Commit graph

305659 commits

Author SHA1 Message Date
Rick Macklem
8e3fd450cc nfsd: Add some support for POSIX draft ACLs
An internet draft (expected to become an RFC someday)
https://datatracker.ietf.org/doc/draft-ietf-nfsv4-posix-acls
describes an extension to NFSv4.2 to handle POSIX draft ACLs.

This is the second of several patches that implement the
above draft.

The only semantics change would be if you have exported
a UFS file system mounted with the "acl" option.
In that case, you would see the acl attribute supported.
This is bogus, but will be handled in the next commit.

Fixes:	a35bbd5d9f ("nfscommon: Add some support for POSIX draft ACLs")
2025-12-21 16:08:05 -08:00
Rick Macklem
a35bbd5d9f nfscommon: Add some support for POSIX draft ACLs
An internet draft (expected to become an RFC someday)
https://datatracker.ietf.org/doc/draft-ietf-nfsv4-posix-acls
describes an extension to NFSv4.2 to handle POSIX draft ACLs.

This is the first of several patches that implement the
above draft.

This patch should not result in a semantics change.
2025-12-21 14:28:12 -08:00
Konstantin Belousov
95788a851d vm_fault_trap(): fix comments grammar
Submitted and reviewed by:	alc
Fixes:	22cce201da
MFC after:	3 days
Differential revision:	https://reviews.freebsd.org/D54335
2025-12-22 00:05:14 +02:00
Kristof Provost
823ebd7c4f libpfctl: export a get states variant that takes a pfctl_handle
Some checks are pending
Cross-build Kernel / amd64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / amd64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / amd64 macos-latest (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 macos-latest (clang-18) (push) Waiting to run
Sponsored by:	Rubicon Communications, LLC ("Netgate")
2025-12-21 18:33:06 +01:00
Kristof Provost
622d7fa18d pf: fix pcounters array size
It's a 2 * 2 * 2, not 2 * 2 * 3. We only use PF_DROP and PF_PASS, so two
rows suffices.

Sponsored by:	Rubicon Communications, LLC ("Netgate")
2025-12-21 18:33:06 +01:00
Andrew Gallatin
4d692068f6 ktls: Capture initial tls seqno at time offload is initiated
Some drivers want the TLS seqno when offload starts. Capture this
for them by adding a union for initial_seqno, sharing space with
the TLS 1.0 next_seqno.

Reviewed by: jhb
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D54275
MFC After: 1 month
2025-12-21 09:45:25 -05:00
Andrew Gallatin
43d7ee540e iflib: support for transmit side nic KTLS offload
This change adds support to iflib for drivers that want to do
transmit-side NIC ktls offload. This change does 2 things:

1) Extends the pkt info to include an optional mbuf pointer.

This gives drivers the ability to find the start of a TLS record if
they need to re-DMA part of the record to re-construct TLS state on
the NIC. This mbuf pointer is only passed when CSUM_SND_TAG is
present on the pkthdr. Note that I don't bother to inspect the send
tag on purpose; this will only be present for TLS offloaded or paced
connections

2) Allows the driver to specify how much ring padding is needed
   before the ring is considered to be full using the new isc_tx_pad
   field in if_softc_ctx.

This re-uses a field that was marked spare in 2019 via d49e83eac3.
Iflib initializes this to the previous value of 2 slots and allows the
driver to override it. The TXQ_AVAIL() macro has been adjusted to
subtract this padding, and uses of the macro have removed +2 from the
other side of the comparison. To avoid potential cache misses from
looking at the ifc_softc_ctx in TXQ_AVAIL(), the value is mirrored in
the txq (in an alignment hole).

Reviewed by: kbowling, kgalazka, sumit.saxena_broadcom.com, shurd
Sponsored by: Netflix
MFC after: 1 month
Differential Revision: https://reviews.freebsd.org/D54274
2025-12-21 09:45:12 -05:00
Bjoern A. Zeeb
117306dc60 in6_ifattach: include sys/eventhandler.h to unbreak NOVIMAGE builds
Some checks are pending
Cross-build Kernel / amd64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / amd64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / amd64 macos-latest (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 macos-latest (clang-18) (push) Waiting to run
LINT-NOVIMAGE fails to build due to a missing eventhandler.h include
which in hte VIMAGE case is likely leaked through some other header.
Add the #include to unbreak the build.

