xref: /onnv-gate/usr/src/uts/common/fs/zfs/zfs_ioctl.c (revision 5367:c40abbe796be)
1789Sahrens /*
2789Sahrens  * CDDL HEADER START
3789Sahrens  *
4789Sahrens  * The contents of this file are subject to the terms of the
51485Slling  * Common Development and Distribution License (the "License").
61485Slling  * You may not use this file except in compliance with the License.
7789Sahrens  *
8789Sahrens  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9789Sahrens  * or http://www.opensolaris.org/os/licensing.
10789Sahrens  * See the License for the specific language governing permissions
11789Sahrens  * and limitations under the License.
12789Sahrens  *
13789Sahrens  * When distributing Covered Code, include this CDDL HEADER in each
14789Sahrens  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15789Sahrens  * If applicable, add the following below this CDDL HEADER, with the
16789Sahrens  * fields enclosed by brackets "[]" replaced with your own identifying
17789Sahrens  * information: Portions Copyright [yyyy] [name of copyright owner]
18789Sahrens  *
19789Sahrens  * CDDL HEADER END
20789Sahrens  */
21789Sahrens /*
223444Sek110237  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
23789Sahrens  * Use is subject to license terms.
24789Sahrens  */
25789Sahrens 
26789Sahrens #pragma ident	"%Z%%M%	%I%	%E% SMI"
27789Sahrens 
28789Sahrens #include <sys/types.h>
29789Sahrens #include <sys/param.h>
30789Sahrens #include <sys/errno.h>
31789Sahrens #include <sys/uio.h>
32789Sahrens #include <sys/buf.h>
33789Sahrens #include <sys/modctl.h>
34789Sahrens #include <sys/open.h>
35789Sahrens #include <sys/file.h>
36789Sahrens #include <sys/kmem.h>
37789Sahrens #include <sys/conf.h>
38789Sahrens #include <sys/cmn_err.h>
39789Sahrens #include <sys/stat.h>
40789Sahrens #include <sys/zfs_ioctl.h>
415331Samw #include <sys/zfs_i18n.h>
425331Samw #include <sys/zfs_znode.h>
43789Sahrens #include <sys/zap.h>
44789Sahrens #include <sys/spa.h>
453912Slling #include <sys/spa_impl.h>
46789Sahrens #include <sys/vdev.h>
473912Slling #include <sys/vdev_impl.h>
48789Sahrens #include <sys/dmu.h>
49789Sahrens #include <sys/dsl_dir.h>
50789Sahrens #include <sys/dsl_dataset.h>
51789Sahrens #include <sys/dsl_prop.h>
524543Smarks #include <sys/dsl_deleg.h>
534543Smarks #include <sys/dmu_objset.h>
54789Sahrens #include <sys/ddi.h>
55789Sahrens #include <sys/sunddi.h>
56789Sahrens #include <sys/sunldi.h>
57789Sahrens #include <sys/policy.h>
58789Sahrens #include <sys/zone.h>
59789Sahrens #include <sys/nvpair.h>
60789Sahrens #include <sys/pathname.h>
61789Sahrens #include <sys/mount.h>
62789Sahrens #include <sys/sdt.h>
63789Sahrens #include <sys/fs/zfs.h>
64789Sahrens #include <sys/zfs_ctldir.h>
655331Samw #include <sys/zfs_dir.h>
662885Sahrens #include <sys/zvol.h>
674543Smarks #include <sharefs/share.h>
684577Sahrens #include <sys/zfs_znode.h>
695326Sek110237 #include <sys/zfs_vfsops.h>
705326Sek110237 #include <sys/dmu_objset.h>
71789Sahrens 
72789Sahrens #include "zfs_namecheck.h"
732676Seschrock #include "zfs_prop.h"
744543Smarks #include "zfs_deleg.h"
75789Sahrens 
76789Sahrens extern struct modlfs zfs_modlfs;
77789Sahrens 
78789Sahrens extern void zfs_init(void);
79789Sahrens extern void zfs_fini(void);
80789Sahrens 
81789Sahrens ldi_ident_t zfs_li = NULL;
82789Sahrens dev_info_t *zfs_dip;
83789Sahrens 
84789Sahrens typedef int zfs_ioc_func_t(zfs_cmd_t *);
854543Smarks typedef int zfs_secpolicy_func_t(zfs_cmd_t *, cred_t *);
86789Sahrens 
87789Sahrens typedef struct zfs_ioc_vec {
88789Sahrens 	zfs_ioc_func_t		*zvec_func;
89789Sahrens 	zfs_secpolicy_func_t	*zvec_secpolicy;
90789Sahrens 	enum {
914577Sahrens 		NO_NAME,
924577Sahrens 		POOL_NAME,
934577Sahrens 		DATASET_NAME
944543Smarks 	} zvec_namecheck;
954543Smarks 	boolean_t		zvec_his_log;
96789Sahrens } zfs_ioc_vec_t;
97789Sahrens 
98789Sahrens /* _NOTE(PRINTFLIKE(4)) - this is printf-like, but lint is too whiney */
99789Sahrens void
100789Sahrens __dprintf(const char *file, const char *func, int line, const char *fmt, ...)
101789Sahrens {
102789Sahrens 	const char *newfile;
103789Sahrens 	char buf[256];
104789Sahrens 	va_list adx;
105789Sahrens 
106789Sahrens 	/*
107789Sahrens 	 * Get rid of annoying "../common/" prefix to filename.
108789Sahrens 	 */
109789Sahrens 	newfile = strrchr(file, '/');
110789Sahrens 	if (newfile != NULL) {
111789Sahrens 		newfile = newfile + 1; /* Get rid of leading / */
112789Sahrens 	} else {
113789Sahrens 		newfile = file;
114789Sahrens 	}
115789Sahrens 
116789Sahrens 	va_start(adx, fmt);
117789Sahrens 	(void) vsnprintf(buf, sizeof (buf), fmt, adx);
118789Sahrens 	va_end(adx);
119789Sahrens 
120789Sahrens 	/*
121789Sahrens 	 * To get this data, use the zfs-dprintf probe as so:
122789Sahrens 	 * dtrace -q -n 'zfs-dprintf \
123789Sahrens 	 *	/stringof(arg0) == "dbuf.c"/ \
124789Sahrens 	 *	{printf("%s: %s", stringof(arg1), stringof(arg3))}'
125789Sahrens 	 * arg0 = file name
126789Sahrens 	 * arg1 = function name
127789Sahrens 	 * arg2 = line number
128789Sahrens 	 * arg3 = message
129789Sahrens 	 */
130789Sahrens 	DTRACE_PROBE4(zfs__dprintf,
131789Sahrens 	    char *, newfile, char *, func, int, line, char *, buf);
132789Sahrens }
133789Sahrens 
1344543Smarks static void
1354715Sek110237 history_str_free(char *buf)
1364715Sek110237 {
1374715Sek110237 	kmem_free(buf, HIS_MAX_RECORD_LEN);
1384715Sek110237 }
1394715Sek110237 
1404715Sek110237 static char *
1414715Sek110237 history_str_get(zfs_cmd_t *zc)
1424715Sek110237 {
1434715Sek110237 	char *buf;
1444715Sek110237 
1454715Sek110237 	if (zc->zc_history == NULL)
1464715Sek110237 		return (NULL);
1474715Sek110237 
1484715Sek110237 	buf = kmem_alloc(HIS_MAX_RECORD_LEN, KM_SLEEP);
1494715Sek110237 	if (copyinstr((void *)(uintptr_t)zc->zc_history,
1504715Sek110237 	    buf, HIS_MAX_RECORD_LEN, NULL) != 0) {
1514715Sek110237 		history_str_free(buf);
1524715Sek110237 		return (NULL);
1534715Sek110237 	}
1544715Sek110237 
1554715Sek110237 	buf[HIS_MAX_RECORD_LEN -1] = '\0';
1564715Sek110237 
1574715Sek110237 	return (buf);
1584715Sek110237 }
1594715Sek110237 
1605331Samw static int
1615331Samw zfs_check_version(const char *name, int version)
1625331Samw {
1635331Samw 
1645331Samw 	spa_t *spa;
1655331Samw 
1665331Samw 	if (spa_open(name, &spa, FTAG) == 0) {
1675331Samw 		if (spa_version(spa) < version) {
1685331Samw 			spa_close(spa, FTAG);
1695331Samw 			return (1);
1705331Samw 		}
1715331Samw 		spa_close(spa, FTAG);
1725331Samw 	}
1735331Samw 	return (0);
1745331Samw }
1755331Samw 
1764715Sek110237 static void
1774543Smarks zfs_log_history(zfs_cmd_t *zc)
1784543Smarks {
1794543Smarks 	spa_t *spa;
1804603Sahrens 	char *buf;
1814543Smarks 
1824715Sek110237 	if ((buf = history_str_get(zc)) == NULL)
1834577Sahrens 		return;
1844577Sahrens 
1854715Sek110237 	if (spa_open(zc->zc_name, &spa, FTAG) == 0) {
1864715Sek110237 		if (spa_version(spa) >= SPA_VERSION_ZPOOL_HISTORY)
1874715Sek110237 			(void) spa_history_log(spa, buf, LOG_CMD_NORMAL);
1884715Sek110237 		spa_close(spa, FTAG);
1894543Smarks 	}
1904715Sek110237 	history_str_free(buf);
1914543Smarks }
1924543Smarks 
193789Sahrens /*
194789Sahrens  * Policy for top-level read operations (list pools).  Requires no privileges,
195789Sahrens  * and can be used in the local zone, as there is no associated dataset.
196789Sahrens  */
197789Sahrens /* ARGSUSED */
198789Sahrens static int
1994543Smarks zfs_secpolicy_none(zfs_cmd_t *zc, cred_t *cr)
200789Sahrens {
201789Sahrens 	return (0);
202789Sahrens }
203789Sahrens 
204789Sahrens /*
205789Sahrens  * Policy for dataset read operations (list children, get statistics).  Requires
206789Sahrens  * no privileges, but must be visible in the local zone.
207789Sahrens  */
208789Sahrens /* ARGSUSED */
209789Sahrens static int
2104543Smarks zfs_secpolicy_read(zfs_cmd_t *zc, cred_t *cr)
211789Sahrens {
212789Sahrens 	if (INGLOBALZONE(curproc) ||
2134543Smarks 	    zone_dataset_visible(zc->zc_name, NULL))
214789Sahrens 		return (0);
215789Sahrens 
216789Sahrens 	return (ENOENT);
217789Sahrens }
218789Sahrens 
219789Sahrens static int
220789Sahrens zfs_dozonecheck(const char *dataset, cred_t *cr)
221789Sahrens {
222789Sahrens 	uint64_t zoned;
223789Sahrens 	int writable = 1;
224789Sahrens 
225789Sahrens 	/*
226789Sahrens 	 * The dataset must be visible by this zone -- check this first
227789Sahrens 	 * so they don't see EPERM on something they shouldn't know about.
228789Sahrens 	 */
229789Sahrens 	if (!INGLOBALZONE(curproc) &&
230789Sahrens 	    !zone_dataset_visible(dataset, &writable))
231789Sahrens 		return (ENOENT);
232789Sahrens 
233789Sahrens 	if (dsl_prop_get_integer(dataset, "zoned", &zoned, NULL))
234789Sahrens 		return (ENOENT);
235789Sahrens 
236789Sahrens 	if (INGLOBALZONE(curproc)) {
237789Sahrens 		/*
238789Sahrens 		 * If the fs is zoned, only root can access it from the
239789Sahrens 		 * global zone.
240789Sahrens 		 */
241789Sahrens 		if (secpolicy_zfs(cr) && zoned)
242789Sahrens 			return (EPERM);
243789Sahrens 	} else {
244789Sahrens 		/*
245789Sahrens 		 * If we are in a local zone, the 'zoned' property must be set.
246789Sahrens 		 */
247789Sahrens 		if (!zoned)
248789Sahrens 			return (EPERM);
249789Sahrens 
250789Sahrens 		/* must be writable by this zone */
251789Sahrens 		if (!writable)
252789Sahrens 			return (EPERM);
253789Sahrens 	}
254789Sahrens 	return (0);
255789Sahrens }
256789Sahrens 
257789Sahrens int
2584543Smarks zfs_secpolicy_write_perms(const char *name, const char *perm, cred_t *cr)
259789Sahrens {
260789Sahrens 	int error;
261789Sahrens 
2624543Smarks 	error = zfs_dozonecheck(name, cr);
2634543Smarks 	if (error == 0) {
2644543Smarks 		error = secpolicy_zfs(cr);
2654670Sahrens 		if (error)
2664543Smarks 			error = dsl_deleg_access(name, perm, cr);
2674543Smarks 	}
2684543Smarks 	return (error);
2694543Smarks }
2704543Smarks 
2714543Smarks static int
2724543Smarks zfs_secpolicy_setprop(const char *name, zfs_prop_t prop, cred_t *cr)
2734543Smarks {
2744543Smarks 	/*
2754543Smarks 	 * Check permissions for special properties.
2764543Smarks 	 */
2774543Smarks 	switch (prop) {
2784543Smarks 	case ZFS_PROP_ZONED:
2794543Smarks 		/*
2804543Smarks 		 * Disallow setting of 'zoned' from within a local zone.
2814543Smarks 		 */
2824543Smarks 		if (!INGLOBALZONE(curproc))
2834543Smarks 			return (EPERM);
2844543Smarks 		break;
285789Sahrens 
2864543Smarks 	case ZFS_PROP_QUOTA:
2874543Smarks 		if (!INGLOBALZONE(curproc)) {
2884543Smarks 			uint64_t zoned;
2894543Smarks 			char setpoint[MAXNAMELEN];
2904543Smarks 			/*
2914543Smarks 			 * Unprivileged users are allowed to modify the
2924543Smarks 			 * quota on things *under* (ie. contained by)
2934543Smarks 			 * the thing they own.
2944543Smarks 			 */
2954543Smarks 			if (dsl_prop_get_integer(name, "zoned", &zoned,
2964543Smarks 			    setpoint))
2974543Smarks 				return (EPERM);
2984670Sahrens 			if (!zoned || strlen(name) <= strlen(setpoint))
2994543Smarks 				return (EPERM);
3004543Smarks 		}
3014670Sahrens 		break;
3024543Smarks 	}
3034543Smarks 
3044787Sahrens 	return (zfs_secpolicy_write_perms(name, zfs_prop_to_name(prop), cr));
305789Sahrens }
306789Sahrens 
3074543Smarks int
3084543Smarks zfs_secpolicy_fsacl(zfs_cmd_t *zc, cred_t *cr)
3094543Smarks {
3104543Smarks 	int error;
3114543Smarks 
3124543Smarks 	error = zfs_dozonecheck(zc->zc_name, cr);
3134543Smarks 	if (error)
3144543Smarks 		return (error);
3154543Smarks 
3164543Smarks 	/*
3174543Smarks 	 * permission to set permissions will be evaluated later in
3184543Smarks 	 * dsl_deleg_can_allow()
3194543Smarks 	 */
3204543Smarks 	return (0);
3214543Smarks }
3224543Smarks 
3234543Smarks int
3244543Smarks zfs_secpolicy_rollback(zfs_cmd_t *zc, cred_t *cr)
3254543Smarks {
3264543Smarks 	int error;
3274543Smarks 	error = zfs_secpolicy_write_perms(zc->zc_name,
3284543Smarks 	    ZFS_DELEG_PERM_ROLLBACK, cr);
3294543Smarks 	if (error == 0)
3304543Smarks 		error = zfs_secpolicy_write_perms(zc->zc_name,
3314543Smarks 		    ZFS_DELEG_PERM_MOUNT, cr);
3324543Smarks 	return (error);
3334543Smarks }
3344543Smarks 
3354543Smarks int
3364543Smarks zfs_secpolicy_send(zfs_cmd_t *zc, cred_t *cr)
3374543Smarks {
3384543Smarks 	return (zfs_secpolicy_write_perms(zc->zc_name,
3394543Smarks 	    ZFS_DELEG_PERM_SEND, cr));
3404543Smarks }
3414543Smarks 
3424543Smarks int
3434543Smarks zfs_secpolicy_share(zfs_cmd_t *zc, cred_t *cr)
3444543Smarks {
3454543Smarks 	if (!INGLOBALZONE(curproc))
3464543Smarks 		return (EPERM);
3474543Smarks 
348*5367Sahrens 	if (secpolicy_nfs(cr) == 0) {
3494543Smarks 		return (0);
3504543Smarks 	} else {
3514543Smarks 		vnode_t *vp;
3524543Smarks 		int error;
3534543Smarks 
3544543Smarks 		if ((error = lookupname(zc->zc_value, UIO_SYSSPACE,
3554543Smarks 		    NO_FOLLOW, NULL, &vp)) != 0)
3564543Smarks 			return (error);
3574543Smarks 
3584543Smarks 		/* Now make sure mntpnt and dataset are ZFS */
3594543Smarks 
3604543Smarks 		if (vp->v_vfsp->vfs_fstype != zfsfstype ||
3614543Smarks 		    (strcmp((char *)refstr_value(vp->v_vfsp->vfs_resource),
3624543Smarks 		    zc->zc_name) != 0)) {
3634543Smarks 			VN_RELE(vp);
3644543Smarks 			return (EPERM);
3654543Smarks 		}
3664543Smarks 
3674543Smarks 		VN_RELE(vp);
3684543Smarks 		return (dsl_deleg_access(zc->zc_name,
3694543Smarks 		    ZFS_DELEG_PERM_SHARE, cr));
3704543Smarks 	}
3714543Smarks }
3724543Smarks 
373789Sahrens static int
3744543Smarks zfs_get_parent(const char *datasetname, char *parent, int parentsize)
375789Sahrens {
376789Sahrens 	char *cp;
377789Sahrens 
378789Sahrens 	/*
379789Sahrens 	 * Remove the @bla or /bla from the end of the name to get the parent.
