[packages/zfs] - up to 0.8.0-rc1

baggins baggins at pld-linux.org
Sat Oct 27 15:43:29 CEST 2018


commit 6a410e14105fee3927f8e488ad3d775f85d370d4
Author: Jan Rękorajski <baggins at pld-linux.org>
Date:   Sat Oct 27 15:43:08 2018 +0200

    - up to 0.8.0-rc1

 kernel-4.19.patch | 1046 +++++++++++++++++++++++++++++++++++++++++++++++++++++
 zfs.spec          |   14 +-
 2 files changed, 1054 insertions(+), 6 deletions(-)
---
diff --git a/zfs.spec b/zfs.spec
index ff819a2..22f43d1 100644
--- a/zfs.spec
+++ b/zfs.spec
@@ -27,21 +27,22 @@ exit 1
 
 %define		_duplicate_files_terminate_build	0
 
-%define	rel	7
+%define	_rc	rc1
+%define	rel	0.%{_rc}.1
 %define	pname	zfs
 Summary:	Native Linux port of the ZFS filesystem
 Summary(pl.UTF-8):	Natywny linuksowy port systemu plików ZFS
 Name:		%{pname}%{?_pld_builder:%{?with_kernel:-kernel}}%{_alt_kernel}
-%define	gitrev	1511_g4338c5c06
-Version:	0.7.9
+Version:	0.8.0
 Release:	%{rel}%{?_pld_builder:%{?with_kernel:@%{_kernel_ver_str}}}
 License:	CDDL
 Group:		Applications/System
 #Source0:	https://github.com/zfsonlinux/zfs/releases/download/zfs-%{version}/%{pname}-%{version}.tar.gz
-Source0:	%{pname}-%{version}-%{gitrev}.tar.gz
-# Source0-md5:	ceb367d302942e2291f1ad86c1e0d2be
+Source0:	https://github.com/zfsonlinux/zfs/archive/zfs-%{version}-%{_rc}/%{pname}-%{version}-%{_rc}.tar.gz
+# Source0-md5:	827148de600b041881d572063ea49bc8
 Patch0:		x32.patch
 Patch1:		am.patch
+Patch2:		kernel-4.19.patch
 URL:		http://zfsonlinux.org/
 BuildRequires:	autoconf >= 2.50
 BuildRequires:	automake
@@ -239,9 +240,10 @@ p=`pwd`\
 %{?with_kernel:%{expand:%create_kernel_packages}}
 
 %prep
-%setup -q -n %{pname}-%{version}
+%setup -q -n %{pname}-zfs-%{version}-%{_rc}
 %patch0 -p1
 %patch1 -p1
+%patch2 -p1
 
 %build
 %{__libtoolize}
diff --git a/kernel-4.19.patch b/kernel-4.19.patch
new file mode 100644
index 0000000..93dbd34
--- /dev/null
+++ b/kernel-4.19.patch
@@ -0,0 +1,1046 @@
+From c13060e4787e9578dafad85a47c62457424bec9c Mon Sep 17 00:00:00 2001
+From: Tim Schumacher <timschumi at gmx.de>
+Date: Wed, 26 Sep 2018 19:29:26 +0200
+Subject: [PATCH] Linux 4.19-rc3+ compat: Remove refcount_t compat
+
+torvalds/linux at 59b57717f ("blkcg: delay blkg destruction until
+after writeback has finished") added a refcount_t to the blkcg
+structure. Due to the refcount_t compatibility code, zfs_refcount_t
+was used by mistake.
+
+Resolve this by removing the compatibility code and replacing the
+occurrences of refcount_t with zfs_refcount_t.
+
+Reviewed-by: Franz Pletz <fpletz at fnordicwalking.de>
+Reviewed-by: Brian Behlendorf <behlendorf1 at llnl.gov>
+Signed-off-by: Tim Schumacher <timschumi at gmx.de>
+Closes #7885
+Closes #7932
+---
+ cmd/ztest/ztest.c           |  6 ++---
+ include/linux/vfs_compat.h  |  5 ----
+ include/sys/abd.h           |  2 +-
+ include/sys/arc.h           |  2 +-
+ include/sys/arc_impl.h      |  8 +++---
+ include/sys/dbuf.h          |  2 +-
+ include/sys/dmu_tx.h        |  4 +--
+ include/sys/dnode.h         |  4 +--
+ include/sys/dsl_crypt.h     |  6 ++---
+ include/sys/dsl_dataset.h   |  2 +-
+ include/sys/metaslab_impl.h |  4 +--
+ include/sys/refcount.h      | 52 ++++++++++++++++---------------------
+ include/sys/rrwlock.h       |  4 +--
+ include/sys/sa_impl.h       |  2 +-
+ include/sys/spa_impl.h      |  6 ++---
+ include/sys/zap.h           |  2 +-
+ include/sys/zfs_znode.h     |  2 +-
+ module/zfs/arc.c            | 16 ++++++------
+ module/zfs/dbuf.c           | 10 +++----
+ module/zfs/dmu.c            |  2 +-
+ module/zfs/dmu_tx.c         |  6 ++---
+ module/zfs/dnode.c          |  6 ++---
+ module/zfs/dsl_crypt.c      | 12 ++++-----
+ module/zfs/dsl_dataset.c    |  2 +-
+ module/zfs/dsl_scan.c       |  6 ++---
+ module/zfs/metaslab.c       | 14 +++++-----
+ module/zfs/refcount.c       | 30 ++++++++++-----------
+ module/zfs/rrwlock.c        |  4 +--
+ module/zfs/sa.c             |  2 +-
+ module/zfs/spa_misc.c       |  8 +++---
+ module/zfs/zfs_ctldir.c     | 10 +++----
+ module/zfs/zfs_znode.c      |  2 +-
+ 32 files changed, 116 insertions(+), 127 deletions(-)
+
+diff --git a/cmd/ztest/ztest.c b/cmd/ztest/ztest.c
+index 83d057a74d9..ae25957dc13 100644
+--- a/cmd/ztest/ztest.c
++++ b/cmd/ztest/ztest.c
+@@ -1323,7 +1323,7 @@ ztest_dmu_objset_own(const char *name, dmu_objset_type_t type,
+  */
+ typedef struct {
+ 	list_node_t z_lnode;
+-	refcount_t z_refcnt;
++	zfs_refcount_t z_refcnt;
+ 	uint64_t z_object;
+ 	zfs_rlock_t z_range_lock;
+ } ztest_znode_t;
+@@ -1382,13 +1382,13 @@ ztest_znode_get(ztest_ds_t *zd, uint64_t object)
+ 	for (zp = list_head(&zll->z_list); (zp);
+ 	    zp = list_next(&zll->z_list, zp)) {
+ 		if (zp->z_object == object) {
+-			refcount_add(&zp->z_refcnt, RL_TAG);
++			zfs_refcount_add(&zp->z_refcnt, RL_TAG);
+ 			break;
+ 		}
+ 	}
+ 	if (zp == NULL) {
+ 		zp = ztest_znode_init(object);
+-		refcount_add(&zp->z_refcnt, RL_TAG);
++		zfs_refcount_add(&zp->z_refcnt, RL_TAG);
+ 		list_insert_head(&zll->z_list, zp);
+ 	}
+ 	mutex_exit(&zll->z_lock);
+diff --git a/include/linux/vfs_compat.h b/include/linux/vfs_compat.h
+index 90b3cca78c0..c01f5850881 100644
+--- a/include/linux/vfs_compat.h
++++ b/include/linux/vfs_compat.h
+@@ -297,9 +297,6 @@ lseek_execute(
+  * This is several orders of magnitude larger than expected grace period.
