summaryrefslogtreecommitdiffstats
path: root/include/sys/dsl_crypt.h
diff options
context:
space:
mode:
authorTom Caputi <[email protected]>2018-10-03 12:47:11 -0400
committerBrian Behlendorf <[email protected]>2018-10-03 09:47:11 -0700
commit52ce99dd617369ff09d8eef8cfd36fa80dbfca4f (patch)
treea7d4a038ff37c7d4eace6b09aa400174bda991be /include/sys/dsl_crypt.h
parentf65fbee1e7a370db24e1aaa2b7bea7865938b9ae (diff)
Refcounted DSL Crypto Key Mappings
Since native ZFS encryption was merged, we have been fighting against a series of bugs that come down to the same problem: Key mappings (which must be present during all I/O operations) are created and destroyed based on dataset ownership, but I/Os can have traditionally been allowed to "leak" into the next txg after the dataset is disowned. In the past we have attempted to solve this problem by trying to ensure that datasets are disowned ater all I/O is finished by calling txg_wait_synced(), but we have repeatedly found edge cases that need to be squashed and code paths that might incur a high number of txg syncs. This patch attempts to resolve this issue differently, by adding a reference to the key mapping for each txg it is dirtied in. By doing so, we can remove many of the unnecessary calls to txg_wait_synced() we have added in the past and ensure we don't need to deal with this problem in the future. Reviewed-by: Jorgen Lundman <[email protected]> Reviewed by: Matthew Ahrens <[email protected]> Reviewed-by: Brian Behlendorf <[email protected]> Signed-off-by: Tom Caputi <[email protected]> Closes #7949
Diffstat (limited to 'include/sys/dsl_crypt.h')
-rw-r--r--include/sys/dsl_crypt.h9
1 files changed, 5 insertions, 4 deletions
diff --git a/include/sys/dsl_crypt.h b/include/sys/dsl_crypt.h
index c6d2b0a16..e01d53527 100644
--- a/include/sys/dsl_crypt.h
+++ b/include/sys/dsl_crypt.h
@@ -111,7 +111,7 @@ typedef struct dsl_crypto_key {
/* link on spa_keystore_t:sk_dsl_keys */
avl_node_t dck_avl_link;
- /* refcount of dsl_key_mapping_t's holding this key */
+ /* refcount of holders of this key */
zfs_refcount_t dck_holds;
/* master key used to derive encryption keys */
@@ -181,10 +181,11 @@ int spa_keystore_load_wkey(const char *dsname, dsl_crypto_params_t *dcp,
int spa_keystore_unload_wkey_impl(spa_t *spa, uint64_t ddobj);
int spa_keystore_unload_wkey(const char *dsname);
-int spa_keystore_create_mapping_impl(spa_t *spa, uint64_t dsobj, dsl_dir_t *dd,
- void *tag);
-int spa_keystore_create_mapping(spa_t *spa, struct dsl_dataset *ds, void *tag);
+int spa_keystore_create_mapping(spa_t *spa, struct dsl_dataset *ds, void *tag,
+ dsl_key_mapping_t **km_out);
int spa_keystore_remove_mapping(spa_t *spa, uint64_t dsobj, void *tag);
+void key_mapping_add_ref(dsl_key_mapping_t *km, void *tag);
+void key_mapping_rele(spa_t *spa, dsl_key_mapping_t *km, void *tag);
int spa_keystore_lookup_key(spa_t *spa, uint64_t dsobj, void *tag,
dsl_crypto_key_t **dck_out);