Console View
Tags: Architectures Platforms default |
|
Architectures | Platforms | default | ||||||||||||||||
|
|
|
||||||||||||||||
George Amanakis
gamanakis @gmail.com |
|
|
|
|||||||||||||||
Teach zdb about DMU_OT_ERROR_LOG objects With the persistent error log feature we need to account for spa_errlog_{scrub, last} containing mappings to other error log objects, which need to be marked as in-use as well. Signed-off-by: George Amanakis <gamanakis@gmail.com> Pull-request: #14442 part 1/1 |
||||||||||||||||||
George Amanakis
gamanakis @gmail.com |
|
|
|
|||||||||||||||
Teach zdb about DMU_OT_ERROR_LOG objects With the persistent error log feature we need to account for spa_errlog_{scrub, last} containing mappings to other error log objects, which need to be marked as in-use as well. Signed-off-by: George Amanakis <gamanakis@gmail.com> Pull-request: #14442 part 1/1 |
||||||||||||||||||
Rob Wing
rew @FreeBSD.org |
|
|
|
|||||||||||||||
zfs_main.c: fix unused variable error with GCC zfs_setproctitle_init() is stubbed out on FreeBSD. Signed-off-by: Rob Wing <rob.fx907@gmail.com> Pull-request: #14441 part 1/1 |
||||||||||||||||||
Matthew Ahrens
mahrens @delphix.com |
|
|
|
|||||||||||||||
EIO caused by encryption + recursive gang Encrypted blocks can not have 3 DVAs, because they use the space of the 3rd DVA for the IV+salt. zio_write_gang_block() takes this into account, setting `gbh_copies` to no more than 2 in this case. Gang members BP's do not have the X (encrypted) bit set (nor do they have the DMU level and type fields set), because encryption is not handled at this level. The gang block is reassembled, and then encryption (and compression) are handled. To check if this gang block is encrypted, the code in zio_write_gang_block() checks `pio->io_bp`. This is normally fine, because the block that's being ganged is typically the encrypted BP. The problem is that if there is "recursive ganging", where a gang member is itself a gang block, then when zio_write_gang_block() is called to create a gang block for a gang member, `pio->io_bp` is the gang member's BP, which doesn't have the X bit set, so the number of DVA's is not restricted to 2. It should instead be looking at the the "gang leader", i.e. the top-level gang block, to determine how many DVA's can be used, to avoid a "NDVA's inversion" (where a child has more DVA's than its parent). gang leader BP: X (encrypted) bit set, 2 DVA's, IV+salt in 3rd DVA's space: ``` DVA[0]=<1:...:100400> DVA[1]=<0:...:100400> salt=... iv=... [L0 ZFS plain file] fletcher4 uncompressed encrypted LE gang unique double size=100000L/100000P birth=... fill=1 cksum=... ``` leader's GBH contains a BP with gang bit set and 3 DVA's: ``` DVA[0]=<1:...:55600> DVA[1]=<0:...:55600> [L0 unallocated] fletcher4 uncompressed unencrypted LE contiguous unique double size=55600L/55600P birth=... fill=0 cksum=... DVA[0]=<1:...:55600> DVA[1]=<0:...:55600> [L0 unallocated] fletcher4 uncompressed unencrypted LE contiguous unique double size=55600L/55600P birth=... fill=0 cksum=... DVA[0]=<1:...:55600> DVA[1]=<0:...:55600> DVA[2]=<1:...:200> [L0 unallocated] fletcher4 uncompressed unencrypted LE gang unique double size=55400L/55400P birth=... fill=0 cksum=... ``` On nondebug bits, having the 3rd DVA in the gang block works for the most part, because it's true that all 3 DVA's are available in the gang member BP (in the GBH). However, for accounting purposes, gang block DVA's ASIZE include all the space allocated below them, i.e. the 512-byte gang block header (GBH) as well as the gang members below that. We see that above where the gang leader BP is 1MB logical (and after compression: 0x`100000P`), but the ASIZE of each DVA is 2 sectors (1KB) more than 1MB (0x`100400`). Since thre are 3 copies of a block below it, we increment the ATIME of the 3rd DVA of the gang leader by the space used by the 3rd DVA of the child (1 sector, in this case). But there isn't really a 3rd DVA of the parent; the salt is stored in place of the 3rd DVA's ASIZE. So when zio_write_gang_member_ready() increments the parent's BP's `DVA[2]`'s ASIZE, it's actually incrementing the parent's salt. When we later try to read the encrypted recursively-ganged block, the salt doesn't match what we used to