blob: 88c573eeb59823bd38ddb38d51b14099fec0f935 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Kent Overstreetcafe5632013-03-23 16:11:31 -07002/*
3 * Copyright (C) 2010 Kent Overstreet <kent.overstreet@gmail.com>
4 *
5 * Uses a block device as cache for other block devices; optimized for SSDs.
6 * All allocation is done in buckets, which should match the erase block size
7 * of the device.
8 *
9 * Buckets containing cached data are kept on a heap sorted by priority;
10 * bucket priority is increased on cache hit, and periodically all the buckets
11 * on the heap have their priority scaled down. This currently is just used as
12 * an LRU but in the future should allow for more intelligent heuristics.
13 *
14 * Buckets have an 8 bit counter; freeing is accomplished by incrementing the
15 * counter. Garbage collection is used to remove stale pointers.
16 *
17 * Indexing is done via a btree; nodes are not necessarily fully sorted, rather
18 * as keys are inserted we only sort the pages that have not yet been written.
19 * When garbage collection is run, we resort the entire node.
20 *
Mauro Carvalho Chehab5fb94e92018-05-08 15:14:57 -030021 * All configuration is done via sysfs; see Documentation/admin-guide/bcache.rst.
Kent Overstreetcafe5632013-03-23 16:11:31 -070022 */
23
24#include "bcache.h"
25#include "btree.h"
26#include "debug.h"
Kent Overstreet65d45232013-12-20 17:22:05 -080027#include "extents.h"
Kent Overstreetcafe5632013-03-23 16:11:31 -070028
29#include <linux/slab.h>
30#include <linux/bitops.h>
31#include <linux/hash.h>
Kent Overstreet72a44512013-10-24 17:19:26 -070032#include <linux/kthread.h>
Geert Uytterhoevencd953ed2013-03-27 18:56:28 +010033#include <linux/prefetch.h>
Kent Overstreetcafe5632013-03-23 16:11:31 -070034#include <linux/random.h>
35#include <linux/rcupdate.h>
Ingo Molnare6017572017-02-01 16:36:40 +010036#include <linux/sched/clock.h>
Ingo Molnarb2d09102017-02-04 01:27:20 +010037#include <linux/rculist.h>
Coly Li50a260e2019-06-28 19:59:58 +080038#include <linux/delay.h>
Kent Overstreetcafe5632013-03-23 16:11:31 -070039#include <trace/events/bcache.h>
40
41/*
42 * Todo:
43 * register_bcache: Return errors out to userspace correctly
44 *
45 * Writeback: don't undirty key until after a cache flush
46 *
47 * Create an iterator for key pointers
48 *
49 * On btree write error, mark bucket such that it won't be freed from the cache
50 *
51 * Journalling:
52 * Check for bad keys in replay
53 * Propagate barriers
54 * Refcount journal entries in journal_replay
55 *
56 * Garbage collection:
57 * Finish incremental gc
58 * Gc should free old UUIDs, data for invalid UUIDs
59 *
60 * Provide a way to list backing device UUIDs we have data cached for, and
61 * probably how long it's been since we've seen them, and a way to invalidate
62 * dirty data for devices that will never be attached again
63 *
64 * Keep 1 min/5 min/15 min statistics of how busy a block device has been, so
65 * that based on that and how much dirty data we have we can keep writeback
66 * from being starved
67 *
68 * Add a tracepoint or somesuch to watch for writeback starvation
69 *
70 * When btree depth > 1 and splitting an interior node, we have to make sure
71 * alloc_bucket() cannot fail. This should be true but is not completely
72 * obvious.
73 *
Kent Overstreetcafe5632013-03-23 16:11:31 -070074 * Plugging?
75 *
76 * If data write is less than hard sector size of ssd, round up offset in open
77 * bucket to the next whole sector
78 *
Kent Overstreetcafe5632013-03-23 16:11:31 -070079 * Superblock needs to be fleshed out for multiple cache devices
80 *
81 * Add a sysfs tunable for the number of writeback IOs in flight
82 *
83 * Add a sysfs tunable for the number of open data buckets
84 *
85 * IO tracking: Can we track when one process is doing io on behalf of another?
86 * IO tracking: Don't use just an average, weigh more recent stuff higher
87 *
88 * Test module load/unload
89 */
90
Kent Overstreetcafe5632013-03-23 16:11:31 -070091#define MAX_NEED_GC 64
92#define MAX_SAVE_PRIO 72
Tang Junhui7f4a59d2018-07-26 12:17:35 +080093#define MAX_GC_TIMES 100
Tang Junhui5c25c4f2018-07-26 12:17:34 +080094#define MIN_GC_NODES 100
95#define GC_SLEEP_MS 100
Kent Overstreetcafe5632013-03-23 16:11:31 -070096
97#define PTR_DIRTY_BIT (((uint64_t) 1 << 36))
98
99#define PTR_HASH(c, k) \
100 (((k)->ptr[0] >> c->bucket_bits) | PTR_GEN(k, 0))
101
Kai Krakow9f233ff2021-02-10 13:07:25 +0800102static struct workqueue_struct *btree_io_wq;
103
Kent Overstreetdf8e8972013-07-24 17:37:59 -0700104#define insert_lock(s, b) ((b)->level <= (s)->lock)
105
Kent Overstreetdf8e8972013-07-24 17:37:59 -0700106
Kent Overstreeta85e9682013-12-20 17:28:16 -0800107static inline struct bset *write_block(struct btree *b)
108{
Coly Li4e1ebae2020-10-01 14:50:49 +0800109 return ((void *) btree_bset_first(b)) + b->written * block_bytes(b->c->cache);
Kent Overstreeta85e9682013-12-20 17:28:16 -0800110}
111
Kent Overstreet2a285682014-03-04 16:42:42 -0800112static void bch_btree_init_next(struct btree *b)
113{
114 /* If not a leaf node, always sort */
115 if (b->level && b->keys.nsets)
116 bch_btree_sort(&b->keys, &b->c->sort);
117 else
118 bch_btree_sort_lazy(&b->keys, &b->c->sort);
119
120 if (b->written < btree_blocks(b))
121 bch_bset_init_next(&b->keys, write_block(b),
Coly Li4a784262020-10-01 14:50:56 +0800122 bset_magic(&b->c->cache->sb));
Kent Overstreet2a285682014-03-04 16:42:42 -0800123
124}
125
Kent Overstreetcafe5632013-03-23 16:11:31 -0700126/* Btree key manipulation */
127
Kent Overstreet3a3b6a42013-07-24 16:46:42 -0700128void bkey_put(struct cache_set *c, struct bkey *k)
Kent Overstreete7c590e2013-09-10 18:39:16 -0700129{
Coly Li6f10f7d2018-08-11 13:19:44 +0800130 unsigned int i;
Kent Overstreete7c590e2013-09-10 18:39:16 -0700131
132 for (i = 0; i < KEY_PTRS(k); i++)
133 if (ptr_available(c, k, i))
134 atomic_dec_bug(&PTR_BUCKET(c, k, i)->pin);
135}
136
Kent Overstreetcafe5632013-03-23 16:11:31 -0700137/* Btree IO */
138
139static uint64_t btree_csum_set(struct btree *b, struct bset *i)
140{
141 uint64_t crc = b->key.ptr[0];
Kent Overstreetfafff812013-12-17 21:56:21 -0800142 void *data = (void *) i + 8, *end = bset_bkey_last(i);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700143
Christoph Hellwig39fa7a92021-10-20 22:38:12 +0800144 crc = crc64_be(crc, data, end - data);
Kent Overstreetc19ed232013-03-26 13:49:02 -0700145 return crc ^ 0xffffffffffffffffULL;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700146}
147
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800148void bch_btree_node_read_done(struct btree *b)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700149{
Kent Overstreetcafe5632013-03-23 16:11:31 -0700150 const char *err = "bad btree header";
Kent Overstreetee811282013-12-17 23:49:49 -0800151 struct bset *i = btree_bset_first(b);
Kent Overstreet57943512013-04-25 13:58:35 -0700152 struct btree_iter *iter;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700153
Shenghui Wangd2f96f42018-12-13 22:53:46 +0800154 /*
155 * c->fill_iter can allocate an iterator with more memory space
156 * than static MAX_BSETS.
157 * See the comment arount cache_set->fill_iter.
158 */
Kent Overstreetd19936a2018-05-20 18:25:51 -0400159 iter = mempool_alloc(&b->c->fill_iter, GFP_NOIO);
Coly Li4a784262020-10-01 14:50:56 +0800160 iter->size = b->c->cache->sb.bucket_size / b->c->cache->sb.block_size;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700161 iter->used = 0;
162
Kent Overstreet280481d2013-10-24 16:36:03 -0700163#ifdef CONFIG_BCACHE_DEBUG
Kent Overstreetc052dd92013-11-11 17:35:24 -0800164 iter->b = &b->keys;
Kent Overstreet280481d2013-10-24 16:36:03 -0700165#endif
166
Kent Overstreet57943512013-04-25 13:58:35 -0700167 if (!i->seq)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700168 goto err;
169
170 for (;
Kent Overstreeta85e9682013-12-20 17:28:16 -0800171 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700172 i = write_block(b)) {
173 err = "unsupported bset version";
174 if (i->version > BCACHE_BSET_VERSION)
175 goto err;
176
177 err = "bad btree header";
Coly Li4e1ebae2020-10-01 14:50:49 +0800178 if (b->written + set_blocks(i, block_bytes(b->c->cache)) >
Kent Overstreetee811282013-12-17 23:49:49 -0800179 btree_blocks(b))
Kent Overstreetcafe5632013-03-23 16:11:31 -0700180 goto err;
181
182 err = "bad magic";
Coly Li4a784262020-10-01 14:50:56 +0800183 if (i->magic != bset_magic(&b->c->cache->sb))
Kent Overstreetcafe5632013-03-23 16:11:31 -0700184 goto err;
185
186 err = "bad checksum";
187 switch (i->version) {
188 case 0:
189 if (i->csum != csum_set(i))
190 goto err;
191 break;
192 case BCACHE_BSET_VERSION:
193 if (i->csum != btree_csum_set(b, i))
194 goto err;
195 break;
196 }
197
198 err = "empty set";
Kent Overstreeta85e9682013-12-20 17:28:16 -0800199 if (i != b->keys.set[0].data && !i->keys)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700200 goto err;
201
Kent Overstreetfafff812013-12-17 21:56:21 -0800202 bch_btree_iter_push(iter, i->start, bset_bkey_last(i));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700203
Coly Li4e1ebae2020-10-01 14:50:49 +0800204 b->written += set_blocks(i, block_bytes(b->c->cache));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700205 }
206
207 err = "corrupted btree";
208 for (i = write_block(b);
Kent Overstreeta85e9682013-12-20 17:28:16 -0800209 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key);
Coly Li4e1ebae2020-10-01 14:50:49 +0800210 i = ((void *) i) + block_bytes(b->c->cache))
Kent Overstreeta85e9682013-12-20 17:28:16 -0800211 if (i->seq == b->keys.set[0].data->seq)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700212 goto err;
213
Kent Overstreeta85e9682013-12-20 17:28:16 -0800214 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700215
Kent Overstreeta85e9682013-12-20 17:28:16 -0800216 i = b->keys.set[0].data;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700217 err = "short btree key";
Kent Overstreeta85e9682013-12-20 17:28:16 -0800218 if (b->keys.set[0].size &&
219 bkey_cmp(&b->key, &b->keys.set[0].end) < 0)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700220 goto err;
221
222 if (b->written < btree_blocks(b))
Kent Overstreeta85e9682013-12-20 17:28:16 -0800223 bch_bset_init_next(&b->keys, write_block(b),
Coly Li4a784262020-10-01 14:50:56 +0800224 bset_magic(&b->c->cache->sb));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700225out:
Kent Overstreetd19936a2018-05-20 18:25:51 -0400226 mempool_free(iter, &b->c->fill_iter);
Kent Overstreet57943512013-04-25 13:58:35 -0700227 return;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700228err:
229 set_btree_node_io_error(b);
Kent Overstreet88b9f8c2013-12-17 21:46:35 -0800230 bch_cache_set_error(b->c, "%s at bucket %zu, block %u, %u keys",
Kent Overstreetcafe5632013-03-23 16:11:31 -0700231 err, PTR_BUCKET_NR(b->c, &b->key, 0),
Kent Overstreet88b9f8c2013-12-17 21:46:35 -0800232 bset_block_offset(b, i), i->keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700233 goto out;
234}
235
Christoph Hellwig4246a0b2015-07-20 15:29:37 +0200236static void btree_node_read_endio(struct bio *bio)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700237{
Kent Overstreet57943512013-04-25 13:58:35 -0700238 struct closure *cl = bio->bi_private;
Coly Li1fae7cf2018-08-11 13:19:45 +0800239
Kent Overstreet57943512013-04-25 13:58:35 -0700240 closure_put(cl);
241}
Kent Overstreetcafe5632013-03-23 16:11:31 -0700242
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800243static void bch_btree_node_read(struct btree *b)
Kent Overstreet57943512013-04-25 13:58:35 -0700244{
245 uint64_t start_time = local_clock();
246 struct closure cl;
247 struct bio *bio;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700248
Kent Overstreetc37511b2013-04-26 15:39:55 -0700249 trace_bcache_btree_read(b);
250
Kent Overstreet57943512013-04-25 13:58:35 -0700251 closure_init_stack(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700252
Kent Overstreet57943512013-04-25 13:58:35 -0700253 bio = bch_bbio_alloc(b->c);
Kent Overstreet4f024f32013-10-11 15:44:27 -0700254 bio->bi_iter.bi_size = KEY_SIZE(&b->key) << 9;
Kent Overstreet57943512013-04-25 13:58:35 -0700255 bio->bi_end_io = btree_node_read_endio;
256 bio->bi_private = &cl;
Christoph Hellwig70fd7612016-11-01 07:40:10 -0600257 bio->bi_opf = REQ_OP_READ | REQ_META;
Kent Overstreet57943512013-04-25 13:58:35 -0700258
Kent Overstreeta85e9682013-12-20 17:28:16 -0800259 bch_bio_map(bio, b->keys.set[0].data);
Kent Overstreet57943512013-04-25 13:58:35 -0700260
Kent Overstreet57943512013-04-25 13:58:35 -0700261 bch_submit_bbio(bio, b->c, &b->key, 0);
262 closure_sync(&cl);
263
Christoph Hellwig4e4cbee2017-06-03 09:38:06 +0200264 if (bio->bi_status)
Kent Overstreet57943512013-04-25 13:58:35 -0700265 set_btree_node_io_error(b);
266
267 bch_bbio_free(bio, b->c);
268
269 if (btree_node_io_error(b))
270 goto err;
271
272 bch_btree_node_read_done(b);
Kent Overstreet57943512013-04-25 13:58:35 -0700273 bch_time_stats_update(&b->c->btree_read_time, start_time);
Kent Overstreet57943512013-04-25 13:58:35 -0700274
275 return;
276err:
Geert Uytterhoeven61cbd252013-09-23 23:17:30 -0700277 bch_cache_set_error(b->c, "io error reading bucket %zu",
Kent Overstreet57943512013-04-25 13:58:35 -0700278 PTR_BUCKET_NR(b->c, &b->key, 0));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700279}
280
281static void btree_complete_write(struct btree *b, struct btree_write *w)
282{
283 if (w->prio_blocked &&
284 !atomic_sub_return(w->prio_blocked, &b->c->prio_blocked))
Kent Overstreet119ba0f2013-04-24 19:01:12 -0700285 wake_up_allocators(b->c);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700286
287 if (w->journal) {
288 atomic_dec_bug(w->journal);
289 __closure_wake_up(&b->c->journal.wait);
290 }
291
Kent Overstreetcafe5632013-03-23 16:11:31 -0700292 w->prio_blocked = 0;
293 w->journal = NULL;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700294}
295
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800296static void btree_node_write_unlock(struct closure *cl)
297{
298 struct btree *b = container_of(cl, struct btree, io);
299
300 up(&b->io_mutex);
301}
302
Kent Overstreet57943512013-04-25 13:58:35 -0700303static void __btree_node_write_done(struct closure *cl)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700304{
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800305 struct btree *b = container_of(cl, struct btree, io);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700306 struct btree_write *w = btree_prev_write(b);
307
308 bch_bbio_free(b->bio, b->c);
309 b->bio = NULL;
310 btree_complete_write(b, w);
311
312 if (btree_node_dirty(b))
Kai Krakow9f233ff2021-02-10 13:07:25 +0800313 queue_delayed_work(btree_io_wq, &b->work, 30 * HZ);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700314
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800315 closure_return_with_destructor(cl, btree_node_write_unlock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700316}
317
Kent Overstreet57943512013-04-25 13:58:35 -0700318static void btree_node_write_done(struct closure *cl)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700319{
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800320 struct btree *b = container_of(cl, struct btree, io);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700321
Guoqing Jiang491221f2016-09-22 03:10:01 -0400322 bio_free_pages(b->bio);
Kent Overstreet57943512013-04-25 13:58:35 -0700323 __btree_node_write_done(cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700324}
325
Christoph Hellwig4246a0b2015-07-20 15:29:37 +0200326static void btree_node_write_endio(struct bio *bio)
Kent Overstreet57943512013-04-25 13:58:35 -0700327{
328 struct closure *cl = bio->bi_private;
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800329 struct btree *b = container_of(cl, struct btree, io);
Kent Overstreet57943512013-04-25 13:58:35 -0700330
Christoph Hellwig4e4cbee2017-06-03 09:38:06 +0200331 if (bio->bi_status)
Kent Overstreet57943512013-04-25 13:58:35 -0700332 set_btree_node_io_error(b);
333
Christoph Hellwig4e4cbee2017-06-03 09:38:06 +0200334 bch_bbio_count_io_errors(b->c, bio, bio->bi_status, "writing btree");
Kent Overstreet57943512013-04-25 13:58:35 -0700335 closure_put(cl);
336}
337
338static void do_btree_node_write(struct btree *b)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700339{
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800340 struct closure *cl = &b->io;
Kent Overstreetee811282013-12-17 23:49:49 -0800341 struct bset *i = btree_bset_last(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700342 BKEY_PADDED(key) k;
343
344 i->version = BCACHE_BSET_VERSION;
345 i->csum = btree_csum_set(b, i);
346
Kent Overstreet57943512013-04-25 13:58:35 -0700347 BUG_ON(b->bio);
348 b->bio = bch_bbio_alloc(b->c);
349
350 b->bio->bi_end_io = btree_node_write_endio;
Kent Overstreetfaadf0c2013-11-01 18:03:08 -0700351 b->bio->bi_private = cl;
Coly Li4e1ebae2020-10-01 14:50:49 +0800352 b->bio->bi_iter.bi_size = roundup(set_bytes(i), block_bytes(b->c->cache));
Christoph Hellwig70fd7612016-11-01 07:40:10 -0600353 b->bio->bi_opf = REQ_OP_WRITE | REQ_META | REQ_FUA;
Kent Overstreet169ef1c2013-03-28 12:50:55 -0600354 bch_bio_map(b->bio, i);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700355
Kent Overstreete49c7c32013-06-26 17:25:38 -0700356 /*
357 * If we're appending to a leaf node, we don't technically need FUA -
358 * this write just needs to be persisted before the next journal write,
359 * which will be marked FLUSH|FUA.
