1789Sahrens /* 2789Sahrens * CDDL HEADER START 3789Sahrens * 4789Sahrens * The contents of this file are subject to the terms of the 51485Slling * Common Development and Distribution License (the "License"). 61485Slling * You may not use this file except in compliance with the License. 7789Sahrens * 8789Sahrens * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9789Sahrens * or http://www.opensolaris.org/os/licensing. 10789Sahrens * See the License for the specific language governing permissions 11789Sahrens * and limitations under the License. 12789Sahrens * 13789Sahrens * When distributing Covered Code, include this CDDL HEADER in each 14789Sahrens * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15789Sahrens * If applicable, add the following below this CDDL HEADER, with the 16789Sahrens * fields enclosed by brackets "[]" replaced with your own identifying 17789Sahrens * information: Portions Copyright [yyyy] [name of copyright owner] 18789Sahrens * 19789Sahrens * CDDL HEADER END 20789Sahrens */ 21789Sahrens /* 223444Sek110237 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 23789Sahrens * Use is subject to license terms. 24789Sahrens */ 25789Sahrens 26789Sahrens #pragma ident "%Z%%M% %I% %E% SMI" 27789Sahrens 28789Sahrens #include <sys/types.h> 29789Sahrens #include <sys/param.h> 30789Sahrens #include <sys/errno.h> 31789Sahrens #include <sys/uio.h> 32789Sahrens #include <sys/buf.h> 33789Sahrens #include <sys/modctl.h> 34789Sahrens #include <sys/open.h> 35789Sahrens #include <sys/file.h> 36789Sahrens #include <sys/kmem.h> 37789Sahrens #include <sys/conf.h> 38789Sahrens #include <sys/cmn_err.h> 39789Sahrens #include <sys/stat.h> 40789Sahrens #include <sys/zfs_ioctl.h> 415331Samw #include <sys/zfs_i18n.h> 425331Samw #include <sys/zfs_znode.h> 43789Sahrens #include <sys/zap.h> 44789Sahrens #include <sys/spa.h> 453912Slling #include <sys/spa_impl.h> 46789Sahrens #include <sys/vdev.h> 473912Slling #include <sys/vdev_impl.h> 48789Sahrens #include <sys/dmu.h> 49789Sahrens #include <sys/dsl_dir.h> 50789Sahrens #include <sys/dsl_dataset.h> 51789Sahrens #include <sys/dsl_prop.h> 524543Smarks #include <sys/dsl_deleg.h> 534543Smarks #include <sys/dmu_objset.h> 54789Sahrens #include <sys/ddi.h> 55789Sahrens #include <sys/sunddi.h> 56789Sahrens #include <sys/sunldi.h> 57789Sahrens #include <sys/policy.h> 58789Sahrens #include <sys/zone.h> 59789Sahrens #include <sys/nvpair.h> 60789Sahrens #include <sys/pathname.h> 61789Sahrens #include <sys/mount.h> 62789Sahrens #include <sys/sdt.h> 63789Sahrens #include <sys/fs/zfs.h> 64789Sahrens #include <sys/zfs_ctldir.h> 655331Samw #include <sys/zfs_dir.h> 662885Sahrens #include <sys/zvol.h> 674543Smarks #include <sharefs/share.h> 684577Sahrens #include <sys/zfs_znode.h> 695326Sek110237 #include <sys/zfs_vfsops.h> 705326Sek110237 #include <sys/dmu_objset.h> 71789Sahrens 72789Sahrens #include "zfs_namecheck.h" 732676Seschrock #include "zfs_prop.h" 744543Smarks #include "zfs_deleg.h" 75789Sahrens 76789Sahrens extern struct modlfs zfs_modlfs; 77789Sahrens 78789Sahrens extern void zfs_init(void); 79789Sahrens extern void zfs_fini(void); 80789Sahrens 81789Sahrens ldi_ident_t zfs_li = NULL; 82789Sahrens dev_info_t *zfs_dip; 83789Sahrens 84789Sahrens typedef int zfs_ioc_func_t(zfs_cmd_t *); 854543Smarks typedef int zfs_secpolicy_func_t(zfs_cmd_t *, cred_t *); 86789Sahrens 87789Sahrens typedef struct zfs_ioc_vec { 88789Sahrens zfs_ioc_func_t *zvec_func; 89789Sahrens zfs_secpolicy_func_t *zvec_secpolicy; 90789Sahrens enum { 914577Sahrens NO_NAME, 924577Sahrens POOL_NAME, 934577Sahrens DATASET_NAME 944543Smarks } zvec_namecheck; 954543Smarks boolean_t zvec_his_log; 96789Sahrens } zfs_ioc_vec_t; 97789Sahrens 98789Sahrens /* _NOTE(PRINTFLIKE(4)) - this is printf-like, but lint is too whiney */ 99789Sahrens void 100789Sahrens __dprintf(const char *file, const char *func, int line, const char *fmt, ...) 101789Sahrens { 102789Sahrens const char *newfile; 103789Sahrens char buf[256]; 104789Sahrens va_list adx; 105789Sahrens 106789Sahrens /* 107789Sahrens * Get rid of annoying "../common/" prefix to filename. 108789Sahrens */ 109789Sahrens newfile = strrchr(file, '/'); 110789Sahrens if (newfile != NULL) { 111789Sahrens newfile = newfile + 1; /* Get rid of leading / */ 112789Sahrens } else { 113789Sahrens newfile = file; 114789Sahrens } 115789Sahrens 116789Sahrens va_start(adx, fmt); 117789Sahrens (void) vsnprintf(buf, sizeof (buf), fmt, adx); 118789Sahrens va_end(adx); 119789Sahrens 120789Sahrens /* 121789Sahrens * To get this data, use the zfs-dprintf probe as so: 122789Sahrens * dtrace -q -n 'zfs-dprintf \ 123789Sahrens * /stringof(arg0) == "dbuf.c"/ \ 124789Sahrens * {printf("%s: %s", stringof(arg1), stringof(arg3))}' 125789Sahrens * arg0 = file name 126789Sahrens * arg1 = function name 127789Sahrens * arg2 = line number 128789Sahrens * arg3 = message 129789Sahrens */ 130789Sahrens DTRACE_PROBE4(zfs__dprintf, 131789Sahrens char *, newfile, char *, func, int, line, char *, buf); 132789Sahrens } 133789Sahrens 1344543Smarks static void 1354715Sek110237 history_str_free(char *buf) 1364715Sek110237 { 1374715Sek110237 kmem_free(buf, HIS_MAX_RECORD_LEN); 1384715Sek110237 } 1394715Sek110237 1404715Sek110237 static char * 1414715Sek110237 history_str_get(zfs_cmd_t *zc) 1424715Sek110237 { 1434715Sek110237 char *buf; 1444715Sek110237 1454715Sek110237 if (zc->zc_history == NULL) 1464715Sek110237 return (NULL); 1474715Sek110237 1484715Sek110237 buf = kmem_alloc(HIS_MAX_RECORD_LEN, KM_SLEEP); 1494715Sek110237 if (copyinstr((void *)(uintptr_t)zc->zc_history, 1504715Sek110237 buf, HIS_MAX_RECORD_LEN, NULL) != 0) { 1514715Sek110237 history_str_free(buf); 1524715Sek110237 return (NULL); 1534715Sek110237 } 1544715Sek110237 1554715Sek110237 buf[HIS_MAX_RECORD_LEN -1] = '\0'; 1564715Sek110237 1574715Sek110237 return (buf); 1584715Sek110237 } 1594715Sek110237 1605331Samw static int 1615331Samw zfs_check_version(const char *name, int version) 1625331Samw { 1635331Samw 1645331Samw spa_t *spa; 1655331Samw 1665331Samw if (spa_open(name, &spa, FTAG) == 0) { 1675331Samw if (spa_version(spa) < version) { 1685331Samw spa_close(spa, FTAG); 1695331Samw return (1); 1705331Samw } 1715331Samw spa_close(spa, FTAG); 1725331Samw } 1735331Samw return (0); 1745331Samw } 1755331Samw 1764715Sek110237 static void 1774543Smarks zfs_log_history(zfs_cmd_t *zc) 1784543Smarks { 1794543Smarks spa_t *spa; 1804603Sahrens char *buf; 1814543Smarks 1824715Sek110237 if ((buf = history_str_get(zc)) == NULL) 1834577Sahrens return; 1844577Sahrens 1854715Sek110237 if (spa_open(zc->zc_name, &spa, FTAG) == 0) { 1864715Sek110237 if (spa_version(spa) >= SPA_VERSION_ZPOOL_HISTORY) 1874715Sek110237 (void) spa_history_log(spa, buf, LOG_CMD_NORMAL); 1884715Sek110237 spa_close(spa, FTAG); 1894543Smarks } 1904715Sek110237 history_str_free(buf); 1914543Smarks } 1924543Smarks 193789Sahrens /* 194789Sahrens * Policy for top-level read operations (list pools). Requires no privileges, 195789Sahrens * and can be used in the local zone, as there is no associated dataset. 196789Sahrens */ 197789Sahrens /* ARGSUSED */ 198789Sahrens static int 1994543Smarks zfs_secpolicy_none(zfs_cmd_t *zc, cred_t *cr) 200789Sahrens { 201789Sahrens return (0); 202789Sahrens } 203789Sahrens 204789Sahrens /* 205789Sahrens * Policy for dataset read operations (list children, get statistics). Requires 206789Sahrens * no privileges, but must be visible in the local zone. 207789Sahrens */ 208789Sahrens /* ARGSUSED */ 209789Sahrens static int 2104543Smarks zfs_secpolicy_read(zfs_cmd_t *zc, cred_t *cr) 211789Sahrens { 212789Sahrens if (INGLOBALZONE(curproc) || 2134543Smarks zone_dataset_visible(zc->zc_name, NULL)) 214789Sahrens return (0); 215789Sahrens 216789Sahrens return (ENOENT); 217789Sahrens } 218789Sahrens 219789Sahrens static int 220789Sahrens zfs_dozonecheck(const char *dataset, cred_t *cr) 221789Sahrens { 222789Sahrens uint64_t zoned; 223789Sahrens int writable = 1; 224789Sahrens 225789Sahrens /* 226789Sahrens * The dataset must be visible by this zone -- check this first 227789Sahrens * so they don't see EPERM on something they shouldn't know about. 228789Sahrens */ 229789Sahrens if (!INGLOBALZONE(curproc) && 230789Sahrens !zone_dataset_visible(dataset, &writable)) 231789Sahrens return (ENOENT); 232789Sahrens 233789Sahrens if (dsl_prop_get_integer(dataset, "zoned", &zoned, NULL)) 234789Sahrens return (ENOENT); 235789Sahrens 236789Sahrens if (INGLOBALZONE(curproc)) { 237789Sahrens /* 238789Sahrens * If the fs is zoned, only root can access it from the 239789Sahrens * global zone. 240789Sahrens */ 241789Sahrens if (secpolicy_zfs(cr) && zoned) 242789Sahrens return (EPERM); 243789Sahrens } else { 244789Sahrens /* 245789Sahrens * If we are in a local zone, the 'zoned' property must be set. 246789Sahrens */ 247789Sahrens if (!zoned) 248789Sahrens return (EPERM); 249789Sahrens 250789Sahrens /* must be writable by this zone */ 251789Sahrens if (!writable) 252789Sahrens return (EPERM); 253789Sahrens } 254789Sahrens return (0); 255789Sahrens } 256789Sahrens 257789Sahrens int 2584543Smarks zfs_secpolicy_write_perms(const char *name, const char *perm, cred_t *cr) 259789Sahrens { 260789Sahrens int error; 261789Sahrens 2624543Smarks error = zfs_dozonecheck(name, cr); 2634543Smarks if (error == 0) { 2644543Smarks error = secpolicy_zfs(cr); 2654670Sahrens if (error) 2664543Smarks error = dsl_deleg_access(name, perm, cr); 2674543Smarks } 2684543Smarks return (error); 2694543Smarks } 2704543Smarks 2714543Smarks static int 2724543Smarks zfs_secpolicy_setprop(const char *name, zfs_prop_t prop, cred_t *cr) 2734543Smarks { 2744543Smarks /* 2754543Smarks * Check permissions for special properties. 2764543Smarks */ 2774543Smarks switch (prop) { 2784543Smarks case ZFS_PROP_ZONED: 2794543Smarks /* 2804543Smarks * Disallow setting of 'zoned' from within a local zone. 2814543Smarks */ 2824543Smarks if (!INGLOBALZONE(curproc)) 2834543Smarks return (EPERM); 2844543Smarks break; 285789Sahrens 2864543Smarks case ZFS_PROP_QUOTA: 2874543Smarks if (!INGLOBALZONE(curproc)) { 2884543Smarks uint64_t zoned; 2894543Smarks char setpoint[MAXNAMELEN]; 2904543Smarks /* 2914543Smarks * Unprivileged users are allowed to modify the 2924543Smarks * quota on things *under* (ie. contained by) 2934543Smarks * the thing they own. 2944543Smarks */ 2954543Smarks if (dsl_prop_get_integer(name, "zoned", &zoned, 2964543Smarks setpoint)) 2974543Smarks return (EPERM); 2984670Sahrens if (!zoned || strlen(name) <= strlen(setpoint)) 2994543Smarks return (EPERM); 3004543Smarks } 3014670Sahrens break; 3024543Smarks } 3034543Smarks 3044787Sahrens return (zfs_secpolicy_write_perms(name, zfs_prop_to_name(prop), cr)); 305789Sahrens } 306789Sahrens 3074543Smarks int 3084543Smarks zfs_secpolicy_fsacl(zfs_cmd_t *zc, cred_t *cr) 3094543Smarks { 3104543Smarks int error; 3114543Smarks 3124543Smarks error = zfs_dozonecheck(zc->zc_name, cr); 3134543Smarks if (error) 3144543Smarks return (error); 3154543Smarks 3164543Smarks /* 3174543Smarks * permission to set permissions will be evaluated later in 3184543Smarks * dsl_deleg_can_allow() 3194543Smarks */ 3204543Smarks return (0); 3214543Smarks } 3224543Smarks 3234543Smarks int 3244543Smarks zfs_secpolicy_rollback(zfs_cmd_t *zc, cred_t *cr) 3254543Smarks { 3264543Smarks int error; 3274543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 3284543Smarks ZFS_DELEG_PERM_ROLLBACK, cr); 3294543Smarks if (error == 0) 3304543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 3314543Smarks ZFS_DELEG_PERM_MOUNT, cr); 3324543Smarks return (error); 3334543Smarks } 3344543Smarks 3354543Smarks int 3364543Smarks zfs_secpolicy_send(zfs_cmd_t *zc, cred_t *cr) 3374543Smarks { 3384543Smarks return (zfs_secpolicy_write_perms(zc->zc_name, 3394543Smarks ZFS_DELEG_PERM_SEND, cr)); 3404543Smarks } 3414543Smarks 3424543Smarks int 3434543Smarks zfs_secpolicy_share(zfs_cmd_t *zc, cred_t *cr) 3444543Smarks { 3454543Smarks if (!INGLOBALZONE(curproc)) 3464543Smarks return (EPERM); 3474543Smarks 348*5367Sahrens if (secpolicy_nfs(cr) == 0) { 3494543Smarks return (0); 3504543Smarks } else { 3514543Smarks vnode_t *vp; 3524543Smarks int error; 3534543Smarks 3544543Smarks if ((error = lookupname(zc->zc_value, UIO_SYSSPACE, 3554543Smarks NO_FOLLOW, NULL, &vp)) != 0) 3564543Smarks return (error); 3574543Smarks 3584543Smarks /* Now make sure mntpnt and dataset are ZFS */ 3594543Smarks 3604543Smarks if (vp->v_vfsp->vfs_fstype != zfsfstype || 3614543Smarks (strcmp((char *)refstr_value(vp->v_vfsp->vfs_resource), 3624543Smarks zc->zc_name) != 0)) { 3634543Smarks VN_RELE(vp); 3644543Smarks return (EPERM); 3654543Smarks } 3664543Smarks 3674543Smarks VN_RELE(vp); 3684543Smarks return (dsl_deleg_access(zc->zc_name, 3694543Smarks ZFS_DELEG_PERM_SHARE, cr)); 3704543Smarks } 3714543Smarks } 3724543Smarks 373789Sahrens static int 3744543Smarks zfs_get_parent(const char *datasetname, char *parent, int parentsize) 375789Sahrens { 376789Sahrens char *cp; 377789Sahrens 378789Sahrens /* 379789Sahrens * Remove the @bla or /bla from the end of the name to get the parent. 