xref: /titanic_41/usr/src/cmd/power/handlers.c (revision 4f4499478f0aa55fc93bcd8030ba3d128663ae70)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #include "pmconfig.h"
27 #include <sys/mkdev.h>
28 #include <sys/syslog.h>
29 #include <sys/openpromio.h>
30 #include <sys/mnttab.h>
31 #include <sys/vtoc.h>
32 #include <sys/efi_partition.h>
33 #include <syslog.h>
34 #include <stdlib.h>
35 #include <sys/pm.h>
36 #include <kstat.h>
37 #include <sys/smbios.h>
38 #include <libzfs.h>
39 
40 
41 #define	STRCPYLIM(dst, src, str) strcpy_limit(dst, src, sizeof (dst), str)
42 #define	LASTBYTE(str) (str + strlen(str) - 1)
43 
44 static char nerr_fmt[] = "number is out of range (%s)\n";
45 static char alloc_fmt[] = "cannot allocate space for \"%s\", %s\n";
46 static char set_thresh_fmt[] = "error setting threshold(s) for \"%s\", %s\n";
47 static char bad_thresh_fmt[] = "bad threshold(s)\n";
48 static char stat_fmt[] = "cannot stat \"%s\", %s\n";
49 static char always_on[] = "always-on";
50 
51 #define	PM_DEFAULT_ALGORITHM -1
52 /*
53  * When lines in a config file (usually "/etc/power.conf") start with
54  * a recognized keyword, a "handler" routine is called for specific
55  * CPR or PM -related action(s).  Each routine returns a status code
56  * indicating whether all tasks were successful; if any errors occured,
57  * future CPR or PM updates are skipped.  Following are the handler
58  * routines for all keywords:
59  */
60 
61 
62 static char pm_cmd_string[32];
63 
64 static char *
65 pm_map(int cmd)
66 {
67 	pm_req_t req;
68 
69 	req.value = cmd;
70 	req.data = (void *)pm_cmd_string;
71 	req.datasize = sizeof (pm_cmd_string);
72 
73 	if (ioctl(pm_fd, PM_GET_CMD_NAME, &req) < 0) {
74 		perror(gettext("PM_GET_CMD_NAME failed:"));
75 		return ("??");
76 	}
77 	return (pm_cmd_string);
78 }
79 
80 static int
81 isonlist(char *listname, const char *man, const char *prod)
82 {
83 	pm_searchargs_t sl;
84 	int ret;
85 
86 	sl.pms_listname = listname;
87 	sl.pms_manufacturer = (char *)man;
88 	sl.pms_product = (char *)prod;
89 	ret = ioctl(pm_fd, PM_SEARCH_LIST, &sl);
90 	mesg(MDEBUG, "PM_SEARCH_LIST %s for %s,%s returns %d\n",
91 	    listname, man, prod, ret);
92 	return (ret == 0);
93 }
94 
95 static int
96 do_ioctl(int ioctl_cmd, char *keyword, char *behavior, int suppress)
97 {
98 	mesg(MDEBUG, "doing ioctl %s for %s ", pm_map(ioctl_cmd), keyword);
99 	if (ioctl(pm_fd, ioctl_cmd, NULL) == -1) {
100 		int suppressed = suppress == -1 || suppress == errno;
101 		if (!suppressed) {
102 			mesg(MERR, "%s %s failed, %s\n", keyword, behavior,
103 			    strerror(errno));
104 			return (NOUP);
105 		} else {
106 			mesg(MDEBUG, "%s %s failed, %s\n", keyword, behavior,
107 			    strerror(errno));
108 			return (OKUP);
109 		}
110 	}
111 	mesg(MDEBUG, "succeeded\n");
112 	return (OKUP);
113 }
114 
115 /*
116  * Check for valid cpupm behavior and communicate it to the kernel.
117  */
118 int
119 cpupm(void)
120 {
121 	struct bmtoc {
122 		char *behavior;
123 		char *mode;
124 		int cmd;
125 		int Errno;
126 	};
127 
128 	static struct bmtoc bmlist[] = {
129 		"disable",	"\0",		PM_STOP_CPUPM,		EINVAL,
130 		"enable",	"poll-mode",	PM_START_CPUPM_POLL,	EBUSY,
131 		"enable",	"event-mode",	PM_START_CPUPM_EV,	EBUSY,
132 		"enable",	"\0",		PM_START_CPUPM,		EBUSY,
133 		NULL,		0,		0,			0
134 	};
135 	struct bmtoc *bp;
136 	char *behavior;
137 	char *mode;
138 
139 	behavior = LINEARG(1);
140 	if ((mode = LINEARG(2)) == NULL)
141 		mode = "\0";
142 
143 	for (bp = bmlist; bp->cmd; bp++) {
144 		if (strcmp(behavior, bp->behavior) == 0 &&
145 		    strcmp(mode, bp->mode) == 0) {
146 			break;
147 		}
148 	}
149 	if (bp->cmd == 0) {
150 		if (LINEARG(2) == NULL) {
151 			mesg(MERR, "invalid cpupm behavior \"%s\"\n", behavior);
152 		} else {
153 			mesg(MERR, "invalid cpupm behavior \"%s %s\"\n",
154 			    behavior, mode);
155 		}
156 		return (NOUP);
157 	}
158 	if (ioctl(pm_fd, bp->cmd, NULL) == -1 && errno != bp->Errno) {
159 		mesg(MERR, "cpupm %s failed, %s\n",
160 		    behavior, strerror(errno));
161 		return (NOUP);
162 	}
163 	return (OKUP);
164 }
165 
166 /*
167  * Check for valid cpu_deep_idle option and communicate it to the kernel.
