mirror of
https://git.proxmox.com/git/mirror_zfs.git
synced 2024-11-17 18:11:00 +03:00
6cb8e5306d
Some work has been done lately to improve the debugability of the ZFS pool load (and import) process. This includes: 7638 Refactor spa_load_impl into several functions 8961 SPA load/import should tell us why it failed 7277 zdb should be able to print zfs_dbgmsg's To iterate on top of that, there's a few changes that were made to make the import process more resilient and crash free. One of the first tasks during the pool load process is to parse a config provided from userland that describes what devices the pool is composed of. A vdev tree is generated from that config, and then all the vdevs are opened. The Meta Object Set (MOS) of the pool is accessed, and several metadata objects that are necessary to load the pool are read. The exact configuration of the pool is also stored inside the MOS. Since the configuration provided from userland is external and might not accurately describe the vdev tree of the pool at the txg that is being loaded, it cannot be relied upon to safely operate the pool. For that reason, the configuration in the MOS is read early on. In the past, the two configurations were compared together and if there was a mismatch then the load process was aborted and an error was returned. The latter was a good way to ensure a pool does not get corrupted, however it made the pool load process needlessly fragile in cases where the vdev configuration changed or the userland configuration was outdated. Since the MOS is stored in 3 copies, the configuration provided by userland doesn't have to be perfect in order to read its contents. Hence, a new approach has been adopted: The pool is first opened with the untrusted userland configuration just so that the real configuration can be read from the MOS. The trusted MOS configuration is then used to generate a new vdev tree and the pool is re-opened. When the pool is opened with an untrusted configuration, writes are disabled to avoid accidentally damaging it. During reads, some sanity checks are performed on block pointers to see if each DVA points to a known vdev; when the configuration is untrusted, instead of panicking the system if those checks fail we simply avoid issuing reads to the invalid DVAs. This new two-step pool load process now allows rewinding pools accross vdev tree changes such as device replacement, addition, etc. Loading a pool from an external config file in a clustering environment also becomes much safer now since the pool will import even if the config is outdated and didn't, for instance, register a recent device addition. With this code in place, it became relatively easy to implement a long-sought-after feature: the ability to import a pool with missing top level (i.e. non-redundant) devices. Note that since this almost guarantees some loss of data, this feature is for now restricted to a read-only import. Porting notes (ZTS): * Fix 'make dist' target in zpool_import * The maximum path length allowed by tar is 99 characters. Several of the new test cases exceeded this limit resulting in them not being included in the tarball. Shorten the names slightly. * Set/get tunables using accessor functions. * Get last synced txg via the "zfs_txg_history" mechanism. * Clear zinject handlers in cleanup for import_cache_device_replaced and import_rewind_device_replaced in order that the zpool can be exported if there is an error. * Increase FILESIZE to 8G in zfs-test.sh to allow for a larger ext4 file system to be created on ZFS_DISK2. Also, there's no need to partition ZFS_DISK2 at all. The partitioning had already been disabled for multipath devices. Among other things, the partitioning steals some space from the ext4 file system, makes it difficult to accurately calculate the paramters to parted and can make some of the tests fail. * Increase FS_SIZE and FILE_SIZE in the zpool_import test configuration now that FILESIZE is larger. * Write more data in order that device evacuation take lonnger in a couple tests. * Use mkdir -p to avoid errors when the directory already exists. * Remove use of sudo in import_rewind_config_changed. Authored by: Pavel Zakharov <pavel.zakharov@delphix.com> Reviewed by: George Wilson <george.wilson@delphix.com> Reviewed by: Matthew Ahrens <mahrens@delphix.com> Reviewed by: Andrew Stormont <andyjstormont@gmail.com> Approved by: Hans Rosenfeld <rosenfeld@grumpf.hope-2000.org> Ported-by: Tim Chase <tim@chase2k.com> Signed-off-by: Tim Chase <tim@chase2k.com> OpenZFS-issue: https://illumos.org/issues/9075 OpenZFS-commit: https://github.com/openzfs/openzfs/commit/619c0123 Closes #7459
1227 lines
24 KiB
C
1227 lines
24 KiB
C
/*
|
|
* CDDL HEADER START
|
|
*
|
|
* The contents of this file are subject to the terms of the
|
|
* Common Development and Distribution License (the "License").
|
|
* You may not use this file except in compliance with the License.
|
|
*
|
|
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
|
* or http://www.opensolaris.org/os/licensing.
|
|
* See the License for the specific language governing permissions
|
|
* and limitations under the License.
|
|
*
|
|
* When distributing Covered Code, include this CDDL HEADER in each
|
|
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
|
* If applicable, add the following below this CDDL HEADER, with the
|
|
* fields enclosed by brackets "[]" replaced with your own identifying
|
|
* information: Portions Copyright [yyyy] [name of copyright owner]
|
|
*
|
|
* CDDL HEADER END
|
|
*/
|
|
/*
|
|
* Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
|
|
* Copyright (c) 2016 Actifio, Inc. All rights reserved.
