xfs_log_priv.h 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * Copyright (c) 2000-2003,2005 Silicon Graphics, Inc.
  4. * All Rights Reserved.
  5. */
  6. #ifndef __XFS_LOG_PRIV_H__
  7. #define __XFS_LOG_PRIV_H__
  8. #include "xfs_extent_busy.h" /* for struct xfs_busy_extents */
  9. struct xfs_buf;
  10. struct xlog;
  11. struct xlog_ticket;
  12. struct xfs_mount;
  13. /*
  14. * get client id from packed copy.
  15. *
  16. * this hack is here because the xlog_pack code copies four bytes
  17. * of xlog_op_header containing the fields oh_clientid, oh_flags
  18. * and oh_res2 into the packed copy.
  19. *
  20. * later on this four byte chunk is treated as an int and the
  21. * client id is pulled out.
  22. *
  23. * this has endian issues, of course.
  24. */
  25. static inline uint xlog_get_client_id(__be32 i)
  26. {
  27. return be32_to_cpu(i) >> 24;
  28. }
  29. /*
  30. * In core log state
  31. */
  32. enum xlog_iclog_state {
  33. XLOG_STATE_ACTIVE, /* Current IC log being written to */
  34. XLOG_STATE_WANT_SYNC, /* Want to sync this iclog; no more writes */
  35. XLOG_STATE_SYNCING, /* This IC log is syncing */
  36. XLOG_STATE_DONE_SYNC, /* Done syncing to disk */
  37. XLOG_STATE_CALLBACK, /* Callback functions now */
  38. XLOG_STATE_DIRTY, /* Dirty IC log, not ready for ACTIVE status */
  39. };
  40. #define XLOG_STATE_STRINGS \
  41. { XLOG_STATE_ACTIVE, "XLOG_STATE_ACTIVE" }, \
  42. { XLOG_STATE_WANT_SYNC, "XLOG_STATE_WANT_SYNC" }, \
  43. { XLOG_STATE_SYNCING, "XLOG_STATE_SYNCING" }, \
  44. { XLOG_STATE_DONE_SYNC, "XLOG_STATE_DONE_SYNC" }, \
  45. { XLOG_STATE_CALLBACK, "XLOG_STATE_CALLBACK" }, \
  46. { XLOG_STATE_DIRTY, "XLOG_STATE_DIRTY" }
  47. /*
  48. * In core log flags
  49. */
  50. #define XLOG_ICL_NEED_FLUSH (1u << 0) /* iclog needs REQ_PREFLUSH */
  51. #define XLOG_ICL_NEED_FUA (1u << 1) /* iclog needs REQ_FUA */
  52. #define XLOG_ICL_STRINGS \
  53. { XLOG_ICL_NEED_FLUSH, "XLOG_ICL_NEED_FLUSH" }, \
  54. { XLOG_ICL_NEED_FUA, "XLOG_ICL_NEED_FUA" }
  55. /*
  56. * Log ticket flags
  57. */
  58. #define XLOG_TIC_PERM_RESERV (1u << 0) /* permanent reservation */
  59. #define XLOG_TIC_FLAGS \
  60. { XLOG_TIC_PERM_RESERV, "XLOG_TIC_PERM_RESERV" }
  61. /*
  62. * Below are states for covering allocation transactions.
  63. * By covering, we mean changing the h_tail_lsn in the last on-disk
  64. * log write such that no allocation transactions will be re-done during
  65. * recovery after a system crash. Recovery starts at the last on-disk
  66. * log write.
  67. *
  68. * These states are used to insert dummy log entries to cover
  69. * space allocation transactions which can undo non-transactional changes
  70. * after a crash. Writes to a file with space
  71. * already allocated do not result in any transactions. Allocations
  72. * might include space beyond the EOF. So if we just push the EOF a
  73. * little, the last transaction for the file could contain the wrong
  74. * size. If there is no file system activity, after an allocation
  75. * transaction, and the system crashes, the allocation transaction
  76. * will get replayed and the file will be truncated. This could
  77. * be hours/days/... after the allocation occurred.