+  * At 60 seconds the kernel will also begin issuing RCU stall warnings.
+  */
+-#ifdef refcount_t
+-#undef refcount_t
+-#endif
+ 
+ #include <linux/posix_acl.h>
+ 
+@@ -430,8 +427,6 @@ typedef mode_t zpl_equivmode_t;
+ #define	zpl_posix_acl_valid(ip, acl)  posix_acl_valid(acl)
+ #endif
+ 
+-#define	refcount_t	zfs_refcount_t
+-
+ #endif /* CONFIG_FS_POSIX_ACL */
+ 
+ /*
+diff --git a/include/sys/abd.h b/include/sys/abd.h
+index 077bb9d1761..3d9fdbf102a 100644
+--- a/include/sys/abd.h
++++ b/include/sys/abd.h
+@@ -51,7 +51,7 @@ typedef struct abd {
+ 	abd_flags_t	abd_flags;
+ 	uint_t		abd_size;	/* excludes scattered abd_offset */
+ 	struct abd	*abd_parent;
+-	refcount_t	abd_children;
++	zfs_refcount_t	abd_children;
+ 	union {
+ 		struct abd_scatter {
+ 			uint_t		abd_offset;
+diff --git a/include/sys/arc.h b/include/sys/arc.h
+index a5bdefb56f4..dc2fd03647f 100644
+--- a/include/sys/arc.h
++++ b/include/sys/arc.h
+@@ -87,7 +87,7 @@ struct arc_prune {
+ 	void			*p_private;
+ 	uint64_t		p_adjust;
+ 	list_node_t		p_node;
+-	refcount_t		p_refcnt;
++	zfs_refcount_t		p_refcnt;
+ };
+ 
+ typedef enum arc_strategy {
+diff --git a/include/sys/arc_impl.h b/include/sys/arc_impl.h
+index 52863bba4ee..cd42c0c01a2 100644
+--- a/include/sys/arc_impl.h
++++ b/include/sys/arc_impl.h
+@@ -75,12 +75,12 @@ typedef struct arc_state {
+ 	/*
+ 	 * total amount of evictable data in this state
+ 	 */
+-	refcount_t arcs_esize[ARC_BUFC_NUMTYPES];
++	zfs_refcount_t arcs_esize[ARC_BUFC_NUMTYPES];
+ 	/*
+ 	 * total amount of data in this state; this includes: evictable,
+ 	 * non-evictable, ARC_BUFC_DATA, and ARC_BUFC_METADATA.
+ 	 */
+-	refcount_t arcs_size;
++	zfs_refcount_t arcs_size;
+ 	/*
+ 	 * supports the "dbufs" kstat
+ 	 */
+@@ -168,7 +168,7 @@ typedef struct l1arc_buf_hdr {
+ 	uint32_t		b_l2_hits;
+ 
+ 	/* self protecting */
+-	refcount_t		b_refcnt;
++	zfs_refcount_t		b_refcnt;
+ 
+ 	arc_callback_t		*b_acb;
+ 	abd_t			*b_pabd;
+@@ -215,7 +215,7 @@ typedef struct l2arc_dev {
+ 	kmutex_t		l2ad_mtx;	/* lock for buffer list */
+ 	list_t			l2ad_buflist;	/* buffer list */
+ 	list_node_t		l2ad_node;	/* device list node */
+-	refcount_t		l2ad_alloc;	/* allocated bytes */
++	zfs_refcount_t		l2ad_alloc;	/* allocated bytes */
+ } l2arc_dev_t;
+ 
+ typedef struct l2arc_buf_hdr {
+diff --git a/include/sys/dbuf.h b/include/sys/dbuf.h
+index ab0950c83c2..eea9e265b00 100644
+--- a/include/sys/dbuf.h
++++ b/include/sys/dbuf.h
+@@ -230,7 +230,7 @@ typedef struct dmu_buf_impl {
+ 	 * If nonzero, the buffer can't be destroyed.
+ 	 * Protected by db_mtx.
+ 	 */
+-	refcount_t db_holds;
++	zfs_refcount_t db_holds;
+ 
+ 	/* buffer holding our data */
+ 	arc_buf_t *db_buf;
+diff --git a/include/sys/dmu_tx.h b/include/sys/dmu_tx.h
+index 6a4bd3fac2c..36d205e9501 100644
+--- a/include/sys/dmu_tx.h
++++ b/include/sys/dmu_tx.h
+@@ -97,8 +97,8 @@ typedef struct dmu_tx_hold {
+ 	dmu_tx_t *txh_tx;
+ 	list_node_t txh_node;
+ 	struct dnode *txh_dnode;
+-	refcount_t txh_space_towrite;
+-	refcount_t txh_memory_tohold;
++	zfs_refcount_t txh_space_towrite;
++	zfs_refcount_t txh_memory_tohold;
+ 	enum dmu_tx_hold_type txh_type;
+ 	uint64_t txh_arg1;
+ 	uint64_t txh_arg2;
+diff --git a/include/sys/dnode.h b/include/sys/dnode.h
+index 0774e663f1b..48ef927d4ad 100644
+--- a/include/sys/dnode.h
++++ b/include/sys/dnode.h
+@@ -335,8 +335,8 @@ struct dnode {
+ 	uint8_t *dn_dirtyctx_firstset;		/* dbg: contents meaningless */
+ 
+ 	/* protected by own devices */
+-	refcount_t dn_tx_holds;
+-	refcount_t dn_holds;
++	zfs_refcount_t dn_tx_holds;
++	zfs_refcount_t dn_holds;
+ 
+ 	kmutex_t dn_dbufs_mtx;
+ 	/*
+diff --git a/include/sys/dsl_crypt.h b/include/sys/dsl_crypt.h
+index 8766ce51ea9..c6d2b0a16ac 100644
+--- a/include/sys/dsl_crypt.h
++++ b/include/sys/dsl_crypt.h
+@@ -62,7 +62,7 @@ typedef struct dsl_wrapping_key {
+ 	crypto_key_t wk_key;
+ 
+ 	/* refcount of number of dsl_crypto_key_t's holding this struct */
+-	refcount_t wk_refcnt;
++	zfs_refcount_t wk_refcnt;
+ 
+ 	/* dsl directory object that owns this wrapping key */
+ 	uint64_t wk_ddobj;
+@@ -112,7 +112,7 @@ typedef struct dsl_crypto_key {
+ 	avl_node_t dck_avl_link;
+ 
+ 	/* refcount of dsl_key_mapping_t's holding this key */
+-	refcount_t dck_holds;
++	zfs_refcount_t dck_holds;
+ 
+ 	/* master key used to derive encryption keys */
+ 	zio_crypt_key_t dck_key;
+@@ -134,7 +134,7 @@ typedef struct dsl_key_mapping {
+ 	avl_node_t km_avl_link;
+ 
+ 	/* refcount of how many users are depending on this mapping */
+-	refcount_t km_refcnt;
++	zfs_refcount_t km_refcnt;
+ 
+ 	/* dataset this crypto key belongs to (index) */
+ 	uint64_t km_dsobj;
+diff --git a/include/sys/dsl_dataset.h b/include/sys/dsl_dataset.h
+index dbe4cb706a1..768241483a2 100644
+--- a/include/sys/dsl_dataset.h
++++ b/include/sys/dsl_dataset.h
+@@ -211,7 +211,7 @@ typedef struct dsl_dataset {
+ 	 * Owning counts as a long hold.  See the comments above
+ 	 * dsl_pool_hold() for details.