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <fcntl.h>
|
|
#include <poll.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <zlib.h>
|
|
#include <libgen.h>
|
|
#include <sys/signal.h>
|
|
#include <sys/spa.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/processor.h>
|
|
#include <sys/zfs_context.h>
|
|
#include <sys/rrwlock.h>
|
|
#include <sys/utsname.h>
|
|
#include <sys/time.h>
|
|
#include <sys/systeminfo.h>
|
|
#include <zfs_fletcher.h>
|
|
#include <sys/crypto/icp.h>
|
|
|
|
/*
|
|
* Emulation of kernel services in userland.
|
|
*/
|
|
|
|
int aok;
|
|
uint64_t physmem;
|
|
vnode_t *rootdir = (vnode_t *)0xabcd1234;
|
|
char hw_serial[HW_HOSTID_LEN];
|
|
struct utsname hw_utsname;
|
|
vmem_t *zio_arena = NULL;
|
|
|
|
/* If set, all blocks read will be copied to the specified directory. */
|
|
char *vn_dumpdir = NULL;
|
|
|
|
/* this only exists to have its address taken */
|
|
struct proc p0;
|
|
|
|
/*
|
|
* =========================================================================
|
|
* threads
|
|
* =========================================================================
|
|
*
|
|
* TS_STACK_MIN is dictated by the minimum allowed pthread stack size. While
|
|
* TS_STACK_MAX is somewhat arbitrary, it was selected to be large enough for
|
|
* the expected stack depth while small enough to avoid exhausting address
|
|
* space with high thread counts.
|
|
*/
|
|
#define TS_STACK_MIN MAX(PTHREAD_STACK_MIN, 32768)
|
|
#define TS_STACK_MAX (256 * 1024)
|
|
|
|
/*ARGSUSED*/
|
|
kthread_t *
|
|
zk_thread_create(void (*func)(void *), void *arg, size_t stksize, int state)
|
|
{
|
|
pthread_attr_t attr;
|
|
pthread_t tid;
|
|
char *stkstr;
|
|
int detachstate = PTHREAD_CREATE_DETACHED;
|
|
|
|
VERIFY0(pthread_attr_init(&attr));
|
|
|
|
if (state & TS_JOINABLE)
|
|
detachstate = PTHREAD_CREATE_JOINABLE;
|
|
|
|
VERIFY0(pthread_attr_setdetachstate(&attr, detachstate));
|
|
|
|
/*
|
|
* We allow the default stack size in user space to be specified by
|
|
* setting the ZFS_STACK_SIZE environment variable. This allows us
|
|
* the convenience of observing and debugging stack overruns in
|
|
* user space. Explicitly specified stack sizes will be honored.
|
|
* The usage of ZFS_STACK_SIZE is discussed further in the
|
|
* ENVIRONMENT VARIABLES sections of the ztest(1) man page.
|
|
*/
|
|
if (stksize == 0) {
|
|
stkstr = getenv("ZFS_STACK_SIZE");
|
|
|
|
if (stkstr == NULL)
|
|
stksize = TS_STACK_MAX;
|
|
else
|
|
stksize = MAX(atoi(stkstr), TS_STACK_MIN);
|
|
}
|
|
|
|
VERIFY3S(stksize, >, 0);
|
|
stksize = P2ROUNDUP(MAX(stksize, TS_STACK_MIN), PAGESIZE);
|
|
|
|
/*
|
|
* If this ever fails, it may be because the stack size is not a
|
|
* multiple of system page size.
|
|
*/
|
|
VERIFY0(pthread_attr_setstacksize(&attr, stksize));
|
|
VERIFY0(pthread_attr_setguardsize(&attr, PAGESIZE));
|
|
|
|
VERIFY0(pthread_create(&tid, &attr, (void *(*)(void *))func, arg));
|
|
VERIFY0(pthread_attr_destroy(&attr));
|
|
|
|
return ((void *)(uintptr_t)tid);
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* kstats
|
|
* =========================================================================
|
|
*/
|
|
/*ARGSUSED*/
|
|
kstat_t *
|
|
kstat_create(const char *module, int instance, const char *name,
|
|
const char *class, uchar_t type, ulong_t ndata, uchar_t ks_flag)
|
|
{
|
|
return (NULL);
