1dc8556358
Imported BE, much like the activated BE, will not have an origin that we can fetch/examine for destruction. be_destroy should not return BE_ERR_NOORIGIN for failure to get the origin property for BE_DESTROY_AUTOORIGIN, because we don't really know going into it that there's even an origin to be destroyed. BE_DESTROY_NEEDORIGIN has been renamed to BE_DESTROY_WANTORIGIN because only a subset of it *needs* the origin, so 'need' is too strong of verbiage. This was caught by jenkins and the bectl tests, but kevans failed to run the bectl tests prior to commit. Reported by: lwhsu
1133 lines
30 KiB
C
1133 lines
30 KiB
C
/*-
|
|
* SPDX-License-Identifier: BSD-2-Clause-FreeBSD
|
|
*
|
|
* Copyright (c) 2017 Kyle J. Kneitinger <kyle@kneit.in>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/ucred.h>
|
|
|
|
#include <ctype.h>
|
|
#include <libgen.h>
|
|
#include <libzfs_core.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <time.h>
|
|
#include <unistd.h>
|
|
|
|
#include "be.h"
|
|
#include "be_impl.h"
|
|
|
|
struct be_destroy_data {
|
|
libbe_handle_t *lbh;
|
|
char *snapname;
|
|
};
|
|
|
|
#if SOON
|
|
static int be_create_child_noent(libbe_handle_t *lbh, const char *active,
|
|
const char *child_path);
|
|
static int be_create_child_cloned(libbe_handle_t *lbh, const char *active);
|
|
#endif
|
|
|
|
/* Arbitrary... should tune */
|
|
#define BE_SNAP_SERIAL_MAX 1024
|
|
|
|
/*
|
|
* Iterator function for locating the rootfs amongst the children of the
|
|
* zfs_be_root set by loader(8). data is expected to be a libbe_handle_t *.
|
|
*/
|
|
static int
|
|
be_locate_rootfs(libbe_handle_t *lbh)
|
|
{
|
|
struct statfs sfs;
|
|
struct extmnttab entry;
|
|
zfs_handle_t *zfs;
|
|
|
|
/*
|
|
* Check first if root is ZFS; if not, we'll bail on rootfs capture.
|
|
* Unfortunately needed because zfs_path_to_zhandle will emit to
|
|
* stderr if / isn't actually a ZFS filesystem, which we'd like
|
|
* to avoid.
|
|
*/
|
|
if (statfs("/", &sfs) == 0) {
|
|
statfs2mnttab(&sfs, &entry);
|
|
if (strcmp(entry.mnt_fstype, MNTTYPE_ZFS) != 0)
|
|
return (1);
|
|
} else
|
|
return (1);
|
|
zfs = zfs_path_to_zhandle(lbh->lzh, "/", ZFS_TYPE_FILESYSTEM);
|
|
if (zfs == NULL)
|
|
return (1);
|
|
|
|
strlcpy(lbh->rootfs, zfs_get_name(zfs), sizeof(lbh->rootfs));
|
|
zfs_close(zfs);
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Initializes the libbe context to operate in the root boot environment
|
|
* dataset, for example, zroot/ROOT.
|
|
*/
|
|
libbe_handle_t *
|
|
libbe_init(const char *root)
|
|
{
|
|
char altroot[MAXPATHLEN];
|
|
libbe_handle_t *lbh;
|
|
char *poolname, *pos;
|
|
int pnamelen;
|
|
|
|
lbh = NULL;
|
|
poolname = pos = NULL;
|
|
|
|
if ((lbh = calloc(1, sizeof(libbe_handle_t))) == NULL)
|
|
goto err;
|
|
|
|
if ((lbh->lzh = libzfs_init()) == NULL)
|
|
goto err;
|
|
|
|
/*
|
|
* Grab rootfs, we'll work backwards from there if an optional BE root
|
|
* has not been passed in.
|
|
*/
|
|
if (be_locate_rootfs(lbh) != 0) {
|
|
if (root == NULL)
|
|
goto err;
|
|
*lbh->rootfs = '\0';
|
|
}
|
|
if (root == NULL) {
|
|
/* Strip off the final slash from rootfs to get the be root */
|
|
strlcpy(lbh->root, lbh->rootfs, sizeof(lbh->root));
|
|
pos = strrchr(lbh->root, '/');
|
|
if (pos == NULL)
|
|
goto err;
|
|
*pos = '\0';
|
|
} else
|
|
strlcpy(lbh->root, root, sizeof(lbh->root));
|
|
|
|
if ((pos = strchr(lbh->root, '/')) == NULL)
|
|
goto err;
|
|
|
|
pnamelen = pos - lbh->root;
|
|
poolname = malloc(pnamelen + 1);
|
|
if (poolname == NULL)
|
|
goto err;
|
|
|
|
strlcpy(poolname, lbh->root, pnamelen + 1);
|
|
if ((lbh->active_phandle = zpool_open(lbh->lzh, poolname)) == NULL)
|
|
goto err;
|
|
free(poolname);
|
|
poolname = NULL;
|
|
|
|
if (zpool_get_prop(lbh->active_phandle, ZPOOL_PROP_BOOTFS, lbh->bootfs,
|
|
sizeof(lbh->bootfs), NULL, true) != 0)
|
|
goto err;
|
|
|
|
if (zpool_get_prop(lbh->active_phandle, ZPOOL_PROP_ALTROOT,
|
|
altroot, sizeof(altroot), NULL, true) == 0 &&
|
|
strcmp(altroot, "-") != 0)
|
|
lbh->altroot_len = strlen(altroot);
|
|
|
|
return (lbh);
|
|
err:
|
|
if (lbh != NULL) {
|
|
if (lbh->active_phandle != NULL)
|
|
zpool_close(lbh->active_phandle);
|
|
if (lbh->lzh != NULL)
|
|
libzfs_fini(lbh->lzh);
|
|
free(lbh);
|
|
}
|
|
free(poolname);
|
|
return (NULL);
|
|
}
|
|
|
|
|
|
/*
|
|
* Free memory allocated by libbe_init()
|
|
*/
|
|
void
|
|
libbe_close(libbe_handle_t *lbh)
|
|
{
|
|
|
|
if (lbh->active_phandle != NULL)
|
|
zpool_close(lbh->active_phandle);
|
|
libzfs_fini(lbh->lzh);
|
|
free(lbh);
|
|
}
|
|
|
|
/*
|
|
* Proxy through to libzfs for the moment.
