xref: /illumos-gate/usr/src/cmd/boot/bootadm/bootadm_upgrade.c (revision 4eaa471005973e11a6110b69fe990530b3b95a38)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #include <stdio.h>
27 #include <errno.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <unistd.h>
31 #include <sys/types.h>
32 #include <sys/stat.h>
33 #include <limits.h>
34 #include <fcntl.h>
35 #include <strings.h>
36 
37 #include <sys/mman.h>
38 #include <sys/elf.h>
39 #include <sys/multiboot.h>
40 
41 #include "message.h"
42 #include "bootadm.h"
43 
44 direct_or_multi_t bam_direct = BAM_DIRECT_NOT_SET;
45 hv_t bam_is_hv = BAM_HV_UNKNOWN;
46 findroot_t bam_is_findroot = BAM_FINDROOT_UNKNOWN;
47 
48 static void
49 get_findroot_cap(const char *osroot)
50 {
51 	FILE		*fp;
52 	char		path[PATH_MAX];
53 	char		buf[BAM_MAXLINE];
54 	struct stat	sb;
55 	int		dboot;
56 	int		error;
57 	int		ret;
58 	const char	*fcn = "get_findroot_cap()";
59 
60 	assert(is_grub(osroot));
61 
62 	(void) snprintf(path, sizeof (path), "%s/%s",
63 	    osroot, "boot/grub/capability");
64 
65 	if (stat(path, &sb) == -1) {
66 		bam_is_findroot = BAM_FINDROOT_ABSENT;
67 		BAM_DPRINTF((D_FINDROOT_ABSENT, fcn));
68 		return;
69 	}
70 
71 	fp = fopen(path, "r");
72 	error = errno;
73 	INJECT_ERROR1("GET_CAP_FINDROOT_FOPEN", fp = NULL);
74 	if (fp == NULL) {
75 		bam_error(OPEN_FAIL, path, strerror(error));
76 		return;
77 	}
78 
79 	dboot = 0;
80 	while (s_fgets(buf, sizeof (buf), fp) != NULL) {
81 		if (strcmp(buf, "findroot") == 0) {
82 			BAM_DPRINTF((D_FINDROOT_PRESENT, fcn));
83 			bam_is_findroot = BAM_FINDROOT_PRESENT;
84 		}
85 		if (strcmp(buf, "dboot") == 0) {
86 			BAM_DPRINTF((D_DBOOT_PRESENT, fcn));
87 			dboot = 1;
88 		}
89 	}
90 
91 	assert(dboot);
92 
93 	if (bam_is_findroot == BAM_FINDROOT_UNKNOWN) {
94 		bam_is_findroot = BAM_FINDROOT_ABSENT;
95 		BAM_DPRINTF((D_FINDROOT_ABSENT, fcn));
96 	}
97 out:
98 	ret = fclose(fp);
99 	error = errno;
100 	INJECT_ERROR1("GET_CAP_FINDROOT_FCLOSE", ret = 1);
101 	if (ret != 0) {
102 		bam_error(CLOSE_FAIL, path, strerror(error));
103 	}
104 }
105 
106 error_t
107 get_boot_cap(const char *osroot)
108 {
109 	char		fname[PATH_MAX];
110 	char		*image;
111 	uchar_t		*ident;
112 	int		fd;
113 	int		m;
114 	multiboot_header_t *mbh;
115 	struct stat	sb;
116 	int		error;
117 	const char	*fcn = "get_boot_cap()";
118 
119 	if (is_sparc()) {
120 		/* there is no non dboot sparc new-boot */
121 		bam_direct = BAM_DIRECT_DBOOT;
122 		BAM_DPRINTF((D_IS_SPARC_DBOOT, fcn));
123 		return (BAM_SUCCESS);
124 	}
125 
126 	if (!is_grub(osroot)) {
127 		bam_error(NOT_GRUB_ROOT, osroot);
128 		return (BAM_ERROR);
129 	}
130 
131 	(void) snprintf(fname, PATH_MAX, "%s/%s", osroot,
132 	    "platform/i86pc/kernel/unix");
133 	fd = open(fname, O_RDONLY);
134 	error = errno;
135 	INJECT_ERROR1("GET_CAP_UNIX_OPEN", fd = -1);
136 	if (fd < 0) {
137 		bam_error(OPEN_FAIL, fname, strerror(error));
138 		return (BAM_ERROR);
139 	}
140 
141 	/*
142 	 * Verify that this is a sane unix at least 8192 bytes in length
143 	 */
144 	if (fstat(fd, &sb) == -1 || sb.st_size < 8192) {
145 		(void) close(fd);
146 		bam_error(INVALID_BINARY, fname);
147 		return (BAM_ERROR);
148 	}
149 
150 	/*
151 	 * mmap the first 8K
152 	 */
153 	image = mmap(NULL, 8192, PROT_READ, MAP_SHARED, fd, 0);
154 	error = errno;
155 	INJECT_ERROR1("GET_CAP_MMAP", image = MAP_FAILED);
156 	if (image == MAP_FAILED) {
157 		bam_error(MMAP_FAIL, fname, strerror(error));
158 		return (BAM_ERROR);
159 	}
160 
161 	ident = (uchar_t *)image;
162 	if (ident[EI_MAG0] != ELFMAG0 || ident[EI_MAG1] != ELFMAG1 ||
163 	    ident[EI_MAG2] != ELFMAG2 || ident[EI_MAG3] != ELFMAG3) {
164 		bam_error(NOT_ELF_FILE, fname);
165 		return (BAM_ERROR);
166 	}
167 	if (ident[EI_CLASS] != ELFCLASS32) {
168 		bam_error(WRONG_ELF_CLASS, fname, ident[EI_CLASS]);
169 		return (BAM_ERROR);
170 	}
171 
172 	/*
173 	 * The GRUB multiboot header must be 32-bit aligned and completely
174 	 * contained in the 1st 8K of the file.  If the unix binary has
175 	 * a multiboot header, then it is a 'dboot' kernel.  Otherwise,
176 	 * this kernel must be booted via multiboot -- we call this a
177 	 * 'multiboot' kernel.
