blob: 76ea1e7f9fc6d13d9b4d75abf928ce98d31ec5b8 [file] [log] [blame]
Willy Tarreauc2186022009-10-26 19:48:54 +01001/*
2 * Elastic Binary Trees - generic macros and structures.
3 * Version 5.0
4 * (C) 2002-2009 - Willy Tarreau <w@1wt.eu>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19 *
20 *
21 * Short history :
22 *
23 * 2007/09/28: full support for the duplicates tree => v3
24 * 2007/07/08: merge back cleanups from kernel version.
25 * 2007/07/01: merge into Linux Kernel (try 1).
26 * 2007/05/27: version 2: compact everything into one single struct
27 * 2007/05/18: adapted the structure to support embedded nodes
28 * 2007/05/13: adapted to mempools v2.
29 */
30
31
32
33/*
34 General idea:
35 -------------
36 In a radix binary tree, we may have up to 2N-1 nodes for N keys if all of
37 them are leaves. If we find a way to differentiate intermediate nodes (later
38 called "nodes") and final nodes (later called "leaves"), and we associate
39 them by two, it is possible to build sort of a self-contained radix tree with
40 intermediate nodes always present. It will not be as cheap as the ultree for
41 optimal cases as shown below, but the optimal case almost never happens :
42
43 Eg, to store 8, 10, 12, 13, 14 :
44
45 ultree this theorical tree
46
47 8 8
48 / \ / \
49 10 12 10 12
50 / \ / \
51 13 14 12 14
52 / \
53 12 13
54
55 Note that on real-world tests (with a scheduler), is was verified that the
56 case with data on an intermediate node never happens. This is because the
57 data spectrum is too large for such coincidences to happen. It would require
58 for instance that a task has its expiration time at an exact second, with
59 other tasks sharing that second. This is too rare to try to optimize for it.
60
61 What is interesting is that the node will only be added above the leaf when
62 necessary, which implies that it will always remain somewhere above it. So
63 both the leaf and the node can share the exact value of the leaf, because
64 when going down the node, the bit mask will be applied to comparisons. So we
65 are tempted to have one single key shared between the node and the leaf.
66
67 The bit only serves the nodes, and the dups only serve the leaves. So we can
68 put a lot of information in common. This results in one single entity with
69 two branch pointers and two parent pointers, one for the node part, and one
70 for the leaf part :
71
72 node's leaf's
73 parent parent
74 | |
75 [node] [leaf]
76 / \
77 left right
78 branch branch
79
80 The node may very well refer to its leaf counterpart in one of its branches,
81 indicating that its own leaf is just below it :
82
83 node's
84 parent
85 |
86 [node]
87 / \
88 left [leaf]
89 branch
90
91 Adding keys in such a tree simply consists in inserting nodes between
92 other nodes and/or leaves :
93
94 [root]
95 |
96 [node2]
97 / \
98 [leaf1] [node3]
99 / \
100 [leaf2] [leaf3]
101
102 On this diagram, we notice that [node2] and [leaf2] have been pulled away
103 from each other due to the insertion of [node3], just as if there would be
104 an elastic between both parts. This elastic-like behaviour gave its name to
105 the tree : "Elastic Binary Tree", or "EBtree". The entity which associates a
106 node part and a leaf part will be called an "EB node".
107
108 We also notice on the diagram that there is a root entity required to attach
109 the tree. It only contains two branches and there is nothing above it. This
110 is an "EB root". Some will note that [leaf1] has no [node1]. One property of
111 the EBtree is that all nodes have their branches filled, and that if a node
112 has only one branch, it does not need to exist. Here, [leaf1] was added
113 below [root] and did not need any node.
114
115 An EB node contains :
116 - a pointer to the node's parent (node_p)
117 - a pointer to the leaf's parent (leaf_p)
118 - two branches pointing to lower nodes or leaves (branches)
119 - a bit position (bit)
120 - an optional key.