|
|
*/
|
|
void
|
|
be_nicenum(uint64_t num, char *buf, size_t buflen)
|
|
{
|
|
|
|
zfs_nicenum(num, buf, buflen);
|
|
}
|
|
|
|
static int
|
|
be_destroy_cb(zfs_handle_t *zfs_hdl, void *data)
|
|
{
|
|
char path[BE_MAXPATHLEN];
|
|
struct be_destroy_data *bdd;
|
|
zfs_handle_t *snap;
|
|
int err;
|
|
|
|
bdd = (struct be_destroy_data *)data;
|
|
if (bdd->snapname == NULL) {
|
|
err = zfs_iter_children(zfs_hdl, be_destroy_cb, data);
|
|
if (err != 0)
|
|
return (err);
|
|
return (zfs_destroy(zfs_hdl, false));
|
|
}
|
|
/* If we're dealing with snapshots instead, delete that one alone */
|
|
err = zfs_iter_filesystems(zfs_hdl, be_destroy_cb, data);
|
|
if (err != 0)
|
|
return (err);
|
|
/*
|
|
* This part is intentionally glossing over any potential errors,
|
|
* because there's a lot less potential for errors when we're cleaning
|
|
* up snapshots rather than a full deep BE. The primary error case
|
|
* here being if the snapshot doesn't exist in the first place, which
|
|
* the caller will likely deem insignificant as long as it doesn't
|
|
* exist after the call. Thus, such a missing snapshot shouldn't jam
|
|
* up the destruction.
|
|
*/
|
|
snprintf(path, sizeof(path), "%s@%s", zfs_get_name(zfs_hdl),
|
|
bdd->snapname);
|
|
if (!zfs_dataset_exists(bdd->lbh->lzh, path, ZFS_TYPE_SNAPSHOT))
|
|
return (0);
|
|
snap = zfs_open(bdd->lbh->lzh, path, ZFS_TYPE_SNAPSHOT);
|
|
if (snap != NULL)
|
|
zfs_destroy(snap, false);
|
|
return (0);
|
|
}
|
|
|
|
#define BE_DESTROY_WANTORIGIN (BE_DESTROY_ORIGIN | BE_DESTROY_AUTOORIGIN)
|
|
/*
|
|
* Destroy the boot environment or snapshot specified by the name
|
|
* parameter. Options are or'd together with the possible values:
|
|
* BE_DESTROY_FORCE : forces operation on mounted datasets
|
|
* BE_DESTROY_ORIGIN: destroy the origin snapshot as well
|
|
*/
|
|
int
|
|
be_destroy(libbe_handle_t *lbh, const char *name, int options)
|
|
{
|
|
struct be_destroy_data bdd;
|
|
char origin[BE_MAXPATHLEN], path[BE_MAXPATHLEN];
|
|
zfs_handle_t *fs;
|
|
char *snapdelim;
|
|
int err, force, mounted;
|
|
size_t rootlen;
|
|
|
|
bdd.lbh = lbh;
|
|
bdd.snapname = NULL;
|
|
force = options & BE_DESTROY_FORCE;
|
|
*origin = '\0';
|
|
|
|
be_root_concat(lbh, name, path);
|
|
|
|
if ((snapdelim = strchr(path, '@')) == NULL) {
|
|
if (!zfs_dataset_exists(lbh->lzh, path, ZFS_TYPE_FILESYSTEM))
|
|
return (set_error(lbh, BE_ERR_NOENT));
|
|
|
|
if (strcmp(path, lbh->rootfs) == 0 ||
|
|
strcmp(path, lbh->bootfs) == 0)
|
|
return (set_error(lbh, BE_ERR_DESTROYACT));
|
|
|
|
fs = zfs_open(lbh->lzh, path, ZFS_TYPE_FILESYSTEM);
|
|
if (fs == NULL)
|
|
return (set_error(lbh, BE_ERR_ZFSOPEN));
|
|
|
|
if ((options & BE_DESTROY_WANTORIGIN) != 0 &&
|
|
zfs_prop_get(fs, ZFS_PROP_ORIGIN, origin, sizeof(origin),
|
|
NULL, NULL, 0, 1) != 0 &&
|
|
(options & BE_DESTROY_ORIGIN) != 0)
|
|
return (set_error(lbh, BE_ERR_NOORIGIN));
|
|
|
|
/*
|
|
* If the caller wants auto-origin destruction and the origin
|
|
* name matches one of our automatically created snapshot names
|
|
* (i.e. strftime("%F-%T") with a serial at the end), then
|
|
* we'll set the DESTROY_ORIGIN flag and nuke it
|
|
* be_is_auto_snapshot_name is exported from libbe(3) so that
|
|
* the caller can determine if it needs to warn about the origin
|
|
* not being destroyed or not.
