mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2026-05-22 02:27:36 +03:00
2619 asynchronous destruction of ZFS file systems 2747 SPA versioning with zfs feature flags Reviewed by: Matt Ahrens <mahrens@delphix.com> Reviewed by: George Wilson <gwilson@delphix.com> Reviewed by: Richard Lowe <richlowe@richlowe.net> Reviewed by: Dan Kruchinin <dan.kruchinin@gmail.com> Approved by: Eric Schrock <Eric.Schrock@delphix.com> References: illumos/illumos-gate@53089ab7c8 illumos/illumos-gate@ad135b5d64 illumos changeset: 13700:2889e2596bd6 https://www.illumos.org/issues/2619 https://www.illumos.org/issues/2747 NOTE: The grub specific changes were not ported. This change must be made to the Linux grub packages. Ported-by: Brian Behlendorf <behlendorf1@llnl.gov>
This commit is contained in:
committed by
Brian Behlendorf
parent
15313c5e18
commit
9ae529ec5d
@@ -5,5 +5,6 @@ EXTRA_CFLAGS = $(ZFS_MODULE_CFLAGS) @KERNELCPPFLAGS@
|
||||
obj-$(CONFIG_ZFS) := $(MODULE).o
|
||||
|
||||
$(MODULE)-objs += @top_srcdir@/module/nvpair/nvpair.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/nvpair/fnvpair.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/nvpair/nvpair_alloc_spl.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/nvpair/nvpair_alloc_fixed.o
|
||||
|
||||
@@ -0,0 +1,566 @@
|
||||
/*
|
||||
* CDDL HEADER START
|
||||
*
|
||||
* The contents of this file are subject to the terms of the
|
||||
* Common Development and Distribution License (the "License").
|
||||
* You may not use this file except in compliance with the License.
|
||||
*
|
||||
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
||||
* or http://www.opensolaris.org/os/licensing.
|
||||
* See the License for the specific language governing permissions
|
||||
* and limitations under the License.
|
||||
*
|
||||
* When distributing Covered Code, include this CDDL HEADER in each
|
||||
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
||||
* If applicable, add the following below this CDDL HEADER, with the
|
||||
* fields enclosed by brackets "[]" replaced with your own identifying
|
||||
* information: Portions Copyright [yyyy] [name of copyright owner]
|
||||
*
|
||||
* CDDL HEADER END
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/nvpair.h>
|
||||
#include <sys/kmem.h>
|
||||
#include <sys/debug.h>
|
||||
#ifndef _KERNEL
|
||||
#include <stdlib.h>
|
||||
#endif
|
||||
|
||||
/*
|
||||
* "Force" nvlist wrapper.
|
||||
*
|
||||
* These functions wrap the nvlist_* functions with assertions that assume
|
||||
* the operation is successful. This allows the caller's code to be much
|
||||
* more readable, especially for the fnvlist_lookup_* and fnvpair_value_*
|
||||
* functions, which can return the requested value (rather than filling in
|
||||
* a pointer).
|
||||
*
|
||||
* These functions use NV_UNIQUE_NAME, encoding NV_ENCODE_NATIVE, and allocate
|
||||
* with KM_SLEEP.
|
||||
*
|
||||
* More wrappers should be added as needed -- for example
|
||||
* nvlist_lookup_*_array and nvpair_value_*_array.
|
||||
*/
|
||||
|
||||
nvlist_t *
|
||||
fnvlist_alloc(void)
|
||||
{
|
||||
nvlist_t *nvl;
|
||||
VERIFY3U(nvlist_alloc(&nvl, NV_UNIQUE_NAME, KM_SLEEP), ==, 0);
|
||||
return (nvl);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_free(nvlist_t *nvl)
|
||||
{
|
||||
nvlist_free(nvl);
|
||||
}
|
||||
|
||||
size_t
|
||||
fnvlist_size(nvlist_t *nvl)
|
||||
{
|
||||
size_t size;
|
||||
VERIFY3U(nvlist_size(nvl, &size, NV_ENCODE_NATIVE), ==, 0);
|
||||
return (size);
|
||||
}
|
||||
|
||||
/*
|
||||
* Returns allocated buffer of size *sizep. Caller must free the buffer with
|
||||
* fnvlist_pack_free().
|
||||
*/
|
||||
char *
|
||||
fnvlist_pack(nvlist_t *nvl, size_t *sizep)
|
||||
{
|
||||
char *packed = 0;
|
||||
VERIFY3U(nvlist_pack(nvl, &packed, sizep, NV_ENCODE_NATIVE,
|
||||
KM_SLEEP), ==, 0);
|
||||
return (packed);
|
||||
}
|
||||
|
||||
/*ARGSUSED*/
|
||||
void
|
||||
fnvlist_pack_free(char *pack, size_t size)
|
||||
{
|
||||
#ifdef _KERNEL
|
||||
kmem_free(pack, size);
|
||||
#else
|
||||
free(pack);
|
||||
#endif
|
||||
}
|
||||
|
||||
nvlist_t *
|
||||
fnvlist_unpack(char *buf, size_t buflen)
|
||||
{
|
||||
nvlist_t *rv;
|
||||
VERIFY3U(nvlist_unpack(buf, buflen, &rv, KM_SLEEP), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
nvlist_t *
|
||||
fnvlist_dup(nvlist_t *nvl)
|
||||
{
|
||||
nvlist_t *rv;
|
||||
VERIFY3U(nvlist_dup(nvl, &rv, KM_SLEEP), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_merge(nvlist_t *dst, nvlist_t *src)
|
||||
{
|
||||
VERIFY3U(nvlist_merge(dst, src, KM_SLEEP), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_boolean(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
VERIFY3U(nvlist_add_boolean(nvl, name), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_boolean_value(nvlist_t *nvl, const char *name, boolean_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_boolean_value(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_byte(nvlist_t *nvl, const char *name, uchar_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_byte(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_int8(nvlist_t *nvl, const char *name, int8_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_int8(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_uint8(nvlist_t *nvl, const char *name, uint8_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_uint8(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_int16(nvlist_t *nvl, const char *name, int16_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_int16(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_uint16(nvlist_t *nvl, const char *name, uint16_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_uint16(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_int32(nvlist_t *nvl, const char *name, int32_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_int32(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_uint32(nvlist_t *nvl, const char *name, uint32_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_uint32(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_int64(nvlist_t *nvl, const char *name, int64_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_int64(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_uint64(nvlist_t *nvl, const char *name, uint64_t val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_uint64(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_string(nvlist_t *nvl, const char *name, const char *val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_string(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_nvlist(nvlist_t *nvl, const char *name, nvlist_t *val)
|
||||
{
|
||||
VERIFY3U(nvlist_add_nvlist(nvl, name, val), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_nvpair(nvlist_t *nvl, nvpair_t *pair)
|
||||
{
|
||||
VERIFY3U(nvlist_add_nvpair(nvl, pair), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_boolean_array(nvlist_t *nvl, const char *name,
|
||||
boolean_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_boolean_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_byte_array(nvlist_t *nvl, const char *name, uchar_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_byte_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_int8_array(nvlist_t *nvl, const char *name, int8_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_int8_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_uint8_array(nvlist_t *nvl, const char *name, uint8_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_uint8_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_int16_array(nvlist_t *nvl, const char *name, int16_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_int16_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_uint16_array(nvlist_t *nvl, const char *name,
|
||||
uint16_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_uint16_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_int32_array(nvlist_t *nvl, const char *name, int32_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_int32_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_uint32_array(nvlist_t *nvl, const char *name,
|
||||
uint32_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_uint32_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_int64_array(nvlist_t *nvl, const char *name, int64_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_int64_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_uint64_array(nvlist_t *nvl, const char *name,
|
||||
uint64_t *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_uint64_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_string_array(nvlist_t *nvl, const char *name,
|
||||
char * const *val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_string_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_add_nvlist_array(nvlist_t *nvl, const char *name,
|
||||
nvlist_t **val, uint_t n)
|
||||
{
|
||||
VERIFY3U(nvlist_add_nvlist_array(nvl, name, val, n), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_remove(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
VERIFY3U(nvlist_remove_all(nvl, name), ==, 0);
|
||||
}
|
||||
|
||||
void
|
||||
fnvlist_remove_nvpair(nvlist_t *nvl, nvpair_t *pair)
|
||||
{
|
||||
VERIFY3U(nvlist_remove_nvpair(nvl, pair), ==, 0);
|
||||
}
|
||||
|
||||
nvpair_t *
|
||||
fnvlist_lookup_nvpair(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
nvpair_t *rv;
|
||||
VERIFY3U(nvlist_lookup_nvpair(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
/* returns B_TRUE if the entry exists */
|
||||
boolean_t
|
||||
fnvlist_lookup_boolean(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
return (nvlist_lookup_boolean(nvl, name) == 0);
|
||||
}
|
||||
|
||||
boolean_t
|
||||
fnvlist_lookup_boolean_value(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
boolean_t rv;
|
||||
VERIFY3U(nvlist_lookup_boolean_value(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uchar_t
|
||||
fnvlist_lookup_byte(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
uchar_t rv;
|
||||
VERIFY3U(nvlist_lookup_byte(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
int8_t
|
||||
fnvlist_lookup_int8(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
int8_t rv;
|
||||
VERIFY3U(nvlist_lookup_int8(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
int16_t
|
||||
fnvlist_lookup_int16(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
int16_t rv;
|
||||
VERIFY3U(nvlist_lookup_int16(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
int32_t
|
||||
fnvlist_lookup_int32(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
int32_t rv;
|
||||
VERIFY3U(nvlist_lookup_int32(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
int64_t
|
||||
fnvlist_lookup_int64(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
int64_t rv;
|
||||
VERIFY3U(nvlist_lookup_int64(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uint8_t
|
||||
fnvlist_lookup_uint8(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
uint8_t rv;
|
||||
VERIFY3U(nvlist_lookup_uint8(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uint16_t
|
||||
fnvlist_lookup_uint16(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
uint16_t rv;
|
||||
VERIFY3U(nvlist_lookup_uint16(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uint32_t
|
||||
fnvlist_lookup_uint32(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
uint32_t rv;
|
||||
VERIFY3U(nvlist_lookup_uint32(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uint64_t
|
||||
fnvlist_lookup_uint64(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
uint64_t rv;
|
||||
VERIFY3U(nvlist_lookup_uint64(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
char *
|
||||
fnvlist_lookup_string(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
char *rv;
|
||||
VERIFY3U(nvlist_lookup_string(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
nvlist_t *
|
||||
fnvlist_lookup_nvlist(nvlist_t *nvl, const char *name)
|
||||
{
|
||||
nvlist_t *rv;
|
||||
VERIFY3U(nvlist_lookup_nvlist(nvl, name, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
boolean_t
|
||||
fnvpair_value_boolean_value(nvpair_t *nvp)
|
||||
{
|
||||
boolean_t rv;
|
||||
VERIFY3U(nvpair_value_boolean_value(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uchar_t
|
||||
fnvpair_value_byte(nvpair_t *nvp)
|
||||
{
|
||||
uchar_t rv;
|
||||
VERIFY3U(nvpair_value_byte(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
int8_t
|
||||
fnvpair_value_int8(nvpair_t *nvp)
|
||||
{
|
||||
int8_t rv;
|
||||
VERIFY3U(nvpair_value_int8(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
int16_t
|
||||
fnvpair_value_int16(nvpair_t *nvp)
|
||||
{
|
||||
int16_t rv;
|
||||
VERIFY3U(nvpair_value_int16(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
int32_t
|
||||
fnvpair_value_int32(nvpair_t *nvp)
|
||||
{
|
||||
int32_t rv;
|
||||
VERIFY3U(nvpair_value_int32(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
int64_t
|
||||
fnvpair_value_int64(nvpair_t *nvp)
|
||||
{
|
||||
int64_t rv;
|
||||
VERIFY3U(nvpair_value_int64(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uint8_t
|
||||
fnvpair_value_uint8(nvpair_t *nvp)
|
||||
{
|
||||
uint8_t rv;
|
||||
VERIFY3U(nvpair_value_uint8(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uint16_t
|
||||
fnvpair_value_uint16(nvpair_t *nvp)
|
||||
{
|
||||
uint16_t rv;
|
||||
VERIFY3U(nvpair_value_uint16(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uint32_t
|
||||
fnvpair_value_uint32(nvpair_t *nvp)
|
||||
{
|
||||
uint32_t rv;
|
||||
VERIFY3U(nvpair_value_uint32(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
uint64_t
|
||||
fnvpair_value_uint64(nvpair_t *nvp)
|
||||
{
|
||||
uint64_t rv;
|
||||
VERIFY3U(nvpair_value_uint64(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
char *
|
||||
fnvpair_value_string(nvpair_t *nvp)
|
||||
{
|
||||
char *rv;
|
||||
VERIFY3U(nvpair_value_string(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
nvlist_t *
|
||||
fnvpair_value_nvlist(nvpair_t *nvp)
|
||||
{
|
||||
nvlist_t *rv;
|
||||
VERIFY3U(nvpair_value_nvlist(nvp, &rv), ==, 0);
|
||||
return (rv);
|
||||
}
|
||||
|
||||
#if defined(_KERNEL) && defined(HAVE_SPL)
|
||||
|
||||
EXPORT_SYMBOL(fnvlist_alloc);
|
||||
EXPORT_SYMBOL(fnvlist_free);
|
||||
EXPORT_SYMBOL(fnvlist_size);
|
||||
EXPORT_SYMBOL(fnvlist_pack);
|
||||
EXPORT_SYMBOL(fnvlist_unpack);
|
||||
EXPORT_SYMBOL(fnvlist_dup);
|
||||
EXPORT_SYMBOL(fnvlist_merge);
|
||||
|
||||
EXPORT_SYMBOL(fnvlist_add_nvpair);
|
||||
EXPORT_SYMBOL(fnvlist_add_boolean);
|
||||
EXPORT_SYMBOL(fnvlist_add_boolean_value);
|
||||
EXPORT_SYMBOL(fnvlist_add_byte);
|
||||
EXPORT_SYMBOL(fnvlist_add_int8);
|
||||
EXPORT_SYMBOL(fnvlist_add_uint8);
|
||||
EXPORT_SYMBOL(fnvlist_add_int16);
|
||||
EXPORT_SYMBOL(fnvlist_add_uint16);
|
||||
EXPORT_SYMBOL(fnvlist_add_int32);
|
||||
EXPORT_SYMBOL(fnvlist_add_uint32);
|
||||
EXPORT_SYMBOL(fnvlist_add_int64);
|
||||
EXPORT_SYMBOL(fnvlist_add_uint64);
|
||||
EXPORT_SYMBOL(fnvlist_add_string);
|
||||
EXPORT_SYMBOL(fnvlist_add_nvlist);
|
||||
EXPORT_SYMBOL(fnvlist_add_boolean_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_byte_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_int8_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_uint8_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_int16_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_uint16_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_int32_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_uint32_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_int64_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_uint64_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_string_array);
|
||||
EXPORT_SYMBOL(fnvlist_add_nvlist_array);
|
||||
|
||||
EXPORT_SYMBOL(fnvlist_remove);
|
||||
EXPORT_SYMBOL(fnvlist_remove_nvpair);
|
||||
|
||||
EXPORT_SYMBOL(fnvlist_lookup_nvpair);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_boolean);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_boolean_value);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_byte);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_int8);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_uint8);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_int16);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_uint16);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_int32);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_uint32);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_int64);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_uint64);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_string);
|
||||
EXPORT_SYMBOL(fnvlist_lookup_nvlist);
|
||||
|
||||
EXPORT_SYMBOL(fnvpair_value_boolean_value);
|
||||
EXPORT_SYMBOL(fnvpair_value_byte);
|
||||
EXPORT_SYMBOL(fnvpair_value_int8);
|
||||
EXPORT_SYMBOL(fnvpair_value_uint8);
|
||||
EXPORT_SYMBOL(fnvpair_value_int16);
|
||||
EXPORT_SYMBOL(fnvpair_value_uint16);
|
||||
EXPORT_SYMBOL(fnvpair_value_int32);
|
||||
EXPORT_SYMBOL(fnvpair_value_uint32);
|
||||
EXPORT_SYMBOL(fnvpair_value_int64);
|
||||
EXPORT_SYMBOL(fnvpair_value_uint64);
|
||||
EXPORT_SYMBOL(fnvpair_value_string);
|
||||
EXPORT_SYMBOL(fnvpair_value_nvlist);
|
||||
|
||||
#endif
|
||||
@@ -79,6 +79,8 @@ zpool_prop_init(void)
|
||||
ZFS_TYPE_POOL, "<size>", "SIZE");
|
||||
zprop_register_number(ZPOOL_PROP_FREE, "free", 0, PROP_READONLY,
|
||||
ZFS_TYPE_POOL, "<size>", "FREE");
|
||||
zprop_register_number(ZPOOL_PROP_FREEING, "freeing", 0, PROP_READONLY,
|
||||
ZFS_TYPE_POOL, "<size>", "FREEING");
|
||||
zprop_register_number(ZPOOL_PROP_ALLOCATED, "allocated", 0,
|
||||
PROP_READONLY, ZFS_TYPE_POOL, "<size>", "ALLOC");
|
||||
zprop_register_number(ZPOOL_PROP_EXPANDSZ, "expandsize", 0,
|
||||
@@ -170,6 +172,26 @@ zpool_prop_default_numeric(zpool_prop_t prop)
|
||||
return (zpool_prop_table[prop].pd_numdefault);
|
||||
}
|
||||
|
||||
/*
|
||||
* Returns true if this is a valid feature@ property.
|
||||
*/
|
||||
boolean_t
|
||||
zpool_prop_feature(const char *name)
|
||||
{
|
||||
static const char *prefix = "feature@";
|
||||
return (strncmp(name, prefix, strlen(prefix)) == 0);
|
||||
}
|
||||
|
||||
/*
|
||||
* Returns true if this is a valid unsupported@ property.
|
||||
*/
|
||||
boolean_t
|
||||
zpool_prop_unsupported(const char *name)
|
||||
{
|
||||
static const char *prefix = "unsupported@";
|
||||
return (strncmp(name, prefix, strlen(prefix)) == 0);
|
||||
}
|
||||
|
||||
int
|
||||
zpool_prop_string_to_index(zpool_prop_t prop, const char *string,
|
||||
uint64_t *index)
|
||||
@@ -223,6 +245,8 @@ EXPORT_SYMBOL(zpool_prop_to_name);
|
||||
EXPORT_SYMBOL(zpool_prop_default_string);
|
||||
EXPORT_SYMBOL(zpool_prop_default_numeric);
|
||||
EXPORT_SYMBOL(zpool_prop_readonly);
|
||||
EXPORT_SYMBOL(zpool_prop_feature);
|
||||
EXPORT_SYMBOL(zpool_prop_unsupported);
|
||||
EXPORT_SYMBOL(zpool_prop_index_to_string);
|
||||
EXPORT_SYMBOL(zpool_prop_string_to_index);
|
||||
#endif
|
||||
|
||||
@@ -8,6 +8,7 @@ $(MODULE)-objs += @top_srcdir@/module/zfs/arc.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/bplist.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/bpobj.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/dbuf.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/bptree.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/ddt.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/ddt_zap.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/dmu.o
|
||||
@@ -59,6 +60,8 @@ $(MODULE)-objs += @top_srcdir@/module/zfs/vdev_root.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/zap.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/zap_leaf.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/zap_micro.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/zfeature.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/zfeature_common.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/zfs_acl.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/zfs_byteswap.o
|
||||
$(MODULE)-objs += @top_srcdir@/module/zfs/zfs_ctldir.o
|
||||
|
||||
+3
-1
@@ -2729,9 +2729,11 @@ arc_read_done(zio_t *zio)
|
||||
callback_list = hdr->b_acb;
|
||||
ASSERT(callback_list != NULL);
|
||||
if (BP_SHOULD_BYTESWAP(zio->io_bp) && zio->io_error == 0) {
|
||||
dmu_object_byteswap_t bswap =
|
||||
DMU_OT_BYTESWAP(BP_GET_TYPE(zio->io_bp));
|
||||
arc_byteswap_func_t *func = BP_GET_LEVEL(zio->io_bp) > 0 ?
|
||||
byteswap_uint64_array :
|
||||
dmu_ot[BP_GET_TYPE(zio->io_bp)].ot_byteswap;
|
||||
dmu_ot_byteswap[bswap].ob_func;
|
||||
func(buf->b_data, hdr->b_size);
|
||||
}
|
||||
|
||||
|
||||
@@ -0,0 +1,224 @@
|
||||
/*
|
||||
* CDDL HEADER START
|
||||
*
|
||||
* The contents of this file are subject to the terms of the
|
||||
* Common Development and Distribution License (the "License").
|
||||
* You may not use this file except in compliance with the License.
|
||||
*
|
||||
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
||||
* or http://www.opensolaris.org/os/licensing.
|
||||
* See the License for the specific language governing permissions
|
||||
* and limitations under the License.
|
||||
*
|
||||
* When distributing Covered Code, include this CDDL HEADER in each
|
||||
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
||||
* If applicable, add the following below this CDDL HEADER, with the
|
||||
* fields enclosed by brackets "[]" replaced with your own identifying
|
||||
* information: Portions Copyright [yyyy] [name of copyright owner]
|
||||
*
|
||||
* CDDL HEADER END
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/arc.h>
|
||||
#include <sys/bptree.h>
|
||||
#include <sys/dmu.h>
|
||||
#include <sys/dmu_objset.h>
|
||||
#include <sys/dmu_tx.h>
|
||||
#include <sys/dmu_traverse.h>
|
||||
#include <sys/dsl_dataset.h>
|
||||
#include <sys/dsl_dir.h>
|
||||
#include <sys/dsl_pool.h>
|
||||
#include <sys/dnode.h>
|
||||
#include <sys/refcount.h>
|
||||
#include <sys/spa.h>
|
||||
|
||||
/*
|
||||
* A bptree is a queue of root block pointers from destroyed datasets. When a
|
||||
* dataset is destroyed its root block pointer is put on the end of the pool's
|
||||
* bptree queue so the dataset's blocks can be freed asynchronously by
|
||||
* dsl_scan_sync. This allows the delete operation to finish without traversing
|
||||
* all the dataset's blocks.
|
||||
*
|
||||
* Note that while bt_begin and bt_end are only ever incremented in this code
|
||||
* they are effectively reset to 0 every time the entire bptree is freed because
|
||||
* the bptree's object is destroyed and re-created.
|
||||
*/
|
||||
|
||||
struct bptree_args {
|
||||
bptree_phys_t *ba_phys; /* data in bonus buffer, dirtied if freeing */
|
||||
boolean_t ba_free; /* true if freeing during traversal */
|
||||
|
||||
bptree_itor_t *ba_func; /* function to call for each blockpointer */
|
||||
void *ba_arg; /* caller supplied argument to ba_func */
|
||||
dmu_tx_t *ba_tx; /* caller supplied tx, NULL if not freeing */
|
||||
} bptree_args_t;
|
||||
|
||||
uint64_t
|
||||
bptree_alloc(objset_t *os, dmu_tx_t *tx)
|
||||
{
|
||||
uint64_t obj;
|
||||
dmu_buf_t *db;
|
||||
bptree_phys_t *bt;
|
||||
|
||||
obj = dmu_object_alloc(os, DMU_OTN_UINT64_METADATA,
|
||||
SPA_MAXBLOCKSIZE, DMU_OTN_UINT64_METADATA,
|
||||
sizeof (bptree_phys_t), tx);
|
||||
|
||||
/*
|
||||
* Bonus buffer contents are already initialized to 0, but for
|
||||
* readability we make it explicit.
