1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 24 * Copyright 2014 Nexenta Systems, Inc. All rights reserved. 25 * Copyright 2014 Gary Mills 26 */ 27 28 /* 29 * zonecfg is a lex/yacc based command interpreter used to manage zone 30 * configurations. The lexer (see zonecfg_lex.l) builds up tokens, which 31 * the grammar (see zonecfg_grammar.y) builds up into commands, some of 32 * which takes resources and/or properties as arguments. See the block 33 * comments near the end of zonecfg_grammar.y for how the data structures 34 * which keep track of these resources and properties are built up. 35 * 36 * The resource/property data structures are inserted into a command 37 * structure (see zonecfg.h), which also keeps track of command names, 38 * miscellaneous arguments, and function handlers. The grammar selects 39 * the appropriate function handler, each of which takes a pointer to a 40 * command structure as its sole argument, and invokes it. The grammar 41 * itself is "entered" (a la the Matrix) by yyparse(), which is called 42 * from read_input(), our main driving function. That in turn is called 43 * by one of do_interactive(), cmd_file() or one_command_at_a_time(), each 44 * of which is called from main() depending on how the program was invoked. 45 * 46 * The rest of this module consists of the various function handlers and 47 * their helper functions. Some of these functions, particularly the 48 * X_to_str() functions, which maps command, resource and property numbers 49 * to strings, are used quite liberally, as doing so results in a better 50 * program w/rt I18N, reducing the need for translation notes. 51 */ 52 53 #include <sys/mntent.h> 54 #include <sys/varargs.h> 55 #include <sys/sysmacros.h> 56 57 #include <errno.h> 58 #include <fcntl.h> 59 #include <strings.h> 60 #include <unistd.h> 61 #include <ctype.h> 62 #include <stdlib.h> 63 #include <assert.h> 64 #include <sys/stat.h> 65 #include <zone.h> 66 #include <arpa/inet.h> 67 #include <netdb.h> 68 #include <locale.h> 69 #include <libintl.h> 70 #include <alloca.h> 71 #include <signal.h> 72 #include <wait.h> 73 #include <libtecla.h> 74 #include <libzfs.h> 75 #include <sys/brand.h> 76 #include <libbrand.h> 77 #include <sys/systeminfo.h> 78 #include <libdladm.h> 79 #include <libinetutil.h> 80 #include <pwd.h> 81 #include <inet/ip.h> 82 83 #include <libzonecfg.h> 84 #include "zonecfg.h" 85 86 #if !defined(TEXT_DOMAIN) /* should be defined by cc -D */ 87 #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it wasn't */ 88 #endif 89 90 #define PAGER "/usr/bin/more" 91 #define EXEC_PREFIX "exec " 92 #define EXEC_LEN (strlen(EXEC_PREFIX)) 93 94 struct help { 95 uint_t cmd_num; 96 char *cmd_name; 97 uint_t flags; 98 char *short_usage; 99 }; 100 101 extern int yyparse(void); 102 extern int lex_lineno; 103 104 #define MAX_LINE_LEN 1024 105 #define MAX_CMD_HIST 1024 106 #define MAX_CMD_LEN 1024 107 108 #define ONE_MB 1048576 109 110 /* 111 * Each SHELP_ should be a simple string. 112 */ 113 114 #define SHELP_ADD "add <resource-type>\n\t(global scope)\n" \ 115 "add <property-name> <property-value>\n\t(resource scope)" 116 #define SHELP_CANCEL "cancel" 117 #define SHELP_CLEAR "clear <property-name>" 118 #define SHELP_COMMIT "commit" 119 #define SHELP_CREATE "create [-F] [ -a <path> | -b | -t <template> ]" 120 #define SHELP_DELETE "delete [-F]" 121 #define SHELP_END "end" 122 #define SHELP_EXIT "exit [-F]" 123 #define SHELP_EXPORT "export [-f output-file]" 124 #define SHELP_HELP "help [commands] [syntax] [usage] [<command-name>]" 125 #define SHELP_INFO "info [<resource-type> [property-name=property-value]*]" 126 #define SHELP_REMOVE "remove [-F] <resource-type> " \ 127 "[ <property-name>=<property-value> ]*\n" \ 128 "\t(global scope)\n" \ 129 "remove <property-name> <property-value>\n" \ 130 "\t(resource scope)" 131 #define SHELP_REVERT "revert [-F]" 132 #define SHELP_SELECT "select <resource-type> { <property-name>=" \ 133 "<property-value> }" 134 #define SHELP_SET "set <property-name>=<property-value>" 135 #define SHELP_VERIFY "verify" 136 137 static struct help helptab[] = { 138 { CMD_ADD, "add", HELP_RES_PROPS, SHELP_ADD, }, 139 { CMD_CANCEL, "cancel", 0, SHELP_CANCEL, }, 140 { CMD_CLEAR, "clear", HELP_PROPS, SHELP_CLEAR, }, 141 { CMD_COMMIT, "commit", 0, SHELP_COMMIT, }, 142 { CMD_CREATE, "create", 0, SHELP_CREATE, }, 143 { CMD_DELETE, "delete", 0, SHELP_DELETE, }, 144 { CMD_END, "end", 0, SHELP_END, }, 145 { CMD_EXIT, "exit", 0, SHELP_EXIT, }, 146 { CMD_EXPORT, "export", 0, SHELP_EXPORT, }, 147 { CMD_HELP, "help", 0, SHELP_HELP }, 148 { CMD_INFO, "info", HELP_RES_PROPS, SHELP_INFO, }, 149 { CMD_REMOVE, "remove", HELP_RES_PROPS, SHELP_REMOVE, }, 150 { CMD_REVERT, "revert", 0, SHELP_REVERT, }, 151 { CMD_SELECT, "select", HELP_RES_PROPS, SHELP_SELECT, }, 152 { CMD_SET, "set", HELP_PROPS, SHELP_SET, }, 153 { CMD_VERIFY, "verify", 0, SHELP_VERIFY, }, 154 { 0 }, 155 }; 156 157 #define MAX_RT_STRLEN 16 158 159 /* These *must* match the order of the RT_ define's from zonecfg.h */ 160 char *res_types[] = { 161 "unknown", 162 "zonename", 163 "zonepath", 164 "autoboot", 165 "pool", 166 "fs", 167 "net", 168 "device", 169 "rctl", 170 "attr", 171 "dataset", 172 "limitpriv", 173 "bootargs", 174 "brand", 175 "dedicated-cpu", 176 "capped-memory", 177 ALIAS_MAXLWPS, 178 ALIAS_MAXSHMMEM, 179 ALIAS_MAXSHMIDS, 180 ALIAS_MAXMSGIDS, 181 ALIAS_MAXSEMIDS, 182 ALIAS_SHARES, 183 "scheduling-class", 184 "ip-type", 185 "capped-cpu", 186 "hostid", 187 "admin", 188 "fs-allowed", 189 ALIAS_MAXPROCS, 190 NULL 191 }; 192 193 /* These *must* match the order of the PT_ define's from zonecfg.h */ 194 char *prop_types[] = { 195 "unknown", 196 "zonename", 197 "zonepath", 198 "autoboot", 199 "pool", 200 "dir", 201 "special", 202 "type", 203 "options", 204 "address", 205 "physical", 206 "name", 207 "value", 208 "match", 209 "priv", 210 "limit", 211 "action", 212 "raw", 213 "limitpriv", 214 "bootargs", 215 "brand", 216 "ncpus", 217 "importance", 218 "swap", 219 "locked", 220 ALIAS_SHARES, 221 ALIAS_MAXLWPS, 222 ALIAS_MAXSHMMEM, 223 ALIAS_MAXSHMIDS, 224 ALIAS_MAXMSGIDS, 225 ALIAS_MAXSEMIDS, 226 ALIAS_MAXLOCKEDMEM, 227 ALIAS_MAXSWAP, 228 "scheduling-class", 229 "ip-type", 230 "defrouter", 231 "hostid", 232 "user", 233 "auths", 234 "fs-allowed", 235 ALIAS_MAXPROCS, 236 "allowed-address", 237 NULL 238 }; 239 240 /* These *must* match the order of the PROP_VAL_ define's from zonecfg.h */ 241 static char *prop_val_types[] = { 242 "simple", 243 "complex", 244 "list", 245 }; 246 247 /* 248 * The various _cmds[] lists below are for command tab-completion. 249 */ 250 251 /* 252 * remove has a space afterwards because it has qualifiers; the other commands 253 * that have qualifiers (add, select, etc.) don't need a space here because 254 * they have their own _cmds[] lists below. 255 */ 256 static const char *global_scope_cmds[] = { 257 "add", 258 "clear", 259 "commit", 260 "create", 261 "delete", 262 "exit", 263 "export", 264 "help", 265 "info", 266 "remove ", 267 "revert", 268 "select", 269 "set", 270 "verify", 271 NULL 272 }; 273 274 static const char *add_cmds[] = { 275 "add fs", 276 "add net", 277 "add device", 278 "add rctl", 279 "add attr", 280 "add dataset", 281 "add dedicated-cpu", 282 "add capped-cpu", 283 "add capped-memory", 284 "add admin", 285 NULL 286 }; 287 288 static const char *clear_cmds[] = { 289 "clear autoboot", 290 "clear pool", 291 "clear limitpriv", 292 "clear bootargs", 293 "clear scheduling-class", 294 "clear ip-type", 295 "clear " ALIAS_MAXLWPS, 296 "clear " ALIAS_MAXSHMMEM, 297 "clear " ALIAS_MAXSHMIDS, 298 "clear " ALIAS_MAXMSGIDS, 299 "clear " ALIAS_MAXSEMIDS, 300 "clear " ALIAS_SHARES, 301 "clear " ALIAS_MAXPROCS, 302 NULL 303 }; 304 305 static const char *remove_cmds[] = { 306 "remove fs ", 307 "remove net ", 308 "remove device ", 309 "remove rctl ", 310 "remove attr ", 311 "remove dataset ", 312 "remove dedicated-cpu ", 313 "remove capped-cpu ", 314 "remove capped-memory ", 315 "remove admin ", 316 NULL 317 }; 318 319 static const char *select_cmds[] = { 320 "select fs ", 321 "select net ", 322 "select device ", 323 "select rctl ", 324 "select attr ", 325 "select dataset ", 326 "select dedicated-cpu", 327 "select capped-cpu", 328 "select capped-memory", 329 "select admin", 330 NULL 331 }; 332 333 static const char *set_cmds[] = { 334 "set zonename=", 335 "set zonepath=", 336 "set brand=", 337 "set autoboot=", 338 "set pool=", 339 "set limitpriv=", 340 "set bootargs=", 341 "set scheduling-class=", 342 "set ip-type=", 343 "set " ALIAS_MAXLWPS "=", 344 "set " ALIAS_MAXSHMMEM "=", 345 "set " ALIAS_MAXSHMIDS "=", 346 "set " ALIAS_MAXMSGIDS "=", 347 "set " ALIAS_MAXSEMIDS "=", 348 "set " ALIAS_SHARES "=", 349 "set hostid=", 350 "set fs-allowed=", 351 "set " ALIAS_MAXPROCS "=", 352 NULL 353 }; 354 355 static const char *info_cmds[] = { 356 "info fs ", 357 "info net ", 358 "info device ", 359 "info rctl ", 360 "info attr ", 361 "info dataset ", 362 "info capped-memory", 363 "info dedicated-cpu", 364 "info capped-cpu", 365 "info zonename", 366 "info zonepath", 367 "info autoboot", 368 "info pool", 369 "info limitpriv", 370 "info bootargs", 371 "info brand", 372 "info scheduling-class", 373 "info ip-type", 374 "info max-lwps", 375 "info max-shm-memory", 376 "info max-shm-ids", 377 "info max-msg-ids", 378 "info max-sem-ids", 379 "info cpu-shares", 380 "info hostid", 381 "info admin", 382 "info fs-allowed", 383 "info max-processes", 384 NULL 385 }; 386 387 static const char *fs_res_scope_cmds[] = { 388 "add options ", 389 "cancel", 390 "end", 391 "exit", 392 "help", 393 "info", 394 "remove options ", 395 "set dir=", 396 "set raw=", 397 "set special=", 398 "set type=", 399 "clear raw", 400 NULL 401 }; 402 403 static const char *net_res_scope_cmds[] = { 404 "cancel", 405 "end", 406 "exit", 407 "help", 408 "info", 409 "set address=", 410 "set physical=", 411 "set defrouter=", 412 NULL 413 }; 414 415 static const char *device_res_scope_cmds[] = { 416 "cancel", 417 "end", 418 "exit", 419 "help", 420 "info", 421 "set match=", 422 NULL 423 }; 424 425 static const char *attr_res_scope_cmds[] = { 426 "cancel", 427 "end", 428 "exit", 429 "help", 430 "info", 431 "set name=", 432 "set type=", 433 "set value=", 434 NULL 435 }; 436 437 static const char *rctl_res_scope_cmds[] = { 438 "add value ", 439 "cancel", 440 "end", 441 "exit", 442 "help", 443 "info", 444 "remove value ", 445 "set name=", 446 NULL 447 }; 448 449 static const char *dataset_res_scope_cmds[] = { 450 "cancel", 451 "end", 452 "exit", 453 "help", 454 "info", 455 "set name=", 456 NULL 457 }; 458 459 static const char *pset_res_scope_cmds[] = { 460 "cancel", 461 "end", 462 "exit", 463 "help", 464 "info", 465 "set ncpus=", 466 "set importance=", 467 "clear importance", 468 NULL 469 }; 470 471 static const char *pcap_res_scope_cmds[] = { 472 "cancel", 473 "end", 474 "exit", 475 "help", 476 "info", 477 "set ncpus=", 478 NULL 479 }; 480 481 static const char *mcap_res_scope_cmds[] = { 482 "cancel", 483 "end", 484 "exit", 485 "help", 486 "info", 487 "set physical=", 488 "set swap=", 489 "set locked=", 490 "clear physical", 491 "clear swap", 492 "clear locked", 493 NULL 494 }; 495 496 static const char *admin_res_scope_cmds[] = { 497 "cancel", 498 "end", 499 "exit", 500 "help", 501 "info", 502 "set user=", 503 "set auths=", 504 NULL 505 }; 506 507 struct xif { 508 struct xif *xif_next; 509 char xif_name[LIFNAMSIZ]; 510 boolean_t xif_has_address; 511 boolean_t xif_has_defrouter; 512 }; 513 514 /* Global variables */ 515 516 /* list of network interfaces specified for exclusive IP zone */ 517 struct xif *xif; 518 519 /* set early in main(), never modified thereafter, used all over the place */ 520 static char *execname; 521 522 /* set in main(), used all over the place */ 523 static zone_dochandle_t handle; 524 525 /* used all over the place */ 526 static char zone[ZONENAME_MAX]; 527 static char revert_zone[ZONENAME_MAX]; 528 529 /* global brand operations */ 530 static brand_handle_t brand; 531 532 /* set in modifying functions, checked in read_input() */ 533 static boolean_t need_to_commit = B_FALSE; 534 boolean_t saw_error; 535 536 /* set in yacc parser, checked in read_input() */ 537 boolean_t newline_terminated; 538 539 /* set in main(), checked in lex error handler */ 540 boolean_t cmd_file_mode; 541 542 /* set in exit_func(), checked in read_input() */ 543 static boolean_t time_to_exit = B_FALSE, force_exit = B_FALSE; 544 545 /* used in short_usage() and zerr() */ 546 static char *cmd_file_name = NULL; 547 548 /* checked in read_input() and other places */ 549 static boolean_t ok_to_prompt = B_FALSE; 550 551 /* set and checked in initialize() */ 552 static boolean_t got_handle = B_FALSE; 553 554 /* initialized in do_interactive(), checked in initialize() */ 555 static boolean_t interactive_mode; 556 557 /* set if configuring the global zone */ 558 static boolean_t global_zone = B_FALSE; 559 560 /* set in main(), checked in multiple places */ 561 static boolean_t read_only_mode; 562 563 /* scope is outer/global or inner/resource */ 564 static boolean_t global_scope = B_TRUE; 565 static int resource_scope; /* should be in the RT_ list from zonecfg.h */ 566 static int end_op = -1; /* operation on end is either add or modify */ 567 568 int num_prop_vals; /* for grammar */ 569 570 /* 571 * These are for keeping track of resources as they are specified as part of 572 * the multi-step process. They should be initialized by add_resource() or 573 * select_func() and filled in by add_property() or set_func(). 574 */ 575 static struct zone_fstab old_fstab, in_progress_fstab; 576 static struct zone_nwiftab old_nwiftab, in_progress_nwiftab; 577 static struct zone_devtab old_devtab, in_progress_devtab; 578 static struct zone_rctltab old_rctltab, in_progress_rctltab; 579 static struct zone_attrtab old_attrtab, in_progress_attrtab; 580 static struct zone_dstab old_dstab, in_progress_dstab; 581 static struct zone_psettab old_psettab, in_progress_psettab; 582 static struct zone_mcaptab old_mcaptab, in_progress_mcaptab; 583 static struct zone_admintab old_admintab, in_progress_admintab; 584 585 static GetLine *gl; /* The gl_get_line() resource object */ 586 587 static void bytes_to_units(char *str, char *buf, int bufsize); 588 589 /* Functions begin here */ 590 591 static boolean_t 592 initial_match(const char *line1, const char *line2, int word_end) 593 { 594 if (word_end <= 0) 595 return (B_TRUE); 596 return (strncmp(line1, line2, word_end) == 0); 597 } 598 599 static int 600 add_stuff(WordCompletion *cpl, const char *line1, const char **list, 601 int word_end) 602 { 603 int i, err; 604 605 for (i = 0; list[i] != NULL; i++) { 606 if (initial_match(line1, list[i], word_end)) { 607 err = cpl_add_completion(cpl, line1, 0, word_end, 608 list[i] + word_end, "", ""); 609 if (err != 0) 610 return (err); 611 } 612 } 613 return (0); 614 } 615 616 static 617 /* ARGSUSED */ 618 CPL_MATCH_FN(cmd_cpl_fn) 619 { 620 if (global_scope) { 621 /* 622 * The MAX/MIN tests below are to make sure we have at least 623 * enough characters to distinguish from other prefixes (MAX) 624 * but only check MIN(what we have, what we're checking). 625 */ 626 if (strncmp(line, "add ", MAX(MIN(word_end, 4), 1)) == 0) 627 return (add_stuff(cpl, line, add_cmds, word_end)); 628 if (strncmp(line, "clear ", MAX(MIN(word_end, 6), 2)) == 0) 629 return (add_stuff(cpl, line, clear_cmds, word_end)); 630 if (strncmp(line, "select ", MAX(MIN(word_end, 7), 3)) == 0) 631 return (add_stuff(cpl, line, select_cmds, word_end)); 632 if (strncmp(line, "set ", MAX(MIN(word_end, 4), 3)) == 0) 633 return (add_stuff(cpl, line, set_cmds, word_end)); 634 if (strncmp(line, "remove ", MAX(MIN(word_end, 7), 1)) == 0) 635 return (add_stuff(cpl, line, remove_cmds, word_end)); 636 if (strncmp(line, "info ", MAX(MIN(word_end, 5), 1)) == 0) 637 return (add_stuff(cpl, line, info_cmds, word_end)); 638 return (add_stuff(cpl, line, global_scope_cmds, word_end)); 639 } 640 switch (resource_scope) { 641 case RT_FS: 642 return (add_stuff(cpl, line, fs_res_scope_cmds, word_end)); 643 case RT_NET: 644 return (add_stuff(cpl, line, net_res_scope_cmds, word_end)); 645 case RT_DEVICE: 646 return (add_stuff(cpl, line, device_res_scope_cmds, word_end)); 647 case RT_RCTL: 648 return (add_stuff(cpl, line, rctl_res_scope_cmds, word_end)); 649 case RT_ATTR: 650 return (add_stuff(cpl, line, attr_res_scope_cmds, word_end)); 651 case RT_DATASET: 652 return (add_stuff(cpl, line, dataset_res_scope_cmds, word_end)); 653 case RT_DCPU: 654 return (add_stuff(cpl, line, pset_res_scope_cmds, word_end)); 655 case RT_PCAP: 656 return (add_stuff(cpl, line, pcap_res_scope_cmds, word_end)); 657 case RT_MCAP: 658 return (add_stuff(cpl, line, mcap_res_scope_cmds, word_end)); 659 case RT_ADMIN: 660 return (add_stuff(cpl, line, admin_res_scope_cmds, word_end)); 661 } 662 return (0); 663 } 664 665 /* 666 * For the main CMD_func() functions below, several of them call getopt() 667 * then check optind against argc to make sure an extra parameter was not 668 * passed in. The reason this is not caught in the grammar is that the 669 * grammar just checks for a miscellaneous TOKEN, which is *expected* to 670 * be "-F" (for example), but could be anything. So (for example) this 671 * check will prevent "create bogus". 672 */ 673 674 cmd_t * 675 alloc_cmd(void) 676 { 677 return (calloc(1, sizeof (cmd_t))); 678 } 679 680 void 681 free_cmd(cmd_t *cmd) 682 { 683 int i; 684 685 for (i = 0; i < MAX_EQ_PROP_PAIRS; i++) 686 if (cmd->cmd_property_ptr[i] != NULL) { 687 property_value_ptr_t pp = cmd->cmd_property_ptr[i]; 688 689 switch (pp->pv_type) { 690 case PROP_VAL_SIMPLE: 691 free(pp->pv_simple); 692 break; 693 case PROP_VAL_COMPLEX: 694 free_complex(pp->pv_complex); 695 break; 696 case PROP_VAL_LIST: 697 free_list(pp->pv_list); 698 break; 699 } 700 } 701 for (i = 0; i < cmd->cmd_argc; i++) 702 free(cmd->cmd_argv[i]); 703 free(cmd); 704 } 705 706 complex_property_ptr_t 707 alloc_complex(void) 708 { 709 return (calloc(1, sizeof (complex_property_t))); 710 } 711 712 void 713 free_complex(complex_property_ptr_t complex) 714 { 715 if (complex == NULL) 716 return; 717 free_complex(complex->cp_next); 718 if (complex->cp_value != NULL) 719 free(complex->cp_value); 720 free(complex); 721 } 722 723 list_property_ptr_t 724 alloc_list(void) 725 { 726 return (calloc(1, sizeof (list_property_t))); 727 } 728 729 void 730 free_list(list_property_ptr_t list) 731 { 732 if (list == NULL) 733 return; 734 if (list->lp_simple != NULL) 735 free(list->lp_simple); 736 free_complex(list->lp_complex); 737 free_list(list->lp_next); 738 free(list); 739 } 740 741 void 742 free_outer_list(list_property_ptr_t list) 743 { 744 if (list == NULL) 745 return; 746 free_outer_list(list->lp_next); 747 free(list); 748 } 749 750 static struct zone_rctlvaltab * 751 alloc_rctlvaltab(void) 752 { 753 return (calloc(1, sizeof (struct zone_rctlvaltab))); 754 } 755 756 static char * 757 rt_to_str(int res_type) 758 { 759 assert(res_type >= RT_MIN && res_type <= RT_MAX); 760 return (res_types[res_type]); 761 } 762 763 static char * 764 pt_to_str(int prop_type) 765 { 766 assert(prop_type >= PT_MIN && prop_type <= PT_MAX); 767 return (prop_types[prop_type]); 768 } 769 770 static char * 771 pvt_to_str(int pv_type) 772 { 773 assert(pv_type >= PROP_VAL_MIN && pv_type <= PROP_VAL_MAX); 774 return (prop_val_types[pv_type]); 775 } 776 777 static char * 778 cmd_to_str(int cmd_num) 779 { 780 assert(cmd_num >= CMD_MIN && cmd_num <= CMD_MAX); 781 return (helptab[cmd_num].cmd_name); 782 } 783 784 /* PRINTFLIKE1 */ 785 static void 786 zerr(const char *fmt, ...) 787 { 788 va_list alist; 789 static int last_lineno; 790 791 /* lex_lineno has already been incremented in the lexer; compensate */ 792 if (cmd_file_mode && lex_lineno > last_lineno) { 793 if (strcmp(cmd_file_name, "-") == 0) 794 (void) fprintf(stderr, gettext("On line %d:\n"), 795 lex_lineno - 1); 796 else 797 (void) fprintf(stderr, gettext("On line %d of %s:\n"), 798 lex_lineno - 1, cmd_file_name); 799 last_lineno = lex_lineno; 800 } 801 va_start(alist, fmt); 802 (void) vfprintf(stderr, fmt, alist); 803 (void) fprintf(stderr, "\n"); 804 va_end(alist); 805 } 806 807 /* 808 * This is a separate function rather than a set of define's because of the 809 * gettext() wrapping. 810 */ 811 812 /* 813 * TRANSLATION_NOTE 814 * Each string below should have \t follow \n whenever needed; the 815 * initial \t and the terminal \n will be provided by the calling function. 816 */ 817 818 static char * 819 long_help(int cmd_num) 820 { 821 static char line[1024]; /* arbitrary large amount */ 822 823 assert(cmd_num >= CMD_MIN && cmd_num <= CMD_MAX); 824 switch (cmd_num) { 825 case CMD_HELP: 826 return (gettext("Prints help message.")); 827 case CMD_CREATE: 828 (void) snprintf(line, sizeof (line), 829 gettext("Creates a configuration for the " 830 "specified zone. %s should be\n\tused to " 831 "begin configuring a new zone. If overwriting an " 832 "existing\n\tconfiguration, the -F flag can be " 833 "used to force the action. If\n\t-t template is " 834 "given, creates a configuration identical to the\n" 835 "\tspecified template, except that the zone name " 836 "is changed from\n\ttemplate to zonename. '%s -a' " 837 "creates a configuration from a\n\tdetached " 838 "zonepath. '%s -b' results in a blank " 839 "configuration.\n\t'%s' with no arguments applies " 840 "the Sun default settings."), 841 cmd_to_str(CMD_CREATE), cmd_to_str(CMD_CREATE), 842 cmd_to_str(CMD_CREATE), cmd_to_str(CMD_CREATE)); 843 return (line); 844 case CMD_EXIT: 845 return (gettext("Exits the program. The -F flag can " 846 "be used to force the action.")); 847 case CMD_EXPORT: 848 return (gettext("Prints configuration to standard " 849 "output, or to output-file if\n\tspecified, in " 850 "a form suitable for use in a command-file.")); 851 case CMD_ADD: 852 return (gettext("Add specified resource to " 853 "configuration.")); 854 case CMD_DELETE: 855 return (gettext("Deletes the specified zone. The -F " 856 "flag can be used to force the\n\taction.")); 857 case CMD_REMOVE: 858 return (gettext("Remove specified resource from " 859 "configuration. The -F flag can be used\n\tto " 860 "force the action.")); 861 case CMD_SELECT: 862 (void) snprintf(line, sizeof (line), 863 gettext("Selects a resource to modify. " 864 "Resource modification is completed\n\twith the " 865 "command \"%s\". The property name/value pairs " 866 "must uniquely\n\tidentify a resource. Note that " 867 "the curly braces ('{', '}') mean one\n\tor more " 868 "of whatever is between them."), 869 cmd_to_str(CMD_END)); 870 return (line); 871 case CMD_SET: 872 return (gettext("Sets property values.")); 873 case CMD_CLEAR: 874 return (gettext("Clears property values.")); 875 case CMD_INFO: 876 return (gettext("Displays information about the " 877 "current configuration. If resource\n\ttype is " 878 "specified, displays only information about " 879 "resources of\n\tthe relevant type. If resource " 880 "id is specified, displays only\n\tinformation " 881 "about that resource.")); 882 case CMD_VERIFY: 883 return (gettext("Verifies current configuration " 884 "for correctness (some resource types\n\thave " 885 "required properties).")); 886 case CMD_COMMIT: 887 (void) snprintf(line, sizeof (line), 888 gettext("Commits current configuration. " 889 "Configuration must be committed to\n\tbe used by " 890 "%s. Until the configuration is committed, " 891 "changes \n\tcan be removed with the %s " 892 "command. This operation is\n\tattempted " 893 "automatically upon completion of a %s " 894 "session."), "zoneadm", cmd_to_str(CMD_REVERT), 895 "zonecfg"); 896 return (line); 897 case CMD_REVERT: 898 return (gettext("Reverts configuration back to the " 899 "last committed state. The -F flag\n\tcan be " 900 "used to force the action.")); 901 case CMD_CANCEL: 902 return (gettext("Cancels resource/property " 903 "specification.")); 904 case CMD_END: 905 return (gettext("Ends resource/property " 906 "specification.")); 907 } 908 /* NOTREACHED */ 909 return (NULL); 910 } 911 912 /* 913 * Return the input filename appended to each component of the path 914 * or the filename itself if it is absolute. 915 * Parameters: path string, file name, output string. 916 */ 917 /* Copied almost verbatim from libtnfctl/prb_findexec.c */ 918 static const char * 919 exec_cat(const char *s1, const char *s2, char *si) 920 { 921 char *s; 922 /* Number of remaining characters in s */ 923 int cnt = PATH_MAX + 1; 924 925 s = si; 926 while (*s1 && *s1 != ':') { /* Copy first component of path to si */ 927 if (cnt > 0) { 928 *s++ = *s1++; 929 cnt--; 930 } else { 931 s1++; 932 } 933 } 934 if (si != s && cnt > 0) { /* Add slash if s2 is not absolute */ 935 *s++ = '/'; 936 cnt--; 937 } 938 while (*s2 && cnt > 0) { /* Copy s2 to si */ 939 *s++ = *s2++; 940 cnt--; 941 } 942 *s = '\0'; /* Terminate the output string */ 943 return (*s1 ? ++s1 : NULL); /* Return next path component or NULL */ 944 } 945 946 /* Determine that a name exists in PATH */ 947 /* Copied with changes from libtnfctl/prb_findexec.c */ 948 static int 949 path_find(const char *name) 950 { 951 const char *pathstr; 952 char fname[PATH_MAX + 2]; 953 const char *cp; 954 struct stat stat_buf; 955 956 if ((pathstr = getenv("PATH")) == NULL) { 957 if (geteuid() == 0 || getuid() == 0) 958 pathstr = "/usr/sbin:/usr/bin"; 959 else 960 pathstr = "/usr/bin:"; 961 } 962 cp = strchr(name, '/') ? (const char *) "" : pathstr; 963 964 do { 965 cp = exec_cat(cp, name, fname); 966 if (stat(fname, &stat_buf) != -1) { 967 /* successful find of the file */ 968 return (0); 969 } 970 } while (cp != NULL); 971 972 return (-1); 973 } 974 975 static FILE * 976 pager_open(void) { 977 FILE *newfp; 978 char *pager, *space; 979 980 pager = getenv("PAGER"); 981 if (pager == NULL || *pager == '\0') 982 pager = PAGER; 983 984 space = strchr(pager, ' '); 985 if (space) 986 *space = '\0'; 987 if (path_find(pager) == 0) { 988 if (space) 989 *space = ' '; 990 if ((newfp = popen(pager, "w")) == NULL) 991 zerr(gettext("PAGER open failed (%s)."), 992 strerror(errno)); 993 return (newfp); 994 } else { 995 zerr(gettext("PAGER %s does not exist (%s)."), 996 pager, strerror(errno)); 997 } 998 return (NULL); 999 } 1000 1001 static void 1002 pager_close(FILE *fp) { 1003 int status; 1004 1005 status = pclose(fp); 1006 if (status == -1) 1007 zerr(gettext("PAGER close failed (%s)."), 1008 strerror(errno)); 1009 } 1010 1011 /* 1012 * Called with verbose TRUE when help is explicitly requested, FALSE for 1013 * unexpected errors. 