121
122 The key here is optional because it's used only during insertion, in order
123 to classify the nodes. Nothing else in the tree structure requires knowledge
124 of the key. This makes it possible to write type-agnostic primitives for
125 everything, and type-specific insertion primitives. This has led to consider
126 two types of EB nodes. The type-agnostic ones will serve as a header for the
127 other ones, and will simply be called "struct eb_node". The other ones will
128 have their type indicated in the structure name. Eg: "struct eb32_node" for
129 nodes carrying 32 bit keys.
130
131 We will also node that the two branches in a node serve exactly the same
132 purpose as an EB root. For this reason, a "struct eb_root" will be used as
133 well inside the struct eb_node. In order to ease pointer manipulation and
134 ROOT detection when walking upwards, all the pointers inside an eb_node will
135 point to the eb_root part of the referenced EB nodes, relying on the same
136 principle as the linked lists in Linux.
137
138 Another important point to note, is that when walking inside a tree, it is
139 very convenient to know where a node is attached in its parent, and what
140 type of branch it has below it (leaf or node). In order to simplify the
141 operations and to speed up the processing, it was decided in this specific
142 implementation to use the lowest bit from the pointer to designate the side
143 of the upper pointers (left/right) and the type of a branch (leaf/node).
144 This practise is not mandatory by design, but an implementation-specific
145 optimisation permitted on all platforms on which data must be aligned. All
146 known 32 bit platforms align their integers and pointers to 32 bits, leaving
147 the two lower bits unused. So, we say that the pointers are "tagged". And
148 since they designate pointers to root parts, we simply call them
149 "tagged root pointers", or "eb_troot" in the code.
150
151 Duplicate keys are stored in a special manner. When inserting a key, if
152 the same one is found, then an incremental binary tree is built at this
153 place from these keys. This ensures that no special case has to be written
154 to handle duplicates when walking through the tree or when deleting entries.
155 It also guarantees that duplicates will be walked in the exact same order
156 they were inserted. This is very important when trying to achieve fair
157 processing distribution for instance.
158
159 Algorithmic complexity can be derived from 3 variables :
160 - the number of possible different keys in the tree : P
161 - the number of entries in the tree : N
162 - the number of duplicates for one key : D
163
164 Note that this tree is deliberately NOT balanced. For this reason, the worst
165 case may happen with a small tree (eg: 32 distinct keys of one bit). BUT,
166 the operations required to manage such data are so much cheap that they make
167 it worth using it even under such conditions. For instance, a balanced tree
168 may require only 6 levels to store those 32 keys when this tree will
169 require 32. But if per-level operations are 5 times cheaper, it wins.
170
171 Minimal, Maximal and Average times are specified in number of operations.
172 Minimal is given for best condition, Maximal for worst condition, and the
173 average is reported for a tree containing random keys. An operation
174 generally consists in jumping from one node to the other.
175
176 Complexity :
177 - lookup : min=1, max=log(P), avg=log(N)
178 - insertion from root : min=1, max=log(P), avg=log(N)
179 - insertion of dups : min=1, max=log(D), avg=log(D)/2 after lookup
180 - deletion : min=1, max=1, avg=1
181 - prev/next : min=1, max=log(P), avg=2 :
182 N/2 nodes need 1 hop => 1*N/2
183 N/4 nodes need 2 hops => 2*N/4
184 N/8 nodes need 3 hops => 3*N/8
185 ...
186 N/x nodes need log(x) hops => log2(x)*N/x
187 Total cost for all N nodes : sum[i=1..N](log2(i)*N/i) = N*sum[i=1..N](log2(i)/i)
188 Average cost across N nodes = total / N = sum[i=1..N](log2(i)/i) = 2
189
190 This design is currently limited to only two branches per node. Most of the
191 tree descent algorithm would be compatible with more branches (eg: 4, to cut
192 the height in half), but this would probably require more complex operations
193 and the deletion algorithm would be problematic.
194
195 Useful properties :
196 - a node is always added above the leaf it is tied to, and never can get
197 below nor in another branch. This implies that leaves directly attached
198 to the root do not use their node part, which is indicated by a NULL
199 value in node_p. This also enhances the cache efficiency when walking
200 down the tree, because when the leaf is reached, its node part will
201 already have been visited (unless it's the first leaf in the tree).
