1789Sahrens /* 2789Sahrens * CDDL HEADER START 3789Sahrens * 4789Sahrens * The contents of this file are subject to the terms of the 51485Slling * Common Development and Distribution License (the "License"). 61485Slling * You may not use this file except in compliance with the License. 7789Sahrens * 8789Sahrens * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9789Sahrens * or http://www.opensolaris.org/os/licensing. 10789Sahrens * See the License for the specific language governing permissions 11789Sahrens * and limitations under the License. 12789Sahrens * 13789Sahrens * When distributing Covered Code, include this CDDL HEADER in each 14789Sahrens * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15789Sahrens * If applicable, add the following below this CDDL HEADER, with the 16789Sahrens * fields enclosed by brackets "[]" replaced with your own identifying 17789Sahrens * information: Portions Copyright [yyyy] [name of copyright owner] 18789Sahrens * 19789Sahrens * CDDL HEADER END 20789Sahrens */ 21789Sahrens /* 223444Sek110237 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 23789Sahrens * Use is subject to license terms. 24789Sahrens */ 25789Sahrens 26789Sahrens #pragma ident "%Z%%M% %I% %E% SMI" 27789Sahrens 28789Sahrens #include <sys/types.h> 29789Sahrens #include <sys/param.h> 30789Sahrens #include <sys/errno.h> 31789Sahrens #include <sys/uio.h> 32789Sahrens #include <sys/buf.h> 33789Sahrens #include <sys/modctl.h> 34789Sahrens #include <sys/open.h> 35789Sahrens #include <sys/file.h> 36789Sahrens #include <sys/kmem.h> 37789Sahrens #include <sys/conf.h> 38789Sahrens #include <sys/cmn_err.h> 39789Sahrens #include <sys/stat.h> 40789Sahrens #include <sys/zfs_ioctl.h> 415331Samw #include <sys/zfs_i18n.h> 425331Samw #include <sys/zfs_znode.h> 43789Sahrens #include <sys/zap.h> 44789Sahrens #include <sys/spa.h> 453912Slling #include <sys/spa_impl.h> 46789Sahrens #include <sys/vdev.h> 473912Slling #include <sys/vdev_impl.h> 48789Sahrens #include <sys/dmu.h> 49789Sahrens #include <sys/dsl_dir.h> 50789Sahrens #include <sys/dsl_dataset.h> 51789Sahrens #include <sys/dsl_prop.h> 524543Smarks #include <sys/dsl_deleg.h> 534543Smarks #include <sys/dmu_objset.h> 54789Sahrens #include <sys/ddi.h> 55789Sahrens #include <sys/sunddi.h> 56789Sahrens #include <sys/sunldi.h> 57789Sahrens #include <sys/policy.h> 58789Sahrens #include <sys/zone.h> 59789Sahrens #include <sys/nvpair.h> 60789Sahrens #include <sys/pathname.h> 61789Sahrens #include <sys/mount.h> 62789Sahrens #include <sys/sdt.h> 63789Sahrens #include <sys/fs/zfs.h> 64789Sahrens #include <sys/zfs_ctldir.h> 655331Samw #include <sys/zfs_dir.h> 662885Sahrens #include <sys/zvol.h> 674543Smarks #include <sharefs/share.h> 684577Sahrens #include <sys/zfs_znode.h> 695326Sek110237 #include <sys/zfs_vfsops.h> 705326Sek110237 #include <sys/dmu_objset.h> 71789Sahrens 72789Sahrens #include "zfs_namecheck.h" 732676Seschrock #include "zfs_prop.h" 744543Smarks #include "zfs_deleg.h" 75789Sahrens 76789Sahrens extern struct modlfs zfs_modlfs; 77789Sahrens 78789Sahrens extern void zfs_init(void); 79789Sahrens extern void zfs_fini(void); 80789Sahrens 81789Sahrens ldi_ident_t zfs_li = NULL; 82789Sahrens dev_info_t *zfs_dip; 83789Sahrens 84789Sahrens typedef int zfs_ioc_func_t(zfs_cmd_t *); 854543Smarks typedef int zfs_secpolicy_func_t(zfs_cmd_t *, cred_t *); 86789Sahrens 87789Sahrens typedef struct zfs_ioc_vec { 88789Sahrens zfs_ioc_func_t *zvec_func; 89789Sahrens zfs_secpolicy_func_t *zvec_secpolicy; 90789Sahrens enum { 914577Sahrens NO_NAME, 924577Sahrens POOL_NAME, 934577Sahrens DATASET_NAME 944543Smarks } zvec_namecheck; 954543Smarks boolean_t zvec_his_log; 96789Sahrens } zfs_ioc_vec_t; 97789Sahrens 98789Sahrens /* _NOTE(PRINTFLIKE(4)) - this is printf-like, but lint is too whiney */ 99789Sahrens void 100789Sahrens __dprintf(const char *file, const char *func, int line, const char *fmt, ...) 101789Sahrens { 102789Sahrens const char *newfile; 103789Sahrens char buf[256]; 104789Sahrens va_list adx; 105789Sahrens 106789Sahrens /* 107789Sahrens * Get rid of annoying "../common/" prefix to filename. 108789Sahrens */ 109789Sahrens newfile = strrchr(file, '/'); 110789Sahrens if (newfile != NULL) { 111789Sahrens newfile = newfile + 1; /* Get rid of leading / */ 112789Sahrens } else { 113789Sahrens newfile = file; 114789Sahrens } 115789Sahrens 116789Sahrens va_start(adx, fmt); 117789Sahrens (void) vsnprintf(buf, sizeof (buf), fmt, adx); 118789Sahrens va_end(adx); 119789Sahrens 120789Sahrens /* 121789Sahrens * To get this data, use the zfs-dprintf probe as so: 122789Sahrens * dtrace -q -n 'zfs-dprintf \ 123789Sahrens * /stringof(arg0) == "dbuf.c"/ \ 124789Sahrens * {printf("%s: %s", stringof(arg1), stringof(arg3))}' 125789Sahrens * arg0 = file name 126789Sahrens * arg1 = function name 127789Sahrens * arg2 = line number 128789Sahrens * arg3 = message 129789Sahrens */ 130789Sahrens DTRACE_PROBE4(zfs__dprintf, 131789Sahrens char *, newfile, char *, func, int, line, char *, buf); 132789Sahrens } 133789Sahrens 1344543Smarks static void 1354715Sek110237 history_str_free(char *buf) 1364715Sek110237 { 1374715Sek110237 kmem_free(buf, HIS_MAX_RECORD_LEN); 1384715Sek110237 } 1394715Sek110237 1404715Sek110237 static char * 1414715Sek110237 history_str_get(zfs_cmd_t *zc) 1424715Sek110237 { 1434715Sek110237 char *buf; 1444715Sek110237 1454715Sek110237 if (zc->zc_history == NULL) 1464715Sek110237 return (NULL); 1474715Sek110237 1484715Sek110237 buf = kmem_alloc(HIS_MAX_RECORD_LEN, KM_SLEEP); 1494715Sek110237 if (copyinstr((void *)(uintptr_t)zc->zc_history, 1504715Sek110237 buf, HIS_MAX_RECORD_LEN, NULL) != 0) { 1514715Sek110237 history_str_free(buf); 1524715Sek110237 return (NULL); 1534715Sek110237 } 1544715Sek110237 1554715Sek110237 buf[HIS_MAX_RECORD_LEN -1] = '\0'; 1564715Sek110237 1574715Sek110237 return (buf); 1584715Sek110237 } 1594715Sek110237 1605375Stimh /* 1615375Stimh * zfs_check_version 1625375Stimh * 1635375Stimh * Return non-zero if the spa version is less than requested version. 1645375Stimh */ 1655331Samw static int 1665331Samw zfs_check_version(const char *name, int version) 1675331Samw { 1685331Samw 1695331Samw spa_t *spa; 1705331Samw 1715331Samw if (spa_open(name, &spa, FTAG) == 0) { 1725331Samw if (spa_version(spa) < version) { 1735331Samw spa_close(spa, FTAG); 1745331Samw return (1); 1755331Samw } 1765331Samw spa_close(spa, FTAG); 1775331Samw } 1785331Samw return (0); 1795331Samw } 1805331Samw 1814715Sek110237 static void 1824543Smarks zfs_log_history(zfs_cmd_t *zc) 1834543Smarks { 1844543Smarks spa_t *spa; 1854603Sahrens char *buf; 1864543Smarks 1874715Sek110237 if ((buf = history_str_get(zc)) == NULL) 1884577Sahrens return; 1894577Sahrens 1904715Sek110237 if (spa_open(zc->zc_name, &spa, FTAG) == 0) { 1914715Sek110237 if (spa_version(spa) >= SPA_VERSION_ZPOOL_HISTORY) 1924715Sek110237 (void) spa_history_log(spa, buf, LOG_CMD_NORMAL); 1934715Sek110237 spa_close(spa, FTAG); 1944543Smarks } 1954715Sek110237 history_str_free(buf); 1964543Smarks } 1974543Smarks 198789Sahrens /* 199789Sahrens * Policy for top-level read operations (list pools). Requires no privileges, 200789Sahrens * and can be used in the local zone, as there is no associated dataset. 201789Sahrens */ 202789Sahrens /* ARGSUSED */ 203789Sahrens static int 2044543Smarks zfs_secpolicy_none(zfs_cmd_t *zc, cred_t *cr) 205789Sahrens { 206789Sahrens return (0); 207789Sahrens } 208789Sahrens 209789Sahrens /* 210789Sahrens * Policy for dataset read operations (list children, get statistics). Requires 211789Sahrens * no privileges, but must be visible in the local zone. 212789Sahrens */ 213789Sahrens /* ARGSUSED */ 214789Sahrens static int 2154543Smarks zfs_secpolicy_read(zfs_cmd_t *zc, cred_t *cr) 216789Sahrens { 217789Sahrens if (INGLOBALZONE(curproc) || 2184543Smarks zone_dataset_visible(zc->zc_name, NULL)) 219789Sahrens return (0); 220789Sahrens 221789Sahrens return (ENOENT); 222789Sahrens } 223789Sahrens 224789Sahrens static int 225789Sahrens zfs_dozonecheck(const char *dataset, cred_t *cr) 226789Sahrens { 227789Sahrens uint64_t zoned; 228789Sahrens int writable = 1; 229789Sahrens 230789Sahrens /* 231789Sahrens * The dataset must be visible by this zone -- check this first 232789Sahrens * so they don't see EPERM on something they shouldn't know about. 233789Sahrens */ 234789Sahrens if (!INGLOBALZONE(curproc) && 235789Sahrens !zone_dataset_visible(dataset, &writable)) 236789Sahrens return (ENOENT); 237789Sahrens 238789Sahrens if (dsl_prop_get_integer(dataset, "zoned", &zoned, NULL)) 239789Sahrens return (ENOENT); 240789Sahrens 241789Sahrens if (INGLOBALZONE(curproc)) { 242789Sahrens /* 243789Sahrens * If the fs is zoned, only root can access it from the 244789Sahrens * global zone. 245789Sahrens */ 246789Sahrens if (secpolicy_zfs(cr) && zoned) 247789Sahrens return (EPERM); 248789Sahrens } else { 249789Sahrens /* 250789Sahrens * If we are in a local zone, the 'zoned' property must be set. 251789Sahrens */ 252789Sahrens if (!zoned) 253789Sahrens return (EPERM); 254789Sahrens 255789Sahrens /* must be writable by this zone */ 256789Sahrens if (!writable) 257789Sahrens return (EPERM); 258789Sahrens } 259789Sahrens return (0); 260789Sahrens } 261789Sahrens 262789Sahrens int 2634543Smarks zfs_secpolicy_write_perms(const char *name, const char *perm, cred_t *cr) 264789Sahrens { 265789Sahrens int error; 266789Sahrens 2674543Smarks error = zfs_dozonecheck(name, cr); 2684543Smarks if (error == 0) { 2694543Smarks error = secpolicy_zfs(cr); 2704670Sahrens if (error) 2714543Smarks error = dsl_deleg_access(name, perm, cr); 2724543Smarks } 2734543Smarks return (error); 2744543Smarks } 2754543Smarks 2764543Smarks static int 2774543Smarks zfs_secpolicy_setprop(const char *name, zfs_prop_t prop, cred_t *cr) 2784543Smarks { 2794543Smarks /* 2804543Smarks * Check permissions for special properties. 2814543Smarks */ 2824543Smarks switch (prop) { 2834543Smarks case ZFS_PROP_ZONED: 2844543Smarks /* 2854543Smarks * Disallow setting of 'zoned' from within a local zone. 2864543Smarks */ 2874543Smarks if (!INGLOBALZONE(curproc)) 2884543Smarks return (EPERM); 2894543Smarks break; 290789Sahrens 2914543Smarks case ZFS_PROP_QUOTA: 2924543Smarks if (!INGLOBALZONE(curproc)) { 2934543Smarks uint64_t zoned; 2944543Smarks char setpoint[MAXNAMELEN]; 2954543Smarks /* 2964543Smarks * Unprivileged users are allowed to modify the 2974543Smarks * quota on things *under* (ie. contained by) 2984543Smarks * the thing they own. 2994543Smarks */ 3004543Smarks if (dsl_prop_get_integer(name, "zoned", &zoned, 3014543Smarks setpoint)) 3024543Smarks return (EPERM); 3034670Sahrens if (!zoned || strlen(name) <= strlen(setpoint)) 3044543Smarks return (EPERM); 3054543Smarks } 3064670Sahrens break; 3074543Smarks } 3084543Smarks 3094787Sahrens return (zfs_secpolicy_write_perms(name, zfs_prop_to_name(prop), cr)); 310789Sahrens } 311789Sahrens 3124543Smarks int 3134543Smarks zfs_secpolicy_fsacl(zfs_cmd_t *zc, cred_t *cr) 3144543Smarks { 3154543Smarks int error; 3164543Smarks 3174543Smarks error = zfs_dozonecheck(zc->zc_name, cr); 3184543Smarks if (error) 3194543Smarks return (error); 3204543Smarks 3214543Smarks /* 3224543Smarks * permission to set permissions will be evaluated later in 3234543Smarks * dsl_deleg_can_allow() 3244543Smarks */ 3254543Smarks return (0); 3264543Smarks } 3274543Smarks 3284543Smarks int 3294543Smarks zfs_secpolicy_rollback(zfs_cmd_t *zc, cred_t *cr) 3304543Smarks { 3314543Smarks int error; 3324543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 3334543Smarks ZFS_DELEG_PERM_ROLLBACK, cr); 3344543Smarks if (error == 0) 3354543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 3364543Smarks ZFS_DELEG_PERM_MOUNT, cr); 3374543Smarks return (error); 3384543Smarks } 3394543Smarks 3404543Smarks int 3414543Smarks zfs_secpolicy_send(zfs_cmd_t *zc, cred_t *cr) 3424543Smarks { 3434543Smarks return (zfs_secpolicy_write_perms(zc->zc_name, 3444543Smarks ZFS_DELEG_PERM_SEND, cr)); 3454543Smarks } 3464543Smarks 3474543Smarks int 3484543Smarks zfs_secpolicy_share(zfs_cmd_t *zc, cred_t *cr) 3494543Smarks { 3504543Smarks if (!INGLOBALZONE(curproc)) 3514543Smarks return (EPERM); 3524543Smarks 3535367Sahrens if (secpolicy_nfs(cr) == 0) { 3544543Smarks return (0); 3554543Smarks } else { 3564543Smarks vnode_t *vp; 3574543Smarks int error; 3584543Smarks 3594543Smarks if ((error = lookupname(zc->zc_value, UIO_SYSSPACE, 3604543Smarks NO_FOLLOW, NULL, &vp)) != 0) 3614543Smarks return (error); 3624543Smarks 3634543Smarks /* Now make sure mntpnt and dataset are ZFS */ 3644543Smarks 3654543Smarks if (vp->v_vfsp->vfs_fstype != zfsfstype || 3664543Smarks (strcmp((char *)refstr_value(vp->v_vfsp->vfs_resource), 3674543Smarks zc->zc_name) != 0)) { 3684543Smarks VN_RELE(vp); 3694543Smarks return (EPERM); 3704543Smarks } 3714543Smarks 3724543Smarks VN_RELE(vp); 3734543Smarks return (dsl_deleg_access(zc->zc_name, 3744543Smarks ZFS_DELEG_PERM_SHARE, cr)); 3754543Smarks } 3764543Smarks } 3774543Smarks 378789Sahrens static int 3794543Smarks zfs_get_parent(const char *datasetname, char *parent, int parentsize) 380789Sahrens { 381789Sahrens char *cp; 382789Sahrens 383789Sahrens /* 384789Sahrens * Remove the @bla or /bla from the end of the name to get the parent. 