libzfs_pool.c revision 276446
1168404Spjd/* 2168404Spjd * CDDL HEADER START 3168404Spjd * 4168404Spjd * The contents of this file are subject to the terms of the 5168404Spjd * Common Development and Distribution License (the "License"). 6168404Spjd * You may not use this file except in compliance with the License. 7168404Spjd * 8168404Spjd * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9168404Spjd * or http://www.opensolaris.org/os/licensing. 10168404Spjd * See the License for the specific language governing permissions 11168404Spjd * and limitations under the License. 12168404Spjd * 13168404Spjd * When distributing Covered Code, include this CDDL HEADER in each 14168404Spjd * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15168404Spjd * If applicable, add the following below this CDDL HEADER, with the 16168404Spjd * fields enclosed by brackets "[]" replaced with your own identifying 17168404Spjd * information: Portions Copyright [yyyy] [name of copyright owner] 18168404Spjd * 19168404Spjd * CDDL HEADER END 20168404Spjd */ 21168404Spjd 22168404Spjd/* 23219089Spjd * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved. 24228103Smm * Copyright 2011 Nexenta Systems, Inc. All rights reserved. 25272502Sdelphij * Copyright (c) 2011, 2014 by Delphix. All rights reserved. 26255750Sdelphij * Copyright (c) 2013, Joyent, Inc. All rights reserved. 27168404Spjd */ 28168404Spjd 29168404Spjd#include <sys/types.h> 30168404Spjd#include <sys/stat.h> 31168404Spjd#include <ctype.h> 32168404Spjd#include <errno.h> 33168404Spjd#include <devid.h> 34168404Spjd#include <fcntl.h> 35168404Spjd#include <libintl.h> 36168404Spjd#include <stdio.h> 37168404Spjd#include <stdlib.h> 38168404Spjd#include <strings.h> 39168404Spjd#include <unistd.h> 40248571Smm#include <libgen.h> 41168404Spjd#include <sys/zfs_ioctl.h> 42219089Spjd#include <dlfcn.h> 43168404Spjd 44168404Spjd#include "zfs_namecheck.h" 45168404Spjd#include "zfs_prop.h" 46168404Spjd#include "libzfs_impl.h" 47219089Spjd#include "zfs_comutil.h" 48236884Smm#include "zfeature_common.h" 49168404Spjd 50185029Spjdstatic int read_efi_label(nvlist_t *config, diskaddr_t *sb); 51185029Spjd 52219089Spjd#define DISK_ROOT "/dev/dsk" 53219089Spjd#define RDISK_ROOT "/dev/rdsk" 54219089Spjd#define BACKUP_SLICE "s2" 55209962Smm 56219089Spjdtypedef struct prop_flags { 57219089Spjd int create:1; /* Validate property on creation */ 58219089Spjd int import:1; /* Validate property on import */ 59219089Spjd} prop_flags_t; 60219089Spjd 61168404Spjd/* 62185029Spjd * ==================================================================== 63185029Spjd * zpool property functions 64185029Spjd * ==================================================================== 65185029Spjd */ 66185029Spjd 67185029Spjdstatic int 68185029Spjdzpool_get_all_props(zpool_handle_t *zhp) 69185029Spjd{ 70185029Spjd zfs_cmd_t zc = { 0 }; 71185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 72185029Spjd 73185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 74185029Spjd 75185029Spjd if (zcmd_alloc_dst_nvlist(hdl, &zc, 0) != 0) 76185029Spjd return (-1); 77185029Spjd 78185029Spjd while (ioctl(hdl->libzfs_fd, ZFS_IOC_POOL_GET_PROPS, &zc) != 0) { 79185029Spjd if (errno == ENOMEM) { 80185029Spjd if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) { 81185029Spjd zcmd_free_nvlists(&zc); 82185029Spjd return (-1); 83185029Spjd } 84185029Spjd } else { 85185029Spjd zcmd_free_nvlists(&zc); 86185029Spjd return (-1); 87185029Spjd } 88185029Spjd } 89185029Spjd 90185029Spjd if (zcmd_read_dst_nvlist(hdl, &zc, &zhp->zpool_props) != 0) { 91185029Spjd zcmd_free_nvlists(&zc); 92185029Spjd return (-1); 93185029Spjd } 94185029Spjd 95185029Spjd zcmd_free_nvlists(&zc); 96185029Spjd 97185029Spjd return (0); 98185029Spjd} 99185029Spjd 100185029Spjdstatic int 101185029Spjdzpool_props_refresh(zpool_handle_t *zhp) 102185029Spjd{ 103185029Spjd nvlist_t *old_props; 104185029Spjd 105185029Spjd old_props = zhp->zpool_props; 106185029Spjd 107185029Spjd if (zpool_get_all_props(zhp) != 0) 108185029Spjd return (-1); 109185029Spjd 110185029Spjd nvlist_free(old_props); 111185029Spjd return (0); 112185029Spjd} 113185029Spjd 114185029Spjdstatic char * 115185029Spjdzpool_get_prop_string(zpool_handle_t *zhp, zpool_prop_t prop, 116185029Spjd zprop_source_t *src) 117185029Spjd{ 118185029Spjd nvlist_t *nv, *nvl; 119185029Spjd uint64_t ival; 120185029Spjd char *value; 121185029Spjd zprop_source_t source; 122185029Spjd 123185029Spjd nvl = zhp->zpool_props; 124185029Spjd if (nvlist_lookup_nvlist(nvl, zpool_prop_to_name(prop), &nv) == 0) { 125185029Spjd verify(nvlist_lookup_uint64(nv, ZPROP_SOURCE, &ival) == 0); 126185029Spjd source = ival; 127185029Spjd verify(nvlist_lookup_string(nv, ZPROP_VALUE, &value) == 0); 128185029Spjd } else { 129185029Spjd source = ZPROP_SRC_DEFAULT; 130185029Spjd if ((value = (char *)zpool_prop_default_string(prop)) == NULL) 131185029Spjd value = "-"; 132185029Spjd } 133185029Spjd 134185029Spjd if (src) 135185029Spjd *src = source; 136185029Spjd 137185029Spjd return (value); 138185029Spjd} 139185029Spjd 140185029Spjduint64_t 141185029Spjdzpool_get_prop_int(zpool_handle_t *zhp, zpool_prop_t prop, zprop_source_t *src) 142185029Spjd{ 143185029Spjd nvlist_t *nv, *nvl; 144185029Spjd uint64_t value; 145185029Spjd zprop_source_t source; 146185029Spjd 147185029Spjd if (zhp->zpool_props == NULL && zpool_get_all_props(zhp)) { 148185029Spjd /* 149185029Spjd * zpool_get_all_props() has most likely failed because 150185029Spjd * the pool is faulted, but if all we need is the top level 151185029Spjd * vdev's guid then get it from the zhp config nvlist. 152185029Spjd */ 153185029Spjd if ((prop == ZPOOL_PROP_GUID) && 154185029Spjd (nvlist_lookup_nvlist(zhp->zpool_config, 155185029Spjd ZPOOL_CONFIG_VDEV_TREE, &nv) == 0) && 156185029Spjd (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, &value) 157185029Spjd == 0)) { 158185029Spjd return (value); 159185029Spjd } 160185029Spjd return (zpool_prop_default_numeric(prop)); 161185029Spjd } 162185029Spjd 163185029Spjd nvl = zhp->zpool_props; 164185029Spjd if (nvlist_lookup_nvlist(nvl, zpool_prop_to_name(prop), &nv) == 0) { 165185029Spjd verify(nvlist_lookup_uint64(nv, ZPROP_SOURCE, &value) == 0); 166185029Spjd source = value; 167185029Spjd verify(nvlist_lookup_uint64(nv, ZPROP_VALUE, &value) == 0); 168185029Spjd } else { 169185029Spjd source = ZPROP_SRC_DEFAULT; 170185029Spjd value = zpool_prop_default_numeric(prop); 171185029Spjd } 172185029Spjd 173185029Spjd if (src) 174185029Spjd *src = source; 175185029Spjd 176185029Spjd return (value); 177185029Spjd} 178185029Spjd 179185029Spjd/* 180185029Spjd * Map VDEV STATE to printed strings. 181185029Spjd */ 182224169Sgibbsconst char * 183185029Spjdzpool_state_to_name(vdev_state_t state, vdev_aux_t aux) 184185029Spjd{ 185185029Spjd switch (state) { 186185029Spjd case VDEV_STATE_CLOSED: 187185029Spjd case VDEV_STATE_OFFLINE: 188185029Spjd return (gettext("OFFLINE")); 189185029Spjd case VDEV_STATE_REMOVED: 190185029Spjd return (gettext("REMOVED")); 191185029Spjd case VDEV_STATE_CANT_OPEN: 192185029Spjd if (aux == VDEV_AUX_CORRUPT_DATA || aux == VDEV_AUX_BAD_LOG) 193185029Spjd return (gettext("FAULTED")); 194219089Spjd else if (aux == VDEV_AUX_SPLIT_POOL) 195219089Spjd return (gettext("SPLIT")); 196185029Spjd else 197185029Spjd return (gettext("UNAVAIL")); 198185029Spjd case VDEV_STATE_FAULTED: 199185029Spjd return (gettext("FAULTED")); 200185029Spjd case VDEV_STATE_DEGRADED: 201185029Spjd return (gettext("DEGRADED")); 202185029Spjd case VDEV_STATE_HEALTHY: 203185029Spjd return (gettext("ONLINE")); 204185029Spjd } 205185029Spjd 206185029Spjd return (gettext("UNKNOWN")); 207185029Spjd} 208185029Spjd 209185029Spjd/* 210224169Sgibbs * Map POOL STATE to printed strings. 211224169Sgibbs */ 212224169Sgibbsconst char * 213224169Sgibbszpool_pool_state_to_name(pool_state_t state) 214224169Sgibbs{ 215224169Sgibbs switch (state) { 216224169Sgibbs case POOL_STATE_ACTIVE: 217224169Sgibbs return (gettext("ACTIVE")); 218224169Sgibbs case POOL_STATE_EXPORTED: 219224169Sgibbs return (gettext("EXPORTED")); 220224169Sgibbs case POOL_STATE_DESTROYED: 221224169Sgibbs return (gettext("DESTROYED")); 222224169Sgibbs case POOL_STATE_SPARE: 223224169Sgibbs return (gettext("SPARE")); 224224169Sgibbs case POOL_STATE_L2CACHE: 225224169Sgibbs return (gettext("L2CACHE")); 226224169Sgibbs case POOL_STATE_UNINITIALIZED: 227224169Sgibbs return (gettext("UNINITIALIZED")); 228224169Sgibbs case POOL_STATE_UNAVAIL: 229224169Sgibbs return (gettext("UNAVAIL")); 230224169Sgibbs case POOL_STATE_POTENTIALLY_ACTIVE: 231224169Sgibbs return (gettext("POTENTIALLY_ACTIVE")); 232224169Sgibbs } 233224169Sgibbs 234224169Sgibbs return (gettext("UNKNOWN")); 235224169Sgibbs} 236224169Sgibbs 237224169Sgibbs/* 238185029Spjd * Get a zpool property value for 'prop' and return the value in 239185029Spjd * a pre-allocated buffer. 240185029Spjd */ 241185029Spjdint 242185029Spjdzpool_get_prop(zpool_handle_t *zhp, zpool_prop_t prop, char *buf, size_t len, 243263889Sdelphij zprop_source_t *srctype, boolean_t literal) 244185029Spjd{ 245185029Spjd uint64_t intval; 246185029Spjd const char *strval; 247185029Spjd zprop_source_t src = ZPROP_SRC_NONE; 248185029Spjd nvlist_t *nvroot; 249185029Spjd vdev_stat_t *vs; 250185029Spjd uint_t vsc; 251185029Spjd 252185029Spjd if (zpool_get_state(zhp) == POOL_STATE_UNAVAIL) { 253209962Smm switch (prop) { 254209962Smm case ZPOOL_PROP_NAME: 255185029Spjd (void) strlcpy(buf, zpool_get_name(zhp), len); 256209962Smm break; 257209962Smm 258209962Smm case ZPOOL_PROP_HEALTH: 259276446Ssmh (void) strlcpy(buf, 260276446Ssmh zpool_pool_state_to_name(POOL_STATE_UNAVAIL), len); 261209962Smm break; 262209962Smm 263209962Smm case ZPOOL_PROP_GUID: 264209962Smm intval = zpool_get_prop_int(zhp, prop, &src); 265209962Smm (void) snprintf(buf, len, "%llu", intval); 266209962Smm break; 267209962Smm 268209962Smm case ZPOOL_PROP_ALTROOT: 269209962Smm case ZPOOL_PROP_CACHEFILE: 270228103Smm case ZPOOL_PROP_COMMENT: 271209962Smm if (zhp->zpool_props != NULL || 272209962Smm zpool_get_all_props(zhp) == 0) { 273209962Smm (void) strlcpy(buf, 274209962Smm zpool_get_prop_string(zhp, prop, &src), 275209962Smm len); 276263889Sdelphij break; 277209962Smm } 278209962Smm /* FALLTHROUGH */ 279209962Smm default: 280185029Spjd (void) strlcpy(buf, "-", len); 281209962Smm break; 282209962Smm } 283209962Smm 284209962Smm if (srctype != NULL) 285209962Smm *srctype = src; 286185029Spjd return (0); 287185029Spjd } 288185029Spjd 289185029Spjd if (zhp->zpool_props == NULL && zpool_get_all_props(zhp) && 290185029Spjd prop != ZPOOL_PROP_NAME) 291185029Spjd return (-1); 292185029Spjd 293185029Spjd switch (zpool_prop_get_type(prop)) { 294185029Spjd case PROP_TYPE_STRING: 295185029Spjd (void) strlcpy(buf, zpool_get_prop_string(zhp, prop, &src), 296185029Spjd len); 297185029Spjd break; 298185029Spjd 299185029Spjd case PROP_TYPE_NUMBER: 300185029Spjd intval = zpool_get_prop_int(zhp, prop, &src); 301185029Spjd 302185029Spjd switch (prop) { 303185029Spjd case ZPOOL_PROP_SIZE: 304219089Spjd case ZPOOL_PROP_ALLOCATED: 305219089Spjd case ZPOOL_PROP_FREE: 306236884Smm case ZPOOL_PROP_FREEING: 307268079Sdelphij case ZPOOL_PROP_LEAKED: 308263889Sdelphij if (literal) { 309263889Sdelphij (void) snprintf(buf, len, "%llu", 310263889Sdelphij (u_longlong_t)intval); 311263889Sdelphij } else { 312263889Sdelphij (void) zfs_nicenum(intval, buf, len); 313263889Sdelphij } 314185029Spjd break; 315272502Sdelphij case ZPOOL_PROP_EXPANDSZ: 316272502Sdelphij if (intval == 0) { 317272502Sdelphij (void) strlcpy(buf, "-", len); 318272502Sdelphij } else if (literal) { 319272502Sdelphij (void) snprintf(buf, len, "%llu", 320272502Sdelphij (u_longlong_t)intval); 321272502Sdelphij } else { 322272502Sdelphij (void) zfs_nicenum(intval, buf, len); 323272502Sdelphij } 324272502Sdelphij break; 325185029Spjd case ZPOOL_PROP_CAPACITY: 326263889Sdelphij if (literal) { 327263889Sdelphij (void) snprintf(buf, len, "%llu", 328263889Sdelphij (u_longlong_t)intval); 329263889Sdelphij } else { 330263889Sdelphij (void) snprintf(buf, len, "%llu%%", 331263889Sdelphij (u_longlong_t)intval); 332263889Sdelphij } 333185029Spjd break; 334269118Sdelphij case ZPOOL_PROP_FRAGMENTATION: 335269118Sdelphij if (intval == UINT64_MAX) { 336269118Sdelphij (void) strlcpy(buf, "-", len); 337269118Sdelphij } else { 338269118Sdelphij (void) snprintf(buf, len, "%llu%%", 339269118Sdelphij (u_longlong_t)intval); 340269118Sdelphij } 341269118Sdelphij break; 342219089Spjd case ZPOOL_PROP_DEDUPRATIO: 343219089Spjd (void) snprintf(buf, len, "%llu.%02llux", 344219089Spjd (u_longlong_t)(intval / 100), 345219089Spjd (u_longlong_t)(intval % 100)); 346219089Spjd break; 347185029Spjd case ZPOOL_PROP_HEALTH: 348185029Spjd verify(nvlist_lookup_nvlist(zpool_get_config(zhp, NULL), 349185029Spjd ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0); 350185029Spjd verify(nvlist_lookup_uint64_array(nvroot, 351219089Spjd ZPOOL_CONFIG_VDEV_STATS, (uint64_t **)&vs, &vsc) 352219089Spjd == 0); 353185029Spjd 354185029Spjd (void) strlcpy(buf, zpool_state_to_name(intval, 355185029Spjd vs->vs_aux), len); 356185029Spjd break; 357236884Smm case ZPOOL_PROP_VERSION: 358236884Smm if (intval >= SPA_VERSION_FEATURES) { 359236884Smm (void) snprintf(buf, len, "-"); 360236884Smm break; 361236884Smm } 362236884Smm /* FALLTHROUGH */ 363185029Spjd default: 364185029Spjd (void) snprintf(buf, len, "%llu", intval); 365185029Spjd } 366185029Spjd break; 367185029Spjd 368185029Spjd case PROP_TYPE_INDEX: 369185029Spjd intval = zpool_get_prop_int(zhp, prop, &src); 370185029Spjd if (zpool_prop_index_to_string(prop, intval, &strval) 371185029Spjd != 0) 372185029Spjd return (-1); 373185029Spjd (void) strlcpy(buf, strval, len); 374185029Spjd break; 375185029Spjd 376185029Spjd default: 377185029Spjd abort(); 378185029Spjd } 379185029Spjd 380185029Spjd if (srctype) 381185029Spjd *srctype = src; 382185029Spjd 383185029Spjd return (0); 384185029Spjd} 385185029Spjd 386185029Spjd/* 387185029Spjd * Check if the bootfs name has the same pool name as it is set to. 388185029Spjd * Assuming bootfs is a valid dataset name. 389185029Spjd */ 390185029Spjdstatic boolean_t 391185029Spjdbootfs_name_valid(const char *pool, char *bootfs) 392185029Spjd{ 393185029Spjd int len = strlen(pool); 394185029Spjd 395185029Spjd if (!zfs_name_valid(bootfs, ZFS_TYPE_FILESYSTEM|ZFS_TYPE_SNAPSHOT)) 396185029Spjd return (B_FALSE); 397185029Spjd 398185029Spjd if (strncmp(pool, bootfs, len) == 0 && 399185029Spjd (bootfs[len] == '/' || bootfs[len] == '\0')) 400185029Spjd return (B_TRUE); 401185029Spjd 402185029Spjd return (B_FALSE); 403185029Spjd} 404185029Spjd 405185029Spjd/* 406185029Spjd * Inspect the configuration to determine if any of the devices contain 407185029Spjd * an EFI label. 408185029Spjd */ 409185029Spjdstatic boolean_t 410185029Spjdpool_uses_efi(nvlist_t *config) 411185029Spjd{ 412209962Smm#ifdef sun 413185029Spjd nvlist_t **child; 414185029Spjd uint_t c, children; 415185029Spjd 416185029Spjd if (nvlist_lookup_nvlist_array(config, ZPOOL_CONFIG_CHILDREN, 417185029Spjd &child, &children) != 0) 418185029Spjd return (read_efi_label(config, NULL) >= 0); 419185029Spjd 420185029Spjd for (c = 0; c < children; c++) { 421185029Spjd if (pool_uses_efi(child[c])) 422185029Spjd return (B_TRUE); 423185029Spjd } 424209962Smm#endif /* sun */ 425185029Spjd return (B_FALSE); 426185029Spjd} 427185029Spjd 428236155Smmboolean_t 429236155Smmzpool_is_bootable(zpool_handle_t *zhp) 430219089Spjd{ 431219089Spjd char bootfs[ZPOOL_MAXNAMELEN]; 432219089Spjd 433219089Spjd return (zpool_get_prop(zhp, ZPOOL_PROP_BOOTFS, bootfs, 434263889Sdelphij sizeof (bootfs), NULL, B_FALSE) == 0 && strncmp(bootfs, "-", 435219089Spjd sizeof (bootfs)) != 0); 436219089Spjd} 437219089Spjd 438219089Spjd 439185029Spjd/* 440185029Spjd * Given an nvlist of zpool properties to be set, validate that they are 441185029Spjd * correct, and parse any numeric properties (index, boolean, etc) if they are 442185029Spjd * specified as strings. 443185029Spjd */ 444185029Spjdstatic nvlist_t * 445185029Spjdzpool_valid_proplist(libzfs_handle_t *hdl, const char *poolname, 446219089Spjd nvlist_t *props, uint64_t version, prop_flags_t flags, char *errbuf) 447185029Spjd{ 448185029Spjd nvpair_t *elem; 449185029Spjd nvlist_t *retprops; 450185029Spjd zpool_prop_t prop; 451185029Spjd char *strval; 452185029Spjd uint64_t intval; 453228103Smm char *slash, *check; 454185029Spjd struct stat64 statbuf; 455185029Spjd zpool_handle_t *zhp; 456185029Spjd nvlist_t *nvroot; 457185029Spjd 458185029Spjd if (nvlist_alloc(&retprops, NV_UNIQUE_NAME, 0) != 0) { 459185029Spjd (void) no_memory(hdl); 460185029Spjd return (NULL); 461185029Spjd } 462185029Spjd 463185029Spjd elem = NULL; 464185029Spjd while ((elem = nvlist_next_nvpair(props, elem)) != NULL) { 465185029Spjd const char *propname = nvpair_name(elem); 466185029Spjd 467236884Smm prop = zpool_name_to_prop(propname); 468236884Smm if (prop == ZPROP_INVAL && zpool_prop_feature(propname)) { 469236884Smm int err; 470236884Smm char *fname = strchr(propname, '@') + 1; 471236884Smm 472259813Sdelphij err = zfeature_lookup_name(fname, NULL); 473236884Smm if (err != 0) { 474236884Smm ASSERT3U(err, ==, ENOENT); 475236884Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 476236884Smm "invalid feature '%s'"), fname); 477236884Smm (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 478236884Smm goto error; 479236884Smm } 480236884Smm 481236884Smm if (nvpair_type(elem) != DATA_TYPE_STRING) { 482236884Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 483236884Smm "'%s' must be a string"), propname); 484236884Smm (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 485236884Smm goto error; 486236884Smm } 487236884Smm 488236884Smm (void) nvpair_value_string(elem, &strval); 489236884Smm if (strcmp(strval, ZFS_FEATURE_ENABLED) != 0) { 490236884Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 491236884Smm "property '%s' can only be set to " 492236884Smm "'enabled'"), propname); 493236884Smm (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 494236884Smm goto error; 495236884Smm } 496236884Smm 497236884Smm if (nvlist_add_uint64(retprops, propname, 0) != 0) { 498236884Smm (void) no_memory(hdl); 499236884Smm goto error; 500236884Smm } 501236884Smm continue; 502236884Smm } 503236884Smm 504185029Spjd /* 505185029Spjd * Make sure this property is valid and applies to this type. 506185029Spjd */ 507236884Smm if (prop == ZPROP_INVAL) { 508185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 509185029Spjd "invalid property '%s'"), propname); 510185029Spjd (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 511185029Spjd goto error; 512185029Spjd } 513185029Spjd 514185029Spjd if (zpool_prop_readonly(prop)) { 515185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "'%s' " 516185029Spjd "is readonly"), propname); 517185029Spjd (void) zfs_error(hdl, EZFS_PROPREADONLY, errbuf); 518185029Spjd goto error; 519185029Spjd } 520185029Spjd 521185029Spjd if (zprop_parse_value(hdl, elem, prop, ZFS_TYPE_POOL, retprops, 522185029Spjd &strval, &intval, errbuf) != 0) 523185029Spjd goto error; 524185029Spjd 525185029Spjd /* 526185029Spjd * Perform additional checking for specific properties. 