1014 */ 1015 1016 void 1017 usage(boolean_t verbose, uint_t flags) 1018 { 1019 FILE *fp = verbose ? stdout : stderr; 1020 FILE *newfp; 1021 boolean_t need_to_close = B_FALSE; 1022 int i; 1023 1024 /* don't page error output */ 1025 if (verbose && interactive_mode) { 1026 if ((newfp = pager_open()) != NULL) { 1027 need_to_close = B_TRUE; 1028 fp = newfp; 1029 } 1030 } 1031 1032 if (flags & HELP_META) { 1033 (void) fprintf(fp, gettext("More help is available for the " 1034 "following:\n")); 1035 (void) fprintf(fp, "\n\tcommands ('%s commands')\n", 1036 cmd_to_str(CMD_HELP)); 1037 (void) fprintf(fp, "\tsyntax ('%s syntax')\n", 1038 cmd_to_str(CMD_HELP)); 1039 (void) fprintf(fp, "\tusage ('%s usage')\n\n", 1040 cmd_to_str(CMD_HELP)); 1041 (void) fprintf(fp, gettext("You may also obtain help on any " 1042 "command by typing '%s <command-name>.'\n"), 1043 cmd_to_str(CMD_HELP)); 1044 } 1045 if (flags & HELP_RES_SCOPE) { 1046 switch (resource_scope) { 1047 case RT_FS: 1048 (void) fprintf(fp, gettext("The '%s' resource scope is " 1049 "used to configure a file-system.\n"), 1050 rt_to_str(resource_scope)); 1051 (void) fprintf(fp, gettext("Valid commands:\n")); 1052 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1053 pt_to_str(PT_DIR), gettext("<path>")); 1054 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1055 pt_to_str(PT_SPECIAL), gettext("<path>")); 1056 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1057 pt_to_str(PT_RAW), gettext("<raw-device>")); 1058 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1059 pt_to_str(PT_TYPE), gettext("<file-system type>")); 1060 (void) fprintf(fp, "\t%s %s %s\n", cmd_to_str(CMD_ADD), 1061 pt_to_str(PT_OPTIONS), 1062 gettext("<file-system options>")); 1063 (void) fprintf(fp, "\t%s %s %s\n", 1064 cmd_to_str(CMD_REMOVE), pt_to_str(PT_OPTIONS), 1065 gettext("<file-system options>")); 1066 (void) fprintf(fp, gettext("Consult the file-system " 1067 "specific manual page, such as mount_ufs(1M), " 1068 "for\ndetails about file-system options. Note " 1069 "that any file-system options with an\nembedded " 1070 "'=' character must be enclosed in double quotes, " 1071 /*CSTYLED*/ 1072 "such as \"%s=5\".\n"), MNTOPT_RETRY); 1073 break; 1074 case RT_NET: 1075 (void) fprintf(fp, gettext("The '%s' resource scope is " 1076 "used to configure a network interface.\n"), 1077 rt_to_str(resource_scope)); 1078 (void) fprintf(fp, gettext("Valid commands:\n")); 1079 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1080 pt_to_str(PT_ADDRESS), gettext("<IP-address>")); 1081 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1082 pt_to_str(PT_ALLOWED_ADDRESS), 1083 gettext("<IP-address>")); 1084 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1085 pt_to_str(PT_PHYSICAL), gettext("<interface>")); 1086 (void) fprintf(fp, gettext("See ifconfig(1M) for " 1087 "details of the <interface> string.\n")); 1088 (void) fprintf(fp, gettext("%s %s is valid " 1089 "if the %s property is set to %s, otherwise it " 1090 "must not be set.\n"), 1091 cmd_to_str(CMD_SET), pt_to_str(PT_ADDRESS), 1092 pt_to_str(PT_IPTYPE), gettext("shared")); 1093 (void) fprintf(fp, gettext("%s %s is valid " 1094 "if the %s property is set to %s, otherwise it " 1095 "must not be set.\n"), 1096 cmd_to_str(CMD_SET), pt_to_str(PT_ALLOWED_ADDRESS), 1097 pt_to_str(PT_IPTYPE), gettext("exclusive")); 1098 (void) fprintf(fp, gettext("\t%s %s=%s\n%s %s " 1099 "is valid if the %s or %s property is set, " 1100 "otherwise it must not be set\n"), 1101 cmd_to_str(CMD_SET), 1102 pt_to_str(PT_DEFROUTER), gettext("<IP-address>"), 1103 cmd_to_str(CMD_SET), pt_to_str(PT_DEFROUTER), 1104 gettext(pt_to_str(PT_ADDRESS)), 1105 gettext(pt_to_str(PT_ALLOWED_ADDRESS))); 1106 break; 1107 case RT_DEVICE: 1108 (void) fprintf(fp, gettext("The '%s' resource scope is " 1109 "used to configure a device node.\n"), 1110 rt_to_str(resource_scope)); 1111 (void) fprintf(fp, gettext("Valid commands:\n")); 1112 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1113 pt_to_str(PT_MATCH), gettext("<device-path>")); 1114 break; 1115 case RT_RCTL: 1116 (void) fprintf(fp, gettext("The '%s' resource scope is " 1117 "used to configure a resource control.\n"), 1118 rt_to_str(resource_scope)); 1119 (void) fprintf(fp, gettext("Valid commands:\n")); 1120 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1121 pt_to_str(PT_NAME), gettext("<string>")); 1122 (void) fprintf(fp, "\t%s %s (%s=%s,%s=%s,%s=%s)\n", 1123 cmd_to_str(CMD_ADD), pt_to_str(PT_VALUE), 1124 pt_to_str(PT_PRIV), gettext("<priv-value>"), 1125 pt_to_str(PT_LIMIT), gettext("<number>"), 1126 pt_to_str(PT_ACTION), gettext("<action-value>")); 1127 (void) fprintf(fp, "\t%s %s (%s=%s,%s=%s,%s=%s)\n", 1128 cmd_to_str(CMD_REMOVE), pt_to_str(PT_VALUE), 1129 pt_to_str(PT_PRIV), gettext("<priv-value>"), 1130 pt_to_str(PT_LIMIT), gettext("<number>"), 1131 pt_to_str(PT_ACTION), gettext("<action-value>")); 1132 (void) fprintf(fp, "%s\n\t%s := privileged\n" 1133 "\t%s := none | deny\n", gettext("Where"), 1134 gettext("<priv-value>"), gettext("<action-value>")); 1135 break; 1136 case RT_ATTR: 1137 (void) fprintf(fp, gettext("The '%s' resource scope is " 1138 "used to configure a generic attribute.\n"), 1139 rt_to_str(resource_scope)); 1140 (void) fprintf(fp, gettext("Valid commands:\n")); 1141 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1142 pt_to_str(PT_NAME), gettext("<name>")); 1143 (void) fprintf(fp, "\t%s %s=boolean\n", 1144 cmd_to_str(CMD_SET), pt_to_str(PT_TYPE)); 1145 (void) fprintf(fp, "\t%s %s=true | false\n", 1146 cmd_to_str(CMD_SET), pt_to_str(PT_VALUE)); 1147 (void) fprintf(fp, gettext("or\n")); 1148 (void) fprintf(fp, "\t%s %s=int\n", cmd_to_str(CMD_SET), 1149 pt_to_str(PT_TYPE)); 1150 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1151 pt_to_str(PT_VALUE), gettext("<integer>")); 1152 (void) fprintf(fp, gettext("or\n")); 1153 (void) fprintf(fp, "\t%s %s=string\n", 1154 cmd_to_str(CMD_SET), pt_to_str(PT_TYPE)); 1155 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1156 pt_to_str(PT_VALUE), gettext("<string>")); 1157 (void) fprintf(fp, gettext("or\n")); 1158 (void) fprintf(fp, "\t%s %s=uint\n", 1159 cmd_to_str(CMD_SET), pt_to_str(PT_TYPE)); 1160 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1161 pt_to_str(PT_VALUE), gettext("<unsigned integer>")); 1162 break; 1163 case RT_DATASET: 1164 (void) fprintf(fp, gettext("The '%s' resource scope is " 1165 "used to export ZFS datasets.\n"), 1166 rt_to_str(resource_scope)); 1167 (void) fprintf(fp, gettext("Valid commands:\n")); 1168 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1169 pt_to_str(PT_NAME), gettext("<name>")); 1170 break; 1171 case RT_DCPU: 1172 (void) fprintf(fp, gettext("The '%s' resource scope " 1173 "configures the 'pools' facility to dedicate\na " 1174 "subset of the system's processors to this zone " 1175 "while it is running.\n"), 1176 rt_to_str(resource_scope)); 1177 (void) fprintf(fp, gettext("Valid commands:\n")); 1178 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1179 pt_to_str(PT_NCPUS), 1180 gettext("<unsigned integer | range>")); 1181 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1182 pt_to_str(PT_IMPORTANCE), 1183 gettext("<unsigned integer>")); 1184 break; 1185 case RT_PCAP: 1186 (void) fprintf(fp, gettext("The '%s' resource scope is " 1187 "used to set an upper limit (a cap) on the\n" 1188 "percentage of CPU that can be used by this zone. " 1189 "A '%s' value of 1\ncorresponds to one cpu. The " 1190 "value can be set higher than 1, up to the total\n" 1191 "number of CPUs on the system. The value can " 1192 "also be less than 1,\nrepresenting a fraction of " 1193 "a cpu.\n"), 1194 rt_to_str(resource_scope), pt_to_str(PT_NCPUS)); 1195 (void) fprintf(fp, gettext("Valid commands:\n")); 1196 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1197 pt_to_str(PT_NCPUS), gettext("<unsigned decimal>")); 1198 break; 1199 case RT_MCAP: 1200 (void) fprintf(fp, gettext("The '%s' resource scope is " 1201 "used to set an upper limit (a cap) on the\n" 1202 "amount of physical memory, swap space and locked " 1203 "memory that can be used by\nthis zone.\n"), 1204 rt_to_str(resource_scope)); 1205 (void) fprintf(fp, gettext("Valid commands:\n")); 1206 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1207 pt_to_str(PT_PHYSICAL), 1208 gettext("<qualified unsigned decimal>")); 1209 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1210 pt_to_str(PT_SWAP), 1211 gettext("<qualified unsigned decimal>")); 1212 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1213 pt_to_str(PT_LOCKED), 1214 gettext("<qualified unsigned decimal>")); 1215 break; 1216 case RT_ADMIN: 1217 (void) fprintf(fp, gettext("The '%s' resource scope is " 1218 "used to delegate specific zone management\n" 1219 "rights to users and roles. These rights are " 1220 "only applicable to this zone.\n"), 1221 rt_to_str(resource_scope)); 1222 (void) fprintf(fp, gettext("Valid commands:\n")); 1223 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1224 pt_to_str(PT_USER), 1225 gettext("<single user or role name>")); 1226 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1227 pt_to_str(PT_AUTHS), 1228 gettext("<comma separated list>")); 1229 break; 1230 } 1231 (void) fprintf(fp, gettext("And from any resource scope, you " 1232 "can:\n")); 1233 (void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_END), 1234 gettext("(to conclude this operation)")); 1235 (void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_CANCEL), 1236 gettext("(to cancel this operation)")); 1237 (void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_EXIT), 1238 gettext("(to exit the zonecfg utility)")); 1239 } 1240 if (flags & HELP_USAGE) { 1241 (void) fprintf(fp, "%s:\t%s %s\n", gettext("usage"), 1242 execname, cmd_to_str(CMD_HELP)); 1243 (void) fprintf(fp, "\t%s -z <zone>\t\t\t(%s)\n", 1244 execname, gettext("interactive")); 1245 (void) fprintf(fp, "\t%s -z <zone> <command>\n", execname); 1246 (void) fprintf(fp, "\t%s -z <zone> -f <command-file>\n", 1247 execname); 1248 } 1249 if (flags & HELP_SUBCMDS) { 1250 (void) fprintf(fp, "%s:\n\n", gettext("Commands")); 1251 for (i = 0; i <= CMD_MAX; i++) { 1252 (void) fprintf(fp, "%s\n", helptab[i].short_usage); 1253 if (verbose) 1254 (void) fprintf(fp, "\t%s\n\n", long_help(i)); 1255 } 1256 } 1257 if (flags & HELP_SYNTAX) { 1258 if (!verbose) 1259 (void) fprintf(fp, "\n"); 1260 (void) fprintf(fp, "<zone> := [A-Za-z0-9][A-Za-z0-9_.-]*\n"); 1261 (void) fprintf(fp, gettext("\t(except the reserved words " 1262 "'%s' and anything starting with '%s')\n"), "global", 1263 "SUNW"); 1264 (void) fprintf(fp, 1265 gettext("\tName must be less than %d characters.\n"), 1266 ZONENAME_MAX); 1267 if (verbose) 1268 (void) fprintf(fp, "\n"); 1269 } 1270 if (flags & HELP_NETADDR) { 1271 (void) fprintf(fp, gettext("\n<net-addr> :=")); 1272 (void) fprintf(fp, 1273 gettext("\t<IPv4-address>[/<IPv4-prefix-length>] |\n")); 1274 (void) fprintf(fp, 1275 gettext("\t\t<IPv6-address>/<IPv6-prefix-length> |\n")); 1276 (void) fprintf(fp, 1277 gettext("\t\t<hostname>[/<IPv4-prefix-length>]\n")); 1278 (void) fprintf(fp, gettext("See inet(3SOCKET) for IPv4 and " 1279 "IPv6 address syntax.\n")); 1280 (void) fprintf(fp, gettext("<IPv4-prefix-length> := [0-32]\n")); 1281 (void) fprintf(fp, 1282 gettext("<IPv6-prefix-length> := [0-128]\n")); 1283 (void) fprintf(fp, 1284 gettext("<hostname> := [A-Za-z0-9][A-Za-z0-9-.]*\n")); 1285 } 1286 if (flags & HELP_RESOURCES) { 1287 (void) fprintf(fp, "<%s> := %s | %s | %s | %s | %s |\n\t" 1288 "%s | %s | %s | %s | %s\n\n", 1289 gettext("resource type"), rt_to_str(RT_FS), 1290 rt_to_str(RT_NET), rt_to_str(RT_DEVICE), 1291 rt_to_str(RT_RCTL), rt_to_str(RT_ATTR), 1292 rt_to_str(RT_DATASET), rt_to_str(RT_DCPU), 1293 rt_to_str(RT_PCAP), rt_to_str(RT_MCAP), 1294 rt_to_str(RT_ADMIN)); 1295 } 1296 if (flags & HELP_PROPS) { 1297 (void) fprintf(fp, gettext("For resource type ... there are " 1298 "property types ...:\n")); 1299 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1300 pt_to_str(PT_ZONENAME)); 1301 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1302 pt_to_str(PT_ZONEPATH)); 1303 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1304 pt_to_str(PT_BRAND)); 1305 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1306 pt_to_str(PT_AUTOBOOT)); 1307 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1308 pt_to_str(PT_BOOTARGS)); 1309 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1310 pt_to_str(PT_POOL)); 1311 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1312 pt_to_str(PT_LIMITPRIV)); 1313 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1314 pt_to_str(PT_SCHED)); 1315 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1316 pt_to_str(PT_IPTYPE)); 1317 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1318 pt_to_str(PT_HOSTID)); 1319 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1320 pt_to_str(PT_FS_ALLOWED)); 1321 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1322 pt_to_str(PT_MAXLWPS)); 1323 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1324 pt_to_str(PT_MAXPROCS)); 1325 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1326 pt_to_str(PT_MAXSHMMEM)); 1327 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1328 pt_to_str(PT_MAXSHMIDS)); 1329 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1330 pt_to_str(PT_MAXMSGIDS)); 1331 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1332 pt_to_str(PT_MAXSEMIDS)); 1333 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1334 pt_to_str(PT_SHARES)); 1335 (void) fprintf(fp, "\t%s\t\t%s, %s, %s, %s, %s\n", 1336 rt_to_str(RT_FS), pt_to_str(PT_DIR), 1337 pt_to_str(PT_SPECIAL), pt_to_str(PT_RAW), 1338 pt_to_str(PT_TYPE), pt_to_str(PT_OPTIONS)); 1339 (void) fprintf(fp, "\t%s\t\t%s, %s, %s|%s\n", rt_to_str(RT_NET), 1340 pt_to_str(PT_ADDRESS), pt_to_str(PT_ALLOWED_ADDRESS), 1341 pt_to_str(PT_PHYSICAL), pt_to_str(PT_DEFROUTER)); 1342 (void) fprintf(fp, "\t%s\t\t%s\n", rt_to_str(RT_DEVICE), 1343 pt_to_str(PT_MATCH)); 1344 (void) fprintf(fp, "\t%s\t\t%s, %s\n", rt_to_str(RT_RCTL), 1345 pt_to_str(PT_NAME), pt_to_str(PT_VALUE)); 1346 (void) fprintf(fp, "\t%s\t\t%s, %s, %s\n", rt_to_str(RT_ATTR), 1347 pt_to_str(PT_NAME), pt_to_str(PT_TYPE), 1348 pt_to_str(PT_VALUE)); 1349 (void) fprintf(fp, "\t%s\t\t%s\n", rt_to_str(RT_DATASET), 1350 pt_to_str(PT_NAME)); 1351 (void) fprintf(fp, "\t%s\t%s, %s\n", rt_to_str(RT_DCPU), 1352 pt_to_str(PT_NCPUS), pt_to_str(PT_IMPORTANCE)); 1353 (void) fprintf(fp, "\t%s\t%s\n", rt_to_str(RT_PCAP), 1354 pt_to_str(PT_NCPUS)); 1355 (void) fprintf(fp, "\t%s\t%s, %s, %s\n", rt_to_str(RT_MCAP), 1356 pt_to_str(PT_PHYSICAL), pt_to_str(PT_SWAP), 1357 pt_to_str(PT_LOCKED)); 1358 (void) fprintf(fp, "\t%s\t\t%s, %s\n", rt_to_str(RT_ADMIN), 1359 pt_to_str(PT_USER), pt_to_str(PT_AUTHS)); 1360 } 1361 if (need_to_close) 1362 (void) pager_close(fp); 1363 } 1364 1365 static void 1366 zone_perror(char *prefix, int err, boolean_t set_saw) 1367 { 1368 zerr("%s: %s", prefix, zonecfg_strerror(err)); 1369 if (set_saw) 1370 saw_error = B_TRUE; 1371 } 1372 1373 /* 1374 * zone_perror() expects a single string, but for remove and select 1375 * we have both the command and the resource type, so this wrapper 1376 * function serves the same purpose in a slightly different way. 1377 */ 1378 1379 static void 1380 z_cmd_rt_perror(int cmd_num, int res_num, int err, boolean_t set_saw) 1381 { 1382 zerr("%s %s: %s", cmd_to_str(cmd_num), rt_to_str(res_num), 1383 zonecfg_strerror(err)); 1384 if (set_saw) 1385 saw_error = B_TRUE; 1386 } 1387 1388 /* returns Z_OK if successful, Z_foo from <libzonecfg.h> otherwise */ 1389 static int 1390 initialize(boolean_t handle_expected) 1391 { 1392 int err; 1393 char brandname[MAXNAMELEN]; 1394 1395 if (zonecfg_check_handle(handle) != Z_OK) { 1396 if ((err = zonecfg_get_handle(zone, handle)) == Z_OK) { 1397 got_handle = B_TRUE; 1398 if (zonecfg_get_brand(handle, brandname, 1399 sizeof (brandname)) != Z_OK) { 1400 zerr("Zone %s is inconsistent: missing " 1401 "brand attribute", zone); 1402 exit(Z_ERR); 1403 } 1404 if ((brand = brand_open(brandname)) == NULL) { 1405 zerr("Zone %s uses non-existent brand \"%s\"." 1406 " Unable to continue", zone, brandname); 1407 exit(Z_ERR); 1408 } 1409 /* 1410 * If the user_attr file is newer than 1411 * the zone config file, the admins 1412 * may need to be updated since the 1413 * RBAC files are authoritative for 1414 * authorization checks. 1415 */ 1416 err = zonecfg_update_userauths(handle, zone); 1417 if (err == Z_OK) { 1418 zerr(gettext("The administrative rights " 1419 "were updated to match " 1420 "the current RBAC configuration.\n" 1421 "Use \"info admin\" and \"revert\" to " 1422 "compare with the previous settings.")); 1423 need_to_commit = B_TRUE; 1424 } else if (err != Z_NO_ENTRY) { 1425 zerr(gettext("failed to update " 1426 "admin rights.")); 1427 exit(Z_ERR); 1428 } else if (need_to_commit) { 1429 zerr(gettext("admin rights were updated " 1430 "to match RBAC configuration.")); 1431 } 1432 1433 } else if (global_zone && err == Z_NO_ZONE && !got_handle && 1434 !read_only_mode) { 1435 /* 1436 * We implicitly create the global zone config if it 1437 * doesn't exist. 1438 */ 1439 zone_dochandle_t tmphandle; 1440 1441 if ((tmphandle = zonecfg_init_handle()) == NULL) { 1442 zone_perror(execname, Z_NOMEM, B_TRUE); 1443 exit(Z_ERR); 1444 } 1445 1446 err = zonecfg_get_template_handle("SUNWblank", zone, 1447 tmphandle); 1448 1449 if (err != Z_OK) { 1450 zonecfg_fini_handle(tmphandle); 1451 zone_perror("SUNWblank", err, B_TRUE); 1452 return (err); 1453 } 1454 1455 need_to_commit = B_TRUE; 1456 zonecfg_fini_handle(handle); 1457 handle = tmphandle; 1458 got_handle = B_TRUE; 1459 1460 } else { 1461 zone_perror(zone, err, handle_expected || got_handle); 1462 if (err == Z_NO_ZONE && !got_handle && 1463 interactive_mode && !read_only_mode) 1464 (void) printf(gettext("Use '%s' to begin " 1465 "configuring a new zone.\n"), 1466 cmd_to_str(CMD_CREATE)); 1467 return (err); 1468 } 1469 } 1470 return (Z_OK); 1471 } 1472 1473 static boolean_t 1474 state_atleast(zone_state_t state) 1475 { 1476 zone_state_t state_num; 1477 int err; 1478 1479 if ((err = zone_get_state(zone, &state_num)) != Z_OK) { 1480 /* all states are greater than "non-existent" */ 1481 if (err == Z_NO_ZONE) 1482 return (B_FALSE); 1483 zerr(gettext("Unexpectedly failed to determine state " 1484 "of zone %s: %s"), zone, zonecfg_strerror(err)); 1485 exit(Z_ERR); 1486 } 1487 return (state_num >= state); 1488 } 1489 1490 /* 1491 * short_usage() is for bad syntax: getopt() issues, too many arguments, etc. 1492 */ 1493 1494 void 1495 short_usage(int command) 1496 { 1497 /* lex_lineno has already been incremented in the lexer; compensate */ 1498 if (cmd_file_mode) { 1499 if (strcmp(cmd_file_name, "-") == 0) 1500 (void) fprintf(stderr, 1501 gettext("syntax error on line %d\n"), 1502 lex_lineno - 1); 1503 else 1504 (void) fprintf(stderr, 1505 gettext("syntax error on line %d of %s\n"), 1506 lex_lineno - 1, cmd_file_name); 1507 } 1508 (void) fprintf(stderr, "%s:\n%s\n", gettext("usage"), 1509 helptab[command].short_usage); 1510 saw_error = B_TRUE; 1511 } 1512 1513 /* 1514 * long_usage() is for bad semantics: e.g., wrong property type for a given 1515 * resource type. It is also used by longer_usage() below. 1516 */ 1517 1518 void 1519 long_usage(uint_t cmd_num, boolean_t set_saw) 1520 { 1521 (void) fprintf(set_saw ? stderr : stdout, "%s:\n%s\n", gettext("usage"), 1522 helptab[cmd_num].short_usage); 1523 (void) fprintf(set_saw ? stderr : stdout, "\t%s\n", long_help(cmd_num)); 1524 if (set_saw) 1525 saw_error = B_TRUE; 1526 } 1527 1528 /* 1529 * longer_usage() is for 'help foo' and 'foo -?': call long_usage() and also 1530 * any extra usage() flags as appropriate for whatever command. 1531 */ 1532 1533 void 1534 longer_usage(uint_t cmd_num) 1535 { 1536 long_usage(cmd_num, B_FALSE); 1537 if (helptab[cmd_num].flags != 0) { 1538 (void) printf("\n"); 1539 usage(B_TRUE, helptab[cmd_num].flags); 1540 } 1541 } 1542 1543 /* 1544 * scope_usage() is simply used when a command is called from the wrong scope. 1545 */ 1546 1547 static void 1548 scope_usage(uint_t cmd_num) 1549 { 1550 zerr(gettext("The %s command only makes sense in the %s scope."), 1551 cmd_to_str(cmd_num), 1552 global_scope ? gettext("resource") : gettext("global")); 1553 saw_error = B_TRUE; 1554 } 1555 1556 /* 1557 * On input, B_TRUE => yes, B_FALSE => no. 1558 * On return, B_TRUE => 1, B_FALSE => no, could not ask => -1. 1559 */ 1560 1561 static int 1562 ask_yesno(boolean_t default_answer, const char *question) 1563 { 1564 char line[64]; /* should be enough to answer yes or no */ 1565 1566 if (!ok_to_prompt) { 1567 saw_error = B_TRUE; 1568 return (-1); 1569 } 1570 for (;;) { 1571 if (printf("%s (%s)? ", question, 1572 default_answer ? "[y]/n" : "y/[n]") < 0) 1573 return (-1); 1574 if (fgets(line, sizeof (line), stdin) == NULL) 1575 return (-1); 1576 1577 if (line[0] == '\n') 1578 return (default_answer ? 1 : 0); 1579 if (tolower(line[0]) == 'y') 1580 return (1); 1581 if (tolower(line[0]) == 'n') 1582 return (0); 1583 } 1584 } 1585 1586 /* 1587 * Prints warning if zone already exists. 1588 * In interactive mode, prompts if we should continue anyway and returns Z_OK 1589 * if so, Z_ERR if not. In non-interactive mode, exits with Z_ERR. 1590 * 1591 * Note that if a zone exists and its state is >= INSTALLED, an error message 1592 * will be printed and this function will return Z_ERR regardless of mode. 1593 */ 1594 1595 static int 1596 check_if_zone_already_exists(boolean_t force) 1597 { 1598 char line[ZONENAME_MAX + 128]; /* enough to ask a question */ 1599 zone_dochandle_t tmphandle; 1600 int res, answer; 1601 1602 if ((tmphandle = zonecfg_init_handle()) == NULL) { 1603 zone_perror(execname, Z_NOMEM, B_TRUE); 1604 exit(Z_ERR); 1605 } 1606 res = zonecfg_get_handle(zone, tmphandle); 1607 zonecfg_fini_handle(tmphandle); 1608 if (res != Z_OK) 1609 return (Z_OK); 1610 1611 if (state_atleast(ZONE_STATE_INSTALLED)) { 1612 zerr(gettext("Zone %s already installed; %s not allowed."), 1613 zone, cmd_to_str(CMD_CREATE)); 1614 return (Z_ERR); 1615 } 1616 1617 if (force) { 1618 (void) printf(gettext("Zone %s already exists; overwriting.\n"), 1619 zone); 1620 return (Z_OK); 1621 } 1622 (void) snprintf(line, sizeof (line), 1623 gettext("Zone %s already exists; %s anyway"), zone, 1624 cmd_to_str(CMD_CREATE)); 1625 if ((answer = ask_yesno(B_FALSE, line)) == -1) { 1626 zerr(gettext("Zone exists, input not from terminal and -F not " 1627 "specified:\n%s command ignored, exiting."), 1628 cmd_to_str(CMD_CREATE)); 1629 exit(Z_ERR); 1630 } 1631 return (answer == 1 ? Z_OK : Z_ERR); 1632 } 1633 1634 static boolean_t 1635 zone_is_read_only(int cmd_num) 1636 { 1637 if (strncmp(zone, "SUNW", 4) == 0) { 1638 zerr(gettext("%s: zones beginning with SUNW are read-only."), 1639 zone); 1640 saw_error = B_TRUE; 1641 return (B_TRUE); 1642 } 1643 if (read_only_mode) { 1644 zerr(gettext("%s: cannot %s in read-only mode."), zone, 1645 cmd_to_str(cmd_num)); 1646 saw_error = B_TRUE; 1647 return (B_TRUE); 1648 } 1649 return (B_FALSE); 1650 } 1651 1652 /* 1653 * Create a new configuration. 1654 */ 1655 void 1656 create_func(cmd_t *cmd) 1657 { 1658 int err, arg; 1659 char zone_template[ZONENAME_MAX]; 1660 char attach_path[MAXPATHLEN]; 1661 zone_dochandle_t tmphandle; 1662 boolean_t force = B_FALSE; 1663 boolean_t attach = B_FALSE; 1664 boolean_t arg_err = B_FALSE; 1665 1666 assert(cmd != NULL); 1667 1668 /* This is the default if no arguments are given. */ 1669 (void) strlcpy(zone_template, "SUNWdefault", sizeof (zone_template)); 1670 1671 optind = 0; 1672 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?a:bFt:")) 1673 != EOF) { 1674 switch (arg) { 1675 case '?': 1676 if (optopt == '?') 1677 longer_usage(CMD_CREATE); 1678 else 1679 short_usage(CMD_CREATE); 1680 arg_err = B_TRUE; 1681 break; 1682 case 'a': 1683 (void) strlcpy(attach_path, optarg, 1684 sizeof (attach_path)); 1685 attach = B_TRUE; 1686 break; 1687 case 'b': 1688 (void) strlcpy(zone_template, "SUNWblank", 1689 sizeof (zone_template)); 1690 break; 1691 case 'F': 1692 force = B_TRUE; 1693 break; 1694 case 't': 1695 (void) strlcpy(zone_template, optarg, 1696 sizeof (zone_template)); 1697 break; 1698 default: 1699 short_usage(CMD_CREATE); 1700 arg_err = B_TRUE; 1701 break; 1702 } 1703 } 1704 if (arg_err) 1705 return; 1706 1707 if (optind != cmd->cmd_argc) { 1708 short_usage(CMD_CREATE); 1709 return; 1710 } 1711 1712 if (zone_is_read_only(CMD_CREATE)) 1713 return; 1714 1715 if (check_if_zone_already_exists(force) != Z_OK) 1716 return; 1717 1718 /* 1719 * Get a temporary handle first. If that fails, the old handle 1720 * will not be lost. Then finish whichever one we don't need, 1721 * to avoid leaks. Then get the handle for zone_template, and 1722 * set the name to zone: this "copy, rename" method is how 1723 * create -[b|t] works. 1724 */ 1725 if ((tmphandle = zonecfg_init_handle()) == NULL) { 1726 zone_perror(execname, Z_NOMEM, B_TRUE); 1727 exit(Z_ERR); 1728 } 1729 1730 if (attach) 1731 err = zonecfg_get_attach_handle(attach_path, ZONE_DETACHED, 1732 zone, B_FALSE, tmphandle); 1733 else 1734 err = zonecfg_get_template_handle(zone_template, zone, 1735 tmphandle); 1736 1737 if (err != Z_OK) { 1738 zonecfg_fini_handle(tmphandle); 1739 if (attach && err == Z_NO_ZONE) 1740 (void) fprintf(stderr, gettext("invalid path to " 1741 "detached zone\n")); 1742 else if (attach && err == Z_INVALID_DOCUMENT) 1743 (void) fprintf(stderr, gettext("Cannot attach to an " 1744 "earlier release of the operating system\n")); 1745 else 1746 zone_perror(zone_template, err, B_TRUE); 1747 return; 1748 } 1749 1750 need_to_commit = B_TRUE; 1751 zonecfg_fini_handle(handle); 1752 handle = tmphandle; 1753 got_handle = B_TRUE; 1754 } 1755 1756 /* 1757 * This malloc()'s memory, which must be freed by the caller. 