mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2024-12-27 19:39:35 +03:00
b1d217338a
Currently, the DMU relies on ZIO layer compression to free LO dnode blocks that no longer have objects in them. However, raw receives disable all compression, meaning that these blocks can never be freed. In addition to the obvious space concerns, this could also cause incremental raw receives to fail to mount since the MAC of a hole is different from that of a completely zeroed block. This patch corrects this issue by adding a special case in zio_write_compress() which will attempt to compress these blocks to a hole even if ZIO_FLAG_RAW_ENCRYPT is set. This patch also removes the zfs_mdcomp_disable tunable, since tuning it could cause these same issues. Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Signed-off-by: Tom Caputi <tcaputi@datto.com> Closes #7198
9165 lines
275 KiB
C
9165 lines
275 KiB
C
/*
|
|
* CDDL HEADER START
|
|
*
|
|
* The contents of this file are subject to the terms of the
|
|
* Common Development and Distribution License (the "License").
|
|
* You may not use this file except in compliance with the License.
|
|
*
|
|
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
|
* or http://www.opensolaris.org/os/licensing.
|
|
* See the License for the specific language governing permissions
|
|
* and limitations under the License.
|
|
*
|
|
* When distributing Covered Code, include this CDDL HEADER in each
|
|
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
|
* If applicable, add the following below this CDDL HEADER, with the
|
|
* fields enclosed by brackets "[]" replaced with your own identifying
|
|
* information: Portions Copyright [yyyy] [name of copyright owner]
|
|
*
|
|
* CDDL HEADER END
|
|
*/
|
|
/*
|
|
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
|
* Copyright (c) 2012, Joyent, Inc. All rights reserved.
|
|
* Copyright (c) 2011, 2017 by Delphix. All rights reserved.
|
|
* Copyright (c) 2014 by Saso Kiselkov. All rights reserved.
|
|
* Copyright 2015 Nexenta Systems, Inc. All rights reserved.
|
|
*/
|
|
|
|
/*
|
|
* DVA-based Adjustable Replacement Cache
|
|
*
|
|
* While much of the theory of operation used here is
|
|
* based on the self-tuning, low overhead replacement cache
|
|
* presented by Megiddo and Modha at FAST 2003, there are some
|
|
* significant differences:
|
|
*
|
|
* 1. The Megiddo and Modha model assumes any page is evictable.
|
|
* Pages in its cache cannot be "locked" into memory. This makes
|
|
* the eviction algorithm simple: evict the last page in the list.
|
|
* This also make the performance characteristics easy to reason
|
|
* about. Our cache is not so simple. At any given moment, some
|
|
* subset of the blocks in the cache are un-evictable because we
|
|
* have handed out a reference to them. Blocks are only evictable
|
|
* when there are no external references active. This makes
|
|
* eviction far more problematic: we choose to evict the evictable
|
|
* blocks that are the "lowest" in the list.
|
|
*
|
|
* There are times when it is not possible to evict the requested
|
|
* space. In these circumstances we are unable to adjust the cache
|
|
* size. To prevent the cache growing unbounded at these times we
|
|
* implement a "cache throttle" that slows the flow of new data
|
|
* into the cache until we can make space available.
|
|
*
|
|
* 2. The Megiddo and Modha model assumes a fixed cache size.
|
|
* Pages are evicted when the cache is full and there is a cache
|
|
* miss. Our model has a variable sized cache. It grows with
|
|
* high use, but also tries to react to memory pressure from the
|
|
* operating system: decreasing its size when system memory is
|
|
* tight.
|
|
*
|
|
* 3. The Megiddo and Modha model assumes a fixed page size. All
|
|
* elements of the cache are therefore exactly the same size. So
|
|
* when adjusting the cache size following a cache miss, its simply
|
|
* a matter of choosing a single page to evict. In our model, we
|
|
* have variable sized cache blocks (rangeing from 512 bytes to
|
|
* 128K bytes). We therefore choose a set of blocks to evict to make
|
|
* space for a cache miss that approximates as closely as possible
|
|
* the space used by the new block.
|
|
*
|
|
* See also: "ARC: A Self-Tuning, Low Overhead Replacement Cache"
|
|
* by N. Megiddo & D. Modha, FAST 2003
|
|
*/
|
|
|
|
/*
|
|
* The locking model:
|
|
*
|
|
* A new reference to a cache buffer can be obtained in two
|
|
* ways: 1) via a hash table lookup using the DVA as a key,
|
|
* or 2) via one of the ARC lists. The arc_read() interface
|
|
* uses method 1, while the internal ARC algorithms for
|
|
* adjusting the cache use method 2. We therefore provide two
|
|
* types of locks: 1) the hash table lock array, and 2) the
|
|
* ARC list locks.
|
|
*
|
|
* Buffers do not have their own mutexes, rather they rely on the
|
|
* hash table mutexes for the bulk of their protection (i.e. most
|
|
* fields in the arc_buf_hdr_t are protected by these mutexes).
|
|
*
|
|
* buf_hash_find() returns the appropriate mutex (held) when it
|
|
* locates the requested buffer in the hash table. It returns
|
|
* NULL for the mutex if the buffer was not in the table.
|
|
*
|
|
* buf_hash_remove() expects the appropriate hash mutex to be
|
|
* already held before it is invoked.
|
|
*
|
|
* Each ARC state also has a mutex which is used to protect the
|
|
* buffer list associated with the state. When attempting to
|
|
* obtain a hash table lock while holding an ARC list lock you
|
|
* must use: mutex_tryenter() to avoid deadlock. Also note that
|
|
* the active state mutex must be held before the ghost state mutex.
|
|
*
|
|
* It as also possible to register a callback which is run when the
|
|
* arc_meta_limit is reached and no buffers can be safely evicted. In
|
|
* this case the arc user should drop a reference on some arc buffers so
|
|
* they can be reclaimed and the arc_meta_limit honored. For example,
|
|
* when using the ZPL each dentry holds a references on a znode. These
|
|
* dentries must be pruned before the arc buffer holding the znode can
|
|
* be safely evicted.
|
|
*
|
|
* Note that the majority of the performance stats are manipulated
|
|
* with atomic operations.
|
|
*
|
|
* The L2ARC uses the l2ad_mtx on each vdev for the following:
|
|
*
|
|
* - L2ARC buflist creation
|
|
* - L2ARC buflist eviction
|
|
* - L2ARC write completion, which walks L2ARC buflists
|
|
* - ARC header destruction, as it removes from L2ARC buflists
|
|
* - ARC header release, as it removes from L2ARC buflists
|
|
*/
|
|
|
|
/*
|
|
* ARC operation:
|
|
*
|
|
* Every block that is in the ARC is tracked by an arc_buf_hdr_t structure.
|
|
* This structure can point either to a block that is still in the cache or to
|
|
* one that is only accessible in an L2 ARC device, or it can provide
|
|
* information about a block that was recently evicted. If a block is
|
|
* only accessible in the L2ARC, then the arc_buf_hdr_t only has enough
|
|
* information to retrieve it from the L2ARC device. This information is
|
|
* stored in the l2arc_buf_hdr_t sub-structure of the arc_buf_hdr_t. A block
|
|
* that is in this state cannot access the data directly.
|
|
*
|
|
* Blocks that are actively being referenced or have not been evicted
|
|
* are cached in the L1ARC. The L1ARC (l1arc_buf_hdr_t) is a structure within
|
|
* the arc_buf_hdr_t that will point to the data block in memory. A block can
|
|
* only be read by a consumer if it has an l1arc_buf_hdr_t. The L1ARC
|
|
* caches data in two ways -- in a list of ARC buffers (arc_buf_t) and
|
|
* also in the arc_buf_hdr_t's private physical data block pointer (b_pabd).
|
|
*
|
|
* The L1ARC's data pointer may or may not be uncompressed. The ARC has the
|
|
* ability to store the physical data (b_pabd) associated with the DVA of the
|
|
* arc_buf_hdr_t. Since the b_pabd is a copy of the on-disk physical block,
|
|
* it will match its on-disk compression characteristics. This behavior can be
|
|
* disabled by setting 'zfs_compressed_arc_enabled' to B_FALSE. When the
|
|
* compressed ARC functionality is disabled, the b_pabd will point to an
|
|
* uncompressed version of the on-disk data.
|
|
*
|
|
* Data in the L1ARC is not accessed by consumers of the ARC directly. Each
|
|
* arc_buf_hdr_t can have multiple ARC buffers (arc_buf_t) which reference it.
|
|
* Each ARC buffer (arc_buf_t) is being actively accessed by a specific ARC
|
|
* consumer. The ARC will provide references to this data and will keep it
|
|
* cached until it is no longer in use. The ARC caches only the L1ARC's physical
|
|
* data block and will evict any arc_buf_t that is no longer referenced. The
|
|
* amount of memory consumed by the arc_buf_ts' data buffers can be seen via the
|
|
* "overhead_size" kstat.
|
|
*
|
|
* Depending on the consumer, an arc_buf_t can be requested in uncompressed or
|
|
* compressed form. The typical case is that consumers will want uncompressed
|
|
* data, and when that happens a new data buffer is allocated where the data is
|
|
* decompressed for them to use. Currently the only consumer who wants
|
|
* compressed arc_buf_t's is "zfs send", when it streams data exactly as it
|
|
* exists on disk. When this happens, the arc_buf_t's data buffer is shared
|
|
* with the arc_buf_hdr_t.
|
|
*
|
|
* Here is a diagram showing an arc_buf_hdr_t referenced by two arc_buf_t's. The
|
|
* first one is owned by a compressed send consumer (and therefore references
|
|
* the same compressed data buffer as the arc_buf_hdr_t) and the second could be
|
|
* used by any other consumer (and has its own uncompressed copy of the data
|
|
* buffer).
|
|
*
|
|
* arc_buf_hdr_t
|
|
* +-----------+
|
|
* | fields |
|
|
* | common to |
|
|
* | L1- and |
|
|
* | L2ARC |
|
|
* +-----------+
|
|
* | l2arc_buf_hdr_t
|
|
* | |
|
|
* +-----------+
|
|
* | l1arc_buf_hdr_t
|
|
* | | arc_buf_t
|
|
* | b_buf +------------>+-----------+ arc_buf_t
|
|
* | b_pabd +-+ |b_next +---->+-----------+
|
|
* +-----------+ | |-----------| |b_next +-->NULL
|
|
* | |b_comp = T | +-----------+
|
|
* | |b_data +-+ |b_comp = F |
|
|
* | +-----------+ | |b_data +-+
|
|
* +->+------+ | +-----------+ |
|
|
* compressed | | | |
|
|
* data | |<--------------+ | uncompressed
|
|
* +------+ compressed, | data
|
|
* shared +-->+------+
|
|
* data | |
|
|
* | |
|
|
* +------+
|
|
*
|
|
* When a consumer reads a block, the ARC must first look to see if the
|
|
* arc_buf_hdr_t is cached. If the hdr is cached then the ARC allocates a new
|
|
* arc_buf_t and either copies uncompressed data into a new data buffer from an
|
|
* existing uncompressed arc_buf_t, decompresses the hdr's b_pabd buffer into a
|
|
* new data buffer, or shares the hdr's b_pabd buffer, depending on whether the
|
|
* hdr is compressed and the desired compression characteristics of the
|
|
* arc_buf_t consumer. If the arc_buf_t ends up sharing data with the
|
|
* arc_buf_hdr_t and both of them are uncompressed then the arc_buf_t must be
|
|
* the last buffer in the hdr's b_buf list, however a shared compressed buf can
|
|
* be anywhere in the hdr's list.
|
|
*
|
|
* The diagram below shows an example of an uncompressed ARC hdr that is
|
|
* sharing its data with an arc_buf_t (note that the shared uncompressed buf is
|
|
* the last element in the buf list):
|
|
*
|
|
* arc_buf_hdr_t
|
|
* +-----------+
|
|
* | |
|
|
* | |
|
|
* | |
|
|
* +-----------+
|
|
* l2arc_buf_hdr_t| |
|
|
* | |
|
|
* +-----------+
|
|
* l1arc_buf_hdr_t| |
|
|
* | | arc_buf_t (shared)
|
|
* | b_buf +------------>+---------+ arc_buf_t
|
|
* | | |b_next +---->+---------+
|
|
* | b_pabd +-+ |---------| |b_next +-->NULL
|
|
* +-----------+ | | | +---------+
|
|
* | |b_data +-+ | |
|
|
* | +---------+ | |b_data +-+
|
|
* +->+------+ | +---------+ |
|
|
* | | | |
|
|
* uncompressed | | | |
|
|
* data +------+ | |
|
|
* ^ +->+------+ |
|
|
* | uncompressed | | |
|
|
* | data | | |
|
|
* | +------+ |
|
|
* +---------------------------------+
|
|
*
|
|
* Writing to the ARC requires that the ARC first discard the hdr's b_pabd
|
|
* since the physical block is about to be rewritten. The new data contents
|
|
* will be contained in the arc_buf_t. As the I/O pipeline performs the write,
|
|
* it may compress the data before writing it to disk. The ARC will be called
|
|
* with the transformed data and will bcopy the transformed on-disk block into
|
|
* a newly allocated b_pabd. Writes are always done into buffers which have
|
|
* either been loaned (and hence are new and don't have other readers) or
|
|
* buffers which have been released (and hence have their own hdr, if there
|
|
* were originally other readers of the buf's original hdr). This ensures that
|
|
* the ARC only needs to update a single buf and its hdr after a write occurs.
|
|
*
|
|
* When the L2ARC is in use, it will also take advantage of the b_pabd. The
|
|
* L2ARC will always write the contents of b_pabd to the L2ARC. This means
|
|
* that when compressed ARC is enabled that the L2ARC blocks are identical
|
|
* to the on-disk block in the main data pool. This provides a significant
|
|
* advantage since the ARC can leverage the bp's checksum when reading from the
|
|
* L2ARC to determine if the contents are valid. However, if the compressed
|
|
* ARC is disabled, then the L2ARC's block must be transformed to look
|
|
* like the physical block in the main data pool before comparing the
|
|
* checksum and determining its validity.
|
|
*
|
|
* The L1ARC has a slightly different system for storing encrypted data.
|
|
* Raw (encrypted + possibly compressed) data has a few subtle differences from
|
|
* data that is just compressed. The biggest difference is that it is not
|
|
* possible to decrypt encrypted data (or visa versa) if the keys aren't loaded.
|
|
* The other difference is that encryption cannot be treated as a suggestion.
|
|
* If a caller would prefer compressed data, but they actually wind up with
|
|
* uncompressed data the worst thing that could happen is there might be a
|
|
* performance hit. If the caller requests encrypted data, however, we must be
|
|
* sure they actually get it or else secret information could be leaked. Raw
|
|
* data is stored in hdr->b_crypt_hdr.b_rabd. An encrypted header, therefore,
|
|
* may have both an encrypted version and a decrypted version of its data at
|
|
* once. When a caller needs a raw arc_buf_t, it is allocated and the data is
|
|
* copied out of this header. To avoid complications with b_pabd, raw buffers
|
|
* cannot be shared.
|
|
*/
|
|
|
|
#include <sys/spa.h>
|
|
#include <sys/zio.h>
|
|
#include <sys/spa_impl.h>
|
|
#include <sys/zio_compress.h>
|
|
#include <sys/zio_checksum.h>
|
|
#include <sys/zfs_context.h>
|
|
#include <sys/arc.h>
|
|
#include <sys/refcount.h>
|
|
#include <sys/vdev.h>
|
|
#include <sys/vdev_impl.h>
|
|
#include <sys/dsl_pool.h>
|
|
#include <sys/zio_checksum.h>
|
|
#include <sys/multilist.h>
|
|
#include <sys/abd.h>
|
|
#include <sys/zil.h>
|
|
#include <sys/fm/fs/zfs.h>
|
|
#ifdef _KERNEL
|
|
#include <sys/vmsystm.h>
|
|
#include <vm/anon.h>
|
|
#include <sys/fs/swapnode.h>
|
|
#include <sys/zpl.h>
|
|
#include <linux/mm_compat.h>
|
|
#endif
|
|
#include <sys/callb.h>
|
|
#include <sys/kstat.h>
|
|
#include <sys/dmu_tx.h>
|
|
#include <zfs_fletcher.h>
|
|
#include <sys/arc_impl.h>
|
|
#include <sys/trace_arc.h>
|
|
|
|
#ifndef _KERNEL
|
|
/* set with ZFS_DEBUG=watch, to enable watchpoints on frozen buffers */
|
|
boolean_t arc_watch = B_FALSE;
|
|
#endif
|
|
|
|
static kmutex_t arc_reclaim_lock;
|
|
static kcondvar_t arc_reclaim_thread_cv;
|
|
static boolean_t arc_reclaim_thread_exit;
|
|
static kcondvar_t arc_reclaim_waiters_cv;
|
|
|
|
/*
|
|
* The number of headers to evict in arc_evict_state_impl() before
|
|
* dropping the sublist lock and evicting from another sublist. A lower
|
|
* value means we're more likely to evict the "correct" header (i.e. the
|
|
* oldest header in the arc state), but comes with higher overhead
|
|
* (i.e. more invocations of arc_evict_state_impl()).
|
|
*/
|
|
int zfs_arc_evict_batch_limit = 10;
|
|
|
|
/* number of seconds before growing cache again */
|
|
static int arc_grow_retry = 5;
|
|
|
|
/* shift of arc_c for calculating overflow limit in arc_get_data_impl */
|
|
int zfs_arc_overflow_shift = 8;
|
|
|
|
/* shift of arc_c for calculating both min and max arc_p */
|
|
static int arc_p_min_shift = 4;
|
|
|
|
/* log2(fraction of arc to reclaim) */
|
|
static int arc_shrink_shift = 7;
|
|
|
|
/* percent of pagecache to reclaim arc to */
|
|
#ifdef _KERNEL
|
|
static uint_t zfs_arc_pc_percent = 0;
|
|
#endif
|
|
|
|
/*
|
|
* log2(fraction of ARC which must be free to allow growing).
|
|
* I.e. If there is less than arc_c >> arc_no_grow_shift free memory,
|
|
* when reading a new block into the ARC, we will evict an equal-sized block
|
|
* from the ARC.
|
|
*
|
|
* This must be less than arc_shrink_shift, so that when we shrink the ARC,
|
|
* we will still not allow it to grow.
|
|
*/
|
|
int arc_no_grow_shift = 5;
|
|
|
|
|
|
/*
|
|
* minimum lifespan of a prefetch block in clock ticks
|
|
* (initialized in arc_init())
|
|
*/
|
|
static int arc_min_prefetch_ms;
|
|
static int arc_min_prescient_prefetch_ms;
|
|
|
|
/*
|
|
* If this percent of memory is free, don't throttle.
|
|
*/
|
|
int arc_lotsfree_percent = 10;
|
|
|
|
static int arc_dead;
|
|
|
|
/*
|
|
* The arc has filled available memory and has now warmed up.
|
|
*/
|
|
static boolean_t arc_warm;
|
|
|
|
/*
|
|
* log2 fraction of the zio arena to keep free.
|
|
*/
|
|
int arc_zio_arena_free_shift = 2;
|
|
|
|
/*
|
|
* These tunables are for performance analysis.
|
|
*/
|
|
unsigned long zfs_arc_max = 0;
|
|
unsigned long zfs_arc_min = 0;
|
|
unsigned long zfs_arc_meta_limit = 0;
|
|
unsigned long zfs_arc_meta_min = 0;
|
|
unsigned long zfs_arc_dnode_limit = 0;
|
|
unsigned long zfs_arc_dnode_reduce_percent = 10;
|
|
int zfs_arc_grow_retry = 0;
|
|
int zfs_arc_shrink_shift = 0;
|
|
int zfs_arc_p_min_shift = 0;
|
|
int zfs_arc_average_blocksize = 8 * 1024; /* 8KB */
|
|
|
|
int zfs_compressed_arc_enabled = B_TRUE;
|
|
|
|
/*
|
|
* ARC will evict meta buffers that exceed arc_meta_limit. This
|
|
* tunable make arc_meta_limit adjustable for different workloads.
|
|
*/
|
|
unsigned long zfs_arc_meta_limit_percent = 75;
|
|
|
|
/*
|
|
* Percentage that can be consumed by dnodes of ARC meta buffers.
|
|
*/
|
|
unsigned long zfs_arc_dnode_limit_percent = 10;
|
|
|
|
/*
|
|
* These tunables are Linux specific
|
|
*/
|
|
unsigned long zfs_arc_sys_free = 0;
|
|
int zfs_arc_min_prefetch_ms = 0;
|
|
int zfs_arc_min_prescient_prefetch_ms = 0;
|
|
int zfs_arc_p_dampener_disable = 1;
|
|
int zfs_arc_meta_prune = 10000;
|
|
int zfs_arc_meta_strategy = ARC_STRATEGY_META_BALANCED;
|
|
int zfs_arc_meta_adjust_restarts = 4096;
|
|
int zfs_arc_lotsfree_percent = 10;
|
|
|
|
/* The 6 states: */
|
|
static arc_state_t ARC_anon;
|
|
static arc_state_t ARC_mru;
|
|
static arc_state_t ARC_mru_ghost;
|
|
static arc_state_t ARC_mfu;
|
|
static arc_state_t ARC_mfu_ghost;
|
|
static arc_state_t ARC_l2c_only;
|
|
|
|
typedef struct arc_stats {
|
|
kstat_named_t arcstat_hits;
|
|
kstat_named_t arcstat_misses;
|
|
kstat_named_t arcstat_demand_data_hits;
|
|
kstat_named_t arcstat_demand_data_misses;
|
|
kstat_named_t arcstat_demand_metadata_hits;
|
|
kstat_named_t arcstat_demand_metadata_misses;
|
|
kstat_named_t arcstat_prefetch_data_hits;
|
|
kstat_named_t arcstat_prefetch_data_misses;
|
|
kstat_named_t arcstat_prefetch_metadata_hits;
|
|
kstat_named_t arcstat_prefetch_metadata_misses;
|
|
kstat_named_t arcstat_mru_hits;
|
|
kstat_named_t arcstat_mru_ghost_hits;
|
|
kstat_named_t arcstat_mfu_hits;
|
|
kstat_named_t arcstat_mfu_ghost_hits;
|
|
kstat_named_t arcstat_deleted;
|
|
/*
|
|
* Number of buffers that could not be evicted because the hash lock
|
|
* was held by another thread. The lock may not necessarily be held
|
|
* by something using the same buffer, since hash locks are shared
|
|
* by multiple buffers.
|
|
*/
|
|
kstat_named_t arcstat_mutex_miss;
|
|
/*
|
|
* Number of buffers skipped when updating the access state due to the
|
|
* header having already been released after acquiring the hash lock.
|
|
*/
|
|
kstat_named_t arcstat_access_skip;
|
|
/*
|
|
* Number of buffers skipped because they have I/O in progress, are
|
|
* indirect prefetch buffers that have not lived long enough, or are
|
|
* not from the spa we're trying to evict from.
|
|
*/
|
|
kstat_named_t arcstat_evict_skip;
|
|
/*
|
|
* Number of times arc_evict_state() was unable to evict enough
|
|
* buffers to reach its target amount.
|
|
*/
|
|
kstat_named_t arcstat_evict_not_enough;
|
|
kstat_named_t arcstat_evict_l2_cached;
|
|
kstat_named_t arcstat_evict_l2_eligible;
|
|
kstat_named_t arcstat_evict_l2_ineligible;
|
|
kstat_named_t arcstat_evict_l2_skip;
|
|
kstat_named_t arcstat_hash_elements;
|
|
kstat_named_t arcstat_hash_elements_max;
|
|
kstat_named_t arcstat_hash_collisions;
|
|
kstat_named_t arcstat_hash_chains;
|
|
kstat_named_t arcstat_hash_chain_max;
|
|
kstat_named_t arcstat_p;
|
|
kstat_named_t arcstat_c;
|
|
kstat_named_t arcstat_c_min;
|
|
kstat_named_t arcstat_c_max;
|
|
kstat_named_t arcstat_size;
|
|
/*
|
|
* Number of compressed bytes stored in the arc_buf_hdr_t's b_pabd.
|
|
* Note that the compressed bytes may match the uncompressed bytes
|
|
* if the block is either not compressed or compressed arc is disabled.
|
|
*/
|
|
kstat_named_t arcstat_compressed_size;
|
|
/*
|
|
* Uncompressed size of the data stored in b_pabd. If compressed
|
|
* arc is disabled then this value will be identical to the stat
|
|
* above.
|
|
*/
|
|
kstat_named_t arcstat_uncompressed_size;
|
|
/*
|
|
* Number of bytes stored in all the arc_buf_t's. This is classified
|
|
* as "overhead" since this data is typically short-lived and will
|
|
* be evicted from the arc when it becomes unreferenced unless the
|
|
* zfs_keep_uncompressed_metadata or zfs_keep_uncompressed_level
|
|
* values have been set (see comment in dbuf.c for more information).
|
|
*/
|
|
kstat_named_t arcstat_overhead_size;
|
|
/*
|
|
* Number of bytes consumed by internal ARC structures necessary
|
|
* for tracking purposes; these structures are not actually
|
|
* backed by ARC buffers. This includes arc_buf_hdr_t structures
|
|
* (allocated via arc_buf_hdr_t_full and arc_buf_hdr_t_l2only
|
|
* caches), and arc_buf_t structures (allocated via arc_buf_t
|
|
* cache).
|
|
*/
|
|
kstat_named_t arcstat_hdr_size;
|
|
/*
|
|
* Number of bytes consumed by ARC buffers of type equal to
|
|
* ARC_BUFC_DATA. This is generally consumed by buffers backing
|
|
* on disk user data (e.g. plain file contents).
|
|
*/
|
|
kstat_named_t arcstat_data_size;
|
|
/*
|
|
* Number of bytes consumed by ARC buffers of type equal to
|
|
* ARC_BUFC_METADATA. This is generally consumed by buffers
|
|
* backing on disk data that is used for internal ZFS
|
|
* structures (e.g. ZAP, dnode, indirect blocks, etc).
|
|
*/
|
|
kstat_named_t arcstat_metadata_size;
|
|
/*
|
|
* Number of bytes consumed by dmu_buf_impl_t objects.
|
|
*/
|
|
kstat_named_t arcstat_dbuf_size;
|
|
/*
|
|
* Number of bytes consumed by dnode_t objects.
|
|
*/
|
|
kstat_named_t arcstat_dnode_size;
|
|
/*
|
|
* Number of bytes consumed by bonus buffers.
|
|
*/
|
|
kstat_named_t arcstat_bonus_size;
|
|
/*
|
|
* Total number of bytes consumed by ARC buffers residing in the
|
|
* arc_anon state. This includes *all* buffers in the arc_anon
|
|
* state; e.g. data, metadata, evictable, and unevictable buffers
|
|
* are all included in this value.
|
|
*/
|
|
kstat_named_t arcstat_anon_size;
|
|
/*
|
|
* Number of bytes consumed by ARC buffers that meet the
|
|
* following criteria: backing buffers of type ARC_BUFC_DATA,
|
|
* residing in the arc_anon state, and are eligible for eviction
|
|
* (e.g. have no outstanding holds on the buffer).
|
|
*/
|
|
kstat_named_t arcstat_anon_evictable_data;
|
|
/*
|
|
* Number of bytes consumed by ARC buffers that meet the
|
|
* following criteria: backing buffers of type ARC_BUFC_METADATA,
|
|
* residing in the arc_anon state, and are eligible for eviction
|
|
* (e.g. have no outstanding holds on the buffer).
|
|
*/
|
|
kstat_named_t arcstat_anon_evictable_metadata;
|
|
/*
|
|
* Total number of bytes consumed by ARC buffers residing in the
|
|
* arc_mru state. This includes *all* buffers in the arc_mru
|
|
* state; e.g. data, metadata, evictable, and unevictable buffers
|
|
* are all included in this value.
|
|
*/
|
|
kstat_named_t arcstat_mru_size;
|
|
/*
|
|
* Number of bytes consumed by ARC buffers that meet the
|
|
* following criteria: backing buffers of type ARC_BUFC_DATA,
|
|
* residing in the arc_mru state, and are eligible for eviction
|
|
* (e.g. have no outstanding holds on the buffer).
|
|
*/
|
|
kstat_named_t arcstat_mru_evictable_data;
|
|
/*
|
|
* Number of bytes consumed by ARC buffers that meet the
|
|
* following criteria: backing buffers of type ARC_BUFC_METADATA,
|
|
* residing in the arc_mru state, and are eligible for eviction
|
|
* (e.g. have no outstanding holds on the buffer).
|
|
*/
|
|
kstat_named_t arcstat_mru_evictable_metadata;
|
|
/*
|
|
* Total number of bytes that *would have been* consumed by ARC
|
|
* buffers in the arc_mru_ghost state. The key thing to note
|
|
* here, is the fact that this size doesn't actually indicate
|
|
* RAM consumption. The ghost lists only consist of headers and
|
|
* don't actually have ARC buffers linked off of these headers.
|
|
* Thus, *if* the headers had associated ARC buffers, these
|
|
* buffers *would have* consumed this number of bytes.
|
|
*/
|
|
kstat_named_t arcstat_mru_ghost_size;
|
|
/*
|
|
* Number of bytes that *would have been* consumed by ARC
|
|
* buffers that are eligible for eviction, of type
|
|
* ARC_BUFC_DATA, and linked off the arc_mru_ghost state.
|
|
*/
|
|
kstat_named_t arcstat_mru_ghost_evictable_data;
|
|
/*
|
|
* Number of bytes that *would have been* consumed by ARC
|
|
* buffers that are eligible for eviction, of type
|
|
* ARC_BUFC_METADATA, and linked off the arc_mru_ghost state.
|
|
*/
|
|
kstat_named_t arcstat_mru_ghost_evictable_metadata;
|
|
/*
|
|
* Total number of bytes consumed by ARC buffers residing in the
|
|
* arc_mfu state. This includes *all* buffers in the arc_mfu
|
|
* state; e.g. data, metadata, evictable, and unevictable buffers
|
|
* are all included in this value.
|
|
*/
|
|
kstat_named_t arcstat_mfu_size;
|
|
/*
|
|
* Number of bytes consumed by ARC buffers that are eligible for
|
|
* eviction, of type ARC_BUFC_DATA, and reside in the arc_mfu
|
|
* state.
|
|
*/
|
|
kstat_named_t arcstat_mfu_evictable_data;
|
|
/*
|
|
* Number of bytes consumed by ARC buffers that are eligible for
|
|
* eviction, of type ARC_BUFC_METADATA, and reside in the
|
|
* arc_mfu state.
|
|
*/
|
|
kstat_named_t arcstat_mfu_evictable_metadata;
|
|
/*
|
|
* Total number of bytes that *would have been* consumed by ARC
|
|
* buffers in the arc_mfu_ghost state. See the comment above
|
|
* arcstat_mru_ghost_size for more details.
|
|
*/
|
|
kstat_named_t arcstat_mfu_ghost_size;
|
|
/*
|
|
* Number of bytes that *would have been* consumed by ARC
|
|
* buffers that are eligible for eviction, of type
|
|
* ARC_BUFC_DATA, and linked off the arc_mfu_ghost state.
|
|
*/
|
|
kstat_named_t arcstat_mfu_ghost_evictable_data;
|
|
/*
|
|
* Number of bytes that *would have been* consumed by ARC
|
|
* buffers that are eligible for eviction, of type
|
|
* ARC_BUFC_METADATA, and linked off the arc_mru_ghost state.
|
|
*/
|
|
kstat_named_t arcstat_mfu_ghost_evictable_metadata;
|
|
kstat_named_t arcstat_l2_hits;
|
|
kstat_named_t arcstat_l2_misses;
|
|
kstat_named_t arcstat_l2_feeds;
|
|
kstat_named_t arcstat_l2_rw_clash;
|
|
kstat_named_t arcstat_l2_read_bytes;
|
|
kstat_named_t arcstat_l2_write_bytes;
|
|
kstat_named_t arcstat_l2_writes_sent;
|
|
kstat_named_t arcstat_l2_writes_done;
|
|
kstat_named_t arcstat_l2_writes_error;
|
|
kstat_named_t arcstat_l2_writes_lock_retry;
|
|
kstat_named_t arcstat_l2_evict_lock_retry;
|
|
kstat_named_t arcstat_l2_evict_reading;
|
|
kstat_named_t arcstat_l2_evict_l1cached;
|
|
kstat_named_t arcstat_l2_free_on_write;
|
|
kstat_named_t arcstat_l2_abort_lowmem;
|
|
kstat_named_t arcstat_l2_cksum_bad;
|
|
kstat_named_t arcstat_l2_io_error;
|
|
kstat_named_t arcstat_l2_lsize;
|
|
kstat_named_t arcstat_l2_psize;
|
|
kstat_named_t arcstat_l2_hdr_size;
|
|
kstat_named_t arcstat_memory_throttle_count;
|
|
kstat_named_t arcstat_memory_direct_count;
|
|
kstat_named_t arcstat_memory_indirect_count;
|
|
kstat_named_t arcstat_memory_all_bytes;
|
|
kstat_named_t arcstat_memory_free_bytes;
|
|
kstat_named_t arcstat_memory_available_bytes;
|
|
kstat_named_t arcstat_no_grow;
|
|
kstat_named_t arcstat_tempreserve;
|
|
kstat_named_t arcstat_loaned_bytes;
|
|
kstat_named_t arcstat_prune;
|
|
kstat_named_t arcstat_meta_used;
|
|
kstat_named_t arcstat_meta_limit;
|
|
kstat_named_t arcstat_dnode_limit;
|
|
kstat_named_t arcstat_meta_max;
|
|
kstat_named_t arcstat_meta_min;
|
|
kstat_named_t arcstat_async_upgrade_sync;
|
|
kstat_named_t arcstat_demand_hit_predictive_prefetch;
|
|
kstat_named_t arcstat_demand_hit_prescient_prefetch;
|
|
kstat_named_t arcstat_need_free;
|
|
kstat_named_t arcstat_sys_free;
|
|
kstat_named_t arcstat_raw_size;
|
|
} arc_stats_t;
|
|
|
|
static arc_stats_t arc_stats = {
|
|
{ "hits", KSTAT_DATA_UINT64 },
|
|
{ "misses", KSTAT_DATA_UINT64 },
|
|
{ "demand_data_hits", KSTAT_DATA_UINT64 },
|
|
{ "demand_data_misses", KSTAT_DATA_UINT64 },
|
|
{ "demand_metadata_hits", KSTAT_DATA_UINT64 },
|
|
{ "demand_metadata_misses", KSTAT_DATA_UINT64 },
|
|
{ "prefetch_data_hits", KSTAT_DATA_UINT64 },
|
|
{ "prefetch_data_misses", KSTAT_DATA_UINT64 },
|
|
{ "prefetch_metadata_hits", KSTAT_DATA_UINT64 },
|
|
{ "prefetch_metadata_misses", KSTAT_DATA_UINT64 },
|
|
{ "mru_hits", KSTAT_DATA_UINT64 },
|
|
{ "mru_ghost_hits", KSTAT_DATA_UINT64 },
|
|
{ "mfu_hits", KSTAT_DATA_UINT64 },
|
|
{ "mfu_ghost_hits", KSTAT_DATA_UINT64 },
|
|
{ "deleted", KSTAT_DATA_UINT64 },
|
|
{ "mutex_miss", KSTAT_DATA_UINT64 },
|
|
{ "access_skip", KSTAT_DATA_UINT64 },
|
|
{ "evict_skip", KSTAT_DATA_UINT64 },
|
|
{ "evict_not_enough", KSTAT_DATA_UINT64 },
|
|
{ "evict_l2_cached", KSTAT_DATA_UINT64 },
|
|
{ "evict_l2_eligible", KSTAT_DATA_UINT64 },
|
|
{ "evict_l2_ineligible", KSTAT_DATA_UINT64 },
|
|
{ "evict_l2_skip", KSTAT_DATA_UINT64 },
|
|
{ "hash_elements", KSTAT_DATA_UINT64 },
|
|
{ "hash_elements_max", KSTAT_DATA_UINT64 },
|
|
{ "hash_collisions", KSTAT_DATA_UINT64 },
|
|
{ "hash_chains", KSTAT_DATA_UINT64 },
|
|
{ "hash_chain_max", KSTAT_DATA_UINT64 },
|
|
{ "p", KSTAT_DATA_UINT64 },
|
|
{ "c", KSTAT_DATA_UINT64 },
|
|
{ "c_min", KSTAT_DATA_UINT64 },
|
|
{ "c_max", KSTAT_DATA_UINT64 },
|
|
{ "size", KSTAT_DATA_UINT64 },
|
|
{ "compressed_size", KSTAT_DATA_UINT64 },
|
|
{ "uncompressed_size", KSTAT_DATA_UINT64 },
|
|
{ "overhead_size", KSTAT_DATA_UINT64 },
|
|
{ "hdr_size", KSTAT_DATA_UINT64 },
|
|
{ "data_size", KSTAT_DATA_UINT64 },
|
|
{ "metadata_size", KSTAT_DATA_UINT64 },
|
|
{ "dbuf_size", KSTAT_DATA_UINT64 },
|
|
{ "dnode_size", KSTAT_DATA_UINT64 },
|
|
{ "bonus_size", KSTAT_DATA_UINT64 },
|
|
{ "anon_size", KSTAT_DATA_UINT64 },
|
|
{ "anon_evictable_data", KSTAT_DATA_UINT64 },
|
|
{ "anon_evictable_metadata", KSTAT_DATA_UINT64 },
|
|
{ "mru_size", KSTAT_DATA_UINT64 },
|
|
{ "mru_evictable_data", KSTAT_DATA_UINT64 },
|
|
{ "mru_evictable_metadata", KSTAT_DATA_UINT64 },
|
|
{ "mru_ghost_size", KSTAT_DATA_UINT64 },
|
|
{ "mru_ghost_evictable_data", KSTAT_DATA_UINT64 },
|
|
{ "mru_ghost_evictable_metadata", KSTAT_DATA_UINT64 },
|
|
{ "mfu_size", KSTAT_DATA_UINT64 },
|
|
{ "mfu_evictable_data", KSTAT_DATA_UINT64 },
|
|
{ "mfu_evictable_metadata", KSTAT_DATA_UINT64 },
|
|
{ "mfu_ghost_size", KSTAT_DATA_UINT64 },
|
|
{ "mfu_ghost_evictable_data", KSTAT_DATA_UINT64 },
|
|
{ "mfu_ghost_evictable_metadata", KSTAT_DATA_UINT64 },
|
|
{ "l2_hits", KSTAT_DATA_UINT64 },
|
|
{ "l2_misses", KSTAT_DATA_UINT64 },
|
|
{ "l2_feeds", KSTAT_DATA_UINT64 },
|
|
{ "l2_rw_clash", KSTAT_DATA_UINT64 },
|
|
{ "l2_read_bytes", KSTAT_DATA_UINT64 },
|
|
{ "l2_write_bytes", KSTAT_DATA_UINT64 },
|
|
{ "l2_writes_sent", KSTAT_DATA_UINT64 },
|
|
{ "l2_writes_done", KSTAT_DATA_UINT64 },
|
|
{ "l2_writes_error", KSTAT_DATA_UINT64 },
|
|
{ "l2_writes_lock_retry", KSTAT_DATA_UINT64 },
|
|
{ "l2_evict_lock_retry", KSTAT_DATA_UINT64 },
|
|
{ "l2_evict_reading", KSTAT_DATA_UINT64 },
|
|
{ "l2_evict_l1cached", KSTAT_DATA_UINT64 },
|
|
{ "l2_free_on_write", KSTAT_DATA_UINT64 },
|
|
{ "l2_abort_lowmem", KSTAT_DATA_UINT64 },
|
|
{ "l2_cksum_bad", KSTAT_DATA_UINT64 },
|
|
{ "l2_io_error", KSTAT_DATA_UINT64 },
|
|
{ "l2_size", KSTAT_DATA_UINT64 },
|
|
{ "l2_asize", KSTAT_DATA_UINT64 },
|
|
{ "l2_hdr_size", KSTAT_DATA_UINT64 },
|
|
{ "memory_throttle_count", KSTAT_DATA_UINT64 },
|
|
{ "memory_direct_count", KSTAT_DATA_UINT64 },
|
|
{ "memory_indirect_count", KSTAT_DATA_UINT64 },
|
|
{ "memory_all_bytes", KSTAT_DATA_UINT64 },
|
|
{ "memory_free_bytes", KSTAT_DATA_UINT64 },
|
|
{ "memory_available_bytes", KSTAT_DATA_INT64 },
|
|
{ "arc_no_grow", KSTAT_DATA_UINT64 },
|
|
{ "arc_tempreserve", KSTAT_DATA_UINT64 },
|
|
{ "arc_loaned_bytes", KSTAT_DATA_UINT64 },
|
|
{ "arc_prune", KSTAT_DATA_UINT64 },
|
|
{ "arc_meta_used", KSTAT_DATA_UINT64 },
|
|
{ "arc_meta_limit", KSTAT_DATA_UINT64 },
|
|
{ "arc_dnode_limit", KSTAT_DATA_UINT64 },
|
|
{ "arc_meta_max", KSTAT_DATA_UINT64 },
|
|
{ "arc_meta_min", KSTAT_DATA_UINT64 },
|
|
{ "async_upgrade_sync", KSTAT_DATA_UINT64 },
|
|
{ "demand_hit_predictive_prefetch", KSTAT_DATA_UINT64 },
|
|
{ "demand_hit_prescient_prefetch", KSTAT_DATA_UINT64 },
|
|
{ "arc_need_free", KSTAT_DATA_UINT64 },
|
|
{ "arc_sys_free", KSTAT_DATA_UINT64 },
|
|
{ "arc_raw_size", KSTAT_DATA_UINT64 }
|
|
};
|
|
|
|
#define ARCSTAT(stat) (arc_stats.stat.value.ui64)
|
|
|
|
#define ARCSTAT_INCR(stat, val) \
|
|
atomic_add_64(&arc_stats.stat.value.ui64, (val))
|
|
|
|
#define ARCSTAT_BUMP(stat) ARCSTAT_INCR(stat, 1)
|
|
#define ARCSTAT_BUMPDOWN(stat) ARCSTAT_INCR(stat, -1)
|
|
|
|
#define ARCSTAT_MAX(stat, val) { \
|
|
uint64_t m; \
|
|
while ((val) > (m = arc_stats.stat.value.ui64) && \
|
|
(m != atomic_cas_64(&arc_stats.stat.value.ui64, m, (val)))) \
|
|
continue; \
|
|
}
|
|
|
|
#define ARCSTAT_MAXSTAT(stat) \
|
|
ARCSTAT_MAX(stat##_max, arc_stats.stat.value.ui64)
|
|
|
|
/*
|
|
* We define a macro to allow ARC hits/misses to be easily broken down by
|
|
* two separate conditions, giving a total of four different subtypes for
|
|
* each of hits and misses (so eight statistics total).
|
|
*/
|
|
#define ARCSTAT_CONDSTAT(cond1, stat1, notstat1, cond2, stat2, notstat2, stat) \
|
|
if (cond1) { \
|
|
if (cond2) { \
|
|
ARCSTAT_BUMP(arcstat_##stat1##_##stat2##_##stat); \
|
|
} else { \
|
|
ARCSTAT_BUMP(arcstat_##stat1##_##notstat2##_##stat); \
|
|
} \
|
|
} else { \
|
|
if (cond2) { \
|
|
ARCSTAT_BUMP(arcstat_##notstat1##_##stat2##_##stat); \
|
|
} else { \
|
|
ARCSTAT_BUMP(arcstat_##notstat1##_##notstat2##_##stat);\
|
|
} \
|
|
}
|
|
|
|
kstat_t *arc_ksp;
|
|
static arc_state_t *arc_anon;
|
|
static arc_state_t *arc_mru;
|
|
static arc_state_t *arc_mru_ghost;
|
|
static arc_state_t *arc_mfu;
|
|
static arc_state_t *arc_mfu_ghost;
|
|
static arc_state_t *arc_l2c_only;
|
|
|
|
/*
|
|
* There are several ARC variables that are critical to export as kstats --
|
|
* but we don't want to have to grovel around in the kstat whenever we wish to
|
|
* manipulate them. For these variables, we therefore define them to be in
|
|
* terms of the statistic variable. This assures that we are not introducing
|
|
* the possibility of inconsistency by having shadow copies of the variables,
|
|
* while still allowing the code to be readable.
|
|
*/
|
|
#define arc_size ARCSTAT(arcstat_size) /* actual total arc size */
|
|
#define arc_p ARCSTAT(arcstat_p) /* target size of MRU */
|
|
#define arc_c ARCSTAT(arcstat_c) /* target size of cache */
|
|
#define arc_c_min ARCSTAT(arcstat_c_min) /* min target cache size */
|
|
#define arc_c_max ARCSTAT(arcstat_c_max) /* max target cache size */
|
|
#define arc_no_grow ARCSTAT(arcstat_no_grow) /* do not grow cache size */
|
|
#define arc_tempreserve ARCSTAT(arcstat_tempreserve)
|
|
#define arc_loaned_bytes ARCSTAT(arcstat_loaned_bytes)
|
|
#define arc_meta_limit ARCSTAT(arcstat_meta_limit) /* max size for metadata */
|
|
#define arc_dnode_limit ARCSTAT(arcstat_dnode_limit) /* max size for dnodes */
|
|
#define arc_meta_min ARCSTAT(arcstat_meta_min) /* min size for metadata */
|
|
#define arc_meta_used ARCSTAT(arcstat_meta_used) /* size of metadata */
|
|
#define arc_meta_max ARCSTAT(arcstat_meta_max) /* max size of metadata */
|
|
#define arc_dbuf_size ARCSTAT(arcstat_dbuf_size) /* dbuf metadata */
|
|
#define arc_dnode_size ARCSTAT(arcstat_dnode_size) /* dnode metadata */
|
|
#define arc_bonus_size ARCSTAT(arcstat_bonus_size) /* bonus buffer metadata */
|
|
#define arc_need_free ARCSTAT(arcstat_need_free) /* bytes to be freed */
|
|
#define arc_sys_free ARCSTAT(arcstat_sys_free) /* target system free bytes */
|
|
|
|
/* size of all b_rabd's in entire arc */
|
|
#define arc_raw_size ARCSTAT(arcstat_raw_size)
|
|
/* compressed size of entire arc */
|
|
#define arc_compressed_size ARCSTAT(arcstat_compressed_size)
|
|
/* uncompressed size of entire arc */
|
|
#define arc_uncompressed_size ARCSTAT(arcstat_uncompressed_size)
|
|
/* number of bytes in the arc from arc_buf_t's */
|
|
#define arc_overhead_size ARCSTAT(arcstat_overhead_size)
|
|
|
|
static list_t arc_prune_list;
|
|
static kmutex_t arc_prune_mtx;
|
|
static taskq_t *arc_prune_taskq;
|
|
|
|
#define GHOST_STATE(state) \
|
|
((state) == arc_mru_ghost || (state) == arc_mfu_ghost || \
|
|
(state) == arc_l2c_only)
|
|
|
|
#define HDR_IN_HASH_TABLE(hdr) ((hdr)->b_flags & ARC_FLAG_IN_HASH_TABLE)
|
|
#define HDR_IO_IN_PROGRESS(hdr) ((hdr)->b_flags & ARC_FLAG_IO_IN_PROGRESS)
|
|
#define HDR_IO_ERROR(hdr) ((hdr)->b_flags & ARC_FLAG_IO_ERROR)
|
|
#define HDR_PREFETCH(hdr) ((hdr)->b_flags & ARC_FLAG_PREFETCH)
|
|
#define HDR_PRESCIENT_PREFETCH(hdr) \
|
|
((hdr)->b_flags & ARC_FLAG_PRESCIENT_PREFETCH)
|
|
#define HDR_COMPRESSION_ENABLED(hdr) \
|
|
((hdr)->b_flags & ARC_FLAG_COMPRESSED_ARC)
|
|
|
|
#define HDR_L2CACHE(hdr) ((hdr)->b_flags & ARC_FLAG_L2CACHE)
|
|
#define HDR_L2_READING(hdr) \
|
|
(((hdr)->b_flags & ARC_FLAG_IO_IN_PROGRESS) && \
|
|
((hdr)->b_flags & ARC_FLAG_HAS_L2HDR))
|
|
#define HDR_L2_WRITING(hdr) ((hdr)->b_flags & ARC_FLAG_L2_WRITING)
|
|
#define HDR_L2_EVICTED(hdr) ((hdr)->b_flags & ARC_FLAG_L2_EVICTED)
|
|
#define HDR_L2_WRITE_HEAD(hdr) ((hdr)->b_flags & ARC_FLAG_L2_WRITE_HEAD)
|
|
#define HDR_PROTECTED(hdr) ((hdr)->b_flags & ARC_FLAG_PROTECTED)
|
|
#define HDR_NOAUTH(hdr) ((hdr)->b_flags & ARC_FLAG_NOAUTH)
|
|
#define HDR_SHARED_DATA(hdr) ((hdr)->b_flags & ARC_FLAG_SHARED_DATA)
|
|
|
|
#define HDR_ISTYPE_METADATA(hdr) \
|
|
((hdr)->b_flags & ARC_FLAG_BUFC_METADATA)
|
|
#define HDR_ISTYPE_DATA(hdr) (!HDR_ISTYPE_METADATA(hdr))
|
|
|
|
#define HDR_HAS_L1HDR(hdr) ((hdr)->b_flags & ARC_FLAG_HAS_L1HDR)
|
|
#define HDR_HAS_L2HDR(hdr) ((hdr)->b_flags & ARC_FLAG_HAS_L2HDR)
|
|
#define HDR_HAS_RABD(hdr) \
|
|
(HDR_HAS_L1HDR(hdr) && HDR_PROTECTED(hdr) && \
|
|
(hdr)->b_crypt_hdr.b_rabd != NULL)
|
|
#define HDR_ENCRYPTED(hdr) \
|
|
(HDR_PROTECTED(hdr) && DMU_OT_IS_ENCRYPTED((hdr)->b_crypt_hdr.b_ot))
|
|
#define HDR_AUTHENTICATED(hdr) \
|
|
(HDR_PROTECTED(hdr) && !DMU_OT_IS_ENCRYPTED((hdr)->b_crypt_hdr.b_ot))
|
|
|
|
/* For storing compression mode in b_flags */
|
|
#define HDR_COMPRESS_OFFSET (highbit64(ARC_FLAG_COMPRESS_0) - 1)
|
|
|
|
#define HDR_GET_COMPRESS(hdr) ((enum zio_compress)BF32_GET((hdr)->b_flags, \
|
|
HDR_COMPRESS_OFFSET, SPA_COMPRESSBITS))
|
|
#define HDR_SET_COMPRESS(hdr, cmp) BF32_SET((hdr)->b_flags, \
|
|
HDR_COMPRESS_OFFSET, SPA_COMPRESSBITS, (cmp));
|
|
|
|
#define ARC_BUF_LAST(buf) ((buf)->b_next == NULL)
|
|
#define ARC_BUF_SHARED(buf) ((buf)->b_flags & ARC_BUF_FLAG_SHARED)
|
|
#define ARC_BUF_COMPRESSED(buf) ((buf)->b_flags & ARC_BUF_FLAG_COMPRESSED)
|
|
#define ARC_BUF_ENCRYPTED(buf) ((buf)->b_flags & ARC_BUF_FLAG_ENCRYPTED)
|
|
|
|
/*
|
|
* Other sizes
|
|
*/
|
|
|
|
#define HDR_FULL_CRYPT_SIZE ((int64_t)sizeof (arc_buf_hdr_t))
|
|
#define HDR_FULL_SIZE ((int64_t)offsetof(arc_buf_hdr_t, b_crypt_hdr))
|
|
#define HDR_L2ONLY_SIZE ((int64_t)offsetof(arc_buf_hdr_t, b_l1hdr))
|
|
|
|
/*
|
|
* Hash table routines
|
|
*/
|
|
|
|
#define HT_LOCK_ALIGN 64
|
|
#define HT_LOCK_PAD (P2NPHASE(sizeof (kmutex_t), (HT_LOCK_ALIGN)))
|
|
|
|
struct ht_lock {
|
|
kmutex_t ht_lock;
|
|
#ifdef _KERNEL
|
|
unsigned char pad[HT_LOCK_PAD];
|
|
#endif
|
|
};
|
|
|
|
#define BUF_LOCKS 8192
|
|
typedef struct buf_hash_table {
|
|
uint64_t ht_mask;
|
|
arc_buf_hdr_t **ht_table;
|
|
struct ht_lock ht_locks[BUF_LOCKS];
|
|
} buf_hash_table_t;
|
|
|
|
static buf_hash_table_t buf_hash_table;
|
|
|
|
#define BUF_HASH_INDEX(spa, dva, birth) \
|
|
(buf_hash(spa, dva, birth) & buf_hash_table.ht_mask)
|
|
#define BUF_HASH_LOCK_NTRY(idx) (buf_hash_table.ht_locks[idx & (BUF_LOCKS-1)])
|
|
#define BUF_HASH_LOCK(idx) (&(BUF_HASH_LOCK_NTRY(idx).ht_lock))
|
|
#define HDR_LOCK(hdr) \
|
|
(BUF_HASH_LOCK(BUF_HASH_INDEX(hdr->b_spa, &hdr->b_dva, hdr->b_birth)))
|
|
|
|
uint64_t zfs_crc64_table[256];
|
|
|
|
/*
|
|
* Level 2 ARC
|
|
*/
|
|
|
|
#define L2ARC_WRITE_SIZE (8 * 1024 * 1024) /* initial write max */
|
|
#define L2ARC_HEADROOM 2 /* num of writes */
|
|
|
|
/*
|
|
* If we discover during ARC scan any buffers to be compressed, we boost
|
|
* our headroom for the next scanning cycle by this percentage multiple.