168  */
169 int
170 cpuidle(void)
171 {
172 	struct btoc {
173 		char *behavior;
174 		int cmd;
175 		int Errno;
176 	};
177 	static struct btoc blist[] = {
178 		"disable",	PM_DISABLE_CPU_DEEP_IDLE, EINVAL,
179 		"enable",	PM_ENABLE_CPU_DEEP_IDLE, EBUSY,
180 		"default",	PM_DEFAULT_CPU_DEEP_IDLE, EBUSY,
181 		NULL,		0, 0
182 	};
183 	struct btoc *bp;
184 	char *behavior;
185 
186 	for (behavior = LINEARG(1), bp = blist; bp->cmd; bp++) {
187 		if (strcmp(behavior, bp->behavior) == 0)
188 			break;
189 	}
190 	if (bp->cmd == 0) {
191 		mesg(MERR, "invalid cpu_deep_idle behavior \"%s\"\n", behavior);
192 		return (NOUP);
193 	}
194 	if (ioctl(pm_fd, bp->cmd, NULL) == -1 && errno != bp->Errno) {
195 		mesg(MERR, "cpu_deep_idle %s failed, %s\n",
196 		    behavior, strerror(errno));
197 		return (NOUP);
198 	}
199 	return (OKUP);
200 }
201 
202 /*
203  * Two decisions are identical except for the list names and ioctl commands
204  * inputs: whitelist, blacklist, yes, no
205  * if (! ("S3" kstat exists))
206  *	return (no)
207  * if (SystemInformation.Manufacturer == "Sun Microsystems" &&
208  *    (Pref_PM_Profile == Workstation || Pref_PM_Profile == Desktop)) {
209  *	if (platform on blacklist)
210  *		return (no)
211  *	return (yes)
212  * } else {
213  *	if (platform on whitelist)
214  *		return (yes)
215  *	return (no)
216  * }
217  */
218 
219 int
220 S3_helper(char *whitelist, char *blacklist, int yes, int no, char *keyword,
221 	char *behavior, int *didyes, int suppress)
222 {
223 	int oflags = SMB_O_NOCKSUM | SMB_O_NOVERS;
224 	smbios_hdl_t *shp;
225 	smbios_system_t sys;
226 	id_t id;
227 	int ret;
228 	kstat_ctl_t *kc;
229 	kstat_t *ksp;
230 	kstat_named_t *dp;
231 	smbios_info_t info;
232 	int preferred_pm_profile = 0;
233 	char yesstr[32], nostr[32];	/* DEBUG */
234 
235 	*didyes = 0;
236 
237 	(void) strncpy(yesstr, pm_map(yes), sizeof (yesstr));
238 	(void) strncpy(nostr, pm_map(no), sizeof (nostr));
239 	mesg(MDEBUG, "S3_helper(%s, %s, %s, %s, %s, %s)\n", whitelist,
240 	    blacklist, yesstr, nostr, keyword, behavior);
241 	if ((kc = kstat_open()) == NULL) {
242 		mesg(MDEBUG, "kstat_open failed\n");
243 		return (OKUP);
244 	}
245 	ksp = kstat_lookup(kc, "acpi", -1, "acpi");
246 	if (ksp == NULL) {
247 		mesg(MDEBUG, "kstat_lookup 'acpi', -1, 'acpi' failed\n");
248 		(void) kstat_close(kc);
249 		return (OKUP);
250 	}
251 	(void) kstat_read(kc, ksp,  NULL);
252 	dp = kstat_data_lookup(ksp, "S3");
253 	if (dp == NULL || dp->value.l == 0) {
254 		mesg(MDEBUG, "kstat_data_lookup 'S3' fails\n");
255 		if (dp != NULL)
256 			mesg(MDEBUG, "value.l %lx\n", dp->value.l);
257 		(void) kstat_close(kc);
258 		return (do_ioctl(no, keyword, behavior, suppress));
259 	}
260 	mesg(MDEBUG, "kstat indicates S3 support (%lx)\n", dp->value.l);
261 
262 	if (!whitelist_only) {
263 		/*
264 		 * We still have an ACPI ksp, search it again for
265 		 * 'preferred_pm_profile' (needs to be valid if we don't
266 		 * aren't only using a whitelist).
