Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp257643imu; Thu, 8 Nov 2018 19:09:51 -0800 (PST) X-Google-Smtp-Source: AJdET5f1Hm7T6gcefFuDUbPFbetgs+Md1vjnWdUCEakSqC6K6sgOWOXEdRYQibHX/UYAM75l1U6X X-Received: by 2002:a62:8a91:: with SMTP id o17-v6mr7236764pfk.210.1541732991665; Thu, 08 Nov 2018 19:09:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541732991; cv=none; d=google.com; s=arc-20160816; b=0e40d/ex3aFa/DOnXP7Yx/ZVOwXpINeTdJ0PlNliu1A/T8s+V10SHHswUsGT3dv/sz 1njbEnU0HjmcVw54o1CYn3HC8omuFq3hPDS2aaNNkTCXNMAsiGzkDq4KEgMElKsp3LFx EQxsPWbMSUm5m2mCyDa7AmhlHWH/peeR7QGO2hs/rUOZ8MM8Vpr5lcXo2LGXiqfI+UPW wayDFB42AnbmRRwrrPMBAuXXIb4KH8LauRvXlBezMPZXfrMV+Q7cg0p2jV7+uIlWsdrc ldgARGWvYRwr+yvdGt5FgisfLprBAFaAPtcVYiVa/6G+kkhYDzk383jW0PAUaJdMCAA1 AwGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=pNNF1IJYTi/5MWvzt91TEaZFTci9UrrbAWyEMnk7QIQ=; b=okPADT/8gElqmYHv90k2iQ0ym4VE3UF6wUfzjhtyURVhy5pEjaumNYfT9A9JsX3RXH E908spXNADSCPIcsuX5uqL4BuGH57JIyIPsG99ludVUpBC+Cbw2wxqDVMuHDXz3ejwc8 ZYBnGBaYkTw/MrDrXctlHzcCU6JTSwuaSv/cJVc1Yuz6XfdSfUzP88oNuxEHxBpzzFC0 ozeajtG2fOM4MpZMQnHkQQ4Je/ez/G0ek+ZEGaApn6fQglTUsmW+a1tFfHfmtT5n1yQZ R6twLDrJX5JNodjJPl8Gbis8iK0ELQyP9SYyBHxLDaL2LWGKEBdNN7+KRUyrPzrR9Rb4 W8mw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z18si4966983pgk.367.2018.11.08.19.09.35; Thu, 08 Nov 2018 19:09:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727509AbeKIMru (ORCPT + 99 others); Fri, 9 Nov 2018 07:47:50 -0500 Received: from fieldses.org ([173.255.197.46]:39454 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727238AbeKIMrt (ORCPT ); Fri, 9 Nov 2018 07:47:49 -0500 Received: by fieldses.org (Postfix, from userid 2815) id CB2581E29; Thu, 8 Nov 2018 22:09:13 -0500 (EST) Date: Thu, 8 Nov 2018 22:09:13 -0500 From: "J. Bruce Fields" To: NeilBrown Cc: Jeff Layton , Alexander Viro , Martin Wilck , linux-fsdevel@vger.kernel.org, Frank Filz , linux-kernel@vger.kernel.org Subject: Re: [PATCH 10/12] fs/locks: create a tree of dependent requests. Message-ID: <20181109030913.GA8831@fieldses.org> References: <154138128401.31651.1381177427603557514.stgit@noble> <154138144796.31651.14201944346371750178.stgit@noble> <20181108213030.GF6090@fieldses.org> <87k1lnw0ec.fsf@notabene.neil.brown.name> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87k1lnw0ec.fsf@notabene.neil.brown.name> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 09, 2018 at 11:38:19AM +1100, NeilBrown wrote: > On Thu, Nov 08 2018, J. Bruce Fields wrote: > > > On Mon, Nov 05, 2018 at 12:30:48PM +1100, NeilBrown wrote: > >> When we find an existing lock which conflicts with a request, > >> and the request wants to wait, we currently add the request > >> to a list. When the lock is removed, the whole list is woken. > >> This can cause the thundering-herd problem. > >> To reduce the problem, we make use of the (new) fact that > >> a pending request can itself have a list of blocked requests. > >> When we find a conflict, we look through the existing blocked requests. > >> If any one of them blocks the new request, the new request is attached > >> below that request, otherwise it is added to the list of blocked > >> requests, which are now known to be mutually non-conflicting. > >> > >> This way, when the lock is released, only a set of non-conflicting > >> locks will be woken, the rest can stay asleep. > >> If the lock request cannot be granted and the request needs to be > >> requeued, all the other requests it blocks will then be woken > > > > So, to make sure I understand: the tree of blocking locks only ever has > > three levels (the active lock, the locks blocking on it, and their > > children?) > > Not correct. > Blocks is only vertical, never horizontal. Siblings never block each > other. > So one process hold a lock on a byte, and 27 other process want a lock > on that byte, then there will be 28 levels in a narrow tree - it is > effectively a queue. > Branching (via siblings) only happens when a child conflict with only > part of the lock held by the parent. > So if one process locks 32K, then two other processes request locks on > the 2 16K halves, then 4 processes request locks on the 8K quarters, and > so-on, then you could end up with 32767 processes in a binary tree, with > half of them all waiting on different individual bytes. Maybe I should actually read the code carefully instead of just skimming the changelog and jumping to conclusions. I think this is correct, but I wish we had an actual written-out argument that it's correct, because intuition isn't a great guide for posix file locks. Maybe: Waiting and applied locks are all kept in trees whose properties are: - the root of a tree may be an applied or unapplied lock. - every other node in the tree is an unapplied lock that conflicts with every ancestor of that node. Every such tree begins life as an unapplied singleton which obviously satisfies the above properties. The only ways we modify trees preserve these properties: 1. We may add a new child, but only after first verifying that it conflicts with all of its ancestors. 