1fa9e4066Sahrens /* 2fa9e4066Sahrens * CDDL HEADER START 3fa9e4066Sahrens * 4fa9e4066Sahrens * The contents of this file are subject to the terms of the 5441d80aaSlling * Common Development and Distribution License (the "License"). 6441d80aaSlling * You may not use this file except in compliance with the License. 7fa9e4066Sahrens * 8fa9e4066Sahrens * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9fa9e4066Sahrens * or http://www.opensolaris.org/os/licensing. 10fa9e4066Sahrens * See the License for the specific language governing permissions 11fa9e4066Sahrens * and limitations under the License. 12fa9e4066Sahrens * 13fa9e4066Sahrens * When distributing Covered Code, include this CDDL HEADER in each 14fa9e4066Sahrens * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15fa9e4066Sahrens * If applicable, add the following below this CDDL HEADER, with the 16fa9e4066Sahrens * fields enclosed by brackets "[]" replaced with your own identifying 17fa9e4066Sahrens * information: Portions Copyright [yyyy] [name of copyright owner] 18fa9e4066Sahrens * 19fa9e4066Sahrens * CDDL HEADER END 20fa9e4066Sahrens */ 21fa9e4066Sahrens /* 22c67d9675Seschrock * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 23fa9e4066Sahrens * Use is subject to license terms. 24fa9e4066Sahrens */ 25fa9e4066Sahrens 26fa9e4066Sahrens #pragma ident "%Z%%M% %I% %E% SMI" 27fa9e4066Sahrens 28fa9e4066Sahrens #include <sys/types.h> 29fa9e4066Sahrens #include <sys/param.h> 30fa9e4066Sahrens #include <sys/errno.h> 31fa9e4066Sahrens #include <sys/uio.h> 32fa9e4066Sahrens #include <sys/buf.h> 33fa9e4066Sahrens #include <sys/modctl.h> 34fa9e4066Sahrens #include <sys/open.h> 35fa9e4066Sahrens #include <sys/file.h> 36fa9e4066Sahrens #include <sys/kmem.h> 37fa9e4066Sahrens #include <sys/conf.h> 38fa9e4066Sahrens #include <sys/cmn_err.h> 39fa9e4066Sahrens #include <sys/stat.h> 40fa9e4066Sahrens #include <sys/zfs_ioctl.h> 41fa9e4066Sahrens #include <sys/zap.h> 42fa9e4066Sahrens #include <sys/spa.h> 43fa9e4066Sahrens #include <sys/vdev.h> 44fa9e4066Sahrens #include <sys/dmu.h> 45fa9e4066Sahrens #include <sys/dsl_dir.h> 46fa9e4066Sahrens #include <sys/dsl_dataset.h> 47fa9e4066Sahrens #include <sys/dsl_prop.h> 48fa9e4066Sahrens #include <sys/ddi.h> 49fa9e4066Sahrens #include <sys/sunddi.h> 50fa9e4066Sahrens #include <sys/sunldi.h> 51fa9e4066Sahrens #include <sys/policy.h> 52fa9e4066Sahrens #include <sys/zone.h> 53fa9e4066Sahrens #include <sys/nvpair.h> 54fa9e4066Sahrens #include <sys/pathname.h> 55fa9e4066Sahrens #include <sys/mount.h> 56fa9e4066Sahrens #include <sys/sdt.h> 57fa9e4066Sahrens #include <sys/fs/zfs.h> 58fa9e4066Sahrens #include <sys/zfs_ctldir.h> 59fa9e4066Sahrens 60fa9e4066Sahrens #include "zfs_namecheck.h" 61fa9e4066Sahrens 62fa9e4066Sahrens extern struct modlfs zfs_modlfs; 63fa9e4066Sahrens 64fa9e4066Sahrens extern void zfs_init(void); 65fa9e4066Sahrens extern void zfs_fini(void); 66fa9e4066Sahrens 67fa9e4066Sahrens ldi_ident_t zfs_li = NULL; 68fa9e4066Sahrens dev_info_t *zfs_dip; 69fa9e4066Sahrens 70fa9e4066Sahrens typedef int zfs_ioc_func_t(zfs_cmd_t *); 71fa9e4066Sahrens typedef int zfs_secpolicy_func_t(const char *, const char *, cred_t *); 72fa9e4066Sahrens 73fa9e4066Sahrens typedef struct zfs_ioc_vec { 74fa9e4066Sahrens zfs_ioc_func_t *zvec_func; 75fa9e4066Sahrens zfs_secpolicy_func_t *zvec_secpolicy; 76fa9e4066Sahrens enum { 77fa9e4066Sahrens no_name, 78fa9e4066Sahrens pool_name, 79fa9e4066Sahrens dataset_name 80fa9e4066Sahrens } zvec_namecheck; 81fa9e4066Sahrens } zfs_ioc_vec_t; 82fa9e4066Sahrens 83fa9e4066Sahrens /* _NOTE(PRINTFLIKE(4)) - this is printf-like, but lint is too whiney */ 84fa9e4066Sahrens void 85fa9e4066Sahrens __dprintf(const char *file, const char *func, int line, const char *fmt, ...) 86fa9e4066Sahrens { 87fa9e4066Sahrens const char *newfile; 88fa9e4066Sahrens char buf[256]; 89fa9e4066Sahrens va_list adx; 90fa9e4066Sahrens 91fa9e4066Sahrens /* 92fa9e4066Sahrens * Get rid of annoying "../common/" prefix to filename. 93fa9e4066Sahrens */ 94fa9e4066Sahrens newfile = strrchr(file, '/'); 95fa9e4066Sahrens if (newfile != NULL) { 96fa9e4066Sahrens newfile = newfile + 1; /* Get rid of leading / */ 97fa9e4066Sahrens } else { 98fa9e4066Sahrens newfile = file; 99fa9e4066Sahrens } 100fa9e4066Sahrens 101fa9e4066Sahrens va_start(adx, fmt); 102fa9e4066Sahrens (void) vsnprintf(buf, sizeof (buf), fmt, adx); 103fa9e4066Sahrens va_end(adx); 104fa9e4066Sahrens 105fa9e4066Sahrens /* 106fa9e4066Sahrens * To get this data, use the zfs-dprintf probe as so: 107fa9e4066Sahrens * dtrace -q -n 'zfs-dprintf \ 108fa9e4066Sahrens * /stringof(arg0) == "dbuf.c"/ \ 109fa9e4066Sahrens * {printf("%s: %s", stringof(arg1), stringof(arg3))}' 110fa9e4066Sahrens * arg0 = file name 111fa9e4066Sahrens * arg1 = function name 112fa9e4066Sahrens * arg2 = line number 113fa9e4066Sahrens * arg3 = message 114fa9e4066Sahrens */ 115fa9e4066Sahrens DTRACE_PROBE4(zfs__dprintf, 116fa9e4066Sahrens char *, newfile, char *, func, int, line, char *, buf); 117fa9e4066Sahrens } 118fa9e4066Sahrens 119fa9e4066Sahrens /* 120fa9e4066Sahrens * Policy for top-level read operations (list pools). Requires no privileges, 121fa9e4066Sahrens * and can be used in the local zone, as there is no associated dataset. 122fa9e4066Sahrens */ 123fa9e4066Sahrens /* ARGSUSED */ 124fa9e4066Sahrens static int 125fa9e4066Sahrens zfs_secpolicy_none(const char *unused1, const char *unused2, cred_t *cr) 126fa9e4066Sahrens { 127fa9e4066Sahrens return (0); 128fa9e4066Sahrens } 129fa9e4066Sahrens 130fa9e4066Sahrens /* 131fa9e4066Sahrens * Policy for dataset read operations (list children, get statistics). Requires 132fa9e4066Sahrens * no privileges, but must be visible in the local zone. 133fa9e4066Sahrens */ 134fa9e4066Sahrens /* ARGSUSED */ 135fa9e4066Sahrens static int 136fa9e4066Sahrens zfs_secpolicy_read(const char *dataset, const char *unused, cred_t *cr) 137fa9e4066Sahrens { 138fa9e4066Sahrens if (INGLOBALZONE(curproc) || 139fa9e4066Sahrens zone_dataset_visible(dataset, NULL)) 140fa9e4066Sahrens return (0); 141fa9e4066Sahrens 142fa9e4066Sahrens return (ENOENT); 143fa9e4066Sahrens } 144fa9e4066Sahrens 145fa9e4066Sahrens static int 146fa9e4066Sahrens zfs_dozonecheck(const char *dataset, cred_t *cr) 147fa9e4066Sahrens { 148fa9e4066Sahrens uint64_t zoned; 149fa9e4066Sahrens int writable = 1; 150fa9e4066Sahrens 151fa9e4066Sahrens /* 152fa9e4066Sahrens * The dataset must be visible by this zone -- check this first 153fa9e4066Sahrens * so they don't see EPERM on something they shouldn't know about. 154fa9e4066Sahrens */ 155fa9e4066Sahrens if (!INGLOBALZONE(curproc) && 156fa9e4066Sahrens !zone_dataset_visible(dataset, &writable)) 157fa9e4066Sahrens return (ENOENT); 158fa9e4066Sahrens 159fa9e4066Sahrens if (dsl_prop_get_integer(dataset, "zoned", &zoned, NULL)) 160fa9e4066Sahrens return (ENOENT); 161fa9e4066Sahrens 162fa9e4066Sahrens if (INGLOBALZONE(curproc)) { 163fa9e4066Sahrens /* 164fa9e4066Sahrens * If the fs is zoned, only root can access it from the 165fa9e4066Sahrens * global zone. 166fa9e4066Sahrens */ 167fa9e4066Sahrens if (secpolicy_zfs(cr) && zoned) 168fa9e4066Sahrens return (EPERM); 169fa9e4066Sahrens } else { 170fa9e4066Sahrens /* 171fa9e4066Sahrens * If we are in a local zone, the 'zoned' property must be set. 172fa9e4066Sahrens */ 173fa9e4066Sahrens if (!zoned) 174fa9e4066Sahrens return (EPERM); 175fa9e4066Sahrens 176fa9e4066Sahrens /* must be writable by this zone */ 177fa9e4066Sahrens if (!writable) 178fa9e4066Sahrens return (EPERM); 179fa9e4066Sahrens } 180fa9e4066Sahrens return (0); 181fa9e4066Sahrens } 182fa9e4066Sahrens 183fa9e4066Sahrens /* 184fa9e4066Sahrens * Policy for dataset write operations (create children, set properties, etc). 