267 		 */
268 		dp = kstat_data_lookup(ksp, "preferred_pm_profile");
269 		if (dp == NULL) {
270 			mesg(MDEBUG, "kstat_data_lookup 'ppmp fails\n");
271 			(void) kstat_close(kc);
272 			return (do_ioctl(no, keyword, behavior, suppress));
273 		}
274 		mesg(MDEBUG, "kstat indicates preferred_pm_profile is %lx\n",
275 		    dp->value.l);
276 		preferred_pm_profile = dp->value.l;
277 	}
278 	(void) kstat_close(kc);
279 
280 	if ((shp = smbios_open(NULL,
281 	    SMB_VERSION, oflags, &ret)) == NULL) {
282 		/* we promised not to complain */
283 		/* we bail leaving it to the kernel default */
284 		mesg(MDEBUG, "smbios_open failed %d\n", errno);
285 		return (OKUP);
286 	}
287 	if ((id = smbios_info_system(shp, &sys)) == SMB_ERR) {
288 		mesg(MDEBUG, "smbios_info_system failed %d\n", errno);
289 		smbios_close(shp);
290 		return (OKUP);
291 	}
292 	if (smbios_info_common(shp, id, &info) == SMB_ERR) {
293 		mesg(MDEBUG, "smbios_info_common failed %d\n", errno);
294 		smbios_close(shp);
295 		return (OKUP);
296 	}
297 	mesg(MDEBUG, "Manufacturer: %s\n", info.smbi_manufacturer);
298 	mesg(MDEBUG, "Product: %s\n", info.smbi_product);
299 	smbios_close(shp);
300 
301 	if (!whitelist_only) {
302 #define	PPP_DESKTOP 1
303 #define	PPP_WORKSTATION 3
304 		if (strcmp(info.smbi_manufacturer, "Sun Microsystems") == 0 &&
305 		    (preferred_pm_profile == PPP_DESKTOP ||
306 		    preferred_pm_profile == PPP_WORKSTATION)) {
307 			if (isonlist(blacklist,
308 			    info.smbi_manufacturer, info.smbi_product)) {
309 				return (do_ioctl(no, keyword, behavior,
310 				    suppress));
311 			} else {
312 				ret = do_ioctl(yes, keyword, behavior,
313 				    suppress);
314 				*didyes = (ret == OKUP);
315 				return (ret);
316 			}
317 		}
318 	}
319 	if (isonlist(whitelist,
320 	    info.smbi_manufacturer, info.smbi_product)) {
321 		ret = do_ioctl(yes, keyword, behavior, suppress);
322 		*didyes = (ret == OKUP);
323 		return (ret);
324 	} else {
325 		return (do_ioctl(no, keyword, behavior, suppress));
326 	}
327 }
328 
329 int
330 S3sup(void)	/* S3-support keyword handler */
331 {
332 	struct btoc {
333 		char *behavior;
334 		int cmd;
335 	};
336 	static struct btoc blist[] = {
337 		"default",	PM_DEFAULT_ALGORITHM,
338 		"enable",	PM_ENABLE_S3,
339 		"disable",	PM_DISABLE_S3,
340 		NULL,		0
341 	};
342 	struct btoc *bp;
343 	char *behavior;
344 	int dontcare;
345 
346 	for (behavior = LINEARG(1), bp = blist; bp->cmd; bp++) {
347 		if (strcmp(behavior, bp->behavior) == 0)
348 			break;
349 	}
350 	if (bp->cmd == 0) {
351 		mesg(MERR, "invalid S3-support behavior \"%s\"\n", behavior);
352 		return (NOUP);
353 	}
354 
355 
356 	switch (bp->cmd) {
357 
358 	case PM_ENABLE_S3:
359 	case PM_DISABLE_S3:
360 		return (do_ioctl(bp->cmd, "S3-support", behavior, EBUSY));
361 
362 	case PM_DEFAULT_ALGORITHM:
363 		/*
364 		 * we suppress errors in the "default" case because we
365 		 * already did an invisible default call, so we know we'll
366 		 * get EBUSY
367 		 */
368 		return (S3_helper("S3-support-enable", "S3-support-disable",
369 		    PM_ENABLE_S3, PM_DISABLE_S3, "S3-support", behavior,
370 		    &dontcare, EBUSY));
371 
372 	default:
373 		mesg(MERR, "S3-support %s failed, %s\n", behavior,
374 		    strerror(errno));
375 		return (NOUP);
376 	}
377 }
378 
379 /*
380  * Check for valid autoS3 behavior and save after ioctl success.
381  */
382 int
383 autoS3(void)
384 {
385 	struct btoc {
386 		char *behavior;
387 		int cmd;
388 	};
389 	static struct btoc blist[] = {
390 		"default",	PM_DEFAULT_ALGORITHM,
391 		"disable",	PM_STOP_AUTOS3,
392 		"enable",	PM_START_AUTOS3,
393 		NULL,		0
394 	};
395 	struct btoc *bp;
396 	char *behavior;
397 	int dontcare;
398 
399 	for (behavior = LINEARG(1), bp = blist; bp->cmd; bp++) {
400 		if (strcmp(behavior, bp->behavior) == 0)
401 			break;
402 	}
403 	if (bp->cmd == 0) {
404 		mesg(MERR, "invalid autoS3 behavior \"%s\"\n", behavior);
405 		return (NOUP);
406 	}
407 
408 	switch (bp->cmd) {
409 	default:
410 		mesg(MERR, "autoS3 %s failed, %s\n",
411 		    behavior, strerror(errno));
412 		mesg(MDEBUG, "unknown command\n", bp->cmd);
413 		return (OKUP);
414 
415 	case PM_STOP_AUTOS3:
416 	case PM_START_AUTOS3:
417 		return (do_ioctl(bp->cmd, "autoS3", behavior, EBUSY));
418 
419 	case PM_DEFAULT_ALGORITHM:
420 		return (S3_helper("S3-autoenable", "S3-autodisable",
421 		    PM_START_AUTOS3, PM_STOP_AUTOS3, "autoS3", behavior,
422 		    &dontcare, EBUSY));
423 	}
424 }
425 
426 
427 /*
428  * Check for valid autopm behavior and save after ioctl success.