178 	 */
179 	bam_direct = BAM_DIRECT_MULTIBOOT;
180 	for (m = 0; m < 8192 - sizeof (multiboot_header_t); m += 4) {
181 		mbh = (void *)(image + m);
182 		if (mbh->magic == MB_HEADER_MAGIC) {
183 			BAM_DPRINTF((D_IS_DBOOT, fcn));
184 			bam_direct = BAM_DIRECT_DBOOT;
185 			break;
186 		}
187 	}
188 	(void) munmap(image, 8192);
189 	(void) close(fd);
190 
191 	INJECT_ERROR1("GET_CAP_MULTIBOOT", bam_direct = BAM_DIRECT_MULTIBOOT);
192 	if (bam_direct == BAM_DIRECT_DBOOT) {
193 		if (bam_is_hv == BAM_HV_PRESENT) {
194 			BAM_DPRINTF((D_IS_XVM, fcn));
195 		} else {
196 			BAM_DPRINTF((D_IS_NOT_XVM, fcn));
197 		}
198 	} else {
199 		BAM_DPRINTF((D_IS_MULTIBOOT, fcn));
200 	}
201 
202 	/* Not a fatal error if this fails */
203 	get_findroot_cap(osroot);
204 
205 	BAM_DPRINTF((D_RETURN_SUCCESS, fcn));
206 	return (BAM_SUCCESS);
207 }
208 
209 #define	INST_RELEASE	"var/sadm/system/admin/INST_RELEASE"
210 
211 /*
212  * Return true if root has been bfu'ed.  bfu will blow away
213  * var/sadm/system/admin/INST_RELEASE, so if it's still there, we can
214  * assume the system has not been bfu'ed.
215  */
216 static int
217 is_bfu_system(const char *root)
218 {
219 	static int		is_bfu = -1;
220 	char			path[PATH_MAX];
221 	struct stat		sb;
222 	const char		*fcn = "is_bfu_system()";
223 
224 	if (is_bfu != -1) {
225 		BAM_DPRINTF((D_ALREADY_BFU_TEST, fcn, is_bfu ? "" : "NOT"));
226 		return (is_bfu);
227 	}
228 
229 	(void) snprintf(path, sizeof (path), "%s/%s", root, INST_RELEASE);
230 	if (stat(path, &sb) != 0) {
231 		is_bfu = 1;
232 		BAM_DPRINTF((D_RETURN_SUCCESS, fcn));
233 	} else {
234 		is_bfu = 0;
235 		BAM_DPRINTF((D_RETURN_FAILURE, fcn));
236 	}
237 	return (is_bfu);
238 }
239 
240 #define	MENU_URL(root)	(is_bfu_system(root) ?		\
241 	"http://www.sun.com/msg/SUNOS-8000-CF" :	\
242 	"http://www.sun.com/msg/SUNOS-8000-AK")
243 
244 /*
245  * Simply allocate a new line and copy in cmd + sep + arg
246  */
247 void
248 update_line(line_t *linep)
249 {
250 	size_t		size;
251 	const char	*fcn = "update_line()";
252 
253 	BAM_DPRINTF((D_UPDATE_LINE_BEFORE, fcn, linep->line));
254 	free(linep->line);
255 	size = strlen(linep->cmd) + strlen(linep->sep) + strlen(linep->arg) + 1;
256 	linep->line = s_calloc(1, size);
257 	(void) snprintf(linep->line, size, "%s%s%s", linep->cmd, linep->sep,
258 	    linep->arg);
259 	BAM_DPRINTF((D_UPDATE_LINE_AFTER, fcn, linep->line));
260 }
261 
262 static char *
263 skip_wspace(char *ptr)
264 {
265 	const char		*fcn = "skip_wspace()";
266 
267 	INJECT_ERROR1("SKIP_WSPACE", ptr = NULL);
268 	if (ptr == NULL) {
269 		BAM_DPRINTF((D_SKIP_WSPACE_PTR_NULL, fcn));
270 		return (NULL);
271 	}
272 
273 	BAM_DPRINTF((D_SKIP_WSPACE_ENTRY_PTR, fcn, ptr));
274 	for (; *ptr != '\0'; ptr++) {
275 		if ((*ptr != ' ') && (*ptr != '\t') &&
276 		    (*ptr != '\n'))
277 			break;
278 	}
279 
280 	ptr = (*ptr == '\0' ? NULL : ptr);
281 
282 	BAM_DPRINTF((D_SKIP_WSPACE_EXIT_PTR, fcn, ptr ? ptr : "NULL"));
283 
284 	return (ptr);
285 }
286 
287 static char *