1758 */ 1759 static char * 1760 quoteit(char *instr) 1761 { 1762 char *outstr; 1763 size_t outstrsize = strlen(instr) + 3; /* 2 quotes + '\0' */ 1764 1765 if ((outstr = malloc(outstrsize)) == NULL) { 1766 zone_perror(zone, Z_NOMEM, B_FALSE); 1767 exit(Z_ERR); 1768 } 1769 if (strchr(instr, ' ') == NULL) { 1770 (void) strlcpy(outstr, instr, outstrsize); 1771 return (outstr); 1772 } 1773 (void) snprintf(outstr, outstrsize, "\"%s\"", instr); 1774 return (outstr); 1775 } 1776 1777 static void 1778 export_prop(FILE *of, int prop_num, char *prop_id) 1779 { 1780 char *quote_str; 1781 1782 if (strlen(prop_id) == 0) 1783 return; 1784 quote_str = quoteit(prop_id); 1785 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1786 pt_to_str(prop_num), quote_str); 1787 free(quote_str); 1788 } 1789 1790 void 1791 export_func(cmd_t *cmd) 1792 { 1793 struct zone_nwiftab nwiftab; 1794 struct zone_fstab fstab; 1795 struct zone_devtab devtab; 1796 struct zone_attrtab attrtab; 1797 struct zone_rctltab rctltab; 1798 struct zone_dstab dstab; 1799 struct zone_psettab psettab; 1800 struct zone_mcaptab mcaptab; 1801 struct zone_rctlvaltab *valptr; 1802 struct zone_admintab admintab; 1803 int err, arg; 1804 char zonepath[MAXPATHLEN], outfile[MAXPATHLEN], pool[MAXNAMELEN]; 1805 char bootargs[BOOTARGS_MAX]; 1806 char sched[MAXNAMELEN]; 1807 char brand[MAXNAMELEN]; 1808 char hostidp[HW_HOSTID_LEN]; 1809 char fsallowedp[ZONE_FS_ALLOWED_MAX]; 1810 char *limitpriv; 1811 FILE *of; 1812 boolean_t autoboot; 1813 zone_iptype_t iptype; 1814 boolean_t need_to_close = B_FALSE; 1815 boolean_t arg_err = B_FALSE; 1816 1817 assert(cmd != NULL); 1818 1819 outfile[0] = '\0'; 1820 optind = 0; 1821 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?f:")) != EOF) { 1822 switch (arg) { 1823 case '?': 1824 if (optopt == '?') 1825 longer_usage(CMD_EXPORT); 1826 else 1827 short_usage(CMD_EXPORT); 1828 arg_err = B_TRUE; 1829 break; 1830 case 'f': 1831 (void) strlcpy(outfile, optarg, sizeof (outfile)); 1832 break; 1833 default: 1834 short_usage(CMD_EXPORT); 1835 arg_err = B_TRUE; 1836 break; 1837 } 1838 } 1839 if (arg_err) 1840 return; 1841 1842 if (optind != cmd->cmd_argc) { 1843 short_usage(CMD_EXPORT); 1844 return; 1845 } 1846 if (strlen(outfile) == 0) { 1847 of = stdout; 1848 } else { 1849 if ((of = fopen(outfile, "w")) == NULL) { 1850 zerr(gettext("opening file %s: %s"), 1851 outfile, strerror(errno)); 1852 goto done; 1853 } 1854 setbuf(of, NULL); 1855 need_to_close = B_TRUE; 1856 } 1857 1858 if ((err = initialize(B_TRUE)) != Z_OK) 1859 goto done; 1860 1861 (void) fprintf(of, "%s -b\n", cmd_to_str(CMD_CREATE)); 1862 1863 if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) == Z_OK && 1864 strlen(zonepath) > 0) 1865 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1866 pt_to_str(PT_ZONEPATH), zonepath); 1867 1868 if ((zone_get_brand(zone, brand, sizeof (brand)) == Z_OK) && 1869 (strcmp(brand, NATIVE_BRAND_NAME) != 0)) 1870 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1871 pt_to_str(PT_BRAND), brand); 1872 1873 if (zonecfg_get_autoboot(handle, &autoboot) == Z_OK) 1874 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1875 pt_to_str(PT_AUTOBOOT), autoboot ? "true" : "false"); 1876 1877 if (zonecfg_get_bootargs(handle, bootargs, sizeof (bootargs)) == Z_OK && 1878 strlen(bootargs) > 0) { 1879 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1880 pt_to_str(PT_BOOTARGS), bootargs); 1881 } 1882 1883 if (zonecfg_get_pool(handle, pool, sizeof (pool)) == Z_OK && 1884 strlen(pool) > 0) 1885 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1886 pt_to_str(PT_POOL), pool); 1887 1888 if (zonecfg_get_limitpriv(handle, &limitpriv) == Z_OK && 1889 strlen(limitpriv) > 0) { 1890 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1891 pt_to_str(PT_LIMITPRIV), limitpriv); 1892 free(limitpriv); 1893 } 1894 1895 if (zonecfg_get_sched_class(handle, sched, sizeof (sched)) == Z_OK && 1896 strlen(sched) > 0) 1897 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1898 pt_to_str(PT_SCHED), sched); 1899 1900 if (zonecfg_get_iptype(handle, &iptype) == Z_OK) { 1901 switch (iptype) { 1902 case ZS_SHARED: 1903 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1904 pt_to_str(PT_IPTYPE), "shared"); 1905 break; 1906 case ZS_EXCLUSIVE: 1907 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1908 pt_to_str(PT_IPTYPE), "exclusive"); 1909 break; 1910 } 1911 } 1912 1913 if (zonecfg_get_hostid(handle, hostidp, sizeof (hostidp)) == Z_OK) { 1914 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1915 pt_to_str(PT_HOSTID), hostidp); 1916 } 1917 1918 if (zonecfg_get_fs_allowed(handle, fsallowedp, 1919 sizeof (fsallowedp)) == Z_OK) { 1920 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1921 pt_to_str(PT_FS_ALLOWED), fsallowedp); 1922 } 1923 1924 if ((err = zonecfg_setfsent(handle)) != Z_OK) { 1925 zone_perror(zone, err, B_FALSE); 1926 goto done; 1927 } 1928 while (zonecfg_getfsent(handle, &fstab) == Z_OK) { 1929 zone_fsopt_t *optptr; 1930 1931 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1932 rt_to_str(RT_FS)); 1933 export_prop(of, PT_DIR, fstab.zone_fs_dir); 1934 export_prop(of, PT_SPECIAL, fstab.zone_fs_special); 1935 export_prop(of, PT_RAW, fstab.zone_fs_raw); 1936 export_prop(of, PT_TYPE, fstab.zone_fs_type); 1937 for (optptr = fstab.zone_fs_options; optptr != NULL; 1938 optptr = optptr->zone_fsopt_next) { 1939 /* 1940 * Simple property values with embedded equal signs 1941 * need to be quoted to prevent the lexer from 1942 * mis-parsing them as complex name=value pairs. 1943 */ 1944 if (strchr(optptr->zone_fsopt_opt, '=')) 1945 (void) fprintf(of, "%s %s \"%s\"\n", 1946 cmd_to_str(CMD_ADD), 1947 pt_to_str(PT_OPTIONS), 1948 optptr->zone_fsopt_opt); 1949 else 1950 (void) fprintf(of, "%s %s %s\n", 1951 cmd_to_str(CMD_ADD), 1952 pt_to_str(PT_OPTIONS), 1953 optptr->zone_fsopt_opt); 1954 } 1955 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1956 zonecfg_free_fs_option_list(fstab.zone_fs_options); 1957 } 1958 (void) zonecfg_endfsent(handle); 1959 1960 if ((err = zonecfg_setnwifent(handle)) != Z_OK) { 1961 zone_perror(zone, err, B_FALSE); 1962 goto done; 1963 } 1964 while (zonecfg_getnwifent(handle, &nwiftab) == Z_OK) { 1965 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1966 rt_to_str(RT_NET)); 1967 export_prop(of, PT_ADDRESS, nwiftab.zone_nwif_address); 1968 export_prop(of, PT_ALLOWED_ADDRESS, 1969 nwiftab.zone_nwif_allowed_address); 1970 export_prop(of, PT_PHYSICAL, nwiftab.zone_nwif_physical); 1971 export_prop(of, PT_DEFROUTER, nwiftab.zone_nwif_defrouter); 1972 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1973 } 1974 (void) zonecfg_endnwifent(handle); 1975 1976 if ((err = zonecfg_setdevent(handle)) != Z_OK) { 1977 zone_perror(zone, err, B_FALSE); 1978 goto done; 1979 } 1980 while (zonecfg_getdevent(handle, &devtab) == Z_OK) { 1981 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1982 rt_to_str(RT_DEVICE)); 1983 export_prop(of, PT_MATCH, devtab.zone_dev_match); 1984 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1985 } 1986 (void) zonecfg_enddevent(handle); 1987 1988 if (zonecfg_getmcapent(handle, &mcaptab) == Z_OK) { 1989 char buf[128]; 1990 1991 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1992 rt_to_str(RT_MCAP)); 1993 bytes_to_units(mcaptab.zone_physmem_cap, buf, sizeof (buf)); 1994 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1995 pt_to_str(PT_PHYSICAL), buf); 1996 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1997 } 1998 1999 if ((err = zonecfg_setrctlent(handle)) != Z_OK) { 2000 zone_perror(zone, err, B_FALSE); 2001 goto done; 2002 } 2003 while (zonecfg_getrctlent(handle, &rctltab) == Z_OK) { 2004 (void) fprintf(of, "%s rctl\n", cmd_to_str(CMD_ADD)); 2005 export_prop(of, PT_NAME, rctltab.zone_rctl_name); 2006 for (valptr = rctltab.zone_rctl_valptr; valptr != NULL; 2007 valptr = valptr->zone_rctlval_next) { 2008 fprintf(of, "%s %s (%s=%s,%s=%s,%s=%s)\n", 2009 cmd_to_str(CMD_ADD), pt_to_str(PT_VALUE), 2010 pt_to_str(PT_PRIV), valptr->zone_rctlval_priv, 2011 pt_to_str(PT_LIMIT), valptr->zone_rctlval_limit, 2012 pt_to_str(PT_ACTION), valptr->zone_rctlval_action); 2013 } 2014 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 2015 zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr); 2016 } 2017 (void) zonecfg_endrctlent(handle); 2018 2019 if ((err = zonecfg_setattrent(handle)) != Z_OK) { 2020 zone_perror(zone, err, B_FALSE); 2021 goto done; 2022 } 2023 while (zonecfg_getattrent(handle, &attrtab) == Z_OK) { 2024 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 2025 rt_to_str(RT_ATTR)); 2026 export_prop(of, PT_NAME, attrtab.zone_attr_name); 2027 export_prop(of, PT_TYPE, attrtab.zone_attr_type); 2028 export_prop(of, PT_VALUE, attrtab.zone_attr_value); 2029 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 2030 } 2031 (void) zonecfg_endattrent(handle); 2032 2033 if ((err = zonecfg_setdsent(handle)) != Z_OK) { 2034 zone_perror(zone, err, B_FALSE); 2035 goto done; 2036 } 2037 while (zonecfg_getdsent(handle, &dstab) == Z_OK) { 2038 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 2039 rt_to_str(RT_DATASET)); 2040 export_prop(of, PT_NAME, dstab.zone_dataset_name); 2041 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 2042 } 2043 (void) zonecfg_enddsent(handle); 2044 2045 if (zonecfg_getpsetent(handle, &psettab) == Z_OK) { 2046 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 2047 rt_to_str(RT_DCPU)); 2048 if (strcmp(psettab.zone_ncpu_min, psettab.zone_ncpu_max) == 0) 2049 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 2050 pt_to_str(PT_NCPUS), psettab.zone_ncpu_max); 2051 else 2052 (void) fprintf(of, "%s %s=%s-%s\n", cmd_to_str(CMD_SET), 2053 pt_to_str(PT_NCPUS), psettab.zone_ncpu_min, 2054 psettab.zone_ncpu_max); 2055 if (psettab.zone_importance[0] != '\0') 2056 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 2057 pt_to_str(PT_IMPORTANCE), psettab.zone_importance); 2058 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 2059 } 2060 2061 if ((err = zonecfg_setadminent(handle)) != Z_OK) { 2062 zone_perror(zone, err, B_FALSE); 2063 goto done; 2064 } 2065 while (zonecfg_getadminent(handle, &admintab) == Z_OK) { 2066 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 2067 rt_to_str(RT_ADMIN)); 2068 export_prop(of, PT_USER, admintab.zone_admin_user); 2069 export_prop(of, PT_AUTHS, admintab.zone_admin_auths); 2070 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 2071 } 2072 (void) zonecfg_endadminent(handle); 2073 2074 /* 2075 * There is nothing to export for pcap since this resource is just 2076 * a container for an rctl alias. 2077 */ 2078 2079 done: 2080 if (need_to_close) 2081 (void) fclose(of); 2082 } 2083 2084 void 2085 exit_func(cmd_t *cmd) 2086 { 2087 int arg, answer; 2088 boolean_t arg_err = B_FALSE; 2089 2090 optind = 0; 2091 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) { 2092 switch (arg) { 2093 case '?': 2094 longer_usage(CMD_EXIT); 2095 arg_err = B_TRUE; 2096 break; 2097 case 'F': 2098 force_exit = B_TRUE; 2099 break; 2100 default: 2101 short_usage(CMD_EXIT); 2102 arg_err = B_TRUE; 2103 break; 2104 } 2105 } 2106 if (arg_err) 2107 return; 2108 2109 if (optind < cmd->cmd_argc) { 2110 short_usage(CMD_EXIT); 2111 return; 2112 } 2113 2114 if (global_scope || force_exit) { 2115 time_to_exit = B_TRUE; 2116 return; 2117 } 2118 2119 answer = ask_yesno(B_FALSE, "Resource incomplete; really quit"); 2120 if (answer == -1) { 2121 zerr(gettext("Resource incomplete, input " 2122 "not from terminal and -F not specified:\n%s command " 2123 "ignored, but exiting anyway."), cmd_to_str(CMD_EXIT)); 2124 exit(Z_ERR); 2125 } else if (answer == 1) { 2126 time_to_exit = B_TRUE; 2127 } 2128 /* (answer == 0) => just return */ 2129 } 2130 2131 static int 2132 validate_zonepath_syntax(char *path) 2133 { 2134 if (path[0] != '/') { 2135 zerr(gettext("%s is not an absolute path."), path); 2136 return (Z_ERR); 2137 } 2138 /* If path is all slashes, then fail */ 2139 if (strspn(path, "/") == strlen(path)) { 2140 zerr(gettext("/ is not allowed as a %s."), 2141 pt_to_str(PT_ZONEPATH)); 2142 return (Z_ERR); 2143 } 2144 return (Z_OK); 2145 } 2146 2147 static void 2148 add_resource(cmd_t *cmd) 2149 { 2150 int type; 2151 struct zone_psettab tmp_psettab; 2152 struct zone_mcaptab tmp_mcaptab; 2153 uint64_t tmp; 2154 uint64_t tmp_mcap; 2155 char pool[MAXNAMELEN]; 2156 2157 if ((type = cmd->cmd_res_type) == RT_UNKNOWN) { 2158 long_usage(CMD_ADD, B_TRUE); 2159 goto bad; 2160 } 2161 2162 switch (type) { 2163 case RT_FS: 2164 bzero(&in_progress_fstab, sizeof (in_progress_fstab)); 2165 return; 2166 case RT_NET: 2167 bzero(&in_progress_nwiftab, sizeof (in_progress_nwiftab)); 2168 return; 2169 case RT_DEVICE: 2170 bzero(&in_progress_devtab, sizeof (in_progress_devtab)); 2171 return; 2172 case RT_RCTL: 2173 if (global_zone) 2174 zerr(gettext("WARNING: Setting a global zone resource " 2175 "control too low could deny\nservice " 2176 "to even the root user; " 2177 "this could render the system impossible\n" 2178 "to administer. Please use caution.")); 2179 bzero(&in_progress_rctltab, sizeof (in_progress_rctltab)); 2180 return; 2181 case RT_ATTR: 2182 bzero(&in_progress_attrtab, sizeof (in_progress_attrtab)); 2183 return; 2184 case RT_DATASET: 2185 bzero(&in_progress_dstab, sizeof (in_progress_dstab)); 2186 return; 2187 case RT_DCPU: 2188 /* Make sure there isn't already a cpu-set or cpu-cap entry. */ 2189 if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) { 2190 zerr(gettext("The %s resource already exists."), 2191 rt_to_str(RT_DCPU)); 2192 goto bad; 2193 } 2194 if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp) != 2195 Z_NO_ENTRY) { 2196 zerr(gettext("The %s resource already exists."), 2197 rt_to_str(RT_PCAP)); 2198 goto bad; 2199 } 2200 2201 /* Make sure the pool property isn't set. */ 2202 if (zonecfg_get_pool(handle, pool, sizeof (pool)) == Z_OK && 2203 strlen(pool) > 0) { 2204 zerr(gettext("The %s property is already set. " 2205 "A persistent pool is incompatible with\nthe %s " 2206 "resource."), 2207 pt_to_str(PT_POOL), rt_to_str(RT_DCPU)); 2208 goto bad; 2209 } 2210 2211 bzero(&in_progress_psettab, sizeof (in_progress_psettab)); 2212 return; 2213 case RT_PCAP: 2214 /* 2215 * Make sure there isn't already a cpu-set or incompatible 2216 * cpu-cap rctls. 2217 */ 2218 if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) { 2219 zerr(gettext("The %s resource already exists."), 2220 rt_to_str(RT_DCPU)); 2221 goto bad; 2222 } 2223 2224 switch (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp)) { 2225 case Z_ALIAS_DISALLOW: 2226 zone_perror(rt_to_str(RT_PCAP), Z_ALIAS_DISALLOW, 2227 B_FALSE); 2228 goto bad; 2229 2230 case Z_OK: 2231 zerr(gettext("The %s resource already exists."), 2232 rt_to_str(RT_PCAP)); 2233 goto bad; 2234 2235 default: 2236 break; 2237 } 2238 return; 2239 case RT_MCAP: 2240 /* 2241 * Make sure there isn't already a mem-cap entry or max-swap 2242 * or max-locked rctl. 2243 */ 2244 if (zonecfg_lookup_mcap(handle, &tmp_mcaptab) == Z_OK || 2245 zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &tmp_mcap) 2246 == Z_OK || 2247 zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, 2248 &tmp_mcap) == Z_OK) { 2249 zerr(gettext("The %s resource or a related resource " 2250 "control already exists."), rt_to_str(RT_MCAP)); 2251 goto bad; 2252 } 2253 if (global_zone) 2254 zerr(gettext("WARNING: Setting a global zone memory " 2255 "cap too low could deny\nservice " 2256 "to even the root user; " 2257 "this could render the system impossible\n" 2258 "to administer. Please use caution.")); 2259 bzero(&in_progress_mcaptab, sizeof (in_progress_mcaptab)); 2260 return; 2261 case RT_ADMIN: 2262 bzero(&in_progress_admintab, sizeof (in_progress_admintab)); 2263 return; 2264 default: 2265 zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, B_TRUE); 2266 long_usage(CMD_ADD, B_TRUE); 2267 usage(B_FALSE, HELP_RESOURCES); 2268 } 2269 bad: 2270 global_scope = B_TRUE; 2271 end_op = -1; 2272 } 2273 2274 static void 2275 do_complex_rctl_val(complex_property_ptr_t cp) 2276 { 2277 struct zone_rctlvaltab *rctlvaltab; 2278 complex_property_ptr_t cx; 2279 boolean_t seen_priv = B_FALSE, seen_limit = B_FALSE, 2280 seen_action = B_FALSE; 2281 rctlblk_t *rctlblk; 2282 int err; 2283 2284 if ((rctlvaltab = alloc_rctlvaltab()) == NULL) { 2285 zone_perror(zone, Z_NOMEM, B_TRUE); 2286 exit(Z_ERR); 2287 } 2288 for (cx = cp; cx != NULL; cx = cx->cp_next) { 2289 switch (cx->cp_type) { 2290 case PT_PRIV: 2291 if (seen_priv) { 2292 zerr(gettext("%s already specified"), 2293 pt_to_str(PT_PRIV)); 2294 goto bad; 2295 } 2296 (void) strlcpy(rctlvaltab->zone_rctlval_priv, 2297 cx->cp_value, 2298 sizeof (rctlvaltab->zone_rctlval_priv)); 2299 seen_priv = B_TRUE; 2300 break; 2301 case PT_LIMIT: 2302 if (seen_limit) { 2303 zerr(gettext("%s already specified"), 2304 pt_to_str(PT_LIMIT)); 2305 goto bad; 2306 } 2307 (void) strlcpy(rctlvaltab->zone_rctlval_limit, 2308 cx->cp_value, 2309 sizeof (rctlvaltab->zone_rctlval_limit)); 2310 seen_limit = B_TRUE; 2311 break; 2312 case PT_ACTION: 2313 if (seen_action) { 2314 zerr(gettext("%s already specified"), 2315 pt_to_str(PT_ACTION)); 2316 goto bad; 2317 } 2318 (void) strlcpy(rctlvaltab->zone_rctlval_action, 2319 cx->cp_value, 2320 sizeof (rctlvaltab->zone_rctlval_action)); 2321 seen_action = B_TRUE; 2322 break; 2323 default: 2324 zone_perror(pt_to_str(PT_VALUE), 2325 Z_NO_PROPERTY_TYPE, B_TRUE); 2326 long_usage(CMD_ADD, B_TRUE); 2327 usage(B_FALSE, HELP_PROPS); 2328 zonecfg_free_rctl_value_list(rctlvaltab); 2329 return; 2330 } 2331 } 2332 if (!seen_priv) 2333 zerr(gettext("%s not specified"), pt_to_str(PT_PRIV)); 2334 if (!seen_limit) 2335 zerr(gettext("%s not specified"), pt_to_str(PT_LIMIT)); 2336 if (!seen_action) 2337 zerr(gettext("%s not specified"), pt_to_str(PT_ACTION)); 2338 if (!seen_priv || !seen_limit || !seen_action) 2339 goto bad; 2340 rctlvaltab->zone_rctlval_next = NULL; 2341 rctlblk = alloca(rctlblk_size()); 2342 /* 2343 * Make sure the rctl value looks roughly correct; we won't know if 2344 * it's truly OK until we verify the configuration on the target 2345 * system. 2346 */ 2347 if (zonecfg_construct_rctlblk(rctlvaltab, rctlblk) != Z_OK || 2348 !zonecfg_valid_rctlblk(rctlblk)) { 2349 zerr(gettext("Invalid %s %s specification"), rt_to_str(RT_RCTL), 2350 pt_to_str(PT_VALUE)); 2351 goto bad; 2352 } 2353 err = zonecfg_add_rctl_value(&in_progress_rctltab, rctlvaltab); 2354 if (err != Z_OK) 2355 zone_perror(pt_to_str(PT_VALUE), err, B_TRUE); 2356 return; 2357 2358 bad: 2359 zonecfg_free_rctl_value_list(rctlvaltab); 2360 } 2361 2362 static void 2363 add_property(cmd_t *cmd) 2364 { 2365 char *prop_id; 2366 int err, res_type, prop_type; 2367 property_value_ptr_t pp; 2368 list_property_ptr_t l; 2369 2370 res_type = resource_scope; 2371 prop_type = cmd->cmd_prop_name[0]; 2372 if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) { 2373 long_usage(CMD_ADD, B_TRUE); 2374 return; 2375 } 2376 2377 if (cmd->cmd_prop_nv_pairs != 1) { 2378 long_usage(CMD_ADD, B_TRUE); 2379 return; 2380 } 2381 2382 if (initialize(B_TRUE) != Z_OK) 2383 return; 2384 2385 switch (res_type) { 2386 case RT_FS: 2387 if (prop_type != PT_OPTIONS) { 2388 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 2389 B_TRUE); 2390 long_usage(CMD_ADD, B_TRUE); 2391 usage(B_FALSE, HELP_PROPS); 2392 return; 2393 } 2394 pp = cmd->cmd_property_ptr[0]; 2395 if (pp->pv_type != PROP_VAL_SIMPLE && 2396 pp->pv_type != PROP_VAL_LIST) { 2397 zerr(gettext("A %s or %s value was expected here."), 2398 pvt_to_str(PROP_VAL_SIMPLE), 2399 pvt_to_str(PROP_VAL_LIST)); 2400 saw_error = B_TRUE; 2401 return; 2402 } 2403 if (pp->pv_type == PROP_VAL_SIMPLE) { 2404 if (pp->pv_simple == NULL) { 2405 long_usage(CMD_ADD, B_TRUE); 2406 return; 2407 } 2408 prop_id = pp->pv_simple; 2409 err = zonecfg_add_fs_option(&in_progress_fstab, 2410 prop_id); 2411 if (err != Z_OK) 2412 zone_perror(pt_to_str(prop_type), err, B_TRUE); 2413 } else { 2414 list_property_ptr_t list; 2415 2416 for (list = pp->pv_list; list != NULL; 2417 list = list->lp_next) { 2418 prop_id = list->lp_simple; 2419 if (prop_id == NULL) 2420 break; 2421 err = zonecfg_add_fs_option( 2422 &in_progress_fstab, prop_id); 2423 if (err != Z_OK) 2424 zone_perror(pt_to_str(prop_type), err, 2425 B_TRUE); 2426 } 2427 } 2428 return; 2429 case RT_RCTL: 2430 if (prop_type != PT_VALUE) { 2431 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 2432 B_TRUE); 2433 long_usage(CMD_ADD, B_TRUE); 2434 usage(B_FALSE, HELP_PROPS); 2435 return; 2436 } 2437 pp = cmd->cmd_property_ptr[0]; 2438 if (pp->pv_type != PROP_VAL_COMPLEX && 2439 pp->pv_type != PROP_VAL_LIST) { 2440 zerr(gettext("A %s or %s value was expected here."), 2441 pvt_to_str(PROP_VAL_COMPLEX), 2442 pvt_to_str(PROP_VAL_LIST)); 2443 saw_error = B_TRUE; 2444 return; 2445 } 2446 if (pp->pv_type == PROP_VAL_COMPLEX) { 2447 do_complex_rctl_val(pp->pv_complex); 2448 return; 2449 } 2450 for (l = pp->pv_list; l != NULL; l = l->lp_next) 2451 do_complex_rctl_val(l->lp_complex); 2452 return; 2453 default: 2454 zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, B_TRUE); 2455 long_usage(CMD_ADD, B_TRUE); 2456 usage(B_FALSE, HELP_RESOURCES); 2457 return; 2458 } 2459 } 2460 2461 static boolean_t 2462 gz_invalid_resource(int type) 2463 { 2464 return (global_zone && (type == RT_FS || 2465 type == RT_NET || type == RT_DEVICE || type == RT_ATTR || 2466 type == RT_DATASET)); 2467 } 2468 2469 static boolean_t 2470 gz_invalid_rt_property(int type) 2471 { 2472 return (global_zone && (type == RT_ZONENAME || type == RT_ZONEPATH || 2473 type == RT_AUTOBOOT || type == RT_LIMITPRIV || 2474 type == RT_BOOTARGS || type == RT_BRAND || type == RT_SCHED || 2475 type == RT_IPTYPE || type == RT_HOSTID || type == RT_FS_ALLOWED)); 2476 } 2477 2478 static boolean_t 2479 gz_invalid_property(int type) 2480 { 2481 return (global_zone && (type == PT_ZONENAME || type == PT_ZONEPATH || 2482 type == PT_AUTOBOOT || type == PT_LIMITPRIV || 2483 type == PT_BOOTARGS || type == PT_BRAND || type == PT_SCHED || 2484 type == PT_IPTYPE || type == PT_HOSTID || type == PT_FS_ALLOWED)); 2485 } 2486 2487 void 2488 add_func(cmd_t *cmd) 2489 { 2490 int arg; 2491 boolean_t arg_err = B_FALSE; 2492 2493 assert(cmd != NULL); 2494 2495 optind = 0; 2496 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 2497 switch (arg) { 2498 case '?': 2499 longer_usage(CMD_ADD); 2500 arg_err = B_TRUE; 2501 break; 2502 default: 2503 short_usage(CMD_ADD); 2504 arg_err = B_TRUE; 2505 break; 2506 } 2507 } 2508 if (arg_err) 2509 return; 2510 2511 if (optind != cmd->cmd_argc) { 2512 short_usage(CMD_ADD); 2513 return; 2514 } 2515 2516 if (zone_is_read_only(CMD_ADD)) 2517 return; 2518 2519 if (initialize(B_TRUE) != Z_OK) 2520 return; 2521 if (global_scope) { 2522 if (gz_invalid_resource(cmd->cmd_res_type)) { 2523 zerr(gettext("Cannot add a %s resource to the " 2524 "global zone."), rt_to_str(cmd->cmd_res_type)); 2525 saw_error = B_TRUE; 2526 return; 2527 } 2528 2529 global_scope = B_FALSE; 2530 resource_scope = cmd->cmd_res_type; 2531 end_op = CMD_ADD; 2532 add_resource(cmd); 2533 } else 2534 add_property(cmd); 2535 } 2536 2537 /* 2538 * This routine has an unusual implementation, because it tries very 2539 * hard to succeed in the face of a variety of failure modes. 2540 * The most common and most vexing occurs when the index file and 2541 * the /etc/zones/<zonename.xml> file are not both present. In 2542 * this case, delete must eradicate as much of the zone state as is left 2543 * so that the user can later create a new zone with the same name. 2544 */ 2545 void 2546 delete_func(cmd_t *cmd) 2547 { 2548 int err, arg, answer; 2549 char line[ZONENAME_MAX + 128]; /* enough to ask a question */ 2550 boolean_t force = B_FALSE; 2551 boolean_t arg_err = B_FALSE; 2552 2553 optind = 0; 2554 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) { 2555 switch (arg) { 2556 case '?': 2557 longer_usage(CMD_DELETE); 2558 arg_err = B_TRUE; 2559 break; 2560 case 'F': 2561 force = B_TRUE; 2562 break; 2563 default: 2564 short_usage(CMD_DELETE); 2565 arg_err = B_TRUE; 2566 break; 2567 } 2568 } 2569 if (arg_err) 2570 return; 2571 2572 if (optind != cmd->cmd_argc) { 2573 short_usage(CMD_DELETE); 2574 return; 2575 } 2576 2577 if (zone_is_read_only(CMD_DELETE)) 2578 return; 2579 2580 if (!force) { 2581 /* 2582 * Initialize sets up the global called "handle" and warns the 2583 * user if the zone is not configured. In force mode, we don't 2584 * trust that evaluation, and hence skip it. (We don't need the 2585 * handle to be loaded anyway, since zonecfg_destroy is done by 2586 * zonename). However, we also have to take care to emulate the 2587 * messages spit out by initialize; see below. 2588 */ 2589 if (initialize(B_TRUE) != Z_OK) 2590 return; 2591 2592 (void) snprintf(line, sizeof (line), 2593 gettext("Are you sure you want to delete zone %s"), zone); 2594 if ((answer = ask_yesno(B_FALSE, line)) == -1) { 2595 zerr(gettext("Input not from terminal and -F not " 2596 "specified:\n%s command ignored, exiting."), 2597 cmd_to_str(CMD_DELETE)); 2598 exit(Z_ERR); 2599 } 2600 if (answer != 1) 2601 return; 2602 } 2603 2604 /* 2605 * This function removes the authorizations from user_attr 2606 * that correspond to those specified in the configuration 2607 */ 2608 if (initialize(B_TRUE) == Z_OK) { 2609 (void) zonecfg_deauthorize_users(handle, zone); 2610 } 2611 if ((err = zonecfg_destroy(zone, force)) != Z_OK) { 2612 if ((err == Z_BAD_ZONE_STATE) && !force) { 2613 zerr(gettext("Zone %s not in %s state; %s not " 2614 "allowed. Use -F to force %s."), 2615 zone, zone_state_str(ZONE_STATE_CONFIGURED), 2616 cmd_to_str(CMD_DELETE), cmd_to_str(CMD_DELETE)); 2617 } else { 2618 zone_perror(zone, err, B_TRUE); 2619 } 2620 } 2621 need_to_commit = B_FALSE; 2622 2623 /* 2624 * Emulate initialize's messaging; if there wasn't a valid handle to 2625 * begin with, then user had typed delete (or delete -F) multiple 2626 * times. So we emit a message. 2627 * 2628 * We only do this in the 'force' case because normally, initialize() 2629 * takes care of this for us. 2630 */ 2631 if (force && zonecfg_check_handle(handle) != Z_OK && interactive_mode) 2632 (void) printf(gettext("Use '%s' to begin " 2633 "configuring a new zone.\n"), cmd_to_str(CMD_CREATE)); 2634 2635 /* 2636 * Time for a new handle: finish the old one off first 2637 * then get a new one properly to avoid leaks. 