4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
22 * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
23 * Copyright (c) 2012, 2017 by Delphix. All rights reserved.
24 * Copyright (c) 2014 Spectra Logic Corporation, All rights reserved.
27 #include <sys/zfs_context.h>
29 #include <sys/dnode.h>
31 #include <sys/dmu_impl.h>
32 #include <sys/dmu_tx.h>
33 #include <sys/dmu_objset.h>
34 #include <sys/dsl_dir.h>
35 #include <sys/dsl_dataset.h>
38 #include <sys/dmu_zfetch.h>
39 #include <sys/range_tree.h>
40 #include <sys/trace_dnode.h>
41 #include <sys/zfs_project.h>
43 dnode_stats_t dnode_stats
= {
44 { "dnode_hold_dbuf_hold", KSTAT_DATA_UINT64
},
45 { "dnode_hold_dbuf_read", KSTAT_DATA_UINT64
},
46 { "dnode_hold_alloc_hits", KSTAT_DATA_UINT64
},
47 { "dnode_hold_alloc_misses", KSTAT_DATA_UINT64
},
48 { "dnode_hold_alloc_interior", KSTAT_DATA_UINT64
},
49 { "dnode_hold_alloc_lock_retry", KSTAT_DATA_UINT64
},
50 { "dnode_hold_alloc_lock_misses", KSTAT_DATA_UINT64
},
51 { "dnode_hold_alloc_type_none", KSTAT_DATA_UINT64
},
52 { "dnode_hold_free_hits", KSTAT_DATA_UINT64
},
53 { "dnode_hold_free_misses", KSTAT_DATA_UINT64
},
54 { "dnode_hold_free_lock_misses", KSTAT_DATA_UINT64
},
55 { "dnode_hold_free_lock_retry", KSTAT_DATA_UINT64
},
56 { "dnode_hold_free_overflow", KSTAT_DATA_UINT64
},
57 { "dnode_hold_free_refcount", KSTAT_DATA_UINT64
},
58 { "dnode_hold_free_txg", KSTAT_DATA_UINT64
},
59 { "dnode_free_interior_lock_retry", KSTAT_DATA_UINT64
},
60 { "dnode_allocate", KSTAT_DATA_UINT64
},
61 { "dnode_reallocate", KSTAT_DATA_UINT64
},
62 { "dnode_buf_evict", KSTAT_DATA_UINT64
},
63 { "dnode_alloc_next_chunk", KSTAT_DATA_UINT64
},
64 { "dnode_alloc_race", KSTAT_DATA_UINT64
},
65 { "dnode_alloc_next_block", KSTAT_DATA_UINT64
},
66 { "dnode_move_invalid", KSTAT_DATA_UINT64
},
67 { "dnode_move_recheck1", KSTAT_DATA_UINT64
},
68 { "dnode_move_recheck2", KSTAT_DATA_UINT64
},
69 { "dnode_move_special", KSTAT_DATA_UINT64
},
70 { "dnode_move_handle", KSTAT_DATA_UINT64
},
71 { "dnode_move_rwlock", KSTAT_DATA_UINT64
},
72 { "dnode_move_active", KSTAT_DATA_UINT64
},
75 static kstat_t
*dnode_ksp
;
76 static kmem_cache_t
*dnode_cache
;
78 ASSERTV(static dnode_phys_t dnode_phys_zero
);
80 int zfs_default_bs
= SPA_MINBLOCKSHIFT
;
81 int zfs_default_ibs
= DN_MAX_INDBLKSHIFT
;
84 static kmem_cbrc_t
dnode_move(void *, void *, size_t, void *);
88 dbuf_compare(const void *x1
, const void *x2
)
90 const dmu_buf_impl_t
*d1
= x1
;
91 const dmu_buf_impl_t
*d2
= x2
;
93 int cmp
= AVL_CMP(d1
->db_level
, d2
->db_level
);
97 cmp
= AVL_CMP(d1
->db_blkid
, d2
->db_blkid
);
101 if (d1
->db_state
== DB_SEARCH
) {
102 ASSERT3S(d2
->db_state
, !=, DB_SEARCH
);
104 } else if (d2
->db_state
== DB_SEARCH
) {
105 ASSERT3S(d1
->db_state
, !=, DB_SEARCH
);
109 return (AVL_PCMP(d1
, d2
));
114 dnode_cons(void *arg
, void *unused
, int kmflag
)
119 rw_init(&dn
->dn_struct_rwlock
, NULL
, RW_NOLOCKDEP
, NULL
);
120 mutex_init(&dn
->dn_mtx
, NULL
, MUTEX_DEFAULT
, NULL
);
121 mutex_init(&dn
->dn_dbufs_mtx
, NULL
, MUTEX_DEFAULT
, NULL
);
122 cv_init(&dn
->dn_notxholds
, NULL
, CV_DEFAULT
, NULL
);
125 * Every dbuf has a reference, and dropping a tracked reference is
126 * O(number of references), so don't track dn_holds.
128 zfs_refcount_create_untracked(&dn
->dn_holds
);
129 zfs_refcount_create(&dn
->dn_tx_holds
);
130 list_link_init(&dn
->dn_link
);
132 bzero(&dn
->dn_next_nblkptr
[0], sizeof (dn
->dn_next_nblkptr
));
133 bzero(&dn
->dn_next_nlevels
[0], sizeof (dn
->dn_next_nlevels
));
134 bzero(&dn
->dn_next_indblkshift
[0], sizeof (dn
->dn_next_indblkshift
));
135 bzero(&dn
->dn_next_bonustype
[0], sizeof (dn
->dn_next_bonustype
));
136 bzero(&dn
->dn_rm_spillblk
[0], sizeof (dn
->dn_rm_spillblk
));
137 bzero(&dn
->dn_next_bonuslen
[0], sizeof (dn
->dn_next_bonuslen
));
138 bzero(&dn
->dn_next_blksz
[0], sizeof (dn
->dn_next_blksz
));
139 bzero(&dn
->dn_next_maxblkid
[0], sizeof (dn
->dn_next_maxblkid
));
141 for (i
= 0; i
< TXG_SIZE
; i
++) {
142 multilist_link_init(&dn
->dn_dirty_link
[i
]);
143 dn
->dn_free_ranges
[i
] = NULL
;
144 list_create(&dn
->dn_dirty_records
[i
],
145 sizeof (dbuf_dirty_record_t
),
146 offsetof(dbuf_dirty_record_t
, dr_dirty_node
));
149 dn
->dn_allocated_txg
= 0;
151 dn
->dn_assigned_txg
= 0;
152 dn
->dn_dirty_txg
= 0;
154 dn
->dn_dirtyctx_firstset
= NULL
;
156 dn
->dn_have_spill
= B_FALSE
;
162 dn
->dn_oldprojid
= ZFS_DEFAULT_PROJID
;
165 dn
->dn_newprojid
= ZFS_DEFAULT_PROJID
;
168 dn
->dn_dbufs_count
= 0;
169 avl_create(&dn
->dn_dbufs
, dbuf_compare
, sizeof (dmu_buf_impl_t
),
170 offsetof(dmu_buf_impl_t
, db_link
));
178 dnode_dest(void *arg
, void *unused
)
183 rw_destroy(&dn
->dn_struct_rwlock
);
184 mutex_destroy(&dn
->dn_mtx
);
185 mutex_destroy(&dn
->dn_dbufs_mtx
);
186 cv_destroy(&dn
->dn_notxholds
);
187 zfs_refcount_destroy(&dn
->dn_holds
);
188 zfs_refcount_destroy(&dn
->dn_tx_holds
);
189 ASSERT(!list_link_active(&dn
->dn_link
));
191 for (i
= 0; i
< TXG_SIZE
; i
++) {
192 ASSERT(!multilist_link_active(&dn
->dn_dirty_link
[i
]));
193 ASSERT3P(dn
->dn_free_ranges
[i
], ==, NULL
);
194 list_destroy(&dn
->dn_dirty_records
[i
]);
195 ASSERT0(dn
->dn_next_nblkptr
[i
]);
196 ASSERT0(dn
->dn_next_nlevels
[i
]);
197 ASSERT0(dn
->dn_next_indblkshift
[i
]);
198 ASSERT0(dn
->dn_next_bonustype
[i
]);
199 ASSERT0(dn
->dn_rm_spillblk
[i
]);
200 ASSERT0(dn
->dn_next_bonuslen
[i
]);
201 ASSERT0(dn
->dn_next_blksz
[i
]);
202 ASSERT0(dn
->dn_next_maxblkid
[i
]);
205 ASSERT0(dn
->dn_allocated_txg
);
206 ASSERT0(dn
->dn_free_txg
);
207 ASSERT0(dn
->dn_assigned_txg
);
208 ASSERT0(dn
->dn_dirty_txg
);
209 ASSERT0(dn
->dn_dirtyctx
);
210 ASSERT3P(dn
->dn_dirtyctx_firstset
, ==, NULL
);
211 ASSERT3P(dn
->dn_bonus
, ==, NULL
);
212 ASSERT(!dn
->dn_have_spill
);
213 ASSERT3P(dn
->dn_zio
, ==, NULL
);
214 ASSERT0(dn
->dn_oldused
);
215 ASSERT0(dn
->dn_oldflags
);
216 ASSERT0(dn
->dn_olduid
);
217 ASSERT0(dn
->dn_oldgid
);
218 ASSERT0(dn
->dn_oldprojid
);
219 ASSERT0(dn
->dn_newuid
);
220 ASSERT0(dn
->dn_newgid
);
221 ASSERT0(dn
->dn_newprojid
);
222 ASSERT0(dn
->dn_id_flags
);
224 ASSERT0(dn
->dn_dbufs_count
);
225 avl_destroy(&dn
->dn_dbufs
);
231 ASSERT(dnode_cache
== NULL
);
232 dnode_cache
= kmem_cache_create("dnode_t", sizeof (dnode_t
),
233 0, dnode_cons
, dnode_dest
, NULL
, NULL
, NULL
, 0);
234 kmem_cache_set_move(dnode_cache
, dnode_move
);
236 dnode_ksp
= kstat_create("zfs", 0, "dnodestats", "misc",
237 KSTAT_TYPE_NAMED
, sizeof (dnode_stats
) / sizeof (kstat_named_t
),
239 if (dnode_ksp
!= NULL
) {
240 dnode_ksp
->ks_data
= &dnode_stats
;
241 kstat_install(dnode_ksp
);
248 if (dnode_ksp
!= NULL
) {
249 kstat_delete(dnode_ksp
);
253 kmem_cache_destroy(dnode_cache
);
260 dnode_verify(dnode_t
*dn
)
262 int drop_struct_lock
= FALSE
;
265 ASSERT(dn
->dn_objset
);
266 ASSERT(dn
->dn_handle
->dnh_dnode
== dn
);
268 ASSERT(DMU_OT_IS_VALID(dn
->dn_phys
->dn_type
));
270 if (!(zfs_flags
& ZFS_DEBUG_DNODE_VERIFY
))
273 if (!RW_WRITE_HELD(&dn
->dn_struct_rwlock
)) {
274 rw_enter(&dn
->dn_struct_rwlock
, RW_READER
);
275 drop_struct_lock
= TRUE
;
277 if (dn
->dn_phys
->dn_type
!= DMU_OT_NONE
|| dn
->dn_allocated_txg
!= 0) {
279 int max_bonuslen
= DN_SLOTS_TO_BONUSLEN(dn
->dn_num_slots
);
280 ASSERT3U(dn
->dn_indblkshift
, <=, SPA_MAXBLOCKSHIFT
);
281 if (dn
->dn_datablkshift
) {
282 ASSERT3U(dn
->dn_datablkshift
, >=, SPA_MINBLOCKSHIFT
);
283 ASSERT3U(dn
->dn_datablkshift
, <=, SPA_MAXBLOCKSHIFT
);
284 ASSERT3U(1<<dn
->dn_datablkshift
, ==, dn
->dn_datablksz
);
286 ASSERT3U(dn
->dn_nlevels
, <=, 30);
287 ASSERT(DMU_OT_IS_VALID(dn
->dn_type
));
288 ASSERT3U(dn
->dn_nblkptr
, >=, 1);
289 ASSERT3U(dn
->dn_nblkptr
, <=, DN_MAX_NBLKPTR
);
290 ASSERT3U(dn
->dn_bonuslen
, <=, max_bonuslen
);
291 ASSERT3U(dn
->dn_datablksz
, ==,
292 dn
->dn_datablkszsec
<< SPA_MINBLOCKSHIFT
);
293 ASSERT3U(ISP2(dn
->dn_datablksz
), ==, dn
->dn_datablkshift
!= 0);
294 ASSERT3U((dn
->dn_nblkptr
- 1) * sizeof (blkptr_t
) +
295 dn
->dn_bonuslen
, <=, max_bonuslen
);
296 for (i
= 0; i
< TXG_SIZE
; i
++) {
297 ASSERT3U(dn
->dn_next_nlevels
[i
], <=, dn
->dn_nlevels
);
300 if (dn
->dn_phys
->dn_type
!= DMU_OT_NONE
)
301 ASSERT3U(dn
->dn_phys
->dn_nlevels
, <=, dn
->dn_nlevels
);
302 ASSERT(DMU_OBJECT_IS_SPECIAL(dn
->dn_object
) || dn
->dn_dbuf
!= NULL
);
303 if (dn
->dn_dbuf
!= NULL
) {
304 ASSERT3P(dn
->dn_phys
, ==,
305 (dnode_phys_t
*)dn
->dn_dbuf
->db
.db_data
+
306 (dn
->dn_object
% (dn
->dn_dbuf
->db
.db_size
>> DNODE_SHIFT
)));
308 if (drop_struct_lock
)
309 rw_exit(&dn
->dn_struct_rwlock
);
314 dnode_byteswap(dnode_phys_t
*dnp
)
316 uint64_t *buf64
= (void*)&dnp
->dn_blkptr
;
319 if (dnp
->dn_type
== DMU_OT_NONE
) {
320 bzero(dnp
, sizeof (dnode_phys_t
));
324 dnp
->dn_datablkszsec
= BSWAP_16(dnp
->dn_datablkszsec
);
325 dnp
->dn_bonuslen
= BSWAP_16(dnp
->dn_bonuslen
);
326 dnp
->dn_extra_slots
= BSWAP_8(dnp
->dn_extra_slots
);
327 dnp
->dn_maxblkid
= BSWAP_64(dnp
->dn_maxblkid
);
328 dnp
->dn_used
= BSWAP_64(dnp
->dn_used
);
331 * dn_nblkptr is only one byte, so it's OK to read it in either
332 * byte order. We can't read dn_bouslen.
