
|
|
|
set_unlock_args(0, lkb->lkb_ua, &args);
|
|
|
|
error = cancel_lock(ls, lkb, &args);
|
|
if (error == -DLM_ECANCEL)
|
|
error = 0;
|
|
return error;
|
|
}
|
|
|
|
/* The FORCEUNLOCK flag allows the unlock to go ahead even if the lkb isn't
|
|
granted. Regardless of what rsb queue the lock is on, it's removed and
|
|
freed. The IVVALBLK flag causes the lvb on the resource to be invalidated
|
|
if our lock is PW/EX (it's ignored if our granted mode is smaller.) */
|
|
|
|
static int unlock_proc_lock(struct dlm_ls *ls, struct dlm_lkb *lkb)
|
|
{
|
|
struct dlm_args args;
|
|
int error;
|
|
|
|
set_unlock_args(DLM_LKF_FORCEUNLOCK | DLM_LKF_IVVALBLK,
|
|
lkb->lkb_ua, &args);
|
|
|
|
error = unlock_lock(ls, lkb, &args);
|
|
if (error == -DLM_EUNLOCK)
|
|
error = 0;
|
|
return error;
|
|
}
|
|
|
|
/* We have to release clear_proc_locks mutex before calling unlock_proc_lock()
|
|
(which does lock_rsb) due to deadlock with receiving a message that does
|
|
lock_rsb followed by dlm_user_add_cb() */
|
|
|
|
static struct dlm_lkb *del_proc_lock(struct dlm_ls *ls,
|
|
struct dlm_user_proc *proc)
|
|
{
|
|
struct dlm_lkb *lkb = NULL;
|
|
|
|
mutex_lock(&ls->ls_clear_proc_locks);
|
|
if (list_empty(&proc->locks))
|
|
goto out;
|
|
|
|
lkb = list_entry(proc->locks.next, struct dlm_lkb, lkb_ownqueue);
|
|
list_del_init(&lkb->lkb_ownqueue);
|
|
|
|
if (lkb->lkb_exflags & DLM_LKF_PERSISTENT)
|
|
lkb->lkb_flags |= DLM_IFL_ORPHAN;
|
|
else
|
|
lkb->lkb_flags |= DLM_IFL_DEAD;
|
|
out:
|
|
mutex_unlock(&ls->ls_clear_proc_locks);
|
|
return lkb;
|
|
}
|
|
|
|
/* The ls_clear_proc_locks mutex protects against dlm_user_add_cb() which
|
|
1) references lkb->ua which we free here and 2) adds lkbs to proc->asts,
|
|
which we clear here. */
|
|
|
|
/* proc CLOSING flag is set so no more device_reads should look at proc->asts
|
|
list, and no more device_writes should add lkb's to proc->locks list; so we
|
|
shouldn't need to take asts_spin or locks_spin here. this assumes that
|
|
device reads/writes/closes are serialized -- FIXME: we may need to serialize
|
|
them ourself. */
|
|
|
|
void dlm_clear_proc_locks(struct dlm_ls *ls, struct dlm_user_proc *proc)
|
|
{
|
|
struct dlm_lkb *lkb, *safe;
|
|
|
|
dlm_lock_recovery(ls);
|
|
|
|
while (1) {
|
|
lkb = del_proc_lock(ls, proc);
|
|
if (!lkb)
|
|
break;
|
|
del_timeout(lkb);
|
|
if (lkb->lkb_exflags & DLM_LKF_PERSISTENT)
|
|
orphan_proc_lock(ls, lkb);
|
|
else
|
|
unlock_proc_lock(ls, lkb);
|
|
|
|
/* this removes the reference for the proc->locks list
|
|
added by dlm_user_request, it may result in the lkb
|
|
being freed */
|
|
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
|
|
mutex_lock(&ls->ls_clear_proc_locks);
|
|
|
|
/* in-progress unlocks */
|
|
list_for_each_entry_safe(lkb, safe, &proc->unlocking, lkb_ownqueue) {
|
|
list_del_init(&lkb->lkb_ownqueue);