288 rskip_bspace(char *bound, char *ptr)
289 {
290 	const char		*fcn = "rskip_bspace()";
291 	assert(bound);
292 	assert(ptr);
293 	assert(bound <= ptr);
294 	assert(*bound != ' ' && *bound != '\t' && *bound != '\n');
295 
296 	BAM_DPRINTF((D_RSKIP_BSPACE_ENTRY, fcn, ptr));
297 	for (; ptr > bound; ptr--) {
298 		if (*ptr == ' ' || *ptr == '\t' || *ptr == '\n')
299 			break;
300 	}
301 
302 	BAM_DPRINTF((D_RSKIP_BSPACE_EXIT, fcn, ptr));
303 	return (ptr);
304 }
305 
306 /*
307  * The parse_kernel_line function examines a menu.lst kernel line.  For
308  * multiboot, this is:
309  *
310  * kernel <multiboot path> <flags1> <kernel path> <flags2>
311  *
312  * <multiboot path> is either /platform/i86pc/multiboot or /boot/multiboot
313  *
314  * <kernel path> may be missing, or may be any full or relative path to unix.
315  *	We check for it by looking for a word ending in "/unix".  If it ends
316  *	in "kernel/unix", we upgrade it to a 32-bit entry.  If it ends in
317  *	"kernel/amd64/unix", we upgrade it to the default entry.  Otherwise,
318  *	it's a custom kernel, and we skip it.
319  *
320  * <flags*> are anything that doesn't fit either of the above - these will be
321  *	copied over.
322  *
323  * For direct boot, the defaults are
324  *
325  * kernel$ <kernel path> <flags>
326  *
327  * <kernel path> is one of:
328  *	/platform/i86pc/kernel/$ISADIR/unix
329  *	/boot/platform/i86pc/kernel/$ISADIR/unix
330  *	/platform/i86pc/kernel/unix
331  *	/platform/i86pc/kernel/amd64/unix
332  *	/boot/platform/i86pc/kernel/unix
333  *	/boot/platform/i86pc/kernel/amd64/unix
334  *
335  * If <kernel path> is any of the last four, the command may also be "kernel".
336  *
337  * <flags> is anything that isn't <kernel path>.
338  *
339  * This function is only called to convert a multiboot entry to a dboot entry
340  *
341  * For safety, we do one more check: if the kernel path starts with /boot,
342  * we verify that the new kernel exists before changing it.  This is mainly
343  * done for bfu, as it may cause the failsafe archives to be a different
344  * boot architecture from the newly bfu'ed system.
345  */
346 static error_t
347 cvt_kernel_line(line_t *line, const char *osroot, entry_t *entry)
348 {
349 	char		path[PATH_MAX], path_64[PATH_MAX];
350 	char		linebuf[PATH_MAX];
351 	char		new_arg[PATH_MAX];
352 	struct stat	sb, sb_64;
353 	char		*old_ptr;
354 	char		*unix_ptr;
355 	char		*flags1_ptr;
356 	char		*flags2_ptr;
357 	const char	*fcn = "cvt_kernel_line()";
358 
359 	BAM_DPRINTF((D_FUNC_ENTRY2, fcn, line->line, osroot));
360 
361 	/*
362 	 * We only convert multiboot to dboot and nothing else.
363 	 */
364 	if (!(entry->flags & BAM_ENTRY_MULTIBOOT)) {
365 		BAM_DPRINTF((D_NOT_MULTIBOOT_CONVERT, fcn));
366 		return (BAM_SUCCESS);
367 	}
368 
369 	if (entry->flags & BAM_ENTRY_FAILSAFE) {
370 		/*
371 		 * We're attempting to change failsafe to dboot.
372 		 * In the bfu case, we may not have a dboot failsafe
373 		 * kernel i.e. a "unix" under the "/boot" hierarchy.