|
|
*/
|
|
if ((options & BE_DESTROY_AUTOORIGIN) != 0 && *origin != '\0' &&
|
|
be_is_auto_snapshot_name(lbh, origin))
|
|
options |= BE_DESTROY_ORIGIN;
|
|
|
|
/* Don't destroy a mounted dataset unless force is specified */
|
|
if ((mounted = zfs_is_mounted(fs, NULL)) != 0) {
|
|
if (force) {
|
|
zfs_unmount(fs, NULL, 0);
|
|
} else {
|
|
free(bdd.snapname);
|
|
return (set_error(lbh, BE_ERR_DESTROYMNT));
|
|
}
|
|
}
|
|
} else {
|
|
if (!zfs_dataset_exists(lbh->lzh, path, ZFS_TYPE_SNAPSHOT))
|
|
return (set_error(lbh, BE_ERR_NOENT));
|
|
|
|
bdd.snapname = strdup(snapdelim + 1);
|
|
if (bdd.snapname == NULL)
|
|
return (set_error(lbh, BE_ERR_NOMEM));
|
|
*snapdelim = '\0';
|
|
fs = zfs_open(lbh->lzh, path, ZFS_TYPE_DATASET);
|
|
if (fs == NULL) {
|
|
free(bdd.snapname);
|
|
return (set_error(lbh, BE_ERR_ZFSOPEN));
|
|
}
|
|
}
|
|
|
|
err = be_destroy_cb(fs, &bdd);
|
|
zfs_close(fs);
|
|
free(bdd.snapname);
|
|
if (err != 0) {
|
|
/* Children are still present or the mount is referenced */
|
|
if (err == EBUSY)
|
|
return (set_error(lbh, BE_ERR_DESTROYMNT));
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
}
|
|
|
|
if ((options & BE_DESTROY_ORIGIN) == 0)
|
|
return (0);
|
|
|
|
/* The origin can't possibly be shorter than the BE root */
|
|
rootlen = strlen(lbh->root);
|
|
if (*origin == '\0' || strlen(origin) <= rootlen + 1)
|
|
return (set_error(lbh, BE_ERR_INVORIGIN));
|
|
|
|
/*
|
|
* We'll be chopping off the BE root and running this back through
|
|
* be_destroy, so that we properly handle the origin snapshot whether
|
|
* it be that of a deep BE or not.
|
|
*/
|
|
if (strncmp(origin, lbh->root, rootlen) != 0 || origin[rootlen] != '/')
|
|
return (0);
|
|
|
|
return (be_destroy(lbh, origin + rootlen + 1,
|
|
options & ~BE_DESTROY_ORIGIN));
|
|
}
|
|
|
|
static void
|
|
be_setup_snapshot_name(libbe_handle_t *lbh, char *buf, size_t buflen)
|
|
{
|
|
time_t rawtime;
|
|
int len, serial;
|
|
|
|
time(&rawtime);
|
|
len = strlen(buf);
|
|
len += strftime(buf + len, buflen - len, "@%F-%T", localtime(&rawtime));
|
|
/* No room for serial... caller will do its best */
|
|
if (buflen - len < 2)
|
|
return;
|
|
|
|
for (serial = 0; serial < BE_SNAP_SERIAL_MAX; ++serial) {
|
|
snprintf(buf + len, buflen - len, "-%d", serial);
|
|
if (!zfs_dataset_exists(lbh->lzh, buf, ZFS_TYPE_SNAPSHOT))
|
|
return;
|
|
}
|
|
}
|
|
|
|
bool
|
|
be_is_auto_snapshot_name(libbe_handle_t *lbh, const char *name)
|
|
{
|
|
const char *snap;
|
|
int day, hour, minute, month, second, serial, year;
|
|
|
|
if ((snap = strchr(name, '@')) == NULL)
|
|
return (false);
|
|
++snap;
|
|
/* We'll grab the individual components and do some light validation. */
|
|
if (sscanf(snap, "%d-%d-%d-%d:%d:%d-%d", &year, &month, &day, &hour,
|
|
&minute, &second, &serial) != 7)
|
|
return (false);
|
|
return (year >= 1970) && (month >= 1 && month <= 12) &&
|
|
(day >= 1 && day <= 31) && (hour >= 0 && hour <= 23) &&
|
|
(minute >= 0 && minute <= 59) && (second >= 0 && second <= 60) &&
|
|
serial >= 0;
|
|
}
|
|
|
|
int
|
|
be_snapshot(libbe_handle_t *lbh, const char *source, const char *snap_name,
|
|
bool recursive, char *result)
|
|
{
|
|
char buf[BE_MAXPATHLEN];
|
|
int err;
|
|
|
|
be_root_concat(lbh, source, buf);
|
|
|
|
if ((err = be_exists(lbh, buf)) != 0)
|
|
return (set_error(lbh, err));
|
|
|
|
if (snap_name != NULL) {
|
|
if (strlcat(buf, "@", sizeof(buf)) >= sizeof(buf))
|
|
return (set_error(lbh, BE_ERR_INVALIDNAME));
|
|
|
|
if (strlcat(buf, snap_name, sizeof(buf)) >= sizeof(buf))
|
|
return (set_error(lbh, BE_ERR_INVALIDNAME));
|
|
|
|
if (result != NULL)
|
|
snprintf(result, BE_MAXPATHLEN, "%s@%s", source,
|
|
snap_name);
|
|
} else {
|
|
be_setup_snapshot_name(lbh, buf, sizeof(buf));
|
|
|
|
if (result != NULL && strlcpy(result, strrchr(buf, '/') + 1,
|
|
sizeof(buf)) >= sizeof(buf))
|
|
return (set_error(lbh, BE_ERR_INVALIDNAME));
|
|
}
|
|
if ((err = zfs_snapshot(lbh->lzh, buf, recursive, NULL)) != 0) {
|
|
switch (err) {
|
|
case EZFS_INVALIDNAME:
|
|
return (set_error(lbh, BE_ERR_INVALIDNAME));
|
|
|
|
default:
|
|
/*
|
|
* The other errors that zfs_ioc_snapshot might return
|
|
* shouldn't happen if we've set things up properly, so
|
|
* we'll gloss over them and call it UNKNOWN as it will
|
|
* require further triage.
