]> granicus.if.org Git - zfs/blobdiff - cmd/ztest/ztest.c
Remove rwlock wrappers
[zfs] / cmd / ztest / ztest.c
index b4cedbdbaf6649dd71dbc502a8fe57aa61f7354e..bbd30c9e022765f91eed6736ca10fc5b9fb0d39e 100644 (file)
  */
 /*
  * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
- * Copyright (c) 2011, 2016 by Delphix. All rights reserved.
+ * Copyright (c) 2011, 2017 by Delphix. All rights reserved.
  * Copyright 2011 Nexenta Systems, Inc.  All rights reserved.
  * Copyright (c) 2013 Steven Hartland. All rights reserved.
+ * Copyright (c) 2014 Integros [integros.com]
+ * Copyright 2017 Joyent, Inc.
  */
 
 /*
@@ -166,7 +168,7 @@ typedef struct ztest_shared_opts {
        int zo_init;
        uint64_t zo_time;
        uint64_t zo_maxloops;
-       uint64_t zo_metaslab_gang_bang;
+       uint64_t zo_metaslab_force_ganging;
        int zo_mmp_test;
 } ztest_shared_opts_t;
 
@@ -190,17 +192,20 @@ static const ztest_shared_opts_t ztest_opts_defaults = {
        .zo_init = 1,
        .zo_time = 300,                 /* 5 minutes */
        .zo_maxloops = 50,              /* max loops during spa_freeze() */
-       .zo_metaslab_gang_bang = 32 << 10
+       .zo_metaslab_force_ganging = 32 << 10
 };
 
-extern uint64_t metaslab_gang_bang;
+extern uint64_t metaslab_force_ganging;
 extern uint64_t metaslab_df_alloc_threshold;
+extern unsigned long zfs_deadman_synctime_ms;
 extern int metaslab_preload_limit;
 extern boolean_t zfs_compressed_arc_enabled;
-extern int  zfs_abd_scatter_enabled;
+extern int zfs_abd_scatter_enabled;
+extern int dmu_object_alloc_chunk_shift;
 
 static ztest_shared_opts_t *ztest_shared_opts;
 static ztest_shared_opts_t ztest_opts;
+static char *ztest_wkeydata = "abcdefghijklmnopqrstuvwxyz012345";
 
 typedef struct ztest_shared_ds {
        uint64_t        zd_seq;
@@ -210,8 +215,8 @@ static ztest_shared_ds_t *ztest_shared_ds;
 #define        ZTEST_GET_SHARED_DS(d) (&ztest_shared_ds[d])
 
 #define        BT_MAGIC        0x123456789abcdefULL
-#define        MAXFAULTS() \
-       (MAX(zs->zs_mirrors, 1) * (ztest_opts.zo_raidz_parity + 1) - 1)
+#define        MAXFAULTS(zs) \
+       (MAX((zs)->zs_mirrors, 1) * (ztest_opts.zo_raidz_parity + 1) - 1)
 
 enum ztest_io_type {
        ZTEST_IO_WRITE_TAG,
@@ -277,7 +282,7 @@ typedef struct ztest_od {
 typedef struct ztest_ds {
        ztest_shared_ds_t *zd_shared;
        objset_t        *zd_os;
-       rwlock_t        zd_zilog_lock;
+       pthread_rwlock_t zd_zilog_lock;
        zilog_t         *zd_zilog;
        ztest_od_t      *zd_od;         /* debugging aid */
        char            zd_name[ZFS_MAX_DATASET_NAME_LEN];
@@ -310,6 +315,7 @@ static ztest_shared_callstate_t *ztest_shared_callstate;
 ztest_func_t ztest_dmu_read_write;
 ztest_func_t ztest_dmu_write_parallel;
 ztest_func_t ztest_dmu_object_alloc_free;
+ztest_func_t ztest_dmu_object_next_chunk;
 ztest_func_t ztest_dmu_commit_callbacks;
 ztest_func_t ztest_zap;
 ztest_func_t ztest_zap_parallel;
@@ -326,6 +332,7 @@ ztest_func_t ztest_spa_create_destroy;
 ztest_func_t ztest_fault_inject;
 ztest_func_t ztest_ddt_repair;
 ztest_func_t ztest_dmu_snapshot_hold;
+ztest_func_t ztest_mmp_enable_disable;
 ztest_func_t ztest_spa_rename;
 ztest_func_t ztest_scrub;
 ztest_func_t ztest_dsl_dataset_promote_busy;
@@ -336,6 +343,8 @@ ztest_func_t ztest_vdev_aux_add_remove;
 ztest_func_t ztest_split_pool;
 ztest_func_t ztest_reguid;
 ztest_func_t ztest_spa_upgrade;
+ztest_func_t ztest_device_removal;
+ztest_func_t ztest_remap_blocks;
 ztest_func_t ztest_fletcher;
 ztest_func_t ztest_fletcher_incr;
 ztest_func_t ztest_verify_dnode_bt;
@@ -356,6 +365,7 @@ ztest_info_t ztest_info[] = {
        ZTI_INIT(ztest_dmu_read_write, 1, &zopt_always),
        ZTI_INIT(ztest_dmu_write_parallel, 10, &zopt_always),
        ZTI_INIT(ztest_dmu_object_alloc_free, 1, &zopt_always),
+       ZTI_INIT(ztest_dmu_object_next_chunk, 1, &zopt_sometimes),
        ZTI_INIT(ztest_dmu_commit_callbacks, 1, &zopt_always),
        ZTI_INIT(ztest_zap, 30, &zopt_always),
        ZTI_INIT(ztest_zap_parallel, 100, &zopt_always),
@@ -375,6 +385,7 @@ ztest_info_t ztest_info[] = {
        ZTI_INIT(ztest_fault_inject, 1, &zopt_sometimes),
        ZTI_INIT(ztest_ddt_repair, 1, &zopt_sometimes),
        ZTI_INIT(ztest_dmu_snapshot_hold, 1, &zopt_sometimes),
+       ZTI_INIT(ztest_mmp_enable_disable, 1, &zopt_sometimes),
        ZTI_INIT(ztest_reguid, 1, &zopt_rarely),
        ZTI_INIT(ztest_spa_rename, 1, &zopt_rarely),
        ZTI_INIT(ztest_scrub, 1, &zopt_rarely),
@@ -384,6 +395,8 @@ ztest_info_t ztest_info[] = {
        ZTI_INIT(ztest_vdev_LUN_growth, 1, &zopt_rarely),
        ZTI_INIT(ztest_vdev_add_remove, 1, &ztest_opts.zo_vdevtime),
        ZTI_INIT(ztest_vdev_aux_add_remove, 1, &ztest_opts.zo_vdevtime),
+       ZTI_INIT(ztest_device_removal, 1, &zopt_sometimes),
+       ZTI_INIT(ztest_remap_blocks, 1, &zopt_sometimes),
        ZTI_INIT(ztest_fletcher, 1, &zopt_rarely),
        ZTI_INIT(ztest_fletcher_incr, 1, &zopt_rarely),
        ZTI_INIT(ztest_verify_dnode_bt, 1, &zopt_sometimes),
@@ -432,6 +445,7 @@ static spa_t *ztest_spa = NULL;
 static ztest_ds_t *ztest_ds;
 
 static kmutex_t ztest_vdev_lock;
+static boolean_t ztest_device_removal_active = B_FALSE;
 
 /*
  * The ztest_name_lock protects the pool and dataset namespace used by
@@ -439,9 +453,10 @@ static kmutex_t ztest_vdev_lock;
  * this lock as writer. Grabbing the lock as reader will ensure that the
  * namespace does not change while the lock is held.
  */
-static rwlock_t ztest_name_lock;
+static pthread_rwlock_t ztest_name_lock;
 
 static boolean_t ztest_dump_core = B_TRUE;
+static boolean_t ztest_dump_debug_buffer = B_FALSE;
 static boolean_t ztest_exiting;
 
 /* Global commit callback list */
@@ -490,6 +505,16 @@ _umem_logging_init(void)
        return ("fail,contents"); /* $UMEM_LOGGING setting */
 }
 
+static void
+dump_debug_buffer(void)
+{
+       if (!ztest_dump_debug_buffer)
+               return;
+
+       (void) printf("\n");
+       zfs_dbgmsg_print("ztest");
+}
+
 #define        BACKTRACE_SZ    100
 
 static void sig_handler(int signo)
@@ -502,6 +527,7 @@ static void sig_handler(int signo)
        nptrs = backtrace(buffer, BACKTRACE_SZ);
        backtrace_symbols_fd(buffer, nptrs, STDERR_FILENO);
 #endif
+       dump_debug_buffer();
 
        /*
         * Restore default action and re-raise signal so SIGSEGV and
@@ -539,6 +565,9 @@ fatal(int do_perror, char *message, ...)
        }
        (void) fprintf(stderr, "%s\n", buf);
        fatal_msg = buf;                        /* to ease debugging */
+
+       dump_debug_buffer();
+
        if (ztest_dump_core)
                abort();
        exit(3);
@@ -605,12 +634,13 @@ usage(boolean_t requested)
 {
        const ztest_shared_opts_t *zo = &ztest_opts_defaults;
 
-       char nice_vdev_size[10];
-       char nice_gang_bang[10];
+       char nice_vdev_size[NN_NUMBUF_SZ];
+       char nice_force_ganging[NN_NUMBUF_SZ];
        FILE *fp = requested ? stdout : stderr;
 
-       nicenum(zo->zo_vdev_size, nice_vdev_size);
-       nicenum(zo->zo_metaslab_gang_bang, nice_gang_bang);
+       nicenum(zo->zo_vdev_size, nice_vdev_size, sizeof (nice_vdev_size));
+       nicenum(zo->zo_metaslab_force_ganging, nice_force_ganging,
+           sizeof (nice_force_ganging));
 