|
||||
*/
|
||||
VERIFY3U(0, ==, dmu_bonus_hold(os, obj, FTAG, &db));
|
||||
dmu_buf_will_dirty(db, tx);
|
||||
bt = db->db_data;
|
||||
bt->bt_begin = 0;
|
||||
bt->bt_end = 0;
|
||||
bt->bt_bytes = 0;
|
||||
bt->bt_comp = 0;
|
||||
bt->bt_uncomp = 0;
|
||||
dmu_buf_rele(db, FTAG);
|
||||
|
||||
return (obj);
|
||||
}
|
||||
|
||||
int
|
||||
bptree_free(objset_t *os, uint64_t obj, dmu_tx_t *tx)
|
||||
{
|
||||
dmu_buf_t *db;
|
||||
bptree_phys_t *bt;
|
||||
|
||||
VERIFY3U(0, ==, dmu_bonus_hold(os, obj, FTAG, &db));
|
||||
bt = db->db_data;
|
||||
ASSERT3U(bt->bt_begin, ==, bt->bt_end);
|
||||
ASSERT3U(bt->bt_bytes, ==, 0);
|
||||
ASSERT3U(bt->bt_comp, ==, 0);
|
||||
ASSERT3U(bt->bt_uncomp, ==, 0);
|
||||
dmu_buf_rele(db, FTAG);
|
||||
|
||||
return (dmu_object_free(os, obj, tx));
|
||||
}
|
||||
|
||||
void
|
||||
bptree_add(objset_t *os, uint64_t obj, blkptr_t *bp, uint64_t birth_txg,
|
||||
uint64_t bytes, uint64_t comp, uint64_t uncomp, dmu_tx_t *tx)
|
||||
{
|
||||
dmu_buf_t *db;
|
||||
bptree_phys_t *bt;
|
||||
bptree_entry_phys_t bte;
|
||||
|
||||
/*
|
||||
* bptree objects are in the pool mos, therefore they can only be
|
||||
* modified in syncing context. Furthermore, this is only modified
|
||||
* by the sync thread, so no locking is necessary.
|
||||
*/
|
||||
ASSERT(dmu_tx_is_syncing(tx));
|
||||
|
||||
VERIFY3U(0, ==, dmu_bonus_hold(os, obj, FTAG, &db));
|
||||
bt = db->db_data;
|
||||
|
||||
bte.be_birth_txg = birth_txg;
|
||||
bte.be_bp = *bp;
|
||||
bzero(&bte.be_zb, sizeof (bte.be_zb));
|
||||
dmu_write(os, obj, bt->bt_end * sizeof (bte), sizeof (bte), &bte, tx);
|
||||
|
||||
dmu_buf_will_dirty(db, tx);
|
||||
bt->bt_end++;
|
||||
bt->bt_bytes += bytes;
|
||||
bt->bt_comp += comp;
|
||||
bt->bt_uncomp += uncomp;
|
||||
dmu_buf_rele(db, FTAG);
|
||||
}
|
||||
|
||||
/* ARGSUSED */
|
||||
static int
|
||||
bptree_visit_cb(spa_t *spa, zilog_t *zilog, const blkptr_t *bp, arc_buf_t *pbuf,
|
||||
const zbookmark_t *zb, const dnode_phys_t *dnp, void *arg)
|
||||
{
|
||||
int err;
|
||||
struct bptree_args *ba = arg;
|
||||
|
||||
if (bp == NULL)
|
||||
return (0);
|
||||
|
||||
err = ba->ba_func(ba->ba_arg, bp, ba->ba_tx);
|
||||
if (err == 0 && ba->ba_free) {
|
||||
ba->ba_phys->bt_bytes -= bp_get_dsize_sync(spa, bp);
|
||||
ba->ba_phys->bt_comp -= BP_GET_PSIZE(bp);
|
||||
ba->ba_phys->bt_uncomp -= BP_GET_UCSIZE(bp);
|
||||
}
|
||||
return (err);
|
||||
}
|
||||
|
||||
int
|
||||
bptree_iterate(objset_t *os, uint64_t obj, boolean_t free, bptree_itor_t func,
|
||||
void *arg, dmu_tx_t *tx)
|
||||
{
|
||||
int err;
|
||||
uint64_t i;
|
||||
dmu_buf_t *db;
|
||||
struct bptree_args ba;
|
||||
|
||||
ASSERT(!free || dmu_tx_is_syncing(tx));
|
||||
|
||||
err = dmu_bonus_hold(os, obj, FTAG, &db);
|
||||
if (err != 0)
|
||||
return (err);
|
||||
|
||||
if (free)
|
||||
dmu_buf_will_dirty(db, tx);
|
||||
|
||||
ba.ba_phys = db->db_data;
|
||||
ba.ba_free = free;
|
||||
ba.ba_func = func;
|
||||
ba.ba_arg = arg;
|
||||
ba.ba_tx = tx;
|
||||
|
||||
err = 0;
|
||||
for (i = ba.ba_phys->bt_begin; i < ba.ba_phys->bt_end; i++) {
|
||||
bptree_entry_phys_t bte;
|
||||
|
||||
ASSERT(!free || i == ba.ba_phys->bt_begin);
|
||||
|
||||
err = dmu_read(os, obj, i * sizeof (bte), sizeof (bte),
|
||||
&bte, DMU_READ_NO_PREFETCH);
|
||||
if (err != 0)
|
||||
break;
|
||||
|
||||
err = traverse_dataset_destroyed(os->os_spa, &bte.be_bp,
|
||||
bte.be_birth_txg, &bte.be_zb, TRAVERSE_POST,
|
||||
bptree_visit_cb, &ba);
|
||||
if (free) {
|
||||
ASSERT(err == 0 || err == ERESTART);
|
||||
if (err != 0) {
|
||||
/* save bookmark for future resume */
|
||||
ASSERT3U(bte.be_zb.zb_objset, ==,
|
||||
ZB_DESTROYED_OBJSET);
|
||||
ASSERT3U(bte.be_zb.zb_level, ==, 0);
|
||||
dmu_write(os, obj, i * sizeof (bte),
|
||||
sizeof (bte), &bte, tx);
|
||||
break;
|
||||
} else {
|
||||
ba.ba_phys->bt_begin++;
|
||||
(void) dmu_free_range(os, obj,
|
||||
i * sizeof (bte), sizeof (bte), tx);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
ASSERT(!free || err != 0 || ba.ba_phys->bt_begin == ba.ba_phys->bt_end);
|
||||
|
||||
/* if all blocks are free there should be no used space */
|
||||
if (ba.ba_phys->bt_begin == ba.ba_phys->bt_end) {
|
||||
ASSERT3U(ba.ba_phys->bt_bytes, ==, 0);
|
||||
ASSERT3U(ba.ba_phys->bt_comp, ==, 0);
|
||||
ASSERT3U(ba.ba_phys->bt_uncomp, ==, 0);
|
||||
}
|
||||
|
||||
dmu_buf_rele(db, FTAG);
|
||||
|
||||
return (err);
|
||||
}
|
||||
+2
-1
@@ -21,6 +21,7 @@
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright 2011 Nexenta Systems, Inc. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/zfs_context.h>
|
||||
@@ -260,7 +261,7 @@ dbuf_is_metadata(dmu_buf_impl_t *db)
|
||||
boolean_t is_metadata;
|
||||
|
||||
DB_DNODE_ENTER(db);
|
||||
is_metadata = dmu_ot[DB_DNODE(db)->dn_type].ot_metadata;
|
||||
is_metadata = DMU_OT_IS_METADATA(DB_DNODE(db)->dn_type);
|
||||
DB_DNODE_EXIT(db);
|
||||
|
||||
return (is_metadata);
|
||||
|
||||
+4
-5
@@ -21,6 +21,7 @@
|
||||
|
||||
/*
|
||||
* Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/zfs_context.h>
|
||||
@@ -1120,11 +1121,9 @@ ddt_sync_table(ddt_t *ddt, dmu_tx_t *tx, uint64_t txg)
|
||||
ASSERT(spa->spa_uberblock.ub_version >= SPA_VERSION_DEDUP);
|
||||
|
||||
if (spa->spa_ddt_stat_object == 0) {
|
||||
spa->spa_ddt_stat_object = zap_create(ddt->ddt_os,
|
||||
DMU_OT_DDT_STATS, DMU_OT_NONE, 0, tx);
|
||||
VERIFY(zap_add(ddt->ddt_os, DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_DDT_STATS, sizeof (uint64_t), 1,
|
||||
&spa->spa_ddt_stat_object, tx) == 0);
|
||||
spa->spa_ddt_stat_object = zap_create_link(ddt->ddt_os,
|
||||
DMU_OT_DDT_STATS, DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_DDT_STATS, tx);
|
||||
}
|
||||
|
||||
while ((dde = avl_destroy_nodes(&ddt->ddt_tree, &cookie)) != NULL) {
|
||||
|
||||
+70
-56
@@ -20,6 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/dmu.h>
|
||||
@@ -46,60 +47,73 @@
|
||||
#endif
|
||||
|
||||
const dmu_object_type_info_t dmu_ot[DMU_OT_NUMTYPES] = {
|
||||
{ byteswap_uint8_array, TRUE, "unallocated" },
|
||||
{ zap_byteswap, TRUE, "object directory" },
|
||||
{ byteswap_uint64_array, TRUE, "object array" },
|
||||
{ byteswap_uint8_array, TRUE, "packed nvlist" },
|
||||
{ byteswap_uint64_array, TRUE, "packed nvlist size" },
|
||||
{ byteswap_uint64_array, TRUE, "bpobj" },
|
||||
{ byteswap_uint64_array, TRUE, "bpobj header" },
|
||||
{ byteswap_uint64_array, TRUE, "SPA space map header" },
|
||||
{ byteswap_uint64_array, TRUE, "SPA space map" },
|
||||
{ byteswap_uint64_array, TRUE, "ZIL intent log" },
|
||||
{ dnode_buf_byteswap, TRUE, "DMU dnode" },
|
||||
{ dmu_objset_byteswap, TRUE, "DMU objset" },
|
||||
{ byteswap_uint64_array, TRUE, "DSL directory" },
|
||||
{ zap_byteswap, TRUE, "DSL directory child map"},
|
||||
{ zap_byteswap, TRUE, "DSL dataset snap map" },
|
||||
{ zap_byteswap, TRUE, "DSL props" },
|
||||
{ byteswap_uint64_array, TRUE, "DSL dataset" },
|
||||
{ zfs_znode_byteswap, TRUE, "ZFS znode" },
|
||||
{ zfs_oldacl_byteswap, TRUE, "ZFS V0 ACL" },
|
||||
{ byteswap_uint8_array, FALSE, "ZFS plain file" },
|
||||
{ zap_byteswap, TRUE, "ZFS directory" },
|
||||
{ zap_byteswap, TRUE, "ZFS master node" },
|
||||
{ zap_byteswap, TRUE, "ZFS delete queue" },
|
||||
{ byteswap_uint8_array, FALSE, "zvol object" },
|
||||
{ zap_byteswap, TRUE, "zvol prop" },
|
||||
{ byteswap_uint8_array, FALSE, "other uint8[]" },
|
||||
{ byteswap_uint64_array, FALSE, "other uint64[]" },
|
||||
{ zap_byteswap, TRUE, "other ZAP" },
|
||||
{ zap_byteswap, TRUE, "persistent error log" },
|
||||
{ byteswap_uint8_array, TRUE, "SPA history" },
|
||||
{ byteswap_uint64_array, TRUE, "SPA history offsets" },
|
||||
{ zap_byteswap, TRUE, "Pool properties" },
|
||||
{ zap_byteswap, TRUE, "DSL permissions" },
|
||||
{ zfs_acl_byteswap, TRUE, "ZFS ACL" },
|
||||
{ byteswap_uint8_array, TRUE, "ZFS SYSACL" },
|
||||
{ byteswap_uint8_array, TRUE, "FUID table" },
|
||||
{ byteswap_uint64_array, TRUE, "FUID table size" },
|
||||
{ zap_byteswap, TRUE, "DSL dataset next clones"},
|
||||
{ zap_byteswap, TRUE, "scan work queue" },
|
||||
{ zap_byteswap, TRUE, "ZFS user/group used" },
|
||||
{ zap_byteswap, TRUE, "ZFS user/group quota" },
|
||||
{ zap_byteswap, TRUE, "snapshot refcount tags"},
|
||||
{ zap_byteswap, TRUE, "DDT ZAP algorithm" },
|
||||
{ zap_byteswap, TRUE, "DDT statistics" },
|
||||
{ byteswap_uint8_array, TRUE, "System attributes" },
|
||||
{ zap_byteswap, TRUE, "SA master node" },
|
||||
{ zap_byteswap, TRUE, "SA attr registration" },
|
||||
{ zap_byteswap, TRUE, "SA attr layouts" },
|
||||
{ zap_byteswap, TRUE, "scan translations" },
|
||||
{ byteswap_uint8_array, FALSE, "deduplicated block" },
|
||||
{ zap_byteswap, TRUE, "DSL deadlist map" },
|
||||
{ byteswap_uint64_array, TRUE, "DSL deadlist map hdr" },
|
||||
{ zap_byteswap, TRUE, "DSL dir clones" },
|
||||
{ byteswap_uint64_array, TRUE, "bpobj subobj" },
|
||||
{ DMU_BSWAP_UINT8, TRUE, "unallocated" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "object directory" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "object array" },
|
||||
{ DMU_BSWAP_UINT8, TRUE, "packed nvlist" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "packed nvlist size" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "bpobj" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "bpobj header" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "SPA space map header" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "SPA space map" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "ZIL intent log" },
|
||||
{ DMU_BSWAP_DNODE, TRUE, "DMU dnode" },
|
||||
{ DMU_BSWAP_OBJSET, TRUE, "DMU objset" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "DSL directory" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DSL directory child map"},
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DSL dataset snap map" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DSL props" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "DSL dataset" },
|
||||
{ DMU_BSWAP_ZNODE, TRUE, "ZFS znode" },
|
||||
{ DMU_BSWAP_OLDACL, TRUE, "ZFS V0 ACL" },
|
||||
{ DMU_BSWAP_UINT8, FALSE, "ZFS plain file" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "ZFS directory" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "ZFS master node" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "ZFS delete queue" },
|
||||
{ DMU_BSWAP_UINT8, FALSE, "zvol object" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "zvol prop" },
|
||||
{ DMU_BSWAP_UINT8, FALSE, "other uint8[]" },
|
||||
{ DMU_BSWAP_UINT64, FALSE, "other uint64[]" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "other ZAP" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "persistent error log" },
|
||||
{ DMU_BSWAP_UINT8, TRUE, "SPA history" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "SPA history offsets" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "Pool properties" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DSL permissions" },
|
||||
{ DMU_BSWAP_ACL, TRUE, "ZFS ACL" },
|
||||
{ DMU_BSWAP_UINT8, TRUE, "ZFS SYSACL" },
|
||||
{ DMU_BSWAP_UINT8, TRUE, "FUID table" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "FUID table size" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DSL dataset next clones"},
|
||||
{ DMU_BSWAP_ZAP, TRUE, "scan work queue" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "ZFS user/group used" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "ZFS user/group quota" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "snapshot refcount tags"},
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DDT ZAP algorithm" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DDT statistics" },
|
||||
{ DMU_BSWAP_UINT8, TRUE, "System attributes" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "SA master node" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "SA attr registration" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "SA attr layouts" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "scan translations" },
|
||||
{ DMU_BSWAP_UINT8, FALSE, "deduplicated block" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DSL deadlist map" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "DSL deadlist map hdr" },
|
||||
{ DMU_BSWAP_ZAP, TRUE, "DSL dir clones" },
|
||||
{ DMU_BSWAP_UINT64, TRUE, "bpobj subobj" }
|
||||
};
|
||||
|
||||
const dmu_object_byteswap_info_t dmu_ot_byteswap[DMU_BSWAP_NUMFUNCS] = {
|
||||
{ byteswap_uint8_array, "uint8" },
|
||||
{ byteswap_uint16_array, "uint16" },
|
||||
{ byteswap_uint32_array, "uint32" },
|
||||
{ byteswap_uint64_array, "uint64" },
|
||||
{ zap_byteswap, "zap" },
|
||||
{ dnode_buf_byteswap, "dnode" },
|
||||
{ dmu_objset_byteswap, "objset" },
|
||||
{ zfs_znode_byteswap, "znode" },
|
||||
{ zfs_oldacl_byteswap, "oldacl" },
|
||||
{ zfs_acl_byteswap, "acl" }
|
||||
};
|
||||
|
||||
int
|
||||
@@ -176,7 +190,7 @@ dmu_set_bonustype(dmu_buf_t *db_fake, dmu_object_type_t type, dmu_tx_t *tx)
|
||||
DB_DNODE_ENTER(db);
|
||||
dn = DB_DNODE(db);
|
||||
|
||||
if (type > DMU_OT_NUMTYPES) {
|
||||
if (!DMU_OT_IS_VALID(type)) {
|
||||
error = EINVAL;
|
||||
} else if (dn->dn_bonus != db) {
|
||||
error = EINVAL;
|
||||
@@ -1695,7 +1709,7 @@ void
|
||||
dmu_write_policy(objset_t *os, dnode_t *dn, int level, int wp, zio_prop_t *zp)
|
||||
{
|
||||
dmu_object_type_t type = dn ? dn->dn_type : DMU_OT_OBJSET;
|
||||
boolean_t ismd = (level > 0 || dmu_ot[type].ot_metadata ||
|
||||
boolean_t ismd = (level > 0 || DMU_OT_IS_METADATA(type) ||
|
||||
(wp & WP_SPILL));
|
||||
enum zio_checksum checksum = os->os_checksum;
|
||||
enum zio_compress compress = os->os_compress;
|
||||
|
||||
+11
-6
@@ -1077,8 +1077,8 @@ restore_object(struct restorearg *ra, objset_t *os, struct drr_object *drro)
|
||||
void *data = NULL;
|
||||
|
||||
if (drro->drr_type == DMU_OT_NONE ||
|
||||
drro->drr_type >= DMU_OT_NUMTYPES ||
|
||||
drro->drr_bonustype >= DMU_OT_NUMTYPES ||
|
||||
!DMU_OT_IS_VALID(drro->drr_type) ||
|
||||
!DMU_OT_IS_VALID(drro->drr_bonustype) ||
|
||||
drro->drr_checksumtype >= ZIO_CHECKSUM_FUNCTIONS ||
|
||||
drro->drr_compress >= ZIO_COMPRESS_FUNCTIONS ||
|
||||
P2PHASE(drro->drr_blksz, SPA_MINBLOCKSIZE) ||
|
||||
@@ -1143,7 +1143,9 @@ restore_object(struct restorearg *ra, objset_t *os, struct drr_object *drro)
|
||||
ASSERT3U(db->db_size, >=, drro->drr_bonuslen);
|
||||
bcopy(data, db->db_data, drro->drr_bonuslen);
|
||||
if (ra->byteswap) {
|
||||
dmu_ot[drro->drr_bonustype].ot_byteswap(db->db_data,
|
||||
dmu_object_byteswap_t byteswap =
|
||||
DMU_OT_BYTESWAP(drro->drr_bonustype);
|
||||
dmu_ot_byteswap[byteswap].ob_func(db->db_data,
|
||||
drro->drr_bonuslen);
|
||||
}
|
||||
dmu_buf_rele(db, FTAG);
|
||||
@@ -1186,7 +1188,7 @@ restore_write(struct restorearg *ra, objset_t *os,
|
||||
int err;
|
||||
|
||||
if (drrw->drr_offset + drrw->drr_length < drrw->drr_offset ||
|
||||
drrw->drr_type >= DMU_OT_NUMTYPES)
|
||||
!DMU_OT_IS_VALID(drrw->drr_type))
|
||||
return (EINVAL);
|
||||
|
||||
data = restore_read(ra, drrw->drr_length);
|
||||
@@ -1205,8 +1207,11 @@ restore_write(struct restorearg *ra, objset_t *os,
|
||||
dmu_tx_abort(tx);
|
||||
return (err);
|
||||
}
|
||||
if (ra->byteswap)
|
||||
dmu_ot[drrw->drr_type].ot_byteswap(data, drrw->drr_length);
|
||||
if (ra->byteswap) {
|
||||
dmu_object_byteswap_t byteswap =
|
||||
DMU_OT_BYTESWAP(drrw->drr_type);
|
||||
dmu_ot_byteswap[byteswap].ob_func(data, drrw->drr_length);
|
||||
}
|
||||
dmu_write(os, drrw->drr_object,
|
||||
drrw->drr_offset, drrw->drr_length, data, tx);
|
||||
dmu_tx_commit(tx);
|
||||
|
||||
+97
-10
@@ -20,6 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/zfs_context.h>
|
||||
@@ -53,6 +54,7 @@ typedef struct traverse_data {
|
||||
uint64_t td_objset;
|
||||
blkptr_t *td_rootbp;
|
||||
uint64_t td_min_txg;
|
||||
zbookmark_t *td_resume;
|
||||
int td_flags;
|
||||
prefetch_data_t *td_pfd;
|
||||
blkptr_cb_t *td_func;
|
||||
@@ -128,6 +130,54 @@ traverse_zil(traverse_data_t *td, zil_header_t *zh)
|
||||
zil_free(zilog);
|
||||
}
|
||||
|
||||
typedef enum resume_skip {
|
||||
RESUME_SKIP_ALL,
|
||||
RESUME_SKIP_NONE,
|
||||
RESUME_SKIP_CHILDREN
|
||||
} resume_skip_t;
|
||||
|
||||
/*
|
||||
* Returns RESUME_SKIP_ALL if td indicates that we are resuming a traversal and
|
||||
* the block indicated by zb does not need to be visited at all. Returns
|
||||
* RESUME_SKIP_CHILDREN if we are resuming a post traversal and we reach the
|
||||
* resume point. This indicates that this block should be visited but not its
|
||||
* children (since they must have been visited in a previous traversal).
|
||||
* Otherwise returns RESUME_SKIP_NONE.
|
||||
*/
|
||||
static resume_skip_t
|
||||
resume_skip_check(traverse_data_t *td, const dnode_phys_t *dnp,
|
||||
const zbookmark_t *zb)
|
||||
{
|
||||
if (td->td_resume != NULL && !ZB_IS_ZERO(td->td_resume)) {
|
||||
/*
|
||||
* If we already visited this bp & everything below,
|
||||
* don't bother doing it again.
|
||||
*/
|
||||
if (zbookmark_is_before(dnp, zb, td->td_resume))
|
||||
return (RESUME_SKIP_ALL);
|
||||
|
||||
/*
|
||||
* If we found the block we're trying to resume from, zero
|
||||
* the bookmark out to indicate that we have resumed.
