]> git.proxmox.com Git - mirror_zfs.git/blame - lib/libzpool/kernel.c
OpenZFS 9284 - arc_reclaim_thread has 2 jobs
[mirror_zfs.git] / lib / libzpool / kernel.c
CommitLineData
34dc7c2f
BB
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21/*
572e2857 22 * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
a0bd735a 23 * Copyright (c) 2016 Actifio, Inc. All rights reserved.
34dc7c2f
BB
24 */
25
34dc7c2f
BB
26#include <assert.h>
27#include <fcntl.h>
28#include <poll.h>
29#include <stdio.h>
30#include <stdlib.h>
31#include <string.h>
32#include <zlib.h>
9867e8be 33#include <libgen.h>
1e33ac1e 34#include <sys/signal.h>
34dc7c2f
BB
35#include <sys/spa.h>
36#include <sys/stat.h>
37#include <sys/processor.h>
38#include <sys/zfs_context.h>
13fe0198 39#include <sys/rrwlock.h>
34dc7c2f 40#include <sys/utsname.h>
d603ed6c 41#include <sys/time.h>
d164b209 42#include <sys/systeminfo.h>
1eeb4562 43#include <zfs_fletcher.h>
0b04990a 44#include <sys/crypto/icp.h>
34dc7c2f
BB
45
46/*
47 * Emulation of kernel services in userland.
48 */
49
428870ff 50int aok;
34dc7c2f
BB
51uint64_t physmem;
52vnode_t *rootdir = (vnode_t *)0xabcd1234;
d164b209 53char hw_serial[HW_HOSTID_LEN];
f0e324f2 54struct utsname hw_utsname;
ca67b33a 55vmem_t *zio_arena = NULL;
34dc7c2f 56
9867e8be
MA
57/* If set, all blocks read will be copied to the specified directory. */
58char *vn_dumpdir = NULL;
59
428870ff
BB
60/* this only exists to have its address taken */
61struct proc p0;
62
34dc7c2f
BB
63/*
64 * =========================================================================
65 * threads
66 * =========================================================================
c25b8f99
BB
67 *
68 * TS_STACK_MIN is dictated by the minimum allowed pthread stack size. While
69 * TS_STACK_MAX is somewhat arbitrary, it was selected to be large enough for
70 * the expected stack depth while small enough to avoid exhausting address
71 * space with high thread counts.
34dc7c2f 72 */
c25b8f99
BB
73#define TS_STACK_MIN MAX(PTHREAD_STACK_MIN, 32768)
74#define TS_STACK_MAX (256 * 1024)
1e33ac1e 75
c25b8f99 76/*ARGSUSED*/
1e33ac1e 77kthread_t *
c25b8f99 78zk_thread_create(void (*func)(void *), void *arg, size_t stksize, int state)
1e33ac1e 79{
1e33ac1e 80 pthread_attr_t attr;
c25b8f99 81 pthread_t tid;
aa0ac7ca 82 char *stkstr;
c25b8f99 83 int detachstate = PTHREAD_CREATE_DETACHED;
1e33ac1e 84
c25b8f99 85 VERIFY0(pthread_attr_init(&attr));
1e33ac1e 86
c25b8f99
BB
87 if (state & TS_JOINABLE)
88 detachstate = PTHREAD_CREATE_JOINABLE;
1e33ac1e 89
aa0ac7ca
BB
90 VERIFY0(pthread_attr_setdetachstate(&attr, detachstate));
91
1e33ac1e 92 /*
aa0ac7ca
BB
93 * We allow the default stack size in user space to be specified by
94 * setting the ZFS_STACK_SIZE environment variable. This allows us
95 * the convenience of observing and debugging stack overruns in
96 * user space. Explicitly specified stack sizes will be honored.
97 * The usage of ZFS_STACK_SIZE is discussed further in the
98 * ENVIRONMENT VARIABLES sections of the ztest(1) man page.
1e33ac1e 99 */
aa0ac7ca
BB
100 if (stksize == 0) {
101 stkstr = getenv("ZFS_STACK_SIZE");
102
103 if (stkstr == NULL)
104 stksize = TS_STACK_MAX;
105 else
106 stksize = MAX(atoi(stkstr), TS_STACK_MIN);
107 }
108
109 VERIFY3S(stksize, >, 0);
110 stksize = P2ROUNDUP(MAX(stksize, TS_STACK_MIN), PAGESIZE);
c25b8f99 111
206971d2
DR
112 /*
113 * If this ever fails, it may be because the stack size is not a
114 * multiple of system page size.
