xref: /titanic_52/usr/src/lib/libzpool/common/kernel.c (revision db9ce1c953f094d292df951aada6b8a85e1ff103)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #include <assert.h>
27 #include <fcntl.h>
28 #include <poll.h>
29 #include <stdio.h>
30 #include <stdlib.h>
31 #include <string.h>
32 #include <zlib.h>
33 #include <sys/spa.h>
34 #include <sys/stat.h>
35 #include <sys/processor.h>
36 #include <sys/zfs_context.h>
37 #include <sys/zmod.h>
38 #include <sys/utsname.h>
39 #include <sys/systeminfo.h>
40 
41 /*
42  * Emulation of kernel services in userland.
43  */
44 
45 uint64_t physmem;
46 vnode_t *rootdir = (vnode_t *)0xabcd1234;
47 char hw_serial[HW_HOSTID_LEN];
48 
49 struct utsname utsname = {
50 	"userland", "libzpool", "1", "1", "na"
51 };
52 
53 /*
54  * =========================================================================
55  * threads
56  * =========================================================================
57  */
58 /*ARGSUSED*/
59 kthread_t *
60 zk_thread_create(void (*func)(), void *arg)
61 {
62 	thread_t tid;
63 
64 	VERIFY(thr_create(0, 0, (void *(*)(void *))func, arg, THR_DETACHED,
65 	    &tid) == 0);
66 
67 	return ((void *)(uintptr_t)tid);
68 }
69 
70 /*
71  * =========================================================================
72  * kstats
73  * =========================================================================
74  */
75 /*ARGSUSED*/
76 kstat_t *
77 kstat_create(char *module, int instance, char *name, char *class,
78     uchar_t type, ulong_t ndata, uchar_t ks_flag)
79 {
80 	return (NULL);
81 }
82 
83 /*ARGSUSED*/
84 void
85 kstat_install(kstat_t *ksp)
86 {}
87 
88 /*ARGSUSED*/
89 void
90 kstat_delete(kstat_t *ksp)
91 {}
92 
93 /*
94  * =========================================================================
95  * mutexes
96  * =========================================================================
97  */
98 void
99 zmutex_init(kmutex_t *mp)
100 {
101 	mp->m_owner = NULL;
102 	mp->initialized = B_TRUE;
103 	(void) _mutex_init(&mp->m_lock, USYNC_THREAD, NULL);
104 }
105 
106 void
107 zmutex_destroy(kmutex_t *mp)
108 {
109 	ASSERT(mp->initialized == B_TRUE);
110 	ASSERT(mp->m_owner == NULL);
111 	(void) _mutex_destroy(&(mp)->m_lock);
112 	mp->m_owner = (void *)-1UL;
113 	mp->initialized = B_FALSE;
114 }
115 
116 void
117 mutex_enter(kmutex_t *mp)
118 {
119 	ASSERT(mp->initialized == B_TRUE);
120 	ASSERT(mp->m_owner != (void *)-1UL);
121 	ASSERT(mp->m_owner != curthread);
122 	VERIFY(mutex_lock(&mp->m_lock) == 0);
123 	ASSERT(mp->m_owner == NULL);
124 	mp->m_owner = curthread;
125 }
126 
127 int
128 mutex_tryenter(kmutex_t *mp)
129 {
130 	ASSERT(mp->initialized == B_TRUE);
131 	ASSERT(mp->m_owner != (void *)-1UL);
132 	if (0 == mutex_trylock(&mp->m_lock)) {
133 		ASSERT(mp->m_owner == NULL);
134 		mp->m_owner = curthread;
135 		return (1);
136 	} else {
137 		return (0);
