2017-06-10 05:56:41 +08:00
|
|
|
/*
|
|
|
|
* IPager.h
|
|
|
|
*
|
|
|
|
* This source file is part of the FoundationDB open source project
|
|
|
|
*
|
|
|
|
* Copyright 2013-2018 Apple Inc. and the FoundationDB project authors
|
2020-04-25 05:12:40 +08:00
|
|
|
*
|
2017-06-10 05:56:41 +08:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
2020-04-25 05:12:40 +08:00
|
|
|
*
|
2017-06-10 05:56:41 +08:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2020-04-25 05:12:40 +08:00
|
|
|
*
|
2017-06-10 05:56:41 +08:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef FDBSERVER_IPAGER_H
|
|
|
|
#define FDBSERVER_IPAGER_H
|
2021-12-06 05:39:35 +08:00
|
|
|
#include "flow/Error.h"
|
2022-01-06 18:38:41 +08:00
|
|
|
#include "flow/FastAlloc.h"
|
2021-12-25 16:22:36 +08:00
|
|
|
#include "flow/ProtocolVersion.h"
|
2021-12-06 05:39:35 +08:00
|
|
|
#include <stdint.h>
|
2021-09-08 07:17:32 +08:00
|
|
|
#pragma once
|
2017-06-10 05:56:41 +08:00
|
|
|
|
2018-10-20 01:30:13 +08:00
|
|
|
#include "fdbserver/IKeyValueStore.h"
|
2017-06-10 05:56:41 +08:00
|
|
|
|
|
|
|
#include "flow/flow.h"
|
|
|
|
#include "fdbclient/FDBTypes.h"
|
2021-12-06 05:39:35 +08:00
|
|
|
#define XXH_INLINE_ALL
|
2021-11-03 12:47:31 +08:00
|
|
|
#include "flow/xxhash.h"
|
2017-06-10 05:56:41 +08:00
|
|
|
|
2019-11-11 16:46:05 +08:00
|
|
|
typedef uint32_t LogicalPageID;
|
|
|
|
typedef uint32_t PhysicalPageID;
|
|
|
|
#define invalidLogicalPageID std::numeric_limits<LogicalPageID>::max()
|
2021-12-09 18:21:50 +08:00
|
|
|
#define invalidPhysicalPageID std::numeric_limits<PhysicalPageID>::max()
|
2017-06-10 05:56:41 +08:00
|
|
|
|
2021-05-05 14:03:21 +08:00
|
|
|
typedef uint32_t QueueID;
|
|
|
|
#define invalidQueueID std::numeric_limits<QueueID>::max()
|
|
|
|
|
2021-06-26 07:12:38 +08:00
|
|
|
// Pager Events
|
2021-07-17 18:44:00 +08:00
|
|
|
enum class PagerEvents { CacheLookup = 0, CacheHit, CacheMiss, PageWrite, MAXEVENTS };
|
2021-07-21 12:23:50 +08:00
|
|
|
static const char* const PagerEventsStrings[] = { "Lookup", "Hit", "Miss", "Write", "Unknown" };
|
2021-07-14 00:08:02 +08:00
|
|
|
// Reasons for page level events.
|
2021-07-17 18:44:00 +08:00
|
|
|
enum class PagerEventReasons { PointRead = 0, RangeRead, RangePrefetch, Commit, LazyClear, MetaData, MAXEVENTREASONS };
|
2021-07-21 12:23:50 +08:00
|
|
|
static const char* const PagerEventReasonsStrings[] = {
|
|
|
|
"Get", "GetR", "GetRPF", "Commit", "LazyClr", "Meta", "Unknown"
|
|
|
|
};
|
2021-06-24 04:46:17 +08:00
|
|
|
|
2021-08-06 05:48:25 +08:00
|
|
|
static const unsigned int nonBtreeLevel = 0;
|
2021-07-21 12:23:50 +08:00
|
|
|
static const std::vector<std::pair<PagerEvents, PagerEventReasons>> possibleEventReasonPairs = {
|
|
|
|
{ PagerEvents::CacheLookup, PagerEventReasons::Commit },
|
2021-07-21 16:28:25 +08:00
|
|
|
{ PagerEvents::CacheLookup, PagerEventReasons::LazyClear },
|
2021-07-17 18:44:00 +08:00
|
|
|
{ PagerEvents::CacheLookup, PagerEventReasons::PointRead },
|
|
|
|
{ PagerEvents::CacheLookup, PagerEventReasons::RangeRead },
|
2021-07-21 12:23:50 +08:00
|
|
|
{ PagerEvents::CacheHit, PagerEventReasons::Commit },
|
2021-07-21 16:28:25 +08:00
|
|
|
{ PagerEvents::CacheHit, PagerEventReasons::LazyClear },
|
2021-07-17 18:44:00 +08:00
|
|
|
{ PagerEvents::CacheHit, PagerEventReasons::PointRead },
|
|
|
|
{ PagerEvents::CacheHit, PagerEventReasons::RangeRead },
|
2021-07-21 12:23:50 +08:00
|
|
|
{ PagerEvents::CacheMiss, PagerEventReasons::Commit },
|
2021-07-21 16:28:25 +08:00
|
|
|
{ PagerEvents::CacheMiss, PagerEventReasons::LazyClear },
|
2021-07-17 18:44:00 +08:00
|
|
|
{ PagerEvents::CacheMiss, PagerEventReasons::PointRead },
|
|
|
|
{ PagerEvents::CacheMiss, PagerEventReasons::RangeRead },
|
2021-07-21 12:23:50 +08:00
|
|
|
{ PagerEvents::PageWrite, PagerEventReasons::Commit },
|
2021-07-17 18:44:00 +08:00
|
|
|
{ PagerEvents::PageWrite, PagerEventReasons::LazyClear },
|
2021-07-13 12:18:06 +08:00
|
|
|
};
|
2021-07-21 12:23:50 +08:00
|
|
|
static const std::vector<std::pair<PagerEvents, PagerEventReasons>> L0PossibleEventReasonPairs = {
|
2021-07-17 18:44:00 +08:00
|
|
|