202
203 - pointers to lower nodes or leaves are stored in "branch" pointers. Only
204 the root node may have a NULL in either branch, it is not possible for
205 other branches. Since the nodes are attached to the left branch of the
206 root, it is not possible to see a NULL left branch when walking up a
207 tree. Thus, an empty tree is immediately identified by a NULL left
208 branch at the root. Conversely, the one and only way to identify the
209 root node is to check that it right branch is NULL. Note that the
210 NULL pointer may have a few low-order bits set.
211
212 - a node connected to its own leaf will have branch[0|1] pointing to
213 itself, and leaf_p pointing to itself.
214
215 - a node can never have node_p pointing to itself.
216
217 - a node is linked in a tree if and only if it has a non-null leaf_p.
218
219 - a node can never have both branches equal, except for the root which can
220 have them both NULL.
221
222 - deletion only applies to leaves. When a leaf is deleted, its parent must
223 be released too (unless it's the root), and its sibling must attach to
224 the grand-parent, replacing the parent. Also, when a leaf is deleted,
225 the node tied to this leaf will be removed and must be released too. If
226 this node is different from the leaf's parent, the freshly released
227 leaf's parent will be used to replace the node which must go. A released
228 node will never be used anymore, so there's no point in tracking it.
229
230 - the bit index in a node indicates the bit position in the key which is
231 represented by the branches. That means that a node with (bit == 0) is
232 just above two leaves. Negative bit values are used to build a duplicate
233 tree. The first node above two identical leaves gets (bit == -1). This
234 value logarithmically decreases as the duplicate tree grows. During
235 duplicate insertion, a node is inserted above the highest bit value (the
236 lowest absolute value) in the tree during the right-sided walk. If bit
237 -1 is not encountered (highest < -1), we insert above last leaf.
238 Otherwise, we insert above the node with the highest value which was not
239 equal to the one of its parent + 1.
240
241 - the "eb_next" primitive walks from left to right, which means from lower
242 to higher keys. It returns duplicates in the order they were inserted.
243 The "eb_first" primitive returns the left-most entry.
244
245 - the "eb_prev" primitive walks from right to left, which means from
246 higher to lower keys. It returns duplicates in the opposite order they
247 were inserted. The "eb_last" primitive returns the right-most entry.
248
249 - a tree which has 1 in the lower bit of its root's right branch is a
250 tree with unique nodes. This means that when a node is inserted with
251 a key which already exists will not be inserted, and the previous
252 entry will be returned.
253
254 */
255
256#ifndef _EBTREE_H
257#define _EBTREE_H
258
259#include <stdlib.h>
Willy Tarreaucc05fba2009-10-27 21:40:18 +0100260#include "compiler.h"
Willy Tarreauc2186022009-10-26 19:48:54 +0100261
262/* Note: we never need to run fls on null keys, so we can optimize the fls
263 * function by removing a conditional jump.
264 */
265#if defined(__i386__)
266static inline int flsnz(int x)
267{
268 int r;
269 __asm__("bsrl %1,%0\n"
270 : "=r" (r) : "rm" (x));
271 return r+1;
272}
273#else
274// returns 1 to 32 for 1<<0 to 1<<31. Undefined for 0.
275#define flsnz(___a) ({ \
276 register int ___x, ___bits = 0; \
277 ___x = (___a); \
278 if (___x & 0xffff0000) { ___x &= 0xffff0000; ___bits += 16;} \
279 if (___x & 0xff00ff00) { ___x &= 0xff00ff00; ___bits += 8;} \
280 if (___x & 0xf0f0f0f0) { ___x &= 0xf0f0f0f0; ___bits += 4;} \
281 if (___x & 0xcccccccc) { ___x &= 0xcccccccc; ___bits += 2;} \
282 if (___x & 0xaaaaaaaa) { ___x &= 0xaaaaaaaa; ___bits += 1;} \
283 ___bits + 1; \
284 })
285#endif
286
287static inline int fls64(unsigned long long x)
288{
289 unsigned int h;
290 unsigned int bits = 32;
291
292 h = x >> 32;
293 if (!h) {
294 h = x;
295 bits = 0;
296 }
297 return flsnz(h) + bits;
298}
299
300#define fls_auto(x) ((sizeof(x) > 4) ? fls64(x) : flsnz(x))
301
302/* Linux-like "container_of". It returns a pointer to the structure of type
303 * <type> which has its member <name> stored at address <ptr>.