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
void
|
|
kstat_install(kstat_t *ksp)
|
|
{}
|
|
|
|
/*ARGSUSED*/
|
|
void
|
|
kstat_delete(kstat_t *ksp)
|
|
{}
|
|
|
|
/*ARGSUSED*/
|
|
void
|
|
kstat_waitq_enter(kstat_io_t *kiop)
|
|
{}
|
|
|
|
/*ARGSUSED*/
|
|
void
|
|
kstat_waitq_exit(kstat_io_t *kiop)
|
|
{}
|
|
|
|
/*ARGSUSED*/
|
|
void
|
|
kstat_runq_enter(kstat_io_t *kiop)
|
|
{}
|
|
|
|
/*ARGSUSED*/
|
|
void
|
|
kstat_runq_exit(kstat_io_t *kiop)
|
|
{}
|
|
|
|
/*ARGSUSED*/
|
|
void
|
|
kstat_waitq_to_runq(kstat_io_t *kiop)
|
|
{}
|
|
|
|
/*ARGSUSED*/
|
|
void
|
|
kstat_runq_back_to_waitq(kstat_io_t *kiop)
|
|
{}
|
|
|
|
void
|
|
kstat_set_raw_ops(kstat_t *ksp,
|
|
int (*headers)(char *buf, size_t size),
|
|
int (*data)(char *buf, size_t size, void *data),
|
|
void *(*addr)(kstat_t *ksp, loff_t index))
|
|
{}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* mutexes
|
|
* =========================================================================
|
|
*/
|
|
|
|
void
|
|
mutex_init(kmutex_t *mp, char *name, int type, void *cookie)
|
|
{
|
|
VERIFY0(pthread_mutex_init(&mp->m_lock, NULL));
|
|
memset(&mp->m_owner, 0, sizeof (pthread_t));
|
|
}
|
|
|
|
void
|
|
mutex_destroy(kmutex_t *mp)
|
|
{
|
|
VERIFY0(pthread_mutex_destroy(&mp->m_lock));
|
|
}
|
|
|
|
void
|
|
mutex_enter(kmutex_t *mp)
|
|
{
|
|
VERIFY0(pthread_mutex_lock(&mp->m_lock));
|
|
mp->m_owner = pthread_self();
|
|
}
|
|
|
|
int
|
|
mutex_tryenter(kmutex_t *mp)
|
|
{
|
|
int error;
|
|
|
|
error = pthread_mutex_trylock(&mp->m_lock);
|
|
if (error == 0) {
|
|
mp->m_owner = pthread_self();
|
|
return (1);
|
|
} else {
|
|
VERIFY3S(error, ==, EBUSY);
|
|
return (0);
|
|
}
|
|
}
|
|
|
|
void
|
|
mutex_exit(kmutex_t *mp)
|
|
{
|
|
memset(&mp->m_owner, 0, sizeof (pthread_t));
|
|
VERIFY0(pthread_mutex_unlock(&mp->m_lock));
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* rwlocks
|
|
* =========================================================================
|
|
*/
|
|
|
|
void
|
|
rw_init(krwlock_t *rwlp, char *name, int type, void *arg)
|
|
{
|
|
VERIFY0(pthread_rwlock_init(&rwlp->rw_lock, NULL));
|
|
rwlp->rw_readers = 0;
|
|
rwlp->rw_owner = 0;
|
|
}
|
|
|
|
void
|
|
rw_destroy(krwlock_t *rwlp)
|
|
{
|
|
VERIFY0(pthread_rwlock_destroy(&rwlp->rw_lock));
|
|
}
|
|
|
|
void
|
|
rw_enter(krwlock_t *rwlp, krw_t rw)
|
|
{
|
|
if (rw == RW_READER) {
|
|
VERIFY0(pthread_rwlock_rdlock(&rwlp->rw_lock));
|
|
atomic_inc_uint(&rwlp->rw_readers);
|
|
} else {
|
|
VERIFY0(pthread_rwlock_wrlock(&rwlp->rw_lock));
|
|
rwlp->rw_owner = pthread_self();
|
|
}
|
|
}
|
|
|
|
void
|
|
rw_exit(krwlock_t *rwlp)
|
|
{
|
|
if (RW_READ_HELD(rwlp))
|
|
atomic_dec_uint(&rwlp->rw_readers);
|
|
else
|
|
rwlp->rw_owner = 0;
|
|
|
|
VERIFY0(pthread_rwlock_unlock(&rwlp->rw_lock));
|
|
}
|
|
|
|
int
|
|
rw_tryenter(krwlock_t *rwlp, krw_t rw)
|
|
{
|
|
int error;
|
|
|
|
if (rw == RW_READER)
|
|
error = pthread_rwlock_tryrdlock(&rwlp->rw_lock);
|
|
else
|
|
error = pthread_rwlock_trywrlock(&rwlp->rw_lock);
|
|
|
|
if (error == 0) {
|
|
if (rw == RW_READER)
|
|
atomic_inc_uint(&rwlp->rw_readers);
|
|
else
|
|
rwlp->rw_owner = pthread_self();
|
|
|
|
return (1);
|
|
}
|
|
|
|
VERIFY3S(error, ==, EBUSY);
|
|
|
|
return (0);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
uint32_t
|
|
zone_get_hostid(void *zonep)
|
|
{
|
|
/*
|
|
* We're emulating the system's hostid in userland.