|
||||
*/
|
||||
ASSERT3U(zb->zb_object, <=, td->td_resume->zb_object);
|
||||
if (bcmp(zb, td->td_resume, sizeof (*zb)) == 0) {
|
||||
bzero(td->td_resume, sizeof (*zb));
|
||||
if (td->td_flags & TRAVERSE_POST)
|
||||
return (RESUME_SKIP_CHILDREN);
|
||||
}
|
||||
}
|
||||
return (RESUME_SKIP_NONE);
|
||||
}
|
||||
|
||||
static void
|
||||
traverse_pause(traverse_data_t *td, const zbookmark_t *zb)
|
||||
{
|
||||
ASSERT(td->td_resume != NULL);
|
||||
ASSERT3U(zb->zb_level, ==, 0);
|
||||
bcopy(zb, td->td_resume, sizeof (*td->td_resume));
|
||||
}
|
||||
|
||||
static int
|
||||
traverse_visitbp(traverse_data_t *td, const dnode_phys_t *dnp,
|
||||
arc_buf_t *pbuf, blkptr_t *bp, const zbookmark_t *zb)
|
||||
@@ -137,8 +187,20 @@ traverse_visitbp(traverse_data_t *td, const dnode_phys_t *dnp,
|
||||
arc_buf_t *buf = NULL;
|
||||
prefetch_data_t *pd = td->td_pfd;
|
||||
boolean_t hard = td->td_flags & TRAVERSE_HARD;
|
||||
boolean_t pause = B_FALSE;
|
||||
|
||||
if (bp->blk_birth == 0) {
|
||||
switch (resume_skip_check(td, dnp, zb)) {
|
||||
case RESUME_SKIP_ALL:
|
||||
return (0);
|
||||
case RESUME_SKIP_CHILDREN:
|
||||
goto post;
|
||||
case RESUME_SKIP_NONE:
|
||||
break;
|
||||
default:
|
||||
ASSERT(0);
|
||||
}
|
||||
|
||||
if (BP_IS_HOLE(bp)) {
|
||||
err = td->td_func(td->td_spa, NULL, NULL, pbuf, zb, dnp,
|
||||
td->td_arg);
|
||||
return (err);
|
||||
@@ -164,8 +226,10 @@ traverse_visitbp(traverse_data_t *td, const dnode_phys_t *dnp,
|
||||
td->td_arg);
|
||||
if (err == TRAVERSE_VISIT_NO_CHILDREN)
|
||||
return (0);
|
||||
if (err)
|
||||
return (err);
|
||||
if (err == ERESTART)
|
||||
pause = B_TRUE; /* handle pausing at a common point */
|
||||
if (err != 0)
|
||||
goto post;
|
||||
}
|
||||
|
||||
if (BP_GET_LEVEL(bp) > 0) {
|
||||
@@ -253,9 +317,18 @@ traverse_visitbp(traverse_data_t *td, const dnode_phys_t *dnp,
|
||||
if (buf)
|
||||
(void) arc_buf_remove_ref(buf, &buf);
|
||||
|
||||
post:
|
||||
if (err == 0 && lasterr == 0 && (td->td_flags & TRAVERSE_POST)) {
|
||||
err = td->td_func(td->td_spa, NULL, bp, pbuf, zb, dnp,
|
||||
td->td_arg);
|
||||
if (err == ERESTART)
|
||||
pause = B_TRUE;
|
||||
}
|
||||
|
||||
if (pause && td->td_resume != NULL) {
|
||||
ASSERT3U(err, ==, ERESTART);
|
||||
ASSERT(!hard);
|
||||
traverse_pause(td, zb);
|
||||
}
|
||||
|
||||
return (err != 0 ? err : lasterr);
|
||||
@@ -353,22 +426,27 @@ traverse_prefetch_thread(void *arg)
|
||||
* in syncing context).
|
||||
*/
|
||||
static int
|
||||
traverse_impl(spa_t *spa, dsl_dataset_t *ds, blkptr_t *rootbp,
|
||||
uint64_t txg_start, int flags, blkptr_cb_t func, void *arg)
|
||||
traverse_impl(spa_t *spa, dsl_dataset_t *ds, uint64_t objset, blkptr_t *rootbp,
|
||||
uint64_t txg_start, zbookmark_t *resume, int flags,
|
||||
blkptr_cb_t func, void *arg)
|
||||
{
|
||||
traverse_data_t *td;
|
||||
prefetch_data_t *pd;
|
||||
zbookmark_t *czb;
|
||||
int err;
|
||||
|
||||
ASSERT(ds == NULL || objset == ds->ds_object);
|
||||
ASSERT(!(flags & TRAVERSE_PRE) || !(flags & TRAVERSE_POST));
|
||||
|
||||
td = kmem_alloc(sizeof(traverse_data_t), KM_PUSHPAGE);
|
||||
pd = kmem_zalloc(sizeof(prefetch_data_t), KM_PUSHPAGE);
|
||||
czb = kmem_alloc(sizeof(zbookmark_t), KM_PUSHPAGE);
|
||||
|
||||
td->td_spa = spa;
|
||||
td->td_objset = ds ? ds->ds_object : 0;
|
||||
td->td_objset = objset;
|
||||
td->td_rootbp = rootbp;
|
||||
td->td_min_txg = txg_start;
|
||||
td->td_resume = resume;
|
||||
td->td_func = func;
|
||||
td->td_arg = arg;
|
||||
td->td_pfd = pd;
|
||||
@@ -424,8 +502,17 @@ int
|
||||
traverse_dataset(dsl_dataset_t *ds, uint64_t txg_start, int flags,
|
||||
blkptr_cb_t func, void *arg)
|
||||
{
|
||||
return (traverse_impl(ds->ds_dir->dd_pool->dp_spa, ds,
|
||||
&ds->ds_phys->ds_bp, txg_start, flags, func, arg));
|
||||
return (traverse_impl(ds->ds_dir->dd_pool->dp_spa, ds, ds->ds_object,
|
||||
&ds->ds_phys->ds_bp, txg_start, NULL, flags, func, arg));
|
||||
}
|
||||
|
||||
int
|
||||
traverse_dataset_destroyed(spa_t *spa, blkptr_t *blkptr,
|
||||
uint64_t txg_start, zbookmark_t *resume, int flags,
|
||||
blkptr_cb_t func, void *arg)
|
||||
{
|
||||
return (traverse_impl(spa, NULL, ZB_DESTROYED_OBJSET,
|
||||
blkptr, txg_start, resume, flags, func, arg));
|
||||
}
|
||||
|
||||
/*
|
||||
@@ -442,8 +529,8 @@ traverse_pool(spa_t *spa, uint64_t txg_start, int flags,
|
||||
boolean_t hard = (flags & TRAVERSE_HARD);
|
||||
|
||||
/* visit the MOS */
|
||||
err = traverse_impl(spa, NULL, spa_get_rootblkptr(spa),
|
||||
txg_start, flags, func, arg);
|
||||
err = traverse_impl(spa, NULL, 0, spa_get_rootblkptr(spa),
|
||||
txg_start, NULL, flags, func, arg);
|
||||
if (err)
|
||||
return (err);
|
||||
|
||||
|
||||
+2
-3
@@ -20,9 +20,8 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
*/
|
||||
/*
|
||||
* Copyright 2011 Nexenta Systems, Inc. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/dmu.h>
|
||||
@@ -693,7 +692,7 @@ dmu_tx_hold_zap(dmu_tx_t *tx, uint64_t object, int add, const char *name)
|
||||
return;
|
||||
}
|
||||
|
||||
ASSERT3P(dmu_ot[dn->dn_type].ot_byteswap, ==, zap_byteswap);
|
||||
ASSERT3U(DMU_OT_BYTESWAP(dn->dn_type), ==, DMU_BSWAP_ZAP);
|
||||
|
||||
if (dn->dn_maxblkid == 0 && !add) {
|
||||
blkptr_t *bp;
|
||||
|
||||
+11
-8
@@ -20,6 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/zfs_context.h>
|
||||
@@ -194,7 +195,7 @@ dnode_verify(dnode_t *dn)
|
||||
ASSERT(dn->dn_objset);
|
||||
ASSERT(dn->dn_handle->dnh_dnode == dn);
|
||||
|
||||
ASSERT(dn->dn_phys->dn_type < DMU_OT_NUMTYPES);
|
||||
ASSERT(DMU_OT_IS_VALID(dn->dn_phys->dn_type));
|
||||
|
||||
if (!(zfs_flags & ZFS_DEBUG_DNODE_VERIFY))
|
||||
return;
|
||||
@@ -212,7 +213,7 @@ dnode_verify(dnode_t *dn)
|
||||
ASSERT3U(1<<dn->dn_datablkshift, ==, dn->dn_datablksz);
|
||||
}
|
||||
ASSERT3U(dn->dn_nlevels, <=, 30);
|
||||
ASSERT3U(dn->dn_type, <=, DMU_OT_NUMTYPES);
|
||||
ASSERT(DMU_OT_IS_VALID(dn->dn_type));
|
||||
ASSERT3U(dn->dn_nblkptr, >=, 1);
|
||||
ASSERT3U(dn->dn_nblkptr, <=, DN_MAX_NBLKPTR);
|
||||
ASSERT3U(dn->dn_bonuslen, <=, DN_MAX_BONUSLEN);
|
||||
@@ -278,8 +279,10 @@ dnode_byteswap(dnode_phys_t *dnp)
|
||||
*/
|
||||
int off = (dnp->dn_nblkptr-1) * sizeof (blkptr_t);
|
||||
size_t len = DN_MAX_BONUSLEN - off;
|
||||
ASSERT3U(dnp->dn_bonustype, <, DMU_OT_NUMTYPES);
|
||||
dmu_ot[dnp->dn_bonustype].ot_byteswap(dnp->dn_bonus + off, len);
|
||||
dmu_object_byteswap_t byteswap;
|
||||
ASSERT(DMU_OT_IS_VALID(dnp->dn_bonustype));
|
||||
byteswap = DMU_OT_BYTESWAP(dnp->dn_bonustype);
|
||||
dmu_ot_byteswap[byteswap].ob_func(dnp->dn_bonus + off, len);
|
||||
}
|
||||
|
||||
/* Swap SPILL block if we have one */
|
||||
@@ -407,7 +410,7 @@ dnode_create(objset_t *os, dnode_phys_t *dnp, dmu_buf_impl_t *db,
|
||||
|
||||
dmu_zfetch_init(&dn->dn_zfetch, dn);
|
||||
|
||||
ASSERT(dn->dn_phys->dn_type < DMU_OT_NUMTYPES);
|
||||
ASSERT(DMU_OT_IS_VALID(dn->dn_phys->dn_type));
|
||||
|
||||
mutex_enter(&os->os_lock);
|
||||
list_insert_head(&os->os_dnodes, dn);
|
||||
@@ -496,11 +499,11 @@ dnode_allocate(dnode_t *dn, dmu_object_type_t ot, int blocksize, int ibs,
|
||||
ASSERT(bcmp(dn->dn_phys, &dnode_phys_zero, sizeof (dnode_phys_t)) == 0);
|
||||
ASSERT(dn->dn_phys->dn_type == DMU_OT_NONE);
|
||||
ASSERT(ot != DMU_OT_NONE);
|
||||
ASSERT3U(ot, <, DMU_OT_NUMTYPES);
|
||||
ASSERT(DMU_OT_IS_VALID(ot));
|
||||
ASSERT((bonustype == DMU_OT_NONE && bonuslen == 0) ||
|
||||
(bonustype == DMU_OT_SA && bonuslen == 0) ||
|
||||
(bonustype != DMU_OT_NONE && bonuslen != 0));
|
||||
ASSERT3U(bonustype, <, DMU_OT_NUMTYPES);
|
||||
ASSERT(DMU_OT_IS_VALID(bonustype));
|
||||
ASSERT3U(bonuslen, <=, DN_MAX_BONUSLEN);
|
||||
ASSERT(dn->dn_type == DMU_OT_NONE);
|
||||
ASSERT3U(dn->dn_maxblkid, ==, 0);
|
||||
@@ -568,7 +571,7 @@ dnode_reallocate(dnode_t *dn, dmu_object_type_t ot, int blocksize,
|
||||
ASSERT((bonustype == DMU_OT_NONE && bonuslen == 0) ||
|
||||
(bonustype != DMU_OT_NONE && bonuslen != 0) ||
|
||||
(bonustype == DMU_OT_SA && bonuslen == 0));
|
||||
ASSERT3U(bonustype, <, DMU_OT_NUMTYPES);
|
||||
ASSERT(DMU_OT_IS_VALID(bonustype));
|
||||
ASSERT3U(bonuslen, <=, DN_MAX_BONUSLEN);
|
||||
|
||||
/* clean up any unreferenced dbufs */
|
||||
|
||||
@@ -18,8 +18,10 @@
|
||||
*
|
||||
* CDDL HEADER END
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/zfs_context.h>
|
||||
@@ -598,7 +600,7 @@ dnode_sync(dnode_t *dn, dmu_tx_t *tx)
|
||||
}
|
||||
|
||||
if (dn->dn_next_bonustype[txgoff]) {
|
||||
ASSERT(dn->dn_next_bonustype[txgoff] < DMU_OT_NUMTYPES);
|
||||
ASSERT(DMU_OT_IS_VALID(dn->dn_next_bonustype[txgoff]));
|
||||
dnp->dn_bonustype = dn->dn_next_bonustype[txgoff];
|
||||
dn->dn_next_bonustype[txgoff] = 0;
|
||||
}
|
||||
|
||||
+126
-59
@@ -20,7 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2011 by Delphix. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
* Copyright (c) 2012, Joyent, Inc. All rights reserved.
|
||||
*/
|
||||
|
||||
@@ -35,6 +35,7 @@
|
||||
#include <sys/arc.h>
|
||||
#include <sys/zio.h>
|
||||
#include <sys/zap.h>
|
||||
#include <sys/zfeature.h>
|
||||
#include <sys/unique.h>
|
||||
#include <sys/zfs_context.h>
|
||||
#include <sys/zfs_ioctl.h>
|
||||
@@ -102,7 +103,7 @@ dsl_dataset_block_born(dsl_dataset_t *ds, const blkptr_t *bp, dmu_tx_t *tx)
|
||||
if (BP_IS_HOLE(bp))
|
||||
return;
|
||||
ASSERT(BP_GET_TYPE(bp) != DMU_OT_NONE);
|
||||
ASSERT3U(BP_GET_TYPE(bp), <, DMU_OT_NUMTYPES);
|
||||
ASSERT(DMU_OT_IS_VALID(BP_GET_TYPE(bp)));
|
||||
if (ds == NULL) {
|
||||
/*
|
||||
* Account for the meta-objset space in its placeholder
|
||||
@@ -119,7 +120,7 @@ dsl_dataset_block_born(dsl_dataset_t *ds, const blkptr_t *bp, dmu_tx_t *tx)
|
||||
mutex_enter(&ds->ds_dir->dd_lock);
|
||||
mutex_enter(&ds->ds_lock);
|
||||
delta = parent_delta(ds, used);
|
||||
ds->ds_phys->ds_used_bytes += used;
|
||||
ds->ds_phys->ds_referenced_bytes += used;
|
||||
ds->ds_phys->ds_compressed_bytes += compressed;
|
||||
ds->ds_phys->ds_uncompressed_bytes += uncompressed;
|
||||
ds->ds_phys->ds_unique_bytes += used;
|
||||
@@ -215,8 +216,8 @@ dsl_dataset_block_kill(dsl_dataset_t *ds, const blkptr_t *bp, dmu_tx_t *tx,
|
||||
}
|
||||
}
|
||||
mutex_enter(&ds->ds_lock);
|
||||
ASSERT3U(ds->ds_phys->ds_used_bytes, >=, used);
|
||||
ds->ds_phys->ds_used_bytes -= used;
|
||||
ASSERT3U(ds->ds_phys->ds_referenced_bytes, >=, used);
|
||||
ds->ds_phys->ds_referenced_bytes -= used;
|
||||
ASSERT3U(ds->ds_phys->ds_compressed_bytes, >=, compressed);
|
||||
ds->ds_phys->ds_compressed_bytes -= compressed;
|
||||
ASSERT3U(ds->ds_phys->ds_uncompressed_bytes, >=, uncompressed);
|
||||
@@ -823,8 +824,8 @@ dsl_dataset_create_sync_dd(dsl_dir_t *dd, dsl_dataset_t *origin,
|
||||
dsphys->ds_prev_snap_obj = origin->ds_object;
|
||||
dsphys->ds_prev_snap_txg =
|
||||
origin->ds_phys->ds_creation_txg;
|
||||
dsphys->ds_used_bytes =
|
||||
origin->ds_phys->ds_used_bytes;
|
||||
dsphys->ds_referenced_bytes =
|
||||
origin->ds_phys->ds_referenced_bytes;
|
||||
dsphys->ds_compressed_bytes =
|
||||
origin->ds_phys->ds_compressed_bytes;
|
||||
dsphys->ds_uncompressed_bytes =
|
||||
@@ -938,7 +939,6 @@ dmu_snapshots_destroy_nvl(nvlist_t *snaps, boolean_t defer, char *failed)
|
||||
for (pair = nvlist_next_nvpair(snaps, NULL); pair != NULL;
|
||||
pair = nvlist_next_nvpair(snaps, pair)) {
|
||||
dsl_dataset_t *ds;
|
||||
int err;
|
||||
|
||||
err = dsl_dataset_own(nvpair_name(pair), B_TRUE, dstg, &ds);
|
||||
if (err == 0) {
|
||||
@@ -1088,19 +1088,23 @@ dsl_dataset_destroy(dsl_dataset_t *ds, void *tag, boolean_t defer)
|
||||
goto out_free;
|
||||
|
||||
/*
|
||||
* remove the objects in open context, so that we won't
|
||||
* have too much to do in syncing context.
|
||||
* If async destruction is not enabled try to remove all objects
|
||||
* while in the open context so that there is less work to do in
|
||||
* the syncing context.
|
||||
*/
|
||||
for (obj = 0; err == 0; err = dmu_object_next(os, &obj, FALSE,
|
||||
ds->ds_phys->ds_prev_snap_txg)) {
|
||||
/*
|
||||
* Ignore errors, if there is not enough disk space
|
||||
* we will deal with it in dsl_dataset_destroy_sync().
|
||||
*/
|
||||
(void) dmu_free_object(os, obj);
|
||||
if (!spa_feature_is_enabled(dsl_dataset_get_spa(ds),
|
||||
&spa_feature_table[SPA_FEATURE_ASYNC_DESTROY])) {
|
||||
for (obj = 0; err == 0; err = dmu_object_next(os, &obj, FALSE,
|
||||
ds->ds_phys->ds_prev_snap_txg)) {
|
||||
/*
|
||||
* Ignore errors, if there is not enough disk space
|
||||
* we will deal with it in dsl_dataset_destroy_sync().
|
||||
*/
|
||||
(void) dmu_free_object(os, obj);
|
||||
}
|
||||
if (err != ESRCH)
|
||||
goto out_free;
|
||||
}
|
||||
if (err != ESRCH)
|
||||
goto out_free;
|
||||
|
||||
/*
|
||||
* Only the ZIL knows how to free log blocks.
|
||||
@@ -1261,7 +1265,7 @@ dsl_dataset_recalc_head_uniq(dsl_dataset_t *ds)
|
||||
ASSERT(!dsl_dataset_is_snapshot(ds));
|
||||
|
||||
if (ds->ds_phys->ds_prev_snap_obj != 0)
|
||||
mrs_used = ds->ds_prev->ds_phys->ds_used_bytes;
|
||||
mrs_used = ds->ds_prev->ds_phys->ds_referenced_bytes;
|
||||
else
|
||||
mrs_used = 0;
|
||||
|
||||
@@ -1269,7 +1273,7 @@ dsl_dataset_recalc_head_uniq(dsl_dataset_t *ds)
|
||||
|
||||
ASSERT3U(dlused, <=, mrs_used);
|
||||
ds->ds_phys->ds_unique_bytes =
|
||||
ds->ds_phys->ds_used_bytes - (mrs_used - dlused);
|
||||
ds->ds_phys->ds_referenced_bytes - (mrs_used - dlused);
|
||||
|
||||
if (spa_version(ds->ds_dir->dd_pool->dp_spa) >=
|
||||
SPA_VERSION_UNIQUE_ACCURATE)
|
||||
@@ -1627,12 +1631,36 @@ process_old_deadlist(dsl_dataset_t *ds, dsl_dataset_t *ds_prev,
|
||||
ds_next->ds_phys->ds_deadlist_obj);
|
||||
}
|
||||
|
||||
static int
|
||||
old_synchronous_dataset_destroy(dsl_dataset_t *ds, dmu_tx_t *tx)
|
||||
{
|
||||
int err;
|
||||
struct killarg ka;
|
||||
|
||||
/*
|
||||
* Free everything that we point to (that's born after
|
||||
* the previous snapshot, if we are a clone)
|
||||
*
|
||||
* NB: this should be very quick, because we already
|
||||
* freed all the objects in open context.
|
||||
*/
|
||||
ka.ds = ds;
|
||||
ka.tx = tx;
|
||||
err = traverse_dataset(ds,
|
||||
ds->ds_phys->ds_prev_snap_txg, TRAVERSE_POST,
|
||||
kill_blkptr, &ka);
|
||||
ASSERT3U(err, ==, 0);
|
||||
ASSERT(!DS_UNIQUE_IS_ACCURATE(ds) || ds->ds_phys->ds_unique_bytes == 0);
|
||||
|
||||
return (err);
|
||||
}
|
||||
|
||||
void
|
||||
dsl_dataset_destroy_sync(void *arg1, void *tag, dmu_tx_t *tx)
|
||||
{
|
||||
struct dsl_ds_destroyarg *dsda = arg1;
|
||||
dsl_dataset_t *ds = dsda->ds;
|
||||
int err;
|
||||
int err = 0;
|
||||
int after_branch_point = FALSE;
|
||||
dsl_pool_t *dp = ds->ds_dir->dd_pool;
|
||||
objset_t *mos = dp->dp_meta_objset;
|
||||
@@ -1773,7 +1801,6 @@ dsl_dataset_destroy_sync(void *arg1, void *tag, dmu_tx_t *tx)
|
||||
tx);
|
||||
dsl_dir_diduse_space(tx->tx_pool->dp_free_dir,
|
||||
DD_USED_HEAD, used, comp, uncomp, tx);
|
||||
dsl_dir_dirty(tx->tx_pool->dp_free_dir, tx);
|
||||
|
||||
/* Merge our deadlist into next's and free it. */
|
||||
dsl_deadlist_merge(&ds_next->ds_deadlist,
|
||||
@@ -1849,32 +1876,54 @@ dsl_dataset_destroy_sync(void *arg1, void *tag, dmu_tx_t *tx)
|
||||
}
|
||||
dsl_dataset_rele(ds_next, FTAG);
|
||||
} else {
|
||||
zfeature_info_t *async_destroy =
|
||||
&spa_feature_table[SPA_FEATURE_ASYNC_DESTROY];
|
||||
|
||||
/*
|
||||
* There's no next snapshot, so this is a head dataset.
|
||||
* Destroy the deadlist. Unless it's a clone, the
|
||||
* deadlist should be empty. (If it's a clone, it's
|
||||
* safe to ignore the deadlist contents.)
|
||||
*/
|
||||
struct killarg ka;
|
||||
|
||||
dsl_deadlist_close(&ds->ds_deadlist);
|
||||
dsl_deadlist_free(mos, ds->ds_phys->ds_deadlist_obj, tx);
|
||||
ds->ds_phys->ds_deadlist_obj = 0;
|
||||
|
||||
/*
|
||||
* Free everything that we point to (that's born after
|
||||
* the previous snapshot, if we are a clone)
|
||||
*
|
||||
* NB: this should be very quick, because we already
|
||||
* freed all the objects in open context.
|
||||
*/
|
||||
ka.ds = ds;
|
||||
ka.tx = tx;
|
||||
err = traverse_dataset(ds, ds->ds_phys->ds_prev_snap_txg,
|
||||
TRAVERSE_POST, kill_blkptr, &ka);
|
||||
ASSERT3U(err, ==, 0);
|
||||
ASSERT(!DS_UNIQUE_IS_ACCURATE(ds) ||
|
||||
ds->ds_phys->ds_unique_bytes == 0);
|
||||
if (!spa_feature_is_enabled(dp->dp_spa, async_destroy)) {
|
||||
err = old_synchronous_dataset_destroy(ds, tx);
|
||||
} else {
|
||||
/*
|
||||
* Move the bptree into the pool's list of trees to
|
||||
* clean up and update space accounting information.