527185029Spjd */ 528185029Spjd switch (prop) { 529185029Spjd case ZPOOL_PROP_VERSION: 530236884Smm if (intval < version || 531236884Smm !SPA_VERSION_IS_SUPPORTED(intval)) { 532185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 533185029Spjd "property '%s' number %d is invalid."), 534185029Spjd propname, intval); 535185029Spjd (void) zfs_error(hdl, EZFS_BADVERSION, errbuf); 536185029Spjd goto error; 537185029Spjd } 538185029Spjd break; 539185029Spjd 540185029Spjd case ZPOOL_PROP_BOOTFS: 541219089Spjd if (flags.create || flags.import) { 542185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 543185029Spjd "property '%s' cannot be set at creation " 544185029Spjd "or import time"), propname); 545185029Spjd (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 546185029Spjd goto error; 547185029Spjd } 548185029Spjd 549185029Spjd if (version < SPA_VERSION_BOOTFS) { 550185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 551185029Spjd "pool must be upgraded to support " 552185029Spjd "'%s' property"), propname); 553185029Spjd (void) zfs_error(hdl, EZFS_BADVERSION, errbuf); 554185029Spjd goto error; 555185029Spjd } 556185029Spjd 557185029Spjd /* 558185029Spjd * bootfs property value has to be a dataset name and 559185029Spjd * the dataset has to be in the same pool as it sets to. 560185029Spjd */ 561185029Spjd if (strval[0] != '\0' && !bootfs_name_valid(poolname, 562185029Spjd strval)) { 563185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "'%s' " 564185029Spjd "is an invalid name"), strval); 565185029Spjd (void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf); 566185029Spjd goto error; 567185029Spjd } 568185029Spjd 569185029Spjd if ((zhp = zpool_open_canfail(hdl, poolname)) == NULL) { 570185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 571185029Spjd "could not open pool '%s'"), poolname); 572185029Spjd (void) zfs_error(hdl, EZFS_OPENFAILED, errbuf); 573185029Spjd goto error; 574185029Spjd } 575185029Spjd verify(nvlist_lookup_nvlist(zpool_get_config(zhp, NULL), 576185029Spjd ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0); 577185029Spjd 578219089Spjd#ifdef sun 579185029Spjd /* 580185029Spjd * bootfs property cannot be set on a disk which has 581185029Spjd * been EFI labeled. 582185029Spjd */ 583185029Spjd if (pool_uses_efi(nvroot)) { 584185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 585185029Spjd "property '%s' not supported on " 586185029Spjd "EFI labeled devices"), propname); 587185029Spjd (void) zfs_error(hdl, EZFS_POOL_NOTSUP, errbuf); 588185029Spjd zpool_close(zhp); 589185029Spjd goto error; 590185029Spjd } 591219089Spjd#endif /* sun */ 592185029Spjd zpool_close(zhp); 593185029Spjd break; 594185029Spjd 595185029Spjd case ZPOOL_PROP_ALTROOT: 596219089Spjd if (!flags.create && !flags.import) { 597185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 598185029Spjd "property '%s' can only be set during pool " 599185029Spjd "creation or import"), propname); 600185029Spjd (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 601185029Spjd goto error; 602185029Spjd } 603185029Spjd 604185029Spjd if (strval[0] != '/') { 605185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 606185029Spjd "bad alternate root '%s'"), strval); 607185029Spjd (void) zfs_error(hdl, EZFS_BADPATH, errbuf); 608185029Spjd goto error; 609185029Spjd } 610185029Spjd break; 611185029Spjd 612185029Spjd case ZPOOL_PROP_CACHEFILE: 613185029Spjd if (strval[0] == '\0') 614185029Spjd break; 615185029Spjd 616185029Spjd if (strcmp(strval, "none") == 0) 617185029Spjd break; 618185029Spjd 619185029Spjd if (strval[0] != '/') { 620185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 621185029Spjd "property '%s' must be empty, an " 622185029Spjd "absolute path, or 'none'"), propname); 623185029Spjd (void) zfs_error(hdl, EZFS_BADPATH, errbuf); 624185029Spjd goto error; 625185029Spjd } 626185029Spjd 627185029Spjd slash = strrchr(strval, '/'); 628185029Spjd 629185029Spjd if (slash[1] == '\0' || strcmp(slash, "/.") == 0 || 630185029Spjd strcmp(slash, "/..") == 0) { 631185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 632185029Spjd "'%s' is not a valid file"), strval); 633185029Spjd (void) zfs_error(hdl, EZFS_BADPATH, errbuf); 634185029Spjd goto error; 635185029Spjd } 636185029Spjd 637185029Spjd *slash = '\0'; 638185029Spjd 639185029Spjd if (strval[0] != '\0' && 640185029Spjd (stat64(strval, &statbuf) != 0 || 641185029Spjd !S_ISDIR(statbuf.st_mode))) { 642185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 643185029Spjd "'%s' is not a valid directory"), 644185029Spjd strval); 645185029Spjd (void) zfs_error(hdl, EZFS_BADPATH, errbuf); 646185029Spjd goto error; 647185029Spjd } 648185029Spjd 649185029Spjd *slash = '/'; 650185029Spjd break; 651219089Spjd 652228103Smm case ZPOOL_PROP_COMMENT: 653228103Smm for (check = strval; *check != '\0'; check++) { 654228103Smm if (!isprint(*check)) { 655228103Smm zfs_error_aux(hdl, 656228103Smm dgettext(TEXT_DOMAIN, 657228103Smm "comment may only have printable " 658228103Smm "characters")); 659228103Smm (void) zfs_error(hdl, EZFS_BADPROP, 660228103Smm errbuf); 661228103Smm goto error; 662228103Smm } 663228103Smm } 664228103Smm if (strlen(strval) > ZPROP_MAX_COMMENT) { 665228103Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 666228103Smm "comment must not exceed %d characters"), 667228103Smm ZPROP_MAX_COMMENT); 668228103Smm (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 669228103Smm goto error; 670228103Smm } 671228103Smm break; 672219089Spjd case ZPOOL_PROP_READONLY: 673219089Spjd if (!flags.import) { 674219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 675219089Spjd "property '%s' can only be set at " 676219089Spjd "import time"), propname); 677219089Spjd (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 678219089Spjd goto error; 679219089Spjd } 680219089Spjd break; 681185029Spjd } 682185029Spjd } 683185029Spjd 684185029Spjd return (retprops); 685185029Spjderror: 686185029Spjd nvlist_free(retprops); 687185029Spjd return (NULL); 688185029Spjd} 689185029Spjd 690185029Spjd/* 691185029Spjd * Set zpool property : propname=propval. 692185029Spjd */ 693185029Spjdint 694185029Spjdzpool_set_prop(zpool_handle_t *zhp, const char *propname, const char *propval) 695185029Spjd{ 696185029Spjd zfs_cmd_t zc = { 0 }; 697185029Spjd int ret = -1; 698185029Spjd char errbuf[1024]; 699185029Spjd nvlist_t *nvl = NULL; 700185029Spjd nvlist_t *realprops; 701185029Spjd uint64_t version; 702219089Spjd prop_flags_t flags = { 0 }; 703185029Spjd 704185029Spjd (void) snprintf(errbuf, sizeof (errbuf), 705185029Spjd dgettext(TEXT_DOMAIN, "cannot set property for '%s'"), 706185029Spjd zhp->zpool_name); 707185029Spjd 708185029Spjd if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0) 709185029Spjd return (no_memory(zhp->zpool_hdl)); 710185029Spjd 711185029Spjd if (nvlist_add_string(nvl, propname, propval) != 0) { 712185029Spjd nvlist_free(nvl); 713185029Spjd return (no_memory(zhp->zpool_hdl)); 714185029Spjd } 715185029Spjd 716185029Spjd version = zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL); 717185029Spjd if ((realprops = zpool_valid_proplist(zhp->zpool_hdl, 718219089Spjd zhp->zpool_name, nvl, version, flags, errbuf)) == NULL) { 719185029Spjd nvlist_free(nvl); 720185029Spjd return (-1); 721185029Spjd } 722185029Spjd 723185029Spjd nvlist_free(nvl); 724185029Spjd nvl = realprops; 725185029Spjd 726185029Spjd /* 727185029Spjd * Execute the corresponding ioctl() to set this property. 728185029Spjd */ 729185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 730185029Spjd 731185029Spjd if (zcmd_write_src_nvlist(zhp->zpool_hdl, &zc, nvl) != 0) { 732185029Spjd nvlist_free(nvl); 733185029Spjd return (-1); 734185029Spjd } 735185029Spjd 736185029Spjd ret = zfs_ioctl(zhp->zpool_hdl, ZFS_IOC_POOL_SET_PROPS, &zc); 737185029Spjd 738185029Spjd zcmd_free_nvlists(&zc); 739185029Spjd nvlist_free(nvl); 740185029Spjd 741185029Spjd if (ret) 742185029Spjd (void) zpool_standard_error(zhp->zpool_hdl, errno, errbuf); 743185029Spjd else 744185029Spjd (void) zpool_props_refresh(zhp); 745185029Spjd 746185029Spjd return (ret); 747185029Spjd} 748185029Spjd 749185029Spjdint 750185029Spjdzpool_expand_proplist(zpool_handle_t *zhp, zprop_list_t **plp) 751185029Spjd{ 752185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 753185029Spjd zprop_list_t *entry; 754185029Spjd char buf[ZFS_MAXPROPLEN]; 755236884Smm nvlist_t *features = NULL; 756236884Smm zprop_list_t **last; 757236884Smm boolean_t firstexpand = (NULL == *plp); 758185029Spjd 759185029Spjd if (zprop_expand_list(hdl, plp, ZFS_TYPE_POOL) != 0) 760185029Spjd return (-1); 761185029Spjd 762236884Smm last = plp; 763236884Smm while (*last != NULL) 764236884Smm last = &(*last)->pl_next; 765236884Smm 766236884Smm if ((*plp)->pl_all) 767236884Smm features = zpool_get_features(zhp); 768236884Smm 769236884Smm if ((*plp)->pl_all && firstexpand) { 770236884Smm for (int i = 0; i < SPA_FEATURES; i++) { 771236884Smm zprop_list_t *entry = zfs_alloc(hdl, 772236884Smm sizeof (zprop_list_t)); 773236884Smm entry->pl_prop = ZPROP_INVAL; 774236884Smm entry->pl_user_prop = zfs_asprintf(hdl, "feature@%s", 775236884Smm spa_feature_table[i].fi_uname); 776236884Smm entry->pl_width = strlen(entry->pl_user_prop); 777236884Smm entry->pl_all = B_TRUE; 778236884Smm 779236884Smm *last = entry; 780236884Smm last = &entry->pl_next; 781236884Smm } 782236884Smm } 783236884Smm 784236884Smm /* add any unsupported features */ 785236884Smm for (nvpair_t *nvp = nvlist_next_nvpair(features, NULL); 786236884Smm nvp != NULL; nvp = nvlist_next_nvpair(features, nvp)) { 787236884Smm char *propname; 788236884Smm boolean_t found; 789236884Smm zprop_list_t *entry; 790236884Smm 791236884Smm if (zfeature_is_supported(nvpair_name(nvp))) 792236884Smm continue; 793236884Smm 794236884Smm propname = zfs_asprintf(hdl, "unsupported@%s", 795236884Smm nvpair_name(nvp)); 796236884Smm 797236884Smm /* 798236884Smm * Before adding the property to the list make sure that no 799236884Smm * other pool already added the same property. 800236884Smm */ 801236884Smm found = B_FALSE; 802236884Smm entry = *plp; 803236884Smm while (entry != NULL) { 804236884Smm if (entry->pl_user_prop != NULL && 805236884Smm strcmp(propname, entry->pl_user_prop) == 0) { 806236884Smm found = B_TRUE; 807236884Smm break; 808236884Smm } 809236884Smm entry = entry->pl_next; 810236884Smm } 811236884Smm if (found) { 812236884Smm free(propname); 813236884Smm continue; 814236884Smm } 815236884Smm 816236884Smm entry = zfs_alloc(hdl, sizeof (zprop_list_t)); 817236884Smm entry->pl_prop = ZPROP_INVAL; 818236884Smm entry->pl_user_prop = propname; 819236884Smm entry->pl_width = strlen(entry->pl_user_prop); 820236884Smm entry->pl_all = B_TRUE; 821236884Smm 822236884Smm *last = entry; 823236884Smm last = &entry->pl_next; 824236884Smm } 825236884Smm 826185029Spjd for (entry = *plp; entry != NULL; entry = entry->pl_next) { 827185029Spjd 828185029Spjd if (entry->pl_fixed) 829185029Spjd continue; 830185029Spjd 831185029Spjd if (entry->pl_prop != ZPROP_INVAL && 832185029Spjd zpool_get_prop(zhp, entry->pl_prop, buf, sizeof (buf), 833263889Sdelphij NULL, B_FALSE) == 0) { 834185029Spjd if (strlen(buf) > entry->pl_width) 835185029Spjd entry->pl_width = strlen(buf); 836185029Spjd } 837185029Spjd } 838185029Spjd 839185029Spjd return (0); 840185029Spjd} 841185029Spjd 842236884Smm/* 843236884Smm * Get the state for the given feature on the given ZFS pool. 844236884Smm */ 845236884Smmint 846236884Smmzpool_prop_get_feature(zpool_handle_t *zhp, const char *propname, char *buf, 847236884Smm size_t len) 848236884Smm{ 849236884Smm uint64_t refcount; 850236884Smm boolean_t found = B_FALSE; 851236884Smm nvlist_t *features = zpool_get_features(zhp); 852236884Smm boolean_t supported; 853236884Smm const char *feature = strchr(propname, '@') + 1; 854185029Spjd 855236884Smm supported = zpool_prop_feature(propname); 856236884Smm ASSERT(supported || zpool_prop_unsupported(propname)); 857236884Smm 858236884Smm /* 859236884Smm * Convert from feature name to feature guid. This conversion is 860236884Smm * unecessary for unsupported@... properties because they already 861236884Smm * use guids. 862236884Smm */ 863236884Smm if (supported) { 864236884Smm int ret; 865259813Sdelphij spa_feature_t fid; 866236884Smm 867259813Sdelphij ret = zfeature_lookup_name(feature, &fid); 868236884Smm if (ret != 0) { 869236884Smm (void) strlcpy(buf, "-", len); 870236884Smm return (ENOTSUP); 871236884Smm } 872259813Sdelphij feature = spa_feature_table[fid].fi_guid; 873236884Smm } 874236884Smm 875236884Smm if (nvlist_lookup_uint64(features, feature, &refcount) == 0) 876236884Smm found = B_TRUE; 877236884Smm 878236884Smm if (supported) { 879236884Smm if (!found) { 880236884Smm (void) strlcpy(buf, ZFS_FEATURE_DISABLED, len); 881236884Smm } else { 882236884Smm if (refcount == 0) 883236884Smm (void) strlcpy(buf, ZFS_FEATURE_ENABLED, len); 884236884Smm else 885236884Smm (void) strlcpy(buf, ZFS_FEATURE_ACTIVE, len); 886236884Smm } 887236884Smm } else { 888236884Smm if (found) { 889236884Smm if (refcount == 0) { 890236884Smm (void) strcpy(buf, ZFS_UNSUPPORTED_INACTIVE); 891236884Smm } else { 892236884Smm (void) strcpy(buf, ZFS_UNSUPPORTED_READONLY); 893236884Smm } 894236884Smm } else { 895236884Smm (void) strlcpy(buf, "-", len); 896236884Smm return (ENOTSUP); 897236884Smm } 898236884Smm } 899236884Smm 900236884Smm return (0); 901236884Smm} 902236884Smm 903185029Spjd/* 904219089Spjd * Don't start the slice at the default block of 34; many storage 905219089Spjd * devices will use a stripe width of 128k, so start there instead. 906219089Spjd */ 907219089Spjd#define NEW_START_BLOCK 256 908219089Spjd 909219089Spjd/* 910168404Spjd * Validate the given pool name, optionally putting an extended error message in 911168404Spjd * 'buf'. 912168404Spjd */ 913185029Spjdboolean_t 914168404Spjdzpool_name_valid(libzfs_handle_t *hdl, boolean_t isopen, const char *pool) 915168404Spjd{ 916168404Spjd namecheck_err_t why; 917168404Spjd char what; 918168404Spjd int ret; 919168404Spjd 920168404Spjd ret = pool_namecheck(pool, &why, &what); 921168404Spjd 922168404Spjd /* 923168404Spjd * The rules for reserved pool names were extended at a later point. 924168404Spjd * But we need to support users with existing pools that may now be 925168404Spjd * invalid. So we only check for this expanded set of names during a 926168404Spjd * create (or import), and only in userland. 927168404Spjd */ 928168404Spjd if (ret == 0 && !isopen && 929168404Spjd (strncmp(pool, "mirror", 6) == 0 || 930168404Spjd strncmp(pool, "raidz", 5) == 0 || 931185029Spjd strncmp(pool, "spare", 5) == 0 || 932185029Spjd strcmp(pool, "log") == 0)) { 933185029Spjd if (hdl != NULL) 934185029Spjd zfs_error_aux(hdl, 935185029Spjd dgettext(TEXT_DOMAIN, "name is reserved")); 936168404Spjd return (B_FALSE); 937168404Spjd } 938168404Spjd 939168404Spjd 940168404Spjd if (ret != 0) { 941168404Spjd if (hdl != NULL) { 942168404Spjd switch (why) { 943168404Spjd case NAME_ERR_TOOLONG: 944168404Spjd zfs_error_aux(hdl, 945168404Spjd dgettext(TEXT_DOMAIN, "name is too long")); 946168404Spjd break; 947168404Spjd 948168404Spjd case NAME_ERR_INVALCHAR: 949168404Spjd zfs_error_aux(hdl, 950168404Spjd dgettext(TEXT_DOMAIN, "invalid character " 951168404Spjd "'%c' in pool name"), what); 952168404Spjd break; 953168404Spjd 954168404Spjd case NAME_ERR_NOLETTER: 955168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 956168404Spjd "name must begin with a letter")); 957168404Spjd break; 958168404Spjd 959168404Spjd case NAME_ERR_RESERVED: 960168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 961168404Spjd "name is reserved")); 962168404Spjd break; 963168404Spjd 964168404Spjd case NAME_ERR_DISKLIKE: 965168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 966168404Spjd "pool name is reserved")); 967168404Spjd break; 968168404Spjd 969168404Spjd case NAME_ERR_LEADING_SLASH: 970168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 971168404Spjd "leading slash in name")); 972168404Spjd break; 973168404Spjd 974168404Spjd case NAME_ERR_EMPTY_COMPONENT: 975168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 976168404Spjd "empty component in name")); 977168404Spjd break; 978168404Spjd 979168404Spjd case NAME_ERR_TRAILING_SLASH: 980168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 981168404Spjd "trailing slash in name")); 982168404Spjd break; 983168404Spjd 984168404Spjd case NAME_ERR_MULTIPLE_AT: 985168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 986168404Spjd "multiple '@' delimiters in name")); 987168404Spjd break; 988168404Spjd 989168404Spjd } 990168404Spjd } 991168404Spjd return (B_FALSE); 992168404Spjd } 993168404Spjd 994168404Spjd return (B_TRUE); 995168404Spjd} 996168404Spjd 997168404Spjd/* 998168404Spjd * Open a handle to the given pool, even if the pool is currently in the FAULTED 999168404Spjd * state. 1000168404Spjd */ 1001168404Spjdzpool_handle_t * 1002168404Spjdzpool_open_canfail(libzfs_handle_t *hdl, const char *pool) 1003168404Spjd{ 1004168404Spjd zpool_handle_t *zhp; 1005168404Spjd boolean_t missing; 1006168404Spjd 1007168404Spjd /* 1008168404Spjd * Make sure the pool name is valid. 1009168404Spjd */ 1010168404Spjd if (!zpool_name_valid(hdl, B_TRUE, pool)) { 1011168404Spjd (void) zfs_error_fmt(hdl, EZFS_INVALIDNAME, 1012168404Spjd dgettext(TEXT_DOMAIN, "cannot open '%s'"), 1013168404Spjd pool); 1014168404Spjd return (NULL); 1015168404Spjd } 1016168404Spjd 1017168404Spjd if ((zhp = zfs_alloc(hdl, sizeof (zpool_handle_t))) == NULL) 1018168404Spjd return (NULL); 1019168404Spjd 1020168404Spjd zhp->zpool_hdl = hdl; 1021168404Spjd (void) strlcpy(zhp->zpool_name, pool, sizeof (zhp->zpool_name)); 1022168404Spjd 1023168404Spjd if (zpool_refresh_stats(zhp, &missing) != 0) { 1024168404Spjd zpool_close(zhp); 1025168404Spjd return (NULL); 1026168404Spjd } 1027168404Spjd 1028168404Spjd if (missing) { 1029185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "no such pool")); 1030168404Spjd (void) zfs_error_fmt(hdl, EZFS_NOENT, 1031185029Spjd dgettext(TEXT_DOMAIN, "cannot open '%s'"), pool); 1032168404Spjd zpool_close(zhp); 1033168404Spjd return (NULL); 1034168404Spjd } 1035168404Spjd 1036168404Spjd return (zhp); 1037168404Spjd} 1038168404Spjd 1039168404Spjd/* 1040168404Spjd * Like the above, but silent on error. Used when iterating over pools (because 1041168404Spjd * the configuration cache may be out of date). 1042168404Spjd */ 1043168404Spjdint 1044168404Spjdzpool_open_silent(libzfs_handle_t *hdl, const char *pool, zpool_handle_t **ret) 1045168404Spjd{ 1046168404Spjd zpool_handle_t *zhp; 1047168404Spjd boolean_t missing; 1048168404Spjd 1049168404Spjd if ((zhp = zfs_alloc(hdl, sizeof (zpool_handle_t))) == NULL) 1050168404Spjd return (-1); 1051168404Spjd 1052168404Spjd zhp->zpool_hdl = hdl; 1053168404Spjd (void) strlcpy(zhp->zpool_name, pool, sizeof (zhp->zpool_name)); 1054168404Spjd 1055168404Spjd if (zpool_refresh_stats(zhp, &missing) != 0) { 1056168404Spjd zpool_close(zhp); 1057168404Spjd return (-1); 1058168404Spjd } 1059168404Spjd 1060168404Spjd if (missing) { 1061168404Spjd zpool_close(zhp); 1062168404Spjd *ret = NULL; 1063168404Spjd return (0); 1064168404Spjd } 1065168404Spjd 1066168404Spjd *ret = zhp; 1067168404Spjd return (0); 1068168404Spjd} 1069168404Spjd 1070168404Spjd/* 1071168404Spjd * Similar to zpool_open_canfail(), but refuses to open pools in the faulted 1072168404Spjd * state. 1073168404Spjd */ 1074168404Spjdzpool_handle_t * 1075168404Spjdzpool_open(libzfs_handle_t *hdl, const char *pool) 1076168404Spjd{ 1077168404Spjd zpool_handle_t *zhp; 1078168404Spjd 1079168404Spjd if ((zhp = zpool_open_canfail(hdl, pool)) == NULL) 1080168404Spjd return (NULL); 1081168404Spjd 1082168404Spjd if (zhp->zpool_state == POOL_STATE_UNAVAIL) { 1083168404Spjd (void) zfs_error_fmt(hdl, EZFS_POOLUNAVAIL, 1084168404Spjd dgettext(TEXT_DOMAIN, "cannot open '%s'"), zhp->zpool_name); 1085168404Spjd zpool_close(zhp); 1086168404Spjd return (NULL); 1087168404Spjd } 1088168404Spjd 1089168404Spjd return (zhp); 1090168404Spjd} 1091168404Spjd 1092168404Spjd/* 1093168404Spjd * Close the handle. Simply frees the memory associated with the handle. 