|
|
*/
|
|
return (strtoul(hw_serial, NULL, 10));
|
|
}
|
|
|
|
int
|
|
rw_tryupgrade(krwlock_t *rwlp)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* condition variables
|
|
* =========================================================================
|
|
*/
|
|
|
|
void
|
|
cv_init(kcondvar_t *cv, char *name, int type, void *arg)
|
|
{
|
|
VERIFY0(pthread_cond_init(cv, NULL));
|
|
}
|
|
|
|
void
|
|
cv_destroy(kcondvar_t *cv)
|
|
{
|
|
VERIFY0(pthread_cond_destroy(cv));
|
|
}
|
|
|
|
void
|
|
cv_wait(kcondvar_t *cv, kmutex_t *mp)
|
|
{
|
|
memset(&mp->m_owner, 0, sizeof (pthread_t));
|
|
VERIFY0(pthread_cond_wait(cv, &mp->m_lock));
|
|
mp->m_owner = pthread_self();
|
|
}
|
|
|
|
clock_t
|
|
cv_timedwait(kcondvar_t *cv, kmutex_t *mp, clock_t abstime)
|
|
{
|
|
int error;
|
|
struct timeval tv;
|
|
timestruc_t ts;
|
|
clock_t delta;
|
|
|
|
delta = abstime - ddi_get_lbolt();
|
|
if (delta <= 0)
|
|
return (-1);
|
|
|
|
VERIFY(gettimeofday(&tv, NULL) == 0);
|
|
|
|
ts.tv_sec = tv.tv_sec + delta / hz;
|
|
ts.tv_nsec = tv.tv_usec * NSEC_PER_USEC + (delta % hz) * (NANOSEC / hz);
|
|
if (ts.tv_nsec >= NANOSEC) {
|
|
ts.tv_sec++;
|
|
ts.tv_nsec -= NANOSEC;
|
|
}
|
|
|
|
memset(&mp->m_owner, 0, sizeof (pthread_t));
|
|
error = pthread_cond_timedwait(cv, &mp->m_lock, &ts);
|
|
mp->m_owner = pthread_self();
|
|
|
|
if (error == ETIMEDOUT)
|
|
return (-1);
|
|
|
|
VERIFY0(error);
|
|
|
|
return (1);
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
clock_t
|
|
cv_timedwait_hires(kcondvar_t *cv, kmutex_t *mp, hrtime_t tim, hrtime_t res,
|
|
int flag)
|
|
{
|
|
int error;
|
|
struct timeval tv;
|
|
timestruc_t ts;
|
|
hrtime_t delta;
|
|
|
|
ASSERT(flag == 0 || flag == CALLOUT_FLAG_ABSOLUTE);
|
|
|
|
delta = tim;
|
|
if (flag & CALLOUT_FLAG_ABSOLUTE)
|
|
delta -= gethrtime();
|
|
|
|
if (delta <= 0)
|
|
return (-1);
|
|
|
|
VERIFY0(gettimeofday(&tv, NULL));
|
|
|
|
ts.tv_sec = tv.tv_sec + delta / NANOSEC;
|
|
ts.tv_nsec = tv.tv_usec * NSEC_PER_USEC + (delta % NANOSEC);
|
|
if (ts.tv_nsec >= NANOSEC) {
|
|
ts.tv_sec++;
|
|
ts.tv_nsec -= NANOSEC;
|
|
}
|
|
|
|
memset(&mp->m_owner, 0, sizeof (pthread_t));
|
|
error = pthread_cond_timedwait(cv, &mp->m_lock, &ts);
|
|
mp->m_owner = pthread_self();
|
|
|
|
if (error == ETIMEDOUT)
|
|
return (-1);
|
|
|
|
VERIFY0(error);
|
|
|
|
return (1);
|
|
}
|
|
|
|
void
|
|
cv_signal(kcondvar_t *cv)
|
|
{
|
|
VERIFY0(pthread_cond_signal(cv));
|
|
}
|
|
|
|
void
|
|
cv_broadcast(kcondvar_t *cv)
|
|
{
|
|
VERIFY0(pthread_cond_broadcast(cv));
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* vnode operations
|
|
* =========================================================================
|
|
*/
|
|
/*
|
|
* Note: for the xxxat() versions of these functions, we assume that the
|
|
* starting vp is always rootdir (which is true for spa_directory.c, the only
|
|
* ZFS consumer of these interfaces). We assert this is true, and then emulate
|
|
* them by adding '/' in front of the path.
|
|
*/
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
vn_open(char *path, int x1, int flags, int mode, vnode_t **vpp, int x2, int x3)
|
|
{
|
|
int fd = -1;
|
|
int dump_fd = -1;
|
|
vnode_t *vp;
|
|
int old_umask = 0;
|
|
char *realpath;
|
|
struct stat64 st;
|
|
int err;
|
|
|
|
realpath = umem_alloc(MAXPATHLEN, UMEM_NOFAIL);
|
|
|
|
/*
|
|
* If we're accessing a real disk from userland, we need to use
|
|
* the character interface to avoid caching. This is particularly
|
|
* important if we're trying to look at a real in-kernel storage
|
|
* pool from userland, e.g. via zdb, because otherwise we won't
|
|
* see the changes occurring under the segmap cache.
|
|
* On the other hand, the stupid character device returns zero
|
|
* for its size. So -- gag -- we open the block device to get
|
|
* its size, and remember it for subsequent VOP_GETATTR().
|
|
*/
|
|
#if defined(__sun__) || defined(__sun)
|
|
if (strncmp(path, "/dev/", 5) == 0) {
|
|
#else
|
|
if (0) {
|
|
#endif
|
|
char *dsk;
|
|
fd = open64(path, O_RDONLY);
|
|
if (fd == -1) {
|
|
err = errno;
|
|
free(realpath);
|
|
return (err);
|
|
}
|
|
if (fstat64(fd, &st) == -1) {
|
|
err = errno;
|
|
close(fd);
|
|
free(realpath);
|
|
return (err);
|
|
}
|
|
close(fd);
|
|
(void) sprintf(realpath, "%s", path);
|
|
dsk = strstr(path, "/dsk/");
|
|
if (dsk != NULL)
|
|
(void) sprintf(realpath + (dsk - path) + 1, "r%s",
|
|
dsk + 1);
|
|
} else {
|
|
(void) sprintf(realpath, "%s", path);
|
|
if (!(flags & FCREAT) && stat64(realpath, &st) == -1) {
|
|
err = errno;
|
|
free(realpath);
|
|
return (err);
|
|
}
|
|
}
|
|
|
|
if (!(flags & FCREAT) && S_ISBLK(st.st_mode)) {
|
|
#ifdef __linux__
|
|
flags |= O_DIRECT;
|
|
#endif
|
|
/* We shouldn't be writing to block devices in userspace */
|
|
VERIFY(!(flags & FWRITE));
|
|
}
|
|
|
|
if (flags & FCREAT)
|
|
old_umask = umask(0);
|
|
|
|
/*
|
|
* The construct 'flags - FREAD' conveniently maps combinations of
|
|
* FREAD and FWRITE to the corresponding O_RDONLY, O_WRONLY, and O_RDWR.