{ PagerEvents::CacheLookup, PagerEventReasons::RangePrefetch },
|
|
|
|
{ PagerEvents::CacheLookup, PagerEventReasons::MetaData },
|
|
|
|
{ PagerEvents::CacheHit, PagerEventReasons::RangePrefetch },
|
|
|
|
{ PagerEvents::CacheHit, PagerEventReasons::MetaData },
|
|
|
|
{ PagerEvents::CacheMiss, PagerEventReasons::RangePrefetch },
|
|
|
|
{ PagerEvents::CacheMiss, PagerEventReasons::MetaData },
|
|
|
|
{ PagerEvents::PageWrite, PagerEventReasons::MetaData },
|
2021-07-13 12:18:06 +08:00
|
|
|
};
|
|
|
|
|
2021-12-06 05:39:35 +08:00
|
|
|
enum EncodingType : uint8_t {
|
|
|
|
XXHash64 = 0,
|
|
|
|
// For testing purposes
|
|
|
|
XOREncryption = 1
|
|
|
|
};
|
|
|
|
|
|
|
|
enum PageType : uint8_t {
|
|
|
|
HeaderPage = 0,
|
|
|
|
BackupHeaderPage = 1,
|
|
|
|
BTreeNode = 2,
|
|
|
|
BTreeSuperNode = 3,
|
|
|
|
QueuePageStandalone = 4,
|
|
|
|
QueuePageInExtent = 5
|
|
|
|
};
|
|
|
|
|
2021-12-27 21:53:49 +08:00
|
|
|
// Encryption key ID
|
|
|
|
typedef uint64_t KeyID;
|
|
|
|
|
|
|
|
// Encryption key and secret string
|
2022-01-07 14:27:22 +08:00
|
|
|
struct EncryptionKeyRef {
|
|
|
|
EncryptionKeyRef(){};
|
|
|
|
EncryptionKeyRef(StringRef secret, Optional<KeyID> keyID = {}) : secret(secret), id(keyID) {}
|
|
|
|
EncryptionKeyRef(Arena& arena, const EncryptionKeyRef& toCopy) : secret(arena, toCopy.secret), id(toCopy.id) {}
|
|
|
|
int expectedSize() const { return secret.size(); }
|
|
|
|
|
|
|
|
StringRef secret;
|
|
|
|
Optional<KeyID> id;
|
2021-12-27 21:53:49 +08:00
|
|
|
};
|
2022-01-07 14:27:22 +08:00
|
|
|
typedef Standalone<EncryptionKeyRef> EncryptionKey;
|
2021-12-27 21:53:49 +08:00
|
|
|
|
|
|
|
// Interface used by pager to get encryption keys by ID when reading pages from disk
|
|
|
|
// and by the BTree to get encryption keys to use for new pages
|
|
|
|
class IEncryptionKeyProvider {
|
|
|
|
public:
|
2022-01-07 14:27:22 +08:00
|
|
|
virtual ~IEncryptionKeyProvider() {}
|
|
|
|
|
|
|
|
// Get encryption key based on key ID for reading. Returned key ID must match input.
|
|
|
|
virtual Future<EncryptionKey> getByID(KeyID keyID) = 0;
|
|
|
|
|
|
|
|
// Get encryption key that should be used for a given data range.
|
|
|
|
virtual Future<EncryptionKey> getByRange(const KeyRef begin, const KeyRef end) = 0;
|
2021-12-27 21:53:49 +08:00
|
|
|
};
|
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// ArenaPage represents a data page meant to be stored on disk, located in a block of
|
|
|
|
// 4k-aligned memory held by an Arena
|
2021-12-06 05:39:35 +08:00
|
|
|
//
|
2022-01-06 18:38:41 +08:00
|
|
|
// Page Format:
|
|
|
|
// VersionHeader - describes main header version, encoding type, and offsets of subheaders and payload.
|
2022-01-07 14:27:22 +08:00
|
|
|
// MainHeader - structure based on header version. It is responsible for protecting all bytes
|
|
|
|
// of VersionHeader, MainHeader, and EncodingHeader with some sort of checksum.
|
|
|
|
// EncodingHeader - structure based on encoding type. It is responsible for protecting and
|
|
|
|
// possibly encrypting all payload bytes.
|
2022-01-06 18:38:41 +08:00
|
|
|
// Payload - User accessible bytes, protected and possibly encrypted based on the encoding
|
2021-12-06 05:39:35 +08:00
|
|
|
//
|
2022-01-06 18:38:41 +08:00
|
|
|
// preWrite() must be called before writing a page to disk to update checksums and encrypt as needed
|
|
|
|
// After reading a page from disk,
|
2022-01-07 14:27:22 +08:00
|
|
|
// postReadHeader() must be called to verify the verison, main, and encoding headers
|
|
|
|
// postReadPayload() must be called, after potentially setting encryption secret, to verify and possibly
|
|
|
|
// decrypt the payload
|
2021-05-06 03:34:21 +08:00
|
|
|
class ArenaPage : public ReferenceCounted<ArenaPage>, public FastAllocated<ArenaPage> {
|
2017-06-10 05:56:41 +08:00
|
|
|
public:
|
2022-01-06 18:38:41 +08:00
|
|
|
// This is the header version that new page init() calls will use.
|
|
|
|
// It is not necessarily the latest header version, as read/modify support for
|
|
|
|
// a new header version may be added prior to using that version as the default
|
|
|
|
// for new pages as part of downgrade support.