380789Sahrens 	 */
3814543Smarks 	(void) strncpy(parent, datasetname, parentsize);
3824543Smarks 	cp = strrchr(parent, '@');
383789Sahrens 	if (cp != NULL) {
384789Sahrens 		cp[0] = '\0';
385789Sahrens 	} else {
3864543Smarks 		cp = strrchr(parent, '/');
387789Sahrens 		if (cp == NULL)
388789Sahrens 			return (ENOENT);
389789Sahrens 		cp[0] = '\0';
390789Sahrens 	}
391789Sahrens 
3924543Smarks 	return (0);
3934543Smarks }
3944543Smarks 
3954543Smarks int
3964543Smarks zfs_secpolicy_destroy_perms(const char *name, cred_t *cr)
3974543Smarks {
3984543Smarks 	int error;
3994543Smarks 
4004543Smarks 	if ((error = zfs_secpolicy_write_perms(name,
4014543Smarks 	    ZFS_DELEG_PERM_MOUNT, cr)) != 0)
4024543Smarks 		return (error);
4034543Smarks 
4044543Smarks 	return (zfs_secpolicy_write_perms(name, ZFS_DELEG_PERM_DESTROY, cr));
4054543Smarks }
4064543Smarks 
4074543Smarks static int
4084543Smarks zfs_secpolicy_destroy(zfs_cmd_t *zc, cred_t *cr)
4094543Smarks {
4104543Smarks 	return (zfs_secpolicy_destroy_perms(zc->zc_name, cr));
4114543Smarks }
4124543Smarks 
4134543Smarks /*
4144543Smarks  * Must have sys_config privilege to check the iscsi permission
4154543Smarks  */
4164543Smarks /* ARGSUSED */
4174543Smarks static int
4184543Smarks zfs_secpolicy_iscsi(zfs_cmd_t *zc, cred_t *cr)
4194543Smarks {
4204543Smarks 	return (secpolicy_zfs(cr));
4214543Smarks }
4224543Smarks 
4234543Smarks int
4244543Smarks zfs_secpolicy_rename_perms(const char *from, const char *to, cred_t *cr)
4254543Smarks {
4264543Smarks 	char 	parentname[MAXNAMELEN];
4274543Smarks 	int	error;
4284543Smarks 
4294543Smarks 	if ((error = zfs_secpolicy_write_perms(from,
4304543Smarks 	    ZFS_DELEG_PERM_RENAME, cr)) != 0)
4314543Smarks 		return (error);
4324543Smarks 
4334543Smarks 	if ((error = zfs_secpolicy_write_perms(from,
4344543Smarks 	    ZFS_DELEG_PERM_MOUNT, cr)) != 0)
4354543Smarks 		return (error);
4364543Smarks 
4374543Smarks 	if ((error = zfs_get_parent(to, parentname,
4384543Smarks 	    sizeof (parentname))) != 0)
4394543Smarks 		return (error);
4404543Smarks 
4414543Smarks 	if ((error = zfs_secpolicy_write_perms(parentname,
4424543Smarks 	    ZFS_DELEG_PERM_CREATE, cr)) != 0)
4434543Smarks 		return (error);
4444543Smarks 
4454543Smarks 	if ((error = zfs_secpolicy_write_perms(parentname,
4464543Smarks 	    ZFS_DELEG_PERM_MOUNT, cr)) != 0)
4474543Smarks 		return (error);
4484543Smarks 
4494543Smarks 	return (error);
4504543Smarks }
4514543Smarks 
4524543Smarks static int
4534543Smarks zfs_secpolicy_rename(zfs_cmd_t *zc, cred_t *cr)
4544543Smarks {
4554543Smarks 	return (zfs_secpolicy_rename_perms(zc->zc_name, zc->zc_value, cr));
4564543Smarks }
4574543Smarks 
4584543Smarks static int
4594543Smarks zfs_secpolicy_promote(zfs_cmd_t *zc, cred_t *cr)
4604543Smarks {
4614543Smarks 	char 	parentname[MAXNAMELEN];
4624543Smarks 	objset_t *clone;
4634543Smarks 	int error;
4644543Smarks 
4654543Smarks 	error = zfs_secpolicy_write_perms(zc->zc_name,
4664543Smarks 	    ZFS_DELEG_PERM_PROMOTE, cr);
4674543Smarks 	if (error)
4684543Smarks 		return (error);
4694543Smarks 
4704543Smarks 	error = dmu_objset_open(zc->zc_name, DMU_OST_ANY,
4714543Smarks 	    DS_MODE_STANDARD | DS_MODE_READONLY, &clone);
4724543Smarks 
4734543Smarks 	if (error == 0) {
4744543Smarks 		dsl_dataset_t *pclone = NULL;
4754543Smarks 		dsl_dir_t *dd;
4764543Smarks 		dd = clone->os->os_dsl_dataset->ds_dir;
4774543Smarks 
4784543Smarks 		rw_enter(&dd->dd_pool->dp_config_rwlock, RW_READER);
4794543Smarks 		error = dsl_dataset_open_obj(dd->dd_pool,
480*5367Sahrens 		    dd->dd_phys->dd_origin_obj, NULL,
4814543Smarks 		    DS_MODE_NONE, FTAG, &pclone);
4824543Smarks 		rw_exit(&dd->dd_pool->dp_config_rwlock);
4834543Smarks 		if (error) {
4844543Smarks 			dmu_objset_close(clone);
4854543Smarks 			return (error);
4864543Smarks 		}
4874543Smarks 
4884543Smarks 		error = zfs_secpolicy_write_perms(zc->zc_name,
4894543Smarks 		    ZFS_DELEG_PERM_MOUNT, cr);
4904543Smarks 
4914543Smarks 		dsl_dataset_name(pclone, parentname);
4924543Smarks 		dmu_objset_close(clone);
4934543Smarks 		dsl_dataset_close(pclone, DS_MODE_NONE, FTAG);
4944543Smarks 		if (error == 0)
4954543Smarks 			error = zfs_secpolicy_write_perms(parentname,
4964543Smarks 			    ZFS_DELEG_PERM_PROMOTE, cr);
4974543Smarks 	}
4984543Smarks 	return (error);
4994543Smarks }
5004543Smarks 
5014543Smarks static int
5024543Smarks zfs_secpolicy_receive(zfs_cmd_t *zc, cred_t *cr)
5034543Smarks {
5044543Smarks 	int error;
5054543Smarks 
5064543Smarks 	if ((error = zfs_secpolicy_write_perms(zc->zc_name,
5074543Smarks 	    ZFS_DELEG_PERM_RECEIVE, cr)) != 0)
5084543Smarks 		return (error);
5094543Smarks 
5104543Smarks 	if ((error = zfs_secpolicy_write_perms(zc->zc_name,
5114543Smarks 	    ZFS_DELEG_PERM_MOUNT, cr)) != 0)
5124543Smarks 		return (error);
5134543Smarks 
5144543Smarks 	return (zfs_secpolicy_write_perms(zc->zc_name,
5154543Smarks 	    ZFS_DELEG_PERM_CREATE, cr));
5164543Smarks }
5174543Smarks 
5184543Smarks int
5194543Smarks zfs_secpolicy_snapshot_perms(const char *name, cred_t *cr)
5204543Smarks {
5214543Smarks 	int error;
5224543Smarks 
5234543Smarks 	if ((error = zfs_secpolicy_write_perms(name,
5244543Smarks 	    ZFS_DELEG_PERM_SNAPSHOT, cr)) != 0)
5254543Smarks 		return (error);
5264543Smarks 
5274543Smarks 	error = zfs_secpolicy_write_perms(name,
5284543Smarks 	    ZFS_DELEG_PERM_MOUNT, cr);
5294543Smarks 
5304543Smarks 	return (error);
5314543Smarks }
5324543Smarks 
5334543Smarks static int
5344543Smarks zfs_secpolicy_snapshot(zfs_cmd_t *zc, cred_t *cr)
5354543Smarks {
5364543Smarks 
5374543Smarks 	return (zfs_secpolicy_snapshot_perms(zc->zc_name, cr));
5384543Smarks }
5394543Smarks 
5404543Smarks static int
5414543Smarks zfs_secpolicy_create(zfs_cmd_t *zc, cred_t *cr)
5424543Smarks {
5434543Smarks 	char 	parentname[MAXNAMELEN];
5444543Smarks 	int 	error;
5454543Smarks 
5464543Smarks 	if ((error = zfs_get_parent(zc->zc_name, parentname,
5474543Smarks 	    sizeof (parentname))) != 0)
5484543Smarks 		return (error);
5494543Smarks 
5504543Smarks 	if (zc->zc_value[0] != '\0') {
5514543Smarks 		if ((error = zfs_secpolicy_write_perms(zc->zc_value,
5524543Smarks 		    ZFS_DELEG_PERM_CLONE, cr)) != 0)
5534543Smarks 			return (error);
5544543Smarks 	}
5554543Smarks 
5564543Smarks 	if ((error = zfs_secpolicy_write_perms(parentname,
5574543Smarks 	    ZFS_DELEG_PERM_CREATE, cr)) != 0)
5584543Smarks 		return (error);
5594543Smarks 
5604543Smarks 	error = zfs_secpolicy_write_perms(parentname,
5614543Smarks 	    ZFS_DELEG_PERM_MOUNT, cr);
5624543Smarks 
5634543Smarks 	return (error);
5644543Smarks }
5654543Smarks 
5664543Smarks static int
5674543Smarks zfs_secpolicy_umount(zfs_cmd_t *zc, cred_t *cr)
5684543Smarks {
5694543Smarks 	int error;
5704543Smarks 
5714543Smarks 	error = secpolicy_fs_unmount(cr, NULL);
5724543Smarks 	if (error) {
5734543Smarks 		error = dsl_deleg_access(zc->zc_name, ZFS_DELEG_PERM_MOUNT, cr);
5744543Smarks 	}
5754543Smarks 	return (error);
576789Sahrens }
577789Sahrens 
578789Sahrens /*
579789Sahrens  * Policy for pool operations - create/destroy pools, add vdevs, etc.  Requires
580789Sahrens  * SYS_CONFIG privilege, which is not available in a local zone.
581789Sahrens  */
582789Sahrens /* ARGSUSED */
583789Sahrens static int
5844543Smarks zfs_secpolicy_config(zfs_cmd_t *zc, cred_t *cr)
585789Sahrens {
586789Sahrens 	if (secpolicy_sys_config(cr, B_FALSE) != 0)
587789Sahrens 		return (EPERM);
588789Sahrens 
589789Sahrens 	return (0);
590789Sahrens }
591789Sahrens 
592789Sahrens /*
5934543Smarks  * Just like zfs_secpolicy_config, except that we will check for
5944543Smarks  * mount permission on the dataset for permission to create/remove
5954543Smarks  * the minor nodes.
5964543Smarks  */
5974543Smarks static int
5984543Smarks zfs_secpolicy_minor(zfs_cmd_t *zc, cred_t *cr)
5994543Smarks {
6004543Smarks 	if (secpolicy_sys_config(cr, B_FALSE) != 0) {
6014543Smarks 		return (dsl_deleg_access(zc->zc_name,
6024543Smarks 		    ZFS_DELEG_PERM_MOUNT, cr));
6034543Smarks 	}
6044543Smarks 
6054543Smarks 	return (0);
6064543Smarks }
6074543Smarks 
6084543Smarks /*
6091544Seschrock  * Policy for fault injection.  Requires all privileges.
6101544Seschrock  */
6111544Seschrock /* ARGSUSED */
6121544Seschrock static int
6134543Smarks zfs_secpolicy_inject(zfs_cmd_t *zc, cred_t *cr)
6141544Seschrock {
6151544Seschrock 	return (secpolicy_zinject(cr));
6161544Seschrock }
6171544Seschrock 
6184849Sahrens static int
6194849Sahrens zfs_secpolicy_inherit(zfs_cmd_t *zc, cred_t *cr)
6204849Sahrens {
6214849Sahrens 	zfs_prop_t prop = zfs_name_to_prop(zc->zc_value);
6224849Sahrens 
6235094Slling 	if (prop == ZPROP_INVAL) {
6244849Sahrens 		if (!zfs_prop_user(zc->zc_value))
6254849Sahrens 			return (EINVAL);
6264849Sahrens 		return (zfs_secpolicy_write_perms(zc->zc_name,
6274849Sahrens 		    ZFS_DELEG_PERM_USERPROP, cr));
6284849Sahrens 	} else {
6294849Sahrens 		if (!zfs_prop_inheritable(prop))
6304849Sahrens 			return (EINVAL);
6314849Sahrens 		return (zfs_secpolicy_setprop(zc->zc_name, prop, cr));
6324849Sahrens 	}
6334849Sahrens }
6344849Sahrens 
6351544Seschrock /*
636789Sahrens  * Returns the nvlist as specified by the user in the zfs_cmd_t.
637789Sahrens  */
638789Sahrens static int
6395094Slling get_nvlist(uint64_t nvl, uint64_t size, nvlist_t **nvp)
640789Sahrens {
641789Sahrens 	char *packed;
642789Sahrens 	int error;
6435094Slling 	nvlist_t *list = NULL;
644789Sahrens 
645789Sahrens 	/*
6462676Seschrock 	 * Read in and unpack the user-supplied nvlist.
647789Sahrens 	 */
6485094Slling 	if (size == 0)
649789Sahrens 		return (EINVAL);
650789Sahrens 
651789Sahrens 	packed = kmem_alloc(size, KM_SLEEP);
652789Sahrens 
6535094Slling 	if ((error = xcopyin((void *)(uintptr_t)nvl, packed, size)) != 0) {
654789Sahrens 		kmem_free(packed, size);
655789Sahrens 		return (error);
656789Sahrens 	}
657789Sahrens 
6585094Slling 	if ((error = nvlist_unpack(packed, size, &list, 0)) != 0) {
659789Sahrens 		kmem_free(packed, size);
660789Sahrens 		return (error);
661789Sahrens 	}
662789Sahrens 
663789Sahrens 	kmem_free(packed, size);
664789Sahrens 
6655094Slling 	*nvp = list;
666789Sahrens 	return (0);
667789Sahrens }
668789Sahrens 
669789Sahrens static int
6702676Seschrock put_nvlist(zfs_cmd_t *zc, nvlist_t *nvl)
6712676Seschrock {
6722676Seschrock 	char *packed = NULL;
6732676Seschrock 	size_t size;
6742676Seschrock 	int error;
6752676Seschrock 
6762676Seschrock 	VERIFY(nvlist_size(nvl, &size, NV_ENCODE_NATIVE) == 0);
6772676Seschrock 
6782676Seschrock 	if (size > zc->zc_nvlist_dst_size) {
6792676Seschrock 		error = ENOMEM;
6802676Seschrock 	} else {
6814611Smarks 		packed = kmem_alloc(size, KM_SLEEP);
6822676Seschrock 		VERIFY(nvlist_pack(nvl, &packed, &size, NV_ENCODE_NATIVE,
6832676Seschrock 		    KM_SLEEP) == 0);
6842676Seschrock 		error = xcopyout(packed, (void *)(uintptr_t)zc->zc_nvlist_dst,
6852676Seschrock 		    size);
6862676Seschrock 		kmem_free(packed, size);
6872676Seschrock 	}
6882676Seschrock 
6892676Seschrock 	zc->zc_nvlist_dst_size = size;
6902676Seschrock 	return (error);
6912676Seschrock }
6922676Seschrock 
6932676Seschrock static int
694789Sahrens zfs_ioc_pool_create(zfs_cmd_t *zc)
695789Sahrens {
696789Sahrens 	int error;
6975094Slling 	nvlist_t *config, *props = NULL;
6984715Sek110237 	char *buf;
699789Sahrens 
7005094Slling 	if (error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size,
7015094Slling 	    &config))
7024988Sek110237 		return (error);
7034715Sek110237 
7045094Slling 	if (zc->zc_nvlist_src_size != 0 && (error =
7055094Slling 	    get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, &props))) {
7065094Slling 		nvlist_free(config);
7075094Slling 		return (error);
7085094Slling 	}
7095094Slling 
7104988Sek110237 	buf = history_str_get(zc);
711789Sahrens 
7125094Slling 	error = spa_create(zc->zc_name, config, props, buf);
713789Sahrens 
7144988Sek110237 	if (buf != NULL)
7154988Sek110237 		history_str_free(buf);
7165094Slling 
717789Sahrens 	nvlist_free(config);
718789Sahrens 
7195094Slling 	if (props)
7205094Slling 		nvlist_free(props);
7215094Slling 
722789Sahrens 	return (error);
723789Sahrens }
724789Sahrens 
725789Sahrens static int
726789Sahrens zfs_ioc_pool_destroy(zfs_cmd_t *zc)
727789Sahrens {
7284543Smarks 	int error;
7294543Smarks 	zfs_log_history(zc);
7304543Smarks 	error = spa_destroy(zc->zc_name);
7314543Smarks 	return (error);
732789Sahrens }
733789Sahrens 
734789Sahrens static int
735789Sahrens zfs_ioc_pool_import(zfs_cmd_t *zc)
736789Sahrens {
737789Sahrens 	int error;
7385094Slling 	nvlist_t *config, *props = NULL;
739789Sahrens 	uint64_t guid;
740789Sahrens 
7415094Slling 	if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size,
7425094Slling 	    &config)) != 0)
743789Sahrens 		return (error);
744789Sahrens 
7455094Slling 	if (zc->zc_nvlist_src_size != 0 && (error =
7465094Slling 	    get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, &props))) {
7475094Slling 		nvlist_free(config);
7485094Slling 		return (error);
7495094Slling 	}
7505094Slling 
751789Sahrens 	if (nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID, &guid) != 0 ||
7521544Seschrock 	    guid != zc->zc_guid)
753789Sahrens 		error = EINVAL;
754789Sahrens 	else
7555094Slling 		error = spa_import(zc->zc_name, config, props);
756789Sahrens 
757789Sahrens 	nvlist_free(config);
758789Sahrens 
7595094Slling 	if (props)
7605094Slling 		nvlist_free(props);
7615094Slling 
762789Sahrens 	return (error);
763789Sahrens }
764789Sahrens 
765789Sahrens static int
766789Sahrens zfs_ioc_pool_export(zfs_cmd_t *zc)
767789Sahrens {
7684543Smarks 	int error;
7694543Smarks 	zfs_log_history(zc);
7704543Smarks 	error = spa_export(zc->zc_name, NULL);
7714543Smarks 	return (error);
772789Sahrens }
773789Sahrens 
774789Sahrens static int
775789Sahrens zfs_ioc_pool_configs(zfs_cmd_t *zc)
776789Sahrens {
777789Sahrens 	nvlist_t *configs;
778789Sahrens 	int error;
779789Sahrens 
780789Sahrens 	if ((configs = spa_all_configs(&zc->zc_cookie)) == NULL)
781789Sahrens 		return (EEXIST);
782789Sahrens 
7832676Seschrock 	error = put_nvlist(zc, configs);
784789Sahrens 
785789Sahrens 	nvlist_free(configs);
786789Sahrens 
787789Sahrens 	return (error);
788789Sahrens }
789789Sahrens 
790789Sahrens static int
791789Sahrens zfs_ioc_pool_stats(zfs_cmd_t *zc)
792789Sahrens {
793789Sahrens 	nvlist_t *config;
794789Sahrens 	int error;
7951544Seschrock 	int ret = 0;
796789Sahrens 
7972676Seschrock 	error = spa_get_stats(zc->zc_name, &config, zc->zc_value,
7982676Seschrock 	    sizeof (zc->zc_value));
799789Sahrens 
800789Sahrens 	if (config != NULL) {
8012676Seschrock 		ret = put_nvlist(zc, config);
802789Sahrens 		nvlist_free(config);
8031544Seschrock 
8041544Seschrock 		/*
8051544Seschrock 		 * The config may be present even if 'error' is non-zero.
