Willy Tarreau | c218602 | 2009-10-26 19:48:54 +0100 | [diff] [blame] | 1 | /* |
| 2 | * Elastic Binary Trees - generic macros and structures. |
| 3 | * Version 5.0 |
| 4 | * (C) 2002-2009 - Willy Tarreau <w@1wt.eu> |
| 5 | * |
| 6 | * This program is free software; you can redistribute it and/or modify |
| 7 | * it under the terms of the GNU General Public License as published by |
| 8 | * the Free Software Foundation; either version 2 of the License, or |
| 9 | * (at your option) any later version. |
| 10 | * |
| 11 | * This program is distributed in the hope that it will be useful, |
| 12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 14 | * GNU General Public License for more details. |
| 15 | * |
| 16 | * You should have received a copy of the GNU General Public License |
| 17 | * along with this program; if not, write to the Free Software |
| 18 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| 19 | * |
| 20 | * |
| 21 | * Short history : |
| 22 | * |
| 23 | * 2007/09/28: full support for the duplicates tree => v3 |
| 24 | * 2007/07/08: merge back cleanups from kernel version. |
| 25 | * 2007/07/01: merge into Linux Kernel (try 1). |
| 26 | * 2007/05/27: version 2: compact everything into one single struct |
| 27 | * 2007/05/18: adapted the structure to support embedded nodes |
| 28 | * 2007/05/13: adapted to mempools v2. |
| 29 | */ |
| 30 | |
| 31 | |
| 32 | |
| 33 | /* |
| 34 | General idea: |
| 35 | ------------- |
| 36 | In a radix binary tree, we may have up to 2N-1 nodes for N keys if all of |
| 37 | them are leaves. If we find a way to differentiate intermediate nodes (later |
| 38 | called "nodes") and final nodes (later called "leaves"), and we associate |
| 39 | them by two, it is possible to build sort of a self-contained radix tree with |
| 40 | intermediate nodes always present. It will not be as cheap as the ultree for |
| 41 | optimal cases as shown below, but the optimal case almost never happens : |
| 42 | |
| 43 | Eg, to store 8, 10, 12, 13, 14 : |
| 44 | |
| 45 | ultree this theorical tree |
| 46 | |
| 47 | 8 8 |
| 48 | / \ / \ |
| 49 | 10 12 10 12 |
| 50 | / \ / \ |
| 51 | 13 14 12 14 |
| 52 | / \ |
| 53 | 12 13 |
| 54 | |
| 55 | Note that on real-world tests (with a scheduler), is was verified that the |
| 56 | case with data on an intermediate node never happens. This is because the |
| 57 | data spectrum is too large for such coincidences to happen. It would require |
| 58 | for instance that a task has its expiration time at an exact second, with |
| 59 | other tasks sharing that second. This is too rare to try to optimize for it. |
| 60 | |
| 61 | What is interesting is that the node will only be added above the leaf when |
| 62 | necessary, which implies that it will always remain somewhere above it. So |
| 63 | both the leaf and the node can share the exact value of the leaf, because |
| 64 | when going down the node, the bit mask will be applied to comparisons. So we |
| 65 | are tempted to have one single key shared between the node and the leaf. |
| 66 | |
| 67 | The bit only serves the nodes, and the dups only serve the leaves. So we can |
| 68 | put a lot of information in common. This results in one single entity with |
| 69 | two branch pointers and two parent pointers, one for the node part, and one |
| 70 | for the leaf part : |
| 71 | |
| 72 | node's leaf's |
| 73 | parent parent |
| 74 | | | |
| 75 | [node] [leaf] |
| 76 | / \ |
| 77 | left right |
| 78 | branch branch |
| 79 | |
| 80 | The node may very well refer to its leaf counterpart in one of its branches, |
| 81 | indicating that its own leaf is just below it : |
| 82 | |
| 83 | node's |
| 84 | parent |
| 85 | | |
| 86 | [node] |
| 87 | / \ |
| 88 | left [leaf] |
| 89 | branch |
| 90 | |
| 91 | Adding keys in such a tree simply consists in inserting nodes between |
| 92 | other nodes and/or leaves : |
| 93 | |
| 94 | [root] |
| 95 | | |
| 96 | [node2] |
| 97 | / \ |
| 98 | [leaf1] [node3] |
| 99 | / \ |
| 100 | [leaf2] [leaf3] |
| 101 | |
| 102 | On this diagram, we notice that [node2] and [leaf2] have been pulled away |
| 103 | from each other due to the insertion of [node3], just as if there would be |
| 104 | an elastic between both parts. This elastic-like behaviour gave its name to |
| 105 | the tree : "Elastic Binary Tree", or "EBtree". The entity which associates a |
| 106 | node part and a leaf part will be called an "EB node". |
| 107 | |
| 108 | We also notice on the diagram that there is a root entity required to attach |