|
|
*/
|
|
fd = open64(realpath, flags - FREAD, mode);
|
|
if (fd == -1) {
|
|
err = errno;
|
|
free(realpath);
|
|
return (err);
|
|
}
|
|
|
|
if (flags & FCREAT)
|
|
(void) umask(old_umask);
|
|
|
|
if (vn_dumpdir != NULL) {
|
|
char *dumppath = umem_zalloc(MAXPATHLEN, UMEM_NOFAIL);
|
|
(void) snprintf(dumppath, MAXPATHLEN,
|
|
"%s/%s", vn_dumpdir, basename(realpath));
|
|
dump_fd = open64(dumppath, O_CREAT | O_WRONLY, 0666);
|
|
umem_free(dumppath, MAXPATHLEN);
|
|
if (dump_fd == -1) {
|
|
err = errno;
|
|
free(realpath);
|
|
close(fd);
|
|
return (err);
|
|
}
|
|
} else {
|
|
dump_fd = -1;
|
|
}
|
|
|
|
free(realpath);
|
|
|
|
if (fstat64_blk(fd, &st) == -1) {
|
|
err = errno;
|
|
close(fd);
|
|
if (dump_fd != -1)
|
|
close(dump_fd);
|
|
return (err);
|
|
}
|
|
|
|
(void) fcntl(fd, F_SETFD, FD_CLOEXEC);
|
|
|
|
*vpp = vp = umem_zalloc(sizeof (vnode_t), UMEM_NOFAIL);
|
|
|
|
vp->v_fd = fd;
|
|
vp->v_size = st.st_size;
|
|
vp->v_path = spa_strdup(path);
|
|
vp->v_dump_fd = dump_fd;
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
vn_openat(char *path, int x1, int flags, int mode, vnode_t **vpp, int x2,
|
|
int x3, vnode_t *startvp, int fd)
|
|
{
|
|
char *realpath = umem_alloc(strlen(path) + 2, UMEM_NOFAIL);
|
|
int ret;
|
|
|
|
ASSERT(startvp == rootdir);
|
|
(void) sprintf(realpath, "/%s", path);
|
|
|
|
/* fd ignored for now, need if want to simulate nbmand support */
|
|
ret = vn_open(realpath, x1, flags, mode, vpp, x2, x3);
|
|
|
|
umem_free(realpath, strlen(path) + 2);
|
|
|
|
return (ret);
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
int
|
|
vn_rdwr(int uio, vnode_t *vp, void *addr, ssize_t len, offset_t offset,
|
|
int x1, int x2, rlim64_t x3, void *x4, ssize_t *residp)
|
|
{
|
|
ssize_t rc, done = 0, split;
|
|
|
|
if (uio == UIO_READ) {
|
|
rc = pread64(vp->v_fd, addr, len, offset);
|
|
if (vp->v_dump_fd != -1 && rc != -1) {
|
|
int status;
|
|
status = pwrite64(vp->v_dump_fd, addr, rc, offset);
|
|
ASSERT(status != -1);
|
|
}
|
|
} else {
|
|
/*
|
|
* To simulate partial disk writes, we split writes into two
|
|
* system calls so that the process can be killed in between.
|
|
*/
|
|
int sectors = len >> SPA_MINBLOCKSHIFT;
|
|
split = (sectors > 0 ? rand() % sectors : 0) <<
|
|
SPA_MINBLOCKSHIFT;
|
|
rc = pwrite64(vp->v_fd, addr, split, offset);
|
|
if (rc != -1) {
|
|
done = rc;
|
|
rc = pwrite64(vp->v_fd, (char *)addr + split,
|
|
len - split, offset + split);
|
|
}
|
|
}
|
|
|
|
#ifdef __linux__
|
|
if (rc == -1 && errno == EINVAL) {
|
|
/*
|
|
* Under Linux, this most likely means an alignment issue
|
|
* (memory or disk) due to O_DIRECT, so we abort() in order to
|
|
* catch the offender.
|
|
*/
|
|
abort();
|
|
}
|
|
#endif
|
|
if (rc == -1)
|
|
return (errno);
|
|
|
|
done += rc;
|
|
|
|
if (residp)
|
|
*residp = len - done;
|
|
else if (done != len)
|
|
return (EIO);
|
|
return (0);
|
|
}
|
|
|
|
void
|
|
vn_close(vnode_t *vp)
|
|
{
|
|
close(vp->v_fd);
|
|
if (vp->v_dump_fd != -1)
|
|
close(vp->v_dump_fd);
|
|
spa_strfree(vp->v_path);
|
|
umem_free(vp, sizeof (vnode_t));
|
|
}
|
|
|
|
/*
|
|
* At a minimum we need to update the size since vdev_reopen()
|
|
* will no longer call vn_openat().
|
|
*/
|
|
int
|
|
fop_getattr(vnode_t *vp, vattr_t *vap)
|
|
{
|
|
struct stat64 st;
|
|
int err;
|
|
|
|
if (fstat64_blk(vp->v_fd, &st) == -1) {
|
|
err = errno;
|
|
close(vp->v_fd);
|
|
return (err);
|
|
}
|
|
|
|
vap->va_size = st.st_size;
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* Figure out which debugging statements to print
|
|
* =========================================================================
|
|
*/
|
|
|
|
static char *dprintf_string;
|
|
static int dprintf_print_all;
|
|
|
|
int
|
|
dprintf_find_string(const char *string)
|
|
{
|
|
char *tmp_str = dprintf_string;
|
|
int len = strlen(string);
|
|
|
|
/*
|
|
* Find out if this is a string we want to print.
