1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 3 * 4 * Copyright (c) 2017 Kyle J. Kneitinger <kyle@kneit.in> 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 15 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25 * SUCH DAMAGE. 26 */ 27 28 #include <sys/param.h> 29 #include <sys/module.h> 30 #include <sys/mount.h> 31 #include <sys/stat.h> 32 #include <sys/ucred.h> 33 #include <sys/queue.h> 34 #include <sys/zfs_context.h> 35 #include <sys/mntent.h> 36 #include <sys/zfs_ioctl.h> 37 38 #include <libzutil.h> 39 #include <ctype.h> 40 #include <libgen.h> 41 #include <libzfs_core.h> 42 #include <libzfs_impl.h> 43 #include <stdio.h> 44 #include <stdlib.h> 45 #include <time.h> 46 #include <unistd.h> 47 #include <libzfsbootenv.h> 48 49 #include "be.h" 50 #include "be_impl.h" 51 52 struct promote_entry { 53 char name[BE_MAXPATHLEN]; 54 SLIST_ENTRY(promote_entry) link; 55 }; 56 57 struct be_destroy_data { 58 libbe_handle_t *lbh; 59 char target_name[BE_MAXPATHLEN]; 60 char *snapname; 61 SLIST_HEAD(, promote_entry) promotelist; 62 }; 63 64 #if SOON 65 static int be_create_child_noent(libbe_handle_t *lbh, const char *active, 66 const char *child_path); 67 static int be_create_child_cloned(libbe_handle_t *lbh, const char *active); 68 #endif 69 70 /* Arbitrary... should tune */ 71 #define BE_SNAP_SERIAL_MAX 1024 72 73 /* 74 * Iterator function for locating the rootfs amongst the children of the 75 * zfs_be_root set by loader(8). data is expected to be a libbe_handle_t *. 76 */ 77 static int 78 be_locate_rootfs(libbe_handle_t *lbh) 79 { 80 struct statfs sfs; 81 struct mnttab entry; 82 zfs_handle_t *zfs; 83 84 /* 85 * Check first if root is ZFS; if not, we'll bail on rootfs capture. 86 * Unfortunately needed because zfs_path_to_zhandle will emit to 87 * stderr if / isn't actually a ZFS filesystem, which we'd like 88 * to avoid. 89 */ 90 if (statfs("/", &sfs) == 0) { 91 statfs2mnttab(&sfs, &entry); 92 if (strcmp(entry.mnt_fstype, MNTTYPE_ZFS) != 0) 93 return (1); 94 } else 95 return (1); 96 zfs = zfs_path_to_zhandle(lbh->lzh, "/", ZFS_TYPE_FILESYSTEM); 97 if (zfs == NULL) 98 return (1); 99 100 strlcpy(lbh->rootfs, zfs_get_name(zfs), sizeof(lbh->rootfs)); 101 zfs_close(zfs); 102 return (0); 103 } 104 105 /* 106 * Initializes the libbe context to operate in the root boot environment 107 * dataset, for example, zroot/ROOT. 108 */ 109 libbe_handle_t * 110 libbe_init(const char *root) 111 { 112 char altroot[MAXPATHLEN]; 113 libbe_handle_t *lbh; 114 char *poolname, *pos; 115 int pnamelen; 116 117 lbh = NULL; 118 poolname = pos = NULL; 119 120 /* 121 * If the zfs kmod's not loaded then the later libzfs_init() will load 122 * the module for us, but that's not desirable for a couple reasons. If 123 * the module's not loaded, there's no pool imported and we're going to 124 * fail anyways. We also don't really want libbe consumers to have that 125 * kind of side-effect (module loading) in the general case. 126 */ 127 if (modfind("zfs") < 0) 128 goto err; 129 130 if ((lbh = calloc(1, sizeof(libbe_handle_t))) == NULL) 131 goto err; 132 133 if ((lbh->lzh = libzfs_init()) == NULL) 134 goto err; 135 136 /* 137 * Grab rootfs, we'll work backwards from there if an optional BE root 138 * has not been passed in. 139 */ 140 if (be_locate_rootfs(lbh) != 0) { 141 if (root == NULL) 142 goto err; 143 *lbh->rootfs = '\0'; 144 } 145 if (root == NULL) { 146 /* Strip off the final slash from rootfs to get the be root */ 147 strlcpy(lbh->root, lbh->rootfs, sizeof(lbh->root)); 148 pos = strrchr(lbh->root, '/'); 149 if (pos == NULL) 150 goto err; 151 *pos = '\0'; 152 } else 153 strlcpy(lbh->root, root, sizeof(lbh->root)); 154 155 if ((pos = strchr(lbh->root, '/')) == NULL) 156 goto err; 157 158 pnamelen = pos - lbh->root; 159 poolname = malloc(pnamelen + 1); 160 if (poolname == NULL) 161 goto err; 162 163 strlcpy(poolname, lbh->root, pnamelen + 1); 164 if ((lbh->active_phandle = zpool_open(lbh->lzh, poolname)) == NULL) 165 goto err; 166 free(poolname); 167 poolname = NULL; 168 169 if (zpool_get_prop(lbh->active_phandle, ZPOOL_PROP_BOOTFS, lbh->bootfs, 170 sizeof(lbh->bootfs), NULL, true) != 0) 171 goto err; 172 173 if (zpool_get_prop(lbh->active_phandle, ZPOOL_PROP_ALTROOT, 174 altroot, sizeof(altroot), NULL, true) == 0 && 175 strcmp(altroot, "-") != 0) 176 lbh->altroot_len = strlen(altroot); 177 178 (void) lzbe_get_boot_device(zpool_get_name(lbh->active_phandle), 179 &lbh->bootonce); 180 181 return (lbh); 182 err: 183 if (lbh != NULL) { 184 if (lbh->active_phandle != NULL) 185 zpool_close(lbh->active_phandle); 186 if (lbh->lzh != NULL) 187 libzfs_fini(lbh->lzh); 188 free(lbh); 189 } 190 free(poolname); 191 return (NULL); 192 } 193 194 195 /* 196 * Free memory allocated by libbe_init() 197 */ 198 void 199 libbe_close(libbe_handle_t *lbh) 200 { 201 202 if (lbh->active_phandle != NULL) 203 zpool_close(lbh->active_phandle); 204 libzfs_fini(lbh->lzh); 205 206 free(lbh->bootonce); 207 free(lbh); 208 } 209 210 /* 211 * Proxy through to libzfs for the moment. 