1# $NetBSD: rc.subr,v 1.67 2006/10/07 11:25:15 elad Exp $ 2# 3# Copyright (c) 1997-2004 The NetBSD Foundation, Inc. 4# All rights reserved. 5# 6# This code is derived from software contributed to The NetBSD Foundation 7# by Luke Mewburn. 8# 9# Redistribution and use in source and binary forms, with or without 10# modification, are permitted provided that the following conditions 11# are met: 12# 1. Redistributions of source code must retain the above copyright 13# notice, this list of conditions and the following disclaimer. 14# 2. Redistributions in binary form must reproduce the above copyright 15# notice, this list of conditions and the following disclaimer in the 16# documentation and/or other materials provided with the distribution. 17# 18# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 19# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 20# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 21# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 22# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 23# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 24# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 25# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 26# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 27# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28# POSSIBILITY OF SUCH DAMAGE. 29# 30# rc.subr 31# functions used by various rc scripts 32# 33 34: ${RC_PID:=$$}; export RC_PID 35 36# 37# Operating System dependent/independent variables 38# 39 40if [ -n "${_rc_subr_loaded}" ]; then 41 return 42fi 43 44_rc_subr_loaded="YES" 45 46SYSCTL="/sbin/sysctl" 47SYSCTL_N="${SYSCTL} -n" 48SYSCTL_W="${SYSCTL}" 49PROTECT="/usr/bin/protect" 50ID="/usr/bin/id" 51IDCMD="if [ -x $ID ]; then $ID -un; fi" 52PS="/bin/ps -ww" 53SERVICE=/usr/sbin/service 54JAIL_CMD=/usr/sbin/jail 55_svcj_generic_params="path=/ mount.nodevfs host=inherit" 56JID=0 57CPUSET="/bin/cpuset" 58 59# rc_service provides the path to the service script that we are executing. 60# This is not being set here in an execution context, necessarily, so it's 61# really just a reasonable guess, and it will get overwritten later if 62# we are executing from some other means than direct execution by service(8) 63# or manual invocation of the service script. The prime example of this is 64# during system startup, all rc scripts will be invoked via /etc/rc, so 65# run_rc_script will overwrite rc_service with the file being sourced. 66rc_service="$0" 67 68# 69# functions 70# --------- 71 72# is_verified file 73# if VERIEXEC is active check that $file is verified 74# 75VERIEXEC="/sbin/veriexec" 76if test -x $VERIEXEC && $VERIEXEC -i active > /dev/null 2>&1; then 77 is_verified() { $VERIEXEC -x $1; } 78else 79 is_verified() { return 0; } 80fi 81 82# indicate that we have vdot 83_VDOT_SH=: 84 85# current state of O_VERIFY 86o_verify() 87{ 88 case $(echo $(set -o)) in 89 *verify" "off*) echo off;; 90 *verify" "on*) echo on;; 91 esac 92} 93 94## 95# o_verify_set want [save] 96# 97# record current state of verify in $save 98# and set it to $want if different 99# 100o_verify_set() { 101 local x=$(o_verify) 102 103 [ -z "$x" ] && return 0 104 [ -z "$2" ] || eval $2=$x 105 [ "$x" = "$1" ] && return 0 106 case "$1" in 107 on) 108 set -o verify 109 ;; 110 off) 111 set +o verify 112 ;; 113 esac 114} 115 116# for unverified files 117dotted= 118dot() 119{ 120 local f verify 121 122 o_verify_set off verify 123 for f in "$@"; do 124 if [ -f $f -a -s $f ]; then 125 dotted="$dotted $f" 126 . $f 127 fi 128 done 129 o_verify_set $verify 130} 131 132# try for verified, fallback to safe 133sdot() 134{ 135 local f 136 137 for f in "$@"; do 138 [ -f $f -a -s $f ] || continue 139 vdot $f || safe_dot $f 140 done 141} 142 143# convenience function - skip if not verified 144vdot() 145{ 146 local f rc=0 verify 147 148 o_verify_set on verify 149 for f in "$@"; do 150 [ -f $f -a -s $f ] || continue 151 if is_verified $f 2> /dev/null; then 152 dotted="$dotted $f" 153 . $f 154 else 155 rc=80 # EAUTH 156 fi 157 done 158 o_verify_set $verify 159 return $rc 160} 161 162# Exists [test] file ... 163# report the first "file" that passes "test" (default -s). 164Exists() 165{ 166 local f _t=-s 167 168 while :; do 169 : 1=$1 170 case "$1" in 171 -?) 172 _t=$1 173 shift 174 ;; 175 *) 176 break 177 ;; 178 esac 179 done 180 181 for f in "$@"; do 182 [ $_t $f ] || continue 183 echo $f 184 return 0 185 done 186 return 1 187} 188 189# do we have $1 (could be a function) 190have() 191{ 192 type "$1" > /dev/null 2>&1 193} 194 195# provide consistent means of logging progress 196rc_log() 197{ 198 date "+@ %s [%Y-%m-%d %H:%M:%S %Z] $*" 199} 200 201# only rc_log if tracing enabled 202# and $level >= $RC_LEVEL 203rc_trace() 204{ 205 local level=$1; shift 206 local cf=/etc/rc.conf.d/rc_trace 207 208 if [ -z "$RC_LEVEL" ]; then 209 [ -f $cf ] || return 210 if [ -s $cf ]; then 211 # don't try to set RC_LEVEL without sed 212 if [ -n "$SED" ]; then 213 RC_LEVEL=$($SED -n '/^RC_LEVEL=/ { s/.*=//p;q; }' $cf) 214 RC_LEVEL=${RC_LEVEL:-0} 215 fi 216 else 217 RC_LEVEL=0 218 fi 219 fi 220 [ ${RC_LEVEL:-0} -ge ${level:-0} ] || return 221 rc_log "$@" 222} 223 224# list_vars pattern 225# List variables matching glob pattern. 226# 227list_vars() 228{ 229 # Localize 'set' option below. 230 local - 231 local IFS=$'\n' line varname 232 233 # Disable path expansion in unquoted 'for' parameters below. 234 set -o noglob 235 236 for line in $(set); do 237 varname="${line%%=*}" 238 239 case "$varname" in 240 "$line"|*[!a-zA-Z0-9_]*) 241 continue 242 ;; 243 $1) 244 echo $varname 245 ;; 246 esac 247 done 248} 249 250# set_rcvar [var] [defval] [desc] 251# 252# Echo or define a rc.conf(5) variable name. Global variable 253# $rcvars is used. 254# 255# If no argument is specified, echo "${name}_enable". 256# 257# If only a var is specified, echo "${var}_enable". 258# 259# If var and defval are specified, the ${var} is defined as 260# rc.conf(5) variable and the default value is ${defvar}. An 261# optional argument $desc can also be specified to add a 262# description for that. 263# 264set_rcvar() 265{ 266 local _var 267 268 case $# in 269 0) echo ${name}_enable ;; 270 1) echo ${1}_enable ;; 271 *) 272 debug "set_rcvar: \$$1=$2 is added" \ 273 " as a rc.conf(5) variable." 274 _var=$1 275 rcvars="${rcvars# } $_var" 276 eval ${_var}_defval=\"$2\" 277 shift 2 278 eval ${_var}_desc=\"$*\" 279 ;; 280 esac 281} 282 283# set_rcvar_obsolete oldvar [newvar] [msg] 284# Define obsolete variable. 285# Global variable $rcvars_obsolete is used. 286# 287set_rcvar_obsolete() 288{ 289 local _var 290 _var=$1 291 debug "set_rcvar_obsolete: \$$1(old) -> \$$2(new) is defined" 292 293 rcvars_obsolete="${rcvars_obsolete# } $1" 294 eval ${1}_newvar=\"$2\" 295 shift 2 296 eval ${_var}_obsolete_msg=\"$*\" 297} 298 299# 300# force_depend script [rcvar] 301# Force a service to start. Intended for use by services 302# to resolve dependency issues. 303# $1 - filename of script, in /etc/rc.d, to run 304# $2 - name of the script's rcvar (minus the _enable) 305# 306force_depend() 307{ 308 local _depend _dep_rcvar 309 310 _depend="$1" 311 _dep_rcvar="${2:-$1}_enable" 312 313 [ -n "$rc_fast" ] && ! checkyesno always_force_depends && 314 checkyesno $_dep_rcvar && return 0 315 316 /etc/rc.d/${_depend} forcestatus >/dev/null 2>&1 && return 0 317 318 info "${name} depends on ${_depend}, which will be forced to start." 319 if ! /etc/rc.d/${_depend} forcestart; then 320 warn "Unable to force ${_depend}. It may already be running." 321 return 1 322 fi 323} 324 325# 326# checkyesno var 327# Test $1 variable, and warn if not set to YES or NO. 328# Return 0 if it's "yes" (et al), nonzero otherwise. 329# 330checkyesno() 331{ 332 eval _value=\$${1} 333 debug "checkyesno: $1 is set to $_value." 334 case $_value in 335 336 # "yes", "true", "on", or "1" 337 [Yy][Ee][Ss]|[Tt][Rr][Uu][Ee]|[Oo][Nn]|1) 338 return 0 339 ;; 340 341 # "no", "false", "off", or "0" 342 [Nn][Oo]|[Ff][Aa][Ll][Ss][Ee]|[Oo][Ff][Ff]|0) 343 return 1 344 ;; 345 *) 346 warn "\$${1} is not set properly - see rc.conf(5)." 347 return 1 348 ;; 349 esac 350} 351 352# 353# reverse_list list 354# print the list in reverse order 355# 356reverse_list() 357{ 358 _revlist= 359 for _revfile; do 360 _revlist="$_revfile $_revlist" 361 done 362 echo $_revlist 363} 364 365# stop_boot always 366# If booting directly to multiuser or $always is enabled, 367# send SIGTERM to the parent (/etc/rc) to abort the boot. 368# Otherwise just exit. 369# 370stop_boot() 371{ 372 local always 373 374 case $1 in 375 # "yes", "true", "on", or "1" 376 [Yy][Ee][Ss]|[Tt][Rr][Uu][Ee]|[Oo][Nn]|1) 377 always=true 378 ;; 379 *) 380 always=false 381 ;; 382 esac 383 if [ "$autoboot" = yes -o "$always" = true ]; then 384 echo "ERROR: ABORTING BOOT (sending SIGTERM to parent)!" 