|
|
*/
|
|
if (errno == ENOTSUP)
|
|
return (set_error(lbh, BE_ERR_NOPOOL));
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
}
|
|
}
|
|
|
|
return (BE_ERR_SUCCESS);
|
|
}
|
|
|
|
|
|
/*
|
|
* Create the boot environment specified by the name parameter
|
|
*/
|
|
int
|
|
be_create(libbe_handle_t *lbh, const char *name)
|
|
{
|
|
int err;
|
|
|
|
err = be_create_from_existing(lbh, name, be_active_path(lbh));
|
|
|
|
return (set_error(lbh, err));
|
|
}
|
|
|
|
static int
|
|
be_deep_clone_prop(int prop, void *cb)
|
|
{
|
|
int err;
|
|
struct libbe_dccb *dccb;
|
|
zprop_source_t src;
|
|
char pval[BE_MAXPATHLEN];
|
|
char source[BE_MAXPATHLEN];
|
|
char *val;
|
|
|
|
dccb = cb;
|
|
/* Skip some properties we don't want to touch */
|
|
if (prop == ZFS_PROP_CANMOUNT)
|
|
return (ZPROP_CONT);
|
|
|
|
/* Don't copy readonly properties */
|
|
if (zfs_prop_readonly(prop))
|
|
return (ZPROP_CONT);
|
|
|
|
if ((err = zfs_prop_get(dccb->zhp, prop, (char *)&pval,
|
|
sizeof(pval), &src, (char *)&source, sizeof(source), false)))
|
|
/* Just continue if we fail to read a property */
|
|
return (ZPROP_CONT);
|
|
|
|
/*
|
|
* Only copy locally defined or received properties. This continues
|
|
* to avoid temporary/default/local properties intentionally without
|
|
* breaking received datasets.
|
|
*/
|
|
if (src != ZPROP_SRC_LOCAL && src != ZPROP_SRC_RECEIVED)
|
|
return (ZPROP_CONT);
|
|
|
|
/* Augment mountpoint with altroot, if needed */
|
|
val = pval;
|
|
if (prop == ZFS_PROP_MOUNTPOINT)
|
|
val = be_mountpoint_augmented(dccb->lbh, val);
|
|
|
|
nvlist_add_string(dccb->props, zfs_prop_to_name(prop), val);
|
|
|
|
return (ZPROP_CONT);
|
|
}
|
|
|
|
/*
|
|
* Return the corresponding boot environment path for a given
|
|
* dataset path, the constructed path is placed in 'result'.
|
|
*
|
|
* example: say our new boot environment name is 'bootenv' and
|
|
* the dataset path is 'zroot/ROOT/default/data/set'.
|
|
*
|
|
* result should produce: 'zroot/ROOT/bootenv/data/set'
|
|
*/
|
|
static int
|
|
be_get_path(struct libbe_deep_clone *ldc, const char *dspath, char *result, int result_size)
|
|
{
|
|
char *pos;
|
|
char *child_dataset;
|
|
|
|
/* match the root path for the boot environments */
|
|
pos = strstr(dspath, ldc->lbh->root);
|
|
|
|
/* no match, different pools? */
|
|
if (pos == NULL)
|
|
return (BE_ERR_BADPATH);
|
|
|
|
/* root path of the new boot environment */
|
|
snprintf(result, result_size, "%s/%s", ldc->lbh->root, ldc->bename);
|
|
|
|
/* gets us to the parent dataset, the +1 consumes a trailing slash */
|
|
pos += strlen(ldc->lbh->root) + 1;
|
|
|
|
/* skip the parent dataset */
|
|
if ((child_dataset = strchr(pos, '/')) != NULL)
|
|
strlcat(result, child_dataset, result_size);
|
|
|
|
return (BE_ERR_SUCCESS);
|
|
}
|
|
|
|
static int
|
|
be_clone_cb(zfs_handle_t *ds, void *data)
|
|
{
|
|
int err;
|
|
char be_path[BE_MAXPATHLEN];
|
|
char snap_path[BE_MAXPATHLEN];
|
|
const char *dspath;
|
|
zfs_handle_t *snap_hdl;
|
|
nvlist_t *props;
|
|
struct libbe_deep_clone *ldc;
|
|
struct libbe_dccb dccb;
|
|
|
|
ldc = (struct libbe_deep_clone *)data;
|
|
dspath = zfs_get_name(ds);
|
|
|
|
snprintf(snap_path, sizeof(snap_path), "%s@%s", dspath, ldc->snapname);
|
|
|
|
/* construct the boot environment path from the dataset we're cloning */
|
|
if (be_get_path(ldc, dspath, be_path, sizeof(be_path)) != BE_ERR_SUCCESS)
|
|
return (set_error(ldc->lbh, BE_ERR_UNKNOWN));
|
|
|
|
/* the dataset to be created (i.e. the boot environment) already exists */
|
|
if (zfs_dataset_exists(ldc->lbh->lzh, be_path, ZFS_TYPE_DATASET))
|
|
return (set_error(ldc->lbh, BE_ERR_EXISTS));
|
|
|
|
/* no snapshot found for this dataset, silently skip it */
|
|
if (!zfs_dataset_exists(ldc->lbh->lzh, snap_path, ZFS_TYPE_SNAPSHOT))
|
|
return (0);
|
|
|
|
if ((snap_hdl =
|
|
zfs_open(ldc->lbh->lzh, snap_path, ZFS_TYPE_SNAPSHOT)) == NULL)
|
|
return (set_error(ldc->lbh, BE_ERR_ZFSOPEN));
|
|
|
|
nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
|
|
nvlist_add_string(props, "canmount", "noauto");
|
|
|
|
dccb.lbh = ldc->lbh;
|
|
dccb.zhp = ds;
|
|
dccb.props = props;
|
|
if (zprop_iter(be_deep_clone_prop, &dccb, B_FALSE, B_FALSE,
|
|
ZFS_TYPE_FILESYSTEM) == ZPROP_INVAL)
|
|
return (-1);
|
|
|
|
if ((err = zfs_clone(snap_hdl, be_path, props)) != 0)
|
|
return (set_error(ldc->lbh, BE_ERR_ZFSCLONE));
|
|
|
|
nvlist_free(props);
|
|
zfs_close(snap_hdl);
|
|
|
|
if (ldc->depth_limit == -1 || ldc->depth < ldc->depth_limit) {
|
|
ldc->depth++;
|
|
err = zfs_iter_filesystems(ds, be_clone_cb, ldc);
|
|
ldc->depth--;
|
|
}
|
|
|
|
return (set_error(ldc->lbh, err));
|
|
}
|
|
|
|
/*
|
|
* Create a boot environment with a given name from a given snapshot.