429  */
430 int
431 autopm(void)
432 {
433 	struct btoc {
434 		char *behavior;
435 		int cmd, Errno, isdef;
436 	};
437 	static struct btoc blist[] = {
438 		"default",	PM_START_PM,	-1,	1,
439 		"disable",	PM_STOP_PM,	EINVAL,	0,
440 		"enable",	PM_START_PM,	EBUSY,	0,
441 		NULL,		0,		0,	0,
442 	};
443 	struct btoc *bp;
444 	char *behavior;
445 
446 	for (behavior = LINEARG(1), bp = blist; bp->cmd; bp++) {
447 		if (strcmp(behavior, bp->behavior) == 0)
448 			break;
449 	}
450 	if (bp->cmd == 0) {
451 		mesg(MERR, "invalid autopm behavior \"%s\"\n", behavior);
452 		return (NOUP);
453 	}
454 
455 	/*
456 	 * for "default" behavior, do not enable autopm if not ESTAR_V3
457 	 */
458 #if defined(__sparc)
459 	if (!bp->isdef || (estar_vers == ESTAR_V3)) {
460 		if (ioctl(pm_fd, bp->cmd, NULL) == -1 && errno != bp->Errno) {
461 			mesg(MERR, "autopm %s failed, %s\n",
462 			    behavior, strerror(errno));
463 			return (NOUP);
464 		}
465 	}
466 	(void) strcpy(new_cc.apm_behavior, behavior);
467 	return (OKUP);
468 #endif
469 #if defined(__x86)
470 	if (!bp->isdef) {
471 		if (ioctl(pm_fd, bp->cmd, NULL) == -1 && errno != bp->Errno) {
472 			mesg(MERR, "autopm %s failed, %s\n",
473 			    behavior, strerror(errno));
474 			return (NOUP);
475 		}
476 		mesg(MDEBUG, "autopm %s succeeded\n", behavior);
477 
478 		return (OKUP);
479 	} else {
480 		int didenable;
481 		int ret = S3_helper("autopm-enable", "autopm-disable",
482 		    PM_START_PM, PM_STOP_PM, "autopm", behavior, &didenable,
483 		    bp->Errno);
484 		if (didenable) {
485 			/* tell powerd to attach all devices */
486 			new_cc.is_autopm_default = 1;
487 			(void) strcpy(new_cc.apm_behavior, behavior);
488 		}
489 		return (ret);
490 	}
491 #endif
492 }
493 
494 
495 static int
496 gethm(char *src, int *hour, int *min)
497 {
498 	if (sscanf(src, "%d:%d", hour, min) != 2) {
499 		mesg(MERR, "bad time format (%s)\n", src);
500 		return (-1);
501 	}
502 	return (0);
503 }
504 
505 
506 static void
507 strcpy_limit(char *dst, char *src, size_t limit, char *info)
508 {
509 	if (strlcpy(dst, src, limit) >= limit)
510 		mesg(MEXIT, "%s is too long (%s)\n", info, src);
511 }
512 
513 
514 /*
515  * Convert autoshutdown idle and start/finish times;
516  * check and record autoshutdown behavior.
517  */
518 int
519 autosd(void)
520 {
521 	char **bp, *behavior;
522 	char *unrec = gettext("unrecognized autoshutdown behavior");
523 	static char *blist[] = {
524 		"autowakeup", "default", "noshutdown",
525 		"shutdown", "unconfigured", NULL
526 	};
527 
528 	new_cc.as_idle = atoi(LINEARG(1));
529 	if (gethm(LINEARG(2), &new_cc.as_sh, &new_cc.as_sm) ||
530 	    gethm(LINEARG(3), &new_cc.as_fh, &new_cc.as_fm))
531 		return (NOUP);
532 	mesg(MDEBUG, "idle %d, start %d:%02d, finish %d:%02d\n",
533 	    new_cc.as_idle, new_cc.as_sh, new_cc.as_sm,
534 	    new_cc.as_fh, new_cc.as_fm);
535 
536 	for (behavior = LINEARG(4), bp = blist; *bp; bp++) {
537 		if (strcmp(behavior, *bp) == 0)
538 			break;
539 	}
540 	if (*bp == NULL) {
541 		mesg(MERR, "%s: \"%s\"\n", unrec, behavior);
542 		return (NOUP);
543 	}
544 	STRCPYLIM(new_cc.as_behavior, *bp, unrec);
545 	return (OKUP);
546 }
547 
548 
549 /*
550  * Check for a real device and try to resolve to a full path.
551  * The orig/resolved path may be modified into a prom pathname,
552  * and an allocated copy of the result is stored at *destp;
553  * the caller will need to free that space.  Returns 1 for any
554  * error, otherwise 0; also sets *errp after an alloc error.
555  */
556 static int
557 devpath(char **destp, char *src, int *errp)
558 {
559 	struct stat stbuf;
560 	char buf[PATH_MAX];
561 	char *cp, *dstr;
562 	int devok, dcs = 0;
563 	size_t len;
564 
565 	/*
566 	 * When there's a real device, try to resolve the path
567 	 * and trim the leading "/devices" component.
568 	 */
569 	if ((devok = (stat(src, &stbuf) == 0 && stbuf.st_rdev)) != 0) {
570 		if (realpath(src, buf) == NULL) {
571 			mesg(MERR, "realpath cannot resolve \"%s\"\n",
572 			    src, strerror(errno));
573 			return (1);
574 		}
575 		src = buf;
576 		dstr = "/devices";
577 		len = strlen(dstr);
578 		dcs = (strncmp(src, dstr, len) == 0);
579 		if (dcs)
580 			src += len;
581 	} else
582 		mesg(MDEBUG, stat_fmt, src, strerror(errno));
583 
584 	/*
585 	 * When the path has ":anything", display an error for
586 	 * a non-device or truncate a resolved+modifed path.
587 	 */
588 	if ((cp = strchr(src, ':')) != NULL) {
589 		if (devok == 0) {
590 			mesg(MERR, "physical path may not contain "
591 			    "a minor string (%s)\n", src);
592 			return (1);
593 		} else if (dcs)
594 			*cp = '\0';
595 	}
596 
597 	if ((*destp = strdup(src)) == NULL) {
598 		*errp = NOUP;
599 		mesg(MERR, alloc_fmt, src, strerror(errno));
600 	}
601 	return (*destp == NULL);
602 }
603 
604 
605 /*
606  * Call pm ioctl request(s) to set property/device dependencies.