        (void) fprintf(fp, "Usage: %s\n"
            "\t[-v vdevs (default: %llu)]\n"
@@ -635,6 +665,7 @@ usage(boolean_t requested)
            "\t[-B alt_ztest (default: <none>)] alternate ztest path\n"
            "\t[-o variable=value] ... set global variable to an unsigned\n"
            "\t    32-bit integer value\n"
+           "\t[-G dump zfs_dbgmsg buffer before exiting due to an error\n"
            "\t[-h] (print help)\n"
            "",
            zo->zo_pool,
@@ -646,7 +677,7 @@ usage(boolean_t requested)
            zo->zo_raidz_parity,                        /* -R */
            zo->zo_datasets,                            /* -d */
            zo->zo_threads,                             /* -t */
-           nice_gang_bang,                             /* -g */
+           nice_force_ganging,                         /* -g */
            zo->zo_init,                                /* -i */
            (u_longlong_t)zo->zo_killrate,              /* -k */
            zo->zo_pool,                                /* -p */
@@ -670,7 +701,7 @@ process_options(int argc, char **argv)
        bcopy(&ztest_opts_defaults, zo, sizeof (*zo));
 
        while ((opt = getopt(argc, argv,
-           "v:s:a:m:r:R:d:t:g:i:k:p:f:MVET:P:hF:B:o:")) != EOF) {
+           "v:s:a:m:r:R:d:t:g:i:k:p:f:MVET:P:hF:B:o:G")) != EOF) {
                value = 0;
                switch (opt) {
                case 'v':
@@ -715,8 +746,8 @@ process_options(int argc, char **argv)
                        zo->zo_threads = MAX(1, value);
                        break;
                case 'g':
-                       zo->zo_metaslab_gang_bang = MAX(SPA_MINBLOCKSIZE << 1,
-                           value);
+                       zo->zo_metaslab_force_ganging =
+                           MAX(SPA_MINBLOCKSIZE << 1, value);
                        break;
                case 'i':
                        zo->zo_init = value;
@@ -765,6 +796,9 @@ process_options(int argc, char **argv)
                        if (set_global_var(optarg) != 0)
                                usage(B_FALSE);
                        break;
+               case 'G':
+                       ztest_dump_debug_buffer = B_TRUE;
+                       break;
                case 'h':
                        usage(B_TRUE);
                        break;
@@ -837,10 +871,10 @@ ztest_kill(ztest_shared_t *zs)
 
        /*
         * Before we kill off ztest, make sure that the config is updated.
-        * See comment above spa_config_sync().
+        * See comment above spa_write_cachefile().
         */
        mutex_enter(&spa_namespace_lock);
-       spa_config_sync(ztest_spa, B_FALSE, B_FALSE);
+       spa_write_cachefile(ztest_spa, B_FALSE, B_FALSE);
        mutex_exit(&spa_namespace_lock);
 
        (void) kill(getpid(), SIGKILL);
@@ -1099,7 +1133,7 @@ ztest_random_vdev_top(spa_t *spa, boolean_t log_ok)
        do {
                top = ztest_random(rvd->vdev_children);
                tvd = rvd->vdev_child[top];
-       } while (tvd->vdev_ishole || (tvd->vdev_islog && !log_ok) ||
+       } while (!vdev_is_concrete(tvd) || (tvd->vdev_islog && !log_ok) ||
            tvd->vdev_mg == NULL || tvd->vdev_mg->mg_class == NULL);
 
        return (top);
@@ -1178,6 +1212,42 @@ ztest_spa_prop_set_uint64(zpool_prop_t prop, uint64_t value)
        return (error);
 }
 
+static int
+ztest_dmu_objset_own(const char *name, dmu_objset_type_t type,
+    boolean_t readonly, boolean_t decrypt, void *tag, objset_t **osp)
+{
+       int err;
+
+       err = dmu_objset_own(name, type, readonly, decrypt, tag, osp);
+       if (decrypt && err == EACCES) {
+               char ddname[ZFS_MAX_DATASET_NAME_LEN];
+               dsl_crypto_params_t *dcp;
+               nvlist_t *crypto_args = fnvlist_alloc();
+               char *cp = NULL;
+
+               /* spa_keystore_load_wkey() expects a dsl dir name */
+               strcpy(ddname, name);
+               cp = strchr(ddname, '@');
+               if (cp != NULL)
+                       *cp = '\0';
+
+               fnvlist_add_uint8_array(crypto_args, "wkeydata",
+                   (uint8_t *)ztest_wkeydata, WRAPPING_KEY_LEN);
+               VERIFY0(dsl_crypto_params_create_nvlist(DCP_CMD_NONE, NULL,
+                   crypto_args, &dcp));
+               err = spa_keystore_load_wkey(ddname, dcp, B_FALSE);
+               dsl_crypto_params_free(dcp, B_FALSE);
+               fnvlist_free(crypto_args);
+
+               if (err != 0)
+                       return (err);
+
+               err = dmu_objset_own(name, type, readonly, decrypt, tag, osp);
+       }
+
+       return (err);
+}
+
 
 /*
  * Object and range lock mechanics
@@ -1389,7 +1459,7 @@ ztest_zd_init(ztest_ds_t *zd, ztest_shared_ds_t *szd, objset_t *os)
        if (zd->zd_shared != NULL)
                zd->zd_shared->zd_seq = 0;
 
-       VERIFY(rwlock_init(&zd->zd_zilog_lock, USYNC_THREAD, NULL) == 0);
+       VERIFY0(pthread_rwlock_init(&zd->zd_zilog_lock, NULL));
        mutex_init(&zd->zd_dirobj_lock, NULL, MUTEX_DEFAULT, NULL);
 
        for (l = 0; l < ZTEST_OBJECT_LOCKS; l++)
@@ -1405,7 +1475,7 @@ ztest_zd_fini(ztest_ds_t *zd)
        int l;
 
        mutex_destroy(&zd->zd_dirobj_lock);
-       (void) rwlock_destroy(&zd->zd_zilog_lock);
+       (void) pthread_rwlock_destroy(&zd->zd_zilog_lock);
 
        for (l = 0; l < ZTEST_OBJECT_LOCKS; l++)
                ztest_rll_destroy(&zd->zd_object_lock[l]);
@@ -1670,8 +1740,10 @@ ztest_log_setattr(ztest_ds_t *zd, dmu_tx_t *tx, lr_setattr_t *lr)
  * ZIL replay ops
  */
 static int
-ztest_replay_create(ztest_ds_t *zd, lr_create_t *lr, boolean_t byteswap)
+ztest_replay_create(void *arg1, void *arg2, boolean_t byteswap)
 {
+       ztest_ds_t *zd = arg1;
+       lr_create_t *lr = arg2;
        char *name = (void *)(lr + 1);          /* name follows lr */
        objset_t *os = zd->zd_os;
        ztest_block_tag_t *bbt;
@@ -1758,8 +1830,10 @@ ztest_replay_create(ztest_ds_t *zd, lr_create_t *lr, boolean_t byteswap)
 }
 
 static int
-ztest_replay_remove(ztest_ds_t *zd, lr_remove_t *lr, boolean_t byteswap)
+ztest_replay_remove(void *arg1, void *arg2, boolean_t byteswap)
 {
+       ztest_ds_t *zd = arg1;
+       lr_remove_t *lr = arg2;
        char *name = (void *)(lr + 1);          /* name follows lr */
        objset_t *os = zd->zd_os;
        dmu_object_info_t doi;
@@ -1809,8 +1883,10 @@ ztest_replay_remove(ztest_ds_t *zd, lr_remove_t *lr, boolean_t byteswap)
 }
 
 static int
-ztest_replay_write(ztest_ds_t *zd, lr_write_t *lr, boolean_t byteswap)
+ztest_replay_write(void *arg1, void *arg2, boolean_t byteswap)
 {
+       ztest_ds_t *zd = arg1;
+       lr_write_t *lr = arg2;
        objset_t *os = zd->zd_os;
        void *data = lr + 1;                    /* data follows lr */
        uint64_t offset, length;
@@ -1919,7 +1995,7 @@ ztest_replay_write(ztest_ds_t *zd, lr_write_t *lr, boolean_t byteswap)
                dmu_write(os, lr->lr_foid, offset, length, data, tx);
        } else {
                bcopy(data, abuf->b_data, length);
-               dmu_assign_arcbuf(db, offset, abuf, tx);
+               dmu_assign_arcbuf_by_dbuf(db, offset, abuf, tx);
        }
 
        (void) ztest_log_write(zd, tx, lr);
@@ -1935,8 +2011,10 @@ ztest_replay_write(ztest_ds_t *zd, lr_write_t *lr, boolean_t byteswap)
 }
 
 static int
-ztest_replay_truncate(ztest_ds_t *zd, lr_truncate_t *lr, boolean_t byteswap)
+ztest_replay_truncate(void *arg1, void *arg2, boolean_t byteswap)
 {
+       ztest_ds_t *zd = arg1;
+       lr_truncate_t *lr = arg2;
        objset_t *os = zd->zd_os;
        dmu_tx_t *tx;
        uint64_t txg;
@@ -1974,8 +2052,10 @@ ztest_replay_truncate(ztest_ds_t *zd, lr_truncate_t *lr, boolean_t byteswap)
 }
 
 static int
-ztest_replay_setattr(ztest_ds_t *zd, lr_setattr_t *lr, boolean_t byteswap)
+ztest_replay_setattr(void *arg1, void *arg2, boolean_t byteswap)
 {
+       ztest_ds_t *zd = arg1;
+       lr_setattr_t *lr = arg2;
        objset_t *os = zd->zd_os;
        dmu_tx_t *tx;
        dmu_buf_t *db;
@@ -2046,27 +2126,27 @@ ztest_replay_setattr(ztest_ds_t *zd, lr_setattr_t *lr, boolean_t byteswap)
        return (0);
 }
 