385789Sahrens */ 3864543Smarks (void) strncpy(parent, datasetname, parentsize); 3874543Smarks cp = strrchr(parent, '@'); 388789Sahrens if (cp != NULL) { 389789Sahrens cp[0] = '\0'; 390789Sahrens } else { 3914543Smarks cp = strrchr(parent, '/'); 392789Sahrens if (cp == NULL) 393789Sahrens return (ENOENT); 394789Sahrens cp[0] = '\0'; 395789Sahrens } 396789Sahrens 3974543Smarks return (0); 3984543Smarks } 3994543Smarks 4004543Smarks int 4014543Smarks zfs_secpolicy_destroy_perms(const char *name, cred_t *cr) 4024543Smarks { 4034543Smarks int error; 4044543Smarks 4054543Smarks if ((error = zfs_secpolicy_write_perms(name, 4064543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 4074543Smarks return (error); 4084543Smarks 4094543Smarks return (zfs_secpolicy_write_perms(name, ZFS_DELEG_PERM_DESTROY, cr)); 4104543Smarks } 4114543Smarks 4124543Smarks static int 4134543Smarks zfs_secpolicy_destroy(zfs_cmd_t *zc, cred_t *cr) 4144543Smarks { 4154543Smarks return (zfs_secpolicy_destroy_perms(zc->zc_name, cr)); 4164543Smarks } 4174543Smarks 4184543Smarks /* 4194543Smarks * Must have sys_config privilege to check the iscsi permission 4204543Smarks */ 4214543Smarks /* ARGSUSED */ 4224543Smarks static int 4234543Smarks zfs_secpolicy_iscsi(zfs_cmd_t *zc, cred_t *cr) 4244543Smarks { 4254543Smarks return (secpolicy_zfs(cr)); 4264543Smarks } 4274543Smarks 4284543Smarks int 4294543Smarks zfs_secpolicy_rename_perms(const char *from, const char *to, cred_t *cr) 4304543Smarks { 4314543Smarks char parentname[MAXNAMELEN]; 4324543Smarks int error; 4334543Smarks 4344543Smarks if ((error = zfs_secpolicy_write_perms(from, 4354543Smarks ZFS_DELEG_PERM_RENAME, cr)) != 0) 4364543Smarks return (error); 4374543Smarks 4384543Smarks if ((error = zfs_secpolicy_write_perms(from, 4394543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 4404543Smarks return (error); 4414543Smarks 4424543Smarks if ((error = zfs_get_parent(to, parentname, 4434543Smarks sizeof (parentname))) != 0) 4444543Smarks return (error); 4454543Smarks 4464543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 4474543Smarks ZFS_DELEG_PERM_CREATE, cr)) != 0) 4484543Smarks return (error); 4494543Smarks 4504543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 4514543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 4524543Smarks return (error); 4534543Smarks 4544543Smarks return (error); 4554543Smarks } 4564543Smarks 4574543Smarks static int 4584543Smarks zfs_secpolicy_rename(zfs_cmd_t *zc, cred_t *cr) 4594543Smarks { 4604543Smarks return (zfs_secpolicy_rename_perms(zc->zc_name, zc->zc_value, cr)); 4614543Smarks } 4624543Smarks 4634543Smarks static int 4644543Smarks zfs_secpolicy_promote(zfs_cmd_t *zc, cred_t *cr) 4654543Smarks { 4664543Smarks char parentname[MAXNAMELEN]; 4674543Smarks objset_t *clone; 4684543Smarks int error; 4694543Smarks 4704543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 4714543Smarks ZFS_DELEG_PERM_PROMOTE, cr); 4724543Smarks if (error) 4734543Smarks return (error); 4744543Smarks 4754543Smarks error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 4764543Smarks DS_MODE_STANDARD | DS_MODE_READONLY, &clone); 4774543Smarks 4784543Smarks if (error == 0) { 4794543Smarks dsl_dataset_t *pclone = NULL; 4804543Smarks dsl_dir_t *dd; 4814543Smarks dd = clone->os->os_dsl_dataset->ds_dir; 4824543Smarks 4834543Smarks rw_enter(&dd->dd_pool->dp_config_rwlock, RW_READER); 4844543Smarks error = dsl_dataset_open_obj(dd->dd_pool, 4855367Sahrens dd->dd_phys->dd_origin_obj, NULL, 4864543Smarks DS_MODE_NONE, FTAG, &pclone); 4874543Smarks rw_exit(&dd->dd_pool->dp_config_rwlock); 4884543Smarks if (error) { 4894543Smarks dmu_objset_close(clone); 4904543Smarks return (error); 4914543Smarks } 4924543Smarks 4934543Smarks error = zfs_secpolicy_write_perms(zc->zc_name, 4944543Smarks ZFS_DELEG_PERM_MOUNT, cr); 4954543Smarks 4964543Smarks dsl_dataset_name(pclone, parentname); 4974543Smarks dmu_objset_close(clone); 4984543Smarks dsl_dataset_close(pclone, DS_MODE_NONE, FTAG); 4994543Smarks if (error == 0) 5004543Smarks error = zfs_secpolicy_write_perms(parentname, 5014543Smarks ZFS_DELEG_PERM_PROMOTE, cr); 5024543Smarks } 5034543Smarks return (error); 5044543Smarks } 5054543Smarks 5064543Smarks static int 5074543Smarks zfs_secpolicy_receive(zfs_cmd_t *zc, cred_t *cr) 5084543Smarks { 5094543Smarks int error; 5104543Smarks 5114543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_name, 5124543Smarks ZFS_DELEG_PERM_RECEIVE, cr)) != 0) 5134543Smarks return (error); 5144543Smarks 5154543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_name, 5164543Smarks ZFS_DELEG_PERM_MOUNT, cr)) != 0) 5174543Smarks return (error); 5184543Smarks 5194543Smarks return (zfs_secpolicy_write_perms(zc->zc_name, 5204543Smarks ZFS_DELEG_PERM_CREATE, cr)); 5214543Smarks } 5224543Smarks 5234543Smarks int 5244543Smarks zfs_secpolicy_snapshot_perms(const char *name, cred_t *cr) 5254543Smarks { 5264543Smarks int error; 5274543Smarks 5284543Smarks if ((error = zfs_secpolicy_write_perms(name, 5294543Smarks ZFS_DELEG_PERM_SNAPSHOT, cr)) != 0) 5304543Smarks return (error); 5314543Smarks 5324543Smarks error = zfs_secpolicy_write_perms(name, 5334543Smarks ZFS_DELEG_PERM_MOUNT, cr); 5344543Smarks 5354543Smarks return (error); 5364543Smarks } 5374543Smarks 5384543Smarks static int 5394543Smarks zfs_secpolicy_snapshot(zfs_cmd_t *zc, cred_t *cr) 5404543Smarks { 5414543Smarks 5424543Smarks return (zfs_secpolicy_snapshot_perms(zc->zc_name, cr)); 5434543Smarks } 5444543Smarks 5454543Smarks static int 5464543Smarks zfs_secpolicy_create(zfs_cmd_t *zc, cred_t *cr) 5474543Smarks { 5484543Smarks char parentname[MAXNAMELEN]; 5494543Smarks int error; 5504543Smarks 5514543Smarks if ((error = zfs_get_parent(zc->zc_name, parentname, 5524543Smarks sizeof (parentname))) != 0) 5534543Smarks return (error); 5544543Smarks 5554543Smarks if (zc->zc_value[0] != '\0') { 5564543Smarks if ((error = zfs_secpolicy_write_perms(zc->zc_value, 5574543Smarks ZFS_DELEG_PERM_CLONE, cr)) != 0) 5584543Smarks return (error); 5594543Smarks } 5604543Smarks 5614543Smarks if ((error = zfs_secpolicy_write_perms(parentname, 5624543Smarks ZFS_DELEG_PERM_CREATE, cr)) != 0) 5634543Smarks return (error); 5644543Smarks 5654543Smarks error = zfs_secpolicy_write_perms(parentname, 5664543Smarks ZFS_DELEG_PERM_MOUNT, cr); 5674543Smarks 5684543Smarks return (error); 5694543Smarks } 5704543Smarks 5714543Smarks static int 5724543Smarks zfs_secpolicy_umount(zfs_cmd_t *zc, cred_t *cr) 5734543Smarks { 5744543Smarks int error; 5754543Smarks 5764543Smarks error = secpolicy_fs_unmount(cr, NULL); 5774543Smarks if (error) { 5784543Smarks error = dsl_deleg_access(zc->zc_name, ZFS_DELEG_PERM_MOUNT, cr); 5794543Smarks } 5804543Smarks return (error); 581789Sahrens } 582789Sahrens 583789Sahrens /* 584789Sahrens * Policy for pool operations - create/destroy pools, add vdevs, etc. Requires 585789Sahrens * SYS_CONFIG privilege, which is not available in a local zone. 586789Sahrens */ 587789Sahrens /* ARGSUSED */ 588789Sahrens static int 5894543Smarks zfs_secpolicy_config(zfs_cmd_t *zc, cred_t *cr) 590789Sahrens { 591789Sahrens if (secpolicy_sys_config(cr, B_FALSE) != 0) 592789Sahrens return (EPERM); 593789Sahrens 594789Sahrens return (0); 595789Sahrens } 596789Sahrens 597789Sahrens /* 5984543Smarks * Just like zfs_secpolicy_config, except that we will check for 5994543Smarks * mount permission on the dataset for permission to create/remove 6004543Smarks * the minor nodes. 6014543Smarks */ 6024543Smarks static int 6034543Smarks zfs_secpolicy_minor(zfs_cmd_t *zc, cred_t *cr) 6044543Smarks { 6054543Smarks if (secpolicy_sys_config(cr, B_FALSE) != 0) { 6064543Smarks return (dsl_deleg_access(zc->zc_name, 6074543Smarks ZFS_DELEG_PERM_MOUNT, cr)); 6084543Smarks } 6094543Smarks 6104543Smarks return (0); 6114543Smarks } 6124543Smarks 6134543Smarks /* 6141544Seschrock * Policy for fault injection. Requires all privileges. 6151544Seschrock */ 6161544Seschrock /* ARGSUSED */ 6171544Seschrock static int 6184543Smarks zfs_secpolicy_inject(zfs_cmd_t *zc, cred_t *cr) 6191544Seschrock { 6201544Seschrock return (secpolicy_zinject(cr)); 6211544Seschrock } 6221544Seschrock 6234849Sahrens static int 6244849Sahrens zfs_secpolicy_inherit(zfs_cmd_t *zc, cred_t *cr) 6254849Sahrens { 6264849Sahrens zfs_prop_t prop = zfs_name_to_prop(zc->zc_value); 6274849Sahrens 6285094Slling if (prop == ZPROP_INVAL) { 6294849Sahrens if (!zfs_prop_user(zc->zc_value)) 6304849Sahrens return (EINVAL); 6314849Sahrens return (zfs_secpolicy_write_perms(zc->zc_name, 6324849Sahrens ZFS_DELEG_PERM_USERPROP, cr)); 6334849Sahrens } else { 6344849Sahrens if (!zfs_prop_inheritable(prop)) 6354849Sahrens return (EINVAL); 6364849Sahrens return (zfs_secpolicy_setprop(zc->zc_name, prop, cr)); 6374849Sahrens } 6384849Sahrens } 6394849Sahrens 6401544Seschrock /* 641789Sahrens * Returns the nvlist as specified by the user in the zfs_cmd_t. 642789Sahrens */ 643789Sahrens static int 6445094Slling get_nvlist(uint64_t nvl, uint64_t size, nvlist_t **nvp) 645789Sahrens { 646789Sahrens char *packed; 647789Sahrens int error; 6485094Slling nvlist_t *list = NULL; 649789Sahrens 650789Sahrens /* 6512676Seschrock * Read in and unpack the user-supplied nvlist. 652789Sahrens */ 6535094Slling if (size == 0) 654789Sahrens return (EINVAL); 655789Sahrens 656789Sahrens packed = kmem_alloc(size, KM_SLEEP); 657789Sahrens 6585094Slling if ((error = xcopyin((void *)(uintptr_t)nvl, packed, size)) != 0) { 659789Sahrens kmem_free(packed, size); 660789Sahrens return (error); 661789Sahrens } 662789Sahrens 6635094Slling if ((error = nvlist_unpack(packed, size, &list, 0)) != 0) { 664789Sahrens kmem_free(packed, size); 665789Sahrens return (error); 666789Sahrens } 667789Sahrens 668789Sahrens kmem_free(packed, size); 669789Sahrens 6705094Slling *nvp = list; 671789Sahrens return (0); 672789Sahrens } 673789Sahrens 674789Sahrens static int 6752676Seschrock put_nvlist(zfs_cmd_t *zc, nvlist_t *nvl) 6762676Seschrock { 6772676Seschrock char *packed = NULL; 6782676Seschrock size_t size; 6792676Seschrock int error; 6802676Seschrock 6812676Seschrock VERIFY(nvlist_size(nvl, &size, NV_ENCODE_NATIVE) == 0); 6822676Seschrock 6832676Seschrock if (size > zc->zc_nvlist_dst_size) { 6842676Seschrock error = ENOMEM; 6852676Seschrock } else { 6864611Smarks packed = kmem_alloc(size, KM_SLEEP); 6872676Seschrock VERIFY(nvlist_pack(nvl, &packed, &size, NV_ENCODE_NATIVE, 6882676Seschrock KM_SLEEP) == 0); 6892676Seschrock error = xcopyout(packed, (void *)(uintptr_t)zc->zc_nvlist_dst, 6902676Seschrock size); 6912676Seschrock kmem_free(packed, size); 6922676Seschrock } 6932676Seschrock 6942676Seschrock zc->zc_nvlist_dst_size = size; 6952676Seschrock return (error); 6962676Seschrock } 6972676Seschrock 6982676Seschrock static int 699789Sahrens zfs_ioc_pool_create(zfs_cmd_t *zc) 700789Sahrens { 701789Sahrens int error; 7025094Slling nvlist_t *config, *props = NULL; 7034715Sek110237 char *buf; 704789Sahrens 7055094Slling if (error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 7065094Slling &config)) 7074988Sek110237 return (error); 7084715Sek110237 7095094Slling if (zc->zc_nvlist_src_size != 0 && (error = 7105094Slling get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, &props))) { 7115094Slling nvlist_free(config); 7125094Slling return (error); 7135094Slling } 7145094Slling 7154988Sek110237 buf = history_str_get(zc); 716789Sahrens 7175094Slling error = spa_create(zc->zc_name, config, props, buf); 718789Sahrens 7194988Sek110237 if (buf != NULL) 7204988Sek110237 history_str_free(buf); 7215094Slling 722789Sahrens nvlist_free(config); 723789Sahrens 7245094Slling if (props) 7255094Slling nvlist_free(props); 7265094Slling 727789Sahrens return (error); 728789Sahrens } 729789Sahrens 730789Sahrens static int 731789Sahrens zfs_ioc_pool_destroy(zfs_cmd_t *zc) 732789Sahrens { 7334543Smarks int error; 7344543Smarks zfs_log_history(zc); 7354543Smarks error = spa_destroy(zc->zc_name); 7364543Smarks return (error); 737789Sahrens } 738789Sahrens 739789Sahrens static int 740789Sahrens zfs_ioc_pool_import(zfs_cmd_t *zc) 741789Sahrens { 742789Sahrens int error; 7435094Slling nvlist_t *config, *props = NULL; 744789Sahrens uint64_t guid; 745789Sahrens 7465094Slling if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 7475094Slling &config)) != 0) 748789Sahrens return (error); 749789Sahrens 7505094Slling if (zc->zc_nvlist_src_size != 0 && (error = 7515094Slling get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, &props))) { 7525094Slling nvlist_free(config); 7535094Slling return (error); 7545094Slling } 7555094Slling 756789Sahrens if (nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID, &guid) != 0 || 7571544Seschrock guid != zc->zc_guid) 758789Sahrens error = EINVAL; 759789Sahrens else 7605094Slling error = spa_import(zc->zc_name, config, props); 761789Sahrens 762789Sahrens nvlist_free(config); 763789Sahrens 7645094Slling if (props) 7655094Slling nvlist_free(props); 7665094Slling 767789Sahrens return (error); 768789Sahrens } 769789Sahrens 770789Sahrens static int 771789Sahrens zfs_ioc_pool_export(zfs_cmd_t *zc) 772789Sahrens { 7734543Smarks int error; 7744543Smarks zfs_log_history(zc); 7754543Smarks error = spa_export(zc->zc_name, NULL); 7764543Smarks return (error); 777789Sahrens } 778789Sahrens 779789Sahrens static int 780789Sahrens zfs_ioc_pool_configs(zfs_cmd_t *zc) 781789Sahrens { 782789Sahrens nvlist_t *configs; 783789Sahrens int error; 784789Sahrens 785789Sahrens if ((configs = spa_all_configs(&zc->zc_cookie)) == NULL) 786789Sahrens return (EEXIST); 787789Sahrens 7882676Seschrock error = put_nvlist(zc, configs); 789789Sahrens 790789Sahrens nvlist_free(configs); 791789Sahrens 792789Sahrens return (error); 793789Sahrens } 794789Sahrens 795789Sahrens static int 796789Sahrens zfs_ioc_pool_stats(zfs_cmd_t *zc) 797789Sahrens { 798789Sahrens nvlist_t *config; 799789Sahrens int error; 8001544Seschrock int ret = 0; 801789Sahrens 8022676Seschrock error = spa_get_stats(zc->zc_name, &config, zc->zc_value, 8032676Seschrock sizeof (zc->zc_value)); 804789Sahrens 805789Sahrens if (config != NULL) { 8062676Seschrock ret = put_nvlist(zc, config); 807789Sahrens nvlist_free(config); 8081544Seschrock 8091544Seschrock /* 8101544Seschrock * The config may be present even if 'error' is non-zero. 8111544Seschrock * In this case we return success, and preserve the real errno 8121544Seschrock * in 'zc_cookie'. 