bset.h 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383
  1. #ifndef _BCACHE_BSET_H
  2. #define _BCACHE_BSET_H
  3. #include <linux/slab.h>
  4. /*
  5. * BKEYS:
  6. *
  7. * A bkey contains a key, a size field, a variable number of pointers, and some
  8. * ancillary flag bits.
  9. *
  10. * We use two different functions for validating bkeys, bch_ptr_invalid and
  11. * bch_ptr_bad().
  12. *
  13. * bch_ptr_invalid() primarily filters out keys and pointers that would be
  14. * invalid due to some sort of bug, whereas bch_ptr_bad() filters out keys and
  15. * pointer that occur in normal practice but don't point to real data.
  16. *
  17. * The one exception to the rule that ptr_invalid() filters out invalid keys is
  18. * that it also filters out keys of size 0 - these are keys that have been
  19. * completely overwritten. It'd be safe to delete these in memory while leaving
  20. * them on disk, just unnecessary work - so we filter them out when resorting
  21. * instead.
  22. *
  23. * We can't filter out stale keys when we're resorting, because garbage
  24. * collection needs to find them to ensure bucket gens don't wrap around -
  25. * unless we're rewriting the btree node those stale keys still exist on disk.
  26. *
  27. * We also implement functions here for removing some number of sectors from the
  28. * front or the back of a bkey - this is mainly used for fixing overlapping
  29. * extents, by removing the overlapping sectors from the older key.
  30. *
  31. * BSETS:
  32. *
  33. * A bset is an array of bkeys laid out contiguously in memory in sorted order,
  34. * along with a header. A btree node is made up of a number of these, written at
  35. * different times.
  36. *
  37. * There could be many of them on disk, but we never allow there to be more than
  38. * 4 in memory - we lazily resort as needed.
  39. *
  40. * We implement code here for creating and maintaining auxiliary search trees
  41. * (described below) for searching an individial bset, and on top of that we
  42. * implement a btree iterator.
  43. *
  44. * BTREE ITERATOR:
  45. *
  46. * Most of the code in bcache doesn't care about an individual bset - it needs
  47. * to search entire btree nodes and iterate over them in sorted order.
  48. *
  49. * The btree iterator code serves both functions; it iterates through the keys
  50. * in a btree node in sorted order, starting from either keys after a specific
  51. * point (if you pass it a search key) or the start of the btree node.
  52. *
  53. * AUXILIARY SEARCH TREES:
  54. *
  55. * Since keys are variable length, we can't use a binary search on a bset - we
  56. * wouldn't be able to find the start of the next key. But binary searches are
  57. * slow anyways, due to terrible cache behaviour; bcache originally used binary
  58. * searches and that code topped out at under 50k lookups/second.
  59. *
  60. * So we need to construct some sort of lookup table. Since we only insert keys
  61. * into the last (unwritten) set, most of the keys within a given btree node are
  62. * usually in sets that are mostly constant. We use two different types of
  63. * lookup tables to take advantage of this.
  64. *
  65. * Both lookup tables share in common that they don't index every key in the
  66. * set; they index one key every BSET_CACHELINE bytes, and then a linear search
  67. * is used for the rest.
  68. *
  69. * For sets that have been written to disk and are no longer being inserted
  70. * into, we construct a binary search tree in an array - traversing a binary
  71. * search tree in an array gives excellent locality of reference and is very
  72. * fast, since both children of any node are adjacent to each other in memory
  73. * (and their grandchildren, and great grandchildren...) - this means
  74. * prefetching can be used to great effect.
  75. *
  76. * It's quite useful performance wise to keep these nodes small - not just
  77. * because they're more likely to be in L2, but also because we can prefetch
  78. * more nodes on a single cacheline and thus prefetch more iterations in advance
  79. * when traversing this tree.
  80. *
  81. * Nodes in the auxiliary search tree must contain both a key to compare against
  82. * (we don't want to fetch the key from the set, that would defeat the purpose),
  83. * and a pointer to the key. We use a few tricks to compress both of these.
