blob: 581edcb0911bfa39e9ec6242686bd213c47f352c [file] [log] [blame]
Kent Overstreet3e3e02e2022-10-19 18:31:33 -04001// SPDX-License-Identifier: GPL-2.0
Kent Overstreet2ca88e52019-03-07 19:46:10 -05002
3#include "bcachefs.h"
Kent Overstreetd211b402020-06-15 19:53:46 -04004#include "btree_cache.h"
Kent Overstreet2ca88e52019-03-07 19:46:10 -05005#include "btree_iter.h"
6#include "btree_key_cache.h"
7#include "btree_locking.h"
8#include "btree_update.h"
Kent Overstreet549d1732022-07-17 23:06:38 -04009#include "errcode.h"
Kent Overstreet2ca88e52019-03-07 19:46:10 -050010#include "error.h"
11#include "journal.h"
12#include "journal_reclaim.h"
13#include "trace.h"
14
Kent Overstreet628a3ad2020-11-12 17:19:47 -050015#include <linux/sched/mm.h>
16
Kent Overstreet3d21d482022-09-03 22:07:31 -040017static inline bool btree_uses_pcpu_readers(enum btree_id id)
18{
19 return id == BTREE_ID_subvolumes;
20}
21
Kent Overstreet14ba3702020-11-18 14:09:33 -050022static struct kmem_cache *bch2_key_cache;
23
Kent Overstreet2ca88e52019-03-07 19:46:10 -050024static int bch2_btree_key_cache_cmp_fn(struct rhashtable_compare_arg *arg,
25 const void *obj)
26{
27 const struct bkey_cached *ck = obj;
28 const struct bkey_cached_key *key = arg->key;
29
Kent Overstreete88a75e2022-11-24 03:12:22 -050030 return ck->key.btree_id != key->btree_id ||
31 !bpos_eq(ck->key.pos, key->pos);
Kent Overstreet2ca88e52019-03-07 19:46:10 -050032}
33
34static const struct rhashtable_params bch2_btree_key_cache_params = {
35 .head_offset = offsetof(struct bkey_cached, hash),
36 .key_offset = offsetof(struct bkey_cached, key),
37 .key_len = sizeof(struct bkey_cached_key),
38 .obj_cmpfn = bch2_btree_key_cache_cmp_fn,
39};
40
41__flatten
Kent Overstreet8cad3e22019-09-22 19:10:21 -040042inline struct bkey_cached *
43bch2_btree_key_cache_find(struct bch_fs *c, enum btree_id btree_id, struct bpos pos)
Kent Overstreet2ca88e52019-03-07 19:46:10 -050044{
45 struct bkey_cached_key key = {
46 .btree_id = btree_id,
47 .pos = pos,
48 };
49
50 return rhashtable_lookup_fast(&c->btree_key_cache.table, &key,
51 bch2_btree_key_cache_params);
52}
53
54static bool bkey_cached_lock_for_evict(struct bkey_cached *ck)
55{
56 if (!six_trylock_intent(&ck->c.lock))
57 return false;
58
Kent Overstreet7af365e2023-01-08 00:05:30 -050059 if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
Kent Overstreet2ca88e52019-03-07 19:46:10 -050060 six_unlock_intent(&ck->c.lock);
61 return false;
62 }
63
Kent Overstreet7af365e2023-01-08 00:05:30 -050064 if (!six_trylock_write(&ck->c.lock)) {
Kent Overstreet2ca88e52019-03-07 19:46:10 -050065 six_unlock_intent(&ck->c.lock);
66 return false;
67 }
68
69 return true;
70}
71
72static void bkey_cached_evict(struct btree_key_cache *c,
73 struct bkey_cached *ck)
74{
75 BUG_ON(rhashtable_remove_fast(&c->table, &ck->hash,
76 bch2_btree_key_cache_params));
77 memset(&ck->key, ~0, sizeof(ck->key));
Kent Overstreet6a747c42020-11-09 13:01:52 -050078
Kent Overstreet331194a2021-03-24 23:37:33 -040079 atomic_long_dec(&c->nr_keys);
Kent Overstreet2ca88e52019-03-07 19:46:10 -050080}
81
Kent Overstreet628a3ad2020-11-12 17:19:47 -050082static void bkey_cached_free(struct btree_key_cache *bc,
Kent Overstreet2ca88e52019-03-07 19:46:10 -050083 struct bkey_cached *ck)
84{
Kent Overstreet628a3ad2020-11-12 17:19:47 -050085 struct bch_fs *c = container_of(bc, struct bch_fs, btree_key_cache);
86
Kent Overstreet12590722020-11-19 15:38:27 -050087 BUG_ON(test_bit(BKEY_CACHED_DIRTY, &ck->flags));
88
Kent Overstreet628a3ad2020-11-12 17:19:47 -050089 ck->btree_trans_barrier_seq =
90 start_poll_synchronize_srcu(&c->btree_trans_barrier);
91
Kent Overstreetc65c13f2023-11-06 09:53:14 -050092 if (ck->c.lock.readers) {
Kent Overstreet3d21d482022-09-03 22:07:31 -040093 list_move_tail(&ck->list, &bc->freed_pcpu);
Kent Overstreetc65c13f2023-11-06 09:53:14 -050094 bc->nr_freed_pcpu++;
95 } else {
Kent Overstreet3d21d482022-09-03 22:07:31 -040096 list_move_tail(&ck->list, &bc->freed_nonpcpu);
Kent Overstreetc65c13f2023-11-06 09:53:14 -050097 bc->nr_freed_nonpcpu++;
98 }
Kent Overstreet8f7f5662022-06-17 01:07:54 -040099 atomic_long_inc(&bc->nr_freed);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500100
101 kfree(ck->k);
102 ck->k = NULL;
103 ck->u64s = 0;
104
105 six_unlock_write(&ck->c.lock);
106 six_unlock_intent(&ck->c.lock);
107}
108
Kent Overstreetb2f83e72022-10-17 02:08:07 -0400109#ifdef __KERNEL__
110static void __bkey_cached_move_to_freelist_ordered(struct btree_key_cache *bc,
111 struct bkey_cached *ck)
112{
113 struct bkey_cached *pos;
114
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500115 bc->nr_freed_nonpcpu++;
116
Kent Overstreetb2f83e72022-10-17 02:08:07 -0400117 list_for_each_entry_reverse(pos, &bc->freed_nonpcpu, list) {
118 if (ULONG_CMP_GE(ck->btree_trans_barrier_seq,
119 pos->btree_trans_barrier_seq)) {
120 list_move(&ck->list, &pos->list);
121 return;
122 }
123 }
124
125 list_move(&ck->list, &bc->freed_nonpcpu);
126}
127#endif
128
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400129static void bkey_cached_move_to_freelist(struct btree_key_cache *bc,
Kent Overstreet3d21d482022-09-03 22:07:31 -0400130 struct bkey_cached *ck)
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400131{
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400132 BUG_ON(test_bit(BKEY_CACHED_DIRTY, &ck->flags));
133
Kent Overstreet3d21d482022-09-03 22:07:31 -0400134 if (!ck->c.lock.readers) {
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400135#ifdef __KERNEL__
Kent Overstreetb2f83e72022-10-17 02:08:07 -0400136 struct btree_key_cache_freelist *f;
137 bool freed = false;
138
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400139 preempt_disable();
140 f = this_cpu_ptr(bc->pcpu_freed);
141
Kent Overstreet3d21d482022-09-03 22:07:31 -0400142 if (f->nr < ARRAY_SIZE(f->objs)) {
143 f->objs[f->nr++] = ck;
144 freed = true;
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400145 }
146 preempt_enable();
147
Kent Overstreet3d21d482022-09-03 22:07:31 -0400148 if (!freed) {
149 mutex_lock(&bc->lock);
150 preempt_disable();
151 f = this_cpu_ptr(bc->pcpu_freed);
152
153 while (f->nr > ARRAY_SIZE(f->objs) / 2) {
154 struct bkey_cached *ck2 = f->objs[--f->nr];
155
Kent Overstreetb2f83e72022-10-17 02:08:07 -0400156 __bkey_cached_move_to_freelist_ordered(bc, ck2);
Kent Overstreet3d21d482022-09-03 22:07:31 -0400157 }
158 preempt_enable();
159
Kent Overstreetb2f83e72022-10-17 02:08:07 -0400160 __bkey_cached_move_to_freelist_ordered(bc, ck);