| 109 | the tree. It only contains two branches and there is nothing above it. This |
| 110 | is an "EB root". Some will note that [leaf1] has no [node1]. One property of |
| 111 | the EBtree is that all nodes have their branches filled, and that if a node |
| 112 | has only one branch, it does not need to exist. Here, [leaf1] was added |
| 113 | below [root] and did not need any node. |
| 114 | |
| 115 | An EB node contains : |
| 116 | - a pointer to the node's parent (node_p) |
| 117 | - a pointer to the leaf's parent (leaf_p) |
| 118 | - two branches pointing to lower nodes or leaves (branches) |
| 119 | - a bit position (bit) |
| 120 | - an optional key. |
| 121 | |
| 122 | The key here is optional because it's used only during insertion, in order |
| 123 | to classify the nodes. Nothing else in the tree structure requires knowledge |
| 124 | of the key. This makes it possible to write type-agnostic primitives for |
| 125 | everything, and type-specific insertion primitives. This has led to consider |
| 126 | two types of EB nodes. The type-agnostic ones will serve as a header for the |
| 127 | other ones, and will simply be called "struct eb_node". The other ones will |
| 128 | have their type indicated in the structure name. Eg: "struct eb32_node" for |
| 129 | nodes carrying 32 bit keys. |
| 130 | |
| 131 | We will also node that the two branches in a node serve exactly the same |
| 132 | purpose as an EB root. For this reason, a "struct eb_root" will be used as |
| 133 | well inside the struct eb_node. In order to ease pointer manipulation and |
| 134 | ROOT detection when walking upwards, all the pointers inside an eb_node will |
| 135 | point to the eb_root part of the referenced EB nodes, relying on the same |
| 136 | principle as the linked lists in Linux. |
| 137 | |
| 138 | Another important point to note, is that when walking inside a tree, it is |
| 139 | very convenient to know where a node is attached in its parent, and what |
| 140 | type of branch it has below it (leaf or node). In order to simplify the |
| 141 | operations and to speed up the processing, it was decided in this specific |
| 142 | implementation to use the lowest bit from the pointer to designate the side |
| 143 | of the upper pointers (left/right) and the type of a branch (leaf/node). |
| 144 | This practise is not mandatory by design, but an implementation-specific |
| 145 | optimisation permitted on all platforms on which data must be aligned. All |
| 146 | known 32 bit platforms align their integers and pointers to 32 bits, leaving |
| 147 | the two lower bits unused. So, we say that the pointers are "tagged". And |
| 148 | since they designate pointers to root parts, we simply call them |
| 149 | "tagged root pointers", or "eb_troot" in the code. |
| 150 | |
| 151 | Duplicate keys are stored in a special manner. When inserting a key, if |
| 152 | the same one is found, then an incremental binary tree is built at this |
| 153 | place from these keys. This ensures that no special case has to be written |
| 154 | to handle duplicates when walking through the tree or when deleting entries. |
| 155 | It also guarantees that duplicates will be walked in the exact same order |
| 156 | they were inserted. This is very important when trying to achieve fair |
| 157 | processing distribution for instance. |
| 158 | |
| 159 | Algorithmic complexity can be derived from 3 variables : |
| 160 | - the number of possible different keys in the tree : P |
| 161 | - the number of entries in the tree : N |
| 162 | - the number of duplicates for one key : D |
| 163 | |
| 164 | Note that this tree is deliberately NOT balanced. For this reason, the worst |
| 165 | case may happen with a small tree (eg: 32 distinct keys of one bit). BUT, |
| 166 | the operations required to manage such data are so much cheap that they make |
| 167 | it worth using it even under such conditions. For instance, a balanced tree |
| 168 | may require only 6 levels to store those 32 keys when this tree will |
| 169 | require 32. But if per-level operations are 5 times cheaper, it wins. |
| 170 | |
| 171 | Minimal, Maximal and Average times are specified in number of operations. |
| 172 | Minimal is given for best condition, Maximal for worst condition, and the |
| 173 | average is reported for a tree containing random keys. An operation |
| 174 | generally consists in jumping from one node to the other. |
| 175 | |
| 176 | Complexity : |
| 177 | - lookup : min=1, max=log(P), avg=log(N) |