8061544Seschrock 		 * In this case we return success, and preserve the real errno
8071544Seschrock 		 * in 'zc_cookie'.
8081544Seschrock 		 */
8091544Seschrock 		zc->zc_cookie = error;
810789Sahrens 	} else {
8111544Seschrock 		ret = error;
812789Sahrens 	}
813789Sahrens 
8141544Seschrock 	return (ret);
815789Sahrens }
816789Sahrens 
817789Sahrens /*
818789Sahrens  * Try to import the given pool, returning pool stats as appropriate so that
819789Sahrens  * user land knows which devices are available and overall pool health.
820789Sahrens  */
821789Sahrens static int
822789Sahrens zfs_ioc_pool_tryimport(zfs_cmd_t *zc)
823789Sahrens {
824789Sahrens 	nvlist_t *tryconfig, *config;
825789Sahrens 	int error;
826789Sahrens 
8275094Slling 	if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size,
8285094Slling 	    &tryconfig)) != 0)
829789Sahrens 		return (error);
830789Sahrens 
831789Sahrens 	config = spa_tryimport(tryconfig);
832789Sahrens 
833789Sahrens 	nvlist_free(tryconfig);
834789Sahrens 
835789Sahrens 	if (config == NULL)
836789Sahrens 		return (EINVAL);
837789Sahrens 
8382676Seschrock 	error = put_nvlist(zc, config);
839789Sahrens 	nvlist_free(config);
840789Sahrens 
841789Sahrens 	return (error);
842789Sahrens }
843789Sahrens 
844789Sahrens static int
845789Sahrens zfs_ioc_pool_scrub(zfs_cmd_t *zc)
846789Sahrens {
847789Sahrens 	spa_t *spa;
848789Sahrens 	int error;
849789Sahrens 
8502926Sek110237 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
8512926Sek110237 		return (error);
8522926Sek110237 
8534808Sek110237 	mutex_enter(&spa_namespace_lock);
8542926Sek110237 	error = spa_scrub(spa, zc->zc_cookie, B_FALSE);
8554808Sek110237 	mutex_exit(&spa_namespace_lock);
8562926Sek110237 
8572926Sek110237 	spa_close(spa, FTAG);
8582926Sek110237 
859789Sahrens 	return (error);
860789Sahrens }
861789Sahrens 
862789Sahrens static int
863789Sahrens zfs_ioc_pool_freeze(zfs_cmd_t *zc)
864789Sahrens {
865789Sahrens 	spa_t *spa;
866789Sahrens 	int error;
867789Sahrens 
868789Sahrens 	error = spa_open(zc->zc_name, &spa, FTAG);
869789Sahrens 	if (error == 0) {
870789Sahrens 		spa_freeze(spa);
871789Sahrens 		spa_close(spa, FTAG);
872789Sahrens 	}
873789Sahrens 	return (error);
874789Sahrens }
875789Sahrens 
876789Sahrens static int
8771760Seschrock zfs_ioc_pool_upgrade(zfs_cmd_t *zc)
8781760Seschrock {
8791760Seschrock 	spa_t *spa;
8801760Seschrock 	int error;
8811760Seschrock 
8822926Sek110237 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
8832926Sek110237 		return (error);
8842926Sek110237 
8855118Slling 	if (zc->zc_cookie < spa_version(spa) || zc->zc_cookie > SPA_VERSION) {
8865118Slling 		spa_close(spa, FTAG);
8875118Slling 		return (EINVAL);
8885118Slling 	}
8895118Slling 
8905094Slling 	spa_upgrade(spa, zc->zc_cookie);
8912926Sek110237 	spa_close(spa, FTAG);
8922926Sek110237 
8932926Sek110237 	return (error);
8942926Sek110237 }
8952926Sek110237 
8962926Sek110237 static int
8972926Sek110237 zfs_ioc_pool_get_history(zfs_cmd_t *zc)
8982926Sek110237 {
8992926Sek110237 	spa_t *spa;
9002926Sek110237 	char *hist_buf;
9012926Sek110237 	uint64_t size;
9022926Sek110237 	int error;
9032926Sek110237 
9042926Sek110237 	if ((size = zc->zc_history_len) == 0)
9052926Sek110237 		return (EINVAL);
9062926Sek110237 
9072926Sek110237 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
9082926Sek110237 		return (error);
9092926Sek110237 
9104577Sahrens 	if (spa_version(spa) < SPA_VERSION_ZPOOL_HISTORY) {
9113863Sek110237 		spa_close(spa, FTAG);
9123863Sek110237 		return (ENOTSUP);
9133863Sek110237 	}
9143863Sek110237 
9152926Sek110237 	hist_buf = kmem_alloc(size, KM_SLEEP);
9162926Sek110237 	if ((error = spa_history_get(spa, &zc->zc_history_offset,
9172926Sek110237 	    &zc->zc_history_len, hist_buf)) == 0) {
9184543Smarks 		error = xcopyout(hist_buf,
9194543Smarks 		    (char *)(uintptr_t)zc->zc_history,
9202926Sek110237 		    zc->zc_history_len);
9212926Sek110237 	}
9222926Sek110237 
9232926Sek110237 	spa_close(spa, FTAG);
9242926Sek110237 	kmem_free(hist_buf, size);
9252926Sek110237 	return (error);
9262926Sek110237 }
9272926Sek110237 
9282926Sek110237 static int
9293444Sek110237 zfs_ioc_dsobj_to_dsname(zfs_cmd_t *zc)
9303444Sek110237 {
9313444Sek110237 	int error;
9323444Sek110237 
9333912Slling 	if (error = dsl_dsobj_to_dsname(zc->zc_name, zc->zc_obj, zc->zc_value))
9343444Sek110237 		return (error);
9353444Sek110237 
9363444Sek110237 	return (0);
9373444Sek110237 }
9383444Sek110237 
9393444Sek110237 static int
9403444Sek110237 zfs_ioc_obj_to_path(zfs_cmd_t *zc)
9413444Sek110237 {
9423444Sek110237 	objset_t *osp;
9433444Sek110237 	int error;
9443444Sek110237 
9453444Sek110237 	if ((error = dmu_objset_open(zc->zc_name, DMU_OST_ZFS,
9463444Sek110237 	    DS_MODE_NONE | DS_MODE_READONLY, &osp)) != 0)
9473444Sek110237 		return (error);
9483444Sek110237 
9493444Sek110237 	error = zfs_obj_to_path(osp, zc->zc_obj, zc->zc_value,
9503444Sek110237 	    sizeof (zc->zc_value));
9513444Sek110237 	dmu_objset_close(osp);
9523444Sek110237 
9533444Sek110237 	return (error);
9543444Sek110237 }
9553444Sek110237 
9563444Sek110237 static int
957789Sahrens zfs_ioc_vdev_add(zfs_cmd_t *zc)
958789Sahrens {
959789Sahrens 	spa_t *spa;
960789Sahrens 	int error;
961789Sahrens 	nvlist_t *config;
962789Sahrens 
963789Sahrens 	error = spa_open(zc->zc_name, &spa, FTAG);
964789Sahrens 	if (error != 0)
965789Sahrens 		return (error);
966789Sahrens 
9673912Slling 	/*
9683912Slling 	 * A root pool with concatenated devices is not supported.
9693912Slling 	 * Thus, can not add a device to a root pool with one device.
9703912Slling 	 */
9713912Slling 	if (spa->spa_root_vdev->vdev_children == 1 && spa->spa_bootfs != 0) {
9723912Slling 		spa_close(spa, FTAG);
9733912Slling 		return (EDOM);
9743912Slling 	}
9753912Slling 
9765094Slling 	if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size,
9775094Slling 	    &config)) == 0) {
978789Sahrens 		error = spa_vdev_add(spa, config);
979789Sahrens 		nvlist_free(config);
980789Sahrens 	}
981789Sahrens 	spa_close(spa, FTAG);
982789Sahrens 	return (error);
983789Sahrens }
984789Sahrens 
985789Sahrens static int
986789Sahrens zfs_ioc_vdev_remove(zfs_cmd_t *zc)
987789Sahrens {
9882082Seschrock 	spa_t *spa;
9892082Seschrock 	int error;
9902082Seschrock 
9912082Seschrock 	error = spa_open(zc->zc_name, &spa, FTAG);
9922082Seschrock 	if (error != 0)
9932082Seschrock 		return (error);
9942082Seschrock 	error = spa_vdev_remove(spa, zc->zc_guid, B_FALSE);
9952082Seschrock 	spa_close(spa, FTAG);
9962082Seschrock 	return (error);
997789Sahrens }
998789Sahrens 
999789Sahrens static int
10004451Seschrock zfs_ioc_vdev_set_state(zfs_cmd_t *zc)
1001789Sahrens {
1002789Sahrens 	spa_t *spa;
1003789Sahrens 	int error;
10044451Seschrock 	vdev_state_t newstate = VDEV_STATE_UNKNOWN;
1005789Sahrens 
10062926Sek110237 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
1007789Sahrens 		return (error);
10084451Seschrock 	switch (zc->zc_cookie) {
10094451Seschrock 	case VDEV_STATE_ONLINE:
10104451Seschrock 		error = vdev_online(spa, zc->zc_guid, zc->zc_obj, &newstate);
10114451Seschrock 		break;
10124451Seschrock 
10134451Seschrock 	case VDEV_STATE_OFFLINE:
10144451Seschrock 		error = vdev_offline(spa, zc->zc_guid, zc->zc_obj);
10154451Seschrock 		break;
1016789Sahrens 
10174451Seschrock 	case VDEV_STATE_FAULTED:
10184451Seschrock 		error = vdev_fault(spa, zc->zc_guid);
10194451Seschrock 		break;
1020789Sahrens 
10214451Seschrock 	case VDEV_STATE_DEGRADED:
10224451Seschrock 		error = vdev_degrade(spa, zc->zc_guid);
10234451Seschrock 		break;
10244451Seschrock 
10254451Seschrock 	default:
10264451Seschrock 		error = EINVAL;
10274451Seschrock 	}
10284451Seschrock 	zc->zc_cookie = newstate;
1029789Sahrens 	spa_close(spa, FTAG);
1030789Sahrens 	return (error);
1031789Sahrens }
1032789Sahrens 
1033789Sahrens static int
1034789Sahrens zfs_ioc_vdev_attach(zfs_cmd_t *zc)
1035789Sahrens {
1036789Sahrens 	spa_t *spa;
1037789Sahrens 	int replacing = zc->zc_cookie;
1038789Sahrens 	nvlist_t *config;
1039789Sahrens 	int error;
1040789Sahrens 
10412926Sek110237 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
1042789Sahrens 		return (error);
1043789Sahrens 
10445094Slling 	if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size,
10455094Slling 	    &config)) == 0) {
10461544Seschrock 		error = spa_vdev_attach(spa, zc->zc_guid, config, replacing);
1047789Sahrens 		nvlist_free(config);
1048789Sahrens 	}
1049789Sahrens 
1050789Sahrens 	spa_close(spa, FTAG);
1051789Sahrens 	return (error);
1052789Sahrens }
1053789Sahrens 
1054789Sahrens static int
1055789Sahrens zfs_ioc_vdev_detach(zfs_cmd_t *zc)
1056789Sahrens {
1057789Sahrens 	spa_t *spa;
1058789Sahrens 	int error;
1059789Sahrens 
10602926Sek110237 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
1061789Sahrens 		return (error);
1062789Sahrens 
10631544Seschrock 	error = spa_vdev_detach(spa, zc->zc_guid, B_FALSE);
1064789Sahrens 
1065789Sahrens 	spa_close(spa, FTAG);
1066789Sahrens 	return (error);
1067789Sahrens }
1068789Sahrens 
1069789Sahrens static int
10701354Seschrock zfs_ioc_vdev_setpath(zfs_cmd_t *zc)
10711354Seschrock {
10721354Seschrock 	spa_t *spa;
10732676Seschrock 	char *path = zc->zc_value;
10741544Seschrock 	uint64_t guid = zc->zc_guid;
10751354Seschrock 	int error;
10761354Seschrock 
10771354Seschrock 	error = spa_open(zc->zc_name, &spa, FTAG);
10781354Seschrock 	if (error != 0)
10791354Seschrock 		return (error);
10801354Seschrock 
10811354Seschrock 	error = spa_vdev_setpath(spa, guid, path);
10821354Seschrock 	spa_close(spa, FTAG);
10831354Seschrock 	return (error);
10841354Seschrock }
10851354Seschrock 
1086*5367Sahrens /*
1087*5367Sahrens  * inputs:
1088*5367Sahrens  * zc_name		name of filesystem
1089*5367Sahrens  * zc_nvlist_dst_size	size of buffer for property nvlist
1090*5367Sahrens  *
1091*5367Sahrens  * outputs:
1092*5367Sahrens  * zc_objset_stats	stats
1093*5367Sahrens  * zc_nvlist_dst	property nvlist
1094*5367Sahrens  * zc_nvlist_dst_size	size of property nvlist
1095*5367Sahrens  * zc_value		alternate root
1096*5367Sahrens  */
10971354Seschrock static int
1098789Sahrens zfs_ioc_objset_stats(zfs_cmd_t *zc)
1099789Sahrens {
1100789Sahrens 	objset_t *os = NULL;
1101789Sahrens 	int error;
11021356Seschrock 	nvlist_t *nv;
1103789Sahrens 
1104789Sahrens retry:
1105789Sahrens 	error = dmu_objset_open(zc->zc_name, DMU_OST_ANY,
1106789Sahrens 	    DS_MODE_STANDARD | DS_MODE_READONLY, &os);
1107789Sahrens 	if (error != 0) {
1108789Sahrens 		/*
1109789Sahrens 		 * This is ugly: dmu_objset_open() can return EBUSY if
1110789Sahrens 		 * the objset is held exclusively. Fortunately this hold is
1111789Sahrens 		 * only for a short while, so we retry here.
1112789Sahrens 		 * This avoids user code having to handle EBUSY,
1113789Sahrens 		 * for example for a "zfs list".
1114789Sahrens 		 */
1115789Sahrens 		if (error == EBUSY) {
1116789Sahrens 			delay(1);
1117789Sahrens 			goto retry;
1118789Sahrens 		}
1119789Sahrens 		return (error);
1120789Sahrens 	}
1121789Sahrens 
11222885Sahrens 	dmu_objset_fast_stat(os, &zc->zc_objset_stats);
1123789Sahrens 
11242856Snd150628 	if (zc->zc_nvlist_dst != 0 &&
11251356Seschrock 	    (error = dsl_prop_get_all(os, &nv)) == 0) {
11262885Sahrens 		dmu_objset_stats(os, nv);
11273087Sahrens 		/*
11285147Srm160521 		 * NB: zvol_get_stats() will read the objset contents,
11293087Sahrens 		 * which we aren't supposed to do with a
11303087Sahrens 		 * DS_MODE_STANDARD open, because it could be
11313087Sahrens 		 * inconsistent.  So this is a bit of a workaround...
11323087Sahrens 		 */
11334577Sahrens 		if (!zc->zc_objset_stats.dds_inconsistent) {
11344577Sahrens 			if (dmu_objset_type(os) == DMU_OST_ZVOL)
11354577Sahrens 				VERIFY(zvol_get_stats(os, nv) == 0);
11364577Sahrens 		}
11372676Seschrock 		error = put_nvlist(zc, nv);
11381356Seschrock 		nvlist_free(nv);
11391356Seschrock 	}
1140789Sahrens 
11412676Seschrock 	spa_altroot(dmu_objset_spa(os), zc->zc_value, sizeof (zc->zc_value));
11421544Seschrock 
1143789Sahrens 	dmu_objset_close(os);
1144789Sahrens 	return (error);
1145789Sahrens }
1146789Sahrens 
1147*5367Sahrens /*
1148*5367Sahrens  * inputs:
1149*5367Sahrens  * zc_name		name of filesystem
1150*5367Sahrens  * zc_cookie		zap cursor
1151*5367Sahrens  * zc_nvlist_dst_size	size of buffer for property nvlist
1152*5367Sahrens  *
1153*5367Sahrens  * outputs:
1154*5367Sahrens  * zc_name		name of next filesystem
1155*5367Sahrens  * zc_objset_stats	stats
1156*5367Sahrens  * zc_nvlist_dst	property nvlist
1157*5367Sahrens  * zc_nvlist_dst_size	size of property nvlist
1158*5367Sahrens  * zc_value		alternate root
1159*5367Sahrens  */
1160789Sahrens static int
11615147Srm160521 zfs_ioc_objset_version(zfs_cmd_t *zc)
11625147Srm160521 {
11635147Srm160521 	objset_t *os = NULL;
11645147Srm160521 	int error;
11655147Srm160521 
11665147Srm160521 retry:
11675147Srm160521 	error = dmu_objset_open(zc->zc_name, DMU_OST_ANY,
11685147Srm160521 	    DS_MODE_STANDARD | DS_MODE_READONLY, &os);
11695147Srm160521 	if (error != 0) {
11705147Srm160521 		/*
11715147Srm160521 		 * This is ugly: dmu_objset_open() can return EBUSY if
11725147Srm160521 		 * the objset is held exclusively. Fortunately this hold is
11735147Srm160521 		 * only for a short while, so we retry here.
11745147Srm160521 		 * This avoids user code having to handle EBUSY,
11755147Srm160521 		 * for example for a "zfs list".
11765147Srm160521 		 */
11775147Srm160521 		if (error == EBUSY) {
11785147Srm160521 			delay(1);
11795147Srm160521 			goto retry;
11805147Srm160521 		}
11815147Srm160521 		return (error);
11825147Srm160521 	}
11835147Srm160521 
11845147Srm160521 	dmu_objset_fast_stat(os, &zc->zc_objset_stats);
11855147Srm160521 
11865147Srm160521 	/*
11875147Srm160521 	 * NB: zfs_get_version() will read the objset contents,
11885147Srm160521 	 * which we aren't supposed to do with a
11895147Srm160521 	 * DS_MODE_STANDARD open, because it could be
11905147Srm160521 	 * inconsistent.  So this is a bit of a workaround...