|
|
* String format: file1.c,function_name1,file2.c,file3.c
|
|
*/
|
|
|
|
while (tmp_str != NULL) {
|
|
if (strncmp(tmp_str, string, len) == 0 &&
|
|
(tmp_str[len] == ',' || tmp_str[len] == '\0'))
|
|
return (1);
|
|
tmp_str = strchr(tmp_str, ',');
|
|
if (tmp_str != NULL)
|
|
tmp_str++; /* Get rid of , */
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
void
|
|
dprintf_setup(int *argc, char **argv)
|
|
{
|
|
int i, j;
|
|
|
|
/*
|
|
* Debugging can be specified two ways: by setting the
|
|
* environment variable ZFS_DEBUG, or by including a
|
|
* "debug=..." argument on the command line. The command
|
|
* line setting overrides the environment variable.
|
|
*/
|
|
|
|
for (i = 1; i < *argc; i++) {
|
|
int len = strlen("debug=");
|
|
/* First look for a command line argument */
|
|
if (strncmp("debug=", argv[i], len) == 0) {
|
|
dprintf_string = argv[i] + len;
|
|
/* Remove from args */
|
|
for (j = i; j < *argc; j++)
|
|
argv[j] = argv[j+1];
|
|
argv[j] = NULL;
|
|
(*argc)--;
|
|
}
|
|
}
|
|
|
|
if (dprintf_string == NULL) {
|
|
/* Look for ZFS_DEBUG environment variable */
|
|
dprintf_string = getenv("ZFS_DEBUG");
|
|
}
|
|
|
|
/*
|
|
* Are we just turning on all debugging?
|
|
*/
|
|
if (dprintf_find_string("on"))
|
|
dprintf_print_all = 1;
|
|
|
|
if (dprintf_string != NULL)
|
|
zfs_flags |= ZFS_DEBUG_DPRINTF;
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* debug printfs
|
|
* =========================================================================
|
|
*/
|
|
void
|
|
__dprintf(const char *file, const char *func, int line, const char *fmt, ...)
|
|
{
|
|
const char *newfile;
|
|
va_list adx;
|
|
|
|
/*
|
|
* Get rid of annoying "../common/" prefix to filename.
|
|
*/
|
|
newfile = strrchr(file, '/');
|
|
if (newfile != NULL) {
|
|
newfile = newfile + 1; /* Get rid of leading / */
|
|
} else {
|
|
newfile = file;
|
|
}
|
|
|
|
if (dprintf_print_all ||
|
|
dprintf_find_string(newfile) ||
|
|
dprintf_find_string(func)) {
|
|
/* Print out just the function name if requested */
|
|
flockfile(stdout);
|
|
if (dprintf_find_string("pid"))
|
|
(void) printf("%d ", getpid());
|
|
if (dprintf_find_string("tid"))
|
|
(void) printf("%u ", (uint_t)pthread_self());
|
|
if (dprintf_find_string("cpu"))
|
|
(void) printf("%u ", getcpuid());
|
|
if (dprintf_find_string("time"))
|
|
(void) printf("%llu ", gethrtime());
|
|
if (dprintf_find_string("long"))
|
|
(void) printf("%s, line %d: ", newfile, line);
|
|
(void) printf("%s: ", func);
|
|
va_start(adx, fmt);
|
|
(void) vprintf(fmt, adx);
|
|
va_end(adx);
|
|
funlockfile(stdout);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* cmn_err() and panic()
|
|
* =========================================================================
|
|
*/
|
|
static char ce_prefix[CE_IGNORE][10] = { "", "NOTICE: ", "WARNING: ", "" };
|
|
static char ce_suffix[CE_IGNORE][2] = { "", "\n", "\n", "" };
|
|
|
|
void
|
|
vpanic(const char *fmt, va_list adx)
|
|
{
|
|
(void) fprintf(stderr, "error: ");
|
|
(void) vfprintf(stderr, fmt, adx);
|
|
(void) fprintf(stderr, "\n");
|
|
|
|
abort(); /* think of it as a "user-level crash dump" */
|
|
}
|
|
|
|
void
|
|
panic(const char *fmt, ...)
|
|
{
|
|
va_list adx;
|
|
|
|
va_start(adx, fmt);
|
|
vpanic(fmt, adx);
|
|
va_end(adx);
|
|
}
|
|
|
|
void
|
|
vcmn_err(int ce, const char *fmt, va_list adx)
|
|
{
|
|
if (ce == CE_PANIC)
|
|
vpanic(fmt, adx);
|
|
if (ce != CE_NOTE) { /* suppress noise in userland stress testing */
|
|
(void) fprintf(stderr, "%s", ce_prefix[ce]);
|
|
(void) vfprintf(stderr, fmt, adx);
|
|
(void) fprintf(stderr, "%s", ce_suffix[ce]);
|
|
}
|
|
}
|
|
|
|
/*PRINTFLIKE2*/
|
|
void
|
|
cmn_err(int ce, const char *fmt, ...)