|
2022-01-02 20:42:39 +08:00
|
|
|
static constexpr uint8_t HEADER_WRITE_VERSION = 1;
|
|
|
|
|
2021-12-06 05:39:35 +08:00
|
|
|
ArenaPage(int logicalSize, int bufferSize)
|
2021-12-25 16:22:36 +08:00
|
|
|
: logicalSize(logicalSize), bufferSize(bufferSize), pPayload(nullptr), userData(nullptr) {
|
2021-05-06 03:34:21 +08:00
|
|
|
if (bufferSize > 0) {
|
2021-05-15 14:12:00 +08:00
|
|
|
buffer = (uint8_t*)arena.allocate4kAlignedBuffer(bufferSize);
|
2021-05-06 03:34:21 +08:00
|
|
|
|
|
|
|
// Mark any unused page portion defined
|
|
|
|
VALGRIND_MAKE_MEM_DEFINED(buffer + logicalSize, bufferSize - logicalSize);
|
|
|
|
} else {
|
|
|
|
buffer = nullptr;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
~ArenaPage() {
|
|
|
|
if (userData != nullptr && userDataDestructor != nullptr) {
|
|
|
|
userDataDestructor(userData);
|
|
|
|
}
|
|
|
|
}
|
2019-02-21 18:46:30 +08:00
|
|
|
|
2022-01-07 14:27:22 +08:00
|
|
|
// Before using these, either init() or postReadHeader and postReadPayload() must be called
|
2021-12-25 16:22:36 +08:00
|
|
|
const uint8_t* data() const { return pPayload; }
|
|
|
|
uint8_t* mutateData() const { return (uint8_t*)pPayload; }
|
|
|
|
int dataSize() const { return payloadSize; }
|
2021-12-06 05:39:35 +08:00
|
|
|
|
|
|
|
const uint8_t* rawData() const { return buffer; }
|
|
|
|
uint8_t* rawData() { return buffer; }
|
|
|
|
int rawSize() const { return bufferSize; }
|
|
|
|
|
|
|
|
#pragma pack(push, 1)
|
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// The next few structs describe the byte-packed physical structure. The fields of Page
|
|
|
|
// cannot change, but new header versions and encoding types can be added and existing
|
|
|
|
// header versions and encoding type headers could change size as offset information
|
|
|
|
// is stored to enable efficient jumping to the encoding header or payload.
|
2022-01-07 14:27:22 +08:00
|
|
|
// Page members are only initialized in init()
|
2022-01-06 18:38:41 +08:00
|
|
|
struct Page {
|
2021-12-06 05:39:35 +08:00
|
|
|
uint8_t headerVersion;
|
|
|
|
EncodingType encodingType;
|
2022-01-06 18:38:41 +08:00
|
|
|
|
|
|
|
// Encoding header comes after main header
|
|
|
|
uint8_t encodingHeaderOffset;
|
|
|
|
|
|
|
|
// Payload comes after encoding header
|
|
|
|
uint8_t payloadOffset;
|
|
|
|
|
|
|
|
// Get main header pointer, casting to its type
|
|
|
|
template <typename T>
|
|
|
|
T* getMainHeader() const {
|
|
|
|
return (T*)(this + 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get encoding header pointer, casting to its type
|
|
|
|
template <typename T>
|
|
|
|
T* getEncodingHeader() const {
|
|
|
|
return (T*)((uint8_t*)this + encodingHeaderOffset);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get payload pointer
|
|
|
|
uint8_t* getPayload() const { return (uint8_t*)this + payloadOffset; }
|
2021-12-06 05:39:35 +08:00
|
|
|
};
|
|
|
|
|
2022-01-07 14:27:22 +08:00
|
|
|
// Redwood header version 1
|
|
|
|
// Protects all headers with a 64-bit XXHash checksum
|
2022-01-06 18:38:41 +08:00
|
|
|
// Most other fields are forensic in nature and are not required to be set for correct
|
|
|
|
// behavior but they can faciliate forensic investigation of data on disk. Some of them
|
|
|
|
// could be used for sanity checks at runtime.
|
2022-01-07 14:27:22 +08:00
|
|
|
struct RedwoodHeaderV1 {
|
2022-01-06 18:38:41 +08:00
|
|
|
PageType pageType;
|
|
|
|
// The meaning of pageSubType is based on pageType
|
|
|
|
// For Queue pages, pageSubType is QueueID
|
|
|
|
// For BTree nodes, pageSubType is Height (also stored in BTreeNode)
|
|
|
|
uint8_t pageSubType;
|
|
|
|
XXH64_hash_t checksum;
|
|
|
|
|
|
|
|
// Physical page ID of first block on disk of the ArenaPage
|
|
|
|
PhysicalPageID firstPhysicalPageID;
|
|
|
|
// The first logical page ID the ArenaPage was referenced by when last written
|
|
|
|
LogicalPageID lastKnownLogicalPageID;
|
|
|
|
// The first logical page ID of the parent of this ArenaPage when last written
|
|
|
|
LogicalPageID lastKnownParentLogicalPageID;
|
|
|
|
|
|
|
|
// Time and write version as of the last update to this page.
|
|
|
|
// Note that for relocated pages, writeVersion should not be updated.
|
|
|
|
double writeTime;
|
|
|
|
Version writeVersion;
|
|
|
|
|
|
|
|
// Update checksum
|
2022-01-07 14:27:22 +08:00
|
|
|
void updateChecksum(uint8_t* headerBytes, int len) {
|
2022-01-06 18:38:41 +08:00
|
|
|
// Checksum is within the checksum input so clear it first
|
|
|
|
checksum = 0;
|
|
|
|
checksum = XXH3_64bits(headerBytes, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify checksum
|
2022-01-07 14:27:22 +08:00
|
|
|
void verifyChecksum(uint8_t* headerBytes, int len) {
|
2022-01-06 18:38:41 +08:00
|
|
|
// Checksum is within the checksum input so save it and restore it afterwards
|
|
|
|
XXH64_hash_t saved = checksum;
|
|
|
|
checksum = 0;
|
|
|
|
XXH64_hash_t calculated = XXH3_64bits(headerBytes, len);
|
|
|
|
checksum = saved;
|
|
|
|
|
|
|
|
if (saved != calculated) {
|
|
|
|
throw page_header_checksum_failed();
|
2022-01-02 20:42:39 +08:00
|
|
|
}
|
2022-01-06 18:38:41 +08:00
|
|
|
}
|
2021-12-06 05:39:35 +08:00
|
|
|
};
|
2017-06-10 05:56:41 +08:00
|
|
|
|
2021-12-25 16:22:36 +08:00
|
|
|
// An encoding that validates the payload with an XXHash checksum
|
2021-12-06 05:39:35 +08:00
|
|
|
struct XXHashEncodingHeader {
|
|
|
|
XXH64_hash_t checksum;
|
|
|
|
void encode(uint8_t* payload, int len, PhysicalPageID seed) {
|
|
|
|
checksum = XXH3_64bits_withSeed(payload, len, seed);
|
|
|
|
}
|
|
|
|
void decode(uint8_t* payload, int len, PhysicalPageID seed) {
|
|
|
|
if (checksum != XXH3_64bits_withSeed(payload, len, seed)) {
|
2021-12-25 16:22:36 +08:00
|
|
|
throw page_decoding_failed();
|
2021-12-06 05:39:35 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
2017-06-10 05:56:41 +08:00
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// A dummy "encrypting" encoding which uses XOR with a 1 byte secret key on
|
|
|
|
// the payload to obfuscate it and protects the payload with an XXHash checksum.
