1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License, Version 1.0 only 6 * (the "License"). You may not use this file except in compliance 7 * with the License. 8 * 9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10 * or http://www.opensolaris.org/os/licensing. 11 * See the License for the specific language governing permissions 12 * and limitations under the License. 13 * 14 * When distributing Covered Code, include this CDDL HEADER in each 15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16 * If applicable, add the following below this CDDL HEADER, with the 17 * fields enclosed by brackets "[]" replaced with your own identifying 18 * information: Portions Copyright [yyyy] [name of copyright owner] 19 * 20 * CDDL HEADER END 21 */ 22 /* 23 * Copyright 2005 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 /* enable debug output and some debug asserts */ 28 #undef _IPQOS_CONF_DEBUG 29 30 #include <stdlib.h> 31 #include <unistd.h> 32 #include <libintl.h> 33 #include <signal.h> 34 #include <strings.h> 35 #include <sys/nvpair.h> 36 #include <stdio.h> 37 #include <netinet/in.h> 38 #include <arpa/inet.h> 39 #include <ctype.h> 40 #include <sys/socket.h> 41 #include <limits.h> 42 #include <netdb.h> 43 #include <fcntl.h> 44 #include <sys/types.h> 45 #include <sys/stat.h> 46 #include <errno.h> 47 #include <libipp.h> 48 #include <ipp/ipp_config.h> 49 #include <ipp/ipgpc/ipgpc.h> 50 #include <ipp/ipp.h> 51 #ifdef _IPQOS_CONF_DEBUG 52 #include <assert.h> 53 #endif 54 #include <sys/sockio.h> 55 #include <syslog.h> 56 #include <stdarg.h> 57 #include <libintl.h> 58 #include <locale.h> 59 #include <pwd.h> 60 #include "ipqosconf.h" 61 62 #if defined(_IPQOS_CONF_DEBUG) 63 64 /* debug level */ 65 static int ipqosconf_dbg_flgs = 66 /* 67 */ 68 RBK | 69 MHME | 70 KRET | 71 DIFF | 72 APPLY | 73 L2 | 74 L1 | 75 L0 | 76 0; 77 78 79 80 #define IPQOSCDBG0(lvl, x)\ 81 if (lvl & ipqosconf_dbg_flgs)\ 82 (void) fprintf(stderr, x) 83 84 #define IPQOSCDBG1(lvl, x, y)\ 85 if (lvl & ipqosconf_dbg_flgs)\ 86 (void) fprintf(stderr, x, y) 87 88 #define IPQOSCDBG2(lvl, x, y, z)\ 89 if (lvl & ipqosconf_dbg_flgs)\ 90 (void) fprintf(stderr, x, y, z) 91 92 #define IPQOSCDBG3(lvl, x, y, z, a)\ 93 if (lvl & ipqosconf_dbg_flgs)\ 94 (void) fprintf(stderr, x, y, z, a) 95 96 #define IPQOSCDBG4(lvl, x, y, z, a, b)\ 97 if (lvl & ipqosconf_dbg_flgs)\ 98 (void) fprintf(stderr, x, y, z, a, b) 99 100 #define IPQOSCDBG5(lvl, x, y, z, a, b, c)\ 101 if (lvl & ipqosconf_dbg_flgs)\ 102 (void) fprintf(stderr, x, y, z, a, b, c) 103 104 #else /* defined(_IPQOS_CONF_DEBUG) && !defined(lint) */ 105 106 #define IPQOSCDBG0(lvl, x) 107 #define IPQOSCDBG1(lvl, x, y) 108 #define IPQOSCDBG2(lvl, x, y, z) 109 #define IPQOSCDBG3(lvl, x, y, z, a) 110 #define IPQOSCDBG4(lvl, x, y, z, a, b) 111 #define IPQOSCDBG5(lvl, x, y, z, a, b, c) 112 113 #endif /* defined(_IPQOS_CONF_DEBUG) */ 114 115 116 117 /* function prototypes */ 118 119 static int modify_params(char *, nvlist_t **, int, boolean_t); 120 static int add_class(char *, char *, int, boolean_t, char *); 121 static int modify_class(char *, char *, int, boolean_t, char *, 122 enum ipp_flags); 123 static int remove_class(char *, char *, int, enum ipp_flags); 124 static int add_filter(char *, ipqos_conf_filter_t *, int); 125 static int modify_filter(char *, ipqos_conf_filter_t *, int); 126 static int remove_filter(char *, char *, int, int); 127 static boolean_t arrays_equal(int *, int *, uint32_t); 128 static int diffclass(ipqos_conf_class_t *, ipqos_conf_class_t *); 129 static int diffparams(ipqos_conf_params_t *, ipqos_conf_params_t *, char *); 130 static int difffilter(ipqos_conf_filter_t *, ipqos_conf_filter_t *, char *); 131 static int add_filters(ipqos_conf_filter_t *, char *, int, boolean_t); 132 static int add_classes(ipqos_conf_class_t *, char *, int, boolean_t); 133 static int modify_items(ipqos_conf_action_t *); 134 static int add_items(ipqos_conf_action_t *, boolean_t); 135 static int add_item(ipqos_conf_action_t *, boolean_t); 136 static int remove_items(ipqos_conf_action_t *, boolean_t); 137 static int remove_item(ipqos_conf_action_t *, boolean_t); 138 static int undo_modifys(ipqos_conf_action_t *, ipqos_conf_action_t *); 139 static int applydiff(ipqos_conf_action_t *, ipqos_conf_action_t *); 140 static int rollback(ipqos_conf_action_t *, ipqos_conf_action_t *); 141 static int rollback_recover(ipqos_conf_action_t *); 142 static ipqos_conf_class_t *classexist(char *, ipqos_conf_class_t *); 143 static ipqos_conf_filter_t *filterexist(char *, int, ipqos_conf_filter_t *); 144 static ipqos_conf_action_t *actionexist(char *, ipqos_conf_action_t *); 145 static int diffnvlists(nvlist_t *, nvlist_t *, char *, int *, place_t); 146 static int diffaction(ipqos_conf_action_t *, ipqos_conf_action_t *); 147 static int diffconf(ipqos_conf_action_t *, ipqos_conf_action_t *); 148 static int readllong(char *, long long *, char **); 149 static int readuint8(char *, uint8_t *, char **); 150 static int readuint16(char *, uint16_t *, char **); 151 static int readint16(char *, int16_t *, char **); 152 static int readint32(char *, int *, char **); 153 static int readuint32(char *, uint32_t *, char **); 154 static int readbool(char *, boolean_t *); 155 static void setmask(int, in6_addr_t *, int); 156 static int readtoken(FILE *, char **); 157 static nvpair_t *find_nvpair(nvlist_t *, char *); 158 static char *prepend_module_name(char *, char *); 159 static int readnvpair(FILE *, FILE *, nvlist_t **, nvpair_t **, 160 ipqos_nvtype_t *, place_t, char *); 161 static int add_aref(ipqos_conf_act_ref_t **, char *, char *); 162 static int readparams(FILE *, FILE *, char *, ipqos_conf_params_t *); 163 static int readclass(FILE *, char *, ipqos_conf_class_t **, char **, int); 164 static int readfilter(FILE *, FILE *, char *, ipqos_conf_filter_t **, char **, 165 int); 166 static FILE *validmod(char *, int *); 167 static int readaction(FILE *, ipqos_conf_action_t **); 168 static int actions_unique(ipqos_conf_action_t *, char **); 169 static int validconf(ipqos_conf_action_t *, int); 170 static int readconf(FILE *, ipqos_conf_action_t **); 171 static int flush(boolean_t *); 172 static int atomic_flush(boolean_t); 173 static int flushconf(); 174 static int writeconf(ipqos_conf_action_t *, char *); 175 static int commitconf(); 176 static int applyconf(char *ifile); 177 static int block_all_signals(); 178 static int restore_all_signals(); 179 static int unlock(int fd); 180 static int lock(); 181 static int viewconf(int); 182 static void usage(); 183 static int valid_name(char *); 184 static int in_cycle(ipqos_conf_action_t *); 185 static int readtype(FILE *, char *, char *, ipqos_nvtype_t *, str_val_nd_t **, 186 char *, boolean_t, place_t *); 187 static int read_int_array_info(char *, str_val_nd_t **, uint32_t *, int *, 188 int *, char *); 189 static str_val_nd_t *read_enum_nvs(char *, char *); 190 static int add_str_val_entry(str_val_nd_t **, char *, uint32_t); 191 static void free_str_val_entrys(str_val_nd_t *); 192 static void get_str_val_value_range(str_val_nd_t *, int *, int *); 193 static int read_enum_value(FILE *, char *, str_val_nd_t *, uint32_t *); 194 static int read_mapped_values(FILE *, nvlist_t **, char *, char *, 195 int); 196 static int read_int_array(FILE *, char *, int **, uint32_t, int, int, 197 str_val_nd_t *); 198 static int str_val_list_lookup(str_val_nd_t *, char *, uint32_t *); 199 static int parse_kparams(char *, ipqos_conf_params_t *, nvlist_t *); 200 static int parse_kclass(ipqos_conf_class_t *, nvlist_t *); 201 static int parse_kfilter(ipqos_conf_filter_t *, nvlist_t *); 202 static int parse_kaction(nvlist_t *, ipqos_actinfo_prm_t *); 203 static int readkconf(ipqos_conf_action_t **); 204 static void print_int_array(FILE *, int *, uint32_t, int, int, str_val_nd_t *, 205 int); 206 static void printrange(FILE *fp, uint32_t, uint32_t); 207 static void printenum(FILE *, uint32_t, str_val_nd_t *); 208 static void printproto(FILE *, uint8_t); 209 static void printport(FILE *, uint16_t); 210 static int printnvlist(FILE *, char *, nvlist_t *, int, ipqos_conf_filter_t *, 211 int, place_t); 212 static int virtual_action(char *); 213 static void free_arefs(ipqos_conf_act_ref_t *); 214 static void print_action_nm(FILE *, char *); 215 static int add_orig_ipqosconf(nvlist_t *); 216 static char *get_originator_nm(uint32_t); 217 static void mark_classes_filters_new(ipqos_conf_action_t *); 218 static void mark_classes_filters_del(ipqos_conf_action_t *); 219 static void mark_config_new(ipqos_conf_action_t *); 220 static int printifname(FILE *, int); 221 static int readifindex(char *, int *); 222 static void cleanup_string_table(char **, int); 223 static int domultihome(ipqos_conf_filter_t *, ipqos_conf_filter_t **, 224 boolean_t); 225 static int dup_filter(ipqos_conf_filter_t *, ipqos_conf_filter_t **, int, int, 226 void *, void *, int); 227 static void free_actions(ipqos_conf_action_t *); 228 static ipqos_conf_filter_t *alloc_filter(); 229 static void free_filter(ipqos_conf_filter_t *); 230 static int read_curl_begin(FILE *); 231 static ipqos_conf_class_t *alloc_class(void); 232 static int diffclasses(ipqos_conf_action_t *old, ipqos_conf_action_t *new); 233 static int difffilters(ipqos_conf_action_t *old, ipqos_conf_action_t *new); 234 static int dup_class(ipqos_conf_class_t *src, ipqos_conf_class_t **dst); 235 static int add_action(ipqos_conf_action_t *act); 236 static int masktocidr(int af, in6_addr_t *mask); 237 static int read_perm_items(int, FILE *, char *, char ***, int *); 238 static int in_string_table(char *stable[], int size, char *string); 239 static void list_end(ipqos_list_el_t **listp, ipqos_list_el_t ***lendpp); 240 static void add_to_list(ipqos_list_el_t **listp, ipqos_list_el_t *el); 241 static int read_cfile_ver(FILE *, char *); 242 static char *quote_ws_string(const char *); 243 static int read_tfile_ver(FILE *, char *, char *); 244 static int ver_str_to_int(char *); 245 static void printuser(FILE *fp, uid_t uid); 246 static int readuser(char *str, uid_t *uid); 247 248 /* 249 * macros to call list functions with the more complex list element type 250 * cast to the skeletal type iqpos_list_el_t. 251 */ 252 #define GET_LIST_END(list, end)\ 253 list_end((ipqos_list_el_t **)list, (ipqos_list_el_t ***)end) 254 #define ADD_TO_LIST(list, el)\ 255 add_to_list((ipqos_list_el_t **)list, (ipqos_list_el_t *)el) 256 257 /* 258 * Macros to produce a quoted string containing the value of a 259 * preprocessor macro. For example, if SIZE is defined to be 256, 260 * VAL2STR(SIZE) is "256". This is used to construct format 261 * strings for scanf-family functions below. 262 */ 263 #define QUOTE(x) #x 264 #define VAL2STR(x) QUOTE(x) 265 266 267 /* globals */ 268 269 /* table of supported parameter types and enum value */ 270 static str_val_t nv_types[] = { 271 {"uint8", IPQOS_DATA_TYPE_UINT8}, 272 {"int16", IPQOS_DATA_TYPE_INT16}, 273 {"uint16", IPQOS_DATA_TYPE_UINT16}, 274 {"int32", IPQOS_DATA_TYPE_INT32}, 275 {"uint32", IPQOS_DATA_TYPE_UINT32}, 276 {"boolean", IPQOS_DATA_TYPE_BOOLEAN}, 277 {"string", IPQOS_DATA_TYPE_STRING}, 278 {"action", IPQOS_DATA_TYPE_ACTION}, 279 {"address", IPQOS_DATA_TYPE_ADDRESS}, 280 {"port", IPQOS_DATA_TYPE_PORT}, 281 {"protocol", IPQOS_DATA_TYPE_PROTO}, 282 {"enum", IPQOS_DATA_TYPE_ENUM}, 283 {"ifname", IPQOS_DATA_TYPE_IFNAME}, 284 {"mindex", IPQOS_DATA_TYPE_M_INDEX}, 285 {"int_array", IPQOS_DATA_TYPE_INT_ARRAY}, 286 {"user", IPQOS_DATA_TYPE_USER}, 287 {"", 0} 288 }; 289 290 /* table of name to id mappings for originator field */ 291 292 static str_val_t originators[] = { 293 {IPP_CONFIG_NAME_PERMANENT, IPP_CONFIG_PERMANENT}, 294 {IPP_CONFIG_NAME_IPQOSCONF, IPP_CONFIG_IPQOSCONF}, 295 {IPP_CONFIG_NAME_FTPCL, IPP_CONFIG_FTPCL}, 296 {"", -1} 297 }; 298 299 /* current parse line */ 300 static int lineno; 301 302 /* verbose output flag */ 303 static int verbose; 304 305 /* use syslog for msg reporting flag */ 306 static int use_syslog; 307 308 #ifdef _IPQOS_CONF_DEBUG 309 /* 310 * flag used to indicate that a rollback should be carried out regardless. 311 * Only settable during debug. 312 */ 313 static int force_rback = 0; 314 #endif /* _IPQOS_CONF_DEBUG */ 315 316 /* 317 * delivers messages to either syslog or stderr, dependant upon the 318 * the state of the flags use_syslog and verbose. The type 319 * of the msg as given in msg_type is indicated in the output msg. 320 * 321 * valid message types are: 322 * o MT_ERROR (standard error message) 323 * o MT_ENOSTR (error message with system error string appended) 324 * o MT_WARNING (warning message) 325 * o MT_LOG (logging message) 326 * 327 * Log messages only go to syslog. Warning messages only go to stderr 328 * and only when the verbose flag is set. All other messages go by default 329 * to the console; to syslog if syslog flag set, and to both if both 330 * syslog and verbose are set. 331 * 332 */ 333 /*PRINTFLIKE2*/ 334 static void 335 ipqos_msg(enum msg_type msgt, char *format, ...) 336 { 337 va_list ap; 338 char str_buf[IPQOS_MSG_BUF_SZ]; 339 char fmt_buf[IPQOS_MSG_BUF_SZ]; 340 char *cp; 341 342 IPQOSCDBG0(L1, "In ipqos_msg:\n"); 343 344 va_start(ap, format); 345 346 /* 347 * send msgs to syslog if use_syslog set (except warning msgs), 348 * or a log msg. 349 */ 350 if ((use_syslog && (msgt != MT_WARNING)) || msgt == MT_LOG) { 351 352 /* fill in format string */ 353 (void) vsnprintf(str_buf, IPQOS_MSG_BUF_SZ, format, ap); 354 355 /* 356 * print message to syslog with appropriate severity 357 */ 358 if (msgt == MT_ERROR) { 359 syslog(LOG_ERR, str_buf); 360 } else if (msgt == MT_LOG) { 361 syslog(LOG_INFO, str_buf); 362 /* 363 * for errno message type suffix with %m for syslog to 364 * interpret. 365 */ 366 } else if (msgt == MT_ENOSTR) { 367 /* 368 * remove any newline in message parameter. 369 * syslog will reapply a newline for us later. 370 */ 371 if ((cp = strchr(str_buf, '\n')) != NULL) 372 *cp = '\0'; 373 (void) strlcat(str_buf, ": %m", IPQOS_MSG_BUF_SZ); 374 syslog(LOG_ERR, str_buf); 375 } 376 } 377 378 /* 379 * send msgs to stderr if use_syslog not set (except log msgs), or 380 * if verbose set. 381 */ 382 if ((!use_syslog && (msgt != MT_LOG)) || (verbose)) { 383 384 /* 385 * prefix message with appropriate severity string 386 */ 387 if (msgt == MT_ERROR) { 388 (void) strlcpy(fmt_buf, gettext("Error: "), 389 IPQOS_MSG_BUF_SZ); 390 } else if (msgt == MT_WARNING) { 391 if (!verbose) { /* don't show warn msg if !verbose */ 392 va_end(ap); 393 return; 394 } 395 (void) strlcpy(fmt_buf, gettext("Warning: "), 396 IPQOS_MSG_BUF_SZ); 397 } else if (msgt == MT_ENOSTR) { 398 (void) strlcpy(fmt_buf, gettext("Error: "), 399 IPQOS_MSG_BUF_SZ); 400 } else if (msgt == MT_LOG) { 401 (void) strlcpy(fmt_buf, gettext("Notice: "), 402 IPQOS_MSG_BUF_SZ); 403 } 404 (void) strlcat(fmt_buf, format, IPQOS_MSG_BUF_SZ); 405 406 /* 407 * for errno message type suffix message with errno string 408 */ 409 if (msgt == MT_ENOSTR) { 410 /* 411 * get rid of any newline in passed message. 412 * we'll apply another later. 413 */ 414 if ((cp = strchr(fmt_buf, '\n')) != NULL) 415 *cp = '\0'; 416 (void) strlcat(fmt_buf, ": ", IPQOS_MSG_BUF_SZ); 417 (void) strlcat(fmt_buf, strerror(errno), 418 IPQOS_MSG_BUF_SZ); 419 } 420 421 /* 422 * append a newline to message if not one already. 423 */ 424 if ((cp = strchr(fmt_buf, '\n')) == NULL) 425 (void) strlcat(fmt_buf, "\n", IPQOS_MSG_BUF_SZ); 426 427 (void) vfprintf(stderr, fmt_buf, ap); 428 } 429 430 va_end(ap); 431 } 432 433 /* **************** kernel filter/class/params manipulation fns *********** */ 434 435 436 /* 437 * modify the kernel parameters of the action action_nm using the nvlist 438 * parameter nvl and setting the stats according to stats_enable. 439 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 440 */ 441 442 static int 443 modify_params( 444 char *action_name, 445 nvlist_t **nvl, 446 int module_version, 447 boolean_t stats_enable) 448 { 449 450 int res; 451 int created = 0; 452 453 IPQOSCDBG1(APPLY, "In modify_params: action: %s\n", action_name); 454 455 /* create nvlist if NULL */ 456 if (*nvl == NULL) { 457 created++; 458 res = nvlist_alloc(nvl, NV_UNIQUE_NAME, 0); 459 if (res != 0) { 460 ipqos_msg(MT_ENOSTR, "nvlist_alloc"); 461 return (IPQOS_CONF_ERR); 462 } 463 } 464 465 /* add params modify config type */ 466 res = nvlist_add_byte(*nvl, IPP_CONFIG_TYPE, IPP_SET); 467 if (res != 0) { 468 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 469 goto fail; 470 } 471 472 /* 473 * add module version 474 */ 475 if (nvlist_add_uint32(*nvl, IPP_MODULE_VERSION, 476 (uint32_t)module_version) != 0) { 477 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 478 goto fail; 479 } 480 481 /* add stats_enable */ 482 res = nvlist_add_uint32(*nvl, IPP_ACTION_STATS_ENABLE, 483 (uint32_t)stats_enable); 484 if (res != 0) { 485 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 486 goto fail; 487 } 488 489 /* add ipqosconf as originator */ 490 res = add_orig_ipqosconf(*nvl); 491 if (res != IPQOS_CONF_SUCCESS) { 492 goto fail; 493 } 494 495 /* call lib to do modify */ 496 res = ipp_action_modify(action_name, nvl, 0); 497 if (res != 0) { 498 499 /* invalid parameters */ 500 501 if (errno == EINVAL) { 502 ipqos_msg(MT_ERROR, 503 gettext("Invalid parameters for action %s.\n"), 504 action_name); 505 506 507 } else if (errno == ENOENT) { 508 ipqos_msg(MT_ERROR, 509 gettext("Mandatory parameter missing for " 510 "action %s.\n"), action_name); 511 512 513 } else { /* unexpected error */ 514 ipqos_msg(MT_ERROR, gettext("Failed to modify action " 515 "%s parameters: %s.\n"), action_name, 516 strerror(errno)); 517 } 518 519 goto fail; 520 } 521 522 return (IPQOS_CONF_SUCCESS); 523 fail: 524 if (created && *nvl != NULL) { 525 nvlist_free(*nvl); 526 *nvl = NULL; 527 } 528 return (IPQOS_CONF_ERR); 529 } 530 531 /* 532 * add a class to the kernel action action_name called class_name with 533 * stats set according to stats_enable and the first action set to 534 * first_action. 535 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 536 */ 537 static int 538 add_class( 539 char *action_name, 540 char *class_name, 541 int module_version, 542 boolean_t stats_enable, 543 char *first_action) 544 { 545 546 nvlist_t *nvl; 547 548 IPQOSCDBG4(APPLY, "add_class: action: %s, class: %s, " 549 "first_action: %s, stats: %s\n", action_name, class_name, 550 first_action, (stats_enable == B_TRUE ? "true" : "false")); 551 552 553 /* create nvlist */ 554 if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0) { 555 ipqos_msg(MT_ENOSTR, "nvlist_alloc"); 556 return (IPQOS_CONF_ERR); 557 } 558 559 /* add 'add class' config type */ 560 if (nvlist_add_byte(nvl, IPP_CONFIG_TYPE, CLASSIFIER_ADD_CLASS) != 0) { 561 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 562 goto fail; 563 } 564 565 /* 566 * add module version 567 */ 568 if (nvlist_add_uint32(nvl, IPP_MODULE_VERSION, 569 (uint32_t)module_version) != 0) { 570 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 571 goto fail; 572 } 573 574 /* add class name */ 575 if (nvlist_add_string(nvl, CLASSIFIER_CLASS_NAME, class_name) != 0) { 576 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 577 goto fail; 578 } 579 580 /* add next action */ 581 if (nvlist_add_string(nvl, CLASSIFIER_NEXT_ACTION, first_action) != 0) { 582 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 583 goto fail; 584 } 585 586 /* add stats_enable */ 587 if (nvlist_add_uint32(nvl, CLASSIFIER_CLASS_STATS_ENABLE, 588 (uint32_t)stats_enable) != 0) { 589 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 590 goto fail; 591 } 592 593 /* add ipqosconf as originator */ 594 if (add_orig_ipqosconf(nvl) != IPQOS_CONF_SUCCESS) { 595 goto fail; 596 } 597 598 /* call lib to do modify */ 599 if (ipp_action_modify(action_name, &nvl, 0) != 0) { 600 601 /* ipgpc max classes */ 602 603 if (errno == ENOSPC && 604 strcmp(action_name, IPGPC_CLASSIFY) == 0) { 605 ipqos_msg(MT_ERROR, 606 gettext("Max number of classes reached in %s.\n"), 607 IPGPC_NAME); 608 609 /* other errors */ 610 611 } else { 612 ipqos_msg(MT_ERROR, 613 gettext("Failed to create class %s in action " 614 "%s: %s.\n"), class_name, action_name, 615 strerror(errno)); 616 } 617 618 goto fail; 619 } 620 621 return (IPQOS_CONF_SUCCESS); 622 fail: 623 nvlist_free(nvl); 624 return (IPQOS_CONF_ERR); 625 } 626 627 628 /* 629 * modify the class in the kernel action action_name called class_name with 630 * stats set according to stats_enable and the first action set to 631 * first_action. 632 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 633 */ 634 static int 635 modify_class( 636 char *action_name, 637 char *class_name, 638 int module_version, 639 boolean_t stats_enable, 640 char *first_action, 641 enum ipp_flags flags) 642 { 643 644 nvlist_t *nvl; 645 646 IPQOSCDBG5(APPLY, "modify_class: action: %s, class: %s, first: %s, " 647 "stats: %s, flags: %x\n", action_name, class_name, first_action, 648 stats_enable == B_TRUE ? "true" : "false", flags); 649 650 651 /* create nvlist */ 652 if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0) { 653 ipqos_msg(MT_ENOSTR, "nvlist_alloc"); 654 return (IPQOS_CONF_ERR); 655 } 656 657 /* add 'modify class' config type */ 658 if (nvlist_add_byte(nvl, IPP_CONFIG_TYPE, CLASSIFIER_MODIFY_CLASS) != 659 0) { 660 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 661 goto fail; 662 } 663 664 /* 665 * add module version 666 */ 667 if (nvlist_add_uint32(nvl, IPP_MODULE_VERSION, 668 (uint32_t)module_version) != 0) { 669 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 670 goto fail; 671 } 672 673 /* add class name */ 674 if (nvlist_add_string(nvl, CLASSIFIER_CLASS_NAME, class_name) != 0) { 675 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 676 goto fail; 677 } 678 679 /* add next action */ 680 if (nvlist_add_string(nvl, CLASSIFIER_NEXT_ACTION, first_action) != 0) { 681 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 682 goto fail; 683 } 684 685 /* add stats enable */ 686 if (nvlist_add_uint32(nvl, CLASSIFIER_CLASS_STATS_ENABLE, 687 (uint32_t)stats_enable) != 0) { 688 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 689 goto fail; 690 } 691 692 /* add originator ipqosconf */ 693 if (add_orig_ipqosconf(nvl) != IPQOS_CONF_SUCCESS) { 694 goto fail; 695 } 696 697 /* call lib to do modify */ 698 if (ipp_action_modify(action_name, &nvl, flags) != 0) { 699 700 /* generic error message */ 701 702 ipqos_msg(MT_ERROR, 703 gettext("Modifying class %s in action %s failed: %s.\n"), 704 class_name, action_name, strerror(errno)); 705 706 goto fail; 707 } 708 709 return (IPQOS_CONF_SUCCESS); 710 fail: 711 nvlist_free(nvl); 712 return (IPQOS_CONF_ERR); 713 } 714 715 /* 716 * removes the class class_name from the kernel action action_name. The 717 * flags argument can currently be set to IPP_ACTION_DESTROY which will 718 * result in the action this class references being destroyed. 719 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 720 */ 721 static int 722 remove_class( 723 char *action_name, 724 char *class_name, 725 int module_version, 726 enum ipp_flags flags) 727 { 728 729 nvlist_t *nvl; 730 731 IPQOSCDBG3(APPLY, "remove_class: action: %s, class: %s, " 732 "flags: %x\n", action_name, class_name, flags); 733 734 /* allocate nvlist */ 735 if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0) { 736 ipqos_msg(MT_ENOSTR, "nvlist_alloc"); 737 return (IPQOS_CONF_ERR); 738 } 739 740 /* add 'remove class' config type */ 741 if (nvlist_add_byte(nvl, IPP_CONFIG_TYPE, CLASSIFIER_REMOVE_CLASS) != 742 0) { 743 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 744 goto fail; 745 } 746 747 /* 748 * add module version 749 */ 750 if (nvlist_add_uint32(nvl, IPP_MODULE_VERSION, 751 (uint32_t)module_version) != 0) { 752 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 753 goto fail; 754 } 755 756 /* add class name */ 757 if (nvlist_add_string(nvl, CLASSIFIER_CLASS_NAME, class_name) != 0) { 758 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 759 goto fail; 760 } 761 762 if (ipp_action_modify(action_name, &nvl, flags) != 0) { 763 764 /* generic error message */ 765 766 ipqos_msg(MT_ERROR, 767 gettext("Removing class %s in action %s failed: %s.\n"), 768 class_name, action_name, strerror(errno)); 769 770 goto fail; 771 } 772 773 return (IPQOS_CONF_SUCCESS); 774 fail: 775 nvlist_free(nvl); 776 return (IPQOS_CONF_ERR); 777 } 778 779 /* 780 * add the filter flt to the kernel action named action_name. 781 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 782 */ 783 static int 784 add_filter( 785 char *action_name, 786 ipqos_conf_filter_t *flt, 787 int module_version) 788 { 789 790 nvlist_t *nvl = flt->nvlist; 791 char ipvsbuf[IPQOS_INT_STR_LEN]; 792 793 IPQOSCDBG4(APPLY, "add_filter: action: %s, filter: %s, " 794 "instance: %d, class: %s\n", action_name, flt->name, 795 flt->instance, flt->class_name); 796 797 798 /* add 'add filter' config type to filter nvlist */ 799 if (nvlist_add_byte(nvl, IPP_CONFIG_TYPE, CLASSIFIER_ADD_FILTER) != 0) { 800 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 801 return (IPQOS_CONF_ERR); 802 } 803 804 /* 805 * add module version 806 */ 807 if (nvlist_add_uint32(nvl, IPP_MODULE_VERSION, 808 (uint32_t)module_version) != 0) { 809 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 810 return (IPQOS_CONF_ERR); 811 } 812 813 /* add filter name to nvlist */ 814 if (nvlist_add_string(nvl, CLASSIFIER_FILTER_NAME, flt->name) != 0) { 815 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 816 return (IPQOS_CONF_ERR); 817 } 818 819 /* add class name to nvlist */ 820 if (nvlist_add_string(nvl, CLASSIFIER_CLASS_NAME, flt->class_name) != 821 0) { 822 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 823 return (IPQOS_CONF_ERR); 824 } 825 826 /* add ipqosconf as originator to nvlist */ 827 if (add_orig_ipqosconf(nvl) != IPQOS_CONF_SUCCESS) { 828 return (IPQOS_CONF_ERR); 829 } 830 831 /* add ipgpc specific nv entrys */ 832 if (strcmp(action_name, IPGPC_CLASSIFY) == 0) { 833 834 /* add src and dst nodes to nvlist if present */ 835 836 if (flt->src_nd_name != NULL && 837 nvlist_add_string(nvl, IPGPC_SADDR_HOSTNAME, 838 flt->src_nd_name) != 0) { 839 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 840 return (IPQOS_CONF_ERR); 841 } 842 if (flt->dst_nd_name != NULL && 843 nvlist_add_string(nvl, IPGPC_DADDR_HOSTNAME, 844 flt->dst_nd_name) != 0) { 845 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 846 return (IPQOS_CONF_ERR); 847 } 848 849 /* 850 * add ip_version to private list element if present. 851 * NOTE: this value is of only real use to ipqosconf so 852 * it is placed in this opaque private field. 853 */ 854 if (flt->ip_versions != 0) { 855 (void) sprintf(ipvsbuf, "%d", flt->ip_versions); 856 if (nvlist_add_string(nvl, IPGPC_FILTER_PRIVATE, 857 ipvsbuf) != 0) { 858 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 859 return (IPQOS_CONF_ERR); 860 } 861 } 862 863 /* add filter instance if present */ 864 865 if (nvlist_add_int32(nvl, IPGPC_FILTER_INSTANCE, 866 flt->instance) != 0) { 867 ipqos_msg(MT_ENOSTR, "nvlist_add_int32"); 868 return (IPQOS_CONF_ERR); 869 } 870 } 871 872 if (ipp_action_modify(action_name, &flt->nvlist, 0) != 0) { 873 874 /* invalid parameters */ 875 876 if (errno == EINVAL) { 877 ipqos_msg(MT_ERROR, 878 gettext("Invalid/missing parameters for filter " 879 "%s in action %s.\n"), flt->name, action_name); 880 881 /* max ipgpc filters/classes */ 882 883 } else if (errno == ENOSPC && 884 strcmp(action_name, IPGPC_CLASSIFY) == 0) { 885 ipqos_msg(MT_ERROR, gettext("Max number of filters " 886 "reached in action %s.\n"), IPGPC_NAME); 887 888 /* anything other errnos */ 889 } else { 890 ipqos_msg(MT_ERROR, 891 gettext("Failed to create filter %s in action " 892 "%s: %s.\n"), flt->name, action_name, 893 strerror(errno)); 894 } 895 896 return (IPQOS_CONF_ERR); 897 } 898 899 return (IPQOS_CONF_SUCCESS); 900 } 901 902 903 /* 904 * modify the filter flt in the kernel action named action_name. 905 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 906 */ 907 static int 908 modify_filter( 909 char *action_name, 910 ipqos_conf_filter_t *flt, 911 int module_version) 912 { 913 914 nvlist_t *nvl = flt->nvlist; 915 char ipvsbuf[IPQOS_INT_STR_LEN]; 916 917 IPQOSCDBG4(APPLY, "modify_filter: action: %s, filter: %s, " 918 "instance: %d, class: %s\n", action_name, flt->name, 919 flt->instance, flt->class_name); 920 921 /* show src address and dst address if present */ 922 #ifdef _IPQOS_CONF_DEBUG 923 if (ipqosconf_dbg_flgs & APPLY) { 924 uint_t tmp; 925 in6_addr_t *add; 926 char st[100]; 927 928 if (nvlist_lookup_uint32_array(nvl, IPGPC_SADDR, 929 (uint32_t **)&add, &tmp) == 0) { 930 (void) fprintf(stderr, "saddr: %s\n", 931 inet_ntop(AF_INET6, add, st, 100)); 932 } 933 934 if (nvlist_lookup_uint32_array(nvl, IPGPC_DADDR, 935 (uint32_t **)&add, &tmp) == 0) { 936 (void) fprintf(stderr, "daddr: %s\n", 937 inet_ntop(AF_INET6, add, st, 100)); 938 } 939 } 940 #endif /* _IPQOS_CONF_DEBUG */ 941 942 /* add 'modify filter' config type to filters nvlist */ 943 if (nvlist_add_byte(nvl, IPP_CONFIG_TYPE, 944 CLASSIFIER_MODIFY_FILTER) != 0) { 945 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 946 return (IPQOS_CONF_ERR); 947 } 948 949 /* 950 * add module version 951 */ 952 if (nvlist_add_uint32(nvl, IPP_MODULE_VERSION, 953 (uint32_t)module_version) != 0) { 954 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 955 return (IPQOS_CONF_ERR); 956 } 957 958 /* add filter name to nvlist */ 959 if (nvlist_add_string(nvl, CLASSIFIER_FILTER_NAME, flt->name) != 0) { 960 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 961 return (IPQOS_CONF_ERR); 962 } 963 964 /* add class name to nvlist */ 965 if (nvlist_add_string(nvl, CLASSIFIER_CLASS_NAME, flt->class_name) != 966 0) { 967 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 968 return (IPQOS_CONF_ERR); 969 } 970 971 /* add originator ipqosconf to nvlist */ 972 if (add_orig_ipqosconf(nvl) != IPQOS_CONF_SUCCESS) { 973 return (IPQOS_CONF_ERR); 974 } 975 976 /* add ipgpc specific nvpairs */ 977 if (strcmp(action_name, IPGPC_CLASSIFY) == 0) { 978 979 /* add src and dst nodes to nvlist if present */ 980 981 if (flt->src_nd_name && 982 nvlist_add_string(nvl, IPGPC_SADDR_HOSTNAME, 983 flt->src_nd_name) != 0) { 984 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 985 return (IPQOS_CONF_ERR); 986 } 987 if (flt->dst_nd_name && 988 nvlist_add_string(nvl, IPGPC_DADDR_HOSTNAME, 989 flt->dst_nd_name) != 0) { 990 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 991 return (IPQOS_CONF_ERR); 992 } 993 994 /* 995 * add ip_version to private list element if present. 996 * NOTE: this value is of only real use to ipqosconf so 997 * it is placed in this opaque private field. 998 */ 999 if (flt->ip_versions != 0) { 1000 (void) sprintf(ipvsbuf, "%d", flt->ip_versions); 1001 if (nvlist_add_string(nvl, IPGPC_FILTER_PRIVATE, 1002 ipvsbuf) != 0) { 1003 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 1004 return (IPQOS_CONF_ERR); 1005 } 1006 } 1007 1008 /* add filter instance if present */ 1009 1010 if (nvlist_add_int32(nvl, IPGPC_FILTER_INSTANCE, 1011 flt->instance) != 0) { 1012 ipqos_msg(MT_ENOSTR, "nvlist_add_int32"); 1013 return (IPQOS_CONF_ERR); 1014 } 1015 } 1016 1017 if (ipp_action_modify(action_name, &flt->nvlist, 0) != 0) { 1018 1019 /* invalid parameters */ 1020 1021 if (errno == EINVAL) { 1022 ipqos_msg(MT_ERROR, gettext("Missing/Invalid " 1023 "parameter for filter %s in action %s.\n"), 1024 flt->name, action_name); 1025 1026 /* any other errnos */ 1027 1028 } else { 1029 ipqos_msg(MT_ERROR, 1030 gettext("Failed to modify filter %s in action %s: " 1031 "%s.