|
|
{
|
|
va_list adx;
|
|
|
|
va_start(adx, fmt);
|
|
vcmn_err(ce, fmt, adx);
|
|
va_end(adx);
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* kobj interfaces
|
|
* =========================================================================
|
|
*/
|
|
struct _buf *
|
|
kobj_open_file(char *name)
|
|
{
|
|
struct _buf *file;
|
|
vnode_t *vp;
|
|
|
|
/* set vp as the _fd field of the file */
|
|
if (vn_openat(name, UIO_SYSSPACE, FREAD, 0, &vp, 0, 0, rootdir,
|
|
-1) != 0)
|
|
return ((void *)-1UL);
|
|
|
|
file = umem_zalloc(sizeof (struct _buf), UMEM_NOFAIL);
|
|
file->_fd = (intptr_t)vp;
|
|
return (file);
|
|
}
|
|
|
|
int
|
|
kobj_read_file(struct _buf *file, char *buf, unsigned size, unsigned off)
|
|
{
|
|
ssize_t resid = 0;
|
|
|
|
if (vn_rdwr(UIO_READ, (vnode_t *)file->_fd, buf, size, (offset_t)off,
|
|
UIO_SYSSPACE, 0, 0, 0, &resid) != 0)
|
|
return (-1);
|
|
|
|
return (size - resid);
|
|
}
|
|
|
|
void
|
|
kobj_close_file(struct _buf *file)
|
|
{
|
|
vn_close((vnode_t *)file->_fd);
|
|
umem_free(file, sizeof (struct _buf));
|
|
}
|
|
|
|
int
|
|
kobj_get_filesize(struct _buf *file, uint64_t *size)
|
|
{
|
|
struct stat64 st;
|
|
vnode_t *vp = (vnode_t *)file->_fd;
|
|
|
|
if (fstat64(vp->v_fd, &st) == -1) {
|
|
vn_close(vp);
|
|
return (errno);
|
|
}
|
|
*size = st.st_size;
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* misc routines
|
|
* =========================================================================
|
|
*/
|
|
|
|
void
|
|
delay(clock_t ticks)
|
|
{
|
|
(void) poll(0, 0, ticks * (1000 / hz));
|
|
}
|
|
|
|
/*
|
|
* Find highest one bit set.
|
|
* Returns bit number + 1 of highest bit that is set, otherwise returns 0.
|
|
* The __builtin_clzll() function is supported by both GCC and Clang.
|
|
*/
|
|
int
|
|
highbit64(uint64_t i)
|
|
{
|
|
if (i == 0)
|
|
return (0);
|
|
|
|
return (NBBY * sizeof (uint64_t) - __builtin_clzll(i));
|
|
}
|
|
|
|
/*
|
|
* Find lowest one bit set.
|
|
* Returns bit number + 1 of lowest bit that is set, otherwise returns 0.
|
|
* The __builtin_ffsll() function is supported by both GCC and Clang.
|
|
*/
|
|
int
|
|
lowbit64(uint64_t i)
|
|
{
|
|
if (i == 0)
|
|
return (0);
|
|
|
|
return (__builtin_ffsll(i));
|
|
}
|
|
|
|
char *random_path = "/dev/random";
|
|
char *urandom_path = "/dev/urandom";
|
|
static int random_fd = -1, urandom_fd = -1;
|
|
|
|
void
|
|
random_init(void)
|
|
{
|
|
VERIFY((random_fd = open(random_path, O_RDONLY)) != -1);
|
|
VERIFY((urandom_fd = open(urandom_path, O_RDONLY)) != -1);
|
|
}
|
|
|
|
void
|
|
random_fini(void)
|
|
{
|
|
close(random_fd);
|
|
close(urandom_fd);
|
|
|
|
random_fd = -1;
|
|
urandom_fd = -1;
|
|
}
|
|
|
|
static int
|
|
random_get_bytes_common(uint8_t *ptr, size_t len, int fd)
|
|
{
|
|
size_t resid = len;
|
|
ssize_t bytes;
|
|
|
|
ASSERT(fd != -1);
|
|
|
|
while (resid != 0) {
|
|
bytes = read(fd, ptr, resid);
|
|
ASSERT3S(bytes, >=, 0);
|
|
ptr += bytes;
|
|
resid -= bytes;
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
random_get_bytes(uint8_t *ptr, size_t len)
|
|
{
|
|
return (random_get_bytes_common(ptr, len, random_fd));
|
|
}
|
|
|
|
int
|
|
random_get_pseudo_bytes(uint8_t *ptr, size_t len)
|
|
{
|
|
return (random_get_bytes_common(ptr, len, urandom_fd));
|
|
}
|
|
|
|
int
|
|
ddi_strtoul(const char *hw_serial, char **nptr, int base, unsigned long *result)
|
|
{
|
|
char *end;
|
|
|
|
*result = strtoul(hw_serial, &end, base);
|
|
if (*result == 0)
|
|
return (errno);
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
ddi_strtoull(const char *str, char **nptr, int base, u_longlong_t *result)
|
|
{
|
|
char *end;
|
|
|
|
*result = strtoull(str, &end, base);
|
|
if (*result == 0)
|
|
return (errno);
|
|
return (0);
|
|
}
|
|
|
|
utsname_t *
|
|
utsname(void)
|
|
{
|
|
return (&hw_utsname);
|
|
}
|
|
|
|
/*
|
|
* =========================================================================
|
|
* kernel emulation setup & teardown
|
|
* =========================================================================
|
|
*/
|
|
