Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 1 | #ifndef _BCACHE_BSET_H |
| 2 | #define _BCACHE_BSET_H |
| 3 | |
Kent Overstreet | c37511b | 2013-04-26 15:39:55 -0700 | [diff] [blame] | 4 | #include <linux/slab.h> |
| 5 | |
Kent Overstreet | 67539e8 | 2013-09-10 22:53:34 -0700 | [diff] [blame] | 6 | #include "util.h" /* for time_stats */ |
| 7 | |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 8 | /* |
| 9 | * BKEYS: |
| 10 | * |
| 11 | * A bkey contains a key, a size field, a variable number of pointers, and some |
| 12 | * ancillary flag bits. |
| 13 | * |
| 14 | * We use two different functions for validating bkeys, bch_ptr_invalid and |
| 15 | * bch_ptr_bad(). |
| 16 | * |
| 17 | * bch_ptr_invalid() primarily filters out keys and pointers that would be |
| 18 | * invalid due to some sort of bug, whereas bch_ptr_bad() filters out keys and |
| 19 | * pointer that occur in normal practice but don't point to real data. |
| 20 | * |
| 21 | * The one exception to the rule that ptr_invalid() filters out invalid keys is |
| 22 | * that it also filters out keys of size 0 - these are keys that have been |
| 23 | * completely overwritten. It'd be safe to delete these in memory while leaving |
| 24 | * them on disk, just unnecessary work - so we filter them out when resorting |
| 25 | * instead. |
| 26 | * |
| 27 | * We can't filter out stale keys when we're resorting, because garbage |
| 28 | * collection needs to find them to ensure bucket gens don't wrap around - |
| 29 | * unless we're rewriting the btree node those stale keys still exist on disk. |
| 30 | * |
| 31 | * We also implement functions here for removing some number of sectors from the |
| 32 | * front or the back of a bkey - this is mainly used for fixing overlapping |
| 33 | * extents, by removing the overlapping sectors from the older key. |
| 34 | * |
| 35 | * BSETS: |
| 36 | * |
| 37 | * A bset is an array of bkeys laid out contiguously in memory in sorted order, |
| 38 | * along with a header. A btree node is made up of a number of these, written at |
| 39 | * different times. |
| 40 | * |
| 41 | * There could be many of them on disk, but we never allow there to be more than |
| 42 | * 4 in memory - we lazily resort as needed. |
| 43 | * |
| 44 | * We implement code here for creating and maintaining auxiliary search trees |
| 45 | * (described below) for searching an individial bset, and on top of that we |
| 46 | * implement a btree iterator. |
| 47 | * |
| 48 | * BTREE ITERATOR: |
| 49 | * |
| 50 | * Most of the code in bcache doesn't care about an individual bset - it needs |
| 51 | * to search entire btree nodes and iterate over them in sorted order. |
| 52 | * |
| 53 | * The btree iterator code serves both functions; it iterates through the keys |
| 54 | * in a btree node in sorted order, starting from either keys after a specific |
| 55 | * point (if you pass it a search key) or the start of the btree node. |
| 56 | * |
| 57 | * AUXILIARY SEARCH TREES: |
| 58 | * |
| 59 | * Since keys are variable length, we can't use a binary search on a bset - we |
| 60 | * wouldn't be able to find the start of the next key. But binary searches are |
| 61 | * slow anyways, due to terrible cache behaviour; bcache originally used binary |
| 62 | * searches and that code topped out at under 50k lookups/second. |
| 63 | * |
| 64 | * So we need to construct some sort of lookup table. Since we only insert keys |
| 65 | * into the last (unwritten) set, most of the keys within a given btree node are |
| 66 | * usually in sets that are mostly constant. We use two different types of |
| 67 | * lookup tables to take advantage of this. |
| 68 | * |
| 69 | * Both lookup tables share in common that they don't index every key in the |