Fixes:	0d469d2371 (net: attach IPv4 and IPv6 stacks to an ...)
2025-12-20 22:47:40 +00:00
Justin Hibbits
27cb2610ef powerpc/intr: Minor cleanup
Use MTX_SYSINIT() instead of rolling our own.
2025-12-20 15:02:51 -05:00
Emmanuel Vadot
dd5a48f957 fwget: Add Navi 33 support
Tested on a RX7600

MFC After:	3 days
2025-12-20 19:49:51 +01:00
Dag-Erling Smørgrav
7f39d05b67 reboot: Fix halt -p behavior
Some checks are pending
Cross-build Kernel / amd64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / amd64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / amd64 macos-latest (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 macos-latest (clang-18) (push) Waiting to run
The RB_HALT bit is always set when invoked as `halt`, so to maintain a
distinction between `halt` and `halt -p`, we must check the RB_POWEROFF
bit first.

PR:		291814
Fixes:		4453ec5b87 ("reboot: Default to a clean shutdown")
Reviewed by:	imp
Differential Revision:	https://reviews.freebsd.org/D54320
2025-12-20 00:26:37 +01:00
Kyle Evans
a8c594d277 files.amd64: remove some lines duplicated from files.x86
These were added to files.x86 because they were duplicated in both
files.i386 and files.amd64, but they did not end up removed in the
latter.  Garbage collect them now.

Reviewed by:	jhibbits
Fixes:	b9c6fa339d ("files.x86: Pull in some more duplicate [...]")
Sponsored by:	Klara, Inc.
Sponsored by:	NetApp, Inc.
Differential Revision:	https://reviews.freebsd.org/D54295
2025-12-19 16:17:30 -06:00
Bjoern A. Zeeb
34892a8e30 LinuxKPI: bitcount fix builds with gcc and older llvm
LLVM before 19 and gcc before 14 do not support __builtin_popcountg().
Use __const_bitcount<n> from sys/bitcount.h as a replacement in these
cases.  This should still allow drm-kmod to build where the size needs
to be known at compile-time.

Remove the conditional for gcc around the iwlwifi modules build,
which was collateral damage in all this.

Sponsored by:	The FreeBSD Foundation
Fixes:		7cbc4d8759, 5e0a4859f2
MFC after:	3 days
Reviewed by:	brooks, emaste (without the sys/modules/Makefile change)
Differential Revision: https://reviews.freebsd.org/D54297
2025-12-19 21:19:28 +00:00
Bjoern A. Zeeb
27aa23cee8 sys/bitcount.h: add __const_bitcount<n>
Add a version of __const_bitcount<n> which can be used to get the
numbers at compile-time when __builtin_popcountg() is not available
(see sys/compat/linuxkpi/common/include/linux/bitops.h for LLVM before
19 and gcc before 14).

Obtained from:	https://reviews.freebsd.org/D50995#1174884 by obiwac
Sponsored by:	The FreeBSD Foundation
Reviewed by:	brooks, emaste
Differential Revision: https://reviews.freebsd.org/D54301
2025-12-19 21:16:20 +00:00
Martin Matuska
546d3d08e5 zfs: merge openzfs/zfs@962e68865
Notable upstream pull request merges:
 #16307 1d43387dd zdb: Add -O option for -r to specify object-id
 #17965 a62c62120 ARC: Pre-convert zfs_arc_min_prefetch_ms
 #17970 d393166c5 ARC: Increase parallel eviction batching
 #17981 20f09eae4 ZIO: ZIO_STAGE_DDT_WRITE is a blocking stage
 #17983 ff47dd35e Fix ddtprune causing space leak
 #18015 86b064469 FreeBSD: Fix a potential null dereference
                  in zfs_freebsd_fsync() (already merged)
 #18020 ff47dd35e Ensure 64-bit `off_t` is used in user space
                  instead of `loff_t`
 #18028 09492e0f2 Reduce dataset buffers re-dirtying
 #18033 f72fd378c Defer async destroys on pool import
 #18043 3d76ba273 Improve async destroy processing timing
 #18044 46d6f1fe5 DDT: Move logs searches out of the lock
 #18047 ff5414406 DDT: Switch to using ZAP _by_dnode() interfaces
 #18048 3b1ff816b DDT: Add/use zap_lookup_length_uint64_by_dnode()
 #18055 22e89aca8 DDT: Fix compressed entry buffer size
 #18059 0550abd4b RAIDZ: Remove some excessive logging
 #18060 a83bb15fc Reduce minimal scrub/resilver times
 #18061 962e68865 Use reduced precision for scan times
 #18063 051a8c749 Bypass snprintf() in quota checks if no quotas set
 #18064 7ff329ac2 Fix rangelock test for growing block size

