1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21 /*
22 * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
23 * Copyright (c) 2012 by Delphix. All rights reserved.
24 * Copyright (c) 2012, Joyent, Inc. All rights reserved.
25 */
26
27 /* Portions Copyright 2010 Robert Milkowski */
28
29 #include <sys/cred.h>
30 #include <sys/zfs_context.h>
31 #include <sys/dmu_objset.h>
32 #include <sys/dsl_dir.h>
33 #include <sys/dsl_dataset.h>
34 #include <sys/dsl_prop.h>
35 #include <sys/dsl_pool.h>
36 #include <sys/dsl_synctask.h>
37 #include <sys/dsl_deleg.h>
38 #include <sys/dnode.h>
39 #include <sys/dbuf.h>
40 #include <sys/zvol.h>
41 #include <sys/dmu_tx.h>
42 #include <sys/zap.h>
43 #include <sys/zil.h>
44 #include <sys/dmu_impl.h>
45 #include <sys/zfs_ioctl.h>
46 #include <sys/sa.h>
47 #include <sys/zfs_onexit.h>
48
49 /*
50 * Needed to close a window in dnode_move() that allows the objset to be freed
51 * before it can be safely accessed.
52 */
53 krwlock_t os_lock;
54
55 void
56 dmu_objset_init(void)
57 {
58 rw_init(&os_lock, NULL, RW_DEFAULT, NULL);
59 }
60
61 void
62 dmu_objset_fini(void)
63 {
64 rw_destroy(&os_lock);
65 }
66
67 spa_t *
68 dmu_objset_spa(objset_t *os)
69 {
70 return (os->os_spa);
71 }
72
73 zilog_t *
74 dmu_objset_zil(objset_t *os)
75 {
76 return (os->os_zil);
77 }
78
79 dsl_pool_t *
80 dmu_objset_pool(objset_t *os)
81 {
82 dsl_dataset_t *ds;
83
84 if ((ds = os->os_dsl_dataset) != NULL && ds->ds_dir)
85 return (ds->ds_dir->dd_pool);
86 else
87 return (spa_get_dsl(os->os_spa));
88 }
89
90 dsl_dataset_t *
91 dmu_objset_ds(objset_t *os)
92 {
93 return (os->os_dsl_dataset);
94 }
95
96 dmu_objset_type_t
97 dmu_objset_type(objset_t *os)
98 {
99 return (os->os_phys->os_type);
100 }
101
102 void
103 dmu_objset_name(objset_t *os, char *buf)
104 {
105 dsl_dataset_name(os->os_dsl_dataset, buf);
106 }
107
108 uint64_t
109 dmu_objset_id(objset_t *os)
110 {
111 dsl_dataset_t *ds = os->os_dsl_dataset;
112
113 return (ds ? ds->ds_object : 0);
114 }
115
116 uint64_t
117 dmu_objset_syncprop(objset_t *os)
118 {
119 return (os->os_sync);
120 }
121
122 uint64_t
123 dmu_objset_logbias(objset_t *os)
124 {
125 return (os->os_logbias);
126 }
127
128 static void
129 checksum_changed_cb(void *arg, uint64_t newval)
130 {
131 objset_t *os = arg;
132
133 /*
134 * Inheritance should have been done by now.
135 */
136 ASSERT(newval != ZIO_CHECKSUM_INHERIT);
137
138 os->os_checksum = zio_checksum_select(newval, ZIO_CHECKSUM_ON_VALUE);
139 }
140
141 static void
142 compression_changed_cb(void *arg, uint64_t newval)
143 {
144 objset_t *os = arg;
145
146 /*
147 * Inheritance and range checking should have been done by now.
148 */
149 ASSERT(newval != ZIO_COMPRESS_INHERIT);
150
151 os->os_compress = zio_compress_select(newval, ZIO_COMPRESS_ON_VALUE);
152 }
153
154 static void
155 copies_changed_cb(void *arg, uint64_t newval)
156 {
157 objset_t *os = arg;
158
159 /*
160 * Inheritance and range checking should have been done by now.
161 */
162 ASSERT(newval > 0);
163 ASSERT(newval <= spa_max_replication(os->os_spa));
164
165 os->os_copies = newval;
166 }
167
168 static void
169 dedup_changed_cb(void *arg, uint64_t newval)
170 {
171 objset_t *os = arg;
172 spa_t *spa = os->os_spa;
173 enum zio_checksum checksum;
174
175 /*
176 * Inheritance should have been done by now.
177 */
178 ASSERT(newval != ZIO_CHECKSUM_INHERIT);
179
180 checksum = zio_checksum_dedup_select(spa, newval, ZIO_CHECKSUM_OFF);
181
182 os->os_dedup_checksum = checksum & ZIO_CHECKSUM_MASK;
183 os->os_dedup_verify = !!(checksum & ZIO_CHECKSUM_VERIFY);
184 }
185
186 static void
187 primary_cache_changed_cb(void *arg, uint64_t newval)
188 {
189 objset_t *os = arg;
190
191 /*
192 * Inheritance and range checking should have been done by now.
193 */
194 ASSERT(newval == ZFS_CACHE_ALL || newval == ZFS_CACHE_NONE ||
195 newval == ZFS_CACHE_METADATA);
196
197 os->os_primary_cache = newval;
198 }
199
200 static void
201 secondary_cache_changed_cb(void *arg, uint64_t newval)
202 {
203 objset_t *os = arg;
204
205 /*
206 * Inheritance and range checking should have been done by now.
207 */
208 ASSERT(newval == ZFS_CACHE_ALL || newval == ZFS_CACHE_NONE ||
209 newval == ZFS_CACHE_METADATA);
210
211 os->os_secondary_cache = newval;
212 }
213
214 static void
215 sync_changed_cb(void *arg, uint64_t newval)
216 {
217 objset_t *os = arg;
218
219 /*
220 * Inheritance and range checking should have been done by now.
221 */
222 ASSERT(newval == ZFS_SYNC_STANDARD || newval == ZFS_SYNC_ALWAYS ||
223 newval == ZFS_SYNC_DISABLED);
224
225 os->os_sync = newval;
226 if (os->os_zil)
227 zil_set_sync(os->os_zil, newval);
228 }
229
230 static void
231 logbias_changed_cb(void *arg, uint64_t newval)
232 {
233 objset_t *os = arg;
234
235 ASSERT(newval == ZFS_LOGBIAS_LATENCY ||
236 newval == ZFS_LOGBIAS_THROUGHPUT);
237 os->os_logbias = newval;
238 if (os->os_zil)
239 zil_set_logbias(os->os_zil, newval);
240 }
241
242 void
243 dmu_objset_byteswap(void *buf, size_t size)
244 {
245 objset_phys_t *osp = buf;
246
247 ASSERT(size == OBJSET_OLD_PHYS_SIZE || size == sizeof (objset_phys_t));
248 dnode_byteswap(&osp->os_meta_dnode);
249 byteswap_uint64_array(&osp->os_zil_header, sizeof (zil_header_t));
250 osp->os_type = BSWAP_64(osp->os_type);
251 osp->os_flags = BSWAP_64(osp->os_flags);
252 if (size == sizeof (objset_phys_t)) {
253 dnode_byteswap(&osp->os_userused_dnode);
254 dnode_byteswap(&osp->os_groupused_dnode);
255 }
256 }
257
258 int
259 dmu_objset_open_impl(spa_t *spa, dsl_dataset_t *ds, blkptr_t *bp,
260 objset_t **osp)
261 {
262 objset_t *os;
263 int i, err;
264
265 ASSERT(ds == NULL || MUTEX_HELD(&ds->ds_opening_lock));
266
267 os = kmem_zalloc(sizeof (objset_t), KM_SLEEP);
268 os->os_dsl_dataset = ds;
269 os->os_spa = spa;
270 os->os_rootbp = bp;
271 if (!BP_IS_HOLE(os->os_rootbp)) {
272 uint32_t aflags = ARC_WAIT;
273 zbookmark_t zb;
274 SET_BOOKMARK(&zb, ds ? ds->ds_object : DMU_META_OBJSET,
275 ZB_ROOT_OBJECT, ZB_ROOT_LEVEL, ZB_ROOT_BLKID);
276
277 if (DMU_OS_IS_L2CACHEABLE(os))
278 aflags |= ARC_L2CACHE;
279
280 dprintf_bp(os->os_rootbp, "reading %s", "");
281 /*
282 * XXX when bprewrite scrub can change the bp,
283 * and this is called from dmu_objset_open_ds_os, the bp
284 * could change, and we'll need a lock.