607  */
608 static int
609 dev_dep_common(int isprop)
610 {
611 	int cmd, argn, upval = OKUP;
612 	char *src, *first, **destp;
613 	pm_req_t pmreq;
614 
615 	bzero(&pmreq, sizeof (pmreq));
616 	src = LINEARG(1);
617 	if (isprop) {
618 		cmd = PM_ADD_DEPENDENT_PROPERTY;
619 		first = NULL;
620 		pmreq.pmreq_kept = src;
621 	} else {
622 		cmd = PM_ADD_DEPENDENT;
623 		if (devpath(&first, src, &upval))
624 			return (upval);
625 		pmreq.pmreq_kept = first;
626 	}
627 	destp = &pmreq.pmreq_keeper;
628 
629 	/*
630 	 * Now loop through any dependents.
631 	 */
632 	for (argn = 2; (src = LINEARG(argn)) != NULL; argn++) {
633 		if (devpath(destp, src, &upval)) {
634 			if (upval != OKUP)
635 				return (upval);
636 			break;
637 		}
638 		if ((upval = ioctl(pm_fd, cmd, &pmreq)) == -1) {
639 			mesg(MDEBUG, "pm ioctl, cmd %d, errno %d\n"
640 			    "kept \"%s\", keeper \"%s\"\n",
641 			    cmd, errno, pmreq.pmreq_kept, pmreq.pmreq_keeper);
642 			mesg(MERR, "cannot set \"%s\" dependency "
643 			    "for \"%s\", %s\n", pmreq.pmreq_keeper,
644 			    pmreq.pmreq_kept, strerror(errno));
645 		}
646 		free(*destp);
647 		*destp = NULL;
648 		if (upval != OKUP)
649 			break;
650 	}
651 
652 	free(first);
653 	return (upval);
654 }
655 
656 
657 int
658 ddprop(void)
659 {
660 	return (dev_dep_common(1));
661 }
662 
663 
664 int
665 devdep(void)
666 {
667 	return (dev_dep_common(0));
668 }
669 
670 
671 /*
672  * Convert a numeric string (with a possible trailing scaling byte)
673  * into an integer.  Returns a converted value and *nerrp unchanged,
674  * or 0 with *nerrp set to 1 for a conversion error.
675  */
676 static int
677 get_scaled_value(char *str, int *nerrp)
678 {
679 	longlong_t svalue = 0, factor = 1;
680 	char *sp;
681 
682 	errno = 0;
683 	svalue = strtol(str, &sp, 0);
684 	if (errno || (*str != '-' && (*str < '0' || *str > '9')))
685 		*nerrp = 1;
686 	else if (sp && *sp != '\0') {
687 		if (*sp == 'h')
688 			factor = 3600;
689 		else if (*sp == 'm')
690 			factor = 60;
691 		else if (*sp != 's')
692 			*nerrp = 1;
693 	}
694 	/* any bytes following sp are ignored */
695 
696 	if (*nerrp == 0) {
697 		svalue *= factor;
698 		if (svalue < INT_MIN || svalue > INT_MAX)
699 			*nerrp = 1;
700 	}
701 	if (*nerrp)
702 		mesg(MERR, nerr_fmt, str);
703 	mesg(MDEBUG, "got scaled value %d\n", (int)svalue);
704 	return ((int)svalue);
705 }
706 
707 
708 /*
709  * Increment the count of threshold values,
710  * reallocate *vlistp and append another element.
711  * Returns 1 on error, otherwise 0.
712  */
713 static int
714 vlist_append(int **vlistp, int *vcntp, int value)
715 {
716 	(*vcntp)++;
717 	if ((*vlistp = realloc(*vlistp, *vcntp * sizeof (**vlistp))) != NULL)
718 		*(*vlistp + *vcntp - 1) = value;
719 	else
720 		mesg(MERR, alloc_fmt, "threshold list", strerror(errno));
721 	return (*vlistp == NULL);
722 }
723 
724 
725 /*
726  * Convert a single threshold string or paren groups of thresh's as
727  * described below.  All thresh's are saved to an allocated list at
728  * *vlistp; the caller will need to free that space.  On return:
729  * *vcntp is the count of the vlist array, and vlist is either
730  * a single thresh or N groups of thresh's with a trailing zero:
731  * (cnt_1 thr_1a thr_1b [...]) ... (cnt_N thr_Na thr_Nb [...]) 0.
732  * Returns 0 when all conversions were OK, and 1 for any syntax,
733  * conversion, or alloc error.