Kent Overstreet3d21d482022-09-03 22:07:31 -0400161 mutex_unlock(&bc->lock);
162 }
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400163#else
164 mutex_lock(&bc->lock);
165 list_move_tail(&ck->list, &bc->freed_nonpcpu);
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500166 bc->nr_freed_nonpcpu++;
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400167 mutex_unlock(&bc->lock);
168#endif
Kent Overstreet3d21d482022-09-03 22:07:31 -0400169 } else {
170 mutex_lock(&bc->lock);
171 list_move_tail(&ck->list, &bc->freed_pcpu);
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400172 mutex_unlock(&bc->lock);
173 }
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400174}
175
176static void bkey_cached_free_fast(struct btree_key_cache *bc,
177 struct bkey_cached *ck)
178{
179 struct bch_fs *c = container_of(bc, struct bch_fs, btree_key_cache);
180
181 ck->btree_trans_barrier_seq =
182 start_poll_synchronize_srcu(&c->btree_trans_barrier);
183
184 list_del_init(&ck->list);
185 atomic_long_inc(&bc->nr_freed);
186
187 kfree(ck->k);
188 ck->k = NULL;
189 ck->u64s = 0;
190
191 bkey_cached_move_to_freelist(bc, ck);
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400192
193 six_unlock_write(&ck->c.lock);
194 six_unlock_intent(&ck->c.lock);
195}
196
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500197static struct bkey_cached *
Kent Overstreet061f7992022-11-14 02:22:30 -0500198bkey_cached_alloc(struct btree_trans *trans, struct btree_path *path,
199 bool *was_new)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500200{
Kent Overstreet02421302022-09-03 21:14:53 -0400201 struct bch_fs *c = trans->c;
202 struct btree_key_cache *bc = &c->btree_key_cache;
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400203 struct bkey_cached *ck = NULL;
Kent Overstreet3d21d482022-09-03 22:07:31 -0400204 bool pcpu_readers = btree_uses_pcpu_readers(path->btree_id);
Kent Overstreet6c363182023-01-07 05:46:52 -0500205 int ret;
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400206
Kent Overstreet3d21d482022-09-03 22:07:31 -0400207 if (!pcpu_readers) {
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400208#ifdef __KERNEL__
Kent Overstreetb2f83e72022-10-17 02:08:07 -0400209 struct btree_key_cache_freelist *f;
210
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400211 preempt_disable();
Kent Overstreet02421302022-09-03 21:14:53 -0400212 f = this_cpu_ptr(bc->pcpu_freed);
Kent Overstreet3d21d482022-09-03 22:07:31 -0400213 if (f->nr)
214 ck = f->objs[--f->nr];
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400215 preempt_enable();
Kent Overstreet3d21d482022-09-03 22:07:31 -0400216
217 if (!ck) {
218 mutex_lock(&bc->lock);
219 preempt_disable();
220 f = this_cpu_ptr(bc->pcpu_freed);
221
222 while (!list_empty(&bc->freed_nonpcpu) &&
223 f->nr < ARRAY_SIZE(f->objs) / 2) {
224 ck = list_last_entry(&bc->freed_nonpcpu, struct bkey_cached, list);
225 list_del_init(&ck->list);
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500226 bc->nr_freed_nonpcpu--;
Kent Overstreet3d21d482022-09-03 22:07:31 -0400227 f->objs[f->nr++] = ck;
228 }
229
230 ck = f->nr ? f->objs[--f->nr] : NULL;
231 preempt_enable();
232 mutex_unlock(&bc->lock);
233 }
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400234#else
235 mutex_lock(&bc->lock);
236 if (!list_empty(&bc->freed_nonpcpu)) {
237 ck = list_last_entry(&bc->freed_nonpcpu, struct bkey_cached, list);
238 list_del_init(&ck->list);
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500239 bc->nr_freed_nonpcpu--;
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400240 }
241 mutex_unlock(&bc->lock);
242#endif
Kent Overstreet3d21d482022-09-03 22:07:31 -0400243 } else {
244 mutex_lock(&bc->lock);
245 if (!list_empty(&bc->freed_pcpu)) {
246 ck = list_last_entry(&bc->freed_pcpu, struct bkey_cached, list);
247 list_del_init(&ck->list);
248 }
Kent Overstreet02421302022-09-03 21:14:53 -0400249 mutex_unlock(&bc->lock);
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400250 }
251
252 if (ck) {
Kent Overstreet94c69fa2023-02-04 19:39:59 -0500253 ret = btree_node_lock_nopath(trans, &ck->c, SIX_LOCK_intent, _THIS_IP_);
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400254 if (unlikely(ret)) {
Kent Overstreet02421302022-09-03 21:14:53 -0400255 bkey_cached_move_to_freelist(bc, ck);
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400256 return ERR_PTR(ret);
257 }
258
Kent Overstreet1bb91232022-09-03 22:24:16 -0400259 path->l[0].b = (void *) ck;
Kent Overstreet1fb4fe62023-05-20 23:57:48 -0400260 path->l[0].lock_seq = six_lock_seq(&ck->c.lock);
Kent Overstreet5b7fbdc2023-09-09 21:14:54 -0400261 mark_btree_node_locked(trans, path, 0, BTREE_NODE_INTENT_LOCKED);
Kent Overstreet1bb91232022-09-03 22:24:16 -0400262
263 ret = bch2_btree_node_lock_write(trans, path, &ck->c);
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400264 if (unlikely(ret)) {
Kent Overstreet1bb91232022-09-03 22:24:16 -0400265 btree_node_unlock(trans, path, 0);
Kent Overstreet02421302022-09-03 21:14:53 -0400266 bkey_cached_move_to_freelist(bc, ck);
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400267 return ERR_PTR(ret);
268 }
269
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400270 return ck;
271 }
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500272
Kent Overstreetd95dd372023-05-28 03:44:38 -0400273 ck = allocate_dropping_locks(trans, ret,
274 kmem_cache_zalloc(bch2_key_cache, _gfp));
Kent Overstreet6c363182023-01-07 05:46:52 -0500275 if (ret) {
276 kmem_cache_free(bch2_key_cache, ck);
277 return ERR_PTR(ret);
Kent Overstreet12590722020-11-19 15:38:27 -0500278 }
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500279
Kent Overstreet6c363182023-01-07 05:46:52 -0500280 if (!ck)
281 return NULL;
Kent Overstreetd95dd372023-05-28 03:44:38 -0400282
Kent Overstreet6c363182023-01-07 05:46:52 -0500283 INIT_LIST_HEAD(&ck->list);
Kent Overstreet0d2234a2023-05-20 20:57:55 -0400284 bch2_btree_lock_init(&ck->c, pcpu_readers ? SIX_LOCK_INIT_PCPU : 0);
Kent Overstreet6c363182023-01-07 05:46:52 -0500285
286 ck->c.cached = true;
287 BUG_ON(!six_trylock_intent(&ck->c.lock));
288 BUG_ON(!six_trylock_write(&ck->c.lock));
289 *was_new = true;
290 return ck;
Kent Overstreet331194a2021-03-24 23:37:33 -0400291}
292
293static struct bkey_cached *
294bkey_cached_reuse(struct btree_key_cache *c)
295{
296 struct bucket_table *tbl;
297 struct rhash_head *pos;
298 struct bkey_cached *ck;
299 unsigned i;
300
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400301 mutex_lock(&c->lock);