1094168404Spjd */ 1095168404Spjdvoid 1096168404Spjdzpool_close(zpool_handle_t *zhp) 1097168404Spjd{ 1098168404Spjd if (zhp->zpool_config) 1099168404Spjd nvlist_free(zhp->zpool_config); 1100168404Spjd if (zhp->zpool_old_config) 1101168404Spjd nvlist_free(zhp->zpool_old_config); 1102168404Spjd if (zhp->zpool_props) 1103168404Spjd nvlist_free(zhp->zpool_props); 1104168404Spjd free(zhp); 1105168404Spjd} 1106168404Spjd 1107168404Spjd/* 1108168404Spjd * Return the name of the pool. 1109168404Spjd */ 1110168404Spjdconst char * 1111168404Spjdzpool_get_name(zpool_handle_t *zhp) 1112168404Spjd{ 1113168404Spjd return (zhp->zpool_name); 1114168404Spjd} 1115168404Spjd 1116168404Spjd 1117168404Spjd/* 1118168404Spjd * Return the state of the pool (ACTIVE or UNAVAILABLE) 1119168404Spjd */ 1120168404Spjdint 1121168404Spjdzpool_get_state(zpool_handle_t *zhp) 1122168404Spjd{ 1123168404Spjd return (zhp->zpool_state); 1124168404Spjd} 1125168404Spjd 1126168404Spjd/* 1127168404Spjd * Create the named pool, using the provided vdev list. It is assumed 1128168404Spjd * that the consumer has already validated the contents of the nvlist, so we 1129168404Spjd * don't have to worry about error semantics. 1130168404Spjd */ 1131168404Spjdint 1132168404Spjdzpool_create(libzfs_handle_t *hdl, const char *pool, nvlist_t *nvroot, 1133185029Spjd nvlist_t *props, nvlist_t *fsprops) 1134168404Spjd{ 1135168404Spjd zfs_cmd_t zc = { 0 }; 1136185029Spjd nvlist_t *zc_fsprops = NULL; 1137185029Spjd nvlist_t *zc_props = NULL; 1138168404Spjd char msg[1024]; 1139185029Spjd int ret = -1; 1140168404Spjd 1141168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1142168404Spjd "cannot create '%s'"), pool); 1143168404Spjd 1144168404Spjd if (!zpool_name_valid(hdl, B_FALSE, pool)) 1145168404Spjd return (zfs_error(hdl, EZFS_INVALIDNAME, msg)); 1146168404Spjd 1147185029Spjd if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0) 1148168404Spjd return (-1); 1149168404Spjd 1150185029Spjd if (props) { 1151219089Spjd prop_flags_t flags = { .create = B_TRUE, .import = B_FALSE }; 1152219089Spjd 1153185029Spjd if ((zc_props = zpool_valid_proplist(hdl, pool, props, 1154219089Spjd SPA_VERSION_1, flags, msg)) == NULL) { 1155185029Spjd goto create_failed; 1156185029Spjd } 1157185029Spjd } 1158185029Spjd 1159185029Spjd if (fsprops) { 1160185029Spjd uint64_t zoned; 1161185029Spjd char *zonestr; 1162185029Spjd 1163185029Spjd zoned = ((nvlist_lookup_string(fsprops, 1164185029Spjd zfs_prop_to_name(ZFS_PROP_ZONED), &zonestr) == 0) && 1165185029Spjd strcmp(zonestr, "on") == 0); 1166185029Spjd 1167185029Spjd if ((zc_fsprops = zfs_valid_proplist(hdl, 1168185029Spjd ZFS_TYPE_FILESYSTEM, fsprops, zoned, NULL, msg)) == NULL) { 1169185029Spjd goto create_failed; 1170185029Spjd } 1171185029Spjd if (!zc_props && 1172185029Spjd (nvlist_alloc(&zc_props, NV_UNIQUE_NAME, 0) != 0)) { 1173185029Spjd goto create_failed; 1174185029Spjd } 1175185029Spjd if (nvlist_add_nvlist(zc_props, 1176185029Spjd ZPOOL_ROOTFS_PROPS, zc_fsprops) != 0) { 1177185029Spjd goto create_failed; 1178185029Spjd } 1179185029Spjd } 1180185029Spjd 1181185029Spjd if (zc_props && zcmd_write_src_nvlist(hdl, &zc, zc_props) != 0) 1182185029Spjd goto create_failed; 1183185029Spjd 1184168404Spjd (void) strlcpy(zc.zc_name, pool, sizeof (zc.zc_name)); 1185168404Spjd 1186185029Spjd if ((ret = zfs_ioctl(hdl, ZFS_IOC_POOL_CREATE, &zc)) != 0) { 1187168404Spjd 1188168404Spjd zcmd_free_nvlists(&zc); 1189185029Spjd nvlist_free(zc_props); 1190185029Spjd nvlist_free(zc_fsprops); 1191168404Spjd 1192168404Spjd switch (errno) { 1193168404Spjd case EBUSY: 1194168404Spjd /* 1195168404Spjd * This can happen if the user has specified the same 1196168404Spjd * device multiple times. We can't reliably detect this 1197168404Spjd * until we try to add it and see we already have a 1198168404Spjd * label. 1199168404Spjd */ 1200168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1201168404Spjd "one or more vdevs refer to the same device")); 1202168404Spjd return (zfs_error(hdl, EZFS_BADDEV, msg)); 1203168404Spjd 1204168404Spjd case EOVERFLOW: 1205168404Spjd /* 1206168404Spjd * This occurs when one of the devices is below 1207168404Spjd * SPA_MINDEVSIZE. Unfortunately, we can't detect which 1208168404Spjd * device was the problem device since there's no 1209168404Spjd * reliable way to determine device size from userland. 1210168404Spjd */ 1211168404Spjd { 1212168404Spjd char buf[64]; 1213168404Spjd 1214168404Spjd zfs_nicenum(SPA_MINDEVSIZE, buf, sizeof (buf)); 1215168404Spjd 1216168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1217168404Spjd "one or more devices is less than the " 1218168404Spjd "minimum size (%s)"), buf); 1219168404Spjd } 1220168404Spjd return (zfs_error(hdl, EZFS_BADDEV, msg)); 1221168404Spjd 1222168404Spjd case ENOSPC: 1223168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1224168404Spjd "one or more devices is out of space")); 1225168404Spjd return (zfs_error(hdl, EZFS_BADDEV, msg)); 1226168404Spjd 1227185029Spjd case ENOTBLK: 1228185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1229185029Spjd "cache device must be a disk or disk slice")); 1230185029Spjd return (zfs_error(hdl, EZFS_BADDEV, msg)); 1231185029Spjd 1232168404Spjd default: 1233168404Spjd return (zpool_standard_error(hdl, errno, msg)); 1234168404Spjd } 1235168404Spjd } 1236168404Spjd 1237185029Spjdcreate_failed: 1238185029Spjd zcmd_free_nvlists(&zc); 1239185029Spjd nvlist_free(zc_props); 1240185029Spjd nvlist_free(zc_fsprops); 1241185029Spjd return (ret); 1242168404Spjd} 1243168404Spjd 1244168404Spjd/* 1245168404Spjd * Destroy the given pool. It is up to the caller to ensure that there are no 1246168404Spjd * datasets left in the pool. 1247168404Spjd */ 1248168404Spjdint 1249248571Smmzpool_destroy(zpool_handle_t *zhp, const char *log_str) 1250168404Spjd{ 1251168404Spjd zfs_cmd_t zc = { 0 }; 1252168404Spjd zfs_handle_t *zfp = NULL; 1253168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 1254168404Spjd char msg[1024]; 1255168404Spjd 1256168404Spjd if (zhp->zpool_state == POOL_STATE_ACTIVE && 1257219089Spjd (zfp = zfs_open(hdl, zhp->zpool_name, ZFS_TYPE_FILESYSTEM)) == NULL) 1258168404Spjd return (-1); 1259168404Spjd 1260168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 1261248571Smm zc.zc_history = (uint64_t)(uintptr_t)log_str; 1262168404Spjd 1263219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_POOL_DESTROY, &zc) != 0) { 1264168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1265168404Spjd "cannot destroy '%s'"), zhp->zpool_name); 1266168404Spjd 1267168404Spjd if (errno == EROFS) { 1268168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1269168404Spjd "one or more devices is read only")); 1270168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 1271168404Spjd } else { 1272168404Spjd (void) zpool_standard_error(hdl, errno, msg); 1273168404Spjd } 1274168404Spjd 1275168404Spjd if (zfp) 1276168404Spjd zfs_close(zfp); 1277168404Spjd return (-1); 1278168404Spjd } 1279168404Spjd 1280168404Spjd if (zfp) { 1281168404Spjd remove_mountpoint(zfp); 1282168404Spjd zfs_close(zfp); 1283168404Spjd } 1284168404Spjd 1285168404Spjd return (0); 1286168404Spjd} 1287168404Spjd 1288168404Spjd/* 1289168404Spjd * Add the given vdevs to the pool. The caller must have already performed the 1290168404Spjd * necessary verification to ensure that the vdev specification is well-formed. 1291168404Spjd */ 1292168404Spjdint 1293168404Spjdzpool_add(zpool_handle_t *zhp, nvlist_t *nvroot) 1294168404Spjd{ 1295168404Spjd zfs_cmd_t zc = { 0 }; 1296168404Spjd int ret; 1297168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 1298168404Spjd char msg[1024]; 1299185029Spjd nvlist_t **spares, **l2cache; 1300185029Spjd uint_t nspares, nl2cache; 1301168404Spjd 1302168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1303168404Spjd "cannot add to '%s'"), zhp->zpool_name); 1304168404Spjd 1305185029Spjd if (zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL) < 1306185029Spjd SPA_VERSION_SPARES && 1307168404Spjd nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_SPARES, 1308168404Spjd &spares, &nspares) == 0) { 1309168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "pool must be " 1310168404Spjd "upgraded to add hot spares")); 1311168404Spjd return (zfs_error(hdl, EZFS_BADVERSION, msg)); 1312168404Spjd } 1313168404Spjd 1314236155Smm if (zpool_is_bootable(zhp) && nvlist_lookup_nvlist_array(nvroot, 1315209962Smm ZPOOL_CONFIG_SPARES, &spares, &nspares) == 0) { 1316209962Smm uint64_t s; 1317209962Smm 1318209962Smm for (s = 0; s < nspares; s++) { 1319209962Smm char *path; 1320209962Smm 1321209962Smm if (nvlist_lookup_string(spares[s], ZPOOL_CONFIG_PATH, 1322209962Smm &path) == 0 && pool_uses_efi(spares[s])) { 1323209962Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1324209962Smm "device '%s' contains an EFI label and " 1325209962Smm "cannot be used on root pools."), 1326219089Spjd zpool_vdev_name(hdl, NULL, spares[s], 1327219089Spjd B_FALSE)); 1328209962Smm return (zfs_error(hdl, EZFS_POOL_NOTSUP, msg)); 1329209962Smm } 1330209962Smm } 1331209962Smm } 1332209962Smm 1333185029Spjd if (zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL) < 1334185029Spjd SPA_VERSION_L2CACHE && 1335185029Spjd nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_L2CACHE, 1336185029Spjd &l2cache, &nl2cache) == 0) { 1337185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "pool must be " 1338185029Spjd "upgraded to add cache devices")); 1339185029Spjd return (zfs_error(hdl, EZFS_BADVERSION, msg)); 1340185029Spjd } 1341185029Spjd 1342185029Spjd if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0) 1343168404Spjd return (-1); 1344168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 1345168404Spjd 1346219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_ADD, &zc) != 0) { 1347168404Spjd switch (errno) { 1348168404Spjd case EBUSY: 1349168404Spjd /* 1350168404Spjd * This can happen if the user has specified the same 1351168404Spjd * device multiple times. We can't reliably detect this 1352168404Spjd * until we try to add it and see we already have a 1353168404Spjd * label. 1354168404Spjd */ 1355168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1356168404Spjd "one or more vdevs refer to the same device")); 1357168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 1358168404Spjd break; 1359168404Spjd 1360168404Spjd case EOVERFLOW: 1361168404Spjd /* 1362168404Spjd * This occurrs when one of the devices is below 1363168404Spjd * SPA_MINDEVSIZE. Unfortunately, we can't detect which 1364168404Spjd * device was the problem device since there's no 1365168404Spjd * reliable way to determine device size from userland. 1366168404Spjd */ 1367168404Spjd { 1368168404Spjd char buf[64]; 1369168404Spjd 1370168404Spjd zfs_nicenum(SPA_MINDEVSIZE, buf, sizeof (buf)); 1371168404Spjd 1372168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1373168404Spjd "device is less than the minimum " 1374168404Spjd "size (%s)"), buf); 1375168404Spjd } 1376168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 1377168404Spjd break; 1378168404Spjd 1379168404Spjd case ENOTSUP: 1380168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1381185029Spjd "pool must be upgraded to add these vdevs")); 1382168404Spjd (void) zfs_error(hdl, EZFS_BADVERSION, msg); 1383168404Spjd break; 1384168404Spjd 1385168404Spjd case EDOM: 1386168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1387185029Spjd "root pool can not have multiple vdevs" 1388185029Spjd " or separate logs")); 1389168404Spjd (void) zfs_error(hdl, EZFS_POOL_NOTSUP, msg); 1390168404Spjd break; 1391168404Spjd 1392185029Spjd case ENOTBLK: 1393185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1394185029Spjd "cache device must be a disk or disk slice")); 1395185029Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 1396185029Spjd break; 1397185029Spjd 1398168404Spjd default: 1399168404Spjd (void) zpool_standard_error(hdl, errno, msg); 1400168404Spjd } 1401168404Spjd 1402168404Spjd ret = -1; 1403168404Spjd } else { 1404168404Spjd ret = 0; 1405168404Spjd } 1406168404Spjd 1407168404Spjd zcmd_free_nvlists(&zc); 1408168404Spjd 1409168404Spjd return (ret); 1410168404Spjd} 1411168404Spjd 1412168404Spjd/* 1413168404Spjd * Exports the pool from the system. The caller must ensure that there are no 1414168404Spjd * mounted datasets in the pool. 1415168404Spjd */ 1416248571Smmstatic int 1417248571Smmzpool_export_common(zpool_handle_t *zhp, boolean_t force, boolean_t hardforce, 1418248571Smm const char *log_str) 1419168404Spjd{ 1420168404Spjd zfs_cmd_t zc = { 0 }; 1421185029Spjd char msg[1024]; 1422168404Spjd 1423185029Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 1424185029Spjd "cannot export '%s'"), zhp->zpool_name); 1425185029Spjd 1426168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 1427185029Spjd zc.zc_cookie = force; 1428207670Smm zc.zc_guid = hardforce; 1429248571Smm zc.zc_history = (uint64_t)(uintptr_t)log_str; 1430168404Spjd 1431185029Spjd if (zfs_ioctl(zhp->zpool_hdl, ZFS_IOC_POOL_EXPORT, &zc) != 0) { 1432185029Spjd switch (errno) { 1433185029Spjd case EXDEV: 1434185029Spjd zfs_error_aux(zhp->zpool_hdl, dgettext(TEXT_DOMAIN, 1435185029Spjd "use '-f' to override the following errors:\n" 1436185029Spjd "'%s' has an active shared spare which could be" 1437185029Spjd " used by other pools once '%s' is exported."), 1438185029Spjd zhp->zpool_name, zhp->zpool_name); 1439185029Spjd return (zfs_error(zhp->zpool_hdl, EZFS_ACTIVE_SPARE, 1440185029Spjd msg)); 1441185029Spjd default: 1442185029Spjd return (zpool_standard_error_fmt(zhp->zpool_hdl, errno, 1443185029Spjd msg)); 1444185029Spjd } 1445185029Spjd } 1446185029Spjd 1447168404Spjd return (0); 1448168404Spjd} 1449168404Spjd 1450207670Smmint 1451248571Smmzpool_export(zpool_handle_t *zhp, boolean_t force, const char *log_str) 1452207670Smm{ 1453248571Smm return (zpool_export_common(zhp, force, B_FALSE, log_str)); 1454207670Smm} 1455207670Smm 1456207670Smmint 1457248571Smmzpool_export_force(zpool_handle_t *zhp, const char *log_str) 1458207670Smm{ 1459248571Smm return (zpool_export_common(zhp, B_TRUE, B_TRUE, log_str)); 1460207670Smm} 1461207670Smm 1462219089Spjdstatic void 1463219089Spjdzpool_rewind_exclaim(libzfs_handle_t *hdl, const char *name, boolean_t dryrun, 1464219089Spjd nvlist_t *config) 1465219089Spjd{ 1466219089Spjd nvlist_t *nv = NULL; 1467219089Spjd uint64_t rewindto; 1468219089Spjd int64_t loss = -1; 1469219089Spjd struct tm t; 1470219089Spjd char timestr[128]; 1471219089Spjd 1472219089Spjd if (!hdl->libzfs_printerr || config == NULL) 1473219089Spjd return; 1474219089Spjd 1475236884Smm if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nv) != 0 || 1476236884Smm nvlist_lookup_nvlist(nv, ZPOOL_CONFIG_REWIND_INFO, &nv) != 0) { 1477219089Spjd return; 1478236884Smm } 1479219089Spjd 1480219089Spjd if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_TIME, &rewindto) != 0) 1481219089Spjd return; 1482219089Spjd (void) nvlist_lookup_int64(nv, ZPOOL_CONFIG_REWIND_TIME, &loss); 1483219089Spjd 1484219089Spjd if (localtime_r((time_t *)&rewindto, &t) != NULL && 1485219089Spjd strftime(timestr, 128, 0, &t) != 0) { 1486219089Spjd if (dryrun) { 1487219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1488219089Spjd "Would be able to return %s " 1489219089Spjd "to its state as of %s.\n"), 1490219089Spjd name, timestr); 1491219089Spjd } else { 1492219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1493219089Spjd "Pool %s returned to its state as of %s.\n"), 1494219089Spjd name, timestr); 1495219089Spjd } 1496219089Spjd if (loss > 120) { 1497219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1498219089Spjd "%s approximately %lld "), 1499219089Spjd dryrun ? "Would discard" : "Discarded", 1500219089Spjd (loss + 30) / 60); 1501219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1502219089Spjd "minutes of transactions.\n")); 1503219089Spjd } else if (loss > 0) { 1504219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1505219089Spjd "%s approximately %lld "), 1506219089Spjd dryrun ? "Would discard" : "Discarded", loss); 1507219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1508219089Spjd "seconds of transactions.\n")); 1509219089Spjd } 1510219089Spjd } 1511219089Spjd} 1512219089Spjd 1513219089Spjdvoid 1514219089Spjdzpool_explain_recover(libzfs_handle_t *hdl, const char *name, int reason, 1515219089Spjd nvlist_t *config) 1516219089Spjd{ 1517219089Spjd nvlist_t *nv = NULL; 1518219089Spjd int64_t loss = -1; 1519219089Spjd uint64_t edata = UINT64_MAX; 1520219089Spjd uint64_t rewindto; 1521219089Spjd struct tm t; 1522219089Spjd char timestr[128]; 1523219089Spjd 1524219089Spjd if (!hdl->libzfs_printerr) 1525219089Spjd return; 1526219089Spjd 1527219089Spjd if (reason >= 0) 1528219089Spjd (void) printf(dgettext(TEXT_DOMAIN, "action: ")); 1529219089Spjd else 1530219089Spjd (void) printf(dgettext(TEXT_DOMAIN, "\t")); 1531219089Spjd 1532219089Spjd /* All attempted rewinds failed if ZPOOL_CONFIG_LOAD_TIME missing */ 1533219089Spjd if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nv) != 0 || 1534236884Smm nvlist_lookup_nvlist(nv, ZPOOL_CONFIG_REWIND_INFO, &nv) != 0 || 1535219089Spjd nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_TIME, &rewindto) != 0) 1536219089Spjd goto no_info; 1537219089Spjd 1538219089Spjd (void) nvlist_lookup_int64(nv, ZPOOL_CONFIG_REWIND_TIME, &loss); 1539219089Spjd (void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_DATA_ERRORS, 1540219089Spjd &edata); 1541219089Spjd 1542219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1543219089Spjd "Recovery is possible, but will result in some data loss.\n")); 1544219089Spjd 1545219089Spjd if (localtime_r((time_t *)&rewindto, &t) != NULL && 1546219089Spjd strftime(timestr, 128, 0, &t) != 0) { 1547219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1548219089Spjd "\tReturning the pool to its state as of %s\n" 1549219089Spjd "\tshould correct the problem. "), 1550219089Spjd timestr); 1551219089Spjd } else { 1552219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1553219089Spjd "\tReverting the pool to an earlier state " 1554219089Spjd "should correct the problem.\n\t")); 1555219089Spjd } 1556219089Spjd 1557219089Spjd if (loss > 120) { 1558219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1559219089Spjd "Approximately %lld minutes of data\n" 1560219089Spjd "\tmust be discarded, irreversibly. "), (loss + 30) / 60); 1561219089Spjd } else if (loss > 0) { 1562219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1563219089Spjd "Approximately %lld seconds of data\n" 1564219089Spjd "\tmust be discarded, irreversibly. "), loss); 1565219089Spjd } 1566219089Spjd if (edata != 0 && edata != UINT64_MAX) { 1567219089Spjd if (edata == 1) { 1568219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1569219089Spjd "After rewind, at least\n" 1570219089Spjd "\tone persistent user-data error will remain. ")); 1571219089Spjd } else { 1572219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1573219089Spjd "After rewind, several\n" 1574219089Spjd "\tpersistent user-data errors will remain. ")); 1575219089Spjd } 1576219089Spjd } 1577219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1578219089Spjd "Recovery can be attempted\n\tby executing 'zpool %s -F %s'. "), 1579219089Spjd reason >= 0 ? "clear" : "import", name); 1580219089Spjd 1581219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1582219089Spjd "A scrub of the pool\n" 1583219089Spjd "\tis strongly recommended after recovery.\n")); 1584219089Spjd return; 1585219089Spjd 1586219089Spjdno_info: 1587219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1588219089Spjd "Destroy and re-create the pool from\n\ta backup source.\n")); 1589219089Spjd} 1590219089Spjd 1591168404Spjd/* 1592185029Spjd * zpool_import() is a contracted interface. Should be kept the same 1593185029Spjd * if possible. 