+ 	 */
+-	refcount_t ds_longholds;
++	zfs_refcount_t ds_longholds;
+ 
+ 	/* no locking; only for making guesses */
+ 	uint64_t ds_trysnap_txg;
+diff --git a/include/sys/metaslab_impl.h b/include/sys/metaslab_impl.h
+index cc6e8b796d4..aa1c82a0258 100644
+--- a/include/sys/metaslab_impl.h
++++ b/include/sys/metaslab_impl.h
+@@ -184,7 +184,7 @@ struct metaslab_class {
+ 	 * number of allocations allowed.
+ 	 */
+ 	uint64_t		*mc_alloc_max_slots;
+-	refcount_t		*mc_alloc_slots;
++	zfs_refcount_t		*mc_alloc_slots;
+ 
+ 	uint64_t		mc_alloc_groups; /* # of allocatable groups */
+ 
+@@ -256,7 +256,7 @@ struct metaslab_group {
+ 	 */
+ 	uint64_t		mg_max_alloc_queue_depth;
+ 	uint64_t		*mg_cur_max_alloc_queue_depth;
+-	refcount_t		*mg_alloc_queue_depth;
++	zfs_refcount_t		*mg_alloc_queue_depth;
+ 	int			mg_allocators;
+ 	/*
+ 	 * A metalab group that can no longer allocate the minimum block
+diff --git a/include/sys/refcount.h b/include/sys/refcount.h
+index 02002ec2ffd..e20ffbc30f9 100644
+--- a/include/sys/refcount.h
++++ b/include/sys/refcount.h
+@@ -41,17 +41,6 @@ extern "C" {
+  */
+ #define	FTAG ((char *)(uintptr_t)__func__)
+ 
+-/*
+- * Starting with 4.11, torvalds/linux at f405df5, the linux kernel defines a
+- * refcount_t type of its own.  The macro below effectively changes references
+- * in the ZFS code from refcount_t to zfs_refcount_t at compile time, so that
+- * existing code need not be altered, reducing conflicts when landing openZFS
+- * patches.
+- */
+-
+-#define	refcount_t	zfs_refcount_t
+-#define	refcount_add	zfs_refcount_add
+-
+ #ifdef	ZFS_DEBUG
+ typedef struct reference {
+ 	list_node_t ref_link;
+@@ -69,23 +58,28 @@ typedef struct refcount {
+ 	uint64_t rc_removed_count;
+ } zfs_refcount_t;
+ 
+-/* Note: refcount_t must be initialized with refcount_create[_untracked]() */
+-
+-void refcount_create(refcount_t *rc);
+-void refcount_create_untracked(refcount_t *rc);
+-void refcount_create_tracked(refcount_t *rc);
+-void refcount_destroy(refcount_t *rc);
+-void refcount_destroy_many(refcount_t *rc, uint64_t number);
+-int refcount_is_zero(refcount_t *rc);
+-int64_t refcount_count(refcount_t *rc);
+-int64_t zfs_refcount_add(refcount_t *rc, void *holder_tag);
+-int64_t refcount_remove(refcount_t *rc, void *holder_tag);
+-int64_t refcount_add_many(refcount_t *rc, uint64_t number, void *holder_tag);
+-int64_t refcount_remove_many(refcount_t *rc, uint64_t number, void *holder_tag);
+-void refcount_transfer(refcount_t *dst, refcount_t *src);
+-void refcount_transfer_ownership(refcount_t *, void *, void *);
+-boolean_t refcount_held(refcount_t *, void *);
+-boolean_t refcount_not_held(refcount_t *, void *);
++/*
++ * Note: zfs_refcount_t must be initialized with
++ * refcount_create[_untracked]()
++ */
++
++void refcount_create(zfs_refcount_t *rc);
++void refcount_create_untracked(zfs_refcount_t *rc);
++void refcount_create_tracked(zfs_refcount_t *rc);
++void refcount_destroy(zfs_refcount_t *rc);
++void refcount_destroy_many(zfs_refcount_t *rc, uint64_t number);
++int refcount_is_zero(zfs_refcount_t *rc);
++int64_t refcount_count(zfs_refcount_t *rc);
++int64_t zfs_refcount_add(zfs_refcount_t *rc, void *holder_tag);
++int64_t refcount_remove(zfs_refcount_t *rc, void *holder_tag);
++int64_t refcount_add_many(zfs_refcount_t *rc, uint64_t number,
++    void *holder_tag);
++int64_t refcount_remove_many(zfs_refcount_t *rc, uint64_t number,
++    void *holder_tag);
++void refcount_transfer(zfs_refcount_t *dst, zfs_refcount_t *src);
++void refcount_transfer_ownership(zfs_refcount_t *, void *, void *);
++boolean_t refcount_held(zfs_refcount_t *, void *);
++boolean_t refcount_not_held(zfs_refcount_t *, void *);
+ 
+ void refcount_init(void);
+ void refcount_fini(void);
+@@ -94,7 +88,7 @@ void refcount_fini(void);
+ 
+ typedef struct refcount {
+ 	uint64_t rc_count;
+-} refcount_t;
++} zfs_refcount_t;
+ 
+ #define	refcount_create(rc) ((rc)->rc_count = 0)
+ #define	refcount_create_untracked(rc) ((rc)->rc_count = 0)
+diff --git a/include/sys/rrwlock.h b/include/sys/rrwlock.h
+index 7a328fd6803..e1c1756cf29 100644
+--- a/include/sys/rrwlock.h
++++ b/include/sys/rrwlock.h
+@@ -57,8 +57,8 @@ typedef struct rrwlock {
+ 	kmutex_t	rr_lock;
+ 	kcondvar_t	rr_cv;
+ 	kthread_t	*rr_writer;
+-	refcount_t	rr_anon_rcount;
+-	refcount_t	rr_linked_rcount;
++	zfs_refcount_t	rr_anon_rcount;
++	zfs_refcount_t	rr_linked_rcount;
+ 	boolean_t	rr_writer_wanted;
+ 	boolean_t	rr_track_all;
+ } rrwlock_t;
+diff --git a/include/sys/sa_impl.h b/include/sys/sa_impl.h
+index b68b7610b25..7eddd8750fa 100644
+--- a/include/sys/sa_impl.h
++++ b/include/sys/sa_impl.h
+@@ -110,7 +110,7 @@ typedef struct sa_idx_tab {
+ 	list_node_t	sa_next;
+ 	sa_lot_t	*sa_layout;
+ 	uint16_t	*sa_variable_lengths;
+-	refcount_t	sa_refcount;
++	zfs_refcount_t	sa_refcount;
+ 	uint32_t	*sa_idx_tab;	/* array of offsets */
+ } sa_idx_tab_t;
+ 
+diff --git a/include/sys/spa_impl.h b/include/sys/spa_impl.h
+index 676e8b8a228..9dbdcfcf528 100644
+--- a/include/sys/spa_impl.h
++++ b/include/sys/spa_impl.h
+@@ -139,7 +139,7 @@ typedef struct spa_config_lock {
+ 	kthread_t	*scl_writer;
+ 	int		scl_write_wanted;
+ 	kcondvar_t	scl_cv;
+-	refcount_t	scl_count;
++	zfs_refcount_t	scl_count;
+ } spa_config_lock_t;
+ 
+ typedef struct spa_config_dirent {
+@@ -387,12 +387,12 @@ struct spa {
+ 
+ 	/*
+ 	 * spa_refcount & spa_config_lock must be the last elements
+-	 * because refcount_t changes size based on compilation options.