11915147Srm160521 	 */
11925147Srm160521 	zc->zc_cookie = 0;
11935147Srm160521 	if (!zc->zc_objset_stats.dds_inconsistent)
11945147Srm160521 		if (dmu_objset_type(os) == DMU_OST_ZFS)
11955147Srm160521 			(void) zfs_get_version(os, &zc->zc_cookie);
11965147Srm160521 
11975147Srm160521 	dmu_objset_close(os);
11985147Srm160521 	return (0);
11995147Srm160521 }
12005147Srm160521 
12015147Srm160521 static int
1202789Sahrens zfs_ioc_dataset_list_next(zfs_cmd_t *zc)
1203789Sahrens {
1204885Sahrens 	objset_t *os;
1205789Sahrens 	int error;
1206789Sahrens 	char *p;
1207789Sahrens 
1208885Sahrens retry:
1209885Sahrens 	error = dmu_objset_open(zc->zc_name, DMU_OST_ANY,
1210885Sahrens 	    DS_MODE_STANDARD | DS_MODE_READONLY, &os);
1211885Sahrens 	if (error != 0) {
1212885Sahrens 		/*
1213885Sahrens 		 * This is ugly: dmu_objset_open() can return EBUSY if
1214885Sahrens 		 * the objset is held exclusively. Fortunately this hold is
1215885Sahrens 		 * only for a short while, so we retry here.
1216885Sahrens 		 * This avoids user code having to handle EBUSY,
1217885Sahrens 		 * for example for a "zfs list".
1218885Sahrens 		 */
1219885Sahrens 		if (error == EBUSY) {
1220885Sahrens 			delay(1);
1221885Sahrens 			goto retry;
1222885Sahrens 		}
1223885Sahrens 		if (error == ENOENT)
1224885Sahrens 			error = ESRCH;
1225885Sahrens 		return (error);
1226789Sahrens 	}
1227789Sahrens 
1228789Sahrens 	p = strrchr(zc->zc_name, '/');
1229789Sahrens 	if (p == NULL || p[1] != '\0')
1230789Sahrens 		(void) strlcat(zc->zc_name, "/", sizeof (zc->zc_name));
1231789Sahrens 	p = zc->zc_name + strlen(zc->zc_name);
1232789Sahrens 
1233789Sahrens 	do {
1234885Sahrens 		error = dmu_dir_list_next(os,
1235885Sahrens 		    sizeof (zc->zc_name) - (p - zc->zc_name), p,
1236885Sahrens 		    NULL, &zc->zc_cookie);
1237789Sahrens 		if (error == ENOENT)
1238789Sahrens 			error = ESRCH;
1239885Sahrens 	} while (error == 0 && !INGLOBALZONE(curproc) &&
1240789Sahrens 	    !zone_dataset_visible(zc->zc_name, NULL));
1241789Sahrens 
1242885Sahrens 	/*
1243885Sahrens 	 * If it's a hidden dataset (ie. with a '$' in its name), don't
1244885Sahrens 	 * try to get stats for it.  Userland will skip over it.
1245885Sahrens 	 */
1246885Sahrens 	if (error == 0 && strchr(zc->zc_name, '$') == NULL)
1247885Sahrens 		error = zfs_ioc_objset_stats(zc); /* fill in the stats */
1248789Sahrens 
1249885Sahrens 	dmu_objset_close(os);
1250789Sahrens 	return (error);
1251789Sahrens }
1252789Sahrens 
1253*5367Sahrens /*
1254*5367Sahrens  * inputs:
1255*5367Sahrens  * zc_name		name of filesystem
1256*5367Sahrens  * zc_cookie		zap cursor
1257*5367Sahrens  * zc_nvlist_dst_size	size of buffer for property nvlist
1258*5367Sahrens  *
1259*5367Sahrens  * outputs:
1260*5367Sahrens  * zc_name		name of next snapshot
1261*5367Sahrens  * zc_objset_stats	stats
1262*5367Sahrens  * zc_nvlist_dst	property nvlist
1263*5367Sahrens  * zc_nvlist_dst_size	size of property nvlist
1264*5367Sahrens  * zc_value		alternate root
1265*5367Sahrens  */
1266789Sahrens static int
1267789Sahrens zfs_ioc_snapshot_list_next(zfs_cmd_t *zc)
1268789Sahrens {
1269885Sahrens 	objset_t *os;
1270789Sahrens 	int error;
1271789Sahrens 
1272789Sahrens retry:
1273885Sahrens 	error = dmu_objset_open(zc->zc_name, DMU_OST_ANY,
1274885Sahrens 	    DS_MODE_STANDARD | DS_MODE_READONLY, &os);
1275885Sahrens 	if (error != 0) {
1276789Sahrens 		/*
1277885Sahrens 		 * This is ugly: dmu_objset_open() can return EBUSY if
1278789Sahrens 		 * the objset is held exclusively. Fortunately this hold is
1279789Sahrens 		 * only for a short while, so we retry here.
1280789Sahrens 		 * This avoids user code having to handle EBUSY,
1281885Sahrens 		 * for example for a "zfs list".
1282789Sahrens 		 */
1283789Sahrens 		if (error == EBUSY) {
1284789Sahrens 			delay(1);
1285789Sahrens 			goto retry;
1286789Sahrens 		}
1287789Sahrens 		if (error == ENOENT)
1288885Sahrens 			error = ESRCH;
1289789Sahrens 		return (error);
1290789Sahrens 	}
1291789Sahrens 
12921003Slling 	/*
12931003Slling 	 * A dataset name of maximum length cannot have any snapshots,
12941003Slling 	 * so exit immediately.
12951003Slling 	 */
12961003Slling 	if (strlcat(zc->zc_name, "@", sizeof (zc->zc_name)) >= MAXNAMELEN) {
1297885Sahrens 		dmu_objset_close(os);
12981003Slling 		return (ESRCH);
1299789Sahrens 	}
1300789Sahrens 
1301885Sahrens 	error = dmu_snapshot_list_next(os,
1302885Sahrens 	    sizeof (zc->zc_name) - strlen(zc->zc_name),
1303885Sahrens 	    zc->zc_name + strlen(zc->zc_name), NULL, &zc->zc_cookie);
1304789Sahrens 	if (error == ENOENT)
1305789Sahrens 		error = ESRCH;
1306789Sahrens 
1307885Sahrens 	if (error == 0)
1308885Sahrens 		error = zfs_ioc_objset_stats(zc); /* fill in the stats */
1309789Sahrens 
1310*5367Sahrens 	/* if we failed, undo the @ that we tacked on to zc_name */
1311*5367Sahrens 	if (error != 0)
1312*5367Sahrens 		*strchr(zc->zc_name, '@') = '\0';
1313*5367Sahrens 
1314885Sahrens 	dmu_objset_close(os);
1315789Sahrens 	return (error);
1316789Sahrens }
1317789Sahrens 
1318789Sahrens static int
13194787Sahrens zfs_set_prop_nvlist(const char *name, nvlist_t *nvl)
1320789Sahrens {
13212676Seschrock 	nvpair_t *elem;
13222676Seschrock 	int error;
13232676Seschrock 	uint64_t intval;
13242676Seschrock 	char *strval;
13252676Seschrock 
13264543Smarks 	/*
13274543Smarks 	 * First validate permission to set all of the properties
13284543Smarks 	 */
13292676Seschrock 	elem = NULL;
13302676Seschrock 	while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) {
13314670Sahrens 		const char *propname = nvpair_name(elem);
13324670Sahrens 		zfs_prop_t prop = zfs_name_to_prop(propname);
13332676Seschrock 
13345094Slling 		if (prop == ZPROP_INVAL) {
13352676Seschrock 			/*
13362676Seschrock 			 * If this is a user-defined property, it must be a
13372676Seschrock 			 * string, and there is no further validation to do.
13382676Seschrock 			 */
13392676Seschrock 			if (!zfs_prop_user(propname) ||
13402676Seschrock 			    nvpair_type(elem) != DATA_TYPE_STRING)
13412676Seschrock 				return (EINVAL);
13422676Seschrock 
13435331Samw 			if (error = zfs_secpolicy_write_perms(name,
13445331Samw 			    ZFS_DELEG_PERM_USERPROP, CRED()))
13454670Sahrens 				return (error);
13464543Smarks 			continue;
13472676Seschrock 		}
13482676Seschrock 
13494787Sahrens 		if ((error = zfs_secpolicy_setprop(name, prop, CRED())) != 0)
13504670Sahrens 			return (error);
13512676Seschrock 
13524670Sahrens 		/*
13534670Sahrens 		 * Check that this value is valid for this pool version
13544670Sahrens 		 */
13554670Sahrens 		switch (prop) {
13563886Sahl 		case ZFS_PROP_COMPRESSION:
13573886Sahl 			/*
13583886Sahl 			 * If the user specified gzip compression, make sure
13593886Sahl 			 * the SPA supports it. We ignore any errors here since
13603886Sahl 			 * we'll catch them later.
13613886Sahl 			 */
13623886Sahl 			if (nvpair_type(elem) == DATA_TYPE_UINT64 &&
13633886Sahl 			    nvpair_value_uint64(elem, &intval) == 0 &&
13643886Sahl 			    intval >= ZIO_COMPRESS_GZIP_1 &&
13653886Sahl 			    intval <= ZIO_COMPRESS_GZIP_9) {
13665331Samw 				if (zfs_check_version(name,
13675331Samw 				    SPA_VERSION_GZIP_COMPRESSION))
13685331Samw 					return (ENOTSUP);
13693886Sahl 			}
13703886Sahl 			break;
13714603Sahrens 
13724603Sahrens 		case ZFS_PROP_COPIES:
13735331Samw 			if (zfs_check_version(name, SPA_VERSION_DITTO_BLOCKS))
13745331Samw 				return (ENOTSUP);
13754603Sahrens 			break;
13765331Samw 		case ZFS_PROP_NORMALIZE:
13775331Samw 		case ZFS_PROP_UTF8ONLY:
13785331Samw 		case ZFS_PROP_CASE:
13795331Samw 			if (zfs_check_version(name, SPA_VERSION_NORMALIZATION))
13805331Samw 				return (ENOTSUP);
13815331Samw 
13824603Sahrens 		}
13835331Samw 		if ((error = zfs_secpolicy_setprop(name, prop, CRED())) != 0)
13845331Samw 			return (error);
13854543Smarks 	}
13864543Smarks 
13874543Smarks 	elem = NULL;
13884543Smarks 	while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) {
13894670Sahrens 		const char *propname = nvpair_name(elem);
13904670Sahrens 		zfs_prop_t prop = zfs_name_to_prop(propname);
13914543Smarks 
13925094Slling 		if (prop == ZPROP_INVAL) {
13934543Smarks 			VERIFY(nvpair_value_string(elem, &strval) == 0);
13944543Smarks 			error = dsl_prop_set(name, propname, 1,
13954543Smarks 			    strlen(strval) + 1, strval);
13964543Smarks 			if (error == 0)
13974543Smarks 				continue;
13984543Smarks 			else
13994543Smarks 				return (error);
14004543Smarks 		}
14012676Seschrock 
14022676Seschrock 		switch (prop) {
14032676Seschrock 		case ZFS_PROP_QUOTA:
14042676Seschrock 			if ((error = nvpair_value_uint64(elem, &intval)) != 0 ||
14054577Sahrens 			    (error = dsl_dir_set_quota(name, intval)) != 0)
14062676Seschrock 				return (error);
14072676Seschrock 			break;
14082676Seschrock 
14092676Seschrock 		case ZFS_PROP_RESERVATION:
14102676Seschrock 			if ((error = nvpair_value_uint64(elem, &intval)) != 0 ||
14112676Seschrock 			    (error = dsl_dir_set_reservation(name,
14122676Seschrock 			    intval)) != 0)
14132676Seschrock 				return (error);
14142676Seschrock 			break;
1415789Sahrens 
14162676Seschrock 		case ZFS_PROP_VOLSIZE:
14172676Seschrock 			if ((error = nvpair_value_uint64(elem, &intval)) != 0 ||
14184787Sahrens 			    (error = zvol_set_volsize(name,
14194787Sahrens 			    ddi_driver_major(zfs_dip), intval)) != 0)
14202676Seschrock 				return (error);
14212676Seschrock 			break;
14222676Seschrock 
14232676Seschrock 		case ZFS_PROP_VOLBLOCKSIZE:
14242676Seschrock 			if ((error = nvpair_value_uint64(elem, &intval)) != 0 ||
14254577Sahrens 			    (error = zvol_set_volblocksize(name, intval)) != 0)
14264577Sahrens 				return (error);
14274577Sahrens 			break;
14284577Sahrens 
14294577Sahrens 		case ZFS_PROP_VERSION:
14304577Sahrens 			if ((error = nvpair_value_uint64(elem, &intval)) != 0 ||
14314577Sahrens 			    (error = zfs_set_version(name, intval)) != 0)
14322676Seschrock 				return (error);
14332676Seschrock 			break;
14342676Seschrock 
14352676Seschrock 		default:
14362676Seschrock 			if (nvpair_type(elem) == DATA_TYPE_STRING) {
14372676Seschrock 				if (zfs_prop_get_type(prop) !=
14384787Sahrens 				    PROP_TYPE_STRING)
14392676Seschrock 					return (EINVAL);
14402717Seschrock 				VERIFY(nvpair_value_string(elem, &strval) == 0);
14412717Seschrock 				if ((error = dsl_prop_set(name,
14422676Seschrock 				    nvpair_name(elem), 1, strlen(strval) + 1,
14432717Seschrock 				    strval)) != 0)
14442717Seschrock 					return (error);
14452676Seschrock 			} else if (nvpair_type(elem) == DATA_TYPE_UINT64) {
14462885Sahrens 				const char *unused;
14472885Sahrens 
14482717Seschrock 				VERIFY(nvpair_value_uint64(elem, &intval) == 0);
14492676Seschrock 
14502676Seschrock 				switch (zfs_prop_get_type(prop)) {
14514787Sahrens 				case PROP_TYPE_NUMBER:
14522676Seschrock 					break;
14534787Sahrens 				case PROP_TYPE_STRING:
14542717Seschrock 					return (EINVAL);
14554787Sahrens 				case PROP_TYPE_INDEX:
14562717Seschrock 					if (zfs_prop_index_to_string(prop,
14572717Seschrock 					    intval, &unused) != 0)
14582717Seschrock 						return (EINVAL);
14592676Seschrock 					break;
14602676Seschrock 				default:
14614577Sahrens 					cmn_err(CE_PANIC,
14624577Sahrens 					    "unknown property type");
14632676Seschrock 					break;
14642676Seschrock 				}
14652676Seschrock 
14662717Seschrock 				if ((error = dsl_prop_set(name, propname,
14672717Seschrock 				    8, 1, &intval)) != 0)
14682717Seschrock 					return (error);
14692676Seschrock 			} else {
14702676Seschrock 				return (EINVAL);
14712676Seschrock 			}
14722676Seschrock 			break;
14732676Seschrock 		}
14742676Seschrock 	}
14752676Seschrock 
14762676Seschrock 	return (0);
1477789Sahrens }
1478789Sahrens 
1479*5367Sahrens /*
1480*5367Sahrens  * inputs:
1481*5367Sahrens  * zc_name		name of filesystem
1482*5367Sahrens  * zc_value		name of property to inherit
1483*5367Sahrens  * zc_nvlist_src{_size}	nvlist of properties to apply
1484*5367Sahrens  *
1485*5367Sahrens  * outputs:		none
1486*5367Sahrens  */
1487789Sahrens static int
14882676Seschrock zfs_ioc_set_prop(zfs_cmd_t *zc)
1489789Sahrens {
14902676Seschrock 	nvlist_t *nvl;
14912676Seschrock 	int error;
1492789Sahrens 
14935094Slling 	if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size,
14945094Slling 	    &nvl)) != 0)
14952676Seschrock 		return (error);
14962676Seschrock 
14974787Sahrens 	error = zfs_set_prop_nvlist(zc->zc_name, nvl);
14984543Smarks 
14992676Seschrock 	nvlist_free(nvl);
15002676Seschrock 	return (error);
1501789Sahrens }
1502789Sahrens 
1503*5367Sahrens /*
1504*5367Sahrens  * inputs:
1505*5367Sahrens  * zc_name		name of filesystem
1506*5367Sahrens  * zc_value		name of property to inherit
1507*5367Sahrens  *
1508*5367Sahrens  * outputs:		none
1509*5367Sahrens  */
1510789Sahrens static int
15114849Sahrens zfs_ioc_inherit_prop(zfs_cmd_t *zc)
15124849Sahrens {
15134849Sahrens 	/* the property name has been validated by zfs_secpolicy_inherit() */
15144849Sahrens 	return (dsl_prop_set(zc->zc_name, zc->zc_value, 0, 0, NULL));
15154849Sahrens }
15164849Sahrens 
15174849Sahrens static int
15184098Slling zfs_ioc_pool_set_props(zfs_cmd_t *zc)
15193912Slling {
15205094Slling 	nvlist_t *props;
15213912Slling 	spa_t *spa;
15225094Slling 	int error;
15233912Slling 
15245094Slling 	if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size,
15255094Slling 	    &props)))
15263912Slling 		return (error);
15273912Slling 
15283912Slling 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) {
15295094Slling 		nvlist_free(props);
15303912Slling 		return (error);
15313912Slling 	}
15323912Slling 
15335094Slling 	error = spa_prop_set(spa, props);
15343912Slling 
15355094Slling 	nvlist_free(props);
15363912Slling 	spa_close(spa, FTAG);
15373912Slling 
15383912Slling 	return (error);
15393912Slling }
15403912Slling 
15413912Slling static int
15424098Slling zfs_ioc_pool_get_props(zfs_cmd_t *zc)
15433912Slling {
15443912Slling 	spa_t *spa;
15453912Slling 	int error;
15463912Slling 	nvlist_t *nvp = NULL;
15473912Slling 
15483912Slling 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
15493912Slling 		return (error);
15503912Slling 
15515094Slling 	error = spa_prop_get(spa, &nvp);
15523912Slling 
15533912Slling 	if (error == 0 && zc->zc_nvlist_dst != NULL)
15543912Slling 		error = put_nvlist(zc, nvp);
15553912Slling 	else
15563912Slling 		error = EFAULT;
15573912Slling 
15583912Slling 	spa_close(spa, FTAG);
15593912Slling 
15603912Slling 	if (nvp)
15613912Slling 		nvlist_free(nvp);
15623912Slling 	return (error);
15633912Slling }
15643912Slling 
15653912Slling static int
15664543Smarks zfs_ioc_iscsi_perm_check(zfs_cmd_t *zc)
15674543Smarks {