212 */ 213 void 214 be_nicenum(uint64_t num, char *buf, size_t buflen) 215 { 216 217 zfs_nicenum(num, buf, buflen); 218 } 219 220 static bool 221 be_should_promote_clones(zfs_handle_t *zfs_hdl, struct be_destroy_data *bdd) 222 { 223 char *atpos; 224 225 if (zfs_get_type(zfs_hdl) != ZFS_TYPE_SNAPSHOT) 226 return (false); 227 228 /* 229 * If we're deleting a snapshot, we need to make sure we only promote 230 * clones that are derived from one of the snapshots we're deleting, 231 * rather than that of a snapshot we're not touching. This keeps stuff 232 * in a consistent state, making sure that we don't error out unless 233 * we really need to. 234 */ 235 if (bdd->snapname == NULL) 236 return (true); 237 238 atpos = strchr(zfs_get_name(zfs_hdl), '@'); 239 return (strcmp(atpos + 1, bdd->snapname) == 0); 240 } 241 242 /* 243 * This is executed from be_promote_dependent_clones via zfs_iter_dependents, 244 * It checks if the dependent type is a snapshot then attempts to find any 245 * clones associated with it. Any clones not related to the destroy target are 246 * added to the promote list. 247 */ 248 static int 249 be_dependent_clone_cb(zfs_handle_t *zfs_hdl, void *data) 250 { 251 int err; 252 bool found; 253 const char *name; 254 struct nvlist *nvl; 255 struct nvpair *nvp; 256 struct be_destroy_data *bdd; 257 struct promote_entry *entry, *newentry; 258 259 nvp = NULL; 260 err = 0; 261 bdd = (struct be_destroy_data *)data; 262 263 if (be_should_promote_clones(zfs_hdl, bdd) && 264 (nvl = zfs_get_clones_nvl(zfs_hdl)) != NULL) { 265 while ((nvp = nvlist_next_nvpair(nvl, nvp)) != NULL) { 266 name = nvpair_name(nvp); 267 268 /* 269 * Skip if the clone is equal to, or a child of, the 270 * destroy target. 271 */ 272 if (strncmp(name, bdd->target_name, 273 strlen(bdd->target_name)) == 0 || 274 strstr(name, bdd->target_name) == name) { 275 continue; 276 } 277 278 found = false; 279 SLIST_FOREACH(entry, &bdd->promotelist, link) { 280 if (strcmp(entry->name, name) == 0) { 281 found = true; 282 break; 283 } 284 } 285 286 if (found) 287 continue; 288 289 newentry = malloc(sizeof(struct promote_entry)); 290 if (newentry == NULL) { 291 err = ENOMEM; 292 break; 293 } 294 295 #define BE_COPY_NAME(entry, src) \ 296 strlcpy((entry)->name, (src), sizeof((entry)->name)) 297 if (BE_COPY_NAME(newentry, name) >= 298 sizeof(newentry->name)) { 299 /* Shouldn't happen. */ 300 free(newentry); 301 err = ENAMETOOLONG; 302 break; 303 } 304 #undef BE_COPY_NAME 305 306 /* 307 * We're building up a SLIST here to make sure both that 308 * we get the order right and so that we don't 309 * inadvertently observe the wrong state by promoting 310 * datasets while we're still walking the tree. The 311 * latter can lead to situations where we promote a BE 312 * then effectively demote it again. 313 */ 314 SLIST_INSERT_HEAD(&bdd->promotelist, newentry, link); 315 } 316 nvlist_free(nvl); 317 } 318 zfs_close(zfs_hdl); 319 return (err); 320 } 321 322 /* 323 * This is called before a destroy, so that any datasets(environments) that are 324 * dependent on this one get promoted before destroying the target. 325 */ 326 static int 327 be_promote_dependent_clones(zfs_handle_t *zfs_hdl, struct be_destroy_data *bdd) 328 { 329 int err; 330 zfs_handle_t *clone; 331 struct promote_entry *entry; 332 333 snprintf(bdd->target_name, BE_MAXPATHLEN, "%s/", zfs_get_name(zfs_hdl)); 334 err = zfs_iter_dependents(zfs_hdl, true, be_dependent_clone_cb, bdd); 335 336 /* 337 * Drain the list and walk away from it if we're only deleting a 338 * snapshot. 339 */ 340 if (bdd->snapname != NULL && !SLIST_EMPTY(&bdd->promotelist)) 341 err = BE_ERR_HASCLONES; 342 while (!SLIST_EMPTY(&bdd->promotelist)) { 343 entry = SLIST_FIRST(&bdd->promotelist); 344 SLIST_REMOVE_HEAD(&bdd->promotelist, link); 345 346 #define ZFS_GRAB_CLONE() \ 347 zfs_open(bdd->lbh->lzh, entry->name, ZFS_TYPE_FILESYSTEM) 348 /* 349 * Just skip this part on error, we still want to clean up the 350 * promotion list after the first error. We'll then preserve it 351 * all the way back. 352 */ 353 if (err == 0 && (clone = ZFS_GRAB_CLONE()) != NULL) { 354 err = zfs_promote(clone); 355 if (err != 0) 356 err = BE_ERR_DESTROYMNT; 357 zfs_close(clone); 358 } 359 #undef ZFS_GRAB_CLONE 360 free(entry); 361 } 362 363 return (err); 364 } 365 366 static int 367 be_destroy_cb(zfs_handle_t *zfs_hdl, void *data) 368 { 369 char path[BE_MAXPATHLEN]; 370 struct be_destroy_data *bdd; 371 zfs_handle_t *snap; 372 int err; 373 374 bdd = (struct be_destroy_data *)data; 375 if (bdd->snapname == NULL) { 376 err = zfs_iter_children(zfs_hdl, be_destroy_cb, data); 377 if (err != 0) 378 return (err); 379 return (zfs_destroy(zfs_hdl, false)); 380 } 381 /* If we're dealing with snapshots instead, delete that one alone */ 382 err = zfs_iter_filesystems(zfs_hdl, be_destroy_cb, data); 383 if (err != 0) 384 return (err); 385 /* 386 * This part is intentionally glossing over any potential errors, 387 * because there's a lot less potential for errors when we're cleaning 388 * up snapshots rather than a full deep BE. The primary error case 389 * here being if the snapshot doesn't exist in the first place, which 390 * the caller will likely deem insignificant as long as it doesn't 391 * exist after the call. Thus, such a missing snapshot shouldn't jam 392 * up the destruction. 