zfeature.c revision 262093
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21
22/*
23 * Copyright (c) 2013 by Delphix. All rights reserved.
24 */
25
26#include <sys/zfs_context.h>
27#include <sys/zfeature.h>
28#include <sys/dmu.h>
29#include <sys/nvpair.h>
30#include <sys/zap.h>
31#include <sys/dmu_tx.h>
32#include "zfeature_common.h"
33#include <sys/spa_impl.h>
34
35/*
36 * ZFS Feature Flags
37 * -----------------
38 *
39 * ZFS feature flags are used to provide fine-grained versioning to the ZFS
40 * on-disk format. Once enabled on a pool feature flags replace the old
41 * spa_version() number.
42 *
43 * Each new on-disk format change will be given a uniquely identifying string
44 * guid rather than a version number. This avoids the problem of different
45 * organizations creating new on-disk formats with the same version number. To
46 * keep feature guids unique they should consist of the reverse dns name of the
47 * organization which implemented the feature and a short name for the feature,
48 * separated by a colon (e.g. com.delphix:async_destroy).
49 *
50 * Reference Counts
51 * ----------------
52 *
53 * Within each pool features can be in one of three states: disabled, enabled,
54 * or active. These states are differentiated by a reference count stored on
55 * disk for each feature:
56 *
57 *   1) If there is no reference count stored on disk the feature is disabled.
58 *   2) If the reference count is 0 a system administrator has enabled the
59 *      feature, but the feature has not been used yet, so no on-disk
60 *      format changes have been made.
61 *   3) If the reference count is greater than 0 the feature is active.
62 *      The format changes required by the feature are currently on disk.
63 *      Note that if the feature's format changes are reversed the feature
64 *      may choose to set its reference count back to 0.
65 *
66 * Feature flags makes no differentiation between non-zero reference counts
67 * for an active feature (e.g. a reference count of 1 means the same thing as a
68 * reference count of 27834721), but feature implementations may choose to use
69 * the reference count to store meaningful information. For example, a new RAID
70 * implementation might set the reference count to the number of vdevs using
71 * it. If all those disks are removed from the pool the feature goes back to
72 * having a reference count of 0.
73 *
74 * It is the responsibility of the individual features to maintain a non-zero
75 * reference count as long as the feature's format changes are present on disk.
76 *
77 * Dependencies
78 * ------------
79 *
80 * Each feature may depend on other features. The only effect of this
81 * relationship is that when a feature is enabled all of its dependencies are
82 * automatically enabled as well. Any future work to support disabling of
83 * features would need to ensure that features cannot be disabled if other
84 * enabled features depend on them.
85 *
86 * On-disk Format
87 * --------------
88 *
89 * When feature flags are enabled spa_version() is set to SPA_VERSION_FEATURES
90 * (5000). In order for this to work the pool is automatically upgraded to
91 * SPA_VERSION_BEFORE_FEATURES (28) first, so all pre-feature flags on disk
92 * format changes will be in use.
93 *
94 * Information about features is stored in 3 ZAP objects in the pool's MOS.
95 * These objects are linked to by the following names in the pool directory
96 * object:
97 *
98 * 1) features_for_read: feature guid -> reference count
99 *    Features needed to open the pool for reading.
100 * 2) features_for_write: feature guid -> reference count
101 *    Features needed to open the pool for writing.
102 * 3) feature_descriptions: feature guid -> descriptive string
103 *    A human readable string.
104 *
105 * All enabled features appear in either features_for_read or
106 * features_for_write, but not both.
107 *
108 * To open a pool in read-only mode only the features listed in
109 * features_for_read need to be supported.
110 *
111 * To open the pool in read-write mode features in both features_for_read and
112 * features_for_write need to be supported.
113 *
114 * Some features may be required to read the ZAP objects containing feature
115 * information. To allow software to check for compatibility with these features
116 * before the pool is opened their names must be stored in the label in a
117 * new "features_for_read" entry (note that features that are only required
118 * to write to a pool never need to be stored in the label since the
119 * features_for_write ZAP object can be read before the pool is written to).
