libzfs_pool.c revision 276446
1168404Spjd/*
2168404Spjd * CDDL HEADER START
3168404Spjd *
4168404Spjd * The contents of this file are subject to the terms of the
5168404Spjd * Common Development and Distribution License (the "License").
6168404Spjd * You may not use this file except in compliance with the License.
7168404Spjd *
8168404Spjd * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9168404Spjd * or http://www.opensolaris.org/os/licensing.
10168404Spjd * See the License for the specific language governing permissions
11168404Spjd * and limitations under the License.
12168404Spjd *
13168404Spjd * When distributing Covered Code, include this CDDL HEADER in each
14168404Spjd * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15168404Spjd * If applicable, add the following below this CDDL HEADER, with the
16168404Spjd * fields enclosed by brackets "[]" replaced with your own identifying
17168404Spjd * information: Portions Copyright [yyyy] [name of copyright owner]
18168404Spjd *
19168404Spjd * CDDL HEADER END
20168404Spjd */
21168404Spjd
22168404Spjd/*
23219089Spjd * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
24228103Smm * Copyright 2011 Nexenta Systems, Inc. All rights reserved.
25272502Sdelphij * Copyright (c) 2011, 2014 by Delphix. All rights reserved.
26255750Sdelphij * Copyright (c) 2013, Joyent, Inc. All rights reserved.
27168404Spjd */
28168404Spjd
29168404Spjd#include <sys/types.h>
30168404Spjd#include <sys/stat.h>
31168404Spjd#include <ctype.h>
32168404Spjd#include <errno.h>
33168404Spjd#include <devid.h>
34168404Spjd#include <fcntl.h>
35168404Spjd#include <libintl.h>
36168404Spjd#include <stdio.h>
37168404Spjd#include <stdlib.h>
38168404Spjd#include <strings.h>
39168404Spjd#include <unistd.h>
40248571Smm#include <libgen.h>
41168404Spjd#include <sys/zfs_ioctl.h>
42219089Spjd#include <dlfcn.h>
43168404Spjd
44168404Spjd#include "zfs_namecheck.h"
45168404Spjd#include "zfs_prop.h"
46168404Spjd#include "libzfs_impl.h"
47219089Spjd#include "zfs_comutil.h"
48236884Smm#include "zfeature_common.h"
49168404Spjd
50185029Spjdstatic int read_efi_label(nvlist_t *config, diskaddr_t *sb);
51185029Spjd
52219089Spjd#define	DISK_ROOT	"/dev/dsk"
53219089Spjd#define	RDISK_ROOT	"/dev/rdsk"
54219089Spjd#define	BACKUP_SLICE	"s2"
55209962Smm
56219089Spjdtypedef struct prop_flags {
57219089Spjd	int create:1;	/* Validate property on creation */
58219089Spjd	int import:1;	/* Validate property on import */
59219089Spjd} prop_flags_t;
60219089Spjd
61168404Spjd/*
62185029Spjd * ====================================================================
63185029Spjd *   zpool property functions
64185029Spjd * ====================================================================
65185029Spjd */
66185029Spjd
67185029Spjdstatic int
68185029Spjdzpool_get_all_props(zpool_handle_t *zhp)
69185029Spjd{
70185029Spjd	zfs_cmd_t zc = { 0 };
71185029Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
72185029Spjd
73185029Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
74185029Spjd
75185029Spjd	if (zcmd_alloc_dst_nvlist(hdl, &zc, 0) != 0)
76185029Spjd		return (-1);
77185029Spjd
78185029Spjd	while (ioctl(hdl->libzfs_fd, ZFS_IOC_POOL_GET_PROPS, &zc) != 0) {
79185029Spjd		if (errno == ENOMEM) {
80185029Spjd			if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) {
81185029Spjd				zcmd_free_nvlists(&zc);
82185029Spjd				return (-1);
83185029Spjd			}
84185029Spjd		} else {
85185029Spjd			zcmd_free_nvlists(&zc);
86185029Spjd			return (-1);
87185029Spjd		}
88185029Spjd	}
89185029Spjd
90185029Spjd	if (zcmd_read_dst_nvlist(hdl, &zc, &zhp->zpool_props) != 0) {
91185029Spjd		zcmd_free_nvlists(&zc);
92185029Spjd		return (-1);
93185029Spjd	}
94185029Spjd
95185029Spjd	zcmd_free_nvlists(&zc);
96185029Spjd
97185029Spjd	return (0);
98185029Spjd}
99185029Spjd
100185029Spjdstatic int
101185029Spjdzpool_props_refresh(zpool_handle_t *zhp)
102185029Spjd{
103185029Spjd	nvlist_t *old_props;
104185029Spjd
105185029Spjd	old_props = zhp->zpool_props;
106185029Spjd
107185029Spjd	if (zpool_get_all_props(zhp) != 0)
108185029Spjd		return (-1);
109185029Spjd
110185029Spjd	nvlist_free(old_props);
111185029Spjd	return (0);
112185029Spjd}
113185029Spjd
114185029Spjdstatic char *
115185029Spjdzpool_get_prop_string(zpool_handle_t *zhp, zpool_prop_t prop,
116185029Spjd    zprop_source_t *src)
117185029Spjd{
118185029Spjd	nvlist_t *nv, *nvl;
119185029Spjd	uint64_t ival;
120185029Spjd	char *value;
121185029Spjd	zprop_source_t source;
122185029Spjd
123185029Spjd	nvl = zhp->zpool_props;
124185029Spjd	if (nvlist_lookup_nvlist(nvl, zpool_prop_to_name(prop), &nv) == 0) {
125185029Spjd		verify(nvlist_lookup_uint64(nv, ZPROP_SOURCE, &ival) == 0);
126185029Spjd		source = ival;
127185029Spjd		verify(nvlist_lookup_string(nv, ZPROP_VALUE, &value) == 0);
128185029Spjd	} else {
129185029Spjd		source = ZPROP_SRC_DEFAULT;
130185029Spjd		if ((value = (char *)zpool_prop_default_string(prop)) == NULL)
131185029Spjd			value = "-";
132185029Spjd	}
133185029Spjd
134185029Spjd	if (src)
135185029Spjd		*src = source;
136185029Spjd
137185029Spjd	return (value);
138185029Spjd}
139185029Spjd
140185029Spjduint64_t
141185029Spjdzpool_get_prop_int(zpool_handle_t *zhp, zpool_prop_t prop, zprop_source_t *src)
142185029Spjd{
143185029Spjd	nvlist_t *nv, *nvl;
144185029Spjd	uint64_t value;
145185029Spjd	zprop_source_t source;
146185029Spjd
147185029Spjd	if (zhp->zpool_props == NULL && zpool_get_all_props(zhp)) {
148185029Spjd		/*
149185029Spjd		 * zpool_get_all_props() has most likely failed because
150185029Spjd		 * the pool is faulted, but if all we need is the top level
151185029Spjd		 * vdev's guid then get it from the zhp config nvlist.
152185029Spjd		 */
153185029Spjd		if ((prop == ZPOOL_PROP_GUID) &&
154185029Spjd		    (nvlist_lookup_nvlist(zhp->zpool_config,
155185029Spjd		    ZPOOL_CONFIG_VDEV_TREE, &nv) == 0) &&
156185029Spjd		    (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID, &value)
157185029Spjd		    == 0)) {
158185029Spjd			return (value);
159185029Spjd		}
160185029Spjd		return (zpool_prop_default_numeric(prop));
161185029Spjd	}
162185029Spjd
163185029Spjd	nvl = zhp->zpool_props;
164185029Spjd	if (nvlist_lookup_nvlist(nvl, zpool_prop_to_name(prop), &nv) == 0) {
165185029Spjd		verify(nvlist_lookup_uint64(nv, ZPROP_SOURCE, &value) == 0);
166185029Spjd		source = value;
167185029Spjd		verify(nvlist_lookup_uint64(nv, ZPROP_VALUE, &value) == 0);
168185029Spjd	} else {
169185029Spjd		source = ZPROP_SRC_DEFAULT;
170185029Spjd		value = zpool_prop_default_numeric(prop);
171185029Spjd	}
172185029Spjd
173185029Spjd	if (src)
174185029Spjd		*src = source;
175185029Spjd
176185029Spjd	return (value);
177185029Spjd}
178185029Spjd
179185029Spjd/*
180185029Spjd * Map VDEV STATE to printed strings.
181185029Spjd */
182224169Sgibbsconst char *
183185029Spjdzpool_state_to_name(vdev_state_t state, vdev_aux_t aux)
184185029Spjd{
185185029Spjd	switch (state) {
186185029Spjd	case VDEV_STATE_CLOSED:
187185029Spjd	case VDEV_STATE_OFFLINE:
188185029Spjd		return (gettext("OFFLINE"));
189185029Spjd	case VDEV_STATE_REMOVED:
190185029Spjd		return (gettext("REMOVED"));
191185029Spjd	case VDEV_STATE_CANT_OPEN:
192185029Spjd		if (aux == VDEV_AUX_CORRUPT_DATA || aux == VDEV_AUX_BAD_LOG)
193185029Spjd			return (gettext("FAULTED"));
194219089Spjd		else if (aux == VDEV_AUX_SPLIT_POOL)
195219089Spjd			return (gettext("SPLIT"));
196185029Spjd		else
197185029Spjd			return (gettext("UNAVAIL"));
198185029Spjd	case VDEV_STATE_FAULTED:
199185029Spjd		return (gettext("FAULTED"));
200185029Spjd	case VDEV_STATE_DEGRADED:
201185029Spjd		return (gettext("DEGRADED"));
202185029Spjd	case VDEV_STATE_HEALTHY:
203185029Spjd		return (gettext("ONLINE"));
204185029Spjd	}
205185029Spjd
206185029Spjd	return (gettext("UNKNOWN"));
207185029Spjd}
208185029Spjd
209185029Spjd/*
210224169Sgibbs * Map POOL STATE to printed strings.
211224169Sgibbs */
212224169Sgibbsconst char *
213224169Sgibbszpool_pool_state_to_name(pool_state_t state)
214224169Sgibbs{
215224169Sgibbs	switch (state) {
216224169Sgibbs	case POOL_STATE_ACTIVE:
217224169Sgibbs		return (gettext("ACTIVE"));
218224169Sgibbs	case POOL_STATE_EXPORTED:
219224169Sgibbs		return (gettext("EXPORTED"));
220224169Sgibbs	case POOL_STATE_DESTROYED:
221224169Sgibbs		return (gettext("DESTROYED"));
222224169Sgibbs	case POOL_STATE_SPARE:
223224169Sgibbs		return (gettext("SPARE"));
224224169Sgibbs	case POOL_STATE_L2CACHE:
225224169Sgibbs		return (gettext("L2CACHE"));
226224169Sgibbs	case POOL_STATE_UNINITIALIZED:
227224169Sgibbs		return (gettext("UNINITIALIZED"));
228224169Sgibbs	case POOL_STATE_UNAVAIL:
229224169Sgibbs		return (gettext("UNAVAIL"));
230224169Sgibbs	case POOL_STATE_POTENTIALLY_ACTIVE:
231224169Sgibbs		return (gettext("POTENTIALLY_ACTIVE"));
232224169Sgibbs	}
233224169Sgibbs
234224169Sgibbs	return (gettext("UNKNOWN"));
235224169Sgibbs}
236224169Sgibbs
237224169Sgibbs/*
238185029Spjd * Get a zpool property value for 'prop' and return the value in
239185029Spjd * a pre-allocated buffer.
240185029Spjd */
241185029Spjdint
242185029Spjdzpool_get_prop(zpool_handle_t *zhp, zpool_prop_t prop, char *buf, size_t len,
243263889Sdelphij    zprop_source_t *srctype, boolean_t literal)
244185029Spjd{
245185029Spjd	uint64_t intval;
246185029Spjd	const char *strval;
247185029Spjd	zprop_source_t src = ZPROP_SRC_NONE;
248185029Spjd	nvlist_t *nvroot;
249185029Spjd	vdev_stat_t *vs;
250185029Spjd	uint_t vsc;
251185029Spjd
252185029Spjd	if (zpool_get_state(zhp) == POOL_STATE_UNAVAIL) {
253209962Smm		switch (prop) {
254209962Smm		case ZPOOL_PROP_NAME:
255185029Spjd			(void) strlcpy(buf, zpool_get_name(zhp), len);
256209962Smm			break;
257209962Smm
258209962Smm		case ZPOOL_PROP_HEALTH:
259276446Ssmh			(void) strlcpy(buf,
260276446Ssmh			    zpool_pool_state_to_name(POOL_STATE_UNAVAIL), len);
261209962Smm			break;
262209962Smm
263209962Smm		case ZPOOL_PROP_GUID:
264209962Smm			intval = zpool_get_prop_int(zhp, prop, &src);
265209962Smm			(void) snprintf(buf, len, "%llu", intval);
266209962Smm			break;
267209962Smm
268209962Smm		case ZPOOL_PROP_ALTROOT:
269209962Smm		case ZPOOL_PROP_CACHEFILE:
270228103Smm		case ZPOOL_PROP_COMMENT:
271209962Smm			if (zhp->zpool_props != NULL ||
272209962Smm			    zpool_get_all_props(zhp) == 0) {
273209962Smm				(void) strlcpy(buf,
274209962Smm				    zpool_get_prop_string(zhp, prop, &src),
275209962Smm				    len);
276263889Sdelphij				break;
277209962Smm			}
278209962Smm			/* FALLTHROUGH */
279209962Smm		default:
280185029Spjd			(void) strlcpy(buf, "-", len);
281209962Smm			break;
282209962Smm		}
283209962Smm
284209962Smm		if (srctype != NULL)
285209962Smm			*srctype = src;
286185029Spjd		return (0);
287185029Spjd	}
288185029Spjd
289185029Spjd	if (zhp->zpool_props == NULL && zpool_get_all_props(zhp) &&
290185029Spjd	    prop != ZPOOL_PROP_NAME)
291185029Spjd		return (-1);
292185029Spjd
293185029Spjd	switch (zpool_prop_get_type(prop)) {
294185029Spjd	case PROP_TYPE_STRING:
295185029Spjd		(void) strlcpy(buf, zpool_get_prop_string(zhp, prop, &src),
296185029Spjd		    len);
297185029Spjd		break;
298185029Spjd
299185029Spjd	case PROP_TYPE_NUMBER:
300185029Spjd		intval = zpool_get_prop_int(zhp, prop, &src);
301185029Spjd
302185029Spjd		switch (prop) {
303185029Spjd		case ZPOOL_PROP_SIZE:
304219089Spjd		case ZPOOL_PROP_ALLOCATED:
305219089Spjd		case ZPOOL_PROP_FREE:
306236884Smm		case ZPOOL_PROP_FREEING:
307268079Sdelphij		case ZPOOL_PROP_LEAKED:
308263889Sdelphij			if (literal) {
309263889Sdelphij				(void) snprintf(buf, len, "%llu",
310263889Sdelphij				    (u_longlong_t)intval);
311263889Sdelphij			} else {
312263889Sdelphij				(void) zfs_nicenum(intval, buf, len);
313263889Sdelphij			}
314185029Spjd			break;
315272502Sdelphij		case ZPOOL_PROP_EXPANDSZ:
316272502Sdelphij			if (intval == 0) {
317272502Sdelphij				(void) strlcpy(buf, "-", len);
318272502Sdelphij			} else if (literal) {
319272502Sdelphij				(void) snprintf(buf, len, "%llu",
320272502Sdelphij				    (u_longlong_t)intval);
321272502Sdelphij			} else {
322272502Sdelphij				(void) zfs_nicenum(intval, buf, len);
323272502Sdelphij			}
324272502Sdelphij			break;
325185029Spjd		case ZPOOL_PROP_CAPACITY:
326263889Sdelphij			if (literal) {
327263889Sdelphij				(void) snprintf(buf, len, "%llu",
328263889Sdelphij				    (u_longlong_t)intval);
329263889Sdelphij			} else {
330263889Sdelphij				(void) snprintf(buf, len, "%llu%%",
331263889Sdelphij				    (u_longlong_t)intval);
332263889Sdelphij			}
333185029Spjd			break;
334269118Sdelphij		case ZPOOL_PROP_FRAGMENTATION:
335269118Sdelphij			if (intval == UINT64_MAX) {
336269118Sdelphij				(void) strlcpy(buf, "-", len);
337269118Sdelphij			} else {
338269118Sdelphij				(void) snprintf(buf, len, "%llu%%",
339269118Sdelphij				    (u_longlong_t)intval);
340269118Sdelphij			}
341269118Sdelphij			break;
342219089Spjd		case ZPOOL_PROP_DEDUPRATIO:
343219089Spjd			(void) snprintf(buf, len, "%llu.%02llux",
344219089Spjd			    (u_longlong_t)(intval / 100),
345219089Spjd			    (u_longlong_t)(intval % 100));
346219089Spjd			break;
347185029Spjd		case ZPOOL_PROP_HEALTH:
348185029Spjd			verify(nvlist_lookup_nvlist(zpool_get_config(zhp, NULL),
349185029Spjd			    ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0);
350185029Spjd			verify(nvlist_lookup_uint64_array(nvroot,
351219089Spjd			    ZPOOL_CONFIG_VDEV_STATS, (uint64_t **)&vs, &vsc)
352219089Spjd			    == 0);
353185029Spjd
354185029Spjd			(void) strlcpy(buf, zpool_state_to_name(intval,
355185029Spjd			    vs->vs_aux), len);
356185029Spjd			break;
357236884Smm		case ZPOOL_PROP_VERSION:
358236884Smm			if (intval >= SPA_VERSION_FEATURES) {
359236884Smm				(void) snprintf(buf, len, "-");
360236884Smm				break;
361236884Smm			}
362236884Smm			/* FALLTHROUGH */
363185029Spjd		default:
364185029Spjd			(void) snprintf(buf, len, "%llu", intval);
365185029Spjd		}
366185029Spjd		break;
367185029Spjd
368185029Spjd	case PROP_TYPE_INDEX:
369185029Spjd		intval = zpool_get_prop_int(zhp, prop, &src);
370185029Spjd		if (zpool_prop_index_to_string(prop, intval, &strval)
371185029Spjd		    != 0)
372185029Spjd			return (-1);
373185029Spjd		(void) strlcpy(buf, strval, len);
374185029Spjd		break;
375185029Spjd
376185029Spjd	default:
377185029Spjd		abort();
378185029Spjd	}
379185029Spjd
380185029Spjd	if (srctype)
381185029Spjd		*srctype = src;
382185029Spjd
383185029Spjd	return (0);
384185029Spjd}
385185029Spjd
386185029Spjd/*
387185029Spjd * Check if the bootfs name has the same pool name as it is set to.
388185029Spjd * Assuming bootfs is a valid dataset name.
389185029Spjd */
390185029Spjdstatic boolean_t
391185029Spjdbootfs_name_valid(const char *pool, char *bootfs)
392185029Spjd{
393185029Spjd	int len = strlen(pool);
394185029Spjd
395185029Spjd	if (!zfs_name_valid(bootfs, ZFS_TYPE_FILESYSTEM|ZFS_TYPE_SNAPSHOT))
396185029Spjd		return (B_FALSE);
397185029Spjd
398185029Spjd	if (strncmp(pool, bootfs, len) == 0 &&
399185029Spjd	    (bootfs[len] == '/' || bootfs[len] == '\0'))
400185029Spjd		return (B_TRUE);
401185029Spjd
402185029Spjd	return (B_FALSE);
403185029Spjd}
404185029Spjd
405185029Spjd/*
406185029Spjd * Inspect the configuration to determine if any of the devices contain
407185029Spjd * an EFI label.
408185029Spjd */
409185029Spjdstatic boolean_t
410185029Spjdpool_uses_efi(nvlist_t *config)
411185029Spjd{
412209962Smm#ifdef sun
413185029Spjd	nvlist_t **child;
414185029Spjd	uint_t c, children;
415185029Spjd
416185029Spjd	if (nvlist_lookup_nvlist_array(config, ZPOOL_CONFIG_CHILDREN,
417185029Spjd	    &child, &children) != 0)
418185029Spjd		return (read_efi_label(config, NULL) >= 0);
419185029Spjd
420185029Spjd	for (c = 0; c < children; c++) {
421185029Spjd		if (pool_uses_efi(child[c]))
422185029Spjd			return (B_TRUE);
423185029Spjd	}
424209962Smm#endif	/* sun */
425185029Spjd	return (B_FALSE);
426185029Spjd}
427185029Spjd
428236155Smmboolean_t
429236155Smmzpool_is_bootable(zpool_handle_t *zhp)
430219089Spjd{
431219089Spjd	char bootfs[ZPOOL_MAXNAMELEN];
432219089Spjd
433219089Spjd	return (zpool_get_prop(zhp, ZPOOL_PROP_BOOTFS, bootfs,
434263889Sdelphij	    sizeof (bootfs), NULL, B_FALSE) == 0 && strncmp(bootfs, "-",
435219089Spjd	    sizeof (bootfs)) != 0);
436219089Spjd}
437219089Spjd
438219089Spjd
439185029Spjd/*
440185029Spjd * Given an nvlist of zpool properties to be set, validate that they are
441185029Spjd * correct, and parse any numeric properties (index, boolean, etc) if they are
442185029Spjd * specified as strings.
443185029Spjd */
444185029Spjdstatic nvlist_t *
445185029Spjdzpool_valid_proplist(libzfs_handle_t *hdl, const char *poolname,
446219089Spjd    nvlist_t *props, uint64_t version, prop_flags_t flags, char *errbuf)
447185029Spjd{
448185029Spjd	nvpair_t *elem;
449185029Spjd	nvlist_t *retprops;
450185029Spjd	zpool_prop_t prop;
451185029Spjd	char *strval;
452185029Spjd	uint64_t intval;
453228103Smm	char *slash, *check;
454185029Spjd	struct stat64 statbuf;
455185029Spjd	zpool_handle_t *zhp;
456185029Spjd	nvlist_t *nvroot;
457185029Spjd
458185029Spjd	if (nvlist_alloc(&retprops, NV_UNIQUE_NAME, 0) != 0) {
459185029Spjd		(void) no_memory(hdl);
460185029Spjd		return (NULL);
461185029Spjd	}
462185029Spjd
463185029Spjd	elem = NULL;
464185029Spjd	while ((elem = nvlist_next_nvpair(props, elem)) != NULL) {
465185029Spjd		const char *propname = nvpair_name(elem);
466185029Spjd
467236884Smm		prop = zpool_name_to_prop(propname);
468236884Smm		if (prop == ZPROP_INVAL && zpool_prop_feature(propname)) {
469236884Smm			int err;
470236884Smm			char *fname = strchr(propname, '@') + 1;
471236884Smm
472259813Sdelphij			err = zfeature_lookup_name(fname, NULL);
473236884Smm			if (err != 0) {
474236884Smm				ASSERT3U(err, ==, ENOENT);
475236884Smm				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
476236884Smm				    "invalid feature '%s'"), fname);
477236884Smm				(void) zfs_error(hdl, EZFS_BADPROP, errbuf);
478236884Smm				goto error;
479236884Smm			}
480236884Smm
481236884Smm			if (nvpair_type(elem) != DATA_TYPE_STRING) {
482236884Smm				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
483236884Smm				    "'%s' must be a string"), propname);
484236884Smm				(void) zfs_error(hdl, EZFS_BADPROP, errbuf);
485236884Smm				goto error;
486236884Smm			}
487236884Smm
488236884Smm			(void) nvpair_value_string(elem, &strval);
489236884Smm			if (strcmp(strval, ZFS_FEATURE_ENABLED) != 0) {
490236884Smm				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
491236884Smm				    "property '%s' can only be set to "
492236884Smm				    "'enabled'"), propname);
493236884Smm				(void) zfs_error(hdl, EZFS_BADPROP, errbuf);
494236884Smm				goto error;
495236884Smm			}
496236884Smm
497236884Smm			if (nvlist_add_uint64(retprops, propname, 0) != 0) {
498236884Smm				(void) no_memory(hdl);
499236884Smm				goto error;
500236884Smm			}
501236884Smm			continue;
502236884Smm		}
503236884Smm
504185029Spjd		/*
505185029Spjd		 * Make sure this property is valid and applies to this type.
506185029Spjd		 */
507236884Smm		if (prop == ZPROP_INVAL) {
508185029Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
509185029Spjd			    "invalid property '%s'"), propname);
510185029Spjd			(void) zfs_error(hdl, EZFS_BADPROP, errbuf);
511185029Spjd			goto error;
512185029Spjd		}
513185029Spjd
514185029Spjd		if (zpool_prop_readonly(prop)) {
515185029Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "'%s' "
516185029Spjd			    "is readonly"), propname);
517185029Spjd			(void) zfs_error(hdl, EZFS_PROPREADONLY, errbuf);
518185029Spjd			goto error;
519185029Spjd		}
520185029Spjd
521185029Spjd		if (zprop_parse_value(hdl, elem, prop, ZFS_TYPE_POOL, retprops,
522185029Spjd		    &strval, &intval, errbuf) != 0)
523185029Spjd			goto error;
524185029Spjd
525185029Spjd		/*
526185029Spjd		 * Perform additional checking for specific properties.
527185029Spjd		 */
528185029Spjd		switch (prop) {
529185029Spjd		case ZPOOL_PROP_VERSION:
530236884Smm			if (intval < version ||
531236884Smm			    !SPA_VERSION_IS_SUPPORTED(intval)) {
532185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
533185029Spjd				    "property '%s' number %d is invalid."),
534185029Spjd				    propname, intval);
535185029Spjd				(void) zfs_error(hdl, EZFS_BADVERSION, errbuf);
536185029Spjd				goto error;
537185029Spjd			}
538185029Spjd			break;
539185029Spjd
540185029Spjd		case ZPOOL_PROP_BOOTFS:
541219089Spjd			if (flags.create || flags.import) {
542185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
543185029Spjd				    "property '%s' cannot be set at creation "
544185029Spjd				    "or import time"), propname);
545185029Spjd				(void) zfs_error(hdl, EZFS_BADPROP, errbuf);
546185029Spjd				goto error;
547185029Spjd			}
548185029Spjd
549185029Spjd			if (version < SPA_VERSION_BOOTFS) {
550185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
551185029Spjd				    "pool must be upgraded to support "
552185029Spjd				    "'%s' property"), propname);
553185029Spjd				(void) zfs_error(hdl, EZFS_BADVERSION, errbuf);
554185029Spjd				goto error;
555185029Spjd			}
556185029Spjd
557185029Spjd			/*
558185029Spjd			 * bootfs property value has to be a dataset name and
559185029Spjd			 * the dataset has to be in the same pool as it sets to.