380789Sahrens */ 3814543Smarks (void) strncpy(parent, datasetname, parentsize); 3824543Smarks cp = strrchr(parent, '@'); 383789Sahrens if (cp != NULL) { 384789Sahrens cp[0] = '\0'; 385789Sahrens } else { 3864543Smarks cp = strrchr(parent, '/'); 387789Sahrens if (cp == NULL) 388789Sahrens return (ENOENT); 389789Sahrens cp[0] = '\0'; 390789Sahrens } 391789Sahrens 3924543Smarks return (0); 3934543Smarks } 3944543Smarks 3954543Smarks int 3964543Smarks zfs_secpolicy_destroy_perms(const char *name, cred_t *cr) 3974543Smarks { 3984543Smarks int error; 3994543Smarks 4004543Smarks if ((error = zfs_secpolicy_write_perms(name, 4014543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 4024543Smarks return (error); 4034543Smarks 4044543Smarks return (zfs_secpolicy_write_perms(name, ZFS_DELEG_PERM_DESTROY, cr)); 4054543Smarks } 4064543Smarks 4074543Smarks static int 4084543Smarks zfs_secpolicy_destroy(zfs_cmd_t *zc, cred_t *cr) 4094543Smarks { 4104543Smarks return (zfs_secpolicy_destroy_perms(zc->zc_name, cr)); 4114543Smarks } 4124543Smarks 4134543Smarks /* 4144543Smarks * Must have sys_config privilege to check the iscsi permission 4154543Smarks */ 4164543Smarks /* ARGSUSED */ 4174543Smarks static int 4184543Smarks zfs_secpolicy_iscsi(zfs_cmd_t *zc, cred_t *cr) 4194543Smarks { 4204543Smarks return (secpolicy_zfs(cr)); 4214543Smarks } 4224543Smarks 4234543Smarks int 4244543Smarks zfs_secpolicy_rename_perms(const char *from, const char *to, cred_t *cr) 4254543Smarks { 4264543Smarks char parentname[MAXNAMELEN]; 4274543Smarks int error; 4284543Smarks 4294543Smarks if ((error = zfs_secpolicy_write_perms(from, 4304543Smarks ZFS_DELEG_PERM_RENAME, cr)) != 0) 4314543Smarks return (error); 4324543Smarks 4334543Smarks if ((error = zfs_secpolicy_write_perms(from, 4344543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 4354543Smarks return (error); 4364543Smarks 4374543Smarks if ((error = zfs_get_parent(to, parentname, 4384543Smarks sizeof (parentname))) != 0) 4394543Smarks return (error); 4404543Smarks 4414543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 4424543Smarks ZFS_DELEG_PERM_CREATE, cr)) != 0) 4434543Smarks return (error); 4444543Smarks 4454543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 4464543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 4474543Smarks return (error); 4484543Smarks 4494543Smarks return (error); 4504543Smarks } 4514543Smarks 4524543Smarks static int 4534543Smarks zfs_secpolicy_rename(zfs_cmd_t *zc, cred_t *cr) 4544543Smarks { 4554543Smarks return (zfs_secpolicy_rename_perms(zc->zc_name, zc->zc_value, cr)); 4564543Smarks } 4574543Smarks 4584543Smarks static int 4594543Smarks zfs_secpolicy_promote(zfs_cmd_t *zc, cred_t *cr) 4604543Smarks { 4614543Smarks char parentname[MAXNAMELEN]; 4624543Smarks objset_t *clone; 4634543Smarks int error; 4644543Smarks 4654543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 4664543Smarks ZFS_DELEG_PERM_PROMOTE, cr); 4674543Smarks if (error) 4684543Smarks return (error); 4694543Smarks 4704543Smarks error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 4714543Smarks DS_MODE_STANDARD | DS_MODE_READONLY, &clone); 4724543Smarks 4734543Smarks if (error == 0) { 4744543Smarks dsl_dataset_t *pclone = NULL; 4754543Smarks dsl_dir_t *dd; 4764543Smarks dd = clone->os->os_dsl_dataset->ds_dir; 4774543Smarks 4784543Smarks rw_enter(&dd->dd_pool->dp_config_rwlock, RW_READER); 4794543Smarks error = dsl_dataset_open_obj(dd->dd_pool, 480*5367Sahrens dd->dd_phys->dd_origin_obj, NULL, 4814543Smarks DS_MODE_NONE, FTAG, &pclone); 4824543Smarks rw_exit(&dd->dd_pool->dp_config_rwlock); 4834543Smarks if (error) { 4844543Smarks dmu_objset_close(clone); 4854543Smarks return (error); 4864543Smarks } 4874543Smarks 4884543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 4894543Smarks ZFS_DELEG_PERM_MOUNT, cr); 4904543Smarks 4914543Smarks dsl_dataset_name(pclone, parentname); 4924543Smarks dmu_objset_close(clone); 4934543Smarks dsl_dataset_close(pclone, DS_MODE_NONE, FTAG); 4944543Smarks if (error == 0) 4954543Smarks error = zfs_secpolicy_write_perms(parentname, 4964543Smarks ZFS_DELEG_PERM_PROMOTE, cr); 4974543Smarks } 4984543Smarks return (error); 4994543Smarks } 5004543Smarks 5014543Smarks static int 5024543Smarks zfs_secpolicy_receive(zfs_cmd_t *zc, cred_t *cr) 5034543Smarks { 5044543Smarks int error; 5054543Smarks 5064543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_name, 5074543Smarks ZFS_DELEG_PERM_RECEIVE, cr)) != 0) 5084543Smarks return (error); 5094543Smarks 5104543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_name, 5114543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 5124543Smarks return (error); 5134543Smarks 5144543Smarks return (zfs_secpolicy_write_perms(zc->zc_name, 5154543Smarks ZFS_DELEG_PERM_CREATE, cr)); 5164543Smarks } 5174543Smarks 5184543Smarks int 5194543Smarks zfs_secpolicy_snapshot_perms(const char *name, cred_t *cr) 5204543Smarks { 5214543Smarks int error; 5224543Smarks 5234543Smarks if ((error = zfs_secpolicy_write_perms(name, 5244543Smarks ZFS_DELEG_PERM_SNAPSHOT, cr)) != 0) 5254543Smarks return (error); 5264543Smarks 5274543Smarks error = zfs_secpolicy_write_perms(name, 5284543Smarks ZFS_DELEG_PERM_MOUNT, cr); 5294543Smarks 5304543Smarks return (error); 5314543Smarks } 5324543Smarks 5334543Smarks static int 5344543Smarks zfs_secpolicy_snapshot(zfs_cmd_t *zc, cred_t *cr) 5354543Smarks { 5364543Smarks 5374543Smarks return (zfs_secpolicy_snapshot_perms(zc->zc_name, cr)); 5384543Smarks } 5394543Smarks 5404543Smarks static int 5414543Smarks zfs_secpolicy_create(zfs_cmd_t *zc, cred_t *cr) 5424543Smarks { 5434543Smarks char parentname[MAXNAMELEN]; 5444543Smarks int error; 5454543Smarks 5464543Smarks if ((error = zfs_get_parent(zc->zc_name, parentname, 5474543Smarks sizeof (parentname))) != 0) 5484543Smarks return (error); 5494543Smarks 5504543Smarks if (zc->zc_value[0] != '\0') { 5514543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_value, 5524543Smarks ZFS_DELEG_PERM_CLONE, cr)) != 0) 5534543Smarks return (error); 5544543Smarks } 5554543Smarks 5564543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 5574543Smarks ZFS_DELEG_PERM_CREATE, cr)) != 0) 5584543Smarks return (error); 5594543Smarks 5604543Smarks error = zfs_secpolicy_write_perms(parentname, 5614543Smarks ZFS_DELEG_PERM_MOUNT, cr); 5624543Smarks 5634543Smarks return (error); 5644543Smarks } 5654543Smarks 5664543Smarks static int 5674543Smarks zfs_secpolicy_umount(zfs_cmd_t *zc, cred_t *cr) 5684543Smarks { 5694543Smarks int error; 5704543Smarks 5714543Smarks error = secpolicy_fs_unmount(cr, NULL); 5724543Smarks if (error) { 5734543Smarks error = dsl_deleg_access(zc->zc_name, ZFS_DELEG_PERM_MOUNT, cr); 5744543Smarks } 5754543Smarks return (error); 576789Sahrens } 577789Sahrens 578789Sahrens /* 579789Sahrens * Policy for pool operations - create/destroy pools, add vdevs, etc. Requires 580789Sahrens * SYS_CONFIG privilege, which is not available in a local zone. 581789Sahrens */ 582789Sahrens /* ARGSUSED */ 583789Sahrens static int 5844543Smarks zfs_secpolicy_config(zfs_cmd_t *zc, cred_t *cr) 585789Sahrens { 586789Sahrens if (secpolicy_sys_config(cr, B_FALSE) != 0) 587789Sahrens return (EPERM); 588789Sahrens 589789Sahrens return (0); 590789Sahrens } 591789Sahrens 592789Sahrens /* 5934543Smarks * Just like zfs_secpolicy_config, except that we will check for 5944543Smarks * mount permission on the dataset for permission to create/remove 5954543Smarks * the minor nodes. 5964543Smarks */ 5974543Smarks static int 5984543Smarks zfs_secpolicy_minor(zfs_cmd_t *zc, cred_t *cr) 5994543Smarks { 6004543Smarks if (secpolicy_sys_config(cr, B_FALSE) != 0) { 6014543Smarks return (dsl_deleg_access(zc->zc_name, 6024543Smarks ZFS_DELEG_PERM_MOUNT, cr)); 6034543Smarks } 6044543Smarks 6054543Smarks return (0); 6064543Smarks } 6074543Smarks 6084543Smarks /* 6091544Seschrock * Policy for fault injection. Requires all privileges. 6101544Seschrock */ 6111544Seschrock /* ARGSUSED */ 6121544Seschrock static int 6134543Smarks zfs_secpolicy_inject(zfs_cmd_t *zc, cred_t *cr) 6141544Seschrock { 6151544Seschrock return (secpolicy_zinject(cr)); 6161544Seschrock } 6171544Seschrock 6184849Sahrens static int 6194849Sahrens zfs_secpolicy_inherit(zfs_cmd_t *zc, cred_t *cr) 6204849Sahrens { 6214849Sahrens zfs_prop_t prop = zfs_name_to_prop(zc->zc_value); 6224849Sahrens 6235094Slling if (prop == ZPROP_INVAL) { 6244849Sahrens if (!zfs_prop_user(zc->zc_value)) 6254849Sahrens return (EINVAL); 6264849Sahrens return (zfs_secpolicy_write_perms(zc->zc_name, 6274849Sahrens ZFS_DELEG_PERM_USERPROP, cr)); 6284849Sahrens } else { 6294849Sahrens if (!zfs_prop_inheritable(prop)) 6304849Sahrens return (EINVAL); 6314849Sahrens return (zfs_secpolicy_setprop(zc->zc_name, prop, cr)); 6324849Sahrens } 6334849Sahrens } 6344849Sahrens 6351544Seschrock /* 636789Sahrens * Returns the nvlist as specified by the user in the zfs_cmd_t. 637789Sahrens */ 638789Sahrens static int 6395094Slling get_nvlist(uint64_t nvl, uint64_t size, nvlist_t **nvp) 640789Sahrens { 641789Sahrens char *packed; 642789Sahrens int error; 6435094Slling nvlist_t *list = NULL; 644789Sahrens 645789Sahrens /* 6462676Seschrock * Read in and unpack the user-supplied nvlist. 647789Sahrens */ 6485094Slling if (size == 0) 649789Sahrens return (EINVAL); 650789Sahrens 651789Sahrens packed = kmem_alloc(size, KM_SLEEP); 652789Sahrens 6535094Slling if ((error = xcopyin((void *)(uintptr_t)nvl, packed, size)) != 0) { 654789Sahrens kmem_free(packed, size); 655789Sahrens return (error); 656789Sahrens } 657789Sahrens 6585094Slling if ((error = nvlist_unpack(packed, size, &list, 0)) != 0) { 659789Sahrens kmem_free(packed, size); 660789Sahrens return (error); 661789Sahrens } 662789Sahrens 663789Sahrens kmem_free(packed, size); 664789Sahrens 6655094Slling *nvp = list; 666789Sahrens return (0); 667789Sahrens } 668789Sahrens 669789Sahrens static int 6702676Seschrock put_nvlist(zfs_cmd_t *zc, nvlist_t *nvl) 6712676Seschrock { 6722676Seschrock char *packed = NULL; 6732676Seschrock size_t size; 6742676Seschrock int error; 6752676Seschrock 6762676Seschrock VERIFY(nvlist_size(nvl, &size, NV_ENCODE_NATIVE) == 0); 6772676Seschrock 6782676Seschrock if (size > zc->zc_nvlist_dst_size) { 6792676Seschrock error = ENOMEM; 6802676Seschrock } else { 6814611Smarks packed = kmem_alloc(size, KM_SLEEP); 6822676Seschrock VERIFY(nvlist_pack(nvl, &packed, &size, NV_ENCODE_NATIVE, 6832676Seschrock KM_SLEEP) == 0); 6842676Seschrock error = xcopyout(packed, (void *)(uintptr_t)zc->zc_nvlist_dst, 6852676Seschrock size); 6862676Seschrock kmem_free(packed, size); 6872676Seschrock } 6882676Seschrock 6892676Seschrock zc->zc_nvlist_dst_size = size; 6902676Seschrock return (error); 6912676Seschrock } 6922676Seschrock 6932676Seschrock static int 694789Sahrens zfs_ioc_pool_create(zfs_cmd_t *zc) 695789Sahrens { 696789Sahrens int error; 6975094Slling nvlist_t *config, *props = NULL; 6984715Sek110237 char *buf; 699789Sahrens 7005094Slling if (error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 7015094Slling &config)) 7024988Sek110237 return (error); 7034715Sek110237 7045094Slling if (zc->zc_nvlist_src_size != 0 && (error = 7055094Slling get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, &props))) { 7065094Slling nvlist_free(config); 7075094Slling return (error); 7085094Slling } 7095094Slling 7104988Sek110237 buf = history_str_get(zc); 711789Sahrens 7125094Slling error = spa_create(zc->zc_name, config, props, buf); 713789Sahrens 7144988Sek110237 if (buf != NULL) 7154988Sek110237 history_str_free(buf); 7165094Slling 717789Sahrens nvlist_free(config); 718789Sahrens 7195094Slling if (props) 7205094Slling nvlist_free(props); 7215094Slling 722789Sahrens return (error); 723789Sahrens } 724789Sahrens 725789Sahrens static int 726789Sahrens zfs_ioc_pool_destroy(zfs_cmd_t *zc) 727789Sahrens { 7284543Smarks int error; 7294543Smarks zfs_log_history(zc); 7304543Smarks error = spa_destroy(zc->zc_name); 7314543Smarks return (error); 732789Sahrens } 733789Sahrens 734789Sahrens static int 735789Sahrens zfs_ioc_pool_import(zfs_cmd_t *zc) 736789Sahrens { 737789Sahrens int error; 7385094Slling nvlist_t *config, *props = NULL; 739789Sahrens uint64_t guid; 740789Sahrens 7415094Slling if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 7425094Slling &config)) != 0) 743789Sahrens return (error); 744789Sahrens 7455094Slling if (zc->zc_nvlist_src_size != 0 && (error = 7465094Slling get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, &props))) { 7475094Slling nvlist_free(config); 7485094Slling return (error); 7495094Slling } 7505094Slling 751789Sahrens if (nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID, &guid) != 0 || 7521544Seschrock guid != zc->zc_guid) 753789Sahrens error = EINVAL; 754789Sahrens else 7555094Slling error = spa_import(zc->zc_name, config, props); 756789Sahrens 757789Sahrens nvlist_free(config); 758789Sahrens 7595094Slling if (props) 7605094Slling nvlist_free(props); 7615094Slling 762789Sahrens return (error); 763789Sahrens } 764789Sahrens 765789Sahrens static int 766789Sahrens zfs_ioc_pool_export(zfs_cmd_t *zc) 767789Sahrens { 7684543Smarks int error; 7694543Smarks zfs_log_history(zc); 7704543Smarks error = spa_export(zc->zc_name, NULL); 7714543Smarks return (error); 772789Sahrens } 773789Sahrens 774789Sahrens static int 775789Sahrens zfs_ioc_pool_configs(zfs_cmd_t *zc) 776789Sahrens { 777789Sahrens nvlist_t *configs; 778789Sahrens int error; 779789Sahrens 780789Sahrens if ((configs = spa_all_configs(&zc->zc_cookie)) == NULL) 781789Sahrens return (EEXIST); 782789Sahrens 7832676Seschrock error = put_nvlist(zc, configs); 784789Sahrens 785789Sahrens nvlist_free(configs); 786789Sahrens 787789Sahrens return (error); 788789Sahrens } 789789Sahrens 790789Sahrens static int 791789Sahrens zfs_ioc_pool_stats(zfs_cmd_t *zc) 792789Sahrens { 793789Sahrens nvlist_t *config; 794789Sahrens int error; 7951544Seschrock int ret = 0; 796789Sahrens 7972676Seschrock error = spa_get_stats(zc->zc_name, &config, zc->zc_value, 7982676Seschrock sizeof (zc->zc_value)); 799789Sahrens 800789Sahrens if (config != NULL) { 8012676Seschrock ret = put_nvlist(zc, config); 802789Sahrens nvlist_free(config); 8031544Seschrock 8041544Seschrock /* 8051544Seschrock * The config may be present even if 'error' is non-zero. 8061544Seschrock * In this case we return success, and preserve the real errno 8071544Seschrock * in 'zc_cookie'. 