1168404Spjd/* 2168404Spjd * CDDL HEADER START 3168404Spjd * 4168404Spjd * The contents of this file are subject to the terms of the 5168404Spjd * Common Development and Distribution License (the "License"). 6168404Spjd * You may not use this file except in compliance with the License. 7168404Spjd * 8168404Spjd * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9168404Spjd * or http://www.opensolaris.org/os/licensing. 10168404Spjd * See the License for the specific language governing permissions 11168404Spjd * and limitations under the License. 12168404Spjd * 13168404Spjd * When distributing Covered Code, include this CDDL HEADER in each 14168404Spjd * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15168404Spjd * If applicable, add the following below this CDDL HEADER, with the 16168404Spjd * fields enclosed by brackets "[]" replaced with your own identifying 17168404Spjd * information: Portions Copyright [yyyy] [name of copyright owner] 18168404Spjd * 19168404Spjd * CDDL HEADER END 20168404Spjd */ 21168404Spjd 22168404Spjd/* 23219089Spjd * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved. 24332525Smav * Copyright (c) 2011, 2017 by Delphix. All rights reserved. 25255750Sdelphij * Copyright (c) 2013, Joyent, Inc. All rights reserved. 26297763Smav * Copyright 2016 Nexenta Systems, Inc. 27307050Smav * Copyright 2016 Igor Kozhukhov <ikozhukhov@gmail.com> 28324010Savg * Copyright (c) 2017 Datto Inc. 29168404Spjd */ 30168404Spjd 31168404Spjd#include <sys/types.h> 32168404Spjd#include <sys/stat.h> 33168404Spjd#include <ctype.h> 34168404Spjd#include <errno.h> 35168404Spjd#include <devid.h> 36168404Spjd#include <fcntl.h> 37168404Spjd#include <libintl.h> 38168404Spjd#include <stdio.h> 39168404Spjd#include <stdlib.h> 40168404Spjd#include <strings.h> 41168404Spjd#include <unistd.h> 42248571Smm#include <libgen.h> 43168404Spjd#include <sys/zfs_ioctl.h> 44219089Spjd#include <dlfcn.h> 45168404Spjd 46168404Spjd#include "zfs_namecheck.h" 47168404Spjd#include "zfs_prop.h" 48168404Spjd#include "libzfs_impl.h" 49219089Spjd#include "zfs_comutil.h" 50236884Smm#include "zfeature_common.h" 51168404Spjd 52331395Smavstatic int read_efi_label(nvlist_t *, diskaddr_t *, boolean_t *); 53329492Smavstatic boolean_t zpool_vdev_is_interior(const char *name); 54185029Spjd 55219089Spjd#define BACKUP_SLICE "s2" 56209962Smm 57219089Spjdtypedef struct prop_flags { 58219089Spjd int create:1; /* Validate property on creation */ 59219089Spjd int import:1; /* Validate property on import */ 60219089Spjd} prop_flags_t; 61219089Spjd 62168404Spjd/* 63185029Spjd * ==================================================================== 64185029Spjd * zpool property functions 65185029Spjd * ==================================================================== 66185029Spjd */ 67185029Spjd 68185029Spjdstatic int 69185029Spjdzpool_get_all_props(zpool_handle_t *zhp) 70185029Spjd{ 71185029Spjd zfs_cmd_t zc = { 0 }; 72185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 73185029Spjd 74185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 75185029Spjd 76185029Spjd if (zcmd_alloc_dst_nvlist(hdl, &zc, 0) != 0) 77185029Spjd return (-1); 78185029Spjd 79185029Spjd while (ioctl(hdl->libzfs_fd, ZFS_IOC_POOL_GET_PROPS, &zc) != 0) { 80185029Spjd if (errno == ENOMEM) { 81185029Spjd if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) { 82185029Spjd zcmd_free_nvlists(&zc); 83185029Spjd return (-1); 84185029Spjd } 85185029Spjd } else { 86185029Spjd zcmd_free_nvlists(&zc); 87185029Spjd return (-1); 88185029Spjd } 89185029Spjd } 90185029Spjd 91185029Spjd if (zcmd_read_dst_nvlist(hdl, &zc, &zhp->zpool_props) != 0) { 92185029Spjd zcmd_free_nvlists(&zc); 93185029Spjd return (-1); 94185029Spjd } 95185029Spjd 96185029Spjd zcmd_free_nvlists(&zc); 97185029Spjd 98185029Spjd return (0); 99185029Spjd} 100185029Spjd 101185029Spjdstatic int 102185029Spjdzpool_props_refresh(zpool_handle_t *zhp) 103185029Spjd{ 104185029Spjd nvlist_t *old_props; 105185029Spjd 106185029Spjd old_props = zhp->zpool_props; 107185029Spjd 108185029Spjd if (zpool_get_all_props(zhp) != 0) 109185029Spjd return (-1); 110185029Spjd 111185029Spjd nvlist_free(old_props); 112185029Spjd return (0); 113185029Spjd} 114185029Spjd 115185029Spjdstatic char * 116185029Spjdzpool_get_prop_string(zpool_handle_t *zhp, zpool_prop_t prop, 117185029Spjd zprop_source_t *src) 118185029Spjd{ 119185029Spjd nvlist_t *nv, *nvl; 120185029Spjd uint64_t ival; 121185029Spjd char *value; 122185029Spjd zprop_source_t source; 123185029Spjd 124185029Spjd nvl = zhp->zpool_props; 125185029Spjd if (nvlist_lookup_nvlist(nvl, zpool_prop_to_name(prop), &nv) == 0) { 126185029Spjd verify(nvlist_lookup_uint64(nv, ZPROP_SOURCE, &ival) == 0); 127185029Spjd source = ival; 128185029Spjd verify(nvlist_lookup_string(nv, ZPROP_VALUE, &value) == 0); 129185029Spjd } else { 130185029Spjd source = ZPROP_SRC_DEFAULT; 131185029Spjd if ((value = (char *)zpool_prop_default_string(prop)) == NULL) 132185029Spjd value = "-"; 133185029Spjd } 134185029Spjd 135185029Spjd if (src) 136185029Spjd *src = source; 137185029Spjd 138185029Spjd return (value); 139185029Spjd} 140185029Spjd 141185029Spjduint64_t 142185029Spjdzpool_get_prop_int(zpool_handle_t *zhp, zpool_prop_t prop, zprop_source_t *src) 143185029Spjd{ 144185029Spjd nvlist_t *nv, *nvl; 145185029Spjd uint64_t value; 146185029Spjd zprop_source_t source; 147185029Spjd 148185029Spjd if (zhp->zpool_props == NULL && zpool_get_all_props(zhp)) { 149185029Spjd /* 150185029Spjd * zpool_get_all_props() has most likely failed because 151185029Spjd * the pool is faulted, but if all we need is the top level 152185029Spjd * vdev's guid then get it from the zhp config nvlist. 153185029Spjd */ 154185029Spjd if ((prop == ZPOOL_PROP_GUID) && 155185029Spjd (nvlist_lookup_nvlist(zhp->zpool_config, 156185029Spjd ZPOOL_CONFIG_VDEV_TREE, &nv) == 0) && 157185029Spjd (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, &value) 158185029Spjd == 0)) { 159185029Spjd return (value); 160185029Spjd } 161185029Spjd return (zpool_prop_default_numeric(prop)); 162185029Spjd } 163185029Spjd 164185029Spjd nvl = zhp->zpool_props; 165185029Spjd if (nvlist_lookup_nvlist(nvl, zpool_prop_to_name(prop), &nv) == 0) { 166185029Spjd verify(nvlist_lookup_uint64(nv, ZPROP_SOURCE, &value) == 0); 167185029Spjd source = value; 168185029Spjd verify(nvlist_lookup_uint64(nv, ZPROP_VALUE, &value) == 0); 169185029Spjd } else { 170185029Spjd source = ZPROP_SRC_DEFAULT; 171185029Spjd value = zpool_prop_default_numeric(prop); 172185029Spjd } 173185029Spjd 174185029Spjd if (src) 175185029Spjd *src = source; 176185029Spjd 177185029Spjd return (value); 178185029Spjd} 179185029Spjd 180185029Spjd/* 181185029Spjd * Map VDEV STATE to printed strings. 182185029Spjd */ 183224169Sgibbsconst char * 184185029Spjdzpool_state_to_name(vdev_state_t state, vdev_aux_t aux) 185185029Spjd{ 186185029Spjd switch (state) { 187185029Spjd case VDEV_STATE_CLOSED: 188185029Spjd case VDEV_STATE_OFFLINE: 189185029Spjd return (gettext("OFFLINE")); 190185029Spjd case VDEV_STATE_REMOVED: 191185029Spjd return (gettext("REMOVED")); 192185029Spjd case VDEV_STATE_CANT_OPEN: 193185029Spjd if (aux == VDEV_AUX_CORRUPT_DATA || aux == VDEV_AUX_BAD_LOG) 194185029Spjd return (gettext("FAULTED")); 195219089Spjd else if (aux == VDEV_AUX_SPLIT_POOL) 196219089Spjd return (gettext("SPLIT")); 197185029Spjd else 198185029Spjd return (gettext("UNAVAIL")); 199185029Spjd case VDEV_STATE_FAULTED: 200185029Spjd return (gettext("FAULTED")); 201185029Spjd case VDEV_STATE_DEGRADED: 202185029Spjd return (gettext("DEGRADED")); 203185029Spjd case VDEV_STATE_HEALTHY: 204185029Spjd return (gettext("ONLINE")); 205307050Smav 206307050Smav default: 207307050Smav break; 208185029Spjd } 209185029Spjd 210185029Spjd return (gettext("UNKNOWN")); 211185029Spjd} 212185029Spjd 213185029Spjd/* 214224169Sgibbs * Map POOL STATE to printed strings. 215224169Sgibbs */ 216224169Sgibbsconst char * 217224169Sgibbszpool_pool_state_to_name(pool_state_t state) 218224169Sgibbs{ 219224169Sgibbs switch (state) { 220224169Sgibbs case POOL_STATE_ACTIVE: 221224169Sgibbs return (gettext("ACTIVE")); 222224169Sgibbs case POOL_STATE_EXPORTED: 223224169Sgibbs return (gettext("EXPORTED")); 224224169Sgibbs case POOL_STATE_DESTROYED: 225224169Sgibbs return (gettext("DESTROYED")); 226224169Sgibbs case POOL_STATE_SPARE: 227224169Sgibbs return (gettext("SPARE")); 228224169Sgibbs case POOL_STATE_L2CACHE: 229224169Sgibbs return (gettext("L2CACHE")); 230224169Sgibbs case POOL_STATE_UNINITIALIZED: 231224169Sgibbs return (gettext("UNINITIALIZED")); 232224169Sgibbs case POOL_STATE_UNAVAIL: 233224169Sgibbs return (gettext("UNAVAIL")); 234224169Sgibbs case POOL_STATE_POTENTIALLY_ACTIVE: 235224169Sgibbs return (gettext("POTENTIALLY_ACTIVE")); 236224169Sgibbs } 237224169Sgibbs 238224169Sgibbs return (gettext("UNKNOWN")); 239224169Sgibbs} 240224169Sgibbs 241224169Sgibbs/* 242185029Spjd * Get a zpool property value for 'prop' and return the value in 243185029Spjd * a pre-allocated buffer. 244185029Spjd */ 245185029Spjdint 246185029Spjdzpool_get_prop(zpool_handle_t *zhp, zpool_prop_t prop, char *buf, size_t len, 247263889Sdelphij zprop_source_t *srctype, boolean_t literal) 248185029Spjd{ 249185029Spjd uint64_t intval; 250185029Spjd const char *strval; 251185029Spjd zprop_source_t src = ZPROP_SRC_NONE; 252185029Spjd nvlist_t *nvroot; 253185029Spjd vdev_stat_t *vs; 254185029Spjd uint_t vsc; 255185029Spjd 256185029Spjd if (zpool_get_state(zhp) == POOL_STATE_UNAVAIL) { 257209962Smm switch (prop) { 258209962Smm case ZPOOL_PROP_NAME: 259185029Spjd (void) strlcpy(buf, zpool_get_name(zhp), len); 260209962Smm break; 261209962Smm 262209962Smm case ZPOOL_PROP_HEALTH: 263276446Ssmh (void) strlcpy(buf, 264276446Ssmh zpool_pool_state_to_name(POOL_STATE_UNAVAIL), len); 265209962Smm break; 266209962Smm 267209962Smm case ZPOOL_PROP_GUID: 268209962Smm intval = zpool_get_prop_int(zhp, prop, &src); 269209962Smm (void) snprintf(buf, len, "%llu", intval); 270209962Smm break; 271209962Smm 272209962Smm case ZPOOL_PROP_ALTROOT: 273209962Smm case ZPOOL_PROP_CACHEFILE: 274228103Smm case ZPOOL_PROP_COMMENT: 275209962Smm if (zhp->zpool_props != NULL || 276209962Smm zpool_get_all_props(zhp) == 0) { 277209962Smm (void) strlcpy(buf, 278209962Smm zpool_get_prop_string(zhp, prop, &src), 279209962Smm len); 280263889Sdelphij break; 281209962Smm } 282209962Smm /* FALLTHROUGH */ 283209962Smm default: 284185029Spjd (void) strlcpy(buf, "-", len); 285209962Smm break; 286209962Smm } 287209962Smm 288209962Smm if (srctype != NULL) 289209962Smm *srctype = src; 290185029Spjd return (0); 291185029Spjd } 292185029Spjd 293185029Spjd if (zhp->zpool_props == NULL && zpool_get_all_props(zhp) && 294185029Spjd prop != ZPOOL_PROP_NAME) 295185029Spjd return (-1); 296185029Spjd 297185029Spjd switch (zpool_prop_get_type(prop)) { 298185029Spjd case PROP_TYPE_STRING: 299185029Spjd (void) strlcpy(buf, zpool_get_prop_string(zhp, prop, &src), 300185029Spjd len); 301185029Spjd break; 302185029Spjd 303185029Spjd case PROP_TYPE_NUMBER: 304185029Spjd intval = zpool_get_prop_int(zhp, prop, &src); 305185029Spjd 306185029Spjd switch (prop) { 307185029Spjd case ZPOOL_PROP_SIZE: 308219089Spjd case ZPOOL_PROP_ALLOCATED: 309219089Spjd case ZPOOL_PROP_FREE: 310236884Smm case ZPOOL_PROP_FREEING: 311268079Sdelphij case ZPOOL_PROP_LEAKED: 312263889Sdelphij if (literal) { 313263889Sdelphij (void) snprintf(buf, len, "%llu", 314263889Sdelphij (u_longlong_t)intval); 315263889Sdelphij } else { 316263889Sdelphij (void) zfs_nicenum(intval, buf, len); 317263889Sdelphij } 318185029Spjd break; 319331395Smav case ZPOOL_PROP_BOOTSIZE: 320272502Sdelphij case ZPOOL_PROP_EXPANDSZ: 321332547Smav case ZPOOL_PROP_CHECKPOINT: 322272502Sdelphij if (intval == 0) { 323272502Sdelphij (void) strlcpy(buf, "-", len); 324272502Sdelphij } else if (literal) { 325272502Sdelphij (void) snprintf(buf, len, "%llu", 326272502Sdelphij (u_longlong_t)intval); 327272502Sdelphij } else { 328272502Sdelphij (void) zfs_nicenum(intval, buf, len); 329272502Sdelphij } 330272502Sdelphij break; 331185029Spjd case ZPOOL_PROP_CAPACITY: 332263889Sdelphij if (literal) { 333263889Sdelphij (void) snprintf(buf, len, "%llu", 334263889Sdelphij (u_longlong_t)intval); 335263889Sdelphij } else { 336263889Sdelphij (void) snprintf(buf, len, "%llu%%", 337263889Sdelphij (u_longlong_t)intval); 338263889Sdelphij } 339185029Spjd break; 340269118Sdelphij case ZPOOL_PROP_FRAGMENTATION: 341269118Sdelphij if (intval == UINT64_MAX) { 342269118Sdelphij (void) strlcpy(buf, "-", len); 343269118Sdelphij } else { 344269118Sdelphij (void) snprintf(buf, len, "%llu%%", 345269118Sdelphij (u_longlong_t)intval); 346269118Sdelphij } 347269118Sdelphij break; 348219089Spjd case ZPOOL_PROP_DEDUPRATIO: 349219089Spjd (void) snprintf(buf, len, "%llu.%02llux", 350219089Spjd (u_longlong_t)(intval / 100), 351219089Spjd (u_longlong_t)(intval % 100)); 352219089Spjd break; 353185029Spjd case ZPOOL_PROP_HEALTH: 354185029Spjd verify(nvlist_lookup_nvlist(zpool_get_config(zhp, NULL), 355185029Spjd ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0); 356185029Spjd verify(nvlist_lookup_uint64_array(nvroot, 357219089Spjd ZPOOL_CONFIG_VDEV_STATS, (uint64_t **)&vs, &vsc) 358219089Spjd == 0); 359185029Spjd 360185029Spjd (void) strlcpy(buf, zpool_state_to_name(intval, 361185029Spjd vs->vs_aux), len); 362185029Spjd break; 363236884Smm case ZPOOL_PROP_VERSION: 364236884Smm if (intval >= SPA_VERSION_FEATURES) { 365236884Smm (void) snprintf(buf, len, "-"); 366236884Smm break; 367236884Smm } 368236884Smm /* FALLTHROUGH */ 369185029Spjd default: 370185029Spjd (void) snprintf(buf, len, "%llu", intval); 371185029Spjd } 372185029Spjd break; 373185029Spjd 374185029Spjd case PROP_TYPE_INDEX: 375185029Spjd intval = zpool_get_prop_int(zhp, prop, &src); 376185029Spjd if (zpool_prop_index_to_string(prop, intval, &strval) 377185029Spjd != 0) 378185029Spjd return (-1); 379185029Spjd (void) strlcpy(buf, strval, len); 380185029Spjd break; 381185029Spjd 382185029Spjd default: 383185029Spjd abort(); 384185029Spjd } 385185029Spjd 386185029Spjd if (srctype) 387185029Spjd *srctype = src; 388185029Spjd 389185029Spjd return (0); 390185029Spjd} 391185029Spjd 392185029Spjd/* 393185029Spjd * Check if the bootfs name has the same pool name as it is set to. 394185029Spjd * Assuming bootfs is a valid dataset name. 395185029Spjd */ 396185029Spjdstatic boolean_t 397185029Spjdbootfs_name_valid(const char *pool, char *bootfs) 398185029Spjd{ 399185029Spjd int len = strlen(pool); 400185029Spjd 401185029Spjd if (!zfs_name_valid(bootfs, ZFS_TYPE_FILESYSTEM|ZFS_TYPE_SNAPSHOT)) 402185029Spjd return (B_FALSE); 403185029Spjd 404185029Spjd if (strncmp(pool, bootfs, len) == 0 && 405185029Spjd (bootfs[len] == '/' || bootfs[len] == '\0')) 406185029Spjd return (B_TRUE); 407185029Spjd 408185029Spjd return (B_FALSE); 409185029Spjd} 410185029Spjd 411236155Smmboolean_t 412236155Smmzpool_is_bootable(zpool_handle_t *zhp) 413219089Spjd{ 414307108Smav char bootfs[ZFS_MAX_DATASET_NAME_LEN]; 415219089Spjd 416219089Spjd return (zpool_get_prop(zhp, ZPOOL_PROP_BOOTFS, bootfs, 417263889Sdelphij sizeof (bootfs), NULL, B_FALSE) == 0 && strncmp(bootfs, "-", 418219089Spjd sizeof (bootfs)) != 0); 419219089Spjd} 420219089Spjd 421219089Spjd 422185029Spjd/* 423185029Spjd * Given an nvlist of zpool properties to be set, validate that they are 424185029Spjd * correct, and parse any numeric properties (index, boolean, etc) if they are 425185029Spjd * specified as strings. 426185029Spjd */ 427185029Spjdstatic nvlist_t * 428185029Spjdzpool_valid_proplist(libzfs_handle_t *hdl, const char *poolname, 429219089Spjd nvlist_t *props, uint64_t version, prop_flags_t flags, char *errbuf) 430185029Spjd{ 431185029Spjd nvpair_t *elem; 432185029Spjd nvlist_t *retprops; 433185029Spjd zpool_prop_t prop; 434185029Spjd char *strval; 435185029Spjd uint64_t intval; 436228103Smm char *slash, *check; 437185029Spjd struct stat64 statbuf; 438185029Spjd zpool_handle_t *zhp; 439185029Spjd 440185029Spjd if (nvlist_alloc(&retprops, NV_UNIQUE_NAME, 0) != 0) { 441185029Spjd (void) no_memory(hdl); 442185029Spjd return (NULL); 443185029Spjd } 444185029Spjd 445185029Spjd elem = NULL; 446185029Spjd while ((elem = nvlist_next_nvpair(props, elem)) != NULL) { 447185029Spjd const char *propname = nvpair_name(elem); 448185029Spjd 449236884Smm prop = zpool_name_to_prop(propname); 450329493Smav if (prop == ZPOOL_PROP_INVAL && zpool_prop_feature(propname)) { 451236884Smm int err; 452236884Smm char *fname = strchr(propname, '@') + 1; 453236884Smm 454259813Sdelphij err = zfeature_lookup_name(fname, NULL); 455236884Smm if (err != 0) { 456236884Smm ASSERT3U(err, ==, ENOENT); 457236884Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 458236884Smm "invalid feature '%s'"), fname); 459236884Smm (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 460236884Smm goto error; 461236884Smm } 462236884Smm 463236884Smm if (nvpair_type(elem) != DATA_TYPE_STRING) { 464236884Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 465236884Smm "'%s' must be a string"), propname); 466236884Smm (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 467236884Smm goto error; 468236884Smm } 469236884Smm 470236884Smm (void) nvpair_value_string(elem, &strval); 471236884Smm if (strcmp(strval, ZFS_FEATURE_ENABLED) != 0) { 472236884Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 473236884Smm "property '%s' can only be set to " 474236884Smm "'enabled'"), propname); 475236884Smm (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 476236884Smm goto error; 477236884Smm } 478236884Smm 479236884Smm if (nvlist_add_uint64(retprops, propname, 0) != 0) { 480236884Smm (void) no_memory(hdl); 481236884Smm goto error; 482236884Smm } 483236884Smm continue; 484236884Smm } 485236884Smm 486185029Spjd /* 487185029Spjd * Make sure this property is valid and applies to this type. 488185029Spjd */ 489329493Smav if (prop == ZPOOL_PROP_INVAL) { 490185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 491185029Spjd "invalid property '%s'"), propname); 492185029Spjd (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 493185029Spjd goto error; 494185029Spjd } 495185029Spjd 496185029Spjd if (zpool_prop_readonly(prop)) { 497185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "'%s' " 498185029Spjd "is readonly"), propname); 499185029Spjd (void) zfs_error(hdl, EZFS_PROPREADONLY, errbuf); 500185029Spjd goto error; 501185029Spjd } 502185029Spjd 503185029Spjd if (zprop_parse_value(hdl, elem, prop, ZFS_TYPE_POOL, retprops, 504185029Spjd &strval, &intval, errbuf) != 0) 505185029Spjd goto error; 506185029Spjd 507185029Spjd /* 508185029Spjd * Perform additional checking for specific properties. 