360 *
361 * Similarly if we're writing a new btree root - the pointer is going to
362 * be in the next journal entry.
363 *
364 * But if we're writing a new btree node (that isn't a root) or
365 * appending to a non leaf btree node, we need either FUA or a flush
366 * when we write the parent with the new pointer. FUA is cheaper than a
367 * flush, and writes appending to leaf nodes aren't blocking anything so
368 * just make all btree node writes FUA to keep things sane.
369 */
370
Kent Overstreetcafe5632013-03-23 16:11:31 -0700371 bkey_copy(&k.key, &b->key);
Kent Overstreetee811282013-12-17 23:49:49 -0800372 SET_PTR_OFFSET(&k.key, 0, PTR_OFFSET(&k.key, 0) +
Kent Overstreeta85e9682013-12-20 17:28:16 -0800373 bset_sector_offset(&b->keys, i));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700374
Ming Lei25d8be72017-12-18 20:22:10 +0800375 if (!bch_bio_alloc_pages(b->bio, __GFP_NOWARN|GFP_NOWAIT)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700376 struct bio_vec *bv;
Christoph Hellwigf936b062019-04-25 09:02:59 +0200377 void *addr = (void *) ((unsigned long) i & ~(PAGE_SIZE - 1));
Ming Lei6dc4f102019-02-15 19:13:19 +0800378 struct bvec_iter_all iter_all;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700379
Christoph Hellwig2b070cf2019-04-25 09:03:00 +0200380 bio_for_each_segment_all(bv, b->bio, iter_all) {
Coly Li2878fea2021-11-03 23:10:41 +0800381 memcpy(page_address(bv->bv_page), addr, PAGE_SIZE);
Christoph Hellwigf936b062019-04-25 09:02:59 +0200382 addr += PAGE_SIZE;
383 }
Kent Overstreetcafe5632013-03-23 16:11:31 -0700384
Kent Overstreetcafe5632013-03-23 16:11:31 -0700385 bch_submit_bbio(b->bio, b->c, &k.key, 0);
386
Kent Overstreet57943512013-04-25 13:58:35 -0700387 continue_at(cl, btree_node_write_done, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700388 } else {
Coly Lib0d30982018-08-11 13:19:47 +0800389 /*
390 * No problem for multipage bvec since the bio is
391 * just allocated
392 */
Kent Overstreetcafe5632013-03-23 16:11:31 -0700393 b->bio->bi_vcnt = 0;
Kent Overstreet169ef1c2013-03-28 12:50:55 -0600394 bch_bio_map(b->bio, i);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700395
Kent Overstreetcafe5632013-03-23 16:11:31 -0700396 bch_submit_bbio(b->bio, b->c, &k.key, 0);
397
398 closure_sync(cl);
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800399 continue_at_nobarrier(cl, __btree_node_write_done, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700400 }
401}
402
Kent Overstreet2a285682014-03-04 16:42:42 -0800403void __bch_btree_node_write(struct btree *b, struct closure *parent)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700404{
Kent Overstreetee811282013-12-17 23:49:49 -0800405 struct bset *i = btree_bset_last(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700406
Kent Overstreet2a285682014-03-04 16:42:42 -0800407 lockdep_assert_held(&b->write_lock);
408
Kent Overstreetc37511b2013-04-26 15:39:55 -0700409 trace_bcache_btree_write(b);
410
Kent Overstreetcafe5632013-03-23 16:11:31 -0700411 BUG_ON(current->bio_list);
Kent Overstreet57943512013-04-25 13:58:35 -0700412 BUG_ON(b->written >= btree_blocks(b));
413 BUG_ON(b->written && !i->keys);
Kent Overstreetee811282013-12-17 23:49:49 -0800414 BUG_ON(btree_bset_first(b)->seq != i->seq);
Kent Overstreetdc9d98d2013-12-17 23:47:33 -0800415 bch_check_keys(&b->keys, "writing");
Kent Overstreetcafe5632013-03-23 16:11:31 -0700416
Kent Overstreetcafe5632013-03-23 16:11:31 -0700417 cancel_delayed_work(&b->work);
418
Kent Overstreet57943512013-04-25 13:58:35 -0700419 /* If caller isn't waiting for write, parent refcount is cache set */
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800420 down(&b->io_mutex);
421 closure_init(&b->io, parent ?: &b->c->cl);
Kent Overstreet57943512013-04-25 13:58:35 -0700422
Kent Overstreetcafe5632013-03-23 16:11:31 -0700423 clear_bit(BTREE_NODE_dirty, &b->flags);
424 change_bit(BTREE_NODE_write_idx, &b->flags);
425
Kent Overstreet57943512013-04-25 13:58:35 -0700426 do_btree_node_write(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700427
Coly Li4a784262020-10-01 14:50:56 +0800428 atomic_long_add(set_blocks(i, block_bytes(b->c->cache)) * b->c->cache->sb.block_size,
Christoph Hellwig11e95602021-04-11 21:43:11 +0800429 &b->c->cache->btree_sectors_written);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700430
Coly Li4e1ebae2020-10-01 14:50:49 +0800431 b->written += set_blocks(i, block_bytes(b->c->cache));
Kent Overstreet2a285682014-03-04 16:42:42 -0800432}
Kent Overstreeta85e9682013-12-20 17:28:16 -0800433
Kent Overstreet2a285682014-03-04 16:42:42 -0800434void bch_btree_node_write(struct btree *b, struct closure *parent)
435{
Coly Li6f10f7d2018-08-11 13:19:44 +0800436 unsigned int nsets = b->keys.nsets;
Kent Overstreet2a285682014-03-04 16:42:42 -0800437
438 lockdep_assert_held(&b->lock);
439
440 __bch_btree_node_write(b, parent);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700441
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800442 /*
443 * do verify if there was more than one set initially (i.e. we did a
444 * sort) and we sorted down to a single set:
445 */
Kent Overstreet2a285682014-03-04 16:42:42 -0800446 if (nsets && !b->keys.nsets)
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800447 bch_btree_verify(b);
448
Kent Overstreet2a285682014-03-04 16:42:42 -0800449 bch_btree_init_next(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700450}
451
Kent Overstreetf269af52013-07-23 20:48:29 -0700452static void bch_btree_node_write_sync(struct btree *b)
453{
454 struct closure cl;
455
456 closure_init_stack(&cl);
Kent Overstreet2a285682014-03-04 16:42:42 -0800457
458 mutex_lock(&b->write_lock);
Kent Overstreetf269af52013-07-23 20:48:29 -0700459 bch_btree_node_write(b, &cl);
Kent Overstreet2a285682014-03-04 16:42:42 -0800460 mutex_unlock(&b->write_lock);
461
Kent Overstreetf269af52013-07-23 20:48:29 -0700462 closure_sync(&cl);
463}
464
Kent Overstreet57943512013-04-25 13:58:35 -0700465static void btree_node_write_work(struct work_struct *w)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700466{
467 struct btree *b = container_of(to_delayed_work(w), struct btree, work);
468
Kent Overstreet2a285682014-03-04 16:42:42 -0800469 mutex_lock(&b->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700470 if (btree_node_dirty(b))
Kent Overstreet2a285682014-03-04 16:42:42 -0800471 __bch_btree_node_write(b, NULL);
472 mutex_unlock(&b->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700473}
474
Kent Overstreetc18536a2013-07-24 17:44:17 -0700475static void bch_btree_leaf_dirty(struct btree *b, atomic_t *journal_ref)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700476{
Kent Overstreetee811282013-12-17 23:49:49 -0800477 struct bset *i = btree_bset_last(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700478 struct btree_write *w = btree_current_write(b);
479
Kent Overstreet2a285682014-03-04 16:42:42 -0800480 lockdep_assert_held(&b->write_lock);
481
Kent Overstreet57943512013-04-25 13:58:35 -0700482 BUG_ON(!b->written);
483 BUG_ON(!i->keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700484
Kent Overstreet57943512013-04-25 13:58:35 -0700485 if (!btree_node_dirty(b))
Kai Krakow9f233ff2021-02-10 13:07:25 +0800486 queue_delayed_work(btree_io_wq, &b->work, 30 * HZ);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700487
Kent Overstreet57943512013-04-25 13:58:35 -0700488 set_btree_node_dirty(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700489
Coly Li5dccefd2019-11-13 16:03:22 +0800490 /*
491 * w->journal is always the oldest journal pin of all bkeys
492 * in the leaf node, to make sure the oldest jset seq won't
493 * be increased before this btree node is flushed.
494 */
Kent Overstreetc18536a2013-07-24 17:44:17 -0700495 if (journal_ref) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700496 if (w->journal &&
Kent Overstreetc18536a2013-07-24 17:44:17 -0700497 journal_pin_cmp(b->c, w->journal, journal_ref)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700498 atomic_dec_bug(w->journal);
499 w->journal = NULL;
500 }
501
502 if (!w->journal) {
Kent Overstreetc18536a2013-07-24 17:44:17 -0700503 w->journal = journal_ref;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700504 atomic_inc(w->journal);
505 }
506 }
507
Kent Overstreetcafe5632013-03-23 16:11:31 -0700508 /* Force write if set is too big */
Kent Overstreet57943512013-04-25 13:58:35 -0700509 if (set_bytes(i) > PAGE_SIZE - 48 &&
510 !current->bio_list)
511 bch_btree_node_write(b, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700512}
513
514/*
515 * Btree in memory cache - allocation/freeing
516 * mca -> memory cache
517 */
518
Dongsheng Yang7e59c502020-10-01 14:50:43 +0800519#define mca_reserve(c) (((!IS_ERR_OR_NULL(c->root) && c->root->level) \
Kent Overstreetcafe5632013-03-23 16:11:31 -0700520 ? c->root->level : 1) * 8 + 16)
521#define mca_can_free(c) \
Kent Overstreet0a63b662014-03-17 17:15:53 -0700522 max_t(int, 0, c->btree_cache_used - mca_reserve(c))
Kent Overstreetcafe5632013-03-23 16:11:31 -0700523
524static void mca_data_free(struct btree *b)
525{
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800526 BUG_ON(b->io_mutex.count != 1);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700527
Kent Overstreeta85e9682013-12-20 17:28:16 -0800528 bch_btree_keys_free(&b->keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700529
Kent Overstreet0a63b662014-03-17 17:15:53 -0700530 b->c->btree_cache_used--;
Kent Overstreetee811282013-12-17 23:49:49 -0800531 list_move(&b->list, &b->c->btree_cache_freed);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700532}
533
534static void mca_bucket_free(struct btree *b)
535{
536 BUG_ON(btree_node_dirty(b));
537
538 b->key.ptr[0] = 0;
539 hlist_del_init_rcu(&b->hash);
540 list_move(&b->list, &b->c->btree_cache_freeable);
541}
542
Coly Li6f10f7d2018-08-11 13:19:44 +0800543static unsigned int btree_order(struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700544{
545 return ilog2(KEY_SIZE(k) / PAGE_SECTORS ?: 1);
546}
547
548static void mca_data_alloc(struct btree *b, struct bkey *k, gfp_t gfp)
549{
Kent Overstreeta85e9682013-12-20 17:28:16 -0800550 if (!bch_btree_keys_alloc(&b->keys,
Coly Li6f10f7d2018-08-11 13:19:44 +0800551 max_t(unsigned int,
Kent Overstreetee811282013-12-17 23:49:49 -0800552 ilog2(b->c->btree_pages),
553 btree_order(k)),
554 gfp)) {
Kent Overstreet0a63b662014-03-17 17:15:53 -0700555 b->c->btree_cache_used++;
Kent Overstreetee811282013-12-17 23:49:49 -0800556 list_move(&b->list, &b->c->btree_cache);
557 } else {
558 list_move(&b->list, &b->c->btree_cache_freed);
559 }
Kent Overstreetcafe5632013-03-23 16:11:31 -0700560}
561
562static struct btree *mca_bucket_alloc(struct cache_set *c,
563 struct bkey *k, gfp_t gfp)
564{
Coly Libd9026c2019-06-28 19:59:34 +0800565 /*
566 * kzalloc() is necessary here for initialization,
567 * see code comments in bch_btree_keys_init().
568 */
Kent Overstreetcafe5632013-03-23 16:11:31 -0700569 struct btree *b = kzalloc(sizeof(struct btree), gfp);
Coly Li1fae7cf2018-08-11 13:19:45 +0800570
Kent Overstreetcafe5632013-03-23 16:11:31 -0700571 if (!b)
572 return NULL;
573
574 init_rwsem(&b->lock);
575 lockdep_set_novalidate_class(&b->lock);
Kent Overstreet2a285682014-03-04 16:42:42 -0800576 mutex_init(&b->write_lock);
577 lockdep_set_novalidate_class(&b->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700578 INIT_LIST_HEAD(&b->list);
Kent Overstreet57943512013-04-25 13:58:35 -0700579 INIT_DELAYED_WORK(&b->work, btree_node_write_work);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700580 b->c = c;
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800581 sema_init(&b->io_mutex, 1);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700582
583 mca_data_alloc(b, k, gfp);
584 return b;
585}
586
Coly Li6f10f7d2018-08-11 13:19:44 +0800587static int mca_reap(struct btree *b, unsigned int min_order, bool flush)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700588{
Kent Overstreete8e1d462013-07-24 17:27:07 -0700589 struct closure cl;
590
591 closure_init_stack(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700592 lockdep_assert_held(&b->c->bucket_lock);
593
594 if (!down_write_trylock(&b->lock))
595 return -ENOMEM;
596
Kent Overstreeta85e9682013-12-20 17:28:16 -0800597 BUG_ON(btree_node_dirty(b) && !b->keys.set[0].data);
Kent Overstreete8e1d462013-07-24 17:27:07 -0700598
Kent Overstreeta85e9682013-12-20 17:28:16 -0800599 if (b->keys.page_order < min_order)
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800600 goto out_unlock;
601
602 if (!flush) {
603 if (btree_node_dirty(b))
604 goto out_unlock;
605
606 if (down_trylock(&b->io_mutex))
607 goto out_unlock;
608 up(&b->io_mutex);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700609 }
610
Coly Li50a260e2019-06-28 19:59:58 +0800611retry:
Coly Li41508bb2019-06-28 19:59:56 +0800612 /*
613 * BTREE_NODE_dirty might be cleared in btree_flush_btree() by
614 * __bch_btree_node_write(). To avoid an extra flush, acquire
615 * b->write_lock before checking BTREE_NODE_dirty bit.
616 */
Kent Overstreet2a285682014-03-04 16:42:42 -0800617 mutex_lock(&b->write_lock);
Coly Li50a260e2019-06-28 19:59:58 +0800618 /*
619 * If this btree node is selected in btree_flush_write() by journal
620 * code, delay and retry until the node is flushed by journal code
621 * and BTREE_NODE_journal_flush bit cleared by btree_flush_write().