120 * To save space in the label features must be explicitly marked as needing to
121 * be written to the label. Also, reference counts are not stored in the label,
122 * instead any feature whose reference count drops to 0 is removed from the
123 * label.
124 *
125 * Adding New Features
126 * -------------------
127 *
128 * Features must be registered in zpool_feature_init() function in
129 * zfeature_common.c using the zfeature_register() function. This function
130 * has arguments to specify if the feature should be stored in the
131 * features_for_read or features_for_write ZAP object and if it needs to be
132 * written to the label when active.
133 *
134 * Once a feature is registered it will appear as a "feature@<feature name>"
135 * property which can be set by an administrator. Feature implementors should
136 * use the spa_feature_is_enabled() and spa_feature_is_active() functions to
137 * query the state of a feature and the spa_feature_incr() and
138 * spa_feature_decr() functions to change an enabled feature's reference count.
139 * Reference counts may only be updated in the syncing context.
140 *
141 * Features may not perform enable-time initialization. Instead, any such
142 * initialization should occur when the feature is first used. This design
143 * enforces that on-disk changes be made only when features are used. Code
144 * should only check if a feature is enabled using spa_feature_is_enabled(),
145 * not by relying on any feature specific metadata existing. If a feature is
146 * enabled, but the feature's metadata is not on disk yet then it should be
147 * created as needed.
148 *
149 * As an example, consider the com.delphix:async_destroy feature. This feature
150 * relies on the existence of a bptree in the MOS that store blocks for
151 * asynchronous freeing. This bptree is not created when async_destroy is
152 * enabled. Instead, when a dataset is destroyed spa_feature_is_enabled() is
153 * called to check if async_destroy is enabled. If it is and the bptree object
154 * does not exist yet, the bptree object is created as part of the dataset
155 * destroy and async_destroy's reference count is incremented to indicate it
156 * has made an on-disk format change. Later, after the destroyed dataset's
157 * blocks have all been asynchronously freed there is no longer any use for the
158 * bptree object, so it is destroyed and async_destroy's reference count is
159 * decremented back to 0 to indicate that it has undone its on-disk format
160 * changes.
161 */
162
163typedef enum {
164	FEATURE_ACTION_ENABLE,
165	FEATURE_ACTION_INCR,
166	FEATURE_ACTION_DECR,
167} feature_action_t;
168
169/*
170 * Checks that the features active in the specified object are supported by
171 * this software.  Adds each unsupported feature (name -> description) to
172 * the supplied nvlist.
173 */
174boolean_t
175feature_is_supported(objset_t *os, uint64_t obj, uint64_t desc_obj,
176    nvlist_t *unsup_feat, nvlist_t *enabled_feat)
177{
178	boolean_t supported;
179	zap_cursor_t zc;
180	zap_attribute_t za;
181
182	supported = B_TRUE;
183	for (zap_cursor_init(&zc, os, obj);
184	    zap_cursor_retrieve(&zc, &za) == 0;
185	    zap_cursor_advance(&zc)) {
186		ASSERT(za.za_integer_length == sizeof (uint64_t) &&
187		    za.za_num_integers == 1);
188
189		if (NULL != enabled_feat) {
190			fnvlist_add_uint64(enabled_feat, za.za_name,
191			    za.za_first_integer);
192		}
193
194		if (za.za_first_integer != 0 &&
195		    !zfeature_is_supported(za.za_name)) {
196			supported = B_FALSE;
197
198			if (NULL != unsup_feat) {
199				char *desc = "";
200				char buf[MAXPATHLEN];
201
202				if (zap_lookup(os, desc_obj, za.za_name,
203				    1, sizeof (buf), buf) == 0)
204					desc = buf;
205
206				VERIFY(nvlist_add_string(unsup_feat, za.za_name,
207				    desc) == 0);
208			}
209		}
210	}
211	zap_cursor_fini(&zc);
212
213	return (supported);
214}
215
216static int
217feature_get_refcount(objset_t *os, uint64_t read_obj, uint64_t write_obj,
218    zfeature_info_t *feature, uint64_t *res)
219{
220	int err;
221	uint64_t refcount;
222	uint64_t zapobj = feature->fi_can_readonly ? write_obj : read_obj;
223
224	/*
225	 * If the pool is currently being created, the feature objects may not
226	 * have been allocated yet.  Act as though all features are disabled.