1594185029Spjd * 1595185029Spjd * Applications should use zpool_import_props() to import a pool with 1596185029Spjd * new properties value to be set. 1597168404Spjd */ 1598168404Spjdint 1599168404Spjdzpool_import(libzfs_handle_t *hdl, nvlist_t *config, const char *newname, 1600185029Spjd char *altroot) 1601168404Spjd{ 1602185029Spjd nvlist_t *props = NULL; 1603185029Spjd int ret; 1604185029Spjd 1605185029Spjd if (altroot != NULL) { 1606185029Spjd if (nvlist_alloc(&props, NV_UNIQUE_NAME, 0) != 0) { 1607185029Spjd return (zfs_error_fmt(hdl, EZFS_NOMEM, 1608185029Spjd dgettext(TEXT_DOMAIN, "cannot import '%s'"), 1609185029Spjd newname)); 1610185029Spjd } 1611185029Spjd 1612185029Spjd if (nvlist_add_string(props, 1613209962Smm zpool_prop_to_name(ZPOOL_PROP_ALTROOT), altroot) != 0 || 1614209962Smm nvlist_add_string(props, 1615209962Smm zpool_prop_to_name(ZPOOL_PROP_CACHEFILE), "none") != 0) { 1616185029Spjd nvlist_free(props); 1617185029Spjd return (zfs_error_fmt(hdl, EZFS_NOMEM, 1618185029Spjd dgettext(TEXT_DOMAIN, "cannot import '%s'"), 1619185029Spjd newname)); 1620185029Spjd } 1621185029Spjd } 1622185029Spjd 1623219089Spjd ret = zpool_import_props(hdl, config, newname, props, 1624219089Spjd ZFS_IMPORT_NORMAL); 1625185029Spjd if (props) 1626185029Spjd nvlist_free(props); 1627185029Spjd return (ret); 1628185029Spjd} 1629185029Spjd 1630219089Spjdstatic void 1631219089Spjdprint_vdev_tree(libzfs_handle_t *hdl, const char *name, nvlist_t *nv, 1632219089Spjd int indent) 1633219089Spjd{ 1634219089Spjd nvlist_t **child; 1635219089Spjd uint_t c, children; 1636219089Spjd char *vname; 1637219089Spjd uint64_t is_log = 0; 1638219089Spjd 1639219089Spjd (void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_IS_LOG, 1640219089Spjd &is_log); 1641219089Spjd 1642219089Spjd if (name != NULL) 1643219089Spjd (void) printf("\t%*s%s%s\n", indent, "", name, 1644219089Spjd is_log ? " [log]" : ""); 1645219089Spjd 1646219089Spjd if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_CHILDREN, 1647219089Spjd &child, &children) != 0) 1648219089Spjd return; 1649219089Spjd 1650219089Spjd for (c = 0; c < children; c++) { 1651219089Spjd vname = zpool_vdev_name(hdl, NULL, child[c], B_TRUE); 1652219089Spjd print_vdev_tree(hdl, vname, child[c], indent + 2); 1653219089Spjd free(vname); 1654219089Spjd } 1655219089Spjd} 1656219089Spjd 1657236884Smmvoid 1658236884Smmzpool_print_unsup_feat(nvlist_t *config) 1659236884Smm{ 1660236884Smm nvlist_t *nvinfo, *unsup_feat; 1661236884Smm 1662236884Smm verify(nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nvinfo) == 1663236884Smm 0); 1664236884Smm verify(nvlist_lookup_nvlist(nvinfo, ZPOOL_CONFIG_UNSUP_FEAT, 1665236884Smm &unsup_feat) == 0); 1666236884Smm 1667236884Smm for (nvpair_t *nvp = nvlist_next_nvpair(unsup_feat, NULL); nvp != NULL; 1668236884Smm nvp = nvlist_next_nvpair(unsup_feat, nvp)) { 1669236884Smm char *desc; 1670236884Smm 1671236884Smm verify(nvpair_type(nvp) == DATA_TYPE_STRING); 1672236884Smm verify(nvpair_value_string(nvp, &desc) == 0); 1673236884Smm 1674236884Smm if (strlen(desc) > 0) 1675236884Smm (void) printf("\t%s (%s)\n", nvpair_name(nvp), desc); 1676236884Smm else 1677236884Smm (void) printf("\t%s\n", nvpair_name(nvp)); 1678236884Smm } 1679236884Smm} 1680236884Smm 1681185029Spjd/* 1682185029Spjd * Import the given pool using the known configuration and a list of 1683185029Spjd * properties to be set. The configuration should have come from 1684185029Spjd * zpool_find_import(). The 'newname' parameters control whether the pool 1685185029Spjd * is imported with a different name. 1686185029Spjd */ 1687185029Spjdint 1688185029Spjdzpool_import_props(libzfs_handle_t *hdl, nvlist_t *config, const char *newname, 1689219089Spjd nvlist_t *props, int flags) 1690185029Spjd{ 1691168404Spjd zfs_cmd_t zc = { 0 }; 1692219089Spjd zpool_rewind_policy_t policy; 1693219089Spjd nvlist_t *nv = NULL; 1694219089Spjd nvlist_t *nvinfo = NULL; 1695219089Spjd nvlist_t *missing = NULL; 1696168404Spjd char *thename; 1697168404Spjd char *origname; 1698168404Spjd int ret; 1699219089Spjd int error = 0; 1700185029Spjd char errbuf[1024]; 1701168404Spjd 1702168404Spjd verify(nvlist_lookup_string(config, ZPOOL_CONFIG_POOL_NAME, 1703168404Spjd &origname) == 0); 1704168404Spjd 1705185029Spjd (void) snprintf(errbuf, sizeof (errbuf), dgettext(TEXT_DOMAIN, 1706185029Spjd "cannot import pool '%s'"), origname); 1707185029Spjd 1708168404Spjd if (newname != NULL) { 1709168404Spjd if (!zpool_name_valid(hdl, B_FALSE, newname)) 1710168404Spjd return (zfs_error_fmt(hdl, EZFS_INVALIDNAME, 1711168404Spjd dgettext(TEXT_DOMAIN, "cannot import '%s'"), 1712168404Spjd newname)); 1713168404Spjd thename = (char *)newname; 1714168404Spjd } else { 1715168404Spjd thename = origname; 1716168404Spjd } 1717168404Spjd 1718185029Spjd if (props) { 1719185029Spjd uint64_t version; 1720219089Spjd prop_flags_t flags = { .create = B_FALSE, .import = B_TRUE }; 1721168404Spjd 1722185029Spjd verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_VERSION, 1723185029Spjd &version) == 0); 1724185029Spjd 1725185029Spjd if ((props = zpool_valid_proplist(hdl, origname, 1726219089Spjd props, version, flags, errbuf)) == NULL) { 1727185029Spjd return (-1); 1728185029Spjd } else if (zcmd_write_src_nvlist(hdl, &zc, props) != 0) { 1729185029Spjd nvlist_free(props); 1730185029Spjd return (-1); 1731185029Spjd } 1732185029Spjd } 1733185029Spjd 1734168404Spjd (void) strlcpy(zc.zc_name, thename, sizeof (zc.zc_name)); 1735168404Spjd 1736168404Spjd verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID, 1737168404Spjd &zc.zc_guid) == 0); 1738168404Spjd 1739185029Spjd if (zcmd_write_conf_nvlist(hdl, &zc, config) != 0) { 1740185029Spjd nvlist_free(props); 1741168404Spjd return (-1); 1742185029Spjd } 1743219089Spjd if (zcmd_alloc_dst_nvlist(hdl, &zc, zc.zc_nvlist_conf_size * 2) != 0) { 1744219089Spjd nvlist_free(props); 1745219089Spjd return (-1); 1746219089Spjd } 1747168404Spjd 1748219089Spjd zc.zc_cookie = flags; 1749219089Spjd while ((ret = zfs_ioctl(hdl, ZFS_IOC_POOL_IMPORT, &zc)) != 0 && 1750219089Spjd errno == ENOMEM) { 1751219089Spjd if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) { 1752219089Spjd zcmd_free_nvlists(&zc); 1753219089Spjd return (-1); 1754219089Spjd } 1755219089Spjd } 1756219089Spjd if (ret != 0) 1757219089Spjd error = errno; 1758219089Spjd 1759219089Spjd (void) zcmd_read_dst_nvlist(hdl, &zc, &nv); 1760219089Spjd zpool_get_rewind_policy(config, &policy); 1761219089Spjd 1762219089Spjd if (error) { 1763168404Spjd char desc[1024]; 1764219089Spjd 1765219089Spjd /* 1766219089Spjd * Dry-run failed, but we print out what success 1767219089Spjd * looks like if we found a best txg 1768219089Spjd */ 1769219089Spjd if (policy.zrp_request & ZPOOL_TRY_REWIND) { 1770219089Spjd zpool_rewind_exclaim(hdl, newname ? origname : thename, 1771219089Spjd B_TRUE, nv); 1772219089Spjd nvlist_free(nv); 1773219089Spjd return (-1); 1774219089Spjd } 1775219089Spjd 1776168404Spjd if (newname == NULL) 1777168404Spjd (void) snprintf(desc, sizeof (desc), 1778168404Spjd dgettext(TEXT_DOMAIN, "cannot import '%s'"), 1779168404Spjd thename); 1780168404Spjd else 1781168404Spjd (void) snprintf(desc, sizeof (desc), 1782168404Spjd dgettext(TEXT_DOMAIN, "cannot import '%s' as '%s'"), 1783168404Spjd origname, thename); 1784168404Spjd 1785219089Spjd switch (error) { 1786168404Spjd case ENOTSUP: 1787236884Smm if (nv != NULL && nvlist_lookup_nvlist(nv, 1788236884Smm ZPOOL_CONFIG_LOAD_INFO, &nvinfo) == 0 && 1789236884Smm nvlist_exists(nvinfo, ZPOOL_CONFIG_UNSUP_FEAT)) { 1790236884Smm (void) printf(dgettext(TEXT_DOMAIN, "This " 1791236884Smm "pool uses the following feature(s) not " 1792236884Smm "supported by this system:\n")); 1793236884Smm zpool_print_unsup_feat(nv); 1794236884Smm if (nvlist_exists(nvinfo, 1795236884Smm ZPOOL_CONFIG_CAN_RDONLY)) { 1796236884Smm (void) printf(dgettext(TEXT_DOMAIN, 1797236884Smm "All unsupported features are only " 1798236884Smm "required for writing to the pool." 1799236884Smm "\nThe pool can be imported using " 1800236884Smm "'-o readonly=on'.\n")); 1801236884Smm } 1802236884Smm } 1803168404Spjd /* 1804168404Spjd * Unsupported version. 1805168404Spjd */ 1806168404Spjd (void) zfs_error(hdl, EZFS_BADVERSION, desc); 1807168404Spjd break; 1808168404Spjd 1809168404Spjd case EINVAL: 1810168404Spjd (void) zfs_error(hdl, EZFS_INVALCONFIG, desc); 1811168404Spjd break; 1812168404Spjd 1813219089Spjd case EROFS: 1814219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 1815219089Spjd "one or more devices is read only")); 1816219089Spjd (void) zfs_error(hdl, EZFS_BADDEV, desc); 1817219089Spjd break; 1818219089Spjd 1819219089Spjd case ENXIO: 1820219089Spjd if (nv && nvlist_lookup_nvlist(nv, 1821219089Spjd ZPOOL_CONFIG_LOAD_INFO, &nvinfo) == 0 && 1822219089Spjd nvlist_lookup_nvlist(nvinfo, 1823219089Spjd ZPOOL_CONFIG_MISSING_DEVICES, &missing) == 0) { 1824219089Spjd (void) printf(dgettext(TEXT_DOMAIN, 1825219089Spjd "The devices below are missing, use " 1826219089Spjd "'-m' to import the pool anyway:\n")); 1827219089Spjd print_vdev_tree(hdl, NULL, missing, 2); 1828219089Spjd (void) printf("\n"); 1829219089Spjd } 1830219089Spjd (void) zpool_standard_error(hdl, error, desc); 1831219089Spjd break; 1832219089Spjd 1833219089Spjd case EEXIST: 1834219089Spjd (void) zpool_standard_error(hdl, error, desc); 1835219089Spjd break; 1836219089Spjd 1837168404Spjd default: 1838219089Spjd (void) zpool_standard_error(hdl, error, desc); 1839219089Spjd zpool_explain_recover(hdl, 1840219089Spjd newname ? origname : thename, -error, nv); 1841219089Spjd break; 1842168404Spjd } 1843168404Spjd 1844219089Spjd nvlist_free(nv); 1845168404Spjd ret = -1; 1846168404Spjd } else { 1847168404Spjd zpool_handle_t *zhp; 1848185029Spjd 1849168404Spjd /* 1850168404Spjd * This should never fail, but play it safe anyway. 1851168404Spjd */ 1852219089Spjd if (zpool_open_silent(hdl, thename, &zhp) != 0) 1853168404Spjd ret = -1; 1854219089Spjd else if (zhp != NULL) 1855168404Spjd zpool_close(zhp); 1856219089Spjd if (policy.zrp_request & 1857219089Spjd (ZPOOL_DO_REWIND | ZPOOL_TRY_REWIND)) { 1858219089Spjd zpool_rewind_exclaim(hdl, newname ? origname : thename, 1859219089Spjd ((policy.zrp_request & ZPOOL_TRY_REWIND) != 0), nv); 1860168404Spjd } 1861219089Spjd nvlist_free(nv); 1862219089Spjd return (0); 1863168404Spjd } 1864168404Spjd 1865168404Spjd zcmd_free_nvlists(&zc); 1866185029Spjd nvlist_free(props); 1867185029Spjd 1868168404Spjd return (ret); 1869168404Spjd} 1870168404Spjd 1871168404Spjd/* 1872219089Spjd * Scan the pool. 1873168404Spjd */ 1874168404Spjdint 1875219089Spjdzpool_scan(zpool_handle_t *zhp, pool_scan_func_t func) 1876168404Spjd{ 1877168404Spjd zfs_cmd_t zc = { 0 }; 1878168404Spjd char msg[1024]; 1879168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 1880168404Spjd 1881168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 1882219089Spjd zc.zc_cookie = func; 1883168404Spjd 1884219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_POOL_SCAN, &zc) == 0 || 1885219089Spjd (errno == ENOENT && func != POOL_SCAN_NONE)) 1886168404Spjd return (0); 1887168404Spjd 1888219089Spjd if (func == POOL_SCAN_SCRUB) { 1889219089Spjd (void) snprintf(msg, sizeof (msg), 1890219089Spjd dgettext(TEXT_DOMAIN, "cannot scrub %s"), zc.zc_name); 1891219089Spjd } else if (func == POOL_SCAN_NONE) { 1892219089Spjd (void) snprintf(msg, sizeof (msg), 1893219089Spjd dgettext(TEXT_DOMAIN, "cannot cancel scrubbing %s"), 1894219089Spjd zc.zc_name); 1895219089Spjd } else { 1896219089Spjd assert(!"unexpected result"); 1897219089Spjd } 1898168404Spjd 1899219089Spjd if (errno == EBUSY) { 1900219089Spjd nvlist_t *nvroot; 1901219089Spjd pool_scan_stat_t *ps = NULL; 1902219089Spjd uint_t psc; 1903219089Spjd 1904219089Spjd verify(nvlist_lookup_nvlist(zhp->zpool_config, 1905219089Spjd ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0); 1906219089Spjd (void) nvlist_lookup_uint64_array(nvroot, 1907219089Spjd ZPOOL_CONFIG_SCAN_STATS, (uint64_t **)&ps, &psc); 1908219089Spjd if (ps && ps->pss_func == POOL_SCAN_SCRUB) 1909219089Spjd return (zfs_error(hdl, EZFS_SCRUBBING, msg)); 1910219089Spjd else 1911219089Spjd return (zfs_error(hdl, EZFS_RESILVERING, msg)); 1912219089Spjd } else if (errno == ENOENT) { 1913219089Spjd return (zfs_error(hdl, EZFS_NO_SCRUB, msg)); 1914219089Spjd } else { 1915168404Spjd return (zpool_standard_error(hdl, errno, msg)); 1916219089Spjd } 1917168404Spjd} 1918168404Spjd 1919168404Spjd/* 1920219089Spjd * This provides a very minimal check whether a given string is likely a 1921219089Spjd * c#t#d# style string. Users of this are expected to do their own 1922219089Spjd * verification of the s# part. 1923219089Spjd */ 1924219089Spjd#define CTD_CHECK(str) (str && str[0] == 'c' && isdigit(str[1])) 1925219089Spjd 1926219089Spjd/* 1927219089Spjd * More elaborate version for ones which may start with "/dev/dsk/" 1928219089Spjd * and the like. 1929219089Spjd */ 1930219089Spjdstatic int 1931219089Spjdctd_check_path(char *str) { 1932219089Spjd /* 1933219089Spjd * If it starts with a slash, check the last component. 1934219089Spjd */ 1935219089Spjd if (str && str[0] == '/') { 1936219089Spjd char *tmp = strrchr(str, '/'); 1937219089Spjd 1938219089Spjd /* 1939219089Spjd * If it ends in "/old", check the second-to-last 1940219089Spjd * component of the string instead. 1941219089Spjd */ 1942219089Spjd if (tmp != str && strcmp(tmp, "/old") == 0) { 1943219089Spjd for (tmp--; *tmp != '/'; tmp--) 1944219089Spjd ; 1945219089Spjd } 1946219089Spjd str = tmp + 1; 1947219089Spjd } 1948219089Spjd return (CTD_CHECK(str)); 1949219089Spjd} 1950219089Spjd 1951219089Spjd/* 1952219089Spjd * Find a vdev that matches the search criteria specified. We use the 1953219089Spjd * the nvpair name to determine how we should look for the device. 1954168404Spjd * 'avail_spare' is set to TRUE if the provided guid refers to an AVAIL 1955168404Spjd * spare; but FALSE if its an INUSE spare. 1956168404Spjd */ 1957168404Spjdstatic nvlist_t * 1958219089Spjdvdev_to_nvlist_iter(nvlist_t *nv, nvlist_t *search, boolean_t *avail_spare, 1959219089Spjd boolean_t *l2cache, boolean_t *log) 1960168404Spjd{ 1961168404Spjd uint_t c, children; 1962168404Spjd nvlist_t **child; 1963168404Spjd nvlist_t *ret; 1964185029Spjd uint64_t is_log; 1965219089Spjd char *srchkey; 1966219089Spjd nvpair_t *pair = nvlist_next_nvpair(search, NULL); 1967168404Spjd 1968219089Spjd /* Nothing to look for */ 1969219089Spjd if (search == NULL || pair == NULL) 1970219089Spjd return (NULL); 1971168404Spjd 1972219089Spjd /* Obtain the key we will use to search */ 1973219089Spjd srchkey = nvpair_name(pair); 1974219089Spjd 1975219089Spjd switch (nvpair_type(pair)) { 1976219089Spjd case DATA_TYPE_UINT64: 1977219089Spjd if (strcmp(srchkey, ZPOOL_CONFIG_GUID) == 0) { 1978219089Spjd uint64_t srchval, theguid; 1979219089Spjd 1980219089Spjd verify(nvpair_value_uint64(pair, &srchval) == 0); 1981219089Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, 1982219089Spjd &theguid) == 0); 1983219089Spjd if (theguid == srchval) 1984219089Spjd return (nv); 1985219089Spjd } 1986219089Spjd break; 1987219089Spjd 1988219089Spjd case DATA_TYPE_STRING: { 1989219089Spjd char *srchval, *val; 1990219089Spjd 1991219089Spjd verify(nvpair_value_string(pair, &srchval) == 0); 1992219089Spjd if (nvlist_lookup_string(nv, srchkey, &val) != 0) 1993219089Spjd break; 1994219089Spjd 1995168404Spjd /* 1996219089Spjd * Search for the requested value. Special cases: 1997219089Spjd * 1998219089Spjd * - ZPOOL_CONFIG_PATH for whole disk entries. These end in 1999219089Spjd * "s0" or "s0/old". The "s0" part is hidden from the user, 2000219089Spjd * but included in the string, so this matches around it. 2001219089Spjd * - looking for a top-level vdev name (i.e. ZPOOL_CONFIG_TYPE). 2002219089Spjd * 2003219089Spjd * Otherwise, all other searches are simple string compares. 2004168404Spjd */ 2005219089Spjd if (strcmp(srchkey, ZPOOL_CONFIG_PATH) == 0 && 2006219089Spjd ctd_check_path(val)) { 2007219089Spjd uint64_t wholedisk = 0; 2008219089Spjd 2009219089Spjd (void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_WHOLE_DISK, 2010219089Spjd &wholedisk); 2011219089Spjd if (wholedisk) { 2012219089Spjd int slen = strlen(srchval); 2013219089Spjd int vlen = strlen(val); 2014219089Spjd 2015219089Spjd if (slen != vlen - 2) 2016219089Spjd break; 2017219089Spjd 2018219089Spjd /* 2019219089Spjd * make_leaf_vdev() should only set 2020219089Spjd * wholedisk for ZPOOL_CONFIG_PATHs which 2021219089Spjd * will include "/dev/dsk/", giving plenty of 2022219089Spjd * room for the indices used next. 2023219089Spjd */ 2024219089Spjd ASSERT(vlen >= 6); 2025219089Spjd 2026219089Spjd /* 2027219089Spjd * strings identical except trailing "s0" 2028219089Spjd */ 2029219089Spjd if (strcmp(&val[vlen - 2], "s0") == 0 && 2030219089Spjd strncmp(srchval, val, slen) == 0) 2031219089Spjd return (nv); 2032219089Spjd 2033219089Spjd /* 2034219089Spjd * strings identical except trailing "s0/old" 2035219089Spjd */ 2036219089Spjd if (strcmp(&val[vlen - 6], "s0/old") == 0 && 2037219089Spjd strcmp(&srchval[slen - 4], "/old") == 0 && 2038219089Spjd strncmp(srchval, val, slen - 4) == 0) 2039219089Spjd return (nv); 2040219089Spjd 2041219089Spjd break; 2042219089Spjd } 2043219089Spjd } else if (strcmp(srchkey, ZPOOL_CONFIG_TYPE) == 0 && val) { 2044219089Spjd char *type, *idx, *end, *p; 2045219089Spjd uint64_t id, vdev_id; 2046219089Spjd 2047168404Spjd /* 2048219089Spjd * Determine our vdev type, keeping in mind 2049219089Spjd * that the srchval is composed of a type and 2050219089Spjd * vdev id pair (i.e. mirror-4). 2051168404Spjd */ 2052219089Spjd if ((type = strdup(srchval)) == NULL) 2053219089Spjd return (NULL); 2054219089Spjd 2055219089Spjd if ((p = strrchr(type, '-')) == NULL) { 2056219089Spjd free(type); 2057219089Spjd break; 2058219089Spjd } 2059219089Spjd idx = p + 1; 2060219089Spjd *p = '\0'; 2061219089Spjd 2062219089Spjd /* 2063219089Spjd * If the types don't match then keep looking. 2064219089Spjd */ 2065219089Spjd if (strncmp(val, type, strlen(val)) != 0) { 2066219089Spjd free(type); 2067219089Spjd break; 2068219089Spjd } 2069219089Spjd 2070219089Spjd verify(strncmp(type, VDEV_TYPE_RAIDZ, 2071219089Spjd strlen(VDEV_TYPE_RAIDZ)) == 0 || 2072219089Spjd strncmp(type, VDEV_TYPE_MIRROR, 2073219089Spjd strlen(VDEV_TYPE_MIRROR)) == 0); 2074219089Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_ID, 2075219089Spjd &id) == 0); 2076219089Spjd 2077219089Spjd errno = 0; 2078219089Spjd vdev_id = strtoull(idx, &end, 10); 2079219089Spjd 2080219089Spjd free(type); 2081219089Spjd if (errno != 0) 2082219089Spjd return (NULL); 2083219089Spjd 2084219089Spjd /* 2085219089Spjd * Now verify that we have the correct vdev id. 2086219089Spjd */ 2087219089Spjd if (vdev_id == id) 2088168404Spjd return (nv); 2089219089Spjd } 2090219089Spjd 2091219089Spjd /* 2092219089Spjd * Common case 2093219089Spjd */ 2094219089Spjd if (strcmp(srchval, val) == 0) 2095168404Spjd return (nv); 2096219089Spjd break; 2097168404Spjd } 2098168404Spjd 2099219089Spjd default: 2100219089Spjd break; 2101219089Spjd } 2102219089Spjd 2103168404Spjd if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_CHILDREN, 2104168404Spjd &child, &children) != 0) 2105168404Spjd return (NULL); 2106168404Spjd 2107185029Spjd for (c = 0; c < children; c++) { 2108219089Spjd if ((ret = vdev_to_nvlist_iter(child[c], search, 2109185029Spjd avail_spare, l2cache, NULL)) != NULL) { 2110185029Spjd /* 2111185029Spjd * The 'is_log' value is only set for the toplevel 2112185029Spjd * vdev, not the leaf vdevs. So we always lookup the 2113185029Spjd * log device from the root of the vdev tree (where 2114185029Spjd * 'log' is non-NULL). 