734  */
735 static int
736 get_thresh(int **vlistp, int *vcntp)
737 {
738 	int argn, value, gci = 0, grp_cnt = 0, paren = 0, nerr = 0;
739 	char *rp, *src;
740 
741 	for (argn = 2; (src = LINEARG(argn)) != NULL; argn++) {
742 		if (*src == LPAREN) {
743 			gci = *vcntp;
744 			if ((nerr = vlist_append(vlistp, vcntp, 0)) != 0)
745 				break;
746 			paren = 1;
747 			src++;
748 		}
749 		if (*(rp = LASTBYTE(src)) == RPAREN) {
750 			if (paren) {
751 				grp_cnt = *vcntp - gci;
752 				*(*vlistp + gci) = grp_cnt;
753 				paren = 0;
754 				*rp = '\0';
755 			} else {
756 				nerr = 1;
757 				break;
758 			}
759 		}
760 
761 		value = get_scaled_value(src, &nerr);
762 		if (nerr || (nerr = vlist_append(vlistp, vcntp, value)))
763 			break;
764 	}
765 
766 	if (nerr == 0 && grp_cnt)
767 		nerr = vlist_append(vlistp, vcntp, 0);
768 	return (nerr);
769 }
770 
771 
772 /*
773  * Set device thresholds from (3) formats:
774  * 	path	"always-on"
775  * 	path	time-spec: [0-9]+[{h,m,s}]
776  *	path	(ts1 ts2 ...)+
777  */
778 int
779 devthr(void)
780 {
781 	int cmd, upval = OKUP, nthresh = 0, *vlist = NULL;
782 	pm_req_t pmreq;
783 
784 	bzero(&pmreq, sizeof (pmreq));
785 	if (devpath(&pmreq.physpath, LINEARG(1), &upval))
786 		return (upval);
787 
788 	if (strcmp(LINEARG(2), always_on) == 0) {
789 		cmd = PM_SET_DEVICE_THRESHOLD;
790 		pmreq.value = INT_MAX;
791 	} else if (get_thresh(&vlist, &nthresh)) {
792 		mesg(MERR, bad_thresh_fmt);
793 		upval = NOUP;
794 	} else if (nthresh == 1) {
795 		pmreq.value = *vlist;
796 		cmd = PM_SET_DEVICE_THRESHOLD;
797 	} else {
798 		pmreq.data = vlist;
799 		pmreq.datasize = (nthresh * sizeof (*vlist));
800 		cmd = PM_SET_COMPONENT_THRESHOLDS;
801 	}
802 
803 	if (upval != NOUP && (upval = ioctl(pm_fd, cmd, &pmreq)) == -1)
804 		mesg(MERR, set_thresh_fmt, pmreq.physpath, strerror(errno));
805 
806 	free(vlist);
807 	free(pmreq.physpath);
808 	return (upval);
809 }
810 
811 
812 static int
813 scan_int(char *src, int *dst)
814 {
815 	long lval;
816 
817 	errno = 0;
818 
819 	lval = strtol(LINEARG(1), NULL, 0);
820 	if (errno || lval > INT_MAX || lval < 0) {
821 		mesg(MERR, nerr_fmt, src);
822 		return (NOUP);
823 	}
824 
825 	*dst = (int)lval;
826 	return (OKUP);
827 }
828 
829 static int
830 scan_float(char *src, float *dst)
831 {
832 	float fval;
833 
834 	errno = 0;
835 
836 	fval = strtof(src, NULL);
837 	if (errno || fval < 0.0) {
838 		mesg(MERR, nerr_fmt, src);
839 		return (NOUP);
840 	}
841 
842 	*dst = fval;
843 	return (OKUP);
844 }
845 
846 
847 int
848 dreads(void)
849 {
850 	return (scan_int(LINEARG(1), &new_cc.diskreads_thold));
851 }
852 
853 
854 /*
855  * Set pathname for idlecheck;
856  * an overflowed pathname is treated as a fatal error.
857  */
858 int
859 idlechk(void)
860 {
861 	STRCPYLIM(new_cc.idlecheck_path, LINEARG(1), "idle path");
862 	return (OKUP);
863 }
864 
865 
866 int
867 loadavg(void)
868 {
869 	return (scan_float(LINEARG(1), &new_cc.loadaverage_thold));
870 }
871 
872 
873 int
874 nfsreq(void)
875 {
876 	return (scan_int(LINEARG(1), &new_cc.nfsreqs_thold));
877 }
878 
879 #ifdef sparc
880 static char open_fmt[] = "cannot open \"%s\", %s\n";
881 
882 /*
883  * Verify the filesystem type for a regular statefile is "ufs"
884  * or verify a block device is not in use as a mounted filesytem.
885  * Returns 1 if any error, otherwise 0.
886  */
887 static int
888 check_mount(char *sfile, dev_t sfdev, int ufs)
889 {
890 	char *src, *err_fmt = NULL, *mnttab = MNTTAB;
891 	int rgent, match = 0;
892 	struct mnttab zroot = { 0 };
893 	struct mnttab entry;
894 	struct extmnttab ent;
895 	FILE *fp;
896 
897 	if ((fp = fopen(mnttab, "r")) == NULL) {
898 		mesg(MERR, open_fmt, mnttab, strerror(errno));
899 		return (1);
900 	}
901 
902 	if (ufs) {
903 		zroot.mnt_mountp = "/";
904 		zroot.mnt_fstype = "zfs";
905 		if (getmntany(fp, &entry, &zroot) == 0) {
906 			err_fmt = "ufs statefile with zfs root is not"
907 			    " supported\n";
908 			mesg(MERR, err_fmt, sfile);
909 			(void) fclose(fp);
910 			return (1);
911 		}
912 		resetmnttab(fp);
913 	}
914 	/*
915 	 * Search for a matching dev_t;
916 	 * ignore non-ufs filesystems for a regular statefile.
917 	 */
918 	while ((rgent = getextmntent(fp, &ent, sizeof (ent))) != -1) {
919 		if (rgent > 0) {
920 			mesg(MERR, "error reading \"%s\"\n", mnttab);
921 			(void) fclose(fp);
922 			return (1);
923 		} else if (ufs && strcmp(ent.mnt_fstype, "ufs"))
924 			continue;
925 		else if (makedev(ent.mnt_major, ent.mnt_minor) == sfdev) {
926 			match = 1;
927 			break;
928 		}
929 	}
930 
931 	/*
932 	 * No match is needed for a block device statefile,
933 	 * a match is needed for a regular statefile.
934 	 */
935 	if (match == 0) {
936 		if (new_cc.cf_type != CFT_UFS)
937 			STRCPYLIM(new_cc.cf_devfs, sfile, "block statefile");
938 		else
939 			err_fmt = "cannot find ufs mount point for \"%s\"\n";
940 	} else if (new_cc.cf_type == CFT_UFS) {
941 		STRCPYLIM(new_cc.cf_fs, ent.mnt_mountp, "mnt entry");
942 		STRCPYLIM(new_cc.cf_devfs, ent.mnt_special, "mnt special");
943 		while (*(sfile + 1) == '/') sfile++;
944 		src = sfile + strlen(ent.mnt_mountp);
945 		while (*src == '/') src++;
946 		STRCPYLIM(new_cc.cf_path, src, "statefile path");
947 	} else
948 		err_fmt = "statefile device \"%s\" is a mounted filesystem\n";
949 	(void) fclose(fp);
950 	if (err_fmt)
951 		mesg(MERR, err_fmt, sfile);
952 	return (err_fmt != NULL);
953 }
954 
955 
956 /*
957  * Convert a Unix device to a prom device and save on success,
958  * log any ioctl/conversion error.
