1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License, Version 1.0 only 6 * (the "License"). You may not use this file except in compliance 7 * with the License. 8 * 9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10 * or http://www.opensolaris.org/os/licensing. 11 * See the License for the specific language governing permissions 12 * and limitations under the License. 13 * 14 * When distributing Covered Code, include this CDDL HEADER in each 15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16 * If applicable, add the following below this CDDL HEADER, with the 17 * fields enclosed by brackets "[]" replaced with your own identifying 18 * information: Portions Copyright [yyyy] [name of copyright owner] 19 * 20 * CDDL HEADER END 21 */ 22 /* 23 * Copyright 2005 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 #pragma ident "%Z%%M% %I% %E% SMI" 28 29 /* 30 * sqlite is not compatible with _FILE_OFFSET_BITS=64, but we need to 31 * be able to statvfs(2) possibly large systems. This define gives us 32 * access to the transitional interfaces. See lfcompile64(5) for how 33 * _LARGEFILE64_SOURCE works. 34 */ 35 #define _LARGEFILE64_SOURCE 36 37 #include <assert.h> 38 #include <door.h> 39 #include <dirent.h> 40 #include <errno.h> 41 #include <fcntl.h> 42 #include <limits.h> 43 #include <pthread.h> 44 #include <stdarg.h> 45 #include <stdio.h> 46 #include <stdlib.h> 47 #include <string.h> 48 #include <sys/stat.h> 49 #include <sys/statvfs.h> 50 #include <unistd.h> 51 #include <zone.h> 52 53 #include "configd.h" 54 #include "repcache_protocol.h" 55 56 #include "sqlite/sqlite.h" 57 #include "sqlite/sqlite-misc.h" 58 59 /* 60 * This file has two purposes: 61 * 62 * 1. It contains the database schema, and the code for setting up our backend 63 * databases, including installing said schema. 64 * 65 * 2. It provides a simplified interface to the SQL database library, and 66 * synchronizes MT access to the database. 67 */ 68 69 typedef struct backend_spent { 70 uint64_t bs_count; 71 hrtime_t bs_time; 72 hrtime_t bs_vtime; 73 } backend_spent_t; 74 75 typedef struct backend_totals { 76 backend_spent_t bt_lock; /* waiting for lock */ 77 backend_spent_t bt_exec; /* time spent executing SQL */ 78 } backend_totals_t; 79 80 typedef struct sqlite_backend { 81 pthread_mutex_t be_lock; 82 pthread_t be_thread; /* thread holding lock */ 83 struct sqlite *be_db; 84 const char *be_path; /* path to db */ 85 int be_readonly; /* readonly at start, and still is */ 86 int be_writing; /* held for writing */ 87 backend_type_t be_type; /* type of db */ 88 hrtime_t be_lastcheck; /* time of last read-only check */ 89 backend_totals_t be_totals[2]; /* one for reading, one for writing */ 90 } sqlite_backend_t; 91 92 struct backend_tx { 93 sqlite_backend_t *bt_be; 94 int bt_readonly; 95 int bt_type; 96 int bt_full; /* SQLITE_FULL during tx */ 97 }; 98 99 #define UPDATE_TOTALS_WR(sb, writing, field, ts, vts) { \ 100 backend_spent_t *__bsp = &(sb)->be_totals[!!