509185029Spjd */ 510185029Spjd switch (prop) { 511185029Spjd case ZPOOL_PROP_VERSION: 512236884Smm if (intval < version || 513236884Smm !SPA_VERSION_IS_SUPPORTED(intval)) { 514185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 515185029Spjd "property '%s' number %d is invalid."), 516185029Spjd propname, intval); 517185029Spjd (void) zfs_error(hdl, EZFS_BADVERSION, errbuf); 518185029Spjd goto error; 519185029Spjd } 520185029Spjd break; 521185029Spjd 522331395Smav case ZPOOL_PROP_BOOTSIZE: 523331395Smav if (!flags.create) { 524331395Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 525331395Smav "property '%s' can only be set during pool " 526331395Smav "creation"), propname); 527331395Smav (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 528331395Smav goto error; 529331395Smav } 530331395Smav break; 531331395Smav 532185029Spjd case ZPOOL_PROP_BOOTFS: 533219089Spjd if (flags.create || flags.import) { 534185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 535185029Spjd "property '%s' cannot be set at creation " 536185029Spjd "or import time"), propname); 537185029Spjd (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 538185029Spjd goto error; 539185029Spjd } 540185029Spjd 541185029Spjd if (version < SPA_VERSION_BOOTFS) { 542185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 543185029Spjd "pool must be upgraded to support " 544185029Spjd "'%s' property"), propname); 545185029Spjd (void) zfs_error(hdl, EZFS_BADVERSION, errbuf); 546185029Spjd goto error; 547185029Spjd } 548185029Spjd 549185029Spjd /* 550185029Spjd * bootfs property value has to be a dataset name and 551185029Spjd * the dataset has to be in the same pool as it sets to. 552185029Spjd */ 553185029Spjd if (strval[0] != '\0' && !bootfs_name_valid(poolname, 554185029Spjd strval)) { 555185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "'%s' " 556185029Spjd "is an invalid name"), strval); 557185029Spjd (void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf); 558185029Spjd goto error; 559185029Spjd } 560185029Spjd 561185029Spjd if ((zhp = zpool_open_canfail(hdl, poolname)) == NULL) { 562185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 563185029Spjd "could not open pool '%s'"), poolname); 564185029Spjd (void) zfs_error(hdl, EZFS_OPENFAILED, errbuf); 565185029Spjd goto error; 566185029Spjd } 567185029Spjd zpool_close(zhp); 568185029Spjd break; 569185029Spjd 570185029Spjd case ZPOOL_PROP_ALTROOT: 571219089Spjd if (!flags.create && !flags.import) { 572185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 573185029Spjd "property '%s' can only be set during pool " 574185029Spjd "creation or import"), propname); 575185029Spjd (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 576185029Spjd goto error; 577185029Spjd } 578185029Spjd 579185029Spjd if (strval[0] != '/') { 580185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 581185029Spjd "bad alternate root '%s'"), strval); 582185029Spjd (void) zfs_error(hdl, EZFS_BADPATH, errbuf); 583185029Spjd goto error; 584185029Spjd } 585185029Spjd break; 586185029Spjd 587185029Spjd case ZPOOL_PROP_CACHEFILE: 588185029Spjd if (strval[0] == '\0') 589185029Spjd break; 590185029Spjd 591185029Spjd if (strcmp(strval, "none") == 0) 592185029Spjd break; 593185029Spjd 594185029Spjd if (strval[0] != '/') { 595185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 596185029Spjd "property '%s' must be empty, an " 597185029Spjd "absolute path, or 'none'"), propname); 598185029Spjd (void) zfs_error(hdl, EZFS_BADPATH, errbuf); 599185029Spjd goto error; 600185029Spjd } 601185029Spjd 602185029Spjd slash = strrchr(strval, '/'); 603185029Spjd 604185029Spjd if (slash[1] == '\0' || strcmp(slash, "/.") == 0 || 605185029Spjd strcmp(slash, "/..") == 0) { 606185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 607185029Spjd "'%s' is not a valid file"), strval); 608185029Spjd (void) zfs_error(hdl, EZFS_BADPATH, errbuf); 609185029Spjd goto error; 610185029Spjd } 611185029Spjd 612185029Spjd *slash = '\0'; 613185029Spjd 614185029Spjd if (strval[0] != '\0' && 615185029Spjd (stat64(strval, &statbuf) != 0 || 616185029Spjd !S_ISDIR(statbuf.st_mode))) { 617185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 618185029Spjd "'%s' is not a valid directory"), 619185029Spjd strval); 620185029Spjd (void) zfs_error(hdl, EZFS_BADPATH, errbuf); 621185029Spjd goto error; 622185029Spjd } 623185029Spjd 624185029Spjd *slash = '/'; 625185029Spjd break; 626219089Spjd 627228103Smm case ZPOOL_PROP_COMMENT: 628228103Smm for (check = strval; *check != '\0'; check++) { 629228103Smm if (!isprint(*check)) { 630228103Smm zfs_error_aux(hdl, 631228103Smm dgettext(TEXT_DOMAIN, 632228103Smm "comment may only have printable " 633228103Smm "characters")); 634228103Smm (void) zfs_error(hdl, EZFS_BADPROP, 635228103Smm errbuf); 636228103Smm goto error; 637228103Smm } 638228103Smm } 639228103Smm if (strlen(strval) > ZPROP_MAX_COMMENT) { 640228103Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 641228103Smm "comment must not exceed %d characters"), 642228103Smm ZPROP_MAX_COMMENT); 643228103Smm (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 644228103Smm goto error; 645228103Smm } 646228103Smm break; 647333194Savg 648219089Spjd case ZPOOL_PROP_READONLY: 649219089Spjd if (!flags.import) { 650219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 651219089Spjd "property '%s' can only be set at " 652219089Spjd "import time"), propname); 653219089Spjd (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 654219089Spjd goto error; 655219089Spjd } 656219089Spjd break; 657307050Smav 658333194Savg case ZPOOL_PROP_TNAME: 659333194Savg if (!flags.create) { 660333194Savg zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 661333194Savg "property '%s' can only be set at " 662333194Savg "creation time"), propname); 663333194Savg (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 664333194Savg goto error; 665333194Savg } 666333194Savg break; 667333194Savg 668307050Smav default: 669307050Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 670307050Smav "property '%s'(%d) not defined"), propname, prop); 671307050Smav break; 672185029Spjd } 673185029Spjd } 674185029Spjd 675185029Spjd return (retprops); 676185029Spjderror: 677185029Spjd nvlist_free(retprops); 678185029Spjd return (NULL); 679185029Spjd} 680185029Spjd 681185029Spjd/* 682185029Spjd * Set zpool property : propname=propval. 683185029Spjd */ 684185029Spjdint 685185029Spjdzpool_set_prop(zpool_handle_t *zhp, const char *propname, const char *propval) 686185029Spjd{ 687185029Spjd zfs_cmd_t zc = { 0 }; 688185029Spjd int ret = -1; 689185029Spjd char errbuf[1024]; 690185029Spjd nvlist_t *nvl = NULL; 691185029Spjd nvlist_t *realprops; 692185029Spjd uint64_t version; 693219089Spjd prop_flags_t flags = { 0 }; 694185029Spjd 695185029Spjd (void) snprintf(errbuf, sizeof (errbuf), 696185029Spjd dgettext(TEXT_DOMAIN, "cannot set property for '%s'"), 697185029Spjd zhp->zpool_name); 698185029Spjd 699185029Spjd if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0) 700185029Spjd return (no_memory(zhp->zpool_hdl)); 701185029Spjd 702185029Spjd if (nvlist_add_string(nvl, propname, propval) != 0) { 703185029Spjd nvlist_free(nvl); 704185029Spjd return (no_memory(zhp->zpool_hdl)); 705185029Spjd } 706185029Spjd 707185029Spjd version = zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL); 708185029Spjd if ((realprops = zpool_valid_proplist(zhp->zpool_hdl, 709219089Spjd zhp->zpool_name, nvl, version, flags, errbuf)) == NULL) { 710185029Spjd nvlist_free(nvl); 711185029Spjd return (-1); 712185029Spjd } 713185029Spjd 714185029Spjd nvlist_free(nvl); 715185029Spjd nvl = realprops; 716185029Spjd 717185029Spjd /* 718185029Spjd * Execute the corresponding ioctl() to set this property. 719185029Spjd */ 720185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 721185029Spjd 722185029Spjd if (zcmd_write_src_nvlist(zhp->zpool_hdl, &zc, nvl) != 0) { 723185029Spjd nvlist_free(nvl); 724185029Spjd return (-1); 725185029Spjd } 726185029Spjd 727185029Spjd ret = zfs_ioctl(zhp->zpool_hdl, ZFS_IOC_POOL_SET_PROPS, &zc); 728185029Spjd 729185029Spjd zcmd_free_nvlists(&zc); 730185029Spjd nvlist_free(nvl); 731185029Spjd 732185029Spjd if (ret) 733185029Spjd (void) zpool_standard_error(zhp->zpool_hdl, errno, errbuf); 734185029Spjd else 735185029Spjd (void) zpool_props_refresh(zhp); 736185029Spjd 737185029Spjd return (ret); 738185029Spjd} 739185029Spjd 740185029Spjdint 741185029Spjdzpool_expand_proplist(zpool_handle_t *zhp, zprop_list_t **plp) 742185029Spjd{ 743185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 744185029Spjd zprop_list_t *entry; 745185029Spjd char buf[ZFS_MAXPROPLEN]; 746236884Smm nvlist_t *features = NULL; 747236884Smm zprop_list_t **last; 748236884Smm boolean_t firstexpand = (NULL == *plp); 749185029Spjd 750185029Spjd if (zprop_expand_list(hdl, plp, ZFS_TYPE_POOL) != 0) 751185029Spjd return (-1); 752185029Spjd 753236884Smm last = plp; 754236884Smm while (*last != NULL) 755236884Smm last = &(*last)->pl_next; 756236884Smm 757236884Smm if ((*plp)->pl_all) 758236884Smm features = zpool_get_features(zhp); 759236884Smm 760236884Smm if ((*plp)->pl_all && firstexpand) { 761236884Smm for (int i = 0; i < SPA_FEATURES; i++) { 762236884Smm zprop_list_t *entry = zfs_alloc(hdl, 763236884Smm sizeof (zprop_list_t)); 764236884Smm entry->pl_prop = ZPROP_INVAL; 765236884Smm entry->pl_user_prop = zfs_asprintf(hdl, "feature@%s", 766236884Smm spa_feature_table[i].fi_uname); 767236884Smm entry->pl_width = strlen(entry->pl_user_prop); 768236884Smm entry->pl_all = B_TRUE; 769236884Smm 770236884Smm *last = entry; 771236884Smm last = &entry->pl_next; 772236884Smm } 773236884Smm } 774236884Smm 775236884Smm /* add any unsupported features */ 776236884Smm for (nvpair_t *nvp = nvlist_next_nvpair(features, NULL); 777236884Smm nvp != NULL; nvp = nvlist_next_nvpair(features, nvp)) { 778236884Smm char *propname; 779236884Smm boolean_t found; 780236884Smm zprop_list_t *entry; 781236884Smm 782236884Smm if (zfeature_is_supported(nvpair_name(nvp))) 783236884Smm continue; 784236884Smm 785236884Smm propname = zfs_asprintf(hdl, "unsupported@%s", 786236884Smm nvpair_name(nvp)); 787236884Smm 788236884Smm /* 789236884Smm * Before adding the property to the list make sure that no 790236884Smm * other pool already added the same property. 791236884Smm */ 792236884Smm found = B_FALSE; 793236884Smm entry = *plp; 794236884Smm while (entry != NULL) { 795236884Smm if (entry->pl_user_prop != NULL && 796236884Smm strcmp(propname, entry->pl_user_prop) == 0) { 797236884Smm found = B_TRUE; 798236884Smm break; 799236884Smm } 800236884Smm entry = entry->pl_next; 801236884Smm } 802236884Smm if (found) { 803236884Smm free(propname); 804236884Smm continue; 805236884Smm } 806236884Smm 807236884Smm entry = zfs_alloc(hdl, sizeof (zprop_list_t)); 808236884Smm entry->pl_prop = ZPROP_INVAL; 809236884Smm entry->pl_user_prop = propname; 810236884Smm entry->pl_width = strlen(entry->pl_user_prop); 811236884Smm entry->pl_all = B_TRUE; 812236884Smm 813236884Smm *last = entry; 814236884Smm last = &entry->pl_next; 815236884Smm } 816236884Smm 817185029Spjd for (entry = *plp; entry != NULL; entry = entry->pl_next) { 818185029Spjd 819185029Spjd if (entry->pl_fixed) 820185029Spjd continue; 821185029Spjd 822185029Spjd if (entry->pl_prop != ZPROP_INVAL && 823185029Spjd zpool_get_prop(zhp, entry->pl_prop, buf, sizeof (buf), 824263889Sdelphij NULL, B_FALSE) == 0) { 825185029Spjd if (strlen(buf) > entry->pl_width) 826185029Spjd entry->pl_width = strlen(buf); 827185029Spjd } 828185029Spjd } 829185029Spjd 830185029Spjd return (0); 831185029Spjd} 832185029Spjd 833236884Smm/* 834236884Smm * Get the state for the given feature on the given ZFS pool. 835236884Smm */ 836236884Smmint 837236884Smmzpool_prop_get_feature(zpool_handle_t *zhp, const char *propname, char *buf, 838236884Smm size_t len) 839236884Smm{ 840236884Smm uint64_t refcount; 841236884Smm boolean_t found = B_FALSE; 842236884Smm nvlist_t *features = zpool_get_features(zhp); 843236884Smm boolean_t supported; 844236884Smm const char *feature = strchr(propname, '@') + 1; 845185029Spjd 846236884Smm supported = zpool_prop_feature(propname); 847236884Smm ASSERT(supported || zpool_prop_unsupported(propname)); 848236884Smm 849236884Smm /* 850236884Smm * Convert from feature name to feature guid. This conversion is 851236884Smm * unecessary for unsupported@... properties because they already 852236884Smm * use guids. 853236884Smm */ 854236884Smm if (supported) { 855236884Smm int ret; 856259813Sdelphij spa_feature_t fid; 857236884Smm 858259813Sdelphij ret = zfeature_lookup_name(feature, &fid); 859236884Smm if (ret != 0) { 860236884Smm (void) strlcpy(buf, "-", len); 861236884Smm return (ENOTSUP); 862236884Smm } 863259813Sdelphij feature = spa_feature_table[fid].fi_guid; 864236884Smm } 865236884Smm 866236884Smm if (nvlist_lookup_uint64(features, feature, &refcount) == 0) 867236884Smm found = B_TRUE; 868236884Smm 869236884Smm if (supported) { 870236884Smm if (!found) { 871236884Smm (void) strlcpy(buf, ZFS_FEATURE_DISABLED, len); 872236884Smm } else { 873236884Smm if (refcount == 0) 874236884Smm (void) strlcpy(buf, ZFS_FEATURE_ENABLED, len); 875236884Smm else 876236884Smm (void) strlcpy(buf, ZFS_FEATURE_ACTIVE, len); 877236884Smm } 878236884Smm } else { 879236884Smm if (found) { 880236884Smm if (refcount == 0) { 881236884Smm (void) strcpy(buf, ZFS_UNSUPPORTED_INACTIVE); 882236884Smm } else { 883236884Smm (void) strcpy(buf, ZFS_UNSUPPORTED_READONLY); 884236884Smm } 885236884Smm } else { 886236884Smm (void) strlcpy(buf, "-", len); 887236884Smm return (ENOTSUP); 888236884Smm } 889236884Smm } 890236884Smm 891236884Smm return (0); 892236884Smm} 893236884Smm 894185029Spjd/* 895219089Spjd * Don't start the slice at the default block of 34; many storage 896219089Spjd * devices will use a stripe width of 128k, so start there instead. 897219089Spjd */ 898219089Spjd#define NEW_START_BLOCK 256 899219089Spjd 900219089Spjd/* 901168404Spjd * Validate the given pool name, optionally putting an extended error message in 902168404Spjd * 'buf'. 903168404Spjd */ 904185029Spjdboolean_t 905168404Spjdzpool_name_valid(libzfs_handle_t *hdl, boolean_t isopen, const char *pool) 906168404Spjd{ 907168404Spjd namecheck_err_t why; 908168404Spjd char what; 909168404Spjd int ret; 910168404Spjd 911168404Spjd ret = pool_namecheck(pool, &why, &what); 912168404Spjd 913168404Spjd /* 914168404Spjd * The rules for reserved pool names were extended at a later point. 915168404Spjd * But we need to support users with existing pools that may now be 916168404Spjd * invalid. So we only check for this expanded set of names during a 917168404Spjd * create (or import), and only in userland. 918168404Spjd */ 919168404Spjd if (ret == 0 && !isopen && 920168404Spjd (strncmp(pool, "mirror", 6) == 0 || 921168404Spjd strncmp(pool, "raidz", 5) == 0 || 922185029Spjd strncmp(pool, "spare", 5) == 0 || 923185029Spjd strcmp(pool, "log") == 0)) { 924185029Spjd if (hdl != NULL) 925185029Spjd zfs_error_aux(hdl, 926185029Spjd dgettext(TEXT_DOMAIN, "name is reserved")); 927168404Spjd return (B_FALSE); 928168404Spjd } 929168404Spjd 930168404Spjd 931168404Spjd if (ret != 0) { 932168404Spjd if (hdl != NULL) { 933168404Spjd switch (why) { 934168404Spjd case NAME_ERR_TOOLONG: 935168404Spjd zfs_error_aux(hdl, 936168404Spjd dgettext(TEXT_DOMAIN, "name is too long")); 937168404Spjd break; 938168404Spjd 939168404Spjd case NAME_ERR_INVALCHAR: 940168404Spjd zfs_error_aux(hdl, 941168404Spjd dgettext(TEXT_DOMAIN, "invalid character " 942168404Spjd "'%c' in pool name"), what); 943168404Spjd break; 944168404Spjd 945168404Spjd case NAME_ERR_NOLETTER: 946168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 947168404Spjd "name must begin with a letter")); 948168404Spjd break; 949168404Spjd 950168404Spjd case NAME_ERR_RESERVED: 951168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 952168404Spjd "name is reserved")); 953168404Spjd break; 954168404Spjd 955168404Spjd case NAME_ERR_DISKLIKE: 956168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 957168404Spjd "pool name is reserved")); 958168404Spjd break; 959168404Spjd 960168404Spjd case NAME_ERR_LEADING_SLASH: 961168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 962168404Spjd "leading slash in name")); 963168404Spjd break; 964168404Spjd 965168404Spjd case NAME_ERR_EMPTY_COMPONENT: 966168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 967168404Spjd "empty component in name")); 968168404Spjd break; 969168404Spjd 970168404Spjd case NAME_ERR_TRAILING_SLASH: 971168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 972168404Spjd "trailing slash in name")); 973168404Spjd break; 974168404Spjd 975321534Smav case NAME_ERR_MULTIPLE_DELIMITERS: 976168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 977321534Smav "multiple '@' and/or '#' delimiters in " 978321534Smav "name")); 979168404Spjd break; 980168404Spjd 981307050Smav default: 982307050Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 983307050Smav "(%d) not defined"), why); 984307050Smav break; 985168404Spjd } 986168404Spjd } 987168404Spjd return (B_FALSE); 988168404Spjd } 989168404Spjd 990168404Spjd return (B_TRUE); 991168404Spjd} 992168404Spjd 993168404Spjd/* 994168404Spjd * Open a handle to the given pool, even if the pool is currently in the FAULTED 995168404Spjd * state. 996168404Spjd */ 997168404Spjdzpool_handle_t * 998168404Spjdzpool_open_canfail(libzfs_handle_t *hdl, const char *pool) 999168404Spjd{ 1000168404Spjd zpool_handle_t *zhp; 1001168404Spjd boolean_t missing; 1002168404Spjd 1003168404Spjd /* 1004168404Spjd * Make sure the pool name is valid. 1005168404Spjd */ 1006168404Spjd if (!zpool_name_valid(hdl, B_TRUE, pool)) { 1007168404Spjd (void) zfs_error_fmt(hdl, EZFS_INVALIDNAME, 1008168404Spjd dgettext(TEXT_DOMAIN, "cannot open '%s'"), 1009168404Spjd pool); 1010168404Spjd return (NULL); 1011168404Spjd } 1012168404Spjd 1013168404Spjd if ((zhp = zfs_alloc(hdl, sizeof (zpool_handle_t))) == NULL) 1014168404Spjd return (NULL); 1015168404Spjd 1016168404Spjd zhp->zpool_hdl = hdl; 1017168404Spjd (void) strlcpy(zhp->zpool_name, pool, sizeof (zhp->zpool_name)); 1018168404Spjd 1019168404Spjd if (zpool_refresh_stats(zhp, &missing) != 0) { 1020168404Spjd zpool_close(zhp); 1021168404Spjd return (NULL); 1022168404Spjd } 1023168404Spjd 1024168404Spjd if (missing) { 1025185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "no such pool")); 1026168404Spjd (void) zfs_error_fmt(hdl, EZFS_NOENT, 1027185029Spjd dgettext(TEXT_DOMAIN, "cannot open '%s'"), pool); 1028168404Spjd zpool_close(zhp); 1029168404Spjd return (NULL); 1030168404Spjd } 1031168404Spjd 1032168404Spjd return (zhp); 1033168404Spjd} 1034168404Spjd 1035168404Spjd/* 1036168404Spjd * Like the above, but silent on error. Used when iterating over pools (because 1037168404Spjd * the configuration cache may be out of date). 1038168404Spjd */ 1039168404Spjdint 1040168404Spjdzpool_open_silent(libzfs_handle_t *hdl, const char *pool, zpool_handle_t **ret) 1041168404Spjd{ 1042168404Spjd zpool_handle_t *zhp; 1043168404Spjd boolean_t missing; 1044168404Spjd 1045168404Spjd if ((zhp = zfs_alloc(hdl, sizeof (zpool_handle_t))) == NULL) 1046168404Spjd return (-1); 1047168404Spjd 1048168404Spjd zhp->zpool_hdl = hdl; 1049168404Spjd (void) strlcpy(zhp->zpool_name, pool, sizeof (zhp->zpool_name)); 1050168404Spjd 1051168404Spjd if (zpool_refresh_stats(zhp, &missing) != 0) { 1052168404Spjd zpool_close(zhp); 1053168404Spjd return (-1); 1054168404Spjd } 1055168404Spjd 1056168404Spjd if (missing) { 1057168404Spjd zpool_close(zhp); 1058168404Spjd *ret = NULL; 1059168404Spjd return (0); 1060168404Spjd } 1061168404Spjd 1062168404Spjd *ret = zhp; 1063168404Spjd return (0); 1064168404Spjd} 1065168404Spjd 1066168404Spjd/* 1067168404Spjd * Similar to zpool_open_canfail(), but refuses to open pools in the faulted 1068168404Spjd * state. 1069168404Spjd */ 1070168404Spjdzpool_handle_t * 1071168404Spjdzpool_open(libzfs_handle_t *hdl, const char *pool) 1072168404Spjd{ 1073168404Spjd zpool_handle_t *zhp; 1074168404Spjd 1075168404Spjd if ((zhp = zpool_open_canfail(hdl, pool)) == NULL) 1076168404Spjd return (NULL); 1077168404Spjd 1078168404Spjd if (zhp->zpool_state == POOL_STATE_UNAVAIL) { 1079168404Spjd (void) zfs_error_fmt(hdl, EZFS_POOLUNAVAIL, 1080168404Spjd dgettext(TEXT_DOMAIN, "cannot open '%s'"), zhp->zpool_name); 1081168404Spjd zpool_close(zhp); 1082168404Spjd return (NULL); 1083168404Spjd } 1084168404Spjd 1085168404Spjd return (zhp); 1086168404Spjd} 1087168404Spjd 1088168404Spjd/* 1089168404Spjd * Close the handle. Simply frees the memory associated with the handle. 1090168404Spjd */ 1091168404Spjdvoid 1092168404Spjdzpool_close(zpool_handle_t *zhp) 1093168404Spjd{ 1094296528Smav nvlist_free(zhp->zpool_config); 1095296528Smav nvlist_free(zhp->zpool_old_config); 1096296528Smav nvlist_free(zhp->zpool_props); 1097168404Spjd free(zhp); 1098168404Spjd} 1099168404Spjd 1100168404Spjd/* 1101168404Spjd * Return the name of the pool. 1102168404Spjd */ 1103168404Spjdconst char * 1104168404Spjdzpool_get_name(zpool_handle_t *zhp) 1105168404Spjd{ 1106168404Spjd return (zhp->zpool_name); 1107168404Spjd} 1108168404Spjd 1109168404Spjd 1110168404Spjd/* 1111168404Spjd * Return the state of the pool (ACTIVE or UNAVAILABLE) 1112168404Spjd */ 1113168404Spjdint 1114168404Spjdzpool_get_state(zpool_handle_t *zhp) 1115168404Spjd{ 1116168404Spjd return (zhp->zpool_state); 1117168404Spjd} 1118168404Spjd 1119168404Spjd/* 1120168404Spjd * Create the named pool, using the provided vdev list. It is assumed 1121168404Spjd * that the consumer has already validated the contents of the nvlist, so we 1122168404Spjd * don't have to worry about error semantics. 1123168404Spjd */ 1124168404Spjdint 1125168404Spjdzpool_create(libzfs_handle_t *hdl, const char *pool, nvlist_t *nvroot, 1126185029Spjd nvlist_t *props, nvlist_t *fsprops) 1127168404Spjd{ 1128168404Spjd zfs_cmd_t zc = { 0 }; 1129185029Spjd nvlist_t *zc_fsprops = NULL; 1130185029Spjd nvlist_t *zc_props = NULL; 1131168404Spjd char msg[1024]; 1132185029Spjd int ret = -1; 1133168404Spjd 1134168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1135168404Spjd "cannot create '%s'"), pool); 1136168404Spjd 1137168404Spjd if (!zpool_name_valid(hdl, B_FALSE, pool)) 1138168404Spjd return (zfs_error(hdl, EZFS_INVALIDNAME, msg)); 1139168404Spjd 1140185029Spjd if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0) 1141168404Spjd return (-1); 1142168404Spjd 1143185029Spjd if (props) { 1144219089Spjd prop_flags_t flags = { .create = B_TRUE, .import = B_FALSE }; 1145219089Spjd 1146185029Spjd if ((zc_props = zpool_valid_proplist(hdl, pool, props, 1147219089Spjd SPA_VERSION_1, flags, msg)) == NULL) { 1148185029Spjd goto create_failed; 1149185029Spjd } 1150185029Spjd } 1151185029Spjd 1152185029Spjd if (fsprops) { 1153185029Spjd uint64_t zoned; 1154185029Spjd char *zonestr; 1155185029Spjd 1156185029Spjd zoned = ((nvlist_lookup_string(fsprops, 1157185029Spjd zfs_prop_to_name(ZFS_PROP_ZONED), &zonestr) == 0) && 1158185029Spjd strcmp(zonestr, "on") == 0); 1159185029Spjd 1160289500Smav if ((zc_fsprops = zfs_valid_proplist(hdl, ZFS_TYPE_FILESYSTEM, 1161289500Smav fsprops, zoned, NULL, NULL, msg)) == NULL) { 1162185029Spjd goto create_failed; 1163185029Spjd } 1164185029Spjd if (!zc_props && 1165185029Spjd (nvlist_alloc(&zc_props, NV_UNIQUE_NAME, 0) != 0)) { 1166185029Spjd goto create_failed; 1167185029Spjd } 1168185029Spjd if (nvlist_add_nvlist(zc_props, 1169185029Spjd ZPOOL_ROOTFS_PROPS, zc_fsprops) != 0) { 1170185029Spjd goto create_failed; 1171185029Spjd } 1172185029Spjd } 1173185029Spjd 1174185029Spjd if (zc_props && zcmd_write_src_nvlist(hdl, &zc, zc_props) != 0) 1175185029Spjd goto create_failed; 1176185029Spjd 1177168404Spjd (void) strlcpy(zc.zc_name, pool, sizeof (zc.zc_name)); 1178168404Spjd 1179185029Spjd if ((ret = zfs_ioctl(hdl, ZFS_IOC_POOL_CREATE, &zc)) != 0) { 1180168404Spjd 1181168404Spjd zcmd_free_nvlists(&zc); 1182185029Spjd nvlist_free(zc_props); 1183185029Spjd nvlist_free(zc_fsprops); 1184168404Spjd 1185168404Spjd switch (errno) { 1186168404Spjd case EBUSY: 1187168404Spjd /* 1188168404Spjd * This can happen if the user has specified the same 1189168404Spjd * device multiple times. We can't reliably detect this 1190168404Spjd * until we try to add it and see we already have a 1191168404Spjd * label. 1192168404Spjd */ 1193168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1194168404Spjd "one or more vdevs refer to the same device")); 1195168404Spjd return (zfs_error(hdl, EZFS_BADDEV, msg)); 1196168404Spjd 1197289500Smav case ERANGE: 1198289500Smav /* 1199289500Smav * This happens if the record size is smaller or larger 1200289500Smav * than the allowed size range, or not a power of 2. 