blob: 74d66b641169350e86f93653a9cb99d695782f7c [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Kent Overstreetcafe5632013-03-23 16:11:31 -07002/*
3 * Copyright (C) 2010 Kent Overstreet <kent.overstreet@gmail.com>
4 *
5 * Uses a block device as cache for other block devices; optimized for SSDs.
6 * All allocation is done in buckets, which should match the erase block size
7 * of the device.
8 *
9 * Buckets containing cached data are kept on a heap sorted by priority;
10 * bucket priority is increased on cache hit, and periodically all the buckets
11 * on the heap have their priority scaled down. This currently is just used as
12 * an LRU but in the future should allow for more intelligent heuristics.
13 *
14 * Buckets have an 8 bit counter; freeing is accomplished by incrementing the
15 * counter. Garbage collection is used to remove stale pointers.
16 *
17 * Indexing is done via a btree; nodes are not necessarily fully sorted, rather
18 * as keys are inserted we only sort the pages that have not yet been written.
19 * When garbage collection is run, we resort the entire node.
20 *
Mauro Carvalho Chehab5fb94e92018-05-08 15:14:57 -030021 * All configuration is done via sysfs; see Documentation/admin-guide/bcache.rst.
Kent Overstreetcafe5632013-03-23 16:11:31 -070022 */
23
24#include "bcache.h"
25#include "btree.h"
26#include "debug.h"
Kent Overstreet65d45232013-12-20 17:22:05 -080027#include "extents.h"
Kent Overstreetcafe5632013-03-23 16:11:31 -070028
29#include <linux/slab.h>
30#include <linux/bitops.h>
31#include <linux/hash.h>
Kent Overstreet72a44512013-10-24 17:19:26 -070032#include <linux/kthread.h>
Geert Uytterhoevencd953ed2013-03-27 18:56:28 +010033#include <linux/prefetch.h>
Kent Overstreetcafe5632013-03-23 16:11:31 -070034#include <linux/random.h>
35#include <linux/rcupdate.h>
Ingo Molnare6017572017-02-01 16:36:40 +010036#include <linux/sched/clock.h>
Ingo Molnarb2d09102017-02-04 01:27:20 +010037#include <linux/rculist.h>
Coly Li50a260e2019-06-28 19:59:58 +080038#include <linux/delay.h>
Kent Overstreetcafe5632013-03-23 16:11:31 -070039#include <trace/events/bcache.h>
40
41/*
42 * Todo:
43 * register_bcache: Return errors out to userspace correctly
44 *
45 * Writeback: don't undirty key until after a cache flush
46 *
47 * Create an iterator for key pointers
48 *
49 * On btree write error, mark bucket such that it won't be freed from the cache
50 *
51 * Journalling:
52 * Check for bad keys in replay
53 * Propagate barriers
54 * Refcount journal entries in journal_replay
55 *
56 * Garbage collection:
57 * Finish incremental gc
58 * Gc should free old UUIDs, data for invalid UUIDs
59 *
60 * Provide a way to list backing device UUIDs we have data cached for, and
61 * probably how long it's been since we've seen them, and a way to invalidate
62 * dirty data for devices that will never be attached again
63 *
64 * Keep 1 min/5 min/15 min statistics of how busy a block device has been, so
65 * that based on that and how much dirty data we have we can keep writeback
66 * from being starved
67 *
68 * Add a tracepoint or somesuch to watch for writeback starvation
69 *
70 * When btree depth > 1 and splitting an interior node, we have to make sure
71 * alloc_bucket() cannot fail. This should be true but is not completely
72 * obvious.
73 *
Kent Overstreetcafe5632013-03-23 16:11:31 -070074 * Plugging?
75 *
76 * If data write is less than hard sector size of ssd, round up offset in open
77 * bucket to the next whole sector
78 *
Kent Overstreetcafe5632013-03-23 16:11:31 -070079 * Superblock needs to be fleshed out for multiple cache devices
80 *
81 * Add a sysfs tunable for the number of writeback IOs in flight
82 *
83 * Add a sysfs tunable for the number of open data buckets
84 *
85 * IO tracking: Can we track when one process is doing io on behalf of another?
86 * IO tracking: Don't use just an average, weigh more recent stuff higher
87 *
88 * Test module load/unload
89 */
90
Kent Overstreetcafe5632013-03-23 16:11:31 -070091#define MAX_NEED_GC 64
92#define MAX_SAVE_PRIO 72
Tang Junhui7f4a59d2018-07-26 12:17:35 +080093#define MAX_GC_TIMES 100
Tang Junhui5c25c4f2018-07-26 12:17:34 +080094#define MIN_GC_NODES 100
95#define GC_SLEEP_MS 100
Kent Overstreetcafe5632013-03-23 16:11:31 -070096
97#define PTR_DIRTY_BIT (((uint64_t) 1 << 36))
98
99#define PTR_HASH(c, k) \
100 (((k)->ptr[0] >> c->bucket_bits) | PTR_GEN(k, 0))
101
Kent Overstreetdf8e8972013-07-24 17:37:59 -0700102#define insert_lock(s, b) ((b)->level <= (s)->lock)
103
Kent Overstreetdf8e8972013-07-24 17:37:59 -0700104
Kent Overstreeta85e9682013-12-20 17:28:16 -0800105static inline struct bset *write_block(struct btree *b)
106{
107 return ((void *) btree_bset_first(b)) + b->written * block_bytes(b->c);
108}
109
Kent Overstreet2a285682014-03-04 16:42:42 -0800110static void bch_btree_init_next(struct btree *b)
111{
112 /* If not a leaf node, always sort */
113 if (b->level && b->keys.nsets)
114 bch_btree_sort(&b->keys, &b->c->sort);
115 else
116 bch_btree_sort_lazy(&b->keys, &b->c->sort);
117
118 if (b->written < btree_blocks(b))
119 bch_bset_init_next(&b->keys, write_block(b),
120 bset_magic(&b->c->sb));
121
122}
123
Kent Overstreetcafe5632013-03-23 16:11:31 -0700124/* Btree key manipulation */
125
Kent Overstreet3a3b6a42013-07-24 16:46:42 -0700126void bkey_put(struct cache_set *c, struct bkey *k)
Kent Overstreete7c590e2013-09-10 18:39:16 -0700127{
Coly Li6f10f7d2018-08-11 13:19:44 +0800128 unsigned int i;
Kent Overstreete7c590e2013-09-10 18:39:16 -0700129
130 for (i = 0; i < KEY_PTRS(k); i++)
131 if (ptr_available(c, k, i))
132 atomic_dec_bug(&PTR_BUCKET(c, k, i)->pin);
133}
134
Kent Overstreetcafe5632013-03-23 16:11:31 -0700135/* Btree IO */
136
137static uint64_t btree_csum_set(struct btree *b, struct bset *i)
138{
139 uint64_t crc = b->key.ptr[0];
Kent Overstreetfafff812013-12-17 21:56:21 -0800140 void *data = (void *) i + 8, *end = bset_bkey_last(i);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700141
Kent Overstreet169ef1c2013-03-28 12:50:55 -0600142 crc = bch_crc64_update(crc, data, end - data);
Kent Overstreetc19ed232013-03-26 13:49:02 -0700143 return crc ^ 0xffffffffffffffffULL;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700144}
145
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800146void bch_btree_node_read_done(struct btree *b)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700147{
Kent Overstreetcafe5632013-03-23 16:11:31 -0700148 const char *err = "bad btree header";
Kent Overstreetee811282013-12-17 23:49:49 -0800149 struct bset *i = btree_bset_first(b);
Kent Overstreet57943512013-04-25 13:58:35 -0700150 struct btree_iter *iter;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700151
Shenghui Wangd2f96f42018-12-13 22:53:46 +0800152 /*
153 * c->fill_iter can allocate an iterator with more memory space
154 * than static MAX_BSETS.
155 * See the comment arount cache_set->fill_iter.
156 */
Kent Overstreetd19936a2018-05-20 18:25:51 -0400157 iter = mempool_alloc(&b->c->fill_iter, GFP_NOIO);
Kent Overstreet57943512013-04-25 13:58:35 -0700158 iter->size = b->c->sb.bucket_size / b->c->sb.block_size;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700159 iter->used = 0;
160
Kent Overstreet280481d2013-10-24 16:36:03 -0700161#ifdef CONFIG_BCACHE_DEBUG
Kent Overstreetc052dd92013-11-11 17:35:24 -0800162 iter->b = &b->keys;
Kent Overstreet280481d2013-10-24 16:36:03 -0700163#endif
164
Kent Overstreet57943512013-04-25 13:58:35 -0700165 if (!i->seq)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700166 goto err;
167
168 for (;
Kent Overstreeta85e9682013-12-20 17:28:16 -0800169 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700170 i = write_block(b)) {
171 err = "unsupported bset version";
172 if (i->version > BCACHE_BSET_VERSION)
173 goto err;
174
175 err = "bad btree header";
Kent Overstreetee811282013-12-17 23:49:49 -0800176 if (b->written + set_blocks(i, block_bytes(b->c)) >
177 btree_blocks(b))
Kent Overstreetcafe5632013-03-23 16:11:31 -0700178 goto err;
179
180 err = "bad magic";
Kent Overstreet81ab4192013-10-31 15:46:42 -0700181 if (i->magic != bset_magic(&b->c->sb))
Kent Overstreetcafe5632013-03-23 16:11:31 -0700182 goto err;
183
184 err = "bad checksum";
185 switch (i->version) {
186 case 0:
187 if (i->csum != csum_set(i))
188 goto err;
189 break;
190 case BCACHE_BSET_VERSION:
191 if (i->csum != btree_csum_set(b, i))
192 goto err;
193 break;
194 }
195
196 err = "empty set";
Kent Overstreeta85e9682013-12-20 17:28:16 -0800197 if (i != b->keys.set[0].data && !i->keys)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700198 goto err;
199
Kent Overstreetfafff812013-12-17 21:56:21 -0800200 bch_btree_iter_push(iter, i->start, bset_bkey_last(i));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700201
Kent Overstreetee811282013-12-17 23:49:49 -0800202 b->written += set_blocks(i, block_bytes(b->c));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700203 }
204
205 err = "corrupted btree";
206 for (i = write_block(b);
Kent Overstreeta85e9682013-12-20 17:28:16 -0800207 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700208 i = ((void *) i) + block_bytes(b->c))
Kent Overstreeta85e9682013-12-20 17:28:16 -0800209 if (i->seq == b->keys.set[0].data->seq)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700210 goto err;
211
Kent Overstreeta85e9682013-12-20 17:28:16 -0800212 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700213
Kent Overstreeta85e9682013-12-20 17:28:16 -0800214 i = b->keys.set[0].data;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700215 err = "short btree key";
Kent Overstreeta85e9682013-12-20 17:28:16 -0800216 if (b->keys.set[0].size &&
217 bkey_cmp(&b->key, &b->keys.set[0].end) < 0)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700218 goto err;
219
220 if (b->written < btree_blocks(b))
Kent Overstreeta85e9682013-12-20 17:28:16 -0800221 bch_bset_init_next(&b->keys, write_block(b),
222 bset_magic(&b->c->sb));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700223out:
Kent Overstreetd19936a2018-05-20 18:25:51 -0400224 mempool_free(iter, &b->c->fill_iter);
Kent Overstreet57943512013-04-25 13:58:35 -0700225 return;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700226err:
227 set_btree_node_io_error(b);
Kent Overstreet88b9f8c2013-12-17 21:46:35 -0800228 bch_cache_set_error(b->c, "%s at bucket %zu, block %u, %u keys",
Kent Overstreetcafe5632013-03-23 16:11:31 -0700229 err, PTR_BUCKET_NR(b->c, &b->key, 0),
Kent Overstreet88b9f8c2013-12-17 21:46:35 -0800230 bset_block_offset(b, i), i->keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700231 goto out;
232}
233
Christoph Hellwig4246a0b2015-07-20 15:29:37 +0200234static void btree_node_read_endio(struct bio *bio)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700235{
Kent Overstreet57943512013-04-25 13:58:35 -0700236 struct closure *cl = bio->bi_private;
Coly Li1fae7cf2018-08-11 13:19:45 +0800237
Kent Overstreet57943512013-04-25 13:58:35 -0700238 closure_put(cl);
239}
Kent Overstreetcafe5632013-03-23 16:11:31 -0700240
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800241static void bch_btree_node_read(struct btree *b)
Kent Overstreet57943512013-04-25 13:58:35 -0700242{
243 uint64_t start_time = local_clock();
244 struct closure cl;
245 struct bio *bio;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700246
Kent Overstreetc37511b2013-04-26 15:39:55 -0700247 trace_bcache_btree_read(b);
248
Kent Overstreet57943512013-04-25 13:58:35 -0700249 closure_init_stack(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700250
Kent Overstreet57943512013-04-25 13:58:35 -0700251 bio = bch_bbio_alloc(b->c);
Kent Overstreet4f024f32013-10-11 15:44:27 -0700252 bio->bi_iter.bi_size = KEY_SIZE(&b->key) << 9;
Kent Overstreet57943512013-04-25 13:58:35 -0700253 bio->bi_end_io = btree_node_read_endio;
254 bio->bi_private = &cl;
Christoph Hellwig70fd7612016-11-01 07:40:10 -0600255 bio->bi_opf = REQ_OP_READ | REQ_META;
Kent Overstreet57943512013-04-25 13:58:35 -0700256
Kent Overstreeta85e9682013-12-20 17:28:16 -0800257 bch_bio_map(bio, b->keys.set[0].data);
Kent Overstreet57943512013-04-25 13:58:35 -0700258
Kent Overstreet57943512013-04-25 13:58:35 -0700259 bch_submit_bbio(bio, b->c, &b->key, 0);
260 closure_sync(&cl);
261
Christoph Hellwig4e4cbee2017-06-03 09:38:06 +0200262 if (bio->bi_status)
Kent Overstreet57943512013-04-25 13:58:35 -0700263 set_btree_node_io_error(b);
264
265 bch_bbio_free(bio, b->c);
266
267 if (btree_node_io_error(b))
268 goto err;
269
270 bch_btree_node_read_done(b);
Kent Overstreet57943512013-04-25 13:58:35 -0700271 bch_time_stats_update(&b->c->btree_read_time, start_time);
Kent Overstreet57943512013-04-25 13:58:35 -0700272
273 return;
274err:
Geert Uytterhoeven61cbd252013-09-23 23:17:30 -0700275 bch_cache_set_error(b->c, "io error reading bucket %zu",
Kent Overstreet57943512013-04-25 13:58:35 -0700276 PTR_BUCKET_NR(b->c, &b->key, 0));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700277}
278
279static void btree_complete_write(struct btree *b, struct btree_write *w)
280{
281 if (w->prio_blocked &&
282 !atomic_sub_return(w->prio_blocked, &b->c->prio_blocked))
Kent Overstreet119ba0f2013-04-24 19:01:12 -0700283 wake_up_allocators(b->c);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700284
285 if (w->journal) {
286 atomic_dec_bug(w->journal);
287 __closure_wake_up(&b->c->journal.wait);
288 }
289
Kent Overstreetcafe5632013-03-23 16:11:31 -0700290 w->prio_blocked = 0;
291 w->journal = NULL;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700292}
293
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800294static void btree_node_write_unlock(struct closure *cl)
295{
296 struct btree *b = container_of(cl, struct btree, io);
297
298 up(&b->io_mutex);
299}
300
Kent Overstreet57943512013-04-25 13:58:35 -0700301static void __btree_node_write_done(struct closure *cl)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700302{
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800303 struct btree *b = container_of(cl, struct btree, io);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700304 struct btree_write *w = btree_prev_write(b);
305
306 bch_bbio_free(b->bio, b->c);
307 b->bio = NULL;
308 btree_complete_write(b, w);
309
310 if (btree_node_dirty(b))
Kent Overstreet56b30772014-01-23 01:44:55 -0800311 schedule_delayed_work(&b->work, 30 * HZ);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700312
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800313 closure_return_with_destructor(cl, btree_node_write_unlock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700314}
315
Kent Overstreet57943512013-04-25 13:58:35 -0700316static void btree_node_write_done(struct closure *cl)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700317{
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800318 struct btree *b = container_of(cl, struct btree, io);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700319
Guoqing Jiang491221f2016-09-22 03:10:01 -0400320 bio_free_pages(b->bio);
Kent Overstreet57943512013-04-25 13:58:35 -0700321 __btree_node_write_done(cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700322}
323
Christoph Hellwig4246a0b2015-07-20 15:29:37 +0200324static void btree_node_write_endio(struct bio *bio)
Kent Overstreet57943512013-04-25 13:58:35 -0700325{
326 struct closure *cl = bio->bi_private;
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800327 struct btree *b = container_of(cl, struct btree, io);
Kent Overstreet57943512013-04-25 13:58:35 -0700328
Christoph Hellwig4e4cbee2017-06-03 09:38:06 +0200329 if (bio->bi_status)
Kent Overstreet57943512013-04-25 13:58:35 -0700330 set_btree_node_io_error(b);
331
Christoph Hellwig4e4cbee2017-06-03 09:38:06 +0200332 bch_bbio_count_io_errors(b->c, bio, bio->bi_status, "writing btree");
Kent Overstreet57943512013-04-25 13:58:35 -0700333 closure_put(cl);
334}
335
336static void do_btree_node_write(struct btree *b)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700337{
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800338 struct closure *cl = &b->io;
Kent Overstreetee811282013-12-17 23:49:49 -0800339 struct bset *i = btree_bset_last(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700340 BKEY_PADDED(key) k;
341
342 i->version = BCACHE_BSET_VERSION;
343 i->csum = btree_csum_set(b, i);
344
Kent Overstreet57943512013-04-25 13:58:35 -0700345 BUG_ON(b->bio);
346 b->bio = bch_bbio_alloc(b->c);
347
348 b->bio->bi_end_io = btree_node_write_endio;
Kent Overstreetfaadf0c2013-11-01 18:03:08 -0700349 b->bio->bi_private = cl;
Kent Overstreetee811282013-12-17 23:49:49 -0800350 b->bio->bi_iter.bi_size = roundup(set_bytes(i), block_bytes(b->c));
Christoph Hellwig70fd7612016-11-01 07:40:10 -0600351 b->bio->bi_opf = REQ_OP_WRITE | REQ_META | REQ_FUA;
Kent Overstreet169ef1c2013-03-28 12:50:55 -0600352 bch_bio_map(b->bio, i);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700353
Kent Overstreete49c7c32013-06-26 17:25:38 -0700354 /*
355 * If we're appending to a leaf node, we don't technically need FUA -
356 * this write just needs to be persisted before the next journal write,
357 * which will be marked FLUSH|FUA.