write it, so MAC verification fails and we get an EIO. ``` zio_encrypt(): encrypted 515/2/0/403 salt: 25 25 bb 9d ad d6 cd 89 zio_decrypt(): decrypting 515/2/0/403 salt: 26 25 bb 9d ad d6 cd 89 ``` This commit addresses the problem by not increasing the number of copies of the GBH beyond 2 (even for non-encrypted blocks). This simplifies the logic while maintaining the ability to traverse all metadata (including gang blocks) even if one copy is lost. (Note that 3 copies of the GBH will still be created if requested, e.g. for `copies=3` or MOS blocks.) Additionally, the code that increments the parent's DVA's ASIZE is made to check the parent DVA's NDVAS even on nondebug bits. So if there's a similar bug in the future, it will cause a panic when trying to write, rather than corrupting the parent BP and causing an error when reading. Signed-off-by: Matthew Ahrens <mahrens@delphix.com> Caused-by: #14356 Closes #14413 Pull-request: #14440 part 1/1 |
||||||||||||||||||
Matthew Ahrens
mahrens @delphix.com |
|
|
|
|||||||||||||||
EIO caused by encryption + recursive gang Encrypted blocks can not have 3 DVAs, because they use the space of the 3rd DVA for the IV+salt. zio_write_gang_block() takes this into account, setting `gbh_copies` to no more than 2 in this case. Gang members BP's do not have the X (encrypted) bit set (nor do they have the DMU level and type fields set), because encryption is not handled at this level. The gang block is reassembled, and then encryption (and compression) are handled. To check if this gang block is encrypted, the code in zio_write_gang_block() checks `pio->io_bp`. This is normally fine, because the block that's being ganged is typically the encrypted BP. The problem is that if there is "recursive ganging", where a gang member is itself a gang block, then when zio_write_gang_block() is called to create a gang block for a gang member, `pio->io_bp` is the gang member's BP, which doesn't have the X bit set, so the number of DVA's is not restricted to 2. It should instead be looking at the the "gang leader", i.e. the top-level gang block, to determine how many DVA's can be used, to avoid a "NDVA's inversion" (where a child has more DVA's than its parent). gang leader BP: X (encrypted) bit set, 2 DVA's, IV+salt in 3rd DVA's space: ``` DVA[0]=<1:...:100400> DVA[1]=<0:...:100400> salt=... iv=... [L0 ZFS plain file] fletcher4 uncompressed encrypted LE gang unique double size=100000L/100000P birth=... fill=1 cksum=... ``` leader's GBH contains a BP with gang bit set and 3 DVA's: ``` DVA[0]=<1:...:55600> DVA[1]=<0:...:55600> [L0 unallocated] fletcher4 uncompressed unencrypted LE contiguous unique double size=55600L/55600P birth=... fill=0 cksum=... DVA[0]=<1:...:55600> DVA[1]=<0:...:55600> [L0 unallocated] fletcher4 uncompressed unencrypted LE contiguous unique double size=55600L/55600P birth=... fill=0 cksum=... DVA[0]=<1:...:55600> DVA[1]=<0:...:55600> DVA[2]=<1:...:200> [L0 unallocated] fletcher4 uncompressed unencrypted LE gang unique double size=55400L/55400P birth=... fill=0 cksum=... ``` On nondebug bits, having the 3rd DVA in the gang block works for the most part, because it's true that all 3 DVA's are available in the gang member BP (in the GBH). However, for accounting purposes, gang block DVA's ASIZE include all the space allocated below them, i.e. the 512-byte gang block header (GBH) as well as the gang members below that. We see that above where the gang leader BP is 1MB logical (and after compression: 0x`100000P`), but the ASIZE of each DVA is 2 sectors (1KB) more than 1MB (0x`100400`). Since thre are 3 copies of a block below it, we increment the ATIME of the 3rd DVA of the gang leader by the space used by the 3rd DVA of the child (1 sector, in this case). But there isn't really a 3rd DVA of the parent; the salt is stored in place of the 3rd DVA's ASIZE. So when zio_write_gang_member_ready() increments the parent's BP's `DVA[2]`'s ASIZE, it's actually incrementing the parent's salt. When we later try to read the encrypted recursively-ganged block, the salt doesn't match what we used to write it, so MAC verification fails and we get an EIO. ``` zio_encrypt(): encrypted 515/2/0/403 salt: 25 25 bb 9d ad d6 cd 89 zio_decrypt(): decrypting 515/2/0/403 