8081544Seschrock */ 8091544Seschrock zc->zc_cookie = error; 810789Sahrens } else { 8111544Seschrock ret = error; 812789Sahrens } 813789Sahrens 8141544Seschrock return (ret); 815789Sahrens } 816789Sahrens 817789Sahrens /* 818789Sahrens * Try to import the given pool, returning pool stats as appropriate so that 819789Sahrens * user land knows which devices are available and overall pool health. 820789Sahrens */ 821789Sahrens static int 822789Sahrens zfs_ioc_pool_tryimport(zfs_cmd_t *zc) 823789Sahrens { 824789Sahrens nvlist_t *tryconfig, *config; 825789Sahrens int error; 826789Sahrens 8275094Slling if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 8285094Slling &tryconfig)) != 0) 829789Sahrens return (error); 830789Sahrens 831789Sahrens config = spa_tryimport(tryconfig); 832789Sahrens 833789Sahrens nvlist_free(tryconfig); 834789Sahrens 835789Sahrens if (config == NULL) 836789Sahrens return (EINVAL); 837789Sahrens 8382676Seschrock error = put_nvlist(zc, config); 839789Sahrens nvlist_free(config); 840789Sahrens 841789Sahrens return (error); 842789Sahrens } 843789Sahrens 844789Sahrens static int 845789Sahrens zfs_ioc_pool_scrub(zfs_cmd_t *zc) 846789Sahrens { 847789Sahrens spa_t *spa; 848789Sahrens int error; 849789Sahrens 8502926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 8512926Sek110237 return (error); 8522926Sek110237 8534808Sek110237 mutex_enter(&spa_namespace_lock); 8542926Sek110237 error = spa_scrub(spa, zc->zc_cookie, B_FALSE); 8554808Sek110237 mutex_exit(&spa_namespace_lock); 8562926Sek110237 8572926Sek110237 spa_close(spa, FTAG); 8582926Sek110237 859789Sahrens return (error); 860789Sahrens } 861789Sahrens 862789Sahrens static int 863789Sahrens zfs_ioc_pool_freeze(zfs_cmd_t *zc) 864789Sahrens { 865789Sahrens spa_t *spa; 866789Sahrens int error; 867789Sahrens 868789Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 869789Sahrens if (error == 0) { 870789Sahrens spa_freeze(spa); 871789Sahrens spa_close(spa, FTAG); 872789Sahrens } 873789Sahrens return (error); 874789Sahrens } 875789Sahrens 876789Sahrens static int 8771760Seschrock zfs_ioc_pool_upgrade(zfs_cmd_t *zc) 8781760Seschrock { 8791760Seschrock spa_t *spa; 8801760Seschrock int error; 8811760Seschrock 8822926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 8832926Sek110237 return (error); 8842926Sek110237 8855118Slling if (zc->zc_cookie < spa_version(spa) || zc->zc_cookie > SPA_VERSION) { 8865118Slling spa_close(spa, FTAG); 8875118Slling return (EINVAL); 8885118Slling } 8895118Slling 8905094Slling spa_upgrade(spa, zc->zc_cookie); 8912926Sek110237 spa_close(spa, FTAG); 8922926Sek110237 8932926Sek110237 return (error); 8942926Sek110237 } 8952926Sek110237 8962926Sek110237 static int 8972926Sek110237 zfs_ioc_pool_get_history(zfs_cmd_t *zc) 8982926Sek110237 { 8992926Sek110237 spa_t *spa; 9002926Sek110237 char *hist_buf; 9012926Sek110237 uint64_t size; 9022926Sek110237 int error; 9032926Sek110237 9042926Sek110237 if ((size = zc->zc_history_len) == 0) 9052926Sek110237 return (EINVAL); 9062926Sek110237 9072926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 9082926Sek110237 return (error); 9092926Sek110237 9104577Sahrens if (spa_version(spa) < SPA_VERSION_ZPOOL_HISTORY) { 9113863Sek110237 spa_close(spa, FTAG); 9123863Sek110237 return (ENOTSUP); 9133863Sek110237 } 9143863Sek110237 9152926Sek110237 hist_buf = kmem_alloc(size, KM_SLEEP); 9162926Sek110237 if ((error = spa_history_get(spa, &zc->zc_history_offset, 9172926Sek110237 &zc->zc_history_len, hist_buf)) == 0) { 9184543Smarks error = xcopyout(hist_buf, 9194543Smarks (char *)(uintptr_t)zc->zc_history, 9202926Sek110237 zc->zc_history_len); 9212926Sek110237 } 9222926Sek110237 9232926Sek110237 spa_close(spa, FTAG); 9242926Sek110237 kmem_free(hist_buf, size); 9252926Sek110237 return (error); 9262926Sek110237 } 9272926Sek110237 9282926Sek110237 static int 9293444Sek110237 zfs_ioc_dsobj_to_dsname(zfs_cmd_t *zc) 9303444Sek110237 { 9313444Sek110237 int error; 9323444Sek110237 9333912Slling if (error = dsl_dsobj_to_dsname(zc->zc_name, zc->zc_obj, zc->zc_value)) 9343444Sek110237 return (error); 9353444Sek110237 9363444Sek110237 return (0); 9373444Sek110237 } 9383444Sek110237 9393444Sek110237 static int 9403444Sek110237 zfs_ioc_obj_to_path(zfs_cmd_t *zc) 9413444Sek110237 { 9423444Sek110237 objset_t *osp; 9433444Sek110237 int error; 9443444Sek110237 9453444Sek110237 if ((error = dmu_objset_open(zc->zc_name, DMU_OST_ZFS, 9463444Sek110237 DS_MODE_NONE | DS_MODE_READONLY, &osp)) != 0) 9473444Sek110237 return (error); 9483444Sek110237 9493444Sek110237 error = zfs_obj_to_path(osp, zc->zc_obj, zc->zc_value, 9503444Sek110237 sizeof (zc->zc_value)); 9513444Sek110237 dmu_objset_close(osp); 9523444Sek110237 9533444Sek110237 return (error); 9543444Sek110237 } 9553444Sek110237 9563444Sek110237 static int 957789Sahrens zfs_ioc_vdev_add(zfs_cmd_t *zc) 958789Sahrens { 959789Sahrens spa_t *spa; 960789Sahrens int error; 961789Sahrens nvlist_t *config; 962789Sahrens 963789Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 964789Sahrens if (error != 0) 965789Sahrens return (error); 966789Sahrens 9673912Slling /* 9683912Slling * A root pool with concatenated devices is not supported. 9693912Slling * Thus, can not add a device to a root pool with one device. 9703912Slling */ 9713912Slling if (spa->spa_root_vdev->vdev_children == 1 && spa->spa_bootfs != 0) { 9723912Slling spa_close(spa, FTAG); 9733912Slling return (EDOM); 9743912Slling } 9753912Slling 9765094Slling if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 9775094Slling &config)) == 0) { 978789Sahrens error = spa_vdev_add(spa, config); 979789Sahrens nvlist_free(config); 980789Sahrens } 981789Sahrens spa_close(spa, FTAG); 982789Sahrens return (error); 983789Sahrens } 984789Sahrens 985789Sahrens static int 986789Sahrens zfs_ioc_vdev_remove(zfs_cmd_t *zc) 987789Sahrens { 9882082Seschrock spa_t *spa; 9892082Seschrock int error; 9902082Seschrock 9912082Seschrock error = spa_open(zc->zc_name, &spa, FTAG); 9922082Seschrock if (error != 0) 9932082Seschrock return (error); 9942082Seschrock error = spa_vdev_remove(spa, zc->zc_guid, B_FALSE); 9952082Seschrock spa_close(spa, FTAG); 9962082Seschrock return (error); 997789Sahrens } 998789Sahrens 999789Sahrens static int 10004451Seschrock zfs_ioc_vdev_set_state(zfs_cmd_t *zc) 1001789Sahrens { 1002789Sahrens spa_t *spa; 1003789Sahrens int error; 10044451Seschrock vdev_state_t newstate = VDEV_STATE_UNKNOWN; 1005789Sahrens 10062926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1007789Sahrens return (error); 10084451Seschrock switch (zc->zc_cookie) { 10094451Seschrock case VDEV_STATE_ONLINE: 10104451Seschrock error = vdev_online(spa, zc->zc_guid, zc->zc_obj, &newstate); 10114451Seschrock break; 10124451Seschrock 10134451Seschrock case VDEV_STATE_OFFLINE: 10144451Seschrock error = vdev_offline(spa, zc->zc_guid, zc->zc_obj); 10154451Seschrock break; 1016789Sahrens 10174451Seschrock case VDEV_STATE_FAULTED: 10184451Seschrock error = vdev_fault(spa, zc->zc_guid); 10194451Seschrock break; 1020789Sahrens 10214451Seschrock case VDEV_STATE_DEGRADED: 10224451Seschrock error = vdev_degrade(spa, zc->zc_guid); 10234451Seschrock break; 10244451Seschrock 10254451Seschrock default: 10264451Seschrock error = EINVAL; 10274451Seschrock } 10284451Seschrock zc->zc_cookie = newstate; 1029789Sahrens spa_close(spa, FTAG); 1030789Sahrens return (error); 1031789Sahrens } 1032789Sahrens 1033789Sahrens static int 1034789Sahrens zfs_ioc_vdev_attach(zfs_cmd_t *zc) 1035789Sahrens { 1036789Sahrens spa_t *spa; 1037789Sahrens int replacing = zc->zc_cookie; 1038789Sahrens nvlist_t *config; 1039789Sahrens int error; 1040789Sahrens 10412926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1042789Sahrens return (error); 1043789Sahrens 10445094Slling if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 10455094Slling &config)) == 0) { 10461544Seschrock error = spa_vdev_attach(spa, zc->zc_guid, config, replacing); 1047789Sahrens nvlist_free(config); 1048789Sahrens } 1049789Sahrens 1050789Sahrens spa_close(spa, FTAG); 1051789Sahrens return (error); 1052789Sahrens } 1053789Sahrens 1054789Sahrens static int 1055789Sahrens zfs_ioc_vdev_detach(zfs_cmd_t *zc) 1056789Sahrens { 1057789Sahrens spa_t *spa; 1058789Sahrens int error; 1059789Sahrens 10602926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1061789Sahrens return (error); 1062789Sahrens 10631544Seschrock error = spa_vdev_detach(spa, zc->zc_guid, B_FALSE); 1064789Sahrens 1065789Sahrens spa_close(spa, FTAG); 1066789Sahrens return (error); 1067789Sahrens } 1068789Sahrens 1069789Sahrens static int 10701354Seschrock zfs_ioc_vdev_setpath(zfs_cmd_t *zc) 10711354Seschrock { 10721354Seschrock spa_t *spa; 10732676Seschrock char *path = zc->zc_value; 10741544Seschrock uint64_t guid = zc->zc_guid; 10751354Seschrock int error; 10761354Seschrock 10771354Seschrock error = spa_open(zc->zc_name, &spa, FTAG); 10781354Seschrock if (error != 0) 10791354Seschrock return (error); 10801354Seschrock 10811354Seschrock error = spa_vdev_setpath(spa, guid, path); 10821354Seschrock spa_close(spa, FTAG); 10831354Seschrock return (error); 10841354Seschrock } 10851354Seschrock 1086*5367Sahrens /* 1087*5367Sahrens * inputs: 1088*5367Sahrens * zc_name name of filesystem 1089*5367Sahrens * zc_nvlist_dst_size size of buffer for property nvlist 1090*5367Sahrens * 1091*5367Sahrens * outputs: 1092*5367Sahrens * zc_objset_stats stats 1093*5367Sahrens * zc_nvlist_dst property nvlist 1094*5367Sahrens * zc_nvlist_dst_size size of property nvlist 1095*5367Sahrens * zc_value alternate root 1096*5367Sahrens */ 10971354Seschrock static int 1098789Sahrens zfs_ioc_objset_stats(zfs_cmd_t *zc) 1099789Sahrens { 1100789Sahrens objset_t *os = NULL; 1101789Sahrens int error; 11021356Seschrock nvlist_t *nv; 1103789Sahrens 1104789Sahrens retry: 1105789Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1106789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1107789Sahrens if (error != 0) { 1108789Sahrens /* 1109789Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1110789Sahrens * the objset is held exclusively. Fortunately this hold is 1111789Sahrens * only for a short while, so we retry here. 1112789Sahrens * This avoids user code having to handle EBUSY, 1113789Sahrens * for example for a "zfs list". 1114789Sahrens */ 1115789Sahrens if (error == EBUSY) { 1116789Sahrens delay(1); 1117789Sahrens goto retry; 1118789Sahrens } 1119789Sahrens return (error); 1120789Sahrens } 1121789Sahrens 11222885Sahrens dmu_objset_fast_stat(os, &zc->zc_objset_stats); 1123789Sahrens 11242856Snd150628 if (zc->zc_nvlist_dst != 0 && 11251356Seschrock (error = dsl_prop_get_all(os, &nv)) == 0) { 11262885Sahrens dmu_objset_stats(os, nv); 11273087Sahrens /* 11285147Srm160521 * NB: zvol_get_stats() will read the objset contents, 11293087Sahrens * which we aren't supposed to do with a 11303087Sahrens * DS_MODE_STANDARD open, because it could be 11313087Sahrens * inconsistent. So this is a bit of a workaround... 11323087Sahrens */ 11334577Sahrens if (!zc->zc_objset_stats.dds_inconsistent) { 11344577Sahrens if (dmu_objset_type(os) == DMU_OST_ZVOL) 11354577Sahrens VERIFY(zvol_get_stats(os, nv) == 0); 11364577Sahrens } 11372676Seschrock error = put_nvlist(zc, nv); 11381356Seschrock nvlist_free(nv); 11391356Seschrock } 1140789Sahrens 11412676Seschrock spa_altroot(dmu_objset_spa(os), zc->zc_value, sizeof (zc->zc_value)); 11421544Seschrock 1143789Sahrens dmu_objset_close(os); 1144789Sahrens return (error); 1145789Sahrens } 1146789Sahrens 1147*5367Sahrens /* 1148*5367Sahrens * inputs: 1149*5367Sahrens * zc_name name of filesystem 1150*5367Sahrens * zc_cookie zap cursor 1151*5367Sahrens * zc_nvlist_dst_size size of buffer for property nvlist 1152*5367Sahrens * 1153*5367Sahrens * outputs: 1154*5367Sahrens * zc_name name of next filesystem 1155*5367Sahrens * zc_objset_stats stats 1156*5367Sahrens * zc_nvlist_dst property nvlist 1157*5367Sahrens * zc_nvlist_dst_size size of property nvlist 1158*5367Sahrens * zc_value alternate root 1159*5367Sahrens */ 1160789Sahrens static int 11615147Srm160521 zfs_ioc_objset_version(zfs_cmd_t *zc) 11625147Srm160521 { 11635147Srm160521 objset_t *os = NULL; 11645147Srm160521 int error; 11655147Srm160521 11665147Srm160521 retry: 11675147Srm160521 error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 11685147Srm160521 DS_MODE_STANDARD | DS_MODE_READONLY, &os); 11695147Srm160521 if (error != 0) { 11705147Srm160521 /* 11715147Srm160521 * This is ugly: dmu_objset_open() can return EBUSY if 11725147Srm160521 * the objset is held exclusively. Fortunately this hold is 11735147Srm160521 * only for a short while, so we retry here. 11745147Srm160521 * This avoids user code having to handle EBUSY, 11755147Srm160521 * for example for a "zfs list". 