1789Sahrens /* 2789Sahrens * CDDL HEADER START 3789Sahrens * 4789Sahrens * The contents of this file are subject to the terms of the 51485Slling * Common Development and Distribution License (the "License"). 61485Slling * You may not use this file except in compliance with the License. 7789Sahrens * 8789Sahrens * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9789Sahrens * or http://www.opensolaris.org/os/licensing. 10789Sahrens * See the License for the specific language governing permissions 11789Sahrens * and limitations under the License. 12789Sahrens * 13789Sahrens * When distributing Covered Code, include this CDDL HEADER in each 14789Sahrens * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15789Sahrens * If applicable, add the following below this CDDL HEADER, with the 16789Sahrens * fields enclosed by brackets "[]" replaced with your own identifying 17789Sahrens * information: Portions Copyright [yyyy] [name of copyright owner] 18789Sahrens * 19789Sahrens * CDDL HEADER END 20789Sahrens */ 21789Sahrens /* 223444Sek110237 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 23789Sahrens * Use is subject to license terms. 24789Sahrens */ 25789Sahrens 26789Sahrens #pragma ident "%Z%%M% %I% %E% SMI" 27789Sahrens 28789Sahrens #include <sys/types.h> 29789Sahrens #include <sys/param.h> 30789Sahrens #include <sys/errno.h> 31789Sahrens #include <sys/uio.h> 32789Sahrens #include <sys/buf.h> 33789Sahrens #include <sys/modctl.h> 34789Sahrens #include <sys/open.h> 35789Sahrens #include <sys/file.h> 36789Sahrens #include <sys/kmem.h> 37789Sahrens #include <sys/conf.h> 38789Sahrens #include <sys/cmn_err.h> 39789Sahrens #include <sys/stat.h> 40789Sahrens #include <sys/zfs_ioctl.h> 41789Sahrens #include <sys/zap.h> 42789Sahrens #include <sys/spa.h> 433912Slling #include <sys/spa_impl.h> 44789Sahrens #include <sys/vdev.h> 453912Slling #include <sys/vdev_impl.h> 46789Sahrens #include <sys/dmu.h> 47789Sahrens #include <sys/dsl_dir.h> 48789Sahrens #include <sys/dsl_dataset.h> 49789Sahrens #include <sys/dsl_prop.h> 504543Smarks #include <sys/dsl_deleg.h> 514543Smarks #include <sys/dmu_objset.h> 52789Sahrens #include <sys/ddi.h> 53789Sahrens #include <sys/sunddi.h> 54789Sahrens #include <sys/sunldi.h> 55789Sahrens #include <sys/policy.h> 56789Sahrens #include <sys/zone.h> 57789Sahrens #include <sys/nvpair.h> 58789Sahrens #include <sys/pathname.h> 59789Sahrens #include <sys/mount.h> 60789Sahrens #include <sys/sdt.h> 61789Sahrens #include <sys/fs/zfs.h> 62789Sahrens #include <sys/zfs_ctldir.h> 632885Sahrens #include <sys/zvol.h> 644543Smarks #include <sharefs/share.h> 65*4577Sahrens #include <sys/zfs_znode.h> 66789Sahrens 67789Sahrens #include "zfs_namecheck.h" 682676Seschrock #include "zfs_prop.h" 694543Smarks #include "zfs_deleg.h" 70789Sahrens 71789Sahrens extern struct modlfs zfs_modlfs; 72789Sahrens 73789Sahrens extern void zfs_init(void); 74789Sahrens extern void zfs_fini(void); 75789Sahrens 76789Sahrens ldi_ident_t zfs_li = NULL; 77789Sahrens dev_info_t *zfs_dip; 78789Sahrens 79789Sahrens typedef int zfs_ioc_func_t(zfs_cmd_t *); 804543Smarks typedef int zfs_secpolicy_func_t(zfs_cmd_t *, cred_t *); 81789Sahrens 82789Sahrens typedef struct zfs_ioc_vec { 83789Sahrens zfs_ioc_func_t *zvec_func; 84789Sahrens zfs_secpolicy_func_t *zvec_secpolicy; 85789Sahrens enum { 86*4577Sahrens NO_NAME, 87*4577Sahrens POOL_NAME, 88*4577Sahrens DATASET_NAME 894543Smarks } zvec_namecheck; 904543Smarks boolean_t zvec_his_log; 91789Sahrens } zfs_ioc_vec_t; 92789Sahrens 93789Sahrens /* _NOTE(PRINTFLIKE(4)) - this is printf-like, but lint is too whiney */ 94789Sahrens void 95789Sahrens __dprintf(const char *file, const char *func, int line, const char *fmt, ...) 96789Sahrens { 97789Sahrens const char *newfile; 98789Sahrens char buf[256]; 99789Sahrens va_list adx; 100789Sahrens 101789Sahrens /* 102789Sahrens * Get rid of annoying "../common/" prefix to filename. 103789Sahrens */ 104789Sahrens newfile = strrchr(file, '/'); 105789Sahrens if (newfile != NULL) { 106789Sahrens newfile = newfile + 1; /* Get rid of leading / */ 107789Sahrens } else { 108789Sahrens newfile = file; 109789Sahrens } 110789Sahrens 111789Sahrens va_start(adx, fmt); 112789Sahrens (void) vsnprintf(buf, sizeof (buf), fmt, adx); 113789Sahrens va_end(adx); 114789Sahrens 115789Sahrens /* 116789Sahrens * To get this data, use the zfs-dprintf probe as so: 117789Sahrens * dtrace -q -n 'zfs-dprintf \ 118789Sahrens * /stringof(arg0) == "dbuf.c"/ \ 119789Sahrens * {printf("%s: %s", stringof(arg1), stringof(arg3))}' 120789Sahrens * arg0 = file name 121789Sahrens * arg1 = function name 122789Sahrens * arg2 = line number 123789Sahrens * arg3 = message 124789Sahrens */ 125789Sahrens DTRACE_PROBE4(zfs__dprintf, 126789Sahrens char *, newfile, char *, func, int, line, char *, buf); 127789Sahrens } 128789Sahrens 1294543Smarks static void 1304543Smarks zfs_log_history(zfs_cmd_t *zc) 1314543Smarks { 1324543Smarks spa_t *spa; 1334543Smarks char poolname[MAXNAMELEN]; 1344543Smarks char *buf, *cp; 1354543Smarks 1364543Smarks if (zc->zc_history == NULL) 1374543Smarks return; 1384543Smarks 139*4577Sahrens if (zc->zc_history_offset != LOG_CMD_POOL_CREATE && 140*4577Sahrens zc->zc_history_offset != LOG_CMD_NORMAL) 141*4577Sahrens return; 142*4577Sahrens 1434543Smarks buf = kmem_alloc(HIS_MAX_RECORD_LEN, KM_SLEEP); 1444543Smarks if (copyinstr((void *)(uintptr_t)zc->zc_history, 1454543Smarks buf, HIS_MAX_RECORD_LEN, NULL) != 0) { 1464543Smarks kmem_free(buf, HIS_MAX_RECORD_LEN); 1474543Smarks return; 1484543Smarks } 1494543Smarks 1504543Smarks buf[HIS_MAX_RECORD_LEN -1] = '\0'; 1514543Smarks 1524543Smarks (void) strlcpy(poolname, zc->zc_name, sizeof (poolname)); 1534543Smarks cp = strpbrk(poolname, "/@"); 1544543Smarks if (cp != NULL) 1554543Smarks *cp = '\0'; 1564543Smarks 1574543Smarks if (spa_open(poolname, &spa, FTAG) != 0) { 1584543Smarks kmem_free(buf, HIS_MAX_RECORD_LEN); 1594543Smarks return; 1604543Smarks } 1614543Smarks 162*4577Sahrens if (spa_version(spa) >= SPA_VERSION_ZPOOL_HISTORY) 1634543Smarks (void) spa_history_log(spa, buf, zc->zc_history_offset); 1644543Smarks 1654543Smarks spa_close(spa, FTAG); 1664543Smarks kmem_free(buf, HIS_MAX_RECORD_LEN); 1674543Smarks } 1684543Smarks 169789Sahrens /* 170789Sahrens * Policy for top-level read operations (list pools). Requires no privileges, 171789Sahrens * and can be used in the local zone, as there is no associated dataset. 172789Sahrens */ 173789Sahrens /* ARGSUSED */ 174789Sahrens static int 1754543Smarks zfs_secpolicy_none(zfs_cmd_t *zc, cred_t *cr) 176789Sahrens { 177789Sahrens return (0); 178789Sahrens } 179789Sahrens 180789Sahrens /* 181789Sahrens * Policy for dataset read operations (list children, get statistics). Requires 182789Sahrens * no privileges, but must be visible in the local zone. 183789Sahrens */ 184789Sahrens /* ARGSUSED */ 185789Sahrens static int 1864543Smarks zfs_secpolicy_read(zfs_cmd_t *zc, cred_t *cr) 187789Sahrens { 188789Sahrens if (INGLOBALZONE(curproc) || 1894543Smarks zone_dataset_visible(zc->zc_name, NULL)) 190789Sahrens return (0); 191789Sahrens 192789Sahrens return (ENOENT); 193789Sahrens } 194789Sahrens 195789Sahrens static int 196789Sahrens zfs_dozonecheck(const char *dataset, cred_t *cr) 197789Sahrens { 198789Sahrens uint64_t zoned; 199789Sahrens int writable = 1; 200789Sahrens 201789Sahrens /* 202789Sahrens * The dataset must be visible by this zone -- check this first 203789Sahrens * so they don't see EPERM on something they shouldn't know about. 204789Sahrens */ 205789Sahrens if (!INGLOBALZONE(curproc) && 206789Sahrens !zone_dataset_visible(dataset, &writable)) 207789Sahrens return (ENOENT); 208789Sahrens 209789Sahrens if (dsl_prop_get_integer(dataset, "zoned", &zoned, NULL)) 210789Sahrens return (ENOENT); 211789Sahrens 212789Sahrens if (INGLOBALZONE(curproc)) { 213789Sahrens /* 214789Sahrens * If the fs is zoned, only root can access it from the 215789Sahrens * global zone. 216789Sahrens */ 217789Sahrens if (secpolicy_zfs(cr) && zoned) 218789Sahrens return (EPERM); 219789Sahrens } else { 220789Sahrens /* 221789Sahrens * If we are in a local zone, the 'zoned' property must be set. 222789Sahrens */ 223789Sahrens if (!zoned) 224789Sahrens return (EPERM); 225789Sahrens 226789Sahrens /* must be writable by this zone */ 227789Sahrens if (!writable) 228789Sahrens return (EPERM); 229789Sahrens } 230789Sahrens return (0); 231789Sahrens } 232789Sahrens 233789Sahrens int 2344543Smarks zfs_secpolicy_write_perms(const char *name, const char *perm, cred_t *cr) 235789Sahrens { 236789Sahrens int error; 237789Sahrens 2384543Smarks error = zfs_dozonecheck(name, cr); 2394543Smarks if (error == 0) { 2404543Smarks error = secpolicy_zfs(cr); 2414543Smarks if (error) { 2424543Smarks error = dsl_deleg_access(name, perm, cr); 2434543Smarks } 2444543Smarks } 2454543Smarks return (error); 2464543Smarks } 2474543Smarks 2484543Smarks static int 2494543Smarks zfs_secpolicy_setprop(const char *name, zfs_prop_t prop, cred_t *cr) 2504543Smarks { 2514543Smarks int error = 0; 2524543Smarks 2534543Smarks /* 2544543Smarks * Check permissions for special properties. 2554543Smarks */ 2564543Smarks switch (prop) { 2574543Smarks case ZFS_PROP_ZONED: 2584543Smarks /* 2594543Smarks * Disallow setting of 'zoned' from within a local zone. 2604543Smarks */ 2614543Smarks if (!INGLOBALZONE(curproc)) 2624543Smarks return (EPERM); 2634543Smarks break; 264789Sahrens 2654543Smarks case ZFS_PROP_QUOTA: 2664543Smarks if (error = 2674543Smarks zfs_secpolicy_write_perms(name, ZFS_DELEG_PERM_QUOTA, cr)) 2684543Smarks return (error); 2694543Smarks 2704543Smarks if (!INGLOBALZONE(curproc)) { 2714543Smarks uint64_t zoned; 2724543Smarks char setpoint[MAXNAMELEN]; 2734543Smarks int dslen; 2744543Smarks /* 2754543Smarks * Unprivileged users are allowed to modify the 2764543Smarks * quota on things *under* (ie. contained by) 2774543Smarks * the thing they own. 2784543Smarks */ 2794543Smarks if (dsl_prop_get_integer(name, "zoned", &zoned, 2804543Smarks setpoint)) 2814543Smarks return (EPERM); 2824543Smarks if (!zoned) /* this shouldn't happen */ 2834543Smarks return (EPERM); 2844543Smarks dslen = strlen(name); 2854543Smarks if (dslen <= strlen(setpoint)) 2864543Smarks return (EPERM); 2874543Smarks } 2884543Smarks default: 2894543Smarks error = zfs_secpolicy_write_perms(name, 2904543Smarks zfs_prop_perm(prop), cr); 2914543Smarks } 2924543Smarks 2934543Smarks return (error); 294789Sahrens } 295789Sahrens 2964543Smarks int 2974543Smarks zfs_secpolicy_fsacl(zfs_cmd_t *zc, cred_t *cr) 2984543Smarks { 2994543Smarks int error; 3004543Smarks 3014543Smarks error = zfs_dozonecheck(zc->zc_name, cr); 3024543Smarks if (error) 3034543Smarks return (error); 3044543Smarks 3054543Smarks /* 3064543Smarks * permission to set permissions will be evaluated later