115 */
aa0ac7ca
BB
116 VERIFY0(pthread_attr_setstacksize(&attr, stksize));
117 VERIFY0(pthread_attr_setguardsize(&attr, PAGESIZE));
118
c25b8f99 119 VERIFY0(pthread_create(&tid, &attr, (void *(*)(void *))func, arg));
aa0ac7ca 120 VERIFY0(pthread_attr_destroy(&attr));
1e33ac1e 121
c25b8f99 122 return ((void *)(uintptr_t)tid);
34dc7c2f
BB
123}
124
125/*
126 * =========================================================================
127 * kstats
128 * =========================================================================
129 */
130/*ARGSUSED*/
131kstat_t *
330847ff
MA
132kstat_create(const char *module, int instance, const char *name,
133 const char *class, uchar_t type, ulong_t ndata, uchar_t ks_flag)
34dc7c2f
BB
134{
135 return (NULL);
136}
137
138/*ARGSUSED*/
139void
140kstat_install(kstat_t *ksp)
141{}
142
143/*ARGSUSED*/
144void
145kstat_delete(kstat_t *ksp)
146{}
147
1421c891 148/*ARGSUSED*/
330847ff
MA
149void
150kstat_waitq_enter(kstat_io_t *kiop)
151{}
152
153/*ARGSUSED*/
154void
155kstat_waitq_exit(kstat_io_t *kiop)
156{}
157
158/*ARGSUSED*/
159void
160kstat_runq_enter(kstat_io_t *kiop)
161{}
162
163/*ARGSUSED*/
164void
165kstat_runq_exit(kstat_io_t *kiop)
166{}
167
168/*ARGSUSED*/
169void
170kstat_waitq_to_runq(kstat_io_t *kiop)
171{}
172
173/*ARGSUSED*/
174void
175kstat_runq_back_to_waitq(kstat_io_t *kiop)
176{}
177
1421c891
PS
178void
179kstat_set_raw_ops(kstat_t *ksp,
180 int (*headers)(char *buf, size_t size),
181 int (*data)(char *buf, size_t size, void *data),
182 void *(*addr)(kstat_t *ksp, loff_t index))
183{}
184
34dc7c2f
BB
185/*
186 * =========================================================================
187 * mutexes
188 * =========================================================================
189 */
1e33ac1e 190
34dc7c2f 191void
1e33ac1e 192mutex_init(kmutex_t *mp, char *name, int type, void *cookie)
34dc7c2f 193{
c25b8f99
BB
194 VERIFY0(pthread_mutex_init(&mp->m_lock, NULL));
195 memset(&mp->m_owner, 0, sizeof (pthread_t));
34dc7c2f
BB
196}
197
198void
1e33ac1e 199mutex_destroy(kmutex_t *mp)
34dc7c2f 200{
c25b8f99 201 VERIFY0(pthread_mutex_destroy(&mp->m_lock));
34dc7c2f
BB
202}
203
204void
205mutex_enter(kmutex_t *mp)
206{
c25b8f99
BB
207 VERIFY0(pthread_mutex_lock(&mp->m_lock));
208 mp->m_owner = pthread_self();
34dc7c2f
BB
209}
210
211int
212mutex_tryenter(kmutex_t *mp)
213{
c25b8f99
BB
214 int error;
215
216 error = pthread_mutex_trylock(&mp->m_lock);
217 if (error == 0) {
218 mp->m_owner = pthread_self();
34dc7c2f
BB
219 return (1);
220 } else {
c25b8f99 221 VERIFY3S(error, ==, EBUSY);
34dc7c2f
BB
222 return (0);
223 }
224}
225
226void
227mutex_exit(kmutex_t *mp)
228{
c25b8f99
BB
229 memset(&mp->m_owner, 0, sizeof (pthread_t));
230 VERIFY0(pthread_mutex_unlock(&mp->m_lock));
1e33ac1e
BB
231}
232
34dc7c2f
BB
233/*
234 * =========================================================================
235 * rwlocks
236 * =========================================================================
237 */
1e33ac1e 238
34dc7c2f
BB
239void
240rw_init(krwlock_t *rwlp, char *name, int type, void *arg)
241{
c25b8f99 242 VERIFY0(pthread_rwlock_init(&rwlp->rw_lock, NULL));
1e33ac1e 243 rwlp->rw_readers = 0;
c25b8f99 244 rwlp->rw_owner = 0;
34dc7c2f
BB
245}
246
247void
248rw_destroy(krwlock_t *rwlp)
249{
c25b8f99 250 VERIFY0(pthread_rwlock_destroy(&rwlp->rw_lock));
34dc7c2f
BB
251}
252
253void
254rw_enter(krwlock_t *rwlp, krw_t rw)
255{
1e33ac1e 256 if (rw == RW_READER) {
c25b8f99 257 VERIFY0(pthread_rwlock_rdlock(&rwlp->rw_lock));
1e33ac1e
BB
258 atomic_inc_uint(&rwlp->rw_readers);
259 } else {
c25b8f99
BB
260 VERIFY0(pthread_rwlock_wrlock(&rwlp->rw_lock));
261 rwlp->rw_owner = pthread_self();
1e33ac1e 262 }
34dc7c2f
BB
263}
264
265void
266rw_exit(krwlock_t *rwlp)
267{
1e33ac1e
BB
268 if (RW_READ_HELD(rwlp))
269 atomic_dec_uint(&rwlp->rw_readers);
270 else
c25b8f99 271 rwlp->rw_owner = 0;
34dc7c2f 272
c25b8f99 273 VERIFY0(pthread_rwlock_unlock(&rwlp->rw_lock));
34dc7c2f
BB
274}
275
276int
277rw_tryenter(krwlock_t *rwlp, krw_t rw)
278{
c25b8f99 279 int error;
34dc7c2f
BB
280
281 if (rw == RW_READER)
c25b8f99 282 error = pthread_rwlock_tryrdlock(&rwlp->rw_lock);
34dc7c2f 283 else
c25b8f99 284 error = pthread_rwlock_trywrlock(&rwlp->rw_lock);
1e33ac1e 285
c25b8f99 286 if (error == 0) {
1e33ac1e
BB
287 if (rw == RW_READER)
288 atomic_inc_uint(&rwlp->rw_readers);
c25b8f99
BB
289 else
290 rwlp->rw_owner = pthread_self();
1e33ac1e 291
34dc7c2f
BB
292 return (1);
293 }
294
c25b8f99 295 VERIFY3S(error, ==, EBUSY);
1e33ac1e 296
34dc7c2f
BB
297 return (0);
298}
299
6cb8e530
PZ
300/* ARGSUSED */
301uint32_t
302zone_get_hostid(void *zonep)
303{
304 /*
305 * We're emulating the system's hostid in userland.