304 */
305#ifndef container_of
306#define container_of(ptr, type, name) ((type *)(((void *)(ptr)) - ((long)&((type *)0)->name)))
307#endif
308
Willy Tarreauc2186022009-10-26 19:48:54 +0100309/* Number of bits per node, and number of leaves per node */
310#define EB_NODE_BITS 1
311#define EB_NODE_BRANCHES (1 << EB_NODE_BITS)
312#define EB_NODE_BRANCH_MASK (EB_NODE_BRANCHES - 1)
313
314/* Be careful not to tweak those values. The walking code is optimized for NULL
315 * detection on the assumption that the following values are intact.
316 */
317#define EB_LEFT 0
318#define EB_RGHT 1
319#define EB_LEAF 0
320#define EB_NODE 1
321
322/* Tags to set in root->b[EB_RGHT] :
323 * - EB_NORMAL is a normal tree which stores duplicate keys.
324 * - EB_UNIQUE is a tree which stores unique keys.
325 */
326#define EB_NORMAL 0
327#define EB_UNIQUE 1
328
329/* This is the same as an eb_node pointer, except that the lower bit embeds
330 * a tag. See eb_dotag()/eb_untag()/eb_gettag(). This tag has two meanings :
331 * - 0=left, 1=right to designate the parent's branch for leaf_p/node_p
332 * - 0=link, 1=leaf to designate the branch's type for branch[]
333 */
334typedef void eb_troot_t;
335
336/* The eb_root connects the node which contains it, to two nodes below it, one
337 * of which may be the same node. At the top of the tree, we use an eb_root
338 * too, which always has its right branch NULL (+/1 low-order bits).
339 */
340struct eb_root {
341 eb_troot_t *b[EB_NODE_BRANCHES]; /* left and right branches */
342};
343
344/* The eb_node contains the two parts, one for the leaf, which always exists,
345 * and one for the node, which remains unused in the very first node inserted
346 * into the tree. This structure is 20 bytes per node on 32-bit machines. Do
347 * not change the order, benchmarks have shown that it's optimal this way.
348 */
349struct eb_node {
350 struct eb_root branches; /* branches, must be at the beginning */
351 eb_troot_t *node_p; /* link node's parent */
352 eb_troot_t *leaf_p; /* leaf node's parent */
353 int bit; /* link's bit position. */
354};
355
356/* Return the structure of type <type> whose member <member> points to <ptr> */
357#define eb_entry(ptr, type, member) container_of(ptr, type, member)
358
359/* The root of a tree is an eb_root initialized with both pointers NULL.
360 * During its life, only the left pointer will change. The right one will
361 * always remain NULL, which is the way we detect it.
362 */
363#define EB_ROOT \
364 (struct eb_root) { \
365 .b = {[0] = NULL, [1] = NULL }, \
366 }
367
368#define EB_ROOT_UNIQUE \
369 (struct eb_root) { \
370 .b = {[0] = NULL, [1] = (void *)1 }, \
371 }
372
373#define EB_TREE_HEAD(name) \
374 struct eb_root name = EB_ROOT
375
376
377/***************************************\
378 * Private functions. Not for end-user *
379\***************************************/
380
381/* Converts a root pointer to its equivalent eb_troot_t pointer,
382 * ready to be stored in ->branch[], leaf_p or node_p. NULL is not
383 * conserved. To be used with EB_LEAF, EB_NODE, EB_LEFT or EB_RGHT in <tag>.
384 */
385static inline eb_troot_t *eb_dotag(const struct eb_root *root, const int tag)
386{
387 return (eb_troot_t *)((void *)root + tag);
388}
389
390/* Converts an eb_troot_t pointer pointer to its equivalent eb_root pointer,
391 * for use with pointers from ->branch[], leaf_p or node_p. NULL is conserved
392 * as long as the tree is not corrupted. To be used with EB_LEAF, EB_NODE,
393 * EB_LEFT or EB_RGHT in <tag>.