Kent Overstreet331194a2021-03-24 23:37:33 -0400302 rcu_read_lock();
303 tbl = rht_dereference_rcu(c->table.tbl, &c->table);
304 for (i = 0; i < tbl->size; i++)
305 rht_for_each_entry_rcu(ck, pos, tbl, i, hash) {
306 if (!test_bit(BKEY_CACHED_DIRTY, &ck->flags) &&
307 bkey_cached_lock_for_evict(ck)) {
308 bkey_cached_evict(c, ck);
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400309 goto out;
Kent Overstreet331194a2021-03-24 23:37:33 -0400310 }
311 }
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400312 ck = NULL;
313out:
Kent Overstreet331194a2021-03-24 23:37:33 -0400314 rcu_read_unlock();
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400315 mutex_unlock(&c->lock);
316 return ck;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500317}
318
319static struct bkey_cached *
Kent Overstreet3d21d482022-09-03 22:07:31 -0400320btree_key_cache_create(struct btree_trans *trans, struct btree_path *path)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500321{
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400322 struct bch_fs *c = trans->c;
Kent Overstreetf0f41a62021-12-30 20:14:52 -0500323 struct btree_key_cache *bc = &c->btree_key_cache;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500324 struct bkey_cached *ck;
Kent Overstreet061f7992022-11-14 02:22:30 -0500325 bool was_new = false;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500326
Kent Overstreet061f7992022-11-14 02:22:30 -0500327 ck = bkey_cached_alloc(trans, path, &was_new);
Kent Overstreet3e3e02e2022-10-19 18:31:33 -0400328 if (IS_ERR(ck))
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400329 return ck;
Kent Overstreet331194a2021-03-24 23:37:33 -0400330
331 if (unlikely(!ck)) {
Kent Overstreetf0f41a62021-12-30 20:14:52 -0500332 ck = bkey_cached_reuse(bc);
333 if (unlikely(!ck)) {
334 bch_err(c, "error allocating memory for key cache item, btree %s",
Kent Overstreet88dfe192023-10-19 22:49:08 -0400335 bch2_btree_id_str(path->btree_id));
Kent Overstreet65d48e32023-03-14 15:35:57 -0400336 return ERR_PTR(-BCH_ERR_ENOMEM_btree_key_cache_create);
Kent Overstreetf0f41a62021-12-30 20:14:52 -0500337 }
Kent Overstreet331194a2021-03-24 23:37:33 -0400338
Kent Overstreet5b7fbdc2023-09-09 21:14:54 -0400339 mark_btree_node_locked(trans, path, 0, BTREE_NODE_INTENT_LOCKED);
Kent Overstreet331194a2021-03-24 23:37:33 -0400340 }
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500341
342 ck->c.level = 0;
Kent Overstreet02421302022-09-03 21:14:53 -0400343 ck->c.btree_id = path->btree_id;
344 ck->key.btree_id = path->btree_id;
345 ck->key.pos = path->pos;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500346 ck->valid = false;
Kent Overstreet12590722020-11-19 15:38:27 -0500347 ck->flags = 1U << BKEY_CACHED_ACCESSED;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500348
Kent Overstreetf0f41a62021-12-30 20:14:52 -0500349 if (unlikely(rhashtable_lookup_insert_fast(&bc->table,
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500350 &ck->hash,
Kent Overstreet331194a2021-03-24 23:37:33 -0400351 bch2_btree_key_cache_params))) {
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500352 /* We raced with another fill: */
Kent Overstreet331194a2021-03-24 23:37:33 -0400353
354 if (likely(was_new)) {
355 six_unlock_write(&ck->c.lock);
356 six_unlock_intent(&ck->c.lock);
357 kfree(ck);
358 } else {
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400359 bkey_cached_free_fast(bc, ck);
Kent Overstreet331194a2021-03-24 23:37:33 -0400360 }
361
Kent Overstreet1bb91232022-09-03 22:24:16 -0400362 mark_btree_node_locked(trans, path, 0, BTREE_NODE_UNLOCKED);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500363 return NULL;
364 }
365
Kent Overstreetf0f41a62021-12-30 20:14:52 -0500366 atomic_long_inc(&bc->nr_keys);
Kent Overstreet6a747c42020-11-09 13:01:52 -0500367
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500368 six_unlock_write(&ck->c.lock);
369
370 return ck;
371}
372
373static int btree_key_cache_fill(struct btree_trans *trans,
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400374 struct btree_path *ck_path,
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500375 struct bkey_cached *ck)
376{
Kent Overstreet1617d562022-11-22 20:15:33 -0500377 struct btree_iter iter;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500378 struct bkey_s_c k;
379 unsigned new_u64s = 0;
380 struct bkey_i *new_k = NULL;
381 int ret;
382
Kent Overstreetb3f8e712024-03-10 20:53:17 -0400383 bch2_trans_iter_init(trans, &iter, ck->key.btree_id, ck->key.pos,
384 BTREE_ITER_KEY_CACHE_FILL|
385 BTREE_ITER_CACHED_NOFILL);
386 iter.flags &= ~BTREE_ITER_WITH_JOURNAL;
387 k = bch2_btree_iter_peek_slot(&iter);
Kent Overstreet1617d562022-11-22 20:15:33 -0500388 ret = bkey_err(k);
Kent Overstreet8d956c22021-03-19 22:54:18 -0400389 if (ret)
390 goto err;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500391
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400392 if (!bch2_btree_node_relock(trans, ck_path, 0)) {
Kent Overstreet674cfc22022-08-27 12:48:36 -0400393 trace_and_count(trans->c, trans_restart_relock_key_cache_fill, trans, _THIS_IP_, ck_path);
Kent Overstreet6c363182023-01-07 05:46:52 -0500394 ret = btree_trans_restart(trans, BCH_ERR_transaction_restart_key_cache_fill);
Kent Overstreet8d956c22021-03-19 22:54:18 -0400395 goto err;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500396 }
397
Kent Overstreetbc2e5d52021-04-24 00:42:02 -0400398 /*
399 * bch2_varint_decode can read past the end of the buffer by at
400 * most 7 bytes (it won't be used):
401 */
402 new_u64s = k.k->u64s + 1;
403
Kent Overstreeta729e482022-04-17 17:50:47 -0400404 /*
405 * Allocate some extra space so that the transaction commit path is less
406 * likely to have to reallocate, since that requires a transaction
407 * restart:
408 */
409 new_u64s = min(256U, (new_u64s * 3) / 2);
410
Kent Overstreetbc2e5d52021-04-24 00:42:02 -0400411 if (new_u64s > ck->u64s) {
412 new_u64s = roundup_pow_of_two(new_u64s);
Kent Overstreet6c363182023-01-07 05:46:52 -0500413 new_k = kmalloc(new_u64s * sizeof(u64), GFP_NOWAIT|__GFP_NOWARN);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500414 if (!new_k) {
Kent Overstreet6c363182023-01-07 05:46:52 -0500415 bch2_trans_unlock(trans);
416
417 new_k = kmalloc(new_u64s * sizeof(u64), GFP_KERNEL);
418 if (!new_k) {
419 bch_err(trans->c, "error allocating memory for key cache key, btree %s u64s %u",
Kent Overstreet88dfe192023-10-19 22:49:08 -0400420 bch2_btree_id_str(ck->key.btree_id), new_u64s);