306 */
307 return (strtoul(hw_serial, NULL, 10));
308}
309
34dc7c2f
BB
310int
311rw_tryupgrade(krwlock_t *rwlp)
312{
34dc7c2f
BB
313 return (0);
314}
315
316/*
317 * =========================================================================
318 * condition variables
319 * =========================================================================
320 */
1e33ac1e 321
34dc7c2f
BB
322void
323cv_init(kcondvar_t *cv, char *name, int type, void *arg)
324{
c25b8f99 325 VERIFY0(pthread_cond_init(cv, NULL));
34dc7c2f
BB
326}
327
328void
329cv_destroy(kcondvar_t *cv)
330{
c25b8f99 331 VERIFY0(pthread_cond_destroy(cv));
34dc7c2f
BB
332}
333
334void
335cv_wait(kcondvar_t *cv, kmutex_t *mp)
336{
c25b8f99
BB
337 memset(&mp->m_owner, 0, sizeof (pthread_t));
338 VERIFY0(pthread_cond_wait(cv, &mp->m_lock));
339 mp->m_owner = pthread_self();
34dc7c2f
BB
340}
341
342clock_t
343cv_timedwait(kcondvar_t *cv, kmutex_t *mp, clock_t abstime)
344{
345 int error;
1e33ac1e 346 struct timeval tv;
6413c95f 347 struct timespec ts;
34dc7c2f
BB
348 clock_t delta;
349
428870ff 350 delta = abstime - ddi_get_lbolt();
34dc7c2f
BB
351 if (delta <= 0)
352 return (-1);
353
1e33ac1e
BB
354 VERIFY(gettimeofday(&tv, NULL) == 0);
355
356 ts.tv_sec = tv.tv_sec + delta / hz;
67925abb 357 ts.tv_nsec = tv.tv_usec * NSEC_PER_USEC + (delta % hz) * (NANOSEC / hz);
1e33ac1e
BB
358 if (ts.tv_nsec >= NANOSEC) {
359 ts.tv_sec++;
360 ts.tv_nsec -= NANOSEC;
361 }
34dc7c2f 362
c25b8f99
BB
363 memset(&mp->m_owner, 0, sizeof (pthread_t));
364 error = pthread_cond_timedwait(cv, &mp->m_lock, &ts);
365 mp->m_owner = pthread_self();
34dc7c2f 366
1e33ac1e 367 if (error == ETIMEDOUT)
34dc7c2f
BB
368 return (-1);
369
206971d2 370 VERIFY0(error);
34dc7c2f
BB
371
372 return (1);
373}
374
63fd3c6c
AL
375/*ARGSUSED*/
376clock_t
377cv_timedwait_hires(kcondvar_t *cv, kmutex_t *mp, hrtime_t tim, hrtime_t res,
378 int flag)
379{
380 int error;
67925abb 381 struct timeval tv;
6413c95f 382 struct timespec ts;
63fd3c6c
AL
383 hrtime_t delta;
384
206971d2
DR
385 ASSERT(flag == 0 || flag == CALLOUT_FLAG_ABSOLUTE);
386
387 delta = tim;
388 if (flag & CALLOUT_FLAG_ABSOLUTE)
389 delta -= gethrtime();
63fd3c6c 390
63fd3c6c
AL
391 if (delta <= 0)
392 return (-1);
393
c25b8f99 394 VERIFY0(gettimeofday(&tv, NULL));
67925abb
BB
395
396 ts.tv_sec = tv.tv_sec + delta / NANOSEC;
397 ts.tv_nsec = tv.tv_usec * NSEC_PER_USEC + (delta % NANOSEC);
398 if (ts.tv_nsec >= NANOSEC) {
399 ts.tv_sec++;
400 ts.tv_nsec -= NANOSEC;
401 }
63fd3c6c 402
c25b8f99
BB
403 memset(&mp->m_owner, 0, sizeof (pthread_t));
404 error = pthread_cond_timedwait(cv, &mp->m_lock, &ts);
405 mp->m_owner = pthread_self();
63fd3c6c 406
206971d2 407 if (error == ETIMEDOUT)
63fd3c6c
AL
408 return (-1);
409
206971d2 410 VERIFY0(error);
63fd3c6c
AL
411
412 return (1);
413}
414
34dc7c2f
BB
415void
416cv_signal(kcondvar_t *cv)
417{
c25b8f99 418 VERIFY0(pthread_cond_signal(cv));
34dc7c2f
BB
419}
420
421void
422cv_broadcast(kcondvar_t *cv)
423{
c25b8f99 424 VERIFY0(pthread_cond_broadcast(cv));
34dc7c2f
BB
425}
426
d1261452
JG
427/*
428 * =========================================================================
429 * procfs list
430 * =========================================================================
431 */
432
433void
434seq_printf(struct seq_file *m, const char *fmt, ...)