salt: 26 25 bb 9d ad d6 cd 89 ``` This commit addresses the problem by not increasing the number of copies of the GBH beyond 2 (even for non-encrypted blocks). This simplifies the logic while maintaining the ability to traverse all metadata (including gang blocks) even if one copy is lost. (Note that 3 copies of the GBH will still be created if requested, e.g. for `copies=3` or MOS blocks.) Additionally, the code that increments the parent's DVA's ASIZE is made to check the parent DVA's NDVAS even on nondebug bits. So if there's a similar bug in the future, it will cause a panic when trying to write, rather than corrupting the parent BP and causing an error when reading. Signed-off-by: Matthew Ahrens <mahrens@delphix.com> Caused-by: #14356 Closes #14413 Pull-request: #14440 part 1/1 |
||||||||||||||||||
Allan Jude
allan @klarasystems.com |
|
|
|
|||||||||||||||
Resolve WS-2021-0184 vulnerability in zstd Pull in d40f55cd950919d7eac951b122668e55e33e5202 from upstream Sponsored-by: Klara, Inc. Signed-off-by: Allan Jude <allan@klarasystems.com> Pull-request: #14439 part 1/1 |
||||||||||||||||||
Mark Johnston
markj @FreeBSD.org |
|
|
|
|||||||||||||||
Specify a balanced NUMA policy for kernel buffers on FreeBSD Buffers used for ARC data and metadata are allocated from UMA, the FreeBSD kernel's memory allocator. Such buffers can consume a large fraction of the system's memory. On NUMA systems, UMA zones (i.e., kmem caches) have a first-touch policy by default. That is, when allocating memory, the allocator will return memory from the NUMA domain in which the allocating thread is currently running. If a zone is created with the UMA_ZONE_ROUNDROBIN flag, the allocator will instead attempt to balance allocations across all domains. Switch the ABD chunk and ZIO data buffer caches to use this balanced policy instead. There are two reasons for this: - Buffers may be cached for a long time and a first-touch policy doesn't obviously make sense. A round-robin policy is a more sensible default even if it isn't optimal for some workloads. - The first-touch policy interacts poorly with FreeBSD's and ZFS' low memory handling. This policy makes it easy to completely exhaust one domain's free pages without touching another. In this situation there is no backpressure on the ARC because it has no awareness of per-domain free page counts. Meanwhile, because the first-touch policy is strict, it is possible for ZFS to trigger low-memory deadlocks even when other domains have plentiful free pages. UMA's first-touch policy simply isn't designed for a consumer like ZFS, which is somewhat unusual among others in FreeBSD. Rather than making UMA more complicated and less predictable to try and handle ZFS' requirements, let's change ZFS to try and balance its memory usage. The patch introduces a new kmem_cache_create() flag which is plumbed into UMA_ZONE_ROUNDROBIN on FreeBSD. There is no change in behaviour on Linux. Sponsored-by: Klara, Inc. Sponsored-by: E-CARD LTD. Signed-off-by: Mark Johnston <markj@FreeBSD.org> Pull-request: #14437 part 1/1 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Revert "ztest fails assertion in zio_write_gang_member_ready()" This reverts commit 40d7e971ffc16b2ef993a6e9da40a8b3ca91ad01 due to potential regression, see issue #14413 for details. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14432 part 1/1 |
||||||||||||||||||
George Wilson
george.wilson @delphix.com |
|
|
|
|||||||||||||||
rootdelay on zfs should be adaptive The 'rootdelay' boot option currently pauses the boot for a specified amount of time. The original intent was to ensure that slower configurations would have ample time to enumerate the devices to make importing the root pool successful. This, however, causes unnecessary boot delay for environments like Azure which set this parameter by default. This commit changes the initramfs logic to pause until it can successfully load the 'zfs' module. The timeout specified by 'rootdelay' now becomes the maximum amount of time that initramfs will wait before failing the boot. Signed-off-by: George Wilson <gwilson@delphix.com> Pull-request: #14430 part 1/1 |
||||||||||||||||||
George Wilson
george.wilson @delphix.com |
|
|
|
|||||||||||||||