|
|
|
|
struct XOREncryptionEncodingHeader {
|
|
|
|
// Checksum is on unencrypted payload
|
2021-12-06 05:39:35 +08:00
|
|
|
XXH64_hash_t checksum;
|
|
|
|
uint8_t keyID;
|
2021-12-25 16:22:36 +08:00
|
|
|
|
2021-12-06 05:39:35 +08:00
|
|
|
void encode(uint8_t secret, uint8_t* payload, int len, PhysicalPageID seed) {
|
2021-12-25 16:22:36 +08:00
|
|
|
checksum = XXH3_64bits_withSeed(payload, len, seed);
|
2021-12-06 05:39:35 +08:00
|
|
|
for (int i = 0; i < len; ++i) {
|
2021-12-25 16:22:36 +08:00
|
|
|
payload[i] ^= secret;
|
2021-12-06 05:39:35 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
void decode(uint8_t secret, uint8_t* payload, int len, PhysicalPageID seed) {
|
|
|
|
for (int i = 0; i < len; ++i) {
|
2021-12-25 16:22:36 +08:00
|
|
|
payload[i] ^= secret;
|
|
|
|
}
|
|
|
|
if (checksum != XXH3_64bits_withSeed(payload, len, seed)) {
|
|
|
|
throw page_decoding_failed();
|
2021-12-06 05:39:35 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
#pragma pack(pop)
|
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// Get the size of the encoding header based on type
|
|
|
|
// Note that this is only to be used in operations involving new pages to calculate the payload offset. For
|
|
|
|
// existing pages, the payload offset is stored in the page.
|
|
|
|
static int encodingHeaderSize(EncodingType t) {
|
|
|
|
if (t == EncodingType::XXHash64) {
|
|
|
|
return sizeof(XXHashEncodingHeader);
|
|
|
|
} else if (t == EncodingType::XOREncryption) {
|
|
|
|
return sizeof(XOREncryptionEncodingHeader);
|
|
|
|
} else {
|
|
|
|
throw page_encoding_not_supported();
|
2021-12-06 05:39:35 +08:00
|
|
|
}
|
2022-01-06 18:38:41 +08:00
|
|
|
}
|
2021-12-06 05:39:35 +08:00
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// Get the usable size for a new page of pageSize using HEADER_WRITE_VERSION with encoding type t
|
|
|
|
static int getUsableSize(int pageSize, EncodingType t) {
|
2022-01-07 14:27:22 +08:00
|
|
|
return pageSize - sizeof(Page) - sizeof(RedwoodHeaderV1) - encodingHeaderSize(t);
|
2022-01-06 18:38:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Initialize the header for a new page so that the payload can be written to
|
2021-12-25 16:22:36 +08:00
|
|
|
// Pre: Buffer is allocated and logical size is set
|
2022-01-06 18:38:41 +08:00
|
|
|
// Post: Page header is initialized and space is reserved for subheaders for
|
|
|
|
// HEADER_WRITE_VERSION main header and the given encoding type.
|
2021-12-25 16:22:36 +08:00
|
|
|
// Payload can be written to with mutateData() and dataSize()
|
2021-12-06 05:39:35 +08:00
|
|
|
void init(EncodingType t, PageType pageType, uint8_t pageSubType) {
|
2022-01-07 14:27:22 +08:00
|
|
|
// Carefully cast away constness to modify page header
|
|
|
|
Page* p = const_cast<Page*>(page);
|
|
|
|
p->headerVersion = HEADER_WRITE_VERSION;
|
|
|
|
p->encodingHeaderOffset = sizeof(Page) + sizeof(RedwoodHeaderV1);
|
|
|
|
p->encodingType = t;
|
|
|
|
p->payloadOffset = page->encodingHeaderOffset + encodingHeaderSize(t);
|
2022-01-06 18:38:41 +08:00
|
|
|
|
|
|
|
pPayload = page->getPayload();
|
|
|
|
payloadSize = logicalSize - (pPayload - buffer);
|
2021-12-06 05:39:35 +08:00
|
|
|
|
2022-01-07 14:27:22 +08:00
|
|
|
RedwoodHeaderV1* h = page->getMainHeader<RedwoodHeaderV1>();
|
2021-12-06 05:39:35 +08:00
|
|
|
h->pageType = pageType;
|
|
|
|
h->pageSubType = pageSubType;
|
|
|
|
|
2021-12-27 21:53:49 +08:00
|
|
|
// Write dummy values for these in new pages. They should be updated when possible before calling preWrite()
|
|
|
|
// when modifying existing pages
|
|
|
|
h->lastKnownLogicalPageID = invalidLogicalPageID;
|
2022-01-06 18:38:41 +08:00
|
|
|
h->lastKnownParentLogicalPageID = invalidLogicalPageID;
|
2021-12-27 21:53:49 +08:00
|
|
|
h->writeVersion = invalidVersion;
|
2021-12-06 05:39:35 +08:00
|
|
|
}
|
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// Get the logical page buffer as a StringRef
|
2021-12-06 05:39:35 +08:00
|
|
|
Standalone<StringRef> asStringRef() const { return Standalone<StringRef>(StringRef(buffer, logicalSize)); }
|
2021-05-06 03:34:21 +08:00
|
|
|
|
|
|
|
// Get an ArenaPage which is a copy of this page, in its own Arena
|
2021-12-25 16:22:36 +08:00
|
|
|
Reference<ArenaPage> clone() const {
|
2021-05-06 03:34:21 +08:00
|
|
|
ArenaPage* p = new ArenaPage(logicalSize, bufferSize);
|
|
|
|
memcpy(p->buffer, buffer, logicalSize);
|
2021-12-25 18:53:38 +08:00
|
|
|
|
2022-01-07 14:27:22 +08:00
|
|
|
// Non-verifying header parse just to initialize members
|
|
|
|
p->postReadHeader(invalidPhysicalPageID, false);
|
|
|
|
p->encryptionKey = encryptionKey;
|
2021-12-09 18:21:50 +08:00
|
|
|
|
2021-05-06 03:34:21 +08:00
|
|
|
return Reference<ArenaPage>(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get an ArenaPage which depends on this page's Arena and references some of its memory
|
2022-01-07 14:27:22 +08:00
|
|
|
Reference<ArenaPage> getSubPage(int offset, int len) const {
|
2021-12-25 16:22:36 +08:00
|
|
|
ASSERT(offset + len <= logicalSize);
|
2021-05-06 03:34:21 +08:00
|
|
|
ArenaPage* p = new ArenaPage(len, 0);
|
|
|
|
p->buffer = buffer + offset;
|
|
|
|
p->arena.dependsOn(arena);
|
2021-12-25 18:53:38 +08:00
|
|
|
|
|
|
|
// Non-verifying header parse just to initialize component pointers
|
2022-01-07 14:27:22 +08:00
|
|
|
p->postReadHeader(invalidPhysicalPageID, false);
|
|
|
|
p->encryptionKey = encryptionKey;
|
2021-12-25 18:53:38 +08:00
|
|
|
|
2021-05-06 03:34:21 +08:00
|
|
|
return Reference<ArenaPage>(p);
|
|
|
|
}
|
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// The next two functions set mostly forensic info that may help in an investigation to identify data on disk. The
|
|
|
|
// exception is pageID which must be set to the physical page ID on disk where the page is written or post-read
|
|
|
|
// verification will fail.