358 *
359 * Similarly if we're writing a new btree root - the pointer is going to
360 * be in the next journal entry.
361 *
362 * But if we're writing a new btree node (that isn't a root) or
363 * appending to a non leaf btree node, we need either FUA or a flush
364 * when we write the parent with the new pointer. FUA is cheaper than a
365 * flush, and writes appending to leaf nodes aren't blocking anything so
366 * just make all btree node writes FUA to keep things sane.
367 */
368
Kent Overstreetcafe5632013-03-23 16:11:31 -0700369 bkey_copy(&k.key, &b->key);
Kent Overstreetee811282013-12-17 23:49:49 -0800370 SET_PTR_OFFSET(&k.key, 0, PTR_OFFSET(&k.key, 0) +
Kent Overstreeta85e9682013-12-20 17:28:16 -0800371 bset_sector_offset(&b->keys, i));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700372
Ming Lei25d8be72017-12-18 20:22:10 +0800373 if (!bch_bio_alloc_pages(b->bio, __GFP_NOWARN|GFP_NOWAIT)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700374 struct bio_vec *bv;
Christoph Hellwigf936b062019-04-25 09:02:59 +0200375 void *addr = (void *) ((unsigned long) i & ~(PAGE_SIZE - 1));
Ming Lei6dc4f102019-02-15 19:13:19 +0800376 struct bvec_iter_all iter_all;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700377
Christoph Hellwig2b070cf2019-04-25 09:03:00 +0200378 bio_for_each_segment_all(bv, b->bio, iter_all) {
Christoph Hellwigf936b062019-04-25 09:02:59 +0200379 memcpy(page_address(bv->bv_page), addr, PAGE_SIZE);
380 addr += PAGE_SIZE;
381 }
Kent Overstreetcafe5632013-03-23 16:11:31 -0700382
Kent Overstreetcafe5632013-03-23 16:11:31 -0700383 bch_submit_bbio(b->bio, b->c, &k.key, 0);
384
Kent Overstreet57943512013-04-25 13:58:35 -0700385 continue_at(cl, btree_node_write_done, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700386 } else {
Coly Lib0d30982018-08-11 13:19:47 +0800387 /*
388 * No problem for multipage bvec since the bio is
389 * just allocated
390 */
Kent Overstreetcafe5632013-03-23 16:11:31 -0700391 b->bio->bi_vcnt = 0;
Kent Overstreet169ef1c2013-03-28 12:50:55 -0600392 bch_bio_map(b->bio, i);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700393
Kent Overstreetcafe5632013-03-23 16:11:31 -0700394 bch_submit_bbio(b->bio, b->c, &k.key, 0);
395
396 closure_sync(cl);
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800397 continue_at_nobarrier(cl, __btree_node_write_done, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700398 }
399}
400
Kent Overstreet2a285682014-03-04 16:42:42 -0800401void __bch_btree_node_write(struct btree *b, struct closure *parent)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700402{
Kent Overstreetee811282013-12-17 23:49:49 -0800403 struct bset *i = btree_bset_last(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700404
Kent Overstreet2a285682014-03-04 16:42:42 -0800405 lockdep_assert_held(&b->write_lock);
406
Kent Overstreetc37511b2013-04-26 15:39:55 -0700407 trace_bcache_btree_write(b);
408
Kent Overstreetcafe5632013-03-23 16:11:31 -0700409 BUG_ON(current->bio_list);
Kent Overstreet57943512013-04-25 13:58:35 -0700410 BUG_ON(b->written >= btree_blocks(b));
411 BUG_ON(b->written && !i->keys);
Kent Overstreetee811282013-12-17 23:49:49 -0800412 BUG_ON(btree_bset_first(b)->seq != i->seq);
Kent Overstreetdc9d98d2013-12-17 23:47:33 -0800413 bch_check_keys(&b->keys, "writing");
Kent Overstreetcafe5632013-03-23 16:11:31 -0700414
Kent Overstreetcafe5632013-03-23 16:11:31 -0700415 cancel_delayed_work(&b->work);
416
Kent Overstreet57943512013-04-25 13:58:35 -0700417 /* If caller isn't waiting for write, parent refcount is cache set */
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800418 down(&b->io_mutex);
419 closure_init(&b->io, parent ?: &b->c->cl);
Kent Overstreet57943512013-04-25 13:58:35 -0700420
Kent Overstreetcafe5632013-03-23 16:11:31 -0700421 clear_bit(BTREE_NODE_dirty, &b->flags);
422 change_bit(BTREE_NODE_write_idx, &b->flags);
423
Kent Overstreet57943512013-04-25 13:58:35 -0700424 do_btree_node_write(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700425
Kent Overstreetee811282013-12-17 23:49:49 -0800426 atomic_long_add(set_blocks(i, block_bytes(b->c)) * b->c->sb.block_size,
Kent Overstreetcafe5632013-03-23 16:11:31 -0700427 &PTR_CACHE(b->c, &b->key, 0)->btree_sectors_written);
428
Kent Overstreeta85e9682013-12-20 17:28:16 -0800429 b->written += set_blocks(i, block_bytes(b->c));
Kent Overstreet2a285682014-03-04 16:42:42 -0800430}
Kent Overstreeta85e9682013-12-20 17:28:16 -0800431
Kent Overstreet2a285682014-03-04 16:42:42 -0800432void bch_btree_node_write(struct btree *b, struct closure *parent)
433{
Coly Li6f10f7d2018-08-11 13:19:44 +0800434 unsigned int nsets = b->keys.nsets;
Kent Overstreet2a285682014-03-04 16:42:42 -0800435
436 lockdep_assert_held(&b->lock);
437
438 __bch_btree_node_write(b, parent);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700439
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800440 /*
441 * do verify if there was more than one set initially (i.e. we did a
442 * sort) and we sorted down to a single set:
443 */
Kent Overstreet2a285682014-03-04 16:42:42 -0800444 if (nsets && !b->keys.nsets)
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800445 bch_btree_verify(b);
446
Kent Overstreet2a285682014-03-04 16:42:42 -0800447 bch_btree_init_next(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700448}
449
Kent Overstreetf269af52013-07-23 20:48:29 -0700450static void bch_btree_node_write_sync(struct btree *b)
451{
452 struct closure cl;
453
454 closure_init_stack(&cl);
Kent Overstreet2a285682014-03-04 16:42:42 -0800455
456 mutex_lock(&b->write_lock);
Kent Overstreetf269af52013-07-23 20:48:29 -0700457 bch_btree_node_write(b, &cl);
Kent Overstreet2a285682014-03-04 16:42:42 -0800458 mutex_unlock(&b->write_lock);
459
Kent Overstreetf269af52013-07-23 20:48:29 -0700460 closure_sync(&cl);
461}
462
Kent Overstreet57943512013-04-25 13:58:35 -0700463static void btree_node_write_work(struct work_struct *w)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700464{
465 struct btree *b = container_of(to_delayed_work(w), struct btree, work);
466
Kent Overstreet2a285682014-03-04 16:42:42 -0800467 mutex_lock(&b->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700468 if (btree_node_dirty(b))
Kent Overstreet2a285682014-03-04 16:42:42 -0800469 __bch_btree_node_write(b, NULL);
470 mutex_unlock(&b->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700471}
472
Kent Overstreetc18536a2013-07-24 17:44:17 -0700473static void bch_btree_leaf_dirty(struct btree *b, atomic_t *journal_ref)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700474{
Kent Overstreetee811282013-12-17 23:49:49 -0800475 struct bset *i = btree_bset_last(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700476 struct btree_write *w = btree_current_write(b);
477
Kent Overstreet2a285682014-03-04 16:42:42 -0800478 lockdep_assert_held(&b->write_lock);
479
Kent Overstreet57943512013-04-25 13:58:35 -0700480 BUG_ON(!b->written);
481 BUG_ON(!i->keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700482
Kent Overstreet57943512013-04-25 13:58:35 -0700483 if (!btree_node_dirty(b))
Kent Overstreet56b30772014-01-23 01:44:55 -0800484 schedule_delayed_work(&b->work, 30 * HZ);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700485
Kent Overstreet57943512013-04-25 13:58:35 -0700486 set_btree_node_dirty(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700487
Coly Li5dccefd2019-11-13 16:03:22 +0800488 /*
489 * w->journal is always the oldest journal pin of all bkeys
490 * in the leaf node, to make sure the oldest jset seq won't
491 * be increased before this btree node is flushed.
492 */
Kent Overstreetc18536a2013-07-24 17:44:17 -0700493 if (journal_ref) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700494 if (w->journal &&
Kent Overstreetc18536a2013-07-24 17:44:17 -0700495 journal_pin_cmp(b->c, w->journal, journal_ref)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700496 atomic_dec_bug(w->journal);
497 w->journal = NULL;
498 }
499
500 if (!w->journal) {
Kent Overstreetc18536a2013-07-24 17:44:17 -0700501 w->journal = journal_ref;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700502 atomic_inc(w->journal);
503 }
504 }
505
Kent Overstreetcafe5632013-03-23 16:11:31 -0700506 /* Force write if set is too big */
Kent Overstreet57943512013-04-25 13:58:35 -0700507 if (set_bytes(i) > PAGE_SIZE - 48 &&
508 !current->bio_list)
509 bch_btree_node_write(b, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700510}
511
512/*
513 * Btree in memory cache - allocation/freeing
514 * mca -> memory cache
515 */
516
Kent Overstreetcafe5632013-03-23 16:11:31 -0700517#define mca_reserve(c) (((c->root && c->root->level) \
518 ? c->root->level : 1) * 8 + 16)
519#define mca_can_free(c) \
Kent Overstreet0a63b662014-03-17 17:15:53 -0700520 max_t(int, 0, c->btree_cache_used - mca_reserve(c))
Kent Overstreetcafe5632013-03-23 16:11:31 -0700521
522static void mca_data_free(struct btree *b)
523{
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800524 BUG_ON(b->io_mutex.count != 1);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700525
Kent Overstreeta85e9682013-12-20 17:28:16 -0800526 bch_btree_keys_free(&b->keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700527
Kent Overstreet0a63b662014-03-17 17:15:53 -0700528 b->c->btree_cache_used--;
Kent Overstreetee811282013-12-17 23:49:49 -0800529 list_move(&b->list, &b->c->btree_cache_freed);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700530}
531
532static void mca_bucket_free(struct btree *b)
533{
534 BUG_ON(btree_node_dirty(b));
535
536 b->key.ptr[0] = 0;
537 hlist_del_init_rcu(&b->hash);
538 list_move(&b->list, &b->c->btree_cache_freeable);
539}
540
Coly Li6f10f7d2018-08-11 13:19:44 +0800541static unsigned int btree_order(struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700542{
543 return ilog2(KEY_SIZE(k) / PAGE_SECTORS ?: 1);
544}
545
546static void mca_data_alloc(struct btree *b, struct bkey *k, gfp_t gfp)
547{
Kent Overstreeta85e9682013-12-20 17:28:16 -0800548 if (!bch_btree_keys_alloc(&b->keys,
Coly Li6f10f7d2018-08-11 13:19:44 +0800549 max_t(unsigned int,
Kent Overstreetee811282013-12-17 23:49:49 -0800550 ilog2(b->c->btree_pages),
551 btree_order(k)),
552 gfp)) {
Kent Overstreet0a63b662014-03-17 17:15:53 -0700553 b->c->btree_cache_used++;
Kent Overstreetee811282013-12-17 23:49:49 -0800554 list_move(&b->list, &b->c->btree_cache);
555 } else {
556 list_move(&b->list, &b->c->btree_cache_freed);
557 }
Kent Overstreetcafe5632013-03-23 16:11:31 -0700558}
559
560static struct btree *mca_bucket_alloc(struct cache_set *c,
561 struct bkey *k, gfp_t gfp)
562{
Coly Libd9026c2019-06-28 19:59:34 +0800563 /*
564 * kzalloc() is necessary here for initialization,
565 * see code comments in bch_btree_keys_init().
566 */
Kent Overstreetcafe5632013-03-23 16:11:31 -0700567 struct btree *b = kzalloc(sizeof(struct btree), gfp);
Coly Li1fae7cf2018-08-11 13:19:45 +0800568
Kent Overstreetcafe5632013-03-23 16:11:31 -0700569 if (!b)
570 return NULL;
571
572 init_rwsem(&b->lock);
573 lockdep_set_novalidate_class(&b->lock);
Kent Overstreet2a285682014-03-04 16:42:42 -0800574 mutex_init(&b->write_lock);
575 lockdep_set_novalidate_class(&b->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700576 INIT_LIST_HEAD(&b->list);
Kent Overstreet57943512013-04-25 13:58:35 -0700577 INIT_DELAYED_WORK(&b->work, btree_node_write_work);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700578 b->c = c;
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800579 sema_init(&b->io_mutex, 1);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700580
581 mca_data_alloc(b, k, gfp);
582 return b;
583}
584
Coly Li6f10f7d2018-08-11 13:19:44 +0800585static int mca_reap(struct btree *b, unsigned int min_order, bool flush)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700586{
Kent Overstreete8e1d462013-07-24 17:27:07 -0700587 struct closure cl;
588
589 closure_init_stack(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700590 lockdep_assert_held(&b->c->bucket_lock);
591
592 if (!down_write_trylock(&b->lock))
593 return -ENOMEM;
594
Kent Overstreeta85e9682013-12-20 17:28:16 -0800595 BUG_ON(btree_node_dirty(b) && !b->keys.set[0].data);
Kent Overstreete8e1d462013-07-24 17:27:07 -0700596
Kent Overstreeta85e9682013-12-20 17:28:16 -0800597 if (b->keys.page_order < min_order)
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800598 goto out_unlock;
599
600 if (!flush) {
601 if (btree_node_dirty(b))
602 goto out_unlock;
603
604 if (down_trylock(&b->io_mutex))
605 goto out_unlock;
606 up(&b->io_mutex);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700607 }
608
Coly Li50a260e2019-06-28 19:59:58 +0800609retry:
Coly Li41508bb2019-06-28 19:59:56 +0800610 /*
611 * BTREE_NODE_dirty might be cleared in btree_flush_btree() by
612 * __bch_btree_node_write(). To avoid an extra flush, acquire
613 * b->write_lock before checking BTREE_NODE_dirty bit.
614 */
Kent Overstreet2a285682014-03-04 16:42:42 -0800615 mutex_lock(&b->write_lock);
Coly Li50a260e2019-06-28 19:59:58 +0800616 /*
617 * If this btree node is selected in btree_flush_write() by journal
618 * code, delay and retry until the node is flushed by journal code
619 * and BTREE_NODE_journal_flush bit cleared by btree_flush_write().