11765147Srm160521 */ 11775147Srm160521 if (error == EBUSY) { 11785147Srm160521 delay(1); 11795147Srm160521 goto retry; 11805147Srm160521 } 11815147Srm160521 return (error); 11825147Srm160521 } 11835147Srm160521 11845147Srm160521 dmu_objset_fast_stat(os, &zc->zc_objset_stats); 11855147Srm160521 11865147Srm160521 /* 11875147Srm160521 * NB: zfs_get_version() will read the objset contents, 11885147Srm160521 * which we aren't supposed to do with a 11895147Srm160521 * DS_MODE_STANDARD open, because it could be 11905147Srm160521 * inconsistent. So this is a bit of a workaround... 11915147Srm160521 */ 11925147Srm160521 zc->zc_cookie = 0; 11935147Srm160521 if (!zc->zc_objset_stats.dds_inconsistent) 11945147Srm160521 if (dmu_objset_type(os) == DMU_OST_ZFS) 11955147Srm160521 (void) zfs_get_version(os, &zc->zc_cookie); 11965147Srm160521 11975147Srm160521 dmu_objset_close(os); 11985147Srm160521 return (0); 11995147Srm160521 } 12005147Srm160521 12015147Srm160521 static int 1202789Sahrens zfs_ioc_dataset_list_next(zfs_cmd_t *zc) 1203789Sahrens { 1204885Sahrens objset_t *os; 1205789Sahrens int error; 1206789Sahrens char *p; 1207789Sahrens 1208885Sahrens retry: 1209885Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1210885Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1211885Sahrens if (error != 0) { 1212885Sahrens /* 1213885Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1214885Sahrens * the objset is held exclusively. Fortunately this hold is 1215885Sahrens * only for a short while, so we retry here. 1216885Sahrens * This avoids user code having to handle EBUSY, 1217885Sahrens * for example for a "zfs list". 1218885Sahrens */ 1219885Sahrens if (error == EBUSY) { 1220885Sahrens delay(1); 1221885Sahrens goto retry; 1222885Sahrens } 1223885Sahrens if (error == ENOENT) 1224885Sahrens error = ESRCH; 1225885Sahrens return (error); 1226789Sahrens } 1227789Sahrens 1228789Sahrens p = strrchr(zc->zc_name, '/'); 1229789Sahrens if (p == NULL || p[1] != '\0') 1230789Sahrens (void) strlcat(zc->zc_name, "/", sizeof (zc->zc_name)); 1231789Sahrens p = zc->zc_name + strlen(zc->zc_name); 1232789Sahrens 1233789Sahrens do { 1234885Sahrens error = dmu_dir_list_next(os, 1235885Sahrens sizeof (zc->zc_name) - (p - zc->zc_name), p, 1236885Sahrens NULL, &zc->zc_cookie); 1237789Sahrens if (error == ENOENT) 1238789Sahrens error = ESRCH; 1239885Sahrens } while (error == 0 && !INGLOBALZONE(curproc) && 1240789Sahrens !zone_dataset_visible(zc->zc_name, NULL)); 1241789Sahrens 1242885Sahrens /* 1243885Sahrens * If it's a hidden dataset (ie. with a '$' in its name), don't 1244885Sahrens * try to get stats for it. Userland will skip over it. 1245885Sahrens */ 1246885Sahrens if (error == 0 && strchr(zc->zc_name, '$') == NULL) 1247885Sahrens error = zfs_ioc_objset_stats(zc); /* fill in the stats */ 1248789Sahrens 1249885Sahrens dmu_objset_close(os); 1250789Sahrens return (error); 1251789Sahrens } 1252789Sahrens 1253*5367Sahrens /* 1254*5367Sahrens * inputs: 1255*5367Sahrens * zc_name name of filesystem 1256*5367Sahrens * zc_cookie zap cursor 1257*5367Sahrens * zc_nvlist_dst_size size of buffer for property nvlist 1258*5367Sahrens * 1259*5367Sahrens * outputs: 1260*5367Sahrens * zc_name name of next snapshot 1261*5367Sahrens * zc_objset_stats stats 1262*5367Sahrens * zc_nvlist_dst property nvlist 1263*5367Sahrens * zc_nvlist_dst_size size of property nvlist 1264*5367Sahrens * zc_value alternate root 1265*5367Sahrens */ 1266789Sahrens static int 1267789Sahrens zfs_ioc_snapshot_list_next(zfs_cmd_t *zc) 1268789Sahrens { 1269885Sahrens objset_t *os; 1270789Sahrens int error; 1271789Sahrens 1272789Sahrens retry: 1273885Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1274885Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1275885Sahrens if (error != 0) { 1276789Sahrens /* 1277885Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1278789Sahrens * the objset is held exclusively. Fortunately this hold is 1279789Sahrens * only for a short while, so we retry here. 1280789Sahrens * This avoids user code having to handle EBUSY, 1281885Sahrens * for example for a "zfs list". 1282789Sahrens */ 1283789Sahrens if (error == EBUSY) { 1284789Sahrens delay(1); 1285789Sahrens goto retry; 1286789Sahrens } 1287789Sahrens if (error == ENOENT) 1288885Sahrens error = ESRCH; 1289789Sahrens return (error); 1290789Sahrens } 1291789Sahrens 12921003Slling /* 12931003Slling * A dataset name of maximum length cannot have any snapshots, 12941003Slling * so exit immediately. 12951003Slling */ 12961003Slling if (strlcat(zc->zc_name, "@", sizeof (zc->zc_name)) >= MAXNAMELEN) { 1297885Sahrens dmu_objset_close(os); 12981003Slling return (ESRCH); 1299789Sahrens } 1300789Sahrens 1301885Sahrens error = dmu_snapshot_list_next(os, 1302885Sahrens sizeof (zc->zc_name) - strlen(zc->zc_name), 1303885Sahrens zc->zc_name + strlen(zc->zc_name), NULL, &zc->zc_cookie); 1304789Sahrens if (error == ENOENT) 1305789Sahrens error = ESRCH; 1306789Sahrens 1307885Sahrens if (error == 0) 1308885Sahrens error = zfs_ioc_objset_stats(zc); /* fill in the stats */ 1309789Sahrens 1310*5367Sahrens /* if we failed, undo the @ that we tacked on to zc_name */ 1311*5367Sahrens if (error != 0) 1312*5367Sahrens *strchr(zc->zc_name, '@') = '\0'; 1313*5367Sahrens 1314885Sahrens dmu_objset_close(os); 1315789Sahrens return (error); 1316789Sahrens } 1317789Sahrens 1318789Sahrens static int 13194787Sahrens zfs_set_prop_nvlist(const char *name, nvlist_t *nvl) 1320789Sahrens { 13212676Seschrock nvpair_t *elem; 13222676Seschrock int error; 13232676Seschrock uint64_t intval; 13242676Seschrock char *strval; 13252676Seschrock 13264543Smarks /* 13274543Smarks * First validate permission to set all of the properties 13284543Smarks */ 13292676Seschrock elem = NULL; 13302676Seschrock while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) { 13314670Sahrens const char *propname = nvpair_name(elem); 13324670Sahrens zfs_prop_t prop = zfs_name_to_prop(propname); 13332676Seschrock 13345094Slling if (prop == ZPROP_INVAL) { 13352676Seschrock /* 13362676Seschrock * If this is a user-defined property, it must be a 13372676Seschrock * string, and there is no further validation to do. 13382676Seschrock */ 13392676Seschrock if (!zfs_prop_user(propname) || 13402676Seschrock nvpair_type(elem) != DATA_TYPE_STRING) 13412676Seschrock return (EINVAL); 13422676Seschrock 13435331Samw if (error = zfs_secpolicy_write_perms(name, 13445331Samw ZFS_DELEG_PERM_USERPROP, CRED())) 13454670Sahrens return (error); 13464543Smarks continue; 13472676Seschrock } 13482676Seschrock 13494787Sahrens if ((error = zfs_secpolicy_setprop(name, prop, CRED())) != 0) 13504670Sahrens return (error); 13512676Seschrock 13524670Sahrens /* 13534670Sahrens * Check that this value is valid for this pool version 13544670Sahrens */ 13554670Sahrens switch (prop) { 13563886Sahl case ZFS_PROP_COMPRESSION: 13573886Sahl /* 13583886Sahl * If the user specified gzip compression, make sure 13593886Sahl * the SPA supports it. We ignore any errors here since 13603886Sahl * we'll catch them later. 13613886Sahl */ 13623886Sahl if (nvpair_type(elem) == DATA_TYPE_UINT64 && 13633886Sahl nvpair_value_uint64(elem, &intval) == 0 && 13643886Sahl intval >= ZIO_COMPRESS_GZIP_1 && 13653886Sahl intval <= ZIO_COMPRESS_GZIP_9) { 13665331Samw if (zfs_check_version(name, 13675331Samw SPA_VERSION_GZIP_COMPRESSION)) 13685331Samw return (ENOTSUP); 13693886Sahl } 13703886Sahl break; 13714603Sahrens 13724603Sahrens case ZFS_PROP_COPIES: 13735331Samw if (zfs_check_version(name, SPA_VERSION_DITTO_BLOCKS)) 13745331Samw return (ENOTSUP); 13754603Sahrens break; 13765331Samw case ZFS_PROP_NORMALIZE: 13775331Samw case ZFS_PROP_UTF8ONLY: 13785331Samw case ZFS_PROP_CASE: 13795331Samw if (zfs_check_version(name, SPA_VERSION_NORMALIZATION)) 13805331Samw return (ENOTSUP); 13815331Samw 13824603Sahrens } 13835331Samw if ((error = zfs_secpolicy_setprop(name, prop, CRED())) != 0) 13845331Samw return (error); 13854543Smarks } 13864543Smarks 13874543Smarks elem = NULL; 13884543Smarks while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) { 13894670Sahrens const char *propname = nvpair_name(elem); 13904670Sahrens zfs_prop_t prop = zfs_name_to_prop(propname); 13914543Smarks 13925094Slling if (prop == ZPROP_INVAL) { 13934543Smarks VERIFY(nvpair_value_string(elem, &strval) == 0); 13944543Smarks error = dsl_prop_set(name, propname, 1, 13954543Smarks strlen(strval) + 1, strval); 13964543Smarks if (error == 0) 13974543Smarks continue; 13984543Smarks else 13994543Smarks return (error); 14004543Smarks } 14012676Seschrock 14022676Seschrock switch (prop) { 14032676Seschrock case ZFS_PROP_QUOTA: 14042676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14054577Sahrens (error = dsl_dir_set_quota(name, intval)) != 0) 14062676Seschrock return (error); 14072676Seschrock break; 14082676Seschrock 14092676Seschrock case ZFS_PROP_RESERVATION: 14102676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14112676Seschrock (error = dsl_dir_set_reservation(name, 14122676Seschrock intval)) != 0) 14132676Seschrock return (error); 14142676Seschrock break; 1415789Sahrens 14162676Seschrock case ZFS_PROP_VOLSIZE: 14172676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14184787Sahrens (error = zvol_set_volsize(name, 14194787Sahrens ddi_driver_major(zfs_dip), intval)) != 0) 14202676Seschrock return (error); 14212676Seschrock break; 14222676Seschrock 14232676Seschrock case ZFS_PROP_VOLBLOCKSIZE: 14242676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14254577Sahrens (error = zvol_set_volblocksize(name, intval)) != 0) 14264577Sahrens return (error); 14274577Sahrens break; 14284577Sahrens 14294577Sahrens case ZFS_PROP_VERSION: 14304577Sahrens if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14314577Sahrens (error = zfs_set_version(name, intval)) != 0) 14322676Seschrock return (error); 14332676Seschrock break; 14342676Seschrock 14352676Seschrock default: 14362676Seschrock if (nvpair_type(elem) == DATA_TYPE_STRING) { 14372676Seschrock if (zfs_prop_get_type(prop) != 14384787Sahrens PROP_TYPE_STRING) 14392676Seschrock return (EINVAL); 14402717Seschrock VERIFY(nvpair_value_string(elem, &strval) == 0); 14412717Seschrock if ((error = dsl_prop_set(name, 14422676Seschrock nvpair_name(elem), 1, strlen(strval) + 1, 14432717Seschrock strval)) != 0) 14442717Seschrock return (error); 14452676Seschrock } else if (nvpair_type(elem) == DATA_TYPE_UINT64) { 14462885Sahrens const char *unused; 14472885Sahrens 14482717Seschrock VERIFY(nvpair_value_uint64(elem, &intval) == 0); 14492676Seschrock 14502676Seschrock switch (zfs_prop_get_type(prop)) { 14514787Sahrens case PROP_TYPE_NUMBER: 14522676Seschrock break; 14534787Sahrens case PROP_TYPE_STRING: 14542717Seschrock return (EINVAL); 14554787Sahrens case PROP_TYPE_INDEX: 14562717Seschrock if (zfs_prop_index_to_string(prop, 14572717Seschrock intval, &unused) != 0) 14582717Seschrock return (EINVAL); 14592676Seschrock break; 14602676Seschrock default: 14614577Sahrens cmn_err(CE_PANIC, 14624577Sahrens "unknown property type"); 14632676Seschrock break; 14642676Seschrock } 14652676Seschrock 14662717Seschrock if ((error = dsl_prop_set(name, propname, 14672717Seschrock 8, 1, &intval)) != 0) 14682717Seschrock return (error); 14692676Seschrock } else { 14702676Seschrock return (EINVAL); 14712676Seschrock } 14722676Seschrock break; 14732676Seschrock } 14742676Seschrock } 14752676Seschrock 14762676Seschrock return (0); 1477789Sahrens } 1478789Sahrens 1479*5367Sahrens /* 1480*5367Sahrens * inputs: 1481*5367Sahrens * zc_name name of filesystem 1482*5367Sahrens * zc_value name of property to inherit 1483*5367Sahrens * zc_nvlist_src{_size} nvlist of properties to apply 1484*5367Sahrens * 1485*5367Sahrens * outputs: none 1486*5367Sahrens */ 1487789Sahrens static int 14882676Seschrock zfs_ioc_set_prop(zfs_cmd_t *zc) 1489789Sahrens { 14902676Seschrock nvlist_t *nvl; 14912676Seschrock int error; 1492789Sahrens 14935094Slling if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 14945094Slling &nvl)) != 0) 14952676Seschrock return (error); 14962676Seschrock 14974787Sahrens error = zfs_set_prop_nvlist(zc->zc_name, nvl); 14984543Smarks 14992676Seschrock nvlist_free(nvl); 15002676Seschrock return (error); 1501789Sahrens } 1502789Sahrens 1503*5367Sahrens /* 1504*5367Sahrens * inputs: 1505*5367Sahrens * zc_name name of filesystem 1506*5367Sahrens * zc_value name of property to inherit 1507*5367Sahrens * 1508*5367Sahrens * outputs: none 1509*5367Sahrens */ 1510789Sahrens static int 15114849Sahrens zfs_ioc_inherit_prop(zfs_cmd_t *zc) 15124849Sahrens { 15134849Sahrens /* the property name has been validated by zfs_secpolicy_inherit() */ 15144849Sahrens return (dsl_prop_set(zc->zc_name, zc->zc_value, 0, 0, NULL)); 15154849Sahrens } 15164849Sahrens 15174849Sahrens static int 15184098Slling zfs_ioc_pool_set_props(zfs_cmd_t *zc) 15193912Slling { 15205094Slling nvlist_t *props; 15213912Slling spa_t *spa; 15225094Slling int error; 15233912Slling 15245094Slling if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 15255094Slling &props))) 15263912Slling return (error); 15273912Slling 15283912Slling if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) { 15295094Slling