  84. *
  85. * To compress the pointer, we take advantage of the fact that one node in the
  86. * search tree corresponds to precisely BSET_CACHELINE bytes in the set. We have
  87. * a function (to_inorder()) that takes the index of a node in a binary tree and
  88. * returns what its index would be in an inorder traversal, so we only have to
  89. * store the low bits of the offset.
  90. *
  91. * The key is 84 bits (KEY_DEV + key->key, the offset on the device). To
  92. * compress that, we take advantage of the fact that when we're traversing the
  93. * search tree at every iteration we know that both our search key and the key
  94. * we're looking for lie within some range - bounded by our previous
  95. * comparisons. (We special case the start of a search so that this is true even
  96. * at the root of the tree).
  97. *
  98. * So we know the key we're looking for is between a and b, and a and b don't
  99. * differ higher than bit 50, we don't need to check anything higher than bit
  100. * 50.
  101. *
  102. * We don't usually need the rest of the bits, either; we only need enough bits
  103. * to partition the key range we're currently checking. Consider key n - the
  104. * key our auxiliary search tree node corresponds to, and key p, the key
  105. * immediately preceding n. The lowest bit we need to store in the auxiliary
  106. * search tree is the highest bit that differs between n and p.
  107. *
  108. * Note that this could be bit 0 - we might sometimes need all 80 bits to do the
  109. * comparison. But we'd really like our nodes in the auxiliary search tree to be
  110. * of fixed size.
  111. *
  112. * The solution is to make them fixed size, and when we're constructing a node
  113. * check if p and n differed in the bits we needed them to. If they don't we
  114. * flag that node, and when doing lookups we fallback to comparing against the
  115. * real key. As long as this doesn't happen to often (and it seems to reliably
  116. * happen a bit less than 1% of the time), we win - even on failures, that key
  117. * is then more likely to be in cache than if we were doing binary searches all
  118. * the way, since we're touching so much less memory.
  119. *
  120. * The keys in the auxiliary search tree are stored in (software) floating
  121. * point, with an exponent and a mantissa. The exponent needs to be big enough
  122. * to address all the bits in the original key, but the number of bits in the
  123. * mantissa is somewhat arbitrary; more bits just gets us fewer failures.
  124. *
  125. * We need 7 bits for the exponent and 3 bits for the key's offset (since keys
  126. * are 8 byte aligned); using 22 bits for the mantissa means a node is 4 bytes.
  127. * We need one node per 128 bytes in the btree node, which means the auxiliary
  128. * search trees take up 3% as much memory as the btree itself.
  129. *
  130. * Constructing these auxiliary search trees is moderately expensive, and we
  131. * don't want to be constantly rebuilding the search tree for the last set
  132. * whenever we insert another key into it. For the unwritten set, we use a much
  133. * simpler lookup table - it's just a flat array, so index i in the lookup table
  134. * corresponds to the i range of BSET_CACHELINE bytes in the set. Indexing
  135. * within each byte range works the same as with the auxiliary search trees.
  136. *
  137. * These are much easier to keep up to date when we insert a key - we do it
  138. * somewhat lazily; when we shift a key up we usually just increment the pointer
  139. * to it, only when it would overflow do we go to the trouble of finding the
  140. * first key in that range of bytes again.
  141. */
  142. /* Btree key comparison/iteration */
  143. #define MAX_BSETS 4U
  144. struct btree_iter {
  145. size_t size, used;
  146. struct btree_iter_set {
  147. struct bkey *k, *end;
  148. } data[MAX_BSETS];
  149. };
  150. struct bset_tree {
  151. /*
  152. * We construct a binary tree in an array as if the array
  153. * started at 1, so that things line up on the same cachelines
  154. * better: see comments in bset.c at cacheline_to_bkey() for
  155. * details
  156. */
  157. /* size of the binary tree and prev array */
  158. unsigned size;
  159. /* function of size - precalculated for to_inorder() */
  160. unsigned extra;
  161. /* copy of the last key in the set */
  162. struct bkey end;
  163. struct bkey_float *tree;
  164. /*
  165. * The nodes in the bset tree point to specific keys - this
  166. * array holds the sizes of the previous key.