622 */
623 if (btree_node_journal_flush(b)) {
Joe Perches46f5aa82020-05-27 12:01:52 +0800624 pr_debug("bnode %p is flushing by journal, retry\n", b);
Coly Li50a260e2019-06-28 19:59:58 +0800625 mutex_unlock(&b->write_lock);
626 udelay(1);
627 goto retry;
628 }
629
Kent Overstreetf269af52013-07-23 20:48:29 -0700630 if (btree_node_dirty(b))
Kent Overstreet2a285682014-03-04 16:42:42 -0800631 __bch_btree_node_write(b, &cl);
632 mutex_unlock(&b->write_lock);
633
634 closure_sync(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700635
Kent Overstreete8e1d462013-07-24 17:27:07 -0700636 /* wait for any in flight btree write */
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800637 down(&b->io_mutex);
638 up(&b->io_mutex);
Kent Overstreete8e1d462013-07-24 17:27:07 -0700639
Kent Overstreetcafe5632013-03-23 16:11:31 -0700640 return 0;
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800641out_unlock:
642 rw_unlock(true, b);
643 return -ENOMEM;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700644}
645
Dave Chinner7dc19d52013-08-28 10:18:11 +1000646static unsigned long bch_mca_scan(struct shrinker *shrink,
647 struct shrink_control *sc)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700648{
649 struct cache_set *c = container_of(shrink, struct cache_set, shrink);
650 struct btree *b, *t;
651 unsigned long i, nr = sc->nr_to_scan;
Dave Chinner7dc19d52013-08-28 10:18:11 +1000652 unsigned long freed = 0;
Tang Junhuica71df32018-03-18 17:36:22 -0700653 unsigned int btree_cache_used;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700654
655 if (c->shrinker_disabled)
Dave Chinner7dc19d52013-08-28 10:18:11 +1000656 return SHRINK_STOP;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700657
Kent Overstreet0a63b662014-03-17 17:15:53 -0700658 if (c->btree_cache_alloc_lock)
Dave Chinner7dc19d52013-08-28 10:18:11 +1000659 return SHRINK_STOP;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700660
661 /* Return -1 if we can't do anything right now */
Kent Overstreeta698e082013-09-23 23:17:34 -0700662 if (sc->gfp_mask & __GFP_IO)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700663 mutex_lock(&c->bucket_lock);
664 else if (!mutex_trylock(&c->bucket_lock))
665 return -1;
666
Kent Overstreet36c9ea92013-06-03 13:04:56 -0700667 /*
668 * It's _really_ critical that we don't free too many btree nodes - we
669 * have to always leave ourselves a reserve. The reserve is how we
670 * guarantee that allocating memory for a new btree node can always
671 * succeed, so that inserting keys into the btree can always succeed and
672 * IO can always make forward progress:
673 */
Kent Overstreetcafe5632013-03-23 16:11:31 -0700674 nr /= c->btree_pages;
Coly Li9fcc34b2019-11-13 16:03:24 +0800675 if (nr == 0)
676 nr = 1;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700677 nr = min_t(unsigned long, nr, mca_can_free(c));
678
679 i = 0;
Tang Junhuica71df32018-03-18 17:36:22 -0700680 btree_cache_used = c->btree_cache_used;
Coly Lid5c9c472020-01-24 01:01:41 +0800681 list_for_each_entry_safe_reverse(b, t, &c->btree_cache_freeable, list) {
Tang Junhuica71df32018-03-18 17:36:22 -0700682 if (nr <= 0)
683 goto out;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700684
Coly Lid5c9c472020-01-24 01:01:41 +0800685 if (!mca_reap(b, 0, false)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700686 mca_data_free(b);
687 rw_unlock(true, b);
Dave Chinner7dc19d52013-08-28 10:18:11 +1000688 freed++;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700689 }
Tang Junhuica71df32018-03-18 17:36:22 -0700690 nr--;
Coly Lid5c9c472020-01-24 01:01:41 +0800691 i++;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700692 }
693
Coly Lie3de0442020-01-24 01:01:42 +0800694 list_for_each_entry_safe_reverse(b, t, &c->btree_cache, list) {
695 if (nr <= 0 || i >= btree_cache_used)
Kent Overstreetb0f32a52013-12-10 13:24:26 -0800696 goto out;
697
Coly Li125d98e2020-01-24 01:01:40 +0800698 if (!mca_reap(b, 0, false)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700699 mca_bucket_free(b);
700 mca_data_free(b);
701 rw_unlock(true, b);
Dave Chinner7dc19d52013-08-28 10:18:11 +1000702 freed++;
Coly Li125d98e2020-01-24 01:01:40 +0800703 }
Coly Lie3de0442020-01-24 01:01:42 +0800704
705 nr--;
706 i++;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700707 }
708out:
Kent Overstreetcafe5632013-03-23 16:11:31 -0700709 mutex_unlock(&c->bucket_lock);
Tang Junhuif3641c32018-03-18 17:36:21 -0700710 return freed * c->btree_pages;
Dave Chinner7dc19d52013-08-28 10:18:11 +1000711}
712
713static unsigned long bch_mca_count(struct shrinker *shrink,
714 struct shrink_control *sc)
715{
716 struct cache_set *c = container_of(shrink, struct cache_set, shrink);
717
718 if (c->shrinker_disabled)
719 return 0;
720
Kent Overstreet0a63b662014-03-17 17:15:53 -0700721 if (c->btree_cache_alloc_lock)
Dave Chinner7dc19d52013-08-28 10:18:11 +1000722 return 0;
723
724 return mca_can_free(c) * c->btree_pages;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700725}
726
727void bch_btree_cache_free(struct cache_set *c)
728{
729 struct btree *b;
730 struct closure cl;
Coly Li1fae7cf2018-08-11 13:19:45 +0800731
Kent Overstreetcafe5632013-03-23 16:11:31 -0700732 closure_init_stack(&cl);
733
734 if (c->shrink.list.next)
735 unregister_shrinker(&c->shrink);
736
737 mutex_lock(&c->bucket_lock);
738
739#ifdef CONFIG_BCACHE_DEBUG
740 if (c->verify_data)
741 list_move(&c->verify_data->list, &c->btree_cache);
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800742
Coly Li4a784262020-10-01 14:50:56 +0800743 free_pages((unsigned long) c->verify_ondisk, ilog2(meta_bucket_pages(&c->cache->sb)));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700744#endif
745
746 list_splice(&c->btree_cache_freeable,
747 &c->btree_cache);
748
749 while (!list_empty(&c->btree_cache)) {
750 b = list_first_entry(&c->btree_cache, struct btree, list);
751
Coly Li41508bb2019-06-28 19:59:56 +0800752 /*
753 * This function is called by cache_set_free(), no I/O
754 * request on cache now, it is unnecessary to acquire
755 * b->write_lock before clearing BTREE_NODE_dirty anymore.
756 */
Coly Lie5ec5f42019-06-28 19:59:55 +0800757 if (btree_node_dirty(b)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700758 btree_complete_write(b, btree_current_write(b));
Coly Lie5ec5f42019-06-28 19:59:55 +0800759 clear_bit(BTREE_NODE_dirty, &b->flags);
760 }
Kent Overstreetcafe5632013-03-23 16:11:31 -0700761 mca_data_free(b);
762 }
763
764 while (!list_empty(&c->btree_cache_freed)) {
765 b = list_first_entry(&c->btree_cache_freed,
766 struct btree, list);
767 list_del(&b->list);
768 cancel_delayed_work_sync(&b->work);
769 kfree(b);
770 }
771
772 mutex_unlock(&c->bucket_lock);
773}
774
775int bch_btree_cache_alloc(struct cache_set *c)
776{
Coly Li6f10f7d2018-08-11 13:19:44 +0800777 unsigned int i;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700778
Kent Overstreetcafe5632013-03-23 16:11:31 -0700779 for (i = 0; i < mca_reserve(c); i++)
Kent Overstreet72a44512013-10-24 17:19:26 -0700780 if (!mca_bucket_alloc(c, &ZERO_KEY, GFP_KERNEL))
781 return -ENOMEM;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700782
783 list_splice_init(&c->btree_cache,
784 &c->btree_cache_freeable);
785
786#ifdef CONFIG_BCACHE_DEBUG
787 mutex_init(&c->verify_lock);
788
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800789 c->verify_ondisk = (void *)
Coly Li4a784262020-10-01 14:50:56 +0800790 __get_free_pages(GFP_KERNEL|__GFP_COMP,
791 ilog2(meta_bucket_pages(&c->cache->sb)));
Coly Libf6af172020-07-25 20:00:33 +0800792 if (!c->verify_ondisk) {
793 /*
794 * Don't worry about the mca_rereserve buckets
795 * allocated in previous for-loop, they will be
796 * handled properly in bch_cache_set_unregister().
797 */
798 return -ENOMEM;
799 }
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800800
Kent Overstreetcafe5632013-03-23 16:11:31 -0700801 c->verify_data = mca_bucket_alloc(c, &ZERO_KEY, GFP_KERNEL);
802
803 if (c->verify_data &&
Kent Overstreeta85e9682013-12-20 17:28:16 -0800804 c->verify_data->keys.set->data)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700805 list_del_init(&c->verify_data->list);
806 else
807 c->verify_data = NULL;
808#endif
809
Dave Chinner7dc19d52013-08-28 10:18:11 +1000810 c->shrink.count_objects = bch_mca_count;
811 c->shrink.scan_objects = bch_mca_scan;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700812 c->shrink.seeks = 4;
813 c->shrink.batch = c->btree_pages * 2;
Michael Lyle6c4ca1e2017-11-24 15:14:27 -0800814
815 if (register_shrinker(&c->shrink))
Joe Perches46f5aa82020-05-27 12:01:52 +0800816 pr_warn("bcache: %s: could not register shrinker\n",
Michael Lyle6c4ca1e2017-11-24 15:14:27 -0800817 __func__);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700818
819 return 0;
820}
821
822/* Btree in memory cache - hash table */
823
824static struct hlist_head *mca_hash(struct cache_set *c, struct bkey *k)
825{
826 return &c->bucket_hash[hash_32(PTR_HASH(c, k), BUCKET_HASH_BITS)];
827}
828
829static struct btree *mca_find(struct cache_set *c, struct bkey *k)
830{
831 struct btree *b;
832
833 rcu_read_lock();
834 hlist_for_each_entry_rcu(b, mca_hash(c, k), hash)
835 if (PTR_HASH(c, &b->key) == PTR_HASH(c, k))
836 goto out;
837 b = NULL;
838out:
839 rcu_read_unlock();
840 return b;
841}
842
Kent Overstreet0a63b662014-03-17 17:15:53 -0700843static int mca_cannibalize_lock(struct cache_set *c, struct btree_op *op)
844{
Guoju Fang34cf78b2019-11-13 16:03:16 +0800845 spin_lock(&c->btree_cannibalize_lock);
846 if (likely(c->btree_cache_alloc_lock == NULL)) {
847 c->btree_cache_alloc_lock = current;
848 } else if (c->btree_cache_alloc_lock != current) {
Kent Overstreet0a63b662014-03-17 17:15:53 -0700849 if (op)
850 prepare_to_wait(&c->btree_cache_wait, &op->wait,
851 TASK_UNINTERRUPTIBLE);
Guoju Fang34cf78b2019-11-13 16:03:16 +0800852 spin_unlock(&c->btree_cannibalize_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -0700853 return -EINTR;
854 }
Guoju Fang34cf78b2019-11-13 16:03:16 +0800855 spin_unlock(&c->btree_cannibalize_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -0700856
857 return 0;
858}
859
860static struct btree *mca_cannibalize(struct cache_set *c, struct btree_op *op,
861 struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700862{
Kent Overstreete8e1d462013-07-24 17:27:07 -0700863 struct btree *b;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700864
Kent Overstreetc37511b2013-04-26 15:39:55 -0700865 trace_bcache_btree_cache_cannibalize(c);
866
Kent Overstreet0a63b662014-03-17 17:15:53 -0700867 if (mca_cannibalize_lock(c, op))
868 return ERR_PTR(-EINTR);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700869
Kent Overstreete8e1d462013-07-24 17:27:07 -0700870 list_for_each_entry_reverse(b, &c->btree_cache, list)
871 if (!mca_reap(b, btree_order(k), false))
872 return b;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700873
Kent Overstreete8e1d462013-07-24 17:27:07 -0700874 list_for_each_entry_reverse(b, &c->btree_cache, list)
875 if (!mca_reap(b, btree_order(k), true))
876 return b;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700877
Kent Overstreet0a63b662014-03-17 17:15:53 -0700878 WARN(1, "btree cache cannibalize failed\n");
Kent Overstreete8e1d462013-07-24 17:27:07 -0700879 return ERR_PTR(-ENOMEM);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700880}
881
882/*
883 * We can only have one thread cannibalizing other cached btree nodes at a time,
884 * or we'll deadlock. We use an open coded mutex to ensure that, which a
885 * cannibalize_bucket() will take. This means every time we unlock the root of
886 * the btree, we need to release this lock if we have it held.
887 */
Kent Overstreetdf8e8972013-07-24 17:37:59 -0700888static void bch_cannibalize_unlock(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700889{
Guoju Fang34cf78b2019-11-13 16:03:16 +0800890 spin_lock(&c->btree_cannibalize_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -0700891 if (c->btree_cache_alloc_lock == current) {
892 c->btree_cache_alloc_lock = NULL;
893 wake_up(&c->btree_cache_wait);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700894 }
Guoju Fang34cf78b2019-11-13 16:03:16 +0800895 spin_unlock(&c->btree_cannibalize_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700896}
897
Kent Overstreet0a63b662014-03-17 17:15:53 -0700898static struct btree *mca_alloc(struct cache_set *c, struct btree_op *op,
899 struct bkey *k, int level)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700900{
901 struct btree *b;
902
Kent Overstreete8e1d462013-07-24 17:27:07 -0700903 BUG_ON(current->bio_list);
904
Kent Overstreetcafe5632013-03-23 16:11:31 -0700905 lockdep_assert_held(&c->bucket_lock);
906
907 if (mca_find(c, k))
908 return NULL;
909
910 /* btree_free() doesn't free memory; it sticks the node on the end of
911 * the list. Check if there's any freed nodes there:
912 */
913 list_for_each_entry(b, &c->btree_cache_freeable, list)
Kent Overstreete8e1d462013-07-24 17:27:07 -0700914 if (!mca_reap(b, btree_order(k), false))
Kent Overstreetcafe5632013-03-23 16:11:31 -0700915 goto out;
916
917 /* We never free struct btree itself, just the memory that holds the on
918 * disk node. Check the freed list before allocating a new one:
919 */
920 list_for_each_entry(b, &c->btree_cache_freed, list)
Kent Overstreete8e1d462013-07-24 17:27:07 -0700921 if (!mca_reap(b, 0, false)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700922 mca_data_alloc(b, k, __GFP_NOWARN|GFP_NOIO);
Kent Overstreeta85e9682013-12-20 17:28:16 -0800923 if (!b->keys.set[0].data)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700924 goto err;
925 else
926 goto out;
927 }
928
929 b = mca_bucket_alloc(c, k, __GFP_NOWARN|GFP_NOIO);
930 if (!b)
931 goto err;
932
933 BUG_ON(!down_write_trylock(&b->lock));
Kent Overstreeta85e9682013-12-20 17:28:16 -0800934 if (!b->keys.set->data)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700935 goto err;
936out:
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800937 BUG_ON(b->io_mutex.count != 1);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700938
939 bkey_copy(&b->key, k);
940 list_move(&b->list, &c->btree_cache);
941 hlist_del_init_rcu(&b->hash);
942 hlist_add_head_rcu(&b->hash, mca_hash(c, k));
943
944 lock_set_subclass(&b->lock.dep_map, level + 1, _THIS_IP_);
Kent Overstreetd6fd3b12013-07-24 17:20:19 -0700945 b->parent = (void *) ~0UL;
Kent Overstreeta85e9682013-12-20 17:28:16 -0800946 b->flags = 0;
947 b->written = 0;
948 b->level = level;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700949
Kent Overstreet65d45232013-12-20 17:22:05 -0800950 if (!b->level)
Kent Overstreeta85e9682013-12-20 17:28:16 -0800951 bch_btree_keys_init(&b->keys, &bch_extent_keys_ops,
952 &b->c->expensive_debug_checks);
Kent Overstreet65d45232013-12-20 17:22:05 -0800953 else
Kent Overstreeta85e9682013-12-20 17:28:16 -0800954 bch_btree_keys_init(&b->keys, &bch_btree_keys_ops,
955 &b->c->expensive_debug_checks);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700956
957 return b;
958err:
959 if (b)
960 rw_unlock(true, b);
961
Kent Overstreet0a63b662014-03-17 17:15:53 -0700962 b = mca_cannibalize(c, op, k);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700963 if (!IS_ERR(b))
964 goto out;
965
966 return b;
967}
968
Bart Van Assche47344e32018-03-18 17:36:29 -0700969/*
Kent Overstreetcafe5632013-03-23 16:11:31 -0700970 * bch_btree_node_get - find a btree node in the cache and lock it, reading it
971 * in from disk if necessary.
972 *
Christoph Hellwiged00aab2020-07-01 10:59:44 +0200973 * If IO is necessary and running under submit_bio_noacct, returns -EAGAIN.
Kent Overstreetcafe5632013-03-23 16:11:31 -0700974 *
975 * The btree node will have either a read or a write lock held, depending on
976 * level and op->lock.