-zil_replay_func_t ztest_replay_vector[TX_MAX_TYPE] = {
-       NULL,                           /* 0 no such transaction type */
-       (zil_replay_func_t)ztest_replay_create,         /* TX_CREATE */
-       NULL,                                           /* TX_MKDIR */
-       NULL,                                           /* TX_MKXATTR */
-       NULL,                                           /* TX_SYMLINK */
-       (zil_replay_func_t)ztest_replay_remove,         /* TX_REMOVE */
-       NULL,                                           /* TX_RMDIR */
-       NULL,                                           /* TX_LINK */
-       NULL,                                           /* TX_RENAME */
-       (zil_replay_func_t)ztest_replay_write,          /* TX_WRITE */
-       (zil_replay_func_t)ztest_replay_truncate,       /* TX_TRUNCATE */
-       (zil_replay_func_t)ztest_replay_setattr,        /* TX_SETATTR */
-       NULL,                                           /* TX_ACL */
-       NULL,                                           /* TX_CREATE_ACL */
-       NULL,                                           /* TX_CREATE_ATTR */
-       NULL,                                           /* TX_CREATE_ACL_ATTR */
-       NULL,                                           /* TX_MKDIR_ACL */
-       NULL,                                           /* TX_MKDIR_ATTR */
-       NULL,                                           /* TX_MKDIR_ACL_ATTR */
-       NULL,                                           /* TX_WRITE2 */
+zil_replay_func_t *ztest_replay_vector[TX_MAX_TYPE] = {
+       NULL,                   /* 0 no such transaction type */
+       ztest_replay_create,    /* TX_CREATE */
+       NULL,                   /* TX_MKDIR */
+       NULL,                   /* TX_MKXATTR */
+       NULL,                   /* TX_SYMLINK */
+       ztest_replay_remove,    /* TX_REMOVE */
+       NULL,                   /* TX_RMDIR */
+       NULL,                   /* TX_LINK */
+       NULL,                   /* TX_RENAME */
+       ztest_replay_write,     /* TX_WRITE */
+       ztest_replay_truncate,  /* TX_TRUNCATE */
+       ztest_replay_setattr,   /* TX_SETATTR */
+       NULL,                   /* TX_ACL */
+       NULL,                   /* TX_CREATE_ACL */
+       NULL,                   /* TX_CREATE_ATTR */
+       NULL,                   /* TX_CREATE_ACL_ATTR */
+       NULL,                   /* TX_MKDIR_ACL */
+       NULL,                   /* TX_MKDIR_ATTR */
+       NULL,                   /* TX_MKDIR_ACL_ATTR */
+       NULL,                   /* TX_WRITE2 */
 };
 
 /*
@@ -2092,14 +2172,15 @@ ztest_get_done(zgd_t *zgd, int error)
        ztest_object_unlock(zd, object);
 
        if (error == 0 && zgd->zgd_bp)
-               zil_add_block(zgd->zgd_zilog, zgd->zgd_bp);
+               zil_lwb_add_block(zgd->zgd_lwb, zgd->zgd_bp);
 
        umem_free(zgd, sizeof (*zgd));
        umem_free(zzp, sizeof (*zzp));
 }
 
 static int
-ztest_get_data(void *arg, lr_write_t *lr, char *buf, zio_t *zio)
+ztest_get_data(void *arg, lr_write_t *lr, char *buf, struct lwb *lwb,
+    zio_t *zio)
 {
        ztest_ds_t *zd = arg;
        objset_t *os = zd->zd_os;
@@ -2114,6 +2195,10 @@ ztest_get_data(void *arg, lr_write_t *lr, char *buf, zio_t *zio)
        int error;
        ztest_zgd_private_t *zgd_private;
 
+       ASSERT3P(lwb, !=, NULL);
+       ASSERT3P(zio, !=, NULL);
+       ASSERT3U(size, !=, 0);
+
        ztest_object_lock(zd, object, RL_READER);
        error = dmu_bonus_hold(os, object, FTAG, &db);
        if (error) {
@@ -2134,7 +2219,7 @@ ztest_get_data(void *arg, lr_write_t *lr, char *buf, zio_t *zio)
        db = NULL;
 
        zgd = umem_zalloc(sizeof (*zgd), UMEM_NOFAIL);
-       zgd->zgd_zilog = zd->zd_zilog;
+       zgd->zgd_lwb = lwb;
        zgd_private = umem_zalloc(sizeof (ztest_zgd_private_t), UMEM_NOFAIL);
        zgd_private->z_zd = zd;
        zgd_private->z_object = object;
@@ -2143,6 +2228,7 @@ ztest_get_data(void *arg, lr_write_t *lr, char *buf, zio_t *zio)
        if (buf != NULL) {      /* immediate write */
                zgd_private->z_rl = ztest_range_lock(zd, object, offset, size,
                    RL_READER);
+               zgd->zgd_rl = zgd_private->z_rl->z_rl;
 
                error = dmu_read(os, object, offset, size, buf,
                    DMU_READ_NO_PREFETCH);
@@ -2158,6 +2244,7 @@ ztest_get_data(void *arg, lr_write_t *lr, char *buf, zio_t *zio)
 
                zgd_private->z_rl = ztest_range_lock(zd, object, offset, size,
                    RL_READER);
+               zgd->zgd_rl = zgd_private->z_rl->z_rl;
 
                error = dmu_buf_hold(os, object, offset, zgd, &db,
                    DMU_READ_NO_PREFETCH);
@@ -2216,7 +2303,7 @@ ztest_lookup(ztest_ds_t *zd, ztest_od_t *od, int count)
        int error;
        int i;
 
-       ASSERT(mutex_held(&zd->zd_dirobj_lock));
+       ASSERT(MUTEX_HELD(&zd->zd_dirobj_lock));
 
        for (i = 0; i < count; i++, od++) {
                od->od_object = 0;
@@ -2257,7 +2344,7 @@ ztest_create(ztest_ds_t *zd, ztest_od_t *od, int count)
        int missing = 0;
        int i;
 
-       ASSERT(mutex_held(&zd->zd_dirobj_lock));
+       ASSERT(MUTEX_HELD(&zd->zd_dirobj_lock));
 
        for (i = 0; i < count; i++, od++) {
                if (missing) {
@@ -2303,7 +2390,7 @@ ztest_remove(ztest_ds_t *zd, ztest_od_t *od, int count)
        int error;
        int i;
 
-       ASSERT(mutex_held(&zd->zd_dirobj_lock));
+       ASSERT(MUTEX_HELD(&zd->zd_dirobj_lock));
 
        od += count - 1;
 
@@ -2449,7 +2536,7 @@ ztest_io(ztest_ds_t *zd, uint64_t object, uint64_t offset)
        if (ztest_random(2) == 0)
                io_type = ZTEST_IO_WRITE_TAG;
 
-       (void) rw_rdlock(&zd->zd_zilog_lock);
+       (void) pthread_rwlock_rdlock(&zd->zd_zilog_lock);
 
        switch (io_type) {
 
@@ -2489,7 +2576,7 @@ ztest_io(ztest_ds_t *zd, uint64_t object, uint64_t offset)
                break;
 
        case ZTEST_IO_REWRITE:
-               (void) rw_rdlock(&ztest_name_lock);
+               (void) pthread_rwlock_rdlock(&ztest_name_lock);
                err = ztest_dsl_prop_set_uint64(zd->zd_name,
                    ZFS_PROP_CHECKSUM, spa_dedup_checksum(ztest_spa),
                    B_FALSE);
@@ -2499,7 +2586,7 @@ ztest_io(ztest_ds_t *zd, uint64_t object, uint64_t offset)
                    ztest_random_dsl_prop(ZFS_PROP_COMPRESSION),
                    B_FALSE);
                VERIFY(err == 0 || err == ENOSPC);
-               (void) rw_unlock(&ztest_name_lock);
+               (void) pthread_rwlock_unlock(&ztest_name_lock);
 
                VERIFY0(dmu_read(zd->zd_os, object, offset, blocksize, data,
                    DMU_READ_NO_PREFETCH));
@@ -2508,7 +2595,7 @@ ztest_io(ztest_ds_t *zd, uint64_t object, uint64_t offset)
                break;
        }
 
-       (void) rw_unlock(&zd->zd_zilog_lock);
+       (void) pthread_rwlock_unlock(&zd->zd_zilog_lock);
 
        umem_free(data, blocksize);
 }
@@ -2566,7 +2653,7 @@ ztest_zil_commit(ztest_ds_t *zd, uint64_t id)
 {
        zilog_t *zilog = zd->zd_zilog;
 
-       (void) rw_rdlock(&zd->zd_zilog_lock);
+       (void) pthread_rwlock_rdlock(&zd->zd_zilog_lock);
 
        zil_commit(zilog, ztest_random(ZTEST_OBJECTS));
 
@@ -2581,7 +2668,7 @@ ztest_zil_commit(ztest_ds_t *zd, uint64_t id)
        zd->zd_shared->zd_seq = zilog->zl_commit_lr_seq;
        mutex_exit(&zilog->zl_lock);
 
-       (void) rw_unlock(&zd->zd_zilog_lock);
+       (void) pthread_rwlock_unlock(&zd->zd_zilog_lock);
 }
 
 /*
@@ -2601,7 +2688,7 @@ ztest_zil_remount(ztest_ds_t *zd, uint64_t id)
         * zd_zilog_lock to block any I/O.
         */
        mutex_enter(&zd->zd_dirobj_lock);
-       (void) rw_wrlock(&zd->zd_zilog_lock);
+       (void) pthread_rwlock_wrlock(&zd->zd_zilog_lock);
 
        /* zfsvfs_teardown() */
        zil_close(zd->zd_zilog);
@@ -2610,7 +2697,7 @@ ztest_zil_remount(ztest_ds_t *zd, uint64_t id)
        VERIFY(zil_open(os, ztest_get_data) == zd->zd_zilog);
        zil_replay(os, zd, ztest_replay_vector);
 
-       (void) rw_unlock(&zd->zd_zilog_lock);
+       (void) pthread_rwlock_unlock(&zd->zd_zilog_lock);
        mutex_exit(&zd->zd_dirobj_lock);
 }
 
@@ -2634,7 +2721,7 @@ ztest_spa_create_destroy(ztest_ds_t *zd, uint64_t id)
         */
        nvroot = make_vdev_root("/dev/bogus", NULL, NULL, 0, 0, 0, 0, 0, 1);
        VERIFY3U(ENOENT, ==,
-           spa_create("ztest_bad_file", nvroot, NULL, NULL));
+           spa_create("ztest_bad_file", nvroot, NULL, NULL, NULL));
        nvlist_free(nvroot);
 
        /*
@@ -2642,22 +2729,64 @@ ztest_spa_create_destroy(ztest_ds_t *zd, uint64_t id)
         */
        nvroot = make_vdev_root("/dev/bogus", NULL, NULL, 0, 0, 0, 0, 2, 1);
        VERIFY3U(ENOENT, ==,
-           spa_create("ztest_bad_mirror", nvroot, NULL, NULL));
+           spa_create("ztest_bad_mirror", nvroot, NULL, NULL, NULL));
        nvlist_free(nvroot);
 