Obtained from:	OpenZFS
OpenZFS commit:	962e68865e
2025-12-19 21:45:10 +01:00
Jose Luis Duran
f8cee1f2c2
Import latest mtree from NetBSD
Merge commit 'eb2ccba0c11b405ac613c3046997765317cc8b5c'

PR:		192839
PR:		219467
MFC after:	1 week
2025-12-19 20:14:35 +00:00
Jose Luis Duran
eb2ccba0c1
Vendor import of NetBSD's mtree at 2025-12-19 2025-12-19 20:11:33 +00:00
Gleb Smirnoff
fe53a8a82c bpf: add missing IFT_BRIDGE in the write method
Fixes:	8774a990ee
2025-12-19 11:23:17 -08:00
Dag-Erling Smørgrav
4100bd6caa usr.bin: Remove intrinsic utilities
These utilities can only function correctly if implemented as shell
builtins and exist only because POSIX previously required them.  As of
POSIX 2024, they have all been reclassified as intrinsic utilities and
are no longer required to exist in PATH.  We can therefore retire them.
Cf. XBD 1.7, XRAT C.1.8, Austin Group bug 854.

Note that kill(1) is also considered an intrinsic utility (because
only the shell can interpret job IDs correctly), but we have a working
standalone implementation, which we will keep.

PR:		291686
Relnotes:	yes
Reviewed by:	imp, emaste
Differential Revision:	https://reviews.freebsd.org/D54239
2025-12-19 18:15:40 +01:00
Timo Völker
c8b3b605ae tcp: fix checksum calculation bug
The new function in_delayed_cksum_o() was introduced to compute
the checksum in the case the mbuf chain does not start with the
IP header. The offset of the IP header is specified by the
parameter iph_offset.
If iph_offset was positive, the function computed an incorrect
checksum.

Reviewed by:		sobomax, tuexen
Fixes:			5feb38e378 ("netinet: provide "at offset" variant of the in_delayed_cksum() API")
MFC after:		1 week
Differential Revision:	https://reviews.freebsd.org/D54269
2025-12-19 17:50:20 +01:00
Michael Tuexen
8da838ac31 vtnet: improve consistency
Use sbuf_new_for_sysctl() instead of sbuf_new_auto() when exposing
the flags via sysctl.

MFC after:		1 week
2025-12-19 17:44:20 +01:00
Michael Tuexen
634d9c0d11 vtnet: expose features via sysctl tree
Right now the 64-bit flags field needs to be casted to a 32-bit field,
because clang warns if more than 32-bits are used.
Once clang is fixed, this restriction will be removed and more bits
will be added.

Reviewed by:		markj, Timo Völker
MFC after:		1 week
Differential Revision:	https://reviews.freebsd.org/D54288
2025-12-19 17:38:35 +01:00
Michael Tuexen
d2cb9cab84 printf.9: Support more than 32 bits in %b
Some checks are pending
Cross-build Kernel / amd64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / amd64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / amd64 macos-latest (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 macos-latest (clang-18) (push) Waiting to run
This will be usable after clang has been extended to accept length
modifiers for %b when compiling kernel code.
But we need FreeBSD to support it first...

Reviewed by:		markj, Timo Völker
MFC after:		1 week
Differential Revision:	https://reviews.freebsd.org/D54286
2025-12-19 17:26:37 +01:00
Brooks Davis
a79e2278c5 ipf: copy{in,out}ptr -> ipf_copy{in,out}_indirect
These functions take the source or destintation address indirectly from
a potentially missaligned buffer.  Rename them to refect this and to
free up the copy{in,out}ptr names.

Some of the code in question is dead code and doesn't or won't compile,
but I've changed it all for consistency.