620 */
621 if (btree_node_journal_flush(b)) {
622 pr_debug("bnode %p is flushing by journal, retry", b);
623 mutex_unlock(&b->write_lock);
624 udelay(1);
625 goto retry;
626 }
627
Kent Overstreetf269af52013-07-23 20:48:29 -0700628 if (btree_node_dirty(b))
Kent Overstreet2a285682014-03-04 16:42:42 -0800629 __bch_btree_node_write(b, &cl);
630 mutex_unlock(&b->write_lock);
631
632 closure_sync(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700633
Kent Overstreete8e1d462013-07-24 17:27:07 -0700634 /* wait for any in flight btree write */
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800635 down(&b->io_mutex);
636 up(&b->io_mutex);
Kent Overstreete8e1d462013-07-24 17:27:07 -0700637
Kent Overstreetcafe5632013-03-23 16:11:31 -0700638 return 0;
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800639out_unlock:
640 rw_unlock(true, b);
641 return -ENOMEM;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700642}
643
Dave Chinner7dc19d52013-08-28 10:18:11 +1000644static unsigned long bch_mca_scan(struct shrinker *shrink,
645 struct shrink_control *sc)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700646{
647 struct cache_set *c = container_of(shrink, struct cache_set, shrink);
648 struct btree *b, *t;
649 unsigned long i, nr = sc->nr_to_scan;
Dave Chinner7dc19d52013-08-28 10:18:11 +1000650 unsigned long freed = 0;
Tang Junhuica71df32018-03-18 17:36:22 -0700651 unsigned int btree_cache_used;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700652
653 if (c->shrinker_disabled)
Dave Chinner7dc19d52013-08-28 10:18:11 +1000654 return SHRINK_STOP;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700655
Kent Overstreet0a63b662014-03-17 17:15:53 -0700656 if (c->btree_cache_alloc_lock)
Dave Chinner7dc19d52013-08-28 10:18:11 +1000657 return SHRINK_STOP;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700658
659 /* Return -1 if we can't do anything right now */
Kent Overstreeta698e082013-09-23 23:17:34 -0700660 if (sc->gfp_mask & __GFP_IO)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700661 mutex_lock(&c->bucket_lock);
662 else if (!mutex_trylock(&c->bucket_lock))
663 return -1;
664
Kent Overstreet36c9ea92013-06-03 13:04:56 -0700665 /*
666 * It's _really_ critical that we don't free too many btree nodes - we
667 * have to always leave ourselves a reserve. The reserve is how we
668 * guarantee that allocating memory for a new btree node can always
669 * succeed, so that inserting keys into the btree can always succeed and
670 * IO can always make forward progress:
671 */
Kent Overstreetcafe5632013-03-23 16:11:31 -0700672 nr /= c->btree_pages;
Coly Li9fcc34b2019-11-13 16:03:24 +0800673 if (nr == 0)
674 nr = 1;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700675 nr = min_t(unsigned long, nr, mca_can_free(c));
676
677 i = 0;
Tang Junhuica71df32018-03-18 17:36:22 -0700678 btree_cache_used = c->btree_cache_used;
Coly Lid5c9c472020-01-24 01:01:41 +0800679 list_for_each_entry_safe_reverse(b, t, &c->btree_cache_freeable, list) {
Tang Junhuica71df32018-03-18 17:36:22 -0700680 if (nr <= 0)
681 goto out;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700682
Coly Lid5c9c472020-01-24 01:01:41 +0800683 if (!mca_reap(b, 0, false)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700684 mca_data_free(b);
685 rw_unlock(true, b);
Dave Chinner7dc19d52013-08-28 10:18:11 +1000686 freed++;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700687 }
Tang Junhuica71df32018-03-18 17:36:22 -0700688 nr--;
Coly Lid5c9c472020-01-24 01:01:41 +0800689 i++;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700690 }
691
Coly Lie3de0442020-01-24 01:01:42 +0800692 list_for_each_entry_safe_reverse(b, t, &c->btree_cache, list) {
693 if (nr <= 0 || i >= btree_cache_used)
Kent Overstreetb0f32a52013-12-10 13:24:26 -0800694 goto out;
695
Coly Li125d98e2020-01-24 01:01:40 +0800696 if (!mca_reap(b, 0, false)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700697 mca_bucket_free(b);
698 mca_data_free(b);
699 rw_unlock(true, b);
Dave Chinner7dc19d52013-08-28 10:18:11 +1000700 freed++;
Coly Li125d98e2020-01-24 01:01:40 +0800701 }
Coly Lie3de0442020-01-24 01:01:42 +0800702
703 nr--;
704 i++;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700705 }
706out:
Kent Overstreetcafe5632013-03-23 16:11:31 -0700707 mutex_unlock(&c->bucket_lock);
Tang Junhuif3641c32018-03-18 17:36:21 -0700708 return freed * c->btree_pages;
Dave Chinner7dc19d52013-08-28 10:18:11 +1000709}
710
711static unsigned long bch_mca_count(struct shrinker *shrink,
712 struct shrink_control *sc)
713{
714 struct cache_set *c = container_of(shrink, struct cache_set, shrink);
715
716 if (c->shrinker_disabled)
717 return 0;
718
Kent Overstreet0a63b662014-03-17 17:15:53 -0700719 if (c->btree_cache_alloc_lock)
Dave Chinner7dc19d52013-08-28 10:18:11 +1000720 return 0;
721
722 return mca_can_free(c) * c->btree_pages;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700723}
724
725void bch_btree_cache_free(struct cache_set *c)
726{
727 struct btree *b;
728 struct closure cl;
Coly Li1fae7cf2018-08-11 13:19:45 +0800729
Kent Overstreetcafe5632013-03-23 16:11:31 -0700730 closure_init_stack(&cl);
731
732 if (c->shrink.list.next)
733 unregister_shrinker(&c->shrink);
734
735 mutex_lock(&c->bucket_lock);
736
737#ifdef CONFIG_BCACHE_DEBUG
738 if (c->verify_data)
739 list_move(&c->verify_data->list, &c->btree_cache);
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800740
741 free_pages((unsigned long) c->verify_ondisk, ilog2(bucket_pages(c)));
Kent Overstreetcafe5632013-03-23 16:11:31 -0700742#endif
743
744 list_splice(&c->btree_cache_freeable,
745 &c->btree_cache);
746
747 while (!list_empty(&c->btree_cache)) {
748 b = list_first_entry(&c->btree_cache, struct btree, list);
749
Coly Li41508bb2019-06-28 19:59:56 +0800750 /*
751 * This function is called by cache_set_free(), no I/O
752 * request on cache now, it is unnecessary to acquire
753 * b->write_lock before clearing BTREE_NODE_dirty anymore.
754 */
Coly Lie5ec5f42019-06-28 19:59:55 +0800755 if (btree_node_dirty(b)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700756 btree_complete_write(b, btree_current_write(b));
Coly Lie5ec5f42019-06-28 19:59:55 +0800757 clear_bit(BTREE_NODE_dirty, &b->flags);
758 }
Kent Overstreetcafe5632013-03-23 16:11:31 -0700759 mca_data_free(b);
760 }
761
762 while (!list_empty(&c->btree_cache_freed)) {
763 b = list_first_entry(&c->btree_cache_freed,
764 struct btree, list);
765 list_del(&b->list);
766 cancel_delayed_work_sync(&b->work);
767 kfree(b);
768 }
769
770 mutex_unlock(&c->bucket_lock);
771}
772
773int bch_btree_cache_alloc(struct cache_set *c)
774{
Coly Li6f10f7d2018-08-11 13:19:44 +0800775 unsigned int i;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700776
Kent Overstreetcafe5632013-03-23 16:11:31 -0700777 for (i = 0; i < mca_reserve(c); i++)
Kent Overstreet72a44512013-10-24 17:19:26 -0700778 if (!mca_bucket_alloc(c, &ZERO_KEY, GFP_KERNEL))
779 return -ENOMEM;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700780
781 list_splice_init(&c->btree_cache,
782 &c->btree_cache_freeable);
783
784#ifdef CONFIG_BCACHE_DEBUG
785 mutex_init(&c->verify_lock);
786
Kent Overstreet78b77bf2013-12-17 22:49:08 -0800787 c->verify_ondisk = (void *)
788 __get_free_pages(GFP_KERNEL, ilog2(bucket_pages(c)));
789
Kent Overstreetcafe5632013-03-23 16:11:31 -0700790 c->verify_data = mca_bucket_alloc(c, &ZERO_KEY, GFP_KERNEL);
791
792 if (c->verify_data &&
Kent Overstreeta85e9682013-12-20 17:28:16 -0800793 c->verify_data->keys.set->data)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700794 list_del_init(&c->verify_data->list);
795 else
796 c->verify_data = NULL;
797#endif
798
Dave Chinner7dc19d52013-08-28 10:18:11 +1000799 c->shrink.count_objects = bch_mca_count;
800 c->shrink.scan_objects = bch_mca_scan;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700801 c->shrink.seeks = 4;
802 c->shrink.batch = c->btree_pages * 2;
Michael Lyle6c4ca1e2017-11-24 15:14:27 -0800803
804 if (register_shrinker(&c->shrink))
805 pr_warn("bcache: %s: could not register shrinker",
806 __func__);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700807
808 return 0;
809}
810
811/* Btree in memory cache - hash table */
812
813static struct hlist_head *mca_hash(struct cache_set *c, struct bkey *k)
814{
815 return &c->bucket_hash[hash_32(PTR_HASH(c, k), BUCKET_HASH_BITS)];
816}
817
818static struct btree *mca_find(struct cache_set *c, struct bkey *k)
819{
820 struct btree *b;
821
822 rcu_read_lock();
823 hlist_for_each_entry_rcu(b, mca_hash(c, k), hash)
824 if (PTR_HASH(c, &b->key) == PTR_HASH(c, k))
825 goto out;
826 b = NULL;
827out:
828 rcu_read_unlock();
829 return b;
830}
831
Kent Overstreet0a63b662014-03-17 17:15:53 -0700832static int mca_cannibalize_lock(struct cache_set *c, struct btree_op *op)
833{
Guoju Fang34cf78b2019-11-13 16:03:16 +0800834 spin_lock(&c->btree_cannibalize_lock);
835 if (likely(c->btree_cache_alloc_lock == NULL)) {
836 c->btree_cache_alloc_lock = current;
837 } else if (c->btree_cache_alloc_lock != current) {
Kent Overstreet0a63b662014-03-17 17:15:53 -0700838 if (op)
839 prepare_to_wait(&c->btree_cache_wait, &op->wait,
840 TASK_UNINTERRUPTIBLE);
Guoju Fang34cf78b2019-11-13 16:03:16 +0800841 spin_unlock(&c->btree_cannibalize_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -0700842 return -EINTR;
843 }
Guoju Fang34cf78b2019-11-13 16:03:16 +0800844 spin_unlock(&c->btree_cannibalize_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -0700845
846 return 0;
847}
848
849static struct btree *mca_cannibalize(struct cache_set *c, struct btree_op *op,
850 struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700851{
Kent Overstreete8e1d462013-07-24 17:27:07 -0700852 struct btree *b;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700853
Kent Overstreetc37511b2013-04-26 15:39:55 -0700854 trace_bcache_btree_cache_cannibalize(c);
855
Kent Overstreet0a63b662014-03-17 17:15:53 -0700856 if (mca_cannibalize_lock(c, op))
857 return ERR_PTR(-EINTR);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700858
Kent Overstreete8e1d462013-07-24 17:27:07 -0700859 list_for_each_entry_reverse(b, &c->btree_cache, list)
860 if (!mca_reap(b, btree_order(k), false))
861 return b;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700862
Kent Overstreete8e1d462013-07-24 17:27:07 -0700863 list_for_each_entry_reverse(b, &c->btree_cache, list)
864 if (!mca_reap(b, btree_order(k), true))
865 return b;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700866
Kent Overstreet0a63b662014-03-17 17:15:53 -0700867 WARN(1, "btree cache cannibalize failed\n");
Kent Overstreete8e1d462013-07-24 17:27:07 -0700868 return ERR_PTR(-ENOMEM);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700869}
870
871/*
872 * We can only have one thread cannibalizing other cached btree nodes at a time,
873 * or we'll deadlock. We use an open coded mutex to ensure that, which a
874 * cannibalize_bucket() will take. This means every time we unlock the root of
875 * the btree, we need to release this lock if we have it held.
876 */
Kent Overstreetdf8e8972013-07-24 17:37:59 -0700877static void bch_cannibalize_unlock(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700878{
Guoju Fang34cf78b2019-11-13 16:03:16 +0800879 spin_lock(&c->btree_cannibalize_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -0700880 if (c->btree_cache_alloc_lock == current) {
881 c->btree_cache_alloc_lock = NULL;
882 wake_up(&c->btree_cache_wait);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700883 }
Guoju Fang34cf78b2019-11-13 16:03:16 +0800884 spin_unlock(&c->btree_cannibalize_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700885}
886
Kent Overstreet0a63b662014-03-17 17:15:53 -0700887static struct btree *mca_alloc(struct cache_set *c, struct btree_op *op,
888 struct bkey *k, int level)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700889{
890 struct btree *b;
891
Kent Overstreete8e1d462013-07-24 17:27:07 -0700892 BUG_ON(current->bio_list);
893
Kent Overstreetcafe5632013-03-23 16:11:31 -0700894 lockdep_assert_held(&c->bucket_lock);
895
896 if (mca_find(c, k))
897 return NULL;
898
899 /* btree_free() doesn't free memory; it sticks the node on the end of
900 * the list. Check if there's any freed nodes there:
901 */
902 list_for_each_entry(b, &c->btree_cache_freeable, list)
Kent Overstreete8e1d462013-07-24 17:27:07 -0700903 if (!mca_reap(b, btree_order(k), false))
Kent Overstreetcafe5632013-03-23 16:11:31 -0700904 goto out;
905
906 /* We never free struct btree itself, just the memory that holds the on
907 * disk node. Check the freed list before allocating a new one:
908 */
909 list_for_each_entry(b, &c->btree_cache_freed, list)
Kent Overstreete8e1d462013-07-24 17:27:07 -0700910 if (!mca_reap(b, 0, false)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -0700911 mca_data_alloc(b, k, __GFP_NOWARN|GFP_NOIO);
Kent Overstreeta85e9682013-12-20 17:28:16 -0800912 if (!b->keys.set[0].data)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700913 goto err;
914 else
915 goto out;
916 }
917
918 b = mca_bucket_alloc(c, k, __GFP_NOWARN|GFP_NOIO);
919 if (!b)
920 goto err;
921
922 BUG_ON(!down_write_trylock(&b->lock));
Kent Overstreeta85e9682013-12-20 17:28:16 -0800923 if (!b->keys.set->data)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700924 goto err;
925out:
Kent Overstreetcb7a5832013-12-16 15:27:25 -0800926 BUG_ON(b->io_mutex.count != 1);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700927
928 bkey_copy(&b->key, k);
929 list_move(&b->list, &c->btree_cache);
930 hlist_del_init_rcu(&b->hash);
931 hlist_add_head_rcu(&b->hash, mca_hash(c, k));
932
933 lock_set_subclass(&b->lock.dep_map, level + 1, _THIS_IP_);
Kent Overstreetd6fd3b12013-07-24 17:20:19 -0700934 b->parent = (void *) ~0UL;
Kent Overstreeta85e9682013-12-20 17:28:16 -0800935 b->flags = 0;
936 b->written = 0;
937 b->level = level;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700938
Kent Overstreet65d45232013-12-20 17:22:05 -0800939 if (!b->level)
Kent Overstreeta85e9682013-12-20 17:28:16 -0800940 bch_btree_keys_init(&b->keys, &bch_extent_keys_ops,
941 &b->c->expensive_debug_checks);
Kent Overstreet65d45232013-12-20 17:22:05 -0800942 else
Kent Overstreeta85e9682013-12-20 17:28:16 -0800943 bch_btree_keys_init(&b->keys, &bch_btree_keys_ops,
944 &b->c->expensive_debug_checks);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700945
946 return b;
947err:
948 if (b)
949 rw_unlock(true, b);
950
Kent Overstreet0a63b662014-03-17 17:15:53 -0700951 b = mca_cannibalize(c, op, k);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700952 if (!IS_ERR(b))
953 goto out;
954
955 return b;
956}
957
Bart Van Assche47344e32018-03-18 17:36:29 -0700958/*
Kent Overstreetcafe5632013-03-23 16:11:31 -0700959 * bch_btree_node_get - find a btree node in the cache and lock it, reading it
960 * in from disk if necessary.
961 *
Kent Overstreetb54d6932013-07-24 18:04:18 -0700962 * If IO is necessary and running under generic_make_request, returns -EAGAIN.
Kent Overstreetcafe5632013-03-23 16:11:31 -0700963 *
964 * The btree node will have either a read or a write lock held, depending on
965 * level and op->lock.