|
|
lkb->lkb_flags |= DLM_IFL_DEAD;
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
|
|
list_for_each_entry_safe(lkb, safe, &proc->asts, lkb_cb_list) {
|
|
memset(&lkb->lkb_callbacks, 0,
|
|
sizeof(struct dlm_callback) * DLM_CALLBACKS_SIZE);
|
|
list_del_init(&lkb->lkb_cb_list);
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
|
|
mutex_unlock(&ls->ls_clear_proc_locks);
|
|
dlm_unlock_recovery(ls);
|
|
}
|
|
|
|
static void purge_proc_locks(struct dlm_ls *ls, struct dlm_user_proc *proc)
|
|
{
|
|
struct dlm_lkb *lkb, *safe;
|
|
|
|
while (1) {
|
|
lkb = NULL;
|
|
spin_lock(&proc->locks_spin);
|
|
if (!list_empty(&proc->locks)) {
|
|
lkb = list_entry(proc->locks.next, struct dlm_lkb,
|
|
lkb_ownqueue);
|
|
list_del_init(&lkb->lkb_ownqueue);
|
|
}
|
|
spin_unlock(&proc->locks_spin);
|
|
|
|
if (!lkb)
|
|
break;
|
|
|
|
lkb->lkb_flags |= DLM_IFL_DEAD;
|
|
unlock_proc_lock(ls, lkb);
|
|
dlm_put_lkb(lkb); /* ref from proc->locks list */
|
|
}
|
|
|
|
spin_lock(&proc->locks_spin);
|
|
list_for_each_entry_safe(lkb, safe, &proc->unlocking, lkb_ownqueue) {
|
|
list_del_init(&lkb->lkb_ownqueue);
|
|
lkb->lkb_flags |= DLM_IFL_DEAD;
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
spin_unlock(&proc->locks_spin);
|
|
|
|
spin_lock(&proc->asts_spin);
|
|
list_for_each_entry_safe(lkb, safe, &proc->asts, lkb_cb_list) {
|
|
memset(&lkb->lkb_callbacks, 0,
|
|
sizeof(struct dlm_callback) * DLM_CALLBACKS_SIZE);
|
|
list_del_init(&lkb->lkb_cb_list);
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
spin_unlock(&proc->asts_spin);
|
|
}
|
|
|
|
/* pid of 0 means purge all orphans */
|
|
|
|
static void do_purge(struct dlm_ls *ls, int nodeid, int pid)
|
|
{
|
|
struct dlm_lkb *lkb, *safe;
|
|
|
|
mutex_lock(&ls->ls_orphans_mutex);
|
|
list_for_each_entry_safe(lkb, safe, &ls->ls_orphans, lkb_ownqueue) {
|
|
if (pid && lkb->lkb_ownpid != pid)
|
|
continue;
|
|
unlock_proc_lock(ls, lkb);
|
|
list_del_init(&lkb->lkb_ownqueue);
|
|
dlm_put_lkb(lkb);
|
|
}
|
|
mutex_unlock(&ls->ls_orphans_mutex);
|
|
}
|
|
|
|
static int send_purge(struct dlm_ls *ls, int nodeid, int pid)
|
|
{
|
|
struct dlm_message *ms;
|
|
struct dlm_mhandle *mh;
|
|
int error;
|
|
|
|
error = _create_message(ls, sizeof(struct dlm_message), nodeid,
|
|
DLM_MSG_PURGE, &ms, &mh);
|
|
if (error)
|
|
return error;
|
|
ms->m_nodeid = nodeid;
|
|
ms->m_pid = pid;
|
|
|
|
return send_message(mh, ms);
|
|
}
|
|
|
|
int dlm_user_purge(struct dlm_ls *ls, struct dlm_user_proc *proc,
|
|
int nodeid, int pid)
|
|
{
|
|
int error = 0;
|
|
|
|
if (nodeid && (nodeid != dlm_our_nodeid())) {
|
|
error = send_purge(ls, nodeid, pid);
|
|
} else {
|
|
dlm_lock_recovery(ls);
|
|
if (pid == current->pid)
|
|
purge_proc_locks(ls, proc);
|
|
else
|
|
do_purge(ls, nodeid, pid);
|
|
dlm_unlock_recovery(ls);
|
|
}
|
|
return error;
|
|
}
|
|
|