  78. *
  79. * The fix for this is to do two dummy transactions when the
  80. * system is idle. We need two dummy transaction because the h_tail_lsn
  81. * in the log record header needs to point beyond the last possible
  82. * non-dummy transaction. The first dummy changes the h_tail_lsn to
  83. * the first transaction before the dummy. The second dummy causes
  84. * h_tail_lsn to point to the first dummy. Recovery starts at h_tail_lsn.
  85. *
  86. * These dummy transactions get committed when everything
  87. * is idle (after there has been some activity).
  88. *
  89. * There are 5 states used to control this.
  90. *
  91. * IDLE -- no logging has been done on the file system or
  92. * we are done covering previous transactions.
  93. * NEED -- logging has occurred and we need a dummy transaction
  94. * when the log becomes idle.
  95. * DONE -- we were in the NEED state and have committed a dummy
  96. * transaction.
  97. * NEED2 -- we detected that a dummy transaction has gone to the
  98. * on disk log with no other transactions.
  99. * DONE2 -- we committed a dummy transaction when in the NEED2 state.
  100. *
  101. * There are two places where we switch states:
  102. *
  103. * 1.) In xfs_sync, when we detect an idle log and are in NEED or NEED2.
  104. * We commit the dummy transaction and switch to DONE or DONE2,
  105. * respectively. In all other states, we don't do anything.
  106. *
  107. * 2.) When we finish writing the on-disk log (xlog_state_clean_log).
  108. *
  109. * No matter what state we are in, if this isn't the dummy
  110. * transaction going out, the next state is NEED.
  111. * So, if we aren't in the DONE or DONE2 states, the next state
  112. * is NEED. We can't be finishing a write of the dummy record
  113. * unless it was committed and the state switched to DONE or DONE2.
  114. *
  115. * If we are in the DONE state and this was a write of the
  116. * dummy transaction, we move to NEED2.
  117. *
  118. * If we are in the DONE2 state and this was a write of the
  119. * dummy transaction, we move to IDLE.
  120. *
  121. *
  122. * Writing only one dummy transaction can get appended to
  123. * one file space allocation. When this happens, the log recovery
  124. * code replays the space allocation and a file could be truncated.
  125. * This is why we have the NEED2 and DONE2 states before going idle.
  126. */
  127. #define XLOG_STATE_COVER_IDLE 0
  128. #define XLOG_STATE_COVER_NEED 1
  129. #define XLOG_STATE_COVER_DONE 2
  130. #define XLOG_STATE_COVER_NEED2 3
  131. #define XLOG_STATE_COVER_DONE2 4
  132. #define XLOG_COVER_OPS 5
  133. typedef struct xlog_ticket {
  134. struct list_head t_queue; /* reserve/write queue */
  135. struct task_struct *t_task; /* task that owns this ticket */
  136. xlog_tid_t t_tid; /* transaction identifier */
  137. atomic_t t_ref; /* ticket reference count */
  138. int t_curr_res; /* current reservation */
  139. int t_unit_res; /* unit reservation */
  140. char t_ocnt; /* original unit count */
  141. char t_cnt; /* current unit count */
  142. uint8_t t_flags; /* properties of reservation */
  143. int t_iclog_hdrs; /* iclog hdrs in t_curr_res */
  144. } xlog_ticket_t;
  145. /*
  146. * - A log record header is 512 bytes. There is plenty of room to grow the
  147. * xlog_rec_header_t into the reserved space.
  148. * - ic_data follows, so a write to disk can start at the beginning of
  149. * the iclog.
  150. * - ic_forcewait is used to implement synchronous forcing of the iclog to disk.
  151. * - ic_next is the pointer to the next iclog in the ring.
  152. * - ic_log is a pointer back to the global log structure.
  153. * - ic_size is the full size of the log buffer, minus the cycle headers.
  154. * - ic_offset is the current number of bytes written to in this iclog.
  155. * - ic_refcnt is bumped when someone is writing to the log.
  156. * - ic_state is the state of the iclog.