        /*
         * Attempt to create an existing pool.  It shouldn't matter
         * what's in the nvroot; we should fail with EEXIST.
         */
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
        nvroot = make_vdev_root("/dev/bogus", NULL, NULL, 0, 0, 0, 0, 0, 1);
-       VERIFY3U(EEXIST, ==, spa_create(zo->zo_pool, nvroot, NULL, NULL));
+       VERIFY3U(EEXIST, ==,
+           spa_create(zo->zo_pool, nvroot, NULL, NULL, NULL));
        nvlist_free(nvroot);
        VERIFY3U(0, ==, spa_open(zo->zo_pool, &spa, FTAG));
        VERIFY3U(EBUSY, ==, spa_destroy(zo->zo_pool));
        spa_close(spa, FTAG);
 
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
+}
+
+/*
+ * Start and then stop the MMP threads to ensure the startup and shutdown code
+ * works properly.  Actual protection and property-related code tested via ZTS.
+ */
+/* ARGSUSED */
+void
+ztest_mmp_enable_disable(ztest_ds_t *zd, uint64_t id)
+{
+       ztest_shared_opts_t *zo = &ztest_opts;
+       spa_t *spa = ztest_spa;
+
+       if (zo->zo_mmp_test)
+               return;
+
+       spa_config_enter(spa, SCL_CONFIG, FTAG, RW_READER);
+       mutex_enter(&spa->spa_props_lock);
+
+       if (!spa_multihost(spa)) {
+               spa->spa_multihost = B_TRUE;
+               mmp_thread_start(spa);
+       }
+
+       mutex_exit(&spa->spa_props_lock);
+       spa_config_exit(spa, SCL_CONFIG, FTAG);
+
+       txg_wait_synced(spa_get_dsl(spa), 0);
+       mmp_signal_all_threads();
+       txg_wait_synced(spa_get_dsl(spa), 0);
+
+       spa_config_enter(spa, SCL_CONFIG, FTAG, RW_READER);
+       mutex_enter(&spa->spa_props_lock);
+
+       if (spa_multihost(spa)) {
+               mmp_thread_stop(spa);
+               spa->spa_multihost = B_FALSE;
+       }
+
+       mutex_exit(&spa->spa_props_lock);
+       spa_config_exit(spa, SCL_CONFIG, FTAG);
 }
 
 /* ARGSUSED */
@@ -2712,7 +2841,7 @@ ztest_spa_upgrade(ztest_ds_t *zd, uint64_t id)
        props = fnvlist_alloc();
        fnvlist_add_uint64(props,
            zpool_prop_to_name(ZPOOL_PROP_VERSION), version);
-       VERIFY3S(spa_create(name, nvroot, props, NULL), ==, 0);
+       VERIFY3S(spa_create(name, nvroot, props, NULL, NULL), ==, 0);
        fnvlist_free(nvroot);
        fnvlist_free(props);
 
@@ -2815,9 +2944,9 @@ ztest_vdev_add_remove(ztest_ds_t *zd, uint64_t id)
                 * dsl_destroy_head() to fail with EBUSY thus
                 * leaving the dataset in an inconsistent state.
                 */
-               rw_wrlock(&ztest_name_lock);
+               pthread_rwlock_wrlock(&ztest_name_lock);
                error = spa_vdev_remove(spa, guid, B_FALSE);
-               rw_unlock(&ztest_name_lock);
+               pthread_rwlock_unlock(&ztest_name_lock);
 
                if (error && error != EEXIST)
                        fatal(0, "spa_vdev_remove() = %d", error);
@@ -3014,9 +3143,9 @@ ztest_split_pool(ztest_ds_t *zd, uint64_t id)
 
        spa_config_exit(spa, SCL_VDEV, FTAG);
 
-       (void) rw_wrlock(&ztest_name_lock);
+       (void) pthread_rwlock_wrlock(&ztest_name_lock);
        error = spa_vdev_split_mirror(spa, "splitp", config, NULL, B_FALSE);
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 
        nvlist_free(config);
 
@@ -3067,7 +3196,19 @@ ztest_vdev_attach_detach(ztest_ds_t *zd, uint64_t id)
        mutex_enter(&ztest_vdev_lock);
        leaves = MAX(zs->zs_mirrors, 1) * ztest_opts.zo_raidz;
 
-       spa_config_enter(spa, SCL_VDEV, FTAG, RW_READER);
+       spa_config_enter(spa, SCL_ALL, FTAG, RW_WRITER);
+
+       /*
+        * If a vdev is in the process of being removed, its removal may
+        * finish while we are in progress, leading to an unexpected error
+        * value.  Don't bother trying to attach while we are in the middle
+        * of removal.
+        */
+       if (ztest_device_removal_active) {
+               spa_config_exit(spa, SCL_ALL, FTAG);
+               mutex_exit(&ztest_vdev_lock);
+               return;
+       }
 
        /*
         * Decide whether to do an attach or a replace.
@@ -3120,7 +3261,7 @@ ztest_vdev_attach_detach(ztest_ds_t *zd, uint64_t id)
         * If oldvd has siblings, then half of the time, detach it.
         */
        if (oldvd_has_siblings && ztest_random(2) == 0) {
-               spa_config_exit(spa, SCL_VDEV, FTAG);
+               spa_config_exit(spa, SCL_ALL, FTAG);
                error = spa_vdev_detach(spa, oldguid, pguid, B_FALSE);
                if (error != 0 && error != ENODEV && error != EBUSY &&
                    error != ENOTSUP)
@@ -3146,6 +3287,10 @@ ztest_vdev_attach_detach(ztest_ds_t *zd, uint64_t id)
        }
 
        if (newvd) {
+               /*
+                * Reopen to ensure the vdev's asize field isn't stale.
+                */
+               vdev_reopen(newvd);
                newsize = vdev_get_min_asize(newvd);
        } else {
                /*
@@ -3183,7 +3328,7 @@ ztest_vdev_attach_detach(ztest_ds_t *zd, uint64_t id)
        else
                expected_error = 0;
 
-       spa_config_exit(spa, SCL_VDEV, FTAG);
+       spa_config_exit(spa, SCL_ALL, FTAG);
 
        /*
         * Build the nvlist describing newpath.
@@ -3224,6 +3369,59 @@ out:
        umem_free(newpath, MAXPATHLEN);
 }
 
+/* ARGSUSED */
+void
+ztest_device_removal(ztest_ds_t *zd, uint64_t id)
+{
+       spa_t *spa = ztest_spa;
+       vdev_t *vd;
+       uint64_t guid;
+       int error;
+
+       mutex_enter(&ztest_vdev_lock);
+
+       if (ztest_device_removal_active) {
+               mutex_exit(&ztest_vdev_lock);
+               return;
+       }
+
+       /*
+        * Remove a random top-level vdev and wait for removal to finish.
+        */
+       spa_config_enter(spa, SCL_VDEV, FTAG, RW_READER);
+       vd = vdev_lookup_top(spa, ztest_random_vdev_top(spa, B_FALSE));
+       guid = vd->vdev_guid;
+       spa_config_exit(spa, SCL_VDEV, FTAG);
+
+       error = spa_vdev_remove(spa, guid, B_FALSE);
+       if (error == 0) {
+               ztest_device_removal_active = B_TRUE;
+               mutex_exit(&ztest_vdev_lock);
+
+               while (spa->spa_vdev_removal != NULL)
+                       txg_wait_synced(spa_get_dsl(spa), 0);
+       } else {
+               mutex_exit(&ztest_vdev_lock);
+               return;
+       }
+
+       /*
+        * The pool needs to be scrubbed after completing device removal.
+        * Failure to do so may result in checksum errors due to the
+        * strategy employed by ztest_fault_inject() when selecting which
+        * offset are redundant and can be damaged.
+        */
+       error = spa_scan(spa, POOL_SCAN_SCRUB);
+       if (error == 0) {
+               while (dsl_scan_scrubbing(spa_get_dsl(spa)))
+                       txg_wait_synced(spa_get_dsl(spa), 0);
+       }
+
+       mutex_enter(&ztest_vdev_lock);
+       ztest_device_removal_active = B_FALSE;
+       mutex_exit(&ztest_vdev_lock);
+}
+
 /*
  * Callback function which expands the physical size of the vdev.
  */
@@ -3354,6 +3552,18 @@ ztest_vdev_LUN_growth(ztest_ds_t *zd, uint64_t id)
        mutex_enter(&ztest_vdev_lock);
        spa_config_enter(spa, SCL_STATE, spa, RW_READER);
 
+       /*
+        * If there is a vdev removal in progress, it could complete while
+        * we are running, in which case we would not be able to verify
+        * that the metaslab_class space increased (because it decreases
+        * when the device removal completes).
+        */
+       if (ztest_device_removal_active) {
+               spa_config_exit(spa, SCL_STATE, FTAG);
+               mutex_exit(&ztest_vdev_lock);
+               return;
+       }
+
        top = ztest_random_vdev_top(spa, B_TRUE);
 
        tvd = spa->spa_root_vdev->vdev_child[top];
@@ -3445,22 +3655,24 @@ ztest_vdev_LUN_growth(ztest_ds_t *zd, uint64_t id)
        /*
         * Make sure we were able to grow the vdev.
         */
-       if (new_ms_count <= old_ms_count)
-               fatal(0, "LUN expansion failed: ms_count %llu <= %llu\n",
+       if (new_ms_count <= old_ms_count) {
+               fatal(0, "LUN expansion failed: ms_count %llu < %llu\n",
                    old_ms_count, new_ms_count);
+       }
 
        /*
         * Make sure we were able to grow the pool.
         */
-       if (new_class_space <= old_class_space)
-               fatal(0, "LUN expansion failed: class_space %llu <= %llu\n",
+       if (new_class_space <= old_class_space) {
+               fatal(0, "LUN expansion failed: class_space %llu < %llu\n",
                    old_class_space, new_class_space);
+       }
 
        if (ztest_opts.zo_verbose >= 5) {
-               char oldnumbuf[6], newnumbuf[6];
+               char oldnumbuf[NN_NUMBUF_SZ], newnumbuf[NN_NUMBUF_SZ];
 