560185029Spjd			 */
561185029Spjd			if (strval[0] != '\0' && !bootfs_name_valid(poolname,
562185029Spjd			    strval)) {
563185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "'%s' "
564185029Spjd				    "is an invalid name"), strval);
565185029Spjd				(void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf);
566185029Spjd				goto error;
567185029Spjd			}
568185029Spjd
569185029Spjd			if ((zhp = zpool_open_canfail(hdl, poolname)) == NULL) {
570185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
571185029Spjd				    "could not open pool '%s'"), poolname);
572185029Spjd				(void) zfs_error(hdl, EZFS_OPENFAILED, errbuf);
573185029Spjd				goto error;
574185029Spjd			}
575185029Spjd			verify(nvlist_lookup_nvlist(zpool_get_config(zhp, NULL),
576185029Spjd			    ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0);
577185029Spjd
578219089Spjd#ifdef sun
579185029Spjd			/*
580185029Spjd			 * bootfs property cannot be set on a disk which has
581185029Spjd			 * been EFI labeled.
582185029Spjd			 */
583185029Spjd			if (pool_uses_efi(nvroot)) {
584185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
585185029Spjd				    "property '%s' not supported on "
586185029Spjd				    "EFI labeled devices"), propname);
587185029Spjd				(void) zfs_error(hdl, EZFS_POOL_NOTSUP, errbuf);
588185029Spjd				zpool_close(zhp);
589185029Spjd				goto error;
590185029Spjd			}
591219089Spjd#endif	/* sun */
592185029Spjd			zpool_close(zhp);
593185029Spjd			break;
594185029Spjd
595185029Spjd		case ZPOOL_PROP_ALTROOT:
596219089Spjd			if (!flags.create && !flags.import) {
597185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
598185029Spjd				    "property '%s' can only be set during pool "
599185029Spjd				    "creation or import"), propname);
600185029Spjd				(void) zfs_error(hdl, EZFS_BADPROP, errbuf);
601185029Spjd				goto error;
602185029Spjd			}
603185029Spjd
604185029Spjd			if (strval[0] != '/') {
605185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
606185029Spjd				    "bad alternate root '%s'"), strval);
607185029Spjd				(void) zfs_error(hdl, EZFS_BADPATH, errbuf);
608185029Spjd				goto error;
609185029Spjd			}
610185029Spjd			break;
611185029Spjd
612185029Spjd		case ZPOOL_PROP_CACHEFILE:
613185029Spjd			if (strval[0] == '\0')
614185029Spjd				break;
615185029Spjd
616185029Spjd			if (strcmp(strval, "none") == 0)
617185029Spjd				break;
618185029Spjd
619185029Spjd			if (strval[0] != '/') {
620185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
621185029Spjd				    "property '%s' must be empty, an "
622185029Spjd				    "absolute path, or 'none'"), propname);
623185029Spjd				(void) zfs_error(hdl, EZFS_BADPATH, errbuf);
624185029Spjd				goto error;
625185029Spjd			}
626185029Spjd
627185029Spjd			slash = strrchr(strval, '/');
628185029Spjd
629185029Spjd			if (slash[1] == '\0' || strcmp(slash, "/.") == 0 ||
630185029Spjd			    strcmp(slash, "/..") == 0) {
631185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
632185029Spjd				    "'%s' is not a valid file"), strval);
633185029Spjd				(void) zfs_error(hdl, EZFS_BADPATH, errbuf);
634185029Spjd				goto error;
635185029Spjd			}
636185029Spjd
637185029Spjd			*slash = '\0';
638185029Spjd
639185029Spjd			if (strval[0] != '\0' &&
640185029Spjd			    (stat64(strval, &statbuf) != 0 ||
641185029Spjd			    !S_ISDIR(statbuf.st_mode))) {
642185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
643185029Spjd				    "'%s' is not a valid directory"),
644185029Spjd				    strval);
645185029Spjd				(void) zfs_error(hdl, EZFS_BADPATH, errbuf);
646185029Spjd				goto error;
647185029Spjd			}
648185029Spjd
649185029Spjd			*slash = '/';
650185029Spjd			break;
651219089Spjd
652228103Smm		case ZPOOL_PROP_COMMENT:
653228103Smm			for (check = strval; *check != '\0'; check++) {
654228103Smm				if (!isprint(*check)) {
655228103Smm					zfs_error_aux(hdl,
656228103Smm					    dgettext(TEXT_DOMAIN,
657228103Smm					    "comment may only have printable "
658228103Smm					    "characters"));
659228103Smm					(void) zfs_error(hdl, EZFS_BADPROP,
660228103Smm					    errbuf);
661228103Smm					goto error;
662228103Smm				}
663228103Smm			}
664228103Smm			if (strlen(strval) > ZPROP_MAX_COMMENT) {
665228103Smm				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
666228103Smm				    "comment must not exceed %d characters"),
667228103Smm				    ZPROP_MAX_COMMENT);
668228103Smm				(void) zfs_error(hdl, EZFS_BADPROP, errbuf);
669228103Smm				goto error;
670228103Smm			}
671228103Smm			break;
672219089Spjd		case ZPOOL_PROP_READONLY:
673219089Spjd			if (!flags.import) {
674219089Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
675219089Spjd				    "property '%s' can only be set at "
676219089Spjd				    "import time"), propname);
677219089Spjd				(void) zfs_error(hdl, EZFS_BADPROP, errbuf);
678219089Spjd				goto error;
679219089Spjd			}
680219089Spjd			break;
681185029Spjd		}
682185029Spjd	}
683185029Spjd
684185029Spjd	return (retprops);
685185029Spjderror:
686185029Spjd	nvlist_free(retprops);
687185029Spjd	return (NULL);
688185029Spjd}
689185029Spjd
690185029Spjd/*
691185029Spjd * Set zpool property : propname=propval.
692185029Spjd */
693185029Spjdint
694185029Spjdzpool_set_prop(zpool_handle_t *zhp, const char *propname, const char *propval)
695185029Spjd{
696185029Spjd	zfs_cmd_t zc = { 0 };
697185029Spjd	int ret = -1;
698185029Spjd	char errbuf[1024];
699185029Spjd	nvlist_t *nvl = NULL;
700185029Spjd	nvlist_t *realprops;
701185029Spjd	uint64_t version;
702219089Spjd	prop_flags_t flags = { 0 };
703185029Spjd
704185029Spjd	(void) snprintf(errbuf, sizeof (errbuf),
705185029Spjd	    dgettext(TEXT_DOMAIN, "cannot set property for '%s'"),
706185029Spjd	    zhp->zpool_name);
707185029Spjd
708185029Spjd	if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0)
709185029Spjd		return (no_memory(zhp->zpool_hdl));
710185029Spjd
711185029Spjd	if (nvlist_add_string(nvl, propname, propval) != 0) {
712185029Spjd		nvlist_free(nvl);
713185029Spjd		return (no_memory(zhp->zpool_hdl));
714185029Spjd	}
715185029Spjd
716185029Spjd	version = zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL);
717185029Spjd	if ((realprops = zpool_valid_proplist(zhp->zpool_hdl,
718219089Spjd	    zhp->zpool_name, nvl, version, flags, errbuf)) == NULL) {
719185029Spjd		nvlist_free(nvl);
720185029Spjd		return (-1);
721185029Spjd	}
722185029Spjd
723185029Spjd	nvlist_free(nvl);
724185029Spjd	nvl = realprops;
725185029Spjd
726185029Spjd	/*
727185029Spjd	 * Execute the corresponding ioctl() to set this property.
728185029Spjd	 */
729185029Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
730185029Spjd
731185029Spjd	if (zcmd_write_src_nvlist(zhp->zpool_hdl, &zc, nvl) != 0) {
732185029Spjd		nvlist_free(nvl);
733185029Spjd		return (-1);
734185029Spjd	}
735185029Spjd
736185029Spjd	ret = zfs_ioctl(zhp->zpool_hdl, ZFS_IOC_POOL_SET_PROPS, &zc);
737185029Spjd
738185029Spjd	zcmd_free_nvlists(&zc);
739185029Spjd	nvlist_free(nvl);
740185029Spjd
741185029Spjd	if (ret)
742185029Spjd		(void) zpool_standard_error(zhp->zpool_hdl, errno, errbuf);
743185029Spjd	else
744185029Spjd		(void) zpool_props_refresh(zhp);
745185029Spjd
746185029Spjd	return (ret);
747185029Spjd}
748185029Spjd
749185029Spjdint
750185029Spjdzpool_expand_proplist(zpool_handle_t *zhp, zprop_list_t **plp)
751185029Spjd{
752185029Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
753185029Spjd	zprop_list_t *entry;
754185029Spjd	char buf[ZFS_MAXPROPLEN];
755236884Smm	nvlist_t *features = NULL;
756236884Smm	zprop_list_t **last;
757236884Smm	boolean_t firstexpand = (NULL == *plp);
758185029Spjd
759185029Spjd	if (zprop_expand_list(hdl, plp, ZFS_TYPE_POOL) != 0)
760185029Spjd		return (-1);
761185029Spjd
762236884Smm	last = plp;
763236884Smm	while (*last != NULL)
764236884Smm		last = &(*last)->pl_next;
765236884Smm
766236884Smm	if ((*plp)->pl_all)
767236884Smm		features = zpool_get_features(zhp);
768236884Smm
769236884Smm	if ((*plp)->pl_all && firstexpand) {
770236884Smm		for (int i = 0; i < SPA_FEATURES; i++) {
771236884Smm			zprop_list_t *entry = zfs_alloc(hdl,
772236884Smm			    sizeof (zprop_list_t));
773236884Smm			entry->pl_prop = ZPROP_INVAL;
774236884Smm			entry->pl_user_prop = zfs_asprintf(hdl, "feature@%s",
775236884Smm			    spa_feature_table[i].fi_uname);
776236884Smm			entry->pl_width = strlen(entry->pl_user_prop);
777236884Smm			entry->pl_all = B_TRUE;
778236884Smm
779236884Smm			*last = entry;
780236884Smm			last = &entry->pl_next;
781236884Smm		}
782236884Smm	}
783236884Smm
784236884Smm	/* add any unsupported features */
785236884Smm	for (nvpair_t *nvp = nvlist_next_nvpair(features, NULL);
786236884Smm	    nvp != NULL; nvp = nvlist_next_nvpair(features, nvp)) {
787236884Smm		char *propname;
788236884Smm		boolean_t found;
789236884Smm		zprop_list_t *entry;
790236884Smm
791236884Smm		if (zfeature_is_supported(nvpair_name(nvp)))
792236884Smm			continue;
793236884Smm
794236884Smm		propname = zfs_asprintf(hdl, "unsupported@%s",
795236884Smm		    nvpair_name(nvp));
796236884Smm
797236884Smm		/*
798236884Smm		 * Before adding the property to the list make sure that no
799236884Smm		 * other pool already added the same property.
800236884Smm		 */
801236884Smm		found = B_FALSE;
802236884Smm		entry = *plp;
803236884Smm		while (entry != NULL) {
804236884Smm			if (entry->pl_user_prop != NULL &&
805236884Smm			    strcmp(propname, entry->pl_user_prop) == 0) {
806236884Smm				found = B_TRUE;
807236884Smm				break;
808236884Smm			}
809236884Smm			entry = entry->pl_next;
810236884Smm		}
811236884Smm		if (found) {
812236884Smm			free(propname);
813236884Smm			continue;
814236884Smm		}
815236884Smm
816236884Smm		entry = zfs_alloc(hdl, sizeof (zprop_list_t));
817236884Smm		entry->pl_prop = ZPROP_INVAL;
818236884Smm		entry->pl_user_prop = propname;
819236884Smm		entry->pl_width = strlen(entry->pl_user_prop);
820236884Smm		entry->pl_all = B_TRUE;
821236884Smm
822236884Smm		*last = entry;
823236884Smm		last = &entry->pl_next;
824236884Smm	}
825236884Smm
826185029Spjd	for (entry = *plp; entry != NULL; entry = entry->pl_next) {
827185029Spjd
828185029Spjd		if (entry->pl_fixed)
829185029Spjd			continue;
830185029Spjd
831185029Spjd		if (entry->pl_prop != ZPROP_INVAL &&
832185029Spjd		    zpool_get_prop(zhp, entry->pl_prop, buf, sizeof (buf),
833263889Sdelphij		    NULL, B_FALSE) == 0) {
834185029Spjd			if (strlen(buf) > entry->pl_width)
835185029Spjd				entry->pl_width = strlen(buf);
836185029Spjd		}
837185029Spjd	}
838185029Spjd
839185029Spjd	return (0);
840185029Spjd}
841185029Spjd
842236884Smm/*
843236884Smm * Get the state for the given feature on the given ZFS pool.
844236884Smm */
845236884Smmint
846236884Smmzpool_prop_get_feature(zpool_handle_t *zhp, const char *propname, char *buf,
847236884Smm    size_t len)
848236884Smm{
849236884Smm	uint64_t refcount;
850236884Smm	boolean_t found = B_FALSE;
851236884Smm	nvlist_t *features = zpool_get_features(zhp);
852236884Smm	boolean_t supported;
853236884Smm	const char *feature = strchr(propname, '@') + 1;
854185029Spjd
855236884Smm	supported = zpool_prop_feature(propname);
856236884Smm	ASSERT(supported || zpool_prop_unsupported(propname));
857236884Smm
858236884Smm	/*
859236884Smm	 * Convert from feature name to feature guid. This conversion is
860236884Smm	 * unecessary for unsupported@... properties because they already
861236884Smm	 * use guids.
862236884Smm	 */
863236884Smm	if (supported) {
864236884Smm		int ret;
865259813Sdelphij		spa_feature_t fid;
866236884Smm
867259813Sdelphij		ret = zfeature_lookup_name(feature, &fid);
868236884Smm		if (ret != 0) {
869236884Smm			(void) strlcpy(buf, "-", len);
870236884Smm			return (ENOTSUP);
871236884Smm		}
872259813Sdelphij		feature = spa_feature_table[fid].fi_guid;
873236884Smm	}
874236884Smm
875236884Smm	if (nvlist_lookup_uint64(features, feature, &refcount) == 0)
876236884Smm		found = B_TRUE;
877236884Smm
878236884Smm	if (supported) {
879236884Smm		if (!found) {
880236884Smm			(void) strlcpy(buf, ZFS_FEATURE_DISABLED, len);
881236884Smm		} else  {
882236884Smm			if (refcount == 0)
883236884Smm				(void) strlcpy(buf, ZFS_FEATURE_ENABLED, len);
884236884Smm			else
885236884Smm				(void) strlcpy(buf, ZFS_FEATURE_ACTIVE, len);
886236884Smm		}
887236884Smm	} else {
888236884Smm		if (found) {
889236884Smm			if (refcount == 0) {
890236884Smm				(void) strcpy(buf, ZFS_UNSUPPORTED_INACTIVE);
891236884Smm			} else {
892236884Smm				(void) strcpy(buf, ZFS_UNSUPPORTED_READONLY);
893236884Smm			}
894236884Smm		} else {
895236884Smm			(void) strlcpy(buf, "-", len);
896236884Smm			return (ENOTSUP);
897236884Smm		}
898236884Smm	}
899236884Smm
900236884Smm	return (0);
901236884Smm}
902236884Smm
903185029Spjd/*
904219089Spjd * Don't start the slice at the default block of 34; many storage
905219089Spjd * devices will use a stripe width of 128k, so start there instead.
906219089Spjd */
907219089Spjd#define	NEW_START_BLOCK	256
908219089Spjd
909219089Spjd/*
910168404Spjd * Validate the given pool name, optionally putting an extended error message in
911168404Spjd * 'buf'.
912168404Spjd */
913185029Spjdboolean_t
914168404Spjdzpool_name_valid(libzfs_handle_t *hdl, boolean_t isopen, const char *pool)
915168404Spjd{
916168404Spjd	namecheck_err_t why;
917168404Spjd	char what;
918168404Spjd	int ret;
919168404Spjd
920168404Spjd	ret = pool_namecheck(pool, &why, &what);
921168404Spjd
922168404Spjd	/*
923168404Spjd	 * The rules for reserved pool names were extended at a later point.
924168404Spjd	 * But we need to support users with existing pools that may now be
925168404Spjd	 * invalid.  So we only check for this expanded set of names during a
926168404Spjd	 * create (or import), and only in userland.
927168404Spjd	 */
928168404Spjd	if (ret == 0 && !isopen &&
929168404Spjd	    (strncmp(pool, "mirror", 6) == 0 ||
930168404Spjd	    strncmp(pool, "raidz", 5) == 0 ||
931185029Spjd	    strncmp(pool, "spare", 5) == 0 ||
932185029Spjd	    strcmp(pool, "log") == 0)) {
933185029Spjd		if (hdl != NULL)
934185029Spjd			zfs_error_aux(hdl,
935185029Spjd			    dgettext(TEXT_DOMAIN, "name is reserved"));
936168404Spjd		return (B_FALSE);
937168404Spjd	}
938168404Spjd
939168404Spjd
940168404Spjd	if (ret != 0) {
941168404Spjd		if (hdl != NULL) {
942168404Spjd			switch (why) {
943168404Spjd			case NAME_ERR_TOOLONG:
944168404Spjd				zfs_error_aux(hdl,
945168404Spjd				    dgettext(TEXT_DOMAIN, "name is too long"));
946168404Spjd				break;
947168404Spjd
948168404Spjd			case NAME_ERR_INVALCHAR:
949168404Spjd				zfs_error_aux(hdl,
950168404Spjd				    dgettext(TEXT_DOMAIN, "invalid character "
951168404Spjd				    "'%c' in pool name"), what);
952168404Spjd				break;
953168404Spjd
954168404Spjd			case NAME_ERR_NOLETTER:
955168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
956168404Spjd				    "name must begin with a letter"));
957168404Spjd				break;
958168404Spjd
959168404Spjd			case NAME_ERR_RESERVED:
960168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
961168404Spjd				    "name is reserved"));
962168404Spjd				break;
963168404Spjd
964168404Spjd			case NAME_ERR_DISKLIKE:
965168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
966168404Spjd				    "pool name is reserved"));
967168404Spjd				break;
968168404Spjd
969168404Spjd			case NAME_ERR_LEADING_SLASH:
970168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
971168404Spjd				    "leading slash in name"));
972168404Spjd				break;
973168404Spjd
974168404Spjd			case NAME_ERR_EMPTY_COMPONENT:
975168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
976168404Spjd				    "empty component in name"));
977168404Spjd				break;
978168404Spjd
979168404Spjd			case NAME_ERR_TRAILING_SLASH:
980168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
981168404Spjd				    "trailing slash in name"));
982168404Spjd				break;
983168404Spjd
984168404Spjd			case NAME_ERR_MULTIPLE_AT:
985168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
986168404Spjd				    "multiple '@' delimiters in name"));
987168404Spjd				break;
988168404Spjd
989168404Spjd			}
990168404Spjd		}
991168404Spjd		return (B_FALSE);
992168404Spjd	}
993168404Spjd
994168404Spjd	return (B_TRUE);
995168404Spjd}
996168404Spjd
997168404Spjd/*
998168404Spjd * Open a handle to the given pool, even if the pool is currently in the FAULTED
999168404Spjd * state.
1000168404Spjd */
1001168404Spjdzpool_handle_t *
1002168404Spjdzpool_open_canfail(libzfs_handle_t *hdl, const char *pool)
1003168404Spjd{
1004168404Spjd	zpool_handle_t *zhp;
1005168404Spjd	boolean_t missing;
1006168404Spjd
1007168404Spjd	/*
1008168404Spjd	 * Make sure the pool name is valid.
1009168404Spjd	 */
1010168404Spjd	if (!zpool_name_valid(hdl, B_TRUE, pool)) {
1011168404Spjd		(void) zfs_error_fmt(hdl, EZFS_INVALIDNAME,
1012168404Spjd		    dgettext(TEXT_DOMAIN, "cannot open '%s'"),
1013168404Spjd		    pool);
1014168404Spjd		return (NULL);
1015168404Spjd	}
1016168404Spjd
1017168404Spjd	if ((zhp = zfs_alloc(hdl, sizeof (zpool_handle_t))) == NULL)
1018168404Spjd		return (NULL);
1019168404Spjd
1020168404Spjd	zhp->zpool_hdl = hdl;
1021168404Spjd	(void) strlcpy(zhp->zpool_name, pool, sizeof (zhp->zpool_name));
1022168404Spjd
1023168404Spjd	if (zpool_refresh_stats(zhp, &missing) != 0) {
1024168404Spjd		zpool_close(zhp);
1025168404Spjd		return (NULL);
1026168404Spjd	}
1027168404Spjd
1028168404Spjd	if (missing) {
1029185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "no such pool"));
1030168404Spjd		(void) zfs_error_fmt(hdl, EZFS_NOENT,
1031185029Spjd		    dgettext(TEXT_DOMAIN, "cannot open '%s'"), pool);
1032168404Spjd		zpool_close(zhp);
1033168404Spjd		return (NULL);
1034168404Spjd	}
1035168404Spjd
1036168404Spjd	return (zhp);
1037168404Spjd}
1038168404Spjd
1039168404Spjd/*
1040168404Spjd * Like the above, but silent on error.  Used when iterating over pools (because
1041168404Spjd * the configuration cache may be out of date).
1042168404Spjd */
1043168404Spjdint
1044168404Spjdzpool_open_silent(libzfs_handle_t *hdl, const char *pool, zpool_handle_t **ret)
1045168404Spjd{
1046168404Spjd	zpool_handle_t *zhp;
1047168404Spjd	boolean_t missing;
1048168404Spjd
1049168404Spjd	if ((zhp = zfs_alloc(hdl, sizeof (zpool_handle_t))) == NULL)
1050168404Spjd		return (-1);
1051168404Spjd
1052168404Spjd	zhp->zpool_hdl = hdl;
1053168404Spjd	(void) strlcpy(zhp->zpool_name, pool, sizeof (zhp->zpool_name));
1054168404Spjd
1055168404Spjd	if (zpool_refresh_stats(zhp, &missing) != 0) {
1056168404Spjd		zpool_close(zhp);
1057168404Spjd		return (-1);
1058168404Spjd	}
1059168404Spjd
1060168404Spjd	if (missing) {
1061168404Spjd		zpool_close(zhp);
1062168404Spjd		*ret = NULL;
1063168404Spjd		return (0);
1064168404Spjd	}
1065168404Spjd
1066168404Spjd	*ret = zhp;
1067168404Spjd	return (0);
1068168404Spjd}
1069168404Spjd
1070168404Spjd/*
1071168404Spjd * Similar to zpool_open_canfail(), but refuses to open pools in the faulted
1072168404Spjd * state.
1073168404Spjd */
1074168404Spjdzpool_handle_t *
1075168404Spjdzpool_open(libzfs_handle_t *hdl, const char *pool)
1076168404Spjd{
1077168404Spjd	zpool_handle_t *zhp;
1078168404Spjd
1079168404Spjd	if ((zhp = zpool_open_canfail(hdl, pool)) == NULL)
1080168404Spjd		return (NULL);
1081168404Spjd
1082168404Spjd	if (zhp->zpool_state == POOL_STATE_UNAVAIL) {
1083168404Spjd		(void) zfs_error_fmt(hdl, EZFS_POOLUNAVAIL,
1084168404Spjd		    dgettext(TEXT_DOMAIN, "cannot open '%s'"), zhp->zpool_name);
1085168404Spjd		zpool_close(zhp);
1086168404Spjd		return (NULL);
1087168404Spjd	}
1088168404Spjd
1089168404Spjd	return (zhp);
1090168404Spjd}
1091168404Spjd
1092168404Spjd/*
1093168404Spjd * Close the handle.  Simply frees the memory associated with the handle.
1094168404Spjd */
1095168404Spjdvoid
1096168404Spjdzpool_close(zpool_handle_t *zhp)
1097168404Spjd{
1098168404Spjd	if (zhp->zpool_config)
1099168404Spjd		nvlist_free(zhp->zpool_config);
1100168404Spjd	if (zhp->zpool_old_config)
1101168404Spjd		nvlist_free(zhp->zpool_old_config);
1102168404Spjd	if (zhp->zpool_props)
1103168404Spjd		nvlist_free(zhp->zpool_props);
1104168404Spjd	free(zhp);
1105168404Spjd}
1106168404Spjd
1107168404Spjd/*
1108168404Spjd * Return the name of the pool.
1109168404Spjd */
1110168404Spjdconst char *
1111168404Spjdzpool_get_name(zpool_handle_t *zhp)
1112168404Spjd{
1113168404Spjd	return (zhp->zpool_name);
1114168404Spjd}
1115168404Spjd
1116168404Spjd
1117168404Spjd/*
1118168404Spjd * Return the state of the pool (ACTIVE or UNAVAILABLE)
1119168404Spjd */
1120168404Spjdint
1121168404Spjdzpool_get_state(zpool_handle_t *zhp)
1122168404Spjd{
1123168404Spjd	return (zhp->zpool_state);
1124168404Spjd}
1125168404Spjd
1126168404Spjd/*
1127168404Spjd * Create the named pool, using the provided vdev list.  It is assumed
1128168404Spjd * that the consumer has already validated the contents of the nvlist, so we
1129168404Spjd * don't have to worry about error semantics.