393 */ 394 snprintf(path, sizeof(path), "%s@%s", zfs_get_name(zfs_hdl), 395 bdd->snapname); 396 if (!zfs_dataset_exists(bdd->lbh->lzh, path, ZFS_TYPE_SNAPSHOT)) 397 return (0); 398 snap = zfs_open(bdd->lbh->lzh, path, ZFS_TYPE_SNAPSHOT); 399 if (snap != NULL) 400 zfs_destroy(snap, false); 401 return (0); 402 } 403 404 #define BE_DESTROY_WANTORIGIN (BE_DESTROY_ORIGIN | BE_DESTROY_AUTOORIGIN) 405 /* 406 * Destroy the boot environment or snapshot specified by the name 407 * parameter. Options are or'd together with the possible values: 408 * BE_DESTROY_FORCE : forces operation on mounted datasets 409 * BE_DESTROY_ORIGIN: destroy the origin snapshot as well 410 */ 411 static int 412 be_destroy_internal(libbe_handle_t *lbh, const char *name, int options, 413 bool odestroyer) 414 { 415 struct be_destroy_data bdd; 416 char origin[BE_MAXPATHLEN], path[BE_MAXPATHLEN]; 417 zfs_handle_t *fs; 418 char *snapdelim; 419 int err, force, mounted; 420 size_t rootlen; 421 422 bdd.lbh = lbh; 423 bdd.snapname = NULL; 424 SLIST_INIT(&bdd.promotelist); 425 force = options & BE_DESTROY_FORCE; 426 *origin = '\0'; 427 428 be_root_concat(lbh, name, path); 429 430 if ((snapdelim = strchr(path, '@')) == NULL) { 431 if (!zfs_dataset_exists(lbh->lzh, path, ZFS_TYPE_FILESYSTEM)) 432 return (set_error(lbh, BE_ERR_NOENT)); 433 434 if (strcmp(path, lbh->rootfs) == 0 || 435 strcmp(path, lbh->bootfs) == 0) 436 return (set_error(lbh, BE_ERR_DESTROYACT)); 437 438 fs = zfs_open(lbh->lzh, path, ZFS_TYPE_FILESYSTEM); 439 if (fs == NULL) 440 return (set_error(lbh, BE_ERR_ZFSOPEN)); 441 442 /* Don't destroy a mounted dataset unless force is specified */ 443 if ((mounted = zfs_is_mounted(fs, NULL)) != 0) { 444 if (force) { 445 zfs_unmount(fs, NULL, 0); 446 } else { 447 free(bdd.snapname); 448 return (set_error(lbh, BE_ERR_DESTROYMNT)); 449 } 450 } 451 452 /* Handle destroying bootonce */ 453 if (lbh->bootonce != NULL && 454 strcmp(path, lbh->bootonce) == 0) 455 (void) lzbe_set_boot_device( 456 zpool_get_name(lbh->active_phandle), lzbe_add, NULL); 457 } else { 458 /* 459 * If we're initially destroying a snapshot, origin options do 460 * not make sense. If we're destroying the origin snapshot of 461 * a BE, we want to maintain the options in case we need to 462 * fake success after failing to promote. 463 */ 464 if (!odestroyer) 465 options &= ~BE_DESTROY_WANTORIGIN; 466 if (!zfs_dataset_exists(lbh->lzh, path, ZFS_TYPE_SNAPSHOT)) 467 return (set_error(lbh, BE_ERR_NOENT)); 468 469 bdd.snapname = strdup(snapdelim + 1); 470 if (bdd.snapname == NULL) 471 return (set_error(lbh, BE_ERR_NOMEM)); 472 *snapdelim = '\0'; 473 fs = zfs_open(lbh->lzh, path, ZFS_TYPE_DATASET); 474 if (fs == NULL) { 475 free(bdd.snapname); 476 return (set_error(lbh, BE_ERR_ZFSOPEN)); 477 } 478 } 479 480 /* 481 * Whether we're destroying a BE or a single snapshot, we need to walk 482 * the tree of what we're going to destroy and promote everything in our 483 * path so that we can make it happen. 484 */ 485 if ((err = be_promote_dependent_clones(fs, &bdd)) != 0) { 486 free(bdd.snapname); 487 488 /* 489 * If we're just destroying the origin of some other dataset 490 * we were invoked to destroy, then we just ignore 491 * BE_ERR_HASCLONES and return success unless the caller wanted 492 * to force the issue. 493 */ 494 if (odestroyer && err == BE_ERR_HASCLONES && 495 (options & BE_DESTROY_AUTOORIGIN) != 0) 496 return (0); 497 return (set_error(lbh, err)); 498 } 499 500 /* 501 * This was deferred until after we promote all of the derivatives so 502 * that we grab the new origin after everything's settled down. 503 */ 504 if ((options & BE_DESTROY_WANTORIGIN) != 0 && 505 zfs_prop_get(fs, ZFS_PROP_ORIGIN, origin, sizeof(origin), 506 NULL, NULL, 0, 1) != 0 && 507 (options & BE_DESTROY_ORIGIN) != 0) 508 return (set_error(lbh, BE_ERR_NOORIGIN)); 509 510 /* 511 * If the caller wants auto-origin destruction and the origin 512 * name matches one of our automatically created snapshot names 513 * (i.e. strftime("%F-%T") with a serial at the end), then 514 * we'll set the DESTROY_ORIGIN flag and nuke it 515 * be_is_auto_snapshot_name is exported from libbe(3) so that 516 * the caller can determine if it needs to warn about the origin 517 * not being destroyed or not. 518 */ 519 if ((options & BE_DESTROY_AUTOORIGIN) != 0 && *origin != '\0' && 520 be_is_auto_snapshot_name(lbh, origin)) 521 options |= BE_DESTROY_ORIGIN; 522 523 err = be_destroy_cb(fs, &bdd); 524 zfs_close(fs); 525 free(bdd.snapname); 526 if (err != 0) { 527 /* Children are still present or the mount is referenced */ 528 if (err == EBUSY) 529 return (set_error(lbh, BE_ERR_DESTROYMNT)); 530 return (set_error(lbh, BE_ERR_UNKNOWN)); 531 } 532 533 if ((options & BE_DESTROY_ORIGIN) == 0) 534 return (0); 535 536 /* The origin can't possibly be shorter than the BE root */ 537 rootlen = strlen(lbh->root); 538 if (*origin == '\0' || strlen(origin) <= rootlen + 1) 539 return (set_error(lbh, BE_ERR_INVORIGIN)); 540 541 /* 542 * We'll be chopping off the BE root and running this back through 543 * be_destroy, so that we properly handle the origin snapshot whether 544 * it be that of a deep BE or not. 545 */ 546 if (strncmp(origin, lbh->root, rootlen) != 0 || origin[rootlen] != '/') 547 return (0); 548 549 return (be_destroy_internal(lbh, origin + rootlen + 1, 550 options & ~BE_DESTROY_ORIGIN, true)); 551 } 552 553 int 554 be_destroy(libbe_handle_t *lbh, const char *name, int options) 555 { 556 557 /* 558 * The consumer must not set both BE_DESTROY_AUTOORIGIN and 559 * BE_DESTROY_ORIGIN. Internally, we'll set the latter from the former. 560 * The latter should imply that we must succeed at destroying the 561 * origin, or complain otherwise. 562 */ 563 if ((options & BE_DESTROY_WANTORIGIN) == BE_DESTROY_WANTORIGIN) 564 return (set_error(lbh, BE_ERR_UNKNOWN)); 565 return (be_destroy_internal(lbh, name, options, false)); 566 } 567 568 static void 569 be_setup_snapshot_name(libbe_handle_t *lbh, char *buf, size_t buflen) 570 { 571 time_t rawtime; 572 int len, serial; 573 574 time(&rawtime); 575 len = strlen(buf); 576 len += strftime(buf + len, buflen - len, "@%F-%T", localtime(&rawtime)); 577 /* No room for serial... caller will do its best */ 578 if (buflen - len < 2) 579 return; 580 581 for (serial = 0; serial < BE_SNAP_SERIAL_MAX; ++serial) { 582 snprintf(buf + len, buflen - len, "-%d", serial); 583 if (!zfs_dataset_exists(lbh->lzh, buf, ZFS_TYPE_SNAPSHOT)) 584 return; 585 } 586 } 587 588 bool 589 be_is_auto_snapshot_name(libbe_handle_t *lbh __unused, const char *name) 590 { 591 const char *snap; 592 int day, hour, minute, month, second, serial, year; 593 594 if ((snap = strchr(name, '@')) == NULL) 595 return (false); 596 ++snap; 597 /* We'll grab the individual components and do some light validation. */ 598 if (sscanf(snap, "%d-%d-%d-%d:%d:%d-%d", &year, &month, &day, &hour, 599 &minute, &second, &serial) != 7) 600 return (false); 601 return (year >= 1970) && (month >= 1 && month <= 12) && 602 (day >= 1 && day <= 31) && (hour >= 0 && hour <= 23) && 603 (minute >= 0 && minute <= 59) && (second >= 0 && second <= 60) && 604 serial >= 0; 605 } 606 607 int 608 be_snapshot(libbe_handle_t *lbh, const char *source, const char *snap_name, 609 bool recursive, char *result) 610 { 611 char buf[BE_MAXPATHLEN]; 612 int err; 613 614 be_root_concat(lbh, source, buf); 615 616 if ((err = be_exists(lbh, buf)) != 0) 617 return (set_error(lbh, err)); 618 619 if (snap_name != NULL) { 620 if (strlcat(buf, "@", sizeof(buf)) >= sizeof(buf)) 621 return (set_error(lbh, BE_ERR_INVALIDNAME)); 622 623 if (strlcat(buf, snap_name, sizeof(buf)) >= sizeof(buf)) 624 return (set_error(lbh, BE_ERR_INVALIDNAME)); 625 626 if (result != NULL) 627 snprintf(result, BE_MAXPATHLEN, "%s@%s", source, 628 snap_name); 629 } else { 630 be_setup_snapshot_name(lbh, buf, sizeof(buf)); 631 632 if (result != NULL && strlcpy(result, strrchr(buf, '/') + 1, 633 sizeof(buf)) >= sizeof(buf)) 634 return (set_error(lbh, BE_ERR_INVALIDNAME)); 635 } 636 if ((err = zfs_snapshot(lbh->lzh, buf, recursive, NULL)) != 0) { 637 switch (err) { 638 case EZFS_INVALIDNAME: 639 return (set_error(lbh, BE_ERR_INVALIDNAME)); 640 641 default: 642 /* 643 * The other errors that zfs_ioc_snapshot might return 644 * shouldn't happen if we've set things up properly, so 645 * we'll gloss over them and call it UNKNOWN as it will 646 * require further triage. 647 */ 648 if (errno == ENOTSUP) 649 return (set_error(lbh, BE_ERR_NOPOOL)); 650 return (set_error(lbh, BE_ERR_UNKNOWN)); 651 } 652 } 653 654 return (BE_ERR_SUCCESS); 655 } 656 657 658 /* 659 * Create the boot environment specified by the name parameter 660 */ 661 int 662 be_create(libbe_handle_t *lbh, const char *name) 663 { 664 int err; 665 666 err = be_create_from_existing(lbh, name, be_active_path(lbh)); 667 668 return (set_error(lbh, err)); 669 } 670 671 static int 672 be_deep_clone_prop(int prop, void *cb) 673 { 674 int err; 675 struct libbe_dccb *dccb; 676 zprop_source_t src; 677 char pval[BE_MAXPATHLEN]; 678 char source[BE_MAXPATHLEN]; 679 char *val; 680 681 dccb = cb; 682 /* Skip some properties we don't want to touch */ 683 switch (prop) { 684 /* 685 * libzfs insists on these being naturally inherited in the 686 * cloning process. 