966 */
Kent Overstreet0a63b662014-03-17 17:15:53 -0700967struct btree *bch_btree_node_get(struct cache_set *c, struct btree_op *op,
Slava Pestov2452cc82014-07-12 00:22:53 -0700968 struct bkey *k, int level, bool write,
969 struct btree *parent)
Kent Overstreetcafe5632013-03-23 16:11:31 -0700970{
971 int i = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -0700972 struct btree *b;
973
974 BUG_ON(level < 0);
975retry:
976 b = mca_find(c, k);
977
978 if (!b) {
Kent Overstreet57943512013-04-25 13:58:35 -0700979 if (current->bio_list)
980 return ERR_PTR(-EAGAIN);
981
Kent Overstreetcafe5632013-03-23 16:11:31 -0700982 mutex_lock(&c->bucket_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -0700983 b = mca_alloc(c, op, k, level);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700984 mutex_unlock(&c->bucket_lock);
985
986 if (!b)
987 goto retry;
988 if (IS_ERR(b))
989 return b;
990
Kent Overstreet57943512013-04-25 13:58:35 -0700991 bch_btree_node_read(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -0700992
993 if (!write)
994 downgrade_write(&b->lock);
995 } else {
996 rw_lock(write, b, level);
997 if (PTR_HASH(c, &b->key) != PTR_HASH(c, k)) {
998 rw_unlock(write, b);
999 goto retry;
1000 }
1001 BUG_ON(b->level != level);
1002 }
1003
Coly Lic2e8dcf2018-08-09 15:48:44 +08001004 if (btree_node_io_error(b)) {
1005 rw_unlock(write, b);
1006 return ERR_PTR(-EIO);
1007 }
1008
1009 BUG_ON(!b->written);
1010
Slava Pestov2452cc82014-07-12 00:22:53 -07001011 b->parent = parent;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001012
Kent Overstreeta85e9682013-12-20 17:28:16 -08001013 for (; i <= b->keys.nsets && b->keys.set[i].size; i++) {
1014 prefetch(b->keys.set[i].tree);
1015 prefetch(b->keys.set[i].data);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001016 }
1017
Kent Overstreeta85e9682013-12-20 17:28:16 -08001018 for (; i <= b->keys.nsets; i++)
1019 prefetch(b->keys.set[i].data);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001020
Kent Overstreetcafe5632013-03-23 16:11:31 -07001021 return b;
1022}
1023
Slava Pestov2452cc82014-07-12 00:22:53 -07001024static void btree_node_prefetch(struct btree *parent, struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001025{
1026 struct btree *b;
1027
Slava Pestov2452cc82014-07-12 00:22:53 -07001028 mutex_lock(&parent->c->bucket_lock);
1029 b = mca_alloc(parent->c, NULL, k, parent->level - 1);
1030 mutex_unlock(&parent->c->bucket_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001031
1032 if (!IS_ERR_OR_NULL(b)) {
Slava Pestov2452cc82014-07-12 00:22:53 -07001033 b->parent = parent;
Kent Overstreet57943512013-04-25 13:58:35 -07001034 bch_btree_node_read(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001035 rw_unlock(true, b);
1036 }
1037}
1038
1039/* Btree alloc */
1040
Kent Overstreete8e1d462013-07-24 17:27:07 -07001041static void btree_node_free(struct btree *b)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001042{
Kent Overstreetc37511b2013-04-26 15:39:55 -07001043 trace_bcache_btree_node_free(b);
1044
Kent Overstreetcafe5632013-03-23 16:11:31 -07001045 BUG_ON(b == b->c->root);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001046
Coly Li50a260e2019-06-28 19:59:58 +08001047retry:
Kent Overstreet2a285682014-03-04 16:42:42 -08001048 mutex_lock(&b->write_lock);
Coly Li50a260e2019-06-28 19:59:58 +08001049 /*
1050 * If the btree node is selected and flushing in btree_flush_write(),
1051 * delay and retry until the BTREE_NODE_journal_flush bit cleared,
1052 * then it is safe to free the btree node here. Otherwise this btree
1053 * node will be in race condition.
1054 */
1055 if (btree_node_journal_flush(b)) {
1056 mutex_unlock(&b->write_lock);
1057 pr_debug("bnode %p journal_flush set, retry", b);
1058 udelay(1);
1059 goto retry;
1060 }
Kent Overstreet2a285682014-03-04 16:42:42 -08001061
Coly Lie5ec5f42019-06-28 19:59:55 +08001062 if (btree_node_dirty(b)) {
Kent Overstreetcafe5632013-03-23 16:11:31 -07001063 btree_complete_write(b, btree_current_write(b));
Coly Lie5ec5f42019-06-28 19:59:55 +08001064 clear_bit(BTREE_NODE_dirty, &b->flags);
1065 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001066
Kent Overstreet2a285682014-03-04 16:42:42 -08001067 mutex_unlock(&b->write_lock);
1068
Kent Overstreetcafe5632013-03-23 16:11:31 -07001069 cancel_delayed_work(&b->work);
1070
1071 mutex_lock(&b->c->bucket_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001072 bch_bucket_free(b->c, &b->key);
1073 mca_bucket_free(b);
1074 mutex_unlock(&b->c->bucket_lock);
1075}
1076
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001077struct btree *__bch_btree_node_alloc(struct cache_set *c, struct btree_op *op,
Slava Pestov2452cc82014-07-12 00:22:53 -07001078 int level, bool wait,
1079 struct btree *parent)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001080{
1081 BKEY_PADDED(key) k;
1082 struct btree *b = ERR_PTR(-EAGAIN);
1083
1084 mutex_lock(&c->bucket_lock);
1085retry:
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001086 if (__bch_bucket_alloc_set(c, RESERVE_BTREE, &k.key, 1, wait))
Kent Overstreetcafe5632013-03-23 16:11:31 -07001087 goto err;
1088
Kent Overstreet3a3b6a42013-07-24 16:46:42 -07001089 bkey_put(c, &k.key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001090 SET_KEY_SIZE(&k.key, c->btree_pages * PAGE_SECTORS);
1091
Kent Overstreet0a63b662014-03-17 17:15:53 -07001092 b = mca_alloc(c, op, &k.key, level);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001093 if (IS_ERR(b))
1094 goto err_free;
1095
1096 if (!b) {
Kent Overstreetb1a67b02013-03-25 11:46:44 -07001097 cache_bug(c,
1098 "Tried to allocate bucket that was in btree cache");
Kent Overstreetcafe5632013-03-23 16:11:31 -07001099 goto retry;
1100 }
1101
Slava Pestov2452cc82014-07-12 00:22:53 -07001102 b->parent = parent;
Kent Overstreeta85e9682013-12-20 17:28:16 -08001103 bch_bset_init_next(&b->keys, b->keys.set->data, bset_magic(&b->c->sb));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001104
1105 mutex_unlock(&c->bucket_lock);
Kent Overstreetc37511b2013-04-26 15:39:55 -07001106
1107 trace_bcache_btree_node_alloc(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001108 return b;
1109err_free:
1110 bch_bucket_free(c, &k.key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001111err:
1112 mutex_unlock(&c->bucket_lock);
Kent Overstreetc37511b2013-04-26 15:39:55 -07001113
Slava Pestov913dc332014-05-23 11:18:35 -07001114 trace_bcache_btree_node_alloc_fail(c);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001115 return b;
1116}
1117
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001118static struct btree *bch_btree_node_alloc(struct cache_set *c,
Slava Pestov2452cc82014-07-12 00:22:53 -07001119 struct btree_op *op, int level,
1120 struct btree *parent)
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001121{
Slava Pestov2452cc82014-07-12 00:22:53 -07001122 return __bch_btree_node_alloc(c, op, level, op != NULL, parent);
Slava Pestovc5aa4a32014-04-21 18:23:12 -07001123}
1124
Kent Overstreet0a63b662014-03-17 17:15:53 -07001125static struct btree *btree_node_alloc_replacement(struct btree *b,
1126 struct btree_op *op)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001127{
Slava Pestov2452cc82014-07-12 00:22:53 -07001128 struct btree *n = bch_btree_node_alloc(b->c, op, b->level, b->parent);
Coly Li1fae7cf2018-08-11 13:19:45 +08001129
Kent Overstreet67539e82013-09-10 22:53:34 -07001130 if (!IS_ERR_OR_NULL(n)) {
Kent Overstreet2a285682014-03-04 16:42:42 -08001131 mutex_lock(&n->write_lock);
Kent Overstreet89ebb4a2013-11-11 18:38:51 -08001132 bch_btree_sort_into(&b->keys, &n->keys, &b->c->sort);
Kent Overstreet67539e82013-09-10 22:53:34 -07001133 bkey_copy_key(&n->key, &b->key);
Kent Overstreet2a285682014-03-04 16:42:42 -08001134 mutex_unlock(&n->write_lock);
Kent Overstreet67539e82013-09-10 22:53:34 -07001135 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001136
1137 return n;
1138}
1139
Kent Overstreet8835c122013-07-24 23:18:05 -07001140static void make_btree_freeing_key(struct btree *b, struct bkey *k)
1141{
Coly Li6f10f7d2018-08-11 13:19:44 +08001142 unsigned int i;
Kent Overstreet8835c122013-07-24 23:18:05 -07001143
Kent Overstreet05335cf2014-03-17 18:22:34 -07001144 mutex_lock(&b->c->bucket_lock);
1145
1146 atomic_inc(&b->c->prio_blocked);
1147
Kent Overstreet8835c122013-07-24 23:18:05 -07001148 bkey_copy(k, &b->key);
1149 bkey_copy_key(k, &ZERO_KEY);
1150
Kent Overstreet05335cf2014-03-17 18:22:34 -07001151 for (i = 0; i < KEY_PTRS(k); i++)
1152 SET_PTR_GEN(k, i,
1153 bch_inc_gen(PTR_CACHE(b->c, &b->key, i),
1154 PTR_BUCKET(b->c, &b->key, i)));
Kent Overstreet8835c122013-07-24 23:18:05 -07001155
Kent Overstreet05335cf2014-03-17 18:22:34 -07001156 mutex_unlock(&b->c->bucket_lock);
Kent Overstreet8835c122013-07-24 23:18:05 -07001157}
1158
Kent Overstreet78365412013-12-17 01:29:34 -08001159static int btree_check_reserve(struct btree *b, struct btree_op *op)
1160{
1161 struct cache_set *c = b->c;
1162 struct cache *ca;
Coly Li6f10f7d2018-08-11 13:19:44 +08001163 unsigned int i, reserve = (c->root->level - b->level) * 2 + 1;
Kent Overstreet78365412013-12-17 01:29:34 -08001164
1165 mutex_lock(&c->bucket_lock);
1166
1167 for_each_cache(ca, c, i)
1168 if (fifo_used(&ca->free[RESERVE_BTREE]) < reserve) {
1169 if (op)
Kent Overstreet0a63b662014-03-17 17:15:53 -07001170 prepare_to_wait(&c->btree_cache_wait, &op->wait,
Kent Overstreet78365412013-12-17 01:29:34 -08001171 TASK_UNINTERRUPTIBLE);
Kent Overstreet0a63b662014-03-17 17:15:53 -07001172 mutex_unlock(&c->bucket_lock);
1173 return -EINTR;
Kent Overstreet78365412013-12-17 01:29:34 -08001174 }
1175
1176 mutex_unlock(&c->bucket_lock);
Kent Overstreet0a63b662014-03-17 17:15:53 -07001177
1178 return mca_cannibalize_lock(b->c, op);
Kent Overstreet78365412013-12-17 01:29:34 -08001179}
1180
Kent Overstreetcafe5632013-03-23 16:11:31 -07001181/* Garbage collection */
1182
Kent Overstreet487dded2014-03-17 15:13:26 -07001183static uint8_t __bch_btree_mark_key(struct cache_set *c, int level,
1184 struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001185{
1186 uint8_t stale = 0;
Coly Li6f10f7d2018-08-11 13:19:44 +08001187 unsigned int i;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001188 struct bucket *g;
1189
1190 /*
1191 * ptr_invalid() can't return true for the keys that mark btree nodes as
1192 * freed, but since ptr_bad() returns true we'll never actually use them
1193 * for anything and thus we don't want mark their pointers here
1194 */
1195 if (!bkey_cmp(k, &ZERO_KEY))
1196 return stale;
1197
1198 for (i = 0; i < KEY_PTRS(k); i++) {
1199 if (!ptr_available(c, k, i))
1200 continue;
1201
1202 g = PTR_BUCKET(c, k, i);
1203
Kent Overstreet3a2fd9d2014-02-27 17:51:12 -08001204 if (gen_after(g->last_gc, PTR_GEN(k, i)))
1205 g->last_gc = PTR_GEN(k, i);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001206
1207 if (ptr_stale(c, k, i)) {
1208 stale = max(stale, ptr_stale(c, k, i));
1209 continue;
1210 }
1211
1212 cache_bug_on(GC_MARK(g) &&
1213 (GC_MARK(g) == GC_MARK_METADATA) != (level != 0),
1214 c, "inconsistent ptrs: mark = %llu, level = %i",
1215 GC_MARK(g), level);
1216
1217 if (level)
1218 SET_GC_MARK(g, GC_MARK_METADATA);
1219 else if (KEY_DIRTY(k))
1220 SET_GC_MARK(g, GC_MARK_DIRTY);
Kent Overstreet4fe6a812014-03-13 13:46:29 -07001221 else if (!GC_MARK(g))
1222 SET_GC_MARK(g, GC_MARK_RECLAIMABLE);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001223
1224 /* guard against overflow */
Coly Li6f10f7d2018-08-11 13:19:44 +08001225 SET_GC_SECTORS_USED(g, min_t(unsigned int,
Kent Overstreetcafe5632013-03-23 16:11:31 -07001226 GC_SECTORS_USED(g) + KEY_SIZE(k),
Darrick J. Wong94717442014-01-28 16:57:39 -08001227 MAX_GC_SECTORS_USED));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001228
1229 BUG_ON(!GC_SECTORS_USED(g));
1230 }
1231
1232 return stale;
1233}
1234
1235#define btree_mark_key(b, k) __bch_btree_mark_key(b->c, b->level, k)
1236
Kent Overstreet487dded2014-03-17 15:13:26 -07001237void bch_initial_mark_key(struct cache_set *c, int level, struct bkey *k)
1238{
Coly Li6f10f7d2018-08-11 13:19:44 +08001239 unsigned int i;
Kent Overstreet487dded2014-03-17 15:13:26 -07001240
1241 for (i = 0; i < KEY_PTRS(k); i++)
1242 if (ptr_available(c, k, i) &&
1243 !ptr_stale(c, k, i)) {
1244 struct bucket *b = PTR_BUCKET(c, k, i);
1245
1246 b->gen = PTR_GEN(k, i);
1247
1248 if (level && bkey_cmp(k, &ZERO_KEY))
1249 b->prio = BTREE_PRIO;
1250 else if (!level && b->prio == BTREE_PRIO)
1251 b->prio = INITIAL_PRIO;
1252 }
1253
1254 __bch_btree_mark_key(c, level, k);
1255}
1256
Tang Junhuid44c2f92017-10-30 14:46:33 -07001257void bch_update_bucket_in_use(struct cache_set *c, struct gc_stat *stats)
1258{
1259 stats->in_use = (c->nbuckets - c->avail_nbuckets) * 100 / c->nbuckets;
1260}
1261
Kent Overstreeta1f03582013-09-10 19:07:00 -07001262static bool btree_gc_mark_node(struct btree *b, struct gc_stat *gc)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001263{
1264 uint8_t stale = 0;
Coly Li6f10f7d2018-08-11 13:19:44 +08001265 unsigned int keys = 0, good_keys = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001266 struct bkey *k;
1267 struct btree_iter iter;
1268 struct bset_tree *t;
1269
1270 gc->nodes++;
1271
Kent Overstreetc052dd92013-11-11 17:35:24 -08001272 for_each_key_filter(&b->keys, k, &iter, bch_ptr_invalid) {
Kent Overstreetcafe5632013-03-23 16:11:31 -07001273 stale = max(stale, btree_mark_key(b, k));
Kent Overstreeta1f03582013-09-10 19:07:00 -07001274 keys++;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001275
Kent Overstreeta85e9682013-12-20 17:28:16 -08001276 if (bch_ptr_bad(&b->keys, k))
Kent Overstreetcafe5632013-03-23 16:11:31 -07001277 continue;
1278
Kent Overstreetcafe5632013-03-23 16:11:31 -07001279 gc->key_bytes += bkey_u64s(k);
1280 gc->nkeys++;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001281 good_keys++;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001282
1283 gc->data += KEY_SIZE(k);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001284 }
1285
Kent Overstreeta85e9682013-12-20 17:28:16 -08001286 for (t = b->keys.set; t <= &b->keys.set[b->keys.nsets]; t++)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001287 btree_bug_on(t->size &&
Kent Overstreeta85e9682013-12-20 17:28:16 -08001288 bset_written(&b->keys, t) &&
Kent Overstreetcafe5632013-03-23 16:11:31 -07001289 bkey_cmp(&b->key, &t->end) < 0,
1290 b, "found short btree key in gc");
1291
Kent Overstreeta1f03582013-09-10 19:07:00 -07001292 if (b->c->gc_always_rewrite)
1293 return true;
1294
1295 if (stale > 10)
1296 return true;
1297
1298 if ((keys - good_keys) * 2 > keys)
1299 return true;
1300
1301 return false;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001302}
1303
Kent Overstreeta1f03582013-09-10 19:07:00 -07001304#define GC_MERGE_NODES 4U
Kent Overstreetcafe5632013-03-23 16:11:31 -07001305
1306struct gc_merge_info {
1307 struct btree *b;
Coly Li6f10f7d2018-08-11 13:19:44 +08001308 unsigned int keys;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001309};
1310
Coly Lifc2d5982018-08-11 13:19:46 +08001311static int bch_btree_insert_node(struct btree *b, struct btree_op *op,
1312 struct keylist *insert_keys,