435{}
436
437void
438procfs_list_install(const char *module,
439 const char *name,
440 procfs_list_t *procfs_list,
441 int (*show)(struct seq_file *f, void *p),
442 int (*show_header)(struct seq_file *f),
443 int (*clear)(procfs_list_t *procfs_list),
444 size_t procfs_list_node_off)
445{
446 mutex_init(&procfs_list->pl_lock, NULL, MUTEX_DEFAULT, NULL);
447 list_create(&procfs_list->pl_list,
448 procfs_list_node_off + sizeof (procfs_list_node_t),
449 procfs_list_node_off + offsetof(procfs_list_node_t, pln_link));
450 procfs_list->pl_next_id = 1;
451 procfs_list->pl_node_offset = procfs_list_node_off;
452}
453
454void
455procfs_list_uninstall(procfs_list_t *procfs_list)
456{}
457
458void
459procfs_list_destroy(procfs_list_t *procfs_list)
460{
461 ASSERT(list_is_empty(&procfs_list->pl_list));
462 list_destroy(&procfs_list->pl_list);
463 mutex_destroy(&procfs_list->pl_lock);
464}
465
466#define NODE_ID(procfs_list, obj) \
467 (((procfs_list_node_t *)(((char *)obj) + \
468 (procfs_list)->pl_node_offset))->pln_id)
469
470void
471procfs_list_add(procfs_list_t *procfs_list, void *p)
472{
473 ASSERT(MUTEX_HELD(&procfs_list->pl_lock));
474 NODE_ID(procfs_list, p) = procfs_list->pl_next_id++;
475 list_insert_tail(&procfs_list->pl_list, p);
476}
477
34dc7c2f
BB
478/*
479 * =========================================================================
480 * vnode operations
481 * =========================================================================
482 */
483/*
484 * Note: for the xxxat() versions of these functions, we assume that the
485 * starting vp is always rootdir (which is true for spa_directory.c, the only
486 * ZFS consumer of these interfaces). We assert this is true, and then emulate
487 * them by adding '/' in front of the path.
488 */
489
490/*ARGSUSED*/
491int
492vn_open(char *path, int x1, int flags, int mode, vnode_t **vpp, int x2, int x3)
493{
e2c292bb 494 int fd = -1;
495 int dump_fd = -1;
34dc7c2f 496 vnode_t *vp;
a4914d38 497 int old_umask = 0;
5ae4e2c2 498 char *realpath;
34dc7c2f 499 struct stat64 st;
4d58b69d 500 int err;
34dc7c2f 501
5ae4e2c2
BB
502 realpath = umem_alloc(MAXPATHLEN, UMEM_NOFAIL);
503
34dc7c2f
BB
504 /*
505 * If we're accessing a real disk from userland, we need to use
506 * the character interface to avoid caching. This is particularly
507 * important if we're trying to look at a real in-kernel storage
508 * pool from userland, e.g. via zdb, because otherwise we won't
509 * see the changes occurring under the segmap cache.
510 * On the other hand, the stupid character device returns zero
511 * for its size. So -- gag -- we open the block device to get
512 * its size, and remember it for subsequent VOP_GETATTR().
513 */
d603ed6c 514#if defined(__sun__) || defined(__sun)
34dc7c2f 515 if (strncmp(path, "/dev/", 5) == 0) {
d603ed6c
BB
516#else
517 if (0) {
518#endif
34dc7c2f
BB
519 char *dsk;
520 fd = open64(path, O_RDONLY);
5ae4e2c2
BB
521 if (fd == -1) {
522 err = errno;
523 free(realpath);
524 return (err);
525 }
34dc7c2f 526 if (fstat64(fd, &st) == -1) {
5ae4e2c2 527 err = errno;
34dc7c2f 528 close(fd);
5ae4e2c2
BB
529 free(realpath);
530 return (err);
34dc7c2f
BB
531 }
532 close(fd);
533 (void) sprintf(realpath, "%s", path);
534 dsk = strstr(path, "/dsk/");
535 if (dsk != NULL)
536 (void) sprintf(realpath + (dsk - path) + 1, "r%s",
537 dsk + 1);
538 } else {
539 (void) sprintf(realpath, "%s", path);
5ae4e2c2
BB
540 if (!(flags & FCREAT) && stat64(realpath, &st) == -1) {
541 err = errno;
542 free(realpath);
543 return (err);
544 }
34dc7c2f
BB
545 }
546
d603ed6c
BB
547 if (!(flags & FCREAT) && S_ISBLK(st.st_mode)) {
548#ifdef __linux__
549 flags |= O_DIRECT;
550#endif
d603ed6c
BB
551 }
552
34dc7c2f
BB
553 if (flags & FCREAT)
554 old_umask = umask(0);
555
556 /*
557 * The construct 'flags - FREAD' conveniently maps combinations of
558 * FREAD and FWRITE to the corresponding O_RDONLY, O_WRONLY, and O_RDWR.