687 */ 688 case ZFS_PROP_KEYFORMAT: 689 case ZFS_PROP_KEYLOCATION: 690 case ZFS_PROP_ENCRYPTION: 691 case ZFS_PROP_PBKDF2_ITERS: 692 693 /* FALLTHROUGH */ 694 case ZFS_PROP_CANMOUNT: /* Forced by libbe */ 695 return (ZPROP_CONT); 696 } 697 698 /* Don't copy readonly properties */ 699 if (zfs_prop_readonly(prop)) 700 return (ZPROP_CONT); 701 702 if ((err = zfs_prop_get(dccb->zhp, prop, (char *)&pval, 703 sizeof(pval), &src, (char *)&source, sizeof(source), false))) 704 /* Just continue if we fail to read a property */ 705 return (ZPROP_CONT); 706 707 /* 708 * Only copy locally defined or received properties. This continues 709 * to avoid temporary/default/local properties intentionally without 710 * breaking received datasets. 711 */ 712 if (src != ZPROP_SRC_LOCAL && src != ZPROP_SRC_RECEIVED) 713 return (ZPROP_CONT); 714 715 /* Augment mountpoint with altroot, if needed */ 716 val = pval; 717 if (prop == ZFS_PROP_MOUNTPOINT) 718 val = be_mountpoint_augmented(dccb->lbh, val); 719 720 nvlist_add_string(dccb->props, zfs_prop_to_name(prop), val); 721 722 return (ZPROP_CONT); 723 } 724 725 /* 726 * Return the corresponding boot environment path for a given 727 * dataset path, the constructed path is placed in 'result'. 728 * 729 * example: say our new boot environment name is 'bootenv' and 730 * the dataset path is 'zroot/ROOT/default/data/set'. 731 * 732 * result should produce: 'zroot/ROOT/bootenv/data/set' 733 */ 734 static int 735 be_get_path(struct libbe_deep_clone *ldc, const char *dspath, char *result, int result_size) 736 { 737 char *pos; 738 char *child_dataset; 739 740 /* match the root path for the boot environments */ 741 pos = strstr(dspath, ldc->lbh->root); 742 743 /* no match, different pools? */ 744 if (pos == NULL) 745 return (BE_ERR_BADPATH); 746 747 /* root path of the new boot environment */ 748 snprintf(result, result_size, "%s/%s", ldc->lbh->root, ldc->bename); 749 750 /* gets us to the parent dataset, the +1 consumes a trailing slash */ 751 pos += strlen(ldc->lbh->root) + 1; 752 753 /* skip the parent dataset */ 754 if ((child_dataset = strchr(pos, '/')) != NULL) 755 strlcat(result, child_dataset, result_size); 756 757 return (BE_ERR_SUCCESS); 758 } 759 760 static int 761 be_clone_cb(zfs_handle_t *ds, void *data) 762 { 763 int err; 764 char be_path[BE_MAXPATHLEN]; 765 char snap_path[BE_MAXPATHLEN]; 766 const char *dspath; 767 zfs_handle_t *snap_hdl; 768 nvlist_t *props; 769 struct libbe_deep_clone *ldc; 770 struct libbe_dccb dccb; 771 772 ldc = (struct libbe_deep_clone *)data; 773 dspath = zfs_get_name(ds); 774 775 snprintf(snap_path, sizeof(snap_path), "%s@%s", dspath, ldc->snapname); 776 777 /* construct the boot environment path from the dataset we're cloning */ 778 if (be_get_path(ldc, dspath, be_path, sizeof(be_path)) != BE_ERR_SUCCESS) 779 return (BE_ERR_UNKNOWN); 780 781 /* the dataset to be created (i.e. the boot environment) already exists */ 782 if (zfs_dataset_exists(ldc->lbh->lzh, be_path, ZFS_TYPE_DATASET)) 783 return (BE_ERR_EXISTS); 784 785 /* no snapshot found for this dataset, silently skip it */ 786 if (!zfs_dataset_exists(ldc->lbh->lzh, snap_path, ZFS_TYPE_SNAPSHOT)) 787 return (0); 788 789 if ((snap_hdl = 790 zfs_open(ldc->lbh->lzh, snap_path, ZFS_TYPE_SNAPSHOT)) == NULL) 791 return (BE_ERR_ZFSOPEN); 792 793 nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP); 794 nvlist_add_string(props, "canmount", "noauto"); 795 796 dccb.lbh = ldc->lbh; 797 dccb.zhp = ds; 798 dccb.props = props; 799 if (zprop_iter(be_deep_clone_prop, &dccb, B_FALSE, B_FALSE, 800 ZFS_TYPE_FILESYSTEM) == ZPROP_INVAL) 801 return (-1); 802 803 if ((err = zfs_clone(snap_hdl, be_path, props)) != 0) 804 return (BE_ERR_ZFSCLONE); 805 806 nvlist_free(props); 807 zfs_close(snap_hdl); 808 809 if (ldc->depth_limit == -1 || ldc->depth < ldc->depth_limit) { 810 ldc->depth++; 811 err = zfs_iter_filesystems(ds, be_clone_cb, ldc); 812 ldc->depth--; 813 } 814 815 return (err); 816 } 817 818 /* 819 * Create a boot environment with a given name from a given snapshot. 820 * Snapshots can be in the format 'zroot/ROOT/default@snapshot' or 821 * 'default@snapshot'. In the latter case, 'default@snapshot' will be prepended 822 * with the root path that libbe was initailized with. 823 */ 824 static int 825 be_clone(libbe_handle_t *lbh, const char *bename, const char *snapshot, int depth) 826 { 827 int err; 828 char snap_path[BE_MAXPATHLEN]; 829 char *parentname, *snapname; 830 zfs_handle_t *parent_hdl; 831 struct libbe_deep_clone ldc; 832 833 /* ensure the boot environment name is valid */ 834 if ((err = be_validate_name(lbh, bename)) != 0) 835 return (set_error(lbh, err)); 836 837 /* 838 * prepend the boot environment root path if we're 839 * given a partial snapshot name. 840 */ 841 if ((err = be_root_concat(lbh, snapshot, snap_path)) != 0) 842 return (set_error(lbh, err)); 843 844 /* ensure the snapshot exists */ 845 if ((err = be_validate_snap(lbh, snap_path)) != 0) 846 return (set_error(lbh, err)); 847 848 /* get a copy of the snapshot path