static int
|
|
umem_out_of_memory(void)
|
|
{
|
|
char errmsg[] = "out of memory -- generating core dump\n";
|
|
|
|
(void) fprintf(stderr, "%s", errmsg);
|
|
abort();
|
|
return (0);
|
|
}
|
|
|
|
void
|
|
kernel_init(int mode)
|
|
{
|
|
extern uint_t rrw_tsd_key;
|
|
|
|
umem_nofail_callback(umem_out_of_memory);
|
|
|
|
physmem = sysconf(_SC_PHYS_PAGES);
|
|
|
|
dprintf("physmem = %llu pages (%.2f GB)\n", physmem,
|
|
(double)physmem * sysconf(_SC_PAGE_SIZE) / (1ULL << 30));
|
|
|
|
(void) snprintf(hw_serial, sizeof (hw_serial), "%ld",
|
|
(mode & FWRITE) ? get_system_hostid() : 0);
|
|
|
|
random_init();
|
|
|
|
VERIFY0(uname(&hw_utsname));
|
|
|
|
system_taskq_init();
|
|
icp_init();
|
|
|
|
spa_init(mode);
|
|
|
|
fletcher_4_init();
|
|
|
|
tsd_create(&rrw_tsd_key, rrw_tsd_destroy);
|
|
}
|
|
|
|
void
|
|
kernel_fini(void)
|
|
{
|
|
fletcher_4_fini();
|
|
spa_fini();
|
|
|
|
icp_fini();
|
|
system_taskq_fini();
|
|
|
|
random_fini();
|
|
}
|
|
|
|
uid_t
|
|
crgetuid(cred_t *cr)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
uid_t
|
|
crgetruid(cred_t *cr)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
gid_t
|
|
crgetgid(cred_t *cr)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
crgetngroups(cred_t *cr)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
gid_t *
|
|
crgetgroups(cred_t *cr)
|
|
{
|
|
return (NULL);
|
|
}
|
|
|
|
int
|
|
zfs_secpolicy_snapshot_perms(const char *name, cred_t *cr)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
zfs_secpolicy_rename_perms(const char *from, const char *to, cred_t *cr)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
zfs_secpolicy_destroy_perms(const char *name, cred_t *cr)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
secpolicy_zfs(const cred_t *cr)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
ksiddomain_t *
|
|
ksid_lookupdomain(const char *dom)
|
|
{
|
|
ksiddomain_t *kd;
|
|
|
|
kd = umem_zalloc(sizeof (ksiddomain_t), UMEM_NOFAIL);
|
|
kd->kd_name = spa_strdup(dom);
|
|
return (kd);
|
|
}
|
|
|
|
void
|
|
ksiddomain_rele(ksiddomain_t *ksid)
|
|
{
|
|
spa_strfree(ksid->kd_name);
|
|
umem_free(ksid, sizeof (ksiddomain_t));
|
|
}
|
|
|
|
char *
|
|
kmem_vasprintf(const char *fmt, va_list adx)
|
|
{
|
|
char *buf = NULL;
|
|
va_list adx_copy;
|
|
|
|
va_copy(adx_copy, adx);
|
|
VERIFY(vasprintf(&buf, fmt, adx_copy) != -1);
|
|
va_end(adx_copy);
|
|
|
|
return (buf);
|
|
}
|
|
|
|
char *
|
|
kmem_asprintf(const char *fmt, ...)
|
|
{
|
|
char *buf = NULL;
|
|
va_list adx;
|
|
|
|
va_start(adx, fmt);
|
|
VERIFY(vasprintf(&buf, fmt, adx) != -1);
|
|
va_end(adx);
|
|
|
|
return (buf);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
int
|
|
zfs_onexit_fd_hold(int fd, minor_t *minorp)
|
|
{
|
|
*minorp = 0;
|
|
return (0);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
void
|
|
zfs_onexit_fd_rele(int fd)
|
|
{
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
int
|
|
zfs_onexit_add_cb(minor_t minor, void (*func)(void *), void *data,
|
|
uint64_t *action_handle)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
int
|
|
zfs_onexit_del_cb(minor_t minor, uint64_t action_handle, boolean_t fire)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
int
|
|
zfs_onexit_cb_data(minor_t minor, uint64_t action_handle, void **data)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
fstrans_cookie_t
|
|
spl_fstrans_mark(void)
|
|
{
|
|
return ((fstrans_cookie_t)0);
|
|
}
|
|
|
|
void
|
|
spl_fstrans_unmark(fstrans_cookie_t cookie)
|
|
{
|
|
}
|
|
|
|
int
|
|
__spl_pf_fstrans_check(void)
|
|
{
|
|
return (0);
|
|
}
|
|
|
|
void *zvol_tag = "zvol_tag";
|
|
|
|
void
|
|
zvol_create_minors(spa_t *spa, const char *name, boolean_t async)
|
|
{
|
|
}
|
|
|
|
void
|
|
zvol_remove_minor(spa_t *spa, const char *name, boolean_t async)
|
|
{
|
|
}
|
|
|
|
void
|
|
zvol_remove_minors(spa_t *spa, const char *name, boolean_t async)
|
|
{
|
|
}
|
|
|
|
void
|
|
zvol_rename_minors(spa_t *spa, const char *oldname, const char *newname,
|
|
boolean_t async)
|
|
{
|
|
}
|