in 3074543Smarks * dsl_deleg_can_allow() 3084543Smarks */ 3094543Smarks return (0); 3104543Smarks } 3114543Smarks 3124543Smarks int 3134543Smarks zfs_secpolicy_rollback(zfs_cmd_t *zc, cred_t *cr) 3144543Smarks { 3154543Smarks int error; 3164543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 3174543Smarks ZFS_DELEG_PERM_ROLLBACK, cr); 3184543Smarks if (error == 0) 3194543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 3204543Smarks ZFS_DELEG_PERM_MOUNT, cr); 3214543Smarks return (error); 3224543Smarks } 3234543Smarks 3244543Smarks int 3254543Smarks zfs_secpolicy_send(zfs_cmd_t *zc, cred_t *cr) 3264543Smarks { 3274543Smarks return (zfs_secpolicy_write_perms(zc->zc_name, 3284543Smarks ZFS_DELEG_PERM_SEND, cr)); 3294543Smarks } 3304543Smarks 3314543Smarks int 3324543Smarks zfs_secpolicy_share(zfs_cmd_t *zc, cred_t *cr) 3334543Smarks { 3344543Smarks if (!INGLOBALZONE(curproc)) 3354543Smarks return (EPERM); 3364543Smarks 3374543Smarks if (secpolicy_nfs(CRED()) == 0) { 3384543Smarks return (0); 3394543Smarks } else { 3404543Smarks vnode_t *vp; 3414543Smarks int error; 3424543Smarks 3434543Smarks if ((error = lookupname(zc->zc_value, UIO_SYSSPACE, 3444543Smarks NO_FOLLOW, NULL, &vp)) != 0) 3454543Smarks return (error); 3464543Smarks 3474543Smarks /* Now make sure mntpnt and dataset are ZFS */ 3484543Smarks 3494543Smarks if (vp->v_vfsp->vfs_fstype != zfsfstype || 3504543Smarks (strcmp((char *)refstr_value(vp->v_vfsp->vfs_resource), 3514543Smarks zc->zc_name) != 0)) { 3524543Smarks VN_RELE(vp); 3534543Smarks return (EPERM); 3544543Smarks } 3554543Smarks 3564543Smarks VN_RELE(vp); 3574543Smarks return (dsl_deleg_access(zc->zc_name, 3584543Smarks ZFS_DELEG_PERM_SHARE, cr)); 3594543Smarks } 3604543Smarks } 3614543Smarks 362789Sahrens static int 3634543Smarks zfs_get_parent(const char *datasetname, char *parent, int parentsize) 364789Sahrens { 365789Sahrens char *cp; 366789Sahrens 367789Sahrens /* 368789Sahrens * Remove the @bla or /bla from the end of the name to get the parent. 369789Sahrens */ 3704543Smarks (void) strncpy(parent, datasetname, parentsize); 3714543Smarks cp = strrchr(parent, '@'); 372789Sahrens if (cp != NULL) { 373789Sahrens cp[0] = '\0'; 374789Sahrens } else { 3754543Smarks cp = strrchr(parent, '/'); 376789Sahrens if (cp == NULL) 377789Sahrens return (ENOENT); 378789Sahrens cp[0] = '\0'; 379789Sahrens } 380789Sahrens 3814543Smarks return (0); 3824543Smarks } 3834543Smarks 3844543Smarks int 3854543Smarks zfs_secpolicy_destroy_perms(const char *name, cred_t *cr) 3864543Smarks { 3874543Smarks int error; 3884543Smarks 3894543Smarks if ((error = zfs_secpolicy_write_perms(name, 3904543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 3914543Smarks return (error); 3924543Smarks 3934543Smarks return (zfs_secpolicy_write_perms(name, ZFS_DELEG_PERM_DESTROY, cr)); 3944543Smarks } 3954543Smarks 3964543Smarks static int 3974543Smarks zfs_secpolicy_destroy(zfs_cmd_t *zc, cred_t *cr) 3984543Smarks { 3994543Smarks return (zfs_secpolicy_destroy_perms(zc->zc_name, cr)); 4004543Smarks } 4014543Smarks 4024543Smarks /* 4034543Smarks * Must have sys_config privilege to check the iscsi permission 4044543Smarks */ 4054543Smarks /* ARGSUSED */ 4064543Smarks static int 4074543Smarks zfs_secpolicy_iscsi(zfs_cmd_t *zc, cred_t *cr) 4084543Smarks { 4094543Smarks return (secpolicy_zfs(cr)); 4104543Smarks } 4114543Smarks 4124543Smarks int 4134543Smarks zfs_secpolicy_rename_perms(const char *from, const char *to, cred_t *cr) 4144543Smarks { 4154543Smarks char parentname[MAXNAMELEN]; 4164543Smarks int error; 4174543Smarks 4184543Smarks if ((error = zfs_secpolicy_write_perms(from, 4194543Smarks ZFS_DELEG_PERM_RENAME, cr)) != 0) 4204543Smarks return (error); 4214543Smarks 4224543Smarks if ((error = zfs_secpolicy_write_perms(from, 4234543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 4244543Smarks return (error); 4254543Smarks 4264543Smarks if ((error = zfs_get_parent(to, parentname, 4274543Smarks sizeof (parentname))) != 0) 4284543Smarks return (error); 4294543Smarks 4304543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 4314543Smarks ZFS_DELEG_PERM_CREATE, cr)) != 0) 4324543Smarks return (error); 4334543Smarks 4344543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 4354543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 4364543Smarks return (error); 4374543Smarks 4384543Smarks return (error); 4394543Smarks } 4404543Smarks 4414543Smarks static int 4424543Smarks zfs_secpolicy_rename(zfs_cmd_t *zc, cred_t *cr) 4434543Smarks { 4444543Smarks return (zfs_secpolicy_rename_perms(zc->zc_name, zc->zc_value, cr)); 4454543Smarks } 4464543Smarks 4474543Smarks static int 4484543Smarks zfs_secpolicy_promote(zfs_cmd_t *zc, cred_t *cr) 4494543Smarks { 4504543Smarks char parentname[MAXNAMELEN]; 4514543Smarks objset_t *clone; 4524543Smarks int error; 4534543Smarks 4544543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 4554543Smarks ZFS_DELEG_PERM_PROMOTE, cr); 4564543Smarks if (error) 4574543Smarks return (error); 4584543Smarks 4594543Smarks error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 4604543Smarks DS_MODE_STANDARD | DS_MODE_READONLY, &clone); 4614543Smarks 4624543Smarks if (error == 0) { 4634543Smarks dsl_dataset_t *pclone = NULL; 4644543Smarks dsl_dir_t *dd; 4654543Smarks dd = clone->os->os_dsl_dataset->ds_dir; 4664543Smarks 4674543Smarks rw_enter(&dd->dd_pool->dp_config_rwlock, RW_READER); 4684543Smarks error = dsl_dataset_open_obj(dd->dd_pool, 4694543Smarks dd->dd_phys->dd_clone_parent_obj, NULL, 4704543Smarks DS_MODE_NONE, FTAG, &pclone); 4714543Smarks rw_exit(&dd->dd_pool->dp_config_rwlock); 4724543Smarks if (error) { 4734543Smarks dmu_objset_close(clone); 4744543Smarks return (error); 4754543Smarks } 4764543Smarks 4774543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 4784543Smarks ZFS_DELEG_PERM_MOUNT, cr); 4794543Smarks 4804543Smarks dsl_dataset_name(pclone, parentname); 4814543Smarks dmu_objset_close(clone); 4824543Smarks dsl_dataset_close(pclone, DS_MODE_NONE, FTAG); 4834543Smarks if (error == 0) 4844543Smarks error = zfs_secpolicy_write_perms(parentname, 4854543Smarks ZFS_DELEG_PERM_PROMOTE, cr); 4864543Smarks } 4874543Smarks return (error); 4884543Smarks } 4894543Smarks 4904543Smarks static int 4914543Smarks zfs_secpolicy_receive(zfs_cmd_t *zc, cred_t *cr) 4924543Smarks { 4934543Smarks int error; 4944543Smarks 4954543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_name, 4964543Smarks ZFS_DELEG_PERM_RECEIVE, cr)) != 0) 4974543Smarks return (error); 4984543Smarks 4994543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_name, 5004543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 5014543Smarks return (error); 5024543Smarks 5034543Smarks return (zfs_secpolicy_write_perms(zc->zc_name, 5044543Smarks ZFS_DELEG_PERM_CREATE, cr)); 5054543Smarks } 5064543Smarks 5074543Smarks int 5084543Smarks zfs_secpolicy_snapshot_perms(const char *name, cred_t *cr) 5094543Smarks { 5104543Smarks int error; 5114543Smarks 5124543Smarks if ((error = zfs_secpolicy_write_perms(name, 5134543Smarks ZFS_DELEG_PERM_SNAPSHOT, cr)) != 0) 5144543Smarks return (error); 5154543Smarks 5164543Smarks error = zfs_secpolicy_write_perms(name, 5174543Smarks ZFS_DELEG_PERM_MOUNT, cr); 5184543Smarks 5194543Smarks return (error); 5204543Smarks } 5214543Smarks 5224543Smarks static int 5234543Smarks zfs_secpolicy_snapshot(zfs_cmd_t *zc, cred_t *cr) 5244543Smarks { 5254543Smarks 5264543Smarks return (zfs_secpolicy_snapshot_perms(zc->zc_name, cr)); 5274543Smarks } 5284543Smarks 5294543Smarks static int 5304543Smarks zfs_secpolicy_create(zfs_cmd_t *zc, cred_t *cr) 5314543Smarks { 5324543Smarks char parentname[MAXNAMELEN]; 5334543Smarks int error; 5344543Smarks 5354543Smarks if ((error = zfs_get_parent(zc->zc_name, parentname, 5364543Smarks sizeof (parentname))) != 0) 5374543Smarks return (error); 5384543Smarks 5394543Smarks if (zc->zc_value[0] != '\0') { 5404543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_value, 5414543Smarks ZFS_DELEG_PERM_CLONE, cr)) != 0) 5424543Smarks return (error); 5434543Smarks } 5444543Smarks 5454543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 5464543Smarks ZFS_DELEG_PERM_CREATE, cr)) != 0) 5474543Smarks return (error); 5484543Smarks 5494543Smarks error = zfs_secpolicy_write_perms(parentname, 5504543Smarks ZFS_DELEG_PERM_MOUNT, cr); 5514543Smarks 5524543Smarks return (error); 5534543Smarks } 5544543Smarks 5554543Smarks static int 5564543Smarks zfs_secpolicy_umount(zfs_cmd_t *zc, cred_t *cr) 5574543Smarks { 5584543Smarks int error; 5594543Smarks 5604543Smarks error = secpolicy_fs_unmount(cr, NULL); 5614543Smarks if (error) { 5624543Smarks error = dsl_deleg_access(zc->zc_name, ZFS_DELEG_PERM_MOUNT, cr); 5634543Smarks } 5644543Smarks return (error); 565789Sahrens } 566789Sahrens 567789Sahrens /* 568789Sahrens * Policy for pool operations - create/destroy pools, add vdevs, etc. Requires 569789Sahrens * SYS_CONFIG privilege, which is not available in a local zone. 570789Sahrens */ 571789Sahrens /* ARGSUSED */ 572789Sahrens static int 5734543Smarks zfs_secpolicy_config(zfs_cmd_t *zc, cred_t *cr) 574789Sahrens { 575789Sahrens if (secpolicy_sys_config(cr, B_FALSE) != 0) 576789Sahrens return (EPERM); 577789Sahrens 578789Sahrens return (0); 579789Sahrens } 580789Sahrens 581789Sahrens /* 5824543Smarks * Just like zfs_secpolicy_config, except that we will check for 5834543Smarks * mount permission on the dataset for permission to create/remove 5844543Smarks * the minor nodes. 5854543Smarks */ 5864543Smarks static int 5874543Smarks zfs_secpolicy_minor(zfs_cmd_t *zc, cred_t *cr) 5884543Smarks { 5894543Smarks if (secpolicy_sys_config(cr, B_FALSE) != 0) { 5904543Smarks return (dsl_deleg_access(zc->zc_name, 5914543Smarks ZFS_DELEG_PERM_MOUNT, cr)); 5924543Smarks } 5934543Smarks 5944543Smarks return (0); 5954543Smarks } 5964543Smarks 5974543Smarks /* 5981544Seschrock * Policy for fault injection. Requires all privileges. 5991544Seschrock */ 6001544Seschrock /* ARGSUSED */ 6011544Seschrock static int 6024543Smarks zfs_secpolicy_inject(zfs_cmd_t *zc, cred_t *cr) 6031544Seschrock { 6041544Seschrock return (secpolicy_zinject(cr)); 6051544Seschrock } 6061544Seschrock 6071544Seschrock /* 608789Sahrens * Returns the nvlist as specified by the user in the zfs_cmd_t. 609789Sahrens */ 610789Sahrens static int 6112676Seschrock get_nvlist(zfs_cmd_t *zc, nvlist_t **nvp) 612789Sahrens { 613789Sahrens char *packed; 614789Sahrens size_t size; 615789Sahrens int error; 616789Sahrens nvlist_t *config = NULL; 617789Sahrens 618789Sahrens /* 6192676Seschrock * Read in and unpack the user-supplied nvlist. 