1130168404Spjd */
1131168404Spjdint
1132168404Spjdzpool_create(libzfs_handle_t *hdl, const char *pool, nvlist_t *nvroot,
1133185029Spjd    nvlist_t *props, nvlist_t *fsprops)
1134168404Spjd{
1135168404Spjd	zfs_cmd_t zc = { 0 };
1136185029Spjd	nvlist_t *zc_fsprops = NULL;
1137185029Spjd	nvlist_t *zc_props = NULL;
1138168404Spjd	char msg[1024];
1139185029Spjd	int ret = -1;
1140168404Spjd
1141168404Spjd	(void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN,
1142168404Spjd	    "cannot create '%s'"), pool);
1143168404Spjd
1144168404Spjd	if (!zpool_name_valid(hdl, B_FALSE, pool))
1145168404Spjd		return (zfs_error(hdl, EZFS_INVALIDNAME, msg));
1146168404Spjd
1147185029Spjd	if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0)
1148168404Spjd		return (-1);
1149168404Spjd
1150185029Spjd	if (props) {
1151219089Spjd		prop_flags_t flags = { .create = B_TRUE, .import = B_FALSE };
1152219089Spjd
1153185029Spjd		if ((zc_props = zpool_valid_proplist(hdl, pool, props,
1154219089Spjd		    SPA_VERSION_1, flags, msg)) == NULL) {
1155185029Spjd			goto create_failed;
1156185029Spjd		}
1157185029Spjd	}
1158185029Spjd
1159185029Spjd	if (fsprops) {
1160185029Spjd		uint64_t zoned;
1161185029Spjd		char *zonestr;
1162185029Spjd
1163185029Spjd		zoned = ((nvlist_lookup_string(fsprops,
1164185029Spjd		    zfs_prop_to_name(ZFS_PROP_ZONED), &zonestr) == 0) &&
1165185029Spjd		    strcmp(zonestr, "on") == 0);
1166185029Spjd
1167185029Spjd		if ((zc_fsprops = zfs_valid_proplist(hdl,
1168185029Spjd		    ZFS_TYPE_FILESYSTEM, fsprops, zoned, NULL, msg)) == NULL) {
1169185029Spjd			goto create_failed;
1170185029Spjd		}
1171185029Spjd		if (!zc_props &&
1172185029Spjd		    (nvlist_alloc(&zc_props, NV_UNIQUE_NAME, 0) != 0)) {
1173185029Spjd			goto create_failed;
1174185029Spjd		}
1175185029Spjd		if (nvlist_add_nvlist(zc_props,
1176185029Spjd		    ZPOOL_ROOTFS_PROPS, zc_fsprops) != 0) {
1177185029Spjd			goto create_failed;
1178185029Spjd		}
1179185029Spjd	}
1180185029Spjd
1181185029Spjd	if (zc_props && zcmd_write_src_nvlist(hdl, &zc, zc_props) != 0)
1182185029Spjd		goto create_failed;
1183185029Spjd
1184168404Spjd	(void) strlcpy(zc.zc_name, pool, sizeof (zc.zc_name));
1185168404Spjd
1186185029Spjd	if ((ret = zfs_ioctl(hdl, ZFS_IOC_POOL_CREATE, &zc)) != 0) {
1187168404Spjd
1188168404Spjd		zcmd_free_nvlists(&zc);
1189185029Spjd		nvlist_free(zc_props);
1190185029Spjd		nvlist_free(zc_fsprops);
1191168404Spjd
1192168404Spjd		switch (errno) {
1193168404Spjd		case EBUSY:
1194168404Spjd			/*
1195168404Spjd			 * This can happen if the user has specified the same
1196168404Spjd			 * device multiple times.  We can't reliably detect this
1197168404Spjd			 * until we try to add it and see we already have a
1198168404Spjd			 * label.
1199168404Spjd			 */
1200168404Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1201168404Spjd			    "one or more vdevs refer to the same device"));
1202168404Spjd			return (zfs_error(hdl, EZFS_BADDEV, msg));
1203168404Spjd
1204168404Spjd		case EOVERFLOW:
1205168404Spjd			/*
1206168404Spjd			 * This occurs when one of the devices is below
1207168404Spjd			 * SPA_MINDEVSIZE.  Unfortunately, we can't detect which
1208168404Spjd			 * device was the problem device since there's no
1209168404Spjd			 * reliable way to determine device size from userland.
1210168404Spjd			 */
1211168404Spjd			{
1212168404Spjd				char buf[64];
1213168404Spjd
1214168404Spjd				zfs_nicenum(SPA_MINDEVSIZE, buf, sizeof (buf));
1215168404Spjd
1216168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1217168404Spjd				    "one or more devices is less than the "
1218168404Spjd				    "minimum size (%s)"), buf);
1219168404Spjd			}
1220168404Spjd			return (zfs_error(hdl, EZFS_BADDEV, msg));
1221168404Spjd
1222168404Spjd		case ENOSPC:
1223168404Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1224168404Spjd			    "one or more devices is out of space"));
1225168404Spjd			return (zfs_error(hdl, EZFS_BADDEV, msg));
1226168404Spjd
1227185029Spjd		case ENOTBLK:
1228185029Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1229185029Spjd			    "cache device must be a disk or disk slice"));
1230185029Spjd			return (zfs_error(hdl, EZFS_BADDEV, msg));
1231185029Spjd
1232168404Spjd		default:
1233168404Spjd			return (zpool_standard_error(hdl, errno, msg));
1234168404Spjd		}
1235168404Spjd	}
1236168404Spjd
1237185029Spjdcreate_failed:
1238185029Spjd	zcmd_free_nvlists(&zc);
1239185029Spjd	nvlist_free(zc_props);
1240185029Spjd	nvlist_free(zc_fsprops);
1241185029Spjd	return (ret);
1242168404Spjd}
1243168404Spjd
1244168404Spjd/*
1245168404Spjd * Destroy the given pool.  It is up to the caller to ensure that there are no
1246168404Spjd * datasets left in the pool.
1247168404Spjd */
1248168404Spjdint
1249248571Smmzpool_destroy(zpool_handle_t *zhp, const char *log_str)
1250168404Spjd{
1251168404Spjd	zfs_cmd_t zc = { 0 };
1252168404Spjd	zfs_handle_t *zfp = NULL;
1253168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
1254168404Spjd	char msg[1024];
1255168404Spjd
1256168404Spjd	if (zhp->zpool_state == POOL_STATE_ACTIVE &&
1257219089Spjd	    (zfp = zfs_open(hdl, zhp->zpool_name, ZFS_TYPE_FILESYSTEM)) == NULL)
1258168404Spjd		return (-1);
1259168404Spjd
1260168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
1261248571Smm	zc.zc_history = (uint64_t)(uintptr_t)log_str;
1262168404Spjd
1263219089Spjd	if (zfs_ioctl(hdl, ZFS_IOC_POOL_DESTROY, &zc) != 0) {
1264168404Spjd		(void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN,
1265168404Spjd		    "cannot destroy '%s'"), zhp->zpool_name);
1266168404Spjd
1267168404Spjd		if (errno == EROFS) {
1268168404Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1269168404Spjd			    "one or more devices is read only"));
1270168404Spjd			(void) zfs_error(hdl, EZFS_BADDEV, msg);
1271168404Spjd		} else {
1272168404Spjd			(void) zpool_standard_error(hdl, errno, msg);
1273168404Spjd		}
1274168404Spjd
1275168404Spjd		if (zfp)
1276168404Spjd			zfs_close(zfp);
1277168404Spjd		return (-1);
1278168404Spjd	}
1279168404Spjd
1280168404Spjd	if (zfp) {
1281168404Spjd		remove_mountpoint(zfp);
1282168404Spjd		zfs_close(zfp);
1283168404Spjd	}
1284168404Spjd
1285168404Spjd	return (0);
1286168404Spjd}
1287168404Spjd
1288168404Spjd/*
1289168404Spjd * Add the given vdevs to the pool.  The caller must have already performed the
1290168404Spjd * necessary verification to ensure that the vdev specification is well-formed.
1291168404Spjd */
1292168404Spjdint
1293168404Spjdzpool_add(zpool_handle_t *zhp, nvlist_t *nvroot)
1294168404Spjd{
1295168404Spjd	zfs_cmd_t zc = { 0 };
1296168404Spjd	int ret;
1297168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
1298168404Spjd	char msg[1024];
1299185029Spjd	nvlist_t **spares, **l2cache;
1300185029Spjd	uint_t nspares, nl2cache;
1301168404Spjd
1302168404Spjd	(void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN,
1303168404Spjd	    "cannot add to '%s'"), zhp->zpool_name);
1304168404Spjd
1305185029Spjd	if (zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL) <
1306185029Spjd	    SPA_VERSION_SPARES &&
1307168404Spjd	    nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_SPARES,
1308168404Spjd	    &spares, &nspares) == 0) {
1309168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "pool must be "
1310168404Spjd		    "upgraded to add hot spares"));
1311168404Spjd		return (zfs_error(hdl, EZFS_BADVERSION, msg));
1312168404Spjd	}
1313168404Spjd
1314236155Smm	if (zpool_is_bootable(zhp) && nvlist_lookup_nvlist_array(nvroot,
1315209962Smm	    ZPOOL_CONFIG_SPARES, &spares, &nspares) == 0) {
1316209962Smm		uint64_t s;
1317209962Smm
1318209962Smm		for (s = 0; s < nspares; s++) {
1319209962Smm			char *path;
1320209962Smm
1321209962Smm			if (nvlist_lookup_string(spares[s], ZPOOL_CONFIG_PATH,
1322209962Smm			    &path) == 0 && pool_uses_efi(spares[s])) {
1323209962Smm				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1324209962Smm				    "device '%s' contains an EFI label and "
1325209962Smm				    "cannot be used on root pools."),
1326219089Spjd				    zpool_vdev_name(hdl, NULL, spares[s],
1327219089Spjd				    B_FALSE));
1328209962Smm				return (zfs_error(hdl, EZFS_POOL_NOTSUP, msg));
1329209962Smm			}
1330209962Smm		}
1331209962Smm	}
1332209962Smm
1333185029Spjd	if (zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL) <
1334185029Spjd	    SPA_VERSION_L2CACHE &&
1335185029Spjd	    nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_L2CACHE,
1336185029Spjd	    &l2cache, &nl2cache) == 0) {
1337185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "pool must be "
1338185029Spjd		    "upgraded to add cache devices"));
1339185029Spjd		return (zfs_error(hdl, EZFS_BADVERSION, msg));
1340185029Spjd	}
1341185029Spjd
1342185029Spjd	if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0)
1343168404Spjd		return (-1);
1344168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
1345168404Spjd
1346219089Spjd	if (zfs_ioctl(hdl, ZFS_IOC_VDEV_ADD, &zc) != 0) {
1347168404Spjd		switch (errno) {
1348168404Spjd		case EBUSY:
1349168404Spjd			/*
1350168404Spjd			 * This can happen if the user has specified the same
1351168404Spjd			 * device multiple times.  We can't reliably detect this
1352168404Spjd			 * until we try to add it and see we already have a
1353168404Spjd			 * label.
1354168404Spjd			 */
1355168404Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1356168404Spjd			    "one or more vdevs refer to the same device"));
1357168404Spjd			(void) zfs_error(hdl, EZFS_BADDEV, msg);
1358168404Spjd			break;
1359168404Spjd
1360168404Spjd		case EOVERFLOW:
1361168404Spjd			/*
1362168404Spjd			 * This occurrs when one of the devices is below
1363168404Spjd			 * SPA_MINDEVSIZE.  Unfortunately, we can't detect which
1364168404Spjd			 * device was the problem device since there's no
1365168404Spjd			 * reliable way to determine device size from userland.
1366168404Spjd			 */
1367168404Spjd			{
1368168404Spjd				char buf[64];
1369168404Spjd
1370168404Spjd				zfs_nicenum(SPA_MINDEVSIZE, buf, sizeof (buf));
1371168404Spjd
1372168404Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1373168404Spjd				    "device is less than the minimum "
1374168404Spjd				    "size (%s)"), buf);
1375168404Spjd			}
1376168404Spjd			(void) zfs_error(hdl, EZFS_BADDEV, msg);
1377168404Spjd			break;
1378168404Spjd
1379168404Spjd		case ENOTSUP:
1380168404Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1381185029Spjd			    "pool must be upgraded to add these vdevs"));
1382168404Spjd			(void) zfs_error(hdl, EZFS_BADVERSION, msg);
1383168404Spjd			break;
1384168404Spjd
1385168404Spjd		case EDOM:
1386168404Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1387185029Spjd			    "root pool can not have multiple vdevs"
1388185029Spjd			    " or separate logs"));
1389168404Spjd			(void) zfs_error(hdl, EZFS_POOL_NOTSUP, msg);
1390168404Spjd			break;
1391168404Spjd
1392185029Spjd		case ENOTBLK:
1393185029Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1394185029Spjd			    "cache device must be a disk or disk slice"));
1395185029Spjd			(void) zfs_error(hdl, EZFS_BADDEV, msg);
1396185029Spjd			break;
1397185029Spjd
1398168404Spjd		default:
1399168404Spjd			(void) zpool_standard_error(hdl, errno, msg);
1400168404Spjd		}
1401168404Spjd
1402168404Spjd		ret = -1;
1403168404Spjd	} else {
1404168404Spjd		ret = 0;
1405168404Spjd	}
1406168404Spjd
1407168404Spjd	zcmd_free_nvlists(&zc);
1408168404Spjd
1409168404Spjd	return (ret);
1410168404Spjd}
1411168404Spjd
1412168404Spjd/*
1413168404Spjd * Exports the pool from the system.  The caller must ensure that there are no
1414168404Spjd * mounted datasets in the pool.
1415168404Spjd */
1416248571Smmstatic int
1417248571Smmzpool_export_common(zpool_handle_t *zhp, boolean_t force, boolean_t hardforce,
1418248571Smm    const char *log_str)
1419168404Spjd{
1420168404Spjd	zfs_cmd_t zc = { 0 };
1421185029Spjd	char msg[1024];
1422168404Spjd
1423185029Spjd	(void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN,
1424185029Spjd	    "cannot export '%s'"), zhp->zpool_name);
1425185029Spjd
1426168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
1427185029Spjd	zc.zc_cookie = force;
1428207670Smm	zc.zc_guid = hardforce;
1429248571Smm	zc.zc_history = (uint64_t)(uintptr_t)log_str;
1430168404Spjd
1431185029Spjd	if (zfs_ioctl(zhp->zpool_hdl, ZFS_IOC_POOL_EXPORT, &zc) != 0) {
1432185029Spjd		switch (errno) {
1433185029Spjd		case EXDEV:
1434185029Spjd			zfs_error_aux(zhp->zpool_hdl, dgettext(TEXT_DOMAIN,
1435185029Spjd			    "use '-f' to override the following errors:\n"
1436185029Spjd			    "'%s' has an active shared spare which could be"
1437185029Spjd			    " used by other pools once '%s' is exported."),
1438185029Spjd			    zhp->zpool_name, zhp->zpool_name);
1439185029Spjd			return (zfs_error(zhp->zpool_hdl, EZFS_ACTIVE_SPARE,
1440185029Spjd			    msg));
1441185029Spjd		default:
1442185029Spjd			return (zpool_standard_error_fmt(zhp->zpool_hdl, errno,
1443185029Spjd			    msg));
1444185029Spjd		}
1445185029Spjd	}
1446185029Spjd
1447168404Spjd	return (0);
1448168404Spjd}
1449168404Spjd
1450207670Smmint
1451248571Smmzpool_export(zpool_handle_t *zhp, boolean_t force, const char *log_str)
1452207670Smm{
1453248571Smm	return (zpool_export_common(zhp, force, B_FALSE, log_str));
1454207670Smm}
1455207670Smm
1456207670Smmint
1457248571Smmzpool_export_force(zpool_handle_t *zhp, const char *log_str)
1458207670Smm{
1459248571Smm	return (zpool_export_common(zhp, B_TRUE, B_TRUE, log_str));
1460207670Smm}
1461207670Smm
1462219089Spjdstatic void
1463219089Spjdzpool_rewind_exclaim(libzfs_handle_t *hdl, const char *name, boolean_t dryrun,
1464219089Spjd    nvlist_t *config)
1465219089Spjd{
1466219089Spjd	nvlist_t *nv = NULL;
1467219089Spjd	uint64_t rewindto;
1468219089Spjd	int64_t loss = -1;
1469219089Spjd	struct tm t;
1470219089Spjd	char timestr[128];
1471219089Spjd
1472219089Spjd	if (!hdl->libzfs_printerr || config == NULL)
1473219089Spjd		return;
1474219089Spjd
1475236884Smm	if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nv) != 0 ||
1476236884Smm	    nvlist_lookup_nvlist(nv, ZPOOL_CONFIG_REWIND_INFO, &nv) != 0) {
1477219089Spjd		return;
1478236884Smm	}
1479219089Spjd
1480219089Spjd	if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_TIME, &rewindto) != 0)
1481219089Spjd		return;
1482219089Spjd	(void) nvlist_lookup_int64(nv, ZPOOL_CONFIG_REWIND_TIME, &loss);
1483219089Spjd
1484219089Spjd	if (localtime_r((time_t *)&rewindto, &t) != NULL &&
1485219089Spjd	    strftime(timestr, 128, 0, &t) != 0) {
1486219089Spjd		if (dryrun) {
1487219089Spjd			(void) printf(dgettext(TEXT_DOMAIN,
1488219089Spjd			    "Would be able to return %s "
1489219089Spjd			    "to its state as of %s.\n"),
1490219089Spjd			    name, timestr);
1491219089Spjd		} else {
1492219089Spjd			(void) printf(dgettext(TEXT_DOMAIN,
1493219089Spjd			    "Pool %s returned to its state as of %s.\n"),
1494219089Spjd			    name, timestr);
1495219089Spjd		}
1496219089Spjd		if (loss > 120) {
1497219089Spjd			(void) printf(dgettext(TEXT_DOMAIN,
1498219089Spjd			    "%s approximately %lld "),
1499219089Spjd			    dryrun ? "Would discard" : "Discarded",
1500219089Spjd			    (loss + 30) / 60);
1501219089Spjd			(void) printf(dgettext(TEXT_DOMAIN,
1502219089Spjd			    "minutes of transactions.\n"));
1503219089Spjd		} else if (loss > 0) {
1504219089Spjd			(void) printf(dgettext(TEXT_DOMAIN,
1505219089Spjd			    "%s approximately %lld "),
1506219089Spjd			    dryrun ? "Would discard" : "Discarded", loss);
1507219089Spjd			(void) printf(dgettext(TEXT_DOMAIN,
1508219089Spjd			    "seconds of transactions.\n"));
1509219089Spjd		}
1510219089Spjd	}
1511219089Spjd}
1512219089Spjd
1513219089Spjdvoid
1514219089Spjdzpool_explain_recover(libzfs_handle_t *hdl, const char *name, int reason,
1515219089Spjd    nvlist_t *config)
1516219089Spjd{
1517219089Spjd	nvlist_t *nv = NULL;
1518219089Spjd	int64_t loss = -1;
1519219089Spjd	uint64_t edata = UINT64_MAX;
1520219089Spjd	uint64_t rewindto;
1521219089Spjd	struct tm t;
1522219089Spjd	char timestr[128];
1523219089Spjd
1524219089Spjd	if (!hdl->libzfs_printerr)
1525219089Spjd		return;
1526219089Spjd
1527219089Spjd	if (reason >= 0)
1528219089Spjd		(void) printf(dgettext(TEXT_DOMAIN, "action: "));
1529219089Spjd	else
1530219089Spjd		(void) printf(dgettext(TEXT_DOMAIN, "\t"));
1531219089Spjd
1532219089Spjd	/* All attempted rewinds failed if ZPOOL_CONFIG_LOAD_TIME missing */
1533219089Spjd	if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nv) != 0 ||
1534236884Smm	    nvlist_lookup_nvlist(nv, ZPOOL_CONFIG_REWIND_INFO, &nv) != 0 ||
1535219089Spjd	    nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_TIME, &rewindto) != 0)
1536219089Spjd		goto no_info;
1537219089Spjd
1538219089Spjd	(void) nvlist_lookup_int64(nv, ZPOOL_CONFIG_REWIND_TIME, &loss);
1539219089Spjd	(void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_LOAD_DATA_ERRORS,
1540219089Spjd	    &edata);
1541219089Spjd
1542219089Spjd	(void) printf(dgettext(TEXT_DOMAIN,
1543219089Spjd	    "Recovery is possible, but will result in some data loss.\n"));
1544219089Spjd
1545219089Spjd	if (localtime_r((time_t *)&rewindto, &t) != NULL &&
1546219089Spjd	    strftime(timestr, 128, 0, &t) != 0) {
1547219089Spjd		(void) printf(dgettext(TEXT_DOMAIN,
1548219089Spjd		    "\tReturning the pool to its state as of %s\n"
1549219089Spjd		    "\tshould correct the problem.  "),
1550219089Spjd		    timestr);
1551219089Spjd	} else {
1552219089Spjd		(void) printf(dgettext(TEXT_DOMAIN,
1553219089Spjd		    "\tReverting the pool to an earlier state "
1554219089Spjd		    "should correct the problem.\n\t"));
1555219089Spjd	}
1556219089Spjd
1557219089Spjd	if (loss > 120) {
1558219089Spjd		(void) printf(dgettext(TEXT_DOMAIN,
1559219089Spjd		    "Approximately %lld minutes of data\n"
1560219089Spjd		    "\tmust be discarded, irreversibly.  "), (loss + 30) / 60);
1561219089Spjd	} else if (loss > 0) {
1562219089Spjd		(void) printf(dgettext(TEXT_DOMAIN,
1563219089Spjd		    "Approximately %lld seconds of data\n"
1564219089Spjd		    "\tmust be discarded, irreversibly.  "), loss);
1565219089Spjd	}
1566219089Spjd	if (edata != 0 && edata != UINT64_MAX) {
1567219089Spjd		if (edata == 1) {
1568219089Spjd			(void) printf(dgettext(TEXT_DOMAIN,
1569219089Spjd			    "After rewind, at least\n"
1570219089Spjd			    "\tone persistent user-data error will remain.  "));
1571219089Spjd		} else {
1572219089Spjd			(void) printf(dgettext(TEXT_DOMAIN,
1573219089Spjd			    "After rewind, several\n"
1574219089Spjd			    "\tpersistent user-data errors will remain.  "));
1575219089Spjd		}
1576219089Spjd	}
1577219089Spjd	(void) printf(dgettext(TEXT_DOMAIN,
1578219089Spjd	    "Recovery can be attempted\n\tby executing 'zpool %s -F %s'.  "),
1579219089Spjd	    reason >= 0 ? "clear" : "import", name);
1580219089Spjd
1581219089Spjd	(void) printf(dgettext(TEXT_DOMAIN,
1582219089Spjd	    "A scrub of the pool\n"
1583219089Spjd	    "\tis strongly recommended after recovery.\n"));
1584219089Spjd	return;
1585219089Spjd
1586219089Spjdno_info:
1587219089Spjd	(void) printf(dgettext(TEXT_DOMAIN,
1588219089Spjd	    "Destroy and re-create the pool from\n\ta backup source.\n"));
1589219089Spjd}
1590219089Spjd
1591168404Spjd/*
1592185029Spjd * zpool_import() is a contracted interface. Should be kept the same
1593185029Spjd * if possible.
1594185029Spjd *
1595185029Spjd * Applications should use zpool_import_props() to import a pool with
1596185029Spjd * new properties value to be set.
1597168404Spjd */
1598168404Spjdint
1599168404Spjdzpool_import(libzfs_handle_t *hdl, nvlist_t *config, const char *newname,
1600185029Spjd    char *altroot)
1601168404Spjd{
1602185029Spjd	nvlist_t *props = NULL;
1603185029Spjd	int ret;
1604185029Spjd
1605185029Spjd	if (altroot != NULL) {
1606185029Spjd		if (nvlist_alloc(&props, NV_UNIQUE_NAME, 0) != 0) {
1607185029Spjd			return (zfs_error_fmt(hdl, EZFS_NOMEM,
1608185029Spjd			    dgettext(TEXT_DOMAIN, "cannot import '%s'"),
1609185029Spjd			    newname));
1610185029Spjd		}
1611185029Spjd
1612185029Spjd		if (nvlist_add_string(props,
1613209962Smm		    zpool_prop_to_name(ZPOOL_PROP_ALTROOT), altroot) != 0 ||
1614209962Smm		    nvlist_add_string(props,
1615209962Smm		    zpool_prop_to_name(ZPOOL_PROP_CACHEFILE), "none") != 0) {
1616185029Spjd			nvlist_free(props);
1617185029Spjd			return (zfs_error_fmt(hdl, EZFS_NOMEM,
1618185029Spjd			    dgettext(TEXT_DOMAIN, "cannot import '%s'"),
1619185029Spjd			    newname));
1620185029Spjd		}
1621185029Spjd	}
1622185029Spjd
1623219089Spjd	ret = zpool_import_props(hdl, config, newname, props,
1624219089Spjd	    ZFS_IMPORT_NORMAL);
1625185029Spjd	if (props)
1626185029Spjd		nvlist_free(props);
1627185029Spjd	return (ret);
1628185029Spjd}
1629185029Spjd
1630219089Spjdstatic void
1631219089Spjdprint_vdev_tree(libzfs_handle_t *hdl, const char *name, nvlist_t *nv,
1632219089Spjd    int indent)
1633219089Spjd{
1634219089Spjd	nvlist_t **child;
1635219089Spjd	uint_t c, children;
1636219089Spjd	char *vname;
1637219089Spjd	uint64_t is_log = 0;
1638219089Spjd
1639219089Spjd	(void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_IS_LOG,
1640219089Spjd	    &is_log);
1641219089Spjd
1642219089Spjd	if (name != NULL)
1643219089Spjd		(void) printf("\t%*s%s%s\n", indent, "", name,
1644219089Spjd		    is_log ? " [log]" : "");
1645219089Spjd
1646219089Spjd	if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_CHILDREN,
1647219089Spjd	    &child, &children) != 0)
1648219089Spjd		return;
1649219089Spjd
1650219089Spjd	for (c = 0; c < children; c++) {
1651219089Spjd		vname = zpool_vdev_name(hdl, NULL, child[c], B_TRUE);
1652219089Spjd		print_vdev_tree(hdl, vname, child[c], indent + 2);
1653219089Spjd		free(vname);
1654219089Spjd	}
1655219089Spjd}
1656219089Spjd
1657236884Smmvoid
1658236884Smmzpool_print_unsup_feat(nvlist_t *config)
1659236884Smm{
1660236884Smm	nvlist_t *nvinfo, *unsup_feat;
1661236884Smm
1662236884Smm	verify(nvlist_lookup_nvlist(config, ZPOOL_CONFIG_LOAD_INFO, &nvinfo) ==
1663236884Smm	    0);
1664236884Smm	verify(nvlist_lookup_nvlist(nvinfo, ZPOOL_CONFIG_UNSUP_FEAT,
1665236884Smm	    &unsup_feat) == 0);
1666236884Smm
1667236884Smm	for (nvpair_t *nvp = nvlist_next_nvpair(unsup_feat, NULL); nvp != NULL;
1668236884Smm	    nvp = nvlist_next_nvpair(unsup_feat, nvp)) {
1669236884Smm		char *desc;
1670236884Smm
1671236884Smm		verify(nvpair_type(nvp) == DATA_TYPE_STRING);
1672236884Smm		verify(nvpair_value_string(nvp, &desc) == 0);
1673236884Smm
1674236884Smm		if (strlen(desc) > 0)
1675236884Smm			(void) printf("\t%s (%s)\n", nvpair_name(nvp), desc);
1676236884Smm		else
1677236884Smm			(void) printf("\t%s\n", nvpair_name(nvp));
1678236884Smm	}
1679236884Smm}
1680236884Smm
1681185029Spjd/*
1682185029Spjd * Import the given pool using the known configuration and a list of
1683185029Spjd * properties to be set. The configuration should have come from
1684185029Spjd * zpool_find_import(). The 'newname' parameters control whether the pool
1685185029Spjd * is imported with a different name.