8131544Seschrock */ 8141544Seschrock zc->zc_cookie = error; 815789Sahrens } else { 8161544Seschrock ret = error; 817789Sahrens } 818789Sahrens 8191544Seschrock return (ret); 820789Sahrens } 821789Sahrens 822789Sahrens /* 823789Sahrens * Try to import the given pool, returning pool stats as appropriate so that 824789Sahrens * user land knows which devices are available and overall pool health. 825789Sahrens */ 826789Sahrens static int 827789Sahrens zfs_ioc_pool_tryimport(zfs_cmd_t *zc) 828789Sahrens { 829789Sahrens nvlist_t *tryconfig, *config; 830789Sahrens int error; 831789Sahrens 8325094Slling if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 8335094Slling &tryconfig)) != 0) 834789Sahrens return (error); 835789Sahrens 836789Sahrens config = spa_tryimport(tryconfig); 837789Sahrens 838789Sahrens nvlist_free(tryconfig); 839789Sahrens 840789Sahrens if (config == NULL) 841789Sahrens return (EINVAL); 842789Sahrens 8432676Seschrock error = put_nvlist(zc, config); 844789Sahrens nvlist_free(config); 845789Sahrens 846789Sahrens return (error); 847789Sahrens } 848789Sahrens 849789Sahrens static int 850789Sahrens zfs_ioc_pool_scrub(zfs_cmd_t *zc) 851789Sahrens { 852789Sahrens spa_t *spa; 853789Sahrens int error; 854789Sahrens 8552926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 8562926Sek110237 return (error); 8572926Sek110237 8584808Sek110237 mutex_enter(&spa_namespace_lock); 8592926Sek110237 error = spa_scrub(spa, zc->zc_cookie, B_FALSE); 8604808Sek110237 mutex_exit(&spa_namespace_lock); 8612926Sek110237 8622926Sek110237 spa_close(spa, FTAG); 8632926Sek110237 864789Sahrens return (error); 865789Sahrens } 866789Sahrens 867789Sahrens static int 868789Sahrens zfs_ioc_pool_freeze(zfs_cmd_t *zc) 869789Sahrens { 870789Sahrens spa_t *spa; 871789Sahrens int error; 872789Sahrens 873789Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 874789Sahrens if (error == 0) { 875789Sahrens spa_freeze(spa); 876789Sahrens spa_close(spa, FTAG); 877789Sahrens } 878789Sahrens return (error); 879789Sahrens } 880789Sahrens 881789Sahrens static int 8821760Seschrock zfs_ioc_pool_upgrade(zfs_cmd_t *zc) 8831760Seschrock { 8841760Seschrock spa_t *spa; 8851760Seschrock int error; 8861760Seschrock 8872926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 8882926Sek110237 return (error); 8892926Sek110237 8905118Slling if (zc->zc_cookie < spa_version(spa) || zc->zc_cookie > SPA_VERSION) { 8915118Slling spa_close(spa, FTAG); 8925118Slling return (EINVAL); 8935118Slling } 8945118Slling 8955094Slling spa_upgrade(spa, zc->zc_cookie); 8962926Sek110237 spa_close(spa, FTAG); 8972926Sek110237 8982926Sek110237 return (error); 8992926Sek110237 } 9002926Sek110237 9012926Sek110237 static int 9022926Sek110237 zfs_ioc_pool_get_history(zfs_cmd_t *zc) 9032926Sek110237 { 9042926Sek110237 spa_t *spa; 9052926Sek110237 char *hist_buf; 9062926Sek110237 uint64_t size; 9072926Sek110237 int error; 9082926Sek110237 9092926Sek110237 if ((size = zc->zc_history_len) == 0) 9102926Sek110237 return (EINVAL); 9112926Sek110237 9122926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 9132926Sek110237 return (error); 9142926Sek110237 9154577Sahrens if (spa_version(spa) < SPA_VERSION_ZPOOL_HISTORY) { 9163863Sek110237 spa_close(spa, FTAG); 9173863Sek110237 return (ENOTSUP); 9183863Sek110237 } 9193863Sek110237 9202926Sek110237 hist_buf = kmem_alloc(size, KM_SLEEP); 9212926Sek110237 if ((error = spa_history_get(spa, &zc->zc_history_offset, 9222926Sek110237 &zc->zc_history_len, hist_buf)) == 0) { 9234543Smarks error = xcopyout(hist_buf, 9244543Smarks (char *)(uintptr_t)zc->zc_history, 9252926Sek110237 zc->zc_history_len); 9262926Sek110237 } 9272926Sek110237 9282926Sek110237 spa_close(spa, FTAG); 9292926Sek110237 kmem_free(hist_buf, size); 9302926Sek110237 return (error); 9312926Sek110237 } 9322926Sek110237 9332926Sek110237 static int 9343444Sek110237 zfs_ioc_dsobj_to_dsname(zfs_cmd_t *zc) 9353444Sek110237 { 9363444Sek110237 int error; 9373444Sek110237 9383912Slling if (error = dsl_dsobj_to_dsname(zc->zc_name, zc->zc_obj, zc->zc_value)) 9393444Sek110237 return (error); 9403444Sek110237 9413444Sek110237 return (0); 9423444Sek110237 } 9433444Sek110237 9443444Sek110237 static int 9453444Sek110237 zfs_ioc_obj_to_path(zfs_cmd_t *zc) 9463444Sek110237 { 9473444Sek110237 objset_t *osp; 9483444Sek110237 int error; 9493444Sek110237 9503444Sek110237 if ((error = dmu_objset_open(zc->zc_name, DMU_OST_ZFS, 9513444Sek110237 DS_MODE_NONE | DS_MODE_READONLY, &osp)) != 0) 9523444Sek110237 return (error); 9533444Sek110237 9543444Sek110237 error = zfs_obj_to_path(osp, zc->zc_obj, zc->zc_value, 9553444Sek110237 sizeof (zc->zc_value)); 9563444Sek110237 dmu_objset_close(osp); 9573444Sek110237 9583444Sek110237 return (error); 9593444Sek110237 } 9603444Sek110237 9613444Sek110237 static int 962789Sahrens zfs_ioc_vdev_add(zfs_cmd_t *zc) 963789Sahrens { 964789Sahrens spa_t *spa; 965789Sahrens int error; 966789Sahrens nvlist_t *config; 967789Sahrens 968789Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 969789Sahrens if (error != 0) 970789Sahrens return (error); 971789Sahrens 9723912Slling /* 9733912Slling * A root pool with concatenated devices is not supported. 9743912Slling * Thus, can not add a device to a root pool with one device. 9753912Slling */ 9763912Slling if (spa->spa_root_vdev->vdev_children == 1 && spa->spa_bootfs != 0) { 9773912Slling spa_close(spa, FTAG); 9783912Slling return (EDOM); 9793912Slling } 9803912Slling 9815094Slling if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 9825094Slling &config)) == 0) { 983789Sahrens error = spa_vdev_add(spa, config); 984789Sahrens nvlist_free(config); 985789Sahrens } 986789Sahrens spa_close(spa, FTAG); 987789Sahrens return (error); 988789Sahrens } 989789Sahrens 990789Sahrens static int 991789Sahrens zfs_ioc_vdev_remove(zfs_cmd_t *zc) 992789Sahrens { 9932082Seschrock spa_t *spa; 9942082Seschrock int error; 9952082Seschrock 9962082Seschrock error = spa_open(zc->zc_name, &spa, FTAG); 9972082Seschrock if (error != 0) 9982082Seschrock return (error); 9992082Seschrock error = spa_vdev_remove(spa, zc->zc_guid, B_FALSE); 10002082Seschrock spa_close(spa, FTAG); 10012082Seschrock return (error); 1002789Sahrens } 1003789Sahrens 1004789Sahrens static int 10054451Seschrock zfs_ioc_vdev_set_state(zfs_cmd_t *zc) 1006789Sahrens { 1007789Sahrens spa_t *spa; 1008789Sahrens int error; 10094451Seschrock vdev_state_t newstate = VDEV_STATE_UNKNOWN; 1010789Sahrens 10112926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1012789Sahrens return (error); 10134451Seschrock switch (zc->zc_cookie) { 10144451Seschrock case VDEV_STATE_ONLINE: 10154451Seschrock error = vdev_online(spa, zc->zc_guid, zc->zc_obj, &newstate); 10164451Seschrock break; 10174451Seschrock 10184451Seschrock case VDEV_STATE_OFFLINE: 10194451Seschrock error = vdev_offline(spa, zc->zc_guid, zc->zc_obj); 10204451Seschrock break; 1021789Sahrens 10224451Seschrock case VDEV_STATE_FAULTED: 10234451Seschrock error = vdev_fault(spa, zc->zc_guid); 10244451Seschrock break; 1025789Sahrens 10264451Seschrock case VDEV_STATE_DEGRADED: 10274451Seschrock error = vdev_degrade(spa, zc->zc_guid); 10284451Seschrock break; 10294451Seschrock 10304451Seschrock default: 10314451Seschrock error = EINVAL; 10324451Seschrock } 10334451Seschrock zc->zc_cookie = newstate; 1034789Sahrens spa_close(spa, FTAG); 1035789Sahrens return (error); 1036789Sahrens } 1037789Sahrens 1038789Sahrens static int 1039789Sahrens zfs_ioc_vdev_attach(zfs_cmd_t *zc) 1040789Sahrens { 1041789Sahrens spa_t *spa; 1042789Sahrens int replacing = zc->zc_cookie; 1043789Sahrens nvlist_t *config; 1044789Sahrens int error; 1045789Sahrens 10462926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1047789Sahrens return (error); 1048789Sahrens 10495094Slling if ((error = get_nvlist(zc->zc_nvlist_conf, zc->zc_nvlist_conf_size, 10505094Slling &config)) == 0) { 10511544Seschrock error = spa_vdev_attach(spa, zc->zc_guid, config, replacing); 1052789Sahrens nvlist_free(config); 1053789Sahrens } 1054789Sahrens 1055789Sahrens spa_close(spa, FTAG); 1056789Sahrens return (error); 1057789Sahrens } 1058789Sahrens 1059789Sahrens static int 1060789Sahrens zfs_ioc_vdev_detach(zfs_cmd_t *zc) 1061789Sahrens { 1062789Sahrens spa_t *spa; 1063789Sahrens int error; 1064789Sahrens 10652926Sek110237 if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1066789Sahrens return (error); 1067789Sahrens 10681544Seschrock error = spa_vdev_detach(spa, zc->zc_guid, B_FALSE); 1069789Sahrens 1070789Sahrens spa_close(spa, FTAG); 1071789Sahrens return (error); 1072789Sahrens } 1073789Sahrens 1074789Sahrens static int 10751354Seschrock zfs_ioc_vdev_setpath(zfs_cmd_t *zc) 10761354Seschrock { 10771354Seschrock spa_t *spa; 10782676Seschrock char *path = zc->zc_value; 10791544Seschrock uint64_t guid = zc->zc_guid; 10801354Seschrock int error; 10811354Seschrock 10821354Seschrock error = spa_open(zc->zc_name, &spa, FTAG); 10831354Seschrock if (error != 0) 10841354Seschrock return (error); 10851354Seschrock 10861354Seschrock error = spa_vdev_setpath(spa, guid, path); 10871354Seschrock spa_close(spa, FTAG); 10881354Seschrock return (error); 10891354Seschrock } 10901354Seschrock 10915367Sahrens /* 10925367Sahrens * inputs: 10935367Sahrens * zc_name name of filesystem 10945367Sahrens * zc_nvlist_dst_size size of buffer for property nvlist 10955367Sahrens * 10965367Sahrens * outputs: 10975367Sahrens * zc_objset_stats stats 10985367Sahrens * zc_nvlist_dst property nvlist 10995367Sahrens * zc_nvlist_dst_size size of property nvlist 11005367Sahrens * zc_value alternate root 11015367Sahrens */ 11021354Seschrock static int 1103789Sahrens zfs_ioc_objset_stats(zfs_cmd_t *zc) 1104789Sahrens { 1105789Sahrens objset_t *os = NULL; 1106789Sahrens int error; 11071356Seschrock nvlist_t *nv; 1108789Sahrens 1109789Sahrens retry: 1110789Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1111789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1112789Sahrens if (error != 0) { 1113789Sahrens /* 1114789Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1115789Sahrens * the objset is held exclusively. Fortunately this hold is 1116789Sahrens * only for a short while, so we retry here. 1117789Sahrens * This avoids user code having to handle EBUSY, 1118789Sahrens * for example for a "zfs list". 1119789Sahrens */ 1120789Sahrens if (error == EBUSY) { 1121789Sahrens delay(1); 1122789Sahrens goto retry; 1123789Sahrens } 1124789Sahrens return (error); 1125789Sahrens } 1126789Sahrens 11272885Sahrens dmu_objset_fast_stat(os, &zc->zc_objset_stats); 1128789Sahrens 11292856Snd150628 if (zc->zc_nvlist_dst != 0 && 11301356Seschrock (error = dsl_prop_get_all(os, &nv)) == 0) { 11312885Sahrens dmu_objset_stats(os, nv); 11323087Sahrens /* 11335147Srm160521 * NB: zvol_get_stats() will read the objset contents, 11343087Sahrens * which we aren't supposed to do with a 11353087Sahrens * DS_MODE_STANDARD open, because it could be 11363087Sahrens * inconsistent. So this is a bit of a workaround... 11373087Sahrens */ 11384577Sahrens if (!zc->zc_objset_stats.dds_inconsistent) { 11394577Sahrens if (dmu_objset_type(os) == DMU_OST_ZVOL) 11404577Sahrens VERIFY(zvol_get_stats(os, nv) == 0); 11414577Sahrens } 11422676Seschrock error = put_nvlist(zc, nv); 11431356Seschrock nvlist_free(nv); 11441356Seschrock } 1145789Sahrens 11462676Seschrock spa_altroot(dmu_objset_spa(os), zc->zc_value, sizeof (zc->zc_value)); 11471544Seschrock 1148789Sahrens dmu_objset_close(os); 1149789Sahrens return (error); 1150789Sahrens } 1151789Sahrens 11525367Sahrens /* 11535367Sahrens * inputs: 11545367Sahrens * zc_name name of filesystem 11555367Sahrens * zc_cookie zap cursor 11565367Sahrens * zc_nvlist_dst_size size of buffer for property nvlist 11575367Sahrens * 11585367Sahrens * outputs: 11595367Sahrens * zc_name name of next filesystem 11605367Sahrens * zc_objset_stats stats 11615367Sahrens * zc_nvlist_dst property nvlist 11625367Sahrens * zc_nvlist_dst_size size of property nvlist 11635367Sahrens * zc_value alternate root 11645367Sahrens */ 1165789Sahrens static int 11665147Srm160521 zfs_ioc_objset_version(zfs_cmd_t *zc) 11675147Srm160521 { 11685147Srm160521 objset_t *os = NULL; 11695147Srm160521 int error; 11705147Srm160521 11715147Srm160521 retry: 11725147Srm160521 error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 11735147Srm160521 DS_MODE_STANDARD | DS_MODE_READONLY, &os); 11745147Srm160521 if (error != 0) { 11755147Srm160521 /* 11765147Srm160521 * This is ugly: dmu_objset_open() can return EBUSY if 11775147Srm160521 * the objset is held exclusively. Fortunately this hold is 11785147Srm160521 * only for a short while, so we retry here. 11795147Srm160521 * This avoids user code having to handle EBUSY, 11805147Srm160521 * for example for a "zfs list". 