|
|
*/
|
|
#define L2ARC_HEADROOM_BOOST 200
|
|
#define L2ARC_FEED_SECS 1 /* caching interval secs */
|
|
#define L2ARC_FEED_MIN_MS 200 /* min caching interval ms */
|
|
|
|
/*
|
|
* We can feed L2ARC from two states of ARC buffers, mru and mfu,
|
|
* and each of the state has two types: data and metadata.
|
|
*/
|
|
#define L2ARC_FEED_TYPES 4
|
|
|
|
#define l2arc_writes_sent ARCSTAT(arcstat_l2_writes_sent)
|
|
#define l2arc_writes_done ARCSTAT(arcstat_l2_writes_done)
|
|
|
|
/* L2ARC Performance Tunables */
|
|
unsigned long l2arc_write_max = L2ARC_WRITE_SIZE; /* def max write size */
|
|
unsigned long l2arc_write_boost = L2ARC_WRITE_SIZE; /* extra warmup write */
|
|
unsigned long l2arc_headroom = L2ARC_HEADROOM; /* # of dev writes */
|
|
unsigned long l2arc_headroom_boost = L2ARC_HEADROOM_BOOST;
|
|
unsigned long l2arc_feed_secs = L2ARC_FEED_SECS; /* interval seconds */
|
|
unsigned long l2arc_feed_min_ms = L2ARC_FEED_MIN_MS; /* min interval msecs */
|
|
int l2arc_noprefetch = B_TRUE; /* don't cache prefetch bufs */
|
|
int l2arc_feed_again = B_TRUE; /* turbo warmup */
|
|
int l2arc_norw = B_FALSE; /* no reads during writes */
|
|
|
|
/*
|
|
* L2ARC Internals
|
|
*/
|
|
static list_t L2ARC_dev_list; /* device list */
|
|
static list_t *l2arc_dev_list; /* device list pointer */
|
|
static kmutex_t l2arc_dev_mtx; /* device list mutex */
|
|
static l2arc_dev_t *l2arc_dev_last; /* last device used */
|
|
static list_t L2ARC_free_on_write; /* free after write buf list */
|
|
static list_t *l2arc_free_on_write; /* free after write list ptr */
|
|
static kmutex_t l2arc_free_on_write_mtx; /* mutex for list */
|
|
static uint64_t l2arc_ndev; /* number of devices */
|
|
|
|
typedef struct l2arc_read_callback {
|
|
arc_buf_hdr_t *l2rcb_hdr; /* read header */
|
|
blkptr_t l2rcb_bp; /* original blkptr */
|
|
zbookmark_phys_t l2rcb_zb; /* original bookmark */
|
|
int l2rcb_flags; /* original flags */
|
|
abd_t *l2rcb_abd; /* temporary buffer */
|
|
} l2arc_read_callback_t;
|
|
|
|
typedef struct l2arc_data_free {
|
|
/* protected by l2arc_free_on_write_mtx */
|
|
abd_t *l2df_abd;
|
|
size_t l2df_size;
|
|
arc_buf_contents_t l2df_type;
|
|
list_node_t l2df_list_node;
|
|
} l2arc_data_free_t;
|
|
|
|
typedef enum arc_fill_flags {
|
|
ARC_FILL_LOCKED = 1 << 0, /* hdr lock is held */
|
|
ARC_FILL_COMPRESSED = 1 << 1, /* fill with compressed data */
|
|
ARC_FILL_ENCRYPTED = 1 << 2, /* fill with encrypted data */
|
|
ARC_FILL_NOAUTH = 1 << 3, /* don't attempt to authenticate */
|
|
ARC_FILL_IN_PLACE = 1 << 4 /* fill in place (special case) */
|
|
} arc_fill_flags_t;
|
|
|
|
static kmutex_t l2arc_feed_thr_lock;
|
|
static kcondvar_t l2arc_feed_thr_cv;
|
|
static uint8_t l2arc_thread_exit;
|
|
|
|
static abd_t *arc_get_data_abd(arc_buf_hdr_t *, uint64_t, void *);
|
|
static void *arc_get_data_buf(arc_buf_hdr_t *, uint64_t, void *);
|
|
static void arc_get_data_impl(arc_buf_hdr_t *, uint64_t, void *);
|
|
static void arc_free_data_abd(arc_buf_hdr_t *, abd_t *, uint64_t, void *);
|
|
static void arc_free_data_buf(arc_buf_hdr_t *, void *, uint64_t, void *);
|
|
static void arc_free_data_impl(arc_buf_hdr_t *hdr, uint64_t size, void *tag);
|
|
static void arc_hdr_free_abd(arc_buf_hdr_t *, boolean_t);
|
|
static void arc_hdr_alloc_abd(arc_buf_hdr_t *, boolean_t);
|
|
static void arc_access(arc_buf_hdr_t *, kmutex_t *);
|
|
static boolean_t arc_is_overflowing(void);
|
|
static void arc_buf_watch(arc_buf_t *);
|
|
static void arc_tuning_update(void);
|
|
static void arc_prune_async(int64_t);
|
|
static uint64_t arc_all_memory(void);
|
|
|
|
static arc_buf_contents_t arc_buf_type(arc_buf_hdr_t *);
|
|
static uint32_t arc_bufc_to_flags(arc_buf_contents_t);
|
|
static inline void arc_hdr_set_flags(arc_buf_hdr_t *hdr, arc_flags_t flags);
|
|
static inline void arc_hdr_clear_flags(arc_buf_hdr_t *hdr, arc_flags_t flags);
|
|
|
|
static boolean_t l2arc_write_eligible(uint64_t, arc_buf_hdr_t *);
|
|
static void l2arc_read_done(zio_t *);
|
|
|
|
static uint64_t
|
|
buf_hash(uint64_t spa, const dva_t *dva, uint64_t birth)
|
|
{
|
|
uint8_t *vdva = (uint8_t *)dva;
|
|
uint64_t crc = -1ULL;
|
|
int i;
|
|
|
|
ASSERT(zfs_crc64_table[128] == ZFS_CRC64_POLY);
|
|
|
|
for (i = 0; i < sizeof (dva_t); i++)
|
|
crc = (crc >> 8) ^ zfs_crc64_table[(crc ^ vdva[i]) & 0xFF];
|
|
|
|
crc ^= (spa>>8) ^ birth;
|
|
|
|
return (crc);
|
|
}
|
|
|
|
#define HDR_EMPTY(hdr) \
|
|
((hdr)->b_dva.dva_word[0] == 0 && \
|
|
(hdr)->b_dva.dva_word[1] == 0)
|
|
|
|
#define HDR_EQUAL(spa, dva, birth, hdr) \
|
|
((hdr)->b_dva.dva_word[0] == (dva)->dva_word[0]) && \
|
|
((hdr)->b_dva.dva_word[1] == (dva)->dva_word[1]) && \
|
|
((hdr)->b_birth == birth) && ((hdr)->b_spa == spa)
|
|
|
|
static void
|
|
buf_discard_identity(arc_buf_hdr_t *hdr)
|
|
{
|
|
hdr->b_dva.dva_word[0] = 0;
|
|
hdr->b_dva.dva_word[1] = 0;
|
|
hdr->b_birth = 0;
|
|
}
|
|
|
|
static arc_buf_hdr_t *
|
|
buf_hash_find(uint64_t spa, const blkptr_t *bp, kmutex_t **lockp)
|
|
{
|
|
const dva_t *dva = BP_IDENTITY(bp);
|
|
uint64_t birth = BP_PHYSICAL_BIRTH(bp);
|
|
uint64_t idx = BUF_HASH_INDEX(spa, dva, birth);
|
|
kmutex_t *hash_lock = BUF_HASH_LOCK(idx);
|
|
arc_buf_hdr_t *hdr;
|
|
|
|
mutex_enter(hash_lock);
|
|
for (hdr = buf_hash_table.ht_table[idx]; hdr != NULL;
|
|
hdr = hdr->b_hash_next) {
|
|
if (HDR_EQUAL(spa, dva, birth, hdr)) {
|
|
*lockp = hash_lock;
|
|
return (hdr);
|
|
}
|
|
}
|
|
mutex_exit(hash_lock);
|
|
*lockp = NULL;
|
|
return (NULL);
|
|
}
|
|
|
|
/*
|
|
* Insert an entry into the hash table. If there is already an element
|
|
* equal to elem in the hash table, then the already existing element
|
|
* will be returned and the new element will not be inserted.
|
|
* Otherwise returns NULL.
|
|
* If lockp == NULL, the caller is assumed to already hold the hash lock.
|
|
*/
|
|
static arc_buf_hdr_t *
|
|
buf_hash_insert(arc_buf_hdr_t *hdr, kmutex_t **lockp)
|
|
{
|
|
uint64_t idx = BUF_HASH_INDEX(hdr->b_spa, &hdr->b_dva, hdr->b_birth);
|
|
kmutex_t *hash_lock = BUF_HASH_LOCK(idx);
|
|
arc_buf_hdr_t *fhdr;
|
|
uint32_t i;
|
|
|
|
ASSERT(!DVA_IS_EMPTY(&hdr->b_dva));
|
|
ASSERT(hdr->b_birth != 0);
|
|
ASSERT(!HDR_IN_HASH_TABLE(hdr));
|
|
|
|
if (lockp != NULL) {
|
|
*lockp = hash_lock;
|
|
mutex_enter(hash_lock);
|
|
} else {
|
|
ASSERT(MUTEX_HELD(hash_lock));
|
|
}
|
|
|
|
for (fhdr = buf_hash_table.ht_table[idx], i = 0; fhdr != NULL;
|
|
fhdr = fhdr->b_hash_next, i++) {
|
|
if (HDR_EQUAL(hdr->b_spa, &hdr->b_dva, hdr->b_birth, fhdr))
|
|
return (fhdr);
|
|
}
|
|
|
|
hdr->b_hash_next = buf_hash_table.ht_table[idx];
|
|
buf_hash_table.ht_table[idx] = hdr;
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_IN_HASH_TABLE);
|
|
|
|
/* collect some hash table performance data */
|
|
if (i > 0) {
|
|
ARCSTAT_BUMP(arcstat_hash_collisions);
|
|
if (i == 1)
|
|
ARCSTAT_BUMP(arcstat_hash_chains);
|
|
|
|
ARCSTAT_MAX(arcstat_hash_chain_max, i);
|
|
}
|
|
|
|
ARCSTAT_BUMP(arcstat_hash_elements);
|
|
ARCSTAT_MAXSTAT(arcstat_hash_elements);
|
|
|
|
return (NULL);
|
|
}
|
|
|
|
static void
|
|
buf_hash_remove(arc_buf_hdr_t *hdr)
|
|
{
|
|
arc_buf_hdr_t *fhdr, **hdrp;
|
|
uint64_t idx = BUF_HASH_INDEX(hdr->b_spa, &hdr->b_dva, hdr->b_birth);
|
|
|
|
ASSERT(MUTEX_HELD(BUF_HASH_LOCK(idx)));
|
|
ASSERT(HDR_IN_HASH_TABLE(hdr));
|
|
|
|
hdrp = &buf_hash_table.ht_table[idx];
|
|
while ((fhdr = *hdrp) != hdr) {
|
|
ASSERT3P(fhdr, !=, NULL);
|
|
hdrp = &fhdr->b_hash_next;
|
|
}
|
|
*hdrp = hdr->b_hash_next;
|
|
hdr->b_hash_next = NULL;
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_IN_HASH_TABLE);
|
|
|
|
/* collect some hash table performance data */
|
|
ARCSTAT_BUMPDOWN(arcstat_hash_elements);
|
|
|
|
if (buf_hash_table.ht_table[idx] &&
|
|
buf_hash_table.ht_table[idx]->b_hash_next == NULL)
|
|
ARCSTAT_BUMPDOWN(arcstat_hash_chains);
|
|
}
|
|
|
|
/*
|
|
* Global data structures and functions for the buf kmem cache.
|
|
*/
|
|
|
|
static kmem_cache_t *hdr_full_cache;
|
|
static kmem_cache_t *hdr_full_crypt_cache;
|
|
static kmem_cache_t *hdr_l2only_cache;
|
|
static kmem_cache_t *buf_cache;
|
|
|
|
static void
|
|
buf_fini(void)
|
|
{
|
|
int i;
|
|
|
|
#if defined(_KERNEL) && defined(HAVE_SPL)
|
|
/*
|
|
* Large allocations which do not require contiguous pages
|
|
* should be using vmem_free() in the linux kernel\
|
|
*/
|
|
vmem_free(buf_hash_table.ht_table,
|
|
(buf_hash_table.ht_mask + 1) * sizeof (void *));
|
|
#else
|
|
kmem_free(buf_hash_table.ht_table,
|
|
(buf_hash_table.ht_mask + 1) * sizeof (void *));
|
|
#endif
|
|
for (i = 0; i < BUF_LOCKS; i++)
|
|
mutex_destroy(&buf_hash_table.ht_locks[i].ht_lock);
|
|
kmem_cache_destroy(hdr_full_cache);
|
|
kmem_cache_destroy(hdr_full_crypt_cache);
|
|
kmem_cache_destroy(hdr_l2only_cache);
|
|
kmem_cache_destroy(buf_cache);
|
|
}
|
|
|
|
/*
|
|
* Constructor callback - called when the cache is empty
|
|
* and a new buf is requested.
|
|
*/
|
|
/* ARGSUSED */
|
|
static int
|
|
hdr_full_cons(void *vbuf, void *unused, int kmflag)
|
|
{
|
|
arc_buf_hdr_t *hdr = vbuf;
|
|
|
|
bzero(hdr, HDR_FULL_SIZE);
|
|
hdr->b_l1hdr.b_byteswap = DMU_BSWAP_NUMFUNCS;
|
|
cv_init(&hdr->b_l1hdr.b_cv, NULL, CV_DEFAULT, NULL);
|
|
refcount_create(&hdr->b_l1hdr.b_refcnt);
|
|
mutex_init(&hdr->b_l1hdr.b_freeze_lock, NULL, MUTEX_DEFAULT, NULL);
|
|
list_link_init(&hdr->b_l1hdr.b_arc_node);
|
|
list_link_init(&hdr->b_l2hdr.b_l2node);
|
|
multilist_link_init(&hdr->b_l1hdr.b_arc_node);
|
|
arc_space_consume(HDR_FULL_SIZE, ARC_SPACE_HDRS);
|
|
|
|
return (0);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static int
|
|
hdr_full_crypt_cons(void *vbuf, void *unused, int kmflag)
|
|
{
|
|
arc_buf_hdr_t *hdr = vbuf;
|
|
|
|
hdr_full_cons(vbuf, unused, kmflag);
|
|
bzero(&hdr->b_crypt_hdr, sizeof (hdr->b_crypt_hdr));
|
|
arc_space_consume(sizeof (hdr->b_crypt_hdr), ARC_SPACE_HDRS);
|
|
|
|
return (0);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static int
|
|
hdr_l2only_cons(void *vbuf, void *unused, int kmflag)
|
|
{
|
|
arc_buf_hdr_t *hdr = vbuf;
|
|
|
|
bzero(hdr, HDR_L2ONLY_SIZE);
|
|
arc_space_consume(HDR_L2ONLY_SIZE, ARC_SPACE_L2HDRS);
|
|
|
|
return (0);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static int
|
|
buf_cons(void *vbuf, void *unused, int kmflag)
|
|
{
|
|
arc_buf_t *buf = vbuf;
|
|
|
|
bzero(buf, sizeof (arc_buf_t));
|
|
mutex_init(&buf->b_evict_lock, NULL, MUTEX_DEFAULT, NULL);
|
|
arc_space_consume(sizeof (arc_buf_t), ARC_SPACE_HDRS);
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Destructor callback - called when a cached buf is
|
|
* no longer required.
|
|
*/
|
|
/* ARGSUSED */
|
|
static void
|
|
hdr_full_dest(void *vbuf, void *unused)
|
|
{
|
|
arc_buf_hdr_t *hdr = vbuf;
|
|
|
|
ASSERT(HDR_EMPTY(hdr));
|
|
cv_destroy(&hdr->b_l1hdr.b_cv);
|
|
refcount_destroy(&hdr->b_l1hdr.b_refcnt);
|
|
mutex_destroy(&hdr->b_l1hdr.b_freeze_lock);
|
|
ASSERT(!multilist_link_active(&hdr->b_l1hdr.b_arc_node));
|
|
arc_space_return(HDR_FULL_SIZE, ARC_SPACE_HDRS);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static void
|
|
hdr_full_crypt_dest(void *vbuf, void *unused)
|
|
{
|
|
arc_buf_hdr_t *hdr = vbuf;
|
|
|
|
hdr_full_dest(vbuf, unused);
|
|
arc_space_return(sizeof (hdr->b_crypt_hdr), ARC_SPACE_HDRS);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static void
|
|
hdr_l2only_dest(void *vbuf, void *unused)
|
|
{
|
|
ASSERTV(arc_buf_hdr_t *hdr = vbuf);
|
|
|
|
ASSERT(HDR_EMPTY(hdr));
|
|
arc_space_return(HDR_L2ONLY_SIZE, ARC_SPACE_L2HDRS);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static void
|
|
buf_dest(void *vbuf, void *unused)
|
|
{
|
|
arc_buf_t *buf = vbuf;
|
|
|
|
mutex_destroy(&buf->b_evict_lock);
|
|
arc_space_return(sizeof (arc_buf_t), ARC_SPACE_HDRS);
|
|
}
|
|
|
|
/*
|
|
* Reclaim callback -- invoked when memory is low.
|
|
*/
|
|
/* ARGSUSED */
|
|
static void
|
|
hdr_recl(void *unused)
|
|
{
|
|
dprintf("hdr_recl called\n");
|
|
/*
|
|
* umem calls the reclaim func when we destroy the buf cache,
|
|
* which is after we do arc_fini().
|
|
*/
|
|
if (!arc_dead)
|
|
cv_signal(&arc_reclaim_thread_cv);
|
|
}
|
|
|
|
static void
|
|
buf_init(void)
|
|
{
|
|
uint64_t *ct = NULL;
|
|
uint64_t hsize = 1ULL << 12;
|
|
int i, j;
|
|
|
|
/*
|
|
* The hash table is big enough to fill all of physical memory
|
|
* with an average block size of zfs_arc_average_blocksize (default 8K).
|
|
* By default, the table will take up
|
|
* totalmem * sizeof(void*) / 8K (1MB per GB with 8-byte pointers).
|
|
*/
|
|
while (hsize * zfs_arc_average_blocksize < arc_all_memory())
|
|
hsize <<= 1;
|
|
retry:
|
|
buf_hash_table.ht_mask = hsize - 1;
|
|
#if defined(_KERNEL) && defined(HAVE_SPL)
|
|
/*
|
|
* Large allocations which do not require contiguous pages
|
|
* should be using vmem_alloc() in the linux kernel
|
|
*/
|
|
buf_hash_table.ht_table =
|
|
vmem_zalloc(hsize * sizeof (void*), KM_SLEEP);
|
|
#else
|
|
buf_hash_table.ht_table =
|
|
kmem_zalloc(hsize * sizeof (void*), KM_NOSLEEP);
|
|
#endif
|
|
if (buf_hash_table.ht_table == NULL) {
|
|
ASSERT(hsize > (1ULL << 8));
|
|
hsize >>= 1;
|
|
goto retry;
|
|
}
|
|
|
|
hdr_full_cache = kmem_cache_create("arc_buf_hdr_t_full", HDR_FULL_SIZE,
|
|
0, hdr_full_cons, hdr_full_dest, hdr_recl, NULL, NULL, 0);
|
|
hdr_full_crypt_cache = kmem_cache_create("arc_buf_hdr_t_full_crypt",
|
|
HDR_FULL_CRYPT_SIZE, 0, hdr_full_crypt_cons, hdr_full_crypt_dest,
|
|
hdr_recl, NULL, NULL, 0);
|
|
hdr_l2only_cache = kmem_cache_create("arc_buf_hdr_t_l2only",
|
|
HDR_L2ONLY_SIZE, 0, hdr_l2only_cons, hdr_l2only_dest, hdr_recl,
|
|
NULL, NULL, 0);
|
|
buf_cache = kmem_cache_create("arc_buf_t", sizeof (arc_buf_t),
|
|
0, buf_cons, buf_dest, NULL, NULL, NULL, 0);
|
|
|
|
for (i = 0; i < 256; i++)
|
|
for (ct = zfs_crc64_table + i, *ct = i, j = 8; j > 0; j--)
|
|
*ct = (*ct >> 1) ^ (-(*ct & 1) & ZFS_CRC64_POLY);
|
|
|
|
for (i = 0; i < BUF_LOCKS; i++) {
|
|
mutex_init(&buf_hash_table.ht_locks[i].ht_lock,
|
|
NULL, MUTEX_DEFAULT, NULL);
|
|
}
|
|
}
|
|
|
|
#define ARC_MINTIME (hz>>4) /* 62 ms */
|
|
|
|
/*
|
|
* This is the size that the buf occupies in memory. If the buf is compressed,
|
|
* it will correspond to the compressed size. You should use this method of
|
|
* getting the buf size unless you explicitly need the logical size.
|
|
*/
|
|
uint64_t
|
|
arc_buf_size(arc_buf_t *buf)
|
|
{
|
|
return (ARC_BUF_COMPRESSED(buf) ?
|
|
HDR_GET_PSIZE(buf->b_hdr) : HDR_GET_LSIZE(buf->b_hdr));
|
|
}
|
|
|
|
uint64_t
|
|
arc_buf_lsize(arc_buf_t *buf)
|
|
{
|
|
return (HDR_GET_LSIZE(buf->b_hdr));
|
|
}
|
|
|
|
/*
|
|
* This function will return B_TRUE if the buffer is encrypted in memory.
|
|
* This buffer can be decrypted by calling arc_untransform().
|
|
*/
|
|
boolean_t
|
|
arc_is_encrypted(arc_buf_t *buf)
|
|
{
|
|
return (ARC_BUF_ENCRYPTED(buf) != 0);
|
|
}
|
|
|
|
/*
|
|
* Returns B_TRUE if the buffer represents data that has not had its MAC
|
|
* verified yet.
|
|
*/
|
|
boolean_t
|
|
arc_is_unauthenticated(arc_buf_t *buf)
|
|
{
|
|
return (HDR_NOAUTH(buf->b_hdr) != 0);
|
|
}
|
|
|
|
void
|
|
arc_get_raw_params(arc_buf_t *buf, boolean_t *byteorder, uint8_t *salt,
|
|
uint8_t *iv, uint8_t *mac)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
ASSERT(HDR_PROTECTED(hdr));
|
|
|
|
bcopy(hdr->b_crypt_hdr.b_salt, salt, ZIO_DATA_SALT_LEN);
|
|
bcopy(hdr->b_crypt_hdr.b_iv, iv, ZIO_DATA_IV_LEN);
|
|
bcopy(hdr->b_crypt_hdr.b_mac, mac, ZIO_DATA_MAC_LEN);
|
|
*byteorder = (hdr->b_l1hdr.b_byteswap == DMU_BSWAP_NUMFUNCS) ?
|
|
ZFS_HOST_BYTEORDER : !ZFS_HOST_BYTEORDER;
|
|
}
|
|
|
|
/*
|
|
* Indicates how this buffer is compressed in memory. If it is not compressed
|
|
* the value will be ZIO_COMPRESS_OFF. It can be made normally readable with
|
|
* arc_untransform() as long as it is also unencrypted.
|
|
*/
|
|
enum zio_compress
|
|
arc_get_compression(arc_buf_t *buf)
|
|
{
|
|
return (ARC_BUF_COMPRESSED(buf) ?
|
|
HDR_GET_COMPRESS(buf->b_hdr) : ZIO_COMPRESS_OFF);
|
|
}
|
|
|
|
/*
|
|
* Return the compression algorithm used to store this data in the ARC. If ARC
|
|
* compression is enabled or this is an encrypted block, this will be the same
|
|
* as what's used to store it on-disk. Otherwise, this will be ZIO_COMPRESS_OFF.
|
|
*/
|
|
static inline enum zio_compress
|
|
arc_hdr_get_compress(arc_buf_hdr_t *hdr)
|
|
{
|
|
return (HDR_COMPRESSION_ENABLED(hdr) ?
|
|
HDR_GET_COMPRESS(hdr) : ZIO_COMPRESS_OFF);
|
|
}
|
|
|
|
static inline boolean_t
|
|
arc_buf_is_shared(arc_buf_t *buf)
|
|
{
|
|
boolean_t shared = (buf->b_data != NULL &&
|
|
buf->b_hdr->b_l1hdr.b_pabd != NULL &&
|
|
abd_is_linear(buf->b_hdr->b_l1hdr.b_pabd) &&
|
|
buf->b_data == abd_to_buf(buf->b_hdr->b_l1hdr.b_pabd));
|
|
IMPLY(shared, HDR_SHARED_DATA(buf->b_hdr));
|
|
IMPLY(shared, ARC_BUF_SHARED(buf));
|
|
IMPLY(shared, ARC_BUF_COMPRESSED(buf) || ARC_BUF_LAST(buf));
|
|
|
|
/*
|
|
* It would be nice to assert arc_can_share() too, but the "hdr isn't
|
|
* already being shared" requirement prevents us from doing that.
|
|
*/
|
|
|
|
return (shared);
|
|
}
|
|
|
|
/*
|
|
* Free the checksum associated with this header. If there is no checksum, this
|
|
* is a no-op.
|
|
*/
|
|
static inline void
|
|
arc_cksum_free(arc_buf_hdr_t *hdr)
|
|
{
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
mutex_enter(&hdr->b_l1hdr.b_freeze_lock);
|
|
if (hdr->b_l1hdr.b_freeze_cksum != NULL) {
|
|
kmem_free(hdr->b_l1hdr.b_freeze_cksum, sizeof (zio_cksum_t));
|
|
hdr->b_l1hdr.b_freeze_cksum = NULL;
|
|
}
|
|
mutex_exit(&hdr->b_l1hdr.b_freeze_lock);
|
|
}
|
|
|
|
/*
|
|
* Return true iff at least one of the bufs on hdr is not compressed.
|
|
* Encrypted buffers count as compressed.
|
|
*/
|
|
static boolean_t
|
|
arc_hdr_has_uncompressed_buf(arc_buf_hdr_t *hdr)
|
|
{
|
|
for (arc_buf_t *b = hdr->b_l1hdr.b_buf; b != NULL; b = b->b_next) {
|
|
if (!ARC_BUF_COMPRESSED(b)) {
|
|
return (B_TRUE);
|
|
}
|
|
}
|
|
return (B_FALSE);
|
|
}
|
|
|
|
|
|
/*
|
|
* If we've turned on the ZFS_DEBUG_MODIFY flag, verify that the buf's data
|
|
* matches the checksum that is stored in the hdr. If there is no checksum,
|
|
* or if the buf is compressed, this is a no-op.
|
|
*/
|
|
static void
|
|
arc_cksum_verify(arc_buf_t *buf)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
zio_cksum_t zc;
|
|
|
|
if (!(zfs_flags & ZFS_DEBUG_MODIFY))
|
|
return;
|
|
|
|
if (ARC_BUF_COMPRESSED(buf)) {
|
|
ASSERT(hdr->b_l1hdr.b_freeze_cksum == NULL ||
|
|
arc_hdr_has_uncompressed_buf(hdr));
|
|
return;
|
|
}
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
mutex_enter(&hdr->b_l1hdr.b_freeze_lock);
|
|
if (hdr->b_l1hdr.b_freeze_cksum == NULL || HDR_IO_ERROR(hdr)) {
|
|
mutex_exit(&hdr->b_l1hdr.b_freeze_lock);
|
|
return;
|
|
}
|
|
|
|
fletcher_2_native(buf->b_data, arc_buf_size(buf), NULL, &zc);
|
|
if (!ZIO_CHECKSUM_EQUAL(*hdr->b_l1hdr.b_freeze_cksum, zc))
|
|
panic("buffer modified while frozen!");
|
|
mutex_exit(&hdr->b_l1hdr.b_freeze_lock);
|
|
}
|
|
|
|
/*
|
|
* This function makes the assumption that data stored in the L2ARC
|
|
* will be transformed exactly as it is in the main pool. Because of
|
|
* this we can verify the checksum against the reading process's bp.
|
|
*/
|
|
static boolean_t
|
|
arc_cksum_is_equal(arc_buf_hdr_t *hdr, zio_t *zio)
|
|
{
|
|
ASSERT(!BP_IS_EMBEDDED(zio->io_bp));
|
|
VERIFY3U(BP_GET_PSIZE(zio->io_bp), ==, HDR_GET_PSIZE(hdr));
|
|
|
|
/*
|
|
* Block pointers always store the checksum for the logical data.
|
|
* If the block pointer has the gang bit set, then the checksum
|
|
* it represents is for the reconstituted data and not for an
|
|
* individual gang member. The zio pipeline, however, must be able to
|
|
* determine the checksum of each of the gang constituents so it
|
|
* treats the checksum comparison differently than what we need
|
|
* for l2arc blocks. This prevents us from using the
|
|
* zio_checksum_error() interface directly. Instead we must call the
|
|
* zio_checksum_error_impl() so that we can ensure the checksum is
|
|
* generated using the correct checksum algorithm and accounts for the
|
|
* logical I/O size and not just a gang fragment.
|
|
*/
|
|
return (zio_checksum_error_impl(zio->io_spa, zio->io_bp,
|
|
BP_GET_CHECKSUM(zio->io_bp), zio->io_abd, zio->io_size,
|
|
zio->io_offset, NULL) == 0);
|
|
}
|
|
|
|
/*
|
|
* Given a buf full of data, if ZFS_DEBUG_MODIFY is enabled this computes a
|
|
* checksum and attaches it to the buf's hdr so that we can ensure that the buf
|
|
* isn't modified later on. If buf is compressed or there is already a checksum
|
|
* on the hdr, this is a no-op (we only checksum uncompressed bufs).
|
|
*/
|
|
static void
|
|
arc_cksum_compute(arc_buf_t *buf)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
if (!(zfs_flags & ZFS_DEBUG_MODIFY))
|
|
return;
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
mutex_enter(&buf->b_hdr->b_l1hdr.b_freeze_lock);
|
|
if (hdr->b_l1hdr.b_freeze_cksum != NULL) {
|
|
ASSERT(arc_hdr_has_uncompressed_buf(hdr));
|
|
mutex_exit(&hdr->b_l1hdr.b_freeze_lock);
|
|
return;
|
|
} else if (ARC_BUF_COMPRESSED(buf)) {
|
|
mutex_exit(&hdr->b_l1hdr.b_freeze_lock);
|
|
return;
|
|
}
|
|
|
|
ASSERT(!ARC_BUF_ENCRYPTED(buf));
|
|
ASSERT(!ARC_BUF_COMPRESSED(buf));
|
|
hdr->b_l1hdr.b_freeze_cksum = kmem_alloc(sizeof (zio_cksum_t),
|
|
KM_SLEEP);
|
|
fletcher_2_native(buf->b_data, arc_buf_size(buf), NULL,
|
|
hdr->b_l1hdr.b_freeze_cksum);
|
|
mutex_exit(&hdr->b_l1hdr.b_freeze_lock);
|
|
arc_buf_watch(buf);
|
|
}
|
|
|
|
#ifndef _KERNEL
|
|
void
|
|
arc_buf_sigsegv(int sig, siginfo_t *si, void *unused)
|
|
{
|
|
panic("Got SIGSEGV at address: 0x%lx\n", (long)si->si_addr);
|
|
}
|
|
#endif
|
|
|
|
/* ARGSUSED */
|
|
static void
|
|
arc_buf_unwatch(arc_buf_t *buf)
|
|
{
|
|
#ifndef _KERNEL
|
|
if (arc_watch) {
|
|
ASSERT0(mprotect(buf->b_data, arc_buf_size(buf),
|
|
PROT_READ | PROT_WRITE));
|
|
}
|
|
#endif
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static void
|
|
arc_buf_watch(arc_buf_t *buf)
|
|
{
|
|
#ifndef _KERNEL
|
|
if (arc_watch)
|
|
ASSERT0(mprotect(buf->b_data, arc_buf_size(buf),
|
|
PROT_READ));
|
|
#endif
|
|
}
|
|
|
|
static arc_buf_contents_t
|
|
arc_buf_type(arc_buf_hdr_t *hdr)
|
|
{
|
|
arc_buf_contents_t type;
|
|
if (HDR_ISTYPE_METADATA(hdr)) {
|
|
type = ARC_BUFC_METADATA;
|
|
} else {
|
|
type = ARC_BUFC_DATA;
|
|
}
|
|
VERIFY3U(hdr->b_type, ==, type);
|
|
return (type);
|
|
}
|
|
|
|
boolean_t
|
|
arc_is_metadata(arc_buf_t *buf)
|
|
{
|
|
return (HDR_ISTYPE_METADATA(buf->b_hdr) != 0);
|
|
}
|
|
|
|
static uint32_t
|
|
arc_bufc_to_flags(arc_buf_contents_t type)
|
|
{
|
|
switch (type) {
|
|
case ARC_BUFC_DATA:
|
|
/* metadata field is 0 if buffer contains normal data */
|
|
return (0);
|
|
case ARC_BUFC_METADATA:
|
|
return (ARC_FLAG_BUFC_METADATA);
|
|
default:
|
|
break;
|
|
}
|
|
panic("undefined ARC buffer type!");
|
|
return ((uint32_t)-1);
|
|
}
|
|
|
|
void
|
|
arc_buf_thaw(arc_buf_t *buf)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
ASSERT3P(hdr->b_l1hdr.b_state, ==, arc_anon);
|
|
ASSERT(!HDR_IO_IN_PROGRESS(hdr));
|
|
|
|
arc_cksum_verify(buf);
|
|
|
|
/*
|
|
* Compressed buffers do not manipulate the b_freeze_cksum or
|
|
* allocate b_thawed.
|
|
*/
|
|
if (ARC_BUF_COMPRESSED(buf)) {
|
|
ASSERT(hdr->b_l1hdr.b_freeze_cksum == NULL ||
|
|
arc_hdr_has_uncompressed_buf(hdr));
|
|
return;
|
|
}
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
arc_cksum_free(hdr);
|
|
arc_buf_unwatch(buf);
|
|
}
|
|
|
|
void
|
|
arc_buf_freeze(arc_buf_t *buf)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
kmutex_t *hash_lock;
|
|
|
|
if (!(zfs_flags & ZFS_DEBUG_MODIFY))
|
|
return;
|
|
|
|
if (ARC_BUF_COMPRESSED(buf)) {
|
|
ASSERT(hdr->b_l1hdr.b_freeze_cksum == NULL ||
|
|
arc_hdr_has_uncompressed_buf(hdr));
|
|
return;
|
|
}
|
|
|
|
hash_lock = HDR_LOCK(hdr);
|
|
mutex_enter(hash_lock);
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT(hdr->b_l1hdr.b_freeze_cksum != NULL ||
|
|
hdr->b_l1hdr.b_state == arc_anon);
|
|
arc_cksum_compute(buf);
|
|
mutex_exit(hash_lock);
|
|
}
|
|
|
|
/*
|
|
* The arc_buf_hdr_t's b_flags should never be modified directly. Instead,
|
|
* the following functions should be used to ensure that the flags are
|
|
* updated in a thread-safe way. When manipulating the flags either
|
|
* the hash_lock must be held or the hdr must be undiscoverable. This
|
|
* ensures that we're not racing with any other threads when updating
|
|
* the flags.
|
|
*/
|
|
static inline void
|
|
arc_hdr_set_flags(arc_buf_hdr_t *hdr, arc_flags_t flags)
|
|
{
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)) || HDR_EMPTY(hdr));
|
|
hdr->b_flags |= flags;
|
|
}
|
|
|
|
static inline void
|
|
arc_hdr_clear_flags(arc_buf_hdr_t *hdr, arc_flags_t flags)
|
|
{
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)) || HDR_EMPTY(hdr));
|
|
hdr->b_flags &= ~flags;
|
|
}
|
|
|
|
/*
|
|
* Setting the compression bits in the arc_buf_hdr_t's b_flags is
|
|
* done in a special way since we have to clear and set bits
|
|
* at the same time. Consumers that wish to set the compression bits
|
|
* must use this function to ensure that the flags are updated in
|
|
* thread-safe manner.
|
|
*/
|
|
static void
|
|
arc_hdr_set_compress(arc_buf_hdr_t *hdr, enum zio_compress cmp)
|
|
{
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)) || HDR_EMPTY(hdr));
|
|
|
|
/*
|
|
* Holes and embedded blocks will always have a psize = 0 so
|
|
* we ignore the compression of the blkptr and set the
|
|
* want to uncompress them. Mark them as uncompressed.
|
|
*/
|
|
if (!zfs_compressed_arc_enabled || HDR_GET_PSIZE(hdr) == 0) {
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_COMPRESSED_ARC);
|
|
ASSERT(!HDR_COMPRESSION_ENABLED(hdr));
|
|
} else {
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_COMPRESSED_ARC);
|
|
ASSERT(HDR_COMPRESSION_ENABLED(hdr));
|
|
}
|
|
|
|
HDR_SET_COMPRESS(hdr, cmp);
|
|
ASSERT3U(HDR_GET_COMPRESS(hdr), ==, cmp);
|
|
}
|
|
|
|
/*
|
|
* Looks for another buf on the same hdr which has the data decompressed, copies
|
|
* from it, and returns true. If no such buf exists, returns false.
|
|
*/
|
|
static boolean_t
|
|
arc_buf_try_copy_decompressed_data(arc_buf_t *buf)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
boolean_t copied = B_FALSE;
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT3P(buf->b_data, !=, NULL);
|
|
ASSERT(!ARC_BUF_COMPRESSED(buf));
|
|
|
|
for (arc_buf_t *from = hdr->b_l1hdr.b_buf; from != NULL;
|
|
from = from->b_next) {
|
|
/* can't use our own data buffer */
|
|
if (from == buf) {
|
|
continue;
|
|
}
|
|
|
|
if (!ARC_BUF_COMPRESSED(from)) {
|
|
bcopy(from->b_data, buf->b_data, arc_buf_size(buf));
|
|
copied = B_TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* There were no decompressed bufs, so there should not be a
|
|
* checksum on the hdr either.
|
|
*/
|
|
EQUIV(!copied, hdr->b_l1hdr.b_freeze_cksum == NULL);
|
|
|
|
return (copied);
|
|
}
|
|
|
|
/*
|
|
* Return the size of the block, b_pabd, that is stored in the arc_buf_hdr_t.
|
|
*/
|
|
static uint64_t
|
|
arc_hdr_size(arc_buf_hdr_t *hdr)
|
|
{
|
|
uint64_t size;
|
|
|
|
if (arc_hdr_get_compress(hdr) != ZIO_COMPRESS_OFF &&
|
|
HDR_GET_PSIZE(hdr) > 0) {
|
|
size = HDR_GET_PSIZE(hdr);
|
|
} else {
|
|
ASSERT3U(HDR_GET_LSIZE(hdr), !=, 0);
|
|
size = HDR_GET_LSIZE(hdr);
|
|
}
|
|
return (size);
|
|
}
|
|
|
|
static int
|
|
arc_hdr_authenticate(arc_buf_hdr_t *hdr, spa_t *spa, uint64_t dsobj)
|
|
{
|
|
int ret;
|
|
uint64_t csize;
|
|
uint64_t lsize = HDR_GET_LSIZE(hdr);
|
|
uint64_t psize = HDR_GET_PSIZE(hdr);
|
|
void *tmpbuf = NULL;
|
|
abd_t *abd = hdr->b_l1hdr.b_pabd;
|
|
|
|
ASSERT(HDR_LOCK(hdr) == NULL || MUTEX_HELD(HDR_LOCK(hdr)));
|
|
ASSERT(HDR_AUTHENTICATED(hdr));
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
|
|
/*
|
|
* The MAC is calculated on the compressed data that is stored on disk.
|
|
* However, if compressed arc is disabled we will only have the
|
|
* decompressed data available to us now. Compress it into a temporary
|
|
* abd so we can verify the MAC. The performance overhead of this will
|
|
* be relatively low, since most objects in an encrypted objset will
|
|
* be encrypted (instead of authenticated) anyway.
|
|
*/
|
|
if (HDR_GET_COMPRESS(hdr) != ZIO_COMPRESS_OFF &&
|
|
!HDR_COMPRESSION_ENABLED(hdr)) {
|
|
tmpbuf = zio_buf_alloc(lsize);
|
|
abd = abd_get_from_buf(tmpbuf, lsize);
|
|
abd_take_ownership_of_buf(abd, B_TRUE);
|
|
|
|
csize = zio_compress_data(HDR_GET_COMPRESS(hdr),
|
|
hdr->b_l1hdr.b_pabd, tmpbuf, lsize);
|
|
ASSERT3U(csize, <=, psize);
|
|
abd_zero_off(abd, csize, psize - csize);
|
|
}
|
|
|
|
/*
|
|
* Authentication is best effort. We authenticate whenever the key is
|
|
* available. If we succeed we clear ARC_FLAG_NOAUTH.
|
|
*/
|
|
if (hdr->b_crypt_hdr.b_ot == DMU_OT_OBJSET) {
|
|
ASSERT3U(HDR_GET_COMPRESS(hdr), ==, ZIO_COMPRESS_OFF);
|
|
ASSERT3U(lsize, ==, psize);
|
|
ret = spa_do_crypt_objset_mac_abd(B_FALSE, spa, dsobj, abd,
|
|
psize, hdr->b_l1hdr.b_byteswap != DMU_BSWAP_NUMFUNCS);
|
|
} else {
|
|
ret = spa_do_crypt_mac_abd(B_FALSE, spa, dsobj, abd, psize,
|
|
hdr->b_crypt_hdr.b_mac);
|
|
}
|
|
|
|
if (ret == 0)
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_NOAUTH);
|
|
else if (ret != ENOENT)
|
|
goto error;
|
|
|
|
if (tmpbuf != NULL)
|
|
abd_free(abd);
|
|
|
|
return (0);
|
|
|
|
error:
|
|
if (tmpbuf != NULL)
|
|
abd_free(abd);
|
|
|
|
return (ret);
|
|
}
|
|
|
|
/*
|
|
* This function will take a header that only has raw encrypted data in
|
|
* b_crypt_hdr.b_rabd and decrypt it into a new buffer which is stored in
|
|
* b_l1hdr.b_pabd. If designated in the header flags, this function will
|
|
* also decompress the data.
|
|
*/
|
|
static int
|
|
arc_hdr_decrypt(arc_buf_hdr_t *hdr, spa_t *spa, uint64_t dsobj)
|
|
{
|
|
int ret;
|
|
dsl_crypto_key_t *dck = NULL;
|
|
abd_t *cabd = NULL;
|
|
void *tmp = NULL;
|
|
boolean_t no_crypt = B_FALSE;
|
|
boolean_t bswap = (hdr->b_l1hdr.b_byteswap != DMU_BSWAP_NUMFUNCS);
|
|
|
|
ASSERT(HDR_LOCK(hdr) == NULL || MUTEX_HELD(HDR_LOCK(hdr)));
|
|
ASSERT(HDR_ENCRYPTED(hdr));
|
|
|
|
arc_hdr_alloc_abd(hdr, B_FALSE);
|
|
|
|
/*
|
|
* We must be careful to use the passed-in dsobj value here and
|
|
* not the value in b_dsobj. b_dsobj is meant to be a best guess for
|
|
* the L2ARC, which has the luxury of being able to fail without real
|
|
* consequences (the data simply won't make it to the L2ARC). In
|
|
* reality, the dsobj stored in the header may belong to a dataset
|
|
* that has been unmounted or otherwise disowned, meaning the key
|
|
* won't be accessible via that dsobj anymore.
|
|
*/
|
|
ret = spa_keystore_lookup_key(spa, dsobj, FTAG, &dck);
|
|
if (ret != 0) {
|
|
ret = SET_ERROR(EACCES);
|
|
goto error;
|
|
}
|
|
|
|
ret = zio_do_crypt_abd(B_FALSE, &dck->dck_key,
|
|
hdr->b_crypt_hdr.b_salt, hdr->b_crypt_hdr.b_ot,
|
|
hdr->b_crypt_hdr.b_iv, hdr->b_crypt_hdr.b_mac,
|
|
HDR_GET_PSIZE(hdr), bswap, hdr->b_l1hdr.b_pabd,
|
|
hdr->b_crypt_hdr.b_rabd, &no_crypt);
|
|
if (ret != 0)
|
|
goto error;
|
|
|
|
if (no_crypt) {
|
|
abd_copy(hdr->b_l1hdr.b_pabd, hdr->b_crypt_hdr.b_rabd,
|
|
HDR_GET_PSIZE(hdr));
|
|
}
|
|
|
|
/*
|
|
* If this header has disabled arc compression but the b_pabd is
|
|
* compressed after decrypting it, we need to decompress the newly
|
|
* decrypted data.
|
|
*/
|
|
if (HDR_GET_COMPRESS(hdr) != ZIO_COMPRESS_OFF &&
|
|
!HDR_COMPRESSION_ENABLED(hdr)) {
|
|
/*
|
|
* We want to make sure that we are correctly honoring the
|
|
* zfs_abd_scatter_enabled setting, so we allocate an abd here
|
|
* and then loan a buffer from it, rather than allocating a
|
|
* linear buffer and wrapping it in an abd later.
|
|
*/
|
|
cabd = arc_get_data_abd(hdr, arc_hdr_size(hdr), hdr);
|
|
tmp = abd_borrow_buf(cabd, arc_hdr_size(hdr));
|
|
|
|
ret = zio_decompress_data(HDR_GET_COMPRESS(hdr),
|
|
hdr->b_l1hdr.b_pabd, tmp, HDR_GET_PSIZE(hdr),
|
|
HDR_GET_LSIZE(hdr));
|
|
if (ret != 0) {
|
|
abd_return_buf(cabd, tmp, arc_hdr_size(hdr));
|
|
goto error;
|
|
}
|
|
|
|
abd_return_buf_copy(cabd, tmp, arc_hdr_size(hdr));
|
|
arc_free_data_abd(hdr, hdr->b_l1hdr.b_pabd,
|
|
arc_hdr_size(hdr), hdr);
|
|
hdr->b_l1hdr.b_pabd = cabd;
|
|
}
|
|
|
|
spa_keystore_dsl_key_rele(spa, dck, FTAG);
|
|
|
|
return (0);
|
|
|
|
error:
|
|
arc_hdr_free_abd(hdr, B_FALSE);
|
|
if (dck != NULL)
|
|
spa_keystore_dsl_key_rele(spa, dck, FTAG);
|
|
if (cabd != NULL)
|
|
arc_free_data_buf(hdr, cabd, arc_hdr_size(hdr), hdr);
|
|
|
|
return (ret);
|
|
}
|
|
|
|
/*
|
|
* This function is called during arc_buf_fill() to prepare the header's
|
|
* abd plaintext pointer for use. This involves authenticated protected
|
|
* data and decrypting encrypted data into the plaintext abd.
|
|
*/
|
|
static int
|
|
arc_fill_hdr_crypt(arc_buf_hdr_t *hdr, kmutex_t *hash_lock, spa_t *spa,
|
|
uint64_t dsobj, boolean_t noauth)
|
|
{
|
|
int ret;
|
|
|
|
ASSERT(HDR_PROTECTED(hdr));
|
|
|
|
if (hash_lock != NULL)
|
|
mutex_enter(hash_lock);
|
|
|
|
if (HDR_NOAUTH(hdr) && !noauth) {
|
|
/*
|
|
* The caller requested authenticated data but our data has
|
|
* not been authenticated yet. Verify the MAC now if we can.
|
|
*/
|
|
ret = arc_hdr_authenticate(hdr, spa, dsobj);
|
|
if (ret != 0)
|
|
goto error;
|
|
} else if (HDR_HAS_RABD(hdr) && hdr->b_l1hdr.b_pabd == NULL) {
|
|
/*
|
|
* If we only have the encrypted version of the data, but the
|
|
* unencrypted version was requested we take this opportunity
|
|
* to store the decrypted version in the header for future use.
|
|
*/
|
|
ret = arc_hdr_decrypt(hdr, spa, dsobj);
|
|
if (ret != 0)
|
|
goto error;
|
|
}
|
|
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
|
|
if (hash_lock != NULL)
|
|
mutex_exit(hash_lock);
|
|
|
|
return (0);
|
|
|
|
error:
|
|
if (hash_lock != NULL)
|
|
mutex_exit(hash_lock);
|
|
|
|
return (ret);
|
|
}
|
|
|
|
/*
|
|
* This function is used by the dbuf code to decrypt bonus buffers in place.
|
|
* The dbuf code itself doesn't have any locking for decrypting a shared dnode
|
|
* block, so we use the hash lock here to protect against concurrent calls to
|
|
* arc_buf_fill().
|
|
*/
|
|
static void
|
|
arc_buf_untransform_in_place(arc_buf_t *buf, kmutex_t *hash_lock)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
ASSERT(HDR_ENCRYPTED(hdr));
|
|
ASSERT3U(hdr->b_crypt_hdr.b_ot, ==, DMU_OT_DNODE);
|
|
ASSERT(HDR_LOCK(hdr) == NULL || MUTEX_HELD(HDR_LOCK(hdr)));
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
|
|
zio_crypt_copy_dnode_bonus(hdr->b_l1hdr.b_pabd, buf->b_data,
|
|
arc_buf_size(buf));
|
|
buf->b_flags &= ~ARC_BUF_FLAG_ENCRYPTED;
|
|
buf->b_flags &= ~ARC_BUF_FLAG_COMPRESSED;
|
|
hdr->b_crypt_hdr.b_ebufcnt -= 1;
|
|
}
|
|
|
|
/*
|
|
* Given a buf that has a data buffer attached to it, this function will
|
|
* efficiently fill the buf with data of the specified compression setting from
|
|
* the hdr and update the hdr's b_freeze_cksum if necessary. If the buf and hdr
|
|
* are already sharing a data buf, no copy is performed.
|
|
*
|
|
* If the buf is marked as compressed but uncompressed data was requested, this
|
|
* will allocate a new data buffer for the buf, remove that flag, and fill the
|
|
* buf with uncompressed data. You can't request a compressed buf on a hdr with
|
|
* uncompressed data, and (since we haven't added support for it yet) if you
|
|
* want compressed data your buf must already be marked as compressed and have
|
|
* the correct-sized data buffer.