977 */
Kent Overstreet0a63b662014-03-17 17:15:53 -0700978struct btree *bch_btree_node_get(struct cache_set *c, struct btree_op *op,
Slava Pestov2452cc82014-07-12 00:22:53 -0700979 struct bkey *k, int level, bool write,
980 struct btree *parent)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700981{
982 int i = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700983 struct btree *b;
984
985 BUG_ON(level < 0);
986retry:
987 b = mca_find(c, k);
988
989 if (!b) {
Kent Overstreet57943512013-04-25 13:58:35 -0700990 if (current->bio_list)
991 return ERR_PTR(-EAGAIN);
992
Kent Overstreetcafe5632013-03-23 16:11:31 -0700993 mutex_lock(&c->bucket_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -0700994 b = mca_alloc(c, op, k, level);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700995 mutex_unlock(&c->bucket_lock);
996
997 if (!b)
998 goto retry;
999 if (IS_ERR(b))
1000 return b;
1001
Kent Overstreet57943512013-04-25 13:58:35 -07001002 bch_btree_node_read(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001003
1004 if (!write)
1005 downgrade_write(&b->lock);
1006 } else {
1007 rw_lock(write, b, level);
1008 if (PTR_HASH(c, &b->key) != PTR_HASH(c, k)) {
1009 rw_unlock(write, b);
1010 goto retry;
1011 }
1012 BUG_ON(b->level != level);
1013 }
1014
Coly Lic2e8dcf2018-08-09 15:48:44 +08001015 if (btree_node_io_error(b)) {
1016 rw_unlock(write, b);
1017 return ERR_PTR(-EIO);
1018 }
1019
1020 BUG_ON(!b->written);
1021
Slava Pestov2452cc82014-07-12 00:22:53 -07001022 b->parent = parent;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001023
Kent Overstreeta85e9682013-12-20 17:28:16 -08001024 for (; i <= b->keys.nsets && b->keys.set[i].size; i++) {
1025 prefetch(b->keys.set[i].tree);
1026 prefetch(b->keys.set[i].data);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001027 }
1028
Kent Overstreeta85e9682013-12-20 17:28:16 -08001029 for (; i <= b->keys.nsets; i++)
1030 prefetch(b->keys.set[i].data);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001031
Kent Overstreetcafe5632013-03-23 16:11:31 -07001032 return b;
1033}
1034
Slava Pestov2452cc82014-07-12 00:22:53 -07001035static void btree_node_prefetch(struct btree *parent, struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001036{
1037 struct btree *b;
1038
Slava Pestov2452cc82014-07-12 00:22:53 -07001039 mutex_lock(&parent->c->bucket_lock);
1040 b = mca_alloc(parent->c, NULL, k, parent->level - 1);
1041 mutex_unlock(&parent->c->bucket_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001042
1043 if (!IS_ERR_OR_NULL(b)) {
Slava Pestov2452cc82014-07-12 00:22:53 -07001044 b->parent = parent;
Kent Overstreet57943512013-04-25 13:58:35 -07001045 bch_btree_node_read(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001046 rw_unlock(true, b);
1047 }
1048}
1049
1050/* Btree alloc */
1051
Kent Overstreete8e1d462013-07-24 17:27:07 -07001052static void btree_node_free(struct btree *b)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001053{
Kent Overstreetc37511b2013-04-26 15:39:55 -07001054 trace_bcache_btree_node_free(b);
1055
Kent Overstreetcafe5632013-03-23 16:11:31 -07001056 BUG_ON(b == b->c->root);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001057
Coly Li50a260e2019-06-28 19:59:58 +08001058retry:
Kent Overstreet2a285682014-03-04 16:42:42 -08001059 mutex_lock(&b->write_lock);
Coly Li50a260e2019-06-28 19:59:58 +08001060 /*
1061 * If the btree node is selected and flushing in btree_flush_write(),
1062 * delay and retry until the BTREE_NODE_journal_flush bit cleared,
1063 * then it is safe to free the btree node here. Otherwise this btree
1064 * node will be in race condition.
1065 */
1066 if (btree_node_journal_flush(b)) {
1067 mutex_unlock(&b->write_lock);
Joe Perches46f5aa82020-05-27 12:01:52 +08001068 pr_debug("bnode %p journal_flush set, retry\n", b);
Coly Li50a260e2019-06-28 19:59:58 +08001069 udelay(1);
1070 goto retry;
1071 }
Kent Overstreet2a285682014-03-04 16:42:42 -08001072
Coly Lie5ec5f42019-06-28 19:59:55 +08001073 if (btree_node_dirty(b)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -07001074 btree_complete_write(b, btree_current_write(b));
Coly Lie5ec5f42019-06-28 19:59:55 +08001075 clear_bit(BTREE_NODE_dirty, &b->flags);
1076 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001077
Kent Overstreet2a285682014-03-04 16:42:42 -08001078 mutex_unlock(&b->write_lock);
1079
Kent Overstreetcafe5632013-03-23 16:11:31 -07001080 cancel_delayed_work(&b->work);
1081
1082 mutex_lock(&b->c->bucket_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001083 bch_bucket_free(b->c, &b->key);
1084 mca_bucket_free(b);
1085 mutex_unlock(&b->c->bucket_lock);
1086}
1087
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001088struct btree *__bch_btree_node_alloc(struct cache_set *c, struct btree_op *op,
Slava Pestov2452cc82014-07-12 00:22:53 -07001089 int level, bool wait,
1090 struct btree *parent)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001091{
1092 BKEY_PADDED(key) k;
1093 struct btree *b = ERR_PTR(-EAGAIN);
1094
1095 mutex_lock(&c->bucket_lock);
1096retry:
Coly Li17e4aed2020-10-01 14:50:45 +08001097 if (__bch_bucket_alloc_set(c, RESERVE_BTREE, &k.key, wait))
Kent Overstreetcafe5632013-03-23 16:11:31 -07001098 goto err;
1099
Kent Overstreet3a3b6a42013-07-24 16:46:42 -07001100 bkey_put(c, &k.key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001101 SET_KEY_SIZE(&k.key, c->btree_pages * PAGE_SECTORS);
1102
Kent Overstreet0a63b662014-03-17 17:15:53 -07001103 b = mca_alloc(c, op, &k.key, level);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001104 if (IS_ERR(b))
1105 goto err_free;
1106
1107 if (!b) {
Kent Overstreetb1a67b02013-03-25 11:46:44 -07001108 cache_bug(c,
1109 "Tried to allocate bucket that was in btree cache");
Kent Overstreetcafe5632013-03-23 16:11:31 -07001110 goto retry;
1111 }
1112
Slava Pestov2452cc82014-07-12 00:22:53 -07001113 b->parent = parent;
Coly Li4a784262020-10-01 14:50:56 +08001114 bch_bset_init_next(&b->keys, b->keys.set->data, bset_magic(&b->c->cache->sb));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001115
1116 mutex_unlock(&c->bucket_lock);
Kent Overstreetc37511b2013-04-26 15:39:55 -07001117
1118 trace_bcache_btree_node_alloc(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001119 return b;
1120err_free:
1121 bch_bucket_free(c, &k.key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001122err:
1123 mutex_unlock(&c->bucket_lock);
Kent Overstreetc37511b2013-04-26 15:39:55 -07001124
Slava Pestov913dc332014-05-23 11:18:35 -07001125 trace_bcache_btree_node_alloc_fail(c);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001126 return b;
1127}
1128
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001129static struct btree *bch_btree_node_alloc(struct cache_set *c,
Slava Pestov2452cc82014-07-12 00:22:53 -07001130 struct btree_op *op, int level,
1131 struct btree *parent)
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001132{
Slava Pestov2452cc82014-07-12 00:22:53 -07001133 return __bch_btree_node_alloc(c, op, level, op != NULL, parent);
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001134}
1135
Kent Overstreet0a63b662014-03-17 17:15:53 -07001136static struct btree *btree_node_alloc_replacement(struct btree *b,
1137 struct btree_op *op)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001138{
Slava Pestov2452cc82014-07-12 00:22:53 -07001139 struct btree *n = bch_btree_node_alloc(b->c, op, b->level, b->parent);
Coly Li1fae7cf2018-08-11 13:19:45 +08001140
Kent Overstreet67539e82013-09-10 22:53:34 -07001141 if (!IS_ERR_OR_NULL(n)) {
Kent Overstreet2a285682014-03-04 16:42:42 -08001142 mutex_lock(&n->write_lock);
Kent Overstreet89ebb4a2013-11-11 18:38:51 -08001143 bch_btree_sort_into(&b->keys, &n->keys, &b->c->sort);
Kent Overstreet67539e82013-09-10 22:53:34 -07001144 bkey_copy_key(&n->key, &b->key);
Kent Overstreet2a285682014-03-04 16:42:42 -08001145 mutex_unlock(&n->write_lock);
Kent Overstreet67539e82013-09-10 22:53:34 -07001146 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001147
1148 return n;
1149}
1150
Kent Overstreet8835c122013-07-24 23:18:05 -07001151static void make_btree_freeing_key(struct btree *b, struct bkey *k)
1152{
Coly Li6f10f7d2018-08-11 13:19:44 +08001153 unsigned int i;
Kent Overstreet8835c122013-07-24 23:18:05 -07001154
Kent Overstreet05335cf2014-03-17 18:22:34 -07001155 mutex_lock(&b->c->bucket_lock);
1156
1157 atomic_inc(&b->c->prio_blocked);
1158
Kent Overstreet8835c122013-07-24 23:18:05 -07001159 bkey_copy(k, &b->key);
1160 bkey_copy_key(k, &ZERO_KEY);
1161
Kent Overstreet05335cf2014-03-17 18:22:34 -07001162 for (i = 0; i < KEY_PTRS(k); i++)
1163 SET_PTR_GEN(k, i,
Christoph Hellwig11e95602021-04-11 21:43:11 +08001164 bch_inc_gen(b->c->cache,
Kent Overstreet05335cf2014-03-17 18:22:34 -07001165 PTR_BUCKET(b->c, &b->key, i)));
Kent Overstreet8835c122013-07-24 23:18:05 -07001166
Kent Overstreet05335cf2014-03-17 18:22:34 -07001167 mutex_unlock(&b->c->bucket_lock);
Kent Overstreet8835c122013-07-24 23:18:05 -07001168}
1169
Kent Overstreet78365412013-12-17 01:29:34 -08001170static int btree_check_reserve(struct btree *b, struct btree_op *op)
1171{
1172 struct cache_set *c = b->c;
Coly Li08fdb2c2020-10-01 14:50:47 +08001173 struct cache *ca = c->cache;
1174 unsigned int reserve = (c->root->level - b->level) * 2 + 1;
Kent Overstreet78365412013-12-17 01:29:34 -08001175
1176 mutex_lock(&c->bucket_lock);
1177
Coly Li08fdb2c2020-10-01 14:50:47 +08001178 if (fifo_used(&ca->free[RESERVE_BTREE]) < reserve) {
1179 if (op)
1180 prepare_to_wait(&c->btree_cache_wait, &op->wait,
1181 TASK_UNINTERRUPTIBLE);
1182 mutex_unlock(&c->bucket_lock);
1183 return -EINTR;
1184 }
Kent Overstreet78365412013-12-17 01:29:34 -08001185
1186 mutex_unlock(&c->bucket_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -07001187
1188 return mca_cannibalize_lock(b->c, op);
Kent Overstreet78365412013-12-17 01:29:34 -08001189}
1190
Kent Overstreetcafe5632013-03-23 16:11:31 -07001191/* Garbage collection */
1192
Kent Overstreet487dded2014-03-17 15:13:26 -07001193static uint8_t __bch_btree_mark_key(struct cache_set *c, int level,
1194 struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001195{
1196 uint8_t stale = 0;
Coly Li6f10f7d2018-08-11 13:19:44 +08001197 unsigned int i;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001198 struct bucket *g;
1199
1200 /*
1201 * ptr_invalid() can't return true for the keys that mark btree nodes as
1202 * freed, but since ptr_bad() returns true we'll never actually use them
1203 * for anything and thus we don't want mark their pointers here
1204 */
1205 if (!bkey_cmp(k, &ZERO_KEY))
1206 return stale;
1207
1208 for (i = 0; i < KEY_PTRS(k); i++) {
1209 if (!ptr_available(c, k, i))
1210 continue;
1211
1212 g = PTR_BUCKET(c, k, i);
1213
Kent Overstreet3a2fd9d2014-02-27 17:51:12 -08001214 if (gen_after(g->last_gc, PTR_GEN(k, i)))
1215 g->last_gc = PTR_GEN(k, i);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001216
1217 if (ptr_stale(c, k, i)) {
1218 stale = max(stale, ptr_stale(c, k, i));
1219 continue;
1220 }
1221
1222 cache_bug_on(GC_MARK(g) &&
1223 (GC_MARK(g) == GC_MARK_METADATA) != (level != 0),
1224 c, "inconsistent ptrs: mark = %llu, level = %i",
1225 GC_MARK(g), level);
1226
1227 if (level)
1228 SET_GC_MARK(g, GC_MARK_METADATA);
1229 else if (KEY_DIRTY(k))
1230 SET_GC_MARK(g, GC_MARK_DIRTY);
Kent Overstreet4fe6a812014-03-13 13:46:29 -07001231 else if (!GC_MARK(g))
1232 SET_GC_MARK(g, GC_MARK_RECLAIMABLE);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001233
1234 /* guard against overflow */
Coly Li6f10f7d2018-08-11 13:19:44 +08001235 SET_GC_SECTORS_USED(g, min_t(unsigned int,
Kent Overstreetcafe5632013-03-23 16:11:31 -07001236 GC_SECTORS_USED(g) + KEY_SIZE(k),
Darrick J. Wong94717442014-01-28 16:57:39 -08001237 MAX_GC_SECTORS_USED));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001238
1239 BUG_ON(!GC_SECTORS_USED(g));
1240 }
1241
1242 return stale;
1243}
1244
1245#define btree_mark_key(b, k) __bch_btree_mark_key(b->c, b->level, k)
1246
Kent Overstreet487dded2014-03-17 15:13:26 -07001247void bch_initial_mark_key(struct cache_set *c, int level, struct bkey *k)
1248{
Coly Li6f10f7d2018-08-11 13:19:44 +08001249 unsigned int i;
Kent Overstreet487dded2014-03-17 15:13:26 -07001250
1251 for (i = 0; i < KEY_PTRS(k); i++)
1252 if (ptr_available(c, k, i) &&
1253 !ptr_stale(c, k, i)) {
1254 struct bucket *b = PTR_BUCKET(c, k, i);
1255
1256 b->gen = PTR_GEN(k, i);
1257
1258 if (level && bkey_cmp(k, &ZERO_KEY))
1259 b->prio = BTREE_PRIO;
1260 else if (!level && b->prio == BTREE_PRIO)
1261 b->prio = INITIAL_PRIO;
1262 }
1263
1264 __bch_btree_mark_key(c, level, k);
1265}
1266
Tang Junhuid44c2f92017-10-30 14:46:33 -07001267void bch_update_bucket_in_use(struct cache_set *c, struct gc_stat *stats)
1268{
1269 stats->in_use = (c->nbuckets - c->avail_nbuckets) * 100 / c->nbuckets;
1270}
1271
Kent Overstreeta1f03582013-09-10 19:07:00 -07001272static bool btree_gc_mark_node(struct btree *b, struct gc_stat *gc)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001273{
1274 uint8_t stale = 0;
Coly Li6f10f7d2018-08-11 13:19:44 +08001275 unsigned int keys = 0, good_keys = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001276 struct bkey *k;
1277 struct btree_iter iter;
1278 struct bset_tree *t;
1279
1280 gc->nodes++;
1281
Kent Overstreetc052dd92013-11-11 17:35:24 -08001282 for_each_key_filter(&b->keys, k, &iter, bch_ptr_invalid) {
Kent Overstreetcafe5632013-03-23 16:11:31 -07001283 stale = max(stale, btree_mark_key(b, k));
Kent Overstreeta1f03582013-09-10 19:07:00 -07001284 keys++;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001285
Kent Overstreeta85e9682013-12-20 17:28:16 -08001286 if (bch_ptr_bad(&b->keys, k))
Kent Overstreetcafe5632013-03-23 16:11:31 -07001287 continue;
1288
Kent Overstreetcafe5632013-03-23 16:11:31 -07001289 gc->key_bytes += bkey_u64s(k);
1290 gc->nkeys++;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001291 good_keys++;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001292
1293 gc->data += KEY_SIZE(k);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001294 }
1295
Kent Overstreeta85e9682013-12-20 17:28:16 -08001296 for (t = b->keys.set; t <= &b->keys.set[b->keys.nsets]; t++)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001297 btree_bug_on(t->size &&
Kent Overstreeta85e9682013-12-20 17:28:16 -08001298 bset_written(&b->keys, t) &&
Kent Overstreetcafe5632013-03-23 16:11:31 -07001299 bkey_cmp(&b->key, &t->end) < 0,
1300 b, "found short btree key in gc");
1301
Kent Overstreeta1f03582013-09-10 19:07:00 -07001302 if (b->c->gc_always_rewrite)
1303 return true;
1304
1305 if (stale > 10)
1306 return true;
1307
1308 if ((keys - good_keys) * 2 > keys)
1309 return true;
1310
1311 return false;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001312}
1313
Kent Overstreeta1f03582013-09-10 19:07:00 -07001314#define GC_MERGE_NODES 4U
Kent Overstreetcafe5632013-03-23 16:11:31 -07001315
1316struct gc_merge_info {
1317 struct btree *b;
Coly Li6f10f7d2018-08-11 13:19:44 +08001318 unsigned int keys;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001319};
1320
Coly Lifc2d5982018-08-11 13:19:46 +08001321static int bch_btree_insert_node(struct btree *b, struct btree_op *op,
1322 struct keylist *insert_keys,
1323 atomic_t *journal_ref,
1324 struct bkey *replace_key);
Kent Overstreetb54d6932013-07-24 18:04:18 -07001325
Kent Overstreeta1f03582013-09-10 19:07:00 -07001326static int btree_gc_coalesce(struct btree *b, struct btree_op *op,