| 70 | * set; they index one key every BSET_CACHELINE bytes, and then a linear search |
| 71 | * is used for the rest. |
| 72 | * |
| 73 | * For sets that have been written to disk and are no longer being inserted |
| 74 | * into, we construct a binary search tree in an array - traversing a binary |
| 75 | * search tree in an array gives excellent locality of reference and is very |
| 76 | * fast, since both children of any node are adjacent to each other in memory |
| 77 | * (and their grandchildren, and great grandchildren...) - this means |
| 78 | * prefetching can be used to great effect. |
| 79 | * |
| 80 | * It's quite useful performance wise to keep these nodes small - not just |
| 81 | * because they're more likely to be in L2, but also because we can prefetch |
| 82 | * more nodes on a single cacheline and thus prefetch more iterations in advance |
| 83 | * when traversing this tree. |
| 84 | * |
| 85 | * Nodes in the auxiliary search tree must contain both a key to compare against |
| 86 | * (we don't want to fetch the key from the set, that would defeat the purpose), |
| 87 | * and a pointer to the key. We use a few tricks to compress both of these. |
| 88 | * |
| 89 | * To compress the pointer, we take advantage of the fact that one node in the |
| 90 | * search tree corresponds to precisely BSET_CACHELINE bytes in the set. We have |
| 91 | * a function (to_inorder()) that takes the index of a node in a binary tree and |
| 92 | * returns what its index would be in an inorder traversal, so we only have to |
| 93 | * store the low bits of the offset. |
| 94 | * |
| 95 | * The key is 84 bits (KEY_DEV + key->key, the offset on the device). To |
| 96 | * compress that, we take advantage of the fact that when we're traversing the |
| 97 | * search tree at every iteration we know that both our search key and the key |
| 98 | * we're looking for lie within some range - bounded by our previous |
| 99 | * comparisons. (We special case the start of a search so that this is true even |
| 100 | * at the root of the tree). |
| 101 | * |
| 102 | * So we know the key we're looking for is between a and b, and a and b don't |
| 103 | * differ higher than bit 50, we don't need to check anything higher than bit |
| 104 | * 50. |
| 105 | * |
| 106 | * We don't usually need the rest of the bits, either; we only need enough bits |
| 107 | * to partition the key range we're currently checking. Consider key n - the |
| 108 | * key our auxiliary search tree node corresponds to, and key p, the key |
| 109 | * immediately preceding n. The lowest bit we need to store in the auxiliary |
| 110 | * search tree is the highest bit that differs between n and p. |
| 111 | * |
| 112 | * Note that this could be bit 0 - we might sometimes need all 80 bits to do the |
| 113 | * comparison. But we'd really like our nodes in the auxiliary search tree to be |
| 114 | * of fixed size. |
| 115 | * |
| 116 | * The solution is to make them fixed size, and when we're constructing a node |
| 117 | * check if p and n differed in the bits we needed them to. If they don't we |
| 118 | * flag that node, and when doing lookups we fallback to comparing against the |
| 119 | * real key. As long as this doesn't happen to often (and it seems to reliably |
| 120 | * happen a bit less than 1% of the time), we win - even on failures, that key |
| 121 | * is then more likely to be in cache than if we were doing binary searches all |
| 122 | * the way, since we're touching so much less memory. |
| 123 | * |
| 124 | * The keys in the auxiliary search tree are stored in (software) floating |
| 125 | * point, with an exponent and a mantissa. The exponent needs to be big enough |
| 126 | * to address all the bits in the original key, but the number of bits in the |
| 127 | * mantissa is somewhat arbitrary; more bits just gets us fewer failures. |