|
|
*/
|
|
static int
|
|
arc_buf_fill(arc_buf_t *buf, spa_t *spa, uint64_t dsobj, arc_fill_flags_t flags)
|
|
{
|
|
int error = 0;
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
boolean_t hdr_compressed =
|
|
(arc_hdr_get_compress(hdr) != ZIO_COMPRESS_OFF);
|
|
boolean_t compressed = (flags & ARC_FILL_COMPRESSED) != 0;
|
|
boolean_t encrypted = (flags & ARC_FILL_ENCRYPTED) != 0;
|
|
dmu_object_byteswap_t bswap = hdr->b_l1hdr.b_byteswap;
|
|
kmutex_t *hash_lock = (flags & ARC_FILL_LOCKED) ? NULL : HDR_LOCK(hdr);
|
|
|
|
ASSERT3P(buf->b_data, !=, NULL);
|
|
IMPLY(compressed, hdr_compressed || ARC_BUF_ENCRYPTED(buf));
|
|
IMPLY(compressed, ARC_BUF_COMPRESSED(buf));
|
|
IMPLY(encrypted, HDR_ENCRYPTED(hdr));
|
|
IMPLY(encrypted, ARC_BUF_ENCRYPTED(buf));
|
|
IMPLY(encrypted, ARC_BUF_COMPRESSED(buf));
|
|
IMPLY(encrypted, !ARC_BUF_SHARED(buf));
|
|
|
|
/*
|
|
* If the caller wanted encrypted data we just need to copy it from
|
|
* b_rabd and potentially byteswap it. We won't be able to do any
|
|
* further transforms on it.
|
|
*/
|
|
if (encrypted) {
|
|
ASSERT(HDR_HAS_RABD(hdr));
|
|
abd_copy_to_buf(buf->b_data, hdr->b_crypt_hdr.b_rabd,
|
|
HDR_GET_PSIZE(hdr));
|
|
goto byteswap;
|
|
}
|
|
|
|
/*
|
|
* Adjust encrypted and authenticated headers to accomodate the
|
|
* request if needed.
|
|
*/
|
|
if (HDR_PROTECTED(hdr)) {
|
|
error = arc_fill_hdr_crypt(hdr, hash_lock, spa,
|
|
dsobj, !!(flags & ARC_FILL_NOAUTH));
|
|
if (error != 0)
|
|
return (error);
|
|
}
|
|
|
|
/*
|
|
* There is a special case here for dnode blocks which are
|
|
* decrypting their bonus buffers. These blocks may request to
|
|
* be decrypted in-place. This is necessary because there may
|
|
* be many dnodes pointing into this buffer and there is
|
|
* currently no method to synchronize replacing the backing
|
|
* b_data buffer and updating all of the pointers. Here we use
|
|
* the hash lock to ensure there are no races. If the need
|
|
* arises for other types to be decrypted in-place, they must
|
|
* add handling here as well.
|
|
*/
|
|
if ((flags & ARC_FILL_IN_PLACE) != 0) {
|
|
ASSERT(!hdr_compressed);
|
|
ASSERT(!compressed);
|
|
ASSERT(!encrypted);
|
|
|
|
if (HDR_ENCRYPTED(hdr) && ARC_BUF_ENCRYPTED(buf)) {
|
|
ASSERT3U(hdr->b_crypt_hdr.b_ot, ==, DMU_OT_DNODE);
|
|
|
|
if (hash_lock != NULL)
|
|
mutex_enter(hash_lock);
|
|
arc_buf_untransform_in_place(buf, hash_lock);
|
|
if (hash_lock != NULL)
|
|
mutex_exit(hash_lock);
|
|
|
|
/* Compute the hdr's checksum if necessary */
|
|
arc_cksum_compute(buf);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
if (hdr_compressed == compressed) {
|
|
if (!arc_buf_is_shared(buf)) {
|
|
abd_copy_to_buf(buf->b_data, hdr->b_l1hdr.b_pabd,
|
|
arc_buf_size(buf));
|
|
}
|
|
} else {
|
|
ASSERT(hdr_compressed);
|
|
ASSERT(!compressed);
|
|
ASSERT3U(HDR_GET_LSIZE(hdr), !=, HDR_GET_PSIZE(hdr));
|
|
|
|
/*
|
|
* If the buf is sharing its data with the hdr, unlink it and
|
|
* allocate a new data buffer for the buf.
|
|
*/
|
|
if (arc_buf_is_shared(buf)) {
|
|
ASSERT(ARC_BUF_COMPRESSED(buf));
|
|
|
|
/* We need to give the buf it's own b_data */
|
|
buf->b_flags &= ~ARC_BUF_FLAG_SHARED;
|
|
buf->b_data =
|
|
arc_get_data_buf(hdr, HDR_GET_LSIZE(hdr), buf);
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_SHARED_DATA);
|
|
|
|
/* Previously overhead was 0; just add new overhead */
|
|
ARCSTAT_INCR(arcstat_overhead_size, HDR_GET_LSIZE(hdr));
|
|
} else if (ARC_BUF_COMPRESSED(buf)) {
|
|
/* We need to reallocate the buf's b_data */
|
|
arc_free_data_buf(hdr, buf->b_data, HDR_GET_PSIZE(hdr),
|
|
buf);
|
|
buf->b_data =
|
|
arc_get_data_buf(hdr, HDR_GET_LSIZE(hdr), buf);
|
|
|
|
/* We increased the size of b_data; update overhead */
|
|
ARCSTAT_INCR(arcstat_overhead_size,
|
|
HDR_GET_LSIZE(hdr) - HDR_GET_PSIZE(hdr));
|
|
}
|
|
|
|
/*
|
|
* Regardless of the buf's previous compression settings, it
|
|
* should not be compressed at the end of this function.
|
|
*/
|
|
buf->b_flags &= ~ARC_BUF_FLAG_COMPRESSED;
|
|
|
|
/*
|
|
* Try copying the data from another buf which already has a
|
|
* decompressed version. If that's not possible, it's time to
|
|
* bite the bullet and decompress the data from the hdr.
|
|
*/
|
|
if (arc_buf_try_copy_decompressed_data(buf)) {
|
|
/* Skip byteswapping and checksumming (already done) */
|
|
ASSERT3P(hdr->b_l1hdr.b_freeze_cksum, !=, NULL);
|
|
return (0);
|
|
} else {
|
|
error = zio_decompress_data(HDR_GET_COMPRESS(hdr),
|
|
hdr->b_l1hdr.b_pabd, buf->b_data,
|
|
HDR_GET_PSIZE(hdr), HDR_GET_LSIZE(hdr));
|
|
|
|
/*
|
|
* Absent hardware errors or software bugs, this should
|
|
* be impossible, but log it anyway so we can debug it.
|
|
*/
|
|
if (error != 0) {
|
|
zfs_dbgmsg(
|
|
"hdr %p, compress %d, psize %d, lsize %d",
|
|
hdr, arc_hdr_get_compress(hdr),
|
|
HDR_GET_PSIZE(hdr), HDR_GET_LSIZE(hdr));
|
|
return (SET_ERROR(EIO));
|
|
}
|
|
}
|
|
}
|
|
|
|
byteswap:
|
|
/* Byteswap the buf's data if necessary */
|
|
if (bswap != DMU_BSWAP_NUMFUNCS) {
|
|
ASSERT(!HDR_SHARED_DATA(hdr));
|
|
ASSERT3U(bswap, <, DMU_BSWAP_NUMFUNCS);
|
|
dmu_ot_byteswap[bswap].ob_func(buf->b_data, HDR_GET_LSIZE(hdr));
|
|
}
|
|
|
|
/* Compute the hdr's checksum if necessary */
|
|
arc_cksum_compute(buf);
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* If this function is being called to decrypt an encrypted buffer or verify an
|
|
* authenticated one, the key must be loaded and a mapping must be made
|
|
* available in the keystore via spa_keystore_create_mapping() or one of its
|
|
* callers.
|
|
*/
|
|
int
|
|
arc_untransform(arc_buf_t *buf, spa_t *spa, uint64_t dsobj, boolean_t in_place)
|
|
{
|
|
arc_fill_flags_t flags = 0;
|
|
|
|
if (in_place)
|
|
flags |= ARC_FILL_IN_PLACE;
|
|
|
|
return (arc_buf_fill(buf, spa, dsobj, flags));
|
|
}
|
|
|
|
/*
|
|
* Increment the amount of evictable space in the arc_state_t's refcount.
|
|
* We account for the space used by the hdr and the arc buf individually
|
|
* so that we can add and remove them from the refcount individually.
|
|
*/
|
|
static void
|
|
arc_evictable_space_increment(arc_buf_hdr_t *hdr, arc_state_t *state)
|
|
{
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
if (GHOST_STATE(state)) {
|
|
ASSERT0(hdr->b_l1hdr.b_bufcnt);
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, ==, NULL);
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
(void) refcount_add_many(&state->arcs_esize[type],
|
|
HDR_GET_LSIZE(hdr), hdr);
|
|
return;
|
|
}
|
|
|
|
ASSERT(!GHOST_STATE(state));
|
|
if (hdr->b_l1hdr.b_pabd != NULL) {
|
|
(void) refcount_add_many(&state->arcs_esize[type],
|
|
arc_hdr_size(hdr), hdr);
|
|
}
|
|
if (HDR_HAS_RABD(hdr)) {
|
|
(void) refcount_add_many(&state->arcs_esize[type],
|
|
HDR_GET_PSIZE(hdr), hdr);
|
|
}
|
|
|
|
for (arc_buf_t *buf = hdr->b_l1hdr.b_buf; buf != NULL;
|
|
buf = buf->b_next) {
|
|
if (arc_buf_is_shared(buf))
|
|
continue;
|
|
(void) refcount_add_many(&state->arcs_esize[type],
|
|
arc_buf_size(buf), buf);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Decrement the amount of evictable space in the arc_state_t's refcount.
|
|
* We account for the space used by the hdr and the arc buf individually
|
|
* so that we can add and remove them from the refcount individually.
|
|
*/
|
|
static void
|
|
arc_evictable_space_decrement(arc_buf_hdr_t *hdr, arc_state_t *state)
|
|
{
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
if (GHOST_STATE(state)) {
|
|
ASSERT0(hdr->b_l1hdr.b_bufcnt);
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, ==, NULL);
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
(void) refcount_remove_many(&state->arcs_esize[type],
|
|
HDR_GET_LSIZE(hdr), hdr);
|
|
return;
|
|
}
|
|
|
|
ASSERT(!GHOST_STATE(state));
|
|
if (hdr->b_l1hdr.b_pabd != NULL) {
|
|
(void) refcount_remove_many(&state->arcs_esize[type],
|
|
arc_hdr_size(hdr), hdr);
|
|
}
|
|
if (HDR_HAS_RABD(hdr)) {
|
|
(void) refcount_remove_many(&state->arcs_esize[type],
|
|
HDR_GET_PSIZE(hdr), hdr);
|
|
}
|
|
|
|
for (arc_buf_t *buf = hdr->b_l1hdr.b_buf; buf != NULL;
|
|
buf = buf->b_next) {
|
|
if (arc_buf_is_shared(buf))
|
|
continue;
|
|
(void) refcount_remove_many(&state->arcs_esize[type],
|
|
arc_buf_size(buf), buf);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Add a reference to this hdr indicating that someone is actively
|
|
* referencing that memory. When the refcount transitions from 0 to 1,
|
|
* we remove it from the respective arc_state_t list to indicate that
|
|
* it is not evictable.
|
|
*/
|
|
static void
|
|
add_reference(arc_buf_hdr_t *hdr, void *tag)
|
|
{
|
|
arc_state_t *state;
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
if (!MUTEX_HELD(HDR_LOCK(hdr))) {
|
|
ASSERT(hdr->b_l1hdr.b_state == arc_anon);
|
|
ASSERT(refcount_is_zero(&hdr->b_l1hdr.b_refcnt));
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, ==, NULL);
|
|
}
|
|
|
|
state = hdr->b_l1hdr.b_state;
|
|
|
|
if ((refcount_add(&hdr->b_l1hdr.b_refcnt, tag) == 1) &&
|
|
(state != arc_anon)) {
|
|
/* We don't use the L2-only state list. */
|
|
if (state != arc_l2c_only) {
|
|
multilist_remove(state->arcs_list[arc_buf_type(hdr)],
|
|
hdr);
|
|
arc_evictable_space_decrement(hdr, state);
|
|
}
|
|
/* remove the prefetch flag if we get a reference */
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_PREFETCH);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Remove a reference from this hdr. When the reference transitions from
|
|
* 1 to 0 and we're not anonymous, then we add this hdr to the arc_state_t's
|
|
* list making it eligible for eviction.
|
|
*/
|
|
static int
|
|
remove_reference(arc_buf_hdr_t *hdr, kmutex_t *hash_lock, void *tag)
|
|
{
|
|
int cnt;
|
|
arc_state_t *state = hdr->b_l1hdr.b_state;
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT(state == arc_anon || MUTEX_HELD(hash_lock));
|
|
ASSERT(!GHOST_STATE(state));
|
|
|
|
/*
|
|
* arc_l2c_only counts as a ghost state so we don't need to explicitly
|
|
* check to prevent usage of the arc_l2c_only list.
|
|
*/
|
|
if (((cnt = refcount_remove(&hdr->b_l1hdr.b_refcnt, tag)) == 0) &&
|
|
(state != arc_anon)) {
|
|
multilist_insert(state->arcs_list[arc_buf_type(hdr)], hdr);
|
|
ASSERT3U(hdr->b_l1hdr.b_bufcnt, >, 0);
|
|
arc_evictable_space_increment(hdr, state);
|
|
}
|
|
return (cnt);
|
|
}
|
|
|
|
/*
|
|
* Returns detailed information about a specific arc buffer. When the
|
|
* state_index argument is set the function will calculate the arc header
|
|
* list position for its arc state. Since this requires a linear traversal
|
|
* callers are strongly encourage not to do this. However, it can be helpful
|
|
* for targeted analysis so the functionality is provided.
|
|
*/
|
|
void
|
|
arc_buf_info(arc_buf_t *ab, arc_buf_info_t *abi, int state_index)
|
|
{
|
|
arc_buf_hdr_t *hdr = ab->b_hdr;
|
|
l1arc_buf_hdr_t *l1hdr = NULL;
|
|
l2arc_buf_hdr_t *l2hdr = NULL;
|
|
arc_state_t *state = NULL;
|
|
|
|
memset(abi, 0, sizeof (arc_buf_info_t));
|
|
|
|
if (hdr == NULL)
|
|
return;
|
|
|
|
abi->abi_flags = hdr->b_flags;
|
|
|
|
if (HDR_HAS_L1HDR(hdr)) {
|
|
l1hdr = &hdr->b_l1hdr;
|
|
state = l1hdr->b_state;
|
|
}
|
|
if (HDR_HAS_L2HDR(hdr))
|
|
l2hdr = &hdr->b_l2hdr;
|
|
|
|
if (l1hdr) {
|
|
abi->abi_bufcnt = l1hdr->b_bufcnt;
|
|
abi->abi_access = l1hdr->b_arc_access;
|
|
abi->abi_mru_hits = l1hdr->b_mru_hits;
|
|
abi->abi_mru_ghost_hits = l1hdr->b_mru_ghost_hits;
|
|
abi->abi_mfu_hits = l1hdr->b_mfu_hits;
|
|
abi->abi_mfu_ghost_hits = l1hdr->b_mfu_ghost_hits;
|
|
abi->abi_holds = refcount_count(&l1hdr->b_refcnt);
|
|
}
|
|
|
|
if (l2hdr) {
|
|
abi->abi_l2arc_dattr = l2hdr->b_daddr;
|
|
abi->abi_l2arc_hits = l2hdr->b_hits;
|
|
}
|
|
|
|
abi->abi_state_type = state ? state->arcs_state : ARC_STATE_ANON;
|
|
abi->abi_state_contents = arc_buf_type(hdr);
|
|
abi->abi_size = arc_hdr_size(hdr);
|
|
}
|
|
|
|
/*
|
|
* Move the supplied buffer to the indicated state. The hash lock
|
|
* for the buffer must be held by the caller.
|
|
*/
|
|
static void
|
|
arc_change_state(arc_state_t *new_state, arc_buf_hdr_t *hdr,
|
|
kmutex_t *hash_lock)
|
|
{
|
|
arc_state_t *old_state;
|
|
int64_t refcnt;
|
|
uint32_t bufcnt;
|
|
boolean_t update_old, update_new;
|
|
arc_buf_contents_t buftype = arc_buf_type(hdr);
|
|
|
|
/*
|
|
* We almost always have an L1 hdr here, since we call arc_hdr_realloc()
|
|
* in arc_read() when bringing a buffer out of the L2ARC. However, the
|
|
* L1 hdr doesn't always exist when we change state to arc_anon before
|
|
* destroying a header, in which case reallocating to add the L1 hdr is
|
|
* pointless.
|
|
*/
|
|
if (HDR_HAS_L1HDR(hdr)) {
|
|
old_state = hdr->b_l1hdr.b_state;
|
|
refcnt = refcount_count(&hdr->b_l1hdr.b_refcnt);
|
|
bufcnt = hdr->b_l1hdr.b_bufcnt;
|
|
update_old = (bufcnt > 0 || hdr->b_l1hdr.b_pabd != NULL ||
|
|
HDR_HAS_RABD(hdr));
|
|
} else {
|
|
old_state = arc_l2c_only;
|
|
refcnt = 0;
|
|
bufcnt = 0;
|
|
update_old = B_FALSE;
|
|
}
|
|
update_new = update_old;
|
|
|
|
ASSERT(MUTEX_HELD(hash_lock));
|
|
ASSERT3P(new_state, !=, old_state);
|
|
ASSERT(!GHOST_STATE(new_state) || bufcnt == 0);
|
|
ASSERT(old_state != arc_anon || bufcnt <= 1);
|
|
|
|
/*
|
|
* If this buffer is evictable, transfer it from the
|
|
* old state list to the new state list.
|
|
*/
|
|
if (refcnt == 0) {
|
|
if (old_state != arc_anon && old_state != arc_l2c_only) {
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
multilist_remove(old_state->arcs_list[buftype], hdr);
|
|
|
|
if (GHOST_STATE(old_state)) {
|
|
ASSERT0(bufcnt);
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, ==, NULL);
|
|
update_old = B_TRUE;
|
|
}
|
|
arc_evictable_space_decrement(hdr, old_state);
|
|
}
|
|
if (new_state != arc_anon && new_state != arc_l2c_only) {
|
|
/*
|
|
* An L1 header always exists here, since if we're
|
|
* moving to some L1-cached state (i.e. not l2c_only or
|
|
* anonymous), we realloc the header to add an L1hdr
|
|
* beforehand.
|
|
*/
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
multilist_insert(new_state->arcs_list[buftype], hdr);
|
|
|
|
if (GHOST_STATE(new_state)) {
|
|
ASSERT0(bufcnt);
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, ==, NULL);
|
|
update_new = B_TRUE;
|
|
}
|
|
arc_evictable_space_increment(hdr, new_state);
|
|
}
|
|
}
|
|
|
|
ASSERT(!HDR_EMPTY(hdr));
|
|
if (new_state == arc_anon && HDR_IN_HASH_TABLE(hdr))
|
|
buf_hash_remove(hdr);
|
|
|
|
/* adjust state sizes (ignore arc_l2c_only) */
|
|
|
|
if (update_new && new_state != arc_l2c_only) {
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
if (GHOST_STATE(new_state)) {
|
|
ASSERT0(bufcnt);
|
|
|
|
/*
|
|
* When moving a header to a ghost state, we first
|
|
* remove all arc buffers. Thus, we'll have a
|
|
* bufcnt of zero, and no arc buffer to use for
|
|
* the reference. As a result, we use the arc
|
|
* header pointer for the reference.
|
|
*/
|
|
(void) refcount_add_many(&new_state->arcs_size,
|
|
HDR_GET_LSIZE(hdr), hdr);
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
} else {
|
|
uint32_t buffers = 0;
|
|
|
|
/*
|
|
* Each individual buffer holds a unique reference,
|
|
* thus we must remove each of these references one
|
|
* at a time.
|
|
*/
|
|
for (arc_buf_t *buf = hdr->b_l1hdr.b_buf; buf != NULL;
|
|
buf = buf->b_next) {
|
|
ASSERT3U(bufcnt, !=, 0);
|
|
buffers++;
|
|
|
|
/*
|
|
* When the arc_buf_t is sharing the data
|
|
* block with the hdr, the owner of the
|
|
* reference belongs to the hdr. Only
|
|
* add to the refcount if the arc_buf_t is
|
|
* not shared.
|
|
*/
|
|
if (arc_buf_is_shared(buf))
|
|
continue;
|
|
|
|
(void) refcount_add_many(&new_state->arcs_size,
|
|
arc_buf_size(buf), buf);
|
|
}
|
|
ASSERT3U(bufcnt, ==, buffers);
|
|
|
|
if (hdr->b_l1hdr.b_pabd != NULL) {
|
|
(void) refcount_add_many(&new_state->arcs_size,
|
|
arc_hdr_size(hdr), hdr);
|
|
}
|
|
|
|
if (HDR_HAS_RABD(hdr)) {
|
|
(void) refcount_add_many(&new_state->arcs_size,
|
|
HDR_GET_PSIZE(hdr), hdr);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (update_old && old_state != arc_l2c_only) {
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
if (GHOST_STATE(old_state)) {
|
|
ASSERT0(bufcnt);
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
|
|
/*
|
|
* When moving a header off of a ghost state,
|
|
* the header will not contain any arc buffers.
|
|
* We use the arc header pointer for the reference
|
|
* which is exactly what we did when we put the
|
|
* header on the ghost state.
|
|
*/
|
|
|
|
(void) refcount_remove_many(&old_state->arcs_size,
|
|
HDR_GET_LSIZE(hdr), hdr);
|
|
} else {
|
|
uint32_t buffers = 0;
|
|
|
|
/*
|
|
* Each individual buffer holds a unique reference,
|
|
* thus we must remove each of these references one
|
|
* at a time.
|
|
*/
|
|
for (arc_buf_t *buf = hdr->b_l1hdr.b_buf; buf != NULL;
|
|
buf = buf->b_next) {
|
|
ASSERT3U(bufcnt, !=, 0);
|
|
buffers++;
|
|
|
|
/*
|
|
* When the arc_buf_t is sharing the data
|
|
* block with the hdr, the owner of the
|
|
* reference belongs to the hdr. Only
|
|
* add to the refcount if the arc_buf_t is
|
|
* not shared.
|
|
*/
|
|
if (arc_buf_is_shared(buf))
|
|
continue;
|
|
|
|
(void) refcount_remove_many(
|
|
&old_state->arcs_size, arc_buf_size(buf),
|
|
buf);
|
|
}
|
|
ASSERT3U(bufcnt, ==, buffers);
|
|
ASSERT(hdr->b_l1hdr.b_pabd != NULL ||
|
|
HDR_HAS_RABD(hdr));
|
|
|
|
if (hdr->b_l1hdr.b_pabd != NULL) {
|
|
(void) refcount_remove_many(
|
|
&old_state->arcs_size, arc_hdr_size(hdr),
|
|
hdr);
|
|
}
|
|
|
|
if (HDR_HAS_RABD(hdr)) {
|
|
(void) refcount_remove_many(
|
|
&old_state->arcs_size, HDR_GET_PSIZE(hdr),
|
|
hdr);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (HDR_HAS_L1HDR(hdr))
|
|
hdr->b_l1hdr.b_state = new_state;
|
|
|
|
/*
|
|
* L2 headers should never be on the L2 state list since they don't
|
|
* have L1 headers allocated.
|
|
*/
|
|
ASSERT(multilist_is_empty(arc_l2c_only->arcs_list[ARC_BUFC_DATA]) &&
|
|
multilist_is_empty(arc_l2c_only->arcs_list[ARC_BUFC_METADATA]));
|
|
}
|
|
|
|
void
|
|
arc_space_consume(uint64_t space, arc_space_type_t type)
|
|
{
|
|
ASSERT(type >= 0 && type < ARC_SPACE_NUMTYPES);
|
|
|
|
switch (type) {
|
|
default:
|
|
break;
|
|
case ARC_SPACE_DATA:
|
|
ARCSTAT_INCR(arcstat_data_size, space);
|
|
break;
|
|
case ARC_SPACE_META:
|
|
ARCSTAT_INCR(arcstat_metadata_size, space);
|
|
break;
|
|
case ARC_SPACE_BONUS:
|
|
ARCSTAT_INCR(arcstat_bonus_size, space);
|
|
break;
|
|
case ARC_SPACE_DNODE:
|
|
ARCSTAT_INCR(arcstat_dnode_size, space);
|
|
break;
|
|
case ARC_SPACE_DBUF:
|
|
ARCSTAT_INCR(arcstat_dbuf_size, space);
|
|
break;
|
|
case ARC_SPACE_HDRS:
|
|
ARCSTAT_INCR(arcstat_hdr_size, space);
|
|
break;
|
|
case ARC_SPACE_L2HDRS:
|
|
ARCSTAT_INCR(arcstat_l2_hdr_size, space);
|
|
break;
|
|
}
|
|
|
|
if (type != ARC_SPACE_DATA)
|
|
ARCSTAT_INCR(arcstat_meta_used, space);
|
|
|
|
atomic_add_64(&arc_size, space);
|
|
}
|
|
|
|
void
|
|
arc_space_return(uint64_t space, arc_space_type_t type)
|
|
{
|
|
ASSERT(type >= 0 && type < ARC_SPACE_NUMTYPES);
|
|
|
|
switch (type) {
|
|
default:
|
|
break;
|
|
case ARC_SPACE_DATA:
|
|
ARCSTAT_INCR(arcstat_data_size, -space);
|
|
break;
|
|
case ARC_SPACE_META:
|
|
ARCSTAT_INCR(arcstat_metadata_size, -space);
|
|
break;
|
|
case ARC_SPACE_BONUS:
|
|
ARCSTAT_INCR(arcstat_bonus_size, -space);
|
|
break;
|
|
case ARC_SPACE_DNODE:
|
|
ARCSTAT_INCR(arcstat_dnode_size, -space);
|
|
break;
|
|
case ARC_SPACE_DBUF:
|
|
ARCSTAT_INCR(arcstat_dbuf_size, -space);
|
|
break;
|
|
case ARC_SPACE_HDRS:
|
|
ARCSTAT_INCR(arcstat_hdr_size, -space);
|
|
break;
|
|
case ARC_SPACE_L2HDRS:
|
|
ARCSTAT_INCR(arcstat_l2_hdr_size, -space);
|
|
break;
|
|
}
|
|
|
|
if (type != ARC_SPACE_DATA) {
|
|
ASSERT(arc_meta_used >= space);
|
|
if (arc_meta_max < arc_meta_used)
|
|
arc_meta_max = arc_meta_used;
|
|
ARCSTAT_INCR(arcstat_meta_used, -space);
|
|
}
|
|
|
|
ASSERT(arc_size >= space);
|
|
atomic_add_64(&arc_size, -space);
|
|
}
|
|
|
|
/*
|
|
* Given a hdr and a buf, returns whether that buf can share its b_data buffer
|
|
* with the hdr's b_pabd.
|
|
*/
|
|
static boolean_t
|
|
arc_can_share(arc_buf_hdr_t *hdr, arc_buf_t *buf)
|
|
{
|
|
/*
|
|
* The criteria for sharing a hdr's data are:
|
|
* 1. the buffer is not encrypted
|
|
* 2. the hdr's compression matches the buf's compression
|
|
* 3. the hdr doesn't need to be byteswapped
|
|
* 4. the hdr isn't already being shared
|
|
* 5. the buf is either compressed or it is the last buf in the hdr list
|
|
*
|
|
* Criterion #5 maintains the invariant that shared uncompressed
|
|
* bufs must be the final buf in the hdr's b_buf list. Reading this, you
|
|
* might ask, "if a compressed buf is allocated first, won't that be the
|
|
* last thing in the list?", but in that case it's impossible to create
|
|
* a shared uncompressed buf anyway (because the hdr must be compressed
|
|
* to have the compressed buf). You might also think that #3 is
|
|
* sufficient to make this guarantee, however it's possible
|
|
* (specifically in the rare L2ARC write race mentioned in
|
|
* arc_buf_alloc_impl()) there will be an existing uncompressed buf that
|
|
* is sharable, but wasn't at the time of its allocation. Rather than
|
|
* allow a new shared uncompressed buf to be created and then shuffle
|
|
* the list around to make it the last element, this simply disallows
|
|
* sharing if the new buf isn't the first to be added.
|
|
*/
|
|
ASSERT3P(buf->b_hdr, ==, hdr);
|
|
boolean_t hdr_compressed =
|
|
arc_hdr_get_compress(hdr) != ZIO_COMPRESS_OFF;
|
|
boolean_t buf_compressed = ARC_BUF_COMPRESSED(buf) != 0;
|
|
return (!ARC_BUF_ENCRYPTED(buf) &&
|
|
buf_compressed == hdr_compressed &&
|
|
hdr->b_l1hdr.b_byteswap == DMU_BSWAP_NUMFUNCS &&
|
|
!HDR_SHARED_DATA(hdr) &&
|
|
(ARC_BUF_LAST(buf) || ARC_BUF_COMPRESSED(buf)));
|
|
}
|
|
|
|
/*
|
|
* Allocate a buf for this hdr. If you care about the data that's in the hdr,
|
|
* or if you want a compressed buffer, pass those flags in. Returns 0 if the
|
|
* copy was made successfully, or an error code otherwise.
|
|
*/
|
|
static int
|
|
arc_buf_alloc_impl(arc_buf_hdr_t *hdr, spa_t *spa, uint64_t dsobj, void *tag,
|
|
boolean_t encrypted, boolean_t compressed, boolean_t noauth,
|
|
boolean_t fill, arc_buf_t **ret)
|
|
{
|
|
arc_buf_t *buf;
|
|
arc_fill_flags_t flags = ARC_FILL_LOCKED;
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT3U(HDR_GET_LSIZE(hdr), >, 0);
|
|
VERIFY(hdr->b_type == ARC_BUFC_DATA ||
|
|
hdr->b_type == ARC_BUFC_METADATA);
|
|
ASSERT3P(ret, !=, NULL);
|
|
ASSERT3P(*ret, ==, NULL);
|
|
IMPLY(encrypted, compressed);
|
|
|
|
hdr->b_l1hdr.b_mru_hits = 0;
|
|
hdr->b_l1hdr.b_mru_ghost_hits = 0;
|
|
hdr->b_l1hdr.b_mfu_hits = 0;
|
|
hdr->b_l1hdr.b_mfu_ghost_hits = 0;
|
|
hdr->b_l1hdr.b_l2_hits = 0;
|
|
|
|
buf = *ret = kmem_cache_alloc(buf_cache, KM_PUSHPAGE);
|
|
buf->b_hdr = hdr;
|
|
buf->b_data = NULL;
|
|
buf->b_next = hdr->b_l1hdr.b_buf;
|
|
buf->b_flags = 0;
|
|
|
|
add_reference(hdr, tag);
|
|
|
|
/*
|
|
* We're about to change the hdr's b_flags. We must either
|
|
* hold the hash_lock or be undiscoverable.
|
|
*/
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)) || HDR_EMPTY(hdr));
|
|
|
|
/*
|
|
* Only honor requests for compressed bufs if the hdr is actually
|
|
* compressed. This must be overriden if the buffer is encrypted since
|
|
* encrypted buffers cannot be decompressed.
|
|
*/
|
|
if (encrypted) {
|
|
buf->b_flags |= ARC_BUF_FLAG_COMPRESSED;
|
|
buf->b_flags |= ARC_BUF_FLAG_ENCRYPTED;
|
|
flags |= ARC_FILL_COMPRESSED | ARC_FILL_ENCRYPTED;
|
|
} else if (compressed &&
|
|
arc_hdr_get_compress(hdr) != ZIO_COMPRESS_OFF) {
|
|
buf->b_flags |= ARC_BUF_FLAG_COMPRESSED;
|
|
flags |= ARC_FILL_COMPRESSED;
|
|
}
|
|
|
|
if (noauth) {
|
|
ASSERT0(encrypted);
|
|
flags |= ARC_FILL_NOAUTH;
|
|
}
|
|
|
|
/*
|
|
* If the hdr's data can be shared then we share the data buffer and
|
|
* set the appropriate bit in the hdr's b_flags to indicate the hdr is
|
|
* allocate a new buffer to store the buf's data.
|
|
*
|
|
* There are two additional restrictions here because we're sharing
|
|
* hdr -> buf instead of the usual buf -> hdr. First, the hdr can't be
|
|
* actively involved in an L2ARC write, because if this buf is used by
|
|
* an arc_write() then the hdr's data buffer will be released when the
|
|
* write completes, even though the L2ARC write might still be using it.
|
|
* Second, the hdr's ABD must be linear so that the buf's user doesn't
|
|
* need to be ABD-aware.
|
|
*/
|
|
boolean_t can_share = arc_can_share(hdr, buf) && !HDR_L2_WRITING(hdr) &&
|
|
hdr->b_l1hdr.b_pabd != NULL && abd_is_linear(hdr->b_l1hdr.b_pabd);
|
|
|
|
/* Set up b_data and sharing */
|
|
if (can_share) {
|
|
buf->b_data = abd_to_buf(hdr->b_l1hdr.b_pabd);
|
|
buf->b_flags |= ARC_BUF_FLAG_SHARED;
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_SHARED_DATA);
|
|
} else {
|
|
buf->b_data =
|
|
arc_get_data_buf(hdr, arc_buf_size(buf), buf);
|
|
ARCSTAT_INCR(arcstat_overhead_size, arc_buf_size(buf));
|
|
}
|
|
VERIFY3P(buf->b_data, !=, NULL);
|
|
|
|
hdr->b_l1hdr.b_buf = buf;
|
|
hdr->b_l1hdr.b_bufcnt += 1;
|
|
if (encrypted)
|
|
hdr->b_crypt_hdr.b_ebufcnt += 1;
|
|
|
|
/*
|
|
* If the user wants the data from the hdr, we need to either copy or
|
|
* decompress the data.
|
|
*/
|
|
if (fill) {
|
|
return (arc_buf_fill(buf, spa, dsobj, flags));
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
static char *arc_onloan_tag = "onloan";
|
|
|
|
static inline void
|
|
arc_loaned_bytes_update(int64_t delta)
|
|
{
|
|
atomic_add_64(&arc_loaned_bytes, delta);
|
|
|
|
/* assert that it did not wrap around */
|
|
ASSERT3S(atomic_add_64_nv(&arc_loaned_bytes, 0), >=, 0);
|
|
}
|
|
|
|
/*
|
|
* Loan out an anonymous arc buffer. Loaned buffers are not counted as in
|
|
* flight data by arc_tempreserve_space() until they are "returned". Loaned
|
|
* buffers must be returned to the arc before they can be used by the DMU or
|
|
* freed.
|
|
*/
|
|
arc_buf_t *
|
|
arc_loan_buf(spa_t *spa, boolean_t is_metadata, int size)
|
|
{
|
|
arc_buf_t *buf = arc_alloc_buf(spa, arc_onloan_tag,
|
|
is_metadata ? ARC_BUFC_METADATA : ARC_BUFC_DATA, size);
|
|
|
|
arc_loaned_bytes_update(size);
|
|
|
|
return (buf);
|
|
}
|
|
|
|
arc_buf_t *
|
|
arc_loan_compressed_buf(spa_t *spa, uint64_t psize, uint64_t lsize,
|
|
enum zio_compress compression_type)
|
|
{
|
|
arc_buf_t *buf = arc_alloc_compressed_buf(spa, arc_onloan_tag,
|
|
psize, lsize, compression_type);
|
|
|
|
arc_loaned_bytes_update(psize);
|
|
|
|
return (buf);
|
|
}
|
|
|
|
arc_buf_t *
|
|
arc_loan_raw_buf(spa_t *spa, uint64_t dsobj, boolean_t byteorder,
|
|
const uint8_t *salt, const uint8_t *iv, const uint8_t *mac,
|
|
dmu_object_type_t ot, uint64_t psize, uint64_t lsize,
|
|
enum zio_compress compression_type)
|
|
{
|
|
arc_buf_t *buf = arc_alloc_raw_buf(spa, arc_onloan_tag, dsobj,
|
|
byteorder, salt, iv, mac, ot, psize, lsize, compression_type);
|
|
|
|
atomic_add_64(&arc_loaned_bytes, psize);
|
|
return (buf);
|
|
}
|
|
|
|
|
|
/*
|
|
* Return a loaned arc buffer to the arc.
|
|
*/
|
|
void
|
|
arc_return_buf(arc_buf_t *buf, void *tag)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
ASSERT3P(buf->b_data, !=, NULL);
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
(void) refcount_add(&hdr->b_l1hdr.b_refcnt, tag);
|
|
(void) refcount_remove(&hdr->b_l1hdr.b_refcnt, arc_onloan_tag);
|
|
|
|
arc_loaned_bytes_update(-arc_buf_size(buf));
|
|
}
|
|
|
|
/* Detach an arc_buf from a dbuf (tag) */
|
|
void
|
|
arc_loan_inuse_buf(arc_buf_t *buf, void *tag)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
ASSERT3P(buf->b_data, !=, NULL);
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
(void) refcount_add(&hdr->b_l1hdr.b_refcnt, arc_onloan_tag);
|
|
(void) refcount_remove(&hdr->b_l1hdr.b_refcnt, tag);
|
|
|
|
arc_loaned_bytes_update(arc_buf_size(buf));
|
|
}
|
|
|
|
static void
|
|
l2arc_free_abd_on_write(abd_t *abd, size_t size, arc_buf_contents_t type)
|
|
{
|
|
l2arc_data_free_t *df = kmem_alloc(sizeof (*df), KM_SLEEP);
|
|
|
|
df->l2df_abd = abd;
|
|
df->l2df_size = size;
|
|
df->l2df_type = type;
|
|
mutex_enter(&l2arc_free_on_write_mtx);
|
|
list_insert_head(l2arc_free_on_write, df);
|
|
mutex_exit(&l2arc_free_on_write_mtx);
|
|
}
|
|
|
|
static void
|
|
arc_hdr_free_on_write(arc_buf_hdr_t *hdr, boolean_t free_rdata)
|
|
{
|
|
arc_state_t *state = hdr->b_l1hdr.b_state;
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
uint64_t size = (free_rdata) ? HDR_GET_PSIZE(hdr) : arc_hdr_size(hdr);
|
|
|
|
/* protected by hash lock, if in the hash table */
|
|
if (multilist_link_active(&hdr->b_l1hdr.b_arc_node)) {
|
|
ASSERT(refcount_is_zero(&hdr->b_l1hdr.b_refcnt));
|
|
ASSERT(state != arc_anon && state != arc_l2c_only);
|
|
|
|
(void) refcount_remove_many(&state->arcs_esize[type],
|
|
size, hdr);
|
|
}
|
|
(void) refcount_remove_many(&state->arcs_size, size, hdr);
|
|
if (type == ARC_BUFC_METADATA) {
|
|
arc_space_return(size, ARC_SPACE_META);
|
|
} else {
|
|
ASSERT(type == ARC_BUFC_DATA);
|
|
arc_space_return(size, ARC_SPACE_DATA);
|
|
}
|
|
|
|
if (free_rdata) {
|
|
l2arc_free_abd_on_write(hdr->b_crypt_hdr.b_rabd, size, type);
|
|
} else {
|
|
l2arc_free_abd_on_write(hdr->b_l1hdr.b_pabd, size, type);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Share the arc_buf_t's data with the hdr. Whenever we are sharing the
|
|
* data buffer, we transfer the refcount ownership to the hdr and update
|
|
* the appropriate kstats.
|
|
*/
|
|
static void
|
|
arc_share_buf(arc_buf_hdr_t *hdr, arc_buf_t *buf)
|
|
{
|
|
ASSERT(arc_can_share(hdr, buf));
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!ARC_BUF_ENCRYPTED(buf));
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)) || HDR_EMPTY(hdr));
|
|
|
|
/*
|
|
* Start sharing the data buffer. We transfer the
|
|
* refcount ownership to the hdr since it always owns
|
|
* the refcount whenever an arc_buf_t is shared.
|
|
*/
|
|
refcount_transfer_ownership(&hdr->b_l1hdr.b_state->arcs_size, buf, hdr);
|
|
hdr->b_l1hdr.b_pabd = abd_get_from_buf(buf->b_data, arc_buf_size(buf));
|
|
abd_take_ownership_of_buf(hdr->b_l1hdr.b_pabd,
|
|
HDR_ISTYPE_METADATA(hdr));
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_SHARED_DATA);
|
|
buf->b_flags |= ARC_BUF_FLAG_SHARED;
|
|
|
|
/*
|
|
* Since we've transferred ownership to the hdr we need
|
|
* to increment its compressed and uncompressed kstats and
|
|
* decrement the overhead size.
|
|
*/
|
|
ARCSTAT_INCR(arcstat_compressed_size, arc_hdr_size(hdr));
|
|
ARCSTAT_INCR(arcstat_uncompressed_size, HDR_GET_LSIZE(hdr));
|
|
ARCSTAT_INCR(arcstat_overhead_size, -arc_buf_size(buf));
|
|
}
|
|
|
|
static void
|
|
arc_unshare_buf(arc_buf_hdr_t *hdr, arc_buf_t *buf)
|
|
{
|
|
ASSERT(arc_buf_is_shared(buf));
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)) || HDR_EMPTY(hdr));
|
|
|
|
/*
|
|
* We are no longer sharing this buffer so we need
|
|
* to transfer its ownership to the rightful owner.
|
|
*/
|
|
refcount_transfer_ownership(&hdr->b_l1hdr.b_state->arcs_size, hdr, buf);
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_SHARED_DATA);
|
|
abd_release_ownership_of_buf(hdr->b_l1hdr.b_pabd);
|
|
abd_put(hdr->b_l1hdr.b_pabd);
|
|
hdr->b_l1hdr.b_pabd = NULL;
|
|
buf->b_flags &= ~ARC_BUF_FLAG_SHARED;
|
|
|
|
/*
|
|
* Since the buffer is no longer shared between
|
|
* the arc buf and the hdr, count it as overhead.
|
|
*/
|
|
ARCSTAT_INCR(arcstat_compressed_size, -arc_hdr_size(hdr));
|
|
ARCSTAT_INCR(arcstat_uncompressed_size, -HDR_GET_LSIZE(hdr));
|
|
ARCSTAT_INCR(arcstat_overhead_size, arc_buf_size(buf));
|
|
}
|
|
|
|
/*
|
|
* Remove an arc_buf_t from the hdr's buf list and return the last
|
|
* arc_buf_t on the list. If no buffers remain on the list then return
|
|
* NULL.
|
|
*/
|
|
static arc_buf_t *
|
|
arc_buf_remove(arc_buf_hdr_t *hdr, arc_buf_t *buf)
|
|
{
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)) || HDR_EMPTY(hdr));
|
|
|
|
arc_buf_t **bufp = &hdr->b_l1hdr.b_buf;
|
|
arc_buf_t *lastbuf = NULL;
|
|
|
|
/*
|
|
* Remove the buf from the hdr list and locate the last
|
|
* remaining buffer on the list.
|
|
*/
|
|
while (*bufp != NULL) {
|
|
if (*bufp == buf)
|
|
*bufp = buf->b_next;
|
|
|
|
/*
|
|
* If we've removed a buffer in the middle of
|
|
* the list then update the lastbuf and update
|
|
* bufp.
|
|
*/
|
|
if (*bufp != NULL) {
|
|
lastbuf = *bufp;
|
|
bufp = &(*bufp)->b_next;
|
|
}
|
|
}
|
|
buf->b_next = NULL;
|
|
ASSERT3P(lastbuf, !=, buf);
|
|
IMPLY(hdr->b_l1hdr.b_bufcnt > 0, lastbuf != NULL);
|
|
IMPLY(hdr->b_l1hdr.b_bufcnt > 0, hdr->b_l1hdr.b_buf != NULL);
|
|
IMPLY(lastbuf != NULL, ARC_BUF_LAST(lastbuf));
|
|
|
|
return (lastbuf);
|
|
}
|
|
|
|
/*
|
|
* Free up buf->b_data and pull the arc_buf_t off of the the arc_buf_hdr_t's
|
|
* list and free it.
|
|
*/
|
|
static void
|
|
arc_buf_destroy_impl(arc_buf_t *buf)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
/*
|
|
* Free up the data associated with the buf but only if we're not
|
|
* sharing this with the hdr. If we are sharing it with the hdr, the
|
|
* hdr is responsible for doing the free.
|
|
*/
|
|
if (buf->b_data != NULL) {
|
|
/*
|
|
* We're about to change the hdr's b_flags. We must either
|
|
* hold the hash_lock or be undiscoverable.
|
|
*/
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)) || HDR_EMPTY(hdr));
|
|
|
|
arc_cksum_verify(buf);
|
|
arc_buf_unwatch(buf);
|
|
|
|
if (arc_buf_is_shared(buf)) {
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_SHARED_DATA);
|
|
} else {
|
|
uint64_t size = arc_buf_size(buf);
|
|
arc_free_data_buf(hdr, buf->b_data, size, buf);
|
|
ARCSTAT_INCR(arcstat_overhead_size, -size);
|
|
}
|
|
buf->b_data = NULL;
|
|
|
|
ASSERT(hdr->b_l1hdr.b_bufcnt > 0);
|
|
hdr->b_l1hdr.b_bufcnt -= 1;
|
|
|
|
if (ARC_BUF_ENCRYPTED(buf)) {
|
|
hdr->b_crypt_hdr.b_ebufcnt -= 1;
|
|
|
|
/*
|
|
* If we have no more encrypted buffers and we've
|
|
* already gotten a copy of the decrypted data we can
|
|
* free b_rabd to save some space.
|
|
*/
|
|
if (hdr->b_crypt_hdr.b_ebufcnt == 0 &&
|
|
HDR_HAS_RABD(hdr) && hdr->b_l1hdr.b_pabd != NULL &&
|
|
!HDR_IO_IN_PROGRESS(hdr)) {
|
|
arc_hdr_free_abd(hdr, B_TRUE);
|
|
}
|
|
}
|
|
}
|
|
|
|
arc_buf_t *lastbuf = arc_buf_remove(hdr, buf);
|
|
|
|
if (ARC_BUF_SHARED(buf) && !ARC_BUF_COMPRESSED(buf)) {
|
|
/*
|
|
* If the current arc_buf_t is sharing its data buffer with the
|
|
* hdr, then reassign the hdr's b_pabd to share it with the new
|
|
* buffer at the end of the list. The shared buffer is always
|
|
* the last one on the hdr's buffer list.
|
|
*
|
|
* There is an equivalent case for compressed bufs, but since
|
|
* they aren't guaranteed to be the last buf in the list and
|
|
* that is an exceedingly rare case, we just allow that space be
|
|
* wasted temporarily. We must also be careful not to share
|
|
* encrypted buffers, since they cannot be shared.
|
|
*/
|
|
if (lastbuf != NULL && !ARC_BUF_ENCRYPTED(lastbuf)) {
|
|
/* Only one buf can be shared at once */
|
|
VERIFY(!arc_buf_is_shared(lastbuf));
|
|
/* hdr is uncompressed so can't have compressed buf */
|
|
VERIFY(!ARC_BUF_COMPRESSED(lastbuf));
|
|
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
arc_hdr_free_abd(hdr, B_FALSE);
|
|
|
|
/*
|
|
* We must setup a new shared block between the
|
|
* last buffer and the hdr. The data would have
|
|
* been allocated by the arc buf so we need to transfer
|
|
* ownership to the hdr since it's now being shared.
|
|
*/
|
|
arc_share_buf(hdr, lastbuf);
|
|
}
|
|
} else if (HDR_SHARED_DATA(hdr)) {
|
|
/*
|
|
* Uncompressed shared buffers are always at the end
|
|
* of the list. Compressed buffers don't have the
|
|
* same requirements. This makes it hard to
|
|
* simply assert that the lastbuf is shared so
|
|
* we rely on the hdr's compression flags to determine
|
|
* if we have a compressed, shared buffer.
|
|
*/
|
|
ASSERT3P(lastbuf, !=, NULL);
|
|
ASSERT(arc_buf_is_shared(lastbuf) ||
|
|
arc_hdr_get_compress(hdr) != ZIO_COMPRESS_OFF);
|
|
}
|
|
|
|
/*
|
|
* Free the checksum if we're removing the last uncompressed buf from
|
|
* this hdr.
|
|
*/
|
|
if (!arc_hdr_has_uncompressed_buf(hdr)) {
|
|
arc_cksum_free(hdr);
|
|
}
|
|
|
|
/* clean up the buf */
|
|
buf->b_hdr = NULL;
|
|
kmem_cache_free(buf_cache, buf);
|
|
}
|
|
|
|
static void
|
|
arc_hdr_alloc_abd(arc_buf_hdr_t *hdr, boolean_t alloc_rdata)
|
|
{
|
|
uint64_t size;
|
|
|
|
ASSERT3U(HDR_GET_LSIZE(hdr), >, 0);
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT(!HDR_SHARED_DATA(hdr) || alloc_rdata);
|
|
IMPLY(alloc_rdata, HDR_PROTECTED(hdr));
|
|
|
|
if (alloc_rdata) {
|
|
size = HDR_GET_PSIZE(hdr);
|
|
ASSERT3P(hdr->b_crypt_hdr.b_rabd, ==, NULL);
|
|
hdr->b_crypt_hdr.b_rabd = arc_get_data_abd(hdr, size, hdr);
|
|
ASSERT3P(hdr->b_crypt_hdr.b_rabd, !=, NULL);
|
|
ARCSTAT_INCR(arcstat_raw_size, size);
|
|
} else {
|
|
size = arc_hdr_size(hdr);
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
hdr->b_l1hdr.b_pabd = arc_get_data_abd(hdr, size, hdr);
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
}
|
|
|
|
ARCSTAT_INCR(arcstat_compressed_size, size);
|
|
ARCSTAT_INCR(arcstat_uncompressed_size, HDR_GET_LSIZE(hdr));
|
|
}
|
|
|
|
static void
|
|
arc_hdr_free_abd(arc_buf_hdr_t *hdr, boolean_t free_rdata)
|
|
{
|
|
uint64_t size = (free_rdata) ? HDR_GET_PSIZE(hdr) : arc_hdr_size(hdr);
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT(hdr->b_l1hdr.b_pabd != NULL || HDR_HAS_RABD(hdr));
|
|
IMPLY(free_rdata, HDR_HAS_RABD(hdr));
|
|
|
|
/*
|
|
* If the hdr is currently being written to the l2arc then
|
|
* we defer freeing the data by adding it to the l2arc_free_on_write
|
|
* list. The l2arc will free the data once it's finished
|
|
* writing it to the l2arc device.
|
|
*/
|
|
if (HDR_L2_WRITING(hdr)) {
|
|
arc_hdr_free_on_write(hdr, free_rdata);
|
|
ARCSTAT_BUMP(arcstat_l2_free_on_write);
|
|
} else if (free_rdata) {
|
|
arc_free_data_abd(hdr, hdr->b_crypt_hdr.b_rabd, size, hdr);
|
|
} else {
|
|
arc_free_data_abd(hdr, hdr->b_l1hdr.b_pabd, size, hdr);
|
|
}
|
|
|
|
if (free_rdata) {
|
|
hdr->b_crypt_hdr.b_rabd = NULL;
|
|
ARCSTAT_INCR(arcstat_raw_size, -size);
|
|
} else {
|
|
hdr->b_l1hdr.b_pabd = NULL;
|
|
}
|
|
|
|
if (hdr->b_l1hdr.b_pabd == NULL && !HDR_HAS_RABD(hdr))
|
|
hdr->b_l1hdr.b_byteswap = DMU_BSWAP_NUMFUNCS;
|
|
|
|
ARCSTAT_INCR(arcstat_compressed_size, -size);
|
|
ARCSTAT_INCR(arcstat_uncompressed_size, -HDR_GET_LSIZE(hdr));
|
|
}
|
|
|
|
static arc_buf_hdr_t *
|
|
arc_hdr_alloc(uint64_t spa, int32_t psize, int32_t lsize,
|
|
boolean_t protected, enum zio_compress compression_type,
|
|
arc_buf_contents_t type, boolean_t alloc_rdata)
|
|
{
|
|
arc_buf_hdr_t *hdr;
|
|
|
|
VERIFY(type == ARC_BUFC_DATA || type == ARC_BUFC_METADATA);
|
|
if (protected) {
|
|
hdr = kmem_cache_alloc(hdr_full_crypt_cache, KM_PUSHPAGE);
|
|
} else {
|
|
hdr = kmem_cache_alloc(hdr_full_cache, KM_PUSHPAGE);
|
|
}
|
|
|
|
ASSERT(HDR_EMPTY(hdr));
|
|
ASSERT3P(hdr->b_l1hdr.b_freeze_cksum, ==, NULL);
|
|
HDR_SET_PSIZE(hdr, psize);
|
|
HDR_SET_LSIZE(hdr, lsize);
|
|
hdr->b_spa = spa;
|
|
hdr->b_type = type;
|
|
hdr->b_flags = 0;
|
|
arc_hdr_set_flags(hdr, arc_bufc_to_flags(type) | ARC_FLAG_HAS_L1HDR);
|
|
arc_hdr_set_compress(hdr, compression_type);
|
|
if (protected)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_PROTECTED);
|
|
|
|
hdr->b_l1hdr.b_state = arc_anon;
|
|
hdr->b_l1hdr.b_arc_access = 0;
|
|
hdr->b_l1hdr.b_bufcnt = 0;
|
|
hdr->b_l1hdr.b_buf = NULL;
|
|
|
|
/*
|
|
* Allocate the hdr's buffer. This will contain either
|
|
* the compressed or uncompressed data depending on the block
|
|
* it references and compressed arc enablement.