385 kill -TERM ${RC_PID} 386 fi 387 exit 1 388} 389 390# 391# mount_critical_filesystems type 392# Go through the list of critical filesystems as provided in 393# the rc.conf(5) variable $critical_filesystems_${type}, checking 394# each one to see if it is mounted, and if it is not, mounting it. 395# 396mount_critical_filesystems() 397{ 398 eval _fslist=\$critical_filesystems_${1} 399 for _fs in $_fslist; do 400 mount | ( 401 _ismounted=false 402 while read what _on on _type type; do 403 if [ $on = $_fs ]; then 404 _ismounted=true 405 fi 406 done 407 if $_ismounted; then 408 : 409 else 410 mount $_fs >/dev/null 2>&1 411 fi 412 ) 413 done 414} 415 416# 417# check_pidfile pidfile procname [interpreter] 418# Parses the first line of pidfile for a PID, and ensures 419# that the process is running and matches procname. 420# Prints the matching PID upon success, nothing otherwise. 421# interpreter is optional; see _find_processes() for details. 422# 423check_pidfile() 424{ 425 _pidfile=$1 426 _procname=$2 427 _interpreter=$3 428 if [ -z "$_pidfile" -o -z "$_procname" ]; then 429 err 3 'USAGE: check_pidfile pidfile procname [interpreter]' 430 fi 431 if [ ! -f $_pidfile ]; then 432 debug "pid file ($_pidfile): not readable." 433 return 434 fi 435 read _pid _junk < $_pidfile 436 if [ -z "$_pid" ]; then 437 debug "pid file ($_pidfile): no pid in file." 438 return 439 fi 440 _find_processes $_procname ${_interpreter:-.} '-p '"$_pid" 441} 442 443# 444# check_process procname [interpreter] 445# Ensures that a process (or processes) named procname is running. 446# Prints a list of matching PIDs. 447# interpreter is optional; see _find_processes() for details. 448# 449check_process() 450{ 451 _procname=$1 452 _interpreter=$2 453 if [ -z "$_procname" ]; then 454 err 3 'USAGE: check_process procname [interpreter]' 455 fi 456 _find_processes $_procname ${_interpreter:-.} '-ax' 457} 458 459# 460# _find_processes procname interpreter psargs 461# Search for procname in the output of ps generated by psargs. 462# Prints the PIDs of any matching processes, space separated. 463# 464# If interpreter == ".", check the following variations of procname 465# against the first word of each command: 466# procname 467# `basename procname` 468# `basename procname` + ":" 469# "(" + `basename procname` + ")" 470# "[" + `basename procname` + "]" 471# 472# If interpreter != ".", read the first line of procname, remove the 473# leading #!, normalise whitespace, append procname, and attempt to 474# match that against each command, either as is, or with extra words 475# at the end. As an alternative, to deal with interpreted daemons 476# using perl, the basename of the interpreter plus a colon is also 477# tried as the prefix to procname. 478# 479_find_processes() 480{ 481 if [ $# -ne 3 ]; then 482 err 3 'USAGE: _find_processes procname interpreter psargs' 483 fi 484 _procname=$1 485 _interpreter=$2 486 _psargs=$3 487 488 _pref= 489 if [ $_interpreter != "." ]; then # an interpreted script 490 _script="${_chroot}${_chroot:+/}$_procname" 491 if [ -r "$_script" ]; then 492 read _interp < $_script # read interpreter name 493 case "$_interp" in 494 \#!*) 495 _interp=${_interp#\#!} # strip #! 496 set -- $_interp 497 case $1 in 498 */bin/env) 499 shift # drop env to get real name 500 ;; 501 esac 502 if [ $_interpreter != $1 ]; then 503 warn "\$command_interpreter $_interpreter != $1" 504 fi 505 ;; 506 *) 507 warn "no shebang line in $_script" 508 set -- $_interpreter 509 ;; 510 esac 511 else 512 warn "cannot read shebang line from $_script" 513 set -- $_interpreter 514 fi 515 _interp="$* $_procname" # cleanup spaces, add _procname 516 _interpbn=${1##*/} 517 _fp_args='_argv' 518 _fp_match='case "$_argv" in 519 ${_interp}|"${_interp} "*|"[${_interpbn}]"|"${_interpbn}: ${_procname}"*)' 520 else # a normal daemon 521 _procnamebn=${_procname##*/} 522 _fp_args='_arg0 _argv' 523 _fp_match='case "$_arg0" in 524 $_procname|$_procnamebn|${_procnamebn}:|"(${_procnamebn})"|"[${_procnamebn}]")' 525 fi 526 527 if checkyesno ${name}_svcj && [ "${_rc_svcj}" != jailing ]; then 528 JID=$(/usr/sbin/jls -j svcj-${name} jid 2>/dev/null) 529 530 case ${JID} in 531 ''|*[!0-9]*) 532 # svcj-jail doesn't exist, fallback to host-check 533 JID=0 534 ;; 535 esac 536 fi 537 _proccheck="\ 538 $PS 2>/dev/null -o pid= -o jid= -o command= $_psargs"' | 539 while read _npid _jid '"$_fp_args"'; do 540 '"$_fp_match"' 541 if [ "$JID" -eq "$_jid" ]; 542 then echo -n "$_pref$_npid"; 543 _pref=" "; 544 fi 545 ;; 546 esac 547 done' 548 549# debug "in _find_processes: proccheck is ($_proccheck)." 550 eval $_proccheck 551} 552 553# sort_lite [-b] [-n] [-k POS] [-t SEP] 554# A lite version of sort(1) (supporting a few options) that can be used 555# before the real sort(1) is available (e.g., in scripts that run prior 556# to mountcritremote). Requires only shell built-in functionality. 557# 558sort_lite() 559{ 560 local funcname=sort_lite 561 local sort_sep="$IFS" sort_ignore_leading_space= 562 local sort_field=0 sort_strict_fields= sort_numeric= 563 local nitems=0 skip_leading=0 trim= 564 565 local OPTIND flag 566 while getopts bnk:t: flag; do 567 case "$flag" in 568 b) sort_ignore_leading_space=1 ;; 569 n) sort_numeric=1 sort_ignore_leading_space=1 ;; 570 k) sort_field="${OPTARG%%,*}" ;; # only up to first comma 571 # NB: Unlike sort(1) only one POS allowed 572 t) sort_sep="$OPTARG" 573 if [ ${#sort_sep} -gt 1 ]; then 574 echo "$funcname: multi-character tab \`$sort_sep'" >&2 575 return 1 576 fi 577 sort_strict_fields=1 578 ;; 579 \?) return 1 ;; 580 esac 581 done 582 shift $(( $OPTIND - 1 )) 583 584 # Create transformation pattern to trim leading text if desired 585 case "$sort_field" in 586 ""|[!0-9]*|*[!0-9.]*) 587 echo "$funcname: invalid sort field \`$sort_field'" >&2 588 return 1 589 ;; 590 *.*) 591 skip_leading=${sort_field#*.} sort_field=${sort_field%%.*} 592 while [ ${skip_leading:-0} -gt 1 ] 2> /dev/null; do 593 trim="$trim?" skip_leading=$(( $skip_leading - 1 )) 594 done 595 esac 596 597 # Copy input to series of local numbered variables 598 # NB: IFS of NULL preserves leading whitespace 599 local LINE 600 while IFS= read -r LINE || [ "$LINE" ]; do 601 nitems=$(( $nitems + 1 )) 602 local src_$nitems="$LINE" 603 done 604 605 # 606 # Sort numbered locals using insertion sort 607 # 608 local curitem curitem_orig curitem_mod curitem_haskey 609 local dest dest_orig dest_mod dest_haskey 610 local d gt n 611 local i=1 612 while [ $i -le $nitems ]; do 613 curitem_haskey=1 # Assume sort field (-k POS) exists 614 eval curitem=\"\$src_$i\" 615 curitem_mod="$curitem" # for modified comparison 616 curitem_orig="$curitem" # for original comparison 617 618 # Trim leading whitespace if desired 619 if [ "$sort_ignore_leading_space" ]; then 620 while case "$curitem_orig" in 621 [$IFS]*) : ;; *) false; esac 622 do 623 curitem_orig="${curitem_orig#?}" 624 done 625 curitem_mod="$curitem_orig" 626 fi 627 628 # Shift modified comparison value if sort field (-k POS) is > 1 629 n=$sort_field 630 while [ $n -gt 1 ]; do 631 case "$curitem_mod" in 632 *[$sort_sep]*) 633 # Cut text up-to (and incl.) first separator 634 curitem_mod="${curitem_mod#*[$sort_sep]}" 635 636 # Skip NULLs unless strict field splitting 637 [ "$sort_strict_fields" ] || 638 [ "${curitem_mod%%[$sort_sep]*}" ] || 639 [ $n -eq 2 ] || 640 continue 641 ;; 642 *) 643 # Asked for a field that doesn't exist 644 curitem_haskey= break 645 esac 646 n=$(( $n - 1 )) 647 done 648 649 # Trim trailing words if sort field >= 1 650 [ $sort_field -ge 1 -a "$sort_numeric" ] && 651 curitem_mod="${curitem_mod%%[$sort_sep]*}" 652 653 # Apply optional trim (-k POS.TRIM) to cut leading characters 654 curitem_mod="${curitem_mod#$trim}" 655 656 # Determine the type of modified comparison to use initially 657 # NB: Prefer numerical if requested but fallback to standard 658 case "$curitem_mod" in 659 ""|[!0-9]*) # NULL or begins with non-number 660 gt=">" 661 [ "$sort_numeric" ] && curitem_mod=0 662 ;; 663 *) 664 if [ "$sort_numeric" ]; then 665 gt="-gt" 666 curitem_mod="${curitem_mod%%[!0-9]*}" 667 # NB: trailing non-digits removed 668 # otherwise numeric comparison fails 669 else 670 gt=">" 671 fi 672 esac 673 674 # If first time through, short-circuit below position-search 675 if [ $i -le 1 ]; then 676 d=0 677 else 678 d=1 679 fi 680 681 # 682 # Find appropriate element position 683 # 684 while [ $d -gt 0 ] 685 do 686 dest_haskey=$curitem_haskey 687 eval dest=\"\$dest_$d\" 688 dest_mod="$dest" # for modified comparison 689 dest_orig="$dest" # for original comparison 690 691 # Trim leading whitespace if desired 692 if [ "$sort_ignore_leading_space" ]; then 693 while case "$dest_orig" in 694 [$IFS]*) : ;; *) false; esac 695 do 696 dest_orig="${dest_orig#?