1313 atomic_t *journal_ref,
1314 struct bkey *replace_key);
Kent Overstreetb54d6932013-07-24 18:04:18 -07001315
Kent Overstreeta1f03582013-09-10 19:07:00 -07001316static int btree_gc_coalesce(struct btree *b, struct btree_op *op,
Kent Overstreet0a63b662014-03-17 17:15:53 -07001317 struct gc_stat *gc, struct gc_merge_info *r)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001318{
Coly Li6f10f7d2018-08-11 13:19:44 +08001319 unsigned int i, nodes = 0, keys = 0, blocks;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001320 struct btree *new_nodes[GC_MERGE_NODES];
Kent Overstreet0a63b662014-03-17 17:15:53 -07001321 struct keylist keylist;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001322 struct closure cl;
1323 struct bkey *k;
1324
Kent Overstreet0a63b662014-03-17 17:15:53 -07001325 bch_keylist_init(&keylist);
1326
1327 if (btree_check_reserve(b, NULL))
1328 return 0;
1329
Kent Overstreeta1f03582013-09-10 19:07:00 -07001330 memset(new_nodes, 0, sizeof(new_nodes));
Kent Overstreetb54d6932013-07-24 18:04:18 -07001331 closure_init_stack(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001332
Kent Overstreeta1f03582013-09-10 19:07:00 -07001333 while (nodes < GC_MERGE_NODES && !IS_ERR_OR_NULL(r[nodes].b))
Kent Overstreetcafe5632013-03-23 16:11:31 -07001334 keys += r[nodes++].keys;
1335
1336 blocks = btree_default_blocks(b->c) * 2 / 3;
1337
1338 if (nodes < 2 ||
Kent Overstreeta85e9682013-12-20 17:28:16 -08001339 __set_blocks(b->keys.set[0].data, keys,
Kent Overstreetee811282013-12-17 23:49:49 -08001340 block_bytes(b->c)) > blocks * (nodes - 1))
Kent Overstreeta1f03582013-09-10 19:07:00 -07001341 return 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001342
Kent Overstreeta1f03582013-09-10 19:07:00 -07001343 for (i = 0; i < nodes; i++) {
Kent Overstreet0a63b662014-03-17 17:15:53 -07001344 new_nodes[i] = btree_node_alloc_replacement(r[i].b, NULL);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001345 if (IS_ERR_OR_NULL(new_nodes[i]))
1346 goto out_nocoalesce;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001347 }
1348
Kent Overstreet0a63b662014-03-17 17:15:53 -07001349 /*
1350 * We have to check the reserve here, after we've allocated our new
1351 * nodes, to make sure the insert below will succeed - we also check
1352 * before as an optimization to potentially avoid a bunch of expensive
1353 * allocs/sorts
1354 */
1355 if (btree_check_reserve(b, NULL))
1356 goto out_nocoalesce;
1357
Kent Overstreet2a285682014-03-04 16:42:42 -08001358 for (i = 0; i < nodes; i++)
1359 mutex_lock(&new_nodes[i]->write_lock);
1360
Kent Overstreetcafe5632013-03-23 16:11:31 -07001361 for (i = nodes - 1; i > 0; --i) {
Kent Overstreetee811282013-12-17 23:49:49 -08001362 struct bset *n1 = btree_bset_first(new_nodes[i]);
1363 struct bset *n2 = btree_bset_first(new_nodes[i - 1]);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001364 struct bkey *k, *last = NULL;
1365
1366 keys = 0;
1367
Kent Overstreeta1f03582013-09-10 19:07:00 -07001368 if (i > 1) {
Kent Overstreetcafe5632013-03-23 16:11:31 -07001369 for (k = n2->start;
Kent Overstreetfafff812013-12-17 21:56:21 -08001370 k < bset_bkey_last(n2);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001371 k = bkey_next(k)) {
1372 if (__set_blocks(n1, n1->keys + keys +
Kent Overstreetee811282013-12-17 23:49:49 -08001373 bkey_u64s(k),
1374 block_bytes(b->c)) > blocks)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001375 break;
1376
1377 last = k;
1378 keys += bkey_u64s(k);
1379 }
Kent Overstreeta1f03582013-09-10 19:07:00 -07001380 } else {
1381 /*
1382 * Last node we're not getting rid of - we're getting
1383 * rid of the node at r[0]. Have to try and fit all of
1384 * the remaining keys into this node; we can't ensure
1385 * they will always fit due to rounding and variable
1386 * length keys (shouldn't be possible in practice,
1387 * though)
1388 */
1389 if (__set_blocks(n1, n1->keys + n2->keys,
Kent Overstreetee811282013-12-17 23:49:49 -08001390 block_bytes(b->c)) >
1391 btree_blocks(new_nodes[i]))
Kent Overstreeta1f03582013-09-10 19:07:00 -07001392 goto out_nocoalesce;
1393
1394 keys = n2->keys;
1395 /* Take the key of the node we're getting rid of */
1396 last = &r->b->key;
1397 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001398
Kent Overstreetee811282013-12-17 23:49:49 -08001399 BUG_ON(__set_blocks(n1, n1->keys + keys, block_bytes(b->c)) >
1400 btree_blocks(new_nodes[i]));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001401
Kent Overstreeta1f03582013-09-10 19:07:00 -07001402 if (last)
1403 bkey_copy_key(&new_nodes[i]->key, last);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001404
Kent Overstreetfafff812013-12-17 21:56:21 -08001405 memcpy(bset_bkey_last(n1),
Kent Overstreetcafe5632013-03-23 16:11:31 -07001406 n2->start,
Kent Overstreetfafff812013-12-17 21:56:21 -08001407 (void *) bset_bkey_idx(n2, keys) - (void *) n2->start);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001408
1409 n1->keys += keys;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001410 r[i].keys = n1->keys;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001411
1412 memmove(n2->start,
Kent Overstreetfafff812013-12-17 21:56:21 -08001413 bset_bkey_idx(n2, keys),
1414 (void *) bset_bkey_last(n2) -
1415 (void *) bset_bkey_idx(n2, keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001416
1417 n2->keys -= keys;
1418
Kent Overstreet0a63b662014-03-17 17:15:53 -07001419 if (__bch_keylist_realloc(&keylist,
Kent Overstreet085d2a32013-11-11 18:20:51 -08001420 bkey_u64s(&new_nodes[i]->key)))
Kent Overstreeta1f03582013-09-10 19:07:00 -07001421 goto out_nocoalesce;
1422
1423 bch_btree_node_write(new_nodes[i], &cl);
Kent Overstreet0a63b662014-03-17 17:15:53 -07001424 bch_keylist_add(&keylist, &new_nodes[i]->key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001425 }
1426
Kent Overstreet2a285682014-03-04 16:42:42 -08001427 for (i = 0; i < nodes; i++)
1428 mutex_unlock(&new_nodes[i]->write_lock);
1429
Kent Overstreet05335cf2014-03-17 18:22:34 -07001430 closure_sync(&cl);
1431
1432 /* We emptied out this node */
1433 BUG_ON(btree_bset_first(new_nodes[0])->keys);
1434 btree_node_free(new_nodes[0]);
1435 rw_unlock(true, new_nodes[0]);
Slava Pestov400ffaa2014-07-12 21:53:11 -07001436 new_nodes[0] = NULL;
Kent Overstreet05335cf2014-03-17 18:22:34 -07001437
Kent Overstreeta1f03582013-09-10 19:07:00 -07001438 for (i = 0; i < nodes; i++) {
Kent Overstreet0a63b662014-03-17 17:15:53 -07001439 if (__bch_keylist_realloc(&keylist, bkey_u64s(&r[i].b->key)))
Kent Overstreeta1f03582013-09-10 19:07:00 -07001440 goto out_nocoalesce;
1441
Kent Overstreet0a63b662014-03-17 17:15:53 -07001442 make_btree_freeing_key(r[i].b, keylist.top);
1443 bch_keylist_push(&keylist);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001444 }
1445
Kent Overstreet0a63b662014-03-17 17:15:53 -07001446 bch_btree_insert_node(b, op, &keylist, NULL, NULL);
1447 BUG_ON(!bch_keylist_empty(&keylist));
Kent Overstreeta1f03582013-09-10 19:07:00 -07001448
1449 for (i = 0; i < nodes; i++) {
1450 btree_node_free(r[i].b);
1451 rw_unlock(true, r[i].b);
1452
1453 r[i].b = new_nodes[i];
1454 }
1455
Kent Overstreeta1f03582013-09-10 19:07:00 -07001456 memmove(r, r + 1, sizeof(r[0]) * (nodes - 1));
1457 r[nodes - 1].b = ERR_PTR(-EINTR);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001458
Kent Overstreetc37511b2013-04-26 15:39:55 -07001459 trace_bcache_btree_gc_coalesce(nodes);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001460 gc->nodes--;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001461
Kent Overstreet0a63b662014-03-17 17:15:53 -07001462 bch_keylist_free(&keylist);
1463
Kent Overstreeta1f03582013-09-10 19:07:00 -07001464 /* Invalidated our iterator */
1465 return -EINTR;
1466
1467out_nocoalesce:
1468 closure_sync(&cl);
1469
Kent Overstreet0a63b662014-03-17 17:15:53 -07001470 while ((k = bch_keylist_pop(&keylist)))
Kent Overstreeta1f03582013-09-10 19:07:00 -07001471 if (!bkey_cmp(k, &ZERO_KEY))
1472 atomic_dec(&b->c->prio_blocked);
Shenghui Wangf16277c2019-04-25 00:48:42 +08001473 bch_keylist_free(&keylist);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001474
1475 for (i = 0; i < nodes; i++)
1476 if (!IS_ERR_OR_NULL(new_nodes[i])) {
1477 btree_node_free(new_nodes[i]);
1478 rw_unlock(true, new_nodes[i]);
1479 }
1480 return 0;
1481}
1482
Kent Overstreet0a63b662014-03-17 17:15:53 -07001483static int btree_gc_rewrite_node(struct btree *b, struct btree_op *op,
1484 struct btree *replace)
1485{
1486 struct keylist keys;
1487 struct btree *n;
1488
1489 if (btree_check_reserve(b, NULL))
1490 return 0;
1491
1492 n = btree_node_alloc_replacement(replace, NULL);
1493
1494 /* recheck reserve after allocating replacement node */
1495 if (btree_check_reserve(b, NULL)) {
1496 btree_node_free(n);
1497 rw_unlock(true, n);
1498 return 0;
1499 }
1500
1501 bch_btree_node_write_sync(n);
1502
1503 bch_keylist_init(&keys);
1504 bch_keylist_add(&keys, &n->key);
1505
1506 make_btree_freeing_key(replace, keys.top);
1507 bch_keylist_push(&keys);
1508
1509 bch_btree_insert_node(b, op, &keys, NULL, NULL);
1510 BUG_ON(!bch_keylist_empty(&keys));
1511
1512 btree_node_free(replace);
1513 rw_unlock(true, n);
1514
1515 /* Invalidated our iterator */
1516 return -EINTR;
1517}
1518
Coly Li6f10f7d2018-08-11 13:19:44 +08001519static unsigned int btree_gc_count_keys(struct btree *b)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001520{
1521 struct bkey *k;
1522 struct btree_iter iter;
Coly Li6f10f7d2018-08-11 13:19:44 +08001523 unsigned int ret = 0;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001524
Kent Overstreetc052dd92013-11-11 17:35:24 -08001525 for_each_key_filter(&b->keys, k, &iter, bch_ptr_bad)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001526 ret += bkey_u64s(k);
1527
1528 return ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001529}
1530
Tang Junhui7f4a59d2018-07-26 12:17:35 +08001531static size_t btree_gc_min_nodes(struct cache_set *c)
1532{
1533 size_t min_nodes;
1534
1535 /*
1536 * Since incremental GC would stop 100ms when front
1537 * side I/O comes, so when there are many btree nodes,
1538 * if GC only processes constant (100) nodes each time,
1539 * GC would last a long time, and the front side I/Os
1540 * would run out of the buckets (since no new bucket
1541 * can be allocated during GC), and be blocked again.
1542 * So GC should not process constant nodes, but varied
1543 * nodes according to the number of btree nodes, which
1544 * realized by dividing GC into constant(100) times,
1545 * so when there are many btree nodes, GC can process
1546 * more nodes each time, otherwise, GC will process less
1547 * nodes each time (but no less than MIN_GC_NODES)
1548 */
1549 min_nodes = c->gc_stats.nodes / MAX_GC_TIMES;
1550 if (min_nodes < MIN_GC_NODES)
1551 min_nodes = MIN_GC_NODES;
1552
1553 return min_nodes;
1554}
1555
1556
Kent Overstreetcafe5632013-03-23 16:11:31 -07001557static int btree_gc_recurse(struct btree *b, struct btree_op *op,
1558 struct closure *writes, struct gc_stat *gc)
1559{
Kent Overstreeta1f03582013-09-10 19:07:00 -07001560 int ret = 0;
1561 bool should_rewrite;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001562 struct bkey *k;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001563 struct btree_iter iter;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001564 struct gc_merge_info r[GC_MERGE_NODES];
Kent Overstreet2a285682014-03-04 16:42:42 -08001565 struct gc_merge_info *i, *last = r + ARRAY_SIZE(r) - 1;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001566
Kent Overstreetc052dd92013-11-11 17:35:24 -08001567 bch_btree_iter_init(&b->keys, &iter, &b->c->gc_done);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001568
Kent Overstreet2a285682014-03-04 16:42:42 -08001569 for (i = r; i < r + ARRAY_SIZE(r); i++)
1570 i->b = ERR_PTR(-EINTR);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001571
Kent Overstreeta1f03582013-09-10 19:07:00 -07001572 while (1) {
Kent Overstreeta85e9682013-12-20 17:28:16 -08001573 k = bch_btree_iter_next_filter(&iter, &b->keys, bch_ptr_bad);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001574 if (k) {
Kent Overstreet0a63b662014-03-17 17:15:53 -07001575 r->b = bch_btree_node_get(b->c, op, k, b->level - 1,
Slava Pestov2452cc82014-07-12 00:22:53 -07001576 true, b);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001577 if (IS_ERR(r->b)) {
1578 ret = PTR_ERR(r->b);
1579 break;
1580 }
1581
1582 r->keys = btree_gc_count_keys(r->b);
1583
Kent Overstreet0a63b662014-03-17 17:15:53 -07001584 ret = btree_gc_coalesce(b, op, gc, r);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001585 if (ret)
1586 break;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001587 }
1588
Kent Overstreeta1f03582013-09-10 19:07:00 -07001589 if (!last->b)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001590 break;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001591
1592 if (!IS_ERR(last->b)) {
1593 should_rewrite = btree_gc_mark_node(last->b, gc);
Kent Overstreet0a63b662014-03-17 17:15:53 -07001594 if (should_rewrite) {
1595 ret = btree_gc_rewrite_node(b, op, last->b);
1596 if (ret)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001597 break;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001598 }
1599
1600 if (last->b->level) {
1601 ret = btree_gc_recurse(last->b, op, writes, gc);
1602 if (ret)
1603 break;
1604 }
1605
1606 bkey_copy_key(&b->c->gc_done, &last->b->key);
1607
1608 /*
1609 * Must flush leaf nodes before gc ends, since replace
1610 * operations aren't journalled
1611 */
Kent Overstreet2a285682014-03-04 16:42:42 -08001612 mutex_lock(&last->b->write_lock);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001613 if (btree_node_dirty(last->b))
1614 bch_btree_node_write(last->b, writes);
Kent Overstreet2a285682014-03-04 16:42:42 -08001615 mutex_unlock(&last->b->write_lock);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001616 rw_unlock(true, last->b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001617 }
1618
Kent Overstreeta1f03582013-09-10 19:07:00 -07001619 memmove(r + 1, r, sizeof(r[0]) * (GC_MERGE_NODES - 1));
1620 r->b = NULL;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001621
Tang Junhui5c25c4f2018-07-26 12:17:34 +08001622 if (atomic_read(&b->c->search_inflight) &&
Tang Junhui7f4a59d2018-07-26 12:17:35 +08001623 gc->nodes >= gc->nodes_pre + btree_gc_min_nodes(b->c)) {
Tang Junhui5c25c4f2018-07-26 12:17:34 +08001624 gc->nodes_pre = gc->nodes;
1625 ret = -EAGAIN;
1626 break;
1627 }
1628
Kent Overstreetcafe5632013-03-23 16:11:31 -07001629 if (need_resched()) {
1630 ret = -EAGAIN;
1631 break;
1632 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001633 }
1634
Kent Overstreet2a285682014-03-04 16:42:42 -08001635 for (i = r; i < r + ARRAY_SIZE(r); i++)
1636 if (!IS_ERR_OR_NULL(i->b)) {
1637 mutex_lock(&i->b->write_lock);
1638 if (btree_node_dirty(i->b))
1639 bch_btree_node_write(i->b, writes);
1640 mutex_unlock(&i->b->write_lock);
1641 rw_unlock(true, i->b);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001642 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001643
Kent Overstreetcafe5632013-03-23 16:11:31 -07001644 return ret;
1645}
1646