NB: If the pointers are actually stored under aligned then this code is
broken with CHERI.

Reviewed by:	cy
Effort:		CHERI upstreaming
Sponsored by:	Innovate UK
Differential Revision:	https://reviews.freebsd.org/D54232
2025-12-19 15:59:08 +00:00
Mark Johnston
df6861d755 ifconfig: Fix the -L flag when using netlink
By default, when ifconfig shows a v6 address derived from a
router-advertised prefix, it shows the initial preferred and valid
lifetimes.  When -L is specified, it is supposed to show the remaining
lifetimes, but this was broken in the conversion to netlink.

Fix that, and add a regression test which validates ifconfig output
before and after a short-lived address expires.

Reported by:	Franco Fichtner <franco@opnsense.org>
Reviewed by:	melifaro, allanjude, Seyed Pouria Mousavizadeh Tehrani
Fixes:		4c91a5dfe4 ("ifconfig: make interface and address listing use Netlink as transport")
MFC after:	2 weeks
Sponsored by:	OPNsense
Sponsored by:	Klara, Inc.
Differential Revision:	https://reviews.freebsd.org/D54294
2025-12-19 14:11:20 +00:00
Mark Johnston
7080c1b09d tests: Fix style in ra.py
No functional change intended.

MFC after:	2 weeks
2025-12-19 14:11:01 +00:00
Mark Johnston
ae96ff302f pf: Avoid taking the pf rules write lock in a couple of ioctls
The DIOCGETRULES ioctl handlers has taken the write lock ever since
fine-grained locking was merged to pf, but I believe it's unneeded.  Use
the read lock instead.

DIOCGETRULENV takes the write lock as well but I believe this is only
required when clearing rule counters.  Acquire the read lock if that is
not the case.

Reviewed by:	kp, allanjude
MFC after:	2 weeks
Sponsored by:	OPNsense
Sponsored by:	Klara, Inc.
Differential Revision:	https://reviews.freebsd.org/D54292
2025-12-19 14:07:26 +00:00
Cy Schubert
2804461adf ntp: Fix buildworld with MK_OPENSSL=no
Reported by:	wosch
Tested by:	wosch
MFC after:	1 week
2025-12-19 04:54:11 -08:00
Jung-uk Kim
1efb6541c6 acpica: Merge ACPICA 20251212
Some checks are pending
Cross-build Kernel / amd64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / amd64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / amd64 macos-latest (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 macos-latest (clang-18) (push) Waiting to run
Merge commit '5cab380e2a2644aaa920b93f1580a1cfc803a8de'
2025-12-19 00:43:14 -05:00
Jung-uk Kim
5cab380e2a Import ACPICA 20251212 2025-12-19 00:24:03 -05:00
Ed Maste
8c64625d90 aq(4): Use standard ETHER_ADDR_LEN definition
Some checks are pending
Cross-build Kernel / amd64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-22.04 (clang-15) (push) Waiting to run
Cross-build Kernel / amd64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 ubuntu-24.04 (clang-18) (push) Waiting to run
Cross-build Kernel / amd64 macos-latest (clang-18) (push) Waiting to run
Cross-build Kernel / aarch64 macos-latest (clang-18) (push) Waiting to run
No need for a bespoke #define.
2025-12-18 19:01:14 -05:00
Michael Tuexen
391e870931 printf.9: fix style
Follow the style described by style.9.

Reported by:	markj
MFC after:	1 week
2025-12-18 23:49:51 +01:00
Rick Parrish
ca2413d216
librt/mq_getfd_np.3: Initial manual page
The mq_getfd_np function appeared in FreeBSD 11 with no documentation.
This function dereferences the mqd_t as a pointer to an int.

Relnotes:		yes
MFC after:		3 days
Reviewed by:		kib (previous), markj, ziaee
Differential Revision:	https://reviews.freebsd.org/D43947
2025-12-18 17:19:42 -05:00
Ed Maste
7f3da1f800 aq(4): Build on x86 only for now
It fails to build on arm64.  As it is experimental and in development
just limit it to x86 until this is fixed.