285 */
286 err = dsl_read_nolock(NULL, spa, os->os_rootbp,
287 arc_getbuf_func, &os->os_phys_buf,
288 ZIO_PRIORITY_SYNC_READ, ZIO_FLAG_CANFAIL, &aflags, &zb);
289 if (err) {
290 kmem_free(os, sizeof (objset_t));
291 /* convert checksum errors into IO errors */
292 if (err == ECKSUM)
293 err = EIO;
294 return (err);
295 }
296
297 /* Increase the blocksize if we are permitted. */
298 if (spa_version(spa) >= SPA_VERSION_USERSPACE &&
299 arc_buf_size(os->os_phys_buf) < sizeof (objset_phys_t)) {
300 arc_buf_t *buf = arc_buf_alloc(spa,
301 sizeof (objset_phys_t), &os->os_phys_buf,
302 ARC_BUFC_METADATA);
303 bzero(buf->b_data, sizeof (objset_phys_t));
304 bcopy(os->os_phys_buf->b_data, buf->b_data,
305 arc_buf_size(os->os_phys_buf));
306 (void) arc_buf_remove_ref(os->os_phys_buf,
307 &os->os_phys_buf);
308 os->os_phys_buf = buf;
309 }
310
311 os->os_phys = os->os_phys_buf->b_data;
312 os->os_flags = os->os_phys->os_flags;
313 } else {
314 int size = spa_version(spa) >= SPA_VERSION_USERSPACE ?
315 sizeof (objset_phys_t) : OBJSET_OLD_PHYS_SIZE;
316 os->os_phys_buf = arc_buf_alloc(spa, size,
317 &os->os_phys_buf, ARC_BUFC_METADATA);
318 os->os_phys = os->os_phys_buf->b_data;
319 bzero(os->os_phys, size);
320 }
321
322 /*
323 * Note: the changed_cb will be called once before the register
324 * func returns, thus changing the checksum/compression from the
325 * default (fletcher2/off). Snapshots don't need to know about
326 * checksum/compression/copies.
327 */
328 if (ds) {
329 err = dsl_prop_register(ds, "primarycache",
330 primary_cache_changed_cb, os);
331 if (err == 0)
332 err = dsl_prop_register(ds, "secondarycache",
333 secondary_cache_changed_cb, os);
334 if (!dsl_dataset_is_snapshot(ds)) {
335 if (err == 0)
336 err = dsl_prop_register(ds, "checksum",
337 checksum_changed_cb, os);
338 if (err == 0)
339 err = dsl_prop_register(ds, "compression",
340 compression_changed_cb, os);
341 if (err == 0)
342 err = dsl_prop_register(ds, "copies",
343 copies_changed_cb, os);
344 if (err == 0)
345 err = dsl_prop_register(ds, "dedup",
346 dedup_changed_cb, os);
347 if (err == 0)
348 err = dsl_prop_register(ds, "logbias",
349 logbias_changed_cb, os);
350 if (err == 0)
351 err = dsl_prop_register(ds, "sync",
352 sync_changed_cb, os);
353 }
354 if (err) {
355 VERIFY(arc_buf_remove_ref(os->os_phys_buf,
356 &os->os_phys_buf) == 1);
357 kmem_free(os, sizeof (objset_t));
358 return (err);
359 }
360 } else if (ds == NULL) {
361 /* It's the meta-objset. */
362 os->os_checksum = ZIO_CHECKSUM_FLETCHER_4;
363 os->os_compress = ZIO_COMPRESS_LZJB;
364 os->os_copies = spa_max_replication(spa);
365 os->os_dedup_checksum = ZIO_CHECKSUM_OFF;
366 os->os_dedup_verify = 0;
367 os->os_logbias = 0;
368 os->os_sync = 0;
369 os->os_primary_cache = ZFS_CACHE_ALL;
370 os->os_secondary_cache = ZFS_CACHE_ALL;
371 }
372
373 if (ds == NULL || !dsl_dataset_is_snapshot(ds))
374 os->os_zil_header = os->os_phys->os_zil_header;
375 os->os_zil = zil_alloc(os, &os->os_zil_header);
376
377 for (i = 0; i < TXG_SIZE; i++) {
378 list_create(&os->os_dirty_dnodes[i], sizeof (dnode_t),
379 offsetof(dnode_t, dn_dirty_link[i]));
380 list_create(&os->os_free_dnodes[i], sizeof (dnode_t),
381 offsetof(dnode_t, dn_dirty_link[i]));
382 }
383 list_create(&os->os_dnodes, sizeof (dnode_t),
384 offsetof(dnode_t, dn_link));
385 list_create(&os->os_downgraded_dbufs, sizeof (dmu_buf_impl_t),
386 offsetof(dmu_buf_impl_t, db_link));
387
388 mutex_init(&os->os_lock, NULL, MUTEX_DEFAULT, NULL);
389 mutex_init(&os->os_obj_lock, NULL, MUTEX_DEFAULT, NULL);
390 mutex_init(&os->os_user_ptr_lock, NULL, MUTEX_DEFAULT, NULL);
391
392 DMU_META_DNODE(os) = dnode_special_open(os,
393 &os->os_phys->os_meta_dnode, DMU_META_DNODE_OBJECT,
394 &os->os_meta_dnode);
395 if (arc_buf_size(os->os_phys_buf) >= sizeof (objset_phys_t)) {
396 DMU_USERUSED_DNODE(os) = dnode_special_open(os,
397 &os->os_phys->os_userused_dnode, DMU_USERUSED_OBJECT,
398 &os->os_userused_dnode);
399 DMU_GROUPUSED_DNODE(os) = dnode_special_open(os,
400 &os->os_phys->os_groupused_dnode, DMU_GROUPUSED_OBJECT,
401 &os->os_groupused_dnode);
402 }
403
404 /*
405 * We should be the only thread trying to do this because we
406 * have ds_opening_lock
407 */
408 if (ds) {
409 mutex_enter(&ds->ds_lock);
410 ASSERT(ds->ds_objset == NULL);
411 ds->ds_objset = os;
412 mutex_exit(&ds->ds_lock);
413 }
414
415 *osp = os;
416 return (0);
417 }
418
419 int
420 dmu_objset_from_ds(dsl_dataset_t *ds, objset_t **osp)
421 {
422 int err = 0;
423
424 mutex_enter(&ds->ds_opening_lock);
425 *osp = ds->ds_objset;
426 if (*osp == NULL) {
427 err = dmu_objset_open_impl(dsl_dataset_get_spa(ds),
428 ds, dsl_dataset_get_blkptr(ds), osp);
429 }
430 mutex_exit(&ds->ds_opening_lock);
431 return (err);
432 }
433
434 /* called from zpl */
435 int
436 dmu_objset_hold(const char *name, void *tag, objset_t **osp)
437 {
438 dsl_dataset_t *ds;
439 int err;
440
441 err = dsl_dataset_hold(name, tag, &ds);
442 if (err)
443 return (err);
444
445 err = dmu_objset_from_ds(ds, osp);
446 if (err)
447 dsl_dataset_rele(ds, tag);
448
449 return (err);
450 }
451
452 /* called from zpl */
453 int
454 dmu_objset_own(const char *name, dmu_objset_type_t type,
455 boolean_t readonly, void *tag, objset_t **osp)
456 {
457 dsl_dataset_t *ds;
458 int err;
459
460 err = dsl_dataset_own(name, B_FALSE, tag, &ds);
461 if (err)
462 return (err);
463
464 err = dmu_objset_from_ds(ds, osp);
465 if (err) {
466 dsl_dataset_disown(ds, tag);
467 } else if (type != DMU_OST_ANY && type != (*osp)->os_phys->os_type) {
468 dmu_objset_disown(*osp, tag);
469 return (EINVAL);
470 } else if (!readonly && dsl_dataset_is_snapshot(ds)) {
471 dmu_objset_disown(*osp, tag);
472 return (EROFS);
473 }
474 return (err);
475 }
476
477 void
478 dmu_objset_rele(objset_t *os, void *tag)
479 {
480 dsl_dataset_rele(os->os_dsl_dataset, tag);
481 }
482
483 void
484 dmu_objset_disown(objset_t *os, void *tag)
485 {
486 dsl_dataset_disown(os->os_dsl_dataset, tag);
487 }
488
489 int
490 dmu_objset_evict_dbufs(objset_t *os)
491 {
492 dnode_t *dn;
493
494 mutex_enter(&os->os_lock);
495
496 /* process the mdn last, since the other dnodes have holds on it */
497 list_remove(&os->os_dnodes, DMU_META_DNODE(os));
498 list_insert_tail(&os->os_dnodes, DMU_META_DNODE(os));
499
500 /*
501 * Find the first dnode with holds. We have to do this dance
502 * because dnode_add_ref() only works if you already have a
503 * hold. If there are no holds then it has no dbufs so OK to
504 * skip.