620789Sahrens */ 6212676Seschrock if ((size = zc->zc_nvlist_src_size) == 0) 622789Sahrens return (EINVAL); 623789Sahrens 624789Sahrens packed = kmem_alloc(size, KM_SLEEP); 625789Sahrens 6262676Seschrock if ((error = xcopyin((void *)(uintptr_t)zc->zc_nvlist_src, packed, 627789Sahrens size)) != 0) { 628789Sahrens kmem_free(packed, size); 629789Sahrens return (error); 630789Sahrens } 631789Sahrens 632789Sahrens if ((error = nvlist_unpack(packed, size, &config, 0)) != 0) { 633789Sahrens kmem_free(packed, size); 634789Sahrens return (error); 635789Sahrens } 636789Sahrens 637789Sahrens kmem_free(packed, size); 638789Sahrens 639789Sahrens *nvp = config; 640789Sahrens return (0); 641789Sahrens } 642789Sahrens 643789Sahrens static int 6442676Seschrock put_nvlist(zfs_cmd_t *zc, nvlist_t *nvl) 6452676Seschrock { 6462676Seschrock char *packed = NULL; 6472676Seschrock size_t size; 6482676Seschrock int error; 6492676Seschrock 6502676Seschrock VERIFY(nvlist_size(nvl, &size, NV_ENCODE_NATIVE) == 0); 6512676Seschrock 6522676Seschrock if (size > zc->zc_nvlist_dst_size) { 6532676Seschrock error = ENOMEM; 6542676Seschrock } else { 6552676Seschrock VERIFY(nvlist_pack(nvl, &packed, &size, NV_ENCODE_NATIVE, 6562676Seschrock KM_SLEEP) == 0); 6572676Seschrock error = xcopyout(packed, (void *)(uintptr_t)zc->zc_nvlist_dst, 6582676Seschrock size); 6592676Seschrock kmem_free(packed, size); 6602676Seschrock } 6612676Seschrock 6622676Seschrock zc->zc_nvlist_dst_size = size; 6632676Seschrock return (error); 6642676Seschrock } 6652676Seschrock 6662676Seschrock static int 667789Sahrens zfs_ioc_pool_create(zfs_cmd_t *zc) 668789Sahrens { 669789Sahrens int error; 670789Sahrens nvlist_t *config; 671789Sahrens 6722676Seschrock if ((error = get_nvlist(zc, &config)) != 0) 673789Sahrens return (error); 674789Sahrens 6752676Seschrock error = spa_create(zc->zc_name, config, zc->zc_value[0] == '\0' ? 6762676Seschrock NULL : zc->zc_value); 677789Sahrens 678789Sahrens nvlist_free(config); 679789Sahrens 680789Sahrens return (error); 681789Sahrens } 682789Sahrens 683789Sahrens static int 684789Sahrens zfs_ioc_pool_destroy(zfs_cmd_t *zc) 685789Sahrens { 6864543Smarks int error; 6874543Smarks zfs_log_history(zc); 6884543Smarks error = spa_destroy(zc->zc_name); 6894543Smarks return (error); 690789Sahrens } 691789Sahrens 692789Sahrens static int 693789Sahrens zfs_ioc_pool_import(zfs_cmd_t *zc) 694789Sahrens { 695789Sahrens int error; 696789Sahrens nvlist_t *config; 697789Sahrens uint64_t guid; 698789Sahrens 6992676Seschrock if ((error = get_nvlist(zc, &config)) != 0) 700789Sahrens return (error); 701789Sahrens 702789Sahrens if (nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID, &guid) != 0 || 7031544Seschrock guid != zc->zc_guid) 704789Sahrens error = EINVAL; 705789Sahrens else 706789Sahrens error = spa_import(zc->zc_name, config, 7072676Seschrock zc->zc_value[0] == '\0' ? NULL : zc->zc_value); 708789Sahrens 709789Sahrens nvlist_free(config); 710789Sahrens 711789Sahrens return (error); 712789Sahrens } 713789Sahrens 714789Sahrens static int 715789Sahrens zfs_ioc_pool_export(zfs_cmd_t *zc) 716789Sahrens { 7174543Smarks int error; 7184543Smarks zfs_log_history(zc); 7194543Smarks error = spa_export(zc->zc_name, NULL); 7204543Smarks return (error); 721789Sahrens } 722789Sahrens 723789Sahrens static int 724789Sahrens zfs_ioc_pool_configs(zfs_cmd_t *zc) 725789Sahrens { 726789Sahrens nvlist_t *configs; 727789Sahrens int error; 728789Sahrens 729789Sahrens if ((configs = spa_all_configs(&zc->zc_cookie)) == NULL) 730789Sahrens return (EEXIST); 731789Sahrens 7322676Seschrock error = put_nvlist(zc, configs); 733789Sahrens 734789Sahrens nvlist_free(configs); 735789Sahrens 736789Sahrens return (error); 737789Sahrens } 738789Sahrens 739789Sahrens static int 740789Sahrens zfs_ioc_pool_stats(zfs_cmd_t *zc) 741789Sahrens { 742789Sahrens nvlist_t *config; 743789Sahrens int error; 7441544Seschrock int ret = 0; 745789Sahrens 7462676Seschrock error = spa_get_stats(zc->zc_name, &config, zc->zc_value, 7472676Seschrock sizeof (zc->zc_value)); 748789Sahrens 749789Sahrens if (config != NULL) { 7502676Seschrock ret = put_nvlist(zc, config); 751789Sahrens nvlist_free(config); 7521544Seschrock 7531544Seschrock /* 7541544Seschrock * The config may be present even if 'error' is non-zero. 7551544Seschrock * In this case we return success, and preserve the real errno 7561544Seschrock * in 'zc_cookie'. 7571544Seschrock */ 7581544Seschrock zc->zc_cookie = error; 759789Sahrens } else { 7601544Seschrock ret = error; 761789Sahrens } 762789Sahrens 7631544Seschrock return (ret); 764789Sahrens } 765789Sahrens 766789Sahrens /* 767789Sahrens * Try to import the given pool, returning pool stats as appropriate so that 768789Sahrens * user land knows which devices are available and overall pool health. 769789Sahrens */ 770789Sahrens static int 771789Sahrens zfs_ioc_pool_tryimport(zfs_cmd_t *zc) 772789Sahrens { 773789Sahrens nvlist_t *tryconfig, *config; 774789Sahrens int error; 775789Sahrens 7762676Seschrock if ((error = get_nvlist(zc, &tryconfig)) != 0) 777789Sahrens return (error); 778789Sahrens 779789Sahrens config = spa_tryimport(tryconfig); 780789Sahrens 781789Sahrens nvlist_free(tryconfig); 782789Sahrens 783789Sahrens if (config == NULL) 784789Sahrens return (EINVAL); 785789Sahrens 7862676Seschrock error = put_nvlist(zc, config); 787789Sahrens nvlist_free(config); 788789Sahrens 789789Sahrens return (error); 790789Sahrens } 791789Sahrens 792789Sahrens static int 793789Sahrens zfs_ioc_pool_scrub(zfs_cmd_t *zc) 794789Sahrens { 795789Sahrens spa_t *spa; 796789Sahrens int error; 797789Sahrens 7982926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 7992926Sek110237 return (error); 8002926Sek110237 8014451Seschrock spa_config_enter(spa, RW_READER, FTAG); 8022926Sek110237 error = spa_scrub(spa, zc->zc_cookie, B_FALSE); 8034451Seschrock spa_config_exit(spa, FTAG); 8042926Sek110237 8052926Sek110237 spa_close(spa, FTAG); 8062926Sek110237 807789Sahrens return (error); 808789Sahrens } 809789Sahrens 810789Sahrens static int 811789Sahrens zfs_ioc_pool_freeze(zfs_cmd_t *zc) 812789Sahrens { 813789Sahrens spa_t *spa; 814789Sahrens int error; 815789Sahrens 816789Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 817789Sahrens if (error == 0) { 818789Sahrens spa_freeze(spa); 819789Sahrens spa_close(spa, FTAG); 820789Sahrens } 821789Sahrens return (error); 822789Sahrens } 823789Sahrens 824789Sahrens static int 8251760Seschrock zfs_ioc_pool_upgrade(zfs_cmd_t *zc) 8261760Seschrock { 8271760Seschrock spa_t *spa; 8281760Seschrock int error; 8291760Seschrock 8302926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 8312926Sek110237 return (error); 8322926Sek110237 8332926Sek110237 spa_upgrade(spa); 8342926Sek110237 spa_close(spa, FTAG); 8352926Sek110237 8362926Sek110237 return (error); 8372926Sek110237 } 8382926Sek110237 8392926Sek110237 static int 8402926Sek110237 zfs_ioc_pool_get_history(zfs_cmd_t *zc) 8412926Sek110237 { 8422926Sek110237 spa_t *spa; 8432926Sek110237 char *hist_buf; 8442926Sek110237 uint64_t size; 8452926Sek110237 int error; 8462926Sek110237 8472926Sek110237 if ((size = zc->zc_history_len) == 0) 8482926Sek110237 return (EINVAL); 8492926Sek110237 8502926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 8512926Sek110237 return (error); 8522926Sek110237 853*4577Sahrens if (spa_version(spa) < SPA_VERSION_ZPOOL_HISTORY) { 8543863Sek110237 spa_close(spa, FTAG); 8553863Sek110237 return (ENOTSUP); 8563863Sek110237 } 8573863Sek110237 8582926Sek110237 hist_buf = kmem_alloc(size, KM_SLEEP); 8592926Sek110237 if ((error = spa_history_get(spa, &zc->zc_history_offset, 8602926Sek110237 &zc->zc_history_len, hist_buf)) == 0) { 8614543Smarks error = xcopyout(hist_buf, 8624543Smarks (char *)(uintptr_t)zc->zc_history, 8632926Sek110237 zc->zc_history_len); 8642926Sek110237 } 8652926Sek110237 8662926Sek110237 spa_close(spa, FTAG); 8672926Sek110237 kmem_free(hist_buf, size); 8682926Sek110237 return (error); 8692926Sek110237 } 8702926Sek110237 8712926Sek110237 static int 8723444Sek110237 zfs_ioc_dsobj_to_dsname(zfs_cmd_t *zc) 8733444Sek110237 { 8743444Sek110237 int error; 8753444Sek110237 8763912Slling if (error = dsl_dsobj_to_dsname(zc->zc_name, zc->zc_obj, zc->zc_value)) 8773444Sek110237 return (error); 8783444Sek110237 8793444Sek110237 return (0); 8803444Sek110237 } 8813444Sek110237 8823444Sek110237 static int 8833444Sek110237 zfs_ioc_obj_to_path(zfs_cmd_t *zc) 8843444Sek110237 { 8853444Sek110237 objset_t *osp; 8863444Sek110237 int error; 8873444Sek110237 8883444Sek110237 if ((error = dmu_objset_open(zc->zc_name, DMU_OST_ZFS, 8893444Sek110237 DS_MODE_NONE | DS_MODE_READONLY, &osp)) != 0) 8903444Sek110237 return (error); 8913444Sek110237 8923444Sek110237 error = zfs_obj_to_path(osp, zc->zc_obj, zc->zc_value, 8933444Sek110237 sizeof (zc->zc_value)); 8943444Sek110237 dmu_objset_close(osp); 8953444Sek110237 8963444Sek110237 return (error); 8973444Sek110237 } 8983444Sek110237 8993444Sek110237 static int 900789Sahrens zfs_ioc_vdev_add(zfs_cmd_t *zc) 901789Sahrens { 902789Sahrens spa_t *spa; 903789Sahrens int error; 904789Sahrens nvlist_t *config; 905789Sahrens 906789Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 907789Sahrens if (error != 0) 908789Sahrens return (error); 909789Sahrens 9103912Slling /* 9113912Slling * A root pool with concatenated devices is not supported. 9123912Slling * Thus, can not add a device to a root pool with one device. 