1647static int bch_btree_gc_root(struct btree *b, struct btree_op *op,
1648 struct closure *writes, struct gc_stat *gc)
1649{
1650 struct btree *n = NULL;
Kent Overstreeta1f03582013-09-10 19:07:00 -07001651 int ret = 0;
1652 bool should_rewrite;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001653
Kent Overstreeta1f03582013-09-10 19:07:00 -07001654 should_rewrite = btree_gc_mark_node(b, gc);
1655 if (should_rewrite) {
Kent Overstreet0a63b662014-03-17 17:15:53 -07001656 n = btree_node_alloc_replacement(b, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001657
Kent Overstreeta1f03582013-09-10 19:07:00 -07001658 if (!IS_ERR_OR_NULL(n)) {
1659 bch_btree_node_write_sync(n);
Kent Overstreet2a285682014-03-04 16:42:42 -08001660
Kent Overstreeta1f03582013-09-10 19:07:00 -07001661 bch_btree_set_root(n);
1662 btree_node_free(b);
1663 rw_unlock(true, n);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001664
Kent Overstreeta1f03582013-09-10 19:07:00 -07001665 return -EINTR;
1666 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001667 }
1668
Kent Overstreet487dded2014-03-17 15:13:26 -07001669 __bch_btree_mark_key(b->c, b->level + 1, &b->key);
1670
Kent Overstreeta1f03582013-09-10 19:07:00 -07001671 if (b->level) {
1672 ret = btree_gc_recurse(b, op, writes, gc);
1673 if (ret)
1674 return ret;
1675 }
1676
1677 bkey_copy_key(&b->c->gc_done, &b->key);
1678
Kent Overstreetcafe5632013-03-23 16:11:31 -07001679 return ret;
1680}
1681
1682static void btree_gc_start(struct cache_set *c)
1683{
1684 struct cache *ca;
1685 struct bucket *b;
Coly Li6f10f7d2018-08-11 13:19:44 +08001686 unsigned int i;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001687
1688 if (!c->gc_mark_valid)
1689 return;
1690
1691 mutex_lock(&c->bucket_lock);
1692
1693 c->gc_mark_valid = 0;
1694 c->gc_done = ZERO_KEY;
1695
1696 for_each_cache(ca, c, i)
1697 for_each_bucket(b, ca) {
Kent Overstreet3a2fd9d2014-02-27 17:51:12 -08001698 b->last_gc = b->gen;
Kent Overstreet29ebf462013-07-11 19:43:21 -07001699 if (!atomic_read(&b->pin)) {
Kent Overstreet4fe6a812014-03-13 13:46:29 -07001700 SET_GC_MARK(b, 0);
Kent Overstreet29ebf462013-07-11 19:43:21 -07001701 SET_GC_SECTORS_USED(b, 0);
1702 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07001703 }
1704
Kent Overstreetcafe5632013-03-23 16:11:31 -07001705 mutex_unlock(&c->bucket_lock);
1706}
1707
Tang Junhuid44c2f92017-10-30 14:46:33 -07001708static void bch_btree_gc_finish(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001709{
Kent Overstreetcafe5632013-03-23 16:11:31 -07001710 struct bucket *b;
1711 struct cache *ca;
Coly Li6f10f7d2018-08-11 13:19:44 +08001712 unsigned int i;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001713
1714 mutex_lock(&c->bucket_lock);
1715
1716 set_gc_sectors(c);
1717 c->gc_mark_valid = 1;
1718 c->need_gc = 0;
1719
Kent Overstreetcafe5632013-03-23 16:11:31 -07001720 for (i = 0; i < KEY_PTRS(&c->uuid_bucket); i++)
1721 SET_GC_MARK(PTR_BUCKET(c, &c->uuid_bucket, i),
1722 GC_MARK_METADATA);
1723
Nicholas Swensonbf0a6282013-11-26 19:14:23 -08001724 /* don't reclaim buckets to which writeback keys point */
1725 rcu_read_lock();
Coly Li28312312018-01-08 12:21:28 -08001726 for (i = 0; i < c->devices_max_used; i++) {
Nicholas Swensonbf0a6282013-11-26 19:14:23 -08001727 struct bcache_device *d = c->devices[i];
1728 struct cached_dev *dc;
1729 struct keybuf_key *w, *n;
Coly Li6f10f7d2018-08-11 13:19:44 +08001730 unsigned int j;
Nicholas Swensonbf0a6282013-11-26 19:14:23 -08001731
1732 if (!d || UUID_FLASH_ONLY(&c->uuids[i]))
1733 continue;
1734 dc = container_of(d, struct cached_dev, disk);
1735
1736 spin_lock(&dc->writeback_keys.lock);
1737 rbtree_postorder_for_each_entry_safe(w, n,
1738 &dc->writeback_keys.keys, node)
1739 for (j = 0; j < KEY_PTRS(&w->key); j++)
1740 SET_GC_MARK(PTR_BUCKET(c, &w->key, j),
1741 GC_MARK_DIRTY);
1742 spin_unlock(&dc->writeback_keys.lock);
1743 }
1744 rcu_read_unlock();
1745
Tang Junhuid44c2f92017-10-30 14:46:33 -07001746 c->avail_nbuckets = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001747 for_each_cache(ca, c, i) {
1748 uint64_t *i;
1749
1750 ca->invalidate_needs_gc = 0;
1751
1752 for (i = ca->sb.d; i < ca->sb.d + ca->sb.keys; i++)
1753 SET_GC_MARK(ca->buckets + *i, GC_MARK_METADATA);
1754
1755 for (i = ca->prio_buckets;
1756 i < ca->prio_buckets + prio_buckets(ca) * 2; i++)
1757 SET_GC_MARK(ca->buckets + *i, GC_MARK_METADATA);
1758
1759 for_each_bucket(b, ca) {
Kent Overstreetcafe5632013-03-23 16:11:31 -07001760 c->need_gc = max(c->need_gc, bucket_gc_gen(b));
1761
Kent Overstreet4fe6a812014-03-13 13:46:29 -07001762 if (atomic_read(&b->pin))
1763 continue;
1764
1765 BUG_ON(!GC_MARK(b) && GC_SECTORS_USED(b));
1766
1767 if (!GC_MARK(b) || GC_MARK(b) == GC_MARK_RECLAIMABLE)
Tang Junhuid44c2f92017-10-30 14:46:33 -07001768 c->avail_nbuckets++;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001769 }
1770 }
1771
Kent Overstreetcafe5632013-03-23 16:11:31 -07001772 mutex_unlock(&c->bucket_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001773}
1774
Kent Overstreet72a44512013-10-24 17:19:26 -07001775static void bch_btree_gc(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001776{
Kent Overstreetcafe5632013-03-23 16:11:31 -07001777 int ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001778 struct gc_stat stats;
1779 struct closure writes;
1780 struct btree_op op;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001781 uint64_t start_time = local_clock();
Kent Overstreet57943512013-04-25 13:58:35 -07001782
Kent Overstreetc37511b2013-04-26 15:39:55 -07001783 trace_bcache_gc_start(c);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001784
1785 memset(&stats, 0, sizeof(struct gc_stat));
1786 closure_init_stack(&writes);
Kent Overstreetb54d6932013-07-24 18:04:18 -07001787 bch_btree_op_init(&op, SHRT_MAX);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001788
1789 btree_gc_start(c);
1790
Coly Li771f3932018-03-18 17:36:17 -07001791 /* if CACHE_SET_IO_DISABLE set, gc thread should stop too */
Kent Overstreeta1f03582013-09-10 19:07:00 -07001792 do {
Coly Lifeac1a72020-03-22 14:03:00 +08001793 ret = bcache_btree_root(gc_root, c, &op, &writes, &stats);
Kent Overstreeta1f03582013-09-10 19:07:00 -07001794 closure_sync(&writes);
Kent Overstreetc5f1e5a2015-11-29 17:18:33 -08001795 cond_resched();
Kent Overstreet57943512013-04-25 13:58:35 -07001796
Tang Junhui5c25c4f2018-07-26 12:17:34 +08001797 if (ret == -EAGAIN)
1798 schedule_timeout_interruptible(msecs_to_jiffies
1799 (GC_SLEEP_MS));
1800 else if (ret)
Kent Overstreeta1f03582013-09-10 19:07:00 -07001801 pr_warn("gc failed!");
Coly Li771f3932018-03-18 17:36:17 -07001802 } while (ret && !test_bit(CACHE_SET_IO_DISABLE, &c->flags));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001803
Tang Junhuid44c2f92017-10-30 14:46:33 -07001804 bch_btree_gc_finish(c);
Kent Overstreet57943512013-04-25 13:58:35 -07001805 wake_up_allocators(c);
1806
Kent Overstreet169ef1c2013-03-28 12:50:55 -06001807 bch_time_stats_update(&c->btree_gc_time, start_time);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001808
1809 stats.key_bytes *= sizeof(uint64_t);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001810 stats.data <<= 9;
Tang Junhuid44c2f92017-10-30 14:46:33 -07001811 bch_update_bucket_in_use(c, &stats);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001812 memcpy(&c->gc_stats, &stats, sizeof(struct gc_stat));
Kent Overstreetcafe5632013-03-23 16:11:31 -07001813
Kent Overstreetc37511b2013-04-26 15:39:55 -07001814 trace_bcache_gc_end(c);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001815
Kent Overstreet72a44512013-10-24 17:19:26 -07001816 bch_moving_gc(c);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001817}
1818
Kent Overstreetbe628be2016-10-26 20:31:17 -07001819static bool gc_should_run(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001820{
Kent Overstreeta1f03582013-09-10 19:07:00 -07001821 struct cache *ca;
Coly Li6f10f7d2018-08-11 13:19:44 +08001822 unsigned int i;
Kent Overstreet72a44512013-10-24 17:19:26 -07001823
Kent Overstreetbe628be2016-10-26 20:31:17 -07001824 for_each_cache(ca, c, i)
1825 if (ca->invalidate_needs_gc)
1826 return true;
Kent Overstreet72a44512013-10-24 17:19:26 -07001827
Kent Overstreetbe628be2016-10-26 20:31:17 -07001828 if (atomic_read(&c->sectors_to_gc) < 0)
1829 return true;
1830
1831 return false;
1832}
1833
1834static int bch_gc_thread(void *arg)
1835{
1836 struct cache_set *c = arg;
1837
1838 while (1) {
1839 wait_event_interruptible(c->gc_wait,
Coly Li771f3932018-03-18 17:36:17 -07001840 kthread_should_stop() ||
1841 test_bit(CACHE_SET_IO_DISABLE, &c->flags) ||
1842 gc_should_run(c));
Kent Overstreetbe628be2016-10-26 20:31:17 -07001843
Coly Li771f3932018-03-18 17:36:17 -07001844 if (kthread_should_stop() ||
1845 test_bit(CACHE_SET_IO_DISABLE, &c->flags))
Kent Overstreet72a44512013-10-24 17:19:26 -07001846 break;
1847
Kent Overstreetbe628be2016-10-26 20:31:17 -07001848 set_gc_sectors(c);
1849 bch_btree_gc(c);
Kent Overstreet72a44512013-10-24 17:19:26 -07001850 }
1851
Coly Li771f3932018-03-18 17:36:17 -07001852 wait_for_kthread_stop();
Kent Overstreet72a44512013-10-24 17:19:26 -07001853 return 0;
1854}
1855
1856int bch_gc_thread_start(struct cache_set *c)
1857{
Kent Overstreetbe628be2016-10-26 20:31:17 -07001858 c->gc_thread = kthread_run(bch_gc_thread, c, "bcache_gc");
Vasyl Gomonovych9d134112018-01-08 12:21:20 -08001859 return PTR_ERR_OR_ZERO(c->gc_thread);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001860}
1861
1862/* Initial partial gc */
1863
Kent Overstreet487dded2014-03-17 15:13:26 -07001864static int bch_btree_check_recurse(struct btree *b, struct btree_op *op)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001865{
Kent Overstreet50310162013-09-10 17:18:59 -07001866 int ret = 0;
Kent Overstreet50310162013-09-10 17:18:59 -07001867 struct bkey *k, *p = NULL;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001868 struct btree_iter iter;
1869
Kent Overstreet487dded2014-03-17 15:13:26 -07001870 for_each_key_filter(&b->keys, k, &iter, bch_ptr_invalid)
1871 bch_initial_mark_key(b->c, b->level, k);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001872
Kent Overstreet487dded2014-03-17 15:13:26 -07001873 bch_initial_mark_key(b->c, b->level + 1, &b->key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001874
1875 if (b->level) {
Kent Overstreetc052dd92013-11-11 17:35:24 -08001876 bch_btree_iter_init(&b->keys, &iter, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001877
Kent Overstreet50310162013-09-10 17:18:59 -07001878 do {
Kent Overstreeta85e9682013-12-20 17:28:16 -08001879 k = bch_btree_iter_next_filter(&iter, &b->keys,
1880 bch_ptr_bad);
Tang Junhui7f4a59d2018-07-26 12:17:35 +08001881 if (k) {
Slava Pestov2452cc82014-07-12 00:22:53 -07001882 btree_node_prefetch(b, k);
Tang Junhui7f4a59d2018-07-26 12:17:35 +08001883 /*
1884 * initiallize c->gc_stats.nodes
1885 * for incremental GC
1886 */
1887 b->c->gc_stats.nodes++;
1888 }
Kent Overstreet50310162013-09-10 17:18:59 -07001889
Kent Overstreetcafe5632013-03-23 16:11:31 -07001890 if (p)
Coly Lifeac1a72020-03-22 14:03:00 +08001891 ret = bcache_btree(check_recurse, p, b, op);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001892
Kent Overstreet50310162013-09-10 17:18:59 -07001893 p = k;
1894 } while (p && !ret);
Kent Overstreetcafe5632013-03-23 16:11:31 -07001895 }
1896
Kent Overstreet487dded2014-03-17 15:13:26 -07001897 return ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07001898}
1899
Coly Li8e710222020-03-22 14:03:01 +08001900
1901static int bch_btree_check_thread(void *arg)
1902{
1903 int ret;
1904 struct btree_check_info *info = arg;
1905 struct btree_check_state *check_state = info->state;
1906 struct cache_set *c = check_state->c;
1907 struct btree_iter iter;
1908 struct bkey *k, *p;
1909 int cur_idx, prev_idx, skip_nr;
1910 int i, n;
1911
1912 k = p = NULL;
1913 i = n = 0;
1914 cur_idx = prev_idx = 0;
1915 ret = 0;
1916
1917 /* root node keys are checked before thread created */
1918 bch_btree_iter_init(&c->root->keys, &iter, NULL);
1919 k = bch_btree_iter_next_filter(&iter, &c->root->keys, bch_ptr_bad);
1920 BUG_ON(!k);
1921
1922 p = k;
1923 while (k) {
1924 /*
1925 * Fetch a root node key index, skip the keys which
1926 * should be fetched by other threads, then check the
1927 * sub-tree indexed by the fetched key.
1928 */
1929 spin_lock(&check_state->idx_lock);
1930 cur_idx = check_state->key_idx;
1931 check_state->key_idx++;
1932 spin_unlock(&check_state->idx_lock);
1933
1934 skip_nr = cur_idx - prev_idx;
1935
1936 while (skip_nr) {
1937 k = bch_btree_iter_next_filter(&iter,
1938 &c->root->keys,
1939 bch_ptr_bad);
1940 if (k)
1941 p = k;
1942 else {
1943 /*
1944 * No more keys to check in root node,
1945 * current checking threads are enough,
1946 * stop creating more.
1947 */
1948 atomic_set(&check_state->enough, 1);
1949 /* Update check_state->enough earlier */
1950 smp_mb();
1951 goto out;
1952 }
1953 skip_nr--;
1954 cond_resched();
1955 }
1956
1957 if (p) {
1958 struct btree_op op;
1959
1960 btree_node_prefetch(c->root, p);
1961 c->gc_stats.nodes++;
1962 bch_btree_op_init(&op, 0);
1963 ret = bcache_btree(check_recurse, p, c->root, &op);
1964 if (ret)
1965 goto out;
1966 }
1967 p = NULL;
1968 prev_idx = cur_idx;
1969 cond_resched();
1970 }
1971
1972out:
1973 info->result = ret;
1974 /* update check_state->started among all CPUs */
1975 smp_mb();
1976 if (atomic_dec_and_test(&check_state->started))
1977 wake_up(&check_state->wait);
1978
1979 return ret;
1980}
1981
1982
1983
1984static int bch_btree_chkthread_nr(void)
1985{
1986 int n = num_online_cpus()/2;
1987
1988 if (n == 0)
1989 n = 1;
1990 else if (n > BCH_BTR_CHKTHREAD_MAX)
1991 n = BCH_BTR_CHKTHREAD_MAX;
1992
1993 return n;
1994}
1995
Kent Overstreetc18536a2013-07-24 17:44:17 -07001996int bch_btree_check(struct cache_set *c)
Kent Overstreetcafe5632013-03-23 16:11:31 -07001997{
Coly Li8e710222020-03-22 14:03:01 +08001998 int ret = 0;
1999 int i;
2000 struct bkey *k = NULL;
2001 struct btree_iter iter;
2002 struct btree_check_state *check_state;
2003 char name[32];
Kent Overstreetcafe5632013-03-23 16:11:31 -07002004
Coly Li8e710222020-03-22 14:03:01 +08002005 /* check and mark root node keys */
2006 for_each_key_filter(&c->root->keys, k, &iter, bch_ptr_invalid)
2007 bch_initial_mark_key(c, c->root->level, k);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002008
Coly Li8e710222020-03-22 14:03:01 +08002009 bch_initial_mark_key(c, c->root->level + 1, &c->root->key);
2010
2011 if (c->root->level == 0)
2012 return 0;
2013
2014 check_state = kzalloc(sizeof(struct btree_check_state), GFP_KERNEL);
2015 if (!check_state)
2016 return -ENOMEM;
2017
2018 check_state->c = c;
2019 check_state->total_threads = bch_btree_chkthread_nr();
2020 check_state->key_idx = 0;
2021 spin_lock_init(&check_state->idx_lock);
2022 atomic_set(&check_state->started, 0);
2023 atomic_set(&check_state->enough, 0);
2024 init_waitqueue_head(&check_state->wait);
2025
2026 /*
2027 * Run multiple threads to check btree nodes in parallel,
2028 * if check_state->enough is non-zero, it means current
2029 * running check threads are enough, unncessary to create
2030 * more.