| 128 | * |
| 129 | * We need 7 bits for the exponent and 3 bits for the key's offset (since keys |
| 130 | * are 8 byte aligned); using 22 bits for the mantissa means a node is 4 bytes. |
| 131 | * We need one node per 128 bytes in the btree node, which means the auxiliary |
| 132 | * search trees take up 3% as much memory as the btree itself. |
| 133 | * |
| 134 | * Constructing these auxiliary search trees is moderately expensive, and we |
| 135 | * don't want to be constantly rebuilding the search tree for the last set |
| 136 | * whenever we insert another key into it. For the unwritten set, we use a much |
| 137 | * simpler lookup table - it's just a flat array, so index i in the lookup table |
| 138 | * corresponds to the i range of BSET_CACHELINE bytes in the set. Indexing |
| 139 | * within each byte range works the same as with the auxiliary search trees. |
| 140 | * |
| 141 | * These are much easier to keep up to date when we insert a key - we do it |
| 142 | * somewhat lazily; when we shift a key up we usually just increment the pointer |
| 143 | * to it, only when it would overflow do we go to the trouble of finding the |
| 144 | * first key in that range of bytes again. |
| 145 | */ |
| 146 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 147 | struct btree; |
| 148 | struct bkey_float; |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 149 | |
Kent Overstreet | c37511b | 2013-04-26 15:39:55 -0700 | [diff] [blame] | 150 | #define MAX_BSETS 4U |
| 151 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 152 | struct bset_tree { |
| 153 | /* |
| 154 | * We construct a binary tree in an array as if the array |
| 155 | * started at 1, so that things line up on the same cachelines |
| 156 | * better: see comments in bset.c at cacheline_to_bkey() for |
| 157 | * details |
| 158 | */ |
| 159 | |
| 160 | /* size of the binary tree and prev array */ |
| 161 | unsigned size; |
| 162 | |
| 163 | /* function of size - precalculated for to_inorder() */ |
| 164 | unsigned extra; |
| 165 | |
| 166 | /* copy of the last key in the set */ |
| 167 | struct bkey end; |
| 168 | struct bkey_float *tree; |
| 169 | |
| 170 | /* |
| 171 | * The nodes in the bset tree point to specific keys - this |
| 172 | * array holds the sizes of the previous key. |
| 173 | * |
| 174 | * Conceptually it's a member of struct bkey_float, but we want |
| 175 | * to keep bkey_float to 4 bytes and prev isn't used in the fast |
| 176 | * path. |
| 177 | */ |
| 178 | uint8_t *prev; |
| 179 | |
| 180 | /* The actual btree node, with pointers to each sorted set */ |
| 181 | struct bset *data; |
| 182 | }; |
| 183 | |
| 184 | #define __set_bytes(i, k) (sizeof(*(i)) + (k) * sizeof(uint64_t)) |
| 185 | #define set_bytes(i) __set_bytes(i, i->keys) |
| 186 | |
| 187 | #define __set_blocks(i, k, block_bytes) \ |
| 188 | DIV_ROUND_UP(__set_bytes(i, k), block_bytes) |
| 189 | #define set_blocks(i, block_bytes) \ |
| 190 | __set_blocks(i, (i)->keys, block_bytes) |
| 191 | |
| 192 | void bch_btree_keys_free(struct btree *); |
| 193 | int bch_btree_keys_alloc(struct btree *, unsigned, gfp_t); |
| 194 | |
| 195 | void bch_bset_fix_invalidated_key(struct btree *, struct bkey *); |
| 196 | void bch_bset_init_next(struct btree *, struct bset *, uint64_t); |
| 197 | void bch_bset_insert(struct btree *, struct bkey *, struct bkey *); |
| 198 | |
| 199 | /* Btree key iteration */ |
| 200 | |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 201 | struct btree_iter { |
| 202 | size_t size, used; |
Kent Overstreet | 280481d | 2013-10-24 16:36:03 -0700 | [diff] [blame] | 203 | #ifdef CONFIG_BCACHE_DEBUG |
| 204 | struct btree *b; |
| 205 | #endif |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 206 | struct btree_iter_set { |