2115185029Spjd */ 2116185029Spjd if (log != NULL && 2117185029Spjd nvlist_lookup_uint64(child[c], 2118185029Spjd ZPOOL_CONFIG_IS_LOG, &is_log) == 0 && 2119185029Spjd is_log) { 2120185029Spjd *log = B_TRUE; 2121185029Spjd } 2122168404Spjd return (ret); 2123185029Spjd } 2124185029Spjd } 2125168404Spjd 2126168404Spjd if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_SPARES, 2127168404Spjd &child, &children) == 0) { 2128168404Spjd for (c = 0; c < children; c++) { 2129219089Spjd if ((ret = vdev_to_nvlist_iter(child[c], search, 2130185029Spjd avail_spare, l2cache, NULL)) != NULL) { 2131168404Spjd *avail_spare = B_TRUE; 2132168404Spjd return (ret); 2133168404Spjd } 2134168404Spjd } 2135168404Spjd } 2136168404Spjd 2137185029Spjd if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_L2CACHE, 2138185029Spjd &child, &children) == 0) { 2139185029Spjd for (c = 0; c < children; c++) { 2140219089Spjd if ((ret = vdev_to_nvlist_iter(child[c], search, 2141185029Spjd avail_spare, l2cache, NULL)) != NULL) { 2142185029Spjd *l2cache = B_TRUE; 2143185029Spjd return (ret); 2144185029Spjd } 2145185029Spjd } 2146185029Spjd } 2147185029Spjd 2148168404Spjd return (NULL); 2149168404Spjd} 2150168404Spjd 2151219089Spjd/* 2152219089Spjd * Given a physical path (minus the "/devices" prefix), find the 2153219089Spjd * associated vdev. 2154219089Spjd */ 2155168404Spjdnvlist_t * 2156219089Spjdzpool_find_vdev_by_physpath(zpool_handle_t *zhp, const char *ppath, 2157219089Spjd boolean_t *avail_spare, boolean_t *l2cache, boolean_t *log) 2158219089Spjd{ 2159219089Spjd nvlist_t *search, *nvroot, *ret; 2160219089Spjd 2161219089Spjd verify(nvlist_alloc(&search, NV_UNIQUE_NAME, KM_SLEEP) == 0); 2162219089Spjd verify(nvlist_add_string(search, ZPOOL_CONFIG_PHYS_PATH, ppath) == 0); 2163219089Spjd 2164219089Spjd verify(nvlist_lookup_nvlist(zhp->zpool_config, ZPOOL_CONFIG_VDEV_TREE, 2165219089Spjd &nvroot) == 0); 2166219089Spjd 2167219089Spjd *avail_spare = B_FALSE; 2168219089Spjd *l2cache = B_FALSE; 2169219089Spjd if (log != NULL) 2170219089Spjd *log = B_FALSE; 2171219089Spjd ret = vdev_to_nvlist_iter(nvroot, search, avail_spare, l2cache, log); 2172219089Spjd nvlist_free(search); 2173219089Spjd 2174219089Spjd return (ret); 2175219089Spjd} 2176219089Spjd 2177219089Spjd/* 2178219089Spjd * Determine if we have an "interior" top-level vdev (i.e mirror/raidz). 2179219089Spjd */ 2180219089Spjdboolean_t 2181219089Spjdzpool_vdev_is_interior(const char *name) 2182219089Spjd{ 2183219089Spjd if (strncmp(name, VDEV_TYPE_RAIDZ, strlen(VDEV_TYPE_RAIDZ)) == 0 || 2184219089Spjd strncmp(name, VDEV_TYPE_MIRROR, strlen(VDEV_TYPE_MIRROR)) == 0) 2185219089Spjd return (B_TRUE); 2186219089Spjd return (B_FALSE); 2187219089Spjd} 2188219089Spjd 2189219089Spjdnvlist_t * 2190185029Spjdzpool_find_vdev(zpool_handle_t *zhp, const char *path, boolean_t *avail_spare, 2191185029Spjd boolean_t *l2cache, boolean_t *log) 2192168404Spjd{ 2193168404Spjd char buf[MAXPATHLEN]; 2194168404Spjd char *end; 2195219089Spjd nvlist_t *nvroot, *search, *ret; 2196168404Spjd uint64_t guid; 2197168404Spjd 2198219089Spjd verify(nvlist_alloc(&search, NV_UNIQUE_NAME, KM_SLEEP) == 0); 2199219089Spjd 2200168404Spjd guid = strtoull(path, &end, 10); 2201168404Spjd if (guid != 0 && *end == '\0') { 2202219089Spjd verify(nvlist_add_uint64(search, ZPOOL_CONFIG_GUID, guid) == 0); 2203219089Spjd } else if (zpool_vdev_is_interior(path)) { 2204219089Spjd verify(nvlist_add_string(search, ZPOOL_CONFIG_TYPE, path) == 0); 2205168404Spjd } else if (path[0] != '/') { 2206168404Spjd (void) snprintf(buf, sizeof (buf), "%s%s", _PATH_DEV, path); 2207219089Spjd verify(nvlist_add_string(search, ZPOOL_CONFIG_PATH, buf) == 0); 2208168404Spjd } else { 2209219089Spjd verify(nvlist_add_string(search, ZPOOL_CONFIG_PATH, path) == 0); 2210168404Spjd } 2211168404Spjd 2212168404Spjd verify(nvlist_lookup_nvlist(zhp->zpool_config, ZPOOL_CONFIG_VDEV_TREE, 2213168404Spjd &nvroot) == 0); 2214168404Spjd 2215168404Spjd *avail_spare = B_FALSE; 2216185029Spjd *l2cache = B_FALSE; 2217185029Spjd if (log != NULL) 2218185029Spjd *log = B_FALSE; 2219219089Spjd ret = vdev_to_nvlist_iter(nvroot, search, avail_spare, l2cache, log); 2220219089Spjd nvlist_free(search); 2221219089Spjd 2222219089Spjd return (ret); 2223168404Spjd} 2224168404Spjd 2225185029Spjdstatic int 2226185029Spjdvdev_online(nvlist_t *nv) 2227185029Spjd{ 2228185029Spjd uint64_t ival; 2229185029Spjd 2230185029Spjd if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_OFFLINE, &ival) == 0 || 2231185029Spjd nvlist_lookup_uint64(nv, ZPOOL_CONFIG_FAULTED, &ival) == 0 || 2232185029Spjd nvlist_lookup_uint64(nv, ZPOOL_CONFIG_REMOVED, &ival) == 0) 2233185029Spjd return (0); 2234185029Spjd 2235185029Spjd return (1); 2236185029Spjd} 2237185029Spjd 2238168404Spjd/* 2239219089Spjd * Helper function for zpool_get_physpaths(). 2240168404Spjd */ 2241219089Spjdstatic int 2242219089Spjdvdev_get_one_physpath(nvlist_t *config, char *physpath, size_t physpath_size, 2243219089Spjd size_t *bytes_written) 2244185029Spjd{ 2245219089Spjd size_t bytes_left, pos, rsz; 2246219089Spjd char *tmppath; 2247219089Spjd const char *format; 2248185029Spjd 2249219089Spjd if (nvlist_lookup_string(config, ZPOOL_CONFIG_PHYS_PATH, 2250219089Spjd &tmppath) != 0) 2251219089Spjd return (EZFS_NODEVICE); 2252185029Spjd 2253219089Spjd pos = *bytes_written; 2254219089Spjd bytes_left = physpath_size - pos; 2255219089Spjd format = (pos == 0) ? "%s" : " %s"; 2256185029Spjd 2257219089Spjd rsz = snprintf(physpath + pos, bytes_left, format, tmppath); 2258219089Spjd *bytes_written += rsz; 2259185029Spjd 2260219089Spjd if (rsz >= bytes_left) { 2261219089Spjd /* if physpath was not copied properly, clear it */ 2262219089Spjd if (bytes_left != 0) { 2263219089Spjd physpath[pos] = 0; 2264219089Spjd } 2265219089Spjd return (EZFS_NOSPC); 2266219089Spjd } 2267219089Spjd return (0); 2268219089Spjd} 2269185029Spjd 2270219089Spjdstatic int 2271219089Spjdvdev_get_physpaths(nvlist_t *nv, char *physpath, size_t phypath_size, 2272219089Spjd size_t *rsz, boolean_t is_spare) 2273219089Spjd{ 2274219089Spjd char *type; 2275219089Spjd int ret; 2276185029Spjd 2277219089Spjd if (nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE, &type) != 0) 2278219089Spjd return (EZFS_INVALCONFIG); 2279185029Spjd 2280219089Spjd if (strcmp(type, VDEV_TYPE_DISK) == 0) { 2281219089Spjd /* 2282219089Spjd * An active spare device has ZPOOL_CONFIG_IS_SPARE set. 2283219089Spjd * For a spare vdev, we only want to boot from the active 2284219089Spjd * spare device. 2285219089Spjd */ 2286219089Spjd if (is_spare) { 2287219089Spjd uint64_t spare = 0; 2288219089Spjd (void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_IS_SPARE, 2289219089Spjd &spare); 2290219089Spjd if (!spare) 2291219089Spjd return (EZFS_INVALCONFIG); 2292219089Spjd } 2293185029Spjd 2294219089Spjd if (vdev_online(nv)) { 2295219089Spjd if ((ret = vdev_get_one_physpath(nv, physpath, 2296219089Spjd phypath_size, rsz)) != 0) 2297219089Spjd return (ret); 2298219089Spjd } 2299219089Spjd } else if (strcmp(type, VDEV_TYPE_MIRROR) == 0 || 2300219089Spjd strcmp(type, VDEV_TYPE_REPLACING) == 0 || 2301219089Spjd (is_spare = (strcmp(type, VDEV_TYPE_SPARE) == 0))) { 2302219089Spjd nvlist_t **child; 2303219089Spjd uint_t count; 2304219089Spjd int i, ret; 2305185029Spjd 2306219089Spjd if (nvlist_lookup_nvlist_array(nv, 2307219089Spjd ZPOOL_CONFIG_CHILDREN, &child, &count) != 0) 2308219089Spjd return (EZFS_INVALCONFIG); 2309219089Spjd 2310219089Spjd for (i = 0; i < count; i++) { 2311219089Spjd ret = vdev_get_physpaths(child[i], physpath, 2312219089Spjd phypath_size, rsz, is_spare); 2313219089Spjd if (ret == EZFS_NOSPC) 2314219089Spjd return (ret); 2315185029Spjd } 2316185029Spjd } 2317185029Spjd 2318219089Spjd return (EZFS_POOL_INVALARG); 2319185029Spjd} 2320185029Spjd 2321185029Spjd/* 2322219089Spjd * Get phys_path for a root pool config. 2323219089Spjd * Return 0 on success; non-zero on failure. 2324185029Spjd */ 2325219089Spjdstatic int 2326219089Spjdzpool_get_config_physpath(nvlist_t *config, char *physpath, size_t phypath_size) 2327168404Spjd{ 2328219089Spjd size_t rsz; 2329219089Spjd nvlist_t *vdev_root; 2330219089Spjd nvlist_t **child; 2331185029Spjd uint_t count; 2332219089Spjd char *type; 2333168404Spjd 2334219089Spjd rsz = 0; 2335219089Spjd 2336219089Spjd if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, 2337219089Spjd &vdev_root) != 0) 2338219089Spjd return (EZFS_INVALCONFIG); 2339219089Spjd 2340219089Spjd if (nvlist_lookup_string(vdev_root, ZPOOL_CONFIG_TYPE, &type) != 0 || 2341219089Spjd nvlist_lookup_nvlist_array(vdev_root, ZPOOL_CONFIG_CHILDREN, 2342219089Spjd &child, &count) != 0) 2343219089Spjd return (EZFS_INVALCONFIG); 2344219089Spjd 2345219089Spjd /* 2346219089Spjd * root pool can not have EFI labeled disks and can only have 2347219089Spjd * a single top-level vdev. 2348219089Spjd */ 2349219089Spjd if (strcmp(type, VDEV_TYPE_ROOT) != 0 || count != 1 || 2350219089Spjd pool_uses_efi(vdev_root)) 2351219089Spjd return (EZFS_POOL_INVALARG); 2352219089Spjd 2353219089Spjd (void) vdev_get_physpaths(child[0], physpath, phypath_size, &rsz, 2354219089Spjd B_FALSE); 2355219089Spjd 2356219089Spjd /* No online devices */ 2357219089Spjd if (rsz == 0) 2358219089Spjd return (EZFS_NODEVICE); 2359219089Spjd 2360219089Spjd return (0); 2361219089Spjd} 2362219089Spjd 2363219089Spjd/* 2364219089Spjd * Get phys_path for a root pool 2365219089Spjd * Return 0 on success; non-zero on failure. 2366219089Spjd */ 2367219089Spjdint 2368219089Spjdzpool_get_physpath(zpool_handle_t *zhp, char *physpath, size_t phypath_size) 2369219089Spjd{ 2370219089Spjd return (zpool_get_config_physpath(zhp->zpool_config, physpath, 2371219089Spjd phypath_size)); 2372219089Spjd} 2373219089Spjd 2374219089Spjd/* 2375219089Spjd * If the device has being dynamically expanded then we need to relabel 2376219089Spjd * the disk to use the new unallocated space. 2377219089Spjd */ 2378219089Spjdstatic int 2379219089Spjdzpool_relabel_disk(libzfs_handle_t *hdl, const char *name) 2380219089Spjd{ 2381219089Spjd#ifdef sun 2382219089Spjd char path[MAXPATHLEN]; 2383219089Spjd char errbuf[1024]; 2384219089Spjd int fd, error; 2385219089Spjd int (*_efi_use_whole_disk)(int); 2386219089Spjd 2387219089Spjd if ((_efi_use_whole_disk = (int (*)(int))dlsym(RTLD_DEFAULT, 2388219089Spjd "efi_use_whole_disk")) == NULL) 2389219089Spjd return (-1); 2390219089Spjd 2391219089Spjd (void) snprintf(path, sizeof (path), "%s/%s", RDISK_ROOT, name); 2392219089Spjd 2393219089Spjd if ((fd = open(path, O_RDWR | O_NDELAY)) < 0) { 2394219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "cannot " 2395219089Spjd "relabel '%s': unable to open device"), name); 2396219089Spjd return (zfs_error(hdl, EZFS_OPENFAILED, errbuf)); 2397168404Spjd } 2398168404Spjd 2399219089Spjd /* 2400219089Spjd * It's possible that we might encounter an error if the device 2401219089Spjd * does not have any unallocated space left. If so, we simply 2402219089Spjd * ignore that error and continue on. 2403219089Spjd */ 2404219089Spjd error = _efi_use_whole_disk(fd); 2405219089Spjd (void) close(fd); 2406219089Spjd if (error && error != VT_ENOSPC) { 2407219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "cannot " 2408219089Spjd "relabel '%s': unable to read disk capacity"), name); 2409219089Spjd return (zfs_error(hdl, EZFS_NOCAP, errbuf)); 2410219089Spjd } 2411219089Spjd#endif /* sun */ 2412219089Spjd return (0); 2413168404Spjd} 2414168404Spjd 2415168404Spjd/* 2416185029Spjd * Bring the specified vdev online. The 'flags' parameter is a set of the 2417185029Spjd * ZFS_ONLINE_* flags. 2418168404Spjd */ 2419168404Spjdint 2420185029Spjdzpool_vdev_online(zpool_handle_t *zhp, const char *path, int flags, 2421185029Spjd vdev_state_t *newstate) 2422168404Spjd{ 2423168404Spjd zfs_cmd_t zc = { 0 }; 2424168404Spjd char msg[1024]; 2425168404Spjd nvlist_t *tgt; 2426219089Spjd boolean_t avail_spare, l2cache, islog; 2427168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2428168404Spjd 2429219089Spjd if (flags & ZFS_ONLINE_EXPAND) { 2430219089Spjd (void) snprintf(msg, sizeof (msg), 2431219089Spjd dgettext(TEXT_DOMAIN, "cannot expand %s"), path); 2432219089Spjd } else { 2433219089Spjd (void) snprintf(msg, sizeof (msg), 2434219089Spjd dgettext(TEXT_DOMAIN, "cannot online %s"), path); 2435219089Spjd } 2436168404Spjd 2437168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2438185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 2439219089Spjd &islog)) == NULL) 2440168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 2441168404Spjd 2442168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 2443168404Spjd 2444219089Spjd if (avail_spare) 2445168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 2446168404Spjd 2447219089Spjd if (flags & ZFS_ONLINE_EXPAND || 2448219089Spjd zpool_get_prop_int(zhp, ZPOOL_PROP_AUTOEXPAND, NULL)) { 2449219089Spjd char *pathname = NULL; 2450219089Spjd uint64_t wholedisk = 0; 2451219089Spjd 2452219089Spjd (void) nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_WHOLE_DISK, 2453219089Spjd &wholedisk); 2454219089Spjd verify(nvlist_lookup_string(tgt, ZPOOL_CONFIG_PATH, 2455219089Spjd &pathname) == 0); 2456219089Spjd 2457219089Spjd /* 2458219089Spjd * XXX - L2ARC 1.0 devices can't support expansion. 2459219089Spjd */ 2460219089Spjd if (l2cache) { 2461219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2462219089Spjd "cannot expand cache devices")); 2463219089Spjd return (zfs_error(hdl, EZFS_VDEVNOTSUP, msg)); 2464219089Spjd } 2465219089Spjd 2466219089Spjd if (wholedisk) { 2467219089Spjd pathname += strlen(DISK_ROOT) + 1; 2468219089Spjd (void) zpool_relabel_disk(hdl, pathname); 2469219089Spjd } 2470219089Spjd } 2471219089Spjd 2472185029Spjd zc.zc_cookie = VDEV_STATE_ONLINE; 2473185029Spjd zc.zc_obj = flags; 2474168404Spjd 2475219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SET_STATE, &zc) != 0) { 2476219089Spjd if (errno == EINVAL) { 2477219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "was split " 2478219089Spjd "from this pool into a new one. Use '%s' " 2479219089Spjd "instead"), "zpool detach"); 2480219089Spjd return (zfs_error(hdl, EZFS_POSTSPLIT_ONLINE, msg)); 2481219089Spjd } 2482185029Spjd return (zpool_standard_error(hdl, errno, msg)); 2483219089Spjd } 2484185029Spjd 2485185029Spjd *newstate = zc.zc_cookie; 2486185029Spjd return (0); 2487168404Spjd} 2488168404Spjd 2489168404Spjd/* 2490168404Spjd * Take the specified vdev offline 2491168404Spjd */ 2492168404Spjdint 2493185029Spjdzpool_vdev_offline(zpool_handle_t *zhp, const char *path, boolean_t istmp) 2494168404Spjd{ 2495168404Spjd zfs_cmd_t zc = { 0 }; 2496168404Spjd char msg[1024]; 2497168404Spjd nvlist_t *tgt; 2498185029Spjd boolean_t avail_spare, l2cache; 2499168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2500168404Spjd 2501168404Spjd (void) snprintf(msg, sizeof (msg), 2502168404Spjd dgettext(TEXT_DOMAIN, "cannot offline %s"), path); 2503168404Spjd 2504168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2505185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 2506185029Spjd NULL)) == NULL) 2507168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 2508168404Spjd 2509168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 2510168404Spjd 2511219089Spjd if (avail_spare) 2512168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 2513168404Spjd 2514185029Spjd zc.zc_cookie = VDEV_STATE_OFFLINE; 2515185029Spjd zc.zc_obj = istmp ? ZFS_OFFLINE_TEMPORARY : 0; 2516168404Spjd 2517219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SET_STATE, &zc) == 0) 2518168404Spjd return (0); 2519168404Spjd 2520168404Spjd switch (errno) { 2521168404Spjd case EBUSY: 2522168404Spjd 2523168404Spjd /* 2524168404Spjd * There are no other replicas of this device. 2525168404Spjd */ 2526168404Spjd return (zfs_error(hdl, EZFS_NOREPLICAS, msg)); 2527168404Spjd 2528219089Spjd case EEXIST: 2529219089Spjd /* 2530219089Spjd * The log device has unplayed logs 2531219089Spjd */ 2532219089Spjd return (zfs_error(hdl, EZFS_UNPLAYED_LOGS, msg)); 2533219089Spjd 2534168404Spjd default: 2535168404Spjd return (zpool_standard_error(hdl, errno, msg)); 2536168404Spjd } 2537168404Spjd} 2538168404Spjd 2539168404Spjd/* 2540185029Spjd * Mark the given vdev faulted. 2541185029Spjd */ 2542185029Spjdint 2543219089Spjdzpool_vdev_fault(zpool_handle_t *zhp, uint64_t guid, vdev_aux_t aux) 2544185029Spjd{ 2545185029Spjd zfs_cmd_t zc = { 0 }; 2546185029Spjd char msg[1024]; 2547185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2548185029Spjd 2549185029Spjd (void) snprintf(msg, sizeof (msg), 2550185029Spjd dgettext(TEXT_DOMAIN, "cannot fault %llu"), guid); 2551185029Spjd 2552185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2553185029Spjd zc.zc_guid = guid; 2554185029Spjd zc.zc_cookie = VDEV_STATE_FAULTED; 2555219089Spjd zc.zc_obj = aux; 2556185029Spjd 2557219089Spjd if (ioctl(hdl->libzfs_fd, ZFS_IOC_VDEV_SET_STATE, &zc) == 0) 2558185029Spjd return (0); 2559185029Spjd 2560185029Spjd switch (errno) { 2561185029Spjd case EBUSY: 2562185029Spjd 2563185029Spjd /* 2564185029Spjd * There are no other replicas of this device. 2565185029Spjd */ 2566185029Spjd return (zfs_error(hdl, EZFS_NOREPLICAS, msg)); 2567185029Spjd 2568185029Spjd default: 2569185029Spjd return (zpool_standard_error(hdl, errno, msg)); 2570185029Spjd } 2571185029Spjd 2572185029Spjd} 2573185029Spjd 2574185029Spjd/* 2575185029Spjd * Mark the given vdev degraded. 2576185029Spjd */ 2577185029Spjdint 2578219089Spjdzpool_vdev_degrade(zpool_handle_t *zhp, uint64_t guid, vdev_aux_t aux) 2579185029Spjd{ 2580185029Spjd zfs_cmd_t zc = { 0 }; 2581185029Spjd char msg[1024]; 2582185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2583185029Spjd 2584185029Spjd (void) snprintf(msg, sizeof (msg), 2585185029Spjd dgettext(TEXT_DOMAIN, "cannot degrade %llu"), guid); 2586185029Spjd 2587185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2588185029Spjd zc.zc_guid = guid; 2589185029Spjd zc.zc_cookie = VDEV_STATE_DEGRADED; 2590219089Spjd zc.zc_obj = aux; 2591185029Spjd 2592219089Spjd if (ioctl(hdl->libzfs_fd, ZFS_IOC_VDEV_SET_STATE, &zc) == 0) 2593185029Spjd return (0); 2594185029Spjd 2595185029Spjd return (zpool_standard_error(hdl, errno, msg)); 2596185029Spjd} 2597185029Spjd 2598185029Spjd/* 2599168404Spjd * Returns TRUE if the given nvlist is a vdev that was originally swapped in as 2600168404Spjd * a hot spare. 2601168404Spjd */ 2602168404Spjdstatic boolean_t 2603168404Spjdis_replacing_spare(nvlist_t *search, nvlist_t *tgt, int which) 2604168404Spjd{ 2605168404Spjd nvlist_t **child; 2606168404Spjd uint_t c, children; 2607168404Spjd char *type; 2608168404Spjd 2609168404Spjd if (nvlist_lookup_nvlist_array(search, ZPOOL_CONFIG_CHILDREN, &child, 2610168404Spjd &children) == 0) { 2611168404Spjd verify(nvlist_lookup_string(search, ZPOOL_CONFIG_TYPE, 2612168404Spjd &type) == 0); 2613168404Spjd 2614168404Spjd if (strcmp(type, VDEV_TYPE_SPARE) == 0 && 2615168404Spjd children == 2 && child[which] == tgt) 2616168404Spjd return (B_TRUE); 2617168404Spjd 2618168404Spjd for (c = 0; c < children; c++) 2619168404Spjd if (is_replacing_spare(child[c], tgt, which)) 2620168404Spjd return (B_TRUE); 2621168404Spjd } 2622168404Spjd 2623168404Spjd return (B_FALSE); 2624168404Spjd} 2625168404Spjd 2626168404Spjd/* 2627168404Spjd * Attach new_disk (fully described by nvroot) to old_disk. 2628185029Spjd * If 'replacing' is specified, the new disk will replace the old one. 2629168404Spjd */ 2630168404Spjdint 2631168404Spjdzpool_vdev_attach(zpool_handle_t *zhp, 2632168404Spjd const char *old_disk, const char *new_disk, nvlist_t *nvroot, int replacing) 2633168404Spjd{ 2634168404Spjd zfs_cmd_t zc = { 0 }; 2635168404Spjd char msg[1024]; 2636168404Spjd int ret; 2637168404Spjd nvlist_t *tgt; 2638185029Spjd boolean_t avail_spare, l2cache, islog; 2639168404Spjd uint64_t val; 2640219089Spjd char *newname; 2641168404Spjd nvlist_t **child; 2642168404Spjd uint_t children; 2643168404Spjd nvlist_t *config_root; 2644168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2645236155Smm boolean_t rootpool = zpool_is_bootable(zhp); 2646168404Spjd 2647168404Spjd if (replacing) 2648168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 2649168404Spjd "cannot replace %s with %s"), old_disk, new_disk); 2650168404Spjd else 2651168404Spjd (void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN, 2652168404Spjd "cannot attach %s to %s"), new_disk, old_disk); 2653168404Spjd 2654209962Smm /* 2655209962Smm * If this is a root pool, make sure that we're not attaching an 2656209962Smm * EFI labeled device. 