|
|
*/
|
|
arc_hdr_alloc_abd(hdr, alloc_rdata);
|
|
ASSERT(refcount_is_zero(&hdr->b_l1hdr.b_refcnt));
|
|
|
|
return (hdr);
|
|
}
|
|
|
|
/*
|
|
* Transition between the two allocation states for the arc_buf_hdr struct.
|
|
* The arc_buf_hdr struct can be allocated with (hdr_full_cache) or without
|
|
* (hdr_l2only_cache) the fields necessary for the L1 cache - the smaller
|
|
* version is used when a cache buffer is only in the L2ARC in order to reduce
|
|
* memory usage.
|
|
*/
|
|
static arc_buf_hdr_t *
|
|
arc_hdr_realloc(arc_buf_hdr_t *hdr, kmem_cache_t *old, kmem_cache_t *new)
|
|
{
|
|
ASSERT(HDR_HAS_L2HDR(hdr));
|
|
|
|
arc_buf_hdr_t *nhdr;
|
|
l2arc_dev_t *dev = hdr->b_l2hdr.b_dev;
|
|
|
|
ASSERT((old == hdr_full_cache && new == hdr_l2only_cache) ||
|
|
(old == hdr_l2only_cache && new == hdr_full_cache));
|
|
|
|
/*
|
|
* if the caller wanted a new full header and the header is to be
|
|
* encrypted we will actually allocate the header from the full crypt
|
|
* cache instead. The same applies to freeing from the old cache.
|
|
*/
|
|
if (HDR_PROTECTED(hdr) && new == hdr_full_cache)
|
|
new = hdr_full_crypt_cache;
|
|
if (HDR_PROTECTED(hdr) && old == hdr_full_cache)
|
|
old = hdr_full_crypt_cache;
|
|
|
|
nhdr = kmem_cache_alloc(new, KM_PUSHPAGE);
|
|
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)));
|
|
buf_hash_remove(hdr);
|
|
|
|
bcopy(hdr, nhdr, HDR_L2ONLY_SIZE);
|
|
|
|
if (new == hdr_full_cache || new == hdr_full_crypt_cache) {
|
|
arc_hdr_set_flags(nhdr, ARC_FLAG_HAS_L1HDR);
|
|
/*
|
|
* arc_access and arc_change_state need to be aware that a
|
|
* header has just come out of L2ARC, so we set its state to
|
|
* l2c_only even though it's about to change.
|
|
*/
|
|
nhdr->b_l1hdr.b_state = arc_l2c_only;
|
|
|
|
/* Verify previous threads set to NULL before freeing */
|
|
ASSERT3P(nhdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
} else {
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, ==, NULL);
|
|
ASSERT0(hdr->b_l1hdr.b_bufcnt);
|
|
ASSERT3P(hdr->b_l1hdr.b_freeze_cksum, ==, NULL);
|
|
|
|
/*
|
|
* If we've reached here, We must have been called from
|
|
* arc_evict_hdr(), as such we should have already been
|
|
* removed from any ghost list we were previously on
|
|
* (which protects us from racing with arc_evict_state),
|
|
* thus no locking is needed during this check.
|
|
*/
|
|
ASSERT(!multilist_link_active(&hdr->b_l1hdr.b_arc_node));
|
|
|
|
/*
|
|
* A buffer must not be moved into the arc_l2c_only
|
|
* state if it's not finished being written out to the
|
|
* l2arc device. Otherwise, the b_l1hdr.b_pabd field
|
|
* might try to be accessed, even though it was removed.
|
|
*/
|
|
VERIFY(!HDR_L2_WRITING(hdr));
|
|
VERIFY3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
|
|
arc_hdr_clear_flags(nhdr, ARC_FLAG_HAS_L1HDR);
|
|
}
|
|
/*
|
|
* The header has been reallocated so we need to re-insert it into any
|
|
* lists it was on.
|
|
*/
|
|
(void) buf_hash_insert(nhdr, NULL);
|
|
|
|
ASSERT(list_link_active(&hdr->b_l2hdr.b_l2node));
|
|
|
|
mutex_enter(&dev->l2ad_mtx);
|
|
|
|
/*
|
|
* We must place the realloc'ed header back into the list at
|
|
* the same spot. Otherwise, if it's placed earlier in the list,
|
|
* l2arc_write_buffers() could find it during the function's
|
|
* write phase, and try to write it out to the l2arc.
|
|
*/
|
|
list_insert_after(&dev->l2ad_buflist, hdr, nhdr);
|
|
list_remove(&dev->l2ad_buflist, hdr);
|
|
|
|
mutex_exit(&dev->l2ad_mtx);
|
|
|
|
/*
|
|
* Since we're using the pointer address as the tag when
|
|
* incrementing and decrementing the l2ad_alloc refcount, we
|
|
* must remove the old pointer (that we're about to destroy) and
|
|
* add the new pointer to the refcount. Otherwise we'd remove
|
|
* the wrong pointer address when calling arc_hdr_destroy() later.
|
|
*/
|
|
|
|
(void) refcount_remove_many(&dev->l2ad_alloc, arc_hdr_size(hdr), hdr);
|
|
(void) refcount_add_many(&dev->l2ad_alloc, arc_hdr_size(nhdr), nhdr);
|
|
|
|
buf_discard_identity(hdr);
|
|
kmem_cache_free(old, hdr);
|
|
|
|
return (nhdr);
|
|
}
|
|
|
|
/*
|
|
* This function allows an L1 header to be reallocated as a crypt
|
|
* header and vice versa. If we are going to a crypt header, the
|
|
* new fields will be zeroed out.
|
|
*/
|
|
static arc_buf_hdr_t *
|
|
arc_hdr_realloc_crypt(arc_buf_hdr_t *hdr, boolean_t need_crypt)
|
|
{
|
|
arc_buf_hdr_t *nhdr;
|
|
arc_buf_t *buf;
|
|
kmem_cache_t *ncache, *ocache;
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT3U(!!HDR_PROTECTED(hdr), !=, need_crypt);
|
|
ASSERT3P(hdr->b_l1hdr.b_state, ==, arc_anon);
|
|
ASSERT(!multilist_link_active(&hdr->b_l1hdr.b_arc_node));
|
|
|
|
if (need_crypt) {
|
|
ncache = hdr_full_crypt_cache;
|
|
ocache = hdr_full_cache;
|
|
} else {
|
|
ncache = hdr_full_cache;
|
|
ocache = hdr_full_crypt_cache;
|
|
}
|
|
|
|
nhdr = kmem_cache_alloc(ncache, KM_PUSHPAGE);
|
|
bcopy(hdr, nhdr, HDR_L2ONLY_SIZE);
|
|
nhdr->b_l1hdr.b_freeze_cksum = hdr->b_l1hdr.b_freeze_cksum;
|
|
nhdr->b_l1hdr.b_bufcnt = hdr->b_l1hdr.b_bufcnt;
|
|
nhdr->b_l1hdr.b_byteswap = hdr->b_l1hdr.b_byteswap;
|
|
nhdr->b_l1hdr.b_state = hdr->b_l1hdr.b_state;
|
|
nhdr->b_l1hdr.b_arc_access = hdr->b_l1hdr.b_arc_access;
|
|
nhdr->b_l1hdr.b_mru_hits = hdr->b_l1hdr.b_mru_hits;
|
|
nhdr->b_l1hdr.b_mru_ghost_hits = hdr->b_l1hdr.b_mru_ghost_hits;
|
|
nhdr->b_l1hdr.b_mfu_hits = hdr->b_l1hdr.b_mfu_hits;
|
|
nhdr->b_l1hdr.b_mfu_ghost_hits = hdr->b_l1hdr.b_mfu_ghost_hits;
|
|
nhdr->b_l1hdr.b_l2_hits = hdr->b_l1hdr.b_l2_hits;
|
|
nhdr->b_l1hdr.b_acb = hdr->b_l1hdr.b_acb;
|
|
nhdr->b_l1hdr.b_pabd = hdr->b_l1hdr.b_pabd;
|
|
nhdr->b_l1hdr.b_buf = hdr->b_l1hdr.b_buf;
|
|
|
|
/*
|
|
* This refcount_add() exists only to ensure that the individual
|
|
* arc buffers always point to a header that is referenced, avoiding
|
|
* a small race condition that could trigger ASSERTs.
|
|
*/
|
|
(void) refcount_add(&nhdr->b_l1hdr.b_refcnt, FTAG);
|
|
|
|
for (buf = nhdr->b_l1hdr.b_buf; buf != NULL; buf = buf->b_next) {
|
|
mutex_enter(&buf->b_evict_lock);
|
|
buf->b_hdr = nhdr;
|
|
mutex_exit(&buf->b_evict_lock);
|
|
}
|
|
|
|
refcount_transfer(&nhdr->b_l1hdr.b_refcnt, &hdr->b_l1hdr.b_refcnt);
|
|
(void) refcount_remove(&nhdr->b_l1hdr.b_refcnt, FTAG);
|
|
|
|
if (need_crypt) {
|
|
arc_hdr_set_flags(nhdr, ARC_FLAG_PROTECTED);
|
|
} else {
|
|
arc_hdr_clear_flags(nhdr, ARC_FLAG_PROTECTED);
|
|
}
|
|
|
|
buf_discard_identity(hdr);
|
|
kmem_cache_free(ocache, hdr);
|
|
|
|
return (nhdr);
|
|
}
|
|
|
|
/*
|
|
* This function is used by the send / receive code to convert a newly
|
|
* allocated arc_buf_t to one that is suitable for a raw encrypted write. It
|
|
* is also used to allow the root objset block to be uupdated without altering
|
|
* its embedded MACs. Both block types will always be uncompressed so we do not
|
|
* have to worry about compression type or psize.
|
|
*/
|
|
void
|
|
arc_convert_to_raw(arc_buf_t *buf, uint64_t dsobj, boolean_t byteorder,
|
|
dmu_object_type_t ot, const uint8_t *salt, const uint8_t *iv,
|
|
const uint8_t *mac)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
ASSERT(ot == DMU_OT_DNODE || ot == DMU_OT_OBJSET);
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT3P(hdr->b_l1hdr.b_state, ==, arc_anon);
|
|
|
|
buf->b_flags |= (ARC_BUF_FLAG_COMPRESSED | ARC_BUF_FLAG_ENCRYPTED);
|
|
if (!HDR_PROTECTED(hdr))
|
|
hdr = arc_hdr_realloc_crypt(hdr, B_TRUE);
|
|
hdr->b_crypt_hdr.b_dsobj = dsobj;
|
|
hdr->b_crypt_hdr.b_ot = ot;
|
|
hdr->b_l1hdr.b_byteswap = (byteorder == ZFS_HOST_BYTEORDER) ?
|
|
DMU_BSWAP_NUMFUNCS : DMU_OT_BYTESWAP(ot);
|
|
if (!arc_hdr_has_uncompressed_buf(hdr))
|
|
arc_cksum_free(hdr);
|
|
|
|
if (salt != NULL)
|
|
bcopy(salt, hdr->b_crypt_hdr.b_salt, ZIO_DATA_SALT_LEN);
|
|
if (iv != NULL)
|
|
bcopy(iv, hdr->b_crypt_hdr.b_iv, ZIO_DATA_IV_LEN);
|
|
if (mac != NULL)
|
|
bcopy(mac, hdr->b_crypt_hdr.b_mac, ZIO_DATA_MAC_LEN);
|
|
}
|
|
|
|
/*
|
|
* Allocate a new arc_buf_hdr_t and arc_buf_t and return the buf to the caller.
|
|
* The buf is returned thawed since we expect the consumer to modify it.
|
|
*/
|
|
arc_buf_t *
|
|
arc_alloc_buf(spa_t *spa, void *tag, arc_buf_contents_t type, int32_t size)
|
|
{
|
|
arc_buf_hdr_t *hdr = arc_hdr_alloc(spa_load_guid(spa), size, size,
|
|
B_FALSE, ZIO_COMPRESS_OFF, type, B_FALSE);
|
|
ASSERT(!MUTEX_HELD(HDR_LOCK(hdr)));
|
|
|
|
arc_buf_t *buf = NULL;
|
|
VERIFY0(arc_buf_alloc_impl(hdr, spa, 0, tag, B_FALSE, B_FALSE,
|
|
B_FALSE, B_FALSE, &buf));
|
|
arc_buf_thaw(buf);
|
|
|
|
return (buf);
|
|
}
|
|
|
|
/*
|
|
* Allocate a compressed buf in the same manner as arc_alloc_buf. Don't use this
|
|
* for bufs containing metadata.
|
|
*/
|
|
arc_buf_t *
|
|
arc_alloc_compressed_buf(spa_t *spa, void *tag, uint64_t psize, uint64_t lsize,
|
|
enum zio_compress compression_type)
|
|
{
|
|
ASSERT3U(lsize, >, 0);
|
|
ASSERT3U(lsize, >=, psize);
|
|
ASSERT3U(compression_type, >, ZIO_COMPRESS_OFF);
|
|
ASSERT3U(compression_type, <, ZIO_COMPRESS_FUNCTIONS);
|
|
|
|
arc_buf_hdr_t *hdr = arc_hdr_alloc(spa_load_guid(spa), psize, lsize,
|
|
B_FALSE, compression_type, ARC_BUFC_DATA, B_FALSE);
|
|
ASSERT(!MUTEX_HELD(HDR_LOCK(hdr)));
|
|
|
|
arc_buf_t *buf = NULL;
|
|
VERIFY0(arc_buf_alloc_impl(hdr, spa, 0, tag, B_FALSE,
|
|
B_TRUE, B_FALSE, B_FALSE, &buf));
|
|
arc_buf_thaw(buf);
|
|
ASSERT3P(hdr->b_l1hdr.b_freeze_cksum, ==, NULL);
|
|
|
|
if (!arc_buf_is_shared(buf)) {
|
|
/*
|
|
* To ensure that the hdr has the correct data in it if we call
|
|
* arc_untransform() on this buf before it's been written to
|
|
* disk, it's easiest if we just set up sharing between the
|
|
* buf and the hdr.
|
|
*/
|
|
ASSERT(!abd_is_linear(hdr->b_l1hdr.b_pabd));
|
|
arc_hdr_free_abd(hdr, B_FALSE);
|
|
arc_share_buf(hdr, buf);
|
|
}
|
|
|
|
return (buf);
|
|
}
|
|
|
|
arc_buf_t *
|
|
arc_alloc_raw_buf(spa_t *spa, void *tag, uint64_t dsobj, boolean_t byteorder,
|
|
const uint8_t *salt, const uint8_t *iv, const uint8_t *mac,
|
|
dmu_object_type_t ot, uint64_t psize, uint64_t lsize,
|
|
enum zio_compress compression_type)
|
|
{
|
|
arc_buf_hdr_t *hdr;
|
|
arc_buf_t *buf;
|
|
arc_buf_contents_t type = DMU_OT_IS_METADATA(ot) ?
|
|
ARC_BUFC_METADATA : ARC_BUFC_DATA;
|
|
|
|
ASSERT3U(lsize, >, 0);
|
|
ASSERT3U(lsize, >=, psize);
|
|
ASSERT3U(compression_type, >=, ZIO_COMPRESS_OFF);
|
|
ASSERT3U(compression_type, <, ZIO_COMPRESS_FUNCTIONS);
|
|
|
|
hdr = arc_hdr_alloc(spa_load_guid(spa), psize, lsize, B_TRUE,
|
|
compression_type, type, B_TRUE);
|
|
ASSERT(!MUTEX_HELD(HDR_LOCK(hdr)));
|
|
|
|
hdr->b_crypt_hdr.b_dsobj = dsobj;
|
|
hdr->b_crypt_hdr.b_ot = ot;
|
|
hdr->b_l1hdr.b_byteswap = (byteorder == ZFS_HOST_BYTEORDER) ?
|
|
DMU_BSWAP_NUMFUNCS : DMU_OT_BYTESWAP(ot);
|
|
bcopy(salt, hdr->b_crypt_hdr.b_salt, ZIO_DATA_SALT_LEN);
|
|
bcopy(iv, hdr->b_crypt_hdr.b_iv, ZIO_DATA_IV_LEN);
|
|
bcopy(mac, hdr->b_crypt_hdr.b_mac, ZIO_DATA_MAC_LEN);
|
|
|
|
/*
|
|
* This buffer will be considered encrypted even if the ot is not an
|
|
* encrypted type. It will become authenticated instead in
|
|
* arc_write_ready().
|
|
*/
|
|
buf = NULL;
|
|
VERIFY0(arc_buf_alloc_impl(hdr, spa, dsobj, tag, B_TRUE, B_TRUE,
|
|
B_FALSE, B_FALSE, &buf));
|
|
arc_buf_thaw(buf);
|
|
ASSERT3P(hdr->b_l1hdr.b_freeze_cksum, ==, NULL);
|
|
|
|
return (buf);
|
|
}
|
|
|
|
static void
|
|
arc_hdr_l2hdr_destroy(arc_buf_hdr_t *hdr)
|
|
{
|
|
l2arc_buf_hdr_t *l2hdr = &hdr->b_l2hdr;
|
|
l2arc_dev_t *dev = l2hdr->b_dev;
|
|
uint64_t psize = arc_hdr_size(hdr);
|
|
|
|
ASSERT(MUTEX_HELD(&dev->l2ad_mtx));
|
|
ASSERT(HDR_HAS_L2HDR(hdr));
|
|
|
|
list_remove(&dev->l2ad_buflist, hdr);
|
|
|
|
ARCSTAT_INCR(arcstat_l2_psize, -psize);
|
|
ARCSTAT_INCR(arcstat_l2_lsize, -HDR_GET_LSIZE(hdr));
|
|
|
|
vdev_space_update(dev->l2ad_vdev, -psize, 0, 0);
|
|
|
|
(void) refcount_remove_many(&dev->l2ad_alloc, psize, hdr);
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_HAS_L2HDR);
|
|
}
|
|
|
|
static void
|
|
arc_hdr_destroy(arc_buf_hdr_t *hdr)
|
|
{
|
|
if (HDR_HAS_L1HDR(hdr)) {
|
|
ASSERT(hdr->b_l1hdr.b_buf == NULL ||
|
|
hdr->b_l1hdr.b_bufcnt > 0);
|
|
ASSERT(refcount_is_zero(&hdr->b_l1hdr.b_refcnt));
|
|
ASSERT3P(hdr->b_l1hdr.b_state, ==, arc_anon);
|
|
}
|
|
ASSERT(!HDR_IO_IN_PROGRESS(hdr));
|
|
ASSERT(!HDR_IN_HASH_TABLE(hdr));
|
|
|
|
if (!HDR_EMPTY(hdr))
|
|
buf_discard_identity(hdr);
|
|
|
|
if (HDR_HAS_L2HDR(hdr)) {
|
|
l2arc_dev_t *dev = hdr->b_l2hdr.b_dev;
|
|
boolean_t buflist_held = MUTEX_HELD(&dev->l2ad_mtx);
|
|
|
|
if (!buflist_held)
|
|
mutex_enter(&dev->l2ad_mtx);
|
|
|
|
/*
|
|
* Even though we checked this conditional above, we
|
|
* need to check this again now that we have the
|
|
* l2ad_mtx. This is because we could be racing with
|
|
* another thread calling l2arc_evict() which might have
|
|
* destroyed this header's L2 portion as we were waiting
|
|
* to acquire the l2ad_mtx. If that happens, we don't
|
|
* want to re-destroy the header's L2 portion.
|
|
*/
|
|
if (HDR_HAS_L2HDR(hdr))
|
|
arc_hdr_l2hdr_destroy(hdr);
|
|
|
|
if (!buflist_held)
|
|
mutex_exit(&dev->l2ad_mtx);
|
|
}
|
|
|
|
if (HDR_HAS_L1HDR(hdr)) {
|
|
arc_cksum_free(hdr);
|
|
|
|
while (hdr->b_l1hdr.b_buf != NULL)
|
|
arc_buf_destroy_impl(hdr->b_l1hdr.b_buf);
|
|
|
|
if (hdr->b_l1hdr.b_pabd != NULL) {
|
|
arc_hdr_free_abd(hdr, B_FALSE);
|
|
}
|
|
|
|
if (HDR_HAS_RABD(hdr))
|
|
arc_hdr_free_abd(hdr, B_TRUE);
|
|
}
|
|
|
|
ASSERT3P(hdr->b_hash_next, ==, NULL);
|
|
if (HDR_HAS_L1HDR(hdr)) {
|
|
ASSERT(!multilist_link_active(&hdr->b_l1hdr.b_arc_node));
|
|
ASSERT3P(hdr->b_l1hdr.b_acb, ==, NULL);
|
|
|
|
if (!HDR_PROTECTED(hdr)) {
|
|
kmem_cache_free(hdr_full_cache, hdr);
|
|
} else {
|
|
kmem_cache_free(hdr_full_crypt_cache, hdr);
|
|
}
|
|
} else {
|
|
kmem_cache_free(hdr_l2only_cache, hdr);
|
|
}
|
|
}
|
|
|
|
void
|
|
arc_buf_destroy(arc_buf_t *buf, void* tag)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
kmutex_t *hash_lock = HDR_LOCK(hdr);
|
|
|
|
if (hdr->b_l1hdr.b_state == arc_anon) {
|
|
ASSERT3U(hdr->b_l1hdr.b_bufcnt, ==, 1);
|
|
ASSERT(!HDR_IO_IN_PROGRESS(hdr));
|
|
VERIFY0(remove_reference(hdr, NULL, tag));
|
|
arc_hdr_destroy(hdr);
|
|
return;
|
|
}
|
|
|
|
mutex_enter(hash_lock);
|
|
ASSERT3P(hdr, ==, buf->b_hdr);
|
|
ASSERT(hdr->b_l1hdr.b_bufcnt > 0);
|
|
ASSERT3P(hash_lock, ==, HDR_LOCK(hdr));
|
|
ASSERT3P(hdr->b_l1hdr.b_state, !=, arc_anon);
|
|
ASSERT3P(buf->b_data, !=, NULL);
|
|
|
|
(void) remove_reference(hdr, hash_lock, tag);
|
|
arc_buf_destroy_impl(buf);
|
|
mutex_exit(hash_lock);
|
|
}
|
|
|
|
/*
|
|
* Evict the arc_buf_hdr that is provided as a parameter. The resultant
|
|
* state of the header is dependent on its state prior to entering this
|
|
* function. The following transitions are possible:
|
|
*
|
|
* - arc_mru -> arc_mru_ghost
|
|
* - arc_mfu -> arc_mfu_ghost
|
|
* - arc_mru_ghost -> arc_l2c_only
|
|
* - arc_mru_ghost -> deleted
|
|
* - arc_mfu_ghost -> arc_l2c_only
|
|
* - arc_mfu_ghost -> deleted
|
|
*/
|
|
static int64_t
|
|
arc_evict_hdr(arc_buf_hdr_t *hdr, kmutex_t *hash_lock)
|
|
{
|
|
arc_state_t *evicted_state, *state;
|
|
int64_t bytes_evicted = 0;
|
|
int min_lifetime = HDR_PRESCIENT_PREFETCH(hdr) ?
|
|
arc_min_prescient_prefetch_ms : arc_min_prefetch_ms;
|
|
|
|
ASSERT(MUTEX_HELD(hash_lock));
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
state = hdr->b_l1hdr.b_state;
|
|
if (GHOST_STATE(state)) {
|
|
ASSERT(!HDR_IO_IN_PROGRESS(hdr));
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, ==, NULL);
|
|
|
|
/*
|
|
* l2arc_write_buffers() relies on a header's L1 portion
|
|
* (i.e. its b_pabd field) during it's write phase.
|
|
* Thus, we cannot push a header onto the arc_l2c_only
|
|
* state (removing its L1 piece) until the header is
|
|
* done being written to the l2arc.
|
|
*/
|
|
if (HDR_HAS_L2HDR(hdr) && HDR_L2_WRITING(hdr)) {
|
|
ARCSTAT_BUMP(arcstat_evict_l2_skip);
|
|
return (bytes_evicted);
|
|
}
|
|
|
|
ARCSTAT_BUMP(arcstat_deleted);
|
|
bytes_evicted += HDR_GET_LSIZE(hdr);
|
|
|
|
DTRACE_PROBE1(arc__delete, arc_buf_hdr_t *, hdr);
|
|
|
|
if (HDR_HAS_L2HDR(hdr)) {
|
|
ASSERT(hdr->b_l1hdr.b_pabd == NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
/*
|
|
* This buffer is cached on the 2nd Level ARC;
|
|
* don't destroy the header.
|
|
*/
|
|
arc_change_state(arc_l2c_only, hdr, hash_lock);
|
|
/*
|
|
* dropping from L1+L2 cached to L2-only,
|
|
* realloc to remove the L1 header.
|
|
*/
|
|
hdr = arc_hdr_realloc(hdr, hdr_full_cache,
|
|
hdr_l2only_cache);
|
|
} else {
|
|
arc_change_state(arc_anon, hdr, hash_lock);
|
|
arc_hdr_destroy(hdr);
|
|
}
|
|
return (bytes_evicted);
|
|
}
|
|
|
|
ASSERT(state == arc_mru || state == arc_mfu);
|
|
evicted_state = (state == arc_mru) ? arc_mru_ghost : arc_mfu_ghost;
|
|
|
|
/* prefetch buffers have a minimum lifespan */
|
|
if (HDR_IO_IN_PROGRESS(hdr) ||
|
|
((hdr->b_flags & (ARC_FLAG_PREFETCH | ARC_FLAG_INDIRECT)) &&
|
|
ddi_get_lbolt() - hdr->b_l1hdr.b_arc_access <
|
|
MSEC_TO_TICK(min_lifetime))) {
|
|
ARCSTAT_BUMP(arcstat_evict_skip);
|
|
return (bytes_evicted);
|
|
}
|
|
|
|
ASSERT0(refcount_count(&hdr->b_l1hdr.b_refcnt));
|
|
while (hdr->b_l1hdr.b_buf) {
|
|
arc_buf_t *buf = hdr->b_l1hdr.b_buf;
|
|
if (!mutex_tryenter(&buf->b_evict_lock)) {
|
|
ARCSTAT_BUMP(arcstat_mutex_miss);
|
|
break;
|
|
}
|
|
if (buf->b_data != NULL)
|
|
bytes_evicted += HDR_GET_LSIZE(hdr);
|
|
mutex_exit(&buf->b_evict_lock);
|
|
arc_buf_destroy_impl(buf);
|
|
}
|
|
|
|
if (HDR_HAS_L2HDR(hdr)) {
|
|
ARCSTAT_INCR(arcstat_evict_l2_cached, HDR_GET_LSIZE(hdr));
|
|
} else {
|
|
if (l2arc_write_eligible(hdr->b_spa, hdr)) {
|
|
ARCSTAT_INCR(arcstat_evict_l2_eligible,
|
|
HDR_GET_LSIZE(hdr));
|
|
} else {
|
|
ARCSTAT_INCR(arcstat_evict_l2_ineligible,
|
|
HDR_GET_LSIZE(hdr));
|
|
}
|
|
}
|
|
|
|
if (hdr->b_l1hdr.b_bufcnt == 0) {
|
|
arc_cksum_free(hdr);
|
|
|
|
bytes_evicted += arc_hdr_size(hdr);
|
|
|
|
/*
|
|
* If this hdr is being evicted and has a compressed
|
|
* buffer then we discard it here before we change states.
|
|
* This ensures that the accounting is updated correctly
|
|
* in arc_free_data_impl().
|
|
*/
|
|
if (hdr->b_l1hdr.b_pabd != NULL)
|
|
arc_hdr_free_abd(hdr, B_FALSE);
|
|
|
|
if (HDR_HAS_RABD(hdr))
|
|
arc_hdr_free_abd(hdr, B_TRUE);
|
|
|
|
arc_change_state(evicted_state, hdr, hash_lock);
|
|
ASSERT(HDR_IN_HASH_TABLE(hdr));
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_IN_HASH_TABLE);
|
|
DTRACE_PROBE1(arc__evict, arc_buf_hdr_t *, hdr);
|
|
}
|
|
|
|
return (bytes_evicted);
|
|
}
|
|
|
|
static uint64_t
|
|
arc_evict_state_impl(multilist_t *ml, int idx, arc_buf_hdr_t *marker,
|
|
uint64_t spa, int64_t bytes)
|
|
{
|
|
multilist_sublist_t *mls;
|
|
uint64_t bytes_evicted = 0;
|
|
arc_buf_hdr_t *hdr;
|
|
kmutex_t *hash_lock;
|
|
int evict_count = 0;
|
|
|
|
ASSERT3P(marker, !=, NULL);
|
|
IMPLY(bytes < 0, bytes == ARC_EVICT_ALL);
|
|
|
|
mls = multilist_sublist_lock(ml, idx);
|
|
|
|
for (hdr = multilist_sublist_prev(mls, marker); hdr != NULL;
|
|
hdr = multilist_sublist_prev(mls, marker)) {
|
|
if ((bytes != ARC_EVICT_ALL && bytes_evicted >= bytes) ||
|
|
(evict_count >= zfs_arc_evict_batch_limit))
|
|
break;
|
|
|
|
/*
|
|
* To keep our iteration location, move the marker
|
|
* forward. Since we're not holding hdr's hash lock, we
|
|
* must be very careful and not remove 'hdr' from the
|
|
* sublist. Otherwise, other consumers might mistake the
|
|
* 'hdr' as not being on a sublist when they call the
|
|
* multilist_link_active() function (they all rely on
|
|
* the hash lock protecting concurrent insertions and
|
|
* removals). multilist_sublist_move_forward() was
|
|
* specifically implemented to ensure this is the case
|
|
* (only 'marker' will be removed and re-inserted).
|
|
*/
|
|
multilist_sublist_move_forward(mls, marker);
|
|
|
|
/*
|
|
* The only case where the b_spa field should ever be
|
|
* zero, is the marker headers inserted by
|
|
* arc_evict_state(). It's possible for multiple threads
|
|
* to be calling arc_evict_state() concurrently (e.g.
|
|
* dsl_pool_close() and zio_inject_fault()), so we must
|
|
* skip any markers we see from these other threads.
|
|
*/
|
|
if (hdr->b_spa == 0)
|
|
continue;
|
|
|
|
/* we're only interested in evicting buffers of a certain spa */
|
|
if (spa != 0 && hdr->b_spa != spa) {
|
|
ARCSTAT_BUMP(arcstat_evict_skip);
|
|
continue;
|
|
}
|
|
|
|
hash_lock = HDR_LOCK(hdr);
|
|
|
|
/*
|
|
* We aren't calling this function from any code path
|
|
* that would already be holding a hash lock, so we're
|
|
* asserting on this assumption to be defensive in case
|
|
* this ever changes. Without this check, it would be
|
|
* possible to incorrectly increment arcstat_mutex_miss
|
|
* below (e.g. if the code changed such that we called
|
|
* this function with a hash lock held).
|
|
*/
|
|
ASSERT(!MUTEX_HELD(hash_lock));
|
|
|
|
if (mutex_tryenter(hash_lock)) {
|
|
uint64_t evicted = arc_evict_hdr(hdr, hash_lock);
|
|
mutex_exit(hash_lock);
|
|
|
|
bytes_evicted += evicted;
|
|
|
|
/*
|
|
* If evicted is zero, arc_evict_hdr() must have
|
|
* decided to skip this header, don't increment
|
|
* evict_count in this case.
|
|
*/
|
|
if (evicted != 0)
|
|
evict_count++;
|
|
|
|
/*
|
|
* If arc_size isn't overflowing, signal any
|
|
* threads that might happen to be waiting.
|
|
*
|
|
* For each header evicted, we wake up a single
|
|
* thread. If we used cv_broadcast, we could
|
|
* wake up "too many" threads causing arc_size
|
|
* to significantly overflow arc_c; since
|
|
* arc_get_data_impl() doesn't check for overflow
|
|
* when it's woken up (it doesn't because it's
|
|
* possible for the ARC to be overflowing while
|
|
* full of un-evictable buffers, and the
|
|
* function should proceed in this case).
|
|
*
|
|
* If threads are left sleeping, due to not
|
|
* using cv_broadcast, they will be woken up
|
|
* just before arc_reclaim_thread() sleeps.
|
|
*/
|
|
mutex_enter(&arc_reclaim_lock);
|
|
if (!arc_is_overflowing())
|
|
cv_signal(&arc_reclaim_waiters_cv);
|
|
mutex_exit(&arc_reclaim_lock);
|
|
} else {
|
|
ARCSTAT_BUMP(arcstat_mutex_miss);
|
|
}
|
|
}
|
|
|
|
multilist_sublist_unlock(mls);
|
|
|
|
return (bytes_evicted);
|
|
}
|
|
|
|
/*
|
|
* Evict buffers from the given arc state, until we've removed the
|
|
* specified number of bytes. Move the removed buffers to the
|
|
* appropriate evict state.
|
|
*
|
|
* This function makes a "best effort". It skips over any buffers
|
|
* it can't get a hash_lock on, and so, may not catch all candidates.
|
|
* It may also return without evicting as much space as requested.
|
|
*
|
|
* If bytes is specified using the special value ARC_EVICT_ALL, this
|
|
* will evict all available (i.e. unlocked and evictable) buffers from
|
|
* the given arc state; which is used by arc_flush().
|
|
*/
|
|
static uint64_t
|
|
arc_evict_state(arc_state_t *state, uint64_t spa, int64_t bytes,
|
|
arc_buf_contents_t type)
|
|
{
|
|
uint64_t total_evicted = 0;
|
|
multilist_t *ml = state->arcs_list[type];
|
|
int num_sublists;
|
|
arc_buf_hdr_t **markers;
|
|
|
|
IMPLY(bytes < 0, bytes == ARC_EVICT_ALL);
|
|
|
|
num_sublists = multilist_get_num_sublists(ml);
|
|
|
|
/*
|
|
* If we've tried to evict from each sublist, made some
|
|
* progress, but still have not hit the target number of bytes
|
|
* to evict, we want to keep trying. The markers allow us to
|
|
* pick up where we left off for each individual sublist, rather
|
|
* than starting from the tail each time.
|
|
*/
|
|
markers = kmem_zalloc(sizeof (*markers) * num_sublists, KM_SLEEP);
|
|
for (int i = 0; i < num_sublists; i++) {
|
|
multilist_sublist_t *mls;
|
|
|
|
markers[i] = kmem_cache_alloc(hdr_full_cache, KM_SLEEP);
|
|
|
|
/*
|
|
* A b_spa of 0 is used to indicate that this header is
|
|
* a marker. This fact is used in arc_adjust_type() and
|
|
* arc_evict_state_impl().
|
|
*/
|
|
markers[i]->b_spa = 0;
|
|
|
|
mls = multilist_sublist_lock(ml, i);
|
|
multilist_sublist_insert_tail(mls, markers[i]);
|
|
multilist_sublist_unlock(mls);
|
|
}
|
|
|
|
/*
|
|
* While we haven't hit our target number of bytes to evict, or
|
|
* we're evicting all available buffers.
|
|
*/
|
|
while (total_evicted < bytes || bytes == ARC_EVICT_ALL) {
|
|
int sublist_idx = multilist_get_random_index(ml);
|
|
uint64_t scan_evicted = 0;
|
|
|
|
/*
|
|
* Try to reduce pinned dnodes with a floor of arc_dnode_limit.
|
|
* Request that 10% of the LRUs be scanned by the superblock
|
|
* shrinker.
|
|
*/
|
|
if (type == ARC_BUFC_DATA && arc_dnode_size > arc_dnode_limit)
|
|
arc_prune_async((arc_dnode_size - arc_dnode_limit) /
|
|
sizeof (dnode_t) / zfs_arc_dnode_reduce_percent);
|
|
|
|
/*
|
|
* Start eviction using a randomly selected sublist,
|
|
* this is to try and evenly balance eviction across all
|
|
* sublists. Always starting at the same sublist
|
|
* (e.g. index 0) would cause evictions to favor certain
|
|
* sublists over others.
|
|
*/
|
|
for (int i = 0; i < num_sublists; i++) {
|
|
uint64_t bytes_remaining;
|
|
uint64_t bytes_evicted;
|
|
|
|
if (bytes == ARC_EVICT_ALL)
|
|
bytes_remaining = ARC_EVICT_ALL;
|
|
else if (total_evicted < bytes)
|
|
bytes_remaining = bytes - total_evicted;
|
|
else
|
|
break;
|
|
|
|
bytes_evicted = arc_evict_state_impl(ml, sublist_idx,
|
|
markers[sublist_idx], spa, bytes_remaining);
|
|
|
|
scan_evicted += bytes_evicted;
|
|
total_evicted += bytes_evicted;
|
|
|
|
/* we've reached the end, wrap to the beginning */
|
|
if (++sublist_idx >= num_sublists)
|
|
sublist_idx = 0;
|
|
}
|
|
|
|
/*
|
|
* If we didn't evict anything during this scan, we have
|
|
* no reason to believe we'll evict more during another
|
|
* scan, so break the loop.
|
|
*/
|
|
if (scan_evicted == 0) {
|
|
/* This isn't possible, let's make that obvious */
|
|
ASSERT3S(bytes, !=, 0);
|
|
|
|
/*
|
|
* When bytes is ARC_EVICT_ALL, the only way to
|
|
* break the loop is when scan_evicted is zero.
|
|
* In that case, we actually have evicted enough,
|
|
* so we don't want to increment the kstat.
|
|
*/
|
|
if (bytes != ARC_EVICT_ALL) {
|
|
ASSERT3S(total_evicted, <, bytes);
|
|
ARCSTAT_BUMP(arcstat_evict_not_enough);
|
|
}
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
for (int i = 0; i < num_sublists; i++) {
|
|
multilist_sublist_t *mls = multilist_sublist_lock(ml, i);
|
|
multilist_sublist_remove(mls, markers[i]);
|
|
multilist_sublist_unlock(mls);
|
|
|
|
kmem_cache_free(hdr_full_cache, markers[i]);
|
|
}
|
|
kmem_free(markers, sizeof (*markers) * num_sublists);
|
|
|
|
return (total_evicted);
|
|
}
|
|
|
|
/*
|
|
* Flush all "evictable" data of the given type from the arc state
|
|
* specified. This will not evict any "active" buffers (i.e. referenced).
|
|
*
|
|
* When 'retry' is set to B_FALSE, the function will make a single pass
|
|
* over the state and evict any buffers that it can. Since it doesn't
|
|
* continually retry the eviction, it might end up leaving some buffers
|
|
* in the ARC due to lock misses.
|
|
*
|
|
* When 'retry' is set to B_TRUE, the function will continually retry the
|
|
* eviction until *all* evictable buffers have been removed from the
|
|
* state. As a result, if concurrent insertions into the state are
|
|
* allowed (e.g. if the ARC isn't shutting down), this function might
|
|
* wind up in an infinite loop, continually trying to evict buffers.
|
|
*/
|
|
static uint64_t
|
|
arc_flush_state(arc_state_t *state, uint64_t spa, arc_buf_contents_t type,
|
|
boolean_t retry)
|
|
{
|
|
uint64_t evicted = 0;
|
|
|
|
while (refcount_count(&state->arcs_esize[type]) != 0) {
|
|
evicted += arc_evict_state(state, spa, ARC_EVICT_ALL, type);
|
|
|
|
if (!retry)
|
|
break;
|
|
}
|
|
|
|
return (evicted);
|
|
}
|
|
|
|
/*
|
|
* Helper function for arc_prune_async() it is responsible for safely
|
|
* handling the execution of a registered arc_prune_func_t.
|
|
*/
|
|
static void
|
|
arc_prune_task(void *ptr)
|
|
{
|
|
arc_prune_t *ap = (arc_prune_t *)ptr;
|
|
arc_prune_func_t *func = ap->p_pfunc;
|
|
|
|
if (func != NULL)
|
|
func(ap->p_adjust, ap->p_private);
|
|
|
|
refcount_remove(&ap->p_refcnt, func);
|
|
}
|
|
|
|
/*
|
|
* Notify registered consumers they must drop holds on a portion of the ARC
|
|
* buffered they reference. This provides a mechanism to ensure the ARC can
|
|
* honor the arc_meta_limit and reclaim otherwise pinned ARC buffers. This
|
|
* is analogous to dnlc_reduce_cache() but more generic.
|
|
*
|
|
* This operation is performed asynchronously so it may be safely called
|
|
* in the context of the arc_reclaim_thread(). A reference is taken here
|
|
* for each registered arc_prune_t and the arc_prune_task() is responsible
|
|
* for releasing it once the registered arc_prune_func_t has completed.
|
|
*/
|
|
static void
|
|
arc_prune_async(int64_t adjust)
|
|
{
|
|
arc_prune_t *ap;
|
|
|
|
mutex_enter(&arc_prune_mtx);
|
|
for (ap = list_head(&arc_prune_list); ap != NULL;
|
|
ap = list_next(&arc_prune_list, ap)) {
|
|
|
|
if (refcount_count(&ap->p_refcnt) >= 2)
|
|
continue;
|
|
|
|
refcount_add(&ap->p_refcnt, ap->p_pfunc);
|
|
ap->p_adjust = adjust;
|
|
if (taskq_dispatch(arc_prune_taskq, arc_prune_task,
|
|
ap, TQ_SLEEP) == TASKQID_INVALID) {
|
|
refcount_remove(&ap->p_refcnt, ap->p_pfunc);
|
|
continue;
|
|
}
|
|
ARCSTAT_BUMP(arcstat_prune);
|
|
}
|
|
mutex_exit(&arc_prune_mtx);
|
|
}
|
|
|
|
/*
|
|
* Evict the specified number of bytes from the state specified,
|
|
* restricting eviction to the spa and type given. This function
|
|
* prevents us from trying to evict more from a state's list than
|
|
* is "evictable", and to skip evicting altogether when passed a
|
|
* negative value for "bytes". In contrast, arc_evict_state() will
|
|
* evict everything it can, when passed a negative value for "bytes".
|
|
*/
|
|
static uint64_t
|
|
arc_adjust_impl(arc_state_t *state, uint64_t spa, int64_t bytes,
|
|
arc_buf_contents_t type)
|
|
{
|
|
int64_t delta;
|
|
|
|
if (bytes > 0 && refcount_count(&state->arcs_esize[type]) > 0) {
|
|
delta = MIN(refcount_count(&state->arcs_esize[type]), bytes);
|
|
return (arc_evict_state(state, spa, delta, type));
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* The goal of this function is to evict enough meta data buffers from the
|
|
* ARC in order to enforce the arc_meta_limit. Achieving this is slightly
|
|
* more complicated than it appears because it is common for data buffers
|
|
* to have holds on meta data buffers. In addition, dnode meta data buffers
|
|
* will be held by the dnodes in the block preventing them from being freed.
|
|
* This means we can't simply traverse the ARC and expect to always find
|
|
* enough unheld meta data buffer to release.
|
|
*
|
|
* Therefore, this function has been updated to make alternating passes
|
|
* over the ARC releasing data buffers and then newly unheld meta data
|
|
* buffers. This ensures forward progress is maintained and arc_meta_used
|
|
* will decrease. Normally this is sufficient, but if required the ARC
|
|
* will call the registered prune callbacks causing dentry and inodes to
|
|
* be dropped from the VFS cache. This will make dnode meta data buffers
|
|
* available for reclaim.
|
|
*/
|
|
static uint64_t
|
|
arc_adjust_meta_balanced(void)
|
|
{
|
|
int64_t delta, prune = 0, adjustmnt;
|
|
uint64_t total_evicted = 0;
|
|
arc_buf_contents_t type = ARC_BUFC_DATA;
|
|
int restarts = MAX(zfs_arc_meta_adjust_restarts, 0);
|
|
|
|
restart:
|
|
/*
|
|
* This slightly differs than the way we evict from the mru in
|
|
* arc_adjust because we don't have a "target" value (i.e. no
|
|
* "meta" arc_p). As a result, I think we can completely
|
|
* cannibalize the metadata in the MRU before we evict the
|
|
* metadata from the MFU. I think we probably need to implement a
|
|
* "metadata arc_p" value to do this properly.
|
|
*/
|
|
adjustmnt = arc_meta_used - arc_meta_limit;
|
|
|
|
if (adjustmnt > 0 && refcount_count(&arc_mru->arcs_esize[type]) > 0) {
|
|
delta = MIN(refcount_count(&arc_mru->arcs_esize[type]),
|
|
adjustmnt);
|
|
total_evicted += arc_adjust_impl(arc_mru, 0, delta, type);
|
|
adjustmnt -= delta;
|
|
}
|
|
|
|
/*
|
|
* We can't afford to recalculate adjustmnt here. If we do,
|
|
* new metadata buffers can sneak into the MRU or ANON lists,
|
|
* thus penalize the MFU metadata. Although the fudge factor is
|
|
* small, it has been empirically shown to be significant for
|
|
* certain workloads (e.g. creating many empty directories). As
|
|
* such, we use the original calculation for adjustmnt, and
|
|
* simply decrement the amount of data evicted from the MRU.
|
|
*/
|
|
|
|
if (adjustmnt > 0 && refcount_count(&arc_mfu->arcs_esize[type]) > 0) {
|
|
delta = MIN(refcount_count(&arc_mfu->arcs_esize[type]),
|
|
adjustmnt);
|
|
total_evicted += arc_adjust_impl(arc_mfu, 0, delta, type);
|
|
}
|
|
|
|
adjustmnt = arc_meta_used - arc_meta_limit;
|
|
|
|
if (adjustmnt > 0 &&
|
|
refcount_count(&arc_mru_ghost->arcs_esize[type]) > 0) {
|
|
delta = MIN(adjustmnt,
|
|
refcount_count(&arc_mru_ghost->arcs_esize[type]));
|
|
total_evicted += arc_adjust_impl(arc_mru_ghost, 0, delta, type);
|
|
adjustmnt -= delta;
|
|
}
|
|
|
|
if (adjustmnt > 0 &&
|
|
refcount_count(&arc_mfu_ghost->arcs_esize[type]) > 0) {
|
|
delta = MIN(adjustmnt,
|
|
refcount_count(&arc_mfu_ghost->arcs_esize[type]));
|
|
total_evicted += arc_adjust_impl(arc_mfu_ghost, 0, delta, type);
|
|
}
|
|
|
|
/*
|
|
* If after attempting to make the requested adjustment to the ARC
|
|
* the meta limit is still being exceeded then request that the
|
|
* higher layers drop some cached objects which have holds on ARC
|
|
* meta buffers. Requests to the upper layers will be made with
|
|
* increasingly large scan sizes until the ARC is below the limit.
|
|
*/
|
|
if (arc_meta_used > arc_meta_limit) {
|
|
if (type == ARC_BUFC_DATA) {
|
|
type = ARC_BUFC_METADATA;
|
|
} else {
|
|
type = ARC_BUFC_DATA;
|
|
|
|
if (zfs_arc_meta_prune) {
|
|
prune += zfs_arc_meta_prune;
|
|
arc_prune_async(prune);
|
|
}
|
|
}
|
|
|
|
if (restarts > 0) {
|
|
restarts--;
|
|
goto restart;
|
|
}
|
|
}
|
|
return (total_evicted);
|
|
}
|
|
|
|
/*
|
|
* Evict metadata buffers from the cache, such that arc_meta_used is
|
|
* capped by the arc_meta_limit tunable.
|
|
*/
|
|
static uint64_t
|
|
arc_adjust_meta_only(void)
|
|
{
|
|
uint64_t total_evicted = 0;
|
|
int64_t target;
|
|
|
|
/*
|
|
* If we're over the meta limit, we want to evict enough
|
|
* metadata to get back under the meta limit. We don't want to
|
|
* evict so much that we drop the MRU below arc_p, though. If
|
|
* we're over the meta limit more than we're over arc_p, we
|
|
* evict some from the MRU here, and some from the MFU below.
|
|
*/
|
|
target = MIN((int64_t)(arc_meta_used - arc_meta_limit),
|
|
(int64_t)(refcount_count(&arc_anon->arcs_size) +
|
|
refcount_count(&arc_mru->arcs_size) - arc_p));
|
|
|
|
total_evicted += arc_adjust_impl(arc_mru, 0, target, ARC_BUFC_METADATA);
|
|
|
|
/*
|
|
* Similar to the above, we want to evict enough bytes to get us
|
|
* below the meta limit, but not so much as to drop us below the
|
|
* space allotted to the MFU (which is defined as arc_c - arc_p).
|
|
*/
|
|
target = MIN((int64_t)(arc_meta_used - arc_meta_limit),
|
|
(int64_t)(refcount_count(&arc_mfu->arcs_size) - (arc_c - arc_p)));
|
|
|
|
total_evicted += arc_adjust_impl(arc_mfu, 0, target, ARC_BUFC_METADATA);
|
|
|
|
return (total_evicted);
|
|
}
|
|
|
|
static uint64_t
|
|
arc_adjust_meta(void)
|
|
{
|
|
if (zfs_arc_meta_strategy == ARC_STRATEGY_META_ONLY)
|
|
return (arc_adjust_meta_only());
|
|
else
|
|
return (arc_adjust_meta_balanced());
|
|
}
|
|
|
|
/*
|
|
* Return the type of the oldest buffer in the given arc state
|
|
*
|
|
* This function will select a random sublist of type ARC_BUFC_DATA and
|
|
* a random sublist of type ARC_BUFC_METADATA. The tail of each sublist
|
|
* is compared, and the type which contains the "older" buffer will be
|
|
* returned.
|
|
*/
|
|
static arc_buf_contents_t
|
|
arc_adjust_type(arc_state_t *state)
|
|
{
|
|
multilist_t *data_ml = state->arcs_list[ARC_BUFC_DATA];
|
|
multilist_t *meta_ml = state->arcs_list[ARC_BUFC_METADATA];
|
|
int data_idx = multilist_get_random_index(data_ml);
|
|
int meta_idx = multilist_get_random_index(meta_ml);
|
|
multilist_sublist_t *data_mls;
|
|
multilist_sublist_t *meta_mls;
|
|
arc_buf_contents_t type;
|
|
arc_buf_hdr_t *data_hdr;
|
|
arc_buf_hdr_t *meta_hdr;
|
|
|
|
/*
|
|
* We keep the sublist lock until we're finished, to prevent
|
|
* the headers from being destroyed via arc_evict_state().
|
|
*/
|
|
data_mls = multilist_sublist_lock(data_ml, data_idx);
|
|
meta_mls = multilist_sublist_lock(meta_ml, meta_idx);
|
|
|
|
/*
|
|
* These two loops are to ensure we skip any markers that
|
|
* might be at the tail of the lists due to arc_evict_state().