| 207 | struct bkey *k, *end; |
| 208 | } data[MAX_BSETS]; |
| 209 | }; |
| 210 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 211 | typedef bool (*ptr_filter_fn)(struct btree *, const struct bkey *); |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 212 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 213 | struct bkey *bch_btree_iter_next(struct btree_iter *); |
| 214 | struct bkey *bch_btree_iter_next_filter(struct btree_iter *, |
| 215 | struct btree *, ptr_filter_fn); |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 216 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 217 | void bch_btree_iter_push(struct btree_iter *, struct bkey *, struct bkey *); |
| 218 | struct bkey *bch_btree_iter_init(struct btree *, struct btree_iter *, |
| 219 | struct bkey *); |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 220 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 221 | struct bkey *__bch_bset_search(struct btree *, struct bset_tree *, |
| 222 | const struct bkey *); |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 223 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 224 | /* |
| 225 | * Returns the first key that is strictly greater than search |
| 226 | */ |
| 227 | static inline struct bkey *bch_bset_search(struct btree *b, struct bset_tree *t, |
| 228 | const struct bkey *search) |
| 229 | { |
| 230 | return search ? __bch_bset_search(b, t, search) : t->data->start; |
| 231 | } |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 232 | |
Kent Overstreet | 67539e8 | 2013-09-10 22:53:34 -0700 | [diff] [blame] | 233 | /* Sorting */ |
| 234 | |
| 235 | struct bset_sort_state { |
| 236 | mempool_t *pool; |
| 237 | |
| 238 | unsigned page_order; |
| 239 | unsigned crit_factor; |
| 240 | |
| 241 | struct time_stats time; |
| 242 | }; |
| 243 | |
| 244 | void bch_bset_sort_state_free(struct bset_sort_state *); |
| 245 | int bch_bset_sort_state_init(struct bset_sort_state *, unsigned); |
| 246 | void bch_btree_sort_lazy(struct btree *, struct bset_sort_state *); |
| 247 | void bch_btree_sort_into(struct btree *, struct btree *, |
| 248 | struct bset_sort_state *); |
| 249 | void bch_btree_sort_and_fix_extents(struct btree *, struct btree_iter *, |
| 250 | struct bset_sort_state *); |
| 251 | void bch_btree_sort_partial(struct btree *, unsigned, |
| 252 | struct bset_sort_state *); |
| 253 | |
| 254 | static inline void bch_btree_sort(struct btree *b, |
| 255 | struct bset_sort_state *state) |
| 256 | { |
| 257 | bch_btree_sort_partial(b, 0, state); |
| 258 | } |
| 259 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 260 | /* Bkey utility code */ |
| 261 | |
| 262 | #define bset_bkey_last(i) bkey_idx((struct bkey *) (i)->d, (i)->keys) |
| 263 | |
| 264 | static inline struct bkey *bset_bkey_idx(struct bset *i, unsigned idx) |
| 265 | { |
| 266 | return bkey_idx(i->start, idx); |
| 267 | } |
| 268 | |
| 269 | static inline void bkey_init(struct bkey *k) |
| 270 | { |
| 271 | *k = ZERO_KEY; |
| 272 | } |
| 273 | |
| 274 | static __always_inline int64_t bkey_cmp(const struct bkey *l, |
| 275 | const struct bkey *r) |
| 276 | { |
| 277 | return unlikely(KEY_INODE(l) != KEY_INODE(r)) |
| 278 | ? (int64_t) KEY_INODE(l) - (int64_t) KEY_INODE(r) |
| 279 | : (int64_t) KEY_OFFSET(l) - (int64_t) KEY_OFFSET(r); |
| 280 | } |
| 281 | |
| 282 | void bch_bkey_copy_single_ptr(struct bkey *, const struct bkey *, |
| 283 | unsigned); |
| 284 | bool __bch_cut_front(const struct bkey *, struct bkey *); |
| 285 | bool __bch_cut_back(const struct bkey *, struct bkey *); |
| 286 | |
| 287 | static inline bool bch_cut_front(const struct bkey *where, struct bkey *k) |
| 288 | { |
| 289 | BUG_ON(bkey_cmp(where, k) > 0); |
| 290 | return __bch_cut_front(where, k); |
| 291 | } |
| 292 | |