so we can disect it */ 849 if ((parentname = strdup(snap_path)) == NULL) 850 return (set_error(lbh, BE_ERR_UNKNOWN)); 851 852 /* split dataset name from snapshot name */ 853 snapname = strchr(parentname, '@'); 854 if (snapname == NULL) { 855 free(parentname); 856 return (set_error(lbh, BE_ERR_UNKNOWN)); 857 } 858 *snapname = '\0'; 859 snapname++; 860 861 /* set-up the boot environment */ 862 ldc.lbh = lbh; 863 ldc.bename = bename; 864 ldc.snapname = snapname; 865 ldc.depth = 0; 866 ldc.depth_limit = depth; 867 868 /* the boot environment will be cloned from this dataset */ 869 parent_hdl = zfs_open(lbh->lzh, parentname, ZFS_TYPE_DATASET); 870 871 /* create the boot environment */ 872 err = be_clone_cb(parent_hdl, &ldc); 873 874 free(parentname); 875 return (set_error(lbh, err)); 876 } 877 878 /* 879 * Create a boot environment from pre-existing snapshot, specifying a depth. 880 */ 881 int be_create_depth(libbe_handle_t *lbh, const char *bename, 882 const char *snap, int depth) 883 { 884 return (be_clone(lbh, bename, snap, depth)); 885 } 886 887 /* 888 * Create the boot environment from pre-existing snapshot 889 */ 890 int 891 be_create_from_existing_snap(libbe_handle_t *lbh, const char *bename, 892 const char *snap) 893 { 894 return (be_clone(lbh, bename, snap, -1)); 895 } 896 897 898 /* 899 * Create a boot environment from an existing boot environment 900 */ 901 int 902 be_create_from_existing(libbe_handle_t *lbh, const char *bename, const char *old) 903 { 904 int err; 905 char snap[BE_MAXPATHLEN]; 906 907 if ((err = be_snapshot(lbh, old, NULL, true, snap)) != 0) 908 return (set_error(lbh, err)); 909 910 err = be_clone(lbh, bename, snap, -1); 911 912 return (set_error(lbh, err)); 913 } 914 915 916 /* 917 * Verifies that a snapshot has a valid name, exists, and has a mountpoint of 918 * '/'. Returns BE_ERR_SUCCESS (0), upon success, or the relevant BE_ERR_* upon 919 * failure. Does not set the internal library error state. 920 */ 921 int 922 be_validate_snap(libbe_handle_t *lbh, const char *snap_name) 923 { 924 925 if (strlen(snap_name) >= BE_MAXPATHLEN) 926 return (BE_ERR_PATHLEN); 927 928 if (!zfs_name_valid(snap_name, ZFS_TYPE_SNAPSHOT)) 929 return (BE_ERR_INVALIDNAME); 930 931 if (!zfs_dataset_exists(lbh->lzh, snap_name, 932 ZFS_TYPE_SNAPSHOT)) 933 return (BE_ERR_NOENT); 934 935 return (BE_ERR_SUCCESS); 936 } 937 938 939 /* 940 * Idempotently appends the name argument to the root boot environment path 941 * and copies the resulting string into the result buffer (which is assumed 942 * to be at least BE_MAXPATHLEN characters long. Returns BE_ERR_SUCCESS upon 943 * success, BE_ERR_PATHLEN if the resulting path is longer than BE_MAXPATHLEN, 944 * or BE_ERR_INVALIDNAME if the name is a path that does not begin with 945 * zfs_be_root. Does not set internal library error state. 946 */ 947 int 948 be_root_concat(libbe_handle_t *lbh, const char *name, char *result) 949 { 950 size_t name_len, root_len; 951 952 name_len = strlen(name); 953 root_len = strlen(lbh->root); 954 955 /* Act idempotently; return be name if it is already a full path */ 956 if (strrchr(name, '/') != NULL) { 957 if (strstr(name, lbh->root) != name) 958 return (BE_ERR_INVALIDNAME); 959 960 if (name_len >= BE_MAXPATHLEN) 961 return (BE_ERR_PATHLEN); 962 963 strlcpy(result, name, BE_MAXPATHLEN); 964 return (BE_ERR_SUCCESS); 965 } else if (name_len + root_len + 1 < BE_MAXPATHLEN) { 966 snprintf(result, BE_MAXPATHLEN, "%s/%s", lbh->root, 967 name); 968 return (BE_ERR_SUCCESS); 969 } 970 971 return (BE_ERR_PATHLEN); 972 } 973 974 975 /* 976 * Verifies the validity of a boot environment name (A-Za-z0-9-_.). Returns 977 * BE_ERR_SUCCESS (0) if name is valid, otherwise returns BE_ERR_INVALIDNAME 978 * or BE_ERR_PATHLEN. 979 * Does not set internal library error state. 980 */ 981 int 982 be_validate_name(libbe_handle_t *lbh, const char *name) 983 { 984 985 /* 986 * Impose the additional restriction that the entire dataset name must 987 * not exceed the maximum length of a dataset, i.e. MAXNAMELEN. 988 */ 989 if (strlen(lbh->root) + 1 + strlen(name) > MAXNAMELEN) 990 return (BE_ERR_PATHLEN); 991 992 if (!zfs_name_valid(name, ZFS_TYPE_DATASET)) 993 return (BE_ERR_INVALIDNAME); 994 995 /* 996 * ZFS allows spaces in boot environment names, but the kernel can't 997 * handle booting from such a dataset right now. vfs.root.mountfrom 998 * is defined to be a space-separated list, and there's no protocol for 999 * escaping whitespace in the path component of a dev:path spec. So 1000 * while loader can handle this situation alright, it can't safely pass 1001 * it on to mountroot. 