505 */
506 for (dn = list_head(&os->os_dnodes);
507 dn && !dnode_add_ref(dn, FTAG);
508 dn = list_next(&os->os_dnodes, dn))
509 continue;
510
511 while (dn) {
512 dnode_t *next_dn = dn;
513
514 do {
515 next_dn = list_next(&os->os_dnodes, next_dn);
516 } while (next_dn && !dnode_add_ref(next_dn, FTAG));
517
518 mutex_exit(&os->os_lock);
519 dnode_evict_dbufs(dn);
520 dnode_rele(dn, FTAG);
521 mutex_enter(&os->os_lock);
522 dn = next_dn;
523 }
524 dn = list_head(&os->os_dnodes);
525 mutex_exit(&os->os_lock);
526 return (dn != DMU_META_DNODE(os));
527 }
528
529 void
530 dmu_objset_evict(objset_t *os)
531 {
532 dsl_dataset_t *ds = os->os_dsl_dataset;
533
534 for (int t = 0; t < TXG_SIZE; t++)
535 ASSERT(!dmu_objset_is_dirty(os, t));
536
537 if (ds) {
538 if (!dsl_dataset_is_snapshot(ds)) {
539 VERIFY(0 == dsl_prop_unregister(ds, "checksum",
540 checksum_changed_cb, os));
541 VERIFY(0 == dsl_prop_unregister(ds, "compression",
542 compression_changed_cb, os));
543 VERIFY(0 == dsl_prop_unregister(ds, "copies",
544 copies_changed_cb, os));
545 VERIFY(0 == dsl_prop_unregister(ds, "dedup",
546 dedup_changed_cb, os));
547 VERIFY(0 == dsl_prop_unregister(ds, "logbias",
548 logbias_changed_cb, os));
549 VERIFY(0 == dsl_prop_unregister(ds, "sync",
550 sync_changed_cb, os));
551 }
552 VERIFY(0 == dsl_prop_unregister(ds, "primarycache",
553 primary_cache_changed_cb, os));
554 VERIFY(0 == dsl_prop_unregister(ds, "secondarycache",
555 secondary_cache_changed_cb, os));
556 }
557
558 if (os->os_sa)
559 sa_tear_down(os);
560
561 /*
562 * We should need only a single pass over the dnode list, since
563 * nothing can be added to the list at this point.
564 */
565 (void) dmu_objset_evict_dbufs(os);
566
567 dnode_special_close(&os->os_meta_dnode);
568 if (DMU_USERUSED_DNODE(os)) {
569 dnode_special_close(&os->os_userused_dnode);
570 dnode_special_close(&os->os_groupused_dnode);
571 }
572 zil_free(os->os_zil);
573
574 ASSERT3P(list_head(&os->os_dnodes), ==, NULL);
575
576 VERIFY(arc_buf_remove_ref(os->os_phys_buf, &os->os_phys_buf) == 1);
577
578 /*
579 * This is a barrier to prevent the objset from going away in
580 * dnode_move() until we can safely ensure that the objset is still in
581 * use. We consider the objset valid before the barrier and invalid
582 * after the barrier.
583 */
584 rw_enter(&os_lock, RW_READER);
585 rw_exit(&os_lock);
586
587 mutex_destroy(&os->os_lock);
588 mutex_destroy(&os->os_obj_lock);
589 mutex_destroy(&os->os_user_ptr_lock);
590 kmem_free(os, sizeof (objset_t));
591 }
592
593 timestruc_t
594 dmu_objset_snap_cmtime(objset_t *os)
595 {
596 return (dsl_dir_snap_cmtime(os->os_dsl_dataset->ds_dir));
597 }
598
599 /* called from dsl for meta-objset */
600 objset_t *
601 dmu_objset_create_impl(spa_t *spa, dsl_dataset_t *ds, blkptr_t *bp,
602 dmu_objset_type_t type, dmu_tx_t *tx)
603 {
604 objset_t *os;
605 dnode_t *mdn;
606
607 ASSERT(dmu_tx_is_syncing(tx));
608 if (ds != NULL)
609 VERIFY(0 == dmu_objset_from_ds(ds, &os));
610 else
611 VERIFY(0 == dmu_objset_open_impl(spa, NULL, bp, &os));
612
613 mdn = DMU_META_DNODE(os);
614
615 dnode_allocate(mdn, DMU_OT_DNODE, 1 << DNODE_BLOCK_SHIFT,
616 DN_MAX_INDBLKSHIFT, DMU_OT_NONE, 0, tx);
617
618 /*
619 * We don't want to have to increase the meta-dnode's nlevels
620 * later, because then we could do it in quescing context while
621 * we are also accessing it in open context.
622 *
623 * This precaution is not necessary for the MOS (ds == NULL),
624 * because the MOS is only updated in syncing context.
625 * This is most fortunate: the MOS is the only objset that
626 * needs to be synced multiple times as spa_sync() iterates
627 * to convergence, so minimizing its dn_nlevels matters.
628 */
629 if (ds != NULL) {
630 int levels = 1;
631
632 /*
633 * Determine the number of levels necessary for the meta-dnode
634 * to contain DN_MAX_OBJECT dnodes.
635 */
636 while ((uint64_t)mdn->dn_nblkptr << (mdn->dn_datablkshift +
637 (levels - 1) * (mdn->dn_indblkshift - SPA_BLKPTRSHIFT)) <
638 DN_MAX_OBJECT * sizeof (dnode_phys_t))
639 levels++;
640
641 mdn->dn_next_nlevels[tx->tx_txg & TXG_MASK] =
642 mdn->dn_nlevels = levels;
643 }
644
645 ASSERT(type != DMU_OST_NONE);
646 ASSERT(type != DMU_OST_ANY);
647 ASSERT(type < DMU_OST_NUMTYPES);
648 os->os_phys->os_type = type;
649 if (dmu_objset_userused_enabled(os)) {
650 os->os_phys->os_flags |= OBJSET_FLAG_USERACCOUNTING_COMPLETE;
651 os->os_flags = os->os_phys->os_flags;
652 }
653
654 dsl_dataset_dirty(ds, tx);
655
656 return (os);
657 }
658
659 struct oscarg {
660 void (*userfunc)(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx);
661 void *userarg;
662 dsl_dataset_t *clone_origin;
663 const char *lastname;
664 dmu_objset_type_t type;
665 uint64_t flags;
666 cred_t *cr;
667 };
668
669 /*ARGSUSED*/
670 static int
671 dmu_objset_create_check(void *arg1, void *arg2, dmu_tx_t *tx)
672 {
673 dsl_dir_t *dd = arg1;
674 struct oscarg *oa = arg2;
675 objset_t *mos = dd->dd_pool->dp_meta_objset;
676 int err;
677 uint64_t ddobj;
678
679 err = zap_lookup(mos, dd->dd_phys->dd_child_dir_zapobj,
680 oa->lastname, sizeof (uint64_t), 1, &ddobj);
681 if (err != ENOENT)
682 return (err ? err : EEXIST);
683
684 if (oa->clone_origin != NULL) {
685 /* You can't clone across pools. */
686 if (oa->clone_origin->ds_dir->dd_pool != dd->dd_pool)
687 return (EXDEV);
688
689 /* You can only clone snapshots, not the head datasets. */
690 if (!dsl_dataset_is_snapshot(oa->clone_origin))
691 return (EINVAL);
692 }
693
694 return (dsl_dir_fscount_check(dd, 1, NULL));
695 }
696
697 static void
698 dmu_objset_create_sync(void *arg1, void *arg2, dmu_tx_t *tx)
699 {
700 dsl_dir_t *dd = arg1;
701 spa_t *spa = dd->dd_pool->dp_spa;
702 struct oscarg *oa = arg2;
703 uint64_t obj;
704 dsl_dataset_t *ds;
705 blkptr_t *bp;
706
707 ASSERT(dmu_tx_is_syncing(tx));
708
709 dsl_dir_fscount_adjust(dd, tx, 1, B_TRUE, B_TRUE);
710
711 obj = dsl_dataset_create_sync(dd, oa->lastname,
712 oa->clone_origin, oa->flags, oa->cr, tx);
713
714 VERIFY3U(0, ==, dsl_dataset_hold_obj(dd->dd_pool, obj, FTAG, &ds));
715 bp = dsl_dataset_get_blkptr(ds);
716 if (BP_IS_HOLE(bp)) {
717 objset_t *os =
718 dmu_objset_create_impl(spa, ds, bp, oa->type, tx);
719
720 if (oa->userfunc)
721 oa->userfunc(os, oa->userarg, oa->cr, tx);
722 }
723
724 if (oa->clone_origin == NULL) {
725 spa_history_log_internal_ds(ds, "create", tx, "");
726 } else {
727 char namebuf[MAXNAMELEN];
728 dsl_dataset_name(oa->clone_origin, namebuf);
729 spa_history_log_internal_ds(ds, "clone", tx,
730 "origin=%s (%llu)", namebuf, oa->clone_origin->ds_object);
731 }
732 dsl_dataset_rele(ds, FTAG);
733 }
734
735 int
736 dmu_objset_create(const char *name, dmu_objset_type_t type, uint64_t flags,
737 void (*func)(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx), void *arg)
738 {
739 dsl_dir_t *pdd;
740 const char *tail;
741 int err = 0;
742 struct oscarg oa = { 0 };
743
744 ASSERT(strchr(name, '@') == NULL);