2031 */
2032 for (i = 0; i < check_state->total_threads; i++) {
2033 /* fetch latest check_state->enough earlier */
2034 smp_mb();
2035 if (atomic_read(&check_state->enough))
2036 break;
2037
2038 check_state->infos[i].result = 0;
2039 check_state->infos[i].state = check_state;
2040 snprintf(name, sizeof(name), "bch_btrchk[%u]", i);
2041 atomic_inc(&check_state->started);
2042
2043 check_state->infos[i].thread =
2044 kthread_run(bch_btree_check_thread,
2045 &check_state->infos[i],
2046 name);
2047 if (IS_ERR(check_state->infos[i].thread)) {
2048 pr_err("fails to run thread bch_btrchk[%d]", i);
2049 for (--i; i >= 0; i--)
2050 kthread_stop(check_state->infos[i].thread);
2051 ret = -ENOMEM;
2052 goto out;
2053 }
2054 }
2055
2056 wait_event_interruptible(check_state->wait,
2057 atomic_read(&check_state->started) == 0 ||
2058 test_bit(CACHE_SET_IO_DISABLE, &c->flags));
2059
2060 for (i = 0; i < check_state->total_threads; i++) {
2061 if (check_state->infos[i].result) {
2062 ret = check_state->infos[i].result;
2063 goto out;
2064 }
2065 }
2066
2067out:
2068 kfree(check_state);
2069 return ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002070}
2071
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002072void bch_initial_gc_finish(struct cache_set *c)
2073{
2074 struct cache *ca;
2075 struct bucket *b;
Coly Li6f10f7d2018-08-11 13:19:44 +08002076 unsigned int i;
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002077
2078 bch_btree_gc_finish(c);
2079
2080 mutex_lock(&c->bucket_lock);
2081
2082 /*
2083 * We need to put some unused buckets directly on the prio freelist in
2084 * order to get the allocator thread started - it needs freed buckets in
2085 * order to rewrite the prios and gens, and it needs to rewrite prios
2086 * and gens in order to free buckets.
2087 *
2088 * This is only safe for buckets that have no live data in them, which
2089 * there should always be some of.
2090 */
2091 for_each_cache(ca, c, i) {
2092 for_each_bucket(b, ca) {
Tang Junhui682811b2018-02-07 11:41:43 -08002093 if (fifo_full(&ca->free[RESERVE_PRIO]) &&
2094 fifo_full(&ca->free[RESERVE_BTREE]))
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002095 break;
2096
2097 if (bch_can_invalidate_bucket(ca, b) &&
2098 !GC_MARK(b)) {
2099 __bch_invalidate_one_bucket(ca, b);
Tang Junhui682811b2018-02-07 11:41:43 -08002100 if (!fifo_push(&ca->free[RESERVE_PRIO],
2101 b - ca->buckets))
2102 fifo_push(&ca->free[RESERVE_BTREE],
2103 b - ca->buckets);
Kent Overstreet2531d9ee2014-03-17 16:55:55 -07002104 }
2105 }
2106 }
2107
2108 mutex_unlock(&c->bucket_lock);
2109}
2110
Kent Overstreetcafe5632013-03-23 16:11:31 -07002111/* Btree insertion */
2112
Kent Overstreet829a60b2013-11-11 17:02:31 -08002113static bool btree_insert_key(struct btree *b, struct bkey *k,
2114 struct bkey *replace_key)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002115{
Coly Li6f10f7d2018-08-11 13:19:44 +08002116 unsigned int status;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002117
2118 BUG_ON(bkey_cmp(k, &b->key) > 0);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002119
Kent Overstreet829a60b2013-11-11 17:02:31 -08002120 status = bch_btree_insert_key(&b->keys, k, replace_key);
2121 if (status != BTREE_INSERT_STATUS_NO_INSERT) {
2122 bch_check_keys(&b->keys, "%u for %s", status,
2123 replace_key ? "replace" : "insert");
Kent Overstreetcafe5632013-03-23 16:11:31 -07002124
Kent Overstreet829a60b2013-11-11 17:02:31 -08002125 trace_bcache_btree_insert_key(b, k, replace_key != NULL,
2126 status);
2127 return true;
2128 } else
2129 return false;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002130}
2131
Kent Overstreet59158fd2013-11-11 19:03:54 -08002132static size_t insert_u64s_remaining(struct btree *b)
2133{
Kent Overstreet35723242014-01-10 18:53:02 -08002134 long ret = bch_btree_keys_u64s_remaining(&b->keys);
Kent Overstreet59158fd2013-11-11 19:03:54 -08002135
2136 /*
2137 * Might land in the middle of an existing extent and have to split it
2138 */
2139 if (b->keys.ops->is_extents)
2140 ret -= KEY_MAX_U64S;
2141
2142 return max(ret, 0L);
2143}
2144
Kent Overstreet26c949f2013-09-10 18:41:15 -07002145static bool bch_btree_insert_keys(struct btree *b, struct btree_op *op,
Kent Overstreet1b207d82013-09-10 18:52:54 -07002146 struct keylist *insert_keys,
2147 struct bkey *replace_key)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002148{
2149 bool ret = false;
Kent Overstreetdc9d98d2013-12-17 23:47:33 -08002150 int oldsize = bch_count_data(&b->keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002151
Kent Overstreet26c949f2013-09-10 18:41:15 -07002152 while (!bch_keylist_empty(insert_keys)) {
Kent Overstreetc2f95ae2013-07-24 17:24:25 -07002153 struct bkey *k = insert_keys->keys;
Kent Overstreet26c949f2013-09-10 18:41:15 -07002154
Kent Overstreet59158fd2013-11-11 19:03:54 -08002155 if (bkey_u64s(k) > insert_u64s_remaining(b))
Kent Overstreet403b6cd2013-07-24 17:22:44 -07002156 break;
2157
2158 if (bkey_cmp(k, &b->key) <= 0) {
Kent Overstreet3a3b6a42013-07-24 16:46:42 -07002159 if (!b->level)
2160 bkey_put(b->c, k);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002161
Kent Overstreet829a60b2013-11-11 17:02:31 -08002162 ret |= btree_insert_key(b, k, replace_key);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002163 bch_keylist_pop_front(insert_keys);
2164 } else if (bkey_cmp(&START_KEY(k), &b->key) < 0) {
Kent Overstreet26c949f2013-09-10 18:41:15 -07002165 BKEY_PADDED(key) temp;
Kent Overstreetc2f95ae2013-07-24 17:24:25 -07002166 bkey_copy(&temp.key, insert_keys->keys);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002167
2168 bch_cut_back(&b->key, &temp.key);
Kent Overstreetc2f95ae2013-07-24 17:24:25 -07002169 bch_cut_front(&b->key, insert_keys->keys);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002170
Kent Overstreet829a60b2013-11-11 17:02:31 -08002171 ret |= btree_insert_key(b, &temp.key, replace_key);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002172 break;
2173 } else {
2174 break;
2175 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07002176 }
2177
Kent Overstreet829a60b2013-11-11 17:02:31 -08002178 if (!ret)
2179 op->insert_collision = true;
2180
Kent Overstreet403b6cd2013-07-24 17:22:44 -07002181 BUG_ON(!bch_keylist_empty(insert_keys) && b->level);
2182
Kent Overstreetdc9d98d2013-12-17 23:47:33 -08002183 BUG_ON(bch_count_data(&b->keys) < oldsize);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002184 return ret;
2185}
2186
Kent Overstreet26c949f2013-09-10 18:41:15 -07002187static int btree_split(struct btree *b, struct btree_op *op,
2188 struct keylist *insert_keys,
Kent Overstreet1b207d82013-09-10 18:52:54 -07002189 struct bkey *replace_key)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002190{
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002191 bool split;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002192 struct btree *n1, *n2 = NULL, *n3 = NULL;
2193 uint64_t start_time = local_clock();
Kent Overstreetb54d6932013-07-24 18:04:18 -07002194 struct closure cl;
Kent Overstreet17e21a92013-07-26 12:32:38 -07002195 struct keylist parent_keys;
Kent Overstreetb54d6932013-07-24 18:04:18 -07002196
2197 closure_init_stack(&cl);
Kent Overstreet17e21a92013-07-26 12:32:38 -07002198 bch_keylist_init(&parent_keys);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002199
Kent Overstreet0a63b662014-03-17 17:15:53 -07002200 if (btree_check_reserve(b, op)) {
2201 if (!b->level)
2202 return -EINTR;
2203 else
2204 WARN(1, "insufficient reserve for split\n");
2205 }
Kent Overstreet78365412013-12-17 01:29:34 -08002206
Kent Overstreet0a63b662014-03-17 17:15:53 -07002207 n1 = btree_node_alloc_replacement(b, op);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002208 if (IS_ERR(n1))
2209 goto err;
2210
Kent Overstreetee811282013-12-17 23:49:49 -08002211 split = set_blocks(btree_bset_first(n1),
2212 block_bytes(n1->c)) > (btree_blocks(b) * 4) / 5;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002213
Kent Overstreetcafe5632013-03-23 16:11:31 -07002214 if (split) {
Coly Li6f10f7d2018-08-11 13:19:44 +08002215 unsigned int keys = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002216
Kent Overstreetee811282013-12-17 23:49:49 -08002217 trace_bcache_btree_node_split(b, btree_bset_first(n1)->keys);
Kent Overstreetc37511b2013-04-26 15:39:55 -07002218
Slava Pestov2452cc82014-07-12 00:22:53 -07002219 n2 = bch_btree_node_alloc(b->c, op, b->level, b->parent);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002220 if (IS_ERR(n2))
2221 goto err_free1;
2222
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002223 if (!b->parent) {
Slava Pestov2452cc82014-07-12 00:22:53 -07002224 n3 = bch_btree_node_alloc(b->c, op, b->level + 1, NULL);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002225 if (IS_ERR(n3))
2226 goto err_free2;
2227 }
2228
Kent Overstreet2a285682014-03-04 16:42:42 -08002229 mutex_lock(&n1->write_lock);
2230 mutex_lock(&n2->write_lock);
2231
Kent Overstreet1b207d82013-09-10 18:52:54 -07002232 bch_btree_insert_keys(n1, op, insert_keys, replace_key);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002233
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002234 /*
2235 * Has to be a linear search because we don't have an auxiliary
Kent Overstreetcafe5632013-03-23 16:11:31 -07002236 * search tree yet
2237 */
2238
Kent Overstreetee811282013-12-17 23:49:49 -08002239 while (keys < (btree_bset_first(n1)->keys * 3) / 5)
2240 keys += bkey_u64s(bset_bkey_idx(btree_bset_first(n1),
Kent Overstreetfafff812013-12-17 21:56:21 -08002241 keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002242
Kent Overstreetfafff812013-12-17 21:56:21 -08002243 bkey_copy_key(&n1->key,
Kent Overstreetee811282013-12-17 23:49:49 -08002244 bset_bkey_idx(btree_bset_first(n1), keys));
2245 keys += bkey_u64s(bset_bkey_idx(btree_bset_first(n1), keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002246
Kent Overstreetee811282013-12-17 23:49:49 -08002247 btree_bset_first(n2)->keys = btree_bset_first(n1)->keys - keys;
2248 btree_bset_first(n1)->keys = keys;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002249
Kent Overstreetee811282013-12-17 23:49:49 -08002250 memcpy(btree_bset_first(n2)->start,
2251 bset_bkey_last(btree_bset_first(n1)),
2252 btree_bset_first(n2)->keys * sizeof(uint64_t));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002253
2254 bkey_copy_key(&n2->key, &b->key);
2255
Kent Overstreet17e21a92013-07-26 12:32:38 -07002256 bch_keylist_add(&parent_keys, &n2->key);
Kent Overstreetb54d6932013-07-24 18:04:18 -07002257 bch_btree_node_write(n2, &cl);
Kent Overstreet2a285682014-03-04 16:42:42 -08002258 mutex_unlock(&n2->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002259 rw_unlock(true, n2);
Kent Overstreetc37511b2013-04-26 15:39:55 -07002260 } else {
Kent Overstreetee811282013-12-17 23:49:49 -08002261 trace_bcache_btree_node_compact(b, btree_bset_first(n1)->keys);
Kent Overstreetc37511b2013-04-26 15:39:55 -07002262
Kent Overstreet2a285682014-03-04 16:42:42 -08002263 mutex_lock(&n1->write_lock);
Kent Overstreet1b207d82013-09-10 18:52:54 -07002264 bch_btree_insert_keys(n1, op, insert_keys, replace_key);
Kent Overstreetc37511b2013-04-26 15:39:55 -07002265 }
Kent Overstreetcafe5632013-03-23 16:11:31 -07002266
Kent Overstreet17e21a92013-07-26 12:32:38 -07002267 bch_keylist_add(&parent_keys, &n1->key);
Kent Overstreetb54d6932013-07-24 18:04:18 -07002268 bch_btree_node_write(n1, &cl);
Kent Overstreet2a285682014-03-04 16:42:42 -08002269 mutex_unlock(&n1->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002270
2271 if (n3) {
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002272 /* Depth increases, make a new root */
Kent Overstreet2a285682014-03-04 16:42:42 -08002273 mutex_lock(&n3->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002274 bkey_copy_key(&n3->key, &MAX_KEY);
Kent Overstreet17e21a92013-07-26 12:32:38 -07002275 bch_btree_insert_keys(n3, op, &parent_keys, NULL);
Kent Overstreetb54d6932013-07-24 18:04:18 -07002276 bch_btree_node_write(n3, &cl);
Kent Overstreet2a285682014-03-04 16:42:42 -08002277 mutex_unlock(&n3->write_lock);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002278
Kent Overstreetb54d6932013-07-24 18:04:18 -07002279 closure_sync(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002280 bch_btree_set_root(n3);
2281 rw_unlock(true, n3);
Kent Overstreetd6fd3b12013-07-24 17:20:19 -07002282 } else if (!b->parent) {
2283 /* Root filled up but didn't need to be split */
Kent Overstreetb54d6932013-07-24 18:04:18 -07002284 closure_sync(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002285 bch_btree_set_root(n1);
2286 } else {
Kent Overstreet17e21a92013-07-26 12:32:38 -07002287 /* Split a non root node */
Kent Overstreetb54d6932013-07-24 18:04:18 -07002288 closure_sync(&cl);
Kent Overstreet17e21a92013-07-26 12:32:38 -07002289 make_btree_freeing_key(b, parent_keys.top);
2290 bch_keylist_push(&parent_keys);
2291
Kent Overstreet17e21a92013-07-26 12:32:38 -07002292 bch_btree_insert_node(b->parent, op, &parent_keys, NULL, NULL);
2293 BUG_ON(!bch_keylist_empty(&parent_keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002294 }
2295
Kent Overstreet05335cf2014-03-17 18:22:34 -07002296 btree_node_free(b);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002297 rw_unlock(true, n1);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002298
Kent Overstreet169ef1c2013-03-28 12:50:55 -06002299 bch_time_stats_update(&b->c->btree_split_time, start_time);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002300
2301 return 0;
2302err_free2:
Kent Overstreet5f5837d2013-12-16 16:38:49 -08002303 bkey_put(b->c, &n2->key);
Kent Overstreete8e1d462013-07-24 17:27:07 -07002304 btree_node_free(n2);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002305 rw_unlock(true, n2);
2306err_free1:
Kent Overstreet5f5837d2013-12-16 16:38:49 -08002307 bkey_put(b->c, &n1->key);
Kent Overstreete8e1d462013-07-24 17:27:07 -07002308 btree_node_free(n1);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002309 rw_unlock(true, n1);
2310err:
Kent Overstreet0a63b662014-03-17 17:15:53 -07002311 WARN(1, "bcache: btree split failed (level %u)", b->level);
Kent Overstreet5f5837d2013-12-16 16:38:49 -08002312
Kent Overstreetcafe5632013-03-23 16:11:31 -07002313 if (n3 == ERR_PTR(-EAGAIN) ||
2314 n2 == ERR_PTR(-EAGAIN) ||
2315 n1 == ERR_PTR(-EAGAIN))
2316 return -EAGAIN;
2317
Kent Overstreetcafe5632013-03-23 16:11:31 -07002318 return -ENOMEM;
2319}
2320
Kent Overstreet26c949f2013-09-10 18:41:15 -07002321static int bch_btree_insert_node(struct btree *b, struct btree_op *op,
Kent Overstreetc18536a2013-07-24 17:44:17 -07002322 struct keylist *insert_keys,
Kent Overstreet1b207d82013-09-10 18:52:54 -07002323 atomic_t *journal_ref,
2324 struct bkey *replace_key)
Kent Overstreet26c949f2013-09-10 18:41:15 -07002325{
Kent Overstreet2a285682014-03-04 16:42:42 -08002326 struct closure cl;
2327
Kent Overstreet17e21a92013-07-26 12:32:38 -07002328 BUG_ON(b->level && replace_key);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002329
Kent Overstreet2a285682014-03-04 16:42:42 -08002330 closure_init_stack(&cl);
2331
2332 mutex_lock(&b->write_lock);
2333
2334 if (write_block(b) != btree_bset_last(b) &&
2335 b->keys.last_set_unwritten)
2336 bch_btree_init_next(b); /* just wrote a set */
2337
Kent Overstreet59158fd2013-11-11 19:03:54 -08002338 if (bch_keylist_nkeys(insert_keys) > insert_u64s_remaining(b)) {