rootdelay on zfs should be adaptive The 'rootdelay' boot option currently pauses the boot for a specified amount of time. The original intent was to ensure that slower configurations would have ample time to enumerate the devices to make importing the root pool successful. This, however, causes unnecessary boot delay for environments like Azure which set this parameter by default. This commit changes the initramfs logic to pause until it can successfully load the 'zfs' module. The timeout specified by 'rootdelay' now becomes the maximum amount of time that initramfs will wait before failing the boot. Signed-off-by: George Wilson <gwilson@delphix.com> Pull-request: #14430 part 1/1 |
||||||||||||||||||
George Wilson
george.wilson @delphix.com |
|
|
|
|||||||||||||||
rootdelay on zfs should be adaptive The 'rootdelay' boot option currently pauses the boot for a specified amount of time. The original intent was to ensure that slower configurations would have ample time to enumerate the devices to make importing the root pool successful. This, however, causes unnecessary boot delay for environments like Azure which set this parameter by default. This commit changes the initramfs logic to pause until it can successfully load the 'zfs' module. The timeout specified by 'rootdelay' now becomes the maximum amount of time that initramfs will wait before failing the boot. Signed-off-by: George Wilson <gwilson@delphix.com> Pull-request: #14430 part 1/1 |
||||||||||||||||||
Jorgen Lundman
lundman @lundman.net |
|
|
|
|||||||||||||||
Slash hack check to see if MAF is a mutex race Falling down into mutex_destroy() too quickly. Signed-off-by: Jorgen Lundman <lundman@lundman.net> Pull-request: #14429 part 2/2 |
||||||||||||||||||
Jorgen Lundman
lundman @lundman.net |
|
|
|
|||||||||||||||
Upstream: Add macOS support Add source files to enable macOS support Change autoconf/Makefiles to compile Prepare zfs-tests for macOS but changes come later Signed-off-by: Jorgen Lundman <lundman@lundman.net> Pull-request: #14429 part 1/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_rebuild_vdev_limit to 64MB When testing distributed rebuild performance with more capable hardware it was observed than increasing the zfs_rebuild_vdev_limit to 64M reduced the rebuild time by 17%. Beyond 64MB there was some improvement (~2%) but it was not significant when weighed against the increased memory usage. Memory usage is capped at 1/4 of arc_c_max. Additionally, vr_bytes_inflight_max has been moved so it's updated per-metaslab to allow the size to be adjust while a rebuild is running. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 2/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_scan_vdev_limit to 16MB For HDD based pools the default zfs_scan_vdev_limit of 4M per-vdev can significantly limit the maximum scrub performance. Increasing the default to 16M can double the scrub speed from 80 MB/s per disk to 160 MB/s per disk. This does increase the memory footprint during scrub/resilver but given the performance win this is a reasonable trade off. Memory usage is capped at 1/4 of arc_c_max. Note that number of outstanding I/Os has not changed and is still limited by zfs_vdev_scrub_max_active. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 1/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_rebuild_vdev_limit to 64MB When testing distributed rebuild performance with more capable hardware it was observed than increasing the zfs_rebuild_vdev_limit to 64M reduced the rebuild time by 17%. Beyond 64MB there was some improvement (~2%) but it was not significant when weighed against the increased memory usage. Memory usage is capped at 1/4 of arc_c_max. Additionally, vr_bytes_inflight_max has been moved so it's updated per-metaslab to allow the size to be adjust while a rebuild is running. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 2/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_scan_vdev_limit to 16MB For HDD based pools the default zfs_scan_vdev_limit of 4M per-vdev can significantly limit the maximum scrub performance. Increasing the default to 16M can double the scrub speed from 80 MB/s per disk to 160 MB/s per disk. This does increase the memory footprint during scrub/resilver but given the performance win this is a reasonable trade off. Memory usage is capped at 1/4 of arc_c_max. Note that number of outstanding I/Os has not changed and is still limited by zfs_vdev_scrub_max_active. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 1/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_rebuild_vdev_limit to 64MB When testing distributed rebuild performance with more capable hardware it was observed than increasing the zfs_rebuild_vdev_limit to 64M reduced the rebuild time by 17%. Beyond 64MB there was some improvement (~2%) but it was not significant when weighed against the increased memory usage. Memory usage is capped at 1/4 of arc_c_max. Additionally, vr_bytes_inflight_max has been moved so it's updated per-metaslab to allow the size to be adjust while a rebuild is running. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 2/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_scan_vdev_limit to 16MB For HDD based pools the default zfs_scan_vdev_limit of 4M per-vdev can significantly limit the maximum scrub performance. Increasing the default to 16M can double the scrub speed from 80 MB/s per disk to 160 MB/s per disk. This does increase the memory footprint during scrub/resilver but given the performance win this is a reasonable trade off. Memory usage is capped at 1/4 of arc_c_max. Note that number of outstanding I/Os has not changed and is still limited by zfs_vdev_scrub_max_active. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 1/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_rebuild_vdev_limit to 64MB When testing distributed rebuild performance with more capable hardware it was observed than increasing the zfs_rebuild_vdev_limit to 64M reduced the rebuild time by 17%. Beyond 64MB there was some improvement (~2%) but it was not significant when weighed against the increased memory usage. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 2/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_scan_vdev_limit to 16MB For HDD based pools the default zfs_scan_vdev_limit of 4M per-vdev can significantly limit the maximum scrub performance. Increasing the default to 16M can double the scrub speed from 80 MB/s per disk to 160 MB/s per disk. This does increase the memory footprint during scrub/resilver but given the performance win this is a reasonable trade off. Note that number of outstanding I/Os has not changed and is still limited by zfs_vdev_scrub_max_active. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 1/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_rebuild_vdev_limit to 64MB When testing distributed rebuild performance with more capable hardware it was observed than increasing the zfs_rebuild_vdev_limit to 64M reduced the rebuild time by 17%. Beyond 64MB there was some improvement (~2%) but it was not significant when weighed against the increased memory usage. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 2/2 |
||||||||||||||||||
Brian Behlendorf
behlendorf1 @llnl.gov |
|
|
|
|||||||||||||||
Increase default zfs_scan_vdev_limit to 16MB For HDD based pools the default zfs_scan_vdev_limit of 4M per-vdev can significantly limit the maximum scrub performance. Increasing the default to 16M can double the scrub speed from 80 MB/s per disk to 160 MB/s per disk. This does increase the memory footprint during scrub/resilver but given the performance win this is a reasonable trade off. Note that number of outstanding I/Os has not changed and is still limited by zfs_vdev_scrub_max_active. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov> Pull-request: #14428 part 1/2 |
||||||||||||||||||
Tony Hutter
hutter2 @llnl.gov |
|
|
|
|||||||||||||||
Tag zfs-2.1.9 META file and changelog updated. Signed-off-by: Tony Hutter <hutter2@llnl.gov> Pull-request: #14427 part 3/3 |
||||||||||||||||||
Tony Hutter
hutter2 @llnl.gov |
|
|
|
|||||||||||||||
linux 6.2 compat: zpl_set_acl arg2 is now struct dentry Linux 6.2 changes the second argument of the set_acl operation to be a "struct dentry *" rather than a "struct inode *". The inode* parameter is still available as dentry->d_inode, so adjust the call to the _impl function call to dereference and pass that pointer to it. Also document that the get_acl -> get_inode_acl member name change from commit 884a693 was an API change also introduced in Linux 6.2. Reviewed-by: Tony Hutter <hutter2@llnl.gov> Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Reviewed-by: Richard Yao <richard.yao@alumni.stonybrook.edu> Signed-off-by: Coleman Kane <ckane@colemankane.org> Closes #14415 Pull-request: #14427 part 2/3 |