Kent Overstreet65d48e32023-03-14 15:35:57 -0400421 ret = -BCH_ERR_ENOMEM_btree_key_cache_fill;
Kent Overstreet6c363182023-01-07 05:46:52 -0500422 goto err;
423 }
424
425 if (!bch2_btree_node_relock(trans, ck_path, 0)) {
426 kfree(new_k);
427 trace_and_count(trans->c, trans_restart_relock_key_cache_fill, trans, _THIS_IP_, ck_path);
428 ret = btree_trans_restart(trans, BCH_ERR_transaction_restart_key_cache_fill);
429 goto err;
430 }
431
432 ret = bch2_trans_relock(trans);
433 if (ret) {
434 kfree(new_k);
435 goto err;
436 }
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500437 }
438 }
439
Kent Overstreetda4474f22022-09-03 21:09:54 -0400440 ret = bch2_btree_node_lock_write(trans, ck_path, &ck_path->l[0].b->c);
Kent Overstreetd5024b02022-08-22 23:39:23 -0400441 if (ret) {
442 kfree(new_k);
443 goto err;
444 }
445
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500446 if (new_k) {
447 kfree(ck->k);
448 ck->u64s = new_u64s;
449 ck->k = new_k;
450 }
451
452 bkey_reassemble(ck->k, k);
453 ck->valid = true;
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400454 bch2_btree_node_unlock_write(trans, ck_path, ck_path->l[0].b);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500455
456 /* We're not likely to need this iterator again: */
Kent Overstreet1617d562022-11-22 20:15:33 -0500457 set_btree_iter_dontneed(&iter);
Kent Overstreet8d956c22021-03-19 22:54:18 -0400458err:
Kent Overstreet1617d562022-11-22 20:15:33 -0500459 bch2_trans_iter_exit(trans, &iter);
Kent Overstreet8d956c22021-03-19 22:54:18 -0400460 return ret;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500461}
462
Kent Overstreet3e3e02e2022-10-19 18:31:33 -0400463static noinline int
Kent Overstreet99e21462022-09-26 22:34:49 -0400464bch2_btree_path_traverse_cached_slowpath(struct btree_trans *trans, struct btree_path *path,
465 unsigned flags)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500466{
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500467 struct bch_fs *c = trans->c;
468 struct bkey_cached *ck;
469 int ret = 0;
470
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400471 BUG_ON(path->level);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500472
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400473 path->l[1].b = NULL;
Kent Overstreet5aab6632021-07-14 15:13:27 -0400474
Kent Overstreetb8c5b162023-01-25 12:16:23 -0500475 if (bch2_btree_node_relock_notrace(trans, path, 0)) {
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400476 ck = (void *) path->l[0].b;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500477 goto fill;
478 }
479retry:
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400480 ck = bch2_btree_key_cache_find(c, path->btree_id, path->pos);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500481 if (!ck) {
Kent Overstreet02421302022-09-03 21:14:53 -0400482 ck = btree_key_cache_create(trans, path);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500483 ret = PTR_ERR_OR_ZERO(ck);
484 if (ret)
485 goto err;
486 if (!ck)
487 goto retry;
488
Kent Overstreet5b7fbdc2023-09-09 21:14:54 -0400489 mark_btree_node_locked(trans, path, 0, BTREE_NODE_INTENT_LOCKED);
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400490 path->locks_want = 1;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500491 } else {
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400492 enum six_lock_type lock_want = __btree_lock_want(path, 0);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500493
Kent Overstreet0d7009d2022-08-22 15:29:53 -0400494 ret = btree_node_lock(trans, path, (void *) ck, 0,
495 lock_want, _THIS_IP_);
496 if (bch2_err_matches(ret, BCH_ERR_transaction_restart))
497 goto err;
498
499 BUG_ON(ret);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500500
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400501 if (ck->key.btree_id != path->btree_id ||
Kent Overstreete88a75e2022-11-24 03:12:22 -0500502 !bpos_eq(ck->key.pos, path->pos)) {
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500503 six_unlock_type(&ck->c.lock, lock_want);
504 goto retry;
505 }
506
Kent Overstreet5b7fbdc2023-09-09 21:14:54 -0400507 mark_btree_node_locked(trans, path, 0,
508 (enum btree_node_locked_type) lock_want);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500509 }
510
Kent Overstreet1fb4fe62023-05-20 23:57:48 -0400511 path->l[0].lock_seq = six_lock_seq(&ck->c.lock);
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400512 path->l[0].b = (void *) ck;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500513fill:
Kent Overstreet6f90e6b2023-01-25 10:15:39 -0500514 path->uptodate = BTREE_ITER_UPTODATE;
515
Kent Overstreet087e53c2022-12-20 11:26:57 -0500516 if (!ck->valid && !(flags & BTREE_ITER_CACHED_NOFILL)) {
Kent Overstreet49e401f2022-08-07 13:43:32 -0400517 /*
518 * Using the underscore version because we haven't set
519 * path->uptodate yet:
520 */
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400521 if (!path->locks_want &&
Kent Overstreetbe9e7822023-10-27 15:23:46 -0400522 !__bch2_btree_path_upgrade(trans, path, 1, NULL)) {
Kent Overstreet674cfc22022-08-27 12:48:36 -0400523 trace_and_count(trans->c, trans_restart_key_cache_upgrade, trans, _THIS_IP_);
Kent Overstreetae33e7a2022-08-04 12:46:37 -0400524 ret = btree_trans_restart(trans, BCH_ERR_transaction_restart_key_cache_upgrade);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500525 goto err;
526 }
527
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400528 ret = btree_key_cache_fill(trans, path, ck);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500529 if (ret)
530 goto err;
Kent Overstreet6f90e6b2023-01-25 10:15:39 -0500531
532 ret = bch2_btree_path_relock(trans, path, _THIS_IP_);
533 if (ret)
534 goto err;
535
536 path->uptodate = BTREE_ITER_UPTODATE;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500537 }
538
Kent Overstreet12590722020-11-19 15:38:27 -0500539 if (!test_bit(BKEY_CACHED_ACCESSED, &ck->flags))
540 set_bit(BKEY_CACHED_ACCESSED, &ck->flags);
541
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400542 BUG_ON(btree_node_locked_type(path, 0) != btree_lock_want(path, 0));
Kent Overstreet6f90e6b2023-01-25 10:15:39 -0500543 BUG_ON(path->uptodate);
Kent Overstreet53b3e3c2021-03-08 17:09:13 -0500544
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500545 return ret;
546err:
Kent Overstreet6f90e6b2023-01-25 10:15:39 -0500547 path->uptodate = BTREE_ITER_NEED_TRAVERSE;
Kent Overstreet549d1732022-07-17 23:06:38 -0400548 if (!bch2_err_matches(ret, BCH_ERR_transaction_restart)) {