138 	}
139 }
140 
141 void
142 mutex_exit(kmutex_t *mp)
143 {
144 	ASSERT(mp->initialized == B_TRUE);
145 	ASSERT(mutex_owner(mp) == curthread);
146 	mp->m_owner = NULL;
147 	VERIFY(mutex_unlock(&mp->m_lock) == 0);
148 }
149 
150 void *
151 mutex_owner(kmutex_t *mp)
152 {
153 	ASSERT(mp->initialized == B_TRUE);
154 	return (mp->m_owner);
155 }
156 
157 /*
158  * =========================================================================
159  * rwlocks
160  * =========================================================================
161  */
162 /*ARGSUSED*/
163 void
164 rw_init(krwlock_t *rwlp, char *name, int type, void *arg)
165 {
166 	rwlock_init(&rwlp->rw_lock, USYNC_THREAD, NULL);
167 	rwlp->rw_owner = NULL;
168 	rwlp->initialized = B_TRUE;
169 }
170 
171 void
172 rw_destroy(krwlock_t *rwlp)
173 {
174 	rwlock_destroy(&rwlp->rw_lock);
175 	rwlp->rw_owner = (void *)-1UL;
176 	rwlp->initialized = B_FALSE;
177 }
178 
179 void
180 rw_enter(krwlock_t *rwlp, krw_t rw)
181 {
182 	ASSERT(!RW_LOCK_HELD(rwlp));
183 	ASSERT(rwlp->initialized == B_TRUE);
184 	ASSERT(rwlp->rw_owner != (void *)-1UL);
185 	ASSERT(rwlp->rw_owner != curthread);
186 
187 	if (rw == RW_READER)
188 		VERIFY(rw_rdlock(&rwlp->rw_lock) == 0);
189 	else
190 		VERIFY(rw_wrlock(&rwlp->rw_lock) == 0);
191 
192 	rwlp->rw_owner = curthread;
193 }
194 
195 void
196 rw_exit(krwlock_t *rwlp)
197 {
198 	ASSERT(rwlp->initialized == B_TRUE);
199 	ASSERT(rwlp->rw_owner != (void *)-1UL);
200 
201 	rwlp->rw_owner = NULL;
202 	VERIFY(rw_unlock(&rwlp->rw_lock) == 0);
203 }
204 
205 int
206 rw_tryenter(krwlock_t *rwlp, krw_t rw)
207 {
208 	int rv;
209 
210 	ASSERT(rwlp->initialized == B_TRUE);
211 	ASSERT(rwlp->rw_owner != (void *)-1UL);
212 
213 	if (rw == RW_READER)
214 		rv = rw_tryrdlock(&rwlp->rw_lock);
215 	else
216 		rv = rw_trywrlock(&rwlp->rw_lock);
217 
218 	if (rv == 0) {
219 		rwlp->rw_owner = curthread;
220 		return (1);
221 	}
222 
223 	return (0);
224 }
225 
226 /*ARGSUSED*/
227 int
228 rw_tryupgrade(krwlock_t *rwlp)
229 {
230 	ASSERT(rwlp->initialized == B_TRUE);
231 	ASSERT(rwlp->rw_owner != (void *)-1UL);
232 
233 	return (0);
234 }
235 
236 /*
237  * =========================================================================
238  * condition variables
239  * =========================================================================
240  */
241 /*ARGSUSED*/
242 void
243 cv_init(kcondvar_t *cv, char *name, int type, void *arg)
244 {
245 	VERIFY(cond_init(cv, type, NULL) == 0);
246 }
247 
248 void
249 cv_destroy(kcondvar_t *cv)
250 {
251 	VERIFY(cond_destroy(cv) == 0);
252 }
253 
254 void
255 cv_wait(kcondvar_t *cv, kmutex_t *mp)
256 {
257 	ASSERT(mutex_owner(mp) == curthread);
258 	mp->m_owner = NULL;
259 	int ret = cond_wait(cv, &mp->m_lock);
260 	VERIFY(ret == 0 || ret == EINTR);
261 	mp->m_owner = curthread;
262 }
263 
264 clock_t