(writing)].field; \ 101 __bsp->bs_count++; \ 102 __bsp->bs_time += (gethrtime() - ts); \ 103 __bsp->bs_vtime += (gethrvtime() - vts); \ 104 } 105 106 #define UPDATE_TOTALS(sb, field, ts, vts) \ 107 UPDATE_TOTALS_WR(sb, (sb)->be_writing, field, ts, vts) 108 109 struct backend_query { 110 char *bq_buf; 111 size_t bq_size; 112 }; 113 114 struct backend_tbl_info { 115 const char *bti_name; 116 const char *bti_cols; 117 }; 118 119 struct backend_idx_info { 120 const char *bxi_tbl; 121 const char *bxi_idx; 122 const char *bxi_cols; 123 }; 124 125 static pthread_mutex_t backend_panic_lock = PTHREAD_MUTEX_INITIALIZER; 126 static pthread_cond_t backend_panic_cv = PTHREAD_COND_INITIALIZER; 127 pthread_t backend_panic_thread = 0; 128 129 int backend_do_trace = 0; /* invoke tracing callback */ 130 int backend_print_trace = 0; /* tracing callback prints SQL */ 131 int backend_panic_abort = 0; /* abort when panicking */ 132 133 /* interval between read-only checks while starting up */ 134 #define BACKEND_READONLY_CHECK_INTERVAL (2 * (hrtime_t)NANOSEC) 135 136 /* 137 * Any change to the below schema should bump the version number 138 */ 139 #define BACKEND_SCHEMA_VERSION 5 140 141 static struct backend_tbl_info tbls_normal[] = { /* BACKEND_TYPE_NORMAL */ 142 /* 143 * service_tbl holds all services. svc_id is the identifier of the 144 * service. 145 */ 146 { 147 "service_tbl", 148 "svc_id INTEGER PRIMARY KEY," 149 "svc_name CHAR(256) NOT NULL" 150 }, 151 152 /* 153 * instance_tbl holds all of the instances. The parent service id 154 * is instance_svc. 155 */ 156 { 157 "instance_tbl", 158 "instance_id INTEGER PRIMARY KEY," 159 "instance_name CHAR(256) NOT NULL," 160 "instance_svc INTEGER NOT NULL" 161 }, 162 163 /* 164 * snapshot_lnk_tbl links (instance, snapshot name) with snapshots. 165 */ 166 { 167 "snapshot_lnk_tbl", 168 "lnk_id INTEGER PRIMARY KEY," 169 "lnk_inst_id INTEGER NOT NULL," 170 "lnk_snap_name CHAR(256) NOT NULL," 171 "lnk_snap_id INTEGER NOT NULL" 172 }, 173 174 /* 175 * snaplevel_tbl maps a snapshot id to a set of named, ordered 176 * snaplevels. 177 */ 178 { 179 "snaplevel_tbl", 180 "snap_id INTEGER NOT NULL," 181 "snap_level_num INTEGER NOT NULL," 182 "snap_level_id INTEGER NOT NULL," 183 "snap_level_service_id INTEGER NOT NULL," 184 "snap_level_service CHAR(256) NOT NULL," 185 "snap_level_instance_id INTEGER NULL," 186 "snap_level_instance CHAR(256) NULL" 187 }, 188 189 /* 190 * snaplevel_lnk_tbl links snaplevels to property groups. 191 * snaplvl_pg_* is identical to the original property group, 192 * and snaplvl_gen_id overrides the generation number. 193 * The service/instance ids are as in the snaplevel. 194 */ 195 { 196 "snaplevel_lnk_tbl", 197 "snaplvl_level_id INTEGER NOT NULL," 198 "snaplvl_pg_id INTEGER NOT NULL," 199 "snaplvl_pg_name CHAR(256) NOT NULL," 200 "snaplvl_pg_type CHAR(256) NOT NULL," 201 "snaplvl_pg_flags INTEGER NOT NULL," 202 "snaplvl_gen_id INTEGER NOT NULL" 203 }, 204 205 { NULL, NULL } 206 }; 207 208 static struct backend_idx_info idxs_normal[] = { /* BACKEND_TYPE_NORMAL */ 209 { "service_tbl", "name", "svc_name" }, 210 { "instance_tbl", "name", "instance_svc, instance_name" }, 211 { "snapshot_lnk_tbl", "name", "lnk_inst_id, lnk_snap_name" }, 212 { "snapshot_lnk_tbl", "snapid", "lnk_snap_id" }, 213 { "snaplevel_tbl", "id", "snap_id" }, 214 { "snaplevel_lnk_tbl", "id", "snaplvl_pg_id" }, 215 { "snaplevel_lnk_tbl", "level", "snaplvl_level_id" }, 216 { NULL, NULL, NULL } 217 }; 218 219 static struct backend_tbl_info tbls_np[] = { /* BACKEND_TYPE_NONPERSIST */ 220 { NULL, NULL } 221 }; 222 223 static struct backend_idx_info idxs_np[] = { /* BACKEND_TYPE_NONPERSIST */ 224 { NULL, NULL, NULL } 225 }; 226 227 static struct backend_tbl_info tbls_common[] = { /* all backend types */ 228 /* 229 * pg_tbl defines property groups. They are associated with a single 230 * service or instance. The pg_gen_id links them with the latest 231 * "edited" version of its properties. 