185fa9e4066Sahrens * Requires SYS_MOUNT privilege, and must be writable in the local zone. 186fa9e4066Sahrens */ 187fa9e4066Sahrens /* ARGSUSED */ 188fa9e4066Sahrens int 189fa9e4066Sahrens zfs_secpolicy_write(const char *dataset, const char *unused, cred_t *cr) 190fa9e4066Sahrens { 191fa9e4066Sahrens int error; 192fa9e4066Sahrens 193fa9e4066Sahrens if (error = zfs_dozonecheck(dataset, cr)) 194fa9e4066Sahrens return (error); 195fa9e4066Sahrens 196fa9e4066Sahrens return (secpolicy_zfs(cr)); 197fa9e4066Sahrens } 198fa9e4066Sahrens 199fa9e4066Sahrens /* 200fa9e4066Sahrens * Policy for operations that want to write a dataset's parent: 201fa9e4066Sahrens * create, destroy, snapshot, clone, restore. 202fa9e4066Sahrens */ 203fa9e4066Sahrens static int 204fa9e4066Sahrens zfs_secpolicy_parent(const char *dataset, const char *unused, cred_t *cr) 205fa9e4066Sahrens { 206fa9e4066Sahrens char parentname[MAXNAMELEN]; 207fa9e4066Sahrens char *cp; 208fa9e4066Sahrens 209fa9e4066Sahrens /* 210fa9e4066Sahrens * Remove the @bla or /bla from the end of the name to get the parent. 211fa9e4066Sahrens */ 212fa9e4066Sahrens (void) strncpy(parentname, dataset, sizeof (parentname)); 213fa9e4066Sahrens cp = strrchr(parentname, '@'); 214fa9e4066Sahrens if (cp != NULL) { 215fa9e4066Sahrens cp[0] = '\0'; 216fa9e4066Sahrens } else { 217fa9e4066Sahrens cp = strrchr(parentname, '/'); 218fa9e4066Sahrens if (cp == NULL) 219fa9e4066Sahrens return (ENOENT); 220fa9e4066Sahrens cp[0] = '\0'; 221fa9e4066Sahrens 222fa9e4066Sahrens } 223fa9e4066Sahrens 224fa9e4066Sahrens return (zfs_secpolicy_write(parentname, unused, cr)); 225fa9e4066Sahrens } 226fa9e4066Sahrens 227fa9e4066Sahrens /* 228fa9e4066Sahrens * Policy for dataset write operations (create children, set properties, etc). 229fa9e4066Sahrens * Requires SYS_MOUNT privilege, and must be writable in the local zone. 230fa9e4066Sahrens */ 231fa9e4066Sahrens static int 232fa9e4066Sahrens zfs_secpolicy_setprop(const char *dataset, const char *prop, cred_t *cr) 233fa9e4066Sahrens { 234fa9e4066Sahrens int error; 235fa9e4066Sahrens 236fa9e4066Sahrens if (error = zfs_dozonecheck(dataset, cr)) 237fa9e4066Sahrens return (error); 238fa9e4066Sahrens 239fa9e4066Sahrens if (strcmp(prop, "zoned") == 0) { 240fa9e4066Sahrens /* 241fa9e4066Sahrens * Disallow setting of 'zoned' from within a local zone. 242fa9e4066Sahrens */ 243fa9e4066Sahrens if (!INGLOBALZONE(curproc)) 244fa9e4066Sahrens return (EPERM); 245fa9e4066Sahrens } 246fa9e4066Sahrens 247fa9e4066Sahrens return (secpolicy_zfs(cr)); 248fa9e4066Sahrens } 249fa9e4066Sahrens 250fa9e4066Sahrens /* 251fa9e4066Sahrens * Security policy for setting the quota. This is the same as 252fa9e4066Sahrens * zfs_secpolicy_write, except that the local zone may not change the quota at 253fa9e4066Sahrens * the zone-property setpoint. 254fa9e4066Sahrens */ 255fa9e4066Sahrens /* ARGSUSED */ 256fa9e4066Sahrens static int 257fa9e4066Sahrens zfs_secpolicy_quota(const char *dataset, const char *unused, cred_t *cr) 258fa9e4066Sahrens { 259fa9e4066Sahrens int error; 260fa9e4066Sahrens 261fa9e4066Sahrens if (error = zfs_dozonecheck(dataset, cr)) 262fa9e4066Sahrens return (error); 263fa9e4066Sahrens 264fa9e4066Sahrens if (!INGLOBALZONE(curproc)) { 265fa9e4066Sahrens uint64_t zoned; 266fa9e4066Sahrens char setpoint[MAXNAMELEN]; 267fa9e4066Sahrens int dslen; 268fa9e4066Sahrens /* 269fa9e4066Sahrens * Unprivileged users are allowed to modify the quota 270fa9e4066Sahrens * on things *under* (ie. contained by) the thing they 271fa9e4066Sahrens * own. 272fa9e4066Sahrens */ 273fa9e4066Sahrens if (dsl_prop_get_integer(dataset, "zoned", &zoned, setpoint)) 274fa9e4066Sahrens return (EPERM); 275fa9e4066Sahrens if (!zoned) /* this shouldn't happen */ 276fa9e4066Sahrens return (EPERM); 277fa9e4066Sahrens dslen = strlen(dataset); 278fa9e4066Sahrens if (dslen <= strlen(setpoint)) 279fa9e4066Sahrens return (EPERM); 280fa9e4066Sahrens } 281fa9e4066Sahrens 282fa9e4066Sahrens return (secpolicy_zfs(cr)); 283fa9e4066Sahrens } 284fa9e4066Sahrens 285fa9e4066Sahrens /* 286fa9e4066Sahrens * Policy for pool operations - create/destroy pools, add vdevs, etc. Requires 287fa9e4066Sahrens * SYS_CONFIG privilege, which is not available in a local zone. 288fa9e4066Sahrens */ 289fa9e4066Sahrens /* ARGSUSED */ 290fa9e4066Sahrens static int 291fa9e4066Sahrens zfs_secpolicy_config(const char *unused, const char *unused2, cred_t *cr) 292fa9e4066Sahrens { 293fa9e4066Sahrens if (secpolicy_sys_config(cr, B_FALSE) != 0) 294fa9e4066Sahrens return (EPERM); 295fa9e4066Sahrens 296fa9e4066Sahrens return (0); 297fa9e4066Sahrens } 298fa9e4066Sahrens 299*ea8dc4b6Seschrock /* 300*ea8dc4b6Seschrock * Policy for fault injection. Requires all privileges. 301*ea8dc4b6Seschrock */ 302*ea8dc4b6Seschrock /* ARGSUSED */ 303*ea8dc4b6Seschrock static int 304*ea8dc4b6Seschrock zfs_secpolicy_inject(const char *unused, const char *unused2, cred_t *cr) 305*ea8dc4b6Seschrock { 306*ea8dc4b6Seschrock return (secpolicy_zinject(cr)); 307*ea8dc4b6Seschrock } 308*ea8dc4b6Seschrock 309fa9e4066Sahrens /* 310fa9e4066Sahrens * Returns the nvlist as specified by the user in the zfs_cmd_t. 311fa9e4066Sahrens */ 312fa9e4066Sahrens static int 313fa9e4066Sahrens get_config(zfs_cmd_t *zc, nvlist_t **nvp) 314fa9e4066Sahrens { 315fa9e4066Sahrens char *packed; 316fa9e4066Sahrens size_t size; 317fa9e4066Sahrens int error; 318fa9e4066Sahrens nvlist_t *config = NULL; 319fa9e4066Sahrens 320fa9e4066Sahrens /* 321fa9e4066Sahrens * Read in and unpack the user-supplied nvlist. By this point, we know 322fa9e4066Sahrens * that the user has the SYS_CONFIG privilege, so allocating arbitrary 323fa9e4066Sahrens * sized regions of memory should not be a problem. 324fa9e4066Sahrens */ 325fa9e4066Sahrens if ((size = zc->zc_config_src_size) == 0) 326fa9e4066Sahrens return (EINVAL); 327fa9e4066Sahrens 328fa9e4066Sahrens packed = kmem_alloc(size, KM_SLEEP); 329fa9e4066Sahrens 330fa9e4066Sahrens if ((error = xcopyin((void *)(uintptr_t)zc->zc_config_src, packed, 331fa9e4066Sahrens size)) != 0) { 332fa9e4066Sahrens kmem_free(packed, size); 333fa9e4066Sahrens return (error); 334fa9e4066Sahrens } 335fa9e4066Sahrens 336fa9e4066Sahrens if ((error = nvlist_unpack(packed, size, &config, 0)) != 0) { 337fa9e4066Sahrens kmem_free(packed, size); 338fa9e4066Sahrens return (error); 339fa9e4066Sahrens } 340fa9e4066Sahrens 341fa9e4066Sahrens kmem_free(packed, size); 342fa9e4066Sahrens 343fa9e4066Sahrens *nvp = config; 344fa9e4066Sahrens return (0); 345fa9e4066Sahrens } 346fa9e4066Sahrens 347fa9e4066Sahrens static int 348fa9e4066Sahrens zfs_ioc_pool_create(zfs_cmd_t *zc) 349fa9e4066Sahrens { 350fa9e4066Sahrens int error; 351fa9e4066Sahrens nvlist_t *config; 352fa9e4066Sahrens 353fa9e4066Sahrens if ((error = get_config(zc, &config)) != 0) 354fa9e4066Sahrens return (error); 355fa9e4066Sahrens 356fa9e4066Sahrens error = spa_create(zc->zc_name, config, zc->zc_root[0] == '\0' ? 