Kent Overstreet0a63b662014-03-17 17:15:53 -07001327 struct gc_stat *gc, struct gc_merge_info *r)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001328{
Coly Li6f10f7d2018-08-11 13:19:44 +08001329 unsigned int i, nodes = 0, keys = 0, blocks;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001330 struct btree *new_nodes[GC_MERGE_NODES];
Kent Overstreet0a63b662014-03-17 17:15:53 -07001331 struct keylist keylist;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001332 struct closure cl;
1333 struct bkey *k;
1334
Kent Overstreet0a63b662014-03-17 17:15:53 -07001335 bch_keylist_init(&keylist);
1336
1337 if (btree_check_reserve(b, NULL))
1338 return 0;
1339
Kent Overstreeta1f03582013-09-10 19:07:00 -07001340 memset(new_nodes, 0, sizeof(new_nodes));
Kent Overstreetb54d6932013-07-24 18:04:18 -07001341 closure_init_stack(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001342
Kent Overstreeta1f03582013-09-10 19:07:00 -07001343 while (nodes < GC_MERGE_NODES && !IS_ERR_OR_NULL(r[nodes].b))
Kent Overstreetcafe5632013-03-23 16:11:31 -07001344 keys += r[nodes++].keys;
1345
1346 blocks = btree_default_blocks(b->c) * 2 / 3;
1347
1348 if (nodes < 2 ||
Kent Overstreeta85e9682013-12-20 17:28:16 -08001349 __set_blocks(b->keys.set[0].data, keys,
Coly Li4e1ebae2020-10-01 14:50:49 +08001350 block_bytes(b->c->cache)) > blocks * (nodes - 1))
Kent Overstreeta1f03582013-09-10 19:07:00 -07001351 return 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001352
Kent Overstreeta1f03582013-09-10 19:07:00 -07001353 for (i = 0; i < nodes; i++) {
Kent Overstreet0a63b662014-03-17 17:15:53 -07001354 new_nodes[i] = btree_node_alloc_replacement(r[i].b, NULL);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001355 if (IS_ERR_OR_NULL(new_nodes[i]))
1356 goto out_nocoalesce;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001357 }
1358
Kent Overstreet0a63b662014-03-17 17:15:53 -07001359 /*
1360 * We have to check the reserve here, after we've allocated our new
1361 * nodes, to make sure the insert below will succeed - we also check
1362 * before as an optimization to potentially avoid a bunch of expensive
1363 * allocs/sorts
1364 */
1365 if (btree_check_reserve(b, NULL))
1366 goto out_nocoalesce;
1367
Kent Overstreet2a285682014-03-04 16:42:42 -08001368 for (i = 0; i < nodes; i++)
1369 mutex_lock(&new_nodes[i]->write_lock);
1370
Kent Overstreetcafe5632013-03-23 16:11:31 -07001371 for (i = nodes - 1; i > 0; --i) {
Kent Overstreetee811282013-12-17 23:49:49 -08001372 struct bset *n1 = btree_bset_first(new_nodes[i]);
1373 struct bset *n2 = btree_bset_first(new_nodes[i - 1]);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001374 struct bkey *k, *last = NULL;
1375
1376 keys = 0;
1377
Kent Overstreeta1f03582013-09-10 19:07:00 -07001378 if (i > 1) {
Kent Overstreetcafe5632013-03-23 16:11:31 -07001379 for (k = n2->start;
Kent Overstreetfafff812013-12-17 21:56:21 -08001380 k < bset_bkey_last(n2);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001381 k = bkey_next(k)) {
1382 if (__set_blocks(n1, n1->keys + keys +
Kent Overstreetee811282013-12-17 23:49:49 -08001383 bkey_u64s(k),
Coly Li4e1ebae2020-10-01 14:50:49 +08001384 block_bytes(b->c->cache)) > blocks)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001385 break;
1386
1387 last = k;
1388 keys += bkey_u64s(k);
1389 }
Kent Overstreeta1f03582013-09-10 19:07:00 -07001390 } else {
1391 /*
1392 * Last node we're not getting rid of - we're getting
1393 * rid of the node at r[0]. Have to try and fit all of
1394 * the remaining keys into this node; we can't ensure
1395 * they will always fit due to rounding and variable
1396 * length keys (shouldn't be possible in practice,
1397 * though)
1398 */
1399 if (__set_blocks(n1, n1->keys + n2->keys,
Coly Li4e1ebae2020-10-01 14:50:49 +08001400 block_bytes(b->c->cache)) >
Kent Overstreetee811282013-12-17 23:49:49 -08001401 btree_blocks(new_nodes[i]))
Zhiqiang Liube23e832020-06-15 00:53:30 +08001402 goto out_unlock_nocoalesce;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001403
1404 keys = n2->keys;
1405 /* Take the key of the node we're getting rid of */
1406 last = &r->b->key;
1407 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001408
Coly Li4e1ebae2020-10-01 14:50:49 +08001409 BUG_ON(__set_blocks(n1, n1->keys + keys, block_bytes(b->c->cache)) >
Kent Overstreetee811282013-12-17 23:49:49 -08001410 btree_blocks(new_nodes[i]));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001411
Kent Overstreeta1f03582013-09-10 19:07:00 -07001412 if (last)
1413 bkey_copy_key(&new_nodes[i]->key, last);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001414
Kent Overstreetfafff812013-12-17 21:56:21 -08001415 memcpy(bset_bkey_last(n1),
Kent Overstreetcafe5632013-03-23 16:11:31 -07001416 n2->start,
Kent Overstreetfafff812013-12-17 21:56:21 -08001417 (void *) bset_bkey_idx(n2, keys) - (void *) n2->start);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001418
1419 n1->keys += keys;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001420 r[i].keys = n1->keys;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001421
1422 memmove(n2->start,
Kent Overstreetfafff812013-12-17 21:56:21 -08001423 bset_bkey_idx(n2, keys),
1424 (void *) bset_bkey_last(n2) -
1425 (void *) bset_bkey_idx(n2, keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001426
1427 n2->keys -= keys;
1428
Kent Overstreet0a63b662014-03-17 17:15:53 -07001429 if (__bch_keylist_realloc(&keylist,
Kent Overstreet085d2a32013-11-11 18:20:51 -08001430 bkey_u64s(&new_nodes[i]->key)))
Zhiqiang Liube23e832020-06-15 00:53:30 +08001431 goto out_unlock_nocoalesce;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001432
1433 bch_btree_node_write(new_nodes[i], &cl);
Kent Overstreet0a63b662014-03-17 17:15:53 -07001434 bch_keylist_add(&keylist, &new_nodes[i]->key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001435 }
1436
Kent Overstreet2a285682014-03-04 16:42:42 -08001437 for (i = 0; i < nodes; i++)
1438 mutex_unlock(&new_nodes[i]->write_lock);
1439
Kent Overstreet05335cf2014-03-17 18:22:34 -07001440 closure_sync(&cl);
1441
1442 /* We emptied out this node */
1443 BUG_ON(btree_bset_first(new_nodes[0])->keys);
1444 btree_node_free(new_nodes[0]);
1445 rw_unlock(true, new_nodes[0]);
Slava Pestov400ffaa2014-07-12 21:53:11 -07001446 new_nodes[0] = NULL;
Kent Overstreet05335cf2014-03-17 18:22:34 -07001447
Kent Overstreeta1f03582013-09-10 19:07:00 -07001448 for (i = 0; i < nodes; i++) {
Kent Overstreet0a63b662014-03-17 17:15:53 -07001449 if (__bch_keylist_realloc(&keylist, bkey_u64s(&r[i].b->key)))
Kent Overstreeta1f03582013-09-10 19:07:00 -07001450 goto out_nocoalesce;
1451
Kent Overstreet0a63b662014-03-17 17:15:53 -07001452 make_btree_freeing_key(r[i].b, keylist.top);
1453 bch_keylist_push(&keylist);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001454 }
1455
Kent Overstreet0a63b662014-03-17 17:15:53 -07001456 bch_btree_insert_node(b, op, &keylist, NULL, NULL);
1457 BUG_ON(!bch_keylist_empty(&keylist));
Kent Overstreeta1f03582013-09-10 19:07:00 -07001458
1459 for (i = 0; i < nodes; i++) {
1460 btree_node_free(r[i].b);
1461 rw_unlock(true, r[i].b);
1462
1463 r[i].b = new_nodes[i];
1464 }
1465
Kent Overstreeta1f03582013-09-10 19:07:00 -07001466 memmove(r, r + 1, sizeof(r[0]) * (nodes - 1));
1467 r[nodes - 1].b = ERR_PTR(-EINTR);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001468
Kent Overstreetc37511b2013-04-26 15:39:55 -07001469 trace_bcache_btree_gc_coalesce(nodes);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001470 gc->nodes--;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001471
Kent Overstreet0a63b662014-03-17 17:15:53 -07001472 bch_keylist_free(&keylist);
1473
Kent Overstreeta1f03582013-09-10 19:07:00 -07001474 /* Invalidated our iterator */
1475 return -EINTR;
1476
Zhiqiang Liube23e832020-06-15 00:53:30 +08001477out_unlock_nocoalesce:
1478 for (i = 0; i < nodes; i++)
1479 mutex_unlock(&new_nodes[i]->write_lock);
1480
Kent Overstreeta1f03582013-09-10 19:07:00 -07001481out_nocoalesce:
1482 closure_sync(&cl);
1483
Kent Overstreet0a63b662014-03-17 17:15:53 -07001484 while ((k = bch_keylist_pop(&keylist)))
Kent Overstreeta1f03582013-09-10 19:07:00 -07001485 if (!bkey_cmp(k, &ZERO_KEY))
1486 atomic_dec(&b->c->prio_blocked);
Shenghui Wangf16277c2019-04-25 00:48:42 +08001487 bch_keylist_free(&keylist);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001488
1489 for (i = 0; i < nodes; i++)
1490 if (!IS_ERR_OR_NULL(new_nodes[i])) {
1491 btree_node_free(new_nodes[i]);
1492 rw_unlock(true, new_nodes[i]);
1493 }
1494 return 0;
1495}
1496
Kent Overstreet0a63b662014-03-17 17:15:53 -07001497static int btree_gc_rewrite_node(struct btree *b, struct btree_op *op,
1498 struct btree *replace)
1499{
1500 struct keylist keys;
1501 struct btree *n;
1502
1503 if (btree_check_reserve(b, NULL))
1504 return 0;
1505
1506 n = btree_node_alloc_replacement(replace, NULL);
1507
1508 /* recheck reserve after allocating replacement node */
1509 if (btree_check_reserve(b, NULL)) {
1510 btree_node_free(n);
1511 rw_unlock(true, n);
1512 return 0;
1513 }
1514
1515 bch_btree_node_write_sync(n);
1516
1517 bch_keylist_init(&keys);
1518 bch_keylist_add(&keys, &n->key);
1519
1520 make_btree_freeing_key(replace, keys.top);
1521 bch_keylist_push(&keys);
1522
1523 bch_btree_insert_node(b, op, &keys, NULL, NULL);
1524 BUG_ON(!bch_keylist_empty(&keys));
1525
1526 btree_node_free(replace);
1527 rw_unlock(true, n);
1528
1529 /* Invalidated our iterator */
1530 return -EINTR;
1531}
1532
Coly Li6f10f7d2018-08-11 13:19:44 +08001533static unsigned int btree_gc_count_keys(struct btree *b)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001534{
1535 struct bkey *k;
1536 struct btree_iter iter;
Coly Li6f10f7d2018-08-11 13:19:44 +08001537 unsigned int ret = 0;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001538
Kent Overstreetc052dd92013-11-11 17:35:24 -08001539 for_each_key_filter(&b->keys, k, &iter, bch_ptr_bad)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001540 ret += bkey_u64s(k);
1541
1542 return ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001543}
1544
Tang Junhui7f4a59d2018-07-26 12:17:35 +08001545static size_t btree_gc_min_nodes(struct cache_set *c)
1546{
1547 size_t min_nodes;
1548
1549 /*
1550 * Since incremental GC would stop 100ms when front
1551 * side I/O comes, so when there are many btree nodes,
1552 * if GC only processes constant (100) nodes each time,
1553 * GC would last a long time, and the front side I/Os
1554 * would run out of the buckets (since no new bucket
1555 * can be allocated during GC), and be blocked again.
1556 * So GC should not process constant nodes, but varied
1557 * nodes according to the number of btree nodes, which
1558 * realized by dividing GC into constant(100) times,
1559 * so when there are many btree nodes, GC can process
1560 * more nodes each time, otherwise, GC will process less
1561 * nodes each time (but no less than MIN_GC_NODES)
1562 */
1563 min_nodes = c->gc_stats.nodes / MAX_GC_TIMES;
1564 if (min_nodes < MIN_GC_NODES)
1565 min_nodes = MIN_GC_NODES;
1566
1567 return min_nodes;
1568}
1569
1570
Kent Overstreetcafe5632013-03-23 16:11:31 -07001571static int btree_gc_recurse(struct btree *b, struct btree_op *op,
1572 struct closure *writes, struct gc_stat *gc)
1573{
Kent Overstreeta1f03582013-09-10 19:07:00 -07001574 int ret = 0;
1575 bool should_rewrite;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001576 struct bkey *k;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001577 struct btree_iter iter;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001578 struct gc_merge_info r[GC_MERGE_NODES];
Kent Overstreet2a285682014-03-04 16:42:42 -08001579 struct gc_merge_info *i, *last = r + ARRAY_SIZE(r) - 1;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001580
Kent Overstreetc052dd92013-11-11 17:35:24 -08001581 bch_btree_iter_init(&b->keys, &iter, &b->c->gc_done);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001582
Kent Overstreet2a285682014-03-04 16:42:42 -08001583 for (i = r; i < r + ARRAY_SIZE(r); i++)
1584 i->b = ERR_PTR(-EINTR);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001585
Kent Overstreeta1f03582013-09-10 19:07:00 -07001586 while (1) {
Kent Overstreeta85e9682013-12-20 17:28:16 -08001587 k = bch_btree_iter_next_filter(&iter, &b->keys, bch_ptr_bad);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001588 if (k) {
Kent Overstreet0a63b662014-03-17 17:15:53 -07001589 r->b = bch_btree_node_get(b->c, op, k, b->level - 1,
Slava Pestov2452cc82014-07-12 00:22:53 -07001590 true, b);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001591 if (IS_ERR(r->b)) {
1592 ret = PTR_ERR(r->b);
1593 break;
1594 }
1595
1596 r->keys = btree_gc_count_keys(r->b);
1597
Kent Overstreet0a63b662014-03-17 17:15:53 -07001598 ret = btree_gc_coalesce(b, op, gc, r);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001599 if (ret)
1600 break;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001601 }
1602
Kent Overstreeta1f03582013-09-10 19:07:00 -07001603 if (!last->b)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001604 break;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001605
1606 if (!IS_ERR(last->b)) {
1607 should_rewrite = btree_gc_mark_node(last->b, gc);
Kent Overstreet0a63b662014-03-17 17:15:53 -07001608 if (should_rewrite) {
1609 ret = btree_gc_rewrite_node(b, op, last->b);
1610 if (ret)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001611 break;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001612 }
1613
1614 if (last->b->level) {
1615 ret = btree_gc_recurse(last->b, op, writes, gc);
1616 if (ret)
1617 break;
1618 }
1619
1620 bkey_copy_key(&b->c->gc_done, &last->b->key);
1621
1622 /*
1623 * Must flush leaf nodes before gc ends, since replace
1624 * operations aren't journalled
1625 */
Kent Overstreet2a285682014-03-04 16:42:42 -08001626 mutex_lock(&last->b->write_lock);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001627 if (btree_node_dirty(last->b))
1628 bch_btree_node_write(last->b, writes);
Kent Overstreet2a285682014-03-04 16:42:42 -08001629 mutex_unlock(&last->b->write_lock);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001630 rw_unlock(true, last->b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001631 }
1632
Kent Overstreeta1f03582013-09-10 19:07:00 -07001633 memmove(r + 1, r, sizeof(r[0]) * (GC_MERGE_NODES - 1));
1634 r->b = NULL;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001635
Tang Junhui5c25c4f2018-07-26 12:17:34 +08001636 if (atomic_read(&b->c->search_inflight) &&
Tang Junhui7f4a59d2018-07-26 12:17:35 +08001637 gc->nodes >= gc->nodes_pre + btree_gc_min_nodes(b->c)) {
Tang Junhui5c25c4f2018-07-26 12:17:34 +08001638 gc->nodes_pre = gc->nodes;
1639 ret = -EAGAIN;
1640 break;
1641 }
1642
Kent Overstreetcafe5632013-03-23 16:11:31 -07001643 if (need_resched()) {
1644 ret = -EAGAIN;
1645 break;
1646 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001647 }
1648
Kent Overstreet2a285682014-03-04 16:42:42 -08001649 for (i = r; i < r + ARRAY_SIZE(r); i++)
1650 if (!IS_ERR_OR_NULL(i->b)) {
1651 mutex_lock(&i->b->write_lock);
1652 if (btree_node_dirty(i->b))
1653 bch_btree_node_write(i->b, writes);
1654 mutex_unlock(&i->b->write_lock);
1655 rw_unlock(true, i->b);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001656 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001657
Kent Overstreetcafe5632013-03-23 16:11:31 -07001658 return ret;
1659}
1660
1661static int bch_btree_gc_root(struct btree *b, struct btree_op *op,