232 */ 233 { 234 "pg_tbl", 235 "pg_id INTEGER PRIMARY KEY," 236 "pg_parent_id INTEGER NOT NULL," 237 "pg_name CHAR(256) NOT NULL," 238 "pg_type CHAR(256) NOT NULL," 239 "pg_flags INTEGER NOT NULL," 240 "pg_gen_id INTEGER NOT NULL" 241 }, 242 243 /* 244 * prop_lnk_tbl links a particular pg_id and gen_id to a set of 245 * (prop_name, prop_type, val_id) trios. 246 */ 247 { 248 "prop_lnk_tbl", 249 "lnk_prop_id INTEGER PRIMARY KEY," 250 "lnk_pg_id INTEGER NOT NULL," 251 "lnk_gen_id INTEGER NOT NULL," 252 "lnk_prop_name CHAR(256) NOT NULL," 253 "lnk_prop_type CHAR(2) NOT NULL," 254 "lnk_val_id INTEGER" 255 }, 256 257 /* 258 * value_tbl maps a value_id to a set of values. For any given 259 * value_id, value_type is constant. 260 */ 261 { 262 "value_tbl", 263 "value_id INTEGER NOT NULL," 264 "value_type CHAR(1) NOT NULL," 265 "value_value VARCHAR NOT NULL" 266 }, 267 268 /* 269 * id_tbl has one row per id space 270 */ 271 { 272 "id_tbl", 273 "id_name STRING NOT NULL," 274 "id_next INTEGER NOT NULL" 275 }, 276 277 /* 278 * schema_version has a single row, which contains 279 * BACKEND_SCHEMA_VERSION at the time of creation. 280 */ 281 { 282 "schema_version", 283 "schema_version INTEGER" 284 }, 285 { NULL, NULL } 286 }; 287 288 static struct backend_idx_info idxs_common[] = { /* all backend types */ 289 { "pg_tbl", "parent", "pg_parent_id" }, 290 { "pg_tbl", "name", "pg_parent_id, pg_name" }, 291 { "pg_tbl", "type", "pg_parent_id, pg_type" }, 292 { "prop_lnk_tbl", "base", "lnk_pg_id, lnk_gen_id" }, 293 { "prop_lnk_tbl", "val", "lnk_val_id" }, 294 { "value_tbl", "id", "value_id" }, 295 { "id_tbl", "id", "id_name" }, 296 { NULL, NULL, NULL } 297 }; 298 299 struct run_single_int_info { 300 uint32_t *rs_out; 301 int rs_result; 302 }; 303 304 /*ARGSUSED*/ 305 static int 306 run_single_int_callback(void *arg, int columns, char **vals, char **names) 307 { 308 struct run_single_int_info *info = arg; 309 uint32_t val; 310 311 char *endptr = vals[0]; 312 313 assert(info->rs_result != REP_PROTOCOL_SUCCESS); 314 assert(columns == 1); 315 316 if (vals[0] == NULL) 317 return (BACKEND_CALLBACK_CONTINUE); 318 319 errno = 0; 320 val = strtoul(vals[0], &endptr, 10); 321 if ((val == 0 && endptr == vals[0]) || *endptr != 0 || errno != 0) 322 backend_panic("malformed integer \"%20s\"", vals[0]); 323 324 *info->rs_out = val; 325 info->rs_result = REP_PROTOCOL_SUCCESS; 326 return (BACKEND_CALLBACK_CONTINUE); 327 } 328 329 /*ARGSUSED*/ 330 int 331 backend_fail_if_seen(void *arg, int columns, char **vals, char **names) 332 { 333 return (BACKEND_CALLBACK_ABORT); 334 } 335 336 /* 337 * check to see if we can successfully start a transaction; if not, the 338 * filesystem is mounted read-only. 339 */ 340 static int 341 backend_is_readonly(struct sqlite *db, const char *path) 342 { 343 int r; 344 statvfs64_t stat; 345 346 if (statvfs64(path, &stat) == 0 && (stat.f_flag & ST_RDONLY)) 347 return (SQLITE_READONLY); 348 349 r = sqlite_exec(db, 350 "BEGIN TRANSACTION; " 351 "UPDATE schema_version SET schema_version = schema_version; ", 352 NULL, NULL, NULL); 353 (void) sqlite_exec(db, "ROLLBACK TRANSACTION", NULL, NULL, NULL); 354 return (r); 355 } 356 357 static void 358 backend_trace_sql(void *arg, const char *sql) 359 { 360 sqlite_backend_t *be = arg; 361 362 if (backend_print_trace) { 363 (void) fprintf(stderr, "%d: %s\n", be->be_type, sql); 364 } 365 } 366 367 static sqlite_backend_t be_info[BACKEND_TYPE_TOTAL]; 368 static sqlite_backend_t *bes[BACKEND_TYPE_TOTAL]; 369 370 #define BACKEND_PANIC_TIMEOUT (50 * MILLISEC) 371 /* 372 * backend_panic() -- some kind of database problem or corruption has been hit. 373 * We attempt to quiesce the other database users -- all of the backend sql 374 * entry points will call backend_panic(NULL) if a panic is in progress, as 375 * will any attempt to start a transaction. 376 * 377 * We give threads holding a backend lock 50ms (BACKEND_PANIC_TIMEOUT) to 378 * either drop the lock or call backend_panic(). If they don't respond in 379 * time, we'll just exit anyway. 380 */ 381 void 382 backend_panic(const char *format, ...) 383 { 384 int i; 385 va_list args; 386 int failed = 0; 387 388 (void) pthread_mutex_lock(&backend_panic_lock); 389 if (backend_panic_thread != 0) { 390 (void) pthread_mutex_unlock(&backend_panic_lock); 391 /* 392 * first, drop any backend locks we're holding, then 393 * sleep forever on the panic_cv. 394 */ 395 for (i = 0; i < BACKEND_TYPE_TOTAL; i++) { 396 if (bes[i] != NULL && 397 bes[i]->be_thread == pthread_self()) 398 (void) pthread_mutex_unlock(&bes[i]->be_lock); 399 } 400 (void) pthread_mutex_lock(&backend_panic_lock); 401 for (;;) 402 (void) pthread_cond_wait(&backend_panic_cv, 403 &backend_panic_lock); 404 } 405 backend_panic_thread = pthread_self(); 406 (void) pthread_mutex_unlock(&backend_panic_lock); 407 408 for (i = 0; i < BACKEND_TYPE_TOTAL; i++) { 409 if (bes[i] != NULL && bes[i]->be_thread == pthread_self()) 410 (void) pthread_mutex_unlock(&bes[i]->be_lock); 411 } 412 413 va_start(args, format); 414 configd_vcritical(format, args); 415 va_end(args); 416 417 for (i = 0; i < BACKEND_TYPE_TOTAL; i++) { 418 timespec_t rel; 419 420 rel.tv_sec = 0; 421 rel.tv_nsec = BACKEND_PANIC_TIMEOUT; 422 423 if (bes[i] != NULL && bes[i]->be_thread != pthread_self()) { 424 if (pthread_mutex_reltimedlock_np(&bes[i]->be_lock, 425 &rel) != 0) 426 failed++; 427 } 428 } 429 if (failed) { 430 configd_critical("unable to quiesce database\n"); 431 } 432 433 if (backend_panic_abort) 434 abort(); 435 436 exit(CONFIGD_EXIT_DATABASE_BAD); 437 } 438 439 /* 440 * Returns 441 * _SUCCESS 442 * _DONE - callback aborted query 443 * _NO_RESOURCES - out of memory (_FULL & _TOOBIG?) 444 */ 445 static int 446 backend_error(sqlite_backend_t *be, int error, char *errmsg) 447 { 448 if (error == SQLITE_OK) 449 return (REP_PROTOCOL_SUCCESS); 450 451 switch (error) { 452 case SQLITE_ABORT: 453 free(errmsg); 454 return (REP_PROTOCOL_DONE); 455 456 case SQLITE_NOMEM: 457 case SQLITE_FULL: 458 case SQLITE_TOOBIG: 459 free(errmsg); 460 return (REP_PROTOCOL_FAIL_NO_RESOURCES); 461 462 default: 463 backend_panic("%s: db error: %s", be->be_path, errmsg); 464 /*NOTREACHED*/ 465 } 466 } 467 468 static void 469 backend_backup_cleanup(const char **out_arg, ssize_t out_sz) 470 { 471 char **out = (char **)out_arg; 472 473 while (out_sz-- > 0) 474 free(*out++); 475 free(out_arg); 476 } 477 478 /* 479 * builds a inverse-time-sorted array of backup files. The path is a 480 * a single buffer, and the pointers look like: 481 * 482 * /this/is/a/full/path/to/repository-name-YYYYMMDDHHMMSS 483 * ^pathname ^ ^(pathname+pathlen) 484 * basename 485 * 486 * dirname will either be pathname, or ".". 