  157. *
  158. * Because of cacheline contention on large machines, we need to separate
  159. * various resources onto different cachelines. To start with, make the
  160. * structure cacheline aligned. The following fields can be contended on
  161. * by independent processes:
  162. *
  163. * - ic_callbacks
  164. * - ic_refcnt
  165. * - fields protected by the global l_icloglock
  166. *
  167. * so we need to ensure that these fields are located in separate cachelines.
  168. * We'll put all the read-only and l_icloglock fields in the first cacheline,
  169. * and move everything else out to subsequent cachelines.
  170. */
  171. typedef struct xlog_in_core {
  172. wait_queue_head_t ic_force_wait;
  173. wait_queue_head_t ic_write_wait;
  174. struct xlog_in_core *ic_next;
  175. struct xlog_in_core *ic_prev;
  176. struct xlog *ic_log;
  177. u32 ic_size;
  178. u32 ic_offset;
  179. enum xlog_iclog_state ic_state;
  180. unsigned int ic_flags;
  181. void *ic_datap; /* pointer to iclog data */
  182. struct list_head ic_callbacks;
  183. /* reference counts need their own cacheline */
  184. atomic_t ic_refcnt ____cacheline_aligned_in_smp;
  185. xlog_in_core_2_t *ic_data;
  186. #define ic_header ic_data->hic_header
  187. #ifdef DEBUG
  188. bool ic_fail_crc : 1;
  189. #endif
  190. struct semaphore ic_sema;
  191. struct work_struct ic_end_io_work;
  192. struct bio ic_bio;
  193. struct bio_vec ic_bvec[];
  194. } xlog_in_core_t;
  195. /*
  196. * The CIL context is used to aggregate per-transaction details as well be
  197. * passed to the iclog for checkpoint post-commit processing. After being
  198. * passed to the iclog, another context needs to be allocated for tracking the
  199. * next set of transactions to be aggregated into a checkpoint.
  200. */
  201. struct xfs_cil;
  202. struct xfs_cil_ctx {
  203. struct xfs_cil *cil;
  204. xfs_csn_t sequence; /* chkpt sequence # */
  205. xfs_lsn_t start_lsn; /* first LSN of chkpt commit */
  206. xfs_lsn_t commit_lsn; /* chkpt commit record lsn */
  207. struct xlog_in_core *commit_iclog;
  208. struct xlog_ticket *ticket; /* chkpt ticket */
  209. atomic_t space_used; /* aggregate size of regions */
  210. struct xfs_busy_extents busy_extents;
  211. struct list_head log_items; /* log items in chkpt */
  212. struct list_head lv_chain; /* logvecs being pushed */
  213. struct list_head iclog_entry;
  214. struct list_head committing; /* ctx committing list */
  215. struct work_struct push_work;
  216. atomic_t order_id;
  217. /*
  218. * CPUs that could have added items to the percpu CIL data. Access is
  219. * coordinated with xc_ctx_lock.
  220. */
  221. struct cpumask cil_pcpmask;
  222. };
  223. /*
  224. * Per-cpu CIL tracking items
  225. */
  226. struct xlog_cil_pcp {
  227. int32_t space_used;
  228. uint32_t space_reserved;
  229. struct list_head busy_extents;
  230. struct list_head log_items;
  231. };
  232. /*
  233. * Committed Item List structure
  234. *
  235. * This structure is used to track log items that have been committed but not
  236. * yet written into the log. It is used only when the delayed logging mount
  237. * option is enabled.
  238. *
  239. * This structure tracks the list of committing checkpoint contexts so
  240. * we can avoid the problem of having to hold out new transactions during a
  241. * flush until we have a the commit record LSN of the checkpoint. We can
  242. * traverse the list of committing contexts in xlog_cil_push_lsn() to find a
  243. * sequence match and extract the commit LSN directly from there. If the
  244. * checkpoint is still in the process of committing, we can block waiting for
  245. * the commit LSN to be determined as well. This should make synchronous
  246. * operations almost as efficient as the old logging methods.