nvlist_free(props); 15303912Slling return (error); 15313912Slling } 15323912Slling 15335094Slling error = spa_prop_set(spa, props); 15343912Slling 15355094Slling nvlist_free(props); 15363912Slling spa_close(spa, FTAG); 15373912Slling 15383912Slling return (error); 15393912Slling } 15403912Slling 15413912Slling static int 15424098Slling zfs_ioc_pool_get_props(zfs_cmd_t *zc) 15433912Slling { 15443912Slling spa_t *spa; 15453912Slling int error; 15463912Slling nvlist_t *nvp = NULL; 15473912Slling 15483912Slling if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 15493912Slling return (error); 15503912Slling 15515094Slling error = spa_prop_get(spa, &nvp); 15523912Slling 15533912Slling if (error == 0 && zc->zc_nvlist_dst != NULL) 15543912Slling error = put_nvlist(zc, nvp); 15553912Slling else 15563912Slling error = EFAULT; 15573912Slling 15583912Slling spa_close(spa, FTAG); 15593912Slling 15603912Slling if (nvp) 15613912Slling nvlist_free(nvp); 15623912Slling return (error); 15633912Slling } 15643912Slling 15653912Slling static int 15664543Smarks zfs_ioc_iscsi_perm_check(zfs_cmd_t *zc) 15674543Smarks { 15684543Smarks nvlist_t *nvp; 15694543Smarks int error; 15704543Smarks uint32_t uid; 15714543Smarks uint32_t gid; 15724543Smarks uint32_t *groups; 15734543Smarks uint_t group_cnt; 15744543Smarks cred_t *usercred; 15754543Smarks 15765094Slling if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 15775094Slling &nvp)) != 0) { 15784543Smarks return (error); 15794543Smarks } 15804543Smarks 15814543Smarks if ((error = nvlist_lookup_uint32(nvp, 15824543Smarks ZFS_DELEG_PERM_UID, &uid)) != 0) { 15834543Smarks nvlist_free(nvp); 15844543Smarks return (EPERM); 15854543Smarks } 15864543Smarks 15874543Smarks if ((error = nvlist_lookup_uint32(nvp, 15884543Smarks ZFS_DELEG_PERM_GID, &gid)) != 0) { 15894543Smarks nvlist_free(nvp); 15904543Smarks return (EPERM); 15914543Smarks } 15924543Smarks 15934543Smarks if ((error = nvlist_lookup_uint32_array(nvp, ZFS_DELEG_PERM_GROUPS, 15944543Smarks &groups, &group_cnt)) != 0) { 15954543Smarks nvlist_free(nvp); 15964543Smarks return (EPERM); 15974543Smarks } 15984543Smarks usercred = cralloc(); 15994543Smarks if ((crsetugid(usercred, uid, gid) != 0) || 16004543Smarks (crsetgroups(usercred, group_cnt, (gid_t *)groups) != 0)) { 16014543Smarks nvlist_free(nvp); 16024543Smarks crfree(usercred); 16034543Smarks return (EPERM); 16044543Smarks } 16054543Smarks nvlist_free(nvp); 16064543Smarks error = dsl_deleg_access(zc->zc_name, 16074787Sahrens zfs_prop_to_name(ZFS_PROP_SHAREISCSI), usercred); 16084543Smarks crfree(usercred); 16094543Smarks return (error); 16104543Smarks } 16114543Smarks 1612*5367Sahrens /* 1613*5367Sahrens * inputs: 1614*5367Sahrens * zc_name name of filesystem 1615*5367Sahrens * zc_nvlist_src{_size} nvlist of delegated permissions 1616*5367Sahrens * zc_perm_action allow/unallow flag 1617*5367Sahrens * 1618*5367Sahrens * outputs: none 1619*5367Sahrens */ 16204543Smarks static int 16214543Smarks zfs_ioc_set_fsacl(zfs_cmd_t *zc) 16224543Smarks { 16234543Smarks int error; 16244543Smarks nvlist_t *fsaclnv = NULL; 16254543Smarks 16265094Slling if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 16275094Slling &fsaclnv)) != 0) 16284543Smarks return (error); 16294543Smarks 16304543Smarks /* 16314543Smarks * Verify nvlist is constructed correctly 16324543Smarks */ 16334543Smarks if ((error = zfs_deleg_verify_nvlist(fsaclnv)) != 0) { 16344543Smarks nvlist_free(fsaclnv); 16354543Smarks return (EINVAL); 16364543Smarks } 16374543Smarks 16384543Smarks /* 16394543Smarks * If we don't have PRIV_SYS_MOUNT, then validate 16404543Smarks * that user is allowed to hand out each permission in 16414543Smarks * the nvlist(s) 16424543Smarks */ 16434543Smarks 16444787Sahrens error = secpolicy_zfs(CRED()); 16454543Smarks if (error) { 16464787Sahrens if (zc->zc_perm_action == B_FALSE) { 16474787Sahrens error = dsl_deleg_can_allow(zc->zc_name, 16484787Sahrens fsaclnv, CRED()); 16494787Sahrens } else { 16504787Sahrens error = dsl_deleg_can_unallow(zc->zc_name, 16514787Sahrens fsaclnv, CRED()); 16524787Sahrens } 16534543Smarks } 16544543Smarks 16554543Smarks if (error == 0) 16564543Smarks error = dsl_deleg_set(zc->zc_name, fsaclnv, zc->zc_perm_action); 16574543Smarks 16584543Smarks nvlist_free(fsaclnv); 16594543Smarks return (error); 16604543Smarks } 16614543Smarks 1662*5367Sahrens /* 1663*5367Sahrens * inputs: 1664*5367Sahrens * zc_name name of filesystem 1665*5367Sahrens * 1666*5367Sahrens * outputs: 1667*5367Sahrens * zc_nvlist_src{_size} nvlist of delegated permissions 1668*5367Sahrens */ 16694543Smarks static int 16704543Smarks zfs_ioc_get_fsacl(zfs_cmd_t *zc) 16714543Smarks { 16724543Smarks nvlist_t *nvp; 16734543Smarks int error; 16744543Smarks 16754543Smarks if ((error = dsl_deleg_get(zc->zc_name, &nvp)) == 0) { 16764543Smarks error = put_nvlist(zc, nvp); 16774543Smarks nvlist_free(nvp); 16784543Smarks } 16794543Smarks 16804543Smarks return (error); 16814543Smarks } 16824543Smarks 1683*5367Sahrens /* 1684*5367Sahrens * inputs: 1685*5367Sahrens * zc_name name of volume 1686*5367Sahrens * 1687*5367Sahrens * outputs: none 1688*5367Sahrens */ 16894543Smarks static int 1690789Sahrens zfs_ioc_create_minor(zfs_cmd_t *zc) 1691789Sahrens { 16924787Sahrens return (zvol_create_minor(zc->zc_name, ddi_driver_major(zfs_dip))); 1693789Sahrens } 1694789Sahrens 1695*5367Sahrens /* 1696*5367Sahrens * inputs: 1697*5367Sahrens * zc_name name of volume 1698*5367Sahrens * 1699*5367Sahrens * outputs: none 1700*5367Sahrens */ 1701789Sahrens static int 1702789Sahrens zfs_ioc_remove_minor(zfs_cmd_t *zc) 1703789Sahrens { 17042676Seschrock return (zvol_remove_minor(zc->zc_name)); 1705789Sahrens } 1706789Sahrens 1707789Sahrens /* 1708789Sahrens * Search the vfs list for a specified resource. Returns a pointer to it 1709789Sahrens * or NULL if no suitable entry is found. The caller of this routine 1710789Sahrens * is responsible for releasing the returned vfs pointer. 1711789Sahrens */ 1712789Sahrens static vfs_t * 1713789Sahrens zfs_get_vfs(const char *resource) 1714789Sahrens { 1715789Sahrens struct vfs *vfsp; 1716789Sahrens struct vfs *vfs_found = NULL; 1717789Sahrens 1718789Sahrens vfs_list_read_lock(); 1719789Sahrens vfsp = rootvfs; 1720789Sahrens do { 1721789Sahrens if (strcmp(refstr_value(vfsp->vfs_resource), resource) == 0) { 1722789Sahrens VFS_HOLD(vfsp); 1723789Sahrens vfs_found = vfsp; 1724789Sahrens break; 1725789Sahrens } 1726789Sahrens vfsp = vfsp->vfs_next; 1727789Sahrens } while (vfsp != rootvfs); 1728789Sahrens vfs_list_unlock(); 1729789Sahrens return (vfs_found); 1730789Sahrens } 1731789Sahrens 17324543Smarks /* ARGSUSED */ 1733789Sahrens static void 17344543Smarks zfs_create_cb(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx) 1735789Sahrens { 17365331Samw zfs_creat_t *zct = arg; 17375331Samw uint64_t version; 17385331Samw 17395331Samw if (spa_version(dmu_objset_spa(os)) >= SPA_VERSION_FUID) 17405331Samw version = ZPL_VERSION; 17415331Samw else 17425331Samw version = ZPL_VERSION_FUID - 1; 17435331Samw 17445331Samw (void) nvlist_lookup_uint64(zct->zct_props, 17454577Sahrens zfs_prop_to_name(ZFS_PROP_VERSION), &version); 17464577Sahrens 17475331Samw zfs_create_fs(os, cr, version, zct->zct_norm, tx); 17485331Samw } 17495331Samw 17505331Samw /* 17515331Samw * zfs_prop_lookup() 17525331Samw * 17535331Samw * Look for the property first in the existing property nvlist. If 17545331Samw * it's already present, you're done. If it's not there, attempt to 17555331Samw * find the property value from a parent dataset. If that fails, fall 17565331Samw * back to the property's default value. In either of these two 17575331Samw * cases, if update is TRUE, add a value for the property to the 17585331Samw * property nvlist. 17595331Samw * 17605331Samw * If the rval pointer is non-NULL, copy the discovered value to rval. 17615331Samw * 17625331Samw * If we get any unexpected errors, bail and return the error number 17635331Samw * to the caller. 17645331Samw * 17655331Samw * If we succeed, return 0. 17665331Samw */ 17675331Samw static int 17685331Samw zfs_prop_lookup(const char *parentname, zfs_prop_t propnum, 17695331Samw nvlist_t *proplist, uint64_t *rval, boolean_t update) 17705331Samw { 17715331Samw const char *propname; 17725331Samw uint64_t value; 17735331Samw int error = ENOENT; 17745331Samw 17755331Samw propname = zfs_prop_to_name(propnum); 17765331Samw if (proplist != NULL) 17775331Samw error = nvlist_lookup_uint64(proplist, propname, &value); 17785331Samw if (error == ENOENT) { 17795331Samw error = dsl_prop_get_integer(parentname, propname, 17805331Samw &value, NULL); 17815331Samw if (error == ENOENT) 17825331Samw value = zfs_prop_default_numeric(propnum); 17835331Samw else if (error != 0) 17845331Samw return (error); 17855331Samw if (update) { 17865331Samw ASSERT(proplist != NULL); 17875331Samw error = nvlist_add_uint64(proplist, propname, value); 17885331Samw } 17895331Samw } 17905331Samw if (error == 0 && rval) 17915331Samw *rval = value; 17925331Samw return (error); 17935331Samw } 17945331Samw 17955331Samw /* 17965331Samw * zfs_normalization_get 17975331Samw * 17985331Samw * Get the normalization flag value. If the properties have 17995331Samw * non-default values, make sure the pool version is recent enough to 18005331Samw * support these choices. 18015331Samw */ 18025331Samw static int 18035331Samw zfs_normalization_get(const char *dataset, nvlist_t *proplist, int *norm, 18045331Samw boolean_t update) 18055331Samw { 18065331Samw char parentname[MAXNAMELEN]; 18075331Samw char poolname[MAXNAMELEN]; 18085331Samw char *cp; 18095331Samw uint64_t value; 18105331Samw int check = 0; 18115331Samw int error; 18125331Samw 18135331Samw ASSERT(norm != NULL); 18145331Samw *norm = 0; 18155331Samw 18165331Samw (void) strncpy(parentname, dataset, sizeof (parentname)); 18175331Samw cp = strrchr(parentname, '@'); 18185331Samw if (cp != NULL) { 18195331Samw cp[0] = '\0'; 18205331Samw } else { 18215331Samw cp = strrchr(parentname, '/'); 18225331Samw if (cp == NULL) 18235331Samw return (ENOENT); 18245331Samw cp[0] = '\0'; 18255331Samw } 18265331Samw 18275331Samw (void) strncpy(poolname, dataset, sizeof (poolname)); 18285331Samw cp = strchr(poolname, '/'); 18295331Samw if (cp != NULL) 18305331Samw cp[0] = '\0'; 18315331Samw 18325331Samw error = zfs_prop_lookup(parentname, ZFS_PROP_UTF8ONLY, 18335331Samw proplist, &value, update); 18345331Samw if (error != 0) 18355331Samw return (error); 18365331Samw if (value != zfs_prop_default_numeric(ZFS_PROP_UTF8ONLY)) 18375331Samw check = 1; 18385331Samw 18395331Samw error = zfs_prop_lookup(parentname, ZFS_PROP_NORMALIZE, 18405331Samw proplist, &value, update); 18415331Samw if (error != 0) 18425331Samw return (error); 18435331Samw if (value != zfs_prop_default_numeric(ZFS_PROP_NORMALIZE)) { 18445331Samw check = 1; 18455331Samw switch ((int)value) { 18465331Samw case ZFS_NORMALIZE_NONE: 18475331Samw break; 18485331Samw case ZFS_NORMALIZE_C: 18495331Samw *norm |= U8_TEXTPREP_NFC; 18505331Samw break; 18515331Samw case ZFS_NORMALIZE_D: 18525331Samw *norm |= U8_TEXTPREP_NFD; 18535331Samw break; 18545331Samw case ZFS_NORMALIZE_KC: 18555331Samw *norm |= U8_TEXTPREP_NFKC; 18565331Samw break; 18575331Samw case ZFS_NORMALIZE_KD: 18585331Samw *norm |= U8_TEXTPREP_NFKD; 18595331Samw break; 18605331Samw default: 18615331Samw ASSERT((int)value >= ZFS_NORMALIZE_NONE); 18625331Samw ASSERT((int)value <= ZFS_NORMALIZE_KD); 18635331Samw break; 18645331Samw } 18655331Samw } 18665331Samw 18675331Samw error = zfs_prop_lookup(parentname, ZFS_PROP_CASE, 18685331Samw proplist, &value, update); 18695331Samw if (error != 0) 18705331Samw return (error); 18715331Samw if (value != zfs_prop_default_numeric(ZFS_PROP_CASE)) { 18725331Samw check = 1; 18735331Samw switch ((int)value) { 18745331Samw case ZFS_CASE_SENSITIVE: 18755331Samw break; 18765331Samw case ZFS_CASE_INSENSITIVE: 18775331Samw *norm |= U8_TEXTPREP_TOUPPER; 18785331Samw break; 18795331Samw case ZFS_CASE_MIXED: 18805331Samw *norm |= U8_TEXTPREP_TOUPPER; 18815331Samw break; 18825331Samw default: 18835331Samw ASSERT((int)value >= ZFS_CASE_SENSITIVE); 18845331Samw ASSERT((int)value <= ZFS_CASE_MIXED); 18855331Samw break; 18865331Samw } 18875331Samw } 18885331Samw 18895331Samw if (check == 1) 18905331Samw if (zfs_check_version(poolname, SPA_VERSION_NORMALIZATION)) 18915331Samw return (ENOTSUP); 18925331Samw return (0); 1893789Sahrens } 1894789Sahrens 1895*5367Sahrens /* 1896*5367Sahrens * inputs: 1897*5367Sahrens * zc_objset_type type of objset to create (fs vs zvol) 1898*5367Sahrens * zc_name name of new objset 1899*5367Sahrens * zc_value name of snapshot to clone from (may be empty) 1900*5367Sahrens * zc_nvlist_src{_size} nvlist of properties to apply 1901*5367Sahrens * 1902*5367Sahrens * outputs: none 1903*5367Sahrens */ 1904789Sahrens static int 1905789Sahrens zfs_ioc_create(zfs_cmd_t *zc) 1906789Sahrens { 1907789Sahrens objset_t *clone; 1908789Sahrens int error = 0; 19095331Samw zfs_creat_t zct; 19104543Smarks nvlist_t *nvprops = NULL; 19114543Smarks void (*cbfunc)(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx); 1912789Sahrens dmu_objset_type_t type = zc->zc_objset_type; 1913789Sahrens 1914789Sahrens switch (type) { 1915789Sahrens 1916789Sahrens case DMU_OST_ZFS: 1917789Sahrens cbfunc = zfs_create_cb; 1918789Sahrens break; 1919789Sahrens 1920789Sahrens case DMU_OST_ZVOL: 1921789Sahrens cbfunc = zvol_create_cb; 1922789Sahrens break; 1923789Sahrens 1924789Sahrens default: 19252199Sahrens cbfunc = NULL; 19262199Sahrens } 19275326Sek110237 if (strchr(zc->zc_name, '@') || 19285326Sek110237 strchr(zc->zc_name, '%')) 1929789Sahrens return (EINVAL); 1930789Sahrens 19312676Seschrock if (zc->zc_nvlist_src != NULL && 19325094Slling (error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 19335094Slling &nvprops)) != 0) 19342676Seschrock return (error); 19352676Seschrock 19365331Samw zct.zct_norm = 0; 19375331Samw zct.zct_props = nvprops; 19385331Samw 19392676Seschrock if (zc->zc_value[0] != '\0') { 1940789Sahrens /* 1941789Sahrens * We're creating a clone of an existing snapshot. 