1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 #include "pmconfig.h" 29 #include <sys/mkdev.h> 30 #include <sys/syslog.h> 31 #include <sys/openpromio.h> 32 #include <sys/mnttab.h> 33 #include <sys/vtoc.h> 34 #include <sys/efi_partition.h> 35 #include <syslog.h> 36 #include <stdlib.h> 37 #include <sys/pm.h> 38 #include <kstat.h> 39 #include <sys/smbios.h> 40 #include <libzfs.h> 41 42 43 #define STRCPYLIM(dst, src, str) strcpy_limit(dst, src, sizeof (dst), str) 44 #define LASTBYTE(str) (str + strlen(str) - 1) 45 46 static char nerr_fmt[] = "number is out of range (%s)\n"; 47 static char alloc_fmt[] = "cannot allocate space for \"%s\", %s\n"; 48 static char set_thresh_fmt[] = "error setting threshold(s) for \"%s\", %s\n"; 49 static char bad_thresh_fmt[] = "bad threshold(s)\n"; 50 static char stat_fmt[] = "cannot stat \"%s\", %s\n"; 51 static char always_on[] = "always-on"; 52 53 #define PM_DEFAULT_ALGORITHM -1 54 /* 55 * When lines in a config file (usually "/etc/power.conf") start with 56 * a recognized keyword, a "handler" routine is called for specific 57 * CPR or PM -related action(s). Each routine returns a status code 58 * indicating whether all tasks were successful; if any errors occured, 59 * future CPR or PM updates are skipped. Following are the handler 60 * routines for all keywords: 61 */ 62 63 64 static char pm_cmd_string[32]; 65 66 static char * 67 pm_map(int cmd) 68 { 69 pm_req_t req; 70 71 req.value = cmd; 72 req.data = (void *)pm_cmd_string; 73 req.datasize = sizeof (pm_cmd_string); 74 75 if (ioctl(pm_fd, PM_GET_CMD_NAME, &req) < 0) { 76 perror(gettext("PM_GET_CMD_NAME failed:")); 77 return ("??"); 78 } 79 return (pm_cmd_string); 80 } 81 82 static int 83 isonlist(char *listname, const char *man, const char *prod) 84 { 85 pm_searchargs_t sl; 86 int ret; 87 88 sl.pms_listname = listname; 89 sl.pms_manufacturer = (char *)man; 90 sl.pms_product = (char *)prod; 91 ret = ioctl(pm_fd, PM_SEARCH_LIST, &sl); 92 mesg(MDEBUG, "PM_SEARCH_LIST %s for %s,%s returns %d\n", 93 listname, man, prod, ret); 94 return (ret == 0); 95 } 96 97 static int 98 do_ioctl(int ioctl_cmd, char *keyword, char *behavior, int suppress) 99 { 100 mesg(MDEBUG, "doing ioctl %s for %s ", pm_map(ioctl_cmd), keyword); 101 if (ioctl(pm_fd, ioctl_cmd, NULL) == -1) { 102 int suppressed = suppress == -1 || suppress == errno; 103 if (!suppressed) { 104 mesg(MERR, "%s %s failed, %s\n", keyword, behavior, 105 strerror(errno)); 106 return (NOUP); 107 } else { 108 mesg(MDEBUG, "%s %s failed, %s\n", keyword, behavior, 109 strerror(errno)); 110 return (OKUP); 111 } 112 } 113 mesg(MDEBUG, "succeeded\n"); 114 return (OKUP); 115 } 116 117 /* 118 * Check for valid cpupm behavior and communicate it to the kernel. 119 */ 120 int 121 cpupm(void) 122 { 123 struct btoc { 124 char *behavior; 125 int cmd; 126 int Errno; 127 }; 128 static struct btoc blist[] = { 129 "disable", PM_STOP_CPUPM, EINVAL, 130 "enable", PM_START_CPUPM, EBUSY, 131 NULL, 0, 0 132 }; 133 struct btoc *bp; 134 char *behavior; 135 136 for (behavior = LINEARG(1), bp = blist; bp->cmd; bp++) { 137 if (strcmp(behavior, bp->behavior) == 0) 138 break; 139 } 140 if (bp->cmd == 0) { 141 mesg(MERR, "invalid cpupm behavior \"%s\"\n", behavior); 142 return (NOUP); 143 } 144 if (ioctl(pm_fd, bp->cmd, NULL) == -1 && errno != bp->Errno) { 145 mesg(MERR, "cpupm %s failed, %s\n", 146 behavior, strerror(errno)); 147 return (NOUP); 148 } 149 return (OKUP); 150 } 151 152 153 /* 154 * Two decisions are identical except for the list names and ioctl commands 155 * inputs: whitelist, blacklist, yes, no 156 * if (! ("S3" kstat exists)) 157 * return (no) 158 * if (SystemInformation.Manufacturer == "Sun Microsystems" && 159 * (Pref_PM_Profile == Workstation || Pref_PM_Profile == Desktop)) { 