  247. */
  248. struct xfs_cil {
  249. struct xlog *xc_log;
  250. unsigned long xc_flags;
  251. atomic_t xc_iclog_hdrs;
  252. struct workqueue_struct *xc_push_wq;
  253. struct rw_semaphore xc_ctx_lock ____cacheline_aligned_in_smp;
  254. struct xfs_cil_ctx *xc_ctx;
  255. spinlock_t xc_push_lock ____cacheline_aligned_in_smp;
  256. xfs_csn_t xc_push_seq;
  257. bool xc_push_commit_stable;
  258. struct list_head xc_committing;
  259. wait_queue_head_t xc_commit_wait;
  260. wait_queue_head_t xc_start_wait;
  261. xfs_csn_t xc_current_sequence;
  262. wait_queue_head_t xc_push_wait; /* background push throttle */
  263. void __percpu *xc_pcp; /* percpu CIL structures */
  264. } ____cacheline_aligned_in_smp;
  265. /* xc_flags bit values */
  266. #define XLOG_CIL_EMPTY 1
  267. #define XLOG_CIL_PCP_SPACE 2
  268. /*
  269. * The amount of log space we allow the CIL to aggregate is difficult to size.
  270. * Whatever we choose, we have to make sure we can get a reservation for the
  271. * log space effectively, that it is large enough to capture sufficient
  272. * relogging to reduce log buffer IO significantly, but it is not too large for
  273. * the log or induces too much latency when writing out through the iclogs. We
  274. * track both space consumed and the number of vectors in the checkpoint
  275. * context, so we need to decide which to use for limiting.
  276. *
  277. * Every log buffer we write out during a push needs a header reserved, which
  278. * is at least one sector and more for v2 logs. Hence we need a reservation of
  279. * at least 512 bytes per 32k of log space just for the LR headers. That means
  280. * 16KB of reservation per megabyte of delayed logging space we will consume,
  281. * plus various headers. The number of headers will vary based on the num of
  282. * io vectors, so limiting on a specific number of vectors is going to result
  283. * in transactions of varying size. IOWs, it is more consistent to track and
  284. * limit space consumed in the log rather than by the number of objects being
  285. * logged in order to prevent checkpoint ticket overruns.
  286. *
  287. * Further, use of static reservations through the log grant mechanism is
  288. * problematic. It introduces a lot of complexity (e.g. reserve grant vs write
  289. * grant) and a significant deadlock potential because regranting write space
  290. * can block on log pushes. Hence if we have to regrant log space during a log
  291. * push, we can deadlock.
  292. *
  293. * However, we can avoid this by use of a dynamic "reservation stealing"
  294. * technique during transaction commit whereby unused reservation space in the
  295. * transaction ticket is transferred to the CIL ctx commit ticket to cover the
  296. * space needed by the checkpoint transaction. This means that we never need to
  297. * specifically reserve space for the CIL checkpoint transaction, nor do we
  298. * need to regrant space once the checkpoint completes. This also means the
  299. * checkpoint transaction ticket is specific to the checkpoint context, rather
  300. * than the CIL itself.
  301. *
  302. * With dynamic reservations, we can effectively make up arbitrary limits for
  303. * the checkpoint size so long as they don't violate any other size rules.
  304. * Recovery imposes a rule that no transaction exceed half the log, so we are
  305. * limited by that. Furthermore, the log transaction reservation subsystem
  306. * tries to keep 25% of the log free, so we need to keep below that limit or we
  307. * risk running out of free log space to start any new transactions.
  308. *
  309. * In order to keep background CIL push efficient, we only need to ensure the
  310. * CIL is large enough to maintain sufficient in-memory relogging to avoid
  311. * repeated physical writes of frequently modified metadata. If we allow the CIL
  312. * to grow to a substantial fraction of the log, then we may be pinning hundreds
  313. * of megabytes of metadata in memory until the CIL flushes. This can cause
  314. * issues when we are running low on memory - pinned memory cannot be reclaimed,
  315. * and the CIL consumes a lot of memory. Hence we need to set an upper physical
  316. * size limit for the CIL that limits the maximum amount of memory pinned by the
  317. * CIL but does not limit performance by reducing relogging efficiency
  318. * significantly.