1686185029Spjd */
1687185029Spjdint
1688185029Spjdzpool_import_props(libzfs_handle_t *hdl, nvlist_t *config, const char *newname,
1689219089Spjd    nvlist_t *props, int flags)
1690185029Spjd{
1691168404Spjd	zfs_cmd_t zc = { 0 };
1692219089Spjd	zpool_rewind_policy_t policy;
1693219089Spjd	nvlist_t *nv = NULL;
1694219089Spjd	nvlist_t *nvinfo = NULL;
1695219089Spjd	nvlist_t *missing = NULL;
1696168404Spjd	char *thename;
1697168404Spjd	char *origname;
1698168404Spjd	int ret;
1699219089Spjd	int error = 0;
1700185029Spjd	char errbuf[1024];
1701168404Spjd
1702168404Spjd	verify(nvlist_lookup_string(config, ZPOOL_CONFIG_POOL_NAME,
1703168404Spjd	    &origname) == 0);
1704168404Spjd
1705185029Spjd	(void) snprintf(errbuf, sizeof (errbuf), dgettext(TEXT_DOMAIN,
1706185029Spjd	    "cannot import pool '%s'"), origname);
1707185029Spjd
1708168404Spjd	if (newname != NULL) {
1709168404Spjd		if (!zpool_name_valid(hdl, B_FALSE, newname))
1710168404Spjd			return (zfs_error_fmt(hdl, EZFS_INVALIDNAME,
1711168404Spjd			    dgettext(TEXT_DOMAIN, "cannot import '%s'"),
1712168404Spjd			    newname));
1713168404Spjd		thename = (char *)newname;
1714168404Spjd	} else {
1715168404Spjd		thename = origname;
1716168404Spjd	}
1717168404Spjd
1718185029Spjd	if (props) {
1719185029Spjd		uint64_t version;
1720219089Spjd		prop_flags_t flags = { .create = B_FALSE, .import = B_TRUE };
1721168404Spjd
1722185029Spjd		verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_VERSION,
1723185029Spjd		    &version) == 0);
1724185029Spjd
1725185029Spjd		if ((props = zpool_valid_proplist(hdl, origname,
1726219089Spjd		    props, version, flags, errbuf)) == NULL) {
1727185029Spjd			return (-1);
1728185029Spjd		} else if (zcmd_write_src_nvlist(hdl, &zc, props) != 0) {
1729185029Spjd			nvlist_free(props);
1730185029Spjd			return (-1);
1731185029Spjd		}
1732185029Spjd	}
1733185029Spjd
1734168404Spjd	(void) strlcpy(zc.zc_name, thename, sizeof (zc.zc_name));
1735168404Spjd
1736168404Spjd	verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID,
1737168404Spjd	    &zc.zc_guid) == 0);
1738168404Spjd
1739185029Spjd	if (zcmd_write_conf_nvlist(hdl, &zc, config) != 0) {
1740185029Spjd		nvlist_free(props);
1741168404Spjd		return (-1);
1742185029Spjd	}
1743219089Spjd	if (zcmd_alloc_dst_nvlist(hdl, &zc, zc.zc_nvlist_conf_size * 2) != 0) {
1744219089Spjd		nvlist_free(props);
1745219089Spjd		return (-1);
1746219089Spjd	}
1747168404Spjd
1748219089Spjd	zc.zc_cookie = flags;
1749219089Spjd	while ((ret = zfs_ioctl(hdl, ZFS_IOC_POOL_IMPORT, &zc)) != 0 &&
1750219089Spjd	    errno == ENOMEM) {
1751219089Spjd		if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) {
1752219089Spjd			zcmd_free_nvlists(&zc);
1753219089Spjd			return (-1);
1754219089Spjd		}
1755219089Spjd	}
1756219089Spjd	if (ret != 0)
1757219089Spjd		error = errno;
1758219089Spjd
1759219089Spjd	(void) zcmd_read_dst_nvlist(hdl, &zc, &nv);
1760219089Spjd	zpool_get_rewind_policy(config, &policy);
1761219089Spjd
1762219089Spjd	if (error) {
1763168404Spjd		char desc[1024];
1764219089Spjd
1765219089Spjd		/*
1766219089Spjd		 * Dry-run failed, but we print out what success
1767219089Spjd		 * looks like if we found a best txg
1768219089Spjd		 */
1769219089Spjd		if (policy.zrp_request & ZPOOL_TRY_REWIND) {
1770219089Spjd			zpool_rewind_exclaim(hdl, newname ? origname : thename,
1771219089Spjd			    B_TRUE, nv);
1772219089Spjd			nvlist_free(nv);
1773219089Spjd			return (-1);
1774219089Spjd		}
1775219089Spjd
1776168404Spjd		if (newname == NULL)
1777168404Spjd			(void) snprintf(desc, sizeof (desc),
1778168404Spjd			    dgettext(TEXT_DOMAIN, "cannot import '%s'"),
1779168404Spjd			    thename);
1780168404Spjd		else
1781168404Spjd			(void) snprintf(desc, sizeof (desc),
1782168404Spjd			    dgettext(TEXT_DOMAIN, "cannot import '%s' as '%s'"),
1783168404Spjd			    origname, thename);
1784168404Spjd
1785219089Spjd		switch (error) {
1786168404Spjd		case ENOTSUP:
1787236884Smm			if (nv != NULL && nvlist_lookup_nvlist(nv,
1788236884Smm			    ZPOOL_CONFIG_LOAD_INFO, &nvinfo) == 0 &&
1789236884Smm			    nvlist_exists(nvinfo, ZPOOL_CONFIG_UNSUP_FEAT)) {
1790236884Smm				(void) printf(dgettext(TEXT_DOMAIN, "This "
1791236884Smm				    "pool uses the following feature(s) not "
1792236884Smm				    "supported by this system:\n"));
1793236884Smm				zpool_print_unsup_feat(nv);
1794236884Smm				if (nvlist_exists(nvinfo,
1795236884Smm				    ZPOOL_CONFIG_CAN_RDONLY)) {
1796236884Smm					(void) printf(dgettext(TEXT_DOMAIN,
1797236884Smm					    "All unsupported features are only "
1798236884Smm					    "required for writing to the pool."
1799236884Smm					    "\nThe pool can be imported using "
1800236884Smm					    "'-o readonly=on'.\n"));
1801236884Smm				}
1802236884Smm			}
1803168404Spjd			/*
1804168404Spjd			 * Unsupported version.
1805168404Spjd			 */
1806168404Spjd			(void) zfs_error(hdl, EZFS_BADVERSION, desc);
1807168404Spjd			break;
1808168404Spjd
1809168404Spjd		case EINVAL:
1810168404Spjd			(void) zfs_error(hdl, EZFS_INVALCONFIG, desc);
1811168404Spjd			break;
1812168404Spjd
1813219089Spjd		case EROFS:
1814219089Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
1815219089Spjd			    "one or more devices is read only"));
1816219089Spjd			(void) zfs_error(hdl, EZFS_BADDEV, desc);
1817219089Spjd			break;
1818219089Spjd
1819219089Spjd		case ENXIO:
1820219089Spjd			if (nv && nvlist_lookup_nvlist(nv,
1821219089Spjd			    ZPOOL_CONFIG_LOAD_INFO, &nvinfo) == 0 &&
1822219089Spjd			    nvlist_lookup_nvlist(nvinfo,
1823219089Spjd			    ZPOOL_CONFIG_MISSING_DEVICES, &missing) == 0) {
1824219089Spjd				(void) printf(dgettext(TEXT_DOMAIN,
1825219089Spjd				    "The devices below are missing, use "
1826219089Spjd				    "'-m' to import the pool anyway:\n"));
1827219089Spjd				print_vdev_tree(hdl, NULL, missing, 2);
1828219089Spjd				(void) printf("\n");
1829219089Spjd			}
1830219089Spjd			(void) zpool_standard_error(hdl, error, desc);
1831219089Spjd			break;
1832219089Spjd
1833219089Spjd		case EEXIST:
1834219089Spjd			(void) zpool_standard_error(hdl, error, desc);
1835219089Spjd			break;
1836219089Spjd
1837168404Spjd		default:
1838219089Spjd			(void) zpool_standard_error(hdl, error, desc);
1839219089Spjd			zpool_explain_recover(hdl,
1840219089Spjd			    newname ? origname : thename, -error, nv);
1841219089Spjd			break;
1842168404Spjd		}
1843168404Spjd
1844219089Spjd		nvlist_free(nv);
1845168404Spjd		ret = -1;
1846168404Spjd	} else {
1847168404Spjd		zpool_handle_t *zhp;
1848185029Spjd
1849168404Spjd		/*
1850168404Spjd		 * This should never fail, but play it safe anyway.
1851168404Spjd		 */
1852219089Spjd		if (zpool_open_silent(hdl, thename, &zhp) != 0)
1853168404Spjd			ret = -1;
1854219089Spjd		else if (zhp != NULL)
1855168404Spjd			zpool_close(zhp);
1856219089Spjd		if (policy.zrp_request &
1857219089Spjd		    (ZPOOL_DO_REWIND | ZPOOL_TRY_REWIND)) {
1858219089Spjd			zpool_rewind_exclaim(hdl, newname ? origname : thename,
1859219089Spjd			    ((policy.zrp_request & ZPOOL_TRY_REWIND) != 0), nv);
1860168404Spjd		}
1861219089Spjd		nvlist_free(nv);
1862219089Spjd		return (0);
1863168404Spjd	}
1864168404Spjd
1865168404Spjd	zcmd_free_nvlists(&zc);
1866185029Spjd	nvlist_free(props);
1867185029Spjd
1868168404Spjd	return (ret);
1869168404Spjd}
1870168404Spjd
1871168404Spjd/*
1872219089Spjd * Scan the pool.
1873168404Spjd */
1874168404Spjdint
1875219089Spjdzpool_scan(zpool_handle_t *zhp, pool_scan_func_t func)
1876168404Spjd{
1877168404Spjd	zfs_cmd_t zc = { 0 };
1878168404Spjd	char msg[1024];
1879168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
1880168404Spjd
1881168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
1882219089Spjd	zc.zc_cookie = func;
1883168404Spjd
1884219089Spjd	if (zfs_ioctl(hdl, ZFS_IOC_POOL_SCAN, &zc) == 0 ||
1885219089Spjd	    (errno == ENOENT && func != POOL_SCAN_NONE))
1886168404Spjd		return (0);
1887168404Spjd
1888219089Spjd	if (func == POOL_SCAN_SCRUB) {
1889219089Spjd		(void) snprintf(msg, sizeof (msg),
1890219089Spjd		    dgettext(TEXT_DOMAIN, "cannot scrub %s"), zc.zc_name);
1891219089Spjd	} else if (func == POOL_SCAN_NONE) {
1892219089Spjd		(void) snprintf(msg, sizeof (msg),
1893219089Spjd		    dgettext(TEXT_DOMAIN, "cannot cancel scrubbing %s"),
1894219089Spjd		    zc.zc_name);
1895219089Spjd	} else {
1896219089Spjd		assert(!"unexpected result");
1897219089Spjd	}
1898168404Spjd
1899219089Spjd	if (errno == EBUSY) {
1900219089Spjd		nvlist_t *nvroot;
1901219089Spjd		pool_scan_stat_t *ps = NULL;
1902219089Spjd		uint_t psc;
1903219089Spjd
1904219089Spjd		verify(nvlist_lookup_nvlist(zhp->zpool_config,
1905219089Spjd		    ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0);
1906219089Spjd		(void) nvlist_lookup_uint64_array(nvroot,
1907219089Spjd		    ZPOOL_CONFIG_SCAN_STATS, (uint64_t **)&ps, &psc);
1908219089Spjd		if (ps && ps->pss_func == POOL_SCAN_SCRUB)
1909219089Spjd			return (zfs_error(hdl, EZFS_SCRUBBING, msg));
1910219089Spjd		else
1911219089Spjd			return (zfs_error(hdl, EZFS_RESILVERING, msg));
1912219089Spjd	} else if (errno == ENOENT) {
1913219089Spjd		return (zfs_error(hdl, EZFS_NO_SCRUB, msg));
1914219089Spjd	} else {
1915168404Spjd		return (zpool_standard_error(hdl, errno, msg));
1916219089Spjd	}
1917168404Spjd}
1918168404Spjd
1919168404Spjd/*
1920219089Spjd * This provides a very minimal check whether a given string is likely a
1921219089Spjd * c#t#d# style string.  Users of this are expected to do their own
1922219089Spjd * verification of the s# part.
1923219089Spjd */
1924219089Spjd#define	CTD_CHECK(str)  (str && str[0] == 'c' && isdigit(str[1]))
1925219089Spjd
1926219089Spjd/*
1927219089Spjd * More elaborate version for ones which may start with "/dev/dsk/"
1928219089Spjd * and the like.
1929219089Spjd */
1930219089Spjdstatic int
1931219089Spjdctd_check_path(char *str) {
1932219089Spjd	/*
1933219089Spjd	 * If it starts with a slash, check the last component.
1934219089Spjd	 */
1935219089Spjd	if (str && str[0] == '/') {
1936219089Spjd		char *tmp = strrchr(str, '/');
1937219089Spjd
1938219089Spjd		/*
1939219089Spjd		 * If it ends in "/old", check the second-to-last
1940219089Spjd		 * component of the string instead.
1941219089Spjd		 */
1942219089Spjd		if (tmp != str && strcmp(tmp, "/old") == 0) {
1943219089Spjd			for (tmp--; *tmp != '/'; tmp--)
1944219089Spjd				;
1945219089Spjd		}
1946219089Spjd		str = tmp + 1;
1947219089Spjd	}
1948219089Spjd	return (CTD_CHECK(str));
1949219089Spjd}
1950219089Spjd
1951219089Spjd/*
1952219089Spjd * Find a vdev that matches the search criteria specified. We use the
1953219089Spjd * the nvpair name to determine how we should look for the device.
1954168404Spjd * 'avail_spare' is set to TRUE if the provided guid refers to an AVAIL
1955168404Spjd * spare; but FALSE if its an INUSE spare.
1956168404Spjd */
1957168404Spjdstatic nvlist_t *
1958219089Spjdvdev_to_nvlist_iter(nvlist_t *nv, nvlist_t *search, boolean_t *avail_spare,
1959219089Spjd    boolean_t *l2cache, boolean_t *log)
1960168404Spjd{
1961168404Spjd	uint_t c, children;
1962168404Spjd	nvlist_t **child;
1963168404Spjd	nvlist_t *ret;
1964185029Spjd	uint64_t is_log;
1965219089Spjd	char *srchkey;
1966219089Spjd	nvpair_t *pair = nvlist_next_nvpair(search, NULL);
1967168404Spjd
1968219089Spjd	/* Nothing to look for */
1969219089Spjd	if (search == NULL || pair == NULL)
1970219089Spjd		return (NULL);
1971168404Spjd
1972219089Spjd	/* Obtain the key we will use to search */
1973219089Spjd	srchkey = nvpair_name(pair);
1974219089Spjd
1975219089Spjd	switch (nvpair_type(pair)) {
1976219089Spjd	case DATA_TYPE_UINT64:
1977219089Spjd		if (strcmp(srchkey, ZPOOL_CONFIG_GUID) == 0) {
1978219089Spjd			uint64_t srchval, theguid;
1979219089Spjd
1980219089Spjd			verify(nvpair_value_uint64(pair, &srchval) == 0);
1981219089Spjd			verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID,
1982219089Spjd			    &theguid) == 0);
1983219089Spjd			if (theguid == srchval)
1984219089Spjd				return (nv);
1985219089Spjd		}
1986219089Spjd		break;
1987219089Spjd
1988219089Spjd	case DATA_TYPE_STRING: {
1989219089Spjd		char *srchval, *val;
1990219089Spjd
1991219089Spjd		verify(nvpair_value_string(pair, &srchval) == 0);
1992219089Spjd		if (nvlist_lookup_string(nv, srchkey, &val) != 0)
1993219089Spjd			break;
1994219089Spjd
1995168404Spjd		/*
1996219089Spjd		 * Search for the requested value. Special cases:
1997219089Spjd		 *
1998219089Spjd		 * - ZPOOL_CONFIG_PATH for whole disk entries.  These end in
1999219089Spjd		 *   "s0" or "s0/old".  The "s0" part is hidden from the user,
2000219089Spjd		 *   but included in the string, so this matches around it.
2001219089Spjd		 * - looking for a top-level vdev name (i.e. ZPOOL_CONFIG_TYPE).
2002219089Spjd		 *
2003219089Spjd		 * Otherwise, all other searches are simple string compares.
2004168404Spjd		 */
2005219089Spjd		if (strcmp(srchkey, ZPOOL_CONFIG_PATH) == 0 &&
2006219089Spjd		    ctd_check_path(val)) {
2007219089Spjd			uint64_t wholedisk = 0;
2008219089Spjd
2009219089Spjd			(void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_WHOLE_DISK,
2010219089Spjd			    &wholedisk);
2011219089Spjd			if (wholedisk) {
2012219089Spjd				int slen = strlen(srchval);
2013219089Spjd				int vlen = strlen(val);
2014219089Spjd
2015219089Spjd				if (slen != vlen - 2)
2016219089Spjd					break;
2017219089Spjd
2018219089Spjd				/*
2019219089Spjd				 * make_leaf_vdev() should only set
2020219089Spjd				 * wholedisk for ZPOOL_CONFIG_PATHs which
2021219089Spjd				 * will include "/dev/dsk/", giving plenty of
2022219089Spjd				 * room for the indices used next.
2023219089Spjd				 */
2024219089Spjd				ASSERT(vlen >= 6);
2025219089Spjd
2026219089Spjd				/*
2027219089Spjd				 * strings identical except trailing "s0"
2028219089Spjd				 */
2029219089Spjd				if (strcmp(&val[vlen - 2], "s0") == 0 &&
2030219089Spjd				    strncmp(srchval, val, slen) == 0)
2031219089Spjd					return (nv);
2032219089Spjd
2033219089Spjd				/*
2034219089Spjd				 * strings identical except trailing "s0/old"
2035219089Spjd				 */
2036219089Spjd				if (strcmp(&val[vlen - 6], "s0/old") == 0 &&
2037219089Spjd				    strcmp(&srchval[slen - 4], "/old") == 0 &&
2038219089Spjd				    strncmp(srchval, val, slen - 4) == 0)
2039219089Spjd					return (nv);
2040219089Spjd
2041219089Spjd				break;
2042219089Spjd			}
2043219089Spjd		} else if (strcmp(srchkey, ZPOOL_CONFIG_TYPE) == 0 && val) {
2044219089Spjd			char *type, *idx, *end, *p;
2045219089Spjd			uint64_t id, vdev_id;
2046219089Spjd
2047168404Spjd			/*
2048219089Spjd			 * Determine our vdev type, keeping in mind
2049219089Spjd			 * that the srchval is composed of a type and
2050219089Spjd			 * vdev id pair (i.e. mirror-4).
2051168404Spjd			 */
2052219089Spjd			if ((type = strdup(srchval)) == NULL)
2053219089Spjd				return (NULL);
2054219089Spjd
2055219089Spjd			if ((p = strrchr(type, '-')) == NULL) {
2056219089Spjd				free(type);
2057219089Spjd				break;
2058219089Spjd			}
2059219089Spjd			idx = p + 1;
2060219089Spjd			*p = '\0';
2061219089Spjd
2062219089Spjd			/*
2063219089Spjd			 * If the types don't match then keep looking.
2064219089Spjd			 */
2065219089Spjd			if (strncmp(val, type, strlen(val)) != 0) {
2066219089Spjd				free(type);
2067219089Spjd				break;
2068219089Spjd			}
2069219089Spjd
2070219089Spjd			verify(strncmp(type, VDEV_TYPE_RAIDZ,
2071219089Spjd			    strlen(VDEV_TYPE_RAIDZ)) == 0 ||
2072219089Spjd			    strncmp(type, VDEV_TYPE_MIRROR,
2073219089Spjd			    strlen(VDEV_TYPE_MIRROR)) == 0);
2074219089Spjd			verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_ID,
2075219089Spjd			    &id) == 0);
2076219089Spjd
2077219089Spjd			errno = 0;
2078219089Spjd			vdev_id = strtoull(idx, &end, 10);
2079219089Spjd
2080219089Spjd			free(type);
2081219089Spjd			if (errno != 0)
2082219089Spjd				return (NULL);
2083219089Spjd
2084219089Spjd			/*
2085219089Spjd			 * Now verify that we have the correct vdev id.
2086219089Spjd			 */
2087219089Spjd			if (vdev_id == id)
2088168404Spjd				return (nv);
2089219089Spjd		}
2090219089Spjd
2091219089Spjd		/*
2092219089Spjd		 * Common case
2093219089Spjd		 */
2094219089Spjd		if (strcmp(srchval, val) == 0)
2095168404Spjd			return (nv);
2096219089Spjd		break;
2097168404Spjd	}
2098168404Spjd
2099219089Spjd	default:
2100219089Spjd		break;
2101219089Spjd	}
2102219089Spjd
2103168404Spjd	if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_CHILDREN,
2104168404Spjd	    &child, &children) != 0)
2105168404Spjd		return (NULL);
2106168404Spjd
2107185029Spjd	for (c = 0; c < children; c++) {
2108219089Spjd		if ((ret = vdev_to_nvlist_iter(child[c], search,
2109185029Spjd		    avail_spare, l2cache, NULL)) != NULL) {
2110185029Spjd			/*
2111185029Spjd			 * The 'is_log' value is only set for the toplevel
2112185029Spjd			 * vdev, not the leaf vdevs.  So we always lookup the
2113185029Spjd			 * log device from the root of the vdev tree (where
2114185029Spjd			 * 'log' is non-NULL).
2115185029Spjd			 */
2116185029Spjd			if (log != NULL &&
2117185029Spjd			    nvlist_lookup_uint64(child[c],
2118185029Spjd			    ZPOOL_CONFIG_IS_LOG, &is_log) == 0 &&
2119185029Spjd			    is_log) {
2120185029Spjd				*log = B_TRUE;
2121185029Spjd			}
2122168404Spjd			return (ret);
2123185029Spjd		}
2124185029Spjd	}
2125168404Spjd
2126168404Spjd	if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_SPARES,
2127168404Spjd	    &child, &children) == 0) {
2128168404Spjd		for (c = 0; c < children; c++) {
2129219089Spjd			if ((ret = vdev_to_nvlist_iter(child[c], search,
2130185029Spjd			    avail_spare, l2cache, NULL)) != NULL) {
2131168404Spjd				*avail_spare = B_TRUE;
2132168404Spjd				return (ret);
2133168404Spjd			}
2134168404Spjd		}
2135168404Spjd	}
2136168404Spjd
2137185029Spjd	if (nvlist_lookup_nvlist_array(nv, ZPOOL_CONFIG_L2CACHE,
2138185029Spjd	    &child, &children) == 0) {
2139185029Spjd		for (c = 0; c < children; c++) {
2140219089Spjd			if ((ret = vdev_to_nvlist_iter(child[c], search,
2141185029Spjd			    avail_spare, l2cache, NULL)) != NULL) {
2142185029Spjd				*l2cache = B_TRUE;
2143185029Spjd				return (ret);
2144185029Spjd			}
2145185029Spjd		}
2146185029Spjd	}
2147185029Spjd
2148168404Spjd	return (NULL);
2149168404Spjd}
2150168404Spjd
2151219089Spjd/*
2152219089Spjd * Given a physical path (minus the "/devices" prefix), find the
2153219089Spjd * associated vdev.
