aboutsummaryrefslogtreecommitdiff
path: root/lib/libbe
diff options
context:
space:
mode:
Diffstat (limited to 'lib/libbe')
-rw-r--r--lib/libbe/Makefile74
-rw-r--r--lib/libbe/Makefile.depend19
-rw-r--r--lib/libbe/be.c1345
-rw-r--r--lib/libbe/be.h115
-rw-r--r--lib/libbe/be_access.c355
-rw-r--r--lib/libbe/be_error.c115
-rw-r--r--lib/libbe/be_impl.h55
-rw-r--r--lib/libbe/be_info.c292
-rw-r--r--lib/libbe/libbe.3600
-rw-r--r--lib/libbe/tests/Makefile24
-rw-r--r--lib/libbe/tests/Makefile.depend17
-rwxr-xr-xlib/libbe/tests/be_create.sh187
-rw-r--r--lib/libbe/tests/target_prog.c50
13 files changed, 3248 insertions, 0 deletions
diff --git a/lib/libbe/Makefile b/lib/libbe/Makefile
new file mode 100644
index 000000000000..3ba456aee4b7
--- /dev/null
+++ b/lib/libbe/Makefile
@@ -0,0 +1,74 @@
+SHLIBDIR?= /lib
+
+.include <src.opts.mk>
+
+PACKAGE= zfs
+LIB_PACKAGE=
+LIB= be
+SHLIB_MAJOR= 1
+SHLIB_MINOR= 0
+
+SRCS= be.c be_access.c be_error.c be_info.c
+INCS= be.h
+MAN= libbe.3
+MLINKS+= libbe.3 be_activate.3
+MLINKS+= libbe.3 be_active_name.3
+MLINKS+= libbe.3 be_active_path.3
+MLINKS+= libbe.3 be_create_depth.3
+MLINKS+= libbe.3 be_create_from_existing_snap.3
+MLINKS+= libbe.3 be_create_from_existing.3
+MLINKS+= libbe.3 be_create.3
+MLINKS+= libbe.3 be_deactivate.3
+MLINKS+= libbe.3 be_destroy.3
+MLINKS+= libbe.3 be_exists.3
+MLINKS+= libbe.3 be_export.3
+MLINKS+= libbe.3 be_get_bootenv_props.3
+MLINKS+= libbe.3 be_get_dataset_props.3
+MLINKS+= libbe.3 be_get_dataset_snapshots.3
+MLINKS+= libbe.3 be_import.3
+MLINKS+= libbe.3 be_is_auto_snapshot_name.3
+MLINKS+= libbe.3 be_mount.3
+MLINKS+= libbe.3 be_mounted_at.3
+MLINKS+= libbe.3 be_nextboot_name.3
+MLINKS+= libbe.3 be_nextboot_path.3
+MLINKS+= libbe.3 be_nicenum.3
+MLINKS+= libbe.3 be_prop_list_alloc.3
+MLINKS+= libbe.3 be_prop_list_free.3
+MLINKS+= libbe.3 be_rename.3
+MLINKS+= libbe.3 be_root_concat.3
+MLINKS+= libbe.3 be_root_path.3
+MLINKS+= libbe.3 be_snapshot.3
+MLINKS+= libbe.3 be_unmount.3
+MLINKS+= libbe.3 be_validate_name.3
+MLINKS+= libbe.3 be_validate_snap.3
+MLINKS+= libbe.3 libbe_close.3
+MLINKS+= libbe.3 libbe_errno.3
+MLINKS+= libbe.3 libbe_error_description.3
+MLINKS+= libbe.3 libbe_init.3
+MLINKS+= libbe.3 libbe_print_on_error.3
+
+LIBADD+= zfs
+LIBADD+= nvpair
+LIBADD+= spl
+LIBADD+= zfsbootenv
+
+CFLAGS+= -DIN_BASE -DHAVE_RPC_TYPES
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/include
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/include/os/freebsd
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/lib/libspl/include
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/lib/libspl/include/os/freebsd
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/lib/libzfs
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/lib/libzpool/include
+CFLAGS+= -I${SRCTOP}/sys
+CFLAGS+= -I${SRCTOP}/cddl/compat/opensolaris/include
+CFLAGS+= -include ${SRCTOP}/sys/contrib/openzfs/include/os/freebsd/spl/sys/ccompile.h
+CFLAGS+= -DHAVE_ISSETUGID -DHAVE_STRLCAT -DHAVE_STRLCPY
+CFLAGS.be.c= -Wno-cast-qual
+CFLAGS.be_access.c= -Wno-cast-qual
+CFLAGS.be_error.c= -Wno-cast-qual
+CFLAGS.be_info.c= -Wno-cast-qual
+
+HAS_TESTS= YES
+SUBDIR.${MK_TESTS}+= tests
+
+.include <bsd.lib.mk>
diff --git a/lib/libbe/Makefile.depend b/lib/libbe/Makefile.depend
new file mode 100644
index 000000000000..a171ee51c662
--- /dev/null
+++ b/lib/libbe/Makefile.depend
@@ -0,0 +1,19 @@
+# Autogenerated - do NOT edit!
+
+DIRDEPS = \
+ cddl/lib/libnvpair \
+ cddl/lib/libspl \
+ cddl/lib/libzfs \
+ cddl/lib/libzfsbootenv \
+ include \
+ include/xlocale \
+ lib/${CSU_DIR} \
+ lib/libc \
+ lib/libcompiler_rt \
+
+
+.include <dirdeps.mk>
+
+.if ${DEP_RELDIR} == ${_DEP_RELDIR}
+# local dependencies - needed for -jN in clean tree
+.endif
diff --git a/lib/libbe/be.c b/lib/libbe/be.c
new file mode 100644
index 000000000000..613235d5e908
--- /dev/null
+++ b/lib/libbe/be.c
@@ -0,0 +1,1345 @@
+/*
+ * Copyright (c) 2017 Kyle J. Kneitinger <kyle@kneit.in>
+ *
+ * SPDX-License-Identifier: BSD-2-Clause
+ */
+
+#include <sys/param.h>
+#include <sys/module.h>
+#include <sys/mount.h>
+#include <sys/stat.h>
+#include <sys/ucred.h>
+#include <sys/queue.h>
+#include <sys/zfs_context.h>
+#include <sys/mntent.h>
+#include <sys/zfs_ioctl.h>
+
+#include <libzutil.h>
+#include <ctype.h>
+#include <libgen.h>
+#include <libzfs_core.h>
+#include <libzfs_impl.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <time.h>
+#include <unistd.h>
+#include <libzfsbootenv.h>
+
+#include "be.h"
+#include "be_impl.h"
+
+struct promote_entry {
+ char name[BE_MAXPATHLEN];
+ SLIST_ENTRY(promote_entry) link;
+};
+
+struct be_destroy_data {
+ libbe_handle_t *lbh;
+ char target_name[BE_MAXPATHLEN];
+ char *snapname;
+ SLIST_HEAD(, promote_entry) promotelist;
+};
+
+#if SOON
+static int be_create_child_noent(libbe_handle_t *lbh, const char *active,
+ const char *child_path);
+static int be_create_child_cloned(libbe_handle_t *lbh, const char *active);
+#endif
+
+/* Arbitrary... should tune */
+#define BE_SNAP_SERIAL_MAX 1024
+
+/*
+ * Iterator function for locating the rootfs amongst the children of the
+ * zfs_be_root set by loader(8). data is expected to be a libbe_handle_t *.
+ */
+static int
+be_locate_rootfs(libbe_handle_t *lbh)
+{
+ struct statfs sfs;
+ struct mnttab entry;
+ zfs_handle_t *zfs;
+
+ /*
+ * Check first if root is ZFS; if not, we'll bail on rootfs capture.
+ * Unfortunately needed because zfs_path_to_zhandle will emit to
+ * stderr if / isn't actually a ZFS filesystem, which we'd like
+ * to avoid.
+ */
+ if (statfs("/", &sfs) == 0) {
+ statfs2mnttab(&sfs, &entry);
+ if (strcmp(entry.mnt_fstype, MNTTYPE_ZFS) != 0)
+ return (1);
+ } else
+ return (1);
+ zfs = zfs_path_to_zhandle(lbh->lzh, "/", ZFS_TYPE_FILESYSTEM);
+ if (zfs == NULL)
+ return (1);
+
+ strlcpy(lbh->rootfs, zfs_get_name(zfs), sizeof(lbh->rootfs));
+ zfs_close(zfs);
+ return (0);
+}
+
+/*
+ * Initializes the libbe context to operate in the root boot environment
+ * dataset, for example, zroot/ROOT.
+ */
+libbe_handle_t *
+libbe_init(const char *root)
+{
+ char altroot[MAXPATHLEN];
+ libbe_handle_t *lbh;
+ char *poolname, *pos;
+ int pnamelen;
+
+ lbh = NULL;
+ poolname = pos = NULL;
+
+ /*
+ * If the zfs kmod's not loaded then the later libzfs_init() will load
+ * the module for us, but that's not desirable for a couple reasons. If
+ * the module's not loaded, there's no pool imported and we're going to
+ * fail anyways. We also don't really want libbe consumers to have that
+ * kind of side-effect (module loading) in the general case.
+ */
+ if (modfind("zfs") < 0)
+ goto err;
+
+ if ((lbh = calloc(1, sizeof(libbe_handle_t))) == NULL)
+ goto err;
+
+ if ((lbh->lzh = libzfs_init()) == NULL)
+ goto err;
+
+ /*
+ * Grab rootfs, we'll work backwards from there if an optional BE root
+ * has not been passed in.
+ */
+ if (be_locate_rootfs(lbh) != 0) {
+ if (root == NULL)
+ goto err;
+ *lbh->rootfs = '\0';
+ }
+ if (root == NULL) {
+ /* Strip off the final slash from rootfs to get the be root */
+ strlcpy(lbh->root, lbh->rootfs, sizeof(lbh->root));
+ pos = strrchr(lbh->root, '/');
+ if (pos == NULL)
+ goto err;
+ *pos = '\0';
+ } else
+ strlcpy(lbh->root, root, sizeof(lbh->root));
+
+ if ((pos = strchr(lbh->root, '/')) == NULL)
+ goto err;
+
+ pnamelen = pos - lbh->root;
+ poolname = malloc(pnamelen + 1);
+ if (poolname == NULL)
+ goto err;
+
+ strlcpy(poolname, lbh->root, pnamelen + 1);
+ if ((lbh->active_phandle = zpool_open(lbh->lzh, poolname)) == NULL)
+ goto err;
+ free(poolname);
+ poolname = NULL;
+
+ if (zpool_get_prop(lbh->active_phandle, ZPOOL_PROP_BOOTFS, lbh->bootfs,
+ sizeof(lbh->bootfs), NULL, true) != 0)
+ goto err;
+
+ if (zpool_get_prop(lbh->active_phandle, ZPOOL_PROP_ALTROOT,
+ altroot, sizeof(altroot), NULL, true) == 0 &&
+ strcmp(altroot, "-") != 0)
+ lbh->altroot_len = strlen(altroot);
+
+ (void) lzbe_get_boot_device(zpool_get_name(lbh->active_phandle),
+ &lbh->bootonce);
+
+ return (lbh);
+err:
+ if (lbh != NULL) {
+ if (lbh->active_phandle != NULL)
+ zpool_close(lbh->active_phandle);
+ if (lbh->lzh != NULL)
+ libzfs_fini(lbh->lzh);
+ free(lbh);
+ }
+ free(poolname);
+ return (NULL);
+}
+
+
+/*
+ * Free memory allocated by libbe_init()
+ */
+void
+libbe_close(libbe_handle_t *lbh)
+{
+
+ if (lbh->active_phandle != NULL)
+ zpool_close(lbh->active_phandle);
+ libzfs_fini(lbh->lzh);
+
+ free(lbh->bootonce);
+ free(lbh);
+}
+
+/*
+ * Proxy through to libzfs for the moment.
+ */
+void
+be_nicenum(uint64_t num, char *buf, size_t buflen)
+{
+
+ zfs_nicenum(num, buf, buflen);
+}
+
+static bool
+be_should_promote_clones(zfs_handle_t *zfs_hdl, struct be_destroy_data *bdd)
+{
+ char *atpos;
+
+ if (zfs_get_type(zfs_hdl) != ZFS_TYPE_SNAPSHOT)
+ return (false);
+
+ /*
+ * If we're deleting a snapshot, we need to make sure we only promote
+ * clones that are derived from one of the snapshots we're deleting,
+ * rather than that of a snapshot we're not touching. This keeps stuff
+ * in a consistent state, making sure that we don't error out unless
+ * we really need to.
+ */
+ if (bdd->snapname == NULL)
+ return (true);
+
+ atpos = strchr(zfs_get_name(zfs_hdl), '@');
+ return (strcmp(atpos + 1, bdd->snapname) == 0);
+}
+
+/*
+ * This is executed from be_promote_dependent_clones via zfs_iter_dependents,
+ * It checks if the dependent type is a snapshot then attempts to find any
+ * clones associated with it. Any clones not related to the destroy target are
+ * added to the promote list.
+ */
+static int
+be_dependent_clone_cb(zfs_handle_t *zfs_hdl, void *data)
+{
+ int err;
+ bool found;
+ const char *name;
+ struct nvlist *nvl;
+ struct nvpair *nvp;
+ struct be_destroy_data *bdd;
+ struct promote_entry *entry, *newentry;
+
+ nvp = NULL;
+ err = 0;
+ bdd = (struct be_destroy_data *)data;
+
+ if (be_should_promote_clones(zfs_hdl, bdd) &&
+ (nvl = zfs_get_clones_nvl(zfs_hdl)) != NULL) {
+ while ((nvp = nvlist_next_nvpair(nvl, nvp)) != NULL) {
+ name = nvpair_name(nvp);
+
+ /*
+ * Skip if the clone is equal to, or a child of, the
+ * destroy target.