|
||||
*/
|
||||
uint64_t used, comp, uncomp;
|
||||
|
||||
ASSERT(err == 0 || err == EBUSY);
|
||||
if (!spa_feature_is_active(dp->dp_spa, async_destroy)) {
|
||||
spa_feature_incr(dp->dp_spa, async_destroy, tx);
|
||||
dp->dp_bptree_obj = bptree_alloc(
|
||||
dp->dp_meta_objset, tx);
|
||||
VERIFY(zap_add(dp->dp_meta_objset,
|
||||
DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_BPTREE_OBJ, sizeof (uint64_t), 1,
|
||||
&dp->dp_bptree_obj, tx) == 0);
|
||||
}
|
||||
|
||||
used = ds->ds_dir->dd_phys->dd_used_bytes;
|
||||
comp = ds->ds_dir->dd_phys->dd_compressed_bytes;
|
||||
uncomp = ds->ds_dir->dd_phys->dd_uncompressed_bytes;
|
||||
|
||||
ASSERT(!DS_UNIQUE_IS_ACCURATE(ds) ||
|
||||
ds->ds_phys->ds_unique_bytes == used);
|
||||
|
||||
bptree_add(dp->dp_meta_objset, dp->dp_bptree_obj,
|
||||
&ds->ds_phys->ds_bp, ds->ds_phys->ds_prev_snap_txg,
|
||||
used, comp, uncomp, tx);
|
||||
dsl_dir_diduse_space(ds->ds_dir, DD_USED_HEAD,
|
||||
-used, -comp, -uncomp, tx);
|
||||
dsl_dir_diduse_space(dp->dp_free_dir, DD_USED_HEAD,
|
||||
used, comp, uncomp, tx);
|
||||
}
|
||||
|
||||
if (ds->ds_prev != NULL) {
|
||||
if (spa_version(dp->dp_spa) >= SPA_VERSION_DIR_CLONES) {
|
||||
@@ -2065,7 +2114,7 @@ dsl_dataset_snapshot_sync(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
dsphys->ds_creation_time = gethrestime_sec();
|
||||
dsphys->ds_creation_txg = crtxg;
|
||||
dsphys->ds_deadlist_obj = ds->ds_phys->ds_deadlist_obj;
|
||||
dsphys->ds_used_bytes = ds->ds_phys->ds_used_bytes;
|
||||
dsphys->ds_referenced_bytes = ds->ds_phys->ds_referenced_bytes;
|
||||
dsphys->ds_compressed_bytes = ds->ds_phys->ds_compressed_bytes;
|
||||
dsphys->ds_uncompressed_bytes = ds->ds_phys->ds_uncompressed_bytes;
|
||||
dsphys->ds_flags = ds->ds_phys->ds_flags;
|
||||
@@ -2189,10 +2238,22 @@ get_clones_stat(dsl_dataset_t *ds, nvlist_t *nv)
|
||||
zap_cursor_advance(&zc)) {
|
||||
dsl_dataset_t *clone;
|
||||
char buf[ZFS_MAXNAMELEN];
|
||||
/*
|
||||
* Even though we hold the dp_config_rwlock, the dataset
|
||||
* may fail to open, returning ENOENT. If there is a
|
||||
* thread concurrently attempting to destroy this
|
||||
* dataset, it will have the ds_rwlock held for
|
||||
* RW_WRITER. Our call to dsl_dataset_hold_obj() ->
|
||||
* dsl_dataset_hold_ref() will fail its
|
||||
* rw_tryenter(&ds->ds_rwlock, RW_READER), drop the
|
||||
* dp_config_rwlock, and wait for the destroy progress
|
||||
* and signal ds_exclusive_cv. If the destroy was
|
||||
* successful, we will see that
|
||||
* DSL_DATASET_IS_DESTROYED(), and return ENOENT.
|
||||
*/
|
||||
if (dsl_dataset_hold_obj(ds->ds_dir->dd_pool,
|
||||
za.za_first_integer, FTAG, &clone) != 0) {
|
||||
goto fail;
|
||||
}
|
||||
za.za_first_integer, FTAG, &clone) != 0)
|
||||
continue;
|
||||
dsl_dir_name(clone->ds_dir, buf);
|
||||
VERIFY(nvlist_add_boolean(val, buf) == 0);
|
||||
dsl_dataset_rele(clone, FTAG);
|
||||
@@ -2316,7 +2377,7 @@ dsl_dataset_space(dsl_dataset_t *ds,
|
||||
uint64_t *refdbytesp, uint64_t *availbytesp,
|
||||
uint64_t *usedobjsp, uint64_t *availobjsp)
|
||||
{
|
||||
*refdbytesp = ds->ds_phys->ds_used_bytes;
|
||||
*refdbytesp = ds->ds_phys->ds_referenced_bytes;
|
||||
*availbytesp = dsl_dir_space_available(ds->ds_dir, NULL, 0, TRUE);
|
||||
if (ds->ds_reserved > ds->ds_phys->ds_unique_bytes)
|
||||
*availbytesp += ds->ds_reserved - ds->ds_phys->ds_unique_bytes;
|
||||
@@ -2652,7 +2713,7 @@ dsl_dataset_promote_check(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
* Note however, if we stop before we reach the ORIGIN we get:
|
||||
* uN + kN + kN-1 + ... + kM - uM-1
|
||||
*/
|
||||
pa->used = origin_ds->ds_phys->ds_used_bytes;
|
||||
pa->used = origin_ds->ds_phys->ds_referenced_bytes;
|
||||
pa->comp = origin_ds->ds_phys->ds_compressed_bytes;
|
||||
pa->uncomp = origin_ds->ds_phys->ds_uncompressed_bytes;
|
||||
for (snap = list_head(&pa->shared_snaps); snap;
|
||||
@@ -2686,7 +2747,7 @@ dsl_dataset_promote_check(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
* so we need to subtract out the clone origin's used space.
|
||||
*/
|
||||
if (pa->origin_origin) {
|
||||
pa->used -= pa->origin_origin->ds_phys->ds_used_bytes;
|
||||
pa->used -= pa->origin_origin->ds_phys->ds_referenced_bytes;
|
||||
pa->comp -= pa->origin_origin->ds_phys->ds_compressed_bytes;
|
||||
pa->uncomp -= pa->origin_origin->ds_phys->ds_uncompressed_bytes;
|
||||
}
|
||||
@@ -3203,8 +3264,8 @@ dsl_dataset_clone_swap_sync(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
dsl_deadlist_space(&csa->ohds->ds_deadlist,
|
||||
&odl_used, &odl_comp, &odl_uncomp);
|
||||
|
||||
dused = csa->cds->ds_phys->ds_used_bytes + cdl_used -
|
||||
(csa->ohds->ds_phys->ds_used_bytes + odl_used);
|
||||
dused = csa->cds->ds_phys->ds_referenced_bytes + cdl_used -
|
||||
(csa->ohds->ds_phys->ds_referenced_bytes + odl_used);
|
||||
dcomp = csa->cds->ds_phys->ds_compressed_bytes + cdl_comp -
|
||||
(csa->ohds->ds_phys->ds_compressed_bytes + odl_comp);
|
||||
duncomp = csa->cds->ds_phys->ds_uncompressed_bytes +
|
||||
@@ -3233,8 +3294,8 @@ dsl_dataset_clone_swap_sync(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
}
|
||||
|
||||
/* swap ds_*_bytes */
|
||||
SWITCH64(csa->ohds->ds_phys->ds_used_bytes,
|
||||
csa->cds->ds_phys->ds_used_bytes);
|
||||
SWITCH64(csa->ohds->ds_phys->ds_referenced_bytes,
|
||||
csa->cds->ds_phys->ds_referenced_bytes);
|
||||
SWITCH64(csa->ohds->ds_phys->ds_compressed_bytes,
|
||||
csa->cds->ds_phys->ds_compressed_bytes);
|
||||
SWITCH64(csa->ohds->ds_phys->ds_uncompressed_bytes,
|
||||
@@ -3363,8 +3424,9 @@ dsl_dataset_check_quota(dsl_dataset_t *ds, boolean_t check_quota,
|
||||
* on-disk is over quota and there are no pending changes (which
|
||||
* may free up space for us).
|
||||
*/
|
||||
if (ds->ds_phys->ds_used_bytes + inflight >= ds->ds_quota) {
|
||||
if (inflight > 0 || ds->ds_phys->ds_used_bytes < ds->ds_quota)
|
||||
if (ds->ds_phys->ds_referenced_bytes + inflight >= ds->ds_quota) {
|
||||
if (inflight > 0 ||
|
||||
ds->ds_phys->ds_referenced_bytes < ds->ds_quota)
|
||||
error = ERESTART;
|
||||
else
|
||||
error = EDQUOT;
|
||||
@@ -3393,7 +3455,7 @@ dsl_dataset_set_quota_check(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
if (psa->psa_effective_value == 0)
|
||||
return (0);
|
||||
|
||||
if (psa->psa_effective_value < ds->ds_phys->ds_used_bytes ||
|
||||
if (psa->psa_effective_value < ds->ds_phys->ds_referenced_bytes ||
|
||||
psa->psa_effective_value < ds->ds_reserved)
|
||||
return (ENOSPC);
|
||||
|
||||
@@ -4141,8 +4203,8 @@ dsl_dataset_space_written(dsl_dataset_t *oldsnap, dsl_dataset_t *new,
|
||||
dsl_pool_t *dp = new->ds_dir->dd_pool;
|
||||
|
||||
*usedp = 0;
|
||||
*usedp += new->ds_phys->ds_used_bytes;
|
||||
*usedp -= oldsnap->ds_phys->ds_used_bytes;
|
||||
*usedp += new->ds_phys->ds_referenced_bytes;
|
||||
*usedp -= oldsnap->ds_phys->ds_referenced_bytes;
|
||||
|
||||
*compp = 0;
|
||||
*compp += new->ds_phys->ds_compressed_bytes;
|
||||
@@ -4158,9 +4220,13 @@ dsl_dataset_space_written(dsl_dataset_t *oldsnap, dsl_dataset_t *new,
|
||||
dsl_dataset_t *snap;
|
||||
uint64_t used, comp, uncomp;
|
||||
|
||||
err = dsl_dataset_hold_obj(dp, snapobj, FTAG, &snap);
|
||||
if (err != 0)
|
||||
break;
|
||||
if (snapobj == new->ds_object) {
|
||||
snap = new;
|
||||
} else {
|
||||
err = dsl_dataset_hold_obj(dp, snapobj, FTAG, &snap);
|
||||
if (err != 0)
|
||||
break;
|
||||
}
|
||||
|
||||
if (snap->ds_phys->ds_prev_snap_txg ==
|
||||
oldsnap->ds_phys->ds_creation_txg) {
|
||||
@@ -4189,7 +4255,8 @@ dsl_dataset_space_written(dsl_dataset_t *oldsnap, dsl_dataset_t *new,
|
||||
* was not a snapshot of/before new.
|
||||
*/
|
||||
snapobj = snap->ds_phys->ds_prev_snap_obj;
|
||||
dsl_dataset_rele(snap, FTAG);
|
||||
if (snap != new)
|
||||
dsl_dataset_rele(snap, FTAG);
|
||||
if (snapobj == 0) {
|
||||
err = EINVAL;
|
||||
break;
|
||||
|
||||
@@ -20,7 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2011 by Delphix. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
/*
|
||||
@@ -171,10 +171,8 @@ dsl_deleg_set_sync(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
VERIFY(nvpair_value_nvlist(whopair, &perms) == 0);
|
||||
|
||||
if (zap_lookup(mos, zapobj, whokey, 8, 1, &jumpobj) != 0) {
|
||||
jumpobj = zap_create(mos, DMU_OT_DSL_PERMS,
|
||||
DMU_OT_NONE, 0, tx);
|
||||
VERIFY(zap_update(mos, zapobj,
|
||||
whokey, 8, 1, &jumpobj, tx) == 0);
|
||||
jumpobj = zap_create_link(mos, DMU_OT_DSL_PERMS,
|
||||
zapobj, whokey, tx);
|
||||
}
|
||||
|
||||
while ((permpair = nvlist_next_nvpair(perms, permpair))) {
|
||||
|
||||
+34
-21
@@ -20,7 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2011 by Delphix. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/dsl_pool.h>
|
||||
@@ -40,6 +40,8 @@
|
||||
#include <sys/zfs_znode.h>
|
||||
#include <sys/spa_impl.h>
|
||||
#include <sys/dsl_deadlist.h>
|
||||
#include <sys/bptree.h>
|
||||
#include <sys/zfeature.h>
|
||||
|
||||
int zfs_no_write_throttle = 0;
|
||||
int zfs_write_limit_shift = 3; /* 1/8th of physical memory */
|
||||
@@ -240,20 +242,30 @@ dsl_pool_open_impl(spa_t *spa, uint64_t txg)
|
||||
}
|
||||
|
||||
int
|
||||
dsl_pool_open(spa_t *spa, uint64_t txg, dsl_pool_t **dpp)
|
||||
dsl_pool_init(spa_t *spa, uint64_t txg, dsl_pool_t **dpp)
|
||||
{
|
||||
int err;
|
||||
dsl_pool_t *dp = dsl_pool_open_impl(spa, txg);
|
||||
|
||||
err = dmu_objset_open_impl(spa, NULL, &dp->dp_meta_rootbp,
|
||||
&dp->dp_meta_objset);
|
||||
if (err != 0)
|
||||
dsl_pool_close(dp);
|
||||
else
|
||||
*dpp = dp;
|
||||
|
||||
return (err);
|
||||
}
|
||||
|
||||
int
|
||||
dsl_pool_open(dsl_pool_t *dp)
|
||||
{
|
||||
int err;
|
||||
dsl_dir_t *dd;
|
||||
dsl_dataset_t *ds;
|
||||
uint64_t obj;
|
||||
|
||||
rw_enter(&dp->dp_config_rwlock, RW_WRITER);
|
||||
err = dmu_objset_open_impl(spa, NULL, &dp->dp_meta_rootbp,
|
||||
&dp->dp_meta_objset);
|
||||
if (err)
|
||||
goto out;
|
||||
|
||||
err = zap_lookup(dp->dp_meta_objset, DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_ROOT_DATASET, sizeof (uint64_t), 1,
|
||||
&dp->dp_root_dir_obj);
|
||||
@@ -269,7 +281,7 @@ dsl_pool_open(spa_t *spa, uint64_t txg, dsl_pool_t **dpp)
|
||||
if (err)
|
||||
goto out;
|
||||
|
||||
if (spa_version(spa) >= SPA_VERSION_ORIGIN) {
|
||||
if (spa_version(dp->dp_spa) >= SPA_VERSION_ORIGIN) {
|
||||
err = dsl_pool_open_special_dir(dp, ORIGIN_DIR_NAME, &dd);
|
||||
if (err)
|
||||
goto out;
|
||||
@@ -286,7 +298,7 @@ dsl_pool_open(spa_t *spa, uint64_t txg, dsl_pool_t **dpp)
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (spa_version(spa) >= SPA_VERSION_DEADLISTS) {
|
||||
if (spa_version(dp->dp_spa) >= SPA_VERSION_DEADLISTS) {
|
||||
err = dsl_pool_open_special_dir(dp, FREE_DIR_NAME,
|
||||
&dp->dp_free_dir);
|
||||
if (err)
|
||||
@@ -300,6 +312,15 @@ dsl_pool_open(spa_t *spa, uint64_t txg, dsl_pool_t **dpp)
|
||||
dp->dp_meta_objset, obj));
|
||||
}
|
||||
|
||||
if (spa_feature_is_active(dp->dp_spa,
|
||||
&spa_feature_table[SPA_FEATURE_ASYNC_DESTROY])) {
|
||||
err = zap_lookup(dp->dp_meta_objset, DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_BPTREE_OBJ, sizeof (uint64_t), 1,
|
||||
&dp->dp_bptree_obj);
|
||||
if (err != 0)
|
||||
goto out;
|
||||
}
|
||||
|
||||
err = zap_lookup(dp->dp_meta_objset, DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_TMP_USERREFS, sizeof (uint64_t), 1,
|
||||
&dp->dp_tmp_userrefs_obj);
|
||||
@@ -308,15 +329,10 @@ dsl_pool_open(spa_t *spa, uint64_t txg, dsl_pool_t **dpp)
|
||||
if (err)
|
||||
goto out;
|
||||
|
||||
err = dsl_scan_init(dp, txg);
|
||||
err = dsl_scan_init(dp, dp->dp_tx.tx_open_txg);
|
||||
|
||||
out:
|
||||
rw_exit(&dp->dp_config_rwlock);
|
||||
if (err)
|
||||
dsl_pool_close(dp);
|
||||
else
|
||||
*dpp = dp;
|
||||
|
||||
return (err);
|
||||
}
|
||||
|
||||
@@ -611,7 +627,7 @@ int
|
||||
dsl_pool_sync_context(dsl_pool_t *dp)
|
||||
{
|
||||
return (curthread == dp->dp_tx.tx_sync_thread ||
|
||||
spa_get_dsl(dp->dp_spa) == NULL);
|
||||
spa_is_initializing(dp->dp_spa));
|
||||
}
|
||||
|
||||
uint64_t
|
||||
@@ -932,11 +948,8 @@ dsl_pool_user_hold_create_obj(dsl_pool_t *dp, dmu_tx_t *tx)
|
||||
ASSERT(dp->dp_tmp_userrefs_obj == 0);
|
||||
ASSERT(dmu_tx_is_syncing(tx));
|
||||
|
||||
dp->dp_tmp_userrefs_obj = zap_create(mos, DMU_OT_USERREFS,
|
||||
DMU_OT_NONE, 0, tx);
|
||||
|
||||
VERIFY(zap_add(mos, DMU_POOL_DIRECTORY_OBJECT, DMU_POOL_TMP_USERREFS,
|
||||
sizeof (uint64_t), 1, &dp->dp_tmp_userrefs_obj, tx) == 0);
|
||||
dp->dp_tmp_userrefs_obj = zap_create_link(mos, DMU_OT_USERREFS,
|
||||
DMU_POOL_DIRECTORY_OBJECT, DMU_POOL_TMP_USERREFS, tx);
|
||||
}
|
||||
|
||||
static int
|
||||
|
||||
+58
-78
@@ -20,6 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/dsl_scan.h>
|
||||
@@ -44,6 +45,7 @@
|
||||
#include <sys/ddt.h>
|
||||
#include <sys/sa.h>
|
||||
#include <sys/sa_impl.h>
|
||||
#include <sys/zfeature.h>
|
||||
#ifdef _KERNEL
|
||||
#include <sys/zfs_vfsops.h>
|
||||
#endif
|
||||
@@ -379,55 +381,6 @@ dsl_read_nolock(zio_t *pio, spa_t *spa, const blkptr_t *bpp,
|
||||
priority, zio_flags, arc_flags, zb));
|
||||
}
|
||||
|
||||
static boolean_t
|
||||
bookmark_is_zero(const zbookmark_t *zb)
|
||||
{
|
||||
return (zb->zb_objset == 0 && zb->zb_object == 0 &&
|
||||
zb->zb_level == 0 && zb->zb_blkid == 0);
|
||||
}
|
||||
|
||||
/* dnp is the dnode for zb1->zb_object */
|
||||
static boolean_t
|
||||
bookmark_is_before(const dnode_phys_t *dnp, const zbookmark_t *zb1,
|
||||
const zbookmark_t *zb2)
|
||||
{
|
||||
uint64_t zb1nextL0, zb2thisobj;
|
||||
|
||||
ASSERT(zb1->zb_objset == zb2->zb_objset);
|
||||
ASSERT(zb2->zb_level == 0);
|
||||
|
||||
/*
|
||||
* A bookmark in the deadlist is considered to be after
|
||||
* everything else.
|
||||
*/
|
||||
if (zb2->zb_object == DMU_DEADLIST_OBJECT)
|
||||
return (B_TRUE);
|
||||
|
||||
/* The objset_phys_t isn't before anything. */
|
||||
if (dnp == NULL)
|
||||
return (B_FALSE);
|
||||
|
||||
zb1nextL0 = (zb1->zb_blkid + 1) <<
|
||||
((zb1->zb_level) * (dnp->dn_indblkshift - SPA_BLKPTRSHIFT));
|
||||
|
||||
zb2thisobj = zb2->zb_object ? zb2->zb_object :
|
||||
zb2->zb_blkid << (DNODE_BLOCK_SHIFT - DNODE_SHIFT);
|
||||
|
||||
if (zb1->zb_object == DMU_META_DNODE_OBJECT) {
|
||||
uint64_t nextobj = zb1nextL0 *
|
||||
(dnp->dn_datablkszsec << SPA_MINBLOCKSHIFT) >> DNODE_SHIFT;
|
||||
return (nextobj <= zb2thisobj);
|
||||
}
|
||||
|
||||
if (zb1->zb_object < zb2thisobj)
|
||||
return (B_TRUE);
|
||||
if (zb1->zb_object > zb2thisobj)
|
||||
return (B_FALSE);
|
||||
if (zb2->zb_object == DMU_META_DNODE_OBJECT)
|
||||
return (B_FALSE);
|
||||
return (zb1nextL0 <= zb2->zb_blkid);
|
||||
}
|
||||
|
||||
static uint64_t
|
||||
dsl_scan_ds_maxtxg(dsl_dataset_t *ds)
|
||||
{
|
||||
@@ -459,7 +412,7 @@ dsl_scan_check_pause(dsl_scan_t *scn, const zbookmark_t *zb)
|
||||
if (scn->scn_pausing)
|
||||
return (B_TRUE); /* we're already pausing */
|
||||
|
||||
if (!bookmark_is_zero(&scn->scn_phys.scn_bookmark))
|
||||
if (!ZB_IS_ZERO(&scn->scn_phys.scn_bookmark))
|
||||
return (B_FALSE); /* we're resuming */
|
||||
|
||||
/* We only know how to resume from level-0 blocks. */
|
||||
@@ -614,13 +567,13 @@ dsl_scan_check_resume(dsl_scan_t *scn, const dnode_phys_t *dnp,
|
||||
/*
|
||||
* We never skip over user/group accounting objects (obj<0)
|
||||
*/
|
||||
if (!bookmark_is_zero(&scn->scn_phys.scn_bookmark) &&
|
||||
if (!ZB_IS_ZERO(&scn->scn_phys.scn_bookmark) &&
|
||||
(int64_t)zb->zb_object >= 0) {
|
||||
/*
|
||||
* If we already visited this bp & everything below (in
|
||||
* a prior txg sync), don't bother doing it again.
|
||||
*/
|
||||
if (bookmark_is_before(dnp, zb, &scn->scn_phys.scn_bookmark))
|
||||
if (zbookmark_is_before(dnp, zb, &scn->scn_phys.scn_bookmark))
|
||||
return (B_TRUE);
|
||||
|
||||
/*
|
||||
@@ -823,22 +776,6 @@ dsl_scan_visitbp(blkptr_t *bp, const zbookmark_t *zb,
|
||||
if (bp->blk_birth <= scn->scn_phys.scn_cur_min_txg)
|
||||
goto out;
|
||||
|
||||
if (BP_GET_TYPE(bp) != DMU_OT_USERGROUP_USED) {
|
||||
/*
|
||||
* For non-user-accounting blocks, we need to read the
|
||||
* new bp (from a deleted snapshot, found in
|
||||
* check_existing_xlation). If we used the old bp,
|
||||
* pointers inside this block from before we resumed
|
||||
* would be untranslated.