11815147Srm160521 */ 11825147Srm160521 if (error == EBUSY) { 11835147Srm160521 delay(1); 11845147Srm160521 goto retry; 11855147Srm160521 } 11865147Srm160521 return (error); 11875147Srm160521 } 11885147Srm160521 11895147Srm160521 dmu_objset_fast_stat(os, &zc->zc_objset_stats); 11905147Srm160521 11915147Srm160521 /* 11925147Srm160521 * NB: zfs_get_version() will read the objset contents, 11935147Srm160521 * which we aren't supposed to do with a 11945147Srm160521 * DS_MODE_STANDARD open, because it could be 11955147Srm160521 * inconsistent. So this is a bit of a workaround... 11965147Srm160521 */ 11975147Srm160521 zc->zc_cookie = 0; 11985147Srm160521 if (!zc->zc_objset_stats.dds_inconsistent) 11995147Srm160521 if (dmu_objset_type(os) == DMU_OST_ZFS) 12005147Srm160521 (void) zfs_get_version(os, &zc->zc_cookie); 12015147Srm160521 12025147Srm160521 dmu_objset_close(os); 12035147Srm160521 return (0); 12045147Srm160521 } 12055147Srm160521 12065147Srm160521 static int 1207789Sahrens zfs_ioc_dataset_list_next(zfs_cmd_t *zc) 1208789Sahrens { 1209885Sahrens objset_t *os; 1210789Sahrens int error; 1211789Sahrens char *p; 1212789Sahrens 1213885Sahrens retry: 1214885Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1215885Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1216885Sahrens if (error != 0) { 1217885Sahrens /* 1218885Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1219885Sahrens * the objset is held exclusively. Fortunately this hold is 1220885Sahrens * only for a short while, so we retry here. 1221885Sahrens * This avoids user code having to handle EBUSY, 1222885Sahrens * for example for a "zfs list". 1223885Sahrens */ 1224885Sahrens if (error == EBUSY) { 1225885Sahrens delay(1); 1226885Sahrens goto retry; 1227885Sahrens } 1228885Sahrens if (error == ENOENT) 1229885Sahrens error = ESRCH; 1230885Sahrens return (error); 1231789Sahrens } 1232789Sahrens 1233789Sahrens p = strrchr(zc->zc_name, '/'); 1234789Sahrens if (p == NULL || p[1] != '\0') 1235789Sahrens (void) strlcat(zc->zc_name, "/", sizeof (zc->zc_name)); 1236789Sahrens p = zc->zc_name + strlen(zc->zc_name); 1237789Sahrens 1238789Sahrens do { 1239885Sahrens error = dmu_dir_list_next(os, 1240885Sahrens sizeof (zc->zc_name) - (p - zc->zc_name), p, 1241885Sahrens NULL, &zc->zc_cookie); 1242789Sahrens if (error == ENOENT) 1243789Sahrens error = ESRCH; 1244885Sahrens } while (error == 0 && !INGLOBALZONE(curproc) && 1245789Sahrens !zone_dataset_visible(zc->zc_name, NULL)); 1246789Sahrens 1247885Sahrens /* 1248885Sahrens * If it's a hidden dataset (ie. with a '$' in its name), don't 1249885Sahrens * try to get stats for it. Userland will skip over it. 1250885Sahrens */ 1251885Sahrens if (error == 0 && strchr(zc->zc_name, '$') == NULL) 1252885Sahrens error = zfs_ioc_objset_stats(zc); /* fill in the stats */ 1253789Sahrens 1254885Sahrens dmu_objset_close(os); 1255789Sahrens return (error); 1256789Sahrens } 1257789Sahrens 12585367Sahrens /* 12595367Sahrens * inputs: 12605367Sahrens * zc_name name of filesystem 12615367Sahrens * zc_cookie zap cursor 12625367Sahrens * zc_nvlist_dst_size size of buffer for property nvlist 12635367Sahrens * 12645367Sahrens * outputs: 12655367Sahrens * zc_name name of next snapshot 12665367Sahrens * zc_objset_stats stats 12675367Sahrens * zc_nvlist_dst property nvlist 12685367Sahrens * zc_nvlist_dst_size size of property nvlist 12695367Sahrens * zc_value alternate root 12705367Sahrens */ 1271789Sahrens static int 1272789Sahrens zfs_ioc_snapshot_list_next(zfs_cmd_t *zc) 1273789Sahrens { 1274885Sahrens objset_t *os; 1275789Sahrens int error; 1276789Sahrens 1277789Sahrens retry: 1278885Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1279885Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 1280885Sahrens if (error != 0) { 1281789Sahrens /* 1282885Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 1283789Sahrens * the objset is held exclusively. Fortunately this hold is 1284789Sahrens * only for a short while, so we retry here. 1285789Sahrens * This avoids user code having to handle EBUSY, 1286885Sahrens * for example for a "zfs list". 1287789Sahrens */ 1288789Sahrens if (error == EBUSY) { 1289789Sahrens delay(1); 1290789Sahrens goto retry; 1291789Sahrens } 1292789Sahrens if (error == ENOENT) 1293885Sahrens error = ESRCH; 1294789Sahrens return (error); 1295789Sahrens } 1296789Sahrens 12971003Slling /* 12981003Slling * A dataset name of maximum length cannot have any snapshots, 12991003Slling * so exit immediately. 13001003Slling */ 13011003Slling if (strlcat(zc->zc_name, "@", sizeof (zc->zc_name)) >= MAXNAMELEN) { 1302885Sahrens dmu_objset_close(os); 13031003Slling return (ESRCH); 1304789Sahrens } 1305789Sahrens 1306885Sahrens error = dmu_snapshot_list_next(os, 1307885Sahrens sizeof (zc->zc_name) - strlen(zc->zc_name), 1308885Sahrens zc->zc_name + strlen(zc->zc_name), NULL, &zc->zc_cookie); 1309789Sahrens if (error == ENOENT) 1310789Sahrens error = ESRCH; 1311789Sahrens 1312885Sahrens if (error == 0) 1313885Sahrens error = zfs_ioc_objset_stats(zc); /* fill in the stats */ 1314789Sahrens 13155367Sahrens /* if we failed, undo the @ that we tacked on to zc_name */ 13165367Sahrens if (error != 0) 13175367Sahrens *strchr(zc->zc_name, '@') = '\0'; 13185367Sahrens 1319885Sahrens dmu_objset_close(os); 1320789Sahrens return (error); 1321789Sahrens } 1322789Sahrens 1323789Sahrens static int 13244787Sahrens zfs_set_prop_nvlist(const char *name, nvlist_t *nvl) 1325789Sahrens { 13262676Seschrock nvpair_t *elem; 13272676Seschrock int error; 13282676Seschrock uint64_t intval; 13292676Seschrock char *strval; 13302676Seschrock 13314543Smarks /* 13324543Smarks * First validate permission to set all of the properties 13334543Smarks */ 13342676Seschrock elem = NULL; 13352676Seschrock while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) { 13364670Sahrens const char *propname = nvpair_name(elem); 13374670Sahrens zfs_prop_t prop = zfs_name_to_prop(propname); 13382676Seschrock 13395094Slling if (prop == ZPROP_INVAL) { 13402676Seschrock /* 13412676Seschrock * If this is a user-defined property, it must be a 13422676Seschrock * string, and there is no further validation to do. 13432676Seschrock */ 13442676Seschrock if (!zfs_prop_user(propname) || 13452676Seschrock nvpair_type(elem) != DATA_TYPE_STRING) 13462676Seschrock return (EINVAL); 13472676Seschrock 13485331Samw if (error = zfs_secpolicy_write_perms(name, 13495331Samw ZFS_DELEG_PERM_USERPROP, CRED())) 13504670Sahrens return (error); 13514543Smarks continue; 13522676Seschrock } 13532676Seschrock 13544787Sahrens if ((error = zfs_secpolicy_setprop(name, prop, CRED())) != 0) 13554670Sahrens return (error); 13562676Seschrock 13574670Sahrens /* 13584670Sahrens * Check that this value is valid for this pool version 13594670Sahrens */ 13604670Sahrens switch (prop) { 13613886Sahl case ZFS_PROP_COMPRESSION: 13623886Sahl /* 13633886Sahl * If the user specified gzip compression, make sure 13643886Sahl * the SPA supports it. We ignore any errors here since 13653886Sahl * we'll catch them later. 13663886Sahl */ 13673886Sahl if (nvpair_type(elem) == DATA_TYPE_UINT64 && 13683886Sahl nvpair_value_uint64(elem, &intval) == 0 && 13693886Sahl intval >= ZIO_COMPRESS_GZIP_1 && 13703886Sahl intval <= ZIO_COMPRESS_GZIP_9) { 13715331Samw if (zfs_check_version(name, 13725331Samw SPA_VERSION_GZIP_COMPRESSION)) 13735331Samw return (ENOTSUP); 13743886Sahl } 13753886Sahl break; 13764603Sahrens 13774603Sahrens case ZFS_PROP_COPIES: 13785331Samw if (zfs_check_version(name, SPA_VERSION_DITTO_BLOCKS)) 13795331Samw return (ENOTSUP); 13804603Sahrens break; 13815331Samw case ZFS_PROP_NORMALIZE: 13825331Samw case ZFS_PROP_UTF8ONLY: 13835331Samw case ZFS_PROP_CASE: 13845331Samw if (zfs_check_version(name, SPA_VERSION_NORMALIZATION)) 13855331Samw return (ENOTSUP); 13865331Samw 13874603Sahrens } 13885331Samw if ((error = zfs_secpolicy_setprop(name, prop, CRED())) != 0) 13895331Samw return (error); 13904543Smarks } 13914543Smarks 13924543Smarks elem = NULL; 13934543Smarks while ((elem = nvlist_next_nvpair(nvl, elem)) != NULL) { 13944670Sahrens const char *propname = nvpair_name(elem); 13954670Sahrens zfs_prop_t prop = zfs_name_to_prop(propname); 13964543Smarks 13975094Slling if (prop == ZPROP_INVAL) { 13984543Smarks VERIFY(nvpair_value_string(elem, &strval) == 0); 13994543Smarks error = dsl_prop_set(name, propname, 1, 14004543Smarks strlen(strval) + 1, strval); 14014543Smarks if (error == 0) 14024543Smarks continue; 14034543Smarks else 14044543Smarks return (error); 14054543Smarks } 14062676Seschrock 14072676Seschrock switch (prop) { 14082676Seschrock case ZFS_PROP_QUOTA: 14092676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14104577Sahrens (error = dsl_dir_set_quota(name, intval)) != 0) 14112676Seschrock return (error); 14122676Seschrock break; 14132676Seschrock 1414*5378Sck153898 case ZFS_PROP_REFQUOTA: 1415*5378Sck153898 if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 1416*5378Sck153898 (error = dsl_dataset_set_quota(name, intval)) != 0) 1417*5378Sck153898 return (error); 1418*5378Sck153898 break; 1419*5378Sck153898 14202676Seschrock case ZFS_PROP_RESERVATION: 14212676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14222676Seschrock (error = dsl_dir_set_reservation(name, 14232676Seschrock intval)) != 0) 14242676Seschrock return (error); 14252676Seschrock break; 1426789Sahrens 1427*5378Sck153898 case ZFS_PROP_REFRESERVATION: 1428*5378Sck153898 if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 1429*5378Sck153898 (error = dsl_dataset_set_reservation(name, 1430*5378Sck153898 intval)) != 0) 1431*5378Sck153898 return (error); 1432*5378Sck153898 break; 1433*5378Sck153898 14342676Seschrock case ZFS_PROP_VOLSIZE: 14352676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14364787Sahrens (error = zvol_set_volsize(name, 14374787Sahrens ddi_driver_major(zfs_dip), intval)) != 0) 14382676Seschrock return (error); 14392676Seschrock break; 14402676Seschrock 14412676Seschrock case ZFS_PROP_VOLBLOCKSIZE: 14422676Seschrock if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14434577Sahrens (error = zvol_set_volblocksize(name, intval)) != 0) 14444577Sahrens return (error); 14454577Sahrens break; 14464577Sahrens 14474577Sahrens case ZFS_PROP_VERSION: 14484577Sahrens if ((error = nvpair_value_uint64(elem, &intval)) != 0 || 14494577Sahrens (error = zfs_set_version(name, intval)) != 0) 14502676Seschrock return (error); 14512676Seschrock break; 14522676Seschrock 14532676Seschrock default: 14542676Seschrock if (nvpair_type(elem) == DATA_TYPE_STRING) { 14552676Seschrock if (zfs_prop_get_type(prop) != 14564787Sahrens PROP_TYPE_STRING) 14572676Seschrock return (EINVAL); 14582717Seschrock VERIFY(nvpair_value_string(elem, &strval) == 0); 14592717Seschrock if ((error = dsl_prop_set(name, 14602676Seschrock nvpair_name(elem), 1, strlen(strval) + 1, 14612717Seschrock strval)) != 0) 14622717Seschrock return (error); 14632676Seschrock } else if (nvpair_type(elem) == DATA_TYPE_UINT64) { 14642885Sahrens const char *unused; 14652885Sahrens 14662717Seschrock VERIFY(nvpair_value_uint64(elem, &intval) == 0); 14672676Seschrock 14682676Seschrock switch (zfs_prop_get_type(prop)) { 14694787Sahrens case PROP_TYPE_NUMBER: 14702676Seschrock break; 14714787Sahrens case PROP_TYPE_STRING: 14722717Seschrock return (EINVAL); 14734787Sahrens case PROP_TYPE_INDEX: 14742717Seschrock if (zfs_prop_index_to_string(prop, 14752717Seschrock intval, &unused) != 0) 14762717Seschrock return (EINVAL); 14772676Seschrock break; 14782676Seschrock default: 14794577Sahrens cmn_err(CE_PANIC, 14804577Sahrens "unknown property type"); 14812676Seschrock break; 14822676Seschrock } 14832676Seschrock 14842717Seschrock if ((error = dsl_prop_set(name, propname, 14852717Seschrock 8, 1, &intval)) != 0) 14862717Seschrock return (error); 14872676Seschrock } else { 14882676Seschrock return (EINVAL); 14892676Seschrock } 14902676Seschrock break; 14912676Seschrock } 14922676Seschrock } 14932676Seschrock 14942676Seschrock return (0); 1495789Sahrens } 1496789Sahrens 14975367Sahrens /* 14985367Sahrens * inputs: 14995367Sahrens * zc_name name of filesystem 15005367Sahrens * zc_value name of property to inherit 15015367Sahrens * zc_nvlist_src{_size} nvlist of properties to apply 15025367Sahrens * 15035367Sahrens * outputs: none 15045367Sahrens */ 1505789Sahrens static int 15062676Seschrock zfs_ioc_set_prop(zfs_cmd_t *zc) 1507789Sahrens { 15082676Seschrock nvlist_t *nvl; 15092676Seschrock int error; 1510789Sahrens 15115094Slling if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 15125094Slling &nvl)) != 0) 15132676Seschrock return (error); 15142676Seschrock 15154787Sahrens error = zfs_set_prop_nvlist(zc->zc_name, nvl); 15164543Smarks 15172676Seschrock nvlist_free(nvl); 15182676Seschrock return (error); 1519789Sahrens } 1520789Sahrens 15215367Sahrens /* 15225367Sahrens * inputs: 15235367Sahrens * zc_name name of filesystem 15245367Sahrens * zc_value name of property to inherit 15255367Sahrens * 15265367Sahrens * outputs: none 15275367Sahrens */ 1528789Sahrens static int 15294849Sahrens zfs_ioc_inherit_prop(zfs_cmd_t *zc) 15304849Sahrens { 15314849Sahrens /* the property name has been validated by zfs_secpolicy_inherit() */ 15324849Sahrens return (dsl_prop_set(zc->zc_name, zc->zc_value, 0, 0, NULL)); 15334849Sahrens } 15344849Sahrens 15354849Sahrens static int 15364098Slling zfs_ioc_pool_set_props(zfs_cmd_t *zc) 15373912Slling { 15385094Slling nvlist_t *props; 15393912Slling spa_t *spa; 