||||||||||||||||||
Tony Hutter
hutter2 @llnl.gov |
|
|
|
|||||||||||||||
Revert "ztest fails assertion in zio_write_gang_member_ready()" This reverts commit 0156253d29a303bdcca3e535958e754d8f086e33. That commit was identified as causing IO errors on a user's encrypted dataset: https://github.com/openzfs/zfs/issues/14413 Signed-off-by: Tony Hutter <hutter2@llnl.gov> Pull-request: #14427 part 1/3 |
||||||||||||||||||
Richard Yao
richard.yao @alumni.stonybrook.edu |
|
|
|
|||||||||||||||
Cleanup: Use ASSERT3U()/VERIFY3U() where applicable Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu> Pull-request: #14424 part 4/4 |
||||||||||||||||||
|
||||||||||||||||||
Richard Yao
richard.yao @alumni.stonybrook.edu |
|
|
|
|||||||||||||||
Cleanup: Use ASSERT3S()/VERIFY3S() where applicable Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu> Pull-request: #14424 part 3/4 |
||||||||||||||||||
Richard Yao
richard.yao @alumni.stonybrook.edu |
|
|
|
|||||||||||||||
Cleanup: Use ASSERT3P()/VERIFY3P() where applicable Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu> Pull-request: #14424 part 2/4 |
||||||||||||||||||
Richard Yao
richard.yao @alumni.stonybrook.edu |
|
|
|
|||||||||||||||
Cleanup: Use ASSERT0()/VERIFY0() where applicable Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu> Pull-request: #14424 part 1/4 |
||||||||||||||||||
Richard Yao
richard.yao @alumni.stonybrook.edu |
|
|
|
|||||||||||||||
Cleanup: Use ASSERT3U()/VERIFY3U() where applicable Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu> Pull-request: #14424 part 4/4 |
||||||||||||||||||
Richard Yao
richard.yao @alumni.stonybrook.edu |
|
|
|
|||||||||||||||
Cleanup: Use ASSERT3S()/VERIFY3S() where applicable Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu> Pull-request: #14424 part 3/4 |
||||||||||||||||||
Ethan Coe-Renner
coerenner1 @llnl.gov |
|
|
|
|||||||||||||||
Add colored output to zfs list - Bold header row - Color AVAIL column based on percentage of volume available - < 20%: Yellow - < 10%: Red Signed-off-by: Ethan Coe-Renner <coerenner1@llnl.gov> Pull-request: #14350 part 1/1 |
||||||||||||||||||
Thomas Munro
tmunro @FreeBSD.org |
|
|
|
|||||||||||||||
Add FreeBSD posix_fadvise support. As commit 320f0c6 did for Linux, connect POSIX_FADV_WILLNEED up to dmu_prefetch() on FreeBSD. Reviewed-by: Mateusz Guzik <mjg@FreeBSD.org> Reviewed-by: Alexander Motin <mav@FreeBSD.org> Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Signed-off-by: Thomas Munro <tmunro@FreeBSD.org> Pull-request: #13958 part 2/2 |
||||||||||||||||||
Thomas Munro
tmunro @FreeBSD.org |
|
|
|
|||||||||||||||
Fix portability problems in tests/functional/fadvise. 1. Use the existing get_arcstats() function from libtest.shlib to read data_size, instead of directly accessing /proc/spl/kstat/zfs, which FreeBSD doesn't have. 2. Make the regex in libtest.shlib a little stricter, because otherwise data_size also matches metadata_size and the test breaks, which is probably why it was done another way first... 3. Instead of relying on the numerical values of POSIX_FADV_XXX macros, accept macro names as arguments to the file_fadvise program. (The numbers happen to match on Linux and FreeBSD, but future systems may vary and it seems a little strange/raw to count on that.) 4. For implementation reasons, SEQUENTIAL doesn't reach ZFS via FreeBSD VFS currently (perhaps something that should be investigated in FreeBSD). Since on Linux we're treating SEQUENTIAL and WILLNEED the same, it doesn't really matter which one we use, so switch the test over to WILLNEED exercise the new prefetch code on both OSes the same way. Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Signed-off-by: Thomas Munro <tmunro@FreeBSD.org> Pull-request: #13958 part 1/2 |
||||||||||||||||||
Thomas Munro
tmunro @FreeBSD.org |
|
|
|
|||||||||||||||