| 178 | - insertion from root : min=1, max=log(P), avg=log(N) |
| 179 | - insertion of dups : min=1, max=log(D), avg=log(D)/2 after lookup |
| 180 | - deletion : min=1, max=1, avg=1 |
| 181 | - prev/next : min=1, max=log(P), avg=2 : |
| 182 | N/2 nodes need 1 hop => 1*N/2 |
| 183 | N/4 nodes need 2 hops => 2*N/4 |
| 184 | N/8 nodes need 3 hops => 3*N/8 |
| 185 | ... |
| 186 | N/x nodes need log(x) hops => log2(x)*N/x |
| 187 | Total cost for all N nodes : sum[i=1..N](log2(i)*N/i) = N*sum[i=1..N](log2(i)/i) |
| 188 | Average cost across N nodes = total / N = sum[i=1..N](log2(i)/i) = 2 |
| 189 | |
| 190 | This design is currently limited to only two branches per node. Most of the |
| 191 | tree descent algorithm would be compatible with more branches (eg: 4, to cut |
| 192 | the height in half), but this would probably require more complex operations |
| 193 | and the deletion algorithm would be problematic. |
| 194 | |
| 195 | Useful properties : |
| 196 | - a node is always added above the leaf it is tied to, and never can get |
| 197 | below nor in another branch. This implies that leaves directly attached |
| 198 | to the root do not use their node part, which is indicated by a NULL |
| 199 | value in node_p. This also enhances the cache efficiency when walking |
| 200 | down the tree, because when the leaf is reached, its node part will |
| 201 | already have been visited (unless it's the first leaf in the tree). |
| 202 | |
| 203 | - pointers to lower nodes or leaves are stored in "branch" pointers. Only |
| 204 | the root node may have a NULL in either branch, it is not possible for |
| 205 | other branches. Since the nodes are attached to the left branch of the |
| 206 | root, it is not possible to see a NULL left branch when walking up a |
| 207 | tree. Thus, an empty tree is immediately identified by a NULL left |
| 208 | branch at the root. Conversely, the one and only way to identify the |
| 209 | root node is to check that it right branch is NULL. Note that the |
| 210 | NULL pointer may have a few low-order bits set. |
| 211 | |
| 212 | - a node connected to its own leaf will have branch[0|1] pointing to |
| 213 | itself, and leaf_p pointing to itself. |
| 214 | |
| 215 | - a node can never have node_p pointing to itself. |
| 216 | |
| 217 | - a node is linked in a tree if and only if it has a non-null leaf_p. |
| 218 | |
| 219 | - a node can never have both branches equal, except for the root which can |
| 220 | have them both NULL. |
| 221 | |
| 222 | - deletion only applies to leaves. When a leaf is deleted, its parent must |
| 223 | be released too (unless it's the root), and its sibling must attach to |
| 224 | the grand-parent, replacing the parent. Also, when a leaf is deleted, |
| 225 | the node tied to this leaf will be removed and must be released too. If |
| 226 | this node is different from the leaf's parent, the freshly released |
| 227 | leaf's parent will be used to replace the node which must go. A released |
| 228 | node will never be used anymore, so there's no point in tracking it. |
| 229 | |
| 230 | - the bit index in a node indicates the bit position in the key which is |
| 231 | represented by the branches. That means that a node with (bit == 0) is |
| 232 | just above two leaves. Negative bit values are used to build a duplicate |
| 233 | tree. The first node above two identical leaves gets (bit == -1). This |
| 234 | value logarithmically decreases as the duplicate tree grows. During |
| 235 | duplicate insertion, a node is inserted above the highest bit value (the |
| 236 | lowest absolute value) in the tree during the right-sided walk. If bit |
| 237 | -1 is not encountered (highest < -1), we insert above last leaf. |
| 238 | Otherwise, we insert above the node with the highest value which was not |
| 239 | equal to the one of its parent + 1. |
| 240 | |
| 241 | - the "eb_next" primitive walks from left to right, which means from lower |
| 242 | to higher keys. It returns duplicates in the order they were inserted. |
| 243 | The "eb_first" primitive returns the left-most entry. |
| 244 | |
| 245 | - the "eb_prev" primitive walks from right to left, which means from |
| 246 | higher to lower keys. It returns duplicates in the opposite order they |
| 247 | were inserted. The "eb_last" primitive returns the right-most entry. |
| 248 | |
| 249 | - a tree which has 1 in the lower bit of its root's right branch is a |
| 250 | tree with unique nodes. This means that when a node is inserted with |