Daniel Hill8bfe14e2022-07-14 18:58:23 +1200549 btree_node_unlock(trans, path, 0);
Kent Overstreet315c9ba2022-08-10 19:08:30 -0400550 path->l[0].b = ERR_PTR(ret);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500551 }
552 return ret;
553}
554
Kent Overstreet99e21462022-09-26 22:34:49 -0400555int bch2_btree_path_traverse_cached(struct btree_trans *trans, struct btree_path *path,
556 unsigned flags)
557{
558 struct bch_fs *c = trans->c;
559 struct bkey_cached *ck;
560 int ret = 0;
561
562 EBUG_ON(path->level);
563
564 path->l[1].b = NULL;
565
Kent Overstreetb8c5b162023-01-25 12:16:23 -0500566 if (bch2_btree_node_relock_notrace(trans, path, 0)) {
Kent Overstreet99e21462022-09-26 22:34:49 -0400567 ck = (void *) path->l[0].b;
568 goto fill;
569 }
570retry:
571 ck = bch2_btree_key_cache_find(c, path->btree_id, path->pos);
572 if (!ck) {
573 return bch2_btree_path_traverse_cached_slowpath(trans, path, flags);
574 } else {
575 enum six_lock_type lock_want = __btree_lock_want(path, 0);
576
577 ret = btree_node_lock(trans, path, (void *) ck, 0,
578 lock_want, _THIS_IP_);
579 EBUG_ON(ret && !bch2_err_matches(ret, BCH_ERR_transaction_restart));
580
581 if (ret)
582 return ret;
583
584 if (ck->key.btree_id != path->btree_id ||
Kent Overstreete88a75e2022-11-24 03:12:22 -0500585 !bpos_eq(ck->key.pos, path->pos)) {
Kent Overstreet99e21462022-09-26 22:34:49 -0400586 six_unlock_type(&ck->c.lock, lock_want);
587 goto retry;
588 }
589
Kent Overstreet5b7fbdc2023-09-09 21:14:54 -0400590 mark_btree_node_locked(trans, path, 0,
591 (enum btree_node_locked_type) lock_want);
Kent Overstreet99e21462022-09-26 22:34:49 -0400592 }
593
Kent Overstreet1fb4fe62023-05-20 23:57:48 -0400594 path->l[0].lock_seq = six_lock_seq(&ck->c.lock);
Kent Overstreet99e21462022-09-26 22:34:49 -0400595 path->l[0].b = (void *) ck;
596fill:
597 if (!ck->valid)
598 return bch2_btree_path_traverse_cached_slowpath(trans, path, flags);
599
600 if (!test_bit(BKEY_CACHED_ACCESSED, &ck->flags))
601 set_bit(BKEY_CACHED_ACCESSED, &ck->flags);
602
603 path->uptodate = BTREE_ITER_UPTODATE;
604 EBUG_ON(!ck->valid);
605 EBUG_ON(btree_node_locked_type(path, 0) != btree_lock_want(path, 0));
606
607 return ret;
608}
609
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500610static int btree_key_cache_flush_pos(struct btree_trans *trans,
611 struct bkey_cached_key key,
612 u64 journal_seq,
Kent Overstreet29402952021-04-03 16:24:13 -0400613 unsigned commit_flags,
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500614 bool evict)
615{
616 struct bch_fs *c = trans->c;
617 struct journal *j = &c->journal;
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400618 struct btree_iter c_iter, b_iter;
Kent Overstreetb206df62020-12-03 13:09:08 -0500619 struct bkey_cached *ck = NULL;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500620 int ret;
621
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400622 bch2_trans_iter_init(trans, &b_iter, key.btree_id, key.pos,
623 BTREE_ITER_SLOTS|
Kent Overstreetc075ff72021-03-04 22:29:25 -0500624 BTREE_ITER_INTENT|
625 BTREE_ITER_ALL_SNAPSHOTS);
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400626 bch2_trans_iter_init(trans, &c_iter, key.btree_id, key.pos,
627 BTREE_ITER_CACHED|
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400628 BTREE_ITER_INTENT);
Kent Overstreetf7b6ca22022-02-06 23:15:12 -0500629 b_iter.flags &= ~BTREE_ITER_WITH_KEY_CACHE;
630
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400631 ret = bch2_btree_iter_traverse(&c_iter);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500632 if (ret)
Kent Overstreeta6eba442021-07-23 18:26:38 -0400633 goto out;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500634
Kent Overstreet07f383c2023-12-04 00:39:38 -0500635 ck = (void *) btree_iter_path(trans, &c_iter)->l[0].b;
Kent Overstreeta9c0b122022-01-12 00:49:23 -0500636 if (!ck)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500637 goto out;
638
639 if (!test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
Kent Overstreeta9c0b122022-01-12 00:49:23 -0500640 if (evict)
641 goto evict;
642 goto out;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500643 }
644
Kent Overstreeta9c0b122022-01-12 00:49:23 -0500645 BUG_ON(!ck->valid);
646
647 if (journal_seq && ck->journal.seq != journal_seq)
648 goto out;
649
Kent Overstreetb4b79b02023-11-13 21:12:35 -0500650 trans->journal_res.seq = ck->journal.seq;
651
Kent Overstreetf09517f2021-04-20 17:09:25 -0400652 /*
Kent Overstreetb4b79b02023-11-13 21:12:35 -0500653 * If we're at the end of the journal, we really want to free up space
654 * in the journal right away - we don't want to pin that old journal
655 * sequence number with a new btree node write, we want to re-journal
656 * the update
Kent Overstreet3e3e02e2022-10-19 18:31:33 -0400657 */
Kent Overstreetb4b79b02023-11-13 21:12:35 -0500658 if (ck->journal.seq == journal_last_seq(j))
659 commit_flags |= BCH_WATERMARK_reclaim;
Kent Overstreet0c0ba8e2023-12-19 20:54:11 -0500660
661 if (ck->journal.seq != journal_last_seq(j) ||
662 j->watermark == BCH_WATERMARK_stripe)
Kent Overstreetb4b79b02023-11-13 21:12:35 -0500663 commit_flags |= BCH_TRANS_COMMIT_no_journal_res;
664
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400665 ret = bch2_btree_iter_traverse(&b_iter) ?:
666 bch2_trans_update(trans, &b_iter, ck->k,
Kent Overstreet12ce5b72022-01-12 01:14:47 -0500667 BTREE_UPDATE_KEY_CACHE_RECLAIM|
Kent Overstreetb00fde82021-07-05 22:16:02 -0400668 BTREE_UPDATE_INTERNAL_SNAPSHOT_NODE|
669 BTREE_TRIGGER_NORUN) ?:
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500670 bch2_trans_commit(trans, NULL, NULL,
Kent Overstreetcb52d23e2023-11-11 16:31:50 -0500671 BCH_TRANS_COMMIT_no_check_rw|
672 BCH_TRANS_COMMIT_no_enospc|
Kent Overstreet29402952021-04-03 16:24:13 -0400673 commit_flags);
Kent Overstreet549d1732022-07-17 23:06:38 -0400674
675 bch2_fs_fatal_err_on(ret &&
676 !bch2_err_matches(ret, BCH_ERR_transaction_restart) &&
677 !bch2_err_matches(ret, BCH_ERR_journal_reclaim_would_deadlock) &&
678 !bch2_journal_error(j), c,
Kent Overstreet3ed94062024-03-17 21:51:19 -0400679 "flushing key cache: %s", bch2_err_str(ret));
Kent Overstreet549d1732022-07-17 23:06:38 -0400680 if (ret)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500681 goto out;
682
683 bch2_journal_pin_drop(j, &ck->journal);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500684
Kent Overstreet07f383c2023-12-04 00:39:38 -0500685 struct btree_path *path = btree_iter_path(trans, &c_iter);