  319. *
  320. * As such, the CIL push threshold ends up being the smaller of two thresholds:
  321. * - a threshold large enough that it allows CIL to be pushed and progress to be
  322. * made without excessive blocking of incoming transaction commits. This is
  323. * defined to be 12.5% of the log space - half the 25% push threshold of the
  324. * AIL.
  325. * - small enough that it doesn't pin excessive amounts of memory but maintains
  326. * close to peak relogging efficiency. This is defined to be 16x the iclog
  327. * buffer window (32MB) as measurements have shown this to be roughly the
  328. * point of diminishing performance increases under highly concurrent
  329. * modification workloads.
  330. *
  331. * To prevent the CIL from overflowing upper commit size bounds, we introduce a
  332. * new threshold at which we block committing transactions until the background
  333. * CIL commit commences and switches to a new context. While this is not a hard
  334. * limit, it forces the process committing a transaction to the CIL to block and
  335. * yeild the CPU, giving the CIL push work a chance to be scheduled and start
  336. * work. This prevents a process running lots of transactions from overfilling
  337. * the CIL because it is not yielding the CPU. We set the blocking limit at
  338. * twice the background push space threshold so we keep in line with the AIL
  339. * push thresholds.
  340. *
  341. * Note: this is not a -hard- limit as blocking is applied after the transaction
  342. * is inserted into the CIL and the push has been triggered. It is largely a
  343. * throttling mechanism that allows the CIL push to be scheduled and run. A hard
  344. * limit will be difficult to implement without introducing global serialisation
  345. * in the CIL commit fast path, and it's not at all clear that we actually need
  346. * such hard limits given the ~7 years we've run without a hard limit before
  347. * finding the first situation where a checkpoint size overflow actually
  348. * occurred. Hence the simple throttle, and an ASSERT check to tell us that
  349. * we've overrun the max size.
  350. */
  351. #define XLOG_CIL_SPACE_LIMIT(log) \
  352. min_t(int, (log)->l_logsize >> 3, BBTOB(XLOG_TOTAL_REC_SHIFT(log)) << 4)
  353. #define XLOG_CIL_BLOCKING_SPACE_LIMIT(log) \
  354. (XLOG_CIL_SPACE_LIMIT(log) * 2)
  355. /*
  356. * ticket grant locks, queues and accounting have their own cachlines
  357. * as these are quite hot and can be operated on concurrently.
  358. */
  359. struct xlog_grant_head {
  360. spinlock_t lock ____cacheline_aligned_in_smp;
  361. struct list_head waiters;
  362. atomic64_t grant;
  363. };
  364. /*
  365. * The reservation head lsn is not made up of a cycle number and block number.
  366. * Instead, it uses a cycle number and byte number. Logs don't expect to
  367. * overflow 31 bits worth of byte offset, so using a byte number will mean
  368. * that round off problems won't occur when releasing partial reservations.