2154219089Spjd */
2155168404Spjdnvlist_t *
2156219089Spjdzpool_find_vdev_by_physpath(zpool_handle_t *zhp, const char *ppath,
2157219089Spjd    boolean_t *avail_spare, boolean_t *l2cache, boolean_t *log)
2158219089Spjd{
2159219089Spjd	nvlist_t *search, *nvroot, *ret;
2160219089Spjd
2161219089Spjd	verify(nvlist_alloc(&search, NV_UNIQUE_NAME, KM_SLEEP) == 0);
2162219089Spjd	verify(nvlist_add_string(search, ZPOOL_CONFIG_PHYS_PATH, ppath) == 0);
2163219089Spjd
2164219089Spjd	verify(nvlist_lookup_nvlist(zhp->zpool_config, ZPOOL_CONFIG_VDEV_TREE,
2165219089Spjd	    &nvroot) == 0);
2166219089Spjd
2167219089Spjd	*avail_spare = B_FALSE;
2168219089Spjd	*l2cache = B_FALSE;
2169219089Spjd	if (log != NULL)
2170219089Spjd		*log = B_FALSE;
2171219089Spjd	ret = vdev_to_nvlist_iter(nvroot, search, avail_spare, l2cache, log);
2172219089Spjd	nvlist_free(search);
2173219089Spjd
2174219089Spjd	return (ret);
2175219089Spjd}
2176219089Spjd
2177219089Spjd/*
2178219089Spjd * Determine if we have an "interior" top-level vdev (i.e mirror/raidz).
2179219089Spjd */
2180219089Spjdboolean_t
2181219089Spjdzpool_vdev_is_interior(const char *name)
2182219089Spjd{
2183219089Spjd	if (strncmp(name, VDEV_TYPE_RAIDZ, strlen(VDEV_TYPE_RAIDZ)) == 0 ||
2184219089Spjd	    strncmp(name, VDEV_TYPE_MIRROR, strlen(VDEV_TYPE_MIRROR)) == 0)
2185219089Spjd		return (B_TRUE);
2186219089Spjd	return (B_FALSE);
2187219089Spjd}
2188219089Spjd
2189219089Spjdnvlist_t *
2190185029Spjdzpool_find_vdev(zpool_handle_t *zhp, const char *path, boolean_t *avail_spare,
2191185029Spjd    boolean_t *l2cache, boolean_t *log)
2192168404Spjd{
2193168404Spjd	char buf[MAXPATHLEN];
2194168404Spjd	char *end;
2195219089Spjd	nvlist_t *nvroot, *search, *ret;
2196168404Spjd	uint64_t guid;
2197168404Spjd
2198219089Spjd	verify(nvlist_alloc(&search, NV_UNIQUE_NAME, KM_SLEEP) == 0);
2199219089Spjd
2200168404Spjd	guid = strtoull(path, &end, 10);
2201168404Spjd	if (guid != 0 && *end == '\0') {
2202219089Spjd		verify(nvlist_add_uint64(search, ZPOOL_CONFIG_GUID, guid) == 0);
2203219089Spjd	} else if (zpool_vdev_is_interior(path)) {
2204219089Spjd		verify(nvlist_add_string(search, ZPOOL_CONFIG_TYPE, path) == 0);
2205168404Spjd	} else if (path[0] != '/') {
2206168404Spjd		(void) snprintf(buf, sizeof (buf), "%s%s", _PATH_DEV, path);
2207219089Spjd		verify(nvlist_add_string(search, ZPOOL_CONFIG_PATH, buf) == 0);
2208168404Spjd	} else {
2209219089Spjd		verify(nvlist_add_string(search, ZPOOL_CONFIG_PATH, path) == 0);
2210168404Spjd	}
2211168404Spjd
2212168404Spjd	verify(nvlist_lookup_nvlist(zhp->zpool_config, ZPOOL_CONFIG_VDEV_TREE,
2213168404Spjd	    &nvroot) == 0);
2214168404Spjd
2215168404Spjd	*avail_spare = B_FALSE;
2216185029Spjd	*l2cache = B_FALSE;
2217185029Spjd	if (log != NULL)
2218185029Spjd		*log = B_FALSE;
2219219089Spjd	ret = vdev_to_nvlist_iter(nvroot, search, avail_spare, l2cache, log);
2220219089Spjd	nvlist_free(search);
2221219089Spjd
2222219089Spjd	return (ret);
2223168404Spjd}
2224168404Spjd
2225185029Spjdstatic int
2226185029Spjdvdev_online(nvlist_t *nv)
2227185029Spjd{
2228185029Spjd	uint64_t ival;
2229185029Spjd
2230185029Spjd	if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_OFFLINE, &ival) == 0 ||
2231185029Spjd	    nvlist_lookup_uint64(nv, ZPOOL_CONFIG_FAULTED, &ival) == 0 ||
2232185029Spjd	    nvlist_lookup_uint64(nv, ZPOOL_CONFIG_REMOVED, &ival) == 0)
2233185029Spjd		return (0);
2234185029Spjd
2235185029Spjd	return (1);
2236185029Spjd}
2237185029Spjd
2238168404Spjd/*
2239219089Spjd * Helper function for zpool_get_physpaths().
2240168404Spjd */
2241219089Spjdstatic int
2242219089Spjdvdev_get_one_physpath(nvlist_t *config, char *physpath, size_t physpath_size,
2243219089Spjd    size_t *bytes_written)
2244185029Spjd{
2245219089Spjd	size_t bytes_left, pos, rsz;
2246219089Spjd	char *tmppath;
2247219089Spjd	const char *format;
2248185029Spjd
2249219089Spjd	if (nvlist_lookup_string(config, ZPOOL_CONFIG_PHYS_PATH,
2250219089Spjd	    &tmppath) != 0)
2251219089Spjd		return (EZFS_NODEVICE);
2252185029Spjd
2253219089Spjd	pos = *bytes_written;
2254219089Spjd	bytes_left = physpath_size - pos;
2255219089Spjd	format = (pos == 0) ? "%s" : " %s";
2256185029Spjd
2257219089Spjd	rsz = snprintf(physpath + pos, bytes_left, format, tmppath);
2258219089Spjd	*bytes_written += rsz;
2259185029Spjd
2260219089Spjd	if (rsz >= bytes_left) {
2261219089Spjd		/* if physpath was not copied properly, clear it */
2262219089Spjd		if (bytes_left != 0) {
2263219089Spjd			physpath[pos] = 0;
2264219089Spjd		}
2265219089Spjd		return (EZFS_NOSPC);
2266219089Spjd	}
2267219089Spjd	return (0);
2268219089Spjd}
2269185029Spjd
2270219089Spjdstatic int
2271219089Spjdvdev_get_physpaths(nvlist_t *nv, char *physpath, size_t phypath_size,
2272219089Spjd    size_t *rsz, boolean_t is_spare)
2273219089Spjd{
2274219089Spjd	char *type;
2275219089Spjd	int ret;
2276185029Spjd
2277219089Spjd	if (nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE, &type) != 0)
2278219089Spjd		return (EZFS_INVALCONFIG);
2279185029Spjd
2280219089Spjd	if (strcmp(type, VDEV_TYPE_DISK) == 0) {
2281219089Spjd		/*
2282219089Spjd		 * An active spare device has ZPOOL_CONFIG_IS_SPARE set.
2283219089Spjd		 * For a spare vdev, we only want to boot from the active
2284219089Spjd		 * spare device.
2285219089Spjd		 */
2286219089Spjd		if (is_spare) {
2287219089Spjd			uint64_t spare = 0;
2288219089Spjd			(void) nvlist_lookup_uint64(nv, ZPOOL_CONFIG_IS_SPARE,
2289219089Spjd			    &spare);
2290219089Spjd			if (!spare)
2291219089Spjd				return (EZFS_INVALCONFIG);
2292219089Spjd		}
2293185029Spjd
2294219089Spjd		if (vdev_online(nv)) {
2295219089Spjd			if ((ret = vdev_get_one_physpath(nv, physpath,
2296219089Spjd			    phypath_size, rsz)) != 0)
2297219089Spjd				return (ret);
2298219089Spjd		}
2299219089Spjd	} else if (strcmp(type, VDEV_TYPE_MIRROR) == 0 ||
2300219089Spjd	    strcmp(type, VDEV_TYPE_REPLACING) == 0 ||
2301219089Spjd	    (is_spare = (strcmp(type, VDEV_TYPE_SPARE) == 0))) {
2302219089Spjd		nvlist_t **child;
2303219089Spjd		uint_t count;
2304219089Spjd		int i, ret;
2305185029Spjd
2306219089Spjd		if (nvlist_lookup_nvlist_array(nv,
2307219089Spjd		    ZPOOL_CONFIG_CHILDREN, &child, &count) != 0)
2308219089Spjd			return (EZFS_INVALCONFIG);
2309219089Spjd
2310219089Spjd		for (i = 0; i < count; i++) {
2311219089Spjd			ret = vdev_get_physpaths(child[i], physpath,
2312219089Spjd			    phypath_size, rsz, is_spare);
2313219089Spjd			if (ret == EZFS_NOSPC)
2314219089Spjd				return (ret);
2315185029Spjd		}
2316185029Spjd	}
2317185029Spjd
2318219089Spjd	return (EZFS_POOL_INVALARG);
2319185029Spjd}
2320185029Spjd
2321185029Spjd/*
2322219089Spjd * Get phys_path for a root pool config.
2323219089Spjd * Return 0 on success; non-zero on failure.
2324185029Spjd */
2325219089Spjdstatic int
2326219089Spjdzpool_get_config_physpath(nvlist_t *config, char *physpath, size_t phypath_size)
2327168404Spjd{
2328219089Spjd	size_t rsz;
2329219089Spjd	nvlist_t *vdev_root;
2330219089Spjd	nvlist_t **child;
2331185029Spjd	uint_t count;
2332219089Spjd	char *type;
2333168404Spjd
2334219089Spjd	rsz = 0;
2335219089Spjd
2336219089Spjd	if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE,
2337219089Spjd	    &vdev_root) != 0)
2338219089Spjd		return (EZFS_INVALCONFIG);
2339219089Spjd
2340219089Spjd	if (nvlist_lookup_string(vdev_root, ZPOOL_CONFIG_TYPE, &type) != 0 ||
2341219089Spjd	    nvlist_lookup_nvlist_array(vdev_root, ZPOOL_CONFIG_CHILDREN,
2342219089Spjd	    &child, &count) != 0)
2343219089Spjd		return (EZFS_INVALCONFIG);
2344219089Spjd
2345219089Spjd	/*
2346219089Spjd	 * root pool can not have EFI labeled disks and can only have
2347219089Spjd	 * a single top-level vdev.
2348219089Spjd	 */
2349219089Spjd	if (strcmp(type, VDEV_TYPE_ROOT) != 0 || count != 1 ||
2350219089Spjd	    pool_uses_efi(vdev_root))
2351219089Spjd		return (EZFS_POOL_INVALARG);
2352219089Spjd
2353219089Spjd	(void) vdev_get_physpaths(child[0], physpath, phypath_size, &rsz,
2354219089Spjd	    B_FALSE);
2355219089Spjd
2356219089Spjd	/* No online devices */
2357219089Spjd	if (rsz == 0)
2358219089Spjd		return (EZFS_NODEVICE);
2359219089Spjd
2360219089Spjd	return (0);
2361219089Spjd}
2362219089Spjd
2363219089Spjd/*
2364219089Spjd * Get phys_path for a root pool
2365219089Spjd * Return 0 on success; non-zero on failure.
2366219089Spjd */
2367219089Spjdint
2368219089Spjdzpool_get_physpath(zpool_handle_t *zhp, char *physpath, size_t phypath_size)
2369219089Spjd{
2370219089Spjd	return (zpool_get_config_physpath(zhp->zpool_config, physpath,
2371219089Spjd	    phypath_size));
2372219089Spjd}
2373219089Spjd
2374219089Spjd/*
2375219089Spjd * If the device has being dynamically expanded then we need to relabel
2376219089Spjd * the disk to use the new unallocated space.
2377219089Spjd */
2378219089Spjdstatic int
2379219089Spjdzpool_relabel_disk(libzfs_handle_t *hdl, const char *name)
2380219089Spjd{
2381219089Spjd#ifdef sun
2382219089Spjd	char path[MAXPATHLEN];
2383219089Spjd	char errbuf[1024];
2384219089Spjd	int fd, error;
2385219089Spjd	int (*_efi_use_whole_disk)(int);
2386219089Spjd
2387219089Spjd	if ((_efi_use_whole_disk = (int (*)(int))dlsym(RTLD_DEFAULT,
2388219089Spjd	    "efi_use_whole_disk")) == NULL)
2389219089Spjd		return (-1);
2390219089Spjd
2391219089Spjd	(void) snprintf(path, sizeof (path), "%s/%s", RDISK_ROOT, name);
2392219089Spjd
2393219089Spjd	if ((fd = open(path, O_RDWR | O_NDELAY)) < 0) {
2394219089Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "cannot "
2395219089Spjd		    "relabel '%s': unable to open device"), name);
2396219089Spjd		return (zfs_error(hdl, EZFS_OPENFAILED, errbuf));
2397168404Spjd	}
2398168404Spjd
2399219089Spjd	/*
2400219089Spjd	 * It's possible that we might encounter an error if the device
2401219089Spjd	 * does not have any unallocated space left. If so, we simply
2402219089Spjd	 * ignore that error and continue on.
2403219089Spjd	 */
2404219089Spjd	error = _efi_use_whole_disk(fd);
2405219089Spjd	(void) close(fd);
2406219089Spjd	if (error && error != VT_ENOSPC) {
2407219089Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "cannot "
2408219089Spjd		    "relabel '%s': unable to read disk capacity"), name);
2409219089Spjd		return (zfs_error(hdl, EZFS_NOCAP, errbuf));
2410219089Spjd	}
2411219089Spjd#endif	/* sun */
2412219089Spjd	return (0);
2413168404Spjd}
2414168404Spjd
2415168404Spjd/*
2416185029Spjd * Bring the specified vdev online.   The 'flags' parameter is a set of the
2417185029Spjd * ZFS_ONLINE_* flags.
2418168404Spjd */
2419168404Spjdint
2420185029Spjdzpool_vdev_online(zpool_handle_t *zhp, const char *path, int flags,
2421185029Spjd    vdev_state_t *newstate)
2422168404Spjd{
2423168404Spjd	zfs_cmd_t zc = { 0 };
2424168404Spjd	char msg[1024];
2425168404Spjd	nvlist_t *tgt;
2426219089Spjd	boolean_t avail_spare, l2cache, islog;
2427168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
2428168404Spjd
2429219089Spjd	if (flags & ZFS_ONLINE_EXPAND) {
2430219089Spjd		(void) snprintf(msg, sizeof (msg),
2431219089Spjd		    dgettext(TEXT_DOMAIN, "cannot expand %s"), path);
2432219089Spjd	} else {
2433219089Spjd		(void) snprintf(msg, sizeof (msg),
2434219089Spjd		    dgettext(TEXT_DOMAIN, "cannot online %s"), path);
2435219089Spjd	}
2436168404Spjd
2437168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
2438185029Spjd	if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache,
2439219089Spjd	    &islog)) == NULL)
2440168404Spjd		return (zfs_error(hdl, EZFS_NODEVICE, msg));
2441168404Spjd
2442168404Spjd	verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0);
2443168404Spjd
2444219089Spjd	if (avail_spare)
2445168404Spjd		return (zfs_error(hdl, EZFS_ISSPARE, msg));
2446168404Spjd
2447219089Spjd	if (flags & ZFS_ONLINE_EXPAND ||
2448219089Spjd	    zpool_get_prop_int(zhp, ZPOOL_PROP_AUTOEXPAND, NULL)) {
2449219089Spjd		char *pathname = NULL;
2450219089Spjd		uint64_t wholedisk = 0;
2451219089Spjd
2452219089Spjd		(void) nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_WHOLE_DISK,
2453219089Spjd		    &wholedisk);
2454219089Spjd		verify(nvlist_lookup_string(tgt, ZPOOL_CONFIG_PATH,
2455219089Spjd		    &pathname) == 0);
2456219089Spjd
2457219089Spjd		/*
2458219089Spjd		 * XXX - L2ARC 1.0 devices can't support expansion.
2459219089Spjd		 */
2460219089Spjd		if (l2cache) {
2461219089Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2462219089Spjd			    "cannot expand cache devices"));
2463219089Spjd			return (zfs_error(hdl, EZFS_VDEVNOTSUP, msg));
2464219089Spjd		}
2465219089Spjd
2466219089Spjd		if (wholedisk) {
2467219089Spjd			pathname += strlen(DISK_ROOT) + 1;
2468219089Spjd			(void) zpool_relabel_disk(hdl, pathname);
2469219089Spjd		}
2470219089Spjd	}
2471219089Spjd
2472185029Spjd	zc.zc_cookie = VDEV_STATE_ONLINE;
2473185029Spjd	zc.zc_obj = flags;
2474168404Spjd
2475219089Spjd	if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SET_STATE, &zc) != 0) {
2476219089Spjd		if (errno == EINVAL) {
2477219089Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "was split "
2478219089Spjd			    "from this pool into a new one.  Use '%s' "
2479219089Spjd			    "instead"), "zpool detach");
2480219089Spjd			return (zfs_error(hdl, EZFS_POSTSPLIT_ONLINE, msg));
2481219089Spjd		}
2482185029Spjd		return (zpool_standard_error(hdl, errno, msg));
2483219089Spjd	}
2484185029Spjd
2485185029Spjd	*newstate = zc.zc_cookie;
2486185029Spjd	return (0);
2487168404Spjd}
2488168404Spjd
2489168404Spjd/*
2490168404Spjd * Take the specified vdev offline
2491168404Spjd */
2492168404Spjdint
2493185029Spjdzpool_vdev_offline(zpool_handle_t *zhp, const char *path, boolean_t istmp)
2494168404Spjd{
2495168404Spjd	zfs_cmd_t zc = { 0 };
2496168404Spjd	char msg[1024];
2497168404Spjd	nvlist_t *tgt;
2498185029Spjd	boolean_t avail_spare, l2cache;
2499168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
2500168404Spjd
2501168404Spjd	(void) snprintf(msg, sizeof (msg),
2502168404Spjd	    dgettext(TEXT_DOMAIN, "cannot offline %s"), path);
2503168404Spjd
2504168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
2505185029Spjd	if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache,
2506185029Spjd	    NULL)) == NULL)
2507168404Spjd		return (zfs_error(hdl, EZFS_NODEVICE, msg));
2508168404Spjd
2509168404Spjd	verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0);
2510168404Spjd
2511219089Spjd	if (avail_spare)
2512168404Spjd		return (zfs_error(hdl, EZFS_ISSPARE, msg));
2513168404Spjd
2514185029Spjd	zc.zc_cookie = VDEV_STATE_OFFLINE;
2515185029Spjd	zc.zc_obj = istmp ? ZFS_OFFLINE_TEMPORARY : 0;
2516168404Spjd
2517219089Spjd	if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SET_STATE, &zc) == 0)
2518168404Spjd		return (0);
2519168404Spjd
2520168404Spjd	switch (errno) {
2521168404Spjd	case EBUSY:
2522168404Spjd
2523168404Spjd		/*
2524168404Spjd		 * There are no other replicas of this device.
2525168404Spjd		 */
2526168404Spjd		return (zfs_error(hdl, EZFS_NOREPLICAS, msg));
2527168404Spjd
2528219089Spjd	case EEXIST:
2529219089Spjd		/*
2530219089Spjd		 * The log device has unplayed logs
2531219089Spjd		 */
2532219089Spjd		return (zfs_error(hdl, EZFS_UNPLAYED_LOGS, msg));
2533219089Spjd
2534168404Spjd	default:
2535168404Spjd		return (zpool_standard_error(hdl, errno, msg));
2536168404Spjd	}
2537168404Spjd}
2538168404Spjd
2539168404Spjd/*
2540185029Spjd * Mark the given vdev faulted.
2541185029Spjd */
2542185029Spjdint
2543219089Spjdzpool_vdev_fault(zpool_handle_t *zhp, uint64_t guid, vdev_aux_t aux)
2544185029Spjd{
2545185029Spjd	zfs_cmd_t zc = { 0 };
2546185029Spjd	char msg[1024];
2547185029Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
2548185029Spjd
2549185029Spjd	(void) snprintf(msg, sizeof (msg),
2550185029Spjd	    dgettext(TEXT_DOMAIN, "cannot fault %llu"), guid);
2551185029Spjd
2552185029Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
2553185029Spjd	zc.zc_guid = guid;
2554185029Spjd	zc.zc_cookie = VDEV_STATE_FAULTED;
2555219089Spjd	zc.zc_obj = aux;
2556185029Spjd
2557219089Spjd	if (ioctl(hdl->libzfs_fd, ZFS_IOC_VDEV_SET_STATE, &zc) == 0)
2558185029Spjd		return (0);
2559185029Spjd
2560185029Spjd	switch (errno) {
2561185029Spjd	case EBUSY:
2562185029Spjd
2563185029Spjd		/*
2564185029Spjd		 * There are no other replicas of this device.
2565185029Spjd		 */
2566185029Spjd		return (zfs_error(hdl, EZFS_NOREPLICAS, msg));
2567185029Spjd
2568185029Spjd	default:
2569185029Spjd		return (zpool_standard_error(hdl, errno, msg));
2570185029Spjd	}
2571185029Spjd
2572185029Spjd}
2573185029Spjd
2574185029Spjd/*
2575185029Spjd * Mark the given vdev degraded.
2576185029Spjd */
2577185029Spjdint
2578219089Spjdzpool_vdev_degrade(zpool_handle_t *zhp, uint64_t guid, vdev_aux_t aux)
2579185029Spjd{
2580185029Spjd	zfs_cmd_t zc = { 0 };
2581185029Spjd	char msg[1024];
2582185029Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
2583185029Spjd
2584185029Spjd	(void) snprintf(msg, sizeof (msg),
2585185029Spjd	    dgettext(TEXT_DOMAIN, "cannot degrade %llu"), guid);
2586185029Spjd
2587185029Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
2588185029Spjd	zc.zc_guid = guid;
2589185029Spjd	zc.zc_cookie = VDEV_STATE_DEGRADED;
2590219089Spjd	zc.zc_obj = aux;
2591185029Spjd
2592219089Spjd	if (ioctl(hdl->libzfs_fd, ZFS_IOC_VDEV_SET_STATE, &zc) == 0)
2593185029Spjd		return (0);
2594185029Spjd
2595185029Spjd	return (zpool_standard_error(hdl, errno, msg));
2596185029Spjd}
2597185029Spjd
2598185029Spjd/*
2599168404Spjd * Returns TRUE if the given nvlist is a vdev that was originally swapped in as
2600168404Spjd * a hot spare.
2601168404Spjd */
2602168404Spjdstatic boolean_t
2603168404Spjdis_replacing_spare(nvlist_t *search, nvlist_t *tgt, int which)
2604168404Spjd{
2605168404Spjd	nvlist_t **child;
2606168404Spjd	uint_t c, children;
2607168404Spjd	char *type;
2608168404Spjd
2609168404Spjd	if (nvlist_lookup_nvlist_array(search, ZPOOL_CONFIG_CHILDREN, &child,
2610168404Spjd	    &children) == 0) {
2611168404Spjd		verify(nvlist_lookup_string(search, ZPOOL_CONFIG_TYPE,
2612168404Spjd		    &type) == 0);
2613168404Spjd
2614168404Spjd		if (strcmp(type, VDEV_TYPE_SPARE) == 0 &&
2615168404Spjd		    children == 2 && child[which] == tgt)
2616168404Spjd			return (B_TRUE);
2617168404Spjd
2618168404Spjd		for (c = 0; c < children; c++)
2619168404Spjd			if (is_replacing_spare(child[c], tgt, which))
2620168404Spjd				return (B_TRUE);
2621168404Spjd	}
2622168404Spjd
2623168404Spjd	return (B_FALSE);
2624168404Spjd}
2625168404Spjd
2626168404Spjd/*
2627168404Spjd * Attach new_disk (fully described by nvroot) to old_disk.
2628185029Spjd * If 'replacing' is specified, the new disk will replace the old one.
2629168404Spjd */
2630168404Spjdint
2631168404Spjdzpool_vdev_attach(zpool_handle_t *zhp,
2632168404Spjd    const char *old_disk, const char *new_disk, nvlist_t *nvroot, int replacing)
2633168404Spjd{
2634168404Spjd	zfs_cmd_t zc = { 0 };
2635168404Spjd	char msg[1024];
2636168404Spjd	int ret;
2637168404Spjd	nvlist_t *tgt;
2638185029Spjd	boolean_t avail_spare, l2cache, islog;
2639168404Spjd	uint64_t val;
2640219089Spjd	char *newname;
2641168404Spjd	nvlist_t **child;
2642168404Spjd	uint_t children;
2643168404Spjd	nvlist_t *config_root;
2644168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
2645236155Smm	boolean_t rootpool = zpool_is_bootable(zhp);
2646168404Spjd
2647168404Spjd	if (replacing)
2648168404Spjd		(void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN,
2649168404Spjd		    "cannot replace %s with %s"), old_disk, new_disk);
2650168404Spjd	else
2651168404Spjd		(void) snprintf(msg, sizeof (msg), dgettext(TEXT_DOMAIN,
2652168404Spjd		    "cannot attach %s to %s"), new_disk, old_disk);
2653168404Spjd
2654209962Smm	/*
2655209962Smm	 * If this is a root pool, make sure that we're not attaching an
2656209962Smm	 * EFI labeled device.