959  */
960 static int
961 utop(char *fs_name, char *prom_name)
962 {
963 	union obpbuf {
964 		char	buf[OBP_MAXPATHLEN + sizeof (uint_t)];
965 		struct	openpromio oppio;
966 	};
967 	union obpbuf oppbuf;
968 	struct openpromio *opp;
969 	char *promdev = "/dev/openprom";
970 	int fd, upval;
971 
972 	if ((fd = open(promdev, O_RDONLY)) == -1) {
973 		mesg(MERR, open_fmt, promdev, strerror(errno));
974 		return (NOUP);
975 	}
976 
977 	opp = &oppbuf.oppio;
978 	opp->oprom_size = OBP_MAXPATHLEN;
979 	strcpy_limit(opp->oprom_array, fs_name,
980 	    OBP_MAXPATHLEN, "statefile device");
981 	upval = ioctl(fd, OPROMDEV2PROMNAME, opp);
982 	(void) close(fd);
983 	if (upval == OKUP) {
984 		strcpy_limit(prom_name, opp->oprom_array, OBP_MAXPATHLEN,
985 		    "prom device");
986 	} else {
987 		openlog("pmconfig", 0, LOG_DAEMON);
988 		syslog(LOG_NOTICE,
989 		    gettext("cannot convert \"%s\" to prom device"),
990 		    fs_name);
991 		closelog();
992 	}
993 
994 	return (upval);
995 }
996 
997 /*
998  * given the path to a zvol, return the cXtYdZ name
999  * returns < 0 on error, 0 if it isn't a zvol, > 1 on success
1000  */
1001 static int
1002 ztop(char *arg, char *diskname)
1003 {
1004 	zpool_handle_t *zpool_handle;
1005 	nvlist_t *config, *nvroot;
1006 	nvlist_t **child;
1007 	uint_t children;
1008 	libzfs_handle_t *lzfs;
1009 	char *vname;
1010 	char *p;
1011 	char pool_name[MAXPATHLEN];
1012 
1013 	if (strncmp(arg, "/dev/zvol/dsk/", 14)) {
1014 		return (0);
1015 	}
1016 	arg += 14;
1017 	(void) strncpy(pool_name, arg, MAXPATHLEN);
1018 	if (p = strchr(pool_name, '/'))
1019 		*p = '\0';
1020 	STRCPYLIM(new_cc.cf_fs, p + 1, "statefile path");
1021 
1022 	if ((lzfs = libzfs_init()) == NULL) {
1023 		mesg(MERR, "failed to initialize ZFS library\n");
1024 		return (-1);
1025 	}
1026 	if ((zpool_handle = zpool_open(lzfs, pool_name)) == NULL) {
1027 		mesg(MERR, "couldn't open pool '%s'\n", pool_name);
1028 		libzfs_fini(lzfs);
1029 		return (-1);
1030 	}
1031 	config = zpool_get_config(zpool_handle, NULL);
1032 	if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE,
1033 	    &nvroot) != 0) {
1034 		zpool_close(zpool_handle);
1035 		libzfs_fini(lzfs);
1036 		return (-1);
1037 	}
1038 	verify(nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN,
1039 	    &child, &children) == 0);
1040 	if (children != 1) {
1041 		mesg(MERR, "expected one vdev, got %d\n", children);
1042 		zpool_close(zpool_handle);
1043 		libzfs_fini(lzfs);
1044 		return (-1);
1045 	}
1046 	vname = zpool_vdev_name(lzfs, zpool_handle, child[0], B_FALSE);
1047 	if (vname == NULL) {
1048 		mesg(MERR, "couldn't determine vdev name\n");
1049 		zpool_close(zpool_handle);
1050 		libzfs_fini(lzfs);
1051 		return (-1);
1052 	}
1053 	(void) strcpy(diskname, "/dev/dsk/");
1054 	(void) strcat(diskname, vname);
1055 	free(vname);
1056 	zpool_close(zpool_handle);
1057 	libzfs_fini(lzfs);
1058 	return (1);
1059 }
1060 
1061 /*
1062  * returns NULL if the slice is good (e.g. does not start at block
1063  * zero, or a string describing the error if it doesn't
1064  */
1065 static boolean_t
1066 is_good_slice(char *sfile, char **err)
1067 {
1068 	int fd, rc;
1069 	struct vtoc vtoc;
1070 	dk_gpt_t *gpt;
1071 	char rdskname[MAXPATHLEN];
1072 	char *x, *y;
1073 
1074 	*err = NULL;
1075 	/* convert from dsk to rdsk */
1076 	STRCPYLIM(rdskname, sfile, "disk name");
1077 	x = strstr(rdskname, "dsk/");
1078 	y = strstr(sfile, "dsk/");
1079 	if (x != NULL) {
1080 		*x++ = 'r';
1081 		(void) strcpy(x, y);
1082 	}
1083 
1084 	if ((fd = open(rdskname, O_RDONLY)) == -1) {
1085 		*err = "could not open '%s'\n";
1086 	} else if ((rc = read_vtoc(fd, &vtoc)) >= 0) {
1087 		/*
1088 		 * we got a slice number; now check the block
1089 		 * number where the slice starts
1090 		 */
1091 		if (vtoc.v_part[rc].p_start < 2)
1092 			*err = "using '%s' would clobber the disk label\n";
1093 		(void) close(fd);
1094 		return (*err ? B_FALSE : B_TRUE);
1095 	} else if ((rc == VT_ENOTSUP) &&
1096 	    (efi_alloc_and_read(fd, &gpt)) >= 0) {
1097 		/* EFI slices don't clobber the disk label */
1098 		free(gpt);
1099 		(void) close(fd);
1100 		return (B_TRUE);
1101 	} else
1102 		*err = "could not read partition table from '%s'\n";
1103 	return (B_FALSE);
1104 }
1105 
1106 /*
1107  * Check for a valid statefile pathname, inode and mount status.
