fis-gtm/sr_port/mutex_deadlock_check.c

178 lines
8.4 KiB
C
Raw Permalink Normal View History

/****************************************************************
* *
2024-07-19 11:43:27 -04:00
* Copyright 2001, 2013 Fidelity Information Services, Inc *
* *
* This source code contains the intellectual property *
* of its copyright holder(s), and is made available *
* under a license. If you do not know the terms of *
* the license, please stop and do not read further. *
* *
****************************************************************/
/* mutex_deadlock_check -- mutex deadlock detection check
There are 2 possible cases at this point:
1) This is not a TP transaction
2) This is a TP transaction
For case 1, when we come in here we should not have crit in any other region (except as noted below)
so instruct have_crit to complain about and release any such regions it finds.
For case 2, we should not have crit in regions that are not part of this transaction and regions
with an "ftok" that is higher than the region for which we are presently grabbing crit.
Since tp_reg_list is sorted by ftok, we can just run this list in order and mark the regions that are allowed
to have crit with our current cycle number.
*/
#include "mdef.h"
#include "gtm_inet.h" /* Required for gtmsource.h */
#ifdef VMS
#include <descrip.h> /* Required for gtmsource.h */
#endif
#include "gdsroot.h"
#include "gdsblk.h"
#include "gdskill.h"
#include "gtm_facility.h"
#include "fileinfo.h"
#include "gdsbt.h"
#include "gdsfhead.h"
#include "gdscc.h"
#include "filestruct.h"
#include "buddy_list.h"
#include "jnl.h"
#include "hashtab_int4.h" /* needed for tp.h */
#include "tp.h"
#include "gtmimagename.h"
#include "repl_msg.h" /* needed for gtmsource.h */
#include "gtmsource.h" /* for jnlpool_addrs structure definition */
#include "have_crit.h"
#include "mutex_deadlock_check.h"
GBLREF uint4 dollar_tlevel;
GBLREF unsigned int t_tries;
GBLREF tp_region *tp_reg_list; /* Chained list of regions used in this transaction */
GBLREF uint4 crit_deadlock_check_cycle;
GBLREF boolean_t is_replicator;
GBLREF boolean_t mu_reorg_process;
GBLREF jnlpool_addrs jnlpool;
GBLREF gd_region *gv_cur_region;
GBLREF sgmnt_addrs *cs_addrs;
GBLREF volatile boolean_t in_mutex_deadlock_check;
GBLREF volatile int4 crit_count;
2024-07-19 11:43:27 -04:00
VMS_ONLY(GBLREF sgmnt_addrs *vms_mutex_check_csa;)
2024-07-19 11:43:27 -04:00
#ifdef VMS /* VMS calls this function from mutex.mar which does not pass *csa as a parameter */
void mutex_deadlock_check(mutex_struct_ptr_t criticalPtr)
2024-07-19 11:43:27 -04:00
#else
void mutex_deadlock_check(mutex_struct_ptr_t criticalPtr, sgmnt_addrs *csa)
#endif
{
tp_region *tr;
2024-07-19 11:43:27 -04:00
sgmnt_addrs *tp_list_csa_element, *repl_csa;
int4 save_crit_count;
2024-07-19 11:43:27 -04:00
boolean_t passed_cur_region;
gd_region *region;
# ifdef VMS
sgmnt_addrs *csa;
2024-07-19 11:43:27 -04:00
csa = vms_mutex_check_csa; /* vms_mutex_check_csa should be set by mutex_lock* callers */
# endif
assert(csa);
if (in_mutex_deadlock_check)
return;
in_mutex_deadlock_check = TRUE;
/* A zero value of "crit_count" implies asynchronous activities can occur (e.g. db flush timer, periodic epoch timers etc.).
* At this point, although we are here through grab_crit()/grab_lock() (which would have incremented "crit_count"), we are
* in a safe and consistent state as far as the mutex structures go so it is ok to set "crit_count" to 0 implying we
* are now in an interruptible state (of course, we need to restore "crit_count" to what it was before returning).
* The other alternative of not changing "crit_count" presents us with complex situations wherein recursion
* of grab_crit/rel_crit might occur (through direct or indirect calls from mutex_deadlock_check())
* causing crit_count to be > 1 and in turn causing the crit_count-reset-logic in grab_crit/rel_crit to
* do a "crit_count--" (instead of "crit_count = 0"). This suffers from the problem that in case of an error code path
* crit_count might not get decremented appropriately and hence become out-of-sync (i.e. a positive value instead
* of zero) and a non-zero value might cause indefinite deferrals of asynchronous events.
*/
assert(1 == crit_count);
save_crit_count = crit_count;
crit_count = 0;
/* Need to determine who should and should not go through the deadlock checker.