++	 * because zfs_refcount_t changes size based on compilation options.
+ 	 * In order for the MDB module to function correctly, the other
+ 	 * fields must remain in the same location.
+ 	 */
+ 	spa_config_lock_t spa_config_lock[SCL_LOCKS]; /* config changes */
+-	refcount_t	spa_refcount;		/* number of opens */
++	zfs_refcount_t	spa_refcount;		/* number of opens */
+ 
+ 	taskq_t		*spa_upgrade_taskq;	/* taskq for upgrade jobs */
+ };
+diff --git a/include/sys/zap.h b/include/sys/zap.h
+index 43b7fbd263c..7acc3becb5a 100644
+--- a/include/sys/zap.h
++++ b/include/sys/zap.h
+@@ -226,7 +226,7 @@ int zap_lookup_norm_by_dnode(dnode_t *dn, const char *name,
+     boolean_t *ncp);
+ 
+ int zap_count_write_by_dnode(dnode_t *dn, const char *name,
+-    int add, refcount_t *towrite, refcount_t *tooverwrite);
++    int add, zfs_refcount_t *towrite, zfs_refcount_t *tooverwrite);
+ 
+ /*
+  * Create an attribute with the given name and value.
+diff --git a/include/sys/zfs_znode.h b/include/sys/zfs_znode.h
+index e82ac9941a2..01f4328f040 100644
+--- a/include/sys/zfs_znode.h
++++ b/include/sys/zfs_znode.h
+@@ -223,7 +223,7 @@ typedef struct znode_hold {
+ 	uint64_t	zh_obj;		/* object id */
+ 	kmutex_t	zh_lock;	/* lock serializing object access */
+ 	avl_node_t	zh_node;	/* avl tree linkage */
+-	refcount_t	zh_refcount;	/* active consumer reference count */
++	zfs_refcount_t	zh_refcount;	/* active consumer reference count */
+ } znode_hold_t;
+ 
+ static inline uint64_t
+diff --git a/module/zfs/arc.c b/module/zfs/arc.c
+index 5e53f987961..cd094f39ee7 100644
+--- a/module/zfs/arc.c
++++ b/module/zfs/arc.c
+@@ -2403,7 +2403,7 @@ add_reference(arc_buf_hdr_t *hdr, void *tag)
+ 
+ 	state = hdr->b_l1hdr.b_state;
+ 
+-	if ((refcount_add(&hdr->b_l1hdr.b_refcnt, tag) == 1) &&
++	if ((zfs_refcount_add(&hdr->b_l1hdr.b_refcnt, tag) == 1) &&
+ 	    (state != arc_anon)) {
+ 		/* We don't use the L2-only state list. */
+ 		if (state != arc_l2c_only) {
+@@ -2997,7 +2997,7 @@ arc_return_buf(arc_buf_t *buf, void *tag)
+ 
+ 	ASSERT3P(buf->b_data, !=, NULL);
+ 	ASSERT(HDR_HAS_L1HDR(hdr));
+-	(void) refcount_add(&hdr->b_l1hdr.b_refcnt, tag);
++	(void) zfs_refcount_add(&hdr->b_l1hdr.b_refcnt, tag);
+ 	(void) refcount_remove(&hdr->b_l1hdr.b_refcnt, arc_onloan_tag);
+ 
+ 	arc_loaned_bytes_update(-arc_buf_size(buf));
+@@ -3011,7 +3011,7 @@ arc_loan_inuse_buf(arc_buf_t *buf, void *tag)
+ 
+ 	ASSERT3P(buf->b_data, !=, NULL);
+ 	ASSERT(HDR_HAS_L1HDR(hdr));
+-	(void) refcount_add(&hdr->b_l1hdr.b_refcnt, arc_onloan_tag);
++	(void) zfs_refcount_add(&hdr->b_l1hdr.b_refcnt, arc_onloan_tag);
+ 	(void) refcount_remove(&hdr->b_l1hdr.b_refcnt, tag);
+ 
+ 	arc_loaned_bytes_update(arc_buf_size(buf));
+@@ -3558,11 +3558,11 @@ arc_hdr_realloc_crypt(arc_buf_hdr_t *hdr, boolean_t need_crypt)
+ 	nhdr->b_l1hdr.b_pabd = hdr->b_l1hdr.b_pabd;
+ 
+ 	/*
+-	 * This refcount_add() exists only to ensure that the individual
++	 * This zfs_refcount_add() exists only to ensure that the individual
+ 	 * arc buffers always point to a header that is referenced, avoiding
+ 	 * a small race condition that could trigger ASSERTs.