265 cv_timedwait(kcondvar_t *cv, kmutex_t *mp, clock_t abstime)
266 {
267 	int error;
268 	timestruc_t ts;
269 	clock_t delta;
270 
271 top:
272 	delta = abstime - ddi_get_lbolt();
273 	if (delta <= 0)
274 		return (-1);
275 
276 	ts.tv_sec = delta / hz;
277 	ts.tv_nsec = (delta % hz) * (NANOSEC / hz);
278 
279 	ASSERT(mutex_owner(mp) == curthread);
280 	mp->m_owner = NULL;
281 	error = cond_reltimedwait(cv, &mp->m_lock, &ts);
282 	mp->m_owner = curthread;
283 
284 	if (error == ETIME)
285 		return (-1);
286 
287 	if (error == EINTR)
288 		goto top;
289 
290 	ASSERT(error == 0);
291 
292 	return (1);
293 }
294 
295 void
296 cv_signal(kcondvar_t *cv)
297 {
298 	VERIFY(cond_signal(cv) == 0);
299 }
300 
301 void
302 cv_broadcast(kcondvar_t *cv)
303 {
304 	VERIFY(cond_broadcast(cv) == 0);
305 }
306 
307 /*
308  * =========================================================================
309  * vnode operations
310  * =========================================================================
311  */
312 /*
313  * Note: for the xxxat() versions of these functions, we assume that the
314  * starting vp is always rootdir (which is true for spa_directory.c, the only
315  * ZFS consumer of these interfaces).  We assert this is true, and then emulate
316  * them by adding '/' in front of the path.
317  */
318 
319 /*ARGSUSED*/
320 int
321 vn_open(char *path, int x1, int flags, int mode, vnode_t **vpp, int x2, int x3)
322 {
323 	int fd;
324 	vnode_t *vp;
325 	int old_umask;
326 	char realpath[MAXPATHLEN];
327 	struct stat64 st;
328 
329 	/*
330 	 * If we're accessing a real disk from userland, we need to use
331 	 * the character interface to avoid caching.  This is particularly
332 	 * important if we're trying to look at a real in-kernel storage
333 	 * pool from userland, e.g. via zdb, because otherwise we won't
334 	 * see the changes occurring under the segmap cache.
335 	 * On the other hand, the stupid character device returns zero
336 	 * for its size.  So -- gag -- we open the block device to get
337 	 * its size, and remember it for subsequent VOP_GETATTR().
338 	 */
339 	if (strncmp(path, "/dev/", 5) == 0) {
340 		char *dsk;
341 		fd = open64(path, O_RDONLY);
342 		if (fd == -1)
343 			return (errno);
344 		if (fstat64(fd, &st) == -1) {
345 			close(fd);
346 			return (errno);
347 		}
348 		close(fd);
349 		(void) sprintf(realpath, "%s", path);
350 		dsk = strstr(path, "/dsk/");
351 		if (dsk != NULL)
352 			(void) sprintf(realpath + (dsk - path) + 1, "r%s",
353 			    dsk + 1);
354 	} else {
355 		(void) sprintf(realpath, "%s", path);
356 		if (!(flags & FCREAT) && stat64(realpath, &st) == -1)
357 			return (errno);
358 	}
359 
360 	if (flags & FCREAT)
361 		old_umask = umask(0);
362 
363 	/*
364 	 * The construct 'flags - FREAD' conveniently maps combinations of
365 	 * FREAD and FWRITE to the corresponding O_RDONLY, O_WRONLY, and O_RDWR.