+ */
+ if (strncmp(name, bdd->target_name,
+ strlen(bdd->target_name)) == 0 ||
+ strstr(name, bdd->target_name) == name) {
+ continue;
+ }
+
+ found = false;
+ SLIST_FOREACH(entry, &bdd->promotelist, link) {
+ if (strcmp(entry->name, name) == 0) {
+ found = true;
+ break;
+ }
+ }
+
+ if (found)
+ continue;
+
+ newentry = malloc(sizeof(struct promote_entry));
+ if (newentry == NULL) {
+ err = ENOMEM;
+ break;
+ }
+
+#define BE_COPY_NAME(entry, src) \
+ strlcpy((entry)->name, (src), sizeof((entry)->name))
+ if (BE_COPY_NAME(newentry, name) >=
+ sizeof(newentry->name)) {
+ /* Shouldn't happen. */
+ free(newentry);
+ err = ENAMETOOLONG;
+ break;
+ }
+#undef BE_COPY_NAME
+
+ /*
+ * We're building up a SLIST here to make sure both that
+ * we get the order right and so that we don't
+ * inadvertently observe the wrong state by promoting
+ * datasets while we're still walking the tree. The
+ * latter can lead to situations where we promote a BE
+ * then effectively demote it again.
+ */
+ SLIST_INSERT_HEAD(&bdd->promotelist, newentry, link);
+ }
+ nvlist_free(nvl);
+ }
+ zfs_close(zfs_hdl);
+ return (err);
+}
+
+/*
+ * This is called before a destroy, so that any datasets(environments) that are
+ * dependent on this one get promoted before destroying the target.
+ */
+static int
+be_promote_dependent_clones(zfs_handle_t *zfs_hdl, struct be_destroy_data *bdd)
+{
+ int err;
+ zfs_handle_t *clone;
+ struct promote_entry *entry;
+
+ snprintf(bdd->target_name, BE_MAXPATHLEN, "%s/", zfs_get_name(zfs_hdl));
+ err = zfs_iter_dependents(zfs_hdl, true, be_dependent_clone_cb, bdd);
+
+ /*
+ * Drain the list and walk away from it if we're only deleting a
+ * snapshot.
+ */
+ if (bdd->snapname != NULL && !SLIST_EMPTY(&bdd->promotelist))
+ err = BE_ERR_HASCLONES;
+ while (!SLIST_EMPTY(&bdd->promotelist)) {
+ entry = SLIST_FIRST(&bdd->promotelist);
+ SLIST_REMOVE_HEAD(&bdd->promotelist, link);
+
+#define ZFS_GRAB_CLONE() \
+ zfs_open(bdd->lbh->lzh, entry->name, ZFS_TYPE_FILESYSTEM)
+ /*
+ * Just skip this part on error, we still want to clean up the
+ * promotion list after the first error. We'll then preserve it
+ * all the way back.
+ */
+ if (err == 0 && (clone = ZFS_GRAB_CLONE()) != NULL) {
+ err = zfs_promote(clone);
+ if (err != 0)
+ err = BE_ERR_DESTROYMNT;
+ zfs_close(clone);
+ }
+#undef ZFS_GRAB_CLONE
+ free(entry);
+ }
+
+ return (err);
+}
+
+static int
+be_destroy_cb(zfs_handle_t *zfs_hdl, void *data)
+{
+ char path[BE_MAXPATHLEN];
+ struct be_destroy_data *bdd;
+ zfs_handle_t *snap;
+ int err;
+
+ bdd = (struct be_destroy_data *)data;
+ if (bdd->snapname == NULL) {
+ err = zfs_iter_children(zfs_hdl, be_destroy_cb, data);
+ if (err != 0)
+ return (err);
+ return (zfs_destroy(zfs_hdl, false));
+ }
+ /* If we're dealing with snapshots instead, delete that one alone */
+ err = zfs_iter_filesystems(zfs_hdl, be_destroy_cb, data);
+ if (err != 0)
+ return (err);
+ /*
+ * This part is intentionally glossing over any potential errors,
+ * because there's a lot less potential for errors when we're cleaning
+ * up snapshots rather than a full deep BE. The primary error case
+ * here being if the snapshot doesn't exist in the first place, which
+ * the caller will likely deem insignificant as long as it doesn't
+ * exist after the call. Thus, such a missing snapshot shouldn't jam
+ * up the destruction.
+ */
+ snprintf(path, sizeof(path), "%s@%s", zfs_get_name(zfs_hdl),
+ bdd->snapname);
+ if (!zfs_dataset_exists(bdd->lbh->lzh, path, ZFS_TYPE_SNAPSHOT))
+ return (0);
+ snap = zfs_open(bdd->lbh->lzh, path, ZFS_TYPE_SNAPSHOT);
+ if (snap != NULL)
+ zfs_destroy(snap, false);
+ return (0);
+}
+
+#define BE_DESTROY_WANTORIGIN (BE_DESTROY_ORIGIN | BE_DESTROY_AUTOORIGIN)
+/*
+ * Destroy the boot environment or snapshot specified by the name
+ * parameter. Options are or'd together with the possible values:
+ * BE_DESTROY_FORCE : forces operation on mounted datasets
+ * BE_DESTROY_ORIGIN: destroy the origin snapshot as well
+ */
+static int
+be_destroy_internal(libbe_handle_t *lbh, const char *name, int options,
+ bool odestroyer)
+{
+ struct be_destroy_data bdd;
+ char origin[BE_MAXPATHLEN], path[BE_MAXPATHLEN];
+ zfs_handle_t *fs;
+ char *snapdelim;
+ int err, force, mounted;
+ size_t rootlen;
+
+ bdd.lbh = lbh;
+ bdd.snapname = NULL;
+ SLIST_INIT(&bdd.promotelist);
+ force = options & BE_DESTROY_FORCE;
+ *origin = '\0';
+
+ be_root_concat(lbh, name, path);
+
+ if ((snapdelim = strchr(path, '@')) == NULL) {
+ if (!zfs_dataset_exists(lbh->lzh, path, ZFS_TYPE_FILESYSTEM))
+ return (set_error(lbh, BE_ERR_NOENT));
+
+ if (strcmp(path, lbh->rootfs) == 0 ||
+ strcmp(path, lbh->bootfs) == 0)
+ return (set_error(lbh, BE_ERR_DESTROYACT));
+
+ fs = zfs_open(lbh->lzh, path, ZFS_TYPE_FILESYSTEM);
+ if (fs == NULL)
+ return (set_error(lbh, BE_ERR_ZFSOPEN));
+
+ /* Don't destroy a mounted dataset unless force is specified */
+ if ((mounted = zfs_is_mounted(fs, NULL)) != 0) {
+ if (force) {
+ zfs_unmount(fs, NULL, 0);
+ } else {
+ free(bdd.snapname);
+ return (set_error(lbh, BE_ERR_DESTROYMNT));
+ }
+ }
+
+ /* Handle destroying bootonce */
+ if (lbh->bootonce != NULL &&
+ strcmp(path, lbh->bootonce) == 0)
+ (void) lzbe_set_boot_device(
+ zpool_get_name(lbh->active_phandle), lzbe_add, NULL);
+ } else {
+ /*
+ * If we're initially destroying a snapshot, origin options do
+ * not make sense. If we're destroying the origin snapshot of
+ * a BE, we want to maintain the options in case we need to
+ * fake success after failing to promote.
+ */
+ if (!odestroyer)
+ options &= ~BE_DESTROY_WANTORIGIN;
+ if (!zfs_dataset_exists(lbh->lzh, path, ZFS_TYPE_SNAPSHOT))
+ return (set_error(lbh, BE_ERR_NOENT));
+
+ bdd.snapname = strdup(snapdelim + 1);
+ if (bdd.snapname == NULL)
+ return (set_error(lbh, BE_ERR_NOMEM));
+ *snapdelim = '\0';
+ fs = zfs_open(lbh->lzh, path, ZFS_TYPE_DATASET);
+ if (fs == NULL) {
+ free(bdd.snapname);
+ return (set_error(lbh, BE_ERR_ZFSOPEN));
+ }
+ }
+
+ /*
+ * Whether we're destroying a BE or a single snapshot, we need to walk
+ * the tree of what we're going to destroy and promote everything in our
+ * path so that we can make it happen.
+ */
+ if ((err = be_promote_dependent_clones(fs, &bdd)) != 0) {
+ free(bdd.snapname);
+
+ /*
+ * If we're just destroying the origin of some other dataset
+ * we were invoked to destroy, then we just ignore
+ * BE_ERR_HASCLONES and return success unless the caller wanted
+ * to force the issue.
+ */
+ if (odestroyer && err == BE_ERR_HASCLONES &&
+ (options & BE_DESTROY_AUTOORIGIN) != 0)
+ return (0);
+ return (set_error(lbh, err));
+ }
+
+ /*
+ * This was deferred until after we promote all of the derivatives so
+ * that we grab the new origin after everything's settled down.
+ */
+ if ((options & BE_DESTROY_WANTORIGIN) != 0 &&
+ zfs_prop_get(fs, ZFS_PROP_ORIGIN, origin, sizeof(origin),
+ NULL, NULL, 0, 1) != 0 &&
+ (options & BE_DESTROY_ORIGIN) != 0)
+ return (set_error(lbh, BE_ERR_NOORIGIN));
+
+ /*
+ * If the caller wants auto-origin destruction and the origin
+ * name matches one of our automatically created snapshot names
+ * (i.e. strftime("%F-%T") with a serial at the end), then
+ * we'll set the DESTROY_ORIGIN flag and nuke it
+ * be_is_auto_snapshot_name is exported from libbe(3) so that
+ * the caller can determine if it needs to warn about the origin
+ * not being destroyed or not.
+ */
+ if ((options & BE_DESTROY_AUTOORIGIN) != 0 && *origin != '\0' &&
+ be_is_auto_snapshot_name(lbh, origin))
+ options |= BE_DESTROY_ORIGIN;
+
+ err = be_destroy_cb(fs, &bdd);
+ zfs_close(fs);
+ free(bdd.snapname);
+ if (err != 0) {
+ /* Children are still present or the mount is referenced */
+ if (err == EBUSY)
+ return (set_error(lbh, BE_ERR_DESTROYMNT));
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ }
+
+ if ((options & BE_DESTROY_ORIGIN) == 0)
+ return (0);
+
+ /* The origin can't possibly be shorter than the BE root */
+ rootlen = strlen(lbh->root);
+ if (*origin == '\0' || strlen(origin) <= rootlen + 1)
+ return (set_error(lbh, BE_ERR_INVORIGIN));
+
+ /*
+ * We'll be chopping off the BE root and running this back through
+ * be_destroy, so that we properly handle the origin snapshot whether
+ * it be that of a deep BE or not.
+ */
+ if (strncmp(origin, lbh->root, rootlen) != 0 || origin[rootlen] != '/')
+ return (0);
+
+ return (be_destroy_internal(lbh, origin + rootlen + 1,
+ options & ~BE_DESTROY_ORIGIN, true));
+}
+
+int
+be_destroy(libbe_handle_t *lbh, const char *name, int options)
+{
+
+ /*
+ * The consumer must not set both BE_DESTROY_AUTOORIGIN and
+ * BE_DESTROY_ORIGIN. Internally, we'll set the latter from the former.
+ * The latter should imply that we must succeed at destroying the
+ * origin, or complain otherwise.
+ */
+ if ((options & BE_DESTROY_WANTORIGIN) == BE_DESTROY_WANTORIGIN)
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ return (be_destroy_internal(lbh, name, options, false));
+}
+
+static void
+be_setup_snapshot_name(libbe_handle_t *lbh, char *buf, size_t buflen)
+{
+ time_t rawtime;
+ int len, serial;
+
+ time(&rawtime);
+ len = strlen(buf);
+ len += strftime(buf + len, buflen - len, "@%F-%T", localtime(&rawtime));
+ /* No room for serial... caller will do its best */
+ if (buflen - len < 2)
+ return;
+
+ for (serial = 0; serial < BE_SNAP_SERIAL_MAX; ++serial) {
+ snprintf(buf + len, buflen - len, "-%d", serial);
+ if (!zfs_dataset_exists(lbh->lzh, buf, ZFS_TYPE_SNAPSHOT))
+ return;
+ }
+}
+
+bool
+be_is_auto_snapshot_name(libbe_handle_t *lbh __unused, const char *name)
+{
+ const char *snap;
+ int day, hour, minute, month, second, serial, year;
+
+ if ((snap = strchr(name, '@')) == NULL)
+ return (false);
+ ++snap;
+ /* We'll grab the individual components and do some light validation. */
+ if (sscanf(snap, "%d-%d-%d-%d:%d:%d-%d", &year, &month, &day, &hour,
+ &minute, &second, &serial) != 7)
+ return (false);
+ return (year >= 1970) && (month >= 1 && month <= 12) &&
+ (day >= 1 && day <= 31) && (hour >= 0 && hour <= 23) &&
+ (minute >= 0 && minute <= 59) && (second >= 0 && second <= 60) &&
+ serial >= 0;
+}
+
+int
+be_snapshot(libbe_handle_t *lbh, const char *source, const char *snap_name,
+ bool recursive, char *result)
+{
+ char buf[BE_MAXPATHLEN];
+ int err;
+
+ be_root_concat(lbh, source, buf);
+
+ if ((err = be_exists(lbh, buf)) != 0)
+ return (set_error(lbh, err));
+
+ if (snap_name != NULL) {
+ if (strlcat(buf, "@", sizeof(buf)) >= sizeof(buf))
+ return (set_error(lbh, BE_ERR_INVALIDNAME));
+
+ if (strlcat(buf, snap_name, sizeof(buf)) >= sizeof(buf))
+ return (set_error(lbh, BE_ERR_INVALIDNAME));
+
+ if (result != NULL)
+ snprintf(result, BE_MAXPATHLEN, "%s@%s", source,
+ snap_name);
+ } else {
+ be_setup_snapshot_name(lbh, buf, sizeof(buf));
+
+ if (result != NULL && strlcpy(result, strrchr(buf, '/') + 1,
+ sizeof(buf)) >= sizeof(buf))
+ return (set_error(lbh, BE_ERR_INVALIDNAME));
+ }
+ if ((err = zfs_snapshot(lbh->lzh, buf, recursive, NULL)) != 0) {
+ switch (err) {
+ case EZFS_INVALIDNAME:
+ return (set_error(lbh, BE_ERR_INVALIDNAME));
+
+ default:
+ /*
+ * The other errors that zfs_ioc_snapshot might return
+ * shouldn't happen if we've set things up properly, so
+ * we'll gloss over them and call it UNKNOWN as it will
+ * require further triage.