160 * if (platform on blacklist) 161 * return (no) 162 * return (yes) 163 * } else { 164 * if (platform on whitelist) 165 * return (yes) 166 * return (no) 167 * } 168 */ 169 170 int 171 S3_helper(char *whitelist, char *blacklist, int yes, int no, char *keyword, 172 char *behavior, int *didyes, int suppress) 173 { 174 int oflags = SMB_O_NOCKSUM | SMB_O_NOVERS; 175 smbios_hdl_t *shp; 176 smbios_system_t sys; 177 id_t id; 178 int ret; 179 kstat_ctl_t *kc; 180 kstat_t *ksp; 181 kstat_named_t *dp; 182 smbios_info_t info; 183 int preferred_pm_profile = 0; 184 char yesstr[32], nostr[32]; /* DEBUG */ 185 186 *didyes = 0; 187 188 strncpy(yesstr, pm_map(yes), sizeof (yesstr)); 189 strncpy(nostr, pm_map(no), sizeof (nostr)); 190 mesg(MDEBUG, "S3_helper(%s, %s, %s, %s, %s, %s)\n", whitelist, 191 blacklist, yesstr, nostr, keyword, behavior); 192 if ((kc = kstat_open()) == NULL) { 193 mesg(MDEBUG, "kstat_open failed\n"); 194 return (OKUP); 195 } 196 ksp = kstat_lookup(kc, "acpi", -1, "acpi"); 197 if (ksp == NULL) { 198 mesg(MDEBUG, "kstat_lookup 'acpi', -1, 'acpi' failed\n"); 199 kstat_close(kc); 200 return (OKUP); 201 } 202 (void) kstat_read(kc, ksp, NULL); 203 dp = kstat_data_lookup(ksp, "S3"); 204 if (dp == NULL || dp->value.l == 0) { 205 mesg(MDEBUG, "kstat_data_lookup 'S3' fails\n"); 206 if (dp != NULL) 207 mesg(MDEBUG, "value.l %lx\n", dp->value.l); 208 kstat_close(kc); 209 return (do_ioctl(no, keyword, behavior, suppress)); 210 } 211 mesg(MDEBUG, "kstat indicates S3 support (%lx)\n", dp->value.l); 212 213 if (!whitelist_only) { 214 /* 215 * We still have an ACPI ksp, search it again for 216 * 'preferred_pm_profile' (needs to be valid if we don't 217 * aren't only using a whitelist). 218 */ 219 dp = kstat_data_lookup(ksp, "preferred_pm_profile"); 220 if (dp == NULL) { 221 mesg(MDEBUG, "kstat_data_lookup 'ppmp fails\n"); 222 kstat_close(kc); 223 return (do_ioctl(no, keyword, behavior, suppress)); 224 } 225 mesg(MDEBUG, "kstat indicates preferred_pm_profile is %lx\n", 226 dp->value.l); 227 preferred_pm_profile = dp->value.l; 228 } 229 kstat_close(kc); 230 231 if ((shp = smbios_open(NULL, 232 SMB_VERSION, oflags, &ret)) == NULL) { 233 /* we promised not to complain */ 234 /* we bail leaving it to the kernel default */ 235 mesg(MDEBUG, "smbios_open failed %d\n", errno); 236 return (OKUP); 237 } 238 if ((id = smbios_info_system(shp, &sys)) == SMB_ERR) { 239 mesg(MDEBUG, "smbios_info_system failed %d\n", errno); 240 smbios_close(shp); 241 return (OKUP); 242 } 243 if (smbios_info_common(shp, id, &info) == SMB_ERR) { 244 mesg(MDEBUG, "smbios_info_common failed %d\n", errno); 245 smbios_close(shp); 246 return (OKUP); 247 } 248 mesg(MDEBUG, "Manufacturer: %s\n", info.smbi_manufacturer); 249 mesg(MDEBUG, "Product: %s\n", info.smbi_product); 250 smbios_close(shp); 251 252 if (!whitelist_only) { 253 #define PPP_DESKTOP 1 254 #define PPP_WORKSTATION 3 255 if (strcmp(info.smbi_manufacturer, "Sun Microsystems") == 0 && 256 (preferred_pm_profile == PPP_DESKTOP || 257 preferred_pm_profile == PPP_WORKSTATION)) { 258 if (isonlist(blacklist, 259 info.smbi_manufacturer, info.smbi_product)) { 260 return (do_ioctl(no, keyword, behavior, 261 suppress)); 262 } else { 263 ret = do_ioctl(yes, keyword, behavior, 264 suppress); 265 *didyes = (ret == OKUP); 266 return (ret); 267 } 268 } 269 } 270 if (isonlist(whitelist, 271 info.smbi_manufacturer, info.smbi_product)) { 272 ret = do_ioctl(yes, keyword, behavior, suppress); 273 *didyes = (ret == OKUP); 274 return (ret); 275 } else { 276 return (do_ioctl(no, keyword, behavior, suppress)); 277 } 278 } 279 280 int 281 S3sup(void) /* S3-support keyword handler */ 282 { 283 struct btoc { 284 char *behavior; 285 int cmd; 286 }; 287 static struct btoc blist[] = { 288 "default", PM_DEFAULT_ALGORITHM, 