Reported by:		brd
Fixes: 75177aebf0 ("aq(4): Add build infrastructure")
2025-12-18 16:55:46 -05:00
Olivier Certner
55ce12672b
kern: racct: Remove code unused since %cpu resource computation revamp
Reviewed by:    emaste, markj
Fixes:          c72188d85a ("racct: Improve handling of the pcpu resource")
MFC after:      3 days
Sponsored by:   The FreeBSD Foundation
Differential Revision:  https://reviews.freebsd.org/D54284
2025-12-18 22:30:18 +01:00
Konstantin Belousov
5c1d9df10b vmem.9: provide a reference to libuvmem(3)
Sponsored by:	The FreeBSD Foundation
MFC after:	3 days
2025-12-18 22:13:05 +02:00
Krzysztof Galazka
ca10598b10 ice(4): Remove unused function
rss_getkey function is now available even if kernel RSS option
is disabled. This makes ice_get_default_rss_key no longer needed.

Signed-off-by: Krzysztof Galazka <krzysztof.galazka@intel.com>

Reviewed by:	gallatin
Approved by:	kbowling (mentor)
Fixes:		012ecdde3a ("ice: use newly exposed RSS hash key API rather than ad-hoc hashing")
Sponsored by:   Intel Corporation
Differential Revision:	https://reviews.freebsd.org/D54281
2025-12-18 20:50:45 +01:00
Mark Johnston
7c02ba0cd0 pf: Fix the reply command in a couple of places
libpfctl doesn't notice the mismatch.

Reported by:	Kevin Day <kevin@your.org>
Reviewed by:	kp
MFC after:	1 week
Differential Revision:	https://reviews.freebsd.org/D54199
2025-12-18 19:46:42 +00:00
Mark Johnston
9381188350 armv8rng: Fix an inverted test in random_rndr_read_one()
If we get a random number, the NZCV is set to 0b0000.  Then
"cset %w1, ne" will test whether Z == 0 and set %w1 to 1 if so.
More specifically, "cset %w1, ne" maps to "csinc %w1, wzr, wzr, eq",
which stores 0 in %w1 when NZCV == 0b0100 and 1 otherwise.

Thus, on a successful read we expect ret != 0, so the loop condition
needs to be fixed.  In practice this means that we would end up trying
to fetch entropy up to ten times in a row.  If all attempts are
successful, the last will be returned, otherwise no entropy will be
returned.

Reported by:	Kevin Day <kevin@your.org>
Reviewed by:	andrew
Fixes:		9eecef0521 ("Add an Armv8 rndr random number provider")
MFC after:	1 week
Differential Revision:	https://reviews.freebsd.org/D54259
2025-12-18 19:46:42 +00:00
Gleb Smirnoff
0d469d2371 net: attach IPv4 and IPv6 stacks to an interface with EVENTHANDLER(9)
This change retires two historic relics: the if_afdata[] array and the
dom_ifattach/dom_ifdetach methods.

The if_afdata[] array is a relic of the era, when there was expectation
that many transport protocols will coexist with IP, e.g. IPX or NetAtalk.
The array hasn't had any members except AF_INET and AF_INET6 for over a
decade already. This change removes the array and just leaves two pointer
fields: if_inet and if_inet6.

The dom_ifattach/dom_ifdetach predates the EVENTHANDLER(9) framework and
was a good enough method to initialize protocol contexts back then.  Today
there is no good reason to treat IPv4 and IPv6 stacks differently to other
protocols/features that attach and detach from an interface.

The locking of if_afdata[] is a relic of SMPng times, when the system
startup and the interface attach was even more convoluted than before this
change, and we also had unloadable protocols that used a field in
if_afdata[].  Note that IPv4 and IPv6 are not unloadable.

Note that this change removes NET_EPOCH_WAIT() from the interface detach
sequence.  This may surface several new races associated with interface
removal.  I failed to hit any with consecutive test suite runs, though.
The expected general race scenario is that while struct ifnet is freed
with proper epoch_call(9) itself, some structures hanging off ifnet are
freed with direct free(9).  The proper fix is either make if_foo point at
some static "dead" structure providing SMP visibility of this store, or
free those structure with epoch_call(9).  All of these cases are planned
to be found and resolved during 16.0-CURRENT lifetime.