+ */
+ if (errno == ENOTSUP)
+ return (set_error(lbh, BE_ERR_NOPOOL));
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ }
+ }
+
+ return (BE_ERR_SUCCESS);
+}
+
+
+/*
+ * Create the boot environment specified by the name parameter
+ */
+int
+be_create(libbe_handle_t *lbh, const char *name)
+{
+ int err;
+
+ err = be_create_from_existing(lbh, name, be_active_path(lbh));
+
+ return (set_error(lbh, err));
+}
+
+static int
+be_deep_clone_prop(int prop, void *cb)
+{
+ int err;
+ struct libbe_dccb *dccb;
+ zprop_source_t src;
+ char pval[BE_MAXPATHLEN];
+ char source[BE_MAXPATHLEN];
+ char *val;
+
+ dccb = cb;
+ /* Skip some properties we don't want to touch */
+ switch (prop) {
+ /*
+ * libzfs insists on these being naturally inherited in the
+ * cloning process.
+ */
+ case ZFS_PROP_KEYFORMAT:
+ case ZFS_PROP_KEYLOCATION:
+ case ZFS_PROP_ENCRYPTION:
+ case ZFS_PROP_PBKDF2_ITERS:
+
+ /* FALLTHROUGH */
+ case ZFS_PROP_CANMOUNT: /* Forced by libbe */
+ return (ZPROP_CONT);
+ }
+
+ /* Don't copy readonly properties */
+ if (zfs_prop_readonly(prop))
+ return (ZPROP_CONT);
+
+ if ((err = zfs_prop_get(dccb->zhp, prop, (char *)&pval,
+ sizeof(pval), &src, (char *)&source, sizeof(source), false)))
+ /* Just continue if we fail to read a property */
+ return (ZPROP_CONT);
+
+ /*
+ * Only copy locally defined or received properties. This continues
+ * to avoid temporary/default/local properties intentionally without
+ * breaking received datasets.
+ */
+ if (src != ZPROP_SRC_LOCAL && src != ZPROP_SRC_RECEIVED)
+ return (ZPROP_CONT);
+
+ /* Augment mountpoint with altroot, if needed */
+ val = pval;
+ if (prop == ZFS_PROP_MOUNTPOINT)
+ val = be_mountpoint_augmented(dccb->lbh, val);
+
+ nvlist_add_string(dccb->props, zfs_prop_to_name(prop), val);
+
+ return (ZPROP_CONT);
+}
+
+/*
+ * Return the corresponding boot environment path for a given
+ * dataset path, the constructed path is placed in 'result'.
+ *
+ * example: say our new boot environment name is 'bootenv' and
+ * the dataset path is 'zroot/ROOT/default/data/set'.
+ *
+ * result should produce: 'zroot/ROOT/bootenv/data/set'
+ */
+static int
+be_get_path(struct libbe_deep_clone *ldc, const char *dspath, char *result, int result_size)
+{
+ char *pos;
+ char *child_dataset;
+
+ /* match the root path for the boot environments */
+ pos = strstr(dspath, ldc->lbh->root);
+
+ /* no match, different pools? */
+ if (pos == NULL)
+ return (BE_ERR_BADPATH);
+
+ /* root path of the new boot environment */
+ snprintf(result, result_size, "%s/%s", ldc->lbh->root, ldc->bename);
+
+ /* gets us to the parent dataset, the +1 consumes a trailing slash */
+ pos += strlen(ldc->lbh->root) + 1;
+
+ /* skip the parent dataset */
+ if ((child_dataset = strchr(pos, '/')) != NULL)
+ strlcat(result, child_dataset, result_size);
+
+ return (BE_ERR_SUCCESS);
+}
+
+static int
+be_clone_cb(zfs_handle_t *ds, void *data)
+{
+ int err;
+ char be_path[BE_MAXPATHLEN];
+ char snap_path[BE_MAXPATHLEN];
+ const char *dspath;
+ zfs_handle_t *snap_hdl;
+ nvlist_t *props;
+ struct libbe_deep_clone *ldc;
+ struct libbe_dccb dccb;
+
+ ldc = (struct libbe_deep_clone *)data;
+ dspath = zfs_get_name(ds);
+
+ snprintf(snap_path, sizeof(snap_path), "%s@%s", dspath, ldc->snapname);
+
+ /* construct the boot environment path from the dataset we're cloning */
+ if (be_get_path(ldc, dspath, be_path, sizeof(be_path)) != BE_ERR_SUCCESS)
+ return (BE_ERR_UNKNOWN);
+
+ /* the dataset to be created (i.e. the boot environment) already exists */
+ if (zfs_dataset_exists(ldc->lbh->lzh, be_path, ZFS_TYPE_DATASET))
+ return (BE_ERR_EXISTS);
+
+ /* no snapshot found for this dataset, silently skip it */
+ if (!zfs_dataset_exists(ldc->lbh->lzh, snap_path, ZFS_TYPE_SNAPSHOT))
+ return (0);
+
+ if ((snap_hdl =
+ zfs_open(ldc->lbh->lzh, snap_path, ZFS_TYPE_SNAPSHOT)) == NULL)
+ return (BE_ERR_ZFSOPEN);
+
+ nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
+ nvlist_add_string(props, "canmount", "noauto");
+
+ dccb.lbh = ldc->lbh;
+ dccb.zhp = ds;
+ dccb.props = props;
+ if (zprop_iter(be_deep_clone_prop, &dccb, B_FALSE, B_FALSE,
+ ZFS_TYPE_FILESYSTEM) == ZPROP_INVAL)
+ return (-1);
+
+ if ((err = zfs_clone(snap_hdl, be_path, props)) != 0)
+ return (BE_ERR_ZFSCLONE);
+
+ nvlist_free(props);
+ zfs_close(snap_hdl);
+
+ if (ldc->depth_limit == -1 || ldc->depth < ldc->depth_limit) {
+ ldc->depth++;
+ err = zfs_iter_filesystems(ds, be_clone_cb, ldc);
+ ldc->depth--;
+ }
+
+ return (err);
+}
+
+/*
+ * Create a boot environment with a given name from a given snapshot.
+ * Snapshots can be in the format 'zroot/ROOT/default@snapshot' or
+ * 'default@snapshot'. In the latter case, 'default@snapshot' will be prepended
+ * with the root path that libbe was initailized with.
+*/
+static int
+be_clone(libbe_handle_t *lbh, const char *bename, const char *snapshot, int depth)
+{
+ int err;
+ char snap_path[BE_MAXPATHLEN];
+ char *parentname, *snapname;
+ zfs_handle_t *parent_hdl;
+ struct libbe_deep_clone ldc;
+
+ /* ensure the boot environment name is valid */
+ if ((err = be_validate_name(lbh, bename)) != 0)
+ return (set_error(lbh, err));
+
+ /*
+ * prepend the boot environment root path if we're
+ * given a partial snapshot name.
+ */
+ if ((err = be_root_concat(lbh, snapshot, snap_path)) != 0)
+ return (set_error(lbh, err));
+
+ /* ensure the snapshot exists */
+ if ((err = be_validate_snap(lbh, snap_path)) != 0)
+ return (set_error(lbh, err));
+
+ /* get a copy of the snapshot path so we can disect it */
+ if ((parentname = strdup(snap_path)) == NULL)
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+
+ /* split dataset name from snapshot name */
+ snapname = strchr(parentname, '@');
+ if (snapname == NULL) {
+ free(parentname);
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ }
+ *snapname = '\0';
+ snapname++;
+
+ /* set-up the boot environment */
+ ldc.lbh = lbh;
+ ldc.bename = bename;
+ ldc.snapname = snapname;
+ ldc.depth = 0;
+ ldc.depth_limit = depth;
+
+ /* the boot environment will be cloned from this dataset */
+ parent_hdl = zfs_open(lbh->lzh, parentname, ZFS_TYPE_DATASET);
+
+ /* create the boot environment */
+ err = be_clone_cb(parent_hdl, &ldc);
+
+ free(parentname);
+ return (set_error(lbh, err));
+}
+
+/*
+ * Create a boot environment from pre-existing snapshot, specifying a depth.
+ */
+int be_create_depth(libbe_handle_t *lbh, const char *bename,
+ const char *snap, int depth)
+{
+ return (be_clone(lbh, bename, snap, depth));
+}
+
+/*
+ * Create the boot environment from pre-existing snapshot
+ */
+int
+be_create_from_existing_snap(libbe_handle_t *lbh, const char *bename,
+ const char *snap)
+{
+ return (be_clone(lbh, bename, snap, -1));
+}
+
+
+/*
+ * Create a boot environment from an existing boot environment
+ */
+int
+be_create_from_existing(libbe_handle_t *lbh, const char *bename, const char *old)
+{
+ int err;
+ char snap[BE_MAXPATHLEN];
+
+ if ((err = be_snapshot(lbh, old, NULL, true, snap)) != 0)
+ return (set_error(lbh, err));
+
+ err = be_clone(lbh, bename, snap, -1);
+
+ return (set_error(lbh, err));
+}
+
+
+/*
+ * Verifies that a snapshot has a valid name, exists, and has a mountpoint of
+ * '/'. Returns BE_ERR_SUCCESS (0), upon success, or the relevant BE_ERR_* upon
+ * failure. Does not set the internal library error state.
+ */
+int
+be_validate_snap(libbe_handle_t *lbh, const char *snap_name)
+{
+
+ if (strlen(snap_name) >= BE_MAXPATHLEN)
+ return (BE_ERR_PATHLEN);
+
+ if (!zfs_name_valid(snap_name, ZFS_TYPE_SNAPSHOT))
+ return (BE_ERR_INVALIDNAME);
+
+ if (!zfs_dataset_exists(lbh->lzh, snap_name,
+ ZFS_TYPE_SNAPSHOT))
+ return (BE_ERR_NOENT);
+
+ return (BE_ERR_SUCCESS);
+}
+
+
+/*
+ * Idempotently appends the name argument to the root boot environment path
+ * and copies the resulting string into the result buffer (which is assumed
+ * to be at least BE_MAXPATHLEN characters long. Returns BE_ERR_SUCCESS upon
+ * success, BE_ERR_PATHLEN if the resulting path is longer than BE_MAXPATHLEN,
+ * or BE_ERR_INVALIDNAME if the name is a path that does not begin with
+ * zfs_be_root. Does not set internal library error state.
+ */
+int
+be_root_concat(libbe_handle_t *lbh, const char *name, char *result)
+{
+ size_t name_len, root_len;
+
+ name_len = strlen(name);
+ root_len = strlen(lbh->root);
+
+ /* Act idempotently; return be name if it is already a full path */
+ if (strrchr(name, '/') != NULL) {
+ if (strstr(name, lbh->root) != name)
+ return (BE_ERR_INVALIDNAME);
+
+ if (name_len >= BE_MAXPATHLEN)
+ return (BE_ERR_PATHLEN);
+
+ strlcpy(result, name, BE_MAXPATHLEN);
+ return (BE_ERR_SUCCESS);
+ } else if (name_len + root_len + 1 < BE_MAXPATHLEN) {
+ snprintf(result, BE_MAXPATHLEN, "%s/%s", lbh->root,
+ name);
+ return (BE_ERR_SUCCESS);
+ }
+
+ return (BE_ERR_PATHLEN);
+}
+
+
+/*
+ * Verifies the validity of a boot environment name (A-Za-z0-9-_.). Returns
+ * BE_ERR_SUCCESS (0) if name is valid, otherwise returns BE_ERR_INVALIDNAME
+ * or BE_ERR_PATHLEN.
+ * Does not set internal library error state.
+ */
+int
+be_validate_name(libbe_handle_t *lbh, const char *name)
+{
+
+ /*
+ * Impose the additional restriction that the entire dataset name must
+ * not exceed the maximum length of a dataset, i.e. MAXNAMELEN.
+ */
+ if (strlen(lbh->root) + 1 + strlen(name) > MAXNAMELEN)
+ return (BE_ERR_PATHLEN);
+
+ if (!zfs_name_valid(name, ZFS_TYPE_DATASET))
+ return (BE_ERR_INVALIDNAME);
+
+ /*
+ * ZFS allows spaces in boot environment names, but the kernel can't
+ * handle booting from such a dataset right now. vfs.root.mountfrom
+ * is defined to be a space-separated list, and there's no protocol for
+ * escaping whitespace in the path component of a dev:path spec. So
+ * while loader can handle this situation alright, it can't safely pass
+ * it on to mountroot.
+ */
+ if (strchr(name, ' ') != NULL)
+ return (BE_ERR_INVALIDNAME);
+
+ return (BE_ERR_SUCCESS);
+}
+
+
+/*
+ * usage
+ */
+int
+be_rename(libbe_handle_t *lbh, const char *old, const char *new)
+{
+ char full_old[BE_MAXPATHLEN];
+ char full_new[BE_MAXPATHLEN];
+ zfs_handle_t *zfs_hdl;
+ int err;
+
+ /*
+ * be_validate_name is documented not to set error state, so we should
+ * do so here.