1942789Sahrens */ 19432676Seschrock zc->zc_value[sizeof (zc->zc_value) - 1] = '\0'; 19442676Seschrock if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0) { 19454543Smarks nvlist_free(nvprops); 1946789Sahrens return (EINVAL); 19472676Seschrock } 1948789Sahrens 19492676Seschrock error = dmu_objset_open(zc->zc_value, type, 1950789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &clone); 19512676Seschrock if (error) { 19524543Smarks nvlist_free(nvprops); 1953789Sahrens return (error); 19542676Seschrock } 1955789Sahrens error = dmu_objset_create(zc->zc_name, type, clone, NULL, NULL); 19565331Samw if (error) { 19575331Samw dmu_objset_close(clone); 19585331Samw nvlist_free(nvprops); 19595331Samw return (error); 19605331Samw } 19615331Samw /* 19625331Samw * If caller did not provide any properties, allocate 19635331Samw * an nvlist for properties, as we will be adding our set-once 19645331Samw * properties to it. This carries the choices made on the 19655331Samw * original file system into the clone. 19665331Samw */ 19675331Samw if (nvprops == NULL) 19685331Samw VERIFY(nvlist_alloc(&nvprops, 19695331Samw NV_UNIQUE_NAME, KM_SLEEP) == 0); 19705331Samw 19715331Samw /* 19725331Samw * We have to have normalization and case-folding 19735331Samw * flags correct when we do the file system creation, 19745331Samw * so go figure them out now. All we really care about 19755331Samw * here is getting these values into the property list. 19765331Samw */ 19775331Samw error = zfs_normalization_get(zc->zc_value, nvprops, 19785331Samw &zct.zct_norm, B_TRUE); 19795331Samw if (error != 0) { 19805331Samw dmu_objset_close(clone); 19815331Samw nvlist_free(nvprops); 19825331Samw return (error); 19835331Samw } 1984789Sahrens dmu_objset_close(clone); 1985789Sahrens } else { 19862676Seschrock if (cbfunc == NULL) { 19874543Smarks nvlist_free(nvprops); 19882199Sahrens return (EINVAL); 19892676Seschrock } 19902676Seschrock 1991789Sahrens if (type == DMU_OST_ZVOL) { 19922676Seschrock uint64_t volsize, volblocksize; 19932676Seschrock 19944543Smarks if (nvprops == NULL || 19954543Smarks nvlist_lookup_uint64(nvprops, 19962676Seschrock zfs_prop_to_name(ZFS_PROP_VOLSIZE), 19972676Seschrock &volsize) != 0) { 19984543Smarks nvlist_free(nvprops); 19992676Seschrock return (EINVAL); 20002676Seschrock } 20012676Seschrock 20024543Smarks if ((error = nvlist_lookup_uint64(nvprops, 20032676Seschrock zfs_prop_to_name(ZFS_PROP_VOLBLOCKSIZE), 20042676Seschrock &volblocksize)) != 0 && error != ENOENT) { 20054543Smarks nvlist_free(nvprops); 20062676Seschrock return (EINVAL); 20072676Seschrock } 20081133Seschrock 20092676Seschrock if (error != 0) 20102676Seschrock volblocksize = zfs_prop_default_numeric( 20112676Seschrock ZFS_PROP_VOLBLOCKSIZE); 20122676Seschrock 20132676Seschrock if ((error = zvol_check_volblocksize( 20142676Seschrock volblocksize)) != 0 || 20152676Seschrock (error = zvol_check_volsize(volsize, 20162676Seschrock volblocksize)) != 0) { 20174543Smarks nvlist_free(nvprops); 2018789Sahrens return (error); 20192676Seschrock } 20204577Sahrens } else if (type == DMU_OST_ZFS) { 20214577Sahrens uint64_t version; 20225331Samw int error; 20235331Samw 20245331Samw error = nvlist_lookup_uint64(nvprops, 20255331Samw zfs_prop_to_name(ZFS_PROP_VERSION), &version); 20265331Samw 20275331Samw if (error == 0 && (version < ZPL_VERSION_INITIAL || 20284577Sahrens version > ZPL_VERSION)) { 20294577Sahrens nvlist_free(nvprops); 20305331Samw return (ENOTSUP); 20315331Samw } else if (error == 0 && version >= ZPL_VERSION_FUID && 20325331Samw zfs_check_version(zc->zc_name, SPA_VERSION_FUID)) { 20335331Samw nvlist_free(nvprops); 20345331Samw return (ENOTSUP); 20355331Samw } 20365331Samw 20375331Samw /* 20385331Samw * We have to have normalization and 20395331Samw * case-folding flags correct when we do the 20405331Samw * file system creation, so go figure them out 20415331Samw * now. The final argument to zfs_normalization_get() 20425331Samw * tells that routine not to update the nvprops 20435331Samw * list. 20445331Samw */ 20455331Samw error = zfs_normalization_get(zc->zc_name, nvprops, 20465331Samw &zct.zct_norm, B_FALSE); 20475331Samw if (error != 0) { 20485331Samw nvlist_free(nvprops); 20495331Samw return (error); 20504577Sahrens } 20512676Seschrock } 20522676Seschrock error = dmu_objset_create(zc->zc_name, type, NULL, cbfunc, 20535331Samw &zct); 2054789Sahrens } 20552676Seschrock 20562676Seschrock /* 20572676Seschrock * It would be nice to do this atomically. 20582676Seschrock */ 20592676Seschrock if (error == 0) { 20604787Sahrens if ((error = zfs_set_prop_nvlist(zc->zc_name, nvprops)) != 0) 20612676Seschrock (void) dmu_objset_destroy(zc->zc_name); 20622676Seschrock } 20632676Seschrock 20644543Smarks nvlist_free(nvprops); 2065789Sahrens return (error); 2066789Sahrens } 2067789Sahrens 2068*5367Sahrens /* 2069*5367Sahrens * inputs: 2070*5367Sahrens * zc_name name of filesystem 2071*5367Sahrens * zc_value short name of snapshot 2072*5367Sahrens * zc_cookie recursive flag 2073*5367Sahrens * 2074*5367Sahrens * outputs: none 2075*5367Sahrens */ 2076789Sahrens static int 20772199Sahrens zfs_ioc_snapshot(zfs_cmd_t *zc) 20782199Sahrens { 20792676Seschrock if (snapshot_namecheck(zc->zc_value, NULL, NULL) != 0) 20802199Sahrens return (EINVAL); 20812199Sahrens return (dmu_objset_snapshot(zc->zc_name, 20822676Seschrock zc->zc_value, zc->zc_cookie)); 20832199Sahrens } 20842199Sahrens 20854007Smmusante int 20862199Sahrens zfs_unmount_snap(char *name, void *arg) 2087789Sahrens { 20882199Sahrens char *snapname = arg; 20892199Sahrens char *cp; 20902417Sahrens vfs_t *vfsp = NULL; 20912199Sahrens 20922199Sahrens /* 20932199Sahrens * Snapshots (which are under .zfs control) must be unmounted 20942199Sahrens * before they can be destroyed. 20952199Sahrens */ 20962199Sahrens 20972199Sahrens if (snapname) { 20982199Sahrens (void) strcat(name, "@"); 20992199Sahrens (void) strcat(name, snapname); 21002199Sahrens vfsp = zfs_get_vfs(name); 21012199Sahrens cp = strchr(name, '@'); 21022199Sahrens *cp = '\0'; 21032417Sahrens } else if (strchr(name, '@')) { 21042199Sahrens vfsp = zfs_get_vfs(name); 21052199Sahrens } 21062199Sahrens 21072199Sahrens if (vfsp) { 21082199Sahrens /* 21092199Sahrens * Always force the unmount for snapshots. 21102199Sahrens */ 21112199Sahrens int flag = MS_FORCE; 2112789Sahrens int err; 2113789Sahrens 21142199Sahrens if ((err = vn_vfswlock(vfsp->vfs_vnodecovered)) != 0) { 21152199Sahrens VFS_RELE(vfsp); 21162199Sahrens return (err); 21172199Sahrens } 21182199Sahrens VFS_RELE(vfsp); 21192199Sahrens if ((err = dounmount(vfsp, flag, kcred)) != 0) 21202199Sahrens return (err); 21212199Sahrens } 21222199Sahrens return (0); 21232199Sahrens } 21242199Sahrens 2125*5367Sahrens /* 2126*5367Sahrens * inputs: 2127*5367Sahrens * zc_name name of filesystem 2128*5367Sahrens * zc_value short name of snapshot 2129*5367Sahrens * 2130*5367Sahrens * outputs: none 2131*5367Sahrens */ 21322199Sahrens static int 21332199Sahrens zfs_ioc_destroy_snaps(zfs_cmd_t *zc) 21342199Sahrens { 21352199Sahrens int err; 2136789Sahrens 21372676Seschrock if (snapshot_namecheck(zc->zc_value, NULL, NULL) != 0) 21382199Sahrens return (EINVAL); 21392199Sahrens err = dmu_objset_find(zc->zc_name, 21402676Seschrock zfs_unmount_snap, zc->zc_value, DS_FIND_CHILDREN); 21412199Sahrens if (err) 21422199Sahrens return (err); 21432676Seschrock return (dmu_snapshots_destroy(zc->zc_name, zc->zc_value)); 21442199Sahrens } 21452199Sahrens 2146*5367Sahrens /* 2147*5367Sahrens * inputs: 2148*5367Sahrens * zc_name name of dataset to destroy 2149*5367Sahrens * zc_objset_type type of objset 2150*5367Sahrens * 2151*5367Sahrens * outputs: none 2152*5367Sahrens */ 21532199Sahrens static int 21542199Sahrens zfs_ioc_destroy(zfs_cmd_t *zc) 21552199Sahrens { 21562199Sahrens if (strchr(zc->zc_name, '@') && zc->zc_objset_type == DMU_OST_ZFS) { 21572199Sahrens int err = zfs_unmount_snap(zc->zc_name, NULL); 21582199Sahrens if (err) 21592199Sahrens return (err); 2160789Sahrens } 2161789Sahrens 2162789Sahrens return (dmu_objset_destroy(zc->zc_name)); 2163789Sahrens } 2164789Sahrens 2165*5367Sahrens /* 2166*5367Sahrens * inputs: 2167*5367Sahrens * zc_name name of snapshot to roll back to 2168*5367Sahrens * 2169*5367Sahrens * outputs: none 2170*5367Sahrens */ 2171789Sahrens static int 2172789Sahrens zfs_ioc_rollback(zfs_cmd_t *zc) 2173789Sahrens { 2174789Sahrens return (dmu_objset_rollback(zc->zc_name)); 2175789Sahrens } 2176789Sahrens 2177*5367Sahrens /* 2178*5367Sahrens * inputs: 2179*5367Sahrens * zc_name old name of dataset 2180*5367Sahrens * zc_value new name of dataset 2181*5367Sahrens * zc_cookie recursive flag (only valid for snapshots) 2182*5367Sahrens * 2183*5367Sahrens * outputs: none 2184*5367Sahrens */ 2185789Sahrens static int 2186789Sahrens zfs_ioc_rename(zfs_cmd_t *zc) 2187789Sahrens { 21884490Svb160487 boolean_t recursive = zc->zc_cookie & 1; 21894007Smmusante 21902676Seschrock zc->zc_value[sizeof (zc->zc_value) - 1] = '\0'; 21915326Sek110237 if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0 || 21925326Sek110237 strchr(zc->zc_value, '%')) 2193789Sahrens return (EINVAL); 2194789Sahrens 21954007Smmusante /* 21964007Smmusante * Unmount snapshot unless we're doing a recursive rename, 21974007Smmusante * in which case the dataset code figures out which snapshots 21984007Smmusante * to unmount. 21994007Smmusante */ 22004007Smmusante if (!recursive && strchr(zc->zc_name, '@') != NULL && 2201789Sahrens zc->zc_objset_type == DMU_OST_ZFS) { 22022199Sahrens int err = zfs_unmount_snap(zc->zc_name, NULL); 22032199Sahrens if (err) 22042199Sahrens return (err); 2205789Sahrens } 2206789Sahrens 22074007Smmusante return (dmu_objset_rename(zc->zc_name, zc->zc_value, recursive)); 2208789Sahrens } 2209789Sahrens 2210*5367Sahrens /* 2211*5367Sahrens * inputs: 2212*5367Sahrens * zc_name name of containing filesystem 2213*5367Sahrens * zc_nvlist_src{_size} nvlist of properties to apply 2214*5367Sahrens * zc_value name of snapshot to create 2215*5367Sahrens * zc_string name of clone origin (if DRR_FLAG_CLONE) 2216*5367Sahrens * zc_cookie file descriptor to recv from 2217*5367Sahrens * zc_begin_record the BEGIN record of the stream (not byteswapped) 2218*5367Sahrens * zc_guid force flag 2219*5367Sahrens * 2220*5367Sahrens * outputs: 2221*5367Sahrens * zc_cookie number of bytes read 2222*5367Sahrens */ 2223789Sahrens static int 2224*5367Sahrens zfs_ioc_recv(zfs_cmd_t *zc) 2225789Sahrens { 2226789Sahrens file_t *fp; 22275326Sek110237 objset_t *os; 2228*5367Sahrens dmu_recv_cookie_t drc; 22295326Sek110237 zfsvfs_t *zfsvfs = NULL; 22305326Sek110237 boolean_t force = (boolean_t)zc->zc_guid; 2231789Sahrens int error, fd; 2232*5367Sahrens offset_t off; 2233*5367Sahrens nvlist_t *props = NULL; 2234*5367Sahrens objset_t *origin = NULL; 2235*5367Sahrens char *tosnap; 2236*5367Sahrens char tofs[ZFS_MAXNAMELEN]; 2237789Sahrens 22383265Sahrens if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0 || 22395326Sek110237 strchr(zc->zc_value, '@') == NULL || 22405326Sek110237 strchr(zc->zc_value, '%')) 22413265Sahrens return (EINVAL); 22423265Sahrens 2243*5367Sahrens (void) strcpy(tofs, zc->zc_value); 2244*5367Sahrens tosnap = strchr(tofs, '@'); 2245*5367Sahrens *tosnap = '\0'; 2246*5367Sahrens tosnap++; 2247*5367Sahrens 2248*5367Sahrens if (zc->zc_nvlist_src != NULL && 2249*5367Sahrens (error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 2250*5367Sahrens &props)) != 0) 2251*5367Sahrens return (error); 2252*5367Sahrens 2253789Sahrens fd = zc->zc_cookie; 2254789Sahrens fp = getf(fd); 2255*5367Sahrens if (fp == NULL) { 2256*5367Sahrens nvlist_free(props); 2257789Sahrens return (EBADF); 2258*5367Sahrens } 22595326Sek110237 22605326Sek110237 /* 22615326Sek110237 * Get the zfsvfs for the receiving objset. There 22625326Sek110237 * won't be one if we're operating on a zvol, if the 22635326Sek110237 * objset doesn't exist yet, or is not mounted. 