-               nicenum(old_class_space, oldnumbuf);
-               nicenum(new_class_space, newnumbuf);
+               nicenum(old_class_space, oldnumbuf, sizeof (oldnumbuf));
+               nicenum(new_class_space, newnumbuf, sizeof (newnumbuf));
                (void) printf("%s grew from %s to %s\n",
                    spa->spa_name, oldnumbuf, newnumbuf);
        }
@@ -3486,11 +3698,57 @@ ztest_objset_create_cb(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx)
 static int
 ztest_dataset_create(char *dsname)
 {
-       uint64_t zilset = ztest_random(100);
-       int err = dmu_objset_create(dsname, DMU_OST_OTHER, 0,
+       int err;
+       uint64_t rand;
+       dsl_crypto_params_t *dcp = NULL;
+
+       /*
+        * 50% of the time, we create encrypted datasets
+        * using a random cipher suite and a hard-coded
+        * wrapping key.
+        */
+       rand = ztest_random(2);
+       if (rand != 0) {
+               nvlist_t *crypto_args = fnvlist_alloc();
+               nvlist_t *props = fnvlist_alloc();
+
+               /* slight bias towards the default cipher suite */
+               rand = ztest_random(ZIO_CRYPT_FUNCTIONS);
+               if (rand < ZIO_CRYPT_AES_128_CCM)
+                       rand = ZIO_CRYPT_ON;
+
+               fnvlist_add_uint64(props,
+                   zfs_prop_to_name(ZFS_PROP_ENCRYPTION), rand);
+               fnvlist_add_uint8_array(crypto_args, "wkeydata",
+                   (uint8_t *)ztest_wkeydata, WRAPPING_KEY_LEN);
+
+               /*
+                * These parameters aren't really used by the kernel. They
+                * are simply stored so that userspace knows how to load
+                * the wrapping key.
+                */
+               fnvlist_add_uint64(props,
+                   zfs_prop_to_name(ZFS_PROP_KEYFORMAT), ZFS_KEYFORMAT_RAW);
+               fnvlist_add_string(props,
+                   zfs_prop_to_name(ZFS_PROP_KEYLOCATION), "prompt");
+               fnvlist_add_uint64(props,
+                   zfs_prop_to_name(ZFS_PROP_PBKDF2_SALT), 0ULL);
+               fnvlist_add_uint64(props,
+                   zfs_prop_to_name(ZFS_PROP_PBKDF2_ITERS), 0ULL);
+
+               VERIFY0(dsl_crypto_params_create_nvlist(DCP_CMD_NONE, props,
+                   crypto_args, &dcp));
+
+               fnvlist_free(crypto_args);
+               fnvlist_free(props);
+       }
+
+       err = dmu_objset_create(dsname, DMU_OST_OTHER, 0, dcp,
            ztest_objset_create_cb, NULL);
+       dsl_crypto_params_free(dcp, !!err);
 
-       if (err || zilset < 80)
+       rand = ztest_random(100);
+       if (err || rand < 80)
                return (err);
 
        if (ztest_opts.zo_verbose >= 5)
@@ -3510,7 +3768,8 @@ ztest_objset_destroy_cb(const char *name, void *arg)
        /*
         * Verify that the dataset contains a directory object.
         */
-       VERIFY0(dmu_objset_own(name, DMU_OST_OTHER, B_TRUE, FTAG, &os));
+       VERIFY0(ztest_dmu_objset_own(name, DMU_OST_OTHER, B_TRUE,
+           B_TRUE, FTAG, &os));
        error = dmu_object_info(os, ZTEST_DIROBJ, &doi);
        if (error != ENOENT) {
                /* We could have crashed in the middle of destroying it */
@@ -3518,7 +3777,7 @@ ztest_objset_destroy_cb(const char *name, void *arg)
                ASSERT3U(doi.doi_type, ==, DMU_OT_ZAP_OTHER);
                ASSERT3S(doi.doi_physical_blocks_512, >=, 0);
        }
-       dmu_objset_disown(os, FTAG);
+       dmu_objset_disown(os, B_TRUE, FTAG);
 
        /*
         * Destroy the dataset.
@@ -3583,7 +3842,7 @@ ztest_dmu_objset_create_destroy(ztest_ds_t *zd, uint64_t id)
 
        zdtmp = umem_alloc(sizeof (ztest_ds_t), UMEM_NOFAIL);
 
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
 
        (void) snprintf(name, sizeof (name), "%s/temp_%llu",
            ztest_opts.zo_pool, (u_longlong_t)id);
@@ -3594,11 +3853,13 @@ ztest_dmu_objset_create_destroy(ztest_ds_t *zd, uint64_t id)
         * (invoked from ztest_objset_destroy_cb()) should just throw it away.
         */
        if (ztest_random(2) == 0 &&
-           dmu_objset_own(name, DMU_OST_OTHER, B_FALSE, FTAG, &os) == 0) {
+           ztest_dmu_objset_own(name, DMU_OST_OTHER, B_FALSE,
+           B_TRUE, FTAG, &os) == 0) {
                ztest_zd_init(zdtmp, NULL, os);
                zil_replay(os, zdtmp, ztest_replay_vector);
                ztest_zd_fini(zdtmp);
-               dmu_objset_disown(os, FTAG);
+               txg_wait_synced(dmu_objset_pool(os), 0);
+               dmu_objset_disown(os, B_TRUE, FTAG);
        }
 
        /*
@@ -3612,8 +3873,8 @@ ztest_dmu_objset_create_destroy(ztest_ds_t *zd, uint64_t id)
        /*
         * Verify that the destroyed dataset is no longer in the namespace.
         */
-       VERIFY3U(ENOENT, ==, dmu_objset_own(name, DMU_OST_OTHER, B_TRUE,
-           FTAG, &os));
+       VERIFY3U(ENOENT, ==, ztest_dmu_objset_own(name, DMU_OST_OTHER, B_TRUE,
+           B_TRUE, FTAG, &os));
 
        /*
         * Verify that we can create a new dataset.
@@ -3627,7 +3888,8 @@ ztest_dmu_objset_create_destroy(ztest_ds_t *zd, uint64_t id)
                fatal(0, "dmu_objset_create(%s) = %d", name, error);
        }
 
-       VERIFY0(dmu_objset_own(name, DMU_OST_OTHER, B_FALSE, FTAG, &os));
+       VERIFY0(ztest_dmu_objset_own(name, DMU_OST_OTHER, B_FALSE, B_TRUE,
+           FTAG, &os));
 
        ztest_zd_init(zdtmp, NULL, os);
 
@@ -3651,7 +3913,7 @@ ztest_dmu_objset_create_destroy(ztest_ds_t *zd, uint64_t id)
         * Verify that we cannot create an existing dataset.
         */
        VERIFY3U(EEXIST, ==,
-           dmu_objset_create(name, DMU_OST_OTHER, 0, NULL, NULL));
+           dmu_objset_create(name, DMU_OST_OTHER, 0, NULL, NULL, NULL));
 
        /*
         * Verify that we can hold an objset that is also owned.
@@ -3662,14 +3924,15 @@ ztest_dmu_objset_create_destroy(ztest_ds_t *zd, uint64_t id)
        /*
         * Verify that we cannot own an objset that is already owned.
         */
-       VERIFY3U(EBUSY, ==,
-           dmu_objset_own(name, DMU_OST_OTHER, B_FALSE, FTAG, &os2));
+       VERIFY3U(EBUSY, ==, ztest_dmu_objset_own(name, DMU_OST_OTHER,
+           B_FALSE, B_TRUE, FTAG, &os2));
 
        zil_close(zilog);
-       dmu_objset_disown(os, FTAG);
+       txg_wait_synced(spa_get_dsl(os->os_spa), 0);
+       dmu_objset_disown(os, B_TRUE, FTAG);
        ztest_zd_fini(zdtmp);
 out:
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 
        umem_free(zdtmp, sizeof (ztest_ds_t));
 }
@@ -3680,10 +3943,10 @@ out:
 void
 ztest_dmu_snapshot_create_destroy(ztest_ds_t *zd, uint64_t id)
 {
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
        (void) ztest_snapshot_destroy(zd->zd_name, id);
        (void) ztest_snapshot_create(zd->zd_name, id);
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 }
 
 /*
@@ -3760,7 +4023,7 @@ ztest_dsl_dataset_promote_busy(ztest_ds_t *zd, uint64_t id)
        clone2name = umem_alloc(ZFS_MAX_DATASET_NAME_LEN, UMEM_NOFAIL);
        snap3name  = umem_alloc(ZFS_MAX_DATASET_NAME_LEN, UMEM_NOFAIL);
 
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
 
        ztest_dsl_dataset_cleanup(osname, id);
 
@@ -3820,24 +4083,25 @@ ztest_dsl_dataset_promote_busy(ztest_ds_t *zd, uint64_t id)
                fatal(0, "dmu_objset_create(%s) = %d", clone2name, error);
        }
 
-       error = dmu_objset_own(snap2name, DMU_OST_ANY, B_TRUE, FTAG, &os);
+       error = ztest_dmu_objset_own(snap2name, DMU_OST_ANY, B_TRUE, B_TRUE,
+           FTAG, &os);
        if (error)
                fatal(0, "dmu_objset_own(%s) = %d", snap2name, error);
        error = dsl_dataset_promote(clone2name, NULL);
        if (error == ENOSPC) {
-               dmu_objset_disown(os, FTAG);
+               dmu_objset_disown(os, B_TRUE, FTAG);
                ztest_record_enospc(FTAG);
                goto out;
        }
        if (error != EBUSY)
                fatal(0, "dsl_dataset_promote(%s), %d, not EBUSY", clone2name,
                    error);
-       dmu_objset_disown(os, FTAG);
+       dmu_objset_disown(os, B_TRUE, FTAG);
 
 out:
        ztest_dsl_dataset_cleanup(osname, id);
 
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 
        umem_free(snap1name, ZFS_MAX_DATASET_NAME_LEN);
        umem_free(clone1name, ZFS_MAX_DATASET_NAME_LEN);
@@ -3882,6 +4146,26 @@ ztest_dmu_object_alloc_free(ztest_ds_t *zd, uint64_t id)
        umem_free(od, size);
 }
 