|
|
|
|
void setWriteInfo(PhysicalPageID pageID, Version writeVersion) {
|
|
|
|
if (page->headerVersion == 1) {
|
2022-01-07 14:27:22 +08:00
|
|
|
RedwoodHeaderV1* h = page->getMainHeader<RedwoodHeaderV1>();
|
2022-01-02 20:42:39 +08:00
|
|
|
h->firstPhysicalPageID = pageID;
|
2022-01-06 18:38:41 +08:00
|
|
|
h->writeVersion = writeVersion;
|
2022-01-02 20:42:39 +08:00
|
|
|
h->writeTime = now();
|
|
|
|
}
|
2022-01-06 18:38:41 +08:00
|
|
|
}
|
|
|
|
void setLogicalPageInfo(LogicalPageID lastKnownLogicalPageID, LogicalPageID lastKnownParentLogicalPageID) {
|
|
|
|
if (page->headerVersion == 1) {
|
2022-01-07 14:27:22 +08:00
|
|
|
RedwoodHeaderV1* h = page->getMainHeader<RedwoodHeaderV1>();
|
2022-01-06 18:38:41 +08:00
|
|
|
h->lastKnownLogicalPageID = lastKnownLogicalPageID;
|
|
|
|
h->lastKnownParentLogicalPageID = lastKnownParentLogicalPageID;
|
|
|
|
}
|
|
|
|
}
|
2021-12-09 18:21:50 +08:00
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// Must be called before writing to disk to update headers and encrypt page
|
|
|
|
// Pre: Encoding-specific header fields are set if needed
|
|
|
|
// Secret is set if needed
|
|
|
|
// Post: Main and Encoding subheaders are updated
|
|
|
|
// Payload is possibly encrypted
|
|
|
|
void preWrite(PhysicalPageID pageID) const {
|
2021-12-27 12:04:25 +08:00
|
|
|
// Explicitly check payload definedness to make the source of valgrind errors more clear.
|
|
|
|
// Without this check, calculating a checksum on a payload with undefined bytes does not
|
|
|
|
// cause a valgrind error but the resulting checksum is undefined which causes errors later.
|
|
|
|
ASSERT(VALGRIND_CHECK_MEM_IS_DEFINED(pPayload, payloadSize) == 0);
|
2022-01-07 14:27:22 +08:00
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
if (page->encodingType == EncodingType::XXHash64) {
|
|
|
|
page->getEncodingHeader<XXHashEncodingHeader>()->encode(pPayload, payloadSize, pageID);
|
|
|
|
} else if (page->encodingType == EncodingType::XOREncryption) {
|
2022-01-07 14:27:22 +08:00
|
|
|
ASSERT(encryptionKey.secret.size() == 1);
|
|
|
|
XOREncryptionEncodingHeader* xh = page->getEncodingHeader<XOREncryptionEncodingHeader>();
|
|
|
|
xh->keyID = encryptionKey.id.orDefault(0);
|
|
|
|
xh->encode(encryptionKey.secret[0], pPayload, payloadSize, pageID);
|
2021-12-06 05:39:35 +08:00
|
|
|
} else {
|
2021-12-25 16:22:36 +08:00
|
|
|
throw page_encoding_not_supported();
|
2019-02-21 18:46:30 +08:00
|
|
|
}
|
2021-05-06 03:34:21 +08:00
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
if (page->headerVersion == 1) {
|
2022-01-07 14:27:22 +08:00
|
|
|
page->getMainHeader<RedwoodHeaderV1>()->updateChecksum(buffer, pPayload - buffer);
|
2022-01-02 20:42:39 +08:00
|
|
|
} else {
|
|
|
|
throw page_header_version_not_supported();
|
|
|
|
}
|
2019-02-21 18:46:30 +08:00
|
|
|
}
|
2017-06-10 05:56:41 +08:00
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// Must be called after reading from disk to verify all non-payload bytes
|
|
|
|
// Pre: Bytes from storage medium copied into raw buffer space
|
|
|
|
// Post: Page headers outside of payload are verified (unless verify is false)
|
2022-01-07 14:27:22 +08:00
|
|
|
// encryptionKey is updated with information from encoding header if needed
|
2022-01-06 18:38:41 +08:00
|
|
|
// Payload is accessible via data(), dataSize(), etc.