2638 */ 2639 if (got_handle) { 2640 zonecfg_fini_handle(handle); 2641 if ((handle = zonecfg_init_handle()) == NULL) { 2642 zone_perror(execname, Z_NOMEM, B_TRUE); 2643 exit(Z_ERR); 2644 } 2645 if ((err = zonecfg_get_handle(zone, handle)) != Z_OK) { 2646 /* If there was no zone before, that's OK */ 2647 if (err != Z_NO_ZONE) 2648 zone_perror(zone, err, B_TRUE); 2649 got_handle = B_FALSE; 2650 } 2651 } 2652 } 2653 2654 static int 2655 fill_in_fstab(cmd_t *cmd, struct zone_fstab *fstab, boolean_t fill_in_only) 2656 { 2657 int err, i; 2658 property_value_ptr_t pp; 2659 2660 if ((err = initialize(B_TRUE)) != Z_OK) 2661 return (err); 2662 2663 bzero(fstab, sizeof (*fstab)); 2664 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2665 pp = cmd->cmd_property_ptr[i]; 2666 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2667 zerr(gettext("A simple value was expected here.")); 2668 saw_error = B_TRUE; 2669 return (Z_INSUFFICIENT_SPEC); 2670 } 2671 switch (cmd->cmd_prop_name[i]) { 2672 case PT_DIR: 2673 (void) strlcpy(fstab->zone_fs_dir, pp->pv_simple, 2674 sizeof (fstab->zone_fs_dir)); 2675 break; 2676 case PT_SPECIAL: 2677 (void) strlcpy(fstab->zone_fs_special, pp->pv_simple, 2678 sizeof (fstab->zone_fs_special)); 2679 break; 2680 case PT_RAW: 2681 (void) strlcpy(fstab->zone_fs_raw, pp->pv_simple, 2682 sizeof (fstab->zone_fs_raw)); 2683 break; 2684 case PT_TYPE: 2685 (void) strlcpy(fstab->zone_fs_type, pp->pv_simple, 2686 sizeof (fstab->zone_fs_type)); 2687 break; 2688 default: 2689 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2690 Z_NO_PROPERTY_TYPE, B_TRUE); 2691 return (Z_INSUFFICIENT_SPEC); 2692 } 2693 } 2694 if (fill_in_only) 2695 return (Z_OK); 2696 return (zonecfg_lookup_filesystem(handle, fstab)); 2697 } 2698 2699 static int 2700 fill_in_nwiftab(cmd_t *cmd, struct zone_nwiftab *nwiftab, 2701 boolean_t fill_in_only) 2702 { 2703 int err, i; 2704 property_value_ptr_t pp; 2705 2706 if ((err = initialize(B_TRUE)) != Z_OK) 2707 return (err); 2708 2709 bzero(nwiftab, sizeof (*nwiftab)); 2710 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2711 pp = cmd->cmd_property_ptr[i]; 2712 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2713 zerr(gettext("A simple value was expected here.")); 2714 saw_error = B_TRUE; 2715 return (Z_INSUFFICIENT_SPEC); 2716 } 2717 switch (cmd->cmd_prop_name[i]) { 2718 case PT_ADDRESS: 2719 (void) strlcpy(nwiftab->zone_nwif_address, 2720 pp->pv_simple, sizeof (nwiftab->zone_nwif_address)); 2721 break; 2722 case PT_ALLOWED_ADDRESS: 2723 (void) strlcpy(nwiftab->zone_nwif_allowed_address, 2724 pp->pv_simple, 2725 sizeof (nwiftab->zone_nwif_allowed_address)); 2726 break; 2727 case PT_PHYSICAL: 2728 (void) strlcpy(nwiftab->zone_nwif_physical, 2729 pp->pv_simple, 2730 sizeof (nwiftab->zone_nwif_physical)); 2731 break; 2732 case PT_DEFROUTER: 2733 (void) strlcpy(nwiftab->zone_nwif_defrouter, 2734 pp->pv_simple, 2735 sizeof (nwiftab->zone_nwif_defrouter)); 2736 break; 2737 default: 2738 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2739 Z_NO_PROPERTY_TYPE, B_TRUE); 2740 return (Z_INSUFFICIENT_SPEC); 2741 } 2742 } 2743 if (fill_in_only) 2744 return (Z_OK); 2745 err = zonecfg_lookup_nwif(handle, nwiftab); 2746 return (err); 2747 } 2748 2749 static int 2750 fill_in_devtab(cmd_t *cmd, struct zone_devtab *devtab, boolean_t fill_in_only) 2751 { 2752 int err, i; 2753 property_value_ptr_t pp; 2754 2755 if ((err = initialize(B_TRUE)) != Z_OK) 2756 return (err); 2757 2758 bzero(devtab, sizeof (*devtab)); 2759 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2760 pp = cmd->cmd_property_ptr[i]; 2761 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2762 zerr(gettext("A simple value was expected here.")); 2763 saw_error = B_TRUE; 2764 return (Z_INSUFFICIENT_SPEC); 2765 } 2766 switch (cmd->cmd_prop_name[i]) { 2767 case PT_MATCH: 2768 (void) strlcpy(devtab->zone_dev_match, pp->pv_simple, 2769 sizeof (devtab->zone_dev_match)); 2770 break; 2771 default: 2772 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2773 Z_NO_PROPERTY_TYPE, B_TRUE); 2774 return (Z_INSUFFICIENT_SPEC); 2775 } 2776 } 2777 if (fill_in_only) 2778 return (Z_OK); 2779 err = zonecfg_lookup_dev(handle, devtab); 2780 return (err); 2781 } 2782 2783 static int 2784 fill_in_rctltab(cmd_t *cmd, struct zone_rctltab *rctltab, 2785 boolean_t fill_in_only) 2786 { 2787 int err, i; 2788 property_value_ptr_t pp; 2789 2790 if ((err = initialize(B_TRUE)) != Z_OK) 2791 return (err); 2792 2793 bzero(rctltab, sizeof (*rctltab)); 2794 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2795 pp = cmd->cmd_property_ptr[i]; 2796 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2797 zerr(gettext("A simple value was expected here.")); 2798 saw_error = B_TRUE; 2799 return (Z_INSUFFICIENT_SPEC); 2800 } 2801 switch (cmd->cmd_prop_name[i]) { 2802 case PT_NAME: 2803 (void) strlcpy(rctltab->zone_rctl_name, pp->pv_simple, 2804 sizeof (rctltab->zone_rctl_name)); 2805 break; 2806 default: 2807 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2808 Z_NO_PROPERTY_TYPE, B_TRUE); 2809 return (Z_INSUFFICIENT_SPEC); 2810 } 2811 } 2812 if (fill_in_only) 2813 return (Z_OK); 2814 err = zonecfg_lookup_rctl(handle, rctltab); 2815 return (err); 2816 } 2817 2818 static int 2819 fill_in_attrtab(cmd_t *cmd, struct zone_attrtab *attrtab, 2820 boolean_t fill_in_only) 2821 { 2822 int err, i; 2823 property_value_ptr_t pp; 2824 2825 if ((err = initialize(B_TRUE)) != Z_OK) 2826 return (err); 2827 2828 bzero(attrtab, sizeof (*attrtab)); 2829 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2830 pp = cmd->cmd_property_ptr[i]; 2831 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2832 zerr(gettext("A simple value was expected here.")); 2833 saw_error = B_TRUE; 2834 return (Z_INSUFFICIENT_SPEC); 2835 } 2836 switch (cmd->cmd_prop_name[i]) { 2837 case PT_NAME: 2838 (void) strlcpy(attrtab->zone_attr_name, pp->pv_simple, 2839 sizeof (attrtab->zone_attr_name)); 2840 break; 2841 case PT_TYPE: 2842 (void) strlcpy(attrtab->zone_attr_type, pp->pv_simple, 2843 sizeof (attrtab->zone_attr_type)); 2844 break; 2845 case PT_VALUE: 2846 (void) strlcpy(attrtab->zone_attr_value, pp->pv_simple, 2847 sizeof (attrtab->zone_attr_value)); 2848 break; 2849 default: 2850 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2851 Z_NO_PROPERTY_TYPE, B_TRUE); 2852 return (Z_INSUFFICIENT_SPEC); 2853 } 2854 } 2855 if (fill_in_only) 2856 return (Z_OK); 2857 err = zonecfg_lookup_attr(handle, attrtab); 2858 return (err); 2859 } 2860 2861 static int 2862 fill_in_dstab(cmd_t *cmd, struct zone_dstab *dstab, boolean_t fill_in_only) 2863 { 2864 int err, i; 2865 property_value_ptr_t pp; 2866 2867 if ((err = initialize(B_TRUE)) != Z_OK) 2868 return (err); 2869 2870 dstab->zone_dataset_name[0] = '\0'; 2871 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2872 pp = cmd->cmd_property_ptr[i]; 2873 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2874 zerr(gettext("A simple value was expected here.")); 2875 saw_error = B_TRUE; 2876 return (Z_INSUFFICIENT_SPEC); 2877 } 2878 switch (cmd->cmd_prop_name[i]) { 2879 case PT_NAME: 2880 (void) strlcpy(dstab->zone_dataset_name, pp->pv_simple, 2881 sizeof (dstab->zone_dataset_name)); 2882 break; 2883 default: 2884 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2885 Z_NO_PROPERTY_TYPE, B_TRUE); 2886 return (Z_INSUFFICIENT_SPEC); 2887 } 2888 } 2889 if (fill_in_only) 2890 return (Z_OK); 2891 return (zonecfg_lookup_ds(handle, dstab)); 2892 } 2893 2894 static int 2895 fill_in_admintab(cmd_t *cmd, struct zone_admintab *admintab, 2896 boolean_t fill_in_only) 2897 { 2898 int err, i; 2899 property_value_ptr_t pp; 2900 2901 if ((err = initialize(B_TRUE)) != Z_OK) 2902 return (err); 2903 2904 bzero(admintab, sizeof (*admintab)); 2905 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2906 pp = cmd->cmd_property_ptr[i]; 2907 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2908 zerr(gettext("A simple value was expected here.")); 2909 saw_error = B_TRUE; 2910 return (Z_INSUFFICIENT_SPEC); 2911 } 2912 switch (cmd->cmd_prop_name[i]) { 2913 case PT_USER: 2914 (void) strlcpy(admintab->zone_admin_user, pp->pv_simple, 2915 sizeof (admintab->zone_admin_user)); 2916 break; 2917 case PT_AUTHS: 2918 (void) strlcpy(admintab->zone_admin_auths, 2919 pp->pv_simple, sizeof (admintab->zone_admin_auths)); 2920 break; 2921 default: 2922 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2923 Z_NO_PROPERTY_TYPE, B_TRUE); 2924 return (Z_INSUFFICIENT_SPEC); 2925 } 2926 } 2927 if (fill_in_only) 2928 return (Z_OK); 2929 err = zonecfg_lookup_admin(handle, admintab); 2930 return (err); 2931 } 2932 2933 static void 2934 remove_aliased_rctl(int type, char *name) 2935 { 2936 int err; 2937 uint64_t tmp; 2938 2939 if ((err = zonecfg_get_aliased_rctl(handle, name, &tmp)) != Z_OK) { 2940 zerr("%s %s: %s", cmd_to_str(CMD_CLEAR), pt_to_str(type), 2941 zonecfg_strerror(err)); 2942 saw_error = B_TRUE; 2943 return; 2944 } 2945 if ((err = zonecfg_rm_aliased_rctl(handle, name)) != Z_OK) { 2946 zerr("%s %s: %s", cmd_to_str(CMD_CLEAR), pt_to_str(type), 2947 zonecfg_strerror(err)); 2948 saw_error = B_TRUE; 2949 } else { 2950 need_to_commit = B_TRUE; 2951 } 2952 } 2953 2954 static boolean_t 2955 prompt_remove_resource(cmd_t *cmd, char *rsrc) 2956 { 2957 int num; 2958 int answer; 2959 int arg; 2960 boolean_t force = B_FALSE; 2961 char prompt[128]; 2962 boolean_t arg_err = B_FALSE; 2963 2964 optind = 0; 2965 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "F")) != EOF) { 2966 switch (arg) { 2967 case 'F': 2968 force = B_TRUE; 2969 break; 2970 default: 2971 arg_err = B_TRUE; 2972 break; 2973 } 2974 } 2975 if (arg_err) 2976 return (B_FALSE); 2977 2978 2979 num = zonecfg_num_resources(handle, rsrc); 2980 2981 if (num == 0) { 2982 z_cmd_rt_perror(CMD_REMOVE, cmd->cmd_res_type, Z_NO_ENTRY, 2983 B_TRUE); 2984 return (B_FALSE); 2985 } 2986 if (num > 1 && !force) { 2987 if (!interactive_mode) { 2988 zerr(gettext("There are multiple instances of this " 2989 "resource. Either qualify the resource to\n" 2990 "remove a single instance or use the -F option to " 2991 "remove all instances.")); 2992 saw_error = B_TRUE; 2993 return (B_FALSE); 2994 } 2995 (void) snprintf(prompt, sizeof (prompt), gettext( 2996 "Are you sure you want to remove ALL '%s' resources"), 2997 rsrc); 2998 answer = ask_yesno(B_FALSE, prompt); 2999 if (answer == -1) { 3000 zerr(gettext("Resource incomplete.")); 3001 return (B_FALSE); 3002 } 3003 if (answer != 1) 3004 return (B_FALSE); 3005 } 3006 return (B_TRUE); 3007 } 3008 3009 static void 3010 remove_fs(cmd_t *cmd) 3011 { 3012 int err; 3013 3014 /* traditional, qualified fs removal */ 3015 if (cmd->cmd_prop_nv_pairs > 0) { 3016 struct zone_fstab fstab; 3017 3018 if ((err = fill_in_fstab(cmd, &fstab, B_FALSE)) != Z_OK) { 3019 z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, B_TRUE); 3020 return; 3021 } 3022 if ((err = zonecfg_delete_filesystem(handle, &fstab)) != Z_OK) 3023 z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, B_TRUE); 3024 else 3025 need_to_commit = B_TRUE; 3026 zonecfg_free_fs_option_list(fstab.zone_fs_options); 3027 return; 3028 } 3029 3030 /* 3031 * unqualified fs removal. remove all fs's but prompt if more 3032 * than one. 3033 */ 3034 if (!prompt_remove_resource(cmd, "fs")) 3035 return; 3036 3037 if ((err = zonecfg_del_all_resources(handle, "fs")) != Z_OK) 3038 z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, B_TRUE); 3039 else 3040 need_to_commit = B_TRUE; 3041 } 3042 3043 static void 3044 remove_net(cmd_t *cmd) 3045 { 3046 int err; 3047 3048 /* traditional, qualified net removal */ 3049 if (cmd->cmd_prop_nv_pairs > 0) { 3050 struct zone_nwiftab nwiftab; 3051 3052 if ((err = fill_in_nwiftab(cmd, &nwiftab, B_FALSE)) != Z_OK) { 3053 z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, B_TRUE); 3054 return; 3055 } 3056 if ((err = zonecfg_delete_nwif(handle, &nwiftab)) != Z_OK) 3057 z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, B_TRUE); 3058 else 3059 need_to_commit = B_TRUE; 3060 return; 3061 } 3062 3063 /* 3064 * unqualified net removal. remove all nets but prompt if more 3065 * than one. 3066 */ 3067 if (!prompt_remove_resource(cmd, "net")) 3068 return; 3069 3070 if ((err = zonecfg_del_all_resources(handle, "net")) != Z_OK) 3071 z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, B_TRUE); 3072 else 3073 need_to_commit = B_TRUE; 3074 } 3075 3076 static void 3077 remove_device(cmd_t *cmd) 3078 { 3079 int err; 3080 3081 /* traditional, qualified device removal */ 3082 if (cmd->cmd_prop_nv_pairs > 0) { 3083 struct zone_devtab devtab; 3084 3085 if ((err = fill_in_devtab(cmd, &devtab, B_FALSE)) != Z_OK) { 3086 z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, B_TRUE); 3087 return; 3088 } 3089 if ((err = zonecfg_delete_dev(handle, &devtab)) != Z_OK) 3090 z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, B_TRUE); 3091 else 3092 need_to_commit = B_TRUE; 3093 return; 3094 } 3095 3096 /* 3097 * unqualified device removal. remove all devices but prompt if more 3098 * than one. 3099 */ 3100 if (!prompt_remove_resource(cmd, "device")) 3101 return; 3102 3103 if ((err = zonecfg_del_all_resources(handle, "device")) != Z_OK) 3104 z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, B_TRUE); 3105 else 3106 need_to_commit = B_TRUE; 3107 } 3108 3109 static void 3110 remove_attr(cmd_t *cmd) 3111 { 3112 int err; 3113 3114 /* traditional, qualified attr removal */ 3115 if (cmd->cmd_prop_nv_pairs > 0) { 3116 struct zone_attrtab attrtab; 3117 3118 if ((err = fill_in_attrtab(cmd, &attrtab, B_FALSE)) != Z_OK) { 3119 z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, B_TRUE); 3120 return; 3121 } 3122 if ((err = zonecfg_delete_attr(handle, &attrtab)) != Z_OK) 3123 z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, B_TRUE); 3124 else 3125 need_to_commit = B_TRUE; 3126 return; 3127 } 3128 3129 /* 3130 * unqualified attr removal. remove all attrs but prompt if more 3131 * than one. 3132 */ 3133 if (!prompt_remove_resource(cmd, "attr")) 3134 return; 3135 3136 if ((err = zonecfg_del_all_resources(handle, "attr")) != Z_OK) 3137 z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, B_TRUE); 3138 else 3139 need_to_commit = B_TRUE; 3140 } 3141 3142 static void 3143 remove_dataset(cmd_t *cmd) 3144 { 3145 int err; 3146 3147 /* traditional, qualified dataset removal */ 3148 if (cmd->cmd_prop_nv_pairs > 0) { 3149 struct zone_dstab dstab; 3150 3151 if ((err = fill_in_dstab(cmd, &dstab, B_FALSE)) != Z_OK) { 3152 z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, B_TRUE); 3153 return; 3154 } 3155 if ((err = zonecfg_delete_ds(handle, &dstab)) != Z_OK) 3156 z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, B_TRUE); 3157 else 3158 need_to_commit = B_TRUE; 3159 return; 3160 } 3161 3162 /* 3163 * unqualified dataset removal. remove all datasets but prompt if more 3164 * than one. 3165 */ 3166 if (!prompt_remove_resource(cmd, "dataset")) 3167 return; 3168 3169 if ((err = zonecfg_del_all_resources(handle, "dataset")) != Z_OK) 3170 z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, B_TRUE); 3171 else 3172 need_to_commit = B_TRUE; 3173 } 3174 3175 static void 3176 remove_rctl(cmd_t *cmd) 3177 { 3178 int err; 3179 3180 /* traditional, qualified rctl removal */ 3181 if (cmd->cmd_prop_nv_pairs > 0) { 3182 struct zone_rctltab rctltab; 3183 3184 if ((err = fill_in_rctltab(cmd, &rctltab, B_FALSE)) != Z_OK) { 3185 z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, B_TRUE); 3186 return; 3187 } 3188 if ((err = zonecfg_delete_rctl(handle, &rctltab)) != Z_OK) 3189 z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, B_TRUE); 3190 else 3191 need_to_commit = B_TRUE; 3192 zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr); 3193 return; 3194 } 3195 3196 /* 3197 * unqualified rctl removal. remove all rctls but prompt if more 3198 * than one. 3199 */ 3200 if (!prompt_remove_resource(cmd, "rctl")) 3201 return; 3202 3203 if ((err = zonecfg_del_all_resources(handle, "rctl")) != Z_OK) 3204 z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, B_TRUE); 3205 else 3206 need_to_commit = B_TRUE; 3207 } 3208 3209 static void 3210 remove_pset() 3211 { 3212 int err; 3213 struct zone_psettab psettab; 3214 3215 if ((err = zonecfg_lookup_pset(handle, &psettab)) != Z_OK) { 3216 z_cmd_rt_perror(CMD_REMOVE, RT_DCPU, err, B_TRUE); 3217 return; 3218 } 3219 if ((err = zonecfg_delete_pset(handle)) != Z_OK) 3220 z_cmd_rt_perror(CMD_REMOVE, RT_DCPU, err, B_TRUE); 3221 else 3222 need_to_commit = B_TRUE; 3223 } 3224 3225 static void 3226 remove_pcap() 3227 { 3228 int err; 3229 uint64_t tmp; 3230 3231 if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp) != Z_OK) { 3232 zerr("%s %s: %s", cmd_to_str(CMD_REMOVE), rt_to_str(RT_PCAP), 3233 zonecfg_strerror(Z_NO_RESOURCE_TYPE)); 3234 saw_error = B_TRUE; 3235 return; 3236 } 3237 3238 if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_CPUCAP)) != Z_OK) 3239 z_cmd_rt_perror(CMD_REMOVE, RT_PCAP, err, B_TRUE); 3240 else 3241 need_to_commit = B_TRUE; 3242 } 3243 3244 static void 3245 remove_mcap() 3246 { 3247 int err, res1, res2, res3; 3248 uint64_t tmp; 3249 struct zone_mcaptab mcaptab; 3250 boolean_t revert = B_FALSE; 3251 3252 res1 = zonecfg_lookup_mcap(handle, &mcaptab); 3253 res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &tmp); 3254 res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, &tmp); 3255 3256 /* if none of these exist, there is no resource to remove */ 3257 if (res1 != Z_OK && res2 != Z_OK && res3 != Z_OK) { 3258 zerr("%s %s: %s", cmd_to_str(CMD_REMOVE), rt_to_str(RT_MCAP), 3259 zonecfg_strerror(Z_NO_RESOURCE_TYPE)); 3260 saw_error = B_TRUE; 3261 return; 3262 } 3263 if (res1 == Z_OK) { 3264 if ((err = zonecfg_delete_mcap(handle)) != Z_OK) { 3265 z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, B_TRUE); 3266 revert = B_TRUE; 3267 } else { 3268 need_to_commit = B_TRUE; 3269 } 3270 } 3271 if (res2 == Z_OK) { 3272 if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_MAXSWAP)) 3273 != Z_OK) { 3274 z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, B_TRUE); 3275 revert = B_TRUE; 3276 } else { 3277 need_to_commit = B_TRUE; 3278 } 3279 } 3280 if (res3 == Z_OK) { 3281 if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM)) 3282 != Z_OK) { 3283 z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, B_TRUE); 3284 revert = B_TRUE; 3285 } else { 3286 need_to_commit = B_TRUE; 3287 } 3288 } 3289 3290 if (revert) 3291 need_to_commit = B_FALSE; 3292 } 3293 3294 static void 3295 remove_admin(cmd_t *cmd) 3296 { 3297 int err; 3298 3299 /* traditional, qualified attr removal */ 3300 if (cmd->cmd_prop_nv_pairs > 0) { 3301 struct zone_admintab admintab; 3302 3303 if ((err = fill_in_admintab(cmd, &admintab, B_FALSE)) != Z_OK) { 3304 z_cmd_rt_perror(CMD_REMOVE, RT_ADMIN, 3305 err, B_TRUE); 3306 return; 3307 } 3308 if ((err = zonecfg_delete_admin(handle, &admintab, 3309 zone)) 3310 != Z_OK) 3311 z_cmd_rt_perror(CMD_REMOVE, RT_ADMIN, 3312 err, B_TRUE); 3313 else 3314 need_to_commit = B_TRUE; 3315 return; 3316 } else { 3317 /* 3318 * unqualified admin removal. 3319 * remove all admins but prompt if more 3320 * than one. 3321 */ 3322 if (!prompt_remove_resource(cmd, "admin")) 3323 return; 3324 3325 if ((err = zonecfg_delete_admins(handle, zone)) 3326 != Z_OK) 3327 z_cmd_rt_perror(CMD_REMOVE, RT_ADMIN, 3328 err, B_TRUE); 3329 else 3330 need_to_commit = B_TRUE; 3331 } 3332 } 3333 3334 static void 3335 remove_resource(cmd_t *cmd) 3336 { 3337 int type; 3338 int arg; 3339 boolean_t arg_err = B_FALSE; 3340 3341 if ((type = cmd->cmd_res_type) == RT_UNKNOWN) { 3342 long_usage(CMD_REMOVE, B_TRUE); 3343 return; 3344 } 3345 3346 optind = 0; 3347 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) { 3348 switch (arg) { 3349 case '?': 3350 longer_usage(CMD_REMOVE); 3351 arg_err = B_TRUE; 3352 break; 3353 case 'F': 3354 break; 3355 default: 3356 short_usage(CMD_REMOVE); 3357 arg_err = B_TRUE; 3358 break; 3359 } 3360 } 3361 if (arg_err) 3362 return; 3363 3364 if (initialize(B_TRUE) != Z_OK) 3365 return; 3366 3367 switch (type) { 3368 case RT_FS: 3369 remove_fs(cmd); 3370 return; 3371 case RT_NET: 3372 remove_net(cmd); 3373 return; 3374 case RT_DEVICE: 3375 remove_device(cmd); 3376 return; 3377 case RT_RCTL: 3378 remove_rctl(cmd); 3379 return; 3380 case RT_ATTR: 3381 remove_attr(cmd); 3382 return; 3383 case RT_DATASET: 3384 remove_dataset(cmd); 3385 return; 3386 case RT_DCPU: 3387 remove_pset(); 3388 return; 3389 case RT_PCAP: 3390 remove_pcap(); 3391 return; 3392 case RT_MCAP: 3393 remove_mcap(); 3394 return; 3395 case RT_ADMIN: 3396 remove_admin(cmd); 3397 return; 3398 default: 3399 zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, B_TRUE); 3400 long_usage(CMD_REMOVE, B_TRUE); 3401 usage(B_FALSE, HELP_RESOURCES); 3402 return; 3403 } 3404 } 3405 3406 static void 3407 remove_property(cmd_t *cmd) 3408 { 3409 char *prop_id; 3410 int err, res_type, prop_type; 3411 property_value_ptr_t pp; 3412 struct zone_rctlvaltab *rctlvaltab; 3413 complex_property_ptr_t cx; 3414 3415 res_type = resource_scope; 3416 prop_type = cmd->cmd_prop_name[0]; 3417 if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) { 3418 long_usage(CMD_REMOVE, B_TRUE); 3419 return; 3420 } 3421 3422 if (cmd->cmd_prop_nv_pairs != 1) { 3423 long_usage(CMD_ADD, B_TRUE); 3424 return; 3425 } 3426 3427 if (initialize(B_TRUE) != Z_OK) 3428 return; 3429 3430 switch (res_type) { 3431 case RT_FS: 3432 if (prop_type != PT_OPTIONS) { 3433 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 3434 B_TRUE); 3435 long_usage(CMD_REMOVE, B_TRUE); 3436 usage(B_FALSE, HELP_PROPS); 3437 return; 3438 } 3439 pp = cmd->cmd_property_ptr[0]; 3440 if (pp->pv_type == PROP_VAL_COMPLEX) { 3441 zerr(gettext("A %s or %s value was expected here."), 3442 pvt_to_str(PROP_VAL_SIMPLE), 3443 pvt_to_str(PROP_VAL_LIST)); 3444 saw_error = B_TRUE; 3445 return; 3446 } 3447 if (pp->pv_type == PROP_VAL_SIMPLE) { 3448 if (pp->pv_simple == NULL) { 3449 long_usage(CMD_ADD, B_TRUE); 3450 return; 3451 } 3452 prop_id = pp->pv_simple; 3453 err = zonecfg_remove_fs_option(&in_progress_fstab, 3454 prop_id); 3455 if (err != Z_OK) 3456 zone_perror(pt_to_str(prop_type), err, B_TRUE); 3457 } else { 3458 list_property_ptr_t list; 3459 3460 for (list = pp->pv_list; list != NULL; 3461 list = list->lp_next) { 3462 prop_id = list->lp_simple; 3463 if (prop_id == NULL) 3464 break; 3465 err = zonecfg_remove_fs_option( 3466 &in_progress_fstab, prop_id); 3467 if (err != Z_OK) 3468 zone_perror(pt_to_str(prop_type), err, 3469 B_TRUE); 3470 } 3471 } 3472 return; 3473 case RT_RCTL: 3474 if (prop_type != PT_VALUE) { 3475 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 3476 B_TRUE); 3477 long_usage(CMD_REMOVE, B_TRUE); 3478 usage(B_FALSE, HELP_PROPS); 3479 return; 3480 } 3481 pp = cmd->cmd_property_ptr[0]; 3482 if (pp->pv_type != PROP_VAL_COMPLEX) { 3483 zerr(gettext("A %s value was expected here."), 3484 pvt_to_str(PROP_VAL_COMPLEX)); 3485 saw_error = B_TRUE; 3486 return; 3487 } 3488 if ((rctlvaltab = alloc_rctlvaltab()) == NULL) { 3489 zone_perror(zone, Z_NOMEM, B_TRUE); 3490 exit(Z_ERR); 3491 } 3492 for (cx = pp->pv_complex; cx != NULL; cx = cx->cp_next) { 3493 switch (cx->cp_type) { 3494 case PT_PRIV: 3495 (void) strlcpy(rctlvaltab->zone_rctlval_priv, 3496 cx->cp_value, 3497 sizeof (rctlvaltab->zone_rctlval_priv)); 3498 break; 3499 case PT_LIMIT: 3500 (void) strlcpy(rctlvaltab->zone_rctlval_limit, 3501 cx->cp_value, 3502 sizeof (rctlvaltab->zone_rctlval_limit)); 3503 break; 3504 case PT_ACTION: 3505 (void) strlcpy(rctlvaltab->zone_rctlval_action, 3506 cx->cp_value, 3507 sizeof (rctlvaltab->zone_rctlval_action)); 3508 break; 3509 default: 3510 zone_perror(pt_to_str(prop_type), 3511 Z_NO_PROPERTY_TYPE, B_TRUE); 3512 long_usage(CMD_ADD, B_TRUE); 3513 usage(B_FALSE, HELP_PROPS); 3514 zonecfg_free_rctl_value_list(rctlvaltab); 3515 return; 3516 } 3517 } 3518 rctlvaltab->zone_rctlval_next = NULL; 3519 err = zonecfg_remove_rctl_value(&in_progress_rctltab, 3520 rctlvaltab); 3521 if (err != Z_OK) 3522 zone_perror(pt_to_str(prop_type), err, B_TRUE); 3523 zonecfg_free_rctl_value_list(rctlvaltab); 3524 return; 3525 case RT_NET: 3526 if (prop_type != PT_DEFROUTER) { 3527 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 3528 B_TRUE); 3529 long_usage(CMD_REMOVE, B_TRUE); 3530 usage(B_FALSE, HELP_PROPS); 3531 return; 3532 } else { 3533 bzero(&in_progress_nwiftab.zone_nwif_defrouter, 3534 sizeof (in_progress_nwiftab.zone_nwif_defrouter)); 3535 return; 3536 } 3537 default: 3538 zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, B_TRUE); 3539 long_usage(CMD_REMOVE, B_TRUE); 3540 usage(B_FALSE, HELP_RESOURCES); 3541 return; 3542 } 3543 } 3544 3545 void 3546 remove_func(cmd_t *cmd) 3547 { 3548 if (zone_is_read_only(CMD_REMOVE)) 3549 return; 3550 3551 assert(cmd != NULL); 3552 3553 if (global_scope) { 3554 if (gz_invalid_resource(cmd->cmd_res_type)) { 3555 zerr(gettext("%s is not a valid resource for the " 3556 "global zone."), rt_to_str(cmd->cmd_res_type)); 3557 saw_error = B_TRUE; 3558 return; 3559 } 3560 remove_resource(cmd); 3561 } else { 3562 remove_property(cmd); 3563 } 3564 } 3565 3566 static void 3567 clear_property(cmd_t *cmd) 3568 { 3569 int res_type, prop_type; 3570 3571 res_type = resource_scope; 3572 prop_type = cmd->cmd_res_type; 3573 if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) { 3574 long_usage(CMD_CLEAR, B_TRUE); 3575 return; 3576 } 3577 3578 if (initialize(B_TRUE) != Z_OK) 3579 return; 3580 3581 switch (res_type) { 3582 case RT_FS: 3583 if (prop_type == PT_RAW) { 3584 in_progress_fstab.zone_fs_raw[0] = '\0'; 3585 need_to_commit = B_TRUE; 3586 return; 3587 } 3588 break; 3589 case RT_DCPU: 3590 if (prop_type == PT_IMPORTANCE) { 3591 in_progress_psettab.zone_importance[0] = '\0'; 3592 need_to_commit = B_TRUE; 3593 return; 3594 } 3595 break; 3596 case RT_MCAP: 3597 switch (prop_type) { 3598 case PT_PHYSICAL: 3599 in_progress_mcaptab.zone_physmem_cap[0] = '\0'; 3600 need_to_commit = B_TRUE; 3601 return; 3602 case PT_SWAP: 3603 remove_aliased_rctl(PT_SWAP, ALIAS_MAXSWAP); 3604 return; 3605 case PT_LOCKED: 3606 remove_aliased_rctl(PT_LOCKED, ALIAS_MAXLOCKEDMEM); 3607 return; 3608 } 3609 break; 3610 default: 3611 break; 3612 } 3613 3614 zone_perror(pt_to_str(prop_type), Z_CLEAR_DISALLOW, B_TRUE); 3615 } 3616 3617 static void 3618 clear_global(cmd_t *cmd) 3619 { 3620 int err, type; 3621 3622 if ((type = cmd->cmd_res_type) == RT_UNKNOWN) { 3623 long_usage(CMD_CLEAR, B_TRUE); 3624 return; 3625 } 3626 3627 if (initialize(B_TRUE) != Z_OK) 3628 return; 3629 3630 switch (type) { 3631 case PT_ZONENAME: 3632 /* FALLTHRU */ 3633 case PT_ZONEPATH: 3634 /* FALLTHRU */ 3635 case PT_BRAND: 3636 zone_perror(pt_to_str(type), Z_CLEAR_DISALLOW, B_TRUE); 3637 return; 3638 case PT_AUTOBOOT: 3639 /* false is default; we'll treat as equivalent to clearing */ 3640 if ((err = zonecfg_set_autoboot(handle, B_FALSE)) != Z_OK) 3641 z_cmd_rt_perror(CMD_CLEAR, RT_AUTOBOOT, err, B_TRUE); 3642 else 3643 need_to_commit = B_TRUE; 3644 return; 3645 case PT_POOL: 3646 if ((err = zonecfg_set_pool(handle, NULL)) != Z_OK) 3647 z_cmd_rt_perror(CMD_CLEAR, RT_POOL, err, B_TRUE); 