745 err = dsl_dir_open(name, FTAG, &pdd, &tail);
746 if (err)
747 return (err);
748 if (tail == NULL) {
749 dsl_dir_close(pdd, FTAG);
750 return (EEXIST);
751 }
752
753 oa.userfunc = func;
754 oa.userarg = arg;
755 oa.lastname = tail;
756 oa.type = type;
757 oa.flags = flags;
758 oa.cr = CRED();
759
760 err = dsl_sync_task_do(pdd->dd_pool, dmu_objset_create_check,
761 dmu_objset_create_sync, pdd, &oa, 5);
762 dsl_dir_close(pdd, FTAG);
763 return (err);
764 }
765
766 int
767 dmu_objset_clone(const char *name, dsl_dataset_t *clone_origin, uint64_t flags)
768 {
769 dsl_dir_t *pdd;
770 const char *tail;
771 int err = 0;
772 struct oscarg oa = { 0 };
773
774 ASSERT(strchr(name, '@') == NULL);
775 err = dsl_dir_open(name, FTAG, &pdd, &tail);
776 if (err)
777 return (err);
778 if (tail == NULL) {
779 dsl_dir_close(pdd, FTAG);
780 return (EEXIST);
781 }
782
783 oa.lastname = tail;
784 oa.clone_origin = clone_origin;
785 oa.flags = flags;
786 oa.cr = CRED();
787
788 err = dsl_sync_task_do(pdd->dd_pool, dmu_objset_create_check,
789 dmu_objset_create_sync, pdd, &oa, 5);
790 dsl_dir_close(pdd, FTAG);
791 return (err);
792 }
793
794 int
795 dmu_objset_destroy(const char *name, boolean_t defer)
796 {
797 dsl_dataset_t *ds;
798 int error;
799
800 error = dsl_dataset_own(name, B_TRUE, FTAG, &ds);
801 if (error == 0) {
802 error = dsl_dataset_destroy(ds, FTAG, defer);
803 /* dsl_dataset_destroy() closes the ds. */
804 }
805
806 return (error);
807 }
808
809 typedef struct snapallarg {
810 dsl_sync_task_group_t *saa_dstg;
811 boolean_t saa_needsuspend;
812 nvlist_t *saa_props;
813
814 /* the following are used only if 'temporary' is set: */
815 boolean_t saa_temporary;
816 const char *saa_htag;
817 struct dsl_ds_holdarg *saa_ha;
818 dsl_dataset_t *saa_newds;
819 } snapallarg_t;
820
821 typedef struct snaponearg {
822 const char *soa_longname; /* long snap name */
823 const char *soa_snapname; /* short snap name */
824 uint64_t soa_tot_cnt;
825 snapallarg_t *soa_saa;
826 } snaponearg_t;
827
828 static int
829 snapshot_check(void *arg1, void *arg2, dmu_tx_t *tx)
830 {
831 objset_t *os = arg1;
832 snaponearg_t *soa = arg2;
833 snapallarg_t *saa = soa->soa_saa;
834 int error;
835
836 /* The props have already been checked by zfs_check_userprops(). */
837
838 error = dsl_dataset_snapshot_check(os->os_dsl_dataset,
839 soa->soa_snapname, soa->soa_tot_cnt, tx);
840 if (error)
841 return (error);
842
843 if (saa->saa_temporary) {
844 /*
845 * Ideally we would just call
846 * dsl_dataset_user_hold_check() and
847 * dsl_dataset_destroy_check() here. However the
848 * dataset we want to hold and destroy is the snapshot
849 * that we just confirmed we can create, but it won't
850 * exist until after these checks are run. Do any
851 * checks we can here and if more checks are added to
852 * those routines in the future, similar checks may be
853 * necessary here.
854 */
855 if (spa_version(os->os_spa) < SPA_VERSION_USERREFS)
856 return (ENOTSUP);
857 /*
858 * Not checking number of tags because the tag will be
859 * unique, as it will be the only tag.
860 */
861 if (strlen(saa->saa_htag) + MAX_TAG_PREFIX_LEN >= MAXNAMELEN)
862 return (E2BIG);
863
864 saa->saa_ha = kmem_alloc(sizeof (struct dsl_ds_holdarg),
865 KM_SLEEP);
866 saa->saa_ha->temphold = B_TRUE;
867 saa->saa_ha->htag = saa->saa_htag;
868 }
869 return (error);
870 }
871
872 static void
873 snapshot_sync(void *arg1, void *arg2, dmu_tx_t *tx)
874 {
875 objset_t *os = arg1;
876 dsl_dataset_t *ds = os->os_dsl_dataset;
877 snaponearg_t *soa = arg2;
878 snapallarg_t *saa = soa->soa_saa;
879
880 dsl_dataset_snapshot_sync(ds, soa->soa_snapname, tx);
881
882 if (saa->saa_props != NULL) {
883 dsl_props_arg_t pa;
884 pa.pa_props = saa->saa_props;
885 pa.pa_source = ZPROP_SRC_LOCAL;
886 dsl_props_set_sync(ds->ds_prev, &pa, tx);
887 }
888
889 if (saa->saa_temporary) {
890 struct dsl_ds_destroyarg da;
891
892 dsl_dataset_user_hold_sync(ds->ds_prev, saa->saa_ha, tx);
893 kmem_free(saa->saa_ha, sizeof (struct dsl_ds_holdarg));
894 saa->saa_ha = NULL;
895 saa->saa_newds = ds->ds_prev;
896
897 da.ds = ds->ds_prev;
898 da.defer = B_TRUE;
899 dsl_dataset_destroy_sync(&da, FTAG, tx);
900 }
901 }
902
903 static int
904 snapshot_one_impl(const char *snapname, void *arg, uint64_t cnt)
905 {
906 char fsname[MAXPATHLEN];
907 snapallarg_t *saa = arg;
908 snaponearg_t *soa;
909 objset_t *os;
910 int err;
911
912 (void) strlcpy(fsname, snapname, sizeof (fsname));
913 strchr(fsname, '@')[0] = '\0';
914
915 err = dmu_objset_hold(fsname, saa, &os);
916 if (err != 0)
917 return (err);
918
919 /*
920 * If the objset is in an inconsistent state (eg, in the process
921 * of being destroyed), don't snapshot it.
922 */
923 if (os->os_dsl_dataset->ds_phys->ds_flags & DS_FLAG_INCONSISTENT) {
924 dmu_objset_rele(os, saa);
925 return (EBUSY);
926 }
927
928 if (saa->saa_needsuspend) {
929 err = zil_suspend(dmu_objset_zil(os));
930 if (err) {
931 dmu_objset_rele(os, saa);
932 return (err);
933 }
934 }
935
936 soa = kmem_zalloc(sizeof (*soa), KM_SLEEP);
937 soa->soa_saa = saa;
938 soa->soa_longname = snapname;
939 soa->soa_snapname = strchr(snapname, '@') + 1;
940 soa->soa_tot_cnt = cnt;
941
942 dsl_sync_task_create(saa->saa_dstg, snapshot_check, snapshot_sync,
943 os, soa, 3);
944
945 return (0);
946 }
947
948 /*
949 * The snapshots must all be in the same pool.
950 */
951 int
952 dmu_objset_snapshot(nvlist_t *snaps, nvlist_t *props, nvlist_t *errors)
953 {
954 dsl_sync_task_t *dst;
955 snapallarg_t saa = { 0 };
956 spa_t *spa;
957 int rv = 0;
958 int err;
959 nvpair_t *pair;
960 nvlist_t *cnt_track = NULL;
961 nvpair_t *pp;
962 char *pdelim;
963 uint64_t *pv;
964 char nm[MAXPATHLEN];
965
966 pair = nvlist_next_nvpair(snaps, NULL);
967 if (pair == NULL)
968 return (0);
969
970 err = spa_open(nvpair_name(pair), &spa, FTAG);
971 if (err)
972 return (err);
973 saa.saa_dstg = dsl_sync_task_group_create(spa_get_dsl(spa));
974 saa.saa_props = props;
975 saa.saa_needsuspend = (spa_version(spa) < SPA_VERSION_FAST_SNAP);
976
977 /*
978 * Pre-compute how many total new snapshots will be created for each
979 * level in the tree and below. This is needed for validating the
980 * snapshot limit when taking a recursive snapshot.
981 *
982 * The problem is that the counts are not actually adjusted when
983 * we are checking, only when we finally sync. For a single snapshot,
984 * this is easy, the count will increase by 1 at each node up the tree,
985 * but its more complicated for recursive snapshots. Since we are
986 * validating each snapshot independently we need to be sure that we
987 * are validating the complete count for the entire set of snapshots.
988 * We do this by rolling up the counts for each component of the name
989 * into an nvlist then we'll use that count in the validation of each
990 * individual snapshot.
991 *
992 * We validated the snapshot names in zfs_ioc_snapshot so we know they
993 * have a '@'.