374 		 * If so, just emit a message in verbose mode and
375 		 * return success.
376 		 */
377 		BAM_DPRINTF((D_TRYING_FAILSAFE_CVT_TO_DBOOT, fcn));
378 		(void) snprintf(path, PATH_MAX, "%s%s", osroot,
379 		    DIRECT_BOOT_FAILSAFE_32);
380 		(void) snprintf(path_64, PATH_MAX, "%s%s", osroot,
381 		    DIRECT_BOOT_FAILSAFE_64);
382 		if (stat(path, &sb) != 0 && stat(path_64, &sb_64) != 0) {
383 			if (bam_verbose) {
384 				bam_error(FAILSAFE_MISSING, line->lineNum);
385 			}
386 			BAM_DPRINTF((D_NO_FAILSAFE_UNIX_CONVERT, fcn));
387 			return (BAM_SUCCESS);
388 		}
389 	}
390 
391 	/*
392 	 * Make sure we have the correct cmd
393 	 */
394 
395 	free(line->cmd);
396 	line->cmd = s_strdup(menu_cmds[KERNEL_DOLLAR_CMD]);
397 	BAM_DPRINTF((D_CVT_CMD_KERN_DOLLAR, fcn, line->cmd));
398 
399 	assert(sizeof (linebuf) > strlen(line->arg) + 32);
400 	(void) strlcpy(linebuf, line->arg, sizeof (linebuf));
401 
402 	old_ptr = strpbrk(linebuf, " \t\n");
403 	old_ptr = skip_wspace(old_ptr);
404 	if (old_ptr == NULL) {
405 		/*
406 		 * only multiboot and nothing else
407 		 * i.e. flags1 = unix = flags2 = NULL
408 		 */
409 		flags1_ptr = unix_ptr = flags2_ptr = NULL;
410 		BAM_DPRINTF((D_FLAGS1_UNIX_FLAGS2_NULL, fcn))
411 		goto create;
412 	}
413 
414 	/*
415 	 *
416 	 * old_ptr is either at "flags1" or "unix"
417 	 */
418 	if (unix_ptr = strstr(old_ptr, "/unix")) {
419 
420 		/*
421 		 * There is a  unix.
422 		 */
423 		BAM_DPRINTF((D_UNIX_PRESENT, fcn));
424 
425 		/* See if there's a flags2 past unix */
426 		flags2_ptr = unix_ptr + strlen("/unix");
427 		flags2_ptr = skip_wspace(flags2_ptr);
428 		if (flags2_ptr) {
429 			BAM_DPRINTF((D_FLAGS2_PRESENT, fcn, flags2_ptr));
430 		} else {
431 			BAM_DPRINTF((D_FLAGS2_ABSENT, fcn));
432 		}
433 
434 		/* see if there is a flags1 before unix */
435 		unix_ptr = rskip_bspace(old_ptr, unix_ptr);
436 
437 		if (unix_ptr == old_ptr) {
438 			flags1_ptr = NULL;
439 			BAM_DPRINTF((D_FLAGS1_ABSENT, fcn));
440 		} else {
441 			flags1_ptr = old_ptr;
442 			*unix_ptr = '\0';
443 			unix_ptr++;
444 			BAM_DPRINTF((D_FLAGS1_PRESENT, fcn, flags1_ptr));
445 		}
446 
447 	} else  {
448 		/* There is no unix, there is only a bunch of flags */
449 		flags1_ptr = old_ptr;
450 		unix_ptr = flags2_ptr = NULL;
451 		BAM_DPRINTF((D_FLAGS1_ONLY, fcn, flags1_ptr));
452 	}
453 
454 	/*
455 	 * With dboot, unix is fixed and is at the beginning. We need to
456 	 * migrate flags1 and flags2
457 	 */
458 create:
459 	if (entry->flags & BAM_ENTRY_FAILSAFE) {
460 		(void) snprintf(new_arg, sizeof (new_arg), "%s",
461 		    DIRECT_BOOT_FAILSAFE_KERNEL);
462 	} else {
463 		(void) snprintf(new_arg, sizeof (new_arg), "%s",
464 		    DIRECT_BOOT_KERNEL);
465 	}
466 	BAM_DPRINTF((D_CVTED_UNIX, fcn, new_arg));
467 
468 	if (flags1_ptr != NULL) {
469 		(void) strlcat(new_arg, " ", sizeof (new_arg));
470 		(void) strlcat(new_arg, flags1_ptr, sizeof (new_arg));
471 	}
472 
473 	if (flags2_ptr != NULL) {
474 		(void) strlcat(new_arg, " ", sizeof (new_arg));
475 		(void) strlcat(new_arg, flags2_ptr, sizeof (new_arg));
476 	}
477 
478 	BAM_DPRINTF((D_CVTED_UNIX_AND_FLAGS, fcn, new_arg));
479 
480 	free(line->arg);
481 	line->arg = s_strdup(new_arg);
482 	update_line(line);
483 	BAM_DPRINTF((D_CVTED_KERNEL_LINE, fcn, line->line));
484 	return (BAM_SUCCESS);
485 }
486 
487 /*
488  * Similar to above, except this time we're looking at a module line,
489  * which is quite a bit simpler.