1201289500Smav * 1202289500Smav * NOTE: although zfs_valid_proplist is called earlier, 1203289500Smav * this case may have slipped through since the 1204289500Smav * pool does not exist yet and it is therefore 1205289500Smav * impossible to read properties e.g. max blocksize 1206289500Smav * from the pool. 1207289500Smav */ 1208289500Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1209289500Smav "record size invalid")); 1210289500Smav return (zfs_error(hdl, EZFS_BADPROP, msg)); 1211289500Smav 1212168404Spjd case EOVERFLOW: 1213168404Spjd /* 1214168404Spjd * This occurs when one of the devices is below 1215168404Spjd * SPA_MINDEVSIZE. Unfortunately, we can't detect which 1216168404Spjd * device was the problem device since there's no 1217168404Spjd * reliable way to determine device size from userland. 1218168404Spjd */ 1219168404Spjd { 1220168404Spjd char buf[64]; 1221168404Spjd 1222168404Spjd zfs_nicenum(SPA_MINDEVSIZE, buf, sizeof (buf)); 1223168404Spjd 1224168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1225168404Spjd "one or more devices is less than the " 1226168404Spjd "minimum size (%s)"), buf); 1227168404Spjd } 1228168404Spjd return (zfs_error(hdl, EZFS_BADDEV, msg)); 1229168404Spjd 1230168404Spjd case ENOSPC: 1231168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1232168404Spjd "one or more devices is out of space")); 1233168404Spjd return (zfs_error(hdl, EZFS_BADDEV, msg)); 1234168404Spjd 1235185029Spjd case ENOTBLK: 1236185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1237185029Spjd "cache device must be a disk or disk slice")); 1238185029Spjd return (zfs_error(hdl, EZFS_BADDEV, msg)); 1239185029Spjd 1240168404Spjd default: 1241168404Spjd return (zpool_standard_error(hdl, errno, msg)); 1242168404Spjd } 1243168404Spjd } 1244168404Spjd 1245185029Spjdcreate_failed: 1246185029Spjd zcmd_free_nvlists(&zc); 1247185029Spjd nvlist_free(zc_props); 1248185029Spjd nvlist_free(zc_fsprops); 1249185029Spjd return (ret); 1250168404Spjd} 1251168404Spjd 1252168404Spjd/* 1253168404Spjd * Destroy the given pool. It is up to the caller to ensure that there are no 1254168404Spjd * datasets left in the pool. 1255168404Spjd */ 1256168404Spjdint 1257248571Smmzpool_destroy(zpool_handle_t *zhp, const char *log_str) 1258168404Spjd{ 1259168404Spjd zfs_cmd_t zc = { 0 }; 1260168404Spjd zfs_handle_t *zfp = NULL; 1261168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 1262168404Spjd char msg[1024]; 1263168404Spjd 1264168404Spjd if (zhp->zpool_state == POOL_STATE_ACTIVE && 1265219089Spjd (zfp = zfs_open(hdl, zhp->zpool_name, ZFS_TYPE_FILESYSTEM)) == NULL) 1266168404Spjd return (-1); 1267168404Spjd 1268168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 1269248571Smm zc.zc_history = (uint64_t)(uintptr_t)log_str; 1270168404Spjd 1271219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_POOL_DESTROY, &zc) != 0) { 1272168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1273168404Spjd "cannot destroy '%s'"), zhp->zpool_name); 1274168404Spjd 1275168404Spjd if (errno == EROFS) { 1276168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1277168404Spjd "one or more devices is read only")); 1278168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 1279168404Spjd } else { 1280168404Spjd (void) zpool_standard_error(hdl, errno, msg); 1281168404Spjd } 1282168404Spjd 1283168404Spjd if (zfp) 1284168404Spjd zfs_close(zfp); 1285168404Spjd return (-1); 1286168404Spjd } 1287168404Spjd 1288168404Spjd if (zfp) { 1289168404Spjd remove_mountpoint(zfp); 1290168404Spjd zfs_close(zfp); 1291168404Spjd } 1292168404Spjd 1293168404Spjd return (0); 1294168404Spjd} 1295168404Spjd 1296168404Spjd/* 1297332547Smav * Create a checkpoint in the given pool. 1298332547Smav */ 1299332547Smavint 1300332547Smavzpool_checkpoint(zpool_handle_t *zhp) 1301332547Smav{ 1302332547Smav libzfs_handle_t *hdl = zhp->zpool_hdl; 1303332547Smav char msg[1024]; 1304332547Smav int error; 1305332547Smav 1306332547Smav error = lzc_pool_checkpoint(zhp->zpool_name); 1307332547Smav if (error != 0) { 1308332547Smav (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1309332547Smav "cannot checkpoint '%s'"), zhp->zpool_name); 1310332547Smav (void) zpool_standard_error(hdl, error, msg); 1311332547Smav return (-1); 1312332547Smav } 1313332547Smav 1314332547Smav return (0); 1315332547Smav} 1316332547Smav 1317332547Smav/* 1318332547Smav * Discard the checkpoint from the given pool. 1319332547Smav */ 1320332547Smavint 1321332547Smavzpool_discard_checkpoint(zpool_handle_t *zhp) 1322332547Smav{ 1323332547Smav libzfs_handle_t *hdl = zhp->zpool_hdl; 1324332547Smav char msg[1024]; 1325332547Smav int error; 1326332547Smav 1327332547Smav error = lzc_pool_checkpoint_discard(zhp->zpool_name); 1328332547Smav if (error != 0) { 1329332547Smav (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1330332547Smav "cannot discard checkpoint in '%s'"), zhp->zpool_name); 1331332547Smav (void) zpool_standard_error(hdl, error, msg); 1332332547Smav return (-1); 1333332547Smav } 1334332547Smav 1335332547Smav return (0); 1336332547Smav} 1337332547Smav 1338332547Smav/* 1339168404Spjd * Add the given vdevs to the pool. The caller must have already performed the 1340168404Spjd * necessary verification to ensure that the vdev specification is well-formed. 1341168404Spjd */ 1342168404Spjdint 1343168404Spjdzpool_add(zpool_handle_t *zhp, nvlist_t *nvroot) 1344168404Spjd{ 1345168404Spjd zfs_cmd_t zc = { 0 }; 1346168404Spjd int ret; 1347168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 1348168404Spjd char msg[1024]; 1349185029Spjd nvlist_t **spares, **l2cache; 1350185029Spjd uint_t nspares, nl2cache; 1351168404Spjd 1352168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1353168404Spjd "cannot add to '%s'"), zhp->zpool_name); 1354168404Spjd 1355185029Spjd if (zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL) < 1356185029Spjd SPA_VERSION_SPARES && 1357168404Spjd nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_SPARES, 1358168404Spjd &spares, &nspares) == 0) { 1359168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "pool must be " 1360168404Spjd "upgraded to add hot spares")); 1361168404Spjd return (zfs_error(hdl, EZFS_BADVERSION, msg)); 1362168404Spjd } 1363168404Spjd 1364185029Spjd if (zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL) < 1365185029Spjd SPA_VERSION_L2CACHE && 1366185029Spjd nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_L2CACHE, 1367185029Spjd &l2cache, &nl2cache) == 0) { 1368185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "pool must be " 1369185029Spjd "upgraded to add cache devices")); 1370185029Spjd return (zfs_error(hdl, EZFS_BADVERSION, msg)); 1371185029Spjd } 1372185029Spjd 1373185029Spjd if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0) 1374168404Spjd return (-1); 1375168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 1376168404Spjd 1377219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_ADD, &zc) != 0) { 1378168404Spjd switch (errno) { 1379168404Spjd case EBUSY: 1380168404Spjd /* 1381168404Spjd * This can happen if the user has specified the same 1382168404Spjd * device multiple times. We can't reliably detect this 1383168404Spjd * until we try to add it and see we already have a 1384168404Spjd * label. 1385168404Spjd */ 1386168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1387168404Spjd "one or more vdevs refer to the same device")); 1388168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 1389168404Spjd break; 1390168404Spjd 1391332525Smav case EINVAL: 1392332525Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1393332525Smav "invalid config; a pool with removing/removed " 1394332525Smav "vdevs does not support adding raidz vdevs")); 1395332525Smav (void) zfs_error(hdl, EZFS_BADDEV, msg); 1396332525Smav break; 1397332525Smav 1398168404Spjd case EOVERFLOW: 1399168404Spjd /* 1400168404Spjd * This occurrs when one of the devices is below 1401168404Spjd * SPA_MINDEVSIZE. Unfortunately, we can't detect which 1402168404Spjd * device was the problem device since there's no 1403168404Spjd * reliable way to determine device size from userland. 1404168404Spjd */ 1405168404Spjd { 1406168404Spjd char buf[64]; 1407168404Spjd 1408168404Spjd zfs_nicenum(SPA_MINDEVSIZE, buf, sizeof (buf)); 1409168404Spjd 1410168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1411168404Spjd "device is less than the minimum " 1412168404Spjd "size (%s)"), buf); 1413168404Spjd } 1414168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 1415168404Spjd break; 1416168404Spjd 1417168404Spjd case ENOTSUP: 1418168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1419185029Spjd "pool must be upgraded to add these vdevs")); 1420168404Spjd (void) zfs_error(hdl, EZFS_BADVERSION, msg); 1421168404Spjd break; 1422168404Spjd 1423168404Spjd case EDOM: 1424168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1425185029Spjd "root pool can not have multiple vdevs" 1426185029Spjd " or separate logs")); 1427168404Spjd (void) zfs_error(hdl, EZFS_POOL_NOTSUP, msg); 1428168404Spjd break; 1429168404Spjd 1430185029Spjd case ENOTBLK: 1431185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1432185029Spjd "cache device must be a disk or disk slice")); 1433185029Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 1434185029Spjd break; 1435185029Spjd 1436168404Spjd default: 1437168404Spjd (void) zpool_standard_error(hdl, errno, msg); 1438168404Spjd } 1439168404Spjd 1440168404Spjd ret = -1; 1441168404Spjd } else { 1442168404Spjd ret = 0; 1443168404Spjd } 1444168404Spjd 1445168404Spjd zcmd_free_nvlists(&zc); 1446168404Spjd 1447168404Spjd return (ret); 1448168404Spjd} 1449168404Spjd 1450168404Spjd/* 1451168404Spjd * Exports the pool from the system. The caller must ensure that there are no 1452168404Spjd * mounted datasets in the pool. 1453168404Spjd */ 1454248571Smmstatic int 1455248571Smmzpool_export_common(zpool_handle_t *zhp, boolean_t force, boolean_t hardforce, 1456248571Smm const char *log_str) 1457168404Spjd{ 1458168404Spjd zfs_cmd_t zc = { 0 }; 1459185029Spjd char msg[1024]; 1460168404Spjd 1461185029Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1462185029Spjd "cannot export '%s'"), zhp->zpool_name); 1463185029Spjd 1464168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 1465185029Spjd zc.zc_cookie = force; 1466207670Smm zc.zc_guid = hardforce; 1467248571Smm zc.zc_history = (uint64_t)(uintptr_t)log_str; 1468168404Spjd 1469185029Spjd if (zfs_ioctl(zhp->zpool_hdl, ZFS_IOC_POOL_EXPORT, &zc) != 0) { 1470185029Spjd switch (errno) { 1471185029Spjd case EXDEV: 1472185029Spjd zfs_error_aux(zhp->zpool_hdl, dgettext(TEXT_DOMAIN, 1473185029Spjd "use '-f' to override the following errors:\n" 1474185029Spjd "'%s' has an active shared spare which could be" 1475185029Spjd " used by other pools once '%s' is exported."), 1476185029Spjd zhp->zpool_name, zhp->zpool_name); 1477185029Spjd return (zfs_error(zhp->zpool_hdl, EZFS_ACTIVE_SPARE, 1478185029Spjd msg)); 1479185029Spjd default: 1480185029Spjd return (zpool_standard_error_fmt(zhp->zpool_hdl, errno, 1481185029Spjd msg)); 1482185029Spjd } 1483185029Spjd } 1484185029Spjd 1485168404Spjd return (0); 1486168404Spjd} 1487168404Spjd 1488207670Smmint 1489248571Smmzpool_export(zpool_handle_t *zhp, boolean_t force, const char *log_str) 1490207670Smm{ 1491248571Smm return (zpool_export_common(zhp, force, B_FALSE, log_str)); 1492207670Smm} 1493207670Smm 1494207670Smmint 1495248571Smmzpool_export_force(zpool_handle_t *zhp, const char *log_str) 1496207670Smm{ 1497248571Smm return (zpool_export_common(zhp, B_TRUE, B_TRUE, log_str)); 1498207670Smm} 1499207670Smm 1500219089Spjdstatic void 1501219089Spjdzpool_rewind_exclaim(libzfs_handle_t *hdl, const char *name, boolean_t dryrun, 1502219089Spjd nvlist_t *config) 1503219089Spjd{ 1504219089Spjd nvlist_t *nv = NULL; 1505219089Spjd uint64_t rewindto; 1506219089Spjd int64_t loss = -1; 1507219089Spjd struct tm t; 1508219089Spjd char timestr[128]; 1509219089Spjd 1510219089Spjd if (!hdl->libzfs_printerr || config == NULL) 1511219089Spjd return; 1512219089Spjd 1513236884Smm if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nv) != 0 || 1514236884Smm nvlist_lookup_nvlist(nv, ZPOOL_CONFIG_REWIND_INFO, &nv) != 0) { 1515219089Spjd return; 1516236884Smm } 1517219089Spjd 1518219089Spjd if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_TIME, &rewindto) != 0) 1519219089Spjd return; 1520219089Spjd (void) nvlist_lookup_int64(nv, ZPOOL_CONFIG_REWIND_TIME, &loss); 1521219089Spjd 1522219089Spjd if (localtime_r((time_t *)&rewindto, &t) != NULL && 1523219089Spjd strftime(timestr, 128, 0, &t) != 0) { 1524219089Spjd if (dryrun) { 1525219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1526219089Spjd "Would be able to return %s " 1527219089Spjd "to its state as of %s.\n"), 1528219089Spjd name, timestr); 1529219089Spjd } else { 1530219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1531219089Spjd "Pool %s returned to its state as of %s.\n"), 1532219089Spjd name, timestr); 1533219089Spjd } 1534219089Spjd if (loss > 120) { 1535219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1536219089Spjd "%s approximately %lld "), 1537219089Spjd dryrun ? "Would discard" : "Discarded", 1538219089Spjd (loss + 30) / 60); 1539219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1540219089Spjd "minutes of transactions.\n")); 1541219089Spjd } else if (loss > 0) { 1542219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1543219089Spjd "%s approximately %lld "), 1544219089Spjd dryrun ? "Would discard" : "Discarded", loss); 1545219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1546219089Spjd "seconds of transactions.\n")); 1547219089Spjd } 1548219089Spjd } 1549219089Spjd} 1550219089Spjd 1551219089Spjdvoid 1552219089Spjdzpool_explain_recover(libzfs_handle_t *hdl, const char *name, int reason, 1553219089Spjd nvlist_t *config) 1554219089Spjd{ 1555219089Spjd nvlist_t *nv = NULL; 1556219089Spjd int64_t loss = -1; 1557219089Spjd uint64_t edata = UINT64_MAX; 1558219089Spjd uint64_t rewindto; 1559219089Spjd struct tm t; 1560219089Spjd char timestr[128]; 1561219089Spjd 1562219089Spjd if (!hdl->libzfs_printerr) 1563219089Spjd return; 1564219089Spjd 1565219089Spjd if (reason >= 0) 1566219089Spjd (void) printf(dgettext(TEXT_DOMAIN, "action: ")); 1567219089Spjd else 1568219089Spjd (void) printf(dgettext(TEXT_DOMAIN, "\t")); 1569219089Spjd 1570219089Spjd /* All attempted rewinds failed if ZPOOL_CONFIG_LOAD_TIME missing */ 1571219089Spjd if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nv) != 0 || 1572236884Smm nvlist_lookup_nvlist(nv, ZPOOL_CONFIG_REWIND_INFO, &nv) != 0 || 1573219089Spjd nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_TIME, &rewindto) != 0) 1574219089Spjd goto no_info; 1575219089Spjd 1576219089Spjd (void) nvlist_lookup_int64(nv, ZPOOL_CONFIG_REWIND_TIME, &loss); 1577219089Spjd (void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_DATA_ERRORS, 1578219089Spjd &edata); 1579219089Spjd 1580219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1581219089Spjd "Recovery is possible, but will result in some data loss.\n")); 1582219089Spjd 1583219089Spjd if (localtime_r((time_t *)&rewindto, &t) != NULL && 1584219089Spjd strftime(timestr, 128, 0, &t) != 0) { 1585219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1586219089Spjd "\tReturning the pool to its state as of %s\n" 1587219089Spjd "\tshould correct the problem. "), 1588219089Spjd timestr); 1589219089Spjd } else { 1590219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1591219089Spjd "\tReverting the pool to an earlier state " 1592219089Spjd "should correct the problem.\n\t")); 1593219089Spjd } 1594219089Spjd 1595219089Spjd if (loss > 120) { 1596219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1597219089Spjd "Approximately %lld minutes of data\n" 1598219089Spjd "\tmust be discarded, irreversibly. "), (loss + 30) / 60); 1599219089Spjd } else if (loss > 0) { 1600219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1601219089Spjd "Approximately %lld seconds of data\n" 1602219089Spjd "\tmust be discarded, irreversibly. "), loss); 1603219089Spjd } 1604219089Spjd if (edata != 0 && edata != UINT64_MAX) { 1605219089Spjd if (edata == 1) { 1606219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1607219089Spjd "After rewind, at least\n" 1608219089Spjd "\tone persistent user-data error will remain. ")); 1609219089Spjd } else { 1610219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1611219089Spjd "After rewind, several\n" 1612219089Spjd "\tpersistent user-data errors will remain. ")); 1613219089Spjd } 1614219089Spjd } 1615219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1616219089Spjd "Recovery can be attempted\n\tby executing 'zpool %s -F %s'. "), 1617219089Spjd reason >= 0 ? "clear" : "import", name); 1618219089Spjd 1619219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1620219089Spjd "A scrub of the pool\n" 1621219089Spjd "\tis strongly recommended after recovery.\n")); 1622219089Spjd return; 1623219089Spjd 1624219089Spjdno_info: 1625219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1626219089Spjd "Destroy and re-create the pool from\n\ta backup source.\n")); 1627219089Spjd} 1628219089Spjd 1629168404Spjd/* 1630185029Spjd * zpool_import() is a contracted interface. Should be kept the same 1631185029Spjd * if possible. 1632185029Spjd * 1633185029Spjd * Applications should use zpool_import_props() to import a pool with 1634185029Spjd * new properties value to be set. 1635168404Spjd */ 1636168404Spjdint 1637168404Spjdzpool_import(libzfs_handle_t *hdl, nvlist_t *config, const char *newname, 1638185029Spjd char *altroot) 1639168404Spjd{ 1640185029Spjd nvlist_t *props = NULL; 1641185029Spjd int ret; 1642185029Spjd 1643185029Spjd if (altroot != NULL) { 1644185029Spjd if (nvlist_alloc(&props, NV_UNIQUE_NAME, 0) != 0) { 1645185029Spjd return (zfs_error_fmt(hdl, EZFS_NOMEM, 1646185029Spjd dgettext(TEXT_DOMAIN, "cannot import '%s'"), 1647185029Spjd newname)); 1648185029Spjd } 1649185029Spjd 1650185029Spjd if (nvlist_add_string(props, 1651209962Smm zpool_prop_to_name(ZPOOL_PROP_ALTROOT), altroot) != 0 || 1652209962Smm nvlist_add_string(props, 1653209962Smm zpool_prop_to_name(ZPOOL_PROP_CACHEFILE), "none") != 0) { 1654185029Spjd nvlist_free(props); 1655185029Spjd return (zfs_error_fmt(hdl, EZFS_NOMEM, 1656185029Spjd dgettext(TEXT_DOMAIN, "cannot import '%s'"), 1657185029Spjd newname)); 1658185029Spjd } 1659185029Spjd } 1660185029Spjd 1661219089Spjd ret = zpool_import_props(hdl, config, newname, props, 1662219089Spjd ZFS_IMPORT_NORMAL); 1663296528Smav nvlist_free(props); 1664185029Spjd return (ret); 1665185029Spjd} 1666185029Spjd 1667219089Spjdstatic void 1668219089Spjdprint_vdev_tree(libzfs_handle_t *hdl, const char *name, nvlist_t *nv, 1669219089Spjd int indent) 1670219089Spjd{ 1671219089Spjd nvlist_t **child; 1672219089Spjd uint_t c, children; 1673219089Spjd char *vname; 1674219089Spjd uint64_t is_log = 0; 1675219089Spjd 1676219089Spjd (void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_IS_LOG, 1677219089Spjd &is_log); 1678219089Spjd 1679219089Spjd if (name != NULL) 1680219089Spjd (void) printf("\t%*s%s%s\n", indent, "", name, 1681219089Spjd is_log ? " [log]" : ""); 1682219089Spjd 1683219089Spjd if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_CHILDREN, 1684219089Spjd &child, &children) != 0) 1685219089Spjd return; 1686219089Spjd 1687219089Spjd for (c = 0; c < children; c++) { 1688219089Spjd vname = zpool_vdev_name(hdl, NULL, child[c], B_TRUE); 1689219089Spjd print_vdev_tree(hdl, vname, child[c], indent + 2); 1690219089Spjd free(vname); 1691219089Spjd } 1692219089Spjd} 1693219089Spjd 1694236884Smmvoid 1695236884Smmzpool_print_unsup_feat(nvlist_t *config) 1696236884Smm{ 1697236884Smm nvlist_t *nvinfo, *unsup_feat; 1698236884Smm 1699236884Smm verify(nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nvinfo) == 1700236884Smm 0); 1701236884Smm verify(nvlist_lookup_nvlist(nvinfo, ZPOOL_CONFIG_UNSUP_FEAT, 1702236884Smm &unsup_feat) == 0); 1703236884Smm 1704236884Smm for (nvpair_t *nvp = nvlist_next_nvpair(unsup_feat, NULL); nvp != NULL; 1705236884Smm nvp = nvlist_next_nvpair(unsup_feat, nvp)) { 1706236884Smm char *desc; 1707236884Smm 1708236884Smm verify(nvpair_type(nvp) == DATA_TYPE_STRING); 1709236884Smm verify(nvpair_value_string(nvp, &desc) == 0); 1710236884Smm 1711236884Smm if (strlen(desc) > 0) 1712236884Smm (void) printf("\t%s (%s)\n", nvpair_name(nvp), desc); 1713236884Smm else 1714236884Smm (void) printf("\t%s\n", nvpair_name(nvp)); 1715236884Smm } 1716236884Smm} 1717236884Smm 1718185029Spjd/* 1719185029Spjd * Import the given pool using the known configuration and a list of 1720185029Spjd * properties to be set. The configuration should have come from 1721185029Spjd * zpool_find_import(). The 'newname' parameters control whether the pool 1722185029Spjd * is imported with a different name. 1723185029Spjd */ 1724185029Spjdint 1725185029Spjdzpool_import_props(libzfs_handle_t *hdl, nvlist_t *config, const char *newname, 1726219089Spjd nvlist_t *props, int flags) 1727185029Spjd{ 1728168404Spjd zfs_cmd_t zc = { 0 }; 1729332550Smav zpool_load_policy_t policy; 1730219089Spjd nvlist_t *nv = NULL; 1731219089Spjd nvlist_t *nvinfo = NULL; 1732219089Spjd nvlist_t *missing = NULL; 1733168404Spjd char *thename; 1734168404Spjd char *origname; 1735168404Spjd int ret; 1736219089Spjd int error = 0; 1737185029Spjd char errbuf[1024]; 1738168404Spjd 1739168404Spjd verify(nvlist_lookup_string(config, ZPOOL_CONFIG_POOL_NAME, 