15405094Slling int error; 15413912Slling 15425094Slling if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 15435094Slling &props))) 15443912Slling return (error); 15453912Slling 15463912Slling if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) { 15475094Slling nvlist_free(props); 15483912Slling return (error); 15493912Slling } 15503912Slling 15515094Slling error = spa_prop_set(spa, props); 15523912Slling 15535094Slling nvlist_free(props); 15543912Slling spa_close(spa, FTAG); 15553912Slling 15563912Slling return (error); 15573912Slling } 15583912Slling 15593912Slling static int 15604098Slling zfs_ioc_pool_get_props(zfs_cmd_t *zc) 15613912Slling { 15623912Slling spa_t *spa; 15633912Slling int error; 15643912Slling nvlist_t *nvp = NULL; 15653912Slling 15663912Slling if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 15673912Slling return (error); 15683912Slling 15695094Slling error = spa_prop_get(spa, &nvp); 15703912Slling 15713912Slling if (error == 0 && zc->zc_nvlist_dst != NULL) 15723912Slling error = put_nvlist(zc, nvp); 15733912Slling else 15743912Slling error = EFAULT; 15753912Slling 15763912Slling spa_close(spa, FTAG); 15773912Slling 15783912Slling if (nvp) 15793912Slling nvlist_free(nvp); 15803912Slling return (error); 15813912Slling } 15823912Slling 15833912Slling static int 15844543Smarks zfs_ioc_iscsi_perm_check(zfs_cmd_t *zc) 15854543Smarks { 15864543Smarks nvlist_t *nvp; 15874543Smarks int error; 15884543Smarks uint32_t uid; 15894543Smarks uint32_t gid; 15904543Smarks uint32_t *groups; 15914543Smarks uint_t group_cnt; 15924543Smarks cred_t *usercred; 15934543Smarks 15945094Slling if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 15955094Slling &nvp)) != 0) { 15964543Smarks return (error); 15974543Smarks } 15984543Smarks 15994543Smarks if ((error = nvlist_lookup_uint32(nvp, 16004543Smarks ZFS_DELEG_PERM_UID, &uid)) != 0) { 16014543Smarks nvlist_free(nvp); 16024543Smarks return (EPERM); 16034543Smarks } 16044543Smarks 16054543Smarks if ((error = nvlist_lookup_uint32(nvp, 16064543Smarks ZFS_DELEG_PERM_GID, &gid)) != 0) { 16074543Smarks nvlist_free(nvp); 16084543Smarks return (EPERM); 16094543Smarks } 16104543Smarks 16114543Smarks if ((error = nvlist_lookup_uint32_array(nvp, ZFS_DELEG_PERM_GROUPS, 16124543Smarks &groups, &group_cnt)) != 0) { 16134543Smarks nvlist_free(nvp); 16144543Smarks return (EPERM); 16154543Smarks } 16164543Smarks usercred = cralloc(); 16174543Smarks if ((crsetugid(usercred, uid, gid) != 0) || 16184543Smarks (crsetgroups(usercred, group_cnt, (gid_t *)groups) != 0)) { 16194543Smarks nvlist_free(nvp); 16204543Smarks crfree(usercred); 16214543Smarks return (EPERM); 16224543Smarks } 16234543Smarks nvlist_free(nvp); 16244543Smarks error = dsl_deleg_access(zc->zc_name, 16254787Sahrens zfs_prop_to_name(ZFS_PROP_SHAREISCSI), usercred); 16264543Smarks crfree(usercred); 16274543Smarks return (error); 16284543Smarks } 16294543Smarks 16305367Sahrens /* 16315367Sahrens * inputs: 16325367Sahrens * zc_name name of filesystem 16335367Sahrens * zc_nvlist_src{_size} nvlist of delegated permissions 16345367Sahrens * zc_perm_action allow/unallow flag 16355367Sahrens * 16365367Sahrens * outputs: none 16375367Sahrens */ 16384543Smarks static int 16394543Smarks zfs_ioc_set_fsacl(zfs_cmd_t *zc) 16404543Smarks { 16414543Smarks int error; 16424543Smarks nvlist_t *fsaclnv = NULL; 16434543Smarks 16445094Slling if ((error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 16455094Slling &fsaclnv)) != 0) 16464543Smarks return (error); 16474543Smarks 16484543Smarks /* 16494543Smarks * Verify nvlist is constructed correctly 16504543Smarks */ 16514543Smarks if ((error = zfs_deleg_verify_nvlist(fsaclnv)) != 0) { 16524543Smarks nvlist_free(fsaclnv); 16534543Smarks return (EINVAL); 16544543Smarks } 16554543Smarks 16564543Smarks /* 16574543Smarks * If we don't have PRIV_SYS_MOUNT, then validate 16584543Smarks * that user is allowed to hand out each permission in 16594543Smarks * the nvlist(s) 16604543Smarks */ 16614543Smarks 16624787Sahrens error = secpolicy_zfs(CRED()); 16634543Smarks if (error) { 16644787Sahrens if (zc->zc_perm_action == B_FALSE) { 16654787Sahrens error = dsl_deleg_can_allow(zc->zc_name, 16664787Sahrens fsaclnv, CRED()); 16674787Sahrens } else { 16684787Sahrens error = dsl_deleg_can_unallow(zc->zc_name, 16694787Sahrens fsaclnv, CRED()); 16704787Sahrens } 16714543Smarks } 16724543Smarks 16734543Smarks if (error == 0) 16744543Smarks error = dsl_deleg_set(zc->zc_name, fsaclnv, zc->zc_perm_action); 16754543Smarks 16764543Smarks nvlist_free(fsaclnv); 16774543Smarks return (error); 16784543Smarks } 16794543Smarks 16805367Sahrens /* 16815367Sahrens * inputs: 16825367Sahrens * zc_name name of filesystem 16835367Sahrens * 16845367Sahrens * outputs: 16855367Sahrens * zc_nvlist_src{_size} nvlist of delegated permissions 16865367Sahrens */ 16874543Smarks static int 16884543Smarks zfs_ioc_get_fsacl(zfs_cmd_t *zc) 16894543Smarks { 16904543Smarks nvlist_t *nvp; 16914543Smarks int error; 16924543Smarks 16934543Smarks if ((error = dsl_deleg_get(zc->zc_name, &nvp)) == 0) { 16944543Smarks error = put_nvlist(zc, nvp); 16954543Smarks nvlist_free(nvp); 16964543Smarks } 16974543Smarks 16984543Smarks return (error); 16994543Smarks } 17004543Smarks 17015367Sahrens /* 17025367Sahrens * inputs: 17035367Sahrens * zc_name name of volume 17045367Sahrens * 17055367Sahrens * outputs: none 17065367Sahrens */ 17074543Smarks static int 1708789Sahrens zfs_ioc_create_minor(zfs_cmd_t *zc) 1709789Sahrens { 17104787Sahrens return (zvol_create_minor(zc->zc_name, ddi_driver_major(zfs_dip))); 1711789Sahrens } 1712789Sahrens 17135367Sahrens /* 17145367Sahrens * inputs: 17155367Sahrens * zc_name name of volume 17165367Sahrens * 17175367Sahrens * outputs: none 17185367Sahrens */ 1719789Sahrens static int 1720789Sahrens zfs_ioc_remove_minor(zfs_cmd_t *zc) 1721789Sahrens { 17222676Seschrock return (zvol_remove_minor(zc->zc_name)); 1723789Sahrens } 1724789Sahrens 1725789Sahrens /* 1726789Sahrens * Search the vfs list for a specified resource. Returns a pointer to it 1727789Sahrens * or NULL if no suitable entry is found. The caller of this routine 1728789Sahrens * is responsible for releasing the returned vfs pointer. 1729789Sahrens */ 1730789Sahrens static vfs_t * 1731789Sahrens zfs_get_vfs(const char *resource) 1732789Sahrens { 1733789Sahrens struct vfs *vfsp; 1734789Sahrens struct vfs *vfs_found = NULL; 1735789Sahrens 1736789Sahrens vfs_list_read_lock(); 1737789Sahrens vfsp = rootvfs; 1738789Sahrens do { 1739789Sahrens if (strcmp(refstr_value(vfsp->vfs_resource), resource) == 0) { 1740789Sahrens VFS_HOLD(vfsp); 1741789Sahrens vfs_found = vfsp; 1742789Sahrens break; 1743789Sahrens } 1744789Sahrens vfsp = vfsp->vfs_next; 1745789Sahrens } while (vfsp != rootvfs); 1746789Sahrens vfs_list_unlock(); 1747789Sahrens return (vfs_found); 1748789Sahrens } 1749789Sahrens 17504543Smarks /* ARGSUSED */ 1751789Sahrens static void 17524543Smarks zfs_create_cb(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx) 1753789Sahrens { 17545331Samw zfs_creat_t *zct = arg; 17555331Samw uint64_t version; 17565331Samw 17575331Samw if (spa_version(dmu_objset_spa(os)) >= SPA_VERSION_FUID) 17585331Samw version = ZPL_VERSION; 17595331Samw else 17605331Samw version = ZPL_VERSION_FUID - 1; 17615331Samw 17625331Samw (void) nvlist_lookup_uint64(zct->zct_props, 17634577Sahrens zfs_prop_to_name(ZFS_PROP_VERSION), &version); 17644577Sahrens 17655331Samw zfs_create_fs(os, cr, version, zct->zct_norm, tx); 17665331Samw } 17675331Samw 17685331Samw /* 17695331Samw * zfs_prop_lookup() 17705331Samw * 17715331Samw * Look for the property first in the existing property nvlist. If 17725331Samw * it's already present, you're done. If it's not there, attempt to 17735331Samw * find the property value from a parent dataset. If that fails, fall 17745331Samw * back to the property's default value. In either of these two 17755331Samw * cases, if update is TRUE, add a value for the property to the 17765331Samw * property nvlist. 17775331Samw * 17785331Samw * If the rval pointer is non-NULL, copy the discovered value to rval. 17795331Samw * 17805331Samw * If we get any unexpected errors, bail and return the error number 17815331Samw * to the caller. 17825331Samw * 17835331Samw * If we succeed, return 0. 17845331Samw */ 17855331Samw static int 17865331Samw zfs_prop_lookup(const char *parentname, zfs_prop_t propnum, 17875331Samw nvlist_t *proplist, uint64_t *rval, boolean_t update) 17885331Samw { 17895331Samw const char *propname; 17905331Samw uint64_t value; 17915331Samw int error = ENOENT; 17925331Samw 17935331Samw propname = zfs_prop_to_name(propnum); 17945331Samw if (proplist != NULL) 17955331Samw error = nvlist_lookup_uint64(proplist, propname, &value); 17965331Samw if (error == ENOENT) { 17975331Samw error = dsl_prop_get_integer(parentname, propname, 17985331Samw &value, NULL); 17995331Samw if (error == ENOENT) 18005331Samw value = zfs_prop_default_numeric(propnum); 18015331Samw else if (error != 0) 18025331Samw return (error); 18035331Samw if (update) { 18045331Samw ASSERT(proplist != NULL); 18055331Samw error = nvlist_add_uint64(proplist, propname, value); 18065331Samw } 18075331Samw } 18085331Samw if (error == 0 && rval) 18095331Samw *rval = value; 18105331Samw return (error); 18115331Samw } 18125331Samw 18135331Samw /* 18145331Samw * zfs_normalization_get 18155331Samw * 18165331Samw * Get the normalization flag value. If the properties have 18175331Samw * non-default values, make sure the pool version is recent enough to 18185331Samw * support these choices. 18195331Samw */ 18205331Samw static int 18215331Samw zfs_normalization_get(const char *dataset, nvlist_t *proplist, int *norm, 18225331Samw boolean_t update) 18235331Samw { 18245331Samw char parentname[MAXNAMELEN]; 18255331Samw char poolname[MAXNAMELEN]; 18265331Samw char *cp; 18275331Samw uint64_t value; 18285331Samw int check = 0; 18295331Samw int error; 18305331Samw 18315331Samw ASSERT(norm != NULL); 18325331Samw *norm = 0; 18335331Samw 18345331Samw (void) strncpy(parentname, dataset, sizeof (parentname)); 18355331Samw cp = strrchr(parentname, '@'); 18365331Samw if (cp != NULL) { 18375331Samw cp[0] = '\0'; 18385331Samw } else { 18395331Samw cp = strrchr(parentname, '/'); 18405331Samw if (cp == NULL) 18415331Samw return (ENOENT); 18425331Samw cp[0] = '\0'; 18435331Samw } 18445331Samw 18455331Samw (void) strncpy(poolname, dataset, sizeof (poolname)); 18465331Samw cp = strchr(poolname, '/'); 18475331Samw if (cp != NULL) 18485331Samw cp[0] = '\0'; 18495331Samw 18505375Stimh /* 18515375Stimh * Make sure pool is of new enough vintage to support normalization. 18525375Stimh */ 18535375Stimh if (zfs_check_version(poolname, SPA_VERSION_NORMALIZATION)) 18545375Stimh return (0); 18555375Stimh 18565331Samw error = zfs_prop_lookup(parentname, ZFS_PROP_UTF8ONLY, 18575331Samw proplist, &value, update); 18585331Samw if (error != 0) 18595331Samw return (error); 18605331Samw if (value != zfs_prop_default_numeric(ZFS_PROP_UTF8ONLY)) 18615331Samw check = 1; 18625331Samw 18635331Samw error = zfs_prop_lookup(parentname, ZFS_PROP_NORMALIZE, 18645331Samw proplist, &value, update); 18655331Samw if (error != 0) 18665331Samw return (error); 18675331Samw if (value != zfs_prop_default_numeric(ZFS_PROP_NORMALIZE)) { 18685331Samw check = 1; 18695331Samw switch ((int)value) { 18705331Samw case ZFS_NORMALIZE_NONE: 18715331Samw break; 18725331Samw case ZFS_NORMALIZE_C: 18735331Samw *norm |= U8_TEXTPREP_NFC; 18745331Samw break; 18755331Samw case ZFS_NORMALIZE_D: 18765331Samw *norm |= U8_TEXTPREP_NFD; 18775331Samw break; 18785331Samw case ZFS_NORMALIZE_KC: 18795331Samw *norm |= U8_TEXTPREP_NFKC; 18805331Samw break; 18815331Samw case ZFS_NORMALIZE_KD: 18825331Samw *norm |= U8_TEXTPREP_NFKD; 18835331Samw break; 18845331Samw default: 18855331Samw ASSERT((int)value >= ZFS_NORMALIZE_NONE); 18865331Samw ASSERT((int)value <= ZFS_NORMALIZE_KD); 18875331Samw break; 18885331Samw } 18895331Samw } 18905331Samw 18915331Samw error = zfs_prop_lookup(parentname, ZFS_PROP_CASE, 18925331Samw proplist, &value, update); 18935331Samw if (error != 0) 18945331Samw return (error); 18955331Samw if (value != zfs_prop_default_numeric(ZFS_PROP_CASE)) { 18965331Samw check = 1; 18975331Samw switch ((int)value) { 18985331Samw case ZFS_CASE_SENSITIVE: 18995331Samw break; 19005331Samw case ZFS_CASE_INSENSITIVE: 19015331Samw *norm |= U8_TEXTPREP_TOUPPER; 19025331Samw break; 19035331Samw case ZFS_CASE_MIXED: 19045331Samw *norm |= U8_TEXTPREP_TOUPPER; 19055331Samw break; 19065331Samw default: 19075331Samw ASSERT((int)value >= ZFS_CASE_SENSITIVE); 19085331Samw ASSERT((int)value <= ZFS_CASE_MIXED); 19095331Samw break; 19105331Samw } 19115331Samw } 19125331Samw 19135375Stimh /* 19145375Stimh * At the moment we are disabling non-default values for these 19155375Stimh * properties because they cannot be preserved properly with a 19165375Stimh * zfs send. 19175375Stimh */ 19185331Samw if (check == 1) 19195375Stimh return (ENOTSUP); 19205375Stimh 19215331Samw return (0); 1922789Sahrens } 1923789Sahrens 19245367Sahrens /* 19255367Sahrens * inputs: 19265367Sahrens * zc_objset_type type of objset to create (fs vs zvol) 19275367Sahrens * zc_name name of new objset 19285367Sahrens * zc_value name of snapshot to clone from (may be empty) 19295367Sahrens * zc_nvlist_src{_size} nvlist of properties to apply 19305367Sahrens * 19315367Sahrens * outputs: none 19325367Sahrens */ 1933789Sahrens static int 1934789Sahrens zfs_ioc_create(zfs_cmd_t *zc) 1935789Sahrens { 1936789Sahrens objset_t *clone; 1937789Sahrens int error = 0; 19385331Samw zfs_creat_t zct; 19394543Smarks nvlist_t *nvprops = NULL; 19404543Smarks void (*cbfunc)(objset_t *os, void *arg, cred_t *cr, dmu_tx_t *tx); 1941789Sahrens dmu_objset_type_t type = zc->zc_objset_type; 1942789Sahrens 1943789Sahrens switch (type) { 1944789Sahrens 1945789Sahrens case DMU_OST_ZFS: 1946789Sahrens cbfunc = zfs_create_cb; 1947789Sahrens break; 1948789Sahrens 1949789Sahrens case DMU_OST_ZVOL: 1950789Sahrens cbfunc = zvol_create_cb; 1951789Sahrens break; 1952789Sahrens 1953789Sahrens default: 19542199Sahrens cbfunc = NULL; 19552199Sahrens } 19565326Sek110237 if (strchr(zc->zc_name, '@') || 19575326Sek110237 strchr(zc->zc_name, '%')) 1958789Sahrens return (EINVAL); 1959789Sahrens 19602676Seschrock if (zc->zc_nvlist_src != NULL && 19615094Slling (error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 19625094Slling &nvprops)) != 0) 19632676Seschrock return (error); 19642676Seschrock 19655331Samw zct.zct_norm = 0; 19665331Samw zct.zct_props = nvprops; 19675331Samw 19682676Seschrock if (zc->zc_value[0] != '\0') { 1969789Sahrens /* 1970789Sahrens * We're creating a clone of an existing snapshot. 