490  *
491  * Under multiboot, the archive line is:
492  *
493  * module /platform/i86pc/boot_archive
494  *
495  * Under directboot, the archive line is:
496  *
497  * module$ /platform/i86pc/$ISADIR/boot_archive
498  *
499  * which may be specified exactly as either of:
500  *
501  * module /platform/i86pc/boot_archive
502  * module /platform/i86pc/amd64/boot_archive
503  *
504  * Under multiboot, the failsafe is:
505  *
506  * module /boot/x86.miniroot-safe
507  *
508  * Under dboot, the failsafe is:
509  *
510  * module$ /boot/$ISADIR/x86.miniroot-safe
511  *
512  * which may be specified exactly as either of:
513  *
514  * module /boot/x86.miniroot-safe
515  * module /boot/amd64/x86.miniroot-safe
516  */
517 static error_t
518 cvt_module_line(line_t *line, entry_t *entry)
519 {
520 	const char		*fcn = "cvt_module_line()";
521 
522 	BAM_DPRINTF((D_FUNC_ENTRY1, fcn, line->line));
523 
524 	/*
525 	 * We only convert multiboot to dboot and nothing else
526 	 */
527 	if (!(entry->flags & BAM_ENTRY_MULTIBOOT)) {
528 		BAM_DPRINTF((D_NOT_MULTIBOOT_CONVERT, fcn));
529 		return (BAM_SUCCESS);
530 	}
531 
532 	if (entry->flags & BAM_ENTRY_FAILSAFE) {
533 		if (strcmp(line->arg, FAILSAFE_ARCHIVE) == 0) {
534 			BAM_DPRINTF((D_FAILSAFE_NO_CVT_NEEDED, fcn, line->arg));
535 			BAM_DPRINTF((D_RETURN_SUCCESS, fcn));
536 			return (BAM_SUCCESS);
537 		}
538 	} else if (strcmp(line->arg, MULTIBOOT_ARCHIVE) != 0) {
539 		bam_error(UNKNOWN_MODULE_LINE, line->lineNum);
540 		BAM_DPRINTF((D_RETURN_FAILURE, fcn));
541 		return (BAM_MSG);
542 	}
543 
544 	free(line->cmd);
545 	free(line->arg);
546 	line->cmd = s_strdup(menu_cmds[MODULE_DOLLAR_CMD]);
547 
548 	line->arg = s_strdup(entry->flags & BAM_ENTRY_FAILSAFE ?
549 	    FAILSAFE_ARCHIVE : DIRECT_BOOT_ARCHIVE);
550 
551 	update_line(line);
552 	BAM_DPRINTF((D_CVTED_MODULE, fcn, line->line));
553 	BAM_DPRINTF((D_RETURN_SUCCESS, fcn));
554 	return (BAM_SUCCESS);
555 }
556 
557 static void
558 bam_warn_hand_entries(menu_t *mp, char *osroot)
559 {
560 	int		hand_num;
561 	int		hand_max;
562 	int		*hand_list;
563 	int		i;
564 	entry_t		*entry;
565 	const char	*fcn = "bam_warn_hand_entries()";
566 
567 	if (bam_force) {
568 		/*
569 		 * No warning needed, we are automatically converting
570 		 * the "hand" entries
571 		 */
572 		BAM_DPRINTF((D_FORCE_HAND_CVT,  fcn));
573 		return;
574 	}
575 
576 	hand_num = 0;
577 	hand_max = BAM_ENTRY_NUM;
578 	hand_list = s_calloc(1, hand_max);
579 
580 	for (entry = mp->entries; entry; entry = entry->next) {
581 		if (entry->flags & (BAM_ENTRY_BOOTADM|BAM_ENTRY_LU))
582 			continue;
583 		BAM_DPRINTF((D_FOUND_HAND, fcn, entry->entryNum));
584 		if (++hand_num > hand_max) {
585 			hand_max *= 2;
586 			hand_list = s_realloc(hand_list,
587 			    hand_max * sizeof (int));
588 		}
589 		hand_list[hand_num - 1] = entry->entryNum;
590 	}
591 
592 	bam_error(HAND_ADDED_ENTRIES, osroot, MENU_URL(osroot));
593 	bam_print_stderr("Entry Number%s: ", (hand_num > 1) ?