+ 	 */
+-	(void) refcount_add(&nhdr->b_l1hdr.b_refcnt, FTAG);
++	(void) zfs_refcount_add(&nhdr->b_l1hdr.b_refcnt, FTAG);
+ 	nhdr->b_l1hdr.b_buf = hdr->b_l1hdr.b_buf;
+ 	for (buf = nhdr->b_l1hdr.b_buf; buf != NULL; buf = buf->b_next) {
+ 		mutex_enter(&buf->b_evict_lock);
+@@ -4313,7 +4313,7 @@ arc_prune_async(int64_t adjust)
+ 		if (refcount_count(&ap->p_refcnt) >= 2)
+ 			continue;
+ 
+-		refcount_add(&ap->p_refcnt, ap->p_pfunc);
++		zfs_refcount_add(&ap->p_refcnt, ap->p_pfunc);
+ 		ap->p_adjust = adjust;
+ 		if (taskq_dispatch(arc_prune_taskq, arc_prune_task,
+ 		    ap, TQ_SLEEP) == TASKQID_INVALID) {
+@@ -6536,7 +6536,7 @@ arc_add_prune_callback(arc_prune_func_t *func, void *private)
+ 	refcount_create(&p->p_refcnt);
+ 
+ 	mutex_enter(&arc_prune_mtx);
+-	refcount_add(&p->p_refcnt, &arc_prune_list);
++	zfs_refcount_add(&p->p_refcnt, &arc_prune_list);
+ 	list_insert_head(&arc_prune_list, p);
+ 	mutex_exit(&arc_prune_mtx);
+ 
+@@ -6808,7 +6808,7 @@ arc_release(arc_buf_t *buf, void *tag)
+ 		nhdr->b_l1hdr.b_mfu_hits = 0;
+ 		nhdr->b_l1hdr.b_mfu_ghost_hits = 0;
+ 		nhdr->b_l1hdr.b_l2_hits = 0;
+-		(void) refcount_add(&nhdr->b_l1hdr.b_refcnt, tag);
++		(void) zfs_refcount_add(&nhdr->b_l1hdr.b_refcnt, tag);
+ 		buf->b_hdr = nhdr;
+ 
+ 		mutex_exit(&buf->b_evict_lock);
+diff --git a/module/zfs/dbuf.c b/module/zfs/dbuf.c
+index f7376875afe..db7df602344 100644
+--- a/module/zfs/dbuf.c
++++ b/module/zfs/dbuf.c
+@@ -223,7 +223,7 @@ static boolean_t dbuf_evict_thread_exit;
+  */
+ typedef struct dbuf_cache {
+ 	multilist_t *cache;
+-	refcount_t size;
++	zfs_refcount_t size;
+ } dbuf_cache_t;
+ dbuf_cache_t dbuf_caches[DB_CACHE_MAX];
+ 
+@@ -2784,7 +2784,7 @@ dbuf_create(dnode_t *dn, uint8_t level, uint64_t blkid,
+ 
+ 	ASSERT(dn->dn_object == DMU_META_DNODE_OBJECT ||
+ 	    refcount_count(&dn->dn_holds) > 0);
+-	(void) refcount_add(&dn->dn_holds, db);
++	(void) zfs_refcount_add(&dn->dn_holds, db);
+ 	atomic_inc_32(&dn->dn_dbufs_count);
+ 
+ 	dprintf_dbuf(db, "db=%p\n", db);
+@@ -3183,7 +3183,7 @@ dbuf_hold_impl_arg(struct dbuf_hold_arg *dh)
+ 		}
+ 		dh->dh_db->db_caching_status = DB_NO_CACHE;
+ 	}
+-	(void) refcount_add(&dh->dh_db->db_holds, dh->dh_tag);
++	(void) zfs_refcount_add(&dh->dh_db->db_holds, dh->dh_tag);
+ 	DBUF_VERIFY(dh->dh_db);
+ 	mutex_exit(&dh->dh_db->db_mtx);
+ 
+@@ -3308,7 +3308,7 @@ dbuf_rm_spill(dnode_t *dn, dmu_tx_t *tx)
+ void
+ dbuf_add_ref(dmu_buf_impl_t *db, void *tag)
+ {
+-	int64_t holds = refcount_add(&db->db_holds, tag);
++	int64_t holds = zfs_refcount_add(&db->db_holds, tag);
+ 	VERIFY3S(holds, >, 1);
+ }
+ 
+@@ -3328,7 +3328,7 @@ dbuf_try_add_ref(dmu_buf_t *db_fake, objset_t *os, uint64_t obj, uint64_t blkid,
+ 
+ 	if (found_db != NULL) {
+ 		if (db == found_db && dbuf_refcount(db) > db->db_dirtycnt) {
+-			(void) refcount_add(&db->db_holds, tag);
++			(void) zfs_refcount_add(&db->db_holds, tag);
+ 			result = B_TRUE;
+ 		}
+ 		mutex_exit(&found_db->db_mtx);
+diff --git a/module/zfs/dmu.c b/module/zfs/dmu.c
+index 8779eb3586c..2ff484b6347 100644
+--- a/module/zfs/dmu.c
++++ b/module/zfs/dmu.c
+@@ -360,7 +360,7 @@ dmu_bonus_hold_impl(objset_t *os, uint64_t object, void *tag, uint32_t flags,
+ 	db = dn->dn_bonus;
+ 
+ 	/* as long as the bonus buf is held, the dnode will be held */
+-	if (refcount_add(&db->db_holds, tag) == 1) {
++	if (zfs_refcount_add(&db->db_holds, tag) == 1) {
+ 		VERIFY(dnode_add_ref(dn, db));
+ 		atomic_inc_32(&dn->dn_dbufs_count);
+ 	}
+diff --git a/module/zfs/dmu_tx.c b/module/zfs/dmu_tx.c
+index c268f3c4046..3dc3f595884 100644
+--- a/module/zfs/dmu_tx.c
++++ b/module/zfs/dmu_tx.c
+@@ -114,7 +114,7 @@ dmu_tx_hold_dnode_impl(dmu_tx_t *tx, dnode_t *dn, enum dmu_tx_hold_type type,
+ 	dmu_tx_hold_t *txh;
+ 
+ 	if (dn != NULL) {
+-		(void) refcount_add(&dn->dn_holds, tx);
++		(void) zfs_refcount_add(&dn->dn_holds, tx);
+ 		if (tx->tx_txg != 0) {
+ 			mutex_enter(&dn->dn_mtx);
+ 			/*
+@@ -124,7 +124,7 @@ dmu_tx_hold_dnode_impl(dmu_tx_t *tx, dnode_t *dn, enum dmu_tx_hold_type type,
+ 			 */
+ 			ASSERT(dn->dn_assigned_txg == 0);
+ 			dn->dn_assigned_txg = tx->tx_txg;
+-			(void) refcount_add(&dn->dn_tx_holds, tx);
++			(void) zfs_refcount_add(&dn->dn_tx_holds, tx);
+ 			mutex_exit(&dn->dn_mtx);
+ 		}
+ 	}
+@@ -932,7 +932,7 @@ dmu_tx_try_assign(dmu_tx_t *tx, uint64_t txg_how)
+ 			if (dn->dn_assigned_txg == 0)
+ 				dn->dn_assigned_txg = tx->tx_txg;
+ 			ASSERT3U(dn->dn_assigned_txg, ==, tx->tx_txg);
+-			(void) refcount_add(&dn->dn_tx_holds, tx);
++			(void) zfs_refcount_add(&dn->dn_tx_holds, tx);
+ 			mutex_exit(&dn->dn_mtx);
+ 		}
+ 		towrite += refcount_count(&txh->txh_space_towrite);
+diff --git a/module/zfs/dnode.c b/module/zfs/dnode.c
+index 4e2a733830b..b0b7ea7102b 100644
+--- a/module/zfs/dnode.c
++++ b/module/zfs/dnode.c
+@@ -1304,7 +1304,7 @@ dnode_hold_impl(objset_t *os, uint64_t object, int flag, int slots,
+ 		if ((flag & DNODE_MUST_BE_FREE) && type != DMU_OT_NONE)