| 251 | a key which already exists will not be inserted, and the previous |
| 252 | entry will be returned. |
| 253 | |
| 254 | */ |
| 255 | |
| 256 | #ifndef _EBTREE_H |
| 257 | #define _EBTREE_H |
| 258 | |
| 259 | #include <stdlib.h> |
Willy Tarreau | cc05fba | 2009-10-27 21:40:18 +0100 | [diff] [blame] | 260 | #include "compiler.h" |
Willy Tarreau | c218602 | 2009-10-26 19:48:54 +0100 | [diff] [blame] | 261 | |
| 262 | /* Note: we never need to run fls on null keys, so we can optimize the fls |
| 263 | * function by removing a conditional jump. |
| 264 | */ |
| 265 | #if defined(__i386__) |
| 266 | static inline int flsnz(int x) |
| 267 | { |
| 268 | int r; |
| 269 | __asm__("bsrl %1,%0\n" |
| 270 | : "=r" (r) : "rm" (x)); |
| 271 | return r+1; |
| 272 | } |
| 273 | #else |
| 274 | // returns 1 to 32 for 1<<0 to 1<<31. Undefined for 0. |
| 275 | #define flsnz(___a) ({ \ |
| 276 | register int ___x, ___bits = 0; \ |
| 277 | ___x = (___a); \ |
| 278 | if (___x & 0xffff0000) { ___x &= 0xffff0000; ___bits += 16;} \ |
| 279 | if (___x & 0xff00ff00) { ___x &= 0xff00ff00; ___bits += 8;} \ |
| 280 | if (___x & 0xf0f0f0f0) { ___x &= 0xf0f0f0f0; ___bits += 4;} \ |
| 281 | if (___x & 0xcccccccc) { ___x &= 0xcccccccc; ___bits += 2;} \ |
| 282 | if (___x & 0xaaaaaaaa) { ___x &= 0xaaaaaaaa; ___bits += 1;} \ |
| 283 | ___bits + 1; \ |
| 284 | }) |
| 285 | #endif |
| 286 | |
| 287 | static inline int fls64(unsigned long long x) |
| 288 | { |
| 289 | unsigned int h; |
| 290 | unsigned int bits = 32; |
| 291 | |
| 292 | h = x >> 32; |
| 293 | if (!h) { |
| 294 | h = x; |
| 295 | bits = 0; |
| 296 | } |
| 297 | return flsnz(h) + bits; |
| 298 | } |
| 299 | |
| 300 | #define fls_auto(x) ((sizeof(x) > 4) ? fls64(x) : flsnz(x)) |
| 301 | |
| 302 | /* Linux-like "container_of". It returns a pointer to the structure of type |
| 303 | * <type> which has its member <name> stored at address <ptr>. |
| 304 | */ |
| 305 | #ifndef container_of |
| 306 | #define container_of(ptr, type, name) ((type *)(((void *)(ptr)) - ((long)&((type *)0)->name))) |
| 307 | #endif |
| 308 | |
Willy Tarreau | c218602 | 2009-10-26 19:48:54 +0100 | [diff] [blame] | 309 | /* Number of bits per node, and number of leaves per node */ |
| 310 | #define EB_NODE_BITS 1 |
| 311 | #define EB_NODE_BRANCHES (1 << EB_NODE_BITS) |
| 312 | #define EB_NODE_BRANCH_MASK (EB_NODE_BRANCHES - 1) |
| 313 | |
| 314 | /* Be careful not to tweak those values. The walking code is optimized for NULL |
| 315 | * detection on the assumption that the following values are intact. |
| 316 | */ |
| 317 | #define EB_LEFT 0 |
| 318 | #define EB_RGHT 1 |
| 319 | #define EB_LEAF 0 |
| 320 | #define EB_NODE 1 |
| 321 | |
| 322 | /* Tags to set in root->b[EB_RGHT] : |
| 323 | * - EB_NORMAL is a normal tree which stores duplicate keys. |
| 324 | * - EB_UNIQUE is a tree which stores unique keys. |
| 325 | */ |
| 326 | #define EB_NORMAL 0 |
| 327 | #define EB_UNIQUE 1 |
| 328 | |
| 329 | /* This is the same as an eb_node pointer, except that the lower bit embeds |
| 330 | * a tag. See eb_dotag()/eb_untag()/eb_gettag(). This tag has two meanings : |
| 331 | * - 0=left, 1=right to designate the parent's branch for leaf_p/node_p |
| 332 | * - 0=link, 1=leaf to designate the branch's type for branch[] |
| 333 | */ |
| 334 | typedef void eb_troot_t; |
| 335 | |
| 336 | /* The eb_root connects the node which contains it, to two nodes below it, one |
| 337 | * of which may be the same node. At the top of the tree, we use an eb_root |
| 338 | * too, which always has its right branch NULL (+/1 low-order bits). |
| 339 | */ |
| 340 | struct eb_root { |
| 341 | eb_troot_t *b[EB_NODE_BRANCHES]; /* left and right branches */ |
| 342 | }; |
| 343 | |
| 344 | /* The eb_node contains the two parts, one for the leaf, which always exists, |
| 345 | * and one for the node, which remains unused in the very first node inserted |
| 346 | * into the tree. This structure is 20 bytes per node on 32-bit machines. Do |
| 347 | * not change the order, benchmarks have shown that it's optimal this way. |
| 348 | */ |
| 349 | struct eb_node { |
| 350 | struct eb_root branches; /* branches, must be at the beginning */ |
| 351 | eb_troot_t *node_p; /* link node's parent */ |
| 352 | eb_troot_t *leaf_p; /* leaf node's parent */ |
| 353 | int bit; /* link's bit position. */ |
| 354 | }; |
| 355 | |
| 356 | /* Return the structure of type <type> whose member <member> points to <ptr> */ |
| 357 | #define eb_entry(ptr, type, member) container_of(ptr, type, member) |
| 358 | |