594 	    "s" : "");
595 	for (i = 0; i < hand_num; i++) {
596 		bam_print_stderr("%d ", hand_list[i]);
597 	}
598 	bam_print_stderr("\n");
599 }
600 
601 static entry_t *
602 find_matching_entry(
603 	entry_t *estart,
604 	char *grubsign,
605 	char *grubroot,
606 	int root_opt)
607 {
608 	entry_t		*entry;
609 	line_t		*line;
610 	char		opt[10];
611 	const char	*fcn = "find_matching_entry()";
612 
613 	assert(grubsign);
614 	assert(root_opt == 0 || root_opt == 1);
615 
616 	(void) snprintf(opt, sizeof (opt), "%d", root_opt);
617 	BAM_DPRINTF((D_FUNC_ENTRY3, fcn, grubsign, grubroot, opt));
618 
619 	for (entry = estart; entry; entry = entry->next) {
620 
621 		if (!(entry->flags & (BAM_ENTRY_BOOTADM|BAM_ENTRY_LU)) &&
622 		    !bam_force) {
623 			BAM_DPRINTF((D_SKIP_ENTRY, fcn, entry->entryNum));
624 			continue;
625 		}
626 
627 		if (entry->flags & BAM_ENTRY_ROOT) {
628 			for (line = entry->start; line; line = line->next) {
629 				if (line->cmd == NULL || line->arg == NULL) {
630 					if (line == entry->end) {
631 						BAM_DPRINTF((D_ENTRY_END, fcn));
632 						break;
633 					} else {
634 						BAM_DPRINTF((D_SKIP_NULL, fcn));
635 						continue;
636 					}
637 				}
638 				if (strcmp(line->cmd, menu_cmds[ROOT_CMD])
639 				    == 0 && strcmp(line->arg, grubroot) == 0) {
640 					BAM_DPRINTF((D_ROOT_MATCH, fcn,
641 					    line->line, grubsign));
642 					return (entry);
643 				}
644 				if (line == entry->end) {
645 					BAM_DPRINTF((D_ENTRY_END, fcn));
646 					break;
647 				}
648 			}
649 		} else if (entry->flags & BAM_ENTRY_FINDROOT) {
650 			for (line = entry->start; line; line = line->next) {
651 				if (line->cmd == NULL || line->arg == NULL) {
652 					if (line == entry->end) {
653 						BAM_DPRINTF((D_ENTRY_END, fcn));
654 						break;
655 					} else {
656 						BAM_DPRINTF((D_SKIP_NULL, fcn));
657 						continue;
658 					}
659 				}
660 				if (strcmp(line->cmd, menu_cmds[FINDROOT_CMD])
661 				    == 0 && strcmp(line->arg, grubsign) == 0) {
662 					BAM_DPRINTF((D_FINDROOT_MATCH, fcn,
663 					    line->line, grubsign));
664 					return (entry);
665 				}
666 				if (line == entry->end) {
667 					BAM_DPRINTF((D_ENTRY_END, fcn));
668 					break;
669 				}
670 			}
671 		} else if (root_opt) {
672 			/* Neither root nor findroot */
673 			BAM_DPRINTF((D_NO_ROOT_FINDROOT, fcn, entry->entryNum));
674 			return (entry);
675 		}
676 	}
677 
678 	BAM_DPRINTF((D_NO_MATCH, fcn));
679 	return (NULL);
680 }
681 
682 /*
683  * The following is a set of routines that attempt to convert the
684  * menu entries for the supplied osroot into a format compatible
685  * with the GRUB installation on osroot.
686  *
687  * Each of these conversion routines make no assumptions about
688  * the current state of the menu entry, it does its best to
689  * convert the menu entry to the new state. In the process
690  * we may either upgrade or downgrade.
691  *
692  * We don't make any heroic efforts at conversion. It is better
693  * to be conservative and bail out at the first sign of error. We will
694  * in such cases, point the user at the knowledge-base article
695  * so that they can upgrade manually.