| 293 | static inline bool bch_cut_back(const struct bkey *where, struct bkey *k) |
| 294 | { |
| 295 | BUG_ON(bkey_cmp(where, &START_KEY(k)) < 0); |
| 296 | return __bch_cut_back(where, k); |
| 297 | } |
| 298 | |
| 299 | #define PRECEDING_KEY(_k) \ |
| 300 | ({ \ |
| 301 | struct bkey *_ret = NULL; \ |
| 302 | \ |
| 303 | if (KEY_INODE(_k) || KEY_OFFSET(_k)) { \ |
| 304 | _ret = &KEY(KEY_INODE(_k), KEY_OFFSET(_k), 0); \ |
| 305 | \ |
| 306 | if (!_ret->low) \ |
| 307 | _ret->high--; \ |
| 308 | _ret->low--; \ |
| 309 | } \ |
| 310 | \ |
| 311 | _ret; \ |
| 312 | }) |
| 313 | |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 314 | /* Keylists */ |
| 315 | |
| 316 | struct keylist { |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 317 | union { |
Kent Overstreet | c2f95ae | 2013-07-24 17:24:25 -0700 | [diff] [blame] | 318 | struct bkey *keys; |
| 319 | uint64_t *keys_p; |
| 320 | }; |
| 321 | union { |
| 322 | struct bkey *top; |
| 323 | uint64_t *top_p; |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 324 | }; |
| 325 | |
| 326 | /* Enough room for btree_split's keys without realloc */ |
| 327 | #define KEYLIST_INLINE 16 |
Kent Overstreet | c2f95ae | 2013-07-24 17:24:25 -0700 | [diff] [blame] | 328 | uint64_t inline_keys[KEYLIST_INLINE]; |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 329 | }; |
| 330 | |
| 331 | static inline void bch_keylist_init(struct keylist *l) |
| 332 | { |
Kent Overstreet | c2f95ae | 2013-07-24 17:24:25 -0700 | [diff] [blame] | 333 | l->top_p = l->keys_p = l->inline_keys; |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 334 | } |
| 335 | |
| 336 | static inline void bch_keylist_push(struct keylist *l) |
| 337 | { |
| 338 | l->top = bkey_next(l->top); |
| 339 | } |
| 340 | |
| 341 | static inline void bch_keylist_add(struct keylist *l, struct bkey *k) |
| 342 | { |
| 343 | bkey_copy(l->top, k); |
| 344 | bch_keylist_push(l); |
| 345 | } |
| 346 | |
| 347 | static inline bool bch_keylist_empty(struct keylist *l) |
| 348 | { |
Kent Overstreet | c2f95ae | 2013-07-24 17:24:25 -0700 | [diff] [blame] | 349 | return l->top == l->keys; |
| 350 | } |
| 351 | |
| 352 | static inline void bch_keylist_reset(struct keylist *l) |
| 353 | { |
| 354 | l->top = l->keys; |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 355 | } |
| 356 | |
| 357 | static inline void bch_keylist_free(struct keylist *l) |
| 358 | { |
Kent Overstreet | c2f95ae | 2013-07-24 17:24:25 -0700 | [diff] [blame] | 359 | if (l->keys_p != l->inline_keys) |
| 360 | kfree(l->keys_p); |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 361 | } |
| 362 | |
Kent Overstreet | c2f95ae | 2013-07-24 17:24:25 -0700 | [diff] [blame] | 363 | static inline size_t bch_keylist_nkeys(struct keylist *l) |
| 364 | { |
| 365 | return l->top_p - l->keys_p; |
| 366 | } |
| 367 | |
| 368 | static inline size_t bch_keylist_bytes(struct keylist *l) |
| 369 | { |
| 370 | return bch_keylist_nkeys(l) * sizeof(uint64_t); |
| 371 | } |
| 372 | |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 373 | struct bkey *bch_keylist_pop(struct keylist *); |
Kent Overstreet | 26c949f | 2013-09-10 18:41:15 -0700 | [diff] [blame] | 374 | void bch_keylist_pop_front(struct keylist *); |
Kent Overstreet | 085d2a3 | 2013-11-11 18:20:51 -0800 | [diff] [blame] | 375 | int __bch_keylist_realloc(struct keylist *, unsigned); |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 376 | |
Kent Overstreet | ee81128 | 2013-12-17 23:49:49 -0800 | [diff] [blame] | 377 | struct cache_set; |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 378 | const char *bch_ptr_status(struct cache_set *, const struct bkey *); |
Kent Overstreet | cafe563 | 2013-03-23 16:11:31 -0700 | [diff] [blame] | 379 | |
| 380 | int bch_bset_print_stats(struct cache_set *, char *); |
| 381 | |
| 382 | #endif |