+ */
+ if ((err = be_validate_name(lbh, new)) != 0)
+ return (set_error(lbh, err));
+ if ((err = be_root_concat(lbh, old, full_old)) != 0)
+ return (set_error(lbh, err));
+ if ((err = be_root_concat(lbh, new, full_new)) != 0)
+ return (set_error(lbh, err));
+
+ if (!zfs_dataset_exists(lbh->lzh, full_old, ZFS_TYPE_DATASET))
+ return (set_error(lbh, BE_ERR_NOENT));
+
+ if (zfs_dataset_exists(lbh->lzh, full_new, ZFS_TYPE_DATASET))
+ return (set_error(lbh, BE_ERR_EXISTS));
+
+ if ((zfs_hdl = zfs_open(lbh->lzh, full_old,
+ ZFS_TYPE_FILESYSTEM)) == NULL)
+ return (set_error(lbh, BE_ERR_ZFSOPEN));
+
+ /* recurse, nounmount, forceunmount */
+ struct renameflags flags = {
+ .nounmount = 1,
+ };
+ err = zfs_rename(zfs_hdl, full_new, flags);
+ if (err != 0)
+ goto error;
+
+ /* handle renaming bootonce */
+ if (lbh->bootonce != NULL &&
+ strcmp(full_old, lbh->bootonce) == 0)
+ err = be_activate(lbh, new, true);
+
+error:
+ zfs_close(zfs_hdl);
+ return (set_error(lbh, err));
+}
+
+
+int
+be_export(libbe_handle_t *lbh, const char *bootenv, int fd)
+{
+ char snap_name[BE_MAXPATHLEN];
+ char buf[BE_MAXPATHLEN];
+ zfs_handle_t *zfs;
+ sendflags_t flags = { 0 };
+ int err;
+
+ if ((err = be_snapshot(lbh, bootenv, NULL, true, snap_name)) != 0)
+ /* Use the error set by be_snapshot */
+ return (err);
+
+ be_root_concat(lbh, snap_name, buf);
+
+ if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_DATASET)) == NULL)
+ return (set_error(lbh, BE_ERR_ZFSOPEN));
+
+ err = zfs_send_one(zfs, NULL, fd, &flags, /* redactbook */ NULL);
+ zfs_close(zfs);
+
+ return (err);
+}
+
+
+int
+be_import(libbe_handle_t *lbh, const char *bootenv, int fd)
+{
+ char buf[BE_MAXPATHLEN];
+ nvlist_t *props;
+ zfs_handle_t *zfs;
+ recvflags_t flags = { .nomount = 1 };
+ int err;
+
+ be_root_concat(lbh, bootenv, buf);
+
+ if ((err = zfs_receive(lbh->lzh, buf, NULL, &flags, fd, NULL)) != 0) {
+ switch (err) {
+ case EINVAL:
+ return (set_error(lbh, BE_ERR_NOORIGIN));
+ case ENOENT:
+ return (set_error(lbh, BE_ERR_NOENT));
+ case EIO:
+ return (set_error(lbh, BE_ERR_IO));
+ default:
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ }
+ }
+
+ if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_FILESYSTEM)) == NULL)
+ return (set_error(lbh, BE_ERR_ZFSOPEN));
+
+ nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
+ nvlist_add_string(props, "canmount", "noauto");
+ nvlist_add_string(props, "mountpoint", "none");
+
+ err = zfs_prop_set_list(zfs, props);
+ nvlist_free(props);
+
+ zfs_close(zfs);
+
+ if (err != 0)
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+
+ return (0);
+}
+
+#if SOON
+static int
+be_create_child_noent(libbe_handle_t *lbh, const char *active,
+ const char *child_path)
+{
+ nvlist_t *props;
+ zfs_handle_t *zfs;
+ int err;
+
+ nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
+ nvlist_add_string(props, "canmount", "noauto");
+ nvlist_add_string(props, "mountpoint", child_path);
+
+ /* Create */
+ if ((err = zfs_create(lbh->lzh, active, ZFS_TYPE_DATASET,
+ props)) != 0) {
+ switch (err) {
+ case EZFS_EXISTS:
+ return (set_error(lbh, BE_ERR_EXISTS));
+ case EZFS_NOENT:
+ return (set_error(lbh, BE_ERR_NOENT));
+ case EZFS_BADTYPE:
+ case EZFS_BADVERSION:
+ return (set_error(lbh, BE_ERR_NOPOOL));
+ case EZFS_BADPROP:
+ default:
+ /* We set something up wrong, probably... */
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ }
+ }
+ nvlist_free(props);
+
+ if ((zfs = zfs_open(lbh->lzh, active, ZFS_TYPE_DATASET)) == NULL)
+ return (set_error(lbh, BE_ERR_ZFSOPEN));
+
+ /* Set props */
+ if ((err = zfs_prop_set(zfs, "canmount", "noauto")) != 0) {
+ zfs_close(zfs);
+ /*
+ * Similar to other cases, this shouldn't fail unless we've
+ * done something wrong. This is a new dataset that shouldn't
+ * have been mounted anywhere between creation and now.
+ */
+ if (err == EZFS_NOMEM)
+ return (set_error(lbh, BE_ERR_NOMEM));
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ }
+ zfs_close(zfs);
+ return (BE_ERR_SUCCESS);
+}
+
+static int
+be_create_child_cloned(libbe_handle_t *lbh, const char *active)
+{
+ char buf[BE_MAXPATHLEN], tmp[BE_MAXPATHLEN];
+ zfs_handle_t *zfs;
+ int err;
+
+ /* XXX TODO ? */
+
+ /*
+ * Establish if the existing path is a zfs dataset or just
+ * the subdirectory of one
+ */
+ strlcpy(tmp, "tmp/be_snap.XXXXX", sizeof(tmp));
+ if (mktemp(tmp) == NULL)
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+
+ be_root_concat(lbh, tmp, buf);
+ printf("Here %s?\n", buf);
+ if ((err = zfs_snapshot(lbh->lzh, buf, false, NULL)) != 0) {
+ switch (err) {
+ case EZFS_INVALIDNAME:
+ return (set_error(lbh, BE_ERR_INVALIDNAME));
+
+ default:
+ /*
+ * The other errors that zfs_ioc_snapshot might return
+ * shouldn't happen if we've set things up properly, so
+ * we'll gloss over them and call it UNKNOWN as it will
+ * require further triage.
+ */
+ if (errno == ENOTSUP)
+ return (set_error(lbh, BE_ERR_NOPOOL));
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ }
+ }
+
+ /* Clone */
+ if ((zfs = zfs_open(lbh->lzh, buf, ZFS_TYPE_SNAPSHOT)) == NULL)
+ return (BE_ERR_ZFSOPEN);
+
+ if ((err = zfs_clone(zfs, active, NULL)) != 0)
+ /* XXX TODO correct error */
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+
+ /* set props */
+ zfs_close(zfs);
+ return (BE_ERR_SUCCESS);
+}
+
+int
+be_add_child(libbe_handle_t *lbh, const char *child_path, bool cp_if_exists)
+{
+ struct stat sb;
+ char active[BE_MAXPATHLEN], buf[BE_MAXPATHLEN];
+ nvlist_t *props;
+ const char *s;
+
+ /* Require absolute paths */
+ if (*child_path != '/')
+ return (set_error(lbh, BE_ERR_BADPATH));
+
+ strlcpy(active, be_active_path(lbh), BE_MAXPATHLEN);
+ strcpy(buf, active);
+
+ /* Create non-mountable parent dataset(s) */
+ s = child_path;
+ for (char *p; (p = strchr(s+1, '/')) != NULL; s = p) {
+ size_t len = p - s;
+ strncat(buf, s, len);
+
+ nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
+ nvlist_add_string(props, "canmount", "off");
+ nvlist_add_string(props, "mountpoint", "none");
+ zfs_create(lbh->lzh, buf, ZFS_TYPE_DATASET, props);
+ nvlist_free(props);
+ }
+
+ /* Path does not exist as a descendent of / yet */
+ if (strlcat(active, child_path, BE_MAXPATHLEN) >= BE_MAXPATHLEN)
+ return (set_error(lbh, BE_ERR_PATHLEN));
+
+ if (stat(child_path, &sb) != 0) {
+ /* Verify that error is ENOENT */
+ if (errno != ENOENT)
+ return (set_error(lbh, BE_ERR_UNKNOWN));
+ return (be_create_child_noent(lbh, active, child_path));
+ } else if (cp_if_exists)
+ /* Path is already a descendent of / and should be copied */
+ return (be_create_child_cloned(lbh, active));
+ return (set_error(lbh, BE_ERR_EXISTS));
+}
+#endif /* SOON */
+
+/*
+ * Deactivate old BE dataset; currently just sets canmount=noauto or
+ * resets boot once configuration.
+ */
+int
+be_deactivate(libbe_handle_t *lbh, const char *ds, bool temporary)
+{
+ zfs_handle_t *zfs;
+
+ if (temporary) {
+ return (lzbe_set_boot_device(
+ zpool_get_name(lbh->active_phandle), lzbe_add, NULL));
+ }
+
+ if ((zfs = zfs_open(lbh->lzh, ds, ZFS_TYPE_DATASET)) == NULL)
+ return (1);
+ if (zfs_prop_set(zfs, "canmount", "noauto") != 0)
+ return (1);
+ zfs_close(zfs);
+ return (0);
+}
+
+static int
+be_zfs_promote_cb(zfs_handle_t *zhp, void *data)
+{
+ char origin[BE_MAXPATHLEN];
+ bool *found_origin = (bool *)data;
+ int err;
+
+ if (zfs_prop_get(zhp, ZFS_PROP_ORIGIN, origin, sizeof(origin),
+ NULL, NULL, 0, true) == 0) {
+ *found_origin = true;
+ err = zfs_promote(zhp);
+ if (err)
+ return (err);
+ }
+
+ return (zfs_iter_filesystems(zhp, be_zfs_promote_cb, data));
+}
+
+static int
+be_zfs_promote(zfs_handle_t *zhp, bool *found_origin)
+{
+ *found_origin = false;
+ return (be_zfs_promote_cb(zhp, (void *)found_origin));
+}
+
+int
+be_activate(libbe_handle_t *lbh, const char *bootenv, bool temporary)
+{
+ char be_path[BE_MAXPATHLEN];
+ zfs_handle_t *zhp;
+ int err;
+ bool found_origin;
+
+ be_root_concat(lbh, bootenv, be_path);
+
+ /* Note: be_exists fails if mountpoint is not / */
+ if ((err = be_exists(lbh, be_path)) != 0)
+ return (set_error(lbh, err));
+
+ if (temporary) {
+ return (lzbe_set_boot_device(
+ zpool_get_name(lbh->active_phandle), lzbe_add, be_path));
+ } else {
+ if (strncmp(lbh->bootfs, "-", 1) != 0 &&
+ be_deactivate(lbh, lbh->bootfs, false) != 0)
+ return (-1);
+
+ /* Obtain bootenv zpool */
+ err = zpool_set_prop(lbh->active_phandle, "bootfs", be_path);
+ if (err)
+ return (-1);
+
+ for (;;) {
+ zhp = zfs_open(lbh->lzh, be_path, ZFS_TYPE_FILESYSTEM);
+ if (zhp == NULL)
+ return (-1);
+
+ err = be_zfs_promote(zhp, &found_origin);
+
+ zfs_close(zhp);
+ if (!found_origin)
+ break;
+ if (err)
+ return (err);
+ }
+
+ if (err)
+ return (-1);
+ }
+
+ return (BE_ERR_SUCCESS);
+}
diff --git a/lib/libbe/be.h b/lib/libbe/be.h
new file mode 100644
index 000000000000..01ee94fd03ca
--- /dev/null
+++ b/lib/libbe/be.h
@@ -0,0 +1,115 @@
+/*
+ * Copyright (c) 2017 Kyle J. Kneitinger <kyle@kneit.in>
+ *
+ * SPDX-License-Identifier: BSD-2-Clause
+ */
+
+#ifndef _LIBBE_H
+#define _LIBBE_H
+
+#include <libnvpair.h>
+#include <stdbool.h>
+
+#define BE_MAXPATHLEN 512
+
+typedef struct libbe_handle libbe_handle_t;
+
+typedef enum be_error {
+ BE_ERR_SUCCESS = 0, /* No error */
+ BE_ERR_INVALIDNAME, /* invalid boot env name */
+ BE_ERR_EXISTS, /* boot env name already taken */
+ BE_ERR_NOENT, /* boot env doesn't exist */
+ BE_ERR_PERMS, /* insufficient permissions */
+ BE_ERR_DESTROYACT, /* cannot destroy active boot env */
+ BE_ERR_DESTROYMNT, /* destroying a mounted be requires force */
+ BE_ERR_BADPATH, /* path not suitable for operation */
+ BE_ERR_PATHBUSY, /* requested path is busy */
+ BE_ERR_PATHLEN, /* provided name exceeds maximum length limit */
+ BE_ERR_BADMOUNT, /* mountpoint is not '/' */
+ BE_ERR_NOORIGIN, /* could not open snapshot's origin */
+ BE_ERR_MOUNTED, /* boot environment is already mounted */
+ BE_ERR_NOMOUNT, /* boot environment is not mounted */
+ BE_ERR_ZFSOPEN, /* calling zfs_open() failed */
+ BE_ERR_ZFSCLONE, /* error when calling zfs_clone to create be */
+ BE_ERR_IO, /* error when doing some I/O operation */
+ BE_ERR_NOPOOL, /* operation not supported on this pool */
+ BE_ERR_NOMEM, /* insufficient memory */
+ BE_ERR_UNKNOWN, /* unknown error */
+ BE_ERR_INVORIGIN, /* invalid origin */
+ BE_ERR_HASCLONES, /* snapshot has clones */
+} be_error_t;
+
+
+/* Library handling functions: be.c */
+libbe_handle_t *libbe_init(const char *root);
+void libbe_close(libbe_handle_t *);
+
+/* Bootenv information functions: be_info.c */
+const char *be_active_name(libbe_handle_t *);
+const char *be_active_path(libbe_handle_t *);
+const char *be_nextboot_name(libbe_handle_t *);
+const char *be_nextboot_path(libbe_handle_t *);
+const char *be_root_path(libbe_handle_t *);
+
+int be_get_bootenv_props(libbe_handle_t *, nvlist_t *);
+int be_get_dataset_props(libbe_handle_t *, const char *, nvlist_t *);
+int be_get_dataset_snapshots(libbe_handle_t *, const char *, nvlist_t *);
+int be_prop_list_alloc(nvlist_t **be_list);
+void be_prop_list_free(nvlist_t *be_list);
+
+int be_activate(libbe_handle_t *, const char *, bool);
+int be_deactivate(libbe_handle_t *, const char *, bool);
+
+bool be_is_auto_snapshot_name(libbe_handle_t *, const char *);
+
+/* Bootenv creation functions */
+int be_create(libbe_handle_t *, const char *);
+int be_create_depth(libbe_handle_t *, const char *, const char *, int);
+int be_create_from_existing(libbe_handle_t *, const char *, const char *);
+int be_create_from_existing_snap(libbe_handle_t *, const char *, const char *);
+int be_snapshot(libbe_handle_t *, const char *, const char *, bool, char *);
+
+/* Bootenv manipulation functions */
+int be_rename(libbe_handle_t *, const char *, const char *);
+
+/* Bootenv removal functions */
+
+typedef enum {
+ BE_DESTROY_FORCE = 1 << 0,
+ BE_DESTROY_ORIGIN = 1 << 1,
+ BE_DESTROY_AUTOORIGIN = 1 << 2,
+} be_destroy_opt_t;
+
+int be_destroy(libbe_handle_t *, const char *, int);
+
+/* Bootenv mounting functions: be_access.c */
+
+typedef enum {
+ BE_MNT_FORCE = 1 << 0,
+ BE_MNT_DEEP = 1 << 1,
+} be_mount_opt_t;
+
+int be_mount(libbe_handle_t *, const char *, const char *, int, char *);
+int be_unmount(libbe_handle_t *, const char *, int);
+int be_mounted_at(libbe_handle_t *, const char *path, nvlist_t *);
+
+/* Error related functions: be_error.c */
+int libbe_errno(libbe_handle_t *);
+const char *libbe_error_description(libbe_handle_t *);
+void libbe_print_on_error(libbe_handle_t *, bool);
+
+/* Utility Functions */
+int be_root_concat(libbe_handle_t *, const char *, char *);
+int be_validate_name(libbe_handle_t * __unused, const char *);
+int be_validate_snap(libbe_handle_t *, const char *);
+int be_exists(libbe_handle_t *, const char *);
+
+int be_export(libbe_handle_t *, const char *, int fd);
+int be_import(libbe_handle_t *, const char *, int fd);
+
+#if SOON
+int be_add_child(libbe_handle_t *, const char *, bool);
+#endif
+void be_nicenum(uint64_t num, char *buf, size_t buflen);
+
+#endif /* _LIBBE_H */
diff --git a/lib/libbe/be_access.c b/lib/libbe/be_access.c
new file mode 100644
index 000000000000..a7eb6b703cda
--- /dev/null
+++ b/lib/libbe/be_access.c
@@ -0,0 +1,355 @@
+/*
+ * Copyright (c) 2017 Kyle J. Kneitinger <kyle@kneit.in>
+ * Copyright (c) 2018 Kyle Evans <kevans@FreeBSD.org>
+ * Copyright (c) 2019 Wes Maag <wes@jwmaag.org>
+ *
+ * SPDX-License-Identifier: BSD-2-Clause
+ */
+
+#include <sys/cdefs.h>
+#include <sys/mntent.h>
+
+#include "be.h"
+#include "be_impl.h"
+
+#define LIBBE_MOUNT_PREFIX "be_mount."