\n"), flt->name, action_name, strerror(errno)); 1032 } 1033 1034 return (IPQOS_CONF_ERR); 1035 } 1036 1037 return (IPQOS_CONF_SUCCESS); 1038 } 1039 1040 /* 1041 * remove the filter named filter_name instance number instance from the 1042 * kernel action action_name. 1043 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 1044 */ 1045 static int 1046 remove_filter( 1047 char *action_name, 1048 char *filter_name, 1049 int instance, 1050 int module_version) 1051 { 1052 1053 nvlist_t *nvl; 1054 1055 IPQOSCDBG2(APPLY, "remove_filter: action: %s, filter: %s\n", 1056 action_name, filter_name); 1057 1058 /* create nvlist */ 1059 if (nvlist_alloc(&nvl, NV_UNIQUE_NAME, 0) != 0) { 1060 ipqos_msg(MT_ENOSTR, "nvlist_alloc"); 1061 return (IPQOS_CONF_ERR); 1062 } 1063 1064 /* add 'remove filter' config type to list */ 1065 if (nvlist_add_byte(nvl, IPP_CONFIG_TYPE, CLASSIFIER_REMOVE_FILTER) 1066 != 0) { 1067 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 1068 return (IPQOS_CONF_ERR); 1069 } 1070 1071 /* 1072 * add module version 1073 */ 1074 if (nvlist_add_uint32(nvl, IPP_MODULE_VERSION, 1075 (uint32_t)module_version) != 0) { 1076 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 1077 return (IPQOS_CONF_ERR); 1078 } 1079 1080 /* add filter name to list */ 1081 if (nvlist_add_string(nvl, CLASSIFIER_FILTER_NAME, filter_name) != 0) { 1082 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 1083 return (IPQOS_CONF_ERR); 1084 } 1085 1086 /* add instance number if part of multi-instance filter */ 1087 if (instance != -1 && nvlist_add_int32(nvl, IPGPC_FILTER_INSTANCE, 1088 instance) != 0) { 1089 ipqos_msg(MT_ENOSTR, "nvlist_add_int32"); 1090 return (IPQOS_CONF_ERR); 1091 } 1092 1093 /* call into lib to remove */ 1094 if (ipp_action_modify(action_name, &nvl, 0) != 0) { 1095 1096 /* generic error message */ 1097 1098 ipqos_msg(MT_ERROR, 1099 gettext("Removing filter %s in action %s failed: %s.\n"), 1100 filter_name, action_name, strerror(errno)); 1101 1102 return (IPQOS_CONF_ERR); 1103 } 1104 1105 return (IPQOS_CONF_SUCCESS); 1106 } 1107 1108 /* ******************************************************************* */ 1109 1110 1111 /* 1112 * add originator nvpair set to ipqosconf to nvl. 1113 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 1114 */ 1115 static int 1116 add_orig_ipqosconf(nvlist_t *nvl) 1117 { 1118 1119 if (nvlist_add_uint32(nvl, IPP_CONFIG_ORIGINATOR, 1120 IPP_CONFIG_IPQOSCONF) != 0) { 1121 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32: originator:"); 1122 return (IPQOS_CONF_ERR); 1123 } 1124 1125 return (IPQOS_CONF_SUCCESS); 1126 } 1127 1128 /* ************************* differencing functions ************************ */ 1129 1130 1131 /* 1132 * compares the contents of arrays array1 and array2, both of size size, and 1133 * returns B_TRUE or B_FALSE if they're equal or not respectively. 1134 * RETURNS: B_TRUE if equal, else B_FALSE. 1135 */ 1136 static boolean_t 1137 arrays_equal( 1138 int array1[], 1139 int array2[], 1140 uint32_t size) 1141 { 1142 int x; 1143 1144 for (x = 0; x < size; x++) { 1145 if (array1[x] != array2[x]) 1146 return (B_FALSE); 1147 } 1148 return (B_TRUE); 1149 } 1150 1151 /* 1152 * difference class old against class new. It marks the new class as 1153 * modified if it is different. 1154 * RETURNS: IPQOS_CONF_SUCCESS. 1155 */ 1156 static int 1157 diffclass( 1158 ipqos_conf_class_t *old, 1159 ipqos_conf_class_t *new) 1160 { 1161 1162 IPQOSCDBG0(L0, "In diffclass:\n"); 1163 1164 /* two different spec'd actions */ 1165 if (strcmp(old->alist->name, new->alist->name) != 0) { 1166 IPQOSCDBG1(DIFF, "marking class %s as modified\n", new->name); 1167 1168 new->modified = B_TRUE; 1169 return (IPQOS_CONF_SUCCESS); 1170 } 1171 1172 /* different stats values */ 1173 if (old->stats_enable != new->stats_enable) { 1174 IPQOSCDBG1(DIFF, "marking class %s as modified\n", new->name); 1175 1176 new->modified = B_TRUE; 1177 return (IPQOS_CONF_SUCCESS); 1178 } 1179 1180 return (IPQOS_CONF_SUCCESS); 1181 } 1182 1183 /* 1184 * difference params set old against params set new of module module_name. It 1185 * marks the new params as modified if different. 1186 * RETURNS: if error IPQOS_CONF_ERR, else IPQOS_CONF_SUCCESS. 1187 */ 1188 static int 1189 diffparams( 1190 ipqos_conf_params_t *old, 1191 ipqos_conf_params_t *new, 1192 char *module_name) 1193 { 1194 1195 int diff; 1196 int res; 1197 1198 IPQOSCDBG0(L0, "In diffparams\n"); 1199 1200 /* diff stats */ 1201 if (old->stats_enable != new->stats_enable) { 1202 1203 new->modified = B_TRUE; 1204 return (IPQOS_CONF_SUCCESS); 1205 } 1206 1207 /* diff module specific params */ 1208 res = diffnvlists(old->nvlist, new->nvlist, module_name, &diff, 1209 PL_PARAMS); 1210 if (res != IPQOS_CONF_SUCCESS) { 1211 return (res); 1212 } 1213 if (diff) { 1214 1215 new->modified = B_TRUE; 1216 } 1217 1218 return (IPQOS_CONF_SUCCESS); 1219 } 1220 1221 /* 1222 * differences filter old against filter new of module module_name. It marks 1223 * filter new as different if so. 1224 * RETURNS: if error IPQOS_CONF_ERR, else IPQOS_CONF_SUCCESS. 1225 */ 1226 static int 1227 difffilter( 1228 ipqos_conf_filter_t *old, 1229 ipqos_conf_filter_t *new, 1230 char *module_name) 1231 { 1232 1233 int res; 1234 int diff; 1235 1236 IPQOSCDBG0(L0, "In difffilter\n"); 1237 1238 /* compare class name */ 1239 1240 if (strcmp(old->class_name, new->class_name) != 0) { 1241 IPQOSCDBG1(DIFF, "Marking filter %s as modified\n", new->name); 1242 1243 new->modified = B_TRUE; 1244 return (IPQOS_CONF_SUCCESS); 1245 } 1246 1247 /* compare module specific params */ 1248 1249 res = diffnvlists(old->nvlist, new->nvlist, module_name, &diff, 1250 PL_FILTER); 1251 if (res != IPQOS_CONF_SUCCESS) { 1252 return (res); 1253 } 1254 1255 if (diff) { 1256 IPQOSCDBG1(DIFF, "Marking filter %s as modified\n", new->name); 1257 new->modified = B_TRUE; 1258 } 1259 1260 return (IPQOS_CONF_SUCCESS); 1261 } 1262 1263 1264 /* 1265 * mark all the filters and classes in parameter action either 1266 * for deletion (if they are ipqosconf originated) or for modification. 1267 */ 1268 static void 1269 mark_classes_filters_del(ipqos_conf_action_t *action) 1270 { 1271 1272 ipqos_conf_filter_t *flt; 1273 ipqos_conf_class_t *cls; 1274 1275 IPQOSCDBG1(L1, "In mark_classes_filters_del: action: %s\n", 1276 action->name); 1277 1278 /* mark all non-permanent filters for del and permanent to modify */ 1279 for (flt = action->filters; flt; flt = flt->next) { 1280 if (flt->originator == IPP_CONFIG_PERMANENT) { 1281 IPQOSCDBG1(DIFF, "Marking prm filter %s as modified.\n", 1282 flt->name); 1283 1284 flt->modified = B_TRUE; 1285 } else { 1286 IPQOSCDBG1(DIFF, "Marking filter %s as del.\n", 1287 flt->name); 1288 1289 flt->todel = B_TRUE; 1290 } 1291 } 1292 1293 /* mark all non-permanent classes for del and permanent to modify */ 1294 for (cls = action->classes; cls; cls = cls->next) { 1295 if (cls->originator == IPP_CONFIG_PERMANENT) { 1296 IPQOSCDBG1(DIFF, "Marking prm class %s as modified.\n", 1297 cls->name); 1298 1299 cls->modified = B_TRUE; 1300 } else { 1301 IPQOSCDBG1(DIFF, "Marking class %s as del.\n", 1302 cls->name); 1303 1304 cls->todel = B_TRUE; 1305 } 1306 } 1307 } 1308 1309 /* 1310 * mark all classes and filters either new (non-permanent) or modified. 1311 */ 1312 static void 1313 mark_classes_filters_new(ipqos_conf_action_t *action) 1314 { 1315 1316 ipqos_conf_filter_t *flt; 1317 ipqos_conf_class_t *cls; 1318 1319 IPQOSCDBG1(L1, "In mark_classes_filters_new: action: %s\n", 1320 action->name); 1321 1322 /* mark all permanent filters as modified and all others new */ 1323 1324 for (flt = action->filters; flt; flt = flt->next) { 1325 if (flt->originator == IPP_CONFIG_PERMANENT) { 1326 IPQOSCDBG1(DIFF, "Marking prm filter %s as modified.\n", 1327 flt->name); 1328 1329 flt->modified = B_TRUE; 1330 action->modified = B_TRUE; 1331 } else { 1332 IPQOSCDBG1(DIFF, "Marking filter %s as new.\n", 1333 flt->name); 1334 1335 flt->new = B_TRUE; 1336 } 1337 } 1338 1339 /* mark all permanent classes as modified and all others new */ 1340 for (cls = action->classes; cls; cls = cls->next) { 1341 if (cls->originator == IPP_CONFIG_PERMANENT) { 1342 IPQOSCDBG1(DIFF, "Marking prm class %s as modified.\n", 1343 cls->name); 1344 1345 cls->modified = B_TRUE; 1346 action->modified = B_TRUE; 1347 } else { 1348 IPQOSCDBG1(DIFF, "Marking class %s as new.\n", 1349 cls->name); 1350 1351 cls->new = B_TRUE; 1352 } 1353 } 1354 } 1355 1356 /* 1357 * Marks all the actions and their constituent elements in conf 1358 * as new. 1359 */ 1360 static void 1361 mark_config_new( 1362 ipqos_conf_action_t *conf) 1363 { 1364 while (conf != NULL) { 1365 IPQOSCDBG1(DIFF, "Marking action %s as new\n", conf->name); 1366 mark_classes_filters_new(conf); 1367 conf->new = B_TRUE; 1368 conf->visited = 0; 1369 conf = conf->next; 1370 } 1371 } 1372 1373 /* 1374 * differences the configuration in new against old marking the actions 1375 * and their contents appropriately. 1376 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 1377 */ 1378 static int 1379 diffconf( 1380 ipqos_conf_action_t *old, 1381 ipqos_conf_action_t *new) 1382 { 1383 1384 int res; 1385 ipqos_conf_action_t *act; 1386 ipqos_conf_action_t *tmp; 1387 1388 IPQOSCDBG0((L0 | DIFF), "In diffconf\n"); 1389 1390 /* check the new actions against the old */ 1391 1392 for (act = new; act; act = act->next) { 1393 1394 /* if action not in old mark it and it's contents as new */ 1395 1396 if ((tmp = actionexist(act->name, old)) == NULL) { 1397 IPQOSCDBG1(DIFF, "marking act %s as new\n", act->name); 1398 1399 act->new = B_TRUE; 1400 mark_classes_filters_new(act); 1401 continue; 1402 } 1403 1404 /* if action in old diff old against new */ 1405 1406 res = diffaction(tmp, act); 1407 if (res != IPQOS_CONF_SUCCESS) { 1408 return (res); 1409 } 1410 } 1411 1412 /* 1413 * mark actions, and their contents, in old but not new that were 1414 * created by us for del. 1415 */ 1416 1417 for (act = old; act; act = act->next) { 1418 if (act->params->originator == IPP_CONFIG_IPQOSCONF && 1419 actionexist(act->name, new) == NULL) { 1420 IPQOSCDBG1(DIFF, "marking act %s for del\n", act->name); 1421 1422 act->todel = B_TRUE; 1423 mark_classes_filters_del(act); 1424 } 1425 } 1426 1427 return (IPQOS_CONF_SUCCESS); 1428 } 1429 1430 /* 1431 * differences action old against action new, comparing its classes, filters 1432 * and parameters. If it is different the new action is marked as modified 1433 * and it's different sub-objects are also marked approriately. 1434 * RETURNS: IPQOS_CONF_ERR if error, else IPQOS_CONF_SUCCESS. 1435 */ 1436 static int 1437 diffaction( 1438 ipqos_conf_action_t *old, 1439 ipqos_conf_action_t *new) 1440 { 1441 1442 int res; 1443 1444 IPQOSCDBG0(L0, "In diffaction\n"); 1445 1446 /* compare and mark classes */ 1447 res = diffclasses(old, new); 1448 if (res != IPQOS_CONF_SUCCESS) { 1449 return (res); 1450 } 1451 1452 /* compare and mark filters */ 1453 res = difffilters(old, new); 1454 if (res != IPQOS_CONF_SUCCESS) { 1455 return (res); 1456 } 1457 1458 /* compare and mark parameters */ 1459 res = diffparams(old->params, new->params, old->module); 1460 if (res != IPQOS_CONF_SUCCESS) { 1461 return (res); 1462 } 1463 1464 /* mark action as modified if params are */ 1465 if (new->params->modified == B_TRUE) { 1466 IPQOSCDBG1(DIFF, "Marking params for action %s modified\n", 1467 new->name); 1468 1469 new->modified = B_TRUE; 1470 } 1471 1472 return (IPQOS_CONF_SUCCESS); 1473 } 1474 1475 /* 1476 * differences the set of classes in new against those in old, marking any 1477 * that are new/modified, approriately in the new class, and any removed 1478 * in the old class appropriately. Also marks the action which has had an 1479 * object within marked, as modified. 1480 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 1481 */ 1482 1483 static int 1484 diffclasses( 1485 ipqos_conf_action_t *old, 1486 ipqos_conf_action_t *new) 1487 { 1488 1489 1490 ipqos_conf_class_t *cls; 1491 ipqos_conf_class_t *tmpc; 1492 ipqos_conf_class_t *ncls; 1493 int res; 1494 1495 1496 /* loop through old classes checking for classes not present in new */ 1497 1498 for (cls = old->classes; cls; cls = cls->next) { 1499 1500 if (classexist(cls->name, new->classes) == NULL) { 1501 1502 /* if we created original class mark for deletion */ 1503 1504 if (cls->originator == IPP_CONFIG_IPQOSCONF) { 1505 IPQOSCDBG1(DIFF, "marking class %s for del\n", 1506 cls->name); 1507 1508 cls->todel = B_TRUE; 1509 1510 /* mark old action */ 1511 old->modified = B_TRUE; 1512 1513 /* 1514 * if permanent class and next action created by us 1515 * copy it, set it's next action to continue and 1516 * add it to new action. This will cause the class 1517 * to be marked as and modified. This returns the class 1518 * to an assumed default state and prevents the 1519 * case where the class is pointing at an action 1520 * we want to remove and therefore couldn't without 1521 * this forced modify. 1522 */ 1523 } else if (cls->originator == IPP_CONFIG_PERMANENT && 1524 cls->alist->action && /* not virtual action */ 1525 cls->alist->action->params->originator == 1526 IPP_CONFIG_IPQOSCONF) { 1527 1528 /* copy class */ 1529 1530 res = dup_class(cls, &ncls); 1531 if (res != IPQOS_CONF_SUCCESS) { 1532 return (IPQOS_CONF_ERR); 1533 } 1534 1535 /* set next action to continue */ 1536 1537 (void) strcpy(ncls->alist->name, 1538 IPP_ANAME_CONT); 1539 1540 /* add to news classes to be diffed below */ 1541 ADD_TO_LIST(&new->classes, ncls); 1542 } 1543 } 1544 } 1545 1546 /* loop through new classes checking for new / modified classes */ 1547 1548 for (cls = new->classes; cls; cls = cls->next) { 1549 1550 /* new ipqosconf class */ 1551 1552 if ((tmpc = classexist(cls->name, old->classes)) == NULL || 1553 (tmpc->originator != IPP_CONFIG_IPQOSCONF && 1554 tmpc->originator != IPP_CONFIG_PERMANENT)) { 1555 IPQOSCDBG1(DIFF, "marking class %s new\n", 1556 cls->name); 1557 1558 cls->new = B_TRUE; 1559 1560 new->modified = B_TRUE; /* mark new action */ 1561 continue; 1562 1563 /* existing ipqosconf/perm class */ 1564 } else { 1565 res = diffclass(tmpc, cls); 1566 if (res != IPQOS_CONF_SUCCESS) { 1567 return (res); 1568 } 1569 1570 if (cls->modified == B_TRUE) { 1571 new->modified = B_TRUE; 1572 } 1573 } 1574 } 1575 1576 return (IPQOS_CONF_SUCCESS); 1577 } 1578 1579 /* 1580 * differences the set of filters in new against those in old, marking any 1581 * that are new/modified, approriately in the new filter/s, and any removed 1582 * in the old filter appropriately. Also marks the action which has had an 1583 * object within marked, as modified. 1584 * RETURNS: IPQOS_CONF_SUCCESS (we return an int for symmetry with diffclasses 1585 * and difffparams). 1586 */ 1587 static int 1588 difffilters( 1589 ipqos_conf_action_t *old, 1590 ipqos_conf_action_t *new) 1591 { 1592 1593 ipqos_conf_filter_t *flt; 1594 ipqos_conf_filter_t *tmpf; 1595 int maxi; 1596 int newi; 1597 int res; 1598 1599 /* check for new/modified filters */ 1600 1601 for (flt = new->filters; flt; flt = flt->next) { 1602 1603 /* new ipqosconf filter */ 1604 1605 if ((tmpf = filterexist(flt->name, -1, old->filters)) == NULL) { 1606 1607 /* mark all instances of this filter as new */ 1608 for (;;) { 1609 IPQOSCDBG1(DIFF, "Marking filter %s as " 1610 "new\n", flt->name); 1611 1612 flt->new = B_TRUE; 1613 1614 1615 if (flt->next == NULL || 1616 strcmp(flt->next->name, flt->name) != 0) { 1617 break; 1618 } 1619 flt = flt->next; 1620 } 1621 new->modified = B_TRUE; /* mark new action */ 1622 1623 /* ipqosconf/permanent filter existed */ 1624 } else { 1625 /* 1626 * if ip node name force filter refresh - ie. mark 1627 * all old filter instances as todel and all new new. 1628 */ 1629 if (tmpf->src_nd_name || tmpf->dst_nd_name || 1630 flt->src_nd_name || flt->dst_nd_name) { 1631 1632 /* init max previous filter instance */ 1633 maxi = tmpf->instance; 1634 1635 /* mark old instances for deletion */ 1636 do { 1637 IPQOSCDBG2(DIFF, "Marking filter " 1638 "%s, instance %d for del\n", 1639 tmpf->name, tmpf->instance); 1640 1641 tmpf->todel = B_TRUE; 1642 1643 /* 1644 * check and update previous instance 1645 * max. 1646 */ 1647 if (tmpf->instance > maxi) { 1648 maxi = tmpf->instance; 1649 } 1650 1651 tmpf = tmpf->next; 1652 } while (tmpf != NULL && 1653 strcmp(tmpf->name, flt->name) == 0); 1654 1655 /* 1656 * use the max previous instance + 1 for 1657 * the start of the new instance numbers. 1658 */ 1659 newi = (uint32_t)++maxi % INT_MAX; 1660 1661 /* 1662 * mark new instances for addition and 1663 * give new instance number. 1664 */ 1665 for (;;) { 1666 IPQOSCDBG2(DIFF, "Marking filter " 1667 "%s, instance %d as new\n", 1668 flt->name, newi); 1669 1670 flt->new = B_TRUE; 1671 flt->instance = newi++; 1672 if (flt->next == NULL || 1673 strcmp(flt->next->name, 1674 flt->name) != 0) { 1675 break; 1676 } 1677 flt = flt->next; 1678 } 1679 new->modified = B_TRUE; /* mark new action */ 1680 1681 /* mark old action */ 1682 old->modified = B_TRUE; 1683 1684 /* non-node name filter */ 1685 } else { 1686 /* compare and mark as modified if diff */ 1687 1688 res = difffilter(tmpf, flt, new->module); 1689 if (res != IPQOS_CONF_SUCCESS) { 1690 return (res); 1691 } 1692 if (flt->modified == B_TRUE) { 1693 /* mark action if diff */ 1694 new->modified = B_TRUE; 1695 } 1696 } 1697 } 1698 } 1699 1700 /* 1701 * Check for deleted ipqosconf created filters and mark 1702 * any found for deletion. 1703 * For non-ipqosconf generated filters, including permanent 1704 * ones (none of these exist at the moment) we just leave 1705 * the filter unmarked. 1706 */ 1707 for (flt = old->filters; flt; flt = flt->next) { 1708 1709 if (flt->originator == IPP_CONFIG_IPQOSCONF && 1710 filterexist(flt->name, -1, new->filters) == NULL) { 1711 1712 /* mark all old instances for deletions */ 1713 for (;;) { 1714 IPQOSCDBG2(DIFF, "marking flt %s, inst %d " 1715 "for del\n", flt->name, flt->instance); 1716 1717 flt->todel = B_TRUE; 1718 old->modified = B_TRUE; /* mark old action */ 1719 1720 if (flt->next == NULL || 1721 strcmp(flt->next->name, flt->name) != 0) { 1722 break; 1723 } 1724 flt = flt->next; 1725 } 1726 } 1727 } 1728 1729 return (IPQOS_CONF_SUCCESS); 1730 } 1731 1732 1733 /* 1734 * differences the elements of nvlists old and new using the types file 1735 * for module name to interpret the element types. It sets pdiff to either 1736 * 0 or 1 if they are the same or different respectively. 1737 * RETURNS: IPQOS_CONF_ERR if any errors, else IPQOS_CONF_SUCCESS. 1738 */ 1739 static int 1740 diffnvlists( 1741 nvlist_t *old, 1742 nvlist_t *new, 1743 char *module_name, 1744 int *pdiff, 1745 place_t place) 1746 { 1747 1748 int first_pass = 1; 1749 nvlist_t *tmp; 1750 int res; 1751 nvpair_t *nvp; 1752 FILE *tfp; 1753 str_val_nd_t *enum_nvs; 1754 char dfltst[IPQOS_VALST_MAXLEN+1] = ""; 1755 char *lo; 1756 ipqos_nvtype_t type; 1757 char *nme; 1758 int diff; 1759 int openerr; 1760 1761 1762 IPQOSCDBG0(L0, "In diffnvlists\n"); 1763 1764 /* open stream to types file */ 1765 1766 tfp = validmod(module_name, &openerr); 1767 if (tfp == NULL) { 1768 if (openerr) { 1769 ipqos_msg(MT_ENOSTR, "fopen"); 1770 } 1771 return (IPQOS_CONF_ERR); 1772 } 1773 start: 1774 /* 1775 * loop through each of the elements of the new list comparing 1776 * it with the old one if present. If the old one isn't present 1777 * then it is compared with the default value for that type (if 1778 * set). Any time the values are determined to be different 1779 * or the default value is to be used but isn't present the diff 1780 * param is set to 1 and we return. 1781 * 1782 * If the loop runs its course then the new and old nvlists are 1783 * reversed and the loop is entered for a second time. 1784 */ 1785 nvp = nvlist_next_nvpair(new, NULL); 1786 while (nvp != NULL) { 1787 1788 /* get name */ 1789 nme = nvpair_name(nvp); 1790 1791 /* 1792 * get type. 1793 */ 1794 place = PL_ANY; 1795 res = readtype(tfp, module_name, SHORT_NAME(nme), &type, 1796 &enum_nvs, dfltst, B_TRUE, &place); 1797 if (res != IPQOS_CONF_SUCCESS) { 1798 return (res); 1799 } 1800 1801 /* init diff to 1 */ 1802 diff = 1; 1803 1804 switch (type) { 1805 1806 /* interface name */ 1807 case IPQOS_DATA_TYPE_IFINDEX: { 1808 uint32_t ifidx; 1809 uint32_t oifidx; 1810 1811 /* get new value */ 1812 (void) nvpair_value_uint32(nvp, &ifidx); 1813 1814 /* compare against old if present */ 1815 1816 res = nvlist_lookup_uint32(old, nme, &oifidx); 1817 if (res == 0) { 1818 /* diff values */ 1819 diff = (ifidx != oifidx); 1820 1821 /* not in old so see if new value is default */ 1822 1823 } else { 1824 diff = (ifidx != 0); 1825 } 1826 break; 1827 } 1828 /* protocol */ 1829 case IPQOS_DATA_TYPE_PROTO: { 1830 uchar_t proto; 1831 uchar_t oproto; 1832 1833 (void) nvpair_value_byte(nvp, &proto); 1834 1835 res = nvlist_lookup_byte(old, nme, &oproto); 1836 if (res == 0) { 1837 diff = (proto != oproto); 1838 } else { 1839 diff = (proto != 0); 1840 } 1841 break; 1842 } 1843 /* port */ 1844 case IPQOS_DATA_TYPE_PORT: { 1845 uint16_t port; 1846 uint16_t oport; 1847 1848 (void) nvpair_value_uint16(nvp, &port); 1849 res = nvlist_lookup_uint16(old, nme, &oport); 1850 if (res == 0) { 1851 diff = (port != oport); 1852 } else { 1853 diff = (port != 0); 1854 } 1855 break; 1856 } 1857 /* action name / string */ 1858 case IPQOS_DATA_TYPE_ACTION: 1859 case IPQOS_DATA_TYPE_STRING: { 1860 char *str; 1861 char *ostr; 1862 1863 (void) nvpair_value_string(nvp, &str); 1864 res = nvlist_lookup_string(old, nme, &ostr); 1865 if (res == 0) { 1866 diff = strcmp(str, ostr); 1867 } else if (*dfltst) { 1868 diff = strcmp(str, dfltst); 1869 } 1870 break; 1871 } 1872 /* address mask / address */ 1873 case IPQOS_DATA_TYPE_ADDRESS_MASK: 1874 case IPQOS_DATA_TYPE_ADDRESS: { 1875 in6_addr_t *in6; 1876 in6_addr_t *oin6; 1877 uint_t x; 1878 1879 /* 1880 * all addresses are stored as v6 addresses, so 1881 * a uint32_t[4] array is used. 1882 */ 1883 1884 /* lookup new value */ 1885 1886 (void) nvpair_value_uint32_array(nvp, 1887 (uint32_t **)&in6, &x); 1888 1889 /* see if there's an old value and diff it */ 1890 1891 res = nvlist_lookup_uint32_array(old, nme, 1892 (uint32_t **)&oin6, &x); 1893 if (res == 0) { 1894 /* diff each of the 16 v6 address bytes */ 1895 1896 for (x = 0; x < 16; x++) { 1897 if (in6->s6_addr[x] != 1898 oin6->s6_addr[x]) { 1899 diff++; 1900 break; 1901 } 1902 } 1903 } 1904 break; 1905 } 1906 /* boolean */ 1907 case IPQOS_DATA_TYPE_BOOLEAN: { 1908 boolean_t bl; 1909 boolean_t obl; 1910 1911 (void) nvpair_value_uint32(nvp, (uint32_t *)&bl); 1912 1913 /* see if there's an old value and diff it */ 1914 res = nvlist_lookup_uint32(old, nme, (uint32_t *)&obl); 1915 if (res == 0) { 1916 diff = (bl != obl); 1917 1918 /* compare against default if present */ 1919 } else if (*dfltst) { 1920 res = readbool(dfltst, &obl); 1921 if (res == IPQOS_CONF_SUCCESS) { 1922 diff = (bl != obl); 1923 } 1924 } 1925 break; 1926 } 1927 /* uint 8 */ 1928 case IPQOS_DATA_TYPE_UINT8: { 1929 uint8_t u8; 1930 uint8_t ou8; 1931 1932 (void) nvpair_value_byte(nvp, (uchar_t *)&u8); 1933 res = nvlist_lookup_byte(old, nme, (uchar_t *)&ou8); 1934 if (res == 0) { 1935 diff = (u8 != ou8); 1936 } else if (*dfltst) { 1937 res = readuint8(dfltst, &ou8, &lo); 1938 if (res == IPQOS_CONF_SUCCESS) { 1939 diff = (u8 != ou8); 1940 } 1941 } 1942 break; 1943 } 1944 /* int 16 */ 1945 case IPQOS_DATA_TYPE_INT16: { 1946 int16_t i16; 1947 int16_t oi16; 1948 1949 (void) nvpair_value_int16(nvp, &i16); 1950 res = nvlist_lookup_int16(old, nme, &oi16); 1951 if (res == 0) { 1952 diff = (i16 != oi16); 1953 } else if (*dfltst) { 1954 res = readint16(dfltst, &oi16, &lo); 1955 if (res == IPQOS_CONF_SUCCESS) { 1956 diff = (i16 != oi16); 1957 } 1958 } 1959 break; 1960 } 1961 /* uint16 */ 1962 case IPQOS_DATA_TYPE_UINT16: { 1963 uint16_t ui16; 1964 uint16_t oui16; 1965 1966 (void) nvpair_value_uint16(nvp, &ui16); 1967 res = nvlist_lookup_uint16(old, nme, &oui16); 1968 if (res == 0) { 1969 diff = (ui16 != oui16); 1970 } else if (*dfltst) { 1971 res = readuint16(dfltst, &oui16, &lo); 1972 if (res == IPQOS_CONF_SUCCESS) { 1973 diff = (ui16 != oui16); 1974 } 1975 } 1976 break; 1977 } 1978 /* 1979 * int32 and user. 1980 * Since user uids are stored in an int32 nvpair we can use 1981 * the same comparison code. 1982 */ 1983 case IPQOS_DATA_TYPE_USER: 1984 case IPQOS_DATA_TYPE_INT32: { 1985 int32_t i32; 1986 int32_t oi32; 1987 1988 (void) nvpair_value_int32(nvp, &i32); 1989 res = nvlist_lookup_int32(old, nme, &oi32); 1990 if (res == 0) { 1991 diff = (i32 != oi32); 1992 } else if (*dfltst) { 1993 res = readint32(dfltst, &oi32, &lo); 1994 if (res == IPQOS_CONF_SUCCESS) { 1995 diff = (i32 != oi32); 1996 } 1997 } 1998 break; 1999 } 2000 /* uint32 */ 2001 case IPQOS_DATA_TYPE_UINT32: { 2002 uint32_t ui32; 2003 uint32_t oui32; 2004 2005 (void) nvpair_value_uint32(nvp, &ui32); 2006 res = nvlist_lookup_uint32(old, nme, &oui32); 2007 if (res == 0) { 2008 diff = (ui32 != oui32); 2009 } else if (*dfltst) { 2010 res = readuint32(dfltst, &oui32, &lo); 2011 if (res == IPQOS_CONF_SUCCESS) { 2012 diff = (ui32 != oui32); 2013 } 2014 } 2015 break; 2016 } 2017 /* enumeration */ 2018 case IPQOS_DATA_TYPE_ENUM: { 2019 uint32_t eval; 2020 uint32_t oeval; 2021 2022 (void) nvpair_value_uint32(nvp, &eval); 2023 res = nvlist_lookup_uint32(old, nme, &oeval); 2024 if (res == 0) { 2025 diff = (eval != oeval); 2026 } else if (*dfltst) { 2027 res = readuint32(dfltst, &oeval, &lo); 2028 if (res == IPQOS_CONF_SUCCESS) { 2029 diff = (eval != oeval); 2030 } 2031 } 2032 break; 2033 } 2034 case IPQOS_DATA_TYPE_M_INDEX: { 2035 uint8_t idx, oidx; 2036 2037 (void) nvpair_value_byte(nvp, &idx); 2038 res = nvlist_lookup_byte(old, nme, &oidx); 2039 if (res == 0) 2040 diff = (idx != oidx); 2041 break; 2042 } 2043 case IPQOS_DATA_TYPE_INT_ARRAY: { 2044 int *oarr, *arr; 2045 uint32_t osize, size; 2046 2047 (void) nvpair_value_int32_array(nvp, &arr, &size); 2048 res = nvlist_lookup_int32_array(old, nme, &oarr, 2049 &osize); 2050 if (res == 0) 2051 diff = (arrays_equal(arr, oarr, size) == 2052 B_FALSE); 2053 break; 2054 } 2055 #ifdef _IPQOS_CONF_DEBUG 2056 default: { 2057 /* shouldn't get here as all types should be covered */ 2058 assert(1); 2059 } 2060 #endif 2061 } /* switch */ 2062 if (diff != 0) { 2063 IPQOSCDBG1(DIFF, "parameter %s different\n", nme); 2064 *pdiff = 1; 2065 (void) fclose(tfp); 2066 return (IPQOS_CONF_SUCCESS); 2067 } 2068 2069 2070 nvp = nvlist_next_nvpair(new, nvp); 2071 2072 } 2073 2074 /* now compare all the stuff in the second list with the first */ 2075 if (first_pass) { 2076 tmp = old; 2077 old = new; 2078 new = tmp; 2079 first_pass = 0; 2080 goto start; 2081 } 2082 2083 (void) fclose(tfp); 2084 2085 *pdiff = 0; 2086 return (IPQOS_CONF_SUCCESS); 2087 } 2088 2089 2090 2091 /* ************************** difference application *********************** */ 2092 2093 2094 2095 /* 2096 * causes all items marked as requiring change in actions and old_actions 2097 * to have the change applied. 2098 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 2099 */ 2100 static int 2101 applydiff( 2102 ipqos_conf_action_t *actions, 2103 ipqos_conf_action_t *old_actions) 2104 { 2105 2106 int res; 2107 2108 IPQOSCDBG0(L1, "In applydiff:\n"); 2109 2110 2111 /* add each item marked as new */ 2112 2113 res = add_items(actions, B_FALSE); 2114 if (res != IPQOS_CONF_SUCCESS) { 2115 return (res); 2116 } 2117 2118 /* modify items marked for modification */ 2119 2120 res = modify_items(actions); 2121 if (res != IPQOS_CONF_SUCCESS) { 2122 return (res); 2123 } 2124 2125 /* delete items marked for deletion */ 2126 2127 res = remove_items(old_actions, B_FALSE); 2128 if (res != IPQOS_CONF_SUCCESS) { 2129 return (res); 2130 } 2131 2132 return (IPQOS_CONF_SUCCESS); 2133 } 2134 2135 static int 2136 add_items( 2137 ipqos_conf_action_t *actions, 2138 boolean_t rem_undo) 2139 { 2140 2141 int res; 2142 ipqos_conf_action_t *act; 2143 2144 IPQOSCDBG1(L1, "In add_items, rem_undo: %u\n", rem_undo); 2145 2146 /* 2147 * we need to create ipgpc action before any others as some actions 2148 * such as ftpcl which make calls to it depend on it being there on 2149 * their creation. 2150 */ 2151 act = actionexist(IPGPC_CLASSIFY, actions); 2152 if (act && 2153 (rem_undo == B_FALSE && act->new == B_TRUE || 2154 rem_undo == B_TRUE && act->deleted == B_TRUE)) { 2155 2156 res = add_action(act); 2157 if (res != IPQOS_CONF_SUCCESS) { 2158 return (res); 2159 } 2160 } 2161 2162 /* 2163 * loop though action list and add any actions marked as 2164 * new/modified action and apply any additions there, then return. 2165 */ 2166 2167 for (act = actions; act; act = act->next) { 2168 res = add_item(act, rem_undo); 2169 if (res != IPQOS_CONF_SUCCESS) { 2170 return (IPQOS_CONF_ERR); 2171 } 2172 } 2173 2174 return (IPQOS_CONF_SUCCESS); 2175 } 2176 2177 2178 /* 2179 * 2180 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 2181 */ 2182 static int 2183 add_item( 2184 ipqos_conf_action_t *actions, 2185 boolean_t rem_undo) 2186 { 2187 2188 ipqos_conf_action_t *act = actions; 2189 int res; 2190 ipqos_conf_class_t *cls; 2191 ipqos_conf_act_ref_t *pact; 2192 2193 IPQOSCDBG2(L1, "In add_item: action: %s, rem_undo: %u\n", 2194 actions->name, rem_undo); 2195 2196 /* if already visited return immediately */ 2197 2198 if (act->visited == ADD_VISITED) { 2199 IPQOSCDBG0(L1, "Early exit due to visited\n"); 2200 return (IPQOS_CONF_SUCCESS); 2201 } 2202 act->visited = ADD_VISITED; 2203 2204 2205 /* recurse to last action in tree */ 2206 2207 for (cls = act->classes; cls; cls = cls->next) { 2208 2209 /* if not virtual action */ 2210 2211 if (cls->alist->action) { 2212 res = add_item(cls->alist->action, rem_undo); 2213 if (res != IPQOS_CONF_SUCCESS) { 2214 return (res); 2215 } 2216 } 2217 } 2218 2219 for (pact = act->params->actions; pact; pact = pact->next) { 2220 2221 /* if not virtual */ 2222 2223 if (pact->action) { 2224 res = add_item(pact->action, rem_undo); 2225 if (res != IPQOS_CONF_SUCCESS) { 2226 return (res); 2227 } 2228 } 2229 } 2230 2231 2232 /* if action marked as new and not ipgpc, create */ 2233 2234 if (((rem_undo == B_FALSE && act->new == B_TRUE) || 2235 (rem_undo == B_TRUE && act->deleted == B_TRUE)) && 2236 strcmp(act->name, IPGPC_CLASSIFY) != 0) { 2237 res = add_action(act); 2238 if (res != IPQOS_CONF_SUCCESS) { 2239 return (res); 2240 } 2241 } 2242 2243 /* add any classes and filters marked as new */ 2244 2245 if (add_classes(act->classes, act->name, act->module_version, 2246 rem_undo) != IPQOS_CONF_SUCCESS || 2247 add_filters(act->filters, act->name, act->module_version, 2248 rem_undo) != IPQOS_CONF_SUCCESS) { 2249 return (IPQOS_CONF_ERR); 2250 } 2251 2252 return (IPQOS_CONF_SUCCESS); 2253 } 2254 2255 2256 /* 2257 * Uses the contents of acts params nvlist and adds an originator 2258 * element set to ipqosconf and the stats parameter. This list 2259 * is then used as the parameter to a call to ipp_action_create to create 2260 * this action in the kernel. 2261 * RETURNS: IPQOS_CONF_ERR on err, else IPQOS_CONF_SUCCESS. 2262 */ 2263 static int 2264 add_action(ipqos_conf_action_t *act) 2265 { 2266 2267 int res; 2268 nvlist_t **nvl; 2269 2270 IPQOSCDBG2(APPLY, "add_action: action: %s, module: %s\n", act->name, 2271 act->module); 2272 2273 nvl = &act->params->nvlist; 2274 2275 /* alloc params nvlist if not already one */ 2276 2277 if (*nvl == NULL) { 2278 res = nvlist_alloc(nvl, NV_UNIQUE_NAME, 0); 2279 if (res != 0) { 2280 ipqos_msg(MT_ENOSTR, "nvlist_alloc"); 2281 return (IPQOS_CONF_ERR); 2282 } 2283 } 2284 2285 /* 2286 * add module version 2287 */ 2288 if (nvlist_add_uint32(*nvl, IPP_MODULE_VERSION, 2289 (uint32_t)act->module_version) != 0) { 2290 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32"); 2291 return (IPQOS_CONF_ERR); 2292 } 2293 2294 /* add action stats */ 2295 2296 if (nvlist_add_uint32(*nvl, IPP_ACTION_STATS_ENABLE, 2297 (uint32_t)act->params->stats_enable) != 0) { 2298 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32: action stats"); 2299 return (IPQOS_CONF_ERR); 2300 } 2301 2302 /* add ipqosconf originator id */ 2303 2304 if (add_orig_ipqosconf(*nvl) != IPQOS_CONF_SUCCESS) { 2305 return (IPQOS_CONF_ERR); 2306 } 2307 2308 /* call into lib to create action */ 2309 2310 res = ipp_action_create(act->module, act->name, nvl, 0); 2311 if (res != 0) { 2312 IPQOSCDBG2(APPLY, "Create action %s, module %s failed\n", 2313 act->name, act->module); 2314 2315 /* invalid params */ 2316 2317 if (errno == EINVAL) { 2318 ipqos_msg(MT_ERROR, 2319 gettext("Invalid Parameters for action %s.