9133912Slling */ 9143912Slling if (spa->spa_root_vdev->vdev_children == 1 && spa->spa_bootfs != 0) { 9153912Slling spa_close(spa, FTAG); 9163912Slling return (EDOM); 9173912Slling } 9183912Slling 9192676Seschrock if ((error = get_nvlist(zc, &config)) == 0) { 920789Sahrens error = spa_vdev_add(spa, config); 921789Sahrens nvlist_free(config); 922789Sahrens } 923789Sahrens spa_close(spa, FTAG); 924789Sahrens return (error); 925789Sahrens } 926789Sahrens 927789Sahrens static int 928789Sahrens zfs_ioc_vdev_remove(zfs_cmd_t *zc) 929789Sahrens { 9302082Seschrock spa_t *spa; 9312082Seschrock int error; 9322082Seschrock 9332082Seschrock error = spa_open(zc->zc_name, &spa, FTAG); 9342082Seschrock if (error != 0) 9352082Seschrock return (error); 9362082Seschrock error = spa_vdev_remove(spa, zc->zc_guid, B_FALSE); 9372082Seschrock spa_close(spa, FTAG); 9382082Seschrock return (error); 939789Sahrens } 940789Sahrens 941789Sahrens static int 9424451Seschrock zfs_ioc_vdev_set_state(zfs_cmd_t *zc) 943789Sahrens { 944789Sahrens spa_t *spa; 945789Sahrens int error; 9464451Seschrock vdev_state_t newstate = VDEV_STATE_UNKNOWN; 947789Sahrens 9482926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 949789Sahrens return (error); 9504451Seschrock switch (zc->zc_cookie) { 9514451Seschrock case VDEV_STATE_ONLINE: 9524451Seschrock error = vdev_online(spa, zc->zc_guid, zc->zc_obj, &newstate); 9534451Seschrock break; 9544451Seschrock 9554451Seschrock case VDEV_STATE_OFFLINE: 9564451Seschrock error = vdev_offline(spa, zc->zc_guid, zc->zc_obj); 9574451Seschrock break; 958789Sahrens 9594451Seschrock case VDEV_STATE_FAULTED: 9604451Seschrock error = vdev_fault(spa, zc->zc_guid); 9614451Seschrock break; 962789Sahrens 9634451Seschrock case VDEV_STATE_DEGRADED: 9644451Seschrock error = vdev_degrade(spa, zc->zc_guid); 9654451Seschrock break; 9664451Seschrock 9674451Seschrock default: 9684451Seschrock error = EINVAL; 9694451Seschrock } 9704451Seschrock zc->zc_cookie = newstate; 971789Sahrens spa_close(spa, FTAG); 972789Sahrens return (error); 973789Sahrens } 974789Sahrens 975789Sahrens static int 976789Sahrens zfs_ioc_vdev_attach(zfs_cmd_t *zc) 977789Sahrens { 978789Sahrens spa_t *spa; 979789Sahrens int replacing = zc->zc_cookie; 980789Sahrens nvlist_t *config; 981789Sahrens int error; 982789Sahrens 9832926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 984789Sahrens return (error); 985789Sahrens 9862676Seschrock if ((error = get_nvlist(zc, &config)) == 0) { 9871544Seschrock error = spa_vdev_attach(spa, zc->zc_guid, config, replacing); 988789Sahrens nvlist_free(config); 989789Sahrens } 990789Sahrens 991789Sahrens spa_close(spa, FTAG); 992789Sahrens return (error); 993789Sahrens } 994789Sahrens 995789Sahrens static int 996789Sahrens zfs_ioc_vdev_detach(zfs_cmd_t *zc) 997789Sahrens { 998789Sahrens spa_t *spa; 999789Sahrens int error; 1000789Sahrens 10012926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1002789Sahrens return (error); 1003789Sahrens 10041544Seschrock error = spa_vdev_detach(spa, zc->zc_guid, B_FALSE); 1005789Sahrens 1006789Sahrens spa_close(spa, FTAG); 1007789Sahrens return (error); 1008789Sahrens } 1009789Sahrens 1010789Sahrens static int 10111354Seschrock zfs_ioc_vdev_setpath(zfs_cmd_t *zc) 10121354Seschrock { 10131354Seschrock spa_t *spa; 10142676Seschrock char *path = zc->zc_value; 10151544Seschrock uint64_t guid = zc->zc_guid; 10161354Seschrock int error; 10171354Seschrock 10181354Seschrock error = spa_open(zc->zc_name, &spa, FTAG); 10191354Seschrock if (error != 0) 10201354Seschrock return (error); 10211354Seschrock 10221354Seschrock error = spa_vdev_setpath(spa, guid, path); 10231354Seschrock spa_close(spa, FTAG); 10241354Seschrock return (error); 10251354Seschrock } 10261354Seschrock 10271354Seschrock static int 1028789Sahrens zfs_ioc_objset_stats(zfs_cmd_t *zc) 1029789Sahrens { 1030789Sahrens objset_t *os = NULL; 1031789Sahrens int error; 10321356Seschrock nvlist_t *nv; 1033789Sahrens 1034789Sahrens retry: 1035789Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1036789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1037789Sahrens if (error != 0) { 1038789Sahrens /* 1039789Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1040789Sahrens * the objset is held exclusively. Fortunately this hold is 1041789Sahrens * only for a short while, so we retry here. 1042789Sahrens * This avoids user code having to handle EBUSY, 1043789Sahrens * for example for a "zfs list". 1044789Sahrens */ 1045789Sahrens if (error == EBUSY) { 1046789Sahrens delay(1); 1047789Sahrens goto retry; 1048789Sahrens } 1049789Sahrens return (error); 1050789Sahrens } 1051789Sahrens 10522885Sahrens dmu_objset_fast_stat(os, &zc->zc_objset_stats); 1053789Sahrens 10542856Snd150628 if (zc->zc_nvlist_dst != 0 && 10551356Seschrock (error = dsl_prop_get_all(os, &nv)) == 0) { 10562885Sahrens dmu_objset_stats(os, nv); 10573087Sahrens /* 1058*4577Sahrens * NB: {zpl,zvol}_get_stats() will read the objset contents, 10593087Sahrens * which we aren't supposed to do with a 10603087Sahrens * DS_MODE_STANDARD open, because it could be 10613087Sahrens * inconsistent. So this is a bit of a workaround... 10623087Sahrens */ 1063*4577Sahrens if (!zc->zc_objset_stats.dds_inconsistent) { 1064*4577Sahrens if (dmu_objset_type(os) == DMU_OST_ZVOL) 1065*4577Sahrens VERIFY(zvol_get_stats(os, nv) == 0); 1066*4577Sahrens else if (dmu_objset_type(os) == DMU_OST_ZFS) 1067*4577Sahrens (void) zfs_get_stats(os, nv); 1068*4577Sahrens } 10692676Seschrock error = put_nvlist(zc, nv); 10701356Seschrock nvlist_free(nv); 10711356Seschrock } 1072789Sahrens 10732676Seschrock spa_altroot(dmu_objset_spa(os), zc->zc_value, sizeof (zc->zc_value)); 10741544Seschrock 1075789Sahrens dmu_objset_close(os); 1076789Sahrens return (error); 1077789Sahrens } 1078789Sahrens 1079789Sahrens static int 1080789Sahrens zfs_ioc_dataset_list_next(zfs_cmd_t *zc) 1081789Sahrens { 1082885Sahrens objset_t *os; 1083789Sahrens int error; 1084789Sahrens char *p; 1085789Sahrens 1086885Sahrens retry: 1087885Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1088885Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1089885Sahrens if (error != 0) { 1090885Sahrens /* 1091885Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1092885Sahrens * the objset is held exclusively. Fortunately this hold is 1093885Sahrens * only for a short while, so we retry here. 1094885Sahrens * This avoids user code having to handle EBUSY, 1095885Sahrens * for example for a "zfs list". 1096885Sahrens */ 1097885Sahrens if (error == EBUSY) { 1098885Sahrens delay(1); 1099885Sahrens goto retry; 1100885Sahrens } 1101885Sahrens if (error == ENOENT) 1102885Sahrens error = ESRCH; 1103885Sahrens return (error); 1104789Sahrens } 1105789Sahrens 1106789Sahrens p = strrchr(zc->zc_name, '/'); 1107789Sahrens if (p == NULL || p[1] != '\0') 1108789Sahrens (void) strlcat(zc->zc_name, "/", sizeof (zc->zc_name)); 1109789Sahrens p = zc->zc_name + strlen(zc->zc_name); 1110789Sahrens 1111789Sahrens do { 1112885Sahrens error = dmu_dir_list_next(os, 1113885Sahrens sizeof (zc->zc_name) - (p - zc->zc_name), p, 1114885Sahrens NULL, &zc->zc_cookie); 1115789Sahrens if (error == ENOENT) 1116789Sahrens error = ESRCH; 1117885Sahrens } while (error == 0 && !INGLOBALZONE(curproc) && 1118789Sahrens !zone_dataset_visible(zc->zc_name, NULL)); 1119789Sahrens 1120885Sahrens /* 1121885Sahrens * If it's a hidden dataset (ie. with a '$' in its name), don't 1122885Sahrens * try to get stats for it. Userland will skip over it. 1123885Sahrens */ 1124885Sahrens if (error == 0 && strchr(zc->zc_name, '$') == NULL) 1125885Sahrens error = zfs_ioc_objset_stats(zc); /* fill in the stats */ 1126789Sahrens 1127885Sahrens dmu_objset_close(os); 1128789Sahrens return (error); 1129789Sahrens } 1130789Sahrens 1131789Sahrens static int 1132789Sahrens zfs_ioc_snapshot_list_next(zfs_cmd_t *zc) 1133789Sahrens { 1134885Sahrens objset_t *os; 1135789Sahrens int error; 1136789Sahrens 1137789Sahrens retry: 1138885Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1139885Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1140885Sahrens if (error != 0) { 1141789Sahrens /* 1142885Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1143789Sahrens * the objset is held exclusively. Fortunately this hold is 1144789Sahrens * only for a short while, so we retry here. 1145789Sahrens * This avoids user code having to handle EBUSY, 1146885Sahrens * for example for a "zfs list". 1147789Sahrens */ 1148789Sahrens if (error == EBUSY) { 1149789Sahrens delay(1); 1150789Sahrens goto retry; 1151789Sahrens } 1152789Sahrens if (error == ENOENT) 1153885Sahrens error = ESRCH; 1154789Sahrens return (error); 1155789Sahrens } 1156789Sahrens 11571003Slling /* 11581003Slling * A dataset name of maximum length cannot have any snapshots, 11591003Slling * so exit immediately. 11601003Slling */ 11611003Slling if (strlcat(zc->zc_name, "@", sizeof (zc->zc_name)) >= MAXNAMELEN) { 1162885Sahrens dmu_objset_close(os); 11631003Slling return (ESRCH); 1164789Sahrens } 1165789Sahrens 1166885Sahrens error = dmu_snapshot_list_next(os, 1167885Sahrens sizeof (zc->zc_name) - strlen(zc->zc_name), 1168885Sahrens zc->zc_name + strlen(zc->zc_name), NULL, &zc->zc_cookie); 1169789Sahrens if (error == ENOENT) 1170789Sahrens error = ESRCH; 1171789Sahrens 1172885Sahrens if (error == 0) 1173885Sahrens error = zfs_ioc_objset_stats(zc); /* fill in the stats */ 1174789Sahrens 1175885Sahrens dmu_objset_close(os); 1176789Sahrens return (error); 1177789Sahrens } 1178789Sahrens 1179789Sahrens static int 11802676Seschrock zfs_set_prop_nvlist(const char *name, dev_t dev, cred_t *cr, nvlist_t *nvl) 1181789Sahrens { 11822676Seschrock nvpair_t *elem; 11832676Seschrock int error; 11842676Seschrock const char *propname; 11852676Seschrock zfs_prop_t prop; 11862676Seschrock uint64_t intval; 11872676Seschrock char *strval; 11882676Seschrock 11894543Smarks /* 11904543Smarks * First validate permission to set all of the properties 11914543Smarks */ 11922676Seschrock elem = NULL; 11932676Seschrock while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) { 11942676Seschrock propname = nvpair_name(elem); 11952676Seschrock 11962676Seschrock if ((prop = zfs_name_to_prop(propname)) == 11972676Seschrock ZFS_PROP_INVAL) { 11982676Seschrock /* 11992676Seschrock * If this is a user-defined property, it must be a 12002676Seschrock * string, and there is no further validation to do. 12012676Seschrock */ 12022676Seschrock if (!zfs_prop_user(propname) || 12032676Seschrock nvpair_type(elem) != DATA_TYPE_STRING) 12042676Seschrock return (EINVAL); 12052676Seschrock 12064543Smarks error = zfs_secpolicy_write_perms(name, 12074543Smarks ZFS_DELEG_PERM_USERPROP, cr); 12084543Smarks if (error) { 12094543Smarks return (EPERM); 12104543Smarks } 12114543Smarks continue; 12122676Seschrock } 12132676Seschrock 12142676Seschrock /* 12154543Smarks * Check permissions for special properties 12162676Seschrock */ 12174543Smarks 12182676Seschrock switch (prop) { 12192676Seschrock case ZFS_PROP_ZONED: 12202676Seschrock /* 12212676Seschrock * Disallow setting of 'zoned' from within a local zone. 12222676Seschrock */ 12232676Seschrock if (!INGLOBALZONE(curproc)) 12242676Seschrock return (EPERM); 12252676Seschrock break; 12262676Seschrock 12272676Seschrock case ZFS_PROP_QUOTA: 12282676Seschrock if (error = zfs_dozonecheck(name, cr)) 12292676Seschrock return (error); 12302676Seschrock 12312676Seschrock if (!INGLOBALZONE(curproc)) { 12322676Seschrock uint64_t zoned; 12332676Seschrock char setpoint[MAXNAMELEN]; 12342676Seschrock int dslen; 12352676Seschrock /* 12362676Seschrock * Unprivileged users are allowed to modify the 12372676Seschrock * quota on things *under* (ie. contained by) 12382676Seschrock * the thing they own. 12392676Seschrock */ 12402676Seschrock if (dsl_prop_get_integer(name, "zoned", &zoned, 12412676Seschrock setpoint)) 12422676Seschrock return (EPERM); 12432676Seschrock if (!zoned) /* this shouldn't happen */ 12442676Seschrock return (EPERM); 12452676Seschrock dslen = strlen(name); 12462676Seschrock if (dslen <= strlen(setpoint)) 12472676Seschrock return (EPERM); 12482676Seschrock } 12493886Sahl break; 12503886Sahl 12513886Sahl case ZFS_PROP_COMPRESSION: 12523886Sahl /* 12533886Sahl * If the user specified gzip compression, make sure 12543886Sahl * the SPA supports it. We ignore any errors here since 12553886Sahl * we'll catch them later. 