| 359 | /* The root of a tree is an eb_root initialized with both pointers NULL. |
| 360 | * During its life, only the left pointer will change. The right one will |
| 361 | * always remain NULL, which is the way we detect it. |
| 362 | */ |
| 363 | #define EB_ROOT \ |
| 364 | (struct eb_root) { \ |
| 365 | .b = {[0] = NULL, [1] = NULL }, \ |
| 366 | } |
| 367 | |
| 368 | #define EB_ROOT_UNIQUE \ |
| 369 | (struct eb_root) { \ |
| 370 | .b = {[0] = NULL, [1] = (void *)1 }, \ |
| 371 | } |
| 372 | |
| 373 | #define EB_TREE_HEAD(name) \ |
| 374 | struct eb_root name = EB_ROOT |
| 375 | |
| 376 | |
| 377 | /***************************************\ |
| 378 | * Private functions. Not for end-user * |
| 379 | \***************************************/ |
| 380 | |
| 381 | /* Converts a root pointer to its equivalent eb_troot_t pointer, |
| 382 | * ready to be stored in ->branch[], leaf_p or node_p. NULL is not |
| 383 | * conserved. To be used with EB_LEAF, EB_NODE, EB_LEFT or EB_RGHT in <tag>. |
| 384 | */ |
| 385 | static inline eb_troot_t *eb_dotag(const struct eb_root *root, const int tag) |
| 386 | { |
| 387 | return (eb_troot_t *)((void *)root + tag); |
| 388 | } |
| 389 | |
| 390 | /* Converts an eb_troot_t pointer pointer to its equivalent eb_root pointer, |
| 391 | * for use with pointers from ->branch[], leaf_p or node_p. NULL is conserved |
| 392 | * as long as the tree is not corrupted. To be used with EB_LEAF, EB_NODE, |
| 393 | * EB_LEFT or EB_RGHT in <tag>. |
| 394 | */ |
| 395 | static inline struct eb_root *eb_untag(const eb_troot_t *troot, const int tag) |
| 396 | { |
| 397 | return (struct eb_root *)((void *)troot - tag); |
| 398 | } |
| 399 | |
| 400 | /* returns the tag associated with an eb_troot_t pointer */ |
| 401 | static inline int eb_gettag(eb_troot_t *troot) |
| 402 | { |
| 403 | return (unsigned long)troot & 1; |
| 404 | } |
| 405 | |
| 406 | /* Converts a root pointer to its equivalent eb_troot_t pointer and clears the |
| 407 | * tag, no matter what its value was. |
| 408 | */ |
| 409 | static inline struct eb_root *eb_clrtag(const eb_troot_t *troot) |
| 410 | { |
| 411 | return (struct eb_root *)((unsigned long)troot & ~1UL); |
| 412 | } |
| 413 | |
| 414 | /* Returns a pointer to the eb_node holding <root> */ |
| 415 | static inline struct eb_node *eb_root_to_node(struct eb_root *root) |
| 416 | { |
| 417 | return container_of(root, struct eb_node, branches); |
| 418 | } |
| 419 | |
| 420 | /* Walks down starting at root pointer <start>, and always walking on side |
| 421 | * <side>. It either returns the node hosting the first leaf on that side, |
| 422 | * or NULL if no leaf is found. <start> may either be NULL or a branch pointer. |
| 423 | * The pointer to the leaf (or NULL) is returned. |
| 424 | */ |
| 425 | static inline struct eb_node *eb_walk_down(eb_troot_t *start, unsigned int side) |
| 426 | { |
| 427 | /* A NULL pointer on an empty tree root will be returned as-is */ |
| 428 | while (eb_gettag(start) == EB_NODE) |
| 429 | start = (eb_untag(start, EB_NODE))->b[side]; |
| 430 | /* NULL is left untouched (root==eb_node, EB_LEAF==0) */ |
| 431 | return eb_root_to_node(eb_untag(start, EB_LEAF)); |
| 432 | } |
| 433 | |
| 434 | /* This function is used to build a tree of duplicates by adding a new node to |
| 435 | * a subtree of at least 2 entries. It will probably never be needed inlined, |
| 436 | * and it is not for end-user. |
| 437 | */ |
| 438 | static forceinline struct eb_node * |
| 439 | __eb_insert_dup(struct eb_node *sub, struct eb_node *new) |
| 440 | { |
| 441 | struct eb_node *head = sub; |
| 442 | |
| 443 | struct eb_troot *new_left = eb_dotag(&new->branches, EB_LEFT); |
| 444 | struct eb_troot *new_rght = eb_dotag(&new->branches, EB_RGHT); |
| 445 | struct eb_troot *new_leaf = eb_dotag(&new->branches, EB_LEAF); |
| 446 | |
| 447 | /* first, identify the deepest hole on the right branch */ |
| 448 | while (eb_gettag(head->branches.b[EB_RGHT]) != EB_LEAF) { |
| 449 | struct eb_node *last = head; |
| 450 | head = container_of(eb_untag(head->branches.b[EB_RGHT], EB_NODE), |
| 451 | struct eb_node, branches); |
| 452 | if (head->bit > last->bit + 1) |
| 453 | sub = head; /* there's a hole here */ |
| 454 | } |
| 455 | |
| 456 | /* Here we have a leaf attached to (head)->b[EB_RGHT] */ |
| 457 | if (head->bit < -1) { |
| 458 | /* A hole exists just before the leaf, we insert there */ |
| 459 | new->bit = -1; |
| 460 | sub = container_of(eb_untag(head->branches.b[EB_RGHT], EB_LEAF), |
| 461 | struct eb_node, branches); |