\n"), 2320 act->name); 2321 2322 } else if (errno == ENOENT) { 2323 ipqos_msg(MT_ERROR, 2324 gettext("Missing required parameter for action " 2325 "%s.\n"), act->name); 2326 2327 } else { /* unexpected error */ 2328 ipqos_msg(MT_ERROR, gettext("Failed to create action " 2329 "%s: %s.\n"), act->name, strerror(errno)); 2330 } 2331 2332 return (IPQOS_CONF_ERR); 2333 } 2334 2335 /* mark action as created */ 2336 act->cr_mod = B_TRUE; 2337 2338 return (IPQOS_CONF_SUCCESS); 2339 } 2340 2341 /* 2342 * for each of the filters in parameter filters if rem_undo is false and 2343 * the filter is marked as new or if rem_undo is true and the filter is 2344 * marked as deleted then add the filter to the kernel action named by action 2345 * and if successful mark as created. 2346 * RETURNS: IPQOS_CONF_ERR on errors, else IPQOS_CONF_SUCCESS. 2347 */ 2348 static int 2349 add_filters( 2350 ipqos_conf_filter_t *filters, 2351 char *action, 2352 int module_version, 2353 boolean_t rem_undo) 2354 { 2355 2356 ipqos_conf_filter_t *flt; 2357 2358 IPQOSCDBG0(L1, "In add_filters\n"); 2359 2360 /* loop through filters in filters param */ 2361 for (flt = filters; flt; flt = flt->next) { 2362 /* 2363 * skip filter if in normal mode and not new filter or 2364 * if doing rollback and filter wasn't previously deleted. 2365 */ 2366 if ((rem_undo == B_FALSE && flt->new == B_FALSE) || 2367 (rem_undo == B_TRUE && flt->deleted == B_FALSE)) { 2368 continue; 2369 } 2370 2371 /* add filter to action */ 2372 if (add_filter(action, flt, module_version) != 2373 IPQOS_CONF_SUCCESS) { 2374 return (IPQOS_CONF_ERR); 2375 } 2376 2377 /* mark as created */ 2378 flt->cr_mod = B_TRUE; 2379 } 2380 2381 return (IPQOS_CONF_SUCCESS); 2382 } 2383 2384 /* 2385 * for each of the classes in parameter classes if rem_undo is false and 2386 * the class is marked as new or if rem_undo is true and the class is 2387 * marked as deleted then add the class to the kernel action named by action 2388 * and if successful mark as created. 2389 * RETURNS: IPQOS_CONF_ERR on errors, else IPQOS_CONF_SUCCESS. 2390 */ 2391 int 2392 add_classes( 2393 ipqos_conf_class_t *classes, 2394 char *action, 2395 int module_version, 2396 boolean_t rem_undo) { 2397 2398 int res; 2399 ipqos_conf_class_t *cls; 2400 2401 IPQOSCDBG0(L1, "In add_classes\n"); 2402 2403 /* for each class */ 2404 for (cls = classes; cls; cls = cls->next) { 2405 /* 2406 * skip class if in normal mode and not new class or 2407 * if doing rollback and class wasn't deleted. 2408 */ 2409 if ((rem_undo == B_FALSE && cls->new == B_FALSE) || 2410 (rem_undo == B_TRUE && cls->deleted == B_FALSE)) { 2411 continue; 2412 } 2413 2414 /* add class to action */ 2415 res = add_class(action, cls->name, module_version, 2416 cls->stats_enable, cls->alist->name); 2417 if (res != IPQOS_CONF_SUCCESS) { 2418 return (IPQOS_CONF_ERR); 2419 } 2420 2421 /* mark class as created */ 2422 cls->cr_mod = B_TRUE; 2423 } 2424 2425 return (IPQOS_CONF_SUCCESS); 2426 } 2427 2428 /* 2429 * For each of the actions in actions remove the action if marked as 2430 * such or remove any objects within marked as such. 2431 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 2432 */ 2433 static int 2434 remove_items( 2435 ipqos_conf_action_t *actions, 2436 boolean_t add_undo) 2437 { 2438 2439 int res; 2440 ipqos_conf_action_t *act; 2441 2442 IPQOSCDBG1(L0, "In remove_items, add_undo: %u\n", add_undo); 2443 2444 /* 2445 * loop through actions removing any actions, or action contents 2446 * that are marked as such. 2447 */ 2448 for (act = actions; act; act = act->next) { 2449 res = remove_item(act, add_undo); 2450 if (res != IPQOS_CONF_SUCCESS) { 2451 return (res); 2452 } 2453 } 2454 2455 return (IPQOS_CONF_SUCCESS); 2456 } 2457 2458 /* 2459 * Deletes this action if marked for deletion or any of it's contents marked 2460 * for deletion. If the action is marked for deletion any actions referencing 2461 * this action are destroyed first if marked or have their contents destroyed 2462 * if marked. This is recursive. 2463 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 2464 */ 2465 static int 2466 remove_item( 2467 ipqos_conf_action_t *act, 2468 boolean_t add_undo) 2469 { 2470 2471 ipqos_conf_class_t *cls; 2472 ipqos_conf_filter_t *flt; 2473 ipqos_conf_act_ref_t *dep; 2474 int res; 2475 2476 IPQOSCDBG3(L1, "In remove_item: action: %s, add_undo: %u, mod: %u\n", 2477 act->name, add_undo, act->modified); 2478 2479 2480 /* return immmediately if previously visited in remove phase */ 2481 2482 if (act->visited == REM_VISITED) { 2483 IPQOSCDBG0(L1, "Exit due to REM_VISITED set\n"); 2484 return (IPQOS_CONF_SUCCESS); 2485 } 2486 act->visited = REM_VISITED; 2487 2488 2489 /* if this action is to be deleted */ 2490 2491 if (add_undo == B_FALSE && act->todel == B_TRUE || 2492 add_undo == B_TRUE && act->new == B_TRUE && 2493 act->cr_mod == B_TRUE) { 2494 2495 /* modify parent actions first */ 2496 2497 for (dep = act->dependencies; dep; dep = dep->next) { 2498 res = remove_item(dep->action, add_undo); 2499 if (res != IPQOS_CONF_SUCCESS) { 2500 return (res); 2501 } 2502 } 2503 2504 /* delete this action */ 2505 2506 IPQOSCDBG1(APPLY, "deleting action %s\n", act->name); 2507 res = ipp_action_destroy(act->name, 0); 2508 if (res != 0) { 2509 IPQOSCDBG1(APPLY, "failed to destroy action %s\n", 2510 act->name); 2511 return (IPQOS_CONF_ERR); 2512 } 2513 2514 /* flag as deleted */ 2515 2516 act->deleted = B_TRUE; 2517 2518 /* if modified action */ 2519 2520 } else if (act->modified == B_TRUE) { 2521 2522 /* loop through removing any filters marked for del */ 2523 2524 for (flt = act->filters; flt; flt = flt->next) { 2525 if ((add_undo == B_FALSE && flt->todel == B_TRUE) || 2526 (add_undo == B_TRUE && flt->new == B_TRUE && 2527 flt->cr_mod == B_TRUE)) { 2528 2529 /* do deletion */ 2530 2531 res = remove_filter(act->name, flt->name, 2532 flt->instance, act->module_version); 2533 if (res != IPQOS_CONF_SUCCESS) { 2534 IPQOSCDBG2(APPLY, "failed to destroy " 2535 "filter %s, inst: %d\n", flt->name, 2536 flt->instance); 2537 2538 return (IPQOS_CONF_ERR); 2539 } 2540 2541 /* flag deleted */ 2542 2543 flt->deleted = B_TRUE; 2544 } 2545 } 2546 2547 /* remove any classes marked for del */ 2548 2549 for (cls = act->classes; cls; cls = cls->next) { 2550 if ((add_undo == B_FALSE && cls->todel == B_TRUE) || 2551 (add_undo == B_TRUE && cls->new == B_TRUE && 2552 cls->cr_mod == B_TRUE)) { 2553 2554 /* do deletion */ 2555 2556 res = remove_class(act->name, cls->name, 2557 act->module_version, 0); 2558 if (res != IPQOS_CONF_SUCCESS) { 2559 IPQOSCDBG1(APPLY, "failed to destroy " 2560 "class %s\n", cls->name); 2561 2562 return (IPQOS_CONF_ERR); 2563 } 2564 2565 /* flag deleted */ 2566 2567 cls->deleted = B_TRUE; 2568 } 2569 } 2570 2571 /* mark action as having been modified */ 2572 2573 act->cr_mod = B_TRUE; 2574 } 2575 2576 return (IPQOS_CONF_SUCCESS); 2577 } 2578 2579 /* 2580 * for each of the actions in parameter actions apply any objects marked as 2581 * modified as a modification to the kernel action represented. 2582 * RETURNS: IPQOS_CONF_ERR on err, else IPQOS_CONF_SUCCESS. 2583 */ 2584 static int 2585 modify_items(ipqos_conf_action_t *actions) 2586 { 2587 2588 ipqos_conf_action_t *act; 2589 int res; 2590 ipqos_conf_filter_t *flt; 2591 ipqos_conf_class_t *cls; 2592 2593 2594 IPQOSCDBG0(L1, "In modify_items\n"); 2595 2596 /* loop through actions in parameter actions */ 2597 2598 for (act = actions; act; act = act->next) { 2599 2600 /* skip unchanged actions */ 2601 2602 if (act->modified == B_FALSE) { 2603 continue; 2604 } 2605 2606 /* apply any parameter mods */ 2607 2608 if (act->params->modified) { 2609 res = modify_params(act->name, 2610 &act->params->nvlist, 2611 act->module_version, act->params->stats_enable); 2612 if (res != IPQOS_CONF_SUCCESS) { 2613 return (IPQOS_CONF_ERR); 2614 } 2615 2616 act->params->cr_mod = B_TRUE; 2617 } 2618 2619 /* apply any class mods */ 2620 2621 for (cls = act->classes; cls; cls = cls->next) { 2622 if (cls->modified) { 2623 res = modify_class(act->name, cls->name, 2624 act->module_version, cls->stats_enable, 2625 cls->alist->name, 0); 2626 if (res != IPQOS_CONF_SUCCESS) { 2627 return (IPQOS_CONF_ERR); 2628 } 2629 2630 /* mark modification done */ 2631 cls->cr_mod = B_TRUE; 2632 } 2633 } 2634 2635 /* apply any filter mods */ 2636 2637 for (flt = act->filters; flt; flt = flt->next) { 2638 if (flt->modified) { 2639 res = modify_filter(act->name, flt, 2640 act->module_version); 2641 if (res != 0) { 2642 return (IPQOS_CONF_ERR); 2643 } 2644 2645 /* mark modification done */ 2646 flt->cr_mod = B_TRUE; 2647 } 2648 } 2649 2650 /* mark action modified */ 2651 2652 act->cr_mod = B_TRUE; 2653 } 2654 2655 return (IPQOS_CONF_SUCCESS); 2656 } 2657 2658 /* 2659 * For each of the objects of each of the actions in nactions that are 2660 * marked as having been modified the object modification is done in 2661 * reverse using the same named object from oactions. 2662 * RETURNS: IPQOS_CONF_ERR on error, IPQOS_CONF_SUCCESS otherwise. 2663 */ 2664 static int 2665 undo_modifys( 2666 ipqos_conf_action_t *oactions, 2667 ipqos_conf_action_t *nactions) 2668 { 2669 2670 ipqos_conf_filter_t *flt; 2671 ipqos_conf_class_t *cls; 2672 ipqos_conf_action_t *act; 2673 ipqos_conf_action_t *oldact; 2674 ipqos_conf_filter_t *oldflt; 2675 ipqos_conf_class_t *oldcls; 2676 int res; 2677 2678 IPQOSCDBG0(L1, "In undo_modifys:\n"); 2679 2680 /* loop throught new actions */ 2681 2682 for (act = nactions; act; act = act->next) { 2683 oldact = actionexist(act->name, oactions); 2684 2685 /* 2686 * if the action was new then it will be removed and 2687 * any permamanent items that were marked for modify 2688 * will dissappear, so ignore action. 2689 */ 2690 if (oldact == NULL) { 2691 continue; 2692 } 2693 2694 /* if parameters were modified switch them back */ 2695 2696 if (act->params->modified == B_TRUE && 2697 act->params->cr_mod == B_TRUE) { 2698 res = modify_params(act->name, 2699 &oldact->params->nvlist, 2700 act->module_version, act->params->stats_enable); 2701 if (res != IPQOS_CONF_SUCCESS) { 2702 return (res); 2703 } 2704 } 2705 2706 /* for each filter in action if filter modified switch back */ 2707 2708 for (flt = act->filters; flt; flt = flt->next) { 2709 if (flt->modified == B_TRUE && 2710 flt->cr_mod == B_TRUE) { 2711 oldflt = filterexist(flt->name, -1, 2712 oldact->filters); 2713 res = modify_filter(act->name, oldflt, 2714 act->module_version); 2715 if (res != IPQOS_CONF_SUCCESS) { 2716 return (res); 2717 } 2718 } 2719 } 2720 2721 /* for each class in action if class modified switch back */ 2722 2723 for (cls = act->classes; cls; cls = cls->next) { 2724 if (cls->modified == B_TRUE && 2725 cls->cr_mod == B_TRUE) { 2726 oldcls = classexist(cls->name, oldact->classes); 2727 if (oldcls->alist) { 2728 res = modify_class(act->name, 2729 cls->name, act->module_version, 2730 oldcls->stats_enable, 2731 oldcls->alist->name, 0); 2732 } 2733 if (res != IPQOS_CONF_SUCCESS) { 2734 return (res); 2735 } 2736 } 2737 } 2738 } 2739 2740 /* 2741 * Go through the old actions modifying perm filters and classes 2742 * whose action was deleted. 2743 * 2744 */ 2745 for (act = oactions; act != NULL; act = act->next) { 2746 2747 if (act->deleted == B_FALSE) { 2748 continue; 2749 } 2750 2751 for (flt = act->filters; flt != NULL; flt = flt->next) { 2752 if (flt->originator == IPP_CONFIG_PERMANENT) { 2753 res = modify_filter(act->name, flt, 2754 act->module_version); 2755 if (res != IPQOS_CONF_SUCCESS) { 2756 return (res); 2757 } 2758 } 2759 } 2760 2761 for (cls = act->classes; cls != NULL; cls = cls->next) { 2762 if (cls->originator == IPP_CONFIG_PERMANENT) { 2763 res = modify_class(act->name, cls->name, 2764 act->module_version, cls->stats_enable, 2765 cls->alist->name, 0); 2766 if (res != IPQOS_CONF_SUCCESS) { 2767 return (res); 2768 } 2769 } 2770 2771 } 2772 } 2773 2774 return (IPQOS_CONF_SUCCESS); 2775 } 2776 2777 2778 /* 2779 * causes all changes marked as being done in actions and old_actions 2780 * to be undone. 2781 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 2782 */ 2783 static int 2784 rollback( 2785 ipqos_conf_action_t *actions, 2786 ipqos_conf_action_t *old_actions) 2787 { 2788 2789 int res; 2790 2791 IPQOSCDBG0(RBK, "In rollback:\n"); 2792 2793 /* re-add items that were deleted */ 2794 2795 res = add_items(old_actions, B_TRUE); 2796 if (res != IPQOS_CONF_SUCCESS) { 2797 return (res); 2798 } 2799 2800 /* change modified items back how they were */ 2801 2802 res = undo_modifys(old_actions, actions); 2803 if (res != IPQOS_CONF_SUCCESS) { 2804 return (res); 2805 } 2806 2807 /* remove new items that were added */ 2808 2809 res = remove_items(actions, B_TRUE); 2810 if (res != IPQOS_CONF_SUCCESS) { 2811 return (res); 2812 } 2813 2814 return (IPQOS_CONF_SUCCESS); 2815 } 2816 2817 /* ******************************* print config **************************** */ 2818 2819 /* 2820 * Prints the username of the user with uid 'uid' to 'fp' if the uid belongs 2821 * to a known user on the system, otherwise just print 'uid'. 2822 */ 2823 static void 2824 printuser( 2825 FILE *fp, 2826 uid_t uid) 2827 { 2828 struct passwd *pwd; 2829 2830 IPQOSCDBG0(L0, "In printuser\n"); 2831 2832 pwd = getpwuid(uid); 2833 if (pwd != NULL) { 2834 (void) fprintf(fp, "%s\n", pwd->pw_name); 2835 } else { 2836 (void) fprintf(fp, "%u\n", (int)uid); 2837 } 2838 } 2839 2840 /* 2841 * print either a single value of start to fp (if start equals end), else 2842 * print start'-'end if start is the smaller of the two values, otherwise 2843 * print end'-'start. 2844 */ 2845 static void 2846 printrange( 2847 FILE *fp, 2848 uint32_t start, 2849 uint32_t end) 2850 { 2851 uint32_t tmp; 2852 2853 if (start > end) { 2854 tmp = start; 2855 start = end; 2856 end = tmp; 2857 } 2858 2859 (void) fprintf(fp, "%u", start); 2860 if (end != start) 2861 (void) fprintf(fp, "-%u", end); 2862 } 2863 2864 /* 2865 * print the contents of the array arr to fp in the form: 2866 * {0-6:1;7-12:2;13:3.....} or {0-6:GREEN;7-12:YELLOW:...} 2867 * dependant upon whether this is an integer or enumerated array resectively 2868 * (if enum_nvs isn't set to NULL this is assumed to be an enumerated array); 2869 * where 0-6 is the range of indexes with value 1 (or GREEN), 7-12 the range 2870 * with value 2 (or YELLOW), and so forth. size is the array size and llimit 2871 * and ulimit are the lower and upper limits of the array values printed 2872 * respectively. For enumerated arrays enum_nvs carries the list of name 2873 * and value pairs and ulimit and llimit parameters are ignored and instead 2874 * determined from the enum_nvs list. 2875 */ 2876 static void 2877 print_int_array( 2878 FILE *fp, 2879 int arr[], 2880 uint32_t size, 2881 int llimit, 2882 int ulimit, 2883 str_val_nd_t *enum_nvs, 2884 int tab_inserts) 2885 { 2886 int x, y; 2887 uint32_t first, last; 2888 boolean_t first_entry; /* first 'ranges:value' to be printed ? */ 2889 boolean_t first_range; /* first range for a value to be printed ? */ 2890 boolean_t found_range; /* did we find a range for this value ? */ 2891 2892 IPQOSCDBG4(L0, "In print_int_array: size: %u, llimit: %u, ulimit: %u, " 2893 "enum_nvs: %x \n", size, llimit, ulimit, enum_nvs); 2894 2895 /* 2896 * if an enumeration retrieve value range. 2897 */ 2898 if (enum_nvs != NULL) 2899 get_str_val_value_range(enum_nvs, &llimit, &ulimit); 2900 2901 /* 2902 * print opening curl. 2903 */ 2904 (void) fprintf(fp, "%c\n", CURL_BEGIN); 2905 PRINT_TABS(fp, tab_inserts + 1); 2906 2907 first_entry = B_TRUE; 2908 /* 2909 * for each value in range. 2910 */ 2911 for (x = llimit; x <= ulimit; x++) { 2912 found_range = B_FALSE; 2913 first_range = B_TRUE; 2914 y = 0; 2915 /* 2916 * scan array and print ranges of indexes with value x. 2917 */ 2918 while (y < size) { 2919 /* 2920 * get first occurence of value for this range. 2921 */ 2922 while ((arr[y] != x) && (y < size)) 2923 y++; 2924 if (y == size) { 2925 break; 2926 } else { 2927 found_range = B_TRUE; 2928 } 2929 first = y; 2930 2931 /* 2932 * get last occurence of value for this range. 2933 */ 2934 while ((arr[y] == x) && (y < size)) 2935 y++; 2936 last = y - 1; 2937 2938 /* 2939 * print entry delimiter (semi-colon)? It must be 2940 * the first range for this value and this mustn't 2941 * be the first 'ranges:value' entry. 2942 */ 2943 if (!first_entry && first_range) { 2944 (void) fprintf(fp, ";\n"); 2945 PRINT_TABS(fp, tab_inserts + 1); 2946 } else { 2947 first_entry = B_FALSE; 2948 } 2949 2950 /* 2951 * print comma (range delimeter) only if there was 2952 * a previous range for this value. 2953 */ 2954 if (!first_range) { 2955 (void) fprintf(fp, ","); 2956 } else { 2957 first_range = B_FALSE; 2958 } 2959 2960 /* 2961 * print range. 2962 */ 2963 printrange(fp, first, last); 2964 } 2965 /* 2966 * only print a colon and value if we found a range with 2967 * this value. 2968 */ 2969 if (found_range) { 2970 (void) fprintf(fp, ":"); 2971 2972 /* 2973 * print numeric/symbolic value. 2974 */ 2975 if (enum_nvs) { 2976 printenum(fp, x, enum_nvs); 2977 } else { 2978 (void) fprintf(fp, "%d", x); 2979 } 2980 } 2981 } 2982 2983 /* 2984 * print closing curl. 2985 */ 2986 (void) fprintf(fp, "\n"); 2987 PRINT_TABS(fp, tab_inserts); 2988 (void) fprintf(fp, "%c\n", CURL_END); 2989 } 2990 2991 /* print the protocol name for proto, or if unknown protocol number proto. */ 2992 static void 2993 printproto( 2994 FILE *fp, 2995 uint8_t proto) 2996 { 2997 2998 struct protoent *pent; 2999 3000 pent = getprotobynumber(proto); 3001 if (pent != NULL) { 3002 (void) fprintf(fp, "%s\n", pent->p_name); 3003 } else { 3004 (void) fprintf(fp, "%u\n", proto); 3005 } 3006 } 3007 3008 /* 3009 * prints the name associated with interface with index ifindex to fp. 3010 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 3011 */ 3012 static int 3013 printifname( 3014 FILE *fp, 3015 int ifindex) 3016 { 3017 3018 int s; 3019 struct lifconf lc; 3020 struct lifnum ln; 3021 struct lifreq *lr; 3022 char *buf; 3023 int len; 3024 char *cp; 3025 int ret; 3026 int x; 3027 int idx; 3028 3029 /* open socket */ 3030 3031 if ((s = socket(AF_INET, SOCK_DGRAM, 0)) == -1) { 3032 ipqos_msg(MT_ENOSTR, gettext("opening AF_INET socket")); 3033 return (IPQOS_CONF_ERR); 3034 } 3035 3036 /* get number of lifreq structs that need to be alloc'd for */ 3037 3038 ln.lifn_family = AF_UNSPEC; 3039 ln.lifn_flags = 0; 3040 ret = ioctl(s, SIOCGLIFNUM, &ln); 3041 if (ret < 0) { 3042 ipqos_msg(MT_ENOSTR, "SIOCLIFNUM ioctl"); 3043 (void) close(s); 3044 return (IPQOS_CONF_ERR); 3045 } 3046 3047 /* allocate buffer for SIOGLIFCONF ioctl */ 3048 3049 len = ln.lifn_count * sizeof (struct lifreq); 3050 buf = malloc(len); 3051 if (buf == NULL) { 3052 ipqos_msg(MT_ENOSTR, "malloc"); 3053 (void) close(s); 3054 return (IPQOS_CONF_ERR); 3055 } 3056 3057 /* setup lifconf params for ioctl */ 3058 3059 lc.lifc_family = AF_UNSPEC; 3060 lc.lifc_flags = 0; 3061 lc.lifc_len = len; 3062 lc.lifc_buf = buf; 3063 3064 /* do SIOCGLIFCONF ioctl */ 3065 3066 ret = ioctl(s, SIOCGLIFCONF, &lc); 3067 if (ret < 0) { 3068 ipqos_msg(MT_ENOSTR, "SIGLIFCONF"); 3069 (void) close(s); 3070 free(buf); 3071 return (IPQOS_CONF_ERR); 3072 } 3073 (void) close(s); 3074 3075 /* 3076 * for each interface name given in the returned lifreq list get 3077 * it's index and compare with ifindex param. Break if equal. 3078 */ 3079 for (x = ln.lifn_count, lr = lc.lifc_req; x > 0; x--, lr++) { 3080 ret = readifindex(lr->lifr_name, &idx); 3081 if (ret != IPQOS_CONF_SUCCESS) { 3082 free(buf); 3083 return (IPQOS_CONF_ERR); 3084 } 3085 if (idx == ifindex) { 3086 break; 3087 } 3088 } 3089 free(buf); 3090 3091 if (x == 0) { 3092 IPQOSCDBG1(L1, "Failed to find if index %u in returned " 3093 "if list.\n", ifindex); 3094 return (IPQOS_CONF_ERR); 3095 } 3096 /* truncate any logical suffix */ 3097 3098 if ((cp = strchr(lr->lifr_name, '@')) != NULL) { 3099 *cp = NULL; 3100 } 3101 3102 /* print interface name */ 3103 (void) fprintf(fp, "%s\n", lr->lifr_name); 3104 3105 return (IPQOS_CONF_SUCCESS); 3106 } 3107 3108 /* 3109 * print to fp the enumeration clause evaluating to the value val using the 3110 * names/values given in enum_nvs. 3111 */ 3112 static void 3113 printenum( 3114 FILE *fp, 3115 uint32_t val, 3116 str_val_nd_t *enum_nvs) 3117 { 3118 3119 boolean_t isfirstval = B_TRUE; 3120 str_val_nd_t *name_val = enum_nvs; 3121 3122 /* for each value in enum_nvs if same bit set in val print name */ 3123 3124 while (name_val) { 3125 if ((name_val->sv.value & val) == name_val->sv.value) { 3126 if (isfirstval == B_TRUE) { 3127 (void) fprintf(fp, "%s", name_val->sv.string); 3128 isfirstval = B_FALSE; 3129 } else { 3130 (void) fprintf(fp, ", %s", name_val->sv.string); 3131 } 3132 } 3133 name_val = name_val->next; 3134 } 3135 } 3136 3137 3138 /* prints the service name of port, or if unknown the number to fp. */ 3139 static void 3140 printport( 3141 FILE *fp, 3142 uint16_t port) 3143 { 3144 3145 struct servent *sent; 3146 3147 sent = getservbyport(port, NULL); 3148 if (sent != NULL) { 3149 (void) fprintf(fp, "%s\n", sent->s_name); 3150 } else { 3151 (void) fprintf(fp, "%u\n", ntohs(port)); 3152 } 3153 } 3154 3155 /* 3156 * prints tp fp the name and value of all user specifiable parameters in the 3157 * nvlist. 3158 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 3159 */ 3160 static int 3161 printnvlist( 3162 FILE *fp, 3163 char *module, 3164 nvlist_t *nvl, 3165 int printall, /* are we want ip addresses printing if node name */ 3166 ipqos_conf_filter_t *flt, /* used to determine if node name set */ 3167 int tab_inserts, 3168 place_t place) 3169 { 3170 FILE *tfp; 3171 nvpair_t *nvp; 3172 char *name; 3173 ipqos_nvtype_t type; 3174 str_val_nd_t *enum_nvs; 3175 int ret; 3176 char dfltst[IPQOS_VALST_MAXLEN+1]; 3177 char *param; 3178 int openerr; 3179 int res; 3180 3181 IPQOSCDBG0(L1, "In printnvlist\n"); 3182 3183 3184 /* open stream to types file */ 3185 3186 tfp = validmod(module, &openerr); 3187 if (tfp == NULL) { 3188 if (openerr) { 3189 ipqos_msg(MT_ENOSTR, "fopen"); 3190 } 3191 return (IPQOS_CONF_ERR); 3192 } 3193 3194 3195 /* go through list getting param name and type and printing it */ 3196 3197 nvp = nvlist_next_nvpair(nvl, NULL); 3198 while (nvp) { 3199 3200 /* get nvpair name */ 3201 name = nvpair_name(nvp); 3202 IPQOSCDBG1(L0, "processing element %s.\n", name); 3203 3204 /* skip ipgpc params that are not explicitly user settable */ 3205 3206 if (strcmp(name, IPGPC_FILTER_TYPE) == 0 || 3207 strcmp(name, IPGPC_SADDR_MASK) == 0 || 3208 strcmp(name, IPGPC_DADDR_MASK) == 0 || 3209 strcmp(name, IPGPC_SPORT_MASK) == 0 || 3210 strcmp(name, IPGPC_DPORT_MASK) == 0) { 3211 nvp = nvlist_next_nvpair(nvl, nvp); 3212 continue; 3213 } 3214 3215 param = SHORT_NAME(name); 3216 3217 /* 3218 * get parameter type from types file. 3219 */ 3220 place = PL_ANY; 3221 ret = readtype(tfp, module, param, &type, &enum_nvs, dfltst, 3222 B_TRUE, &place); 3223 if (ret != IPQOS_CONF_SUCCESS) { 3224 return (ret); 3225 } 3226 3227 /* 3228 * for map entries we don't print the map value, only 3229 * the index value it was derived from. 3230 */ 3231 if (place == PL_MAP) { 3232 nvp = nvlist_next_nvpair(nvl, nvp); 3233 continue; 3234 } 3235 3236 /* 3237 * the ifindex is converted to the name and printed out 3238 * so print the parameter name as ifname. 3239 */ 3240 if (strcmp(name, IPGPC_IF_INDEX) == 0) { 3241 PRINT_TABS(fp, tab_inserts); 3242 (void) fprintf(fp, "%s ", IPQOS_IFNAME_STR); 3243 /* 3244 * we may not print the address due to us instead printing 3245 * the node name in printfilter, therefore we leave the 3246 * printing of the parameter in the addresses switch case code. 3247 */ 3248 } else if ((strcmp(name, IPGPC_SADDR) != 0 && 3249 strcmp(name, IPGPC_DADDR) != 0)) { 3250 PRINT_TABS(fp, tab_inserts); 3251 (void) fprintf(fp, "%s ", param); 3252 } 3253 3254 switch (type) { 3255 case IPQOS_DATA_TYPE_IFINDEX: { 3256 uint32_t ifidx; 3257 3258 (void) nvpair_value_uint32(nvp, &ifidx); 3259 (void) printifname(fp, ifidx); 3260 break; 3261 } 3262 case IPQOS_DATA_TYPE_BOOLEAN: { 3263 boolean_t bl; 3264 3265 (void) nvpair_value_uint32(nvp, 3266 (uint32_t *)&bl); 3267 (void) fprintf(fp, "%s\n", 3268 bl == B_TRUE ? "true" : "false"); 3269 break; 3270 } 3271 case IPQOS_DATA_TYPE_ACTION: { 3272 char *strval; 3273 3274 (void) nvpair_value_string(nvp, &strval); 3275 print_action_nm(fp, strval); 3276 break; 3277 } 3278 case IPQOS_DATA_TYPE_STRING: { 3279 char *strval; 3280 3281 (void) nvpair_value_string(nvp, &strval); 3282 (void) fprintf(fp, "%s\n", 3283 quote_ws_string(strval)); 3284 break; 3285 } 3286 case IPQOS_DATA_TYPE_ADDRESS: { 3287 uint_t tmp; 3288 in6_addr_t *addr; 3289 char addrstr[INET6_ADDRSTRLEN]; 3290 uchar_t ftype; 3291 int af; 3292 in6_addr_t *mask; 3293 3294 /* 3295 * skip addresses that have node names for 3296 * non printall listings. 3297 */ 3298 if (printall == 0 && 3299 (strcmp(nvpair_name(nvp), IPGPC_SADDR) == 3300 0 && flt->src_nd_name || 3301 strcmp(nvpair_name(nvp), IPGPC_DADDR) == 3302 0 && flt->dst_nd_name)) { 3303 break; 3304 } 3305 3306 /* we skipped this above */ 3307 3308 PRINT_TABS(fp, tab_inserts); 3309 (void) fprintf(fp, "%s ", param); 3310 3311 (void) nvpair_value_uint32_array(nvp, 3312 (uint32_t **)&addr, &tmp); 3313 3314 /* get filter type */ 3315 3316 (void) nvlist_lookup_byte(nvl, 3317 IPGPC_FILTER_TYPE, &ftype); 3318 if (ftype == IPGPC_V4_FLTR) { 3319 af = AF_INET; 3320 addr = (in6_addr_t *) 3321 &V4_PART_OF_V6((*addr)); 3322 } else { 3323 af = AF_INET6; 3324 } 3325 /* get mask */ 3326 3327 if (strcmp(nvpair_name(nvp), IPGPC_SADDR) == 3328 0) { 3329 ret = nvlist_lookup_uint32_array(nvl, 3330 IPGPC_SADDR_MASK, 3331 (uint32_t **)&mask, &tmp); 3332 } else { 3333 ret = nvlist_lookup_uint32_array(nvl, 3334 IPGPC_DADDR_MASK, 3335 (uint32_t **)&mask, &tmp); 3336 } 3337 3338 /* print address/mask to fp */ 3339 3340 (void) fprintf(fp, "%s/%u\n", 3341 inet_ntop(af, addr, addrstr, 3342 INET6_ADDRSTRLEN), masktocidr(af, mask)); 3343 break; 3344 } 3345 case IPQOS_DATA_TYPE_ENUM: { 3346 uint32_t val; 3347 3348 (void) nvpair_value_uint32(nvp, &val); 3349 3350 /* 3351 * print list of tokens resulting in val 3352 */ 3353 (void) fprintf(fp, "{ "); 3354 printenum(fp, val, enum_nvs); 3355 (void) fprintf(fp, " }\n"); 3356 break; 3357 } 3358 case IPQOS_DATA_TYPE_PORT: { 3359 uint16_t port; 3360 3361 (void) nvpair_value_uint16(nvp, &port); 3362 printport(fp, port); 3363 break; 3364 } 3365 case IPQOS_DATA_TYPE_PROTO: { 3366 uint8_t proto; 3367 3368 (void) nvpair_value_byte(nvp, &proto); 3369 printproto(fp, proto); 3370 break; 3371 } 3372 case IPQOS_DATA_TYPE_M_INDEX: 3373 case IPQOS_DATA_TYPE_UINT8: { 3374 uchar_t u8; 3375 3376 (void) nvpair_value_byte(nvp, &u8); 3377 (void) fprintf(fp, "%u\n", u8); 3378 break; 3379 } 3380 case IPQOS_DATA_TYPE_UINT16: { 3381 uint16_t u16; 3382 3383 (void) nvpair_value_uint16(nvp, &u16); 3384 (void) fprintf(fp, "%u\n", u16); 3385 break; 3386 } 3387 case IPQOS_DATA_TYPE_INT16: { 3388 int16_t i16; 3389 3390 (void) nvpair_value_int16(nvp, &i16); 3391 (void) fprintf(fp, "%d\n", i16); 3392 break; 3393 } 3394 case IPQOS_DATA_TYPE_UINT32: { 3395 uint32_t u32; 3396 3397 (void) nvpair_value_uint32(nvp, &u32); 3398 (void) fprintf(fp, "%u\n", u32); 3399 break; 3400 } 3401 case IPQOS_DATA_TYPE_INT32: { 3402 int i32; 3403 3404 (void) nvpair_value_int32(nvp, &i32); 3405 (void) fprintf(fp, "%d\n", i32); 3406 break; 3407 } 3408 case IPQOS_DATA_TYPE_INT_ARRAY: { 3409 str_val_nd_t *arr_enum_nvs = NULL; 3410 uint32_t size; 3411 int llimit, ulimit; 3412 int *arr; 3413 3414 (void) nvpair_value_int32_array(nvp, &arr, 3415 &size); 3416 3417 /* 3418 * read array info from types file. 3419 */ 3420 res = read_int_array_info(dfltst, 3421 &arr_enum_nvs, &size, &llimit, &ulimit, 3422 module); 3423 3424 /* 3425 * print array with numbers, or symbols 3426 * if enumerated. 3427 */ 3428 if (res == IPQOS_CONF_SUCCESS) { 3429 print_int_array(fp, arr, size, 3430 llimit, ulimit, arr_enum_nvs, 3431 tab_inserts); 3432 if (arr_enum_nvs != NULL) { 3433 free_str_val_entrys( 3434 arr_enum_nvs); 3435 } 3436 } 3437 break; 3438 } 3439 case IPQOS_DATA_TYPE_USER: { 3440 uid_t uid; 3441 3442 (void) nvpair_value_int32(nvp, (int *)&uid); 3443 printuser(fp, uid); 3444 break; 3445 } 3446 #ifdef _IPQOS_CONF_DEBUG 3447 default: { 3448 /* 3449 * we should have catered for all used data 3450 * types that readtype returns. 3451 */ 3452 assert(1); 3453 } 3454 #endif 3455 } 3456 3457 nvp = nvlist_next_nvpair(nvl, nvp); 3458 } 3459 3460 (void) fclose(tfp); 3461 return (IPQOS_CONF_SUCCESS); 3462 } 3463 3464 /* 3465 * print a parameter clause for the parmeters given in params to fp. 3466 * If printall is set, then the originator of the parameter object is printed. 3467 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 3468 */ 3469 static int 3470 printparams( 3471 FILE *fp, 3472 char *module, 3473 ipqos_conf_params_t *params, 3474 int printall, 3475 int tab_inserts) 3476 { 3477 3478 int res; 3479 3480 /* print opening clause */ 3481 3482 PRINT_TABS(fp, tab_inserts); 3483 (void) fprintf(fp, IPQOS_CONF_PARAMS_STR " {\n"); 3484 3485 /* print originator name if printall flag set */ 3486 3487 if (printall) { 3488 PRINT_TABS(fp, tab_inserts + 1); 3489 (void) fprintf(stdout, "Originator %s\n", 3490 quote_ws_string(get_originator_nm(params->originator))); 3491 } 3492 3493 /* print global stats */ 3494 3495 PRINT_TABS(fp, tab_inserts + 1); 3496 (void) fprintf(fp, IPQOS_CONF_GLOBAL_STATS_STR " %s\n", 3497 params->stats_enable == B_TRUE ? "true" : "false"); 3498 3499 /* print module specific parameters */ 3500 res = printnvlist(fp, module, params->nvlist, printall, NULL, 3501 tab_inserts + 1, PL_PARAMS); 3502 if (res != IPQOS_CONF_SUCCESS) { 3503 return (res); 3504 } 3505 3506 PRINT_TABS(fp, tab_inserts); 3507 (void) fprintf(fp, "}\n"); 3508 3509 return (IPQOS_CONF_SUCCESS); 3510 } 3511 3512 /* 3513 * print the interpreted name of the action_nm parameter if it is a special 3514 * action, else action_nm verbatim to fp parameter. 3515 */ 3516 static void 3517 print_action_nm(FILE *fp, char *action_nm) 3518 { 3519 3520 if (strcmp(action_nm, IPP_ANAME_CONT) == 0) { 3521 (void) fprintf(fp, IPQOS_CONF_CONT_STR "\n"); 3522 } else if (strcmp(action_nm, IPP_ANAME_DEFER) == 0) { 3523 (void) fprintf(fp, IPQOS_CONF_DEFER_STR "\n"); 3524 } else if (strcmp(action_nm, IPP_ANAME_DROP) == 0) { 3525 (void) fprintf(fp, IPQOS_CONF_DROP_STR "\n"); 3526 } else { 3527 (void) fprintf(fp, "%s\n", quote_ws_string(action_nm)); 3528 } 3529 } 3530 3531 /* 3532 * print a class clause for class to fp. If printall is set the originator 3533 * is printed. 3534 */ 3535 static void 3536 printclass( 3537 FILE *fp, 3538 ipqos_conf_class_t *class, 3539 int printall, 3540 int tab_inserts) 3541 { 3542 3543 /* print opening clause */ 3544 3545 PRINT_TABS(fp, tab_inserts); 3546 (void) fprintf(fp, IPQOS_CONF_CLASS_STR " {\n"); 3547 3548 3549 /* if printall flag print originator name */ 3550 3551 if (printall) { 3552 PRINT_TABS(fp, tab_inserts + 1); 3553 (void) fprintf(stdout, "Originator %s\n", 3554 get_originator_nm(class->originator)); 3555 } 3556 3557 /* print name, next action and stats enable */ 3558 3559 PRINT_TABS(fp, tab_inserts + 1); 3560 (void) fprintf(fp, IPQOS_CONF_NAME_STR " %s\n", 3561 quote_ws_string(class->name)); 3562 PRINT_TABS(fp, tab_inserts + 1); 3563 (void) fprintf(fp, IPQOS_CONF_NEXT_ACTION_STR " "); 3564 print_action_nm(fp, class->alist->name); 3565 PRINT_TABS(fp, tab_inserts + 1); 3566 (void) fprintf(fp, IPQOS_CONF_STATS_ENABLE_STR " %s\n", 3567 class->stats_enable == B_TRUE ? "true" : "false"); 3568 3569 PRINT_TABS(fp, tab_inserts); 3570 (void) fprintf(fp, "}\n"); 3571 } 3572 3573 /* 3574 * Returns a ptr to the originator name associated with origid. If unknown 3575 * id returns ptr to "unknown". 3576 * RETURNS: ptr to originator name, or if id not known "unknown". 