357fa9e4066Sahrens NULL : zc->zc_root); 358fa9e4066Sahrens 359fa9e4066Sahrens nvlist_free(config); 360fa9e4066Sahrens 361fa9e4066Sahrens return (error); 362fa9e4066Sahrens } 363fa9e4066Sahrens 364fa9e4066Sahrens static int 365fa9e4066Sahrens zfs_ioc_pool_destroy(zfs_cmd_t *zc) 366fa9e4066Sahrens { 367fa9e4066Sahrens return (spa_destroy(zc->zc_name)); 368fa9e4066Sahrens } 369fa9e4066Sahrens 370fa9e4066Sahrens static int 371fa9e4066Sahrens zfs_ioc_pool_import(zfs_cmd_t *zc) 372fa9e4066Sahrens { 373fa9e4066Sahrens int error; 374fa9e4066Sahrens nvlist_t *config; 375fa9e4066Sahrens uint64_t guid; 376fa9e4066Sahrens 377fa9e4066Sahrens if ((error = get_config(zc, &config)) != 0) 378fa9e4066Sahrens return (error); 379fa9e4066Sahrens 380fa9e4066Sahrens if (nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID, &guid) != 0 || 381*ea8dc4b6Seschrock guid != zc->zc_guid) 382fa9e4066Sahrens error = EINVAL; 383fa9e4066Sahrens else 384fa9e4066Sahrens error = spa_import(zc->zc_name, config, 385fa9e4066Sahrens zc->zc_root[0] == '\0' ? NULL : zc->zc_root); 386fa9e4066Sahrens 387fa9e4066Sahrens nvlist_free(config); 388fa9e4066Sahrens 389fa9e4066Sahrens return (error); 390fa9e4066Sahrens } 391fa9e4066Sahrens 392fa9e4066Sahrens static int 393fa9e4066Sahrens zfs_ioc_pool_export(zfs_cmd_t *zc) 394fa9e4066Sahrens { 395fa9e4066Sahrens return (spa_export(zc->zc_name)); 396fa9e4066Sahrens } 397fa9e4066Sahrens 398fa9e4066Sahrens static int 399fa9e4066Sahrens zfs_ioc_pool_configs(zfs_cmd_t *zc) 400fa9e4066Sahrens { 401fa9e4066Sahrens nvlist_t *configs; 402fa9e4066Sahrens char *packed = NULL; 403fa9e4066Sahrens size_t size = 0; 404fa9e4066Sahrens int error; 405fa9e4066Sahrens 406fa9e4066Sahrens if ((configs = spa_all_configs(&zc->zc_cookie)) == NULL) 407fa9e4066Sahrens return (EEXIST); 408fa9e4066Sahrens 409*ea8dc4b6Seschrock VERIFY(nvlist_pack(configs, &packed, &size, NV_ENCODE_NATIVE, 410*ea8dc4b6Seschrock KM_SLEEP) == 0); 411fa9e4066Sahrens 412fa9e4066Sahrens if (size > zc->zc_config_dst_size) 413fa9e4066Sahrens error = ENOMEM; 414fa9e4066Sahrens else 415fa9e4066Sahrens error = xcopyout(packed, (void *)(uintptr_t)zc->zc_config_dst, 416fa9e4066Sahrens size); 417fa9e4066Sahrens 418fa9e4066Sahrens zc->zc_config_dst_size = size; 419fa9e4066Sahrens 420fa9e4066Sahrens kmem_free(packed, size); 421fa9e4066Sahrens nvlist_free(configs); 422fa9e4066Sahrens 423fa9e4066Sahrens return (error); 424fa9e4066Sahrens } 425fa9e4066Sahrens 426fa9e4066Sahrens static int 427fa9e4066Sahrens zfs_ioc_pool_guid(zfs_cmd_t *zc) 428fa9e4066Sahrens { 429fa9e4066Sahrens spa_t *spa; 430fa9e4066Sahrens int error; 431fa9e4066Sahrens 432fa9e4066Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 433fa9e4066Sahrens if (error == 0) { 434*ea8dc4b6Seschrock zc->zc_guid = spa_guid(spa); 435fa9e4066Sahrens spa_close(spa, FTAG); 436fa9e4066Sahrens } 437fa9e4066Sahrens return (error); 438fa9e4066Sahrens } 439fa9e4066Sahrens 440fa9e4066Sahrens static int 441fa9e4066Sahrens zfs_ioc_pool_stats(zfs_cmd_t *zc) 442fa9e4066Sahrens { 443fa9e4066Sahrens nvlist_t *config; 444fa9e4066Sahrens char *packed = NULL; 445fa9e4066Sahrens size_t size = 0; 446fa9e4066Sahrens int error; 447*ea8dc4b6Seschrock int ret = 0; 448fa9e4066Sahrens 449*ea8dc4b6Seschrock error = spa_get_stats(zc->zc_name, &config, zc->zc_root, 450*ea8dc4b6Seschrock sizeof (zc->zc_root)); 451fa9e4066Sahrens 452fa9e4066Sahrens if (config != NULL) { 453fa9e4066Sahrens VERIFY(nvlist_pack(config, &packed, &size, 454*ea8dc4b6Seschrock NV_ENCODE_NATIVE, KM_SLEEP) == 0); 455fa9e4066Sahrens 456fa9e4066Sahrens if (size > zc->zc_config_dst_size) 457*ea8dc4b6Seschrock ret = ENOMEM; 458fa9e4066Sahrens else if (xcopyout(packed, (void *)(uintptr_t)zc->zc_config_dst, 459fa9e4066Sahrens size)) 460*ea8dc4b6Seschrock ret = EFAULT; 461fa9e4066Sahrens 462fa9e4066Sahrens zc->zc_config_dst_size = size; 463fa9e4066Sahrens 464fa9e4066Sahrens kmem_free(packed, size); 465fa9e4066Sahrens nvlist_free(config); 466*ea8dc4b6Seschrock 467*ea8dc4b6Seschrock /* 468*ea8dc4b6Seschrock * The config may be present even if 'error' is non-zero. 469*ea8dc4b6Seschrock * In this case we return success, and preserve the real errno 470*ea8dc4b6Seschrock * in 'zc_cookie'. 471*ea8dc4b6Seschrock */ 472*ea8dc4b6Seschrock zc->zc_cookie = error; 473fa9e4066Sahrens } else { 474*ea8dc4b6Seschrock ret = error; 475fa9e4066Sahrens } 476fa9e4066Sahrens 477*ea8dc4b6Seschrock return (ret); 478fa9e4066Sahrens } 479fa9e4066Sahrens 480fa9e4066Sahrens /* 481fa9e4066Sahrens * Try to import the given pool, returning pool stats as appropriate so that 482fa9e4066Sahrens * user land knows which devices are available and overall pool health. 483fa9e4066Sahrens */ 484fa9e4066Sahrens static int 485fa9e4066Sahrens zfs_ioc_pool_tryimport(zfs_cmd_t *zc) 486fa9e4066Sahrens { 487fa9e4066Sahrens nvlist_t *tryconfig, *config; 488fa9e4066Sahrens char *packed = NULL; 489fa9e4066Sahrens size_t size = 0; 490fa9e4066Sahrens int error; 491fa9e4066Sahrens 492fa9e4066Sahrens if ((error = get_config(zc, &tryconfig)) != 0) 493fa9e4066Sahrens return (error); 494fa9e4066Sahrens 495fa9e4066Sahrens config = spa_tryimport(tryconfig); 496fa9e4066Sahrens 497fa9e4066Sahrens nvlist_free(tryconfig); 498fa9e4066Sahrens 499fa9e4066Sahrens if (config == NULL) 500fa9e4066Sahrens return (EINVAL); 501fa9e4066Sahrens 502*ea8dc4b6Seschrock VERIFY(nvlist_pack(config, &packed, &size, NV_ENCODE_NATIVE, 503*ea8dc4b6Seschrock KM_SLEEP) == 0); 504fa9e4066Sahrens 505fa9e4066Sahrens if (size > zc->zc_config_dst_size) 506fa9e4066Sahrens error = ENOMEM; 507fa9e4066Sahrens else 508fa9e4066Sahrens error = xcopyout(packed, (void *)(uintptr_t)zc->zc_config_dst, 509fa9e4066Sahrens size); 510fa9e4066Sahrens 511fa9e4066Sahrens zc->zc_config_dst_size = size; 512fa9e4066Sahrens 513fa9e4066Sahrens kmem_free(packed, size); 514fa9e4066Sahrens nvlist_free(config); 515fa9e4066Sahrens 516fa9e4066Sahrens return (error); 517fa9e4066Sahrens } 518fa9e4066Sahrens 519fa9e4066Sahrens static int 520fa9e4066Sahrens zfs_ioc_pool_scrub(zfs_cmd_t *zc) 521fa9e4066Sahrens { 522fa9e4066Sahrens spa_t *spa; 523fa9e4066Sahrens int error; 524fa9e4066Sahrens 525fa9e4066Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 526fa9e4066Sahrens if (error == 0) { 527fa9e4066Sahrens error = spa_scrub(spa, zc->zc_cookie, B_FALSE); 528fa9e4066Sahrens spa_close(spa, FTAG); 529fa9e4066Sahrens } 530fa9e4066Sahrens return (error); 531fa9e4066Sahrens } 532fa9e4066Sahrens 533fa9e4066Sahrens static int 534fa9e4066Sahrens zfs_ioc_pool_freeze(zfs_cmd_t *zc) 535fa9e4066Sahrens { 536fa9e4066Sahrens spa_t *spa; 537fa9e4066Sahrens int error; 538fa9e4066Sahrens 539fa9e4066Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 540fa9e4066Sahrens if (error == 0) { 541fa9e4066Sahrens spa_freeze(spa); 542fa9e4066Sahrens spa_close(spa, FTAG); 543fa9e4066Sahrens } 544fa9e4066Sahrens return (error); 545fa9e4066Sahrens } 546fa9e4066Sahrens 547fa9e4066Sahrens