+/*
+ * Rewind the global allocator to verify object allocation backfilling.
+ */
+void
+ztest_dmu_object_next_chunk(ztest_ds_t *zd, uint64_t id)
+{
+       objset_t *os = zd->zd_os;
+       int dnodes_per_chunk = 1 << dmu_object_alloc_chunk_shift;
+       uint64_t object;
+
+       /*
+        * Rewind the global allocator randomly back to a lower object number
+        * to force backfilling and reclamation of recently freed dnodes.
+        */
+       mutex_enter(&os->os_obj_lock);
+       object = ztest_random(os->os_obj_next_chunk);
+       os->os_obj_next_chunk = P2ALIGN(object, dnodes_per_chunk);
+       mutex_exit(&os->os_obj_lock);
+}
+
 #undef OD_ARRAY_SIZE
 #define        OD_ARRAY_SIZE   2
 
@@ -4211,7 +4495,7 @@ ztest_dmu_read_write_zcopy(ztest_ds_t *zd, uint64_t id)
         *      bigobj, at the tail of the nth chunk
         *
         * The chunk size is set equal to bigobj block size so that
-        * dmu_assign_arcbuf() can be tested for object updates.
+        * dmu_assign_arcbuf_by_dbuf() can be tested for object updates.
         */
 
        /*
@@ -4273,7 +4557,7 @@ ztest_dmu_read_write_zcopy(ztest_ds_t *zd, uint64_t id)
                /*
                 * In iteration 5 (i == 5) use arcbufs
                 * that don't match bigobj blksz to test
-                * dmu_assign_arcbuf() when it can't directly
+                * dmu_assign_arcbuf_by_dbuf() when it can't directly
                 * assign an arcbuf to a dbuf.
                 */
                for (j = 0; j < s; j++) {
@@ -4319,8 +4603,8 @@ ztest_dmu_read_write_zcopy(ztest_ds_t *zd, uint64_t id)
 
                /*
                 * 50% of the time don't read objects in the 1st iteration to
-                * test dmu_assign_arcbuf() for the case when there're no
-                * existing dbufs for the specified offsets.
+                * test dmu_assign_arcbuf_by_dbuf() for the case when there are
+                * no existing dbufs for the specified offsets.
                 */
                if (i != 0 || ztest_random(2) != 0) {
                        error = dmu_read(os, packobj, packoff,
@@ -4365,12 +4649,12 @@ ztest_dmu_read_write_zcopy(ztest_ds_t *zd, uint64_t id)
                                    FTAG, &dbt, DMU_READ_NO_PREFETCH) == 0);
                        }
                        if (i != 5 || chunksize < (SPA_MINBLOCKSIZE * 2)) {
-                               dmu_assign_arcbuf(bonus_db, off,
+                               dmu_assign_arcbuf_by_dbuf(bonus_db, off,
                                    bigbuf_arcbufs[j], tx);
                        } else {
-                               dmu_assign_arcbuf(bonus_db, off,
+                               dmu_assign_arcbuf_by_dbuf(bonus_db, off,
                                    bigbuf_arcbufs[2 * j], tx);
-                               dmu_assign_arcbuf(bonus_db,
+                               dmu_assign_arcbuf_by_dbuf(bonus_db,
                                    off + chunksize / 2,
                                    bigbuf_arcbufs[2 * j + 1], tx);
                        }
@@ -5019,8 +5303,11 @@ ztest_verify_dnode_bt(ztest_ds_t *zd, uint64_t id)
                dmu_object_info_t doi;
                dmu_buf_t *db;
 
-               if (dmu_bonus_hold(os, obj, FTAG, &db) != 0)
+               ztest_object_lock(zd, obj, RL_READER);
+               if (dmu_bonus_hold(os, obj, FTAG, &db) != 0) {
+                       ztest_object_unlock(zd, obj);
                        continue;
+               }
 
                dmu_object_info_from_db(db, &doi);
                if (doi.doi_bonus_size >= sizeof (*bt))
@@ -5034,6 +5321,7 @@ ztest_verify_dnode_bt(ztest_ds_t *zd, uint64_t id)
                }
 
                dmu_buf_rele(db, FTAG);
+               ztest_object_unlock(zd, obj);
        }
 }
 
@@ -5049,7 +5337,7 @@ ztest_dsl_prop_get_set(ztest_ds_t *zd, uint64_t id)
        };
        int p;
 
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
 
        for (p = 0; p < sizeof (proplist) / sizeof (proplist[0]); p++)
                (void) ztest_dsl_prop_set_uint64(zd->zd_name, proplist[p],
@@ -5058,7 +5346,21 @@ ztest_dsl_prop_get_set(ztest_ds_t *zd, uint64_t id)
        VERIFY0(ztest_dsl_prop_set_uint64(zd->zd_name, ZFS_PROP_RECORDSIZE,
            ztest_random_blocksize(), (int)ztest_random(2)));
 
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
+}
+
+/* ARGSUSED */
+void
+ztest_remap_blocks(ztest_ds_t *zd, uint64_t id)
+{
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
+
+       int error = dmu_objset_remap_indirects(zd->zd_name);
+       if (error == ENOSPC)
+               error = 0;
+       ASSERT0(error);
+
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 }
 
 /* ARGSUSED */
@@ -5067,7 +5369,7 @@ ztest_spa_prop_get_set(ztest_ds_t *zd, uint64_t id)
 {
        nvlist_t *props = NULL;
 
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
 
        (void) ztest_spa_prop_set_uint64(ZPOOL_PROP_DEDUPDITTO,
            ZIO_DEDUPDITTO_MIN + ztest_random(ZIO_DEDUPDITTO_MIN));
@@ -5079,7 +5381,7 @@ ztest_spa_prop_get_set(ztest_ds_t *zd, uint64_t id)
 
        nvlist_free(props);
 
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 }
 
 static int
@@ -5114,7 +5416,7 @@ ztest_dmu_snapshot_hold(ztest_ds_t *zd, uint64_t id)
        char osname[ZFS_MAX_DATASET_NAME_LEN];
        nvlist_t *holds;
 
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
 
        dmu_objset_name(os, osname);
 
@@ -5220,7 +5522,7 @@ ztest_dmu_snapshot_hold(ztest_ds_t *zd, uint64_t id)
        VERIFY3U(dmu_objset_hold(fullname, FTAG, &origin), ==, ENOENT);
 
 out:
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 }
 
 /*
@@ -5252,7 +5554,19 @@ ztest_fault_inject(ztest_ds_t *zd, uint64_t id)
        pathrand = umem_alloc(MAXPATHLEN, UMEM_NOFAIL);
 
        mutex_enter(&ztest_vdev_lock);
-       maxfaults = MAXFAULTS();
+
+       /*
+        * Device removal is in progress, fault injection must be disabled
+        * until it completes and the pool is scrubbed.  The fault injection
+        * strategy for damaging blocks does not take in to account evacuated
+        * blocks which may have already been damaged.
+        */
+       if (ztest_device_removal_active) {
+               mutex_exit(&ztest_vdev_lock);
+               goto out;
+       }
+
+       maxfaults = MAXFAULTS(zs);
        leaves = MAX(zs->zs_mirrors, 1) * ztest_opts.zo_raidz;
        mirror_save = zs->zs_mirrors;
        mutex_exit(&ztest_vdev_lock);
@@ -5265,7 +5579,7 @@ ztest_fault_inject(ztest_ds_t *zd, uint64_t id)
         * they are in progress (i.e. spa_change_guid). Those
         * operations will have grabbed the name lock as writer.
         */
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
 
        /*
         * We need SCL_STATE here because we're going to look at vd0->vdev_tsd.
@@ -5316,6 +5630,9 @@ ztest_fault_inject(ztest_ds_t *zd, uint64_t id)
                         */
                        vdev_file_t *vf = vd0->vdev_tsd;
 
+                       zfs_dbgmsg("injecting fault to vdev %llu; maxfaults=%d",
+                           (long long)vd0->vdev_id, (int)maxfaults);
+
                        if (vf != NULL && ztest_random(3) == 0) {
                                (void) close(vf->vf_vnode->v_fd);
                                vf->vf_vnode->v_fd = -1;
@@ -5334,7 +5651,7 @@ ztest_fault_inject(ztest_ds_t *zd, uint64_t id)
 
                if (sav->sav_count == 0) {
                        spa_config_exit(spa, SCL_STATE, FTAG);
-                       (void) rw_unlock(&ztest_name_lock);
+                       (void) pthread_rwlock_unlock(&ztest_name_lock);
                        goto out;
                }
                vd0 = sav->sav_vdevs[ztest_random(sav->sav_count)];
@@ -5348,7 +5665,7 @@ ztest_fault_inject(ztest_ds_t *zd, uint64_t id)
        }
 
        spa_config_exit(spa, SCL_STATE, FTAG);
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 
        /*
         * If we can tolerate two or more faults, or we're dealing
@@ -5368,12 +5685,12 @@ ztest_fault_inject(ztest_ds_t *zd, uint64_t id)
                         * leaving the dataset in an inconsistent state.
                         */
                        if (islog)
-                               (void) rw_wrlock(&ztest_name_lock);
+                               (void) pthread_rwlock_wrlock(&ztest_name_lock);
 
                        VERIFY(vdev_offline(spa, guid0, flags) != EBUSY);
 
                        if (islog)
-                               (void) rw_unlock(&ztest_name_lock);
+                               (void) pthread_rwlock_unlock(&ztest_name_lock);
                } else {
                        /*
                         * Ideally we would like to be able to randomly
@@ -5516,13 +5833,13 @@ ztest_ddt_repair(ztest_ds_t *zd, uint64_t id)
         * Take the name lock as writer to prevent anyone else from changing
         * the pool and dataset properies we need to maintain during this test.
         */
-       (void) rw_wrlock(&ztest_name_lock);
+       (void) pthread_rwlock_wrlock(&ztest_name_lock);
 
        if (ztest_dsl_prop_set_uint64(zd->zd_name, ZFS_PROP_DEDUP, checksum,
            B_FALSE) != 0 ||
            ztest_dsl_prop_set_uint64(zd->zd_name, ZFS_PROP_COPIES, 1,
            B_FALSE) != 0) {
-               (void) rw_unlock(&ztest_name_lock);
+               (void) pthread_rwlock_unlock(&ztest_name_lock);
                umem_free(od, sizeof (ztest_od_t));
                return;
        }
@@ -5542,7 +5859,7 @@ ztest_ddt_repair(ztest_ds_t *zd, uint64_t id)
        dmu_tx_hold_write(tx, object, 0, copies * blocksize);
        txg = ztest_tx_assign(tx, TXG_WAIT, FTAG);
        if (txg == 0) {
-               (void) rw_unlock(&ztest_name_lock);
+               (void) pthread_rwlock_unlock(&ztest_name_lock);
                umem_free(od, sizeof (ztest_od_t));
                return;
        }
@@ -5591,7 +5908,7 @@ ztest_ddt_repair(ztest_ds_t *zd, uint64_t id)
 
        abd_free(abd);
 