| 462 | head->branches.b[EB_RGHT] = eb_dotag(&new->branches, EB_NODE); |
| 463 | |
| 464 | new->node_p = sub->leaf_p; |
| 465 | new->leaf_p = new_rght; |
| 466 | sub->leaf_p = new_left; |
| 467 | new->branches.b[EB_LEFT] = eb_dotag(&sub->branches, EB_LEAF); |
| 468 | new->branches.b[EB_RGHT] = new_leaf; |
| 469 | return new; |
| 470 | } else { |
| 471 | int side; |
| 472 | /* No hole was found before a leaf. We have to insert above |
| 473 | * <sub>. Note that we cannot be certain that <sub> is attached |
| 474 | * to the right of its parent, as this is only true if <sub> |
| 475 | * is inside the dup tree, not at the head. |
| 476 | */ |
| 477 | new->bit = sub->bit - 1; /* install at the lowest level */ |
| 478 | side = eb_gettag(sub->node_p); |
| 479 | head = container_of(eb_untag(sub->node_p, side), struct eb_node, branches); |
| 480 | head->branches.b[side] = eb_dotag(&new->branches, EB_NODE); |
| 481 | |
| 482 | new->node_p = sub->node_p; |
| 483 | new->leaf_p = new_rght; |
| 484 | sub->node_p = new_left; |
| 485 | new->branches.b[EB_LEFT] = eb_dotag(&sub->branches, EB_NODE); |
| 486 | new->branches.b[EB_RGHT] = new_leaf; |
| 487 | return new; |
| 488 | } |
| 489 | } |
| 490 | |
| 491 | |
| 492 | /**************************************\ |
| 493 | * Public functions, for the end-user * |
| 494 | \**************************************/ |
| 495 | |
| 496 | /* Return the first leaf in the tree starting at <root>, or NULL if none */ |
| 497 | static inline struct eb_node *eb_first(struct eb_root *root) |
| 498 | { |
| 499 | return eb_walk_down(root->b[0], EB_LEFT); |
| 500 | } |
| 501 | |
| 502 | /* Return the last leaf in the tree starting at <root>, or NULL if none */ |
| 503 | static inline struct eb_node *eb_last(struct eb_root *root) |
| 504 | { |
| 505 | return eb_walk_down(root->b[0], EB_RGHT); |
| 506 | } |
| 507 | |
| 508 | /* Return previous leaf node before an existing leaf node, or NULL if none. */ |
| 509 | static inline struct eb_node *eb_prev(struct eb_node *node) |
| 510 | { |
| 511 | eb_troot_t *t = node->leaf_p; |
| 512 | |
| 513 | while (eb_gettag(t) == EB_LEFT) { |
| 514 | /* Walking up from left branch. We must ensure that we never |
| 515 | * walk beyond root. |
| 516 | */ |
| 517 | if (unlikely(eb_clrtag((eb_untag(t, EB_LEFT))->b[EB_RGHT]) == NULL)) |
| 518 | return NULL; |
| 519 | t = (eb_root_to_node(eb_untag(t, EB_LEFT)))->node_p; |
| 520 | } |
| 521 | /* Note that <t> cannot be NULL at this stage */ |
| 522 | t = (eb_untag(t, EB_RGHT))->b[EB_LEFT]; |
| 523 | return eb_walk_down(t, EB_RGHT); |
| 524 | } |
| 525 | |
| 526 | /* Return next leaf node after an existing leaf node, or NULL if none. */ |
| 527 | static inline struct eb_node *eb_next(struct eb_node *node) |
| 528 | { |
| 529 | eb_troot_t *t = node->leaf_p; |
| 530 | |
| 531 | while (eb_gettag(t) != EB_LEFT) |
| 532 | /* Walking up from right branch, so we cannot be below root */ |
| 533 | t = (eb_root_to_node(eb_untag(t, EB_RGHT)))->node_p; |
| 534 | |
| 535 | /* Note that <t> cannot be NULL at this stage */ |
| 536 | t = (eb_untag(t, EB_LEFT))->b[EB_RGHT]; |
| 537 | if (eb_clrtag(t) == NULL) |
| 538 | return NULL; |
| 539 | return eb_walk_down(t, EB_LEFT); |
| 540 | } |
| 541 | |
| 542 | /* Return previous leaf node before an existing leaf node, skipping duplicates, |
| 543 | * or NULL if none. */ |
| 544 | static inline struct eb_node *eb_prev_unique(struct eb_node *node) |
| 545 | { |
| 546 | eb_troot_t *t = node->leaf_p; |
| 547 | |
| 548 | while (1) { |
| 549 | if (eb_gettag(t) != EB_LEFT) { |
| 550 | node = eb_root_to_node(eb_untag(t, EB_RGHT)); |
| 551 | /* if we're right and not in duplicates, stop here */ |
| 552 | if (node->bit >= 0) |
| 553 | break; |
| 554 | t = node->node_p; |
| 555 | } |
| 556 | else { |
| 557 | /* Walking up from left branch. We must ensure that we never |
| 558 | * walk beyond root. |
| 559 | */ |
| 560 | if (unlikely(eb_clrtag((eb_untag(t, EB_LEFT))->b[EB_RGHT]) == NULL)) |
| 561 | return NULL; |
| 562 | t = (eb_root_to_node(eb_untag(t, EB_LEFT)))->node_p; |
| 563 | } |
| 564 | } |
| 565 | /* Note that <t> cannot be NULL at this stage */ |
| 566 | t = (eb_untag(t, EB_RGHT))->b[EB_LEFT]; |
| 567 | return eb_walk_down(t, EB_RGHT); |
| 568 | } |
| 569 | |
| 570 | /* Return next leaf node after an existing leaf node, skipping duplicates, or |
| 571 | * NULL if none. |
| 572 | */ |
| 573 | static inline struct eb_node *eb_next_unique(struct eb_node *node) |
| 574 | { |
| 575 | eb_troot_t *t = node->leaf_p; |
| 576 | |
| 577 | while (1) { |