Reviewed by:		zlei, gallatin, melifaro
Differential Revision:	https://reviews.freebsd.org/D54089
2025-12-18 11:15:53 -08:00
Gleb Smirnoff
713b57c414 net: split ifnet_arrival_event into two events
Run the original ifnet_arrival_event before linking the interface.
Otherwise there is a race window when interface is already visible, but
not all of the protocols have completed their attach. Provide a new event
handler ifnet_attached_event, that is executed when the inteface is fully
visible.  Use it in route(4) socket and netlink(4) to announce new
interface to the userland. Properly document the ifnet events in if_var.h.

Reviewed by:		zlei, melifaro
Differential Revision:	https://reviews.freebsd.org/D54085
2025-12-18 11:15:53 -08:00
Ed Maste
fb1994e03c aq(4): Add man page
Reviewed by:	ziaee
Relnotes:	Yes
Sponsored by:	The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D53840
2025-12-18 14:06:24 -05:00
Ed Maste
75177aebf0 aq(4): Add build infrastructure
Reviewed by:	adrian
Sponsored by:	The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D53839
2025-12-18 14:06:24 -05:00
Alexander Motin
962e68865e
Use reduced precision for scan times
Some checks failed
checkstyle / checkstyle (push) Has been cancelled
CodeQL / Analyze (push) Has been cancelled
smatch / smatch (push) Has been cancelled
zfs-qemu / Setup (push) Has been cancelled
zloop / zloop (push) Has been cancelled
zfs-qemu / qemu-x86 (push) Has been cancelled
zfs-qemu / Cleanup (push) Has been cancelled
Scan time limits do not need precision beyond 1ms.  Switching
scn_sync_start_time and spa_sync_starttime from gethrtime() to
getlrtime() saves ~3% of CPU time during resilver scan stage.

Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Signed-off-by: Alexander Motin <alexander.motin@TrueNAS.com>
Closes #18061
2025-12-18 10:22:11 -08:00
Alexander Motin
a83bb15fcd
Reduce minimal scrub/resilver times
With higher throughput and lower latency of modern devices ZFS can
happily live with pretty short (fractions of a second) TXGs.  But
the two decade old multi-second minimal time limits can almost stop
payload writes by extending TXGs beyond dirty data limits of ARC
ability to amortize it.

Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Signed-off-by: Alexander Motin <alexander.motin@TrueNAS.com>
Closes #18060
2025-12-18 10:21:45 -08:00
Cy Schubert
f74173b5da krb5: Remove extraneous exports file
We use version.map in the FreeBSD MIT KRB5 build. The exports file is
a lefteover from when the version map file was created.

MFC after:	1 week
2025-12-18 10:16:39 -08:00
Allan Jude
1d43387dd8
zdb: Add -O option for -r to specify object-id
"zdb -r -O pool/dataset obj-id destination" will copy
the file with object-id obj-id to the named destination;
without -O it'll still be interpreted as a pathname.

Sponsored-by: Klara, Inc.
Sponsored-by: Wasabi Technology, Inc.
Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Reviewed-by: Akash B <akash-b@hpe.com>
Signed-off-by: Sean Eric Fagan <sean.fagan@klarasystems.com>
Closes #16307
2025-12-18 09:25:09 -08:00
Mark Maybee
7ff329ac2e
Fix rangelock test for growing block size
If the file already has more than one block, then the current
block size cannot change. But if the file block size is less
than the maximum block size supported by the file system, and
there are multiple blocks in the file, the current code will
almost always extend the rangelock to its maximum size.
This means that all writes become serialized and even reads
are slowed as they will more often contend with writes. This
commit adjusts the test so that we will not lock the entire
range if there is more than one block in the file already.

Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Reviewed-by: Alexander Motin <alexander.motin@TrueNAS.com>
Signed-off-by: Mark Maybee <mark.maybee@perforce.com>
Closes #18046
Closes #18064
2025-12-18 09:23:38 -08:00
Michael Tuexen
f6e1833018 vtnet.4: put each sentence on its own line
Reported by:	ziaee
Fixes:		e3a0571ad7 ("vtnet: expose flags via sysctl tree")
MFC after:	1 week
2025-12-18 15:57:46 +01:00
Gleb Smirnoff
a4d766caf7 bpf: add a crutch to support if_vmove
Fixes:	0bf42a0a05
2025-12-18 08:46:20 -08:00