394 */
395static inline struct eb_root *eb_untag(const eb_troot_t *troot, const int tag)
396{
397 return (struct eb_root *)((void *)troot - tag);
398}
399
400/* returns the tag associated with an eb_troot_t pointer */
401static inline int eb_gettag(eb_troot_t *troot)
402{
403 return (unsigned long)troot & 1;
404}
405
406/* Converts a root pointer to its equivalent eb_troot_t pointer and clears the
407 * tag, no matter what its value was.
408 */
409static inline struct eb_root *eb_clrtag(const eb_troot_t *troot)
410{
411 return (struct eb_root *)((unsigned long)troot & ~1UL);
412}
413
414/* Returns a pointer to the eb_node holding <root> */
415static inline struct eb_node *eb_root_to_node(struct eb_root *root)
416{
417 return container_of(root, struct eb_node, branches);
418}
419
420/* Walks down starting at root pointer <start>, and always walking on side
421 * <side>. It either returns the node hosting the first leaf on that side,
422 * or NULL if no leaf is found. <start> may either be NULL or a branch pointer.
423 * The pointer to the leaf (or NULL) is returned.
424 */
425static inline struct eb_node *eb_walk_down(eb_troot_t *start, unsigned int side)
426{
427 /* A NULL pointer on an empty tree root will be returned as-is */
428 while (eb_gettag(start) == EB_NODE)
429 start = (eb_untag(start, EB_NODE))->b[side];
430 /* NULL is left untouched (root==eb_node, EB_LEAF==0) */
431 return eb_root_to_node(eb_untag(start, EB_LEAF));
432}
433
434/* This function is used to build a tree of duplicates by adding a new node to
435 * a subtree of at least 2 entries. It will probably never be needed inlined,
436 * and it is not for end-user.
437 */
438static forceinline struct eb_node *
439__eb_insert_dup(struct eb_node *sub, struct eb_node *new)
440{
441 struct eb_node *head = sub;
442
443 struct eb_troot *new_left = eb_dotag(&new->branches, EB_LEFT);
444 struct eb_troot *new_rght = eb_dotag(&new->branches, EB_RGHT);
445 struct eb_troot *new_leaf = eb_dotag(&new->branches, EB_LEAF);
446
447 /* first, identify the deepest hole on the right branch */
448 while (eb_gettag(head->branches.b[EB_RGHT]) != EB_LEAF) {
449 struct eb_node *last = head;
450 head = container_of(eb_untag(head->branches.b[EB_RGHT], EB_NODE),
451 struct eb_node, branches);
452 if (head->bit > last->bit + 1)
453 sub = head; /* there's a hole here */
454 }
455
456 /* Here we have a leaf attached to (head)->b[EB_RGHT] */
457 if (head->bit < -1) {
458 /* A hole exists just before the leaf, we insert there */
459 new->bit = -1;
460 sub = container_of(eb_untag(head->branches.b[EB_RGHT], EB_LEAF),
461 struct eb_node, branches);
462 head->branches.b[EB_RGHT] = eb_dotag(&new->branches, EB_NODE);
463
464 new->node_p = sub->leaf_p;
465 new->leaf_p = new_rght;
466 sub->leaf_p = new_left;
467 new->branches.b[EB_LEFT] = eb_dotag(&sub->branches, EB_LEAF);
468 new->branches.b[EB_RGHT] = new_leaf;
469 return new;
470 } else {
471 int side;
472 /* No hole was found before a leaf. We have to insert above
473 * <sub>. Note that we cannot be certain that <sub> is attached
474 * to the right of its parent, as this is only true if <sub>
475 * is inside the dup tree, not at the head.