2657209962Smm	 */
2658209962Smm	if (rootpool && pool_uses_efi(nvroot)) {
2659209962Smm		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2660209962Smm		    "EFI labeled devices are not supported on root pools."));
2661209962Smm		return (zfs_error(hdl, EZFS_POOL_NOTSUP, msg));
2662209962Smm	}
2663209962Smm
2664168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
2665185029Spjd	if ((tgt = zpool_find_vdev(zhp, old_disk, &avail_spare, &l2cache,
2666185029Spjd	    &islog)) == 0)
2667168404Spjd		return (zfs_error(hdl, EZFS_NODEVICE, msg));
2668168404Spjd
2669168404Spjd	if (avail_spare)
2670168404Spjd		return (zfs_error(hdl, EZFS_ISSPARE, msg));
2671168404Spjd
2672185029Spjd	if (l2cache)
2673185029Spjd		return (zfs_error(hdl, EZFS_ISL2CACHE, msg));
2674185029Spjd
2675168404Spjd	verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0);
2676168404Spjd	zc.zc_cookie = replacing;
2677168404Spjd
2678168404Spjd	if (nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN,
2679168404Spjd	    &child, &children) != 0 || children != 1) {
2680168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2681168404Spjd		    "new device must be a single disk"));
2682168404Spjd		return (zfs_error(hdl, EZFS_INVALCONFIG, msg));
2683168404Spjd	}
2684168404Spjd
2685168404Spjd	verify(nvlist_lookup_nvlist(zpool_get_config(zhp, NULL),
2686168404Spjd	    ZPOOL_CONFIG_VDEV_TREE, &config_root) == 0);
2687168404Spjd
2688219089Spjd	if ((newname = zpool_vdev_name(NULL, NULL, child[0], B_FALSE)) == NULL)
2689185029Spjd		return (-1);
2690185029Spjd
2691168404Spjd	/*
2692168404Spjd	 * If the target is a hot spare that has been swapped in, we can only
2693168404Spjd	 * replace it with another hot spare.
2694168404Spjd	 */
2695168404Spjd	if (replacing &&
2696168404Spjd	    nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_IS_SPARE, &val) == 0 &&
2697185029Spjd	    (zpool_find_vdev(zhp, newname, &avail_spare, &l2cache,
2698185029Spjd	    NULL) == NULL || !avail_spare) &&
2699185029Spjd	    is_replacing_spare(config_root, tgt, 1)) {
2700168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2701168404Spjd		    "can only be replaced by another hot spare"));
2702185029Spjd		free(newname);
2703168404Spjd		return (zfs_error(hdl, EZFS_BADTARGET, msg));
2704168404Spjd	}
2705168404Spjd
2706185029Spjd	free(newname);
2707185029Spjd
2708185029Spjd	if (zcmd_write_conf_nvlist(hdl, &zc, nvroot) != 0)
2709168404Spjd		return (-1);
2710168404Spjd
2711219089Spjd	ret = zfs_ioctl(hdl, ZFS_IOC_VDEV_ATTACH, &zc);
2712168404Spjd
2713168404Spjd	zcmd_free_nvlists(&zc);
2714168404Spjd
2715209962Smm	if (ret == 0) {
2716209962Smm		if (rootpool) {
2717219089Spjd			/*
2718219089Spjd			 * XXX need a better way to prevent user from
2719219089Spjd			 * booting up a half-baked vdev.
2720219089Spjd			 */
2721219089Spjd			(void) fprintf(stderr, dgettext(TEXT_DOMAIN, "Make "
2722219089Spjd			    "sure to wait until resilver is done "
2723219089Spjd			    "before rebooting.\n"));
2724219089Spjd			(void) fprintf(stderr, "\n");
2725216293Smm			(void) fprintf(stderr, dgettext(TEXT_DOMAIN, "If "
2726216293Smm			    "you boot from pool '%s', you may need to update\n"
2727216293Smm			    "boot code on newly attached disk '%s'.\n\n"
2728216293Smm			    "Assuming you use GPT partitioning and 'da0' is "
2729216293Smm			    "your new boot disk\n"
2730216293Smm			    "you may use the following command:\n\n"
2731216293Smm			    "\tgpart bootcode -b /boot/pmbr -p "
2732216293Smm			    "/boot/gptzfsboot -i 1 da0\n\n"),
2733216293Smm			    zhp->zpool_name, new_disk);
2734209962Smm		}
2735168404Spjd		return (0);
2736209962Smm	}
2737168404Spjd
2738168404Spjd	switch (errno) {
2739168404Spjd	case ENOTSUP:
2740168404Spjd		/*
2741168404Spjd		 * Can't attach to or replace this type of vdev.
2742168404Spjd		 */
2743185029Spjd		if (replacing) {
2744219089Spjd			uint64_t version = zpool_get_prop_int(zhp,
2745219089Spjd			    ZPOOL_PROP_VERSION, NULL);
2746219089Spjd
2747185029Spjd			if (islog)
2748185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2749185029Spjd				    "cannot replace a log with a spare"));
2750219089Spjd			else if (version >= SPA_VERSION_MULTI_REPLACE)
2751219089Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2752219089Spjd				    "already in replacing/spare config; wait "
2753219089Spjd				    "for completion or use 'zpool detach'"));
2754185029Spjd			else
2755185029Spjd				zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2756185029Spjd				    "cannot replace a replacing device"));
2757185029Spjd		} else {
2758168404Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2759168404Spjd			    "can only attach to mirrors and top-level "
2760168404Spjd			    "disks"));
2761185029Spjd		}
2762168404Spjd		(void) zfs_error(hdl, EZFS_BADTARGET, msg);
2763168404Spjd		break;
2764168404Spjd
2765168404Spjd	case EINVAL:
2766168404Spjd		/*
2767168404Spjd		 * The new device must be a single disk.
2768168404Spjd		 */
2769168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2770168404Spjd		    "new device must be a single disk"));
2771168404Spjd		(void) zfs_error(hdl, EZFS_INVALCONFIG, msg);
2772168404Spjd		break;
2773168404Spjd
2774168404Spjd	case EBUSY:
2775168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "%s is busy"),
2776168404Spjd		    new_disk);
2777168404Spjd		(void) zfs_error(hdl, EZFS_BADDEV, msg);
2778168404Spjd		break;
2779168404Spjd
2780168404Spjd	case EOVERFLOW:
2781168404Spjd		/*
2782168404Spjd		 * The new device is too small.
2783168404Spjd		 */
2784168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2785168404Spjd		    "device is too small"));
2786168404Spjd		(void) zfs_error(hdl, EZFS_BADDEV, msg);
2787168404Spjd		break;
2788168404Spjd
2789168404Spjd	case EDOM:
2790168404Spjd		/*
2791168404Spjd		 * The new device has a different alignment requirement.
2792168404Spjd		 */
2793168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2794168404Spjd		    "devices have different sector alignment"));
2795168404Spjd		(void) zfs_error(hdl, EZFS_BADDEV, msg);
2796168404Spjd		break;
2797168404Spjd
2798168404Spjd	case ENAMETOOLONG:
2799168404Spjd		/*
2800168404Spjd		 * The resulting top-level vdev spec won't fit in the label.
2801168404Spjd		 */
2802168404Spjd		(void) zfs_error(hdl, EZFS_DEVOVERFLOW, msg);
2803168404Spjd		break;
2804168404Spjd
2805168404Spjd	default:
2806168404Spjd		(void) zpool_standard_error(hdl, errno, msg);
2807168404Spjd	}
2808168404Spjd
2809168404Spjd	return (-1);
2810168404Spjd}
2811168404Spjd
2812168404Spjd/*
2813168404Spjd * Detach the specified device.
2814168404Spjd */
2815168404Spjdint
2816168404Spjdzpool_vdev_detach(zpool_handle_t *zhp, const char *path)
2817168404Spjd{
2818168404Spjd	zfs_cmd_t zc = { 0 };
2819168404Spjd	char msg[1024];
2820168404Spjd	nvlist_t *tgt;
2821185029Spjd	boolean_t avail_spare, l2cache;
2822168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
2823168404Spjd
2824168404Spjd	(void) snprintf(msg, sizeof (msg),
2825168404Spjd	    dgettext(TEXT_DOMAIN, "cannot detach %s"), path);
2826168404Spjd
2827168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
2828185029Spjd	if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache,
2829185029Spjd	    NULL)) == 0)
2830168404Spjd		return (zfs_error(hdl, EZFS_NODEVICE, msg));
2831168404Spjd
2832168404Spjd	if (avail_spare)
2833168404Spjd		return (zfs_error(hdl, EZFS_ISSPARE, msg));
2834168404Spjd
2835185029Spjd	if (l2cache)
2836185029Spjd		return (zfs_error(hdl, EZFS_ISL2CACHE, msg));
2837185029Spjd
2838168404Spjd	verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0);
2839168404Spjd
2840185029Spjd	if (zfs_ioctl(hdl, ZFS_IOC_VDEV_DETACH, &zc) == 0)
2841168404Spjd		return (0);
2842168404Spjd
2843168404Spjd	switch (errno) {
2844168404Spjd
2845168404Spjd	case ENOTSUP:
2846168404Spjd		/*
2847168404Spjd		 * Can't detach from this type of vdev.
2848168404Spjd		 */
2849168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "only "
2850168404Spjd		    "applicable to mirror and replacing vdevs"));
2851219089Spjd		(void) zfs_error(hdl, EZFS_BADTARGET, msg);
2852168404Spjd		break;
2853168404Spjd
2854168404Spjd	case EBUSY:
2855168404Spjd		/*
2856168404Spjd		 * There are no other replicas of this device.
2857168404Spjd		 */
2858168404Spjd		(void) zfs_error(hdl, EZFS_NOREPLICAS, msg);
2859168404Spjd		break;
2860168404Spjd
2861168404Spjd	default:
2862168404Spjd		(void) zpool_standard_error(hdl, errno, msg);
2863168404Spjd	}
2864168404Spjd
2865168404Spjd	return (-1);
2866168404Spjd}
2867168404Spjd
2868168404Spjd/*
2869219089Spjd * Find a mirror vdev in the source nvlist.
2870219089Spjd *
2871219089Spjd * The mchild array contains a list of disks in one of the top-level mirrors
2872219089Spjd * of the source pool.  The schild array contains a list of disks that the
2873219089Spjd * user specified on the command line.  We loop over the mchild array to
2874219089Spjd * see if any entry in the schild array matches.
2875219089Spjd *
2876219089Spjd * If a disk in the mchild array is found in the schild array, we return
2877219089Spjd * the index of that entry.  Otherwise we return -1.
2878219089Spjd */
2879219089Spjdstatic int
2880219089Spjdfind_vdev_entry(zpool_handle_t *zhp, nvlist_t **mchild, uint_t mchildren,
2881219089Spjd    nvlist_t **schild, uint_t schildren)
2882219089Spjd{
2883219089Spjd	uint_t mc;
2884219089Spjd
2885219089Spjd	for (mc = 0; mc < mchildren; mc++) {
2886219089Spjd		uint_t sc;
2887219089Spjd		char *mpath = zpool_vdev_name(zhp->zpool_hdl, zhp,
2888219089Spjd		    mchild[mc], B_FALSE);
2889219089Spjd
2890219089Spjd		for (sc = 0; sc < schildren; sc++) {
2891219089Spjd			char *spath = zpool_vdev_name(zhp->zpool_hdl, zhp,
2892219089Spjd			    schild[sc], B_FALSE);
2893219089Spjd			boolean_t result = (strcmp(mpath, spath) == 0);
2894219089Spjd
2895219089Spjd			free(spath);
2896219089Spjd			if (result) {
2897219089Spjd				free(mpath);
2898219089Spjd				return (mc);
2899219089Spjd			}
2900219089Spjd		}
2901219089Spjd
2902219089Spjd		free(mpath);
2903219089Spjd	}
2904219089Spjd
2905219089Spjd	return (-1);
2906219089Spjd}
2907219089Spjd
2908219089Spjd/*
2909219089Spjd * Split a mirror pool.  If newroot points to null, then a new nvlist
2910219089Spjd * is generated and it is the responsibility of the caller to free it.
2911219089Spjd */
2912219089Spjdint
2913219089Spjdzpool_vdev_split(zpool_handle_t *zhp, char *newname, nvlist_t **newroot,
2914219089Spjd    nvlist_t *props, splitflags_t flags)
2915219089Spjd{
2916219089Spjd	zfs_cmd_t zc = { 0 };
2917219089Spjd	char msg[1024];
2918219089Spjd	nvlist_t *tree, *config, **child, **newchild, *newconfig = NULL;
2919219089Spjd	nvlist_t **varray = NULL, *zc_props = NULL;
2920219089Spjd	uint_t c, children, newchildren, lastlog = 0, vcount, found = 0;
2921219089Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
2922219089Spjd	uint64_t vers;
2923219089Spjd	boolean_t freelist = B_FALSE, memory_err = B_TRUE;
2924219089Spjd	int retval = 0;
2925219089Spjd
2926219089Spjd	(void) snprintf(msg, sizeof (msg),
2927219089Spjd	    dgettext(TEXT_DOMAIN, "Unable to split %s"), zhp->zpool_name);
2928219089Spjd
2929219089Spjd	if (!zpool_name_valid(hdl, B_FALSE, newname))
2930219089Spjd		return (zfs_error(hdl, EZFS_INVALIDNAME, msg));
2931219089Spjd
2932219089Spjd	if ((config = zpool_get_config(zhp, NULL)) == NULL) {
2933219089Spjd		(void) fprintf(stderr, gettext("Internal error: unable to "
2934219089Spjd		    "retrieve pool configuration\n"));
2935219089Spjd		return (-1);
2936219089Spjd	}
2937219089Spjd
2938219089Spjd	verify(nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, &tree)
2939219089Spjd	    == 0);
2940219089Spjd	verify(nvlist_lookup_uint64(config, ZPOOL_CONFIG_VERSION, &vers) == 0);
2941219089Spjd
2942219089Spjd	if (props) {
2943219089Spjd		prop_flags_t flags = { .create = B_FALSE, .import = B_TRUE };
2944219089Spjd		if ((zc_props = zpool_valid_proplist(hdl, zhp->zpool_name,
2945219089Spjd		    props, vers, flags, msg)) == NULL)
2946219089Spjd			return (-1);
2947219089Spjd	}
2948219089Spjd
2949219089Spjd	if (nvlist_lookup_nvlist_array(tree, ZPOOL_CONFIG_CHILDREN, &child,
2950219089Spjd	    &children) != 0) {
2951219089Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
2952219089Spjd		    "Source pool is missing vdev tree"));
2953219089Spjd		if (zc_props)
2954219089Spjd			nvlist_free(zc_props);
2955219089Spjd		return (-1);
2956219089Spjd	}
2957219089Spjd
2958219089Spjd	varray = zfs_alloc(hdl, children * sizeof (nvlist_t *));
2959219089Spjd	vcount = 0;
2960219089Spjd
2961219089Spjd	if (*newroot == NULL ||
2962219089Spjd	    nvlist_lookup_nvlist_array(*newroot, ZPOOL_CONFIG_CHILDREN,
2963219089Spjd	    &newchild, &newchildren) != 0)
2964219089Spjd		newchildren = 0;
2965219089Spjd
2966219089Spjd	for (c = 0; c < children; c++) {
2967219089Spjd		uint64_t is_log = B_FALSE, is_hole = B_FALSE;
2968219089Spjd		char *type;
2969219089Spjd		nvlist_t **mchild, *vdev;
2970219089Spjd		uint_t mchildren;
2971219089Spjd		int entry;
2972219089Spjd
2973219089Spjd		/*
2974219089Spjd		 * Unlike cache & spares, slogs are stored in the
2975219089Spjd		 * ZPOOL_CONFIG_CHILDREN array.  We filter them out here.
2976219089Spjd		 */
2977219089Spjd		(void) nvlist_lookup_uint64(child[c], ZPOOL_CONFIG_IS_LOG,
2978219089Spjd		    &is_log);
2979219089Spjd		(void) nvlist_lookup_uint64(child[c], ZPOOL_CONFIG_IS_HOLE,
2980219089Spjd		    &is_hole);
2981219089Spjd		if (is_log || is_hole) {
2982219089Spjd			/*
2983219089Spjd			 * Create a hole vdev and put it in the config.
2984219089Spjd			 */
2985219089Spjd			if (nvlist_alloc(&vdev, NV_UNIQUE_NAME, 0) != 0)
2986219089Spjd				goto out;
2987219089Spjd			if (nvlist_add_string(vdev, ZPOOL_CONFIG_TYPE,
2988219089Spjd			    VDEV_TYPE_HOLE) != 0)
2989219089Spjd				goto out;
2990219089Spjd			if (nvlist_add_uint64(vdev, ZPOOL_CONFIG_IS_HOLE,
2991219089Spjd			    1) != 0)
2992219089Spjd				goto out;
2993219089Spjd			if (lastlog == 0)
2994219089Spjd				lastlog = vcount;
2995219089Spjd			varray[vcount++] = vdev;
2996219089Spjd			continue;
2997219089Spjd		}
2998219089Spjd		lastlog = 0;
2999219089Spjd		verify(nvlist_lookup_string(child[c], ZPOOL_CONFIG_TYPE, &type)
3000219089Spjd		    == 0);
3001219089Spjd		if (strcmp(type, VDEV_TYPE_MIRROR) != 0) {
3002219089Spjd			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
3003219089Spjd			    "Source pool must be composed only of mirrors\n"));
3004219089Spjd			retval = zfs_error(hdl, EZFS_INVALCONFIG, msg);
3005219089Spjd			goto out;
3006219089Spjd		}
3007219089Spjd
3008219089Spjd		verify(nvlist_lookup_nvlist_array(child[c],
3009219089Spjd		    ZPOOL_CONFIG_CHILDREN, &mchild, &mchildren) == 0);
3010219089Spjd
3011219089Spjd		/* find or add an entry for this top-level vdev */
3012219089Spjd		if (newchildren > 0 &&
3013219089Spjd		    (entry = find_vdev_entry(zhp, mchild, mchildren,
3014219089Spjd		    newchild, newchildren)) >= 0) {
3015219089Spjd			/* We found a disk that the user specified. */
3016219089Spjd			vdev = mchild[entry];
3017219089Spjd			++found;
3018219089Spjd		} else {
3019219089Spjd			/* User didn't specify a disk for this vdev. */
3020219089Spjd			vdev = mchild[mchildren - 1];
3021219089Spjd		}
3022219089Spjd
3023219089Spjd		if (nvlist_dup(vdev, &varray[vcount++], 0) != 0)
3024219089Spjd			goto out;
3025219089Spjd	}
3026219089Spjd
3027219089Spjd	/* did we find every disk the user specified? */
3028219089Spjd	if (found != newchildren) {
3029219089Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN, "Device list must "
3030219089Spjd		    "include at most one disk from each mirror"));
3031219089Spjd		retval = zfs_error(hdl, EZFS_INVALCONFIG, msg);
3032219089Spjd		goto out;
3033219089Spjd	}
3034219089Spjd
3035219089Spjd	/* Prepare the nvlist for populating. */
3036219089Spjd	if (*newroot == NULL) {
3037219089Spjd		if (nvlist_alloc(newroot, NV_UNIQUE_NAME, 0) != 0)
3038219089Spjd			goto out;
3039219089Spjd		freelist = B_TRUE;
3040219089Spjd		if (nvlist_add_string(*newroot, ZPOOL_CONFIG_TYPE,
3041219089Spjd		    VDEV_TYPE_ROOT) != 0)
3042219089Spjd			goto out;
3043219089Spjd	} else {
3044219089Spjd		verify(nvlist_remove_all(*newroot, ZPOOL_CONFIG_CHILDREN) == 0);
3045219089Spjd	}
3046219089Spjd
3047219089Spjd	/* Add all the children we found */
3048219089Spjd	if (nvlist_add_nvlist_array(*newroot, ZPOOL_CONFIG_CHILDREN, varray,
3049219089Spjd	    lastlog == 0 ? vcount : lastlog) != 0)
3050219089Spjd		goto out;
3051219089Spjd
3052219089Spjd	/*
3053219089Spjd	 * If we're just doing a dry run, exit now with success.
3054219089Spjd	 */
3055219089Spjd	if (flags.dryrun) {
3056219089Spjd		memory_err = B_FALSE;
3057219089Spjd		freelist = B_FALSE;
3058219089Spjd		goto out;
3059219089Spjd	}
3060219089Spjd
3061219089Spjd	/* now build up the config list & call the ioctl */
3062219089Spjd	if (nvlist_alloc(&newconfig, NV_UNIQUE_NAME, 0) != 0)
3063219089Spjd		goto out;
3064219089Spjd
3065219089Spjd	if (nvlist_add_nvlist(newconfig,
3066219089Spjd	    ZPOOL_CONFIG_VDEV_TREE, *newroot) != 0 ||
3067219089Spjd	    nvlist_add_string(newconfig,
3068219089Spjd	    ZPOOL_CONFIG_POOL_NAME, newname) != 0 ||
3069219089Spjd	    nvlist_add_uint64(newconfig, ZPOOL_CONFIG_VERSION, vers) != 0)
3070219089Spjd		goto out;
3071219089Spjd
3072219089Spjd	/*
3073219089Spjd	 * The new pool is automatically part of the namespace unless we
3074219089Spjd	 * explicitly export it.
3075219089Spjd	 */
3076219089Spjd	if (!flags.import)
3077219089Spjd		zc.zc_cookie = ZPOOL_EXPORT_AFTER_SPLIT;
3078219089Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3079219089Spjd	(void) strlcpy(zc.zc_string, newname, sizeof (zc.zc_string));
3080219089Spjd	if (zcmd_write_conf_nvlist(hdl, &zc, newconfig) != 0)
3081219089Spjd		goto out;
3082219089Spjd	if (zc_props != NULL && zcmd_write_src_nvlist(hdl, &zc, zc_props) != 0)
3083219089Spjd		goto out;
3084219089Spjd
3085219089Spjd	if (zfs_ioctl(hdl, ZFS_IOC_VDEV_SPLIT, &zc) != 0) {
3086219089Spjd		retval = zpool_standard_error(hdl, errno, msg);
3087219089Spjd		goto out;
3088219089Spjd	}
3089219089Spjd
3090219089Spjd	freelist = B_FALSE;
3091219089Spjd	memory_err = B_FALSE;
3092219089Spjd
3093219089Spjdout:
3094219089Spjd	if (varray != NULL) {
3095219089Spjd		int v;
3096219089Spjd
3097219089Spjd		for (v = 0; v < vcount; v++)
3098219089Spjd			nvlist_free(varray[v]);
3099219089Spjd		free(varray);
3100219089Spjd	}
3101219089Spjd	zcmd_free_nvlists(&zc);
3102219089Spjd	if (zc_props)
3103219089Spjd		nvlist_free(zc_props);
3104219089Spjd	if (newconfig)
3105219089Spjd		nvlist_free(newconfig);
3106219089Spjd	if (freelist) {
3107219089Spjd		nvlist_free(*newroot);
3108219089Spjd		*newroot = NULL;
3109219089Spjd	}
3110219089Spjd
3111219089Spjd	if (retval != 0)
3112219089Spjd		return (retval);
3113219089Spjd
3114219089Spjd	if (memory_err)
3115219089Spjd		return (no_memory(hdl));
3116219089Spjd
3117219089Spjd	return (0);
3118219089Spjd}
3119219089Spjd
3120219089Spjd/*
3121185029Spjd * Remove the given device.  Currently, this is supported only for hot spares
3122185029Spjd * and level 2 cache devices.
3123168404Spjd */
3124168404Spjdint
3125168404Spjdzpool_vdev_remove(zpool_handle_t *zhp, const char *path)
3126168404Spjd{
3127168404Spjd	zfs_cmd_t zc = { 0 };
3128168404Spjd	char msg[1024];
3129168404Spjd	nvlist_t *tgt;
3130219089Spjd	boolean_t avail_spare, l2cache, islog;
3131168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
3132219089Spjd	uint64_t version;
3133168404Spjd
3134168404Spjd	(void) snprintf(msg, sizeof (msg),
3135168404Spjd	    dgettext(TEXT_DOMAIN, "cannot remove %s"), path);
3136168404Spjd
3137168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3138185029Spjd	if ((tgt = zpool_find_vdev(zhp, path, &avail_spare, &l2cache,
3139219089Spjd	    &islog)) == 0)
3140168404Spjd		return (zfs_error(hdl, EZFS_NODEVICE, msg));
3141219089Spjd	/*
3142219089Spjd	 * XXX - this should just go away.
3143219089Spjd	 */
3144219089Spjd	if (!avail_spare && !l2cache && !islog) {
3145168404Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
3146219089Spjd		    "only inactive hot spares, cache, top-level, "
3147219089Spjd		    "or log devices can be removed"));
3148168404Spjd		return (zfs_error(hdl, EZFS_NODEVICE, msg));
3149168404Spjd	}
3150168404Spjd
3151219089Spjd	version = zpool_get_prop_int(zhp, ZPOOL_PROP_VERSION, NULL);
3152219089Spjd	if (islog && version < SPA_VERSION_HOLES) {
3153219089Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
3154219089Spjd		    "pool must be upgrade to support log removal"));
3155219089Spjd		return (zfs_error(hdl, EZFS_BADVERSION, msg));
3156219089Spjd	}
3157219089Spjd
3158168404Spjd	verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID, &zc.zc_guid) == 0);
3159168404Spjd
3160185029Spjd	if (zfs_ioctl(hdl, ZFS_IOC_VDEV_REMOVE, &zc) == 0)
3161168404Spjd		return (0);
3162168404Spjd
3163168404Spjd	return (zpool_standard_error(hdl, errno, msg));
3164168404Spjd}
3165168404Spjd
3166168404Spjd/*
3167168404Spjd * Clear the errors for the pool, or the particular device if specified.