1971789Sahrens */ 19722676Seschrock zc->zc_value[sizeof (zc->zc_value) - 1] = '\0'; 19732676Seschrock if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0) { 19744543Smarks nvlist_free(nvprops); 1975789Sahrens return (EINVAL); 19762676Seschrock } 1977789Sahrens 19782676Seschrock error = dmu_objset_open(zc->zc_value, type, 1979789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &clone); 19802676Seschrock if (error) { 19814543Smarks nvlist_free(nvprops); 1982789Sahrens return (error); 19832676Seschrock } 1984789Sahrens error = dmu_objset_create(zc->zc_name, type, clone, NULL, NULL); 19855331Samw if (error) { 19865331Samw dmu_objset_close(clone); 19875331Samw nvlist_free(nvprops); 19885331Samw return (error); 19895331Samw } 19905331Samw /* 19915331Samw * If caller did not provide any properties, allocate 19925331Samw * an nvlist for properties, as we will be adding our set-once 19935331Samw * properties to it. This carries the choices made on the 19945331Samw * original file system into the clone. 19955331Samw */ 19965331Samw if (nvprops == NULL) 19975331Samw VERIFY(nvlist_alloc(&nvprops, 19985331Samw NV_UNIQUE_NAME, KM_SLEEP) == 0); 19995331Samw 20005331Samw /* 20015331Samw * We have to have normalization and case-folding 20025331Samw * flags correct when we do the file system creation, 20035331Samw * so go figure them out now. All we really care about 20045331Samw * here is getting these values into the property list. 20055331Samw */ 20065331Samw error = zfs_normalization_get(zc->zc_value, nvprops, 20075331Samw &zct.zct_norm, B_TRUE); 20085331Samw if (error != 0) { 20095331Samw dmu_objset_close(clone); 20105331Samw nvlist_free(nvprops); 20115331Samw return (error); 20125331Samw } 2013789Sahrens dmu_objset_close(clone); 2014789Sahrens } else { 20152676Seschrock if (cbfunc == NULL) { 20164543Smarks nvlist_free(nvprops); 20172199Sahrens return (EINVAL); 20182676Seschrock } 20192676Seschrock 2020789Sahrens if (type == DMU_OST_ZVOL) { 20212676Seschrock uint64_t volsize, volblocksize; 20222676Seschrock 20234543Smarks if (nvprops == NULL || 20244543Smarks nvlist_lookup_uint64(nvprops, 20252676Seschrock zfs_prop_to_name(ZFS_PROP_VOLSIZE), 20262676Seschrock &volsize) != 0) { 20274543Smarks nvlist_free(nvprops); 20282676Seschrock return (EINVAL); 20292676Seschrock } 20302676Seschrock 20314543Smarks if ((error = nvlist_lookup_uint64(nvprops, 20322676Seschrock zfs_prop_to_name(ZFS_PROP_VOLBLOCKSIZE), 20332676Seschrock &volblocksize)) != 0 && error != ENOENT) { 20344543Smarks nvlist_free(nvprops); 20352676Seschrock return (EINVAL); 20362676Seschrock } 20371133Seschrock 20382676Seschrock if (error != 0) 20392676Seschrock volblocksize = zfs_prop_default_numeric( 20402676Seschrock ZFS_PROP_VOLBLOCKSIZE); 20412676Seschrock 20422676Seschrock if ((error = zvol_check_volblocksize( 20432676Seschrock volblocksize)) != 0 || 20442676Seschrock (error = zvol_check_volsize(volsize, 20452676Seschrock volblocksize)) != 0) { 20464543Smarks nvlist_free(nvprops); 2047789Sahrens return (error); 20482676Seschrock } 20494577Sahrens } else if (type == DMU_OST_ZFS) { 20504577Sahrens uint64_t version; 20515331Samw int error; 20525331Samw 20535331Samw error = nvlist_lookup_uint64(nvprops, 20545331Samw zfs_prop_to_name(ZFS_PROP_VERSION), &version); 20555331Samw 20565331Samw if (error == 0 && (version < ZPL_VERSION_INITIAL || 20574577Sahrens version > ZPL_VERSION)) { 20584577Sahrens nvlist_free(nvprops); 20595331Samw return (ENOTSUP); 20605331Samw } else if (error == 0 && version >= ZPL_VERSION_FUID && 20615331Samw zfs_check_version(zc->zc_name, SPA_VERSION_FUID)) { 20625331Samw nvlist_free(nvprops); 20635331Samw return (ENOTSUP); 20645331Samw } 20655331Samw 20665331Samw /* 20675331Samw * We have to have normalization and 20685331Samw * case-folding flags correct when we do the 20695331Samw * file system creation, so go figure them out 20705331Samw * now. The final argument to zfs_normalization_get() 20715331Samw * tells that routine not to update the nvprops 20725331Samw * list. 20735331Samw */ 20745331Samw error = zfs_normalization_get(zc->zc_name, nvprops, 20755331Samw &zct.zct_norm, B_FALSE); 20765331Samw if (error != 0) { 20775331Samw nvlist_free(nvprops); 20785331Samw return (error); 20794577Sahrens } 20802676Seschrock } 20812676Seschrock error = dmu_objset_create(zc->zc_name, type, NULL, cbfunc, 20825331Samw &zct); 2083789Sahrens } 20842676Seschrock 20852676Seschrock /* 20862676Seschrock * It would be nice to do this atomically. 20872676Seschrock */ 20882676Seschrock if (error == 0) { 20894787Sahrens if ((error = zfs_set_prop_nvlist(zc->zc_name, nvprops)) != 0) 20902676Seschrock (void) dmu_objset_destroy(zc->zc_name); 20912676Seschrock } 20922676Seschrock 20934543Smarks nvlist_free(nvprops); 2094789Sahrens return (error); 2095789Sahrens } 2096789Sahrens 20975367Sahrens /* 20985367Sahrens * inputs: 20995367Sahrens * zc_name name of filesystem 21005367Sahrens * zc_value short name of snapshot 21015367Sahrens * zc_cookie recursive flag 21025367Sahrens * 21035367Sahrens * outputs: none 21045367Sahrens */ 2105789Sahrens static int 21062199Sahrens zfs_ioc_snapshot(zfs_cmd_t *zc) 21072199Sahrens { 21082676Seschrock if (snapshot_namecheck(zc->zc_value, NULL, NULL) != 0) 21092199Sahrens return (EINVAL); 21102199Sahrens return (dmu_objset_snapshot(zc->zc_name, 21112676Seschrock zc->zc_value, zc->zc_cookie)); 21122199Sahrens } 21132199Sahrens 21144007Smmusante int 21152199Sahrens zfs_unmount_snap(char *name, void *arg) 2116789Sahrens { 21172199Sahrens char *snapname = arg; 21182199Sahrens char *cp; 21192417Sahrens vfs_t *vfsp = NULL; 21202199Sahrens 21212199Sahrens /* 21222199Sahrens * Snapshots (which are under .zfs control) must be unmounted 21232199Sahrens * before they can be destroyed. 21242199Sahrens */ 21252199Sahrens 21262199Sahrens if (snapname) { 21272199Sahrens (void) strcat(name, "@"); 21282199Sahrens (void) strcat(name, snapname); 21292199Sahrens vfsp = zfs_get_vfs(name); 21302199Sahrens cp = strchr(name, '@'); 21312199Sahrens *cp = '\0'; 21322417Sahrens } else if (strchr(name, '@')) { 21332199Sahrens vfsp = zfs_get_vfs(name); 21342199Sahrens } 21352199Sahrens 21362199Sahrens if (vfsp) { 21372199Sahrens /* 21382199Sahrens * Always force the unmount for snapshots. 21392199Sahrens */ 21402199Sahrens int flag = MS_FORCE; 2141789Sahrens int err; 2142789Sahrens 21432199Sahrens if ((err = vn_vfswlock(vfsp->vfs_vnodecovered)) != 0) { 21442199Sahrens VFS_RELE(vfsp); 21452199Sahrens return (err); 21462199Sahrens } 21472199Sahrens VFS_RELE(vfsp); 21482199Sahrens if ((err = dounmount(vfsp, flag, kcred)) != 0) 21492199Sahrens return (err); 21502199Sahrens } 21512199Sahrens return (0); 21522199Sahrens } 21532199Sahrens 21545367Sahrens /* 21555367Sahrens * inputs: 21565367Sahrens * zc_name name of filesystem 21575367Sahrens * zc_value short name of snapshot 21585367Sahrens * 21595367Sahrens * outputs: none 21605367Sahrens */ 21612199Sahrens static int 21622199Sahrens zfs_ioc_destroy_snaps(zfs_cmd_t *zc) 21632199Sahrens { 21642199Sahrens int err; 2165789Sahrens 21662676Seschrock if (snapshot_namecheck(zc->zc_value, NULL, NULL) != 0) 21672199Sahrens return (EINVAL); 21682199Sahrens err = dmu_objset_find(zc->zc_name, 21692676Seschrock zfs_unmount_snap, zc->zc_value, DS_FIND_CHILDREN); 21702199Sahrens if (err) 21712199Sahrens return (err); 21722676Seschrock return (dmu_snapshots_destroy(zc->zc_name, zc->zc_value)); 21732199Sahrens } 21742199Sahrens 21755367Sahrens /* 21765367Sahrens * inputs: 21775367Sahrens * zc_name name of dataset to destroy 21785367Sahrens * zc_objset_type type of objset 21795367Sahrens * 21805367Sahrens * outputs: none 21815367Sahrens */ 21822199Sahrens static int 21832199Sahrens zfs_ioc_destroy(zfs_cmd_t *zc) 21842199Sahrens { 21852199Sahrens if (strchr(zc->zc_name, '@') && zc->zc_objset_type == DMU_OST_ZFS) { 21862199Sahrens int err = zfs_unmount_snap(zc->zc_name, NULL); 21872199Sahrens if (err) 21882199Sahrens return (err); 2189789Sahrens } 2190789Sahrens 2191789Sahrens return (dmu_objset_destroy(zc->zc_name)); 2192789Sahrens } 2193789Sahrens 21945367Sahrens /* 21955367Sahrens * inputs: 21965367Sahrens * zc_name name of snapshot to roll back to 21975367Sahrens * 21985367Sahrens * outputs: none 21995367Sahrens */ 2200789Sahrens static int 2201789Sahrens zfs_ioc_rollback(zfs_cmd_t *zc) 2202789Sahrens { 2203789Sahrens return (dmu_objset_rollback(zc->zc_name)); 2204789Sahrens } 2205789Sahrens 22065367Sahrens /* 22075367Sahrens * inputs: 22085367Sahrens * zc_name old name of dataset 22095367Sahrens * zc_value new name of dataset 22105367Sahrens * zc_cookie recursive flag (only valid for snapshots) 22115367Sahrens * 22125367Sahrens * outputs: none 22135367Sahrens */ 2214789Sahrens static int 2215789Sahrens zfs_ioc_rename(zfs_cmd_t *zc) 2216789Sahrens { 22174490Svb160487 boolean_t recursive = zc->zc_cookie & 1; 22184007Smmusante 22192676Seschrock zc->zc_value[sizeof (zc->zc_value) - 1] = '\0'; 22205326Sek110237 if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0 || 22215326Sek110237 strchr(zc->zc_value, '%')) 2222789Sahrens return (EINVAL); 2223789Sahrens 22244007Smmusante /* 22254007Smmusante * Unmount snapshot unless we're doing a recursive rename, 22264007Smmusante * in which case the dataset code figures out which snapshots 22274007Smmusante * to unmount. 22284007Smmusante */ 22294007Smmusante if (!recursive && strchr(zc->zc_name, '@') != NULL && 2230789Sahrens zc->zc_objset_type == DMU_OST_ZFS) { 22312199Sahrens int err = zfs_unmount_snap(zc->zc_name, NULL); 22322199Sahrens if (err) 22332199Sahrens return (err); 2234789Sahrens } 2235789Sahrens 22364007Smmusante return (dmu_objset_rename(zc->zc_name, zc->zc_value, recursive)); 2237789Sahrens } 2238789Sahrens 22395367Sahrens /* 22405367Sahrens * inputs: 22415367Sahrens * zc_name name of containing filesystem 22425367Sahrens * zc_nvlist_src{_size} nvlist of properties to apply 22435367Sahrens * zc_value name of snapshot to create 22445367Sahrens * zc_string name of clone origin (if DRR_FLAG_CLONE) 22455367Sahrens * zc_cookie file descriptor to recv from 22465367Sahrens * zc_begin_record the BEGIN record of the stream (not byteswapped) 22475367Sahrens * zc_guid force flag 22485367Sahrens * 22495367Sahrens * outputs: 22505367Sahrens * zc_cookie number of bytes read 22515367Sahrens */ 2252789Sahrens static int 22535367Sahrens zfs_ioc_recv(zfs_cmd_t *zc) 2254789Sahrens { 2255789Sahrens file_t *fp; 22565326Sek110237 objset_t *os; 22575367Sahrens dmu_recv_cookie_t drc; 22585326Sek110237 zfsvfs_t *zfsvfs = NULL; 22595326Sek110237 boolean_t force = (boolean_t)zc->zc_guid; 2260789Sahrens int error, fd; 22615367Sahrens offset_t off; 22625367Sahrens nvlist_t *props = NULL; 22635367Sahrens objset_t *origin = NULL; 22645367Sahrens char *tosnap; 22655367Sahrens char tofs[ZFS_MAXNAMELEN]; 2266789Sahrens 22673265Sahrens if (dataset_namecheck(zc->zc_value, NULL, NULL) != 0 || 22685326Sek110237 strchr(zc->zc_value, '@') == NULL || 22695326Sek110237 strchr(zc->zc_value, '%')) 22703265Sahrens return (EINVAL); 22713265Sahrens 22725367Sahrens (void) strcpy(tofs, zc->zc_value); 22735367Sahrens tosnap = strchr(tofs, '@'); 22745367Sahrens *tosnap = '\0'; 22755367Sahrens tosnap++; 22765367Sahrens 22775367Sahrens if (zc->zc_nvlist_src != NULL && 22785367Sahrens (error = get_nvlist(zc->zc_nvlist_src, zc->zc_nvlist_src_size, 22795367Sahrens &props)) != 0) 22805367Sahrens return (error); 22815367Sahrens 2282789Sahrens fd = zc->zc_cookie; 2283789Sahrens fp = getf(fd); 22845367Sahrens if (fp == NULL) { 22855367Sahrens nvlist_free(props); 2286789Sahrens return (EBADF); 22875367Sahrens } 22885326Sek110237 22895326Sek110237 /* 22905326Sek110237 * Get the zfsvfs for the receiving objset. There 22915326Sek110237 * won't be one if we're operating on a zvol, if the 22925326Sek110237 * objset doesn't exist yet, or is not mounted. 