289 "enable", PM_ENABLE_S3, 290 "disable", PM_DISABLE_S3, 291 NULL, 0 292 }; 293 struct btoc *bp; 294 char *behavior; 295 int dontcare; 296 297 for (behavior = LINEARG(1), bp = blist; bp->cmd; bp++) { 298 if (strcmp(behavior, bp->behavior) == 0) 299 break; 300 } 301 if (bp->cmd == 0) { 302 mesg(MERR, "invalid S3-support behavior \"%s\"\n", behavior); 303 return (NOUP); 304 } 305 306 307 switch (bp->cmd) { 308 309 case PM_ENABLE_S3: 310 case PM_DISABLE_S3: 311 return (do_ioctl(bp->cmd, "S3-support", behavior, EBUSY)); 312 313 case PM_DEFAULT_ALGORITHM: 314 /* 315 * we suppress errors in the "default" case because we 316 * already did an invisible default call, so we know we'll 317 * get EBUSY 318 */ 319 return (S3_helper("S3-support-enable", "S3-support-disable", 320 PM_ENABLE_S3, PM_DISABLE_S3, "S3-support", behavior, 321 &dontcare, EBUSY)); 322 323 default: 324 mesg(MERR, "S3-support %s failed, %s\n", behavior, 325 strerror(errno)); 326 return (NOUP); 327 } 328 } 329 330 /* 331 * Check for valid autoS3 behavior and save after ioctl success. 332 */ 333 int 334 autoS3(void) 335 { 336 struct btoc { 337 char *behavior; 338 int cmd; 339 }; 340 static struct btoc blist[] = { 341 "default", PM_DEFAULT_ALGORITHM, 342 "disable", PM_STOP_AUTOS3, 343 "enable", PM_START_AUTOS3, 344 NULL, 0 345 }; 346 struct btoc *bp; 347 char *behavior; 348 int dontcare; 349 350 for (behavior = LINEARG(1), bp = blist; bp->cmd; bp++) { 351 if (strcmp(behavior, bp->behavior) == 0) 352 break; 353 } 354 if (bp->cmd == 0) { 355 mesg(MERR, "invalid autoS3 behavior \"%s\"\n", behavior); 356 return (NOUP); 357 } 358 359 switch (bp->cmd) { 360 default: 361 mesg(MERR, "autoS3 %s failed, %s\n", 362 behavior, strerror(errno)); 363 mesg(MDEBUG, "unknown command\n", bp->cmd); 364 return (OKUP); 365 366 case PM_STOP_AUTOS3: 367 case PM_START_AUTOS3: 368 return (do_ioctl(bp->cmd, "autoS3", behavior, EBUSY)); 369 370 case PM_DEFAULT_ALGORITHM: 371 return (S3_helper("S3-autoenable", "S3-autodisable", 372 PM_START_AUTOS3, PM_STOP_AUTOS3, "autoS3", behavior, 373 &dontcare, EBUSY)); 374 } 375 } 376 377 378 /* 379 * Check for valid autopm behavior and save after ioctl success. 380 */ 381 int 382 autopm(void) 383 { 384 struct btoc { 385 char *behavior; 386 int cmd, Errno, isdef; 387 }; 388 static struct btoc blist[] = { 389 "default", PM_START_PM, -1, 1, 390 "disable", PM_STOP_PM, EINVAL, 0, 391 "enable", PM_START_PM, EBUSY, 0, 392 NULL, 0, 0, 0, 393 }; 394 struct btoc *bp; 395 char *behavior; 396 397 for (behavior = LINEARG(1), bp = blist; bp->cmd; bp++) { 398 if (strcmp(behavior, bp->behavior) == 0) 399 break; 400 } 401 if (bp->cmd == 0) { 402 mesg(MERR, "invalid autopm behavior \"%s\"\n", behavior); 403 return (NOUP); 404 } 405 406 /* 407 * for "default" behavior, do not enable autopm if not ESTAR_V3 408 */ 409 #if defined(__sparc) 410 if (!bp->isdef || (estar_vers == ESTAR_V3)) { 411 if (ioctl(pm_fd, bp->cmd, NULL) == -1 && errno != bp->Errno) { 412 mesg(MERR, "autopm %s failed, %s\n", 413 behavior, strerror(errno)); 414 return (NOUP); 415 } 416 } 417 (void) strcpy(new_cc.apm_behavior, behavior); 418 return (OKUP); 419 #endif 420 #if defined(__x86) 421 if (!bp->isdef) { 422 if (ioctl(pm_fd, bp->cmd, NULL) == -1 && errno != bp->Errno) { 423 mesg(MERR, "autopm %s failed, %s\n", 424 behavior, strerror(errno)); 425 return (NOUP); 426 } 427 mesg(MDEBUG, "autopm %s succeeded\n", behavior); 428 429 return (OKUP); 430 } else { 431 int didenable; 432 int ret = S3_helper("autopm-enable", "autopm-disable", 433 PM_START_PM, PM_STOP_PM, "autopm", behavior, &didenable, 434 bp->Errno); 435 if (didenable) { 436 /* tell powerd to attach all devices */ 437 new_cc.is_autopm_default = 1; 438 (void) strcpy(new_cc.apm_behavior, behavior); 439 } 440 return (ret); 441 } 442 #endif 443 } 444 445 446 static int 447 gethm(char *src, int *hour, int *min) 448 { 449 if (sscanf(src, "%d:%d", hour, min) != 2) { 450 mesg(MERR, "bad time format (%s)\n", src); 451 return (-1); 452 } 453 return (0); 454 } 455 456 457 static void 458 strcpy_limit(char *dst, char *src, size_t limit, char *info) 459 { 460 if (strlcpy(dst, src, limit) >= limit) 461 mesg(MEXIT, "%s is too long (%s)\n", info, src); 462 } 463 464 465 /* 466 * Convert autoshutdown idle and start/finish times; 467 * check and record autoshutdown behavior. 468 */ 469 int 470 autosd(void) 471 { 472 char **bp, *behavior; 473 char *unrec = gettext("unrecognized autoshutdown behavior"); 474 static char *blist[] = { 475 "autowakeup", "default", "noshutdown", 476 "shutdown", "unconfigured", NULL 477 }; 478 479 new_cc.as_idle = atoi(LINEARG(1)); 480 if (gethm(LINEARG(2), &new_cc.as_sh, &new_cc.as_sm) || 481 gethm(LINEARG(3), &new_cc.as_fh, &new_cc.as_fm)) 482 return (NOUP); 483 mesg(MDEBUG, "idle %d, start %d:%02d, finish %d:%02d\n", 484 new_cc.as_idle, new_cc.as_sh, new_cc.as_sm, 485 new_cc.as_fh, new_cc.as_fm); 486 487 for (behavior = LINEARG(4), bp = blist; *bp; bp++) { 488 if (strcmp(behavior, *bp) == 0) 489 break; 490 } 491 if (*bp == NULL) { 492 mesg(MERR, "%s: \"%s\"\n", unrec, behavior); 493 return (NOUP); 494 } 495 STRCPYLIM(new_cc.as_behavior, *bp, unrec); 496 return (OKUP); 497 } 498 499 500 /* 501 * Check for a real device and try to resolve to a full path. 502 * The orig/resolved path may be modified into a prom pathname, 503 * and an allocated copy of the result is stored at *destp; 504 * the caller will need to free that space. Returns 1 for any 505 * error, otherwise 0; also sets *errp after an alloc error. 506 */ 507 static int 508 devpath(char **destp, char *src, int *errp) 509 { 510 struct stat stbuf; 511 char buf[PATH_MAX]; 512 char *cp, *dstr; 513 int devok, dcs = 0; 514 size_t len; 515 516 /* 517 * When there's a real device, try to resolve the path 518 * and trim the leading "/devices" component. 519 */ 520 if ((devok = (stat(src, &stbuf) == 0 && stbuf.st_rdev)) != 0) { 521 if (realpath(src, buf) == NULL) { 522 mesg(MERR, "realpath cannot resolve \"%s\"\n", 523 src, strerror(errno)); 524 return (1); 525 } 526 src = buf; 527 dstr = "/devices"; 528 len = strlen(dstr); 529 dcs = (strncmp(src, dstr, len) == 0); 530 if (dcs) 531 src += len; 532 } else 533 mesg(MDEBUG, stat_fmt, src, strerror(errno)); 534 535 /* 536 * When the path has ":anything", display an error for 537 * a non-device or truncate a resolved+modifed path. 538 */ 539 if (cp = strchr(src, ':')) { 540 if (devok == 0) { 541 mesg(MERR, "physical path may not contain " 542 "a minor string (%s)\n", src); 543 return (1); 544 } else if (dcs) 545 *cp = '\0'; 546 } 547 548 if ((*destp = strdup(src)) == NULL) { 549 *errp = NOUP; 550 mesg(MERR, alloc_fmt, src, strerror(errno)); 551 } 552 return (*destp == NULL); 553 } 554 555 556 /* 557 * Call pm ioctl request(s) to set property/device dependencies. 558 */ 559 static int 560 dev_dep_common(int isprop) 561 { 562 int cmd, argn, upval = OKUP; 563 char *src, *first, **destp; 564 pm_req_t pmreq; 565 566 bzero(&pmreq, sizeof (pmreq)); 567 src = LINEARG(1); 568 if (isprop) { 569 cmd = PM_ADD_DEPENDENT_PROPERTY; 570 first = NULL; 571 pmreq.pmreq_kept = src; 572 } else { 573 cmd = PM_ADD_DEPENDENT; 574 if (devpath(&first, src, &upval)) 575 return (upval); 576 pmreq.pmreq_kept = first; 577 } 578 destp = &pmreq.pmreq_keeper; 579 580 /* 581 * Now loop through any dependents. 