|
||||
*
|
||||
* For user-accounting blocks, we need to read the old
|
||||
* bp, because we will apply the entire space delta to
|
||||
* it (original untranslated -> translations from
|
||||
* deleted snap -> now).
|
||||
*/
|
||||
*bp_toread = *bp;
|
||||
}
|
||||
|
||||
if (dsl_scan_recurse(scn, ds, ostype, dnp, bp_toread, zb, tx,
|
||||
&buf) != 0)
|
||||
goto out;
|
||||
@@ -1414,19 +1351,28 @@ out:
|
||||
kmem_free(zc, sizeof(zap_cursor_t));
|
||||
}
|
||||
|
||||
static int
|
||||
dsl_scan_free_cb(void *arg, const blkptr_t *bp, dmu_tx_t *tx)
|
||||
static boolean_t
|
||||
dsl_scan_free_should_pause(dsl_scan_t *scn)
|
||||
{
|
||||
dsl_scan_t *scn = arg;
|
||||
uint64_t elapsed_nanosecs;
|
||||
|
||||
elapsed_nanosecs = gethrtime() - scn->scn_sync_start_time;
|
||||
|
||||
if (elapsed_nanosecs / NANOSEC > zfs_txg_timeout ||
|
||||
return (elapsed_nanosecs / NANOSEC > zfs_txg_timeout ||
|
||||
(elapsed_nanosecs / MICROSEC > zfs_free_min_time_ms &&
|
||||
txg_sync_waiting(scn->scn_dp)) ||
|
||||
spa_shutting_down(scn->scn_dp->dp_spa))
|
||||
return (ERESTART);
|
||||
spa_shutting_down(scn->scn_dp->dp_spa));
|
||||
}
|
||||
|
||||
static int
|
||||
dsl_scan_free_block_cb(void *arg, const blkptr_t *bp, dmu_tx_t *tx)
|
||||
{
|
||||
dsl_scan_t *scn = arg;
|
||||
|
||||
if (!scn->scn_is_bptree ||
|
||||
(BP_GET_LEVEL(bp) == 0 && BP_GET_TYPE(bp) != DMU_OT_OBJSET)) {
|
||||
if (dsl_scan_free_should_pause(scn))
|
||||
return (ERESTART);
|
||||
}
|
||||
|
||||
zio_nowait(zio_free_sync(scn->scn_zio_root, scn->scn_dp->dp_spa,
|
||||
dmu_tx_get_txg(tx), bp, 0));
|
||||
@@ -1451,6 +1397,10 @@ dsl_scan_active(dsl_scan_t *scn)
|
||||
if (scn->scn_phys.scn_state == DSS_SCANNING)
|
||||
return (B_TRUE);
|
||||
|
||||
if (spa_feature_is_active(spa,
|
||||
&spa_feature_table[SPA_FEATURE_ASYNC_DESTROY])) {
|
||||
return (B_TRUE);
|
||||
}
|
||||
if (spa_version(scn->scn_dp->dp_spa) >= SPA_VERSION_DEADLISTS) {
|
||||
(void) bpobj_space(&scn->scn_dp->dp_free_bpobj,
|
||||
&used, &comp, &uncomp);
|
||||
@@ -1497,14 +1447,40 @@ dsl_scan_sync(dsl_pool_t *dp, dmu_tx_t *tx)
|
||||
* traversing it.
|
||||
*/
|
||||
if (spa_version(dp->dp_spa) >= SPA_VERSION_DEADLISTS) {
|
||||
scn->scn_is_bptree = B_FALSE;
|
||||
scn->scn_zio_root = zio_root(dp->dp_spa, NULL,
|
||||
NULL, ZIO_FLAG_MUSTSUCCEED);
|
||||
err = bpobj_iterate(&dp->dp_free_bpobj,
|
||||
dsl_scan_free_cb, scn, tx);
|
||||
dsl_scan_free_block_cb, scn, tx);
|
||||
VERIFY3U(0, ==, zio_wait(scn->scn_zio_root));
|
||||
|
||||
if (err == 0 && spa_feature_is_active(spa,
|
||||
&spa_feature_table[SPA_FEATURE_ASYNC_DESTROY])) {
|
||||
scn->scn_is_bptree = B_TRUE;
|
||||
scn->scn_zio_root = zio_root(dp->dp_spa, NULL,
|
||||
NULL, ZIO_FLAG_MUSTSUCCEED);
|
||||
err = bptree_iterate(dp->dp_meta_objset,
|
||||
dp->dp_bptree_obj, B_TRUE, dsl_scan_free_block_cb,
|
||||
scn, tx);
|
||||
VERIFY3U(0, ==, zio_wait(scn->scn_zio_root));
|
||||
if (err != 0)
|
||||
return;
|
||||
|
||||
/* disable async destroy feature */
|
||||
spa_feature_decr(spa,
|
||||
&spa_feature_table[SPA_FEATURE_ASYNC_DESTROY], tx);
|
||||
ASSERT(!spa_feature_is_active(spa,
|
||||
&spa_feature_table[SPA_FEATURE_ASYNC_DESTROY]));
|
||||
VERIFY3U(0, ==, zap_remove(dp->dp_meta_objset,
|
||||
DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_BPTREE_OBJ, tx));
|
||||
VERIFY3U(0, ==, bptree_free(dp->dp_meta_objset,
|
||||
dp->dp_bptree_obj, tx));
|
||||
dp->dp_bptree_obj = 0;
|
||||
}
|
||||
if (scn->scn_visited_this_txg) {
|
||||
zfs_dbgmsg("freed %llu blocks in %llums from "
|
||||
"free_bpobj txg %llu",
|
||||
"free_bpobj/bptree txg %llu",
|
||||
(longlong_t)scn->scn_visited_this_txg,
|
||||
(longlong_t)
|
||||
(gethrtime() - scn->scn_sync_start_time) / MICROSEC,
|
||||
@@ -1619,9 +1595,13 @@ count_block(zfs_all_blkstats_t *zab, const blkptr_t *bp)
|
||||
for (i = 0; i < 4; i++) {
|
||||
int l = (i < 2) ? BP_GET_LEVEL(bp) : DN_MAX_LEVELS;
|
||||
int t = (i & 1) ? BP_GET_TYPE(bp) : DMU_OT_TOTAL;
|
||||
zfs_blkstat_t *zb = &zab->zab_type[l][t];
|
||||
int equal;
|
||||
zfs_blkstat_t *zb;
|
||||
|
||||
if (t & DMU_OT_NEWTYPE)
|
||||
t = DMU_OT_OTHER;
|
||||
|
||||
zb = &zab->zab_type[l][t];
|
||||
zb->zb_count++;
|
||||
zb->zb_asize += BP_GET_ASIZE(bp);
|
||||
zb->zb_lsize += BP_GET_LSIZE(bp);
|
||||
|
||||
+8
-8
@@ -18,8 +18,10 @@
|
||||
*
|
||||
* CDDL HEADER END
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/zfs_context.h>
|
||||
@@ -446,10 +448,9 @@ sa_add_layout_entry(objset_t *os, sa_attr_type_t *attrs, int attr_count,
|
||||
char attr_name[8];
|
||||
|
||||
if (sa->sa_layout_attr_obj == 0) {
|
||||
sa->sa_layout_attr_obj = zap_create(os,
|
||||
DMU_OT_SA_ATTR_LAYOUTS, DMU_OT_NONE, 0, tx);
|
||||
VERIFY(zap_add(os, sa->sa_master_obj, SA_LAYOUTS, 8, 1,
|
||||
&sa->sa_layout_attr_obj, tx) == 0);
|
||||
sa->sa_layout_attr_obj = zap_create_link(os,
|
||||
DMU_OT_SA_ATTR_LAYOUTS,
|
||||
sa->sa_master_obj, SA_LAYOUTS, tx);
|
||||
}
|
||||
|
||||
(void) snprintf(attr_name, sizeof (attr_name),
|
||||
@@ -1583,10 +1584,9 @@ sa_attr_register_sync(sa_handle_t *hdl, dmu_tx_t *tx)
|
||||
}
|
||||
|
||||
if (sa->sa_reg_attr_obj == 0) {
|
||||
sa->sa_reg_attr_obj = zap_create(hdl->sa_os,
|
||||
DMU_OT_SA_ATTR_REGISTRATION, DMU_OT_NONE, 0, tx);
|
||||
VERIFY(zap_add(hdl->sa_os, sa->sa_master_obj,
|
||||
SA_REGISTRY, 8, 1, &sa->sa_reg_attr_obj, tx) == 0);
|
||||
sa->sa_reg_attr_obj = zap_create_link(hdl->sa_os,
|
||||
DMU_OT_SA_ATTR_REGISTRATION,
|
||||
sa->sa_master_obj, SA_REGISTRY, tx);
|
||||
}
|
||||
for (i = 0; i != sa->sa_num_attrs; i++) {
|
||||
if (sa->sa_attr_table[i].sa_registered)
|
||||
|
||||
+407
-62
@@ -63,6 +63,7 @@
|
||||
#include <sys/spa_boot.h>
|
||||
#include <sys/zfs_ioctl.h>
|
||||
#include <sys/dsl_scan.h>
|
||||
#include <sys/zfeature.h>
|
||||
|
||||
#ifdef _KERNEL
|
||||
#include <sys/bootprops.h>
|
||||
@@ -114,6 +115,7 @@ const zio_taskq_info_t zio_taskqs[ZIO_TYPES][ZIO_TASKQ_TYPES] = {
|
||||
{ ZTI_ONE, ZTI_NULL, ZTI_ONE, ZTI_NULL },
|
||||
};
|
||||
|
||||
static dsl_syncfunc_t spa_sync_version;
|
||||
static dsl_syncfunc_t spa_sync_props;
|
||||
static boolean_t spa_has_active_shared_spare(spa_t *spa);
|
||||
static inline int spa_load_impl(spa_t *spa, uint64_t, nvlist_t *config,
|
||||
@@ -169,6 +171,7 @@ static void
|
||||
spa_prop_get_config(spa_t *spa, nvlist_t **nvp)
|
||||
{
|
||||
vdev_t *rvd = spa->spa_root_vdev;
|
||||
dsl_pool_t *pool = spa->spa_dsl_pool;
|
||||
uint64_t size;
|
||||
uint64_t alloc;
|
||||
uint64_t space;
|
||||
@@ -216,6 +219,22 @@ spa_prop_get_config(spa_t *spa, nvlist_t **nvp)
|
||||
spa_prop_add_list(*nvp, ZPOOL_PROP_VERSION, NULL, version, src);
|
||||
}
|
||||
|
||||
if (pool != NULL) {
|
||||
dsl_dir_t *freedir = pool->dp_free_dir;
|
||||
|
||||
/*
|
||||
* The $FREE directory was introduced in SPA_VERSION_DEADLISTS,
|
||||
* when opening pools before this version freedir will be NULL.
|
||||
*/
|
||||
if (freedir != NULL) {
|
||||
spa_prop_add_list(*nvp, ZPOOL_PROP_FREEING, NULL,
|
||||
freedir->dd_phys->dd_used_bytes, src);
|
||||
} else {
|
||||
spa_prop_add_list(*nvp, ZPOOL_PROP_FREEING,
|
||||
NULL, 0, src);
|
||||
}
|
||||
}
|
||||
|
||||
spa_prop_add_list(*nvp, ZPOOL_PROP_GUID, NULL, spa_guid(spa), src);
|
||||
|
||||
if (spa->spa_comment != NULL) {
|
||||
@@ -357,25 +376,55 @@ spa_prop_validate(spa_t *spa, nvlist_t *props)
|
||||
nvpair_t *elem;
|
||||
int error = 0, reset_bootfs = 0;
|
||||
uint64_t objnum = 0;
|
||||
boolean_t has_feature = B_FALSE;
|
||||
|
||||
elem = NULL;
|
||||
while ((elem = nvlist_next_nvpair(props, elem)) != NULL) {
|
||||
zpool_prop_t prop;
|
||||
char *propname, *strval;
|
||||
uint64_t intval;
|
||||
objset_t *os;
|
||||
char *slash, *check;
|
||||
char *strval, *slash, *check, *fname;
|
||||
const char *propname = nvpair_name(elem);
|
||||
zpool_prop_t prop = zpool_name_to_prop(propname);
|
||||
|
||||
propname = nvpair_name(elem);
|
||||
switch ((int)prop) {
|
||||
case ZPROP_INVAL:
|
||||
if (!zpool_prop_feature(propname)) {
|
||||
error = EINVAL;
|
||||
break;
|
||||
}
|
||||
|
||||
if ((prop = zpool_name_to_prop(propname)) == ZPROP_INVAL)
|
||||
return (EINVAL);
|
||||
/*
|
||||
* Sanitize the input.
|
||||
*/
|
||||
if (nvpair_type(elem) != DATA_TYPE_UINT64) {
|
||||
error = EINVAL;
|
||||
break;
|
||||
}
|
||||
|
||||
if (nvpair_value_uint64(elem, &intval) != 0) {
|
||||
error = EINVAL;
|
||||
break;
|
||||
}
|
||||
|
||||
if (intval != 0) {
|
||||
error = EINVAL;
|
||||
break;
|
||||
}
|
||||
|
||||
fname = strchr(propname, '@') + 1;
|
||||
if (zfeature_lookup_name(fname, NULL) != 0) {
|
||||
error = EINVAL;
|
||||
break;
|
||||
}
|
||||
|
||||
has_feature = B_TRUE;
|
||||
break;
|
||||
|
||||
switch (prop) {
|
||||
case ZPOOL_PROP_VERSION:
|
||||
error = nvpair_value_uint64(elem, &intval);
|
||||
if (!error &&
|
||||
(intval < spa_version(spa) || intval > SPA_VERSION))
|
||||
(intval < spa_version(spa) ||
|
||||
intval > SPA_VERSION_BEFORE_FEATURES ||
|
||||
has_feature))
|
||||
error = EINVAL;
|
||||
break;
|
||||
|
||||
@@ -412,6 +461,7 @@ spa_prop_validate(spa_t *spa, nvlist_t *props)
|
||||
error = nvpair_value_string(elem, &strval);
|
||||
|
||||
if (!error) {
|
||||
objset_t *os;
|
||||
uint64_t compress;
|
||||
|
||||
if (strval == NULL || strval[0] == '\0') {
|
||||
@@ -558,33 +608,58 @@ int
|
||||
spa_prop_set(spa_t *spa, nvlist_t *nvp)
|
||||
{
|
||||
int error;
|
||||
nvpair_t *elem;
|
||||
nvpair_t *elem = NULL;
|
||||
boolean_t need_sync = B_FALSE;
|
||||
zpool_prop_t prop;
|
||||
|
||||
if ((error = spa_prop_validate(spa, nvp)) != 0)
|
||||
return (error);
|
||||
|
||||
elem = NULL;
|
||||
while ((elem = nvlist_next_nvpair(nvp, elem)) != NULL) {
|
||||
if ((prop = zpool_name_to_prop(
|
||||
nvpair_name(elem))) == ZPROP_INVAL)
|
||||
return (EINVAL);
|
||||
zpool_prop_t prop = zpool_name_to_prop(nvpair_name(elem));
|
||||
|
||||
if (prop == ZPOOL_PROP_CACHEFILE ||
|
||||
prop == ZPOOL_PROP_ALTROOT ||
|
||||
prop == ZPOOL_PROP_READONLY)
|
||||
continue;
|
||||
|
||||
if (prop == ZPOOL_PROP_VERSION || prop == ZPROP_INVAL) {
|
||||
uint64_t ver;
|
||||
|
||||
if (prop == ZPOOL_PROP_VERSION) {
|
||||
VERIFY(nvpair_value_uint64(elem, &ver) == 0);
|
||||
} else {
|
||||
ASSERT(zpool_prop_feature(nvpair_name(elem)));
|
||||
ver = SPA_VERSION_FEATURES;
|
||||
need_sync = B_TRUE;
|
||||
}
|
||||
|
||||
/* Save time if the version is already set. */
|
||||
if (ver == spa_version(spa))
|
||||
continue;
|
||||
|
||||
/*
|
||||
* In addition to the pool directory object, we might
|
||||
* create the pool properties object, the features for
|
||||
* read object, the features for write object, or the
|
||||
* feature descriptions object.
|
||||
*/
|
||||
error = dsl_sync_task_do(spa_get_dsl(spa), NULL,
|
||||
spa_sync_version, spa, &ver, 6);
|
||||
if (error)
|
||||
return (error);
|
||||
continue;
|
||||
}
|
||||
|
||||
need_sync = B_TRUE;
|
||||
break;
|
||||
}
|
||||
|
||||
if (need_sync)
|
||||
if (need_sync) {
|
||||
return (dsl_sync_task_do(spa_get_dsl(spa), NULL, spa_sync_props,
|
||||
spa, nvp, 3));
|
||||
else
|
||||
return (0);
|
||||
spa, nvp, 6));
|
||||
}
|
||||
|
||||
return (0);
|
||||
}
|
||||
|
||||
/*
|
||||
@@ -1628,7 +1703,7 @@ spa_load_verify_done(zio_t *zio)
|
||||
int error = zio->io_error;
|
||||
|
||||
if (error) {
|
||||
if ((BP_GET_LEVEL(bp) != 0 || dmu_ot[type].ot_metadata) &&
|
||||
if ((BP_GET_LEVEL(bp) != 0 || DMU_OT_IS_METADATA(type)) &&
|
||||
type != DMU_OT_INTENT_LOG)
|
||||
atomic_add_64(&sle->sle_meta_count, 1);
|
||||
else
|
||||
@@ -1858,6 +1933,9 @@ spa_load(spa_t *spa, spa_load_state_t state, spa_import_type_t type,
|
||||
KM_PUSHPAGE) == 0);
|
||||
}
|
||||
|
||||
nvlist_free(spa->spa_load_info);
|
||||
spa->spa_load_info = fnvlist_alloc();
|
||||
|
||||
gethrestime(&spa->spa_loaded_ts);
|
||||
error = spa_load_impl(spa, pool_guid, config, state, type,
|
||||
mosconfig, &ereport);
|
||||
@@ -1891,12 +1969,14 @@ spa_load_impl(spa_t *spa, uint64_t pool_guid, nvlist_t *config,
|
||||
{
|
||||
int error = 0;
|
||||
nvlist_t *nvroot = NULL;
|
||||
nvlist_t *label;
|
||||
vdev_t *rvd;
|
||||
uberblock_t *ub = &spa->spa_uberblock;
|
||||
uint64_t children, config_cache_txg = spa->spa_config_txg;
|
||||
int orig_mode = spa->spa_mode;
|
||||
int parse;
|
||||
uint64_t obj;
|
||||
boolean_t missing_feat_write = B_FALSE;
|
||||
|
||||
/*
|
||||
* If this is an untrusted config, access the pool in read-only mode.
|
||||
@@ -1976,19 +2056,79 @@ spa_load_impl(spa_t *spa, uint64_t pool_guid, nvlist_t *config,
|
||||
/*
|
||||
* Find the best uberblock.
|
||||
*/
|
||||
vdev_uberblock_load(NULL, rvd, ub);
|
||||
vdev_uberblock_load(rvd, ub, &label);
|
||||
|
||||
/*
|
||||
* If we weren't able to find a single valid uberblock, return failure.
|
||||
*/
|
||||
if (ub->ub_txg == 0)
|
||||
if (ub->ub_txg == 0) {
|
||||
nvlist_free(label);
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_CORRUPT_DATA, ENXIO));
|
||||
}
|
||||
|
||||
/*
|
||||
* If the pool is newer than the code, we can't open it.
|
||||
* If the pool has an unsupported version we can't open it.
|
||||
*/
|
||||
if (ub->ub_version > SPA_VERSION)
|
||||
if (!SPA_VERSION_IS_SUPPORTED(ub->ub_version)) {
|
||||
nvlist_free(label);
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_VERSION_NEWER, ENOTSUP));
|
||||
}
|
||||
|
||||
if (ub->ub_version >= SPA_VERSION_FEATURES) {
|
||||
nvlist_t *features;
|
||||
|
||||
/*
|
||||
* If we weren't able to find what's necessary for reading the
|
||||
* MOS in the label, return failure.
|
||||
*/
|
||||
if (label == NULL || nvlist_lookup_nvlist(label,
|
||||
ZPOOL_CONFIG_FEATURES_FOR_READ, &features) != 0) {
|
||||
nvlist_free(label);
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_CORRUPT_DATA,
|
||||
ENXIO));
|
||||
}
|
||||
|
||||
/*
|
||||
* Update our in-core representation with the definitive values
|
||||
* from the label.
|
||||
*/
|
||||
nvlist_free(spa->spa_label_features);
|
||||
VERIFY(nvlist_dup(features, &spa->spa_label_features, 0) == 0);
|
||||
}
|
||||
|
||||
nvlist_free(label);
|
||||
|
||||
/*
|
||||
* Look through entries in the label nvlist's features_for_read. If
|
||||
* there is a feature listed there which we don't understand then we
|
||||
* cannot open a pool.