15684543Smarks 	nvlist_t *nvp;
15694543Smarks 	int error;
15704543Smarks 	uint32_t uid;
15714543Smarks 	uint32_t gid;
15724543Smarks 	uint32_t *groups;
15734543Smarks 	uint_t group_cnt;
15744543Smarks 	cred_t	*usercred;
15754543Smarks 
15765094Slling 	if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size,
15775094Slling 	    &nvp)) != 0) {
15784543Smarks 		return (error);
15794543Smarks 	}
15804543Smarks 
15814543Smarks 	if ((error = nvlist_lookup_uint32(nvp,
15824543Smarks 	    ZFS_DELEG_PERM_UID, &uid)) != 0) {
15834543Smarks 		nvlist_free(nvp);
15844543Smarks 		return (EPERM);
15854543Smarks 	}
15864543Smarks 
15874543Smarks 	if ((error = nvlist_lookup_uint32(nvp,
15884543Smarks 	    ZFS_DELEG_PERM_GID, &gid)) != 0) {
15894543Smarks 		nvlist_free(nvp);
15904543Smarks 		return (EPERM);
15914543Smarks 	}
15924543Smarks 
15934543Smarks 	if ((error = nvlist_lookup_uint32_array(nvp, ZFS_DELEG_PERM_GROUPS,
15944543Smarks 	    &groups, &group_cnt)) != 0) {
15954543Smarks 		nvlist_free(nvp);
15964543Smarks 		return (EPERM);
15974543Smarks 	}
15984543Smarks 	usercred = cralloc();
15994543Smarks 	if ((crsetugid(usercred, uid, gid) != 0) ||
16004543Smarks 	    (crsetgroups(usercred, group_cnt, (gid_t *)groups) != 0)) {
16014543Smarks 		nvlist_free(nvp);
16024543Smarks 		crfree(usercred);
16034543Smarks 		return (EPERM);
16044543Smarks 	}
16054543Smarks 	nvlist_free(nvp);
16064543Smarks 	error = dsl_deleg_access(zc->zc_name,
16074787Sahrens 	    zfs_prop_to_name(ZFS_PROP_SHAREISCSI), usercred);
16084543Smarks 	crfree(usercred);
16094543Smarks 	return (error);
16104543Smarks }
16114543Smarks 
1612*5367Sahrens /*
1613*5367Sahrens  * inputs:
1614*5367Sahrens  * zc_name		name of filesystem
1615*5367Sahrens  * zc_nvlist_src{_size}	nvlist of delegated permissions
1616*5367Sahrens  * zc_perm_action	allow/unallow flag
1617*5367Sahrens  *
1618*5367Sahrens  * outputs:		none
1619*5367Sahrens  */
16204543Smarks static int
16214543Smarks zfs_ioc_set_fsacl(zfs_cmd_t *zc)
16224543Smarks {
16234543Smarks 	int error;
16244543Smarks 	nvlist_t *fsaclnv = NULL;
16254543Smarks 
16265094Slling 	if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size,
16275094Slling 	    &fsaclnv)) != 0)
16284543Smarks 		return (error);
16294543Smarks 
16304543Smarks 	/*
16314543Smarks 	 * Verify nvlist is constructed correctly
16324543Smarks 	 */
16334543Smarks 	if ((error = zfs_deleg_verify_nvlist(fsaclnv)) != 0) {
16344543Smarks 		nvlist_free(fsaclnv);
16354543Smarks 		return (EINVAL);
16364543Smarks 	}
16374543Smarks 
16384543Smarks 	/*
16394543Smarks 	 * If we don't have PRIV_SYS_MOUNT, then validate
16404543Smarks 	 * that user is allowed to hand out each permission in
16414543Smarks 	 * the nvlist(s)
16424543Smarks 	 */
16434543Smarks 
16444787Sahrens 	error = secpolicy_zfs(CRED());
16454543Smarks 	if (error) {
16464787Sahrens 		if (zc->zc_perm_action == B_FALSE) {
16474787Sahrens 			error = dsl_deleg_can_allow(zc->zc_name,
16484787Sahrens 			    fsaclnv, CRED());
16494787Sahrens 		} else {
16504787Sahrens 			error = dsl_deleg_can_unallow(zc->zc_name,
16514787Sahrens 			    fsaclnv, CRED());
16524787Sahrens 		}
16534543Smarks 	}
16544543Smarks 
16554543Smarks 	if (error == 0)
16564543Smarks 		error = dsl_deleg_set(zc->zc_name, fsaclnv, zc->zc_perm_action);
16574543Smarks 
16584543Smarks 	nvlist_free(fsaclnv);
16594543Smarks 	return (error);
16604543Smarks }
16614543Smarks 
1662*5367Sahrens /*
1663*5367Sahrens  * inputs:
1664*5367Sahrens  * zc_name		name of filesystem
1665*5367Sahrens  *
1666*5367Sahrens  * outputs:
1667*5367Sahrens  * zc_nvlist_src{_size}	nvlist of delegated permissions
1668*5367Sahrens  */
16694543Smarks static int
16704543Smarks zfs_ioc_get_fsacl(zfs_cmd_t *zc)
16714543Smarks {
16724543Smarks 	nvlist_t *nvp;
16734543Smarks 	int error;
16744543Smarks 
16754543Smarks 	if ((error = dsl_deleg_get(zc->zc_name, &nvp)) == 0) {
16764543Smarks 		error = put_nvlist(zc, nvp);
16774543Smarks 		nvlist_free(nvp);
16784543Smarks 	}
16794543Smarks 
16804543Smarks 	return (error);
16814543Smarks }
16824543Smarks 
1683*5367Sahrens /*
1684*5367Sahrens  * inputs:
1685*5367Sahrens  * zc_name		name of volume
1686*5367Sahrens  *
1687*5367Sahrens  * outputs:		none
1688*5367Sahrens  */
16894543Smarks static int
1690789Sahrens zfs_ioc_create_minor(zfs_cmd_t *zc)
1691789Sahrens {
16924787Sahrens 	return (zvol_create_minor(zc->zc_name, ddi_driver_major(zfs_dip)));
1693789Sahrens }
1694789Sahrens 
1695*5367Sahrens /*
1696*5367Sahrens  * inputs:
1697*5367Sahrens  * zc_name		name of volume
1698*5367Sahrens  *
1699*5367Sahrens  * outputs:		none
1700*5367Sahrens  */
1701789Sahrens static int
1702789Sahrens zfs_ioc_remove_minor(zfs_cmd_t *zc)
1703789Sahrens {
17042676Seschrock 	return (zvol_remove_minor(zc->zc_name));
1705789Sahrens }
1706789Sahrens 
1707789Sahrens /*
1708789Sahrens  * Search the vfs list for a specified resource.  Returns a pointer to it
1709789Sahrens  * or NULL if no suitable entry is found. The caller of this routine
1710789Sahrens  * is responsible for releasing the returned vfs pointer.
1711789Sahrens  */
1712789Sahrens static vfs_t *
1713789Sahrens zfs_get_vfs(const char *resource)
1714789Sahrens {
1715789Sahrens 	struct vfs *vfsp;
1716789Sahrens 	struct vfs *vfs_found = NULL;
1717789Sahrens 
1718789Sahrens 	vfs_list_read_lock();
1719789Sahrens 	vfsp = rootvfs;
1720789Sahrens 	do {
1721789Sahrens 		if (strcmp(refstr_value(vfsp->vfs_resource), resource) == 0) {
1722789Sahrens 			VFS_HOLD(vfsp);
1723789Sahrens 			vfs_found = vfsp;
1724789Sahrens 			break;
1725789Sahrens 		}
1726789Sahrens 		vfsp = vfsp->vfs_next;
1727789Sahrens 	} while (vfsp != rootvfs);
1728789Sahrens 	vfs_list_unlock();
1729789Sahrens 	return (vfs_found);
1730789Sahrens }
1731789Sahrens 
17324543Smarks /* ARGSUSED */
1733789Sahrens static void
17344543Smarks zfs_create_cb(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx)
1735789Sahrens {
17365331Samw 	zfs_creat_t *zct = arg;
17375331Samw 	uint64_t version;
17385331Samw 
17395331Samw 	if (spa_version(dmu_objset_spa(os)) >= SPA_VERSION_FUID)
17405331Samw 		version = ZPL_VERSION;
17415331Samw 	else
17425331Samw 		version = ZPL_VERSION_FUID - 1;
17435331Samw 
17445331Samw 	(void) nvlist_lookup_uint64(zct->zct_props,
17454577Sahrens 	    zfs_prop_to_name(ZFS_PROP_VERSION), &version);
17464577Sahrens 
17475331Samw 	zfs_create_fs(os, cr, version, zct->zct_norm, tx);
17485331Samw }
17495331Samw 
17505331Samw /*
17515331Samw  * zfs_prop_lookup()
17525331Samw  *
17535331Samw  * Look for the property first in the existing property nvlist.  If
17545331Samw  * it's already present, you're done.  If it's not there, attempt to
17555331Samw  * find the property value from a parent dataset.  If that fails, fall
17565331Samw  * back to the property's default value.  In either of these two
17575331Samw  * cases, if update is TRUE, add a value for the property to the
17585331Samw  * property nvlist.
17595331Samw  *
17605331Samw  * If the rval pointer is non-NULL, copy the discovered value to rval.
17615331Samw  *
17625331Samw  * If we get any unexpected errors, bail and return the error number
17635331Samw  * to the caller.
17645331Samw  *
17655331Samw  * If we succeed, return 0.
17665331Samw  */
17675331Samw static int
17685331Samw zfs_prop_lookup(const char *parentname, zfs_prop_t propnum,
17695331Samw     nvlist_t *proplist, uint64_t *rval, boolean_t update)
17705331Samw {
17715331Samw 	const char *propname;
17725331Samw 	uint64_t value;
17735331Samw 	int error = ENOENT;
17745331Samw 
17755331Samw 	propname = zfs_prop_to_name(propnum);
17765331Samw 	if (proplist != NULL)
17775331Samw 		error = nvlist_lookup_uint64(proplist, propname, &value);
17785331Samw 	if (error == ENOENT) {
17795331Samw 		error = dsl_prop_get_integer(parentname, propname,
17805331Samw 		    &value, NULL);
17815331Samw 		if (error == ENOENT)
17825331Samw 			value = zfs_prop_default_numeric(propnum);
17835331Samw 		else if (error != 0)
17845331Samw 			return (error);
17855331Samw 		if (update) {
17865331Samw 			ASSERT(proplist != NULL);
17875331Samw 			error = nvlist_add_uint64(proplist, propname, value);
17885331Samw 		}
17895331Samw 	}
17905331Samw 	if (error == 0 && rval)
17915331Samw 		*rval = value;
17925331Samw 	return (error);
17935331Samw }
17945331Samw 
17955331Samw /*
17965331Samw  * zfs_normalization_get
17975331Samw  *
17985331Samw  * Get the normalization flag value.  If the properties have
17995331Samw  * non-default values, make sure the pool version is recent enough to
18005331Samw  * support these choices.
18015331Samw  */
18025331Samw static int
18035331Samw zfs_normalization_get(const char *dataset, nvlist_t *proplist, int *norm,
18045331Samw     boolean_t update)
18055331Samw {
18065331Samw 	char parentname[MAXNAMELEN];
18075331Samw 	char poolname[MAXNAMELEN];
18085331Samw 	char *cp;
18095331Samw 	uint64_t value;
18105331Samw 	int check = 0;
18115331Samw 	int error;
18125331Samw 
18135331Samw 	ASSERT(norm != NULL);
18145331Samw 	*norm = 0;
18155331Samw 
18165331Samw 	(void) strncpy(parentname, dataset, sizeof (parentname));
18175331Samw 	cp = strrchr(parentname, '@');
18185331Samw 	if (cp != NULL) {
18195331Samw 		cp[0] = '\0';
18205331Samw 	} else {
18215331Samw 		cp = strrchr(parentname, '/');
18225331Samw 		if (cp == NULL)
18235331Samw 			return (ENOENT);
18245331Samw 		cp[0] = '\0';
18255331Samw 	}
18265331Samw 
18275331Samw 	(void) strncpy(poolname, dataset, sizeof (poolname));
18285331Samw 	cp = strchr(poolname, '/');
18295331Samw 	if (cp != NULL)
18305331Samw 		cp[0] = '\0';
18315331Samw 
18325331Samw 	error = zfs_prop_lookup(parentname, ZFS_PROP_UTF8ONLY,
18335331Samw 	    proplist, &value, update);
18345331Samw 	if (error != 0)
18355331Samw 		return (error);
18365331Samw 	if (value != zfs_prop_default_numeric(ZFS_PROP_UTF8ONLY))
18375331Samw 		check = 1;
18385331Samw 
18395331Samw 	error = zfs_prop_lookup(parentname, ZFS_PROP_NORMALIZE,
18405331Samw 	    proplist, &value, update);
18415331Samw 	if (error != 0)
18425331Samw 		return (error);
18435331Samw 	if (value != zfs_prop_default_numeric(ZFS_PROP_NORMALIZE)) {
18445331Samw 		check = 1;
18455331Samw 		switch ((int)value) {
18465331Samw 		case ZFS_NORMALIZE_NONE:
18475331Samw 			break;
18485331Samw 		case ZFS_NORMALIZE_C:
18495331Samw 			*norm |= U8_TEXTPREP_NFC;
18505331Samw 			break;
18515331Samw 		case ZFS_NORMALIZE_D:
18525331Samw 			*norm |= U8_TEXTPREP_NFD;
18535331Samw 			break;
18545331Samw 		case ZFS_NORMALIZE_KC:
18555331Samw 			*norm |= U8_TEXTPREP_NFKC;
18565331Samw 			break;
18575331Samw 		case ZFS_NORMALIZE_KD:
18585331Samw 			*norm |= U8_TEXTPREP_NFKD;
18595331Samw 			break;
18605331Samw 		default:
18615331Samw 			ASSERT((int)value >= ZFS_NORMALIZE_NONE);
18625331Samw 			ASSERT((int)value <= ZFS_NORMALIZE_KD);
18635331Samw 			break;
18645331Samw 		}
18655331Samw 	}
18665331Samw 
18675331Samw 	error = zfs_prop_lookup(parentname, ZFS_PROP_CASE,
18685331Samw 	    proplist, &value, update);
18695331Samw 	if (error != 0)
18705331Samw 		return (error);
18715331Samw 	if (value != zfs_prop_default_numeric(ZFS_PROP_CASE)) {
18725331Samw 		check = 1;
18735331Samw 		switch ((int)value) {
18745331Samw 		case ZFS_CASE_SENSITIVE:
18755331Samw 			break;
18765331Samw 		case ZFS_CASE_INSENSITIVE:
18775331Samw 			*norm |= U8_TEXTPREP_TOUPPER;
18785331Samw 			break;
18795331Samw 		case ZFS_CASE_MIXED:
18805331Samw 			*norm |= U8_TEXTPREP_TOUPPER;
18815331Samw 			break;
18825331Samw 		default:
18835331Samw 			ASSERT((int)value >= ZFS_CASE_SENSITIVE);
18845331Samw 			ASSERT((int)value <= ZFS_CASE_MIXED);
18855331Samw 			break;
18865331Samw 		}
18875331Samw 	}
18885331Samw 
18895331Samw 	if (check == 1)
18905331Samw 		if (zfs_check_version(poolname, SPA_VERSION_NORMALIZATION))
18915331Samw 			return (ENOTSUP);
18925331Samw 	return (0);
1893789Sahrens }
1894789Sahrens 
1895*5367Sahrens /*
1896*5367Sahrens  * inputs:
1897*5367Sahrens  * zc_objset_type	type of objset to create (fs vs zvol)
1898*5367Sahrens  * zc_name		name of new objset
1899*5367Sahrens  * zc_value		name of snapshot to clone from (may be empty)
1900*5367Sahrens  * zc_nvlist_src{_size}	nvlist of properties to apply
1901*5367Sahrens  *
1902*5367Sahrens  * outputs:		none
1903*5367Sahrens  */
1904789Sahrens static int
1905789Sahrens zfs_ioc_create(zfs_cmd_t *zc)
1906789Sahrens {
1907789Sahrens 	objset_t *clone;
1908789Sahrens 	int error = 0;
19095331Samw 	zfs_creat_t zct;
19104543Smarks 	nvlist_t *nvprops = NULL;
19114543Smarks 	void (*cbfunc)(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx);
1912789Sahrens 	dmu_objset_type_t type = zc->zc_objset_type;
1913789Sahrens 
1914789Sahrens 	switch (type) {
1915789Sahrens 
1916789Sahrens 	case DMU_OST_ZFS:
1917789Sahrens 		cbfunc = zfs_create_cb;
1918789Sahrens 		break;
1919789Sahrens 
1920789Sahrens 	case DMU_OST_ZVOL:
1921789Sahrens 		cbfunc = zvol_create_cb;
1922789Sahrens 		break;
1923789Sahrens 
1924789Sahrens 	default:
19252199Sahrens 		cbfunc = NULL;
19262199Sahrens 	}
19275326Sek110237 	if (strchr(zc->zc_name, '@') ||
19285326Sek110237 	    strchr(zc->zc_name, '%'))
1929789Sahrens 		return (EINVAL);
1930789Sahrens 
19312676Seschrock 	if (zc->zc_nvlist_src != NULL &&
19325094Slling 	    (error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size,
19335094Slling 	    &nvprops)) != 0)
19342676Seschrock 		return (error);
19352676Seschrock 
19365331Samw 	zct.zct_norm = 0;
19375331Samw 	zct.zct_props = nvprops;
19385331Samw 
19392676Seschrock 	if (zc->zc_value[0] != '\0') {
1940789Sahrens 		/*
1941789Sahrens 		 * We're creating a clone of an existing snapshot.
1942789Sahrens 		 */
19432676Seschrock 		zc->zc_value[sizeof (zc->zc_value) - 1] = '\0';
19442676Seschrock 		if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0) {
19454543Smarks 			nvlist_free(nvprops);
1946789Sahrens 			return (EINVAL);
19472676Seschrock 		}
1948789Sahrens 
19492676Seschrock 		error = dmu_objset_open(zc->zc_value, type,
1950789Sahrens 		    DS_MODE_STANDARD | DS_MODE_READONLY, &clone);
19512676Seschrock 		if (error) {
19524543Smarks 			nvlist_free(nvprops);
1953789Sahrens 			return (error);
19542676Seschrock 		}
1955789Sahrens 		error = dmu_objset_create(zc->zc_name, type, clone, NULL, NULL);
19565331Samw 		if (error) {
19575331Samw 			dmu_objset_close(clone);
19585331Samw 			nvlist_free(nvprops);
19595331Samw 			return (error);
19605331Samw 		}
19615331Samw 		/*
19625331Samw 		 * If caller did not provide any properties, allocate
19635331Samw 		 * an nvlist for properties, as we will be adding our set-once
19645331Samw 		 * properties to it.  This carries the choices made on the
19655331Samw 		 * original file system into the clone.