334 ASSERT(dnp
->dn_indblkshift
<= SPA_MAXBLOCKSHIFT
);
335 ASSERT(dnp
->dn_nblkptr
<= DN_MAX_NBLKPTR
);
336 for (i
= 0; i
< dnp
->dn_nblkptr
* sizeof (blkptr_t
)/8; i
++)
337 buf64
[i
] = BSWAP_64(buf64
[i
]);
340 * OK to check dn_bonuslen for zero, because it won't matter if
341 * we have the wrong byte order. This is necessary because the
342 * dnode dnode is smaller than a regular dnode.
344 if (dnp
->dn_bonuslen
!= 0) {
346 * Note that the bonus length calculated here may be
347 * longer than the actual bonus buffer. This is because
348 * we always put the bonus buffer after the last block
349 * pointer (instead of packing it against the end of the
352 int off
= (dnp
->dn_nblkptr
-1) * sizeof (blkptr_t
);
353 int slots
= dnp
->dn_extra_slots
+ 1;
354 size_t len
= DN_SLOTS_TO_BONUSLEN(slots
) - off
;
355 dmu_object_byteswap_t byteswap
;
356 ASSERT(DMU_OT_IS_VALID(dnp
->dn_bonustype
));
357 byteswap
= DMU_OT_BYTESWAP(dnp
->dn_bonustype
);
358 dmu_ot_byteswap
[byteswap
].ob_func(dnp
->dn_bonus
+ off
, len
);
361 /* Swap SPILL block if we have one */
362 if (dnp
->dn_flags
& DNODE_FLAG_SPILL_BLKPTR
)
363 byteswap_uint64_array(DN_SPILL_BLKPTR(dnp
), sizeof (blkptr_t
));
367 dnode_buf_byteswap(void *vbuf
, size_t size
)
371 ASSERT3U(sizeof (dnode_phys_t
), ==, (1<<DNODE_SHIFT
));
372 ASSERT((size
& (sizeof (dnode_phys_t
)-1)) == 0);
375 dnode_phys_t
*dnp
= (void *)(((char *)vbuf
) + i
);
379 if (dnp
->dn_type
!= DMU_OT_NONE
)
380 i
+= dnp
->dn_extra_slots
* DNODE_MIN_SIZE
;
385 dnode_setbonuslen(dnode_t
*dn
, int newsize
, dmu_tx_t
*tx
)
387 ASSERT3U(zfs_refcount_count(&dn
->dn_holds
), >=, 1);
389 dnode_setdirty(dn
, tx
);
390 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
391 ASSERT3U(newsize
, <=, DN_SLOTS_TO_BONUSLEN(dn
->dn_num_slots
) -
392 (dn
->dn_nblkptr
-1) * sizeof (blkptr_t
));
393 dn
->dn_bonuslen
= newsize
;
395 dn
->dn_next_bonuslen
[tx
->tx_txg
& TXG_MASK
] = DN_ZERO_BONUSLEN
;
397 dn
->dn_next_bonuslen
[tx
->tx_txg
& TXG_MASK
] = dn
->dn_bonuslen
;
398 rw_exit(&dn
->dn_struct_rwlock
);
402 dnode_setbonus_type(dnode_t
*dn
, dmu_object_type_t newtype
, dmu_tx_t
*tx
)
404 ASSERT3U(zfs_refcount_count(&dn
->dn_holds
), >=, 1);
405 dnode_setdirty(dn
, tx
);
406 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
407 dn
->dn_bonustype
= newtype
;
408 dn
->dn_next_bonustype
[tx
->tx_txg
& TXG_MASK
] = dn
->dn_bonustype
;
409 rw_exit(&dn
->dn_struct_rwlock
);
413 dnode_rm_spill(dnode_t
*dn
, dmu_tx_t
*tx
)
415 ASSERT3U(zfs_refcount_count(&dn
->dn_holds
), >=, 1);
416 ASSERT(RW_WRITE_HELD(&dn
->dn_struct_rwlock
));
417 dnode_setdirty(dn
, tx
);
418 dn
->dn_rm_spillblk
[tx
->tx_txg
& TXG_MASK
] = DN_KILL_SPILLBLK
;
419 dn
->dn_have_spill
= B_FALSE
;
423 dnode_setdblksz(dnode_t
*dn
, int size
)
425 ASSERT0(P2PHASE(size
, SPA_MINBLOCKSIZE
));
426 ASSERT3U(size
, <=, SPA_MAXBLOCKSIZE
);
427 ASSERT3U(size
, >=, SPA_MINBLOCKSIZE
);
428 ASSERT3U(size
>> SPA_MINBLOCKSHIFT
, <,
429 1<<(sizeof (dn
->dn_phys
->dn_datablkszsec
) * 8));
430 dn
->dn_datablksz
= size
;
431 dn
->dn_datablkszsec
= size
>> SPA_MINBLOCKSHIFT
;
432 dn
->dn_datablkshift
= ISP2(size
) ? highbit64(size
- 1) : 0;
436 dnode_create(objset_t
*os
, dnode_phys_t
*dnp
, dmu_buf_impl_t
*db
,
437 uint64_t object
, dnode_handle_t
*dnh
)
441 dn
= kmem_cache_alloc(dnode_cache
, KM_SLEEP
);
442 ASSERT(!POINTER_IS_VALID(dn
->dn_objset
));
446 * Defer setting dn_objset until the dnode is ready to be a candidate
447 * for the dnode_move() callback.
449 dn
->dn_object
= object
;
454 if (dnp
->dn_datablkszsec
) {
455 dnode_setdblksz(dn
, dnp
->dn_datablkszsec
<< SPA_MINBLOCKSHIFT
);
457 dn
->dn_datablksz
= 0;
458 dn
->dn_datablkszsec
= 0;
459 dn
->dn_datablkshift
= 0;
461 dn
->dn_indblkshift
= dnp
->dn_indblkshift
;
462 dn
->dn_nlevels
= dnp
->dn_nlevels
;
463 dn
->dn_type
= dnp
->dn_type
;
464 dn
->dn_nblkptr
= dnp
->dn_nblkptr
;
465 dn
->dn_checksum
= dnp
->dn_checksum
;
466 dn
->dn_compress
= dnp
->dn_compress
;
467 dn
->dn_bonustype
= dnp
->dn_bonustype
;
468 dn
->dn_bonuslen
= dnp
->dn_bonuslen
;
469 dn
->dn_num_slots
= dnp
->dn_extra_slots
+ 1;
470 dn
->dn_maxblkid
= dnp
->dn_maxblkid
;
471 dn
->dn_have_spill
= ((dnp
->dn_flags
& DNODE_FLAG_SPILL_BLKPTR
) != 0);
474 dmu_zfetch_init(&dn
->dn_zfetch
, dn
);
476 ASSERT(DMU_OT_IS_VALID(dn
->dn_phys
->dn_type
));
477 ASSERT(zrl_is_locked(&dnh
->dnh_zrlock
));
478 ASSERT(!DN_SLOT_IS_PTR(dnh
->dnh_dnode
));
480 mutex_enter(&os
->os_lock
);
483 * Exclude special dnodes from os_dnodes so an empty os_dnodes
484 * signifies that the special dnodes have no references from
485 * their children (the entries in os_dnodes). This allows
486 * dnode_destroy() to easily determine if the last child has
487 * been removed and then complete eviction of the objset.
489 if (!DMU_OBJECT_IS_SPECIAL(object
))
490 list_insert_head(&os
->os_dnodes
, dn
);
494 * Everything else must be valid before assigning dn_objset
495 * makes the dnode eligible for dnode_move().
500 mutex_exit(&os
->os_lock
);
502 arc_space_consume(sizeof (dnode_t
), ARC_SPACE_DNODE
);
508 * Caller must be holding the dnode handle, which is released upon return.