686 BUG_ON(!btree_node_locked(path, 0));
Kent Overstreet331194a2021-03-24 23:37:33 -0400687
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500688 if (!evict) {
Kent Overstreet6a747c42020-11-09 13:01:52 -0500689 if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
690 clear_bit(BKEY_CACHED_DIRTY, &ck->flags);
Kent Overstreet331194a2021-03-24 23:37:33 -0400691 atomic_long_dec(&c->btree_key_cache.nr_dirty);
Kent Overstreet6a747c42020-11-09 13:01:52 -0500692 }
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500693 } else {
Kent Overstreet38474c22022-09-02 22:59:39 -0400694 struct btree_path *path2;
Kent Overstreetccb7b082023-12-10 23:37:45 -0500695 unsigned i;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500696evict:
Kent Overstreetccb7b082023-12-10 23:37:45 -0500697 trans_for_each_path(trans, path2, i)
Kent Overstreet07f383c2023-12-04 00:39:38 -0500698 if (path2 != path)
Kent Overstreet38474c22022-09-02 22:59:39 -0400699 __bch2_btree_path_unlock(trans, path2);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500700
Kent Overstreet07f383c2023-12-04 00:39:38 -0500701 bch2_btree_node_lock_write_nofail(trans, path, &ck->c);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500702
Kent Overstreet6a747c42020-11-09 13:01:52 -0500703 if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
704 clear_bit(BKEY_CACHED_DIRTY, &ck->flags);
Kent Overstreet331194a2021-03-24 23:37:33 -0400705 atomic_long_dec(&c->btree_key_cache.nr_dirty);
Kent Overstreet6a747c42020-11-09 13:01:52 -0500706 }
707
Kent Overstreet07f383c2023-12-04 00:39:38 -0500708 mark_btree_node_locked_noreset(path, 0, BTREE_NODE_UNLOCKED);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500709 bkey_cached_evict(&c->btree_key_cache, ck);
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400710 bkey_cached_free_fast(&c->btree_key_cache, ck);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500711 }
712out:
Kent Overstreet67e0dd82021-08-30 15:18:31 -0400713 bch2_trans_iter_exit(trans, &b_iter);
714 bch2_trans_iter_exit(trans, &c_iter);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500715 return ret;
716}
717
Kent Overstreet241e2632021-03-31 21:44:55 -0400718int bch2_btree_key_cache_journal_flush(struct journal *j,
719 struct journal_entry_pin *pin, u64 seq)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500720{
721 struct bch_fs *c = container_of(j, struct bch_fs, journal);
722 struct bkey_cached *ck =
723 container_of(pin, struct bkey_cached, journal);
724 struct bkey_cached_key key;
Kent Overstreet6bd68ec2023-09-12 17:16:02 -0400725 struct btree_trans *trans = bch2_trans_get(c);
Kent Overstreetca7d8fc2022-08-21 14:29:43 -0400726 int srcu_idx = srcu_read_lock(&c->btree_trans_barrier);
Kent Overstreet29402952021-04-03 16:24:13 -0400727 int ret = 0;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500728
Kent Overstreet6bd68ec2023-09-12 17:16:02 -0400729 btree_node_lock_nopath_nofail(trans, &ck->c, SIX_LOCK_read);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500730 key = ck->key;
731
732 if (ck->journal.seq != seq ||
733 !test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
734 six_unlock_read(&ck->c.lock);
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500735 goto unlock;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500736 }
Kent Overstreet8322a932023-01-04 04:34:16 -0500737
738 if (ck->seq != seq) {
739 bch2_journal_pin_update(&c->journal, ck->seq, &ck->journal,
740 bch2_btree_key_cache_journal_flush);
741 six_unlock_read(&ck->c.lock);
742 goto unlock;
743 }
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500744 six_unlock_read(&ck->c.lock);
745
Kent Overstreetcf5bacb2023-11-27 01:46:18 -0500746 ret = lockrestart_do(trans,
Kent Overstreet6bd68ec2023-09-12 17:16:02 -0400747 btree_key_cache_flush_pos(trans, key, seq,
Kent Overstreetcb52d23e2023-11-11 16:31:50 -0500748 BCH_TRANS_COMMIT_journal_reclaim, false));
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500749unlock:
750 srcu_read_unlock(&c->btree_trans_barrier, srcu_idx);
Kent Overstreet29402952021-04-03 16:24:13 -0400751
Kent Overstreet6bd68ec2023-09-12 17:16:02 -0400752 bch2_trans_put(trans);
Kent Overstreet29402952021-04-03 16:24:13 -0400753 return ret;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500754}
755
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500756bool bch2_btree_insert_key_cached(struct btree_trans *trans,
Kent Overstreet30ca6ec2023-02-09 13:22:12 -0500757 unsigned flags,
Brian Fostere53d03f2023-03-02 09:03:37 -0500758 struct btree_insert_entry *insert_entry)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500759{
760 struct bch_fs *c = trans->c;
Kent Overstreet7f9821a2023-12-10 16:10:24 -0500761 struct bkey_cached *ck = (void *) (trans->paths + insert_entry->path)->l[0].b;
Brian Fostere53d03f2023-03-02 09:03:37 -0500762 struct bkey_i *insert = insert_entry->k;
Kent Overstreet8a92e542020-11-19 19:54:40 -0500763 bool kick_reclaim = false;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500764
Kent Overstreetac2ccdd2023-03-04 23:05:55 -0500765 BUG_ON(insert->k.u64s > ck->u64s);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500766
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500767 bkey_copy(ck->k, insert);
768 ck->valid = true;
769
770 if (!test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
Kent Overstreet3c471b62023-11-26 17:05:02 -0500771 EBUG_ON(test_bit(BCH_FS_clean_shutdown, &c->flags));
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500772 set_bit(BKEY_CACHED_DIRTY, &ck->flags);
Kent Overstreet331194a2021-03-24 23:37:33 -0400773 atomic_long_inc(&c->btree_key_cache.nr_dirty);
Kent Overstreet8a92e542020-11-19 19:54:40 -0500774
775 if (bch2_nr_btree_keys_need_flush(c))
776 kick_reclaim = true;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500777 }
778
Brian Fostere53d03f2023-03-02 09:03:37 -0500779 /*
780 * To minimize lock contention, we only add the journal pin here and
781 * defer pin updates to the flush callback via ->seq. Be careful not to
782 * update ->seq on nojournal commits because we don't want to update the
783 * pin to a seq that doesn't include journal updates on disk. Otherwise
784 * we risk losing the update after a crash.
785 *
786 * The only exception is if the pin is not active in the first place. We
787 * have to add the pin because journal reclaim drives key cache
788 * flushing. The flush callback will not proceed unless ->seq matches
789 * the latest pin, so make sure it starts with a consistent value.