487 * 488 * Returns the number of elements in the array, 0 if there are no previous 489 * backups, or -1 on error. 490 */ 491 static ssize_t 492 backend_backup_get_prev(char *pathname, size_t pathlen, const char ***out_arg) 493 { 494 char b_start, b_end; 495 DIR *dir; 496 char **out = NULL; 497 char *name, *p; 498 char *dirname, *basename; 499 char *pathend; 500 struct dirent *ent; 501 502 size_t count = 0; 503 size_t baselen; 504 505 /* 506 * year, month, day, hour, min, sec, plus an '_'. 507 */ 508 const size_t ndigits = 4 + 5*2 + 1; 509 const size_t baroffset = 4 + 2*2; 510 511 size_t idx; 512 513 pathend = pathname + pathlen; 514 b_end = *pathend; 515 *pathend = '\0'; 516 517 basename = strrchr(pathname, '/'); 518 519 if (basename != NULL) { 520 assert(pathend > pathname && basename < pathend); 521 basename++; 522 dirname = pathname; 523 } else { 524 basename = pathname; 525 dirname = "."; 526 } 527 528 baselen = strlen(basename); 529 530 /* 531 * munge the string temporarily for the opendir(), then restore it. 532 */ 533 b_start = basename[0]; 534 535 basename[0] = '\0'; 536 dir = opendir(dirname); 537 basename[0] = b_start; /* restore path */ 538 539 if (dir == NULL) 540 goto fail; 541 542 543 while ((ent = readdir(dir)) != NULL) { 544 /* 545 * Must match: 546 * basename-YYYYMMDD_HHMMSS 547 * or we ignore it. 548 */ 549 if (strncmp(ent->d_name, basename, baselen) != 0) 550 continue; 551 552 name = ent->d_name; 553 if (name[baselen] != '-') 554 continue; 555 556 p = name + baselen + 1; 557 558 for (idx = 0; idx < ndigits; idx++) { 559 char c = p[idx]; 560 if (idx == baroffset && c != '_') 561 break; 562 if (idx != baroffset && (c < '0' || c > '9')) 563 break; 564 } 565 if (idx != ndigits || p[idx] != '\0') 566 continue; 567 568 /* 569 * We have a match. insertion-sort it into our list. 570 */ 571 name = strdup(name); 572 if (name == NULL) 573 goto fail_closedir; 574 p = strrchr(name, '-'); 575 576 for (idx = 0; idx < count; idx++) { 577 char *tmp = out[idx]; 578 char *tp = strrchr(tmp, '-'); 579 580 int cmp = strcmp(p, tp); 581 if (cmp == 0) 582 cmp = strcmp(name, tmp); 583 584 if (cmp == 0) { 585 free(name); 586 name = NULL; 587 break; 588 } else if (cmp > 0) { 589 out[idx] = name; 590 name = tmp; 591 p = tp; 592 } 593 } 594 595 if (idx == count) { 596 char **new_out = realloc(out, 597 (count + 1) * sizeof (*out)); 598 599 if (new_out == NULL) { 600 free(name); 601 goto fail_closedir; 602 } 603 604 out = new_out; 605 out[count++] = name; 606 } else { 607 assert(name == NULL); 608 } 609 } 610 (void) closedir(dir); 611 612 basename[baselen] = b_end; 613 614 *out_arg = (const char **)out; 615 return (count); 616 617 fail_closedir: 618 (void) closedir(dir); 619 fail: 620 basename[0] = b_start; 621 *pathend = b_end; 622 623 backend_backup_cleanup((const char **)out, count); 624 625 *out_arg = NULL; 626 return (-1); 627 } 628 629 /* 630 * Copies the repository path into out, a buffer of out_len bytes, 631 * removes the ".db" (or whatever) extension, and, if name is non-NULL, 632 * appends "-name" to it. If name is non-NULL, it can fail with: 633 * 634 * _TRUNCATED will not fit in buffer. 