511 dnode_destroy(dnode_t
*dn
)
513 objset_t
*os
= dn
->dn_objset
;
514 boolean_t complete_os_eviction
= B_FALSE
;
516 ASSERT((dn
->dn_id_flags
& DN_ID_NEW_EXIST
) == 0);
518 mutex_enter(&os
->os_lock
);
519 POINTER_INVALIDATE(&dn
->dn_objset
);
520 if (!DMU_OBJECT_IS_SPECIAL(dn
->dn_object
)) {
521 list_remove(&os
->os_dnodes
, dn
);
522 complete_os_eviction
=
523 list_is_empty(&os
->os_dnodes
) &&
524 list_link_active(&os
->os_evicting_node
);
526 mutex_exit(&os
->os_lock
);
528 /* the dnode can no longer move, so we can release the handle */
529 if (!zrl_is_locked(&dn
->dn_handle
->dnh_zrlock
))
530 zrl_remove(&dn
->dn_handle
->dnh_zrlock
);
532 dn
->dn_allocated_txg
= 0;
534 dn
->dn_assigned_txg
= 0;
535 dn
->dn_dirty_txg
= 0;
538 if (dn
->dn_dirtyctx_firstset
!= NULL
) {
539 kmem_free(dn
->dn_dirtyctx_firstset
, 1);
540 dn
->dn_dirtyctx_firstset
= NULL
;
542 if (dn
->dn_bonus
!= NULL
) {
543 mutex_enter(&dn
->dn_bonus
->db_mtx
);
544 dbuf_destroy(dn
->dn_bonus
);
549 dn
->dn_have_spill
= B_FALSE
;
554 dn
->dn_oldprojid
= ZFS_DEFAULT_PROJID
;
557 dn
->dn_newprojid
= ZFS_DEFAULT_PROJID
;
560 dmu_zfetch_fini(&dn
->dn_zfetch
);
561 kmem_cache_free(dnode_cache
, dn
);
562 arc_space_return(sizeof (dnode_t
), ARC_SPACE_DNODE
);
564 if (complete_os_eviction
)
565 dmu_objset_evict_done(os
);
569 dnode_allocate(dnode_t
*dn
, dmu_object_type_t ot
, int blocksize
, int ibs
,
570 dmu_object_type_t bonustype
, int bonuslen
, int dn_slots
, dmu_tx_t
*tx
)
574 ASSERT3U(dn_slots
, >, 0);
575 ASSERT3U(dn_slots
<< DNODE_SHIFT
, <=,
576 spa_maxdnodesize(dmu_objset_spa(dn
->dn_objset
)));
577 ASSERT3U(blocksize
, <=,
578 spa_maxblocksize(dmu_objset_spa(dn
->dn_objset
)));
580 blocksize
= 1 << zfs_default_bs
;
582 blocksize
= P2ROUNDUP(blocksize
, SPA_MINBLOCKSIZE
);
585 ibs
= zfs_default_ibs
;
587 ibs
= MIN(MAX(ibs
, DN_MIN_INDBLKSHIFT
), DN_MAX_INDBLKSHIFT
);
589 dprintf("os=%p obj=%llu txg=%llu blocksize=%d ibs=%d dn_slots=%d\n",
590 dn
->dn_objset
, dn
->dn_object
, tx
->tx_txg
, blocksize
, ibs
, dn_slots
);
591 DNODE_STAT_BUMP(dnode_allocate
);
593 ASSERT(dn
->dn_type
== DMU_OT_NONE
);
594 ASSERT(bcmp(dn
->dn_phys
, &dnode_phys_zero
, sizeof (dnode_phys_t
)) == 0);
595 ASSERT(dn
->dn_phys
->dn_type
== DMU_OT_NONE
);
596 ASSERT(ot
!= DMU_OT_NONE
);
597 ASSERT(DMU_OT_IS_VALID(ot
));
598 ASSERT((bonustype
== DMU_OT_NONE
&& bonuslen
== 0) ||
599 (bonustype
== DMU_OT_SA
&& bonuslen
== 0) ||
600 (bonustype
!= DMU_OT_NONE
&& bonuslen
!= 0));
601 ASSERT(DMU_OT_IS_VALID(bonustype
));
602 ASSERT3U(bonuslen
, <=, DN_SLOTS_TO_BONUSLEN(dn_slots
));
603 ASSERT(dn
->dn_type
== DMU_OT_NONE
);
604 ASSERT0(dn
->dn_maxblkid
);
605 ASSERT0(dn
->dn_allocated_txg
);
606 ASSERT0(dn
->dn_assigned_txg
);
607 ASSERT0(dn
->dn_dirty_txg
);
608 ASSERT(zfs_refcount_is_zero(&dn
->dn_tx_holds
));
609 ASSERT3U(zfs_refcount_count(&dn
->dn_holds
), <=, 1);
610 ASSERT(avl_is_empty(&dn
->dn_dbufs
));
612 for (i
= 0; i
< TXG_SIZE
; i
++) {
613 ASSERT0(dn
->dn_next_nblkptr
[i
]);
614 ASSERT0(dn
->dn_next_nlevels
[i
]);
615 ASSERT0(dn
->dn_next_indblkshift
[i
]);
616 ASSERT0(dn
->dn_next_bonuslen
[i
]);
617 ASSERT0(dn
->dn_next_bonustype
[i
]);
618 ASSERT0(dn
->dn_rm_spillblk
[i
]);
619 ASSERT0(dn
->dn_next_blksz
[i
]);
620 ASSERT0(dn
->dn_next_maxblkid
[i
]);
621 ASSERT(!multilist_link_active(&dn
->dn_dirty_link
[i
]));
622 ASSERT3P(list_head(&dn
->dn_dirty_records
[i
]), ==, NULL
);
623 ASSERT3P(dn
->dn_free_ranges
[i
], ==, NULL
);
627 dnode_setdblksz(dn
, blocksize
);
628 dn
->dn_indblkshift
= ibs
;
630 dn
->dn_num_slots
= dn_slots
;
631 if (bonustype
== DMU_OT_SA
) /* Maximize bonus space for SA */
634 dn
->dn_nblkptr
= MIN(DN_MAX_NBLKPTR
,
635 1 + ((DN_SLOTS_TO_BONUSLEN(dn_slots
) - bonuslen
) >>
639 dn
->dn_bonustype
= bonustype
;
640 dn
->dn_bonuslen
= bonuslen
;
641 dn
->dn_checksum
= ZIO_CHECKSUM_INHERIT
;
642 dn
->dn_compress
= ZIO_COMPRESS_INHERIT
;
646 if (dn
->dn_dirtyctx_firstset
) {
647 kmem_free(dn
->dn_dirtyctx_firstset
, 1);
648 dn
->dn_dirtyctx_firstset
= NULL
;
651 dn
->dn_allocated_txg
= tx
->tx_txg
;
654 dnode_setdirty(dn
, tx
);
655 dn
->dn_next_indblkshift
[tx
->tx_txg
& TXG_MASK
] = ibs
;
656 dn
->dn_next_bonuslen
[tx
->tx_txg
& TXG_MASK
] = dn
->dn_bonuslen
;
657 dn
->dn_next_bonustype
[tx
->tx_txg
& TXG_MASK
] = dn
->dn_bonustype
;
658 dn
->dn_next_blksz
[tx
->tx_txg
& TXG_MASK
] = dn
->dn_datablksz
;
662 dnode_reallocate(dnode_t
*dn
, dmu_object_type_t ot
, int blocksize
,
663 dmu_object_type_t bonustype
, int bonuslen
, int dn_slots
,
664 boolean_t keep_spill
, dmu_tx_t
*tx
)
668 ASSERT3U(blocksize
, >=, SPA_MINBLOCKSIZE
);
669 ASSERT3U(blocksize
, <=,
670 spa_maxblocksize(dmu_objset_spa(dn
->dn_objset
)));
671 ASSERT0(blocksize
% SPA_MINBLOCKSIZE
);
672 ASSERT(dn
->dn_object
!= DMU_META_DNODE_OBJECT
|| dmu_tx_private_ok(tx
));
673 ASSERT(tx
->tx_txg
!= 0);
674 ASSERT((bonustype
== DMU_OT_NONE
&& bonuslen
== 0) ||
675 (bonustype
!= DMU_OT_NONE
&& bonuslen
!= 0) ||
676 (bonustype
== DMU_OT_SA
&& bonuslen
== 0));
677 ASSERT(DMU_OT_IS_VALID(bonustype
));
678 ASSERT3U(bonuslen
, <=,
679 DN_BONUS_SIZE(spa_maxdnodesize(dmu_objset_spa(dn
->dn_objset
))));
680 ASSERT3U(bonuslen
, <=, DN_BONUS_SIZE(dn_slots
<< DNODE_SHIFT
));
682 dnode_free_interior_slots(dn
);
683 DNODE_STAT_BUMP(dnode_reallocate
);
685 /* clean up any unreferenced dbufs */
686 dnode_evict_dbufs(dn
);
690 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
691 dnode_setdirty(dn
, tx
);
692 if (dn
->dn_datablksz
!= blocksize
) {
693 /* change blocksize */
694 ASSERT0(dn
->dn_maxblkid
);
695 ASSERT(BP_IS_HOLE(&dn
->dn_phys
->dn_blkptr
[0]) ||
696 dnode_block_freed(dn
, 0));
698 dnode_setdblksz(dn
, blocksize
);
699 dn
->dn_next_blksz
[tx
->tx_txg
& TXG_MASK
] = blocksize
;
701 if (dn
->dn_bonuslen
!= bonuslen
)
702 dn
->dn_next_bonuslen
[tx
->tx_txg
& TXG_MASK
] = bonuslen
;
704 if (bonustype
== DMU_OT_SA
) /* Maximize bonus space for SA */
707 nblkptr
= MIN(DN_MAX_NBLKPTR
,
708 1 + ((DN_SLOTS_TO_BONUSLEN(dn_slots
) - bonuslen
) >>
710 if (dn
->dn_bonustype
!= bonustype
)
711 dn
->dn_next_bonustype
[tx
->tx_txg
& TXG_MASK
] = bonustype
;
712 if (dn
->dn_nblkptr
!= nblkptr
)
713 dn
->dn_next_nblkptr
[tx
->tx_txg
& TXG_MASK
] = nblkptr
;
714 if (dn
->dn_phys
->dn_flags
& DNODE_FLAG_SPILL_BLKPTR
&& !keep_spill
) {
715 dbuf_rm_spill(dn
, tx
);
716 dnode_rm_spill(dn
, tx
);
719 rw_exit(&dn
->dn_struct_rwlock
);
724 /* change bonus size and type */
725 mutex_enter(&dn
->dn_mtx
);
726 dn
->dn_bonustype
= bonustype
;
727 dn
->dn_bonuslen
= bonuslen
;
728 dn
->dn_num_slots
= dn_slots
;
729 dn
->dn_nblkptr
= nblkptr
;
730 dn
->dn_checksum
= ZIO_CHECKSUM_INHERIT
;
731 dn
->dn_compress
= ZIO_COMPRESS_INHERIT
;
732 ASSERT3U(dn
->dn_nblkptr
, <=, DN_MAX_NBLKPTR
);
734 /* fix up the bonus db_size */
736 dn
->dn_bonus
->db
.db_size
=
737 DN_SLOTS_TO_BONUSLEN(dn
->dn_num_slots
) -
738 (dn
->dn_nblkptr
-1) * sizeof (blkptr_t
);
739 ASSERT(dn
->dn_bonuslen
<= dn
->dn_bonus
->db
.db_size
);
742 dn
->dn_allocated_txg
= tx
->tx_txg
;
743 mutex_exit(&dn
->dn_mtx
);
748 dnode_move_impl(dnode_t
*odn
, dnode_t
*ndn
)
752 ASSERT(!RW_LOCK_HELD(&odn
->dn_struct_rwlock
));
753 ASSERT(MUTEX_NOT_HELD(&odn
->dn_mtx
));
754 ASSERT(MUTEX_NOT_HELD(&odn
->dn_dbufs_mtx
));
755 ASSERT(!RW_LOCK_HELD(&odn
->dn_zfetch
.zf_rwlock
));
758 ndn
->dn_objset
= odn
->dn_objset
;
759 ndn
->dn_object
= odn
->dn_object
;
760 ndn
->dn_dbuf
= odn
->dn_dbuf
;
761 ndn
->dn_handle
= odn
->dn_handle
;
762 ndn
->dn_phys
= odn
->dn_phys
;
763 ndn
->dn_type
= odn
->dn_type
;
764 ndn
->dn_bonuslen
= odn
->dn_bonuslen
;
765 ndn
->dn_bonustype
= odn
->dn_bonustype
;
766 ndn
->dn_nblkptr
= odn
->dn_nblkptr
;
767 ndn
->dn_checksum
= odn
->dn_checksum
;
768 ndn
->dn_compress
= odn
->dn_compress
;
769 ndn
->dn_nlevels
= odn
->dn_nlevels
;
770 ndn
->dn_indblkshift
= odn
->dn_indblkshift
;
771 ndn
->dn_datablkshift
= odn
->dn_datablkshift
;
772 ndn
->dn_datablkszsec
= odn
->dn_datablkszsec
;
773 ndn
->dn_datablksz
= odn
->dn_datablksz
;
774 ndn
->dn_maxblkid
= odn
->dn_maxblkid
;
775 ndn
->dn_num_slots
= odn
->dn_num_slots
;
776 bcopy(&odn
->dn_next_type
[0], &ndn
->dn_next_type
[0],
777 sizeof (odn
->dn_next_type
));
778 bcopy(&odn
->dn_next_nblkptr
[0], &ndn
->dn_next_nblkptr
[0],
779 sizeof (odn
->dn_next_nblkptr
));
780 bcopy(&odn
->dn_next_nlevels
[0], &ndn
->dn_next_nlevels
[0],
781 sizeof (odn
->dn_next_nlevels
));
782 bcopy(&odn
->dn_next_indblkshift
[0], &ndn
->dn_next_indblkshift
[0],
783 sizeof (odn
->dn_next_indblkshift
));
784 bcopy(&odn
->dn_next_bonustype
[0], &ndn
->dn_next_bonustype
[0],
785 sizeof (odn
->dn_next_bonustype
));
786 bcopy(&odn
->dn_rm_spillblk
[0], &ndn
->dn_rm_spillblk
[0],
787 sizeof (odn
->dn_rm_spillblk
));
788 bcopy(&odn
->dn_next_bonuslen
[0], &ndn
->dn_next_bonuslen
[0],
789 sizeof (odn
->dn_next_bonuslen
));
790 bcopy(&odn
->dn_next_blksz
[0], &ndn
->dn_next_blksz
[0],
791 sizeof (odn
->dn_next_blksz
));
792 bcopy(&odn
->dn_next_maxblkid
[0], &ndn
->dn_next_maxblkid
[0],
793 sizeof (odn
->dn_next_maxblkid
));
794 for (i
= 0; i
< TXG_SIZE
; i
++) {
795 list_move_tail(&ndn
->dn_dirty_records
[i
],
796 &odn
->dn_dirty_records
[i
]);
798 bcopy(&odn
->dn_free_ranges
[0], &ndn
->dn_free_ranges
[0],
799 sizeof (odn
->dn_free_ranges
));
800 ndn
->dn_allocated_txg
= odn
->dn_allocated_txg
;
801 ndn
->dn_free_txg
= odn
->dn_free_txg
;
802 ndn
->dn_assigned_txg
= odn
->dn_assigned_txg
;
803 ndn
->dn_dirty_txg
= odn
->dn_dirty_txg
;
804 ndn
->dn_dirtyctx
= odn
->dn_dirtyctx
;
805 ndn
->dn_dirtyctx_firstset
= odn
->dn_dirtyctx_firstset
;
806 ASSERT(zfs_refcount_count(&odn
->dn_tx_holds
) == 0);
807 zfs_refcount_transfer(&ndn
->dn_holds
, &odn
->dn_holds
);
808 ASSERT(avl_is_empty(&ndn
->dn_dbufs
));
809 avl_swap(&ndn
->dn_dbufs
, &odn
->dn_dbufs
);
810 ndn
->dn_dbufs_count
= odn
->dn_dbufs_count
;
811 ndn
->dn_bonus
= odn
->dn_bonus
;
812 ndn
->dn_have_spill
= odn
->dn_have_spill
;
813 ndn
->dn_zio
= odn
->dn_zio
;
814 ndn
->dn_oldused
= odn
->dn_oldused
;
815 ndn
->dn_oldflags
= odn
->dn_oldflags
;
816 ndn
->dn_olduid
= odn
->dn_olduid
;
817 ndn
->dn_oldgid
= odn
->dn_oldgid
;
818 ndn
->dn_oldprojid
= odn
->dn_oldprojid
;
819 ndn
->dn_newuid
= odn
->dn_newuid
;
820 ndn
->dn_newgid
= odn
->dn_newgid
;
821 ndn
->dn_newprojid
= odn
->dn_newprojid
;
822 ndn
->dn_id_flags
= odn
->dn_id_flags
;
823 dmu_zfetch_init(&ndn
->dn_zfetch
, NULL
);
824 list_move_tail(&ndn
->dn_zfetch
.zf_stream
, &odn
->dn_zfetch
.zf_stream
);
825 ndn
->dn_zfetch
.zf_dnode
= odn
->dn_zfetch
.zf_dnode
;
828 * Update back pointers. Updating the handle fixes the back pointer of
829 * every descendant dbuf as well as the bonus dbuf.