static int 548fa9e4066Sahrens zfs_ioc_vdev_add(zfs_cmd_t *zc) 549fa9e4066Sahrens { 550fa9e4066Sahrens spa_t *spa; 551fa9e4066Sahrens int error; 552fa9e4066Sahrens nvlist_t *config; 553fa9e4066Sahrens 554fa9e4066Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 555fa9e4066Sahrens if (error != 0) 556fa9e4066Sahrens return (error); 557fa9e4066Sahrens 558fa9e4066Sahrens if ((error = get_config(zc, &config)) == 0) { 559fa9e4066Sahrens error = spa_vdev_add(spa, config); 560fa9e4066Sahrens nvlist_free(config); 561fa9e4066Sahrens } 562fa9e4066Sahrens 563fa9e4066Sahrens spa_close(spa, FTAG); 564fa9e4066Sahrens return (error); 565fa9e4066Sahrens } 566fa9e4066Sahrens 567fa9e4066Sahrens /* ARGSUSED */ 568fa9e4066Sahrens static int 569fa9e4066Sahrens zfs_ioc_vdev_remove(zfs_cmd_t *zc) 570fa9e4066Sahrens { 571fa9e4066Sahrens return (ENOTSUP); 572fa9e4066Sahrens } 573fa9e4066Sahrens 574fa9e4066Sahrens static int 575fa9e4066Sahrens zfs_ioc_vdev_online(zfs_cmd_t *zc) 576fa9e4066Sahrens { 577fa9e4066Sahrens spa_t *spa; 578fa9e4066Sahrens int error; 579fa9e4066Sahrens 580fa9e4066Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 581fa9e4066Sahrens if (error != 0) 582fa9e4066Sahrens return (error); 583*ea8dc4b6Seschrock error = vdev_online(spa, zc->zc_guid); 584fa9e4066Sahrens spa_close(spa, FTAG); 585fa9e4066Sahrens return (error); 586fa9e4066Sahrens } 587fa9e4066Sahrens 588fa9e4066Sahrens static int 589fa9e4066Sahrens zfs_ioc_vdev_offline(zfs_cmd_t *zc) 590fa9e4066Sahrens { 591fa9e4066Sahrens spa_t *spa; 592441d80aaSlling int istmp = zc->zc_cookie; 593fa9e4066Sahrens int error; 594fa9e4066Sahrens 595fa9e4066Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 596fa9e4066Sahrens if (error != 0) 597fa9e4066Sahrens return (error); 598*ea8dc4b6Seschrock error = vdev_offline(spa, zc->zc_guid, istmp); 599fa9e4066Sahrens spa_close(spa, FTAG); 600fa9e4066Sahrens return (error); 601fa9e4066Sahrens } 602fa9e4066Sahrens 603fa9e4066Sahrens static int 604fa9e4066Sahrens zfs_ioc_vdev_attach(zfs_cmd_t *zc) 605fa9e4066Sahrens { 606fa9e4066Sahrens spa_t *spa; 607fa9e4066Sahrens int replacing = zc->zc_cookie; 608fa9e4066Sahrens nvlist_t *config; 609fa9e4066Sahrens int error; 610fa9e4066Sahrens 611fa9e4066Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 612fa9e4066Sahrens if (error != 0) 613fa9e4066Sahrens return (error); 614fa9e4066Sahrens 615fa9e4066Sahrens if ((error = get_config(zc, &config)) == 0) { 616*ea8dc4b6Seschrock error = spa_vdev_attach(spa, zc->zc_guid, config, replacing); 617fa9e4066Sahrens nvlist_free(config); 618fa9e4066Sahrens } 619fa9e4066Sahrens 620fa9e4066Sahrens spa_close(spa, FTAG); 621fa9e4066Sahrens return (error); 622fa9e4066Sahrens } 623fa9e4066Sahrens 624fa9e4066Sahrens static int 625fa9e4066Sahrens zfs_ioc_vdev_detach(zfs_cmd_t *zc) 626fa9e4066Sahrens { 627fa9e4066Sahrens spa_t *spa; 628fa9e4066Sahrens int error; 629fa9e4066Sahrens 630fa9e4066Sahrens error = spa_open(zc->zc_name, &spa, FTAG); 631fa9e4066Sahrens if (error != 0) 632fa9e4066Sahrens return (error); 633fa9e4066Sahrens 634*ea8dc4b6Seschrock error = spa_vdev_detach(spa, zc->zc_guid, B_FALSE); 635fa9e4066Sahrens 636fa9e4066Sahrens spa_close(spa, FTAG); 637fa9e4066Sahrens return (error); 638fa9e4066Sahrens } 639fa9e4066Sahrens 640c67d9675Seschrock static int 641c67d9675Seschrock zfs_ioc_vdev_setpath(zfs_cmd_t *zc) 642c67d9675Seschrock { 643c67d9675Seschrock spa_t *spa; 644c67d9675Seschrock char *path = zc->zc_prop_value; 645*ea8dc4b6Seschrock uint64_t guid = zc->zc_guid; 646c67d9675Seschrock int error; 647c67d9675Seschrock 648c67d9675Seschrock error = spa_open(zc->zc_name, &spa, FTAG); 649c67d9675Seschrock if (error != 0) 650c67d9675Seschrock return (error); 651c67d9675Seschrock 652c67d9675Seschrock error = spa_vdev_setpath(spa, guid, path); 653c67d9675Seschrock 654c67d9675Seschrock spa_close(spa, FTAG); 655c67d9675Seschrock return (error); 656c67d9675Seschrock } 657c67d9675Seschrock 658c67d9675Seschrock 659fa9e4066Sahrens static int 660fa9e4066Sahrens zfs_ioc_objset_stats(zfs_cmd_t *zc) 661fa9e4066Sahrens { 662fa9e4066Sahrens objset_t *os = NULL; 663fa9e4066Sahrens int error; 6647f7322feSeschrock nvlist_t *nv; 6657f7322feSeschrock size_t sz; 6667f7322feSeschrock char *buf; 667fa9e4066Sahrens 668fa9e4066Sahrens retry: 669fa9e4066Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 670fa9e4066Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 671fa9e4066Sahrens if (error != 0) { 672fa9e4066Sahrens /* 673fa9e4066Sahrens * This is ugly: dmu_objset_open() can return EBUSY if 674fa9e4066Sahrens * the objset is held exclusively. Fortunately this hold is 675fa9e4066Sahrens * only for a short while, so we retry here. 676fa9e4066Sahrens * This avoids user code having to handle EBUSY, 677fa9e4066Sahrens * for example for a "zfs list". 678fa9e4066Sahrens */ 679fa9e4066Sahrens if (error == EBUSY) { 680fa9e4066Sahrens delay(1); 681fa9e4066Sahrens goto retry; 682fa9e4066Sahrens } 683fa9e4066Sahrens return (error); 684fa9e4066Sahrens } 685fa9e4066Sahrens 686fa9e4066Sahrens dmu_objset_stats(os, &zc->zc_objset_stats); 687fa9e4066Sahrens 6887f7322feSeschrock if (zc->zc_config_src != NULL && 6897f7322feSeschrock (error = dsl_prop_get_all(os, &nv)) == 0) { 6907f7322feSeschrock VERIFY(nvlist_size(nv, &sz, NV_ENCODE_NATIVE) == 0); 6917f7322feSeschrock if (sz > zc->zc_config_src_size) { 6927f7322feSeschrock zc->zc_config_src_size = sz; 6937f7322feSeschrock error = ENOMEM; 6947f7322feSeschrock } else { 6957f7322feSeschrock buf = kmem_alloc(sz, KM_SLEEP); 6967f7322feSeschrock VERIFY(nvlist_pack(nv, &buf, &sz, 6977f7322feSeschrock NV_ENCODE_NATIVE, 0) == 0); 6987f7322feSeschrock error = xcopyout(buf, 6997f7322feSeschrock (void *)(uintptr_t)zc->zc_config_src, sz); 7007f7322feSeschrock kmem_free(buf, sz); 7017f7322feSeschrock } 7027f7322feSeschrock nvlist_free(nv); 7037f7322feSeschrock } 704fa9e4066Sahrens 7057f7322feSeschrock if (!error && zc->zc_objset_stats.dds_type == DMU_OST_ZVOL) 706fa9e4066Sahrens error = zvol_get_stats(zc, os); 707fa9e4066Sahrens 708*ea8dc4b6Seschrock spa_altroot(dmu_objset_spa(os), zc->zc_root, sizeof (zc->zc_root)); 709*ea8dc4b6Seschrock 710fa9e4066Sahrens dmu_objset_close(os); 711fa9e4066Sahrens return (error); 712fa9e4066Sahrens } 713fa9e4066Sahrens 714fa9e4066Sahrens static int 715fa9e4066Sahrens zfs_ioc_dataset_list_next(zfs_cmd_t *zc) 716fa9e4066Sahrens { 71787e5029aSahrens objset_t *os; 718fa9e4066Sahrens int error; 719fa9e4066Sahrens char *p; 720fa9e4066Sahrens 72187e5029aSahrens retry: 72287e5029aSahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 72387e5029aSahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 72487e5029aSahrens if (error != 0) { 72587e5029aSahrens /* 72687e5029aSahrens * This is ugly: dmu_objset_open() can return EBUSY if 72787e5029aSahrens * the objset is held exclusively. Fortunately this hold is 72887e5029aSahrens * only for a short while, so we retry here. 72987e5029aSahrens * This avoids user code having to handle EBUSY, 73087e5029aSahrens * for example for a "zfs list". 