1662 struct closure *writes, struct gc_stat *gc)
1663{
1664 struct btree *n = NULL;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001665 int ret = 0;
1666 bool should_rewrite;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001667
Kent Overstreeta1f03582013-09-10 19:07:00 -07001668 should_rewrite = btree_gc_mark_node(b, gc);
1669 if (should_rewrite) {
Kent Overstreet0a63b662014-03-17 17:15:53 -07001670 n = btree_node_alloc_replacement(b, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001671
Kent Overstreeta1f03582013-09-10 19:07:00 -07001672 if (!IS_ERR_OR_NULL(n)) {
1673 bch_btree_node_write_sync(n);
Kent Overstreet2a285682014-03-04 16:42:42 -08001674
Kent Overstreeta1f03582013-09-10 19:07:00 -07001675 bch_btree_set_root(n);
1676 btree_node_free(b);
1677 rw_unlock(true, n);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001678
Kent Overstreeta1f03582013-09-10 19:07:00 -07001679 return -EINTR;
1680 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001681 }
1682
Kent Overstreet487dded2014-03-17 15:13:26 -07001683 __bch_btree_mark_key(b->c, b->level + 1, &b->key);
1684
Kent Overstreeta1f03582013-09-10 19:07:00 -07001685 if (b->level) {
1686 ret = btree_gc_recurse(b, op, writes, gc);
1687 if (ret)
1688 return ret;
1689 }
1690
1691 bkey_copy_key(&b->c->gc_done, &b->key);
1692
Kent Overstreetcafe5632013-03-23 16:11:31 -07001693 return ret;
1694}
1695
1696static void btree_gc_start(struct cache_set *c)
1697{
1698 struct cache *ca;
1699 struct bucket *b;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001700
1701 if (!c->gc_mark_valid)
1702 return;
1703
1704 mutex_lock(&c->bucket_lock);
1705
1706 c->gc_mark_valid = 0;
1707 c->gc_done = ZERO_KEY;
1708
Coly Li08fdb2c2020-10-01 14:50:47 +08001709 ca = c->cache;
1710 for_each_bucket(b, ca) {
1711 b->last_gc = b->gen;
1712 if (!atomic_read(&b->pin)) {
1713 SET_GC_MARK(b, 0);
1714 SET_GC_SECTORS_USED(b, 0);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001715 }
Coly Li08fdb2c2020-10-01 14:50:47 +08001716 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001717
Kent Overstreetcafe5632013-03-23 16:11:31 -07001718 mutex_unlock(&c->bucket_lock);
1719}
1720
Tang Junhuid44c2f92017-10-30 14:46:33 -07001721static void bch_btree_gc_finish(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001722{
Kent Overstreetcafe5632013-03-23 16:11:31 -07001723 struct bucket *b;
1724 struct cache *ca;
Coly Li08fdb2c2020-10-01 14:50:47 +08001725 unsigned int i, j;
1726 uint64_t *k;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001727
1728 mutex_lock(&c->bucket_lock);
1729
1730 set_gc_sectors(c);
1731 c->gc_mark_valid = 1;
1732 c->need_gc = 0;
1733
Kent Overstreetcafe5632013-03-23 16:11:31 -07001734 for (i = 0; i < KEY_PTRS(&c->uuid_bucket); i++)
1735 SET_GC_MARK(PTR_BUCKET(c, &c->uuid_bucket, i),
1736 GC_MARK_METADATA);
1737
Nicholas Swensonbf0a6282013-11-26 19:14:23 -08001738 /* don't reclaim buckets to which writeback keys point */
1739 rcu_read_lock();
Coly Li28312312018-01-08 12:21:28 -08001740 for (i = 0; i < c->devices_max_used; i++) {
Nicholas Swensonbf0a6282013-11-26 19:14:23 -08001741 struct bcache_device *d = c->devices[i];
1742 struct cached_dev *dc;
1743 struct keybuf_key *w, *n;
Nicholas Swensonbf0a6282013-11-26 19:14:23 -08001744
1745 if (!d || UUID_FLASH_ONLY(&c->uuids[i]))
1746 continue;
1747 dc = container_of(d, struct cached_dev, disk);
1748
1749 spin_lock(&dc->writeback_keys.lock);
1750 rbtree_postorder_for_each_entry_safe(w, n,
1751 &dc->writeback_keys.keys, node)
1752 for (j = 0; j < KEY_PTRS(&w->key); j++)
1753 SET_GC_MARK(PTR_BUCKET(c, &w->key, j),
1754 GC_MARK_DIRTY);
1755 spin_unlock(&dc->writeback_keys.lock);
1756 }
1757 rcu_read_unlock();
1758
Tang Junhuid44c2f92017-10-30 14:46:33 -07001759 c->avail_nbuckets = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001760
Coly Li08fdb2c2020-10-01 14:50:47 +08001761 ca = c->cache;
1762 ca->invalidate_needs_gc = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001763
Coly Li08fdb2c2020-10-01 14:50:47 +08001764 for (k = ca->sb.d; k < ca->sb.d + ca->sb.keys; k++)
1765 SET_GC_MARK(ca->buckets + *k, GC_MARK_METADATA);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001766
Coly Li08fdb2c2020-10-01 14:50:47 +08001767 for (k = ca->prio_buckets;
1768 k < ca->prio_buckets + prio_buckets(ca) * 2; k++)
1769 SET_GC_MARK(ca->buckets + *k, GC_MARK_METADATA);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001770
Coly Li08fdb2c2020-10-01 14:50:47 +08001771 for_each_bucket(b, ca) {
1772 c->need_gc = max(c->need_gc, bucket_gc_gen(b));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001773
Coly Li08fdb2c2020-10-01 14:50:47 +08001774 if (atomic_read(&b->pin))
1775 continue;
Kent Overstreet4fe6a812014-03-13 13:46:29 -07001776
Coly Li08fdb2c2020-10-01 14:50:47 +08001777 BUG_ON(!GC_MARK(b) && GC_SECTORS_USED(b));
Kent Overstreet4fe6a812014-03-13 13:46:29 -07001778
Coly Li08fdb2c2020-10-01 14:50:47 +08001779 if (!GC_MARK(b) || GC_MARK(b) == GC_MARK_RECLAIMABLE)
1780 c->avail_nbuckets++;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001781 }
1782
Kent Overstreetcafe5632013-03-23 16:11:31 -07001783 mutex_unlock(&c->bucket_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001784}
1785
Kent Overstreet72a44512013-10-24 17:19:26 -07001786static void bch_btree_gc(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001787{
Kent Overstreetcafe5632013-03-23 16:11:31 -07001788 int ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001789 struct gc_stat stats;
1790 struct closure writes;
1791 struct btree_op op;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001792 uint64_t start_time = local_clock();
Kent Overstreet57943512013-04-25 13:58:35 -07001793
Kent Overstreetc37511b2013-04-26 15:39:55 -07001794 trace_bcache_gc_start(c);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001795
1796 memset(&stats, 0, sizeof(struct gc_stat));
1797 closure_init_stack(&writes);
Kent Overstreetb54d6932013-07-24 18:04:18 -07001798 bch_btree_op_init(&op, SHRT_MAX);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001799
1800 btree_gc_start(c);
1801
Coly Li771f3932018-03-18 17:36:17 -07001802 /* if CACHE_SET_IO_DISABLE set, gc thread should stop too */
Kent Overstreeta1f03582013-09-10 19:07:00 -07001803 do {
Coly Lifeac1a72020-03-22 14:03:00 +08001804 ret = bcache_btree_root(gc_root, c, &op, &writes, &stats);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001805 closure_sync(&writes);
Kent Overstreetc5f1e5a2015-11-29 17:18:33 -08001806 cond_resched();
Kent Overstreet57943512013-04-25 13:58:35 -07001807
Tang Junhui5c25c4f2018-07-26 12:17:34 +08001808 if (ret == -EAGAIN)
1809 schedule_timeout_interruptible(msecs_to_jiffies
1810 (GC_SLEEP_MS));
1811 else if (ret)
Joe Perches46f5aa82020-05-27 12:01:52 +08001812 pr_warn("gc failed!\n");
Coly Li771f3932018-03-18 17:36:17 -07001813 } while (ret && !test_bit(CACHE_SET_IO_DISABLE, &c->flags));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001814
Tang Junhuid44c2f92017-10-30 14:46:33 -07001815 bch_btree_gc_finish(c);
Kent Overstreet57943512013-04-25 13:58:35 -07001816 wake_up_allocators(c);
1817
Kent Overstreet169ef1c2013-03-28 12:50:55 -06001818 bch_time_stats_update(&c->btree_gc_time, start_time);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001819
1820 stats.key_bytes *= sizeof(uint64_t);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001821 stats.data <<= 9;
Tang Junhuid44c2f92017-10-30 14:46:33 -07001822 bch_update_bucket_in_use(c, &stats);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001823 memcpy(&c->gc_stats, &stats, sizeof(struct gc_stat));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001824
Kent Overstreetc37511b2013-04-26 15:39:55 -07001825 trace_bcache_gc_end(c);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001826
Kent Overstreet72a44512013-10-24 17:19:26 -07001827 bch_moving_gc(c);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001828}
1829
Kent Overstreetbe628be2016-10-26 20:31:17 -07001830static bool gc_should_run(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001831{
Coly Li08fdb2c2020-10-01 14:50:47 +08001832 struct cache *ca = c->cache;
Kent Overstreet72a44512013-10-24 17:19:26 -07001833
Coly Li08fdb2c2020-10-01 14:50:47 +08001834 if (ca->invalidate_needs_gc)
1835 return true;
Kent Overstreet72a44512013-10-24 17:19:26 -07001836
Kent Overstreetbe628be2016-10-26 20:31:17 -07001837 if (atomic_read(&c->sectors_to_gc) < 0)
1838 return true;
1839
1840 return false;
1841}
1842
1843static int bch_gc_thread(void *arg)
1844{
1845 struct cache_set *c = arg;
1846
1847 while (1) {
1848 wait_event_interruptible(c->gc_wait,
Coly Li771f3932018-03-18 17:36:17 -07001849 kthread_should_stop() ||
1850 test_bit(CACHE_SET_IO_DISABLE, &c->flags) ||
1851 gc_should_run(c));
Kent Overstreetbe628be2016-10-26 20:31:17 -07001852
Coly Li771f3932018-03-18 17:36:17 -07001853 if (kthread_should_stop() ||
1854 test_bit(CACHE_SET_IO_DISABLE, &c->flags))
Kent Overstreet72a44512013-10-24 17:19:26 -07001855 break;
1856
Kent Overstreetbe628be2016-10-26 20:31:17 -07001857 set_gc_sectors(c);
1858 bch_btree_gc(c);
Kent Overstreet72a44512013-10-24 17:19:26 -07001859 }
1860
Coly Li771f3932018-03-18 17:36:17 -07001861 wait_for_kthread_stop();
Kent Overstreet72a44512013-10-24 17:19:26 -07001862 return 0;
1863}
1864
1865int bch_gc_thread_start(struct cache_set *c)
1866{
Kent Overstreetbe628be2016-10-26 20:31:17 -07001867 c->gc_thread = kthread_run(bch_gc_thread, c, "bcache_gc");
Vasyl Gomonovych9d134112018-01-08 12:21:20 -08001868 return PTR_ERR_OR_ZERO(c->gc_thread);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001869}
1870
1871/* Initial partial gc */
1872
Kent Overstreet487dded2014-03-17 15:13:26 -07001873static int bch_btree_check_recurse(struct btree *b, struct btree_op *op)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001874{
Kent Overstreet50310162013-09-10 17:18:59 -07001875 int ret = 0;
Kent Overstreet50310162013-09-10 17:18:59 -07001876 struct bkey *k, *p = NULL;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001877 struct btree_iter iter;
1878
Kent Overstreet487dded2014-03-17 15:13:26 -07001879 for_each_key_filter(&b->keys, k, &iter, bch_ptr_invalid)
1880 bch_initial_mark_key(b->c, b->level, k);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001881
Kent Overstreet487dded2014-03-17 15:13:26 -07001882 bch_initial_mark_key(b->c, b->level + 1, &b->key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001883
1884 if (b->level) {
Kent Overstreetc052dd92013-11-11 17:35:24 -08001885 bch_btree_iter_init(&b->keys, &iter, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001886
Kent Overstreet50310162013-09-10 17:18:59 -07001887 do {
Kent Overstreeta85e9682013-12-20 17:28:16 -08001888 k = bch_btree_iter_next_filter(&iter, &b->keys,
1889 bch_ptr_bad);
Tang Junhui7f4a59d2018-07-26 12:17:35 +08001890 if (k) {
Slava Pestov2452cc82014-07-12 00:22:53 -07001891 btree_node_prefetch(b, k);
Tang Junhui7f4a59d2018-07-26 12:17:35 +08001892 /*
1893 * initiallize c->gc_stats.nodes
1894 * for incremental GC
1895 */
1896 b->c->gc_stats.nodes++;
1897 }
Kent Overstreet50310162013-09-10 17:18:59 -07001898
Kent Overstreetcafe5632013-03-23 16:11:31 -07001899 if (p)
Coly Lifeac1a72020-03-22 14:03:00 +08001900 ret = bcache_btree(check_recurse, p, b, op);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001901
Kent Overstreet50310162013-09-10 17:18:59 -07001902 p = k;
1903 } while (p && !ret);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001904 }
1905
Kent Overstreet487dded2014-03-17 15:13:26 -07001906 return ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001907}
1908
Coly Li8e710222020-03-22 14:03:01 +08001909
1910static int bch_btree_check_thread(void *arg)
1911{
1912 int ret;
1913 struct btree_check_info *info = arg;
1914 struct btree_check_state *check_state = info->state;
1915 struct cache_set *c = check_state->c;
1916 struct btree_iter iter;
1917 struct bkey *k, *p;
1918 int cur_idx, prev_idx, skip_nr;
Coly Li8e710222020-03-22 14:03:01 +08001919
1920 k = p = NULL;
Coly Li8e710222020-03-22 14:03:01 +08001921 cur_idx = prev_idx = 0;
1922 ret = 0;
1923
1924 /* root node keys are checked before thread created */
1925 bch_btree_iter_init(&c->root->keys, &iter, NULL);
1926 k = bch_btree_iter_next_filter(&iter, &c->root->keys, bch_ptr_bad);
1927 BUG_ON(!k);
1928
1929 p = k;
1930 while (k) {
1931 /*
1932 * Fetch a root node key index, skip the keys which
1933 * should be fetched by other threads, then check the
1934 * sub-tree indexed by the fetched key.
1935 */
1936 spin_lock(&check_state->idx_lock);
1937 cur_idx = check_state->key_idx;
1938 check_state->key_idx++;
1939 spin_unlock(&check_state->idx_lock);
1940
1941 skip_nr = cur_idx - prev_idx;
1942
1943 while (skip_nr) {
1944 k = bch_btree_iter_next_filter(&iter,
1945 &c->root->keys,
1946 bch_ptr_bad);
1947 if (k)
1948 p = k;
1949 else {
1950 /*
1951 * No more keys to check in root node,
1952 * current checking threads are enough,
1953 * stop creating more.
1954 */
1955 atomic_set(&check_state->enough, 1);
1956 /* Update check_state->enough earlier */
Coly Lieb9b6662020-03-22 14:03:05 +08001957 smp_mb__after_atomic();
Coly Li8e710222020-03-22 14:03:01 +08001958 goto out;
1959 }
1960 skip_nr--;
1961 cond_resched();
1962 }
1963
1964 if (p) {
1965 struct btree_op op;
1966
1967 btree_node_prefetch(c->root, p);
1968 c->gc_stats.nodes++;
1969 bch_btree_op_init(&op, 0);
1970 ret = bcache_btree(check_recurse, p, c->root, &op);
1971 if (ret)
1972 goto out;
1973 }
1974 p = NULL;
1975 prev_idx = cur_idx;
1976 cond_resched();
1977 }
1978
1979out:
1980 info->result = ret;
1981 /* update check_state->started among all CPUs */
Coly Lieb9b6662020-03-22 14:03:05 +08001982 smp_mb__before_atomic();
Coly Li8e710222020-03-22 14:03:01 +08001983 if (atomic_dec_and_test(&check_state->started))
1984 wake_up(&check_state->wait);
1985
1986 return ret;
1987}
1988
1989
1990
1991static int bch_btree_chkthread_nr(void)
1992{
1993 int n = num_online_cpus()/2;
1994
1995 if (n == 0)
1996 n = 1;
1997 else if (n > BCH_BTR_CHKTHREAD_MAX)
1998 n = BCH_BTR_CHKTHREAD_MAX;
1999
2000 return n;
2001}
2002
Kent Overstreetc18536a2013-07-24 17:44:17 -07002003int bch_btree_check(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002004{
Coly Li8e710222020-03-22 14:03:01 +08002005 int ret = 0;
2006 int i;
2007 struct bkey *k = NULL;
2008 struct btree_iter iter;
2009 struct btree_check_state *check_state;
2010 char name[32];
Kent Overstreetcafe5632013-03-23 16:11:31 -07002011
Coly Li8e710222020-03-22 14:03:01 +08002012 /* check and mark root node keys */
2013 for_each_key_filter(&c->root->keys, k, &iter, bch_ptr_invalid)
2014 bch_initial_mark_key(c, c->root->level, k);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002015
Coly Li8e710222020-03-22 14:03:01 +08002016 bch_initial_mark_key(c, c->root->level + 1, &c->root->key);
2017
2018 if (c->root->level == 0)
2019 return 0;
2020
2021 check_state = kzalloc(sizeof(struct btree_check_state), GFP_KERNEL);
2022 if (!check_state)
2023 return -ENOMEM;
2024
2025 check_state->c = c;
2026 check_state->total_threads = bch_btree_chkthread_nr();
2027 check_state->key_idx = 0;
2028 spin_lock_init(&check_state->idx_lock);
2029 atomic_set(&check_state->started, 0);
2030 atomic_set(&check_state->enough, 0);
2031 init_waitqueue_head(&check_state->wait);
2032
2033 /*
2034 * Run multiple threads to check btree nodes in parallel,
2035 * if check_state->enough is non-zero, it means current
2036 * running check threads are enough, unncessary to create
2037 * more.