1740168404Spjd &origname) == 0); 1741168404Spjd 1742185029Spjd (void) snprintf(errbuf, sizeof (errbuf), dgettext(TEXT_DOMAIN, 1743185029Spjd "cannot import pool '%s'"), origname); 1744185029Spjd 1745168404Spjd if (newname != NULL) { 1746168404Spjd if (!zpool_name_valid(hdl, B_FALSE, newname)) 1747168404Spjd return (zfs_error_fmt(hdl, EZFS_INVALIDNAME, 1748168404Spjd dgettext(TEXT_DOMAIN, "cannot import '%s'"), 1749168404Spjd newname)); 1750168404Spjd thename = (char *)newname; 1751168404Spjd } else { 1752168404Spjd thename = origname; 1753168404Spjd } 1754168404Spjd 1755277433Sdelphij if (props != NULL) { 1756185029Spjd uint64_t version; 1757219089Spjd prop_flags_t flags = { .create = B_FALSE, .import = B_TRUE }; 1758168404Spjd 1759185029Spjd verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_VERSION, 1760185029Spjd &version) == 0); 1761185029Spjd 1762185029Spjd if ((props = zpool_valid_proplist(hdl, origname, 1763277433Sdelphij props, version, flags, errbuf)) == NULL) 1764185029Spjd return (-1); 1765277433Sdelphij if (zcmd_write_src_nvlist(hdl, &zc, props) != 0) { 1766185029Spjd nvlist_free(props); 1767185029Spjd return (-1); 1768185029Spjd } 1769277433Sdelphij nvlist_free(props); 1770185029Spjd } 1771185029Spjd 1772168404Spjd (void) strlcpy(zc.zc_name, thename, sizeof (zc.zc_name)); 1773168404Spjd 1774168404Spjd verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID, 1775168404Spjd &zc.zc_guid) == 0); 1776168404Spjd 1777185029Spjd if (zcmd_write_conf_nvlist(hdl, &zc, config) != 0) { 1778277433Sdelphij zcmd_free_nvlists(&zc); 1779168404Spjd return (-1); 1780185029Spjd } 1781219089Spjd if (zcmd_alloc_dst_nvlist(hdl, &zc, zc.zc_nvlist_conf_size * 2) != 0) { 1782277433Sdelphij zcmd_free_nvlists(&zc); 1783219089Spjd return (-1); 1784219089Spjd } 1785168404Spjd 1786219089Spjd zc.zc_cookie = flags; 1787219089Spjd while ((ret = zfs_ioctl(hdl, ZFS_IOC_POOL_IMPORT, &zc)) != 0 && 1788219089Spjd errno == ENOMEM) { 1789219089Spjd if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) { 1790219089Spjd zcmd_free_nvlists(&zc); 1791219089Spjd return (-1); 1792219089Spjd } 1793219089Spjd } 1794219089Spjd if (ret != 0) 1795219089Spjd error = errno; 1796219089Spjd 1797219089Spjd (void) zcmd_read_dst_nvlist(hdl, &zc, &nv); 1798277433Sdelphij 1799277433Sdelphij zcmd_free_nvlists(&zc); 1800277433Sdelphij 1801332550Smav zpool_get_load_policy(config, &policy); 1802219089Spjd 1803219089Spjd if (error) { 1804168404Spjd char desc[1024]; 1805219089Spjd 1806219089Spjd /* 1807219089Spjd * Dry-run failed, but we print out what success 1808219089Spjd * looks like if we found a best txg 1809219089Spjd */ 1810332550Smav if (policy.zlp_rewind & ZPOOL_TRY_REWIND) { 1811219089Spjd zpool_rewind_exclaim(hdl, newname ? origname : thename, 1812219089Spjd B_TRUE, nv); 1813219089Spjd nvlist_free(nv); 1814219089Spjd return (-1); 1815219089Spjd } 1816219089Spjd 1817168404Spjd if (newname == NULL) 1818168404Spjd (void) snprintf(desc, sizeof (desc), 1819168404Spjd dgettext(TEXT_DOMAIN, "cannot import '%s'"), 1820168404Spjd thename); 1821168404Spjd else 1822168404Spjd (void) snprintf(desc, sizeof (desc), 1823168404Spjd dgettext(TEXT_DOMAIN, "cannot import '%s' as '%s'"), 1824168404Spjd origname, thename); 1825168404Spjd 1826219089Spjd switch (error) { 1827168404Spjd case ENOTSUP: 1828236884Smm if (nv != NULL && nvlist_lookup_nvlist(nv, 1829236884Smm ZPOOL_CONFIG_LOAD_INFO, &nvinfo) == 0 && 1830236884Smm nvlist_exists(nvinfo, ZPOOL_CONFIG_UNSUP_FEAT)) { 1831236884Smm (void) printf(dgettext(TEXT_DOMAIN, "This " 1832236884Smm "pool uses the following feature(s) not " 1833236884Smm "supported by this system:\n")); 1834236884Smm zpool_print_unsup_feat(nv); 1835236884Smm if (nvlist_exists(nvinfo, 1836236884Smm ZPOOL_CONFIG_CAN_RDONLY)) { 1837236884Smm (void) printf(dgettext(TEXT_DOMAIN, 1838236884Smm "All unsupported features are only " 1839236884Smm "required for writing to the pool." 1840236884Smm "\nThe pool can be imported using " 1841236884Smm "'-o readonly=on'.\n")); 1842236884Smm } 1843236884Smm } 1844168404Spjd /* 1845168404Spjd * Unsupported version. 1846168404Spjd */ 1847168404Spjd (void) zfs_error(hdl, EZFS_BADVERSION, desc); 1848168404Spjd break; 1849168404Spjd 1850168404Spjd case EINVAL: 1851168404Spjd (void) zfs_error(hdl, EZFS_INVALCONFIG, desc); 1852168404Spjd break; 1853168404Spjd 1854219089Spjd case EROFS: 1855219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1856219089Spjd "one or more devices is read only")); 1857219089Spjd (void) zfs_error(hdl, EZFS_BADDEV, desc); 1858219089Spjd break; 1859219089Spjd 1860219089Spjd case ENXIO: 1861219089Spjd if (nv && nvlist_lookup_nvlist(nv, 1862219089Spjd ZPOOL_CONFIG_LOAD_INFO, &nvinfo) == 0 && 1863219089Spjd nvlist_lookup_nvlist(nvinfo, 1864219089Spjd ZPOOL_CONFIG_MISSING_DEVICES, &missing) == 0) { 1865219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1866332536Smav "The devices below are missing or " 1867332536Smav "corrupted, use '-m' to import the pool " 1868332536Smav "anyway:\n")); 1869219089Spjd print_vdev_tree(hdl, NULL, missing, 2); 1870219089Spjd (void) printf("\n"); 1871219089Spjd } 1872219089Spjd (void) zpool_standard_error(hdl, error, desc); 1873219089Spjd break; 1874219089Spjd 1875219089Spjd case EEXIST: 1876219089Spjd (void) zpool_standard_error(hdl, error, desc); 1877219089Spjd break; 1878307100Smav case ENAMETOOLONG: 1879307100Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1880307100Smav "new name of at least one dataset is longer than " 1881307100Smav "the maximum allowable length")); 1882307100Smav (void) zfs_error(hdl, EZFS_NAMETOOLONG, desc); 1883307100Smav break; 1884168404Spjd default: 1885219089Spjd (void) zpool_standard_error(hdl, error, desc); 1886219089Spjd zpool_explain_recover(hdl, 1887219089Spjd newname ? origname : thename, -error, nv); 1888219089Spjd break; 1889168404Spjd } 1890168404Spjd 1891219089Spjd nvlist_free(nv); 1892168404Spjd ret = -1; 1893168404Spjd } else { 1894168404Spjd zpool_handle_t *zhp; 1895185029Spjd 1896168404Spjd /* 1897168404Spjd * This should never fail, but play it safe anyway. 1898168404Spjd */ 1899219089Spjd if (zpool_open_silent(hdl, thename, &zhp) != 0) 1900168404Spjd ret = -1; 1901219089Spjd else if (zhp != NULL) 1902168404Spjd zpool_close(zhp); 1903332550Smav if (policy.zlp_rewind & 1904219089Spjd (ZPOOL_DO_REWIND | ZPOOL_TRY_REWIND)) { 1905219089Spjd zpool_rewind_exclaim(hdl, newname ? origname : thename, 1906332550Smav ((policy.zlp_rewind & ZPOOL_TRY_REWIND) != 0), nv); 1907168404Spjd } 1908219089Spjd nvlist_free(nv); 1909219089Spjd return (0); 1910168404Spjd } 1911168404Spjd 1912168404Spjd return (ret); 1913168404Spjd} 1914168404Spjd 1915168404Spjd/* 1916219089Spjd * Scan the pool. 1917168404Spjd */ 1918168404Spjdint 1919324010Savgzpool_scan(zpool_handle_t *zhp, pool_scan_func_t func, pool_scrub_cmd_t cmd) 1920168404Spjd{ 1921168404Spjd zfs_cmd_t zc = { 0 }; 1922168404Spjd char msg[1024]; 1923324010Savg int err; 1924168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 1925168404Spjd 1926168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 1927219089Spjd zc.zc_cookie = func; 1928324010Savg zc.zc_flags = cmd; 1929168404Spjd 1930324010Savg if (zfs_ioctl(hdl, ZFS_IOC_POOL_SCAN, &zc) == 0) 1931168404Spjd return (0); 1932168404Spjd 1933324010Savg err = errno; 1934324010Savg 1935324010Savg /* ECANCELED on a scrub means we resumed a paused scrub */ 1936324010Savg if (err == ECANCELED && func == POOL_SCAN_SCRUB && 1937324010Savg cmd == POOL_SCRUB_NORMAL) 1938324010Savg return (0); 1939324010Savg 1940324010Savg if (err == ENOENT && func != POOL_SCAN_NONE && cmd == POOL_SCRUB_NORMAL) 1941324010Savg return (0); 1942324010Savg 1943219089Spjd if (func == POOL_SCAN_SCRUB) { 1944324010Savg if (cmd == POOL_SCRUB_PAUSE) { 1945324010Savg (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1946324010Savg "cannot pause scrubbing %s"), zc.zc_name); 1947324010Savg } else { 1948324010Savg assert(cmd == POOL_SCRUB_NORMAL); 1949324010Savg (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1950324010Savg "cannot scrub %s"), zc.zc_name); 1951324010Savg } 1952219089Spjd } else if (func == POOL_SCAN_NONE) { 1953219089Spjd (void) snprintf(msg, sizeof (msg), 1954219089Spjd dgettext(TEXT_DOMAIN, "cannot cancel scrubbing %s"), 1955219089Spjd zc.zc_name); 1956219089Spjd } else { 1957219089Spjd assert(!"unexpected result"); 1958219089Spjd } 1959168404Spjd 1960324010Savg if (err == EBUSY) { 1961219089Spjd nvlist_t *nvroot; 1962219089Spjd pool_scan_stat_t *ps = NULL; 1963219089Spjd uint_t psc; 1964219089Spjd 1965219089Spjd verify(nvlist_lookup_nvlist(zhp->zpool_config, 1966219089Spjd ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0); 1967219089Spjd (void) nvlist_lookup_uint64_array(nvroot, 1968219089Spjd ZPOOL_CONFIG_SCAN_STATS, (uint64_t **)&ps, &psc); 1969324010Savg if (ps && ps->pss_func == POOL_SCAN_SCRUB) { 1970324010Savg if (cmd == POOL_SCRUB_PAUSE) 1971324010Savg return (zfs_error(hdl, EZFS_SCRUB_PAUSED, msg)); 1972324010Savg else 1973324010Savg return (zfs_error(hdl, EZFS_SCRUBBING, msg)); 1974324010Savg } else { 1975219089Spjd return (zfs_error(hdl, EZFS_RESILVERING, msg)); 1976324010Savg } 1977324010Savg } else if (err == ENOENT) { 1978219089Spjd return (zfs_error(hdl, EZFS_NO_SCRUB, msg)); 1979219089Spjd } else { 1980324010Savg return (zpool_standard_error(hdl, err, msg)); 1981219089Spjd } 1982168404Spjd} 1983168404Spjd 1984339111Smavstatic int 1985339111Smavxlate_init_err(int err) 1986339111Smav{ 1987339111Smav switch (err) { 1988339111Smav case ENODEV: 1989339111Smav return (EZFS_NODEVICE); 1990339111Smav case EINVAL: 1991339111Smav case EROFS: 1992339111Smav return (EZFS_BADDEV); 1993339111Smav case EBUSY: 1994339111Smav return (EZFS_INITIALIZING); 1995339111Smav case ESRCH: 1996339111Smav return (EZFS_NO_INITIALIZE); 1997339111Smav } 1998339111Smav return (err); 1999339111Smav} 2000339111Smav 2001339111Smav/* 2002339111Smav * Begin, suspend, or cancel the initialization (initializing of all free 2003339111Smav * blocks) for the given vdevs in the given pool. 2004339111Smav */ 2005339111Smavint 2006339111Smavzpool_initialize(zpool_handle_t *zhp, pool_initialize_func_t cmd_type, 2007339111Smav nvlist_t *vds) 2008339111Smav{ 2009339111Smav char msg[1024]; 2010339111Smav libzfs_handle_t *hdl = zhp->zpool_hdl; 2011339111Smav 2012339111Smav nvlist_t *errlist; 2013339111Smav 2014339111Smav /* translate vdev names to guids */ 2015339111Smav nvlist_t *vdev_guids = fnvlist_alloc(); 2016339111Smav nvlist_t *guids_to_paths = fnvlist_alloc(); 2017339111Smav boolean_t spare, cache; 2018339111Smav nvlist_t *tgt; 2019339111Smav nvpair_t *elem; 2020339111Smav 2021339111Smav for (elem = nvlist_next_nvpair(vds, NULL); elem != NULL; 2022339111Smav elem = nvlist_next_nvpair(vds, elem)) { 2023339111Smav char *vd_path = nvpair_name(elem); 2024339111Smav tgt = zpool_find_vdev(zhp, vd_path, &spare, &cache, NULL); 2025339111Smav 2026339111Smav if ((tgt == NULL) || cache || spare) { 2027339111Smav (void) snprintf(msg, sizeof (msg), 2028339111Smav dgettext(TEXT_DOMAIN, "cannot initialize '%s'"), 2029339111Smav vd_path); 2030339111Smav int err = (tgt == NULL) ? EZFS_NODEVICE : 2031339111Smav (spare ? EZFS_ISSPARE : EZFS_ISL2CACHE); 2032339111Smav fnvlist_free(vdev_guids); 2033339111Smav fnvlist_free(guids_to_paths); 2034339111Smav return (zfs_error(hdl, err, msg)); 2035339111Smav } 2036339111Smav 2037339111Smav uint64_t guid = fnvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID); 2038339111Smav fnvlist_add_uint64(vdev_guids, vd_path, guid); 2039339111Smav 2040339111Smav (void) snprintf(msg, sizeof (msg), "%llu", guid); 2041339111Smav fnvlist_add_string(guids_to_paths, msg, vd_path); 2042339111Smav } 2043339111Smav 2044339111Smav int err = lzc_initialize(zhp->zpool_name, cmd_type, vdev_guids, 2045339111Smav &errlist); 2046339111Smav fnvlist_free(vdev_guids); 2047339111Smav 2048339111Smav if (err == 0) { 2049339111Smav fnvlist_free(guids_to_paths); 2050339111Smav return (0); 2051339111Smav } 2052339111Smav 2053339111Smav nvlist_t *vd_errlist = NULL; 2054339111Smav if (errlist != NULL) { 2055339111Smav vd_errlist = fnvlist_lookup_nvlist(errlist, 2056339111Smav ZPOOL_INITIALIZE_VDEVS); 2057339111Smav } 2058339111Smav 2059339111Smav (void) snprintf(msg, sizeof (msg), 2060339111Smav dgettext(TEXT_DOMAIN, "operation failed")); 2061339111Smav 2062339111Smav for (elem = nvlist_next_nvpair(vd_errlist, NULL); elem != NULL; 2063339111Smav elem = nvlist_next_nvpair(vd_errlist, elem)) { 2064339111Smav int64_t vd_error = xlate_init_err(fnvpair_value_int64(elem)); 2065339111Smav char *path = fnvlist_lookup_string(guids_to_paths, 2066339111Smav nvpair_name(elem)); 2067339111Smav (void) zfs_error_fmt(hdl, vd_error, "cannot initialize '%s'", 2068339111Smav path); 2069339111Smav } 2070339111Smav 2071339111Smav fnvlist_free(guids_to_paths); 2072339111Smav if (vd_errlist != NULL) 2073339111Smav return (-1); 2074339111Smav 2075339111Smav return (zpool_standard_error(hdl, err, msg)); 2076339111Smav} 2077339111Smav 2078277239Ssmh#ifdef illumos 2079168404Spjd/* 2080219089Spjd * This provides a very minimal check whether a given string is likely a 2081219089Spjd * c#t#d# style string. Users of this are expected to do their own 2082219089Spjd * verification of the s# part. 2083219089Spjd */ 2084219089Spjd#define CTD_CHECK(str) (str && str[0] == 'c' && isdigit(str[1])) 2085219089Spjd 2086219089Spjd/* 2087219089Spjd * More elaborate version for ones which may start with "/dev/dsk/" 2088219089Spjd * and the like. 2089219089Spjd */ 2090219089Spjdstatic int 2091289562Smavctd_check_path(char *str) 2092289562Smav{ 2093219089Spjd /* 2094219089Spjd * If it starts with a slash, check the last component. 2095219089Spjd */ 2096219089Spjd if (str && str[0] == '/') { 2097219089Spjd char *tmp = strrchr(str, '/'); 2098219089Spjd 2099219089Spjd /* 2100219089Spjd * If it ends in "/old", check the second-to-last 2101219089Spjd * component of the string instead. 2102219089Spjd */ 2103219089Spjd if (tmp != str && strcmp(tmp, "/old") == 0) { 2104219089Spjd for (tmp--; *tmp != '/'; tmp--) 2105219089Spjd ; 2106219089Spjd } 2107219089Spjd str = tmp + 1; 2108219089Spjd } 2109219089Spjd return (CTD_CHECK(str)); 2110219089Spjd} 2111277239Ssmh#endif 2112219089Spjd 2113219089Spjd/* 2114219089Spjd * Find a vdev that matches the search criteria specified. We use the 2115219089Spjd * the nvpair name to determine how we should look for the device. 2116168404Spjd * 'avail_spare' is set to TRUE if the provided guid refers to an AVAIL 2117168404Spjd * spare; but FALSE if its an INUSE spare. 2118168404Spjd */ 2119168404Spjdstatic nvlist_t * 2120219089Spjdvdev_to_nvlist_iter(nvlist_t *nv, nvlist_t *search, boolean_t *avail_spare, 2121219089Spjd boolean_t *l2cache, boolean_t *log) 2122168404Spjd{ 2123168404Spjd uint_t c, children; 2124168404Spjd nvlist_t **child; 2125168404Spjd nvlist_t *ret; 2126185029Spjd uint64_t is_log; 2127219089Spjd char *srchkey; 2128219089Spjd nvpair_t *pair = nvlist_next_nvpair(search, NULL); 2129168404Spjd 2130219089Spjd /* Nothing to look for */ 2131219089Spjd if (search == NULL || pair == NULL) 2132219089Spjd return (NULL); 2133168404Spjd 2134219089Spjd /* Obtain the key we will use to search */ 2135219089Spjd srchkey = nvpair_name(pair); 2136219089Spjd 2137219089Spjd switch (nvpair_type(pair)) { 2138219089Spjd case DATA_TYPE_UINT64: 2139219089Spjd if (strcmp(srchkey, ZPOOL_CONFIG_GUID) == 0) { 2140219089Spjd uint64_t srchval, theguid; 2141219089Spjd 2142219089Spjd verify(nvpair_value_uint64(pair, &srchval) == 0); 2143219089Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, 2144219089Spjd &theguid) == 0); 2145219089Spjd if (theguid == srchval) 2146219089Spjd return (nv); 2147219089Spjd } 2148219089Spjd break; 2149219089Spjd 2150219089Spjd case DATA_TYPE_STRING: { 2151219089Spjd char *srchval, *val; 2152219089Spjd 2153219089Spjd verify(nvpair_value_string(pair, &srchval) == 0); 2154219089Spjd if (nvlist_lookup_string(nv, srchkey, &val) != 0) 2155219089Spjd break; 2156219089Spjd 2157168404Spjd /* 2158219089Spjd * Search for the requested value. Special cases: 2159219089Spjd * 2160331395Smav * - ZPOOL_CONFIG_PATH for whole disk entries. To support 2161331395Smav * UEFI boot, these end in "s0" or "s0/old" or "s1" or 2162331395Smav * "s1/old". The "s0" or "s1" part is hidden from the user, 2163219089Spjd * but included in the string, so this matches around it. 2164219089Spjd * - looking for a top-level vdev name (i.e. ZPOOL_CONFIG_TYPE). 2165219089Spjd * 2166219089Spjd * Otherwise, all other searches are simple string compares. 2167168404Spjd */ 2168277239Ssmh#ifdef illumos 2169219089Spjd if (strcmp(srchkey, ZPOOL_CONFIG_PATH) == 0 && 2170219089Spjd ctd_check_path(val)) { 2171219089Spjd uint64_t wholedisk = 0; 2172219089Spjd 2173219089Spjd (void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_WHOLE_DISK, 2174219089Spjd &wholedisk); 2175219089Spjd if (wholedisk) { 2176219089Spjd int slen = strlen(srchval); 2177219089Spjd int vlen = strlen(val); 2178219089Spjd 2179219089Spjd if (slen != vlen - 2) 2180219089Spjd break; 2181219089Spjd 2182219089Spjd /* 2183219089Spjd * make_leaf_vdev() should only set 2184219089Spjd * wholedisk for ZPOOL_CONFIG_PATHs which 2185219089Spjd * will include "/dev/dsk/", giving plenty of 2186219089Spjd * room for the indices used next. 2187219089Spjd */ 2188219089Spjd ASSERT(vlen >= 6); 2189219089Spjd 2190219089Spjd /* 2191219089Spjd * strings identical except trailing "s0" 2192219089Spjd */ 2193331395Smav if ((strcmp(&val[vlen - 2], "s0") == 0 || 2194331395Smav strcmp(&val[vlen - 2], "s1") == 0) && 2195219089Spjd strncmp(srchval, val, slen) == 0) 2196219089Spjd return (nv); 2197219089Spjd 2198219089Spjd /* 2199219089Spjd * strings identical except trailing "s0/old" 2200219089Spjd */ 2201331395Smav if ((strcmp(&val[vlen - 6], "s0/old") == 0 || 2202331395Smav strcmp(&val[vlen - 6], "s1/old") == 0) && 2203219089Spjd strcmp(&srchval[slen - 4], "/old") == 0 && 2204219089Spjd strncmp(srchval, val, slen - 4) == 0) 2205219089Spjd return (nv); 2206219089Spjd 2207219089Spjd break; 2208219089Spjd } 2209219089Spjd } else if (strcmp(srchkey, ZPOOL_CONFIG_TYPE) == 0 && val) { 2210277239Ssmh#else 2211277239Ssmh if (strcmp(srchkey, ZPOOL_CONFIG_TYPE) == 0 && val) { 2212277239Ssmh#endif 2213219089Spjd char *type, *idx, *end, *p; 2214219089Spjd uint64_t id, vdev_id; 2215219089Spjd 2216168404Spjd /* 2217219089Spjd * Determine our vdev type, keeping in mind 2218219089Spjd * that the srchval is composed of a type and 2219219089Spjd * vdev id pair (i.e. mirror-4). 2220168404Spjd */ 2221219089Spjd if ((type = strdup(srchval)) == NULL) 2222219089Spjd return (NULL); 2223219089Spjd 2224219089Spjd if ((p = strrchr(type, '-')) == NULL) { 2225219089Spjd free(type); 2226219089Spjd break; 2227219089Spjd } 2228219089Spjd idx = p + 1; 2229219089Spjd *p = '\0'; 2230219089Spjd 2231219089Spjd /* 2232219089Spjd * If the types don't match then keep looking. 2233219089Spjd */ 2234219089Spjd if (strncmp(val, type, strlen(val)) != 0) { 2235219089Spjd free(type); 2236219089Spjd break; 2237219089Spjd } 2238219089Spjd 2239329492Smav verify(zpool_vdev_is_interior(type)); 2240219089Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_ID, 2241219089Spjd &id) == 0); 2242219089Spjd 2243219089Spjd errno = 0; 2244219089Spjd vdev_id = strtoull(idx, &end, 10); 2245219089Spjd 2246219089Spjd free(type); 2247219089Spjd if (errno != 0) 2248219089Spjd return (NULL); 2249219089Spjd 2250219089Spjd /* 2251219089Spjd * Now verify that we have the correct vdev id. 2252219089Spjd */ 2253219089Spjd if (vdev_id == id) 2254168404Spjd return (nv); 2255219089Spjd } 2256219089Spjd 2257219089Spjd /* 2258219089Spjd * Common case 2259219089Spjd */ 2260219089Spjd if (strcmp(srchval, val) == 0) 2261168404Spjd return (nv); 2262219089Spjd break; 2263168404Spjd } 2264168404Spjd 2265219089Spjd default: 2266219089Spjd break; 2267219089Spjd } 2268219089Spjd 2269168404Spjd if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_CHILDREN, 2270168404Spjd &child, &children) != 0) 2271168404Spjd return (NULL); 2272168404Spjd 2273185029Spjd for (c = 0; c < children; c++) { 2274219089Spjd if ((ret = vdev_to_nvlist_iter(child[c], search, 2275185029Spjd avail_spare, l2cache, NULL)) != NULL) { 2276185029Spjd /* 2277185029Spjd * The 'is_log' value is only set for the toplevel 2278185029Spjd * vdev, not the leaf vdevs. So we always lookup the 2279185029Spjd * log device from the root of the vdev tree (where 2280185029Spjd * 'log' is non-NULL). 