12563886Sahl */ 12573886Sahl if (nvpair_type(elem) == DATA_TYPE_UINT64 && 12583886Sahl nvpair_value_uint64(elem, &intval) == 0 && 12593886Sahl intval >= ZIO_COMPRESS_GZIP_1 && 12603886Sahl intval <= ZIO_COMPRESS_GZIP_9) { 12614543Smarks char buf[MAXNAMELEN]; 12624543Smarks spa_t *spa; 12634543Smarks const char *p; 12644543Smarks 12653886Sahl if ((p = strchr(name, '/')) == NULL) { 12663886Sahl p = name; 12673886Sahl } else { 12683886Sahl bcopy(name, buf, p - name); 12693886Sahl buf[p - name] = '\0'; 12703886Sahl p = buf; 12713886Sahl } 12723886Sahl 12733886Sahl if (spa_open(p, &spa, FTAG) == 0) { 12743886Sahl if (spa_version(spa) < 1275*4577Sahrens SPA_VERSION_GZIP_COMPRESSION) { 12763886Sahl spa_close(spa, FTAG); 12773886Sahl return (ENOTSUP); 12783886Sahl } 12793886Sahl 12803886Sahl spa_close(spa, FTAG); 12813886Sahl } 12823886Sahl } 12833886Sahl break; 12842676Seschrock } 12854543Smarks if ((error = zfs_secpolicy_setprop(name, prop, cr)) != 0) 12864543Smarks return (error); 12874543Smarks } 12884543Smarks 12894543Smarks elem = NULL; 12904543Smarks while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) { 12914543Smarks propname = nvpair_name(elem); 12924543Smarks 12934543Smarks if ((prop = zfs_name_to_prop(propname)) == 12944543Smarks ZFS_PROP_INVAL) { 12954543Smarks 12964543Smarks VERIFY(nvpair_value_string(elem, &strval) == 0); 12974543Smarks error = dsl_prop_set(name, propname, 1, 12984543Smarks strlen(strval) + 1, strval); 12994543Smarks if (error == 0) 13004543Smarks continue; 13014543Smarks else 13024543Smarks return (error); 13034543Smarks } 13042676Seschrock 13052676Seschrock switch (prop) { 13062676Seschrock case ZFS_PROP_QUOTA: 13072676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 1308*4577Sahrens (error = dsl_dir_set_quota(name, intval)) != 0) 13092676Seschrock return (error); 13102676Seschrock break; 13112676Seschrock 13122676Seschrock case ZFS_PROP_RESERVATION: 13132676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 13142676Seschrock (error = dsl_dir_set_reservation(name, 13152676Seschrock intval)) != 0) 13162676Seschrock return (error); 13172676Seschrock break; 1318789Sahrens 13192676Seschrock case ZFS_PROP_VOLSIZE: 13202676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 1321*4577Sahrens (error = zvol_set_volsize(name, dev, intval)) != 0) 13222676Seschrock return (error); 13232676Seschrock break; 13242676Seschrock 13252676Seschrock case ZFS_PROP_VOLBLOCKSIZE: 13262676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 1327*4577Sahrens (error = zvol_set_volblocksize(name, intval)) != 0) 1328*4577Sahrens return (error); 1329*4577Sahrens break; 1330*4577Sahrens 1331*4577Sahrens case ZFS_PROP_VERSION: 1332*4577Sahrens if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 1333*4577Sahrens (error = zfs_set_version(name, intval)) != 0) 13342676Seschrock return (error); 13352676Seschrock break; 13362676Seschrock 13372676Seschrock default: 13382676Seschrock if (nvpair_type(elem) == DATA_TYPE_STRING) { 13392676Seschrock if (zfs_prop_get_type(prop) != 13402676Seschrock prop_type_string) 13412676Seschrock return (EINVAL); 13422717Seschrock VERIFY(nvpair_value_string(elem, &strval) == 0); 13432717Seschrock if ((error = dsl_prop_set(name, 13442676Seschrock nvpair_name(elem), 1, strlen(strval) + 1, 13452717Seschrock strval)) != 0) 13462717Seschrock return (error); 13472676Seschrock } else if (nvpair_type(elem) == DATA_TYPE_UINT64) { 13482885Sahrens const char *unused; 13492885Sahrens 13502717Seschrock VERIFY(nvpair_value_uint64(elem, &intval) == 0); 13512676Seschrock 13522676Seschrock switch (zfs_prop_get_type(prop)) { 13532676Seschrock case prop_type_number: 13542676Seschrock break; 13552676Seschrock case prop_type_boolean: 13562676Seschrock if (intval > 1) 13572717Seschrock return (EINVAL); 13582676Seschrock break; 13592676Seschrock case prop_type_string: 13602717Seschrock return (EINVAL); 13612676Seschrock case prop_type_index: 13622717Seschrock if (zfs_prop_index_to_string(prop, 13632717Seschrock intval, &unused) != 0) 13642717Seschrock return (EINVAL); 13652676Seschrock break; 13662676Seschrock default: 1367*4577Sahrens cmn_err(CE_PANIC, 1368*4577Sahrens "unknown property type"); 13692676Seschrock break; 13702676Seschrock } 13712676Seschrock 13722717Seschrock if ((error = dsl_prop_set(name, propname, 13732717Seschrock 8, 1, &intval)) != 0) 13742717Seschrock return (error); 13752676Seschrock } else { 13762676Seschrock return (EINVAL); 13772676Seschrock } 13782676Seschrock break; 13792676Seschrock } 13802676Seschrock } 13812676Seschrock 13822676Seschrock return (0); 1383789Sahrens } 1384789Sahrens 1385789Sahrens static int 13862676Seschrock zfs_ioc_set_prop(zfs_cmd_t *zc) 1387789Sahrens { 13882676Seschrock nvlist_t *nvl; 13892676Seschrock int error; 13902676Seschrock zfs_prop_t prop; 1391789Sahrens 13922676Seschrock /* 13932676Seschrock * If zc_value is set, then this is an attempt to inherit a value. 13942676Seschrock * Otherwise, zc_nvlist refers to a list of properties to set. 13952676Seschrock */ 13962676Seschrock if (zc->zc_value[0] != '\0') { 13972676Seschrock if (!zfs_prop_user(zc->zc_value) && 13982676Seschrock ((prop = zfs_name_to_prop(zc->zc_value)) == 13992676Seschrock ZFS_PROP_INVAL || 14002676Seschrock !zfs_prop_inheritable(prop))) 14012676Seschrock return (EINVAL); 14022676Seschrock 14032676Seschrock return (dsl_prop_set(zc->zc_name, zc->zc_value, 0, 0, NULL)); 14042676Seschrock } 14052676Seschrock 14062676Seschrock if ((error = get_nvlist(zc, &nvl)) != 0) 14072676Seschrock return (error); 14082676Seschrock 14092676Seschrock error = zfs_set_prop_nvlist(zc->zc_name, zc->zc_dev, 14102676Seschrock (cred_t *)(uintptr_t)zc->zc_cred, nvl); 14114543Smarks 14122676Seschrock nvlist_free(nvl); 14132676Seschrock return (error); 1414789Sahrens } 1415789Sahrens 1416789Sahrens static int 14174098Slling zfs_ioc_pool_set_props(zfs_cmd_t *zc) 14183912Slling { 14193912Slling nvlist_t *nvl; 14203912Slling int error, reset_bootfs = 0; 14213912Slling uint64_t objnum; 14224543Smarks uint64_t intval; 14233912Slling zpool_prop_t prop; 14243912Slling nvpair_t *elem; 14253912Slling char *propname, *strval; 14263912Slling spa_t *spa; 14273912Slling vdev_t *rvdev; 14283912Slling char *vdev_type; 14293912Slling objset_t *os; 14303912Slling 14313912Slling if ((error = get_nvlist(zc, &nvl)) != 0) 14323912Slling return (error); 14333912Slling 14343912Slling if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) { 14353912Slling nvlist_free(nvl); 14363912Slling return (error); 14373912Slling } 14383912Slling 1439*4577Sahrens if (spa_version(spa) < SPA_VERSION_BOOTFS) { 14403912Slling nvlist_free(nvl); 14413912Slling spa_close(spa, FTAG); 14423912Slling return (ENOTSUP); 14433912Slling } 14443912Slling 14453912Slling elem = NULL; 14463912Slling while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) { 14473912Slling 14483912Slling propname = nvpair_name(elem); 14493912Slling 14503912Slling if ((prop = zpool_name_to_prop(propname)) == 14513912Slling ZFS_PROP_INVAL) { 14523912Slling nvlist_free(nvl); 14533912Slling spa_close(spa, FTAG); 14543912Slling return (EINVAL); 14553912Slling } 14563912Slling 14573912Slling switch (prop) { 14584543Smarks case ZPOOL_PROP_DELEGATION: 14594543Smarks VERIFY(nvpair_value_uint64(elem, &intval) == 0); 14604543Smarks if (intval > 1) 14614543Smarks error = EINVAL; 14624543Smarks break; 14634451Seschrock case ZPOOL_PROP_BOOTFS: 14643912Slling /* 14653912Slling * A bootable filesystem can not be on a RAIDZ pool 14663912Slling * nor a striped pool with more than 1 device. 14673912Slling */ 14683912Slling rvdev = spa->spa_root_vdev; 14693912Slling vdev_type = 14703912Slling rvdev->vdev_child[0]->vdev_ops->vdev_op_type; 14713912Slling if (strcmp(vdev_type, VDEV_TYPE_RAIDZ) == 0 || 14723912Slling (strcmp(vdev_type, VDEV_TYPE_MIRROR) != 0 && 14733912Slling rvdev->vdev_children > 1)) { 14743912Slling error = ENOTSUP; 14753912Slling break; 14763912Slling } 14773912Slling 14783912Slling reset_bootfs = 1; 14793912Slling 14803912Slling VERIFY(nvpair_value_string(elem, &strval) == 0); 14813912Slling if (strval == NULL || strval[0] == '\0') { 14824451Seschrock objnum = zpool_prop_default_numeric( 14834451Seschrock ZPOOL_PROP_BOOTFS); 14843912Slling break; 14853912Slling } 14863912Slling 14873912Slling if (error = dmu_objset_open(strval, DMU_OST_ZFS, 14883912Slling DS_MODE_STANDARD | DS_MODE_READONLY, &os)) 14893912Slling break; 14903912Slling objnum = dmu_objset_id(os); 14913912Slling dmu_objset_close(os); 14923912Slling break; 14933912Slling } 14943912Slling 14953912Slling if (error) 14963912Slling break; 14973912Slling } 14983912Slling if (error == 0) { 14993912Slling if (reset_bootfs) { 15003912Slling VERIFY(nvlist_remove(nvl, 15014451Seschrock zpool_prop_to_name(ZPOOL_PROP_BOOTFS), 15023912Slling DATA_TYPE_STRING) == 0); 15033912Slling VERIFY(nvlist_add_uint64(nvl, 15044451Seschrock zpool_prop_to_name(ZPOOL_PROP_BOOTFS), 15054451Seschrock objnum) == 0); 15063912Slling } 15073912Slling error = spa_set_props(spa, nvl); 15083912Slling } 15093912Slling 15103912Slling nvlist_free(nvl); 15113912Slling spa_close(spa, FTAG); 15123912Slling 15133912Slling return (error); 15143912Slling } 15153912Slling 15163912Slling static int 15174098Slling zfs_ioc_pool_get_props(zfs_cmd_t *zc) 15183912Slling { 15193912Slling spa_t *spa; 15203912Slling int error; 15213912Slling nvlist_t *nvp = NULL; 15223912Slling 15233912Slling if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 15243912Slling return (error); 15253912Slling 15263912Slling error = spa_get_props(spa, &nvp); 15273912Slling 15283912Slling if (error == 0 && zc->zc_nvlist_dst != NULL) 15293912Slling error = put_nvlist(zc, nvp); 15303912Slling else 15313912Slling error = EFAULT; 15323912Slling 15333912Slling spa_close(spa, FTAG); 15343912Slling 15353912Slling if (nvp) 15363912Slling nvlist_free(nvp); 15373912Slling return (error); 15383912Slling } 15393912Slling 15403912Slling static int 15414543Smarks zfs_ioc_iscsi_perm_check(zfs_cmd_t *zc) 15424543Smarks { 15434543Smarks nvlist_t *nvp; 15444543Smarks int error; 15454543Smarks uint32_t uid; 15464543Smarks uint32_t gid; 15474543Smarks uint32_t *groups; 15484543Smarks uint_t group_cnt; 15494543Smarks cred_t *usercred; 15504543Smarks 15514543Smarks if ((error = get_nvlist(zc, &nvp)) != 0) { 15524543Smarks return (error); 15534543Smarks } 15544543Smarks 15554543Smarks if ((error = nvlist_lookup_uint32(nvp, 15564543Smarks ZFS_DELEG_PERM_UID, &uid)) != 0) { 15574543Smarks nvlist_free(nvp); 15584543Smarks return (EPERM); 15594543Smarks } 15604543Smarks 15614543Smarks if ((error = nvlist_lookup_uint32(nvp, 15624543Smarks ZFS_DELEG_PERM_GID, &gid)) != 0) { 15634543Smarks nvlist_free(nvp); 15644543Smarks return (EPERM); 15654543Smarks } 15664543Smarks 15674543Smarks if ((error = nvlist_lookup_uint32_array(nvp, ZFS_DELEG_PERM_GROUPS, 15684543Smarks &groups, &group_cnt)) != 0) { 15694543Smarks nvlist_free(nvp); 15704543Smarks return (EPERM); 15714543Smarks } 15724543Smarks usercred = cralloc(); 15734543Smarks if ((crsetugid(usercred, uid, gid) != 0) || 15744543Smarks (crsetgroups(usercred, group_cnt, (gid_t *)groups) != 0)) { 15754543Smarks nvlist_free(nvp); 15764543Smarks crfree(usercred); 15774543Smarks return (EPERM); 15784543Smarks } 15794543Smarks nvlist_free(nvp); 15804543Smarks error = dsl_deleg_access(zc->zc_name, 15814543Smarks ZFS_DELEG_PERM_SHAREISCSI, usercred); 15824543Smarks crfree(usercred); 15834543Smarks return (error); 15844543Smarks } 15854543Smarks 15864543Smarks static int 15874543Smarks zfs_ioc_set_fsacl(zfs_cmd_t *zc) 15884543Smarks { 15894543Smarks int error; 15904543Smarks nvlist_t *fsaclnv = NULL; 15914543Smarks cred_t *cr; 15924543Smarks 15934543Smarks if ((error = get_nvlist(zc, &fsaclnv)) != 0) 15944543Smarks return (error); 15954543Smarks 15964543Smarks /* 15974543Smarks * Verify nvlist is constructed correctly 15984543Smarks */ 15994543Smarks if ((error = zfs_deleg_verify_nvlist(fsaclnv)) != 0) { 16004543Smarks nvlist_free(fsaclnv); 16014543Smarks return (EINVAL); 16024543Smarks } 16034543Smarks 16044543Smarks /* 16054543Smarks * If we don't have PRIV_SYS_MOUNT, then validate 16064543Smarks * that user is allowed to hand out each permission in 16074543Smarks * the nvlist(s) 16084543Smarks */ 16094543Smarks 16104543Smarks cr = (cred_t *)(uintptr_t)zc->zc_cred; 16114543Smarks error = secpolicy_zfs(cr); 16124543Smarks if (error) { 16134543Smarks if (zc->zc_perm_action == B_FALSE) 16144543Smarks error = dsl_deleg_can_allow(zc->zc_name, fsaclnv, cr); 16154543Smarks else 16164543Smarks error = dsl_deleg_can_unallow(zc->zc_name, fsaclnv, cr); 16174543Smarks } 16184543Smarks 16194543Smarks if (error == 0) 16204543Smarks error = dsl_deleg_set(zc->zc_name, fsaclnv, zc->zc_perm_action); 16214543Smarks 16224543Smarks nvlist_free(fsaclnv); 16234543Smarks return (error); 16244543Smarks } 16254543Smarks 16264543Smarks static int 16274543Smarks zfs_ioc_get_fsacl(zfs_cmd_t *zc) 16284543Smarks { 16294543Smarks nvlist_t *nvp; 16304543Smarks int error; 16314543Smarks 16324543Smarks if ((error = dsl_deleg_get(zc->zc_name, &nvp)) == 0) { 16334543Smarks error = put_nvlist(zc, nvp); 16344543Smarks nvlist_free(nvp); 16354543Smarks } 16364543Smarks 16374543Smarks return (error); 16384543Smarks } 16394543Smarks 16404543Smarks static int 1641789Sahrens zfs_ioc_create_minor(zfs_cmd_t *zc) 1642789Sahrens { 16432676Seschrock return (zvol_create_minor(zc->zc_name, zc->zc_dev)); 1644789Sahrens } 1645789Sahrens 1646789Sahrens static int 1647789Sahrens zfs_ioc_remove_minor(zfs_cmd_t *zc) 1648789Sahrens { 16492676Seschrock return (zvol_remove_minor(zc->zc_name)); 1650789Sahrens } 1651789Sahrens 1652789Sahrens /* 1653789Sahrens * Search the vfs list for a specified resource. Returns a pointer to it 1654789Sahrens * or NULL if no suitable entry is found. The caller of this routine 1655789Sahrens * is responsible for releasing the returned vfs pointer. 1656789Sahrens */ 1657789Sahrens static vfs_t * 1658789Sahrens zfs_get_vfs(const char *resource) 1659789Sahrens { 1660789Sahrens struct vfs *vfsp; 1661789Sahrens struct vfs *vfs_found = NULL; 1662789Sahrens 1663789Sahrens vfs_list_read_lock(); 1664789Sahrens vfsp = rootvfs; 1665789Sahrens do { 1666789Sahrens if (strcmp(refstr_value(vfsp->vfs_resource), resource) == 0) { 1667789Sahrens VFS_HOLD(vfsp); 1668789Sahrens vfs_found = vfsp; 1669789Sahrens break; 1670789Sahrens } 1671789Sahrens vfsp = vfsp->vfs_next; 1672789Sahrens } while (vfsp != rootvfs); 1673789Sahrens vfs_list_unlock(); 1674789Sahrens return (vfs_found); 1675789Sahrens } 1676789Sahrens 16774543Smarks /* ARGSUSED */ 1678789Sahrens static void 16794543Smarks zfs_create_cb(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx) 1680789Sahrens { 1681*4577Sahrens nvlist_t *nvprops = arg; 1682*4577Sahrens uint64_t version = ZPL_VERSION; 1683*4577Sahrens 1684*4577Sahrens (void) nvlist_lookup_uint64(nvprops, 1685*4577Sahrens zfs_prop_to_name(ZFS_PROP_VERSION), &version); 1686*4577Sahrens 1687*4577Sahrens zfs_create_fs(os, cr, version, tx); 1688789Sahrens } 1689789Sahrens 1690789Sahrens static int 1691789Sahrens zfs_ioc_create(zfs_cmd_t *zc) 1692789Sahrens { 1693789Sahrens objset_t *clone; 1694789Sahrens int error = 0; 16954543Smarks nvlist_t *nvprops = NULL; 16964543Smarks void (*cbfunc)(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx); 1697789Sahrens dmu_objset_type_t type = zc->zc_objset_type; 1698789Sahrens 1699789Sahrens switch (type) { 1700789Sahrens 1701789Sahrens case DMU_OST_ZFS: 1702789Sahrens cbfunc = zfs_create_cb; 1703789Sahrens break; 1704789Sahrens 1705789Sahrens case DMU_OST_ZVOL: 1706789Sahrens cbfunc = zvol_create_cb; 1707789Sahrens break; 1708789Sahrens 1709789Sahrens default: 17102199Sahrens cbfunc = NULL; 17112199Sahrens } 17122199Sahrens if (strchr(zc->zc_name, '@')) 1713789Sahrens return (EINVAL); 1714789Sahrens 17152676Seschrock if (zc->zc_nvlist_src != NULL && 17164543Smarks (error = get_nvlist(zc, &nvprops)) != 0) 17172676Seschrock return (error); 17182676Seschrock 17192676Seschrock if (zc->zc_value[0] != '\0') { 1720789Sahrens /* 1721789Sahrens * We're creating a clone of an existing snapshot. 1722789Sahrens */ 17232676Seschrock zc->zc_value[sizeof (zc->zc_value) - 1] = '\0'; 17242676Seschrock if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0) { 17254543Smarks nvlist_free(nvprops); 1726789Sahrens return (EINVAL); 17272676Seschrock } 1728789Sahrens 17292676Seschrock error = dmu_objset_open(zc->zc_value, type, 1730789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &clone); 17312676Seschrock if (error) { 17324543Smarks nvlist_free(nvprops); 1733789Sahrens return (error); 17342676Seschrock } 1735789Sahrens error = dmu_objset_create(zc->zc_name, type, clone, NULL, NULL); 1736789Sahrens dmu_objset_close(clone); 1737789Sahrens } else { 17382676Seschrock if (cbfunc == NULL) { 17394543Smarks nvlist_free(nvprops); 17402199Sahrens return (EINVAL); 17412676Seschrock } 17422676Seschrock 1743789Sahrens if (type == DMU_OST_ZVOL) { 17442676Seschrock uint64_t volsize, volblocksize; 17452676Seschrock 17464543Smarks if (nvprops == NULL || 17474543Smarks nvlist_lookup_uint64(nvprops, 17482676Seschrock zfs_prop_to_name(ZFS_PROP_VOLSIZE), 17492676Seschrock &volsize) != 0) { 17504543Smarks nvlist_free(nvprops); 17512676Seschrock return (EINVAL); 17522676Seschrock } 17532676Seschrock 17544543Smarks if ((error = nvlist_lookup_uint64(nvprops, 17552676Seschrock zfs_prop_to_name(ZFS_PROP_VOLBLOCKSIZE), 17562676Seschrock &volblocksize)) != 0 && error != ENOENT) { 17574543Smarks nvlist_free(nvprops); 17582676Seschrock return (EINVAL); 17592676Seschrock } 17601133Seschrock 17612676Seschrock if (error != 0) 17622676Seschrock volblocksize = zfs_prop_default_numeric( 17632676Seschrock ZFS_PROP_VOLBLOCKSIZE); 17642676Seschrock 17652676Seschrock if ((error = zvol_check_volblocksize( 17662676Seschrock volblocksize)) != 0 || 17672676Seschrock (error = zvol_check_volsize(volsize, 17682676Seschrock volblocksize)) != 0) { 17694543Smarks nvlist_free(nvprops); 1770789Sahrens return (error); 17712676Seschrock } 1772*4577Sahrens } else if (type == DMU_OST_ZFS) { 1773*4577Sahrens uint64_t version; 1774*4577Sahrens 1775*4577Sahrens if (0 == nvlist_lookup_uint64(nvprops, 1776*4577Sahrens zfs_prop_to_name(ZFS_PROP_VERSION), &version) && 1777*4577Sahrens (version < ZPL_VERSION_INITIAL || 1778*4577Sahrens version > ZPL_VERSION)) { 1779*4577Sahrens nvlist_free(nvprops); 1780*4577Sahrens return (EINVAL); 1781*4577Sahrens } 17822676Seschrock } 17831133Seschrock 17842676Seschrock error = dmu_objset_create(zc->zc_name, type, NULL, cbfunc, 17854543Smarks nvprops); 1786789Sahrens } 17872676Seschrock 17882676Seschrock /* 17892676Seschrock * It would be nice to do this atomically. 17902676Seschrock */ 17912676Seschrock if (error == 0) { 17922676Seschrock if ((error = zfs_set_prop_nvlist(zc->zc_name, 17932676Seschrock zc->zc_dev, (cred_t *)(uintptr_t)zc->zc_cred, 17944543Smarks nvprops)) != 0) 17952676Seschrock (void) dmu_objset_destroy(zc->zc_name); 17962676Seschrock } 17972676Seschrock 17984543Smarks nvlist_free(nvprops); 1799789Sahrens return (error); 1800789Sahrens } 1801789Sahrens 1802789Sahrens static int 18032199Sahrens zfs_ioc_snapshot(zfs_cmd_t *zc) 18042199Sahrens { 18052676Seschrock if (snapshot_namecheck(zc->zc_value, NULL, NULL) != 0) 18062199Sahrens return (EINVAL); 18072199Sahrens return (dmu_objset_snapshot(zc->zc_name, 18082676Seschrock zc->zc_value, zc->zc_cookie)); 18092199Sahrens } 18102199Sahrens 18114007Smmusante int 18122199Sahrens zfs_unmount_snap(char *name, void *arg) 1813789Sahrens { 18142199Sahrens char *snapname = arg; 18152199Sahrens char *cp; 18162417Sahrens vfs_t *vfsp = NULL; 18172199Sahrens 18182199Sahrens /* 18192199Sahrens * Snapshots (which are under .zfs control) must be unmounted 18202199Sahrens * before they can be destroyed. 18212199Sahrens */ 18222199Sahrens 18232199Sahrens if (snapname) { 18242199Sahrens (void) strcat(name, "@"); 18252199Sahrens (void) strcat(name, snapname); 18262199Sahrens vfsp = zfs_get_vfs(name); 18272199Sahrens cp = strchr(name, '@'); 18282199Sahrens *cp = '\0'; 18292417Sahrens } else if (strchr(name, '@')) { 18302199Sahrens vfsp = zfs_get_vfs(name); 18312199Sahrens } 18322199Sahrens 18332199Sahrens if (vfsp) { 18342199Sahrens /* 18352199Sahrens * Always force the unmount for snapshots. 18362199Sahrens */ 18372199Sahrens int flag = MS_FORCE; 1838789Sahrens int err; 1839789Sahrens 18402199Sahrens if ((err = vn_vfswlock(vfsp->vfs_vnodecovered)) != 0) { 18412199Sahrens VFS_RELE(vfsp); 18422199Sahrens return (err); 18432199Sahrens } 18442199Sahrens VFS_RELE(vfsp); 18452199Sahrens if ((err = dounmount(vfsp, flag, kcred)) != 0) 18462199Sahrens return (err); 18472199Sahrens } 18482199Sahrens return (0); 18492199Sahrens } 18502199Sahrens 18512199Sahrens static int 18522199Sahrens zfs_ioc_destroy_snaps(zfs_cmd_t *zc) 18532199Sahrens { 18542199Sahrens int err; 1855789Sahrens 18562676Seschrock if (snapshot_namecheck(zc->zc_value, NULL, NULL) != 0) 18572199Sahrens return (EINVAL); 18582199Sahrens err = dmu_objset_find(zc->zc_name, 18592676Seschrock zfs_unmount_snap, zc->zc_value, DS_FIND_CHILDREN); 18602199Sahrens if (err) 18612199Sahrens return (err); 18622676Seschrock return (dmu_snapshots_destroy(zc->zc_name, zc->zc_value)); 18632199Sahrens } 18642199Sahrens 18652199Sahrens static int 18662199Sahrens zfs_ioc_destroy(zfs_cmd_t *zc) 18672199Sahrens { 18682199Sahrens if (strchr(zc->zc_name, '@') && zc->zc_objset_type == DMU_OST_ZFS) { 18692199Sahrens int err = zfs_unmount_snap(zc->zc_name, NULL); 18702199Sahrens if (err) 18712199Sahrens return (err); 1872789Sahrens } 1873789Sahrens 1874789Sahrens return (dmu_objset_destroy(zc->zc_name)); 1875789Sahrens } 1876789Sahrens 1877789Sahrens static int 1878789Sahrens zfs_ioc_rollback(zfs_cmd_t *zc) 1879789Sahrens { 1880789Sahrens return (dmu_objset_rollback(zc->zc_name)); 1881789Sahrens } 1882789Sahrens 1883789Sahrens static int 1884789Sahrens zfs_ioc_rename(zfs_cmd_t *zc) 1885789Sahrens { 18864490Svb160487 boolean_t recursive = zc->zc_cookie & 1; 18874007Smmusante 18882676Seschrock zc->zc_value[sizeof (zc->zc_value) - 1] = '\0'; 18892676Seschrock if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0) 1890789Sahrens return (EINVAL); 1891789Sahrens 18924007Smmusante /* 18934007Smmusante * Unmount snapshot unless we're doing a recursive rename, 18944007Smmusante * in which case the dataset code figures out which snapshots 18954007Smmusante * to unmount. 