|
|
|
|
//
|
|
|
|
// Exceptions are thrown for unknown header types or pages which fail verification
|
2022-01-07 14:27:22 +08:00
|
|
|
void postReadHeader(PhysicalPageID pageID, bool verify = true) {
|
2022-01-06 18:38:41 +08:00
|
|
|
pPayload = page->getPayload();
|
|
|
|
payloadSize = logicalSize - (pPayload - buffer);
|
2021-12-25 16:22:36 +08:00
|
|
|
|
2022-01-07 14:27:22 +08:00
|
|
|
// Populate encryption key with relevant fields from page
|
|
|
|
if (page->encodingType == EncodingType::XOREncryption) {
|
|
|
|
encryptionKey.id = page->getEncodingHeader<XOREncryptionEncodingHeader>()->keyID;
|
|
|
|
}
|
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
if (page->headerVersion == 1) {
|
2021-12-25 16:22:36 +08:00
|
|
|
if (verify) {
|
2022-01-07 14:27:22 +08:00
|
|
|
RedwoodHeaderV1* h = page->getMainHeader<RedwoodHeaderV1>();
|
|
|
|
h->verifyChecksum(buffer, pPayload - buffer);
|
2021-12-25 16:22:36 +08:00
|
|
|
if (pageID != h->firstPhysicalPageID) {
|
|
|
|
throw page_header_wrong_page_id();
|
|
|
|
}
|
2021-12-06 05:39:35 +08:00
|
|
|
}
|
2021-12-25 16:22:36 +08:00
|
|
|
} else {
|
|
|
|
throw page_header_version_not_supported();
|
|
|
|
}
|
|
|
|
}
|
2021-12-12 11:41:14 +08:00
|
|
|
|
2022-01-07 14:27:22 +08:00
|
|
|
// Pre: postReadHeader has been called, encoding-specific parameters (such as the encryption secret) have been set
|
2021-12-25 16:22:36 +08:00
|
|
|
// Post: Payload has been verified and decrypted if necessary
|
2022-01-07 14:27:22 +08:00
|
|
|
void postReadPayload(PhysicalPageID pageID) {
|
2022-01-06 18:38:41 +08:00
|
|
|
if (page->encodingType == EncodingType::XXHash64) {
|
|
|
|
page->getEncodingHeader<XXHashEncodingHeader>()->decode(pPayload, payloadSize, pageID);
|
|
|
|
} else if (page->encodingType == EncodingType::XOREncryption) {
|
2022-01-07 14:27:22 +08:00
|
|
|
ASSERT(encryptionKey.secret.size() == 1);
|
|
|
|
page->getEncodingHeader<XOREncryptionEncodingHeader>()->decode(
|
|
|
|
encryptionKey.secret[0], pPayload, payloadSize, pageID);
|
2021-12-06 05:39:35 +08:00
|
|
|
} else {
|
2021-12-25 16:22:36 +08:00
|
|
|
throw page_encoding_not_supported();
|
2021-12-06 05:39:35 +08:00
|
|
|
}
|
|
|
|
}
|
2021-05-06 03:34:21 +08:00
|
|
|
|
2021-05-06 11:55:48 +08:00
|
|
|
const Arena& getArena() const { return arena; }
|
|
|
|
|
2021-12-27 21:53:49 +08:00
|
|
|
// Returns true if the page's encoding type employs encryption
|
|
|
|
bool isEncrypted() const { return getEncodingType() != EncodingType::XXHash64; }
|
|
|
|
|
2021-05-06 03:34:21 +08:00
|
|
|
private:
|
|
|
|
Arena arena;
|
2021-12-06 05:39:35 +08:00
|
|
|
|
|
|
|
// The logical size of the page, which can be smaller than bufferSize, which is only of
|
|
|
|
// practical purpose in simulation to use arbitrarily small page sizes to test edge cases
|
|
|
|
// with shorter execution time
|
2021-05-06 03:34:21 +08:00
|
|
|
int logicalSize;
|
2021-12-06 05:39:35 +08:00
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// The 4k-aligned physical size of allocated memory for the page which also represents the
|
|
|
|
// block size to be written to disk
|
2021-05-06 03:34:21 +08:00
|
|
|
int bufferSize;
|
|
|
|
|
2022-01-06 18:38:41 +08:00
|
|
|
// buffer is a pointer to the page's memory
|
|
|
|
// For convenience, it is unioned with a Page pointer which defines the page structure
|
2021-12-25 16:22:36 +08:00
|
|
|
union {
|
2022-01-06 18:38:41 +08:00
|
|
|
uint8_t* buffer;
|
2022-01-07 14:27:22 +08:00
|
|
|
const Page* page;
|
2021-12-25 16:22:36 +08:00
|
|
|
};
|
2021-12-06 05:39:35 +08:00
|
|
|
|
2022-01-02 20:42:39 +08:00
|
|
|
// Pointer and length of page space available to the user
|
2022-01-06 18:38:41 +08:00
|
|
|
// These are accessed very often so they are stored directly
|
2022-01-02 20:42:39 +08:00
|
|
|
uint8_t* pPayload;
|
|
|
|
int payloadSize;
|
|
|
|
|
2021-05-06 03:34:21 +08:00
|
|
|
public:
|
2022-01-06 18:38:41 +08:00
|
|
|
EncodingType getEncodingType() const { return page->encodingType; }
|
2021-12-25 16:22:36 +08:00
|
|
|
|
2022-01-07 14:27:22 +08:00
|
|
|
PhysicalPageID getPhysicalPageID() const {
|
|
|
|
if (page->headerVersion == 1) {
|
|
|
|
return page->getMainHeader<RedwoodHeaderV1>()->firstPhysicalPageID;
|
2021-12-27 21:53:49 +08:00
|
|
|
} else {
|
2022-01-07 14:27:22 +08:00
|
|
|
throw page_header_version_not_supported();
|
2021-12-27 21:53:49 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-07 14:27:22 +08:00
|
|
|
// Used by encodings that do encryption
|
|
|
|
EncryptionKey encryptionKey;
|
2021-12-25 16:22:36 +08:00
|
|
|
|
2021-12-06 05:39:35 +08:00
|
|
|
// A metadata object that can be attached to the page and will be deleted with the page
|
2020-04-25 05:12:40 +08:00
|
|
|
mutable void* userData;
|
|
|
|
mutable void (*userDataDestructor)(void*);
|
2017-06-10 05:56:41 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
class IPagerSnapshot {
|
|
|
|
public:
|
2021-07-17 04:53:30 +08:00
|
|
|
virtual Future<Reference<const ArenaPage>> getPhysicalPage(PagerEventReasons reason,
|
2021-09-03 06:42:39 +08:00
|
|
|
unsigned int level,
|
|
|
|
LogicalPageID pageID,
|
|
|
|
int priority,
|
|
|
|
bool cacheable,
|
|
|
|
bool nohit) = 0;
|
|
|
|
virtual Future<Reference<const ArenaPage>> getMultiPhysicalPage(PagerEventReasons reason,
|
2021-09-11 02:32:43 +08:00
|
|
|
unsigned int level,
|
|
|
|
VectorRef<LogicalPageID> pageIDs,
|
|
|
|
int priority,
|
|
|
|
bool cacheable,
|
|
|
|
bool nohit) = 0;
|
2017-09-15 20:19:39 +08:00
|
|
|
virtual Version getVersion() const = 0;
|
2017-06-10 05:56:41 +08:00
|
|
|
|
2019-11-11 16:46:05 +08:00
|
|
|
virtual Key getMetaKey() const = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2017-06-10 05:56:41 +08:00
|
|
|
virtual ~IPagerSnapshot() {}
|
|
|
|
|
|
|
|
virtual void addref() = 0;
|
|
|
|
virtual void delref() = 0;
|
|
|
|
};
|
|
|
|
|
2021-04-04 10:54:49 +08:00
|
|
|
// This API is probably too customized to the behavior of DWALPager and probably needs some changes to be more generic.