582 */ 583 for (argn = 2; (src = LINEARG(argn)) != NULL; argn++) { 584 if (devpath(destp, src, &upval)) { 585 if (upval != OKUP) 586 return (upval); 587 break; 588 } 589 if ((upval = ioctl(pm_fd, cmd, &pmreq)) == -1) { 590 mesg(MDEBUG, "pm ioctl, cmd %d, errno %d\n" 591 "kept \"%s\", keeper \"%s\"\n", 592 cmd, errno, pmreq.pmreq_kept, pmreq.pmreq_keeper); 593 mesg(MERR, "cannot set \"%s\" dependency " 594 "for \"%s\", %s\n", pmreq.pmreq_keeper, 595 pmreq.pmreq_kept, strerror(errno)); 596 } 597 free(*destp); 598 *destp = NULL; 599 if (upval != OKUP) 600 break; 601 } 602 603 free(first); 604 return (upval); 605 } 606 607 608 int 609 ddprop(void) 610 { 611 return (dev_dep_common(1)); 612 } 613 614 615 int 616 devdep(void) 617 { 618 return (dev_dep_common(0)); 619 } 620 621 622 /* 623 * Convert a numeric string (with a possible trailing scaling byte) 624 * into an integer. Returns a converted value and *nerrp unchanged, 625 * or 0 with *nerrp set to 1 for a conversion error. 626 */ 627 static int 628 get_scaled_value(char *str, int *nerrp) 629 { 630 longlong_t svalue = 0, factor = 1; 631 char *sp; 632 633 errno = 0; 634 svalue = strtol(str, &sp, 0); 635 if (errno || (*str != '-' && (*str < '0' || *str > '9'))) 636 *nerrp = 1; 637 else if (sp && *sp != '\0') { 638 if (*sp == 'h') 639 factor = 3600; 640 else if (*sp == 'm') 641 factor = 60; 642 else if (*sp != 's') 643 *nerrp = 1; 644 } 645 /* any bytes following sp are ignored */ 646 647 if (*nerrp == 0) { 648 svalue *= factor; 649 if (svalue < INT_MIN || svalue > INT_MAX) 650 *nerrp = 1; 651 } 652 if (*nerrp) 653 mesg(MERR, nerr_fmt, str); 654 mesg(MDEBUG, "got scaled value %d\n", (int)svalue); 655 return ((int)svalue); 656 } 657 658 659 /* 660 * Increment the count of threshold values, 661 * reallocate *vlistp and append another element. 662 * Returns 1 on error, otherwise 0. 663 */ 664 static int 665 vlist_append(int **vlistp, int *vcntp, int value) 666 { 667 (*vcntp)++; 668 if (*vlistp = realloc(*vlistp, *vcntp * sizeof (**vlistp))) 669 *(*vlistp + *vcntp - 1) = value; 670 else 671 mesg(MERR, alloc_fmt, "threshold list", strerror(errno)); 672 return (*vlistp == NULL); 673 } 674 675 676 /* 677 * Convert a single threshold string or paren groups of thresh's as 678 * described below. All thresh's are saved to an allocated list at 679 * *vlistp; the caller will need to free that space. On return: 680 * *vcntp is the count of the vlist array, and vlist is either 681 * a single thresh or N groups of thresh's with a trailing zero: 682 * (cnt_1 thr_1a thr_1b [...]) ... (cnt_N thr_Na thr_Nb [...]) 0. 683 * Returns 0 when all conversions were OK, and 1 for any syntax, 684 * conversion, or alloc error. 685 */ 686 static int 687 get_thresh(int **vlistp, int *vcntp) 688 { 689 int argn, value, gci, grp_cnt = 0, paren = 0, nerr = 0; 690 char *rp, *src; 691 692 for (argn = 2; (src = LINEARG(argn)) != NULL; argn++) { 693 if (*src == LPAREN) { 694 gci = *vcntp; 695 if (nerr = vlist_append(vlistp, vcntp, 0)) 696 break; 697 paren = 1; 698 src++; 699 } 700 if (*(rp = LASTBYTE(src)) == RPAREN) { 701 if (paren) { 702 grp_cnt = *vcntp - gci; 703 *(*vlistp + gci) = grp_cnt; 704 paren = 0; 705 *rp = '\0'; 706 } else { 707 nerr = 1; 708 break; 709 } 710 } 711 712 value = get_scaled_value(src, &nerr); 713 if (nerr || (nerr = vlist_append(vlistp, vcntp, value))) 714 break; 715 } 716 717 if (nerr == 0 && grp_cnt) 718 nerr = vlist_append(vlistp, vcntp, 0); 719 return (nerr); 720 } 721 722 723 /* 724 * Set device thresholds from (3) formats: 725 * path "always-on" 726 * path time-spec: [0-9]+[{h,m,s}] 727 * path (ts1 ts2 ...)