831 ASSERT(ndn
->dn_handle
->dnh_dnode
== odn
);
832 ndn
->dn_handle
->dnh_dnode
= ndn
;
833 if (ndn
->dn_zfetch
.zf_dnode
== odn
) {
834 ndn
->dn_zfetch
.zf_dnode
= ndn
;
838 * Invalidate the original dnode by clearing all of its back pointers.
841 odn
->dn_handle
= NULL
;
842 avl_create(&odn
->dn_dbufs
, dbuf_compare
, sizeof (dmu_buf_impl_t
),
843 offsetof(dmu_buf_impl_t
, db_link
));
844 odn
->dn_dbufs_count
= 0;
845 odn
->dn_bonus
= NULL
;
846 dmu_zfetch_fini(&odn
->dn_zfetch
);
849 * Set the low bit of the objset pointer to ensure that dnode_move()
850 * recognizes the dnode as invalid in any subsequent callback.
852 POINTER_INVALIDATE(&odn
->dn_objset
);
855 * Satisfy the destructor.
857 for (i
= 0; i
< TXG_SIZE
; i
++) {
858 list_create(&odn
->dn_dirty_records
[i
],
859 sizeof (dbuf_dirty_record_t
),
860 offsetof(dbuf_dirty_record_t
, dr_dirty_node
));
861 odn
->dn_free_ranges
[i
] = NULL
;
862 odn
->dn_next_nlevels
[i
] = 0;
863 odn
->dn_next_indblkshift
[i
] = 0;
864 odn
->dn_next_bonustype
[i
] = 0;
865 odn
->dn_rm_spillblk
[i
] = 0;
866 odn
->dn_next_bonuslen
[i
] = 0;
867 odn
->dn_next_blksz
[i
] = 0;
869 odn
->dn_allocated_txg
= 0;
870 odn
->dn_free_txg
= 0;
871 odn
->dn_assigned_txg
= 0;
872 odn
->dn_dirty_txg
= 0;
873 odn
->dn_dirtyctx
= 0;
874 odn
->dn_dirtyctx_firstset
= NULL
;
875 odn
->dn_have_spill
= B_FALSE
;
878 odn
->dn_oldflags
= 0;
881 odn
->dn_oldprojid
= ZFS_DEFAULT_PROJID
;
884 odn
->dn_newprojid
= ZFS_DEFAULT_PROJID
;
885 odn
->dn_id_flags
= 0;
891 odn
->dn_moved
= (uint8_t)-1;
896 dnode_move(void *buf
, void *newbuf
, size_t size
, void *arg
)
898 dnode_t
*odn
= buf
, *ndn
= newbuf
;
904 * The dnode is on the objset's list of known dnodes if the objset
905 * pointer is valid. We set the low bit of the objset pointer when
906 * freeing the dnode to invalidate it, and the memory patterns written
907 * by kmem (baddcafe and deadbeef) set at least one of the two low bits.
908 * A newly created dnode sets the objset pointer last of all to indicate
909 * that the dnode is known and in a valid state to be moved by this
913 if (!POINTER_IS_VALID(os
)) {
914 DNODE_STAT_BUMP(dnode_move_invalid
);
915 return (KMEM_CBRC_DONT_KNOW
);
919 * Ensure that the objset does not go away during the move.
921 rw_enter(&os_lock
, RW_WRITER
);
922 if (os
!= odn
->dn_objset
) {
924 DNODE_STAT_BUMP(dnode_move_recheck1
);
925 return (KMEM_CBRC_DONT_KNOW
);
929 * If the dnode is still valid, then so is the objset. We know that no
930 * valid objset can be freed while we hold os_lock, so we can safely
931 * ensure that the objset remains in use.
933 mutex_enter(&os
->os_lock
);
936 * Recheck the objset pointer in case the dnode was removed just before
937 * acquiring the lock.
939 if (os
!= odn
->dn_objset
) {
940 mutex_exit(&os
->os_lock
);
942 DNODE_STAT_BUMP(dnode_move_recheck2
);
943 return (KMEM_CBRC_DONT_KNOW
);
947 * At this point we know that as long as we hold os->os_lock, the dnode
948 * cannot be freed and fields within the dnode can be safely accessed.
949 * The objset listing this dnode cannot go away as long as this dnode is
953 if (DMU_OBJECT_IS_SPECIAL(odn
->dn_object
)) {
954 mutex_exit(&os
->os_lock
);
955 DNODE_STAT_BUMP(dnode_move_special
);
956 return (KMEM_CBRC_NO
);
958 ASSERT(odn
->dn_dbuf
!= NULL
); /* only "special" dnodes have no parent */
961 * Lock the dnode handle to prevent the dnode from obtaining any new
962 * holds. This also prevents the descendant dbufs and the bonus dbuf
963 * from accessing the dnode, so that we can discount their holds. The
964 * handle is safe to access because we know that while the dnode cannot
965 * go away, neither can its handle. Once we hold dnh_zrlock, we can
966 * safely move any dnode referenced only by dbufs.
968 if (!zrl_tryenter(&odn
->dn_handle
->dnh_zrlock
)) {
969 mutex_exit(&os
->os_lock
);
970 DNODE_STAT_BUMP(dnode_move_handle
);
971 return (KMEM_CBRC_LATER
);
975 * Ensure a consistent view of the dnode's holds and the dnode's dbufs.
976 * We need to guarantee that there is a hold for every dbuf in order to
977 * determine whether the dnode is actively referenced. Falsely matching
978 * a dbuf to an active hold would lead to an unsafe move. It's possible
979 * that a thread already having an active dnode hold is about to add a
980 * dbuf, and we can't compare hold and dbuf counts while the add is in
983 if (!rw_tryenter(&odn
->dn_struct_rwlock
, RW_WRITER
)) {
984 zrl_exit(&odn
->dn_handle
->dnh_zrlock
);
985 mutex_exit(&os
->os_lock
);
986 DNODE_STAT_BUMP(dnode_move_rwlock
);
987 return (KMEM_CBRC_LATER
);
991 * A dbuf may be removed (evicted) without an active dnode hold. In that
992 * case, the dbuf count is decremented under the handle lock before the
993 * dbuf's hold is released. This order ensures that if we count the hold
994 * after the dbuf is removed but before its hold is released, we will
995 * treat the unmatched hold as active and exit safely. If we count the
996 * hold before the dbuf is removed, the hold is discounted, and the
997 * removal is blocked until the move completes.
999 refcount
= zfs_refcount_count(&odn
->dn_holds
);
1000 ASSERT(refcount
>= 0);
1001 dbufs
= odn
->dn_dbufs_count
;
1003 /* We can't have more dbufs than dnode holds. */
1004 ASSERT3U(dbufs
, <=, refcount
);
1005 DTRACE_PROBE3(dnode__move
, dnode_t
*, odn
, int64_t, refcount
,
1008 if (refcount
> dbufs
) {
1009 rw_exit(&odn
->dn_struct_rwlock
);
1010 zrl_exit(&odn
->dn_handle
->dnh_zrlock
);
1011 mutex_exit(&os
->os_lock
);
1012 DNODE_STAT_BUMP(dnode_move_active
);
1013 return (KMEM_CBRC_LATER
);
1016 rw_exit(&odn
->dn_struct_rwlock
);
1019 * At this point we know that anyone with a hold on the dnode is not
1020 * actively referencing it. The dnode is known and in a valid state to
1021 * move. We're holding the locks needed to execute the critical section.
1023 dnode_move_impl(odn
, ndn
);
1025 list_link_replace(&odn
->dn_link
, &ndn
->dn_link
);
1026 /* If the dnode was safe to move, the refcount cannot have changed. */
1027 ASSERT(refcount
== zfs_refcount_count(&ndn
->dn_holds
));
1028 ASSERT(dbufs
== ndn
->dn_dbufs_count
);
1029 zrl_exit(&ndn
->dn_handle
->dnh_zrlock
); /* handle has moved */
1030 mutex_exit(&os
->os_lock
);
1032 return (KMEM_CBRC_YES
);
1034 #endif /* _KERNEL */
1037 dnode_slots_hold(dnode_children_t
*children
, int idx
, int slots
)
1039 ASSERT3S(idx
+ slots
, <=, DNODES_PER_BLOCK
);
1041 for (int i
= idx
; i
< idx
+ slots
; i
++) {
1042 dnode_handle_t
*dnh
= &children
->dnc_children
[i
];
1043 zrl_add(&dnh
->dnh_zrlock
);
1048 dnode_slots_rele(dnode_children_t
*children
, int idx
, int slots
)
1050 ASSERT3S(idx
+ slots
, <=, DNODES_PER_BLOCK
);
1052 for (int i
= idx
; i
< idx
+ slots
; i
++) {
1053 dnode_handle_t
*dnh
= &children
->dnc_children
[i
];
1055 if (zrl_is_locked(&dnh
->dnh_zrlock
))
1056 zrl_exit(&dnh
->dnh_zrlock
);
1058 zrl_remove(&dnh
->dnh_zrlock
);
1063 dnode_slots_tryenter(dnode_children_t
*children
, int idx
, int slots
)
1065 ASSERT3S(idx
+ slots
, <=, DNODES_PER_BLOCK
);
1067 for (int i
= idx
; i
< idx
+ slots
; i
++) {
1068 dnode_handle_t
*dnh
= &children
->dnc_children
[i
];
1070 if (!zrl_tryenter(&dnh
->dnh_zrlock
)) {
1071 for (int j
= idx
; j
< i
; j
++) {
1072 dnh
= &children
->dnc_children
[j
];
1073 zrl_exit(&dnh
->dnh_zrlock
);
1084 dnode_set_slots(dnode_children_t
*children
, int idx
, int slots
, void *ptr
)
1086 ASSERT3S(idx
+ slots
, <=, DNODES_PER_BLOCK
);
1088 for (int i
= idx
; i
< idx
+ slots
; i
++) {
1089 dnode_handle_t
*dnh
= &children
->dnc_children
[i
];
1090 dnh
->dnh_dnode
= ptr
;
1095 dnode_check_slots_free(dnode_children_t
*children
, int idx
, int slots
)
1097 ASSERT3S(idx
+ slots
, <=, DNODES_PER_BLOCK
);
1100 * If all dnode slots are either already free or
1101 * evictable return B_TRUE.