2657209962Smm */ 2658209962Smm if (rootpool && pool_uses_efi(nvroot)) { 2659209962Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2660209962Smm "EFI labeled devices are not supported on root pools.")); 2661209962Smm return (zfs_error(hdl, EZFS_POOL_NOTSUP, msg)); 2662209962Smm } 2663209962Smm 2664168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2665185029Spjd if ((tgt = zpool_find_vdev(zhp, old_disk, &avail_spare, &l2cache, 2666185029Spjd &islog)) == 0) 2667168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 2668168404Spjd 2669168404Spjd if (avail_spare) 2670168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 2671168404Spjd 2672185029Spjd if (l2cache) 2673185029Spjd return (zfs_error(hdl, EZFS_ISL2CACHE, msg)); 2674185029Spjd 2675168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 2676168404Spjd zc.zc_cookie = replacing; 2677168404Spjd 2678168404Spjd if (nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN, 2679168404Spjd &child, &children) != 0 || children != 1) { 2680168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2681168404Spjd "new device must be a single disk")); 2682168404Spjd return (zfs_error(hdl, EZFS_INVALCONFIG, msg)); 2683168404Spjd } 2684168404Spjd 2685168404Spjd verify(nvlist_lookup_nvlist(zpool_get_config(zhp, NULL), 2686168404Spjd ZPOOL_CONFIG_VDEV_TREE, &config_root) == 0); 2687168404Spjd 2688219089Spjd if ((newname = zpool_vdev_name(NULL, NULL, child[0], B_FALSE)) == NULL) 2689185029Spjd return (-1); 2690185029Spjd 2691168404Spjd /* 2692168404Spjd * If the target is a hot spare that has been swapped in, we can only 2693168404Spjd * replace it with another hot spare. 2694168404Spjd */ 2695168404Spjd if (replacing && 2696168404Spjd nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_IS_SPARE, &val) == 0 && 2697185029Spjd (zpool_find_vdev(zhp, newname, &avail_spare, &l2cache, 2698185029Spjd NULL) == NULL || !avail_spare) && 2699185029Spjd is_replacing_spare(config_root, tgt, 1)) { 2700168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2701168404Spjd "can only be replaced by another hot spare")); 2702185029Spjd free(newname); 2703168404Spjd return (zfs_error(hdl, EZFS_BADTARGET, msg)); 2704168404Spjd } 2705168404Spjd 2706185029Spjd free(newname); 2707185029Spjd 2708185029Spjd if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0) 2709168404Spjd return (-1); 2710168404Spjd 2711219089Spjd ret = zfs_ioctl(hdl, ZFS_IOC_VDEV_ATTACH, &zc); 2712168404Spjd 2713168404Spjd zcmd_free_nvlists(&zc); 2714168404Spjd 2715209962Smm if (ret == 0) { 2716209962Smm if (rootpool) { 2717219089Spjd /* 2718219089Spjd * XXX need a better way to prevent user from 2719219089Spjd * booting up a half-baked vdev. 2720219089Spjd */ 2721219089Spjd (void) fprintf(stderr, dgettext(TEXT_DOMAIN, "Make " 2722219089Spjd "sure to wait until resilver is done " 2723219089Spjd "before rebooting.\n")); 2724219089Spjd (void) fprintf(stderr, "\n"); 2725216293Smm (void) fprintf(stderr, dgettext(TEXT_DOMAIN, "If " 2726216293Smm "you boot from pool '%s', you may need to update\n" 2727216293Smm "boot code on newly attached disk '%s'.\n\n" 2728216293Smm "Assuming you use GPT partitioning and 'da0' is " 2729216293Smm "your new boot disk\n" 2730216293Smm "you may use the following command:\n\n" 2731216293Smm "\tgpart bootcode -b /boot/pmbr -p " 2732216293Smm "/boot/gptzfsboot -i 1 da0\n\n"), 2733216293Smm zhp->zpool_name, new_disk); 2734209962Smm } 2735168404Spjd return (0); 2736209962Smm } 2737168404Spjd 2738168404Spjd switch (errno) { 2739168404Spjd case ENOTSUP: 2740168404Spjd /* 2741168404Spjd * Can't attach to or replace this type of vdev. 2742168404Spjd */ 2743185029Spjd if (replacing) { 2744219089Spjd uint64_t version = zpool_get_prop_int(zhp, 2745219089Spjd ZPOOL_PROP_VERSION, NULL); 2746219089Spjd 2747185029Spjd if (islog) 2748185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2749185029Spjd "cannot replace a log with a spare")); 2750219089Spjd else if (version >= SPA_VERSION_MULTI_REPLACE) 2751219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2752219089Spjd "already in replacing/spare config; wait " 2753219089Spjd "for completion or use 'zpool detach'")); 2754185029Spjd else 2755185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2756185029Spjd "cannot replace a replacing device")); 2757185029Spjd } else { 2758168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2759168404Spjd "can only attach to mirrors and top-level " 2760168404Spjd "disks")); 2761185029Spjd } 2762168404Spjd (void) zfs_error(hdl, EZFS_BADTARGET, msg); 2763168404Spjd break; 2764168404Spjd 2765168404Spjd case EINVAL: 2766168404Spjd /* 2767168404Spjd * The new device must be a single disk. 2768168404Spjd */ 2769168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2770168404Spjd "new device must be a single disk")); 2771168404Spjd (void) zfs_error(hdl, EZFS_INVALCONFIG, msg); 2772168404Spjd break; 2773168404Spjd 2774168404Spjd case EBUSY: 2775168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "%s is busy"), 2776168404Spjd new_disk); 2777168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 2778168404Spjd break; 2779168404Spjd 2780168404Spjd case EOVERFLOW: 2781168404Spjd /* 2782168404Spjd * The new device is too small. 2783168404Spjd */ 2784168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2785168404Spjd "device is too small")); 2786168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 2787168404Spjd break; 2788168404Spjd 2789168404Spjd case EDOM: 2790168404Spjd /* 2791168404Spjd * The new device has a different alignment requirement. 2792168404Spjd */ 2793168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2794168404Spjd "devices have different sector alignment")); 2795168404Spjd (void) zfs_error(hdl, EZFS_BADDEV, msg); 2796168404Spjd break; 2797168404Spjd 2798168404Spjd case ENAMETOOLONG: 2799168404Spjd /* 2800168404Spjd * The resulting top-level vdev spec won't fit in the label. 2801168404Spjd */ 2802168404Spjd (void) zfs_error(hdl, EZFS_DEVOVERFLOW, msg); 2803168404Spjd break; 2804168404Spjd 2805168404Spjd default: 2806168404Spjd (void) zpool_standard_error(hdl, errno, msg); 2807168404Spjd } 2808168404Spjd 2809168404Spjd return (-1); 2810168404Spjd} 2811168404Spjd 2812168404Spjd/* 2813168404Spjd * Detach the specified device. 2814168404Spjd */ 2815168404Spjdint 2816168404Spjdzpool_vdev_detach(zpool_handle_t *zhp, const char *path) 2817168404Spjd{ 2818168404Spjd zfs_cmd_t zc = { 0 }; 2819168404Spjd char msg[1024]; 2820168404Spjd nvlist_t *tgt; 2821185029Spjd boolean_t avail_spare, l2cache; 2822168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2823168404Spjd 2824168404Spjd (void) snprintf(msg, sizeof (msg), 2825168404Spjd dgettext(TEXT_DOMAIN, "cannot detach %s"), path); 2826168404Spjd 2827168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 2828185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 2829185029Spjd NULL)) == 0) 2830168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 2831168404Spjd 2832168404Spjd if (avail_spare) 2833168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 2834168404Spjd 2835185029Spjd if (l2cache) 2836185029Spjd return (zfs_error(hdl, EZFS_ISL2CACHE, msg)); 2837185029Spjd 2838168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 2839168404Spjd 2840185029Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_DETACH, &zc) == 0) 2841168404Spjd return (0); 2842168404Spjd 2843168404Spjd switch (errno) { 2844168404Spjd 2845168404Spjd case ENOTSUP: 2846168404Spjd /* 2847168404Spjd * Can't detach from this type of vdev. 2848168404Spjd */ 2849168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "only " 2850168404Spjd "applicable to mirror and replacing vdevs")); 2851219089Spjd (void) zfs_error(hdl, EZFS_BADTARGET, msg); 2852168404Spjd break; 2853168404Spjd 2854168404Spjd case EBUSY: 2855168404Spjd /* 2856168404Spjd * There are no other replicas of this device. 2857168404Spjd */ 2858168404Spjd (void) zfs_error(hdl, EZFS_NOREPLICAS, msg); 2859168404Spjd break; 2860168404Spjd 2861168404Spjd default: 2862168404Spjd (void) zpool_standard_error(hdl, errno, msg); 2863168404Spjd } 2864168404Spjd 2865168404Spjd return (-1); 2866168404Spjd} 2867168404Spjd 2868168404Spjd/* 2869219089Spjd * Find a mirror vdev in the source nvlist. 2870219089Spjd * 2871219089Spjd * The mchild array contains a list of disks in one of the top-level mirrors 2872219089Spjd * of the source pool. The schild array contains a list of disks that the 2873219089Spjd * user specified on the command line. We loop over the mchild array to 2874219089Spjd * see if any entry in the schild array matches. 2875219089Spjd * 2876219089Spjd * If a disk in the mchild array is found in the schild array, we return 2877219089Spjd * the index of that entry. Otherwise we return -1. 2878219089Spjd */ 2879219089Spjdstatic int 2880219089Spjdfind_vdev_entry(zpool_handle_t *zhp, nvlist_t **mchild, uint_t mchildren, 2881219089Spjd nvlist_t **schild, uint_t schildren) 2882219089Spjd{ 2883219089Spjd uint_t mc; 2884219089Spjd 2885219089Spjd for (mc = 0; mc < mchildren; mc++) { 2886219089Spjd uint_t sc; 2887219089Spjd char *mpath = zpool_vdev_name(zhp->zpool_hdl, zhp, 2888219089Spjd mchild[mc], B_FALSE); 2889219089Spjd 2890219089Spjd for (sc = 0; sc < schildren; sc++) { 2891219089Spjd char *spath = zpool_vdev_name(zhp->zpool_hdl, zhp, 2892219089Spjd schild[sc], B_FALSE); 2893219089Spjd boolean_t result = (strcmp(mpath, spath) == 0); 2894219089Spjd 2895219089Spjd free(spath); 2896219089Spjd if (result) { 2897219089Spjd free(mpath); 2898219089Spjd return (mc); 2899219089Spjd } 2900219089Spjd } 2901219089Spjd 2902219089Spjd free(mpath); 2903219089Spjd } 2904219089Spjd 2905219089Spjd return (-1); 2906219089Spjd} 2907219089Spjd 2908219089Spjd/* 2909219089Spjd * Split a mirror pool. If newroot points to null, then a new nvlist 2910219089Spjd * is generated and it is the responsibility of the caller to free it. 2911219089Spjd */ 2912219089Spjdint 2913219089Spjdzpool_vdev_split(zpool_handle_t *zhp, char *newname, nvlist_t **newroot, 2914219089Spjd nvlist_t *props, splitflags_t flags) 2915219089Spjd{ 2916219089Spjd zfs_cmd_t zc = { 0 }; 2917219089Spjd char msg[1024]; 2918219089Spjd nvlist_t *tree, *config, **child, **newchild, *newconfig = NULL; 2919219089Spjd nvlist_t **varray = NULL, *zc_props = NULL; 2920219089Spjd uint_t c, children, newchildren, lastlog = 0, vcount, found = 0; 2921219089Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 2922219089Spjd uint64_t vers; 2923219089Spjd boolean_t freelist = B_FALSE, memory_err = B_TRUE; 2924219089Spjd int retval = 0; 2925219089Spjd 2926219089Spjd (void) snprintf(msg, sizeof (msg), 2927219089Spjd dgettext(TEXT_DOMAIN, "Unable to split %s"), zhp->zpool_name); 2928219089Spjd 2929219089Spjd if (!zpool_name_valid(hdl, B_FALSE, newname)) 2930219089Spjd return (zfs_error(hdl, EZFS_INVALIDNAME, msg)); 2931219089Spjd 2932219089Spjd if ((config = zpool_get_config(zhp, NULL)) == NULL) { 2933219089Spjd (void) fprintf(stderr, gettext("Internal error: unable to " 2934219089Spjd "retrieve pool configuration\n")); 2935219089Spjd return (-1); 2936219089Spjd } 2937219089Spjd 2938219089Spjd verify(nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, &tree) 2939219089Spjd == 0); 2940219089Spjd verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_VERSION, &vers) == 0); 2941219089Spjd 2942219089Spjd if (props) { 2943219089Spjd prop_flags_t flags = { .create = B_FALSE, .import = B_TRUE }; 2944219089Spjd if ((zc_props = zpool_valid_proplist(hdl, zhp->zpool_name, 2945219089Spjd props, vers, flags, msg)) == NULL) 2946219089Spjd return (-1); 2947219089Spjd } 2948219089Spjd 2949219089Spjd if (nvlist_lookup_nvlist_array(tree, ZPOOL_CONFIG_CHILDREN, &child, 2950219089Spjd &children) != 0) { 2951219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 2952219089Spjd "Source pool is missing vdev tree")); 2953219089Spjd if (zc_props) 2954219089Spjd nvlist_free(zc_props); 2955219089Spjd return (-1); 2956219089Spjd } 2957219089Spjd 2958219089Spjd varray = zfs_alloc(hdl, children * sizeof (nvlist_t *)); 2959219089Spjd vcount = 0; 2960219089Spjd 2961219089Spjd if (*newroot == NULL || 2962219089Spjd nvlist_lookup_nvlist_array(*newroot, ZPOOL_CONFIG_CHILDREN, 2963219089Spjd &newchild, &newchildren) != 0) 2964219089Spjd newchildren = 0; 2965219089Spjd 2966219089Spjd for (c = 0; c < children; c++) { 2967219089Spjd uint64_t is_log = B_FALSE, is_hole = B_FALSE; 2968219089Spjd char *type; 2969219089Spjd nvlist_t **mchild, *vdev; 2970219089Spjd uint_t mchildren; 2971219089Spjd int entry; 2972219089Spjd 2973219089Spjd /* 2974219089Spjd * Unlike cache & spares, slogs are stored in the 2975219089Spjd * ZPOOL_CONFIG_CHILDREN array. We filter them out here. 2976219089Spjd */ 2977219089Spjd (void) nvlist_lookup_uint64(child[c], ZPOOL_CONFIG_IS_LOG, 2978219089Spjd &is_log); 2979219089Spjd (void) nvlist_lookup_uint64(child[c], ZPOOL_CONFIG_IS_HOLE, 2980219089Spjd &is_hole); 2981219089Spjd if (is_log || is_hole) { 2982219089Spjd /* 2983219089Spjd * Create a hole vdev and put it in the config. 2984219089Spjd */ 2985219089Spjd if (nvlist_alloc(&vdev, NV_UNIQUE_NAME, 0) != 0) 2986219089Spjd goto out; 2987219089Spjd if (nvlist_add_string(vdev, ZPOOL_CONFIG_TYPE, 2988219089Spjd VDEV_TYPE_HOLE) != 0) 2989219089Spjd goto out; 2990219089Spjd if (nvlist_add_uint64(vdev, ZPOOL_CONFIG_IS_HOLE, 2991219089Spjd 1) != 0) 2992219089Spjd goto out; 2993219089Spjd if (lastlog == 0) 2994219089Spjd lastlog = vcount; 2995219089Spjd varray[vcount++] = vdev; 2996219089Spjd continue; 2997219089Spjd } 2998219089Spjd lastlog = 0; 2999219089Spjd verify(nvlist_lookup_string(child[c], ZPOOL_CONFIG_TYPE, &type) 3000219089Spjd == 0); 3001219089Spjd if (strcmp(type, VDEV_TYPE_MIRROR) != 0) { 3002219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3003219089Spjd "Source pool must be composed only of mirrors\n")); 3004219089Spjd retval = zfs_error(hdl, EZFS_INVALCONFIG, msg); 3005219089Spjd goto out; 3006219089Spjd } 3007219089Spjd 3008219089Spjd verify(nvlist_lookup_nvlist_array(child[c], 3009219089Spjd ZPOOL_CONFIG_CHILDREN, &mchild, &mchildren) == 0); 3010219089Spjd 3011219089Spjd /* find or add an entry for this top-level vdev */ 3012219089Spjd if (newchildren > 0 && 3013219089Spjd (entry = find_vdev_entry(zhp, mchild, mchildren, 3014219089Spjd newchild, newchildren)) >= 0) { 3015219089Spjd /* We found a disk that the user specified. */ 3016219089Spjd vdev = mchild[entry]; 3017219089Spjd ++found; 3018219089Spjd } else { 3019219089Spjd /* User didn't specify a disk for this vdev. */ 3020219089Spjd vdev = mchild[mchildren - 1]; 3021219089Spjd } 3022219089Spjd 3023219089Spjd if (nvlist_dup(vdev, &varray[vcount++], 0) != 0) 3024219089Spjd goto out; 3025219089Spjd } 3026219089Spjd 3027219089Spjd /* did we find every disk the user specified? */ 3028219089Spjd if (found != newchildren) { 3029219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "Device list must " 3030219089Spjd "include at most one disk from each mirror")); 3031219089Spjd retval = zfs_error(hdl, EZFS_INVALCONFIG, msg); 3032219089Spjd goto out; 3033219089Spjd } 3034219089Spjd 3035219089Spjd /* Prepare the nvlist for populating. */ 3036219089Spjd if (*newroot == NULL) { 3037219089Spjd if (nvlist_alloc(newroot, NV_UNIQUE_NAME, 0) != 0) 3038219089Spjd goto out; 3039219089Spjd freelist = B_TRUE; 3040219089Spjd if (nvlist_add_string(*newroot, ZPOOL_CONFIG_TYPE, 3041219089Spjd VDEV_TYPE_ROOT) != 0) 3042219089Spjd goto out; 3043219089Spjd } else { 3044219089Spjd verify(nvlist_remove_all(*newroot, ZPOOL_CONFIG_CHILDREN) == 0); 3045219089Spjd } 3046219089Spjd 3047219089Spjd /* Add all the children we found */ 3048219089Spjd if (nvlist_add_nvlist_array(*newroot, ZPOOL_CONFIG_CHILDREN, varray, 3049219089Spjd lastlog == 0 ? vcount : lastlog) != 0) 3050219089Spjd goto out; 3051219089Spjd 3052219089Spjd /* 3053219089Spjd * If we're just doing a dry run, exit now with success. 3054219089Spjd */ 3055219089Spjd if (flags.dryrun) { 3056219089Spjd memory_err = B_FALSE; 3057219089Spjd freelist = B_FALSE; 3058219089Spjd goto out; 3059219089Spjd } 3060219089Spjd 3061219089Spjd /* now build up the config list & call the ioctl */ 3062219089Spjd if (nvlist_alloc(&newconfig, NV_UNIQUE_NAME, 0) != 0) 3063219089Spjd goto out; 3064219089Spjd 3065219089Spjd if (nvlist_add_nvlist(newconfig, 3066219089Spjd ZPOOL_CONFIG_VDEV_TREE, *newroot) != 0 || 3067219089Spjd nvlist_add_string(newconfig, 3068219089Spjd ZPOOL_CONFIG_POOL_NAME, newname) != 0 || 3069219089Spjd nvlist_add_uint64(newconfig, ZPOOL_CONFIG_VERSION, vers) != 0) 3070219089Spjd goto out; 3071219089Spjd 3072219089Spjd /* 3073219089Spjd * The new pool is automatically part of the namespace unless we 3074219089Spjd * explicitly export it. 3075219089Spjd */ 3076219089Spjd if (!flags.import) 3077219089Spjd zc.zc_cookie = ZPOOL_EXPORT_AFTER_SPLIT; 3078219089Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3079219089Spjd (void) strlcpy(zc.zc_string, newname, sizeof (zc.zc_string)); 3080219089Spjd if (zcmd_write_conf_nvlist(hdl, &zc, newconfig) != 0) 3081219089Spjd goto out; 3082219089Spjd if (zc_props != NULL && zcmd_write_src_nvlist(hdl, &zc, zc_props) != 0) 3083219089Spjd goto out; 3084219089Spjd 3085219089Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SPLIT, &zc) != 0) { 3086219089Spjd retval = zpool_standard_error(hdl, errno, msg); 3087219089Spjd goto out; 3088219089Spjd } 3089219089Spjd 3090219089Spjd freelist = B_FALSE; 3091219089Spjd memory_err = B_FALSE; 3092219089Spjd 3093219089Spjdout: 3094219089Spjd if (varray != NULL) { 3095219089Spjd int v; 3096219089Spjd 3097219089Spjd for (v = 0; v < vcount; v++) 3098219089Spjd nvlist_free(varray[v]); 3099219089Spjd free(varray); 3100219089Spjd } 3101219089Spjd zcmd_free_nvlists(&zc); 3102219089Spjd if (zc_props) 3103219089Spjd nvlist_free(zc_props); 3104219089Spjd if (newconfig) 3105219089Spjd nvlist_free(newconfig); 3106219089Spjd if (freelist) { 3107219089Spjd nvlist_free(*newroot); 3108219089Spjd *newroot = NULL; 3109219089Spjd } 3110219089Spjd 3111219089Spjd if (retval != 0) 3112219089Spjd return (retval); 3113219089Spjd 3114219089Spjd if (memory_err) 3115219089Spjd return (no_memory(hdl)); 3116219089Spjd 3117219089Spjd return (0); 3118219089Spjd} 3119219089Spjd 3120219089Spjd/* 3121185029Spjd * Remove the given device. Currently, this is supported only for hot spares 3122185029Spjd * and level 2 cache devices. 3123168404Spjd */ 3124168404Spjdint 3125168404Spjdzpool_vdev_remove(zpool_handle_t *zhp, const char *path) 3126168404Spjd{ 3127168404Spjd zfs_cmd_t zc = { 0 }; 3128168404Spjd char msg[1024]; 3129168404Spjd nvlist_t *tgt; 3130219089Spjd boolean_t avail_spare, l2cache, islog; 3131168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3132219089Spjd uint64_t version; 3133168404Spjd 3134168404Spjd (void) snprintf(msg, sizeof (msg), 3135168404Spjd dgettext(TEXT_DOMAIN, "cannot remove %s"), path); 3136168404Spjd 3137168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3138185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache, 3139219089Spjd &islog)) == 0) 3140168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 3141219089Spjd /* 3142219089Spjd * XXX - this should just go away. 3143219089Spjd */ 3144219089Spjd if (!avail_spare && !l2cache && !islog) { 3145168404Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3146219089Spjd "only inactive hot spares, cache, top-level, " 3147219089Spjd "or log devices can be removed")); 3148168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 3149168404Spjd } 3150168404Spjd 3151219089Spjd version = zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL); 3152219089Spjd if (islog && version < SPA_VERSION_HOLES) { 3153219089Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3154219089Spjd "pool must be upgrade to support log removal")); 3155219089Spjd return (zfs_error(hdl, EZFS_BADVERSION, msg)); 3156219089Spjd } 3157219089Spjd 3158168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0); 3159168404Spjd 3160185029Spjd if (zfs_ioctl(hdl, ZFS_IOC_VDEV_REMOVE, &zc) == 0) 3161168404Spjd return (0); 3162168404Spjd 3163168404Spjd return (zpool_standard_error(hdl, errno, msg)); 3164168404Spjd} 3165168404Spjd 3166168404Spjd/* 3167168404Spjd * Clear the errors for the pool, or the particular device if specified. 