3648 else 3649 need_to_commit = B_TRUE; 3650 return; 3651 case PT_LIMITPRIV: 3652 if ((err = zonecfg_set_limitpriv(handle, NULL)) != Z_OK) 3653 z_cmd_rt_perror(CMD_CLEAR, RT_LIMITPRIV, err, B_TRUE); 3654 else 3655 need_to_commit = B_TRUE; 3656 return; 3657 case PT_BOOTARGS: 3658 if ((err = zonecfg_set_bootargs(handle, NULL)) != Z_OK) 3659 z_cmd_rt_perror(CMD_CLEAR, RT_BOOTARGS, err, B_TRUE); 3660 else 3661 need_to_commit = B_TRUE; 3662 return; 3663 case PT_SCHED: 3664 if ((err = zonecfg_set_sched(handle, NULL)) != Z_OK) 3665 z_cmd_rt_perror(CMD_CLEAR, RT_SCHED, err, B_TRUE); 3666 else 3667 need_to_commit = B_TRUE; 3668 return; 3669 case PT_IPTYPE: 3670 /* shared is default; we'll treat as equivalent to clearing */ 3671 if ((err = zonecfg_set_iptype(handle, ZS_SHARED)) != Z_OK) 3672 z_cmd_rt_perror(CMD_CLEAR, RT_IPTYPE, err, B_TRUE); 3673 else 3674 need_to_commit = B_TRUE; 3675 return; 3676 case PT_MAXLWPS: 3677 remove_aliased_rctl(PT_MAXLWPS, ALIAS_MAXLWPS); 3678 return; 3679 case PT_MAXPROCS: 3680 remove_aliased_rctl(PT_MAXPROCS, ALIAS_MAXPROCS); 3681 return; 3682 case PT_MAXSHMMEM: 3683 remove_aliased_rctl(PT_MAXSHMMEM, ALIAS_MAXSHMMEM); 3684 return; 3685 case PT_MAXSHMIDS: 3686 remove_aliased_rctl(PT_MAXSHMIDS, ALIAS_MAXSHMIDS); 3687 return; 3688 case PT_MAXMSGIDS: 3689 remove_aliased_rctl(PT_MAXMSGIDS, ALIAS_MAXMSGIDS); 3690 return; 3691 case PT_MAXSEMIDS: 3692 remove_aliased_rctl(PT_MAXSEMIDS, ALIAS_MAXSEMIDS); 3693 return; 3694 case PT_SHARES: 3695 remove_aliased_rctl(PT_SHARES, ALIAS_SHARES); 3696 return; 3697 case PT_HOSTID: 3698 if ((err = zonecfg_set_hostid(handle, NULL)) != Z_OK) 3699 z_cmd_rt_perror(CMD_CLEAR, RT_HOSTID, err, B_TRUE); 3700 else 3701 need_to_commit = B_TRUE; 3702 return; 3703 case PT_FS_ALLOWED: 3704 if ((err = zonecfg_set_fs_allowed(handle, NULL)) != Z_OK) 3705 z_cmd_rt_perror(CMD_CLEAR, RT_FS_ALLOWED, err, B_TRUE); 3706 else 3707 need_to_commit = B_TRUE; 3708 return; 3709 default: 3710 zone_perror(pt_to_str(type), Z_NO_PROPERTY_TYPE, B_TRUE); 3711 long_usage(CMD_CLEAR, B_TRUE); 3712 usage(B_FALSE, HELP_PROPS); 3713 return; 3714 } 3715 } 3716 3717 void 3718 clear_func(cmd_t *cmd) 3719 { 3720 if (zone_is_read_only(CMD_CLEAR)) 3721 return; 3722 3723 assert(cmd != NULL); 3724 3725 if (global_scope) { 3726 if (gz_invalid_property(cmd->cmd_res_type)) { 3727 zerr(gettext("%s is not a valid property for the " 3728 "global zone."), pt_to_str(cmd->cmd_res_type)); 3729 saw_error = B_TRUE; 3730 return; 3731 } 3732 3733 clear_global(cmd); 3734 } else { 3735 clear_property(cmd); 3736 } 3737 } 3738 3739 void 3740 select_func(cmd_t *cmd) 3741 { 3742 int type, err, res; 3743 uint64_t limit; 3744 uint64_t tmp; 3745 3746 if (zone_is_read_only(CMD_SELECT)) 3747 return; 3748 3749 assert(cmd != NULL); 3750 3751 if (global_scope) { 3752 global_scope = B_FALSE; 3753 resource_scope = cmd->cmd_res_type; 3754 end_op = CMD_SELECT; 3755 } else { 3756 scope_usage(CMD_SELECT); 3757 return; 3758 } 3759 3760 if ((type = cmd->cmd_res_type) == RT_UNKNOWN) { 3761 long_usage(CMD_SELECT, B_TRUE); 3762 return; 3763 } 3764 3765 if (initialize(B_TRUE) != Z_OK) 3766 return; 3767 3768 switch (type) { 3769 case RT_FS: 3770 if ((err = fill_in_fstab(cmd, &old_fstab, B_FALSE)) != Z_OK) { 3771 z_cmd_rt_perror(CMD_SELECT, RT_FS, err, B_TRUE); 3772 global_scope = B_TRUE; 3773 } 3774 bcopy(&old_fstab, &in_progress_fstab, 3775 sizeof (struct zone_fstab)); 3776 return; 3777 case RT_NET: 3778 if ((err = fill_in_nwiftab(cmd, &old_nwiftab, B_FALSE)) 3779 != Z_OK) { 3780 z_cmd_rt_perror(CMD_SELECT, RT_NET, err, B_TRUE); 3781 global_scope = B_TRUE; 3782 } 3783 bcopy(&old_nwiftab, &in_progress_nwiftab, 3784 sizeof (struct zone_nwiftab)); 3785 return; 3786 case RT_DEVICE: 3787 if ((err = fill_in_devtab(cmd, &old_devtab, B_FALSE)) != Z_OK) { 3788 z_cmd_rt_perror(CMD_SELECT, RT_DEVICE, err, B_TRUE); 3789 global_scope = B_TRUE; 3790 } 3791 bcopy(&old_devtab, &in_progress_devtab, 3792 sizeof (struct zone_devtab)); 3793 return; 3794 case RT_RCTL: 3795 if ((err = fill_in_rctltab(cmd, &old_rctltab, B_FALSE)) 3796 != Z_OK) { 3797 z_cmd_rt_perror(CMD_SELECT, RT_RCTL, err, B_TRUE); 3798 global_scope = B_TRUE; 3799 } 3800 bcopy(&old_rctltab, &in_progress_rctltab, 3801 sizeof (struct zone_rctltab)); 3802 return; 3803 case RT_ATTR: 3804 if ((err = fill_in_attrtab(cmd, &old_attrtab, B_FALSE)) 3805 != Z_OK) { 3806 z_cmd_rt_perror(CMD_SELECT, RT_ATTR, err, B_TRUE); 3807 global_scope = B_TRUE; 3808 } 3809 bcopy(&old_attrtab, &in_progress_attrtab, 3810 sizeof (struct zone_attrtab)); 3811 return; 3812 case RT_DATASET: 3813 if ((err = fill_in_dstab(cmd, &old_dstab, B_FALSE)) != Z_OK) { 3814 z_cmd_rt_perror(CMD_SELECT, RT_DATASET, err, B_TRUE); 3815 global_scope = B_TRUE; 3816 } 3817 bcopy(&old_dstab, &in_progress_dstab, 3818 sizeof (struct zone_dstab)); 3819 return; 3820 case RT_DCPU: 3821 if ((err = zonecfg_lookup_pset(handle, &old_psettab)) != Z_OK) { 3822 z_cmd_rt_perror(CMD_SELECT, RT_DCPU, err, B_TRUE); 3823 global_scope = B_TRUE; 3824 } 3825 bcopy(&old_psettab, &in_progress_psettab, 3826 sizeof (struct zone_psettab)); 3827 return; 3828 case RT_PCAP: 3829 if ((err = zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp)) 3830 != Z_OK) { 3831 z_cmd_rt_perror(CMD_SELECT, RT_PCAP, err, B_TRUE); 3832 global_scope = B_TRUE; 3833 } 3834 return; 3835 case RT_MCAP: 3836 /* if none of these exist, there is no resource to select */ 3837 if ((res = zonecfg_lookup_mcap(handle, &old_mcaptab)) != Z_OK && 3838 zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &limit) 3839 != Z_OK && 3840 zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, &limit) 3841 != Z_OK) { 3842 z_cmd_rt_perror(CMD_SELECT, RT_MCAP, Z_NO_RESOURCE_TYPE, 3843 B_TRUE); 3844 global_scope = B_TRUE; 3845 } 3846 if (res == Z_OK) 3847 bcopy(&old_mcaptab, &in_progress_mcaptab, 3848 sizeof (struct zone_mcaptab)); 3849 else 3850 bzero(&in_progress_mcaptab, 3851 sizeof (in_progress_mcaptab)); 3852 return; 3853 case RT_ADMIN: 3854 if ((err = fill_in_admintab(cmd, &old_admintab, B_FALSE)) 3855 != Z_OK) { 3856 z_cmd_rt_perror(CMD_SELECT, RT_ADMIN, err, 3857 B_TRUE); 3858 global_scope = B_TRUE; 3859 } 3860 bcopy(&old_admintab, &in_progress_admintab, 3861 sizeof (struct zone_admintab)); 3862 return; 3863 default: 3864 zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, B_TRUE); 3865 long_usage(CMD_SELECT, B_TRUE); 3866 usage(B_FALSE, HELP_RESOURCES); 3867 return; 3868 } 3869 } 3870 3871 /* 3872 * Network "addresses" can be one of the following forms: 3873 * <IPv4 address> 3874 * <IPv4 address>/<prefix length> 3875 * <IPv6 address>/<prefix length> 3876 * <host name> 3877 * <host name>/<prefix length> 3878 * In other words, the "/" followed by a prefix length is allowed but not 3879 * required for IPv4 addresses and host names, and required for IPv6 addresses. 3880 * If a prefix length is given, it must be in the allowable range: 0 to 32 for 3881 * IPv4 addresses and host names, 0 to 128 for IPv6 addresses. 3882 * Host names must start with an alpha-numeric character, and all subsequent 3883 * characters must be either alpha-numeric or "-". 3884 * 3885 * In some cases, e.g., the nexthop for the defrouter, the context indicates 3886 * that this is the IPV4_ABITS or IPV6_ABITS netmask, in which case we don't 3887 * require the /<prefix length> (and should ignore it if provided). 3888 */ 3889 3890 static int 3891 validate_net_address_syntax(char *address, boolean_t ishost) 3892 { 3893 char *slashp, part1[MAXHOSTNAMELEN]; 3894 struct in6_addr in6; 3895 struct in_addr in4; 3896 int prefixlen, i; 3897 3898 /* 3899 * Copy the part before any '/' into part1 or copy the whole 3900 * thing if there is no '/'. 3901 */ 3902 if ((slashp = strchr(address, '/')) != NULL) { 3903 *slashp = '\0'; 3904 (void) strlcpy(part1, address, sizeof (part1)); 3905 *slashp = '/'; 3906 prefixlen = atoi(++slashp); 3907 } else { 3908 (void) strlcpy(part1, address, sizeof (part1)); 3909 } 3910 3911 if (ishost && slashp != NULL) { 3912 zerr(gettext("Warning: prefix length in %s is not required and " 3913 "will be ignored. The default host-prefix length " 3914 "will be used"), address); 3915 } 3916 3917 3918 if (inet_pton(AF_INET6, part1, &in6) == 1) { 3919 if (ishost) { 3920 prefixlen = IPV6_ABITS; 3921 } else if (slashp == NULL) { 3922 zerr(gettext("%s: IPv6 addresses " 3923 "require /prefix-length suffix."), address); 3924 return (Z_ERR); 3925 } 3926 if (prefixlen < 0 || prefixlen > 128) { 3927 zerr(gettext("%s: IPv6 address " 3928 "prefix lengths must be 0 - 128."), address); 3929 return (Z_ERR); 3930 } 3931 return (Z_OK); 3932 } 3933 3934 /* At this point, any /prefix must be for IPv4. */ 3935 if (ishost) 3936 prefixlen = IPV4_ABITS; 3937 else if (slashp != NULL) { 3938 if (prefixlen < 0 || prefixlen > 32) { 3939 zerr(gettext("%s: IPv4 address " 3940 "prefix lengths must be 0 - 32."), address); 3941 return (Z_ERR); 3942 } 3943 } 3944 3945 if (inet_pton(AF_INET, part1, &in4) == 1) 3946 return (Z_OK); 3947 3948 /* address may also be a host name */ 3949 if (!isalnum(part1[0])) { 3950 zerr(gettext("%s: bogus host name or network address syntax"), 3951 part1); 3952 saw_error = B_TRUE; 3953 usage(B_FALSE, HELP_NETADDR); 3954 return (Z_ERR); 3955 } 3956 for (i = 1; part1[i]; i++) 3957 if (!isalnum(part1[i]) && part1[i] != '-' && part1[i] != '.') { 3958 zerr(gettext("%s: bogus host name or " 3959 "network address syntax"), part1); 3960 saw_error = B_TRUE; 3961 usage(B_FALSE, HELP_NETADDR); 3962 return (Z_ERR); 3963 } 3964 return (Z_OK); 3965 } 3966 3967 static int 3968 validate_net_physical_syntax(const char *ifname) 3969 { 3970 ifspec_t ifnameprop; 3971 zone_iptype_t iptype; 3972 3973 if (zonecfg_get_iptype(handle, &iptype) != Z_OK) { 3974 zerr(gettext("zone configuration has an invalid or nonexistent " 3975 "ip-type property")); 3976 return (Z_ERR); 3977 } 3978 switch (iptype) { 3979 case ZS_SHARED: 3980 if (ifparse_ifspec(ifname, &ifnameprop) == B_FALSE) { 3981 zerr(gettext("%s: invalid physical interface name"), 3982 ifname); 3983 return (Z_ERR); 3984 } 3985 if (ifnameprop.ifsp_lunvalid) { 3986 zerr(gettext("%s: LUNs not allowed in physical " 3987 "interface names"), ifname); 3988 return (Z_ERR); 3989 } 3990 break; 3991 case ZS_EXCLUSIVE: 3992 if (dladm_valid_linkname(ifname) == B_FALSE) { 3993 if (strchr(ifname, ':') != NULL) 3994 zerr(gettext("%s: physical interface name " 3995 "required; logical interface name not " 3996 "allowed"), ifname); 3997 else 3998 zerr(gettext("%s: invalid physical interface " 3999 "name"), ifname); 4000 return (Z_ERR); 4001 } 4002 break; 4003 } 4004 return (Z_OK); 4005 } 4006 4007 static boolean_t 4008 valid_fs_type(const char *type) 4009 { 4010 /* 4011 * Is this a valid path component? 4012 */ 4013 if (strlen(type) + 1 > MAXNAMELEN) 4014 return (B_FALSE); 4015 /* 4016 * Make sure a bad value for "type" doesn't make 4017 * /usr/lib/fs/<type>/mount turn into something else. 4018 */ 4019 if (strchr(type, '/') != NULL || type[0] == '\0' || 4020 strcmp(type, ".") == 0 || strcmp(type, "..") == 0) 4021 return (B_FALSE); 4022 /* 4023 * More detailed verification happens later by zoneadm(1m). 4024 */ 4025 return (B_TRUE); 4026 } 4027 4028 static boolean_t 4029 allow_exclusive() 4030 { 4031 brand_handle_t bh; 4032 char brand[MAXNAMELEN]; 4033 boolean_t ret; 4034 4035 if (zonecfg_get_brand(handle, brand, sizeof (brand)) != Z_OK) { 4036 zerr("%s: %s\n", zone, gettext("could not get zone brand")); 4037 return (B_FALSE); 4038 } 4039 if ((bh = brand_open(brand)) == NULL) { 4040 zerr("%s: %s\n", zone, gettext("unknown brand.")); 4041 return (B_FALSE); 4042 } 4043 ret = brand_allow_exclusive_ip(bh); 4044 brand_close(bh); 4045 if (!ret) 4046 zerr(gettext("%s cannot be '%s' when %s is '%s'."), 4047 pt_to_str(PT_IPTYPE), "exclusive", 4048 pt_to_str(PT_BRAND), brand); 4049 return (ret); 4050 } 4051 4052 static void 4053 set_aliased_rctl(char *alias, int prop_type, char *s) 4054 { 4055 uint64_t limit; 4056 int err; 4057 char tmp[128]; 4058 4059 if (global_zone && strcmp(alias, ALIAS_SHARES) != 0) 4060 zerr(gettext("WARNING: Setting a global zone resource " 4061 "control too low could deny\nservice " 4062 "to even the root user; " 4063 "this could render the system impossible\n" 4064 "to administer. Please use caution.")); 4065 4066 /* convert memory based properties */ 4067 if (prop_type == PT_MAXSHMMEM) { 4068 if (!zonecfg_valid_memlimit(s, &limit)) { 4069 zerr(gettext("A non-negative number with a required " 4070 "scale suffix (K, M, G or T) was expected\nhere.")); 4071 saw_error = B_TRUE; 4072 return; 4073 } 4074 4075 (void) snprintf(tmp, sizeof (tmp), "%llu", limit); 4076 s = tmp; 4077 } 4078 4079 if (!zonecfg_aliased_rctl_ok(handle, alias)) { 4080 zone_perror(pt_to_str(prop_type), Z_ALIAS_DISALLOW, B_FALSE); 4081 saw_error = B_TRUE; 4082 } else if (!zonecfg_valid_alias_limit(alias, s, &limit)) { 4083 zerr(gettext("%s property is out of range."), 4084 pt_to_str(prop_type)); 4085 saw_error = B_TRUE; 4086 } else if ((err = zonecfg_set_aliased_rctl(handle, alias, limit)) 4087 != Z_OK) { 4088 zone_perror(zone, err, B_TRUE); 4089 saw_error = B_TRUE; 4090 } else { 4091 need_to_commit = B_TRUE; 4092 } 4093 } 4094 4095 static void 4096 set_in_progress_nwiftab_address(char *prop_id, int prop_type) 4097 { 4098 if (prop_type == PT_ADDRESS) { 4099 (void) strlcpy(in_progress_nwiftab.zone_nwif_address, prop_id, 4100 sizeof (in_progress_nwiftab.zone_nwif_address)); 4101 } else { 4102 assert(prop_type == PT_ALLOWED_ADDRESS); 4103 (void) strlcpy(in_progress_nwiftab.zone_nwif_allowed_address, 4104 prop_id, 4105 sizeof (in_progress_nwiftab.zone_nwif_allowed_address)); 4106 } 4107 } 4108 4109 void 4110 set_func(cmd_t *cmd) 4111 { 4112 char *prop_id; 4113 int arg, err, res_type, prop_type; 4114 property_value_ptr_t pp; 4115 boolean_t autoboot; 4116 zone_iptype_t iptype; 4117 boolean_t force_set = B_FALSE; 4118 size_t physmem_size = sizeof (in_progress_mcaptab.zone_physmem_cap); 4119 uint64_t mem_cap, mem_limit; 4120 float cap; 4121 char *unitp; 4122 struct zone_psettab tmp_psettab; 4123 boolean_t arg_err = B_FALSE; 4124 4125 if (zone_is_read_only(CMD_SET)) 4126 return; 4127 4128 assert(cmd != NULL); 4129 4130 optind = opterr = 0; 4131 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "F")) != EOF) { 4132 switch (arg) { 4133 case 'F': 4134 force_set = B_TRUE; 4135 break; 4136 default: 4137 if (optopt == '?') 4138 longer_usage(CMD_SET); 4139 else 4140 short_usage(CMD_SET); 4141 arg_err = B_TRUE; 4142 break; 4143 } 4144 } 4145 if (arg_err) 4146 return; 4147 4148 prop_type = cmd->cmd_prop_name[0]; 4149 if (global_scope) { 4150 if (gz_invalid_property(prop_type)) { 4151 zerr(gettext("%s is not a valid property for the " 4152 "global zone."), pt_to_str(prop_type)); 4153 saw_error = B_TRUE; 4154 return; 4155 } 4156 4157 if (prop_type == PT_ZONENAME) { 4158 res_type = RT_ZONENAME; 4159 } else if (prop_type == PT_ZONEPATH) { 4160 res_type = RT_ZONEPATH; 4161 } else if (prop_type == PT_AUTOBOOT) { 4162 res_type = RT_AUTOBOOT; 4163 } else if (prop_type == PT_BRAND) { 4164 res_type = RT_BRAND; 4165 } else if (prop_type == PT_POOL) { 4166 res_type = RT_POOL; 4167 } else if (prop_type == PT_LIMITPRIV) { 4168 res_type = RT_LIMITPRIV; 4169 } else if (prop_type == PT_BOOTARGS) { 4170 res_type = RT_BOOTARGS; 4171 } else if (prop_type == PT_SCHED) { 4172 res_type = RT_SCHED; 4173 } else if (prop_type == PT_IPTYPE) { 4174 res_type = RT_IPTYPE; 4175 } else if (prop_type == PT_MAXLWPS) { 4176 res_type = RT_MAXLWPS; 4177 } else if (prop_type == PT_MAXPROCS) { 4178 res_type = RT_MAXPROCS; 4179 } else if (prop_type == PT_MAXSHMMEM) { 4180 res_type = RT_MAXSHMMEM; 4181 } else if (prop_type == PT_MAXSHMIDS) { 4182 res_type = RT_MAXSHMIDS; 4183 } else if (prop_type == PT_MAXMSGIDS) { 4184 res_type = RT_MAXMSGIDS; 4185 } else if (prop_type == PT_MAXSEMIDS) { 4186 res_type = RT_MAXSEMIDS; 4187 } else if (prop_type == PT_SHARES) { 4188 res_type = RT_SHARES; 4189 } else if (prop_type == PT_HOSTID) { 4190 res_type = RT_HOSTID; 4191 } else if (prop_type == PT_FS_ALLOWED) { 4192 res_type = RT_FS_ALLOWED; 4193 } else { 4194 zerr(gettext("Cannot set a resource-specific property " 4195 "from the global scope.")); 4196 saw_error = B_TRUE; 4197 return; 4198 } 4199 } else { 4200 res_type = resource_scope; 4201 } 4202 4203 if (force_set) { 4204 if (res_type != RT_ZONEPATH) { 4205 zerr(gettext("Only zonepath setting can be forced.")); 4206 saw_error = B_TRUE; 4207 return; 4208 } 4209 if (!zonecfg_in_alt_root()) { 4210 zerr(gettext("Zonepath is changeable only in an " 4211 "alternate root.")); 4212 saw_error = B_TRUE; 4213 return; 4214 } 4215 } 4216 4217 pp = cmd->cmd_property_ptr[0]; 4218 /* 4219 * A nasty expression but not that complicated: 4220 * 1. fs options are simple or list (tested below) 4221 * 2. rctl value's are complex or list (tested below) 4222 * Anything else should be simple. 4223 */ 4224 if (!(res_type == RT_FS && prop_type == PT_OPTIONS) && 4225 !(res_type == RT_RCTL && prop_type == PT_VALUE) && 4226 (pp->pv_type != PROP_VAL_SIMPLE || 4227 (prop_id = pp->pv_simple) == NULL)) { 4228 zerr(gettext("A %s value was expected here."), 4229 pvt_to_str(PROP_VAL_SIMPLE)); 4230 saw_error = B_TRUE; 4231 return; 4232 } 4233 if (prop_type == PT_UNKNOWN) { 4234 long_usage(CMD_SET, B_TRUE); 4235 return; 4236 } 4237 4238 /* 4239 * Special case: the user can change the zone name prior to 'create'; 4240 * if the zone already exists, we fall through letting initialize() 4241 * and the rest of the logic run. 4242 */ 4243 if (res_type == RT_ZONENAME && got_handle == B_FALSE && 4244 !state_atleast(ZONE_STATE_CONFIGURED)) { 4245 if ((err = zonecfg_validate_zonename(prop_id)) != Z_OK) { 4246 zone_perror(prop_id, err, B_TRUE); 4247 usage(B_FALSE, HELP_SYNTAX); 4248 return; 4249 } 4250 (void) strlcpy(zone, prop_id, sizeof (zone)); 4251 return; 4252 } 4253 4254 if (initialize(B_TRUE) != Z_OK) 4255 return; 4256 4257 switch (res_type) { 4258 case RT_ZONENAME: 4259 if ((err = zonecfg_set_name(handle, prop_id)) != Z_OK) { 4260 /* 4261 * Use prop_id instead of 'zone' here, since we're 4262 * reporting a problem about the *new* zonename. 4263 */ 4264 zone_perror(prop_id, err, B_TRUE); 4265 usage(B_FALSE, HELP_SYNTAX); 4266 } else { 4267 need_to_commit = B_TRUE; 4268 (void) strlcpy(zone, prop_id, sizeof (zone)); 4269 } 4270 return; 4271 case RT_ZONEPATH: 4272 if (!force_set && state_atleast(ZONE_STATE_INSTALLED)) { 4273 zerr(gettext("Zone %s already installed; %s %s not " 4274 "allowed."), zone, cmd_to_str(CMD_SET), 4275 rt_to_str(RT_ZONEPATH)); 4276 return; 4277 } 4278 if (validate_zonepath_syntax(prop_id) != Z_OK) { 4279 saw_error = B_TRUE; 4280 return; 4281 } 4282 if ((err = zonecfg_set_zonepath(handle, prop_id)) != Z_OK) 4283 zone_perror(zone, err, B_TRUE); 4284 else 4285 need_to_commit = B_TRUE; 4286 return; 4287 case RT_BRAND: 4288 if (state_atleast(ZONE_STATE_INSTALLED)) { 4289 zerr(gettext("Zone %s already installed; %s %s not " 4290 "allowed."), zone, cmd_to_str(CMD_SET), 4291 rt_to_str(RT_BRAND)); 4292 return; 4293 } 4294 if ((err = zonecfg_set_brand(handle, prop_id)) != Z_OK) 4295 zone_perror(zone, err, B_TRUE); 4296 else 4297 need_to_commit = B_TRUE; 4298 return; 4299 case RT_AUTOBOOT: 4300 if (strcmp(prop_id, "true") == 0) { 4301 autoboot = B_TRUE; 4302 } else if (strcmp(prop_id, "false") == 0) { 4303 autoboot = B_FALSE; 4304 } else { 4305 zerr(gettext("%s value must be '%s' or '%s'."), 4306 pt_to_str(PT_AUTOBOOT), "true", "false"); 4307 saw_error = B_TRUE; 4308 return; 4309 } 4310 if ((err = zonecfg_set_autoboot(handle, autoboot)) != Z_OK) 4311 zone_perror(zone, err, B_TRUE); 4312 else 4313 need_to_commit = B_TRUE; 4314 return; 4315 case RT_POOL: 4316 /* don't allow use of the reserved temporary pool names */ 4317 if (strncmp("SUNW", prop_id, 4) == 0) { 4318 zerr(gettext("pool names starting with SUNW are " 4319 "reserved.")); 4320 saw_error = B_TRUE; 4321 return; 4322 } 4323 4324 /* can't set pool if dedicated-cpu exists */ 4325 if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) { 4326 zerr(gettext("The %s resource already exists. " 4327 "A persistent pool is incompatible\nwith the %s " 4328 "resource."), rt_to_str(RT_DCPU), 4329 rt_to_str(RT_DCPU)); 4330 saw_error = B_TRUE; 4331 return; 4332 } 4333 4334 if ((err = zonecfg_set_pool(handle, prop_id)) != Z_OK) 4335 zone_perror(zone, err, B_TRUE); 4336 else 4337 need_to_commit = B_TRUE; 4338 return; 4339 case RT_LIMITPRIV: 4340 if ((err = zonecfg_set_limitpriv(handle, prop_id)) != Z_OK) 4341 zone_perror(zone, err, B_TRUE); 4342 else 4343 need_to_commit = B_TRUE; 4344 return; 4345 case RT_BOOTARGS: 4346 if ((err = zonecfg_set_bootargs(handle, prop_id)) != Z_OK) 4347 zone_perror(zone, err, B_TRUE); 4348 else 4349 need_to_commit = B_TRUE; 4350 return; 4351 case RT_SCHED: 4352 if ((err = zonecfg_set_sched(handle, prop_id)) != Z_OK) 4353 zone_perror(zone, err, B_TRUE); 4354 else 4355 need_to_commit = B_TRUE; 4356 return; 4357 case RT_IPTYPE: 4358 if (strcmp(prop_id, "shared") == 0) { 4359 iptype = ZS_SHARED; 4360 } else if (strcmp(prop_id, "exclusive") == 0) { 4361 iptype = ZS_EXCLUSIVE; 4362 } else { 4363 zerr(gettext("%s value must be '%s' or '%s'."), 4364 pt_to_str(PT_IPTYPE), "shared", "exclusive"); 4365 saw_error = B_TRUE; 4366 return; 4367 } 4368 if (iptype == ZS_EXCLUSIVE && !allow_exclusive()) { 4369 saw_error = B_TRUE; 4370 return; 4371 } 4372 if ((err = zonecfg_set_iptype(handle, iptype)) != Z_OK) 4373 zone_perror(zone, err, B_TRUE); 4374 else 4375 need_to_commit = B_TRUE; 4376 return; 4377 case RT_MAXLWPS: 4378 set_aliased_rctl(ALIAS_MAXLWPS, prop_type, prop_id); 4379 return; 4380 case RT_MAXPROCS: 4381 set_aliased_rctl(ALIAS_MAXPROCS, prop_type, prop_id); 4382 return; 4383 case RT_MAXSHMMEM: 4384 set_aliased_rctl(ALIAS_MAXSHMMEM, prop_type, prop_id); 4385 return; 4386 case RT_MAXSHMIDS: 4387 set_aliased_rctl(ALIAS_MAXSHMIDS, prop_type, prop_id); 4388 return; 4389 case RT_MAXMSGIDS: 4390 set_aliased_rctl(ALIAS_MAXMSGIDS, prop_type, prop_id); 4391 return; 4392 case RT_MAXSEMIDS: 4393 set_aliased_rctl(ALIAS_MAXSEMIDS, prop_type, prop_id); 4394 return; 4395 case RT_SHARES: 4396 set_aliased_rctl(ALIAS_SHARES, prop_type, prop_id); 4397 return; 4398 case RT_HOSTID: 4399 if ((err = zonecfg_set_hostid(handle, prop_id)) != Z_OK) { 4400 if (err == Z_TOO_BIG) { 4401 zerr(gettext("hostid string is too large: %s"), 4402 prop_id); 4403 saw_error = B_TRUE; 4404 } else { 4405 zone_perror(pt_to_str(prop_type), err, B_TRUE); 4406 } 4407 return; 4408 } 4409 need_to_commit = B_TRUE; 4410 return; 4411 case RT_FS_ALLOWED: 4412 if ((err = zonecfg_set_fs_allowed(handle, prop_id)) != Z_OK) 4413 zone_perror(zone, err, B_TRUE); 4414 else 4415 need_to_commit = B_TRUE; 4416 return; 4417 case RT_FS: 4418 switch (prop_type) { 4419 case PT_DIR: 4420 (void) strlcpy(in_progress_fstab.zone_fs_dir, prop_id, 4421 sizeof (in_progress_fstab.zone_fs_dir)); 4422 return; 4423 case PT_SPECIAL: 4424 (void) strlcpy(in_progress_fstab.zone_fs_special, 4425 prop_id, 4426 sizeof (in_progress_fstab.zone_fs_special)); 4427 return; 4428 case PT_RAW: 4429 (void) strlcpy(in_progress_fstab.zone_fs_raw, 4430 prop_id, sizeof (in_progress_fstab.zone_fs_raw)); 4431 return; 4432 case PT_TYPE: 4433 if (!valid_fs_type(prop_id)) { 4434 zerr(gettext("\"%s\" is not a valid %s."), 4435 prop_id, pt_to_str(PT_TYPE)); 4436 saw_error = B_TRUE; 4437 return; 4438 } 4439 (void) strlcpy(in_progress_fstab.zone_fs_type, prop_id, 4440 sizeof (in_progress_fstab.zone_fs_type)); 4441 return; 4442 case PT_OPTIONS: 4443 if (pp->pv_type != PROP_VAL_SIMPLE && 4444 pp->pv_type != PROP_VAL_LIST) { 4445 zerr(gettext("A %s or %s value was expected " 4446 "here."), pvt_to_str(PROP_VAL_SIMPLE), 4447 pvt_to_str(PROP_VAL_LIST)); 4448 saw_error = B_TRUE; 4449 return; 4450 } 4451 zonecfg_free_fs_option_list( 4452 in_progress_fstab.zone_fs_options); 4453 in_progress_fstab.zone_fs_options = NULL; 4454 if (!(pp->pv_type == PROP_VAL_LIST && 4455 pp->pv_list == NULL)) 4456 add_property(cmd); 4457 return; 4458 default: 4459 break; 4460 } 4461 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, B_TRUE); 4462 long_usage(CMD_SET, B_TRUE); 4463 usage(B_FALSE, HELP_PROPS); 4464 return; 4465 case RT_NET: 4466 switch (prop_type) { 4467 case PT_ADDRESS: 4468 case PT_ALLOWED_ADDRESS: 4469 if (validate_net_address_syntax(prop_id, B_FALSE) 4470 != Z_OK) { 4471 saw_error = B_TRUE; 4472 return; 4473 } 4474 set_in_progress_nwiftab_address(prop_id, prop_type); 4475 break; 4476 case PT_PHYSICAL: 4477 if (validate_net_physical_syntax(prop_id) != Z_OK) { 4478 saw_error = B_TRUE; 4479 return; 4480 } 4481 (void) strlcpy(in_progress_nwiftab.zone_nwif_physical, 4482 prop_id, 4483 sizeof (in_progress_nwiftab.zone_nwif_physical)); 4484 break; 4485 case PT_DEFROUTER: 4486 if (validate_net_address_syntax(prop_id, B_TRUE) 4487 != Z_OK) { 4488 saw_error = B_TRUE; 4489 return; 4490 } 4491 (void) strlcpy(in_progress_nwiftab.zone_nwif_defrouter, 4492 prop_id, 4493 sizeof (in_progress_nwiftab.zone_nwif_defrouter)); 4494 break; 4495 default: 4496 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4497 B_TRUE); 4498 long_usage(CMD_SET, B_TRUE); 4499 usage(B_FALSE, HELP_PROPS); 4500 return; 4501 } 4502 return; 4503 case RT_DEVICE: 4504 switch (prop_type) { 4505 case PT_MATCH: 4506 (void) strlcpy(in_progress_devtab.zone_dev_match, 4507 prop_id, 4508 sizeof (in_progress_devtab.zone_dev_match)); 4509 break; 4510 default: 4511 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4512 B_TRUE); 4513 long_usage(CMD_SET, B_TRUE); 4514 usage(B_FALSE, HELP_PROPS); 4515 return; 4516 } 4517 return; 4518 case RT_RCTL: 4519 switch (prop_type) { 4520 case PT_NAME: 4521 if (!zonecfg_valid_rctlname(prop_id)) { 4522 zerr(gettext("'%s' is not a valid zone %s " 4523 "name."), prop_id, rt_to_str(RT_RCTL)); 4524 return; 4525 } 4526 (void) strlcpy(in_progress_rctltab.zone_rctl_name, 4527 prop_id, 4528 sizeof (in_progress_rctltab.zone_rctl_name)); 4529 break; 4530 case PT_VALUE: 4531 if (pp->pv_type != PROP_VAL_COMPLEX && 4532 pp->pv_type != PROP_VAL_LIST) { 4533 zerr(gettext("A %s or %s value was expected " 4534 "here."), pvt_to_str(PROP_VAL_COMPLEX), 4535 pvt_to_str(PROP_VAL_LIST)); 4536 saw_error = B_TRUE; 4537 return; 4538 } 4539 zonecfg_free_rctl_value_list( 4540 in_progress_rctltab.zone_rctl_valptr); 4541 in_progress_rctltab.zone_rctl_valptr = NULL; 4542 if (!