  167. *
  168. * Conceptually it's a member of struct bkey_float, but we want
  169. * to keep bkey_float to 4 bytes and prev isn't used in the fast
  170. * path.
  171. */
  172. uint8_t *prev;
  173. /* The actual btree node, with pointers to each sorted set */
  174. struct bset *data;
  175. };
  176. static __always_inline int64_t bkey_cmp(const struct bkey *l,
  177. const struct bkey *r)
  178. {
  179. return unlikely(KEY_INODE(l) != KEY_INODE(r))
  180. ? (int64_t) KEY_INODE(l) - (int64_t) KEY_INODE(r)
  181. : (int64_t) KEY_OFFSET(l) - (int64_t) KEY_OFFSET(r);
  182. }
  183. static inline size_t bkey_u64s(const struct bkey *k)
  184. {
  185. BUG_ON(KEY_CSUM(k) > 1);
  186. return 2 + KEY_PTRS(k) + (KEY_CSUM(k) ? 1 : 0);
  187. }
  188. static inline size_t bkey_bytes(const struct bkey *k)
  189. {
  190. return bkey_u64s(k) * sizeof(uint64_t);
  191. }
  192. static inline void bkey_copy(struct bkey *dest, const struct bkey *src)
  193. {
  194. memcpy(dest, src, bkey_bytes(src));
  195. }
  196. static inline void bkey_copy_key(struct bkey *dest, const struct bkey *src)
  197. {
  198. if (!src)
  199. src = &KEY(0, 0, 0);
  200. SET_KEY_INODE(dest, KEY_INODE(src));
  201. SET_KEY_OFFSET(dest, KEY_OFFSET(src));
  202. }
  203. static inline struct bkey *bkey_next(const struct bkey *k)
  204. {
  205. uint64_t *d = (void *) k;
  206. return (struct bkey *) (d + bkey_u64s(k));
  207. }
  208. /* Keylists */
  209. struct keylist {
  210. struct bkey *top;
  211. union {
  212. uint64_t *list;
  213. struct bkey *bottom;
  214. };
  215. /* Enough room for btree_split's keys without realloc */
  216. #define KEYLIST_INLINE 16
  217. uint64_t d[KEYLIST_INLINE];
  218. };
  219. static inline void bch_keylist_init(struct keylist *l)
  220. {
  221. l->top = (void *) (l->list = l->d);
  222. }
  223. static inline void bch_keylist_push(struct keylist *l)
  224. {
  225. l->top = bkey_next(l->top);
  226. }
  227. static inline void bch_keylist_add(struct keylist *l, struct bkey *k)
  228. {
  229. bkey_copy(l->top, k);
  230. bch_keylist_push(l);
  231. }
  232. static inline bool bch_keylist_empty(struct keylist *l)
  233. {
  234. return l->top == (void *) l->list;
  235. }
  236. static inline void bch_keylist_free(struct keylist *l)
  237. {
  238. if (l->list != l->d)
  239. kfree(l->list);
  240. }
  241. void bch_keylist_copy(struct keylist *, struct keylist *);
  242. struct bkey *bch_keylist_pop(struct keylist *);
  243. int bch_keylist_realloc(struct keylist *, int, struct cache_set *);
  244. void bch_bkey_copy_single_ptr(struct bkey *, const struct bkey *,
  245. unsigned);
  246. bool __bch_cut_front(const struct bkey *, struct bkey *);
  247. bool __bch_cut_back(const struct bkey *, struct bkey *);
  248. static inline bool bch_cut_front(const struct bkey *where, struct bkey *k)
  249. {
  250. BUG_ON(bkey_cmp(where, k) > 0);
  251. return __bch_cut_front(where, k);
  252. }
  253. static inline bool bch_cut_back(const struct bkey *where, struct bkey *k)
  254. {
  255. BUG_ON(bkey_cmp(where, &START_KEY(k)) < 0);
  256. return __bch_cut_back(where, k);
  257. }
  258. const char *bch_ptr_status(struct cache_set *, const struct bkey *);
  259. bool __bch_ptr_invalid(struct cache_set *, int level, const struct bkey *);
  260. bool bch_ptr_bad(struct btree *, const struct bkey *);
  261. static inline uint8_t gen_after(uint8_t a, uint8_t b)