1103 for (int i
= idx
; i
< idx
+ slots
; i
++) {
1104 dnode_handle_t
*dnh
= &children
->dnc_children
[i
];
1105 dnode_t
*dn
= dnh
->dnh_dnode
;
1107 if (dn
== DN_SLOT_FREE
) {
1109 } else if (DN_SLOT_IS_PTR(dn
)) {
1110 mutex_enter(&dn
->dn_mtx
);
1111 boolean_t can_free
= (dn
->dn_type
== DMU_OT_NONE
&&
1112 zfs_refcount_is_zero(&dn
->dn_holds
) &&
1113 !DNODE_IS_DIRTY(dn
));
1114 mutex_exit(&dn
->dn_mtx
);
1129 dnode_reclaim_slots(dnode_children_t
*children
, int idx
, int slots
)
1131 ASSERT3S(idx
+ slots
, <=, DNODES_PER_BLOCK
);
1133 for (int i
= idx
; i
< idx
+ slots
; i
++) {
1134 dnode_handle_t
*dnh
= &children
->dnc_children
[i
];
1136 ASSERT(zrl_is_locked(&dnh
->dnh_zrlock
));
1138 if (DN_SLOT_IS_PTR(dnh
->dnh_dnode
)) {
1139 ASSERT3S(dnh
->dnh_dnode
->dn_type
, ==, DMU_OT_NONE
);
1140 dnode_destroy(dnh
->dnh_dnode
);
1141 dnh
->dnh_dnode
= DN_SLOT_FREE
;
1147 dnode_free_interior_slots(dnode_t
*dn
)
1149 dnode_children_t
*children
= dmu_buf_get_user(&dn
->dn_dbuf
->db
);
1150 int epb
= dn
->dn_dbuf
->db
.db_size
>> DNODE_SHIFT
;
1151 int idx
= (dn
->dn_object
& (epb
- 1)) + 1;
1152 int slots
= dn
->dn_num_slots
- 1;
1157 ASSERT3S(idx
+ slots
, <=, DNODES_PER_BLOCK
);
1159 while (!dnode_slots_tryenter(children
, idx
, slots
)) {
1160 DNODE_STAT_BUMP(dnode_free_interior_lock_retry
);
1164 dnode_set_slots(children
, idx
, slots
, DN_SLOT_FREE
);
1165 dnode_slots_rele(children
, idx
, slots
);
1169 dnode_special_close(dnode_handle_t
*dnh
)
1171 dnode_t
*dn
= dnh
->dnh_dnode
;
1174 * Wait for final references to the dnode to clear. This can
1175 * only happen if the arc is asynchronously evicting state that
1176 * has a hold on this dnode while we are trying to evict this
1179 while (zfs_refcount_count(&dn
->dn_holds
) > 0)
1181 ASSERT(dn
->dn_dbuf
== NULL
||
1182 dmu_buf_get_user(&dn
->dn_dbuf
->db
) == NULL
);
1183 zrl_add(&dnh
->dnh_zrlock
);
1184 dnode_destroy(dn
); /* implicit zrl_remove() */
1185 zrl_destroy(&dnh
->dnh_zrlock
);
1186 dnh
->dnh_dnode
= NULL
;
1190 dnode_special_open(objset_t
*os
, dnode_phys_t
*dnp
, uint64_t object
,
1191 dnode_handle_t
*dnh
)
1195 zrl_init(&dnh
->dnh_zrlock
);
1196 zrl_tryenter(&dnh
->dnh_zrlock
);
1198 dn
= dnode_create(os
, dnp
, NULL
, object
, dnh
);
1201 zrl_exit(&dnh
->dnh_zrlock
);
1205 dnode_buf_evict_async(void *dbu
)
1207 dnode_children_t
*dnc
= dbu
;
1209 DNODE_STAT_BUMP(dnode_buf_evict
);
1211 for (int i
= 0; i
< dnc
->dnc_count
; i
++) {
1212 dnode_handle_t
*dnh
= &dnc
->dnc_children
[i
];
1216 * The dnode handle lock guards against the dnode moving to
1217 * another valid address, so there is no need here to guard
1218 * against changes to or from NULL.
1220 if (!DN_SLOT_IS_PTR(dnh
->dnh_dnode
)) {
1221 zrl_destroy(&dnh
->dnh_zrlock
);
1222 dnh
->dnh_dnode
= DN_SLOT_UNINIT
;
1226 zrl_add(&dnh
->dnh_zrlock
);
1227 dn
= dnh
->dnh_dnode
;
1229 * If there are holds on this dnode, then there should
1230 * be holds on the dnode's containing dbuf as well; thus
1231 * it wouldn't be eligible for eviction and this function
1232 * would not have been called.
1234 ASSERT(zfs_refcount_is_zero(&dn
->dn_holds
));
1235 ASSERT(zfs_refcount_is_zero(&dn
->dn_tx_holds
));
1237 dnode_destroy(dn
); /* implicit zrl_remove() for first slot */
1238 zrl_destroy(&dnh
->dnh_zrlock
);
1239 dnh
->dnh_dnode
= DN_SLOT_UNINIT
;
1241 kmem_free(dnc
, sizeof (dnode_children_t
) +
1242 dnc
->dnc_count
* sizeof (dnode_handle_t
));
1246 * When the DNODE_MUST_BE_FREE flag is set, the "slots" parameter is used
1247 * to ensure the hole at the specified object offset is large enough to
1248 * hold the dnode being created. The slots parameter is also used to ensure
1249 * a dnode does not span multiple dnode blocks. In both of these cases, if
1250 * a failure occurs, ENOSPC is returned. Keep in mind, these failure cases
1251 * are only possible when using DNODE_MUST_BE_FREE.
1253 * If the DNODE_MUST_BE_ALLOCATED flag is set, "slots" must be 0.
1254 * dnode_hold_impl() will check if the requested dnode is already consumed
1255 * as an extra dnode slot by an large dnode, in which case it returns
1259 * EINVAL - Invalid object number or flags.
1260 * ENOSPC - Hole too small to fulfill "slots" request (DNODE_MUST_BE_FREE)
1261 * EEXIST - Refers to an allocated dnode (DNODE_MUST_BE_FREE)
1262 * - Refers to a freeing dnode (DNODE_MUST_BE_FREE)
1263 * - Refers to an interior dnode slot (DNODE_MUST_BE_ALLOCATED)
1264 * ENOENT - The requested dnode is not allocated (DNODE_MUST_BE_ALLOCATED)
1265 * - The requested dnode is being freed (DNODE_MUST_BE_ALLOCATED)
1266 * EIO - I/O error when reading the meta dnode dbuf.
1268 * succeeds even for free dnodes.
1271 dnode_hold_impl(objset_t
*os
, uint64_t object
, int flag
, int slots
,
1272 void *tag
, dnode_t
**dnp
)
1275 int drop_struct_lock
= FALSE
;
1280 dnode_children_t
*dnc
;
1281 dnode_phys_t
*dn_block
;
1282 dnode_handle_t
*dnh
;
1284 ASSERT(!(flag
& DNODE_MUST_BE_ALLOCATED
) || (slots
== 0));
1285 ASSERT(!(flag
& DNODE_MUST_BE_FREE
) || (slots
> 0));
1288 * If you are holding the spa config lock as writer, you shouldn't
1289 * be asking the DMU to do *anything* unless it's the root pool
1290 * which may require us to read from the root filesystem while
1291 * holding some (not all) of the locks as writer.
1293 ASSERT(spa_config_held(os
->os_spa
, SCL_ALL
, RW_WRITER
) == 0 ||
1294 (spa_is_root(os
->os_spa
) &&
1295 spa_config_held(os
->os_spa
, SCL_STATE
, RW_WRITER
)));
1297 ASSERT((flag
& DNODE_MUST_BE_ALLOCATED
) || (flag
& DNODE_MUST_BE_FREE
));
1299 if (object
== DMU_USERUSED_OBJECT
|| object
== DMU_GROUPUSED_OBJECT
||
1300 object
== DMU_PROJECTUSED_OBJECT
) {
1301 if (object
== DMU_USERUSED_OBJECT
)
1302 dn
= DMU_USERUSED_DNODE(os
);
1303 else if (object
== DMU_GROUPUSED_OBJECT
)
1304 dn
= DMU_GROUPUSED_DNODE(os
);
1306 dn
= DMU_PROJECTUSED_DNODE(os
);
1308 return (SET_ERROR(ENOENT
));
1310 if ((flag
& DNODE_MUST_BE_ALLOCATED
) && type
== DMU_OT_NONE
)
1311 return (SET_ERROR(ENOENT
));
1312 if ((flag
& DNODE_MUST_BE_FREE
) && type
!= DMU_OT_NONE
)
1313 return (SET_ERROR(EEXIST
));
1315 (void) zfs_refcount_add(&dn
->dn_holds
, tag
);
1320 if (object
== 0 || object
>= DN_MAX_OBJECT
)
1321 return (SET_ERROR(EINVAL
));
1323 mdn
= DMU_META_DNODE(os
);
1324 ASSERT(mdn
->dn_object
== DMU_META_DNODE_OBJECT
);
1328 if (!RW_WRITE_HELD(&mdn
->dn_struct_rwlock
)) {
1329 rw_enter(&mdn
->dn_struct_rwlock
, RW_READER
);
1330 drop_struct_lock
= TRUE
;
1333 blk
= dbuf_whichblock(mdn
, 0, object
* sizeof (dnode_phys_t
));
1335 db
= dbuf_hold(mdn
, blk
, FTAG
);
1336 if (drop_struct_lock
)
1337 rw_exit(&mdn
->dn_struct_rwlock
);
1339 DNODE_STAT_BUMP(dnode_hold_dbuf_hold
);
1340 return (SET_ERROR(EIO
));
1344 * We do not need to decrypt to read the dnode so it doesn't matter
1345 * if we get the encrypted or decrypted version.
1347 err
= dbuf_read(db
, NULL
, DB_RF_CANFAIL
| DB_RF_NO_DECRYPT
);
1349 DNODE_STAT_BUMP(dnode_hold_dbuf_read
);
1350 dbuf_rele(db
, FTAG
);
1354 ASSERT3U(db
->db
.db_size
, >=, 1<<DNODE_SHIFT
);
1355 epb
= db
->db
.db_size
>> DNODE_SHIFT
;
1357 idx
= object
& (epb
- 1);
1358 dn_block
= (dnode_phys_t
*)db
->db
.db_data
;
1360 ASSERT(DB_DNODE(db
)->dn_type
== DMU_OT_DNODE
);
1361 dnc
= dmu_buf_get_user(&db
->db
);
1364 dnode_children_t
*winner
;
1367 dnc
= kmem_zalloc(sizeof (dnode_children_t
) +
1368 epb
* sizeof (dnode_handle_t
), KM_SLEEP
);
1369 dnc
->dnc_count
= epb
;
1370 dnh
= &dnc
->dnc_children
[0];
1372 /* Initialize dnode slot status from dnode_phys_t */
1373 for (int i
= 0; i
< epb
; i
++) {
1374 zrl_init(&dnh
[i
].dnh_zrlock
);
1381 if (dn_block
[i
].dn_type
!= DMU_OT_NONE
) {
1382 int interior
= dn_block
[i
].dn_extra_slots
;
1384 dnode_set_slots(dnc
, i
, 1, DN_SLOT_ALLOCATED
);
1385 dnode_set_slots(dnc
, i
+ 1, interior
,
1389 dnh
[i
].dnh_dnode
= DN_SLOT_FREE
;
1394 dmu_buf_init_user(&dnc
->dnc_dbu
, NULL
,
1395 dnode_buf_evict_async
, NULL
);
1396 winner
= dmu_buf_set_user(&db
->db
, &dnc
->dnc_dbu
);
1397 if (winner
!= NULL
) {
1399 for (int i
= 0; i
< epb
; i
++)
1400 zrl_destroy(&dnh
[i
].dnh_zrlock
);
1402 kmem_free(dnc
, sizeof (dnode_children_t
) +
1403 epb
* sizeof (dnode_handle_t
));
1408 ASSERT(dnc
->dnc_count
== epb
);
1410 if (flag
& DNODE_MUST_BE_ALLOCATED
) {
1413 dnode_slots_hold(dnc
, idx
, slots
);
1414 dnh
= &dnc
->dnc_children
[idx
];
1416 if (DN_SLOT_IS_PTR(dnh
->dnh_dnode
)) {
1417 dn
= dnh
->dnh_dnode
;
1418 } else if (dnh
->dnh_dnode
== DN_SLOT_INTERIOR
) {
1419 DNODE_STAT_BUMP(dnode_hold_alloc_interior
);
1420 dnode_slots_rele(dnc
, idx
, slots
);
1421 dbuf_rele(db
, FTAG
);
1422 return (SET_ERROR(EEXIST
));
1423 } else if (dnh
->dnh_dnode
!= DN_SLOT_ALLOCATED
) {
1424 DNODE_STAT_BUMP(dnode_hold_alloc_misses
);
1425 dnode_slots_rele(dnc
, idx
, slots
);
1426 dbuf_rele(db
, FTAG
);
1427 return (SET_ERROR(ENOENT
));
1429 dnode_slots_rele(dnc
, idx
, slots
);
1430 while (!dnode_slots_tryenter(dnc
, idx
, slots
)) {
1431 DNODE_STAT_BUMP(dnode_hold_alloc_lock_retry
);
1436 * Someone else won the race and called dnode_create()
1437 * after we checked DN_SLOT_IS_PTR() above but before
1438 * we acquired the lock.