2. We may remove the root of a tree, creating a new singleton tree from the root and N new trees rooted in the immediate children. 3. If the root of a tree is not currently an applied lock, we may apply it (if possible). 4. We may upgrade the root of the tree (either extend its range, or upgrade its entire range from read to write). When an applied lock is modified in a way that reduces or downgrades any part of its range, we remove all its children (2 above). For each of those child trees: if the root of the tree applies, we do so (3). If it doesn't, it must conflict with some applied lock. We remove all of its children (2), and add it is a new leaf to the tree rooted in the applied lock (1). We then repeat the process recursively with those children. Something like that. --b. > > NeilBrown > > > > > --b. > > > >> > >> Reported-and-tested-by: Martin Wilck > >> Signed-off-by: NeilBrown > >> --- > >> fs/locks.c | 29 +++++++++++++++++++++++------ > >> 1 file changed, 23 insertions(+), 6 deletions(-) > >> > >> diff --git a/fs/locks.c b/fs/locks.c > >> index 802d5853acd5..1b0eac6b2918 100644 > >> --- a/fs/locks.c > >> +++ b/fs/locks.c > >> @@ -715,11 +715,25 @@ static void locks_delete_block(struct file_lock *waiter) > >> * fl_blocked list itself is protected by the blocked_lock_lock, but by ensuring > >> * that the flc_lock is also held on insertions we can avoid taking the > >> * blocked_lock_lock in some cases when we see that the fl_blocked list is empty. > >> + * > >> + * Rather than just adding to the list, we check for conflicts with any existing > >> + * waiters, and add beneath any waiter that blocks the new waiter. > >> + * Thus wakeups don't happen until needed. > >> */ > >> static void __locks_insert_block(struct file_lock *blocker, > >> - struct file_lock *waiter) > >> + struct file_lock *waiter, > >> + bool conflict(struct file_lock *, > >> + struct file_lock *)) > >> { > >> + struct file_lock *fl; > >> BUG_ON(!list_empty(&waiter->fl_block)); > >> + > >> +new_blocker: > >> + list_for_each_entry(fl, &blocker->fl_blocked, fl_block) > >> + if (conflict(fl, waiter)) { > >> + blocker = fl; > >> + goto new_blocker; > >> + } > >> waiter->fl_blocker = blocker; > >> list_add_tail(&waiter->fl_block, &blocker->fl_blocked); > >> if (IS_POSIX(blocker) && !IS_OFDLCK(blocker)) > >> @@ -734,10 +748,12 @@ static void __locks_insert_block(struct file_lock *blocker, > >> > >> /* Must be called with flc_lock held. */ > >> static void locks_insert_block(struct file_lock *blocker, > >> - struct file_lock *waiter) > >> + struct file_lock *waiter, > >> + bool conflict(struct file_lock *, > >> + struct file_lock *)) > >> { > >> spin_lock(&blocked_lock_lock); > >> - __locks_insert_block(blocker, waiter); > >> + __locks_insert_block(blocker, waiter, conflict); > >> spin_unlock(&blocked_lock_lock); > >> } > >> > >> @@ -996,7 +1012,7 @@ static int flock_lock_inode(struct inode *inode, struct file_lock *request) > >> if (!(request->fl_flags & FL_SLEEP)) > >> goto out; > >> error = FILE_LOCK_DEFERRED; > >> - locks_insert_block(fl, request); > >> + locks_insert_block(fl, request, flock_locks_conflict); > >> goto out; > >> } > >> if (request->fl_flags & FL_ACCESS) > >> @@ -1071,7 +1087,8 @@ static int posix_lock_inode(struct inode *inode, struct file_lock *request, > >> spin_lock(&blocked_lock_lock); > >> if (likely(!posix_locks_deadlock(request, fl))) { > >> error = FILE_LOCK_DEFERRED; > >> - __locks_insert_block(fl, request); > >> + __locks_insert_block(fl, request, > >> + posix_locks_conflict); > >> } > >> spin_unlock(&blocked_lock_lock); > >> goto out; > >> @@ -1542,7 +1559,7 @@ int __break_lease(struct inode *inode, unsigned int mode, unsigned int type) > >> break_time -= jiffies; > >> if (break_time == 0) > >> break_time++; > >> - locks_insert_block(fl, new_fl); > >> + locks_insert_block(fl, new_fl, leases_conflict); > >> trace_break_lease_block(inode, new_fl); > >> spin_unlock(&ctx->flc_lock); > >> percpu_up_read_preempt_enable(&file_rwsem); > >>