22935326Sek110237 */ 22945367Sahrens 22955367Sahrens error = dmu_objset_open(tofs, DMU_OST_ANY, 22965326Sek110237 DS_MODE_STANDARD | DS_MODE_READONLY, &os); 22975326Sek110237 if (!error) { 22985326Sek110237 if (dmu_objset_type(os) == DMU_OST_ZFS) { 22995326Sek110237 mutex_enter(&os->os->os_user_ptr_lock); 23005326Sek110237 zfsvfs = dmu_objset_get_user(os); 23015326Sek110237 if (zfsvfs != NULL) 23025326Sek110237 VFS_HOLD(zfsvfs->z_vfs); 23035326Sek110237 mutex_exit(&os->os->os_user_ptr_lock); 23045326Sek110237 } 23055326Sek110237 dmu_objset_close(os); 23065326Sek110237 } 23075326Sek110237 23085367Sahrens if (zc->zc_string[0]) { 23095367Sahrens error = dmu_objset_open(zc->zc_string, DMU_OST_ANY, 23105367Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &origin); 23115367Sahrens if (error) { 23125367Sahrens if (zfsvfs != NULL) 23135367Sahrens VFS_RELE(zfsvfs->z_vfs); 23145367Sahrens nvlist_free(props); 23155367Sahrens releasef(fd); 23165367Sahrens return (error); 23175367Sahrens } 23185367Sahrens } 23195367Sahrens 23205367Sahrens error = dmu_recv_begin(tofs, tosnap, &zc->zc_begin_record, 23215367Sahrens force, origin, zfsvfs != NULL, &drc); 23225367Sahrens if (origin) 23235367Sahrens dmu_objset_close(origin); 23245367Sahrens if (error) { 23255367Sahrens if (zfsvfs != NULL) 23265367Sahrens VFS_RELE(zfsvfs->z_vfs); 23275367Sahrens nvlist_free(props); 23285367Sahrens releasef(fd); 23295367Sahrens return (error); 23305367Sahrens } 23315326Sek110237 23325326Sek110237 /* 23335367Sahrens * If properties are supplied, they are to completely replace 23345367Sahrens * the existing ones; "inherit" any existing properties. 23355326Sek110237 */ 23365367Sahrens if (props) { 23375367Sahrens objset_t *os; 23385367Sahrens nvlist_t *nv = NULL; 23395367Sahrens 23405367Sahrens error = dmu_objset_open(tofs, DMU_OST_ANY, 23415367Sahrens DS_MODE_STANDARD | DS_MODE_READONLY | DS_MODE_INCONSISTENT, 23425367Sahrens &os); 23435367Sahrens if (error == 0) { 23445367Sahrens error = dsl_prop_get_all(os, &nv); 23455367Sahrens dmu_objset_close(os); 23465367Sahrens } 23475367Sahrens if (error == 0) { 23485367Sahrens nvpair_t *elem; 23495367Sahrens zfs_cmd_t zc2 = { 0 }; 23505367Sahrens 23515367Sahrens (void) strcpy(zc2.zc_name, tofs); 23525367Sahrens for (elem = nvlist_next_nvpair(nv, NULL); elem; 23535367Sahrens elem = nvlist_next_nvpair(nv, elem)) { 23545367Sahrens (void) strcpy(zc2.zc_value, nvpair_name(elem)); 23555367Sahrens if (zfs_secpolicy_inherit(&zc2, CRED()) == 0) 23565367Sahrens (void) zfs_ioc_inherit_prop(&zc2); 23575326Sek110237 } 23585326Sek110237 } 23595367Sahrens if (nv) 23605367Sahrens nvlist_free(nv); 23615367Sahrens } 23625367Sahrens 23635367Sahrens /* 23645367Sahrens * Set properties. Note, we ignore errors. Would be better to 23655367Sahrens * do best-effort in zfs_set_prop_nvlist, too. 23665367Sahrens */ 23675367Sahrens (void) zfs_set_prop_nvlist(tofs, props); 23685367Sahrens nvlist_free(props); 23695367Sahrens 23705367Sahrens off = fp->f_offset; 23715367Sahrens error = dmu_recv_stream(&drc, fp->f_vnode, &off); 23725367Sahrens 23735367Sahrens if (error == 0) { 23745367Sahrens if (zfsvfs != NULL) { 23755367Sahrens char osname[MAXNAMELEN]; 23765367Sahrens int mode; 23775367Sahrens 23785367Sahrens (void) zfs_suspend_fs(zfsvfs, osname, &mode); 23795367Sahrens error = dmu_recv_end(&drc); 23805367Sahrens error |= zfs_resume_fs(zfsvfs, osname, mode); 23815367Sahrens } else { 23825367Sahrens error = dmu_recv_end(&drc); 23835367Sahrens } 23845326Sek110237 } 23855326Sek110237 if (zfsvfs != NULL) 23865326Sek110237 VFS_RELE(zfsvfs->z_vfs); 23875367Sahrens 23885367Sahrens zc->zc_cookie = off - fp->f_offset; 23895367Sahrens if (VOP_SEEK(fp->f_vnode, fp->f_offset, &off, NULL) == 0) 23905367Sahrens fp->f_offset = off; 23912885Sahrens 2392789Sahrens releasef(fd); 2393789Sahrens return (error); 2394789Sahrens } 2395789Sahrens 23965367Sahrens /* 23975367Sahrens * inputs: 23985367Sahrens * zc_name name of snapshot to send 23995367Sahrens * zc_value short name of incremental fromsnap (may be empty) 24005367Sahrens * zc_cookie file descriptor to send stream to 24015367Sahrens * zc_obj fromorigin flag (mutually exclusive with zc_value) 24025367Sahrens * 24035367Sahrens * outputs: none 24045367Sahrens */ 2405789Sahrens static int 24065367Sahrens zfs_ioc_send(zfs_cmd_t *zc) 2407789Sahrens { 2408789Sahrens objset_t *fromsnap = NULL; 2409789Sahrens objset_t *tosnap; 2410789Sahrens file_t *fp; 2411789Sahrens int error; 24125367Sahrens offset_t off; 2413789Sahrens 2414789Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 2415789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &tosnap); 2416789Sahrens if (error) 2417789Sahrens return (error); 2418789Sahrens 24192676Seschrock if (zc->zc_value[0] != '\0') { 24202885Sahrens char buf[MAXPATHLEN]; 24212885Sahrens char *cp; 24222885Sahrens 24232885Sahrens (void) strncpy(buf, zc->zc_name, sizeof (buf)); 24242885Sahrens cp = strchr(buf, '@'); 24252885Sahrens if (cp) 24262885Sahrens *(cp+1) = 0; 24272885Sahrens (void) strncat(buf, zc->zc_value, sizeof (buf)); 24282885Sahrens error = dmu_objset_open(buf, DMU_OST_ANY, 2429789Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &fromsnap); 2430789Sahrens if (error) { 2431789Sahrens dmu_objset_close(tosnap); 2432789Sahrens return (error); 2433789Sahrens } 2434789Sahrens } 2435789Sahrens 2436789Sahrens fp = getf(zc->zc_cookie); 2437789Sahrens if (fp == NULL) { 2438789Sahrens dmu_objset_close(tosnap); 2439789Sahrens if (fromsnap) 2440789Sahrens dmu_objset_close(fromsnap); 2441789Sahrens return (EBADF); 2442789Sahrens } 2443789Sahrens 24445367Sahrens off = fp->f_offset; 24455367Sahrens error = dmu_sendbackup(tosnap, fromsnap, zc->zc_obj, fp->f_vnode, &off); 24465367Sahrens 24475367Sahrens if (VOP_SEEK(fp->f_vnode, fp->f_offset, &off, NULL) == 0) 24485367Sahrens fp->f_offset = off; 2449789Sahrens releasef(zc->zc_cookie); 2450789Sahrens if (fromsnap) 2451789Sahrens dmu_objset_close(fromsnap); 2452789Sahrens dmu_objset_close(tosnap); 2453789Sahrens return (error); 2454789Sahrens } 2455789Sahrens 24561544Seschrock static int 24571544Seschrock zfs_ioc_inject_fault(zfs_cmd_t *zc) 24581544Seschrock { 24591544Seschrock int id, error; 24601544Seschrock 24611544Seschrock error = zio_inject_fault(zc->zc_name, (int)zc->zc_guid, &id, 24621544Seschrock &zc->zc_inject_record); 24631544Seschrock 24641544Seschrock if (error == 0) 24651544Seschrock zc->zc_guid = (uint64_t)id; 24661544Seschrock 24671544Seschrock return (error); 24681544Seschrock } 24691544Seschrock 24701544Seschrock static int 24711544Seschrock zfs_ioc_clear_fault(zfs_cmd_t *zc) 24721544Seschrock { 24731544Seschrock return (zio_clear_fault((int)zc->zc_guid)); 24741544Seschrock } 24751544Seschrock 24761544Seschrock static int 24771544Seschrock zfs_ioc_inject_list_next(zfs_cmd_t *zc) 24781544Seschrock { 24791544Seschrock int id = (int)zc->zc_guid; 24801544Seschrock int error; 24811544Seschrock 24821544Seschrock error = zio_inject_list_next(&id, zc->zc_name, sizeof (zc->zc_name), 24831544Seschrock &zc->zc_inject_record); 24841544Seschrock 24851544Seschrock zc->zc_guid = id; 24861544Seschrock 24871544Seschrock return (error); 24881544Seschrock } 24891544Seschrock 24901544Seschrock static int 24911544Seschrock zfs_ioc_error_log(zfs_cmd_t *zc) 24921544Seschrock { 24931544Seschrock spa_t *spa; 24941544Seschrock int error; 24952676Seschrock size_t count = (size_t)zc->zc_nvlist_dst_size; 24961544Seschrock 24971544Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 24981544Seschrock return (error); 24991544Seschrock 25002676Seschrock error = spa_get_errlog(spa, (void *)(uintptr_t)zc->zc_nvlist_dst, 25011544Seschrock &count); 25021544Seschrock if (error == 0) 25032676Seschrock zc->zc_nvlist_dst_size = count; 25041544Seschrock else 25052676Seschrock zc->zc_nvlist_dst_size = spa_get_errlog_size(spa); 25061544Seschrock 25071544Seschrock spa_close(spa, FTAG); 25081544Seschrock 25091544Seschrock return (error); 25101544Seschrock } 25111544Seschrock 25121544Seschrock static int 25131544Seschrock zfs_ioc_clear(zfs_cmd_t *zc) 25141544Seschrock { 25151544Seschrock spa_t *spa; 25161544Seschrock vdev_t *vd; 25174808Sek110237 uint64_t txg; 25181544Seschrock int error; 25191544Seschrock 25201544Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 25211544Seschrock return (error); 25221544Seschrock 25235329Sgw25295 /* 25245329Sgw25295 * Try to resume any I/Os which may have been suspended 25255329Sgw25295 * as a result of a complete pool failure. 25265329Sgw25295 */ 25275329Sgw25295 if (!list_is_empty(&spa->spa_zio_list)) { 25285329Sgw25295 if (zio_vdev_resume_io(spa) != 0) { 25295329Sgw25295 spa_close(spa, FTAG); 25305329Sgw25295 return (EIO); 25315329Sgw25295 } 25325329Sgw25295 } 25335329Sgw25295 25344451Seschrock txg = spa_vdev_enter(spa); 25351544Seschrock 25362676Seschrock if (zc->zc_guid == 0) { 25371544Seschrock vd = NULL; 25382676Seschrock } else if ((vd = spa_lookup_by_guid(spa, zc->zc_guid)) == NULL) { 25394451Seschrock (void) spa_vdev_exit(spa, NULL, txg, ENODEV); 25401544Seschrock spa_close(spa, FTAG); 25411544Seschrock return (ENODEV); 25421544Seschrock } 25431544Seschrock 25445329Sgw25295 vdev_clear(spa, vd, B_TRUE); 25451544Seschrock 25464451Seschrock (void) spa_vdev_exit(spa, NULL, txg, 0); 25471544Seschrock 25481544Seschrock spa_close(spa, FTAG); 25491544Seschrock 25501544Seschrock return (0); 25511544Seschrock } 25521544Seschrock 25535367Sahrens /* 25545367Sahrens * inputs: 25555367Sahrens * zc_name name of filesystem 25565367Sahrens * zc_value name of origin snapshot 25575367Sahrens * 25585367Sahrens * outputs: none 25595367Sahrens */ 25601544Seschrock static int 25612082Seschrock zfs_ioc_promote(zfs_cmd_t *zc) 25622082Seschrock { 25632417Sahrens char *cp; 25642417Sahrens 25652417Sahrens /* 25662417Sahrens * We don't need to unmount *all* the origin fs's snapshots, but 25672417Sahrens * it's easier. 25682417Sahrens */ 25692676Seschrock cp = strchr(zc->zc_value, '@'); 25702417Sahrens if (cp) 25712417Sahrens *cp = '\0'; 25722676Seschrock (void) dmu_objset_find(zc->zc_value, 25732417Sahrens zfs_unmount_snap, NULL, DS_FIND_SNAPSHOTS); 25742082Seschrock return (dsl_dataset_promote(zc->zc_name)); 25752082Seschrock } 25762082Seschrock 25774543Smarks /* 25784543Smarks * We don't want to have a hard dependency 25794543Smarks * against some special symbols in sharefs 25805331Samw * nfs, and smbsrv. Determine them if needed when 25814543Smarks * the first file system is shared. 25825331Samw * Neither sharefs, nfs or smbsrv are unloadable modules. 25834543Smarks */ 25845331Samw int (*znfsexport_fs)(void *arg); 25854543Smarks int (*zshare_fs)(enum sharefs_sys_op, share_t *, uint32_t); 25865331Samw int (*zsmbexport_fs)(void *arg, boolean_t add_share); 25875331Samw 25885331Samw int zfs_nfsshare_inited; 25895331Samw int zfs_smbshare_inited; 25905331Samw 25914543Smarks ddi_modhandle_t nfs_mod; 25924543Smarks ddi_modhandle_t sharefs_mod; 25935331Samw ddi_modhandle_t smbsrv_mod; 25944543Smarks kmutex_t zfs_share_lock; 25954543Smarks 25964543Smarks static int 25975331Samw zfs_init_sharefs() 25985331Samw { 25995331Samw int error; 26005331Samw 26015331Samw ASSERT(MUTEX_HELD(&zfs_share_lock)); 26025331Samw /* Both NFS and SMB shares also require sharetab support. */ 26035331Samw if (sharefs_mod == NULL && ((sharefs_mod = 26045331Samw ddi_modopen("fs/sharefs", 26055331Samw KRTLD_MODE_FIRST, &error)) == NULL)) { 26065331Samw return (ENOSYS); 26075331Samw } 26085331Samw if (zshare_fs == NULL && ((zshare_fs = 26095331Samw (int (*)(enum sharefs_sys_op, share_t *, uint32_t)) 26105331Samw ddi_modsym(sharefs_mod, "sharefs_impl", &error)) == NULL)) { 26115331Samw return (ENOSYS); 26125331Samw } 26135331Samw return (0); 26145331Samw } 26155331Samw 26165331Samw static int 26174543Smarks zfs_ioc_share(zfs_cmd_t *zc) 26184543Smarks { 26194543Smarks int error; 26204543Smarks int opcode; 26214543Smarks 26225331Samw switch (zc->zc_share.z_sharetype) { 26235331Samw case ZFS_SHARE_NFS: 26245331Samw case ZFS_UNSHARE_NFS: 26255331Samw if (zfs_nfsshare_inited == 0) { 26265331Samw mutex_enter(&zfs_share_lock); 26275331Samw if (nfs_mod == NULL && ((nfs_mod = ddi_modopen("fs/nfs", 26285331Samw KRTLD_MODE_FIRST, &error)) == NULL)) { 26295331Samw mutex_exit(&zfs_share_lock); 26305331Samw return (ENOSYS); 26315331Samw } 26325331Samw if (znfsexport_fs == NULL && 26335331Samw ((znfsexport_fs = (int (*)(void *)) 26345331Samw ddi_modsym(nfs_mod, 26355331Samw "nfs_export", &error)) == NULL)) { 26365331Samw mutex_exit(&zfs_share_lock); 26375331Samw return (ENOSYS); 26385331Samw } 26395331Samw error = zfs_init_sharefs(); 26405331Samw if (error) { 26415331Samw mutex_exit(&zfs_share_lock); 26425331Samw return (ENOSYS); 26435331Samw } 26445331Samw zfs_nfsshare_inited = 1; 26454543Smarks mutex_exit(&zfs_share_lock); 26464543Smarks } 26475331Samw break; 26485331Samw case ZFS_SHARE_SMB: 26495331Samw case ZFS_UNSHARE_SMB: 26505331Samw if (zfs_smbshare_inited == 0) { 26515331Samw mutex_enter(&zfs_share_lock); 26525331Samw if (smbsrv_mod == NULL && ((smbsrv_mod = 26535331Samw ddi_modopen("drv/smbsrv", 26545331Samw KRTLD_MODE_FIRST, &error)) == NULL)) { 26555331Samw mutex_exit(&zfs_share_lock); 26565331Samw return (ENOSYS); 26575331Samw } 26585331Samw if (zsmbexport_fs == NULL && ((zsmbexport_fs = 26595331Samw (int (*)(void *, boolean_t))ddi_modsym(smbsrv_mod, 26605331Samw "lmshrd_share_upcall", &error)) == NULL)) { 26615331Samw mutex_exit(&zfs_share_lock); 26625331Samw return (ENOSYS); 26635331Samw } 26645331Samw error = zfs_init_sharefs(); 26655331Samw if (error) { 26665331Samw mutex_exit(&zfs_share_lock); 26675331Samw return (ENOSYS); 26685331Samw } 26695331Samw zfs_smbshare_inited = 1; 26704543Smarks mutex_exit(&zfs_share_lock); 26714543Smarks } 26725331Samw break; 26735331Samw default: 26745331Samw return (EINVAL); 26754543Smarks } 26764543Smarks 26775331Samw switch (zc->zc_share.z_sharetype) { 26785331Samw case ZFS_SHARE_NFS: 26795331Samw case ZFS_UNSHARE_NFS: 26805331Samw if (error = 26815331Samw znfsexport_fs((void *) 26825331Samw (uintptr_t)zc->zc_share.z_exportdata)) 26835331Samw return (error); 26845331Samw break; 26855331Samw case ZFS_SHARE_SMB: 26865331Samw case ZFS_UNSHARE_SMB: 26875331Samw if (error = zsmbexport_fs((void *) 26885331Samw (uintptr_t)zc->zc_share.z_exportdata, 26895331Samw zc->zc_share.z_sharetype == ZFS_SHARE_SMB ? 