|
|
*/
|
|
|
|
for (data_hdr = multilist_sublist_tail(data_mls); data_hdr != NULL;
|
|
data_hdr = multilist_sublist_prev(data_mls, data_hdr)) {
|
|
if (data_hdr->b_spa != 0)
|
|
break;
|
|
}
|
|
|
|
for (meta_hdr = multilist_sublist_tail(meta_mls); meta_hdr != NULL;
|
|
meta_hdr = multilist_sublist_prev(meta_mls, meta_hdr)) {
|
|
if (meta_hdr->b_spa != 0)
|
|
break;
|
|
}
|
|
|
|
if (data_hdr == NULL && meta_hdr == NULL) {
|
|
type = ARC_BUFC_DATA;
|
|
} else if (data_hdr == NULL) {
|
|
ASSERT3P(meta_hdr, !=, NULL);
|
|
type = ARC_BUFC_METADATA;
|
|
} else if (meta_hdr == NULL) {
|
|
ASSERT3P(data_hdr, !=, NULL);
|
|
type = ARC_BUFC_DATA;
|
|
} else {
|
|
ASSERT3P(data_hdr, !=, NULL);
|
|
ASSERT3P(meta_hdr, !=, NULL);
|
|
|
|
/* The headers can't be on the sublist without an L1 header */
|
|
ASSERT(HDR_HAS_L1HDR(data_hdr));
|
|
ASSERT(HDR_HAS_L1HDR(meta_hdr));
|
|
|
|
if (data_hdr->b_l1hdr.b_arc_access <
|
|
meta_hdr->b_l1hdr.b_arc_access) {
|
|
type = ARC_BUFC_DATA;
|
|
} else {
|
|
type = ARC_BUFC_METADATA;
|
|
}
|
|
}
|
|
|
|
multilist_sublist_unlock(meta_mls);
|
|
multilist_sublist_unlock(data_mls);
|
|
|
|
return (type);
|
|
}
|
|
|
|
/*
|
|
* Evict buffers from the cache, such that arc_size is capped by arc_c.
|
|
*/
|
|
static uint64_t
|
|
arc_adjust(void)
|
|
{
|
|
uint64_t total_evicted = 0;
|
|
uint64_t bytes;
|
|
int64_t target;
|
|
|
|
/*
|
|
* If we're over arc_meta_limit, we want to correct that before
|
|
* potentially evicting data buffers below.
|
|
*/
|
|
total_evicted += arc_adjust_meta();
|
|
|
|
/*
|
|
* Adjust MRU size
|
|
*
|
|
* If we're over the target cache size, we want to evict enough
|
|
* from the list to get back to our target size. We don't want
|
|
* to evict too much from the MRU, such that it drops below
|
|
* arc_p. So, if we're over our target cache size more than
|
|
* the MRU is over arc_p, we'll evict enough to get back to
|
|
* arc_p here, and then evict more from the MFU below.
|
|
*/
|
|
target = MIN((int64_t)(arc_size - arc_c),
|
|
(int64_t)(refcount_count(&arc_anon->arcs_size) +
|
|
refcount_count(&arc_mru->arcs_size) + arc_meta_used - arc_p));
|
|
|
|
/*
|
|
* If we're below arc_meta_min, always prefer to evict data.
|
|
* Otherwise, try to satisfy the requested number of bytes to
|
|
* evict from the type which contains older buffers; in an
|
|
* effort to keep newer buffers in the cache regardless of their
|
|
* type. If we cannot satisfy the number of bytes from this
|
|
* type, spill over into the next type.
|
|
*/
|
|
if (arc_adjust_type(arc_mru) == ARC_BUFC_METADATA &&
|
|
arc_meta_used > arc_meta_min) {
|
|
bytes = arc_adjust_impl(arc_mru, 0, target, ARC_BUFC_METADATA);
|
|
total_evicted += bytes;
|
|
|
|
/*
|
|
* If we couldn't evict our target number of bytes from
|
|
* metadata, we try to get the rest from data.
|
|
*/
|
|
target -= bytes;
|
|
|
|
total_evicted +=
|
|
arc_adjust_impl(arc_mru, 0, target, ARC_BUFC_DATA);
|
|
} else {
|
|
bytes = arc_adjust_impl(arc_mru, 0, target, ARC_BUFC_DATA);
|
|
total_evicted += bytes;
|
|
|
|
/*
|
|
* If we couldn't evict our target number of bytes from
|
|
* data, we try to get the rest from metadata.
|
|
*/
|
|
target -= bytes;
|
|
|
|
total_evicted +=
|
|
arc_adjust_impl(arc_mru, 0, target, ARC_BUFC_METADATA);
|
|
}
|
|
|
|
/*
|
|
* Adjust MFU size
|
|
*
|
|
* Now that we've tried to evict enough from the MRU to get its
|
|
* size back to arc_p, if we're still above the target cache
|
|
* size, we evict the rest from the MFU.
|
|
*/
|
|
target = arc_size - arc_c;
|
|
|
|
if (arc_adjust_type(arc_mfu) == ARC_BUFC_METADATA &&
|
|
arc_meta_used > arc_meta_min) {
|
|
bytes = arc_adjust_impl(arc_mfu, 0, target, ARC_BUFC_METADATA);
|
|
total_evicted += bytes;
|
|
|
|
/*
|
|
* If we couldn't evict our target number of bytes from
|
|
* metadata, we try to get the rest from data.
|
|
*/
|
|
target -= bytes;
|
|
|
|
total_evicted +=
|
|
arc_adjust_impl(arc_mfu, 0, target, ARC_BUFC_DATA);
|
|
} else {
|
|
bytes = arc_adjust_impl(arc_mfu, 0, target, ARC_BUFC_DATA);
|
|
total_evicted += bytes;
|
|
|
|
/*
|
|
* If we couldn't evict our target number of bytes from
|
|
* data, we try to get the rest from data.
|
|
*/
|
|
target -= bytes;
|
|
|
|
total_evicted +=
|
|
arc_adjust_impl(arc_mfu, 0, target, ARC_BUFC_METADATA);
|
|
}
|
|
|
|
/*
|
|
* Adjust ghost lists
|
|
*
|
|
* In addition to the above, the ARC also defines target values
|
|
* for the ghost lists. The sum of the mru list and mru ghost
|
|
* list should never exceed the target size of the cache, and
|
|
* the sum of the mru list, mfu list, mru ghost list, and mfu
|
|
* ghost list should never exceed twice the target size of the
|
|
* cache. The following logic enforces these limits on the ghost
|
|
* caches, and evicts from them as needed.
|
|
*/
|
|
target = refcount_count(&arc_mru->arcs_size) +
|
|
refcount_count(&arc_mru_ghost->arcs_size) - arc_c;
|
|
|
|
bytes = arc_adjust_impl(arc_mru_ghost, 0, target, ARC_BUFC_DATA);
|
|
total_evicted += bytes;
|
|
|
|
target -= bytes;
|
|
|
|
total_evicted +=
|
|
arc_adjust_impl(arc_mru_ghost, 0, target, ARC_BUFC_METADATA);
|
|
|
|
/*
|
|
* We assume the sum of the mru list and mfu list is less than
|
|
* or equal to arc_c (we enforced this above), which means we
|
|
* can use the simpler of the two equations below:
|
|
*
|
|
* mru + mfu + mru ghost + mfu ghost <= 2 * arc_c
|
|
* mru ghost + mfu ghost <= arc_c
|
|
*/
|
|
target = refcount_count(&arc_mru_ghost->arcs_size) +
|
|
refcount_count(&arc_mfu_ghost->arcs_size) - arc_c;
|
|
|
|
bytes = arc_adjust_impl(arc_mfu_ghost, 0, target, ARC_BUFC_DATA);
|
|
total_evicted += bytes;
|
|
|
|
target -= bytes;
|
|
|
|
total_evicted +=
|
|
arc_adjust_impl(arc_mfu_ghost, 0, target, ARC_BUFC_METADATA);
|
|
|
|
return (total_evicted);
|
|
}
|
|
|
|
void
|
|
arc_flush(spa_t *spa, boolean_t retry)
|
|
{
|
|
uint64_t guid = 0;
|
|
|
|
/*
|
|
* If retry is B_TRUE, a spa must not be specified since we have
|
|
* no good way to determine if all of a spa's buffers have been
|
|
* evicted from an arc state.
|
|
*/
|
|
ASSERT(!retry || spa == 0);
|
|
|
|
if (spa != NULL)
|
|
guid = spa_load_guid(spa);
|
|
|
|
(void) arc_flush_state(arc_mru, guid, ARC_BUFC_DATA, retry);
|
|
(void) arc_flush_state(arc_mru, guid, ARC_BUFC_METADATA, retry);
|
|
|
|
(void) arc_flush_state(arc_mfu, guid, ARC_BUFC_DATA, retry);
|
|
(void) arc_flush_state(arc_mfu, guid, ARC_BUFC_METADATA, retry);
|
|
|
|
(void) arc_flush_state(arc_mru_ghost, guid, ARC_BUFC_DATA, retry);
|
|
(void) arc_flush_state(arc_mru_ghost, guid, ARC_BUFC_METADATA, retry);
|
|
|
|
(void) arc_flush_state(arc_mfu_ghost, guid, ARC_BUFC_DATA, retry);
|
|
(void) arc_flush_state(arc_mfu_ghost, guid, ARC_BUFC_METADATA, retry);
|
|
}
|
|
|
|
void
|
|
arc_shrink(int64_t to_free)
|
|
{
|
|
uint64_t c = arc_c;
|
|
|
|
if (c > to_free && c - to_free > arc_c_min) {
|
|
arc_c = c - to_free;
|
|
atomic_add_64(&arc_p, -(arc_p >> arc_shrink_shift));
|
|
if (arc_c > arc_size)
|
|
arc_c = MAX(arc_size, arc_c_min);
|
|
if (arc_p > arc_c)
|
|
arc_p = (arc_c >> 1);
|
|
ASSERT(arc_c >= arc_c_min);
|
|
ASSERT((int64_t)arc_p >= 0);
|
|
} else {
|
|
arc_c = arc_c_min;
|
|
}
|
|
|
|
if (arc_size > arc_c)
|
|
(void) arc_adjust();
|
|
}
|
|
|
|
/*
|
|
* Return maximum amount of memory that we could possibly use. Reduced
|
|
* to half of all memory in user space which is primarily used for testing.
|
|
*/
|
|
static uint64_t
|
|
arc_all_memory(void)
|
|
{
|
|
#ifdef _KERNEL
|
|
#ifdef CONFIG_HIGHMEM
|
|
return (ptob(totalram_pages - totalhigh_pages));
|
|
#else
|
|
return (ptob(totalram_pages));
|
|
#endif /* CONFIG_HIGHMEM */
|
|
#else
|
|
return (ptob(physmem) / 2);
|
|
#endif /* _KERNEL */
|
|
}
|
|
|
|
/*
|
|
* Return the amount of memory that is considered free. In user space
|
|
* which is primarily used for testing we pretend that free memory ranges
|
|
* from 0-20% of all memory.
|
|
*/
|
|
static uint64_t
|
|
arc_free_memory(void)
|
|
{
|
|
#ifdef _KERNEL
|
|
#ifdef CONFIG_HIGHMEM
|
|
struct sysinfo si;
|
|
si_meminfo(&si);
|
|
return (ptob(si.freeram - si.freehigh));
|
|
#else
|
|
#ifdef ZFS_GLOBAL_NODE_PAGE_STATE
|
|
return (ptob(nr_free_pages() +
|
|
global_node_page_state(NR_INACTIVE_FILE) +
|
|
global_node_page_state(NR_INACTIVE_ANON) +
|
|
global_node_page_state(NR_SLAB_RECLAIMABLE)));
|
|
#else
|
|
return (ptob(nr_free_pages() +
|
|
global_page_state(NR_INACTIVE_FILE) +
|
|
global_page_state(NR_INACTIVE_ANON) +
|
|
global_page_state(NR_SLAB_RECLAIMABLE)));
|
|
#endif /* ZFS_GLOBAL_NODE_PAGE_STATE */
|
|
#endif /* CONFIG_HIGHMEM */
|
|
#else
|
|
return (spa_get_random(arc_all_memory() * 20 / 100));
|
|
#endif /* _KERNEL */
|
|
}
|
|
|
|
typedef enum free_memory_reason_t {
|
|
FMR_UNKNOWN,
|
|
FMR_NEEDFREE,
|
|
FMR_LOTSFREE,
|
|
FMR_SWAPFS_MINFREE,
|
|
FMR_PAGES_PP_MAXIMUM,
|
|
FMR_HEAP_ARENA,
|
|
FMR_ZIO_ARENA,
|
|
} free_memory_reason_t;
|
|
|
|
int64_t last_free_memory;
|
|
free_memory_reason_t last_free_reason;
|
|
|
|
#ifdef _KERNEL
|
|
/*
|
|
* Additional reserve of pages for pp_reserve.
|
|
*/
|
|
int64_t arc_pages_pp_reserve = 64;
|
|
|
|
/*
|
|
* Additional reserve of pages for swapfs.
|
|
*/
|
|
int64_t arc_swapfs_reserve = 64;
|
|
#endif /* _KERNEL */
|
|
|
|
/*
|
|
* Return the amount of memory that can be consumed before reclaim will be
|
|
* needed. Positive if there is sufficient free memory, negative indicates
|
|
* the amount of memory that needs to be freed up.
|
|
*/
|
|
static int64_t
|
|
arc_available_memory(void)
|
|
{
|
|
int64_t lowest = INT64_MAX;
|
|
free_memory_reason_t r = FMR_UNKNOWN;
|
|
#ifdef _KERNEL
|
|
int64_t n;
|
|
#ifdef __linux__
|
|
#ifdef freemem
|
|
#undef freemem
|
|
#endif
|
|
pgcnt_t needfree = btop(arc_need_free);
|
|
pgcnt_t lotsfree = btop(arc_sys_free);
|
|
pgcnt_t desfree = 0;
|
|
pgcnt_t freemem = btop(arc_free_memory());
|
|
#endif
|
|
|
|
if (needfree > 0) {
|
|
n = PAGESIZE * (-needfree);
|
|
if (n < lowest) {
|
|
lowest = n;
|
|
r = FMR_NEEDFREE;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* check that we're out of range of the pageout scanner. It starts to
|
|
* schedule paging if freemem is less than lotsfree and needfree.
|
|
* lotsfree is the high-water mark for pageout, and needfree is the
|
|
* number of needed free pages. We add extra pages here to make sure
|
|
* the scanner doesn't start up while we're freeing memory.
|
|
*/
|
|
n = PAGESIZE * (freemem - lotsfree - needfree - desfree);
|
|
if (n < lowest) {
|
|
lowest = n;
|
|
r = FMR_LOTSFREE;
|
|
}
|
|
|
|
#ifndef __linux__
|
|
/*
|
|
* check to make sure that swapfs has enough space so that anon
|
|
* reservations can still succeed. anon_resvmem() checks that the
|
|
* availrmem is greater than swapfs_minfree, and the number of reserved
|
|
* swap pages. We also add a bit of extra here just to prevent
|
|
* circumstances from getting really dire.
|
|
*/
|
|
n = PAGESIZE * (availrmem - swapfs_minfree - swapfs_reserve -
|
|
desfree - arc_swapfs_reserve);
|
|
if (n < lowest) {
|
|
lowest = n;
|
|
r = FMR_SWAPFS_MINFREE;
|
|
}
|
|
|
|
/*
|
|
* Check that we have enough availrmem that memory locking (e.g., via
|
|
* mlock(3C) or memcntl(2)) can still succeed. (pages_pp_maximum
|
|
* stores the number of pages that cannot be locked; when availrmem
|
|
* drops below pages_pp_maximum, page locking mechanisms such as
|
|
* page_pp_lock() will fail.)
|
|
*/
|
|
n = PAGESIZE * (availrmem - pages_pp_maximum -
|
|
arc_pages_pp_reserve);
|
|
if (n < lowest) {
|
|
lowest = n;
|
|
r = FMR_PAGES_PP_MAXIMUM;
|
|
}
|
|
#endif
|
|
|
|
#if defined(_ILP32)
|
|
/*
|
|
* If we're on a 32-bit platform, it's possible that we'll exhaust the
|
|
* kernel heap space before we ever run out of available physical
|
|
* memory. Most checks of the size of the heap_area compare against
|
|
* tune.t_minarmem, which is the minimum available real memory that we
|
|
* can have in the system. However, this is generally fixed at 25 pages
|
|
* which is so low that it's useless. In this comparison, we seek to
|
|
* calculate the total heap-size, and reclaim if more than 3/4ths of the
|
|
* heap is allocated. (Or, in the calculation, if less than 1/4th is
|
|
* free)
|
|
*/
|
|
n = vmem_size(heap_arena, VMEM_FREE) -
|
|
(vmem_size(heap_arena, VMEM_FREE | VMEM_ALLOC) >> 2);
|
|
if (n < lowest) {
|
|
lowest = n;
|
|
r = FMR_HEAP_ARENA;
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
* If zio data pages are being allocated out of a separate heap segment,
|
|
* then enforce that the size of available vmem for this arena remains
|
|
* above about 1/4th (1/(2^arc_zio_arena_free_shift)) free.
|
|
*
|
|
* Note that reducing the arc_zio_arena_free_shift keeps more virtual
|
|
* memory (in the zio_arena) free, which can avoid memory
|
|
* fragmentation issues.
|
|
*/
|
|
if (zio_arena != NULL) {
|
|
n = (int64_t)vmem_size(zio_arena, VMEM_FREE) -
|
|
(vmem_size(zio_arena, VMEM_ALLOC) >>
|
|
arc_zio_arena_free_shift);
|
|
if (n < lowest) {
|
|
lowest = n;
|
|
r = FMR_ZIO_ARENA;
|
|
}
|
|
}
|
|
#else /* _KERNEL */
|
|
/* Every 100 calls, free a small amount */
|
|
if (spa_get_random(100) == 0)
|
|
lowest = -1024;
|
|
#endif /* _KERNEL */
|
|
|
|
last_free_memory = lowest;
|
|
last_free_reason = r;
|
|
|
|
return (lowest);
|
|
}
|
|
|
|
/*
|
|
* Determine if the system is under memory pressure and is asking
|
|
* to reclaim memory. A return value of B_TRUE indicates that the system
|
|
* is under memory pressure and that the arc should adjust accordingly.
|
|
*/
|
|
static boolean_t
|
|
arc_reclaim_needed(void)
|
|
{
|
|
return (arc_available_memory() < 0);
|
|
}
|
|
|
|
static void
|
|
arc_kmem_reap_now(void)
|
|
{
|
|
size_t i;
|
|
kmem_cache_t *prev_cache = NULL;
|
|
kmem_cache_t *prev_data_cache = NULL;
|
|
extern kmem_cache_t *zio_buf_cache[];
|
|
extern kmem_cache_t *zio_data_buf_cache[];
|
|
extern kmem_cache_t *range_seg_cache;
|
|
|
|
#ifdef _KERNEL
|
|
if ((arc_meta_used >= arc_meta_limit) && zfs_arc_meta_prune) {
|
|
/*
|
|
* We are exceeding our meta-data cache limit.
|
|
* Prune some entries to release holds on meta-data.
|
|
*/
|
|
arc_prune_async(zfs_arc_meta_prune);
|
|
}
|
|
#if defined(_ILP32)
|
|
/*
|
|
* Reclaim unused memory from all kmem caches.
|
|
*/
|
|
kmem_reap();
|
|
#endif
|
|
#endif
|
|
|
|
for (i = 0; i < SPA_MAXBLOCKSIZE >> SPA_MINBLOCKSHIFT; i++) {
|
|
#if defined(_ILP32)
|
|
/* reach upper limit of cache size on 32-bit */
|
|
if (zio_buf_cache[i] == NULL)
|
|
break;
|
|
#endif
|
|
if (zio_buf_cache[i] != prev_cache) {
|
|
prev_cache = zio_buf_cache[i];
|
|
kmem_cache_reap_now(zio_buf_cache[i]);
|
|
}
|
|
if (zio_data_buf_cache[i] != prev_data_cache) {
|
|
prev_data_cache = zio_data_buf_cache[i];
|
|
kmem_cache_reap_now(zio_data_buf_cache[i]);
|
|
}
|
|
}
|
|
kmem_cache_reap_now(buf_cache);
|
|
kmem_cache_reap_now(hdr_full_cache);
|
|
kmem_cache_reap_now(hdr_l2only_cache);
|
|
kmem_cache_reap_now(range_seg_cache);
|
|
|
|
if (zio_arena != NULL) {
|
|
/*
|
|
* Ask the vmem arena to reclaim unused memory from its
|
|
* quantum caches.
|
|
*/
|
|
vmem_qcache_reap(zio_arena);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Threads can block in arc_get_data_impl() waiting for this thread to evict
|
|
* enough data and signal them to proceed. When this happens, the threads in
|
|
* arc_get_data_impl() are sleeping while holding the hash lock for their
|
|
* particular arc header. Thus, we must be careful to never sleep on a
|
|
* hash lock in this thread. This is to prevent the following deadlock:
|
|
*
|
|
* - Thread A sleeps on CV in arc_get_data_impl() holding hash lock "L",
|
|
* waiting for the reclaim thread to signal it.
|
|
*
|
|
* - arc_reclaim_thread() tries to acquire hash lock "L" using mutex_enter,
|
|
* fails, and goes to sleep forever.
|
|
*
|
|
* This possible deadlock is avoided by always acquiring a hash lock
|
|
* using mutex_tryenter() from arc_reclaim_thread().
|
|
*/
|
|
/* ARGSUSED */
|
|
static void
|
|
arc_reclaim_thread(void *unused)
|
|
{
|
|
fstrans_cookie_t cookie = spl_fstrans_mark();
|
|
hrtime_t growtime = 0;
|
|
callb_cpr_t cpr;
|
|
|
|
CALLB_CPR_INIT(&cpr, &arc_reclaim_lock, callb_generic_cpr, FTAG);
|
|
|
|
mutex_enter(&arc_reclaim_lock);
|
|
while (!arc_reclaim_thread_exit) {
|
|
uint64_t evicted = 0;
|
|
uint64_t need_free = arc_need_free;
|
|
arc_tuning_update();
|
|
|
|
/*
|
|
* This is necessary in order for the mdb ::arc dcmd to
|
|
* show up to date information. Since the ::arc command
|
|
* does not call the kstat's update function, without
|
|
* this call, the command may show stale stats for the
|
|
* anon, mru, mru_ghost, mfu, and mfu_ghost lists. Even
|
|
* with this change, the data might be up to 1 second
|
|
* out of date; but that should suffice. The arc_state_t
|
|
* structures can be queried directly if more accurate
|
|
* information is needed.
|
|
*/
|
|
#ifndef __linux__
|
|
if (arc_ksp != NULL)
|
|
arc_ksp->ks_update(arc_ksp, KSTAT_READ);
|
|
#endif
|
|
mutex_exit(&arc_reclaim_lock);
|
|
|
|
/*
|
|
* We call arc_adjust() before (possibly) calling
|
|
* arc_kmem_reap_now(), so that we can wake up
|
|
* arc_get_data_buf() sooner.
|
|
*/
|
|
evicted = arc_adjust();
|
|
|
|
int64_t free_memory = arc_available_memory();
|
|
if (free_memory < 0) {
|
|
|
|
arc_no_grow = B_TRUE;
|
|
arc_warm = B_TRUE;
|
|
|
|
/*
|
|
* Wait at least zfs_grow_retry (default 5) seconds
|
|
* before considering growing.
|
|
*/
|
|
growtime = gethrtime() + SEC2NSEC(arc_grow_retry);
|
|
|
|
arc_kmem_reap_now();
|
|
|
|
/*
|
|
* If we are still low on memory, shrink the ARC
|
|
* so that we have arc_shrink_min free space.
|
|
*/
|
|
free_memory = arc_available_memory();
|
|
|
|
int64_t to_free =
|
|
(arc_c >> arc_shrink_shift) - free_memory;
|
|
if (to_free > 0) {
|
|
#ifdef _KERNEL
|
|
to_free = MAX(to_free, need_free);
|
|
#endif
|
|
arc_shrink(to_free);
|
|
}
|
|
} else if (free_memory < arc_c >> arc_no_grow_shift) {
|
|
arc_no_grow = B_TRUE;
|
|
} else if (gethrtime() >= growtime) {
|
|
arc_no_grow = B_FALSE;
|
|
}
|
|
|
|
mutex_enter(&arc_reclaim_lock);
|
|
|
|
/*
|
|
* If evicted is zero, we couldn't evict anything via
|
|
* arc_adjust(). This could be due to hash lock
|
|
* collisions, but more likely due to the majority of
|
|
* arc buffers being unevictable. Therefore, even if
|
|
* arc_size is above arc_c, another pass is unlikely to
|
|
* be helpful and could potentially cause us to enter an
|
|
* infinite loop.
|
|
*/
|
|
if (arc_size <= arc_c || evicted == 0) {
|
|
/*
|
|
* We're either no longer overflowing, or we
|
|
* can't evict anything more, so we should wake
|
|
* up any threads before we go to sleep and remove
|
|
* the bytes we were working on from arc_need_free
|
|
* since nothing more will be done here.
|
|
*/
|
|
cv_broadcast(&arc_reclaim_waiters_cv);
|
|
ARCSTAT_INCR(arcstat_need_free, -need_free);
|
|
|
|
/*
|
|
* Block until signaled, or after one second (we
|
|
* might need to perform arc_kmem_reap_now()
|
|
* even if we aren't being signalled)
|
|
*/
|
|
CALLB_CPR_SAFE_BEGIN(&cpr);
|
|
(void) cv_timedwait_sig_hires(&arc_reclaim_thread_cv,
|
|
&arc_reclaim_lock, SEC2NSEC(1), MSEC2NSEC(1), 0);
|
|
CALLB_CPR_SAFE_END(&cpr, &arc_reclaim_lock);
|
|
}
|
|
}
|
|
|
|
arc_reclaim_thread_exit = B_FALSE;
|
|
cv_broadcast(&arc_reclaim_thread_cv);
|
|
CALLB_CPR_EXIT(&cpr); /* drops arc_reclaim_lock */
|
|
spl_fstrans_unmark(cookie);
|
|
thread_exit();
|
|
}
|
|
|
|
#ifdef _KERNEL
|
|
/*
|
|
* Determine the amount of memory eligible for eviction contained in the
|
|
* ARC. All clean data reported by the ghost lists can always be safely
|
|
* evicted. Due to arc_c_min, the same does not hold for all clean data
|
|
* contained by the regular mru and mfu lists.
|
|
*
|
|
* In the case of the regular mru and mfu lists, we need to report as
|
|
* much clean data as possible, such that evicting that same reported
|
|
* data will not bring arc_size below arc_c_min. Thus, in certain
|
|
* circumstances, the total amount of clean data in the mru and mfu
|
|
* lists might not actually be evictable.
|
|
*
|
|
* The following two distinct cases are accounted for:
|
|
*
|
|
* 1. The sum of the amount of dirty data contained by both the mru and
|
|
* mfu lists, plus the ARC's other accounting (e.g. the anon list),
|
|
* is greater than or equal to arc_c_min.
|
|
* (i.e. amount of dirty data >= arc_c_min)
|
|
*
|
|
* This is the easy case; all clean data contained by the mru and mfu
|
|
* lists is evictable. Evicting all clean data can only drop arc_size
|
|
* to the amount of dirty data, which is greater than arc_c_min.
|
|
*
|
|
* 2. The sum of the amount of dirty data contained by both the mru and
|
|
* mfu lists, plus the ARC's other accounting (e.g. the anon list),
|
|
* is less than arc_c_min.
|
|
* (i.e. arc_c_min > amount of dirty data)
|
|
*
|
|
* 2.1. arc_size is greater than or equal arc_c_min.
|
|
* (i.e. arc_size >= arc_c_min > amount of dirty data)
|
|
*
|
|
* In this case, not all clean data from the regular mru and mfu
|
|
* lists is actually evictable; we must leave enough clean data
|
|
* to keep arc_size above arc_c_min. Thus, the maximum amount of
|
|
* evictable data from the two lists combined, is exactly the
|
|
* difference between arc_size and arc_c_min.
|
|
*
|
|
* 2.2. arc_size is less than arc_c_min
|
|
* (i.e. arc_c_min > arc_size > amount of dirty data)
|
|
*
|
|
* In this case, none of the data contained in the mru and mfu
|
|
* lists is evictable, even if it's clean. Since arc_size is
|
|
* already below arc_c_min, evicting any more would only
|
|
* increase this negative difference.
|
|
*/
|
|
static uint64_t
|
|
arc_evictable_memory(void)
|
|
{
|
|
uint64_t arc_clean =
|
|
refcount_count(&arc_mru->arcs_esize[ARC_BUFC_DATA]) +
|
|
refcount_count(&arc_mru->arcs_esize[ARC_BUFC_METADATA]) +
|
|
refcount_count(&arc_mfu->arcs_esize[ARC_BUFC_DATA]) +
|
|
refcount_count(&arc_mfu->arcs_esize[ARC_BUFC_METADATA]);
|
|
uint64_t arc_dirty = MAX((int64_t)arc_size - (int64_t)arc_clean, 0);
|
|
|
|
/*
|
|
* Scale reported evictable memory in proportion to page cache, cap
|
|
* at specified min/max.
|
|
*/
|
|
#ifdef ZFS_GLOBAL_NODE_PAGE_STATE
|
|
uint64_t min = (ptob(global_node_page_state(NR_FILE_PAGES)) / 100) *
|
|
zfs_arc_pc_percent;
|
|
#else
|
|
uint64_t min = (ptob(global_page_state(NR_FILE_PAGES)) / 100) *
|
|
zfs_arc_pc_percent;
|
|
#endif
|
|
min = MAX(arc_c_min, MIN(arc_c_max, min));
|
|
|
|
if (arc_dirty >= min)
|
|
return (arc_clean);
|
|
|
|
return (MAX((int64_t)arc_size - (int64_t)min, 0));
|
|
}
|
|
|
|
/*
|
|
* If sc->nr_to_scan is zero, the caller is requesting a query of the
|
|
* number of objects which can potentially be freed. If it is nonzero,
|
|
* the request is to free that many objects.
|
|
*
|
|
* Linux kernels >= 3.12 have the count_objects and scan_objects callbacks
|
|
* in struct shrinker and also require the shrinker to return the number
|
|
* of objects freed.
|
|
*
|
|
* Older kernels require the shrinker to return the number of freeable
|
|
* objects following the freeing of nr_to_free.
|
|
*/
|
|
static spl_shrinker_t
|
|
__arc_shrinker_func(struct shrinker *shrink, struct shrink_control *sc)
|
|
{
|
|
int64_t pages;
|
|
|
|
/* The arc is considered warm once reclaim has occurred */
|
|
if (unlikely(arc_warm == B_FALSE))
|
|
arc_warm = B_TRUE;
|
|
|
|
/* Return the potential number of reclaimable pages */
|
|
pages = btop((int64_t)arc_evictable_memory());
|
|
if (sc->nr_to_scan == 0)
|
|
return (pages);
|
|
|
|
/* Not allowed to perform filesystem reclaim */
|
|
if (!(sc->gfp_mask & __GFP_FS))
|
|
return (SHRINK_STOP);
|
|
|
|
/* Reclaim in progress */
|
|
if (mutex_tryenter(&arc_reclaim_lock) == 0) {
|
|
ARCSTAT_INCR(arcstat_need_free, ptob(sc->nr_to_scan));
|
|
return (0);
|
|
}
|
|
|
|
mutex_exit(&arc_reclaim_lock);
|
|
|
|
/*
|
|
* Evict the requested number of pages by shrinking arc_c the
|
|
* requested amount.
|
|
*/
|
|
if (pages > 0) {
|
|
arc_shrink(ptob(sc->nr_to_scan));
|
|
if (current_is_kswapd())
|
|
arc_kmem_reap_now();
|
|
#ifdef HAVE_SPLIT_SHRINKER_CALLBACK
|
|
pages = MAX((int64_t)pages -
|
|
(int64_t)btop(arc_evictable_memory()), 0);
|
|
#else
|
|
pages = btop(arc_evictable_memory());
|
|
#endif
|
|
/*
|
|
* We've shrunk what we can, wake up threads.
|
|
*/
|
|
cv_broadcast(&arc_reclaim_waiters_cv);
|
|
} else
|
|
pages = SHRINK_STOP;
|
|
|
|
/*
|
|
* When direct reclaim is observed it usually indicates a rapid
|
|
* increase in memory pressure. This occurs because the kswapd
|
|
* threads were unable to asynchronously keep enough free memory
|
|
* available. In this case set arc_no_grow to briefly pause arc
|
|
* growth to avoid compounding the memory pressure.
|
|
*/
|
|
if (current_is_kswapd()) {
|
|
ARCSTAT_BUMP(arcstat_memory_indirect_count);
|
|
} else {
|
|
arc_no_grow = B_TRUE;
|
|
arc_kmem_reap_now();
|
|
ARCSTAT_BUMP(arcstat_memory_direct_count);
|
|
}
|
|
|
|
return (pages);
|
|
}
|
|
SPL_SHRINKER_CALLBACK_WRAPPER(arc_shrinker_func);
|
|
|
|
SPL_SHRINKER_DECLARE(arc_shrinker, arc_shrinker_func, DEFAULT_SEEKS);
|
|
#endif /* _KERNEL */
|
|
|
|
/*
|
|
* Adapt arc info given the number of bytes we are trying to add and
|
|
* the state that we are coming from. This function is only called
|
|
* when we are adding new content to the cache.
|
|
*/
|
|
static void
|
|
arc_adapt(int bytes, arc_state_t *state)
|
|
{
|
|
int mult;
|
|
uint64_t arc_p_min = (arc_c >> arc_p_min_shift);
|
|
int64_t mrug_size = refcount_count(&arc_mru_ghost->arcs_size);
|
|
int64_t mfug_size = refcount_count(&arc_mfu_ghost->arcs_size);
|
|
|
|
if (state == arc_l2c_only)
|
|
return;
|
|
|
|
ASSERT(bytes > 0);
|
|
/*
|
|
* Adapt the target size of the MRU list:
|
|
* - if we just hit in the MRU ghost list, then increase
|
|
* the target size of the MRU list.
|
|
* - if we just hit in the MFU ghost list, then increase
|
|
* the target size of the MFU list by decreasing the
|
|
* target size of the MRU list.
|
|
*/
|
|
if (state == arc_mru_ghost) {
|
|
mult = (mrug_size >= mfug_size) ? 1 : (mfug_size / mrug_size);
|
|
if (!zfs_arc_p_dampener_disable)
|
|
mult = MIN(mult, 10); /* avoid wild arc_p adjustment */
|
|
|
|
arc_p = MIN(arc_c - arc_p_min, arc_p + bytes * mult);
|
|
} else if (state == arc_mfu_ghost) {
|
|
uint64_t delta;
|
|
|
|
mult = (mfug_size >= mrug_size) ? 1 : (mrug_size / mfug_size);
|
|
if (!zfs_arc_p_dampener_disable)
|
|
mult = MIN(mult, 10);
|
|
|
|
delta = MIN(bytes * mult, arc_p);
|
|
arc_p = MAX(arc_p_min, arc_p - delta);
|
|
}
|
|
ASSERT((int64_t)arc_p >= 0);
|
|
|
|
if (arc_reclaim_needed()) {
|
|
cv_signal(&arc_reclaim_thread_cv);
|
|
return;
|
|
}
|
|
|
|
if (arc_no_grow)
|
|
return;
|
|
|
|
if (arc_c >= arc_c_max)
|
|
return;
|
|
|
|
/*
|
|
* If we're within (2 * maxblocksize) bytes of the target
|
|
* cache size, increment the target cache size
|
|
*/
|
|
ASSERT3U(arc_c, >=, 2ULL << SPA_MAXBLOCKSHIFT);
|
|
if (arc_size >= arc_c - (2ULL << SPA_MAXBLOCKSHIFT)) {
|
|
atomic_add_64(&arc_c, (int64_t)bytes);
|
|
if (arc_c > arc_c_max)
|
|
arc_c = arc_c_max;
|
|
else if (state == arc_anon)
|
|
atomic_add_64(&arc_p, (int64_t)bytes);
|
|
if (arc_p > arc_c)
|
|
arc_p = arc_c;
|
|
}
|
|
ASSERT((int64_t)arc_p >= 0);
|
|
}
|
|
|
|
/*
|
|
* Check if arc_size has grown past our upper threshold, determined by
|
|
* zfs_arc_overflow_shift.
|
|
*/
|
|
static boolean_t
|
|
arc_is_overflowing(void)
|
|
{
|
|
/* Always allow at least one block of overflow */
|
|
uint64_t overflow = MAX(SPA_MAXBLOCKSIZE,
|
|
arc_c >> zfs_arc_overflow_shift);
|
|
|
|
return (arc_size >= arc_c + overflow);
|
|
}
|
|
|
|
static abd_t *
|
|
arc_get_data_abd(arc_buf_hdr_t *hdr, uint64_t size, void *tag)
|
|
{
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
|
|
arc_get_data_impl(hdr, size, tag);
|
|
if (type == ARC_BUFC_METADATA) {
|
|
return (abd_alloc(size, B_TRUE));
|
|
} else {
|
|
ASSERT(type == ARC_BUFC_DATA);
|
|
return (abd_alloc(size, B_FALSE));
|
|
}
|
|
}
|
|
|
|
static void *
|
|
arc_get_data_buf(arc_buf_hdr_t *hdr, uint64_t size, void *tag)
|
|
{
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
|
|
arc_get_data_impl(hdr, size, tag);
|
|
if (type == ARC_BUFC_METADATA) {
|
|
return (zio_buf_alloc(size));
|
|
} else {
|
|
ASSERT(type == ARC_BUFC_DATA);
|
|
return (zio_data_buf_alloc(size));
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Allocate a block and return it to the caller. If we are hitting the
|
|
* hard limit for the cache size, we must sleep, waiting for the eviction
|
|
* thread to catch up. If we're past the target size but below the hard
|
|
* limit, we'll only signal the reclaim thread and continue on.
|
|
*/
|
|
static void
|
|
arc_get_data_impl(arc_buf_hdr_t *hdr, uint64_t size, void *tag)
|
|
{
|
|
arc_state_t *state = hdr->b_l1hdr.b_state;
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
|
|
arc_adapt(size, state);
|
|
|
|
/*
|
|
* If arc_size is currently overflowing, and has grown past our
|
|
* upper limit, we must be adding data faster than the evict
|
|
* thread can evict. Thus, to ensure we don't compound the
|
|
* problem by adding more data and forcing arc_size to grow even
|
|
* further past it's target size, we halt and wait for the
|
|
* eviction thread to catch up.
|
|
*
|
|
* It's also possible that the reclaim thread is unable to evict
|
|
* enough buffers to get arc_size below the overflow limit (e.g.
|
|
* due to buffers being un-evictable, or hash lock collisions).
|
|
* In this case, we want to proceed regardless if we're
|
|
* overflowing; thus we don't use a while loop here.
|
|
*/
|
|
if (arc_is_overflowing()) {
|
|
mutex_enter(&arc_reclaim_lock);
|
|
|
|
/*
|
|
* Now that we've acquired the lock, we may no longer be
|
|
* over the overflow limit, lets check.
|
|
*
|
|
* We're ignoring the case of spurious wake ups. If that
|
|
* were to happen, it'd let this thread consume an ARC
|
|
* buffer before it should have (i.e. before we're under
|
|
* the overflow limit and were signalled by the reclaim
|
|
* thread). As long as that is a rare occurrence, it
|
|
* shouldn't cause any harm.
|
|
*/
|
|
if (arc_is_overflowing()) {
|
|
cv_signal(&arc_reclaim_thread_cv);
|
|
cv_wait(&arc_reclaim_waiters_cv, &arc_reclaim_lock);
|
|
}
|
|
|
|
mutex_exit(&arc_reclaim_lock);
|
|
}
|
|
|
|
VERIFY3U(hdr->b_type, ==, type);
|
|
if (type == ARC_BUFC_METADATA) {
|
|
arc_space_consume(size, ARC_SPACE_META);
|
|
} else {
|
|
arc_space_consume(size, ARC_SPACE_DATA);
|
|
}
|
|
|
|
/*
|
|
* Update the state size. Note that ghost states have a
|
|
* "ghost size" and so don't need to be updated.
|
|
*/
|
|
if (!GHOST_STATE(state)) {
|
|
|
|
(void) refcount_add_many(&state->arcs_size, size, tag);
|
|
|
|
/*
|
|
* If this is reached via arc_read, the link is
|
|
* protected by the hash lock. If reached via
|
|
* arc_buf_alloc, the header should not be accessed by
|
|
* any other thread. And, if reached via arc_read_done,
|
|
* the hash lock will protect it if it's found in the
|
|
* hash table; otherwise no other thread should be
|
|
* trying to [add|remove]_reference it.
|
|
*/
|
|
if (multilist_link_active(&hdr->b_l1hdr.b_arc_node)) {
|
|
ASSERT(refcount_is_zero(&hdr->b_l1hdr.b_refcnt));
|
|
(void) refcount_add_many(&state->arcs_esize[type],
|
|
size, tag);
|
|
}
|
|
|
|
/*
|
|
* If we are growing the cache, and we are adding anonymous
|
|
* data, and we have outgrown arc_p, update arc_p
|
|
*/
|
|
if (arc_size < arc_c && hdr->b_l1hdr.b_state == arc_anon &&
|
|
(refcount_count(&arc_anon->arcs_size) +
|
|
refcount_count(&arc_mru->arcs_size) > arc_p))
|
|
arc_p = MIN(arc_c, arc_p + size);
|
|
}
|
|
}
|
|
|
|
static void
|
|
arc_free_data_abd(arc_buf_hdr_t *hdr, abd_t *abd, uint64_t size, void *tag)
|
|
{
|
|
arc_free_data_impl(hdr, size, tag);
|
|
abd_free(abd);
|
|
}
|
|
|
|
static void
|
|
arc_free_data_buf(arc_buf_hdr_t *hdr, void *buf, uint64_t size, void *tag)
|
|
{
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
|
|
arc_free_data_impl(hdr, size, tag);
|
|
if (type == ARC_BUFC_METADATA) {
|
|
zio_buf_free(buf, size);
|
|
} else {
|
|
ASSERT(type == ARC_BUFC_DATA);
|
|
zio_data_buf_free(buf, size);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Free the arc data buffer.
|
|
*/
|
|
static void
|
|
arc_free_data_impl(arc_buf_hdr_t *hdr, uint64_t size, void *tag)
|
|
{
|
|
arc_state_t *state = hdr->b_l1hdr.b_state;
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
|
|
/* protected by hash lock, if in the hash table */
|
|
if (multilist_link_active(&hdr->b_l1hdr.b_arc_node)) {
|
|
ASSERT(refcount_is_zero(&hdr->b_l1hdr.b_refcnt));
|
|
ASSERT(state != arc_anon && state != arc_l2c_only);
|
|
|
|
(void) refcount_remove_many(&state->arcs_esize[type],
|
|
size, tag);
|
|
}
|
|
(void) refcount_remove_many(&state->arcs_size, size, tag);
|
|
|
|
VERIFY3U(hdr->b_type, ==, type);
|
|
if (type == ARC_BUFC_METADATA) {
|
|
arc_space_return(size, ARC_SPACE_META);
|
|
} else {
|
|
ASSERT(type == ARC_BUFC_DATA);
|
|
arc_space_return(size, ARC_SPACE_DATA);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* This routine is called whenever a buffer is accessed.
|
|
* NOTE: the hash lock is dropped in this function.
|
|
*/
|
|
static void
|
|
arc_access(arc_buf_hdr_t *hdr, kmutex_t *hash_lock)
|
|
{
|
|
clock_t now;
|
|
|
|
ASSERT(MUTEX_HELD(hash_lock));
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
if (hdr->b_l1hdr.b_state == arc_anon) {
|
|
/*
|
|
* This buffer is not in the cache, and does not
|
|
* appear in our "ghost" list. Add the new buffer
|
|
* to the MRU state.
|
|
*/
|
|
|
|
ASSERT0(hdr->b_l1hdr.b_arc_access);
|
|
hdr->b_l1hdr.b_arc_access = ddi_get_lbolt();
|
|
DTRACE_PROBE1(new_state__mru, arc_buf_hdr_t *, hdr);
|
|
arc_change_state(arc_mru, hdr, hash_lock);
|
|
|
|
} else if (hdr->b_l1hdr.b_state == arc_mru) {
|
|
now = ddi_get_lbolt();
|
|
|
|
/*
|
|
* If this buffer is here because of a prefetch, then either:
|
|
* - clear the flag if this is a "referencing" read
|
|
* (any subsequent access will bump this into the MFU state).
|
|
* or
|
|
* - move the buffer to the head of the list if this is
|
|
* another prefetch (to make it less likely to be evicted).
|
|
*/
|
|
if (HDR_PREFETCH(hdr) || HDR_PRESCIENT_PREFETCH(hdr)) {
|
|
if (refcount_count(&hdr->b_l1hdr.b_refcnt) == 0) {
|
|
/* link protected by hash lock */
|
|
ASSERT(multilist_link_active(
|
|
&hdr->b_l1hdr.b_arc_node));
|
|
} else {
|
|
arc_hdr_clear_flags(hdr,
|
|
ARC_FLAG_PREFETCH |
|
|
ARC_FLAG_PRESCIENT_PREFETCH);
|
|
atomic_inc_32(&hdr->b_l1hdr.b_mru_hits);
|
|
ARCSTAT_BUMP(arcstat_mru_hits);
|
|
}
|
|
hdr->b_l1hdr.b_arc_access = now;
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* This buffer has been "accessed" only once so far,
|
|
* but it is still in the cache. Move it to the MFU
|
|
* state.
|
|
*/
|
|
if (ddi_time_after(now, hdr->b_l1hdr.b_arc_access +
|
|
ARC_MINTIME)) {
|
|
/*
|
|
* More than 125ms have passed since we
|
|
* instantiated this buffer. Move it to the
|
|
* most frequently used state.
|
|
*/
|
|
hdr->b_l1hdr.b_arc_access = now;
|
|
DTRACE_PROBE1(new_state__mfu, arc_buf_hdr_t *, hdr);
|
|
arc_change_state(arc_mfu, hdr, hash_lock);
|
|
}
|
|
atomic_inc_32(&hdr->b_l1hdr.b_mru_hits);
|
|
ARCSTAT_BUMP(arcstat_mru_hits);
|
|
} else if (hdr->b_l1hdr.b_state == arc_mru_ghost) {
|
|
arc_state_t *new_state;
|
|
/*
|
|
* This buffer has been "accessed" recently, but
|
|
* was evicted from the cache. Move it to the
|
|
* MFU state.
|
|
*/
|
|
|
|
if (HDR_PREFETCH(hdr) || HDR_PRESCIENT_PREFETCH(hdr)) {
|
|
new_state = arc_mru;
|
|
if (refcount_count(&hdr->b_l1hdr.b_refcnt) > 0) {
|
|
arc_hdr_clear_flags(hdr,
|
|
ARC_FLAG_PREFETCH |
|
|
ARC_FLAG_PRESCIENT_PREFETCH);
|
|
}
|
|
DTRACE_PROBE1(new_state__mru, arc_buf_hdr_t *, hdr);
|
|
} else {
|
|
new_state = arc_mfu;
|
|
DTRACE_PROBE1(new_state__mfu, arc_buf_hdr_t *, hdr);
|
|
}
|
|
|
|
hdr->b_l1hdr.b_arc_access = ddi_get_lbolt();
|
|
arc_change_state(new_state, hdr, hash_lock);
|
|
|
|
atomic_inc_32(&hdr->b_l1hdr.b_mru_ghost_hits);
|
|
ARCSTAT_BUMP(arcstat_mru_ghost_hits);
|
|
} else if (hdr->b_l1hdr.b_state == arc_mfu) {
|
|
/*
|
|
* This buffer has been accessed more than once and is
|
|
* still in the cache. Keep it in the MFU state.
|
|
*
|
|
* NOTE: an add_reference() that occurred when we did
|
|
* the arc_read() will have kicked this off the list.
|
|
* If it was a prefetch, we will explicitly move it to
|
|
* the head of the list now.
|
|
*/
|
|
|
|
atomic_inc_32(&hdr->b_l1hdr.b_mfu_hits);
|
|
ARCSTAT_BUMP(arcstat_mfu_hits);
|
|
hdr->b_l1hdr.b_arc_access = ddi_get_lbolt();
|
|
} else if (hdr->b_l1hdr.b_state == arc_mfu_ghost) {
|
|
arc_state_t *new_state = arc_mfu;
|
|
/*
|
|
* This buffer has been accessed more than once but has
|
|
* been evicted from the cache. Move it back to the
|
|
* MFU state.
|
|
*/
|
|
|
|
if (HDR_PREFETCH(hdr) || HDR_PRESCIENT_PREFETCH(hdr)) {
|
|
/*
|
|
* This is a prefetch access...
|
|
* move this block back to the MRU state.
|
|
*/
|
|
new_state = arc_mru;
|
|
}
|
|
|
|
hdr->b_l1hdr.b_arc_access = ddi_get_lbolt();
|
|
DTRACE_PROBE1(new_state__mfu, arc_buf_hdr_t *, hdr);
|
|
arc_change_state(new_state, hdr, hash_lock);
|
|
|
|
atomic_inc_32(&hdr->b_l1hdr.b_mfu_ghost_hits);
|
|
ARCSTAT_BUMP(arcstat_mfu_ghost_hits);
|
|
} else if (hdr->b_l1hdr.b_state == arc_l2c_only) {
|
|
/*
|
|
* This buffer is on the 2nd Level ARC.
|
|
*/
|
|
|
|
hdr->b_l1hdr.b_arc_access = ddi_get_lbolt();
|
|
DTRACE_PROBE1(new_state__mfu, arc_buf_hdr_t *, hdr);
|
|
arc_change_state(arc_mfu, hdr, hash_lock);
|
|
} else {
|
|
cmn_err(CE_PANIC, "invalid arc state 0x%p",
|
|
hdr->b_l1hdr.b_state);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* This routine is called by dbuf_hold() to update the arc_access() state
|
|
* which otherwise would be skipped for entries in the dbuf cache.
|
|
*/
|
|
void
|
|
arc_buf_access(arc_buf_t *buf)
|
|
{
|
|
mutex_enter(&buf->b_evict_lock);
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
/*
|
|
* Avoid taking the hash_lock when possible as an optimization.
|
|
* The header must be checked again under the hash_lock in order
|
|
* to handle the case where it is concurrently being released.