(pp->pv_type == PROP_VAL_LIST && 4543 pp->pv_list == NULL)) 4544 add_property(cmd); 4545 break; 4546 default: 4547 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4548 B_TRUE); 4549 long_usage(CMD_SET, B_TRUE); 4550 usage(B_FALSE, HELP_PROPS); 4551 return; 4552 } 4553 return; 4554 case RT_ATTR: 4555 switch (prop_type) { 4556 case PT_NAME: 4557 (void) strlcpy(in_progress_attrtab.zone_attr_name, 4558 prop_id, 4559 sizeof (in_progress_attrtab.zone_attr_name)); 4560 break; 4561 case PT_TYPE: 4562 (void) strlcpy(in_progress_attrtab.zone_attr_type, 4563 prop_id, 4564 sizeof (in_progress_attrtab.zone_attr_type)); 4565 break; 4566 case PT_VALUE: 4567 (void) strlcpy(in_progress_attrtab.zone_attr_value, 4568 prop_id, 4569 sizeof (in_progress_attrtab.zone_attr_value)); 4570 break; 4571 default: 4572 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4573 B_TRUE); 4574 long_usage(CMD_SET, B_TRUE); 4575 usage(B_FALSE, HELP_PROPS); 4576 return; 4577 } 4578 return; 4579 case RT_DATASET: 4580 switch (prop_type) { 4581 case PT_NAME: 4582 (void) strlcpy(in_progress_dstab.zone_dataset_name, 4583 prop_id, 4584 sizeof (in_progress_dstab.zone_dataset_name)); 4585 return; 4586 default: 4587 break; 4588 } 4589 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, B_TRUE); 4590 long_usage(CMD_SET, B_TRUE); 4591 usage(B_FALSE, HELP_PROPS); 4592 return; 4593 case RT_DCPU: 4594 switch (prop_type) { 4595 char *lowp, *highp; 4596 4597 case PT_NCPUS: 4598 lowp = prop_id; 4599 if ((highp = strchr(prop_id, '-')) != NULL) 4600 *highp++ = '\0'; 4601 else 4602 highp = lowp; 4603 4604 /* Make sure the input makes sense. */ 4605 if (!zonecfg_valid_ncpus(lowp, highp)) { 4606 zerr(gettext("%s property is out of range."), 4607 pt_to_str(PT_NCPUS)); 4608 saw_error = B_TRUE; 4609 return; 4610 } 4611 4612 (void) strlcpy( 4613 in_progress_psettab.zone_ncpu_min, lowp, 4614 sizeof (in_progress_psettab.zone_ncpu_min)); 4615 (void) strlcpy( 4616 in_progress_psettab.zone_ncpu_max, highp, 4617 sizeof (in_progress_psettab.zone_ncpu_max)); 4618 return; 4619 case PT_IMPORTANCE: 4620 /* Make sure the value makes sense. */ 4621 if (!zonecfg_valid_importance(prop_id)) { 4622 zerr(gettext("%s property is out of range."), 4623 pt_to_str(PT_IMPORTANCE)); 4624 saw_error = B_TRUE; 4625 return; 4626 } 4627 4628 (void) strlcpy(in_progress_psettab.zone_importance, 4629 prop_id, 4630 sizeof (in_progress_psettab.zone_importance)); 4631 return; 4632 default: 4633 break; 4634 } 4635 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, B_TRUE); 4636 long_usage(CMD_SET, B_TRUE); 4637 usage(B_FALSE, HELP_PROPS); 4638 return; 4639 case RT_PCAP: 4640 if (prop_type != PT_NCPUS) { 4641 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4642 B_TRUE); 4643 long_usage(CMD_SET, B_TRUE); 4644 usage(B_FALSE, HELP_PROPS); 4645 return; 4646 } 4647 4648 /* 4649 * We already checked that an rctl alias is allowed in 4650 * the add_resource() function. 4651 */ 4652 4653 if ((cap = strtof(prop_id, &unitp)) <= 0 || *unitp != '\0' || 4654 (int)(cap * 100) < 1) { 4655 zerr(gettext("%s property is out of range."), 4656 pt_to_str(PT_NCPUS)); 4657 saw_error = B_TRUE; 4658 return; 4659 } 4660 4661 if ((err = zonecfg_set_aliased_rctl(handle, ALIAS_CPUCAP, 4662 (int)(cap * 100))) != Z_OK) 4663 zone_perror(zone, err, B_TRUE); 4664 else 4665 need_to_commit = B_TRUE; 4666 return; 4667 case RT_MCAP: 4668 switch (prop_type) { 4669 case PT_PHYSICAL: 4670 if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) { 4671 zerr(gettext("A positive number with a " 4672 "required scale suffix (K, M, G or T) was " 4673 "expected here.")); 4674 saw_error = B_TRUE; 4675 } else if (mem_cap < ONE_MB) { 4676 zerr(gettext("%s value is too small. It must " 4677 "be at least 1M."), pt_to_str(PT_PHYSICAL)); 4678 saw_error = B_TRUE; 4679 } else { 4680 snprintf(in_progress_mcaptab.zone_physmem_cap, 4681 physmem_size, "%llu", mem_cap); 4682 } 4683 break; 4684 case PT_SWAP: 4685 /* 4686 * We have to check if an rctl is allowed here since 4687 * there might already be a rctl defined that blocks 4688 * the alias. 4689 */ 4690 if (!zonecfg_aliased_rctl_ok(handle, ALIAS_MAXSWAP)) { 4691 zone_perror(pt_to_str(PT_MAXSWAP), 4692 Z_ALIAS_DISALLOW, B_FALSE); 4693 saw_error = B_TRUE; 4694 return; 4695 } 4696 4697 if (global_zone) 4698 mem_limit = ONE_MB * 100; 4699 else 4700 mem_limit = ONE_MB * 50; 4701 4702 if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) { 4703 zerr(gettext("A positive number with a " 4704 "required scale suffix (K, M, G or T) was " 4705 "expected here.")); 4706 saw_error = B_TRUE; 4707 } else if (mem_cap < mem_limit) { 4708 char buf[128]; 4709 4710 (void) snprintf(buf, sizeof (buf), "%llu", 4711 mem_limit); 4712 bytes_to_units(buf, buf, sizeof (buf)); 4713 zerr(gettext("%s value is too small. It must " 4714 "be at least %s."), pt_to_str(PT_SWAP), 4715 buf); 4716 saw_error = B_TRUE; 4717 } else { 4718 if ((err = zonecfg_set_aliased_rctl(handle, 4719 ALIAS_MAXSWAP, mem_cap)) != Z_OK) 4720 zone_perror(zone, err, B_TRUE); 4721 else 4722 need_to_commit = B_TRUE; 4723 } 4724 break; 4725 case PT_LOCKED: 4726 /* 4727 * We have to check if an rctl is allowed here since 4728 * there might already be a rctl defined that blocks 4729 * the alias. 4730 */ 4731 if (!zonecfg_aliased_rctl_ok(handle, 4732 ALIAS_MAXLOCKEDMEM)) { 4733 zone_perror(pt_to_str(PT_LOCKED), 4734 Z_ALIAS_DISALLOW, B_FALSE); 4735 saw_error = B_TRUE; 4736 return; 4737 } 4738 4739 if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) { 4740 zerr(gettext("A non-negative number with a " 4741 "required scale suffix (K, M, G or T) was " 4742 "expected\nhere.")); 4743 saw_error = B_TRUE; 4744 } else { 4745 if ((err = zonecfg_set_aliased_rctl(handle, 4746 ALIAS_MAXLOCKEDMEM, mem_cap)) != Z_OK) 4747 zone_perror(zone, err, B_TRUE); 4748 else 4749 need_to_commit = B_TRUE; 4750 } 4751 break; 4752 default: 4753 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4754 B_TRUE); 4755 long_usage(CMD_SET, B_TRUE); 4756 usage(B_FALSE, HELP_PROPS); 4757 return; 4758 } 4759 return; 4760 case RT_ADMIN: 4761 switch (prop_type) { 4762 case PT_USER: 4763 (void) strlcpy(in_progress_admintab.zone_admin_user, 4764 prop_id, 4765 sizeof (in_progress_admintab.zone_admin_user)); 4766 return; 4767 case PT_AUTHS: 4768 (void) strlcpy(in_progress_admintab.zone_admin_auths, 4769 prop_id, 4770 sizeof (in_progress_admintab.zone_admin_auths)); 4771 return; 4772 default: 4773 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4774 B_TRUE); 4775 long_usage(CMD_SET, B_TRUE); 4776 usage(B_FALSE, HELP_PROPS); 4777 return; 4778 } 4779 default: 4780 zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, B_TRUE); 4781 long_usage(CMD_SET, B_TRUE); 4782 usage(B_FALSE, HELP_RESOURCES); 4783 return; 4784 } 4785 } 4786 4787 static void 4788 output_prop(FILE *fp, int pnum, char *pval, boolean_t print_notspec) 4789 { 4790 char *qstr; 4791 4792 if (*pval != '\0') { 4793 qstr = quoteit(pval); 4794 if (pnum == PT_SWAP || pnum == PT_LOCKED) 4795 (void) fprintf(fp, "\t[%s: %s]\n", pt_to_str(pnum), 4796 qstr); 4797 else 4798 (void) fprintf(fp, "\t%s: %s\n", pt_to_str(pnum), qstr); 4799 free(qstr); 4800 } else if (print_notspec) 4801 (void) fprintf(fp, gettext("\t%s not specified\n"), 4802 pt_to_str(pnum)); 4803 } 4804 4805 static void 4806 info_zonename(zone_dochandle_t handle, FILE *fp) 4807 { 4808 char zonename[ZONENAME_MAX]; 4809 4810 if (zonecfg_get_name(handle, zonename, sizeof (zonename)) == Z_OK) 4811 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_ZONENAME), 4812 zonename); 4813 else 4814 (void) fprintf(fp, gettext("%s not specified\n"), 4815 pt_to_str(PT_ZONENAME)); 4816 } 4817 4818 static void 4819 info_zonepath(zone_dochandle_t handle, FILE *fp) 4820 { 4821 char zonepath[MAXPATHLEN]; 4822 4823 if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) == Z_OK) 4824 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_ZONEPATH), 4825 zonepath); 4826 else { 4827 (void) fprintf(fp, gettext("%s not specified\n"), 4828 pt_to_str(PT_ZONEPATH)); 4829 } 4830 } 4831 4832 static void 4833 info_brand(zone_dochandle_t handle, FILE *fp) 4834 { 4835 char brand[MAXNAMELEN]; 4836 4837 if (zonecfg_get_brand(handle, brand, sizeof (brand)) == Z_OK) 4838 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_BRAND), 4839 brand); 4840 else 4841 (void) fprintf(fp, "%s %s\n", pt_to_str(PT_BRAND), 4842 gettext("not specified")); 4843 } 4844 4845 static void 4846 info_autoboot(zone_dochandle_t handle, FILE *fp) 4847 { 4848 boolean_t autoboot; 4849 int err; 4850 4851 if ((err = zonecfg_get_autoboot(handle, &autoboot)) == Z_OK) 4852 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_AUTOBOOT), 4853 autoboot ? "true" : "false"); 4854 else 4855 zone_perror(zone, err, B_TRUE); 4856 } 4857 4858 static void 4859 info_pool(zone_dochandle_t handle, FILE *fp) 4860 { 4861 char pool[MAXNAMELEN]; 4862 int err; 4863 4864 if ((err = zonecfg_get_pool(handle, pool, sizeof (pool))) == Z_OK) 4865 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_POOL), pool); 4866 else 4867 zone_perror(zone, err, B_TRUE); 4868 } 4869 4870 static void 4871 info_limitpriv(zone_dochandle_t handle, FILE *fp) 4872 { 4873 char *limitpriv; 4874 int err; 4875 4876 if ((err = zonecfg_get_limitpriv(handle, &limitpriv)) == Z_OK) { 4877 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_LIMITPRIV), 4878 limitpriv); 4879 free(limitpriv); 4880 } else { 4881 zone_perror(zone, err, B_TRUE); 4882 } 4883 } 4884 4885 static void 4886 info_bootargs(zone_dochandle_t handle, FILE *fp) 4887 { 4888 char bootargs[BOOTARGS_MAX]; 4889 int err; 4890 4891 if ((err = zonecfg_get_bootargs(handle, bootargs, 4892 sizeof (bootargs))) == Z_OK) { 4893 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_BOOTARGS), 4894 bootargs); 4895 } else { 4896 zone_perror(zone, err, B_TRUE); 4897 } 4898 } 4899 4900 static void 4901 info_sched(zone_dochandle_t handle, FILE *fp) 4902 { 4903 char sched[MAXNAMELEN]; 4904 int err; 4905 4906 if ((err = zonecfg_get_sched_class(handle, sched, sizeof (sched))) 4907 == Z_OK) { 4908 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_SCHED), sched); 4909 } else { 4910 zone_perror(zone, err, B_TRUE); 4911 } 4912 } 4913 4914 static void 4915 info_iptype(zone_dochandle_t handle, FILE *fp) 4916 { 4917 zone_iptype_t iptype; 4918 int err; 4919 4920 if ((err = zonecfg_get_iptype(handle, &iptype)) == Z_OK) { 4921 switch (iptype) { 4922 case ZS_SHARED: 4923 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_IPTYPE), 4924 "shared"); 4925 break; 4926 case ZS_EXCLUSIVE: 4927 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_IPTYPE), 4928 "exclusive"); 4929 break; 4930 } 4931 } else { 4932 zone_perror(zone, err, B_TRUE); 4933 } 4934 } 4935 4936 static void 4937 info_hostid(zone_dochandle_t handle, FILE *fp) 4938 { 4939 char hostidp[HW_HOSTID_LEN]; 4940 int err; 4941 4942 if ((err = zonecfg_get_hostid(handle, hostidp, 4943 sizeof (hostidp))) == Z_OK) { 4944 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_HOSTID), hostidp); 4945 } else if (err == Z_BAD_PROPERTY) { 4946 (void) fprintf(fp, "%s: \n", pt_to_str(PT_HOSTID)); 4947 } else { 4948 zone_perror(zone, err, B_TRUE); 4949 } 4950 } 4951 4952 static void 4953 info_fs_allowed(zone_dochandle_t handle, FILE *fp) 4954 { 4955 char fsallowedp[ZONE_FS_ALLOWED_MAX]; 4956 int err; 4957 4958 if ((err = zonecfg_get_fs_allowed(handle, fsallowedp, 4959 sizeof (fsallowedp))) == Z_OK) { 4960 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_FS_ALLOWED), 4961 fsallowedp); 4962 } else if (err == Z_BAD_PROPERTY) { 4963 (void) fprintf(fp, "%s: \n", pt_to_str(PT_FS_ALLOWED)); 4964 } else { 4965 zone_perror(zone, err, B_TRUE); 4966 } 4967 } 4968 4969 static void 4970 output_fs(FILE *fp, struct zone_fstab *fstab) 4971 { 4972 zone_fsopt_t *this; 4973 4974 (void) fprintf(fp, "%s:\n", rt_to_str(RT_FS)); 4975 output_prop(fp, PT_DIR, fstab->zone_fs_dir, B_TRUE); 4976 output_prop(fp, PT_SPECIAL, fstab->zone_fs_special, B_TRUE); 4977 output_prop(fp, PT_RAW, fstab->zone_fs_raw, B_TRUE); 4978 output_prop(fp, PT_TYPE, fstab->zone_fs_type, B_TRUE); 4979 (void) fprintf(fp, "\t%s: [", pt_to_str(PT_OPTIONS)); 4980 for (this = fstab->zone_fs_options; this != NULL; 4981 this = this->zone_fsopt_next) { 4982 if (strchr(this->zone_fsopt_opt, '=')) 4983 (void) fprintf(fp, "\"%s\"", this->zone_fsopt_opt); 4984 else 4985 (void) fprintf(fp, "%s", this->zone_fsopt_opt); 4986 if (this->zone_fsopt_next != NULL) 4987 (void) fprintf(fp, ","); 4988 } 4989 (void) fprintf(fp, "]\n"); 4990 } 4991 4992 static void 4993 info_fs(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 4994 { 4995 struct zone_fstab lookup, user; 4996 boolean_t output = B_FALSE; 4997 4998 if (zonecfg_setfsent(handle) != Z_OK) 4999 return; 5000 while (zonecfg_getfsent(handle, &lookup) == Z_OK) { 5001 if (cmd->cmd_prop_nv_pairs == 0) { 5002 output_fs(fp, &lookup); 5003 goto loopend; 5004 } 5005 if (fill_in_fstab(cmd, &user, B_TRUE) != Z_OK) 5006 goto loopend; 5007 if (strlen(user.zone_fs_dir) > 0 && 5008 strcmp(user.zone_fs_dir, lookup.zone_fs_dir) != 0) 5009 goto loopend; /* no match */ 5010 if (strlen(user.zone_fs_special) > 0 && 5011 strcmp(user.zone_fs_special, lookup.zone_fs_special) != 0) 5012 goto loopend; /* no match */ 5013 if (strlen(user.zone_fs_type) > 0 && 5014 strcmp(user.zone_fs_type, lookup.zone_fs_type) != 0) 5015 goto loopend; /* no match */ 5016 output_fs(fp, &lookup); 5017 output = B_TRUE; 5018 loopend: 5019 zonecfg_free_fs_option_list(lookup.zone_fs_options); 5020 } 5021 (void) zonecfg_endfsent(handle); 5022 /* 5023 * If a property n/v pair was specified, warn the user if there was 5024 * nothing to output. 5025 */ 5026 if (!output && cmd->cmd_prop_nv_pairs > 0) 5027 (void) printf(gettext("No such %s resource.\n"), 5028 rt_to_str(RT_FS)); 5029 } 5030 5031 static void 5032 output_net(FILE *fp, struct zone_nwiftab *nwiftab) 5033 { 5034 (void) fprintf(fp, "%s:\n", rt_to_str(RT_NET)); 5035 output_prop(fp, PT_ADDRESS, nwiftab->zone_nwif_address, B_TRUE); 5036 output_prop(fp, PT_ALLOWED_ADDRESS, 5037 nwiftab->zone_nwif_allowed_address, B_TRUE); 5038 output_prop(fp, PT_PHYSICAL, nwiftab->zone_nwif_physical, B_TRUE); 5039 output_prop(fp, PT_DEFROUTER, nwiftab->zone_nwif_defrouter, B_TRUE); 5040 } 5041 5042 static void 5043 info_net(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 5044 { 5045 struct zone_nwiftab lookup, user; 5046 boolean_t output = B_FALSE; 5047 5048 if (zonecfg_setnwifent(handle) != Z_OK) 5049 return; 5050 while (zonecfg_getnwifent(handle, &lookup) == Z_OK) { 5051 if (cmd->cmd_prop_nv_pairs == 0) { 5052 output_net(fp, &lookup); 5053 continue; 5054 } 5055 if (fill_in_nwiftab(cmd, &user, B_TRUE) != Z_OK) 5056 continue; 5057 if (strlen(user.zone_nwif_physical) > 0 && 5058 strcmp(user.zone_nwif_physical, 5059 lookup.zone_nwif_physical) != 0) 5060 continue; /* no match */ 5061 /* If present make sure it matches */ 5062 if (strlen(user.zone_nwif_address) > 0 && 5063 !zonecfg_same_net_address(user.zone_nwif_address, 5064 lookup.zone_nwif_address)) 5065 continue; /* no match */ 5066 output_net(fp, &lookup); 5067 output = B_TRUE; 5068 } 5069 (void) zonecfg_endnwifent(handle); 5070 /* 5071 * If a property n/v pair was specified, warn the user if there was 5072 * nothing to output. 5073 */ 5074 if (!output && cmd->cmd_prop_nv_pairs > 0) 5075 (void) printf(gettext("No such %s resource.\n"), 5076 rt_to_str(RT_NET)); 5077 } 5078 5079 static void 5080 output_dev(FILE *fp, struct zone_devtab *devtab) 5081 { 5082 (void) fprintf(fp, "%s:\n", rt_to_str(RT_DEVICE)); 5083 output_prop(fp, PT_MATCH, devtab->zone_dev_match, B_TRUE); 5084 } 5085 5086 static void 5087 info_dev(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 5088 { 5089 struct zone_devtab lookup, user; 5090 boolean_t output = B_FALSE; 5091 5092 if (zonecfg_setdevent(handle) != Z_OK) 5093 return; 5094 while (zonecfg_getdevent(handle, &lookup) == Z_OK) { 5095 if (cmd->cmd_prop_nv_pairs == 0) { 5096 output_dev(fp, &lookup); 5097 continue; 5098 } 5099 if (fill_in_devtab(cmd, &user, B_TRUE) != Z_OK) 5100 continue; 5101 if (strlen(user.zone_dev_match) > 0 && 5102 strcmp(user.zone_dev_match, lookup.zone_dev_match) != 0) 5103 continue; /* no match */ 5104 output_dev(fp, &lookup); 5105 output = B_TRUE; 5106 } 5107 (void) zonecfg_enddevent(handle); 5108 /* 5109 * If a property n/v pair was specified, warn the user if there was 5110 * nothing to output. 5111 */ 5112 if (!output && cmd->cmd_prop_nv_pairs > 0) 5113 (void) printf(gettext("No such %s resource.\n"), 5114 rt_to_str(RT_DEVICE)); 5115 } 5116 5117 static void 5118 output_rctl(FILE *fp, struct zone_rctltab *rctltab) 5119 { 5120 struct zone_rctlvaltab *valptr; 5121 5122 (void) fprintf(fp, "%s:\n", rt_to_str(RT_RCTL)); 5123 output_prop(fp, PT_NAME, rctltab->zone_rctl_name, B_TRUE); 5124 for (valptr = rctltab->zone_rctl_valptr; valptr != NULL; 5125 valptr = valptr->zone_rctlval_next) { 5126 fprintf(fp, "\t%s: (%s=%s,%s=%s,%s=%s)\n", 5127 pt_to_str(PT_VALUE), 5128 pt_to_str(PT_PRIV), valptr->zone_rctlval_priv, 5129 pt_to_str(PT_LIMIT), valptr->zone_rctlval_limit, 5130 pt_to_str(PT_ACTION), valptr->zone_rctlval_action); 5131 } 5132 } 5133 5134 static void 5135 info_rctl(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 5136 { 5137 struct zone_rctltab lookup, user; 5138 boolean_t output = B_FALSE; 5139 5140 if (zonecfg_setrctlent(handle) != Z_OK) 5141 return; 5142 while (zonecfg_getrctlent(handle, &lookup) == Z_OK) { 5143 if (cmd->cmd_prop_nv_pairs == 0) { 5144 output_rctl(fp, &lookup); 5145 } else if (fill_in_rctltab(cmd, &user, B_TRUE) == Z_OK && 5146 (strlen(user.zone_rctl_name) == 0 || 5147 strcmp(user.zone_rctl_name, lookup.zone_rctl_name) == 0)) { 5148 output_rctl(fp, &lookup); 5149 output = B_TRUE; 5150 } 5151 zonecfg_free_rctl_value_list(lookup.zone_rctl_valptr); 5152 } 5153 (void) zonecfg_endrctlent(handle); 5154 /* 5155 * If a property n/v pair was specified, warn the user if there was 5156 * nothing to output. 5157 */ 5158 if (!output && cmd->cmd_prop_nv_pairs > 0) 5159 (void) printf(gettext("No such %s resource.\n"), 5160 rt_to_str(RT_RCTL)); 5161 } 5162 5163 static void 5164 output_attr(FILE *fp, struct zone_attrtab *attrtab) 5165 { 5166 (void) fprintf(fp, "%s:\n", rt_to_str(RT_ATTR)); 5167 output_prop(fp, PT_NAME, attrtab->zone_attr_name, B_TRUE); 5168 output_prop(fp, PT_TYPE, attrtab->zone_attr_type, B_TRUE); 5169 output_prop(fp, PT_VALUE, attrtab->zone_attr_value, B_TRUE); 5170 } 5171 5172 static void 5173 info_attr(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 5174 { 5175 struct zone_attrtab lookup, user; 5176 boolean_t output = B_FALSE; 5177 5178 if (zonecfg_setattrent(handle) != Z_OK) 5179 return; 5180 while (zonecfg_getattrent(handle, &lookup) == Z_OK) { 5181 if (cmd->cmd_prop_nv_pairs == 0) { 5182 output_attr(fp, &lookup); 5183 continue; 5184 } 5185 if (fill_in_attrtab(cmd, &user, B_TRUE) != Z_OK) 5186 continue; 5187 if (strlen(user.zone_attr_name) > 0 && 5188 strcmp(user.zone_attr_name, lookup.zone_attr_name) != 0) 5189 continue; /* no match */ 5190 if (strlen(user.zone_attr_type) > 0 && 5191 strcmp(user.zone_attr_type, lookup.zone_attr_type) != 0) 5192 continue; /* no match */ 5193 if (strlen(user.zone_attr_value) > 0 && 5194 strcmp(user.zone_attr_value, lookup.zone_attr_value) != 0) 5195 continue; /* no match */ 5196 output_attr(fp, &lookup); 5197 output = B_TRUE; 5198 } 5199 (void) zonecfg_endattrent(handle); 5200 /* 5201 * If a property n/v pair was specified, warn the user if there was 5202 * nothing to output. 5203 */ 5204 if (!output && cmd->cmd_prop_nv_pairs > 0) 5205 (void) printf(gettext("No such %s resource.\n"), 5206 rt_to_str(RT_ATTR)); 5207 } 5208 5209 static void 5210 output_ds(FILE *fp, struct zone_dstab *dstab) 5211 { 5212 (void) fprintf(fp, "%s:\n", rt_to_str(RT_DATASET)); 5213 output_prop(fp, PT_NAME, dstab->zone_dataset_name, B_TRUE); 5214 } 5215 5216 static void 5217 info_ds(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 5218 { 5219 struct zone_dstab lookup, user; 5220 boolean_t output = B_FALSE; 5221 5222 if (zonecfg_setdsent(handle) != Z_OK) 5223 return; 5224 while (zonecfg_getdsent(handle, &lookup) == Z_OK) { 5225 if (cmd->cmd_prop_nv_pairs == 0) { 5226 output_ds(fp, &lookup); 5227 continue; 5228 } 5229 if (fill_in_dstab(cmd, &user, B_TRUE) != Z_OK) 5230 continue; 5231 if (strlen(user.zone_dataset_name) > 0 && 5232 strcmp(user.zone_dataset_name, 5233 lookup.zone_dataset_name) != 0) 5234 continue; /* no match */ 5235 output_ds(fp, &lookup); 5236 output = B_TRUE; 5237 } 5238 (void) zonecfg_enddsent(handle); 5239 /* 5240 * If a property n/v pair was specified, warn the user if there was 5241 * nothing to output. 5242 */ 5243 if (!output && cmd->cmd_prop_nv_pairs > 0) 5244 (void) printf(gettext("No such %s resource.\n"), 5245 rt_to_str(RT_DATASET)); 5246 } 5247 5248 static void 5249 output_pset(FILE *fp, struct zone_psettab *psettab) 5250 { 5251 (void) fprintf(fp, "%s:\n", rt_to_str(RT_DCPU)); 5252 if (strcmp(psettab->zone_ncpu_min, psettab->zone_ncpu_max) == 0) 5253 (void) fprintf(fp, "\t%s: %s\n", pt_to_str(PT_NCPUS), 5254 psettab->zone_ncpu_max); 5255 else 5256 (void) fprintf(fp, "\t%s: %s-%s\n", pt_to_str(PT_NCPUS), 5257 psettab->zone_ncpu_min, psettab->zone_ncpu_max); 5258 if (psettab->zone_importance[0] != '\0') 5259 (void) fprintf(fp, "\t%s: %s\n", pt_to_str(PT_IMPORTANCE), 5260 psettab->zone_importance); 5261 } 5262 5263 static void 5264 info_pset(zone_dochandle_t handle, FILE *fp) 5265 { 5266 struct zone_psettab lookup; 5267 5268 if (zonecfg_getpsetent(handle, &lookup) == Z_OK) 5269 output_pset(fp, &lookup); 5270 } 5271 5272 static void 5273 output_pcap(FILE *fp) 5274 { 5275 uint64_t cap; 5276 5277 if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &cap) == Z_OK) { 5278 float scaled = (float)cap / 100; 5279 (void) fprintf(fp, "%s:\n", rt_to_str(RT_PCAP)); 5280 (void) fprintf(fp, "\t[%s: %.2f]\n", pt_to_str(PT_NCPUS), 5281 scaled); 5282 } 5283 } 5284 5285 static void 5286 info_pcap(FILE *fp) 5287 { 5288 output_pcap(fp); 5289 } 5290 5291 5292 static void 5293 info_aliased_rctl(zone_dochandle_t handle, FILE *fp, char *alias) 5294 { 5295 uint64_t limit; 5296 5297 if (zonecfg_get_aliased_rctl(handle, alias, &limit) == Z_OK) { 5298 /* convert memory based properties */ 5299 if (strcmp(alias, ALIAS_MAXSHMMEM) == 0) { 5300 char buf[128]; 5301 5302 (void) snprintf(buf, sizeof (buf), "%llu", limit); 5303 bytes_to_units(buf, buf, sizeof (buf)); 5304 (void) fprintf(fp, "[%s: %s]\n", alias, buf); 5305 return; 5306 } 5307 5308 (void) fprintf(fp, "[%s: %llu]\n", alias, limit); 5309 } 5310 } 5311 5312 static void 5313 bytes_to_units(char *str, char *buf, int bufsize) 5314 { 5315 unsigned long long num; 5316 unsigned long long save = 0; 5317 char *units = "BKMGT"; 5318 char *up = units; 5319 5320 num = strtoll(str, NULL, 10); 5321 5322 if (num < 1024) { 5323 (void) snprintf(buf, bufsize, "%llu", num); 5324 return; 5325 } 5326 5327 while ((num >= 1024) && (*up != 'T')) { 5328 up++; /* next unit of measurement */ 5329 save = num; 5330 num = (num + 512) >> 10; 5331 } 5332 5333 /* check if we should output a fraction. snprintf will round for us */ 5334 if (save % 1024 != 0 && ((save >> 10) < 10)) 5335 (void) snprintf(buf, bufsize, "%2.1f%c", ((float)save / 1024), 5336 *up); 5337 else 5338 (void) snprintf(buf, bufsize, "%llu%c", num, *up); 5339 } 5340 5341 static void 5342 output_mcap(FILE *fp, struct zone_mcaptab *mcaptab, int showswap, 5343 uint64_t maxswap, int showlocked, uint64_t maxlocked) 5344 { 5345 char buf[128]; 5346 5347 (void) fprintf(fp, "%s:\n", rt_to_str(RT_MCAP)); 5348 if (mcaptab->zone_physmem_cap[0] != '\0') { 5349 bytes_to_units(mcaptab->zone_physmem_cap, buf, sizeof (buf)); 5350 output_prop(fp, PT_PHYSICAL, buf, B_TRUE); 5351 } 5352 5353 if (showswap == Z_OK) { 5354 (void) snprintf(buf, sizeof (buf), "%llu", maxswap); 5355 bytes_to_units(buf, buf, sizeof (buf)); 5356 output_prop(fp, PT_SWAP, buf, B_TRUE); 5357 } 5358 5359 if (showlocked == Z_OK) { 5360 (void) snprintf(buf, sizeof (buf), "%llu", maxlocked); 5361 bytes_to_units(buf, buf, sizeof (buf)); 5362 output_prop(fp, PT_LOCKED, buf, B_TRUE); 5363 } 5364 } 5365 5366 static void 5367 info_mcap(zone_dochandle_t handle, FILE *fp) 5368 { 5369 int res1, res2, res3; 5370 uint64_t swap_limit; 5371 uint64_t locked_limit; 5372 struct zone_mcaptab lookup; 5373 5374 bzero(&lookup, sizeof (lookup)); 5375 res1 = zonecfg_getmcapent(handle, &lookup); 5376 res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &swap_limit); 5377 res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, 5378 &locked_limit); 5379 5380 if (res1 == Z_OK || res2 == Z_OK || res3 == Z_OK) 5381 output_mcap(fp, &lookup, res2, swap_limit, res3, locked_limit); 5382 } 5383 5384 static void 5385 output_auth(FILE *fp, struct zone_admintab *admintab) 5386 { 5387 (void) fprintf(fp, "%s:\n", rt_to_str(RT_ADMIN)); 5388 output_prop(fp, PT_USER, admintab->zone_admin_user, B_TRUE); 5389 output_prop(fp, PT_AUTHS, admintab->zone_admin_auths, B_TRUE); 5390 } 5391 5392 static void 5393 info_auth(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 5394 { 5395 struct zone_admintab lookup, user; 5396 boolean_t output = B_FALSE; 5397 int err; 5398 5399 if ((err = zonecfg_setadminent(handle)) != Z_OK) { 5400 zone_perror(zone, err, B_TRUE); 5401 return; 5402 } 5403 while (zonecfg_getadminent(handle, &lookup) == Z_OK) { 5404 if (cmd->cmd_prop_nv_pairs == 0) { 5405 output_auth(fp, &lookup); 5406 continue; 5407 } 5408 if (fill_in_admintab(cmd, &user, B_TRUE) != Z_OK) 5409 continue; 5410 if (strlen(user.zone_admin_user) > 0 && 5411 strcmp(user.zone_admin_user, lookup.zone_admin_user) != 0) 5412 continue; /* no match */ 5413 output_auth(fp, &lookup); 5414 output = B_TRUE; 5415 } 5416 (void) zonecfg_endadminent(handle); 5417 /* 5418 * If a property n/v pair was specified, warn the user if there was 5419 * nothing to output. 5420 */ 5421 if (!output && cmd->cmd_prop_nv_pairs > 0) 5422 (void) printf(gettext("No such %s resource.