696  */
697 static error_t
698 bam_add_findroot(menu_t *mp, char *grubsign, char *grubroot, int root_opt)
699 {
700 	entry_t		*entry;
701 	line_t		*line;
702 	line_t		*newlp;
703 	int		update_num;
704 	char		linebuf[PATH_MAX];
705 	const char	*fcn = "bam_add_findroot()";
706 
707 	update_num = 0;
708 
709 	bam_print(CVT_FINDROOT);
710 
711 	entry = mp->entries;
712 	for (; entry = find_matching_entry(entry, grubsign, grubroot, root_opt);
713 	    entry = entry->next) {
714 		if (entry->flags & BAM_ENTRY_FINDROOT) {
715 			/* already converted */
716 			BAM_DPRINTF((D_ALREADY_FINDROOT, fcn, entry->entryNum));
717 			continue;
718 		}
719 		for (line = entry->start; line; line = line->next) {
720 			if (line->cmd == NULL || line->arg == NULL) {
721 				if (line == entry->end) {
722 					BAM_DPRINTF((D_ENTRY_END, fcn));
723 					break;
724 				} else {
725 					BAM_DPRINTF((D_SKIP_NULL, fcn));
726 					continue;
727 				}
728 			}
729 			if (strcmp(line->cmd, menu_cmds[TITLE_CMD]) == 0) {
730 				newlp = s_calloc(1, sizeof (line_t));
731 				newlp->cmd = s_strdup(menu_cmds[FINDROOT_CMD]);
732 				newlp->sep = s_strdup(" ");
733 				newlp->arg = s_strdup(grubsign);
734 				(void) snprintf(linebuf, sizeof (linebuf),
735 				    "%s%s%s", newlp->cmd, newlp->sep,
736 				    newlp->arg);
737 				newlp->line = s_strdup(linebuf);
738 				bam_add_line(mp, entry, line, newlp);
739 				update_num = 1;
740 				entry->flags &= ~BAM_ENTRY_ROOT;
741 				entry->flags |= BAM_ENTRY_FINDROOT;
742 				BAM_DPRINTF((D_ADDED_FINDROOT, fcn,
743 				    newlp->line));
744 				line = newlp;
745 			}
746 			if (strcmp(line->cmd, menu_cmds[ROOT_CMD]) == 0) {
747 				BAM_DPRINTF((D_FREEING_ROOT, fcn, line->line));
748 				unlink_line(mp, line);
749 				line_free(line);
750 			}
751 			if (line == entry->end) {
752 				BAM_DPRINTF((D_ENTRY_END, fcn));
753 				break;
754 			}
755 		}
756 	}
757 
758 	if (update_num) {
759 		BAM_DPRINTF((D_UPDATED_NUMBERING, fcn));
760 		update_numbering(mp);
761 	}
762 
763 	BAM_DPRINTF((D_RETURN_SUCCESS, fcn));
764 	return (BAM_SUCCESS);
765 }
766 
767 static error_t
768 bam_add_hv(menu_t *mp, char *grubsign, char *grubroot, int root_opt)
769 {
770 	entry_t		*entry;
771 	const char	*fcn = "bam_add_hv()";
772 
773 	bam_print(CVT_HV);
774 
775 	entry = mp->entries;
776 	for (; entry = find_matching_entry(entry, grubsign, grubroot, root_opt);
777 	    entry = entry->next) {
778 		if (entry->flags & BAM_ENTRY_HV) {
779 			BAM_DPRINTF((D_ALREADY_HV, fcn, entry->entryNum));
780 			return (BAM_SUCCESS);
781 		}
782 	}
783 
784 	(void) add_boot_entry(mp, NEW_HV_ENTRY, grubsign, XEN_MENU,
785 	    XEN_KERNEL_MODULE_LINE, DIRECT_BOOT_ARCHIVE);
786 
787 	BAM_DPRINTF((D_ADDED_XVM_ENTRY, fcn));
788 
789 	update_numbering(mp);
790 
791 	BAM_DPRINTF((D_RETURN_SUCCESS, fcn));
792 
793 	return (BAM_SUCCESS);
794 }
795 
796 static error_t
797 bam_add_dboot(
798 	menu_t *mp,
799 	char *osroot,
800 	char *grubsign,
801 	char *grubroot,
802 	int root_opt)
803 {
804 	int		msg = 0;
805 	entry_t		*entry;
806 	line_t		*line;
807 	error_t		ret;
808 	const char 	*fcn = "bam_add_dboot()";
809 
810 	bam_print(CVT_DBOOT);
811 
812 	entry = mp->entries;
813 	for (; entry = find_matching_entry(entry, grubsign, grubroot, root_opt);
814 	    entry = entry->next) {
815 		for (line = entry->start; line; line = line->next) {
816 			if (line->cmd == NULL || line->arg == NULL) {
817 				if (line == entry->end) {
818 					BAM_DPRINTF((D_ENTRY_END, fcn));
819 					break;
820 				} else {
821 					BAM_DPRINTF((D_SKIP_NULL, fcn));
822 					continue;
823 				}
824 			}
825 
826 			/*
827 			 * If we have a kernel$ command, assume it
828 			 * is dboot already.  If it is not a dboot