3577 */ 3578 static char * 3579 get_originator_nm(uint32_t origid) 3580 { 3581 3582 int x; 3583 3584 /* scan originators table for origid */ 3585 3586 for (x = 0; originators[x].value != -1 && 3587 originators[x].value != origid; x++) {} 3588 3589 /* if we've reached end of array due to unknown type return "unknown" */ 3590 3591 if (originators[x].value == -1) { 3592 return ("unknown"); 3593 } 3594 3595 return (originators[x].string); 3596 } 3597 3598 /* 3599 * print a filter clause for filter pointed to by filter out to fp. If printall 3600 * is set then the originator is printed, for filters with node names instance 3601 * numbers are printed, and the filter pointer isn't advanced to point at the 3602 * last instance of the printed filter. 3603 * RETURNS: IPQOS_CONF_ERR on errors, else IPQOS_CONF_SUCCESS. 3604 */ 3605 static int 3606 printfilter( 3607 FILE *fp, 3608 char *module, 3609 ipqos_conf_filter_t **filter, 3610 int printall, 3611 int tab_inserts) 3612 { 3613 3614 int res; 3615 3616 /* print opening clause */ 3617 3618 PRINT_TABS(fp, tab_inserts); 3619 (void) fprintf(fp, IPQOS_CONF_FILTER_STR " {\n"); 3620 3621 /* print originator if printall flag set */ 3622 3623 if (printall) { 3624 PRINT_TABS(fp, tab_inserts + 1); 3625 (void) fprintf(stdout, "Originator %s\n", 3626 quote_ws_string(get_originator_nm((*filter)->originator))); 3627 } 3628 3629 /* print name and class */ 3630 3631 PRINT_TABS(fp, tab_inserts + 1); 3632 (void) fprintf(fp, IPQOS_CONF_NAME_STR " %s\n", 3633 quote_ws_string((*filter)->name)); 3634 PRINT_TABS(fp, tab_inserts + 1); 3635 (void) fprintf(fp, IPQOS_CONF_CLASS_STR " %s\n", 3636 quote_ws_string((*filter)->class_name)); 3637 3638 /* print the instance if printall and potential mhomed addresses */ 3639 3640 if (printall && ((*filter)->src_nd_name || (*filter)->dst_nd_name)) { 3641 PRINT_TABS(fp, tab_inserts + 1); 3642 (void) fprintf(fp, "Instance %u\n", (*filter)->instance); 3643 } 3644 3645 /* print node names if any */ 3646 3647 if ((*filter)->src_nd_name) { 3648 PRINT_TABS(fp, tab_inserts + 1); 3649 (void) fprintf(fp, "%s %s\n", strchr(IPGPC_SADDR, '.') + 1, 3650 (*filter)->src_nd_name); 3651 } 3652 if ((*filter)->dst_nd_name) { 3653 PRINT_TABS(fp, tab_inserts + 1); 3654 (void) fprintf(fp, "%s %s\n", strchr(IPGPC_DADDR, '.') + 1, 3655 (*filter)->dst_nd_name); 3656 } 3657 3658 /* print ip_version enumeration if set */ 3659 3660 if ((*filter)->ip_versions != 0) { 3661 PRINT_TABS(fp, tab_inserts + 1); 3662 (void) fprintf(fp, IPQOS_CONF_IP_VERSION_STR " {"); 3663 if (VERSION_IS_V4(*filter)) { 3664 (void) fprintf(fp, " V4"); 3665 } 3666 if (VERSION_IS_V6(*filter)) { 3667 (void) fprintf(fp, " V6"); 3668 } 3669 (void) fprintf(fp, " }\n"); 3670 } 3671 3672 /* print other module specific parameters parameters */ 3673 3674 res = printnvlist(fp, module, (*filter)->nvlist, printall, *filter, 3675 tab_inserts + 1, PL_FILTER); 3676 if (res != IPQOS_CONF_SUCCESS) { 3677 return (res); 3678 } 3679 3680 PRINT_TABS(fp, tab_inserts); 3681 (void) fprintf(fp, "}\n"); 3682 3683 /* 3684 * if not printall advance filter parameter to last instance of this 3685 * filter. 3686 */ 3687 3688 if (!printall) { 3689 for (;;) { 3690 if ((*filter)->next == NULL || 3691 strcmp((*filter)->name, (*filter)->next->name) != 3692 0) { 3693 break; 3694 } 3695 *filter = (*filter)->next; 3696 } 3697 } 3698 3699 return (IPQOS_CONF_SUCCESS); 3700 } 3701 3702 /* 3703 * Returns a pointer to str if no whitespace is present, else it returns 3704 * a pointer to a string with the contents of str enclose in double quotes. 3705 * This returned strings contents may change in subsequent calls so a copy 3706 * should be made of it if the caller wishes to retain it. 3707 */ 3708 static char * 3709 quote_ws_string(const char *str) 3710 { 3711 static char *buf = NULL; 3712 const char *cp; /* we don't modify the contents of str so const */ 3713 3714 IPQOSCDBG0(L0, "In quote_ws_string\n"); 3715 3716 /* 3717 * Just return str if no whitespace. 3718 */ 3719 for (cp = str; (*cp != '\0') && !isspace(*cp); cp++) 3720 ; 3721 if (*cp == '\0') 3722 return ((char *)str); 3723 3724 if (buf == NULL) { 3725 /* 3726 * if first run just allocate buffer of 3727 * strlen(str) + 2 quote characters + NULL terminator. 3728 */ 3729 buf = malloc(strlen(str) + 3); 3730 } else if ((strlen(str) + 2) > strlen(buf)) { 3731 /* 3732 * Not first run, so check if we have a big enough buffer 3733 * and if not reallocate the buffer to a sufficient size. 3734 */ 3735 buf = realloc(buf, strlen(str) + 3); 3736 } 3737 if (buf == NULL) 3738 return (""); 3739 3740 /* 3741 * copy string into buffer with quotes. 3742 */ 3743 (void) strcpy(buf, "\""); 3744 (void) strcat(buf, str); 3745 (void) strcat(buf, "\""); 3746 3747 return (buf); 3748 } 3749 3750 /* 3751 * print an action clause for action to fp. If the printall flag is set 3752 * then all filters and classes (regardless of their originator) and 3753 * their originators are displayed. 3754 * RETURNS: IPQOS_CONF_ERR on errors, else IPQOS_CONF_SUCCESS. 3755 */ 3756 static int 3757 printaction( 3758 FILE *fp, 3759 ipqos_conf_action_t *action, 3760 int printall, 3761 int tab_inserts) 3762 { 3763 3764 ipqos_conf_filter_t *flt; 3765 ipqos_conf_class_t *cls; 3766 int res; 3767 3768 /* print opening clause, module and name */ 3769 3770 PRINT_TABS(fp, tab_inserts); 3771 (void) fprintf(fp, IPQOS_CONF_ACTION_STR " {\n"); 3772 PRINT_TABS(fp, tab_inserts + 1); 3773 (void) fprintf(fp, IPQOS_CONF_MODULE_STR " %s\n", 3774 quote_ws_string(action->module)); 3775 PRINT_TABS(fp, tab_inserts + 1); 3776 (void) fprintf(fp, "name %s\n", quote_ws_string(action->name)); 3777 3778 /* print params clause */ 3779 3780 (void) fprintf(fp, "\n"); 3781 res = printparams(fp, action->module, action->params, printall, 3782 tab_inserts + 1); 3783 if (res != IPQOS_CONF_SUCCESS) { 3784 return (res); 3785 } 3786 3787 /* 3788 * print classes clause for each class if printall is set, else 3789 * just ipqosconf created or permanent classes. 3790 */ 3791 for (cls = action->classes; cls != NULL; cls = cls->next) { 3792 if (printall || 3793 cls->originator == IPP_CONFIG_IPQOSCONF || 3794 cls->originator == IPP_CONFIG_PERMANENT) { 3795 (void) fprintf(fp, "\n"); 3796 printclass(fp, cls, printall, tab_inserts + 1); 3797 } 3798 } 3799 3800 /* 3801 * print filter clause for each filter if printall is set, else 3802 * just ipqosconf created or permanent filters. 3803 */ 3804 for (flt = action->filters; flt != NULL; flt = flt->next) { 3805 if (printall || 3806 flt->originator == IPP_CONFIG_IPQOSCONF || 3807 flt->originator == IPP_CONFIG_PERMANENT) { 3808 (void) fprintf(fp, "\n"); 3809 res = printfilter(fp, action->module, &flt, printall, 3810 tab_inserts + 1); 3811 if (res != IPQOS_CONF_SUCCESS) { 3812 return (res); 3813 } 3814 } 3815 } 3816 3817 PRINT_TABS(fp, tab_inserts); 3818 (void) fprintf(fp, "}\n"); 3819 3820 return (IPQOS_CONF_SUCCESS); 3821 } 3822 3823 3824 3825 /* *************************************************************** */ 3826 3827 3828 static void 3829 list_end( 3830 ipqos_list_el_t **listp, 3831 ipqos_list_el_t ***lendpp) 3832 { 3833 *lendpp = listp; 3834 while (**lendpp != NULL) { 3835 *lendpp = &(**lendpp)->next; 3836 } 3837 } 3838 3839 static void 3840 add_to_list( 3841 ipqos_list_el_t **listp, 3842 ipqos_list_el_t *el) 3843 { 3844 el->next = *listp; 3845 *listp = el; 3846 } 3847 3848 /* 3849 * given mask calculates the number of bits it spans. The mask must be 3850 * continuous. 3851 * RETURNS: number of bits spanned. 3852 */ 3853 static int 3854 masktocidr( 3855 int af, 3856 in6_addr_t *mask) 3857 { 3858 int zeros = 0; 3859 int byte; 3860 int cidr; 3861 3862 /* 3863 * loop through from lowest byte to highest byte counting the 3864 * number of zero bits till hitting a one bit. 3865 */ 3866 for (byte = 15; byte >= 0; byte--) { 3867 /* 3868 * zero byte, so add 8 to zeros. 3869 */ 3870 if (mask->s6_addr[byte] == 0) { 3871 zeros += 8; 3872 /* 3873 * non-zero byte, add zero count to zeros. 3874 */ 3875 } else { 3876 zeros += (ffs((int)mask->s6_addr[byte]) - 1); 3877 break; 3878 } 3879 } 3880 /* 3881 * translate zero bits to 32 or 128 bit mask based on af. 3882 */ 3883 if (af == AF_INET) { 3884 cidr = 32 - zeros; 3885 } else { 3886 cidr = 128 - zeros; 3887 } 3888 3889 return (cidr); 3890 } 3891 3892 /* 3893 * Sets the first prefix_len bits in the v4 or v6 address (based upon af) 3894 * contained in the v6 address referenced by addr to 1. 3895 */ 3896 static void 3897 setmask(int prefix_len, in6_addr_t *addr, int af) 3898 { 3899 3900 int i; 3901 int shift; 3902 int maskstartbit = 128 - prefix_len; 3903 int end_u32; 3904 3905 IPQOSCDBG2(L1, "In setmask, prefix_len: %u, af: %s\n", prefix_len, 3906 af == AF_INET ? "AF_INET" : "AF_INET6"); 3907 3908 /* zero addr */ 3909 bzero(addr, sizeof (in6_addr_t)); 3910 3911 3912 /* set which 32bits in *addr are relevant to this af */ 3913 3914 if (af == AF_INET) { 3915 end_u32 = 3; 3916 maskstartbit = 32 - prefix_len; 3917 /* AF_INET6 */ 3918 } else { 3919 end_u32 = 0; 3920 } 3921 /* 3922 * go through each of the 32bit quantities in 128 bit in6_addr_t 3923 * and set appropriate bits according to prefix_len. 3924 */ 3925 for (i = 3; i >= end_u32; i--) { 3926 3927 /* does the prefix apply to this 32bits? */ 3928 3929 if (maskstartbit < ((4 - i) * 32)) { 3930 3931 /* is this 32bits fully masked? */ 3932 3933 if (maskstartbit <= ((3 - i) * 32)) { 3934 shift = 0; 3935 } else { 3936 shift = maskstartbit % 32; 3937 } 3938 addr->_S6_un._S6_u32[i] = (uint32_t)~0; 3939 addr->_S6_un._S6_u32[i] = 3940 addr->_S6_un._S6_u32[i] >> shift; 3941 addr->_S6_un._S6_u32[i] = 3942 addr->_S6_un._S6_u32[i] << shift; 3943 } 3944 3945 /* translate to NBO */ 3946 addr->_S6_un._S6_u32[i] = htonl(addr->_S6_un._S6_u32[i]); 3947 } 3948 } 3949 3950 /* 3951 * search nvlist for an element with the name specified and return a ptr 3952 * to it if found. 3953 * RETURNS: pointer to nvpair named name if found, else NULL. 3954 */ 3955 static nvpair_t * 3956 find_nvpair(nvlist_t *nvl, char *name) 3957 { 3958 3959 nvpair_t *nvp; 3960 nvpair_t *match = NULL; 3961 char *nvp_name; 3962 3963 IPQOSCDBG0(L1, "In find_nvpair\n"); 3964 3965 nvp = nvlist_next_nvpair(nvl, NULL); 3966 while (nvp) { 3967 nvp_name = nvpair_name(nvp); 3968 if (strcmp(name, nvp_name) == 0) { 3969 match = nvp; 3970 } 3971 nvp = nvlist_next_nvpair(nvl, nvp); 3972 } 3973 3974 return (match); 3975 } 3976 3977 /* 3978 * returns a string containing module_name '.' name. 3979 * RETURNS: IPQOS_CONF_ERR if error, else IPQOS_CONF_SUCCESS. 3980 */ 3981 static char * 3982 prepend_module_name( 3983 char *name, 3984 char *module) 3985 { 3986 3987 char *ret; 3988 3989 IPQOSCDBG0(L2, "In prepend_module_name\n"); 3990 3991 ret = malloc(strlen(module) + strlen(".") + strlen(name) + 1); 3992 if (ret == NULL) { 3993 ipqos_msg(MT_ENOSTR, "malloc"); 3994 return (NULL); 3995 } 3996 3997 (void) strcpy(ret, module); 3998 (void) strcat(ret, "."); 3999 (void) strcat(ret, name); 4000 4001 return (ret); 4002 } 4003 4004 #if 0 4005 4006 /* 4007 * check if element with matching s1 and s2 string is in table table. 4008 * RETURNS: 1 if found else 0. 4009 */ 4010 static int 4011 in_str_str_table( 4012 str_str_t *table, 4013 char *s1, 4014 char *s2) 4015 { 4016 4017 str_str_t *ss = table; 4018 4019 /* loop through table till matched or end */ 4020 4021 while (ss->s1[0] != '\0' && 4022 (strcmp(ss->s1, s1) != 0 || strcmp(ss->s2, s2) != 0)) { 4023 ss++; 4024 } 4025 4026 if (ss->s1[0] != '\0') { 4027 return (1); 4028 } 4029 4030 return (0); 4031 } 4032 #endif /* 0 */ 4033 4034 /* 4035 * check whether name is a valid action/class/filter name. 4036 * RETURNS: IPQOS_CONF_ERR if invalid name else IPQOS_CONF_SUCCESS. 4037 */ 4038 static int 4039 valid_name(char *name) 4040 { 4041 4042 IPQOSCDBG1(L1, "In valid_name: name: %s\n", name); 4043 4044 /* first char can't be '!' */ 4045 if (name[0] == '!') { 4046 ipqos_msg(MT_ERROR, gettext("Name not allowed to start with " 4047 "'!', line %u.\n"), lineno); 4048 return (IPQOS_CONF_ERR); 4049 } 4050 4051 /* can't exceed IPQOS_CONF_NAME_LEN size */ 4052 if (strlen(name) >= IPQOS_CONF_NAME_LEN) { 4053 ipqos_msg(MT_ERROR, gettext("Name exceeds maximum name length " 4054 "line %u.\n"), lineno); 4055 return (IPQOS_CONF_ERR); 4056 } 4057 4058 return (IPQOS_CONF_SUCCESS); 4059 } 4060 4061 /* ********************* string value manip fns ************************** */ 4062 4063 4064 /* 4065 * searches through the str_val_nd_t list of string value pairs finding 4066 * the minimum and maximum values for value and places them in the 4067 * integers pointed at by min and max. 4068 */ 4069 static void 4070 get_str_val_value_range( 4071 str_val_nd_t *svnp, 4072 int *min, 4073 int *max) 4074 { 4075 if (svnp != NULL) { 4076 *min = *max = svnp->sv.value; 4077 svnp = svnp->next; 4078 } 4079 while (svnp != NULL) { 4080 if (svnp->sv.value > *max) 4081 *max = svnp->sv.value; 4082 if (svnp->sv.value < *min) 4083 *min = svnp->sv.value; 4084 svnp = svnp->next; 4085 } 4086 } 4087 4088 /* 4089 * add an entry with string string and value val to sv_entrys. 4090 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 4091 */ 4092 static int 4093 add_str_val_entry( 4094 str_val_nd_t **sv_entrys, 4095 char *string, 4096 uint32_t val) 4097 { 4098 4099 str_val_nd_t *sv_entry; 4100 4101 IPQOSCDBG2(L1, "In add_str_val_entry: string: %s, val: %u\n", string, 4102 val); 4103 4104 /* alloc new node */ 4105 4106 sv_entry = malloc(sizeof (str_val_nd_t)); 4107 if (sv_entry == NULL) { 4108 return (IPQOS_CONF_ERR); 4109 } 4110 4111 /* populate node */ 4112 4113 sv_entry->sv.string = malloc(strlen(string) + 1); 4114 if (sv_entry->sv.string == NULL) { 4115 free(sv_entry); 4116 ipqos_msg(MT_ENOSTR, "malloc"); 4117 return (IPQOS_CONF_ERR); 4118 } else { 4119 (void) strcpy(sv_entry->sv.string, string); 4120 } 4121 sv_entry->sv.value = val; 4122 4123 /* place at start of sv_entrys list */ 4124 4125 sv_entry->next = *sv_entrys; 4126 *sv_entrys = sv_entry; 4127 4128 return (IPQOS_CONF_SUCCESS); 4129 } 4130 4131 4132 /* frees all the elements of sv_entrys. */ 4133 static void 4134 free_str_val_entrys( 4135 str_val_nd_t *sv_entrys) 4136 { 4137 4138 str_val_nd_t *sve = sv_entrys; 4139 str_val_nd_t *tmp; 4140 4141 IPQOSCDBG0(L1, "In free_str_val_entrys\n"); 4142 4143 while (sve) { 4144 free(sve->sv.string); 4145 tmp = sve->next; 4146 free(sve); 4147 sve = tmp; 4148 } 4149 } 4150 4151 /* 4152 * finds the value associated with string and assigns it to value ref'd by 4153 * val. 4154 * RETURNS: IPQOS_CONF_ERR if string not found, else IPQOS_CONF_SUCCESS. 4155 */ 4156 static int 4157 str_val_list_lookup( 4158 str_val_nd_t *svs, 4159 char *string, 4160 uint32_t *val) 4161 { 4162 4163 str_val_nd_t *sv = svs; 4164 4165 IPQOSCDBG1(L1, "In str_val_list_lookup: %s\n", string); 4166 4167 /* loop through list and exit when found or list end */ 4168 4169 while (sv != NULL) { 4170 if (strcmp(sv->sv.string, string) == 0) { 4171 break; 4172 } 4173 sv = sv->next; 4174 } 4175 4176 /* ret error if not found */ 4177 4178 if (sv == NULL) { 4179 return (IPQOS_CONF_ERR); 4180 } 4181 4182 *val = sv->sv.value; 4183 4184 IPQOSCDBG1(L1, "svll: Value returned is %u\n", *val); 4185 return (IPQOS_CONF_SUCCESS); 4186 } 4187 4188 4189 /* ************************ conf file read fns ***************************** */ 4190 4191 /* 4192 * Reads a uid or username from string 'str' and assigns either the uid 4193 * or associated uid respectively to storage pointed at by 'uid'. The 4194 * function determines whether to read a uid by checking whether the first 4195 * character of 'str' is numeric, in which case it reads a uid; otherwise it 4196 * assumes a username. 4197 * RETURNS: IPQOS_CONF_ERR if a NULL string pointer is passed, the read uid 4198 * doesn't have an entry on the system, or the read username doesn't have an 4199 * entry on the system. 4200 */ 4201 static int 4202 readuser( 4203 char *str, 4204 uid_t *uid) 4205 { 4206 struct passwd *pwd; 4207 char *lo; 4208 4209 IPQOSCDBG1(L0, "In readuser, str: %s\n", str); 4210 4211 if (str == NULL) 4212 return (IPQOS_CONF_ERR); 4213 /* 4214 * Check if this appears to be a uid, and if so check that a 4215 * corresponding user exists. 4216 */ 4217 if (isdigit((int)str[0])) { 4218 /* 4219 * Read a 32bit integer and check in doing so that 4220 * we have consumed the whole string. 4221 */ 4222 if (readint32(str, (int *)uid, &lo) != IPQOS_CONF_SUCCESS || 4223 *lo != '\0') 4224 return (IPQOS_CONF_ERR); 4225 if (getpwuid(*uid) == NULL) 4226 return (IPQOS_CONF_ERR); 4227 4228 } else { /* This must be a username, so lookup the uid. */ 4229 pwd = getpwnam(str); 4230 if (pwd == NULL) { 4231 return (IPQOS_CONF_ERR); 4232 } else { 4233 *uid = pwd->pw_uid; 4234 } 4235 } 4236 return (IPQOS_CONF_SUCCESS); 4237 } 4238 4239 /* 4240 * Reads a range from range_st, either of form 'a-b' or simply 'a'. 4241 * In the former case lower and upper have their values set to a 4242 * and b respectively; in the later lower and upper have both 4243 * their values set to a. 4244 * RETURNS: IPQOS_CONF_ERR if there's a parse error, else IPQOS_CONF_SUCCESS. 4245 */ 4246 static int 4247 readrange( 4248 char *range_st, 4249 int *lower, 4250 int *upper) 4251 { 4252 char *cp; 4253 char *end, *end2; 4254 4255 IPQOSCDBG1(L0, "In readrange: string: %s\n", range_st); 4256 4257 /* 4258 * get range boundarys. 4259 */ 4260 cp = strchr(range_st, '-'); 4261 4262 if (cp != NULL) { /* we have a range */ 4263 *cp++ = '\0'; 4264 *lower = (int)strtol(range_st, &end, 10); 4265 *upper = (int)strtol(cp, &end2, 10); 4266 SKIPWS(end); 4267 SKIPWS(end2); 4268 if ((range_st == end) || (*end != NULL) || 4269 (cp == end) || (*end2 != NULL)) { 4270 IPQOSCDBG0(L0, "Failed reading a-b\n"); 4271 return (IPQOS_CONF_ERR); 4272 } 4273 4274 } else { /* single value */ 4275 4276 *lower = *upper = (int)strtol(range_st, &end, 10); 4277 SKIPWS(end); 4278 if ((range_st == end) || (*end != NULL)) { 4279 IPQOSCDBG0(L0, "Failed reading a\n"); 4280 return (IPQOS_CONF_ERR); 4281 } 4282 } 4283 4284 return (IPQOS_CONF_SUCCESS); 4285 } 4286 4287 /* 4288 * Reads the values of an integer array from fp whose format is: 4289 * '{'RANGE[,RANGE[..]]:VALUE[;RANGE:VALUE[..]]'}', creates an array of size 4290 * arr_size, applies the values to it and points arrp at this array. 4291 * RANGE is one set of array indexes over which this value is to 4292 * be applied, and VALUE either an integer within the range 4293 * llimit - ulimit, or if enum_nvs isn't NULL, an enumeration value 4294 * found in the list enum_nvs. Those values which aren't explicity set 4295 * will be set to -1. 4296 * 4297 * RETURNS: IPQOS_CONF_ERR on resource or parse error, else IPQOS_CONF_SUCCESS. 4298 */ 4299 static int 4300 read_int_array( 4301 FILE *fp, 4302 char *first_token, 4303 int **arrp, 4304 uint32_t arr_size, 4305 int llimit, 4306 int ulimit, 4307 str_val_nd_t *enum_nvs) 4308 { 4309 4310 char buf[5 * IPQOS_CONF_LINEBUF_SZ]; 4311 char *token; 4312 char *range; 4313 char *ranges; 4314 char *svalue; 4315 int value; 4316 int res; 4317 char *entry; 4318 char *tmp; 4319 char *end; 4320 int lower, upper; 4321 int x; 4322 uint32_t startln; 4323 4324 IPQOSCDBG4(L0, "In read_int_array: size: %u, lower: %u, upper: %u, " 4325 "first_token: %s\n", arr_size, llimit, ulimit, first_token); 4326 4327 /* 4328 * read beginning curl. 4329 */ 4330 if (first_token[0] != CURL_BEGIN) { 4331 ipqos_msg(MT_ERROR, gettext("\'{\' missing at line " 4332 "%u.\n"), lineno); 4333 return (IPQOS_CONF_ERR); 4334 } 4335 4336 /* 4337 * allocate and initialise array for holding read values. 4338 */ 4339 *arrp = malloc(arr_size * sizeof (int)); 4340 if (*arrp == NULL) { 4341 ipqos_msg(MT_ENOSTR, "malloc"); 4342 return (IPQOS_CONF_ERR); 4343 } 4344 (void) memset(*arrp, -1, arr_size * sizeof (int)); 4345 4346 /* 4347 * read whole array declaration string into buffer. 4348 * this is because readtoken doesn't interpret our 4349 * delimeter values specially and may return them 4350 * within another string. 4351 */ 4352 startln = lineno; /* store starting lineno for error reports */ 4353 buf[0] = '\0'; 4354 res = readtoken(fp, &token); 4355 while ((res != IPQOS_CONF_CURL_END) && (res != IPQOS_CONF_ERR) && 4356 (res != IPQOS_CONF_EOF)) { 4357 (void) strlcat(buf, token, sizeof (buf)); 4358 free(token); 4359 res = readtoken(fp, &token); 4360 } 4361 if (res != IPQOS_CONF_CURL_END) { 4362 goto array_err; 4363 } 4364 IPQOSCDBG1(L0, "array declaration buffer contains: %s\n", buf); 4365 4366 /* 4367 * loop reading "ranges ':' value;" till end of buffer. 4368 */ 4369 entry = strtok(buf, ";"); 4370 while (entry != NULL) { 4371 svalue = strchr(entry, ':'); 4372 if (svalue == NULL) { /* missing value string */ 4373 IPQOSCDBG0(L0, "Missing value string\n"); 4374 goto array_err; 4375 } 4376 *svalue++ = '\0'; 4377 ranges = entry; 4378 4379 /* 4380 * get value of number or enumerated symbol. 4381 */ 4382 if (enum_nvs) { 4383 /* 4384 * get rid of surrounding whitespace so as not to 4385 * confuse read_enum_value. 4386 */ 4387 SKIPWS(svalue); 4388 tmp = svalue; 4389 while (*tmp != '\0') { 4390 if (isspace(*tmp)) { 4391 *tmp = '\0'; 4392 break; 4393 } else { 4394 tmp++; 4395 } 4396 } 4397 4398 /* 4399 * read enumeration value. 4400 */ 4401 res = read_enum_value(NULL, svalue, enum_nvs, 4402 (uint32_t *)&value); 4403 if (res != IPQOS_CONF_SUCCESS) 4404 goto array_err; 4405 } else { 4406 value = (int)strtol(svalue, &end, 10); 4407 SKIPWS(end); 4408 if ((svalue == end) || (*end != NULL)) { 4409 IPQOSCDBG0(L0, "Invalid value\n"); 4410 goto array_err; 4411 } 4412 IPQOSCDBG1(L0, "value: %u\n", value); 4413 4414 /* 4415 * check value within valid range. 4416 */ 4417 if ((value < llimit) || (value > ulimit)) { 4418 IPQOSCDBG0(L0, "value out of range\n"); 4419 goto array_err; 4420 } 4421 } 4422 4423 /* 4424 * loop reading ranges for this value. 4425 */ 4426 range = strtok_r(ranges, ",", &tmp); 4427 while (range != NULL) { 4428 res = readrange(range, &lower, &upper); 4429 if (res != IPQOS_CONF_SUCCESS) 4430 goto array_err; 4431 IPQOSCDBG2(L0, "range: %u - %u\n", lower, upper); 4432 4433 4434 if (upper < lower) { 4435 uint32_t u = lower; 4436 lower = upper; 4437 upper = u; 4438 } 4439 4440 /* 4441 * check range valid for array size. 4442 */ 4443 if ((lower < 0) || (upper > arr_size)) { 4444 IPQOSCDBG0(L0, "Range out of array " 4445 "dimensions\n"); 4446 goto array_err; 4447 } 4448 4449 /* 4450 * add this value to array indexes within range. 4451 */ 4452 for (x = lower; x <= upper; x++) 4453 (*arrp)[x] = value; 4454 4455 /* 4456 * get next range. 4457 */ 4458 range = strtok_r(NULL, ",", &tmp); 4459 } 4460 4461 entry = strtok(NULL, ";"); 4462 } 4463 4464 return (IPQOS_CONF_SUCCESS); 4465 4466 array_err: 4467 ipqos_msg(MT_ERROR, 4468 gettext("Array declaration line %u is invalid.\n"), startln); 4469 free(*arrp); 4470 return (IPQOS_CONF_ERR); 4471 } 4472 4473 static int 4474 readllong(char *str, long long *llp, char **lo) 4475 { 4476 4477 *llp = strtoll(str, lo, 0); 4478 if (*lo == str) { 4479 return (IPQOS_CONF_ERR); 4480 } 4481 return (IPQOS_CONF_SUCCESS); 4482 } 4483 4484 static int 4485 readuint8(char *str, uint8_t *ui8, char **lo) 4486 { 4487 4488 long long tmp; 4489 4490 if (readllong(str, &tmp, lo) != 0) { 4491 return (IPQOS_CONF_ERR); 4492 } 4493 if (tmp > UCHAR_MAX || tmp < 0) { 4494 return (IPQOS_CONF_ERR); 4495 } 4496 *ui8 = (uint8_t)tmp; 4497 return (IPQOS_CONF_SUCCESS); 4498 } 4499 4500 static int 4501 readuint16(char *str, uint16_t *ui16, char **lo) 4502 { 4503 long long tmp; 4504 4505 if (readllong(str, &tmp, lo) != IPQOS_CONF_SUCCESS) { 4506 return (IPQOS_CONF_ERR); 4507 } 4508 if (tmp > USHRT_MAX || tmp < 0) { 4509 return (IPQOS_CONF_ERR); 4510 } 4511 *ui16 = (uint16_t)tmp; 4512 return (IPQOS_CONF_SUCCESS); 4513 } 4514 4515 static int 4516 readint16(char *str, int16_t *i16, char **lo) 4517 { 4518 long long tmp; 4519 4520 if (readllong(str, &tmp, lo) != 0) { 4521 return (IPQOS_CONF_ERR); 4522 } 4523 if (tmp > SHRT_MAX || tmp < SHRT_MIN) { 4524 return (IPQOS_CONF_ERR); 4525 } 4526 *i16 = (int16_t)tmp; 4527 return (IPQOS_CONF_SUCCESS); 4528 } 4529 4530 static int 4531 readint32(char *str, int *i32, char **lo) 4532 { 4533 long long tmp; 4534 4535 if (readllong(str, &tmp, lo) != IPQOS_CONF_SUCCESS) { 4536 return (IPQOS_CONF_ERR); 4537 } 4538 if (tmp > INT_MAX || tmp < INT_MIN) { 4539 return (IPQOS_CONF_ERR); 4540 } 4541 *i32 = tmp; 4542 return (IPQOS_CONF_SUCCESS); 4543 } 4544 4545 static int 4546 readuint32(char *str, uint32_t *ui32, char **lo) 4547 { 4548 long long tmp; 4549 4550 if (readllong(str, &tmp, lo) != IPQOS_CONF_SUCCESS) { 4551 return (IPQOS_CONF_ERR); 4552 } 4553 if (tmp > UINT_MAX || tmp < 0) { 4554 return (IPQOS_CONF_ERR); 4555 } 4556 *ui32 = (uint32_t)tmp; 4557 return (IPQOS_CONF_SUCCESS); 4558 } 4559 4560 /* 4561 * retrieves the index associated with the interface named ifname and assigns 4562 * it to the int pointed to by ifindex. 4563 * RETURNS: IPQOS_CONF_ERR on errors, else IPQOS_CONF_SUCCESS. 4564 */ 4565 static int 4566 readifindex( 4567 char *ifname, 4568 int *ifindex) 4569 { 4570 4571 int s; 4572 struct lifreq lifrq; 4573 4574 4575 /* open socket */ 4576 4577 if ((s = socket(AF_INET, SOCK_DGRAM, 0)) == -1) { 4578 ipqos_msg(MT_ENOSTR, gettext("opening AF_INET socket")); 4579 return (IPQOS_CONF_ERR); 4580 } 4581 4582 /* copy ifname into lifreq */ 4583 4584 (void) strlcpy(lifrq.lifr_name, ifname, LIFNAMSIZ); 4585 4586 /* do SIOGLIFINDEX ioctl */ 4587 4588 if (ioctl(s, SIOCGLIFINDEX, (caddr_t)&lifrq) == -1) { 4589 (void) close(s); 4590 return (IPQOS_CONF_ERR); 4591 } 4592 4593 /* Warn if a virtual interface is specified */ 4594 if ((ioctl(s, SIOCGLIFFLAGS, (caddr_t)&lifrq) != -1) && 4595 (lifrq.lifr_flags & IFF_VIRTUAL)) { 4596 ipqos_msg(MT_WARNING, gettext("Invalid interface")); 4597 } 4598 (void) close(s); 4599 *ifindex = lifrq.lifr_index; 4600 return (IPQOS_CONF_SUCCESS); 4601 } 4602 4603 /* 4604 * Case insensitively compares the string in str with IPQOS_CONF_TRUE_STR 4605 * and IPQOS_CONF_FALSE_STR and sets boolean pointed to by bool accordingly. 4606 * RETURNS: if failure to match either IPQOS_CONF_ERR, else IPQOS_CONF_SUCCESS. 4607 */ 4608 static int 4609 readbool(char *str, boolean_t *bool) 4610 { 4611 4612 if (strcasecmp(str, IPQOS_CONF_TRUE_STR) == 0) { 4613 *bool = B_TRUE; 4614 } else if (strcasecmp(str, IPQOS_CONF_FALSE_STR) == 0) { 4615 *bool = B_FALSE; 4616 } else { 4617 return (IPQOS_CONF_ERR); 4618 } 4619 4620 return (IPQOS_CONF_SUCCESS); 4621 } 4622 4623 /* 4624 * reads a protocol name/number from proto_str and assigns the number 4625 * to the uint8 ref'd by proto. 4626 * RETURNS: If not a valid name or protocol number IPQOS_CONF_ERR, else 4627 * IPQOS_CONF_SUCCESS. 4628 */ 4629 static int 4630 readproto(char *proto_str, uint8_t *proto) 4631 { 4632 4633 struct protoent *pent; 4634 char *lo; 4635 int res; 4636 4637 IPQOSCDBG1(L1, "In readproto: string: %s\n", proto_str); 4638 4639 /* try name lookup */ 4640 4641 pent = getprotobyname(proto_str); 4642 if (pent) { 4643 *proto = pent->p_proto; 4644 4645 /* check valid protocol number */ 4646 } else { 4647 res = readuint8(proto_str, proto, &lo); 4648 if (res != IPQOS_CONF_SUCCESS || proto == 0) { 4649 return (IPQOS_CONF_ERR); 4650 } 4651 } 4652 4653 return (IPQOS_CONF_SUCCESS); 4654 } 4655 4656 /* 4657 * reads either a port service, or a port number from port_str and assigns 4658 * the associated port number to short ref'd by port. 4659 * RETURNS: If invalid name and number IPQOS_CONF_ERR, else IPQOS_CONF_SUCCESS. 4660 */ 4661 static int 4662 readport(char *port_str, uint16_t *port) 4663 { 4664 4665 struct servent *sent; 4666 char *tmp; 4667 4668 IPQOSCDBG1(L1, "In readport: string: %s\n", port_str); 4669 4670 /* try service name lookup */ 4671 sent = getservbyname(port_str, NULL); 4672 4673 /* failed name lookup so read port number */ 4674 if (sent == NULL) { 4675 if (readuint16(port_str, port, &tmp) != IPQOS_CONF_SUCCESS || 4676 *port == 0) { 4677 return (IPQOS_CONF_ERR); 4678 } 4679 *port = htons(*port); 4680 } else { 4681 *port = sent->s_port; 4682 } 4683 4684 return (IPQOS_CONF_SUCCESS); 4685 } 4686 4687 4688 /* 4689 * Reads a curly brace, a string enclosed in double quotes, or a whitespace/ 4690 * curly brace delimited string. If a double quote enclosed string the 4691 * closing quotes need to be on the same line. 4692 * RETURNS: 4693 * on reading a CURL_BEGIN token it returns IPQOS_CONF_CURL_BEGIN, 4694 * on reading a CURL_END token it returns IPQOS_CONF_CURL_END, 4695 * on reading another valid token it returns IPQOS_CONF_SUCCESS. 4696 * for each of these token is set to point at the read string. 4697 * at EOF it returns IPQOS_CONF_EOF and if errors it returns IPQOS_CONF_ERR. 4698 */ 4699 static int 4700 readtoken( 4701 FILE *fp, 4702 char **token) 4703 { 4704 4705 char *st, *tmp; 4706 int len; 4707 int quoted = 0; 4708 char *cmnt; 4709 char *bpos; 4710 int rembuf; 4711 4712 static char *lo; 4713 static char *buf = NULL; 4714 static int bufsize; 4715 4716 /* if first call initialize line buf to default size */ 4717 4718 if (buf == NULL) { 4719 bufsize = IPQOS_CONF_LINEBUF_SZ; 4720 buf = malloc(bufsize); 4721 if (buf == NULL) { 4722 ipqos_msg(MT_ENOSTR, "malloc"); 4723 return (IPQOS_CONF_ERR); 4724 } 4725 } 4726 4727 /* set buffer postition and size to use whole buffer */ 4728 4729 bpos = buf; 4730 rembuf = bufsize; 4731 4732 4733 /* 4734 * loop reading lines until we've read a line with a non-whitespace 4735 * char. 4736 */ 4737 4738 do { 4739 /* if no leftover from previous invocation */ 4740 4741 if (lo == NULL) { 4742 4743 /* 4744 * loop reading into buffer doubling if necessary until 4745 * we have either read a complete line or reached the 4746 * end of file. 4747 */ 4748 for (;;) { 4749 st = fgets(bpos, rembuf, fp); 4750 4751 if (st == NULL) { 4752 4753 /* if read error */ 4754 if (ferror(fp)) { 4755 free(buf); 4756 buf = NULL; 4757 ipqos_msg(MT_ENOSTR, 4758 "fgets"); 4759 return (IPQOS_CONF_ERR); 4760 4761 /* end of file */ 4762 } else { 4763 free(buf); 4764 buf = NULL; 4765 *token = NULL; 4766 return (IPQOS_CONF_EOF); 4767 } 4768 } else { 4769 /* if read a newline */ 4770 4771 if (buf[strlen(buf) - 1] == '\n') { 4772 lineno++; 4773 break; 4774 4775 /* if read the last line */ 4776 4777 } else if (feof(fp)) { 4778 break; 4779 4780 /* 4781 * not read a full line so buffer size 4782 * is too small, double it and retry. 4783 */ 4784 } else { 4785 bufsize *= 2; 4786 tmp = realloc(buf, bufsize); 4787 if (tmp == NULL) { 4788 ipqos_msg(MT_ENOSTR, 4789 "realloc"); 4790 free(buf); 4791 return (IPQOS_CONF_ERR); 4792 } else { 4793 buf = tmp; 4794 } 4795 4796 /* 4797 * make parameters to fgets read 4798 * into centre of doubled buffer 4799 * so we retain what we've 4800 * already read. 4801 */ 4802 bpos = &buf[(bufsize / 2) - 1]; 4803 rembuf = (bufsize / 2) + 1; 4804 } 4805 } 4806 } 4807 4808 st = buf; 4809 4810 /* previous leftover, assign to st */ 4811 4812 } else { 4813 st = lo; 4814 lo = NULL; 4815 } 4816 4817 /* truncate at comment */ 4818 4819 cmnt = strchr(st, '#'); 4820 if (cmnt) { 4821 *cmnt = '\0'; 4822 } 4823 4824 /* Skip any whitespace */ 4825 4826 while (isspace(*st) && *st != '\0') { 4827 st++; 4828 } 4829 4830 } while (*st == '\0'); 4831 4832 4833 /* find end of token */ 4834 4835 tmp = st; 4836 4837 /* if curl advance 1 char */ 4838 4839 if (*tmp == CURL_BEGIN || *tmp == CURL_END) { 4840 tmp++; 4841 4842 4843 /* if dbl quote read until matching quote */ 4844 4845 } else if (*tmp == '"') { 4846 quoted++; 4847 tmp = ++st; 4848 4849 while (*tmp != '"' && *tmp != '\n' && *tmp != '\0') { 4850 tmp++; 4851 } 4852 if (*tmp != '"') { 4853 ipqos_msg(MT_ERROR, gettext("Quoted string exceeds " 4854 "line, line %u.\n"), lineno); 4855 free(buf); 4856 return (IPQOS_CONF_ERR); 4857 } 4858 4859 /* normal token */ 4860 } else { 4861 /* find first whitespace, curl, newline or string end */ 4862 4863 while (!isspace(*tmp) && *tmp != CURL_BEGIN && 4864 *tmp != CURL_END && *tmp != '\n' && *tmp != '\0') { 4865 tmp++; 4866 } 4867 } 4868 4869 /* copy token to return */ 4870 len = tmp - st; 4871 *token = malloc(len + 1); 4872 if (!