}" 697 done 698 dest_mod="$dest_orig" 699 fi 700 701 # Shift modified value if sort field (-k POS) is > 1 702 n=$sort_field 703 while [ $n -gt 1 ]; do 704 case "$dest_mod" in 705 *[$sort_sep]*) 706 # Cut text up-to (and incl.) 1st sep 707 dest_mod="${dest_mod#*[$sort_sep]}" 708 709 # Skip NULLs unless strict fields 710 [ "$sort_strict_fields" ] || 711 [ "${dest_mod%%[$sort_sep]*}" ] || 712 [ $n -eq 2 ] || 713 continue 714 ;; 715 *) 716 # Asked for a field that doesn't exist 717 dest_haskey= break 718 esac 719 n=$(( $n - 1 )) 720 done 721 722 # Trim trailing words if sort field >= 1 723 [ $sort_field -ge 1 -a "$sort_numeric" ] && 724 dest_mod="${dest_mod%%[$sort_sep]*}" 725 726 # Apply optional trim (-k POS.TRIM), cut leading chars 727 dest_mod="${dest_mod#$trim}" 728 729 # Determine type of modified comparison to use 730 # NB: Prefer numerical if requested, fallback to std 731 case "$dest_mod" in 732 ""|[!0-9]*) # NULL or begins with non-number 733 gt=">" 734 [ "$sort_numeric" ] && dest_mod=0 735 ;; 736 *) 737 if [ "$sort_numeric" ]; then 738 gt="-gt" 739 dest_mod="${dest_mod%%[!0-9]*}" 740 # NB: kill trailing non-digits 741 # for numeric comparison safety 742 else 743 gt=">" 744 fi 745 esac 746 747 # Break if we've found the proper element position 748 if [ "$curitem_haskey" -a "$dest_haskey" ]; then 749 if [ "$dest_mod" = "$curitem_mod" ]; then 750 [ "$dest_orig" ">" "$curitem_orig" ] && 751 break 752 elif [ "$dest_mod" $gt "$curitem_mod" ] \ 753 2> /dev/null 754 then 755 break 756 fi 757 else 758 [ "$dest_orig" ">" "$curitem_orig" ] && break 759 fi 760 761 # Break if we've hit the end 762 [ $d -ge $i ] && break 763 764 d=$(( $d + 1 )) 765 done 766 767 # Shift remaining positions forward, making room for new item 768 n=$i 769 while [ $n -ge $d ]; do 770 # Shift destination item forward one placement 771 eval dest_$(( $n + 1 ))=\"\$dest_$n\" 772 n=$(( $n - 1 )) 773 done 774 775 # Place the element 776 if [ $i -eq 1 ]; then 777 local dest_1="$curitem" 778 else 779 local dest_$d="$curitem" 780 fi 781 782 i=$(( $i + 1 )) 783 done 784 785 # Print sorted results 786 d=1 787 while [ $d -le $nitems ]; do 788 eval echo \"\$dest_$d\" 789 d=$(( $d + 1 )) 790 done 791} 792 793# 794# wait_for_pids pid [pid ...] 795# spins until none of the pids exist 796# 797wait_for_pids() 798{ 799 local _list _prefix _nlist _j 800 801 _list="$@" 802 if [ -z "$_list" ]; then 803 return 804 fi 805 _prefix= 806 while true; do 807 _nlist=""; 808 for _j in $_list; do 809 if kill -0 $_j 2>/dev/null; then 810 _nlist="${_nlist}${_nlist:+ }$_j" 811 [ -n "$_prefix" ] && sleep 1 812 fi 813 done 814 if [ -z "$_nlist" ]; then 815 break 816 fi 817 _list=$_nlist 818 echo -n ${_prefix:-"Waiting for PIDS: "}$_list 819 _prefix=", " 820 pwait $_list 2>/dev/null 821 done 822 if [ -n "$_prefix" ]; then 823 echo "." 824 fi 825} 826 827# 828# get_pidfile_from_conf string file 829# 830# Takes a string to search for in the specified file. 831# Ignores lines with traditional comment characters. 832# 833# Example: 834# 835# if get_pidfile_from_conf string file; then 836# pidfile="$_pidfile_from_conf" 837# else 838# pidfile='appropriate default' 839# fi 840# 841get_pidfile_from_conf() 842{ 843 if [ -z "$1" -o -z "$2" ]; then 844 err 3 "USAGE: get_pidfile_from_conf string file ($name)" 845 fi 846 847 local string file line 848 849 string="$1" ; file="$2" 850 851 if [ ! -s "$file" ]; then 852 err 3 "get_pidfile_from_conf: $file does not exist ($name)" 853 fi 854 855 while read line; do 856 case "$line" in 857 *[#\;]*${string}*) continue ;; 858 *${string}*) break ;; 859 esac 860 done < $file 861 862 if [ -n "$line" ]; then 863 line=${line#*/} 864 _pidfile_from_conf="/${line%%[\"\;]*}" 865 else 866 return 1 867 fi 868} 869 870# 871# check_startmsgs 872# If rc_quiet is set (usually as a result of using faststart at 873# boot time) check if rc_startmsgs is enabled. 874# 875check_startmsgs() 876{ 877 if [ -n "$rc_quiet" ]; then 878 checkyesno rc_startmsgs 879 else 880 return 0 881 fi 882} 883 884# 885# startmsg 886# Preferred method to use when displaying start messages in lieu of echo. 887# 888startmsg() 889{ 890 check_startmsgs && echo "$@" 891} 892 893# 894# run_rc_command argument 895# Search for argument in the list of supported commands, which is: 896# "start stop restart rcvar status poll ${extra_commands}" 897# If there's a match, run ${argument}_cmd or the default method 898# (see below). 899# 900# If argument has a given prefix, then change the operation as follows: 901# Prefix Operation 902# ------ --------- 903# fast Skip the pid check, and set rc_fast=yes, rc_quiet=yes 904# force Set ${rcvar} to YES, and set rc_force=yes 905# one Set ${rcvar} to YES 906# quiet Don't output some diagnostics, and set rc_quiet=yes 907# 908# The following globals are used: 909# 910# Name Needed Purpose 911# ---- ------ ------- 912# name y Name of script. 913# 914# command n Full path to command. 915# Not needed if ${rc_arg}_cmd is set for 916# each keyword. 917# 918# command_args n Optional args/shell directives for command. 919# 920# command_interpreter n If not empty, command is interpreted, so 921# call check_{pidfile,process}() appropriately. 922# 923# desc n Description of script. 924# 925# extra_commands n List of extra commands supported. 926# 927# pidfile n If set, use check_pidfile $pidfile $command, 928# otherwise use check_process $command. 929# In either case, only check if $command is set. 930# 931# procname n Process name to check for instead of $command. 932# 933# rcvar n This is checked with checkyesno to determine 934# if the action should be run. 935# 936# ${name}_program n Full path to command. 937# Meant to be used in /etc/rc.conf to override 938# ${command}. 939# 940# ${name}_chroot n Directory to chroot to before running ${command} 941# Requires /usr to be mounted. 942# 943# ${name}_chdir n Directory to cd to before running ${command} 944# (if not using ${name}_chroot). 945# 946# ${name}_cpuset n A list of CPUs to run ${command} on. 947# Requires /usr to be mounted. 948# 949# ${name}_flags n Arguments to call ${command} with. 950# NOTE: $flags from the parent environment 951# can be used to override this. 952# 953# ${name}_env n Environment variables to run ${command} with. 954# 955# ${name}_env_file n File to source variables to run ${command} with. 956# 957# ${name}_fib n Routing table number to run ${command} with. 958# 959# ${name}_nice n Nice level to run ${command} at. 960# 961# ${name}_oomprotect n Don't kill ${command} when swap space is exhausted. 962# 963# ${name}_umask n The file creation mask to run ${command} with. 964# 965# ${name}_user n User to run ${command} as, using su(1) if not 966# using ${name}_chroot. 967# Requires /usr to be mounted. 968# 969# ${name}_group n Group to run chrooted ${command} as. 970# Requires /usr to be mounted. 971# 972# ${name}_groups n Comma separated list of supplementary groups 973# to run the chrooted ${command} with. 974# Requires /usr to be mounted. 975# 976# ${name}_prepend n Command added before ${command}. 977# 978# ${name}_setup n Command executed during start, restart and 979# reload before ${rc_arg}_precmd is run. 980# 981# ${name}_login_class n Login class to use, else "daemon". 982# 983# ${name}_limits n limits(1) to apply to ${command}. 984# 985# ${name}_offcmd n If set, run if a service is not enabled. 986# 987# ${rc_arg}_cmd n If set, use this as the method when invoked; 988# Otherwise, use default command (see below) 989# 990# ${rc_arg}_precmd n If set, run just before performing the 991# ${rc_arg}_cmd method in the default 992# operation (i.e, after checking for required 993# bits and process (non)existence). 994# If this completes with a non-zero exit code, 995# don't run ${rc_arg}_cmd. 996# 997# ${rc_arg}_postcmd n If set, run just after performing the 998# ${rc_arg}_cmd method, if that method 999# returned a zero exit code. 1000# 1001# required_dirs n If set, check for the existence of the given 1002# directories before running a (re)start command. 1003# 1004# required_files n If set, check for the readability of the given 1005# files before running a (re)start command. 1006# 1007# required_modules n If set, ensure the given kernel modules are 1008# loaded before running a (re)start command. 1009# The check and possible loads are actually 1010# done after start_precmd so that the modules 1011# aren't loaded in vain, should the precmd 1012# return a non-zero status to indicate a error. 1013# If a word in the list looks like "foo:bar", 1014# "foo" is the KLD file name and "bar" is the 1015# module name. If a word looks like "foo~bar", 1016# "foo" is the KLD file name and "bar" is a 1017# egrep(1) pattern matching the module name. 1018# Otherwise the module name is assumed to be 1019# the same as the KLD file name, which is most 1020# common. See load_kld(). 1021# 1022# required_vars n If set, perform checkyesno on each of the 1023# listed variables before running the default 1024# (re)start command. 