227	 */
228	if (zapobj == 0)
229		return (SET_ERROR(ENOTSUP));
230
231	err = zap_lookup(os, zapobj, feature->fi_guid, sizeof (uint64_t), 1,
232	    &refcount);
233	if (err != 0) {
234		if (err == ENOENT)
235			return (SET_ERROR(ENOTSUP));
236		else
237			return (err);
238	}
239	*res = refcount;
240	return (0);
241}
242
243static int
244feature_do_action(objset_t *os, uint64_t read_obj, uint64_t write_obj,
245    uint64_t desc_obj, zfeature_info_t *feature, feature_action_t action,
246    dmu_tx_t *tx)
247{
248	int error;
249	uint64_t refcount;
250	uint64_t zapobj = feature->fi_can_readonly ? write_obj : read_obj;
251
252	ASSERT(0 != zapobj);
253	ASSERT(zfeature_is_valid_guid(feature->fi_guid));
254
255	error = zap_lookup(os, zapobj, feature->fi_guid,
256	    sizeof (uint64_t), 1, &refcount);
257
258	/*
259	 * If we can't ascertain the status of the specified feature, an I/O
260	 * error occurred.
261	 */
262	if (error != 0 && error != ENOENT)
263		return (error);
264
265	switch (action) {
266	case FEATURE_ACTION_ENABLE:
267		/*
268		 * If the feature is already enabled, ignore the request.
269		 */
270		if (error == 0)
271			return (0);
272		refcount = 0;
273		break;
274	case FEATURE_ACTION_INCR:
275		if (error == ENOENT)
276			return (SET_ERROR(ENOTSUP));
277		if (refcount == UINT64_MAX)
278			return (SET_ERROR(EOVERFLOW));
279		refcount++;
280		break;
281	case FEATURE_ACTION_DECR:
282		if (error == ENOENT)
283			return (SET_ERROR(ENOTSUP));
284		if (refcount == 0)
285			return (SET_ERROR(EOVERFLOW));
286		refcount--;
287		break;
288	default:
289		ASSERT(0);
290		break;
291	}
292
293	if (action == FEATURE_ACTION_ENABLE) {
294		int i;
295
296		for (i = 0; feature->fi_depends[i] != NULL; i++) {
297			zfeature_info_t *dep = feature->fi_depends[i];
298
299			error = feature_do_action(os, read_obj, write_obj,
300			    desc_obj, dep, FEATURE_ACTION_ENABLE, tx);
301			if (error != 0)
302				return (error);
303		}
304	}
305
306	error = zap_update(os, zapobj, feature->fi_guid,
307	    sizeof (uint64_t), 1, &refcount, tx);
308	if (error != 0)
309		return (error);
310
311	if (action == FEATURE_ACTION_ENABLE) {
312		error = zap_update(os, desc_obj,
313		    feature->fi_guid, 1, strlen(feature->fi_desc) + 1,
314		    feature->fi_desc, tx);
315		if (error != 0)
316			return (error);
317	}
318
319	if (action == FEATURE_ACTION_INCR && refcount == 1 && feature->fi_mos) {
320		spa_activate_mos_feature(dmu_objset_spa(os), feature->fi_guid);
321	}
322
323	if (action == FEATURE_ACTION_DECR && refcount == 0) {
324		spa_deactivate_mos_feature(dmu_objset_spa(os),
325		    feature->fi_guid);
326	}
327
328	return (0);
329}
330
331void
332spa_feature_create_zap_objects(spa_t *spa, dmu_tx_t *tx)
333{
334	/*
335	 * We create feature flags ZAP objects in two instances: during pool
336	 * creation and during pool upgrade.