73187e5029aSahrens */ 73287e5029aSahrens if (error == EBUSY) { 73387e5029aSahrens delay(1); 73487e5029aSahrens goto retry; 73587e5029aSahrens } 73687e5029aSahrens if (error == ENOENT) 73787e5029aSahrens error = ESRCH; 73887e5029aSahrens return (error); 739fa9e4066Sahrens } 740fa9e4066Sahrens 741fa9e4066Sahrens p = strrchr(zc->zc_name, '/'); 742fa9e4066Sahrens if (p == NULL || p[1] != '\0') 743fa9e4066Sahrens (void) strlcat(zc->zc_name, "/", sizeof (zc->zc_name)); 744fa9e4066Sahrens p = zc->zc_name + strlen(zc->zc_name); 745fa9e4066Sahrens 746fa9e4066Sahrens do { 74787e5029aSahrens error = dmu_dir_list_next(os, 74887e5029aSahrens sizeof (zc->zc_name) - (p - zc->zc_name), p, 74987e5029aSahrens NULL, &zc->zc_cookie); 750fa9e4066Sahrens if (error == ENOENT) 751fa9e4066Sahrens error = ESRCH; 75287e5029aSahrens } while (error == 0 && !INGLOBALZONE(curproc) && 753fa9e4066Sahrens !zone_dataset_visible(zc->zc_name, NULL)); 754fa9e4066Sahrens 755fa9e4066Sahrens /* 75687e5029aSahrens * If it's a hidden dataset (ie. with a '$' in its name), don't 75787e5029aSahrens * try to get stats for it. Userland will skip over it. 758fa9e4066Sahrens */ 75987e5029aSahrens if (error == 0 && strchr(zc->zc_name, '$') == NULL) 76087e5029aSahrens error = zfs_ioc_objset_stats(zc); /* fill in the stats */ 761fa9e4066Sahrens 76287e5029aSahrens dmu_objset_close(os); 763fa9e4066Sahrens return (error); 764fa9e4066Sahrens } 765fa9e4066Sahrens 766fa9e4066Sahrens static int 767fa9e4066Sahrens zfs_ioc_snapshot_list_next(zfs_cmd_t *zc) 768fa9e4066Sahrens { 76987e5029aSahrens objset_t *os; 770fa9e4066Sahrens int error; 771fa9e4066Sahrens 772fa9e4066Sahrens retry: 77387e5029aSahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 77487e5029aSahrens DS_MODE_STANDARD | DS_MODE_READONLY, &os); 77587e5029aSahrens if (error != 0) { 776fa9e4066Sahrens /* 77787e5029aSahrens * This is ugly: dmu_objset_open() can return EBUSY if 778fa9e4066Sahrens * the objset is held exclusively. Fortunately this hold is 779fa9e4066Sahrens * only for a short while, so we retry here. 780fa9e4066Sahrens * This avoids user code having to handle EBUSY, 78187e5029aSahrens * for example for a "zfs list". 782fa9e4066Sahrens */ 783fa9e4066Sahrens if (error == EBUSY) { 784fa9e4066Sahrens delay(1); 785fa9e4066Sahrens goto retry; 786fa9e4066Sahrens } 787fa9e4066Sahrens if (error == ENOENT) 78887e5029aSahrens error = ESRCH; 789fa9e4066Sahrens return (error); 790fa9e4066Sahrens } 791fa9e4066Sahrens 792b81d61a6Slling /* 793b81d61a6Slling * A dataset name of maximum length cannot have any snapshots, 794b81d61a6Slling * so exit immediately. 795b81d61a6Slling */ 796b81d61a6Slling if (strlcat(zc->zc_name, "@", sizeof (zc->zc_name)) >= MAXNAMELEN) { 79787e5029aSahrens dmu_objset_close(os); 798b81d61a6Slling return (ESRCH); 799fa9e4066Sahrens } 800fa9e4066Sahrens 80187e5029aSahrens error = dmu_snapshot_list_next(os, 80287e5029aSahrens sizeof (zc->zc_name) - strlen(zc->zc_name), 80387e5029aSahrens zc->zc_name + strlen(zc->zc_name), NULL, &zc->zc_cookie); 80487e5029aSahrens if (error == ENOENT) 80587e5029aSahrens error = ESRCH; 806fa9e4066Sahrens 80787e5029aSahrens if (error == 0) 80887e5029aSahrens error = zfs_ioc_objset_stats(zc); /* fill in the stats */ 809fa9e4066Sahrens 81087e5029aSahrens dmu_objset_close(os); 811fa9e4066Sahrens return (error); 812fa9e4066Sahrens } 813fa9e4066Sahrens 814fa9e4066Sahrens static int 815fa9e4066Sahrens zfs_ioc_set_prop(zfs_cmd_t *zc) 816fa9e4066Sahrens { 817fa9e4066Sahrens return (dsl_prop_set(zc->zc_name, zc->zc_prop_name, 818fa9e4066Sahrens zc->zc_intsz, zc->zc_numints, zc->zc_prop_value)); 819fa9e4066Sahrens } 820fa9e4066Sahrens 821fa9e4066Sahrens static int 822fa9e4066Sahrens zfs_ioc_set_quota(zfs_cmd_t *zc) 823fa9e4066Sahrens { 824fa9e4066Sahrens return (dsl_dir_set_quota(zc->zc_name, zc->zc_cookie)); 825fa9e4066Sahrens } 826fa9e4066Sahrens 827fa9e4066Sahrens static int 828fa9e4066Sahrens zfs_ioc_set_reservation(zfs_cmd_t *zc) 829fa9e4066Sahrens { 830fa9e4066Sahrens return (dsl_dir_set_reservation(zc->zc_name, zc->zc_cookie)); 831fa9e4066Sahrens } 832fa9e4066Sahrens 833fa9e4066Sahrens static int 834fa9e4066Sahrens zfs_ioc_set_volsize(zfs_cmd_t *zc) 835fa9e4066Sahrens { 836fa9e4066Sahrens return (zvol_set_volsize(zc)); 837fa9e4066Sahrens } 838fa9e4066Sahrens 839fa9e4066Sahrens static int 840fa9e4066Sahrens zfs_ioc_set_volblocksize(zfs_cmd_t *zc) 841fa9e4066Sahrens { 842fa9e4066Sahrens return (zvol_set_volblocksize(zc)); 843fa9e4066Sahrens } 844fa9e4066Sahrens 845fa9e4066Sahrens static int 846fa9e4066Sahrens zfs_ioc_create_minor(zfs_cmd_t *zc) 847fa9e4066Sahrens { 848fa9e4066Sahrens return (zvol_create_minor(zc)); 849fa9e4066Sahrens } 850fa9e4066Sahrens 851fa9e4066Sahrens static int 852fa9e4066Sahrens zfs_ioc_remove_minor(zfs_cmd_t *zc) 853fa9e4066Sahrens { 854fa9e4066Sahrens return (zvol_remove_minor(zc)); 855fa9e4066Sahrens } 856fa9e4066Sahrens 857fa9e4066Sahrens /* 858fa9e4066Sahrens * Search the vfs list for a specified resource. Returns a pointer to it 859fa9e4066Sahrens * or NULL if no suitable entry is found. The caller of this routine 860fa9e4066Sahrens * is responsible for releasing the returned vfs pointer. 861fa9e4066Sahrens */ 862fa9e4066Sahrens static vfs_t * 863fa9e4066Sahrens zfs_get_vfs(const char *resource) 864fa9e4066Sahrens { 865fa9e4066Sahrens struct vfs *vfsp; 866fa9e4066Sahrens struct vfs *vfs_found = NULL; 867fa9e4066Sahrens 868fa9e4066Sahrens vfs_list_read_lock(); 869fa9e4066Sahrens vfsp = rootvfs; 870fa9e4066Sahrens do { 871fa9e4066Sahrens if (strcmp(refstr_value(vfsp->vfs_resource), resource) == 0) { 872fa9e4066Sahrens VFS_HOLD(vfsp); 873fa9e4066Sahrens vfs_found = vfsp; 874fa9e4066Sahrens break; 875fa9e4066Sahrens } 876fa9e4066Sahrens vfsp = vfsp->vfs_next; 877fa9e4066Sahrens } while (vfsp != rootvfs); 878fa9e4066Sahrens vfs_list_unlock(); 879fa9e4066Sahrens return (vfs_found); 880fa9e4066Sahrens } 881fa9e4066Sahrens 882fa9e4066Sahrens static void 883fa9e4066Sahrens zfs_create_cb(objset_t *os, void *arg, dmu_tx_t *tx) 884fa9e4066Sahrens { 885fa9e4066Sahrens zfs_cmd_t *zc = arg; 886fa9e4066Sahrens zfs_create_fs(os, (cred_t *)(uintptr_t)zc->zc_cred, tx); 887fa9e4066Sahrens } 888fa9e4066Sahrens 889fa9e4066Sahrens static int 890fa9e4066Sahrens zfs_ioc_create(zfs_cmd_t *zc) 891fa9e4066Sahrens { 892fa9e4066Sahrens objset_t *clone; 893fa9e4066Sahrens int error = 0; 894fa9e4066Sahrens void (*cbfunc)(objset_t *os, void *arg, dmu_tx_t *tx); 895fa9e4066Sahrens dmu_objset_type_t type = zc->zc_objset_type; 896fa9e4066Sahrens 897fa9e4066Sahrens switch (type) { 898fa9e4066Sahrens 899fa9e4066Sahrens case DMU_OST_ZFS: 900fa9e4066Sahrens cbfunc = zfs_create_cb; 901fa9e4066Sahrens break; 902fa9e4066Sahrens 903fa9e4066Sahrens case DMU_OST_ZVOL: 904fa9e4066Sahrens cbfunc = zvol_create_cb; 905fa9e4066Sahrens break; 906fa9e4066Sahrens 907fa9e4066Sahrens default: 908fa9e4066Sahrens return (EINVAL); 909fa9e4066Sahrens } 910fa9e4066Sahrens 911fa9e4066Sahrens if (zc->zc_filename[0] != '\0') { 912fa9e4066Sahrens /* 913fa9e4066Sahrens * We're creating a clone of an existing snapshot. 