|
|
* Snapshots can be in the format 'zroot/ROOT/default@snapshot' or
|
|
* 'default@snapshot'. In the latter case, 'default@snapshot' will be prepended
|
|
* with the root path that libbe was initailized with.
|
|
*/
|
|
static int
|
|
be_clone(libbe_handle_t *lbh, const char *bename, const char *snapshot, int depth)
|
|
{
|
|
int err;
|
|
char snap_path[BE_MAXPATHLEN];
|
|
char *parentname, *snapname;
|
|
zfs_handle_t *parent_hdl;
|
|
struct libbe_deep_clone ldc;
|
|
|
|
/* ensure the boot environment name is valid */
|
|
if ((err = be_validate_name(lbh, bename)) != 0)
|
|
return (set_error(lbh, err));
|
|
|
|
/*
|
|
* prepend the boot environment root path if we're
|
|
* given a partial snapshot name.
|
|
*/
|
|
if ((err = be_root_concat(lbh, snapshot, snap_path)) != 0)
|
|
return (set_error(lbh, err));
|
|
|
|
/* ensure the snapshot exists */
|
|
if ((err = be_validate_snap(lbh, snap_path)) != 0)
|
|
return (set_error(lbh, err));
|
|
|
|
/* get a copy of the snapshot path so we can disect it */
|
|
if ((parentname = strdup(snap_path)) == NULL)
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
|
|
/* split dataset name from snapshot name */
|
|
snapname = strchr(parentname, '@');
|
|
if (snapname == NULL) {
|
|
free(parentname);
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
}
|
|
*snapname = '\0';
|
|
snapname++;
|
|
|
|
/* set-up the boot environment */
|
|
ldc.lbh = lbh;
|
|
ldc.bename = bename;
|
|
ldc.snapname = snapname;
|
|
ldc.depth = 0;
|
|
ldc.depth_limit = depth;
|
|
|
|
/* the boot environment will be cloned from this dataset */
|
|
parent_hdl = zfs_open(lbh->lzh, parentname, ZFS_TYPE_DATASET);
|
|
|
|
/* create the boot environment */
|
|
err = be_clone_cb(parent_hdl, &ldc);
|
|
|
|
free(parentname);
|
|
return (set_error(lbh, err));
|
|
}
|
|
|
|
/*
|
|
* Create a boot environment from pre-existing snapshot, specifying a depth.
|
|
*/
|
|
int be_create_depth(libbe_handle_t *lbh, const char *bename,
|
|
const char *snap, int depth)
|
|
{
|
|
return (be_clone(lbh, bename, snap, depth));
|
|
}
|
|
|
|
/*
|
|
* Create the boot environment from pre-existing snapshot
|
|
*/
|
|
int
|
|
be_create_from_existing_snap(libbe_handle_t *lbh, const char *bename,
|
|
const char *snap)
|
|
{
|
|
return (be_clone(lbh, bename, snap, -1));
|
|
}
|
|
|
|
|
|
/*
|
|
* Create a boot environment from an existing boot environment
|
|
*/
|
|
int
|
|
be_create_from_existing(libbe_handle_t *lbh, const char *bename, const char *old)
|
|
{
|
|
int err;
|
|
char snap[BE_MAXPATHLEN];
|
|
|
|
if ((err = be_snapshot(lbh, old, NULL, true, snap)) != 0)
|
|
return (set_error(lbh, err));
|
|
|
|
err = be_clone(lbh, bename, snap, -1);
|
|
|
|
return (set_error(lbh, err));
|
|
}
|
|
|
|
|
|
/*
|
|
* Verifies that a snapshot has a valid name, exists, and has a mountpoint of
|
|
* '/'. Returns BE_ERR_SUCCESS (0), upon success, or the relevant BE_ERR_* upon
|
|
* failure. Does not set the internal library error state.
|
|
*/
|
|
int
|
|
be_validate_snap(libbe_handle_t *lbh, const char *snap_name)
|
|
{
|
|
|
|
if (strlen(snap_name) >= BE_MAXPATHLEN)
|
|
return (BE_ERR_PATHLEN);
|
|
|
|
if (!zfs_name_valid(snap_name, ZFS_TYPE_SNAPSHOT))
|
|
return (BE_ERR_INVALIDNAME);
|
|
|
|
if (!zfs_dataset_exists(lbh->lzh, snap_name,
|
|
ZFS_TYPE_SNAPSHOT))
|
|
return (BE_ERR_NOENT);
|
|
|
|
return (BE_ERR_SUCCESS);
|
|
}
|
|
|
|
|
|
/*
|
|
* Idempotently appends the name argument to the root boot environment path
|
|
* and copies the resulting string into the result buffer (which is assumed
|
|
* to be at least BE_MAXPATHLEN characters long. Returns BE_ERR_SUCCESS upon
|
|
* success, BE_ERR_PATHLEN if the resulting path is longer than BE_MAXPATHLEN,
|
|
* or BE_ERR_INVALIDNAME if the name is a path that does not begin with
|
|
* zfs_be_root. Does not set internal library error state.