337	 */
338	ASSERT(dsl_pool_sync_context(spa_get_dsl(spa)) || (!spa->spa_sync_on &&
339	    tx->tx_txg == TXG_INITIAL));
340
341	spa->spa_feat_for_read_obj = zap_create_link(spa->spa_meta_objset,
342	    DMU_OTN_ZAP_METADATA, DMU_POOL_DIRECTORY_OBJECT,
343	    DMU_POOL_FEATURES_FOR_READ, tx);
344	spa->spa_feat_for_write_obj = zap_create_link(spa->spa_meta_objset,
345	    DMU_OTN_ZAP_METADATA, DMU_POOL_DIRECTORY_OBJECT,
346	    DMU_POOL_FEATURES_FOR_WRITE, tx);
347	spa->spa_feat_desc_obj = zap_create_link(spa->spa_meta_objset,
348	    DMU_OTN_ZAP_METADATA, DMU_POOL_DIRECTORY_OBJECT,
349	    DMU_POOL_FEATURE_DESCRIPTIONS, tx);
350}
351
352/*
353 * Enable any required dependencies, then enable the requested feature.
354 */
355void
356spa_feature_enable(spa_t *spa, zfeature_info_t *feature, dmu_tx_t *tx)
357{
358	ASSERT3U(spa_version(spa), >=, SPA_VERSION_FEATURES);
359	VERIFY3U(0, ==, feature_do_action(spa->spa_meta_objset,
360	    spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
361	    spa->spa_feat_desc_obj, feature, FEATURE_ACTION_ENABLE, tx));
362}
363
364void
365spa_feature_incr(spa_t *spa, zfeature_info_t *feature, dmu_tx_t *tx)
366{
367	ASSERT(dmu_tx_is_syncing(tx));
368	ASSERT3U(spa_version(spa), >=, SPA_VERSION_FEATURES);
369	VERIFY3U(0, ==, feature_do_action(spa->spa_meta_objset,
370	    spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
371	    spa->spa_feat_desc_obj, feature, FEATURE_ACTION_INCR, tx));
372}
373
374void
375spa_feature_decr(spa_t *spa, zfeature_info_t *feature, dmu_tx_t *tx)
376{
377	ASSERT(dmu_tx_is_syncing(tx));
378	ASSERT3U(spa_version(spa), >=, SPA_VERSION_FEATURES);
379	VERIFY3U(0, ==, feature_do_action(spa->spa_meta_objset,
380	    spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
381	    spa->spa_feat_desc_obj, feature, FEATURE_ACTION_DECR, tx));
382}
383
384/*
385 * This interface is for debugging only. Normal consumers should use
386 * spa_feature_is_enabled/spa_feature_is_active.
387 */
388int
389spa_feature_get_refcount(spa_t *spa, zfeature_info_t *feature)
390{
391	int err;
392	uint64_t refcount;
393
394	if (spa_version(spa) < SPA_VERSION_FEATURES)
395		return (B_FALSE);
396
397	err = feature_get_refcount(spa->spa_meta_objset,
398	    spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
399	    feature, &refcount);
400	ASSERT(err == 0 || err == ENOTSUP);
401	return (err == 0 ? refcount : 0);
402}
403
404boolean_t
405spa_feature_is_enabled(spa_t *spa, zfeature_info_t *feature)
406{
407	int err;
408	uint64_t refcount;
409
410	if (spa_version(spa) < SPA_VERSION_FEATURES)
411		return (B_FALSE);
412
413	err = feature_get_refcount(spa->spa_meta_objset,
414	    spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
415	    feature, &refcount);
416	ASSERT(err == 0 || err == ENOTSUP);
417	return (err == 0);
418}
419
420boolean_t
421spa_feature_is_active(spa_t *spa, zfeature_info_t *feature)
422{
423	int err;
424	uint64_t refcount;
425
426	if (spa_version(spa) < SPA_VERSION_FEATURES)
427		return (B_FALSE);
428
429	err = feature_get_refcount(spa->spa_meta_objset,
430	    spa->spa_feat_for_read_obj, spa->spa_feat_for_write_obj,
431	    feature, &refcount);
432	ASSERT(err == 0 || err == ENOTSUP);
433	return (err == 0 && refcount > 0);
434}
435