|
|
*/
|
|
if (hdr->b_l1hdr.b_state == arc_anon || HDR_EMPTY(hdr)) {
|
|
mutex_exit(&buf->b_evict_lock);
|
|
return;
|
|
}
|
|
|
|
kmutex_t *hash_lock = HDR_LOCK(hdr);
|
|
mutex_enter(hash_lock);
|
|
|
|
if (hdr->b_l1hdr.b_state == arc_anon || HDR_EMPTY(hdr)) {
|
|
mutex_exit(hash_lock);
|
|
mutex_exit(&buf->b_evict_lock);
|
|
ARCSTAT_BUMP(arcstat_access_skip);
|
|
return;
|
|
}
|
|
|
|
mutex_exit(&buf->b_evict_lock);
|
|
|
|
ASSERT(hdr->b_l1hdr.b_state == arc_mru ||
|
|
hdr->b_l1hdr.b_state == arc_mfu);
|
|
|
|
DTRACE_PROBE1(arc__hit, arc_buf_hdr_t *, hdr);
|
|
arc_access(hdr, hash_lock);
|
|
mutex_exit(hash_lock);
|
|
|
|
ARCSTAT_BUMP(arcstat_hits);
|
|
ARCSTAT_CONDSTAT(!HDR_PREFETCH(hdr) && !HDR_PRESCIENT_PREFETCH(hdr),
|
|
demand, prefetch, !HDR_ISTYPE_METADATA(hdr), data, metadata, hits);
|
|
}
|
|
|
|
/* a generic arc_read_done_func_t which you can use */
|
|
/* ARGSUSED */
|
|
void
|
|
arc_bcopy_func(zio_t *zio, const zbookmark_phys_t *zb, const blkptr_t *bp,
|
|
arc_buf_t *buf, void *arg)
|
|
{
|
|
if (buf == NULL)
|
|
return;
|
|
|
|
bcopy(buf->b_data, arg, arc_buf_size(buf));
|
|
arc_buf_destroy(buf, arg);
|
|
}
|
|
|
|
/* a generic arc_read_done_func_t */
|
|
/* ARGSUSED */
|
|
void
|
|
arc_getbuf_func(zio_t *zio, const zbookmark_phys_t *zb, const blkptr_t *bp,
|
|
arc_buf_t *buf, void *arg)
|
|
{
|
|
arc_buf_t **bufp = arg;
|
|
|
|
if (buf == NULL) {
|
|
*bufp = NULL;
|
|
} else {
|
|
*bufp = buf;
|
|
ASSERT(buf->b_data);
|
|
}
|
|
}
|
|
|
|
static void
|
|
arc_hdr_verify(arc_buf_hdr_t *hdr, blkptr_t *bp)
|
|
{
|
|
if (BP_IS_HOLE(bp) || BP_IS_EMBEDDED(bp)) {
|
|
ASSERT3U(HDR_GET_PSIZE(hdr), ==, 0);
|
|
ASSERT3U(arc_hdr_get_compress(hdr), ==, ZIO_COMPRESS_OFF);
|
|
} else {
|
|
if (HDR_COMPRESSION_ENABLED(hdr)) {
|
|
ASSERT3U(arc_hdr_get_compress(hdr), ==,
|
|
BP_GET_COMPRESS(bp));
|
|
}
|
|
ASSERT3U(HDR_GET_LSIZE(hdr), ==, BP_GET_LSIZE(bp));
|
|
ASSERT3U(HDR_GET_PSIZE(hdr), ==, BP_GET_PSIZE(bp));
|
|
ASSERT3U(!!HDR_PROTECTED(hdr), ==, BP_IS_PROTECTED(bp));
|
|
}
|
|
}
|
|
|
|
static void
|
|
arc_read_done(zio_t *zio)
|
|
{
|
|
blkptr_t *bp = zio->io_bp;
|
|
arc_buf_hdr_t *hdr = zio->io_private;
|
|
kmutex_t *hash_lock = NULL;
|
|
arc_callback_t *callback_list;
|
|
arc_callback_t *acb;
|
|
boolean_t freeable = B_FALSE;
|
|
|
|
/*
|
|
* The hdr was inserted into hash-table and removed from lists
|
|
* prior to starting I/O. We should find this header, since
|
|
* it's in the hash table, and it should be legit since it's
|
|
* not possible to evict it during the I/O. The only possible
|
|
* reason for it not to be found is if we were freed during the
|
|
* read.
|
|
*/
|
|
if (HDR_IN_HASH_TABLE(hdr)) {
|
|
arc_buf_hdr_t *found;
|
|
|
|
ASSERT3U(hdr->b_birth, ==, BP_PHYSICAL_BIRTH(zio->io_bp));
|
|
ASSERT3U(hdr->b_dva.dva_word[0], ==,
|
|
BP_IDENTITY(zio->io_bp)->dva_word[0]);
|
|
ASSERT3U(hdr->b_dva.dva_word[1], ==,
|
|
BP_IDENTITY(zio->io_bp)->dva_word[1]);
|
|
|
|
found = buf_hash_find(hdr->b_spa, zio->io_bp, &hash_lock);
|
|
|
|
ASSERT((found == hdr &&
|
|
DVA_EQUAL(&hdr->b_dva, BP_IDENTITY(zio->io_bp))) ||
|
|
(found == hdr && HDR_L2_READING(hdr)));
|
|
ASSERT3P(hash_lock, !=, NULL);
|
|
}
|
|
|
|
if (BP_IS_PROTECTED(bp)) {
|
|
hdr->b_crypt_hdr.b_ot = BP_GET_TYPE(bp);
|
|
hdr->b_crypt_hdr.b_dsobj = zio->io_bookmark.zb_objset;
|
|
zio_crypt_decode_params_bp(bp, hdr->b_crypt_hdr.b_salt,
|
|
hdr->b_crypt_hdr.b_iv);
|
|
|
|
if (BP_GET_TYPE(bp) == DMU_OT_INTENT_LOG) {
|
|
void *tmpbuf;
|
|
|
|
tmpbuf = abd_borrow_buf_copy(zio->io_abd,
|
|
sizeof (zil_chain_t));
|
|
zio_crypt_decode_mac_zil(tmpbuf,
|
|
hdr->b_crypt_hdr.b_mac);
|
|
abd_return_buf(zio->io_abd, tmpbuf,
|
|
sizeof (zil_chain_t));
|
|
} else {
|
|
zio_crypt_decode_mac_bp(bp, hdr->b_crypt_hdr.b_mac);
|
|
}
|
|
}
|
|
|
|
if (zio->io_error == 0) {
|
|
/* byteswap if necessary */
|
|
if (BP_SHOULD_BYTESWAP(zio->io_bp)) {
|
|
if (BP_GET_LEVEL(zio->io_bp) > 0) {
|
|
hdr->b_l1hdr.b_byteswap = DMU_BSWAP_UINT64;
|
|
} else {
|
|
hdr->b_l1hdr.b_byteswap =
|
|
DMU_OT_BYTESWAP(BP_GET_TYPE(zio->io_bp));
|
|
}
|
|
} else {
|
|
hdr->b_l1hdr.b_byteswap = DMU_BSWAP_NUMFUNCS;
|
|
}
|
|
}
|
|
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_L2_EVICTED);
|
|
if (l2arc_noprefetch && HDR_PREFETCH(hdr))
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_L2CACHE);
|
|
|
|
callback_list = hdr->b_l1hdr.b_acb;
|
|
ASSERT3P(callback_list, !=, NULL);
|
|
|
|
if (hash_lock && zio->io_error == 0 &&
|
|
hdr->b_l1hdr.b_state == arc_anon) {
|
|
/*
|
|
* Only call arc_access on anonymous buffers. This is because
|
|
* if we've issued an I/O for an evicted buffer, we've already
|
|
* called arc_access (to prevent any simultaneous readers from
|
|
* getting confused).
|
|
*/
|
|
arc_access(hdr, hash_lock);
|
|
}
|
|
|
|
/*
|
|
* If a read request has a callback (i.e. acb_done is not NULL), then we
|
|
* make a buf containing the data according to the parameters which were
|
|
* passed in. The implementation of arc_buf_alloc_impl() ensures that we
|
|
* aren't needlessly decompressing the data multiple times.
|
|
*/
|
|
int callback_cnt = 0;
|
|
for (acb = callback_list; acb != NULL; acb = acb->acb_next) {
|
|
if (!acb->acb_done)
|
|
continue;
|
|
|
|
callback_cnt++;
|
|
|
|
if (zio->io_error != 0)
|
|
continue;
|
|
|
|
int error = arc_buf_alloc_impl(hdr, zio->io_spa,
|
|
acb->acb_dsobj, acb->acb_private, acb->acb_encrypted,
|
|
acb->acb_compressed, acb->acb_noauth, B_TRUE,
|
|
&acb->acb_buf);
|
|
if (error != 0) {
|
|
arc_buf_destroy(acb->acb_buf, acb->acb_private);
|
|
acb->acb_buf = NULL;
|
|
}
|
|
|
|
/*
|
|
* Assert non-speculative zios didn't fail because an
|
|
* encryption key wasn't loaded
|
|
*/
|
|
ASSERT((zio->io_flags & ZIO_FLAG_SPECULATIVE) || error == 0);
|
|
|
|
/*
|
|
* If we failed to decrypt, report an error now (as the zio
|
|
* layer would have done if it had done the transforms).
|
|
*/
|
|
if (error == ECKSUM) {
|
|
ASSERT(BP_IS_PROTECTED(bp));
|
|
error = SET_ERROR(EIO);
|
|
spa_log_error(zio->io_spa, &zio->io_bookmark);
|
|
if ((zio->io_flags & ZIO_FLAG_SPECULATIVE) == 0) {
|
|
zfs_ereport_post(FM_EREPORT_ZFS_AUTHENTICATION,
|
|
zio->io_spa, NULL, &zio->io_bookmark, zio,
|
|
0, 0);
|
|
}
|
|
}
|
|
|
|
if (zio->io_error == 0)
|
|
zio->io_error = error;
|
|
}
|
|
hdr->b_l1hdr.b_acb = NULL;
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_IO_IN_PROGRESS);
|
|
if (callback_cnt == 0)
|
|
ASSERT(hdr->b_l1hdr.b_pabd != NULL || HDR_HAS_RABD(hdr));
|
|
|
|
ASSERT(refcount_is_zero(&hdr->b_l1hdr.b_refcnt) ||
|
|
callback_list != NULL);
|
|
|
|
if (zio->io_error == 0) {
|
|
arc_hdr_verify(hdr, zio->io_bp);
|
|
} else {
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_IO_ERROR);
|
|
if (hdr->b_l1hdr.b_state != arc_anon)
|
|
arc_change_state(arc_anon, hdr, hash_lock);
|
|
if (HDR_IN_HASH_TABLE(hdr))
|
|
buf_hash_remove(hdr);
|
|
freeable = refcount_is_zero(&hdr->b_l1hdr.b_refcnt);
|
|
}
|
|
|
|
/*
|
|
* Broadcast before we drop the hash_lock to avoid the possibility
|
|
* that the hdr (and hence the cv) might be freed before we get to
|
|
* the cv_broadcast().
|
|
*/
|
|
cv_broadcast(&hdr->b_l1hdr.b_cv);
|
|
|
|
if (hash_lock != NULL) {
|
|
mutex_exit(hash_lock);
|
|
} else {
|
|
/*
|
|
* This block was freed while we waited for the read to
|
|
* complete. It has been removed from the hash table and
|
|
* moved to the anonymous state (so that it won't show up
|
|
* in the cache).
|
|
*/
|
|
ASSERT3P(hdr->b_l1hdr.b_state, ==, arc_anon);
|
|
freeable = refcount_is_zero(&hdr->b_l1hdr.b_refcnt);
|
|
}
|
|
|
|
/* execute each callback and free its structure */
|
|
while ((acb = callback_list) != NULL) {
|
|
if (acb->acb_done) {
|
|
acb->acb_done(zio, &zio->io_bookmark, zio->io_bp,
|
|
acb->acb_buf, acb->acb_private);
|
|
}
|
|
|
|
if (acb->acb_zio_dummy != NULL) {
|
|
acb->acb_zio_dummy->io_error = zio->io_error;
|
|
zio_nowait(acb->acb_zio_dummy);
|
|
}
|
|
|
|
callback_list = acb->acb_next;
|
|
kmem_free(acb, sizeof (arc_callback_t));
|
|
}
|
|
|
|
if (freeable)
|
|
arc_hdr_destroy(hdr);
|
|
}
|
|
|
|
/*
|
|
* "Read" the block at the specified DVA (in bp) via the
|
|
* cache. If the block is found in the cache, invoke the provided
|
|
* callback immediately and return. Note that the `zio' parameter
|
|
* in the callback will be NULL in this case, since no IO was
|
|
* required. If the block is not in the cache pass the read request
|
|
* on to the spa with a substitute callback function, so that the
|
|
* requested block will be added to the cache.
|
|
*
|
|
* If a read request arrives for a block that has a read in-progress,
|
|
* either wait for the in-progress read to complete (and return the
|
|
* results); or, if this is a read with a "done" func, add a record
|
|
* to the read to invoke the "done" func when the read completes,
|
|
* and return; or just return.
|
|
*
|
|
* arc_read_done() will invoke all the requested "done" functions
|
|
* for readers of this block.
|
|
*/
|
|
int
|
|
arc_read(zio_t *pio, spa_t *spa, const blkptr_t *bp,
|
|
arc_read_done_func_t *done, void *private, zio_priority_t priority,
|
|
int zio_flags, arc_flags_t *arc_flags, const zbookmark_phys_t *zb)
|
|
{
|
|
arc_buf_hdr_t *hdr = NULL;
|
|
kmutex_t *hash_lock = NULL;
|
|
zio_t *rzio;
|
|
uint64_t guid = spa_load_guid(spa);
|
|
boolean_t compressed_read = (zio_flags & ZIO_FLAG_RAW_COMPRESS) != 0;
|
|
boolean_t encrypted_read = BP_IS_ENCRYPTED(bp) &&
|
|
(zio_flags & ZIO_FLAG_RAW_ENCRYPT) != 0;
|
|
boolean_t noauth_read = BP_IS_AUTHENTICATED(bp) &&
|
|
(zio_flags & ZIO_FLAG_RAW_ENCRYPT) != 0;
|
|
int rc = 0;
|
|
|
|
ASSERT(!BP_IS_EMBEDDED(bp) ||
|
|
BPE_GET_ETYPE(bp) == BP_EMBEDDED_TYPE_DATA);
|
|
|
|
top:
|
|
if (!BP_IS_EMBEDDED(bp)) {
|
|
/*
|
|
* Embedded BP's have no DVA and require no I/O to "read".
|
|
* Create an anonymous arc buf to back it.
|
|
*/
|
|
hdr = buf_hash_find(guid, bp, &hash_lock);
|
|
}
|
|
|
|
/*
|
|
* Determine if we have an L1 cache hit or a cache miss. For simplicity
|
|
* we maintain encrypted data seperately from compressed / uncompressed
|
|
* data. If the user is requesting raw encrypted data and we don't have
|
|
* that in the header we will read from disk to guarantee that we can
|
|
* get it even if the encryption keys aren't loaded.
|
|
*/
|
|
if (hdr != NULL && HDR_HAS_L1HDR(hdr) && (HDR_HAS_RABD(hdr) ||
|
|
(hdr->b_l1hdr.b_pabd != NULL && !encrypted_read))) {
|
|
arc_buf_t *buf = NULL;
|
|
*arc_flags |= ARC_FLAG_CACHED;
|
|
|
|
if (HDR_IO_IN_PROGRESS(hdr)) {
|
|
zio_t *head_zio = hdr->b_l1hdr.b_acb->acb_zio_head;
|
|
|
|
ASSERT3P(head_zio, !=, NULL);
|
|
if ((hdr->b_flags & ARC_FLAG_PRIO_ASYNC_READ) &&
|
|
priority == ZIO_PRIORITY_SYNC_READ) {
|
|
/*
|
|
* This is a sync read that needs to wait for
|
|
* an in-flight async read. Request that the
|
|
* zio have its priority upgraded.
|
|
*/
|
|
zio_change_priority(head_zio, priority);
|
|
DTRACE_PROBE1(arc__async__upgrade__sync,
|
|
arc_buf_hdr_t *, hdr);
|
|
ARCSTAT_BUMP(arcstat_async_upgrade_sync);
|
|
}
|
|
if (hdr->b_flags & ARC_FLAG_PREDICTIVE_PREFETCH) {
|
|
arc_hdr_clear_flags(hdr,
|
|
ARC_FLAG_PREDICTIVE_PREFETCH);
|
|
}
|
|
|
|
if (*arc_flags & ARC_FLAG_WAIT) {
|
|
cv_wait(&hdr->b_l1hdr.b_cv, hash_lock);
|
|
mutex_exit(hash_lock);
|
|
goto top;
|
|
}
|
|
ASSERT(*arc_flags & ARC_FLAG_NOWAIT);
|
|
|
|
if (done) {
|
|
arc_callback_t *acb = NULL;
|
|
|
|
acb = kmem_zalloc(sizeof (arc_callback_t),
|
|
KM_SLEEP);
|
|
acb->acb_done = done;
|
|
acb->acb_private = private;
|
|
acb->acb_compressed = compressed_read;
|
|
acb->acb_encrypted = encrypted_read;
|
|
acb->acb_noauth = noauth_read;
|
|
acb->acb_dsobj = zb->zb_objset;
|
|
if (pio != NULL)
|
|
acb->acb_zio_dummy = zio_null(pio,
|
|
spa, NULL, NULL, NULL, zio_flags);
|
|
|
|
ASSERT3P(acb->acb_done, !=, NULL);
|
|
acb->acb_zio_head = head_zio;
|
|
acb->acb_next = hdr->b_l1hdr.b_acb;
|
|
hdr->b_l1hdr.b_acb = acb;
|
|
mutex_exit(hash_lock);
|
|
goto out;
|
|
}
|
|
mutex_exit(hash_lock);
|
|
goto out;
|
|
}
|
|
|
|
ASSERT(hdr->b_l1hdr.b_state == arc_mru ||
|
|
hdr->b_l1hdr.b_state == arc_mfu);
|
|
|
|
if (done) {
|
|
if (hdr->b_flags & ARC_FLAG_PREDICTIVE_PREFETCH) {
|
|
/*
|
|
* This is a demand read which does not have to
|
|
* wait for i/o because we did a predictive
|
|
* prefetch i/o for it, which has completed.
|
|
*/
|
|
DTRACE_PROBE1(
|
|
arc__demand__hit__predictive__prefetch,
|
|
arc_buf_hdr_t *, hdr);
|
|
ARCSTAT_BUMP(
|
|
arcstat_demand_hit_predictive_prefetch);
|
|
arc_hdr_clear_flags(hdr,
|
|
ARC_FLAG_PREDICTIVE_PREFETCH);
|
|
}
|
|
|
|
if (hdr->b_flags & ARC_FLAG_PRESCIENT_PREFETCH) {
|
|
ARCSTAT_BUMP(
|
|
arcstat_demand_hit_prescient_prefetch);
|
|
arc_hdr_clear_flags(hdr,
|
|
ARC_FLAG_PRESCIENT_PREFETCH);
|
|
}
|
|
|
|
ASSERT(!BP_IS_EMBEDDED(bp) || !BP_IS_HOLE(bp));
|
|
|
|
/* Get a buf with the desired data in it. */
|
|
rc = arc_buf_alloc_impl(hdr, spa, zb->zb_objset,
|
|
private, encrypted_read, compressed_read,
|
|
noauth_read, B_TRUE, &buf);
|
|
if (rc != 0) {
|
|
arc_buf_destroy(buf, private);
|
|
buf = NULL;
|
|
}
|
|
|
|
ASSERT((zio_flags & ZIO_FLAG_SPECULATIVE) || rc == 0);
|
|
} else if (*arc_flags & ARC_FLAG_PREFETCH &&
|
|
refcount_count(&hdr->b_l1hdr.b_refcnt) == 0) {
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_PREFETCH);
|
|
}
|
|
DTRACE_PROBE1(arc__hit, arc_buf_hdr_t *, hdr);
|
|
arc_access(hdr, hash_lock);
|
|
if (*arc_flags & ARC_FLAG_PRESCIENT_PREFETCH)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_PRESCIENT_PREFETCH);
|
|
if (*arc_flags & ARC_FLAG_L2CACHE)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_L2CACHE);
|
|
mutex_exit(hash_lock);
|
|
ARCSTAT_BUMP(arcstat_hits);
|
|
ARCSTAT_CONDSTAT(!HDR_PREFETCH(hdr),
|
|
demand, prefetch, !HDR_ISTYPE_METADATA(hdr),
|
|
data, metadata, hits);
|
|
|
|
if (done)
|
|
done(NULL, zb, bp, buf, private);
|
|
} else {
|
|
uint64_t lsize = BP_GET_LSIZE(bp);
|
|
uint64_t psize = BP_GET_PSIZE(bp);
|
|
arc_callback_t *acb;
|
|
vdev_t *vd = NULL;
|
|
uint64_t addr = 0;
|
|
boolean_t devw = B_FALSE;
|
|
uint64_t size;
|
|
abd_t *hdr_abd;
|
|
|
|
/*
|
|
* Gracefully handle a damaged logical block size as a
|
|
* checksum error.
|
|
*/
|
|
if (lsize > spa_maxblocksize(spa)) {
|
|
rc = SET_ERROR(ECKSUM);
|
|
goto out;
|
|
}
|
|
|
|
if (hdr == NULL) {
|
|
/* this block is not in the cache */
|
|
arc_buf_hdr_t *exists = NULL;
|
|
arc_buf_contents_t type = BP_GET_BUFC_TYPE(bp);
|
|
hdr = arc_hdr_alloc(spa_load_guid(spa), psize, lsize,
|
|
BP_IS_PROTECTED(bp), BP_GET_COMPRESS(bp), type,
|
|
encrypted_read);
|
|
|
|
if (!BP_IS_EMBEDDED(bp)) {
|
|
hdr->b_dva = *BP_IDENTITY(bp);
|
|
hdr->b_birth = BP_PHYSICAL_BIRTH(bp);
|
|
exists = buf_hash_insert(hdr, &hash_lock);
|
|
}
|
|
if (exists != NULL) {
|
|
/* somebody beat us to the hash insert */
|
|
mutex_exit(hash_lock);
|
|
buf_discard_identity(hdr);
|
|
arc_hdr_destroy(hdr);
|
|
goto top; /* restart the IO request */
|
|
}
|
|
} else {
|
|
/*
|
|
* This block is in the ghost cache or encrypted data
|
|
* was requested and we didn't have it. If it was
|
|
* L2-only (and thus didn't have an L1 hdr),
|
|
* we realloc the header to add an L1 hdr.
|
|
*/
|
|
if (!HDR_HAS_L1HDR(hdr)) {
|
|
hdr = arc_hdr_realloc(hdr, hdr_l2only_cache,
|
|
hdr_full_cache);
|
|
}
|
|
|
|
if (GHOST_STATE(hdr->b_l1hdr.b_state)) {
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
ASSERT(!HDR_IO_IN_PROGRESS(hdr));
|
|
ASSERT0(refcount_count(&hdr->b_l1hdr.b_refcnt));
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, ==, NULL);
|
|
ASSERT3P(hdr->b_l1hdr.b_freeze_cksum, ==, NULL);
|
|
} else if (HDR_IO_IN_PROGRESS(hdr)) {
|
|
/*
|
|
* If this header already had an IO in progress
|
|
* and we are performing another IO to fetch
|
|
* encrypted data we must wait until the first
|
|
* IO completes so as not to confuse
|
|
* arc_read_done(). This should be very rare
|
|
* and so the performance impact shouldn't
|
|
* matter.
|
|
*/
|
|
cv_wait(&hdr->b_l1hdr.b_cv, hash_lock);
|
|
mutex_exit(hash_lock);
|
|
goto top;
|
|
}
|
|
|
|
/*
|
|
* This is a delicate dance that we play here.
|
|
* This hdr might be in the ghost list so we access
|
|
* it to move it out of the ghost list before we
|
|
* initiate the read. If it's a prefetch then
|
|
* it won't have a callback so we'll remove the
|
|
* reference that arc_buf_alloc_impl() created. We
|
|
* do this after we've called arc_access() to
|
|
* avoid hitting an assert in remove_reference().
|
|
*/
|
|
arc_access(hdr, hash_lock);
|
|
arc_hdr_alloc_abd(hdr, encrypted_read);
|
|
}
|
|
|
|
if (encrypted_read) {
|
|
ASSERT(HDR_HAS_RABD(hdr));
|
|
size = HDR_GET_PSIZE(hdr);
|
|
hdr_abd = hdr->b_crypt_hdr.b_rabd;
|
|
zio_flags |= ZIO_FLAG_RAW;
|
|
} else {
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
size = arc_hdr_size(hdr);
|
|
hdr_abd = hdr->b_l1hdr.b_pabd;
|
|
|
|
if (arc_hdr_get_compress(hdr) != ZIO_COMPRESS_OFF) {
|
|
zio_flags |= ZIO_FLAG_RAW_COMPRESS;
|
|
}
|
|
|
|
/*
|
|
* For authenticated bp's, we do not ask the ZIO layer
|
|
* to authenticate them since this will cause the entire
|
|
* IO to fail if the key isn't loaded. Instead, we
|
|
* defer authentication until arc_buf_fill(), which will
|
|
* verify the data when the key is available.
|
|
*/
|
|
if (BP_IS_AUTHENTICATED(bp))
|
|
zio_flags |= ZIO_FLAG_RAW_ENCRYPT;
|
|
}
|
|
|
|
if (*arc_flags & ARC_FLAG_PREFETCH &&
|
|
refcount_is_zero(&hdr->b_l1hdr.b_refcnt))
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_PREFETCH);
|
|
if (*arc_flags & ARC_FLAG_PRESCIENT_PREFETCH)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_PRESCIENT_PREFETCH);
|
|
if (*arc_flags & ARC_FLAG_L2CACHE)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_L2CACHE);
|
|
if (BP_IS_AUTHENTICATED(bp))
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_NOAUTH);
|
|
if (BP_GET_LEVEL(bp) > 0)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_INDIRECT);
|
|
if (*arc_flags & ARC_FLAG_PREDICTIVE_PREFETCH)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_PREDICTIVE_PREFETCH);
|
|
ASSERT(!GHOST_STATE(hdr->b_l1hdr.b_state));
|
|
|
|
acb = kmem_zalloc(sizeof (arc_callback_t), KM_SLEEP);
|
|
acb->acb_done = done;
|
|
acb->acb_private = private;
|
|
acb->acb_compressed = compressed_read;
|
|
acb->acb_encrypted = encrypted_read;
|
|
acb->acb_noauth = noauth_read;
|
|
acb->acb_dsobj = zb->zb_objset;
|
|
|
|
ASSERT3P(hdr->b_l1hdr.b_acb, ==, NULL);
|
|
hdr->b_l1hdr.b_acb = acb;
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_IO_IN_PROGRESS);
|
|
|
|
if (HDR_HAS_L2HDR(hdr) &&
|
|
(vd = hdr->b_l2hdr.b_dev->l2ad_vdev) != NULL) {
|
|
devw = hdr->b_l2hdr.b_dev->l2ad_writing;
|
|
addr = hdr->b_l2hdr.b_daddr;
|
|
/*
|
|
* Lock out device removal.
|
|
*/
|
|
if (vdev_is_dead(vd) ||
|
|
!spa_config_tryenter(spa, SCL_L2ARC, vd, RW_READER))
|
|
vd = NULL;
|
|
}
|
|
|
|
/*
|
|
* We count both async reads and scrub IOs as asynchronous so
|
|
* that both can be upgraded in the event of a cache hit while
|
|
* the read IO is still in-flight.
|
|
*/
|
|
if (priority == ZIO_PRIORITY_ASYNC_READ ||
|
|
priority == ZIO_PRIORITY_SCRUB)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_PRIO_ASYNC_READ);
|
|
else
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_PRIO_ASYNC_READ);
|
|
|
|
/*
|
|
* At this point, we have a level 1 cache miss. Try again in
|
|
* L2ARC if possible.
|
|
*/
|
|
ASSERT3U(HDR_GET_LSIZE(hdr), ==, lsize);
|
|
|
|
DTRACE_PROBE4(arc__miss, arc_buf_hdr_t *, hdr, blkptr_t *, bp,
|
|
uint64_t, lsize, zbookmark_phys_t *, zb);
|
|
ARCSTAT_BUMP(arcstat_misses);
|
|
ARCSTAT_CONDSTAT(!HDR_PREFETCH(hdr),
|
|
demand, prefetch, !HDR_ISTYPE_METADATA(hdr),
|
|
data, metadata, misses);
|
|
|
|
if (vd != NULL && l2arc_ndev != 0 && !(l2arc_norw && devw)) {
|
|
/*
|
|
* Read from the L2ARC if the following are true:
|
|
* 1. The L2ARC vdev was previously cached.
|
|
* 2. This buffer still has L2ARC metadata.
|
|
* 3. This buffer isn't currently writing to the L2ARC.
|
|
* 4. The L2ARC entry wasn't evicted, which may
|
|
* also have invalidated the vdev.
|
|
* 5. This isn't prefetch and l2arc_noprefetch is set.
|
|
*/
|
|
if (HDR_HAS_L2HDR(hdr) &&
|
|
!HDR_L2_WRITING(hdr) && !HDR_L2_EVICTED(hdr) &&
|
|
!(l2arc_noprefetch && HDR_PREFETCH(hdr))) {
|
|
l2arc_read_callback_t *cb;
|
|
abd_t *abd;
|
|
uint64_t asize;
|
|
|
|
DTRACE_PROBE1(l2arc__hit, arc_buf_hdr_t *, hdr);
|
|
ARCSTAT_BUMP(arcstat_l2_hits);
|
|
atomic_inc_32(&hdr->b_l2hdr.b_hits);
|
|
|
|
cb = kmem_zalloc(sizeof (l2arc_read_callback_t),
|
|
KM_SLEEP);
|
|
cb->l2rcb_hdr = hdr;
|
|
cb->l2rcb_bp = *bp;
|
|
cb->l2rcb_zb = *zb;
|
|
cb->l2rcb_flags = zio_flags;
|
|
|
|
asize = vdev_psize_to_asize(vd, size);
|
|
if (asize != size) {
|
|
abd = abd_alloc_for_io(asize,
|
|
HDR_ISTYPE_METADATA(hdr));
|
|
cb->l2rcb_abd = abd;
|
|
} else {
|
|
abd = hdr_abd;
|
|
}
|
|
|
|
ASSERT(addr >= VDEV_LABEL_START_SIZE &&
|
|
addr + asize <= vd->vdev_psize -
|
|
VDEV_LABEL_END_SIZE);
|
|
|
|
/*
|
|
* l2arc read. The SCL_L2ARC lock will be
|
|
* released by l2arc_read_done().
|
|
* Issue a null zio if the underlying buffer
|
|
* was squashed to zero size by compression.
|
|
*/
|
|
ASSERT3U(arc_hdr_get_compress(hdr), !=,
|
|
ZIO_COMPRESS_EMPTY);
|
|
rzio = zio_read_phys(pio, vd, addr,
|
|
asize, abd,
|
|
ZIO_CHECKSUM_OFF,
|
|
l2arc_read_done, cb, priority,
|
|
zio_flags | ZIO_FLAG_DONT_CACHE |
|
|
ZIO_FLAG_CANFAIL |
|
|
ZIO_FLAG_DONT_PROPAGATE |
|
|
ZIO_FLAG_DONT_RETRY, B_FALSE);
|
|
acb->acb_zio_head = rzio;
|
|
|
|
if (hash_lock != NULL)
|
|
mutex_exit(hash_lock);
|
|
|
|
DTRACE_PROBE2(l2arc__read, vdev_t *, vd,
|
|
zio_t *, rzio);
|
|
ARCSTAT_INCR(arcstat_l2_read_bytes,
|
|
HDR_GET_PSIZE(hdr));
|
|
|
|
if (*arc_flags & ARC_FLAG_NOWAIT) {
|
|
zio_nowait(rzio);
|
|
goto out;
|
|
}
|
|
|
|
ASSERT(*arc_flags & ARC_FLAG_WAIT);
|
|
if (zio_wait(rzio) == 0)
|
|
goto out;
|
|
|
|
/* l2arc read error; goto zio_read() */
|
|
if (hash_lock != NULL)
|
|
mutex_enter(hash_lock);
|
|
} else {
|
|
DTRACE_PROBE1(l2arc__miss,
|
|
arc_buf_hdr_t *, hdr);
|
|
ARCSTAT_BUMP(arcstat_l2_misses);
|
|
if (HDR_L2_WRITING(hdr))
|
|
ARCSTAT_BUMP(arcstat_l2_rw_clash);
|
|
spa_config_exit(spa, SCL_L2ARC, vd);
|
|
}
|
|
} else {
|
|
if (vd != NULL)
|
|
spa_config_exit(spa, SCL_L2ARC, vd);
|
|
if (l2arc_ndev != 0) {
|
|
DTRACE_PROBE1(l2arc__miss,
|
|
arc_buf_hdr_t *, hdr);
|
|
ARCSTAT_BUMP(arcstat_l2_misses);
|
|
}
|
|
}
|
|
|
|
rzio = zio_read(pio, spa, bp, hdr_abd, size,
|
|
arc_read_done, hdr, priority, zio_flags, zb);
|
|
acb->acb_zio_head = rzio;
|
|
|
|
if (hash_lock != NULL)
|
|
mutex_exit(hash_lock);
|
|
|
|
if (*arc_flags & ARC_FLAG_WAIT) {
|
|
rc = zio_wait(rzio);
|
|
goto out;
|
|
}
|
|
|
|
ASSERT(*arc_flags & ARC_FLAG_NOWAIT);
|
|
zio_nowait(rzio);
|
|
}
|
|
|
|
out:
|
|
spa_read_history_add(spa, zb, *arc_flags);
|
|
return (rc);
|
|
}
|
|
|
|
arc_prune_t *
|
|
arc_add_prune_callback(arc_prune_func_t *func, void *private)
|
|
{
|
|
arc_prune_t *p;
|
|
|
|
p = kmem_alloc(sizeof (*p), KM_SLEEP);
|
|
p->p_pfunc = func;
|
|
p->p_private = private;
|
|
list_link_init(&p->p_node);
|
|
refcount_create(&p->p_refcnt);
|
|
|
|
mutex_enter(&arc_prune_mtx);
|
|
refcount_add(&p->p_refcnt, &arc_prune_list);
|
|
list_insert_head(&arc_prune_list, p);
|
|
mutex_exit(&arc_prune_mtx);
|
|
|
|
return (p);
|
|
}
|
|
|
|
void
|
|
arc_remove_prune_callback(arc_prune_t *p)
|
|
{
|
|
boolean_t wait = B_FALSE;
|
|
mutex_enter(&arc_prune_mtx);
|
|
list_remove(&arc_prune_list, p);
|
|
if (refcount_remove(&p->p_refcnt, &arc_prune_list) > 0)
|
|
wait = B_TRUE;
|
|
mutex_exit(&arc_prune_mtx);
|
|
|
|
/* wait for arc_prune_task to finish */
|
|
if (wait)
|
|
taskq_wait_outstanding(arc_prune_taskq, 0);
|
|
ASSERT0(refcount_count(&p->p_refcnt));
|
|
refcount_destroy(&p->p_refcnt);
|
|
kmem_free(p, sizeof (*p));
|
|
}
|
|
|
|
/*
|
|
* Notify the arc that a block was freed, and thus will never be used again.
|
|
*/
|
|
void
|
|
arc_freed(spa_t *spa, const blkptr_t *bp)
|
|
{
|
|
arc_buf_hdr_t *hdr;
|
|
kmutex_t *hash_lock;
|
|
uint64_t guid = spa_load_guid(spa);
|
|
|
|
ASSERT(!BP_IS_EMBEDDED(bp));
|
|
|
|
hdr = buf_hash_find(guid, bp, &hash_lock);
|
|
if (hdr == NULL)
|
|
return;
|
|
|
|
/*
|
|
* We might be trying to free a block that is still doing I/O
|
|
* (i.e. prefetch) or has a reference (i.e. a dedup-ed,
|
|
* dmu_sync-ed block). If this block is being prefetched, then it
|
|
* would still have the ARC_FLAG_IO_IN_PROGRESS flag set on the hdr
|
|
* until the I/O completes. A block may also have a reference if it is
|
|
* part of a dedup-ed, dmu_synced write. The dmu_sync() function would
|
|
* have written the new block to its final resting place on disk but
|
|
* without the dedup flag set. This would have left the hdr in the MRU
|
|
* state and discoverable. When the txg finally syncs it detects that
|
|
* the block was overridden in open context and issues an override I/O.
|
|
* Since this is a dedup block, the override I/O will determine if the
|
|
* block is already in the DDT. If so, then it will replace the io_bp
|
|
* with the bp from the DDT and allow the I/O to finish. When the I/O
|
|
* reaches the done callback, dbuf_write_override_done, it will
|
|
* check to see if the io_bp and io_bp_override are identical.
|
|
* If they are not, then it indicates that the bp was replaced with
|
|
* the bp in the DDT and the override bp is freed. This allows
|
|
* us to arrive here with a reference on a block that is being
|
|
* freed. So if we have an I/O in progress, or a reference to
|
|
* this hdr, then we don't destroy the hdr.
|
|
*/
|
|
if (!HDR_HAS_L1HDR(hdr) || (!HDR_IO_IN_PROGRESS(hdr) &&
|
|
refcount_is_zero(&hdr->b_l1hdr.b_refcnt))) {
|
|
arc_change_state(arc_anon, hdr, hash_lock);
|
|
arc_hdr_destroy(hdr);
|
|
mutex_exit(hash_lock);
|
|
} else {
|
|
mutex_exit(hash_lock);
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
* Release this buffer from the cache, making it an anonymous buffer. This
|
|
* must be done after a read and prior to modifying the buffer contents.
|
|
* If the buffer has more than one reference, we must make
|
|
* a new hdr for the buffer.
|
|
*/
|
|
void
|
|
arc_release(arc_buf_t *buf, void *tag)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
/*
|
|
* It would be nice to assert that if its DMU metadata (level >
|
|
* 0 || it's the dnode file), then it must be syncing context.
|
|
* But we don't know that information at this level.
|
|
*/
|
|
|
|
mutex_enter(&buf->b_evict_lock);
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
/*
|
|
* We don't grab the hash lock prior to this check, because if
|
|
* the buffer's header is in the arc_anon state, it won't be
|
|
* linked into the hash table.
|
|
*/
|
|
if (hdr->b_l1hdr.b_state == arc_anon) {
|
|
mutex_exit(&buf->b_evict_lock);
|
|
ASSERT(!HDR_IO_IN_PROGRESS(hdr));
|
|
ASSERT(!HDR_IN_HASH_TABLE(hdr));
|
|
ASSERT(!HDR_HAS_L2HDR(hdr));
|
|
ASSERT(HDR_EMPTY(hdr));
|
|
|
|
ASSERT3U(hdr->b_l1hdr.b_bufcnt, ==, 1);
|
|
ASSERT3S(refcount_count(&hdr->b_l1hdr.b_refcnt), ==, 1);
|
|
ASSERT(!list_link_active(&hdr->b_l1hdr.b_arc_node));
|
|
|
|
hdr->b_l1hdr.b_arc_access = 0;
|
|
|
|
/*
|
|
* If the buf is being overridden then it may already
|
|
* have a hdr that is not empty.
|
|
*/
|
|
buf_discard_identity(hdr);
|
|
arc_buf_thaw(buf);
|
|
|
|
return;
|
|
}
|
|
|
|
kmutex_t *hash_lock = HDR_LOCK(hdr);
|
|
mutex_enter(hash_lock);
|
|
|
|
/*
|
|
* This assignment is only valid as long as the hash_lock is
|
|
* held, we must be careful not to reference state or the
|
|
* b_state field after dropping the lock.
|
|
*/
|
|
arc_state_t *state = hdr->b_l1hdr.b_state;
|
|
ASSERT3P(hash_lock, ==, HDR_LOCK(hdr));
|
|
ASSERT3P(state, !=, arc_anon);
|
|
|
|
/* this buffer is not on any list */
|
|
ASSERT3S(refcount_count(&hdr->b_l1hdr.b_refcnt), >, 0);
|
|
|
|
if (HDR_HAS_L2HDR(hdr)) {
|
|
mutex_enter(&hdr->b_l2hdr.b_dev->l2ad_mtx);
|
|
|
|
/*
|
|
* We have to recheck this conditional again now that
|
|
* we're holding the l2ad_mtx to prevent a race with
|
|
* another thread which might be concurrently calling
|
|
* l2arc_evict(). In that case, l2arc_evict() might have
|
|
* destroyed the header's L2 portion as we were waiting
|
|
* to acquire the l2ad_mtx.
|
|
*/
|
|
if (HDR_HAS_L2HDR(hdr))
|
|
arc_hdr_l2hdr_destroy(hdr);
|
|
|
|
mutex_exit(&hdr->b_l2hdr.b_dev->l2ad_mtx);
|
|
}
|
|
|
|
/*
|
|
* Do we have more than one buf?
|
|
*/
|
|
if (hdr->b_l1hdr.b_bufcnt > 1) {
|
|
arc_buf_hdr_t *nhdr;
|
|
uint64_t spa = hdr->b_spa;
|
|
uint64_t psize = HDR_GET_PSIZE(hdr);
|
|
uint64_t lsize = HDR_GET_LSIZE(hdr);
|
|
boolean_t protected = HDR_PROTECTED(hdr);
|
|
enum zio_compress compress = arc_hdr_get_compress(hdr);
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
VERIFY3U(hdr->b_type, ==, type);
|
|
|
|
ASSERT(hdr->b_l1hdr.b_buf != buf || buf->b_next != NULL);
|
|
(void) remove_reference(hdr, hash_lock, tag);
|
|
|
|
if (arc_buf_is_shared(buf) && !ARC_BUF_COMPRESSED(buf)) {
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, !=, buf);
|
|
ASSERT(ARC_BUF_LAST(buf));
|
|
}
|
|
|
|
/*
|
|
* Pull the data off of this hdr and attach it to
|
|
* a new anonymous hdr. Also find the last buffer
|
|
* in the hdr's buffer list.
|
|
*/
|
|
arc_buf_t *lastbuf = arc_buf_remove(hdr, buf);
|
|
ASSERT3P(lastbuf, !=, NULL);
|
|
|
|
/*
|
|
* If the current arc_buf_t and the hdr are sharing their data
|
|
* buffer, then we must stop sharing that block.
|
|
*/
|
|
if (arc_buf_is_shared(buf)) {
|
|
ASSERT3P(hdr->b_l1hdr.b_buf, !=, buf);
|
|
VERIFY(!arc_buf_is_shared(lastbuf));
|
|
|
|
/*
|
|
* First, sever the block sharing relationship between
|
|
* buf and the arc_buf_hdr_t.
|
|
*/
|
|
arc_unshare_buf(hdr, buf);
|
|
|
|
/*
|
|
* Now we need to recreate the hdr's b_pabd. Since we
|
|
* have lastbuf handy, we try to share with it, but if
|
|
* we can't then we allocate a new b_pabd and copy the
|
|
* data from buf into it.
|
|
*/
|
|
if (arc_can_share(hdr, lastbuf)) {
|
|
arc_share_buf(hdr, lastbuf);
|
|
} else {
|
|
arc_hdr_alloc_abd(hdr, B_FALSE);
|
|
abd_copy_from_buf(hdr->b_l1hdr.b_pabd,
|
|
buf->b_data, psize);
|
|
}
|
|
VERIFY3P(lastbuf->b_data, !=, NULL);
|
|
} else if (HDR_SHARED_DATA(hdr)) {
|
|
/*
|
|
* Uncompressed shared buffers are always at the end
|
|
* of the list. Compressed buffers don't have the
|
|
* same requirements. This makes it hard to
|
|
* simply assert that the lastbuf is shared so
|
|
* we rely on the hdr's compression flags to determine
|
|
* if we have a compressed, shared buffer.
|
|
*/
|
|
ASSERT(arc_buf_is_shared(lastbuf) ||
|
|
arc_hdr_get_compress(hdr) != ZIO_COMPRESS_OFF);
|
|
ASSERT(!ARC_BUF_SHARED(buf));
|
|
}
|
|
|
|
ASSERT(hdr->b_l1hdr.b_pabd != NULL || HDR_HAS_RABD(hdr));
|
|
ASSERT3P(state, !=, arc_l2c_only);
|
|
|
|
(void) refcount_remove_many(&state->arcs_size,
|
|
arc_buf_size(buf), buf);
|
|
|
|
if (refcount_is_zero(&hdr->b_l1hdr.b_refcnt)) {
|
|
ASSERT3P(state, !=, arc_l2c_only);
|
|
(void) refcount_remove_many(&state->arcs_esize[type],
|
|
arc_buf_size(buf), buf);
|
|
}
|
|
|
|
hdr->b_l1hdr.b_bufcnt -= 1;
|
|
if (ARC_BUF_ENCRYPTED(buf))
|
|
hdr->b_crypt_hdr.b_ebufcnt -= 1;
|
|
|
|
arc_cksum_verify(buf);
|
|
arc_buf_unwatch(buf);
|
|
|
|
/* if this is the last uncompressed buf free the checksum */
|
|
if (!arc_hdr_has_uncompressed_buf(hdr))
|
|
arc_cksum_free(hdr);
|
|
|
|
mutex_exit(hash_lock);
|
|
|
|
/*
|
|
* Allocate a new hdr. The new hdr will contain a b_pabd
|
|
* buffer which will be freed in arc_write().
|
|
*/
|
|
nhdr = arc_hdr_alloc(spa, psize, lsize, protected,
|
|
compress, type, HDR_HAS_RABD(hdr));
|
|
ASSERT3P(nhdr->b_l1hdr.b_buf, ==, NULL);
|
|
ASSERT0(nhdr->b_l1hdr.b_bufcnt);
|
|
ASSERT0(refcount_count(&nhdr->b_l1hdr.b_refcnt));
|
|
VERIFY3U(nhdr->b_type, ==, type);
|
|
ASSERT(!HDR_SHARED_DATA(nhdr));
|
|
|
|
nhdr->b_l1hdr.b_buf = buf;
|
|
nhdr->b_l1hdr.b_bufcnt = 1;
|
|
if (ARC_BUF_ENCRYPTED(buf))
|
|
nhdr->b_crypt_hdr.b_ebufcnt = 1;
|
|
nhdr->b_l1hdr.b_mru_hits = 0;
|
|
nhdr->b_l1hdr.b_mru_ghost_hits = 0;
|
|
nhdr->b_l1hdr.b_mfu_hits = 0;
|
|
nhdr->b_l1hdr.b_mfu_ghost_hits = 0;
|
|
nhdr->b_l1hdr.b_l2_hits = 0;
|
|
(void) refcount_add(&nhdr->b_l1hdr.b_refcnt, tag);
|
|
buf->b_hdr = nhdr;
|
|
|
|
mutex_exit(&buf->b_evict_lock);
|
|
(void) refcount_add_many(&arc_anon->arcs_size,
|
|
HDR_GET_LSIZE(nhdr), buf);
|
|
} else {
|
|
mutex_exit(&buf->b_evict_lock);
|
|
ASSERT(refcount_count(&hdr->b_l1hdr.b_refcnt) == 1);
|
|
/* protected by hash lock, or hdr is on arc_anon */
|
|
ASSERT(!multilist_link_active(&hdr->b_l1hdr.b_arc_node));
|
|
ASSERT(!HDR_IO_IN_PROGRESS(hdr));
|
|
hdr->b_l1hdr.b_mru_hits = 0;
|
|
hdr->b_l1hdr.b_mru_ghost_hits = 0;
|
|
hdr->b_l1hdr.b_mfu_hits = 0;
|
|
hdr->b_l1hdr.b_mfu_ghost_hits = 0;
|
|
hdr->b_l1hdr.b_l2_hits = 0;
|
|
arc_change_state(arc_anon, hdr, hash_lock);
|
|
hdr->b_l1hdr.b_arc_access = 0;
|
|
|
|
mutex_exit(hash_lock);
|
|
buf_discard_identity(hdr);
|
|
arc_buf_thaw(buf);
|
|
}
|
|
}
|
|
|
|
int
|
|
arc_released(arc_buf_t *buf)
|
|
{
|
|
int released;
|
|
|
|
mutex_enter(&buf->b_evict_lock);
|
|
released = (buf->b_data != NULL &&
|
|
buf->b_hdr->b_l1hdr.b_state == arc_anon);
|
|
mutex_exit(&buf->b_evict_lock);
|
|
return (released);
|
|
}
|
|
|
|
#ifdef ZFS_DEBUG
|
|
int
|
|
arc_referenced(arc_buf_t *buf)
|
|
{
|
|
int referenced;
|
|
|
|
mutex_enter(&buf->b_evict_lock);
|
|
referenced = (refcount_count(&buf->b_hdr->b_l1hdr.b_refcnt));
|
|
mutex_exit(&buf->b_evict_lock);
|
|
return (referenced);
|
|
}
|
|
#endif
|
|
|
|
static void
|
|
arc_write_ready(zio_t *zio)
|
|
{
|
|
arc_write_callback_t *callback = zio->io_private;
|
|
arc_buf_t *buf = callback->awcb_buf;
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
blkptr_t *bp = zio->io_bp;
|
|
uint64_t psize = BP_IS_HOLE(bp) ? 0 : BP_GET_PSIZE(bp);
|
|
fstrans_cookie_t cookie = spl_fstrans_mark();
|
|
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
ASSERT(!refcount_is_zero(&buf->b_hdr->b_l1hdr.b_refcnt));
|
|
ASSERT(hdr->b_l1hdr.b_bufcnt > 0);
|
|
|
|
/*
|
|
* If we're reexecuting this zio because the pool suspended, then
|
|
* cleanup any state that was previously set the first time the
|
|
* callback was invoked.
|
|
*/
|
|
if (zio->io_flags & ZIO_FLAG_REEXECUTED) {
|
|
arc_cksum_free(hdr);
|
|
arc_buf_unwatch(buf);
|
|
if (hdr->b_l1hdr.b_pabd != NULL) {
|
|
if (arc_buf_is_shared(buf)) {
|
|
arc_unshare_buf(hdr, buf);
|
|
} else {
|
|
arc_hdr_free_abd(hdr, B_FALSE);
|
|
}
|
|
}
|
|
|
|
if (HDR_HAS_RABD(hdr))
|
|
arc_hdr_free_abd(hdr, B_TRUE);
|
|
}
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
ASSERT(!HDR_HAS_RABD(hdr));
|
|
ASSERT(!HDR_SHARED_DATA(hdr));
|
|
ASSERT(!arc_buf_is_shared(buf));
|
|
|
|
callback->awcb_ready(zio, buf, callback->awcb_private);
|
|
|
|
if (HDR_IO_IN_PROGRESS(hdr))
|
|
ASSERT(zio->io_flags & ZIO_FLAG_REEXECUTED);
|
|
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_IO_IN_PROGRESS);
|
|
|
|
if (BP_IS_PROTECTED(bp) != !!HDR_PROTECTED(hdr))
|
|
hdr = arc_hdr_realloc_crypt(hdr, BP_IS_PROTECTED(bp));
|
|
|
|
if (BP_IS_PROTECTED(bp)) {
|
|
/* ZIL blocks are written through zio_rewrite */
|
|
ASSERT3U(BP_GET_TYPE(bp), !=, DMU_OT_INTENT_LOG);
|
|
ASSERT(HDR_PROTECTED(hdr));
|
|
|
|
if (BP_SHOULD_BYTESWAP(bp)) {
|
|
if (BP_GET_LEVEL(bp) > 0) {
|
|
hdr->b_l1hdr.b_byteswap = DMU_BSWAP_UINT64;
|
|
} else {
|
|
hdr->b_l1hdr.b_byteswap =
|
|
DMU_OT_BYTESWAP(BP_GET_TYPE(bp));
|
|
}
|
|
} else {
|
|
hdr->b_l1hdr.b_byteswap = DMU_BSWAP_NUMFUNCS;
|
|
}
|
|
|
|
hdr->b_crypt_hdr.b_ot = BP_GET_TYPE(bp);
|
|
hdr->b_crypt_hdr.b_dsobj = zio->io_bookmark.zb_objset;
|
|
zio_crypt_decode_params_bp(bp, hdr->b_crypt_hdr.b_salt,
|
|
hdr->b_crypt_hdr.b_iv);
|
|
zio_crypt_decode_mac_bp(bp, hdr->b_crypt_hdr.b_mac);
|
|
}
|
|
|
|
/*
|
|
* If this block was written for raw encryption but the zio layer
|
|
* ended up only authenticating it, adjust the buffer flags now.
|
|
*/
|
|
if (BP_IS_AUTHENTICATED(bp) && ARC_BUF_ENCRYPTED(buf)) {
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_NOAUTH);
|
|
buf->b_flags &= ~ARC_BUF_FLAG_ENCRYPTED;
|
|
if (BP_GET_COMPRESS(bp) == ZIO_COMPRESS_OFF)
|
|
buf->b_flags &= ~ARC_BUF_FLAG_COMPRESSED;
|
|
} else if (BP_IS_HOLE(bp) && ARC_BUF_ENCRYPTED(buf)) {
|
|
buf->b_flags &= ~ARC_BUF_FLAG_ENCRYPTED;
|
|
buf->b_flags &= ~ARC_BUF_FLAG_COMPRESSED;
|
|
}
|
|
|
|
/* this must be done after the buffer flags are adjusted */
|
|
arc_cksum_compute(buf);
|
|
|
|
enum zio_compress compress;
|
|
if (BP_IS_HOLE(bp) || BP_IS_EMBEDDED(bp)) {
|
|
compress = ZIO_COMPRESS_OFF;
|
|
} else {
|
|
ASSERT3U(HDR_GET_LSIZE(hdr), ==, BP_GET_LSIZE(bp));
|
|
compress = BP_GET_COMPRESS(bp);
|
|
}
|
|
HDR_SET_PSIZE(hdr, psize);
|
|
arc_hdr_set_compress(hdr, compress);
|
|
|
|
if (zio->io_error != 0 || psize == 0)
|
|
goto out;
|
|
|
|
/*
|
|
* Fill the hdr with data. If the buffer is encrypted we have no choice
|
|
* but to copy the data into b_radb. If the hdr is compressed, the data
|
|
* we want is available from the zio, otherwise we can take it from
|
|
* the buf.