559 */
560 fd = open64(realpath, flags - FREAD, mode);
470f12d6
G
561 if (fd == -1) {
562 err = errno;
563 free(realpath);
564 return (err);
565 }
34dc7c2f
BB
566
567 if (flags & FCREAT)
568 (void) umask(old_umask);
569
9867e8be
MA
570 if (vn_dumpdir != NULL) {
571 char *dumppath = umem_zalloc(MAXPATHLEN, UMEM_NOFAIL);
572 (void) snprintf(dumppath, MAXPATHLEN,
573 "%s/%s", vn_dumpdir, basename(realpath));
574 dump_fd = open64(dumppath, O_CREAT | O_WRONLY, 0666);
575 umem_free(dumppath, MAXPATHLEN);
576 if (dump_fd == -1) {
577 err = errno;
578 free(realpath);
579 close(fd);
580 return (err);
581 }
582 } else {
583 dump_fd = -1;
584 }
585
586 free(realpath);
587
8d4e8140 588 if (fstat64_blk(fd, &st) == -1) {
4d58b69d 589 err = errno;
34dc7c2f 590 close(fd);
e2c292bb 591 if (dump_fd != -1)
592 close(dump_fd);
4d58b69d 593 return (err);
34dc7c2f
BB
594 }
595
596 (void) fcntl(fd, F_SETFD, FD_CLOEXEC);
597
598 *vpp = vp = umem_zalloc(sizeof (vnode_t), UMEM_NOFAIL);
599
600 vp->v_fd = fd;
601 vp->v_size = st.st_size;
602 vp->v_path = spa_strdup(path);
9867e8be 603 vp->v_dump_fd = dump_fd;
34dc7c2f
BB
604
605 return (0);
606}
607
608/*ARGSUSED*/
609int
610vn_openat(char *path, int x1, int flags, int mode, vnode_t **vpp, int x2,
611 int x3, vnode_t *startvp, int fd)
612{
613 char *realpath = umem_alloc(strlen(path) + 2, UMEM_NOFAIL);
614 int ret;
615
616 ASSERT(startvp == rootdir);
617 (void) sprintf(realpath, "/%s", path);
618
619 /* fd ignored for now, need if want to simulate nbmand support */
620 ret = vn_open(realpath, x1, flags, mode, vpp, x2, x3);
621
622 umem_free(realpath, strlen(path) + 2);
623
624 return (ret);
625}
626
627/*ARGSUSED*/
628int
629vn_rdwr(int uio, vnode_t *vp, void *addr, ssize_t len, offset_t offset,
e9aa730c 630 int x1, int x2, rlim64_t x3, void *x4, ssize_t *residp)
34dc7c2f 631{
4d58b69d 632 ssize_t rc, done = 0, split;
34dc7c2f
BB
633
634 if (uio == UIO_READ) {
4d58b69d 635 rc = pread64(vp->v_fd, addr, len, offset);
470f12d6 636 if (vp->v_dump_fd != -1 && rc != -1) {
928c58dd
BB
637 int status;
638 status = pwrite64(vp->v_dump_fd, addr, rc, offset);
9867e8be
MA
639 ASSERT(status != -1);
640 }
34dc7c2f
BB
641 } else {
642 /*
643 * To simulate partial disk writes, we split writes into two
644 * system calls so that the process can be killed in between.
645 */
9ae529ec
CS
646 int sectors = len >> SPA_MINBLOCKSHIFT;
647 split = (sectors > 0 ? rand() % sectors : 0) <<
648 SPA_MINBLOCKSHIFT;
4d58b69d
RC
649 rc = pwrite64(vp->v_fd, addr, split, offset);
650 if (rc != -1) {
651 done = rc;
652 rc = pwrite64(vp->v_fd, (char *)addr + split,
653 len - split, offset + split);
654 }
34dc7c2f
BB
655 }
656
d603ed6c
BB
657#ifdef __linux__
658 if (rc == -1 && errno == EINVAL) {
659 /*
660 * Under Linux, this most likely means an alignment issue
661 * (memory or disk) due to O_DIRECT, so we abort() in order to
662 * catch the offender.
663 */
d1d7e268 664 abort();
d603ed6c
BB
665 }
666#endif
4d58b69d 667 if (rc == -1)
34dc7c2f 668 return (errno);
4d58b69d
RC
669
670 done += rc;
671
34dc7c2f 672 if (residp)
4d58b69d
RC
673 *residp = len - done;
674 else if (done != len)
34dc7c2f
BB
675 return (EIO);
676 return (0);
677}
678
679void
680vn_close(vnode_t *vp)
681{
682 close(vp->v_fd);
9867e8be
MA
683 if (vp->v_dump_fd != -1)
684 close(vp->v_dump_fd);
34dc7c2f
BB
685 spa_strfree(vp->v_path);
686 umem_free(vp, sizeof (vnode_t));
687}
688
428870ff
BB
689/*
690 * At a minimum we need to update the size since vdev_reopen()
691 * will no longer call vn_openat().
692 */
693int
694fop_getattr(vnode_t *vp, vattr_t *vap)
695{
696 struct stat64 st;
8d4e8140 697 int err;
428870ff 698
8d4e8140
RC
699 if (fstat64_blk(vp->v_fd, &st) == -1) {
700 err = errno;
428870ff 701 close(vp->v_fd);
8d4e8140 702 return (err);
428870ff
BB
703 }
704
705 vap->va_size = st.st_size;
706 return (0);
707}
708
34dc7c2f
BB
709/*
710 * =========================================================================
711 * Figure out which debugging statements to print
712 * =========================================================================
713 */
714
715static char *dprintf_string;
716static int dprintf_print_all;
717
718int
719dprintf_find_string(const char *string)
720{
721 char *tmp_str = dprintf_string;
722 int len = strlen(string);
723
724 /*
725 * Find out if this is a string we want to print.
726 * String format: file1.c,function_name1,file2.c,file3.c
727 */
728
729 while (tmp_str != NULL) {
730 if (strncmp(tmp_str, string, len) == 0 &&
731 (tmp_str[len] == ',' || tmp_str[len] == '\0'))
732 return (1);
733 tmp_str = strchr(tmp_str, ',');
734 if (tmp_str != NULL)
735 tmp_str++; /* Get rid of , */
736 }
737 return (0);
738}
739
740void
741dprintf_setup(int *argc, char **argv)
742{
743 int i, j;
744
745 /*
746 * Debugging can be specified two ways: by setting the
747 * environment variable ZFS_DEBUG, or by including a
748 * "debug=..." argument on the command line. The command
749 * line setting overrides the environment variable.