+ 			return (SET_ERROR(EEXIST));
+ 		DNODE_VERIFY(dn);
+-		(void) refcount_add(&dn->dn_holds, tag);
++		(void) zfs_refcount_add(&dn->dn_holds, tag);
+ 		*dnp = dn;
+ 		return (0);
+ 	}
+@@ -1527,7 +1527,7 @@ dnode_hold_impl(objset_t *os, uint64_t object, int flag, int slots,
+ 		    ENOENT : EEXIST));
+ 	}
+ 
+-	if (refcount_add(&dn->dn_holds, tag) == 1)
++	if (zfs_refcount_add(&dn->dn_holds, tag) == 1)
+ 		dbuf_add_ref(db, dnh);
+ 
+ 	mutex_exit(&dn->dn_mtx);
+@@ -1567,7 +1567,7 @@ dnode_add_ref(dnode_t *dn, void *tag)
+ 		mutex_exit(&dn->dn_mtx);
+ 		return (FALSE);
+ 	}
+-	VERIFY(1 < refcount_add(&dn->dn_holds, tag));
++	VERIFY(1 < zfs_refcount_add(&dn->dn_holds, tag));
+ 	mutex_exit(&dn->dn_mtx);
+ 	return (TRUE);
+ }
+diff --git a/module/zfs/dsl_crypt.c b/module/zfs/dsl_crypt.c
+index f0878c93477..6beb958c1f5 100644
+--- a/module/zfs/dsl_crypt.c
++++ b/module/zfs/dsl_crypt.c
+@@ -74,7 +74,7 @@
+ static void
+ dsl_wrapping_key_hold(dsl_wrapping_key_t *wkey, void *tag)
+ {
+-	(void) refcount_add(&wkey->wk_refcnt, tag);
++	(void) zfs_refcount_add(&wkey->wk_refcnt, tag);
+ }
+ 
+ static void
+@@ -605,7 +605,7 @@ dsl_crypto_key_open(objset_t *mos, dsl_wrapping_key_t *wkey,
+ 	dsl_wrapping_key_hold(wkey, dck);
+ 	dck->dck_wkey = wkey;
+ 	dck->dck_obj = dckobj;
+-	refcount_add(&dck->dck_holds, tag);
++	zfs_refcount_add(&dck->dck_holds, tag);
+ 
+ 	*dck_out = dck;
+ 	return (0);
+@@ -641,7 +641,7 @@ spa_keystore_dsl_key_hold_impl(spa_t *spa, uint64_t dckobj, void *tag,
+ 	}
+ 
+ 	/* increment the refcount */
+-	refcount_add(&found_dck->dck_holds, tag);
++	zfs_refcount_add(&found_dck->dck_holds, tag);
+ 
+ 	*dck_out = found_dck;
+ 	return (0);
+@@ -970,9 +970,9 @@ spa_keystore_create_mapping_impl(spa_t *spa, uint64_t dsobj,
+ 	found_km = avl_find(&spa->spa_keystore.sk_key_mappings, km, &where);
+ 	if (found_km != NULL) {
+ 		should_free = B_TRUE;
+-		refcount_add(&found_km->km_refcnt, tag);
++		zfs_refcount_add(&found_km->km_refcnt, tag);
+ 	} else {
+-		refcount_add(&km->km_refcnt, tag);
++		zfs_refcount_add(&km->km_refcnt, tag);
+ 		avl_insert(&spa->spa_keystore.sk_key_mappings, km, where);
+ 	}
+ 
+@@ -1072,7 +1072,7 @@ spa_keystore_lookup_key(spa_t *spa, uint64_t dsobj, void *tag,
+ 	}
+ 
+ 	if (found_km && tag)
+-		refcount_add(&found_km->km_key->dck_holds, tag);
++		zfs_refcount_add(&found_km->km_key->dck_holds, tag);
+ 
+ 	rw_exit(&spa->spa_keystore.sk_km_lock);
+ 
+diff --git a/module/zfs/dsl_dataset.c b/module/zfs/dsl_dataset.c
+index b6e3b9a5c7f..7546a0765c2 100644
+--- a/module/zfs/dsl_dataset.c
++++ b/module/zfs/dsl_dataset.c
+@@ -727,7 +727,7 @@ void
+ dsl_dataset_long_hold(dsl_dataset_t *ds, void *tag)
+ {
+ 	ASSERT(dsl_pool_config_held(ds->ds_dir->dd_pool));
+-	(void) refcount_add(&ds->ds_longholds, tag);
++	(void) zfs_refcount_add(&ds->ds_longholds, tag);
+ }
+ 
+ void
+diff --git a/module/zfs/dsl_scan.c b/module/zfs/dsl_scan.c
+index f3c869538ce..ee12185cdde 100644
+--- a/module/zfs/dsl_scan.c
++++ b/module/zfs/dsl_scan.c
+@@ -273,7 +273,7 @@ struct dsl_scan_io_queue {
+ 
+ /* private data for dsl_scan_prefetch_cb() */
+ typedef struct scan_prefetch_ctx {
+-	refcount_t spc_refcnt;		/* refcount for memory management */
++	zfs_refcount_t spc_refcnt;	/* refcount for memory management */
+ 	dsl_scan_t *spc_scn;		/* dsl_scan_t for the pool */
+ 	boolean_t spc_root;		/* is this prefetch for an objset? */
+ 	uint8_t spc_indblkshift;	/* dn_indblkshift of current dnode */
+@@ -1327,7 +1327,7 @@ scan_prefetch_ctx_create(dsl_scan_t *scn, dnode_phys_t *dnp, void *tag)
+ 
+ 	spc = kmem_alloc(sizeof (scan_prefetch_ctx_t), KM_SLEEP);
+ 	refcount_create(&spc->spc_refcnt);
+-	refcount_add(&spc->spc_refcnt, tag);
++	zfs_refcount_add(&spc->spc_refcnt, tag);
+ 	spc->spc_scn = scn;
+ 	if (dnp != NULL) {
+ 		spc->spc_datablkszsec = dnp->dn_datablkszsec;
+@@ -1345,7 +1345,7 @@ scan_prefetch_ctx_create(dsl_scan_t *scn, dnode_phys_t *dnp, void *tag)
+ static void
+ scan_prefetch_ctx_add_ref(scan_prefetch_ctx_t *spc, void *tag)
+ {
+-	refcount_add(&spc->spc_refcnt, tag);
++	zfs_refcount_add(&spc->spc_refcnt, tag);
+ }
+ 
+ static boolean_t
+diff --git a/module/zfs/metaslab.c b/module/zfs/metaslab.c
+index ac361abb67e..f657128d040 100644
+--- a/module/zfs/metaslab.c
++++ b/module/zfs/metaslab.c
+@@ -247,7 +247,7 @@ metaslab_class_create(spa_t *spa, metaslab_ops_t *ops)
+ 	mc->mc_ops = ops;
+ 	mutex_init(&mc->mc_lock, NULL, MUTEX_DEFAULT, NULL);
+ 	mc->mc_alloc_slots = kmem_zalloc(spa->spa_alloc_count *
+-	    sizeof (refcount_t), KM_SLEEP);
++	    sizeof (zfs_refcount_t), KM_SLEEP);
+ 	mc->mc_alloc_max_slots = kmem_zalloc(spa->spa_alloc_count *
+ 	    sizeof (uint64_t), KM_SLEEP);
+ 	for (int i = 0; i < spa->spa_alloc_count; i++)
+@@ -268,7 +268,7 @@ metaslab_class_destroy(metaslab_class_t *mc)
+ 	for (int i = 0; i < mc->mc_spa->spa_alloc_count; i++)
+ 		refcount_destroy(&mc->mc_alloc_slots[i]);