1025# 1026# Default behaviour for a given argument, if no override method is 1027# provided: 1028# 1029# Argument Default behaviour 1030# -------- ----------------- 1031# start if !running && checkyesno ${rcvar} 1032# ${command} 1033# 1034# stop if ${pidfile} 1035# rc_pid=$(check_pidfile $pidfile $command) 1036# else 1037# rc_pid=$(check_process $command) 1038# kill $sig_stop $rc_pid 1039# wait_for_pids $rc_pid 1040# ($sig_stop defaults to TERM.) 1041# 1042# reload Similar to stop, except use $sig_reload instead, 1043# and don't wait_for_pids. 1044# $sig_reload defaults to HUP. 1045# Note that `reload' isn't provided by default, 1046# it should be enabled via $extra_commands. 1047# 1048# restart Run `stop' then `start'. 1049# 1050# status Show if ${command} is running, etc. 1051# 1052# poll Wait for ${command} to exit. 1053# 1054# rcvar Display what rc.conf variable is used (if any). 1055# 1056# enabled Return true if the service is enabled. 1057# 1058# describe Show the service's description 1059# 1060# extracommands Show the service's extra commands 1061# 1062# Variables available to methods, and after run_rc_command() has 1063# completed: 1064# 1065# Variable Purpose 1066# -------- ------- 1067# rc_arg Argument to command, after fast/force/one processing 1068# performed 1069# 1070# rc_flags Flags to start the default command with. 1071# Defaults to ${name}_flags, unless overridden 1072# by $flags from the environment. 1073# This variable may be changed by the precmd method. 1074# 1075# rc_service Path to the service being executed, in case the service 1076# needs to re-invoke itself. 1077# 1078# rc_pid PID of command (if appropriate) 1079# 1080# rc_fast Not empty if "fast" was provided (q.v.) 1081# 1082# rc_force Not empty if "force" was provided (q.v.) 1083# 1084# rc_quiet Not empty if "quiet" was provided 1085# 1086# 1087run_rc_command() 1088{ 1089 _return=0 1090 rc_arg=$1 1091 if [ -z "$name" ]; then 1092 err 3 'run_rc_command: $name is not set.' 1093 fi 1094 1095 DebugOn rc:all rc:all:$rc_arg rc:$name rc:$name:$rc_arg $name:$rc_arg 1096 1097 # Don't repeat the first argument when passing additional command- 1098 # line arguments to the command subroutines. 1099 # 1100 shift 1 1101 rc_extra_args="$*" 1102 1103 _rc_prefix= 1104 case "$rc_arg" in 1105 fast*) # "fast" prefix; don't check pid 1106 rc_arg=${rc_arg#fast} 1107 rc_fast=yes 1108 rc_quiet=yes 1109 ;; 1110 force*) # "force" prefix; always run 1111 rc_force=yes 1112 _rc_prefix=force 1113 rc_arg=${rc_arg#${_rc_prefix}} 1114 if [ -n "${rcvar}" ]; then 1115 eval ${rcvar}=YES 1116 fi 1117 ;; 1118 one*) # "one" prefix; set ${rcvar}=yes 1119 _rc_prefix=one 1120 rc_arg=${rc_arg#${_rc_prefix}} 1121 if [ -n "${rcvar}" ]; then 1122 eval ${rcvar}=YES 1123 fi 1124 ;; 1125 quiet*) # "quiet" prefix; omit some messages 1126 _rc_prefix=quiet 1127 rc_arg=${rc_arg#${_rc_prefix}} 1128 rc_quiet=yes 1129 ;; 1130 esac 1131 1132 eval _override_command=\$${name}_program 1133 command=${_override_command:-$command} 1134 1135 _keywords="start stop restart rcvar enable disable delete enabled describe extracommands $extra_commands" 1136 rc_pid= 1137 _pidcmd= 1138 _procname=${procname:-${command}} 1139 1140 eval _cpuset=\$${name}_cpuset 1141 1142 # Loose validation of the configured cpuset; just make sure it starts 1143 # with a number. There have also been cases in the past where a hyphen 1144 # in a service name has caused eval errors, which trickle down into 1145 # various variables; don't let a situation like that break a bunch of 1146 # services just because of cpuset(1). 1147 case "$_cpuset" in 1148 [0-9]*) ;; 1149 *) _cpuset="" ;; 1150 esac 1151 1152 _cpusetcmd= 1153 if [ -n "$_cpuset" ]; then 1154 _cpusetcmd="$CPUSET -l $_cpuset" 1155 fi 1156 1157 # If a specific jail has a specific svcj request, honor it (YES/NO). 1158 # If not (variable empty), evaluate the global svcj catch-all. 1159 # A global YES can be overriden by a specific NO, and a global NO is overriden 1160 # by a specific YES. 1161 eval _svcj=\$${name}_svcj 1162 if [ -z "$_svcj" ]; then 1163 _svcj=${svcj_all_enable} 1164 if [ -z "$_svcj" ]; then 1165 eval ${name}_svcj=NO 1166 fi 1167 fi 1168 1169 # setup pid check command 1170 if [ -n "$_procname" ]; then 1171 if [ -n "$pidfile" ]; then 1172 _pidcmd='rc_pid=$(check_pidfile '"$pidfile $_procname $command_interpreter"')' 1173 else 1174 _pidcmd='rc_pid=$(check_process '"$_procname $command_interpreter"')' 1175 fi 1176 _keywords="${_keywords} status poll" 1177 else 1178 if [ ! -z "${status_cmd}" ] 1179 then 1180 _keywords="${_keywords} status" 1181 fi 1182 fi 1183 1184 if [ -z "$rc_arg" ]; then 1185 rc_usage $_keywords 1186 fi 1187 1188 if [ "$rc_arg" = "enabled" ] ; then 1189 checkyesno ${rcvar} 1190 return $? 1191 fi 1192 1193 if [ -n "$flags" ]; then # allow override from environment 1194 rc_flags=$flags 1195 else 1196 eval rc_flags=\$${name}_flags 1197 fi 1198 eval _chdir=\$${name}_chdir _chroot=\$${name}_chroot \ 1199 _nice=\$${name}_nice _user=\$${name}_user \ 1200 _group=\$${name}_group _groups=\$${name}_groups \ 1201 _fib=\$${name}_fib _env=\$${name}_env \ 1202 _prepend=\$${name}_prepend _login_class=\${${name}_login_class:-daemon} \ 1203 _limits=\$${name}_limits _oomprotect=\$${name}_oomprotect \ 1204 _setup=\$${name}_setup _env_file=\$${name}_env_file \ 1205 _umask=\$${name}_umask _svcj_options=\$${name}_svcj_options 1206 1207 if [ -n "$_env_file" ] && [ -r "${_env_file}" ]; then # load env from file 1208 set -a 1209 . $_env_file 1210 set +a 1211 fi 1212 1213 if [ -n "$_user" ]; then # unset $_user if running as that user 1214 if [ "$_user" = "$(eval $IDCMD)" ]; then 1215 unset _user 1216 fi 1217 fi 1218 1219 if [ -n "$_svcj_options" ]; then # translate service jail options 1220 _svcj_cmd_options="" 1221 1222 _svcj_sysvipc_x=0 1223 for _svcj_option in $_svcj_options; do 1224 case "$_svcj_option" in 1225 mlock) 1226 _svcj_cmd_options="allow.mlock ${_svcj_cmd_options}" 1227 ;; 1228 netv4) 1229 _svcj_cmd_options="ip4=inherit allow.reserved_ports ${_svcj_cmd_options}" 1230 ;; 1231 netv6) 1232 _svcj_cmd_options="ip6=inherit allow.reserved_ports ${_svcj_cmd_options}" 1233 ;; 1234 net_basic) 1235 _svcj_cmd_options="ip4=inherit ip6=inherit allow.reserved_ports ${_svcj_cmd_options}" 1236 ;; 1237 net_raw) 1238 _svcj_cmd_options="allow.raw_sockets ${_svcj_cmd_options}" 1239 ;; 1240 net_all) 1241 _svcj_cmd_options="allow.socket_af allow.raw_sockets allow.reserved_ports ip4=inherit ip6=inherit ${_svcj_cmd_options}" 1242 ;; 1243 nfsd) 1244 _svcj_cmd_options="allow.nfsd enforce_statfs=1 ${_svcj_cmd_options}" 1245 ;; 1246 sysvipc) 1247 _svcj_sysvipc_x=$((${_svcj_sysvipc_x} + 1)) 1248 _svcj_cmd_options="sysvmsg=inherit sysvsem=inherit sysvshm=inherit ${_svcj_cmd_options}" 1249 ;; 1250 sysvipcnew) 1251 _svcj_sysvipc_x=$((${_svcj_sysvipc_x} + 1)) 1252 _svcj_cmd_options="sysvmsg=new sysvsem=new sysvshm=new ${_svcj_cmd_options}" 1253 ;; 1254 vmm) 1255 _svcj_cmd_options="allow.vmm ${_svcj_cmd_options}" 1256 ;; 1257 *) 1258 echo ${name}: unknown service jail option: $_svcj_option 1259 ;; 1260 esac 1261 done 1262 if [ ${_svcj_sysvipc_x} -gt 1 ]; then 1263 echo -n "ERROR: more than one sysvipc option is " 1264 echo "specified in ${name}_svcj_options: $_svcj_options" 1265 return 1 1266 fi 1267 fi 1268 1269 [ -z "$autoboot" ] && eval $_pidcmd # determine the pid if necessary 1270 1271 for _elem in $_keywords; do 1272 if [ "$_elem" != "$rc_arg" ]; then 1273 continue 1274 fi 1275 # if ${rcvar} is set, $1 is not "rcvar", "describe", 1276 # "enable", "delete" or "status", and ${rc_pid} is 1277 # not set, run: 1278 # checkyesno ${rcvar} 1279 # and return if that failed 1280 # 1281 if [ -n "${rcvar}" -a "$rc_arg" != "rcvar" -a "$rc_arg" != "stop" \ 1282 -a "$rc_arg" != "delete" -a "$rc_arg" != "enable" \ 1283 -a "$rc_arg" != "describe" -a "$rc_arg" != "status" ] || 1284 [ -n "${rcvar}" -a "$rc_arg" = "stop" -a -z "${rc_pid}" ]; then 1285 if ! checkyesno ${rcvar}; then 1286 [ "$rc_arg" = "start" ] && _run_rc_offcmd 1287 if [ -z "${rc_quiet}" ]; then 1288 echo -n "Cannot '${rc_arg}' $name. Set ${rcvar} to " 1289 echo -n "YES in /etc/rc.conf or use 'one${rc_arg}' " 1290 echo "instead of '${rc_arg}'." 1291 fi 1292 return 0 1293 fi 1294 fi 1295 1296 if [ $rc_arg = "start" -a -z "$rc_fast" -a -n "$rc_pid" ]; then 1297 if [ -z "$rc_quiet" ]; then 1298 echo 1>&2 "${name} already running? " \ 1299 "(pid=$rc_pid)." 