750 */
751
752 for (i = 1; i < *argc; i++) {
753 int len = strlen("debug=");
754 /* First look for a command line argument */
755 if (strncmp("debug=", argv[i], len) == 0) {
756 dprintf_string = argv[i] + len;
757 /* Remove from args */
758 for (j = i; j < *argc; j++)
759 argv[j] = argv[j+1];
760 argv[j] = NULL;
761 (*argc)--;
762 }
763 }
764
765 if (dprintf_string == NULL) {
766 /* Look for ZFS_DEBUG environment variable */
767 dprintf_string = getenv("ZFS_DEBUG");
768 }
769
770 /*
771 * Are we just turning on all debugging?
772 */
773 if (dprintf_find_string("on"))
774 dprintf_print_all = 1;
308a451f
MA
775
776 if (dprintf_string != NULL)
777 zfs_flags |= ZFS_DEBUG_DPRINTF;
34dc7c2f
BB
778}
779
780/*
781 * =========================================================================
782 * debug printfs
783 * =========================================================================
784 */
785void
ab4c009e
TC
786__dprintf(boolean_t dprint, const char *file, const char *func,
787 int line, const char *fmt, ...)
34dc7c2f
BB
788{
789 const char *newfile;
790 va_list adx;
791
792 /*
793 * Get rid of annoying "../common/" prefix to filename.
794 */
795 newfile = strrchr(file, '/');
796 if (newfile != NULL) {
797 newfile = newfile + 1; /* Get rid of leading / */
798 } else {
799 newfile = file;
800 }
801
ab4c009e
TC
802 if (dprint) {
803 /* dprintf messages are printed immediately */
804
805 if (!dprintf_print_all &&
806 !dprintf_find_string(newfile) &&
807 !dprintf_find_string(func))
808 return;
809
34dc7c2f
BB
810 /* Print out just the function name if requested */
811 flockfile(stdout);
812 if (dprintf_find_string("pid"))
813 (void) printf("%d ", getpid());
814 if (dprintf_find_string("tid"))
02730c33 815 (void) printf("%u ", (uint_t)pthread_self());
34dc7c2f
BB
816 if (dprintf_find_string("cpu"))
817 (void) printf("%u ", getcpuid());
818 if (dprintf_find_string("time"))
819 (void) printf("%llu ", gethrtime());
820 if (dprintf_find_string("long"))
821 (void) printf("%s, line %d: ", newfile, line);
ab4c009e 822 (void) printf("dprintf: %s: ", func);
34dc7c2f
BB
823 va_start(adx, fmt);
824 (void) vprintf(fmt, adx);
825 va_end(adx);
826 funlockfile(stdout);
ab4c009e
TC
827 } else {
828 /* zfs_dbgmsg is logged for dumping later */
829 size_t size;
830 char *buf;
831 int i;
832
833 size = 1024;
834 buf = umem_alloc(size, UMEM_NOFAIL);
835 i = snprintf(buf, size, "%s:%d:%s(): ", newfile, line, func);
836
837 if (i < size) {
838 va_start(adx, fmt);
839 (void) vsnprintf(buf + i, size - i, fmt, adx);
840 va_end(adx);
841 }
842
843 __zfs_dbgmsg(buf);
844
845 umem_free(buf, size);
34dc7c2f
BB
846 }
847}
848
34dc7c2f
BB
849/*
850 * =========================================================================
851 * cmn_err() and panic()
852 * =========================================================================
853 */
854static char ce_prefix[CE_IGNORE][10] = { "", "NOTICE: ", "WARNING: ", "" };
855static char ce_suffix[CE_IGNORE][2] = { "", "\n", "\n", "" };
856
857void
858vpanic(const char *fmt, va_list adx)
859{
860 (void) fprintf(stderr, "error: ");
861 (void) vfprintf(stderr, fmt, adx);
862 (void) fprintf(stderr, "\n");
863
864 abort(); /* think of it as a "user-level crash dump" */
865}
866
867void
868panic(const char *fmt, ...)
869{
870 va_list adx;
871
872 va_start(adx, fmt);
873 vpanic(fmt, adx);
874 va_end(adx);
875}
876
877void
878vcmn_err(int ce, const char *fmt, va_list adx)
879{
880 if (ce == CE_PANIC)
881 vpanic(fmt, adx);
882 if (ce != CE_NOTE) { /* suppress noise in userland stress testing */
883 (void) fprintf(stderr, "%s", ce_prefix[ce]);
884 (void) vfprintf(stderr, fmt, adx);
885 (void) fprintf(stderr, "%s", ce_suffix[ce]);
886 }
887}
888
889/*PRINTFLIKE2*/
890void
891cmn_err(int ce, const char *fmt, ...)
892{
893 va_list adx;
894
895 va_start(adx, fmt);
896 vcmn_err(ce, fmt, adx);
897 va_end(adx);
898}
899
900/*
901 * =========================================================================
902 * kobj interfaces
903 * =========================================================================
904 */
905struct _buf *
906kobj_open_file(char *name)
907{
908 struct _buf *file;
909 vnode_t *vp;
910
911 /* set vp as the _fd field of the file */
912 if (vn_openat(name, UIO_SYSSPACE, FREAD, 0, &vp, 0, 0, rootdir,
913 -1) != 0)
914 return ((void *)-1UL);
915
916 file = umem_zalloc(sizeof (struct _buf), UMEM_NOFAIL);
917 file->_fd = (intptr_t)vp;
918 return (file);
919}
920
921int
922kobj_read_file(struct _buf *file, char *buf, unsigned size, unsigned off)
923{
689f093e 924 ssize_t resid = 0;
34dc7c2f 925
957dc932
RY
926 if (vn_rdwr(UIO_READ, (vnode_t *)file->_fd, buf, size, (offset_t)off,
927 UIO_SYSSPACE, 0, 0, 0, &resid) != 0)
928 return (-1);
34dc7c2f
BB
929
930 return (size - resid);
931}
932
933void
934kobj_close_file(struct _buf *file)
935{
936 vn_close((vnode_t *)file->_fd);
937 umem_free(file, sizeof (struct _buf));
938}
939
940int
941kobj_get_filesize(struct _buf *file, uint64_t *size)
942{
943 struct stat64 st;
944 vnode_t *vp = (vnode_t *)file->_fd;
945
946 if (fstat64(vp->v_fd, &st) == -1) {
947 vn_close(vp);
948 return (errno);
949 }
950 *size = st.st_size;
951 return (0);
952}
953
954/*
955 * =========================================================================
956 * misc routines
957 * =========================================================================
958 */
959
960void
961delay(clock_t ticks)
962{
af4db70f 963 (void) poll(0, 0, ticks * (1000 / hz));
34dc7c2f
BB
964}
965
966/*
967 * Find highest one bit set.