1002 */ 1003 if (strchr(name, ' ') != NULL) 1004 return (BE_ERR_INVALIDNAME); 1005 1006 return (BE_ERR_SUCCESS); 1007 } 1008 1009 1010 /* 1011 * usage 1012 */ 1013 int 1014 be_rename(libbe_handle_t *lbh, const char *old, const char *new) 1015 { 1016 char full_old[BE_MAXPATHLEN]; 1017 char full_new[BE_MAXPATHLEN]; 1018 zfs_handle_t *zfs_hdl; 1019 int err; 1020 1021 /* 1022 * be_validate_name is documented not to set error state, so we should 1023 * do so here. 1024 */ 1025 if ((err = be_validate_name(lbh, new)) != 0) 1026 return (set_error(lbh, err)); 1027 if ((err = be_root_concat(lbh, old, full_old)) != 0) 1028 return (set_error(lbh, err)); 1029 if ((err = be_root_concat(lbh, new, full_new)) != 0) 1030 return (set_error(lbh, err)); 1031 1032 if (!zfs_dataset_exists(lbh->lzh, full_old, ZFS_TYPE_DATASET)) 1033 return (set_error(lbh, BE_ERR_NOENT)); 1034 1035 if (zfs_dataset_exists(lbh->lzh, full_new, ZFS_TYPE_DATASET)) 1036 return (set_error(lbh, BE_ERR_EXISTS)); 1037 1038 if ((zfs_hdl = zfs_open(lbh->lzh, full_old, 1039 ZFS_TYPE_FILESYSTEM)) == NULL) 1040 return (set_error(lbh, BE_ERR_ZFSOPEN)); 1041 1042 /* recurse, nounmount, forceunmount */ 1043 struct renameflags flags = { 1044 .nounmount = 1, 1045 }; 1046 err = zfs_rename(zfs_hdl, full_new, flags); 1047 if (err != 0) 1048 goto error; 1049 1050 /* handle renaming bootonce */ 1051 if (lbh->bootonce != NULL && 1052 strcmp(full_old, lbh->bootonce) == 0) 1053 err = be_activate(lbh, new, true); 1054 1055 error: 1056 zfs_close(zfs_hdl); 1057 return (set_error(lbh, err)); 1058 } 1059 1060 1061 int 1062 be_export(libbe_handle_t *lbh, const char *bootenv, int fd) 1063 { 1064 char snap_name[BE_MAXPATHLEN]; 1065 char buf[BE_MAXPATHLEN]; 1066 zfs_handle_t *zfs; 1067 sendflags_t flags = { 0 }; 1068 int err; 1069 1070 if ((err = be_snapshot(lbh, bootenv, NULL, true, snap_name)) != 0) 1071 /* Use the error set by be_snapshot */ 1072 return (err); 1073 1074 be_root_concat(lbh, snap_name, buf); 1075 1076 if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_DATASET)) == NULL) 1077 return (set_error(lbh, BE_ERR_ZFSOPEN)); 1078 1079 err = zfs_send_one(zfs, NULL, fd, &flags, /* redactbook */ NULL); 1080 zfs_close(zfs); 1081 1082 return (err); 1083 } 1084 1085 1086 int 1087 be_import(libbe_handle_t *lbh, const char *bootenv, int fd) 1088 { 1089 char buf[BE_MAXPATHLEN]; 1090 nvlist_t *props; 1091 zfs_handle_t *zfs; 1092 recvflags_t flags = { .nomount = 1 }; 1093 int err; 1094 1095 be_root_concat(lbh, bootenv, buf); 1096 1097 if ((err = zfs_receive(lbh->lzh, buf, NULL, &flags, fd, NULL)) != 0) { 1098 switch (err) { 1099 case EINVAL: 1100 return (set_error(lbh, BE_ERR_NOORIGIN)); 1101 case ENOENT: 1102 return (set_error(lbh, BE_ERR_NOENT)); 1103 case EIO: 1104 return (set_error(lbh, BE_ERR_IO)); 1105 default: 1106 return (set_error(lbh, BE_ERR_UNKNOWN)); 1107 } 1108 } 1109 1110 if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_FILESYSTEM)) == NULL) 1111 return (set_error(lbh, BE_ERR_ZFSOPEN)); 1112 1113 nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP); 1114 nvlist_add_string(props, "canmount", "noauto"); 1115 nvlist_add_string(props, "mountpoint", "none"); 1116 1117 err = zfs_prop_set_list(zfs, props); 1118 nvlist_free(props); 1119 1120 zfs_close(zfs); 1121 1122 if (err != 0) 1123 return (set_error(lbh, BE_ERR_UNKNOWN)); 1124 1125 return (0); 1126 } 1127 1128 #if SOON 1129 static int 1130 be_create_child_noent(libbe_handle_t *lbh, const char *active, 1131 const char *child_path) 1132 { 1133 nvlist_t *props; 1134 zfs_handle_t *zfs; 1135 int err; 1136 1137 nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP); 1138 nvlist_add_string(props, "canmount", "noauto"); 1139 nvlist_add_string(props, "mountpoint", child_path); 1140 1141 /* Create */ 1142 if ((err = zfs_create(lbh->lzh, active, ZFS_TYPE_DATASET, 1143 props)) != 0) { 1144 switch (err) { 1145 case EZFS_EXISTS: 1146 return (set_error(lbh, BE_ERR_EXISTS)); 1147 case EZFS_NOENT: 1148 return (set_error(lbh, BE_ERR_NOENT)); 1149 case EZFS_BADTYPE: 1150 case EZFS_BADVERSION: 1151 return (set_error(lbh, BE_ERR_NOPOOL)); 1152 case EZFS_BADPROP: 1153 default: 1154 /* We set something up wrong, probably... */ 1155 return (set_error(lbh, BE_ERR_UNKNOWN)); 1156 } 1157 } 1158 nvlist_free(props); 1159 1160 if ((zfs = zfs_open(lbh->lzh, active, ZFS_TYPE_DATASET)) == NULL) 1161 return (set_error(lbh, BE_ERR_ZFSOPEN)); 1162 1163 /* Set props */ 1164 if ((err = zfs_prop_set(zfs, "canmount", "noauto")) != 0) { 1165 zfs_close(zfs); 1166 /* 1167 * Similar to other cases, this shouldn't fail unless we've 1168 * done something wrong. This is a new dataset that shouldn't 1169 * have been mounted anywhere between creation and now. 1170 */ 1171 if (err == EZFS_NOMEM) 1172 return (set_error(lbh, BE_ERR_NOMEM)); 1173 return (set_error(lbh, BE_ERR_UNKNOWN)); 1174 } 1175 zfs_close(zfs); 1176 return (BE_ERR_SUCCESS); 1177 } 1178 1179 static int 1180 be_create_child_cloned(libbe_handle_t *lbh, const char *active) 1181 { 1182 char buf[BE_MAXPATHLEN], tmp[BE_MAXPATHLEN]; 1183 zfs_handle_t *zfs; 1184 int err; 1185 1186 /* XXX TODO ? */ 1187 1188 /* 1189 * Establish if the existing path is a zfs dataset or just 1190 * the subdirectory of one 1191 */ 1192 strlcpy(tmp, "tmp/be_snap.XXXXX", sizeof(tmp)); 1193 if (mktemp(tmp) == NULL) 1194 return (set_error(lbh, BE_ERR_UNKNOWN)); 1195 1196 be_root_concat(lbh, tmp, buf); 1197 printf("Here %s?