1300 fi 1301 return 1 1302 fi 1303 1304 # if there's a custom ${XXX_cmd}, 1305 # run that instead of the default 1306 # 1307 eval _cmd=\$${rc_arg}_cmd \ 1308 _precmd=\$${rc_arg}_precmd \ 1309 _postcmd=\$${rc_arg}_postcmd 1310 1311 if [ -n "$_cmd" ]; then 1312 rc_trace 1 "$_cmd" 1313 if [ -n "$_env" ]; then 1314 eval "export -- $_env" 1315 fi 1316 1317 if [ "${_rc_svcj}" != jailing ]; then 1318 # service can redefine all so 1319 # check for valid setup target 1320 if [ "$rc_arg" = 'start' -o \ 1321 "$rc_arg" = 'restart' -o \ 1322 "$rc_arg" = 'reload' ]; then 1323 _run_rc_setup || \ 1324 warn "failed to setup ${name}" 1325 fi 1326 _run_rc_precmd || return 1 1327 fi 1328 if ! checkyesno ${name}_svcj; then 1329 _run_rc_doit "$_cpusetcmd $_cmd $rc_extra_args" || return 1 1330 else 1331 case "$rc_arg" in 1332 start) 1333 if [ "${_rc_svcj}" != jailing ]; then 1334 _return=1 1335 _do_jailing=1 1336 1337 if check_jail jailed; then 1338 if [ $(${SYSCTL_N} security.jail.children.max) -eq 0 ]; then 1339 echo ERROR: jail parameter children.max is set to 0, can not create a new service jail. 1340 _do_jailing=0 1341 else 1342 _free_jails=$(($(${SYSCTL_N} security.jail.children.max) - $(${SYSCTL_N} security.jail.children.cur))) 1343 if [ ${_free_jails} -eq 0 ]; then 1344 echo ERROR: max number of jail children reached, can not create a new service jail. 1345 _do_jailing=0 1346 1347 fi 1348 fi 1349 fi 1350 if [ ${_do_jailing} -eq 1 ]; then 1351 $JAIL_CMD -c $_svcj_generic_params $_svcj_cmd_options \ 1352 exec.start="${SERVICE} -E _rc_svcj=jailing ${name} ${_rc_prefix}start $rc_extra_args" \ 1353 exec.stop="${SERVICE} -E _rc_svcj=jailing ${name} ${_rc_prefix}stop $rc_extra_args" \ 1354 exec.consolelog="/var/log/svcj_${name}_console.log" \ 1355 name=svcj-${name} && _return=0 1356 fi 1357 else 1358 _run_rc_doit "$_cpusetcmd $_cmd $rc_extra_args" || _return=1 1359 fi 1360 ;; 1361 stop) 1362 if [ "${_rc_svcj}" != jailing ]; then 1363 $SERVICE -E _rc_svcj=jailing -j svcj-${name} ${name} ${_rc_prefix}stop $rc_extra_args || _return=1 1364 $JAIL_CMD -r svcj-${name} 2>/dev/null 1365 else 1366 _run_rc_doit "$_cpusetcmd $_cmd $rc_extra_args" || _return=1 1367 fi 1368 ;; 1369 restart|status) ;; # no special case needed for svcj or handled somewhere else 1370 *) 1371 eval _rc_svcj_extra_cmd=\$${name}_${rc_arg}_svcj_enable 1372 : ${_rc_svcj_extra_cmd:=NO} 1373 if checkyesno _rc_svcj_extra_cmd && [ "${_rc_svcj}" != jailing ]; then 1374 $SERVICE -v -E _rc_svcj=jailing -j svcj-${name} ${name} ${_rc_prefix}${rc_arg} $rc_extra_args || _return=1 1375 else 1376 _run_rc_doit "$_cpusetcmd $_cmd $rc_extra_args" || _return=1 1377 fi 1378 ;; 1379 esac 1380 fi 1381 if [ "${_rc_svcj}" != jailing ]; then 1382 _run_rc_postcmd 1383 fi 1384 return $_return 1385 fi 1386 1387 case "$rc_arg" in # default operations... 1388 1389 describe) 1390 if [ -n "$desc" ]; then 1391 echo "$desc" 1392 fi 1393 ;; 1394 1395 extracommands) 1396 echo "$extra_commands" 1397 ;; 1398 1399 enable) 1400 _out=$(/usr/sbin/sysrc -vs "$name" "$rcvar=YES") && 1401 echo "$name enabled in ${_out%%:*}" 1402 ;; 1403 1404 disable) 1405 _out=$(/usr/sbin/sysrc -vs "$name" "$rcvar=NO") && 1406 echo "$name disabled in ${_out%%:*}" 1407 ;; 1408 1409 delete) 1410 _files= 1411 for _file in $(sysrc -lEs "$name"); do 1412 _out=$(sysrc -Fif $_file "$rcvar") && _files="$_files $_file" 1413 done 1414 /usr/sbin/sysrc -x "$rcvar" && echo "$rcvar deleted in ${_files# }" 1415 # delete file in rc.conf.d if desired and empty. 1416 checkyesno service_delete_empty || _files= 1417 for _file in $_files; do 1418 [ "$_file" = "${_file#*/rc.conf.d/}" ] && continue 1419 [ $(/usr/bin/stat -f%z $_file) -gt 0 ] && continue 1420 /bin/rm "$_file" && echo "Empty file $_file removed" 1421 done 1422 ;; 1423 1424 status) 1425 _run_rc_precmd || return 1 1426 if [ -n "$rc_pid" ]; then 1427 echo "${name} is running as pid $rc_pid." 1428 else 1429 echo "${name} is not running." 1430 return 1 1431 fi 1432 _run_rc_postcmd 1433 ;; 1434 1435 start) 1436 if [ ! -x "${_chroot}${_chroot:+/}${command}" ]; then 1437 warn "run_rc_command: cannot run $command" 1438 return 1 1439 fi 1440 1441 if [ "${_rc_svcj}" != jailing ]; then 1442 _run_rc_setup || warn "failed to setup ${name}" 1443 1444 if ! _run_rc_precmd; then 1445 warn "failed precmd routine for ${name}" 1446 return 1 1447 fi 1448 fi 1449 1450 if checkyesno ${name}_svcj; then 1451 if [ "${_rc_svcj}" != jailing ]; then 1452 if check_jail jailed; then 1453 if [ $(${SYSCTL_N} security.jail.children.max) -eq 0 ]; then 1454 echo ERROR: jail parameter children.max is set to 0, can not create a new service jail. 1455 return 1 1456 else 1457 _free_jails=$(($(${SYSCTL_N} security.jail.children.max) - $(${SYSCTL_N} security.jail.children.cur))) 1458 if [ ${_free_jails} -eq 0 ]; then 1459 echo ERROR: max number of jail children reached, can not create a new service jail. 1460 return 1 1461 fi 1462 fi 1463 fi 1464 $JAIL_CMD -c $_svcj_generic_params $_svcj_cmd_options\ 1465 exec.start="${SERVICE} -E _rc_svcj=jailing ${name} ${_rc_prefix}start $rc_extra_args" \ 1466 exec.stop="${SERVICE} -E _rc_svcj=jailing ${name} ${_rc_prefix}stop $rc_extra_args" \ 1467 exec.consolelog="/var/log/svcj_${name}_console.log" \ 1468 name=svcj-${name} || return 1 1469 fi 1470 fi 1471 1472 # setup the full command to run 1473 # 1474 startmsg "Starting ${name}." 1475 if [ -n "$_chroot" ]; then 1476 _cd= 1477 _doit="\ 1478${_nice:+nice -n $_nice }\ 1479$_cpusetcmd \ 1480${_fib:+setfib -F $_fib }\ 1481${_env:+env $_env }\ 1482chroot ${_user:+-u $_user }${_group:+-g $_group }${_groups:+-G $_groups }\ 1483$_chroot $command $rc_flags $command_args" 1484 else 1485 _cd="${_chdir:+cd $_chdir && }" 1486 _doit="\ 1487${_fib:+setfib -F $_fib }\ 1488${_env:+env $_env }\ 1489$_cpusetcmd $command $rc_flags $command_args" 1490 if [ -n "$_user" ]; then 1491 _doit="su -m $_user -c 'sh -c \"$_doit\"'" 1492 fi 1493 if [ -n "$_nice" ]; then 1494 if [ -z "$_user" ]; then 1495 _doit="sh -c \"$_doit\"" 1496 fi 1497 _doit="nice -n $_nice $_doit" 1498 fi 1499 if [ -n "$_prepend" ]; then 1500 _doit="$_prepend $_doit" 1501 fi 1502 fi 1503 1504 # Prepend default limits 1505 _doit="$_cd limits -C $_login_class $_limits $_doit" 1506 1507 local _really_run_it=true 1508 if checkyesno ${name}_svcj; then 1509 if [ "${_rc_svcj}" != jailing ]; then 1510 _really_run_it=false 1511 fi 1512 fi 1513 1514 if [ "$_really_run_it" = true ]; then 1515 # run the full command 1516 # 1517 if ! _run_rc_doit "$_doit"; then 1518 warn "failed to start ${name}" 1519 return 1 1520 fi 1521 fi 1522 1523 if [ "${_rc_svcj}" != jailing ]; then 1524 # finally, run postcmd 1525 # 1526 _run_rc_postcmd 1527 fi 1528 ;; 1529 1530 stop) 1531 if [ -z "$rc_pid" ]; then 1532 [ -n "$rc_fast" ] && return 0 1533 _run_rc_notrunning 1534 return 1 1535 fi 1536 1537 _run_rc_precmd || return 1 1538 1539 # send the signal to stop 1540 # 1541 echo "Stopping ${name}." 1542 _doit=$(_run_rc_killcmd "${sig_stop:-TERM}") 1543 _run_rc_doit "$_doit" || return 1 1544 1545 # wait for the command to exit, 1546 # and run postcmd. 1547 wait_for_pids $rc_pid 1548 1549 if checkyesno ${name}_svcj; then 1550 # remove service jail 1551 $JAIL_CMD -r svcj-${name} 2>/dev/null 1552 fi 1553 1554 _run_rc_postcmd 1555 ;; 1556 1557 reload) 1558 if [ -z "$rc_pid" ]; then 1559 _run_rc_notrunning 1560 return 1 1561 fi 1562 1563 _run_rc_setup || warn "failed to setup ${name}" 1564 1565 _run_rc_precmd || return 1 1566 1567 _doit=$(_run_rc_killcmd "${sig_reload:-HUP}") 1568 _run_rc_doit "$_doit" || return 1 1569 1570 _run_rc_postcmd 1571 ;; 1572 1573 restart) 1574 _run_rc_setup || warn "failed to setup ${name}" 1575 1576 # prevent restart being called more 1577 # than once by any given script 1578 # 1579 if ${_rc_restart_done:-false}; then 1580 return 0 1581 fi 1582 _rc_restart_done=true 1583 1584 _run_rc_precmd || return 1 1585 1586 # run those in a subshell to keep global variables 1587 ( run_rc_command ${_rc_prefix}stop $rc_extra_args ) 1588 ( run_rc_command ${_rc_prefix}start $rc_extra_args ) 1589 _return=$? 1590 [ $_return -ne 0 ] && [ -z "$rc_force" ] && return 1 1591 1592 _run_rc_postcmd 1593 ;; 1594 1595 poll) 1596 _run_rc_precmd || return 1 1597 if [ -n "$rc_pid" ]; then 1598 wait_for_pids $rc_pid 1599 fi 1600 _run_rc_postcmd 1601 ;; 1602 1603 rcvar) 1604 echo -n "# $name" 1605 if [ -n "$desc" ]; then 1606 echo " : $desc" 1607 else 1608 echo "" 1609 fi 1610 echo "#" 1611 # Get unique vars in $rcvar $rcvars 1612 for _v in $rcvar $rcvars; do 1613 case $v in 1614 $_v\ *|\ *$_v|*\ $_v\ *) ;; 1615 *) v="${v# } $_v" ;; 1616 esac 1617 done 1618 1619 # Display variables. 1620 for _v in $v; do 1621 if [ -z "$_v" ]; then 1622 continue 1623 fi 1624 1625 eval _desc=\$${_v}_desc 1626 eval _defval=\$${_v}_defval 1627 _h="-" 1628 1629 eval echo \"$_v=\\\"\$$_v\\\"\" 1630 # decode multiple lines of _desc 1631 while [ -n "$_desc" ]; do 1632 case $_desc in 1633 *^^*) 1634 echo "# $_h ${_desc%%^^*}" 1635 _desc=${_desc#*^^} 1636 _h=" " 1637 ;; 1638 *) 1639 echo "# $_h ${_desc}" 1640 break 1641 ;; 1642 esac 1643 done 1644 echo "# (default: \"$_defval\")" 1645 done 1646 echo "" 1647 ;; 1648 1649 *) 1650 rc_usage $_keywords 1651 ;; 1652 1653 esac 1654 1655 # Apply protect(1) to the PID if ${name}_oomprotect is set. 1656 case "$rc_arg" in 1657 start) 1658 # We cannot use protect(1) inside jails. 1659 if [ -n "$_oomprotect" ] && [ -f "${PROTECT}" ] && 1660 [ "$(sysctl -n security.jail.jailed)" -eq 0 ]; then 1661 [ -z "${rc_pid}" ] && eval $_pidcmd 1662 case $_oomprotect in 1663 [Aa][Ll][Ll]) 1664 ${PROTECT} -d -i -p ${rc_pid} 1665 ;; 1666 [Yy][Ee][Ss]) 1667 ${PROTECT} -p ${rc_pid} 1668 ;; 1669 esac 1670 fi 1671 ;; 1672 esac 1673 1674 return $_return 1675 done 1676 1677 echo 1>&2 "$0: unknown directive '$rc_arg'." 