+
+struct be_mountcheck_info {
+ const char *path;
+ char *name;
+};
+
+struct be_mount_info {
+ libbe_handle_t *lbh;
+ const char *be;
+ const char *mountpoint;
+ int mntflags;
+ int deepmount;
+ int depth;
+};
+
+static int
+be_mountcheck_cb(zfs_handle_t *zfs_hdl, void *data)
+{
+ struct be_mountcheck_info *info;
+ char *mountpoint;
+
+ if (data == NULL)
+ return (1);
+ info = (struct be_mountcheck_info *)data;
+ if (!zfs_is_mounted(zfs_hdl, &mountpoint))
+ return (0);
+ if (strcmp(mountpoint, info->path) == 0) {
+ info->name = strdup(zfs_get_name(zfs_hdl));
+ free(mountpoint);
+ return (1);
+ }
+ free(mountpoint);
+ return (0);
+}
+
+/*
+ * Called from be_mount, uses the given zfs_handle and attempts to
+ * mount it at the passed mountpoint. If the deepmount flag is set, continue
+ * calling the function for each child dataset.
+ */
+static int
+be_mount_iter(zfs_handle_t *zfs_hdl, void *data)
+{
+ int err;
+ char *mountpoint;
+ char tmp[BE_MAXPATHLEN], zfs_mnt[BE_MAXPATHLEN];
+ struct be_mount_info *info;
+
+ info = (struct be_mount_info *)data;
+
+ if (zfs_is_mounted(zfs_hdl, &mountpoint)) {
+ free(mountpoint);
+ return (0);
+ }
+
+ /*
+ * canmount and mountpoint are both ignored for the BE dataset, because
+ * the rest of the system (kernel and loader) will effectively do the
+ * same.
+ */
+ if (info->depth == 0) {
+ snprintf(tmp, BE_MAXPATHLEN, "%s", info->mountpoint);
+ } else {
+ if (zfs_prop_get_int(zfs_hdl, ZFS_PROP_CANMOUNT) ==
+ ZFS_CANMOUNT_OFF)
+ return (0);
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_MOUNTPOINT, zfs_mnt,
+ BE_MAXPATHLEN, NULL, NULL, 0, 1))
+ return (1);
+
+ /*
+ * We've encountered mountpoint=none at some intermediate
+ * dataset (e.g. zroot/var) that will have children that may
+ * need to be mounted. Skip mounting it, but iterate through
+ * the children.
+ */
+ if (strcmp("none", zfs_mnt) == 0)
+ goto skipmount;
+
+ mountpoint = be_mountpoint_augmented(info->lbh, zfs_mnt);
+ snprintf(tmp, BE_MAXPATHLEN, "%s%s", info->mountpoint,
+ mountpoint);
+ }
+
+ if ((err = zfs_mount_at(zfs_hdl, NULL, info->mntflags, tmp)) != 0) {
+ switch (errno) {
+ case ENAMETOOLONG:
+ return (set_error(info->lbh, BE_ERR_PATHLEN));
+ case ELOOP:
+ case ENOENT:
+ case ENOTDIR:
+ return (set_error(info->lbh, BE_ERR_BADPATH));
+ case EPERM:
+ return (set_error(info->lbh, BE_ERR_PERMS));
+ case EBUSY:
+ return (set_error(info->lbh, BE_ERR_PATHBUSY));
+ default:
+ return (set_error(info->lbh, BE_ERR_UNKNOWN));
+ }
+ }
+
+ if (!info->deepmount)
+ return (0);
+
+skipmount:
+ ++info->depth;
+ err = zfs_iter_filesystems(zfs_hdl, be_mount_iter, info);
+ --info->depth;
+ return (err);
+}
+
+
+static int
+be_umount_iter(zfs_handle_t *zfs_hdl, void *data)
+{
+
+ int err;
+ char *mountpoint;
+ struct be_mount_info *info;
+
+ info = (struct be_mount_info *)data;
+
+ ++info->depth;
+ if((err = zfs_iter_filesystems(zfs_hdl, be_umount_iter, info)) != 0) {
+ return (err);
+ }
+ --info->depth;
+
+ if (!zfs_is_mounted(zfs_hdl, &mountpoint)) {
+ return (0);
+ }
+
+ if (info->depth == 0 && info->mountpoint == NULL)
+ info->mountpoint = mountpoint;
+ else
+ free(mountpoint);
+
+ if (zfs_unmount(zfs_hdl, NULL, info->mntflags) != 0) {
+ switch (errno) {
+ case ENAMETOOLONG:
+ return (set_error(info->lbh, BE_ERR_PATHLEN));
+ case ELOOP:
+ case ENOENT:
+ case ENOTDIR:
+ return (set_error(info->lbh, BE_ERR_BADPATH));
+ case EPERM:
+ return (set_error(info->lbh, BE_ERR_PERMS));
+ case EBUSY:
+ return (set_error(info->lbh, BE_ERR_PATHBUSY));
+ default:
+ return (set_error(info->lbh, BE_ERR_UNKNOWN));
+ }
+ }
+ return (0);
+}
+
+/*
+ * usage
+ */
+int
+be_mounted_at(libbe_handle_t *lbh, const char *path, nvlist_t *details)
+{
+ char be[BE_MAXPATHLEN];
+ zfs_handle_t *root_hdl;
+ struct be_mountcheck_info info;
+ prop_data_t propinfo;
+
+ bzero(&be, BE_MAXPATHLEN);
+ if ((root_hdl = zfs_open(lbh->lzh, lbh->root,
+ ZFS_TYPE_FILESYSTEM)) == NULL)
+ return (BE_ERR_ZFSOPEN);
+
+ info.path = path;
+ info.name = NULL;
+ zfs_iter_filesystems(root_hdl, be_mountcheck_cb, &info);
+ zfs_close(root_hdl);
+
+ if (info.name != NULL) {
+ if (details != NULL) {
+ if ((root_hdl = zfs_open(lbh->lzh, info.name,
+ ZFS_TYPE_FILESYSTEM)) == NULL) {
+ free(info.name);
+ return (BE_ERR_ZFSOPEN);
+ }
+
+ propinfo.lbh = lbh;
+ propinfo.list = details;
+ propinfo.single_object = false;
+ propinfo.bootonce = NULL;
+ prop_list_builder_cb(root_hdl, &propinfo);
+ zfs_close(root_hdl);
+ }
+ free(info.name);
+ return (0);
+ }
+ return (1);
+}
+
+/*
+ * usage
+ */
+int
+be_mount(libbe_handle_t *lbh, const char *bootenv, const char *mountpoint,
+ int flags, char *result_loc)
+{
+ char be[BE_MAXPATHLEN];
+ char mnt_temp[BE_MAXPATHLEN];
+ int mntflags, mntdeep;
+ int err;
+ struct be_mount_info info;
+ zfs_handle_t *zhdl;
+
+ if ((err = be_root_concat(lbh, bootenv, be)) != 0)
+ return (set_error(lbh, err));
+
+ if ((err = be_exists(lbh, bootenv)) != 0)
+ return (set_error(lbh, err));
+
+ if (is_mounted(lbh->lzh, be, NULL))
+ return (set_error(lbh, BE_ERR_MOUNTED));
+
+ mntdeep = (flags & BE_MNT_DEEP) ? 1 : 0;
+ mntflags = (flags & BE_MNT_FORCE) ? MNT_FORCE : 0;
+
+ /* Create mountpoint if it is not specified */
+ if (mountpoint == NULL) {
+ const char *tmpdir;
+
+ tmpdir = getenv("TMPDIR");
+ if (tmpdir == NULL)
+ tmpdir = _PATH_TMP;
+
+ if (snprintf(mnt_temp, sizeof(mnt_temp), "%s%s%sXXXX", tmpdir,
+ tmpdir[strlen(tmpdir) - 1] == '/' ? "" : "/",
+ LIBBE_MOUNT_PREFIX) >= (int)sizeof(mnt_temp))
+ return (set_error(lbh, BE_ERR_PATHLEN));
+
+ if (mkdtemp(mnt_temp) == NULL)
+ return (set_error(lbh, BE_ERR_IO));
+ }
+
+ if ((zhdl = zfs_open(lbh->lzh, be, ZFS_TYPE_FILESYSTEM)) == NULL)
+ return (set_error(lbh, BE_ERR_ZFSOPEN));
+
+ info.lbh = lbh;
+ info.be = be;
+ info.mountpoint = (mountpoint == NULL) ? mnt_temp : mountpoint;
+ info.mntflags = mntflags;
+ info.deepmount = mntdeep;
+ info.depth = 0;
+
+ if((err = be_mount_iter(zhdl, &info) != 0)) {
+ zfs_close(zhdl);
+ return (err);
+ }
+ zfs_close(zhdl);
+
+ if (result_loc != NULL)
+ strlcpy(result_loc, mountpoint == NULL ? mnt_temp : mountpoint,
+ BE_MAXPATHLEN);
+
+ return (BE_ERR_SUCCESS);
+}
+
+/*
+ * usage
+ */
+int
+be_unmount(libbe_handle_t *lbh, const char *bootenv, int flags)
+{
+ int err;
+ char be[BE_MAXPATHLEN];
+ zfs_handle_t *root_hdl;
+ struct be_mount_info info;
+
+ if ((err = be_root_concat(lbh, bootenv, be)) != 0)
+ return (set_error(lbh, err));
+
+ if ((root_hdl = zfs_open(lbh->lzh, be, ZFS_TYPE_FILESYSTEM)) == NULL)
+ return (set_error(lbh, BE_ERR_ZFSOPEN));
+
+ info.lbh = lbh;
+ info.be = be;
+ info.mountpoint = NULL;
+ info.mntflags = (flags & BE_MNT_FORCE) ? MS_FORCE : 0;
+ info.depth = 0;
+
+ if ((err = be_umount_iter(root_hdl, &info)) != 0) {
+ free(__DECONST(char *, info.mountpoint));
+ zfs_close(root_hdl);
+ return (err);
+ }
+
+ /*
+ * We'll attempt to remove the directory if we created it on a
+ * best-effort basis. rmdir(2) failure will not be reported.