\n"), 5423 rt_to_str(RT_ADMIN)); 5424 } 5425 5426 void 5427 info_func(cmd_t *cmd) 5428 { 5429 FILE *fp = stdout; 5430 boolean_t need_to_close = B_FALSE; 5431 int type; 5432 int res1, res2; 5433 uint64_t swap_limit; 5434 uint64_t locked_limit; 5435 5436 assert(cmd != NULL); 5437 5438 if (initialize(B_TRUE) != Z_OK) 5439 return; 5440 5441 /* don't page error output */ 5442 if (interactive_mode) { 5443 if ((fp = pager_open()) != NULL) 5444 need_to_close = B_TRUE; 5445 else 5446 fp = stdout; 5447 5448 setbuf(fp, NULL); 5449 } 5450 5451 if (!global_scope) { 5452 switch (resource_scope) { 5453 case RT_FS: 5454 output_fs(fp, &in_progress_fstab); 5455 break; 5456 case RT_NET: 5457 output_net(fp, &in_progress_nwiftab); 5458 break; 5459 case RT_DEVICE: 5460 output_dev(fp, &in_progress_devtab); 5461 break; 5462 case RT_RCTL: 5463 output_rctl(fp, &in_progress_rctltab); 5464 break; 5465 case RT_ATTR: 5466 output_attr(fp, &in_progress_attrtab); 5467 break; 5468 case RT_DATASET: 5469 output_ds(fp, &in_progress_dstab); 5470 break; 5471 case RT_DCPU: 5472 output_pset(fp, &in_progress_psettab); 5473 break; 5474 case RT_PCAP: 5475 output_pcap(fp); 5476 break; 5477 case RT_MCAP: 5478 res1 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, 5479 &swap_limit); 5480 res2 = zonecfg_get_aliased_rctl(handle, 5481 ALIAS_MAXLOCKEDMEM, &locked_limit); 5482 output_mcap(fp, &in_progress_mcaptab, res1, swap_limit, 5483 res2, locked_limit); 5484 break; 5485 case RT_ADMIN: 5486 output_auth(fp, &in_progress_admintab); 5487 break; 5488 } 5489 goto cleanup; 5490 } 5491 5492 type = cmd->cmd_res_type; 5493 5494 if (gz_invalid_rt_property(type)) { 5495 zerr(gettext("%s is not a valid property for the global zone."), 5496 rt_to_str(type)); 5497 goto cleanup; 5498 } 5499 5500 if (gz_invalid_resource(type)) { 5501 zerr(gettext("%s is not a valid resource for the global zone."), 5502 rt_to_str(type)); 5503 goto cleanup; 5504 } 5505 5506 switch (cmd->cmd_res_type) { 5507 case RT_UNKNOWN: 5508 info_zonename(handle, fp); 5509 if (!global_zone) { 5510 info_zonepath(handle, fp); 5511 info_brand(handle, fp); 5512 info_autoboot(handle, fp); 5513 info_bootargs(handle, fp); 5514 } 5515 info_pool(handle, fp); 5516 if (!global_zone) { 5517 info_limitpriv(handle, fp); 5518 info_sched(handle, fp); 5519 info_iptype(handle, fp); 5520 info_hostid(handle, fp); 5521 info_fs_allowed(handle, fp); 5522 } 5523 info_aliased_rctl(handle, fp, ALIAS_MAXLWPS); 5524 info_aliased_rctl(handle, fp, ALIAS_MAXPROCS); 5525 info_aliased_rctl(handle, fp, ALIAS_MAXSHMMEM); 5526 info_aliased_rctl(handle, fp, ALIAS_MAXSHMIDS); 5527 info_aliased_rctl(handle, fp, ALIAS_MAXMSGIDS); 5528 info_aliased_rctl(handle, fp, ALIAS_MAXSEMIDS); 5529 info_aliased_rctl(handle, fp, ALIAS_SHARES); 5530 if (!global_zone) { 5531 info_fs(handle, fp, cmd); 5532 info_net(handle, fp, cmd); 5533 info_dev(handle, fp, cmd); 5534 } 5535 info_pset(handle, fp); 5536 info_pcap(fp); 5537 info_mcap(handle, fp); 5538 if (!global_zone) { 5539 info_attr(handle, fp, cmd); 5540 info_ds(handle, fp, cmd); 5541 info_auth(handle, fp, cmd); 5542 } 5543 info_rctl(handle, fp, cmd); 5544 break; 5545 case RT_ZONENAME: 5546 info_zonename(handle, fp); 5547 break; 5548 case RT_ZONEPATH: 5549 info_zonepath(handle, fp); 5550 break; 5551 case RT_BRAND: 5552 info_brand(handle, fp); 5553 break; 5554 case RT_AUTOBOOT: 5555 info_autoboot(handle, fp); 5556 break; 5557 case RT_POOL: 5558 info_pool(handle, fp); 5559 break; 5560 case RT_LIMITPRIV: 5561 info_limitpriv(handle, fp); 5562 break; 5563 case RT_BOOTARGS: 5564 info_bootargs(handle, fp); 5565 break; 5566 case RT_SCHED: 5567 info_sched(handle, fp); 5568 break; 5569 case RT_IPTYPE: 5570 info_iptype(handle, fp); 5571 break; 5572 case RT_MAXLWPS: 5573 info_aliased_rctl(handle, fp, ALIAS_MAXLWPS); 5574 break; 5575 case RT_MAXPROCS: 5576 info_aliased_rctl(handle, fp, ALIAS_MAXPROCS); 5577 break; 5578 case RT_MAXSHMMEM: 5579 info_aliased_rctl(handle, fp, ALIAS_MAXSHMMEM); 5580 break; 5581 case RT_MAXSHMIDS: 5582 info_aliased_rctl(handle, fp, ALIAS_MAXSHMIDS); 5583 break; 5584 case RT_MAXMSGIDS: 5585 info_aliased_rctl(handle, fp, ALIAS_MAXMSGIDS); 5586 break; 5587 case RT_MAXSEMIDS: 5588 info_aliased_rctl(handle, fp, ALIAS_MAXSEMIDS); 5589 break; 5590 case RT_SHARES: 5591 info_aliased_rctl(handle, fp, ALIAS_SHARES); 5592 break; 5593 case RT_FS: 5594 info_fs(handle, fp, cmd); 5595 break; 5596 case RT_NET: 5597 info_net(handle, fp, cmd); 5598 break; 5599 case RT_DEVICE: 5600 info_dev(handle, fp, cmd); 5601 break; 5602 case RT_RCTL: 5603 info_rctl(handle, fp, cmd); 5604 break; 5605 case RT_ATTR: 5606 info_attr(handle, fp, cmd); 5607 break; 5608 case RT_DATASET: 5609 info_ds(handle, fp, cmd); 5610 break; 5611 case RT_DCPU: 5612 info_pset(handle, fp); 5613 break; 5614 case RT_PCAP: 5615 info_pcap(fp); 5616 break; 5617 case RT_MCAP: 5618 info_mcap(handle, fp); 5619 break; 5620 case RT_HOSTID: 5621 info_hostid(handle, fp); 5622 break; 5623 case RT_ADMIN: 5624 info_auth(handle, fp, cmd); 5625 break; 5626 case RT_FS_ALLOWED: 5627 info_fs_allowed(handle, fp); 5628 break; 5629 default: 5630 zone_perror(rt_to_str(cmd->cmd_res_type), Z_NO_RESOURCE_TYPE, 5631 B_TRUE); 5632 } 5633 5634 cleanup: 5635 if (need_to_close) 5636 (void) pager_close(fp); 5637 } 5638 5639 /* 5640 * Helper function for verify-- checks that a required string property 5641 * exists. 5642 */ 5643 static void 5644 check_reqd_prop(char *attr, int rt, int pt, int *ret_val) 5645 { 5646 if (strlen(attr) == 0) { 5647 zerr(gettext("%s: %s not specified"), rt_to_str(rt), 5648 pt_to_str(pt)); 5649 saw_error = B_TRUE; 5650 if (*ret_val == Z_OK) 5651 *ret_val = Z_REQD_PROPERTY_MISSING; 5652 } 5653 } 5654 5655 static int 5656 do_subproc(char *cmdbuf) 5657 { 5658 char inbuf[MAX_CMD_LEN]; 5659 FILE *file; 5660 int status; 5661 5662 file = popen(cmdbuf, "r"); 5663 if (file == NULL) { 5664 zerr(gettext("Could not launch: %s"), cmdbuf); 5665 return (-1); 5666 } 5667 5668 while (fgets(inbuf, sizeof (inbuf), file) != NULL) 5669 fprintf(stderr, "%s", inbuf); 5670 status = pclose(file); 5671 5672 if (WIFSIGNALED(status)) { 5673 zerr(gettext("%s unexpectedly terminated due to signal %d"), 5674 cmdbuf, WTERMSIG(status)); 5675 return (-1); 5676 } 5677 assert(WIFEXITED(status)); 5678 return (WEXITSTATUS(status)); 5679 } 5680 5681 static int 5682 brand_verify(zone_dochandle_t handle) 5683 { 5684 char xml_file[32]; 5685 char cmdbuf[MAX_CMD_LEN]; 5686 brand_handle_t bh; 5687 char brand[MAXNAMELEN]; 5688 int err; 5689 5690 if (zonecfg_get_brand(handle, brand, sizeof (brand)) != Z_OK) { 5691 zerr("%s: %s\n", zone, gettext("could not get zone brand")); 5692 return (Z_INVALID_DOCUMENT); 5693 } 5694 if ((bh = brand_open(brand)) == NULL) { 5695 zerr("%s: %s\n", zone, gettext("unknown brand.")); 5696 return (Z_INVALID_DOCUMENT); 5697 } 5698 5699 /* 5700 * Fetch the verify command, if any, from the brand configuration 5701 * and build the command line to execute it. 5702 */ 5703 strcpy(cmdbuf, EXEC_PREFIX); 5704 err = brand_get_verify_cfg(bh, cmdbuf + EXEC_LEN, 5705 sizeof (cmdbuf) - (EXEC_LEN + (strlen(xml_file) + 1))); 5706 brand_close(bh); 5707 if (err != Z_OK) { 5708 zerr("%s: %s\n", zone, 5709 gettext("could not get brand verification command")); 5710 return (Z_INVALID_DOCUMENT); 5711 } 5712 5713 /* 5714 * If the brand doesn't provide a verification routine, we just 5715 * return success. 5716 */ 5717 if (strlen(cmdbuf) == EXEC_LEN) 5718 return (Z_OK); 5719 5720 /* 5721 * Dump the current config information for this zone to a file. 5722 */ 5723 strcpy(xml_file, "/tmp/zonecfg_verify.XXXXXX"); 5724 if (mkstemp(xml_file) == NULL) 5725 return (Z_TEMP_FILE); 5726 if ((err = zonecfg_verify_save(handle, xml_file)) != Z_OK) { 5727 (void) unlink(xml_file); 5728 return (err); 5729 } 5730 5731 /* 5732 * Execute the verification command. 5733 */ 5734 if ((strlcat(cmdbuf, " ", MAX_CMD_LEN) >= MAX_CMD_LEN) || 5735 (strlcat(cmdbuf, xml_file, MAX_CMD_LEN) >= MAX_CMD_LEN)) { 5736 err = Z_BRAND_ERROR; 5737 } else { 5738 err = do_subproc(cmdbuf); 5739 } 5740 5741 (void) unlink(xml_file); 5742 return ((err == Z_OK) ? Z_OK : Z_BRAND_ERROR); 5743 } 5744 5745 /* 5746 * Track the network interfaces listed in zonecfg(1m) in a linked list 5747 * so that we can later check that defrouter is specified for an exclusive IP 5748 * zone if and only if at least one allowed-address has been specified. 5749 */ 5750 static boolean_t 5751 add_nwif(struct zone_nwiftab *nwif) 5752 { 5753 struct xif *tmp; 5754 5755 for (tmp = xif; tmp != NULL; tmp = tmp->xif_next) { 5756 if (strcmp(tmp->xif_name, nwif->zone_nwif_physical) == 0) { 5757 if (strlen(nwif->zone_nwif_allowed_address) > 0) 5758 tmp->xif_has_address = B_TRUE; 5759 if (strlen(nwif->zone_nwif_defrouter) > 0) 5760 tmp->xif_has_defrouter = B_TRUE; 5761 return (B_TRUE); 5762 } 5763 } 5764 5765 tmp = malloc(sizeof (*tmp)); 5766 if (tmp == NULL) { 5767 zerr(gettext("memory allocation failed for %s"), 5768 nwif->zone_nwif_physical); 5769 return (B_FALSE); 5770 } 5771 strlcpy(tmp->xif_name, nwif->zone_nwif_physical, 5772 sizeof (tmp->xif_name)); 5773 tmp->xif_has_defrouter = (strlen(nwif->zone_nwif_defrouter) > 0); 5774 tmp->xif_has_address = (strlen(nwif->zone_nwif_allowed_address) > 0); 5775 tmp->xif_next = xif; 5776 xif = tmp; 5777 return (B_TRUE); 5778 } 5779 5780 /* 5781 * See the DTD for which attributes are required for which resources. 5782 * 5783 * This function can be called by commit_func(), which needs to save things, 5784 * in addition to the general call from parse_and_run(), which doesn't need 5785 * things saved. Since the parameters are standardized, we distinguish by 5786 * having commit_func() call here with cmd->cmd_arg set to "save" to indicate 5787 * that a save is needed. 5788 */ 5789 void 5790 verify_func(cmd_t *cmd) 5791 { 5792 struct zone_nwiftab nwiftab; 5793 struct zone_fstab fstab; 5794 struct zone_attrtab attrtab; 5795 struct zone_rctltab rctltab; 5796 struct zone_dstab dstab; 5797 struct zone_psettab psettab; 5798 struct zone_admintab admintab; 5799 char zonepath[MAXPATHLEN]; 5800 char sched[MAXNAMELEN]; 5801 char brand[MAXNAMELEN]; 5802 char hostidp[HW_HOSTID_LEN]; 5803 char fsallowedp[ZONE_FS_ALLOWED_MAX]; 5804 priv_set_t *privs; 5805 char *privname = NULL; 5806 int err, ret_val = Z_OK, arg; 5807 int pset_res; 5808 boolean_t save = B_FALSE; 5809 boolean_t arg_err = B_FALSE; 5810 zone_iptype_t iptype; 5811 boolean_t has_cpu_shares = B_FALSE; 5812 boolean_t has_cpu_cap = B_FALSE; 5813 struct xif *tmp; 5814 5815 optind = 0; 5816 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 5817 switch (arg) { 5818 case '?': 5819 longer_usage(CMD_VERIFY); 5820 arg_err = B_TRUE; 5821 break; 5822 default: 5823 short_usage(CMD_VERIFY); 5824 arg_err = B_TRUE; 5825 break; 5826 } 5827 } 5828 if (arg_err) 5829 return; 5830 5831 if (optind > cmd->cmd_argc) { 5832 short_usage(CMD_VERIFY); 5833 return; 5834 } 5835 5836 if (zone_is_read_only(CMD_VERIFY)) 5837 return; 5838 5839 assert(cmd != NULL); 5840 5841 if (cmd->cmd_argc > 0 && (strcmp(cmd->cmd_argv[0], "save") == 0)) 5842 save = B_TRUE; 5843 if (initialize(B_TRUE) != Z_OK) 5844 return; 5845 5846 if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) != Z_OK && 5847 !global_zone) { 5848 zerr(gettext("%s not specified"), pt_to_str(PT_ZONEPATH)); 5849 ret_val = Z_REQD_RESOURCE_MISSING; 5850 saw_error = B_TRUE; 5851 } 5852 if (strlen(zonepath) == 0 && !global_zone) { 5853 zerr(gettext("%s cannot be empty."), pt_to_str(PT_ZONEPATH)); 5854 ret_val = Z_REQD_RESOURCE_MISSING; 5855 saw_error = B_TRUE; 5856 } 5857 5858 if ((err = zonecfg_get_brand(handle, brand, sizeof (brand))) != Z_OK) { 5859 zone_perror(zone, err, B_TRUE); 5860 return; 5861 } 5862 if ((err = brand_verify(handle)) != Z_OK) { 5863 zone_perror(zone, err, B_TRUE); 5864 return; 5865 } 5866 5867 if (zonecfg_get_iptype(handle, &iptype) != Z_OK) { 5868 zerr("%s %s", gettext("cannot get"), pt_to_str(PT_IPTYPE)); 5869 ret_val = Z_REQD_RESOURCE_MISSING; 5870 saw_error = B_TRUE; 5871 } 5872 5873 if ((privs = priv_allocset()) == NULL) { 5874 zerr(gettext("%s: priv_allocset failed"), zone); 5875 return; 5876 } 5877 if (zonecfg_get_privset(handle, privs, &privname) != Z_OK) { 5878 zerr(gettext("%s: invalid privilege: %s"), zone, privname); 5879 priv_freeset(privs); 5880 free(privname); 5881 return; 5882 } 5883 priv_freeset(privs); 5884 5885 if (zonecfg_get_hostid(handle, hostidp, 5886 sizeof (hostidp)) == Z_INVALID_PROPERTY) { 5887 zerr(gettext("%s: invalid hostid: %s"), 5888 zone, hostidp); 5889 return; 5890 } 5891 5892 if (zonecfg_get_fs_allowed(handle, fsallowedp, 5893 sizeof (fsallowedp)) == Z_INVALID_PROPERTY) { 5894 zerr(gettext("%s: invalid fs-allowed: %s"), 5895 zone, fsallowedp); 5896 return; 5897 } 5898 5899 if ((err = zonecfg_setfsent(handle)) != Z_OK) { 5900 zone_perror(zone, err, B_TRUE); 5901 return; 5902 } 5903 while (zonecfg_getfsent(handle, &fstab) == Z_OK) { 5904 check_reqd_prop(fstab.zone_fs_dir, RT_FS, PT_DIR, &ret_val); 5905 check_reqd_prop(fstab.zone_fs_special, RT_FS, PT_SPECIAL, 5906 &ret_val); 5907 check_reqd_prop(fstab.zone_fs_type, RT_FS, PT_TYPE, &ret_val); 5908 5909 zonecfg_free_fs_option_list(fstab.zone_fs_options); 5910 } 5911 (void) zonecfg_endfsent(handle); 5912 5913 if ((err = zonecfg_setnwifent(handle)) != Z_OK) { 5914 zone_perror(zone, err, B_TRUE); 5915 return; 5916 } 5917 while (zonecfg_getnwifent(handle, &nwiftab) == Z_OK) { 5918 /* 5919 * physical is required in all cases. 5920 * A shared IP requires an address, 5921 * and may include a default router, while 5922 * an exclusive IP must have neither an address 5923 * nor a default router. 5924 * The physical interface name must be valid in all cases. 5925 */ 5926 check_reqd_prop(nwiftab.zone_nwif_physical, RT_NET, 5927 PT_PHYSICAL, &ret_val); 5928 if (validate_net_physical_syntax(nwiftab.zone_nwif_physical) != 5929 Z_OK) { 5930 saw_error = B_TRUE; 5931 if (ret_val == Z_OK) 5932 ret_val = Z_INVAL; 5933 } 5934 5935 switch (iptype) { 5936 case ZS_SHARED: 5937 check_reqd_prop(nwiftab.zone_nwif_address, RT_NET, 5938 PT_ADDRESS, &ret_val); 5939 if (strlen(nwiftab.zone_nwif_allowed_address) > 0) { 5940 zerr(gettext("%s: %s cannot be specified " 5941 "for a shared IP type"), 5942 rt_to_str(RT_NET), 5943 pt_to_str(PT_ALLOWED_ADDRESS)); 5944 saw_error = B_TRUE; 5945 if (ret_val == Z_OK) 5946 ret_val = Z_INVAL; 5947 } 5948 break; 5949 case ZS_EXCLUSIVE: 5950 if (strlen(nwiftab.zone_nwif_address) > 0) { 5951 zerr(gettext("%s: %s cannot be specified " 5952 "for an exclusive IP type"), 5953 rt_to_str(RT_NET), pt_to_str(PT_ADDRESS)); 5954 saw_error = B_TRUE; 5955 if (ret_val == Z_OK) 5956 ret_val = Z_INVAL; 5957 } else { 5958 if (!add_nwif(&nwiftab)) { 5959 saw_error = B_TRUE; 5960 if (ret_val == Z_OK) 5961 ret_val = Z_INVAL; 5962 } 5963 } 5964 break; 5965 } 5966 } 5967 for (tmp = xif; tmp != NULL; tmp = tmp->xif_next) { 5968 if (!tmp->xif_has_address && tmp->xif_has_defrouter) { 5969 zerr(gettext("%s: %s for %s cannot be specified " 5970 "without %s for an exclusive IP type"), 5971 rt_to_str(RT_NET), pt_to_str(PT_DEFROUTER), 5972 tmp->xif_name, pt_to_str(PT_ALLOWED_ADDRESS)); 5973 saw_error = B_TRUE; 5974 ret_val = Z_INVAL; 5975 } 5976 } 5977 free(xif); 5978 xif = NULL; 5979 (void) zonecfg_endnwifent(handle); 5980 5981 if ((err = zonecfg_setrctlent(handle)) != Z_OK) { 5982 zone_perror(zone, err, B_TRUE); 5983 return; 5984 } 5985 while (zonecfg_getrctlent(handle, &rctltab) == Z_OK) { 5986 check_reqd_prop(rctltab.zone_rctl_name, RT_RCTL, PT_NAME, 5987 &ret_val); 5988 5989 if (strcmp(rctltab.zone_rctl_name, "zone.cpu-shares") == 0) 5990 has_cpu_shares = B_TRUE; 5991 5992 if (strcmp(rctltab.zone_rctl_name, "zone.cpu-cap") == 0) 5993 has_cpu_cap = B_TRUE; 5994 5995 if (rctltab.zone_rctl_valptr == NULL) { 5996 zerr(gettext("%s: no %s specified"), 5997 rt_to_str(RT_RCTL), pt_to_str(PT_VALUE)); 5998 saw_error = B_TRUE; 5999 if (ret_val == Z_OK) 6000 ret_val = Z_REQD_PROPERTY_MISSING; 6001 } else { 6002 zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr); 6003 } 6004 } 6005 (void) zonecfg_endrctlent(handle); 6006 6007 if ((pset_res = zonecfg_lookup_pset(handle, &psettab)) == Z_OK && 6008 has_cpu_shares) { 6009 zerr(gettext("%s zone.cpu-shares and %s are incompatible."), 6010 rt_to_str(RT_RCTL), rt_to_str(RT_DCPU)); 6011 saw_error = B_TRUE; 6012 if (ret_val == Z_OK) 6013 ret_val = Z_INCOMPATIBLE; 6014 } 6015 6016 if (has_cpu_shares && zonecfg_get_sched_class(handle, sched, 6017 sizeof (sched)) == Z_OK && strlen(sched) > 0 && 6018 strcmp(sched, "FSS") != 0) { 6019 zerr(gettext("WARNING: %s zone.cpu-shares and %s=%s are " 6020 "incompatible"), 6021 rt_to_str(RT_RCTL), rt_to_str(RT_SCHED), sched); 6022 saw_error = B_TRUE; 6023 if (ret_val == Z_OK) 6024 ret_val = Z_INCOMPATIBLE; 6025 } 6026 6027 if (pset_res == Z_OK && has_cpu_cap) { 6028 zerr(gettext("%s zone.cpu-cap and the %s are incompatible."), 6029 rt_to_str(RT_RCTL), rt_to_str(RT_DCPU)); 6030 saw_error = B_TRUE; 6031 if (ret_val == Z_OK) 6032 ret_val = Z_INCOMPATIBLE; 6033 } 6034 6035 if ((err = zonecfg_setattrent(handle)) != Z_OK) { 6036 zone_perror(zone, err, B_TRUE); 6037 return; 6038 } 6039 while (zonecfg_getattrent(handle, &attrtab) == Z_OK) { 6040 check_reqd_prop(attrtab.zone_attr_name, RT_ATTR, PT_NAME, 6041 &ret_val); 6042 check_reqd_prop(attrtab.zone_attr_type, RT_ATTR, PT_TYPE, 6043 &ret_val); 6044 check_reqd_prop(attrtab.zone_attr_value, RT_ATTR, PT_VALUE, 6045 &ret_val); 6046 } 6047 (void) zonecfg_endattrent(handle); 6048 6049 if ((err = zonecfg_setdsent(handle)) != Z_OK) { 6050 zone_perror(zone, err, B_TRUE); 6051 return; 6052 } 6053 while (zonecfg_getdsent(handle, &dstab) == Z_OK) { 6054 if (strlen(dstab.zone_dataset_name) == 0) { 6055 zerr("%s: %s %s", rt_to_str(RT_DATASET), 6056 pt_to_str(PT_NAME), gettext("not specified")); 6057 saw_error = B_TRUE; 6058 if (ret_val == Z_OK) 6059 ret_val = Z_REQD_PROPERTY_MISSING; 6060 } else if (!zfs_name_valid(dstab.zone_dataset_name, 6061 ZFS_TYPE_FILESYSTEM)) { 6062 zerr("%s: %s %s", rt_to_str(RT_DATASET), 6063 pt_to_str(PT_NAME), gettext("invalid")); 6064 saw_error = B_TRUE; 6065 if (ret_val == Z_OK) 6066 ret_val = Z_BAD_PROPERTY; 6067 } 6068 6069 } 6070 (void) zonecfg_enddsent(handle); 6071 6072 if ((err = zonecfg_setadminent(handle)) != Z_OK) { 6073 zone_perror(zone, err, B_TRUE); 6074 return; 6075 } 6076 while (zonecfg_getadminent(handle, &admintab) == Z_OK) { 6077 check_reqd_prop(admintab.zone_admin_user, RT_ADMIN, 6078 PT_USER, &ret_val); 6079 check_reqd_prop(admintab.zone_admin_auths, RT_ADMIN, 6080 PT_AUTHS, &ret_val); 6081 if ((ret_val == Z_OK) && (getpwnam(admintab.zone_admin_user) 6082 == NULL)) { 6083 zerr(gettext("%s %s is not a valid username"), 6084 pt_to_str(PT_USER), 6085 admintab.zone_admin_user); 6086 ret_val = Z_BAD_PROPERTY; 6087 } 6088 if ((ret_val == Z_OK) && (!zonecfg_valid_auths( 6089 admintab.zone_admin_auths, zone))) { 6090 ret_val = Z_BAD_PROPERTY; 6091 } 6092 } 6093 (void) zonecfg_endadminent(handle); 6094 6095 if (!global_scope) { 6096 zerr(gettext("resource specification incomplete")); 6097 saw_error = B_TRUE; 6098 if (ret_val == Z_OK) 6099 ret_val = Z_INSUFFICIENT_SPEC; 6100 } 6101 6102 if (save) { 6103 if (ret_val == Z_OK) { 6104 if ((ret_val = zonecfg_save(handle)) == Z_OK) { 6105 need_to_commit = B_FALSE; 6106 (void) strlcpy(revert_zone, zone, 6107 sizeof (revert_zone)); 6108 } 6109 } else { 6110 zerr(gettext("Zone %s failed to verify"), zone); 6111 } 6112 } 6113 if (ret_val != Z_OK) 6114 zone_perror(zone, ret_val, B_TRUE); 6115 } 6116 6117 void 6118 cancel_func(cmd_t *cmd) 6119 { 6120 int arg; 6121 boolean_t arg_err = B_FALSE; 6122 6123 assert(cmd != NULL); 6124 6125 optind = 0; 6126 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 6127 switch (arg) { 6128 case '?': 6129 longer_usage(CMD_CANCEL); 6130 arg_err = B_TRUE; 6131 break; 6132 default: 6133 short_usage(CMD_CANCEL); 6134 arg_err = B_TRUE; 6135 break; 6136 } 6137 } 6138 if (arg_err) 6139 return; 6140 6141 if (optind != cmd->cmd_argc) { 6142 short_usage(CMD_CANCEL); 6143 return; 6144 } 6145 6146 if (global_scope) 6147 scope_usage(CMD_CANCEL); 6148 global_scope = B_TRUE; 6149 zonecfg_free_fs_option_list(in_progress_fstab.zone_fs_options); 6150 bzero(&in_progress_fstab, sizeof (in_progress_fstab)); 6151 bzero(&in_progress_nwiftab, sizeof (in_progress_nwiftab)); 6152 bzero(&in_progress_devtab, sizeof (in_progress_devtab)); 6153 zonecfg_free_rctl_value_list(in_progress_rctltab.zone_rctl_valptr); 6154 bzero(&in_progress_rctltab, sizeof (in_progress_rctltab)); 6155 bzero(&in_progress_attrtab, sizeof (in_progress_attrtab)); 6156 bzero(&in_progress_dstab, sizeof (in_progress_dstab)); 6157 } 6158 6159 static int 6160 validate_attr_name(char *name) 6161 { 6162 int i; 6163 6164 if (!isalnum(name[0])) { 6165 zerr(gettext("Invalid %s %s %s: must start with an alpha-" 6166 "numeric character."), rt_to_str(RT_ATTR), 6167 pt_to_str(PT_NAME), name); 6168 return (Z_INVAL); 6169 } 6170 for (i = 1; name[i]; i++) 6171 if (!isalnum(name[i]) && name[i] != '-' && name[i] != '.') { 6172 zerr(gettext("Invalid %s %s %s: can only contain " 6173 "alpha-numeric characters, plus '-' and '.'."), 6174 rt_to_str(RT_ATTR), pt_to_str(PT_NAME), name); 6175 return (Z_INVAL); 6176 } 6177 return (Z_OK); 6178 } 6179 6180 static int 6181 validate_attr_type_val(struct zone_attrtab *attrtab) 6182 { 6183 boolean_t boolval; 6184 int64_t intval; 6185 char strval[MAXNAMELEN]; 6186 uint64_t uintval; 6187 6188 if (strcmp(attrtab->zone_attr_type, "boolean") == 0) { 6189 if (zonecfg_get_attr_boolean(attrtab, &boolval) == Z_OK) 6190 return (Z_OK); 6191 zerr(gettext("invalid %s value for %s=%s"), 6192 rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "boolean"); 6193 return (Z_ERR); 6194 } 6195 6196 if (strcmp(attrtab->zone_attr_type, "int") == 0) { 6197 if (zonecfg_get_attr_int(attrtab, &intval) == Z_OK) 6198 return (Z_OK); 6199 zerr(gettext("invalid %s value for %s=%s"), 6200 rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "int"); 6201 return (Z_ERR); 6202 } 6203 6204 if (strcmp(attrtab->zone_attr_type, "string") == 0) { 6205 if (zonecfg_get_attr_string(attrtab, strval, 6206 sizeof (strval)) == Z_OK) 6207 return (Z_OK); 6208 zerr(gettext("invalid %s value for %s=%s"), 6209 rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "string"); 6210 return (Z_ERR); 6211 } 6212 6213 if (strcmp(attrtab->zone_attr_type, "uint") == 0) { 6214 if (zonecfg_get_attr_uint(attrtab, &uintval) == Z_OK) 6215 return (Z_OK); 6216 zerr(gettext("invalid %s value for %s=%s"), 6217 rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "uint"); 6218 return (Z_ERR); 6219 } 6220 6221 zerr(gettext("invalid %s %s '%s'"), rt_to_str(RT_ATTR), 6222 pt_to_str(PT_TYPE), attrtab->zone_attr_type); 6223 return (Z_ERR); 6224 } 6225 6226 /* 6227 * Helper function for end_func-- checks the existence of a given property 6228 * and emits a message if not specified. 6229 */ 6230 static int 6231 end_check_reqd(char *attr, int pt, boolean_t *validation_failed) 6232 { 6233 if (strlen(attr) == 0) { 6234 *validation_failed = B_TRUE; 6235 zerr(gettext("%s not specified"), pt_to_str(pt)); 6236 return (Z_ERR); 6237 } 6238 return (Z_OK); 6239 } 6240 6241 static void 6242 net_exists_error(struct zone_nwiftab nwif) 6243 { 6244 if (strlen(nwif.zone_nwif_address) > 0) { 6245 zerr(gettext("A %s resource with the %s '%s', " 6246 "and %s '%s' already exists."), 6247 rt_to_str(RT_NET), 6248 pt_to_str(PT_PHYSICAL), 6249 nwif.zone_nwif_physical, 6250 pt_to_str(PT_ADDRESS), 6251 in_progress_nwiftab.zone_nwif_address); 6252 } else { 6253 zerr(gettext("A %s resource with the %s '%s', " 6254 "and %s '%s' already exists."), 6255 rt_to_str(RT_NET), 6256 pt_to_str(PT_PHYSICAL), 6257 nwif.zone_nwif_physical, 6258 pt_to_str(PT_ALLOWED_ADDRESS), 6259 nwif.zone_nwif_allowed_address); 6260 } 6261 } 6262 6263 void 6264 end_func(cmd_t *cmd) 6265 { 6266 boolean_t validation_failed = B_FALSE; 6267 boolean_t arg_err = B_FALSE; 6268 struct zone_fstab tmp_fstab; 6269 struct zone_nwiftab tmp_nwiftab; 6270 struct zone_devtab tmp_devtab; 6271 struct zone_rctltab tmp_rctltab; 6272 struct zone_attrtab tmp_attrtab; 6273 struct zone_dstab tmp_dstab; 6274 struct zone_admintab tmp_admintab; 6275 int err, arg, res1, res2, res3; 6276 uint64_t swap_limit; 6277 uint64_t locked_limit; 6278 uint64_t proc_cap; 6279 6280 assert(cmd != NULL); 6281 6282 optind = 0; 6283 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 6284 switch (arg) { 6285 case '?': 6286 longer_usage(CMD_END); 6287 arg_err = B_TRUE; 6288 break; 6289 default: 6290 short_usage(CMD_END); 6291 arg_err = B_TRUE; 6292 break; 6293 } 6294 } 6295 if (arg_err) 6296 return; 6297 6298 if (optind != cmd->cmd_argc) { 6299 short_usage(CMD_END); 6300 return; 6301 } 6302 6303 if (global_scope) { 6304 scope_usage(CMD_END); 6305 return; 6306 } 6307 6308 assert(end_op == CMD_ADD || end_op == CMD_SELECT); 6309 6310 switch (resource_scope) { 6311 case RT_FS: 6312 /* First make sure everything was filled in. */ 6313 if (end_check_reqd(in_progress_fstab.zone_fs_dir, 6314 PT_DIR, &validation_failed) == Z_OK) { 6315 if (in_progress_fstab.zone_fs_dir[0] != '/') { 6316 zerr(gettext("%s %s is not an absolute path."), 6317 pt_to_str(PT_DIR), 6318 in_progress_fstab.zone_fs_dir); 6319 validation_failed = B_TRUE; 6320 } 6321 } 6322 6323 (void) end_check_reqd(in_progress_fstab.zone_fs_special, 6324 PT_SPECIAL, &validation_failed); 6325 6326 if (in_progress_fstab.zone_fs_raw[0] != '\0' && 6327 in_progress_fstab.zone_fs_raw[0] != '/') { 6328 zerr(gettext("%s %s is not an absolute path."), 6329 pt_to_str(PT_RAW), 6330 in_progress_fstab.zone_fs_raw); 6331 validation_failed = B_TRUE; 6332 } 6333 6334 (void) end_check_reqd(in_progress_fstab.zone_fs_type, PT_TYPE, 6335 &validation_failed); 6336 6337 if (validation_failed) { 6338 saw_error = B_TRUE; 6339 return; 6340 } 6341 6342 if (end_op == CMD_ADD) { 6343 /* Make sure there isn't already one like this. */ 6344 bzero(&tmp_fstab, sizeof (tmp_fstab)); 6345 (void) strlcpy(tmp_fstab.zone_fs_dir, 6346 in_progress_fstab.zone_fs_dir, 6347 sizeof (tmp_fstab.zone_fs_dir)); 6348 err = zonecfg_lookup_filesystem(handle, &tmp_fstab); 6349 zonecfg_free_fs_option_list(tmp_fstab.zone_fs_options); 6350 if (err == Z_OK) { 6351 zerr(gettext("A %s resource " 6352 "with the %s '%s' already exists."), 6353 rt_to_str(RT_FS), pt_to_str(PT_DIR), 6354 in_progress_fstab.zone_fs_dir); 6355 saw_error = B_TRUE; 6356 return; 6357 } 6358 err = zonecfg_add_filesystem(handle, 6359 &in_progress_fstab); 6360 } else { 6361 err = zonecfg_modify_filesystem(handle, &old_fstab, 6362 &in_progress_fstab); 6363 } 6364 zonecfg_free_fs_option_list(in_progress_fstab.zone_fs_options); 6365 in_progress_fstab.zone_fs_options = NULL; 6366 break; 6367 6368 case RT_NET: 6369 /* 6370 * First make sure everything was filled in. 6371 * Since we don't know whether IP will be shared 6372 * or exclusive here, some checks are deferred until 6373 * the verify command. 