3168168404Spjd */
3169168404Spjdint
3170219089Spjdzpool_clear(zpool_handle_t *zhp, const char *path, nvlist_t *rewindnvl)
3171168404Spjd{
3172168404Spjd	zfs_cmd_t zc = { 0 };
3173168404Spjd	char msg[1024];
3174168404Spjd	nvlist_t *tgt;
3175219089Spjd	zpool_rewind_policy_t policy;
3176185029Spjd	boolean_t avail_spare, l2cache;
3177168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
3178219089Spjd	nvlist_t *nvi = NULL;
3179219089Spjd	int error;
3180168404Spjd
3181168404Spjd	if (path)
3182168404Spjd		(void) snprintf(msg, sizeof (msg),
3183168404Spjd		    dgettext(TEXT_DOMAIN, "cannot clear errors for %s"),
3184168404Spjd		    path);
3185168404Spjd	else
3186168404Spjd		(void) snprintf(msg, sizeof (msg),
3187168404Spjd		    dgettext(TEXT_DOMAIN, "cannot clear errors for %s"),
3188168404Spjd		    zhp->zpool_name);
3189168404Spjd
3190168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3191168404Spjd	if (path) {
3192185029Spjd		if ((tgt = zpool_find_vdev(zhp, path, &avail_spare,
3193185029Spjd		    &l2cache, NULL)) == 0)
3194168404Spjd			return (zfs_error(hdl, EZFS_NODEVICE, msg));
3195168404Spjd
3196185029Spjd		/*
3197185029Spjd		 * Don't allow error clearing for hot spares.  Do allow
3198185029Spjd		 * error clearing for l2cache devices.
3199185029Spjd		 */
3200168404Spjd		if (avail_spare)
3201168404Spjd			return (zfs_error(hdl, EZFS_ISSPARE, msg));
3202168404Spjd
3203168404Spjd		verify(nvlist_lookup_uint64(tgt, ZPOOL_CONFIG_GUID,
3204168404Spjd		    &zc.zc_guid) == 0);
3205168404Spjd	}
3206168404Spjd
3207219089Spjd	zpool_get_rewind_policy(rewindnvl, &policy);
3208219089Spjd	zc.zc_cookie = policy.zrp_request;
3209219089Spjd
3210219089Spjd	if (zcmd_alloc_dst_nvlist(hdl, &zc, zhp->zpool_config_size * 2) != 0)
3211219089Spjd		return (-1);
3212219089Spjd
3213219089Spjd	if (zcmd_write_src_nvlist(hdl, &zc, rewindnvl) != 0)
3214219089Spjd		return (-1);
3215219089Spjd
3216219089Spjd	while ((error = zfs_ioctl(hdl, ZFS_IOC_CLEAR, &zc)) != 0 &&
3217219089Spjd	    errno == ENOMEM) {
3218219089Spjd		if (zcmd_expand_dst_nvlist(hdl, &zc) != 0) {
3219219089Spjd			zcmd_free_nvlists(&zc);
3220219089Spjd			return (-1);
3221219089Spjd		}
3222219089Spjd	}
3223219089Spjd
3224219089Spjd	if (!error || ((policy.zrp_request & ZPOOL_TRY_REWIND) &&
3225219089Spjd	    errno != EPERM && errno != EACCES)) {
3226219089Spjd		if (policy.zrp_request &
3227219089Spjd		    (ZPOOL_DO_REWIND | ZPOOL_TRY_REWIND)) {
3228219089Spjd			(void) zcmd_read_dst_nvlist(hdl, &zc, &nvi);
3229219089Spjd			zpool_rewind_exclaim(hdl, zc.zc_name,
3230219089Spjd			    ((policy.zrp_request & ZPOOL_TRY_REWIND) != 0),
3231219089Spjd			    nvi);
3232219089Spjd			nvlist_free(nvi);
3233219089Spjd		}
3234219089Spjd		zcmd_free_nvlists(&zc);
3235185029Spjd		return (0);
3236219089Spjd	}
3237185029Spjd
3238219089Spjd	zcmd_free_nvlists(&zc);
3239185029Spjd	return (zpool_standard_error(hdl, errno, msg));
3240185029Spjd}
3241185029Spjd
3242185029Spjd/*
3243185029Spjd * Similar to zpool_clear(), but takes a GUID (used by fmd).
3244185029Spjd */
3245185029Spjdint
3246185029Spjdzpool_vdev_clear(zpool_handle_t *zhp, uint64_t guid)
3247185029Spjd{
3248185029Spjd	zfs_cmd_t zc = { 0 };
3249185029Spjd	char msg[1024];
3250185029Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
3251185029Spjd
3252185029Spjd	(void) snprintf(msg, sizeof (msg),
3253185029Spjd	    dgettext(TEXT_DOMAIN, "cannot clear errors for %llx"),
3254185029Spjd	    guid);
3255185029Spjd
3256185029Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3257185029Spjd	zc.zc_guid = guid;
3258219089Spjd	zc.zc_cookie = ZPOOL_NO_REWIND;
3259185029Spjd
3260168404Spjd	if (ioctl(hdl->libzfs_fd, ZFS_IOC_CLEAR, &zc) == 0)
3261168404Spjd		return (0);
3262168404Spjd
3263168404Spjd	return (zpool_standard_error(hdl, errno, msg));
3264168404Spjd}
3265168404Spjd
3266168404Spjd/*
3267228103Smm * Change the GUID for a pool.
3268228103Smm */
3269228103Smmint
3270228103Smmzpool_reguid(zpool_handle_t *zhp)
3271228103Smm{
3272228103Smm	char msg[1024];
3273228103Smm	libzfs_handle_t *hdl = zhp->zpool_hdl;
3274228103Smm	zfs_cmd_t zc = { 0 };
3275228103Smm
3276228103Smm	(void) snprintf(msg, sizeof (msg),
3277228103Smm	    dgettext(TEXT_DOMAIN, "cannot reguid '%s'"), zhp->zpool_name);
3278228103Smm
3279228103Smm	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3280228103Smm	if (zfs_ioctl(hdl, ZFS_IOC_POOL_REGUID, &zc) == 0)
3281228103Smm		return (0);
3282228103Smm
3283228103Smm	return (zpool_standard_error(hdl, errno, msg));
3284228103Smm}
3285228103Smm
3286228103Smm/*
3287236155Smm * Reopen the pool.
3288236155Smm */
3289236155Smmint
3290236155Smmzpool_reopen(zpool_handle_t *zhp)
3291236155Smm{
3292236155Smm	zfs_cmd_t zc = { 0 };
3293236155Smm	char msg[1024];
3294236155Smm	libzfs_handle_t *hdl = zhp->zpool_hdl;
3295236155Smm
3296236155Smm	(void) snprintf(msg, sizeof (msg),
3297236155Smm	    dgettext(TEXT_DOMAIN, "cannot reopen '%s'"),
3298236155Smm	    zhp->zpool_name);
3299236155Smm
3300236155Smm	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3301236155Smm	if (zfs_ioctl(hdl, ZFS_IOC_POOL_REOPEN, &zc) == 0)
3302236155Smm		return (0);
3303236155Smm	return (zpool_standard_error(hdl, errno, msg));
3304236155Smm}
3305236155Smm
3306236155Smm/*
3307168404Spjd * Convert from a devid string to a path.
3308168404Spjd */
3309168404Spjdstatic char *
3310168404Spjddevid_to_path(char *devid_str)
3311168404Spjd{
3312168404Spjd	ddi_devid_t devid;
3313168404Spjd	char *minor;
3314168404Spjd	char *path;
3315168404Spjd	devid_nmlist_t *list = NULL;
3316168404Spjd	int ret;
3317168404Spjd
3318168404Spjd	if (devid_str_decode(devid_str, &devid, &minor) != 0)
3319168404Spjd		return (NULL);
3320168404Spjd
3321168404Spjd	ret = devid_deviceid_to_nmlist("/dev", devid, minor, &list);
3322168404Spjd
3323168404Spjd	devid_str_free(minor);
3324168404Spjd	devid_free(devid);
3325168404Spjd
3326168404Spjd	if (ret != 0)
3327168404Spjd		return (NULL);
3328168404Spjd
3329168404Spjd	if ((path = strdup(list[0].devname)) == NULL)
3330168404Spjd		return (NULL);
3331168404Spjd
3332168404Spjd	devid_free_nmlist(list);
3333168404Spjd
3334168404Spjd	return (path);
3335168404Spjd}
3336168404Spjd
3337168404Spjd/*
3338168404Spjd * Convert from a path to a devid string.
3339168404Spjd */
3340168404Spjdstatic char *
3341168404Spjdpath_to_devid(const char *path)
3342168404Spjd{
3343265821Smav#ifdef have_devid
3344168404Spjd	int fd;
3345168404Spjd	ddi_devid_t devid;
3346168404Spjd	char *minor, *ret;
3347168404Spjd
3348168404Spjd	if ((fd = open(path, O_RDONLY)) < 0)
3349168404Spjd		return (NULL);
3350168404Spjd
3351168404Spjd	minor = NULL;
3352168404Spjd	ret = NULL;
3353168404Spjd	if (devid_get(fd, &devid) == 0) {
3354168404Spjd		if (devid_get_minor_name(fd, &minor) == 0)
3355168404Spjd			ret = devid_str_encode(devid, minor);
3356168404Spjd		if (minor != NULL)
3357168404Spjd			devid_str_free(minor);
3358168404Spjd		devid_free(devid);
3359168404Spjd	}
3360168404Spjd	(void) close(fd);
3361168404Spjd
3362168404Spjd	return (ret);
3363265821Smav#else
3364265821Smav	return (NULL);
3365265821Smav#endif
3366168404Spjd}
3367168404Spjd
3368168404Spjd/*
3369168404Spjd * Issue the necessary ioctl() to update the stored path value for the vdev.  We
3370168404Spjd * ignore any failure here, since a common case is for an unprivileged user to
3371168404Spjd * type 'zpool status', and we'll display the correct information anyway.
3372168404Spjd */
3373168404Spjdstatic void
3374168404Spjdset_path(zpool_handle_t *zhp, nvlist_t *nv, const char *path)
3375168404Spjd{
3376168404Spjd	zfs_cmd_t zc = { 0 };
3377168404Spjd
3378168404Spjd	(void) strncpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3379168404Spjd	(void) strncpy(zc.zc_value, path, sizeof (zc.zc_value));
3380168404Spjd	verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID,
3381168404Spjd	    &zc.zc_guid) == 0);
3382168404Spjd
3383168404Spjd	(void) ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_VDEV_SETPATH, &zc);
3384168404Spjd}
3385168404Spjd
3386168404Spjd/*
3387168404Spjd * Given a vdev, return the name to display in iostat.  If the vdev has a path,
3388168404Spjd * we use that, stripping off any leading "/dev/dsk/"; if not, we use the type.
3389168404Spjd * We also check if this is a whole disk, in which case we strip off the
3390168404Spjd * trailing 's0' slice name.
3391168404Spjd *
3392168404Spjd * This routine is also responsible for identifying when disks have been
3393168404Spjd * reconfigured in a new location.  The kernel will have opened the device by
3394168404Spjd * devid, but the path will still refer to the old location.  To catch this, we
3395168404Spjd * first do a path -> devid translation (which is fast for the common case).  If
3396168404Spjd * the devid matches, we're done.  If not, we do a reverse devid -> path
3397168404Spjd * translation and issue the appropriate ioctl() to update the path of the vdev.
3398168404Spjd * If 'zhp' is NULL, then this is an exported pool, and we don't need to do any
3399168404Spjd * of these checks.
3400168404Spjd */
3401168404Spjdchar *
3402219089Spjdzpool_vdev_name(libzfs_handle_t *hdl, zpool_handle_t *zhp, nvlist_t *nv,
3403219089Spjd    boolean_t verbose)
3404168404Spjd{
3405168404Spjd	char *path, *devid;
3406168404Spjd	uint64_t value;
3407168404Spjd	char buf[64];
3408185029Spjd	vdev_stat_t *vs;
3409185029Spjd	uint_t vsc;
3410224170Sgibbs	int have_stats;
3411224170Sgibbs	int have_path;
3412168404Spjd
3413224170Sgibbs	have_stats = nvlist_lookup_uint64_array(nv, ZPOOL_CONFIG_VDEV_STATS,
3414224170Sgibbs	    (uint64_t **)&vs, &vsc) == 0;
3415224170Sgibbs	have_path = nvlist_lookup_string(nv, ZPOOL_CONFIG_PATH, &path) == 0;
3416224170Sgibbs
3417224170Sgibbs	/*
3418224170Sgibbs	 * If the device is not currently present, assume it will not
3419224170Sgibbs	 * come back at the same device path.  Display the device by GUID.
3420224170Sgibbs	 */
3421224170Sgibbs	if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_NOT_PRESENT, &value) == 0 ||
3422224170Sgibbs	    have_path && have_stats && vs->vs_state <= VDEV_STATE_CANT_OPEN) {
3423168404Spjd		verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_GUID,
3424168404Spjd		    &value) == 0);
3425168404Spjd		(void) snprintf(buf, sizeof (buf), "%llu",
3426168404Spjd		    (u_longlong_t)value);
3427168404Spjd		path = buf;
3428224170Sgibbs	} else if (have_path) {
3429168404Spjd
3430185029Spjd		/*
3431185029Spjd		 * If the device is dead (faulted, offline, etc) then don't
3432185029Spjd		 * bother opening it.  Otherwise we may be forcing the user to
3433185029Spjd		 * open a misbehaving device, which can have undesirable
3434185029Spjd		 * effects.
3435185029Spjd		 */
3436224170Sgibbs		if ((have_stats == 0 ||
3437185029Spjd		    vs->vs_state >= VDEV_STATE_DEGRADED) &&
3438185029Spjd		    zhp != NULL &&
3439168404Spjd		    nvlist_lookup_string(nv, ZPOOL_CONFIG_DEVID, &devid) == 0) {
3440168404Spjd			/*
3441168404Spjd			 * Determine if the current path is correct.
3442168404Spjd			 */
3443168404Spjd			char *newdevid = path_to_devid(path);
3444168404Spjd
3445168404Spjd			if (newdevid == NULL ||
3446168404Spjd			    strcmp(devid, newdevid) != 0) {
3447168404Spjd				char *newpath;
3448168404Spjd
3449168404Spjd				if ((newpath = devid_to_path(devid)) != NULL) {
3450168404Spjd					/*
3451168404Spjd					 * Update the path appropriately.
3452168404Spjd					 */
3453168404Spjd					set_path(zhp, nv, newpath);
3454168404Spjd					if (nvlist_add_string(nv,
3455168404Spjd					    ZPOOL_CONFIG_PATH, newpath) == 0)
3456168404Spjd						verify(nvlist_lookup_string(nv,
3457168404Spjd						    ZPOOL_CONFIG_PATH,
3458168404Spjd						    &path) == 0);
3459168404Spjd					free(newpath);
3460168404Spjd				}
3461168404Spjd			}
3462168404Spjd
3463168404Spjd			if (newdevid)
3464168404Spjd				devid_str_free(newdevid);
3465168404Spjd		}
3466168404Spjd
3467219089Spjd#ifdef sun
3468219089Spjd		if (strncmp(path, "/dev/dsk/", 9) == 0)
3469219089Spjd			path += 9;
3470168404Spjd
3471168404Spjd		if (nvlist_lookup_uint64(nv, ZPOOL_CONFIG_WHOLE_DISK,
3472168404Spjd		    &value) == 0 && value) {
3473219089Spjd			int pathlen = strlen(path);
3474168404Spjd			char *tmp = zfs_strdup(hdl, path);
3475219089Spjd
3476219089Spjd			/*
3477219089Spjd			 * If it starts with c#, and ends with "s0", chop
3478219089Spjd			 * the "s0" off, or if it ends with "s0/old", remove
3479219089Spjd			 * the "s0" from the middle.
3480219089Spjd			 */
3481219089Spjd			if (CTD_CHECK(tmp)) {
3482219089Spjd				if (strcmp(&tmp[pathlen - 2], "s0") == 0) {
3483219089Spjd					tmp[pathlen - 2] = '\0';
3484219089Spjd				} else if (pathlen > 6 &&
3485219089Spjd				    strcmp(&tmp[pathlen - 6], "s0/old") == 0) {
3486219089Spjd					(void) strcpy(&tmp[pathlen - 6],
3487219089Spjd					    "/old");
3488219089Spjd				}
3489219089Spjd			}
3490168404Spjd			return (tmp);
3491168404Spjd		}
3492219089Spjd#else	/* !sun */
3493219089Spjd		if (strncmp(path, _PATH_DEV, sizeof(_PATH_DEV) - 1) == 0)
3494219089Spjd			path += sizeof(_PATH_DEV) - 1;
3495219089Spjd#endif	/* !sun */
3496168404Spjd	} else {
3497168404Spjd		verify(nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE, &path) == 0);
3498168404Spjd
3499168404Spjd		/*
3500168404Spjd		 * If it's a raidz device, we need to stick in the parity level.
3501168404Spjd		 */
3502168404Spjd		if (strcmp(path, VDEV_TYPE_RAIDZ) == 0) {
3503168404Spjd			verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_NPARITY,
3504168404Spjd			    &value) == 0);
3505168404Spjd			(void) snprintf(buf, sizeof (buf), "%s%llu", path,
3506168404Spjd			    (u_longlong_t)value);
3507168404Spjd			path = buf;
3508168404Spjd		}
3509219089Spjd
3510219089Spjd		/*
3511219089Spjd		 * We identify each top-level vdev by using a <type-id>
3512219089Spjd		 * naming convention.
3513219089Spjd		 */
3514219089Spjd		if (verbose) {
3515219089Spjd			uint64_t id;
3516219089Spjd
3517219089Spjd			verify(nvlist_lookup_uint64(nv, ZPOOL_CONFIG_ID,
3518219089Spjd			    &id) == 0);
3519219089Spjd			(void) snprintf(buf, sizeof (buf), "%s-%llu", path,
3520219089Spjd			    (u_longlong_t)id);
3521219089Spjd			path = buf;
3522219089Spjd		}
3523168404Spjd	}
3524168404Spjd
3525168404Spjd	return (zfs_strdup(hdl, path));
3526168404Spjd}
3527168404Spjd
3528168404Spjdstatic int
3529168404Spjdzbookmark_compare(const void *a, const void *b)
3530168404Spjd{
3531268123Sdelphij	return (memcmp(a, b, sizeof (zbookmark_phys_t)));
3532168404Spjd}
3533168404Spjd
3534168404Spjd/*
3535168404Spjd * Retrieve the persistent error log, uniquify the members, and return to the
3536168404Spjd * caller.
3537168404Spjd */
3538168404Spjdint
3539168404Spjdzpool_get_errlog(zpool_handle_t *zhp, nvlist_t **nverrlistp)
3540168404Spjd{
3541168404Spjd	zfs_cmd_t zc = { 0 };
3542168404Spjd	uint64_t count;
3543268123Sdelphij	zbookmark_phys_t *zb = NULL;
3544168404Spjd	int i;
3545168404Spjd
3546168404Spjd	/*
3547168404Spjd	 * Retrieve the raw error list from the kernel.  If the number of errors
3548168404Spjd	 * has increased, allocate more space and continue until we get the
3549168404Spjd	 * entire list.
3550168404Spjd	 */
3551168404Spjd	verify(nvlist_lookup_uint64(zhp->zpool_config, ZPOOL_CONFIG_ERRCOUNT,
3552168404Spjd	    &count) == 0);
3553185029Spjd	if (count == 0)
3554185029Spjd		return (0);
3555168404Spjd	if ((zc.zc_nvlist_dst = (uintptr_t)zfs_alloc(zhp->zpool_hdl,
3556268123Sdelphij	    count * sizeof (zbookmark_phys_t))) == (uintptr_t)NULL)
3557168404Spjd		return (-1);
3558168404Spjd	zc.zc_nvlist_dst_size = count;
3559168404Spjd	(void) strcpy(zc.zc_name, zhp->zpool_name);
3560168404Spjd	for (;;) {
3561168404Spjd		if (ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_ERROR_LOG,
3562168404Spjd		    &zc) != 0) {
3563168404Spjd			free((void *)(uintptr_t)zc.zc_nvlist_dst);
3564168404Spjd			if (errno == ENOMEM) {
3565268123Sdelphij				void *dst;
3566268123Sdelphij
3567168404Spjd				count = zc.zc_nvlist_dst_size;
3568268123Sdelphij				dst = zfs_alloc(zhp->zpool_hdl, count *
3569268123Sdelphij				    sizeof (zbookmark_phys_t));
3570268123Sdelphij				if (dst == NULL)
3571168404Spjd					return (-1);
3572268123Sdelphij				zc.zc_nvlist_dst = (uintptr_t)dst;
3573168404Spjd			} else {
3574168404Spjd				return (-1);
3575168404Spjd			}
3576168404Spjd		} else {
3577168404Spjd			break;
3578168404Spjd		}
3579168404Spjd	}
3580168404Spjd
3581168404Spjd	/*
3582168404Spjd	 * Sort the resulting bookmarks.  This is a little confusing due to the
3583168404Spjd	 * implementation of ZFS_IOC_ERROR_LOG.  The bookmarks are copied last
3584168404Spjd	 * to first, and 'zc_nvlist_dst_size' indicates the number of boomarks
3585168404Spjd	 * _not_ copied as part of the process.  So we point the start of our
3586168404Spjd	 * array appropriate and decrement the total number of elements.
3587168404Spjd	 */
3588268123Sdelphij	zb = ((zbookmark_phys_t *)(uintptr_t)zc.zc_nvlist_dst) +
3589168404Spjd	    zc.zc_nvlist_dst_size;
3590168404Spjd	count -= zc.zc_nvlist_dst_size;
3591168404Spjd
3592268123Sdelphij	qsort(zb, count, sizeof (zbookmark_phys_t), zbookmark_compare);
3593168404Spjd
3594168404Spjd	verify(nvlist_alloc(nverrlistp, 0, KM_SLEEP) == 0);
3595168404Spjd
3596168404Spjd	/*
3597168404Spjd	 * Fill in the nverrlistp with nvlist's of dataset and object numbers.
3598168404Spjd	 */
3599168404Spjd	for (i = 0; i < count; i++) {
3600168404Spjd		nvlist_t *nv;
3601168404Spjd
3602168404Spjd		/* ignoring zb_blkid and zb_level for now */
3603168404Spjd		if (i > 0 && zb[i-1].zb_objset == zb[i].zb_objset &&
3604168404Spjd		    zb[i-1].zb_object == zb[i].zb_object)
3605168404Spjd			continue;
3606168404Spjd
3607168404Spjd		if (nvlist_alloc(&nv, NV_UNIQUE_NAME, KM_SLEEP) != 0)
3608168404Spjd			goto nomem;
3609168404Spjd		if (nvlist_add_uint64(nv, ZPOOL_ERR_DATASET,
3610168404Spjd		    zb[i].zb_objset) != 0) {
3611168404Spjd			nvlist_free(nv);
3612168404Spjd			goto nomem;
3613168404Spjd		}
3614168404Spjd		if (nvlist_add_uint64(nv, ZPOOL_ERR_OBJECT,
3615168404Spjd		    zb[i].zb_object) != 0) {
3616168404Spjd			nvlist_free(nv);
3617168404Spjd			goto nomem;
3618168404Spjd		}
3619168404Spjd		if (nvlist_add_nvlist(*nverrlistp, "ejk", nv) != 0) {
3620168404Spjd			nvlist_free(nv);
3621168404Spjd			goto nomem;
3622168404Spjd		}
3623168404Spjd		nvlist_free(nv);
3624168404Spjd	}
3625168404Spjd
3626168404Spjd	free((void *)(uintptr_t)zc.zc_nvlist_dst);
3627168404Spjd	return (0);
3628168404Spjd
3629168404Spjdnomem:
3630168404Spjd	free((void *)(uintptr_t)zc.zc_nvlist_dst);
3631168404Spjd	return (no_memory(zhp->zpool_hdl));
3632168404Spjd}
3633168404Spjd
3634168404Spjd/*
3635168404Spjd * Upgrade a ZFS pool to the latest on-disk version.
3636168404Spjd */
3637168404Spjdint
3638185029Spjdzpool_upgrade(zpool_handle_t *zhp, uint64_t new_version)
3639168404Spjd{
3640168404Spjd	zfs_cmd_t zc = { 0 };
3641168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
3642168404Spjd
3643168404Spjd	(void) strcpy(zc.zc_name, zhp->zpool_name);
3644185029Spjd	zc.zc_cookie = new_version;
3645185029Spjd
3646185029Spjd	if (zfs_ioctl(hdl, ZFS_IOC_POOL_UPGRADE, &zc) != 0)
3647168404Spjd		return (zpool_standard_error_fmt(hdl, errno,
3648168404Spjd		    dgettext(TEXT_DOMAIN, "cannot upgrade '%s'"),
3649168404Spjd		    zhp->zpool_name));
3650168404Spjd	return (0);
3651168404Spjd}
3652168404Spjd
3653168404Spjdvoid
3654248571Smmzfs_save_arguments(int argc, char **argv, char *string, int len)
3655168404Spjd{
3656248571Smm	(void) strlcpy(string, basename(argv[0]), len);
3657248571Smm	for (int i = 1; i < argc; i++) {
3658248571Smm		(void) strlcat(string, " ", len);
3659248571Smm		(void) strlcat(string, argv[i], len);
3660168404Spjd	}
3661185029Spjd}
3662168404Spjd
3663185029Spjdint
3664248571Smmzpool_log_history(libzfs_handle_t *hdl, const char *message)
3665185029Spjd{
3666248571Smm	zfs_cmd_t zc = { 0 };
3667248571Smm	nvlist_t *args;
3668248571Smm	int err;
3669168404Spjd
3670248571Smm	args = fnvlist_alloc();
3671248571Smm	fnvlist_add_string(args, "message", message);
3672248571Smm	err = zcmd_write_src_nvlist(hdl, &zc, args);
3673248571Smm	if (err == 0)
3674248571Smm		err = ioctl(hdl->libzfs_fd, ZFS_IOC_LOG_HISTORY, &zc);
3675248571Smm	nvlist_free(args);
3676248571Smm	zcmd_free_nvlists(&zc);
3677248571Smm	return (err);
3678168404Spjd}
3679168404Spjd
3680168404Spjd/*
3681168404Spjd * Perform ioctl to get some command history of a pool.