Kent Overstreet2a285682014-03-04 16:42:42 -08002339 mutex_unlock(&b->write_lock);
2340 goto split;
2341 }
Kent Overstreet3b3e9e52013-12-07 03:57:58 -08002342
Kent Overstreet2a285682014-03-04 16:42:42 -08002343 BUG_ON(write_block(b) != btree_bset_last(b));
2344
2345 if (bch_btree_insert_keys(b, op, insert_keys, replace_key)) {
2346 if (!b->level)
2347 bch_btree_leaf_dirty(b, journal_ref);
2348 else
2349 bch_btree_node_write(b, &cl);
2350 }
2351
2352 mutex_unlock(&b->write_lock);
2353
2354 /* wait for btree node write if necessary, after unlock */
2355 closure_sync(&cl);
2356
2357 return 0;
2358split:
2359 if (current->bio_list) {
2360 op->lock = b->c->root->level + 1;
2361 return -EAGAIN;
2362 } else if (op->lock <= b->c->root->level) {
2363 op->lock = b->c->root->level + 1;
2364 return -EINTR;
Kent Overstreet17e21a92013-07-26 12:32:38 -07002365 } else {
Kent Overstreet2a285682014-03-04 16:42:42 -08002366 /* Invalidated all iterators */
2367 int ret = btree_split(b, op, insert_keys, replace_key);
Kent Overstreet26c949f2013-09-10 18:41:15 -07002368
Kent Overstreet2a285682014-03-04 16:42:42 -08002369 if (bch_keylist_empty(insert_keys))
2370 return 0;
2371 else if (!ret)
2372 return -EINTR;
2373 return ret;
Kent Overstreet17e21a92013-07-26 12:32:38 -07002374 }
Kent Overstreet26c949f2013-09-10 18:41:15 -07002375}
2376
Kent Overstreete7c590e2013-09-10 18:39:16 -07002377int bch_btree_insert_check_key(struct btree *b, struct btree_op *op,
2378 struct bkey *check_key)
2379{
2380 int ret = -EINTR;
2381 uint64_t btree_ptr = b->key.ptr[0];
2382 unsigned long seq = b->seq;
2383 struct keylist insert;
2384 bool upgrade = op->lock == -1;
2385
2386 bch_keylist_init(&insert);
2387
2388 if (upgrade) {
2389 rw_unlock(false, b);
2390 rw_lock(true, b, b->level);
2391
2392 if (b->key.ptr[0] != btree_ptr ||
Coly Lic63ca782018-08-11 13:19:50 +08002393 b->seq != seq + 1) {
Bart Van Asschefd019912018-03-18 17:36:26 -07002394 op->lock = b->level;
Kent Overstreete7c590e2013-09-10 18:39:16 -07002395 goto out;
Coly Lic63ca782018-08-11 13:19:50 +08002396 }
Kent Overstreete7c590e2013-09-10 18:39:16 -07002397 }
2398
2399 SET_KEY_PTRS(check_key, 1);
2400 get_random_bytes(&check_key->ptr[0], sizeof(uint64_t));
2401
2402 SET_PTR_DEV(check_key, 0, PTR_CHECK_DEV);
2403
2404 bch_keylist_add(&insert, check_key);
2405
Kent Overstreet1b207d82013-09-10 18:52:54 -07002406 ret = bch_btree_insert_node(b, op, &insert, NULL, NULL);
Kent Overstreete7c590e2013-09-10 18:39:16 -07002407
2408 BUG_ON(!ret && !bch_keylist_empty(&insert));
2409out:
2410 if (upgrade)
2411 downgrade_write(&b->lock);
2412 return ret;
2413}
2414
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002415struct btree_insert_op {
2416 struct btree_op op;
2417 struct keylist *keys;
2418 atomic_t *journal_ref;
2419 struct bkey *replace_key;
2420};
2421
Wei Yongjun08239ca2013-11-28 10:31:35 +08002422static int btree_insert_fn(struct btree_op *b_op, struct btree *b)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002423{
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002424 struct btree_insert_op *op = container_of(b_op,
2425 struct btree_insert_op, op);
Kent Overstreet403b6cd2013-07-24 17:22:44 -07002426
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002427 int ret = bch_btree_insert_node(b, &op->op, op->keys,
2428 op->journal_ref, op->replace_key);
2429 if (ret && !bch_keylist_empty(op->keys))
2430 return ret;
2431 else
2432 return MAP_DONE;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002433}
2434
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002435int bch_btree_insert(struct cache_set *c, struct keylist *keys,
2436 atomic_t *journal_ref, struct bkey *replace_key)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002437{
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002438 struct btree_insert_op op;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002439 int ret = 0;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002440
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002441 BUG_ON(current->bio_list);
Kent Overstreet4f3d4012013-09-10 18:46:36 -07002442 BUG_ON(bch_keylist_empty(keys));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002443
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002444 bch_btree_op_init(&op.op, 0);
2445 op.keys = keys;
2446 op.journal_ref = journal_ref;
2447 op.replace_key = replace_key;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002448
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002449 while (!ret && !bch_keylist_empty(keys)) {
2450 op.op.lock = 0;
2451 ret = bch_btree_map_leaf_nodes(&op.op, c,
2452 &START_KEY(keys->keys),
2453 btree_insert_fn);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002454 }
2455
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002456 if (ret) {
2457 struct bkey *k;
2458
2459 pr_err("error %i", ret);
2460
2461 while ((k = bch_keylist_pop(keys)))
Kent Overstreet3a3b6a42013-07-24 16:46:42 -07002462 bkey_put(c, k);
Kent Overstreetcc7b8812013-07-24 18:07:22 -07002463 } else if (op.op.insert_collision)
2464 ret = -ESRCH;
Kent Overstreet6054c6d2013-07-24 18:06:22 -07002465
Kent Overstreetcafe5632013-03-23 16:11:31 -07002466 return ret;
2467}
2468
2469void bch_btree_set_root(struct btree *b)
2470{
Coly Li6f10f7d2018-08-11 13:19:44 +08002471 unsigned int i;
Kent Overstreete49c7c32013-06-26 17:25:38 -07002472 struct closure cl;
2473
2474 closure_init_stack(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002475
Kent Overstreetc37511b2013-04-26 15:39:55 -07002476 trace_bcache_btree_set_root(b);
2477
Kent Overstreetcafe5632013-03-23 16:11:31 -07002478 BUG_ON(!b->written);
2479
2480 for (i = 0; i < KEY_PTRS(&b->key); i++)
2481 BUG_ON(PTR_BUCKET(b->c, &b->key, i)->prio != BTREE_PRIO);
2482
2483 mutex_lock(&b->c->bucket_lock);
2484 list_del_init(&b->list);
2485 mutex_unlock(&b->c->bucket_lock);
2486
2487 b->c->root = b;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002488
Kent Overstreete49c7c32013-06-26 17:25:38 -07002489 bch_journal_meta(b->c, &cl);
2490 closure_sync(&cl);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002491}
2492
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002493/* Map across nodes or keys */
2494
2495static int bch_btree_map_nodes_recurse(struct btree *b, struct btree_op *op,
2496 struct bkey *from,
2497 btree_map_nodes_fn *fn, int flags)
2498{
2499 int ret = MAP_CONTINUE;
2500
2501 if (b->level) {
2502 struct bkey *k;
2503 struct btree_iter iter;
2504
Kent Overstreetc052dd92013-11-11 17:35:24 -08002505 bch_btree_iter_init(&b->keys, &iter, from);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002506
Kent Overstreeta85e9682013-12-20 17:28:16 -08002507 while ((k = bch_btree_iter_next_filter(&iter, &b->keys,
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002508 bch_ptr_bad))) {
Coly Lifeac1a72020-03-22 14:03:00 +08002509 ret = bcache_btree(map_nodes_recurse, k, b,
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002510 op, from, fn, flags);
2511 from = NULL;
2512
2513 if (ret != MAP_CONTINUE)
2514 return ret;
2515 }
2516 }
2517
2518 if (!b->level || flags == MAP_ALL_NODES)
2519 ret = fn(op, b);
2520
2521 return ret;
2522}
2523
2524int __bch_btree_map_nodes(struct btree_op *op, struct cache_set *c,
2525 struct bkey *from, btree_map_nodes_fn *fn, int flags)
2526{
Coly Lifeac1a72020-03-22 14:03:00 +08002527 return bcache_btree_root(map_nodes_recurse, c, op, from, fn, flags);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002528}
2529
Coly Li253a99d92020-03-22 14:02:59 +08002530int bch_btree_map_keys_recurse(struct btree *b, struct btree_op *op,
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002531 struct bkey *from, btree_map_keys_fn *fn,
2532 int flags)
2533{
2534 int ret = MAP_CONTINUE;
2535 struct bkey *k;
2536 struct btree_iter iter;
2537
Kent Overstreetc052dd92013-11-11 17:35:24 -08002538 bch_btree_iter_init(&b->keys, &iter, from);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002539
Kent Overstreeta85e9682013-12-20 17:28:16 -08002540 while ((k = bch_btree_iter_next_filter(&iter, &b->keys, bch_ptr_bad))) {
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002541 ret = !b->level
2542 ? fn(op, b, k)
Coly Lifeac1a72020-03-22 14:03:00 +08002543 : bcache_btree(map_keys_recurse, k,
2544 b, op, from, fn, flags);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002545 from = NULL;
2546
2547 if (ret != MAP_CONTINUE)
2548 return ret;
2549 }
2550
2551 if (!b->level && (flags & MAP_END_KEY))
2552 ret = fn(op, b, &KEY(KEY_INODE(&b->key),
2553 KEY_OFFSET(&b->key), 0));
2554
2555 return ret;
2556}
2557
2558int bch_btree_map_keys(struct btree_op *op, struct cache_set *c,
2559 struct bkey *from, btree_map_keys_fn *fn, int flags)
2560{
Coly Lifeac1a72020-03-22 14:03:00 +08002561 return bcache_btree_root(map_keys_recurse, c, op, from, fn, flags);
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002562}
2563
Kent Overstreetcafe5632013-03-23 16:11:31 -07002564/* Keybuf code */
2565
2566static inline int keybuf_cmp(struct keybuf_key *l, struct keybuf_key *r)
2567{
2568 /* Overlapping keys compare equal */
2569 if (bkey_cmp(&l->key, &START_KEY(&r->key)) <= 0)
2570 return -1;
2571 if (bkey_cmp(&START_KEY(&l->key), &r->key) >= 0)
2572 return 1;
2573 return 0;
2574}
2575
2576static inline int keybuf_nonoverlapping_cmp(struct keybuf_key *l,
2577 struct keybuf_key *r)
2578{
2579 return clamp_t(int64_t, bkey_cmp(&l->key, &r->key), -1, 1);
2580}
2581
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002582struct refill {
2583 struct btree_op op;
Coly Li6f10f7d2018-08-11 13:19:44 +08002584 unsigned int nr_found;
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002585 struct keybuf *buf;
2586 struct bkey *end;
2587 keybuf_pred_fn *pred;
2588};
2589
2590static int refill_keybuf_fn(struct btree_op *op, struct btree *b,
2591 struct bkey *k)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002592{
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002593 struct refill *refill = container_of(op, struct refill, op);
2594 struct keybuf *buf = refill->buf;
2595 int ret = MAP_CONTINUE;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002596
Tang Junhui2d6cb6e2018-10-08 20:41:14 +08002597 if (bkey_cmp(k, refill->end) > 0) {
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002598 ret = MAP_DONE;
2599 goto out;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002600 }
2601
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002602 if (!KEY_SIZE(k)) /* end key */
2603 goto out;
2604
2605 if (refill->pred(buf, k)) {
2606 struct keybuf_key *w;
2607
2608 spin_lock(&buf->lock);
2609
2610 w = array_alloc(&buf->freelist);
2611 if (!w) {
2612 spin_unlock(&buf->lock);
2613 return MAP_DONE;
2614 }
2615
2616 w->private = NULL;
2617 bkey_copy(&w->key, k);
2618
2619 if (RB_INSERT(&buf->keys, w, node, keybuf_cmp))
2620 array_free(&buf->freelist, w);
Kent Overstreet48a915a2013-10-31 15:43:22 -07002621 else
2622 refill->nr_found++;
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002623
2624 if (array_freelist_empty(&buf->freelist))
2625 ret = MAP_DONE;
2626
2627 spin_unlock(&buf->lock);
2628 }
2629out:
2630 buf->last_scanned = *k;
2631 return ret;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002632}
2633
2634void bch_refill_keybuf(struct cache_set *c, struct keybuf *buf,
Kent Overstreet72c27062013-06-05 06:24:39 -07002635 struct bkey *end, keybuf_pred_fn *pred)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002636{
2637 struct bkey start = buf->last_scanned;
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002638 struct refill refill;
Kent Overstreetcafe5632013-03-23 16:11:31 -07002639
2640 cond_resched();
2641
Kent Overstreetb54d6932013-07-24 18:04:18 -07002642 bch_btree_op_init(&refill.op, -1);
Kent Overstreet48a915a2013-10-31 15:43:22 -07002643 refill.nr_found = 0;
2644 refill.buf = buf;
2645 refill.end = end;
2646 refill.pred = pred;
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002647
2648 bch_btree_map_keys(&refill.op, c, &buf->last_scanned,
2649 refill_keybuf_fn, MAP_END_KEY);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002650
Kent Overstreet48a915a2013-10-31 15:43:22 -07002651 trace_bcache_keyscan(refill.nr_found,
2652 KEY_INODE(&start), KEY_OFFSET(&start),
2653 KEY_INODE(&buf->last_scanned),
2654 KEY_OFFSET(&buf->last_scanned));
Kent Overstreetcafe5632013-03-23 16:11:31 -07002655
2656 spin_lock(&buf->lock);
2657
2658 if (!RB_EMPTY_ROOT(&buf->keys)) {
2659 struct keybuf_key *w;
Coly Li1fae7cf2018-08-11 13:19:45 +08002660
Kent Overstreetcafe5632013-03-23 16:11:31 -07002661 w = RB_FIRST(&buf->keys, struct keybuf_key, node);
2662 buf->start = START_KEY(&w->key);
2663
2664 w = RB_LAST(&buf->keys, struct keybuf_key, node);
2665 buf->end = w->key;
2666 } else {
2667 buf->start = MAX_KEY;
2668 buf->end = MAX_KEY;
2669 }
2670
2671 spin_unlock(&buf->lock);
2672}
2673
2674static void __bch_keybuf_del(struct keybuf *buf, struct keybuf_key *w)
2675{
2676 rb_erase(&w->node, &buf->keys);
2677 array_free(&buf->freelist, w);
2678}
2679
2680void bch_keybuf_del(struct keybuf *buf, struct keybuf_key *w)
2681{
2682 spin_lock(&buf->lock);
2683 __bch_keybuf_del(buf, w);
2684 spin_unlock(&buf->lock);
2685}
2686
2687bool bch_keybuf_check_overlapping(struct keybuf *buf, struct bkey *start,
2688 struct bkey *end)
2689{
2690 bool ret = false;
2691 struct keybuf_key *p, *w, s;
Coly Li1fae7cf2018-08-11 13:19:45 +08002692
Kent Overstreetcafe5632013-03-23 16:11:31 -07002693 s.key = *start;
2694
2695 if (bkey_cmp(end, &buf->start) <= 0 ||
2696 bkey_cmp(start, &buf->end) >= 0)
2697 return false;
2698
2699 spin_lock(&buf->lock);
2700 w = RB_GREATER(&buf->keys, s, node, keybuf_nonoverlapping_cmp);
2701
2702 while (w && bkey_cmp(&START_KEY(&w->key), end) < 0) {
2703 p = w;
2704 w = RB_NEXT(w, node);
2705
2706 if (p->private)
2707 ret = true;
2708 else
2709 __bch_keybuf_del(buf, p);
2710 }
2711
2712 spin_unlock(&buf->lock);
2713 return ret;
2714}
2715
2716struct keybuf_key *bch_keybuf_next(struct keybuf *buf)
2717{
2718 struct keybuf_key *w;
Coly Li1fae7cf2018-08-11 13:19:45 +08002719
Kent Overstreetcafe5632013-03-23 16:11:31 -07002720 spin_lock(&buf->lock);
2721
2722 w = RB_FIRST(&buf->keys, struct keybuf_key, node);
2723
2724 while (w && w->private)
2725 w = RB_NEXT(w, node);
2726
2727 if (w)
2728 w->private = ERR_PTR(-EINTR);
2729
2730 spin_unlock(&buf->lock);
2731 return w;
2732}
2733
2734struct keybuf_key *bch_keybuf_next_rescan(struct cache_set *c,
Kent Overstreet48dad8b2013-09-10 18:48:51 -07002735 struct keybuf *buf,
2736 struct bkey *end,
2737 keybuf_pred_fn *pred)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002738{
2739 struct keybuf_key *ret;
2740
2741 while (1) {
2742 ret = bch_keybuf_next(buf);
2743 if (ret)
2744 break;
2745
2746 if (bkey_cmp(&buf->last_scanned, end) >= 0) {
2747 pr_debug("scan finished");
2748 break;
2749 }
2750
Kent Overstreet72c27062013-06-05 06:24:39 -07002751 bch_refill_keybuf(c, buf, end, pred);
Kent Overstreetcafe5632013-03-23 16:11:31 -07002752 }
2753
2754 return ret;
2755}
2756
Kent Overstreet72c27062013-06-05 06:24:39 -07002757void bch_keybuf_init(struct keybuf *buf)
Kent Overstreetcafe5632013-03-23 16:11:31 -07002758{
Kent Overstreetcafe5632013-03-23 16:11:31 -07002759 buf->last_scanned = MAX_KEY;
2760 buf->keys = RB_ROOT;
2761
2762 spin_lock_init(&buf->lock);
2763 array_allocator_init(&buf->freelist);
2764}