46364cb2
BB
968 * Returns bit number + 1 of highest bit that is set, otherwise returns 0.
969 * The __builtin_clzll() function is supported by both GCC and Clang.
34dc7c2f
BB
970 */
971int
9bd274dd 972highbit64(uint64_t i)
34dc7c2f 973{
34dc7c2f 974 if (i == 0)
46364cb2
BB
975 return (0);
976
977 return (NBBY * sizeof (uint64_t) - __builtin_clzll(i));
34dc7c2f
BB
978}
979
193a37cb
TH
980/*
981 * Find lowest one bit set.
982 * Returns bit number + 1 of lowest bit that is set, otherwise returns 0.
46364cb2 983 * The __builtin_ffsll() function is supported by both GCC and Clang.
193a37cb
TH
984 */
985int
986lowbit64(uint64_t i)
987{
193a37cb
TH
988 if (i == 0)
989 return (0);
990
46364cb2 991 return (__builtin_ffsll(i));
0b04990a 992}
193a37cb 993
e1a0850c
BB
994char *random_path = "/dev/random";
995char *urandom_path = "/dev/urandom";
34dc7c2f
BB
996static int random_fd = -1, urandom_fd = -1;
997
0b04990a
TC
998void
999random_init(void)
1000{
e1a0850c
BB
1001 VERIFY((random_fd = open(random_path, O_RDONLY)) != -1);
1002 VERIFY((urandom_fd = open(urandom_path, O_RDONLY)) != -1);
0b04990a
TC
1003}
1004
1005void
1006random_fini(void)
1007{
1008 close(random_fd);
1009 close(urandom_fd);
1010
1011 random_fd = -1;
1012 urandom_fd = -1;
1013}
1014
34dc7c2f
BB
1015static int
1016random_get_bytes_common(uint8_t *ptr, size_t len, int fd)
1017{
1018 size_t resid = len;
1019 ssize_t bytes;
1020
1021 ASSERT(fd != -1);
1022
1023 while (resid != 0) {
1024 bytes = read(fd, ptr, resid);
1025 ASSERT3S(bytes, >=, 0);
1026 ptr += bytes;
1027 resid -= bytes;
1028 }
1029
1030 return (0);
1031}
1032
1033int
1034random_get_bytes(uint8_t *ptr, size_t len)
1035{
1036 return (random_get_bytes_common(ptr, len, random_fd));
1037}
1038
1039int
1040random_get_pseudo_bytes(uint8_t *ptr, size_t len)
1041{
1042 return (random_get_bytes_common(ptr, len, urandom_fd));
1043}
1044
1045int
1046ddi_strtoul(const char *hw_serial, char **nptr, int base, unsigned long *result)
1047{
1048 char *end;
1049
1050 *result = strtoul(hw_serial, &end, base);
1051 if (*result == 0)
1052 return (errno);
1053 return (0);
1054}
1055
428870ff
BB
1056int
1057ddi_strtoull(const char *str, char **nptr, int base, u_longlong_t *result)
1058{
1059 char *end;
1060
1061 *result = strtoull(str, &end, base);
1062 if (*result == 0)
1063 return (errno);
1064 return (0);
1065}
1066
f0e324f2
BB
1067utsname_t *
1068utsname(void)
1069{
1070 return (&hw_utsname);
1071}
1072
34dc7c2f
BB
1073/*
1074 * =========================================================================
1075 * kernel emulation setup & teardown
1076 * =========================================================================
1077 */
1078static int
1079umem_out_of_memory(void)
1080{
1081 char errmsg[] = "out of memory -- generating core dump\n";
1082
0e5b68e0 1083 (void) fprintf(stderr, "%s", errmsg);
34dc7c2f
BB
1084 abort();
1085 return (0);
1086}
1087
1088void
1089kernel_init(int mode)
1090{
13fe0198
MA
1091 extern uint_t rrw_tsd_key;
1092
34dc7c2f
BB
1093 umem_nofail_callback(umem_out_of_memory);
1094
1095 physmem = sysconf(_SC_PHYS_PAGES);
1096
1097 dprintf("physmem = %llu pages (%.2f GB)\n", physmem,
1098 (double)physmem * sysconf(_SC_PAGE_SIZE) / (1ULL << 30));
1099
428870ff 1100 (void) snprintf(hw_serial, sizeof (hw_serial), "%ld",
53698a45 1101 (mode & FWRITE) ? get_system_hostid() : 0);
34dc7c2f 1102
0b04990a
TC
1103 random_init();
1104
f0e324f2 1105 VERIFY0(uname(&hw_utsname));
34dc7c2f 1106
b128c09f 1107 system_taskq_init();
0b04990a 1108 icp_init();
b128c09f 1109
34dc7c2f 1110 spa_init(mode);
13fe0198 1111
1eeb4562
JX
1112 fletcher_4_init();