+ */
+ if (info.mountpoint != NULL) {
+ const char *mdir;
+
+ mdir = strrchr(info.mountpoint, '/');
+ if (mdir == NULL)
+ mdir = info.mountpoint;
+ else
+ mdir++;
+
+ if (strncmp(mdir, LIBBE_MOUNT_PREFIX,
+ sizeof(LIBBE_MOUNT_PREFIX) - 1) == 0) {
+ (void)rmdir(info.mountpoint);
+ }
+ }
+
+ free(__DECONST(char *, info.mountpoint));
+
+ zfs_close(root_hdl);
+ return (BE_ERR_SUCCESS);
+}
+
+/*
+ * This function will blow away the input buffer as needed if we're discovered
+ * to be looking at a root-mount. If the mountpoint is naturally beyond the
+ * root, however, the buffer may be left intact and a pointer to the section
+ * past altroot will be returned instead for the caller's perusal.
+ */
+char *
+be_mountpoint_augmented(libbe_handle_t *lbh, char *mountpoint)
+{
+
+ if (lbh->altroot_len == 0)
+ return (mountpoint);
+ if (mountpoint == NULL || *mountpoint == '\0')
+ return (mountpoint);
+
+ if (mountpoint[lbh->altroot_len] == '\0') {
+ *(mountpoint + 1) = '\0';
+ return (mountpoint);
+ } else
+ return (mountpoint + lbh->altroot_len);
+}
diff --git a/lib/libbe/be_error.c b/lib/libbe/be_error.c
new file mode 100644
index 000000000000..bb1e1ed88c5d
--- /dev/null
+++ b/lib/libbe/be_error.c
@@ -0,0 +1,115 @@
+/*
+ * Copyright (c) 2017 Kyle J. Kneitinger <kyle@kneit.in>
+ *
+ * SPDX-License-Identifier: BSD-2-Clause
+ */
+
+#include <sys/cdefs.h>
+#include "be.h"
+#include "be_impl.h"
+
+/*
+ * Usage
+ */
+int
+libbe_errno(libbe_handle_t *lbh)
+{
+
+ return (lbh->error);
+}
+
+
+const char *
+libbe_error_description(libbe_handle_t *lbh)
+{
+
+ switch (lbh->error) {
+ case BE_ERR_INVALIDNAME:
+ return ("invalid boot environment name");
+
+ case BE_ERR_EXISTS:
+ return ("boot environment name already taken");
+
+ case BE_ERR_NOENT:
+ return ("specified boot environment does not exist");
+
+ case BE_ERR_PERMS:
+ return ("insufficient permissions");
+
+ case BE_ERR_DESTROYACT:
+ return ("cannot destroy active boot environment");
+
+ case BE_ERR_DESTROYMNT:
+ return ("cannot destroy mounted boot env unless forced");
+
+ case BE_ERR_BADPATH:
+ return ("path not suitable for operation");
+
+ case BE_ERR_PATHBUSY:
+ return ("specified path is busy");
+
+ case BE_ERR_PATHLEN:
+ return ("provided path name exceeds maximum length limit");
+
+ case BE_ERR_BADMOUNT:
+ return ("mountpoint is not \"/\"");
+
+ case BE_ERR_NOORIGIN:
+ return ("could not open snapshot's origin");
+
+ case BE_ERR_MOUNTED:
+ return ("boot environment is already mounted");
+
+ case BE_ERR_NOMOUNT:
+ return ("boot environment is not mounted");
+
+ case BE_ERR_ZFSOPEN:
+ return ("calling zfs_open() failed");
+
+ case BE_ERR_ZFSCLONE:
+ return ("error when calling zfs_clone() to create boot env");
+
+ case BE_ERR_IO:
+ return ("input/output error");
+
+ case BE_ERR_NOPOOL:
+ return ("operation not supported on this pool");
+
+ case BE_ERR_NOMEM:
+ return ("insufficient memory");
+
+ case BE_ERR_UNKNOWN:
+ return ("unknown error");
+
+ case BE_ERR_INVORIGIN:
+ return ("invalid origin");
+
+ case BE_ERR_HASCLONES:
+ return ("snapshot has clones");
+
+ default:
+ assert(lbh->error == BE_ERR_SUCCESS);
+ return ("no error");
+ }
+}
+
+
+void
+libbe_print_on_error(libbe_handle_t *lbh, bool val)
+{
+
+ lbh->print_on_err = val;
+ libzfs_print_on_error(lbh->lzh, val);
+}
+
+
+int
+set_error(libbe_handle_t *lbh, be_error_t err)
+{
+
+ lbh->error = err;
+ if (lbh->print_on_err && (err != BE_ERR_SUCCESS))
+ fprintf(stderr, "%s\n", libbe_error_description(lbh));
+
+ return (err);
+}
diff --git a/lib/libbe/be_impl.h b/lib/libbe/be_impl.h
new file mode 100644
index 000000000000..11d1e0ddca28
--- /dev/null
+++ b/lib/libbe/be_impl.h
@@ -0,0 +1,55 @@
+/*
+ * Copyright (c) 2017 Kyle J. Kneitinger <kyle@kneit.in>
+ *
+ * SPDX-License-Identifier: BSD-2-Clause
+ */
+
+#ifndef _LIBBE_IMPL_H
+#define _LIBBE_IMPL_H
+
+#include <libzfs.h>
+
+#include "be.h"
+
+struct libbe_handle {
+ char root[BE_MAXPATHLEN];
+ char rootfs[BE_MAXPATHLEN];
+ char bootfs[BE_MAXPATHLEN];
+ char *bootonce;
+ size_t altroot_len;
+ zpool_handle_t *active_phandle;
+ libzfs_handle_t *lzh;
+ be_error_t error;
+ bool print_on_err;
+};
+
+struct libbe_deep_clone {
+ libbe_handle_t *lbh;
+ const char *bename;
+ const char *snapname;
+ int depth;
+ int depth_limit;
+};
+
+struct libbe_dccb {
+ libbe_handle_t *lbh;
+ zfs_handle_t *zhp;
+ nvlist_t *props;
+};
+
+typedef struct prop_data {
+ nvlist_t *list;
+ libbe_handle_t *lbh;
+ bool single_object; /* list will contain props directly */
+ char *bootonce;
+} prop_data_t;
+
+int prop_list_builder_cb(zfs_handle_t *, void *);
+int be_proplist_update(prop_data_t *);
+
+char *be_mountpoint_augmented(libbe_handle_t *lbh, char *mountpoint);
+
+/* Clobbers any previous errors */
+int set_error(libbe_handle_t *, be_error_t);
+
+#endif /* _LIBBE_IMPL_H */
diff --git a/lib/libbe/be_info.c b/lib/libbe/be_info.c
new file mode 100644
index 000000000000..4b0f611ce421
--- /dev/null
+++ b/lib/libbe/be_info.c
@@ -0,0 +1,292 @@
+/*
+ * Copyright (c) 2017 Kyle J. Kneitinger <kyle@kneit.in>
+ * Copyright (c) 2018 Kyle Evans <kevans@FreeBSD.org>
+ *
+ * SPDX-License-Identifier: BSD-2-Clause
+ */
+
+#include <sys/cdefs.h>
+#include <sys/zfs_context.h>
+#include <libzfsbootenv.h>
+
+#include "be.h"
+#include "be_impl.h"
+
+static int snapshot_proplist_update(zfs_handle_t *hdl, prop_data_t *data);
+
+/*
+ * Returns the name of the active boot environment
+ */
+const char *
+be_active_name(libbe_handle_t *lbh)
+{
+
+ if (*lbh->rootfs != '\0')
+ return (strrchr(lbh->rootfs, '/') + sizeof(char));
+ else
+ return (lbh->rootfs);
+}
+
+
+/*
+ * Returns full path of the active boot environment
+ */
+const char *
+be_active_path(libbe_handle_t *lbh)
+{
+
+ return (lbh->rootfs);
+}
+
+/*
+ * Returns the name of the next active boot environment
+ */
+const char *
+be_nextboot_name(libbe_handle_t *lbh)
+{
+
+ if (*lbh->bootfs != '\0')
+ return (strrchr(lbh->bootfs, '/') + sizeof(char));
+ else
+ return (lbh->bootfs);
+}
+
+
+/*
+ * Returns full path of the active boot environment
+ */
+const char *
+be_nextboot_path(libbe_handle_t *lbh)
+{
+
+ return (lbh->bootfs);
+}
+
+
+/*
+ * Returns the path of the boot environment root dataset
+ */
+const char *
+be_root_path(libbe_handle_t *lbh)
+{
+
+ return (lbh->root);
+}
+
+
+/*
+ * Populates dsnvl with one nvlist per bootenv dataset describing the properties
+ * of that dataset that we've declared ourselves to care about.
+ */
+int
+be_get_bootenv_props(libbe_handle_t *lbh, nvlist_t *dsnvl)
+{
+ prop_data_t data;
+
+ data.lbh = lbh;
+ data.list = dsnvl;
+ data.single_object = false;
+ data.bootonce = NULL;
+ return (be_proplist_update(&data));
+}
+
+int
+be_get_dataset_props(libbe_handle_t *lbh, const char *name, nvlist_t *props)
+{
+ zfs_handle_t *snap_hdl;
+ prop_data_t data;
+ int ret;
+
+ data.lbh = lbh;
+ data.list = props;
+ data.single_object = true;
+ data.bootonce = NULL;
+ if ((snap_hdl = zfs_open(lbh->lzh, name,
+ ZFS_TYPE_FILESYSTEM | ZFS_TYPE_SNAPSHOT)) == NULL)
+ return (BE_ERR_ZFSOPEN);
+
+ ret = prop_list_builder_cb(snap_hdl, &data);
+ zfs_close(snap_hdl);
+ return (ret);
+}
+
+int
+be_get_dataset_snapshots(libbe_handle_t *lbh, const char *name, nvlist_t *props)
+{
+ zfs_handle_t *ds_hdl;
+ prop_data_t data;
+ int ret;
+
+ data.lbh = lbh;
+ data.list = props;
+ data.single_object = false;
+ data.bootonce = NULL;
+ if ((ds_hdl = zfs_open(lbh->lzh, name,
+ ZFS_TYPE_FILESYSTEM)) == NULL)
+ return (BE_ERR_ZFSOPEN);
+
+ ret = snapshot_proplist_update(ds_hdl, &data);
+ zfs_close(ds_hdl);
+ return (ret);
+}
+
+/*
+ * Internal callback function used by zfs_iter_filesystems. For each dataset in
+ * the bootenv root, populate an nvlist_t of its relevant properties.