790 */
791 if (!(insert_entry->flags & BTREE_UPDATE_NOJOURNAL) ||
792 !journal_pin_active(&ck->journal)) {
793 ck->seq = trans->journal_res.seq;
794 }
Kent Overstreet8322a932023-01-04 04:34:16 -0500795 bch2_journal_pin_add(&c->journal, trans->journal_res.seq,
796 &ck->journal, bch2_btree_key_cache_journal_flush);
Kent Overstreet8a92e542020-11-19 19:54:40 -0500797
798 if (kick_reclaim)
Kent Overstreetb7a9bbfc2020-11-19 20:55:33 -0500799 journal_reclaim_kick(&c->journal);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500800 return true;
801}
802
Kent Overstreet12ce5b72022-01-12 01:14:47 -0500803void bch2_btree_key_cache_drop(struct btree_trans *trans,
804 struct btree_path *path)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500805{
Kent Overstreet45b033f2022-08-11 21:06:43 -0400806 struct bch_fs *c = trans->c;
Kent Overstreet12ce5b72022-01-12 01:14:47 -0500807 struct bkey_cached *ck = (void *) path->l[0].b;
808
Kent Overstreet45b033f2022-08-11 21:06:43 -0400809 BUG_ON(!ck->valid);
Kent Overstreet12ce5b72022-01-12 01:14:47 -0500810
Kent Overstreet45b033f2022-08-11 21:06:43 -0400811 /*
812 * We just did an update to the btree, bypassing the key cache: the key
813 * cache key is now stale and must be dropped, even if dirty:
814 */
815 if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
816 clear_bit(BKEY_CACHED_DIRTY, &ck->flags);
817 atomic_long_dec(&c->btree_key_cache.nr_dirty);
818 bch2_journal_pin_drop(&c->journal, &ck->journal);
819 }
820
821 ck->valid = false;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500822}
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500823
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500824static unsigned long bch2_btree_key_cache_scan(struct shrinker *shrink,
825 struct shrink_control *sc)
826{
Linus Torvaldsecae0bd2023-11-02 19:38:47 -1000827 struct bch_fs *c = shrink->private_data;
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500828 struct btree_key_cache *bc = &c->btree_key_cache;
Kent Overstreet331194a2021-03-24 23:37:33 -0400829 struct bucket_table *tbl;
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500830 struct bkey_cached *ck, *t;
831 size_t scanned = 0, freed = 0, nr = sc->nr_to_scan;
Kent Overstreet331194a2021-03-24 23:37:33 -0400832 unsigned start, flags;
833 int srcu_idx;
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500834
Kent Overstreet0196eb82022-10-14 06:48:23 -0400835 mutex_lock(&bc->lock);
Kent Overstreet331194a2021-03-24 23:37:33 -0400836 srcu_idx = srcu_read_lock(&c->btree_trans_barrier);
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500837 flags = memalloc_nofs_save();
838
Kent Overstreet12590722020-11-19 15:38:27 -0500839 /*
840 * Newest freed entries are at the end of the list - once we hit one
841 * that's too new to be freed, we can bail out:
842 */
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500843 scanned += bc->nr_freed_nonpcpu;
844
Kent Overstreet3d21d482022-09-03 22:07:31 -0400845 list_for_each_entry_safe(ck, t, &bc->freed_nonpcpu, list) {
846 if (!poll_state_synchronize_srcu(&c->btree_trans_barrier,
847 ck->btree_trans_barrier_seq))
848 break;
849
850 list_del(&ck->list);
Kent Overstreet0d2234a2023-05-20 20:57:55 -0400851 six_lock_exit(&ck->c.lock);
Kent Overstreet3d21d482022-09-03 22:07:31 -0400852 kmem_cache_free(bch2_key_cache, ck);
853 atomic_long_dec(&bc->nr_freed);
Kent Overstreet3d21d482022-09-03 22:07:31 -0400854 freed++;
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500855 bc->nr_freed_nonpcpu--;
Kent Overstreet3d21d482022-09-03 22:07:31 -0400856 }
857
858 if (scanned >= nr)
859 goto out;
860
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500861 scanned += bc->nr_freed_pcpu;
862
Kent Overstreet3d21d482022-09-03 22:07:31 -0400863 list_for_each_entry_safe(ck, t, &bc->freed_pcpu, list) {
Kent Overstreet12590722020-11-19 15:38:27 -0500864 if (!poll_state_synchronize_srcu(&c->btree_trans_barrier,
865 ck->btree_trans_barrier_seq))
866 break;
867
868 list_del(&ck->list);
Kent Overstreet0d2234a2023-05-20 20:57:55 -0400869 six_lock_exit(&ck->c.lock);
Kent Overstreet12590722020-11-19 15:38:27 -0500870 kmem_cache_free(bch2_key_cache, ck);
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400871 atomic_long_dec(&bc->nr_freed);
Kent Overstreet12590722020-11-19 15:38:27 -0500872 freed++;
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500873 bc->nr_freed_pcpu--;
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500874 }
875
Kent Overstreet12590722020-11-19 15:38:27 -0500876 if (scanned >= nr)
877 goto out;
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500878
Kent Overstreet331194a2021-03-24 23:37:33 -0400879 rcu_read_lock();
880 tbl = rht_dereference_rcu(bc->table.tbl, &bc->table);
881 if (bc->shrink_iter >= tbl->size)
882 bc->shrink_iter = 0;
883 start = bc->shrink_iter;
884
885 do {
886 struct rhash_head *pos, *next;
887
888 pos = rht_ptr_rcu(rht_bucket(tbl, bc->shrink_iter));
889
890 while (!rht_is_a_nulls(pos)) {
891 next = rht_dereference_bucket_rcu(pos->next, tbl, bc->shrink_iter);
892 ck = container_of(pos, struct bkey_cached, hash);
893
894 if (test_bit(BKEY_CACHED_DIRTY, &ck->flags))
895 goto next;
896
897 if (test_bit(BKEY_CACHED_ACCESSED, &ck->flags))
898 clear_bit(BKEY_CACHED_ACCESSED, &ck->flags);
899 else if (bkey_cached_lock_for_evict(ck)) {
900 bkey_cached_evict(bc, ck);
901 bkey_cached_free(bc, ck);
902 }
903
904 scanned++;
905 if (scanned >= nr)
906 break;
907next:
908 pos = next;
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500909 }
910
Kent Overstreet331194a2021-03-24 23:37:33 -0400911 bc->shrink_iter++;
912 if (bc->shrink_iter >= tbl->size)
913 bc->shrink_iter = 0;
914 } while (scanned < nr && bc->shrink_iter != start);
915
916 rcu_read_unlock();
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500917out:
918 memalloc_nofs_restore(flags);
Kent Overstreet331194a2021-03-24 23:37:33 -0400919 srcu_read_unlock(&c->btree_trans_barrier, srcu_idx);
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500920 mutex_unlock(&bc->lock);
921
922 return freed;
923}
924
925static unsigned long bch2_btree_key_cache_count(struct shrinker *shrink,
926 struct shrink_control *sc)
927{
Linus Torvaldsecae0bd2023-11-02 19:38:47 -1000928 struct bch_fs *c = shrink->private_data;
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500929 struct btree_key_cache *bc = &c->btree_key_cache;
Kent Overstreetbaa65022021-04-27 14:02:00 -0400930 long nr = atomic_long_read(&bc->nr_keys) -
931 atomic_long_read(&bc->nr_dirty);
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500932
Kent Overstreetbaa65022021-04-27 14:02:00 -0400933 return max(0L, nr);
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500934}
935
Kent Overstreet6a747c42020-11-09 13:01:52 -0500936void bch2_fs_btree_key_cache_exit(struct btree_key_cache *bc)
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500937{
Kent Overstreet6a747c42020-11-09 13:01:52 -0500938 struct bch_fs *c = container_of(bc, struct bch_fs, btree_key_cache);