476 */
477 new->bit = sub->bit - 1; /* install at the lowest level */
478 side = eb_gettag(sub->node_p);
479 head = container_of(eb_untag(sub->node_p, side), struct eb_node, branches);
480 head->branches.b[side] = eb_dotag(&new->branches, EB_NODE);
481
482 new->node_p = sub->node_p;
483 new->leaf_p = new_rght;
484 sub->node_p = new_left;
485 new->branches.b[EB_LEFT] = eb_dotag(&sub->branches, EB_NODE);
486 new->branches.b[EB_RGHT] = new_leaf;
487 return new;
488 }
489}
490
491
492/**************************************\
493 * Public functions, for the end-user *
494\**************************************/
495
496/* Return the first leaf in the tree starting at <root>, or NULL if none */
497static inline struct eb_node *eb_first(struct eb_root *root)
498{
499 return eb_walk_down(root->b[0], EB_LEFT);
500}
501
502/* Return the last leaf in the tree starting at <root>, or NULL if none */
503static inline struct eb_node *eb_last(struct eb_root *root)
504{
505 return eb_walk_down(root->b[0], EB_RGHT);
506}
507
508/* Return previous leaf node before an existing leaf node, or NULL if none. */
509static inline struct eb_node *eb_prev(struct eb_node *node)
510{
511 eb_troot_t *t = node->leaf_p;
512
513 while (eb_gettag(t) == EB_LEFT) {
514 /* Walking up from left branch. We must ensure that we never
515 * walk beyond root.
516 */
517 if (unlikely(eb_clrtag((eb_untag(t, EB_LEFT))->b[EB_RGHT]) == NULL))
518 return NULL;
519 t = (eb_root_to_node(eb_untag(t, EB_LEFT)))->node_p;
520 }
521 /* Note that <t> cannot be NULL at this stage */
522 t = (eb_untag(t, EB_RGHT))->b[EB_LEFT];
523 return eb_walk_down(t, EB_RGHT);
524}
525
526/* Return next leaf node after an existing leaf node, or NULL if none. */
527static inline struct eb_node *eb_next(struct eb_node *node)
528{
529 eb_troot_t *t = node->leaf_p;
530
531 while (eb_gettag(t) != EB_LEFT)
532 /* Walking up from right branch, so we cannot be below root */
533 t = (eb_root_to_node(eb_untag(t, EB_RGHT)))->node_p;
534
535 /* Note that <t> cannot be NULL at this stage */
536 t = (eb_untag(t, EB_LEFT))->b[EB_RGHT];
537 if (eb_clrtag(t) == NULL)
538 return NULL;
539 return eb_walk_down(t, EB_LEFT);
540}
541
542/* Return previous leaf node before an existing leaf node, skipping duplicates,
543 * or NULL if none. */
544static inline struct eb_node *eb_prev_unique(struct eb_node *node)
545{
546 eb_troot_t *t = node->leaf_p;
547
548 while (1) {
549 if (eb_gettag(t) != EB_LEFT) {
550 node = eb_root_to_node(eb_untag(t, EB_RGHT));
551 /* if we're right and not in duplicates, stop here */
552 if (node->bit >= 0)
553 break;
554 t = node->node_p;
555 }
556 else {
557 /* Walking up from left branch. We must ensure that we never
558 * walk beyond root.
559 */
560 if (unlikely(eb_clrtag((eb_untag(t, EB_LEFT))->b[EB_RGHT]) == NULL))
561 return NULL;
562 t = (eb_root_to_node(eb_untag(t, EB_LEFT)))->node_p;
563 }
564 }
565 /* Note that <t> cannot be NULL at this stage */
566 t = (eb_untag(t, EB_RGHT))->b[EB_LEFT];
567 return eb_walk_down(t, EB_RGHT);
568}
569
570/* Return next leaf node after an existing leaf node, skipping duplicates, or
571 * NULL if none.
572 */
573static inline struct eb_node *eb_next_unique(struct eb_node *node)
574{
575 eb_troot_t *t = node->leaf_p;
576
577 while (1) {
578 if (eb_gettag(t) == EB_LEFT) {
579 if (unlikely(eb_clrtag((eb_untag(t, EB_LEFT))->b[EB_RGHT]) == NULL))
580 return NULL; /* we reached root */
581 node = eb_root_to_node(eb_untag(t, EB_LEFT));
582 /* if we're left and not in duplicates, stop here */
583 if (node->bit >= 0)
584 break;
585 t = node->node_p;
586 }
587 else {
588 /* Walking up from right branch, so we cannot be below root */
589 t = (eb_root_to_node(eb_untag(t, EB_RGHT)))->node_p;
590 }
591 }
592
593 /* Note that <t> cannot be NULL at this stage */
594 t = (eb_untag(t, EB_LEFT))->b[EB_RGHT];
595 if (eb_clrtag(t) == NULL)
596 return NULL;
597 return eb_walk_down(t, EB_LEFT);
598}
599
600
601/* Removes a leaf node from the tree if it was still in it. Marks the node
602 * as unlinked.