  369. */
  370. struct xlog {
  371. /* The following fields don't need locking */
  372. struct xfs_mount *l_mp; /* mount point */
  373. struct xfs_ail *l_ailp; /* AIL log is working with */
  374. struct xfs_cil *l_cilp; /* CIL log is working with */
  375. struct xfs_buftarg *l_targ; /* buftarg of log */
  376. struct workqueue_struct *l_ioend_workqueue; /* for I/O completions */
  377. struct delayed_work l_work; /* background flush work */
  378. long l_opstate; /* operational state */
  379. uint l_quotaoffs_flag; /* XFS_DQ_*, for QUOTAOFFs */
  380. struct list_head *l_buf_cancel_table;
  381. struct list_head r_dfops; /* recovered log intent items */
  382. int l_iclog_hsize; /* size of iclog header */
  383. int l_iclog_heads; /* # of iclog header sectors */
  384. uint l_sectBBsize; /* sector size in BBs (2^n) */
  385. int l_iclog_size; /* size of log in bytes */
  386. int l_iclog_bufs; /* number of iclog buffers */
  387. xfs_daddr_t l_logBBstart; /* start block of log */
  388. int l_logsize; /* size of log in bytes */
  389. int l_logBBsize; /* size of log in BB chunks */
  390. /* The following block of fields are changed while holding icloglock */
  391. wait_queue_head_t l_flush_wait ____cacheline_aligned_in_smp;
  392. /* waiting for iclog flush */
  393. int l_covered_state;/* state of "covering disk
  394. * log entries" */
  395. xlog_in_core_t *l_iclog; /* head log queue */
  396. spinlock_t l_icloglock; /* grab to change iclog state */
  397. int l_curr_cycle; /* Cycle number of log writes */
  398. int l_prev_cycle; /* Cycle number before last
  399. * block increment */
  400. int l_curr_block; /* current logical log block */
  401. int l_prev_block; /* previous logical log block */
  402. /*
  403. * l_tail_lsn is atomic so it can be set and read without needing to
  404. * hold specific locks. To avoid operations contending with other hot
  405. * objects, it on a separate cacheline.
  406. */
  407. /* lsn of 1st LR with unflushed * buffers */
  408. atomic64_t l_tail_lsn ____cacheline_aligned_in_smp;
  409. struct xlog_grant_head l_reserve_head;
  410. struct xlog_grant_head l_write_head;
  411. uint64_t l_tail_space;
  412. struct xfs_kobj l_kobj;
  413. /* log recovery lsn tracking (for buffer submission */
  414. xfs_lsn_t l_recovery_lsn;
  415. uint32_t l_iclog_roundoff;/* padding roundoff */
  416. };
  417. /*
  418. * Bits for operational state
  419. */
  420. #define XLOG_ACTIVE_RECOVERY 0 /* in the middle of recovery */
  421. #define XLOG_RECOVERY_NEEDED 1 /* log was recovered */
  422. #define XLOG_IO_ERROR 2 /* log hit an I/O error, and being
  423. shutdown */
  424. #define XLOG_TAIL_WARN 3 /* log tail verify warning issued */
  425. static inline bool
  426. xlog_recovery_needed(struct xlog *log)
  427. {
  428. return test_bit(XLOG_RECOVERY_NEEDED, &log->l_opstate);
  429. }
  430. static inline bool
  431. xlog_in_recovery(struct xlog *log)
  432. {
  433. return test_bit(XLOG_ACTIVE_RECOVERY, &log->l_opstate);
  434. }
  435. static inline bool
  436. xlog_is_shutdown(struct xlog *log)
  437. {
  438. return test_bit(XLOG_IO_ERROR, &log->l_opstate);
  439. }
  440. /*
  441. * Wait until the xlog_force_shutdown() has marked the log as shut down
  442. * so xlog_is_shutdown() will always return true.
  443. */
  444. static inline void
  445. xlog_shutdown_wait(
  446. struct xlog *log)
  447. {
  448. wait_var_event(&log->l_opstate, xlog_is_shutdown(log));
  449. }
  450. /* common routines */
  451. extern int
  452. xlog_recover(
  453. struct xlog *log);
  454. extern int
  455. xlog_recover_finish(
  456. struct xlog *log);
  457. extern void
  458. xlog_recover_cancel(struct xlog *);
  459. __le32 xlog_cksum(struct xlog *log, struct xlog_rec_header *rhead,
  460. char *dp, unsigned int hdrsize, unsigned int size);
  461. extern struct kmem_cache *xfs_log_ticket_cache;
  462. struct xlog_ticket *xlog_ticket_alloc(struct xlog *log, int unit_bytes,
  463. int count, bool permanent);
  464. void xlog_print_tic_res(struct xfs_mount *mp, struct xlog_ticket *ticket);
  465. void xlog_print_trans(struct xfs_trans *);
  466. int xlog_write(struct xlog *log, struct xfs_cil_ctx *ctx,
  467. struct list_head *lv_chain, struct xlog_ticket *tic,
  468. uint32_t len);
  469. void xfs_log_ticket_ungrant(struct xlog *log, struct xlog_ticket *ticket);
  470. void xfs_log_ticket_regrant(struct xlog *log, struct xlog_ticket *ticket);
  471. void xlog_state_switch_iclogs(struct xlog *log, struct xlog_in_core *iclog,
  472. int eventual_size);
  473. int xlog_state_release_iclog(struct xlog *log, struct xlog_in_core *iclog,
  474. struct xlog_ticket *ticket);
  475. /*
  476. * When we crack an atomic LSN, we sample it first so that the value will not
  477. * change while we are cracking it into the component values. This means we
  478. * will always get consistent component values to work from. This should always
  479. * be used to sample and crack LSNs that are stored and updated in atomic
  480. * variables.