|
|
*
|
|
* We might be able to share the buf's data with the hdr here. However,
|
|
* doing so would cause the ARC to be full of linear ABDs if we write a
|
|
* lot of shareable data. As a compromise, we check whether scattered
|
|
* ABDs are allowed, and assume that if they are then the user wants
|
|
* the ARC to be primarily filled with them regardless of the data being
|
|
* written. Therefore, if they're allowed then we allocate one and copy
|
|
* the data into it; otherwise, we share the data directly if we can.
|
|
*/
|
|
if (ARC_BUF_ENCRYPTED(buf)) {
|
|
ASSERT3U(psize, >, 0);
|
|
ASSERT(ARC_BUF_COMPRESSED(buf));
|
|
arc_hdr_alloc_abd(hdr, B_TRUE);
|
|
abd_copy(hdr->b_crypt_hdr.b_rabd, zio->io_abd, psize);
|
|
} else if (zfs_abd_scatter_enabled || !arc_can_share(hdr, buf)) {
|
|
/*
|
|
* Ideally, we would always copy the io_abd into b_pabd, but the
|
|
* user may have disabled compressed ARC, thus we must check the
|
|
* hdr's compression setting rather than the io_bp's.
|
|
*/
|
|
if (BP_IS_ENCRYPTED(bp)) {
|
|
ASSERT3U(psize, >, 0);
|
|
arc_hdr_alloc_abd(hdr, B_TRUE);
|
|
abd_copy(hdr->b_crypt_hdr.b_rabd, zio->io_abd, psize);
|
|
} else if (arc_hdr_get_compress(hdr) != ZIO_COMPRESS_OFF &&
|
|
!ARC_BUF_COMPRESSED(buf)) {
|
|
ASSERT3U(psize, >, 0);
|
|
arc_hdr_alloc_abd(hdr, B_FALSE);
|
|
abd_copy(hdr->b_l1hdr.b_pabd, zio->io_abd, psize);
|
|
} else {
|
|
ASSERT3U(zio->io_orig_size, ==, arc_hdr_size(hdr));
|
|
arc_hdr_alloc_abd(hdr, B_FALSE);
|
|
abd_copy_from_buf(hdr->b_l1hdr.b_pabd, buf->b_data,
|
|
arc_buf_size(buf));
|
|
}
|
|
} else {
|
|
ASSERT3P(buf->b_data, ==, abd_to_buf(zio->io_orig_abd));
|
|
ASSERT3U(zio->io_orig_size, ==, arc_buf_size(buf));
|
|
ASSERT3U(hdr->b_l1hdr.b_bufcnt, ==, 1);
|
|
|
|
arc_share_buf(hdr, buf);
|
|
}
|
|
|
|
out:
|
|
arc_hdr_verify(hdr, bp);
|
|
spl_fstrans_unmark(cookie);
|
|
}
|
|
|
|
static void
|
|
arc_write_children_ready(zio_t *zio)
|
|
{
|
|
arc_write_callback_t *callback = zio->io_private;
|
|
arc_buf_t *buf = callback->awcb_buf;
|
|
|
|
callback->awcb_children_ready(zio, buf, callback->awcb_private);
|
|
}
|
|
|
|
/*
|
|
* The SPA calls this callback for each physical write that happens on behalf
|
|
* of a logical write. See the comment in dbuf_write_physdone() for details.
|
|
*/
|
|
static void
|
|
arc_write_physdone(zio_t *zio)
|
|
{
|
|
arc_write_callback_t *cb = zio->io_private;
|
|
if (cb->awcb_physdone != NULL)
|
|
cb->awcb_physdone(zio, cb->awcb_buf, cb->awcb_private);
|
|
}
|
|
|
|
static void
|
|
arc_write_done(zio_t *zio)
|
|
{
|
|
arc_write_callback_t *callback = zio->io_private;
|
|
arc_buf_t *buf = callback->awcb_buf;
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
|
|
ASSERT3P(hdr->b_l1hdr.b_acb, ==, NULL);
|
|
|
|
if (zio->io_error == 0) {
|
|
arc_hdr_verify(hdr, zio->io_bp);
|
|
|
|
if (BP_IS_HOLE(zio->io_bp) || BP_IS_EMBEDDED(zio->io_bp)) {
|
|
buf_discard_identity(hdr);
|
|
} else {
|
|
hdr->b_dva = *BP_IDENTITY(zio->io_bp);
|
|
hdr->b_birth = BP_PHYSICAL_BIRTH(zio->io_bp);
|
|
}
|
|
} else {
|
|
ASSERT(HDR_EMPTY(hdr));
|
|
}
|
|
|
|
/*
|
|
* If the block to be written was all-zero or compressed enough to be
|
|
* embedded in the BP, no write was performed so there will be no
|
|
* dva/birth/checksum. The buffer must therefore remain anonymous
|
|
* (and uncached).
|
|
*/
|
|
if (!HDR_EMPTY(hdr)) {
|
|
arc_buf_hdr_t *exists;
|
|
kmutex_t *hash_lock;
|
|
|
|
ASSERT3U(zio->io_error, ==, 0);
|
|
|
|
arc_cksum_verify(buf);
|
|
|
|
exists = buf_hash_insert(hdr, &hash_lock);
|
|
if (exists != NULL) {
|
|
/*
|
|
* This can only happen if we overwrite for
|
|
* sync-to-convergence, because we remove
|
|
* buffers from the hash table when we arc_free().
|
|
*/
|
|
if (zio->io_flags & ZIO_FLAG_IO_REWRITE) {
|
|
if (!BP_EQUAL(&zio->io_bp_orig, zio->io_bp))
|
|
panic("bad overwrite, hdr=%p exists=%p",
|
|
(void *)hdr, (void *)exists);
|
|
ASSERT(refcount_is_zero(
|
|
&exists->b_l1hdr.b_refcnt));
|
|
arc_change_state(arc_anon, exists, hash_lock);
|
|
mutex_exit(hash_lock);
|
|
arc_hdr_destroy(exists);
|
|
exists = buf_hash_insert(hdr, &hash_lock);
|
|
ASSERT3P(exists, ==, NULL);
|
|
} else if (zio->io_flags & ZIO_FLAG_NOPWRITE) {
|
|
/* nopwrite */
|
|
ASSERT(zio->io_prop.zp_nopwrite);
|
|
if (!BP_EQUAL(&zio->io_bp_orig, zio->io_bp))
|
|
panic("bad nopwrite, hdr=%p exists=%p",
|
|
(void *)hdr, (void *)exists);
|
|
} else {
|
|
/* Dedup */
|
|
ASSERT(hdr->b_l1hdr.b_bufcnt == 1);
|
|
ASSERT(hdr->b_l1hdr.b_state == arc_anon);
|
|
ASSERT(BP_GET_DEDUP(zio->io_bp));
|
|
ASSERT(BP_GET_LEVEL(zio->io_bp) == 0);
|
|
}
|
|
}
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_IO_IN_PROGRESS);
|
|
/* if it's not anon, we are doing a scrub */
|
|
if (exists == NULL && hdr->b_l1hdr.b_state == arc_anon)
|
|
arc_access(hdr, hash_lock);
|
|
mutex_exit(hash_lock);
|
|
} else {
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_IO_IN_PROGRESS);
|
|
}
|
|
|
|
ASSERT(!refcount_is_zero(&hdr->b_l1hdr.b_refcnt));
|
|
callback->awcb_done(zio, buf, callback->awcb_private);
|
|
|
|
abd_put(zio->io_abd);
|
|
kmem_free(callback, sizeof (arc_write_callback_t));
|
|
}
|
|
|
|
zio_t *
|
|
arc_write(zio_t *pio, spa_t *spa, uint64_t txg,
|
|
blkptr_t *bp, arc_buf_t *buf, boolean_t l2arc,
|
|
const zio_prop_t *zp, arc_write_done_func_t *ready,
|
|
arc_write_done_func_t *children_ready, arc_write_done_func_t *physdone,
|
|
arc_write_done_func_t *done, void *private, zio_priority_t priority,
|
|
int zio_flags, const zbookmark_phys_t *zb)
|
|
{
|
|
arc_buf_hdr_t *hdr = buf->b_hdr;
|
|
arc_write_callback_t *callback;
|
|
zio_t *zio;
|
|
zio_prop_t localprop = *zp;
|
|
|
|
ASSERT3P(ready, !=, NULL);
|
|
ASSERT3P(done, !=, NULL);
|
|
ASSERT(!HDR_IO_ERROR(hdr));
|
|
ASSERT(!HDR_IO_IN_PROGRESS(hdr));
|
|
ASSERT3P(hdr->b_l1hdr.b_acb, ==, NULL);
|
|
ASSERT3U(hdr->b_l1hdr.b_bufcnt, >, 0);
|
|
if (l2arc)
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_L2CACHE);
|
|
|
|
if (ARC_BUF_ENCRYPTED(buf)) {
|
|
ASSERT(ARC_BUF_COMPRESSED(buf));
|
|
localprop.zp_encrypt = B_TRUE;
|
|
localprop.zp_compress = HDR_GET_COMPRESS(hdr);
|
|
localprop.zp_byteorder =
|
|
(hdr->b_l1hdr.b_byteswap == DMU_BSWAP_NUMFUNCS) ?
|
|
ZFS_HOST_BYTEORDER : !ZFS_HOST_BYTEORDER;
|
|
bcopy(hdr->b_crypt_hdr.b_salt, localprop.zp_salt,
|
|
ZIO_DATA_SALT_LEN);
|
|
bcopy(hdr->b_crypt_hdr.b_iv, localprop.zp_iv,
|
|
ZIO_DATA_IV_LEN);
|
|
bcopy(hdr->b_crypt_hdr.b_mac, localprop.zp_mac,
|
|
ZIO_DATA_MAC_LEN);
|
|
if (DMU_OT_IS_ENCRYPTED(localprop.zp_type)) {
|
|
localprop.zp_nopwrite = B_FALSE;
|
|
localprop.zp_copies =
|
|
MIN(localprop.zp_copies, SPA_DVAS_PER_BP - 1);
|
|
}
|
|
zio_flags |= ZIO_FLAG_RAW;
|
|
} else if (ARC_BUF_COMPRESSED(buf)) {
|
|
ASSERT3U(HDR_GET_LSIZE(hdr), !=, arc_buf_size(buf));
|
|
localprop.zp_compress = HDR_GET_COMPRESS(hdr);
|
|
zio_flags |= ZIO_FLAG_RAW_COMPRESS;
|
|
}
|
|
callback = kmem_zalloc(sizeof (arc_write_callback_t), KM_SLEEP);
|
|
callback->awcb_ready = ready;
|
|
callback->awcb_children_ready = children_ready;
|
|
callback->awcb_physdone = physdone;
|
|
callback->awcb_done = done;
|
|
callback->awcb_private = private;
|
|
callback->awcb_buf = buf;
|
|
|
|
/*
|
|
* The hdr's b_pabd is now stale, free it now. A new data block
|
|
* will be allocated when the zio pipeline calls arc_write_ready().
|
|
*/
|
|
if (hdr->b_l1hdr.b_pabd != NULL) {
|
|
/*
|
|
* If the buf is currently sharing the data block with
|
|
* the hdr then we need to break that relationship here.
|
|
* The hdr will remain with a NULL data pointer and the
|
|
* buf will take sole ownership of the block.
|
|
*/
|
|
if (arc_buf_is_shared(buf)) {
|
|
arc_unshare_buf(hdr, buf);
|
|
} else {
|
|
arc_hdr_free_abd(hdr, B_FALSE);
|
|
}
|
|
VERIFY3P(buf->b_data, !=, NULL);
|
|
}
|
|
|
|
if (HDR_HAS_RABD(hdr))
|
|
arc_hdr_free_abd(hdr, B_TRUE);
|
|
|
|
if (!(zio_flags & ZIO_FLAG_RAW))
|
|
arc_hdr_set_compress(hdr, ZIO_COMPRESS_OFF);
|
|
|
|
ASSERT(!arc_buf_is_shared(buf));
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, ==, NULL);
|
|
|
|
zio = zio_write(pio, spa, txg, bp,
|
|
abd_get_from_buf(buf->b_data, HDR_GET_LSIZE(hdr)),
|
|
HDR_GET_LSIZE(hdr), arc_buf_size(buf), &localprop, arc_write_ready,
|
|
(children_ready != NULL) ? arc_write_children_ready : NULL,
|
|
arc_write_physdone, arc_write_done, callback,
|
|
priority, zio_flags, zb);
|
|
|
|
return (zio);
|
|
}
|
|
|
|
static int
|
|
arc_memory_throttle(uint64_t reserve, uint64_t txg)
|
|
{
|
|
#ifdef _KERNEL
|
|
uint64_t available_memory = arc_free_memory();
|
|
static uint64_t page_load = 0;
|
|
static uint64_t last_txg = 0;
|
|
|
|
#if defined(_ILP32)
|
|
available_memory =
|
|
MIN(available_memory, vmem_size(heap_arena, VMEM_FREE));
|
|
#endif
|
|
|
|
if (available_memory > arc_all_memory() * arc_lotsfree_percent / 100)
|
|
return (0);
|
|
|
|
if (txg > last_txg) {
|
|
last_txg = txg;
|
|
page_load = 0;
|
|
}
|
|
/*
|
|
* If we are in pageout, we know that memory is already tight,
|
|
* the arc is already going to be evicting, so we just want to
|
|
* continue to let page writes occur as quickly as possible.
|
|
*/
|
|
if (current_is_kswapd()) {
|
|
if (page_load > MAX(arc_sys_free / 4, available_memory) / 4) {
|
|
DMU_TX_STAT_BUMP(dmu_tx_memory_reclaim);
|
|
return (SET_ERROR(ERESTART));
|
|
}
|
|
/* Note: reserve is inflated, so we deflate */
|
|
page_load += reserve / 8;
|
|
return (0);
|
|
} else if (page_load > 0 && arc_reclaim_needed()) {
|
|
/* memory is low, delay before restarting */
|
|
ARCSTAT_INCR(arcstat_memory_throttle_count, 1);
|
|
DMU_TX_STAT_BUMP(dmu_tx_memory_reclaim);
|
|
return (SET_ERROR(EAGAIN));
|
|
}
|
|
page_load = 0;
|
|
#endif
|
|
return (0);
|
|
}
|
|
|
|
void
|
|
arc_tempreserve_clear(uint64_t reserve)
|
|
{
|
|
atomic_add_64(&arc_tempreserve, -reserve);
|
|
ASSERT((int64_t)arc_tempreserve >= 0);
|
|
}
|
|
|
|
int
|
|
arc_tempreserve_space(uint64_t reserve, uint64_t txg)
|
|
{
|
|
int error;
|
|
uint64_t anon_size;
|
|
|
|
if (!arc_no_grow &&
|
|
reserve > arc_c/4 &&
|
|
reserve * 4 > (2ULL << SPA_MAXBLOCKSHIFT))
|
|
arc_c = MIN(arc_c_max, reserve * 4);
|
|
|
|
/*
|
|
* Throttle when the calculated memory footprint for the TXG
|
|
* exceeds the target ARC size.
|
|
*/
|
|
if (reserve > arc_c) {
|
|
DMU_TX_STAT_BUMP(dmu_tx_memory_reserve);
|
|
return (SET_ERROR(ERESTART));
|
|
}
|
|
|
|
/*
|
|
* Don't count loaned bufs as in flight dirty data to prevent long
|
|
* network delays from blocking transactions that are ready to be
|
|
* assigned to a txg.
|
|
*/
|
|
|
|
/* assert that it has not wrapped around */
|
|
ASSERT3S(atomic_add_64_nv(&arc_loaned_bytes, 0), >=, 0);
|
|
|
|
anon_size = MAX((int64_t)(refcount_count(&arc_anon->arcs_size) -
|
|
arc_loaned_bytes), 0);
|
|
|
|
/*
|
|
* Writes will, almost always, require additional memory allocations
|
|
* in order to compress/encrypt/etc the data. We therefore need to
|
|
* make sure that there is sufficient available memory for this.
|
|
*/
|
|
error = arc_memory_throttle(reserve, txg);
|
|
if (error != 0)
|
|
return (error);
|
|
|
|
/*
|
|
* Throttle writes when the amount of dirty data in the cache
|
|
* gets too large. We try to keep the cache less than half full
|
|
* of dirty blocks so that our sync times don't grow too large.
|
|
* Note: if two requests come in concurrently, we might let them
|
|
* both succeed, when one of them should fail. Not a huge deal.
|
|
*/
|
|
|
|
if (reserve + arc_tempreserve + anon_size > arc_c / 2 &&
|
|
anon_size > arc_c / 4) {
|
|
uint64_t meta_esize =
|
|
refcount_count(&arc_anon->arcs_esize[ARC_BUFC_METADATA]);
|
|
uint64_t data_esize =
|
|
refcount_count(&arc_anon->arcs_esize[ARC_BUFC_DATA]);
|
|
dprintf("failing, arc_tempreserve=%lluK anon_meta=%lluK "
|
|
"anon_data=%lluK tempreserve=%lluK arc_c=%lluK\n",
|
|
arc_tempreserve >> 10, meta_esize >> 10,
|
|
data_esize >> 10, reserve >> 10, arc_c >> 10);
|
|
DMU_TX_STAT_BUMP(dmu_tx_dirty_throttle);
|
|
return (SET_ERROR(ERESTART));
|
|
}
|
|
atomic_add_64(&arc_tempreserve, reserve);
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
arc_kstat_update_state(arc_state_t *state, kstat_named_t *size,
|
|
kstat_named_t *evict_data, kstat_named_t *evict_metadata)
|
|
{
|
|
size->value.ui64 = refcount_count(&state->arcs_size);
|
|
evict_data->value.ui64 =
|
|
refcount_count(&state->arcs_esize[ARC_BUFC_DATA]);
|
|
evict_metadata->value.ui64 =
|
|
refcount_count(&state->arcs_esize[ARC_BUFC_METADATA]);
|
|
}
|
|
|
|
static int
|
|
arc_kstat_update(kstat_t *ksp, int rw)
|
|
{
|
|
arc_stats_t *as = ksp->ks_data;
|
|
|
|
if (rw == KSTAT_WRITE) {
|
|
return (SET_ERROR(EACCES));
|
|
} else {
|
|
arc_kstat_update_state(arc_anon,
|
|
&as->arcstat_anon_size,
|
|
&as->arcstat_anon_evictable_data,
|
|
&as->arcstat_anon_evictable_metadata);
|
|
arc_kstat_update_state(arc_mru,
|
|
&as->arcstat_mru_size,
|
|
&as->arcstat_mru_evictable_data,
|
|
&as->arcstat_mru_evictable_metadata);
|
|
arc_kstat_update_state(arc_mru_ghost,
|
|
&as->arcstat_mru_ghost_size,
|
|
&as->arcstat_mru_ghost_evictable_data,
|
|
&as->arcstat_mru_ghost_evictable_metadata);
|
|
arc_kstat_update_state(arc_mfu,
|
|
&as->arcstat_mfu_size,
|
|
&as->arcstat_mfu_evictable_data,
|
|
&as->arcstat_mfu_evictable_metadata);
|
|
arc_kstat_update_state(arc_mfu_ghost,
|
|
&as->arcstat_mfu_ghost_size,
|
|
&as->arcstat_mfu_ghost_evictable_data,
|
|
&as->arcstat_mfu_ghost_evictable_metadata);
|
|
|
|
as->arcstat_memory_all_bytes.value.ui64 =
|
|
arc_all_memory();
|
|
as->arcstat_memory_free_bytes.value.ui64 =
|
|
arc_free_memory();
|
|
as->arcstat_memory_available_bytes.value.i64 =
|
|
arc_available_memory();
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* This function *must* return indices evenly distributed between all
|
|
* sublists of the multilist. This is needed due to how the ARC eviction
|
|
* code is laid out; arc_evict_state() assumes ARC buffers are evenly
|
|
* distributed between all sublists and uses this assumption when
|
|
* deciding which sublist to evict from and how much to evict from it.
|
|
*/
|
|
unsigned int
|
|
arc_state_multilist_index_func(multilist_t *ml, void *obj)
|
|
{
|
|
arc_buf_hdr_t *hdr = obj;
|
|
|
|
/*
|
|
* We rely on b_dva to generate evenly distributed index
|
|
* numbers using buf_hash below. So, as an added precaution,
|
|
* let's make sure we never add empty buffers to the arc lists.
|
|
*/
|
|
ASSERT(!HDR_EMPTY(hdr));
|
|
|
|
/*
|
|
* The assumption here, is the hash value for a given
|
|
* arc_buf_hdr_t will remain constant throughout its lifetime
|
|
* (i.e. its b_spa, b_dva, and b_birth fields don't change).
|
|
* Thus, we don't need to store the header's sublist index
|
|
* on insertion, as this index can be recalculated on removal.
|
|
*
|
|
* Also, the low order bits of the hash value are thought to be
|
|
* distributed evenly. Otherwise, in the case that the multilist
|
|
* has a power of two number of sublists, each sublists' usage
|
|
* would not be evenly distributed.
|
|
*/
|
|
return (buf_hash(hdr->b_spa, &hdr->b_dva, hdr->b_birth) %
|
|
multilist_get_num_sublists(ml));
|
|
}
|
|
|
|
/*
|
|
* Called during module initialization and periodically thereafter to
|
|
* apply reasonable changes to the exposed performance tunings. Non-zero
|
|
* zfs_* values which differ from the currently set values will be applied.
|
|
*/
|
|
static void
|
|
arc_tuning_update(void)
|
|
{
|
|
uint64_t allmem = arc_all_memory();
|
|
unsigned long limit;
|
|
|
|
/* Valid range: 64M - <all physical memory> */
|
|
if ((zfs_arc_max) && (zfs_arc_max != arc_c_max) &&
|
|
(zfs_arc_max > 64 << 20) && (zfs_arc_max < allmem) &&
|
|
(zfs_arc_max > arc_c_min)) {
|
|
arc_c_max = zfs_arc_max;
|
|
arc_c = arc_c_max;
|
|
arc_p = (arc_c >> 1);
|
|
if (arc_meta_limit > arc_c_max)
|
|
arc_meta_limit = arc_c_max;
|
|
if (arc_dnode_limit > arc_meta_limit)
|
|
arc_dnode_limit = arc_meta_limit;
|
|
}
|
|
|
|
/* Valid range: 32M - <arc_c_max> */
|
|
if ((zfs_arc_min) && (zfs_arc_min != arc_c_min) &&
|
|
(zfs_arc_min >= 2ULL << SPA_MAXBLOCKSHIFT) &&
|
|
(zfs_arc_min <= arc_c_max)) {
|
|
arc_c_min = zfs_arc_min;
|
|
arc_c = MAX(arc_c, arc_c_min);
|
|
}
|
|
|
|
/* Valid range: 16M - <arc_c_max> */
|
|
if ((zfs_arc_meta_min) && (zfs_arc_meta_min != arc_meta_min) &&
|
|
(zfs_arc_meta_min >= 1ULL << SPA_MAXBLOCKSHIFT) &&
|
|
(zfs_arc_meta_min <= arc_c_max)) {
|
|
arc_meta_min = zfs_arc_meta_min;
|
|
if (arc_meta_limit < arc_meta_min)
|
|
arc_meta_limit = arc_meta_min;
|
|
if (arc_dnode_limit < arc_meta_min)
|
|
arc_dnode_limit = arc_meta_min;
|
|
}
|
|
|
|
/* Valid range: <arc_meta_min> - <arc_c_max> */
|
|
limit = zfs_arc_meta_limit ? zfs_arc_meta_limit :
|
|
MIN(zfs_arc_meta_limit_percent, 100) * arc_c_max / 100;
|
|
if ((limit != arc_meta_limit) &&
|
|
(limit >= arc_meta_min) &&
|
|
(limit <= arc_c_max))
|
|
arc_meta_limit = limit;
|
|
|
|
/* Valid range: <arc_meta_min> - <arc_meta_limit> */
|
|
limit = zfs_arc_dnode_limit ? zfs_arc_dnode_limit :
|
|
MIN(zfs_arc_dnode_limit_percent, 100) * arc_meta_limit / 100;
|
|
if ((limit != arc_dnode_limit) &&
|
|
(limit >= arc_meta_min) &&
|
|
(limit <= arc_meta_limit))
|
|
arc_dnode_limit = limit;
|
|
|
|
/* Valid range: 1 - N */
|
|
if (zfs_arc_grow_retry)
|
|
arc_grow_retry = zfs_arc_grow_retry;
|
|
|
|
/* Valid range: 1 - N */
|
|
if (zfs_arc_shrink_shift) {
|
|
arc_shrink_shift = zfs_arc_shrink_shift;
|
|
arc_no_grow_shift = MIN(arc_no_grow_shift, arc_shrink_shift -1);
|
|
}
|
|
|
|
/* Valid range: 1 - N */
|
|
if (zfs_arc_p_min_shift)
|
|
arc_p_min_shift = zfs_arc_p_min_shift;
|
|
|
|
/* Valid range: 1 - N ms */
|
|
if (zfs_arc_min_prefetch_ms)
|
|
arc_min_prefetch_ms = zfs_arc_min_prefetch_ms;
|
|
|
|
/* Valid range: 1 - N ms */
|
|
if (zfs_arc_min_prescient_prefetch_ms) {
|
|
arc_min_prescient_prefetch_ms =
|
|
zfs_arc_min_prescient_prefetch_ms;
|
|
}
|
|
|
|
/* Valid range: 0 - 100 */
|
|
if ((zfs_arc_lotsfree_percent >= 0) &&
|
|
(zfs_arc_lotsfree_percent <= 100))
|
|
arc_lotsfree_percent = zfs_arc_lotsfree_percent;
|
|
|
|
/* Valid range: 0 - <all physical memory> */
|
|
if ((zfs_arc_sys_free) && (zfs_arc_sys_free != arc_sys_free))
|
|
arc_sys_free = MIN(MAX(zfs_arc_sys_free, 0), allmem);
|
|
|
|
}
|
|
|
|
static void
|
|
arc_state_init(void)
|
|
{
|
|
arc_anon = &ARC_anon;
|
|
arc_mru = &ARC_mru;
|
|
arc_mru_ghost = &ARC_mru_ghost;
|
|
arc_mfu = &ARC_mfu;
|
|
arc_mfu_ghost = &ARC_mfu_ghost;
|
|
arc_l2c_only = &ARC_l2c_only;
|
|
|
|
arc_mru->arcs_list[ARC_BUFC_METADATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_mru->arcs_list[ARC_BUFC_DATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_mru_ghost->arcs_list[ARC_BUFC_METADATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_mru_ghost->arcs_list[ARC_BUFC_DATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_mfu->arcs_list[ARC_BUFC_METADATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_mfu->arcs_list[ARC_BUFC_DATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_mfu_ghost->arcs_list[ARC_BUFC_METADATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_mfu_ghost->arcs_list[ARC_BUFC_DATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_l2c_only->arcs_list[ARC_BUFC_METADATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
arc_l2c_only->arcs_list[ARC_BUFC_DATA] =
|
|
multilist_create(sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l1hdr.b_arc_node),
|
|
arc_state_multilist_index_func);
|
|
|
|
refcount_create(&arc_anon->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_create(&arc_anon->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_create(&arc_mru->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_create(&arc_mru->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_create(&arc_mru_ghost->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_create(&arc_mru_ghost->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_create(&arc_mfu->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_create(&arc_mfu->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_create(&arc_mfu_ghost->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_create(&arc_mfu_ghost->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_create(&arc_l2c_only->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_create(&arc_l2c_only->arcs_esize[ARC_BUFC_DATA]);
|
|
|
|
refcount_create(&arc_anon->arcs_size);
|
|
refcount_create(&arc_mru->arcs_size);
|
|
refcount_create(&arc_mru_ghost->arcs_size);
|
|
refcount_create(&arc_mfu->arcs_size);
|
|
refcount_create(&arc_mfu_ghost->arcs_size);
|
|
refcount_create(&arc_l2c_only->arcs_size);
|
|
|
|
arc_anon->arcs_state = ARC_STATE_ANON;
|
|
arc_mru->arcs_state = ARC_STATE_MRU;
|
|
arc_mru_ghost->arcs_state = ARC_STATE_MRU_GHOST;
|
|
arc_mfu->arcs_state = ARC_STATE_MFU;
|
|
arc_mfu_ghost->arcs_state = ARC_STATE_MFU_GHOST;
|
|
arc_l2c_only->arcs_state = ARC_STATE_L2C_ONLY;
|
|
}
|
|
|
|
static void
|
|
arc_state_fini(void)
|
|
{
|
|
refcount_destroy(&arc_anon->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_destroy(&arc_anon->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_destroy(&arc_mru->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_destroy(&arc_mru->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_destroy(&arc_mru_ghost->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_destroy(&arc_mru_ghost->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_destroy(&arc_mfu->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_destroy(&arc_mfu->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_destroy(&arc_mfu_ghost->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_destroy(&arc_mfu_ghost->arcs_esize[ARC_BUFC_DATA]);
|
|
refcount_destroy(&arc_l2c_only->arcs_esize[ARC_BUFC_METADATA]);
|
|
refcount_destroy(&arc_l2c_only->arcs_esize[ARC_BUFC_DATA]);
|
|
|
|
refcount_destroy(&arc_anon->arcs_size);
|
|
refcount_destroy(&arc_mru->arcs_size);
|
|
refcount_destroy(&arc_mru_ghost->arcs_size);
|
|
refcount_destroy(&arc_mfu->arcs_size);
|
|
refcount_destroy(&arc_mfu_ghost->arcs_size);
|
|
refcount_destroy(&arc_l2c_only->arcs_size);
|
|
|
|
multilist_destroy(arc_mru->arcs_list[ARC_BUFC_METADATA]);
|
|
multilist_destroy(arc_mru_ghost->arcs_list[ARC_BUFC_METADATA]);
|
|
multilist_destroy(arc_mfu->arcs_list[ARC_BUFC_METADATA]);
|
|
multilist_destroy(arc_mfu_ghost->arcs_list[ARC_BUFC_METADATA]);
|
|
multilist_destroy(arc_mru->arcs_list[ARC_BUFC_DATA]);
|
|
multilist_destroy(arc_mru_ghost->arcs_list[ARC_BUFC_DATA]);
|
|
multilist_destroy(arc_mfu->arcs_list[ARC_BUFC_DATA]);
|
|
multilist_destroy(arc_mfu_ghost->arcs_list[ARC_BUFC_DATA]);
|
|
multilist_destroy(arc_l2c_only->arcs_list[ARC_BUFC_METADATA]);
|
|
multilist_destroy(arc_l2c_only->arcs_list[ARC_BUFC_DATA]);
|
|
}
|
|
|
|
uint64_t
|
|
arc_target_bytes(void)
|
|
{
|
|
return (arc_c);
|
|
}
|
|
|
|
void
|
|
arc_init(void)
|
|
{
|
|
uint64_t percent, allmem = arc_all_memory();
|
|
|
|
mutex_init(&arc_reclaim_lock, NULL, MUTEX_DEFAULT, NULL);
|
|
cv_init(&arc_reclaim_thread_cv, NULL, CV_DEFAULT, NULL);
|
|
cv_init(&arc_reclaim_waiters_cv, NULL, CV_DEFAULT, NULL);
|
|
|
|
arc_min_prefetch_ms = 1000;
|
|
arc_min_prescient_prefetch_ms = 6000;
|
|
|
|
#ifdef _KERNEL
|
|
/*
|
|
* Register a shrinker to support synchronous (direct) memory
|
|
* reclaim from the arc. This is done to prevent kswapd from
|
|
* swapping out pages when it is preferable to shrink the arc.
|
|
*/
|
|
spl_register_shrinker(&arc_shrinker);
|
|
|
|
/* Set to 1/64 of all memory or a minimum of 512K */
|
|
arc_sys_free = MAX(allmem / 64, (512 * 1024));
|
|
arc_need_free = 0;
|
|
#endif
|
|
|
|
/* Set max to 1/2 of all memory */
|
|
arc_c_max = allmem / 2;
|
|
|
|
#ifdef _KERNEL
|
|
/* Set min cache to 1/32 of all memory, or 32MB, whichever is more */
|
|
arc_c_min = MAX(allmem / 32, 2ULL << SPA_MAXBLOCKSHIFT);
|
|
#else
|
|
/*
|
|
* In userland, there's only the memory pressure that we artificially
|
|
* create (see arc_available_memory()). Don't let arc_c get too
|
|
* small, because it can cause transactions to be larger than
|
|
* arc_c, causing arc_tempreserve_space() to fail.
|
|
*/
|
|
arc_c_min = MAX(arc_c_max / 2, 2ULL << SPA_MAXBLOCKSHIFT);
|
|
#endif
|
|
|
|
arc_c = arc_c_max;
|
|
arc_p = (arc_c >> 1);
|
|
arc_size = 0;
|
|
|
|
/* Set min to 1/2 of arc_c_min */
|
|
arc_meta_min = 1ULL << SPA_MAXBLOCKSHIFT;
|
|
/* Initialize maximum observed usage to zero */
|
|
arc_meta_max = 0;
|
|
/*
|
|
* Set arc_meta_limit to a percent of arc_c_max with a floor of
|
|
* arc_meta_min, and a ceiling of arc_c_max.
|
|
*/
|
|
percent = MIN(zfs_arc_meta_limit_percent, 100);
|
|
arc_meta_limit = MAX(arc_meta_min, (percent * arc_c_max) / 100);
|
|
percent = MIN(zfs_arc_dnode_limit_percent, 100);
|
|
arc_dnode_limit = (percent * arc_meta_limit) / 100;
|
|
|
|
/* Apply user specified tunings */
|
|
arc_tuning_update();
|
|
|
|
/* if kmem_flags are set, lets try to use less memory */
|
|
if (kmem_debugging())
|
|
arc_c = arc_c / 2;
|
|
if (arc_c < arc_c_min)
|
|
arc_c = arc_c_min;
|
|
|
|
arc_state_init();
|
|
buf_init();
|
|
|
|
list_create(&arc_prune_list, sizeof (arc_prune_t),
|
|
offsetof(arc_prune_t, p_node));
|
|
mutex_init(&arc_prune_mtx, NULL, MUTEX_DEFAULT, NULL);
|
|
|
|
arc_prune_taskq = taskq_create("arc_prune", max_ncpus, defclsyspri,
|
|
max_ncpus, INT_MAX, TASKQ_PREPOPULATE | TASKQ_DYNAMIC);
|
|
|
|
arc_reclaim_thread_exit = B_FALSE;
|
|
|
|
arc_ksp = kstat_create("zfs", 0, "arcstats", "misc", KSTAT_TYPE_NAMED,
|
|
sizeof (arc_stats) / sizeof (kstat_named_t), KSTAT_FLAG_VIRTUAL);
|
|
|
|
if (arc_ksp != NULL) {
|
|
arc_ksp->ks_data = &arc_stats;
|
|
arc_ksp->ks_update = arc_kstat_update;
|
|
kstat_install(arc_ksp);
|
|
}
|
|
|
|
(void) thread_create(NULL, 0, arc_reclaim_thread, NULL, 0, &p0,
|
|
TS_RUN, defclsyspri);
|
|
|
|
arc_dead = B_FALSE;
|
|
arc_warm = B_FALSE;
|
|
|
|
/*
|
|
* Calculate maximum amount of dirty data per pool.
|
|
*
|
|
* If it has been set by a module parameter, take that.
|
|
* Otherwise, use a percentage of physical memory defined by
|
|
* zfs_dirty_data_max_percent (default 10%) with a cap at
|
|
* zfs_dirty_data_max_max (default 4G or 25% of physical memory).
|
|
*/
|
|
if (zfs_dirty_data_max_max == 0)
|
|
zfs_dirty_data_max_max = MIN(4ULL * 1024 * 1024 * 1024,
|
|
allmem * zfs_dirty_data_max_max_percent / 100);
|
|
|
|
if (zfs_dirty_data_max == 0) {
|
|
zfs_dirty_data_max = allmem *
|
|
zfs_dirty_data_max_percent / 100;
|
|
zfs_dirty_data_max = MIN(zfs_dirty_data_max,
|
|
zfs_dirty_data_max_max);
|
|
}
|
|
}
|
|
|
|
void
|
|
arc_fini(void)
|
|
{
|
|
arc_prune_t *p;
|
|
|
|
#ifdef _KERNEL
|
|
spl_unregister_shrinker(&arc_shrinker);
|
|
#endif /* _KERNEL */
|
|
|
|
mutex_enter(&arc_reclaim_lock);
|
|
arc_reclaim_thread_exit = B_TRUE;
|
|
/*
|
|
* The reclaim thread will set arc_reclaim_thread_exit back to
|
|
* B_FALSE when it is finished exiting; we're waiting for that.
|
|
*/
|
|
while (arc_reclaim_thread_exit) {
|
|
cv_signal(&arc_reclaim_thread_cv);
|
|
cv_wait(&arc_reclaim_thread_cv, &arc_reclaim_lock);
|
|
}
|
|
mutex_exit(&arc_reclaim_lock);
|
|
|
|
/* Use B_TRUE to ensure *all* buffers are evicted */
|
|
arc_flush(NULL, B_TRUE);
|
|
|
|
arc_dead = B_TRUE;
|
|
|
|
if (arc_ksp != NULL) {
|
|
kstat_delete(arc_ksp);
|
|
arc_ksp = NULL;
|
|
}
|
|
|
|
taskq_wait(arc_prune_taskq);
|
|
taskq_destroy(arc_prune_taskq);
|
|
|
|
mutex_enter(&arc_prune_mtx);
|
|
while ((p = list_head(&arc_prune_list)) != NULL) {
|
|
list_remove(&arc_prune_list, p);
|
|
refcount_remove(&p->p_refcnt, &arc_prune_list);
|
|
refcount_destroy(&p->p_refcnt);
|
|
kmem_free(p, sizeof (*p));
|
|
}
|
|
mutex_exit(&arc_prune_mtx);
|
|
|
|
list_destroy(&arc_prune_list);
|
|
mutex_destroy(&arc_prune_mtx);
|
|
mutex_destroy(&arc_reclaim_lock);
|
|
cv_destroy(&arc_reclaim_thread_cv);
|
|
cv_destroy(&arc_reclaim_waiters_cv);
|
|
|
|
arc_state_fini();
|
|
buf_fini();
|
|
|
|
ASSERT0(arc_loaned_bytes);
|
|
}
|
|
|
|
/*
|
|
* Level 2 ARC
|
|
*
|
|
* The level 2 ARC (L2ARC) is a cache layer in-between main memory and disk.
|
|
* It uses dedicated storage devices to hold cached data, which are populated
|
|
* using large infrequent writes. The main role of this cache is to boost
|
|
* the performance of random read workloads. The intended L2ARC devices
|
|
* include short-stroked disks, solid state disks, and other media with
|
|
* substantially faster read latency than disk.
|
|
*
|
|
* +-----------------------+
|
|
* | ARC |
|
|
* +-----------------------+
|
|
* | ^ ^
|
|
* | | |
|
|
* l2arc_feed_thread() arc_read()
|
|
* | | |
|
|
* | l2arc read |
|
|
* V | |
|
|
* +---------------+ |
|
|
* | L2ARC | |
|
|
* +---------------+ |
|
|
* | ^ |
|
|
* l2arc_write() | |
|
|
* | | |
|
|
* V | |
|
|
* +-------+ +-------+
|
|
* | vdev | | vdev |
|
|
* | cache | | cache |
|
|
* +-------+ +-------+
|
|
* +=========+ .-----.
|
|
* : L2ARC : |-_____-|
|
|
* : devices : | Disks |
|
|
* +=========+ `-_____-'
|
|
*
|
|
* Read requests are satisfied from the following sources, in order:
|
|
*
|
|
* 1) ARC
|
|
* 2) vdev cache of L2ARC devices
|
|
* 3) L2ARC devices
|
|
* 4) vdev cache of disks
|
|
* 5) disks
|
|
*
|
|
* Some L2ARC device types exhibit extremely slow write performance.
|
|
* To accommodate for this there are some significant differences between
|
|
* the L2ARC and traditional cache design:
|
|
*
|
|
* 1. There is no eviction path from the ARC to the L2ARC. Evictions from
|
|
* the ARC behave as usual, freeing buffers and placing headers on ghost
|
|
* lists. The ARC does not send buffers to the L2ARC during eviction as
|
|
* this would add inflated write latencies for all ARC memory pressure.
|
|
*
|
|
* 2. The L2ARC attempts to cache data from the ARC before it is evicted.
|
|
* It does this by periodically scanning buffers from the eviction-end of
|
|
* the MFU and MRU ARC lists, copying them to the L2ARC devices if they are
|
|
* not already there. It scans until a headroom of buffers is satisfied,
|
|
* which itself is a buffer for ARC eviction. If a compressible buffer is
|
|
* found during scanning and selected for writing to an L2ARC device, we
|
|
* temporarily boost scanning headroom during the next scan cycle to make
|
|
* sure we adapt to compression effects (which might significantly reduce
|
|
* the data volume we write to L2ARC). The thread that does this is
|
|
* l2arc_feed_thread(), illustrated below; example sizes are included to
|
|
* provide a better sense of ratio than this diagram:
|
|
*
|
|
* head --> tail
|
|
* +---------------------+----------+
|
|
* ARC_mfu |:::::#:::::::::::::::|o#o###o###|-->. # already on L2ARC
|
|
* +---------------------+----------+ | o L2ARC eligible
|
|
* ARC_mru |:#:::::::::::::::::::|#o#ooo####|-->| : ARC buffer
|
|
* +---------------------+----------+ |
|
|
* 15.9 Gbytes ^ 32 Mbytes |
|
|
* headroom |
|
|
* l2arc_feed_thread()
|
|
* |
|
|
* l2arc write hand <--[oooo]--'
|
|
* | 8 Mbyte
|
|
* | write max
|
|
* V
|
|
* +==============================+
|
|
* L2ARC dev |####|#|###|###| |####| ... |
|
|
* +==============================+
|
|
* 32 Gbytes
|
|
*
|
|
* 3. If an ARC buffer is copied to the L2ARC but then hit instead of
|
|
* evicted, then the L2ARC has cached a buffer much sooner than it probably
|
|
* needed to, potentially wasting L2ARC device bandwidth and storage. It is
|
|
* safe to say that this is an uncommon case, since buffers at the end of
|
|
* the ARC lists have moved there due to inactivity.
|
|
*
|
|
* 4. If the ARC evicts faster than the L2ARC can maintain a headroom,
|
|
* then the L2ARC simply misses copying some buffers. This serves as a
|
|
* pressure valve to prevent heavy read workloads from both stalling the ARC
|
|
* with waits and clogging the L2ARC with writes. This also helps prevent
|
|
* the potential for the L2ARC to churn if it attempts to cache content too
|
|
* quickly, such as during backups of the entire pool.
|
|
*
|
|
* 5. After system boot and before the ARC has filled main memory, there are
|
|
* no evictions from the ARC and so the tails of the ARC_mfu and ARC_mru
|
|
* lists can remain mostly static. Instead of searching from tail of these
|
|
* lists as pictured, the l2arc_feed_thread() will search from the list heads
|
|
* for eligible buffers, greatly increasing its chance of finding them.
|
|
*
|
|
* The L2ARC device write speed is also boosted during this time so that
|
|
* the L2ARC warms up faster. Since there have been no ARC evictions yet,
|
|
* there are no L2ARC reads, and no fear of degrading read performance
|
|
* through increased writes.
|
|
*
|
|
* 6. Writes to the L2ARC devices are grouped and sent in-sequence, so that
|
|
* the vdev queue can aggregate them into larger and fewer writes. Each
|
|
* device is written to in a rotor fashion, sweeping writes through
|
|
* available space then repeating.
|
|
*
|
|
* 7. The L2ARC does not store dirty content. It never needs to flush
|
|
* write buffers back to disk based storage.
|
|
*
|
|
* 8. If an ARC buffer is written (and dirtied) which also exists in the
|
|
* L2ARC, the now stale L2ARC buffer is immediately dropped.
|
|
*
|
|
* The performance of the L2ARC can be tweaked by a number of tunables, which
|
|
* may be necessary for different workloads:
|
|
*
|
|
* l2arc_write_max max write bytes per interval
|
|
* l2arc_write_boost extra write bytes during device warmup
|
|
* l2arc_noprefetch skip caching prefetched buffers
|
|
* l2arc_headroom number of max device writes to precache
|
|
* l2arc_headroom_boost when we find compressed buffers during ARC
|
|
* scanning, we multiply headroom by this
|
|
* percentage factor for the next scan cycle,
|
|
* since more compressed buffers are likely to
|
|
* be present
|
|
* l2arc_feed_secs seconds between L2ARC writing
|
|
*
|
|
* Tunables may be removed or added as future performance improvements are
|
|
* integrated, and also may become zpool properties.
|
|
*
|
|
* There are three key functions that control how the L2ARC warms up:
|
|
*
|
|
* l2arc_write_eligible() check if a buffer is eligible to cache
|
|
* l2arc_write_size() calculate how much to write
|
|
* l2arc_write_interval() calculate sleep delay between writes
|
|
*
|
|
* These three functions determine what to write, how much, and how quickly
|
|
* to send writes.
|
|
*/
|
|
|
|
static boolean_t
|
|
l2arc_write_eligible(uint64_t spa_guid, arc_buf_hdr_t *hdr)
|
|
{
|
|
/*
|
|
* A buffer is *not* eligible for the L2ARC if it:
|
|
* 1. belongs to a different spa.
|
|
* 2. is already cached on the L2ARC.
|
|
* 3. has an I/O in progress (it may be an incomplete read).
|
|
* 4. is flagged not eligible (zfs property).
|
|
*/
|
|
if (hdr->b_spa != spa_guid || HDR_HAS_L2HDR(hdr) ||
|
|
HDR_IO_IN_PROGRESS(hdr) || !HDR_L2CACHE(hdr))
|
|
return (B_FALSE);
|
|
|
|
return (B_TRUE);
|
|
}
|
|
|
|
static uint64_t
|
|
l2arc_write_size(void)
|
|
{
|
|
uint64_t size;
|
|
|
|
/*
|
|
* Make sure our globals have meaningful values in case the user
|
|
* altered them.
|
|
*/
|
|
size = l2arc_write_max;
|
|
if (size == 0) {
|
|
cmn_err(CE_NOTE, "Bad value for l2arc_write_max, value must "
|
|
"be greater than zero, resetting it to the default (%d)",
|
|
L2ARC_WRITE_SIZE);
|
|
size = l2arc_write_max = L2ARC_WRITE_SIZE;
|
|
}
|
|
|
|
if (arc_warm == B_FALSE)
|
|
size += l2arc_write_boost;
|
|
|
|
return (size);
|
|
|
|
}
|
|
|
|
static clock_t
|
|
l2arc_write_interval(clock_t began, uint64_t wanted, uint64_t wrote)
|
|
{
|
|
clock_t interval, next, now;
|
|
|
|
/*
|
|
* If the ARC lists are busy, increase our write rate; if the
|
|
* lists are stale, idle back. This is achieved by checking
|
|
* how much we previously wrote - if it was more than half of
|
|
* what we wanted, schedule the next write much sooner.
|
|
*/
|
|
if (l2arc_feed_again && wrote > (wanted / 2))
|
|
interval = (hz * l2arc_feed_min_ms) / 1000;
|
|
else
|
|
interval = hz * l2arc_feed_secs;
|
|
|
|
now = ddi_get_lbolt();
|
|
next = MAX(now, MIN(now + interval, began + interval));
|
|
|
|
return (next);
|
|
}
|
|
|
|
/*
|
|
* Cycle through L2ARC devices. This is how L2ARC load balances.
|
|
* If a device is returned, this also returns holding the spa config lock.
|
|
*/
|
|
static l2arc_dev_t *
|
|
l2arc_dev_get_next(void)
|
|
{
|
|
l2arc_dev_t *first, *next = NULL;
|
|
|
|
/*
|
|
* Lock out the removal of spas (spa_namespace_lock), then removal
|
|
* of cache devices (l2arc_dev_mtx). Once a device has been selected,
|
|
* both locks will be dropped and a spa config lock held instead.
|
|
*/
|
|
mutex_enter(&spa_namespace_lock);
|
|
mutex_enter(&l2arc_dev_mtx);
|
|
|
|
/* if there are no vdevs, there is nothing to do */
|
|
if (l2arc_ndev == 0)
|
|
goto out;
|
|
|
|
first = NULL;
|
|
next = l2arc_dev_last;
|
|
do {
|
|
/* loop around the list looking for a non-faulted vdev */
|
|
if (next == NULL) {
|
|
next = list_head(l2arc_dev_list);
|
|
} else {
|
|
next = list_next(l2arc_dev_list, next);
|
|
if (next == NULL)
|
|
next = list_head(l2arc_dev_list);
|
|
}
|
|
|
|
/* if we have come back to the start, bail out */
|
|
if (first == NULL)
|
|
first = next;
|
|
else if (next == first)
|
|
break;
|
|
|
|
} while (vdev_is_dead(next->l2ad_vdev));
|
|
|
|
/* if we were unable to find any usable vdevs, return NULL */
|
|
if (vdev_is_dead(next->l2ad_vdev))
|
|
next = NULL;
|
|
|
|
l2arc_dev_last = next;
|
|
|
|
out:
|
|
mutex_exit(&l2arc_dev_mtx);
|
|
|
|
/*
|
|
* Grab the config lock to prevent the 'next' device from being
|
|
* removed while we are writing to it.
|
|
*/
|
|
if (next != NULL)
|
|
spa_config_enter(next->l2ad_spa, SCL_L2ARC, next, RW_READER);
|
|
mutex_exit(&spa_namespace_lock);
|
|
|
|
return (next);
|
|
}
|
|
|
|
/*
|
|
* Free buffers that were tagged for destruction.
|
|
*/
|
|
static void
|
|
l2arc_do_free_on_write(void)
|
|
{
|
|
list_t *buflist;
|
|
l2arc_data_free_t *df, *df_prev;
|
|
|
|
mutex_enter(&l2arc_free_on_write_mtx);
|
|
buflist = l2arc_free_on_write;
|
|
|
|
for (df = list_tail(buflist); df; df = df_prev) {
|
|
df_prev = list_prev(buflist, df);
|
|
ASSERT3P(df->l2df_abd, !=, NULL);
|
|
abd_free(df->l2df_abd);
|
|
list_remove(buflist, df);
|
|
kmem_free(df, sizeof (l2arc_data_free_t));
|
|
}
|
|
|
|
mutex_exit(&l2arc_free_on_write_mtx);
|
|
}
|
|
|
|
/*
|
|
* A write to a cache device has completed. Update all headers to allow
|
|
* reads from these buffers to begin.
|
|
*/
|
|
static void
|
|
l2arc_write_done(zio_t *zio)
|
|
{
|
|
l2arc_write_callback_t *cb;
|
|
l2arc_dev_t *dev;
|
|
list_t *buflist;
|
|
arc_buf_hdr_t *head, *hdr, *hdr_prev;
|
|
kmutex_t *hash_lock;
|
|
int64_t bytes_dropped = 0;
|
|
|
|
cb = zio->io_private;
|
|
ASSERT3P(cb, !=, NULL);
|
|
dev = cb->l2wcb_dev;
|
|
ASSERT3P(dev, !=, NULL);
|
|
head = cb->l2wcb_head;
|
|
ASSERT3P(head, !=, NULL);
|
|
buflist = &dev->l2ad_buflist;
|
|
ASSERT3P(buflist, !=, NULL);
|
|
DTRACE_PROBE2(l2arc__iodone, zio_t *, zio,
|
|
l2arc_write_callback_t *, cb);
|
|
|
|
if (zio->io_error != 0)
|
|
ARCSTAT_BUMP(arcstat_l2_writes_error);
|
|
|
|
/*
|
|
* All writes completed, or an error was hit.