18964007Smmusante */ 18974007Smmusante if (!recursive && strchr(zc->zc_name, '@') != NULL && 1898789Sahrens zc->zc_objset_type == DMU_OST_ZFS) { 18992199Sahrens int err = zfs_unmount_snap(zc->zc_name, NULL); 19002199Sahrens if (err) 19012199Sahrens return (err); 1902789Sahrens } 1903789Sahrens 19044007Smmusante return (dmu_objset_rename(zc->zc_name, zc->zc_value, recursive)); 1905789Sahrens } 1906789Sahrens 1907789Sahrens static int 1908789Sahrens zfs_ioc_recvbackup(zfs_cmd_t *zc) 1909789Sahrens { 1910789Sahrens file_t *fp; 1911789Sahrens int error, fd; 19122885Sahrens offset_t new_off; 1913789Sahrens 19143265Sahrens if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0 || 19153265Sahrens strchr(zc->zc_value, '@') == NULL) 19163265Sahrens return (EINVAL); 19173265Sahrens 1918789Sahrens fd = zc->zc_cookie; 1919789Sahrens fp = getf(fd); 1920789Sahrens if (fp == NULL) 1921789Sahrens return (EBADF); 19222676Seschrock error = dmu_recvbackup(zc->zc_value, &zc->zc_begin_record, 19232676Seschrock &zc->zc_cookie, (boolean_t)zc->zc_guid, fp->f_vnode, 19242665Snd150628 fp->f_offset); 19252885Sahrens 19262885Sahrens new_off = fp->f_offset + zc->zc_cookie; 19272885Sahrens if (VOP_SEEK(fp->f_vnode, fp->f_offset, &new_off) == 0) 19282885Sahrens fp->f_offset = new_off; 19292885Sahrens 1930789Sahrens releasef(fd); 1931789Sahrens return (error); 1932789Sahrens } 1933789Sahrens 1934789Sahrens static int 1935789Sahrens zfs_ioc_sendbackup(zfs_cmd_t *zc) 1936789Sahrens { 1937789Sahrens objset_t *fromsnap = NULL; 1938789Sahrens objset_t *tosnap; 1939789Sahrens file_t *fp; 1940789Sahrens int error; 1941789Sahrens 1942789Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1943789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &tosnap); 1944789Sahrens if (error) 1945789Sahrens return (error); 1946789Sahrens 19472676Seschrock if (zc->zc_value[0] != '\0') { 19482885Sahrens char buf[MAXPATHLEN]; 19492885Sahrens char *cp; 19502885Sahrens 19512885Sahrens (void) strncpy(buf, zc->zc_name, sizeof (buf)); 19522885Sahrens cp = strchr(buf, '@'); 19532885Sahrens if (cp) 19542885Sahrens *(cp+1) = 0; 19552885Sahrens (void) strncat(buf, zc->zc_value, sizeof (buf)); 19562885Sahrens error = dmu_objset_open(buf, DMU_OST_ANY, 1957789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &fromsnap); 1958789Sahrens if (error) { 1959789Sahrens dmu_objset_close(tosnap); 1960789Sahrens return (error); 1961789Sahrens } 1962789Sahrens } 1963789Sahrens 1964789Sahrens fp = getf(zc->zc_cookie); 1965789Sahrens if (fp == NULL) { 1966789Sahrens dmu_objset_close(tosnap); 1967789Sahrens if (fromsnap) 1968789Sahrens dmu_objset_close(fromsnap); 1969789Sahrens return (EBADF); 1970789Sahrens } 1971789Sahrens 1972789Sahrens error = dmu_sendbackup(tosnap, fromsnap, fp->f_vnode); 1973789Sahrens 1974789Sahrens releasef(zc->zc_cookie); 1975789Sahrens if (fromsnap) 1976789Sahrens dmu_objset_close(fromsnap); 1977789Sahrens dmu_objset_close(tosnap); 1978789Sahrens return (error); 1979789Sahrens } 1980789Sahrens 19811544Seschrock static int 19821544Seschrock zfs_ioc_inject_fault(zfs_cmd_t *zc) 19831544Seschrock { 19841544Seschrock int id, error; 19851544Seschrock 19861544Seschrock error = zio_inject_fault(zc->zc_name, (int)zc->zc_guid, &id, 19871544Seschrock &zc->zc_inject_record); 19881544Seschrock 19891544Seschrock if (error == 0) 19901544Seschrock zc->zc_guid = (uint64_t)id; 19911544Seschrock 19921544Seschrock return (error); 19931544Seschrock } 19941544Seschrock 19951544Seschrock static int 19961544Seschrock zfs_ioc_clear_fault(zfs_cmd_t *zc) 19971544Seschrock { 19981544Seschrock return (zio_clear_fault((int)zc->zc_guid)); 19991544Seschrock } 20001544Seschrock 20011544Seschrock static int 20021544Seschrock zfs_ioc_inject_list_next(zfs_cmd_t *zc) 20031544Seschrock { 20041544Seschrock int id = (int)zc->zc_guid; 20051544Seschrock int error; 20061544Seschrock 20071544Seschrock error = zio_inject_list_next(&id, zc->zc_name, sizeof (zc->zc_name), 20081544Seschrock &zc->zc_inject_record); 20091544Seschrock 20101544Seschrock zc->zc_guid = id; 20111544Seschrock 20121544Seschrock return (error); 20131544Seschrock } 20141544Seschrock 20151544Seschrock static int 20161544Seschrock zfs_ioc_error_log(zfs_cmd_t *zc) 20171544Seschrock { 20181544Seschrock spa_t *spa; 20191544Seschrock int error; 20202676Seschrock size_t count = (size_t)zc->zc_nvlist_dst_size; 20211544Seschrock 20221544Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 20231544Seschrock return (error); 20241544Seschrock 20252676Seschrock error = spa_get_errlog(spa, (void *)(uintptr_t)zc->zc_nvlist_dst, 20261544Seschrock &count); 20271544Seschrock if (error == 0) 20282676Seschrock zc->zc_nvlist_dst_size = count; 20291544Seschrock else 20302676Seschrock zc->zc_nvlist_dst_size = spa_get_errlog_size(spa); 20311544Seschrock 20321544Seschrock spa_close(spa, FTAG); 20331544Seschrock 20341544Seschrock return (error); 20351544Seschrock } 20361544Seschrock 20371544Seschrock static int 20381544Seschrock zfs_ioc_clear(zfs_cmd_t *zc) 20391544Seschrock { 20401544Seschrock spa_t *spa; 20411544Seschrock vdev_t *vd; 20421544Seschrock int error; 20434451Seschrock uint64_t txg; 20441544Seschrock 20451544Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 20461544Seschrock return (error); 20471544Seschrock 20484451Seschrock txg = spa_vdev_enter(spa); 20491544Seschrock 20502676Seschrock if (zc->zc_guid == 0) { 20511544Seschrock vd = NULL; 20522676Seschrock } else if ((vd = spa_lookup_by_guid(spa, zc->zc_guid)) == NULL) { 20534451Seschrock (void) spa_vdev_exit(spa, NULL, txg, ENODEV); 20541544Seschrock spa_close(spa, FTAG); 20551544Seschrock return (ENODEV); 20561544Seschrock } 20571544Seschrock 20581544Seschrock vdev_clear(spa, vd); 20591544Seschrock 20604451Seschrock (void) spa_vdev_exit(spa, NULL, txg, 0); 20611544Seschrock 20621544Seschrock spa_close(spa, FTAG); 20631544Seschrock 20641544Seschrock return (0); 20651544Seschrock } 20661544Seschrock 20671544Seschrock static int 20682082Seschrock zfs_ioc_promote(zfs_cmd_t *zc) 20692082Seschrock { 20702417Sahrens char *cp; 20712417Sahrens 20722417Sahrens /* 20732417Sahrens * We don't need to unmount *all* the origin fs's snapshots, but 20742417Sahrens * it's easier. 20752417Sahrens */ 20762676Seschrock cp = strchr(zc->zc_value, '@'); 20772417Sahrens if (cp) 20782417Sahrens *cp = '\0'; 20792676Seschrock (void) dmu_objset_find(zc->zc_value, 20802417Sahrens zfs_unmount_snap, NULL, DS_FIND_SNAPSHOTS); 20812082Seschrock return (dsl_dataset_promote(zc->zc_name)); 20822082Seschrock } 20832082Seschrock 20844543Smarks /* 20854543Smarks * We don't want to have a hard dependency 20864543Smarks * against some special symbols in sharefs 20874543Smarks * and nfs. Determine them if needed when 20884543Smarks * the first file system is shared. 20894543Smarks * Neither sharefs or nfs are unloadable modules. 20904543Smarks */ 20914543Smarks int (*zexport_fs)(void *arg); 20924543Smarks int (*zshare_fs)(enum sharefs_sys_op, share_t *, uint32_t); 20934543Smarks 20944543Smarks int zfs_share_inited; 20954543Smarks ddi_modhandle_t nfs_mod; 20964543Smarks ddi_modhandle_t sharefs_mod; 20974543Smarks kmutex_t zfs_share_lock; 20984543Smarks 20994543Smarks static int 21004543Smarks zfs_ioc_share(zfs_cmd_t *zc) 21014543Smarks { 21024543Smarks int error; 21034543Smarks int opcode; 21044543Smarks 21054543Smarks if (zfs_share_inited == 0) { 21064543Smarks mutex_enter(&zfs_share_lock); 21074543Smarks nfs_mod = ddi_modopen("fs/nfs", KRTLD_MODE_FIRST, &error); 21084543Smarks sharefs_mod = ddi_modopen("fs/sharefs", 21094543Smarks KRTLD_MODE_FIRST, &error); 21104543Smarks if (nfs_mod == NULL || sharefs_mod == NULL) { 21114543Smarks mutex_exit(&zfs_share_lock); 21124543Smarks return (ENOSYS); 21134543Smarks } 21144543Smarks if (zexport_fs == NULL && ((zexport_fs = (int (*)(void *)) 21154543Smarks ddi_modsym(nfs_mod, "nfs_export", &error)) == NULL)) { 21164543Smarks mutex_exit(&zfs_share_lock); 21174543Smarks return (ENOSYS); 21184543Smarks } 21194543Smarks 21204543Smarks if (zshare_fs == NULL && ((zshare_fs = 21214543Smarks (int (*)(enum sharefs_sys_op, share_t *, uint32_t)) 21224543Smarks ddi_modsym(sharefs_mod, "sharefs_impl", &error)) == NULL)) { 21234543Smarks mutex_exit(&zfs_share_lock); 21244543Smarks return (ENOSYS); 21254543Smarks } 21264543Smarks zfs_share_inited = 1; 21274543Smarks mutex_exit(&zfs_share_lock); 21284543Smarks } 21294543Smarks 21304543Smarks if (error = zexport_fs((void *)(uintptr_t)zc->zc_share.z_exportdata)) 21314543Smarks return (error); 21324543Smarks 21334543Smarks opcode = (zc->zc_share.z_sharetype == B_TRUE) ? 21344543Smarks SHAREFS_ADD : SHAREFS_REMOVE; 21354543Smarks 21364543Smarks error = zshare_fs(opcode, 21374543Smarks (void *)(uintptr_t)zc->zc_share.z_sharedata, 21384543Smarks zc->zc_share.z_sharemax); 21394543Smarks 21404543Smarks return (error); 21414543Smarks 21424543Smarks } 21434543Smarks 21444543Smarks /* 21454543Smarks * pool destroy and pool export don't log the history as part of zfsdev_ioctl, 21464543Smarks * but rather zfs_ioc_pool_create, and zfs_ioc_pool_export do the loggin 21474543Smarks * of those commands. 