2281185029Spjd */ 2282185029Spjd if (log != NULL && 2283185029Spjd nvlist_lookup_uint64(child[c], 2284185029Spjd ZPOOL_CONFIG_IS_LOG, &is_log) == 0 && 2285185029Spjd is_log) { 2286185029Spjd *log = B_TRUE; 2287185029Spjd } 2288168404Spjd return (ret); 2289185029Spjd } 2290185029Spjd } 2291168404Spjd 2292168404Spjd if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_SPARES, 2293168404Spjd &child, &children) == 0) { 2294168404Spjd for (c = 0; c < children; c++) { 2295219089Spjd if ((ret = vdev_to_nvlist_iter(child[c], search, 2296185029Spjd avail_spare, l2cache, NULL)) != NULL) { 2297168404Spjd *avail_spare = B_TRUE; 2298168404Spjd return (ret); 2299168404Spjd } 2300168404Spjd } 2301168404Spjd } 2302168404Spjd 2303185029Spjd if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_L2CACHE, 2304185029Spjd &child, &children) == 0) { 2305185029Spjd for (c = 0; c < children; c++) { 2306219089Spjd if ((ret = vdev_to_nvlist_iter(child[c], search, 2307185029Spjd avail_spare, l2cache, NULL)) != NULL) { 2308185029Spjd *l2cache = B_TRUE; 2309185029Spjd return (ret); 2310185029Spjd } 2311185029Spjd } 2312185029Spjd } 2313185029Spjd 2314168404Spjd return (NULL); 2315168404Spjd} 2316168404Spjd 2317219089Spjd/* 2318219089Spjd * Given a physical path (minus the "/devices" prefix), find the 2319219089Spjd * associated vdev. 2320219089Spjd */ 2321168404Spjdnvlist_t * 2322219089Spjdzpool_find_vdev_by_physpath(zpool_handle_t *zhp, const char *ppath, 2323219089Spjd boolean_t *avail_spare, boolean_t *l2cache, boolean_t *log) 2324219089Spjd{ 2325219089Spjd nvlist_t *search, *nvroot, *ret; 2326219089Spjd 2327219089Spjd verify(nvlist_alloc(&search, NV_UNIQUE_NAME, KM_SLEEP) == 0); 2328219089Spjd verify(nvlist_add_string(search, ZPOOL_CONFIG_PHYS_PATH, ppath) == 0); 2329219089Spjd 2330219089Spjd verify(nvlist_lookup_nvlist(zhp->zpool_config, ZPOOL_CONFIG_VDEV_TREE, 2331219089Spjd &nvroot) == 0); 2332219089Spjd 2333219089Spjd *avail_spare = B_FALSE; 2334219089Spjd *l2cache = B_FALSE; 2335219089Spjd if (log != NULL) 2336219089Spjd *log = B_FALSE; 2337219089Spjd ret = vdev_to_nvlist_iter(nvroot, search, avail_spare, l2cache, log); 2338219089Spjd nvlist_free(search); 2339219089Spjd 2340219089Spjd return (ret); 2341219089Spjd} 2342219089Spjd 2343219089Spjd/* 2344219089Spjd * Determine if we have an "interior" top-level vdev (i.e mirror/raidz). 2345219089Spjd */ 2346329492Smavstatic boolean_t 2347219089Spjdzpool_vdev_is_interior(const char *name) 2348219089Spjd{ 2349219089Spjd if (strncmp(name, VDEV_TYPE_RAIDZ, strlen(VDEV_TYPE_RAIDZ)) == 0 || 2350329492Smav strncmp(name, VDEV_TYPE_SPARE, strlen(VDEV_TYPE_SPARE)) == 0 || 2351329492Smav strncmp(name, 2352329492Smav VDEV_TYPE_REPLACING, strlen(VDEV_TYPE_REPLACING)) == 0 || 2353219089Spjd strncmp(name, VDEV_TYPE_MIRROR, strlen(VDEV_TYPE_MIRROR)) == 0) 2354219089Spjd return (B_TRUE); 2355219089Spjd return (B_FALSE); 2356219089Spjd} 2357219089Spjd 2358219089Spjdnvlist_t * 2359185029Spjdzpool_find_vdev(zpool_handle_t *zhp, const char *path, boolean_t *avail_spare, 2360185029Spjd boolean_t *l2cache, boolean_t *log) 2361168404Spjd{ 2362168404Spjd char buf[MAXPATHLEN]; 2363168404Spjd char *end; 2364219089Spjd nvlist_t *nvroot, *search, *ret; 2365168404Spjd uint64_t guid; 2366168404Spjd 2367219089Spjd verify(nvlist_alloc(&search, NV_UNIQUE_NAME, KM_SLEEP) == 0); 2368219089Spjd 2369168404Spjd guid = strtoull(path, &end, 10); 2370168404Spjd if (guid != 0 && *end == '\0') { 2371219089Spjd verify(nvlist_add_uint64(search, ZPOOL_CONFIG_GUID, guid) == 0); 2372219089Spjd } else if (zpool_vdev_is_interior(path)) { 2373219089Spjd verify(nvlist_add_string(search, ZPOOL_CONFIG_TYPE, path) == 0); 2374168404Spjd } else if (path[0] != '/') { 2375168404Spjd (void) snprintf(buf, sizeof (buf), "%s%s", _PATH_DEV, path); 2376219089Spjd verify(nvlist_add_string(search, ZPOOL_CONFIG_PATH, buf) == 0); 2377168404Spjd } else { 2378219089Spjd verify(nvlist_add_string(search, ZPOOL_CONFIG_PATH, path) == 0); 2379168404Spjd } 2380168404Spjd 2381168404Spjd verify(nvlist_lookup_nvlist(zhp->zpool_config, ZPOOL_CONFIG_VDEV_TREE, 2382168404Spjd &nvroot) == 0); 2383168404Spjd 2384168404Spjd *avail_spare = B_FALSE; 2385185029Spjd *l2cache = B_FALSE; 2386185029Spjd if (log != NULL) 2387185029Spjd *log = B_FALSE; 2388219089Spjd ret = vdev_to_nvlist_iter(nvroot, search, avail_spare, l2cache, log); 2389219089Spjd nvlist_free(search); 2390219089Spjd 2391219089Spjd return (ret); 2392168404Spjd} 2393168404Spjd 2394185029Spjdstatic int 2395185029Spjdvdev_online(nvlist_t *nv) 2396185029Spjd{ 2397185029Spjd uint64_t ival; 2398185029Spjd 2399185029Spjd if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_OFFLINE, &ival) == 0 || 2400185029Spjd nvlist_lookup_uint64(nv, ZPOOL_CONFIG_FAULTED, &ival) == 0 || 2401185029Spjd nvlist_lookup_uint64(nv, ZPOOL_CONFIG_REMOVED, &ival) == 0) 2402185029Spjd return (0); 2403185029Spjd 2404185029Spjd return (1); 2405185029Spjd} 2406185029Spjd 2407168404Spjd/* 2408219089Spjd * Helper function for zpool_get_physpaths(). 2409168404Spjd */ 2410219089Spjdstatic int 2411219089Spjdvdev_get_one_physpath(nvlist_t *config, char *physpath, size_t physpath_size, 2412219089Spjd size_t *bytes_written) 2413185029Spjd{ 2414219089Spjd size_t bytes_left, pos, rsz; 2415219089Spjd char *tmppath; 2416219089Spjd const char *format; 2417185029Spjd 2418219089Spjd if (nvlist_lookup_string(config, ZPOOL_CONFIG_PHYS_PATH, 2419219089Spjd &tmppath) != 0) 2420219089Spjd return (EZFS_NODEVICE); 2421185029Spjd 2422219089Spjd pos = *bytes_written; 2423219089Spjd bytes_left = physpath_size - pos; 2424219089Spjd format = (pos == 0) ? "%s" : " %s"; 2425185029Spjd 2426219089Spjd rsz = snprintf(physpath + pos, bytes_left, format, tmppath); 2427219089Spjd *bytes_written += rsz; 2428185029Spjd 2429219089Spjd if (rsz >= bytes_left) { 2430219089Spjd /* if physpath was not copied properly, clear it */ 2431219089Spjd if (bytes_left != 0) { 2432219089Spjd physpath[pos] = 0; 2433219089Spjd } 2434219089Spjd return (EZFS_NOSPC); 2435219089Spjd } 2436219089Spjd return (0); 2437219089Spjd} 2438185029Spjd 2439219089Spjdstatic int 2440219089Spjdvdev_get_physpaths(nvlist_t *nv, char *physpath, size_t phypath_size, 2441219089Spjd size_t *rsz, boolean_t is_spare) 2442219089Spjd{ 2443219089Spjd char *type; 2444219089Spjd int ret; 2445185029Spjd 2446219089Spjd if (nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE, &type) != 0) 2447219089Spjd return (EZFS_INVALCONFIG); 2448185029Spjd 2449219089Spjd if (strcmp(type, VDEV_TYPE_DISK) == 0) { 2450219089Spjd /* 2451219089Spjd * An active spare device has ZPOOL_CONFIG_IS_SPARE set. 2452219089Spjd * For a spare vdev, we only want to boot from the active 2453219089Spjd * spare device. 2454219089Spjd */ 2455219089Spjd if (is_spare) { 2456219089Spjd uint64_t spare = 0; 2457219089Spjd (void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_IS_SPARE, 2458219089Spjd &spare); 2459219089Spjd if (!spare) 2460219089Spjd return (EZFS_INVALCONFIG); 2461219089Spjd } 2462185029Spjd 2463219089Spjd if (vdev_online(nv)) { 2464219089Spjd if ((ret = vdev_get_one_physpath(nv, physpath, 2465219089Spjd phypath_size, rsz)) != 0) 2466219089Spjd return (ret); 2467219089Spjd } 2468219089Spjd } else if (strcmp(type, VDEV_TYPE_MIRROR) == 0 || 2469325149Savg strcmp(type, VDEV_TYPE_RAIDZ) == 0 || 2470219089Spjd strcmp(type, VDEV_TYPE_REPLACING) == 0 || 2471219089Spjd (is_spare = (strcmp(type, VDEV_TYPE_SPARE) == 0))) { 2472219089Spjd nvlist_t **child; 2473219089Spjd uint_t count; 2474219089Spjd int i, ret; 2475185029Spjd 2476219089Spjd if (nvlist_lookup_nvlist_array(nv, 2477219089Spjd ZPOOL_CONFIG_CHILDREN, &child, &count) != 0) 2478219089Spjd return (EZFS_INVALCONFIG); 2479219089Spjd 2480219089Spjd for (i = 0; i < count; i++) { 2481219089Spjd ret = vdev_get_physpaths(child[i], physpath, 2482219089Spjd phypath_size, rsz, is_spare); 2483219089Spjd if (ret == EZFS_NOSPC) 2484219089Spjd return (ret); 2485185029Spjd } 2486185029Spjd } 2487185029Spjd 2488219089Spjd return (EZFS_POOL_INVALARG); 2489185029Spjd} 2490185029Spjd 2491185029Spjd/* 2492219089Spjd * Get phys_path for a root pool config. 2493219089Spjd * Return 0 on success; non-zero on failure. 2494185029Spjd */ 2495219089Spjdstatic int 2496219089Spjdzpool_get_config_physpath(nvlist_t *config, char *physpath, size_t phypath_size) 2497168404Spjd{ 2498219089Spjd size_t rsz; 2499219089Spjd nvlist_t *vdev_root; 2500219089Spjd nvlist_t **child; 2501185029Spjd uint_t count; 2502219089Spjd char *type; 2503168404Spjd 2504219089Spjd rsz = 0; 2505219089Spjd 2506219089Spjd if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, 2507219089Spjd &vdev_root) != 0) 2508219089Spjd return (EZFS_INVALCONFIG); 2509219089Spjd 2510219089Spjd if (nvlist_lookup_string(vdev_root, ZPOOL_CONFIG_TYPE, &type) != 0 || 2511219089Spjd nvlist_lookup_nvlist_array(vdev_root, ZPOOL_CONFIG_CHILDREN, 2512219089Spjd &child, &count) != 0) 2513219089Spjd return (EZFS_INVALCONFIG); 2514219089Spjd 2515219089Spjd /* 2516289527Smav * root pool can only have a single top-level vdev. 2517219089Spjd */ 2518289527Smav if (strcmp(type, VDEV_TYPE_ROOT) != 0 || count != 1) 2519219089Spjd return (EZFS_POOL_INVALARG); 2520219089Spjd 2521219089Spjd (void) vdev_get_physpaths(child[0], physpath, phypath_size, &rsz, 2522219089Spjd B_FALSE); 2523219089Spjd 2524219089Spjd /* No online devices */ 2525219089Spjd if (rsz == 0) 2526219089Spjd return (EZFS_NODEVICE); 2527219089Spjd 2528219089Spjd return (0); 2529219089Spjd} 2530219089Spjd 2531219089Spjd/* 2532219089Spjd * Get phys_path for a root pool 2533219089Spjd * Return 0 on success; non-zero on failure. 2534219089Spjd */ 2535219089Spjdint 2536219089Spjdzpool_get_physpath(zpool_handle_t *zhp, char *physpath, size_t phypath_size) 2537219089Spjd{ 2538219089Spjd return (zpool_get_config_physpath(zhp->zpool_config, physpath, 2539219089Spjd phypath_size)); 2540219089Spjd} 2541219089Spjd 2542219089Spjd/* 2543219089Spjd * If the device has being dynamically expanded then we need to relabel 2544219089Spjd * the disk to use the new unallocated space. 2545219089Spjd */ 2546219089Spjdstatic int 2547219089Spjdzpool_relabel_disk(libzfs_handle_t *hdl, const char *name) 2548219089Spjd{ 2549277300Ssmh#ifdef illumos 2550219089Spjd char path[MAXPATHLEN]; 2551219089Spjd char errbuf[1024]; 2552219089Spjd int fd, error; 2553219089Spjd int (*_efi_use_whole_disk)(int); 2554219089Spjd 2555219089Spjd if ((_efi_use_whole_disk = (int (*)(int))dlsym(RTLD_DEFAULT, 2556219089Spjd "efi_use_whole_disk")) == NULL) 2557219089Spjd return (-1); 2558219089Spjd 2559297763Smav (void) snprintf(path, sizeof (path), "%s/%s", ZFS_RDISK_ROOT, name); 2560219089Spjd 2561219089Spjd if ((fd = open(path, O_RDWR | O_NDELAY)) < 0) { 2562219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "cannot " 2563219089Spjd "relabel '%s': unable to open device"), name); 2564219089Spjd return (zfs_error(hdl, EZFS_OPENFAILED, errbuf)); 2565168404Spjd } 2566168404Spjd 2567219089Spjd /* 2568219089Spjd * It's possible that we might encounter an error if the device 2569219089Spjd * does not have any unallocated space left. If so, we simply 2570219089Spjd * ignore that error and continue on. 2571219089Spjd */ 2572219089Spjd error = _efi_use_whole_disk(fd); 2573219089Spjd (void) close(fd); 2574219089Spjd if (error && error != VT_ENOSPC) { 2575219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "cannot " 2576219089Spjd "relabel '%s': unable to read disk capacity"), name); 2577219089Spjd return (zfs_error(hdl, EZFS_NOCAP, errbuf)); 2578219089Spjd } 2579277300Ssmh#endif /* illumos */ 2580219089Spjd return (0); 2581168404Spjd} 2582168404Spjd 2583168404Spjd/* 2584185029Spjd * Bring the specified vdev online. The 'flags' parameter is a set of the 2585185029Spjd * ZFS_ONLINE_* flags. 2586168404Spjd */ 2587168404Spjdint 2588185029Spjdzpool_vdev_online(zpool_handle_t *zhp, const char *path, int flags, 2589185029Spjd vdev_state_t *newstate) 2590168404Spjd{ 2591168404Spjd zfs_cmd_t zc = { 0 }; 2592168404Spjd char msg[1024]; 2593329488Smav char *pathname; 2594168404Spjd nvlist_t *tgt; 2595219089Spjd boolean_t avail_spare, l2cache, islog; 2596168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2597168404Spjd 2598219089Spjd if (flags & ZFS_ONLINE_EXPAND) { 2599219089Spjd (void) snprintf(msg, sizeof (msg), 2600219089Spjd dgettext(TEXT_DOMAIN, "cannot expand %s"), path); 2601219089Spjd } else { 2602219089Spjd (void) snprintf(msg, sizeof (msg), 2603219089Spjd dgettext(TEXT_DOMAIN, "cannot online %s"), path); 2604219089Spjd } 2605168404Spjd 2606168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2607185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 2608219089Spjd &islog)) == NULL) 2609168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 2610168404Spjd 2611168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 2612168404Spjd 2613219089Spjd if (avail_spare) 2614168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 2615168404Spjd 2616329488Smav if ((flags & ZFS_ONLINE_EXPAND || 2617329488Smav zpool_get_prop_int(zhp, ZPOOL_PROP_AUTOEXPAND, NULL)) && 2618329488Smav nvlist_lookup_string(tgt, ZPOOL_CONFIG_PATH, &pathname) == 0) { 2619219089Spjd uint64_t wholedisk = 0; 2620219089Spjd 2621219089Spjd (void) nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_WHOLE_DISK, 2622219089Spjd &wholedisk); 2623219089Spjd 2624219089Spjd /* 2625219089Spjd * XXX - L2ARC 1.0 devices can't support expansion. 2626219089Spjd */ 2627219089Spjd if (l2cache) { 2628219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2629219089Spjd "cannot expand cache devices")); 2630219089Spjd return (zfs_error(hdl, EZFS_VDEVNOTSUP, msg)); 2631219089Spjd } 2632219089Spjd 2633219089Spjd if (wholedisk) { 2634297763Smav pathname += strlen(ZFS_DISK_ROOT) + 1; 2635219089Spjd (void) zpool_relabel_disk(hdl, pathname); 2636219089Spjd } 2637219089Spjd } 2638219089Spjd 2639185029Spjd zc.zc_cookie = VDEV_STATE_ONLINE; 2640185029Spjd zc.zc_obj = flags; 2641168404Spjd 2642219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SET_STATE, &zc) != 0) { 2643219089Spjd if (errno == EINVAL) { 2644219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "was split " 2645219089Spjd "from this pool into a new one. Use '%s' " 2646219089Spjd "instead"), "zpool detach"); 2647219089Spjd return (zfs_error(hdl, EZFS_POSTSPLIT_ONLINE, msg)); 2648219089Spjd } 2649185029Spjd return (zpool_standard_error(hdl, errno, msg)); 2650219089Spjd } 2651185029Spjd 2652185029Spjd *newstate = zc.zc_cookie; 2653185029Spjd return (0); 2654168404Spjd} 2655168404Spjd 2656168404Spjd/* 2657168404Spjd * Take the specified vdev offline 2658168404Spjd */ 2659168404Spjdint 2660185029Spjdzpool_vdev_offline(zpool_handle_t *zhp, const char *path, boolean_t istmp) 2661168404Spjd{ 2662168404Spjd zfs_cmd_t zc = { 0 }; 2663168404Spjd char msg[1024]; 2664168404Spjd nvlist_t *tgt; 2665185029Spjd boolean_t avail_spare, l2cache; 2666168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2667168404Spjd 2668168404Spjd (void) snprintf(msg, sizeof (msg), 2669168404Spjd dgettext(TEXT_DOMAIN, "cannot offline %s"), path); 2670168404Spjd 2671168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2672185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 2673185029Spjd NULL)) == NULL) 2674168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 2675168404Spjd 2676168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 2677168404Spjd 2678219089Spjd if (avail_spare) 2679168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 2680168404Spjd 2681185029Spjd zc.zc_cookie = VDEV_STATE_OFFLINE; 2682185029Spjd zc.zc_obj = istmp ? ZFS_OFFLINE_TEMPORARY : 0; 2683168404Spjd 2684219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SET_STATE, &zc) == 0) 2685168404Spjd return (0); 2686168404Spjd 2687168404Spjd switch (errno) { 2688168404Spjd case EBUSY: 2689168404Spjd 2690168404Spjd /* 2691168404Spjd * There are no other replicas of this device. 2692168404Spjd */ 2693168404Spjd return (zfs_error(hdl, EZFS_NOREPLICAS, msg)); 2694168404Spjd 2695219089Spjd case EEXIST: 2696219089Spjd /* 2697219089Spjd * The log device has unplayed logs 2698219089Spjd */ 2699219089Spjd return (zfs_error(hdl, EZFS_UNPLAYED_LOGS, msg)); 2700219089Spjd 2701168404Spjd default: 2702168404Spjd return (zpool_standard_error(hdl, errno, msg)); 2703168404Spjd } 2704168404Spjd} 2705168404Spjd 2706168404Spjd/* 2707185029Spjd * Mark the given vdev faulted. 2708185029Spjd */ 2709185029Spjdint 2710219089Spjdzpool_vdev_fault(zpool_handle_t *zhp, uint64_t guid, vdev_aux_t aux) 2711185029Spjd{ 2712185029Spjd zfs_cmd_t zc = { 0 }; 2713185029Spjd char msg[1024]; 2714185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2715185029Spjd 2716185029Spjd (void) snprintf(msg, sizeof (msg), 2717185029Spjd dgettext(TEXT_DOMAIN, "cannot fault %llu"), guid); 2718185029Spjd 2719185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2720185029Spjd zc.zc_guid = guid; 2721185029Spjd zc.zc_cookie = VDEV_STATE_FAULTED; 2722219089Spjd zc.zc_obj = aux; 2723185029Spjd 2724219089Spjd if (ioctl(hdl->libzfs_fd, ZFS_IOC_VDEV_SET_STATE, &zc) == 0) 2725185029Spjd return (0); 2726185029Spjd 2727185029Spjd switch (errno) { 2728185029Spjd case EBUSY: 2729185029Spjd 2730185029Spjd /* 2731185029Spjd * There are no other replicas of this device. 2732185029Spjd */ 2733185029Spjd return (zfs_error(hdl, EZFS_NOREPLICAS, msg)); 2734185029Spjd 2735185029Spjd default: 2736185029Spjd return (zpool_standard_error(hdl, errno, msg)); 2737185029Spjd } 2738185029Spjd 2739185029Spjd} 2740185029Spjd 2741185029Spjd/* 2742185029Spjd * Mark the given vdev degraded. 2743185029Spjd */ 2744185029Spjdint 2745219089Spjdzpool_vdev_degrade(zpool_handle_t *zhp, uint64_t guid, vdev_aux_t aux) 2746185029Spjd{ 2747185029Spjd zfs_cmd_t zc = { 0 }; 2748185029Spjd char msg[1024]; 2749185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2750185029Spjd 2751185029Spjd (void) snprintf(msg, sizeof (msg), 2752185029Spjd dgettext(TEXT_DOMAIN, "cannot degrade %llu"), guid); 2753185029Spjd 2754185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2755185029Spjd zc.zc_guid = guid; 2756185029Spjd zc.zc_cookie = VDEV_STATE_DEGRADED; 2757219089Spjd zc.zc_obj = aux; 2758185029Spjd 2759219089Spjd if (ioctl(hdl->libzfs_fd, ZFS_IOC_VDEV_SET_STATE, &zc) == 0) 2760185029Spjd return (0); 2761185029Spjd 2762185029Spjd return (zpool_standard_error(hdl, errno, msg)); 2763185029Spjd} 2764185029Spjd 2765185029Spjd/* 2766168404Spjd * Returns TRUE if the given nvlist is a vdev that was originally swapped in as 2767168404Spjd * a hot spare. 2768168404Spjd */ 2769168404Spjdstatic boolean_t 2770168404Spjdis_replacing_spare(nvlist_t *search, nvlist_t *tgt, int which) 2771168404Spjd{ 2772168404Spjd nvlist_t **child; 2773168404Spjd uint_t c, children; 2774168404Spjd char *type; 2775168404Spjd 2776168404Spjd if (nvlist_lookup_nvlist_array(search, ZPOOL_CONFIG_CHILDREN, &child, 2777168404Spjd &children) == 0) { 2778168404Spjd verify(nvlist_lookup_string(search, ZPOOL_CONFIG_TYPE, 2779168404Spjd &type) == 0); 2780168404Spjd 2781168404Spjd if (strcmp(type, VDEV_TYPE_SPARE) == 0 && 2782168404Spjd children == 2 && child[which] == tgt) 2783168404Spjd return (B_TRUE); 2784168404Spjd 2785168404Spjd for (c = 0; c < children; c++) 2786168404Spjd if (is_replacing_spare(child[c], tgt, which)) 2787168404Spjd return (B_TRUE); 2788168404Spjd } 2789168404Spjd 2790168404Spjd return (B_FALSE); 2791168404Spjd} 2792168404Spjd 2793168404Spjd/* 2794168404Spjd * Attach new_disk (fully described by nvroot) to old_disk. 2795185029Spjd * If 'replacing' is specified, the new disk will replace the old one. 2796168404Spjd */ 2797168404Spjdint 2798168404Spjdzpool_vdev_attach(zpool_handle_t *zhp, 2799168404Spjd const char *old_disk, const char *new_disk, nvlist_t *nvroot, int replacing) 2800168404Spjd{ 2801168404Spjd zfs_cmd_t zc = { 0 }; 2802168404Spjd char msg[1024]; 2803168404Spjd int ret; 2804168404Spjd nvlist_t *tgt; 2805185029Spjd boolean_t avail_spare, l2cache, islog; 2806168404Spjd uint64_t val; 2807219089Spjd char *newname; 2808168404Spjd nvlist_t **child; 2809168404Spjd uint_t children; 2810168404Spjd nvlist_t *config_root; 2811168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2812236155Smm boolean_t rootpool = zpool_is_bootable(zhp); 2813168404Spjd 2814168404Spjd if (replacing) 2815168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 2816168404Spjd "cannot replace %s with %s"), old_disk, new_disk); 2817168404Spjd else 2818168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 2819168404Spjd "cannot attach %s to %s"), new_disk, old_disk); 2820168404Spjd 2821168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2822185029Spjd if ((tgt = zpool_find_vdev(zhp, old_disk, &avail_spare, &l2cache, 2823332525Smav &islog)) == NULL) 2824168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 2825168404Spjd 2826168404Spjd if (avail_spare) 2827168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 2828168404Spjd 2829185029Spjd if (l2cache) 2830185029Spjd return (zfs_error(hdl, EZFS_ISL2CACHE, msg)); 2831185029Spjd 2832168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 2833168404Spjd zc.zc_cookie = replacing; 2834168404Spjd 2835168404Spjd if (nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN, 2836168404Spjd &child, &children) != 0 || children != 1) { 2837168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2838168404Spjd "new device must be a single disk")); 2839168404Spjd return (zfs_error(hdl, EZFS_INVALCONFIG, msg)); 2840168404Spjd } 2841168404Spjd 2842168404Spjd verify(nvlist_lookup_nvlist(zpool_get_config(zhp, NULL), 2843168404Spjd ZPOOL_CONFIG_VDEV_TREE, &config_root) == 0); 2844168404Spjd 2845219089Spjd if ((newname = zpool_vdev_name(NULL, NULL, child[0], B_FALSE)) == NULL) 2846185029Spjd return (-1); 2847185029Spjd 2848168404Spjd /* 2849168404Spjd * If the target is a hot spare that has been swapped in, we can only 2850168404Spjd * replace it with another hot spare. 2851168404Spjd */ 2852168404Spjd if (replacing && 2853168404Spjd nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_IS_SPARE, &val) == 0 && 2854185029Spjd (zpool_find_vdev(zhp, newname, &avail_spare, &l2cache, 2855185029Spjd NULL) == NULL || !avail_spare) && 2856185029Spjd is_replacing_spare(config_root, tgt, 1)) { 2857168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2858168404Spjd "can only be replaced by another hot spare")); 2859185029Spjd free(newname); 2860168404Spjd return (zfs_error(hdl, EZFS_BADTARGET, msg)); 2861168404Spjd } 2862168404Spjd 2863185029Spjd free(newname); 2864185029Spjd 2865185029Spjd if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0) 2866168404Spjd return (-1); 2867168404Spjd 2868219089Spjd ret = zfs_ioctl(hdl, ZFS_IOC_VDEV_ATTACH, &zc); 2869168404Spjd 2870168404Spjd zcmd_free_nvlists(&zc); 2871168404Spjd 2872209962Smm if (ret == 0) { 2873209962Smm if (rootpool) { 2874219089Spjd /* 2875219089Spjd * XXX need a better way to prevent user from 2876219089Spjd * booting up a half-baked vdev. 2877219089Spjd */ 2878219089Spjd (void) fprintf(stderr, dgettext(TEXT_DOMAIN, "Make " 2879219089Spjd "sure to wait until resilver is done " 2880219089Spjd "before rebooting.