Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Mar 2013 11:27:28 +0200
From:      Konstantin Belousov <kostikbel@gmail.com>
To:        Rick Macklem <rmacklem@uoguelph.ca>
Cc:        Rick Macklem <rmacklem@freebsd.org>, fs@freebsd.org
Subject:   Re: Deadlock in the NFS client
Message-ID:  <20130314092728.GI3794@kib.kiev.ua>
In-Reply-To: <492562517.3880600.1363217615412.JavaMail.root@erie.cs.uoguelph.ca>
References:  <201303131356.37919.jhb@freebsd.org> <492562517.3880600.1363217615412.JavaMail.root@erie.cs.uoguelph.ca>

next in thread | previous in thread | raw e-mail | index | archive | help

--A+YNfBJfL1GjoVjN
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Mar 13, 2013 at 07:33:35PM -0400, Rick Macklem wrote:
> John Baldwin wrote:
> > I ran into a machine that had a deadlock among certain files on a
> > given NFS
> > mount today. I'm not sure how best to resolve it, though it seems like
> > perhaps there is a bug with how the pool of nfsiod threads is managed.
> > Anyway, more details on the actual hang below. This was on 8.x with
> > the
> > old NFS client, but I don't see anything in HEAD that would fix this.
> >=20
> > First note that the system was idle so it had dropped down to only one
> > nfsiod thread.
> >=20
> Hmm, I see the problem and I'm a bit surprised it doesn't bite more often.
> It seems to me that this snippet of code from nfs_asyncio() makes too
> weak an assumption:
> 	/*
> 	 * If none are free, we may already have an iod working on this mount
> 	 * point.  If so, it will process our request.
> 	 */
> 	if (!gotiod) {
> 		if (nmp->nm_bufqiods > 0) {
> 			NFS_DPF(ASYNCIO,
> 		("nfs_asyncio: %d iods are already processing mount %p\n",
> 				 nmp->nm_bufqiods, nmp));
> 			gotiod =3D TRUE;
> 		}
> 	}
> It assumes that, since an nfsiod thread is processing some buffer for the
> mount, it will become available to do this one, which isn't true for your
> deadlock.
>=20
> I think the simple fix would be to recode nfs_asyncio() so that
> it only returns 0 if it finds an AVAILABLE nfsiod thread that it
> has assigned to do the I/O, getting rid of the above. The problem
> with doing this is that it may result in a lot more synchronous I/O
> (nfs_asyncio() returns EIO, so the caller does the I/O). Maybe more
> synchronous I/O could be avoided by allowing nfs_asyncio() to create a
> new thread even if the total is above nfs_iodmax. (I think this would
> require the fixed array to be replaced with a linked list and might
> result in a large number of nfsiod threads.) Maybe just having a large
> nfs_iodmax would be an adequate compromise?
>
> Does having a large # of nfsiod threads cause any serious problem for
> most systems these days?
>
> I'd be tempted to recode nfs_asyncio() as above and then, instead
> of nfs_iodmin and nfs_iodmax, I'd simply have: - a fixed number of
> nfsiod threads (this could be a tunable, with the understanding that
> it should be large for good performance)
>

I do not see how this would solve the deadlock itself. The proposal would
only allow system to survive slightly longer after the deadlock appeared.
And, I think that allowing the unbound amount of nfsiod threads is also
fatal.

The issue there is the LOR between buffer lock and vnode lock. Buffer lock
always must come after the vnode lock. The problematic nfsiod thread, which
locks the vnode, volatile this rule, because despite the LK_KERNPROC
ownership of the buffer lock, it is the thread which de fact owns the
buffer (only the thread can unlock it).

A possible solution would be to pass LK_NOWAIT to nfs_nget() from the
nfs_readdirplusrpc(). From my reading of the code, nfs_nget() should
be capable of correctly handling the lock failure. And EBUSY would
result in doit =3D 0, which should be fine too.

It is possible that EBUSY should be reset to 0, though.

--A+YNfBJfL1GjoVjN
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (FreeBSD)
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=YA8y
-----END PGP SIGNATURE-----

--A+YNfBJfL1GjoVjN--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130314092728.GI3794>