+ */
+int
+prop_list_builder_cb(zfs_handle_t *zfs_hdl, void *data_p)
+{
+ char buf[512], *mountpoint;
+ prop_data_t *data;
+ libbe_handle_t *lbh;
+ nvlist_t *props;
+ const char *dataset, *name;
+ boolean_t mounted;
+
+ /*
+ * XXX TODO:
+ * some system for defining constants for the nvlist keys
+ * error checking
+ */
+ data = (prop_data_t *)data_p;
+ lbh = data->lbh;
+
+ if (data->single_object)
+ props = data->list;
+ else
+ nvlist_alloc(&props, NV_UNIQUE_NAME, KM_SLEEP);
+
+ dataset = zfs_get_name(zfs_hdl);
+ nvlist_add_string(props, "dataset", dataset);
+
+ if (data->lbh->bootonce != NULL &&
+ strcmp(dataset, data->lbh->bootonce) == 0)
+ nvlist_add_boolean_value(props, "bootonce", true);
+
+ name = strrchr(dataset, '/') + 1;
+ nvlist_add_string(props, "name", name);
+
+ mounted = zfs_is_mounted(zfs_hdl, &mountpoint);
+
+ if (mounted)
+ nvlist_add_string(props, "mounted", mountpoint);
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_MOUNTPOINT, buf, 512,
+ NULL, NULL, 0, 1) == 0)
+ nvlist_add_string(props, "mountpoint", buf);
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_ORIGIN, buf, 512,
+ NULL, NULL, 0, 1) == 0)
+ nvlist_add_string(props, "origin", buf);
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_CREATION, buf, 512,
+ NULL, NULL, 0, 1) == 0)
+ nvlist_add_string(props, "creation", buf);
+
+ nvlist_add_boolean_value(props, "active",
+ (strcmp(be_active_path(lbh), dataset) == 0));
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_USED, buf, 512,
+ NULL, NULL, 0, 1) == 0)
+ nvlist_add_string(props, "used", buf);
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_USEDDS, buf, 512,
+ NULL, NULL, 0, 1) == 0)
+ nvlist_add_string(props, "usedds", buf);
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_USEDSNAP, buf, 512,
+ NULL, NULL, 0, 1) == 0)
+ nvlist_add_string(props, "usedsnap", buf);
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_USEDREFRESERV, buf, 512,
+ NULL, NULL, 0, 1) == 0)
+ nvlist_add_string(props, "usedrefreserv", buf);
+
+ if (zfs_prop_get(zfs_hdl, ZFS_PROP_REFERENCED, buf, 512,
+ NULL, NULL, 0, 1) == 0)
+ nvlist_add_string(props, "referenced", buf);
+
+ nvlist_add_boolean_value(props, "nextboot",
+ (strcmp(be_nextboot_path(lbh), dataset) == 0));
+
+ if (!data->single_object)
+ nvlist_add_nvlist(data->list, name, props);
+
+ return (0);
+}
+
+
+/*
+ * Updates the properties of each bootenv in the libbe handle
+ * XXX TODO: ensure that this is always consistent (run after adds, deletes,
+ * renames,etc
+ */
+int
+be_proplist_update(prop_data_t *data)
+{
+ zfs_handle_t *root_hdl;
+
+ if ((root_hdl = zfs_open(data->lbh->lzh, data->lbh->root,
+ ZFS_TYPE_FILESYSTEM)) == NULL)
+ return (BE_ERR_ZFSOPEN);
+
+ /* XXX TODO: some error checking here */
+ zfs_iter_filesystems(root_hdl, prop_list_builder_cb, data);
+
+ zfs_close(root_hdl);
+
+ return (0);
+}
+
+static int
+snapshot_proplist_update(zfs_handle_t *hdl, prop_data_t *data)
+{
+
+ return (zfs_iter_snapshots_sorted(hdl, prop_list_builder_cb, data,
+ 0, 0));
+}
+
+
+int
+be_prop_list_alloc(nvlist_t **be_list)
+{
+
+ return (nvlist_alloc(be_list, NV_UNIQUE_NAME, KM_SLEEP));
+}
+
+/*
+ * frees property list and its children
+ */
+void
+be_prop_list_free(nvlist_t *be_list)
+{
+ nvlist_t *prop_list;
+ nvpair_t *be_pair;
+
+ be_pair = nvlist_next_nvpair(be_list, NULL);
+ if (nvpair_value_nvlist(be_pair, &prop_list) == 0)
+ nvlist_free(prop_list);
+
+ while ((be_pair = nvlist_next_nvpair(be_list, be_pair)) != NULL) {
+ if (nvpair_value_nvlist(be_pair, &prop_list) == 0)
+ nvlist_free(prop_list);
+ }
+}
+
+
+/*
+ * Usage
+ */
+int
+be_exists(libbe_handle_t *lbh, const char *be)
+{
+ char buf[BE_MAXPATHLEN];
+
+ be_root_concat(lbh, be, buf);
+
+ if (!zfs_dataset_exists(lbh->lzh, buf, ZFS_TYPE_DATASET))
+ return (BE_ERR_NOENT);
+
+ return (BE_ERR_SUCCESS);
+}
diff --git a/lib/libbe/libbe.3 b/lib/libbe/libbe.3
new file mode 100644
index 000000000000..3b10711dd0f9
--- /dev/null
+++ b/lib/libbe/libbe.3
@@ -0,0 +1,600 @@
+.\"
+.\" SPDX-License-Identifier: BSD-2-Clause
+.\"
+.\" Copyright (c) 2017 Kyle Kneitinger
+.\" Copyright (c) 2018 Kyle Evans <kevans@FreeBSD.org>
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.Dd April 20, 2025
+.Dt LIBBE 3
+.Os
+.Sh NAME
+.Nm libbe
+.Nd library for creating, destroying and modifying ZFS boot environments
+.Sh LIBRARY
+.Lb libbe
+.Sh SYNOPSIS
+.In be.h
+.Ft "libbe_handle_t *hdl" Ns
+.Fn libbe_init "const char *be_root"
+.Pp
+.Ft void
+.Fn libbe_close "libbe_handle_t *hdl"
+.Pp
+.Ft const char * Ns
+.Fn be_active_name "libbe_handle_t *hdl"
+.Pp
+.Ft const char * Ns
+.Fn be_active_path "libbe_handle_t *hdl"
+.Pp
+.Ft const char * Ns
+.Fn be_nextboot_name "libbe_handle_t *hdl"
+.Pp
+.Ft const char * Ns
+.Fn be_nextboot_path "libbe_handle_t *hdl"
+.Pp
+.Ft const char * Ns
+.Fn be_root_path "libbe_handle_t *hdl"
+.Pp
+.Ft int Ns
+.Fn be_snapshot "libbe_handle_t *hdl" "const char *be_name" "const char *snap_name" "bool recursive" "char *result"
+.Pp
+.Ft bool Ns
+.Fn be_is_auto_snapshot_name "libbe_handle_t *hdl" "const char *snap"
+.Pp
+.Ft int
+.Fn be_create "libbe_handle_t *hdl" "const char *be_name"
+.Pp
+.Ft int
+.Fn be_create_depth "libbe_handle_t *hdl" "const char *be_name" "const char *snap" "int depth"
+.Pp
+.Ft int
+.Fn be_create_from_existing "libbe_handle_t *hdl" "const char *be_name" "const char *be_origin"
+.Pp
+.Ft int
+.Fn be_create_from_existing_snap "libbe_handle_t *hdl" "const char *be_name" "const char *snap"
+.Pp
+.Ft int
+.Fn be_rename "libbe_handle_t *hdl" "const char *be_old" "const char *be_new"
+.Pp
+.Ft int
+.Fn be_activate "libbe_handle_t *hdl" "const char *be_name" "bool temporary"
+.Pp
+.Ft int
+.Fn be_deactivate "libbe_handle_t *hdl" "const char *be_name" "bool temporary"
+.Pp
+.Ft int
+.Fn be_destroy "libbe_handle_t *hdl" "const char *be_name" "int options"
+.Pp
+.Ft void
+.Fn be_nicenum "uint64_t num" "char *buf" "size_t bufsz"
+.Pp
+.\" TODO: Write up of mount options
+.\" typedef enum {
+.\" BE_MNT_FORCE = 1 << 0,
+.\" BE_MNT_DEEP = 1 << 1,
+.\" } be_mount_opt_t
+.Ft int
+.Fn be_mount "libbe_handle_t *hdl" "const char *be_name" "const char *mntpoint" "int flags" "char *result"
+.Pp
+.Ft int
+.Fn be_mounted_at "libbe_handle_t *hdl" "const char *path" "nvlist_t *details"
+.Pp
+.Ft int
+.Fn be_unmount "libbe_handle_t *hdl" "const char *be_name" "int flags"
+.Pp
+.Ft int
+.Fn libbe_errno "libbe_handle_t *hdl"
+.Pp
+.Ft const char * Ns
+.Fn libbe_error_description "libbe_handle_t *hdl"
+.Pp
+.Ft void
+.Fn libbe_print_on_error "libbe_handle_t *hdl" "bool doprint"
+.Pp
+.Ft int
+.Fn be_root_concat "libbe_handle_t *hdl" "const char *be_name" "char *result"
+.Pp
+.Ft int
+.Fn be_validate_name "libbe_handle_t *hdl" "const char *be_name"
+.Pp
+.Ft int
+.Fn be_validate_snap "libbe_handle_t *hdl" "const char *snap"
+.Pp
+.Ft int
+.Fn be_exists "libbe_handle_t *hdl" "const char *be_name"
+.Pp
+.Ft int
+.Fn be_export "libbe_handle_t *hdl" "const char *be_name" "int fd"
+.Pp
+.Ft int
+.Fn be_import "libbe_handle_t *hdl" "const char *be_name" "int fd"
+.Pp
+.Ft int
+.Fn be_prop_list_alloc "nvlist_t **prop_list"
+.Pp
+.Ft int
+.Fn be_get_bootenv_props "libbe_handle_t *hdl" "nvlist_t *be_list"
+.Pp
+.Ft int
+.Fn be_get_dataset_props "libbe_handle_t *hdl" "const char *ds_name" "nvlist_t *props"
+.Pp
+.Ft int
+.Fn be_get_dataset_snapshots "libbe_handle_t *hdl" "const char *ds_name" "nvlist_t *snap_list"
+.Pp
+.Ft void
+.Fn be_prop_list_free "nvlist_t *prop_list"
+.Sh DESCRIPTION
+.Nm
+interfaces with libzfs to provide a set of functions for various operations
+regarding ZFS boot environments, including "deep" boot environments in which
+a boot environment has child datasets.
+.Pp
+A context structure is passed to each function, allowing for a small amount
+of state to be retained, such as errors from previous operations.
+.Nm
+may be configured to print the corresponding error message to
+.Dv stderr
+when an error is encountered with
+.Fn libbe_print_on_error .
+.Pp
+All functions returning an
+.Vt int
+return 0 on success, or a
+.Nm
+errno otherwise as described in
+.Sx DIAGNOSTICS .
+.Pp
+The
+.Fn libbe_init
+function takes an optional BE root and initializes
+.Nm ,
+returning a
+.Vt "libbe_handle_t *"
+on success, or
+.Dv NULL
+on error.
+If a BE root is supplied,
+.Nm
+will only operate out of that pool and BE root.
+An error may occur if:
+.Bl -bullet
+.It
+.Pa /boot
+and
+.Pa /
+are not on the same filesystem and device,
+.It
+libzfs fails to initialize,
+.It
+The system has not been properly booted with a ZFS boot
+environment,
+.It
+.Nm
+fails to open the zpool the active boot environment resides on, or
+.It
+.Nm
+fails to locate the boot environment that is currently mounted.
+.El
+.Pp
+The
+.Fn libbe_close
+function frees all resources previously acquired in
+.Fn libbe_init ,
+invalidating the handle in the process.
+.Pp
+The
+.Fn be_active_name
+function returns the name of the currently booted boot environment.
+This boot environment may not belong to the same BE root as the root libbe
+is operating on!
+.Pp
+The
+.Fn be_active_path
+function returns the full path of the currently booted boot environment.
+This boot environment may not belong to the same BE root as the root libbe
+is operating on!
+.Pp
+The
+.Fn be_nextboot_name
+function returns the name of the boot environment that will be active on reboot.
+.Pp
+The
+.Fn be_nextboot_path
+function returns the full path of the boot environment that will be
+active on reboot.
+.Pp
+The
+.Fn be_root_path
+function returns the boot environment root path.
+.Pp
+The
+.Fn be_snapshot
+function creates a snapshot of
+.Fa be_name
+named
+.Fa snap_name .
+A value of
+.Dv NULL
+may be used, indicating that
+.Fn be_snaphot
+should derive the snapshot name from the current date and time.
+If
+.Fa recursive
+is set, then
+.Fn be_snapshot
+will recursively snapshot the dataset.
+If
+.Fa result
+is not
+.Dv NULL ,
+then it will be populated with the final
+.Dq Fa be_name Ns @ Ns Fa snap_name .
+.Pp
+The
+.Fn be_is_auto_snapshot_name
+function is used to determine if the given snapshot name matches the format that
+the
+.Fn be_snapshot
+function will use by default if it is not given a snapshot name to use.
+It returns
+.Dv true
+if the name matches the format, and
+.Dv false
+if it does not.
+.Pp
+The
+.Fn be_create
+function creates a boot environment with the given name.
+The new boot environment will be created from a recursive snapshot of the
+currently booted boot environment.
+.Pp
+The
+.Fn be_create_depth
+function creates a boot environment with the given name from an existing
+snapshot.
+The depth parameter specifies the depth of recursion that will be cloned from
+the existing snapshot.
+A depth of '0' is no recursion and '-1' is unlimited (i.e., a recursive boot
+environment).
+.Pp
+The
+.Fn be_create_from_existing
+function creates a boot environment with the given name from the name of an
+existing boot environment.
+A recursive snapshot will be made of the origin boot environment, and the new
+boot environment will be created from that.
+.Pp
+The
+.Fn be_create_from_existing_snap
+function creates a recursive boot environment with the given name from an
+existing snapshot.
+.Pp
+The
+.Fn be_rename
+function renames a boot environment without unmounting it, as if renamed with
+the
+.Fl u
+argument were passed to
+.Nm zfs
+.Cm rename
+.Pp
+The
+.Fn be_activate
+function makes a boot environment active on the next boot.
+If the
+.Fa temporary
+flag is set, then it will be active for the next boot only, as done by
+.Xr zfsbootcfg 8 .
+.Pp
+The
+.Fn be_deactivate
+function deactivates a boot environment.
+If the
+.Fa temporary
+flag is set, then it will cause removal of boot once configuration, set by
+.Fn be_activate
+function or by
+.Xr zfsbootcfg 8 .
+If the
+.Fa temporary
+flag is not set,
+.Fn be_deactivate
+function will set zfs
+.Dv canmount
+property to
+.Dv noauto .
+.Pp
+The
+.Fn be_destroy
+function will recursively destroy the given boot environment.
+It will not destroy a mounted boot environment unless the
+.Dv BE_DESTROY_FORCE
+option is set in
+.Fa options .
+If the
+.Dv BE_DESTROY_ORIGIN
+option is set in
+.Fa options ,
+the
+.Fn be_destroy
+function will destroy the origin snapshot to this boot environment as well.
+.Pp
+The
+.Fn be_nicenum
+function will format
+.Fa name
+in a traditional ZFS humanized format, similar to
+.Xr humanize_number 3 .
+This function effectively proxies
+.Fn zfs_nicenum
+from libzfs.
+.Pp
+The
+.Fn be_mount
+function will mount the given boot environment.
+If
+.Fa mountpoint
+is
+.Dv NULL ,
+a mount point will be generated in
+.Ev TMPDIR
+or, if
+.Ev TMPDIR
+is not set,
+.Pa /tmp
+using
+.Xr mkdtemp 3 .
+If
+.Fa result
+is not
+.Dv NULL ,
+it should be large enough to accommodate
+.Dv BE_MAXPATHLEN
+including the null terminator.
+the final mount point will be copied into it.
+Setting the
+.Dv BE_MNT_FORCE
+flag will pass
+.Dv MNT_FORCE
+to the underlying
+.Xr mount 2
+call.
+.Pp
+The
+.Fn be_mounted_at
+function will check if there is a boot environment mounted at the given
+.Fa path .
+If
+.Fa details
+is not
+.Dv NULL ,
+it will be populated with a list of the mounted dataset's properties.
+This list of properties matches the properties collected by
+.Fn be_get_bootenv_props .
+.Pp
+The
+.Fn be_unmount
+function will unmount the given boot environment.
+If the mount point looks like it was created by
+.Fn be_mount ,
+then
+.Fn be_unmount
+will attempt to
+.Xr rmdir 2
+the mountpoint after a successful unmount.
+Setting the
+.Dv BE_MNT_FORCE
+flag will pass
+.Dv MNT_FORCE
+to the underlying
+.Xr mount 2
+call.
+.Pp
+The
+.Fn libbe_errno
+function returns the
+.Nm
+errno.
+.Pp
+The
+.Fn libbe_error_description
+function returns a string description of the currently set
+.Nm
+errno.
+.Pp
+The
+.Fn libbe_print_on_error
+function will change whether or not
+.Nm
+prints the description of any encountered error to
+.Dv stderr ,
+based on
+.Fa doprint .
+.Pp
+The
+.Fn be_root_concat
+function will concatenate the boot environment root and the given boot
+environment name into
+.Fa result .