Kent Overstreet331194a2021-03-24 23:37:33 -0400939 struct bucket_table *tbl;
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500940 struct bkey_cached *ck, *n;
Kent Overstreet331194a2021-03-24 23:37:33 -0400941 struct rhash_head *pos;
Kent Overstreet5b3008b2023-03-02 23:51:47 -0500942 LIST_HEAD(items);
Kent Overstreet331194a2021-03-24 23:37:33 -0400943 unsigned i;
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400944#ifdef __KERNEL__
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400945 int cpu;
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400946#endif
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500947
Linus Torvaldsecae0bd2023-11-02 19:38:47 -1000948 shrinker_free(bc->shrink);
Kent Overstreet628a3ad2020-11-12 17:19:47 -0500949
Kent Overstreet6a747c42020-11-09 13:01:52 -0500950 mutex_lock(&bc->lock);
Kent Overstreet6a747c42020-11-09 13:01:52 -0500951
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400952 /*
953 * The loop is needed to guard against racing with rehash:
954 */
955 while (atomic_long_read(&bc->nr_keys)) {
956 rcu_read_lock();
957 tbl = rht_dereference_rcu(bc->table.tbl, &bc->table);
958 if (tbl)
959 for (i = 0; i < tbl->size; i++)
960 rht_for_each_entry_rcu(ck, pos, tbl, i, hash) {
961 bkey_cached_evict(bc, ck);
Kent Overstreet5b3008b2023-03-02 23:51:47 -0500962 list_add(&ck->list, &items);
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400963 }
964 rcu_read_unlock();
965 }
Kent Overstreet331194a2021-03-24 23:37:33 -0400966
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400967#ifdef __KERNEL__
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400968 for_each_possible_cpu(cpu) {
969 struct btree_key_cache_freelist *f =
970 per_cpu_ptr(bc->pcpu_freed, cpu);
971
972 for (i = 0; i < f->nr; i++) {
973 ck = f->objs[i];
Kent Overstreet5b3008b2023-03-02 23:51:47 -0500974 list_add(&ck->list, &items);
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400975 }
976 }
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400977#endif
Kent Overstreet8f7f5662022-06-17 01:07:54 -0400978
Kent Overstreetc65c13f2023-11-06 09:53:14 -0500979 BUG_ON(list_count_nodes(&bc->freed_pcpu) != bc->nr_freed_pcpu);
980 BUG_ON(list_count_nodes(&bc->freed_nonpcpu) != bc->nr_freed_nonpcpu);
981
Kent Overstreet5b3008b2023-03-02 23:51:47 -0500982 list_splice(&bc->freed_pcpu, &items);
983 list_splice(&bc->freed_nonpcpu, &items);
Kent Overstreet3d21d482022-09-03 22:07:31 -0400984
Kent Overstreet5b3008b2023-03-02 23:51:47 -0500985 mutex_unlock(&bc->lock);
986
987 list_for_each_entry_safe(ck, n, &items, list) {
Kent Overstreet1d8305c2020-12-13 16:12:04 -0500988 cond_resched();
989
Kent Overstreet331194a2021-03-24 23:37:33 -0400990 list_del(&ck->list);
Kent Overstreet2ca88e52019-03-07 19:46:10 -0500991 kfree(ck->k);
Kent Overstreet0d2234a2023-05-20 20:57:55 -0400992 six_lock_exit(&ck->c.lock);
Kent Overstreet14ba3702020-11-18 14:09:33 -0500993 kmem_cache_free(bch2_key_cache, ck);
994 }
Kent Overstreet331194a2021-03-24 23:37:33 -0400995
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400996 if (atomic_long_read(&bc->nr_dirty) &&
997 !bch2_journal_error(&c->journal) &&
Kent Overstreet3c471b62023-11-26 17:05:02 -0500998 test_bit(BCH_FS_was_rw, &c->flags))
Kent Overstreetfe5b37f2022-10-15 00:47:21 -0400999 panic("btree key cache shutdown error: nr_dirty nonzero (%li)\n",
1000 atomic_long_read(&bc->nr_dirty));
1001
1002 if (atomic_long_read(&bc->nr_keys))
1003 panic("btree key cache shutdown error: nr_keys nonzero (%li)\n",
1004 atomic_long_read(&bc->nr_keys));
Kent Overstreet331194a2021-03-24 23:37:33 -04001005
Kent Overstreetd0022292020-11-29 23:48:20 -05001006 if (bc->table_init_done)
1007 rhashtable_destroy(&bc->table);
Kent Overstreet8f7f5662022-06-17 01:07:54 -04001008
1009 free_percpu(bc->pcpu_freed);
Kent Overstreet2ca88e52019-03-07 19:46:10 -05001010}
1011
1012void bch2_fs_btree_key_cache_init_early(struct btree_key_cache *c)
1013{
1014 mutex_init(&c->lock);
Kent Overstreet3d21d482022-09-03 22:07:31 -04001015 INIT_LIST_HEAD(&c->freed_pcpu);
1016 INIT_LIST_HEAD(&c->freed_nonpcpu);
Kent Overstreet2ca88e52019-03-07 19:46:10 -05001017}
1018
Kent Overstreet628a3ad2020-11-12 17:19:47 -05001019int bch2_fs_btree_key_cache_init(struct btree_key_cache *bc)
Kent Overstreet2ca88e52019-03-07 19:46:10 -05001020{
Kent Overstreet628a3ad2020-11-12 17:19:47 -05001021 struct bch_fs *c = container_of(bc, struct bch_fs, btree_key_cache);
Linus Torvaldsecae0bd2023-11-02 19:38:47 -10001022 struct shrinker *shrink;
Kent Overstreet628a3ad2020-11-12 17:19:47 -05001023
Kent Overstreetfe5b37f2022-10-15 00:47:21 -04001024#ifdef __KERNEL__
Kent Overstreet8f7f5662022-06-17 01:07:54 -04001025 bc->pcpu_freed = alloc_percpu(struct btree_key_cache_freelist);
1026 if (!bc->pcpu_freed)
Kent Overstreet65d48e32023-03-14 15:35:57 -04001027 return -BCH_ERR_ENOMEM_fs_btree_cache_init;
Kent Overstreetfe5b37f2022-10-15 00:47:21 -04001028#endif
Kent Overstreet8f7f5662022-06-17 01:07:54 -04001029
Kent Overstreet65d48e32023-03-14 15:35:57 -04001030 if (rhashtable_init(&bc->table, &bch2_btree_key_cache_params))
1031 return -BCH_ERR_ENOMEM_fs_btree_cache_init;
Kent Overstreetd0022292020-11-29 23:48:20 -05001032
1033 bc->table_init_done = true;
Kent Overstreetf72b1fd2021-04-05 01:23:55 -04001034
Linus Torvaldsc9d01172023-11-07 11:38:38 -08001035 shrink = shrinker_alloc(0, "%s-btree_key_cache", c->name);
Linus Torvaldsecae0bd2023-11-02 19:38:47 -10001036 if (!shrink)
Kent Overstreet65d48e32023-03-14 15:35:57 -04001037 return -BCH_ERR_ENOMEM_fs_btree_cache_init;
Linus Torvaldsecae0bd2023-11-02 19:38:47 -10001038 bc->shrink = shrink;
1039 shrink->seeks = 0;
1040 shrink->count_objects = bch2_btree_key_cache_count;
1041 shrink->scan_objects = bch2_btree_key_cache_scan;
1042 shrink->private_data = c;
1043 shrinker_register(shrink);
Kent Overstreet65d48e32023-03-14 15:35:57 -04001044 return 0;
Kent Overstreet2ca88e52019-03-07 19:46:10 -05001045}
Kent Overstreetd211b402020-06-15 19:53:46 -04001046
1047void bch2_btree_key_cache_to_text(struct printbuf *out, struct btree_key_cache *c)
1048{
Nathan Chancellorf7ed15e2023-09-12 12:15:39 -07001049 prt_printf(out, "nr_freed:\t%lu", atomic_long_read(&c->nr_freed));
Kent Overstreetb2f83e72022-10-17 02:08:07 -04001050 prt_newline(out);
1051 prt_printf(out, "nr_keys:\t%lu", atomic_long_read(&c->nr_keys));
1052 prt_newline(out);
1053 prt_printf(out, "nr_dirty:\t%lu", atomic_long_read(&c->nr_dirty));
1054 prt_newline(out);
Kent Overstreetd211b402020-06-15 19:53:46 -04001055}
Kent Overstreet14ba3702020-11-18 14:09:33 -05001056
1057void bch2_btree_key_cache_exit(void)
1058{
Kent Overstreet3e3e02e2022-10-19 18:31:33 -04001059 kmem_cache_destroy(bch2_key_cache);
Kent Overstreet14ba3702020-11-18 14:09:33 -05001060}
1061
1062int __init bch2_btree_key_cache_init(void)
1063{
Mikulas Patocka5eaa76d2023-07-13 18:00:28 +02001064 bch2_key_cache = KMEM_CACHE(bkey_cached, SLAB_RECLAIM_ACCOUNT);
Kent Overstreet14ba3702020-11-18 14:09:33 -05001065 if (!bch2_key_cache)
1066 return -ENOMEM;
1067
1068 return 0;
1069}