Add FreeBSD posix_fadvise support. As commit 320f0c6 did for Linux, connect POSIX_FADV_WILLNEED up to dmu_prefetch() on FreeBSD. Reviewed-by: Mateusz Guzick <mjg@FreeBSD.org> Reviewed-by: Alexander Motin <mav@FreeBSD.org> Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Signed-off-by: Thomas Munro <tmunro@FreeBSD.org> Pull-request: #13958 part 2/2 |
||||||||||||||||||
Thomas Munro
tmunro @FreeBSD.org |
|
|
|
|||||||||||||||
Fix portability problems in tests/functional/fadvise. 1. Use the existing get_arcstats() function from libtest.shlib to read data_size, instead of directly accessing /proc/spl/kstat/zfs, which FreeBSD doesn't have. 2. Make the regex in libtest.shlib a little stricter, because otherwise data_size also matches metadata_size and the test breaks, which is probably why it was done another way first... 3. Instead of relying on the numerical values of POSIX_FADV_XXX macros, accept macro names as arguments to the file_fadvise program. (The numbers happen to match on Linux and FreeBSD, but future systems may vary and it seems a little strange/raw to count on that.) 4. For implementation reasons, SEQUENTIAL doesn't reach ZFS via FreeBSD VFS currently (perhaps something that should be investigated in FreeBSD). Since on Linux we're treating SEQUENTIAL and WILLNEED the same, it doesn't really matter which one we use, so switch the test over to WILLNEED exercise the new prefetch code on both OSes the same way. Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov> Signed-off-by: Thomas Munro <tmunro@FreeBSD.org> Pull-request: #13958 part 1/2 |
||||||||||||||||||
George Amanakis
gamanakis @gmail.com |
|
|
|
|||||||||||||||
Teach zpool scrub to scrub only block in error log Added a flag -e in zpool scrub to scrub only blocks in error log. A user can pause, resume and cancel the error scrub by passing additional command line arguments -p -s just like a regular scrub. This involves adding a new flag, creating new libzfs interfaces, a new ioctl, and the actual iteration and read-issuing logic. Error scrubbing is executed in multiple txg to make sure pool performance is not affected. Co-authored-by: TulsiJain tulsi.jain@delphix.com Signed-off-by: George Amanakis <gamanakis@gmail.com> Pull-request: #12355 part 1/1 |
||||||||||||||||||
Brian Atkinson
batkinson @lanl.gov |
|
|
|
|||||||||||||||
Adding Direct IO Support Adding O_DIRECT support to ZFS to bypass the ARC for writes/reads. O_DIRECT support in ZFS will always ensure there is coherency between buffered and O_DIRECT IO requests. This ensures that all IO requests, whether buffered or direct, will see the same file contents at all times. Just as in other FS's , O_DIRECT does not imply O_SYNC. While data is written directly to VDEV disks, metadata will not be synced until the associated TXG is synced. For both O_DIRECT read and write request the offset and requeset sizes, at a minimum, must be PAGE_SIZE aligned. In the event they are not, then EINVAL is returned unless the direct property is set to always (see below). For O_DIRECT writes: The request also must be block aligned (recordsize) or the write request will take the normal (buffered) write path. In the event that request is block aligned and a cached copy of the buffer in the ARC, then it will be discarded from the ARC forcing all further reads to retrieve the data from disk. For O_DIRECT reads: The only alignment restrictions are PAGE_SIZE alignment. In the event that the requested data is in buffered (in the ARC) it will just be copied from the ARC into the user buffer. For both O_DIRECT writes and reads the O_DIRECT flag will be ignored in the event that file contents are mmap'ed. In this case, all requests that are at least PAGE_SIZE aligned will just fall back to the buffered paths. If the request however is not PAGE_SIZE aligned, EINVAL will be returned as always regardless if the file's contents are mmap'ed. Since O_DIRECT writes go through the normal ZIO pipeline, the following operations are supported just as with normal buffered writes: Checksum Compression Dedup Encryption Erasure Coding There is one caveat for the data integrity of O_DIRECT writes that is distinct for each of the OS's supported by ZFS. FreeBSD - FreeBSD is able to place user pages under write protection so any data in the user buffers and written directly down to the VDEV disks is guaranteed to