| 578 | if (eb_gettag(t) == EB_LEFT) { |
| 579 | if (unlikely(eb_clrtag((eb_untag(t, EB_LEFT))->b[EB_RGHT]) == NULL)) |
| 580 | return NULL; /* we reached root */ |
| 581 | node = eb_root_to_node(eb_untag(t, EB_LEFT)); |
| 582 | /* if we're left and not in duplicates, stop here */ |
| 583 | if (node->bit >= 0) |
| 584 | break; |
| 585 | t = node->node_p; |
| 586 | } |
| 587 | else { |
| 588 | /* Walking up from right branch, so we cannot be below root */ |
| 589 | t = (eb_root_to_node(eb_untag(t, EB_RGHT)))->node_p; |
| 590 | } |
| 591 | } |
| 592 | |
| 593 | /* Note that <t> cannot be NULL at this stage */ |
| 594 | t = (eb_untag(t, EB_LEFT))->b[EB_RGHT]; |
| 595 | if (eb_clrtag(t) == NULL) |
| 596 | return NULL; |
| 597 | return eb_walk_down(t, EB_LEFT); |
| 598 | } |
| 599 | |
| 600 | |
| 601 | /* Removes a leaf node from the tree if it was still in it. Marks the node |
| 602 | * as unlinked. |
| 603 | */ |
| 604 | static forceinline void __eb_delete(struct eb_node *node) |
| 605 | { |
| 606 | __label__ delete_unlink; |
| 607 | unsigned int pside, gpside, sibtype; |
| 608 | struct eb_node *parent; |
| 609 | struct eb_root *gparent; |
| 610 | |
| 611 | if (!node->leaf_p) |
| 612 | return; |
| 613 | |
| 614 | /* we need the parent, our side, and the grand parent */ |
| 615 | pside = eb_gettag(node->leaf_p); |
| 616 | parent = eb_root_to_node(eb_untag(node->leaf_p, pside)); |
| 617 | |
| 618 | /* We likely have to release the parent link, unless it's the root, |
| 619 | * in which case we only set our branch to NULL. Note that we can |
| 620 | * only be attached to the root by its left branch. |
| 621 | */ |
| 622 | |
| 623 | if (eb_clrtag(parent->branches.b[EB_RGHT]) == NULL) { |
| 624 | /* we're just below the root, it's trivial. */ |
| 625 | parent->branches.b[EB_LEFT] = NULL; |
| 626 | goto delete_unlink; |
| 627 | } |
| 628 | |
| 629 | /* To release our parent, we have to identify our sibling, and reparent |
| 630 | * it directly to/from the grand parent. Note that the sibling can |
| 631 | * either be a link or a leaf. |
| 632 | */ |
| 633 | |
| 634 | gpside = eb_gettag(parent->node_p); |
| 635 | gparent = eb_untag(parent->node_p, gpside); |
| 636 | |
| 637 | gparent->b[gpside] = parent->branches.b[!pside]; |
| 638 | sibtype = eb_gettag(gparent->b[gpside]); |
| 639 | |
| 640 | if (sibtype == EB_LEAF) { |
| 641 | eb_root_to_node(eb_untag(gparent->b[gpside], EB_LEAF))->leaf_p = |
| 642 | eb_dotag(gparent, gpside); |
| 643 | } else { |
| 644 | eb_root_to_node(eb_untag(gparent->b[gpside], EB_NODE))->node_p = |
| 645 | eb_dotag(gparent, gpside); |
| 646 | } |
| 647 | /* Mark the parent unused. Note that we do not check if the parent is |
| 648 | * our own node, but that's not a problem because if it is, it will be |
| 649 | * marked unused at the same time, which we'll use below to know we can |
| 650 | * safely remove it. |
| 651 | */ |
| 652 | parent->node_p = NULL; |
| 653 | |
| 654 | /* The parent node has been detached, and is currently unused. It may |
| 655 | * belong to another node, so we cannot remove it that way. Also, our |
| 656 | * own node part might still be used. so we can use this spare node |
| 657 | * to replace ours if needed. |
| 658 | */ |
| 659 | |
| 660 | /* If our link part is unused, we can safely exit now */ |
| 661 | if (!node->node_p) |
| 662 | goto delete_unlink; |
| 663 | |
| 664 | /* From now on, <node> and <parent> are necessarily different, and the |
| 665 | * <node>'s node part is in use. By definition, <parent> is at least |
| 666 | * below <node>, so keeping its key for the bit string is OK. |
| 667 | */ |
| 668 | |
| 669 | parent->node_p = node->node_p; |
| 670 | parent->branches = node->branches; |
| 671 | parent->bit = node->bit; |
| 672 | |
| 673 | /* We must now update the new node's parent... */ |
| 674 | gpside = eb_gettag(parent->node_p); |
| 675 | gparent = eb_untag(parent->node_p, gpside); |
| 676 | gparent->b[gpside] = eb_dotag(&parent->branches, EB_NODE); |
| 677 | |
| 678 | /* ... and its branches */ |
| 679 | for (pside = 0; pside <= 1; pside++) { |
| 680 | if (eb_gettag(parent->branches.b[pside]) == EB_NODE) { |
| 681 | eb_root_to_node(eb_untag(parent->branches.b[pside], EB_NODE))->node_p = |
| 682 | eb_dotag(&parent->branches, pside); |
| 683 | } else { |
| 684 | eb_root_to_node(eb_untag(parent->branches.b[pside], EB_LEAF))->leaf_p = |
| 685 | eb_dotag(&parent->branches, pside); |
| 686 | } |
| 687 | } |
| 688 | delete_unlink: |
| 689 | /* Now the node has been completely unlinked */ |