\n")); 2881219089Spjd (void) fprintf(stderr, "\n"); 2882216293Smm (void) fprintf(stderr, dgettext(TEXT_DOMAIN, "If " 2883216293Smm "you boot from pool '%s', you may need to update\n" 2884216293Smm "boot code on newly attached disk '%s'.\n\n" 2885216293Smm "Assuming you use GPT partitioning and 'da0' is " 2886216293Smm "your new boot disk\n" 2887216293Smm "you may use the following command:\n\n" 2888216293Smm "\tgpart bootcode -b /boot/pmbr -p " 2889216293Smm "/boot/gptzfsboot -i 1 da0\n\n"), 2890216293Smm zhp->zpool_name, new_disk); 2891209962Smm } 2892168404Spjd return (0); 2893209962Smm } 2894168404Spjd 2895168404Spjd switch (errno) { 2896168404Spjd case ENOTSUP: 2897168404Spjd /* 2898168404Spjd * Can't attach to or replace this type of vdev. 2899168404Spjd */ 2900185029Spjd if (replacing) { 2901219089Spjd uint64_t version = zpool_get_prop_int(zhp, 2902219089Spjd ZPOOL_PROP_VERSION, NULL); 2903219089Spjd 2904185029Spjd if (islog) 2905185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2906185029Spjd "cannot replace a log with a spare")); 2907219089Spjd else if (version >= SPA_VERSION_MULTI_REPLACE) 2908219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2909219089Spjd "already in replacing/spare config; wait " 2910219089Spjd "for completion or use 'zpool detach'")); 2911185029Spjd else 2912185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2913185029Spjd "cannot replace a replacing device")); 2914185029Spjd } else { 2915168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2916168404Spjd "can only attach to mirrors and top-level " 2917168404Spjd "disks")); 2918185029Spjd } 2919168404Spjd (void) zfs_error(hdl, EZFS_BADTARGET, msg); 2920168404Spjd break; 2921168404Spjd 2922168404Spjd case EINVAL: 2923168404Spjd /* 2924168404Spjd * The new device must be a single disk. 2925168404Spjd */ 2926168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2927168404Spjd "new device must be a single disk")); 2928168404Spjd (void) zfs_error(hdl, EZFS_INVALCONFIG, msg); 2929168404Spjd break; 2930168404Spjd 2931168404Spjd case EBUSY: 2932332525Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "%s is busy, " 2933339106Smav "or device removal is in progress"), 2934168404Spjd new_disk); 2935168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 2936168404Spjd break; 2937168404Spjd 2938168404Spjd case EOVERFLOW: 2939168404Spjd /* 2940168404Spjd * The new device is too small. 2941168404Spjd */ 2942168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2943168404Spjd "device is too small")); 2944168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 2945168404Spjd break; 2946168404Spjd 2947168404Spjd case EDOM: 2948168404Spjd /* 2949168404Spjd * The new device has a different alignment requirement. 2950168404Spjd */ 2951168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2952168404Spjd "devices have different sector alignment")); 2953168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 2954168404Spjd break; 2955168404Spjd 2956168404Spjd case ENAMETOOLONG: 2957168404Spjd /* 2958168404Spjd * The resulting top-level vdev spec won't fit in the label. 2959168404Spjd */ 2960168404Spjd (void) zfs_error(hdl, EZFS_DEVOVERFLOW, msg); 2961168404Spjd break; 2962168404Spjd 2963168404Spjd default: 2964168404Spjd (void) zpool_standard_error(hdl, errno, msg); 2965168404Spjd } 2966168404Spjd 2967168404Spjd return (-1); 2968168404Spjd} 2969168404Spjd 2970168404Spjd/* 2971168404Spjd * Detach the specified device. 2972168404Spjd */ 2973168404Spjdint 2974168404Spjdzpool_vdev_detach(zpool_handle_t *zhp, const char *path) 2975168404Spjd{ 2976168404Spjd zfs_cmd_t zc = { 0 }; 2977168404Spjd char msg[1024]; 2978168404Spjd nvlist_t *tgt; 2979185029Spjd boolean_t avail_spare, l2cache; 2980168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2981168404Spjd 2982168404Spjd (void) snprintf(msg, sizeof (msg), 2983168404Spjd dgettext(TEXT_DOMAIN, "cannot detach %s"), path); 2984168404Spjd 2985168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2986185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 2987332525Smav NULL)) == NULL) 2988168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 2989168404Spjd 2990168404Spjd if (avail_spare) 2991168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 2992168404Spjd 2993185029Spjd if (l2cache) 2994185029Spjd return (zfs_error(hdl, EZFS_ISL2CACHE, msg)); 2995185029Spjd 2996168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 2997168404Spjd 2998185029Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_DETACH, &zc) == 0) 2999168404Spjd return (0); 3000168404Spjd 3001168404Spjd switch (errno) { 3002168404Spjd 3003168404Spjd case ENOTSUP: 3004168404Spjd /* 3005168404Spjd * Can't detach from this type of vdev. 3006168404Spjd */ 3007168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "only " 3008168404Spjd "applicable to mirror and replacing vdevs")); 3009219089Spjd (void) zfs_error(hdl, EZFS_BADTARGET, msg); 3010168404Spjd break; 3011168404Spjd 3012168404Spjd case EBUSY: 3013168404Spjd /* 3014168404Spjd * There are no other replicas of this device. 3015168404Spjd */ 3016168404Spjd (void) zfs_error(hdl, EZFS_NOREPLICAS, msg); 3017168404Spjd break; 3018168404Spjd 3019168404Spjd default: 3020168404Spjd (void) zpool_standard_error(hdl, errno, msg); 3021168404Spjd } 3022168404Spjd 3023168404Spjd return (-1); 3024168404Spjd} 3025168404Spjd 3026168404Spjd/* 3027219089Spjd * Find a mirror vdev in the source nvlist. 3028219089Spjd * 3029219089Spjd * The mchild array contains a list of disks in one of the top-level mirrors 3030219089Spjd * of the source pool. The schild array contains a list of disks that the 3031219089Spjd * user specified on the command line. We loop over the mchild array to 3032219089Spjd * see if any entry in the schild array matches. 3033219089Spjd * 3034219089Spjd * If a disk in the mchild array is found in the schild array, we return 3035219089Spjd * the index of that entry. Otherwise we return -1. 3036219089Spjd */ 3037219089Spjdstatic int 3038219089Spjdfind_vdev_entry(zpool_handle_t *zhp, nvlist_t **mchild, uint_t mchildren, 3039219089Spjd nvlist_t **schild, uint_t schildren) 3040219089Spjd{ 3041219089Spjd uint_t mc; 3042219089Spjd 3043219089Spjd for (mc = 0; mc < mchildren; mc++) { 3044219089Spjd uint_t sc; 3045219089Spjd char *mpath = zpool_vdev_name(zhp->zpool_hdl, zhp, 3046219089Spjd mchild[mc], B_FALSE); 3047219089Spjd 3048219089Spjd for (sc = 0; sc < schildren; sc++) { 3049219089Spjd char *spath = zpool_vdev_name(zhp->zpool_hdl, zhp, 3050219089Spjd schild[sc], B_FALSE); 3051219089Spjd boolean_t result = (strcmp(mpath, spath) == 0); 3052219089Spjd 3053219089Spjd free(spath); 3054219089Spjd if (result) { 3055219089Spjd free(mpath); 3056219089Spjd return (mc); 3057219089Spjd } 3058219089Spjd } 3059219089Spjd 3060219089Spjd free(mpath); 3061219089Spjd } 3062219089Spjd 3063219089Spjd return (-1); 3064219089Spjd} 3065219089Spjd 3066219089Spjd/* 3067219089Spjd * Split a mirror pool. If newroot points to null, then a new nvlist 3068219089Spjd * is generated and it is the responsibility of the caller to free it. 3069219089Spjd */ 3070219089Spjdint 3071219089Spjdzpool_vdev_split(zpool_handle_t *zhp, char *newname, nvlist_t **newroot, 3072219089Spjd nvlist_t *props, splitflags_t flags) 3073219089Spjd{ 3074219089Spjd zfs_cmd_t zc = { 0 }; 3075219089Spjd char msg[1024]; 3076219089Spjd nvlist_t *tree, *config, **child, **newchild, *newconfig = NULL; 3077219089Spjd nvlist_t **varray = NULL, *zc_props = NULL; 3078219089Spjd uint_t c, children, newchildren, lastlog = 0, vcount, found = 0; 3079219089Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3080219089Spjd uint64_t vers; 3081219089Spjd boolean_t freelist = B_FALSE, memory_err = B_TRUE; 3082219089Spjd int retval = 0; 3083219089Spjd 3084219089Spjd (void) snprintf(msg, sizeof (msg), 3085219089Spjd dgettext(TEXT_DOMAIN, "Unable to split %s"), zhp->zpool_name); 3086219089Spjd 3087219089Spjd if (!zpool_name_valid(hdl, B_FALSE, newname)) 3088219089Spjd return (zfs_error(hdl, EZFS_INVALIDNAME, msg)); 3089219089Spjd 3090219089Spjd if ((config = zpool_get_config(zhp, NULL)) == NULL) { 3091219089Spjd (void) fprintf(stderr, gettext("Internal error: unable to " 3092219089Spjd "retrieve pool configuration\n")); 3093219089Spjd return (-1); 3094219089Spjd } 3095219089Spjd 3096219089Spjd verify(nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, &tree) 3097219089Spjd == 0); 3098219089Spjd verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_VERSION, &vers) == 0); 3099219089Spjd 3100219089Spjd if (props) { 3101219089Spjd prop_flags_t flags = { .create = B_FALSE, .import = B_TRUE }; 3102219089Spjd if ((zc_props = zpool_valid_proplist(hdl, zhp->zpool_name, 3103219089Spjd props, vers, flags, msg)) == NULL) 3104219089Spjd return (-1); 3105219089Spjd } 3106219089Spjd 3107219089Spjd if (nvlist_lookup_nvlist_array(tree, ZPOOL_CONFIG_CHILDREN, &child, 3108219089Spjd &children) != 0) { 3109219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3110219089Spjd "Source pool is missing vdev tree")); 3111296528Smav nvlist_free(zc_props); 3112219089Spjd return (-1); 3113219089Spjd } 3114219089Spjd 3115219089Spjd varray = zfs_alloc(hdl, children * sizeof (nvlist_t *)); 3116219089Spjd vcount = 0; 3117219089Spjd 3118219089Spjd if (*newroot == NULL || 3119219089Spjd nvlist_lookup_nvlist_array(*newroot, ZPOOL_CONFIG_CHILDREN, 3120219089Spjd &newchild, &newchildren) != 0) 3121219089Spjd newchildren = 0; 3122219089Spjd 3123219089Spjd for (c = 0; c < children; c++) { 3124219089Spjd uint64_t is_log = B_FALSE, is_hole = B_FALSE; 3125219089Spjd char *type; 3126219089Spjd nvlist_t **mchild, *vdev; 3127219089Spjd uint_t mchildren; 3128219089Spjd int entry; 3129219089Spjd 3130219089Spjd /* 3131219089Spjd * Unlike cache & spares, slogs are stored in the 3132219089Spjd * ZPOOL_CONFIG_CHILDREN array. We filter them out here. 3133219089Spjd */ 3134219089Spjd (void) nvlist_lookup_uint64(child[c], ZPOOL_CONFIG_IS_LOG, 3135219089Spjd &is_log); 3136219089Spjd (void) nvlist_lookup_uint64(child[c], ZPOOL_CONFIG_IS_HOLE, 3137219089Spjd &is_hole); 3138219089Spjd if (is_log || is_hole) { 3139219089Spjd /* 3140219089Spjd * Create a hole vdev and put it in the config. 3141219089Spjd */ 3142219089Spjd if (nvlist_alloc(&vdev, NV_UNIQUE_NAME, 0) != 0) 3143219089Spjd goto out; 3144219089Spjd if (nvlist_add_string(vdev, ZPOOL_CONFIG_TYPE, 3145219089Spjd VDEV_TYPE_HOLE) != 0) 3146219089Spjd goto out; 3147219089Spjd if (nvlist_add_uint64(vdev, ZPOOL_CONFIG_IS_HOLE, 3148219089Spjd 1) != 0) 3149219089Spjd goto out; 3150219089Spjd if (lastlog == 0) 3151219089Spjd lastlog = vcount; 3152219089Spjd varray[vcount++] = vdev; 3153219089Spjd continue; 3154219089Spjd } 3155219089Spjd lastlog = 0; 3156219089Spjd verify(nvlist_lookup_string(child[c], ZPOOL_CONFIG_TYPE, &type) 3157219089Spjd == 0); 3158219089Spjd if (strcmp(type, VDEV_TYPE_MIRROR) != 0) { 3159219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3160219089Spjd "Source pool must be composed only of mirrors\n")); 3161219089Spjd retval = zfs_error(hdl, EZFS_INVALCONFIG, msg); 3162219089Spjd goto out; 3163219089Spjd } 3164219089Spjd 3165219089Spjd verify(nvlist_lookup_nvlist_array(child[c], 3166219089Spjd ZPOOL_CONFIG_CHILDREN, &mchild, &mchildren) == 0); 3167219089Spjd 3168219089Spjd /* find or add an entry for this top-level vdev */ 3169219089Spjd if (newchildren > 0 && 3170219089Spjd (entry = find_vdev_entry(zhp, mchild, mchildren, 3171219089Spjd newchild, newchildren)) >= 0) { 3172219089Spjd /* We found a disk that the user specified. */ 3173219089Spjd vdev = mchild[entry]; 3174219089Spjd ++found; 3175219089Spjd } else { 3176219089Spjd /* User didn't specify a disk for this vdev. */ 3177219089Spjd vdev = mchild[mchildren - 1]; 3178219089Spjd } 3179219089Spjd 3180219089Spjd if (nvlist_dup(vdev, &varray[vcount++], 0) != 0) 3181219089Spjd goto out; 3182219089Spjd } 3183219089Spjd 3184219089Spjd /* did we find every disk the user specified? */ 3185219089Spjd if (found != newchildren) { 3186219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "Device list must " 3187219089Spjd "include at most one disk from each mirror")); 3188219089Spjd retval = zfs_error(hdl, EZFS_INVALCONFIG, msg); 3189219089Spjd goto out; 3190219089Spjd } 3191219089Spjd 3192219089Spjd /* Prepare the nvlist for populating. */ 3193219089Spjd if (*newroot == NULL) { 3194219089Spjd if (nvlist_alloc(newroot, NV_UNIQUE_NAME, 0) != 0) 3195219089Spjd goto out; 3196219089Spjd freelist = B_TRUE; 3197219089Spjd if (nvlist_add_string(*newroot, ZPOOL_CONFIG_TYPE, 3198219089Spjd VDEV_TYPE_ROOT) != 0) 3199219089Spjd goto out; 3200219089Spjd } else { 3201219089Spjd verify(nvlist_remove_all(*newroot, ZPOOL_CONFIG_CHILDREN) == 0); 3202219089Spjd } 3203219089Spjd 3204219089Spjd /* Add all the children we found */ 3205219089Spjd if (nvlist_add_nvlist_array(*newroot, ZPOOL_CONFIG_CHILDREN, varray, 3206219089Spjd lastlog == 0 ? vcount : lastlog) != 0) 3207219089Spjd goto out; 3208219089Spjd 3209219089Spjd /* 3210219089Spjd * If we're just doing a dry run, exit now with success. 3211219089Spjd */ 3212219089Spjd if (flags.dryrun) { 3213219089Spjd memory_err = B_FALSE; 3214219089Spjd freelist = B_FALSE; 3215219089Spjd goto out; 3216219089Spjd } 3217219089Spjd 3218219089Spjd /* now build up the config list & call the ioctl */ 3219219089Spjd if (nvlist_alloc(&newconfig, NV_UNIQUE_NAME, 0) != 0) 3220219089Spjd goto out; 3221219089Spjd 3222219089Spjd if (nvlist_add_nvlist(newconfig, 3223219089Spjd ZPOOL_CONFIG_VDEV_TREE, *newroot) != 0 || 3224219089Spjd nvlist_add_string(newconfig, 3225219089Spjd ZPOOL_CONFIG_POOL_NAME, newname) != 0 || 3226219089Spjd nvlist_add_uint64(newconfig, ZPOOL_CONFIG_VERSION, vers) != 0) 3227219089Spjd goto out; 3228219089Spjd 3229219089Spjd /* 3230219089Spjd * The new pool is automatically part of the namespace unless we 3231219089Spjd * explicitly export it. 3232219089Spjd */ 3233219089Spjd if (!flags.import) 3234219089Spjd zc.zc_cookie = ZPOOL_EXPORT_AFTER_SPLIT; 3235219089Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3236219089Spjd (void) strlcpy(zc.zc_string, newname, sizeof (zc.zc_string)); 3237219089Spjd if (zcmd_write_conf_nvlist(hdl, &zc, newconfig) != 0) 3238219089Spjd goto out; 3239219089Spjd if (zc_props != NULL && zcmd_write_src_nvlist(hdl, &zc, zc_props) != 0) 3240219089Spjd goto out; 3241219089Spjd 3242219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SPLIT, &zc) != 0) { 3243219089Spjd retval = zpool_standard_error(hdl, errno, msg); 3244219089Spjd goto out; 3245219089Spjd } 3246219089Spjd 3247219089Spjd freelist = B_FALSE; 3248219089Spjd memory_err = B_FALSE; 3249219089Spjd 3250219089Spjdout: 3251219089Spjd if (varray != NULL) { 3252219089Spjd int v; 3253219089Spjd 3254219089Spjd for (v = 0; v < vcount; v++) 3255219089Spjd nvlist_free(varray[v]); 3256219089Spjd free(varray); 3257219089Spjd } 3258219089Spjd zcmd_free_nvlists(&zc); 3259296528Smav nvlist_free(zc_props); 3260296528Smav nvlist_free(newconfig); 3261219089Spjd if (freelist) { 3262219089Spjd nvlist_free(*newroot); 3263219089Spjd *newroot = NULL; 3264219089Spjd } 3265219089Spjd 3266219089Spjd if (retval != 0) 3267219089Spjd return (retval); 3268219089Spjd 3269219089Spjd if (memory_err) 3270219089Spjd return (no_memory(hdl)); 3271219089Spjd 3272219089Spjd return (0); 3273219089Spjd} 3274219089Spjd 3275219089Spjd/* 3276332525Smav * Remove the given device. 3277168404Spjd */ 3278168404Spjdint 3279168404Spjdzpool_vdev_remove(zpool_handle_t *zhp, const char *path) 3280168404Spjd{ 3281168404Spjd zfs_cmd_t zc = { 0 }; 3282168404Spjd char msg[1024]; 3283168404Spjd nvlist_t *tgt; 3284219089Spjd boolean_t avail_spare, l2cache, islog; 3285168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3286219089Spjd uint64_t version; 3287168404Spjd 3288168404Spjd (void) snprintf(msg, sizeof (msg), 3289168404Spjd dgettext(TEXT_DOMAIN, "cannot remove %s"), path); 3290168404Spjd 3291168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3292185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 3293332525Smav &islog)) == NULL) 3294168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 3295168404Spjd 3296219089Spjd version = zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL); 3297219089Spjd if (islog && version < SPA_VERSION_HOLES) { 3298219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3299332525Smav "pool must be upgraded to support log removal")); 3300219089Spjd return (zfs_error(hdl, EZFS_BADVERSION, msg)); 3301219089Spjd } 3302219089Spjd 3303332525Smav if (!islog && !avail_spare && !l2cache && zpool_is_bootable(zhp)) { 3304332525Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3305332525Smav "root pool can not have removed devices, " 3306332525Smav "because GRUB does not understand them")); 3307332525Smav return (zfs_error(hdl, EINVAL, msg)); 3308332525Smav } 3309168404Spjd 3310332525Smav zc.zc_guid = fnvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID); 3311332525Smav 3312185029Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_REMOVE, &zc) == 0) 3313168404Spjd return (0); 3314168404Spjd 3315332525Smav switch (errno) { 3316332525Smav 3317332525Smav case EINVAL: 3318332525Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3319332525Smav "invalid config; all top-level vdevs must " 3320332525Smav "have the same sector size and not be raidz.")); 3321332525Smav (void) zfs_error(hdl, EZFS_INVALCONFIG, msg); 3322332525Smav break; 3323332525Smav 3324332525Smav case EBUSY: 3325332525Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3326332525Smav "Pool busy; removal may already be in progress")); 3327332525Smav (void) zfs_error(hdl, EZFS_BUSY, msg); 3328332525Smav break; 3329332525Smav 3330332525Smav default: 3331332525Smav (void) zpool_standard_error(hdl, errno, msg); 3332332525Smav } 3333332525Smav return (-1); 3334332525Smav} 3335332525Smav 3336332525Smavint 3337332525Smavzpool_vdev_remove_cancel(zpool_handle_t *zhp) 3338332525Smav{ 3339332525Smav zfs_cmd_t zc = { 0 }; 3340332525Smav char msg[1024]; 3341332525Smav libzfs_handle_t *hdl = zhp->zpool_hdl; 3342332525Smav 3343332525Smav (void) snprintf(msg, sizeof (msg), 3344332525Smav dgettext(TEXT_DOMAIN, "cannot cancel removal")); 3345332525Smav 3346332525Smav (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3347332525Smav zc.zc_cookie = 1; 3348332525Smav 3349332525Smav if (zfs_ioctl(hdl, ZFS_IOC_VDEV_REMOVE, &zc) == 0) 3350332525Smav return (0); 3351332525Smav 3352168404Spjd return (zpool_standard_error(hdl, errno, msg)); 3353168404Spjd} 3354168404Spjd 3355332525Smavint 3356332525Smavzpool_vdev_indirect_size(zpool_handle_t *zhp, const char *path, 3357332525Smav uint64_t *sizep) 3358332525Smav{ 3359332525Smav char msg[1024]; 3360332525Smav nvlist_t *tgt; 3361332525Smav boolean_t avail_spare, l2cache, islog; 3362332525Smav libzfs_handle_t *hdl = zhp->zpool_hdl; 3363332525Smav 3364332525Smav (void) snprintf(msg, sizeof (msg), 3365332525Smav dgettext(TEXT_DOMAIN, "cannot determine indirect size of %s"), 3366332525Smav path); 3367332525Smav 3368332525Smav if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 3369332525Smav &islog)) == NULL) 3370332525Smav return (zfs_error(hdl, EZFS_NODEVICE, msg)); 3371332525Smav 3372332525Smav if (avail_spare || l2cache || islog) { 3373332525Smav *sizep = 0; 3374332525Smav return (0); 3375332525Smav } 3376332525Smav 3377332525Smav if (nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_INDIRECT_SIZE, sizep) != 0) { 3378332525Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3379332525Smav "indirect size not available")); 3380332525Smav return (zfs_error(hdl, EINVAL, msg)); 3381332525Smav } 3382332525Smav return (0); 3383332525Smav} 3384332525Smav 3385168404Spjd/* 3386168404Spjd * Clear the errors for the pool, or the particular device if specified. 3387168404Spjd */ 3388168404Spjdint 3389219089Spjdzpool_clear(zpool_handle_t *zhp, const char *path, nvlist_t *rewindnvl) 3390168404Spjd{ 3391168404Spjd zfs_cmd_t zc = { 0 }; 3392168404Spjd char msg[1024]; 3393168404Spjd nvlist_t *tgt; 3394332550Smav zpool_load_policy_t policy; 3395185029Spjd boolean_t avail_spare, l2cache; 3396168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3397219089Spjd nvlist_t *nvi = NULL; 3398219089Spjd int error; 3399168404Spjd 3400168404Spjd if (path) 3401168404Spjd (void) snprintf(msg, sizeof (msg), 3402168404Spjd dgettext(TEXT_DOMAIN, "cannot clear errors for %s"), 3403168404Spjd path); 3404168404Spjd else 3405168404Spjd (void) snprintf(msg, sizeof (msg), 3406168404Spjd dgettext(TEXT_DOMAIN, "cannot clear errors for %s"), 3407168404Spjd zhp->zpool_name); 3408168404Spjd 3409168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3410168404Spjd if (path) { 3411185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, 3412332525Smav &l2cache, NULL)) == NULL) 3413168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 3414168404Spjd 3415185029Spjd /* 3416185029Spjd * Don't allow error clearing for hot spares. Do allow 3417185029Spjd * error clearing for l2cache devices. 