geom.4 (114743) | geom.4 (115211) |
---|---|
1.\" 2.\" Copyright (c) 2002 Poul-Henning Kamp 3.\" Copyright (c) 2002 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp 7.\" and NAI Labs, the Security Research Division of Network Associates, Inc. 8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the --- 18 unchanged lines hidden (view full) --- 27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" | 1.\" 2.\" Copyright (c) 2002 Poul-Henning Kamp 3.\" Copyright (c) 2002 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp 7.\" and NAI Labs, the Security Research Division of Network Associates, Inc. 8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the --- 18 unchanged lines hidden (view full) --- 27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" |
35.\" $FreeBSD: head/share/man/man4/geom.4 114743 2003-05-05 17:36:57Z phk $ | 35.\" $FreeBSD: head/share/man/man4/geom.4 115211 2003-05-21 15:55:40Z ru $ |
36.\" 37.Dd March 27, 2002 38.Os 39.Dt GEOM 4 40.Sh NAME 41.Nm GEOM 42.Nd modular disk I/O request transformation framework. 43.Sh DESCRIPTION --- 126 unchanged lines hidden (view full) --- 170should selfdestruct unless it has a way to keep functioning lacking 171the orphaned provider. 172Geoms like diskslicers should therefore selfdestruct whereas 173RAID5 or mirror geoms will be able to continue, as long as they do 174not loose quorum. 175.Pp 176When a provider is orphaned, this does not necessarily result in any 177immediate change in the topology: any attached consumers are still | 36.\" 37.Dd March 27, 2002 38.Os 39.Dt GEOM 4 40.Sh NAME 41.Nm GEOM 42.Nd modular disk I/O request transformation framework. 43.Sh DESCRIPTION --- 126 unchanged lines hidden (view full) --- 170should selfdestruct unless it has a way to keep functioning lacking 171the orphaned provider. 172Geoms like diskslicers should therefore selfdestruct whereas 173RAID5 or mirror geoms will be able to continue, as long as they do 174not loose quorum. 175.Pp 176When a provider is orphaned, this does not necessarily result in any 177immediate change in the topology: any attached consumers are still |
178attached, any opened paths are still open, any outstanding I/O | 178attached, any opened paths are still open, any outstanding I/O |
179requests are still outstanding. 180.Pp 181The typical scenario is 182.Bl -bullet -offset indent -compact 183.It 184A device driver detects a disk has departed and orphans the provider for it. 185.It | 179requests are still outstanding. 180.Pp 181The typical scenario is 182.Bl -bullet -offset indent -compact 183.It 184A device driver detects a disk has departed and orphans the provider for it. 185.It |
186The geoms on top of the disk receive the orphanization event and | 186The geoms on top of the disk receive the orphanization event and |
187orphans all their providers in turn. 188Providers, which are not attached to, will typically self-destruct 189right away. 190This process continues in a quasi-recursive fashion until all 191relevant pieces of the tree has heard the bad news. 192.It 193Eventually the buck stops when it reaches geom_dev at the top 194of the stack. --- 140 unchanged lines hidden --- | 187orphans all their providers in turn. 188Providers, which are not attached to, will typically self-destruct 189right away. 190This process continues in a quasi-recursive fashion until all 191relevant pieces of the tree has heard the bad news. 192.It 193Eventually the buck stops when it reaches geom_dev at the top 194of the stack. --- 140 unchanged lines hidden --- |