22645326Sek110237 */ 2265*5367Sahrens 2266*5367Sahrens error = dmu_objset_open(tofs, DMU_OST_ANY, 22675326Sek110237 DS_MODE_STANDARD | DS_MODE_READONLY, &os); 22685326Sek110237 if (!error) { 22695326Sek110237 if (dmu_objset_type(os) == DMU_OST_ZFS) { 22705326Sek110237 mutex_enter(&os->os->os_user_ptr_lock); 22715326Sek110237 zfsvfs = dmu_objset_get_user(os); 22725326Sek110237 if (zfsvfs != NULL) 22735326Sek110237 VFS_HOLD(zfsvfs->z_vfs); 22745326Sek110237 mutex_exit(&os->os->os_user_ptr_lock); 22755326Sek110237 } 22765326Sek110237 dmu_objset_close(os); 22775326Sek110237 } 22785326Sek110237 2279*5367Sahrens if (zc->zc_string[0]) { 2280*5367Sahrens error = dmu_objset_open(zc->zc_string, DMU_OST_ANY, 2281*5367Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &origin); 2282*5367Sahrens if (error) { 2283*5367Sahrens if (zfsvfs != NULL) 2284*5367Sahrens VFS_RELE(zfsvfs->z_vfs); 2285*5367Sahrens nvlist_free(props); 2286*5367Sahrens releasef(fd); 2287*5367Sahrens return (error); 2288*5367Sahrens } 2289*5367Sahrens } 2290*5367Sahrens 2291*5367Sahrens error = dmu_recv_begin(tofs, tosnap, &zc->zc_begin_record, 2292*5367Sahrens force, origin, zfsvfs != NULL, &drc); 2293*5367Sahrens if (origin) 2294*5367Sahrens dmu_objset_close(origin); 2295*5367Sahrens if (error) { 2296*5367Sahrens if (zfsvfs != NULL) 2297*5367Sahrens VFS_RELE(zfsvfs->z_vfs); 2298*5367Sahrens nvlist_free(props); 2299*5367Sahrens releasef(fd); 2300*5367Sahrens return (error); 2301*5367Sahrens } 23025326Sek110237 23035326Sek110237 /* 2304*5367Sahrens * If properties are supplied, they are to completely replace 2305*5367Sahrens * the existing ones; "inherit" any existing properties. 23065326Sek110237 */ 2307*5367Sahrens if (props) { 2308*5367Sahrens objset_t *os; 2309*5367Sahrens nvlist_t *nv = NULL; 2310*5367Sahrens 2311*5367Sahrens error = dmu_objset_open(tofs, DMU_OST_ANY, 2312*5367Sahrens DS_MODE_STANDARD | DS_MODE_READONLY | DS_MODE_INCONSISTENT, 2313*5367Sahrens &os); 2314*5367Sahrens if (error == 0) { 2315*5367Sahrens error = dsl_prop_get_all(os, &nv); 2316*5367Sahrens dmu_objset_close(os); 2317*5367Sahrens } 2318*5367Sahrens if (error == 0) { 2319*5367Sahrens nvpair_t *elem; 2320*5367Sahrens zfs_cmd_t zc2 = { 0 }; 2321*5367Sahrens 2322*5367Sahrens (void) strcpy(zc2.zc_name, tofs); 2323*5367Sahrens for (elem = nvlist_next_nvpair(nv, NULL); elem; 2324*5367Sahrens elem = nvlist_next_nvpair(nv, elem)) { 2325*5367Sahrens (void) strcpy(zc2.zc_value, nvpair_name(elem)); 2326*5367Sahrens if (zfs_secpolicy_inherit(&zc2, CRED()) == 0) 2327*5367Sahrens (void) zfs_ioc_inherit_prop(&zc2); 23285326Sek110237 } 23295326Sek110237 } 2330*5367Sahrens if (nv) 2331*5367Sahrens nvlist_free(nv); 2332*5367Sahrens } 2333*5367Sahrens 2334*5367Sahrens /* 2335*5367Sahrens * Set properties. Note, we ignore errors. Would be better to 2336*5367Sahrens * do best-effort in zfs_set_prop_nvlist, too. 2337*5367Sahrens */ 2338*5367Sahrens (void) zfs_set_prop_nvlist(tofs, props); 2339*5367Sahrens nvlist_free(props); 2340*5367Sahrens 2341*5367Sahrens off = fp->f_offset; 2342*5367Sahrens error = dmu_recv_stream(&drc, fp->f_vnode, &off); 2343*5367Sahrens 2344*5367Sahrens if (error == 0) { 2345*5367Sahrens if (zfsvfs != NULL) { 2346*5367Sahrens char osname[MAXNAMELEN]; 2347*5367Sahrens int mode; 2348*5367Sahrens 2349*5367Sahrens (void) zfs_suspend_fs(zfsvfs, osname, &mode); 2350*5367Sahrens error = dmu_recv_end(&drc); 2351*5367Sahrens error |= zfs_resume_fs(zfsvfs, osname, mode); 2352*5367Sahrens } else { 2353*5367Sahrens error = dmu_recv_end(&drc); 2354*5367Sahrens } 23555326Sek110237 } 23565326Sek110237 if (zfsvfs != NULL) 23575326Sek110237 VFS_RELE(zfsvfs->z_vfs); 2358*5367Sahrens 2359*5367Sahrens zc->zc_cookie = off - fp->f_offset; 2360*5367Sahrens if (VOP_SEEK(fp->f_vnode, fp->f_offset, &off, NULL) == 0) 2361*5367Sahrens fp->f_offset = off; 23622885Sahrens 2363789Sahrens releasef(fd); 2364789Sahrens return (error); 2365789Sahrens } 2366789Sahrens 2367*5367Sahrens /* 2368*5367Sahrens * inputs: 2369*5367Sahrens * zc_name name of snapshot to send 2370*5367Sahrens * zc_value short name of incremental fromsnap (may be empty) 2371*5367Sahrens * zc_cookie file descriptor to send stream to 2372*5367Sahrens * zc_obj fromorigin flag (mutually exclusive with zc_value) 2373*5367Sahrens * 2374*5367Sahrens * outputs: none 2375*5367Sahrens */ 2376789Sahrens static int 2377*5367Sahrens zfs_ioc_send(zfs_cmd_t *zc) 2378789Sahrens { 2379789Sahrens objset_t *fromsnap = NULL; 2380789Sahrens objset_t *tosnap; 2381789Sahrens file_t *fp; 2382789Sahrens int error; 2383*5367Sahrens offset_t off; 2384789Sahrens 2385789Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 2386789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &tosnap); 2387789Sahrens if (error) 2388789Sahrens return (error); 2389789Sahrens 23902676Seschrock if (zc->zc_value[0] != '\0') { 23912885Sahrens char buf[MAXPATHLEN]; 23922885Sahrens char *cp; 23932885Sahrens 23942885Sahrens (void) strncpy(buf, zc->zc_name, sizeof (buf)); 23952885Sahrens cp = strchr(buf, '@'); 23962885Sahrens if (cp) 23972885Sahrens *(cp+1) = 0; 23982885Sahrens (void) strncat(buf, zc->zc_value, sizeof (buf)); 23992885Sahrens error = dmu_objset_open(buf, DMU_OST_ANY, 2400789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &fromsnap); 2401789Sahrens if (error) { 2402789Sahrens dmu_objset_close(tosnap); 2403789Sahrens return (error); 2404789Sahrens } 2405789Sahrens } 2406789Sahrens 2407789Sahrens fp = getf(zc->zc_cookie); 2408789Sahrens if (fp == NULL) { 2409789Sahrens dmu_objset_close(tosnap); 2410789Sahrens if (fromsnap) 2411789Sahrens dmu_objset_close(fromsnap); 2412789Sahrens return (EBADF); 2413789Sahrens } 2414789Sahrens 2415*5367Sahrens off = fp->f_offset; 2416*5367Sahrens error = dmu_sendbackup(tosnap, fromsnap, zc->zc_obj, fp->f_vnode, &off); 2417*5367Sahrens 2418*5367Sahrens if (VOP_SEEK(fp->f_vnode, fp->f_offset, &off, NULL) == 0) 2419*5367Sahrens fp->f_offset = off; 2420789Sahrens releasef(zc->zc_cookie); 2421789Sahrens if (fromsnap) 2422789Sahrens dmu_objset_close(fromsnap); 2423789Sahrens dmu_objset_close(tosnap); 2424789Sahrens return (error); 2425789Sahrens } 2426789Sahrens 24271544Seschrock static int 24281544Seschrock zfs_ioc_inject_fault(zfs_cmd_t *zc) 24291544Seschrock { 24301544Seschrock int id, error; 24311544Seschrock 24321544Seschrock error = zio_inject_fault(zc->zc_name, (int)zc->zc_guid, &id, 24331544Seschrock &zc->zc_inject_record); 24341544Seschrock 24351544Seschrock if (error == 0) 24361544Seschrock zc->zc_guid = (uint64_t)id; 24371544Seschrock 24381544Seschrock return (error); 24391544Seschrock } 24401544Seschrock 24411544Seschrock static int 24421544Seschrock zfs_ioc_clear_fault(zfs_cmd_t *zc) 24431544Seschrock { 24441544Seschrock return (zio_clear_fault((int)zc->zc_guid)); 24451544Seschrock } 24461544Seschrock 24471544Seschrock static int 24481544Seschrock zfs_ioc_inject_list_next(zfs_cmd_t *zc) 24491544Seschrock { 24501544Seschrock int id = (int)zc->zc_guid; 24511544Seschrock int error; 24521544Seschrock 24531544Seschrock error = zio_inject_list_next(&id, zc->zc_name, sizeof (zc->zc_name), 24541544Seschrock &zc->zc_inject_record); 24551544Seschrock 24561544Seschrock zc->zc_guid = id; 24571544Seschrock 24581544Seschrock return (error); 24591544Seschrock } 24601544Seschrock 24611544Seschrock static int 24621544Seschrock zfs_ioc_error_log(zfs_cmd_t *zc) 24631544Seschrock { 24641544Seschrock spa_t *spa; 24651544Seschrock int error; 24662676Seschrock size_t count = (size_t)zc->zc_nvlist_dst_size; 24671544Seschrock 24681544Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 24691544Seschrock return (error); 24701544Seschrock 24712676Seschrock error = spa_get_errlog(spa, (void *)(uintptr_t)zc->zc_nvlist_dst, 24721544Seschrock &count); 24731544Seschrock if (error == 0) 24742676Seschrock zc->zc_nvlist_dst_size = count; 24751544Seschrock else 24762676Seschrock zc->zc_nvlist_dst_size = spa_get_errlog_size(spa); 24771544Seschrock 24781544Seschrock spa_close(spa, FTAG); 24791544Seschrock 24801544Seschrock return (error); 24811544Seschrock } 24821544Seschrock 24831544Seschrock static int 24841544Seschrock zfs_ioc_clear(zfs_cmd_t *zc) 24851544Seschrock { 24861544Seschrock spa_t *spa; 24871544Seschrock vdev_t *vd; 24884808Sek110237 uint64_t txg; 24891544Seschrock int error; 24901544Seschrock 24911544Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 24921544Seschrock return (error); 24931544Seschrock 24945329Sgw25295 /* 24955329Sgw25295 * Try to resume any I/Os which may have been suspended 24965329Sgw25295 * as a result of a complete pool failure. 24975329Sgw25295 */ 24985329Sgw25295 if (!list_is_empty(&spa->spa_zio_list)) { 24995329Sgw25295 if (zio_vdev_resume_io(spa) != 0) { 25005329Sgw25295 spa_close(spa, FTAG); 25015329Sgw25295 return (EIO); 25025329Sgw25295 } 25035329Sgw25295 } 25045329Sgw25295 25054451Seschrock txg = spa_vdev_enter(spa); 25061544Seschrock 25072676Seschrock if (zc->zc_guid == 0) { 25081544Seschrock vd = NULL; 25092676Seschrock } else if ((vd = spa_lookup_by_guid(spa, zc->zc_guid)) == NULL) { 25104451Seschrock (void) spa_vdev_exit(spa, NULL, txg, ENODEV); 25111544Seschrock spa_close(spa, FTAG); 25121544Seschrock return (ENODEV); 25131544Seschrock } 25141544Seschrock 25155329Sgw25295 vdev_clear(spa, vd, B_TRUE); 25161544Seschrock 25174451Seschrock (void) spa_vdev_exit(spa, NULL, txg, 0); 25181544Seschrock 25191544Seschrock spa_close(spa, FTAG); 25201544Seschrock 25211544Seschrock return (0); 25221544Seschrock } 25231544Seschrock 2524*5367Sahrens /* 2525*5367Sahrens * inputs: 2526*5367Sahrens * zc_name name of filesystem 2527*5367Sahrens * zc_value name of origin snapshot 2528*5367Sahrens * 2529*5367Sahrens * outputs: none 2530*5367Sahrens */ 25311544Seschrock static int 25322082Seschrock zfs_ioc_promote(zfs_cmd_t *zc) 25332082Seschrock { 25342417Sahrens char *cp; 25352417Sahrens 25362417Sahrens /* 25372417Sahrens * We don't need to unmount *all* the origin fs's snapshots, but 25382417Sahrens * it's easier. 25392417Sahrens */ 25402676Seschrock cp = strchr(zc->zc_value, '@'); 25412417Sahrens if (cp) 25422417Sahrens *cp = '\0'; 25432676Seschrock (void) dmu_objset_find(zc->zc_value, 25442417Sahrens zfs_unmount_snap, NULL, DS_FIND_SNAPSHOTS); 25452082Seschrock return (dsl_dataset_promote(zc->zc_name)); 25462082Seschrock } 25472082Seschrock 25484543Smarks /* 25494543Smarks * We don't want to have a hard dependency 25504543Smarks * against some special symbols in sharefs 25515331Samw * nfs, and smbsrv. Determine them if needed when 25524543Smarks * the first file system is shared. 25535331Samw * Neither sharefs, nfs or smbsrv are unloadable modules. 25544543Smarks */ 25555331Samw int (*znfsexport_fs)(void *arg); 25564543Smarks int (*zshare_fs)(enum sharefs_sys_op, share_t *, uint32_t); 25575331Samw int (*zsmbexport_fs)(void *arg, boolean_t add_share); 25585331Samw 25595331Samw int zfs_nfsshare_inited; 25605331Samw int zfs_smbshare_inited; 25615331Samw 25624543Smarks ddi_modhandle_t nfs_mod; 25634543Smarks ddi_modhandle_t sharefs_mod; 25645331Samw ddi_modhandle_t smbsrv_mod; 25654543Smarks kmutex_t zfs_share_lock; 25664543Smarks 25674543Smarks static int 25685331Samw zfs_init_sharefs() 25695331Samw { 25705331Samw int error; 25715331Samw 25725331Samw ASSERT(MUTEX_HELD(&zfs_share_lock)); 25735331Samw /* Both NFS and SMB shares also require sharetab support. */ 25745331Samw if (sharefs_mod == NULL && ((sharefs_mod = 25755331Samw ddi_modopen("fs/sharefs", 25765331Samw KRTLD_MODE_FIRST, &error)) == NULL)) { 25775331Samw return (ENOSYS); 25785331Samw } 25795331Samw if (zshare_fs == NULL && ((zshare_fs = 25805331Samw (int (*)(enum sharefs_sys_op, share_t *, uint32_t)) 25815331Samw ddi_modsym(sharefs_mod, "sharefs_impl", &error)) == NULL)) { 25825331Samw return (ENOSYS); 25835331Samw } 25845331Samw return (0); 25855331Samw } 25865331Samw 25875331Samw static int 25884543Smarks zfs_ioc_share(zfs_cmd_t *zc) 25894543Smarks { 25904543Smarks int error; 25914543Smarks int opcode; 25924543Smarks 25935331Samw switch (zc->zc_share.z_sharetype) { 25945331Samw case ZFS_SHARE_NFS: 25955331Samw case ZFS_UNSHARE_NFS: 25965331Samw if (zfs_nfsshare_inited == 0) { 25975331Samw mutex_enter(&zfs_share_lock); 25985331Samw if (nfs_mod == NULL && ((nfs_mod = ddi_modopen("fs/nfs", 25995331Samw KRTLD_MODE_FIRST, &error)) == NULL)) { 26005331Samw mutex_exit(&zfs_share_lock); 26015331Samw return (ENOSYS); 26025331Samw } 26035331Samw if (znfsexport_fs == NULL && 26045331Samw ((znfsexport_fs = (int (*)(void *)) 26055331Samw ddi_modsym(nfs_mod, 26065331Samw "nfs_export", &error)) == NULL)) { 26075331Samw mutex_exit(&zfs_share_lock); 26085331Samw return (ENOSYS); 26095331Samw } 26105331Samw error = zfs_init_sharefs(); 26115331Samw if (error) { 26125331Samw mutex_exit(&zfs_share_lock); 26135331Samw return (ENOSYS); 26145331Samw } 26155331Samw zfs_nfsshare_inited = 1; 26164543Smarks mutex_exit(&zfs_share_lock); 26174543Smarks } 26185331Samw break; 26195331Samw case ZFS_SHARE_SMB: 26205331Samw case ZFS_UNSHARE_SMB: 26215331Samw if (zfs_smbshare_inited == 0) { 26225331Samw mutex_enter(&zfs_share_lock); 26235331Samw if (smbsrv_mod == NULL && ((smbsrv_mod = 26245331Samw ddi_modopen("drv/smbsrv", 26255331Samw KRTLD_MODE_FIRST, &error)) == NULL)) { 26265331Samw mutex_exit(&zfs_share_lock); 26275331Samw return (ENOSYS); 26285331Samw } 26295331Samw if (zsmbexport_fs == NULL && ((zsmbexport_fs = 26305331Samw (int (*)(void *, boolean_t))ddi_modsym(smbsrv_mod, 26315331Samw "lmshrd_share_upcall", &error)) == NULL)) { 26325331Samw mutex_exit(&zfs_share_lock); 26335331Samw return (ENOSYS); 26345331Samw } 26355331Samw error = zfs_init_sharefs(); 26365331Samw if (error) { 26375331Samw mutex_exit(&zfs_share_lock); 26385331Samw return (ENOSYS); 26395331Samw } 26405331Samw zfs_smbshare_inited = 1; 26414543Smarks mutex_exit(&zfs_share_lock); 26424543Smarks } 26435331Samw break; 26445331Samw default: 26455331Samw return (EINVAL); 26464543Smarks } 26474543Smarks 26485331Samw switch (zc->zc_share.z_sharetype) { 26495331Samw case ZFS_SHARE_NFS: 26505331Samw case ZFS_UNSHARE_NFS: 26515331Samw if (error = 26525331Samw znfsexport_fs((void *) 26535331Samw (uintptr_t)zc->zc_share.z_exportdata)) 26545331Samw return (error); 26555331Samw break; 26565331Samw case ZFS_SHARE_SMB: 26575331Samw case ZFS_UNSHARE_SMB: 26585331Samw if (error = zsmbexport_fs((void *) 26595331Samw (uintptr_t)zc->zc_share.z_exportdata, 26605331Samw zc->zc_share.z_sharetype == ZFS_SHARE_SMB ? 