1113
13fe0198 1114 tsd_create(&rrw_tsd_key, rrw_tsd_destroy);
34dc7c2f
BB
1115}
1116
1117void
1118kernel_fini(void)
1119{
1eeb4562 1120 fletcher_4_fini();
34dc7c2f
BB
1121 spa_fini();
1122
0b04990a 1123 icp_fini();
428870ff
BB
1124 system_taskq_fini();
1125
0b04990a 1126 random_fini();
34dc7c2f
BB
1127}
1128
34dc7c2f
BB
1129uid_t
1130crgetuid(cred_t *cr)
1131{
1132 return (0);
1133}
1134
6f1ffb06
MA
1135uid_t
1136crgetruid(cred_t *cr)
1137{
1138 return (0);
1139}
1140
34dc7c2f
BB
1141gid_t
1142crgetgid(cred_t *cr)
1143{
1144 return (0);
1145}
1146
1147int
1148crgetngroups(cred_t *cr)
1149{
1150 return (0);
1151}
1152
1153gid_t *
1154crgetgroups(cred_t *cr)
1155{
1156 return (NULL);
1157}
1158
1159int
1160zfs_secpolicy_snapshot_perms(const char *name, cred_t *cr)
1161{
1162 return (0);
1163}
1164
1165int
1166zfs_secpolicy_rename_perms(const char *from, const char *to, cred_t *cr)
1167{
1168 return (0);
1169}
1170
1171int
1172zfs_secpolicy_destroy_perms(const char *name, cred_t *cr)
1173{
1174 return (0);
1175}
1176
f74b821a
BB
1177int
1178secpolicy_zfs(const cred_t *cr)
1179{
1180 return (0);
1181}
1182
34dc7c2f
BB
1183ksiddomain_t *
1184ksid_lookupdomain(const char *dom)
1185{
1186 ksiddomain_t *kd;
1187
1188 kd = umem_zalloc(sizeof (ksiddomain_t), UMEM_NOFAIL);
1189 kd->kd_name = spa_strdup(dom);
1190 return (kd);
1191}
1192
1193void
1194ksiddomain_rele(ksiddomain_t *ksid)
1195{
1196 spa_strfree(ksid->kd_name);
1197 umem_free(ksid, sizeof (ksiddomain_t));
1198}
428870ff 1199
428870ff 1200char *
00b46022 1201kmem_vasprintf(const char *fmt, va_list adx)
428870ff 1202{
00b46022
BB
1203 char *buf = NULL;
1204 va_list adx_copy;
428870ff 1205
00b46022
BB
1206 va_copy(adx_copy, adx);
1207 VERIFY(vasprintf(&buf, fmt, adx_copy) != -1);
1208 va_end(adx_copy);
428870ff 1209
00b46022
BB
1210 return (buf);
1211}
1212
1213char *
1214kmem_asprintf(const char *fmt, ...)
1215{
1216 char *buf = NULL;
1217 va_list adx;
428870ff
BB
1218
1219 va_start(adx, fmt);
00b46022 1220 VERIFY(vasprintf(&buf, fmt, adx) != -1);
428870ff
BB
1221 va_end(adx);
1222
1223 return (buf);
1224}
572e2857
BB
1225
1226/* ARGSUSED */
1227int
1228zfs_onexit_fd_hold(int fd, minor_t *minorp)
1229{
1230 *minorp = 0;
1231 return (0);
1232}
1233
1234/* ARGSUSED */
1235void
1236zfs_onexit_fd_rele(int fd)
1237{
1238}
1239
1240/* ARGSUSED */
1241int
1242zfs_onexit_add_cb(minor_t minor, void (*func)(void *), void *data,
1243 uint64_t *action_handle)
1244{
1245 return (0);
1246}
1247
1248/* ARGSUSED */
1249int
1250zfs_onexit_del_cb(minor_t minor, uint64_t action_handle, boolean_t fire)
1251{
1252 return (0);
1253}
1254
1255/* ARGSUSED */
1256int
1257zfs_onexit_cb_data(minor_t minor, uint64_t action_handle, void **data)
1258{
1259 return (0);
1260}
92119cc2
BB
1261
1262fstrans_cookie_t
1263spl_fstrans_mark(void)
1264{
02730c33 1265 return ((fstrans_cookie_t)0);
92119cc2
BB
1266}
1267
1268void
1269spl_fstrans_unmark(fstrans_cookie_t cookie)
1270{
1271}
1272
1273int
e624cd19 1274__spl_pf_fstrans_check(void)
92119cc2
BB
1275{
1276 return (0);
1277}
a0bd735a 1278
3ec34e55
BL
1279int
1280kmem_cache_reap_active(void)
1281{
1282 return (0);
1283}
1284
47dfff3b
MA
1285void *zvol_tag = "zvol_tag";
1286
a0bd735a
BP
1287void
1288zvol_create_minors(spa_t *spa, const char *name, boolean_t async)
1289{
1290}
1291
1292void
1293zvol_remove_minor(spa_t *spa, const char *name, boolean_t async)
1294{
1295}
1296
1297void
1298zvol_remove_minors(spa_t *spa, const char *name, boolean_t async)
1299{
1300}
1301
1302void
1303zvol_rename_minors(spa_t *spa, const char *oldname, const char *newname,
1304 boolean_t async)
1305{
1306}