3168168404Spjd */ 3169168404Spjdint 3170219089Spjdzpool_clear(zpool_handle_t *zhp, const char *path, nvlist_t *rewindnvl) 3171168404Spjd{ 3172168404Spjd zfs_cmd_t zc = { 0 }; 3173168404Spjd char msg[1024]; 3174168404Spjd nvlist_t *tgt; 3175219089Spjd zpool_rewind_policy_t policy; 3176185029Spjd boolean_t avail_spare, l2cache; 3177168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3178219089Spjd nvlist_t *nvi = NULL; 3179219089Spjd int error; 3180168404Spjd 3181168404Spjd if (path) 3182168404Spjd (void) snprintf(msg, sizeof (msg), 3183168404Spjd dgettext(TEXT_DOMAIN, "cannot clear errors for %s"), 3184168404Spjd path); 3185168404Spjd else 3186168404Spjd (void) snprintf(msg, sizeof (msg), 3187168404Spjd dgettext(TEXT_DOMAIN, "cannot clear errors for %s"), 3188168404Spjd zhp->zpool_name); 3189168404Spjd 3190168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3191168404Spjd if (path) { 3192185029Spjd if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, 3193185029Spjd &l2cache, NULL)) == 0) 3194168404Spjd return (zfs_error(hdl, EZFS_NODEVICE, msg)); 3195168404Spjd 3196185029Spjd /* 3197185029Spjd * Don't allow error clearing for hot spares. Do allow 3198185029Spjd * error clearing for l2cache devices. 3199185029Spjd */ 3200168404Spjd if (avail_spare) 3201168404Spjd return (zfs_error(hdl, EZFS_ISSPARE, msg)); 3202168404Spjd 3203168404Spjd verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, 3204168404Spjd &zc.zc_guid) == 0); 3205168404Spjd } 3206168404Spjd 3207219089Spjd zpool_get_rewind_policy(rewindnvl, &policy); 3208219089Spjd zc.zc_cookie = policy.zrp_request; 3209219089Spjd 3210219089Spjd if (zcmd_alloc_dst_nvlist(hdl, &zc, zhp->zpool_config_size * 2) != 0) 3211219089Spjd return (-1); 3212219089Spjd 3213219089Spjd if (zcmd_write_src_nvlist(hdl, &zc, rewindnvl) != 0) 3214219089Spjd return (-1); 3215219089Spjd 3216219089Spjd while ((error = zfs_ioctl(hdl, ZFS_IOC_CLEAR, &zc)) != 0 && 3217219089Spjd errno == ENOMEM) { 3218219089Spjd if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) { 3219219089Spjd zcmd_free_nvlists(&zc); 3220219089Spjd return (-1); 3221219089Spjd } 3222219089Spjd } 3223219089Spjd 3224219089Spjd if (!error || ((policy.zrp_request & ZPOOL_TRY_REWIND) && 3225219089Spjd errno != EPERM && errno != EACCES)) { 3226219089Spjd if (policy.zrp_request & 3227219089Spjd (ZPOOL_DO_REWIND | ZPOOL_TRY_REWIND)) { 3228219089Spjd (void) zcmd_read_dst_nvlist(hdl, &zc, &nvi); 3229219089Spjd zpool_rewind_exclaim(hdl, zc.zc_name, 3230219089Spjd ((policy.zrp_request & ZPOOL_TRY_REWIND) != 0), 3231219089Spjd nvi); 3232219089Spjd nvlist_free(nvi); 3233219089Spjd } 3234219089Spjd zcmd_free_nvlists(&zc); 3235185029Spjd return (0); 3236219089Spjd } 3237185029Spjd 3238219089Spjd zcmd_free_nvlists(&zc); 3239185029Spjd return (zpool_standard_error(hdl, errno, msg)); 3240185029Spjd} 3241185029Spjd 3242185029Spjd/* 3243185029Spjd * Similar to zpool_clear(), but takes a GUID (used by fmd). 3244185029Spjd */ 3245185029Spjdint 3246185029Spjdzpool_vdev_clear(zpool_handle_t *zhp, uint64_t guid) 3247185029Spjd{ 3248185029Spjd zfs_cmd_t zc = { 0 }; 3249185029Spjd char msg[1024]; 3250185029Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3251185029Spjd 3252185029Spjd (void) snprintf(msg, sizeof (msg), 3253185029Spjd dgettext(TEXT_DOMAIN, "cannot clear errors for %llx"), 3254185029Spjd guid); 3255185029Spjd 3256185029Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3257185029Spjd zc.zc_guid = guid; 3258219089Spjd zc.zc_cookie = ZPOOL_NO_REWIND; 3259185029Spjd 3260168404Spjd if (ioctl(hdl->libzfs_fd, ZFS_IOC_CLEAR, &zc) == 0) 3261168404Spjd return (0); 3262168404Spjd 3263168404Spjd return (zpool_standard_error(hdl, errno, msg)); 3264168404Spjd} 3265168404Spjd 3266168404Spjd/* 3267228103Smm * Change the GUID for a pool. 3268228103Smm */ 3269228103Smmint 3270228103Smmzpool_reguid(zpool_handle_t *zhp) 3271228103Smm{ 3272228103Smm char msg[1024]; 3273228103Smm libzfs_handle_t *hdl = zhp->zpool_hdl; 3274228103Smm zfs_cmd_t zc = { 0 }; 3275228103Smm 3276228103Smm (void) snprintf(msg, sizeof (msg), 3277228103Smm dgettext(TEXT_DOMAIN, "cannot reguid '%s'"), zhp->zpool_name); 3278228103Smm 3279228103Smm (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3280228103Smm if (zfs_ioctl(hdl, ZFS_IOC_POOL_REGUID, &zc) == 0) 3281228103Smm return (0); 3282228103Smm 3283228103Smm return (zpool_standard_error(hdl, errno, msg)); 3284228103Smm} 3285228103Smm 3286228103Smm/* 3287236155Smm * Reopen the pool. 3288236155Smm */ 3289236155Smmint 3290236155Smmzpool_reopen(zpool_handle_t *zhp) 3291236155Smm{ 3292236155Smm zfs_cmd_t zc = { 0 }; 3293236155Smm char msg[1024]; 3294236155Smm libzfs_handle_t *hdl = zhp->zpool_hdl; 3295236155Smm 3296236155Smm (void) snprintf(msg, sizeof (msg), 3297236155Smm dgettext(TEXT_DOMAIN, "cannot reopen '%s'"), 3298236155Smm zhp->zpool_name); 3299236155Smm 3300236155Smm (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3301236155Smm if (zfs_ioctl(hdl, ZFS_IOC_POOL_REOPEN, &zc) == 0) 3302236155Smm return (0); 3303236155Smm return (zpool_standard_error(hdl, errno, msg)); 3304236155Smm} 3305236155Smm 3306236155Smm/* 3307168404Spjd * Convert from a devid string to a path. 3308168404Spjd */ 3309168404Spjdstatic char * 3310168404Spjddevid_to_path(char *devid_str) 3311168404Spjd{ 3312168404Spjd ddi_devid_t devid; 3313168404Spjd char *minor; 3314168404Spjd char *path; 3315168404Spjd devid_nmlist_t *list = NULL; 3316168404Spjd int ret; 3317168404Spjd 3318168404Spjd if (devid_str_decode(devid_str, &devid, &minor) != 0) 3319168404Spjd return (NULL); 3320168404Spjd 3321168404Spjd ret = devid_deviceid_to_nmlist("/dev", devid, minor, &list); 3322168404Spjd 3323168404Spjd devid_str_free(minor); 3324168404Spjd devid_free(devid); 3325168404Spjd 3326168404Spjd if (ret != 0) 3327168404Spjd return (NULL); 3328168404Spjd 3329168404Spjd if ((path = strdup(list[0].devname)) == NULL) 3330168404Spjd return (NULL); 3331168404Spjd 3332168404Spjd devid_free_nmlist(list); 3333168404Spjd 3334168404Spjd return (path); 3335168404Spjd} 3336168404Spjd 3337168404Spjd/* 3338168404Spjd * Convert from a path to a devid string. 3339168404Spjd */ 3340168404Spjdstatic char * 3341168404Spjdpath_to_devid(const char *path) 3342168404Spjd{ 3343265821Smav#ifdef have_devid 3344168404Spjd int fd; 3345168404Spjd ddi_devid_t devid; 3346168404Spjd char *minor, *ret; 3347168404Spjd 3348168404Spjd if ((fd = open(path, O_RDONLY)) < 0) 3349168404Spjd return (NULL); 3350168404Spjd 3351168404Spjd minor = NULL; 3352168404Spjd ret = NULL; 3353168404Spjd if (devid_get(fd, &devid) == 0) { 3354168404Spjd if (devid_get_minor_name(fd, &minor) == 0) 3355168404Spjd ret = devid_str_encode(devid, minor); 3356168404Spjd if (minor != NULL) 3357168404Spjd devid_str_free(minor); 3358168404Spjd devid_free(devid); 3359168404Spjd } 3360168404Spjd (void) close(fd); 3361168404Spjd 3362168404Spjd return (ret); 3363265821Smav#else 3364265821Smav return (NULL); 3365265821Smav#endif 3366168404Spjd} 3367168404Spjd 3368168404Spjd/* 3369168404Spjd * Issue the necessary ioctl() to update the stored path value for the vdev. We 3370168404Spjd * ignore any failure here, since a common case is for an unprivileged user to 3371168404Spjd * type 'zpool status', and we'll display the correct information anyway. 3372168404Spjd */ 3373168404Spjdstatic void 3374168404Spjdset_path(zpool_handle_t *zhp, nvlist_t *nv, const char *path) 3375168404Spjd{ 3376168404Spjd zfs_cmd_t zc = { 0 }; 3377168404Spjd 3378168404Spjd (void) strncpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3379168404Spjd (void) strncpy(zc.zc_value, path, sizeof (zc.zc_value)); 3380168404Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, 3381168404Spjd &zc.zc_guid) == 0); 3382168404Spjd 3383168404Spjd (void) ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_VDEV_SETPATH, &zc); 3384168404Spjd} 3385168404Spjd 3386168404Spjd/* 3387168404Spjd * Given a vdev, return the name to display in iostat. If the vdev has a path, 3388168404Spjd * we use that, stripping off any leading "/dev/dsk/"; if not, we use the type. 3389168404Spjd * We also check if this is a whole disk, in which case we strip off the 3390168404Spjd * trailing 's0' slice name. 3391168404Spjd * 3392168404Spjd * This routine is also responsible for identifying when disks have been 3393168404Spjd * reconfigured in a new location. The kernel will have opened the device by 3394168404Spjd * devid, but the path will still refer to the old location. To catch this, we 3395168404Spjd * first do a path -> devid translation (which is fast for the common case). If 3396168404Spjd * the devid matches, we're done. If not, we do a reverse devid -> path 3397168404Spjd * translation and issue the appropriate ioctl() to update the path of the vdev. 3398168404Spjd * If 'zhp' is NULL, then this is an exported pool, and we don't need to do any 3399168404Spjd * of these checks. 3400168404Spjd */ 3401168404Spjdchar * 3402219089Spjdzpool_vdev_name(libzfs_handle_t *hdl, zpool_handle_t *zhp, nvlist_t *nv, 3403219089Spjd boolean_t verbose) 3404168404Spjd{ 3405168404Spjd char *path, *devid; 3406168404Spjd uint64_t value; 3407168404Spjd char buf[64]; 3408185029Spjd vdev_stat_t *vs; 3409185029Spjd uint_t vsc; 3410224170Sgibbs int have_stats; 3411224170Sgibbs int have_path; 3412168404Spjd 3413224170Sgibbs have_stats = nvlist_lookup_uint64_array(nv, ZPOOL_CONFIG_VDEV_STATS, 3414224170Sgibbs (uint64_t **)&vs, &vsc) == 0; 3415224170Sgibbs have_path = nvlist_lookup_string(nv, ZPOOL_CONFIG_PATH, &path) == 0; 3416224170Sgibbs 3417224170Sgibbs /* 3418224170Sgibbs * If the device is not currently present, assume it will not 3419224170Sgibbs * come back at the same device path. Display the device by GUID. 3420224170Sgibbs */ 3421224170Sgibbs if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_NOT_PRESENT, &value) == 0 || 3422224170Sgibbs have_path && have_stats && vs->vs_state <= VDEV_STATE_CANT_OPEN) { 3423168404Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, 3424168404Spjd &value) == 0); 3425168404Spjd (void) snprintf(buf, sizeof (buf), "%llu", 3426168404Spjd (u_longlong_t)value); 3427168404Spjd path = buf; 3428224170Sgibbs } else if (have_path) { 3429168404Spjd 3430185029Spjd /* 3431185029Spjd * If the device is dead (faulted, offline, etc) then don't 3432185029Spjd * bother opening it. Otherwise we may be forcing the user to 3433185029Spjd * open a misbehaving device, which can have undesirable 3434185029Spjd * effects. 3435185029Spjd */ 3436224170Sgibbs if ((have_stats == 0 || 3437185029Spjd vs->vs_state >= VDEV_STATE_DEGRADED) && 3438185029Spjd zhp != NULL && 3439168404Spjd nvlist_lookup_string(nv, ZPOOL_CONFIG_DEVID, &devid) == 0) { 3440168404Spjd /* 3441168404Spjd * Determine if the current path is correct. 3442168404Spjd */ 3443168404Spjd char *newdevid = path_to_devid(path); 3444168404Spjd 3445168404Spjd if (newdevid == NULL || 3446168404Spjd strcmp(devid, newdevid) != 0) { 3447168404Spjd char *newpath; 3448168404Spjd 3449168404Spjd if ((newpath = devid_to_path(devid)) != NULL) { 3450168404Spjd /* 3451168404Spjd * Update the path appropriately. 3452168404Spjd */ 3453168404Spjd set_path(zhp, nv, newpath); 3454168404Spjd if (nvlist_add_string(nv, 3455168404Spjd ZPOOL_CONFIG_PATH, newpath) == 0) 3456168404Spjd verify(nvlist_lookup_string(nv, 3457168404Spjd ZPOOL_CONFIG_PATH, 3458168404Spjd &path) == 0); 3459168404Spjd free(newpath); 3460168404Spjd } 3461168404Spjd } 3462168404Spjd 3463168404Spjd if (newdevid) 3464168404Spjd devid_str_free(newdevid); 3465168404Spjd } 3466168404Spjd 3467219089Spjd#ifdef sun 3468219089Spjd if (strncmp(path, "/dev/dsk/", 9) == 0) 3469219089Spjd path += 9; 3470168404Spjd 3471168404Spjd if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_WHOLE_DISK, 3472168404Spjd &value) == 0 && value) { 3473219089Spjd int pathlen = strlen(path); 3474168404Spjd char *tmp = zfs_strdup(hdl, path); 3475219089Spjd 3476219089Spjd /* 3477219089Spjd * If it starts with c#, and ends with "s0", chop 3478219089Spjd * the "s0" off, or if it ends with "s0/old", remove 3479219089Spjd * the "s0" from the middle. 3480219089Spjd */ 3481219089Spjd if (CTD_CHECK(tmp)) { 3482219089Spjd if (strcmp(&tmp[pathlen - 2], "s0") == 0) { 3483219089Spjd tmp[pathlen - 2] = '\0'; 3484219089Spjd } else if (pathlen > 6 && 3485219089Spjd strcmp(&tmp[pathlen - 6], "s0/old") == 0) { 3486219089Spjd (void) strcpy(&tmp[pathlen - 6], 3487219089Spjd "/old"); 3488219089Spjd } 3489219089Spjd } 3490168404Spjd return (tmp); 3491168404Spjd } 3492219089Spjd#else /* !sun */ 3493219089Spjd if (strncmp(path, _PATH_DEV, sizeof(_PATH_DEV) - 1) == 0) 3494219089Spjd path += sizeof(_PATH_DEV) - 1; 3495219089Spjd#endif /* !sun */ 3496168404Spjd } else { 3497168404Spjd verify(nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE, &path) == 0); 3498168404Spjd 3499168404Spjd /* 3500168404Spjd * If it's a raidz device, we need to stick in the parity level. 3501168404Spjd */ 3502168404Spjd if (strcmp(path, VDEV_TYPE_RAIDZ) == 0) { 3503168404Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_NPARITY, 3504168404Spjd &value) == 0); 3505168404Spjd (void) snprintf(buf, sizeof (buf), "%s%llu", path, 3506168404Spjd (u_longlong_t)value); 3507168404Spjd path = buf; 3508168404Spjd } 3509219089Spjd 3510219089Spjd /* 3511219089Spjd * We identify each top-level vdev by using a <type-id> 3512219089Spjd * naming convention. 3513219089Spjd */ 3514219089Spjd if (verbose) { 3515219089Spjd uint64_t id; 3516219089Spjd 3517219089Spjd verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_ID, 3518219089Spjd &id) == 0); 3519219089Spjd (void) snprintf(buf, sizeof (buf), "%s-%llu", path, 3520219089Spjd (u_longlong_t)id); 3521219089Spjd path = buf; 3522219089Spjd } 3523168404Spjd } 3524168404Spjd 3525168404Spjd return (zfs_strdup(hdl, path)); 3526168404Spjd} 3527168404Spjd 3528168404Spjdstatic int 3529168404Spjdzbookmark_compare(const void *a, const void *b) 3530168404Spjd{ 3531268123Sdelphij return (memcmp(a, b, sizeof (zbookmark_phys_t))); 3532168404Spjd} 3533168404Spjd 3534168404Spjd/* 3535168404Spjd * Retrieve the persistent error log, uniquify the members, and return to the 3536168404Spjd * caller. 3537168404Spjd */ 3538168404Spjdint 3539168404Spjdzpool_get_errlog(zpool_handle_t *zhp, nvlist_t **nverrlistp) 3540168404Spjd{ 3541168404Spjd zfs_cmd_t zc = { 0 }; 3542168404Spjd uint64_t count; 3543268123Sdelphij zbookmark_phys_t *zb = NULL; 3544168404Spjd int i; 3545168404Spjd 3546168404Spjd /* 3547168404Spjd * Retrieve the raw error list from the kernel. If the number of errors 3548168404Spjd * has increased, allocate more space and continue until we get the 3549168404Spjd * entire list. 3550168404Spjd */ 3551168404Spjd verify(nvlist_lookup_uint64(zhp->zpool_config, ZPOOL_CONFIG_ERRCOUNT, 3552168404Spjd &count) == 0); 3553185029Spjd if (count == 0) 3554185029Spjd return (0); 3555168404Spjd if ((zc.zc_nvlist_dst = (uintptr_t)zfs_alloc(zhp->zpool_hdl, 3556268123Sdelphij count * sizeof (zbookmark_phys_t))) == (uintptr_t)NULL) 3557168404Spjd return (-1); 3558168404Spjd zc.zc_nvlist_dst_size = count; 3559168404Spjd (void) strcpy(zc.zc_name, zhp->zpool_name); 3560168404Spjd for (;;) { 3561168404Spjd if (ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_ERROR_LOG, 3562168404Spjd &zc) != 0) { 3563168404Spjd free((void *)(uintptr_t)zc.zc_nvlist_dst); 3564168404Spjd if (errno == ENOMEM) { 3565268123Sdelphij void *dst; 3566268123Sdelphij 3567168404Spjd count = zc.zc_nvlist_dst_size; 3568268123Sdelphij dst = zfs_alloc(zhp->zpool_hdl, count * 3569268123Sdelphij sizeof (zbookmark_phys_t)); 3570268123Sdelphij if (dst == NULL) 3571168404Spjd return (-1); 3572268123Sdelphij zc.zc_nvlist_dst = (uintptr_t)dst; 3573168404Spjd } else { 3574168404Spjd return (-1); 3575168404Spjd } 3576168404Spjd } else { 3577168404Spjd break; 3578168404Spjd } 3579168404Spjd } 3580168404Spjd 3581168404Spjd /* 3582168404Spjd * Sort the resulting bookmarks. This is a little confusing due to the 3583168404Spjd * implementation of ZFS_IOC_ERROR_LOG. The bookmarks are copied last 3584168404Spjd * to first, and 'zc_nvlist_dst_size' indicates the number of boomarks 3585168404Spjd * _not_ copied as part of the process. So we point the start of our 3586168404Spjd * array appropriate and decrement the total number of elements. 3587168404Spjd */ 3588268123Sdelphij zb = ((zbookmark_phys_t *)(uintptr_t)zc.zc_nvlist_dst) + 3589168404Spjd zc.zc_nvlist_dst_size; 3590168404Spjd count -= zc.zc_nvlist_dst_size; 3591168404Spjd 3592268123Sdelphij qsort(zb, count, sizeof (zbookmark_phys_t), zbookmark_compare); 3593168404Spjd 3594168404Spjd verify(nvlist_alloc(nverrlistp, 0, KM_SLEEP) == 0); 3595168404Spjd 3596168404Spjd /* 3597168404Spjd * Fill in the nverrlistp with nvlist's of dataset and object numbers. 3598168404Spjd */ 3599168404Spjd for (i = 0; i < count; i++) { 3600168404Spjd nvlist_t *nv; 3601168404Spjd 3602168404Spjd /* ignoring zb_blkid and zb_level for now */ 3603168404Spjd if (i > 0 && zb[i-1].zb_objset == zb[i].zb_objset && 3604168404Spjd zb[i-1].zb_object == zb[i].zb_object) 3605168404Spjd continue; 3606168404Spjd 3607168404Spjd if (nvlist_alloc(&nv, NV_UNIQUE_NAME, KM_SLEEP) != 0) 3608168404Spjd goto nomem; 3609168404Spjd if (nvlist_add_uint64(nv, ZPOOL_ERR_DATASET, 3610168404Spjd zb[i].zb_objset) != 0) { 3611168404Spjd nvlist_free(nv); 3612168404Spjd goto nomem; 3613168404Spjd } 3614168404Spjd if (nvlist_add_uint64(nv, ZPOOL_ERR_OBJECT, 3615168404Spjd zb[i].zb_object) != 0) { 3616168404Spjd nvlist_free(nv); 3617168404Spjd goto nomem; 3618168404Spjd } 3619168404Spjd if (nvlist_add_nvlist(*nverrlistp, "ejk", nv) != 0) { 3620168404Spjd nvlist_free(nv); 3621168404Spjd goto nomem; 3622168404Spjd } 3623168404Spjd nvlist_free(nv); 3624168404Spjd } 3625168404Spjd 3626168404Spjd free((void *)(uintptr_t)zc.zc_nvlist_dst); 3627168404Spjd return (0); 3628168404Spjd 3629168404Spjdnomem: 3630168404Spjd free((void *)(uintptr_t)zc.zc_nvlist_dst); 3631168404Spjd return (no_memory(zhp->zpool_hdl)); 3632168404Spjd} 3633168404Spjd 3634168404Spjd/* 3635168404Spjd * Upgrade a ZFS pool to the latest on-disk version. 3636168404Spjd */ 3637168404Spjdint 3638185029Spjdzpool_upgrade(zpool_handle_t *zhp, uint64_t new_version) 3639168404Spjd{ 3640168404Spjd zfs_cmd_t zc = { 0 }; 3641168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3642168404Spjd 3643168404Spjd (void) strcpy(zc.zc_name, zhp->zpool_name); 3644185029Spjd zc.zc_cookie = new_version; 3645185029Spjd 3646185029Spjd if (zfs_ioctl(hdl, ZFS_IOC_POOL_UPGRADE, &zc) != 0) 3647168404Spjd return (zpool_standard_error_fmt(hdl, errno, 3648168404Spjd dgettext(TEXT_DOMAIN, "cannot upgrade '%s'"), 3649168404Spjd zhp->zpool_name)); 3650168404Spjd return (0); 3651168404Spjd} 3652168404Spjd 3653168404Spjdvoid 3654248571Smmzfs_save_arguments(int argc, char **argv, char *string, int len) 3655168404Spjd{ 3656248571Smm (void) strlcpy(string, basename(argv[0]), len); 3657248571Smm for (int i = 1; i < argc; i++) { 3658248571Smm (void) strlcat(string, " ", len); 3659248571Smm (void) strlcat(string, argv[i], len); 3660168404Spjd } 3661185029Spjd} 3662168404Spjd 3663185029Spjdint 3664248571Smmzpool_log_history(libzfs_handle_t *hdl, const char *message) 3665185029Spjd{ 3666248571Smm zfs_cmd_t zc = { 0 }; 3667248571Smm nvlist_t *args; 3668248571Smm int err; 3669168404Spjd 3670248571Smm args = fnvlist_alloc(); 3671248571Smm fnvlist_add_string(args, "message", message); 3672248571Smm err = zcmd_write_src_nvlist(hdl, &zc, args); 3673248571Smm if (err == 0) 3674248571Smm err = ioctl(hdl->libzfs_fd, ZFS_IOC_LOG_HISTORY, &zc); 3675248571Smm nvlist_free(args); 3676248571Smm zcmd_free_nvlists(&zc); 3677248571Smm return (err); 3678168404Spjd} 3679168404Spjd 3680168404Spjd/* 3681168404Spjd * Perform ioctl to get some command history of a pool. 3682168404Spjd * 3683168404Spjd * 'buf' is the buffer to fill up to 'len' bytes. 