994 */
995 VERIFY(nvlist_alloc(&cnt_track, NV_UNIQUE_NAME, KM_SLEEP) == 0);
996
997 for (pair = nvlist_next_nvpair(snaps, NULL); pair != NULL;
998 pair = nvlist_next_nvpair(snaps, pair)) {
999 (void) strlcpy(nm, nvpair_name(pair), sizeof (nm));
1000 pdelim = strchr(nm, '@');
1001 *pdelim = '\0';
1002
1003 do {
1004 if (nvlist_lookup_nvpair(cnt_track, nm, &pp) != 0) {
1005 /* add to list */
1006 nvlist_add_uint64(cnt_track, nm, 1);
1007 } else {
1008 /* update existing entry */
1009 pv = (uint64_t *)NVP_VALUE(pp);
1010 *pv += 1;
1011 }
1012
1013 pdelim = strrchr(nm, '/');
1014 if (pdelim != NULL)
1015 *pdelim = '\0';
1016 } while (pdelim != NULL);
1017 }
1018
1019 /*
1020 * We've calculated the counts, now validate.
1021 */
1022 for (pair = nvlist_next_nvpair(snaps, NULL); pair != NULL;
1023 pair = nvlist_next_nvpair(snaps, pair)) {
1024 (void) strlcpy(nm, nvpair_name(pair), sizeof (nm));
1025 pdelim = strchr(nm, '@');
1026 *pdelim = '\0';
1027
1028 VERIFY(nvlist_lookup_nvpair(cnt_track, nm, &pp) == 0);
1029
1030 pv = (uint64_t *)NVP_VALUE(pp);
1031 err = snapshot_one_impl(nvpair_name(pair), &saa, *pv);
1032 if (err != 0) {
1033 if (errors != NULL) {
1034 fnvlist_add_int32(errors,
1035 nvpair_name(pair), err);
1036 }
1037 rv = err;
1038 }
1039 }
1040
1041 nvlist_free(cnt_track);
1042
1043 /*
1044 * If any call to snapshot_one_impl() failed, don't execute the
1045 * sync task. The error handling code below will clean up the
1046 * snaponearg_t from any successful calls to
1047 * snapshot_one_impl().
1048 */
1049 if (rv == 0)
1050 err = dsl_sync_task_group_wait(saa.saa_dstg);
1051 if (err != 0)
1052 rv = err;
1053
1054 for (dst = list_head(&saa.saa_dstg->dstg_tasks); dst;
1055 dst = list_next(&saa.saa_dstg->dstg_tasks, dst)) {
1056 objset_t *os = dst->dst_arg1;
1057 snaponearg_t *soa = dst->dst_arg2;
1058 if (dst->dst_err != 0) {
1059 if (errors != NULL) {
1060 fnvlist_add_int32(errors,
1061 soa->soa_longname, dst->dst_err);
1062 }
1063 rv = dst->dst_err;
1064 }
1065
1066 if (saa.saa_needsuspend)
1067 zil_resume(dmu_objset_zil(os));
1068 dmu_objset_rele(os, &saa);
1069 kmem_free(soa, sizeof (*soa));
1070 }
1071
1072 dsl_sync_task_group_destroy(saa.saa_dstg);
1073 spa_close(spa, FTAG);
1074 return (rv);
1075 }
1076
1077 int
1078 dmu_objset_snapshot_one(const char *fsname, const char *snapname)
1079 {
1080 int err;
1081 char *longsnap = kmem_asprintf("%s@%s", fsname, snapname);
1082 nvlist_t *snaps = fnvlist_alloc();
1083
1084 fnvlist_add_boolean(snaps, longsnap);
1085 err = dmu_objset_snapshot(snaps, NULL, NULL);
1086 fnvlist_free(snaps);
1087 strfree(longsnap);
1088 return (err);
1089 }
1090
1091 int
1092 dmu_objset_snapshot_tmp(const char *snapname, const char *tag, int cleanup_fd)
1093 {
1094 dsl_sync_task_t *dst;
1095 snapallarg_t saa = { 0 };
1096 spa_t *spa;
1097 minor_t minor;
1098 int err;
1099
1100 err = spa_open(snapname, &spa, FTAG);
1101 if (err)
1102 return (err);
1103 saa.saa_dstg = dsl_sync_task_group_create(spa_get_dsl(spa));
1104 saa.saa_htag = tag;
1105 saa.saa_needsuspend = (spa_version(spa) < SPA_VERSION_FAST_SNAP);
1106 saa.saa_temporary = B_TRUE;
1107
1108 if (cleanup_fd < 0) {
1109 spa_close(spa, FTAG);
1110 return (EINVAL);
1111 }
1112 if ((err = zfs_onexit_fd_hold(cleanup_fd, &minor)) != 0) {
1113 spa_close(spa, FTAG);
1114 return (err);
1115 }
1116
1117 err = snapshot_one_impl(snapname, &saa, 1);
1118
1119 if (err == 0)
1120 err = dsl_sync_task_group_wait(saa.saa_dstg);
1121
1122 for (dst = list_head(&saa.saa_dstg->dstg_tasks); dst;
1123 dst = list_next(&saa.saa_dstg->dstg_tasks, dst)) {
1124 objset_t *os = dst->dst_arg1;
1125 dsl_register_onexit_hold_cleanup(saa.saa_newds, tag, minor);
1126 if (saa.saa_needsuspend)
1127 zil_resume(dmu_objset_zil(os));
1128 dmu_objset_rele(os, &saa);
1129 }
1130
1131 zfs_onexit_fd_rele(cleanup_fd);
1132 dsl_sync_task_group_destroy(saa.saa_dstg);
1133 spa_close(spa, FTAG);
1134 return (err);
1135 }
1136
1137
1138 static void
1139 dmu_objset_sync_dnodes(list_t *list, list_t *newlist, dmu_tx_t *tx)
1140 {
1141 dnode_t *dn;
1142
1143 while (dn = list_head(list)) {
1144 ASSERT(dn->dn_object != DMU_META_DNODE_OBJECT);
1145 ASSERT(dn->dn_dbuf->db_data_pending);
1146 /*
1147 * Initialize dn_zio outside dnode_sync() because the
1148 * meta-dnode needs to set it ouside dnode_sync().
1149 */
1150 dn->dn_zio = dn->dn_dbuf->db_data_pending->dr_zio;
1151 ASSERT(dn->dn_zio);
1152
1153 ASSERT3U(dn->dn_nlevels, <=, DN_MAX_LEVELS);
1154 list_remove(list, dn);
1155
1156 if (newlist) {
1157 (void) dnode_add_ref(dn, newlist);
1158 list_insert_tail(newlist, dn);
1159 }
1160
1161 dnode_sync(dn, tx);
1162 }
1163 }
1164
1165 /* ARGSUSED */
1166 static void
1167 dmu_objset_write_ready(zio_t *zio, arc_buf_t *abuf, void *arg)
1168 {
1169 blkptr_t *bp = zio->io_bp;
1170 objset_t *os = arg;
1171 dnode_phys_t *dnp = &os->os_phys->os_meta_dnode;
1172
1173 ASSERT(bp == os->os_rootbp);
1174 ASSERT(BP_GET_TYPE(bp) == DMU_OT_OBJSET);
1175 ASSERT(BP_GET_LEVEL(bp) == 0);
1176
1177 /*
1178 * Update rootbp fill count: it should be the number of objects
1179 * allocated in the object set (not counting the "special"
1180 * objects that are stored in the objset_phys_t -- the meta
1181 * dnode and user/group accounting objects).
1182 */
1183 bp->blk_fill = 0;
1184 for (int i = 0; i < dnp->dn_nblkptr; i++)
1185 bp->blk_fill += dnp->dn_blkptr[i].blk_fill;
1186 }
1187
1188 /* ARGSUSED */
1189 static void
1190 dmu_objset_write_done(zio_t *zio, arc_buf_t *abuf, void *arg)
1191 {
1192 blkptr_t *bp = zio->io_bp;
1193 blkptr_t *bp_orig = &zio->io_bp_orig;
1194 objset_t *os = arg;
1195
1196 if (zio->io_flags & ZIO_FLAG_IO_REWRITE) {
1197 ASSERT(BP_EQUAL(bp, bp_orig));
1198 } else {
1199 dsl_dataset_t *ds = os->os_dsl_dataset;
1200 dmu_tx_t *tx = os->os_synctx;
1201
1202 (void) dsl_dataset_block_kill(ds, bp_orig, tx, B_TRUE);
1203 dsl_dataset_block_born(ds, bp, tx);
1204 }
1205 }
1206
1207 /* called from dsl */
1208 void
1209 dmu_objset_sync(objset_t *os, zio_t *pio, dmu_tx_t *tx)
1210 {
1211 int txgoff;
1212 zbookmark_t zb;
1213 zio_prop_t zp;
1214 zio_t *zio;
1215 list_t *list;
1216 list_t *newlist = NULL;
1217 dbuf_dirty_record_t *dr;
1218
1219 dprintf_ds(os->os_dsl_dataset, "txg=%llu\n", tx->tx_txg);
1220
1221 ASSERT(dmu_tx_is_syncing(tx));
1222 /* XXX the write_done callback should really give us the tx... */
1223 os->os_synctx = tx;
1224
1225 if (os->os_dsl_dataset == NULL) {
1226 /*
1227 * This is the MOS. If we have upgraded,
1228 * spa_max_replication() could change, so reset
1229 * os_copies here.