+ 728 */ 729 int 730 devthr(void) 731 { 732 int cmd, upval = OKUP, nthresh = 0, *vlist = NULL; 733 pm_req_t pmreq; 734 735 bzero(&pmreq, sizeof (pmreq)); 736 if (devpath(&pmreq.physpath, LINEARG(1), &upval)) 737 return (upval); 738 739 if (strcmp(LINEARG(2), always_on) == 0) { 740 cmd = PM_SET_DEVICE_THRESHOLD; 741 pmreq.value = INT_MAX; 742 } else if (get_thresh(&vlist, &nthresh)) { 743 mesg(MERR, bad_thresh_fmt); 744 upval = NOUP; 745 } else if (nthresh == 1) { 746 pmreq.value = *vlist; 747 cmd = PM_SET_DEVICE_THRESHOLD; 748 } else { 749 pmreq.data = vlist; 750 pmreq.datasize = (nthresh * sizeof (*vlist)); 751 cmd = PM_SET_COMPONENT_THRESHOLDS; 752 } 753 754 if (upval != NOUP && (upval = ioctl(pm_fd, cmd, &pmreq)) == -1) 755 mesg(MERR, set_thresh_fmt, pmreq.physpath, strerror(errno)); 756 757 free(vlist); 758 free(pmreq.physpath); 759 return (upval); 760 } 761 762 763 static int 764 scan_int(char *src, int *dst) 765 { 766 long lval; 767 768 errno = 0; 769 770 lval = strtol(LINEARG(1), NULL, 0); 771 if (errno || lval > INT_MAX || lval < 0) { 772 mesg(MERR, nerr_fmt, src); 773 return (NOUP); 774 } 775 776 *dst = (int)lval; 777 return (OKUP); 778 } 779 780 static int 781 scan_float(char *src, float *dst) 782 { 783 float fval; 784 785 errno = 0; 786 787 fval = strtof(src, NULL); 788 if (errno || fval < 0.0) { 789 mesg(MERR, nerr_fmt, src); 790 return (NOUP); 791 } 792 793 *dst = fval; 794 return (OKUP); 795 } 796 797 798 int 799 dreads(void) 800 { 801 return (scan_int(LINEARG(1), &new_cc.diskreads_thold)); 802 } 803 804 805 /* 806 * Set pathname for idlecheck; 807 * an overflowed pathname is treated as a fatal error. 808 */ 809 int 810 idlechk(void) 811 { 812 STRCPYLIM(new_cc.idlecheck_path, LINEARG(1), "idle path"); 813 return (OKUP); 814 } 815 816 817 int 818 loadavg(void) 819 { 820 return (scan_float(LINEARG(1), &new_cc.loadaverage_thold)); 821 } 822 823 824 int 825 nfsreq(void) 826 { 827 return (scan_int(LINEARG(1), &new_cc.nfsreqs_thold)); 828 } 829 830 #ifdef sparc 831 static char open_fmt[] = "cannot open \"%s\", %s\n"; 832 833 /* 834 * Verify the filesystem type for a regular statefile is "ufs" 835 * or verify a block device is not in use as a mounted filesytem. 836 * Returns 1 if any error, otherwise 0. 837 */ 838 static int 839 check_mount(char *sfile, dev_t sfdev, int ufs) 840 { 841 char *src, *err_fmt = NULL, *mnttab = MNTTAB; 842 int rgent, match = 0; 843 struct mnttab zroot = { 0 }; 844 struct mnttab entry; 845 struct extmnttab ent; 846 FILE *fp; 847 848 if ((fp = fopen(mnttab, "r")) == NULL) { 849 mesg(MERR, open_fmt, mnttab, strerror(errno)); 850 return (1); 851 } 852 853 if (ufs) { 854 zroot.mnt_mountp = "/"; 855 zroot.mnt_fstype = "zfs"; 856 if (getmntany(fp, &entry, &zroot) == 0) { 857 err_fmt = "ufs statefile with zfs root is not" 858 " supported\n"; 859 mesg(MERR, err_fmt, sfile); 860 fclose(fp); 861 return (1); 862 } 863 resetmnttab(fp); 864 } 865 /* 866 * Search for a matching dev_t; 867 * ignore non-ufs filesystems for a regular statefile. 868 */ 869 while ((rgent = getextmntent(fp, &ent, sizeof (ent))) != -1) { 870 if (rgent > 0) { 871 mesg(MERR, "error reading \"%s\"\n", mnttab); 872 (void) fclose(fp); 873 return (1); 874 } else if (ufs && strcmp(ent.mnt_fstype, "ufs")) 875 continue; 876 else if (makedev(ent.mnt_major, ent.mnt_minor) == sfdev) { 877 match = 1; 878 break; 879 } 880 } 881 882 /* 883 * No match is needed for a block device statefile, 884 * a match is needed for a regular statefile. 885 */ 886 if (match == 0) { 887 if (new_cc.cf_type != CFT_UFS) 888 STRCPYLIM(new_cc.cf_devfs, sfile, "block statefile"); 889 else 890 err_fmt = "cannot find ufs mount point for \"%s\"\n"; 891 } else if (new_cc.cf_type == CFT_UFS) { 892 STRCPYLIM(new_cc.cf_fs, ent.mnt_mountp, "mnt entry"); 893 STRCPYLIM(new_cc.cf_devfs, ent.mnt_special, "mnt special"); 894 while (*(sfile + 1) == '/') sfile++; 895 src = sfile + strlen(ent.mnt_mountp); 896 while (*src == '/') src++; 897 STRCPYLIM(new_cc.cf_path, src, "statefile path"); 898 } else 899 err_fmt = "statefile device \"%s\" is a mounted filesystem\n"; 900 (void) fclose(fp); 901 if (err_fmt) 902 mesg(MERR, err_fmt, sfile); 903 return (err_fmt != NULL); 904 } 905 906 907 /* 908 * Convert a Unix device to a prom device and save on success, 909 * log any ioctl/conversion error. 