366 	 */
367 	fd = open64(realpath, flags - FREAD, mode);
368 
369 	if (flags & FCREAT)
370 		(void) umask(old_umask);
371 
372 	if (fd == -1)
373 		return (errno);
374 
375 	if (fstat64(fd, &st) == -1) {
376 		close(fd);
377 		return (errno);
378 	}
379 
380 	(void) fcntl(fd, F_SETFD, FD_CLOEXEC);
381 
382 	*vpp = vp = umem_zalloc(sizeof (vnode_t), UMEM_NOFAIL);
383 
384 	vp->v_fd = fd;
385 	vp->v_size = st.st_size;
386 	vp->v_path = spa_strdup(path);
387 
388 	return (0);
389 }
390 
391 /*ARGSUSED*/
392 int
393 vn_openat(char *path, int x1, int flags, int mode, vnode_t **vpp, int x2,
394     int x3, vnode_t *startvp, int fd)
395 {
396 	char *realpath = umem_alloc(strlen(path) + 2, UMEM_NOFAIL);
397 	int ret;
398 
399 	ASSERT(startvp == rootdir);
400 	(void) sprintf(realpath, "/%s", path);
401 
402 	/* fd ignored for now, need if want to simulate nbmand support */
403 	ret = vn_open(realpath, x1, flags, mode, vpp, x2, x3);
404 
405 	umem_free(realpath, strlen(path) + 2);
406 
407 	return (ret);
408 }
409 
410 /*ARGSUSED*/
411 int
412 vn_rdwr(int uio, vnode_t *vp, void *addr, ssize_t len, offset_t offset,
413 	int x1, int x2, rlim64_t x3, void *x4, ssize_t *residp)
414 {
415 	ssize_t iolen, split;
416 
417 	if (uio == UIO_READ) {
418 		iolen = pread64(vp->v_fd, addr, len, offset);
419 	} else {
420 		/*
421 		 * To simulate partial disk writes, we split writes into two
422 		 * system calls so that the process can be killed in between.
423 		 */
424 		split = (len > 0 ? rand() % len : 0);
425 		iolen = pwrite64(vp->v_fd, addr, split, offset);
426 		iolen += pwrite64(vp->v_fd, (char *)addr + split,
427 		    len - split, offset + split);
428 	}
429 
430 	if (iolen == -1)
431 		return (errno);
432 	if (residp)
433 		*residp = len - iolen;
434 	else if (iolen != len)
435 		return (EIO);
436 	return (0);
437 }
438 
439 void
440 vn_close(vnode_t *vp)
441 {
442 	close(vp->v_fd);
443 	spa_strfree(vp->v_path);
444 	umem_free(vp, sizeof (vnode_t));
445 }
446 
447 /*
448  * At a minimum we need to update the size since vdev_reopen()
449  * will no longer call vn_openat().
450  */
451 int
452 fop_getattr(vnode_t *vp, vattr_t *vap)
453 {
454 	struct stat64 st;
455 
456 	if (fstat64(vp->v_fd, &st) == -1) {
457 		close(vp->v_fd);
458 		return (errno);
459 	}
460 
461 	vap->va_size = st.st_size;
462 	return (0);
463 }
464 
465 #ifdef ZFS_DEBUG
466 
467 /*
468  * =========================================================================
469  * Figure out which debugging statements to print
470  * =========================================================================
471  */
472 
473 static char *dprintf_string;
474 static int dprintf_print_all;
475 
476 int
477 dprintf_find_string(const char *string)
478 {
479 	char *tmp_str = dprintf_string;
480 	int len = strlen(string);
481 
482 	/*
483 	 * Find out if this is a string we want to print.
484 	 * String format: file1.c,function_name1,file2.c,file3.c
485 	 */
486 
487 	while (tmp_str != NULL) {
488 		if (strncmp(tmp_str, string, len) == 0 &&
489 		    (tmp_str[len] == ',' || tmp_str[len] == '\0'))
490 			return (1);
491 		tmp_str = strchr(tmp_str, ',');
492 		if (tmp_str != NULL)
493 			tmp_str++; /* Get rid of , */
494 	}
495 	return (0);
496 }
497 
498 void
499 dprintf_setup(int *argc, char **argv)
500 {
501 	int i, j;
502 
503 	/*
504 	 * Debugging can be specified two ways: by setting the
505 	 * environment variable ZFS_DEBUG, or by including a
506 	 * "debug=..."  argument on the command line.  The command
507 	 * line setting overrides the environment variable.