19665331Samw 		 */
19675331Samw 		if (nvprops == NULL)
19685331Samw 			VERIFY(nvlist_alloc(&nvprops,
19695331Samw 			    NV_UNIQUE_NAME, KM_SLEEP) == 0);
19705331Samw 
19715331Samw 		/*
19725331Samw 		 * We have to have normalization and case-folding
19735331Samw 		 * flags correct when we do the file system creation,
19745331Samw 		 * so go figure them out now.  All we really care about
19755331Samw 		 * here is getting these values into the property list.
19765331Samw 		 */
19775331Samw 		error = zfs_normalization_get(zc->zc_value, nvprops,
19785331Samw 		    &zct.zct_norm, B_TRUE);
19795331Samw 		if (error != 0) {
19805331Samw 			dmu_objset_close(clone);
19815331Samw 			nvlist_free(nvprops);
19825331Samw 			return (error);
19835331Samw 		}
1984789Sahrens 		dmu_objset_close(clone);
1985789Sahrens 	} else {
19862676Seschrock 		if (cbfunc == NULL) {
19874543Smarks 			nvlist_free(nvprops);
19882199Sahrens 			return (EINVAL);
19892676Seschrock 		}
19902676Seschrock 
1991789Sahrens 		if (type == DMU_OST_ZVOL) {
19922676Seschrock 			uint64_t volsize, volblocksize;
19932676Seschrock 
19944543Smarks 			if (nvprops == NULL ||
19954543Smarks 			    nvlist_lookup_uint64(nvprops,
19962676Seschrock 			    zfs_prop_to_name(ZFS_PROP_VOLSIZE),
19972676Seschrock 			    &volsize) != 0) {
19984543Smarks 				nvlist_free(nvprops);
19992676Seschrock 				return (EINVAL);
20002676Seschrock 			}
20012676Seschrock 
20024543Smarks 			if ((error = nvlist_lookup_uint64(nvprops,
20032676Seschrock 			    zfs_prop_to_name(ZFS_PROP_VOLBLOCKSIZE),
20042676Seschrock 			    &volblocksize)) != 0 && error != ENOENT) {
20054543Smarks 				nvlist_free(nvprops);
20062676Seschrock 				return (EINVAL);
20072676Seschrock 			}
20081133Seschrock 
20092676Seschrock 			if (error != 0)
20102676Seschrock 				volblocksize = zfs_prop_default_numeric(
20112676Seschrock 				    ZFS_PROP_VOLBLOCKSIZE);
20122676Seschrock 
20132676Seschrock 			if ((error = zvol_check_volblocksize(
20142676Seschrock 			    volblocksize)) != 0 ||
20152676Seschrock 			    (error = zvol_check_volsize(volsize,
20162676Seschrock 			    volblocksize)) != 0) {
20174543Smarks 				nvlist_free(nvprops);
2018789Sahrens 				return (error);
20192676Seschrock 			}
20204577Sahrens 		} else if (type == DMU_OST_ZFS) {
20214577Sahrens 			uint64_t version;
20225331Samw 			int error;
20235331Samw 
20245331Samw 			error = nvlist_lookup_uint64(nvprops,
20255331Samw 			    zfs_prop_to_name(ZFS_PROP_VERSION), &version);
20265331Samw 
20275331Samw 			if (error == 0 && (version < ZPL_VERSION_INITIAL ||
20284577Sahrens 			    version > ZPL_VERSION)) {
20294577Sahrens 				nvlist_free(nvprops);
20305331Samw 				return (ENOTSUP);
20315331Samw 			} else if (error == 0 && version >= ZPL_VERSION_FUID &&
20325331Samw 			    zfs_check_version(zc->zc_name, SPA_VERSION_FUID)) {
20335331Samw 				nvlist_free(nvprops);
20345331Samw 				return (ENOTSUP);
20355331Samw 			}
20365331Samw 
20375331Samw 			/*
20385331Samw 			 * We have to have normalization and
20395331Samw 			 * case-folding flags correct when we do the
20405331Samw 			 * file system creation, so go figure them out
20415331Samw 			 * now.  The final argument to zfs_normalization_get()
20425331Samw 			 * tells that routine not to update the nvprops
20435331Samw 			 * list.
20445331Samw 			 */
20455331Samw 			error = zfs_normalization_get(zc->zc_name, nvprops,
20465331Samw 			    &zct.zct_norm, B_FALSE);
20475331Samw 			if (error != 0) {
20485331Samw 				nvlist_free(nvprops);
20495331Samw 				return (error);
20504577Sahrens 			}
20512676Seschrock 		}
20522676Seschrock 		error = dmu_objset_create(zc->zc_name, type, NULL, cbfunc,
20535331Samw 		    &zct);
2054789Sahrens 	}
20552676Seschrock 
20562676Seschrock 	/*
20572676Seschrock 	 * It would be nice to do this atomically.
20582676Seschrock 	 */
20592676Seschrock 	if (error == 0) {
20604787Sahrens 		if ((error = zfs_set_prop_nvlist(zc->zc_name, nvprops)) != 0)
20612676Seschrock 			(void) dmu_objset_destroy(zc->zc_name);
20622676Seschrock 	}
20632676Seschrock 
20644543Smarks 	nvlist_free(nvprops);
2065789Sahrens 	return (error);
2066789Sahrens }
2067789Sahrens 
2068*5367Sahrens /*
2069*5367Sahrens  * inputs:
2070*5367Sahrens  * zc_name	name of filesystem
2071*5367Sahrens  * zc_value	short name of snapshot
2072*5367Sahrens  * zc_cookie	recursive flag
2073*5367Sahrens  *
2074*5367Sahrens  * outputs:	none
2075*5367Sahrens  */
2076789Sahrens static int
20772199Sahrens zfs_ioc_snapshot(zfs_cmd_t *zc)
20782199Sahrens {
20792676Seschrock 	if (snapshot_namecheck(zc->zc_value, NULL, NULL) != 0)
20802199Sahrens 		return (EINVAL);
20812199Sahrens 	return (dmu_objset_snapshot(zc->zc_name,
20822676Seschrock 	    zc->zc_value, zc->zc_cookie));
20832199Sahrens }
20842199Sahrens 
20854007Smmusante int
20862199Sahrens zfs_unmount_snap(char *name, void *arg)
2087789Sahrens {
20882199Sahrens 	char *snapname = arg;
20892199Sahrens 	char *cp;
20902417Sahrens 	vfs_t *vfsp = NULL;
20912199Sahrens 
20922199Sahrens 	/*
20932199Sahrens 	 * Snapshots (which are under .zfs control) must be unmounted
20942199Sahrens 	 * before they can be destroyed.
20952199Sahrens 	 */
20962199Sahrens 
20972199Sahrens 	if (snapname) {
20982199Sahrens 		(void) strcat(name, "@");
20992199Sahrens 		(void) strcat(name, snapname);
21002199Sahrens 		vfsp = zfs_get_vfs(name);
21012199Sahrens 		cp = strchr(name, '@');
21022199Sahrens 		*cp = '\0';
21032417Sahrens 	} else if (strchr(name, '@')) {
21042199Sahrens 		vfsp = zfs_get_vfs(name);
21052199Sahrens 	}
21062199Sahrens 
21072199Sahrens 	if (vfsp) {
21082199Sahrens 		/*
21092199Sahrens 		 * Always force the unmount for snapshots.
21102199Sahrens 		 */
21112199Sahrens 		int flag = MS_FORCE;
2112789Sahrens 		int err;
2113789Sahrens 
21142199Sahrens 		if ((err = vn_vfswlock(vfsp->vfs_vnodecovered)) != 0) {
21152199Sahrens 			VFS_RELE(vfsp);
21162199Sahrens 			return (err);
21172199Sahrens 		}
21182199Sahrens 		VFS_RELE(vfsp);
21192199Sahrens 		if ((err = dounmount(vfsp, flag, kcred)) != 0)
21202199Sahrens 			return (err);
21212199Sahrens 	}
21222199Sahrens 	return (0);
21232199Sahrens }
21242199Sahrens 
2125*5367Sahrens /*
2126*5367Sahrens  * inputs:
2127*5367Sahrens  * zc_name	name of filesystem
2128*5367Sahrens  * zc_value	short name of snapshot
2129*5367Sahrens  *
2130*5367Sahrens  * outputs:	none
2131*5367Sahrens  */
21322199Sahrens static int
21332199Sahrens zfs_ioc_destroy_snaps(zfs_cmd_t *zc)
21342199Sahrens {
21352199Sahrens 	int err;
2136789Sahrens 
21372676Seschrock 	if (snapshot_namecheck(zc->zc_value, NULL, NULL) != 0)
21382199Sahrens 		return (EINVAL);
21392199Sahrens 	err = dmu_objset_find(zc->zc_name,
21402676Seschrock 	    zfs_unmount_snap, zc->zc_value, DS_FIND_CHILDREN);
21412199Sahrens 	if (err)
21422199Sahrens 		return (err);
21432676Seschrock 	return (dmu_snapshots_destroy(zc->zc_name, zc->zc_value));
21442199Sahrens }
21452199Sahrens 
2146*5367Sahrens /*
2147*5367Sahrens  * inputs:
2148*5367Sahrens  * zc_name		name of dataset to destroy
2149*5367Sahrens  * zc_objset_type	type of objset
2150*5367Sahrens  *
2151*5367Sahrens  * outputs:		none
2152*5367Sahrens  */
21532199Sahrens static int
21542199Sahrens zfs_ioc_destroy(zfs_cmd_t *zc)
21552199Sahrens {
21562199Sahrens 	if (strchr(zc->zc_name, '@') && zc->zc_objset_type == DMU_OST_ZFS) {
21572199Sahrens 		int err = zfs_unmount_snap(zc->zc_name, NULL);
21582199Sahrens 		if (err)
21592199Sahrens 			return (err);
2160789Sahrens 	}
2161789Sahrens 
2162789Sahrens 	return (dmu_objset_destroy(zc->zc_name));
2163789Sahrens }
2164789Sahrens 
2165*5367Sahrens /*
2166*5367Sahrens  * inputs:
2167*5367Sahrens  * zc_name	name of snapshot to roll back to
2168*5367Sahrens  *
2169*5367Sahrens  * outputs:	none
2170*5367Sahrens  */
2171789Sahrens static int
2172789Sahrens zfs_ioc_rollback(zfs_cmd_t *zc)
2173789Sahrens {
2174789Sahrens 	return (dmu_objset_rollback(zc->zc_name));
2175789Sahrens }
2176789Sahrens 
2177*5367Sahrens /*
2178*5367Sahrens  * inputs:
2179*5367Sahrens  * zc_name	old name of dataset
2180*5367Sahrens  * zc_value	new name of dataset
2181*5367Sahrens  * zc_cookie	recursive flag (only valid for snapshots)
2182*5367Sahrens  *
2183*5367Sahrens  * outputs:	none
2184*5367Sahrens  */
2185789Sahrens static int
2186789Sahrens zfs_ioc_rename(zfs_cmd_t *zc)
2187789Sahrens {
21884490Svb160487 	boolean_t recursive = zc->zc_cookie & 1;
21894007Smmusante 
21902676Seschrock 	zc->zc_value[sizeof (zc->zc_value) - 1] = '\0';
21915326Sek110237 	if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0 ||
21925326Sek110237 	    strchr(zc->zc_value, '%'))
2193789Sahrens 		return (EINVAL);
2194789Sahrens 
21954007Smmusante 	/*
21964007Smmusante 	 * Unmount snapshot unless we're doing a recursive rename,
21974007Smmusante 	 * in which case the dataset code figures out which snapshots
21984007Smmusante 	 * to unmount.
21994007Smmusante 	 */
22004007Smmusante 	if (!recursive && strchr(zc->zc_name, '@') != NULL &&
2201789Sahrens 	    zc->zc_objset_type == DMU_OST_ZFS) {
22022199Sahrens 		int err = zfs_unmount_snap(zc->zc_name, NULL);
22032199Sahrens 		if (err)
22042199Sahrens 			return (err);
2205789Sahrens 	}
2206789Sahrens 
22074007Smmusante 	return (dmu_objset_rename(zc->zc_name, zc->zc_value, recursive));
2208789Sahrens }
2209789Sahrens 
2210*5367Sahrens /*
2211*5367Sahrens  * inputs:
2212*5367Sahrens  * zc_name		name of containing filesystem
2213*5367Sahrens  * zc_nvlist_src{_size}	nvlist of properties to apply
2214*5367Sahrens  * zc_value		name of snapshot to create
2215*5367Sahrens  * zc_string		name of clone origin (if DRR_FLAG_CLONE)
2216*5367Sahrens  * zc_cookie		file descriptor to recv from
2217*5367Sahrens  * zc_begin_record	the BEGIN record of the stream (not byteswapped)
2218*5367Sahrens  * zc_guid		force flag
2219*5367Sahrens  *
2220*5367Sahrens  * outputs:
2221*5367Sahrens  * zc_cookie		number of bytes read
2222*5367Sahrens  */
2223789Sahrens static int
2224*5367Sahrens zfs_ioc_recv(zfs_cmd_t *zc)
2225789Sahrens {
2226789Sahrens 	file_t *fp;
22275326Sek110237 	objset_t *os;
2228*5367Sahrens 	dmu_recv_cookie_t drc;
22295326Sek110237 	zfsvfs_t *zfsvfs = NULL;
22305326Sek110237 	boolean_t force = (boolean_t)zc->zc_guid;
2231789Sahrens 	int error, fd;
2232*5367Sahrens 	offset_t off;
2233*5367Sahrens 	nvlist_t *props = NULL;
2234*5367Sahrens 	objset_t *origin = NULL;
2235*5367Sahrens 	char *tosnap;
2236*5367Sahrens 	char tofs[ZFS_MAXNAMELEN];
2237789Sahrens 
22383265Sahrens 	if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0 ||
22395326Sek110237 	    strchr(zc->zc_value, '@') == NULL ||
22405326Sek110237 	    strchr(zc->zc_value, '%'))
22413265Sahrens 		return (EINVAL);
22423265Sahrens 
2243*5367Sahrens 	(void) strcpy(tofs, zc->zc_value);
2244*5367Sahrens 	tosnap = strchr(tofs, '@');
2245*5367Sahrens 	*tosnap = '\0';
2246*5367Sahrens 	tosnap++;
2247*5367Sahrens 
2248*5367Sahrens 	if (zc->zc_nvlist_src != NULL &&
2249*5367Sahrens 	    (error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size,
2250*5367Sahrens 	    &props)) != 0)
2251*5367Sahrens 		return (error);
2252*5367Sahrens 
2253789Sahrens 	fd = zc->zc_cookie;
2254789Sahrens 	fp = getf(fd);
2255*5367Sahrens 	if (fp == NULL) {
2256*5367Sahrens 		nvlist_free(props);
2257789Sahrens 		return (EBADF);
2258*5367Sahrens 	}
22595326Sek110237 
22605326Sek110237 	/*
22615326Sek110237 	 * Get the zfsvfs for the receiving objset. There
22625326Sek110237 	 * won't be one if we're operating on a zvol, if the
22635326Sek110237 	 * objset doesn't exist yet, or is not mounted.
22645326Sek110237 	 */
2265*5367Sahrens 
2266*5367Sahrens 	error = dmu_objset_open(tofs, DMU_OST_ANY,
22675326Sek110237 	    DS_MODE_STANDARD | DS_MODE_READONLY, &os);
22685326Sek110237 	if (!error) {
22695326Sek110237 		if (dmu_objset_type(os) == DMU_OST_ZFS) {
22705326Sek110237 			mutex_enter(&os->os->os_user_ptr_lock);
22715326Sek110237 			zfsvfs = dmu_objset_get_user(os);
22725326Sek110237 			if (zfsvfs != NULL)
22735326Sek110237 				VFS_HOLD(zfsvfs->z_vfs);
22745326Sek110237 			mutex_exit(&os->os->os_user_ptr_lock);
22755326Sek110237 		}
22765326Sek110237 		dmu_objset_close(os);
22775326Sek110237 	}
22785326Sek110237 
2279*5367Sahrens 	if (zc->zc_string[0]) {
2280*5367Sahrens 		error = dmu_objset_open(zc->zc_string, DMU_OST_ANY,
2281*5367Sahrens 		    DS_MODE_STANDARD | DS_MODE_READONLY, &origin);
2282*5367Sahrens 		if (error) {
2283*5367Sahrens 			if (zfsvfs != NULL)
2284*5367Sahrens 				VFS_RELE(zfsvfs->z_vfs);
2285*5367Sahrens 			nvlist_free(props);
2286*5367Sahrens 			releasef(fd);
2287*5367Sahrens 			return (error);
2288*5367Sahrens 		}
2289*5367Sahrens 	}
2290*5367Sahrens 
2291*5367Sahrens 	error = dmu_recv_begin(tofs, tosnap, &zc->zc_begin_record,
2292*5367Sahrens 	    force, origin, zfsvfs != NULL, &drc);
2293*5367Sahrens 	if (origin)
2294*5367Sahrens 		dmu_objset_close(origin);
2295*5367Sahrens 	if (error) {
2296*5367Sahrens 		if (zfsvfs != NULL)
2297*5367Sahrens 			VFS_RELE(zfsvfs->z_vfs);
2298*5367Sahrens 		nvlist_free(props);
2299*5367Sahrens 		releasef(fd);
2300*5367Sahrens 		return (error);
2301*5367Sahrens 	}
23025326Sek110237 
23035326Sek110237 	/*
2304*5367Sahrens 	 * If properties are supplied, they are to completely replace
2305*5367Sahrens 	 * the existing ones; "inherit" any existing properties.