*token) { 4873 free(buf); 4874 ipqos_msg(MT_ENOSTR, "malloc"); 4875 return (IPQOS_CONF_ERR); 4876 } 4877 bcopy(st, *token, len); 4878 (*token)[len] = '\0'; 4879 4880 /* if just read quoted string remove quote from remaining string */ 4881 4882 if (quoted) { 4883 tmp++; 4884 } 4885 4886 /* if not end of string, store rest for latter parsing */ 4887 4888 if (*tmp != '\0' && *tmp != '\n') { 4889 lo = tmp; 4890 } 4891 4892 /* for curl_end and curl_begin return special ret codes */ 4893 4894 if ((*token)[1] == '\0') { 4895 if (**token == CURL_BEGIN) { 4896 return (IPQOS_CONF_CURL_BEGIN); 4897 } else if (**token == CURL_END) { 4898 return (IPQOS_CONF_CURL_END); 4899 } 4900 } 4901 4902 return (IPQOS_CONF_SUCCESS); 4903 } 4904 4905 /* 4906 * Reads an enumeration bitmask definition from line. The format is: 4907 * { NAME=VAL, NAME2=VAL2 }. The resulting names and values are returned. 4908 * RETURNS: NULL on error, else ptr to name/values. 4909 */ 4910 static str_val_nd_t * 4911 read_enum_nvs(char *line, char *module_name) 4912 { 4913 4914 str_val_nd_t *enum_vals = NULL; 4915 char *cp; 4916 char *start; 4917 char *name = NULL; 4918 int len; 4919 uint32_t val; 4920 int ret; 4921 int readc; 4922 4923 IPQOSCDBG1(L1, "In read_enum_nvs, line: %s\n", line); 4924 4925 /* read opening brace */ 4926 4927 cp = strchr(line, CURL_BEGIN); 4928 if (cp == NULL) { 4929 IPQOSCDBG0(L1, "missing curl begin\n"); 4930 goto fail; 4931 } else { 4932 start = cp + 1; 4933 } 4934 4935 /* 4936 * loop reading 'name = value' entrys seperated by comma until 4937 * reach closing brace. 4938 */ 4939 4940 for (;;) { 4941 SKIPWS(start); 4942 if (*start == '\0') { 4943 IPQOSCDBG0(L1, "missing closing bracket\n"); 4944 goto fail; 4945 } 4946 4947 /* 4948 * read name - read until whitespace, '=', closing curl, 4949 * or string end. 4950 */ 4951 4952 for (cp = start; 4953 !isspace(*cp) && *cp != '=' && *cp != CURL_END && 4954 *cp != '\0'; cp++) {} 4955 4956 if (*cp == '\0') { 4957 IPQOSCDBG0(L1, "Unexpected line end in enum def'n\n"); 4958 goto fail; 4959 4960 /* finished definition, exit loop */ 4961 } else if (*cp == CURL_END) { 4962 break; 4963 } 4964 4965 /* store name */ 4966 4967 len = cp - start; 4968 name = malloc(len + 1); 4969 if (name == NULL) { 4970 ipqos_msg(MT_ENOSTR, "malloc"); 4971 goto fail; 4972 } 4973 bcopy(start, name, len); 4974 name[len] = NULL; 4975 IPQOSCDBG1(L0, "Stored name: %s\n", name); 4976 4977 /* read assignment */ 4978 4979 start = strchr(cp, '='); 4980 if (start == NULL) { 4981 IPQOSCDBG0(L1, "Missing = in enum def'n\n"); 4982 goto fail; 4983 } 4984 4985 /* read value */ 4986 4987 ret = sscanf(++start, "%x%n", &val, &readc); 4988 if (ret != 1) { 4989 IPQOSCDBG1(L1, "sscanf of value failed, string: %s\n", 4990 cp); 4991 goto fail; 4992 } 4993 4994 /* add name value to set */ 4995 4996 ret = add_str_val_entry(&enum_vals, name, val); 4997 if (ret != IPQOS_CONF_SUCCESS) { 4998 IPQOSCDBG0(L1, "Failed to add str_val entry\n"); 4999 goto fail; 5000 } 5001 free(name); 5002 name = NULL; 5003 5004 /* try reading comma */ 5005 cp = strchr(start, ','); 5006 5007 if (cp != NULL) { 5008 start = cp + 1; 5009 5010 /* no comma, advance to char past value last read */ 5011 } else { 5012 start += readc; 5013 } 5014 } 5015 5016 return (enum_vals); 5017 fail: 5018 free_str_val_entrys(enum_vals); 5019 if (name != NULL) 5020 free(name); 5021 5022 /* if a parse error */ 5023 5024 if (errno == 0) { 5025 ipqos_msg(MT_ERROR, gettext("Types file for module %s is " 5026 "corrupt.\n"), module_name); 5027 } 5028 5029 return (NULL); 5030 } 5031 5032 /* 5033 * Given mapped_list with is a comma seperated list of map names, and value, 5034 * which is used to index into these maps, the function creates x new entries 5035 * in nvpp, where x is the number of map names specified. Each of these 5036 * entries has the value from the map in the position indexed by value and 5037 * with name module.${MAP_NAME}. The maps are contained in the modules config 5038 * file and have the form: 5039 * map map1 uint32 1,23,32,45,3 5040 * As you can see the map values are uint32, and along with uint8 are the 5041 * only supported types at the moment. 5042 * 5043 * RETURNS: IPQOS_CONF_ERR if one of the maps specified in mapped_list 5044 * doesn't exist, if value is not a valid map position for a map, or if 5045 * there's a resource failure. otherwise IPQOS_CONF_SUCCESS is returned. 5046 */ 5047 static int 5048 read_mapped_values( 5049 FILE *tfp, 5050 nvlist_t **nvlp, 5051 char *module, 5052 char *mapped_list, 5053 int value) 5054 { 5055 char *map_name, *lastparam, *tmpname; 5056 int res; 5057 ipqos_nvtype_t type; 5058 char dfltst[IPQOS_VALST_MAXLEN+1] = ""; 5059 str_val_nd_t *enum_nvs; 5060 place_t place; 5061 5062 IPQOSCDBG0(L1, "In read_mapped_values\n"); 5063 5064 map_name = (char *)strtok_r(mapped_list, ",", &lastparam); 5065 while (map_name != NULL) { 5066 char *tokval, *lastval; 5067 int index = 0; 5068 5069 /* 5070 * get map info from types file. 5071 */ 5072 place = PL_MAP; 5073 res = readtype(tfp, module, map_name, &type, &enum_nvs, 5074 dfltst, B_FALSE, &place); 5075 if (res != IPQOS_CONF_SUCCESS) { 5076 return (IPQOS_CONF_ERR); 5077 } 5078 5079 /* 5080 * Just keep browsing the list till we get to the element 5081 * with the index from the value parameter or the end. 5082 */ 5083 tokval = (char *)strtok_r(dfltst, ",", &lastval); 5084 for (;;) { 5085 if (tokval == NULL) { 5086 ipqos_msg(MT_ERROR, 5087 gettext("Invalid value, %u, line %u.\n"), 5088 value, lineno); 5089 return (IPQOS_CONF_ERR); 5090 } 5091 if (index++ == value) { 5092 break; 5093 } 5094 tokval = (char *)strtok_r(NULL, ",", &lastval); 5095 } 5096 5097 5098 /* 5099 * create fully qualified parameter name for map value. 5100 */ 5101 tmpname = prepend_module_name(map_name, module); 5102 if (tmpname == NULL) { 5103 return (IPQOS_CONF_ERR); 5104 } 5105 5106 /* 5107 * add map value with fqn to parameter nvlist. 5108 */ 5109 IPQOSCDBG2(L0, "Adding map %s, value %u to nvlist\n", 5110 tmpname, atoi(tokval)); 5111 switch (type) { 5112 case IPQOS_DATA_TYPE_UINT8: { 5113 res = nvlist_add_byte(*nvlp, tmpname, 5114 (uint8_t)atoi(tokval)); 5115 if (res != 0) { 5116 free(tmpname); 5117 ipqos_msg(MT_ENOSTR, 5118 "nvlist_add_uint8"); 5119 return (IPQOS_CONF_ERR); 5120 } 5121 break; 5122 } 5123 case IPQOS_DATA_TYPE_UINT32: { 5124 res = nvlist_add_uint32(*nvlp, tmpname, 5125 (uint32_t)atoi(tokval)); 5126 if (res != 0) { 5127 free(tmpname); 5128 ipqos_msg(MT_ENOSTR, 5129 "nvlist_add_uint32"); 5130 return (IPQOS_CONF_ERR); 5131 } 5132 break; 5133 } 5134 default: { 5135 ipqos_msg(MT_ERROR, 5136 gettext("Types file for module %s is " 5137 "corrupt.\n"), module); 5138 IPQOSCDBG1(L0, "Unsupported map type for " 5139 "parameter %s given in types file.\n", 5140 map_name); 5141 return (IPQOS_CONF_ERR); 5142 } 5143 } 5144 free(tmpname); 5145 5146 map_name = (char *)strtok_r(NULL, ",", &lastparam); 5147 } 5148 5149 return (IPQOS_CONF_SUCCESS); 5150 } 5151 5152 /* 5153 * Parses the string info_str into it's components. Its format is: 5154 * SIZE','[ENUM_DEF | RANGE], where SIZE is the size of the array, 5155 * ENUM_DEF is the definition of the enumeration for this array, 5156 * and RANGE is the set of values this array can accept. In 5157 * the event this array has an enumeration definition enum_nvs is 5158 * set to point at a str_val_nd_t structure which stores the names 5159 * and values associated with this enumeration. Otherwise, if this 5160 * is not an enumerated array, lower and upper are set to the lower 5161 * and upper values of RANGE. 5162 * RETURNS: IPQOS_CONF_ERR due to unexpected parse errors, else 5163 * IPQOS_CONF_SUCCESS. 5164 */ 5165 static int 5166 read_int_array_info( 5167 char *info_str, 5168 str_val_nd_t **enum_nvs, 5169 uint32_t *size, 5170 int *lower, 5171 int *upper, 5172 char *module) 5173 { 5174 int res; 5175 char *end; 5176 char *token; 5177 char *tmp; 5178 5179 IPQOSCDBG1(L0, "In read_array_info: info_str: %s\n", 5180 (info_str != NULL) ? info_str : "NULL"); 5181 5182 if (info_str == NULL) { 5183 IPQOSCDBG0(L0, "Null info string\n"); 5184 goto fail; 5185 } 5186 5187 /* 5188 * read size. 5189 */ 5190 token = strtok(info_str, ","); 5191 *size = (uint32_t)strtol(token, &end, 10); 5192 SKIPWS(end); 5193 if ((end == token) || (*end != NULL)) { 5194 IPQOSCDBG0(L0, "Invalid size\n"); 5195 goto fail; 5196 } 5197 IPQOSCDBG1(L0, "read size: %u\n", *size); 5198 5199 /* 5200 * check we have another string. 5201 */ 5202 token = strtok(NULL, "\n"); 5203 if (token == NULL) { 5204 IPQOSCDBG0(L0, "Missing range/enum def\n"); 5205 goto fail; 5206 } 5207 IPQOSCDBG1(L0, "range/enum def: %s\n", token); 5208 5209 /* 5210 * check if enumeration set or integer set and read enumeration 5211 * definition or integer range respectively. 5212 */ 5213 tmp = strchr(token, CURL_BEGIN); 5214 if (tmp == NULL) { /* a numeric range */ 5215 res = readrange(token, lower, upper); 5216 if (res != IPQOS_CONF_SUCCESS) { 5217 IPQOSCDBG0(L0, "Failed reading range\n"); 5218 goto fail; 5219 } 5220 } else { /* an enumeration */ 5221 *enum_nvs = read_enum_nvs(token, module); 5222 if (*enum_nvs == NULL) { 5223 IPQOSCDBG0(L0, "Failed reading enum def\n"); 5224 goto fail; 5225 } 5226 } 5227 5228 return (IPQOS_CONF_SUCCESS); 5229 fail: 5230 ipqos_msg(MT_ERROR, 5231 gettext("Types file for module %s is corrupt.\n"), module); 5232 return (IPQOS_CONF_ERR); 5233 } 5234 5235 /* 5236 * reads the value of an enumeration parameter from first_token and fp. 5237 * first_token is the first token of the value. 5238 * The format expected is NAME | { NAME1 [, NAME2 ] [, NAME3 ] }. 5239 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 5240 */ 5241 static int 5242 read_enum_value( 5243 FILE *fp, 5244 char *first_token, 5245 str_val_nd_t *enum_vals, 5246 uint32_t *val) 5247 { 5248 5249 uint32_t u32; 5250 int ret; 5251 char *tk; 5252 char *lo = NULL; 5253 char *cm; 5254 int name_expected = 0; 5255 5256 IPQOSCDBG0(L1, "In read_enum_value\n"); 5257 5258 /* init param val */ 5259 *val = 0; 5260 5261 /* first token not curl_begin, so lookup its value */ 5262 5263 if (*first_token != CURL_BEGIN) { 5264 ret = str_val_list_lookup(enum_vals, first_token, val); 5265 if (ret != IPQOS_CONF_SUCCESS) { 5266 ipqos_msg(MT_ERROR, 5267 gettext("Unrecognized value, %s, line %u.\n"), 5268 first_token, lineno); 5269 return (ret); 5270 } 5271 5272 /* curl_begin, so read values till curl_end, dicing at ',' */ 5273 } else { 5274 5275 name_expected++; 5276 5277 for (;;) { 5278 5279 /* 5280 * no leftover from pervious iteration so read new 5281 * token. This leftover happens because readtoken 5282 * doesn't interpret comma's as special characters 5283 * and thus could return 'val1,val2' as one token. 5284 * If this happens the val1 will be used in the 5285 * current iteration and what follows saved in lo 5286 * for processing by successive iterations. 5287 */ 5288 5289 if (lo == NULL) { 5290 ret = readtoken(fp, &tk); 5291 if (ret == IPQOS_CONF_ERR) { 5292 return (ret); 5293 } else if (ret == IPQOS_CONF_EOF) { 5294 ipqos_msg(MT_ERROR, 5295 gettext("Unexpected EOF.\n")); 5296 return (IPQOS_CONF_ERR); 5297 5298 } 5299 } else { /* previous leftover, so use it */ 5300 5301 IPQOSCDBG1(L1, "Using leftover %s.\n", lo); 5302 tk = lo; 5303 lo = NULL; 5304 } 5305 5306 if (name_expected) { 5307 if (ret == IPQOS_CONF_CURL_END || 5308 tk[0] == ',') { 5309 ipqos_msg(MT_ERROR, 5310 gettext("Malformed value list " 5311 "line %u.\n"), lineno); 5312 free(tk); 5313 return (IPQOS_CONF_ERR); 5314 } 5315 5316 /* 5317 * check if this token contains a ',' and 5318 * if so store it and what follows for next 5319 * iteration. 5320 */ 5321 cm = strchr(tk, ','); 5322 if (cm != NULL) { 5323 lo = malloc(strlen(cm) + 1); 5324 if (lo == NULL) { 5325 ipqos_msg(MT_ENOSTR, "malloc"); 5326 free(tk); 5327 return (IPQOS_CONF_ERR); 5328 } 5329 5330 (void) strcpy(lo, cm); 5331 *cm = '\0'; 5332 } 5333 5334 5335 /* get name value and add to total val */ 5336 5337 ret = str_val_list_lookup(enum_vals, tk, &u32); 5338 if (ret != IPQOS_CONF_SUCCESS) { 5339 ipqos_msg(MT_ERROR, 5340 gettext("Unrecognized value, %s, " 5341 "line %u.\n"), tk, lineno); 5342 free(tk); 5343 return (IPQOS_CONF_ERR); 5344 } 5345 5346 *val = *val | u32; 5347 name_expected--; 5348 5349 /* comma or curl end accepted */ 5350 } else { 5351 5352 /* we've reached curl_end so break */ 5353 5354 if (ret == IPQOS_CONF_CURL_END) { 5355 free(tk); 5356 break; 5357 5358 /* not curl end and not comma */ 5359 5360 } else if (tk[0] != ',') { 5361 ipqos_msg(MT_ERROR, 5362 gettext("Malformed value list " 5363 "line %u.\n"), lineno); 5364 free(tk); 5365 return (IPQOS_CONF_ERR); 5366 } 5367 5368 /* 5369 * store anything after the comma for next 5370 * iteration. 5371 */ 5372 if (tk[1] != '\0') { 5373 lo = malloc(strlen(&tk[1]) + 1); 5374 if (lo == NULL) { 5375 ipqos_msg(MT_ENOSTR, "malloc"); 5376 free(tk); 5377 return (IPQOS_CONF_ERR); 5378 } 5379 (void) strcpy(lo, &tk[1]); 5380 } 5381 5382 name_expected++; 5383 } 5384 5385 free(tk); 5386 } 5387 } 5388 5389 IPQOSCDBG1(L1, "value returned is: %u\n", *val); 5390 5391 return (IPQOS_CONF_SUCCESS); 5392 } 5393 5394 /* 5395 * read the set of permanent classes/filter from the types file ref'd by tfp 5396 * and store them in a string table pointed to by perm_items, 5397 * with *nitems getting set to number of items read. perm_filters is set 5398 * to 1 if we're searching for permanent filters, else 0 for classes. 5399 * RETURNS: IPQOS_CONF_ERR if any errors, else IPQOS_CONF_SUCCESS. 5400 */ 5401 static int 5402 read_perm_items( 5403 int perm_filters, 5404 FILE *tfp, 5405 char *module_name, 5406 char ***perm_items, 5407 int *nitems) 5408 { 5409 5410 char lbuf[IPQOS_CONF_TYPE_LINE_LEN]; 5411 int cnt = 0; 5412 char name[IPQOS_CONF_NAME_LEN+1]; 5413 char foo[IPQOS_CONF_NAME_LEN+1]; 5414 int res; 5415 char **items = NULL; 5416 char **tmp; 5417 char *marker; 5418 5419 IPQOSCDBG0(L1, "In read_perm_items\n"); 5420 5421 5422 /* seek to start of types file */ 5423 5424 if (fseek(tfp, 0, SEEK_SET) != 0) { 5425 ipqos_msg(MT_ENOSTR, "fseek"); 5426 return (IPQOS_CONF_ERR); 5427 } 5428 5429 /* select which marker were looking for */ 5430 5431 if (perm_filters) { 5432 marker = IPQOS_CONF_PERM_FILTER_MK; 5433 } else { 5434 marker = IPQOS_CONF_PERM_CLASS_MK; 5435 } 5436 5437 /* scan file line by line till end */ 5438 5439 while (fgets(lbuf, IPQOS_CONF_TYPE_LINE_LEN, tfp) != NULL) { 5440 5441 /* 5442 * if the line is marked as containing a default item name 5443 * read the name, extend the items string array 5444 * and store the string off the array. 5445 */ 5446 if (strncmp(lbuf, marker, strlen(marker)) == 0) { 5447 5448 res = sscanf(lbuf, 5449 "%" VAL2STR(IPQOS_CONF_NAME_LEN) "s" 5450 "%" VAL2STR(IPQOS_CONF_NAME_LEN) "s", 5451 foo, name); 5452 if (res < 2) { 5453 ipqos_msg(MT_ERROR, 5454 gettext("Types file for module %s is " 5455 "corrupt.\n"), module_name); 5456 IPQOSCDBG1(L0, "Missing name with a %s.\n", 5457 marker); 5458 goto fail; 5459 } 5460 5461 /* extend items array to accomodate new item */ 5462 5463 tmp = realloc(items, (cnt + 1) * sizeof (char *)); 5464 if (tmp == NULL) { 5465 ipqos_msg(MT_ENOSTR, "realloc"); 5466 goto fail; 5467 } else { 5468 items = tmp; 5469 } 5470 5471 /* copy and store item name */ 5472 5473 items[cnt] = malloc(strlen(name) + 1); 5474 if (items[cnt] == NULL) { 5475 ipqos_msg(MT_ENOSTR, "malloc"); 5476 goto fail; 5477 } 5478 5479 (void) strcpy(items[cnt], name); 5480 cnt++; 5481 5482 5483 IPQOSCDBG1(L1, "stored %s in perm items array\n", 5484 name); 5485 } 5486 } 5487 5488 *perm_items = items; 5489 *nitems = cnt; 5490 5491 return (IPQOS_CONF_SUCCESS); 5492 fail: 5493 for (cnt--; cnt >= 0; cnt--) 5494 free(items[cnt]); 5495 free(items); 5496 return (IPQOS_CONF_ERR); 5497 } 5498 5499 /* 5500 * Searches types file ref'd by tfp for the parameter named name 5501 * with the place corresponding with place parameter. The format 5502 * of the lines in the file are: 5503 * PLACE NAME TYPE [ ENUM_DEF ] [ DEFAULT_STR ] 5504 * The ENUM_DEF is an enumeration definition and is only present 5505 * for parameters of type enum. DEFAULT_STR is a default value for 5506 * this parameter. If present type is set to the appropriate type 5507 * enumeration and dfltst filled with DEFAULT_STR if one was set. 5508 * Also if the type is enum enum_nvps is made to point at a 5509 * set of name value pairs representing ENUM_DEF. 5510 * 5511 * RETURNS: If any resource errors occur, or a matching parameter 5512 * isn't found IPQOS_CONF_ERR is returned, else IPQOS_CONF_SUCCESS. 5513 */ 5514 static int 5515 readtype( 5516 FILE *tfp, 5517 char *module_name, 5518 char *name, 5519 ipqos_nvtype_t *type, 5520 str_val_nd_t **enum_nvps, 5521 char *dfltst, 5522 boolean_t allow_ipgpc_priv, 5523 place_t *place) 5524 { 5525 5526 int ac; 5527 char lbuf[IPQOS_CONF_TYPE_LINE_LEN]; 5528 char param[IPQOS_CONF_PNAME_LEN+1]; 5529 char typest[IPQOS_CONF_TYPE_LEN+1]; 5530 char place_st[IPQOS_CONF_TYPE_LEN+1]; 5531 char *cp; 5532 int x; 5533 char *ipgpc_nm; 5534 int found = 0; 5535 5536 IPQOSCDBG1(L1, "In readtype: param: %s\n", name); 5537 5538 5539 /* 5540 * if allow_ipgpc_priv is true then we allow ipgpc parameters that are 5541 * private between ipqosconf and ipgpc. eg. address masks, port masks. 5542 */ 5543 if (allow_ipgpc_priv && strcmp(module_name, IPGPC_NAME) == 0) { 5544 ipgpc_nm = prepend_module_name(name, IPGPC_NAME); 5545 if (ipgpc_nm == NULL) { 5546 return (IPQOS_CONF_ERR); 5547 } 5548 5549 if (strcmp(ipgpc_nm, IPGPC_SADDR_MASK) == 0 || 5550 strcmp(ipgpc_nm, IPGPC_DADDR_MASK) == 0) { 5551 *type = IPQOS_DATA_TYPE_ADDRESS_MASK; 5552 return (IPQOS_CONF_SUCCESS); 5553 } else if (strcmp(ipgpc_nm, IPGPC_SPORT_MASK) == 0 || 5554 strcmp(ipgpc_nm, IPGPC_DPORT_MASK) == 0) { 5555 *type = IPQOS_DATA_TYPE_UINT16; 5556 return (IPQOS_CONF_SUCCESS); 5557 } else if (strcmp(ipgpc_nm, IPGPC_FILTER_TYPE) == 0) { 5558 *type = IPQOS_DATA_TYPE_UINT32; 5559 return (IPQOS_CONF_SUCCESS); 5560 } else if (strcmp(ipgpc_nm, IPGPC_IF_INDEX) == 0) { 5561 *type = IPQOS_DATA_TYPE_IFINDEX; 5562 return (IPQOS_CONF_SUCCESS); 5563 } 5564 5565 free(ipgpc_nm); 5566 } 5567 5568 /* 5569 * read upto and including module version line. 5570 */ 5571 if (read_tfile_ver(tfp, IPQOS_MOD_STR, module_name) == -1) 5572 return (IPQOS_CONF_ERR); 5573 5574 5575 /* 5576 * loop reading lines of the types file until named parameter 5577 * found or EOF. 5578 */ 5579 while (fgets(lbuf, IPQOS_CONF_TYPE_LINE_LEN, tfp) != NULL) { 5580 5581 /* 5582 * check whether blank or commented line; if so skip 5583 */ 5584 for (cp = lbuf; isspace(*cp) && *cp != '\0'; cp++) {} 5585 if (*cp == '\0' || *cp == '#') { 5586 continue; 5587 } 5588 5589 dfltst[0] = '\0'; 5590 5591 /* 5592 * read place, param, type and if present default str 5593 * from line. 5594 */ 5595 ac = sscanf(lbuf, 5596 "%" VAL2STR(IPQOS_CONF_TYPE_LEN) "s " 5597 "%" VAL2STR(IPQOS_CONF_PNAME_LEN) "s " 5598 "%" VAL2STR(IPQOS_CONF_TYPE_LEN) "s " 5599 "%" VAL2STR(IPQOS_VALST_MAXLEN) "s", 5600 place_st, param, typest, dfltst); 5601 if (ac < 3) { 5602 ipqos_msg(MT_ERROR, 5603 gettext("Types file for module %s is corrupt.\n"), 5604 module_name); 5605 IPQOSCDBG0(L0, "sscanf failed to read 3 strings.\n"); 5606 return (IPQOS_CONF_ERR); 5607 } 5608 5609 /* 5610 * if the place and name match no need to look any further. 5611 */ 5612 if ((*place == PL_ANY) || 5613 ((*place == PL_PARAMS) && 5614 strcmp(place_st, IPQOS_PLACE_PRM_STR) == 0) || 5615 ((*place == PL_FILTER) && 5616 strcmp(place_st, IPQOS_PLACE_FILTER_STR) == 0) || 5617 ((*place == PL_MAP) && 5618 strcmp(place_st, IPQOS_PLACE_MAP_STR) == 0)) { 5619 if (strcmp(param, name) == 0) { 5620 found++; 5621 break; 5622 } 5623 } 5624 } 5625 if (found == 0) { 5626 ipqos_msg(MT_ERROR, 5627 gettext("Invalid parameter, %s, line %u.\n"), name, 5628 lineno); 5629 return (IPQOS_CONF_ERR); 5630 } 5631 5632 /* 5633 * set the place parameter to the actual place when the PL_ANY flag 5634 * was set. 5635 */ 5636 if (*place == PL_ANY) { 5637 if (strcmp(place_st, IPQOS_PLACE_PRM_STR) == 0) { 5638 *place = PL_PARAMS; 5639 } else if (strcmp(place_st, IPQOS_PLACE_FILTER_STR) == 0) { 5640 *place = PL_FILTER; 5641 } else if (strcmp(place_st, IPQOS_PLACE_MAP_STR) == 0) { 5642 *place = PL_MAP; 5643 } 5644 } 5645 5646 /* 5647 * get type enumeration 5648 */ 5649 for (x = 0; nv_types[x].string[0]; x++) { 5650 if (strcmp(nv_types[x].string, typest) == 0) { 5651 break; 5652 } 5653 } 5654 /* 5655 * check that we have a type corresponding with the one the types 5656 * file specifies. 5657 */ 5658 if (nv_types[x].string[0] == '\0') { 5659 ipqos_msg(MT_ERROR, 5660 gettext("Types file for module %s is corrupt.\n"), 5661 module_name); 5662 return (IPQOS_CONF_ERR); 5663 } 5664 *type = nv_types[x].value; 5665 5666 /* 5667 * if enumeration type get set of name/vals and any default value 5668 */ 5669 if (*type == IPQOS_DATA_TYPE_ENUM) { 5670 *enum_nvps = read_enum_nvs(lbuf, module_name); 5671 if (*enum_nvps == NULL) { 5672 return (IPQOS_CONF_ERR); 5673 } 5674 5675 dfltst[0] = '\0'; 5676 cp = strchr(lbuf, CURL_END); 5677 (void) sscanf(++cp, 5678 "%" VAL2STR(IPQOS_VALST_MAXLEN) "s", dfltst); 5679 } 5680 5681 5682 IPQOSCDBG2(L1, "read type: %s default: %s\n", nv_types[x].string, 5683 *dfltst ? dfltst : "None"); 5684 return (IPQOS_CONF_SUCCESS); 5685 } 5686 5687 5688 /* 5689 * Reads a name and a value from file ref'd by cfp into list indirectly 5690 * ref'd by nvlp; If this list is NULL it will be created to accomodate 5691 * the name/value. The name must be either a special token for 5692 * for the place, or be present in the module types file ref'd by tfp. 5693 * *type is set to the enumeration of the type of the parameter and 5694 * nvp to point at the element with the nvlp ref'd list. 5695 * RETURNS: IPQOS_CONF_CURL_END if read CURL_END as name, 5696 * IPQOS_CONF_ERR on errors, else IPQOS_CONF_SUCCESS. 5697 */ 5698 static int 5699 readnvpair( 5700 FILE *cfp, 5701 FILE *tfp, 5702 nvlist_t **nvlp, 5703 nvpair_t **nvp, 5704 ipqos_nvtype_t *type, 5705 place_t place, 5706 char *module_name) 5707 { 5708 5709 char *name = NULL; 5710 char *valst = NULL; 5711 int res; 5712 char *tmp; 5713 str_val_nd_t *enum_nvs = NULL; 5714 char dfltst[IPQOS_VALST_MAXLEN+1]; 5715 5716 IPQOSCDBG0(L1, "in readnvpair\n"); 5717 5718 /* 5719 * read nvpair name 5720 */ 5721 res = readtoken(cfp, &name); 5722 5723 /* 5724 * if reached eof, curl end or error encountered return to caller 5725 */ 5726 if (res == IPQOS_CONF_EOF) { 5727 ipqos_msg(MT_ERROR, gettext("Unexpected EOF.\n")); 5728 return (IPQOS_CONF_ERR); 5729 } else if (res == IPQOS_CONF_ERR) { 5730 return (res); 5731 } else if (res == IPQOS_CONF_CURL_END) { 5732 free(name); 5733 return (res); 5734 } 5735 5736 /* 5737 * read nvpair value 5738 */ 5739 res = readtoken(cfp, &valst); 5740 5741 /* 5742 * check we've read a valid value 5743 */ 5744 if (res != IPQOS_CONF_SUCCESS && res != IPQOS_CONF_CURL_BEGIN) { 5745 if (res == IPQOS_CONF_EOF) { 5746 ipqos_msg(MT_ERROR, gettext("Unexpected EOF.\n")); 5747 } else if (res == IPQOS_CONF_CURL_END) { 5748 ipqos_msg(MT_ERROR, 5749 gettext("Missing parameter value line %u.\n"), 5750 lineno); 5751 free(valst); 5752 } /* we do nothing special for IPQOS_CONF_ERR */ 5753 free(name); 5754 return (IPQOS_CONF_ERR); 5755 } 5756 5757 /* 5758 * check for generic parameters. 5759 */ 5760 5761 if ((place == PL_CLASS) && 5762 strcmp(name, IPQOS_CONF_NEXT_ACTION_STR) == 0) { 5763 *type = IPQOS_DATA_TYPE_ACTION; 5764 5765 } else if (place == PL_PARAMS && 5766 strcmp(name, IPQOS_CONF_GLOBAL_STATS_STR) == 0 || 5767 place == PL_CLASS && 5768 strcmp(name, IPQOS_CONF_STATS_ENABLE_STR) == 0) { 5769 *type = IPQOS_DATA_TYPE_BOOLEAN; 5770 5771 } else if (tfp == NULL || 5772 ((place != PL_PARAMS) && strcmp(name, IPQOS_CONF_NAME_STR) == 0) || 5773 (place == PL_FILTER) && (strcmp(name, IPQOS_CONF_CLASS_STR) == 5774 0) || 5775 (place == PL_ACTION) && (strcmp(name, IPQOS_CONF_MODULE_STR) == 5776 0)) { 5777 *type = IPQOS_DATA_TYPE_STRING; 5778 5779 } else { /* if not generic parameter */ 5780 /* 5781 * get type from types file 5782 */ 5783 if (readtype(tfp, module_name, name, type, &enum_nvs, dfltst, 5784 B_FALSE, &place) != IPQOS_CONF_SUCCESS) { 5785 free(name); 5786 free(valst); 5787 return (IPQOS_CONF_ERR); 5788 } 5789 5790 /* 5791 * get full module prefix parameter name 5792 */ 5793 tmp = name; 5794 if ((name = prepend_module_name(name, module_name)) == NULL) { 5795 name = tmp; 5796 goto fail; 5797 } 5798 free(tmp); 5799 } 5800 5801 IPQOSCDBG3(L1, "NVP, name: %s, str_value: %s, type: %s\n", name, 5802 valst, nv_types[*type].string); 5803 5804 5805 /* 5806 * create nvlist if not present already 5807 */ 5808 if (*nvlp == NULL) { 5809 res = nvlist_alloc(nvlp, NV_UNIQUE_NAME, 0); 5810 if (res != 0) { 5811 ipqos_msg(MT_ENOSTR, "nvlist_alloc"); 5812 free(name); 5813 free(valst); 5814 return (IPQOS_CONF_ERR); 5815 } 5816 } 5817 5818 /* 5819 * check we haven't already read this parameter 5820 */ 5821 if (find_nvpair(*nvlp, name)) { 5822 ipqos_msg(MT_ERROR, gettext("Duplicate parameter line %u.\n"), 5823 lineno); 5824 goto fail; 5825 } 5826 5827 /* 5828 * convert value string to appropriate type and add to nvlist 5829 */ 5830 5831 switch (*type) { 5832 case IPQOS_DATA_TYPE_IFNAME: { 5833 uint32_t ifidx; 5834 5835 res = readifindex(valst, (int *)&ifidx); 5836 if (res == IPQOS_CONF_SUCCESS) { 5837 res = nvlist_add_uint32(*nvlp, IPGPC_IF_INDEX, 5838 ifidx); 5839 if (res != 0) { 5840 ipqos_msg(MT_ENOSTR, 5841 "nvlist_add_uint32"); 5842 goto fail; 5843 } 5844 (void) nvlist_remove_all(*nvlp, name); 5845 /* 5846 * change name to point at the name of the 5847 * new ifindex nvlist entry as name is used 5848 * later in the function. 5849 */ 5850 free(name); 5851 name = malloc(strlen(IPGPC_IF_INDEX) + 1); 5852 if (name == NULL) { 5853 ipqos_msg(MT_ENOSTR, "malloc"); 5854 goto fail; 5855 } 5856 (void) strcpy(name, IPGPC_IF_INDEX); 5857 } 5858 break; 5859 } 5860 case IPQOS_DATA_TYPE_PROTO: { 5861 uint8_t proto; 5862 5863 res = readproto(valst, &proto); 5864 if (res == IPQOS_CONF_SUCCESS) { 5865 res = nvlist_add_byte(*nvlp, name, proto); 5866 if (res != 0) { 5867 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 5868 goto fail; 5869 } 5870 } 5871 break; 5872 } 5873 case IPQOS_DATA_TYPE_PORT: { 5874 uint16_t port; 5875 5876 res = readport(valst, &port); 5877 if (res == IPQOS_CONF_SUCCESS) { 5878 5879 /* add port */ 5880 5881 res = nvlist_add_uint16(*nvlp, name, port); 5882 if (res != 0) { 5883 ipqos_msg(MT_ENOSTR, 5884 "nvlist_add_uint16"); 5885 goto fail; 5886 } 5887 5888 /* add appropriate all ones port mask */ 5889 5890 if (strcmp(name, IPGPC_DPORT) == 0) { 5891 res = nvlist_add_uint16(*nvlp, 5892 IPGPC_DPORT_MASK, ~0); 5893 5894 } else if (strcmp(name, IPGPC_SPORT) == 0) { 5895 res = nvlist_add_uint16(*nvlp, 5896 IPGPC_SPORT_MASK, ~0); 5897 } 5898 if (res != 0) { 5899 ipqos_msg(MT_ENOSTR, 5900 "nvlist_add_uint16"); 5901 goto fail; 5902 } 5903 } 5904 break; 5905 } 5906 case IPQOS_DATA_TYPE_ADDRESS: 5907 case IPQOS_DATA_TYPE_ACTION: 5908 case IPQOS_DATA_TYPE_STRING: 5909 res = nvlist_add_string(*nvlp, name, valst); 5910 if (res != 0) { 5911 ipqos_msg(MT_ENOSTR, "nvlist_add_string"); 5912 goto fail; 5913 } 5914 break; 5915 case IPQOS_DATA_TYPE_BOOLEAN: { 5916 boolean_t b; 5917 5918 res = readbool(valst, &b); 5919 if (res == IPQOS_CONF_SUCCESS) { 5920 res = nvlist_add_uint32(*nvlp, name, 5921 (uint32_t)b); 5922 if (res != 0) { 5923 ipqos_msg(MT_ENOSTR, 5924 "nvlist_add_uint32"); 5925 goto fail; 5926 } 5927 } 5928 break; 5929 } 5930 case IPQOS_DATA_TYPE_UINT8: { 5931 uint8_t u8; 5932 5933 res = readuint8(valst, &u8, &tmp); 5934 if (res == IPQOS_CONF_SUCCESS) { 5935 res = nvlist_add_byte(*nvlp, name, u8); 5936 if (res != 0) { 5937 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 5938 goto fail; 5939 } 5940 } 5941 break; 5942 } 5943 case IPQOS_DATA_TYPE_INT16: { 5944 int16_t i16; 5945 5946 res = readint16(valst, &i16, &tmp); 5947 if (res == IPQOS_CONF_SUCCESS) { 5948 res = nvlist_add_int16(*nvlp, name, i16); 5949 if (res != 0) { 5950 ipqos_msg(MT_ENOSTR, 5951 "nvlist_add_int16"); 5952 goto fail; 5953 } 5954 } 5955 break; 5956 } 5957 case IPQOS_DATA_TYPE_UINT16: { 5958 uint16_t u16; 5959 5960 res = readuint16(valst, &u16, &tmp); 5961 if (res == IPQOS_CONF_SUCCESS) { 5962 res = nvlist_add_uint16(*nvlp, name, u16); 5963 if (res != 0) { 5964 ipqos_msg(MT_ENOSTR, 5965 "nvlist_add_int16"); 5966 goto fail; 5967 } 5968 } 5969 break; 5970 } 5971 case IPQOS_DATA_TYPE_INT32: { 5972 int i32; 5973 5974 res = readint32(valst, &i32, &tmp); 5975 if (res == IPQOS_CONF_SUCCESS) { 5976 res = nvlist_add_int32(*nvlp, name, i32); 5977 if (res != 0) { 5978 ipqos_msg(MT_ENOSTR, 5979 "nvlist_add_int32"); 5980 goto fail; 5981 } 5982 } 5983 break; 5984 } 5985 case IPQOS_DATA_TYPE_UINT32: { 5986 uint32_t u32; 5987 5988 res = readuint32(valst, &u32, &tmp); 5989 if (res == IPQOS_CONF_SUCCESS) { 5990 res = nvlist_add_uint32(*nvlp, name, u32); 5991 if (res != 0) { 5992 ipqos_msg(MT_ENOSTR, 5993 "nvlist_add_uint32"); 5994 goto fail; 5995 } 5996 } 5997 break; 5998 } 5999 case IPQOS_DATA_TYPE_ENUM: { 6000 uint32_t val; 6001 6002 res = read_enum_value(cfp, valst, enum_nvs, &val); 6003 if (res == IPQOS_CONF_SUCCESS) { 6004 res = nvlist_add_uint32(*nvlp, name, val); 6005 if (res != 0) { 6006 ipqos_msg(MT_ENOSTR, 6007 "nvlist_add_uint32"); 6008 goto fail; 6009 } 6010 } else { 6011 goto fail; 6012 } 6013 break; 6014 } 6015 /* 6016 * For now the dfltst contains a comma separated list of the 6017 * type we need this parameter to be mapped to. 6018 * read_mapped_values will fill in all the mapped parameters 6019 * and their values in the nvlist. 6020 */ 6021 case IPQOS_DATA_TYPE_M_INDEX: { 6022 uint8_t u8; 6023 6024 res = readuint8(valst, &u8, &tmp); 6025 if (res == IPQOS_CONF_SUCCESS) { 6026 res = nvlist_add_byte(*nvlp, name, u8); 6027 if (res != 0) { 6028 ipqos_msg(MT_ENOSTR, 6029 "nvlist_add_uint8"); 6030 goto fail; 6031 } 6032 } else { 6033 *type = IPQOS_DATA_TYPE_UINT8; 6034 break; 6035 } 6036 res = read_mapped_values(tfp, nvlp, module_name, 6037 dfltst, u8); 6038 if (res != IPQOS_CONF_SUCCESS) { 6039 goto fail; 6040 } 6041 break; 6042 } 6043 case IPQOS_DATA_TYPE_INT_ARRAY: { 6044 str_val_nd_t *arr_enum_nvs = NULL; 6045 uint32_t size; 6046 int llimit = 0, ulimit = 0; 6047 int *arr; 6048 6049 /* 6050 * read array info from types file. 6051 */ 6052 res = read_int_array_info(dfltst, &arr_enum_nvs, &size, 6053 &llimit, &ulimit, module_name); 6054 if (res != IPQOS_CONF_SUCCESS) { 6055 goto fail; 6056 } 6057 6058 /* 6059 * read array contents from config file and construct 6060 * array with them. 6061 */ 6062 res = read_int_array(cfp, valst, &arr, size, llimit, 6063 ulimit, arr_enum_nvs); 6064 if (res != IPQOS_CONF_SUCCESS) { 6065 goto fail; 6066 } 6067 6068 /* 6069 * add array to nvlist. 6070 */ 6071 res = nvlist_add_int32_array(*nvlp, name, arr, size); 6072 if (res != 0) { 6073 ipqos_msg(MT_ENOSTR, "nvlist_add_int32"); 6074 goto fail; 6075 } 6076 6077 /* 6078 * free uneeded resources. 6079 */ 6080 free(arr); 6081 if (arr_enum_nvs) 6082 free_str_val_entrys(arr_enum_nvs); 6083 6084 break; 6085 } 6086 case IPQOS_DATA_TYPE_USER: { 6087 uid_t uid; 6088 6089 res = readuser(valst, &uid); 6090 if (res == IPQOS_CONF_SUCCESS) { 6091 res = nvlist_add_int32(*nvlp, name, (int)uid); 6092 if (res != 0) { 6093 ipqos_msg(MT_ENOSTR, 6094 "nvlist_add_int32"); 6095 goto fail; 6096 } 6097 } 6098 break; 6099 } 6100 #ifdef _IPQOS_CONF_DEBUG 6101 default: { 6102 /* 6103 * we shouldn't have a type that doesn't have a switch 6104 * entry. 6105 */ 6106 assert(1); 6107 } 6108 #endif 6109 } 6110 if (res != 0) { 6111 ipqos_msg(MT_ERROR, gettext("Invalid %s, line %u.\n"), 6112 nv_types[*type].string, lineno); 6113 goto fail; 6114 } 6115 6116 /* set the nvp parameter to point at the newly added nvlist entry */ 6117 6118 *nvp = find_nvpair(*nvlp, name); 6119 6120 free(name); 6121 free(valst); 6122 if (enum_nvs) 6123 free_str_val_entrys(enum_nvs); 6124 return (IPQOS_CONF_SUCCESS); 6125 fail: 6126 if (name != NULL) 6127 free(name); 6128 if (valst != NULL) 6129 free(valst); 6130 if (enum_nvs != NULL) 6131 free_str_val_entrys(enum_nvs); 6132 return (IPQOS_CONF_ERR); 6133 } 6134 6135 /* 6136 * read a parameter clause from cfp into *params. 