|
|
*/
|
|
top:
|
|
mutex_enter(&dev->l2ad_mtx);
|
|
for (hdr = list_prev(buflist, head); hdr; hdr = hdr_prev) {
|
|
hdr_prev = list_prev(buflist, hdr);
|
|
|
|
hash_lock = HDR_LOCK(hdr);
|
|
|
|
/*
|
|
* We cannot use mutex_enter or else we can deadlock
|
|
* with l2arc_write_buffers (due to swapping the order
|
|
* the hash lock and l2ad_mtx are taken).
|
|
*/
|
|
if (!mutex_tryenter(hash_lock)) {
|
|
/*
|
|
* Missed the hash lock. We must retry so we
|
|
* don't leave the ARC_FLAG_L2_WRITING bit set.
|
|
*/
|
|
ARCSTAT_BUMP(arcstat_l2_writes_lock_retry);
|
|
|
|
/*
|
|
* We don't want to rescan the headers we've
|
|
* already marked as having been written out, so
|
|
* we reinsert the head node so we can pick up
|
|
* where we left off.
|
|
*/
|
|
list_remove(buflist, head);
|
|
list_insert_after(buflist, hdr, head);
|
|
|
|
mutex_exit(&dev->l2ad_mtx);
|
|
|
|
/*
|
|
* We wait for the hash lock to become available
|
|
* to try and prevent busy waiting, and increase
|
|
* the chance we'll be able to acquire the lock
|
|
* the next time around.
|
|
*/
|
|
mutex_enter(hash_lock);
|
|
mutex_exit(hash_lock);
|
|
goto top;
|
|
}
|
|
|
|
/*
|
|
* We could not have been moved into the arc_l2c_only
|
|
* state while in-flight due to our ARC_FLAG_L2_WRITING
|
|
* bit being set. Let's just ensure that's being enforced.
|
|
*/
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
/*
|
|
* Skipped - drop L2ARC entry and mark the header as no
|
|
* longer L2 eligibile.
|
|
*/
|
|
if (zio->io_error != 0) {
|
|
/*
|
|
* Error - drop L2ARC entry.
|
|
*/
|
|
list_remove(buflist, hdr);
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_HAS_L2HDR);
|
|
|
|
ARCSTAT_INCR(arcstat_l2_psize, -arc_hdr_size(hdr));
|
|
ARCSTAT_INCR(arcstat_l2_lsize, -HDR_GET_LSIZE(hdr));
|
|
|
|
bytes_dropped += arc_hdr_size(hdr);
|
|
(void) refcount_remove_many(&dev->l2ad_alloc,
|
|
arc_hdr_size(hdr), hdr);
|
|
}
|
|
|
|
/*
|
|
* Allow ARC to begin reads and ghost list evictions to
|
|
* this L2ARC entry.
|
|
*/
|
|
arc_hdr_clear_flags(hdr, ARC_FLAG_L2_WRITING);
|
|
|
|
mutex_exit(hash_lock);
|
|
}
|
|
|
|
atomic_inc_64(&l2arc_writes_done);
|
|
list_remove(buflist, head);
|
|
ASSERT(!HDR_HAS_L1HDR(head));
|
|
kmem_cache_free(hdr_l2only_cache, head);
|
|
mutex_exit(&dev->l2ad_mtx);
|
|
|
|
vdev_space_update(dev->l2ad_vdev, -bytes_dropped, 0, 0);
|
|
|
|
l2arc_do_free_on_write();
|
|
|
|
kmem_free(cb, sizeof (l2arc_write_callback_t));
|
|
}
|
|
|
|
static int
|
|
l2arc_untransform(zio_t *zio, l2arc_read_callback_t *cb)
|
|
{
|
|
int ret;
|
|
spa_t *spa = zio->io_spa;
|
|
arc_buf_hdr_t *hdr = cb->l2rcb_hdr;
|
|
blkptr_t *bp = zio->io_bp;
|
|
dsl_crypto_key_t *dck = NULL;
|
|
uint8_t salt[ZIO_DATA_SALT_LEN];
|
|
uint8_t iv[ZIO_DATA_IV_LEN];
|
|
uint8_t mac[ZIO_DATA_MAC_LEN];
|
|
boolean_t no_crypt = B_FALSE;
|
|
|
|
/*
|
|
* ZIL data is never be written to the L2ARC, so we don't need
|
|
* special handling for its unique MAC storage.
|
|
*/
|
|
ASSERT3U(BP_GET_TYPE(bp), !=, DMU_OT_INTENT_LOG);
|
|
ASSERT(MUTEX_HELD(HDR_LOCK(hdr)));
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
|
|
/*
|
|
* If the data was encrypted, decrypt it now. Note that
|
|
* we must check the bp here and not the hdr, since the
|
|
* hdr does not have its encryption parameters updated
|
|
* until arc_read_done().
|
|
*/
|
|
if (BP_IS_ENCRYPTED(bp)) {
|
|
abd_t *eabd = arc_get_data_abd(hdr,
|
|
arc_hdr_size(hdr), hdr);
|
|
|
|
zio_crypt_decode_params_bp(bp, salt, iv);
|
|
zio_crypt_decode_mac_bp(bp, mac);
|
|
|
|
ret = spa_keystore_lookup_key(spa,
|
|
cb->l2rcb_zb.zb_objset, FTAG, &dck);
|
|
if (ret != 0) {
|
|
arc_free_data_abd(hdr, eabd, arc_hdr_size(hdr), hdr);
|
|
goto error;
|
|
}
|
|
|
|
ret = zio_do_crypt_abd(B_FALSE, &dck->dck_key,
|
|
salt, BP_GET_TYPE(bp), iv, mac, HDR_GET_PSIZE(hdr),
|
|
BP_SHOULD_BYTESWAP(bp), eabd, hdr->b_l1hdr.b_pabd,
|
|
&no_crypt);
|
|
if (ret != 0) {
|
|
arc_free_data_abd(hdr, eabd, arc_hdr_size(hdr), hdr);
|
|
spa_keystore_dsl_key_rele(spa, dck, FTAG);
|
|
goto error;
|
|
}
|
|
|
|
spa_keystore_dsl_key_rele(spa, dck, FTAG);
|
|
|
|
/*
|
|
* If we actually performed decryption, replace b_pabd
|
|
* with the decrypted data. Otherwise we can just throw
|
|
* our decryption buffer away.
|
|
*/
|
|
if (!no_crypt) {
|
|
arc_free_data_abd(hdr, hdr->b_l1hdr.b_pabd,
|
|
arc_hdr_size(hdr), hdr);
|
|
hdr->b_l1hdr.b_pabd = eabd;
|
|
zio->io_abd = eabd;
|
|
} else {
|
|
arc_free_data_abd(hdr, eabd, arc_hdr_size(hdr), hdr);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* If the L2ARC block was compressed, but ARC compression
|
|
* is disabled we decompress the data into a new buffer and
|
|
* replace the existing data.
|
|
*/
|
|
if (HDR_GET_COMPRESS(hdr) != ZIO_COMPRESS_OFF &&
|
|
!HDR_COMPRESSION_ENABLED(hdr)) {
|
|
abd_t *cabd = arc_get_data_abd(hdr, arc_hdr_size(hdr), hdr);
|
|
void *tmp = abd_borrow_buf(cabd, arc_hdr_size(hdr));
|
|
|
|
ret = zio_decompress_data(HDR_GET_COMPRESS(hdr),
|
|
hdr->b_l1hdr.b_pabd, tmp, HDR_GET_PSIZE(hdr),
|
|
HDR_GET_LSIZE(hdr));
|
|
if (ret != 0) {
|
|
abd_return_buf_copy(cabd, tmp, arc_hdr_size(hdr));
|
|
arc_free_data_abd(hdr, cabd, arc_hdr_size(hdr), hdr);
|
|
goto error;
|
|
}
|
|
|
|
abd_return_buf_copy(cabd, tmp, arc_hdr_size(hdr));
|
|
arc_free_data_abd(hdr, hdr->b_l1hdr.b_pabd,
|
|
arc_hdr_size(hdr), hdr);
|
|
hdr->b_l1hdr.b_pabd = cabd;
|
|
zio->io_abd = cabd;
|
|
zio->io_size = HDR_GET_LSIZE(hdr);
|
|
}
|
|
|
|
return (0);
|
|
|
|
error:
|
|
return (ret);
|
|
}
|
|
|
|
|
|
/*
|
|
* A read to a cache device completed. Validate buffer contents before
|
|
* handing over to the regular ARC routines.
|
|
*/
|
|
static void
|
|
l2arc_read_done(zio_t *zio)
|
|
{
|
|
int tfm_error = 0;
|
|
l2arc_read_callback_t *cb;
|
|
arc_buf_hdr_t *hdr;
|
|
kmutex_t *hash_lock;
|
|
boolean_t valid_cksum, using_rdata;
|
|
|
|
ASSERT3P(zio->io_vd, !=, NULL);
|
|
ASSERT(zio->io_flags & ZIO_FLAG_DONT_PROPAGATE);
|
|
|
|
spa_config_exit(zio->io_spa, SCL_L2ARC, zio->io_vd);
|
|
|
|
cb = zio->io_private;
|
|
ASSERT3P(cb, !=, NULL);
|
|
hdr = cb->l2rcb_hdr;
|
|
ASSERT3P(hdr, !=, NULL);
|
|
|
|
hash_lock = HDR_LOCK(hdr);
|
|
mutex_enter(hash_lock);
|
|
ASSERT3P(hash_lock, ==, HDR_LOCK(hdr));
|
|
|
|
/*
|
|
* If the data was read into a temporary buffer,
|
|
* move it and free the buffer.
|
|
*/
|
|
if (cb->l2rcb_abd != NULL) {
|
|
ASSERT3U(arc_hdr_size(hdr), <, zio->io_size);
|
|
if (zio->io_error == 0) {
|
|
abd_copy(hdr->b_l1hdr.b_pabd, cb->l2rcb_abd,
|
|
arc_hdr_size(hdr));
|
|
}
|
|
|
|
/*
|
|
* The following must be done regardless of whether
|
|
* there was an error:
|
|
* - free the temporary buffer
|
|
* - point zio to the real ARC buffer
|
|
* - set zio size accordingly
|
|
* These are required because zio is either re-used for
|
|
* an I/O of the block in the case of the error
|
|
* or the zio is passed to arc_read_done() and it
|
|
* needs real data.
|
|
*/
|
|
abd_free(cb->l2rcb_abd);
|
|
zio->io_size = zio->io_orig_size = arc_hdr_size(hdr);
|
|
|
|
if (BP_IS_ENCRYPTED(&cb->l2rcb_bp) &&
|
|
(cb->l2rcb_flags & ZIO_FLAG_RAW_ENCRYPT)) {
|
|
ASSERT(HDR_HAS_RABD(hdr));
|
|
zio->io_abd = zio->io_orig_abd =
|
|
hdr->b_crypt_hdr.b_rabd;
|
|
} else {
|
|
ASSERT3P(hdr->b_l1hdr.b_pabd, !=, NULL);
|
|
zio->io_abd = zio->io_orig_abd = hdr->b_l1hdr.b_pabd;
|
|
}
|
|
}
|
|
|
|
ASSERT3P(zio->io_abd, !=, NULL);
|
|
|
|
/*
|
|
* Check this survived the L2ARC journey.
|
|
*/
|
|
ASSERT(zio->io_abd == hdr->b_l1hdr.b_pabd ||
|
|
(HDR_HAS_RABD(hdr) && zio->io_abd == hdr->b_crypt_hdr.b_rabd));
|
|
zio->io_bp_copy = cb->l2rcb_bp; /* XXX fix in L2ARC 2.0 */
|
|
zio->io_bp = &zio->io_bp_copy; /* XXX fix in L2ARC 2.0 */
|
|
|
|
valid_cksum = arc_cksum_is_equal(hdr, zio);
|
|
using_rdata = (HDR_HAS_RABD(hdr) &&
|
|
zio->io_abd == hdr->b_crypt_hdr.b_rabd);
|
|
|
|
/*
|
|
* b_rabd will always match the data as it exists on disk if it is
|
|
* being used. Therefore if we are reading into b_rabd we do not
|
|
* attempt to untransform the data.
|
|
*/
|
|
if (valid_cksum && !using_rdata)
|
|
tfm_error = l2arc_untransform(zio, cb);
|
|
|
|
if (valid_cksum && tfm_error == 0 && zio->io_error == 0 &&
|
|
!HDR_L2_EVICTED(hdr)) {
|
|
mutex_exit(hash_lock);
|
|
zio->io_private = hdr;
|
|
arc_read_done(zio);
|
|
} else {
|
|
mutex_exit(hash_lock);
|
|
/*
|
|
* Buffer didn't survive caching. Increment stats and
|
|
* reissue to the original storage device.
|
|
*/
|
|
if (zio->io_error != 0) {
|
|
ARCSTAT_BUMP(arcstat_l2_io_error);
|
|
} else {
|
|
zio->io_error = SET_ERROR(EIO);
|
|
}
|
|
if (!valid_cksum || tfm_error != 0)
|
|
ARCSTAT_BUMP(arcstat_l2_cksum_bad);
|
|
|
|
/*
|
|
* If there's no waiter, issue an async i/o to the primary
|
|
* storage now. If there *is* a waiter, the caller must
|
|
* issue the i/o in a context where it's OK to block.
|
|
*/
|
|
if (zio->io_waiter == NULL) {
|
|
zio_t *pio = zio_unique_parent(zio);
|
|
void *abd = (using_rdata) ?
|
|
hdr->b_crypt_hdr.b_rabd : hdr->b_l1hdr.b_pabd;
|
|
|
|
ASSERT(!pio || pio->io_child_type == ZIO_CHILD_LOGICAL);
|
|
|
|
zio_nowait(zio_read(pio, zio->io_spa, zio->io_bp,
|
|
abd, zio->io_size, arc_read_done,
|
|
hdr, zio->io_priority, cb->l2rcb_flags,
|
|
&cb->l2rcb_zb));
|
|
}
|
|
}
|
|
|
|
kmem_free(cb, sizeof (l2arc_read_callback_t));
|
|
}
|
|
|
|
/*
|
|
* This is the list priority from which the L2ARC will search for pages to
|
|
* cache. This is used within loops (0..3) to cycle through lists in the
|
|
* desired order. This order can have a significant effect on cache
|
|
* performance.
|
|
*
|
|
* Currently the metadata lists are hit first, MFU then MRU, followed by
|
|
* the data lists. This function returns a locked list, and also returns
|
|
* the lock pointer.
|
|
*/
|
|
static multilist_sublist_t *
|
|
l2arc_sublist_lock(int list_num)
|
|
{
|
|
multilist_t *ml = NULL;
|
|
unsigned int idx;
|
|
|
|
ASSERT(list_num >= 0 && list_num < L2ARC_FEED_TYPES);
|
|
|
|
switch (list_num) {
|
|
case 0:
|
|
ml = arc_mfu->arcs_list[ARC_BUFC_METADATA];
|
|
break;
|
|
case 1:
|
|
ml = arc_mru->arcs_list[ARC_BUFC_METADATA];
|
|
break;
|
|
case 2:
|
|
ml = arc_mfu->arcs_list[ARC_BUFC_DATA];
|
|
break;
|
|
case 3:
|
|
ml = arc_mru->arcs_list[ARC_BUFC_DATA];
|
|
break;
|
|
default:
|
|
return (NULL);
|
|
}
|
|
|
|
/*
|
|
* Return a randomly-selected sublist. This is acceptable
|
|
* because the caller feeds only a little bit of data for each
|
|
* call (8MB). Subsequent calls will result in different
|
|
* sublists being selected.
|
|
*/
|
|
idx = multilist_get_random_index(ml);
|
|
return (multilist_sublist_lock(ml, idx));
|
|
}
|
|
|
|
/*
|
|
* Evict buffers from the device write hand to the distance specified in
|
|
* bytes. This distance may span populated buffers, it may span nothing.
|
|
* This is clearing a region on the L2ARC device ready for writing.
|
|
* If the 'all' boolean is set, every buffer is evicted.
|
|
*/
|
|
static void
|
|
l2arc_evict(l2arc_dev_t *dev, uint64_t distance, boolean_t all)
|
|
{
|
|
list_t *buflist;
|
|
arc_buf_hdr_t *hdr, *hdr_prev;
|
|
kmutex_t *hash_lock;
|
|
uint64_t taddr;
|
|
|
|
buflist = &dev->l2ad_buflist;
|
|
|
|
if (!all && dev->l2ad_first) {
|
|
/*
|
|
* This is the first sweep through the device. There is
|
|
* nothing to evict.
|
|
*/
|
|
return;
|
|
}
|
|
|
|
if (dev->l2ad_hand >= (dev->l2ad_end - (2 * distance))) {
|
|
/*
|
|
* When nearing the end of the device, evict to the end
|
|
* before the device write hand jumps to the start.
|
|
*/
|
|
taddr = dev->l2ad_end;
|
|
} else {
|
|
taddr = dev->l2ad_hand + distance;
|
|
}
|
|
DTRACE_PROBE4(l2arc__evict, l2arc_dev_t *, dev, list_t *, buflist,
|
|
uint64_t, taddr, boolean_t, all);
|
|
|
|
top:
|
|
mutex_enter(&dev->l2ad_mtx);
|
|
for (hdr = list_tail(buflist); hdr; hdr = hdr_prev) {
|
|
hdr_prev = list_prev(buflist, hdr);
|
|
|
|
hash_lock = HDR_LOCK(hdr);
|
|
|
|
/*
|
|
* We cannot use mutex_enter or else we can deadlock
|
|
* with l2arc_write_buffers (due to swapping the order
|
|
* the hash lock and l2ad_mtx are taken).
|
|
*/
|
|
if (!mutex_tryenter(hash_lock)) {
|
|
/*
|
|
* Missed the hash lock. Retry.
|
|
*/
|
|
ARCSTAT_BUMP(arcstat_l2_evict_lock_retry);
|
|
mutex_exit(&dev->l2ad_mtx);
|
|
mutex_enter(hash_lock);
|
|
mutex_exit(hash_lock);
|
|
goto top;
|
|
}
|
|
|
|
/*
|
|
* A header can't be on this list if it doesn't have L2 header.
|
|
*/
|
|
ASSERT(HDR_HAS_L2HDR(hdr));
|
|
|
|
/* Ensure this header has finished being written. */
|
|
ASSERT(!HDR_L2_WRITING(hdr));
|
|
ASSERT(!HDR_L2_WRITE_HEAD(hdr));
|
|
|
|
if (!all && (hdr->b_l2hdr.b_daddr >= taddr ||
|
|
hdr->b_l2hdr.b_daddr < dev->l2ad_hand)) {
|
|
/*
|
|
* We've evicted to the target address,
|
|
* or the end of the device.
|
|
*/
|
|
mutex_exit(hash_lock);
|
|
break;
|
|
}
|
|
|
|
if (!HDR_HAS_L1HDR(hdr)) {
|
|
ASSERT(!HDR_L2_READING(hdr));
|
|
/*
|
|
* This doesn't exist in the ARC. Destroy.
|
|
* arc_hdr_destroy() will call list_remove()
|
|
* and decrement arcstat_l2_lsize.
|
|
*/
|
|
arc_change_state(arc_anon, hdr, hash_lock);
|
|
arc_hdr_destroy(hdr);
|
|
} else {
|
|
ASSERT(hdr->b_l1hdr.b_state != arc_l2c_only);
|
|
ARCSTAT_BUMP(arcstat_l2_evict_l1cached);
|
|
/*
|
|
* Invalidate issued or about to be issued
|
|
* reads, since we may be about to write
|
|
* over this location.
|
|
*/
|
|
if (HDR_L2_READING(hdr)) {
|
|
ARCSTAT_BUMP(arcstat_l2_evict_reading);
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_L2_EVICTED);
|
|
}
|
|
|
|
arc_hdr_l2hdr_destroy(hdr);
|
|
}
|
|
mutex_exit(hash_lock);
|
|
}
|
|
mutex_exit(&dev->l2ad_mtx);
|
|
}
|
|
|
|
/*
|
|
* Handle any abd transforms that might be required for writing to the L2ARC.
|
|
* If successful, this function will always return an abd with the data
|
|
* transformed as it is on disk in a new abd of asize bytes.
|
|
*/
|
|
static int
|
|
l2arc_apply_transforms(spa_t *spa, arc_buf_hdr_t *hdr, uint64_t asize,
|
|
abd_t **abd_out)
|
|
{
|
|
int ret;
|
|
void *tmp = NULL;
|
|
abd_t *cabd = NULL, *eabd = NULL, *to_write = hdr->b_l1hdr.b_pabd;
|
|
enum zio_compress compress = HDR_GET_COMPRESS(hdr);
|
|
uint64_t psize = HDR_GET_PSIZE(hdr);
|
|
uint64_t size = arc_hdr_size(hdr);
|
|
boolean_t ismd = HDR_ISTYPE_METADATA(hdr);
|
|
boolean_t bswap = (hdr->b_l1hdr.b_byteswap != DMU_BSWAP_NUMFUNCS);
|
|
dsl_crypto_key_t *dck = NULL;
|
|
uint8_t mac[ZIO_DATA_MAC_LEN] = { 0 };
|
|
boolean_t no_crypt = B_FALSE;
|
|
|
|
ASSERT((HDR_GET_COMPRESS(hdr) != ZIO_COMPRESS_OFF &&
|
|
!HDR_COMPRESSION_ENABLED(hdr)) ||
|
|
HDR_ENCRYPTED(hdr) || HDR_SHARED_DATA(hdr) || psize != asize);
|
|
ASSERT3U(psize, <=, asize);
|
|
|
|
/*
|
|
* If this data simply needs its own buffer, we simply allocate it
|
|
* and copy the data. This may be done to elimiate a depedency on a
|
|
* shared buffer or to reallocate the buffer to match asize.
|
|
*/
|
|
if (HDR_HAS_RABD(hdr) && asize != psize) {
|
|
ASSERT3U(size, ==, psize);
|
|
to_write = abd_alloc_for_io(asize, ismd);
|
|
abd_copy(to_write, hdr->b_crypt_hdr.b_rabd, size);
|
|
if (size != asize)
|
|
abd_zero_off(to_write, size, asize - size);
|
|
goto out;
|
|
}
|
|
|
|
if ((compress == ZIO_COMPRESS_OFF || HDR_COMPRESSION_ENABLED(hdr)) &&
|
|
!HDR_ENCRYPTED(hdr)) {
|
|
ASSERT3U(size, ==, psize);
|
|
to_write = abd_alloc_for_io(asize, ismd);
|
|
abd_copy(to_write, hdr->b_l1hdr.b_pabd, size);
|
|
if (size != asize)
|
|
abd_zero_off(to_write, size, asize - size);
|
|
goto out;
|
|
}
|
|
|
|
if (compress != ZIO_COMPRESS_OFF && !HDR_COMPRESSION_ENABLED(hdr)) {
|
|
cabd = abd_alloc_for_io(asize, ismd);
|
|
tmp = abd_borrow_buf(cabd, asize);
|
|
|
|
psize = zio_compress_data(compress, to_write, tmp, size);
|
|
ASSERT3U(psize, <=, HDR_GET_PSIZE(hdr));
|
|
if (psize < asize)
|
|
bzero((char *)tmp + psize, asize - psize);
|
|
psize = HDR_GET_PSIZE(hdr);
|
|
abd_return_buf_copy(cabd, tmp, asize);
|
|
to_write = cabd;
|
|
}
|
|
|
|
if (HDR_ENCRYPTED(hdr)) {
|
|
eabd = abd_alloc_for_io(asize, ismd);
|
|
|
|
/*
|
|
* If the dataset was disowned before the buffer
|
|
* made it to this point, the key to re-encrypt
|
|
* it won't be available. In this case we simply
|
|
* won't write the buffer to the L2ARC.
|
|
*/
|
|
ret = spa_keystore_lookup_key(spa, hdr->b_crypt_hdr.b_dsobj,
|
|
FTAG, &dck);
|
|
if (ret != 0)
|
|
goto error;
|
|
|
|
ret = zio_do_crypt_abd(B_TRUE, &dck->dck_key,
|
|
hdr->b_crypt_hdr.b_salt, hdr->b_crypt_hdr.b_ot,
|
|
hdr->b_crypt_hdr.b_iv, mac, psize, bswap, to_write,
|
|
eabd, &no_crypt);
|
|
if (ret != 0)
|
|
goto error;
|
|
|
|
if (no_crypt)
|
|
abd_copy(eabd, to_write, psize);
|
|
|
|
if (psize != asize)
|
|
abd_zero_off(eabd, psize, asize - psize);
|
|
|
|
/* assert that the MAC we got here matches the one we saved */
|
|
ASSERT0(bcmp(mac, hdr->b_crypt_hdr.b_mac, ZIO_DATA_MAC_LEN));
|
|
spa_keystore_dsl_key_rele(spa, dck, FTAG);
|
|
|
|
if (to_write == cabd)
|
|
abd_free(cabd);
|
|
|
|
to_write = eabd;
|
|
}
|
|
|
|
out:
|
|
ASSERT3P(to_write, !=, hdr->b_l1hdr.b_pabd);
|
|
*abd_out = to_write;
|
|
return (0);
|
|
|
|
error:
|
|
if (dck != NULL)
|
|
spa_keystore_dsl_key_rele(spa, dck, FTAG);
|
|
if (cabd != NULL)
|
|
abd_free(cabd);
|
|
if (eabd != NULL)
|
|
abd_free(eabd);
|
|
|
|
*abd_out = NULL;
|
|
return (ret);
|
|
}
|
|
|
|
/*
|
|
* Find and write ARC buffers to the L2ARC device.
|
|
*
|
|
* An ARC_FLAG_L2_WRITING flag is set so that the L2ARC buffers are not valid
|
|
* for reading until they have completed writing.
|
|
* The headroom_boost is an in-out parameter used to maintain headroom boost
|
|
* state between calls to this function.
|
|
*
|
|
* Returns the number of bytes actually written (which may be smaller than
|
|
* the delta by which the device hand has changed due to alignment).
|
|
*/
|
|
static uint64_t
|
|
l2arc_write_buffers(spa_t *spa, l2arc_dev_t *dev, uint64_t target_sz)
|
|
{
|
|
arc_buf_hdr_t *hdr, *hdr_prev, *head;
|
|
uint64_t write_asize, write_psize, write_lsize, headroom;
|
|
boolean_t full;
|
|
l2arc_write_callback_t *cb;
|
|
zio_t *pio, *wzio;
|
|
uint64_t guid = spa_load_guid(spa);
|
|
|
|
ASSERT3P(dev->l2ad_vdev, !=, NULL);
|
|
|
|
pio = NULL;
|
|
write_lsize = write_asize = write_psize = 0;
|
|
full = B_FALSE;
|
|
head = kmem_cache_alloc(hdr_l2only_cache, KM_PUSHPAGE);
|
|
arc_hdr_set_flags(head, ARC_FLAG_L2_WRITE_HEAD | ARC_FLAG_HAS_L2HDR);
|
|
|
|
/*
|
|
* Copy buffers for L2ARC writing.
|
|
*/
|
|
for (int try = 0; try < L2ARC_FEED_TYPES; try++) {
|
|
multilist_sublist_t *mls = l2arc_sublist_lock(try);
|
|
uint64_t passed_sz = 0;
|
|
|
|
VERIFY3P(mls, !=, NULL);
|
|
|
|
/*
|
|
* L2ARC fast warmup.
|
|
*
|
|
* Until the ARC is warm and starts to evict, read from the
|
|
* head of the ARC lists rather than the tail.
|
|
*/
|
|
if (arc_warm == B_FALSE)
|
|
hdr = multilist_sublist_head(mls);
|
|
else
|
|
hdr = multilist_sublist_tail(mls);
|
|
|
|
headroom = target_sz * l2arc_headroom;
|
|
if (zfs_compressed_arc_enabled)
|
|
headroom = (headroom * l2arc_headroom_boost) / 100;
|
|
|
|
for (; hdr; hdr = hdr_prev) {
|
|
kmutex_t *hash_lock;
|
|
abd_t *to_write = NULL;
|
|
|
|
if (arc_warm == B_FALSE)
|
|
hdr_prev = multilist_sublist_next(mls, hdr);
|
|
else
|
|
hdr_prev = multilist_sublist_prev(mls, hdr);
|
|
|
|
hash_lock = HDR_LOCK(hdr);
|
|
if (!mutex_tryenter(hash_lock)) {
|
|
/*
|
|
* Skip this buffer rather than waiting.
|
|
*/
|
|
continue;
|
|
}
|
|
|
|
passed_sz += HDR_GET_LSIZE(hdr);
|
|
if (passed_sz > headroom) {
|
|
/*
|
|
* Searched too far.
|
|
*/
|
|
mutex_exit(hash_lock);
|
|
break;
|
|
}
|
|
|
|
if (!l2arc_write_eligible(guid, hdr)) {
|
|
mutex_exit(hash_lock);
|
|
continue;
|
|
}
|
|
|
|
/*
|
|
* We rely on the L1 portion of the header below, so
|
|
* it's invalid for this header to have been evicted out
|
|
* of the ghost cache, prior to being written out. The
|
|
* ARC_FLAG_L2_WRITING bit ensures this won't happen.
|
|
*/
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
ASSERT3U(HDR_GET_PSIZE(hdr), >, 0);
|
|
ASSERT3U(arc_hdr_size(hdr), >, 0);
|
|
ASSERT(hdr->b_l1hdr.b_pabd != NULL ||
|
|
HDR_HAS_RABD(hdr));
|
|
uint64_t psize = HDR_GET_PSIZE(hdr);
|
|
uint64_t asize = vdev_psize_to_asize(dev->l2ad_vdev,
|
|
psize);
|
|
|
|
if ((write_asize + asize) > target_sz) {
|
|
full = B_TRUE;
|
|
mutex_exit(hash_lock);
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* We rely on the L1 portion of the header below, so
|
|
* it's invalid for this header to have been evicted out
|
|
* of the ghost cache, prior to being written out. The
|
|
* ARC_FLAG_L2_WRITING bit ensures this won't happen.
|
|
*/
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_L2_WRITING);
|
|
ASSERT(HDR_HAS_L1HDR(hdr));
|
|
|
|
ASSERT3U(HDR_GET_PSIZE(hdr), >, 0);
|
|
ASSERT(hdr->b_l1hdr.b_pabd != NULL ||
|
|
HDR_HAS_RABD(hdr));
|
|
ASSERT3U(arc_hdr_size(hdr), >, 0);
|
|
|
|
/*
|
|
* If this header has b_rabd, we can use this since it
|
|
* must always match the data exactly as it exists on
|
|
* disk. Otherwise, the L2ARC can normally use the
|
|
* hdr's data, but if we're sharing data between the
|
|
* hdr and one of its bufs, L2ARC needs its own copy of
|
|
* the data so that the ZIO below can't race with the
|
|
* buf consumer. To ensure that this copy will be
|
|
* available for the lifetime of the ZIO and be cleaned
|
|
* up afterwards, we add it to the l2arc_free_on_write
|
|
* queue. If we need to apply any transforms to the
|
|
* data (compression, encryption) we will also need the
|
|
* extra buffer.
|
|
*/
|
|
if (HDR_HAS_RABD(hdr) && psize == asize) {
|
|
to_write = hdr->b_crypt_hdr.b_rabd;
|
|
} else if ((HDR_COMPRESSION_ENABLED(hdr) ||
|
|
HDR_GET_COMPRESS(hdr) == ZIO_COMPRESS_OFF) &&
|
|
!HDR_ENCRYPTED(hdr) && !HDR_SHARED_DATA(hdr) &&
|
|
psize == asize) {
|
|
to_write = hdr->b_l1hdr.b_pabd;
|
|
} else {
|
|
int ret;
|
|
arc_buf_contents_t type = arc_buf_type(hdr);
|
|
|
|
ret = l2arc_apply_transforms(spa, hdr, asize,
|
|
&to_write);
|
|
if (ret != 0) {
|
|
arc_hdr_clear_flags(hdr,
|
|
ARC_FLAG_L2_WRITING);
|
|
mutex_exit(hash_lock);
|
|
continue;
|
|
}
|
|
|
|
l2arc_free_abd_on_write(to_write, asize, type);
|
|
}
|
|
|
|
if (pio == NULL) {
|
|
/*
|
|
* Insert a dummy header on the buflist so
|
|
* l2arc_write_done() can find where the
|
|
* write buffers begin without searching.
|
|
*/
|
|
mutex_enter(&dev->l2ad_mtx);
|
|
list_insert_head(&dev->l2ad_buflist, head);
|
|
mutex_exit(&dev->l2ad_mtx);
|
|
|
|
cb = kmem_alloc(
|
|
sizeof (l2arc_write_callback_t), KM_SLEEP);
|
|
cb->l2wcb_dev = dev;
|
|
cb->l2wcb_head = head;
|
|
pio = zio_root(spa, l2arc_write_done, cb,
|
|
ZIO_FLAG_CANFAIL);
|
|
}
|
|
|
|
hdr->b_l2hdr.b_dev = dev;
|
|
hdr->b_l2hdr.b_hits = 0;
|
|
|
|
hdr->b_l2hdr.b_daddr = dev->l2ad_hand;
|
|
arc_hdr_set_flags(hdr, ARC_FLAG_HAS_L2HDR);
|
|
|
|
mutex_enter(&dev->l2ad_mtx);
|
|
list_insert_head(&dev->l2ad_buflist, hdr);
|
|
mutex_exit(&dev->l2ad_mtx);
|
|
|
|
(void) refcount_add_many(&dev->l2ad_alloc,
|
|
arc_hdr_size(hdr), hdr);
|
|
|
|
wzio = zio_write_phys(pio, dev->l2ad_vdev,
|
|
hdr->b_l2hdr.b_daddr, asize, to_write,
|
|
ZIO_CHECKSUM_OFF, NULL, hdr,
|
|
ZIO_PRIORITY_ASYNC_WRITE,
|
|
ZIO_FLAG_CANFAIL, B_FALSE);
|
|
|
|
write_lsize += HDR_GET_LSIZE(hdr);
|
|
DTRACE_PROBE2(l2arc__write, vdev_t *, dev->l2ad_vdev,
|
|
zio_t *, wzio);
|
|
|
|
write_psize += psize;
|
|
write_asize += asize;
|
|
dev->l2ad_hand += asize;
|
|
|
|
mutex_exit(hash_lock);
|
|
|
|
(void) zio_nowait(wzio);
|
|
}
|
|
|
|
multilist_sublist_unlock(mls);
|
|
|
|
if (full == B_TRUE)
|
|
break;
|
|
}
|
|
|
|
/* No buffers selected for writing? */
|
|
if (pio == NULL) {
|
|
ASSERT0(write_lsize);
|
|
ASSERT(!HDR_HAS_L1HDR(head));
|
|
kmem_cache_free(hdr_l2only_cache, head);
|
|
return (0);
|
|
}
|
|
|
|
ASSERT3U(write_asize, <=, target_sz);
|
|
ARCSTAT_BUMP(arcstat_l2_writes_sent);
|
|
ARCSTAT_INCR(arcstat_l2_write_bytes, write_psize);
|
|
ARCSTAT_INCR(arcstat_l2_lsize, write_lsize);
|
|
ARCSTAT_INCR(arcstat_l2_psize, write_psize);
|
|
vdev_space_update(dev->l2ad_vdev, write_psize, 0, 0);
|
|
|
|
/*
|
|
* Bump device hand to the device start if it is approaching the end.
|
|
* l2arc_evict() will already have evicted ahead for this case.
|
|
*/
|
|
if (dev->l2ad_hand >= (dev->l2ad_end - target_sz)) {
|
|
dev->l2ad_hand = dev->l2ad_start;
|
|
dev->l2ad_first = B_FALSE;
|
|
}
|
|
|
|
dev->l2ad_writing = B_TRUE;
|
|
(void) zio_wait(pio);
|
|
dev->l2ad_writing = B_FALSE;
|
|
|
|
return (write_asize);
|
|
}
|
|
|
|
/*
|
|
* This thread feeds the L2ARC at regular intervals. This is the beating
|
|
* heart of the L2ARC.
|
|
*/
|
|
/* ARGSUSED */
|
|
static void
|
|
l2arc_feed_thread(void *unused)
|
|
{
|
|
callb_cpr_t cpr;
|
|
l2arc_dev_t *dev;
|
|
spa_t *spa;
|
|
uint64_t size, wrote;
|
|
clock_t begin, next = ddi_get_lbolt();
|
|
fstrans_cookie_t cookie;
|
|
|
|
CALLB_CPR_INIT(&cpr, &l2arc_feed_thr_lock, callb_generic_cpr, FTAG);
|
|
|
|
mutex_enter(&l2arc_feed_thr_lock);
|
|
|
|
cookie = spl_fstrans_mark();
|
|
while (l2arc_thread_exit == 0) {
|
|
CALLB_CPR_SAFE_BEGIN(&cpr);
|
|
(void) cv_timedwait_sig(&l2arc_feed_thr_cv,
|
|
&l2arc_feed_thr_lock, next);
|
|
CALLB_CPR_SAFE_END(&cpr, &l2arc_feed_thr_lock);
|
|
next = ddi_get_lbolt() + hz;
|
|
|
|
/*
|
|
* Quick check for L2ARC devices.
|
|
*/
|
|
mutex_enter(&l2arc_dev_mtx);
|
|
if (l2arc_ndev == 0) {
|
|
mutex_exit(&l2arc_dev_mtx);
|
|
continue;
|
|
}
|
|
mutex_exit(&l2arc_dev_mtx);
|
|
begin = ddi_get_lbolt();
|
|
|
|
/*
|
|
* This selects the next l2arc device to write to, and in
|
|
* doing so the next spa to feed from: dev->l2ad_spa. This
|
|
* will return NULL if there are now no l2arc devices or if
|
|
* they are all faulted.
|
|
*
|
|
* If a device is returned, its spa's config lock is also
|
|
* held to prevent device removal. l2arc_dev_get_next()
|
|
* will grab and release l2arc_dev_mtx.
|
|
*/
|
|
if ((dev = l2arc_dev_get_next()) == NULL)
|
|
continue;
|
|
|
|
spa = dev->l2ad_spa;
|
|
ASSERT3P(spa, !=, NULL);
|
|
|
|
/*
|
|
* If the pool is read-only then force the feed thread to
|
|
* sleep a little longer.
|
|
*/
|
|
if (!spa_writeable(spa)) {
|
|
next = ddi_get_lbolt() + 5 * l2arc_feed_secs * hz;
|
|
spa_config_exit(spa, SCL_L2ARC, dev);
|
|
continue;
|
|
}
|
|
|
|
/*
|
|
* Avoid contributing to memory pressure.
|
|
*/
|
|
if (arc_reclaim_needed()) {
|
|
ARCSTAT_BUMP(arcstat_l2_abort_lowmem);
|
|
spa_config_exit(spa, SCL_L2ARC, dev);
|
|
continue;
|
|
}
|
|
|
|
ARCSTAT_BUMP(arcstat_l2_feeds);
|
|
|
|
size = l2arc_write_size();
|
|
|
|
/*
|
|
* Evict L2ARC buffers that will be overwritten.
|
|
*/
|
|
l2arc_evict(dev, size, B_FALSE);
|
|
|
|
/*
|
|
* Write ARC buffers.
|
|
*/
|
|
wrote = l2arc_write_buffers(spa, dev, size);
|
|
|
|
/*
|
|
* Calculate interval between writes.
|
|
*/
|
|
next = l2arc_write_interval(begin, size, wrote);
|
|
spa_config_exit(spa, SCL_L2ARC, dev);
|
|
}
|
|
spl_fstrans_unmark(cookie);
|
|
|
|
l2arc_thread_exit = 0;
|
|
cv_broadcast(&l2arc_feed_thr_cv);
|
|
CALLB_CPR_EXIT(&cpr); /* drops l2arc_feed_thr_lock */
|
|
thread_exit();
|
|
}
|
|
|
|
boolean_t
|
|
l2arc_vdev_present(vdev_t *vd)
|
|
{
|
|
l2arc_dev_t *dev;
|
|
|
|
mutex_enter(&l2arc_dev_mtx);
|
|
for (dev = list_head(l2arc_dev_list); dev != NULL;
|
|
dev = list_next(l2arc_dev_list, dev)) {
|
|
if (dev->l2ad_vdev == vd)
|
|
break;
|
|
}
|
|
mutex_exit(&l2arc_dev_mtx);
|
|
|
|
return (dev != NULL);
|
|
}
|
|
|
|
/*
|
|
* Add a vdev for use by the L2ARC. By this point the spa has already
|
|
* validated the vdev and opened it.
|
|
*/
|
|
void
|
|
l2arc_add_vdev(spa_t *spa, vdev_t *vd)
|
|
{
|
|
l2arc_dev_t *adddev;
|
|
|
|
ASSERT(!l2arc_vdev_present(vd));
|
|
|
|
/*
|
|
* Create a new l2arc device entry.
|
|
*/
|
|
adddev = kmem_zalloc(sizeof (l2arc_dev_t), KM_SLEEP);
|
|
adddev->l2ad_spa = spa;
|
|
adddev->l2ad_vdev = vd;
|
|
adddev->l2ad_start = VDEV_LABEL_START_SIZE;
|
|
adddev->l2ad_end = VDEV_LABEL_START_SIZE + vdev_get_min_asize(vd);
|
|
adddev->l2ad_hand = adddev->l2ad_start;
|
|
adddev->l2ad_first = B_TRUE;
|
|
adddev->l2ad_writing = B_FALSE;
|
|
list_link_init(&adddev->l2ad_node);
|
|
|
|
mutex_init(&adddev->l2ad_mtx, NULL, MUTEX_DEFAULT, NULL);
|
|
/*
|
|
* This is a list of all ARC buffers that are still valid on the
|
|
* device.
|
|
*/
|
|
list_create(&adddev->l2ad_buflist, sizeof (arc_buf_hdr_t),
|
|
offsetof(arc_buf_hdr_t, b_l2hdr.b_l2node));
|
|
|
|
vdev_space_update(vd, 0, 0, adddev->l2ad_end - adddev->l2ad_hand);
|
|
refcount_create(&adddev->l2ad_alloc);
|
|
|
|
/*
|
|
* Add device to global list
|
|
*/
|
|
mutex_enter(&l2arc_dev_mtx);
|
|
list_insert_head(l2arc_dev_list, adddev);
|
|
atomic_inc_64(&l2arc_ndev);
|
|
mutex_exit(&l2arc_dev_mtx);
|
|
}
|
|
|
|
/*
|
|
* Remove a vdev from the L2ARC.
|
|
*/
|
|
void
|
|
l2arc_remove_vdev(vdev_t *vd)
|
|
{
|
|
l2arc_dev_t *dev, *nextdev, *remdev = NULL;
|
|
|
|
/*
|
|
* Find the device by vdev
|
|
*/
|
|
mutex_enter(&l2arc_dev_mtx);
|
|
for (dev = list_head(l2arc_dev_list); dev; dev = nextdev) {
|
|
nextdev = list_next(l2arc_dev_list, dev);
|
|
if (vd == dev->l2ad_vdev) {
|
|
remdev = dev;
|
|
break;
|
|
}
|
|
}
|
|
ASSERT3P(remdev, !=, NULL);
|
|
|
|
/*
|
|
* Remove device from global list
|
|
*/
|
|
list_remove(l2arc_dev_list, remdev);
|
|
l2arc_dev_last = NULL; /* may have been invalidated */
|
|
atomic_dec_64(&l2arc_ndev);
|
|
mutex_exit(&l2arc_dev_mtx);
|
|
|
|
/*
|
|
* Clear all buflists and ARC references. L2ARC device flush.
|
|
*/
|
|
l2arc_evict(remdev, 0, B_TRUE);
|
|
list_destroy(&remdev->l2ad_buflist);
|
|
mutex_destroy(&remdev->l2ad_mtx);
|
|
refcount_destroy(&remdev->l2ad_alloc);
|
|
kmem_free(remdev, sizeof (l2arc_dev_t));
|
|
}
|
|
|
|
void
|
|
l2arc_init(void)
|
|
{
|
|
l2arc_thread_exit = 0;
|
|
l2arc_ndev = 0;
|
|
l2arc_writes_sent = 0;
|
|
l2arc_writes_done = 0;
|
|
|
|
mutex_init(&l2arc_feed_thr_lock, NULL, MUTEX_DEFAULT, NULL);
|
|
cv_init(&l2arc_feed_thr_cv, NULL, CV_DEFAULT, NULL);
|
|
mutex_init(&l2arc_dev_mtx, NULL, MUTEX_DEFAULT, NULL);
|
|
mutex_init(&l2arc_free_on_write_mtx, NULL, MUTEX_DEFAULT, NULL);
|
|
|
|
l2arc_dev_list = &L2ARC_dev_list;
|
|
l2arc_free_on_write = &L2ARC_free_on_write;
|
|
list_create(l2arc_dev_list, sizeof (l2arc_dev_t),
|
|
offsetof(l2arc_dev_t, l2ad_node));
|
|
list_create(l2arc_free_on_write, sizeof (l2arc_data_free_t),
|
|
offsetof(l2arc_data_free_t, l2df_list_node));
|
|
}
|
|
|
|
void
|
|
l2arc_fini(void)
|
|
{
|
|
/*
|
|
* This is called from dmu_fini(), which is called from spa_fini();
|
|
* Because of this, we can assume that all l2arc devices have
|
|
* already been removed when the pools themselves were removed.
|
|
*/
|
|
|
|
l2arc_do_free_on_write();
|
|
|
|
mutex_destroy(&l2arc_feed_thr_lock);
|
|
cv_destroy(&l2arc_feed_thr_cv);
|
|
mutex_destroy(&l2arc_dev_mtx);
|
|
mutex_destroy(&l2arc_free_on_write_mtx);
|
|
|
|
list_destroy(l2arc_dev_list);
|
|
list_destroy(l2arc_free_on_write);
|
|
}
|
|
|
|
void
|
|
l2arc_start(void)
|
|
{
|
|
if (!(spa_mode_global & FWRITE))
|
|
return;
|
|
|
|
(void) thread_create(NULL, 0, l2arc_feed_thread, NULL, 0, &p0,
|
|
TS_RUN, defclsyspri);
|
|
}
|
|
|
|
void
|
|
l2arc_stop(void)
|
|
{
|
|
if (!(spa_mode_global & FWRITE))
|
|
return;
|
|
|
|
mutex_enter(&l2arc_feed_thr_lock);
|
|
cv_signal(&l2arc_feed_thr_cv); /* kick thread out of startup */
|
|
l2arc_thread_exit = 1;
|
|
while (l2arc_thread_exit != 0)
|
|
cv_wait(&l2arc_feed_thr_cv, &l2arc_feed_thr_lock);
|
|
mutex_exit(&l2arc_feed_thr_lock);
|
|
}
|
|
|
|
#if defined(_KERNEL) && defined(HAVE_SPL)
|
|
EXPORT_SYMBOL(arc_buf_size);
|
|
EXPORT_SYMBOL(arc_write);
|
|
EXPORT_SYMBOL(arc_read);
|
|
EXPORT_SYMBOL(arc_buf_info);
|
|
EXPORT_SYMBOL(arc_getbuf_func);
|
|
EXPORT_SYMBOL(arc_add_prune_callback);
|
|
EXPORT_SYMBOL(arc_remove_prune_callback);
|
|
|
|
/* BEGIN CSTYLED */
|
|
module_param(zfs_arc_min, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_min, "Min arc size");
|
|
|
|
module_param(zfs_arc_max, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_max, "Max arc size");
|
|
|
|
module_param(zfs_arc_meta_limit, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_meta_limit, "Meta limit for arc size");
|
|
|
|
module_param(zfs_arc_meta_limit_percent, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_meta_limit_percent,
|
|
"Percent of arc size for arc meta limit");
|
|
|
|
module_param(zfs_arc_meta_min, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_meta_min, "Min arc metadata");
|
|
|
|
module_param(zfs_arc_meta_prune, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_meta_prune, "Meta objects to scan for prune");
|
|
|
|
module_param(zfs_arc_meta_adjust_restarts, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_meta_adjust_restarts,
|
|
"Limit number of restarts in arc_adjust_meta");
|
|
|
|
module_param(zfs_arc_meta_strategy, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_meta_strategy, "Meta reclaim strategy");
|
|
|
|
module_param(zfs_arc_grow_retry, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_grow_retry, "Seconds before growing arc size");
|
|
|
|
module_param(zfs_arc_p_dampener_disable, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_p_dampener_disable, "disable arc_p adapt dampener");
|
|
|
|
module_param(zfs_arc_shrink_shift, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_shrink_shift, "log2(fraction of arc to reclaim)");
|
|
|
|
module_param(zfs_arc_pc_percent, uint, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_pc_percent,
|
|
"Percent of pagecache to reclaim arc to");
|
|
|
|
module_param(zfs_arc_p_min_shift, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_p_min_shift, "arc_c shift to calc min/max arc_p");
|
|
|
|
module_param(zfs_arc_average_blocksize, int, 0444);
|
|
MODULE_PARM_DESC(zfs_arc_average_blocksize, "Target average block size");
|
|
|
|
module_param(zfs_compressed_arc_enabled, int, 0644);
|
|
MODULE_PARM_DESC(zfs_compressed_arc_enabled, "Disable compressed arc buffers");
|
|
|
|
module_param(zfs_arc_min_prefetch_ms, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_min_prefetch_ms, "Min life of prefetch block in ms");
|
|
|
|
module_param(zfs_arc_min_prescient_prefetch_ms, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_min_prescient_prefetch_ms,
|
|
"Min life of prescient prefetched block in ms");
|
|
|
|
module_param(l2arc_write_max, ulong, 0644);
|
|
MODULE_PARM_DESC(l2arc_write_max, "Max write bytes per interval");
|
|
|
|
module_param(l2arc_write_boost, ulong, 0644);
|
|
MODULE_PARM_DESC(l2arc_write_boost, "Extra write bytes during device warmup");
|
|
|
|
module_param(l2arc_headroom, ulong, 0644);
|
|
MODULE_PARM_DESC(l2arc_headroom, "Number of max device writes to precache");
|
|
|
|
module_param(l2arc_headroom_boost, ulong, 0644);
|
|
MODULE_PARM_DESC(l2arc_headroom_boost, "Compressed l2arc_headroom multiplier");
|
|
|
|
module_param(l2arc_feed_secs, ulong, 0644);
|
|
MODULE_PARM_DESC(l2arc_feed_secs, "Seconds between L2ARC writing");
|
|
|
|
module_param(l2arc_feed_min_ms, ulong, 0644);
|
|
MODULE_PARM_DESC(l2arc_feed_min_ms, "Min feed interval in milliseconds");
|
|
|
|
module_param(l2arc_noprefetch, int, 0644);
|
|
MODULE_PARM_DESC(l2arc_noprefetch, "Skip caching prefetched buffers");
|
|
|
|
module_param(l2arc_feed_again, int, 0644);
|
|
MODULE_PARM_DESC(l2arc_feed_again, "Turbo L2ARC warmup");
|
|
|
|
module_param(l2arc_norw, int, 0644);
|
|
MODULE_PARM_DESC(l2arc_norw, "No reads during writes");
|
|
|
|
module_param(zfs_arc_lotsfree_percent, int, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_lotsfree_percent,
|
|
"System free memory I/O throttle in bytes");
|
|
|
|
module_param(zfs_arc_sys_free, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_sys_free, "System free memory target size in bytes");
|
|
|
|
module_param(zfs_arc_dnode_limit, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_dnode_limit, "Minimum bytes of dnodes in arc");
|
|
|
|
module_param(zfs_arc_dnode_limit_percent, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_dnode_limit_percent,
|
|
"Percent of ARC meta buffers for dnodes");
|
|
|
|
module_param(zfs_arc_dnode_reduce_percent, ulong, 0644);
|
|
MODULE_PARM_DESC(zfs_arc_dnode_reduce_percent,
|
|
"Percentage of excess dnodes to try to unpin");
|
|
/* END CSTYLED */
|
|
#endif
|