+ 	kmem_free(mc->mc_alloc_slots, mc->mc_spa->spa_alloc_count *
+-	    sizeof (refcount_t));
++	    sizeof (zfs_refcount_t));
+ 	kmem_free(mc->mc_alloc_max_slots, mc->mc_spa->spa_alloc_count *
+ 	    sizeof (uint64_t));
+ 	mutex_destroy(&mc->mc_lock);
+@@ -648,8 +648,8 @@ metaslab_group_create(metaslab_class_t *mc, vdev_t *vd, int allocators)
+ 	mg->mg_no_free_space = B_TRUE;
+ 	mg->mg_allocators = allocators;
+ 
+-	mg->mg_alloc_queue_depth = kmem_zalloc(allocators * sizeof (refcount_t),
+-	    KM_SLEEP);
++	mg->mg_alloc_queue_depth = kmem_zalloc(allocators *
++	    sizeof (zfs_refcount_t), KM_SLEEP);
+ 	mg->mg_cur_max_alloc_queue_depth = kmem_zalloc(allocators *
+ 	    sizeof (uint64_t), KM_SLEEP);
+ 	for (int i = 0; i < allocators; i++) {
+@@ -687,7 +687,7 @@ metaslab_group_destroy(metaslab_group_t *mg)
+ 		mg->mg_cur_max_alloc_queue_depth[i] = 0;
+ 	}
+ 	kmem_free(mg->mg_alloc_queue_depth, mg->mg_allocators *
+-	    sizeof (refcount_t));
++	    sizeof (zfs_refcount_t));
+ 	kmem_free(mg->mg_cur_max_alloc_queue_depth, mg->mg_allocators *
+ 	    sizeof (uint64_t));
+ 
+@@ -2905,7 +2905,7 @@ metaslab_group_alloc_increment(spa_t *spa, uint64_t vdev, void *tag, int flags,
+ 	if (!mg->mg_class->mc_alloc_throttle_enabled)
+ 		return;
+ 
+-	(void) refcount_add(&mg->mg_alloc_queue_depth[allocator], tag);
++	(void) zfs_refcount_add(&mg->mg_alloc_queue_depth[allocator], tag);
+ }
+ 
+ static void
+@@ -3852,7 +3852,7 @@ metaslab_class_throttle_reserve(metaslab_class_t *mc, int slots, int allocator,
+ 		 */
+ 		for (int d = 0; d < slots; d++) {
+ 			reserved_slots =
+-			    refcount_add(&mc->mc_alloc_slots[allocator],
++			    zfs_refcount_add(&mc->mc_alloc_slots[allocator],
+ 			    zio);
+ 		}
+ 		zio->io_flags |= ZIO_FLAG_IO_ALLOCATING;
+diff --git a/module/zfs/refcount.c b/module/zfs/refcount.c
+index a151aceaecf..13f9bb6b76e 100644
+--- a/module/zfs/refcount.c
++++ b/module/zfs/refcount.c
+@@ -55,7 +55,7 @@ refcount_fini(void)
+ }
+ 
+ void
+-refcount_create(refcount_t *rc)
++refcount_create(zfs_refcount_t *rc)
+ {
+ 	mutex_init(&rc->rc_mtx, NULL, MUTEX_DEFAULT, NULL);
+ 	list_create(&rc->rc_list, sizeof (reference_t),
+@@ -68,21 +68,21 @@ refcount_create(refcount_t *rc)
+ }
+ 
+ void
+-refcount_create_tracked(refcount_t *rc)
++refcount_create_tracked(zfs_refcount_t *rc)
+ {
+ 	refcount_create(rc);
+ 	rc->rc_tracked = B_TRUE;
+ }
+ 
+ void
+-refcount_create_untracked(refcount_t *rc)
++refcount_create_untracked(zfs_refcount_t *rc)
+ {
+ 	refcount_create(rc);
+ 	rc->rc_tracked = B_FALSE;
+ }
+ 
+ void
+-refcount_destroy_many(refcount_t *rc, uint64_t number)
++refcount_destroy_many(zfs_refcount_t *rc, uint64_t number)
+ {
+ 	reference_t *ref;
+ 
+@@ -103,25 +103,25 @@ refcount_destroy_many(refcount_t *rc, uint64_t number)
+ }
+ 
+ void
+-refcount_destroy(refcount_t *rc)
++refcount_destroy(zfs_refcount_t *rc)
+ {
+ 	refcount_destroy_many(rc, 0);
+ }
+ 
+ int
+-refcount_is_zero(refcount_t *rc)
++refcount_is_zero(zfs_refcount_t *rc)
+ {
+ 	return (rc->rc_count == 0);
+ }
+ 
+ int64_t
+-refcount_count(refcount_t *rc)
++refcount_count(zfs_refcount_t *rc)
+ {
+ 	return (rc->rc_count);
+ }
+ 
+ int64_t
+-refcount_add_many(refcount_t *rc, uint64_t number, void *holder)
++refcount_add_many(zfs_refcount_t *rc, uint64_t number, void *holder)
+ {
+ 	reference_t *ref = NULL;
+ 	int64_t count;
+@@ -143,13 +143,13 @@ refcount_add_many(refcount_t *rc, uint64_t number, void *holder)
+ }
+ 
+ int64_t
+-zfs_refcount_add(refcount_t *rc, void *holder)
++zfs_refcount_add(zfs_refcount_t *rc, void *holder)
+ {
+ 	return (refcount_add_many(rc, 1, holder));
+ }
+ 
+ int64_t
+-refcount_remove_many(refcount_t *rc, uint64_t number, void *holder)
++refcount_remove_many(zfs_refcount_t *rc, uint64_t number, void *holder)
+ {
+ 	reference_t *ref;
+ 	int64_t count;
+@@ -197,13 +197,13 @@ refcount_remove_many(refcount_t *rc, uint64_t number, void *holder)
+ }
+ 
+ int64_t
+-refcount_remove(refcount_t *rc, void *holder)
++refcount_remove(zfs_refcount_t *rc, void *holder)
+ {
+ 	return (refcount_remove_many(rc, 1, holder));
+ }
+ 
+ void
+-refcount_transfer(refcount_t *dst, refcount_t *src)
++refcount_transfer(zfs_refcount_t *dst, zfs_refcount_t *src)
+ {
+ 	int64_t count, removed_count;
+ 	list_t list, removed;
+@@ -234,7 +234,7 @@ refcount_transfer(refcount_t *dst, refcount_t *src)
+ }
+ 
+ void
+-refcount_transfer_ownership(refcount_t *rc, void *current_holder,
++refcount_transfer_ownership(zfs_refcount_t *rc, void *current_holder,
+     void *new_holder)
+ {
+ 	reference_t *ref;
+@@ -264,7 +264,7 @@ refcount_transfer_ownership(refcount_t *rc, void *current_holder,
+  * might be held.
+  */
+ boolean_t
+-refcount_held(refcount_t *rc, void *holder)
++refcount_held(zfs_refcount_t *rc, void *holder)
+ {
+ 	reference_t *ref;
+ 
+@@ -292,7 +292,7 @@ refcount_held(refcount_t *rc, void *holder)
+  * since the reference might not be held.