|
|
*/
|
|
int
|
|
be_root_concat(libbe_handle_t *lbh, const char *name, char *result)
|
|
{
|
|
size_t name_len, root_len;
|
|
|
|
name_len = strlen(name);
|
|
root_len = strlen(lbh->root);
|
|
|
|
/* Act idempotently; return be name if it is already a full path */
|
|
if (strrchr(name, '/') != NULL) {
|
|
if (strstr(name, lbh->root) != name)
|
|
return (BE_ERR_INVALIDNAME);
|
|
|
|
if (name_len >= BE_MAXPATHLEN)
|
|
return (BE_ERR_PATHLEN);
|
|
|
|
strlcpy(result, name, BE_MAXPATHLEN);
|
|
return (BE_ERR_SUCCESS);
|
|
} else if (name_len + root_len + 1 < BE_MAXPATHLEN) {
|
|
snprintf(result, BE_MAXPATHLEN, "%s/%s", lbh->root,
|
|
name);
|
|
return (BE_ERR_SUCCESS);
|
|
}
|
|
|
|
return (BE_ERR_PATHLEN);
|
|
}
|
|
|
|
|
|
/*
|
|
* Verifies the validity of a boot environment name (A-Za-z0-9-_.). Returns
|
|
* BE_ERR_SUCCESS (0) if name is valid, otherwise returns BE_ERR_INVALIDNAME
|
|
* or BE_ERR_PATHLEN.
|
|
* Does not set internal library error state.
|
|
*/
|
|
int
|
|
be_validate_name(libbe_handle_t *lbh, const char *name)
|
|
{
|
|
|
|
/*
|
|
* Impose the additional restriction that the entire dataset name must
|
|
* not exceed the maximum length of a dataset, i.e. MAXNAMELEN.
|
|
*/
|
|
if (strlen(lbh->root) + 1 + strlen(name) > MAXNAMELEN)
|
|
return (BE_ERR_PATHLEN);
|
|
|
|
if (!zfs_name_valid(name, ZFS_TYPE_DATASET))
|
|
return (BE_ERR_INVALIDNAME);
|
|
|
|
return (BE_ERR_SUCCESS);
|
|
}
|
|
|
|
|
|
/*
|
|
* usage
|
|
*/
|
|
int
|
|
be_rename(libbe_handle_t *lbh, const char *old, const char *new)
|
|
{
|
|
char full_old[BE_MAXPATHLEN];
|
|
char full_new[BE_MAXPATHLEN];
|
|
zfs_handle_t *zfs_hdl;
|
|
int err;
|
|
|
|
/*
|
|
* be_validate_name is documented not to set error state, so we should
|
|
* do so here.
|
|
*/
|
|
if ((err = be_validate_name(lbh, new)) != 0)
|
|
return (set_error(lbh, err));
|
|
if ((err = be_root_concat(lbh, old, full_old)) != 0)
|
|
return (set_error(lbh, err));
|
|
if ((err = be_root_concat(lbh, new, full_new)) != 0)
|
|
return (set_error(lbh, err));
|
|
|
|
if (!zfs_dataset_exists(lbh->lzh, full_old, ZFS_TYPE_DATASET))
|
|
return (set_error(lbh, BE_ERR_NOENT));
|
|
|
|
if (zfs_dataset_exists(lbh->lzh, full_new, ZFS_TYPE_DATASET))
|
|
return (set_error(lbh, BE_ERR_EXISTS));
|
|
|
|
if ((zfs_hdl = zfs_open(lbh->lzh, full_old,
|
|
ZFS_TYPE_FILESYSTEM)) == NULL)
|
|
return (set_error(lbh, BE_ERR_ZFSOPEN));
|
|
|
|
/* recurse, nounmount, forceunmount */
|
|
struct renameflags flags = {
|
|
.nounmount = 1,
|
|
};
|
|
|
|
err = zfs_rename(zfs_hdl, NULL, full_new, flags);
|
|
|
|
zfs_close(zfs_hdl);
|
|
if (err != 0)
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
return (0);
|
|
}
|
|
|
|
|
|
int
|
|
be_export(libbe_handle_t *lbh, const char *bootenv, int fd)
|
|
{
|
|
char snap_name[BE_MAXPATHLEN];
|
|
char buf[BE_MAXPATHLEN];
|
|
zfs_handle_t *zfs;
|
|
sendflags_t flags = { 0 };
|
|
int err;
|
|
|
|
if ((err = be_snapshot(lbh, bootenv, NULL, true, snap_name)) != 0)
|
|
/* Use the error set by be_snapshot */
|
|
return (err);
|
|
|
|
be_root_concat(lbh, snap_name, buf);
|
|
|
|
if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_DATASET)) == NULL)
|
|
return (set_error(lbh, BE_ERR_ZFSOPEN));
|
|
|
|
err = zfs_send_one(zfs, NULL, fd, flags);
|
|
zfs_close(zfs);
|
|
|
|
return (err);
|
|
}
|
|
|
|
|
|
int
|
|
be_import(libbe_handle_t *lbh, const char *bootenv, int fd)
|
|
{
|
|