914fa9e4066Sahrens */ 915fa9e4066Sahrens zc->zc_filename[sizeof (zc->zc_filename) - 1] = '\0'; 916fa9e4066Sahrens if (dataset_namecheck(zc->zc_filename, NULL, NULL) != 0) 917fa9e4066Sahrens return (EINVAL); 918fa9e4066Sahrens 919fa9e4066Sahrens error = dmu_objset_open(zc->zc_filename, type, 920fa9e4066Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &clone); 921fa9e4066Sahrens if (error) 922fa9e4066Sahrens return (error); 923fa9e4066Sahrens error = dmu_objset_create(zc->zc_name, type, clone, NULL, NULL); 924fa9e4066Sahrens dmu_objset_close(clone); 925fa9e4066Sahrens } else if (strchr(zc->zc_name, '@') != 0) { 926fa9e4066Sahrens /* 927fa9e4066Sahrens * We're taking a snapshot of an existing dataset. 928fa9e4066Sahrens */ 929fa9e4066Sahrens error = dmu_objset_create(zc->zc_name, type, NULL, NULL, NULL); 930fa9e4066Sahrens } else { 931fa9e4066Sahrens /* 932fa9e4066Sahrens * We're creating a new dataset. 933fa9e4066Sahrens */ 934fa9e4066Sahrens if (type == DMU_OST_ZVOL) { 9355c5460e9Seschrock 936fa9e4066Sahrens if ((error = zvol_check_volblocksize(zc)) != 0) 937fa9e4066Sahrens return (error); 9385c5460e9Seschrock 9395c5460e9Seschrock if ((error = zvol_check_volsize(zc, 9405c5460e9Seschrock zc->zc_volblocksize)) != 0) 9415c5460e9Seschrock return (error); 942fa9e4066Sahrens } 943fa9e4066Sahrens error = dmu_objset_create(zc->zc_name, type, NULL, cbfunc, zc); 944fa9e4066Sahrens } 945fa9e4066Sahrens return (error); 946fa9e4066Sahrens } 947fa9e4066Sahrens 948fa9e4066Sahrens static int 949fa9e4066Sahrens zfs_ioc_destroy(zfs_cmd_t *zc) 950fa9e4066Sahrens { 951fa9e4066Sahrens if (strchr(zc->zc_name, '@') != NULL && 952fa9e4066Sahrens zc->zc_objset_type == DMU_OST_ZFS) { 953fa9e4066Sahrens vfs_t *vfsp; 954fa9e4066Sahrens int err; 955fa9e4066Sahrens 956fa9e4066Sahrens /* 957fa9e4066Sahrens * Snapshots under .zfs control must be unmounted 958fa9e4066Sahrens * before they can be destroyed. 959fa9e4066Sahrens */ 960fa9e4066Sahrens if ((vfsp = zfs_get_vfs(zc->zc_name)) != NULL) { 961fa9e4066Sahrens /* 962fa9e4066Sahrens * Always force the unmount for snapshots. 963fa9e4066Sahrens */ 964fa9e4066Sahrens int flag = MS_FORCE; 965fa9e4066Sahrens 966fa9e4066Sahrens if ((err = vn_vfswlock(vfsp->vfs_vnodecovered)) != 0) { 967fa9e4066Sahrens VFS_RELE(vfsp); 968fa9e4066Sahrens return (err); 969fa9e4066Sahrens } 970fa9e4066Sahrens VFS_RELE(vfsp); 971fa9e4066Sahrens if ((err = dounmount(vfsp, flag, kcred)) != 0) 972fa9e4066Sahrens return (err); 973fa9e4066Sahrens } 974fa9e4066Sahrens } 975fa9e4066Sahrens 976fa9e4066Sahrens return (dmu_objset_destroy(zc->zc_name)); 977fa9e4066Sahrens } 978fa9e4066Sahrens 979fa9e4066Sahrens static int 980fa9e4066Sahrens zfs_ioc_rollback(zfs_cmd_t *zc) 981fa9e4066Sahrens { 982fa9e4066Sahrens return (dmu_objset_rollback(zc->zc_name)); 983fa9e4066Sahrens } 984fa9e4066Sahrens 985fa9e4066Sahrens static int 986fa9e4066Sahrens zfs_ioc_rename(zfs_cmd_t *zc) 987fa9e4066Sahrens { 988fa9e4066Sahrens zc->zc_prop_value[sizeof (zc->zc_prop_value) - 1] = '\0'; 989fa9e4066Sahrens if (dataset_namecheck(zc->zc_prop_value, NULL, NULL) != 0) 990fa9e4066Sahrens return (EINVAL); 991fa9e4066Sahrens 992fa9e4066Sahrens if (strchr(zc->zc_name, '@') != NULL && 993fa9e4066Sahrens zc->zc_objset_type == DMU_OST_ZFS) { 994fa9e4066Sahrens vfs_t *vfsp; 995fa9e4066Sahrens int err; 996fa9e4066Sahrens 997fa9e4066Sahrens /* 998fa9e4066Sahrens * Snapshots under .zfs control must be unmounted 999fa9e4066Sahrens * before they can be renamed. 1000fa9e4066Sahrens */ 1001fa9e4066Sahrens if ((vfsp = zfs_get_vfs(zc->zc_name)) != NULL) { 1002fa9e4066Sahrens /* 1003fa9e4066Sahrens * Always force the unmount for snapshots. 1004fa9e4066Sahrens */ 1005fa9e4066Sahrens int flag = MS_FORCE; 1006fa9e4066Sahrens 1007fa9e4066Sahrens if ((err = vn_vfswlock(vfsp->vfs_vnodecovered)) != 0) { 1008fa9e4066Sahrens VFS_RELE(vfsp); 1009fa9e4066Sahrens return (err); 1010fa9e4066Sahrens } 1011fa9e4066Sahrens VFS_RELE(vfsp); 1012fa9e4066Sahrens if ((err = dounmount(vfsp, flag, kcred)) != 0) 1013fa9e4066Sahrens return (err); 1014fa9e4066Sahrens } 1015fa9e4066Sahrens } 1016fa9e4066Sahrens 1017fa9e4066Sahrens return (dmu_objset_rename(zc->zc_name, zc->zc_prop_value)); 1018fa9e4066Sahrens } 1019fa9e4066Sahrens 1020fa9e4066Sahrens static int 1021fa9e4066Sahrens zfs_ioc_recvbackup(zfs_cmd_t *zc) 1022fa9e4066Sahrens { 1023fa9e4066Sahrens file_t *fp; 1024fa9e4066Sahrens int error, fd; 1025fa9e4066Sahrens 1026fa9e4066Sahrens fd = zc->zc_cookie; 1027fa9e4066Sahrens fp = getf(fd); 1028fa9e4066Sahrens if (fp == NULL) 1029fa9e4066Sahrens return (EBADF); 1030*ea8dc4b6Seschrock error = dmu_recvbackup(zc->zc_filename, &zc->zc_begin_record, 1031*ea8dc4b6Seschrock &zc->zc_cookie, fp->f_vnode, fp->f_offset); 1032fa9e4066Sahrens releasef(fd); 1033fa9e4066Sahrens return (error); 1034fa9e4066Sahrens } 1035fa9e4066Sahrens 1036fa9e4066Sahrens static int 1037fa9e4066Sahrens zfs_ioc_sendbackup(zfs_cmd_t *zc) 1038fa9e4066Sahrens { 1039fa9e4066Sahrens objset_t *fromsnap = NULL; 1040fa9e4066Sahrens objset_t *tosnap; 1041fa9e4066Sahrens file_t *fp; 1042fa9e4066Sahrens int error; 1043fa9e4066Sahrens 1044fa9e4066Sahrens error = dmu_objset_open(zc->zc_name, DMU_OST_ANY, 1045fa9e4066Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &tosnap); 1046fa9e4066Sahrens if (error) 1047fa9e4066Sahrens return (error); 1048fa9e4066Sahrens 1049fa9e4066Sahrens if (zc->zc_prop_value[0] != '\0') { 1050fa9e4066Sahrens error = dmu_objset_open(zc->zc_prop_value, DMU_OST_ANY, 1051fa9e4066Sahrens DS_MODE_STANDARD | DS_MODE_READONLY, &fromsnap); 1052fa9e4066Sahrens if (error) { 1053fa9e4066Sahrens dmu_objset_close(tosnap); 1054fa9e4066Sahrens return (error); 1055fa9e4066Sahrens } 1056fa9e4066Sahrens } 1057fa9e4066Sahrens 1058fa9e4066Sahrens fp = getf(zc->zc_cookie); 1059fa9e4066Sahrens if (fp == NULL) { 1060fa9e4066Sahrens dmu_objset_close(tosnap); 1061fa9e4066Sahrens if (fromsnap) 1062fa9e4066Sahrens dmu_objset_close(fromsnap); 1063fa9e4066Sahrens return (EBADF); 1064fa9e4066Sahrens } 1065fa9e4066Sahrens 1066fa9e4066Sahrens error = dmu_sendbackup(tosnap, fromsnap, fp->f_vnode); 1067fa9e4066Sahrens 1068fa9e4066Sahrens releasef(zc->zc_cookie); 1069fa9e4066Sahrens if (fromsnap) 1070fa9e4066Sahrens dmu_objset_close(fromsnap); 1071fa9e4066Sahrens dmu_objset_close(tosnap); 1072fa9e4066Sahrens return (error); 1073fa9e4066Sahrens } 1074fa9e4066Sahrens 1075*ea8dc4b6Seschrock static int 1076*ea8dc4b6Seschrock zfs_ioc_inject_fault(zfs_cmd_t *zc) 1077*ea8dc4b6Seschrock { 1078*ea8dc4b6Seschrock int id, error; 1079*ea8dc4b6Seschrock 1080*ea8dc4b6Seschrock error = zio_inject_fault(zc->zc_name, (int)zc->zc_guid, &id, 1081*ea8dc4b6Seschrock &zc->zc_inject_record); 1082*ea8dc4b6Seschrock 1083*ea8dc4b6Seschrock if (error == 0) 1084*ea8dc4b6Seschrock zc->zc_guid = (uint64_t)id; 1085*ea8dc4b6Seschrock 1086*ea8dc4b6Seschrock return (error); 1087*ea8dc4b6Seschrock } 1088*ea8dc4b6Seschrock 1089*ea8dc4b6Seschrock static int 1090*ea8dc4b6Seschrock zfs_ioc_clear_fault(zfs_cmd_t *zc) 1091*ea8dc4b6Seschrock { 1092*ea8dc4b6Seschrock return (zio_clear_fault((int)zc->zc_guid)); 1093*ea8dc4b6Seschrock } 1094*ea8dc4b6Seschrock 1095*ea8dc4b6Seschrock static int 1096*ea8dc4b6Seschrock zfs_ioc_inject_list_next(zfs_cmd_t *zc) 1097*ea8dc4b6Seschrock { 1098*ea8dc4b6Seschrock int id = (int)zc->zc_guid; 1099*ea8dc4b6Seschrock int error; 1100*ea8dc4b6Seschrock 1101*ea8dc4b6Seschrock error = zio_inject_list_next(&id, zc->zc_name, sizeof (zc->zc_name), 1102*ea8dc4b6Seschrock &zc->zc_inject_record); 1103*ea8dc4b6Seschrock 1104*ea8dc4b6Seschrock zc->zc_guid = id; 1105*ea8dc4b6Seschrock 1106*ea8dc4b6Seschrock return (error); 1107*ea8dc4b6Seschrock } 1108*ea8dc4b6Seschrock 1109*ea8dc4b6Seschrock static int 1110*ea8dc4b6Seschrock zfs_ioc_error_log(zfs_cmd_t *zc) 1111*ea8dc4b6Seschrock { 1112*ea8dc4b6Seschrock spa_t *spa; 1113*ea8dc4b6Seschrock int error; 1114*ea8dc4b6Seschrock size_t count = (size_t)zc->zc_config_dst_size; 1115*ea8dc4b6Seschrock 1116*ea8dc4b6Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1117*ea8dc4b6Seschrock return (error); 1118*ea8dc4b6Seschrock 1119*ea8dc4b6Seschrock error = spa_get_errlog(spa, (void *)(uintptr_t)zc->zc_config_dst, 1120*ea8dc4b6Seschrock &count); 1121*ea8dc4b6Seschrock if (error == 0) 1122*ea8dc4b6Seschrock zc->zc_config_dst_size = count; 1123*ea8dc4b6Seschrock else 1124*ea8dc4b6Seschrock zc->zc_config_dst_size = spa_get_errlog_size(spa); 1125*ea8dc4b6Seschrock 1126*ea8dc4b6Seschrock spa_close(spa, FTAG); 1127*ea8dc4b6Seschrock 1128*ea8dc4b6Seschrock return (error); 1129*ea8dc4b6Seschrock } 1130*ea8dc4b6Seschrock 1131*ea8dc4b6Seschrock static int 1132*ea8dc4b6Seschrock zfs_ioc_clear(zfs_cmd_t *zc) 1133*ea8dc4b6Seschrock { 1134*ea8dc4b6Seschrock spa_t *spa; 1135*ea8dc4b6Seschrock vdev_t *vd; 1136*ea8dc4b6Seschrock int error; 1137*ea8dc4b6Seschrock 1138*ea8dc4b6Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1139*ea8dc4b6Seschrock return (error); 1140*ea8dc4b6Seschrock 1141*ea8dc4b6Seschrock spa_config_enter(spa, RW_WRITER, FTAG); 1142*ea8dc4b6Seschrock 1143*ea8dc4b6Seschrock if (zc->zc_prop_value[0] == '\0') 1144*ea8dc4b6Seschrock vd = NULL; 1145*ea8dc4b6Seschrock else if ((vd = spa_lookup_by_guid(spa, zc->zc_guid)) == NULL) { 1146*ea8dc4b6Seschrock spa_config_exit(spa, FTAG); 1147*ea8dc4b6Seschrock spa_close(spa, FTAG); 1148*ea8dc4b6Seschrock return (ENODEV); 1149*ea8dc4b6Seschrock } 1150*ea8dc4b6Seschrock 1151*ea8dc4b6Seschrock vdev_clear(spa, vd); 1152*ea8dc4b6Seschrock 1153*ea8dc4b6Seschrock spa_config_exit(spa, FTAG); 1154*ea8dc4b6Seschrock 1155*ea8dc4b6Seschrock spa_close(spa, FTAG); 1156*ea8dc4b6Seschrock 1157*ea8dc4b6Seschrock return (0); 1158*ea8dc4b6Seschrock } 1159*ea8dc4b6Seschrock 1160*ea8dc4b6Seschrock static int 1161*ea8dc4b6Seschrock zfs_ioc_bookmark_name(zfs_cmd_t *zc) 1162*ea8dc4b6Seschrock { 1163*ea8dc4b6Seschrock spa_t *spa; 1164*ea8dc4b6Seschrock int error; 1165*ea8dc4b6Seschrock 1166*ea8dc4b6Seschrock if ((error = spa_open(zc->zc_name, &spa, FTAG)) != 0) 1167*ea8dc4b6Seschrock return (error); 1168*ea8dc4b6Seschrock 1169*ea8dc4b6Seschrock error = spa_bookmark_name(spa, &zc->zc_bookmark, 1170*ea8dc4b6Seschrock zc->zc_prop_name, sizeof (zc->zc_prop_name), zc->zc_prop_value, 1171*ea8dc4b6Seschrock sizeof (zc->zc_prop_value), zc->zc_filename, 1172*ea8dc4b6Seschrock sizeof (zc->zc_filename)); 1173*ea8dc4b6Seschrock 1174*ea8dc4b6Seschrock spa_close(spa, FTAG); 1175*ea8dc4b6Seschrock 1176*ea8dc4b6Seschrock return (error); 1177*ea8dc4b6Seschrock } 1178*ea8dc4b6Seschrock 1179fa9e4066Sahrens static zfs_ioc_vec_t zfs_ioc_vec[] = { 1180fa9e4066Sahrens { zfs_ioc_pool_create, zfs_secpolicy_config, pool_name }, 1181fa9e4066Sahrens { zfs_ioc_pool_destroy, zfs_secpolicy_config, pool_name }, 1182fa9e4066Sahrens { zfs_ioc_pool_import, zfs_secpolicy_config, pool_name }, 1183fa9e4066Sahrens { zfs_ioc_pool_export, zfs_secpolicy_config, pool_name }, 1184fa9e4066Sahrens { zfs_ioc_pool_configs, zfs_secpolicy_none, no_name }, 1185fa9e4066Sahrens { zfs_ioc_pool_guid, zfs_secpolicy_read, pool_name }, 1186fa9e4066Sahrens { zfs_ioc_pool_stats, zfs_secpolicy_read, pool_name }, 1187fa9e4066Sahrens { zfs_ioc_pool_tryimport, zfs_secpolicy_config, no_name }, 1188fa9e4066Sahrens { zfs_ioc_pool_scrub, zfs_secpolicy_config, pool_name }, 1189fa9e4066Sahrens { zfs_ioc_pool_freeze, zfs_secpolicy_config, no_name }, 1190fa9e4066Sahrens { zfs_ioc_vdev_add, zfs_secpolicy_config, pool_name }, 1191fa9e4066Sahrens { zfs_ioc_vdev_remove, zfs_secpolicy_config, pool_name }, 1192fa9e4066Sahrens { zfs_ioc_vdev_online, zfs_secpolicy_config, pool_name }, 1193fa9e4066Sahrens { zfs_ioc_vdev_offline, zfs_secpolicy_config, pool_name }, 1194fa9e4066Sahrens { zfs_ioc_vdev_attach, zfs_secpolicy_config, pool_name }, 1195fa9e4066Sahrens { zfs_ioc_vdev_detach, zfs_secpolicy_config, pool_name }, 1196c67d9675Seschrock { zfs_ioc_vdev_setpath, zfs_secpolicy_config, pool_name }, 1197fa9e4066Sahrens { zfs_ioc_objset_stats, zfs_secpolicy_read, dataset_name }, 1198fa9e4066Sahrens { zfs_ioc_dataset_list_next, zfs_secpolicy_read, dataset_name }, 1199fa9e4066Sahrens { zfs_ioc_snapshot_list_next, zfs_secpolicy_read, dataset_name }, 1200fa9e4066Sahrens { zfs_ioc_set_prop, zfs_secpolicy_setprop, dataset_name }, 1201fa9e4066Sahrens { zfs_ioc_set_quota, zfs_secpolicy_quota, dataset_name }, 1202fa9e4066Sahrens { zfs_ioc_set_reservation, zfs_secpolicy_write, dataset_name }, 1203fa9e4066Sahrens { zfs_ioc_set_volsize, zfs_secpolicy_config, dataset_name }, 1204fa9e4066Sahrens { zfs_ioc_set_volblocksize, zfs_secpolicy_config, dataset_name }, 1205fa9e4066Sahrens { zfs_ioc_create_minor, zfs_secpolicy_config, dataset_name }, 1206fa9e4066Sahrens { zfs_ioc_remove_minor, zfs_secpolicy_config, dataset_name }, 1207fa9e4066Sahrens { zfs_ioc_create, zfs_secpolicy_parent, dataset_name }, 1208fa9e4066Sahrens { zfs_ioc_destroy, zfs_secpolicy_parent, dataset_name }, 1209fa9e4066Sahrens { zfs_ioc_rollback, zfs_secpolicy_write, dataset_name }, 1210fa9e4066Sahrens { zfs_ioc_rename, zfs_secpolicy_write, dataset_name }, 1211fa9e4066Sahrens { zfs_ioc_recvbackup, zfs_secpolicy_write, dataset_name }, 1212fa9e4066Sahrens { zfs_ioc_sendbackup, zfs_secpolicy_write, dataset_name }, 1213*ea8dc4b6Seschrock { zfs_ioc_inject_fault, zfs_secpolicy_inject, no_name }, 1214*ea8dc4b6Seschrock { zfs_ioc_clear_fault, zfs_secpolicy_inject, no_name }, 1215*ea8dc4b6Seschrock { zfs_ioc_inject_list_next, zfs_secpolicy_inject, no_name }, 1216*ea8dc4b6Seschrock { zfs_ioc_error_log, zfs_secpolicy_inject, pool_name }, 1217*ea8dc4b6Seschrock { zfs_ioc_clear, zfs_secpolicy_config, pool_name }, 1218*ea8dc4b6Seschrock { zfs_ioc_bookmark_name, zfs_secpolicy_inject, pool_name } 1219fa9e4066Sahrens }; 1220fa9e4066Sahrens 1221fa9e4066Sahrens static int 1222fa9e4066Sahrens zfsdev_ioctl(dev_t dev, int cmd, intptr_t arg, int flag, cred_t *cr, int *rvalp) 1223fa9e4066Sahrens { 1224fa9e4066Sahrens zfs_cmd_t *zc; 1225fa9e4066Sahrens uint_t vec; 1226fa9e4066Sahrens int error; 1227fa9e4066Sahrens 1228fa9e4066Sahrens if (getminor(dev) != 0) 1229fa9e4066Sahrens return (zvol_ioctl(dev, cmd, arg, flag, cr, rvalp)); 1230fa9e4066Sahrens 1231fa9e4066Sahrens vec = cmd - ZFS_IOC; 1232fa9e4066Sahrens 1233fa9e4066Sahrens if (vec >= sizeof (zfs_ioc_vec) / sizeof (zfs_ioc_vec[0])) 1234fa9e4066Sahrens return (EINVAL); 1235fa9e4066Sahrens 1236fa9e4066Sahrens zc = kmem_zalloc(sizeof (zfs_cmd_t), KM_SLEEP); 1237fa9e4066Sahrens 1238fa9e4066Sahrens error = xcopyin((void *)arg, zc, sizeof (zfs_cmd_t)); 1239fa9e4066Sahrens 1240fa9e4066Sahrens if (error == 0) { 1241fa9e4066Sahrens zc->zc_cred = (uintptr_t)cr; 1242fa9e4066Sahrens zc->zc_dev = dev; 1243fa9e4066Sahrens error = zfs_ioc_vec[vec].zvec_secpolicy(zc->zc_name, 1244fa9e4066Sahrens zc->zc_prop_name, cr); 1245fa9e4066Sahrens } 1246fa9e4066Sahrens 1247fa9e4066Sahrens /* 1248fa9e4066Sahrens * Ensure that all pool/dataset names are valid before we pass down to 1249fa9e4066Sahrens * the lower layers. 