2038 */
2039 for (i = 0; i < check_state->total_threads; i++) {
2040 /* fetch latest check_state->enough earlier */
Coly Lieb9b6662020-03-22 14:03:05 +08002041 smp_mb__before_atomic();
Coly Li8e710222020-03-22 14:03:01 +08002042 if (atomic_read(&check_state->enough))
2043 break;
2044
2045 check_state->infos[i].result = 0;
2046 check_state->infos[i].state = check_state;
2047 snprintf(name, sizeof(name), "bch_btrchk[%u]", i);
2048 atomic_inc(&check_state->started);
2049
2050 check_state->infos[i].thread =
2051 kthread_run(bch_btree_check_thread,
2052 &check_state->infos[i],
2053 name);
2054 if (IS_ERR(check_state->infos[i].thread)) {
Joe Perches46f5aa82020-05-27 12:01:52 +08002055 pr_err("fails to run thread bch_btrchk[%d]\n", i);
Coly Li8e710222020-03-22 14:03:01 +08002056 for (--i; i >= 0; i--)
2057 kthread_stop(check_state->infos[i].thread);
2058 ret = -ENOMEM;
2059 goto out;
2060 }
2061 }
2062
2063 wait_event_interruptible(check_state->wait,
2064 atomic_read(&check_state->started) == 0 ||
2065 test_bit(CACHE_SET_IO_DISABLE, &c->flags));
2066
2067 for (i = 0; i < check_state->total_threads; i++) {
2068 if (check_state->infos[i].result) {
2069 ret = check_state->infos[i].result;
2070 goto out;
2071 }
2072 }
2073
2074out:
2075 kfree(check_state);
2076 return ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002077}
2078
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002079void bch_initial_gc_finish(struct cache_set *c)
2080{
Coly Li08fdb2c2020-10-01 14:50:47 +08002081 struct cache *ca = c->cache;
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002082 struct bucket *b;
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002083
2084 bch_btree_gc_finish(c);
2085
2086 mutex_lock(&c->bucket_lock);
2087
2088 /*
2089 * We need to put some unused buckets directly on the prio freelist in
2090 * order to get the allocator thread started - it needs freed buckets in
2091 * order to rewrite the prios and gens, and it needs to rewrite prios
2092 * and gens in order to free buckets.
2093 *
2094 * This is only safe for buckets that have no live data in them, which
2095 * there should always be some of.
2096 */
Coly Li08fdb2c2020-10-01 14:50:47 +08002097 for_each_bucket(b, ca) {
2098 if (fifo_full(&ca->free[RESERVE_PRIO]) &&
2099 fifo_full(&ca->free[RESERVE_BTREE]))
2100 break;
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002101
Coly Li08fdb2c2020-10-01 14:50:47 +08002102 if (bch_can_invalidate_bucket(ca, b) &&
2103 !GC_MARK(b)) {
2104 __bch_invalidate_one_bucket(ca, b);
2105 if (!fifo_push(&ca->free[RESERVE_PRIO],
2106 b - ca->buckets))
2107 fifo_push(&ca->free[RESERVE_BTREE],
2108 b - ca->buckets);
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002109 }
2110 }
2111
2112 mutex_unlock(&c->bucket_lock);
2113}
2114
Kent Overstreetcafe5632013-03-23 16:11:31 -07002115/* Btree insertion */
2116
Kent Overstreet829a60b2013-11-11 17:02:31 -08002117static bool btree_insert_key(struct btree *b, struct bkey *k,
2118 struct bkey *replace_key)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002119{
Coly Li6f10f7d2018-08-11 13:19:44 +08002120 unsigned int status;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002121
2122 BUG_ON(bkey_cmp(k, &b->key) > 0);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002123
Kent Overstreet829a60b2013-11-11 17:02:31 -08002124 status = bch_btree_insert_key(&b->keys, k, replace_key);
2125 if (status != BTREE_INSERT_STATUS_NO_INSERT) {
2126 bch_check_keys(&b->keys, "%u for %s", status,
2127 replace_key ? "replace" : "insert");
Kent Overstreetcafe5632013-03-23 16:11:31 -07002128
Kent Overstreet829a60b2013-11-11 17:02:31 -08002129 trace_bcache_btree_insert_key(b, k, replace_key != NULL,
2130 status);
2131 return true;
2132 } else
2133 return false;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002134}
2135
Kent Overstreet59158fd2013-11-11 19:03:54 -08002136static size_t insert_u64s_remaining(struct btree *b)
2137{
Kent Overstreet35723242014-01-10 18:53:02 -08002138 long ret = bch_btree_keys_u64s_remaining(&b->keys);
Kent Overstreet59158fd2013-11-11 19:03:54 -08002139
2140 /*
2141 * Might land in the middle of an existing extent and have to split it
2142 */
2143 if (b->keys.ops->is_extents)
2144 ret -= KEY_MAX_U64S;
2145
2146 return max(ret, 0L);
2147}
2148
Kent Overstreet26c949f2013-09-10 18:41:15 -07002149static bool bch_btree_insert_keys(struct btree *b, struct btree_op *op,
Kent Overstreet1b207d82013-09-10 18:52:54 -07002150 struct keylist *insert_keys,
2151 struct bkey *replace_key)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002152{
2153 bool ret = false;
Kent Overstreetdc9d98d2013-12-17 23:47:33 -08002154 int oldsize = bch_count_data(&b->keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002155
Kent Overstreet26c949f2013-09-10 18:41:15 -07002156 while (!bch_keylist_empty(insert_keys)) {
Kent Overstreetc2f95ae2013-07-24 17:24:25 -07002157 struct bkey *k = insert_keys->keys;
Kent Overstreet26c949f2013-09-10 18:41:15 -07002158
Kent Overstreet59158fd2013-11-11 19:03:54 -08002159 if (bkey_u64s(k) > insert_u64s_remaining(b))
Kent Overstreet403b6cd2013-07-24 17:22:44 -07002160 break;
2161
2162 if (bkey_cmp(k, &b->key) <= 0) {
Kent Overstreet3a3b6a42013-07-24 16:46:42 -07002163 if (!b->level)
2164 bkey_put(b->c, k);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002165
Kent Overstreet829a60b2013-11-11 17:02:31 -08002166 ret |= btree_insert_key(b, k, replace_key);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002167 bch_keylist_pop_front(insert_keys);
2168 } else if (bkey_cmp(&START_KEY(k), &b->key) < 0) {
Kent Overstreet26c949f2013-09-10 18:41:15 -07002169 BKEY_PADDED(key) temp;
Kent Overstreetc2f95ae2013-07-24 17:24:25 -07002170 bkey_copy(&temp.key, insert_keys->keys);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002171
2172 bch_cut_back(&b->key, &temp.key);
Kent Overstreetc2f95ae2013-07-24 17:24:25 -07002173 bch_cut_front(&b->key, insert_keys->keys);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002174
Kent Overstreet829a60b2013-11-11 17:02:31 -08002175 ret |= btree_insert_key(b, &temp.key, replace_key);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002176 break;
2177 } else {
2178 break;
2179 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07002180 }
2181
Kent Overstreet829a60b2013-11-11 17:02:31 -08002182 if (!ret)
2183 op->insert_collision = true;
2184
Kent Overstreet403b6cd2013-07-24 17:22:44 -07002185 BUG_ON(!bch_keylist_empty(insert_keys) && b->level);
2186
Kent Overstreetdc9d98d2013-12-17 23:47:33 -08002187 BUG_ON(bch_count_data(&b->keys) < oldsize);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002188 return ret;
2189}
2190
Kent Overstreet26c949f2013-09-10 18:41:15 -07002191static int btree_split(struct btree *b, struct btree_op *op,
2192 struct keylist *insert_keys,
Kent Overstreet1b207d82013-09-10 18:52:54 -07002193 struct bkey *replace_key)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002194{
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002195 bool split;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002196 struct btree *n1, *n2 = NULL, *n3 = NULL;
2197 uint64_t start_time = local_clock();
Kent Overstreetb54d6932013-07-24 18:04:18 -07002198 struct closure cl;
Kent Overstreet17e21a92013-07-26 12:32:38 -07002199 struct keylist parent_keys;
Kent Overstreetb54d6932013-07-24 18:04:18 -07002200
2201 closure_init_stack(&cl);
Kent Overstreet17e21a92013-07-26 12:32:38 -07002202 bch_keylist_init(&parent_keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002203
Kent Overstreet0a63b662014-03-17 17:15:53 -07002204 if (btree_check_reserve(b, op)) {
2205 if (!b->level)
2206 return -EINTR;
2207 else
2208 WARN(1, "insufficient reserve for split\n");
2209 }
Kent Overstreet78365412013-12-17 01:29:34 -08002210
Kent Overstreet0a63b662014-03-17 17:15:53 -07002211 n1 = btree_node_alloc_replacement(b, op);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002212 if (IS_ERR(n1))
2213 goto err;
2214
Kent Overstreetee811282013-12-17 23:49:49 -08002215 split = set_blocks(btree_bset_first(n1),
Coly Li4e1ebae2020-10-01 14:50:49 +08002216 block_bytes(n1->c->cache)) > (btree_blocks(b) * 4) / 5;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002217
Kent Overstreetcafe5632013-03-23 16:11:31 -07002218 if (split) {
Coly Li6f10f7d2018-08-11 13:19:44 +08002219 unsigned int keys = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002220
Kent Overstreetee811282013-12-17 23:49:49 -08002221 trace_bcache_btree_node_split(b, btree_bset_first(n1)->keys);
Kent Overstreetc37511b2013-04-26 15:39:55 -07002222
Slava Pestov2452cc82014-07-12 00:22:53 -07002223 n2 = bch_btree_node_alloc(b->c, op, b->level, b->parent);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002224 if (IS_ERR(n2))
2225 goto err_free1;
2226
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002227 if (!b->parent) {
Slava Pestov2452cc82014-07-12 00:22:53 -07002228 n3 = bch_btree_node_alloc(b->c, op, b->level + 1, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002229 if (IS_ERR(n3))
2230 goto err_free2;
2231 }
2232
Kent Overstreet2a285682014-03-04 16:42:42 -08002233 mutex_lock(&n1->write_lock);
2234 mutex_lock(&n2->write_lock);
2235
Kent Overstreet1b207d82013-09-10 18:52:54 -07002236 bch_btree_insert_keys(n1, op, insert_keys, replace_key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002237
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002238 /*
2239 * Has to be a linear search because we don't have an auxiliary
Kent Overstreetcafe5632013-03-23 16:11:31 -07002240 * search tree yet
2241 */
2242
Kent Overstreetee811282013-12-17 23:49:49 -08002243 while (keys < (btree_bset_first(n1)->keys * 3) / 5)
2244 keys += bkey_u64s(bset_bkey_idx(btree_bset_first(n1),
Kent Overstreetfafff812013-12-17 21:56:21 -08002245 keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002246
Kent Overstreetfafff812013-12-17 21:56:21 -08002247 bkey_copy_key(&n1->key,
Kent Overstreetee811282013-12-17 23:49:49 -08002248 bset_bkey_idx(btree_bset_first(n1), keys));
2249 keys += bkey_u64s(bset_bkey_idx(btree_bset_first(n1), keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002250
Kent Overstreetee811282013-12-17 23:49:49 -08002251 btree_bset_first(n2)->keys = btree_bset_first(n1)->keys - keys;
2252 btree_bset_first(n1)->keys = keys;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002253
Kent Overstreetee811282013-12-17 23:49:49 -08002254 memcpy(btree_bset_first(n2)->start,
2255 bset_bkey_last(btree_bset_first(n1)),
2256 btree_bset_first(n2)->keys * sizeof(uint64_t));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002257
2258 bkey_copy_key(&n2->key, &b->key);
2259
Kent Overstreet17e21a92013-07-26 12:32:38 -07002260 bch_keylist_add(&parent_keys, &n2->key);
Kent Overstreetb54d6932013-07-24 18:04:18 -07002261 bch_btree_node_write(n2, &cl);
Kent Overstreet2a285682014-03-04 16:42:42 -08002262 mutex_unlock(&n2->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002263 rw_unlock(true, n2);
Kent Overstreetc37511b2013-04-26 15:39:55 -07002264 } else {
Kent Overstreetee811282013-12-17 23:49:49 -08002265 trace_bcache_btree_node_compact(b, btree_bset_first(n1)->keys);
Kent Overstreetc37511b2013-04-26 15:39:55 -07002266
Kent Overstreet2a285682014-03-04 16:42:42 -08002267 mutex_lock(&n1->write_lock);
Kent Overstreet1b207d82013-09-10 18:52:54 -07002268 bch_btree_insert_keys(n1, op, insert_keys, replace_key);
Kent Overstreetc37511b2013-04-26 15:39:55 -07002269 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07002270
Kent Overstreet17e21a92013-07-26 12:32:38 -07002271 bch_keylist_add(&parent_keys, &n1->key);
Kent Overstreetb54d6932013-07-24 18:04:18 -07002272 bch_btree_node_write(n1, &cl);
Kent Overstreet2a285682014-03-04 16:42:42 -08002273 mutex_unlock(&n1->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002274
2275 if (n3) {
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002276 /* Depth increases, make a new root */
Kent Overstreet2a285682014-03-04 16:42:42 -08002277 mutex_lock(&n3->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002278 bkey_copy_key(&n3->key, &MAX_KEY);
Kent Overstreet17e21a92013-07-26 12:32:38 -07002279 bch_btree_insert_keys(n3, op, &parent_keys, NULL);
Kent Overstreetb54d6932013-07-24 18:04:18 -07002280 bch_btree_node_write(n3, &cl);
Kent Overstreet2a285682014-03-04 16:42:42 -08002281 mutex_unlock(&n3->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002282
Kent Overstreetb54d6932013-07-24 18:04:18 -07002283 closure_sync(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002284 bch_btree_set_root(n3);
2285 rw_unlock(true, n3);
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002286 } else if (!b->parent) {
2287 /* Root filled up but didn't need to be split */
Kent Overstreetb54d6932013-07-24 18:04:18 -07002288 closure_sync(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002289 bch_btree_set_root(n1);
2290 } else {
Kent Overstreet17e21a92013-07-26 12:32:38 -07002291 /* Split a non root node */
Kent Overstreetb54d6932013-07-24 18:04:18 -07002292 closure_sync(&cl);
Kent Overstreet17e21a92013-07-26 12:32:38 -07002293 make_btree_freeing_key(b, parent_keys.top);
2294 bch_keylist_push(&parent_keys);
2295
Kent Overstreet17e21a92013-07-26 12:32:38 -07002296 bch_btree_insert_node(b->parent, op, &parent_keys, NULL, NULL);
2297 BUG_ON(!bch_keylist_empty(&parent_keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002298 }
2299
Kent Overstreet05335cf2014-03-17 18:22:34 -07002300 btree_node_free(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002301 rw_unlock(true, n1);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002302
Kent Overstreet169ef1c2013-03-28 12:50:55 -06002303 bch_time_stats_update(&b->c->btree_split_time, start_time);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002304
2305 return 0;
2306err_free2:
Kent Overstreet5f5837d2013-12-16 16:38:49 -08002307 bkey_put(b->c, &n2->key);
Kent Overstreete8e1d462013-07-24 17:27:07 -07002308 btree_node_free(n2);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002309 rw_unlock(true, n2);
2310err_free1:
Kent Overstreet5f5837d2013-12-16 16:38:49 -08002311 bkey_put(b->c, &n1->key);
Kent Overstreete8e1d462013-07-24 17:27:07 -07002312 btree_node_free(n1);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002313 rw_unlock(true, n1);
2314err:
Kent Overstreet0a63b662014-03-17 17:15:53 -07002315 WARN(1, "bcache: btree split failed (level %u)", b->level);
Kent Overstreet5f5837d2013-12-16 16:38:49 -08002316
Kent Overstreetcafe5632013-03-23 16:11:31 -07002317 if (n3 == ERR_PTR(-EAGAIN) ||
2318 n2 == ERR_PTR(-EAGAIN) ||
2319 n1 == ERR_PTR(-EAGAIN))
2320 return -EAGAIN;
2321
Kent Overstreetcafe5632013-03-23 16:11:31 -07002322 return -ENOMEM;
2323}
2324
Kent Overstreet26c949f2013-09-10 18:41:15 -07002325static int bch_btree_insert_node(struct btree *b, struct btree_op *op,
Kent Overstreetc18536a2013-07-24 17:44:17 -07002326 struct keylist *insert_keys,
Kent Overstreet1b207d82013-09-10 18:52:54 -07002327 atomic_t *journal_ref,
2328 struct bkey *replace_key)
Kent Overstreet26c949f2013-09-10 18:41:15 -07002329{
Kent Overstreet2a285682014-03-04 16:42:42 -08002330 struct closure cl;
2331
Kent Overstreet17e21a92013-07-26 12:32:38 -07002332 BUG_ON(b->level && replace_key);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002333
Kent Overstreet2a285682014-03-04 16:42:42 -08002334 closure_init_stack(&cl);
2335
2336 mutex_lock(&b->write_lock);
2337
2338 if (write_block(b) != btree_bset_last(b) &&
2339 b->keys.last_set_unwritten)
2340 bch_btree_init_next(b); /* just wrote a set */
2341
Kent Overstreet59158fd2013-11-11 19:03:54 -08002342 if (bch_keylist_nkeys(insert_keys) > insert_u64s_remaining(b)) {
Kent Overstreet2a285682014-03-04 16:42:42 -08002343 mutex_unlock(&b->write_lock);
2344 goto split;
2345 }
Kent Overstreet3b3e9e52013-12-07 03:57:58 -08002346