  481. */
  482. static inline void
  483. xlog_crack_atomic_lsn(atomic64_t *lsn, uint *cycle, uint *block)
  484. {
  485. xfs_lsn_t val = atomic64_read(lsn);
  486. *cycle = CYCLE_LSN(val);
  487. *block = BLOCK_LSN(val);
  488. }
  489. /*
  490. * Calculate and assign a value to an atomic LSN variable from component pieces.
  491. */
  492. static inline void
  493. xlog_assign_atomic_lsn(atomic64_t *lsn, uint cycle, uint block)
  494. {
  495. atomic64_set(lsn, xlog_assign_lsn(cycle, block));
  496. }
  497. /*
  498. * Committed Item List interfaces
  499. */
  500. int xlog_cil_init(struct xlog *log);
  501. void xlog_cil_init_post_recovery(struct xlog *log);
  502. void xlog_cil_destroy(struct xlog *log);
  503. bool xlog_cil_empty(struct xlog *log);
  504. void xlog_cil_commit(struct xlog *log, struct xfs_trans *tp,
  505. xfs_csn_t *commit_seq, bool regrant);
  506. void xlog_cil_set_ctx_write_state(struct xfs_cil_ctx *ctx,
  507. struct xlog_in_core *iclog);
  508. /*
  509. * CIL force routines
  510. */
  511. void xlog_cil_flush(struct xlog *log);
  512. xfs_lsn_t xlog_cil_force_seq(struct xlog *log, xfs_csn_t sequence);
  513. static inline void
  514. xlog_cil_force(struct xlog *log)
  515. {
  516. xlog_cil_force_seq(log, log->l_cilp->xc_current_sequence);
  517. }
  518. /*
  519. * Wrapper function for waiting on a wait queue serialised against wakeups
  520. * by a spinlock. This matches the semantics of all the wait queues used in the
  521. * log code.
  522. */
  523. static inline void
  524. xlog_wait(
  525. struct wait_queue_head *wq,
  526. struct spinlock *lock)
  527. __releases(lock)
  528. {
  529. DECLARE_WAITQUEUE(wait, current);
  530. add_wait_queue_exclusive(wq, &wait);
  531. __set_current_state(TASK_UNINTERRUPTIBLE);
  532. spin_unlock(lock);
  533. schedule();
  534. remove_wait_queue(wq, &wait);
  535. }
  536. int xlog_wait_on_iclog(struct xlog_in_core *iclog)
  537. __releases(iclog->ic_log->l_icloglock);
  538. /* Calculate the distance between two LSNs in bytes */
  539. static inline uint64_t
  540. xlog_lsn_sub(
  541. struct xlog *log,
  542. xfs_lsn_t high,
  543. xfs_lsn_t low)
  544. {
  545. uint32_t hi_cycle = CYCLE_LSN(high);
  546. uint32_t hi_block = BLOCK_LSN(high);
  547. uint32_t lo_cycle = CYCLE_LSN(low);
  548. uint32_t lo_block = BLOCK_LSN(low);
  549. if (hi_cycle == lo_cycle)
  550. return BBTOB(hi_block - lo_block);
  551. ASSERT((hi_cycle == lo_cycle + 1) || xlog_is_shutdown(log));
  552. return (uint64_t)log->l_logsize - BBTOB(lo_block - hi_block);
  553. }
  554. void xlog_grant_return_space(struct xlog *log, xfs_lsn_t old_head,
  555. xfs_lsn_t new_head);
  556. /*
  557. * The LSN is valid so long as it is behind the current LSN. If it isn't, this
  558. * means that the next log record that includes this metadata could have a
  559. * smaller LSN. In turn, this means that the modification in the log would not
  560. * replay.