603 */
604static forceinline void __eb_delete(struct eb_node *node)
605{
606 __label__ delete_unlink;
607 unsigned int pside, gpside, sibtype;
608 struct eb_node *parent;
609 struct eb_root *gparent;
610
611 if (!node->leaf_p)
612 return;
613
614 /* we need the parent, our side, and the grand parent */
615 pside = eb_gettag(node->leaf_p);
616 parent = eb_root_to_node(eb_untag(node->leaf_p, pside));
617
618 /* We likely have to release the parent link, unless it's the root,
619 * in which case we only set our branch to NULL. Note that we can
620 * only be attached to the root by its left branch.
621 */
622
623 if (eb_clrtag(parent->branches.b[EB_RGHT]) == NULL) {
624 /* we're just below the root, it's trivial. */
625 parent->branches.b[EB_LEFT] = NULL;
626 goto delete_unlink;
627 }
628
629 /* To release our parent, we have to identify our sibling, and reparent
630 * it directly to/from the grand parent. Note that the sibling can
631 * either be a link or a leaf.
632 */
633
634 gpside = eb_gettag(parent->node_p);
635 gparent = eb_untag(parent->node_p, gpside);
636
637 gparent->b[gpside] = parent->branches.b[!pside];
638 sibtype = eb_gettag(gparent->b[gpside]);
639
640 if (sibtype == EB_LEAF) {
641 eb_root_to_node(eb_untag(gparent->b[gpside], EB_LEAF))->leaf_p =
642 eb_dotag(gparent, gpside);
643 } else {
644 eb_root_to_node(eb_untag(gparent->b[gpside], EB_NODE))->node_p =
645 eb_dotag(gparent, gpside);
646 }
647 /* Mark the parent unused. Note that we do not check if the parent is
648 * our own node, but that's not a problem because if it is, it will be
649 * marked unused at the same time, which we'll use below to know we can
650 * safely remove it.
651 */
652 parent->node_p = NULL;
653
654 /* The parent node has been detached, and is currently unused. It may
655 * belong to another node, so we cannot remove it that way. Also, our
656 * own node part might still be used. so we can use this spare node
657 * to replace ours if needed.
658 */
659
660 /* If our link part is unused, we can safely exit now */
661 if (!node->node_p)
662 goto delete_unlink;
663
664 /* From now on, <node> and <parent> are necessarily different, and the
665 * <node>'s node part is in use. By definition, <parent> is at least
666 * below <node>, so keeping its key for the bit string is OK.
667 */
668
669 parent->node_p = node->node_p;
670 parent->branches = node->branches;
671 parent->bit = node->bit;
672
673 /* We must now update the new node's parent... */
674 gpside = eb_gettag(parent->node_p);
675 gparent = eb_untag(parent->node_p, gpside);
676 gparent->b[gpside] = eb_dotag(&parent->branches, EB_NODE);
677
678 /* ... and its branches */
679 for (pside = 0; pside <= 1; pside++) {
680 if (eb_gettag(parent->branches.b[pside]) == EB_NODE) {
681 eb_root_to_node(eb_untag(parent->branches.b[pside], EB_NODE))->node_p =
682 eb_dotag(&parent->branches, pside);
683 } else {
684 eb_root_to_node(eb_untag(parent->branches.b[pside], EB_LEAF))->leaf_p =
685 eb_dotag(&parent->branches, pside);
686 }
687 }
688 delete_unlink:
689 /* Now the node has been completely unlinked */
690 node->leaf_p = NULL;
691 return; /* tree is not empty yet */
692}
693
694/* Compare blocks <a> and <b> byte-to-byte, from bit <ignore> to bit <len-1>.