Kent Overstreet2a285682014-03-04 16:42:42 -08002347 BUG_ON(write_block(b) != btree_bset_last(b));
2348
2349 if (bch_btree_insert_keys(b, op, insert_keys, replace_key)) {
2350 if (!b->level)
2351 bch_btree_leaf_dirty(b, journal_ref);
2352 else
2353 bch_btree_node_write(b, &cl);
2354 }
2355
2356 mutex_unlock(&b->write_lock);
2357
2358 /* wait for btree node write if necessary, after unlock */
2359 closure_sync(&cl);
2360
2361 return 0;
2362split:
2363 if (current->bio_list) {
2364 op->lock = b->c->root->level + 1;
2365 return -EAGAIN;
2366 } else if (op->lock <= b->c->root->level) {
2367 op->lock = b->c->root->level + 1;
2368 return -EINTR;
Kent Overstreet17e21a92013-07-26 12:32:38 -07002369 } else {
Kent Overstreet2a285682014-03-04 16:42:42 -08002370 /* Invalidated all iterators */
2371 int ret = btree_split(b, op, insert_keys, replace_key);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002372
Kent Overstreet2a285682014-03-04 16:42:42 -08002373 if (bch_keylist_empty(insert_keys))
2374 return 0;
2375 else if (!ret)
2376 return -EINTR;
2377 return ret;
Kent Overstreet17e21a92013-07-26 12:32:38 -07002378 }
Kent Overstreet26c949f2013-09-10 18:41:15 -07002379}
2380
Kent Overstreete7c590e2013-09-10 18:39:16 -07002381int bch_btree_insert_check_key(struct btree *b, struct btree_op *op,
2382 struct bkey *check_key)
2383{
2384 int ret = -EINTR;
2385 uint64_t btree_ptr = b->key.ptr[0];
2386 unsigned long seq = b->seq;
2387 struct keylist insert;
2388 bool upgrade = op->lock == -1;
2389
2390 bch_keylist_init(&insert);
2391
2392 if (upgrade) {
2393 rw_unlock(false, b);
2394 rw_lock(true, b, b->level);
2395
2396 if (b->key.ptr[0] != btree_ptr ||
Coly Lic63ca782018-08-11 13:19:50 +08002397 b->seq != seq + 1) {
Bart Van Asschefd019912018-03-18 17:36:26 -07002398 op->lock = b->level;
Kent Overstreete7c590e2013-09-10 18:39:16 -07002399 goto out;
Coly Lic63ca782018-08-11 13:19:50 +08002400 }
Kent Overstreete7c590e2013-09-10 18:39:16 -07002401 }
2402
2403 SET_KEY_PTRS(check_key, 1);
2404 get_random_bytes(&check_key->ptr[0], sizeof(uint64_t));
2405
2406 SET_PTR_DEV(check_key, 0, PTR_CHECK_DEV);
2407
2408 bch_keylist_add(&insert, check_key);
2409
Kent Overstreet1b207d82013-09-10 18:52:54 -07002410 ret = bch_btree_insert_node(b, op, &insert, NULL, NULL);
Kent Overstreete7c590e2013-09-10 18:39:16 -07002411
2412 BUG_ON(!ret && !bch_keylist_empty(&insert));
2413out:
2414 if (upgrade)
2415 downgrade_write(&b->lock);
2416 return ret;
2417}
2418
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002419struct btree_insert_op {
2420 struct btree_op op;
2421 struct keylist *keys;
2422 atomic_t *journal_ref;
2423 struct bkey *replace_key;
2424};
2425
Wei Yongjun08239ca2013-11-28 10:31:35 +08002426static int btree_insert_fn(struct btree_op *b_op, struct btree *b)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002427{
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002428 struct btree_insert_op *op = container_of(b_op,
2429 struct btree_insert_op, op);
Kent Overstreet403b6cd2013-07-24 17:22:44 -07002430
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002431 int ret = bch_btree_insert_node(b, &op->op, op->keys,
2432 op->journal_ref, op->replace_key);
2433 if (ret && !bch_keylist_empty(op->keys))
2434 return ret;
2435 else
2436 return MAP_DONE;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002437}
2438
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002439int bch_btree_insert(struct cache_set *c, struct keylist *keys,
2440 atomic_t *journal_ref, struct bkey *replace_key)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002441{
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002442 struct btree_insert_op op;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002443 int ret = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002444
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002445 BUG_ON(current->bio_list);
Kent Overstreet4f3d4012013-09-10 18:46:36 -07002446 BUG_ON(bch_keylist_empty(keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002447
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002448 bch_btree_op_init(&op.op, 0);
2449 op.keys = keys;
2450 op.journal_ref = journal_ref;
2451 op.replace_key = replace_key;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002452
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002453 while (!ret && !bch_keylist_empty(keys)) {
2454 op.op.lock = 0;
2455 ret = bch_btree_map_leaf_nodes(&op.op, c,
2456 &START_KEY(keys->keys),
2457 btree_insert_fn);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002458 }
2459
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002460 if (ret) {
2461 struct bkey *k;
2462
Joe Perches46f5aa82020-05-27 12:01:52 +08002463 pr_err("error %i\n", ret);
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002464
2465 while ((k = bch_keylist_pop(keys)))
Kent Overstreet3a3b6a42013-07-24 16:46:42 -07002466 bkey_put(c, k);
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002467 } else if (op.op.insert_collision)
2468 ret = -ESRCH;
Kent Overstreet6054c6d2013-07-24 18:06:22 -07002469
Kent Overstreetcafe5632013-03-23 16:11:31 -07002470 return ret;
2471}
2472
2473void bch_btree_set_root(struct btree *b)
2474{
Coly Li6f10f7d2018-08-11 13:19:44 +08002475 unsigned int i;
Kent Overstreete49c7c32013-06-26 17:25:38 -07002476 struct closure cl;
2477
2478 closure_init_stack(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002479
Kent Overstreetc37511b2013-04-26 15:39:55 -07002480 trace_bcache_btree_set_root(b);
2481
Kent Overstreetcafe5632013-03-23 16:11:31 -07002482 BUG_ON(!b->written);
2483
2484 for (i = 0; i < KEY_PTRS(&b->key); i++)
2485 BUG_ON(PTR_BUCKET(b->c, &b->key, i)->prio != BTREE_PRIO);
2486
2487 mutex_lock(&b->c->bucket_lock);
2488 list_del_init(&b->list);
2489 mutex_unlock(&b->c->bucket_lock);
2490
2491 b->c->root = b;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002492
Kent Overstreete49c7c32013-06-26 17:25:38 -07002493 bch_journal_meta(b->c, &cl);
2494 closure_sync(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002495}
2496
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002497/* Map across nodes or keys */
2498
2499static int bch_btree_map_nodes_recurse(struct btree *b, struct btree_op *op,
2500 struct bkey *from,
2501 btree_map_nodes_fn *fn, int flags)
2502{
2503 int ret = MAP_CONTINUE;
2504
2505 if (b->level) {
2506 struct bkey *k;
2507 struct btree_iter iter;
2508
Kent Overstreetc052dd92013-11-11 17:35:24 -08002509 bch_btree_iter_init(&b->keys, &iter, from);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002510
Kent Overstreeta85e9682013-12-20 17:28:16 -08002511 while ((k = bch_btree_iter_next_filter(&iter, &b->keys,
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002512 bch_ptr_bad))) {
Coly Lifeac1a72020-03-22 14:03:00 +08002513 ret = bcache_btree(map_nodes_recurse, k, b,
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002514 op, from, fn, flags);
2515 from = NULL;
2516
2517 if (ret != MAP_CONTINUE)
2518 return ret;
2519 }
2520 }
2521
2522 if (!b->level || flags == MAP_ALL_NODES)
2523 ret = fn(op, b);
2524
2525 return ret;
2526}
2527
2528int __bch_btree_map_nodes(struct btree_op *op, struct cache_set *c,
2529 struct bkey *from, btree_map_nodes_fn *fn, int flags)
2530{
Coly Lifeac1a72020-03-22 14:03:00 +08002531 return bcache_btree_root(map_nodes_recurse, c, op, from, fn, flags);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002532}
2533
Coly Li253a99d92020-03-22 14:02:59 +08002534int bch_btree_map_keys_recurse(struct btree *b, struct btree_op *op,
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002535 struct bkey *from, btree_map_keys_fn *fn,
2536 int flags)
2537{
2538 int ret = MAP_CONTINUE;
2539 struct bkey *k;
2540 struct btree_iter iter;
2541
Kent Overstreetc052dd92013-11-11 17:35:24 -08002542 bch_btree_iter_init(&b->keys, &iter, from);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002543
Kent Overstreeta85e9682013-12-20 17:28:16 -08002544 while ((k = bch_btree_iter_next_filter(&iter, &b->keys, bch_ptr_bad))) {
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002545 ret = !b->level
2546 ? fn(op, b, k)
Coly Lifeac1a72020-03-22 14:03:00 +08002547 : bcache_btree(map_keys_recurse, k,
2548 b, op, from, fn, flags);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002549 from = NULL;
2550
2551 if (ret != MAP_CONTINUE)
2552 return ret;
2553 }
2554
2555 if (!b->level && (flags & MAP_END_KEY))
2556 ret = fn(op, b, &KEY(KEY_INODE(&b->key),
2557 KEY_OFFSET(&b->key), 0));
2558
2559 return ret;
2560}
2561
2562int bch_btree_map_keys(struct btree_op *op, struct cache_set *c,
2563 struct bkey *from, btree_map_keys_fn *fn, int flags)
2564{
Coly Lifeac1a72020-03-22 14:03:00 +08002565 return bcache_btree_root(map_keys_recurse, c, op, from, fn, flags);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002566}
2567
Kent Overstreetcafe5632013-03-23 16:11:31 -07002568/* Keybuf code */
2569
2570static inline int keybuf_cmp(struct keybuf_key *l, struct keybuf_key *r)
2571{
2572 /* Overlapping keys compare equal */
2573 if (bkey_cmp(&l->key, &START_KEY(&r->key)) <= 0)
2574 return -1;
2575 if (bkey_cmp(&START_KEY(&l->key), &r->key) >= 0)
2576 return 1;
2577 return 0;
2578}
2579
2580static inline int keybuf_nonoverlapping_cmp(struct keybuf_key *l,
2581 struct keybuf_key *r)
2582{
2583 return clamp_t(int64_t, bkey_cmp(&l->key, &r->key), -1, 1);
2584}
2585
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002586struct refill {
2587 struct btree_op op;
Coly Li6f10f7d2018-08-11 13:19:44 +08002588 unsigned int nr_found;
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002589 struct keybuf *buf;
2590 struct bkey *end;
2591 keybuf_pred_fn *pred;
2592};
2593
2594static int refill_keybuf_fn(struct btree_op *op, struct btree *b,
2595 struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002596{
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002597 struct refill *refill = container_of(op, struct refill, op);
2598 struct keybuf *buf = refill->buf;
2599 int ret = MAP_CONTINUE;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002600
Tang Junhui2d6cb6e2018-10-08 20:41:14 +08002601 if (bkey_cmp(k, refill->end) > 0) {
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002602 ret = MAP_DONE;
2603 goto out;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002604 }
2605
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002606 if (!KEY_SIZE(k)) /* end key */
2607 goto out;
2608
2609 if (refill->pred(buf, k)) {
2610 struct keybuf_key *w;
2611
2612 spin_lock(&buf->lock);
2613
2614 w = array_alloc(&buf->freelist);
2615 if (!w) {
2616 spin_unlock(&buf->lock);
2617 return MAP_DONE;
2618 }
2619
2620 w->private = NULL;
2621 bkey_copy(&w->key, k);
2622
2623 if (RB_INSERT(&buf->keys, w, node, keybuf_cmp))
2624 array_free(&buf->freelist, w);
Kent Overstreet48a915a2013-10-31 15:43:22 -07002625 else
2626 refill->nr_found++;
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002627
2628 if (array_freelist_empty(&buf->freelist))
2629 ret = MAP_DONE;
2630
2631 spin_unlock(&buf->lock);
2632 }
2633out:
2634 buf->last_scanned = *k;
2635 return ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002636}
2637
2638void bch_refill_keybuf(struct cache_set *c, struct keybuf *buf,
Kent Overstreet72c27062013-06-05 06:24:39 -07002639 struct bkey *end, keybuf_pred_fn *pred)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002640{
2641 struct bkey start = buf->last_scanned;
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002642 struct refill refill;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002643
2644 cond_resched();
2645
Kent Overstreetb54d6932013-07-24 18:04:18 -07002646 bch_btree_op_init(&refill.op, -1);
Kent Overstreet48a915a2013-10-31 15:43:22 -07002647 refill.nr_found = 0;
2648 refill.buf = buf;
2649 refill.end = end;
2650 refill.pred = pred;
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002651
2652 bch_btree_map_keys(&refill.op, c, &buf->last_scanned,
2653 refill_keybuf_fn, MAP_END_KEY);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002654
Kent Overstreet48a915a2013-10-31 15:43:22 -07002655 trace_bcache_keyscan(refill.nr_found,
2656 KEY_INODE(&start), KEY_OFFSET(&start),
2657 KEY_INODE(&buf->last_scanned),
2658 KEY_OFFSET(&buf->last_scanned));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002659
2660 spin_lock(&buf->lock);
2661
2662 if (!RB_EMPTY_ROOT(&buf->keys)) {
2663 struct keybuf_key *w;
Coly Li1fae7cf2018-08-11 13:19:45 +08002664
Kent Overstreetcafe5632013-03-23 16:11:31 -07002665 w = RB_FIRST(&buf->keys, struct keybuf_key, node);
2666 buf->start = START_KEY(&w->key);
2667
2668 w = RB_LAST(&buf->keys, struct keybuf_key, node);
2669 buf->end = w->key;
2670 } else {
2671 buf->start = MAX_KEY;
2672 buf->end = MAX_KEY;
2673 }
2674
2675 spin_unlock(&buf->lock);
2676}
2677
2678static void __bch_keybuf_del(struct keybuf *buf, struct keybuf_key *w)
2679{
2680 rb_erase(&w->node, &buf->keys);
2681 array_free(&buf->freelist, w);
2682}
2683
2684void bch_keybuf_del(struct keybuf *buf, struct keybuf_key *w)
2685{
2686 spin_lock(&buf->lock);
2687 __bch_keybuf_del(buf, w);
2688 spin_unlock(&buf->lock);
2689}
2690
2691bool bch_keybuf_check_overlapping(struct keybuf *buf, struct bkey *start,
2692 struct bkey *end)
2693{
2694 bool ret = false;
2695 struct keybuf_key *p, *w, s;
Coly Li1fae7cf2018-08-11 13:19:45 +08002696
Kent Overstreetcafe5632013-03-23 16:11:31 -07002697 s.key = *start;
2698
2699 if (bkey_cmp(end, &buf->start) <= 0 ||
2700 bkey_cmp(start, &buf->end) >= 0)
2701 return false;
2702
2703 spin_lock(&buf->lock);
2704 w = RB_GREATER(&buf->keys, s, node, keybuf_nonoverlapping_cmp);
2705
2706 while (w && bkey_cmp(&START_KEY(&w->key), end) < 0) {
2707 p = w;
2708 w = RB_NEXT(w, node);
2709
2710 if (p->private)
2711 ret = true;
2712 else
2713 __bch_keybuf_del(buf, p);
2714 }
2715
2716 spin_unlock(&buf->lock);
2717 return ret;
2718}
2719
2720struct keybuf_key *bch_keybuf_next(struct keybuf *buf)
2721{
2722 struct keybuf_key *w;
Coly Li1fae7cf2018-08-11 13:19:45 +08002723
Kent Overstreetcafe5632013-03-23 16:11:31 -07002724 spin_lock(&buf->lock);
2725
2726 w = RB_FIRST(&buf->keys, struct keybuf_key, node);
2727
2728 while (w && w->private)
2729 w = RB_NEXT(w, node);
2730
2731 if (w)
2732 w->private = ERR_PTR(-EINTR);
2733
2734 spin_unlock(&buf->lock);
2735 return w;
2736}
2737
2738struct keybuf_key *bch_keybuf_next_rescan(struct cache_set *c,
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002739 struct keybuf *buf,
2740 struct bkey *end,
2741 keybuf_pred_fn *pred)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002742{
2743 struct keybuf_key *ret;
2744
2745 while (1) {
2746 ret = bch_keybuf_next(buf);
2747 if (ret)
2748 break;
2749
2750 if (bkey_cmp(&buf->last_scanned, end) >= 0) {
Joe Perches46f5aa82020-05-27 12:01:52 +08002751 pr_debug("scan finished\n");
Kent Overstreetcafe5632013-03-23 16:11:31 -07002752 break;
2753 }
2754
Kent Overstreet72c27062013-06-05 06:24:39 -07002755 bch_refill_keybuf(c, buf, end, pred);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002756 }
2757
2758 return ret;
2759}
2760
Kent Overstreet72c27062013-06-05 06:24:39 -07002761void bch_keybuf_init(struct keybuf *buf)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002762{
Kent Overstreetcafe5632013-03-23 16:11:31 -07002763 buf->last_scanned = MAX_KEY;
2764 buf->keys = RB_ROOT;
2765
2766 spin_lock_init(&buf->lock);
2767 array_allocator_init(&buf->freelist);
2768}
Kai Krakow9f233ff2021-02-10 13:07:25 +08002769
2770void bch_btree_exit(void)
2771{
2772 if (btree_io_wq)
2773 destroy_workqueue(btree_io_wq);
2774}
2775
2776int __init bch_btree_init(void)
2777{
Kai Krakowd797bd92021-02-10 13:07:26 +08002778 btree_io_wq = alloc_workqueue("bch_btree_io", WQ_MEM_RECLAIM, 0);
Kai Krakow9f233ff2021-02-10 13:07:25 +08002779 if (!btree_io_wq)
2780 return -ENOMEM;
2781
2782 return 0;
2783}