3418185029Spjd */ 3419168404Spjd if (avail_spare) 3420168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 3421168404Spjd 3422168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, 3423168404Spjd &zc.zc_guid) == 0); 3424168404Spjd } 3425168404Spjd 3426332550Smav zpool_get_load_policy(rewindnvl, &policy); 3427332550Smav zc.zc_cookie = policy.zlp_rewind; 3428219089Spjd 3429219089Spjd if (zcmd_alloc_dst_nvlist(hdl, &zc, zhp->zpool_config_size * 2) != 0) 3430219089Spjd return (-1); 3431219089Spjd 3432219089Spjd if (zcmd_write_src_nvlist(hdl, &zc, rewindnvl) != 0) 3433219089Spjd return (-1); 3434219089Spjd 3435219089Spjd while ((error = zfs_ioctl(hdl, ZFS_IOC_CLEAR, &zc)) != 0 && 3436219089Spjd errno == ENOMEM) { 3437219089Spjd if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) { 3438219089Spjd zcmd_free_nvlists(&zc); 3439219089Spjd return (-1); 3440219089Spjd } 3441219089Spjd } 3442219089Spjd 3443332550Smav if (!error || ((policy.zlp_rewind & ZPOOL_TRY_REWIND) && 3444219089Spjd errno != EPERM && errno != EACCES)) { 3445332550Smav if (policy.zlp_rewind & 3446219089Spjd (ZPOOL_DO_REWIND | ZPOOL_TRY_REWIND)) { 3447219089Spjd (void) zcmd_read_dst_nvlist(hdl, &zc, &nvi); 3448219089Spjd zpool_rewind_exclaim(hdl, zc.zc_name, 3449332550Smav ((policy.zlp_rewind & ZPOOL_TRY_REWIND) != 0), 3450219089Spjd nvi); 3451219089Spjd nvlist_free(nvi); 3452219089Spjd } 3453219089Spjd zcmd_free_nvlists(&zc); 3454185029Spjd return (0); 3455219089Spjd } 3456185029Spjd 3457219089Spjd zcmd_free_nvlists(&zc); 3458185029Spjd return (zpool_standard_error(hdl, errno, msg)); 3459185029Spjd} 3460185029Spjd 3461185029Spjd/* 3462185029Spjd * Similar to zpool_clear(), but takes a GUID (used by fmd). 3463185029Spjd */ 3464185029Spjdint 3465185029Spjdzpool_vdev_clear(zpool_handle_t *zhp, uint64_t guid) 3466185029Spjd{ 3467185029Spjd zfs_cmd_t zc = { 0 }; 3468185029Spjd char msg[1024]; 3469185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3470185029Spjd 3471185029Spjd (void) snprintf(msg, sizeof (msg), 3472185029Spjd dgettext(TEXT_DOMAIN, "cannot clear errors for %llx"), 3473185029Spjd guid); 3474185029Spjd 3475185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3476185029Spjd zc.zc_guid = guid; 3477219089Spjd zc.zc_cookie = ZPOOL_NO_REWIND; 3478185029Spjd 3479168404Spjd if (ioctl(hdl->libzfs_fd, ZFS_IOC_CLEAR, &zc) == 0) 3480168404Spjd return (0); 3481168404Spjd 3482168404Spjd return (zpool_standard_error(hdl, errno, msg)); 3483168404Spjd} 3484168404Spjd 3485168404Spjd/* 3486228103Smm * Change the GUID for a pool. 3487228103Smm */ 3488228103Smmint 3489228103Smmzpool_reguid(zpool_handle_t *zhp) 3490228103Smm{ 3491228103Smm char msg[1024]; 3492228103Smm libzfs_handle_t *hdl = zhp->zpool_hdl; 3493228103Smm zfs_cmd_t zc = { 0 }; 3494228103Smm 3495228103Smm (void) snprintf(msg, sizeof (msg), 3496228103Smm dgettext(TEXT_DOMAIN, "cannot reguid '%s'"), zhp->zpool_name); 3497228103Smm 3498228103Smm (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3499228103Smm if (zfs_ioctl(hdl, ZFS_IOC_POOL_REGUID, &zc) == 0) 3500228103Smm return (0); 3501228103Smm 3502228103Smm return (zpool_standard_error(hdl, errno, msg)); 3503228103Smm} 3504228103Smm 3505228103Smm/* 3506236155Smm * Reopen the pool. 3507236155Smm */ 3508236155Smmint 3509236155Smmzpool_reopen(zpool_handle_t *zhp) 3510236155Smm{ 3511236155Smm zfs_cmd_t zc = { 0 }; 3512236155Smm char msg[1024]; 3513236155Smm libzfs_handle_t *hdl = zhp->zpool_hdl; 3514236155Smm 3515236155Smm (void) snprintf(msg, sizeof (msg), 3516236155Smm dgettext(TEXT_DOMAIN, "cannot reopen '%s'"), 3517236155Smm zhp->zpool_name); 3518236155Smm 3519236155Smm (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3520236155Smm if (zfs_ioctl(hdl, ZFS_IOC_POOL_REOPEN, &zc) == 0) 3521236155Smm return (0); 3522236155Smm return (zpool_standard_error(hdl, errno, msg)); 3523236155Smm} 3524236155Smm 3525236155Smm/* 3526168404Spjd * Convert from a devid string to a path. 3527168404Spjd */ 3528168404Spjdstatic char * 3529168404Spjddevid_to_path(char *devid_str) 3530168404Spjd{ 3531168404Spjd ddi_devid_t devid; 3532168404Spjd char *minor; 3533168404Spjd char *path; 3534168404Spjd devid_nmlist_t *list = NULL; 3535168404Spjd int ret; 3536168404Spjd 3537168404Spjd if (devid_str_decode(devid_str, &devid, &minor) != 0) 3538168404Spjd return (NULL); 3539168404Spjd 3540168404Spjd ret = devid_deviceid_to_nmlist("/dev", devid, minor, &list); 3541168404Spjd 3542168404Spjd devid_str_free(minor); 3543168404Spjd devid_free(devid); 3544168404Spjd 3545168404Spjd if (ret != 0) 3546168404Spjd return (NULL); 3547168404Spjd 3548277433Sdelphij /* 3549277433Sdelphij * In a case the strdup() fails, we will just return NULL below. 3550277433Sdelphij */ 3551277433Sdelphij path = strdup(list[0].devname); 3552168404Spjd 3553168404Spjd devid_free_nmlist(list); 3554168404Spjd 3555168404Spjd return (path); 3556168404Spjd} 3557168404Spjd 3558168404Spjd/* 3559168404Spjd * Convert from a path to a devid string. 3560168404Spjd */ 3561168404Spjdstatic char * 3562168404Spjdpath_to_devid(const char *path) 3563168404Spjd{ 3564265821Smav#ifdef have_devid 3565168404Spjd int fd; 3566168404Spjd ddi_devid_t devid; 3567168404Spjd char *minor, *ret; 3568168404Spjd 3569168404Spjd if ((fd = open(path, O_RDONLY)) < 0) 3570168404Spjd return (NULL); 3571168404Spjd 3572168404Spjd minor = NULL; 3573168404Spjd ret = NULL; 3574168404Spjd if (devid_get(fd, &devid) == 0) { 3575168404Spjd if (devid_get_minor_name(fd, &minor) == 0) 3576168404Spjd ret = devid_str_encode(devid, minor); 3577168404Spjd if (minor != NULL) 3578168404Spjd devid_str_free(minor); 3579168404Spjd devid_free(devid); 3580168404Spjd } 3581168404Spjd (void) close(fd); 3582168404Spjd 3583168404Spjd return (ret); 3584265821Smav#else 3585265821Smav return (NULL); 3586265821Smav#endif 3587168404Spjd} 3588168404Spjd 3589168404Spjd/* 3590168404Spjd * Issue the necessary ioctl() to update the stored path value for the vdev. We 3591168404Spjd * ignore any failure here, since a common case is for an unprivileged user to 3592168404Spjd * type 'zpool status', and we'll display the correct information anyway. 3593168404Spjd */ 3594168404Spjdstatic void 3595168404Spjdset_path(zpool_handle_t *zhp, nvlist_t *nv, const char *path) 3596168404Spjd{ 3597168404Spjd zfs_cmd_t zc = { 0 }; 3598168404Spjd 3599168404Spjd (void) strncpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3600168404Spjd (void) strncpy(zc.zc_value, path, sizeof (zc.zc_value)); 3601168404Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, 3602168404Spjd &zc.zc_guid) == 0); 3603168404Spjd 3604168404Spjd (void) ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_VDEV_SETPATH, &zc); 3605168404Spjd} 3606168404Spjd 3607168404Spjd/* 3608168404Spjd * Given a vdev, return the name to display in iostat. If the vdev has a path, 3609168404Spjd * we use that, stripping off any leading "/dev/dsk/"; if not, we use the type. 3610168404Spjd * We also check if this is a whole disk, in which case we strip off the 3611168404Spjd * trailing 's0' slice name. 3612168404Spjd * 3613168404Spjd * This routine is also responsible for identifying when disks have been 3614168404Spjd * reconfigured in a new location. The kernel will have opened the device by 3615168404Spjd * devid, but the path will still refer to the old location. To catch this, we 3616168404Spjd * first do a path -> devid translation (which is fast for the common case). If 3617168404Spjd * the devid matches, we're done. If not, we do a reverse devid -> path 3618168404Spjd * translation and issue the appropriate ioctl() to update the path of the vdev. 3619168404Spjd * If 'zhp' is NULL, then this is an exported pool, and we don't need to do any 3620168404Spjd * of these checks. 3621168404Spjd */ 3622168404Spjdchar * 3623219089Spjdzpool_vdev_name(libzfs_handle_t *hdl, zpool_handle_t *zhp, nvlist_t *nv, 3624219089Spjd boolean_t verbose) 3625168404Spjd{ 3626168404Spjd char *path, *devid; 3627168404Spjd uint64_t value; 3628168404Spjd char buf[64]; 3629185029Spjd vdev_stat_t *vs; 3630185029Spjd uint_t vsc; 3631224170Sgibbs int have_stats; 3632224170Sgibbs int have_path; 3633168404Spjd 3634224170Sgibbs have_stats = nvlist_lookup_uint64_array(nv, ZPOOL_CONFIG_VDEV_STATS, 3635224170Sgibbs (uint64_t **)&vs, &vsc) == 0; 3636224170Sgibbs have_path = nvlist_lookup_string(nv, ZPOOL_CONFIG_PATH, &path) == 0; 3637224170Sgibbs 3638224170Sgibbs /* 3639224170Sgibbs * If the device is not currently present, assume it will not 3640224170Sgibbs * come back at the same device path. Display the device by GUID. 3641224170Sgibbs */ 3642224170Sgibbs if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_NOT_PRESENT, &value) == 0 || 3643224170Sgibbs have_path && have_stats && vs->vs_state <= VDEV_STATE_CANT_OPEN) { 3644168404Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, 3645168404Spjd &value) == 0); 3646168404Spjd (void) snprintf(buf, sizeof (buf), "%llu", 3647168404Spjd (u_longlong_t)value); 3648168404Spjd path = buf; 3649224170Sgibbs } else if (have_path) { 3650168404Spjd 3651185029Spjd /* 3652185029Spjd * If the device is dead (faulted, offline, etc) then don't 3653185029Spjd * bother opening it. Otherwise we may be forcing the user to 3654185029Spjd * open a misbehaving device, which can have undesirable 3655185029Spjd * effects. 3656185029Spjd */ 3657224170Sgibbs if ((have_stats == 0 || 3658185029Spjd vs->vs_state >= VDEV_STATE_DEGRADED) && 3659185029Spjd zhp != NULL && 3660168404Spjd nvlist_lookup_string(nv, ZPOOL_CONFIG_DEVID, &devid) == 0) { 3661168404Spjd /* 3662168404Spjd * Determine if the current path is correct. 3663168404Spjd */ 3664168404Spjd char *newdevid = path_to_devid(path); 3665168404Spjd 3666168404Spjd if (newdevid == NULL || 3667168404Spjd strcmp(devid, newdevid) != 0) { 3668168404Spjd char *newpath; 3669168404Spjd 3670168404Spjd if ((newpath = devid_to_path(devid)) != NULL) { 3671168404Spjd /* 3672168404Spjd * Update the path appropriately. 3673168404Spjd */ 3674168404Spjd set_path(zhp, nv, newpath); 3675168404Spjd if (nvlist_add_string(nv, 3676168404Spjd ZPOOL_CONFIG_PATH, newpath) == 0) 3677168404Spjd verify(nvlist_lookup_string(nv, 3678168404Spjd ZPOOL_CONFIG_PATH, 3679168404Spjd &path) == 0); 3680168404Spjd free(newpath); 3681168404Spjd } 3682168404Spjd } 3683168404Spjd 3684168404Spjd if (newdevid) 3685168404Spjd devid_str_free(newdevid); 3686168404Spjd } 3687168404Spjd 3688277300Ssmh#ifdef illumos 3689297763Smav if (strncmp(path, ZFS_DISK_ROOTD, strlen(ZFS_DISK_ROOTD)) == 0) 3690297763Smav path += strlen(ZFS_DISK_ROOTD); 3691168404Spjd 3692168404Spjd if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_WHOLE_DISK, 3693168404Spjd &value) == 0 && value) { 3694219089Spjd int pathlen = strlen(path); 3695168404Spjd char *tmp = zfs_strdup(hdl, path); 3696219089Spjd 3697219089Spjd /* 3698331395Smav * If it starts with c#, and ends with "s0" or "s1", 3699331395Smav * chop the slice off, or if it ends with "s0/old" or 3700331395Smav * "s1/old", remove the slice from the middle. 3701219089Spjd */ 3702219089Spjd if (CTD_CHECK(tmp)) { 3703331395Smav if (strcmp(&tmp[pathlen - 2], "s0") == 0 || 3704331395Smav strcmp(&tmp[pathlen - 2], "s1") == 0) { 3705219089Spjd tmp[pathlen - 2] = '\0'; 3706219089Spjd } else if (pathlen > 6 && 3707331395Smav (strcmp(&tmp[pathlen - 6], "s0/old") == 0 || 3708331395Smav strcmp(&tmp[pathlen - 6], "s1/old") == 0)) { 3709219089Spjd (void) strcpy(&tmp[pathlen - 6], 3710219089Spjd "/old"); 3711219089Spjd } 3712219089Spjd } 3713168404Spjd return (tmp); 3714168404Spjd } 3715277300Ssmh#else /* !illumos */ 3716219089Spjd if (strncmp(path, _PATH_DEV, sizeof(_PATH_DEV) - 1) == 0) 3717219089Spjd path += sizeof(_PATH_DEV) - 1; 3718277300Ssmh#endif /* illumos */ 3719168404Spjd } else { 3720168404Spjd verify(nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE, &path) == 0); 3721168404Spjd 3722168404Spjd /* 3723168404Spjd * If it's a raidz device, we need to stick in the parity level. 3724168404Spjd */ 3725168404Spjd if (strcmp(path, VDEV_TYPE_RAIDZ) == 0) { 3726168404Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_NPARITY, 3727168404Spjd &value) == 0); 3728168404Spjd (void) snprintf(buf, sizeof (buf), "%s%llu", path, 3729168404Spjd (u_longlong_t)value); 3730168404Spjd path = buf; 3731168404Spjd } 3732219089Spjd 3733219089Spjd /* 3734219089Spjd * We identify each top-level vdev by using a <type-id> 3735219089Spjd * naming convention. 3736219089Spjd */ 3737219089Spjd if (verbose) { 3738219089Spjd uint64_t id; 3739219089Spjd 3740219089Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_ID, 3741219089Spjd &id) == 0); 3742219089Spjd (void) snprintf(buf, sizeof (buf), "%s-%llu", path, 3743219089Spjd (u_longlong_t)id); 3744219089Spjd path = buf; 3745219089Spjd } 3746168404Spjd } 3747168404Spjd 3748168404Spjd return (zfs_strdup(hdl, path)); 3749168404Spjd} 3750168404Spjd 3751168404Spjdstatic int 3752286705Smavzbookmark_mem_compare(const void *a, const void *b) 3753168404Spjd{ 3754268123Sdelphij return (memcmp(a, b, sizeof (zbookmark_phys_t))); 3755168404Spjd} 3756168404Spjd 3757168404Spjd/* 3758168404Spjd * Retrieve the persistent error log, uniquify the members, and return to the 3759168404Spjd * caller. 3760168404Spjd */ 3761168404Spjdint 3762168404Spjdzpool_get_errlog(zpool_handle_t *zhp, nvlist_t **nverrlistp) 3763168404Spjd{ 3764168404Spjd zfs_cmd_t zc = { 0 }; 3765168404Spjd uint64_t count; 3766268123Sdelphij zbookmark_phys_t *zb = NULL; 3767168404Spjd int i; 3768168404Spjd 3769168404Spjd /* 3770168404Spjd * Retrieve the raw error list from the kernel. If the number of errors 3771168404Spjd * has increased, allocate more space and continue until we get the 3772168404Spjd * entire list. 3773168404Spjd */ 3774168404Spjd verify(nvlist_lookup_uint64(zhp->zpool_config, ZPOOL_CONFIG_ERRCOUNT, 3775168404Spjd &count) == 0); 3776185029Spjd if (count == 0) 3777185029Spjd return (0); 3778168404Spjd if ((zc.zc_nvlist_dst = (uintptr_t)zfs_alloc(zhp->zpool_hdl, 3779268123Sdelphij count * sizeof (zbookmark_phys_t))) == (uintptr_t)NULL) 3780168404Spjd return (-1); 3781168404Spjd zc.zc_nvlist_dst_size = count; 3782168404Spjd (void) strcpy(zc.zc_name, zhp->zpool_name); 3783168404Spjd for (;;) { 3784168404Spjd if (ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_ERROR_LOG, 3785168404Spjd &zc) != 0) { 3786168404Spjd free((void *)(uintptr_t)zc.zc_nvlist_dst); 3787168404Spjd if (errno == ENOMEM) { 3788268123Sdelphij void *dst; 3789268123Sdelphij 3790168404Spjd count = zc.zc_nvlist_dst_size; 3791268123Sdelphij dst = zfs_alloc(zhp->zpool_hdl, count * 3792268123Sdelphij sizeof (zbookmark_phys_t)); 3793268123Sdelphij if (dst == NULL) 3794168404Spjd return (-1); 3795268123Sdelphij zc.zc_nvlist_dst = (uintptr_t)dst; 3796168404Spjd } else { 3797168404Spjd return (-1); 3798168404Spjd } 3799168404Spjd } else { 3800168404Spjd break; 3801168404Spjd } 3802168404Spjd } 3803168404Spjd 3804168404Spjd /* 3805168404Spjd * Sort the resulting bookmarks. This is a little confusing due to the 3806168404Spjd * implementation of ZFS_IOC_ERROR_LOG. The bookmarks are copied last 3807168404Spjd * to first, and 'zc_nvlist_dst_size' indicates the number of boomarks 3808168404Spjd * _not_ copied as part of the process. So we point the start of our 3809168404Spjd * array appropriate and decrement the total number of elements. 3810168404Spjd */ 3811268123Sdelphij zb = ((zbookmark_phys_t *)(uintptr_t)zc.zc_nvlist_dst) + 3812168404Spjd zc.zc_nvlist_dst_size; 3813168404Spjd count -= zc.zc_nvlist_dst_size; 3814168404Spjd 3815286705Smav qsort(zb, count, sizeof (zbookmark_phys_t), zbookmark_mem_compare); 3816168404Spjd 3817168404Spjd verify(nvlist_alloc(nverrlistp, 0, KM_SLEEP) == 0); 3818168404Spjd 3819168404Spjd /* 3820168404Spjd * Fill in the nverrlistp with nvlist's of dataset and object numbers. 3821168404Spjd */ 3822168404Spjd for (i = 0; i < count; i++) { 3823168404Spjd nvlist_t *nv; 3824168404Spjd 3825168404Spjd /* ignoring zb_blkid and zb_level for now */ 3826168404Spjd if (i > 0 && zb[i-1].zb_objset == zb[i].zb_objset && 3827168404Spjd zb[i-1].zb_object == zb[i].zb_object) 3828168404Spjd continue; 3829168404Spjd 3830168404Spjd if (nvlist_alloc(&nv, NV_UNIQUE_NAME, KM_SLEEP) != 0) 3831168404Spjd goto nomem; 3832168404Spjd if (nvlist_add_uint64(nv, ZPOOL_ERR_DATASET, 3833168404Spjd zb[i].zb_objset) != 0) { 3834168404Spjd nvlist_free(nv); 3835168404Spjd goto nomem; 3836168404Spjd } 3837168404Spjd if (nvlist_add_uint64(nv, ZPOOL_ERR_OBJECT, 3838168404Spjd zb[i].zb_object) != 0) { 3839168404Spjd nvlist_free(nv); 3840168404Spjd goto nomem; 3841168404Spjd } 3842168404Spjd if (nvlist_add_nvlist(*nverrlistp, "ejk", nv) != 0) { 3843168404Spjd nvlist_free(nv); 3844168404Spjd goto nomem; 3845168404Spjd } 3846168404Spjd nvlist_free(nv); 3847168404Spjd } 3848168404Spjd 3849168404Spjd free((void *)(uintptr_t)zc.zc_nvlist_dst); 3850168404Spjd return (0); 3851168404Spjd 3852168404Spjdnomem: 3853168404Spjd free((void *)(uintptr_t)zc.zc_nvlist_dst); 3854168404Spjd return (no_memory(zhp->zpool_hdl)); 3855168404Spjd} 3856168404Spjd 3857168404Spjd/* 3858168404Spjd * Upgrade a ZFS pool to the latest on-disk version. 3859168404Spjd */ 3860168404Spjdint 3861185029Spjdzpool_upgrade(zpool_handle_t *zhp, uint64_t new_version) 3862168404Spjd{ 3863168404Spjd zfs_cmd_t zc = { 0 }; 3864168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3865168404Spjd 3866168404Spjd (void) strcpy(zc.zc_name, zhp->zpool_name); 3867185029Spjd zc.zc_cookie = new_version; 3868185029Spjd 3869185029Spjd if (zfs_ioctl(hdl, ZFS_IOC_POOL_UPGRADE, &zc) != 0) 3870168404Spjd return (zpool_standard_error_fmt(hdl, errno, 3871168404Spjd dgettext(TEXT_DOMAIN, "cannot upgrade '%s'"), 3872168404Spjd zhp->zpool_name)); 3873168404Spjd return (0); 3874168404Spjd} 3875168404Spjd 3876168404Spjdvoid 3877248571Smmzfs_save_arguments(int argc, char **argv, char *string, int len) 3878168404Spjd{ 3879248571Smm (void) strlcpy(string, basename(argv[0]), len); 3880248571Smm for (int i = 1; i < argc; i++) { 3881248571Smm (void) strlcat(string, " ", len); 3882248571Smm (void) strlcat(string, argv[i], len); 3883168404Spjd } 3884185029Spjd} 3885168404Spjd 3886185029Spjdint 3887248571Smmzpool_log_history(libzfs_handle_t *hdl, const char *message) 3888185029Spjd{ 3889248571Smm zfs_cmd_t zc = { 0 }; 3890248571Smm nvlist_t *args; 3891248571Smm int err; 3892168404Spjd 3893248571Smm args = fnvlist_alloc(); 3894248571Smm fnvlist_add_string(args, "message", message); 3895248571Smm err = zcmd_write_src_nvlist(hdl, &zc, args); 3896248571Smm if (err == 0) 3897248571Smm err = ioctl(hdl->libzfs_fd, ZFS_IOC_LOG_HISTORY, &zc); 3898248571Smm nvlist_free(args); 3899248571Smm zcmd_free_nvlists(&zc); 3900248571Smm return (err); 3901168404Spjd} 3902168404Spjd 3903168404Spjd/* 3904168404Spjd * Perform ioctl to get some command history of a pool. 3905168404Spjd * 3906168404Spjd * 'buf' is the buffer to fill up to 'len' bytes. 'off' is the 3907168404Spjd * logical offset of the history buffer to start reading from. 3908168404Spjd * 3909168404Spjd * Upon return, 'off' is the next logical offset to read from and 3910168404Spjd * 'len' is the actual amount of bytes read into 'buf'. 3911168404Spjd */ 3912168404Spjdstatic int 3913168404Spjdget_history(zpool_handle_t *zhp, char *buf, uint64_t *off, uint64_t *len) 3914168404Spjd{ 3915168404Spjd zfs_cmd_t zc = { 0 }; 3916168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3917168404Spjd 3918168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3919168404Spjd 3920168404Spjd zc.zc_history = (uint64_t)(uintptr_t)buf; 3921168404Spjd zc.zc_history_len = *len; 3922168404Spjd zc.zc_history_offset = *off; 3923168404Spjd 3924168404Spjd if (ioctl(hdl->libzfs_fd, ZFS_IOC_POOL_GET_HISTORY, &zc) != 0) { 3925168404Spjd switch (errno) { 3926168404Spjd case EPERM: 3927168404Spjd return (zfs_error_fmt(hdl, EZFS_PERM, 3928168404Spjd dgettext(TEXT_DOMAIN, 3929168404Spjd "cannot show history for pool '%s'"), 3930168404Spjd zhp->zpool_name)); 3931168404Spjd case ENOENT: 3932168404Spjd return (zfs_error_fmt(hdl, EZFS_NOHISTORY, 3933168404Spjd dgettext(TEXT_DOMAIN, "cannot get history for pool " 3934168404Spjd "'%s'"), zhp->zpool_name)); 3935168404Spjd case ENOTSUP: 3936168404Spjd return (zfs_error_fmt(hdl, EZFS_BADVERSION, 3937168404Spjd dgettext(TEXT_DOMAIN, "cannot get history for pool " 3938168404Spjd "'%s', pool must be upgraded"), zhp->zpool_name)); 3939168404Spjd default: 3940168404Spjd return (zpool_standard_error_fmt(hdl, errno, 3941168404Spjd dgettext(TEXT_DOMAIN, 3942168404Spjd "cannot get history for '%s'"), zhp->zpool_name)); 3943168404Spjd } 3944168404Spjd } 3945168404Spjd 3946168404Spjd *len = zc.zc_history_len; 3947168404Spjd *off = zc.zc_history_offset; 3948168404Spjd 3949168404Spjd return (0); 3950168404Spjd} 3951168404Spjd 3952168404Spjd/* 3953168404Spjd * Process the buffer of nvlists, unpacking and storing each nvlist record 3954168404Spjd * into 'records'. 'leftover' is set to the number of bytes that weren't 3955168404Spjd * processed as there wasn't a complete record. 