695 * Return the number of equal bits between strings, assuming that the first
696 * <ignore> bits are already identical. It is possible to return slightly more
697 * than <len> bits if <len> does not stop on a byte boundary and we find exact
698 * bytes. Note that parts or all of <ignore> bits may be rechecked. It is only
699 * passed here as a hint to speed up the check.
700 */
701static forceinline unsigned int equal_bits(const unsigned char *a,
702 const unsigned char *b,
703 unsigned int ignore, unsigned int len)
704{
705 unsigned int beg;
706 unsigned int end;
707 unsigned int ret;
708 unsigned char c;
709
710 beg = ignore >> 3;
711 end = (len + 7) >> 3;
712 ret = end << 3;
713
714 do {
715 if (beg >= end)
716 goto out;
717 beg++;
718 c = a[beg-1] ^ b[beg-1];
719 } while (!c);
720
721 /* OK now we know that a and b differ at byte <beg> and that <c> holds
722 * the bit differences. We have to find what bit is differing and report
723 * it as the number of identical bits. Note that low bit numbers are
724 * assigned to high positions in the byte, as we compare them as strings.
725 */
726 ret = beg << 3;
727 if (c & 0xf0) { c >>= 4; ret -= 4; }
728 if (c & 0x0c) { c >>= 2; ret -= 2; }
729 ret -= (c >> 1);
730 ret--;
731 out:
732 return ret;
733}
734
735/* Compare strings <a> and <b> byte-to-byte, from bit <ignore> to the last 0.
736 * Return the number of equal bits between strings, assuming that the first
737 * <ignore> bits are already identical. Note that parts or all of <ignore> bits
738 * may be rechecked. It is only passed here as a hint to speed up the check.
739 * The caller is responsible for not passing an <ignore> value larger than any
740 * of the two strings. However, referencing any bit from the trailing zero is
741 * permitted.
742 */
743static forceinline unsigned int string_equal_bits(const unsigned char *a,
744 const unsigned char *b,
745 unsigned int ignore)
746{
747 unsigned int beg;
748 unsigned char c;
749
750 beg = ignore >> 3;
751
752 /* skip known and identical bits. We stop at the first different byte
753 * or at the first zero we encounter on either side.
754 */
755 while (1) {
756 unsigned char d;
757
758 c = a[beg];
759 d = b[beg];
760 beg++;
761
762 c ^= d;
763 if (c)
764 break;
765 if (!d)
766 break;
767 }
768
769 /* OK now we know that a and b differ at byte <beg>, or that both are zero.
770 * We have to find what bit is differing and report it as the number of
771 * identical bits. Note that low bit numbers are assigned to high positions
772 * in the byte, as we compare them as strings.
773 */
774 beg <<= 3;
775 if (c & 0xf0) { c >>= 4; beg -= 4; }
776 if (c & 0x0c) { c >>= 2; beg -= 2; }
777 beg -= (c >> 1);
778 if (c)
779 beg--;
780
781 return beg;
782}
783
784static forceinline int cmp_bits(const unsigned char *a, const unsigned char *b, unsigned int pos)
785{
786 unsigned int ofs;
787 unsigned char bit_a, bit_b;
788
789 ofs = pos >> 3;
790 pos = ~pos & 7;
791
792 bit_a = (a[ofs] >> pos) & 1;
793 bit_b = (b[ofs] >> pos) & 1;
794
795 return bit_a - bit_b; /* -1: a<b; 0: a=b; 1: a>b */
796}
797
798static forceinline int get_bit(const unsigned char *a, unsigned int pos)
799{
800 unsigned int ofs;
801
802 ofs = pos >> 3;
803 pos = ~pos & 7;
804 return (a[ofs] >> pos) & 1;
805}
806
807/* These functions are declared in ebtree.c */
808void eb_delete(struct eb_node *node);
809REGPRM1 struct eb_node *eb_insert_dup(struct eb_node *sub, struct eb_node *new);
810
811#endif /* _EB_TREE_H */
812
813/*
814 * Local variables:
815 * c-indent-level: 8
816 * c-basic-offset: 8
817 * End:
818 */