508 	 */
509 
510 	for (i = 1; i < *argc; i++) {
511 		int len = strlen("debug=");
512 		/* First look for a command line argument */
513 		if (strncmp("debug=", argv[i], len) == 0) {
514 			dprintf_string = argv[i] + len;
515 			/* Remove from args */
516 			for (j = i; j < *argc; j++)
517 				argv[j] = argv[j+1];
518 			argv[j] = NULL;
519 			(*argc)--;
520 		}
521 	}
522 
523 	if (dprintf_string == NULL) {
524 		/* Look for ZFS_DEBUG environment variable */
525 		dprintf_string = getenv("ZFS_DEBUG");
526 	}
527 
528 	/*
529 	 * Are we just turning on all debugging?
530 	 */
531 	if (dprintf_find_string("on"))
532 		dprintf_print_all = 1;
533 }
534 
535 /*
536  * =========================================================================
537  * debug printfs
538  * =========================================================================
539  */
540 void
541 __dprintf(const char *file, const char *func, int line, const char *fmt, ...)
542 {
543 	const char *newfile;
544 	va_list adx;
545 
546 	/*
547 	 * Get rid of annoying "../common/" prefix to filename.
548 	 */
549 	newfile = strrchr(file, '/');
550 	if (newfile != NULL) {
551 		newfile = newfile + 1; /* Get rid of leading / */
552 	} else {
553 		newfile = file;
554 	}
555 
556 	if (dprintf_print_all ||
557 	    dprintf_find_string(newfile) ||
558 	    dprintf_find_string(func)) {
559 		/* Print out just the function name if requested */
560 		flockfile(stdout);
561 		if (dprintf_find_string("pid"))
562 			(void) printf("%d ", getpid());
563 		if (dprintf_find_string("tid"))
564 			(void) printf("%u ", thr_self());
565 		if (dprintf_find_string("cpu"))
566 			(void) printf("%u ", getcpuid());
567 		if (dprintf_find_string("time"))
568 			(void) printf("%llu ", gethrtime());
569 		if (dprintf_find_string("long"))
570 			(void) printf("%s, line %d: ", newfile, line);
571 		(void) printf("%s: ", func);
572 		va_start(adx, fmt);
573 		(void) vprintf(fmt, adx);
574 		va_end(adx);
575 		funlockfile(stdout);
576 	}
577 }
578 
579 #endif /* ZFS_DEBUG */
580 
581 /*
582  * =========================================================================
583  * cmn_err() and panic()
584  * =========================================================================
585  */
586 static char ce_prefix[CE_IGNORE][10] = { "", "NOTICE: ", "WARNING: ", "" };
587 static char ce_suffix[CE_IGNORE][2] = { "", "\n", "\n", "" };
588 
589 void
590 vpanic(const char *fmt, va_list adx)
591 {
592 	(void) fprintf(stderr, "error: ");
593 	(void) vfprintf(stderr, fmt, adx);
594 	(void) fprintf(stderr, "\n");
595 
596 	abort();	/* think of it as a "user-level crash dump" */
597 }
598 
599 void
600 panic(const char *fmt, ...)
601 {
602 	va_list adx;
603 
604 	va_start(adx, fmt);
605 	vpanic(fmt, adx);
606 	va_end(adx);
607 }
608 
609 void
610 vcmn_err(int ce, const char *fmt, va_list adx)
611 {
612 	if (ce == CE_PANIC)
613 		vpanic(fmt, adx);
614 	if (ce != CE_NOTE) {	/* suppress noise in userland stress testing */
615 		(void) fprintf(stderr, "%s", ce_prefix[ce]);
616 		(void) vfprintf(stderr, fmt, adx);
617 		(void) fprintf(stderr, "%s", ce_suffix[ce]);
618 	}
619 }
620 
621 /*PRINTFLIKE2*/
622 void
623 cmn_err(int ce, const char *fmt, ...)