3956168404Spjd */ 3957219089Spjdint 3958168404Spjdzpool_history_unpack(char *buf, uint64_t bytes_read, uint64_t *leftover, 3959168404Spjd nvlist_t ***records, uint_t *numrecords) 3960168404Spjd{ 3961168404Spjd uint64_t reclen; 3962168404Spjd nvlist_t *nv; 3963168404Spjd int i; 3964168404Spjd 3965168404Spjd while (bytes_read > sizeof (reclen)) { 3966168404Spjd 3967168404Spjd /* get length of packed record (stored as little endian) */ 3968168404Spjd for (i = 0, reclen = 0; i < sizeof (reclen); i++) 3969168404Spjd reclen += (uint64_t)(((uchar_t *)buf)[i]) << (8*i); 3970168404Spjd 3971168404Spjd if (bytes_read < sizeof (reclen) + reclen) 3972168404Spjd break; 3973168404Spjd 3974168404Spjd /* unpack record */ 3975168404Spjd if (nvlist_unpack(buf + sizeof (reclen), reclen, &nv, 0) != 0) 3976168404Spjd return (ENOMEM); 3977168404Spjd bytes_read -= sizeof (reclen) + reclen; 3978168404Spjd buf += sizeof (reclen) + reclen; 3979168404Spjd 3980168404Spjd /* add record to nvlist array */ 3981168404Spjd (*numrecords)++; 3982168404Spjd if (ISP2(*numrecords + 1)) { 3983168404Spjd *records = realloc(*records, 3984168404Spjd *numrecords * 2 * sizeof (nvlist_t *)); 3985168404Spjd } 3986168404Spjd (*records)[*numrecords - 1] = nv; 3987168404Spjd } 3988168404Spjd 3989168404Spjd *leftover = bytes_read; 3990168404Spjd return (0); 3991168404Spjd} 3992168404Spjd 3993264467Sdelphij/* from spa_history.c: spa_history_create_obj() */ 3994264467Sdelphij#define HIS_BUF_LEN_DEF (128 << 10) 3995264467Sdelphij#define HIS_BUF_LEN_MAX (1 << 30) 3996168404Spjd 3997168404Spjd/* 3998168404Spjd * Retrieve the command history of a pool. 3999168404Spjd */ 4000168404Spjdint 4001363954Smarkjzpool_get_history(zpool_handle_t *zhp, nvlist_t **nvhisp, uint64_t *off, 4002363954Smarkj boolean_t *eof) 4003168404Spjd{ 4004289528Smav char *buf; 4005289528Smav uint64_t buflen = HIS_BUF_LEN_DEF; 4006168404Spjd nvlist_t **records = NULL; 4007168404Spjd uint_t numrecords = 0; 4008168404Spjd int err, i; 4009363954Smarkj uint64_t start = *off; 4010168404Spjd 4011289528Smav buf = malloc(buflen); 4012289528Smav if (buf == NULL) 4013264467Sdelphij return (ENOMEM); 4014363954Smarkj /* process about 1MB at a time */ 4015363954Smarkj while (*off - start < 1024 * 1024) { 4016289528Smav uint64_t bytes_read = buflen; 4017168404Spjd uint64_t leftover; 4018168404Spjd 4019363954Smarkj if ((err = get_history(zhp, buf, off, &bytes_read)) != 0) 4020168404Spjd break; 4021168404Spjd 4022168404Spjd /* if nothing else was read in, we're at EOF, just return */ 4023363954Smarkj if (bytes_read == 0) { 4024363954Smarkj *eof = B_TRUE; 4025168404Spjd break; 4026363954Smarkj } 4027168404Spjd 4028168404Spjd if ((err = zpool_history_unpack(buf, bytes_read, 4029168404Spjd &leftover, &records, &numrecords)) != 0) 4030168404Spjd break; 4031363954Smarkj *off -= leftover; 4032264467Sdelphij if (leftover == bytes_read) { 4033289528Smav /* 4034289528Smav * no progress made, because buffer is not big enough 4035289528Smav * to hold this record; resize and retry. 4036289528Smav */ 4037289528Smav buflen *= 2; 4038264467Sdelphij free(buf); 4039264467Sdelphij buf = NULL; 4040289528Smav if ((buflen >= HIS_BUF_LEN_MAX) || 4041289528Smav ((buf = malloc(buflen)) == NULL)) { 4042264467Sdelphij err = ENOMEM; 4043264467Sdelphij break; 4044264467Sdelphij } 4045264467Sdelphij } 4046363954Smarkj } 4047264467Sdelphij 4048264467Sdelphij free(buf); 4049168404Spjd 4050168404Spjd if (!err) { 4051168404Spjd verify(nvlist_alloc(nvhisp, NV_UNIQUE_NAME, 0) == 0); 4052168404Spjd verify(nvlist_add_nvlist_array(*nvhisp, ZPOOL_HIST_RECORD, 4053168404Spjd records, numrecords) == 0); 4054168404Spjd } 4055168404Spjd for (i = 0; i < numrecords; i++) 4056168404Spjd nvlist_free(records[i]); 4057168404Spjd free(records); 4058168404Spjd 4059168404Spjd return (err); 4060168404Spjd} 4061168404Spjd 4062168404Spjdvoid 4063168404Spjdzpool_obj_to_path(zpool_handle_t *zhp, uint64_t dsobj, uint64_t obj, 4064168404Spjd char *pathname, size_t len) 4065168404Spjd{ 4066168404Spjd zfs_cmd_t zc = { 0 }; 4067168404Spjd boolean_t mounted = B_FALSE; 4068168404Spjd char *mntpnt = NULL; 4069307108Smav char dsname[ZFS_MAX_DATASET_NAME_LEN]; 4070168404Spjd 4071168404Spjd if (dsobj == 0) { 4072168404Spjd /* special case for the MOS */ 4073168404Spjd (void) snprintf(pathname, len, "<metadata>:<0x%llx>", obj); 4074168404Spjd return; 4075168404Spjd } 4076168404Spjd 4077168404Spjd /* get the dataset's name */ 4078168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 4079168404Spjd zc.zc_obj = dsobj; 4080168404Spjd if (ioctl(zhp->zpool_hdl->libzfs_fd, 4081168404Spjd ZFS_IOC_DSOBJ_TO_DSNAME, &zc) != 0) { 4082168404Spjd /* just write out a path of two object numbers */ 4083168404Spjd (void) snprintf(pathname, len, "<0x%llx>:<0x%llx>", 4084168404Spjd dsobj, obj); 4085168404Spjd return; 4086168404Spjd } 4087168404Spjd (void) strlcpy(dsname, zc.zc_value, sizeof (dsname)); 4088168404Spjd 4089168404Spjd /* find out if the dataset is mounted */ 4090168404Spjd mounted = is_mounted(zhp->zpool_hdl, dsname, &mntpnt); 4091168404Spjd 4092168404Spjd /* get the corrupted object's path */ 4093168404Spjd (void) strlcpy(zc.zc_name, dsname, sizeof (zc.zc_name)); 4094168404Spjd zc.zc_obj = obj; 4095168404Spjd if (ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_OBJ_TO_PATH, 4096168404Spjd &zc) == 0) { 4097168404Spjd if (mounted) { 4098168404Spjd (void) snprintf(pathname, len, "%s%s", mntpnt, 4099168404Spjd zc.zc_value); 4100168404Spjd } else { 4101168404Spjd (void) snprintf(pathname, len, "%s:%s", 4102168404Spjd dsname, zc.zc_value); 4103168404Spjd } 4104168404Spjd } else { 4105168404Spjd (void) snprintf(pathname, len, "%s:<0x%llx>", dsname, obj); 4106168404Spjd } 4107168404Spjd free(mntpnt); 4108168404Spjd} 4109168404Spjd 4110277300Ssmh#ifdef illumos 4111185029Spjd/* 4112185029Spjd * Read the EFI label from the config, if a label does not exist then 4113185029Spjd * pass back the error to the caller. If the caller has passed a non-NULL 4114185029Spjd * diskaddr argument then we set it to the starting address of the EFI 4115331395Smav * partition. If the caller has passed a non-NULL boolean argument, then 4116331395Smav * we set it to indicate if the disk does have efi system partition. 4117185029Spjd */ 4118185029Spjdstatic int 4119331395Smavread_efi_label(nvlist_t *config, diskaddr_t *sb, boolean_t *system) 4120168404Spjd{ 4121185029Spjd char *path; 4122185029Spjd int fd; 4123185029Spjd char diskname[MAXPATHLEN]; 4124331395Smav boolean_t boot = B_FALSE; 4125185029Spjd int err = -1; 4126331395Smav int slice; 4127168404Spjd 4128185029Spjd if (nvlist_lookup_string(config, ZPOOL_CONFIG_PATH, &path) != 0) 4129185029Spjd return (err); 4130168404Spjd 4131297763Smav (void) snprintf(diskname, sizeof (diskname), "%s%s", ZFS_RDISK_ROOT, 4132185029Spjd strrchr(path, '/')); 4133185029Spjd if ((fd = open(diskname, O_RDONLY|O_NDELAY)) >= 0) { 4134185029Spjd struct dk_gpt *vtoc; 4135185029Spjd 4136185029Spjd if ((err = efi_alloc_and_read(fd, &vtoc)) >= 0) { 4137331395Smav for (slice = 0; slice < vtoc->efi_nparts; slice++) { 4138331395Smav if (vtoc->efi_parts[slice].p_tag == V_SYSTEM) 4139331395Smav boot = B_TRUE; 4140331395Smav if (vtoc->efi_parts[slice].p_tag == V_USR) 4141331395Smav break; 4142331395Smav } 4143331395Smav if (sb != NULL && vtoc->efi_parts[slice].p_tag == V_USR) 4144331395Smav *sb = vtoc->efi_parts[slice].p_start; 4145331395Smav if (system != NULL) 4146331395Smav *system = boot; 4147185029Spjd efi_free(vtoc); 4148185029Spjd } 4149185029Spjd (void) close(fd); 4150168404Spjd } 4151185029Spjd return (err); 4152185029Spjd} 4153168404Spjd 4154185029Spjd/* 4155185029Spjd * determine where a partition starts on a disk in the current 4156185029Spjd * configuration 4157185029Spjd */ 4158185029Spjdstatic diskaddr_t 4159185029Spjdfind_start_block(nvlist_t *config) 4160185029Spjd{ 4161185029Spjd nvlist_t **child; 4162185029Spjd uint_t c, children; 4163185029Spjd diskaddr_t sb = MAXOFFSET_T; 4164185029Spjd uint64_t wholedisk; 4165168404Spjd 4166185029Spjd if (nvlist_lookup_nvlist_array(config, 4167185029Spjd ZPOOL_CONFIG_CHILDREN, &child, &children) != 0) { 4168185029Spjd if (nvlist_lookup_uint64(config, 4169185029Spjd ZPOOL_CONFIG_WHOLE_DISK, 4170185029Spjd &wholedisk) != 0 || !wholedisk) { 4171185029Spjd return (MAXOFFSET_T); 4172185029Spjd } 4173331395Smav if (read_efi_label(config, &sb, NULL) < 0) 4174185029Spjd sb = MAXOFFSET_T; 4175185029Spjd return (sb); 4176168404Spjd } 4177168404Spjd 4178185029Spjd for (c = 0; c < children; c++) { 4179185029Spjd sb = find_start_block(child[c]); 4180185029Spjd if (sb != MAXOFFSET_T) { 4181185029Spjd return (sb); 4182185029Spjd } 4183168404Spjd } 4184185029Spjd return (MAXOFFSET_T); 4185185029Spjd} 4186277300Ssmh#endif /* illumos */ 4187168404Spjd 4188185029Spjd/* 4189185029Spjd * Label an individual disk. The name provided is the short name, 4190185029Spjd * stripped of any leading /dev path. 4191185029Spjd */ 4192185029Spjdint 4193331395Smavzpool_label_disk(libzfs_handle_t *hdl, zpool_handle_t *zhp, const char *name, 4194331395Smav zpool_boot_label_t boot_type, uint64_t boot_size, int *slice) 4195185029Spjd{ 4196277300Ssmh#ifdef illumos 4197185029Spjd char path[MAXPATHLEN]; 4198185029Spjd struct dk_gpt *vtoc; 4199185029Spjd int fd; 4200185029Spjd size_t resv = EFI_MIN_RESV_SIZE; 4201185029Spjd uint64_t slice_size; 4202185029Spjd diskaddr_t start_block; 4203185029Spjd char errbuf[1024]; 4204168404Spjd 4205185029Spjd /* prepare an error message just in case */ 4206185029Spjd (void) snprintf(errbuf, sizeof (errbuf), 4207185029Spjd dgettext(TEXT_DOMAIN, "cannot label '%s'"), name); 4208168404Spjd 4209185029Spjd if (zhp) { 4210185029Spjd nvlist_t *nvroot; 4211168404Spjd 4212185029Spjd verify(nvlist_lookup_nvlist(zhp->zpool_config, 4213185029Spjd ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0); 4214168404Spjd 4215185029Spjd if (zhp->zpool_start_block == 0) 4216185029Spjd start_block = find_start_block(nvroot); 4217185029Spjd else 4218185029Spjd start_block = zhp->zpool_start_block; 4219185029Spjd zhp->zpool_start_block = start_block; 4220185029Spjd } else { 4221185029Spjd /* new pool */ 4222185029Spjd start_block = NEW_START_BLOCK; 4223185029Spjd } 4224168404Spjd 4225297763Smav (void) snprintf(path, sizeof (path), "%s/%s%s", ZFS_RDISK_ROOT, name, 4226185029Spjd BACKUP_SLICE); 4227168404Spjd 4228185029Spjd if ((fd = open(path, O_RDWR | O_NDELAY)) < 0) { 4229185029Spjd /* 4230185029Spjd * This shouldn't happen. We've long since verified that this 4231185029Spjd * is a valid device. 4232185029Spjd */ 4233185029Spjd zfs_error_aux(hdl, 4234185029Spjd dgettext(TEXT_DOMAIN, "unable to open device")); 4235185029Spjd return (zfs_error(hdl, EZFS_OPENFAILED, errbuf)); 4236185029Spjd } 4237168404Spjd 4238185029Spjd if (efi_alloc_and_init(fd, EFI_NUMPAR, &vtoc) != 0) { 4239185029Spjd /* 4240185029Spjd * The only way this can fail is if we run out of memory, or we 4241185029Spjd * were unable to read the disk's capacity 4242185029Spjd */ 4243185029Spjd if (errno == ENOMEM) 4244185029Spjd (void) no_memory(hdl); 4245168404Spjd 4246185029Spjd (void) close(fd); 4247185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4248185029Spjd "unable to read disk capacity"), name); 4249185029Spjd 4250185029Spjd return (zfs_error(hdl, EZFS_NOCAP, errbuf)); 4251168404Spjd } 4252168404Spjd 4253168404Spjd /* 4254185029Spjd * Why we use V_USR: V_BACKUP confuses users, and is considered 4255185029Spjd * disposable by some EFI utilities (since EFI doesn't have a backup 4256185029Spjd * slice). V_UNASSIGNED is supposed to be used only for zero size 4257185029Spjd * partitions, and efi_write() will fail if we use it. V_ROOT, V_BOOT, 4258185029Spjd * etc. were all pretty specific. V_USR is as close to reality as we 4259185029Spjd * can get, in the absence of V_OTHER. 4260168404Spjd */ 4261331395Smav /* first fix the partition start block */ 4262331395Smav if (start_block == MAXOFFSET_T) 4263331395Smav start_block = NEW_START_BLOCK; 4264168404Spjd 4265331395Smav /* 4266331395Smav * EFI System partition is using slice 0. 4267331395Smav * ZFS is on slice 1 and slice 8 is reserved. 4268331395Smav * We assume the GPT partition table without system 4269331395Smav * partition has zfs p_start == NEW_START_BLOCK. 4270331395Smav * If start_block != NEW_START_BLOCK, it means we have 4271331395Smav * system partition. Correct solution would be to query/cache vtoc 4272331395Smav * from existing vdev member. 4273331395Smav */ 4274331395Smav if (boot_type == ZPOOL_CREATE_BOOT_LABEL) { 4275331395Smav if (boot_size % vtoc->efi_lbasize != 0) { 4276331395Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4277331395Smav "boot partition size must be a multiple of %d"), 4278331395Smav vtoc->efi_lbasize); 4279331395Smav (void) close(fd); 4280331395Smav efi_free(vtoc); 4281331395Smav return (zfs_error(hdl, EZFS_LABELFAILED, errbuf)); 4282331395Smav } 4283331395Smav /* 4284331395Smav * System partition size checks. 4285331395Smav * Note the 1MB is quite arbitrary value, since we 4286331395Smav * are creating dedicated pool, it should be enough 4287331395Smav * to hold fat + efi bootloader. May need to be 4288331395Smav * adjusted if the bootloader size will grow. 4289331395Smav */ 4290331395Smav if (boot_size < 1024 * 1024) { 4291331395Smav char buf[64]; 4292331395Smav zfs_nicenum(boot_size, buf, sizeof (buf)); 4293331395Smav zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4294331395Smav "Specified size %s for EFI System partition is too " 4295331395Smav "small, the minimum size is 1MB."), buf); 4296331395Smav (void) close(fd); 4297331395Smav efi_free(vtoc); 4298331395Smav return (zfs_error(hdl, EZFS_LABELFAILED, errbuf)); 4299331395Smav } 4300331395Smav /* 33MB is tested with mkfs -F pcfs */ 4301331395Smav if (hdl->libzfs_printerr && 4302331395Smav ((vtoc->efi_lbasize == 512 && 4303331395Smav boot_size < 33 * 1024 * 1024) || 4304331395Smav (vtoc->efi_lbasize == 4096 && 4305331395Smav boot_size < 256 * 1024 * 1024))) { 4306331395Smav char buf[64]; 4307331395Smav zfs_nicenum(boot_size, buf, sizeof (buf)); 4308331395Smav (void) fprintf(stderr, dgettext(TEXT_DOMAIN, 4309331395Smav "Warning: EFI System partition size %s is " 4310331395Smav "not allowing to create FAT32 file\nsystem, which " 4311331395Smav "may result in unbootable system.\n"), buf); 4312331395Smav } 4313331395Smav /* Adjust zfs partition start by size of system partition. */ 4314331395Smav start_block += boot_size / vtoc->efi_lbasize; 4315331395Smav } 4316168404Spjd 4317331395Smav if (start_block == NEW_START_BLOCK) { 4318331395Smav /* 4319331395Smav * Use default layout. 4320331395Smav * ZFS is on slice 0 and slice 8 is reserved. 4321331395Smav */ 4322331395Smav slice_size = vtoc->efi_last_u_lba + 1; 4323331395Smav slice_size -= EFI_MIN_RESV_SIZE; 4324331395Smav slice_size -= start_block; 4325331395Smav if (slice != NULL) 4326331395Smav *slice = 0; 4327331395Smav 4328331395Smav vtoc->efi_parts[0].p_start = start_block; 4329331395Smav vtoc->efi_parts[0].p_size = slice_size; 4330331395Smav 4331331395Smav vtoc->efi_parts[0].p_tag = V_USR; 4332331395Smav (void) strcpy(vtoc->efi_parts[0].p_name, "zfs"); 4333331395Smav 4334331395Smav vtoc->efi_parts[8].p_start = slice_size + start_block; 4335331395Smav vtoc->efi_parts[8].p_size = resv; 4336331395Smav vtoc->efi_parts[8].p_tag = V_RESERVED; 4337331395Smav } else { 4338331395Smav slice_size = start_block - NEW_START_BLOCK; 4339331395Smav vtoc->efi_parts[0].p_start = NEW_START_BLOCK; 4340331395Smav vtoc->efi_parts[0].p_size = slice_size; 4341331395Smav vtoc->efi_parts[0].p_tag = V_SYSTEM; 4342331395Smav (void) strcpy(vtoc->efi_parts[0].p_name, "loader"); 4343331395Smav if (slice != NULL) 4344331395Smav *slice = 1; 4345331395Smav /* prepare slice 1 */ 4346331395Smav slice_size = vtoc->efi_last_u_lba + 1 - slice_size; 4347331395Smav slice_size -= resv; 4348331395Smav slice_size -= NEW_START_BLOCK; 4349331395Smav vtoc->efi_parts[1].p_start = start_block; 4350331395Smav vtoc->efi_parts[1].p_size = slice_size; 4351331395Smav vtoc->efi_parts[1].p_tag = V_USR; 4352331395Smav (void) strcpy(vtoc->efi_parts[1].p_name, "zfs"); 4353331395Smav 4354331395Smav vtoc->efi_parts[8].p_start = slice_size + start_block; 4355331395Smav vtoc->efi_parts[8].p_size = resv; 4356331395Smav vtoc->efi_parts[8].p_tag = V_RESERVED; 4357331395Smav } 4358331395Smav 4359185029Spjd if (efi_write(fd, vtoc) != 0) { 4360185029Spjd /* 4361185029Spjd * Some block drivers (like pcata) may not support EFI 4362185029Spjd * GPT labels. Print out a helpful error message dir- 4363185029Spjd * ecting the user to manually label the disk and give 4364185029Spjd * a specific slice. 4365185029Spjd */ 4366185029Spjd (void) close(fd); 4367185029Spjd efi_free(vtoc); 4368168404Spjd 4369185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4370185029Spjd "try using fdisk(1M) and then provide a specific slice")); 4371185029Spjd return (zfs_error(hdl, EZFS_LABELFAILED, errbuf)); 4372168404Spjd } 4373185029Spjd 4374185029Spjd (void) close(fd); 4375185029Spjd efi_free(vtoc); 4376277300Ssmh#endif /* illumos */ 4377168404Spjd return (0); 4378168404Spjd} 4379168404Spjd 4380185029Spjdstatic boolean_t 4381185029Spjdsupported_dump_vdev_type(libzfs_handle_t *hdl, nvlist_t *config, char *errbuf) 4382168404Spjd{ 4383185029Spjd char *type; 4384185029Spjd nvlist_t **child; 4385185029Spjd uint_t children, c; 4386185029Spjd 4387185029Spjd verify(nvlist_lookup_string(config, ZPOOL_CONFIG_TYPE, &type) == 0); 4388255750Sdelphij if (strcmp(type, VDEV_TYPE_FILE) == 0 || 4389219089Spjd strcmp(type, VDEV_TYPE_HOLE) == 0 || 4390185029Spjd strcmp(type, VDEV_TYPE_MISSING) == 0) { 4391185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4392185029Spjd "vdev type '%s' is not supported"), type); 4393185029Spjd (void) zfs_error(hdl, EZFS_VDEVNOTSUP, errbuf); 4394185029Spjd return (B_FALSE); 4395185029Spjd } 4396185029Spjd if (nvlist_lookup_nvlist_array(config, ZPOOL_CONFIG_CHILDREN, 4397185029Spjd &child, &children) == 0) { 4398185029Spjd for (c = 0; c < children; c++) { 4399185029Spjd if (!supported_dump_vdev_type(hdl, child[c], errbuf)) 4400185029Spjd return (B_FALSE); 4401185029Spjd } 4402185029Spjd } 4403185029Spjd return (B_TRUE); 4404168404Spjd} 4405168404Spjd 4406185029Spjd/* 4407255750Sdelphij * Check if this zvol is allowable for use as a dump device; zero if 4408255750Sdelphij * it is, > 0 if it isn't, < 0 if it isn't a zvol. 4409255750Sdelphij * 4410255750Sdelphij * Allowable storage configurations include mirrors, all raidz variants, and 4411255750Sdelphij * pools with log, cache, and spare devices. Pools which are backed by files or 4412255750Sdelphij * have missing/hole vdevs are not suitable. 4413185029Spjd */ 4414168404Spjdint 4415185029Spjdzvol_check_dump_config(char *arg) 4416168404Spjd{ 4417185029Spjd zpool_handle_t *zhp = NULL; 4418185029Spjd nvlist_t *config, *nvroot; 4419185029Spjd char *p, *volname; 4420185029Spjd nvlist_t **top; 4421185029Spjd uint_t toplevels; 4422185029Spjd libzfs_handle_t *hdl; 4423185029Spjd char errbuf[1024]; 4424307108Smav char poolname[ZFS_MAX_DATASET_NAME_LEN]; 4425185029Spjd int pathlen = strlen(ZVOL_FULL_DEV_DIR); 4426185029Spjd int ret = 1; 4427168404Spjd 4428185029Spjd if (strncmp(arg, ZVOL_FULL_DEV_DIR, pathlen)) { 4429168404Spjd return (-1); 4430185029Spjd } 4431168404Spjd 4432185029Spjd (void) snprintf(errbuf, sizeof (errbuf), dgettext(TEXT_DOMAIN, 4433185029Spjd "dump is not supported on device '%s'"), arg); 4434168404Spjd 4435185029Spjd if ((hdl = libzfs_init()) == NULL) 4436185029Spjd return (1); 4437185029Spjd libzfs_print_on_error(hdl, B_TRUE); 4438168404Spjd 4439185029Spjd volname = arg + pathlen; 4440185029Spjd 4441185029Spjd /* check the configuration of the pool */ 4442185029Spjd if ((p = strchr(volname, '/')) == NULL) { 4443185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4444185029Spjd "malformed dataset name")); 4445185029Spjd (void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf); 4446185029Spjd return (1); 4447307108Smav } else if (p - volname >= ZFS_MAX_DATASET_NAME_LEN) { 4448185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4449185029Spjd "dataset name is too long")); 4450185029Spjd (void) zfs_error(hdl, EZFS_NAMETOOLONG, errbuf); 4451185029Spjd return (1); 4452185029Spjd } else { 4453185029Spjd (void) strncpy(poolname, volname, p - volname); 4454185029Spjd poolname[p - volname] = '\0'; 4455168404Spjd } 4456168404Spjd 4457185029Spjd if ((zhp = zpool_open(hdl, poolname)) == NULL) { 4458185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4459185029Spjd "could not open pool '%s'"), poolname); 4460185029Spjd (void) zfs_error(hdl, EZFS_OPENFAILED, errbuf); 4461185029Spjd goto out; 4462185029Spjd } 4463185029Spjd config = zpool_get_config(zhp, NULL); 4464185029Spjd if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, 4465185029Spjd &nvroot) != 0) { 4466185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4467185029Spjd "could not obtain vdev configuration for '%s'"), poolname); 4468185029Spjd (void) zfs_error(hdl, EZFS_INVALCONFIG, errbuf); 4469185029Spjd goto out; 4470185029Spjd } 4471185029Spjd 4472185029Spjd verify(nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN, 4473185029Spjd &top, &toplevels) == 0); 4474185029Spjd 4475185029Spjd if (!supported_dump_vdev_type(hdl, top[0], errbuf)) { 4476185029Spjd goto out; 4477185029Spjd } 4478185029Spjd ret = 0; 4479185029Spjd 4480185029Spjdout: 4481185029Spjd if (zhp) 4482185029Spjd zpool_close(zhp); 4483185029Spjd libzfs_fini(hdl); 4484185029Spjd return (ret); 4485168404Spjd} 4486308914Savg 4487308914Savgint 4488308914Savgzpool_nextboot(libzfs_handle_t *hdl, uint64_t pool_guid, uint64_t dev_guid, 4489308914Savg const char *command) 4490308914Savg{ 4491308914Savg zfs_cmd_t zc = { 0 }; 4492308914Savg nvlist_t *args; 4493308914Savg char *packed; 4494308914Savg size_t size; 4495308914Savg int error; 4496308914Savg 4497308914Savg args = fnvlist_alloc(); 4498308914Savg fnvlist_add_uint64(args, ZPOOL_CONFIG_POOL_GUID, pool_guid); 4499308914Savg fnvlist_add_uint64(args, ZPOOL_CONFIG_GUID, dev_guid); 4500308914Savg fnvlist_add_string(args, "command", command); 4501308914Savg error = zcmd_write_src_nvlist(hdl, &zc, args); 4502308914Savg if (error == 0) 4503308914Savg error = ioctl(hdl->libzfs_fd, ZFS_IOC_NEXTBOOT, &zc); 4504308914Savg zcmd_free_nvlists(&zc); 4505308914Savg nvlist_free(args); 4506308914Savg return (error); 4507308914Savg} 4508