1440 if (DN_SLOT_IS_PTR(dnh
->dnh_dnode
)) {
1441 DNODE_STAT_BUMP(dnode_hold_alloc_lock_misses
);
1442 dn
= dnh
->dnh_dnode
;
1444 dn
= dnode_create(os
, dn_block
+ idx
, db
,
1449 mutex_enter(&dn
->dn_mtx
);
1450 if (dn
->dn_type
== DMU_OT_NONE
|| dn
->dn_free_txg
!= 0) {
1451 DNODE_STAT_BUMP(dnode_hold_alloc_type_none
);
1452 mutex_exit(&dn
->dn_mtx
);
1453 dnode_slots_rele(dnc
, idx
, slots
);
1454 dbuf_rele(db
, FTAG
);
1455 return (SET_ERROR(ENOENT
));
1458 DNODE_STAT_BUMP(dnode_hold_alloc_hits
);
1459 } else if (flag
& DNODE_MUST_BE_FREE
) {
1461 if (idx
+ slots
- 1 >= DNODES_PER_BLOCK
) {
1462 DNODE_STAT_BUMP(dnode_hold_free_overflow
);
1463 dbuf_rele(db
, FTAG
);
1464 return (SET_ERROR(ENOSPC
));
1467 dnode_slots_hold(dnc
, idx
, slots
);
1469 if (!dnode_check_slots_free(dnc
, idx
, slots
)) {
1470 DNODE_STAT_BUMP(dnode_hold_free_misses
);
1471 dnode_slots_rele(dnc
, idx
, slots
);
1472 dbuf_rele(db
, FTAG
);
1473 return (SET_ERROR(ENOSPC
));
1476 dnode_slots_rele(dnc
, idx
, slots
);
1477 while (!dnode_slots_tryenter(dnc
, idx
, slots
)) {
1478 DNODE_STAT_BUMP(dnode_hold_free_lock_retry
);
1482 if (!dnode_check_slots_free(dnc
, idx
, slots
)) {
1483 DNODE_STAT_BUMP(dnode_hold_free_lock_misses
);
1484 dnode_slots_rele(dnc
, idx
, slots
);
1485 dbuf_rele(db
, FTAG
);
1486 return (SET_ERROR(ENOSPC
));
1490 * Allocated but otherwise free dnodes which would
1491 * be in the interior of a multi-slot dnodes need
1492 * to be freed. Single slot dnodes can be safely
1493 * re-purposed as a performance optimization.
1496 dnode_reclaim_slots(dnc
, idx
+ 1, slots
- 1);
1498 dnh
= &dnc
->dnc_children
[idx
];
1499 if (DN_SLOT_IS_PTR(dnh
->dnh_dnode
)) {
1500 dn
= dnh
->dnh_dnode
;
1502 dn
= dnode_create(os
, dn_block
+ idx
, db
,
1506 mutex_enter(&dn
->dn_mtx
);
1507 if (!zfs_refcount_is_zero(&dn
->dn_holds
) || dn
->dn_free_txg
) {
1508 DNODE_STAT_BUMP(dnode_hold_free_refcount
);
1509 mutex_exit(&dn
->dn_mtx
);
1510 dnode_slots_rele(dnc
, idx
, slots
);
1511 dbuf_rele(db
, FTAG
);
1512 return (SET_ERROR(EEXIST
));
1515 dnode_set_slots(dnc
, idx
+ 1, slots
- 1, DN_SLOT_INTERIOR
);
1516 DNODE_STAT_BUMP(dnode_hold_free_hits
);
1518 dbuf_rele(db
, FTAG
);
1519 return (SET_ERROR(EINVAL
));
1522 if (dn
->dn_free_txg
) {
1523 DNODE_STAT_BUMP(dnode_hold_free_txg
);
1525 mutex_exit(&dn
->dn_mtx
);
1526 dnode_slots_rele(dnc
, idx
, slots
);
1527 dbuf_rele(db
, FTAG
);
1528 return (SET_ERROR((flag
& DNODE_MUST_BE_ALLOCATED
) ?
1532 if (zfs_refcount_add(&dn
->dn_holds
, tag
) == 1)
1533 dbuf_add_ref(db
, dnh
);
1535 mutex_exit(&dn
->dn_mtx
);
1537 /* Now we can rely on the hold to prevent the dnode from moving. */
1538 dnode_slots_rele(dnc
, idx
, slots
);
1541 ASSERT3P(dn
->dn_dbuf
, ==, db
);
1542 ASSERT3U(dn
->dn_object
, ==, object
);
1543 dbuf_rele(db
, FTAG
);
1550 * Return held dnode if the object is allocated, NULL if not.
1553 dnode_hold(objset_t
*os
, uint64_t object
, void *tag
, dnode_t
**dnp
)
1555 return (dnode_hold_impl(os
, object
, DNODE_MUST_BE_ALLOCATED
, 0, tag
,
1560 * Can only add a reference if there is already at least one
1561 * reference on the dnode. Returns FALSE if unable to add a
1565 dnode_add_ref(dnode_t
*dn
, void *tag
)
1567 mutex_enter(&dn
->dn_mtx
);
1568 if (zfs_refcount_is_zero(&dn
->dn_holds
)) {
1569 mutex_exit(&dn
->dn_mtx
);
1572 VERIFY(1 < zfs_refcount_add(&dn
->dn_holds
, tag
));
1573 mutex_exit(&dn
->dn_mtx
);
1578 dnode_rele(dnode_t
*dn
, void *tag
)
1580 mutex_enter(&dn
->dn_mtx
);
1581 dnode_rele_and_unlock(dn
, tag
, B_FALSE
);
1585 dnode_rele_and_unlock(dnode_t
*dn
, void *tag
, boolean_t evicting
)
1588 /* Get while the hold prevents the dnode from moving. */
1589 dmu_buf_impl_t
*db
= dn
->dn_dbuf
;
1590 dnode_handle_t
*dnh
= dn
->dn_handle
;
1592 refs
= zfs_refcount_remove(&dn
->dn_holds
, tag
);
1593 mutex_exit(&dn
->dn_mtx
);
1596 * It's unsafe to release the last hold on a dnode by dnode_rele() or
1597 * indirectly by dbuf_rele() while relying on the dnode handle to
1598 * prevent the dnode from moving, since releasing the last hold could
1599 * result in the dnode's parent dbuf evicting its dnode handles. For
1600 * that reason anyone calling dnode_rele() or dbuf_rele() without some
1601 * other direct or indirect hold on the dnode must first drop the dnode
1604 ASSERT(refs
> 0 || dnh
->dnh_zrlock
.zr_owner
!= curthread
);
1606 /* NOTE: the DNODE_DNODE does not have a dn_dbuf */
1607 if (refs
== 0 && db
!= NULL
) {
1609 * Another thread could add a hold to the dnode handle in
1610 * dnode_hold_impl() while holding the parent dbuf. Since the
1611 * hold on the parent dbuf prevents the handle from being
1612 * destroyed, the hold on the handle is OK. We can't yet assert
1613 * that the handle has zero references, but that will be
1614 * asserted anyway when the handle gets destroyed.
1616 mutex_enter(&db
->db_mtx
);
1617 dbuf_rele_and_unlock(db
, dnh
, evicting
);
1622 dnode_setdirty(dnode_t
*dn
, dmu_tx_t
*tx
)
1624 objset_t
*os
= dn
->dn_objset
;
1625 uint64_t txg
= tx
->tx_txg
;
1627 if (DMU_OBJECT_IS_SPECIAL(dn
->dn_object
)) {
1628 dsl_dataset_dirty(os
->os_dsl_dataset
, tx
);
1635 mutex_enter(&dn
->dn_mtx
);
1636 ASSERT(dn
->dn_phys
->dn_type
|| dn
->dn_allocated_txg
);
1637 ASSERT(dn
->dn_free_txg
== 0 || dn
->dn_free_txg
>= txg
);
1638 mutex_exit(&dn
->dn_mtx
);
1642 * Determine old uid/gid when necessary
1644 dmu_objset_userquota_get_ids(dn
, B_TRUE
, tx
);
1646 multilist_t
*dirtylist
= os
->os_dirty_dnodes
[txg
& TXG_MASK
];
1647 multilist_sublist_t
*mls
= multilist_sublist_lock_obj(dirtylist
, dn
);
1650 * If we are already marked dirty, we're done.
1652 if (multilist_link_active(&dn
->dn_dirty_link
[txg
& TXG_MASK
])) {
1653 multilist_sublist_unlock(mls
);
1657 ASSERT(!zfs_refcount_is_zero(&dn
->dn_holds
) ||
1658 !avl_is_empty(&dn
->dn_dbufs
));
1659 ASSERT(dn
->dn_datablksz
!= 0);
1660 ASSERT0(dn
->dn_next_bonuslen
[txg
& TXG_MASK
]);
1661 ASSERT0(dn
->dn_next_blksz
[txg
& TXG_MASK
]);
1662 ASSERT0(dn
->dn_next_bonustype
[txg
& TXG_MASK
]);
1664 dprintf_ds(os
->os_dsl_dataset
, "obj=%llu txg=%llu\n",
1665 dn
->dn_object
, txg
);
1667 multilist_sublist_insert_head(mls
, dn
);
1669 multilist_sublist_unlock(mls
);
1672 * The dnode maintains a hold on its containing dbuf as
1673 * long as there are holds on it. Each instantiated child
1674 * dbuf maintains a hold on the dnode. When the last child
1675 * drops its hold, the dnode will drop its hold on the
1676 * containing dbuf. We add a "dirty hold" here so that the
1677 * dnode will hang around after we finish processing its
1680 VERIFY(dnode_add_ref(dn
, (void *)(uintptr_t)tx
->tx_txg
));
1682 (void) dbuf_dirty(dn
->dn_dbuf
, tx
);
1684 dsl_dataset_dirty(os
->os_dsl_dataset
, tx
);
1688 dnode_free(dnode_t
*dn
, dmu_tx_t
*tx
)
1690 mutex_enter(&dn
->dn_mtx
);
1691 if (dn
->dn_type
== DMU_OT_NONE
|| dn
->dn_free_txg
) {
1692 mutex_exit(&dn
->dn_mtx
);
1695 dn
->dn_free_txg
= tx
->tx_txg
;
1696 mutex_exit(&dn
->dn_mtx
);
1698 dnode_setdirty(dn
, tx
);
1702 * Try to change the block size for the indicated dnode. This can only
1703 * succeed if there are no blocks allocated or dirty beyond first block
1706 dnode_set_blksz(dnode_t
*dn
, uint64_t size
, int ibs
, dmu_tx_t
*tx
)
1711 ASSERT3U(size
, <=, spa_maxblocksize(dmu_objset_spa(dn
->dn_objset
)));
1713 size
= SPA_MINBLOCKSIZE
;
1715 size
= P2ROUNDUP(size
, SPA_MINBLOCKSIZE
);
1717 if (ibs
== dn
->dn_indblkshift
)
1720 if (size
>> SPA_MINBLOCKSHIFT
== dn
->dn_datablkszsec
&& ibs
== 0)
1723 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
1725 /* Check for any allocated blocks beyond the first */
1726 if (dn
->dn_maxblkid
!= 0)
1729 mutex_enter(&dn
->dn_dbufs_mtx
);
1730 for (db
= avl_first(&dn
->dn_dbufs
); db
!= NULL
;
1731 db
= AVL_NEXT(&dn
->dn_dbufs
, db
)) {
1732 if (db
->db_blkid
!= 0 && db
->db_blkid
!= DMU_BONUS_BLKID
&&
1733 db
->db_blkid
!= DMU_SPILL_BLKID
) {
1734 mutex_exit(&dn
->dn_dbufs_mtx
);
1738 mutex_exit(&dn
->dn_dbufs_mtx
);
1740 if (ibs
&& dn
->dn_nlevels
!= 1)
1743 /* resize the old block */
1744 err
= dbuf_hold_impl(dn
, 0, 0, TRUE
, FALSE
, FTAG
, &db
);
1746 dbuf_new_size(db
, size
, tx
);
1747 else if (err
!= ENOENT
)
1750 dnode_setdblksz(dn
, size
);
1751 dnode_setdirty(dn
, tx
);
1752 dn
->dn_next_blksz
[tx
->tx_txg
&TXG_MASK
] = size
;
1754 dn
->dn_indblkshift
= ibs
;
1755 dn
->dn_next_indblkshift
[tx
->tx_txg
&TXG_MASK
] = ibs
;
1757 /* rele after we have fixed the blocksize in the dnode */
1759 dbuf_rele(db
, FTAG
);
1761 rw_exit(&dn
->dn_struct_rwlock
);
1765 rw_exit(&dn
->dn_struct_rwlock
);
1766 return (SET_ERROR(ENOTSUP
));
1770 dnode_set_nlevels_impl(dnode_t
*dn
, int new_nlevels
, dmu_tx_t
*tx
)
1772 uint64_t txgoff
= tx
->tx_txg
& TXG_MASK
;
1773 int old_nlevels
= dn
->dn_nlevels
;
1776 dbuf_dirty_record_t
*new, *dr
, *dr_next
;
1778 ASSERT(RW_WRITE_HELD(&dn
->dn_struct_rwlock
));
1780 dn
->dn_nlevels
= new_nlevels
;
1782 ASSERT3U(new_nlevels
, >, dn
->dn_next_nlevels
[txgoff
]);
1783 dn
->dn_next_nlevels
[txgoff
] = new_nlevels
;
1785 /* dirty the left indirects */
1786 db
= dbuf_hold_level(dn
, old_nlevels
, 0, FTAG
);
1788 new = dbuf_dirty(db
, tx
);
1789 dbuf_rele(db
, FTAG
);
1791 /* transfer the dirty records to the new indirect */
1792 mutex_enter(&dn
->dn_mtx
);
1793 mutex_enter(&new->dt
.di
.dr_mtx
);
1794 list
= &dn
->dn_dirty_records
[txgoff
];
1795 for (dr
= list_head(list
); dr
; dr
= dr_next
) {
1796 dr_next
= list_next(&dn
->dn_dirty_records
[txgoff
], dr
);
1797 if (dr
->dr_dbuf
->db_level
!= new_nlevels
-1 &&
1798 dr
->dr_dbuf
->db_blkid
!= DMU_BONUS_BLKID
&&
1799 dr
->dr_dbuf
->db_blkid
!= DMU_SPILL_BLKID
) {
1800 ASSERT(dr
->dr_dbuf
->db_level
== old_nlevels
-1);
1801 list_remove(&dn
->dn_dirty_records
[txgoff
], dr
);
1802 list_insert_tail(&new->dt
.di
.dr_children
, dr
);
1803 dr
->dr_parent
= new;
1806 mutex_exit(&new->dt
.di
.dr_mtx
);
1807 mutex_exit(&dn
->dn_mtx
);
1811 dnode_set_nlevels(dnode_t
*dn
, int nlevels
, dmu_tx_t
*tx
)
1815 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
1817 if (dn
->dn_nlevels
== nlevels
) {
1820 } else if (nlevels
< dn
->dn_nlevels
) {
1821 ret
= SET_ERROR(EINVAL
);
1825 dnode_set_nlevels_impl(dn
, nlevels
, tx
);
1828 rw_exit(&dn
->dn_struct_rwlock
);
1832 /* read-holding callers must not rely on the lock being continuously held */
1834 dnode_new_blkid(dnode_t
*dn
, uint64_t blkid
, dmu_tx_t
*tx
, boolean_t have_read
,
1837 int epbs
, new_nlevels
;
1840 ASSERT(blkid
!= DMU_BONUS_BLKID
);
1843 RW_READ_HELD(&dn
->dn_struct_rwlock
) :
1844 RW_WRITE_HELD(&dn
->dn_struct_rwlock
));
1847 * if we have a read-lock, check to see if we need to do any work
1848 * before upgrading to a write-lock.