|
||||
*/
|
||||
if (ub->ub_version >= SPA_VERSION_FEATURES) {
|
||||
nvlist_t *unsup_feat;
|
||||
nvpair_t *nvp;
|
||||
|
||||
VERIFY(nvlist_alloc(&unsup_feat, NV_UNIQUE_NAME, KM_SLEEP) ==
|
||||
0);
|
||||
|
||||
for (nvp = nvlist_next_nvpair(spa->spa_label_features, NULL);
|
||||
nvp != NULL;
|
||||
nvp = nvlist_next_nvpair(spa->spa_label_features, nvp)) {
|
||||
if (!zfeature_is_supported(nvpair_name(nvp))) {
|
||||
VERIFY(nvlist_add_string(unsup_feat,
|
||||
nvpair_name(nvp), "") == 0);
|
||||
}
|
||||
}
|
||||
|
||||
if (!nvlist_empty(unsup_feat)) {
|
||||
VERIFY(nvlist_add_nvlist(spa->spa_load_info,
|
||||
ZPOOL_CONFIG_UNSUP_FEAT, unsup_feat) == 0);
|
||||
nvlist_free(unsup_feat);
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_UNSUP_FEAT,
|
||||
ENOTSUP));
|
||||
}
|
||||
|
||||
nvlist_free(unsup_feat);
|
||||
}
|
||||
|
||||
/*
|
||||
* If the vdev guid sum doesn't match the uberblock, we have an
|
||||
@@ -2022,7 +2162,7 @@ spa_load_impl(spa_t *spa, uint64_t pool_guid, nvlist_t *config,
|
||||
spa->spa_claim_max_txg = spa->spa_first_txg;
|
||||
spa->spa_prev_software_version = ub->ub_software_version;
|
||||
|
||||
error = dsl_pool_open(spa, spa->spa_first_txg, &spa->spa_dsl_pool);
|
||||
error = dsl_pool_init(spa, spa->spa_first_txg, &spa->spa_dsl_pool);
|
||||
if (error)
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_CORRUPT_DATA, EIO));
|
||||
spa->spa_meta_objset = spa->spa_dsl_pool->dp_meta_objset;
|
||||
@@ -2030,6 +2170,84 @@ spa_load_impl(spa_t *spa, uint64_t pool_guid, nvlist_t *config,
|
||||
if (spa_dir_prop(spa, DMU_POOL_CONFIG, &spa->spa_config_object) != 0)
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_CORRUPT_DATA, EIO));
|
||||
|
||||
if (spa_version(spa) >= SPA_VERSION_FEATURES) {
|
||||
boolean_t missing_feat_read = B_FALSE;
|
||||
nvlist_t *unsup_feat;
|
||||
|
||||
if (spa_dir_prop(spa, DMU_POOL_FEATURES_FOR_READ,
|
||||
&spa->spa_feat_for_read_obj) != 0) {
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_CORRUPT_DATA, EIO));
|
||||
}
|
||||
|
||||
if (spa_dir_prop(spa, DMU_POOL_FEATURES_FOR_WRITE,
|
||||
&spa->spa_feat_for_write_obj) != 0) {
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_CORRUPT_DATA, EIO));
|
||||
}
|
||||
|
||||
if (spa_dir_prop(spa, DMU_POOL_FEATURE_DESCRIPTIONS,
|
||||
&spa->spa_feat_desc_obj) != 0) {
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_CORRUPT_DATA, EIO));
|
||||
}
|
||||
|
||||
VERIFY(nvlist_alloc(&unsup_feat, NV_UNIQUE_NAME, KM_SLEEP) ==
|
||||
0);
|
||||
|
||||
if (!feature_is_supported(spa->spa_meta_objset,
|
||||
spa->spa_feat_for_read_obj, spa->spa_feat_desc_obj,
|
||||
unsup_feat))
|
||||
missing_feat_read = B_TRUE;
|
||||
|
||||
if (spa_writeable(spa) || state == SPA_LOAD_TRYIMPORT) {
|
||||
if (!feature_is_supported(spa->spa_meta_objset,
|
||||
spa->spa_feat_for_write_obj, spa->spa_feat_desc_obj,
|
||||
unsup_feat))
|
||||
missing_feat_write = B_TRUE;
|
||||
}
|
||||
|
||||
if (!nvlist_empty(unsup_feat)) {
|
||||
VERIFY(nvlist_add_nvlist(spa->spa_load_info,
|
||||
ZPOOL_CONFIG_UNSUP_FEAT, unsup_feat) == 0);
|
||||
}
|
||||
|
||||
nvlist_free(unsup_feat);
|
||||
|
||||
if (!missing_feat_read) {
|
||||
fnvlist_add_boolean(spa->spa_load_info,
|
||||
ZPOOL_CONFIG_CAN_RDONLY);
|
||||
}
|
||||
|
||||
/*
|
||||
* If the state is SPA_LOAD_TRYIMPORT, our objective is
|
||||
* twofold: to determine whether the pool is available for
|
||||
* import in read-write mode and (if it is not) whether the
|
||||
* pool is available for import in read-only mode. If the pool
|
||||
* is available for import in read-write mode, it is displayed
|
||||
* as available in userland; if it is not available for import
|
||||
* in read-only mode, it is displayed as unavailable in
|
||||
* userland. If the pool is available for import in read-only
|
||||
* mode but not read-write mode, it is displayed as unavailable
|
||||
* in userland with a special note that the pool is actually
|
||||
* available for open in read-only mode.
|
||||
*
|
||||
* As a result, if the state is SPA_LOAD_TRYIMPORT and we are
|
||||
* missing a feature for write, we must first determine whether
|
||||
* the pool can be opened read-only before returning to
|
||||
* userland in order to know whether to display the
|
||||
* abovementioned note.
|
||||
*/
|
||||
if (missing_feat_read || (missing_feat_write &&
|
||||
spa_writeable(spa))) {
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_UNSUP_FEAT,
|
||||
ENOTSUP));
|
||||
}
|
||||
}
|
||||
|
||||
spa->spa_is_initializing = B_TRUE;
|
||||
error = dsl_pool_open(spa->spa_dsl_pool);
|
||||
spa->spa_is_initializing = B_FALSE;
|
||||
if (error != 0)
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_CORRUPT_DATA, EIO));
|
||||
|
||||
if (!mosconfig) {
|
||||
uint64_t hostid;
|
||||
nvlist_t *policy = NULL, *nvconfig;
|
||||
@@ -2247,7 +2465,7 @@ spa_load_impl(spa_t *spa, uint64_t pool_guid, nvlist_t *config,
|
||||
nvlist_free(nvconfig);
|
||||
|
||||
/*
|
||||
* Now that we've validate the config, check the state of the
|
||||
* Now that we've validated the config, check the state of the
|
||||
* root vdev. If it can't be opened, it indicates one or
|
||||
* more toplevel vdevs are faulted.
|
||||
*/
|
||||
@@ -2260,6 +2478,17 @@ spa_load_impl(spa_t *spa, uint64_t pool_guid, nvlist_t *config,
|
||||
}
|
||||
}
|
||||
|
||||
if (missing_feat_write) {
|
||||
ASSERT(state == SPA_LOAD_TRYIMPORT);
|
||||
|
||||
/*
|
||||
* At this point, we know that we can open the pool in
|
||||
* read-only mode but not read-write mode. We now have enough
|
||||
* information and can return to userland.
|
||||
*/
|
||||
return (spa_vdev_err(rvd, VDEV_AUX_UNSUP_FEAT, ENOTSUP));
|
||||
}
|
||||
|
||||
/*
|
||||
* We've successfully opened the pool, verify that we're ready
|
||||
* to start pushing transactions.
|
||||
@@ -2370,10 +2599,18 @@ spa_load_retry(spa_t *spa, spa_load_state_t state, int mosconfig)
|
||||
return (spa_load(spa, state, SPA_IMPORT_EXISTING, mosconfig));
|
||||
}
|
||||
|
||||
/*
|
||||
* If spa_load() fails this function will try loading prior txg's. If
|
||||
* 'state' is SPA_LOAD_RECOVER and one of these loads succeeds the pool
|
||||
* will be rewound to that txg. If 'state' is not SPA_LOAD_RECOVER this
|
||||
* function will not rewind the pool and will return the same error as
|
||||
* spa_load().
|
||||
*/
|
||||
static int
|
||||
spa_load_best(spa_t *spa, spa_load_state_t state, int mosconfig,
|
||||
uint64_t max_request, int rewind_flags)
|
||||
{
|
||||
nvlist_t *loadinfo = NULL;
|
||||
nvlist_t *config = NULL;
|
||||
int load_error, rewind_error;
|
||||
uint64_t safe_rewind_txg;
|
||||
@@ -2402,9 +2639,18 @@ spa_load_best(spa_t *spa, spa_load_state_t state, int mosconfig,
|
||||
return (load_error);
|
||||
}
|
||||
|
||||
/* Price of rolling back is discarding txgs, including log */
|
||||
if (state == SPA_LOAD_RECOVER)
|
||||
if (state == SPA_LOAD_RECOVER) {
|
||||
/* Price of rolling back is discarding txgs, including log */
|
||||
spa_set_log_state(spa, SPA_LOG_CLEAR);
|
||||
} else {
|
||||
/*
|
||||
* If we aren't rolling back save the load info from our first
|
||||
* import attempt so that we can restore it after attempting
|
||||
* to rewind.
|
||||
*/
|
||||
loadinfo = spa->spa_load_info;
|
||||
spa->spa_load_info = fnvlist_alloc();
|
||||
}
|
||||
|
||||
spa->spa_load_max_txg = spa->spa_last_ubsync_txg;
|
||||
safe_rewind_txg = spa->spa_last_ubsync_txg - TXG_DEFER_SIZE;
|
||||
@@ -2428,7 +2674,20 @@ spa_load_best(spa_t *spa, spa_load_state_t state, int mosconfig,
|
||||
if (config && (rewind_error || state != SPA_LOAD_RECOVER))
|
||||
spa_config_set(spa, config);
|
||||
|
||||
return (state == SPA_LOAD_RECOVER ? rewind_error : load_error);
|
||||
if (state == SPA_LOAD_RECOVER) {
|
||||
ASSERT3P(loadinfo, ==, NULL);
|
||||
return (rewind_error);
|
||||
} else {
|
||||
/* Store the rewind info as part of the initial load info */
|
||||
fnvlist_add_nvlist(loadinfo, ZPOOL_CONFIG_REWIND_INFO,
|
||||
spa->spa_load_info);
|
||||
|
||||
/* Restore the initial load info */
|
||||
fnvlist_free(spa->spa_load_info);
|
||||
spa->spa_load_info = loadinfo;
|
||||
|
||||
return (load_error);
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
@@ -2698,8 +2957,50 @@ spa_add_l2cache(spa_t *spa, nvlist_t *config)
|
||||
}
|
||||
}
|
||||
|
||||
static void
|
||||
spa_add_feature_stats(spa_t *spa, nvlist_t *config)
|
||||
{
|
||||
nvlist_t *features;
|
||||
zap_cursor_t zc;
|
||||
zap_attribute_t za;
|
||||
|
||||
ASSERT(spa_config_held(spa, SCL_CONFIG, RW_READER));
|
||||
VERIFY(nvlist_alloc(&features, NV_UNIQUE_NAME, KM_SLEEP) == 0);
|
||||
|
||||
if (spa->spa_feat_for_read_obj != 0) {
|
||||
for (zap_cursor_init(&zc, spa->spa_meta_objset,
|
||||
spa->spa_feat_for_read_obj);
|
||||
zap_cursor_retrieve(&zc, &za) == 0;
|
||||
zap_cursor_advance(&zc)) {
|
||||
ASSERT(za.za_integer_length == sizeof (uint64_t) &&
|
||||
za.za_num_integers == 1);
|
||||
VERIFY3U(0, ==, nvlist_add_uint64(features, za.za_name,
|
||||
za.za_first_integer));
|
||||
}
|
||||
zap_cursor_fini(&zc);
|
||||
}
|
||||
|
||||
if (spa->spa_feat_for_write_obj != 0) {
|
||||
for (zap_cursor_init(&zc, spa->spa_meta_objset,
|
||||
spa->spa_feat_for_write_obj);
|
||||
zap_cursor_retrieve(&zc, &za) == 0;
|
||||
zap_cursor_advance(&zc)) {
|
||||
ASSERT(za.za_integer_length == sizeof (uint64_t) &&
|
||||
za.za_num_integers == 1);
|
||||
VERIFY3U(0, ==, nvlist_add_uint64(features, za.za_name,
|
||||
za.za_first_integer));
|
||||
}
|
||||
zap_cursor_fini(&zc);
|
||||
}
|
||||
|
||||
VERIFY(nvlist_add_nvlist(config, ZPOOL_CONFIG_FEATURE_STATS,
|
||||
features) == 0);
|
||||
nvlist_free(features);
|
||||
}
|
||||
|
||||
int
|
||||
spa_get_stats(const char *name, nvlist_t **config, char *altroot, size_t buflen)
|
||||
spa_get_stats(const char *name, nvlist_t **config,
|
||||
char *altroot, size_t buflen)
|
||||
{
|
||||
int error;
|
||||
spa_t *spa;
|
||||
@@ -2734,6 +3035,7 @@ spa_get_stats(const char *name, nvlist_t **config, char *altroot, size_t buflen)
|
||||
|
||||
spa_add_spares(spa, *config);
|
||||
spa_add_l2cache(spa, *config);
|
||||
spa_add_feature_stats(spa, *config);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -2954,6 +3256,8 @@ spa_create(const char *pool, nvlist_t *nvroot, nvlist_t *props,
|
||||
nvlist_t **spares, **l2cache;
|
||||
uint_t nspares, nl2cache;
|
||||
uint64_t version, obj;
|
||||
boolean_t has_features;
|
||||
nvpair_t *elem;
|
||||
int c;
|
||||
|
||||
/*
|
||||
@@ -2980,10 +3284,18 @@ spa_create(const char *pool, nvlist_t *nvroot, nvlist_t *props,
|
||||
return (error);
|
||||
}
|
||||
|
||||
if (nvlist_lookup_uint64(props, zpool_prop_to_name(ZPOOL_PROP_VERSION),
|
||||
&version) != 0)
|
||||
has_features = B_FALSE;
|
||||
for (elem = nvlist_next_nvpair(props, NULL);
|
||||
elem != NULL; elem = nvlist_next_nvpair(props, elem)) {
|
||||
if (zpool_prop_feature(nvpair_name(elem)))
|
||||
has_features = B_TRUE;
|
||||
}
|
||||
|
||||
if (has_features || nvlist_lookup_uint64(props,
|
||||
zpool_prop_to_name(ZPOOL_PROP_VERSION), &version) != 0) {
|
||||
version = SPA_VERSION;
|
||||
ASSERT(version <= SPA_VERSION);
|
||||
}
|
||||
ASSERT(SPA_VERSION_IS_SUPPORTED(version));
|
||||
|
||||
spa->spa_first_txg = txg;
|
||||
spa->spa_uberblock.ub_txg = txg - 1;
|
||||
@@ -3059,8 +3371,10 @@ spa_create(const char *pool, nvlist_t *nvroot, nvlist_t *props,
|
||||
spa->spa_l2cache.sav_sync = B_TRUE;
|
||||
}
|
||||
|
||||
spa->spa_is_initializing = B_TRUE;
|
||||
spa->spa_dsl_pool = dp = dsl_pool_create(spa, zplprops, txg);
|
||||
spa->spa_meta_objset = dp->dp_meta_objset;
|
||||
spa->spa_is_initializing = B_FALSE;
|
||||
|
||||
/*
|
||||
* Create DDTs (dedup tables).
|
||||
@@ -3084,6 +3398,9 @@ spa_create(const char *pool, nvlist_t *nvroot, nvlist_t *props,
|
||||
cmn_err(CE_PANIC, "failed to add pool config");
|
||||
}
|
||||
|
||||
if (spa_version(spa) >= SPA_VERSION_FEATURES)
|
||||
spa_feature_create_zap_objects(spa, tx);
|
||||
|
||||
if (zap_add(spa->spa_meta_objset,
|
||||
DMU_POOL_DIRECTORY_OBJECT, DMU_POOL_CREATION_VERSION,
|
||||
sizeof (uint64_t), 1, &version, tx) != 0) {
|
||||
@@ -3276,7 +3593,7 @@ spa_import_rootpool(char *devpath, char *devid)
|
||||
}
|
||||
#endif
|
||||
if (config == NULL) {
|
||||
cmn_err(CE_NOTE, "Can not read the pool label from '%s'",
|
||||
cmn_err(CE_NOTE, "Cannot read the pool label from '%s'",
|
||||
devpath);
|
||||
return (EIO);
|
||||
}
|
||||
@@ -3590,6 +3907,8 @@ spa_tryimport(nvlist_t *tryconfig)
|
||||
state) == 0);
|
||||
VERIFY(nvlist_add_uint64(config, ZPOOL_CONFIG_TIMESTAMP,
|
||||
spa->spa_uberblock.ub_timestamp) == 0);
|
||||
VERIFY(nvlist_add_nvlist(config, ZPOOL_CONFIG_LOAD_INFO,
|
||||
spa->spa_load_info) == 0);
|
||||
|
||||
/*
|
||||
* If the bootfs property exists on this pool then we
|
||||
@@ -5305,7 +5624,7 @@ spa_sync_nvlist(spa_t *spa, uint64_t obj, nvlist_t *nv, dmu_tx_t *tx)
|
||||
* information. This avoids the dbuf_will_dirty() path and
|
||||
* saves us a pre-read to get data we don't actually care about.
|
||||
*/
|
||||
bufsize = P2ROUNDUP(nvsize, SPA_CONFIG_BLOCKSIZE);
|
||||
bufsize = P2ROUNDUP((uint64_t)nvsize, SPA_CONFIG_BLOCKSIZE);
|
||||
packed = vmem_alloc(bufsize, KM_PUSHPAGE);
|
||||
|
||||
VERIFY(nvlist_pack(nv, &packed, &nvsize, NV_ENCODE_XDR,
|
||||
@@ -5390,6 +5709,24 @@ spa_sync_config_object(spa_t *spa, dmu_tx_t *tx)
|
||||
spa_sync_nvlist(spa, spa->spa_config_object, config, tx);
|
||||
}
|
||||
|
||||
static void
|
||||
spa_sync_version(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
{
|
||||
spa_t *spa = arg1;
|
||||
uint64_t version = *(uint64_t *)arg2;
|
||||
|
||||
/*
|
||||
* Setting the version is special cased when first creating the pool.
|
||||
*/
|
||||
ASSERT(tx->tx_txg != TXG_INITIAL);
|
||||
|
||||
ASSERT(version <= SPA_VERSION);
|
||||
ASSERT(version >= spa_version(spa));
|
||||
|
||||
spa->spa_uberblock.ub_version = version;
|
||||
vdev_config_dirty(spa->spa_root_vdev);
|
||||
}
|
||||
|
||||
/*
|
||||
* Set zpool properties.
|
||||
*/
|
||||
@@ -5399,32 +5736,39 @@ spa_sync_props(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
spa_t *spa = arg1;
|
||||
objset_t *mos = spa->spa_meta_objset;
|
||||
nvlist_t *nvp = arg2;
|
||||
nvpair_t *elem;
|
||||
uint64_t intval;
|
||||
char *strval;
|
||||
zpool_prop_t prop;
|
||||
const char *propname;
|
||||
zprop_type_t proptype;
|
||||
nvpair_t *elem = NULL;
|
||||
|
||||
mutex_enter(&spa->spa_props_lock);
|
||||
|
||||
elem = NULL;
|
||||
while ((elem = nvlist_next_nvpair(nvp, elem))) {
|
||||
switch (prop = zpool_name_to_prop(nvpair_name(elem))) {
|
||||
case ZPOOL_PROP_VERSION:
|
||||
uint64_t intval;
|
||||
char *strval, *fname;
|
||||
zpool_prop_t prop;
|
||||
const char *propname;
|
||||
zprop_type_t proptype;
|
||||
zfeature_info_t *feature;
|
||||
|
||||
prop = zpool_name_to_prop(nvpair_name(elem));
|
||||
switch ((int)prop) {
|
||||
case ZPROP_INVAL:
|
||||
/*
|
||||
* Only set version for non-zpool-creation cases
|
||||
* (set/import). spa_create() needs special care
|
||||
* for version setting.
|
||||
* We checked this earlier in spa_prop_validate().
|
||||
*/
|
||||
if (tx->tx_txg != TXG_INITIAL) {
|
||||
VERIFY(nvpair_value_uint64(elem,
|
||||
&intval) == 0);
|
||||
ASSERT(intval <= SPA_VERSION);
|
||||
ASSERT(intval >= spa_version(spa));
|
||||
spa->spa_uberblock.ub_version = intval;
|
||||
vdev_config_dirty(spa->spa_root_vdev);
|
||||
}
|
||||
ASSERT(zpool_prop_feature(nvpair_name(elem)));
|
||||
|
||||
fname = strchr(nvpair_name(elem), '@') + 1;
|
||||
VERIFY3U(0, ==, zfeature_lookup_name(fname, &feature));
|
||||
|
||||
spa_feature_enable(spa, feature, tx);
|
||||
break;
|
||||
|
||||
case ZPOOL_PROP_VERSION:
|
||||
VERIFY(nvpair_value_uint64(elem, &intval) == 0);
|
||||
/*
|
||||
* The version is synced seperatly before other
|
||||
* properties and should be correct by now.
|
||||
*/
|
||||
ASSERT3U(spa_version(spa), >=, intval);
|
||||
break;
|
||||
|
||||
case ZPOOL_PROP_ALTROOT:
|
||||
@@ -5461,14 +5805,10 @@ spa_sync_props(void *arg1, void *arg2, dmu_tx_t *tx)
|
||||
* Set pool property values in the poolprops mos object.
|
||||
*/
|
||||
if (spa->spa_pool_props_object == 0) {
|
||||
VERIFY((spa->spa_pool_props_object =
|
||||
zap_create(mos, DMU_OT_POOL_PROPS,
|
||||
DMU_OT_NONE, 0, tx)) > 0);
|
||||
|
||||
VERIFY(zap_update(mos,
|
||||
spa->spa_pool_props_object =
|
||||
zap_create_link(mos, DMU_OT_POOL_PROPS,
|
||||
DMU_POOL_DIRECTORY_OBJECT, DMU_POOL_PROPS,
|
||||
8, 1, &spa->spa_pool_props_object, tx)
|
||||
== 0);
|
||||
tx);
|
||||
}
|
||||
|
||||
/* normalize the property name */
|
||||
@@ -5567,6 +5907,11 @@ spa_sync_upgrades(spa_t *spa, dmu_tx_t *tx)
|
||||
/* Keeping the freedir open increases spa_minref */
|
||||
spa->spa_minref += 3;
|
||||
}
|
||||
|
||||
if (spa->spa_ubsync.ub_version < SPA_VERSION_FEATURES &&
|
||||
spa->spa_uberblock.ub_version >= SPA_VERSION_FEATURES) {
|
||||
spa_feature_create_zap_objects(spa, tx);
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
|
||||
@@ -22,7 +22,7 @@
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright 2011 Nexenta Systems, Inc. All rights reserved.
|
||||
* Copyright (c) 2011 by Delphix. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/spa.h>
|
||||
@@ -35,6 +35,7 @@
|
||||
#include <sys/utsname.h>
|
||||
#include <sys/systeminfo.h>
|
||||
#include <sys/sunddi.h>
|
||||
#include <sys/zfeature.h>
|
||||
#ifdef _KERNEL
|
||||
#include <sys/kobj.h>
|
||||
#include <sys/zone.h>
|
||||
@@ -408,6 +409,12 @@ spa_config_generate(spa_t *spa, vdev_t *vd, uint64_t txg, int getstats)
|
||||
VERIFY(nvlist_add_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, nvroot) == 0);
|
||||
nvlist_free(nvroot);
|
||||
|
||||
/*
|
||||
* Store what's necessary for reading the MOS in the label.
|
||||
*/
|
||||
VERIFY(nvlist_add_nvlist(config, ZPOOL_CONFIG_FEATURES_FOR_READ,
|
||||
spa->spa_label_features) == 0);
|
||||
|
||||
if (getstats && spa_load_state(spa) == SPA_LOAD_NONE) {
|
||||
ddt_histogram_t *ddh;
|
||||
ddt_stat_t *dds;
|
||||
|
||||
+52
-5
@@ -20,7 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2011 by Delphix. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
* Copyright 2011 Nexenta Systems, Inc. All rights reserved.
|
||||
*/
|
||||
|
||||
@@ -49,6 +49,7 @@
|
||||
#include <sys/arc.h>
|
||||
#include <sys/ddt.h>
|
||||
#include "zfs_prop.h"
|
||||
#include "zfeature_common.h"
|
||||
|
||||
/*
|
||||
* SPA locking
|
||||
@@ -217,7 +218,7 @@
|
||||
* Like spa_vdev_enter/exit, these are convenience wrappers -- the actual
|
||||
* locking is, always, based on spa_namespace_lock and spa_config_lock[].
|
||||
*
|
||||
* spa_rename() is also implemented within this file since is requires
|
||||
* spa_rename() is also implemented within this file since it requires
|
||||
* manipulation of the namespace.