1678 rc_usage $_keywords 1679 # not reached 1680} 1681 1682# 1683# Helper functions for run_rc_command: common code. 1684# They use such global variables besides the exported rc_* ones: 1685# 1686# name R/W 1687# ------------------ 1688# _offcmd R 1689# _precmd R 1690# _postcmd R 1691# _return W 1692# _setup R 1693# 1694_run_rc_offcmd() 1695{ 1696 eval _offcmd=\$${name}_offcmd 1697 if [ -n "$_offcmd" ]; then 1698 if [ -n "$_env" ]; then 1699 eval "export -- $_env" 1700 fi 1701 debug "run_rc_command: ${name}_offcmd: $_offcmd $rc_extra_args" 1702 eval "$_offcmd $rc_extra_args" 1703 _return=$? 1704 fi 1705 return 0 1706} 1707 1708_run_rc_precmd() 1709{ 1710 check_required_before "$rc_arg" || return 1 1711 1712 if [ -n "$_precmd" ]; then 1713 debug "run_rc_command: ${rc_arg}_precmd: $_precmd $rc_extra_args" 1714 eval "$_precmd $rc_extra_args" 1715 _return=$? 1716 1717 # If precmd failed and force isn't set, request exit. 1718 if [ $_return -ne 0 ] && [ -z "$rc_force" ]; then 1719 return 1 1720 fi 1721 fi 1722 1723 check_required_after "$rc_arg" || return 1 1724 1725 return 0 1726} 1727 1728_run_rc_postcmd() 1729{ 1730 if [ -n "$_postcmd" ]; then 1731 debug "run_rc_command: ${rc_arg}_postcmd: $_postcmd $rc_extra_args" 1732 eval "$_postcmd $rc_extra_args" 1733 _return=$? 1734 fi 1735 return 0 1736} 1737 1738_run_rc_setup() 1739{ 1740 # prevent multiple execution on restart => stop/start split 1741 if ! ${_rc_restart_done:-false} && [ -n "$_setup" ]; then 1742 debug "run_rc_command: ${rc_arg}_setup: $_setup" 1743 eval "$_setup" 1744 _return=$? 1745 if [ $_return -ne 0 ]; then 1746 return 1 1747 fi 1748 fi 1749 return 0 1750} 1751 1752_run_rc_doit() 1753{ 1754 local _m 1755 1756 debug "run_rc_command: doit: $*" 1757 _m=$(umask) 1758 ${_umask:+umask ${_umask}} 1759 eval "$@" 1760 _return=$? 1761 umask ${_m} 1762 1763 # If command failed and force isn't set, request exit. 1764 if [ $_return -ne 0 ] && [ -z "$rc_force" ]; then 1765 return 1 1766 fi 1767 1768 return 0 1769} 1770 1771_run_rc_notrunning() 1772{ 1773 local _pidmsg 1774 1775 if [ -n "$pidfile" ]; then 1776 _pidmsg=" (check $pidfile)." 1777 else 1778 _pidmsg= 1779 fi 1780 echo 1>&2 "${name} not running?${_pidmsg}" 1781} 1782 1783_run_rc_killcmd() 1784{ 1785 local _cmd 1786 1787 _cmd="kill -$1 $rc_pid" 1788 if [ -n "$_user" ]; then 1789 _cmd="su -m ${_user} -c 'sh -c \"${_cmd}\"'" 1790 fi 1791 echo "$_cmd" 1792} 1793 1794# 1795# run_rc_script file arg 1796# Start the script `file' with `arg', and correctly handle the 1797# return value from the script. 1798# If `file' ends with `.sh' and lives in /etc/rc.d, ignore it as it's 1799# an old-style startup file. 1800# If `file' ends with `.sh' and does not live in /etc/rc.d, it's sourced 1801# into the current environment if $rc_fast_and_loose is set; otherwise 1802# it is run as a child process. 1803# If `file' appears to be a backup or scratch file, ignore it. 1804# Otherwise if it is executable run as a child process. 1805# 1806run_rc_script() 1807{ 1808 _file=$1 1809 _arg=$2 1810 if [ -z "$_file" -o -z "$_arg" ]; then 1811 err 3 'USAGE: run_rc_script file arg' 1812 fi 1813 1814 unset name command command_args command_interpreter \ 1815 extra_commands pidfile procname \ 1816 rcvar rcvars rcvars_obsolete required_dirs required_files \ 1817 required_vars 1818 eval unset ${_arg}_cmd ${_arg}_precmd ${_arg}_postcmd 1819 1820 rc_trace 0 "$_file $_arg" 1821 # don't use it if we don't trust it 1822 is_verified $_file || return 1823 1824 rc_service="$_file" 1825 case "$_file" in 1826 /etc/rc.d/*.sh) # no longer allowed in the base 1827 warn "Ignoring old-style startup script $_file" 1828 ;; 1829 *[~#]|*.OLD|*.bak|*.orig|*,v) # scratch file; skip 1830 warn "Ignoring scratch file $_file" 1831 ;; 1832 *) # run in subshell 1833 if [ -x $_file ]; then 1834 DebugOn $_file $_file:$_arg rc:${_file##*/} rc:${_file##*/}:$_arg ${_file##*/} ${_file##*/}:$_arg 1835 1836 if [ -n "$rc_boottrace" ]; then 1837 boottrace_fn "$_file" "$_arg" 1838 elif [ -n "$rc_fast_and_loose" ]; then 1839 set $_arg; . $_file 1840 else 1841 ( trap "echo Script $_file interrupted >&2 ; kill -QUIT $$" 3 1842 trap "echo Script $_file interrupted >&2 ; exit 1" 2 1843 trap "echo Script $_file running >&2" 29 1844 set $_arg; . $_file ) 1845 fi 1846 DebugOff $_file $_file:$_arg rc:${_file##*/} rc:${_file##*/}:$_arg ${_file##*/} ${_file##*/}:$_arg 1847 fi 1848 ;; 1849 esac 1850} 1851 1852# 1853# run_rc_scripts [options] file [...] 1854# 1855# Call `run_rc_script' for each "file" unless already listed in 1856# $_rc_elem_done. 1857# 1858# Options: 1859# 1860# --arg "arg" 1861# Pass "arg" to `run_rc_script' default is $_boot. 1862# 1863# --break "marker" 1864# If any "file" matches "marker" stop processing. 1865# 1866_rc_elem_done= 1867run_rc_scripts() 1868{ 1869 local _arg=${_boot} 1870 local _rc_elem 1871 local _rc_breaks= 1872 1873 while :; do 1874 case "$1" in 1875 --arg) 1876 _arg="$2" 1877 shift 2 1878 ;; 1879 --break) 1880 _rc_breaks="$_rc_breaks $2" 1881 shift 2 1882 ;; 1883 *) 1884 break 1885 ;; 1886 esac 1887 done 1888 for _rc_elem in "$@"; do 1889 : _rc_elem=$_rc_elem 1890 case " $_rc_elem_done " in 1891 *" $_rc_elem "*) 1892 continue 1893 ;; 1894 esac 1895 run_rc_script ${_rc_elem} ${_arg} 1896 _rc_elem_done="$_rc_elem_done $_rc_elem" 1897 case " $_rc_breaks " in 1898 *" ${_rc_elem##*/} "*) 1899 break 1900 ;; 1901 esac 1902 done 1903} 1904 1905boottrace_fn() 1906{ 1907 local _file _arg 1908 _file=$1 1909 _arg=$2 1910 1911 if [ -n "$rc_fast_and_loose" ]; then 1912 boottrace_sysctl "$_file start" 1913 set $_arg; . $_file 1914 boottrace_sysctl "$_file done" 1915 else 1916 _boot="${_boot}" rc_fast="${rc_fast}" autoboot="${autoboot}" \ 1917 $boottrace_cmd "$_file" "$_arg" 1918 fi 1919} 1920 1921boottrace_sysctl() 1922{ 1923 ${SYSCTL} kern.boottrace.boottrace="$1" 1924} 1925 1926# 1927# load_rc_config [service] 1928# Source in the configuration file(s) for a given service. 1929# If no service is specified, only the global configuration 1930# file(s) will be loaded. 1931# 1932load_rc_config() 1933{ 1934 local _name _rcvar_val _var _defval _v _msg _new _d _dot 1935 _name=$1 1936 _dot=${load_rc_config_reader:-dot} 1937 1938 case "$_dot" in 1939 dot|[sv]dot) 1940 ;; 1941 *) warn "Ignoring invalid load_rc_config_reader" 1942 _dot=dot 1943 ;; 1944 esac 1945 case "$1" in 1946 -s|--safe) 1947 _dot=sdot 1948 _name=$2 1949 shift 1950 ;; 1951 -v|--verify) 1952 _dot=vdot 1953 _name=$2 1954 shift 1955 ;; 1956 esac 1957 1958 DebugOn rc:$_name $_name 1959 1960 if ${_rc_conf_loaded:-false}; then 1961 : 1962 else 1963 if [ -r /etc/defaults/rc.conf ]; then 1964 debug "Sourcing /etc/defaults/rc.conf" 1965 $_dot /etc/defaults/rc.conf 1966 source_rc_confs 1967 elif [ -r /etc/rc.conf ]; then 1968 debug "Sourcing /etc/rc.conf (/etc/defaults/rc.conf doesn't exist)." 1969 $_dot /etc/rc.conf 1970 fi 1971 _rc_conf_loaded=true 1972 fi 1973 1974 # If a service name was specified, attempt to load 1975 # service-specific configuration 1976 if [ -n "$_name" ] ; then 1977 for _d in /etc ${local_startup}; do 1978 _d=${_d%/rc.d} 1979 if [ -f ${_d}/rc.conf.d/"$_name" ]; then 1980 debug "Sourcing ${_d}/rc.conf.d/$_name" 1981 $_dot ${_d}/rc.conf.d/"$_name" 1982 elif [ -d ${_d}/rc.conf.d/"$_name" ] ; then 1983 local _rc 1984 for _rc in ${_d}/rc.conf.d/"$_name"/* ; do 1985 if [ -f "$_rc" ] ; then 1986 debug "Sourcing $_rc" 1987 $_dot "$_rc" 1988 fi 1989 done 1990 fi 1991 done 1992 fi 1993 1994 # Set defaults if defined. 1995 for _var in $rcvar $rcvars; do 1996 eval _defval=\$${_var}_defval 1997 if [ -n "$_defval" ]; then 1998 eval : \${$_var:=\$${_var}_defval} 1999 fi 2000 done 2001 2002 # check obsolete rc.conf variables 2003 for _var in $rcvars_obsolete; do 2004 eval _v=\$$_var 2005 eval _msg=\$${_var}_obsolete_msg 2006 eval _new=\$${_var}_newvar 2007 case $_v in 2008 "") 2009 ;; 2010 *) 2011 if [ -z "$_new" ]; then 2012 _msg="Ignored." 2013 else 2014 eval $_new=\"\$$_var\" 2015 if [ -z "$_msg" ]; then 2016 _msg="Use \$$_new instead." 2017 fi 2018 fi 2019 warn "\$$_var is obsolete. $_msg" 2020 ;; 2021 esac 2022 done 2023} 2024 2025# 2026# load_rc_config_var name var 2027# Read the rc.conf(5) var for name and set in the 2028# current shell, using load_rc_config in a subshell to prevent 2029# unwanted side effects from other variable assignments. 2030# 2031load_rc_config_var() 2032{ 2033 if [ $# -ne 2 ]; then 2034 err 3 'USAGE: load_rc_config_var name var' 2035 fi 2036 eval $(eval '( 2037 load_rc_config '$1' >/dev/null; 2038 if [ -n "${'$2'}" -o "${'$2'-UNSET}" != "UNSET" ]; then 2039 echo '$2'=\'\''${'$2'}\'\''; 2040 fi 2041 )' ) 2042} 2043 2044# 2045# rc_usage commands 2046# Print a usage string for $0, with `commands' being a list of 2047# valid commands. 