+  */
+ boolean_t
+-refcount_not_held(refcount_t *rc, void *holder)
++refcount_not_held(zfs_refcount_t *rc, void *holder)
+ {
+ 	reference_t *ref;
+ 
+diff --git a/module/zfs/rrwlock.c b/module/zfs/rrwlock.c
+index 704f76067bf..effff330522 100644
+--- a/module/zfs/rrwlock.c
++++ b/module/zfs/rrwlock.c
+@@ -183,9 +183,9 @@ rrw_enter_read_impl(rrwlock_t *rrl, boolean_t prio, void *tag)
+ 	if (rrl->rr_writer_wanted || rrl->rr_track_all) {
+ 		/* may or may not be a re-entrant enter */
+ 		rrn_add(rrl, tag);
+-		(void) refcount_add(&rrl->rr_linked_rcount, tag);
++		(void) zfs_refcount_add(&rrl->rr_linked_rcount, tag);
+ 	} else {
+-		(void) refcount_add(&rrl->rr_anon_rcount, tag);
++		(void) zfs_refcount_add(&rrl->rr_anon_rcount, tag);
+ 	}
+ 	ASSERT(rrl->rr_writer == NULL);
+ 	mutex_exit(&rrl->rr_lock);
+diff --git a/module/zfs/sa.c b/module/zfs/sa.c
+index caa91bc4c4e..0856a4b8ff7 100644
+--- a/module/zfs/sa.c
++++ b/module/zfs/sa.c
+@@ -1347,7 +1347,7 @@ sa_idx_tab_hold(objset_t *os, sa_idx_tab_t *idx_tab)
+ 	ASSERTV(sa_os_t *sa = os->os_sa);
+ 
+ 	ASSERT(MUTEX_HELD(&sa->sa_lock));
+-	(void) refcount_add(&idx_tab->sa_refcount, NULL);
++	(void) zfs_refcount_add(&idx_tab->sa_refcount, NULL);
+ }
+ 
+ void
+diff --git a/module/zfs/spa_misc.c b/module/zfs/spa_misc.c
+index 343b01dd6aa..c19f48ac526 100644
+--- a/module/zfs/spa_misc.c
++++ b/module/zfs/spa_misc.c
+@@ -81,7 +81,7 @@
+  *	definition they must have an existing reference, and will never need
+  *	to lookup a spa_t by name.
+  *
+- * spa_refcount (per-spa refcount_t protected by mutex)
++ * spa_refcount (per-spa zfs_refcount_t protected by mutex)
+  *
+  *	This reference count keep track of any active users of the spa_t.  The
+  *	spa_t cannot be destroyed or freed while this is non-zero.  Internally,
+@@ -478,7 +478,7 @@ spa_config_tryenter(spa_t *spa, int locks, void *tag, krw_t rw)
+ 			}
+ 			scl->scl_writer = curthread;
+ 		}
+-		(void) refcount_add(&scl->scl_count, tag);
++		(void) zfs_refcount_add(&scl->scl_count, tag);
+ 		mutex_exit(&scl->scl_lock);
+ 	}
+ 	return (1);
+@@ -511,7 +511,7 @@ spa_config_enter(spa_t *spa, int locks, void *tag, krw_t rw)
+ 			}
+ 			scl->scl_writer = curthread;
+ 		}
+-		(void) refcount_add(&scl->scl_count, tag);
++		(void) zfs_refcount_add(&scl->scl_count, tag);
+ 		mutex_exit(&scl->scl_lock);
+ 	}
+ 	ASSERT3U(wlocks_held, <=, locks);
+@@ -841,7 +841,7 @@ spa_open_ref(spa_t *spa, void *tag)
+ {
+ 	ASSERT(refcount_count(&spa->spa_refcount) >= spa->spa_minref ||
+ 	    MUTEX_HELD(&spa_namespace_lock));
+-	(void) refcount_add(&spa->spa_refcount, tag);
++	(void) zfs_refcount_add(&spa->spa_refcount, tag);
+ }
+ 
+ /*
+diff --git a/module/zfs/zfs_ctldir.c b/module/zfs/zfs_ctldir.c
+index f5cfdb55d79..6a7b7bbb5e7 100644
+--- a/module/zfs/zfs_ctldir.c
++++ b/module/zfs/zfs_ctldir.c
+@@ -117,7 +117,7 @@ typedef struct {
+ 	taskqid_t	se_taskqid;	/* scheduled unmount taskqid */
+ 	avl_node_t	se_node_name;	/* zfs_snapshots_by_name link */
+ 	avl_node_t	se_node_objsetid; /* zfs_snapshots_by_objsetid link */
+-	refcount_t	se_refcount;	/* reference count */
++	zfs_refcount_t	se_refcount;	/* reference count */
+ } zfs_snapentry_t;
+ 
+ static void zfsctl_snapshot_unmount_delay_impl(zfs_snapentry_t *se, int delay);
+@@ -166,7 +166,7 @@ zfsctl_snapshot_free(zfs_snapentry_t *se)
+ static void
+ zfsctl_snapshot_hold(zfs_snapentry_t *se)
+ {
+-	refcount_add(&se->se_refcount, NULL);
++	zfs_refcount_add(&se->se_refcount, NULL);
+ }
+ 
+ /*
+@@ -189,7 +189,7 @@ static void
+ zfsctl_snapshot_add(zfs_snapentry_t *se)
+ {
+ 	ASSERT(RW_WRITE_HELD(&zfs_snapshot_lock));
+-	refcount_add(&se->se_refcount, NULL);
++	zfs_refcount_add(&se->se_refcount, NULL);
+ 	avl_add(&zfs_snapshots_by_name, se);
+ 	avl_add(&zfs_snapshots_by_objsetid, se);
+ }
+@@ -266,7 +266,7 @@ zfsctl_snapshot_find_by_name(char *snapname)
+ 	search.se_name = snapname;
+ 	se = avl_find(&zfs_snapshots_by_name, &search, NULL);
+ 	if (se)
+-		refcount_add(&se->se_refcount, NULL);
++		zfs_refcount_add(&se->se_refcount, NULL);
+ 
+ 	return (se);
+ }
+@@ -287,7 +287,7 @@ zfsctl_snapshot_find_by_objsetid(spa_t *spa, uint64_t objsetid)
+ 	search.se_objsetid = objsetid;
+ 	se = avl_find(&zfs_snapshots_by_objsetid, &search, NULL);
+ 	if (se)
+-		refcount_add(&se->se_refcount, NULL);
++		zfs_refcount_add(&se->se_refcount, NULL);
+ 
+ 	return (se);
+ }
+diff --git a/module/zfs/zfs_znode.c b/module/zfs/zfs_znode.c
+index f037d4c967c..a4991476289 100644
+--- a/module/zfs/zfs_znode.c
++++ b/module/zfs/zfs_znode.c
+@@ -264,7 +264,7 @@ zfs_znode_hold_enter(zfsvfs_t *zfsvfs, uint64_t obj)
+ 		ASSERT3U(zh->zh_obj, ==, obj);
+ 		found = B_TRUE;
+ 	}
+-	refcount_add(&zh->zh_refcount, NULL);
++	zfs_refcount_add(&zh->zh_refcount, NULL);
+ 	mutex_exit(&zfsvfs->z_hold_locks[i]);
+ 
+ 	if (found == B_TRUE)
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/zfs.git/commitdiff/6a410e14105fee3927f8e488ad3d775f85d370d4




More information about the pld-cvs-commit mailing list