6137 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 6138 */ 6139 static int 6140 readparams( 6141 FILE *cfp, 6142 FILE *tfp, 6143 char *module_name, 6144 ipqos_conf_params_t *params) 6145 { 6146 6147 int res; 6148 nvpair_t *nvp; 6149 ipqos_nvtype_t type; 6150 boolean_t bl; 6151 char *nm; 6152 char *action; 6153 char tmp[IPQOS_CONF_PNAME_LEN]; 6154 int read_stats = 0; 6155 6156 IPQOSCDBG0(L0, "in readparams\n"); 6157 6158 /* read beginning curl */ 6159 6160 res = read_curl_begin(cfp); 6161 if (res != IPQOS_CONF_SUCCESS) { 6162 return (res); 6163 } 6164 6165 /* 6166 * loop reading nvpairs, adding to params nvlist until encounter 6167 * CURL_END. 6168 */ 6169 for (;;) { 6170 /* read nvpair */ 6171 6172 res = readnvpair(cfp, tfp, ¶ms->nvlist, 6173 &nvp, &type, PL_PARAMS, module_name); 6174 if (res == IPQOS_CONF_ERR) { 6175 goto fail; 6176 6177 /* we have finished reading params */ 6178 6179 } else if (res == IPQOS_CONF_CURL_END) { 6180 break; 6181 } 6182 6183 /* 6184 * read global stats - place into params struct and remove 6185 * from nvlist. 6186 */ 6187 if (strcmp(nvpair_name(nvp), IPQOS_CONF_GLOBAL_STATS_STR) == 6188 0) { 6189 /* check we haven't read stats before */ 6190 6191 if (read_stats) { 6192 ipqos_msg(MT_ERROR, 6193 gettext("Duplicate parameter line %u.\n"), 6194 lineno); 6195 goto fail; 6196 } 6197 read_stats++; 6198 6199 (void) nvpair_value_uint32(nvp, (uint32_t *)&bl); 6200 params->stats_enable = bl; 6201 (void) nvlist_remove_all(params->nvlist, 6202 IPQOS_CONF_GLOBAL_STATS_STR); 6203 6204 6205 /* 6206 * read action type parameter - add it to list of action refs. 6207 * also, if it's one of continue or drop virtual actions 6208 * change the action name to their special ipp names in 6209 * the action ref list and the nvlist. 6210 */ 6211 } else if (type == IPQOS_DATA_TYPE_ACTION) { 6212 6213 /* get name and value from nvlist */ 6214 6215 nm = nvpair_name(nvp); 6216 (void) nvpair_value_string(nvp, &action); 6217 6218 /* if virtual action names change to ipp name */ 6219 6220 if ((strcmp(action, IPQOS_CONF_CONT_STR) == 0) || 6221 strcmp(action, IPQOS_CONF_DROP_STR) == 0) { 6222 /* 6223 * we copy nm to a seperate buffer as nv_pair 6224 * name above gave us a ptr to internal 6225 * memory which causes strange behaviour 6226 * when we re-value that nvlist element. 6227 */ 6228 (void) strlcpy(tmp, nm, sizeof (tmp)); 6229 nm = tmp; 6230 6231 6232 /* modify nvlist entry and change action */ 6233 6234 if (strcmp(action, IPQOS_CONF_CONT_STR) == 0) { 6235 action = IPP_ANAME_CONT; 6236 res = nvlist_add_string(params->nvlist, 6237 nm, action); 6238 } else { 6239 action = IPP_ANAME_DROP; 6240 res = nvlist_add_string(params->nvlist, 6241 nm, action); 6242 } 6243 if (res != 0) { 6244 ipqos_msg(MT_ENOSTR, 6245 "nvlist_add_string"); 6246 goto fail; 6247 } 6248 } 6249 6250 /* add action reference to params */ 6251 6252 res = add_aref(¶ms->actions, nm, action); 6253 } 6254 } 6255 6256 return (IPQOS_CONF_SUCCESS); 6257 fail: 6258 6259 if (params->nvlist) { 6260 nvlist_free(params->nvlist); 6261 params->nvlist = NULL; 6262 } 6263 if (params->actions) { 6264 free_arefs(params->actions); 6265 params->actions = NULL; 6266 } 6267 return (IPQOS_CONF_ERR); 6268 } 6269 6270 /* ************************* class manip fns ****************************** */ 6271 6272 6273 6274 /* 6275 * make dst point at a dupicate class struct with duplicate elements to src. 6276 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 6277 */ 6278 static int 6279 dup_class( 6280 ipqos_conf_class_t *src, 6281 ipqos_conf_class_t **dst) 6282 { 6283 6284 ipqos_conf_class_t *cls; 6285 int res; 6286 6287 IPQOSCDBG1(DIFF, "In dup_class: class: %s\n", src->name); 6288 cls = alloc_class(); 6289 if (cls == NULL) { 6290 return (IPQOS_CONF_ERR); 6291 } 6292 6293 /* struct copy */ 6294 *cls = *src; 6295 6296 /* we're not interested in the nvlist for a class */ 6297 cls->nvlist = NULL; 6298 6299 6300 /* copy first action reference */ 6301 cls->alist = NULL; 6302 res = add_aref(&cls->alist, src->alist->field, src->alist->name); 6303 if (res != IPQOS_CONF_SUCCESS) { 6304 free(cls); 6305 return (res); 6306 } 6307 6308 *dst = cls; 6309 6310 return (IPQOS_CONF_SUCCESS); 6311 } 6312 6313 /* 6314 * create a zero'd class struct and return a ptr to it. 6315 * RETURNS: ptr to struct on success, NULL otherwise. 6316 */ 6317 static ipqos_conf_class_t * 6318 alloc_class() 6319 { 6320 6321 ipqos_conf_class_t *class; 6322 6323 class = malloc(sizeof (ipqos_conf_class_t)); 6324 if (class) { 6325 bzero(class, sizeof (ipqos_conf_class_t)); 6326 } else { 6327 ipqos_msg(MT_ENOSTR, "malloc"); 6328 } 6329 6330 return (class); 6331 } 6332 6333 /* frees up all memory occupied by a filter struct and its contents. */ 6334 static void 6335 free_class(ipqos_conf_class_t *cls) 6336 { 6337 6338 if (cls == NULL) 6339 return; 6340 6341 /* free its nvlist if present */ 6342 6343 nvlist_free(cls->nvlist); 6344 6345 /* free its action refs if present */ 6346 6347 if (cls->alist) 6348 free_arefs(cls->alist); 6349 6350 /* finally free class itself */ 6351 free(cls); 6352 } 6353 6354 /* 6355 * Checks whether there is a class called class_nm in classes list. 6356 * RETURNS: ptr to first matched class, else if not matched NULL. 6357 */ 6358 static ipqos_conf_class_t * 6359 classexist( 6360 char *class_nm, 6361 ipqos_conf_class_t *classes) 6362 { 6363 6364 ipqos_conf_class_t *cls; 6365 6366 IPQOSCDBG1(L1, "In classexist: name: %s\n", class_nm); 6367 6368 for (cls = classes; cls; cls = cls->next) { 6369 if (strcmp(class_nm, cls->name) == 0) { 6370 break; 6371 } 6372 } 6373 6374 return (cls); 6375 } 6376 6377 6378 6379 /* ************************** filter manip fns **************************** */ 6380 6381 6382 6383 /* 6384 * Checks whether there is a filter called filter_nm with instance number 6385 * instance in filters list created by us or permanent. Instance value -1 6386 * is a wildcard. 6387 * RETURNS: ptr to first matched filter, else if not matched NULL. 6388 */ 6389 static ipqos_conf_filter_t * 6390 filterexist( 6391 char *filter_nm, 6392 int instance, 6393 ipqos_conf_filter_t *filters) 6394 { 6395 6396 IPQOSCDBG2(L1, "In filterexist: name :%s, inst: %d\n", filter_nm, 6397 instance); 6398 6399 while (filters) { 6400 if (strcmp(filters->name, filter_nm) == 0 && 6401 (instance == -1 || filters->instance == instance) && 6402 (filters->originator == IPP_CONFIG_IPQOSCONF || 6403 filters->originator == IPP_CONFIG_PERMANENT)) { 6404 break; 6405 } 6406 filters = filters->next; 6407 } 6408 return (filters); 6409 } 6410 6411 /* 6412 * allocate and zero a filter structure. 6413 * RETURNS: NULL on error, else ptr to filter struct. 6414 */ 6415 static ipqos_conf_filter_t * 6416 alloc_filter() 6417 { 6418 6419 ipqos_conf_filter_t *flt; 6420 6421 flt = malloc(sizeof (ipqos_conf_filter_t)); 6422 if (flt) { 6423 bzero(flt, sizeof (ipqos_conf_filter_t)); 6424 flt->instance = -1; 6425 } else { 6426 ipqos_msg(MT_ENOSTR, "malloc"); 6427 } 6428 6429 return (flt); 6430 } 6431 6432 /* free flt and all it's contents. */ 6433 6434 static void 6435 free_filter(ipqos_conf_filter_t *flt) 6436 { 6437 6438 IPQOSCDBG2(L1, "In free_filter: filter: %s, inst: %d\n", flt->name, 6439 flt->instance); 6440 6441 if (flt == NULL) 6442 return; 6443 6444 if (flt->src_nd_name) 6445 free(flt->src_nd_name); 6446 if (flt->dst_nd_name) 6447 free(flt->dst_nd_name); 6448 if (flt->nvlist) { 6449 nvlist_free(flt->nvlist); 6450 } 6451 free(flt); 6452 } 6453 6454 /* 6455 * makes a copy of ofilter and its contents and points nfilter at it. It 6456 * also adds an instance number to the filter and if either saddr or 6457 * daddr are non-null that address to the filters nvlist along with 6458 * an all 1s address mask and the af. 6459 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 6460 */ 6461 static int 6462 dup_filter( 6463 ipqos_conf_filter_t *ofilter, 6464 ipqos_conf_filter_t **nfilter, 6465 int af, 6466 int inv6, /* if saddr or daddr set and v4 filter are they in v6 addr */ 6467 void *saddr, 6468 void *daddr, 6469 int inst) 6470 { 6471 6472 ipqos_conf_filter_t *nf; 6473 int res; 6474 in6_addr_t v6addr; 6475 in6_addr_t all_1s_v6; 6476 6477 IPQOSCDBG4(MHME, "In dup_filter: name: %s, af: %u, inv6: %u, ins: %d\n", 6478 ofilter->name, af, inv6, inst); 6479 6480 /* show src address and dst address if present */ 6481 #ifdef _IPQOS_CONF_DEBUG 6482 if (ipqosconf_dbg_flgs & MHME) { 6483 char st[100]; 6484 6485 if (saddr) { 6486 (void) fprintf(stderr, "saddr: %s\n", 6487 inet_ntop(inv6 ? AF_INET6 : AF_INET, saddr, st, 6488 100)); 6489 } 6490 6491 if (daddr) { 6492 (void) fprintf(stderr, "daddr: %s\n", 6493 inet_ntop(inv6 ? AF_INET6 : AF_INET, daddr, st, 6494 100)); 6495 } 6496 } 6497 #endif /* _IPQOS_CONF_DEBUG */ 6498 6499 /* init local v6 address to 0 */ 6500 (void) bzero(&v6addr, sizeof (in6_addr_t)); 6501 6502 /* create an all 1s address for use as mask */ 6503 (void) memset(&all_1s_v6, ~0, sizeof (in6_addr_t)); 6504 6505 /* create a new filter */ 6506 6507 nf = alloc_filter(); 6508 if (nf == NULL) { 6509 return (IPQOS_CONF_ERR); 6510 } 6511 6512 /* struct copy old filter to new */ 6513 *nf = *ofilter; 6514 6515 /* copy src filters nvlist if there is one to copy */ 6516 6517 if (ofilter->nvlist) { 6518 res = nvlist_dup(ofilter->nvlist, &nf->nvlist, 0); 6519 if (res != 0) { 6520 ipqos_msg(MT_ENOSTR, "nvlist_dup"); 6521 goto fail; 6522 } 6523 } 6524 6525 /* copy src and dst node names if present */ 6526 6527 if (ofilter->src_nd_name) { 6528 nf->src_nd_name = malloc(strlen(ofilter->src_nd_name) + 1); 6529 if (nf->src_nd_name == NULL) { 6530 ipqos_msg(MT_ENOSTR, "malloc"); 6531 goto fail; 6532 } 6533 (void) strcpy(nf->src_nd_name, ofilter->src_nd_name); 6534 } 6535 if (ofilter->dst_nd_name) { 6536 nf->dst_nd_name = malloc(strlen(ofilter->dst_nd_name) + 1); 6537 if (nf->dst_nd_name == NULL) { 6538 ipqos_msg(MT_ENOSTR, "malloc"); 6539 goto fail; 6540 } 6541 (void) strcpy(nf->dst_nd_name, ofilter->dst_nd_name); 6542 } 6543 6544 /* add filter addresses type */ 6545 6546 res = nvlist_add_byte(nf->nvlist, IPGPC_FILTER_TYPE, 6547 af == AF_INET ? IPGPC_V4_FLTR : IPGPC_V6_FLTR); 6548 if (res != 0) { 6549 ipqos_msg(MT_ENOSTR, "nvlist_add_byte"); 6550 goto fail; 6551 } 6552 IPQOSCDBG1(MHME, "adding address type %s in dup filter\n", 6553 af == AF_INET ? "AF_INET" : "AF_INET6"); 6554 6555 /* add saddr if present */ 6556 6557 if (saddr) { 6558 if (af == AF_INET && !inv6) { 6559 V4_PART_OF_V6(v6addr) = *(uint32_t *)saddr; 6560 saddr = &v6addr; 6561 } 6562 6563 /* add address and all 1's mask */ 6564 6565 if (nvlist_add_uint32_array(nf->nvlist, IPGPC_SADDR, 6566 (uint32_t *)saddr, 4) != 0 || 6567 nvlist_add_uint32_array(nf->nvlist, IPGPC_SADDR_MASK, 6568 (uint32_t *)&all_1s_v6, 4) != 0) { 6569 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32_array"); 6570 goto fail; 6571 } 6572 6573 } 6574 6575 /* add daddr if present */ 6576 6577 if (daddr) { 6578 if (af == AF_INET && !inv6) { 6579 V4_PART_OF_V6(v6addr) = *(uint32_t *)daddr; 6580 daddr = &v6addr; 6581 } 6582 6583 /* add address and all 1's mask */ 6584 6585 if (nvlist_add_uint32_array(nf->nvlist, IPGPC_DADDR, 6586 (uint32_t *)daddr, 4) != 0 || 6587 nvlist_add_uint32_array(nf->nvlist, IPGPC_DADDR_MASK, 6588 (uint32_t *)&all_1s_v6, 4) != 0) { 6589 ipqos_msg(MT_ENOSTR, "nvlist_add_uint32_array"); 6590 goto fail; 6591 } 6592 } 6593 6594 /* add filter instance */ 6595 6596 nf->instance = inst; 6597 6598 *nfilter = nf; 6599 return (IPQOS_CONF_SUCCESS); 6600 fail: 6601 free_filter(nf); 6602 return (IPQOS_CONF_ERR); 6603 } 6604 6605 6606 6607 /* ************************* action manip fns ********************** */ 6608 6609 6610 6611 /* 6612 * create and zero action structure and a params structure hung off of it. 6613 * RETURNS: ptr to allocated action on success, else NULL. 6614 */ 6615 static ipqos_conf_action_t * 6616 alloc_action() 6617 { 6618 6619 ipqos_conf_action_t *action; 6620 6621 action = (ipqos_conf_action_t *)malloc(sizeof (ipqos_conf_action_t)); 6622 if (action == NULL) { 6623 ipqos_msg(MT_ENOSTR, "malloc"); 6624 return (action); 6625 } 6626 bzero(action, sizeof (ipqos_conf_action_t)); 6627 6628 action->params = (ipqos_conf_params_t *) 6629 malloc(sizeof (ipqos_conf_params_t)); 6630 if (action->params == NULL) { 6631 free(action); 6632 return (NULL); 6633 } 6634 bzero(action->params, sizeof (ipqos_conf_params_t)); 6635 action->params->stats_enable = B_FALSE; 6636 6637 return (action); 6638 } 6639 6640 /* 6641 * free all the memory used in all the actions in actions list. 6642 */ 6643 static void 6644 free_actions( 6645 ipqos_conf_action_t *actions) 6646 { 6647 6648 ipqos_conf_action_t *act = actions; 6649 ipqos_conf_action_t *next; 6650 ipqos_conf_filter_t *flt, *nf; 6651 ipqos_conf_class_t *cls, *nc; 6652 6653 while (act != NULL) { 6654 /* free parameters */ 6655 6656 if (act->params != NULL) { 6657 free_arefs(act->params->actions); 6658 if (act->params->nvlist != NULL) { 6659 nvlist_free(act->params->nvlist); 6660 } 6661 free(act->params); 6662 } 6663 6664 /* free action nvlist */ 6665 6666 if (act->nvlist != NULL) 6667 free(act->nvlist); 6668 6669 /* free filters */ 6670 6671 flt = act->filters; 6672 while (flt != NULL) { 6673 nf = flt->next; 6674 free_filter(flt); 6675 flt = nf; 6676 } 6677 6678 /* free classes */ 6679 6680 cls = act->classes; 6681 while (cls != NULL) { 6682 nc = cls->next; 6683 free_class(cls); 6684 cls = nc; 6685 } 6686 6687 /* free permanent classes table */ 6688 cleanup_string_table(act->perm_classes, act->num_perm_classes); 6689 6690 /* free filters to retry */ 6691 6692 flt = act->retry_filters; 6693 while (flt != NULL) { 6694 nf = flt->next; 6695 free_filter(flt); 6696 flt = nf; 6697 } 6698 6699 /* free dependency pointers */ 6700 free_arefs(act->dependencies); 6701 6702 next = act->next; 6703 free(act); 6704 act = next; 6705 } 6706 } 6707 6708 /* 6709 * Checks whether there is an action called action_name in actions list. 6710 * RETURNS: ptr to first matched action, else if not matched NULL. 6711 * 6712 */ 6713 static ipqos_conf_action_t * 6714 actionexist( 6715 char *action_name, 6716 ipqos_conf_action_t *actions) 6717 { 6718 6719 IPQOSCDBG1(L1, "In actionexist: name: %s\n", action_name); 6720 6721 while (actions) { 6722 if (strcmp(action_name, actions->name) == 0) { 6723 break; 6724 } 6725 actions = actions->next; 6726 } 6727 6728 return (actions); 6729 } 6730 6731 /* **************************** act ref manip fns ******************** */ 6732 6733 6734 /* 6735 * add an action reference element with parameter field and action 6736 * action_name to arefs. 6737 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 6738 */ 6739 static int 6740 add_aref( 6741 ipqos_conf_act_ref_t **arefs, 6742 char *field, 6743 char *action_name) 6744 { 6745 6746 ipqos_conf_act_ref_t *aref; 6747 6748 IPQOSCDBG1(L1, "add_aref: action: %s.\n", action_name); 6749 6750 /* allocate zero'd aref */ 6751 6752 aref = malloc(sizeof (ipqos_conf_act_ref_t)); 6753 if (aref == NULL) { 6754 ipqos_msg(MT_ENOSTR, "malloc"); 6755 return (IPQOS_CONF_ERR); 6756 } 6757 (void) bzero(aref, sizeof (ipqos_conf_act_ref_t)); 6758 6759 /* copy parameter name if present */ 6760 6761 if (field) 6762 (void) strlcpy(aref->field, field, IPQOS_CONF_PNAME_LEN); 6763 6764 /* copy action name */ 6765 (void) strlcpy(aref->name, action_name, IPQOS_CONF_NAME_LEN); 6766 6767 /* place at head of list */ 6768 6769 aref->next = *arefs; 6770 *arefs = aref; 6771 6772 return (IPQOS_CONF_SUCCESS); 6773 } 6774 6775 /* 6776 * free all the memory used by the action references in arefs. 6777 */ 6778 static void 6779 free_arefs( 6780 ipqos_conf_act_ref_t *arefs) 6781 { 6782 6783 ipqos_conf_act_ref_t *aref = arefs; 6784 ipqos_conf_act_ref_t *next; 6785 6786 while (aref) { 6787 nvlist_free(aref->nvlist); 6788 next = aref->next; 6789 free(aref); 6790 aref = next; 6791 } 6792 } 6793 6794 6795 6796 /* *************************************************************** */ 6797 6798 6799 6800 /* 6801 * checks whether aname is a valid action name. 6802 * RETURNS: IPQOS_CONF_ERR if invalid, else IPQOS_CONF_SUCCESS. 6803 */ 6804 static int 6805 valid_aname(char *aname) 6806 { 6807 6808 /* 6809 * dissallow the use of the name of a virtual action, either 6810 * the ipqosconf name, or the longer ipp names. 6811 */ 6812 if (strcmp(aname, IPQOS_CONF_CONT_STR) == 0 || 6813 strcmp(aname, IPQOS_CONF_DEFER_STR) == 0 || 6814 strcmp(aname, IPQOS_CONF_DROP_STR) == 0 || 6815 virtual_action(aname)) { 6816 ipqos_msg(MT_ERROR, gettext("Invalid action name line %u.\n"), 6817 lineno); 6818 return (IPQOS_CONF_ERR); 6819 } 6820 6821 return (IPQOS_CONF_SUCCESS); 6822 } 6823 6824 /* 6825 * Opens a stream to the types file for module module_name (assuming 6826 * that the file path is TYPES_FILE_DIR/module_name.types). if 6827 * a file open failure occurs, *openerr is set to 1. 6828 * RETURNS: NULL on error, else stream ptr to module types file. 6829 */ 6830 static FILE * 6831 validmod( 6832 char *module_name, 6833 int *openerr) 6834 { 6835 6836 FILE *fp; 6837 char *path; 6838 6839 IPQOSCDBG1(L1, "In validmod: module_name: %s\n", module_name); 6840 6841 *openerr = 0; 6842 6843 /* create modules type file path */ 6844 6845 path = malloc(strlen(TYPES_FILE_DIR) + strlen(module_name) + 6846 strlen(".types") + 1); 6847 if (path == NULL) { 6848 ipqos_msg(MT_ENOSTR, "malloc"); 6849 return (NULL); 6850 } 6851 (void) strcpy(path, TYPES_FILE_DIR); 6852 (void) strcat(path, module_name); 6853 (void) strcat(path, ".types"); 6854 6855 6856 IPQOSCDBG1(L1, "opening file %s\n", path); 6857 6858 /* open stream to types file */ 6859 6860 fp = fopen(path, "r"); 6861 if (fp == NULL) { 6862 (*openerr)++; 6863 } 6864 6865 free(path); 6866 return (fp); 6867 } 6868 6869 6870 /* 6871 * read a class clause from cfp into a class struct and point class at this. 6872 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 6873 */ 6874 static int 6875 readclass( 6876 FILE *cfp, 6877 char *module_name, 6878 ipqos_conf_class_t **class, 6879 char **perm_classes, 6880 int num_perm_classes) 6881 { 6882 6883 int nm, act; 6884 int res; 6885 nvpair_t *nvp; 6886 ipqos_nvtype_t type; 6887 char *name; 6888 char *action; 6889 int stats; 6890 6891 IPQOSCDBG0(L0, "in readclass\n"); 6892 6893 /* create and zero class struct */ 6894 6895 *class = alloc_class(); 6896 if (!*class) { 6897 return (IPQOS_CONF_ERR); 6898 } 6899 (*class)->originator = IPP_CONFIG_IPQOSCONF; 6900 6901 /* get starting line for error reporting */ 6902 (*class)->lineno = lineno; 6903 6904 /* read curl_begin */ 6905 6906 res = read_curl_begin(cfp); 6907 if (res != IPQOS_CONF_SUCCESS) { 6908 goto fail; 6909 } 6910 6911 /* loop reading parameters till read curl_end */ 6912 6913 stats = nm = act = 0; 6914 for (;;) { 6915 /* read nvpair */ 6916 res = readnvpair(cfp, NULL, &(*class)->nvlist, 6917 &nvp, &type, PL_CLASS, module_name); 6918 if (res == IPQOS_CONF_ERR) { 6919 goto fail; 6920 6921 /* reached end of class clause */ 6922 } else if (res == IPQOS_CONF_CURL_END) { 6923 break; 6924 } 6925 6926 /* 6927 * catch name and action nv pairs and stats if present 6928 * and place values in class structure. 6929 */ 6930 6931 /* name */ 6932 6933 if (nm == 0 && 6934 strcmp(nvpair_name(nvp), IPQOS_CONF_NAME_STR) == 0) { 6935 6936 (void) nvpair_value_string(nvp, &name); 6937 6938 if (valid_name(name) != IPQOS_CONF_SUCCESS) { 6939 goto fail; 6940 } 6941 (void) strcpy((*class)->name, name); 6942 nm++; 6943 6944 /* next action */ 6945 6946 } else if (act == 0 && 6947 strcmp(nvpair_name(nvp), IPQOS_CONF_NEXT_ACTION_STR) == 0) { 6948 6949 (void) nvpair_value_string(nvp, &action); 6950 6951 /* 6952 * if next action string continue string set action to 6953 * IPP_ANAME_CONT, else if drop string IPP_ANAME_DROP 6954 */ 6955 if (strcmp(action, IPQOS_CONF_CONT_STR) == 0) { 6956 action = IPP_ANAME_CONT; 6957 } else if (strcmp(action, IPQOS_CONF_DROP_STR) == 0) { 6958 action = IPP_ANAME_DROP; 6959 } 6960 6961 /* add an action reference to action list */ 6962 6963 res = add_aref(&(*class)->alist, 6964 IPQOS_CONF_NEXT_ACTION_STR, action); 6965 if (res != IPQOS_CONF_SUCCESS) { 6966 goto fail; 6967 } 6968 act++; 6969 6970 /* class stats enable */ 6971 6972 } else if (stats == 0 && 6973 strcmp(nvpair_name(nvp), IPQOS_CONF_STATS_ENABLE_STR) == 6974 0) { 6975 boolean_t bl; 6976 6977 (void) nvpair_value_uint32(nvp, (uint32_t *)&bl); 6978 (*class)->stats_enable = bl; 6979 6980 stats++; 6981 6982 /* no other / duplicate parameters allowed */ 6983 6984 } else { 6985 ipqos_msg(MT_ERROR, 6986 gettext("Unexpected parameter line %u.\n"), lineno); 6987 goto fail; 6988 } 6989 } 6990 if (nm == 0 || act == 0) { 6991 ipqos_msg(MT_ERROR, 6992 gettext("Missing class name/next action before line %u.\n"), 6993 lineno); 6994 goto fail; 6995 } 6996 6997 /* change class originator field to permanent if permanent class */ 6998 6999 if (in_string_table(perm_classes, num_perm_classes, (*class)->name)) { 7000 IPQOSCDBG1(L0, "Setting class %s as permanent.\n", (*class)->name); 7001 (*class)->originator = IPP_CONFIG_PERMANENT; 7002 } 7003 7004 return (IPQOS_CONF_SUCCESS); 7005 fail: 7006 if (*class) 7007 free_class(*class); 7008 return (IPQOS_CONF_ERR); 7009 } 7010 7011 /* 7012 * This function assumes either src_nd_name or dst_node_nm are set in filter. 7013 * 7014 * Creates one of more copies of filter according to the ip versions 7015 * requested (or assumed) and the resolution of the src and dst address 7016 * node names if spec'd. If both node names are spec'd then a filter is 7017 * created for each pair of addresses (one from each node name) that is 7018 * compatible with the chosen address family, otherwise a filter copy is 7019 * created for just each address of the single node name that is 7020 * compatible. 7021 * If filter->ip_versions has been set that is used to determine the 7022 * af's we will create filters for, else if a numeric address was 7023 * added the family of that will be used, otherwise we fall back 7024 * to both v4 and v6 addresses. 7025 * 7026 * Any name lookup failures that occur are checked to see whether the failure 7027 * was a soft or hard failure and the nlerr field of filter set accordingly 7028 * before the error is returned. 7029 * 7030 * RETURNS: IPQOS_CONF_ERR on any error, else IPQOS_CONF_SUCCESS. 7031 */ 7032 7033 static int 7034 domultihome( 7035 ipqos_conf_filter_t *filter, 7036 ipqos_conf_filter_t **flist, 7037 boolean_t last_retry) 7038 { 7039 7040 uint32_t ftype; 7041 int v4 = 1, v6 = 1; /* default lookup family is v4 and v6 */ 7042 int saf, daf; 7043 struct hostent *shp = NULL; 7044 struct hostent *dhp = NULL; 7045 in6_addr_t daddr, saddr; 7046 int idx = 0; 7047 ipqos_conf_filter_t *nfilter; 7048 int res; 7049 int ernum; 7050 int in32b = 0; 7051 char **sp, **dp; 7052 7053 IPQOSCDBG3(MHME, "In domultihome: filter: %s, src_node: %s, " 7054 "dst_node: %s\n", filter->name, 7055 (filter->src_nd_name ? filter->src_nd_name : "NULL"), 7056 (filter->dst_nd_name ? filter->dst_nd_name : "NULL")); 7057 7058 /* check if we've read an ip_version request to get the versions */ 7059 7060 if (filter->ip_versions != 0) { 7061 v4 = VERSION_IS_V4(filter); 7062 v6 = VERSION_IS_V6(filter); 7063 7064 /* otherwise check if we've read a numeric address and get versions */ 7065 7066 } else if (nvlist_lookup_uint32(filter->nvlist, IPGPC_FILTER_TYPE, 7067 &ftype) == 0) { 7068 if (ftype == IPGPC_V4_FLTR) { 7069 v6--; 7070 } else { 7071 v4--; 7072 } 7073 } 7074 7075 /* read saddrs if src node name */ 7076 7077 if (filter->src_nd_name) { 7078 7079 /* v4 only address */ 7080 7081 if (v4 && !v6) { 7082 in32b++; 7083 shp = getipnodebyname(filter->src_nd_name, AF_INET, 7084 AI_ADDRCONFIG, &ernum); 7085 7086 /* v6 only */ 7087 7088 } else if (v6 && !v4) { 7089 shp = getipnodebyname(filter->src_nd_name, AF_INET6, 7090 AI_DEFAULT, &ernum); 7091 7092 /* v4 and v6 */ 7093 7094 } else if (v6 && v4) { 7095 shp = getipnodebyname(filter->src_nd_name, AF_INET6, 7096 AI_DEFAULT|AI_ALL, &ernum); 7097 } 7098 7099 #ifdef TESTING_RETRY 7100 if (!last_retry) { 7101 filter->nlerr = IPQOS_LOOKUP_RETRY; 7102 goto fail; 7103 } 7104 #endif 7105 7106 /* 7107 * if lookup error determine whether it was a soft or hard 7108 * failure and mark as such in filter. 7109 */ 7110 if (shp == NULL) { 7111 if (ernum != TRY_AGAIN) { 7112 ipqos_msg(MT_ERROR, gettext("Failed to " 7113 "resolve src host name for filter at " 7114 "line %u, ignoring filter.\n"), 7115 filter->lineno); 7116 filter->nlerr = IPQOS_LOOKUP_FAIL; 7117 } else { 7118 if (last_retry) { 7119 ipqos_msg(MT_ERROR, gettext("Failed " 7120 "to resolve src host name for " 7121 "filter at line %u, ignoring " 7122 "filter.\n"), filter->lineno); 7123 } 7124 filter->nlerr = IPQOS_LOOKUP_RETRY; 7125 } 7126 goto fail; 7127 } 7128 } 7129 7130 /* read daddrs if dst node name */ 7131 if (filter->dst_nd_name) { 7132 7133 /* v4 only address */ 7134 7135 if (v4 && !v6) { 7136 in32b++; 7137 dhp = getipnodebyname(filter->dst_nd_name, AF_INET, 7138 AI_ADDRCONFIG, &ernum); 7139 7140 /* v6 only */ 7141 7142 } else if (v6 && !v4) { 7143 dhp = getipnodebyname(filter->dst_nd_name, AF_INET6, 7144 AI_DEFAULT, &ernum); 7145 7146 /* v6 and v4 addresses */ 7147 7148 } else { 7149 dhp = getipnodebyname(filter->dst_nd_name, AF_INET6, 7150 AI_DEFAULT|AI_ALL, &ernum); 7151 } 7152 7153 if (dhp == NULL) { 7154 if (ernum != TRY_AGAIN) { 7155 ipqos_msg(MT_ERROR, gettext("Failed to " 7156 "resolve dst host name for filter at " 7157 "line %u, ignoring filter.\n"), 7158 filter->lineno); 7159 filter->nlerr = IPQOS_LOOKUP_FAIL; 7160 } else { 7161 if (last_retry) { 7162 ipqos_msg(MT_ERROR, gettext("Failed " 7163 "to resolve dst host name for " 7164 "filter at line %u, ignoring " 7165 "filter.\n"), filter->lineno); 7166 } 7167 filter->nlerr = IPQOS_LOOKUP_RETRY; 7168 } 7169 goto fail; 7170 } 7171 } 7172 7173 /* 7174 * if src and dst node name, create set of filters; one for each 7175 * src and dst address of matching types. 7176 */ 7177 if (filter->src_nd_name && filter->dst_nd_name) { 7178 7179 for (sp = shp->h_addr_list; *sp != NULL; sp++) { 7180 (void) bcopy(*sp, &saddr, shp->h_length); 7181 7182 /* get saddr family */ 7183 7184 if (in32b || IN6_IS_ADDR_V4MAPPED(&saddr)) { 7185 saf = AF_INET; 7186 } else { 7187 saf = AF_INET6; 7188 } 7189 7190 for (dp = dhp->h_addr_list; *dp != NULL; dp++) { 7191 (void) bcopy(*dp, &daddr, dhp->h_length); 7192 7193 /* get daddr family */ 7194 7195 if (in32b || IN6_IS_ADDR_V4MAPPED(&daddr)) { 7196 daf = AF_INET; 7197 } else { 7198 daf = AF_INET6; 7199 } 7200 7201 /* 7202 * if saddr and daddr same af duplicate 7203 * filter adding addresses and new instance 7204 * number and add to flist filter list. 7205 */ 7206 7207 if (daf == saf) { 7208 7209 res = dup_filter(filter, &nfilter, saf, 7210 !in32b, &saddr, &daddr, ++idx); 7211 if (res != IPQOS_CONF_SUCCESS) { 7212 goto fail; 7213 } 7214 ADD_TO_LIST(flist, nfilter); 7215 } 7216 } 7217 } 7218 7219 /* if src name only create set of filters, one for each node address */ 7220 7221 } else if (filter->src_nd_name) { 7222 7223 for (sp = shp->h_addr_list; *sp != NULL; sp++) { 7224 (void) bcopy(*sp, &saddr, shp->h_length); 7225 7226 /* get af */ 7227 7228 if (in32b || IN6_IS_ADDR_V4MAPPED(&saddr)) { 7229 saf = AF_INET; 7230 } else { 7231 saf = AF_INET6; 7232 } 7233 7234 7235 /* 7236 * dup filter adding saddr and new instance num and 7237 * add to flist filter list. 7238 */ 7239 res = dup_filter(filter, &nfilter, saf, !in32b, &saddr, 7240 NULL, ++idx); 7241 if (res != IPQOS_CONF_SUCCESS) { 7242 goto fail; 7243 } 7244 7245 ADD_TO_LIST(flist, nfilter); 7246 7247 } 7248 7249 /* if dname only create set of filters, one for each node address */ 7250 7251 } else { 7252 for (dp = dhp->h_addr_list; *dp != NULL; dp++) { 7253 (void) bcopy(*dp, &daddr, dhp->h_length); 7254 7255 /* get af */ 7256 7257 if (in32b || IN6_IS_ADDR_V4MAPPED(&daddr)) { 7258 daf = AF_INET; 7259 } else { 7260 daf = AF_INET6; 7261 } 7262 7263 /* 7264 * dup filter adding daddr and new instance num and 7265 * add to flist filter list. 7266 */ 7267 res = dup_filter(filter, &nfilter, daf, !in32b, NULL, 7268 &daddr, ++idx); 7269 if (res != IPQOS_CONF_SUCCESS) { 7270 goto fail; 7271 } 7272 7273 ADD_TO_LIST(flist, nfilter); 7274 } 7275 } 7276 7277 if (shp) 7278 freehostent(shp); 7279 if (dhp) 7280 freehostent(dhp); 7281 return (IPQOS_CONF_SUCCESS); 7282 fail: 7283 /* 7284 * should really clean up any filters that we have created, 7285 * however, free_actions called from readaction will cleam them up. 7286 */ 7287 if (shp) 7288 freehostent(shp); 7289 if (dhp) 7290 freehostent(dhp); 7291 return (IPQOS_CONF_ERR); 7292 } 7293 7294 7295 /* 7296 * read a filter clause from cfp into a filter struct and point filter 7297 * at this. 7298 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 7299 */ 7300 static int 7301 readfilter( 7302 FILE *cfp, 7303 FILE *tfp, 7304 char *module_name, 7305 ipqos_conf_filter_t **filter, 7306 char **perm_filters, 7307 int num_perm_filters) 7308 { 7309 7310 int res; 7311 int nm, cls, ipv; 7312 in6_addr_t mask; 7313 char *addr_str; 7314 char *sl = NULL; 7315 in6_addr_t addr; 7316 int sa; 7317 struct hostent *hp; 7318 int err_num; 7319 int v4 = 0, v6 = 0; 7320 uchar_t mlen; 7321 char *tmp; 7322 nvpair_t *nvp; 7323 ipqos_nvtype_t type; 7324 char *name; 7325 char *class; 7326 uchar_t b; 7327 in6_addr_t v6addr; 7328 7329 IPQOSCDBG0(L0, "in readfilter\n"); 7330 7331 7332 /* create and zero filter struct */ 7333 7334 *filter = alloc_filter(); 7335 if (*filter == NULL) { 7336 return (IPQOS_CONF_ERR); 7337 } 7338 (*filter)->originator = IPP_CONFIG_IPQOSCONF; 7339 7340 /* get starting line for error reporting */ 7341 (*filter)->lineno = lineno; 7342 7343 /* read beginning curl */ 7344 7345 res = read_curl_begin(cfp); 7346 if (res != IPQOS_CONF_SUCCESS) { 7347 goto fail; 7348 } 7349 7350 7351 /* 7352 * loop reading nvpairs onto nvlist until encounter CURL_END 7353 */ 7354 ipv = nm = cls = 0; 7355 for (;;) { 7356 /* read nvpair */ 7357 7358 res = readnvpair(cfp, tfp, &(*filter)->nvlist, 7359 &nvp, &type, PL_FILTER, module_name); 7360 if (res == IPQOS_CONF_ERR) { 7361 goto fail; 7362 7363 /* reached the end of filter definition */ 7364 7365 } else if (res == IPQOS_CONF_CURL_END) { 7366 break; 7367 } 7368 7369 /* 7370 * catch name and class and place value into filter 7371 * structure. 7372 */ 7373 7374 /* read filter name */ 7375 7376 if (strcmp(nvpair_name(nvp), IPQOS_CONF_NAME_STR) == 0) { 7377 if (nm != 0) { 7378 ipqos_msg(MT_ERROR, 7379 gettext("Duplicate parameter line %u.\n"), 7380 lineno); 7381 goto fail; 7382 } 7383 7384 (void) nvpair_value_string(nvp, &name); 7385 if (valid_name(name) != IPQOS_CONF_SUCCESS) { 7386 goto fail; 7387 } 7388 7389 (void) strcpy((*filter)->name, name); 7390 (void) nvlist_remove_all((*filter)->nvlist, 7391 IPQOS_CONF_NAME_STR); 7392 nm++; 7393 7394 /* read class name */ 7395 7396 } else if (strcmp(nvpair_name(nvp), IPQOS_CONF_CLASS_STR) == 7397 0) { 7398 if (cls != 0) { 7399 ipqos_msg(MT_ERROR, 7400 gettext("Duplicate parameter line %u.\n"), 7401 lineno); 7402 goto fail; 7403 } 7404 7405 if (nvpair_value_string(nvp, &class) != 0) { 7406 ipqos_msg(MT_ENOSTR, "nvpair_value_string"); 7407 break; 7408 } 7409 if (valid_name(class) != IPQOS_CONF_SUCCESS) { 7410 goto fail; 7411 } 7412 (void) strcpy((*filter)->class_name, class); 7413 (void) nvlist_remove_all((*filter)->nvlist, 7414 IPQOS_CONF_CLASS_STR); 7415 cls++; 7416 7417 /* 7418 * if a src or dst ip node name/address. For those that 7419 * are determined to be addresses we convert them from 7420 * strings here and add to the filter nvlist; for node names 7421 * we add the name to the filter struct for readaction to 7422 * process. 7423 */ 7424 } else if (strcmp(nvpair_name(nvp), IPGPC_SADDR) == 0 || 7425 strcmp(nvpair_name(nvp), IPGPC_DADDR) == 0) { 7426 7427 sa = 0; 7428 7429 if (strcmp(nvpair_name(nvp), IPGPC_SADDR) == 0) { 7430 sa++; 7431 } 7432 7433 (void) nvpair_value_string(nvp, &addr_str); 7434 7435 /* 7436 * get the address mask if present. 7437 * make a copy so that the nvlist element that 7438 * it is part of doesn't dissapear and causes probs. 