1230 */
1231 os->os_copies = spa_max_replication(os->os_spa);
1232 }
1233
1234 /*
1235 * Create the root block IO
1236 */
1237 SET_BOOKMARK(&zb, os->os_dsl_dataset ?
1238 os->os_dsl_dataset->ds_object : DMU_META_OBJSET,
1239 ZB_ROOT_OBJECT, ZB_ROOT_LEVEL, ZB_ROOT_BLKID);
1240 VERIFY3U(0, ==, arc_release_bp(os->os_phys_buf, &os->os_phys_buf,
1241 os->os_rootbp, os->os_spa, &zb));
1242
1243 dmu_write_policy(os, NULL, 0, 0, &zp);
1244
1245 zio = arc_write(pio, os->os_spa, tx->tx_txg,
1246 os->os_rootbp, os->os_phys_buf, DMU_OS_IS_L2CACHEABLE(os), &zp,
1247 dmu_objset_write_ready, dmu_objset_write_done, os,
1248 ZIO_PRIORITY_ASYNC_WRITE, ZIO_FLAG_MUSTSUCCEED, &zb);
1249
1250 /*
1251 * Sync special dnodes - the parent IO for the sync is the root block
1252 */
1253 DMU_META_DNODE(os)->dn_zio = zio;
1254 dnode_sync(DMU_META_DNODE(os), tx);
1255
1256 os->os_phys->os_flags = os->os_flags;
1257
1258 if (DMU_USERUSED_DNODE(os) &&
1259 DMU_USERUSED_DNODE(os)->dn_type != DMU_OT_NONE) {
1260 DMU_USERUSED_DNODE(os)->dn_zio = zio;
1261 dnode_sync(DMU_USERUSED_DNODE(os), tx);
1262 DMU_GROUPUSED_DNODE(os)->dn_zio = zio;
1263 dnode_sync(DMU_GROUPUSED_DNODE(os), tx);
1264 }
1265
1266 txgoff = tx->tx_txg & TXG_MASK;
1267
1268 if (dmu_objset_userused_enabled(os)) {
1269 newlist = &os->os_synced_dnodes;
1270 /*
1271 * We must create the list here because it uses the
1272 * dn_dirty_link[] of this txg.
1273 */
1274 list_create(newlist, sizeof (dnode_t),
1275 offsetof(dnode_t, dn_dirty_link[txgoff]));
1276 }
1277
1278 dmu_objset_sync_dnodes(&os->os_free_dnodes[txgoff], newlist, tx);
1279 dmu_objset_sync_dnodes(&os->os_dirty_dnodes[txgoff], newlist, tx);
1280
1281 list = &DMU_META_DNODE(os)->dn_dirty_records[txgoff];
1282 while (dr = list_head(list)) {
1283 ASSERT(dr->dr_dbuf->db_level == 0);
1284 list_remove(list, dr);
1285 if (dr->dr_zio)
1286 zio_nowait(dr->dr_zio);
1287 }
1288 /*
1289 * Free intent log blocks up to this tx.
1290 */
1291 zil_sync(os->os_zil, tx);
1292 os->os_phys->os_zil_header = os->os_zil_header;
1293 zio_nowait(zio);
1294 }
1295
1296 boolean_t
1297 dmu_objset_is_dirty(objset_t *os, uint64_t txg)
1298 {
1299 return (!list_is_empty(&os->os_dirty_dnodes[txg & TXG_MASK]) ||
1300 !list_is_empty(&os->os_free_dnodes[txg & TXG_MASK]));
1301 }
1302
1303 static objset_used_cb_t *used_cbs[DMU_OST_NUMTYPES];
1304
1305 void
1306 dmu_objset_register_type(dmu_objset_type_t ost, objset_used_cb_t *cb)
1307 {
1308 used_cbs[ost] = cb;
1309 }
1310
1311 boolean_t
1312 dmu_objset_userused_enabled(objset_t *os)
1313 {
1314 return (spa_version(os->os_spa) >= SPA_VERSION_USERSPACE &&
1315 used_cbs[os->os_phys->os_type] != NULL &&
1316 DMU_USERUSED_DNODE(os) != NULL);
1317 }
1318
1319 static void
1320 do_userquota_update(objset_t *os, uint64_t used, uint64_t flags,
1321 uint64_t user, uint64_t group, boolean_t subtract, dmu_tx_t *tx)
1322 {
1323 if ((flags & DNODE_FLAG_USERUSED_ACCOUNTED)) {
1324 int64_t delta = DNODE_SIZE + used;
1325 if (subtract)
1326 delta = -delta;
1327 VERIFY3U(0, ==, zap_increment_int(os, DMU_USERUSED_OBJECT,
1328 user, delta, tx));
1329 VERIFY3U(0, ==, zap_increment_int(os, DMU_GROUPUSED_OBJECT,
1330 group, delta, tx));
1331 }
1332 }
1333
1334 void
1335 dmu_objset_do_userquota_updates(objset_t *os, dmu_tx_t *tx)
1336 {
1337 dnode_t *dn;
1338 list_t *list = &os->os_synced_dnodes;
1339
1340 ASSERT(list_head(list) == NULL || dmu_objset_userused_enabled(os));
1341
1342 while (dn = list_head(list)) {
1343 int flags;
1344 ASSERT(!DMU_OBJECT_IS_SPECIAL(dn->dn_object));
1345 ASSERT(dn->dn_phys->dn_type == DMU_OT_NONE ||
1346 dn->dn_phys->dn_flags &
1347 DNODE_FLAG_USERUSED_ACCOUNTED);
1348
1349 /* Allocate the user/groupused objects if necessary. */
1350 if (DMU_USERUSED_DNODE(os)->dn_type == DMU_OT_NONE) {
1351 VERIFY(0 == zap_create_claim(os,
1352 DMU_USERUSED_OBJECT,
1353 DMU_OT_USERGROUP_USED, DMU_OT_NONE, 0, tx));
1354 VERIFY(0 == zap_create_claim(os,
1355 DMU_GROUPUSED_OBJECT,
1356 DMU_OT_USERGROUP_USED, DMU_OT_NONE, 0, tx));
1357 }
1358
1359 /*
1360 * We intentionally modify the zap object even if the
1361 * net delta is zero. Otherwise
1362 * the block of the zap obj could be shared between
1363 * datasets but need to be different between them after
1364 * a bprewrite.
1365 */
1366
1367 flags = dn->dn_id_flags;
1368 ASSERT(flags);
1369 if (flags & DN_ID_OLD_EXIST) {
1370 do_userquota_update(os, dn->dn_oldused, dn->dn_oldflags,
1371 dn->dn_olduid, dn->dn_oldgid, B_TRUE, tx);
1372 }
1373 if (flags & DN_ID_NEW_EXIST) {
1374 do_userquota_update(os, DN_USED_BYTES(dn->dn_phys),
1375 dn->dn_phys->dn_flags, dn->dn_newuid,
1376 dn->dn_newgid, B_FALSE, tx);
1377 }
1378
1379 mutex_enter(&dn->dn_mtx);
1380 dn->dn_oldused = 0;
1381 dn->dn_oldflags = 0;
1382 if (dn->dn_id_flags & DN_ID_NEW_EXIST) {
1383 dn->dn_olduid = dn->dn_newuid;
1384 dn->dn_oldgid = dn->dn_newgid;
1385 dn->dn_id_flags |= DN_ID_OLD_EXIST;
1386 if (dn->dn_bonuslen == 0)
1387 dn->dn_id_flags |= DN_ID_CHKED_SPILL;
1388 else
1389 dn->dn_id_flags |= DN_ID_CHKED_BONUS;
1390 }
1391 dn->dn_id_flags &= ~(DN_ID_NEW_EXIST);
1392 mutex_exit(&dn->dn_mtx);
1393
1394 list_remove(list, dn);
1395 dnode_rele(dn, list);
1396 }
1397 }
1398
1399 /*
1400 * Returns a pointer to data to find uid/gid from
1401 *
1402 * If a dirty record for transaction group that is syncing can't
1403 * be found then NULL is returned. In the NULL case it is assumed
1404 * the uid/gid aren't changing.