*
* List of who needs to be considered
* ------------------------------------
* -> GT.M, Update process, MUPIP LOAD and GT.CM GNP/OMI server : since they go through t_end() to update the database.
* Note that all of the above (and only those) have the "is_replicator" flag set to TRUE.
* -> MUPIP REORG, since it does non-TP transactions and goes through t_end() (has "mu_reorg_process" flag set).
*
* List of who does not need to be considered (with reasons)
* -----------------------------------------------------------
* -> MUPIP RECOVER can hold crit on several regions (through TP or non-TP transactions).
* -> MUPIP RESTORE holds standalone access so does not need to be considered.
* -> Source Server, Receiver Server etc. can hold only one CRIT resource at any point of time.
* -> DSE, MUPIP BACKUP, MUPIP SET JOURNAL etc. can legitimately hold crit on several regions even though in non-TP.
*/
if (is_replicator || mu_reorg_process)
{
2024-07-19 11:43:27 -04:00
++crit_deadlock_check_cycle;
repl_csa = ((NULL != jnlpool.jnlpool_dummy_reg) && jnlpool.jnlpool_dummy_reg->open)
? &FILE_INFO(jnlpool.jnlpool_dummy_reg)->s_addrs : NULL;
if (!dollar_tlevel)
{
2024-07-19 11:43:27 -04:00
if ((NULL != repl_csa) && (repl_csa->critical == criticalPtr))
{ /* grab_lock going for crit on the jnlpool region. gv_cur_region points to the current region of
* interest, which better have REPL_ENABLED or REPL_WAS_ENABLED, and be now crit
*/
assert(cs_addrs == &FILE_INFO(gv_cur_region)->s_addrs);
cs_addrs->crit_check_cycle = crit_deadlock_check_cycle; /* allow for crit in gv_cur_region */
}
} else
2024-07-19 11:43:27 -04:00
{ /* Need to mark the regions allowed to have crit as follows: Place the current cycle into the csa's of
* regions allowed to have crit so have_crit() can easily test. Note that should the system be up long
* enough for the 2**32 cycle value to wrap and a region be unused for most of that time, such a region
* might not be entitled to crit but have an old csa->crit_cycle_check matching the current
* crit_deadlock_cycle_check - that case would not trigger have_crit() to release crit on that region;
* however, the next call to this routine increments crit_deadlock_check_cycle and so crit on that region
* gets released after two calls instead of (the usual) one.
*/
2024-07-19 11:43:27 -04:00
passed_cur_region = FALSE;
for (tr = tp_reg_list; NULL != tr; tr = tr->fPtr)
2024-07-19 11:43:27 -04:00
{ /* Keep in mind that We may not have a tp_reg_list with a multiple elements. If we are about to grab
* crit on only one region among this list, it is not a deadlock situation (valid FTOK order).
*/
if (!tr->reg->open)
continue;
2024-07-19 11:43:27 -04:00
tp_list_csa_element = &FILE_INFO(tr->reg)->s_addrs;
/* Make sure csa is at the end of this list */
if (tp_list_csa_element == csa)
passed_cur_region = TRUE;
if (tp_list_csa_element->now_crit)
{
tp_list_csa_element->crit_check_cycle = crit_deadlock_check_cycle;
if (passed_cur_region)
break;
}
}
2024-07-19 11:43:27 -04:00
/* All regions including current must be in the tp_reg_list. */
/* Journal pool dummy region will NEVER be in the tp_reg_list */
assert(passed_cur_region || (csa == repl_csa));
}
/* Release crit in regions not legitimately part of this TP/non-TP transaction */
2024-07-19 11:43:27 -04:00
have_crit(CRIT_HAVE_ANY_REG | CRIT_RELEASE | CRIT_NOT_TRANS_REG);
}
/* Reset "crit_count" before resetting "in_mutex_deadlock_check" to FALSE. The order of the sets is important.
* The periodic dbsync timer "wcs_clean_dbsync" depends on this order to correctly check if mainline code is
* interruptible. If the order were reversed and "in_mutex_deadlock_check" set to FALSE first, it is possible
* if "wcs_clean_dbsync" gets invoked before the reset of "crit_count" that it will see BOTH "in_mutex_deadlock_check"
* set to FALSE as well as "crit_count" set to 0 in which case it will conclude this as ok to interrupt when actually
* it is NOT (since the call stack will still have mutex* routines and we want to avoid reentrancy issues there).
* Because the ordering is important, to avoid compiler optimizer from prefetching them out of order, we declare
* both "crit_count" and "in_mutex_deadlock_check" as "volatile".
*/
crit_count = save_crit_count;
in_mutex_deadlock_check = FALSE;
}