7439 */ 7440 sl = strchr(addr_str, '/'); 7441 if (sl) { 7442 *sl = '\0'; 7443 tmp = malloc(strlen(++sl) + 1); 7444 if (tmp == NULL) { 7445 ipqos_msg(MT_ENOSTR, "malloc"); 7446 goto fail; 7447 } 7448 (void) strcpy(tmp, sl); 7449 sl = tmp; 7450 } 7451 7452 7453 /* if a numeric address */ 7454 7455 if (inet_pton(AF_INET, addr_str, &addr) == 1 || 7456 inet_pton(AF_INET6, addr_str, &addr) == 1) { 7457 7458 /* get address */ 7459 7460 hp = getipnodebyname(addr_str, AF_INET6, 7461 AI_DEFAULT, &err_num); 7462 if (hp == NULL) { 7463 ipqos_msg(MT_ENOSTR, 7464 "getipnodebyname"); 7465 goto fail; 7466 } 7467 7468 (void) bcopy(hp->h_addr_list[0], &v6addr, 7469 hp->h_length); 7470 freehostent(hp); 7471 7472 /* determine address type */ 7473 7474 v4 = IN6_IS_ADDR_V4MAPPED(&v6addr); 7475 if (!v4) { 7476 v6++; 7477 } 7478 7479 /* 7480 * check any previous addresses have same 7481 * version. 7482 */ 7483 if (nvlist_lookup_byte((*filter)->nvlist, 7484 IPGPC_FILTER_TYPE, &b) == 0) { 7485 if (v4 && b != IPGPC_V4_FLTR || 7486 v6 && b != IPGPC_V6_FLTR) { 7487 ipqos_msg(MT_ERROR, 7488 gettext("Incompatible " 7489 "address version line " 7490 "%u.\n"), lineno); 7491 goto fail; 7492 } 7493 } 7494 7495 /* 7496 * check that if ip_version spec'd it 7497 * corresponds. 7498 */ 7499 if ((*filter)->ip_versions != 0) { 7500 if (v4 && !VERSION_IS_V4(*filter) || 7501 v6 && !VERSION_IS_V6(*filter)) { 7502 ipqos_msg(MT_ERROR, 7503 gettext("Incompatible " 7504 "address version line %u" 7505 ".\n"), lineno); 7506 goto fail; 7507 } 7508 } 7509 7510 /* add the address type */ 7511 7512 res = nvlist_add_byte( 7513 (*filter)->nvlist, IPGPC_FILTER_TYPE, 7514 v4 ? IPGPC_V4_FLTR : IPGPC_V6_FLTR); 7515 if (res != 0) { 7516 ipqos_msg(MT_ENOSTR, 7517 "nvlist_add_byte"); 7518 goto fail; 7519 } 7520 7521 /* add address to list */ 7522 7523 res = nvlist_add_uint32_array((*filter)->nvlist, 7524 sa ? IPGPC_SADDR : IPGPC_DADDR, 7525 (uint32_t *)&v6addr, 4); 7526 if (res != 0) { 7527 ipqos_msg(MT_ENOSTR, 7528 "nvlist_add_uint32_array"); 7529 goto fail; 7530 } 7531 7532 7533 /* 7534 * add mask entry in list. 7535 */ 7536 7537 if (sl) { /* have CIDR mask */ 7538 char *lo; 7539 res = readuint8(sl, &mlen, &lo); 7540 if (res != IPQOS_CONF_SUCCESS || 7541 v4 && mlen > 32 || 7542 !v4 && mlen > 128 || 7543 mlen == 0) { 7544 ipqos_msg(MT_ERROR, 7545 gettext("Invalid CIDR " 7546 "mask line %u.\n"), lineno); 7547 goto fail; 7548 } 7549 setmask(mlen, &mask, 7550 v4 ? AF_INET : AF_INET6); 7551 free(sl); 7552 } else { 7553 /* no CIDR mask spec'd - use all 1s */ 7554 7555 (void) memset(&mask, ~0, 7556 sizeof (in6_addr_t)); 7557 } 7558 res = nvlist_add_uint32_array((*filter)->nvlist, 7559 sa ? IPGPC_SADDR_MASK : IPGPC_DADDR_MASK, 7560 (uint32_t *)&mask, 4); 7561 if (res != 0) { 7562 ipqos_msg(MT_ENOSTR, 7563 "nvlist_add_uint32_arr"); 7564 goto fail; 7565 } 7566 7567 /* inet_pton returns fail - we assume a node name */ 7568 7569 } else { 7570 /* 7571 * doesn't make sense to have a mask 7572 * with a node name. 7573 */ 7574 if (sl) { 7575 ipqos_msg(MT_ERROR, 7576 gettext("Address masks aren't " 7577 "allowed for host names line " 7578 "%u.\n"), lineno); 7579 goto fail; 7580 } 7581 7582 /* 7583 * store node name in filter struct for 7584 * later resolution. 7585 */ 7586 if (sa) { 7587 (*filter)->src_nd_name = 7588 malloc(strlen(addr_str) + 1); 7589 (void) strcpy((*filter)->src_nd_name, 7590 addr_str); 7591 } else { 7592 (*filter)->dst_nd_name = 7593 malloc(strlen(addr_str) + 1); 7594 (void) strcpy((*filter)->dst_nd_name, 7595 addr_str); 7596 } 7597 } 7598 7599 /* ip_version enumeration */ 7600 7601 } else if (strcmp(nvpair_name(nvp), IPQOS_CONF_IP_VERSION) == 7602 0) { 7603 /* check we haven't read ip_version before */ 7604 if (ipv) { 7605 ipqos_msg(MT_ERROR, 7606 gettext("Duplicate parameter line %u.\n"), 7607 lineno); 7608 goto fail; 7609 } 7610 ipv++; 7611 7612 /* get bitmask value */ 7613 7614 (void) nvpair_value_uint32(nvp, 7615 &(*filter)->ip_versions); 7616 7617 /* 7618 * check that if either ip address is spec'd it 7619 * corresponds. 7620 */ 7621 if (v4 && !VERSION_IS_V4(*filter) || 7622 v6 && !VERSION_IS_V6(*filter)) { 7623 ipqos_msg(MT_ERROR, gettext("Incompatible " 7624 "address version line %u.\n"), lineno); 7625 goto fail; 7626 } 7627 7628 /* remove ip_version from nvlist */ 7629 7630 (void) nvlist_remove_all((*filter)->nvlist, 7631 IPQOS_CONF_IP_VERSION); 7632 } 7633 } 7634 if (nm == 0 || cls == 0) { 7635 ipqos_msg(MT_ERROR, gettext("Missing filter/class name " 7636 "before line %u.\n"), lineno); 7637 goto fail; 7638 } 7639 7640 if (in_string_table(perm_filters, num_perm_filters, (*filter)->name)) { 7641 IPQOSCDBG1(L0, "Setting filter %s as permanent.\n", 7642 (*filter)->name); 7643 7644 (*filter)->originator = IPP_CONFIG_PERMANENT; 7645 } 7646 7647 return (IPQOS_CONF_SUCCESS); 7648 fail: 7649 if (*filter) 7650 free_filter(*filter); 7651 if (hp) 7652 freehostent(hp); 7653 if (sl) 7654 free(sl); 7655 7656 return (IPQOS_CONF_ERR); 7657 } 7658 7659 /* 7660 * reads the curl begin token from cfp stream. 7661 * RETURNS: IPQOS_CONF_ERR if not read successfully, else IPQOS_CONF_SUCCES. 7662 */ 7663 static int 7664 read_curl_begin(FILE *cfp) 7665 { 7666 7667 int res; 7668 char *st; 7669 7670 res = readtoken(cfp, &st); 7671 7672 if (res != IPQOS_CONF_CURL_BEGIN) { 7673 if (res == IPQOS_CONF_EOF) { 7674 ipqos_msg(MT_ERROR, gettext("Unexpected EOF.\n")); 7675 7676 /* if CURL_END or something else */ 7677 } else if (res != IPQOS_CONF_ERR) { 7678 free(st); 7679 ipqos_msg(MT_ERROR, gettext("\'{\' missing at line " 7680 "%u.\n"), lineno); 7681 } 7682 return (IPQOS_CONF_ERR); 7683 } 7684 7685 free(st); 7686 return (IPQOS_CONF_SUCCESS); 7687 } 7688 7689 /* 7690 * This function parses the parameter string version into a version of the 7691 * form "%u.%u" (as a sscanf format string). It then encodes this into an 7692 * int and returns this encoding. 7693 * RETURNS: -1 if an invalid string, else the integer encoding. 7694 */ 7695 static int 7696 ver_str_to_int( 7697 char *version) 7698 { 7699 uint32_t major, minor; 7700 int ver; 7701 7702 if (sscanf(version, "%u.%u", &major, &minor) != 2) { 7703 IPQOSCDBG0(L0, "Failed to process version number string\n"); 7704 return (-1); 7705 } 7706 7707 ver = (int)((major * 10000) + minor); 7708 return (ver); 7709 } 7710 7711 /* 7712 * This function scans through the stream fp line by line looking for 7713 * a line beginning with version_tag and returns a integer encoding of 7714 * the version following it. 7715 * 7716 * RETURNS: If the version definition isn't found or the version is not 7717 * a valid version (%u.%u) then -1 is returned, else an integer encoding 7718 * of the read version. 7719 */ 7720 static int 7721 read_tfile_ver( 7722 FILE *fp, 7723 char *version_tag, 7724 char *module_name) 7725 { 7726 char lbuf[IPQOS_CONF_LINEBUF_SZ]; 7727 char buf[IPQOS_CONF_LINEBUF_SZ+1]; 7728 char buf2[IPQOS_CONF_LINEBUF_SZ+1]; 7729 int found = 0; 7730 int version; 7731 7732 /* 7733 * reset to file start 7734 */ 7735 if (fseek(fp, 0, SEEK_SET) != 0) { 7736 ipqos_msg(MT_ENOSTR, "fseek"); 7737 return (-1); 7738 } 7739 7740 /* 7741 * loop reading lines till found the one beginning with version_tag. 7742 */ 7743 while (fgets(lbuf, IPQOS_CONF_LINEBUF_SZ, fp) != NULL) { 7744 if ((sscanf(lbuf, 7745 "%" VAL2STR(IPQOS_CONF_LINEBUF_SZ) "s" 7746 "%" VAL2STR(IPQOS_CONF_LINEBUF_SZ) "s", 7747 buf, buf2) == 2) && 7748 (strcmp(buf, version_tag) == 0)) { 7749 found++; 7750 break; 7751 } 7752 } 7753 if (found == 0) { 7754 ipqos_msg(MT_ERROR, gettext("Types file for module %s is " 7755 "corrupt.\n"), module_name); 7756 IPQOSCDBG1(L1, "Couldn't find %s in types file\n", 7757 version_tag); 7758 return (-1); 7759 } 7760 7761 /* 7762 * convert version string into int. 7763 */ 7764 if ((version = ver_str_to_int(buf2)) == -1) { 7765 ipqos_msg(MT_ERROR, gettext("Types file for module %s is " 7766 "corrupt.\n"), module_name); 7767 return (-1); 7768 } 7769 7770 return (version); 7771 } 7772 7773 /* 7774 * read action clause and params/classes/filters clauses within and 7775 * store in and hang off an action structure, and point action at it. 7776 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 7777 */ 7778 static int 7779 readaction( 7780 FILE *cfp, 7781 ipqos_conf_action_t **action) 7782 { 7783 7784 char *st; 7785 FILE *tfp = NULL; 7786 int nm, md; 7787 int readprms = 0; 7788 int res; 7789 char *strval; 7790 char *name; 7791 nvpair_t *nvp; 7792 ipqos_nvtype_t type; 7793 ipqos_conf_filter_t *filter; 7794 ipqos_conf_class_t *class; 7795 int oe; 7796 char **perm_filters; 7797 int num_perm_filters; 7798 int tf_fmt_ver; 7799 7800 IPQOSCDBG0(L0, "in readaction\n"); 7801 7802 res = readtoken(cfp, &st); 7803 if (res == IPQOS_CONF_ERR || res == IPQOS_CONF_EOF) { 7804 return (res); 7805 } else if (strcmp(st, IPQOS_CONF_ACTION_STR) != 0) { 7806 ipqos_msg(MT_ERROR, gettext("Missing %s token line " 7807 "%u.\n"), IPQOS_CONF_ACTION_STR, lineno); 7808 free(st); 7809 return (IPQOS_CONF_ERR); 7810 } 7811 free(st); 7812 7813 /* create action structure */ 7814 7815 *action = alloc_action(); 7816 if (*action == NULL) { 7817 return (IPQOS_CONF_ERR); 7818 } 7819 (*action)->params->originator = IPP_CONFIG_IPQOSCONF; 7820 7821 7822 /* get starting line for error reporting */ 7823 (*action)->lineno = lineno; 7824 7825 /* read beginning curl */ 7826 7827 res = read_curl_begin(cfp); 7828 if (res != IPQOS_CONF_SUCCESS) { 7829 goto fail; 7830 } 7831 7832 /* loop till read both action name and module */ 7833 7834 nm = md = 0; 7835 do { 7836 /* read nvpair */ 7837 7838 res = readnvpair(cfp, NULL, &(*action)->nvlist, &nvp, &type, 7839 PL_ACTION, NULL); 7840 if (res == IPQOS_CONF_ERR) { 7841 goto fail; 7842 7843 /* read curl_end */ 7844 7845 } else if (res == IPQOS_CONF_CURL_END) { 7846 if (nm == 0 || md == 0) { 7847 ipqos_msg(MT_ERROR, 7848 gettext("Missing action name/ module " 7849 "before line %u.\n"), lineno); 7850 goto fail; 7851 } 7852 } 7853 7854 7855 /* store name and module in action structure */ 7856 7857 name = nvpair_name(nvp); 7858 7859 /* read action name */ 7860 7861 if (nm == 0 && strcmp(name, IPQOS_CONF_NAME_STR) == 0) { 7862 7863 (void) nvpair_value_string(nvp, &strval); 7864 7865 /* check name is valid */ 7866 7867 if (valid_name(strval) != IPQOS_CONF_SUCCESS || 7868 valid_aname(strval) != IPQOS_CONF_SUCCESS) { 7869 goto fail; 7870 } 7871 7872 /* store and remove from list */ 7873 7874 (void) strcpy((*action)->name, strval); 7875 /* remove name from nvlist */ 7876 (void) nvlist_remove_all((*action)->nvlist, 7877 IPQOS_CONF_NAME_STR); 7878 7879 nm++; 7880 7881 /* read module name */ 7882 7883 } else if (md == 0 && 7884 strcmp(name, IPQOS_CONF_MODULE_STR) == 0) { 7885 /* 7886 * check that module has a type file and get 7887 * open stream to it. 7888 */ 7889 (void) nvpair_value_string(nvp, &strval); 7890 if ((tfp = validmod(strval, &oe)) == NULL) { 7891 if (oe) { 7892 if (errno == ENOENT) { 7893 ipqos_msg(MT_ERROR, 7894 gettext("Invalid " 7895 "module name line %u.\n"), 7896 lineno); 7897 } else { 7898 ipqos_msg(MT_ENOSTR, "fopen"); 7899 } 7900 } 7901 goto fail; 7902 } 7903 7904 /* 7905 * move module name to action struct 7906 */ 7907 (void) strlcpy((*action)->module, strval, 7908 IPQOS_CONF_NAME_LEN); 7909 (void) nvlist_remove_all((*action)->nvlist, 7910 IPQOS_CONF_MODULE_STR); 7911 md++; 7912 7913 /* duplicate/other parameter */ 7914 7915 } else { 7916 ipqos_msg(MT_ERROR, 7917 gettext("Unexpected parameter line %u.\n"), 7918 lineno); 7919 goto fail; 7920 } 7921 7922 } while (nm == 0 || md == 0); 7923 7924 /* 7925 * check that if the ipgpc action it is named correctly 7926 */ 7927 if ((strcmp((*action)->module, IPGPC_NAME) == 0) && 7928 (strcmp((*action)->name, IPGPC_CLASSIFY) != 0)) { 7929 ipqos_msg(MT_ERROR, 7930 gettext("%s action has incorrect name line %u.\n"), 7931 IPGPC_NAME, (*action)->lineno); 7932 goto fail; 7933 } 7934 7935 /* get list of permanent classes */ 7936 7937 res = read_perm_items(0, tfp, (*action)->module, 7938 &(*action)->perm_classes, &(*action)->num_perm_classes); 7939 if (res != IPQOS_CONF_SUCCESS) { 7940 goto fail; 7941 } 7942 7943 /* get list of permanent filters */ 7944 7945 res = read_perm_items(1, tfp, (*action)->module, 7946 &perm_filters, &num_perm_filters); 7947 if (res != IPQOS_CONF_SUCCESS) { 7948 goto fail; 7949 } 7950 7951 /* 7952 * get types file format version and check its supported. 7953 */ 7954 if ((tf_fmt_ver = read_tfile_ver(tfp, IPQOS_FMT_STR, 7955 (*action)->module)) == -1) 7956 goto fail; 7957 if (IPP_MAJOR_MODULE_VER(tf_fmt_ver) > 1 || 7958 IPP_MINOR_MODULE_VER(tf_fmt_ver) > 0) { 7959 ipqos_msg(MT_ERROR, gettext("Types file for module %s is " 7960 "incompatible.\n"), (*action)->module); 7961 IPQOSCDBG0(L1, "Unsupported fmt major/minor version\n"); 7962 goto fail; 7963 } 7964 7965 /* 7966 * get module version 7967 */ 7968 if (((*action)->module_version = read_tfile_ver(tfp, IPQOS_MOD_STR, 7969 (*action)->module)) == -1) 7970 goto fail; 7971 7972 /* read filter/class/params blocks until CURL_END */ 7973 7974 for (;;) { 7975 /* read token */ 7976 res = readtoken(cfp, &st); 7977 7978 if (res == IPQOS_CONF_ERR) { 7979 goto fail; 7980 } else if (res == IPQOS_CONF_EOF) { 7981 ipqos_msg(MT_ERROR, gettext("Unexpected EOF.\n")); 7982 goto fail; 7983 7984 /* read CURL_END - end of action definition */ 7985 7986 } else if (res == IPQOS_CONF_CURL_END) { 7987 free(st); 7988 break; 7989 } 7990 7991 7992 /* 7993 * read in either a filter/class or parameter block. 7994 */ 7995 7996 /* read filter */ 7997 7998 if (strcmp(st, IPQOS_CONF_FILTER_STR) == 0) { 7999 free(st); 8000 8001 res = readfilter(cfp, tfp, (*action)->module, &filter, 8002 perm_filters, num_perm_filters); 8003 if (res != IPQOS_CONF_SUCCESS) { 8004 goto fail; 8005 } 8006 8007 /* 8008 * if we read a host name for either src or dst addr 8009 * resolve the hostnames and create the appropriate 8010 * number of filters. 8011 */ 8012 8013 if (filter->src_nd_name || filter->dst_nd_name) { 8014 8015 res = domultihome(filter, &(*action)->filters, 8016 B_FALSE); 8017 /* 8018 * if a lookup fails and the filters 8019 * marked as retry we add it to a list 8020 * for another attempt later, otherwise 8021 * it is thrown away. 8022 */ 8023 if (res != IPQOS_CONF_SUCCESS) { 8024 8025 /* if not name lookup problem */ 8026 8027 if (filter->nlerr == 0) { 8028 free_filter(filter); 8029 goto fail; 8030 8031 /* name lookup problem */ 8032 8033 /* 8034 * if intermitent lookup failure 8035 * add to list of filters to 8036 * retry later. 8037 */ 8038 } else if (filter->nlerr == 8039 IPQOS_LOOKUP_RETRY) { 8040 filter->nlerr = 0; 8041 ADD_TO_LIST( 8042 &(*action)->retry_filters, 8043 filter); 8044 /* 8045 * for non-existing names 8046 * ignore the filter. 8047 */ 8048 } else { 8049 free_filter(filter); 8050 } 8051 8052 /* creation of new filters successful */ 8053 8054 } else { 8055 free_filter(filter); 8056 } 8057 8058 /* non-node name filter */ 8059 8060 } else { 8061 ADD_TO_LIST(&(*action)->filters, filter); 8062 } 8063 8064 /* read class */ 8065 8066 } else if (strcmp(st, IPQOS_CONF_CLASS_STR) == 0) { 8067 free(st); 8068 res = readclass(cfp, (*action)->module, &class, 8069 (*action)->perm_classes, 8070 (*action)->num_perm_classes); 8071 if (res != IPQOS_CONF_SUCCESS) { 8072 goto fail; 8073 } 8074 8075 ADD_TO_LIST(&(*action)->classes, class); 8076 8077 /* read params */ 8078 8079 } else if (strcmp(st, IPQOS_CONF_PARAMS_STR) == 0) { 8080 free(st); 8081 if (readprms) { 8082 ipqos_msg(MT_ERROR, 8083 gettext("Second parameter clause not " 8084 "supported line %u.\n"), lineno); 8085 goto fail; 8086 } 8087 res = readparams(cfp, tfp, (*action)->module, 8088 (*action)->params); 8089 if (res != IPQOS_CONF_SUCCESS) { 8090 goto fail; 8091 } 8092 readprms++; 8093 8094 /* something unexpected */ 8095 } else { 8096 free(st); 8097 ipqos_msg(MT_ERROR, 8098 gettext("Params/filter/class clause expected " 8099 "line %u.\n"), lineno); 8100 goto fail; 8101 } 8102 } 8103 8104 (void) fclose(tfp); 8105 return (IPQOS_CONF_SUCCESS); 8106 8107 fail: 8108 if (tfp) 8109 (void) fclose(tfp); 8110 if (*action) { 8111 free_actions(*action); 8112 *action = NULL; 8113 } 8114 return (IPQOS_CONF_ERR); 8115 } 8116 8117 /* 8118 * check that each of the actions in actions is uniquely named. If one isn't 8119 * set *name to point at the name of the duplicate action. 8120 * RETURNS: IPQOS_CONF_ERR if a non-unique action, else IPQOS_CONF_SUCCESS. 8121 */ 8122 static int 8123 actions_unique(ipqos_conf_action_t *actions, char **name) 8124 { 8125 8126 IPQOSCDBG0(L1, "In actions_unique.\n"); 8127 8128 while (actions) { 8129 if (actionexist(actions->name, actions->next)) { 8130 *name = actions->name; 8131 return (IPQOS_CONF_ERR); 8132 } 8133 actions = actions->next; 8134 } 8135 8136 return (IPQOS_CONF_SUCCESS); 8137 } 8138 8139 /* 8140 * checks whether the action parameter is involved in an action cycle. 8141 * RETURNS: 1 if involved in a cycle, 0 otherwise. 8142 */ 8143 static int 8144 in_cycle( 8145 ipqos_conf_action_t *action) 8146 { 8147 8148 ipqos_conf_act_ref_t *aref; 8149 ipqos_conf_class_t *c; 8150 8151 IPQOSCDBG1(L0, "in_cycle: visiting action %s\n", action->name); 8152 8153 8154 /* have we visited this action before? */ 8155 8156 if (action->visited == INCYCLE_VISITED) { 8157 action->visited = 0; 8158 return (1); 8159 } 8160 action->visited = INCYCLE_VISITED; 8161 8162 /* 8163 * recurse down the child actions of this action through the 8164 * classes next action and parameter actions. 8165 */ 8166 8167 for (aref = action->params->actions; aref != NULL; aref = aref->next) { 8168 8169 /* skip virtual actions - they can't be in a cycle */ 8170 8171 if (virtual_action(aref->name)) { 8172 continue; 8173 } 8174 8175 if (in_cycle(aref->action)) { 8176 action->visited = 0; 8177 return (1); 8178 } 8179 } 8180 8181 for (c = action->classes; c != NULL; c = c->next) { 8182 aref = c->alist; 8183 8184 if (virtual_action(aref->name)) { 8185 continue; 8186 } 8187 8188 if (in_cycle(aref->action)) { 8189 action->visited = 0; 8190 return (1); 8191 } 8192 } 8193 8194 IPQOSCDBG0(L0, "in_cycle: return\n"); 8195 action->visited = 0; 8196 return (0); 8197 } 8198 8199 /* 8200 * checks that the configuration in actions is a valid whole, that 8201 * all actions are unique, all filters and classes are unique within 8202 * their action, that classes referenced by filters exist and actions 8203 * referenced by classes and params exist. Also checks that there are no root 8204 * actions but ipgpc and that no actions are involved in cycles. As 8205 * a consequence of checking that the actions exist two way pointers 8206 * are created between the dependee and dependant actions. 8207 * 8208 * In the case the the userconf flag is zero only this link creation is 8209 * set as we trust the kernel to return a valid configuration. 8210 * 8211 * RETURNS: IPQOS_CONF_ERR if config isn't valid, else IPQOS_CONF_SUCCESS. 8212 * 8213 */ 8214 8215 static int 8216 validconf( 8217 ipqos_conf_action_t *actions, 8218 int userconf) /* are we checking a conf file ? */ 8219 { 8220 char *name; 8221 ipqos_conf_action_t *act; 8222 int res; 8223 ipqos_conf_action_t *dact; 8224 ipqos_conf_filter_t *flt; 8225 ipqos_conf_class_t *cls; 8226 ipqos_conf_params_t *params; 8227 ipqos_conf_act_ref_t *aref; 8228 8229 IPQOSCDBG0(L0, "In validconf\n"); 8230 8231 /* check actions are unique */ 8232 8233 if (userconf && actions_unique(actions, &name) != IPQOS_CONF_SUCCESS) { 8234 ipqos_msg(MT_ERROR, gettext("Duplicate named action %s.\n"), 8235 name); 8236 return (IPQOS_CONF_ERR); 8237 } 8238 8239 for (act = actions; act; act = act->next) { 8240 8241 /* 8242 * check filters (for user land configs only). 8243 * check they are unique in this action and their class exists. 8244 */ 8245 if (userconf) { 8246 for (flt = act->filters; flt; flt = flt->next) { 8247 8248 /* check unique name */ 8249 8250 if (filterexist(flt->name, flt->instance, 8251 flt->next)) { 8252 ipqos_msg(MT_ERROR, 8253 gettext("Duplicate named filter " 8254 "%s in action %s.\n"), flt->name, 8255 act->name); 8256 return (IPQOS_CONF_ERR); 8257 } 8258 8259 /* 8260 * check existence of class and error if 8261 * class doesn't exist and not a perm class 8262 */ 8263 8264 if (!classexist(flt->class_name, 8265 act->classes)) { 8266 if (!in_string_table(act->perm_classes, 8267 act->num_perm_classes, 8268 flt->class_name)) { 8269 ipqos_msg(MT_ERROR, 8270 gettext("Undefined " 8271 "class in filter %s, " 8272 "action %s.\n"), flt->name, 8273 act->name); 8274 return (IPQOS_CONF_ERR); 8275 } 8276 } 8277 } 8278 } 8279 8280 /* check classes */ 8281 8282 for (cls = act->classes; cls; cls = cls->next) { 8283 8284 /* check if class name unique (userland only) */ 8285 8286 if (userconf && classexist(cls->name, cls->next)) { 8287 ipqos_msg(MT_ERROR, 8288 gettext("Duplicate named class %s in " 8289 "action %s.\n"), cls->name, act->name); 8290 return (IPQOS_CONF_ERR); 8291 } 8292 8293 /* 8294 * virtual actions always exist so don't check for next 8295 * action. 8296 */ 8297 if (virtual_action(cls->alist->name)) { 8298 continue; 8299 } 8300 8301 /* 8302 * check existance of next action and create link to 8303 * it. 8304 */ 8305 if ((cls->alist->action = 8306 actionexist(cls->alist->name, actions)) == NULL) { 8307 ipqos_msg(MT_ERROR, 8308 gettext("Undefined action in class %s, " 8309 "action %s.\n"), cls->name, act->name); 8310 return (IPQOS_CONF_ERR); 8311 } 8312 8313 /* create backwards link - used for deletions */ 8314 8315 dact = cls->alist->action; 8316 res = add_aref(&dact->dependencies, NULL, act->name); 8317 if (res != IPQOS_CONF_SUCCESS) { 8318 return (IPQOS_CONF_ERR); 8319 } 8320 dact->dependencies->action = act; 8321 } 8322 8323 8324 /* check actions exist for action type parameters */ 8325 8326 params = act->params; 8327 for (aref = params->actions; aref; aref = aref->next) { 8328 8329 /* skip virtuals */ 8330 8331 if (virtual_action(aref->name)) { 8332 continue; 8333 } 8334 8335 /* 8336 * check existance of action in this ref 8337 * and if present create a ptr to it. 8338 */ 8339 aref->action = actionexist(aref->name, actions); 8340 if (aref->action == NULL) { 8341 ipqos_msg(MT_ERROR, 8342 gettext("Undefined action in parameter " 8343 "%s, action %s.\n"), 8344 SHORT_NAME(aref->field), act->name); 8345 return (IPQOS_CONF_ERR); 8346 } 8347 8348 /* create backwards link */ 8349 8350 dact = aref->action; 8351 res = add_aref(&dact->dependencies, NULL, 8352 act->name); 8353 if (res != IPQOS_CONF_SUCCESS) { 8354 return (IPQOS_CONF_ERR); 8355 } 8356 dact->dependencies->action = act; 8357 } 8358 } 8359 8360 /* for kernel retrieved configs we don't do the following checks. */ 8361 if (!userconf) { 8362 return (IPQOS_CONF_SUCCESS); 8363 } 8364 8365 /* check for cycles in config and orphaned actions other than ipgpc */ 8366 8367 for (act = actions; act; act = act->next) { 8368 8369 /* check if involved in cycle */ 8370 8371 if (in_cycle(act)) { 8372 ipqos_msg(MT_ERROR, 8373 gettext("Action %s involved in cycle.\n"), 8374 act->name); 8375 return (IPQOS_CONF_ERR); 8376 } 8377 8378 /* check that this action has a parent (except ipgpc) */ 8379 8380 if (act->dependencies == NULL && 8381 strcmp(act->name, IPGPC_CLASSIFY) != 0) { 8382 ipqos_msg(MT_ERROR, gettext("Action %s isn't " 8383 "referenced by any other actions.\n"), act->name); 8384 return (IPQOS_CONF_ERR); 8385 } 8386 } 8387 8388 return (IPQOS_CONF_SUCCESS); 8389 } 8390 8391 /* 8392 * Read the version from the config file with stream cfp with 8393 * the tag version_tag. The tag-value pair should be the first tokens 8394 * encountered. 8395 * 8396 * RETURNS: -1 if a missing or invalid version or a read error, 8397 * else an integer encoding of the version. 8398 */ 8399 static int 8400 read_cfile_ver( 8401 FILE *cfp, 8402 char *version_tag) 8403 { 8404 char *sp = NULL; 8405 int res; 8406 int version; 8407 8408 IPQOSCDBG0(L1, "In read_cfile_ver:\n"); 8409 8410 /* 8411 * read version tag string. 8412 */ 8413 res = readtoken(cfp, &sp); 8414 if (res != IPQOS_CONF_SUCCESS) { 8415 goto fail; 8416 } else if (strcasecmp(sp, version_tag) != 0) { 8417 goto fail; 8418 } 8419 free(sp); 8420 sp = NULL; 8421 8422 /* 8423 * read version number string. 8424 */ 8425 res = readtoken(cfp, &sp); 8426 if (res != IPQOS_CONF_SUCCESS) { 8427 goto fail; 8428 } 8429 8430 /* 8431 * encode version into int. 8432 */ 8433 if ((version = ver_str_to_int(sp)) == -1) { 8434 goto fail; 8435 } 8436 free(sp); 8437 8438 return (version); 8439 fail: 8440 ipqos_msg(MT_ERROR, 8441 gettext("Missing/Invalid config file %s.\n"), version_tag); 8442 if (sp != NULL) 8443 free(sp); 8444 return (-1); 8445 } 8446 8447 /* 8448 * read the set of actions definitions from the stream cfp and store 8449 * them in a list pointed to by conf. 8450 * RETURNS: IPQOS_CONF_ERR if any errors, else IPQOS_CONF_SUCCESS. 8451 */ 8452 static int 8453 readconf( 8454 FILE *cfp, 8455 ipqos_conf_action_t **conf) 8456 { 8457 8458 int res; 8459 ipqos_conf_action_t *action; 8460 boolean_t ipgpc_action = B_FALSE; 8461 int fmt_ver; 8462 8463 IPQOSCDBG0(L0, "In readconf\n"); 8464 8465 *conf = NULL; 8466 8467 /* 8468 * get config file format version. 8469 */ 8470 fmt_ver = read_cfile_ver(cfp, IPQOS_FMT_VERSION_STR); 8471 if (fmt_ver == -1) { 8472 return (IPQOS_CONF_ERR); 8473 } else { 8474 /* 8475 * check version is valid 8476 */ 8477 if ((IPP_MAJOR_MODULE_VER(fmt_ver) > 1) || 8478 (IPP_MINOR_MODULE_VER(fmt_ver) > 0)) { 8479 ipqos_msg(MT_ERROR, gettext("Unsupported config file " 8480 "format version.\n")); 8481 return (IPQOS_CONF_ERR); 8482 } 8483 } 8484 8485 /* loop reading actions adding to conf till EOF */ 8486 8487 for (;;) { 8488 action = NULL; 8489 8490 /* readaction */ 8491 8492 res = readaction(cfp, &action); 8493 if (res == IPQOS_CONF_ERR) { 8494 goto fail; 8495 } 8496 8497 /* reached eof, finish */ 8498 8499 if (res == IPQOS_CONF_EOF) { 8500 break; 8501 } 8502 8503 ADD_TO_LIST(conf, action); 8504 8505 /* check if we just read an ipgpc action */ 8506 8507 if (strcmp(action->name, IPGPC_CLASSIFY) == 0) 8508 ipgpc_action = B_TRUE; 8509 } 8510 8511 /* check that there is one or more actions and that one is ipgpc */ 8512 8513 if (ipgpc_action == B_FALSE) { 8514 ipqos_msg(MT_ERROR, gettext("No %s action defined.\n"), 8515 IPGPC_NAME); 8516 goto fail; 8517 } 8518 8519 return (IPQOS_CONF_SUCCESS); 8520 fail: 8521 free_actions(*conf); 8522 *conf = NULL; 8523 return (IPQOS_CONF_ERR); 8524 } 8525 8526 /* ************************ kernel config retrieval ************************ */ 8527 8528 8529 /* 8530 * read the current configuration from the kernel and make *conf a ptr to it. 8531 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 8532 */ 8533 static int 8534 readkconf(ipqos_conf_action_t **conf) 8535 { 8536 8537 int res; 8538 char **modnames = NULL; 8539 int nmods; 8540 char **actnames = NULL; 8541 int nacts; 8542 int x, y; 8543 FILE *tfp; 8544 int openerr; 8545 ipqos_actinfo_prm_t ai_prm; 8546 8547 8548 IPQOSCDBG0(L0, "In readkconf\n"); 8549 8550 /* initialise conf to NULL */ 8551 *conf = NULL; 8552 8553 /* get list of modules currently loaded */ 8554 8555 res = ipp_list_mods(&modnames, &nmods); 8556 if (res != 0) { 8557 ipqos_msg(MT_ENOSTR, "ipp_list_mods"); 8558 return (IPQOS_CONF_ERR); 8559 } 8560 8561 /* 8562 * iterate through all loaded modules retrieving their list of actions 8563 * and then retrieving the configuration of each of these 8564 * and attatching it to conf. 8565 */ 8566 for (x = 0; x < nmods; x++) { 8567 8568 /* skip actions of modules that we can't open types file of */ 8569 8570 if ((tfp = validmod(modnames[x], &openerr)) == NULL) { 8571 8572 /* mem error */ 8573 8574 if (!openerr) { 8575 goto fail; 8576 8577 /* 8578 * fopen fail - if we failed because the file didn't 8579 * exist we assume this is an unknown module and 8580 * ignore this module, otherwise error. 8581 */ 8582 } else { 8583 if (errno == ENOENT) { 8584 continue; 8585 } else { 8586 ipqos_msg(MT_ENOSTR, "fopen"); 8587 goto fail; 8588 } 8589 } 8590 } 8591 (void) fclose(tfp); 8592 8593 /* get action list for this module */ 8594 8595 res = ipp_mod_list_actions(modnames[x], &actnames, &nacts); 8596 if (res != 0) { 8597 ipqos_msg(MT_ENOSTR, "ipp_mod_list_actions"); 8598 goto fail; 8599 } 8600 8601 /* read config of each action of this module */ 8602 8603 for (y = 0; y < nacts; y++) { 8604 ai_prm.action = alloc_action(); 8605 if (ai_prm.action == NULL) { 8606 goto fail; 8607 } 8608 8609 /* copy action name into action struct */ 8610 8611 (void) strlcpy(ai_prm.action->name, actnames[y], 8612 IPQOS_CONF_NAME_LEN); 8613 8614 /* copy module name into action struct */ 8615 8616 (void) strlcpy(ai_prm.action->module, modnames[x], 8617 IPQOS_CONF_NAME_LEN); 8618 8619 /* get action info */ 8620 8621 res = ipp_action_info(actnames[y], 8622 (int (*)(nvlist_t *, void *))parse_kaction, 8623 (void *)&ai_prm, 0); 8624 if (res != 0) { 8625 /* was this an ipp error */ 8626 if (ai_prm.intl_ret == IPQOS_CONF_SUCCESS) { 8627 ipqos_msg(MT_ENOSTR, 8628 "ipp_action_info"); 8629 } 8630 goto fail; 8631 } 8632 8633 ADD_TO_LIST(conf, ai_prm.action); 8634 } 8635 8636 cleanup_string_table(actnames, nacts); 8637 } 8638 8639 cleanup_string_table(modnames, nmods); 8640 return (IPQOS_CONF_SUCCESS); 8641 fail: 8642 free_actions(*conf); 8643 *conf = NULL; 8644 cleanup_string_table(modnames, nmods); 8645 cleanup_string_table(actnames, nacts); 8646 return (IPQOS_CONF_ERR); 8647 } 8648 8649 /* 8650 * This is passed as a parameter to ipp_action_info() in readkaction and 8651 * is called back one for each configuration element within the action 8652 * specified. This results in filters and classes being created and chained 8653 * off of action, and action having its params set. 8654 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCESS. 8655 */ 8656 static int 8657 parse_kaction( 8658 nvlist_t *nvl, 8659 ipqos_actinfo_prm_t *ai_prm) 8660 { 8661 8662 int ret; 8663 uint8_t cfgtype; 8664 ipqos_conf_filter_t *filter = NULL; 8665 ipqos_conf_class_t *class = NULL; 8666 ipqos_conf_action_t *action = ai_prm->action; 8667 8668 8669 IPQOSCDBG1(KRET, "In parse_kaction: action_name: %s\n", action->name); 8670 8671 /* get config type */ 8672 8673 (void) nvlist_lookup_byte(nvl, IPP_CONFIG_TYPE, &cfgtype); 8674 (void) nvlist_remove_all(nvl, IPP_CONFIG_TYPE); 8675 8676 switch (cfgtype) { 8677 case CLASSIFIER_ADD_FILTER: { 8678 /* 8679 * parse the passed filter nvlist 8680 * and add result to action's filter list. 8681 */ 8682 filter = alloc_filter(); 8683 if (filter == NULL) { 8684 ai_prm->intl_ret = IPQOS_CONF_ERR; 8685 return (IPQOS_CONF_ERR); 8686 } 8687 8688 ret = parse_kfilter(filter, nvl); 8689 if (ret != IPQOS_CONF_SUCCESS) { 8690 free_filter(filter); 8691 ai_prm->intl_ret = IPQOS_CONF_ERR; 8692 return (ret); 8693 } 8694 8695 ADD_TO_LIST(&action->filters, filter); 8696 break; 8697 } 8698 case CLASSIFIER_ADD_CLASS: 8699 case CLASSIFIER_MODIFY_CLASS: { 8700 /* 8701 * parse the passed class nvlist 8702 * and add result to action's class list. 8703 */ 8704 class = alloc_class(); 8705 if (class == NULL) { 8706 ai_prm->intl_ret = IPQOS_CONF_ERR; 8707 return (IPQOS_CONF_ERR); 8708 } 8709 8710 ret = parse_kclass(class, nvl); 8711 if (ret != IPQOS_CONF_SUCCESS) { 8712 free_class(class); 8713 ai_prm->intl_ret = IPQOS_CONF_ERR; 8714 return (ret); 8715 } 8716 8717 ADD_TO_LIST(&action->classes, class); 8718 break; 8719 } 8720 case IPP_SET: { 8721 /* 8722 * we don't alloc a params struct as it is created 8723 * as part of an action. 8724 */ 8725 8726 /* parse the passed params nvlist */ 8727 8728 ret = parse_kparams(action->module, action->params, 8729 nvl); 8730 if (ret != IPQOS_CONF_SUCCESS) { 8731 ai_prm->intl_ret = IPQOS_CONF_ERR; 8732 return (ret); 8733 } 8734 } 8735 } 8736 8737 ai_prm->intl_ret = IPQOS_CONF_SUCCESS; 8738 return (IPQOS_CONF_SUCCESS); 8739 } 8740 8741 /* 8742 * parses a params nvlist returned from the kernel. 