| 690 | node->leaf_p = NULL; |
| 691 | return; /* tree is not empty yet */ |
| 692 | } |
| 693 | |
| 694 | /* Compare blocks <a> and <b> byte-to-byte, from bit <ignore> to bit <len-1>. |
| 695 | * Return the number of equal bits between strings, assuming that the first |
| 696 | * <ignore> bits are already identical. It is possible to return slightly more |
| 697 | * than <len> bits if <len> does not stop on a byte boundary and we find exact |
| 698 | * bytes. Note that parts or all of <ignore> bits may be rechecked. It is only |
| 699 | * passed here as a hint to speed up the check. |
| 700 | */ |
| 701 | static forceinline unsigned int equal_bits(const unsigned char *a, |
| 702 | const unsigned char *b, |
| 703 | unsigned int ignore, unsigned int len) |
| 704 | { |
| 705 | unsigned int beg; |
| 706 | unsigned int end; |
| 707 | unsigned int ret; |
| 708 | unsigned char c; |
| 709 | |
| 710 | beg = ignore >> 3; |
| 711 | end = (len + 7) >> 3; |
| 712 | ret = end << 3; |
| 713 | |
| 714 | do { |
| 715 | if (beg >= end) |
| 716 | goto out; |
| 717 | beg++; |
| 718 | c = a[beg-1] ^ b[beg-1]; |
| 719 | } while (!c); |
| 720 | |
| 721 | /* OK now we know that a and b differ at byte <beg> and that <c> holds |
| 722 | * the bit differences. We have to find what bit is differing and report |
| 723 | * it as the number of identical bits. Note that low bit numbers are |
| 724 | * assigned to high positions in the byte, as we compare them as strings. |
| 725 | */ |
| 726 | ret = beg << 3; |
| 727 | if (c & 0xf0) { c >>= 4; ret -= 4; } |
| 728 | if (c & 0x0c) { c >>= 2; ret -= 2; } |
| 729 | ret -= (c >> 1); |
| 730 | ret--; |
| 731 | out: |
| 732 | return ret; |
| 733 | } |
| 734 | |
| 735 | /* Compare strings <a> and <b> byte-to-byte, from bit <ignore> to the last 0. |
| 736 | * Return the number of equal bits between strings, assuming that the first |
| 737 | * <ignore> bits are already identical. Note that parts or all of <ignore> bits |
| 738 | * may be rechecked. It is only passed here as a hint to speed up the check. |
| 739 | * The caller is responsible for not passing an <ignore> value larger than any |
| 740 | * of the two strings. However, referencing any bit from the trailing zero is |
| 741 | * permitted. |
| 742 | */ |
| 743 | static forceinline unsigned int string_equal_bits(const unsigned char *a, |
| 744 | const unsigned char *b, |
| 745 | unsigned int ignore) |
| 746 | { |
| 747 | unsigned int beg; |
| 748 | unsigned char c; |
| 749 | |
| 750 | beg = ignore >> 3; |
| 751 | |
| 752 | /* skip known and identical bits. We stop at the first different byte |
| 753 | * or at the first zero we encounter on either side. |
| 754 | */ |
| 755 | while (1) { |
| 756 | unsigned char d; |
| 757 | |
| 758 | c = a[beg]; |
| 759 | d = b[beg]; |
| 760 | beg++; |
| 761 | |
| 762 | c ^= d; |
| 763 | if (c) |
| 764 | break; |
| 765 | if (!d) |
| 766 | break; |
| 767 | } |
| 768 | |
| 769 | /* OK now we know that a and b differ at byte <beg>, or that both are zero. |
| 770 | * We have to find what bit is differing and report it as the number of |
| 771 | * identical bits. Note that low bit numbers are assigned to high positions |
| 772 | * in the byte, as we compare them as strings. |
| 773 | */ |
| 774 | beg <<= 3; |
| 775 | if (c & 0xf0) { c >>= 4; beg -= 4; } |
| 776 | if (c & 0x0c) { c >>= 2; beg -= 2; } |
| 777 | beg -= (c >> 1); |
| 778 | if (c) |
| 779 | beg--; |
| 780 | |
| 781 | return beg; |
| 782 | } |
| 783 | |
| 784 | static forceinline int cmp_bits(const unsigned char *a, const unsigned char *b, unsigned int pos) |
| 785 | { |
| 786 | unsigned int ofs; |
| 787 | unsigned char bit_a, bit_b; |
| 788 | |
| 789 | ofs = pos >> 3; |
| 790 | pos = ~pos & 7; |
| 791 | |
| 792 | bit_a = (a[ofs] >> pos) & 1; |
| 793 | bit_b = (b[ofs] >> pos) & 1; |
| 794 | |
| 795 | return bit_a - bit_b; /* -1: a<b; 0: a=b; 1: a>b */ |
| 796 | } |
| 797 | |
| 798 | static forceinline int get_bit(const unsigned char *a, unsigned int pos) |
| 799 | { |
| 800 | unsigned int ofs; |
| 801 | |
| 802 | ofs = pos >> 3; |
| 803 | pos = ~pos & 7; |
| 804 | return (a[ofs] >> pos) & 1; |
| 805 | } |
| 806 | |
| 807 | /* These functions are declared in ebtree.c */ |
| 808 | void eb_delete(struct eb_node *node); |
| 809 | REGPRM1 struct eb_node *eb_insert_dup(struct eb_node *sub, struct eb_node *new); |
| 810 | |
| 811 | #endif /* _EB_TREE_H */ |
| 812 | |
| 813 | /* |
| 814 | * Local variables: |
| 815 | * c-indent-level: 8 |
| 816 | * c-basic-offset: 8 |
| 817 | * End: |
| 818 | */ |