829 			 * entry, something funny is going on and
830 			 * we will leave it alone
831 			 */
832 			if (strcmp(line->cmd, menu_cmds[KERNEL_CMD]) == 0) {
833 				ret = cvt_kernel_line(line, osroot, entry);
834 				INJECT_ERROR1("ADD_DBOOT_KERN_ERR",
835 				    ret = BAM_ERROR);
836 				INJECT_ERROR1("ADD_DBOOT_KERN_MSG",
837 				    ret = BAM_MSG);
838 				if (ret == BAM_ERROR) {
839 					BAM_DPRINTF((D_CVT_KERNEL_FAIL, fcn));
840 					return (ret);
841 				} else if (ret == BAM_MSG) {
842 					msg = 1;
843 					BAM_DPRINTF((D_CVT_KERNEL_MSG, fcn));
844 				}
845 			}
846 			if (strcmp(line->cmd, menu_cmds[MODULE_CMD]) == 0) {
847 				ret = cvt_module_line(line, entry);
848 				INJECT_ERROR1("ADD_DBOOT_MOD_ERR",
849 				    ret = BAM_ERROR);
850 				INJECT_ERROR1("ADD_DBOOT_MOD_MSG",
851 				    ret = BAM_MSG);
852 				if (ret == BAM_ERROR) {
853 					BAM_DPRINTF((D_CVT_MODULE_FAIL, fcn));
854 					return (ret);
855 				} else if (ret == BAM_MSG) {
856 					BAM_DPRINTF((D_CVT_MODULE_MSG, fcn));
857 					msg = 1;
858 				}
859 			}
860 
861 			if (line == entry->end) {
862 				BAM_DPRINTF((D_ENTRY_END, fcn));
863 				break;
864 			}
865 		}
866 	}
867 
868 	ret = msg ? BAM_MSG : BAM_SUCCESS;
869 	BAM_DPRINTF((D_RETURN_RET, fcn, ret));
870 	return (ret);
871 }
872 
873 /*ARGSUSED*/
874 error_t
875 upgrade_menu(menu_t *mp, char *osroot, char *menu_root)
876 {
877 	char		*osdev;
878 	char		*grubsign;
879 	char		*grubroot;
880 	int		ret1;
881 	int		ret2;
882 	int		ret3;
883 	const char	*fcn = "upgrade_menu()";
884 
885 	assert(osroot);
886 	assert(menu_root);
887 
888 	BAM_DPRINTF((D_FUNC_ENTRY2, fcn, osroot, menu_root));
889 
890 	/*
891 	 * We only support upgrades. Xen may not be present
892 	 * on smaller metaclusters so we don't check for that.
893 	 */
894 	if (bam_is_findroot != BAM_FINDROOT_PRESENT ||
895 	    bam_direct != BAM_DIRECT_DBOOT) {
896 		bam_error(DOWNGRADE_NOTSUP, osroot);
897 		return (BAM_ERROR);
898 	}
899 
900 	/*
901 	 * First get the GRUB signature
902 	 */
903 	osdev = get_special(osroot);
904 	INJECT_ERROR1("UPGRADE_OSDEV", osdev = NULL);
905 	if (osdev == NULL) {
906 		bam_error(CANT_FIND_SPECIAL, osroot);
907 		return (BAM_ERROR);
908 	}
909 
910 	grubsign = get_grubsign(osroot, osdev);
911 	INJECT_ERROR1("UPGRADE_GRUBSIGN", grubsign = NULL);
912 	if (grubsign == NULL) {
913 		free(osdev);
914 		bam_error(CANT_FIND_GRUBSIGN, osroot);
915 		return (BAM_ERROR);
916 	}
917 
918 	/* not fatal if we can't get grubroot */
919 	grubroot = get_grubroot(osroot, osdev, menu_root);
920 	INJECT_ERROR1("UPGRADE_GRUBROOT", grubroot = NULL);
921 
922 	free(osdev);
923 
924 	ret1 = bam_add_findroot(mp, grubsign,
925 	    grubroot, root_optional(osroot, menu_root));
926 	INJECT_ERROR1("UPGRADE_ADD_FINDROOT", ret1 = BAM_ERROR);
927 	if (ret1 == BAM_ERROR)
928 		goto abort;
929 
930 	if (bam_is_hv == BAM_HV_PRESENT) {
931 		ret2 = bam_add_hv(mp, grubsign, grubroot,
932 		    root_optional(osroot, menu_root));
933 		INJECT_ERROR1("UPGRADE_ADD_HV", ret2 = BAM_ERROR);
934 		if (ret2 == BAM_ERROR)
935 			goto abort;
936 	} else
937 		ret2 = BAM_SUCCESS;
938 
939 	ret3 = bam_add_dboot(mp, osroot, grubsign,
940 	    grubroot, root_optional(osroot, menu_root));
941 	INJECT_ERROR1("UPGRADE_ADD_DBOOT", ret3 = BAM_ERROR);
942 	if (ret3 == BAM_ERROR)
943 		goto abort;
944 
945 	if (ret1 == BAM_MSG || ret2 == BAM_MSG || ret3 == BAM_MSG) {
946 		bam_error(CVT_TODO, MENU_URL(osroot));
947 	} else {
948 		bam_warn_hand_entries(mp, osroot);
949 	}
950 
951 	free(grubsign);
952 
953 	BAM_DPRINTF((D_RETURN_RET, fcn, BAM_WRITE));
954 	return (BAM_WRITE);
955 
956 abort:
957 	free(grubsign);
958 	bam_error(CVT_ABORT, osroot, MENU_URL(osroot));
959 	return (BAM_ERROR);
960 }
961