+.Pp
+The
+.Fn be_validate_name
+function will validate the given boot environment name for both length
+restrictions as well as valid character restrictions.
+This function does not set the internal library error state.
+.Pp
+The
+.Fn be_validate_snap
+function will validate the given snapshot name.
+The snapshot must have a valid name, exist, and have a mountpoint of
+.Pa / .
+This function does not set the internal library error state.
+.Pp
+The
+.Fn be_exists
+function will check whether the given boot environment exists and has a
+mountpoint of
+.Pa / .
+This function does not set the internal library error state, but will return
+the appropriate error.
+.Pp
+The
+.Fn be_export
+function will export the given boot environment to the file specified by
+.Fa fd .
+A snapshot will be created of the boot environment prior to export.
+.Pp
+The
+.Fn be_import
+function will import the boot environment in the file specified by
+.Fa fd ,
+and give it the name
+.Fa be_name .
+.Pp
+The
+.Fn be_prop_list_alloc
+function allocates a property list suitable for passing to
+.Fn be_get_bootenv_props ,
+.Fn be_get_dataset_props ,
+or
+.Fn be_get_dataset_snapshots .
+It should be freed later by
+.Fa be_prop_list_free .
+.Pp
+The
+.Fn be_get_bootenv_props
+function will populate
+.Fa be_list
+with
+.Vt nvpair_t
+of boot environment names paired with an
+.Vt nvlist_t
+of their properties.
+The following properties are currently collected as appropriate:
+.Bl -column "Returned name"
+.It Sy Returned name Ta Sy Description
+.It dataset Ta -
+.It name Ta Boot environment name
+.It mounted Ta Current mount point
+.It mountpoint Ta Do mountpoint Dc property
+.It origin Ta Do origin Dc property
+.It creation Ta Do creation Dc property
+.It active Ta Currently booted environment
+.It used Ta Literal Do used Dc property
+.It usedds Ta Literal Do usedds Dc property
+.It usedsnap Ta Literal Do usedrefreserv Dc property
+.It referenced Ta Literal Do referenced Dc property
+.It nextboot Ta Active on next boot
+.El
+.Pp
+Only the
+.Dq dataset ,
+.Dq name ,
+.Dq active ,
+and
+.Dq nextboot
+returned values will always be present.
+All other properties may be omitted if not available.
+.Pp
+The
+.Fn be_get_dataset_props
+function will get properties of the specified dataset.
+.Fa props
+is populated directly with a list of the properties as returned by
+.Fn be_get_bootenv_props .
+.Pp
+The
+.Fn be_get_dataset_snapshots
+function will retrieve all snapshots of the given dataset.
+.Fa snap_list
+will be populated with a list of
+.Vt nvpair_t
+exactly as specified by
+.Fn be_get_bootenv_props .
+.Pp
+The
+.Fn be_prop_list_free
+function will free the property list.
+.Sh DIAGNOSTICS
+Upon error, one of the following values will be returned:
+.Bl -bullet -offset indent -compact
+.It
+BE_ERR_SUCCESS
+.It
+BE_ERR_INVALIDNAME
+.It
+BE_ERR_EXISTS
+.It
+BE_ERR_NOENT
+.It
+BE_ERR_PERMS
+.It
+BE_ERR_DESTROYACT
+.It
+BE_ERR_DESTROYMNT
+.It
+BE_ERR_BADPATH
+.It
+BE_ERR_PATHBUSY
+.It
+BE_ERR_PATHLEN
+.It
+BE_ERR_BADMOUNT
+.It
+BE_ERR_NOORIGIN
+.It
+BE_ERR_MOUNTED
+.It
+BE_ERR_NOMOUNT
+.It
+BE_ERR_ZFSOPEN
+.It
+BE_ERR_ZFSCLONE
+.It
+BE_ERR_IO
+.It
+BE_ERR_NOPOOL
+.It
+BE_ERR_NOMEM
+.It
+BE_ERR_UNKNOWN
+.It
+BE_ERR_INVORIGIN
+.El
+.Sh SEE ALSO
+.Xr bectl 8
+.Sh HISTORY
+.Xr bectl 8
+and
+.Nm
+were written by
+.An Kyle Kneitinger (kneitinger) Aq Mt kyle@kneit.in
+as a 2017 Google Summer of Code project, with
+.An Allan Jude (allanjude) Aq Mt allanjude@freebsd.org
+as mentor.
+.Sh AUTHORS
+Kyle Kneitinger, mentored as above.
+.Pp
+Post-GSoC changes were written by
+.An Kyle Evans (kevans) Aq Mt kevans@freebsd.org .
diff --git a/lib/libbe/tests/Makefile b/lib/libbe/tests/Makefile
new file mode 100644
index 000000000000..20a4e1ddfeb7
--- /dev/null
+++ b/lib/libbe/tests/Makefile
@@ -0,0 +1,24 @@
+PACKAGE= tests
+
+ATF_TESTS_SH+= be_create
+
+PROGS= target_prog
+SRCS_target_prog= target_prog.c
+BINDIR_target_prog= ${TESTSDIR}
+
+LIBADD+= zfs \
+ spl \
+ nvpair \
+ be \
+
+CFLAGS+= -I${SRCTOP}/lib/libbe
+CFLAGS+= -DIN_BASE -DHAVE_RPC_TYPES
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/include
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/lib/libspl/include/
+CFLAGS+= -I${SRCTOP}/sys/contrib/openzfs/lib/libspl/include/os/freebsd
+CFLAGS+= -I${SRCTOP}/sys
+CFLAGS+= -I${SRCTOP}/cddl/compat/opensolaris/include
+CFLAGS+= -include ${SRCTOP}/sys/contrib/openzfs/include/os/freebsd/spl/sys/ccompile.h
+CFLAGS+= -DHAVE_ISSETUGID
+
+.include <bsd.test.mk>
diff --git a/lib/libbe/tests/Makefile.depend b/lib/libbe/tests/Makefile.depend
new file mode 100644
index 000000000000..670634e1722a
--- /dev/null
+++ b/lib/libbe/tests/Makefile.depend
@@ -0,0 +1,17 @@
+# Autogenerated - do NOT edit!
+
+DIRDEPS = \
+ cddl/lib/libnvpair \
+ cddl/lib/libspl \
+ cddl/lib/libzfs \
+ lib/${CSU_DIR} \
+ lib/libbe \
+ lib/libc \
+ lib/libcompiler_rt \
+
+
+.include <dirdeps.mk>
+
+.if ${DEP_RELDIR} == ${_DEP_RELDIR}
+# local dependencies - needed for -jN in clean tree
+.endif
diff --git a/lib/libbe/tests/be_create.sh b/lib/libbe/tests/be_create.sh
new file mode 100755
index 000000000000..e1342368995d
--- /dev/null
+++ b/lib/libbe/tests/be_create.sh
@@ -0,0 +1,187 @@
+#
+# SPDX-License-Identifier: BSD-2-Clause
+#
+# Copyright (c) 2019 Rob Wing
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in the
+# documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+
+# The code for the following tests was copied from the
+# bectl tests found in src/sbin/bectl/tests, modified as needed.
+
+ZPOOL_NAME_FILE=zpool_name
+get_zpool_name()
+{
+ cat $ZPOOL_NAME_FILE
+}
+make_zpool_name()
+{
+ mktemp -u libbe_test_XXXXXX > $ZPOOL_NAME_FILE
+ get_zpool_name
+}
+
+# Establishes a libbe zpool that can be used for some light testing; contains
+# a 'default' BE and not much else.
+libbe_create_setup()
+{
+ zpool=$1
+ disk=$2
+ mnt=$3
+
+ # Sanity check to make sure `make_zpool_name` succeeded
+ atf_check test -n "$zpool"
+
+ kldload -n -q zfs || atf_skip "ZFS module not loaded on the current system"
+ atf_check mkdir -p ${mnt}
+ atf_check truncate -s 1G ${disk}
+ atf_check zpool create -o altroot=${mnt} ${zpool} ${disk}
+ atf_check zfs create -o mountpoint=none ${zpool}/ROOT
+ atf_check zfs create -o mountpoint=/ -o canmount=noauto \
+ ${zpool}/ROOT/default
+ atf_check zfs create -o mountpoint=/usr -o canmount=noauto \
+ ${zpool}/ROOT/default/usr
+ atf_check zfs create -o mountpoint=/usr/obj -o canmount=noauto \
+ ${zpool}/ROOT/default/usr/obj
+}
+
+libbe_cleanup()
+{
+ zpool=$1
+ cwd=$(atf_get_srcdir)
+
+ if [ -z "$zpool" ]; then
+ echo "Skipping cleanup; zpool not set up"
+ elif zpool get health ${zpool} >/dev/null 2>&1; then
+ zpool destroy -f ${zpool}
+ fi
+
+ if [ -f "${cwd}/disk.img" ]; then
+ rm ${cwd}/disk.img
+ fi
+}
+
+atf_test_case libbe_create cleanup
+libbe_create_head()
+{
+ atf_set "descr" "check _be_create from libbe"
+ atf_set "require.user" root
+}
+libbe_create_body()
+{
+ if [ "$(atf_config_get ci false)" = "true" ] && \
+ [ "$(uname -p)" = "i386" ]; then
+ atf_skip "https://bugs.freebsd.org/249055"
+ fi
+
+ if [ "$(atf_config_get ci false)" = "true" ] && \
+ [ "$(uname -p)" = "armv7" ]; then
+ atf_skip "https://bugs.freebsd.org/249229"
+ fi
+
+ cwd=$(atf_get_srcdir)
+ zpool=$(make_zpool_name)
+ disk=${cwd}/disk.img
+ mount=${cwd}/mnt
+ prog=${cwd}/./target_prog
+
+ # preliminary setup/checks
+ atf_require_prog $prog
+ libbe_create_setup ${zpool} ${disk} ${mount}
+
+ # a recursive and non-recursive snapshot to test against
+ atf_check zfs snapshot ${zpool}/ROOT/default@non-recursive
+ atf_check zfs snapshot -r ${zpool}/ROOT/default@recursive
+
+ # create a dataset after snapshots were taken
+ atf_check zfs create -o mountpoint=/usr/src -o canmount=noauto \
+ ${zpool}/ROOT/default/usr/src
+
+ # test boot environment creation with depth of 0 (i.e. a non-recursive boot environment).
+ atf_check $prog "${zpool}/ROOT" \
+ nonrecursive \
+ "${zpool}/ROOT/default@non-recursive" \
+ 0
+ # the dataset should exist
+ atf_check -o not-empty \
+ zfs list "${zpool}/ROOT/nonrecursive"
+ # the child dataset should not exist.
+ atf_check -e not-empty -s not-exit:0 \
+ zfs list "${zpool}/ROOT/nonrecursive/usr"
+
+ # test boot environment creation with unlimited depth (i.e. a recursive boot environment).
+ atf_check $prog "${zpool}/ROOT" \
+ recursive \
+ "${zpool}/ROOT/default@recursive" \
+ -1
+ # the dataset should exist
+ atf_check -o not-empty \
+ zfs list "${zpool}/ROOT/recursive"
+ # the child dataset should exist
+ atf_check -o not-empty \
+ zfs list "${zpool}/ROOT/recursive/usr"
+ # the child dataset should exist
+ atf_check -o not-empty \
+ zfs list "${zpool}/ROOT/recursive/usr/obj"
+ # the child dataset should not exist.
+ atf_check -e not-empty -s not-exit:0 \
+ zfs list "${zpool}/ROOT/recursive/usr/src"
+
+ # test boot environment creation with a depth of 1
+ atf_check $prog "${zpool}/ROOT" \
+ depth \
+ "${zpool}/ROOT/default@recursive" \
+ 1
+ # the child dataset should exist
+ atf_check -o not-empty \
+ zfs list "${zpool}/ROOT/depth/usr"
+ # the child dataset should not exist.
+ atf_check -e not-empty -s not-exit:0 \
+ zfs list "${zpool}/ROOT/depth/usr/obj"
+ # the child dataset should not exist.
+ atf_check -e not-empty -s not-exit:0 \
+ zfs list "${zpool}/ROOT/depth/usr/src"
+
+
+ # create a recursive boot environment named 'relative-snap'.
+ # This test is to ensure that a relative snapshot label can be used,
+ # (i.e. the format: 'bootenvironment@snapshot')
+ atf_check $prog "${zpool}/ROOT" \
+ relative-snap \
+ default@recursive \
+ -1
+ # the dataset should exist
+ atf_check -o not-empty \
+ zfs list "${zpool}/ROOT/relative-snap"
+ # the child dataset should exist
+ atf_check -o not-empty \
+ zfs list "${zpool}/ROOT/relative-snap/usr"
+}
+
+libbe_create_cleanup()
+{
+ libbe_cleanup $(get_zpool_name)
+}
+
+atf_init_test_cases()
+{
+ atf_add_test_case libbe_create
+}
diff --git a/lib/libbe/tests/target_prog.c b/lib/libbe/tests/target_prog.c
new file mode 100644
index 000000000000..4c79d1a30714
--- /dev/null
+++ b/lib/libbe/tests/target_prog.c
@@ -0,0 +1,50 @@
+/*-
+ * SPDX-License-Identifier: BSD-2-Clause
+ *
+ * Copyright (c) 2019 Rob Wing
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+#include <sys/cdefs.h>
+#include <be.h>
+
+/*
+ * argv[1] = root boot environment (e.g. zroot/ROOT),
+ * argv[2] = name of boot environment to create
+ * argv[3] = snapshot to create boot environment from
+ * argv[4] = depth
+ */
+int main(int argc, char *argv[]) {
+
+ libbe_handle_t *lbh;
+
+ if (argc != 5)
+ return -1;
+
+ if ((lbh = libbe_init(argv[1])) == NULL)
+ return -1;
+
+ libbe_print_on_error(lbh, true);
+
+ return (be_create_depth(lbh, argv[2], argv[3], atoi(argv[4])));
+}