1851 if (blkid
<= dn
->dn_maxblkid
)
1854 if (!rw_tryupgrade(&dn
->dn_struct_rwlock
)) {
1855 rw_exit(&dn
->dn_struct_rwlock
);
1856 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
1861 * Raw sends (indicated by the force flag) require that we take the
1862 * given blkid even if the value is lower than the current value.
1864 if (!force
&& blkid
<= dn
->dn_maxblkid
)
1868 * We use the (otherwise unused) top bit of dn_next_maxblkid[txgoff]
1869 * to indicate that this field is set. This allows us to set the
1870 * maxblkid to 0 on an existing object in dnode_sync().
1872 dn
->dn_maxblkid
= blkid
;
1873 dn
->dn_next_maxblkid
[tx
->tx_txg
& TXG_MASK
] =
1874 blkid
| DMU_NEXT_MAXBLKID_SET
;
1877 * Compute the number of levels necessary to support the new maxblkid.
1878 * Raw sends will ensure nlevels is set correctly for us.
1881 epbs
= dn
->dn_indblkshift
- SPA_BLKPTRSHIFT
;
1882 for (sz
= dn
->dn_nblkptr
;
1883 sz
<= blkid
&& sz
>= dn
->dn_nblkptr
; sz
<<= epbs
)
1886 ASSERT3U(new_nlevels
, <=, DN_MAX_LEVELS
);
1889 if (new_nlevels
> dn
->dn_nlevels
)
1890 dnode_set_nlevels_impl(dn
, new_nlevels
, tx
);
1892 ASSERT3U(dn
->dn_nlevels
, >=, new_nlevels
);
1897 rw_downgrade(&dn
->dn_struct_rwlock
);
1901 dnode_dirty_l1(dnode_t
*dn
, uint64_t l1blkid
, dmu_tx_t
*tx
)
1903 dmu_buf_impl_t
*db
= dbuf_hold_level(dn
, 1, l1blkid
, FTAG
);
1905 dmu_buf_will_dirty(&db
->db
, tx
);
1906 dbuf_rele(db
, FTAG
);
1911 * Dirty all the in-core level-1 dbufs in the range specified by start_blkid
1915 dnode_dirty_l1range(dnode_t
*dn
, uint64_t start_blkid
, uint64_t end_blkid
,
1918 dmu_buf_impl_t db_search
;
1922 mutex_enter(&dn
->dn_dbufs_mtx
);
1924 db_search
.db_level
= 1;
1925 db_search
.db_blkid
= start_blkid
+ 1;
1926 db_search
.db_state
= DB_SEARCH
;
1929 db
= avl_find(&dn
->dn_dbufs
, &db_search
, &where
);
1931 db
= avl_nearest(&dn
->dn_dbufs
, where
, AVL_AFTER
);
1933 if (db
== NULL
|| db
->db_level
!= 1 ||
1934 db
->db_blkid
>= end_blkid
) {
1939 * Setup the next blkid we want to search for.
1941 db_search
.db_blkid
= db
->db_blkid
+ 1;
1942 ASSERT3U(db
->db_blkid
, >=, start_blkid
);
1945 * If the dbuf transitions to DB_EVICTING while we're trying
1946 * to dirty it, then we will be unable to discover it in
1947 * the dbuf hash table. This will result in a call to
1948 * dbuf_create() which needs to acquire the dn_dbufs_mtx
1949 * lock. To avoid a deadlock, we drop the lock before
1950 * dirtying the level-1 dbuf.
1952 mutex_exit(&dn
->dn_dbufs_mtx
);
1953 dnode_dirty_l1(dn
, db
->db_blkid
, tx
);
1954 mutex_enter(&dn
->dn_dbufs_mtx
);
1959 * Walk all the in-core level-1 dbufs and verify they have been dirtied.
1961 db_search
.db_level
= 1;
1962 db_search
.db_blkid
= start_blkid
+ 1;
1963 db_search
.db_state
= DB_SEARCH
;
1964 db
= avl_find(&dn
->dn_dbufs
, &db_search
, &where
);
1966 db
= avl_nearest(&dn
->dn_dbufs
, where
, AVL_AFTER
);
1967 for (; db
!= NULL
; db
= AVL_NEXT(&dn
->dn_dbufs
, db
)) {
1968 if (db
->db_level
!= 1 || db
->db_blkid
>= end_blkid
)
1970 if (db
->db_state
!= DB_EVICTING
)
1971 ASSERT(db
->db_dirtycnt
> 0);
1974 mutex_exit(&dn
->dn_dbufs_mtx
);
1978 dnode_free_range(dnode_t
*dn
, uint64_t off
, uint64_t len
, dmu_tx_t
*tx
)
1981 uint64_t blkoff
, blkid
, nblks
;
1982 int blksz
, blkshift
, head
, tail
;
1986 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
1987 blksz
= dn
->dn_datablksz
;
1988 blkshift
= dn
->dn_datablkshift
;
1989 epbs
= dn
->dn_indblkshift
- SPA_BLKPTRSHIFT
;
1991 if (len
== DMU_OBJECT_END
) {
1992 len
= UINT64_MAX
- off
;
1997 * First, block align the region to free:
2000 head
= P2NPHASE(off
, blksz
);
2001 blkoff
= P2PHASE(off
, blksz
);
2002 if ((off
>> blkshift
) > dn
->dn_maxblkid
)
2005 ASSERT(dn
->dn_maxblkid
== 0);
2006 if (off
== 0 && len
>= blksz
) {
2008 * Freeing the whole block; fast-track this request.
2012 if (dn
->dn_nlevels
> 1)
2013 dnode_dirty_l1(dn
, 0, tx
);
2015 } else if (off
>= blksz
) {
2016 /* Freeing past end-of-data */
2019 /* Freeing part of the block. */
2021 ASSERT3U(head
, >, 0);
2025 /* zero out any partial block data at the start of the range */
2027 ASSERT3U(blkoff
+ head
, ==, blksz
);
2030 if (dbuf_hold_impl(dn
, 0, dbuf_whichblock(dn
, 0, off
),
2031 TRUE
, FALSE
, FTAG
, &db
) == 0) {
2034 /* don't dirty if it isn't on disk and isn't dirty */
2035 if (db
->db_last_dirty
||
2036 (db
->db_blkptr
&& !BP_IS_HOLE(db
->db_blkptr
))) {
2037 rw_exit(&dn
->dn_struct_rwlock
);
2038 dmu_buf_will_dirty(&db
->db
, tx
);
2039 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
2040 data
= db
->db
.db_data
;
2041 bzero(data
+ blkoff
, head
);
2043 dbuf_rele(db
, FTAG
);
2049 /* If the range was less than one block, we're done */
2053 /* If the remaining range is past end of file, we're done */
2054 if ((off
>> blkshift
) > dn
->dn_maxblkid
)
2057 ASSERT(ISP2(blksz
));
2061 tail
= P2PHASE(len
, blksz
);
2063 ASSERT0(P2PHASE(off
, blksz
));
2064 /* zero out any partial block data at the end of the range */
2068 if (dbuf_hold_impl(dn
, 0, dbuf_whichblock(dn
, 0, off
+len
),
2069 TRUE
, FALSE
, FTAG
, &db
) == 0) {
2070 /* don't dirty if not on disk and not dirty */
2071 if (db
->db_last_dirty
||
2072 (db
->db_blkptr
&& !BP_IS_HOLE(db
->db_blkptr
))) {
2073 rw_exit(&dn
->dn_struct_rwlock
);
2074 dmu_buf_will_dirty(&db
->db
, tx
);
2075 rw_enter(&dn
->dn_struct_rwlock
, RW_WRITER
);
2076 bzero(db
->db
.db_data
, tail
);
2078 dbuf_rele(db
, FTAG
);
2083 /* If the range did not include a full block, we are done */
2087 ASSERT(IS_P2ALIGNED(off
, blksz
));
2088 ASSERT(trunc
|| IS_P2ALIGNED(len
, blksz
));
2089 blkid
= off
>> blkshift
;
2090 nblks
= len
>> blkshift
;
2095 * Dirty all the indirect blocks in this range. Note that only
2096 * the first and last indirect blocks can actually be written
2097 * (if they were partially freed) -- they must be dirtied, even if
2098 * they do not exist on disk yet. The interior blocks will
2099 * be freed by free_children(), so they will not actually be written.
2100 * Even though these interior blocks will not be written, we
2101 * dirty them for two reasons:
2103 * - It ensures that the indirect blocks remain in memory until
2104 * syncing context. (They have already been prefetched by
2105 * dmu_tx_hold_free(), so we don't have to worry about reading
2106 * them serially here.)
2108 * - The dirty space accounting will put pressure on the txg sync
2109 * mechanism to begin syncing, and to delay transactions if there
2110 * is a large amount of freeing. Even though these indirect
2111 * blocks will not be written, we could need to write the same
2112 * amount of space if we copy the freed BPs into deadlists.
2114 if (dn
->dn_nlevels
> 1) {
2115 uint64_t first
, last
;
2117 first
= blkid
>> epbs
;
2118 dnode_dirty_l1(dn
, first
, tx
);
2120 last
= dn
->dn_maxblkid
>> epbs
;
2122 last
= (blkid
+ nblks
- 1) >> epbs
;
2124 dnode_dirty_l1(dn
, last
, tx
);
2126 dnode_dirty_l1range(dn
, first
, last
, tx
);
2128 int shift
= dn
->dn_datablkshift
+ dn
->dn_indblkshift
-
2130 for (uint64_t i
= first
+ 1; i
< last
; i
++) {
2132 * Set i to the blockid of the next non-hole
2133 * level-1 indirect block at or after i. Note
2134 * that dnode_next_offset() operates in terms of
2135 * level-0-equivalent bytes.