  561. */
  562. static inline bool
  563. xlog_valid_lsn(
  564. struct xlog *log,
  565. xfs_lsn_t lsn)
  566. {
  567. int cur_cycle;
  568. int cur_block;
  569. bool valid = true;
  570. /*
  571. * First, sample the current lsn without locking to avoid added
  572. * contention from metadata I/O. The current cycle and block are updated
  573. * (in xlog_state_switch_iclogs()) and read here in a particular order
  574. * to avoid false negatives (e.g., thinking the metadata LSN is valid
  575. * when it is not).
  576. *
  577. * The current block is always rewound before the cycle is bumped in
  578. * xlog_state_switch_iclogs() to ensure the current LSN is never seen in
  579. * a transiently forward state. Instead, we can see the LSN in a
  580. * transiently behind state if we happen to race with a cycle wrap.
  581. */
  582. cur_cycle = READ_ONCE(log->l_curr_cycle);
  583. smp_rmb();
  584. cur_block = READ_ONCE(log->l_curr_block);
  585. if ((CYCLE_LSN(lsn) > cur_cycle) ||
  586. (CYCLE_LSN(lsn) == cur_cycle && BLOCK_LSN(lsn) > cur_block)) {
  587. /*
  588. * If the metadata LSN appears invalid, it's possible the check
  589. * above raced with a wrap to the next log cycle. Grab the lock
  590. * to check for sure.
  591. */
  592. spin_lock(&log->l_icloglock);
  593. cur_cycle = log->l_curr_cycle;
  594. cur_block = log->l_curr_block;
  595. spin_unlock(&log->l_icloglock);
  596. if ((CYCLE_LSN(lsn) > cur_cycle) ||
  597. (CYCLE_LSN(lsn) == cur_cycle && BLOCK_LSN(lsn) > cur_block))
  598. valid = false;
  599. }
  600. return valid;
  601. }
  602. /*
  603. * Log vector and shadow buffers can be large, so we need to use kvmalloc() here
  604. * to ensure success. Unfortunately, kvmalloc() only allows GFP_KERNEL contexts
  605. * to fall back to vmalloc, so we can't actually do anything useful with gfp
  606. * flags to control the kmalloc() behaviour within kvmalloc(). Hence kmalloc()
  607. * will do direct reclaim and compaction in the slow path, both of which are
  608. * horrendously expensive. We just want kmalloc to fail fast and fall back to
  609. * vmalloc if it can't get something straight away from the free lists or
  610. * buddy allocator. Hence we have to open code kvmalloc outselves here.
  611. *
  612. * This assumes that the caller uses memalloc_nofs_save task context here, so
  613. * despite the use of GFP_KERNEL here, we are going to be doing GFP_NOFS
  614. * allocations. This is actually the only way to make vmalloc() do GFP_NOFS
  615. * allocations, so lets just all pretend this is a GFP_KERNEL context
  616. * operation....
  617. */
  618. static inline void *
  619. xlog_kvmalloc(
  620. size_t buf_size)
  621. {
  622. gfp_t flags = GFP_KERNEL;
  623. void *p;
  624. flags &= ~__GFP_DIRECT_RECLAIM;
  625. flags |= __GFP_NOWARN | __GFP_NORETRY;
  626. do {
  627. p = kmalloc(buf_size, flags);
  628. if (!p)
  629. p = vmalloc(buf_size);
  630. } while (!p);
  631. return p;
  632. }
  633. #endif /* __XFS_LOG_PRIV_H__ */