char buf[BE_MAXPATHLEN];
|
|
nvlist_t *props;
|
|
zfs_handle_t *zfs;
|
|
recvflags_t flags = { .nomount = 1 };
|
|
int err;
|
|
|
|
be_root_concat(lbh, bootenv, buf);
|
|
|
|
if ((err = zfs_receive(lbh->lzh, buf, NULL, &flags, fd, NULL)) != 0) {
|
|
switch (err) {
|
|
case EINVAL:
|
|
return (set_error(lbh, BE_ERR_NOORIGIN));
|
|
case ENOENT:
|
|
return (set_error(lbh, BE_ERR_NOENT));
|
|
case EIO:
|
|
return (set_error(lbh, BE_ERR_IO));
|
|
default:
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
}
|
|
}
|
|
|
|
if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_FILESYSTEM)) == NULL)
|
|
return (set_error(lbh, BE_ERR_ZFSOPEN));
|
|
|
|
nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
|
|
nvlist_add_string(props, "canmount", "noauto");
|
|
nvlist_add_string(props, "mountpoint", "none");
|
|
|
|
err = zfs_prop_set_list(zfs, props);
|
|
nvlist_free(props);
|
|
|
|
zfs_close(zfs);
|
|
|
|
if (err != 0)
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
|
|
return (0);
|
|
}
|
|
|
|
#if SOON
|
|
static int
|
|
be_create_child_noent(libbe_handle_t *lbh, const char *active,
|
|
const char *child_path)
|
|
{
|
|
nvlist_t *props;
|
|
zfs_handle_t *zfs;
|
|
int err;
|
|
|
|
nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
|
|
nvlist_add_string(props, "canmount", "noauto");
|
|
nvlist_add_string(props, "mountpoint", child_path);
|
|
|
|
/* Create */
|
|
if ((err = zfs_create(lbh->lzh, active, ZFS_TYPE_DATASET,
|
|
props)) != 0) {
|
|
switch (err) {
|
|
case EZFS_EXISTS:
|
|
return (set_error(lbh, BE_ERR_EXISTS));
|
|
case EZFS_NOENT:
|
|
return (set_error(lbh, BE_ERR_NOENT));
|
|
case EZFS_BADTYPE:
|
|
case EZFS_BADVERSION:
|
|
return (set_error(lbh, BE_ERR_NOPOOL));
|
|
case EZFS_BADPROP:
|
|
default:
|
|
/* We set something up wrong, probably... */
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
}
|
|
}
|
|
nvlist_free(props);
|
|
|
|
if ((zfs = zfs_open(lbh->lzh, active, ZFS_TYPE_DATASET)) == NULL)
|
|
return (set_error(lbh, BE_ERR_ZFSOPEN));
|
|
|
|
/* Set props */
|
|
if ((err = zfs_prop_set(zfs, "canmount", "noauto")) != 0) {
|
|
zfs_close(zfs);
|
|
/*
|
|
* Similar to other cases, this shouldn't fail unless we've
|
|
* done something wrong. This is a new dataset that shouldn't
|
|
* have been mounted anywhere between creation and now.
|
|
*/
|
|
if (err == EZFS_NOMEM)
|
|
return (set_error(lbh, BE_ERR_NOMEM));
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
}
|
|
zfs_close(zfs);
|
|
return (BE_ERR_SUCCESS);
|
|
}
|
|
|
|
static int
|
|
be_create_child_cloned(libbe_handle_t *lbh, const char *active)
|
|
{
|
|
char buf[BE_MAXPATHLEN], tmp[BE_MAXPATHLEN];;
|
|
zfs_handle_t *zfs;
|
|
int err;
|
|
|
|
/* XXX TODO ? */
|
|
|
|
/*
|
|
* Establish if the existing path is a zfs dataset or just
|
|
* the subdirectory of one
|
|
*/
|
|
strlcpy(tmp, "tmp/be_snap.XXXXX", sizeof(tmp));
|
|
if (mktemp(tmp) == NULL)
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
|
|
be_root_concat(lbh, tmp, buf);
|
|
printf("Here %s?\n", buf);
|
|
if ((err = zfs_snapshot(lbh->lzh, buf, false, NULL)) != 0) {
|
|
switch (err) {
|
|
case EZFS_INVALIDNAME:
|
|
return (set_error(lbh, BE_ERR_INVALIDNAME));
|
|
|
|
default:
|
|
/*
|
|
* The other errors that zfs_ioc_snapshot might return
|
|
* shouldn't happen if we've set things up properly, so
|
|
* we'll gloss over them and call it UNKNOWN as it will
|
|
* require further triage.