26615331Samw B_TRUE : B_FALSE)) { 26625331Samw return (error); 26635331Samw } 26645331Samw break; 26655331Samw } 26665331Samw 26675331Samw opcode = (zc->zc_share.z_sharetype == ZFS_SHARE_NFS || 26685331Samw zc->zc_share.z_sharetype == ZFS_SHARE_SMB) ? 26694543Smarks SHAREFS_ADD : SHAREFS_REMOVE; 26704543Smarks 26715331Samw /* 26725331Samw * Add or remove share from sharetab 26735331Samw */ 26744543Smarks error = zshare_fs(opcode, 26754543Smarks (void *)(uintptr_t)zc->zc_share.z_sharedata, 26764543Smarks zc->zc_share.z_sharemax); 26774543Smarks 26784543Smarks return (error); 26794543Smarks 26804543Smarks } 26814543Smarks 26824543Smarks /* 26834988Sek110237 * pool create, destroy, and export don't log the history as part of 26844988Sek110237 * zfsdev_ioctl, but rather zfs_ioc_pool_create, and zfs_ioc_pool_export 26854988Sek110237 * do the logging of those commands. 26864543Smarks */ 2687789Sahrens static zfs_ioc_vec_t zfs_ioc_vec[] = { 26884715Sek110237 { zfs_ioc_pool_create, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 26894577Sahrens { zfs_ioc_pool_destroy, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 26904577Sahrens { zfs_ioc_pool_import, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 26914577Sahrens { zfs_ioc_pool_export, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 26924577Sahrens { zfs_ioc_pool_configs, zfs_secpolicy_none, NO_NAME, B_FALSE }, 26934577Sahrens { zfs_ioc_pool_stats, zfs_secpolicy_read, POOL_NAME, B_FALSE }, 26944577Sahrens { zfs_ioc_pool_tryimport, zfs_secpolicy_config, NO_NAME, B_FALSE }, 26954577Sahrens { zfs_ioc_pool_scrub, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 26964577Sahrens { zfs_ioc_pool_freeze, zfs_secpolicy_config, NO_NAME, B_FALSE }, 26974577Sahrens { zfs_ioc_pool_upgrade, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 26984577Sahrens { zfs_ioc_pool_get_history, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 26994577Sahrens { zfs_ioc_vdev_add, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27004577Sahrens { zfs_ioc_vdev_remove, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27014577Sahrens { zfs_ioc_vdev_set_state, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27024577Sahrens { zfs_ioc_vdev_attach, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27034577Sahrens { zfs_ioc_vdev_detach, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27044577Sahrens { zfs_ioc_vdev_setpath, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 27054577Sahrens { zfs_ioc_objset_stats, zfs_secpolicy_read, DATASET_NAME, B_FALSE }, 27065147Srm160521 { zfs_ioc_objset_version, zfs_secpolicy_read, DATASET_NAME, B_FALSE }, 27074543Smarks { zfs_ioc_dataset_list_next, zfs_secpolicy_read, 27084577Sahrens DATASET_NAME, B_FALSE }, 27094543Smarks { zfs_ioc_snapshot_list_next, zfs_secpolicy_read, 27104577Sahrens DATASET_NAME, B_FALSE }, 27114577Sahrens { zfs_ioc_set_prop, zfs_secpolicy_none, DATASET_NAME, B_TRUE }, 27124577Sahrens { zfs_ioc_create_minor, zfs_secpolicy_minor, DATASET_NAME, B_FALSE }, 27134577Sahrens { zfs_ioc_remove_minor, zfs_secpolicy_minor, DATASET_NAME, B_FALSE }, 27144577Sahrens { zfs_ioc_create, zfs_secpolicy_create, DATASET_NAME, B_TRUE }, 27154577Sahrens { zfs_ioc_destroy, zfs_secpolicy_destroy, DATASET_NAME, B_TRUE }, 27164577Sahrens { zfs_ioc_rollback, zfs_secpolicy_rollback, DATASET_NAME, B_TRUE }, 27174577Sahrens { zfs_ioc_rename, zfs_secpolicy_rename, DATASET_NAME, B_TRUE }, 2718*5367Sahrens { zfs_ioc_recv, zfs_secpolicy_receive, DATASET_NAME, B_TRUE }, 2719*5367Sahrens { zfs_ioc_send, zfs_secpolicy_send, DATASET_NAME, B_TRUE }, 27204577Sahrens { zfs_ioc_inject_fault, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 27214577Sahrens { zfs_ioc_clear_fault, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 27224577Sahrens { zfs_ioc_inject_list_next, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 27234577Sahrens { zfs_ioc_error_log, zfs_secpolicy_inject, POOL_NAME, B_FALSE }, 27244577Sahrens { zfs_ioc_clear, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27254577Sahrens { zfs_ioc_promote, zfs_secpolicy_promote, DATASET_NAME, B_TRUE }, 27264577Sahrens { zfs_ioc_destroy_snaps, zfs_secpolicy_destroy, DATASET_NAME, B_TRUE }, 27274577Sahrens { zfs_ioc_snapshot, zfs_secpolicy_snapshot, DATASET_NAME, B_TRUE }, 27284577Sahrens { zfs_ioc_dsobj_to_dsname, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 27294577Sahrens { zfs_ioc_obj_to_path, zfs_secpolicy_config, NO_NAME, B_FALSE }, 27304577Sahrens { zfs_ioc_pool_set_props, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27314577Sahrens { zfs_ioc_pool_get_props, zfs_secpolicy_read, POOL_NAME, B_FALSE }, 27324577Sahrens { zfs_ioc_set_fsacl, zfs_secpolicy_fsacl, DATASET_NAME, B_TRUE }, 27334577Sahrens { zfs_ioc_get_fsacl, zfs_secpolicy_read, DATASET_NAME, B_FALSE }, 27344543Smarks { zfs_ioc_iscsi_perm_check, zfs_secpolicy_iscsi, 27354577Sahrens DATASET_NAME, B_FALSE }, 27364849Sahrens { zfs_ioc_share, zfs_secpolicy_share, DATASET_NAME, B_FALSE }, 27374849Sahrens { zfs_ioc_inherit_prop, zfs_secpolicy_inherit, DATASET_NAME, B_TRUE }, 2738789Sahrens }; 2739789Sahrens 2740789Sahrens static int 2741789Sahrens zfsdev_ioctl(dev_t dev, int cmd, intptr_t arg, int flag, cred_t *cr, int *rvalp) 2742789Sahrens { 2743789Sahrens zfs_cmd_t *zc; 2744789Sahrens uint_t vec; 27452199Sahrens int error, rc; 2746789Sahrens 2747789Sahrens if (getminor(dev) != 0) 2748789Sahrens return (zvol_ioctl(dev, cmd, arg, flag, cr, rvalp)); 2749789Sahrens 2750789Sahrens vec = cmd - ZFS_IOC; 27514787Sahrens ASSERT3U(getmajor(dev), ==, ddi_driver_major(zfs_dip)); 2752789Sahrens 2753789Sahrens if (vec >= sizeof (zfs_ioc_vec) / sizeof (zfs_ioc_vec[0])) 2754789Sahrens return (EINVAL); 2755789Sahrens 2756789Sahrens zc = kmem_zalloc(sizeof (zfs_cmd_t), KM_SLEEP); 2757789Sahrens 2758789Sahrens error = xcopyin((void *)arg, zc, sizeof (zfs_cmd_t)); 2759789Sahrens 27604787Sahrens if (error == 0) 27614543Smarks error = zfs_ioc_vec[vec].zvec_secpolicy(zc, cr); 2762789Sahrens 2763789Sahrens /* 2764789Sahrens * Ensure that all pool/dataset names are valid before we pass down to 2765789Sahrens * the lower layers. 2766789Sahrens */ 2767789Sahrens if (error == 0) { 2768789Sahrens zc->zc_name[sizeof (zc->zc_name) - 1] = '\0'; 2769789Sahrens switch (zfs_ioc_vec[vec].zvec_namecheck) { 27704577Sahrens case POOL_NAME: 2771789Sahrens if (pool_namecheck(zc->zc_name, NULL, NULL) != 0) 2772789Sahrens error = EINVAL; 2773789Sahrens break; 2774789Sahrens 27754577Sahrens case DATASET_NAME: 2776789Sahrens if (dataset_namecheck(zc->zc_name, NULL, NULL) != 0) 2777789Sahrens error = EINVAL; 2778789Sahrens break; 27792856Snd150628 27804577Sahrens case NO_NAME: 27812856Snd150628 break; 2782789Sahrens } 2783789Sahrens } 2784789Sahrens 2785789Sahrens if (error == 0) 2786789Sahrens error = zfs_ioc_vec[vec].zvec_func(zc); 2787789Sahrens 27882199Sahrens rc = xcopyout(zc, (void *)arg, sizeof (zfs_cmd_t)); 27894543Smarks if (error == 0) { 27902199Sahrens error = rc; 27914543Smarks if (zfs_ioc_vec[vec].zvec_his_log == B_TRUE) 27924543Smarks zfs_log_history(zc); 27934543Smarks } 2794789Sahrens 2795789Sahrens kmem_free(zc, sizeof (zfs_cmd_t)); 2796789Sahrens return (error); 2797789Sahrens } 2798789Sahrens 2799789Sahrens static int 2800789Sahrens zfs_attach(dev_info_t *dip, ddi_attach_cmd_t cmd) 2801789Sahrens { 2802789Sahrens if (cmd != DDI_ATTACH) 2803789Sahrens return (DDI_FAILURE); 2804789Sahrens 2805789Sahrens if (ddi_create_minor_node(dip, "zfs", S_IFCHR, 0, 2806789Sahrens DDI_PSEUDO, 0) == DDI_FAILURE) 2807789Sahrens return (DDI_FAILURE); 2808789Sahrens 2809789Sahrens zfs_dip = dip; 2810789Sahrens 2811789Sahrens ddi_report_dev(dip); 2812789Sahrens 2813789Sahrens return (DDI_SUCCESS); 2814789Sahrens } 2815789Sahrens 2816789Sahrens static int 2817789Sahrens zfs_detach(dev_info_t *dip, ddi_detach_cmd_t cmd) 2818789Sahrens { 2819789Sahrens if (spa_busy() || zfs_busy() || zvol_busy()) 2820789Sahrens return (DDI_FAILURE); 2821789Sahrens 2822789Sahrens if (cmd != DDI_DETACH) 2823789Sahrens return (DDI_FAILURE); 2824789Sahrens 2825789Sahrens zfs_dip = NULL; 2826789Sahrens 2827789Sahrens ddi_prop_remove_all(dip); 2828789Sahrens ddi_remove_minor_node(dip, NULL); 2829789Sahrens 2830789Sahrens return (DDI_SUCCESS); 2831789Sahrens } 2832789Sahrens 2833789Sahrens /*ARGSUSED*/ 2834789Sahrens static int 2835789Sahrens zfs_info(dev_info_t *dip, ddi_info_cmd_t infocmd, void *arg, void **result) 2836789Sahrens { 2837789Sahrens switch (infocmd) { 2838789Sahrens case DDI_INFO_DEVT2DEVINFO: 2839789Sahrens *result = zfs_dip; 2840789Sahrens return (DDI_SUCCESS); 2841789Sahrens 2842789Sahrens case DDI_INFO_DEVT2INSTANCE: 2843849Sbonwick *result = (void *)0; 2844789Sahrens return (DDI_SUCCESS); 2845789Sahrens } 2846789Sahrens 2847789Sahrens return (DDI_FAILURE); 2848789Sahrens } 2849789Sahrens 2850789Sahrens /* 2851789Sahrens * OK, so this is a little weird. 2852789Sahrens * 2853789Sahrens * /dev/zfs is the control node, i.e. minor 0. 2854789Sahrens * /dev/zvol/[r]dsk/pool/dataset are the zvols, minor > 0. 2855789Sahrens * 2856789Sahrens * /dev/zfs has basically nothing to do except serve up ioctls, 2857789Sahrens * so most of the standard driver entry points are in zvol.c. 2858789Sahrens */ 2859789Sahrens static struct cb_ops zfs_cb_ops = { 2860789Sahrens zvol_open, /* open */ 2861789Sahrens zvol_close, /* close */ 2862789Sahrens zvol_strategy, /* strategy */ 2863789Sahrens nodev, /* print */ 2864789Sahrens nodev, /* dump */ 2865789Sahrens zvol_read, /* read */ 2866789Sahrens zvol_write, /* write */ 2867789Sahrens zfsdev_ioctl, /* ioctl */ 2868789Sahrens nodev, /* devmap */ 2869789Sahrens nodev, /* mmap */ 2870789Sahrens nodev, /* segmap */ 2871789Sahrens nochpoll, /* poll */ 2872789Sahrens ddi_prop_op, /* prop_op */ 2873789Sahrens NULL, /* streamtab */ 2874789Sahrens D_NEW | D_MP | D_64BIT, /* Driver compatibility flag */ 2875789Sahrens CB_REV, /* version */ 28763638Sbillm nodev, /* async read */ 28773638Sbillm nodev, /* async write */ 2878789Sahrens }; 2879789Sahrens 2880789Sahrens static struct dev_ops zfs_dev_ops = { 2881789Sahrens DEVO_REV, /* version */ 2882789Sahrens 0, /* refcnt */ 2883789Sahrens zfs_info, /* info */ 2884789Sahrens nulldev, /* identify */ 2885789Sahrens nulldev, /* probe */ 2886789Sahrens zfs_attach, /* attach */ 2887789Sahrens zfs_detach, /* detach */ 2888789Sahrens nodev, /* reset */ 2889789Sahrens &zfs_cb_ops, /* driver operations */ 2890789Sahrens NULL /* no bus operations */ 2891789Sahrens }; 2892789Sahrens 2893789Sahrens static struct modldrv zfs_modldrv = { 28944577Sahrens &mod_driverops, "ZFS storage pool version " SPA_VERSION_STRING, 28952676Seschrock &zfs_dev_ops 2896789Sahrens }; 2897789Sahrens 2898789Sahrens static struct modlinkage modlinkage = { 2899789Sahrens MODREV_1, 2900789Sahrens (void *)&zfs_modlfs, 2901789Sahrens (void *)&zfs_modldrv, 2902789Sahrens NULL 2903789Sahrens }; 2904789Sahrens 29054720Sfr157268 29064720Sfr157268 uint_t zfs_fsyncer_key; 29075326Sek110237 extern uint_t rrw_tsd_key; 29084720Sfr157268 2909789Sahrens int 2910789Sahrens _init(void) 2911789Sahrens { 2912789Sahrens int error; 2913789Sahrens 2914849Sbonwick spa_init(FREAD | FWRITE); 2915849Sbonwick zfs_init(); 2916849Sbonwick zvol_init(); 2917849Sbonwick 2918849Sbonwick if ((error = mod_install(&modlinkage)) != 0) { 2919849Sbonwick zvol_fini(); 2920849Sbonwick zfs_fini(); 2921849Sbonwick spa_fini(); 2922789Sahrens return (error); 2923849Sbonwick } 2924789Sahrens 29254720Sfr157268 tsd_create(&zfs_fsyncer_key, NULL); 29265326Sek110237 tsd_create(&rrw_tsd_key, NULL); 29274720Sfr157268 2928789Sahrens error = ldi_ident_from_mod(&modlinkage, &zfs_li); 2929789Sahrens ASSERT(error == 0); 29304543Smarks mutex_init(&zfs_share_lock, NULL, MUTEX_DEFAULT, NULL); 2931789Sahrens 2932789Sahrens return (0); 2933789Sahrens } 2934789Sahrens 2935789Sahrens int 2936789Sahrens _fini(void) 2937789Sahrens { 2938789Sahrens int error; 2939789Sahrens 29401544Seschrock if (spa_busy() || zfs_busy() || zvol_busy() || zio_injection_enabled) 2941789Sahrens return (EBUSY); 2942789Sahrens 2943789Sahrens if ((error = mod_remove(&modlinkage)) != 0) 2944789Sahrens return (error); 2945789Sahrens 2946789Sahrens zvol_fini(); 2947789Sahrens zfs_fini(); 2948789Sahrens spa_fini(); 29495331Samw if (zfs_nfsshare_inited) 29504543Smarks (void) ddi_modclose(nfs_mod); 29515331Samw if (zfs_smbshare_inited) 29525331Samw (void) ddi_modclose(smbsrv_mod); 29535331Samw if (zfs_nfsshare_inited || zfs_smbshare_inited) 29544543Smarks (void) ddi_modclose(sharefs_mod); 2955789Sahrens 29564720Sfr157268 tsd_destroy(&zfs_fsyncer_key); 2957789Sahrens ldi_ident_release(zfs_li); 2958789Sahrens zfs_li = NULL; 29594543Smarks mutex_destroy(&zfs_share_lock); 2960789Sahrens 2961789Sahrens return (error); 2962789Sahrens } 2963789Sahrens 2964789Sahrens int 2965789Sahrens _info(struct modinfo *modinfop) 2966789Sahrens { 2967789Sahrens return (mod_info(&modlinkage, modinfop)); 2968789Sahrens } 2969