not change. There is no concern with data integrity and O_DIRECT writes. Linux - Linux is not able to place anonymous user pages under write protection. Because of this, if the user decides to manipulate the page contents while the write operation is occurring, data integrity can not be guaranteed. However, there is a module parameter `zfs_vdev_direct_write_verify_pct` that contols the percentage of O_DIRECT writes that can occur to a top-level VDEV before a checksum verify is run before the contents of the user buffers are committed to disk. In the event of a checksum verification failure the write will be redirected through the ARC. The deafault value for `zfs_vdev_direct_write_verify_pct` is 2 percent of Direct I/O writes to a top-level VDEV. The number of O_DIRECT write checksum verification errors can be observed by doing `zpool status -d`, which will list all verification errors that have occurred on a top-level VDEV. Along with `zpool status`, a ZED event will be issues as `dio_verify` when a checksum verification error occurs. A new dataset property `direct` has been added with the following 3 allowable values: disabled - Accepts O_DIRECT flag, but silently ignores it and treats the request as a buffered IO request. standard - Follows the alignment restrictions outlined above for write/read IO requests when the O_DIRECT flag is used. always - Treats every write/read IO request as though it passed O_DIRECT and will do O_DIRECT if the alignment restrictions are met otherwise will redirect through the ARC. This property will not allow a request to fail. Signed-off-by: Brian Atkinson <batkinson@lanl.gov> Co-authored-by: Mark Maybee <mark.maybee@delphix.com> Co-authored-by: Matt Macy <mmacy@FreeBSD.org> Co-authored-by: Brian Behlendorf <behlendorf@llnl.gov> Pull-request: #10018 part 1/1 |
||||||||||||||||||
Brian Atkinson
batkinson @lanl.gov |
|
|
|
|||||||||||||||
WIP Direct IO Adding O_DIRECT support to ZFS to bypass the ARC for writes/reads. O_DIRECT support in ZFS will always ensure there is coherency between buffered and O_DIRECT IO requests. This ensures that all IO requests, whether buffered or direct, will see the same file contents at all times. Just as in other FS's , O_DIRECT does not imply O_SYNC. While data is written directly to VDEV disks, metadata will not be synced until the associated TXG is synced. For both O_DIRECT read and write request the offset and requeset sizes, at a minimum, must be PAGE_SIZE aligned. In the event they are not, then EINVAL is returned unless the direct property is set to always (see below). For O_DIRECT writes: The request also must be block aligned (recordsize) or the write request will take the normal (buffered) write path. In the event that request is block aligned and a cached copy of the buffer in the ARC, then it will be discarded from the ARC forcing all further reads to retrieve the data from disk. For O_DIRECT reads: The only alignment restrictions are PAGE_SIZE alignment. In the event that the requested data is in buffered (in the ARC) it will just be copied from the ARC into the user buffer. To ensure data integrity for all data written using O_DIRECT, all user pages are made stable in the event one of the following is required: Checksum Compression Dedup Encryption Parity By making the user pages stable, we make sure the contents of the user provided buffer can not be changed after any of the above operations have taken place. A new dataset property `direct` has been added with the following 3 allowable values: disabled - Accepts O_DIRECT flag, but silently ignores it and treats the request as a buffered IO request. standard - Follows the alignment restrictions outlined above for write/read IO requests when the O_DIRECT flag is used. always - Treats every write/read IO request as though it passed O_DIRECT and will do O_DIRECT if the alignment restrictions are met otherwise will redirect through the ARC. This property will not allow a request to fail. Signed-off-by: Brian Atkinson <batkinson@lanl.gov> Co-authored-by: Mark Maybee <mark.maybee@delphix.com> Co-authored-by: Matt Macy <mmacy@FreeBSD.org> Co-authored-by: Brian Behlendorf <behlendorf@llnl.gov> Pull-request: #10018 part 1/1 |
||||||||||||||||||
|
||||||||||||||||||