910 */ 911 static int 912 utop(char *fs_name, char *prom_name) 913 { 914 union obpbuf { 915 char buf[OBP_MAXPATHLEN + sizeof (uint_t)]; 916 struct openpromio oppio; 917 }; 918 union obpbuf oppbuf; 919 struct openpromio *opp; 920 char *promdev = "/dev/openprom"; 921 int fd, upval; 922 923 if ((fd = open(promdev, O_RDONLY)) == -1) { 924 mesg(MERR, open_fmt, promdev, strerror(errno)); 925 return (NOUP); 926 } 927 928 opp = &oppbuf.oppio; 929 opp->oprom_size = OBP_MAXPATHLEN; 930 strcpy_limit(opp->oprom_array, fs_name, 931 OBP_MAXPATHLEN, "statefile device"); 932 upval = ioctl(fd, OPROMDEV2PROMNAME, opp); 933 (void) close(fd); 934 if (upval == OKUP) { 935 strcpy_limit(prom_name, opp->oprom_array, OBP_MAXPATHLEN, 936 "prom device"); 937 } else { 938 openlog("pmconfig", 0, LOG_DAEMON); 939 syslog(LOG_NOTICE, 940 gettext("cannot convert \"%s\" to prom device"), 941 fs_name); 942 closelog(); 943 } 944 945 return (upval); 946 } 947 948 /* 949 * given the path to a zvol, return the cXtYdZ name 950 * returns < 0 on error, 0 if it isn't a zvol, > 1 on success 951 */ 952 static int 953 ztop(char *arg, char *diskname) 954 { 955 zpool_handle_t *zpool_handle; 956 nvlist_t *config, *nvroot; 957 nvlist_t **child; 958 uint_t children; 959 libzfs_handle_t *lzfs; 960 char *vname; 961 char *p; 962 char pool_name[MAXPATHLEN]; 963 964 if (strncmp(arg, "/dev/zvol/dsk/", 14)) { 965 return (0); 966 } 967 arg += 14; 968 strncpy(pool_name, arg, MAXPATHLEN); 969 if (p = strchr(pool_name, '/')) 970 *p = '\0'; 971 STRCPYLIM(new_cc.cf_fs, p + 1, "statefile path"); 972 973 if ((lzfs = libzfs_init()) == NULL) { 974 mesg(MERR, "failed to initialize ZFS library\n"); 975 return (-1); 976 } 977 if ((zpool_handle = zpool_open(lzfs, pool_name)) == NULL) { 978 mesg(MERR, "couldn't open pool '%s'\n", pool_name); 979 libzfs_fini(lzfs); 980 return (-1); 981 } 982 config = zpool_get_config(zpool_handle, NULL); 983 if (nvlist_lookup_nvlist(config, ZPOOL_CONFIG_VDEV_TREE, 984 &nvroot) != 0) { 985 zpool_close(zpool_handle); 986 libzfs_fini(lzfs); 987 return (-1); 988 } 989 verify(nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN, 990 &child, &children) == 0); 991 if (children != 1) { 992 mesg(MERR, "expected one vdev, got %d\n", children); 993 zpool_close(zpool_handle); 994 libzfs_fini(lzfs); 995 return (-1); 996 } 997 vname = zpool_vdev_name(lzfs, zpool_handle, child[0]); 998 if (vname == NULL) { 999 mesg(MERR, "couldn't determine vdev name\n"); 1000 zpool_close(zpool_handle); 1001 libzfs_fini(lzfs); 1002 return (-1); 1003 } 1004 strcpy(diskname, "/dev/dsk/"); 1005 strcat(diskname, vname); 1006 free(vname); 1007 zpool_close(zpool_handle); 1008 libzfs_fini(lzfs); 1009 return (1); 1010 } 1011 1012 /* 1013 * returns NULL if the slice is good (e.g. does not start at block 1014 * zero, or a string describing the error if it doesn't 1015 */ 1016 static boolean_t 1017 is_good_slice(char *sfile, char **err) 1018 { 1019 int fd, rc; 1020 struct vtoc vtoc; 1021 dk_gpt_t *gpt; 1022 char rdskname[MAXPATHLEN]; 1023 char *x, *y; 1024 1025 *err = NULL; 1026 /* convert from dsk to rdsk */ 1027 STRCPYLIM(rdskname, sfile, "disk name"); 1028 x = strstr(rdskname, "dsk/"); 1029 y = strstr(sfile, "dsk/"); 1030 if (x != NULL) { 1031 *x++ = 'r'; 1032 strcpy(x, y); 1033 } 1034 1035 if ((fd = open(rdskname, O_RDONLY)) == -1) { 1036 *err = "could not open '%s'\n"; 1037 } else if ((rc = read_vtoc(fd, &vtoc)) >= 0) { 1038 /* 1039 * we got a slice number; now check the block 1040 * number where the slice starts 1041 */ 1042 if (vtoc.v_part[rc].p_start < 2) 1043 *err = "using '%s' would clobber the disk label\n"; 1044 close(fd); 1045 return (*err ? B_FALSE : B_TRUE); 1046 } else if ((rc == VT_ENOTSUP) && 1047 (efi_alloc_and_read(fd, &gpt)) >= 0) { 1048 /* EFI slices don't clobber the disk label */ 1049 free(gpt); 1050 close(fd); 1051 return (B_TRUE); 1052 } else 1053 *err = "could not read partition table from '%s'\n"; 1054 return (B_FALSE); 1055 } 1056 1057 /* 1058 * Check for a valid statefile pathname, inode and mount status. 