|
2019-08-07 17:36:33 +08:00
|
|
|
class IPager2 : public IClosable {
|
|
|
|
public:
|
2021-12-25 16:22:36 +08:00
|
|
|
virtual std::string getName() const = 0;
|
|
|
|
|
2021-05-06 03:34:21 +08:00
|
|
|
// Returns an ArenaPage that can be passed to writePage. The data in the returned ArenaPage might not be zeroed.
|
2021-12-06 05:39:35 +08:00
|
|
|
virtual Reference<ArenaPage> newPageBuffer(size_t blocks = 1) = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
|
|
|
// Returns the usable size of pages returned by the pager (i.e. the size of the page that isn't pager overhead).
|
|
|
|
// For a given pager instance, separate calls to this function must return the same value.
|
|
|
|
// Only valid to call after recovery is complete.
|
2021-04-09 03:47:25 +08:00
|
|
|
virtual int getPhysicalPageSize() const = 0;
|
2021-05-21 12:25:18 +08:00
|
|
|
virtual int getLogicalPageSize() const = 0;
|
2021-05-05 14:03:21 +08:00
|
|
|
virtual int getPagesPerExtent() const = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2021-11-19 17:00:14 +08:00
|
|
|
// Write detail fields with pager stats to a trace event
|
|
|
|
virtual void toTraceEvent(TraceEvent& e) const = 0;
|
|
|
|
|
2019-08-07 17:36:33 +08:00
|
|
|
// Allocate a new page ID for a subsequent write. The page will be considered in-use after the next commit
|
|
|
|
// regardless of whether or not it was written to.
|
|
|
|
virtual Future<LogicalPageID> newPageID() = 0;
|
|
|
|
|
2021-05-05 14:03:21 +08:00
|
|
|
virtual Future<LogicalPageID> newExtentPageID(QueueID queueID) = 0;
|
|
|
|
virtual QueueID newLastQueueID() = 0;
|
2021-04-09 03:47:25 +08:00
|
|
|
|
2019-09-28 06:08:05 +08:00
|
|
|
// Replace the contents of a page with new data across *all* versions.
|
|
|
|
// Existing holders of a page reference for pageID, read from any version,
|
|
|
|
// may see the effects of this write.
|
2021-07-17 05:02:59 +08:00
|
|
|
virtual void updatePage(PagerEventReasons reason,
|
2021-08-06 05:48:25 +08:00
|
|
|
unsigned int level,
|
2021-09-18 06:57:59 +08:00
|
|
|
Standalone<VectorRef<LogicalPageID>> pageIDs,
|
2021-07-17 05:02:59 +08:00
|
|
|
Reference<ArenaPage> data) = 0;
|
2019-09-28 06:08:05 +08:00
|
|
|
// Try to atomically update the contents of a page as of version v in the next commit.
|
|
|
|
// If the pager is unable to do this at this time, it may choose to write the data to a new page ID
|
|
|
|
// instead and return the new page ID to the caller. Otherwise the original pageID argument will be returned.
|
|
|
|
// If a new page ID is returned, the old page ID will be freed as of version v
|
2021-07-17 04:53:30 +08:00
|
|
|
virtual Future<LogicalPageID> atomicUpdatePage(PagerEventReasons reason,
|
2021-08-06 05:48:25 +08:00
|
|
|
unsigned int level,
|
2021-07-13 07:07:18 +08:00
|
|
|
LogicalPageID pageID,
|
|
|
|
Reference<ArenaPage> data,
|
|
|
|
Version v) = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2019-09-28 06:08:05 +08:00
|
|
|
// Free pageID to be used again after the commit that moves oldestVersion past v
|
2019-09-05 15:47:57 +08:00
|
|
|
virtual void freePage(LogicalPageID pageID, Version v) = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2021-04-09 03:47:25 +08:00
|
|
|
virtual void freeExtent(LogicalPageID pageID) = 0;
|
|
|
|
|
2020-08-09 15:24:52 +08:00
|
|
|
// If id is remapped, delete the original as of version v and return the page it was remapped to. The caller
|
|
|
|
// is then responsible for referencing and deleting the returned page ID.