8743 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 8744 */ 8745 int 8746 parse_kparams( 8747 char *module, 8748 ipqos_conf_params_t *params, 8749 nvlist_t *nvl) { 8750 8751 int ret; 8752 ipqos_nvtype_t type; 8753 str_val_nd_t *tmp; 8754 char *act; 8755 uint32_t u32; 8756 nvpair_t *nvp; 8757 FILE *tfp; 8758 char dfltst[IPQOS_VALST_MAXLEN]; 8759 char *param; 8760 nvlist_t *nvlcp; 8761 int openerr; 8762 place_t place; 8763 8764 IPQOSCDBG0(KRET, "In parse_kparams:\n"); 8765 8766 /* get stream to module types file */ 8767 8768 tfp = validmod(module, &openerr); 8769 if (tfp == NULL) { 8770 if (openerr) { 8771 ipqos_msg(MT_ENOSTR, "fopen"); 8772 } 8773 return (IPQOS_CONF_ERR); 8774 } 8775 8776 /* make copy of passed in nvlist as it is freed by the caller */ 8777 8778 ret = nvlist_dup(nvl, &nvlcp, 0); 8779 if (ret != 0) { 8780 return (IPQOS_CONF_ERR); 8781 } 8782 8783 /* 8784 * get config originator and remove from nvlist. If no owner we 8785 * assume ownership. 8786 */ 8787 ret = nvlist_lookup_uint32(nvlcp, IPP_CONFIG_ORIGINATOR, &u32); 8788 if (ret == 0) { 8789 params->originator = u32; 8790 (void) nvlist_remove_all(nvlcp, IPP_CONFIG_ORIGINATOR); 8791 } else { 8792 params->originator = IPP_CONFIG_IPQOSCONF; 8793 } 8794 8795 /* get action stats and remove from nvlist */ 8796 8797 ret = nvlist_lookup_uint32(nvlcp, IPP_ACTION_STATS_ENABLE, &u32); 8798 if (ret == 0) { 8799 params->stats_enable = *(boolean_t *)&u32; 8800 (void) nvlist_remove_all(nvlcp, IPP_ACTION_STATS_ENABLE); 8801 } 8802 8803 /* 8804 * loop throught nvlist elements and for those that are actions create 8805 * action ref entrys for them. 8806 */ 8807 nvp = nvlist_next_nvpair(nvlcp, NULL); 8808 while (nvp != NULL) { 8809 param = SHORT_NAME(nvpair_name(nvp)); 8810 place = PL_ANY; 8811 ret = readtype(tfp, module, param, &type, &tmp, dfltst, 8812 B_FALSE, &place); 8813 if (ret != IPQOS_CONF_SUCCESS) { 8814 goto fail; 8815 } 8816 8817 if ((place == PL_PARAMS) && /* avoid map entries */ 8818 (type == IPQOS_DATA_TYPE_ACTION)) { 8819 (void) nvpair_value_string(nvp, &act); 8820 ret = add_aref(¶ms->actions, nvpair_name(nvp), act); 8821 if (ret != IPQOS_CONF_SUCCESS) { 8822 goto fail; 8823 } 8824 } 8825 8826 nvp = nvlist_next_nvpair(nvlcp, nvp); 8827 } 8828 8829 /* assign copied nvlist to params struct */ 8830 8831 params->nvlist = nvlcp; 8832 8833 (void) fclose(tfp); 8834 return (IPQOS_CONF_SUCCESS); 8835 fail: 8836 (void) fclose(tfp); 8837 free_arefs(params->actions); 8838 params->actions = NULL; 8839 nvlist_free(nvlcp); 8840 return (IPQOS_CONF_ERR); 8841 } 8842 8843 /* 8844 * parses a classes nvlist returned from the kernel. 8845 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 8846 */ 8847 static int 8848 parse_kclass( 8849 ipqos_conf_class_t *class, 8850 nvlist_t *nvl) 8851 { 8852 8853 int ret; 8854 uint32_t u32; 8855 char *str; 8856 8857 IPQOSCDBG0(KRET, "In parse_kclass:\n"); 8858 8859 /* lookup object originator */ 8860 8861 ret = nvlist_lookup_uint32(nvl, IPP_CONFIG_ORIGINATOR, &u32); 8862 if (ret == 0) { 8863 class->originator = u32; 8864 } else { 8865 class->originator = IPP_CONFIG_IPQOSCONF; 8866 } 8867 8868 /* lookup name */ 8869 8870 (void) nvlist_lookup_string(nvl, CLASSIFIER_CLASS_NAME, &str); 8871 (void) strlcpy(class->name, str, IPQOS_CONF_NAME_LEN); 8872 IPQOSCDBG1(KRET, "reading class %s\n", class->name); 8873 8874 /* lookup next action */ 8875 8876 (void) nvlist_lookup_string(nvl, CLASSIFIER_NEXT_ACTION, &str); 8877 ret = add_aref(&class->alist, NULL, str); 8878 if (ret != IPQOS_CONF_SUCCESS) { 8879 return (IPQOS_CONF_ERR); 8880 } 8881 8882 /* lookup stats enable */ 8883 8884 ret = nvlist_lookup_uint32(nvl, CLASSIFIER_CLASS_STATS_ENABLE, &u32); 8885 if (ret == 0) { 8886 class->stats_enable = *(boolean_t *)&u32; 8887 } 8888 8889 return (IPQOS_CONF_SUCCESS); 8890 } 8891 8892 /* 8893 * parses a filters nvlist returned from the kernel. 8894 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 8895 */ 8896 static int 8897 parse_kfilter( 8898 ipqos_conf_filter_t *filter, 8899 nvlist_t *nvl) 8900 { 8901 8902 int ret; 8903 char *str; 8904 uint32_t u32; 8905 nvlist_t *nvlcp; 8906 char *end; 8907 8908 IPQOSCDBG0(KRET, "In parse_kfilter:\n"); 8909 8910 /* make copy of passed in nvlist as it is freed by the caller */ 8911 8912 ret = nvlist_dup(nvl, &nvlcp, 0); 8913 if (ret != 0) { 8914 return (IPQOS_CONF_ERR); 8915 } 8916 8917 /* lookup originator */ 8918 8919 ret = nvlist_lookup_uint32(nvlcp, IPP_CONFIG_ORIGINATOR, &u32); 8920 if (ret == 0) { 8921 filter->originator = u32; 8922 (void) nvlist_remove_all(nvlcp, IPP_CONFIG_ORIGINATOR); 8923 } else { 8924 filter->originator = IPP_CONFIG_IPQOSCONF; 8925 } 8926 8927 /* lookup filter name */ 8928 8929 (void) nvlist_lookup_string(nvlcp, CLASSIFIER_FILTER_NAME, &str); 8930 (void) strlcpy(filter->name, str, IPQOS_CONF_NAME_LEN); 8931 (void) nvlist_remove_all(nvlcp, CLASSIFIER_FILTER_NAME); 8932 8933 /* lookup class name */ 8934 8935 (void) nvlist_lookup_string(nvlcp, CLASSIFIER_CLASS_NAME, &str); 8936 (void) strlcpy(filter->class_name, str, IPQOS_CONF_NAME_LEN); 8937 (void) nvlist_remove_all(nvlcp, CLASSIFIER_CLASS_NAME); 8938 8939 /* lookup src and dst host names if present */ 8940 8941 if (nvlist_lookup_string(nvlcp, IPGPC_SADDR_HOSTNAME, &str) == 0) { 8942 filter->src_nd_name = malloc(strlen(str) + 1); 8943 if (filter->src_nd_name) { 8944 (void) strcpy(filter->src_nd_name, str); 8945 (void) nvlist_remove_all(nvlcp, IPGPC_SADDR_HOSTNAME); 8946 } else { 8947 ipqos_msg(MT_ENOSTR, "malloc"); 8948 nvlist_free(nvlcp); 8949 return (IPQOS_CONF_ERR); 8950 } 8951 } 8952 if (nvlist_lookup_string(nvlcp, IPGPC_DADDR_HOSTNAME, &str) == 0) { 8953 filter->dst_nd_name = malloc(strlen(str) + 1); 8954 if (filter->dst_nd_name) { 8955 (void) strcpy(filter->dst_nd_name, str); 8956 (void) nvlist_remove_all(nvlcp, IPGPC_DADDR_HOSTNAME); 8957 } else { 8958 ipqos_msg(MT_ENOSTR, "malloc"); 8959 nvlist_free(nvlcp); 8960 return (IPQOS_CONF_ERR); 8961 } 8962 } 8963 8964 /* lookup ip_version if present */ 8965 8966 if (nvlist_lookup_string(nvlcp, IPGPC_FILTER_PRIVATE, &str) == 0) { 8967 filter->ip_versions = (uint32_t)strtol(str, &end, 0); 8968 if (end != str) { 8969 (void) nvlist_remove_all(nvlcp, IPGPC_FILTER_PRIVATE); 8970 } else { 8971 ipqos_msg(MT_ERROR, 8972 gettext("Corrupted ip_version returned from " 8973 "kernel.\n")); 8974 nvlist_free(nvlcp); 8975 return (IPQOS_CONF_ERR); 8976 } 8977 } 8978 8979 /* lookup filter instance if present */ 8980 8981 ret = nvlist_lookup_int32(nvlcp, IPGPC_FILTER_INSTANCE, 8982 &filter->instance); 8983 if (ret != 0) { 8984 filter->instance = -1; 8985 } else { 8986 (void) nvlist_remove_all(nvlcp, IPGPC_FILTER_INSTANCE); 8987 } 8988 8989 /* attach new trimmed nvlist to filter */ 8990 filter->nvlist = nvlcp; 8991 8992 return (IPQOS_CONF_SUCCESS); 8993 } 8994 8995 8996 /* 8997 * determines whether action_name is a virtual action name. 8998 * RETURNS: if virtual action 1, else 0. 8999 */ 9000 static int 9001 virtual_action(char *action_name) 9002 { 9003 9004 if (strcmp(action_name, IPP_ANAME_CONT) == 0 || 9005 strcmp(action_name, IPP_ANAME_DEFER) == 0 || 9006 strcmp(action_name, IPP_ANAME_DROP) == 0) { 9007 return (1); 9008 } 9009 9010 return (0); 9011 } 9012 9013 /* 9014 * remove all the actions within the kernel. If there is a failure 9015 * modified is set to represent whether the attempt to flush modified 9016 * the configuration in any way. 9017 * RETURNS: IPQOS_CONF_ERR if the ipp_* functions return any errors, 9018 * else IPQOS_CONF_SUCCESS. 9019 */ 9020 static int 9021 flush( 9022 boolean_t *modified) 9023 { 9024 9025 int res; 9026 char **modnames = NULL; 9027 int nmods; 9028 char **actnames = NULL; 9029 int nacts; 9030 int x, y; 9031 9032 IPQOSCDBG0(L0, "In flush\n"); 9033 9034 *modified = B_FALSE; 9035 9036 /* 9037 * get list of modules currently loaded. 9038 */ 9039 res = ipp_list_mods(&modnames, &nmods); 9040 if (res != 0) { 9041 ipqos_msg(MT_ENOSTR, "ipp_list_mods"); 9042 return (IPQOS_CONF_ERR); 9043 } 9044 9045 /* 9046 * iterate through all the modules listing their actions and 9047 * deleting all of them. 9048 */ 9049 for (x = 0; x < nmods; x++) { 9050 IPQOSCDBG1(APPLY, "Getting actions of module %s.\n", 9051 modnames[x]); 9052 res = ipp_mod_list_actions(modnames[x], &actnames, &nacts); 9053 if (res != 0) { 9054 ipqos_msg(MT_ENOSTR, "ipp_mod_list_actions"); 9055 cleanup_string_table(modnames, nmods); 9056 return (IPQOS_CONF_ERR); 9057 } 9058 9059 for (y = 0; y < nacts; y++) { 9060 IPQOSCDBG1(APPLY, "deleting action %s\n", actnames[y]); 9061 res = ipp_action_destroy(actnames[y], IPP_DESTROY_REF); 9062 /* 9063 * if fails for reason other than action doesn't 9064 * exist or action has dependency. 9065 */ 9066 if (res != 0 && errno != ENOENT && errno != EBUSY) { 9067 ipqos_msg(MT_ENOSTR, "ipp_action_destroy"); 9068 cleanup_string_table(modnames, nmods); 9069 cleanup_string_table(actnames, nacts); 9070 return (IPQOS_CONF_ERR); 9071 } 9072 9073 if (res == 0) 9074 *modified = B_TRUE; 9075 } 9076 cleanup_string_table(actnames, nacts); 9077 } 9078 cleanup_string_table(modnames, nmods); 9079 9080 return (IPQOS_CONF_SUCCESS); 9081 } 9082 9083 /* 9084 * Trys to flush the configuration. If it fails and nothing has been modified 9085 * and force_flush is false just return an error, otherwise persist trying to 9086 * completion. 9087 * RETURNS: IPQOS_CONF_ERR if flush attempt failed without modifying anything 9088 * and force_flush was set to false, otherwise IPQOS_CONF_SUCCESS. 9089 */ 9090 static int 9091 atomic_flush( 9092 boolean_t force_flush) 9093 { 9094 int x = 0; 9095 int res; 9096 boolean_t modified = B_FALSE; 9097 9098 /* 9099 * attempt first flush of config. 9100 */ 9101 res = flush(&modified); 9102 if ((force_flush == B_FALSE) && (res != IPQOS_CONF_SUCCESS) && 9103 (modified == B_FALSE)) { 9104 return (IPQOS_CONF_ERR); 9105 } else if (res == IPQOS_CONF_SUCCESS) { 9106 return (IPQOS_CONF_SUCCESS); 9107 } 9108 9109 /* 9110 * failed flush that modified config, or force flush set; loop till 9111 * successful flush. 9112 */ 9113 while (res != IPQOS_CONF_SUCCESS) { 9114 if (x == 5) { /* 10 secs since start/last message. */ 9115 ipqos_msg(MT_ERROR, 9116 gettext("Retrying configuration flush.\n")); 9117 x = 0; 9118 } 9119 (void) sleep(2); 9120 x++; 9121 res = flush(&modified); 9122 } 9123 9124 return (IPQOS_CONF_SUCCESS); 9125 } 9126 9127 /* 9128 * Performs a flush of the configuration within a signal blocking region 9129 * so that there's minimal chance of it being killed and the flush only 9130 * partially completing. 9131 * RETURNS: IPQOS_CONF_SUCCESS (for symmetry with the other main functions). 9132 */ 9133 static int 9134 flushconf() 9135 { 9136 int res; 9137 9138 /* 9139 * make sure that flush is as atomic as possible. 9140 */ 9141 if ((res = block_all_signals()) == -1) 9142 return (IPQOS_CONF_ERR); 9143 9144 res = atomic_flush(B_FALSE); 9145 9146 /* 9147 * restore signals. 9148 */ 9149 (void) restore_all_signals(); 9150 9151 if (res == IPQOS_CONF_SUCCESS) { 9152 ipqos_msg(MT_LOG, gettext("Configuration flushed.\n")); 9153 } else { 9154 ipqos_msg(MT_ENOSTR, "atomic_flush"); 9155 } 9156 9157 return (res); 9158 } 9159 9160 static int 9161 in_string_table(char *stable[], int size, char *string) 9162 { 9163 9164 IPQOSCDBG1(L1, "In in_string_table: search string %s\n", string); 9165 9166 for (--size; size >= 0; size--) { 9167 if (strcmp(stable[size], string) == 0) { 9168 IPQOSCDBG1(L1, "Found %s in string table\n", string); 9169 return (1); 9170 } 9171 } 9172 9173 return (0); 9174 } 9175 9176 /* free the memory occupied by the string table ctable and its contents. */ 9177 static void 9178 cleanup_string_table(char *ctable[], int size) 9179 { 9180 9181 int x; 9182 9183 if (ctable) { 9184 for (x = 0; x < size; x++) { 9185 free(ctable[x]); 9186 } 9187 free(ctable); 9188 } 9189 } 9190 9191 #if 0 9192 9193 /* 9194 * makes a copy of a string table and returns a ptr to it. 9195 * RETURNS: NULL on error or if size was 0, else ptr to copied table. 9196 */ 9197 static char ** 9198 copy_string_table(char *stable1[], int size) 9199 { 9200 9201 char **st = NULL; 9202 int pos; 9203 9204 /* create char ptr array */ 9205 9206 st = malloc(size * sizeof (char *)); 9207 if (st == NULL) { 9208 ipqos_msg(MT_ENOSTR, "malloc"); 9209 return (st); 9210 } 9211 9212 /* create copy of each string from stable1 in array */ 9213 9214 for (pos = size - 1; pos >= 0; pos--) { 9215 st[pos] = malloc(strlen(stable1[pos] + 1)); 9216 if (st[pos] == NULL) { 9217 for (pos++; pos < size; pos++) 9218 free(st[pos]); 9219 free(st); 9220 ipqos_msg(MT_ENOSTR, "malloc"); 9221 return (NULL); 9222 } 9223 9224 (void) strcpy(st[pos], stable1[pos]); 9225 } 9226 9227 return (st); 9228 } 9229 #endif /* 0 */ 9230 9231 /* 9232 * retry lookups on filters that soft failed a previous lookup and 9233 * were put on the retry list. 9234 * RETURNS: IPQOS_CONF_ERR on any errors, else IPQOS_CONF_SUCCESS. 9235 */ 9236 static int 9237 retry_name_lookups( 9238 ipqos_conf_action_t *actions) 9239 { 9240 9241 ipqos_conf_action_t *act; 9242 ipqos_conf_filter_t **new_filters; 9243 ipqos_conf_filter_t *flt; 9244 9245 IPQOSCDBG0(APPLY, "In retry_name_lookups:\n"); 9246 9247 for (act = actions; act != NULL; act = act->next) { 9248 9249 /* store start of new resolved filters */ 9250 GET_LIST_END(&act->filters, &new_filters); 9251 9252 /* 9253 * do name resolution on retry list adding resolved filters 9254 * to end of actions filters. 9255 */ 9256 for (flt = act->retry_filters; flt != NULL; flt = flt->next) { 9257 9258 if (domultihome(flt, new_filters, B_TRUE) != 9259 IPQOS_CONF_SUCCESS) { 9260 9261 /* if resource failure */ 9262 9263 if (flt->nlerr == 0) { 9264 return (IPQOS_CONF_ERR); 9265 } 9266 } 9267 } 9268 9269 /* add the newly resolved filters to the kernel action */ 9270 9271 for (flt = *new_filters; flt != NULL; flt = flt->next) { 9272 if (add_filter(act->name, flt, act->module_version) != 9273 IPQOS_CONF_SUCCESS) { 9274 return (IPQOS_CONF_ERR); 9275 } 9276 } 9277 } 9278 9279 return (IPQOS_CONF_SUCCESS); 9280 } 9281 9282 /* 9283 * write the configuration in conf to the file given in dstpath. This 9284 * is done by writing first to a temporary file and then renaming that 9285 * file to dstpath. This assures an atomic write. 9286 * RETURNS: IPQOS_CONF_ERR on any errors, else IPQOS_CONF_SUCCESS. 9287 */ 9288 static int 9289 writeconf( 9290 ipqos_conf_action_t *conf, 9291 char *dstpath) 9292 { 9293 9294 FILE *tmpfp; 9295 char *tmppath; 9296 char *pathend; 9297 ipqos_conf_action_t *act; 9298 int res; 9299 9300 IPQOSCDBG0(L0, "in writeconf\n"); 9301 9302 /* construct tmp file path so we can use rename() */ 9303 9304 pathend = strrchr(dstpath, '/'); 9305 9306 /* dstpath in current dir */ 9307 9308 if (pathend == NULL) { 9309 tmppath = malloc(strlen("ipqosconf.tmp") + 1); 9310 if (tmppath == NULL) { 9311 ipqos_msg(MT_ENOSTR, "malloc"); 9312 return (IPQOS_CONF_ERR); 9313 } 9314 (void) strcpy(tmppath, "ipqosconf.tmp"); 9315 9316 /* dstpath in root dir */ 9317 9318 } else if (pathend == dstpath) { 9319 tmppath = malloc(strlen("/ipqosconf.tmp") + 1); 9320 if (tmppath == NULL) { 9321 ipqos_msg(MT_ENOSTR, "malloc"); 9322 return (IPQOS_CONF_ERR); 9323 } 9324 (void) strcpy(tmppath, "/ipqosconf.tmp"); 9325 9326 /* not pwd or root */ 9327 9328 } else { 9329 *pathend = NULL; 9330 tmppath = malloc(strlen(dstpath) + strlen("/ipqosconf.tmp") + 9331 1); 9332 if (tmppath == NULL) { 9333 ipqos_msg(MT_ENOSTR, "malloc"); 9334 return (IPQOS_CONF_ERR); 9335 } 9336 (void) strcpy(tmppath, dstpath); 9337 (void) strcat(tmppath, "/ipqosconf.tmp"); 9338 *pathend = '/'; 9339 } 9340 9341 9342 /* open tmp file */ 9343 9344 tmpfp = fopen(tmppath, "w"); 9345 if (tmpfp == NULL) { 9346 ipqos_msg(MT_ENOSTR, "fopen"); 9347 free(tmppath); 9348 return (IPQOS_CONF_ERR); 9349 } 9350 9351 /* write out format version */ 9352 9353 (void) fprintf(tmpfp, "%s %d.%d\n\n", IPQOS_FMT_VERSION_STR, 9354 IPQOS_CUR_FMT_MAJOR_VER, IPQOS_CUR_FMT_MINOR_VER); 9355 9356 /* 9357 * loop through actions in list writing ipqosconf originated 9358 * ones out to the tmp file. 9359 */ 9360 for (act = conf; act != NULL; act = act->next) { 9361 if (act->params->originator == IPP_CONFIG_IPQOSCONF) { 9362 res = printaction(tmpfp, act, 0, 0); 9363 if (res != IPQOS_CONF_SUCCESS) { 9364 free(tmppath); 9365 (void) fclose(tmpfp); 9366 return (res); 9367 } 9368 } 9369 } 9370 (void) fclose(tmpfp); 9371 9372 /* rename tmp file to dst file */ 9373 9374 if (rename(tmppath, dstpath) != 0) { 9375 ipqos_msg(MT_ENOSTR, "rename"); 9376 free(tmppath); 9377 return (IPQOS_CONF_ERR); 9378 } 9379 free(tmppath); 9380 9381 return (IPQOS_CONF_SUCCESS); 9382 } 9383 9384 /* 9385 * read the configuration back from the kernel and then write each of the 9386 * actions read to IPQOS_CONF_INIT_PATH. 9387 * RETURNS: IPQOS_CONF_ERR if error, else IPQOS_CONF_SUCCESS. 9388 */ 9389 static int 9390 commitconf() 9391 { 9392 9393 int ret; 9394 ipqos_conf_action_t *conf; 9395 9396 IPQOSCDBG0(L0, "In commitconf\n"); 9397 9398 /* read the configuration from the kernel */ 9399 9400 ret = readkconf(&conf); 9401 if (ret != IPQOS_CONF_SUCCESS) { 9402 return (IPQOS_CONF_ERR); 9403 } 9404 9405 /* dissallow a null config to be stored (we can't read one in) */ 9406 9407 if (conf == NULL) { 9408 ipqos_msg(MT_ERROR, 9409 gettext("Can't commit a null configuration.\n")); 9410 return (IPQOS_CONF_ERR); 9411 } 9412 9413 /* make sure if we create file that perms are 644 */ 9414 9415 (void) umask(S_IXUSR | S_IWGRP | S_IXGRP | S_IWOTH | S_IXOTH); 9416 9417 /* write the configuration to the init file */ 9418 9419 ret = writeconf(conf, IPQOS_CONF_INIT_PATH); 9420 if (ret != IPQOS_CONF_SUCCESS) { 9421 return (IPQOS_CONF_ERR); 9422 } 9423 9424 ipqos_msg(MT_LOG, 9425 gettext("Current configuration saved to init file.\n")); 9426 9427 return (IPQOS_CONF_SUCCESS); 9428 } 9429 9430 /* 9431 * Called in the event of a failed rollback. It first flushes the 9432 * current configuration, then attempts to apply the oconf (the old 9433 * one), and if that fails flushes again. 9434 * 9435 * RETURNS: IPQOS_CONF_ERR if the application of old config fails, 9436 * else IPQOS_CONF_SUCCESS. 9437 */ 9438 static int 9439 rollback_recover( 9440 ipqos_conf_action_t *oconf) 9441 { 9442 int res; 9443 9444 IPQOSCDBG0(RBK, "In rollback_recover\n"); 9445 9446 /* 9447 * flush configuration. 9448 */ 9449 (void) atomic_flush(B_TRUE); 9450 9451 /* 9452 * mark all elements of old config for application. 9453 */ 9454 mark_config_new(oconf); 9455 9456 /* 9457 * attempt to apply old config. 9458 */ 9459 res = applydiff(oconf, NULL); 9460 /* 9461 * if failed force flush of config. 9462 */ 9463 if (res != IPQOS_CONF_SUCCESS) { 9464 (void) atomic_flush(B_TRUE); 9465 return (IPQOS_CONF_ERR); 9466 } 9467 9468 return (IPQOS_CONF_SUCCESS); 9469 } 9470 9471 /* 9472 * read and apply the configuration contained if file ifile to the kernel. 9473 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 9474 */ 9475 static int 9476 applyconf(char *ifile) 9477 { 9478 9479 FILE *ifp; 9480 ipqos_conf_action_t *conf = NULL; 9481 ipqos_conf_action_t *oconf = NULL; 9482 ipqos_conf_action_t *act, *oact; 9483 int res; 9484 9485 IPQOSCDBG0(L0, "In applyconf:\n"); 9486 9487 9488 /* if filename '-' read from stdin */ 9489 9490 if (strcmp(ifile, "-") == 0) { 9491 ifp = stdin; 9492 } else { 9493 ifp = fopen(ifile, "r"); 9494 if (ifp == NULL) { 9495 ipqos_msg(MT_ERROR, 9496 gettext("Opening file %s for read: %s.\n"), 9497 ifile, strerror(errno)); 9498 return (IPQOS_CONF_ERR); 9499 } 9500 } 9501 9502 /* read in new configuration */ 9503 9504 res = readconf(ifp, &conf); 9505 if (res != IPQOS_CONF_SUCCESS) { 9506 goto fail; 9507 } 9508 9509 /* check configuration is valid */ 9510 9511 res = validconf(conf, 1); 9512 if (res != IPQOS_CONF_SUCCESS) { 9513 goto fail; 9514 } 9515 9516 /* read in kernel configuration */ 9517 9518 res = readkconf(&oconf); 9519 if (res != IPQOS_CONF_SUCCESS) { 9520 goto fail; 9521 } 9522 9523 /* 9524 * check there are no same named actions in both config file and the 9525 * the kernel that are for a different module. The application 9526 * system can't handle these as we would try to add the new 9527 * action before we deleted the old one and because actions 9528 * in the kernel are indexed solely on their name (their module 9529 * isn't included) the kernel would return an error. We want 9530 * to avoid this error and the resulting rollback. 9531 */ 9532 for (act = conf; act != NULL; act = act->next) { 9533 for (oact = oconf; oact != NULL; oact = oact->next) { 9534 /* found action */ 9535 if (strcmp(act->name, oact->name) == 0) { 9536 /* different module */ 9537 if (strcmp(act->module, oact->module) != 0) { 9538 ipqos_msg(MT_ERROR, 9539 gettext("Action at line %u has " 9540 "same name as currently " 9541 "installed action, but is for a " 9542 "different module.\n"), 9543 act->lineno); 9544 goto fail; 9545 /* same module - stop search */ 9546 } else { 9547 break; 9548 } 9549 } 9550 } 9551 } 9552 9553 9554 /* create links between actions for use with deletions etc.. */ 9555 9556 res = validconf(oconf, 0); 9557 if (res != IPQOS_CONF_SUCCESS) { 9558 goto fail; 9559 } 9560 9561 /* diff conf file against kernel */ 9562 9563 res = diffconf(oconf, conf); 9564 if (res != IPQOS_CONF_SUCCESS) { 9565 goto fail; 9566 } 9567 9568 /* make kernel mods as atomic as possible */ 9569 9570 if ((res = block_all_signals()) == -1) { 9571 res = IPQOS_CONF_ERR; 9572 goto fail; 9573 } 9574 9575 /* apply difference to kernel */ 9576 9577 res = applydiff(conf, oconf); 9578 #ifdef _IPQOS_CONF_DEBUG 9579 if (force_rback || res != IPQOS_CONF_SUCCESS) { 9580 #else 9581 if (res != IPQOS_CONF_SUCCESS) { 9582 #endif /* _IPQOS_CONF_DEBUG */ 9583 9584 res = rollback(conf, oconf); 9585 if (res != IPQOS_CONF_SUCCESS) { 9586 res = rollback_recover(oconf); 9587 if (res != IPQOS_CONF_SUCCESS) { 9588 /* system left flushed */ 9589 ipqos_msg(MT_ERROR, 9590 gettext("Failed to rollback from failed " 9591 "configuration, configuration flushed.\n")); 9592 res = IPQOS_CONF_RECOVER_ERR; 9593 } else { /* old config re-applied */ 9594 ipqos_msg(MT_ERROR, 9595 gettext("Configuration failed, system " 9596 "state unchanged.\n")); 9597 res = IPQOS_CONF_ERR; 9598 } 9599 } else { 9600 ipqos_msg(MT_ERROR, 9601 gettext("Configuration failed, system " 9602 "state unchanged.\n")); 9603 res = IPQOS_CONF_ERR; 9604 } 9605 goto fail; 9606 } 9607 9608 /* retry any soft name lookup failures */ 9609 9610 res = retry_name_lookups(conf); 9611 if (res != IPQOS_CONF_SUCCESS) { 9612 res = rollback(conf, oconf); 9613 if (res != IPQOS_CONF_SUCCESS) { 9614 res = rollback_recover(oconf); 9615 if (res != IPQOS_CONF_SUCCESS) { 9616 /* system left flushed */ 9617 ipqos_msg(MT_ERROR, 9618 gettext("Failed to rollback from failed " 9619 "configuration, configuration flushed.\n")); 9620 res = IPQOS_CONF_RECOVER_ERR; 9621 } else { /* old config re-applied */ 9622 ipqos_msg(MT_ERROR, 9623 gettext("Configuration failed, system " 9624 "state unchanged.\n")); 9625 res = IPQOS_CONF_ERR; 9626 } 9627 } else { 9628 ipqos_msg(MT_ERROR, 9629 gettext("Configuration failed, system " 9630 "state unchanged.\n")); 9631 res = IPQOS_CONF_ERR; 9632 } 9633 goto fail; 9634 9635 } 9636 9637 ipqos_msg(MT_LOG, gettext("IPQoS configuration applied.\n")); 9638 9639 /* re-enable signals */ 9640 (void) restore_all_signals(); 9641 9642 (void) fclose(ifp); 9643 free_actions(conf); 9644 free_actions(oconf); 9645 return (IPQOS_CONF_SUCCESS); 9646 fail: 9647 (void) fclose(ifp); 9648 (void) restore_all_signals(); 9649 if (conf) 9650 free_actions(conf); 9651 if (oconf) 9652 free_actions(oconf); 9653 if (res == IPQOS_CONF_RECOVER_ERR) 9654 ipqos_msg(MT_LOG, gettext("Configuration flushed.\n")); 9655 return (res); 9656 } 9657 9658 static sigset_t set, oset; 9659 9660 static int 9661 block_all_signals() 9662 { 9663 if (sigfillset(&set) == -1) { 9664 ipqos_msg(MT_ENOSTR, "sigfillset"); 9665 return (-1); 9666 } 9667 if (sigprocmask(SIG_SETMASK, &set, &oset) == -1) { 9668 ipqos_msg(MT_ENOSTR, "sigprocmask"); 9669 return (-1); 9670 } 9671 return (0); 9672 } 9673 9674 static int 9675 restore_all_signals() 9676 { 9677 if (sigprocmask(SIG_SETMASK, &oset, NULL) == -1) { 9678 ipqos_msg(MT_ENOSTR, "sigprocmask"); 9679 return (-1); 9680 } 9681 return (0); 9682 } 9683 9684 static int 9685 unlock(int fd) 9686 { 9687 if (lockf(fd, F_ULOCK, 0) == -1) { 9688 ipqos_msg(MT_ENOSTR, "lockf"); 9689 return (-1); 9690 } 9691 return (0); 9692 } 9693 9694 static int 9695 lock() 9696 { 9697 int fd; 9698 struct stat sbuf1; 9699 struct stat sbuf2; 9700 9701 /* 9702 * Open the file with O_CREAT|O_EXCL. If it exists already, it 9703 * will fail. If it already exists, check whether it looks like 9704 * the one we created. 9705 */ 9706 (void) umask(0077); 9707 if ((fd = open(IPQOS_CONF_LOCK_FILE, O_EXCL|O_CREAT|O_RDWR, 9708 S_IRUSR|S_IWUSR)) == -1) { 9709 if (errno != EEXIST) { 9710 /* Some other problem. */ 9711 ipqos_msg(MT_ENOSTR, 9712 gettext("Cannot open lock file %s"), 9713 IPQOS_CONF_LOCK_FILE); 9714 return (-1); 9715 } 9716 9717 /* 9718 * open() returned an EEXIST error. We don't fail yet 9719 * as it could be a residual from a previous 9720 * execution. However, we need to clear errno here. 9721 * If we don't and print_cmd_buf() is later invoked 9722 * as the result of a parsing error, it 9723 * will assume that the current error is EEXIST and 9724 * that a corresponding error message has already been 9725 * printed, which results in an incomplete error 9726 * message. If errno is zero, print_cmd_buf() will 9727 * assume that it is called as a result of a 9728 * parsing error and will print the appropriate 9729 * error message. 9730 */ 9731 errno = 0; 9732 9733 /* 9734 * File exists. make sure it is OK. We need to lstat() 9735 * as fstat() stats the file pointed to by the symbolic 9736 * link. 9737 */ 9738 if (lstat(IPQOS_CONF_LOCK_FILE, &sbuf1) == -1) { 9739 ipqos_msg(MT_ENOSTR, 9740 gettext("Cannot lstat lock file %s\n"), 9741 IPQOS_CONF_LOCK_FILE); 9742 return (-1); 9743 } 9744 /* 9745 * Check whether it is a regular file and not a symbolic 9746 * link. Its link count should be 1. The owner should be 9747 * root and the file should be empty. 9748 */ 9749 if (!S_ISREG(sbuf1.st_mode) || 9750 sbuf1.st_nlink != 1 || 9751 sbuf1.st_uid != 0 || 9752 sbuf1.st_size != 0) { 9753 ipqos_msg(MT_ERROR, gettext("Bad lock file %s.\n"), 9754 IPQOS_CONF_LOCK_FILE); 9755 return (-1); 9756 } 9757 if ((fd = open(IPQOS_CONF_LOCK_FILE, O_CREAT|O_RDWR, 9758 S_IRUSR|S_IWUSR)) == -1) { 9759 ipqos_msg(MT_ENOSTR, 9760 gettext("Cannot open lock file %s"), 9761 IPQOS_CONF_LOCK_FILE); 9762 return (-1); 9763 } 9764 9765 /* Check whether we opened the file that we lstat()ed. */ 9766 if (fstat(fd, &sbuf2) == -1) { 9767 ipqos_msg(MT_ENOSTR, 9768 gettext("Cannot fstat lock file %s\n"), 9769 IPQOS_CONF_LOCK_FILE); 9770 return (-1); 9771 } 9772 if (sbuf1.st_dev != sbuf2.st_dev || 9773 sbuf1.st_ino != sbuf2.st_ino) { 9774 /* File changed after we did the lstat() above */ 9775 ipqos_msg(MT_ERROR, gettext("Bad lock file %s.\n"), 9776 IPQOS_CONF_LOCK_FILE); 9777 return (-1); 9778 } 9779 } 9780 if (lockf(fd, F_LOCK, 0) == -1) { 9781 ipqos_msg(MT_ENOSTR, "lockf"); 9782 return (-1); 9783 } 9784 return (fd); 9785 } 9786 9787 /* 9788 * print the current kernel configuration out to stdout. If viewall 9789 * is set this causes more verbose configuration listing including 9790 * showing objects we didn't create, each instance of a mhome filter, 9791 * etc.. see printaction(). 9792 * RETURNS: IPQOS_CONF_ERR on error, else IPQOS_CONF_SUCCES. 9793 */ 9794 9795 static int 9796 viewconf(int viewall) 9797 { 9798 9799 ipqos_conf_action_t *conf = NULL; 9800 ipqos_conf_action_t *act; 9801 int ret; 9802 9803 IPQOSCDBG0(L0, "In viewconf\n"); 9804 9805 /* get kernel configuration */ 9806 9807 ret = readkconf(&conf); 9808 if (ret != IPQOS_CONF_SUCCESS) { 9809 return (IPQOS_CONF_ERR); 9810 } 9811 9812 /* write out format version */ 9813 9814 if (conf != NULL) { 9815 (void) fprintf(stdout, "%s %d.%d\n\n", IPQOS_FMT_VERSION_STR, 9816 IPQOS_CUR_FMT_MAJOR_VER, IPQOS_CUR_FMT_MINOR_VER); 9817 } 9818 9819 /* print each of the actions in the kernel config to stdout */ 9820 9821 for (act = conf; act != NULL; act = act->next) { 9822 ret = printaction(stdout, act, viewall, 0); 9823 if (ret != IPQOS_CONF_SUCCESS) { 9824 free_actions(conf); 9825 return (ret); 9826 } 9827 (void) fprintf(stdout, "\n"); 9828 } 9829 9830 free_actions(conf); 9831 9832 return (IPQOS_CONF_SUCCESS); 9833 } 9834 9835 9836 /* 9837 * debug function that reads the config file and prints it out after 9838 * interpreting to stdout. 9839 */ 9840 #ifdef _IPQOS_CONF_DEBUG 9841 static int 9842 viewcfile(char *cfile) 9843 { 9844 9845 ipqos_conf_action_t *conf; 9846 ipqos_conf_action_t *act; 9847 int res; 9848 FILE *ifp; 9849 int viewall = 1; 9850 9851 IPQOSCDBG0(L0, "In viewcfile\n"); 9852 ifp = fopen(cfile, "r"); 9853 if (ifp == NULL) { 9854 ipqos_msg(MT_ERROR, gettext("Opening file %s for read: %s.\n"), 9855 cfile, strerror(errno)); 9856 return (IPQOS_CONF_ERR); 9857 } 9858 9859 res = readconf(ifp, &conf); 9860 if (res != IPQOS_CONF_SUCCESS) { 9861 free(ifp); 9862 return (IPQOS_CONF_ERR); 9863 } 9864 9865 /* print each of the actions in the kernel config to stdout */ 9866 for (act = conf; act != NULL; act = act->next) { 9867 res = printaction(stdout, act, viewall, 0); 9868 if (res != IPQOS_CONF_SUCCESS) { 9869 free(ifp); 9870 return (res); 9871 } 9872 9873 (void) fprintf(stdout, "\n"); 9874 } 9875 9876 (void) fprintf(stdout, "\n"); 9877 9878 9879 return (IPQOS_CONF_SUCCESS); 9880 } 9881 #endif /* _IPQOS_CONF_DEBUG */ 9882 9883 static void 9884 usage(void) 9885 { 9886 (void) fprintf(stderr, gettext("usage:\n" 9887 "\tipqosconf [-sv] -a file|-\n" 9888 "\tipqosconf -c\n" 9889 "\tipqosconf -l\n" 9890 "\tipqosconf -L\n" 9891 "\tipqosconf -f\n")); 9892 } 9893 9894 int 9895 main(int argc, char *argv[]) 9896 { 9897 9898 int c; 9899 char *ifile = NULL; 9900 int args; 9901 int ret; 9902 int cmd; 9903 int viewall = 0; 9904 int lfp; 9905 9906 /* init global flags */ 9907 use_syslog = verbose = 0; 9908 9909 /* init current line number */ 9910 lineno = 0; 9911 9912 /* setup internationalisation */ 9913 9914 (void) setlocale(LC_ALL, ""); 9915 #if !defined(TEXT_DOMAIN) 9916 #define TEXT_DOMAIN "SYS_TEST" 9917 #endif 9918 (void) textdomain(TEXT_DOMAIN); 9919 9920 /* setup syslog parameters */ 9921 openlog("ipqosconf", 0, LOG_USER); 9922 9923 args = 0; 9924 9925 /* enable debug options */ 9926 9927 #ifdef _IPQOS_CONF_DEBUG 9928 #define DBGOPTS "rz:" 9929 #else 9930 #define DBGOPTS 9931 #endif /* _IPQOS_CONF_DEBUG */ 9932 9933 while ((c = getopt(argc, argv, "sca:vflL" DBGOPTS)) != EOF) { 9934 switch (c) { 9935 #ifdef _IPQOS_CONF_DEBUG 9936 case 'z': 9937 cmd = -1; 9938 ifile = optarg; 9939 if (*ifile == '\0') { 9940 usage(); 9941 exit(1); 9942 } 9943 args++; 9944 break; 9945 case 'r': 9946 force_rback++; 9947 break; 9948 #endif /* _IPQOS_CONF_DEBUG */ 9949 case 'c': 9950 cmd = IPQOS_CONF_COMMIT; 9951 args++; 9952 break; 9953 case 'a': 9954 cmd = IPQOS_CONF_APPLY; 9955 ifile = optarg; 9956 if (*ifile == '\0') { 9957 usage(); 9958 exit(1); 9959 } 9960 args++; 9961 break; 9962 case 'f': 9963 cmd = IPQOS_CONF_FLUSH; 9964 args++; 9965 break; 9966 case 'l': 9967 cmd = IPQOS_CONF_VIEW; 9968 args++; 9969 break; 9970 case 'L': 9971 cmd = IPQOS_CONF_VIEW; 9972 viewall++; 9973 args++; 9974 break; 9975 case 'v': 9976 verbose++; 9977 break; 9978 case 's': 9979 use_syslog++; 9980 break; 9981 case '?': 9982 usage(); 9983 return (1); 9984 } 9985 } 9986 9987 /* 9988 * dissallow non-option args, > 1 cmd args and syslog/verbose flags set 9989 * for anything but apply. 9990 */ 9991 if (optind != argc || args > 1 || 9992 use_syslog && cmd != IPQOS_CONF_APPLY || 9993 verbose && cmd != IPQOS_CONF_APPLY) { 9994 usage(); 9995 exit(1); 9996 } 9997 9998 /* if no cmd option then show config */ 9999 10000 if (args == 0) { 10001 cmd = IPQOS_CONF_VIEW; 10002 } 10003 10004 /* stop concurrent ipqosconf invocations */ 10005 lfp = lock(); 10006 if (lfp == -1) { 10007 exit(1); 10008 } 10009 10010 switch (cmd) { 10011 #ifdef _IPQOS_CONF_DEBUG 10012 case -1: 10013 ret = viewcfile(ifile); 10014 break; 10015 #endif /* _IPQOS_CONF_DEBUG */ 10016 case IPQOS_CONF_APPLY: 10017 ret = applyconf(ifile); 10018 break; 10019 case IPQOS_CONF_COMMIT: 10020 ret = commitconf(); 10021 break; 10022 case IPQOS_CONF_VIEW: 10023 ret = viewconf(viewall); 10024 break; 10025 case IPQOS_CONF_FLUSH: 10026 ret = flushconf(); 10027 break; 10028 } 10029 10030 (void) unlock(lfp); 10031 10032 return (ret); 10033 10034 } 10035