6374 */ 6375 (void) end_check_reqd(in_progress_nwiftab.zone_nwif_physical, 6376 PT_PHYSICAL, &validation_failed); 6377 6378 if (validation_failed) { 6379 saw_error = B_TRUE; 6380 return; 6381 } 6382 if (end_op == CMD_ADD) { 6383 /* Make sure there isn't already one like this. */ 6384 bzero(&tmp_nwiftab, sizeof (tmp_nwiftab)); 6385 (void) strlcpy(tmp_nwiftab.zone_nwif_physical, 6386 in_progress_nwiftab.zone_nwif_physical, 6387 sizeof (tmp_nwiftab.zone_nwif_physical)); 6388 (void) strlcpy(tmp_nwiftab.zone_nwif_address, 6389 in_progress_nwiftab.zone_nwif_address, 6390 sizeof (tmp_nwiftab.zone_nwif_address)); 6391 (void) strlcpy(tmp_nwiftab.zone_nwif_allowed_address, 6392 in_progress_nwiftab.zone_nwif_allowed_address, 6393 sizeof (tmp_nwiftab.zone_nwif_allowed_address)); 6394 (void) strlcpy(tmp_nwiftab.zone_nwif_defrouter, 6395 in_progress_nwiftab.zone_nwif_defrouter, 6396 sizeof (tmp_nwiftab.zone_nwif_defrouter)); 6397 if (zonecfg_lookup_nwif(handle, &tmp_nwiftab) == Z_OK) { 6398 net_exists_error(in_progress_nwiftab); 6399 saw_error = B_TRUE; 6400 return; 6401 } 6402 err = zonecfg_add_nwif(handle, &in_progress_nwiftab); 6403 } else { 6404 err = zonecfg_modify_nwif(handle, &old_nwiftab, 6405 &in_progress_nwiftab); 6406 } 6407 break; 6408 6409 case RT_DEVICE: 6410 /* First make sure everything was filled in. */ 6411 (void) end_check_reqd(in_progress_devtab.zone_dev_match, 6412 PT_MATCH, &validation_failed); 6413 6414 if (validation_failed) { 6415 saw_error = B_TRUE; 6416 return; 6417 } 6418 6419 if (end_op == CMD_ADD) { 6420 /* Make sure there isn't already one like this. */ 6421 (void) strlcpy(tmp_devtab.zone_dev_match, 6422 in_progress_devtab.zone_dev_match, 6423 sizeof (tmp_devtab.zone_dev_match)); 6424 if (zonecfg_lookup_dev(handle, &tmp_devtab) == Z_OK) { 6425 zerr(gettext("A %s resource with the %s '%s' " 6426 "already exists."), rt_to_str(RT_DEVICE), 6427 pt_to_str(PT_MATCH), 6428 in_progress_devtab.zone_dev_match); 6429 saw_error = B_TRUE; 6430 return; 6431 } 6432 err = zonecfg_add_dev(handle, &in_progress_devtab); 6433 } else { 6434 err = zonecfg_modify_dev(handle, &old_devtab, 6435 &in_progress_devtab); 6436 } 6437 break; 6438 6439 case RT_RCTL: 6440 /* First make sure everything was filled in. */ 6441 (void) end_check_reqd(in_progress_rctltab.zone_rctl_name, 6442 PT_NAME, &validation_failed); 6443 6444 if (in_progress_rctltab.zone_rctl_valptr == NULL) { 6445 zerr(gettext("no %s specified"), pt_to_str(PT_VALUE)); 6446 validation_failed = B_TRUE; 6447 } 6448 6449 if (validation_failed) { 6450 saw_error = B_TRUE; 6451 return; 6452 } 6453 6454 if (end_op == CMD_ADD) { 6455 /* Make sure there isn't already one like this. */ 6456 (void) strlcpy(tmp_rctltab.zone_rctl_name, 6457 in_progress_rctltab.zone_rctl_name, 6458 sizeof (tmp_rctltab.zone_rctl_name)); 6459 tmp_rctltab.zone_rctl_valptr = NULL; 6460 err = zonecfg_lookup_rctl(handle, &tmp_rctltab); 6461 zonecfg_free_rctl_value_list( 6462 tmp_rctltab.zone_rctl_valptr); 6463 if (err == Z_OK) { 6464 zerr(gettext("A %s resource " 6465 "with the %s '%s' already exists."), 6466 rt_to_str(RT_RCTL), pt_to_str(PT_NAME), 6467 in_progress_rctltab.zone_rctl_name); 6468 saw_error = B_TRUE; 6469 return; 6470 } 6471 err = zonecfg_add_rctl(handle, &in_progress_rctltab); 6472 } else { 6473 err = zonecfg_modify_rctl(handle, &old_rctltab, 6474 &in_progress_rctltab); 6475 } 6476 if (err == Z_OK) { 6477 zonecfg_free_rctl_value_list( 6478 in_progress_rctltab.zone_rctl_valptr); 6479 in_progress_rctltab.zone_rctl_valptr = NULL; 6480 } 6481 break; 6482 6483 case RT_ATTR: 6484 /* First make sure everything was filled in. */ 6485 (void) end_check_reqd(in_progress_attrtab.zone_attr_name, 6486 PT_NAME, &validation_failed); 6487 (void) end_check_reqd(in_progress_attrtab.zone_attr_type, 6488 PT_TYPE, &validation_failed); 6489 (void) end_check_reqd(in_progress_attrtab.zone_attr_value, 6490 PT_VALUE, &validation_failed); 6491 6492 if (validate_attr_name(in_progress_attrtab.zone_attr_name) != 6493 Z_OK) 6494 validation_failed = B_TRUE; 6495 6496 if (validate_attr_type_val(&in_progress_attrtab) != Z_OK) 6497 validation_failed = B_TRUE; 6498 6499 if (validation_failed) { 6500 saw_error = B_TRUE; 6501 return; 6502 } 6503 if (end_op == CMD_ADD) { 6504 /* Make sure there isn't already one like this. */ 6505 bzero(&tmp_attrtab, sizeof (tmp_attrtab)); 6506 (void) strlcpy(tmp_attrtab.zone_attr_name, 6507 in_progress_attrtab.zone_attr_name, 6508 sizeof (tmp_attrtab.zone_attr_name)); 6509 if (zonecfg_lookup_attr(handle, &tmp_attrtab) == Z_OK) { 6510 zerr(gettext("An %s resource " 6511 "with the %s '%s' already exists."), 6512 rt_to_str(RT_ATTR), pt_to_str(PT_NAME), 6513 in_progress_attrtab.zone_attr_name); 6514 saw_error = B_TRUE; 6515 return; 6516 } 6517 err = zonecfg_add_attr(handle, &in_progress_attrtab); 6518 } else { 6519 err = zonecfg_modify_attr(handle, &old_attrtab, 6520 &in_progress_attrtab); 6521 } 6522 break; 6523 case RT_DATASET: 6524 /* First make sure everything was filled in. */ 6525 if (strlen(in_progress_dstab.zone_dataset_name) == 0) { 6526 zerr("%s %s", pt_to_str(PT_NAME), 6527 gettext("not specified")); 6528 saw_error = B_TRUE; 6529 validation_failed = B_TRUE; 6530 } 6531 if (validation_failed) 6532 return; 6533 if (end_op == CMD_ADD) { 6534 /* Make sure there isn't already one like this. */ 6535 bzero(&tmp_dstab, sizeof (tmp_dstab)); 6536 (void) strlcpy(tmp_dstab.zone_dataset_name, 6537 in_progress_dstab.zone_dataset_name, 6538 sizeof (tmp_dstab.zone_dataset_name)); 6539 err = zonecfg_lookup_ds(handle, &tmp_dstab); 6540 if (err == Z_OK) { 6541 zerr(gettext("A %s resource " 6542 "with the %s '%s' already exists."), 6543 rt_to_str(RT_DATASET), pt_to_str(PT_NAME), 6544 in_progress_dstab.zone_dataset_name); 6545 saw_error = B_TRUE; 6546 return; 6547 } 6548 err = zonecfg_add_ds(handle, &in_progress_dstab); 6549 } else { 6550 err = zonecfg_modify_ds(handle, &old_dstab, 6551 &in_progress_dstab); 6552 } 6553 break; 6554 case RT_DCPU: 6555 /* Make sure everything was filled in. */ 6556 if (end_check_reqd(in_progress_psettab.zone_ncpu_min, 6557 PT_NCPUS, &validation_failed) != Z_OK) { 6558 saw_error = B_TRUE; 6559 return; 6560 } 6561 6562 if (end_op == CMD_ADD) { 6563 err = zonecfg_add_pset(handle, &in_progress_psettab); 6564 } else { 6565 err = zonecfg_modify_pset(handle, &in_progress_psettab); 6566 } 6567 break; 6568 case RT_PCAP: 6569 /* Make sure everything was filled in. */ 6570 if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &proc_cap) 6571 != Z_OK) { 6572 zerr(gettext("%s not specified"), pt_to_str(PT_NCPUS)); 6573 saw_error = B_TRUE; 6574 validation_failed = B_TRUE; 6575 return; 6576 } 6577 err = Z_OK; 6578 break; 6579 case RT_MCAP: 6580 /* Make sure everything was filled in. */ 6581 res1 = strlen(in_progress_mcaptab.zone_physmem_cap) == 0 ? 6582 Z_ERR : Z_OK; 6583 res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, 6584 &swap_limit); 6585 res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, 6586 &locked_limit); 6587 6588 if (res1 != Z_OK && res2 != Z_OK && res3 != Z_OK) { 6589 zerr(gettext("No property was specified. One of %s, " 6590 "%s or %s is required."), pt_to_str(PT_PHYSICAL), 6591 pt_to_str(PT_SWAP), pt_to_str(PT_LOCKED)); 6592 saw_error = B_TRUE; 6593 return; 6594 } 6595 6596 /* if phys & locked are both set, verify locked <= phys */ 6597 if (res1 == Z_OK && res3 == Z_OK) { 6598 uint64_t phys_limit; 6599 char *endp; 6600 6601 phys_limit = strtoull( 6602 in_progress_mcaptab.zone_physmem_cap, &endp, 10); 6603 if (phys_limit < locked_limit) { 6604 zerr(gettext("The %s cap must be less than or " 6605 "equal to the %s cap."), 6606 pt_to_str(PT_LOCKED), 6607 pt_to_str(PT_PHYSICAL)); 6608 saw_error = B_TRUE; 6609 return; 6610 } 6611 } 6612 6613 err = Z_OK; 6614 if (res1 == Z_OK) { 6615 /* 6616 * We could be ending from either an add operation 6617 * or a select operation. Since all of the properties 6618 * within this resource are optional, we always use 6619 * modify on the mcap entry. zonecfg_modify_mcap() 6620 * will handle both adding and modifying a memory cap. 6621 */ 6622 err = zonecfg_modify_mcap(handle, &in_progress_mcaptab); 6623 } else if (end_op == CMD_SELECT) { 6624 /* 6625 * If we're ending from a select and the physical 6626 * memory cap is empty then the user could have cleared 6627 * the physical cap value, so try to delete the entry. 6628 */ 6629 (void) zonecfg_delete_mcap(handle); 6630 } 6631 break; 6632 case RT_ADMIN: 6633 /* First make sure everything was filled in. */ 6634 if (end_check_reqd(in_progress_admintab.zone_admin_user, 6635 PT_USER, &validation_failed) == Z_OK) { 6636 if (getpwnam(in_progress_admintab.zone_admin_user) 6637 == NULL) { 6638 zerr(gettext("%s %s is not a valid username"), 6639 pt_to_str(PT_USER), 6640 in_progress_admintab.zone_admin_user); 6641 validation_failed = B_TRUE; 6642 } 6643 } 6644 6645 if (end_check_reqd(in_progress_admintab.zone_admin_auths, 6646 PT_AUTHS, &validation_failed) == Z_OK) { 6647 if (!zonecfg_valid_auths( 6648 in_progress_admintab.zone_admin_auths, 6649 zone)) { 6650 validation_failed = B_TRUE; 6651 } 6652 } 6653 6654 if (validation_failed) { 6655 saw_error = B_TRUE; 6656 return; 6657 } 6658 6659 if (end_op == CMD_ADD) { 6660 /* Make sure there isn't already one like this. */ 6661 bzero(&tmp_admintab, sizeof (tmp_admintab)); 6662 (void) strlcpy(tmp_admintab.zone_admin_user, 6663 in_progress_admintab.zone_admin_user, 6664 sizeof (tmp_admintab.zone_admin_user)); 6665 err = zonecfg_lookup_admin( 6666 handle, &tmp_admintab); 6667 if (err == Z_OK) { 6668 zerr(gettext("A %s resource " 6669 "with the %s '%s' already exists."), 6670 rt_to_str(RT_ADMIN), 6671 pt_to_str(PT_USER), 6672 in_progress_admintab.zone_admin_user); 6673 saw_error = B_TRUE; 6674 return; 6675 } 6676 err = zonecfg_add_admin(handle, 6677 &in_progress_admintab, zone); 6678 } else { 6679 err = zonecfg_modify_admin(handle, 6680 &old_admintab, &in_progress_admintab, 6681 zone); 6682 } 6683 break; 6684 default: 6685 zone_perror(rt_to_str(resource_scope), Z_NO_RESOURCE_TYPE, 6686 B_TRUE); 6687 saw_error = B_TRUE; 6688 return; 6689 } 6690 6691 if (err != Z_OK) { 6692 zone_perror(zone, err, B_TRUE); 6693 } else { 6694 need_to_commit = B_TRUE; 6695 global_scope = B_TRUE; 6696 end_op = -1; 6697 } 6698 } 6699 6700 void 6701 commit_func(cmd_t *cmd) 6702 { 6703 int arg; 6704 boolean_t arg_err = B_FALSE; 6705 6706 optind = 0; 6707 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 6708 switch (arg) { 6709 case '?': 6710 longer_usage(CMD_COMMIT); 6711 arg_err = B_TRUE; 6712 break; 6713 default: 6714 short_usage(CMD_COMMIT); 6715 arg_err = B_TRUE; 6716 break; 6717 } 6718 } 6719 if (arg_err) 6720 return; 6721 6722 if (optind != cmd->cmd_argc) { 6723 short_usage(CMD_COMMIT); 6724 return; 6725 } 6726 6727 if (zone_is_read_only(CMD_COMMIT)) 6728 return; 6729 6730 assert(cmd != NULL); 6731 6732 cmd->cmd_argc = 1; 6733 /* 6734 * cmd_arg normally comes from a strdup() in the lexer, and the 6735 * whole cmd structure and its (char *) attributes are freed at 6736 * the completion of each command, so the strdup() below is needed 6737 * to match this and prevent a core dump from trying to free() 6738 * something that can't be. 6739 */ 6740 if ((cmd->cmd_argv[0] = strdup("save")) == NULL) { 6741 zone_perror(zone, Z_NOMEM, B_TRUE); 6742 exit(Z_ERR); 6743 } 6744 cmd->cmd_argv[1] = NULL; 6745 verify_func(cmd); 6746 } 6747 6748 void 6749 revert_func(cmd_t *cmd) 6750 { 6751 char line[128]; /* enough to ask a question */ 6752 boolean_t force = B_FALSE; 6753 boolean_t arg_err = B_FALSE; 6754 int err, arg, answer; 6755 6756 optind = 0; 6757 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) { 6758 switch (arg) { 6759 case '?': 6760 longer_usage(CMD_REVERT); 6761 arg_err = B_TRUE; 6762 break; 6763 case 'F': 6764 force = B_TRUE; 6765 break; 6766 default: 6767 short_usage(CMD_REVERT); 6768 arg_err = B_TRUE; 6769 break; 6770 } 6771 } 6772 if (arg_err) 6773 return; 6774 6775 if (optind != cmd->cmd_argc) { 6776 short_usage(CMD_REVERT); 6777 return; 6778 } 6779 6780 if (zone_is_read_only(CMD_REVERT)) 6781 return; 6782 6783 if (!global_scope) { 6784 zerr(gettext("You can only use %s in the global scope.\nUse" 6785 " '%s' to cancel changes to a resource specification."), 6786 cmd_to_str(CMD_REVERT), cmd_to_str(CMD_CANCEL)); 6787 saw_error = B_TRUE; 6788 return; 6789 } 6790 6791 if (zonecfg_check_handle(handle) != Z_OK) { 6792 zerr(gettext("No changes to revert.")); 6793 saw_error = B_TRUE; 6794 return; 6795 } 6796 6797 if (!force) { 6798 (void) snprintf(line, sizeof (line), 6799 gettext("Are you sure you want to revert")); 6800 if ((answer = ask_yesno(B_FALSE, line)) == -1) { 6801 zerr(gettext("Input not from terminal and -F not " 6802 "specified:\n%s command ignored, exiting."), 6803 cmd_to_str(CMD_REVERT)); 6804 exit(Z_ERR); 6805 } 6806 if (answer != 1) 6807 return; 6808 } 6809 6810 /* 6811 * Reset any pending admins that were 6812 * removed from the previous zone 6813 */ 6814 zonecfg_remove_userauths(handle, "", zone, B_FALSE); 6815 6816 /* 6817 * Time for a new handle: finish the old one off first 6818 * then get a new one properly to avoid leaks. 6819 */ 6820 zonecfg_fini_handle(handle); 6821 if ((handle = zonecfg_init_handle()) == NULL) { 6822 zone_perror(execname, Z_NOMEM, B_TRUE); 6823 exit(Z_ERR); 6824 } 6825 6826 if ((err = zonecfg_get_handle(revert_zone, handle)) != Z_OK) { 6827 saw_error = B_TRUE; 6828 got_handle = B_FALSE; 6829 if (err == Z_NO_ZONE) 6830 zerr(gettext("%s: no such saved zone to revert to."), 6831 revert_zone); 6832 else 6833 zone_perror(zone, err, B_TRUE); 6834 } 6835 (void) strlcpy(zone, revert_zone, sizeof (zone)); 6836 } 6837 6838 void 6839 help_func(cmd_t *cmd) 6840 { 6841 int i; 6842 6843 assert(cmd != NULL); 6844 6845 if (cmd->cmd_argc == 0) { 6846 usage(B_TRUE, global_scope ? HELP_SUBCMDS : HELP_RES_SCOPE); 6847 return; 6848 } 6849 if (strcmp(cmd->cmd_argv[0], "usage") == 0) { 6850 usage(B_TRUE, HELP_USAGE); 6851 return; 6852 } 6853 if (strcmp(cmd->cmd_argv[0], "commands") == 0) { 6854 usage(B_TRUE, HELP_SUBCMDS); 6855 return; 6856 } 6857 if (strcmp(cmd->cmd_argv[0], "syntax") == 0) { 6858 usage(B_TRUE, HELP_SYNTAX | HELP_RES_PROPS); 6859 return; 6860 } 6861 if (strcmp(cmd->cmd_argv[0], "-?") == 0) { 6862 longer_usage(CMD_HELP); 6863 return; 6864 } 6865 6866 for (i = 0; i <= CMD_MAX; i++) { 6867 if (strcmp(cmd->cmd_argv[0], cmd_to_str(i)) == 0) { 6868 longer_usage(i); 6869 return; 6870 } 6871 } 6872 /* We do not use zerr() here because we do not want its extra \n. */ 6873 (void) fprintf(stderr, gettext("Unknown help subject %s. "), 6874 cmd->cmd_argv[0]); 6875 usage(B_FALSE, HELP_META); 6876 } 6877 6878 static int 6879 string_to_yyin(char *string) 6880 { 6881 if ((yyin = tmpfile()) == NULL) { 6882 zone_perror(execname, Z_TEMP_FILE, B_TRUE); 6883 return (Z_ERR); 6884 } 6885 if (fwrite(string, strlen(string), 1, yyin) != 1) { 6886 zone_perror(execname, Z_TEMP_FILE, B_TRUE); 6887 return (Z_ERR); 6888 } 6889 if (fseek(yyin, 0, SEEK_SET) != 0) { 6890 zone_perror(execname, Z_TEMP_FILE, B_TRUE); 6891 return (Z_ERR); 6892 } 6893 return (Z_OK); 6894 } 6895 6896 /* This is the back-end helper function for read_input() below. */ 6897 6898 static int 6899 cleanup() 6900 { 6901 int answer; 6902 cmd_t *cmd; 6903 6904 if (!interactive_mode && !cmd_file_mode) { 6905 /* 6906 * If we're not in interactive mode, and we're not in command 6907 * file mode, then we must be in commands-from-the-command-line 6908 * mode. As such, we can't loop back and ask for more input. 6909 * It was OK to prompt for such things as whether or not to 6910 * really delete a zone in the command handler called from 6911 * yyparse() above, but "really quit?" makes no sense in this 6912 * context. So disable prompting. 6913 */ 6914 ok_to_prompt = B_FALSE; 6915 } 6916 if (!global_scope) { 6917 if (!time_to_exit) { 6918 /* 6919 * Just print a simple error message in the -1 case, 6920 * since exit_func() already handles that case, and 6921 * EOF means we are finished anyway. 6922 */ 6923 answer = ask_yesno(B_FALSE, 6924 gettext("Resource incomplete; really quit")); 6925 if (answer == -1) { 6926 zerr(gettext("Resource incomplete.")); 6927 return (Z_ERR); 6928 } 6929 if (answer != 1) { 6930 yyin = stdin; 6931 return (Z_REPEAT); 6932 } 6933 } else { 6934 saw_error = B_TRUE; 6935 } 6936 } 6937 /* 6938 * Make sure we tried something and that the handle checks 6939 * out, or we would get a false error trying to commit. 6940 */ 6941 if (need_to_commit && zonecfg_check_handle(handle) == Z_OK) { 6942 if ((cmd = alloc_cmd()) == NULL) { 6943 zone_perror(zone, Z_NOMEM, B_TRUE); 6944 return (Z_ERR); 6945 } 6946 cmd->cmd_argc = 0; 6947 cmd->cmd_argv[0] = NULL; 6948 commit_func(cmd); 6949 free_cmd(cmd); 6950 /* 6951 * need_to_commit will get set back to FALSE if the 6952 * configuration is saved successfully. 6953 */ 6954 if (need_to_commit) { 6955 if (force_exit) { 6956 zerr(gettext("Configuration not saved.")); 6957 return (Z_ERR); 6958 } 6959 answer = ask_yesno(B_FALSE, 6960 gettext("Configuration not saved; really quit")); 6961 if (answer == -1) { 6962 zerr(gettext("Configuration not saved.")); 6963 return (Z_ERR); 6964 } 6965 if (answer != 1) { 6966 time_to_exit = B_FALSE; 6967 yyin = stdin; 6968 return (Z_REPEAT); 6969 } 6970 } 6971 } 6972 return ((need_to_commit || saw_error) ? Z_ERR : Z_OK); 6973 } 6974 6975 /* 6976 * read_input() is the driver of this program. It is a wrapper around 6977 * yyparse(), printing appropriate prompts when needed, checking for 6978 * exit conditions and reacting appropriately [the latter in its cleanup() 6979 * helper function]. 6980 * 6981 * Like most zonecfg functions, it returns Z_OK or Z_ERR, *or* Z_REPEAT 6982 * so do_interactive() knows that we are not really done (i.e, we asked 6983 * the user if we should really quit and the user said no). 6984 */ 6985 static int 6986 read_input() 6987 { 6988 boolean_t yyin_is_a_tty = isatty(fileno(yyin)); 6989 /* 6990 * The prompt is "e:z> " or "e:z:r> " where e is execname, z is zone 6991 * and r is resource_scope: 5 is for the two ":"s + "> " + terminator. 6992 */ 6993 char prompt[MAXPATHLEN + ZONENAME_MAX + MAX_RT_STRLEN + 5], *line; 6994 6995 /* yyin should have been set to the appropriate (FILE *) if not stdin */ 6996 newline_terminated = B_TRUE; 6997 for (;;) { 6998 if (yyin_is_a_tty) { 6999 if (newline_terminated) { 7000 if (global_scope) 7001 (void) snprintf(prompt, sizeof (prompt), 7002 "%s:%s> ", execname, zone); 7003 else 7004 (void) snprintf(prompt, sizeof (prompt), 7005 "%s:%s:%s> ", execname, zone, 7006 rt_to_str(resource_scope)); 7007 } 7008 /* 7009 * If the user hits ^C then we want to catch it and 7010 * start over. If the user hits EOF then we want to 7011 * bail out. 7012 */ 7013 line = gl_get_line(gl, prompt, NULL, -1); 7014 if (gl_return_status(gl) == GLR_SIGNAL) { 7015 gl_abandon_line(gl); 7016 continue; 7017 } 7018 if (line == NULL) 7019 break; 7020 (void) string_to_yyin(line); 7021 while (!feof(yyin)) 7022 yyparse(); 7023 } else { 7024 yyparse(); 7025 } 7026 /* Bail out on an error in command file mode. */ 7027 if (saw_error && cmd_file_mode && !interactive_mode) 7028 time_to_exit = B_TRUE; 7029 if (time_to_exit || (!yyin_is_a_tty && feof(yyin))) 7030 break; 7031 } 7032 return (cleanup()); 7033 } 7034 7035 /* 7036 * This function is used in the zonecfg-interactive-mode scenario: it just 7037 * calls read_input() until we are done. 7038 */ 7039 7040 static int 7041 do_interactive(void) 7042 { 7043 int err; 7044 7045 interactive_mode = B_TRUE; 7046 if (!read_only_mode) { 7047 /* 7048 * Try to set things up proactively in interactive mode, so 7049 * that if the zone in question does not exist yet, we can 7050 * provide the user with a clue. 7051 */ 7052 (void) initialize(B_FALSE); 7053 } 7054 do { 7055 err = read_input(); 7056 } while (err == Z_REPEAT); 7057 return (err); 7058 } 7059 7060 /* 7061 * cmd_file is slightly more complicated, as it has to open the command file 7062 * and set yyin appropriately. Once that is done, though, it just calls 7063 * read_input(), and only once, since prompting is not possible. 7064 */ 7065 7066 static int 7067 cmd_file(char *file) 7068 { 7069 FILE *infile; 7070 int err; 7071 struct stat statbuf; 7072 boolean_t using_real_file = (strcmp(file, "-") != 0); 7073 7074 if (using_real_file) { 7075 /* 7076 * zerr() prints a line number in cmd_file_mode, which we do 7077 * not want here, so temporarily unset it. 7078 */ 7079 cmd_file_mode = B_FALSE; 7080 if ((infile = fopen(file, "r")) == NULL) { 7081 zerr(gettext("could not open file %s: %s"), 7082 file, strerror(errno)); 7083 return (Z_ERR); 7084 } 7085 if ((err = fstat(fileno(infile), &statbuf)) != 0) { 7086 zerr(gettext("could not stat file %s: %s"), 7087 file, strerror(errno)); 7088 err = Z_ERR; 7089 goto done; 7090 } 7091 if (!S_ISREG(statbuf.st_mode)) { 7092 zerr(gettext("%s is not a regular file."), file); 7093 err = Z_ERR; 7094 goto done; 7095 } 7096 yyin = infile; 7097 cmd_file_mode = B_TRUE; 7098 ok_to_prompt = B_FALSE; 7099 } else { 7100 /* 7101 * "-f -" is essentially the same as interactive mode, 7102 * so treat it that way. 7103 */ 7104 interactive_mode = B_TRUE; 7105 } 7106 /* Z_REPEAT is for interactive mode; treat it like Z_ERR here. */ 7107 if ((err = read_input()) == Z_REPEAT) 7108 err = Z_ERR; 7109 done: 7110 if (using_real_file) 7111 (void) fclose(infile); 7112 return (err); 7113 } 7114 7115 /* 7116 * Since yacc is based on reading from a (FILE *) whereas what we get from 7117 * the command line is in argv format, we need to convert when the user 7118 * gives us commands directly from the command line. That is done here by 7119 * concatenating the argv list into a space-separated string, writing it 7120 * to a temp file, and rewinding the file so yyin can be set to it. Then 7121 * we call read_input(), and only once, since prompting about whether to 7122 * continue or quit would make no sense in this context. 7123 */ 7124 7125 static int 7126 one_command_at_a_time(int argc, char *argv[]) 7127 { 7128 char *command; 7129 size_t len = 2; /* terminal \n\0 */ 7130 int i, err; 7131 7132 for (i = 0; i < argc; i++) 7133 len += strlen(argv[i]) + 1; 7134 if ((command = malloc(len)) == NULL) { 7135 zone_perror(execname, Z_NOMEM, B_TRUE); 7136 return (Z_ERR); 7137 } 7138 (void) strlcpy(command, argv[0], len); 7139 for (i = 1; i < argc; i++) { 7140 (void) strlcat(command, " ", len); 7141 (void) strlcat(command, argv[i], len); 7142 } 7143 (void) strlcat(command, "\n", len); 7144 err = string_to_yyin(command); 7145 free(command); 7146 if (err != Z_OK) 7147 return (err); 7148 while (!feof(yyin)) 7149 yyparse(); 7150 return (cleanup()); 7151 } 7152 7153 static char * 7154 get_execbasename(char *execfullname) 7155 { 7156 char *last_slash, *execbasename; 7157 7158 /* guard against '/' at end of command invocation */ 7159 for (;;) { 7160 last_slash = strrchr(execfullname, '/'); 7161 if (last_slash == NULL) { 7162 execbasename = execfullname; 7163 break; 7164 } else { 7165 execbasename = last_slash + 1; 7166 if (*execbasename == '\0') { 7167 *last_slash = '\0'; 7168 continue; 7169 } 7170 break; 7171 } 7172 } 7173 return (execbasename); 7174 } 7175 7176 int 7177 main(int argc, char *argv[]) 7178 { 7179 int err, arg; 7180 struct stat st; 7181 7182 /* This must be before anything goes to stdout. */ 7183 setbuf(stdout, NULL); 7184 7185 saw_error = B_FALSE; 7186 cmd_file_mode = B_FALSE; 7187 execname = get_execbasename(argv[0]); 7188 7189 (void) setlocale(LC_ALL, ""); 7190 (void) textdomain(TEXT_DOMAIN); 7191 7192 if (getzoneid() != GLOBAL_ZONEID) { 7193 zerr(gettext("%s can only be run from the global zone."), 7194 execname); 7195 exit(Z_ERR); 7196 } 7197 7198 if (argc < 2) { 7199 usage(B_FALSE, HELP_USAGE | HELP_SUBCMDS); 7200 exit(Z_USAGE); 7201 } 7202 if (strcmp(argv[1], cmd_to_str(CMD_HELP)) == 0) { 7203 (void) one_command_at_a_time(argc - 1, &(argv[1])); 7204 exit(Z_OK); 7205 } 7206 7207 while ((arg = getopt(argc, argv, "?f:R:z:")) != EOF) { 7208 switch (arg) { 7209 case '?': 7210 if (optopt == '?') 7211 usage(B_TRUE, HELP_USAGE | HELP_SUBCMDS); 7212 else 7213 usage(B_FALSE, HELP_USAGE); 7214 exit(Z_USAGE); 7215 /* NOTREACHED */ 7216 case 'f': 7217 cmd_file_name = optarg; 7218 cmd_file_mode = B_TRUE; 7219 break; 7220 case 'R': 7221 if (*optarg != '/') { 7222 zerr(gettext("root path must be absolute: %s"), 7223 optarg); 7224 exit(Z_USAGE); 7225 } 7226 if (stat(optarg, &st) == -1 || !S_ISDIR(st.st_mode)) { 7227 zerr(gettext( 7228 "root path must be a directory: %s"), 7229 optarg); 7230 exit(Z_USAGE); 7231 } 7232 zonecfg_set_root(optarg); 7233 break; 7234 case 'z': 7235 if (strcmp(optarg, GLOBAL_ZONENAME) == 0) { 7236 global_zone = B_TRUE; 7237 } else if (zonecfg_validate_zonename(optarg) != Z_OK) { 7238 zone_perror(optarg, Z_BOGUS_ZONE_NAME, B_TRUE); 7239 usage(B_FALSE, HELP_SYNTAX); 7240 exit(Z_USAGE); 7241 } 7242 (void) strlcpy(zone, optarg, sizeof (zone)); 7243 (void) strlcpy(revert_zone, optarg, sizeof (zone)); 7244 break; 7245 default: 7246 usage(B_FALSE, HELP_USAGE); 7247 exit(Z_USAGE); 7248 } 7249 } 7250 7251 if (optind > argc || strcmp(zone, "") == 0) { 7252 usage(B_FALSE, HELP_USAGE); 7253 exit(Z_USAGE); 7254 } 7255 7256 if ((err = zonecfg_access(zone, W_OK)) == Z_OK) { 7257 read_only_mode = B_FALSE; 7258 } else if (err == Z_ACCES) { 7259 read_only_mode = B_TRUE; 7260 /* skip this message in one-off from command line mode */ 7261 if (optind == argc) 7262 (void) fprintf(stderr, gettext("WARNING: you do not " 7263 "have write access to this zone's configuration " 7264 "file;\ngoing into read-only mode.\n")); 7265 } else { 7266 fprintf(stderr, "%s: Could not access zone configuration " 7267 "store: %s\n", execname, zonecfg_strerror(err)); 7268 exit(Z_ERR); 7269 } 7270 7271 if ((handle = zonecfg_init_handle()) == NULL) { 7272 zone_perror(execname, Z_NOMEM, B_TRUE); 7273 exit(Z_ERR); 7274 } 7275 7276 /* 7277 * This may get set back to FALSE again in cmd_file() if cmd_file_name 7278 * is a "real" file as opposed to "-" (i.e. meaning use stdin). 7279 */ 7280 if (isatty(STDIN_FILENO)) 7281 ok_to_prompt = B_TRUE; 7282 if ((gl = new_GetLine(MAX_LINE_LEN, MAX_CMD_HIST)) == NULL) 7283 exit(Z_ERR); 7284 if (gl_customize_completion(gl, NULL, cmd_cpl_fn) != 0) 7285 exit(Z_ERR); 7286 (void) sigset(SIGINT, SIG_IGN); 7287 if (optind == argc) { 7288 if (!cmd_file_mode) 7289 err = do_interactive(); 7290 else 7291 err = cmd_file(cmd_file_name); 7292 } else { 7293 err = one_command_at_a_time(argc - optind, &(argv[optind])); 7294 } 7295 zonecfg_fini_handle(handle); 7296 if (brand != NULL) 7297 brand_close(brand); 7298 (void) del_GetLine(gl); 7299 return (err); 7300 } 7301