23065326Sek110237 	 */
2307*5367Sahrens 	if (props) {
2308*5367Sahrens 		objset_t *os;
2309*5367Sahrens 		nvlist_t *nv = NULL;
2310*5367Sahrens 
2311*5367Sahrens 		error = dmu_objset_open(tofs, DMU_OST_ANY,
2312*5367Sahrens 		    DS_MODE_STANDARD | DS_MODE_READONLY | DS_MODE_INCONSISTENT,
2313*5367Sahrens 		    &os);
2314*5367Sahrens 		if (error == 0) {
2315*5367Sahrens 			error = dsl_prop_get_all(os, &nv);
2316*5367Sahrens 			dmu_objset_close(os);
2317*5367Sahrens 		}
2318*5367Sahrens 		if (error == 0) {
2319*5367Sahrens 			nvpair_t *elem;
2320*5367Sahrens 			zfs_cmd_t zc2 = { 0 };
2321*5367Sahrens 
2322*5367Sahrens 			(void) strcpy(zc2.zc_name, tofs);
2323*5367Sahrens 			for (elem = nvlist_next_nvpair(nv, NULL); elem;
2324*5367Sahrens 			    elem = nvlist_next_nvpair(nv, elem)) {
2325*5367Sahrens 				(void) strcpy(zc2.zc_value, nvpair_name(elem));
2326*5367Sahrens 				if (zfs_secpolicy_inherit(&zc2, CRED()) == 0)
2327*5367Sahrens 					(void) zfs_ioc_inherit_prop(&zc2);
23285326Sek110237 			}
23295326Sek110237 		}
2330*5367Sahrens 		if (nv)
2331*5367Sahrens 			nvlist_free(nv);
2332*5367Sahrens 	}
2333*5367Sahrens 
2334*5367Sahrens 	/*
2335*5367Sahrens 	 * Set properties.  Note, we ignore errors.  Would be better to
2336*5367Sahrens 	 * do best-effort in zfs_set_prop_nvlist, too.
2337*5367Sahrens 	 */
2338*5367Sahrens 	(void) zfs_set_prop_nvlist(tofs, props);
2339*5367Sahrens 	nvlist_free(props);
2340*5367Sahrens 
2341*5367Sahrens 	off = fp->f_offset;
2342*5367Sahrens 	error = dmu_recv_stream(&drc, fp->f_vnode, &off);
2343*5367Sahrens 
2344*5367Sahrens 	if (error == 0) {
2345*5367Sahrens 		if (zfsvfs != NULL) {
2346*5367Sahrens 			char osname[MAXNAMELEN];
2347*5367Sahrens 			int mode;
2348*5367Sahrens 
2349*5367Sahrens 			(void) zfs_suspend_fs(zfsvfs, osname, &mode);
2350*5367Sahrens 			error = dmu_recv_end(&drc);
2351*5367Sahrens 			error |= zfs_resume_fs(zfsvfs, osname, mode);
2352*5367Sahrens 		} else {
2353*5367Sahrens 			error = dmu_recv_end(&drc);
2354*5367Sahrens 		}
23555326Sek110237 	}
23565326Sek110237 	if (zfsvfs != NULL)
23575326Sek110237 		VFS_RELE(zfsvfs->z_vfs);
2358*5367Sahrens 
2359*5367Sahrens 	zc->zc_cookie = off - fp->f_offset;
2360*5367Sahrens 	if (VOP_SEEK(fp->f_vnode, fp->f_offset, &off, NULL) == 0)
2361*5367Sahrens 		fp->f_offset = off;
23622885Sahrens 
2363789Sahrens 	releasef(fd);
2364789Sahrens 	return (error);
2365789Sahrens }
2366789Sahrens 
2367*5367Sahrens /*
2368*5367Sahrens  * inputs:
2369*5367Sahrens  * zc_name	name of snapshot to send
2370*5367Sahrens  * zc_value	short name of incremental fromsnap (may be empty)
2371*5367Sahrens  * zc_cookie	file descriptor to send stream to
2372*5367Sahrens  * zc_obj	fromorigin flag (mutually exclusive with zc_value)
2373*5367Sahrens  *
2374*5367Sahrens  * outputs: none
2375*5367Sahrens  */
2376789Sahrens static int
2377*5367Sahrens zfs_ioc_send(zfs_cmd_t *zc)
2378789Sahrens {
2379789Sahrens 	objset_t *fromsnap = NULL;
2380789Sahrens 	objset_t *tosnap;
2381789Sahrens 	file_t *fp;
2382789Sahrens 	int error;
2383*5367Sahrens 	offset_t off;
2384789Sahrens 
2385789Sahrens 	error = dmu_objset_open(zc->zc_name, DMU_OST_ANY,
2386789Sahrens 	    DS_MODE_STANDARD | DS_MODE_READONLY, &tosnap);
2387789Sahrens 	if (error)
2388789Sahrens 		return (error);
2389789Sahrens 
23902676Seschrock 	if (zc->zc_value[0] != '\0') {
23912885Sahrens 		char buf[MAXPATHLEN];
23922885Sahrens 		char *cp;
23932885Sahrens 
23942885Sahrens 		(void) strncpy(buf, zc->zc_name, sizeof (buf));
23952885Sahrens 		cp = strchr(buf, '@');
23962885Sahrens 		if (cp)
23972885Sahrens 			*(cp+1) = 0;
23982885Sahrens 		(void) strncat(buf, zc->zc_value, sizeof (buf));
23992885Sahrens 		error = dmu_objset_open(buf, DMU_OST_ANY,
2400789Sahrens 		    DS_MODE_STANDARD | DS_MODE_READONLY, &fromsnap);
2401789Sahrens 		if (error) {
2402789Sahrens 			dmu_objset_close(tosnap);
2403789Sahrens 			return (error);
2404789Sahrens 		}
2405789Sahrens 	}
2406789Sahrens 
2407789Sahrens 	fp = getf(zc->zc_cookie);
2408789Sahrens 	if (fp == NULL) {
2409789Sahrens 		dmu_objset_close(tosnap);
2410789Sahrens 		if (fromsnap)
2411789Sahrens 			dmu_objset_close(fromsnap);
2412789Sahrens 		return (EBADF);
2413789Sahrens 	}
2414789Sahrens 
2415*5367Sahrens 	off = fp->f_offset;
2416*5367Sahrens 	error = dmu_sendbackup(tosnap, fromsnap, zc->zc_obj, fp->f_vnode, &off);
2417*5367Sahrens 
2418*5367Sahrens 	if (VOP_SEEK(fp->f_vnode, fp->f_offset, &off, NULL) == 0)
2419*5367Sahrens 		fp->f_offset = off;
2420789Sahrens 	releasef(zc->zc_cookie);
2421789Sahrens 	if (fromsnap)
2422789Sahrens 		dmu_objset_close(fromsnap);
2423789Sahrens 	dmu_objset_close(tosnap);
2424789Sahrens 	return (error);
2425789Sahrens }
2426789Sahrens 
24271544Seschrock static int
24281544Seschrock zfs_ioc_inject_fault(zfs_cmd_t *zc)
24291544Seschrock {
24301544Seschrock 	int id, error;
24311544Seschrock 
24321544Seschrock 	error = zio_inject_fault(zc->zc_name, (int)zc->zc_guid, &id,
24331544Seschrock 	    &zc->zc_inject_record);
24341544Seschrock 
24351544Seschrock 	if (error == 0)
24361544Seschrock 		zc->zc_guid = (uint64_t)id;
24371544Seschrock 
24381544Seschrock 	return (error);
24391544Seschrock }
24401544Seschrock 
24411544Seschrock static int
24421544Seschrock zfs_ioc_clear_fault(zfs_cmd_t *zc)
24431544Seschrock {
24441544Seschrock 	return (zio_clear_fault((int)zc->zc_guid));
24451544Seschrock }
24461544Seschrock 
24471544Seschrock static int
24481544Seschrock zfs_ioc_inject_list_next(zfs_cmd_t *zc)
24491544Seschrock {
24501544Seschrock 	int id = (int)zc->zc_guid;
24511544Seschrock 	int error;
24521544Seschrock 
24531544Seschrock 	error = zio_inject_list_next(&id, zc->zc_name, sizeof (zc->zc_name),
24541544Seschrock 	    &zc->zc_inject_record);
24551544Seschrock 
24561544Seschrock 	zc->zc_guid = id;
24571544Seschrock 
24581544Seschrock 	return (error);
24591544Seschrock }
24601544Seschrock 
24611544Seschrock static int
24621544Seschrock zfs_ioc_error_log(zfs_cmd_t *zc)
24631544Seschrock {
24641544Seschrock 	spa_t *spa;
24651544Seschrock 	int error;
24662676Seschrock 	size_t count = (size_t)zc->zc_nvlist_dst_size;
24671544Seschrock 
24681544Seschrock 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
24691544Seschrock 		return (error);
24701544Seschrock 
24712676Seschrock 	error = spa_get_errlog(spa, (void *)(uintptr_t)zc->zc_nvlist_dst,
24721544Seschrock 	    &count);
24731544Seschrock 	if (error == 0)
24742676Seschrock 		zc->zc_nvlist_dst_size = count;
24751544Seschrock 	else
24762676Seschrock 		zc->zc_nvlist_dst_size = spa_get_errlog_size(spa);
24771544Seschrock 
24781544Seschrock 	spa_close(spa, FTAG);
24791544Seschrock 
24801544Seschrock 	return (error);
24811544Seschrock }
24821544Seschrock 
24831544Seschrock static int
24841544Seschrock zfs_ioc_clear(zfs_cmd_t *zc)
24851544Seschrock {
24861544Seschrock 	spa_t *spa;
24871544Seschrock 	vdev_t *vd;
24884808Sek110237 	uint64_t txg;
24891544Seschrock 	int error;
24901544Seschrock 
24911544Seschrock 	if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0)
24921544Seschrock 		return (error);
24931544Seschrock 
24945329Sgw25295 	/*
24955329Sgw25295 	 * Try to resume any I/Os which may have been suspended
24965329Sgw25295 	 * as a result of a complete pool failure.
24975329Sgw25295 	 */
24985329Sgw25295 	if (!list_is_empty(&spa->spa_zio_list)) {
24995329Sgw25295 		if (zio_vdev_resume_io(spa) != 0) {
25005329Sgw25295 			spa_close(spa, FTAG);
25015329Sgw25295 			return (EIO);
25025329Sgw25295 		}
25035329Sgw25295 	}
25045329Sgw25295 
25054451Seschrock 	txg = spa_vdev_enter(spa);
25061544Seschrock 
25072676Seschrock 	if (zc->zc_guid == 0) {
25081544Seschrock 		vd = NULL;
25092676Seschrock 	} else if ((vd = spa_lookup_by_guid(spa, zc->zc_guid)) == NULL) {
25104451Seschrock 		(void) spa_vdev_exit(spa, NULL, txg, ENODEV);
25111544Seschrock 		spa_close(spa, FTAG);
25121544Seschrock 		return (ENODEV);
25131544Seschrock 	}
25141544Seschrock 
25155329Sgw25295 	vdev_clear(spa, vd, B_TRUE);
25161544Seschrock 
25174451Seschrock 	(void) spa_vdev_exit(spa, NULL, txg, 0);
25181544Seschrock 
25191544Seschrock 	spa_close(spa, FTAG);
25201544Seschrock 
25211544Seschrock 	return (0);
25221544Seschrock }
25231544Seschrock 
2524*5367Sahrens /*
2525*5367Sahrens  * inputs:
2526*5367Sahrens  * zc_name	name of filesystem
2527*5367Sahrens  * zc_value	name of origin snapshot
2528*5367Sahrens  *
2529*5367Sahrens  * outputs:	none
2530*5367Sahrens  */
25311544Seschrock static int
25322082Seschrock zfs_ioc_promote(zfs_cmd_t *zc)
25332082Seschrock {
25342417Sahrens 	char *cp;
25352417Sahrens 
25362417Sahrens 	/*
25372417Sahrens 	 * We don't need to unmount *all* the origin fs's snapshots, but
25382417Sahrens 	 * it's easier.
25392417Sahrens 	 */
25402676Seschrock 	cp = strchr(zc->zc_value, '@');
25412417Sahrens 	if (cp)
25422417Sahrens 		*cp = '\0';
25432676Seschrock 	(void) dmu_objset_find(zc->zc_value,
25442417Sahrens 	    zfs_unmount_snap, NULL, DS_FIND_SNAPSHOTS);
25452082Seschrock 	return (dsl_dataset_promote(zc->zc_name));
25462082Seschrock }
25472082Seschrock 
25484543Smarks /*
25494543Smarks  * We don't want to have a hard dependency
25504543Smarks  * against some special symbols in sharefs
25515331Samw  * nfs, and smbsrv.  Determine them if needed when
25524543Smarks  * the first file system is shared.
25535331Samw  * Neither sharefs, nfs or smbsrv are unloadable modules.
25544543Smarks  */
25555331Samw int (*znfsexport_fs)(void *arg);
25564543Smarks int (*zshare_fs)(enum sharefs_sys_op, share_t *, uint32_t);
25575331Samw int (*zsmbexport_fs)(void *arg, boolean_t add_share);
25585331Samw 
25595331Samw int zfs_nfsshare_inited;
25605331Samw int zfs_smbshare_inited;
25615331Samw 
25624543Smarks ddi_modhandle_t nfs_mod;
25634543Smarks ddi_modhandle_t sharefs_mod;
25645331Samw ddi_modhandle_t smbsrv_mod;
25654543Smarks kmutex_t zfs_share_lock;
25664543Smarks 
25674543Smarks static int
25685331Samw zfs_init_sharefs()
25695331Samw {
25705331Samw 	int error;
25715331Samw 
25725331Samw 	ASSERT(MUTEX_HELD(&zfs_share_lock));
25735331Samw 	/* Both NFS and SMB shares also require sharetab support. */
25745331Samw 	if (sharefs_mod == NULL && ((sharefs_mod =
25755331Samw 	    ddi_modopen("fs/sharefs",
25765331Samw 	    KRTLD_MODE_FIRST, &error)) == NULL)) {
25775331Samw 		return (ENOSYS);
25785331Samw 	}
25795331Samw 	if (zshare_fs == NULL && ((zshare_fs =
25805331Samw 	    (int (*)(enum sharefs_sys_op, share_t *, uint32_t))
25815331Samw 	    ddi_modsym(sharefs_mod, "sharefs_impl", &error)) == NULL)) {
25825331Samw 		return (ENOSYS);
25835331Samw 	}
25845331Samw 	return (0);
25855331Samw }
25865331Samw 
25875331Samw static int
25884543Smarks zfs_ioc_share(zfs_cmd_t *zc)
25894543Smarks {
25904543Smarks 	int error;
25914543Smarks 	int opcode;
25924543Smarks 
25935331Samw 	switch (zc->zc_share.z_sharetype) {
25945331Samw 	case ZFS_SHARE_NFS:
25955331Samw 	case ZFS_UNSHARE_NFS:
25965331Samw 		if (zfs_nfsshare_inited == 0) {
25975331Samw 			mutex_enter(&zfs_share_lock);
25985331Samw 			if (nfs_mod == NULL && ((nfs_mod = ddi_modopen("fs/nfs",
25995331Samw 			    KRTLD_MODE_FIRST, &error)) == NULL)) {
26005331Samw 				mutex_exit(&zfs_share_lock);
26015331Samw 				return (ENOSYS);
26025331Samw 			}
26035331Samw 			if (znfsexport_fs == NULL &&
26045331Samw 			    ((znfsexport_fs = (int (*)(void *))
26055331Samw 			    ddi_modsym(nfs_mod,
26065331Samw 			    "nfs_export", &error)) == NULL)) {
26075331Samw 				mutex_exit(&zfs_share_lock);
26085331Samw 				return (ENOSYS);
26095331Samw 			}
26105331Samw 			error = zfs_init_sharefs();
26115331Samw 			if (error) {
26125331Samw 				mutex_exit(&zfs_share_lock);
26135331Samw 				return (ENOSYS);
26145331Samw 			}
26155331Samw 			zfs_nfsshare_inited = 1;
26164543Smarks 			mutex_exit(&zfs_share_lock);
26174543Smarks 		}
26185331Samw 		break;
26195331Samw 	case ZFS_SHARE_SMB:
26205331Samw 	case ZFS_UNSHARE_SMB:
26215331Samw 		if (zfs_smbshare_inited == 0) {
26225331Samw 			mutex_enter(&zfs_share_lock);
26235331Samw 			if (smbsrv_mod == NULL && ((smbsrv_mod =
26245331Samw 			    ddi_modopen("drv/smbsrv",
26255331Samw 			    KRTLD_MODE_FIRST, &error)) == NULL)) {
26265331Samw 				mutex_exit(&zfs_share_lock);
26275331Samw 				return (ENOSYS);
26285331Samw 			}
26295331Samw 			if (zsmbexport_fs == NULL && ((zsmbexport_fs =
26305331Samw 			    (int (*)(void *, boolean_t))ddi_modsym(smbsrv_mod,
26315331Samw 			    "lmshrd_share_upcall", &error)) == NULL)) {
26325331Samw 				mutex_exit(&zfs_share_lock);
26335331Samw 				return (ENOSYS);
26345331Samw 			}
26355331Samw 			error = zfs_init_sharefs();
26365331Samw 			if (error) {
26375331Samw 				mutex_exit(&zfs_share_lock);
26385331Samw 				return (ENOSYS);
26395331Samw 			}
26405331Samw 			zfs_smbshare_inited = 1;
26414543Smarks 			mutex_exit(&zfs_share_lock);
26424543Smarks 		}
26435331Samw 		break;
26445331Samw 	default:
26455331Samw 		return (EINVAL);
26464543Smarks 	}
26474543Smarks 
26485331Samw 	switch (zc->zc_share.z_sharetype) {
26495331Samw 	case ZFS_SHARE_NFS:
26505331Samw 	case ZFS_UNSHARE_NFS:
26515331Samw 		if (error =
26525331Samw 		    znfsexport_fs((void *)
26535331Samw 		    (uintptr_t)zc->zc_share.z_exportdata))
26545331Samw 			return (error);
26555331Samw 		break;
26565331Samw 	case ZFS_SHARE_SMB:
26575331Samw 	case ZFS_UNSHARE_SMB:
26585331Samw 		if (error = zsmbexport_fs((void *)
26595331Samw 		    (uintptr_t)zc->zc_share.z_exportdata,
26605331Samw 		    zc->zc_share.z_sharetype == ZFS_SHARE_SMB ?
26615331Samw 		    B_TRUE : B_FALSE)) {
26625331Samw 			return (error);
26635331Samw 		}
26645331Samw 		break;
26655331Samw 	}
26665331Samw 
26675331Samw 	opcode = (zc->zc_share.z_sharetype == ZFS_SHARE_NFS ||
26685331Samw 	    zc->zc_share.z_sharetype == ZFS_SHARE_SMB) ?
26694543Smarks 	    SHAREFS_ADD : SHAREFS_REMOVE;
26704543Smarks 
26715331Samw 	/*
26725331Samw 	 * Add or remove share from sharetab
26735331Samw 	 */
26744543Smarks 	error = zshare_fs(opcode,
26754543Smarks 	    (void *)(uintptr_t)zc->zc_share.z_sharedata,
26764543Smarks 	    zc->zc_share.z_sharemax);
26774543Smarks 
26784543Smarks 	return (error);
26794543Smarks 
26804543Smarks }
26814543Smarks 
26824543Smarks /*
26834988Sek110237  * pool create, destroy, and export don't log the history as part of
26844988Sek110237  * zfsdev_ioctl, but rather zfs_ioc_pool_create, and zfs_ioc_pool_export
26854988Sek110237  * do the logging of those commands.