1250fa9e4066Sahrens */ 1251fa9e4066Sahrens if (error == 0) { 1252fa9e4066Sahrens zc->zc_name[sizeof (zc->zc_name) - 1] = '\0'; 1253fa9e4066Sahrens switch (zfs_ioc_vec[vec].zvec_namecheck) { 1254fa9e4066Sahrens case pool_name: 1255fa9e4066Sahrens if (pool_namecheck(zc->zc_name, NULL, NULL) != 0) 1256fa9e4066Sahrens error = EINVAL; 1257fa9e4066Sahrens break; 1258fa9e4066Sahrens 1259fa9e4066Sahrens case dataset_name: 1260fa9e4066Sahrens if (dataset_namecheck(zc->zc_name, NULL, NULL) != 0) 1261fa9e4066Sahrens error = EINVAL; 1262fa9e4066Sahrens break; 1263fa9e4066Sahrens } 1264fa9e4066Sahrens } 1265fa9e4066Sahrens 1266fa9e4066Sahrens if (error == 0) 1267fa9e4066Sahrens error = zfs_ioc_vec[vec].zvec_func(zc); 1268fa9e4066Sahrens 1269fa9e4066Sahrens if (error == 0 || error == ENOMEM) { 1270fa9e4066Sahrens int rc = xcopyout(zc, (void *)arg, sizeof (zfs_cmd_t)); 1271fa9e4066Sahrens if (error == 0) 1272fa9e4066Sahrens error = rc; 1273fa9e4066Sahrens } 1274fa9e4066Sahrens 1275fa9e4066Sahrens kmem_free(zc, sizeof (zfs_cmd_t)); 1276fa9e4066Sahrens return (error); 1277fa9e4066Sahrens } 1278fa9e4066Sahrens 1279fa9e4066Sahrens static int 1280fa9e4066Sahrens zfs_attach(dev_info_t *dip, ddi_attach_cmd_t cmd) 1281fa9e4066Sahrens { 1282fa9e4066Sahrens if (cmd != DDI_ATTACH) 1283fa9e4066Sahrens return (DDI_FAILURE); 1284fa9e4066Sahrens 1285fa9e4066Sahrens if (ddi_create_minor_node(dip, "zfs", S_IFCHR, 0, 1286fa9e4066Sahrens DDI_PSEUDO, 0) == DDI_FAILURE) 1287fa9e4066Sahrens return (DDI_FAILURE); 1288fa9e4066Sahrens 1289fa9e4066Sahrens zfs_dip = dip; 1290fa9e4066Sahrens 1291fa9e4066Sahrens ddi_report_dev(dip); 1292fa9e4066Sahrens 1293fa9e4066Sahrens return (DDI_SUCCESS); 1294fa9e4066Sahrens } 1295fa9e4066Sahrens 1296fa9e4066Sahrens static int 1297fa9e4066Sahrens zfs_detach(dev_info_t *dip, ddi_detach_cmd_t cmd) 1298fa9e4066Sahrens { 1299fa9e4066Sahrens if (spa_busy() || zfs_busy() || zvol_busy()) 1300fa9e4066Sahrens return (DDI_FAILURE); 1301fa9e4066Sahrens 1302fa9e4066Sahrens if (cmd != DDI_DETACH) 1303fa9e4066Sahrens return (DDI_FAILURE); 1304fa9e4066Sahrens 1305fa9e4066Sahrens zfs_dip = NULL; 1306fa9e4066Sahrens 1307fa9e4066Sahrens ddi_prop_remove_all(dip); 1308fa9e4066Sahrens ddi_remove_minor_node(dip, NULL); 1309fa9e4066Sahrens 1310fa9e4066Sahrens return (DDI_SUCCESS); 1311fa9e4066Sahrens } 1312fa9e4066Sahrens 1313fa9e4066Sahrens /*ARGSUSED*/ 1314fa9e4066Sahrens static int 1315fa9e4066Sahrens zfs_info(dev_info_t *dip, ddi_info_cmd_t infocmd, void *arg, void **result) 1316fa9e4066Sahrens { 1317fa9e4066Sahrens switch (infocmd) { 1318fa9e4066Sahrens case DDI_INFO_DEVT2DEVINFO: 1319fa9e4066Sahrens *result = zfs_dip; 1320fa9e4066Sahrens return (DDI_SUCCESS); 1321fa9e4066Sahrens 1322fa9e4066Sahrens case DDI_INFO_DEVT2INSTANCE: 1323a0965f35Sbonwick *result = (void *)0; 1324fa9e4066Sahrens return (DDI_SUCCESS); 1325fa9e4066Sahrens } 1326fa9e4066Sahrens 1327fa9e4066Sahrens return (DDI_FAILURE); 1328fa9e4066Sahrens } 1329fa9e4066Sahrens 1330fa9e4066Sahrens /* 1331fa9e4066Sahrens * OK, so this is a little weird. 1332fa9e4066Sahrens * 1333fa9e4066Sahrens * /dev/zfs is the control node, i.e. minor 0. 1334fa9e4066Sahrens * /dev/zvol/[r]dsk/pool/dataset are the zvols, minor > 0. 1335fa9e4066Sahrens * 1336fa9e4066Sahrens * /dev/zfs has basically nothing to do except serve up ioctls, 1337fa9e4066Sahrens * so most of the standard driver entry points are in zvol.c. 1338fa9e4066Sahrens */ 1339fa9e4066Sahrens static struct cb_ops zfs_cb_ops = { 1340fa9e4066Sahrens zvol_open, /* open */ 1341fa9e4066Sahrens zvol_close, /* close */ 1342fa9e4066Sahrens zvol_strategy, /* strategy */ 1343fa9e4066Sahrens nodev, /* print */ 1344fa9e4066Sahrens nodev, /* dump */ 1345fa9e4066Sahrens zvol_read, /* read */ 1346fa9e4066Sahrens zvol_write, /* write */ 1347fa9e4066Sahrens zfsdev_ioctl, /* ioctl */ 1348fa9e4066Sahrens nodev, /* devmap */ 1349fa9e4066Sahrens nodev, /* mmap */ 1350fa9e4066Sahrens nodev, /* segmap */ 1351fa9e4066Sahrens nochpoll, /* poll */ 1352fa9e4066Sahrens ddi_prop_op, /* prop_op */ 1353fa9e4066Sahrens NULL, /* streamtab */ 1354fa9e4066Sahrens D_NEW | D_MP | D_64BIT, /* Driver compatibility flag */ 1355fa9e4066Sahrens CB_REV, /* version */ 1356fa9e4066Sahrens zvol_aread, /* async read */ 1357fa9e4066Sahrens zvol_awrite, /* async write */ 1358fa9e4066Sahrens }; 1359fa9e4066Sahrens 1360fa9e4066Sahrens static struct dev_ops zfs_dev_ops = { 1361fa9e4066Sahrens DEVO_REV, /* version */ 1362fa9e4066Sahrens 0, /* refcnt */ 1363fa9e4066Sahrens zfs_info, /* info */ 1364fa9e4066Sahrens nulldev, /* identify */ 1365fa9e4066Sahrens nulldev, /* probe */ 1366fa9e4066Sahrens zfs_attach, /* attach */ 1367fa9e4066Sahrens zfs_detach, /* detach */ 1368fa9e4066Sahrens nodev, /* reset */ 1369fa9e4066Sahrens &zfs_cb_ops, /* driver operations */ 1370fa9e4066Sahrens NULL /* no bus operations */ 1371fa9e4066Sahrens }; 1372fa9e4066Sahrens 1373fa9e4066Sahrens static struct modldrv zfs_modldrv = { 1374fa9e4066Sahrens &mod_driverops, "ZFS storage pool version 1", &zfs_dev_ops 1375fa9e4066Sahrens }; 1376fa9e4066Sahrens 1377fa9e4066Sahrens static struct modlinkage modlinkage = { 1378fa9e4066Sahrens MODREV_1, 1379fa9e4066Sahrens (void *)&zfs_modlfs, 1380fa9e4066Sahrens (void *)&zfs_modldrv, 1381fa9e4066Sahrens NULL 1382fa9e4066Sahrens }; 1383fa9e4066Sahrens 1384fa9e4066Sahrens int 1385fa9e4066Sahrens _init(void) 1386fa9e4066Sahrens { 1387fa9e4066Sahrens int error; 1388fa9e4066Sahrens 1389a0965f35Sbonwick spa_init(FREAD | FWRITE); 1390a0965f35Sbonwick zfs_init(); 1391a0965f35Sbonwick zvol_init(); 1392a0965f35Sbonwick 1393a0965f35Sbonwick if ((error = mod_install(&modlinkage)) != 0) { 1394a0965f35Sbonwick zvol_fini(); 1395a0965f35Sbonwick zfs_fini(); 1396a0965f35Sbonwick spa_fini(); 1397fa9e4066Sahrens return (error); 1398a0965f35Sbonwick } 1399fa9e4066Sahrens 1400fa9e4066Sahrens error = ldi_ident_from_mod(&modlinkage, &zfs_li); 1401fa9e4066Sahrens ASSERT(error == 0); 1402fa9e4066Sahrens 1403fa9e4066Sahrens return (0); 1404fa9e4066Sahrens } 1405fa9e4066Sahrens 1406fa9e4066Sahrens int 1407fa9e4066Sahrens _fini(void) 1408fa9e4066Sahrens { 1409fa9e4066Sahrens int error; 1410fa9e4066Sahrens 1411*ea8dc4b6Seschrock if (spa_busy() || zfs_busy() || zvol_busy() || zio_injection_enabled) 1412fa9e4066Sahrens return (EBUSY); 1413fa9e4066Sahrens 1414fa9e4066Sahrens if ((error = mod_remove(&modlinkage)) != 0) 1415fa9e4066Sahrens return (error); 1416fa9e4066Sahrens 1417fa9e4066Sahrens zvol_fini(); 1418fa9e4066Sahrens zfs_fini(); 1419fa9e4066Sahrens spa_fini(); 1420fa9e4066Sahrens 1421fa9e4066Sahrens ldi_ident_release(zfs_li); 1422fa9e4066Sahrens zfs_li = NULL; 1423fa9e4066Sahrens 1424fa9e4066Sahrens return (error); 1425fa9e4066Sahrens } 1426fa9e4066Sahrens 1427fa9e4066Sahrens int 1428fa9e4066Sahrens _info(struct modinfo *modinfop) 1429fa9e4066Sahrens { 1430fa9e4066Sahrens return (mod_info(&modlinkage, modinfop)); 1431fa9e4066Sahrens } 1432