|
||||
*/
|
||||
|
||||
@@ -479,8 +480,22 @@ spa_add(const char *name, nvlist_t *config, const char *altroot)
|
||||
VERIFY(nvlist_alloc(&spa->spa_load_info, NV_UNIQUE_NAME,
|
||||
KM_PUSHPAGE) == 0);
|
||||
|
||||
if (config != NULL)
|
||||
if (config != NULL) {
|
||||
nvlist_t *features;
|
||||
|
||||
if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_FEATURES_FOR_READ,
|
||||
&features) == 0) {
|
||||
VERIFY(nvlist_dup(features, &spa->spa_label_features,
|
||||
0) == 0);
|
||||
}
|
||||
|
||||
VERIFY(nvlist_dup(config, &spa->spa_config, 0) == 0);
|
||||
}
|
||||
|
||||
if (spa->spa_label_features == NULL) {
|
||||
VERIFY(nvlist_alloc(&spa->spa_label_features, NV_UNIQUE_NAME,
|
||||
KM_SLEEP) == 0);
|
||||
}
|
||||
|
||||
return (spa);
|
||||
}
|
||||
@@ -518,6 +533,7 @@ spa_remove(spa_t *spa)
|
||||
|
||||
list_destroy(&spa->spa_config_list);
|
||||
|
||||
nvlist_free(spa->spa_label_features);
|
||||
nvlist_free(spa->spa_load_info);
|
||||
spa_config_set(spa, NULL);
|
||||
|
||||
@@ -1025,6 +1041,20 @@ spa_vdev_state_exit(spa_t *spa, vdev_t *vd, int error)
|
||||
* ==========================================================================
|
||||
*/
|
||||
|
||||
void
|
||||
spa_activate_mos_feature(spa_t *spa, const char *feature)
|
||||
{
|
||||
(void) nvlist_add_boolean(spa->spa_label_features, feature);
|
||||
vdev_config_dirty(spa->spa_root_vdev);
|
||||
}
|
||||
|
||||
void
|
||||
spa_deactivate_mos_feature(spa_t *spa, const char *feature)
|
||||
{
|
||||
(void) nvlist_remove_all(spa->spa_label_features, feature);
|
||||
vdev_config_dirty(spa->spa_root_vdev);
|
||||
}
|
||||
|
||||
/*
|
||||
* Rename a spa_t.
|
||||
*/
|
||||
@@ -1175,12 +1205,22 @@ spa_generate_guid(spa_t *spa)
|
||||
void
|
||||
sprintf_blkptr(char *buf, const blkptr_t *bp)
|
||||
{
|
||||
char *type = NULL;
|
||||
char type[256];
|
||||
char *checksum = NULL;
|
||||
char *compress = NULL;
|
||||
|
||||
if (bp != NULL) {
|
||||
type = dmu_ot[BP_GET_TYPE(bp)].ot_name;
|
||||
if (BP_GET_TYPE(bp) & DMU_OT_NEWTYPE) {
|
||||
dmu_object_byteswap_t bswap =
|
||||
DMU_OT_BYTESWAP(BP_GET_TYPE(bp));
|
||||
(void) snprintf(type, sizeof (type), "bswap %s %s",
|
||||
DMU_OT_IS_METADATA(BP_GET_TYPE(bp)) ?
|
||||
"metadata" : "data",
|
||||
dmu_ot_byteswap[bswap].ob_name);
|
||||
} else {
|
||||
(void) strlcpy(type, dmu_ot[BP_GET_TYPE(bp)].ot_name,
|
||||
sizeof (type));
|
||||
}
|
||||
checksum = zio_checksum_table[BP_GET_CHECKSUM(bp)].ci_name;
|
||||
compress = zio_compress_table[BP_GET_COMPRESS(bp)].ci_name;
|
||||
}
|
||||
@@ -1252,6 +1292,12 @@ spa_get_dsl(spa_t *spa)
|
||||
return (spa->spa_dsl_pool);
|
||||
}
|
||||
|
||||
boolean_t
|
||||
spa_is_initializing(spa_t *spa)
|
||||
{
|
||||
return (spa->spa_is_initializing);
|
||||
}
|
||||
|
||||
blkptr_t *
|
||||
spa_get_rootblkptr(spa_t *spa)
|
||||
{
|
||||
@@ -1532,6 +1578,7 @@ spa_init(int mode)
|
||||
vdev_cache_stat_init();
|
||||
zfs_prop_init();
|
||||
zpool_prop_init();
|
||||
zpool_feature_init();
|
||||
spa_config_load();
|
||||
l2arc_start();
|
||||
}
|
||||
|
||||
+4
-3
@@ -1349,7 +1349,8 @@ vdev_validate(vdev_t *vd, boolean_t strict)
|
||||
uint64_t aux_guid = 0;
|
||||
nvlist_t *nvl;
|
||||
|
||||
if ((label = vdev_label_read_config(vd)) == NULL) {
|
||||
if ((label = vdev_label_read_config(vd, VDEV_BEST_LABEL)) ==
|
||||
NULL) {
|
||||
vdev_set_state(vd, B_TRUE, VDEV_STATE_CANT_OPEN,
|
||||
VDEV_AUX_BAD_LABEL);
|
||||
return (0);
|
||||
@@ -1993,14 +1994,14 @@ vdev_validate_aux(vdev_t *vd)
|
||||
if (!vdev_readable(vd))
|
||||
return (0);
|
||||
|
||||
if ((label = vdev_label_read_config(vd)) == NULL) {
|
||||
if ((label = vdev_label_read_config(vd, VDEV_BEST_LABEL)) == NULL) {
|
||||
vdev_set_state(vd, B_TRUE, VDEV_STATE_CANT_OPEN,
|
||||
VDEV_AUX_CORRUPT_DATA);
|
||||
return (-1);
|
||||
}
|
||||
|
||||
if (nvlist_lookup_uint64(label, ZPOOL_CONFIG_VERSION, &version) != 0 ||
|
||||
version > SPA_VERSION ||
|
||||
!SPA_VERSION_IS_SUPPORTED(version) ||
|
||||
nvlist_lookup_uint64(label, ZPOOL_CONFIG_GUID, &guid) != 0 ||
|
||||
guid != vd->vdev_guid ||
|
||||
nvlist_lookup_uint64(label, ZPOOL_CONFIG_POOL_STATE, &state) != 0) {
|
||||
|
||||
+76
-26
@@ -18,8 +18,10 @@
|
||||
*
|
||||
* CDDL HEADER END
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
/*
|
||||
@@ -121,6 +123,8 @@
|
||||
* txg Transaction group in which this label was written
|
||||
* pool_guid Unique identifier for this pool
|
||||
* vdev_tree An nvlist describing vdev tree.
|
||||
* features_for_read
|
||||
* An nvlist of the features necessary for reading the MOS.
|
||||
*
|
||||
* Each leaf device label also contains the following:
|
||||
*
|
||||
@@ -428,8 +432,13 @@ vdev_top_config_generate(spa_t *spa, nvlist_t *config)
|
||||
kmem_free(array, rvd->vdev_children * sizeof (uint64_t));
|
||||
}
|
||||
|
||||
/*
|
||||
* Returns the configuration from the label of the given vdev. If 'label' is
|
||||
* VDEV_BEST_LABEL, each label of the vdev will be read until a valid
|
||||
* configuration is found; otherwise, only the specified label will be read.
|
||||
*/
|
||||
nvlist_t *
|
||||
vdev_label_read_config(vdev_t *vd)
|
||||
vdev_label_read_config(vdev_t *vd, int label)
|
||||
{
|
||||
spa_t *spa = vd->vdev_spa;
|
||||
nvlist_t *config = NULL;
|
||||
@@ -448,6 +457,8 @@ vdev_label_read_config(vdev_t *vd)
|
||||
|
||||
retry:
|
||||
for (l = 0; l < VDEV_LABELS; l++) {
|
||||
if (label >= 0 && label < VDEV_LABELS && label != l)
|
||||
continue;
|
||||
|
||||
zio = zio_root(spa, NULL, NULL, flags);
|
||||
|
||||
@@ -497,7 +508,7 @@ vdev_inuse(vdev_t *vd, uint64_t crtxg, vdev_labeltype_t reason,
|
||||
/*
|
||||
* Read the label, if any, and perform some basic sanity checks.
|
||||
*/
|
||||
if ((label = vdev_label_read_config(vd)) == NULL)
|
||||
if ((label = vdev_label_read_config(vd, VDEV_BEST_LABEL)) == NULL)
|
||||
return (B_FALSE);
|
||||
|
||||
(void) nvlist_lookup_uint64(label, ZPOOL_CONFIG_CREATE_TXG,
|
||||
@@ -838,7 +849,7 @@ retry:
|
||||
* come back up, we fail to see the uberblock for txg + 1 because, say,
|
||||
* it was on a mirrored device and the replica to which we wrote txg + 1
|
||||
* is now offline. If we then make some changes and sync txg + 1, and then
|
||||
* the missing replica comes back, then for a new seconds we'll have two
|
||||
* the missing replica comes back, then for a few seconds we'll have two
|
||||
* conflicting uberblocks on disk with the same txg. The solution is simple:
|
||||
* among uberblocks with equal txg, choose the one with the latest timestamp.
|
||||
*/
|
||||
@@ -858,47 +869,52 @@ vdev_uberblock_compare(uberblock_t *ub1, uberblock_t *ub2)
|
||||
return (0);
|
||||
}
|
||||
|
||||
struct ubl_cbdata {
|
||||
uberblock_t *ubl_ubbest; /* Best uberblock */
|
||||
vdev_t *ubl_vd; /* vdev associated with the above */
|
||||
int ubl_label; /* Label associated with the above */
|
||||
};
|
||||
|
||||
static void
|
||||
vdev_uberblock_load_done(zio_t *zio)
|
||||
{
|
||||
vdev_t *vd = zio->io_vd;
|
||||
spa_t *spa = zio->io_spa;
|
||||
zio_t *rio = zio->io_private;
|
||||
uberblock_t *ub = zio->io_data;
|
||||
uberblock_t *ubbest = rio->io_private;
|
||||
struct ubl_cbdata *cbp = rio->io_private;
|
||||
|
||||
ASSERT3U(zio->io_size, ==, VDEV_UBERBLOCK_SIZE(zio->io_vd));
|
||||
ASSERT3U(zio->io_size, ==, VDEV_UBERBLOCK_SIZE(vd));
|
||||
|
||||
if (zio->io_error == 0 && uberblock_verify(ub) == 0) {
|
||||
mutex_enter(&rio->io_lock);
|
||||
if (ub->ub_txg <= spa->spa_load_max_txg &&
|
||||
vdev_uberblock_compare(ub, ubbest) > 0)
|
||||
*ubbest = *ub;
|
||||
vdev_uberblock_compare(ub, cbp->ubl_ubbest) > 0) {
|
||||
/*
|
||||
* Keep track of the vdev and label in which this
|
||||
* uberblock was found. We will use this information
|
||||
* later to obtain the config nvlist associated with
|
||||
* this uberblock.
|
||||
*/
|
||||
*cbp->ubl_ubbest = *ub;
|
||||
cbp->ubl_vd = vd;
|
||||
cbp->ubl_label = vdev_label_number(vd->vdev_psize,
|
||||
zio->io_offset);
|
||||
}
|
||||
mutex_exit(&rio->io_lock);
|
||||
}
|
||||
|
||||
zio_buf_free(zio->io_data, zio->io_size);
|
||||
}
|
||||
|
||||
void
|
||||
vdev_uberblock_load(zio_t *zio, vdev_t *vd, uberblock_t *ubbest)
|
||||
static void
|
||||
vdev_uberblock_load_impl(zio_t *zio, vdev_t *vd, int flags,
|
||||
struct ubl_cbdata *cbp)
|
||||
{
|
||||
spa_t *spa = vd->vdev_spa;
|
||||
vdev_t *rvd = spa->spa_root_vdev;
|
||||
int flags = ZIO_FLAG_CONFIG_WRITER | ZIO_FLAG_CANFAIL |
|
||||
ZIO_FLAG_SPECULATIVE | ZIO_FLAG_TRYHARD;
|
||||
int c, l, n;
|
||||
|
||||
if (vd == rvd) {
|
||||
ASSERT(zio == NULL);
|
||||
spa_config_enter(spa, SCL_ALL, FTAG, RW_WRITER);
|
||||
zio = zio_root(spa, NULL, ubbest, flags);
|
||||
bzero(ubbest, sizeof (uberblock_t));
|
||||
}
|
||||
|
||||
ASSERT(zio != NULL);
|
||||
|
||||
for (c = 0; c < vd->vdev_children; c++)
|
||||
vdev_uberblock_load(zio, vd->vdev_child[c], ubbest);
|
||||
vdev_uberblock_load_impl(zio, vd->vdev_child[c], flags, cbp);
|
||||
|
||||
if (vd->vdev_ops->vdev_op_leaf && vdev_readable(vd)) {
|
||||
for (l = 0; l < VDEV_LABELS; l++) {
|
||||
@@ -911,11 +927,45 @@ vdev_uberblock_load(zio_t *zio, vdev_t *vd, uberblock_t *ubbest)
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (vd == rvd) {
|
||||
(void) zio_wait(zio);
|
||||
spa_config_exit(spa, SCL_ALL, FTAG);
|
||||
/*
|
||||
* Reads the 'best' uberblock from disk along with its associated
|
||||
* configuration. First, we read the uberblock array of each label of each
|
||||
* vdev, keeping track of the uberblock with the highest txg in each array.
|
||||
* Then, we read the configuration from the same label as the best uberblock.
|
||||
*/
|
||||
void
|
||||
vdev_uberblock_load(vdev_t *rvd, uberblock_t *ub, nvlist_t **config)
|
||||
{
|
||||
int i;
|
||||
zio_t *zio;
|
||||
spa_t *spa = rvd->vdev_spa;
|
||||
struct ubl_cbdata cb;
|
||||
int flags = ZIO_FLAG_CONFIG_WRITER | ZIO_FLAG_CANFAIL |
|
||||
ZIO_FLAG_SPECULATIVE | ZIO_FLAG_TRYHARD;
|
||||
|
||||
ASSERT(ub);
|
||||
ASSERT(config);
|
||||
|
||||
bzero(ub, sizeof (uberblock_t));
|
||||
*config = NULL;
|
||||
|
||||
cb.ubl_ubbest = ub;
|
||||
cb.ubl_vd = NULL;
|
||||
|
||||
spa_config_enter(spa, SCL_ALL, FTAG, RW_WRITER);
|
||||
zio = zio_root(spa, NULL, &cb, flags);
|
||||
vdev_uberblock_load_impl(zio, rvd, flags, &cb);
|
||||
(void) zio_wait(zio);
|
||||
if (cb.ubl_vd != NULL) {
|
||||
for (i = cb.ubl_label % 2; i < VDEV_LABELS; i += 2) {
|
||||
*config = vdev_label_read_config(cb.ubl_vd, i);
|
||||
if (*config != NULL)
|
||||
break;
|
||||
}
|
||||
}
|
||||
spa_config_exit(spa, SCL_ALL, FTAG);
|
||||
}
|
||||
|
||||
/*
|
||||
|
||||
@@ -20,6 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
/*
|
||||
@@ -946,6 +947,19 @@ fzap_prefetch(zap_name_t *zn)
|
||||
* Helper functions for consumers.
|
||||
*/
|
||||
|
||||
uint64_t
|
||||
zap_create_link(objset_t *os, dmu_object_type_t ot, uint64_t parent_obj,
|
||||
const char *name, dmu_tx_t *tx)
|
||||
{
|
||||
uint64_t new_obj;
|
||||
|
||||
VERIFY((new_obj = zap_create(os, ot, DMU_OT_NONE, 0, tx)) > 0);
|
||||
VERIFY(zap_add(os, parent_obj, name, sizeof (uint64_t), 1, &new_obj,
|
||||
tx) == 0);
|
||||
|
||||
return (new_obj);
|
||||
}
|
||||
|
||||
int
|
||||
zap_value_search(objset_t *os, uint64_t zapobj, uint64_t value, uint64_t mask,
|
||||
char *name)
|
||||
|
||||
@@ -20,7 +20,7 @@
|
||||
*/
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2011 by Delphix. All rights reserved.
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/zio.h>
|
||||
@@ -461,7 +461,7 @@ zap_lockdir(objset_t *os, uint64_t obj, dmu_tx_t *tx,
|
||||
{
|
||||
dmu_object_info_t doi;
|
||||
dmu_object_info_from_db(db, &doi);
|
||||
ASSERT(dmu_ot[doi.doi_type].ot_byteswap == zap_byteswap);
|
||||
ASSERT3U(DMU_OT_BYTESWAP(doi.doi_type), ==, DMU_BSWAP_ZAP);
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -585,7 +585,7 @@ mzap_create_impl(objset_t *os, uint64_t obj, int normflags, zap_flags_t flags,
|
||||
{
|
||||
dmu_object_info_t doi;
|
||||
dmu_object_info_from_db(db, &doi);
|
||||
ASSERT(dmu_ot[doi.doi_type].ot_byteswap == zap_byteswap);
|
||||
ASSERT3U(DMU_OT_BYTESWAP(doi.doi_type), ==, DMU_BSWAP_ZAP);
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
@@ -0,0 +1,422 @@
|
||||
/*
|
||||
* CDDL HEADER START
|
||||
*
|
||||
* The contents of this file are subject to the terms of the
|
||||
* Common Development and Distribution License (the "License").
|
||||
* You may not use this file except in compliance with the License.
|
||||
*
|
||||
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
||||
* or http://www.opensolaris.org/os/licensing.
|
||||
* See the License for the specific language governing permissions
|
||||
* and limitations under the License.
|
||||
*
|
||||
* When distributing Covered Code, include this CDDL HEADER in each
|
||||
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
||||
* If applicable, add the following below this CDDL HEADER, with the
|
||||
* fields enclosed by brackets "[]" replaced with your own identifying
|
||||
* information: Portions Copyright [yyyy] [name of copyright owner]
|
||||
*
|
||||
* CDDL HEADER END
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <sys/zfs_context.h>
|
||||
#include <sys/zfeature.h>
|
||||
#include <sys/dmu.h>
|
||||
#include <sys/nvpair.h>
|
||||
#include <sys/zap.h>
|
||||
#include <sys/dmu_tx.h>
|
||||
#include "zfeature_common.h"
|
||||
#include <sys/spa_impl.h>
|
||||
|
||||
/*
|
||||
* ZFS Feature Flags
|
||||
* -----------------
|
||||
*
|
||||
* ZFS feature flags are used to provide fine-grained versioning to the ZFS
|
||||
* on-disk format. Once enabled on a pool feature flags replace the old
|
||||
* spa_version() number.
|
||||
*
|
||||
* Each new on-disk format change will be given a uniquely identifying string
|
||||
* guid rather than a version number. This avoids the problem of different
|
||||
* organizations creating new on-disk formats with the same version number. To
|
||||
* keep feature guids unique they should consist of the reverse dns name of the
|
||||
* organization which implemented the feature and a short name for the feature,
|
||||
* separated by a colon (e.g. com.delphix:async_destroy).
|
||||
*
|
||||
* Reference Counts
|
||||
* ----------------
|
||||
*
|
||||
* Within each pool features can be in one of three states: disabled, enabled,
|
||||
* or active. These states are differentiated by a reference count stored on
|
||||
* disk for each feature:
|
||||
*
|
||||
* 1) If there is no reference count stored on disk the feature is disabled.
|
||||
* 2) If the reference count is 0 a system administrator has enabled the
|
||||
* feature, but the feature has not been used yet, so no on-disk
|
||||
* format changes have been made.
|
||||
* 3) If the reference count is greater than 0 the feature is active.
|
||||
* The format changes required by the feature are currently on disk.
|
||||
* Note that if the feature's format changes are reversed the feature
|
||||
* may choose to set its reference count back to 0.
|
||||
*
|
||||
* Feature flags makes no differentiation between non-zero reference counts
|
||||
* for an active feature (e.g. a reference count of 1 means the same thing as a
|
||||
* reference count of 27834721), but feature implementations may choose to use
|
||||
* the reference count to store meaningful information. For example, a new RAID
|
||||
* implementation might set the reference count to the number of vdevs using
|
||||
* it. If all those disks are removed from the pool the feature goes back to
|
||||
* having a reference count of 0.
|
||||
*
|
||||
* It is the responsibility of the individual features to maintain a non-zero
|
||||
* reference count as long as the feature's format changes are present on disk.
|
||||
*
|
||||
* Dependencies
|
||||
* ------------
|
||||
*
|
||||
* Each feature may depend on other features. The only effect of this
|
||||
* relationship is that when a feature is enabled all of its dependencies are
|
||||
* automatically enabled as well. Any future work to support disabling of
|
||||
* features would need to ensure that features cannot be disabled if other
|
||||
* enabled features depend on them.
|
||||
*
|
||||
* On-disk Format
|
||||
* --------------
|
||||
*
|
||||
* When feature flags are enabled spa_version() is set to SPA_VERSION_FEATURES
|
||||
* (5000). In order for this to work the pool is automatically upgraded to
|
||||
* SPA_VERSION_BEFORE_FEATURES (28) first, so all pre-feature flags on disk
|
||||
* format changes will be in use.
|
||||
*
|
||||
* Information about features is stored in 3 ZAP objects in the pool's MOS.
|
||||
* These objects are linked to by the following names in the pool directory
|
||||
* object:
|
||||
*
|
||||
* 1) features_for_read: feature guid -> reference count
|
||||
* Features needed to open the pool for reading.
|
||||
* 2) features_for_write: feature guid -> reference count
|
||||
* Features needed to open the pool for writing.
|
||||
* 3) feature_descriptions: feature guid -> descriptive string
|
||||
* A human readable string.
|
||||
*
|
||||
* All enabled features appear in either features_for_read or
|
||||
* features_for_write, but not both.
|
||||
*
|
||||
* To open a pool in read-only mode only the features listed in
|
||||
* features_for_read need to be supported.
|
||||
*
|
||||
* To open the pool in read-write mode features in both features_for_read and
|
||||
* features_for_write need to be supported.
|
||||
*
|
||||
* Some features may be required to read the ZAP objects containing feature
|
||||
* information. To allow software to check for compatibility with these features
|
||||
* before the pool is opened their names must be stored in the label in a
|
||||
* new "features_for_read" entry (note that features that are only required
|
||||
* to write to a pool never need to be stored in the label since the
|
||||
* features_for_write ZAP object can be read before the pool is written to).
|
||||
* To save space in the label features must be explicitly marked as needing to
|
||||
* be written to the label. Also, reference counts are not stored in the label,
|
||||
* instead any feature whose reference count drops to 0 is removed from the
|
||||
* label.
|
||||
*
|
||||
* Adding New Features
|
||||
* -------------------
|
||||
*
|
||||
* Features must be registered in zpool_feature_init() function in
|
||||
* zfeature_common.c using the zfeature_register() function. This function
|
||||
* has arguments to specify if the feature should be stored in the
|
||||
* features_for_read or features_for_write ZAP object and if it needs to be
|
||||
* written to the label when active.
|
||||
*
|
||||
* Once a feature is registered it will appear as a "feature@<feature name>"
|
||||
* property which can be set by an administrator. Feature implementors should
|
||||
* use the spa_feature_is_enabled() and spa_feature_is_active() functions to
|
||||
* query the state of a feature and the spa_feature_incr() and
|
||||
* spa_feature_decr() functions to change an enabled feature's reference count.
|
||||
* Reference counts may only be updated in the syncing context.
|
||||
*
|
||||
* Features may not perform enable-time initialization. Instead, any such
|
||||
* initialization should occur when the feature is first used. This design
|
||||
* enforces that on-disk changes be made only when features are used. Code
|
||||
* should only check if a feature is enabled using spa_feature_is_enabled(),
|
||||
* not by relying on any feature specific metadata existing. If a feature is
|
||||
* enabled, but the feature's metadata is not on disk yet then it should be
|
||||
* created as needed.
|
||||
*
|
||||
* As an example, consider the com.delphix:async_destroy feature. This feature
|
||||
* relies on the existence of a bptree in the MOS that store blocks for
|
||||
* asynchronous freeing. This bptree is not created when async_destroy is
|
||||
* enabled. Instead, when a dataset is destroyed spa_feature_is_enabled() is
|
||||
* called to check if async_destroy is enabled. If it is and the bptree object
|
||||
* does not exist yet, the bptree object is created as part of the dataset
|
||||
* destroy and async_destroy's reference count is incremented to indicate it
|
||||
* has made an on-disk format change. Later, after the destroyed dataset's
|
||||
* blocks have all been asynchronously freed there is no longer any use for the
|
||||
* bptree object, so it is destroyed and async_destroy's reference count is
|
||||
* decremented back to 0 to indicate that it has undone its on-disk format
|
||||
* changes.