26864543Smarks  */
2687789Sahrens static zfs_ioc_vec_t zfs_ioc_vec[] = {
26884715Sek110237 	{ zfs_ioc_pool_create, zfs_secpolicy_config, POOL_NAME, B_FALSE },
26894577Sahrens 	{ zfs_ioc_pool_destroy,	zfs_secpolicy_config, POOL_NAME, B_FALSE },
26904577Sahrens 	{ zfs_ioc_pool_import, zfs_secpolicy_config, POOL_NAME, B_TRUE },
26914577Sahrens 	{ zfs_ioc_pool_export, zfs_secpolicy_config, POOL_NAME, B_FALSE },
26924577Sahrens 	{ zfs_ioc_pool_configs,	zfs_secpolicy_none, NO_NAME, B_FALSE },
26934577Sahrens 	{ zfs_ioc_pool_stats, zfs_secpolicy_read, POOL_NAME, B_FALSE },
26944577Sahrens 	{ zfs_ioc_pool_tryimport, zfs_secpolicy_config, NO_NAME, B_FALSE },
26954577Sahrens 	{ zfs_ioc_pool_scrub, zfs_secpolicy_config, POOL_NAME, B_TRUE },
26964577Sahrens 	{ zfs_ioc_pool_freeze, zfs_secpolicy_config, NO_NAME, B_FALSE },
26974577Sahrens 	{ zfs_ioc_pool_upgrade,	zfs_secpolicy_config, POOL_NAME, B_TRUE },
26984577Sahrens 	{ zfs_ioc_pool_get_history, zfs_secpolicy_config, POOL_NAME, B_FALSE },
26994577Sahrens 	{ zfs_ioc_vdev_add, zfs_secpolicy_config, POOL_NAME, B_TRUE },
27004577Sahrens 	{ zfs_ioc_vdev_remove, zfs_secpolicy_config, POOL_NAME, B_TRUE },
27014577Sahrens 	{ zfs_ioc_vdev_set_state, zfs_secpolicy_config,	POOL_NAME, B_TRUE },
27024577Sahrens 	{ zfs_ioc_vdev_attach, zfs_secpolicy_config, POOL_NAME, B_TRUE },
27034577Sahrens 	{ zfs_ioc_vdev_detach, zfs_secpolicy_config, POOL_NAME, B_TRUE },
27044577Sahrens 	{ zfs_ioc_vdev_setpath,	zfs_secpolicy_config, POOL_NAME, B_FALSE },
27054577Sahrens 	{ zfs_ioc_objset_stats,	zfs_secpolicy_read, DATASET_NAME, B_FALSE },
27065147Srm160521 	{ zfs_ioc_objset_version, zfs_secpolicy_read, DATASET_NAME, B_FALSE },
27074543Smarks 	{ zfs_ioc_dataset_list_next, zfs_secpolicy_read,
27084577Sahrens 	    DATASET_NAME, B_FALSE },
27094543Smarks 	{ zfs_ioc_snapshot_list_next, zfs_secpolicy_read,
27104577Sahrens 	    DATASET_NAME, B_FALSE },
27114577Sahrens 	{ zfs_ioc_set_prop, zfs_secpolicy_none, DATASET_NAME, B_TRUE },
27124577Sahrens 	{ zfs_ioc_create_minor,	zfs_secpolicy_minor, DATASET_NAME, B_FALSE },
27134577Sahrens 	{ zfs_ioc_remove_minor,	zfs_secpolicy_minor, DATASET_NAME, B_FALSE },
27144577Sahrens 	{ zfs_ioc_create, zfs_secpolicy_create, DATASET_NAME, B_TRUE },
27154577Sahrens 	{ zfs_ioc_destroy, zfs_secpolicy_destroy, DATASET_NAME, B_TRUE },
27164577Sahrens 	{ zfs_ioc_rollback, zfs_secpolicy_rollback, DATASET_NAME, B_TRUE },
27174577Sahrens 	{ zfs_ioc_rename, zfs_secpolicy_rename,	DATASET_NAME, B_TRUE },
2718*5367Sahrens 	{ zfs_ioc_recv, zfs_secpolicy_receive, DATASET_NAME, B_TRUE },
2719*5367Sahrens 	{ zfs_ioc_send, zfs_secpolicy_send, DATASET_NAME, B_TRUE },
27204577Sahrens 	{ zfs_ioc_inject_fault,	zfs_secpolicy_inject, NO_NAME, B_FALSE },
27214577Sahrens 	{ zfs_ioc_clear_fault, zfs_secpolicy_inject, NO_NAME, B_FALSE },
27224577Sahrens 	{ zfs_ioc_inject_list_next, zfs_secpolicy_inject, NO_NAME, B_FALSE },
27234577Sahrens 	{ zfs_ioc_error_log, zfs_secpolicy_inject, POOL_NAME, B_FALSE },
27244577Sahrens 	{ zfs_ioc_clear, zfs_secpolicy_config, POOL_NAME, B_TRUE },
27254577Sahrens 	{ zfs_ioc_promote, zfs_secpolicy_promote, DATASET_NAME, B_TRUE },
27264577Sahrens 	{ zfs_ioc_destroy_snaps, zfs_secpolicy_destroy,	DATASET_NAME, B_TRUE },
27274577Sahrens 	{ zfs_ioc_snapshot, zfs_secpolicy_snapshot, DATASET_NAME, B_TRUE },
27284577Sahrens 	{ zfs_ioc_dsobj_to_dsname, zfs_secpolicy_config, POOL_NAME, B_FALSE },
27294577Sahrens 	{ zfs_ioc_obj_to_path, zfs_secpolicy_config, NO_NAME, B_FALSE },
27304577Sahrens 	{ zfs_ioc_pool_set_props, zfs_secpolicy_config,	POOL_NAME, B_TRUE },
27314577Sahrens 	{ zfs_ioc_pool_get_props, zfs_secpolicy_read, POOL_NAME, B_FALSE },
27324577Sahrens 	{ zfs_ioc_set_fsacl, zfs_secpolicy_fsacl, DATASET_NAME, B_TRUE },
27334577Sahrens 	{ zfs_ioc_get_fsacl, zfs_secpolicy_read, DATASET_NAME, B_FALSE },
27344543Smarks 	{ zfs_ioc_iscsi_perm_check, zfs_secpolicy_iscsi,
27354577Sahrens 	    DATASET_NAME, B_FALSE },
27364849Sahrens 	{ zfs_ioc_share, zfs_secpolicy_share, DATASET_NAME, B_FALSE },
27374849Sahrens 	{ zfs_ioc_inherit_prop, zfs_secpolicy_inherit, DATASET_NAME, B_TRUE },
2738789Sahrens };
2739789Sahrens 
2740789Sahrens static int
2741789Sahrens zfsdev_ioctl(dev_t dev, int cmd, intptr_t arg, int flag, cred_t *cr, int *rvalp)
2742789Sahrens {
2743789Sahrens 	zfs_cmd_t *zc;
2744789Sahrens 	uint_t vec;
27452199Sahrens 	int error, rc;
2746789Sahrens 
2747789Sahrens 	if (getminor(dev) != 0)
2748789Sahrens 		return (zvol_ioctl(dev, cmd, arg, flag, cr, rvalp));
2749789Sahrens 
2750789Sahrens 	vec = cmd - ZFS_IOC;
27514787Sahrens 	ASSERT3U(getmajor(dev), ==, ddi_driver_major(zfs_dip));
2752789Sahrens 
2753789Sahrens 	if (vec >= sizeof (zfs_ioc_vec) / sizeof (zfs_ioc_vec[0]))
2754789Sahrens 		return (EINVAL);
2755789Sahrens 
2756789Sahrens 	zc = kmem_zalloc(sizeof (zfs_cmd_t), KM_SLEEP);
2757789Sahrens 
2758789Sahrens 	error = xcopyin((void *)arg, zc, sizeof (zfs_cmd_t));
2759789Sahrens 
27604787Sahrens 	if (error == 0)
27614543Smarks 		error = zfs_ioc_vec[vec].zvec_secpolicy(zc, cr);
2762789Sahrens 
2763789Sahrens 	/*
2764789Sahrens 	 * Ensure that all pool/dataset names are valid before we pass down to
2765789Sahrens 	 * the lower layers.
2766789Sahrens 	 */
2767789Sahrens 	if (error == 0) {
2768789Sahrens 		zc->zc_name[sizeof (zc->zc_name) - 1] = '\0';
2769789Sahrens 		switch (zfs_ioc_vec[vec].zvec_namecheck) {
27704577Sahrens 		case POOL_NAME:
2771789Sahrens 			if (pool_namecheck(zc->zc_name, NULL, NULL) != 0)
2772789Sahrens 				error = EINVAL;
2773789Sahrens 			break;
2774789Sahrens 
27754577Sahrens 		case DATASET_NAME:
2776789Sahrens 			if (dataset_namecheck(zc->zc_name, NULL, NULL) != 0)
2777789Sahrens 				error = EINVAL;
2778789Sahrens 			break;
27792856Snd150628 
27804577Sahrens 		case NO_NAME:
27812856Snd150628 			break;
2782789Sahrens 		}
2783789Sahrens 	}
2784789Sahrens 
2785789Sahrens 	if (error == 0)
2786789Sahrens 		error = zfs_ioc_vec[vec].zvec_func(zc);
2787789Sahrens 
27882199Sahrens 	rc = xcopyout(zc, (void *)arg, sizeof (zfs_cmd_t));
27894543Smarks 	if (error == 0) {
27902199Sahrens 		error = rc;
27914543Smarks 		if (zfs_ioc_vec[vec].zvec_his_log == B_TRUE)
27924543Smarks 			zfs_log_history(zc);
27934543Smarks 	}
2794789Sahrens 
2795789Sahrens 	kmem_free(zc, sizeof (zfs_cmd_t));
2796789Sahrens 	return (error);
2797789Sahrens }
2798789Sahrens 
2799789Sahrens static int
2800789Sahrens zfs_attach(dev_info_t *dip, ddi_attach_cmd_t cmd)
2801789Sahrens {
2802789Sahrens 	if (cmd != DDI_ATTACH)
2803789Sahrens 		return (DDI_FAILURE);
2804789Sahrens 
2805789Sahrens 	if (ddi_create_minor_node(dip, "zfs", S_IFCHR, 0,
2806789Sahrens 	    DDI_PSEUDO, 0) == DDI_FAILURE)
2807789Sahrens 		return (DDI_FAILURE);
2808789Sahrens 
2809789Sahrens 	zfs_dip = dip;
2810789Sahrens 
2811789Sahrens 	ddi_report_dev(dip);
2812789Sahrens 
2813789Sahrens 	return (DDI_SUCCESS);
2814789Sahrens }
2815789Sahrens 
2816789Sahrens static int
2817789Sahrens zfs_detach(dev_info_t *dip, ddi_detach_cmd_t cmd)
2818789Sahrens {
2819789Sahrens 	if (spa_busy() || zfs_busy() || zvol_busy())
2820789Sahrens 		return (DDI_FAILURE);
2821789Sahrens 
2822789Sahrens 	if (cmd != DDI_DETACH)
2823789Sahrens 		return (DDI_FAILURE);
2824789Sahrens 
2825789Sahrens 	zfs_dip = NULL;
2826789Sahrens 
2827789Sahrens 	ddi_prop_remove_all(dip);
2828789Sahrens 	ddi_remove_minor_node(dip, NULL);
2829789Sahrens 
2830789Sahrens 	return (DDI_SUCCESS);
2831789Sahrens }
2832789Sahrens 
2833789Sahrens /*ARGSUSED*/
2834789Sahrens static int
2835789Sahrens zfs_info(dev_info_t *dip, ddi_info_cmd_t infocmd, void *arg, void **result)
2836789Sahrens {
2837789Sahrens 	switch (infocmd) {
2838789Sahrens 	case DDI_INFO_DEVT2DEVINFO:
2839789Sahrens 		*result = zfs_dip;
2840789Sahrens 		return (DDI_SUCCESS);
2841789Sahrens 
2842789Sahrens 	case DDI_INFO_DEVT2INSTANCE:
2843849Sbonwick 		*result = (void *)0;
2844789Sahrens 		return (DDI_SUCCESS);
2845789Sahrens 	}
2846789Sahrens 
2847789Sahrens 	return (DDI_FAILURE);
2848789Sahrens }
2849789Sahrens 
2850789Sahrens /*
2851789Sahrens  * OK, so this is a little weird.
2852789Sahrens  *
2853789Sahrens  * /dev/zfs is the control node, i.e. minor 0.
2854789Sahrens  * /dev/zvol/[r]dsk/pool/dataset are the zvols, minor > 0.
2855789Sahrens  *
2856789Sahrens  * /dev/zfs has basically nothing to do except serve up ioctls,
2857789Sahrens  * so most of the standard driver entry points are in zvol.c.
2858789Sahrens  */
2859789Sahrens static struct cb_ops zfs_cb_ops = {
2860789Sahrens 	zvol_open,	/* open */
2861789Sahrens 	zvol_close,	/* close */
2862789Sahrens 	zvol_strategy,	/* strategy */
2863789Sahrens 	nodev,		/* print */
2864789Sahrens 	nodev,		/* dump */
2865789Sahrens 	zvol_read,	/* read */
2866789Sahrens 	zvol_write,	/* write */
2867789Sahrens 	zfsdev_ioctl,	/* ioctl */
2868789Sahrens 	nodev,		/* devmap */
2869789Sahrens 	nodev,		/* mmap */
2870789Sahrens 	nodev,		/* segmap */
2871789Sahrens 	nochpoll,	/* poll */
2872789Sahrens 	ddi_prop_op,	/* prop_op */
2873789Sahrens 	NULL,		/* streamtab */
2874789Sahrens 	D_NEW | D_MP | D_64BIT,		/* Driver compatibility flag */
2875789Sahrens 	CB_REV,		/* version */
28763638Sbillm 	nodev,		/* async read */
28773638Sbillm 	nodev,		/* async write */
2878789Sahrens };
2879789Sahrens 
2880789Sahrens static struct dev_ops zfs_dev_ops = {
2881789Sahrens 	DEVO_REV,	/* version */
2882789Sahrens 	0,		/* refcnt */
2883789Sahrens 	zfs_info,	/* info */
2884789Sahrens 	nulldev,	/* identify */
2885789Sahrens 	nulldev,	/* probe */
2886789Sahrens 	zfs_attach,	/* attach */
2887789Sahrens 	zfs_detach,	/* detach */
2888789Sahrens 	nodev,		/* reset */
2889789Sahrens 	&zfs_cb_ops,	/* driver operations */
2890789Sahrens 	NULL		/* no bus operations */
2891789Sahrens };
2892789Sahrens 
2893789Sahrens static struct modldrv zfs_modldrv = {
28944577Sahrens 	&mod_driverops, "ZFS storage pool version " SPA_VERSION_STRING,
28952676Seschrock 	    &zfs_dev_ops
2896789Sahrens };
2897789Sahrens 
2898789Sahrens static struct modlinkage modlinkage = {
2899789Sahrens 	MODREV_1,
2900789Sahrens 	(void *)&zfs_modlfs,
2901789Sahrens 	(void *)&zfs_modldrv,
2902789Sahrens 	NULL
2903789Sahrens };
2904789Sahrens 
29054720Sfr157268 
29064720Sfr157268 uint_t zfs_fsyncer_key;
29075326Sek110237 extern uint_t rrw_tsd_key;
29084720Sfr157268 
2909789Sahrens int
2910789Sahrens _init(void)
2911789Sahrens {
2912789Sahrens 	int error;
2913789Sahrens 
2914849Sbonwick 	spa_init(FREAD | FWRITE);
2915849Sbonwick 	zfs_init();
2916849Sbonwick 	zvol_init();
2917849Sbonwick 
2918849Sbonwick 	if ((error = mod_install(&modlinkage)) != 0) {
2919849Sbonwick 		zvol_fini();
2920849Sbonwick 		zfs_fini();
2921849Sbonwick 		spa_fini();
2922789Sahrens 		return (error);
2923849Sbonwick 	}
2924789Sahrens 
29254720Sfr157268 	tsd_create(&zfs_fsyncer_key, NULL);
29265326Sek110237 	tsd_create(&rrw_tsd_key, NULL);
29274720Sfr157268 
2928789Sahrens 	error = ldi_ident_from_mod(&modlinkage, &zfs_li);
2929789Sahrens 	ASSERT(error == 0);
29304543Smarks 	mutex_init(&zfs_share_lock, NULL, MUTEX_DEFAULT, NULL);
2931789Sahrens 
2932789Sahrens 	return (0);
2933789Sahrens }
2934789Sahrens 
2935789Sahrens int
2936789Sahrens _fini(void)
2937789Sahrens {
2938789Sahrens 	int error;
2939789Sahrens 
29401544Seschrock 	if (spa_busy() || zfs_busy() || zvol_busy() || zio_injection_enabled)
2941789Sahrens 		return (EBUSY);
2942789Sahrens 
2943789Sahrens 	if ((error = mod_remove(&modlinkage)) != 0)
2944789Sahrens 		return (error);
2945789Sahrens 
2946789Sahrens 	zvol_fini();
2947789Sahrens 	zfs_fini();
2948789Sahrens 	spa_fini();
29495331Samw 	if (zfs_nfsshare_inited)
29504543Smarks 		(void) ddi_modclose(nfs_mod);
29515331Samw 	if (zfs_smbshare_inited)
29525331Samw 		(void) ddi_modclose(smbsrv_mod);
29535331Samw 	if (zfs_nfsshare_inited || zfs_smbshare_inited)
29544543Smarks 		(void) ddi_modclose(sharefs_mod);
2955789Sahrens 
29564720Sfr157268 	tsd_destroy(&zfs_fsyncer_key);
2957789Sahrens 	ldi_ident_release(zfs_li);
2958789Sahrens 	zfs_li = NULL;
29594543Smarks 	mutex_destroy(&zfs_share_lock);
2960789Sahrens 
2961789Sahrens 	return (error);
2962789Sahrens }
2963789Sahrens 
2964789Sahrens int
2965789Sahrens _info(struct modinfo *modinfop)
2966789Sahrens {
2967789Sahrens 	return (mod_info(&modlinkage, modinfop));
2968789Sahrens }
2969