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
        umem_free(od, sizeof (ztest_od_t));
 }
 
@@ -5604,6 +5921,12 @@ ztest_scrub(ztest_ds_t *zd, uint64_t id)
 {
        spa_t *spa = ztest_spa;
 
+       /*
+        * Scrub in progress by device removal.
+        */
+       if (ztest_device_removal_active)
+               return;
+
        (void) spa_scan(spa, POOL_SCAN_SCRUB);
        (void) poll(NULL, 0, 100); /* wait a moment, then force a restart */
        (void) spa_scan(spa, POOL_SCAN_SCRUB);
@@ -5620,12 +5943,15 @@ ztest_reguid(ztest_ds_t *zd, uint64_t id)
        uint64_t orig, load;
        int error;
 
+       if (ztest_opts.zo_mmp_test)
+               return;
+
        orig = spa_guid(spa);
        load = spa_load_guid(spa);
 
-       (void) rw_wrlock(&ztest_name_lock);
+       (void) pthread_rwlock_wrlock(&ztest_name_lock);
        error = spa_change_guid(spa);
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 
        if (error != 0)
                return;
@@ -5652,7 +5978,7 @@ ztest_spa_rename(ztest_ds_t *zd, uint64_t id)
        if (ztest_opts.zo_mmp_test)
                return;
 
-       (void) rw_wrlock(&ztest_name_lock);
+       (void) pthread_rwlock_wrlock(&ztest_name_lock);
 
        oldname = ztest_opts.zo_pool;
        newname = umem_alloc(strlen(oldname) + 5, UMEM_NOFAIL);
@@ -5692,7 +6018,7 @@ ztest_spa_rename(ztest_ds_t *zd, uint64_t id)
 
        umem_free(newname, strlen(newname) + 1);
 
-       (void) rw_unlock(&ztest_name_lock);
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 }
 
 void
@@ -5895,7 +6221,8 @@ ztest_run_zdb(char *pool)
        ztest_get_zdb_bin(bin, len);
 
        (void) sprintf(zdb,
-           "%s -bcc%s%s -G -d -U %s %s",
+           "%s -bcc%s%s -G -d -U %s "
+           "-o zfs_reconstruct_indirect_combinations_max=1000000 %s",
            bin,
            ztest_opts.zo_verbose >= 3 ? "s" : "",
            ztest_opts.zo_verbose >= 4 ? "v" : "",
@@ -6038,7 +6365,7 @@ ztest_resume(spa_t *spa)
        (void) zio_resume(spa);
 }
 
-static void *
+static void
 ztest_resume_thread(void *arg)
 {
        spa_t *spa = arg;
@@ -6062,19 +6389,50 @@ ztest_resume_thread(void *arg)
        }
 
        thread_exit();
-
-       return (NULL);
 }
 
-#define        GRACE   300
-
-#if 0
 static void
-ztest_deadman_alarm(int sig)
+ztest_deadman_thread(void *arg)
 {
-       fatal(0, "failed to complete within %d seconds of deadline", GRACE);
+       ztest_shared_t *zs = arg;
+       spa_t *spa = ztest_spa;
+       hrtime_t delta, overdue, total = 0;
+
+       for (;;) {
+               delta = zs->zs_thread_stop - zs->zs_thread_start +
+                   MSEC2NSEC(zfs_deadman_synctime_ms);
+
+               (void) poll(NULL, 0, (int)NSEC2MSEC(delta));
+
+               /*
+                * If the pool is suspended then fail immediately. Otherwise,
+                * check to see if the pool is making any progress. If
+                * vdev_deadman() discovers that there hasn't been any recent
+                * I/Os then it will end up aborting the tests.
+                */
+               if (spa_suspended(spa) || spa->spa_root_vdev == NULL) {
+                       fatal(0, "aborting test after %llu seconds because "
+                           "pool has transitioned to a suspended state.",
+                           zfs_deadman_synctime_ms / 1000);
+               }
+               vdev_deadman(spa->spa_root_vdev, FTAG);
+
+               /*
+                * If the process doesn't complete within a grace period of
+                * zfs_deadman_synctime_ms over the expected finish time,
+                * then it may be hung and is terminated.
+                */
+               overdue = zs->zs_proc_stop + MSEC2NSEC(zfs_deadman_synctime_ms);
+               total += zfs_deadman_synctime_ms / 1000;
+               if (gethrtime() > overdue) {
+                       fatal(0, "aborting test after %llu seconds because "
+                           "the process is overdue for termination.", total);
+               }
+
+               (void) printf("ztest has been running for %lld seconds\n",
+                   total);
+       }
 }
-#endif
 
 static void
 ztest_execute(int test, ztest_info_t *zi, uint64_t id)
@@ -6097,7 +6455,7 @@ ztest_execute(int test, ztest_info_t *zi, uint64_t id)
                    (double)functime / NANOSEC, zi->zi_funcname);
 }
 
-static void *
+static void
 ztest_thread(void *arg)
 {
        int rand;
@@ -6137,8 +6495,6 @@ ztest_thread(void *arg)
        }
 
        thread_exit();
-
-       return (NULL);
 }
 
 static void
@@ -6204,18 +6560,19 @@ ztest_dataset_open(int d)
 
        ztest_dataset_name(name, ztest_opts.zo_pool, d);
 
-       (void) rw_rdlock(&ztest_name_lock);
+       (void) pthread_rwlock_rdlock(&ztest_name_lock);
 
        error = ztest_dataset_create(name);
        if (error == ENOSPC) {
-               (void) rw_unlock(&ztest_name_lock);
+               (void) pthread_rwlock_unlock(&ztest_name_lock);
                ztest_record_enospc(FTAG);
                return (error);
        }
        ASSERT(error == 0 || error == EEXIST);
 
-       VERIFY0(dmu_objset_own(name, DMU_OST_OTHER, B_FALSE, zd, &os));
-       (void) rw_unlock(&ztest_name_lock);
+       VERIFY0(ztest_dmu_objset_own(name, DMU_OST_OTHER, B_FALSE,
+           B_TRUE, zd, &os));
+       (void) pthread_rwlock_unlock(&ztest_name_lock);
 
        ztest_zd_init(zd, ZTEST_GET_SHARED_DS(d), os);
 
@@ -6255,7 +6612,8 @@ ztest_dataset_close(int d)
        ztest_ds_t *zd = &ztest_ds[d];
 
        zil_close(zd->zd_zilog);
-       dmu_objset_disown(zd->zd_os, zd);
+       txg_wait_synced(spa_get_dsl(zd->zd_os->os_spa), 0);
+       dmu_objset_disown(zd->zd_os, B_TRUE, zd);
 
        ztest_zd_fini(zd);
 }
@@ -6266,10 +6624,10 @@ ztest_dataset_close(int d)
 static void
 ztest_run(ztest_shared_t *zs)
 {
-       kt_did_t *tid;
        spa_t *spa;
        objset_t *os;
        kthread_t *resume_thread;
+       kthread_t **run_threads;
        uint64_t object;
        int error;
        int t, d;
@@ -6280,7 +6638,7 @@ ztest_run(ztest_shared_t *zs)
         * Initialize parent/child shared state.
         */
        mutex_init(&ztest_vdev_lock, NULL, MUTEX_DEFAULT, NULL);
-       VERIFY(rwlock_init(&ztest_name_lock, USYNC_THREAD, NULL) == 0);
+       VERIFY0(pthread_rwlock_init(&ztest_name_lock, NULL));
 
        zs->zs_thread_start = gethrtime();
        zs->zs_thread_stop =
@@ -6302,45 +6660,33 @@ ztest_run(ztest_shared_t *zs)
         */
        kernel_init(FREAD | FWRITE);
        VERIFY0(spa_open(ztest_opts.zo_pool, &spa, FTAG));
-       spa->spa_debug = B_TRUE;
        metaslab_preload_limit = ztest_random(20) + 1;
        ztest_spa = spa;
 
        dmu_objset_stats_t dds;
-       VERIFY0(dmu_objset_own(ztest_opts.zo_pool,
-           DMU_OST_ANY, B_TRUE, FTAG, &os));
+       VERIFY0(ztest_dmu_objset_own(ztest_opts.zo_pool,
+           DMU_OST_ANY, B_TRUE, B_TRUE, FTAG, &os));
        dsl_pool_config_enter(dmu_objset_pool(os), FTAG);
        dmu_objset_fast_stat(os, &dds);
        dsl_pool_config_exit(dmu_objset_pool(os), FTAG);
        zs->zs_guid = dds.dds_guid;
-       dmu_objset_disown(os, FTAG);
+       dmu_objset_disown(os, B_TRUE, FTAG);
 
        spa->spa_dedup_ditto = 2 * ZIO_DEDUPDITTO_MIN;
 
-       /*
-        * We don't expect the pool to suspend unless maxfaults == 0,
-        * in which case ztest_fault_inject() temporarily takes away
-        * the only valid replica.
-        */
-       if (MAXFAULTS() == 0)
-               spa->spa_failmode = ZIO_FAILURE_MODE_WAIT;
-       else
-               spa->spa_failmode = ZIO_FAILURE_MODE_PANIC;
-
        /*
         * Create a thread to periodically resume suspended I/O.
         */
-       VERIFY3P((resume_thread = zk_thread_create(NULL, 0,
-           (thread_func_t)ztest_resume_thread, spa, 0, NULL, TS_RUN, 0,
-           PTHREAD_CREATE_JOINABLE)), !=, NULL);
+       resume_thread = thread_create(NULL, 0, ztest_resume_thread,
+           spa, 0, NULL, TS_RUN | TS_JOINABLE, defclsyspri);
 
-#if 0
        /*
-        * Set a deadman alarm to abort() if we hang.
+        * Create a deadman thread and set to panic if we hang.
         */
-       signal(SIGALRM, ztest_deadman_alarm);
-       alarm((zs->zs_thread_stop - zs->zs_thread_start) / NANOSEC + GRACE);
-#endif
+       (void) thread_create(NULL, 0, ztest_deadman_thread,
+           zs, 0, NULL, TS_RUN | TS_JOINABLE, defclsyspri);
+
+       spa->spa_deadman_failmode = ZIO_FAILURE_MODE_PANIC;
 