'off' is the 3684168404Spjd * logical offset of the history buffer to start reading from. 3685168404Spjd * 3686168404Spjd * Upon return, 'off' is the next logical offset to read from and 3687168404Spjd * 'len' is the actual amount of bytes read into 'buf'. 3688168404Spjd */ 3689168404Spjdstatic int 3690168404Spjdget_history(zpool_handle_t *zhp, char *buf, uint64_t *off, uint64_t *len) 3691168404Spjd{ 3692168404Spjd zfs_cmd_t zc = { 0 }; 3693168404Spjd libzfs_handle_t *hdl = zhp->zpool_hdl; 3694168404Spjd 3695168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3696168404Spjd 3697168404Spjd zc.zc_history = (uint64_t)(uintptr_t)buf; 3698168404Spjd zc.zc_history_len = *len; 3699168404Spjd zc.zc_history_offset = *off; 3700168404Spjd 3701168404Spjd if (ioctl(hdl->libzfs_fd, ZFS_IOC_POOL_GET_HISTORY, &zc) != 0) { 3702168404Spjd switch (errno) { 3703168404Spjd case EPERM: 3704168404Spjd return (zfs_error_fmt(hdl, EZFS_PERM, 3705168404Spjd dgettext(TEXT_DOMAIN, 3706168404Spjd "cannot show history for pool '%s'"), 3707168404Spjd zhp->zpool_name)); 3708168404Spjd case ENOENT: 3709168404Spjd return (zfs_error_fmt(hdl, EZFS_NOHISTORY, 3710168404Spjd dgettext(TEXT_DOMAIN, "cannot get history for pool " 3711168404Spjd "'%s'"), zhp->zpool_name)); 3712168404Spjd case ENOTSUP: 3713168404Spjd return (zfs_error_fmt(hdl, EZFS_BADVERSION, 3714168404Spjd dgettext(TEXT_DOMAIN, "cannot get history for pool " 3715168404Spjd "'%s', pool must be upgraded"), zhp->zpool_name)); 3716168404Spjd default: 3717168404Spjd return (zpool_standard_error_fmt(hdl, errno, 3718168404Spjd dgettext(TEXT_DOMAIN, 3719168404Spjd "cannot get history for '%s'"), zhp->zpool_name)); 3720168404Spjd } 3721168404Spjd } 3722168404Spjd 3723168404Spjd *len = zc.zc_history_len; 3724168404Spjd *off = zc.zc_history_offset; 3725168404Spjd 3726168404Spjd return (0); 3727168404Spjd} 3728168404Spjd 3729168404Spjd/* 3730168404Spjd * Process the buffer of nvlists, unpacking and storing each nvlist record 3731168404Spjd * into 'records'. 'leftover' is set to the number of bytes that weren't 3732168404Spjd * processed as there wasn't a complete record. 3733168404Spjd */ 3734219089Spjdint 3735168404Spjdzpool_history_unpack(char *buf, uint64_t bytes_read, uint64_t *leftover, 3736168404Spjd nvlist_t ***records, uint_t *numrecords) 3737168404Spjd{ 3738168404Spjd uint64_t reclen; 3739168404Spjd nvlist_t *nv; 3740168404Spjd int i; 3741168404Spjd 3742168404Spjd while (bytes_read > sizeof (reclen)) { 3743168404Spjd 3744168404Spjd /* get length of packed record (stored as little endian) */ 3745168404Spjd for (i = 0, reclen = 0; i < sizeof (reclen); i++) 3746168404Spjd reclen += (uint64_t)(((uchar_t *)buf)[i]) << (8*i); 3747168404Spjd 3748168404Spjd if (bytes_read < sizeof (reclen) + reclen) 3749168404Spjd break; 3750168404Spjd 3751168404Spjd /* unpack record */ 3752168404Spjd if (nvlist_unpack(buf + sizeof (reclen), reclen, &nv, 0) != 0) 3753168404Spjd return (ENOMEM); 3754168404Spjd bytes_read -= sizeof (reclen) + reclen; 3755168404Spjd buf += sizeof (reclen) + reclen; 3756168404Spjd 3757168404Spjd /* add record to nvlist array */ 3758168404Spjd (*numrecords)++; 3759168404Spjd if (ISP2(*numrecords + 1)) { 3760168404Spjd *records = realloc(*records, 3761168404Spjd *numrecords * 2 * sizeof (nvlist_t *)); 3762168404Spjd } 3763168404Spjd (*records)[*numrecords - 1] = nv; 3764168404Spjd } 3765168404Spjd 3766168404Spjd *leftover = bytes_read; 3767168404Spjd return (0); 3768168404Spjd} 3769168404Spjd 3770264467Sdelphij/* from spa_history.c: spa_history_create_obj() */ 3771264467Sdelphij#define HIS_BUF_LEN_DEF (128 << 10) 3772264467Sdelphij#define HIS_BUF_LEN_MAX (1 << 30) 3773168404Spjd 3774168404Spjd/* 3775168404Spjd * Retrieve the command history of a pool. 3776168404Spjd */ 3777168404Spjdint 3778168404Spjdzpool_get_history(zpool_handle_t *zhp, nvlist_t **nvhisp) 3779168404Spjd{ 3780264467Sdelphij char *buf = NULL; 3781264467Sdelphij uint64_t bufsize = HIS_BUF_LEN_DEF; 3782168404Spjd uint64_t off = 0; 3783168404Spjd nvlist_t **records = NULL; 3784168404Spjd uint_t numrecords = 0; 3785168404Spjd int err, i; 3786168404Spjd 3787264467Sdelphij if ((buf = malloc(bufsize)) == NULL) 3788264467Sdelphij return (ENOMEM); 3789168404Spjd do { 3790264467Sdelphij uint64_t bytes_read = bufsize; 3791168404Spjd uint64_t leftover; 3792168404Spjd 3793168404Spjd if ((err = get_history(zhp, buf, &off, &bytes_read)) != 0) 3794168404Spjd break; 3795168404Spjd 3796168404Spjd /* if nothing else was read in, we're at EOF, just return */ 3797264467Sdelphij if (bytes_read == 0) 3798168404Spjd break; 3799168404Spjd 3800168404Spjd if ((err = zpool_history_unpack(buf, bytes_read, 3801168404Spjd &leftover, &records, &numrecords)) != 0) 3802168404Spjd break; 3803168404Spjd off -= leftover; 3804168404Spjd 3805264467Sdelphij /* 3806264467Sdelphij * If the history block is too big, double the buffer 3807264467Sdelphij * size and try again. 3808264467Sdelphij */ 3809264467Sdelphij if (leftover == bytes_read) { 3810264467Sdelphij free(buf); 3811264467Sdelphij buf = NULL; 3812264467Sdelphij 3813264467Sdelphij bufsize <<= 1; 3814264467Sdelphij if ((bufsize >= HIS_BUF_LEN_MAX) || 3815264467Sdelphij ((buf = malloc(bufsize)) == NULL)) { 3816264467Sdelphij err = ENOMEM; 3817264467Sdelphij break; 3818264467Sdelphij } 3819264467Sdelphij } 3820264467Sdelphij 3821168404Spjd /* CONSTCOND */ 3822168404Spjd } while (1); 3823264467Sdelphij free(buf); 3824168404Spjd 3825168404Spjd if (!err) { 3826168404Spjd verify(nvlist_alloc(nvhisp, NV_UNIQUE_NAME, 0) == 0); 3827168404Spjd verify(nvlist_add_nvlist_array(*nvhisp, ZPOOL_HIST_RECORD, 3828168404Spjd records, numrecords) == 0); 3829168404Spjd } 3830168404Spjd for (i = 0; i < numrecords; i++) 3831168404Spjd nvlist_free(records[i]); 3832168404Spjd free(records); 3833168404Spjd 3834168404Spjd return (err); 3835168404Spjd} 3836168404Spjd 3837168404Spjdvoid 3838168404Spjdzpool_obj_to_path(zpool_handle_t *zhp, uint64_t dsobj, uint64_t obj, 3839168404Spjd char *pathname, size_t len) 3840168404Spjd{ 3841168404Spjd zfs_cmd_t zc = { 0 }; 3842168404Spjd boolean_t mounted = B_FALSE; 3843168404Spjd char *mntpnt = NULL; 3844168404Spjd char dsname[MAXNAMELEN]; 3845168404Spjd 3846168404Spjd if (dsobj == 0) { 3847168404Spjd /* special case for the MOS */ 3848168404Spjd (void) snprintf(pathname, len, "<metadata>:<0x%llx>", obj); 3849168404Spjd return; 3850168404Spjd } 3851168404Spjd 3852168404Spjd /* get the dataset's name */ 3853168404Spjd (void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name)); 3854168404Spjd zc.zc_obj = dsobj; 3855168404Spjd if (ioctl(zhp->zpool_hdl->libzfs_fd, 3856168404Spjd ZFS_IOC_DSOBJ_TO_DSNAME, &zc) != 0) { 3857168404Spjd /* just write out a path of two object numbers */ 3858168404Spjd (void) snprintf(pathname, len, "<0x%llx>:<0x%llx>", 3859168404Spjd dsobj, obj); 3860168404Spjd return; 3861168404Spjd } 3862168404Spjd (void) strlcpy(dsname, zc.zc_value, sizeof (dsname)); 3863168404Spjd 3864168404Spjd /* find out if the dataset is mounted */ 3865168404Spjd mounted = is_mounted(zhp->zpool_hdl, dsname, &mntpnt); 3866168404Spjd 3867168404Spjd /* get the corrupted object's path */ 3868168404Spjd (void) strlcpy(zc.zc_name, dsname, sizeof (zc.zc_name)); 3869168404Spjd zc.zc_obj = obj; 3870168404Spjd if (ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_OBJ_TO_PATH, 3871168404Spjd &zc) == 0) { 3872168404Spjd if (mounted) { 3873168404Spjd (void) snprintf(pathname, len, "%s%s", mntpnt, 3874168404Spjd zc.zc_value); 3875168404Spjd } else { 3876168404Spjd (void) snprintf(pathname, len, "%s:%s", 3877168404Spjd dsname, zc.zc_value); 3878168404Spjd } 3879168404Spjd } else { 3880168404Spjd (void) snprintf(pathname, len, "%s:<0x%llx>", dsname, obj); 3881168404Spjd } 3882168404Spjd free(mntpnt); 3883168404Spjd} 3884168404Spjd 3885219089Spjd#ifdef sun 3886185029Spjd/* 3887185029Spjd * Read the EFI label from the config, if a label does not exist then 3888185029Spjd * pass back the error to the caller. If the caller has passed a non-NULL 3889185029Spjd * diskaddr argument then we set it to the starting address of the EFI 3890185029Spjd * partition. 3891185029Spjd */ 3892185029Spjdstatic int 3893185029Spjdread_efi_label(nvlist_t *config, diskaddr_t *sb) 3894168404Spjd{ 3895185029Spjd char *path; 3896185029Spjd int fd; 3897185029Spjd char diskname[MAXPATHLEN]; 3898185029Spjd int err = -1; 3899168404Spjd 3900185029Spjd if (nvlist_lookup_string(config, ZPOOL_CONFIG_PATH, &path) != 0) 3901185029Spjd return (err); 3902168404Spjd 3903185029Spjd (void) snprintf(diskname, sizeof (diskname), "%s%s", RDISK_ROOT, 3904185029Spjd strrchr(path, '/')); 3905185029Spjd if ((fd = open(diskname, O_RDONLY|O_NDELAY)) >= 0) { 3906185029Spjd struct dk_gpt *vtoc; 3907185029Spjd 3908185029Spjd if ((err = efi_alloc_and_read(fd, &vtoc)) >= 0) { 3909185029Spjd if (sb != NULL) 3910185029Spjd *sb = vtoc->efi_parts[0].p_start; 3911185029Spjd efi_free(vtoc); 3912185029Spjd } 3913185029Spjd (void) close(fd); 3914168404Spjd } 3915185029Spjd return (err); 3916185029Spjd} 3917168404Spjd 3918185029Spjd/* 3919185029Spjd * determine where a partition starts on a disk in the current 3920185029Spjd * configuration 3921185029Spjd */ 3922185029Spjdstatic diskaddr_t 3923185029Spjdfind_start_block(nvlist_t *config) 3924185029Spjd{ 3925185029Spjd nvlist_t **child; 3926185029Spjd uint_t c, children; 3927185029Spjd diskaddr_t sb = MAXOFFSET_T; 3928185029Spjd uint64_t wholedisk; 3929168404Spjd 3930185029Spjd if (nvlist_lookup_nvlist_array(config, 3931185029Spjd ZPOOL_CONFIG_CHILDREN, &child, &children) != 0) { 3932185029Spjd if (nvlist_lookup_uint64(config, 3933185029Spjd ZPOOL_CONFIG_WHOLE_DISK, 3934185029Spjd &wholedisk) != 0 || !wholedisk) { 3935185029Spjd return (MAXOFFSET_T); 3936185029Spjd } 3937185029Spjd if (read_efi_label(config, &sb) < 0) 3938185029Spjd sb = MAXOFFSET_T; 3939185029Spjd return (sb); 3940168404Spjd } 3941168404Spjd 3942185029Spjd for (c = 0; c < children; c++) { 3943185029Spjd sb = find_start_block(child[c]); 3944185029Spjd if (sb != MAXOFFSET_T) { 3945185029Spjd return (sb); 3946185029Spjd } 3947168404Spjd } 3948185029Spjd return (MAXOFFSET_T); 3949185029Spjd} 3950185029Spjd#endif /* sun */ 3951168404Spjd 3952185029Spjd/* 3953185029Spjd * Label an individual disk. The name provided is the short name, 3954185029Spjd * stripped of any leading /dev path. 3955185029Spjd */ 3956185029Spjdint 3957224169Sgibbszpool_label_disk(libzfs_handle_t *hdl, zpool_handle_t *zhp, const char *name) 3958185029Spjd{ 3959219089Spjd#ifdef sun 3960185029Spjd char path[MAXPATHLEN]; 3961185029Spjd struct dk_gpt *vtoc; 3962185029Spjd int fd; 3963185029Spjd size_t resv = EFI_MIN_RESV_SIZE; 3964185029Spjd uint64_t slice_size; 3965185029Spjd diskaddr_t start_block; 3966185029Spjd char errbuf[1024]; 3967168404Spjd 3968185029Spjd /* prepare an error message just in case */ 3969185029Spjd (void) snprintf(errbuf, sizeof (errbuf), 3970185029Spjd dgettext(TEXT_DOMAIN, "cannot label '%s'"), name); 3971168404Spjd 3972185029Spjd if (zhp) { 3973185029Spjd nvlist_t *nvroot; 3974168404Spjd 3975236155Smm if (zpool_is_bootable(zhp)) { 3976209962Smm zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 3977209962Smm "EFI labeled devices are not supported on root " 3978209962Smm "pools.")); 3979209962Smm return (zfs_error(hdl, EZFS_POOL_NOTSUP, errbuf)); 3980209962Smm } 3981209962Smm 3982185029Spjd verify(nvlist_lookup_nvlist(zhp->zpool_config, 3983185029Spjd ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0); 3984168404Spjd 3985185029Spjd if (zhp->zpool_start_block == 0) 3986185029Spjd start_block = find_start_block(nvroot); 3987185029Spjd else 3988185029Spjd start_block = zhp->zpool_start_block; 3989185029Spjd zhp->zpool_start_block = start_block; 3990185029Spjd } else { 3991185029Spjd /* new pool */ 3992185029Spjd start_block = NEW_START_BLOCK; 3993185029Spjd } 3994168404Spjd 3995185029Spjd (void) snprintf(path, sizeof (path), "%s/%s%s", RDISK_ROOT, name, 3996185029Spjd BACKUP_SLICE); 3997168404Spjd 3998185029Spjd if ((fd = open(path, O_RDWR | O_NDELAY)) < 0) { 3999185029Spjd /* 4000185029Spjd * This shouldn't happen. We've long since verified that this 4001185029Spjd * is a valid device. 4002185029Spjd */ 4003185029Spjd zfs_error_aux(hdl, 4004185029Spjd dgettext(TEXT_DOMAIN, "unable to open device")); 4005185029Spjd return (zfs_error(hdl, EZFS_OPENFAILED, errbuf)); 4006185029Spjd } 4007168404Spjd 4008185029Spjd if (efi_alloc_and_init(fd, EFI_NUMPAR, &vtoc) != 0) { 4009185029Spjd /* 4010185029Spjd * The only way this can fail is if we run out of memory, or we 4011185029Spjd * were unable to read the disk's capacity 4012185029Spjd */ 4013185029Spjd if (errno == ENOMEM) 4014185029Spjd (void) no_memory(hdl); 4015168404Spjd 4016185029Spjd (void) close(fd); 4017185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4018185029Spjd "unable to read disk capacity"), name); 4019185029Spjd 4020185029Spjd return (zfs_error(hdl, EZFS_NOCAP, errbuf)); 4021168404Spjd } 4022168404Spjd 4023185029Spjd slice_size = vtoc->efi_last_u_lba + 1; 4024185029Spjd slice_size -= EFI_MIN_RESV_SIZE; 4025185029Spjd if (start_block == MAXOFFSET_T) 4026185029Spjd start_block = NEW_START_BLOCK; 4027185029Spjd slice_size -= start_block; 4028168404Spjd 4029185029Spjd vtoc->efi_parts[0].p_start = start_block; 4030185029Spjd vtoc->efi_parts[0].p_size = slice_size; 4031185029Spjd 4032168404Spjd /* 4033185029Spjd * Why we use V_USR: V_BACKUP confuses users, and is considered 4034185029Spjd * disposable by some EFI utilities (since EFI doesn't have a backup 4035185029Spjd * slice). V_UNASSIGNED is supposed to be used only for zero size 4036185029Spjd * partitions, and efi_write() will fail if we use it. V_ROOT, V_BOOT, 4037185029Spjd * etc. were all pretty specific. V_USR is as close to reality as we 4038185029Spjd * can get, in the absence of V_OTHER. 4039168404Spjd */ 4040185029Spjd vtoc->efi_parts[0].p_tag = V_USR; 4041185029Spjd (void) strcpy(vtoc->efi_parts[0].p_name, "zfs"); 4042168404Spjd 4043185029Spjd vtoc->efi_parts[8].p_start = slice_size + start_block; 4044185029Spjd vtoc->efi_parts[8].p_size = resv; 4045185029Spjd vtoc->efi_parts[8].p_tag = V_RESERVED; 4046168404Spjd 4047185029Spjd if (efi_write(fd, vtoc) != 0) { 4048185029Spjd /* 4049185029Spjd * Some block drivers (like pcata) may not support EFI 4050185029Spjd * GPT labels. Print out a helpful error message dir- 4051185029Spjd * ecting the user to manually label the disk and give 4052185029Spjd * a specific slice. 4053185029Spjd */ 4054185029Spjd (void) close(fd); 4055185029Spjd efi_free(vtoc); 4056168404Spjd 4057185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4058185029Spjd "try using fdisk(1M) and then provide a specific slice")); 4059185029Spjd return (zfs_error(hdl, EZFS_LABELFAILED, errbuf)); 4060168404Spjd } 4061185029Spjd 4062185029Spjd (void) close(fd); 4063185029Spjd efi_free(vtoc); 4064185029Spjd#endif /* sun */ 4065168404Spjd return (0); 4066168404Spjd} 4067168404Spjd 4068185029Spjdstatic boolean_t 4069185029Spjdsupported_dump_vdev_type(libzfs_handle_t *hdl, nvlist_t *config, char *errbuf) 4070168404Spjd{ 4071185029Spjd char *type; 4072185029Spjd nvlist_t **child; 4073185029Spjd uint_t children, c; 4074185029Spjd 4075185029Spjd verify(nvlist_lookup_string(config, ZPOOL_CONFIG_TYPE, &type) == 0); 4076255750Sdelphij if (strcmp(type, VDEV_TYPE_FILE) == 0 || 4077219089Spjd strcmp(type, VDEV_TYPE_HOLE) == 0 || 4078185029Spjd strcmp(type, VDEV_TYPE_MISSING) == 0) { 4079185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4080185029Spjd "vdev type '%s' is not supported"), type); 4081185029Spjd (void) zfs_error(hdl, EZFS_VDEVNOTSUP, errbuf); 4082185029Spjd return (B_FALSE); 4083185029Spjd } 4084185029Spjd if (nvlist_lookup_nvlist_array(config, ZPOOL_CONFIG_CHILDREN, 4085185029Spjd &child, &children) == 0) { 4086185029Spjd for (c = 0; c < children; c++) { 4087185029Spjd if (!supported_dump_vdev_type(hdl, child[c], errbuf)) 4088185029Spjd return (B_FALSE); 4089185029Spjd } 4090185029Spjd } 4091185029Spjd return (B_TRUE); 4092168404Spjd} 4093168404Spjd 4094185029Spjd/* 4095255750Sdelphij * Check if this zvol is allowable for use as a dump device; zero if 4096255750Sdelphij * it is, > 0 if it isn't, < 0 if it isn't a zvol. 4097255750Sdelphij * 4098255750Sdelphij * Allowable storage configurations include mirrors, all raidz variants, and 4099255750Sdelphij * pools with log, cache, and spare devices. Pools which are backed by files or 4100255750Sdelphij * have missing/hole vdevs are not suitable. 4101185029Spjd */ 4102168404Spjdint 4103185029Spjdzvol_check_dump_config(char *arg) 4104168404Spjd{ 4105185029Spjd zpool_handle_t *zhp = NULL; 4106185029Spjd nvlist_t *config, *nvroot; 4107185029Spjd char *p, *volname; 4108185029Spjd nvlist_t **top; 4109185029Spjd uint_t toplevels; 4110185029Spjd libzfs_handle_t *hdl; 4111185029Spjd char errbuf[1024]; 4112185029Spjd char poolname[ZPOOL_MAXNAMELEN]; 4113185029Spjd int pathlen = strlen(ZVOL_FULL_DEV_DIR); 4114185029Spjd int ret = 1; 4115168404Spjd 4116185029Spjd if (strncmp(arg, ZVOL_FULL_DEV_DIR, pathlen)) { 4117168404Spjd return (-1); 4118185029Spjd } 4119168404Spjd 4120185029Spjd (void) snprintf(errbuf, sizeof (errbuf), dgettext(TEXT_DOMAIN, 4121185029Spjd "dump is not supported on device '%s'"), arg); 4122168404Spjd 4123185029Spjd if ((hdl = libzfs_init()) == NULL) 4124185029Spjd return (1); 4125185029Spjd libzfs_print_on_error(hdl, B_TRUE); 4126168404Spjd 4127185029Spjd volname = arg + pathlen; 4128185029Spjd 4129185029Spjd /* check the configuration of the pool */ 4130185029Spjd if ((p = strchr(volname, '/')) == NULL) { 4131185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4132185029Spjd "malformed dataset name")); 4133185029Spjd (void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf); 4134185029Spjd return (1); 4135185029Spjd } else if (p - volname >= ZFS_MAXNAMELEN) { 4136185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4137185029Spjd "dataset name is too long")); 4138185029Spjd (void) zfs_error(hdl, EZFS_NAMETOOLONG, errbuf); 4139185029Spjd return (1); 4140185029Spjd } else { 4141185029Spjd (void) strncpy(poolname, volname, p - volname); 4142185029Spjd poolname[p - volname] = '\0'; 4143168404Spjd } 4144168404Spjd 4145185029Spjd if ((zhp = zpool_open(hdl, poolname)) == NULL) { 4146185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4147185029Spjd "could not open pool '%s'"), poolname); 4148185029Spjd (void) zfs_error(hdl, EZFS_OPENFAILED, errbuf); 4149185029Spjd goto out; 4150185029Spjd } 4151185029Spjd config = zpool_get_config(zhp, NULL); 4152185029Spjd if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, 4153185029Spjd &nvroot) != 0) { 4154185029Spjd zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, 4155185029Spjd "could not obtain vdev configuration for '%s'"), poolname); 4156185029Spjd (void) zfs_error(hdl, EZFS_INVALCONFIG, errbuf); 4157185029Spjd goto out; 4158185029Spjd } 4159185029Spjd 4160185029Spjd verify(nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN, 4161185029Spjd &top, &toplevels) == 0); 4162185029Spjd 4163185029Spjd if (!supported_dump_vdev_type(hdl, top[0], errbuf)) { 4164185029Spjd goto out; 4165185029Spjd } 4166185029Spjd ret = 0; 4167185029Spjd 4168185029Spjdout: 4169185029Spjd if (zhp) 4170185029Spjd zpool_close(zhp); 4171185029Spjd libzfs_fini(hdl); 4172185029Spjd return (ret); 4173168404Spjd} 4174