624 {
625 	va_list adx;
626 
627 	va_start(adx, fmt);
628 	vcmn_err(ce, fmt, adx);
629 	va_end(adx);
630 }
631 
632 /*
633  * =========================================================================
634  * kobj interfaces
635  * =========================================================================
636  */
637 struct _buf *
638 kobj_open_file(char *name)
639 {
640 	struct _buf *file;
641 	vnode_t *vp;
642 
643 	/* set vp as the _fd field of the file */
644 	if (vn_openat(name, UIO_SYSSPACE, FREAD, 0, &vp, 0, 0, rootdir,
645 	    -1) != 0)
646 		return ((void *)-1UL);
647 
648 	file = umem_zalloc(sizeof (struct _buf), UMEM_NOFAIL);
649 	file->_fd = (intptr_t)vp;
650 	return (file);
651 }
652 
653 int
654 kobj_read_file(struct _buf *file, char *buf, unsigned size, unsigned off)
655 {
656 	ssize_t resid;
657 
658 	vn_rdwr(UIO_READ, (vnode_t *)file->_fd, buf, size, (offset_t)off,
659 	    UIO_SYSSPACE, 0, 0, 0, &resid);
660 
661 	return (size - resid);
662 }
663 
664 void
665 kobj_close_file(struct _buf *file)
666 {
667 	vn_close((vnode_t *)file->_fd);
668 	umem_free(file, sizeof (struct _buf));
669 }
670 
671 int
672 kobj_get_filesize(struct _buf *file, uint64_t *size)
673 {
674 	struct stat64 st;
675 	vnode_t *vp = (vnode_t *)file->_fd;
676 
677 	if (fstat64(vp->v_fd, &st) == -1) {
678 		vn_close(vp);
679 		return (errno);
680 	}
681 	*size = st.st_size;
682 	return (0);
683 }
684 
685 /*
686  * =========================================================================
687  * misc routines
688  * =========================================================================
689  */
690 
691 void
692 delay(clock_t ticks)
693 {
694 	poll(0, 0, ticks * (1000 / hz));
695 }
696 
697 /*
698  * Find highest one bit set.
699  *	Returns bit number + 1 of highest bit that is set, otherwise returns 0.
700  * High order bit is 31 (or 63 in _LP64 kernel).
701  */
702 int
703 highbit(ulong_t i)
704 {
705 	register int h = 1;
706 
707 	if (i == 0)
708 		return (0);
709 #ifdef _LP64
710 	if (i & 0xffffffff00000000ul) {
711 		h += 32; i >>= 32;
712 	}
713 #endif
714 	if (i & 0xffff0000) {
715 		h += 16; i >>= 16;
716 	}
717 	if (i & 0xff00) {
718 		h += 8; i >>= 8;
719 	}
720 	if (i & 0xf0) {
721 		h += 4; i >>= 4;
722 	}
723 	if (i & 0xc) {
724 		h += 2; i >>= 2;
725 	}
726 	if (i & 0x2) {
727 		h += 1;
728 	}
729 	return (h);
730 }
731 
732 static int random_fd = -1, urandom_fd = -1;
733 
734 static int
735 random_get_bytes_common(uint8_t *ptr, size_t len, int fd)
736 {
737 	size_t resid = len;
738 	ssize_t bytes;
739 
740 	ASSERT(fd != -1);
741 
742 	while (resid != 0) {
743 		bytes = read(fd, ptr, resid);
744 		ASSERT3S(bytes, >=, 0);
745 		ptr += bytes;
746 		resid -= bytes;
747 	}
748 
749 	return (0);
750 }
751 
752 int
753 random_get_bytes(uint8_t *ptr, size_t len)
754 {
755 	return (random_get_bytes_common(ptr, len, random_fd));
756 }
757 
758 int
759 random_get_pseudo_bytes(uint8_t *ptr, size_t len)
760 {
761 	return (random_get_bytes_common(ptr, len, urandom_fd));
762 }
763 
764 int
765 ddi_strtoul(const char *hw_serial, char **nptr, int base, unsigned long *result)
766 {
767 	char *end;
768 
769 	*result = strtoul(hw_serial, &end, base);
770 	if (*result == 0)
771 		return (errno);