        /*
         * Verify that we can safely inquire about about any object,
@@ -6366,7 +6712,7 @@ ztest_run(ztest_shared_t *zs)
        }
        zs->zs_enospc_count = 0;
 
-       tid = umem_zalloc(ztest_opts.zo_threads * sizeof (kt_did_t),
+       run_threads = umem_zalloc(ztest_opts.zo_threads * sizeof (kthread_t *),
            UMEM_NOFAIL);
 
        if (ztest_opts.zo_verbose >= 4)
@@ -6376,20 +6722,15 @@ ztest_run(ztest_shared_t *zs)
         * Kick off all the tests that run in parallel.
         */
        for (t = 0; t < ztest_opts.zo_threads; t++) {
-               kthread_t *thread;
-
-               if (t < ztest_opts.zo_datasets &&
-                   ztest_dataset_open(t) != 0) {
-                       umem_free(tid,
-                           ztest_opts.zo_threads * sizeof (kt_did_t));
+               if (t < ztest_opts.zo_datasets && ztest_dataset_open(t) != 0) {
+                       umem_free(run_threads, ztest_opts.zo_threads *
+                           sizeof (kthread_t *));
                        return;
                }
 
-               VERIFY3P(thread = zk_thread_create(NULL, 0,
-                   (thread_func_t)ztest_thread,
-                   (void *)(uintptr_t)t, 0, NULL, TS_RUN, 0,
-                   PTHREAD_CREATE_JOINABLE), !=, NULL);
-               tid[t] = thread->t_tid;
+               run_threads[t] = thread_create(NULL, 0, ztest_thread,
+                   (void *)(uintptr_t)t, 0, NULL, TS_RUN | TS_JOINABLE,
+                   defclsyspri);
        }
 
        /*
@@ -6397,7 +6738,7 @@ ztest_run(ztest_shared_t *zs)
         * so we don't close datasets while threads are still using them.
         */
        for (t = ztest_opts.zo_threads - 1; t >= 0; t--) {
-               thread_join(tid[t]);
+               VERIFY0(thread_join(run_threads[t]));
                if (t < ztest_opts.zo_datasets)
                        ztest_dataset_close(t);
        }
@@ -6407,11 +6748,11 @@ ztest_run(ztest_shared_t *zs)
        zs->zs_alloc = metaslab_class_get_alloc(spa_normal_class(spa));
        zs->zs_space = metaslab_class_get_space(spa_normal_class(spa));
 
-       umem_free(tid, ztest_opts.zo_threads * sizeof (kt_did_t));
+       umem_free(run_threads, ztest_opts.zo_threads * sizeof (kthread_t *));
 
        /* Kill the resume thread */
        ztest_exiting = B_TRUE;
-       thread_join(resume_thread->t_tid);
+       VERIFY0(thread_join(resume_thread));
        ztest_resume(spa);
 
        /*
@@ -6454,7 +6795,7 @@ ztest_run(ztest_shared_t *zs)
 
        list_destroy(&zcl.zcl_callbacks);
        mutex_destroy(&zcl.zcl_callbacks_lock);
-       (void) rwlock_destroy(&ztest_name_lock);
+       (void) pthread_rwlock_destroy(&ztest_name_lock);
        mutex_destroy(&ztest_vdev_lock);
 }
 
@@ -6471,7 +6812,6 @@ ztest_freeze(void)
        kernel_init(FREAD | FWRITE);
        VERIFY3U(0, ==, spa_open(ztest_opts.zo_pool, &spa, FTAG));
        VERIFY3U(0, ==, ztest_dataset_open(0));
-       spa->spa_debug = B_TRUE;
        ztest_spa = spa;
 
        /*
@@ -6540,11 +6880,9 @@ ztest_freeze(void)
        VERIFY3U(0, ==, spa_open(ztest_opts.zo_pool, &spa, FTAG));
        ASSERT(spa_freeze_txg(spa) == UINT64_MAX);
        VERIFY3U(0, ==, ztest_dataset_open(0));
-       ztest_dataset_close(0);
-
-       spa->spa_debug = B_TRUE;
        ztest_spa = spa;
        txg_wait_synced(spa_get_dsl(spa), 0);
+       ztest_dataset_close(0);
        ztest_reguid(NULL, 0);
 
        spa_close(spa, FTAG);
@@ -6581,10 +6919,12 @@ make_random_props(void)
 {
        nvlist_t *props;
 
-       VERIFY(nvlist_alloc(&props, NV_UNIQUE_NAME, 0) == 0);
+       VERIFY0(nvlist_alloc(&props, NV_UNIQUE_NAME, 0));
        if (ztest_random(2) == 0)
                return (props);
-       VERIFY(nvlist_add_uint64(props, "autoreplace", 1) == 0);
+
+       VERIFY0(nvlist_add_uint64(props,
+           zpool_prop_to_name(ZPOOL_PROP_AUTOREPLACE), 1));
 
        return (props);
 }
@@ -6606,7 +6946,7 @@ ztest_import(ztest_shared_t *zs)
        int error;
 
        mutex_init(&ztest_vdev_lock, NULL, MUTEX_DEFAULT, NULL);
-       VERIFY(rwlock_init(&ztest_name_lock, USYNC_THREAD, NULL) == 0);
+       VERIFY0(pthread_rwlock_init(&ztest_name_lock, NULL));
 
        kernel_init(FREAD | FWRITE);
        hdl = libzfs_init();
@@ -6635,7 +6975,7 @@ ztest_import(ztest_shared_t *zs)
                ztest_run_zdb(ztest_opts.zo_pool);
        }
 
-       (void) rwlock_destroy(&ztest_name_lock);
+       (void) pthread_rwlock_destroy(&ztest_name_lock);
        mutex_destroy(&ztest_vdev_lock);
 }
 
@@ -6651,7 +6991,7 @@ ztest_init(ztest_shared_t *zs)
        int i;
 
        mutex_init(&ztest_vdev_lock, NULL, MUTEX_DEFAULT, NULL);
-       VERIFY(rwlock_init(&ztest_name_lock, USYNC_THREAD, NULL) == 0);
+       VERIFY0(pthread_rwlock_init(&ztest_name_lock, NULL));
 
        kernel_init(FREAD | FWRITE);
 
@@ -6665,6 +7005,16 @@ ztest_init(ztest_shared_t *zs)
        nvroot = make_vdev_root(NULL, NULL, NULL, ztest_opts.zo_vdev_size, 0,
            0, ztest_opts.zo_raidz, zs->zs_mirrors, 1);
        props = make_random_props();
+
+       /*
+        * We don't expect the pool to suspend unless maxfaults == 0,
+        * in which case ztest_fault_inject() temporarily takes away
+        * the only valid replica.
+        */
+       VERIFY0(nvlist_add_uint64(props,
+           zpool_prop_to_name(ZPOOL_PROP_FAILUREMODE),
+           MAXFAULTS(zs) ? ZIO_FAILURE_MODE_PANIC : ZIO_FAILURE_MODE_WAIT));
+
        for (i = 0; i < SPA_FEATURES; i++) {
                char *buf;
                VERIFY3S(-1, !=, asprintf(&buf, "feature@%s",
@@ -6672,7 +7022,8 @@ ztest_init(ztest_shared_t *zs)
                VERIFY3U(0, ==, nvlist_add_uint64(props, buf, 0));
                free(buf);
        }
-       VERIFY3U(0, ==, spa_create(ztest_opts.zo_pool, nvroot, props, NULL));
+
+       VERIFY0(spa_create(ztest_opts.zo_pool, nvroot, props, NULL, NULL));
        nvlist_free(nvroot);
        nvlist_free(props);
 
@@ -6689,7 +7040,7 @@ ztest_init(ztest_shared_t *zs)
                ztest_run_zdb(ztest_opts.zo_pool);
        }
 
-       (void) rwlock_destroy(&ztest_name_lock);
+       (void) pthread_rwlock_destroy(&ztest_name_lock);
        mutex_destroy(&ztest_vdev_lock);
 }
 
@@ -6884,7 +7235,7 @@ main(int argc, char **argv)
        ztest_info_t *zi;
        ztest_shared_callstate_t *zc;
        char timebuf[100];
-       char numbuf[6];
+       char numbuf[NN_NUMBUF_SZ];
        spa_t *spa;
        char *cmd;
        boolean_t hasalt;
@@ -6895,6 +7246,7 @@ main(int argc, char **argv)
        (void) setvbuf(stdout, NULL, _IOLBF, 0);
 
        dprintf_setup(&argc, argv);
+       zfs_deadman_synctime_ms = 300000;
 
        action.sa_handler = sig_handler;
        sigemptyset(&action.sa_mask);
@@ -6912,7 +7264,12 @@ main(int argc, char **argv)
                exit(EXIT_FAILURE);
        }
 
-       ztest_fd_rand = open("/dev/urandom", O_RDONLY);
+       /*
+        * Force random_get_bytes() to use /dev/urandom in order to prevent
+        * ztest from needlessly depleting the system entropy pool.
+        */
+       random_path = "/dev/urandom";
+       ztest_fd_rand = open(random_path, O_RDONLY);
        ASSERT3S(ztest_fd_rand, >=, 0);
 
        if (!fd_data_str) {
@@ -6939,7 +7296,7 @@ main(int argc, char **argv)
        zs = ztest_shared;
 
        if (fd_data_str) {
-               metaslab_gang_bang = ztest_opts.zo_metaslab_gang_bang;
+               metaslab_force_ganging = ztest_opts.zo_metaslab_force_ganging;
                metaslab_df_alloc_threshold =
                    zs->zs_metaslab_df_alloc_threshold;
 
@@ -7038,7 +7395,7 @@ main(int argc, char **argv)
 
                        now = MIN(now, zs->zs_proc_stop);
                        print_time(zs->zs_proc_stop - now, timebuf);
-                       nicenum(zs->zs_space, numbuf);
+                       nicenum(zs->zs_space, numbuf, sizeof (numbuf));
 
                        (void) printf("Pass %3d, %8s, %3llu ENOSPC, "
                            "%4.1f%% of %5s used, %3.0f%% done, %8s to go\n",