1405 */
1406 static void *
1407 dmu_objset_userquota_find_data(dmu_buf_impl_t *db, dmu_tx_t *tx)
1408 {
1409 dbuf_dirty_record_t *dr, **drp;
1410 void *data;
1411
1412 if (db->db_dirtycnt == 0)
1413 return (db->db.db_data); /* Nothing is changing */
1414
1415 for (drp = &db->db_last_dirty; (dr = *drp) != NULL; drp = &dr->dr_next)
1416 if (dr->dr_txg == tx->tx_txg)
1417 break;
1418
1419 if (dr == NULL) {
1420 data = NULL;
1421 } else {
1422 dnode_t *dn;
1423
1424 DB_DNODE_ENTER(dr->dr_dbuf);
1425 dn = DB_DNODE(dr->dr_dbuf);
1426
1427 if (dn->dn_bonuslen == 0 &&
1428 dr->dr_dbuf->db_blkid == DMU_SPILL_BLKID)
1429 data = dr->dt.dl.dr_data->b_data;
1430 else
1431 data = dr->dt.dl.dr_data;
1432
1433 DB_DNODE_EXIT(dr->dr_dbuf);
1434 }
1435
1436 return (data);
1437 }
1438
1439 void
1440 dmu_objset_userquota_get_ids(dnode_t *dn, boolean_t before, dmu_tx_t *tx)
1441 {
1442 objset_t *os = dn->dn_objset;
1443 void *data = NULL;
1444 dmu_buf_impl_t *db = NULL;
1445 uint64_t *user, *group;
1446 int flags = dn->dn_id_flags;
1447 int error;
1448 boolean_t have_spill = B_FALSE;
1449
1450 if (!dmu_objset_userused_enabled(dn->dn_objset))
1451 return;
1452
1453 if (before && (flags & (DN_ID_CHKED_BONUS|DN_ID_OLD_EXIST|
1454 DN_ID_CHKED_SPILL)))
1455 return;
1456
1457 if (before && dn->dn_bonuslen != 0)
1458 data = DN_BONUS(dn->dn_phys);
1459 else if (!before && dn->dn_bonuslen != 0) {
1460 if (dn->dn_bonus) {
1461 db = dn->dn_bonus;
1462 mutex_enter(&db->db_mtx);
1463 data = dmu_objset_userquota_find_data(db, tx);
1464 } else {
1465 data = DN_BONUS(dn->dn_phys);
1466 }
1467 } else if (dn->dn_bonuslen == 0 && dn->dn_bonustype == DMU_OT_SA) {
1468 int rf = 0;
1469
1470 if (RW_WRITE_HELD(&dn->dn_struct_rwlock))
1471 rf |= DB_RF_HAVESTRUCT;
1472 error = dmu_spill_hold_by_dnode(dn,
1473 rf | DB_RF_MUST_SUCCEED,
1474 FTAG, (dmu_buf_t **)&db);
1475 ASSERT(error == 0);
1476 mutex_enter(&db->db_mtx);
1477 data = (before) ? db->db.db_data :
1478 dmu_objset_userquota_find_data(db, tx);
1479 have_spill = B_TRUE;
1480 } else {
1481 mutex_enter(&dn->dn_mtx);
1482 dn->dn_id_flags |= DN_ID_CHKED_BONUS;
1483 mutex_exit(&dn->dn_mtx);
1484 return;
1485 }
1486
1487 if (before) {
1488 ASSERT(data);
1489 user = &dn->dn_olduid;
1490 group = &dn->dn_oldgid;
1491 } else if (data) {
1492 user = &dn->dn_newuid;
1493 group = &dn->dn_newgid;
1494 }
1495
1496 /*
1497 * Must always call the callback in case the object
1498 * type has changed and that type isn't an object type to track
1499 */
1500 error = used_cbs[os->os_phys->os_type](dn->dn_bonustype, data,
1501 user, group);
1502
1503 /*
1504 * Preserve existing uid/gid when the callback can't determine
1505 * what the new uid/gid are and the callback returned EEXIST.
1506 * The EEXIST error tells us to just use the existing uid/gid.
1507 * If we don't know what the old values are then just assign
1508 * them to 0, since that is a new file being created.
1509 */
1510 if (!before && data == NULL && error == EEXIST) {
1511 if (flags & DN_ID_OLD_EXIST) {
1512 dn->dn_newuid = dn->dn_olduid;
1513 dn->dn_newgid = dn->dn_oldgid;
1514 } else {
1515 dn->dn_newuid = 0;
1516 dn->dn_newgid = 0;
1517 }
1518 error = 0;
1519 }
1520
1521 if (db)
1522 mutex_exit(&db->db_mtx);
1523
1524 mutex_enter(&dn->dn_mtx);
1525 if (error == 0 && before)
1526 dn->dn_id_flags |= DN_ID_OLD_EXIST;
1527 if (error == 0 && !before)
1528 dn->dn_id_flags |= DN_ID_NEW_EXIST;
1529
1530 if (have_spill) {
1531 dn->dn_id_flags |= DN_ID_CHKED_SPILL;
1532 } else {
1533 dn->dn_id_flags |= DN_ID_CHKED_BONUS;
1534 }
1535 mutex_exit(&dn->dn_mtx);
1536 if (have_spill)
1537 dmu_buf_rele((dmu_buf_t *)db, FTAG);
1538 }
1539
1540 boolean_t
1541 dmu_objset_userspace_present(objset_t *os)
1542 {
1543 return (os->os_phys->os_flags &
1544 OBJSET_FLAG_USERACCOUNTING_COMPLETE);
1545 }
1546
1547 int
1548 dmu_objset_userspace_upgrade(objset_t *os)
1549 {
1550 uint64_t obj;
1551 int err = 0;
1552
1553 if (dmu_objset_userspace_present(os))
1554 return (0);
1555 if (!dmu_objset_userused_enabled(os))
1556 return (ENOTSUP);
1557 if (dmu_objset_is_snapshot(os))
1558 return (EINVAL);
1559
1560 /*
1561 * We simply need to mark every object dirty, so that it will be
1562 * synced out and now accounted. If this is called
1563 * concurrently, or if we already did some work before crashing,
1564 * that's fine, since we track each object's accounted state
1565 * independently.
1566 */
1567
1568 for (obj = 0; err == 0; err = dmu_object_next(os, &obj, FALSE, 0)) {
1569 dmu_tx_t *tx;
1570 dmu_buf_t *db;
1571 int objerr;
1572
1573 if (issig(JUSTLOOKING) && issig(FORREAL))
1574 return (EINTR);
1575
1576 objerr = dmu_bonus_hold(os, obj, FTAG, &db);
1577 if (objerr)
1578 continue;
1579 tx = dmu_tx_create(os);
1580 dmu_tx_hold_bonus(tx, obj);
1581 objerr = dmu_tx_assign(tx, TXG_WAIT);
1582 if (objerr) {
1583 dmu_tx_abort(tx);
1584 continue;
1585 }
1586 dmu_buf_will_dirty(db, tx);
1587 dmu_buf_rele(db, FTAG);
1588 dmu_tx_commit(tx);
1589 }
1590
1591 os->os_flags |= OBJSET_FLAG_USERACCOUNTING_COMPLETE;
1592 txg_wait_synced(dmu_objset_pool(os), 0);
1593 return (0);
1594 }
1595
1596 void
1597 dmu_objset_space(objset_t *os, uint64_t *refdbytesp, uint64_t *availbytesp,
1598 uint64_t *usedobjsp, uint64_t *availobjsp)
1599 {
1600 dsl_dataset_space(os->os_dsl_dataset, refdbytesp, availbytesp,
1601 usedobjsp, availobjsp);
1602 }
1603
1604 uint64_t
1605 dmu_objset_fsid_guid(objset_t *os)
1606 {
1607 return (dsl_dataset_fsid_guid(os->os_dsl_dataset));
1608 }
1609
1610 void
1611 dmu_objset_fast_stat(objset_t *os, dmu_objset_stats_t *stat)
1612 {
1613 stat->dds_type = os->os_phys->os_type;
1614 if (os->os_dsl_dataset)
1615 dsl_dataset_fast_stat(os->os_dsl_dataset, stat);
1616 }
1617
1618 void
1619 dmu_objset_stats(objset_t *os, nvlist_t *nv)
1620 {
1621 ASSERT(os->os_dsl_dataset ||
1622 os->os_phys->os_type == DMU_OST_META);
1623
1624 if (os->os_dsl_dataset != NULL)
1625 dsl_dataset_stats(os->os_dsl_dataset, nv);
1626
1627 dsl_prop_nvlist_add_uint64(nv, ZFS_PROP_TYPE,
1628 os->os_phys->os_type);
1629 dsl_prop_nvlist_add_uint64(nv, ZFS_PROP_USERACCOUNTING,
1630 dmu_objset_userspace_present(os));
1631 }
1632
1633 int
1634 dmu_objset_is_snapshot(objset_t *os)
1635 {
1636 if (os->os_dsl_dataset != NULL)
1637 return (dsl_dataset_is_snapshot(os->os_dsl_dataset));
1638 else
1639 return (B_FALSE);
1640 }
1641
1642 int
1643 dmu_snapshot_realname(objset_t *os, char *name, char *real, int maxlen,
1644 boolean_t *conflict)
1645 {
1646 dsl_dataset_t *ds = os->os_dsl_dataset;
1647 uint64_t ignored;
1648
1649 if (ds->ds_phys->ds_snapnames_zapobj == 0)
1650 return (ENOENT);
1651