  262. {
  263. uint8_t r = a - b;
  264. return r > 128U ? 0 : r;
  265. }
  266. static inline uint8_t ptr_stale(struct cache_set *c, const struct bkey *k,
  267. unsigned i)
  268. {
  269. return gen_after(PTR_BUCKET(c, k, i)->gen, PTR_GEN(k, i));
  270. }
  271. static inline bool ptr_available(struct cache_set *c, const struct bkey *k,
  272. unsigned i)
  273. {
  274. return (PTR_DEV(k, i) < MAX_CACHES_PER_SET) && PTR_CACHE(c, k, i);
  275. }
  276. typedef bool (*ptr_filter_fn)(struct btree *, const struct bkey *);
  277. struct bkey *bch_next_recurse_key(struct btree *, struct bkey *);
  278. struct bkey *bch_btree_iter_next(struct btree_iter *);
  279. struct bkey *bch_btree_iter_next_filter(struct btree_iter *,
  280. struct btree *, ptr_filter_fn);
  281. void bch_btree_iter_push(struct btree_iter *, struct bkey *, struct bkey *);
  282. struct bkey *__bch_btree_iter_init(struct btree *, struct btree_iter *,
  283. struct bkey *, struct bset_tree *);
  284. /* 32 bits total: */
  285. #define BKEY_MID_BITS 3
  286. #define BKEY_EXPONENT_BITS 7
  287. #define BKEY_MANTISSA_BITS 22
  288. #define BKEY_MANTISSA_MASK ((1 << BKEY_MANTISSA_BITS) - 1)
  289. struct bkey_float {
  290. unsigned exponent:BKEY_EXPONENT_BITS;
  291. unsigned m:BKEY_MID_BITS;
  292. unsigned mantissa:BKEY_MANTISSA_BITS;
  293. } __packed;
  294. /*
  295. * BSET_CACHELINE was originally intended to match the hardware cacheline size -
  296. * it used to be 64, but I realized the lookup code would touch slightly less
  297. * memory if it was 128.
  298. *
  299. * It definites the number of bytes (in struct bset) per struct bkey_float in
  300. * the auxiliar search tree - when we're done searching the bset_float tree we
  301. * have this many bytes left that we do a linear search over.
  302. *
  303. * Since (after level 5) every level of the bset_tree is on a new cacheline,
  304. * we're touching one fewer cacheline in the bset tree in exchange for one more
  305. * cacheline in the linear search - but the linear search might stop before it
  306. * gets to the second cacheline.
  307. */
  308. #define BSET_CACHELINE 128
  309. #define bset_tree_space(b) (btree_data_space(b) / BSET_CACHELINE)
  310. #define bset_tree_bytes(b) (bset_tree_space(b) * sizeof(struct bkey_float))
  311. #define bset_prev_bytes(b) (bset_tree_space(b) * sizeof(uint8_t))
  312. void bch_bset_init_next(struct btree *);
  313. void bch_bset_fix_invalidated_key(struct btree *, struct bkey *);
  314. void bch_bset_fix_lookup_table(struct btree *, struct bkey *);
  315. struct bkey *__bch_bset_search(struct btree *, struct bset_tree *,
  316. const struct bkey *);
  317. static inline struct bkey *bch_bset_search(struct btree *b, struct bset_tree *t,
  318. const struct bkey *search)
  319. {
  320. return search ? __bch_bset_search(b, t, search) : t->data->start;
  321. }
  322. bool bch_bkey_try_merge(struct btree *, struct bkey *, struct bkey *);
  323. void bch_btree_sort_lazy(struct btree *);
  324. void bch_btree_sort_into(struct btree *, struct btree *);
  325. void bch_btree_sort_and_fix_extents(struct btree *, struct btree_iter *);
  326. void bch_btree_sort_partial(struct btree *, unsigned);
  327. static inline void bch_btree_sort(struct btree *b)
  328. {
  329. bch_btree_sort_partial(b, 0);
  330. }
  331. int bch_bset_print_stats(struct cache_set *, char *);
  332. #endif