2048# 2049rc_usage() 2050{ 2051 echo -n 1>&2 "Usage: $0 [fast|force|one|quiet](" 2052 2053 _sep= 2054 for _elem; do 2055 echo -n 1>&2 "$_sep$_elem" 2056 _sep="|" 2057 done 2058 echo 1>&2 ")" 2059 exit 1 2060} 2061 2062# 2063# err exitval message 2064# Display message to stderr and log to the syslog, and exit with exitval. 2065# 2066err() 2067{ 2068 exitval=$1 2069 shift 2070 2071 if [ -x /usr/bin/logger ]; then 2072 logger "$0: ERROR: $*" 2073 fi 2074 echo 1>&2 "$0: ERROR: $*" 2075 exit $exitval 2076} 2077 2078# 2079# warn message 2080# Display message to stderr and log to the syslog. 2081# 2082warn() 2083{ 2084 if [ -x /usr/bin/logger ]; then 2085 logger "$0: WARNING: $*" 2086 fi 2087 echo 1>&2 "$0: WARNING: $*" 2088} 2089 2090# 2091# info message 2092# Display informational message to stdout and log to syslog. 2093# 2094info() 2095{ 2096 case ${rc_info} in 2097 [Yy][Ee][Ss]|[Tt][Rr][Uu][Ee]|[Oo][Nn]|1) 2098 if [ -x /usr/bin/logger ]; then 2099 logger "$0: INFO: $*" 2100 fi 2101 echo "$0: INFO: $*" 2102 ;; 2103 esac 2104} 2105 2106# 2107# debug message 2108# If debugging is enabled in rc.conf output message to stderr. 2109# BEWARE that you don't call any subroutine that itself calls this 2110# function. 2111# 2112debug() 2113{ 2114 case ${rc_debug} in 2115 [Yy][Ee][Ss]|[Tt][Rr][Uu][Ee]|[Oo][Nn]|1) 2116 if [ -x /usr/bin/logger ]; then 2117 logger "$0: DEBUG: $*" 2118 fi 2119 echo 1>&2 "$0: DEBUG: $*" 2120 ;; 2121 esac 2122} 2123 2124# 2125# backup_file action file cur backup 2126# Make a backup copy of `file' into `cur', and save the previous 2127# version of `cur' as `backup'. 2128# 2129# The `action' keyword can be one of the following: 2130# 2131# add `file' is now being backed up (and is possibly 2132# being reentered into the backups system). `cur' 2133# is created. 2134# 2135# update `file' has changed and needs to be backed up. 2136# If `cur' exists, it is copied to `back' 2137# and then `file' is copied to `cur'. 2138# 2139# remove `file' is no longer being tracked by the backups 2140# system. `cur' is moved `back'. 2141# 2142# 2143backup_file() 2144{ 2145 _action=$1 2146 _file=$2 2147 _cur=$3 2148 _back=$4 2149 2150 case $_action in 2151 add|update) 2152 if [ -f $_cur ]; then 2153 cp -p $_cur $_back 2154 fi 2155 cp -p $_file $_cur 2156 chown root:wheel $_cur 2157 ;; 2158 remove) 2159 mv -f $_cur $_back 2160 ;; 2161 esac 2162} 2163 2164# make_symlink src link 2165# Make a symbolic link 'link' to src from basedir. If the 2166# directory in which link is to be created does not exist 2167# a warning will be displayed and an error will be returned. 2168# Returns 0 on success, 1 otherwise. 2169# 2170make_symlink() 2171{ 2172 local src link linkdir _me 2173 src="$1" 2174 link="$2" 2175 linkdir="`dirname $link`" 2176 _me="make_symlink()" 2177 2178 if [ -z "$src" -o -z "$link" ]; then 2179 warn "$_me: requires two arguments." 2180 return 1 2181 fi 2182 if [ ! -d "$linkdir" ]; then 2183 warn "$_me: the directory $linkdir does not exist." 2184 return 1 2185 fi 2186 if ! ln -sf $src $link; then 2187 warn "$_me: unable to make a symbolic link from $link to $src" 2188 return 1 2189 fi 2190 return 0 2191} 2192 2193# devfs_rulesets_from_file file 2194# Reads a set of devfs commands from file, and creates 2195# the specified rulesets with their rules. Returns non-zero 2196# if there was an error. 2197# 2198devfs_rulesets_from_file() 2199{ 2200 local file _err _me _opts 2201 file="$1" 2202 _me="devfs_rulesets_from_file" 2203 _err=0 2204 2205 if [ -z "$file" ]; then 2206 warn "$_me: you must specify a file" 2207 return 1 2208 fi 2209 if [ ! -e "$file" ]; then 2210 debug "$_me: no such file ($file)" 2211 return 0 2212 fi 2213 2214 # Disable globbing so that the rule patterns are not expanded 2215 # by accident with matching filesystem entries. 2216 _opts=$-; set -f 2217 2218 debug "reading rulesets from file ($file)" 2219 { while read line 2220 do 2221 case $line in 2222 \#*) 2223 continue 2224 ;; 2225 \[*\]*) 2226 rulenum=`expr "$line" : "\[.*=\([0-9]*\)\]"` 2227 if [ -z "$rulenum" ]; then 2228 warn "$_me: cannot extract rule number ($line)" 2229 _err=1 2230 break 2231 fi 2232 rulename=`expr "$line" : "\[\(.*\)=[0-9]*\]"` 2233 if [ -z "$rulename" ]; then 2234 warn "$_me: cannot extract rule name ($line)" 2235 _err=1 2236 break; 2237 fi 2238 eval $rulename=\$rulenum 2239 debug "found ruleset: $rulename=$rulenum" 2240 if ! /sbin/devfs rule -s $rulenum delset; then 2241 _err=1 2242 break 2243 fi 2244 ;; 2245 *) 2246 rulecmd="${line%%"\#*"}" 2247 # evaluate the command incase it includes 2248 # other rules 2249 if [ -n "$rulecmd" ]; then 2250 debug "adding rule ($rulecmd)" 2251 if ! eval /sbin/devfs rule -s $rulenum $rulecmd 2252 then 2253 _err=1 2254 break 2255 fi 2256 fi 2257 ;; 2258 esac 2259 if [ $_err -ne 0 ]; then 2260 debug "error in $_me" 2261 break 2262 fi 2263 done } < $file 2264 case $_opts in *f*) ;; *) set +f ;; esac 2265 return $_err 2266} 2267 2268# devfs_init_rulesets 2269# Initializes rulesets from configuration files. Returns 2270# non-zero if there was an error. 2271# 2272devfs_init_rulesets() 2273{ 2274 local file _me 2275 _me="devfs_init_rulesets" 2276 2277 # Go through this only once 2278 if [ -n "$devfs_rulesets_init" ]; then 2279 debug "$_me: devfs rulesets already initialized" 2280 return 2281 fi 2282 for file in $devfs_rulesets; do 2283 if ! devfs_rulesets_from_file $file; then 2284 warn "$_me: could not read rules from $file" 2285 return 1 2286 fi 2287 done 2288 devfs_rulesets_init=1 2289 debug "$_me: devfs rulesets initialized" 2290 return 0 2291} 2292 2293# devfs_set_ruleset ruleset [dir] 2294# Sets the default ruleset of dir to ruleset. The ruleset argument 2295# must be a ruleset name as specified in devfs.rules(5) file. 2296# Returns non-zero if it could not set it successfully. 2297# 2298devfs_set_ruleset() 2299{ 2300 local devdir rs _me 2301 [ -n "$1" ] && eval rs=\$$1 || rs= 2302 [ -n "$2" ] && devdir="-m "$2"" || devdir= 2303 _me="devfs_set_ruleset" 2304 2305 if [ -z "$rs" ]; then 2306 warn "$_me: you must specify a ruleset number" 2307 return 1 2308 fi 2309 debug "$_me: setting ruleset ($rs) on mount-point (${devdir#-m })" 2310 if ! /sbin/devfs $devdir ruleset $rs; then 2311 warn "$_me: unable to set ruleset $rs to ${devdir#-m }" 2312 return 1 2313 fi 2314 return 0 2315} 2316 2317# devfs_apply_ruleset ruleset [dir] 2318# Apply ruleset number $ruleset to the devfs mountpoint $dir. 2319# The ruleset argument must be a ruleset name as specified 2320# in a devfs.rules(5) file. Returns 0 on success or non-zero 2321# if it could not apply the ruleset. 2322# 2323devfs_apply_ruleset() 2324{ 2325 local devdir rs _me 2326 [ -n "$1" ] && eval rs=\$$1 || rs= 2327 [ -n "$2" ] && devdir="-m "$2"" || devdir= 2328 _me="devfs_apply_ruleset" 2329 2330 if [ -z "$rs" ]; then 2331 warn "$_me: you must specify a ruleset" 2332 return 1 2333 fi 2334 debug "$_me: applying ruleset ($rs) to mount-point (${devdir#-m })" 2335 if ! /sbin/devfs $devdir rule -s $rs applyset; then 2336 warn "$_me: unable to apply ruleset $rs to ${devdir#-m }" 2337 return 1 2338 fi 2339 return 0 2340} 2341 2342# devfs_domount dir [ruleset] 2343# Mount devfs on dir. If ruleset is specified it is set 2344# on the mount-point. It must also be a ruleset name as specified 2345# in a devfs.rules(5) file. Returns 0 on success. 2346# 2347devfs_domount() 2348{ 2349 local devdir rs _me 2350 devdir="$1" 2351 [ -n "$2" ] && rs=$2 || rs= 2352 _me="devfs_domount()" 2353 2354 if [ -z "$devdir" ]; then 2355 warn "$_me: you must specify a mount-point" 2356 return 1 2357 fi 2358 debug "$_me: mount-point is ($devdir), ruleset is ($rs)" 2359 if ! mount -t devfs dev "$devdir"; then 2360 warn "$_me: Unable to mount devfs on $devdir" 2361 return 1 2362 fi 2363 if [ -n "$rs" ]; then 2364 devfs_init_rulesets 2365 devfs_set_ruleset $rs $devdir 2366 devfs -m $devdir rule applyset 2367 fi 2368 return 0 2369} 2370 2371# Provide a function for normalizing the mounting of memory 2372# filesystems. This should allow the rest of the code here to remain 2373# as close as possible between 5-current and 4-stable. 2374# $1 = size 2375# $2 = mount point 2376# $3 = (optional) extra mdmfs flags 2377mount_md() 2378{ 2379 if [ -n "$3" ]; then 2380 flags="$3" 2381 fi 2382 /sbin/mdmfs $flags -s $1 ${mfs_type} $2 2383} 2384 2385# Code common to scripts that need to load a kernel module 2386# if it isn't in the kernel yet. Syntax: 2387# load_kld [-e regex] [-m module] file 2388# where -e or -m chooses the way to check if the module 2389# is already loaded: 2390# regex is egrep'd in the output from `kldstat -v', 2391# module is passed to `kldstat -m'. 2392# The default way is as though `-m file' were specified. 