772 	return (0);
773 }
774 
775 /*
776  * =========================================================================
777  * kernel emulation setup & teardown
778  * =========================================================================
779  */
780 static int
781 umem_out_of_memory(void)
782 {
783 	char errmsg[] = "out of memory -- generating core dump\n";
784 
785 	write(fileno(stderr), errmsg, sizeof (errmsg));
786 	abort();
787 	return (0);
788 }
789 
790 void
791 kernel_init(int mode)
792 {
793 	umem_nofail_callback(umem_out_of_memory);
794 
795 	physmem = sysconf(_SC_PHYS_PAGES);
796 
797 	dprintf("physmem = %llu pages (%.2f GB)\n", physmem,
798 	    (double)physmem * sysconf(_SC_PAGE_SIZE) / (1ULL << 30));
799 
800 	(void) snprintf(hw_serial, sizeof (hw_serial), "%ld",
801 	    (mode & FWRITE) ? gethostid() : 0);
802 
803 	VERIFY((random_fd = open("/dev/random", O_RDONLY)) != -1);
804 	VERIFY((urandom_fd = open("/dev/urandom", O_RDONLY)) != -1);
805 
806 	system_taskq_init();
807 
808 	spa_init(mode);
809 }
810 
811 void
812 kernel_fini(void)
813 {
814 	spa_fini();
815 
816 	system_taskq_fini();
817 
818 	close(random_fd);
819 	close(urandom_fd);
820 
821 	random_fd = -1;
822 	urandom_fd = -1;
823 }
824 
825 int
826 z_uncompress(void *dst, size_t *dstlen, const void *src, size_t srclen)
827 {
828 	int ret;
829 	uLongf len = *dstlen;
830 
831 	if ((ret = uncompress(dst, &len, src, srclen)) == Z_OK)
832 		*dstlen = (size_t)len;
833 
834 	return (ret);
835 }
836 
837 int
838 z_compress_level(void *dst, size_t *dstlen, const void *src, size_t srclen,
839     int level)
840 {
841 	int ret;
842 	uLongf len = *dstlen;
843 
844 	if ((ret = compress2(dst, &len, src, srclen, level)) == Z_OK)
845 		*dstlen = (size_t)len;
846 
847 	return (ret);
848 }
849 
850 uid_t
851 crgetuid(cred_t *cr)
852 {
853 	return (0);
854 }
855 
856 gid_t
857 crgetgid(cred_t *cr)
858 {
859 	return (0);
860 }
861 
862 int
863 crgetngroups(cred_t *cr)
864 {
865 	return (0);
866 }
867 
868 gid_t *
869 crgetgroups(cred_t *cr)
870 {
871 	return (NULL);
872 }
873 
874 int
875 zfs_secpolicy_snapshot_perms(const char *name, cred_t *cr)
876 {
877 	return (0);
878 }
879 
880 int
881 zfs_secpolicy_rename_perms(const char *from, const char *to, cred_t *cr)
882 {
883 	return (0);
884 }
885 
886 int
887 zfs_secpolicy_destroy_perms(const char *name, cred_t *cr)
888 {
889 	return (0);
890 }
891 
892 ksiddomain_t *
893 ksid_lookupdomain(const char *dom)
894 {
895 	ksiddomain_t *kd;
896 
897 	kd = umem_zalloc(sizeof (ksiddomain_t), UMEM_NOFAIL);
898 	kd->kd_name = spa_strdup(dom);
899 	return (kd);
900 }
901 
902 void
903 ksiddomain_rele(ksiddomain_t *ksid)
904 {
905 	spa_strfree(ksid->kd_name);
906 	umem_free(ksid, sizeof (ksiddomain_t));
907 }
908 
909 /*
910  * Do not change the length of the returned string; it must be freed
911  * with strfree().
912  */
913 char *
914 kmem_asprintf(const char *fmt, ...)
915 {
916 	int size;
917 	va_list adx;
918 	char *buf;
919 
920 	va_start(adx, fmt);
921 	size = vsnprintf(NULL, 0, fmt, adx) + 1;
922 	va_end(adx);
923 
924 	buf = kmem_alloc(size, KM_SLEEP);
925 
926 	va_start(adx, fmt);
927 	size = vsnprintf(buf, size, fmt, adx);
928 	va_end(adx);
929 
930 	return (buf);
931 }
932