21484543Smarks */ 2149789Sahrens static zfs_ioc_vec_t zfs_ioc_vec[] = { 2150*4577Sahrens { zfs_ioc_pool_create, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2151*4577Sahrens { zfs_ioc_pool_destroy, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 2152*4577Sahrens { zfs_ioc_pool_import, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2153*4577Sahrens { zfs_ioc_pool_export, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 2154*4577Sahrens { zfs_ioc_pool_configs, zfs_secpolicy_none, NO_NAME, B_FALSE }, 2155*4577Sahrens { zfs_ioc_pool_stats, zfs_secpolicy_read, POOL_NAME, B_FALSE }, 2156*4577Sahrens { zfs_ioc_pool_tryimport, zfs_secpolicy_config, NO_NAME, B_FALSE }, 2157*4577Sahrens { zfs_ioc_pool_scrub, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2158*4577Sahrens { zfs_ioc_pool_freeze, zfs_secpolicy_config, NO_NAME, B_FALSE }, 2159*4577Sahrens { zfs_ioc_pool_upgrade, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2160*4577Sahrens { zfs_ioc_pool_get_history, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 2161*4577Sahrens { zfs_ioc_vdev_add, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2162*4577Sahrens { zfs_ioc_vdev_remove, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2163*4577Sahrens { zfs_ioc_vdev_set_state, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2164*4577Sahrens { zfs_ioc_vdev_attach, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2165*4577Sahrens { zfs_ioc_vdev_detach, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2166*4577Sahrens { zfs_ioc_vdev_setpath, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 2167*4577Sahrens { zfs_ioc_objset_stats, zfs_secpolicy_read, DATASET_NAME, B_FALSE }, 21684543Smarks { zfs_ioc_dataset_list_next, zfs_secpolicy_read, 2169*4577Sahrens DATASET_NAME, B_FALSE }, 21704543Smarks { zfs_ioc_snapshot_list_next, zfs_secpolicy_read, 2171*4577Sahrens DATASET_NAME, B_FALSE }, 2172*4577Sahrens { zfs_ioc_set_prop, zfs_secpolicy_none, DATASET_NAME, B_TRUE }, 2173*4577Sahrens { zfs_ioc_create_minor, zfs_secpolicy_minor, DATASET_NAME, B_FALSE }, 2174*4577Sahrens { zfs_ioc_remove_minor, zfs_secpolicy_minor, DATASET_NAME, B_FALSE }, 2175*4577Sahrens { zfs_ioc_create, zfs_secpolicy_create, DATASET_NAME, B_TRUE }, 2176*4577Sahrens { zfs_ioc_destroy, zfs_secpolicy_destroy, DATASET_NAME, B_TRUE }, 2177*4577Sahrens { zfs_ioc_rollback, zfs_secpolicy_rollback, DATASET_NAME, B_TRUE }, 2178*4577Sahrens { zfs_ioc_rename, zfs_secpolicy_rename, DATASET_NAME, B_TRUE }, 2179*4577Sahrens { zfs_ioc_recvbackup, zfs_secpolicy_receive, DATASET_NAME, B_TRUE }, 2180*4577Sahrens { zfs_ioc_sendbackup, zfs_secpolicy_send, DATASET_NAME, B_TRUE }, 2181*4577Sahrens { zfs_ioc_inject_fault, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 2182*4577Sahrens { zfs_ioc_clear_fault, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 2183*4577Sahrens { zfs_ioc_inject_list_next, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 2184*4577Sahrens { zfs_ioc_error_log, zfs_secpolicy_inject, POOL_NAME, B_FALSE }, 2185*4577Sahrens { zfs_ioc_clear, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2186*4577Sahrens { zfs_ioc_promote, zfs_secpolicy_promote, DATASET_NAME, B_TRUE }, 2187*4577Sahrens { zfs_ioc_destroy_snaps, zfs_secpolicy_destroy, DATASET_NAME, B_TRUE }, 2188*4577Sahrens { zfs_ioc_snapshot, zfs_secpolicy_snapshot, DATASET_NAME, B_TRUE }, 2189*4577Sahrens { zfs_ioc_dsobj_to_dsname, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 2190*4577Sahrens { zfs_ioc_obj_to_path, zfs_secpolicy_config, NO_NAME, B_FALSE }, 2191*4577Sahrens { zfs_ioc_pool_set_props, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 2192*4577Sahrens { zfs_ioc_pool_get_props, zfs_secpolicy_read, POOL_NAME, B_FALSE }, 2193*4577Sahrens { zfs_ioc_set_fsacl, zfs_secpolicy_fsacl, DATASET_NAME, B_TRUE }, 2194*4577Sahrens { zfs_ioc_get_fsacl, zfs_secpolicy_read, DATASET_NAME, B_FALSE }, 21954543Smarks { zfs_ioc_iscsi_perm_check, zfs_secpolicy_iscsi, 2196*4577Sahrens DATASET_NAME, B_FALSE }, 2197*4577Sahrens { zfs_ioc_share, zfs_secpolicy_share, DATASET_NAME, B_FALSE } 2198789Sahrens }; 2199789Sahrens 2200789Sahrens static int 2201789Sahrens zfsdev_ioctl(dev_t dev, int cmd, intptr_t arg, int flag, cred_t *cr, int *rvalp) 2202789Sahrens { 2203789Sahrens zfs_cmd_t *zc; 2204789Sahrens uint_t vec; 22052199Sahrens int error, rc; 2206789Sahrens 2207789Sahrens if (getminor(dev) != 0) 2208789Sahrens return (zvol_ioctl(dev, cmd, arg, flag, cr, rvalp)); 2209789Sahrens 2210789Sahrens vec = cmd - ZFS_IOC; 2211789Sahrens 2212789Sahrens if (vec >= sizeof (zfs_ioc_vec) / sizeof (zfs_ioc_vec[0])) 2213789Sahrens return (EINVAL); 2214789Sahrens 2215789Sahrens zc = kmem_zalloc(sizeof (zfs_cmd_t), KM_SLEEP); 2216789Sahrens 2217789Sahrens error = xcopyin((void *)arg, zc, sizeof (zfs_cmd_t)); 2218789Sahrens 2219789Sahrens if (error == 0) { 2220789Sahrens zc->zc_cred = (uintptr_t)cr; 2221789Sahrens zc->zc_dev = dev; 22224543Smarks error = zfs_ioc_vec[vec].zvec_secpolicy(zc, cr); 2223789Sahrens } 2224789Sahrens 2225789Sahrens /* 2226789Sahrens * Ensure that all pool/dataset names are valid before we pass down to 2227789Sahrens * the lower layers. 2228789Sahrens */ 2229789Sahrens if (error == 0) { 2230789Sahrens zc->zc_name[sizeof (zc->zc_name) - 1] = '\0'; 2231789Sahrens switch (zfs_ioc_vec[vec].zvec_namecheck) { 2232*4577Sahrens case POOL_NAME: 2233789Sahrens if (pool_namecheck(zc->zc_name, NULL, NULL) != 0) 2234789Sahrens error = EINVAL; 2235789Sahrens break; 2236789Sahrens 2237*4577Sahrens case DATASET_NAME: 2238789Sahrens if (dataset_namecheck(zc->zc_name, NULL, NULL) != 0) 2239789Sahrens error = EINVAL; 2240789Sahrens break; 22412856Snd150628 2242*4577Sahrens case NO_NAME: 22432856Snd150628 break; 2244789Sahrens } 2245789Sahrens } 2246789Sahrens 2247789Sahrens if (error == 0) 2248789Sahrens error = zfs_ioc_vec[vec].zvec_func(zc); 2249789Sahrens 22502199Sahrens rc = xcopyout(zc, (void *)arg, sizeof (zfs_cmd_t)); 22514543Smarks if (error == 0) { 22522199Sahrens error = rc; 22534543Smarks if (zfs_ioc_vec[vec].zvec_his_log == B_TRUE) 22544543Smarks zfs_log_history(zc); 22554543Smarks } 2256789Sahrens 2257789Sahrens kmem_free(zc, sizeof (zfs_cmd_t)); 2258789Sahrens return (error); 2259789Sahrens } 2260789Sahrens 2261789Sahrens static int 2262789Sahrens zfs_attach(dev_info_t *dip, ddi_attach_cmd_t cmd) 2263789Sahrens { 2264789Sahrens if (cmd != DDI_ATTACH) 2265789Sahrens return (DDI_FAILURE); 2266789Sahrens 2267789Sahrens if (ddi_create_minor_node(dip, "zfs", S_IFCHR, 0, 2268789Sahrens DDI_PSEUDO, 0) == DDI_FAILURE) 2269789Sahrens return (DDI_FAILURE); 2270789Sahrens 2271789Sahrens zfs_dip = dip; 2272789Sahrens 2273789Sahrens ddi_report_dev(dip); 2274789Sahrens 2275789Sahrens return (DDI_SUCCESS); 2276789Sahrens } 2277789Sahrens 2278789Sahrens static int 2279789Sahrens zfs_detach(dev_info_t *dip, ddi_detach_cmd_t cmd) 2280789Sahrens { 2281789Sahrens if (spa_busy() || zfs_busy() || zvol_busy()) 2282789Sahrens return (DDI_FAILURE); 2283789Sahrens 2284789Sahrens if (cmd != DDI_DETACH) 2285789Sahrens return (DDI_FAILURE); 2286789Sahrens 2287789Sahrens zfs_dip = NULL; 2288789Sahrens 2289789Sahrens ddi_prop_remove_all(dip); 2290789Sahrens ddi_remove_minor_node(dip, NULL); 2291789Sahrens 2292789Sahrens return (DDI_SUCCESS); 2293789Sahrens } 2294789Sahrens 2295789Sahrens /*ARGSUSED*/ 2296789Sahrens static int 2297789Sahrens zfs_info(dev_info_t *dip, ddi_info_cmd_t infocmd, void *arg, void **result) 2298789Sahrens { 2299789Sahrens switch (infocmd) { 2300789Sahrens case DDI_INFO_DEVT2DEVINFO: 2301789Sahrens *result = zfs_dip; 2302789Sahrens return (DDI_SUCCESS); 2303789Sahrens 2304789Sahrens case DDI_INFO_DEVT2INSTANCE: 2305849Sbonwick *result = (void *)0; 2306789Sahrens return (DDI_SUCCESS); 2307789Sahrens } 2308789Sahrens 2309789Sahrens return (DDI_FAILURE); 2310789Sahrens } 2311789Sahrens 2312789Sahrens /* 2313789Sahrens * OK, so this is a little weird. 2314789Sahrens * 2315789Sahrens * /dev/zfs is the control node, i.e. minor 0. 2316789Sahrens * /dev/zvol/[r]dsk/pool/dataset are the zvols, minor > 0. 2317789Sahrens * 2318789Sahrens * /dev/zfs has basically nothing to do except serve up ioctls, 2319789Sahrens * so most of the standard driver entry points are in zvol.c. 2320789Sahrens */ 2321789Sahrens static struct cb_ops zfs_cb_ops = { 2322789Sahrens zvol_open, /* open */ 2323789Sahrens zvol_close, /* close */ 2324789Sahrens zvol_strategy, /* strategy */ 2325789Sahrens nodev, /* print */ 2326789Sahrens nodev, /* dump */ 2327789Sahrens zvol_read, /* read */ 2328789Sahrens zvol_write, /* write */ 2329789Sahrens zfsdev_ioctl, /* ioctl */ 2330789Sahrens nodev, /* devmap */ 2331789Sahrens nodev, /* mmap */ 2332789Sahrens nodev, /* segmap */ 2333789Sahrens nochpoll, /* poll */ 2334789Sahrens ddi_prop_op, /* prop_op */ 2335789Sahrens NULL, /* streamtab */ 2336789Sahrens D_NEW | D_MP | D_64BIT, /* Driver compatibility flag */ 2337789Sahrens CB_REV, /* version */ 23383638Sbillm nodev, /* async read */ 23393638Sbillm nodev, /* async write */ 2340789Sahrens }; 2341789Sahrens 2342789Sahrens static struct dev_ops zfs_dev_ops = { 2343789Sahrens DEVO_REV, /* version */ 2344789Sahrens 0, /* refcnt */ 2345789Sahrens zfs_info, /* info */ 2346789Sahrens nulldev, /* identify */ 2347789Sahrens nulldev, /* probe */ 2348789Sahrens zfs_attach, /* attach */ 2349789Sahrens zfs_detach, /* detach */ 2350789Sahrens nodev, /* reset */ 2351789Sahrens &zfs_cb_ops, /* driver operations */ 2352789Sahrens NULL /* no bus operations */ 2353789Sahrens }; 2354789Sahrens 2355789Sahrens static struct modldrv zfs_modldrv = { 2356*4577Sahrens &mod_driverops, "ZFS storage pool version " SPA_VERSION_STRING, 23572676Seschrock &zfs_dev_ops 2358789Sahrens }; 2359789Sahrens 2360789Sahrens static struct modlinkage modlinkage = { 2361789Sahrens MODREV_1, 2362789Sahrens (void *)&zfs_modlfs, 2363789Sahrens (void *)&zfs_modldrv, 2364789Sahrens NULL 2365789Sahrens }; 2366789Sahrens 2367789Sahrens int 2368789Sahrens _init(void) 2369789Sahrens { 2370789Sahrens int error; 2371789Sahrens 2372849Sbonwick spa_init(FREAD | FWRITE); 2373849Sbonwick zfs_init(); 2374849Sbonwick zvol_init(); 2375849Sbonwick 2376849Sbonwick if ((error = mod_install(&modlinkage)) != 0) { 2377849Sbonwick zvol_fini(); 2378849Sbonwick zfs_fini(); 2379849Sbonwick spa_fini(); 2380789Sahrens return (error); 2381849Sbonwick } 2382789Sahrens 2383789Sahrens error = ldi_ident_from_mod(&modlinkage, &zfs_li); 2384789Sahrens ASSERT(error == 0); 23854543Smarks mutex_init(&zfs_share_lock, NULL, MUTEX_DEFAULT, NULL); 2386789Sahrens 2387789Sahrens return (0); 2388789Sahrens } 2389789Sahrens 2390789Sahrens int 2391789Sahrens _fini(void) 2392789Sahrens { 2393789Sahrens int error; 2394789Sahrens 23951544Seschrock if (spa_busy() || zfs_busy() || zvol_busy() || zio_injection_enabled) 2396789Sahrens return (EBUSY); 2397789Sahrens 2398789Sahrens if ((error = mod_remove(&modlinkage)) != 0) 2399789Sahrens return (error); 2400789Sahrens 2401789Sahrens zvol_fini(); 2402789Sahrens zfs_fini(); 2403789Sahrens spa_fini(); 24044543Smarks if (zfs_share_inited) { 24054543Smarks (void) ddi_modclose(nfs_mod); 24064543Smarks (void) ddi_modclose(sharefs_mod); 24074543Smarks } 2408789Sahrens 2409789Sahrens ldi_ident_release(zfs_li); 2410789Sahrens zfs_li = NULL; 24114543Smarks mutex_destroy(&zfs_share_lock); 2412789Sahrens 2413789Sahrens return (error); 2414789Sahrens } 2415789Sahrens 2416789Sahrens int 2417789Sahrens _info(struct modinfo *modinfop) 2418789Sahrens { 2419789Sahrens return (mod_info(&modlinkage, modinfop)); 2420789Sahrens } 2421