3682168404Spjd *
3683168404Spjd * 'buf' is the buffer to fill up to 'len' bytes.  'off' is the
3684168404Spjd * logical offset of the history buffer to start reading from.
3685168404Spjd *
3686168404Spjd * Upon return, 'off' is the next logical offset to read from and
3687168404Spjd * 'len' is the actual amount of bytes read into 'buf'.
3688168404Spjd */
3689168404Spjdstatic int
3690168404Spjdget_history(zpool_handle_t *zhp, char *buf, uint64_t *off, uint64_t *len)
3691168404Spjd{
3692168404Spjd	zfs_cmd_t zc = { 0 };
3693168404Spjd	libzfs_handle_t *hdl = zhp->zpool_hdl;
3694168404Spjd
3695168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3696168404Spjd
3697168404Spjd	zc.zc_history = (uint64_t)(uintptr_t)buf;
3698168404Spjd	zc.zc_history_len = *len;
3699168404Spjd	zc.zc_history_offset = *off;
3700168404Spjd
3701168404Spjd	if (ioctl(hdl->libzfs_fd, ZFS_IOC_POOL_GET_HISTORY, &zc) != 0) {
3702168404Spjd		switch (errno) {
3703168404Spjd		case EPERM:
3704168404Spjd			return (zfs_error_fmt(hdl, EZFS_PERM,
3705168404Spjd			    dgettext(TEXT_DOMAIN,
3706168404Spjd			    "cannot show history for pool '%s'"),
3707168404Spjd			    zhp->zpool_name));
3708168404Spjd		case ENOENT:
3709168404Spjd			return (zfs_error_fmt(hdl, EZFS_NOHISTORY,
3710168404Spjd			    dgettext(TEXT_DOMAIN, "cannot get history for pool "
3711168404Spjd			    "'%s'"), zhp->zpool_name));
3712168404Spjd		case ENOTSUP:
3713168404Spjd			return (zfs_error_fmt(hdl, EZFS_BADVERSION,
3714168404Spjd			    dgettext(TEXT_DOMAIN, "cannot get history for pool "
3715168404Spjd			    "'%s', pool must be upgraded"), zhp->zpool_name));
3716168404Spjd		default:
3717168404Spjd			return (zpool_standard_error_fmt(hdl, errno,
3718168404Spjd			    dgettext(TEXT_DOMAIN,
3719168404Spjd			    "cannot get history for '%s'"), zhp->zpool_name));
3720168404Spjd		}
3721168404Spjd	}
3722168404Spjd
3723168404Spjd	*len = zc.zc_history_len;
3724168404Spjd	*off = zc.zc_history_offset;
3725168404Spjd
3726168404Spjd	return (0);
3727168404Spjd}
3728168404Spjd
3729168404Spjd/*
3730168404Spjd * Process the buffer of nvlists, unpacking and storing each nvlist record
3731168404Spjd * into 'records'.  'leftover' is set to the number of bytes that weren't
3732168404Spjd * processed as there wasn't a complete record.
3733168404Spjd */
3734219089Spjdint
3735168404Spjdzpool_history_unpack(char *buf, uint64_t bytes_read, uint64_t *leftover,
3736168404Spjd    nvlist_t ***records, uint_t *numrecords)
3737168404Spjd{
3738168404Spjd	uint64_t reclen;
3739168404Spjd	nvlist_t *nv;
3740168404Spjd	int i;
3741168404Spjd
3742168404Spjd	while (bytes_read > sizeof (reclen)) {
3743168404Spjd
3744168404Spjd		/* get length of packed record (stored as little endian) */
3745168404Spjd		for (i = 0, reclen = 0; i < sizeof (reclen); i++)
3746168404Spjd			reclen += (uint64_t)(((uchar_t *)buf)[i]) << (8*i);
3747168404Spjd
3748168404Spjd		if (bytes_read < sizeof (reclen) + reclen)
3749168404Spjd			break;
3750168404Spjd
3751168404Spjd		/* unpack record */
3752168404Spjd		if (nvlist_unpack(buf + sizeof (reclen), reclen, &nv, 0) != 0)
3753168404Spjd			return (ENOMEM);
3754168404Spjd		bytes_read -= sizeof (reclen) + reclen;
3755168404Spjd		buf += sizeof (reclen) + reclen;
3756168404Spjd
3757168404Spjd		/* add record to nvlist array */
3758168404Spjd		(*numrecords)++;
3759168404Spjd		if (ISP2(*numrecords + 1)) {
3760168404Spjd			*records = realloc(*records,
3761168404Spjd			    *numrecords * 2 * sizeof (nvlist_t *));
3762168404Spjd		}
3763168404Spjd		(*records)[*numrecords - 1] = nv;
3764168404Spjd	}
3765168404Spjd
3766168404Spjd	*leftover = bytes_read;
3767168404Spjd	return (0);
3768168404Spjd}
3769168404Spjd
3770264467Sdelphij/* from spa_history.c: spa_history_create_obj() */
3771264467Sdelphij#define	HIS_BUF_LEN_DEF	(128 << 10)
3772264467Sdelphij#define	HIS_BUF_LEN_MAX	(1 << 30)
3773168404Spjd
3774168404Spjd/*
3775168404Spjd * Retrieve the command history of a pool.
3776168404Spjd */
3777168404Spjdint
3778168404Spjdzpool_get_history(zpool_handle_t *zhp, nvlist_t **nvhisp)
3779168404Spjd{
3780264467Sdelphij	char *buf = NULL;
3781264467Sdelphij	uint64_t bufsize = HIS_BUF_LEN_DEF;
3782168404Spjd	uint64_t off = 0;
3783168404Spjd	nvlist_t **records = NULL;
3784168404Spjd	uint_t numrecords = 0;
3785168404Spjd	int err, i;
3786168404Spjd
3787264467Sdelphij	if ((buf = malloc(bufsize)) == NULL)
3788264467Sdelphij		return (ENOMEM);
3789168404Spjd	do {
3790264467Sdelphij		uint64_t bytes_read = bufsize;
3791168404Spjd		uint64_t leftover;
3792168404Spjd
3793168404Spjd		if ((err = get_history(zhp, buf, &off, &bytes_read)) != 0)
3794168404Spjd			break;
3795168404Spjd
3796168404Spjd		/* if nothing else was read in, we're at EOF, just return */
3797264467Sdelphij		if (bytes_read == 0)
3798168404Spjd			break;
3799168404Spjd
3800168404Spjd		if ((err = zpool_history_unpack(buf, bytes_read,
3801168404Spjd		    &leftover, &records, &numrecords)) != 0)
3802168404Spjd			break;
3803168404Spjd		off -= leftover;
3804168404Spjd
3805264467Sdelphij		/*
3806264467Sdelphij		 * If the history block is too big, double the buffer
3807264467Sdelphij		 * size and try again.
3808264467Sdelphij		 */
3809264467Sdelphij		if (leftover == bytes_read) {
3810264467Sdelphij			free(buf);
3811264467Sdelphij			buf = NULL;
3812264467Sdelphij
3813264467Sdelphij			bufsize <<= 1;
3814264467Sdelphij			if ((bufsize >= HIS_BUF_LEN_MAX) ||
3815264467Sdelphij			    ((buf = malloc(bufsize)) == NULL)) {
3816264467Sdelphij				err = ENOMEM;
3817264467Sdelphij				break;
3818264467Sdelphij			}
3819264467Sdelphij		}
3820264467Sdelphij
3821168404Spjd		/* CONSTCOND */
3822168404Spjd	} while (1);
3823264467Sdelphij	free(buf);
3824168404Spjd
3825168404Spjd	if (!err) {
3826168404Spjd		verify(nvlist_alloc(nvhisp, NV_UNIQUE_NAME, 0) == 0);
3827168404Spjd		verify(nvlist_add_nvlist_array(*nvhisp, ZPOOL_HIST_RECORD,
3828168404Spjd		    records, numrecords) == 0);
3829168404Spjd	}
3830168404Spjd	for (i = 0; i < numrecords; i++)
3831168404Spjd		nvlist_free(records[i]);
3832168404Spjd	free(records);
3833168404Spjd
3834168404Spjd	return (err);
3835168404Spjd}
3836168404Spjd
3837168404Spjdvoid
3838168404Spjdzpool_obj_to_path(zpool_handle_t *zhp, uint64_t dsobj, uint64_t obj,
3839168404Spjd    char *pathname, size_t len)
3840168404Spjd{
3841168404Spjd	zfs_cmd_t zc = { 0 };
3842168404Spjd	boolean_t mounted = B_FALSE;
3843168404Spjd	char *mntpnt = NULL;
3844168404Spjd	char dsname[MAXNAMELEN];
3845168404Spjd
3846168404Spjd	if (dsobj == 0) {
3847168404Spjd		/* special case for the MOS */
3848168404Spjd		(void) snprintf(pathname, len, "<metadata>:<0x%llx>", obj);
3849168404Spjd		return;
3850168404Spjd	}
3851168404Spjd
3852168404Spjd	/* get the dataset's name */
3853168404Spjd	(void) strlcpy(zc.zc_name, zhp->zpool_name, sizeof (zc.zc_name));
3854168404Spjd	zc.zc_obj = dsobj;
3855168404Spjd	if (ioctl(zhp->zpool_hdl->libzfs_fd,
3856168404Spjd	    ZFS_IOC_DSOBJ_TO_DSNAME, &zc) != 0) {
3857168404Spjd		/* just write out a path of two object numbers */
3858168404Spjd		(void) snprintf(pathname, len, "<0x%llx>:<0x%llx>",
3859168404Spjd		    dsobj, obj);
3860168404Spjd		return;
3861168404Spjd	}
3862168404Spjd	(void) strlcpy(dsname, zc.zc_value, sizeof (dsname));
3863168404Spjd
3864168404Spjd	/* find out if the dataset is mounted */
3865168404Spjd	mounted = is_mounted(zhp->zpool_hdl, dsname, &mntpnt);
3866168404Spjd
3867168404Spjd	/* get the corrupted object's path */
3868168404Spjd	(void) strlcpy(zc.zc_name, dsname, sizeof (zc.zc_name));
3869168404Spjd	zc.zc_obj = obj;
3870168404Spjd	if (ioctl(zhp->zpool_hdl->libzfs_fd, ZFS_IOC_OBJ_TO_PATH,
3871168404Spjd	    &zc) == 0) {
3872168404Spjd		if (mounted) {
3873168404Spjd			(void) snprintf(pathname, len, "%s%s", mntpnt,
3874168404Spjd			    zc.zc_value);
3875168404Spjd		} else {
3876168404Spjd			(void) snprintf(pathname, len, "%s:%s",
3877168404Spjd			    dsname, zc.zc_value);
3878168404Spjd		}
3879168404Spjd	} else {
3880168404Spjd		(void) snprintf(pathname, len, "%s:<0x%llx>", dsname, obj);
3881168404Spjd	}
3882168404Spjd	free(mntpnt);
3883168404Spjd}
3884168404Spjd
3885219089Spjd#ifdef sun
3886185029Spjd/*
3887185029Spjd * Read the EFI label from the config, if a label does not exist then
3888185029Spjd * pass back the error to the caller. If the caller has passed a non-NULL
3889185029Spjd * diskaddr argument then we set it to the starting address of the EFI
3890185029Spjd * partition.
3891185029Spjd */
3892185029Spjdstatic int
3893185029Spjdread_efi_label(nvlist_t *config, diskaddr_t *sb)
3894168404Spjd{
3895185029Spjd	char *path;
3896185029Spjd	int fd;
3897185029Spjd	char diskname[MAXPATHLEN];
3898185029Spjd	int err = -1;
3899168404Spjd
3900185029Spjd	if (nvlist_lookup_string(config, ZPOOL_CONFIG_PATH, &path) != 0)
3901185029Spjd		return (err);
3902168404Spjd
3903185029Spjd	(void) snprintf(diskname, sizeof (diskname), "%s%s", RDISK_ROOT,
3904185029Spjd	    strrchr(path, '/'));
3905185029Spjd	if ((fd = open(diskname, O_RDONLY|O_NDELAY)) >= 0) {
3906185029Spjd		struct dk_gpt *vtoc;
3907185029Spjd
3908185029Spjd		if ((err = efi_alloc_and_read(fd, &vtoc)) >= 0) {
3909185029Spjd			if (sb != NULL)
3910185029Spjd				*sb = vtoc->efi_parts[0].p_start;
3911185029Spjd			efi_free(vtoc);
3912185029Spjd		}
3913185029Spjd		(void) close(fd);
3914168404Spjd	}
3915185029Spjd	return (err);
3916185029Spjd}
3917168404Spjd
3918185029Spjd/*
3919185029Spjd * determine where a partition starts on a disk in the current
3920185029Spjd * configuration
3921185029Spjd */
3922185029Spjdstatic diskaddr_t
3923185029Spjdfind_start_block(nvlist_t *config)
3924185029Spjd{
3925185029Spjd	nvlist_t **child;
3926185029Spjd	uint_t c, children;
3927185029Spjd	diskaddr_t sb = MAXOFFSET_T;
3928185029Spjd	uint64_t wholedisk;
3929168404Spjd
3930185029Spjd	if (nvlist_lookup_nvlist_array(config,
3931185029Spjd	    ZPOOL_CONFIG_CHILDREN, &child, &children) != 0) {
3932185029Spjd		if (nvlist_lookup_uint64(config,
3933185029Spjd		    ZPOOL_CONFIG_WHOLE_DISK,
3934185029Spjd		    &wholedisk) != 0 || !wholedisk) {
3935185029Spjd			return (MAXOFFSET_T);
3936185029Spjd		}
3937185029Spjd		if (read_efi_label(config, &sb) < 0)
3938185029Spjd			sb = MAXOFFSET_T;
3939185029Spjd		return (sb);
3940168404Spjd	}
3941168404Spjd
3942185029Spjd	for (c = 0; c < children; c++) {
3943185029Spjd		sb = find_start_block(child[c]);
3944185029Spjd		if (sb != MAXOFFSET_T) {
3945185029Spjd			return (sb);
3946185029Spjd		}
3947168404Spjd	}
3948185029Spjd	return (MAXOFFSET_T);
3949185029Spjd}
3950185029Spjd#endif /* sun */
3951168404Spjd
3952185029Spjd/*
3953185029Spjd * Label an individual disk.  The name provided is the short name,
3954185029Spjd * stripped of any leading /dev path.
3955185029Spjd */
3956185029Spjdint
3957224169Sgibbszpool_label_disk(libzfs_handle_t *hdl, zpool_handle_t *zhp, const char *name)
3958185029Spjd{
3959219089Spjd#ifdef sun
3960185029Spjd	char path[MAXPATHLEN];
3961185029Spjd	struct dk_gpt *vtoc;
3962185029Spjd	int fd;
3963185029Spjd	size_t resv = EFI_MIN_RESV_SIZE;
3964185029Spjd	uint64_t slice_size;
3965185029Spjd	diskaddr_t start_block;
3966185029Spjd	char errbuf[1024];
3967168404Spjd
3968185029Spjd	/* prepare an error message just in case */
3969185029Spjd	(void) snprintf(errbuf, sizeof (errbuf),
3970185029Spjd	    dgettext(TEXT_DOMAIN, "cannot label '%s'"), name);
3971168404Spjd
3972185029Spjd	if (zhp) {
3973185029Spjd		nvlist_t *nvroot;
3974168404Spjd
3975236155Smm		if (zpool_is_bootable(zhp)) {
3976209962Smm			zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
3977209962Smm			    "EFI labeled devices are not supported on root "
3978209962Smm			    "pools."));
3979209962Smm			return (zfs_error(hdl, EZFS_POOL_NOTSUP, errbuf));
3980209962Smm		}
3981209962Smm
3982185029Spjd		verify(nvlist_lookup_nvlist(zhp->zpool_config,
3983185029Spjd		    ZPOOL_CONFIG_VDEV_TREE, &nvroot) == 0);
3984168404Spjd
3985185029Spjd		if (zhp->zpool_start_block == 0)
3986185029Spjd			start_block = find_start_block(nvroot);
3987185029Spjd		else
3988185029Spjd			start_block = zhp->zpool_start_block;
3989185029Spjd		zhp->zpool_start_block = start_block;
3990185029Spjd	} else {
3991185029Spjd		/* new pool */
3992185029Spjd		start_block = NEW_START_BLOCK;
3993185029Spjd	}
3994168404Spjd
3995185029Spjd	(void) snprintf(path, sizeof (path), "%s/%s%s", RDISK_ROOT, name,
3996185029Spjd	    BACKUP_SLICE);
3997168404Spjd
3998185029Spjd	if ((fd = open(path, O_RDWR | O_NDELAY)) < 0) {
3999185029Spjd		/*
4000185029Spjd		 * This shouldn't happen.  We've long since verified that this
4001185029Spjd		 * is a valid device.
4002185029Spjd		 */
4003185029Spjd		zfs_error_aux(hdl,
4004185029Spjd		    dgettext(TEXT_DOMAIN, "unable to open device"));
4005185029Spjd		return (zfs_error(hdl, EZFS_OPENFAILED, errbuf));
4006185029Spjd	}
4007168404Spjd
4008185029Spjd	if (efi_alloc_and_init(fd, EFI_NUMPAR, &vtoc) != 0) {
4009185029Spjd		/*
4010185029Spjd		 * The only way this can fail is if we run out of memory, or we
4011185029Spjd		 * were unable to read the disk's capacity
4012185029Spjd		 */
4013185029Spjd		if (errno == ENOMEM)
4014185029Spjd			(void) no_memory(hdl);
4015168404Spjd
4016185029Spjd		(void) close(fd);
4017185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
4018185029Spjd		    "unable to read disk capacity"), name);
4019185029Spjd
4020185029Spjd		return (zfs_error(hdl, EZFS_NOCAP, errbuf));
4021168404Spjd	}
4022168404Spjd
4023185029Spjd	slice_size = vtoc->efi_last_u_lba + 1;
4024185029Spjd	slice_size -= EFI_MIN_RESV_SIZE;
4025185029Spjd	if (start_block == MAXOFFSET_T)
4026185029Spjd		start_block = NEW_START_BLOCK;
4027185029Spjd	slice_size -= start_block;
4028168404Spjd
4029185029Spjd	vtoc->efi_parts[0].p_start = start_block;
4030185029Spjd	vtoc->efi_parts[0].p_size = slice_size;
4031185029Spjd
4032168404Spjd	/*
4033185029Spjd	 * Why we use V_USR: V_BACKUP confuses users, and is considered
4034185029Spjd	 * disposable by some EFI utilities (since EFI doesn't have a backup
4035185029Spjd	 * slice).  V_UNASSIGNED is supposed to be used only for zero size
4036185029Spjd	 * partitions, and efi_write() will fail if we use it.  V_ROOT, V_BOOT,
4037185029Spjd	 * etc. were all pretty specific.  V_USR is as close to reality as we
4038185029Spjd	 * can get, in the absence of V_OTHER.
4039168404Spjd	 */
4040185029Spjd	vtoc->efi_parts[0].p_tag = V_USR;
4041185029Spjd	(void) strcpy(vtoc->efi_parts[0].p_name, "zfs");
4042168404Spjd
4043185029Spjd	vtoc->efi_parts[8].p_start = slice_size + start_block;
4044185029Spjd	vtoc->efi_parts[8].p_size = resv;
4045185029Spjd	vtoc->efi_parts[8].p_tag = V_RESERVED;
4046168404Spjd
4047185029Spjd	if (efi_write(fd, vtoc) != 0) {
4048185029Spjd		/*
4049185029Spjd		 * Some block drivers (like pcata) may not support EFI
4050185029Spjd		 * GPT labels.  Print out a helpful error message dir-
4051185029Spjd		 * ecting the user to manually label the disk and give
4052185029Spjd		 * a specific slice.
4053185029Spjd		 */
4054185029Spjd		(void) close(fd);
4055185029Spjd		efi_free(vtoc);
4056168404Spjd
4057185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
4058185029Spjd		    "try using fdisk(1M) and then provide a specific slice"));
4059185029Spjd		return (zfs_error(hdl, EZFS_LABELFAILED, errbuf));
4060168404Spjd	}
4061185029Spjd
4062185029Spjd	(void) close(fd);
4063185029Spjd	efi_free(vtoc);
4064185029Spjd#endif /* sun */
4065168404Spjd	return (0);
4066168404Spjd}
4067168404Spjd
4068185029Spjdstatic boolean_t
4069185029Spjdsupported_dump_vdev_type(libzfs_handle_t *hdl, nvlist_t *config, char *errbuf)
4070168404Spjd{
4071185029Spjd	char *type;
4072185029Spjd	nvlist_t **child;
4073185029Spjd	uint_t children, c;
4074185029Spjd
4075185029Spjd	verify(nvlist_lookup_string(config, ZPOOL_CONFIG_TYPE, &type) == 0);
4076255750Sdelphij	if (strcmp(type, VDEV_TYPE_FILE) == 0 ||
4077219089Spjd	    strcmp(type, VDEV_TYPE_HOLE) == 0 ||
4078185029Spjd	    strcmp(type, VDEV_TYPE_MISSING) == 0) {
4079185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
4080185029Spjd		    "vdev type '%s' is not supported"), type);
4081185029Spjd		(void) zfs_error(hdl, EZFS_VDEVNOTSUP, errbuf);
4082185029Spjd		return (B_FALSE);
4083185029Spjd	}
4084185029Spjd	if (nvlist_lookup_nvlist_array(config, ZPOOL_CONFIG_CHILDREN,
4085185029Spjd	    &child, &children) == 0) {
4086185029Spjd		for (c = 0; c < children; c++) {
4087185029Spjd			if (!supported_dump_vdev_type(hdl, child[c], errbuf))
4088185029Spjd				return (B_FALSE);
4089185029Spjd		}
4090185029Spjd	}
4091185029Spjd	return (B_TRUE);
4092168404Spjd}
4093168404Spjd
4094185029Spjd/*
4095255750Sdelphij * Check if this zvol is allowable for use as a dump device; zero if
4096255750Sdelphij * it is, > 0 if it isn't, < 0 if it isn't a zvol.
4097255750Sdelphij *
4098255750Sdelphij * Allowable storage configurations include mirrors, all raidz variants, and
4099255750Sdelphij * pools with log, cache, and spare devices.  Pools which are backed by files or
4100255750Sdelphij * have missing/hole vdevs are not suitable.
4101185029Spjd */
4102168404Spjdint
4103185029Spjdzvol_check_dump_config(char *arg)
4104168404Spjd{
4105185029Spjd	zpool_handle_t *zhp = NULL;
4106185029Spjd	nvlist_t *config, *nvroot;
4107185029Spjd	char *p, *volname;
4108185029Spjd	nvlist_t **top;
4109185029Spjd	uint_t toplevels;
4110185029Spjd	libzfs_handle_t *hdl;
4111185029Spjd	char errbuf[1024];
4112185029Spjd	char poolname[ZPOOL_MAXNAMELEN];
4113185029Spjd	int pathlen = strlen(ZVOL_FULL_DEV_DIR);
4114185029Spjd	int ret = 1;
4115168404Spjd
4116185029Spjd	if (strncmp(arg, ZVOL_FULL_DEV_DIR, pathlen)) {
4117168404Spjd		return (-1);
4118185029Spjd	}
4119168404Spjd
4120185029Spjd	(void) snprintf(errbuf, sizeof (errbuf), dgettext(TEXT_DOMAIN,
4121185029Spjd	    "dump is not supported on device '%s'"), arg);
4122168404Spjd
4123185029Spjd	if ((hdl = libzfs_init()) == NULL)
4124185029Spjd		return (1);
4125185029Spjd	libzfs_print_on_error(hdl, B_TRUE);
4126168404Spjd
4127185029Spjd	volname = arg + pathlen;
4128185029Spjd
4129185029Spjd	/* check the configuration of the pool */
4130185029Spjd	if ((p = strchr(volname, '/')) == NULL) {
4131185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
4132185029Spjd		    "malformed dataset name"));
4133185029Spjd		(void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf);
4134185029Spjd		return (1);
4135185029Spjd	} else if (p - volname >= ZFS_MAXNAMELEN) {
4136185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
4137185029Spjd		    "dataset name is too long"));
4138185029Spjd		(void) zfs_error(hdl, EZFS_NAMETOOLONG, errbuf);
4139185029Spjd		return (1);
4140185029Spjd	} else {
4141185029Spjd		(void) strncpy(poolname, volname, p - volname);
4142185029Spjd		poolname[p - volname] = '\0';
4143168404Spjd	}
4144168404Spjd
4145185029Spjd	if ((zhp = zpool_open(hdl, poolname)) == NULL) {
4146185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
4147185029Spjd		    "could not open pool '%s'"), poolname);
4148185029Spjd		(void) zfs_error(hdl, EZFS_OPENFAILED, errbuf);
4149185029Spjd		goto out;
4150185029Spjd	}
4151185029Spjd	config = zpool_get_config(zhp, NULL);
4152185029Spjd	if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE,
4153185029Spjd	    &nvroot) != 0) {
4154185029Spjd		zfs_error_aux(hdl, dgettext(TEXT_DOMAIN,
4155185029Spjd		    "could not obtain vdev configuration for  '%s'"), poolname);
4156185029Spjd		(void) zfs_error(hdl, EZFS_INVALCONFIG, errbuf);
4157185029Spjd		goto out;
4158185029Spjd	}
4159185029Spjd
4160185029Spjd	verify(nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN,
4161185029Spjd	    &top, &toplevels) == 0);
4162185029Spjd
4163185029Spjd	if (!supported_dump_vdev_type(hdl, top[0], errbuf)) {
4164185029Spjd		goto out;
4165185029Spjd	}
4166185029Spjd	ret = 0;
4167185029Spjd
4168185029Spjdout:
4169185029Spjd	if (zhp)
4170185029Spjd		zpool_close(zhp);
4171185029Spjd	libzfs_fini(hdl);
4172185029Spjd	return (ret);
4173168404Spjd}
4174