2393load_kld() 2394{ 2395 local _loaded _mod _opt _re 2396 2397 while getopts "e:m:" _opt; do 2398 case "$_opt" in 2399 e) _re="$OPTARG" ;; 2400 m) _mod="$OPTARG" ;; 2401 *) err 3 'USAGE: load_kld [-e regex] [-m module] file' ;; 2402 esac 2403 done 2404 shift $(($OPTIND - 1)) 2405 if [ $# -ne 1 ]; then 2406 err 3 'USAGE: load_kld [-e regex] [-m module] file' 2407 fi 2408 _mod=${_mod:-$1} 2409 _loaded=false 2410 if [ -n "$_re" ]; then 2411 if kldstat -v | egrep -q -e "$_re"; then 2412 _loaded=true 2413 fi 2414 else 2415 if kldstat -q -m "$_mod"; then 2416 _loaded=true 2417 fi 2418 fi 2419 if ! $_loaded; then 2420 if ! kldload "$1"; then 2421 warn "Unable to load kernel module $1" 2422 return 1 2423 else 2424 info "$1 kernel module loaded." 2425 if [ -f "/etc/sysctl.kld.d/$1.conf" ]; then 2426 sysctl -f "/etc/sysctl.kld.d/$1.conf" 2427 fi 2428 fi 2429 else 2430 debug "load_kld: $1 kernel module already loaded." 2431 fi 2432 return 0 2433} 2434 2435# ltr str src dst [var] 2436# Change every $src in $str to $dst. 2437# Useful when /usr is not yet mounted and we cannot use tr(1), sed(1) nor 2438# awk(1). If var is non-NULL, set it to the result. 2439ltr() 2440{ 2441 local _str _src _dst _out _com _var 2442 _str="$1" 2443 _src="$2" 2444 _dst="$3" 2445 _var="$4" 2446 _out="" 2447 2448 local IFS="${_src}" 2449 for _com in ${_str}; do 2450 if [ -z "${_out}" ]; then 2451 _out="${_com}" 2452 else 2453 _out="${_out}${_dst}${_com}" 2454 fi 2455 done 2456 if [ -n "${_var}" ]; then 2457 setvar "${_var}" "${_out}" 2458 else 2459 echo "${_out}" 2460 fi 2461} 2462 2463# Creates a list of providers for GELI encryption. 2464geli_make_list() 2465{ 2466 local devices devices2 2467 local provider mountpoint type options rest 2468 2469 # Create list of GELI providers from fstab. 2470 while read provider mountpoint type options rest ; do 2471 case ":${options}" in 2472 :*noauto*) 2473 noauto=yes 2474 ;; 2475 *) 2476 noauto=no 2477 ;; 2478 esac 2479 2480 case ":${provider}" in 2481 :#*) 2482 continue 2483 ;; 2484 *.eli) 2485 # Skip swap devices. 2486 if [ "${type}" = "swap" -o "${options}" = "sw" -o "${noauto}" = "yes" ]; then 2487 continue 2488 fi 2489 devices="${devices} ${provider}" 2490 ;; 2491 esac 2492 done < /etc/fstab 2493 2494 # Append providers from geli_devices. 2495 devices="${devices} ${geli_devices}" 2496 2497 for provider in ${devices}; do 2498 provider=${provider%.eli} 2499 provider=${provider#/dev/} 2500 devices2="${devices2} ${provider}" 2501 done 2502 2503 echo ${devices2} 2504} 2505 2506# Originally, root mount hold had to be released before mounting 2507# the root filesystem. This delayed the boot, so it was changed 2508# to only wait if the root device isn't readily available. This 2509# can result in rc scripts executing before all the devices - such 2510# as graid(8), or USB disks - can be accessed. This function can 2511# be used to explicitly wait for root mount holds to be released. 2512root_hold_wait() 2513{ 2514 local wait waited holders 2515 2516 waited=0 2517 while true; do 2518 holders="$(sysctl -n vfs.root_mount_hold)" 2519 if [ -z "${holders}" ]; then 2520 break; 2521 fi 2522 if [ ${waited} -eq 0 ]; then 2523 echo -n "Waiting ${root_hold_delay}s" \ 2524 "for the root mount holders: ${holders}" 2525 else 2526 echo -n . 2527 fi 2528 if [ ${waited} -ge ${root_hold_delay} ]; then 2529 echo 2530 break 2531 fi 2532 sleep 1 2533 waited=$(($waited + 1)) 2534 done 2535} 2536 2537# Find scripts in local_startup directories that use the old syntax 2538# 2539find_local_scripts_old() { 2540 zlist='' 2541 slist='' 2542 for dir in ${local_startup}; do 2543 if [ -d "${dir}" ]; then 2544 for file in ${dir}/[0-9]*.sh; do 2545 grep '^# PROVIDE:' $file >/dev/null 2>&1 && 2546 continue 2547 zlist="$zlist $file" 2548 done 2549 for file in ${dir}/[!0-9]*.sh; do 2550 grep '^# PROVIDE:' $file >/dev/null 2>&1 && 2551 continue 2552 slist="$slist $file" 2553 done 2554 fi 2555 done 2556} 2557 2558find_local_scripts_new() { 2559 local_rc='' 2560 for dir in ${local_startup}; do 2561 if [ -d "${dir}" ]; then 2562 for file in `grep -l '^# PROVIDE:' ${dir}/* 2>/dev/null`; do 2563 case "$file" in 2564 *.sample|*.pkgsave) ;; 2565 *) if [ -x "$file" ]; then 2566 local_rc="${local_rc} ${file}" 2567 fi 2568 ;; 2569 esac 2570 done 2571 fi 2572 done 2573} 2574 2575find_system_scripts() { 2576 system_rc='' 2577 for file in /etc/rc.d/*; do 2578 case "${file##*/}" in 2579 *.pkgsave) ;; 2580 *) if [ -x "$file" ]; then 2581 system_rc="${system_rc} ${file}" 2582 fi 2583 ;; 2584 esac 2585 done 2586} 2587 2588# check_required_{before|after} command 2589# Check for things required by the command before and after its precmd, 2590# respectively. The two separate functions are needed because some 2591# conditions should prevent precmd from being run while other things 2592# depend on precmd having already been run. 2593# 2594check_required_before() 2595{ 2596 local _f 2597 2598 case "$1" in 2599 start) 2600 for _f in $required_vars; do 2601 if ! checkyesno $_f; then 2602 warn "\$${_f} is not enabled." 2603 if [ -z "$rc_force" ]; then 2604 return 1 2605 fi 2606 fi 2607 done 2608 2609 for _f in $required_dirs; do 2610 if [ ! -d "${_f}/." ]; then 2611 warn "${_f} is not a directory." 2612 if [ -z "$rc_force" ]; then 2613 return 1 2614 fi 2615 fi 2616 done 2617 2618 for _f in $required_files; do 2619 if [ ! -r "${_f}" ]; then 2620 warn "${_f} is not readable." 2621 if [ -z "$rc_force" ]; then 2622 return 1 2623 fi 2624 fi 2625 done 2626 ;; 2627 esac 2628 2629 return 0 2630} 2631 2632check_required_after() 2633{ 2634 local _f _args 2635 2636 case "$1" in 2637 start) 2638 for _f in $required_modules; do 2639 case "${_f}" in 2640 *~*) _args="-e ${_f#*~} ${_f%%~*}" ;; 2641 *:*) _args="-m ${_f#*:} ${_f%%:*}" ;; 2642 *) _args="${_f}" ;; 2643 esac 2644 if ! load_kld ${_args}; then 2645 if [ -z "$rc_force" ]; then 2646 return 1 2647 fi 2648 fi 2649 done 2650 ;; 2651 esac 2652 2653 return 0 2654} 2655 2656# check_jail mib 2657# Return true if security.jail.$mib exists and set to 1. 2658 2659check_jail() 2660{ 2661 local _mib _v 2662 2663 _mib=$1 2664 if _v=$(${SYSCTL_N} "security.jail.$_mib" 2> /dev/null); then 2665 case $_v in 2666 1) return 0;; 2667 esac 2668 fi 2669 return 1 2670} 2671 2672# check_kern_features mib 2673# Return existence of kern.features.* sysctl MIB as true or 2674# false. The result will be cached in $_rc_cache_kern_features_ 2675# namespace. "0" means the kern.features.X exists. 2676 2677check_kern_features() 2678{ 2679 local _v 2680 2681 [ -n "$1" ] || return 1; 2682 eval _v=\$_rc_cache_kern_features_$1 2683 [ -n "$_v" ] && return "$_v"; 2684 2685 if ${SYSCTL_N} kern.features.$1 > /dev/null 2>&1; then 2686 eval _rc_cache_kern_features_$1=0 2687 return 0 2688 else 2689 eval _rc_cache_kern_features_$1=1 2690 return 1 2691 fi 2692} 2693 2694# check_namevarlist var 2695# Return "0" if ${name}_var is reserved in rc.subr. 2696 2697_rc_namevarlist="program chroot chdir env flags fib nice user group groups prepend setup" 2698check_namevarlist() 2699{ 2700 local _v 2701 2702 for _v in $_rc_namevarlist; do 2703 case $1 in 2704 $_v) return 0 ;; 2705 esac 2706 done 2707 2708 return 1 2709} 2710 2711# _echoonce var msg mode 2712# mode=0: Echo $msg if ${$var} is empty. 2713# After doing echo, a string is set to ${$var}. 2714# 2715# mode=1: Echo $msg if ${$var} is a string with non-zero length. 2716# 2717_echoonce() 2718{ 2719 local _var _msg _mode 2720 eval _var=\$$1 2721 _msg=$2 2722 _mode=$3 2723 2724 case $_mode in 2725 1) [ -n "$_var" ] && echo "$_msg" ;; 2726 *) [ -z "$_var" ] && echo -n "$_msg" && eval "$1=finished" ;; 2727 esac 2728} 2729 2730# If the loader env variable rc.debug is set, turn on debugging. rc.conf will 2731# still override this, but /etc/defaults/rc.conf can't unconditionally set this 2732# since it would undo what we've done here. 2733if kenv -q rc.debug > /dev/null ; then 2734 rc_debug=YES 2735fi 2736 2737boottrace_cmd=`command -v boottrace` 2738if [ -n "$boottrace_cmd" ] && [ "`${SYSCTL_N} -q kern.boottrace.enabled`" = "1" ]; then 2739 rc_boottrace=YES 2740fi 2741 2742SED=${SED:-$(Exists -x /usr/bin/sed /rescue/sed)} 2743 2744# Allow for local additions and overrides. 2745# Use vdot to ensure the file has not been tampered with. 2746vdot /etc/local.rc.subr 2747 2748# Avoid noise - when we do not have /usr mounted, 2749# and we cannot use safe_dot without sed. 2750if ! have basename; then 2751 basename() 2752 { 2753 local b=${1%$2} 2754 echo ${b##*/} 2755 } 2756 tty() 2757 { 2758 return 0 2759 } 2760 # we cannot use safe_dot without sed 2761 [ -z "$SED" ] && _SAFE_EVAL_SH=: 2762fi 2763# safe_eval.sh provides safe_dot - for untrusted files 2764$_SAFE_EVAL_SH vdot /libexec/safe_eval.sh 2765$_DEBUG_SH vdot /libexec/debug.sh 2766 2767# Ensure we can still operate if debug.sh and 2768# safe_eval.sh are not found. 2769if have DebugOn; then 2770 # allow DEBUG_SH to be set from loader prompt 2771 DEBUG_SH=${DEBUG_SH:-$(kenv -q DEBUG_SH)} 2772else 2773 DebugOn() { return 0; } 2774 DebugOff() { return 0; } 2775fi 2776if ! have save_dot; then 2777 safe_dot() { dot "$@"; } 2778fi 2779