|
||||
*/
|
||||
|
||||
typedef enum {
|
||||
FEATURE_ACTION_ENABLE,
|
||||
FEATURE_ACTION_INCR,
|
||||
FEATURE_ACTION_DECR,
|
||||
} feature_action_t;
|
||||
|
||||
/*
|
||||
* Checks that the features active in the specified object are supported by
|
||||
* this software. Adds each unsupported feature (name -> description) to
|
||||
* the supplied nvlist.
|
||||
*/
|
||||
boolean_t
|
||||
feature_is_supported(objset_t *os, uint64_t obj, uint64_t desc_obj,
|
||||
nvlist_t *unsup_feat)
|
||||
{
|
||||
boolean_t supported;
|
||||
zap_cursor_t *zc;
|
||||
zap_attribute_t *za;
|
||||
char *buf;
|
||||
|
||||
zc = kmem_alloc(sizeof(zap_cursor_t), KM_SLEEP);
|
||||
za = kmem_alloc(sizeof(zap_attribute_t), KM_SLEEP);
|
||||
buf = kmem_alloc(MAXPATHLEN, KM_SLEEP);
|
||||
|
||||
supported = B_TRUE;
|
||||
for (zap_cursor_init(zc, os, obj);
|
||||
zap_cursor_retrieve(zc, za) == 0;
|
||||
zap_cursor_advance(zc)) {
|
||||
ASSERT(za->za_integer_length == sizeof (uint64_t) &&
|
||||
za->za_num_integers == 1);
|
||||
|
||||
if (za->za_first_integer != 0 &&
|
||||
!zfeature_is_supported(za->za_name)) {
|
||||
supported = B_FALSE;
|
||||
|
||||
if (unsup_feat != NULL) {
|
||||
char *desc = "";
|
||||
|
||||
if (zap_lookup(os, desc_obj, za->za_name,
|
||||
1, sizeof (buf), buf) == 0)
|
||||
desc = buf;
|
||||
|
||||
VERIFY(nvlist_add_string(unsup_feat,
|
||||
za->za_name, desc) == 0);
|
||||
}
|
||||
}
|
||||
}
|
||||
zap_cursor_fini(zc);
|
||||
|
||||
kmem_free(buf, MAXPATHLEN);
|
||||
kmem_free(za, sizeof(zap_attribute_t));
|
||||
kmem_free(zc, sizeof(zap_cursor_t));
|
||||
|
||||
return (supported);
|
||||
}
|
||||
|
||||
static int
|
||||
feature_get_refcount(objset_t *os, uint64_t read_obj, uint64_t write_obj,
|
||||
zfeature_info_t *feature, uint64_t *res)
|
||||
{
|
||||
int err;
|
||||
uint64_t refcount;
|
||||
uint64_t zapobj = feature->fi_can_readonly ? write_obj : read_obj;
|
||||
|
||||
ASSERT(0 != zapobj);
|
||||
|
||||
err = zap_lookup(os, zapobj, feature->fi_guid, sizeof (uint64_t), 1,
|
||||
&refcount);
|
||||
if (err != 0) {
|
||||
if (err == ENOENT)
|
||||
return (ENOTSUP);
|
||||
else
|
||||
return (err);
|
||||
}
|
||||
*res = refcount;
|
||||
return (0);
|
||||
}
|
||||
|
||||
static int
|
||||
feature_do_action(objset_t *os, uint64_t read_obj, uint64_t write_obj,
|
||||
uint64_t desc_obj, zfeature_info_t *feature, feature_action_t action,
|
||||
dmu_tx_t *tx)
|
||||
{
|
||||
int error;
|
||||
uint64_t refcount;
|
||||
uint64_t zapobj = feature->fi_can_readonly ? write_obj : read_obj;
|
||||
|
||||
ASSERT(0 != zapobj);
|
||||
ASSERT(zfeature_is_valid_guid(feature->fi_guid));
|
||||
|
||||
error = zap_lookup(os, zapobj, feature->fi_guid,
|
||||
sizeof (uint64_t), 1, &refcount);
|
||||
|
||||
/*
|
||||
* If we can't ascertain the status of the specified feature, an I/O
|
||||
* error occurred.
|
||||
*/
|
||||
if (error != 0 && error != ENOENT)
|
||||
return (error);
|
||||
|
||||
switch (action) {
|
||||
case FEATURE_ACTION_ENABLE:
|
||||
/*
|
||||
* If the feature is already enabled, ignore the request.
|
||||
*/
|
||||
if (error == 0)
|
||||
return (0);
|
||||
refcount = 0;
|
||||
break;
|
||||
case FEATURE_ACTION_INCR:
|
||||
if (error == ENOENT)
|
||||
return (ENOTSUP);
|
||||
if (refcount == UINT64_MAX)
|
||||
return (EOVERFLOW);
|
||||
refcount++;
|
||||
break;
|
||||
case FEATURE_ACTION_DECR:
|
||||
if (error == ENOENT)
|
||||
return (ENOTSUP);
|
||||
if (refcount == 0)
|
||||
return (EOVERFLOW);
|
||||
refcount--;
|
||||
break;
|
||||
default:
|
||||
ASSERT(0);
|
||||
break;
|
||||
}
|
||||
|
||||
if (action == FEATURE_ACTION_ENABLE) {
|
||||
int i;
|
||||
|
||||
for (i = 0; feature->fi_depends[i] != NULL; i++) {
|
||||
zfeature_info_t *dep = feature->fi_depends[i];
|
||||
|
||||
error = feature_do_action(os, read_obj, write_obj,
|
||||
desc_obj, dep, FEATURE_ACTION_ENABLE, tx);
|
||||
if (error != 0)
|
||||
return (error);
|
||||
}
|
||||
}
|
||||
|
||||
error = zap_update(os, zapobj, feature->fi_guid,
|
||||
sizeof (uint64_t), 1, &refcount, tx);
|
||||
if (error != 0)
|
||||
return (error);
|
||||
|
||||
if (action == FEATURE_ACTION_ENABLE) {
|
||||
error = zap_update(os, desc_obj,
|
||||
feature->fi_guid, 1, strlen(feature->fi_desc) + 1,
|
||||
feature->fi_desc, tx);
|
||||
if (error != 0)
|
||||
return (error);
|
||||
}
|
||||
|
||||
if (action == FEATURE_ACTION_INCR && refcount == 1 && feature->fi_mos) {
|
||||
spa_activate_mos_feature(dmu_objset_spa(os), feature->fi_guid);
|
||||
}
|
||||
|
||||
if (action == FEATURE_ACTION_DECR && refcount == 0) {
|
||||
spa_deactivate_mos_feature(dmu_objset_spa(os),
|
||||
feature->fi_guid);
|
||||
}
|
||||
|
||||
return (0);
|
||||
}
|
||||
|
||||
void
|
||||
spa_feature_create_zap_objects(spa_t *spa, dmu_tx_t *tx)
|
||||
{
|
||||
/*
|
||||
* We create feature flags ZAP objects in two instances: during pool
|
||||
* creation and during pool upgrade.
|
||||
*/
|
||||
ASSERT(dsl_pool_sync_context(spa_get_dsl(spa)) || (!spa->spa_sync_on &&
|
||||
tx->tx_txg == TXG_INITIAL));
|
||||
|
||||
spa->spa_feat_for_read_obj = zap_create_link(spa->spa_meta_objset,
|
||||
DMU_OTN_ZAP_METADATA, DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_FEATURES_FOR_READ, tx);
|
||||
spa->spa_feat_for_write_obj = zap_create_link(spa->spa_meta_objset,
|
||||
DMU_OTN_ZAP_METADATA, DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_FEATURES_FOR_WRITE, tx);
|
||||
spa->spa_feat_desc_obj = zap_create_link(spa->spa_meta_objset,
|
||||
DMU_OTN_ZAP_METADATA, DMU_POOL_DIRECTORY_OBJECT,
|
||||
DMU_POOL_FEATURE_DESCRIPTIONS, tx);
|
||||
}
|
||||
|
||||
/*
|
||||
* Enable any required dependencies, then enable the requested feature.
|
||||
*/
|
||||
void
|
||||
spa_feature_enable(spa_t *spa, zfeature_info_t *feature, dmu_tx_t *tx)
|
||||
{
|
||||
ASSERT3U(spa_version(spa), >=, SPA_VERSION_FEATURES);
|
||||
VERIFY3U(0, ==, feature_do_action(spa->spa_meta_objset,
|
||||
spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
|
||||
spa->spa_feat_desc_obj, feature, FEATURE_ACTION_ENABLE, tx));
|
||||
}
|
||||
|
||||
/*
|
||||
* If the specified feature has not yet been enabled, this function returns
|
||||
* ENOTSUP; otherwise, this function increments the feature's refcount (or
|
||||
* returns EOVERFLOW if the refcount cannot be incremented). This function must
|
||||
* be called from syncing context.
|
||||
*/
|
||||
void
|
||||
spa_feature_incr(spa_t *spa, zfeature_info_t *feature, dmu_tx_t *tx)
|
||||
{
|
||||
ASSERT3U(spa_version(spa), >=, SPA_VERSION_FEATURES);
|
||||
VERIFY3U(0, ==, feature_do_action(spa->spa_meta_objset,
|
||||
spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
|
||||
spa->spa_feat_desc_obj, feature, FEATURE_ACTION_INCR, tx));
|
||||
}
|
||||
|
||||
/*
|
||||
* If the specified feature has not yet been enabled, this function returns
|
||||
* ENOTSUP; otherwise, this function decrements the feature's refcount (or
|
||||
* returns EOVERFLOW if the refcount is already 0). This function must
|
||||
* be called from syncing context.
|
||||
*/
|
||||
void
|
||||
spa_feature_decr(spa_t *spa, zfeature_info_t *feature, dmu_tx_t *tx)
|
||||
{
|
||||
ASSERT3U(spa_version(spa), >=, SPA_VERSION_FEATURES);
|
||||
VERIFY3U(0, ==, feature_do_action(spa->spa_meta_objset,
|
||||
spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
|
||||
spa->spa_feat_desc_obj, feature, FEATURE_ACTION_DECR, tx));
|
||||
}
|
||||
|
||||
boolean_t
|
||||
spa_feature_is_enabled(spa_t *spa, zfeature_info_t *feature)
|
||||
{
|
||||
int err;
|
||||
uint64_t refcount = 0;
|
||||
|
||||
if (spa_version(spa) < SPA_VERSION_FEATURES)
|
||||
return (B_FALSE);
|
||||
|
||||
err = feature_get_refcount(spa->spa_meta_objset,
|
||||
spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
|
||||
feature, &refcount);
|
||||
ASSERT(err == 0 || err == ENOTSUP);
|
||||
return (err == 0);
|
||||
}
|
||||
|
||||
boolean_t
|
||||
spa_feature_is_active(spa_t *spa, zfeature_info_t *feature)
|
||||
{
|
||||
int err;
|
||||
uint64_t refcount = 0;
|
||||
|
||||
if (spa_version(spa) < SPA_VERSION_FEATURES)
|
||||
return (B_FALSE);
|
||||
|
||||
err = feature_get_refcount(spa->spa_meta_objset,
|
||||
spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
|
||||
feature, &refcount);
|
||||
ASSERT(err == 0 || err == ENOTSUP);
|
||||
return (err == 0 && refcount > 0);
|
||||
}
|
||||
@@ -0,0 +1,160 @@
|
||||
/*
|
||||
* CDDL HEADER START
|
||||
*
|
||||
* The contents of this file are subject to the terms of the
|
||||
* Common Development and Distribution License (the "License").
|
||||
* You may not use this file except in compliance with the License.
|
||||
*
|
||||
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
||||
* or http://www.opensolaris.org/os/licensing.
|
||||
* See the License for the specific language governing permissions
|
||||
* and limitations under the License.
|
||||
*
|
||||
* When distributing Covered Code, include this CDDL HEADER in each
|
||||
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
||||
* If applicable, add the following below this CDDL HEADER, with the
|
||||
* fields enclosed by brackets "[]" replaced with your own identifying
|
||||
* information: Portions Copyright [yyyy] [name of copyright owner]
|
||||
*
|
||||
* CDDL HEADER END
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 2012 by Delphix. All rights reserved.
|
||||
*/
|
||||
|
||||
#ifdef _KERNEL
|
||||
#include <sys/systm.h>
|
||||
#else
|
||||
#include <errno.h>
|
||||
#include <string.h>
|
||||
#endif
|
||||
#include <sys/debug.h>
|
||||
#include <sys/fs/zfs.h>
|
||||
#include <sys/inttypes.h>
|
||||
#include <sys/types.h>
|
||||
#include "zfeature_common.h"
|
||||
|
||||
/*
|
||||
* Set to disable all feature checks while opening pools, allowing pools with
|
||||
* unsupported features to be opened. Set for testing only.
|
||||
*/
|
||||
boolean_t zfeature_checks_disable = B_FALSE;
|
||||
|
||||
zfeature_info_t spa_feature_table[SPA_FEATURES];
|
||||
|
||||
/*
|
||||
* Valid characters for feature guids. This list is mainly for aesthetic
|
||||
* purposes and could be expanded in the future. There are different allowed
|
||||
* characters in the guids reverse dns portion (before the colon) and its
|
||||
* short name (after the colon).
|
||||
*/
|
||||
static int
|
||||
valid_char(char c, boolean_t after_colon)
|
||||
{
|
||||
return ((c >= 'a' && c <= 'z') ||
|
||||
(c >= '0' && c <= '9') ||
|
||||
c == (after_colon ? '_' : '.'));
|
||||
}
|
||||
|
||||
/*
|
||||
* Every feature guid must contain exactly one colon which separates a reverse
|
||||
* dns organization name from the feature's "short" name (e.g.
|
||||
* "com.company:feature_name").
|
||||
*/
|
||||
boolean_t
|
||||
zfeature_is_valid_guid(const char *name)
|
||||
{
|
||||
int i;
|
||||
boolean_t has_colon = B_FALSE;
|
||||
|
||||
i = 0;
|
||||
while (name[i] != '\0') {
|
||||
char c = name[i++];
|
||||
if (c == ':') {
|
||||
if (has_colon)
|
||||
return (B_FALSE);
|
||||
has_colon = B_TRUE;
|
||||
continue;
|
||||
}
|
||||
if (!valid_char(c, has_colon))
|
||||
return (B_FALSE);
|
||||
}
|
||||
|
||||
return (has_colon);
|
||||
}
|
||||
|
||||
boolean_t
|
||||
zfeature_is_supported(const char *guid)
|
||||
{
|
||||
if (zfeature_checks_disable)
|
||||
return (B_TRUE);
|
||||
|
||||
return (0 == zfeature_lookup_guid(guid, NULL));
|
||||
}
|
||||
|
||||
int
|
||||
zfeature_lookup_guid(const char *guid, zfeature_info_t **res)
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i = 0; i < SPA_FEATURES; i++) {
|
||||
zfeature_info_t *feature = &spa_feature_table[i];
|
||||
if (strcmp(guid, feature->fi_guid) == 0) {
|
||||
if (res != NULL)
|
||||
*res = feature;
|
||||
return (0);
|
||||
}
|
||||
}
|
||||
|
||||
return (ENOENT);
|
||||
}
|
||||
|
||||
int
|
||||
zfeature_lookup_name(const char *name, zfeature_info_t **res)
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i = 0; i < SPA_FEATURES; i++) {
|
||||
zfeature_info_t *feature = &spa_feature_table[i];
|
||||
if (strcmp(name, feature->fi_uname) == 0) {
|
||||
if (res != NULL)
|
||||
*res = feature;
|
||||
return (0);
|
||||
}
|
||||
}
|
||||
|
||||
return (ENOENT);
|
||||
}
|
||||
|
||||
static void
|
||||
zfeature_register(int fid, const char *guid, const char *name, const char *desc,
|
||||
boolean_t readonly, boolean_t mos, zfeature_info_t **deps)
|
||||
{
|
||||
zfeature_info_t *feature = &spa_feature_table[fid];
|
||||
static zfeature_info_t *nodeps[] = { NULL };
|
||||
|
||||
ASSERT(name != NULL);
|
||||
ASSERT(desc != NULL);
|
||||
ASSERT(!readonly || !mos);
|
||||
ASSERT3U(fid, <, SPA_FEATURES);
|
||||
ASSERT(zfeature_is_valid_guid(guid));
|
||||
|
||||
if (deps == NULL)
|
||||
deps = nodeps;
|
||||
|
||||
feature->fi_guid = guid;
|
||||
feature->fi_uname = name;
|
||||
feature->fi_desc = desc;
|
||||
feature->fi_can_readonly = readonly;
|
||||
feature->fi_mos = mos;
|
||||
feature->fi_depends = deps;
|
||||
}
|
||||
|
||||
void
|
||||
zpool_feature_init(void)
|
||||
{
|
||||
zfeature_register(SPA_FEATURE_ASYNC_DESTROY,
|
||||
"com.delphix:async_destroy", "async_destroy",
|
||||
"Destroy filesystems asynchronously.", B_TRUE, B_FALSE, NULL);
|
||||
}
|
||||
+15
-2
@@ -18,6 +18,7 @@
|
||||
*
|
||||
* CDDL HEADER END
|
||||
*/
|
||||
|
||||
/*
|
||||
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
||||
* Portions Copyright 2011 Martin Matuska
|
||||
@@ -1107,6 +1108,8 @@ get_zfs_sb(const char *dsname, zfs_sb_t **zsbp)
|
||||
/*
|
||||
* Find a zfs_sb_t for a mounted filesystem, or create our own, in which
|
||||
* case its z_sb will be NULL, and it will be opened as the owner.
|
||||
* If 'writer' is set, the z_teardown_lock will be held for RW_WRITER,
|
||||
* which prevents all inode ops from running.
|
||||
*/
|
||||
static int
|
||||
zfs_sb_hold(const char *name, void *tag, zfs_sb_t **zsbp, boolean_t writer)
|
||||
@@ -1170,7 +1173,7 @@ zfs_ioc_pool_create(zfs_cmd_t *zc)
|
||||
|
||||
(void) nvlist_lookup_uint64(props,
|
||||
zpool_prop_to_name(ZPOOL_PROP_VERSION), &version);
|
||||
if (version < SPA_VERSION_INITIAL || version > SPA_VERSION) {
|
||||
if (!SPA_VERSION_IS_SUPPORTED(version)) {
|
||||
error = EINVAL;
|
||||
goto pool_props_bad;
|
||||
}
|
||||
@@ -1297,6 +1300,15 @@ zfs_ioc_pool_configs(zfs_cmd_t *zc)
|
||||
return (error);
|
||||
}
|
||||
|
||||
/*
|
||||
* inputs:
|
||||
* zc_name name of the pool
|
||||
*
|
||||
* outputs:
|
||||
* zc_cookie real errno
|
||||
* zc_nvlist_dst config nvlist
|
||||
* zc_nvlist_dst_size size of config nvlist
|
||||
*/
|
||||
static int
|
||||
zfs_ioc_pool_stats(zfs_cmd_t *zc)
|
||||
{
|
||||
@@ -1398,7 +1410,8 @@ zfs_ioc_pool_upgrade(zfs_cmd_t *zc)
|
||||
if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
|
||||
return (error);
|
||||
|
||||
if (zc->zc_cookie < spa_version(spa) || zc->zc_cookie > SPA_VERSION) {
|
||||
if (zc->zc_cookie < spa_version(spa) ||
|
||||
!SPA_VERSION_IS_SUPPORTED(zc->zc_cookie)) {
|
||||
spa_close(spa, FTAG);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
+44
-2
@@ -704,7 +704,7 @@ zio_write(zio_t *pio, spa_t *spa, uint64_t txg, blkptr_t *bp,
|
||||
zp->zp_checksum < ZIO_CHECKSUM_FUNCTIONS &&
|
||||
zp->zp_compress >= ZIO_COMPRESS_OFF &&
|
||||
zp->zp_compress < ZIO_COMPRESS_FUNCTIONS &&
|
||||
zp->zp_type < DMU_OT_NUMTYPES &&
|
||||
DMU_OT_IS_VALID(zp->zp_type) &&
|
||||
zp->zp_level < 32 &&
|
||||
zp->zp_copies > 0 &&
|
||||
zp->zp_copies <= spa_max_replication(spa) &&
|
||||
@@ -988,7 +988,7 @@ zio_read_bp_init(zio_t *zio)
|
||||
zio_push_transform(zio, cbuf, psize, psize, zio_decompress);
|
||||
}
|
||||
|
||||
if (!dmu_ot[BP_GET_TYPE(bp)].ot_metadata && BP_GET_LEVEL(bp) == 0)
|
||||
if (!DMU_OT_IS_METADATA(BP_GET_TYPE(bp)) && BP_GET_LEVEL(bp) == 0)
|
||||
zio->io_flags |= ZIO_FLAG_DONT_CACHE;
|
||||
|
||||
if (BP_GET_TYPE(bp) == DMU_OT_DDT_ZAP)
|
||||
@@ -3131,6 +3131,48 @@ static zio_pipe_stage_t *zio_pipeline[] = {
|
||||
zio_done
|
||||
};
|
||||
|
||||
/* dnp is the dnode for zb1->zb_object */
|
||||
boolean_t
|
||||
zbookmark_is_before(const dnode_phys_t *dnp, const zbookmark_t *zb1,
|
||||
const zbookmark_t *zb2)
|
||||
{
|
||||
uint64_t zb1nextL0, zb2thisobj;
|
||||
|
||||
ASSERT(zb1->zb_objset == zb2->zb_objset);
|
||||
ASSERT(zb2->zb_level == 0);
|
||||
|
||||
/*
|
||||
* A bookmark in the deadlist is considered to be after
|
||||
* everything else.
|
||||
*/
|
||||
if (zb2->zb_object == DMU_DEADLIST_OBJECT)
|
||||
return (B_TRUE);
|
||||
|
||||
/* The objset_phys_t isn't before anything. */
|
||||
if (dnp == NULL)
|
||||
return (B_FALSE);
|
||||
|
||||
zb1nextL0 = (zb1->zb_blkid + 1) <<
|
||||
((zb1->zb_level) * (dnp->dn_indblkshift - SPA_BLKPTRSHIFT));
|
||||
|
||||
zb2thisobj = zb2->zb_object ? zb2->zb_object :
|
||||
zb2->zb_blkid << (DNODE_BLOCK_SHIFT - DNODE_SHIFT);
|
||||
|
||||
if (zb1->zb_object == DMU_META_DNODE_OBJECT) {
|
||||
uint64_t nextobj = zb1nextL0 *
|
||||
(dnp->dn_datablkszsec << SPA_MINBLOCKSHIFT) >> DNODE_SHIFT;
|
||||
return (nextobj <= zb2thisobj);
|
||||
}
|
||||
|
||||
if (zb1->zb_object < zb2thisobj)
|
||||
return (B_TRUE);
|
||||
if (zb1->zb_object > zb2thisobj)
|
||||
return (B_FALSE);
|
||||
if (zb2->zb_object == DMU_META_DNODE_OBJECT)
|
||||
return (B_FALSE);
|
||||
return (zb1nextL0 <= zb2->zb_blkid);
|
||||
}
|
||||
|
||||
#if defined(_KERNEL) && defined(HAVE_SPL)
|
||||
/* Fault injection */
|
||||
EXPORT_SYMBOL(zio_injection_enabled);
|
||||
|
||||
Reference in New Issue
Block a user