1059 */ 1060 int 1061 sfpath(void) 1062 { 1063 static int statefile; 1064 char *err_fmt = NULL; 1065 char *sfile, *sp, ch; 1066 char diskname[256]; 1067 struct stat stbuf; 1068 int dir = 0; 1069 dev_t dev; 1070 1071 if (statefile) { 1072 mesg(MERR, "ignored redundant statefile entry\n"); 1073 return (OKUP); 1074 } else if (ua_err) { 1075 if (ua_err != ENOTSUP) 1076 mesg(MERR, "uadmin(A_FREEZE, A_CHECK, 0): %s\n", 1077 strerror(ua_err)); 1078 return (NOUP); 1079 } 1080 1081 /* 1082 * Check for an absolute path and trim any trailing '/'. 1083 */ 1084 sfile = LINEARG(1); 1085 if (*sfile != '/') { 1086 mesg(MERR, "statefile requires an absolute path\n"); 1087 return (NOUP); 1088 } 1089 for (sp = sfile + strlen(sfile) - 1; sp > sfile && *sp == '/'; sp--) 1090 *sp = '\0'; 1091 1092 /* 1093 * If the statefile doesn't exist, the leading path must be a dir. 1094 */ 1095 if (stat(sfile, &stbuf) == -1) { 1096 if (errno == ENOENT) { 1097 dir = 1; 1098 if ((sp = strrchr(sfile, '/')) == sfile) 1099 sp++; 1100 ch = *sp; 1101 *sp = '\0'; 1102 if (stat(sfile, &stbuf) == -1) 1103 err_fmt = stat_fmt; 1104 *sp = ch; 1105 } else 1106 err_fmt = stat_fmt; 1107 if (err_fmt) { 1108 mesg(MERR, err_fmt, sfile, strerror(errno)); 1109 return (NOUP); 1110 } 1111 } 1112 1113 /* 1114 * Check for regular/dir/block types, set cf_type and dev. 1115 */ 1116 if (S_ISREG(stbuf.st_mode) || (dir && S_ISDIR(stbuf.st_mode))) { 1117 new_cc.cf_type = CFT_UFS; 1118 dev = stbuf.st_dev; 1119 } else if (S_ISBLK(stbuf.st_mode)) { 1120 if (is_good_slice(sfile, &err_fmt)) { 1121 switch (ztop(sfile, diskname)) { 1122 case 1: 1123 new_cc.cf_type = CFT_ZVOL; 1124 break; 1125 case 0: 1126 new_cc.cf_type = CFT_SPEC; 1127 break; 1128 case -1: 1129 default: 1130 return (NOUP); 1131 } 1132 dev = stbuf.st_rdev; 1133 } 1134 } else 1135 err_fmt = "bad file type for \"%s\"\n" 1136 "statefile must be a regular file or block device\n"; 1137 if (err_fmt) { 1138 mesg(MERR, err_fmt, sfile); 1139 return (NOUP); 1140 } 1141 if (check_mount(sfile, dev, (new_cc.cf_type == CFT_UFS))) 1142 return (NOUP); 1143 if (new_cc.cf_type == CFT_ZVOL) { 1144 if (utop(diskname, new_cc.cf_dev_prom)) 1145 return (NOUP); 1146 } else if (utop(new_cc.cf_devfs, new_cc.cf_dev_prom)) { 1147 return (NOUP); 1148 } 1149 new_cc.cf_magic = CPR_CONFIG_MAGIC; 1150 statefile = 1; 1151 return (OKUP); 1152 } 1153 #endif /* sparc */ 1154 1155 1156 /* 1157 * Common function to set a system or cpu threshold. 1158 */ 1159 static int 1160 cmnthr(int req) 1161 { 1162 int value, nerr = 0, upval = OKUP; 1163 char *thresh = LINEARG(1); 1164 1165 if (strcmp(thresh, always_on) == 0) 1166 value = INT_MAX; 1167 else if ((value = get_scaled_value(thresh, &nerr)) < 0 || nerr) { 1168 mesg(MERR, "%s must be a positive value\n", LINEARG(0)); 1169 upval = NOUP; 1170 } 1171 if (upval == OKUP) 1172 (void) ioctl(pm_fd, req, value); 1173 return (upval); 1174 } 1175 1176 1177 /* 1178 * Try setting system threshold. 1179 */ 1180 int 1181 systhr(void) 1182 { 1183 return (cmnthr(PM_SET_SYSTEM_THRESHOLD)); 1184 } 1185 1186 1187 /* 1188 * Try setting cpu threshold. 1189 */ 1190 int 1191 cputhr(void) 1192 { 1193 return (cmnthr(PM_SET_CPU_THRESHOLD)); 1194 } 1195 1196 1197 int 1198 tchars(void) 1199 { 1200 return (scan_int(LINEARG(1), &new_cc.ttychars_thold)); 1201 } 1202