2137 uint64_t ibyte
= i
<< shift
;
2138 int err
= dnode_next_offset(dn
, DNODE_FIND_HAVELOCK
,
2145 * Normally we should not see an error, either
2146 * from dnode_next_offset() or dbuf_hold_level()
2147 * (except for ESRCH from dnode_next_offset).
2148 * If there is an i/o error, then when we read
2149 * this block in syncing context, it will use
2150 * ZIO_FLAG_MUSTSUCCEED, and thus hang/panic according
2151 * to the "failmode" property. dnode_next_offset()
2152 * doesn't have a flag to indicate MUSTSUCCEED.
2157 dnode_dirty_l1(dn
, i
, tx
);
2163 * Add this range to the dnode range list.
2164 * We will finish up this free operation in the syncing phase.
2166 mutex_enter(&dn
->dn_mtx
);
2168 int txgoff
= tx
->tx_txg
& TXG_MASK
;
2169 if (dn
->dn_free_ranges
[txgoff
] == NULL
) {
2170 dn
->dn_free_ranges
[txgoff
] = range_tree_create(NULL
, NULL
);
2172 range_tree_clear(dn
->dn_free_ranges
[txgoff
], blkid
, nblks
);
2173 range_tree_add(dn
->dn_free_ranges
[txgoff
], blkid
, nblks
);
2175 dprintf_dnode(dn
, "blkid=%llu nblks=%llu txg=%llu\n",
2176 blkid
, nblks
, tx
->tx_txg
);
2177 mutex_exit(&dn
->dn_mtx
);
2179 dbuf_free_range(dn
, blkid
, blkid
+ nblks
- 1, tx
);
2180 dnode_setdirty(dn
, tx
);
2183 rw_exit(&dn
->dn_struct_rwlock
);
2187 dnode_spill_freed(dnode_t
*dn
)
2191 mutex_enter(&dn
->dn_mtx
);
2192 for (i
= 0; i
< TXG_SIZE
; i
++) {
2193 if (dn
->dn_rm_spillblk
[i
] == DN_KILL_SPILLBLK
)
2196 mutex_exit(&dn
->dn_mtx
);
2197 return (i
< TXG_SIZE
);
2200 /* return TRUE if this blkid was freed in a recent txg, or FALSE if it wasn't */
2202 dnode_block_freed(dnode_t
*dn
, uint64_t blkid
)
2204 void *dp
= spa_get_dsl(dn
->dn_objset
->os_spa
);
2207 if (blkid
== DMU_BONUS_BLKID
)
2211 * If we're in the process of opening the pool, dp will not be
2212 * set yet, but there shouldn't be anything dirty.
2217 if (dn
->dn_free_txg
)
2220 if (blkid
== DMU_SPILL_BLKID
)
2221 return (dnode_spill_freed(dn
));
2223 mutex_enter(&dn
->dn_mtx
);
2224 for (i
= 0; i
< TXG_SIZE
; i
++) {
2225 if (dn
->dn_free_ranges
[i
] != NULL
&&
2226 range_tree_contains(dn
->dn_free_ranges
[i
], blkid
, 1))
2229 mutex_exit(&dn
->dn_mtx
);
2230 return (i
< TXG_SIZE
);
2233 /* call from syncing context when we actually write/free space for this dnode */
2235 dnode_diduse_space(dnode_t
*dn
, int64_t delta
)
2238 dprintf_dnode(dn
, "dn=%p dnp=%p used=%llu delta=%lld\n",
2240 (u_longlong_t
)dn
->dn_phys
->dn_used
,
2243 mutex_enter(&dn
->dn_mtx
);
2244 space
= DN_USED_BYTES(dn
->dn_phys
);
2246 ASSERT3U(space
+ delta
, >=, space
); /* no overflow */
2248 ASSERT3U(space
, >=, -delta
); /* no underflow */
2251 if (spa_version(dn
->dn_objset
->os_spa
) < SPA_VERSION_DNODE_BYTES
) {
2252 ASSERT((dn
->dn_phys
->dn_flags
& DNODE_FLAG_USED_BYTES
) == 0);
2253 ASSERT0(P2PHASE(space
, 1<<DEV_BSHIFT
));
2254 dn
->dn_phys
->dn_used
= space
>> DEV_BSHIFT
;
2256 dn
->dn_phys
->dn_used
= space
;
2257 dn
->dn_phys
->dn_flags
|= DNODE_FLAG_USED_BYTES
;
2259 mutex_exit(&dn
->dn_mtx
);
2263 * Scans a block at the indicated "level" looking for a hole or data,
2264 * depending on 'flags'.
2266 * If level > 0, then we are scanning an indirect block looking at its
2267 * pointers. If level == 0, then we are looking at a block of dnodes.
2269 * If we don't find what we are looking for in the block, we return ESRCH.
2270 * Otherwise, return with *offset pointing to the beginning (if searching
2271 * forwards) or end (if searching backwards) of the range covered by the
2272 * block pointer we matched on (or dnode).
2274 * The basic search algorithm used below by dnode_next_offset() is to
2275 * use this function to search up the block tree (widen the search) until
2276 * we find something (i.e., we don't return ESRCH) and then search back
2277 * down the tree (narrow the search) until we reach our original search
2281 dnode_next_offset_level(dnode_t
*dn
, int flags
, uint64_t *offset
,
2282 int lvl
, uint64_t blkfill
, uint64_t txg
)
2284 dmu_buf_impl_t
*db
= NULL
;
2286 uint64_t epbs
= dn
->dn_phys
->dn_indblkshift
- SPA_BLKPTRSHIFT
;
2287 uint64_t epb
= 1ULL << epbs
;
2288 uint64_t minfill
, maxfill
;
2290 int i
, inc
, error
, span
;
2292 hole
= ((flags
& DNODE_FIND_HOLE
) != 0);
2293 inc
= (flags
& DNODE_FIND_BACKWARDS
) ? -1 : 1;
2294 ASSERT(txg
== 0 || !hole
);
2296 if (lvl
== dn
->dn_phys
->dn_nlevels
) {
2298 epb
= dn
->dn_phys
->dn_nblkptr
;
2299 data
= dn
->dn_phys
->dn_blkptr
;
2301 uint64_t blkid
= dbuf_whichblock(dn
, lvl
, *offset
);
2302 error
= dbuf_hold_impl(dn
, lvl
, blkid
, TRUE
, FALSE
, FTAG
, &db
);
2304 if (error
!= ENOENT
)
2309 * This can only happen when we are searching up
2310 * the block tree for data. We don't really need to
2311 * adjust the offset, as we will just end up looking
2312 * at the pointer to this block in its parent, and its
2313 * going to be unallocated, so we will skip over it.
2315 return (SET_ERROR(ESRCH
));
2317 error
= dbuf_read(db
, NULL
,
2318 DB_RF_CANFAIL
| DB_RF_HAVESTRUCT
| DB_RF_NO_DECRYPT
);
2320 dbuf_rele(db
, FTAG
);
2323 data
= db
->db
.db_data
;
2327 if (db
!= NULL
&& txg
!= 0 && (db
->db_blkptr
== NULL
||
2328 db
->db_blkptr
->blk_birth
<= txg
||
2329 BP_IS_HOLE(db
->db_blkptr
))) {
2331 * This can only happen when we are searching up the tree
2332 * and these conditions mean that we need to keep climbing.
2334 error
= SET_ERROR(ESRCH
);
2335 } else if (lvl
== 0) {
2336 dnode_phys_t
*dnp
= data
;
2338 ASSERT(dn
->dn_type
== DMU_OT_DNODE
);
2339 ASSERT(!(flags
& DNODE_FIND_BACKWARDS
));
2341 for (i
= (*offset
>> DNODE_SHIFT
) & (blkfill
- 1);
2342 i
< blkfill
; i
+= dnp
[i
].dn_extra_slots
+ 1) {
2343 if ((dnp
[i
].dn_type
== DMU_OT_NONE
) == hole
)
2348 error
= SET_ERROR(ESRCH
);
2350 *offset
= (*offset
& ~(DNODE_BLOCK_SIZE
- 1)) +
2353 blkptr_t
*bp
= data
;
2354 uint64_t start
= *offset
;
2355 span
= (lvl
- 1) * epbs
+ dn
->dn_datablkshift
;
2357 maxfill
= blkfill
<< ((lvl
- 1) * epbs
);
2364 if (span
>= 8 * sizeof (*offset
)) {
2365 /* This only happens on the highest indirection level */
2366 ASSERT3U((lvl
- 1), ==, dn
->dn_phys
->dn_nlevels
- 1);
2369 *offset
= *offset
>> span
;
2372 for (i
= BF64_GET(*offset
, 0, epbs
);
2373 i
>= 0 && i
< epb
; i
+= inc
) {
2374 if (BP_GET_FILL(&bp
[i
]) >= minfill
&&
2375 BP_GET_FILL(&bp
[i
]) <= maxfill
&&
2376 (hole
|| bp
[i
].blk_birth
> txg
))
2378 if (inc
> 0 || *offset
> 0)
2382 if (span
>= 8 * sizeof (*offset
)) {
2385 *offset
= *offset
<< span
;
2389 /* traversing backwards; position offset at the end */
2390 ASSERT3U(*offset
, <=, start
);
2391 *offset
= MIN(*offset
+ (1ULL << span
) - 1, start
);
2392 } else if (*offset
< start
) {
2395 if (i
< 0 || i
>= epb
)
2396 error
= SET_ERROR(ESRCH
);
2400 dbuf_rele(db
, FTAG
);
2406 * Find the next hole, data, or sparse region at or after *offset.
2407 * The value 'blkfill' tells us how many items we expect to find
2408 * in an L0 data block; this value is 1 for normal objects,
2409 * DNODES_PER_BLOCK for the meta dnode, and some fraction of
2410 * DNODES_PER_BLOCK when searching for sparse regions thereof.
2414 * dnode_next_offset(dn, flags, offset, 1, 1, 0);
2415 * Finds the next/previous hole/data in a file.
2416 * Used in dmu_offset_next().
2418 * dnode_next_offset(mdn, flags, offset, 0, DNODES_PER_BLOCK, txg);
2419 * Finds the next free/allocated dnode an objset's meta-dnode.
2420 * Only finds objects that have new contents since txg (ie.
2421 * bonus buffer changes and content removal are ignored).
2422 * Used in dmu_object_next().
2424 * dnode_next_offset(mdn, DNODE_FIND_HOLE, offset, 2, DNODES_PER_BLOCK >> 2, 0);
2425 * Finds the next L2 meta-dnode bp that's at most 1/4 full.
2426 * Used in dmu_object_alloc().
2429 dnode_next_offset(dnode_t
*dn
, int flags
, uint64_t *offset
,
2430 int minlvl
, uint64_t blkfill
, uint64_t txg
)
2432 uint64_t initial_offset
= *offset
;
2436 if (!(flags
& DNODE_FIND_HAVELOCK
))
2437 rw_enter(&dn
->dn_struct_rwlock
, RW_READER
);
2439 if (dn
->dn_phys
->dn_nlevels
== 0) {
2440 error
= SET_ERROR(ESRCH
);
2444 if (dn
->dn_datablkshift
== 0) {
2445 if (*offset
< dn
->dn_datablksz
) {
2446 if (flags
& DNODE_FIND_HOLE
)
2447 *offset
= dn
->dn_datablksz
;
2449 error
= SET_ERROR(ESRCH
);
2454 maxlvl
= dn
->dn_phys
->dn_nlevels
;
2456 for (lvl
= minlvl
; lvl
<= maxlvl
; lvl
++) {
2457 error
= dnode_next_offset_level(dn
,
2458 flags
, offset
, lvl
, blkfill
, txg
);
2463 while (error
== 0 && --lvl
>= minlvl
) {
2464 error
= dnode_next_offset_level(dn
,
2465 flags
, offset
, lvl
, blkfill
, txg
);
2469 * There's always a "virtual hole" at the end of the object, even
2470 * if all BP's which physically exist are non-holes.
2472 if ((flags
& DNODE_FIND_HOLE
) && error
== ESRCH
&& txg
== 0 &&
2473 minlvl
== 1 && blkfill
== 1 && !(flags
& DNODE_FIND_BACKWARDS
)) {
2477 if (error
== 0 && (flags
& DNODE_FIND_BACKWARDS
?
2478 initial_offset
< *offset
: initial_offset
> *offset
))
2479 error
= SET_ERROR(ESRCH
);
2481 if (!(flags
& DNODE_FIND_HAVELOCK
))
2482 rw_exit(&dn
->dn_struct_rwlock
);