\n", buf); 1198 if ((err = zfs_snapshot(lbh->lzh, buf, false, NULL)) != 0) { 1199 switch (err) { 1200 case EZFS_INVALIDNAME: 1201 return (set_error(lbh, BE_ERR_INVALIDNAME)); 1202 1203 default: 1204 /* 1205 * The other errors that zfs_ioc_snapshot might return 1206 * shouldn't happen if we've set things up properly, so 1207 * we'll gloss over them and call it UNKNOWN as it will 1208 * require further triage. 1209 */ 1210 if (errno == ENOTSUP) 1211 return (set_error(lbh, BE_ERR_NOPOOL)); 1212 return (set_error(lbh, BE_ERR_UNKNOWN)); 1213 } 1214 } 1215 1216 /* Clone */ 1217 if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_SNAPSHOT)) == NULL) 1218 return (BE_ERR_ZFSOPEN); 1219 1220 if ((err = zfs_clone(zfs, active, NULL)) != 0) 1221 /* XXX TODO correct error */ 1222 return (set_error(lbh, BE_ERR_UNKNOWN)); 1223 1224 /* set props */ 1225 zfs_close(zfs); 1226 return (BE_ERR_SUCCESS); 1227 } 1228 1229 int 1230 be_add_child(libbe_handle_t *lbh, const char *child_path, bool cp_if_exists) 1231 { 1232 struct stat sb; 1233 char active[BE_MAXPATHLEN], buf[BE_MAXPATHLEN]; 1234 nvlist_t *props; 1235 const char *s; 1236 1237 /* Require absolute paths */ 1238 if (*child_path != '/') 1239 return (set_error(lbh, BE_ERR_BADPATH)); 1240 1241 strlcpy(active, be_active_path(lbh), BE_MAXPATHLEN); 1242 strcpy(buf, active); 1243 1244 /* Create non-mountable parent dataset(s) */ 1245 s = child_path; 1246 for (char *p; (p = strchr(s+1, '/')) != NULL; s = p) { 1247 size_t len = p - s; 1248 strncat(buf, s, len); 1249 1250 nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP); 1251 nvlist_add_string(props, "canmount", "off"); 1252 nvlist_add_string(props, "mountpoint", "none"); 1253 zfs_create(lbh->lzh, buf, ZFS_TYPE_DATASET, props); 1254 nvlist_free(props); 1255 } 1256 1257 /* Path does not exist as a descendent of / yet */ 1258 if (strlcat(active, child_path, BE_MAXPATHLEN) >= BE_MAXPATHLEN) 1259 return (set_error(lbh, BE_ERR_PATHLEN)); 1260 1261 if (stat(child_path, &sb) != 0) { 1262 /* Verify that error is ENOENT */ 1263 if (errno != ENOENT) 1264 return (set_error(lbh, BE_ERR_UNKNOWN)); 1265 return (be_create_child_noent(lbh, active, child_path)); 1266 } else if (cp_if_exists) 1267 /* Path is already a descendent of / and should be copied */ 1268 return (be_create_child_cloned(lbh, active)); 1269 return (set_error(lbh, BE_ERR_EXISTS)); 1270 } 1271 #endif /* SOON */ 1272 1273 /* 1274 * Deactivate old BE dataset; currently just sets canmount=noauto or 1275 * resets boot once configuration. 1276 */ 1277 int 1278 be_deactivate(libbe_handle_t *lbh, const char *ds, bool temporary) 1279 { 1280 zfs_handle_t *zfs; 1281 1282 if (temporary) { 1283 return (lzbe_set_boot_device( 1284 zpool_get_name(lbh->active_phandle), lzbe_add, NULL)); 1285 } 1286 1287 if ((zfs = zfs_open(lbh->lzh, ds, ZFS_TYPE_DATASET)) == NULL) 1288 return (1); 1289 if (zfs_prop_set(zfs, "canmount", "noauto") != 0) 1290 return (1); 1291 zfs_close(zfs); 1292 return (0); 1293 } 1294 1295 static int 1296 be_zfs_promote_cb(zfs_handle_t *zhp, void *data) 1297 { 1298 char origin[BE_MAXPATHLEN]; 1299 bool *found_origin = (bool *)data; 1300 int err; 1301 1302 if (zfs_prop_get(zhp, ZFS_PROP_ORIGIN, origin, sizeof(origin), 1303 NULL, NULL, 0, true) == 0) { 1304 *found_origin = true; 1305 err = zfs_promote(zhp); 1306 if (err) 1307 return (err); 1308 } 1309 1310 return (zfs_iter_filesystems(zhp, be_zfs_promote_cb, data)); 1311 } 1312 1313 static int 1314 be_zfs_promote(zfs_handle_t *zhp, bool *found_origin) 1315 { 1316 *found_origin = false; 1317 return (be_zfs_promote_cb(zhp, (void *)found_origin)); 1318 } 1319 1320 int 1321 be_activate(libbe_handle_t *lbh, const char *bootenv, bool temporary) 1322 { 1323 char be_path[BE_MAXPATHLEN]; 1324 zfs_handle_t *zhp; 1325 int err; 1326 bool found_origin; 1327 1328 be_root_concat(lbh, bootenv, be_path); 1329 1330 /* Note: be_exists fails if mountpoint is not / */ 1331 if ((err = be_exists(lbh, be_path)) != 0) 1332 return (set_error(lbh, err)); 1333 1334 if (temporary) { 1335 return (lzbe_set_boot_device( 1336 zpool_get_name(lbh->active_phandle), lzbe_add, be_path)); 1337 } else { 1338 if (strncmp(lbh->bootfs, "-", 1) != 0 && 1339 be_deactivate(lbh, lbh->bootfs, false) != 0) 1340 return (-1); 1341 1342 /* Obtain bootenv zpool */ 1343 err = zpool_set_prop(lbh->active_phandle, "bootfs", be_path); 1344 if (err) 1345 return (-1); 1346 1347 for (;;) { 1348 zhp = zfs_open(lbh->lzh, be_path, ZFS_TYPE_FILESYSTEM); 1349 if (zhp == NULL) 1350 return (-1); 1351 1352 err = be_zfs_promote(zhp, &found_origin); 1353 1354 zfs_close(zhp); 1355 if (!found_origin) 1356 break; 1357 if (err) 1358 return (err); 1359 } 1360 1361 if (err) 1362 return (-1); 1363 } 1364 1365 return (BE_ERR_SUCCESS); 1366 } 1367