|
|
*/
|
|
if (errno == ENOTSUP)
|
|
return (set_error(lbh, BE_ERR_NOPOOL));
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
}
|
|
}
|
|
|
|
/* Clone */
|
|
if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_SNAPSHOT)) == NULL)
|
|
return (BE_ERR_ZFSOPEN);
|
|
|
|
if ((err = zfs_clone(zfs, active, NULL)) != 0)
|
|
/* XXX TODO correct error */
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
|
|
/* set props */
|
|
zfs_close(zfs);
|
|
return (BE_ERR_SUCCESS);
|
|
}
|
|
|
|
int
|
|
be_add_child(libbe_handle_t *lbh, const char *child_path, bool cp_if_exists)
|
|
{
|
|
struct stat sb;
|
|
char active[BE_MAXPATHLEN], buf[BE_MAXPATHLEN];
|
|
nvlist_t *props;
|
|
const char *s;
|
|
|
|
/* Require absolute paths */
|
|
if (*child_path != '/')
|
|
return (set_error(lbh, BE_ERR_BADPATH));
|
|
|
|
strlcpy(active, be_active_path(lbh), BE_MAXPATHLEN);
|
|
strcpy(buf, active);
|
|
|
|
/* Create non-mountable parent dataset(s) */
|
|
s = child_path;
|
|
for (char *p; (p = strchr(s+1, '/')) != NULL; s = p) {
|
|
size_t len = p - s;
|
|
strncat(buf, s, len);
|
|
|
|
nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
|
|
nvlist_add_string(props, "canmount", "off");
|
|
nvlist_add_string(props, "mountpoint", "none");
|
|
zfs_create(lbh->lzh, buf, ZFS_TYPE_DATASET, props);
|
|
nvlist_free(props);
|
|
}
|
|
|
|
/* Path does not exist as a descendent of / yet */
|
|
if (strlcat(active, child_path, BE_MAXPATHLEN) >= BE_MAXPATHLEN)
|
|
return (set_error(lbh, BE_ERR_PATHLEN));
|
|
|
|
if (stat(child_path, &sb) != 0) {
|
|
/* Verify that error is ENOENT */
|
|
if (errno != ENOENT)
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
return (be_create_child_noent(lbh, active, child_path));
|
|
} else if (cp_if_exists)
|
|
/* Path is already a descendent of / and should be copied */
|
|
return (be_create_child_cloned(lbh, active));
|
|
return (set_error(lbh, BE_ERR_EXISTS));
|
|
}
|
|
#endif /* SOON */
|
|
|
|
static int
|
|
be_set_nextboot(libbe_handle_t *lbh, nvlist_t *config, uint64_t pool_guid,
|
|
const char *zfsdev)
|
|
{
|
|
nvlist_t **child;
|
|
uint64_t vdev_guid;
|
|
int c, children;
|
|
|
|
if (nvlist_lookup_nvlist_array(config, ZPOOL_CONFIG_CHILDREN, &child,
|
|
&children) == 0) {
|
|
for (c = 0; c < children; ++c)
|
|
if (be_set_nextboot(lbh, child[c], pool_guid, zfsdev) != 0)
|
|
return (1);
|
|
return (0);
|
|
}
|
|
|
|
if (nvlist_lookup_uint64(config, ZPOOL_CONFIG_GUID,
|
|
&vdev_guid) != 0) {
|
|
return (1);
|
|
}
|
|
|
|
if (zpool_nextboot(lbh->lzh, pool_guid, vdev_guid, zfsdev) != 0) {
|
|
perror("ZFS_IOC_NEXTBOOT failed");
|
|
return (1);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Deactivate old BE dataset; currently just sets canmount=noauto
|
|
*/
|
|
static int
|
|
be_deactivate(libbe_handle_t *lbh, const char *ds)
|
|
{
|
|
zfs_handle_t *zfs;
|
|
|
|
if ((zfs = zfs_open(lbh->lzh, ds, ZFS_TYPE_DATASET)) == NULL)
|
|
return (1);
|
|
if (zfs_prop_set(zfs, "canmount", "noauto") != 0)
|
|
return (1);
|
|
zfs_close(zfs);
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
be_activate(libbe_handle_t *lbh, const char *bootenv, bool temporary)
|
|
{
|
|
char be_path[BE_MAXPATHLEN];
|
|
char buf[BE_MAXPATHLEN];
|
|
nvlist_t *config, *dsprops, *vdevs;
|
|
char *origin;
|
|
uint64_t pool_guid;
|
|
zfs_handle_t *zhp;
|
|
int err;
|
|
|
|
be_root_concat(lbh, bootenv, be_path);
|
|
|
|
/* Note: be_exists fails if mountpoint is not / */
|
|
if ((err = be_exists(lbh, be_path)) != 0)
|
|
return (set_error(lbh, err));
|
|
|
|
if (temporary) {
|
|
config = zpool_get_config(lbh->active_phandle, NULL);
|
|
if (config == NULL)
|
|
/* config should be fetchable... */
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
|
|
if (nvlist_lookup_uint64(config, ZPOOL_CONFIG_POOL_GUID,
|
|
&pool_guid) != 0)
|
|
/* Similarly, it shouldn't be possible */
|
|
return (set_error(lbh, BE_ERR_UNKNOWN));
|
|
|
|
/* Expected format according to zfsbootcfg(8) man */
|
|
snprintf(buf, sizeof(buf), "zfs:%s:", be_path);
|
|
|
|
/* We have no config tree */
|
|
if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE,
|
|
&vdevs) != 0)
|
|
return (set_error(lbh, BE_ERR_NOPOOL));
|
|
|
|
return (be_set_nextboot(lbh, vdevs, pool_guid, buf));
|
|
} else {
|
|
if (be_deactivate(lbh, lbh->bootfs) != 0)
|
|
return (-1);
|
|
|
|
/* Obtain bootenv zpool */
|
|
err = zpool_set_prop(lbh->active_phandle, "bootfs", be_path);
|
|
if (err)
|
|
return (-1);
|
|
|
|
zhp = zfs_open(lbh->lzh, be_path, ZFS_TYPE_FILESYSTEM);
|
|
if (zhp == NULL)
|
|
return (-1);
|
|
|
|
if (be_prop_list_alloc(&dsprops) != 0)
|
|
return (-1);
|
|
|
|
if (be_get_dataset_props(lbh, be_path, dsprops) != 0) {
|
|
nvlist_free(dsprops);
|
|
return (-1);
|
|
}
|
|
|
|
if (nvlist_lookup_string(dsprops, "origin", &origin) == 0)
|
|
err = zfs_promote(zhp);
|
|
nvlist_free(dsprops);
|
|
|
|
zfs_close(zhp);
|
|
|
|
if (err)
|
|
return (-1);
|
|
}
|
|
|
|
return (BE_ERR_SUCCESS);
|
|
}
|