26905331Samw B_TRUE : B_FALSE)) { 26915331Samw return (error); 26925331Samw } 26935331Samw break; 26945331Samw } 26955331Samw 26965331Samw opcode = (zc->zc_share.z_sharetype == ZFS_SHARE_NFS || 26975331Samw zc->zc_share.z_sharetype == ZFS_SHARE_SMB) ? 26984543Smarks SHAREFS_ADD : SHAREFS_REMOVE; 26994543Smarks 27005331Samw /* 27015331Samw * Add or remove share from sharetab 27025331Samw */ 27034543Smarks error = zshare_fs(opcode, 27044543Smarks (void *)(uintptr_t)zc->zc_share.z_sharedata, 27054543Smarks zc->zc_share.z_sharemax); 27064543Smarks 27074543Smarks return (error); 27084543Smarks 27094543Smarks } 27104543Smarks 27114543Smarks /* 27124988Sek110237 * pool create, destroy, and export don't log the history as part of 27134988Sek110237 * zfsdev_ioctl, but rather zfs_ioc_pool_create, and zfs_ioc_pool_export 27144988Sek110237 * do the logging of those commands. 27154543Smarks */ 2716789Sahrens static zfs_ioc_vec_t zfs_ioc_vec[] = { 27174715Sek110237 { zfs_ioc_pool_create, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 27184577Sahrens { zfs_ioc_pool_destroy, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 27194577Sahrens { zfs_ioc_pool_import, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27204577Sahrens { zfs_ioc_pool_export, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 27214577Sahrens { zfs_ioc_pool_configs, zfs_secpolicy_none, NO_NAME, B_FALSE }, 27224577Sahrens { zfs_ioc_pool_stats, zfs_secpolicy_read, POOL_NAME, B_FALSE }, 27234577Sahrens { zfs_ioc_pool_tryimport, zfs_secpolicy_config, NO_NAME, B_FALSE }, 27244577Sahrens { zfs_ioc_pool_scrub, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27254577Sahrens { zfs_ioc_pool_freeze, zfs_secpolicy_config, NO_NAME, B_FALSE }, 27264577Sahrens { zfs_ioc_pool_upgrade, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27274577Sahrens { zfs_ioc_pool_get_history, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 27284577Sahrens { zfs_ioc_vdev_add, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27294577Sahrens { zfs_ioc_vdev_remove, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27304577Sahrens { zfs_ioc_vdev_set_state, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27314577Sahrens { zfs_ioc_vdev_attach, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27324577Sahrens { zfs_ioc_vdev_detach, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27334577Sahrens { zfs_ioc_vdev_setpath, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 27344577Sahrens { zfs_ioc_objset_stats, zfs_secpolicy_read, DATASET_NAME, B_FALSE }, 27355147Srm160521 { zfs_ioc_objset_version, zfs_secpolicy_read, DATASET_NAME, B_FALSE }, 27364543Smarks { zfs_ioc_dataset_list_next, zfs_secpolicy_read, 27374577Sahrens DATASET_NAME, B_FALSE }, 27384543Smarks { zfs_ioc_snapshot_list_next, zfs_secpolicy_read, 27394577Sahrens DATASET_NAME, B_FALSE }, 27404577Sahrens { zfs_ioc_set_prop, zfs_secpolicy_none, DATASET_NAME, B_TRUE }, 27414577Sahrens { zfs_ioc_create_minor, zfs_secpolicy_minor, DATASET_NAME, B_FALSE }, 27424577Sahrens { zfs_ioc_remove_minor, zfs_secpolicy_minor, DATASET_NAME, B_FALSE }, 27434577Sahrens { zfs_ioc_create, zfs_secpolicy_create, DATASET_NAME, B_TRUE }, 27444577Sahrens { zfs_ioc_destroy, zfs_secpolicy_destroy, DATASET_NAME, B_TRUE }, 27454577Sahrens { zfs_ioc_rollback, zfs_secpolicy_rollback, DATASET_NAME, B_TRUE }, 27464577Sahrens { zfs_ioc_rename, zfs_secpolicy_rename, DATASET_NAME, B_TRUE }, 27475367Sahrens { zfs_ioc_recv, zfs_secpolicy_receive, DATASET_NAME, B_TRUE }, 27485367Sahrens { zfs_ioc_send, zfs_secpolicy_send, DATASET_NAME, B_TRUE }, 27494577Sahrens { zfs_ioc_inject_fault, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 27504577Sahrens { zfs_ioc_clear_fault, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 27514577Sahrens { zfs_ioc_inject_list_next, zfs_secpolicy_inject, NO_NAME, B_FALSE }, 27524577Sahrens { zfs_ioc_error_log, zfs_secpolicy_inject, POOL_NAME, B_FALSE }, 27534577Sahrens { zfs_ioc_clear, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27544577Sahrens { zfs_ioc_promote, zfs_secpolicy_promote, DATASET_NAME, B_TRUE }, 27554577Sahrens { zfs_ioc_destroy_snaps, zfs_secpolicy_destroy, DATASET_NAME, B_TRUE }, 27564577Sahrens { zfs_ioc_snapshot, zfs_secpolicy_snapshot, DATASET_NAME, B_TRUE }, 27574577Sahrens { zfs_ioc_dsobj_to_dsname, zfs_secpolicy_config, POOL_NAME, B_FALSE }, 27584577Sahrens { zfs_ioc_obj_to_path, zfs_secpolicy_config, NO_NAME, B_FALSE }, 27594577Sahrens { zfs_ioc_pool_set_props, zfs_secpolicy_config, POOL_NAME, B_TRUE }, 27604577Sahrens { zfs_ioc_pool_get_props, zfs_secpolicy_read, POOL_NAME, B_FALSE }, 27614577Sahrens { zfs_ioc_set_fsacl, zfs_secpolicy_fsacl, DATASET_NAME, B_TRUE }, 27624577Sahrens { zfs_ioc_get_fsacl, zfs_secpolicy_read, DATASET_NAME, B_FALSE }, 27634543Smarks { zfs_ioc_iscsi_perm_check, zfs_secpolicy_iscsi, 27644577Sahrens DATASET_NAME, B_FALSE }, 27654849Sahrens { zfs_ioc_share, zfs_secpolicy_share, DATASET_NAME, B_FALSE }, 27664849Sahrens { zfs_ioc_inherit_prop, zfs_secpolicy_inherit, DATASET_NAME, B_TRUE }, 2767789Sahrens }; 2768789Sahrens 2769789Sahrens static int 2770789Sahrens zfsdev_ioctl(dev_t dev, int cmd, intptr_t arg, int flag, cred_t *cr, int *rvalp) 2771789Sahrens { 2772789Sahrens zfs_cmd_t *zc; 2773789Sahrens uint_t vec; 27742199Sahrens int error, rc; 2775789Sahrens 2776789Sahrens if (getminor(dev) != 0) 2777789Sahrens return (zvol_ioctl(dev, cmd, arg, flag, cr, rvalp)); 2778789Sahrens 2779789Sahrens vec = cmd - ZFS_IOC; 27804787Sahrens ASSERT3U(getmajor(dev), ==, ddi_driver_major(zfs_dip)); 2781789Sahrens 2782789Sahrens if (vec >= sizeof (zfs_ioc_vec) / sizeof (zfs_ioc_vec[0])) 2783789Sahrens return (EINVAL); 2784789Sahrens 2785789Sahrens zc = kmem_zalloc(sizeof (zfs_cmd_t), KM_SLEEP); 2786789Sahrens 2787789Sahrens error = xcopyin((void *)arg, zc, sizeof (zfs_cmd_t)); 2788789Sahrens 27894787Sahrens if (error == 0) 27904543Smarks error = zfs_ioc_vec[vec].zvec_secpolicy(zc, cr); 2791789Sahrens 2792789Sahrens /* 2793789Sahrens * Ensure that all pool/dataset names are valid before we pass down to 2794789Sahrens * the lower layers. 2795789Sahrens */ 2796789Sahrens if (error == 0) { 2797789Sahrens zc->zc_name[sizeof (zc->zc_name) - 1] = '\0'; 2798789Sahrens switch (zfs_ioc_vec[vec].zvec_namecheck) { 27994577Sahrens case POOL_NAME: 2800789Sahrens if (pool_namecheck(zc->zc_name, NULL, NULL) != 0) 2801789Sahrens error = EINVAL; 2802789Sahrens break; 2803789Sahrens 28044577Sahrens case DATASET_NAME: 2805789Sahrens if (dataset_namecheck(zc->zc_name, NULL, NULL) != 0) 2806789Sahrens error = EINVAL; 2807789Sahrens break; 28082856Snd150628 28094577Sahrens case NO_NAME: 28102856Snd150628 break; 2811789Sahrens } 2812789Sahrens } 2813789Sahrens 2814789Sahrens if (error == 0) 2815789Sahrens error = zfs_ioc_vec[vec].zvec_func(zc); 2816789Sahrens 28172199Sahrens rc = xcopyout(zc, (void *)arg, sizeof (zfs_cmd_t)); 28184543Smarks if (error == 0) { 28192199Sahrens error = rc; 28204543Smarks if (zfs_ioc_vec[vec].zvec_his_log == B_TRUE) 28214543Smarks zfs_log_history(zc); 28224543Smarks } 2823789Sahrens 2824789Sahrens kmem_free(zc, sizeof (zfs_cmd_t)); 2825789Sahrens return (error); 2826789Sahrens } 2827789Sahrens 2828789Sahrens static int 2829789Sahrens zfs_attach(dev_info_t *dip, ddi_attach_cmd_t cmd) 2830789Sahrens { 2831789Sahrens if (cmd != DDI_ATTACH) 2832789Sahrens return (DDI_FAILURE); 2833789Sahrens 2834789Sahrens if (ddi_create_minor_node(dip, "zfs", S_IFCHR, 0, 2835789Sahrens DDI_PSEUDO, 0) == DDI_FAILURE) 2836789Sahrens return (DDI_FAILURE); 2837789Sahrens 2838789Sahrens zfs_dip = dip; 2839789Sahrens 2840789Sahrens ddi_report_dev(dip); 2841789Sahrens 2842789Sahrens return (DDI_SUCCESS); 2843789Sahrens } 2844789Sahrens 2845789Sahrens static int 2846789Sahrens zfs_detach(dev_info_t *dip, ddi_detach_cmd_t cmd) 2847789Sahrens { 2848789Sahrens if (spa_busy() || zfs_busy() || zvol_busy()) 2849789Sahrens return (DDI_FAILURE); 2850789Sahrens 2851789Sahrens if (cmd != DDI_DETACH) 2852789Sahrens return (DDI_FAILURE); 2853789Sahrens 2854789Sahrens zfs_dip = NULL; 2855789Sahrens 2856789Sahrens ddi_prop_remove_all(dip); 2857789Sahrens ddi_remove_minor_node(dip, NULL); 2858789Sahrens 2859789Sahrens return (DDI_SUCCESS); 2860789Sahrens } 2861789Sahrens 2862789Sahrens /*ARGSUSED*/ 2863789Sahrens static int 2864789Sahrens zfs_info(dev_info_t *dip, ddi_info_cmd_t infocmd, void *arg, void **result) 2865789Sahrens { 2866789Sahrens switch (infocmd) { 2867789Sahrens case DDI_INFO_DEVT2DEVINFO: 2868789Sahrens *result = zfs_dip; 2869789Sahrens return (DDI_SUCCESS); 2870789Sahrens 2871789Sahrens case DDI_INFO_DEVT2INSTANCE: 2872849Sbonwick *result = (void *)0; 2873789Sahrens return (DDI_SUCCESS); 2874789Sahrens } 2875789Sahrens 2876789Sahrens return (DDI_FAILURE); 2877789Sahrens } 2878789Sahrens 2879789Sahrens /* 2880789Sahrens * OK, so this is a little weird. 2881789Sahrens * 2882789Sahrens * /dev/zfs is the control node, i.e. minor 0. 2883789Sahrens * /dev/zvol/[r]dsk/pool/dataset are the zvols, minor > 0. 2884789Sahrens * 2885789Sahrens * /dev/zfs has basically nothing to do except serve up ioctls, 2886789Sahrens * so most of the standard driver entry points are in zvol.c. 2887789Sahrens */ 2888789Sahrens static struct cb_ops zfs_cb_ops = { 2889789Sahrens zvol_open, /* open */ 2890789Sahrens zvol_close, /* close */ 2891789Sahrens zvol_strategy, /* strategy */ 2892789Sahrens nodev, /* print */ 2893789Sahrens nodev, /* dump */ 2894789Sahrens zvol_read, /* read */ 2895789Sahrens zvol_write, /* write */ 2896789Sahrens zfsdev_ioctl, /* ioctl */ 2897789Sahrens nodev, /* devmap */ 2898789Sahrens nodev, /* mmap */ 2899789Sahrens nodev, /* segmap */ 2900789Sahrens nochpoll, /* poll */ 2901789Sahrens ddi_prop_op, /* prop_op */ 2902789Sahrens NULL, /* streamtab */ 2903789Sahrens D_NEW | D_MP | D_64BIT, /* Driver compatibility flag */ 2904789Sahrens CB_REV, /* version */ 29053638Sbillm nodev, /* async read */ 29063638Sbillm nodev, /* async write */ 2907789Sahrens }; 2908789Sahrens 2909789Sahrens static struct dev_ops zfs_dev_ops = { 2910789Sahrens DEVO_REV, /* version */ 2911789Sahrens 0, /* refcnt */ 2912789Sahrens zfs_info, /* info */ 2913789Sahrens nulldev, /* identify */ 2914789Sahrens nulldev, /* probe */ 2915789Sahrens zfs_attach, /* attach */ 2916789Sahrens zfs_detach, /* detach */ 2917789Sahrens nodev, /* reset */ 2918789Sahrens &zfs_cb_ops, /* driver operations */ 2919789Sahrens NULL /* no bus operations */ 2920789Sahrens }; 2921789Sahrens 2922789Sahrens static struct modldrv zfs_modldrv = { 29234577Sahrens &mod_driverops, "ZFS storage pool version " SPA_VERSION_STRING, 29242676Seschrock &zfs_dev_ops 2925789Sahrens }; 2926789Sahrens 2927789Sahrens static struct modlinkage modlinkage = { 2928789Sahrens MODREV_1, 2929789Sahrens (void *)&zfs_modlfs, 2930789Sahrens (void *)&zfs_modldrv, 2931789Sahrens NULL 2932789Sahrens }; 2933789Sahrens 29344720Sfr157268 29354720Sfr157268 uint_t zfs_fsyncer_key; 29365326Sek110237 extern uint_t rrw_tsd_key; 29374720Sfr157268 2938789Sahrens int 2939789Sahrens _init(void) 2940789Sahrens { 2941789Sahrens int error; 2942789Sahrens 2943849Sbonwick spa_init(FREAD | FWRITE); 2944849Sbonwick zfs_init(); 2945849Sbonwick zvol_init(); 2946849Sbonwick 2947849Sbonwick if ((error = mod_install(&modlinkage)) != 0) { 2948849Sbonwick zvol_fini(); 2949849Sbonwick zfs_fini(); 2950849Sbonwick spa_fini(); 2951789Sahrens return (error); 2952849Sbonwick } 2953789Sahrens 29544720Sfr157268 tsd_create(&zfs_fsyncer_key, NULL); 29555326Sek110237 tsd_create(&rrw_tsd_key, NULL); 29564720Sfr157268 2957789Sahrens error = ldi_ident_from_mod(&modlinkage, &zfs_li); 2958789Sahrens ASSERT(error == 0); 29594543Smarks mutex_init(&zfs_share_lock, NULL, MUTEX_DEFAULT, NULL); 2960789Sahrens 2961789Sahrens return (0); 2962789Sahrens } 2963789Sahrens 2964789Sahrens int 2965789Sahrens _fini(void) 2966789Sahrens { 2967789Sahrens int error; 2968789Sahrens 29691544Seschrock if (spa_busy() || zfs_busy() || zvol_busy() || zio_injection_enabled) 2970789Sahrens return (EBUSY); 2971789Sahrens 2972789Sahrens if ((error = mod_remove(&modlinkage)) != 0) 2973789Sahrens return (error); 2974789Sahrens 2975789Sahrens zvol_fini(); 2976789Sahrens zfs_fini(); 2977789Sahrens spa_fini(); 29785331Samw if (zfs_nfsshare_inited) 29794543Smarks (void) ddi_modclose(nfs_mod); 29805331Samw if (zfs_smbshare_inited) 29815331Samw (void) ddi_modclose(smbsrv_mod); 29825331Samw if (zfs_nfsshare_inited || zfs_smbshare_inited) 29834543Smarks (void) ddi_modclose(sharefs_mod); 2984789Sahrens 29854720Sfr157268 tsd_destroy(&zfs_fsyncer_key); 2986789Sahrens ldi_ident_release(zfs_li); 2987789Sahrens zfs_li = NULL; 29884543Smarks mutex_destroy(&zfs_share_lock); 2989789Sahrens 2990789Sahrens return (error); 2991789Sahrens } 2992789Sahrens 2993789Sahrens int 2994789Sahrens _info(struct modinfo *modinfop) 2995789Sahrens { 2996789Sahrens return (mod_info(&modlinkage, modinfop)); 2997789Sahrens } 2998