1652 return (zap_lookup_norm(ds->ds_dir->dd_pool->dp_meta_objset,
1653 ds->ds_phys->ds_snapnames_zapobj, name, 8, 1, &ignored, MT_FIRST,
1654 real, maxlen, conflict));
1655 }
1656
1657 int
1658 dmu_snapshot_list_next(objset_t *os, int namelen, char *name,
1659 uint64_t *idp, uint64_t *offp, boolean_t *case_conflict)
1660 {
1661 dsl_dataset_t *ds = os->os_dsl_dataset;
1662 zap_cursor_t cursor;
1663 zap_attribute_t attr;
1664
1665 if (ds->ds_phys->ds_snapnames_zapobj == 0)
1666 return (ENOENT);
1667
1668 zap_cursor_init_serialized(&cursor,
1669 ds->ds_dir->dd_pool->dp_meta_objset,
1670 ds->ds_phys->ds_snapnames_zapobj, *offp);
1671
1672 if (zap_cursor_retrieve(&cursor, &attr) != 0) {
1673 zap_cursor_fini(&cursor);
1674 return (ENOENT);
1675 }
1676
1677 if (strlen(attr.za_name) + 1 > namelen) {
1678 zap_cursor_fini(&cursor);
1679 return (ENAMETOOLONG);
1680 }
1681
1682 (void) strcpy(name, attr.za_name);
1683 if (idp)
1684 *idp = attr.za_first_integer;
1685 if (case_conflict)
1686 *case_conflict = attr.za_normalization_conflict;
1687 zap_cursor_advance(&cursor);
1688 *offp = zap_cursor_serialize(&cursor);
1689 zap_cursor_fini(&cursor);
1690
1691 return (0);
1692 }
1693
1694 int
1695 dmu_dir_list_next(objset_t *os, int namelen, char *name,
1696 uint64_t *idp, uint64_t *offp)
1697 {
1698 dsl_dir_t *dd = os->os_dsl_dataset->ds_dir;
1699 zap_cursor_t cursor;
1700 zap_attribute_t attr;
1701
1702 /* there is no next dir on a snapshot! */
1703 if (os->os_dsl_dataset->ds_object !=
1704 dd->dd_phys->dd_head_dataset_obj)
1705 return (ENOENT);
1706
1707 zap_cursor_init_serialized(&cursor,
1708 dd->dd_pool->dp_meta_objset,
1709 dd->dd_phys->dd_child_dir_zapobj, *offp);
1710
1711 if (zap_cursor_retrieve(&cursor, &attr) != 0) {
1712 zap_cursor_fini(&cursor);
1713 return (ENOENT);
1714 }
1715
1716 if (strlen(attr.za_name) + 1 > namelen) {
1717 zap_cursor_fini(&cursor);
1718 return (ENAMETOOLONG);
1719 }
1720
1721 (void) strcpy(name, attr.za_name);
1722 if (idp)
1723 *idp = attr.za_first_integer;
1724 zap_cursor_advance(&cursor);
1725 *offp = zap_cursor_serialize(&cursor);
1726 zap_cursor_fini(&cursor);
1727
1728 return (0);
1729 }
1730
1731 struct findarg {
1732 int (*func)(const char *, void *);
1733 void *arg;
1734 };
1735
1736 /* ARGSUSED */
1737 static int
1738 findfunc(spa_t *spa, uint64_t dsobj, const char *dsname, void *arg)
1739 {
1740 struct findarg *fa = arg;
1741 return (fa->func(dsname, fa->arg));
1742 }
1743
1744 /*
1745 * Find all objsets under name, and for each, call 'func(child_name, arg)'.
1746 * Perhaps change all callers to use dmu_objset_find_spa()?
1747 */
1748 int
1749 dmu_objset_find(char *name, int func(const char *, void *), void *arg,
1750 int flags)
1751 {
1752 struct findarg fa;
1753 fa.func = func;
1754 fa.arg = arg;
1755 return (dmu_objset_find_spa(NULL, name, findfunc, &fa, flags));
1756 }
1757
1758 /*
1759 * Find all objsets under name, call func on each
1760 */
1761 int
1762 dmu_objset_find_spa(spa_t *spa, const char *name,
1763 int func(spa_t *, uint64_t, const char *, void *), void *arg, int flags)
1764 {
1765 dsl_dir_t *dd;
1766 dsl_pool_t *dp;
1767 dsl_dataset_t *ds;
1768 zap_cursor_t zc;
1769 zap_attribute_t *attr;
1770 char *child;
1771 uint64_t thisobj;
1772 int err;
1773
1774 if (name == NULL)
1775 name = spa_name(spa);
1776 err = dsl_dir_open_spa(spa, name, FTAG, &dd, NULL);
1777 if (err)
1778 return (err);
1779
1780 /* Don't visit hidden ($MOS & $ORIGIN) objsets. */
1781 if (dd->dd_myname[0] == '$') {
1782 dsl_dir_close(dd, FTAG);
1783 return (0);
1784 }
1785
1786 thisobj = dd->dd_phys->dd_head_dataset_obj;
1787 attr = kmem_alloc(sizeof (zap_attribute_t), KM_SLEEP);
1788 dp = dd->dd_pool;
1789
1790 /*
1791 * Iterate over all children.
1792 */
1793 if (flags & DS_FIND_CHILDREN) {
1794 for (zap_cursor_init(&zc, dp->dp_meta_objset,
1795 dd->dd_phys->dd_child_dir_zapobj);
1796 zap_cursor_retrieve(&zc, attr) == 0;
1797 (void) zap_cursor_advance(&zc)) {
1798 ASSERT(attr->za_integer_length == sizeof (uint64_t));
1799 ASSERT(attr->za_num_integers == 1);
1800
1801 child = kmem_asprintf("%s/%s", name, attr->za_name);
1802 err = dmu_objset_find_spa(spa, child, func, arg, flags);
1803 strfree(child);
1804 if (err)
1805 break;
1806 }
1807 zap_cursor_fini(&zc);
1808
1809 if (err) {
1810 dsl_dir_close(dd, FTAG);
1811 kmem_free(attr, sizeof (zap_attribute_t));
1812 return (err);
1813 }
1814 }
1815
1816 /*
1817 * Iterate over all snapshots.
1818 */
1819 if (flags & DS_FIND_SNAPSHOTS) {
1820 if (!dsl_pool_sync_context(dp))
1821 rw_enter(&dp->dp_config_rwlock, RW_READER);
1822 err = dsl_dataset_hold_obj(dp, thisobj, FTAG, &ds);
1823 if (!dsl_pool_sync_context(dp))
1824 rw_exit(&dp->dp_config_rwlock);
1825
1826 if (err == 0) {
1827 uint64_t snapobj = ds->ds_phys->ds_snapnames_zapobj;
1828 dsl_dataset_rele(ds, FTAG);
1829
1830 for (zap_cursor_init(&zc, dp->dp_meta_objset, snapobj);
1831 zap_cursor_retrieve(&zc, attr) == 0;
1832 (void) zap_cursor_advance(&zc)) {
1833 ASSERT(attr->za_integer_length ==
1834 sizeof (uint64_t));
1835 ASSERT(attr->za_num_integers == 1);
1836
1837 child = kmem_asprintf("%s@%s",
1838 name, attr->za_name);
1839 err = func(spa, attr->za_first_integer,
1840 child, arg);
1841 strfree(child);
1842 if (err)
1843 break;
1844 }
1845 zap_cursor_fini(&zc);
1846 }
1847 }
1848
1849 dsl_dir_close(dd, FTAG);
1850 kmem_free(attr, sizeof (zap_attribute_t));
1851
1852 if (err)
1853 return (err);
1854
1855 /*
1856 * Apply to self if appropriate.
1857 */
1858 err = func(spa, thisobj, name, arg);
1859 return (err);
1860 }
1861
1862 /* ARGSUSED */
1863 int
1864 dmu_objset_prefetch(const char *name, void *arg)
1865 {
1866 dsl_dataset_t *ds;
1867
1868 if (dsl_dataset_hold(name, FTAG, &ds))
1869 return (0);
1870
1871 if (!BP_IS_HOLE(&ds->ds_phys->ds_bp)) {
1872 mutex_enter(&ds->ds_opening_lock);
1873 if (ds->ds_objset == NULL) {
1874 uint32_t aflags = ARC_NOWAIT | ARC_PREFETCH;
1875 zbookmark_t zb;
1876
1877 SET_BOOKMARK(&zb, ds->ds_object, ZB_ROOT_OBJECT,
1878 ZB_ROOT_LEVEL, ZB_ROOT_BLKID);
1879
1880 (void) dsl_read_nolock(NULL, dsl_dataset_get_spa(ds),
1881 &ds->ds_phys->ds_bp, NULL, NULL,
1882 ZIO_PRIORITY_ASYNC_READ,
1883 ZIO_FLAG_CANFAIL | ZIO_FLAG_SPECULATIVE,
1884 &aflags, &zb);
1885 }
1886 mutex_exit(&ds->ds_opening_lock);
1887 }
1888
1889 dsl_dataset_rele(ds, FTAG);
1890 return (0);
1891 }
1892
1893 void
1894 dmu_objset_set_user(objset_t *os, void *user_ptr)
1895 {
1896 ASSERT(MUTEX_HELD(&os->os_user_ptr_lock));
1897 os->os_user_ptr = user_ptr;
1898 }
1899
1900 void *
1901 dmu_objset_get_user(objset_t *os)
1902 {
1903 ASSERT(MUTEX_HELD(&os->os_user_ptr_lock));
1904 return (os->os_user_ptr);
1905 }