|
|
|
|
virtual LogicalPageID detachRemappedPage(LogicalPageID id, Version v) = 0;
|
|
|
|
|
2019-09-28 06:08:05 +08:00
|
|
|
// Returns the latest data (regardless of version) for a page by LogicalPageID
|
2019-08-07 17:36:33 +08:00
|
|
|
// The data returned will be the later of
|
2019-09-28 06:08:05 +08:00
|
|
|
// - the most recent committed atomic
|
2019-08-07 17:36:33 +08:00
|
|
|
// - the most recent non-atomic write
|
2019-11-11 16:46:05 +08:00
|
|
|
// Cacheable indicates that the page should be added to the page cache (if applicable?) as a result of this read.
|
|
|
|
// NoHit indicates that the read should not be considered a cache hit, such as when preloading pages that are
|
|
|
|
// considered likely to be needed soon.
|
2021-07-17 04:53:30 +08:00
|
|
|
virtual Future<Reference<ArenaPage>> readPage(PagerEventReasons reason,
|
2021-08-06 05:48:25 +08:00
|
|
|
unsigned int level,
|
2021-09-03 02:46:39 +08:00
|
|
|
PhysicalPageID pageIDs,
|
2021-07-18 16:49:36 +08:00
|
|
|
int priority,
|
|
|
|
bool cacheable,
|
|
|
|
bool noHit) = 0;
|
2021-09-03 02:46:39 +08:00
|
|
|
virtual Future<Reference<ArenaPage>> readMultiPage(PagerEventReasons reason,
|
2021-09-11 02:32:43 +08:00
|
|
|
unsigned int level,
|
|
|
|
Standalone<VectorRef<PhysicalPageID>> pageIDs,
|
|
|
|
int priority,
|
|
|
|
bool cacheable,
|
|
|
|
bool noHit) = 0;
|
2021-09-03 02:46:39 +08:00
|
|
|
|
2021-05-21 12:25:18 +08:00
|
|
|
virtual Future<Reference<ArenaPage>> readExtent(LogicalPageID pageID) = 0;
|
2021-05-26 13:52:10 +08:00
|
|
|
virtual void releaseExtentReadLock() = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2021-05-05 14:03:21 +08:00
|
|
|
// Temporary methods for testing
|
|
|
|
virtual Future<Standalone<VectorRef<LogicalPageID>>> getUsedExtents(QueueID queueID) = 0;
|
|
|
|
virtual void pushExtentUsedList(QueueID queueID, LogicalPageID extID) = 0;
|
|
|
|
virtual void extentCacheClear() = 0;
|
2021-05-09 15:44:07 +08:00
|
|
|
virtual int64_t getPageCacheCount() = 0;
|
|
|
|
virtual int64_t getExtentCacheCount() = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2019-09-02 14:03:31 +08:00
|
|
|
// Get a snapshot of the metakey and all pages as of the version v which must be >= getOldestVersion()
|
2019-09-28 06:08:05 +08:00
|
|
|
// Note that snapshots at any version may still see the results of updatePage() calls.
|
2019-09-02 14:03:31 +08:00
|
|
|
// The snapshot shall be usable until setOldVersion() is called with a version > v.
|
|
|
|
virtual Reference<IPagerSnapshot> getReadSnapshot(Version v) = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2021-09-10 18:28:46 +08:00
|
|
|
// Atomically make durable all pending page writes, page frees, and update the metadata string,
|
|
|
|
// setting the committed version to v
|
|
|
|
// v must be >= the highest versioned page write.
|
|
|
|
virtual Future<Void> commit(Version v) = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
|
|
|
// Get the latest meta key set or committed
|
|
|
|
virtual Key getMetaKey() const = 0;
|
|
|
|
|
|
|
|
// Set the metakey which will be stored in the next commit
|
|
|
|
virtual void setMetaKey(KeyRef metaKey) = 0;
|
|
|
|
|
2020-06-18 05:45:38 +08:00
|
|
|
virtual StorageBytes getStorageBytes() const = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2021-04-09 03:47:25 +08:00
|
|
|
virtual int64_t getPageCount() = 0;
|
|
|
|
|
2020-08-09 15:24:52 +08:00
|
|
|
// Count of pages in use by the pager client (including retained old page versions)
|
2019-11-04 19:04:03 +08:00
|
|
|
virtual Future<int64_t> getUserPageCount() = 0;
|
2019-10-28 19:00:37 +08:00
|
|
|
|
2019-10-23 08:17:29 +08:00
|
|
|
// Future returned is ready when pager has been initialized from disk and is ready for reads and writes.
|
|
|
|
// It is invalid to call most other functions until init() is ready.
|
|
|
|
// TODO: Document further.
|
|
|
|
virtual Future<Void> init() = 0;
|
|
|
|
|
2019-08-07 17:36:33 +08:00
|
|
|
// Returns latest committed version
|
2021-09-10 18:28:46 +08:00
|
|
|
virtual Version getLastCommittedVersion() const = 0;
|
2019-08-07 17:36:33 +08:00
|
|
|
|
2019-10-18 16:27:00 +08:00
|
|
|
// Returns the oldest readable version as of the most recent committed version
|
2021-09-10 18:28:46 +08:00
|
|
|
virtual Version getOldestReadableVersion() const = 0;
|
2019-09-02 14:03:31 +08:00
|
|
|
|
2019-10-23 08:17:29 +08:00
|
|
|
// Sets the oldest readable version to be put into affect at the next commit.
|
2019-10-18 16:27:00 +08:00
|
|
|
// The pager can reuse pages that were freed at a version less than v.
|
2019-10-23 08:17:29 +08:00
|
|
|
// If any snapshots are in use at a version less than v, the pager can either forcefully
|
|
|
|
// invalidate them or keep their versions around until the snapshots are no longer in use.
|
2021-09-10 18:28:46 +08:00
|
|
|
virtual void setOldestReadableVersion(Version v) = 0;
|
2019-10-18 16:27:00 +08:00
|
|
|
|
2021-11-19 17:00:14 +08:00
|
|
|
// Advance the commit version and the oldest readble version and commit until the remap queue is empty.
|
|
|
|
virtual Future<Void> clearRemapQueue() = 0;
|
|
|
|
|
2019-08-07 17:36:33 +08:00
|
|
|
protected:
|
|
|
|
~IPager2() {} // Destruction should be done using close()/dispose() from the IClosable interface
|
|
|
|
};
|
|
|
|
|
2018-10-19 11:26:45 +08:00
|
|
|
#endif
|