1108  */
1109 int
1110 sfpath(void)
1111 {
1112 	static int statefile;
1113 	char *err_fmt = NULL;
1114 	char *sfile, *sp, ch;
1115 	char diskname[256];
1116 	struct stat stbuf;
1117 	int dir = 0;
1118 	dev_t dev;
1119 
1120 	if (statefile) {
1121 		mesg(MERR, "ignored redundant statefile entry\n");
1122 		return (OKUP);
1123 	} else if (ua_err) {
1124 		if (ua_err != ENOTSUP)
1125 			mesg(MERR, "uadmin(A_FREEZE, A_CHECK, 0): %s\n",
1126 			    strerror(ua_err));
1127 		return (NOUP);
1128 	}
1129 
1130 	/*
1131 	 * Check for an absolute path and trim any trailing '/'.
1132 	 */
1133 	sfile = LINEARG(1);
1134 	if (*sfile != '/') {
1135 		mesg(MERR, "statefile requires an absolute path\n");
1136 		return (NOUP);
1137 	}
1138 	for (sp = sfile + strlen(sfile) - 1; sp > sfile && *sp == '/'; sp--)
1139 		*sp = '\0';
1140 
1141 	/*
1142 	 * If the statefile doesn't exist, the leading path must be a dir.
1143 	 */
1144 	if (stat(sfile, &stbuf) == -1) {
1145 		if (errno == ENOENT) {
1146 			dir = 1;
1147 			if ((sp = strrchr(sfile, '/')) == sfile)
1148 				sp++;
1149 			ch = *sp;
1150 			*sp = '\0';
1151 			if (stat(sfile, &stbuf) == -1)
1152 				err_fmt = stat_fmt;
1153 			*sp = ch;
1154 		} else
1155 			err_fmt = stat_fmt;
1156 		if (err_fmt) {
1157 			mesg(MERR, err_fmt, sfile, strerror(errno));
1158 			return (NOUP);
1159 		}
1160 	}
1161 
1162 	/*
1163 	 * Check for regular/dir/block types, set cf_type and dev.
1164 	 */
1165 	if (S_ISREG(stbuf.st_mode) || (dir && S_ISDIR(stbuf.st_mode))) {
1166 		new_cc.cf_type = CFT_UFS;
1167 		dev = stbuf.st_dev;
1168 	} else if (S_ISBLK(stbuf.st_mode)) {
1169 		if (is_good_slice(sfile, &err_fmt)) {
1170 			switch (ztop(sfile, diskname)) {
1171 				case 1:
1172 					new_cc.cf_type = CFT_ZVOL;
1173 					break;
1174 				case 0:
1175 					new_cc.cf_type = CFT_SPEC;
1176 					break;
1177 				case -1:
1178 				default:
1179 					return (NOUP);
1180 			}
1181 			dev = stbuf.st_rdev;
1182 		}
1183 	} else
1184 		err_fmt = "bad file type for \"%s\"\n"
1185 		    "statefile must be a regular file or block device\n";
1186 	if (err_fmt) {
1187 		mesg(MERR, err_fmt, sfile);
1188 		return (NOUP);
1189 	}
1190 	if (check_mount(sfile, dev, (new_cc.cf_type == CFT_UFS)))
1191 		return (NOUP);
1192 	if (new_cc.cf_type == CFT_ZVOL) {
1193 		if (utop(diskname, new_cc.cf_dev_prom))
1194 			return (NOUP);
1195 	} else if (utop(new_cc.cf_devfs, new_cc.cf_dev_prom)) {
1196 		return (NOUP);
1197 	}
1198 	new_cc.cf_magic = CPR_CONFIG_MAGIC;
1199 	statefile = 1;
1200 	return (OKUP);
1201 }
1202 #endif /* sparc */
1203 
1204 
1205 /*
1206  * Common function to set a system or cpu threshold.
1207  */
1208 static int
1209 cmnthr(int req)
1210 {
1211 	int value, nerr = 0, upval = OKUP;
1212 	char *thresh = LINEARG(1);
1213 
1214 	if (strcmp(thresh, always_on) == 0)
1215 		value = INT_MAX;
1216 	else if ((value = get_scaled_value(thresh, &nerr)) < 0 || nerr) {
1217 		mesg(MERR, "%s must be a positive value\n", LINEARG(0));
1218 		upval = NOUP;
1219 	}
1220 	if (upval == OKUP)
1221 		(void) ioctl(pm_fd, req, value);
1222 	return (upval);
1223 }
1224 
1225 
1226 /*
1227  * Try setting system threshold.
1228  */
1229 int
1230 systhr(void)
1231 {
1232 	return (cmnthr(PM_SET_SYSTEM_THRESHOLD));
1233 }
1234 
1235 
1236 /*
1237  * Try setting cpu threshold.
1238  */
1239 int
1240 cputhr(void)
1241 {
1242 	return (cmnthr(PM_SET_CPU_THRESHOLD));
1243 }
1244 
1245 
1246 int
1247 tchars(void)
1248 {
1249 	return (scan_int(LINEARG(1), &new_cc.ttychars_thold));
1250 }
1251