635 * _BAD_REQUEST name is not a valid identifier 636 */ 637 static rep_protocol_responseid_t 638 backend_backup_base(sqlite_backend_t *be, const char *name, 639 char *out, size_t out_len) 640 { 641 char *p, *q; 642 size_t len; 643 644 /* 645 * for paths of the form /path/to/foo.db, we truncate at the final 646 * '.'. 647 */ 648 (void) strlcpy(out, be->be_path, out_len); 649 650 p = strrchr(out, '/'); 651 q = strrchr(out, '.'); 652 653 if (p != NULL && q != NULL && q > p) 654 *q = 0; 655 656 if (name != NULL) { 657 len = strlen(out); 658 assert(len < out_len); 659 660 out += len; 661 out_len -= len; 662 663 len = strlen(name); 664 665 /* 666 * verify that the name tag is entirely alphabetic, 667 * non-empty, and not too long. 668 */ 669 if (len == 0 || len >= REP_PROTOCOL_NAME_LEN || 670 uu_check_name(name, UU_NAME_DOMAIN) < 0) 671 return (REP_PROTOCOL_FAIL_BAD_REQUEST); 672 673 if (snprintf(out, out_len, "-%s", name) >= out_len) 674 return (REP_PROTOCOL_FAIL_TRUNCATED); 675 } 676 677 return (REP_PROTOCOL_SUCCESS); 678 } 679 680 /* 681 * See if a backup is needed. We do a backup unless both files are 682 * byte-for-byte identical. 683 */ 684 static int 685 backend_check_backup_needed(const char *rep_name, const char *backup_name) 686 { 687 int repfd = open(rep_name, O_RDONLY); 688 int fd = open(backup_name, O_RDONLY); 689 struct stat s_rep, s_backup; 690 int c1, c2; 691 692 FILE *f_rep = NULL; 693 FILE *f_backup = NULL; 694 695 if (repfd < 0 || fd < 0) 696 goto fail; 697 698 if (fstat(repfd, &s_rep) < 0 || fstat(fd, &s_backup) < 0) 699 goto fail; 700 701 /* 702 * if they are the same file, we need to do a backup to break the 703 * hard link or symlink involved. 704 */ 705 if (s_rep.st_ino == s_backup.st_ino && s_rep.st_dev == s_backup.st_dev) 706 goto fail; 707 708 if (s_rep.st_size != s_backup.st_size) 709 goto fail; 710 711 if ((f_rep = fdopen(repfd, "r")) == NULL || 712 (f_backup = fdopen(fd, "r")) == NULL) 713 goto fail; 714 715 do { 716 c1 = getc(f_rep); 717 c2 = getc(f_backup); 718 if (c1 != c2) 719 goto fail; 720 } while (c1 != EOF); 721 722 if (!ferror(f_rep) && !ferror(f_backup)) { 723 (void) fclose(f_rep); 724 (void) fclose(f_backup); 725 (void) close(repfd); 726 (void) close(fd); 727 return (0); 728 } 729 730 fail: 731 if (f_rep != NULL) 732 (void) fclose(f_rep); 733 if (f_backup != NULL) 734 (void) fclose(f_backup); 735 if (repfd >= 0) 736 (void) close(repfd); 737 if (fd >= 0) 738 (void) close(fd); 739 return (1); 740 } 741 742 /* 743 * Can return: 744 * _BAD_REQUEST name is not valid 745 * _TRUNCATED name is too long for current repository path 746 * _UNKNOWN failed for unknown reason (details written to 747 * console) 748 * _BACKEND_READONLY backend is not writable 749 * 750 * _SUCCESS Backup completed successfully. 751 */ 752 static rep_protocol_responseid_t 753 backend_create_backup_locked(sqlite_backend_t *be, const char *name) 754 { 755 const char **old_list; 756 ssize_t old_sz; 757 ssize_t old_max = max_repository_backups; 758 ssize_t cur; 759 760 char *finalname; 761 762 char finalpath[PATH_MAX]; 763 char tmppath[PATH_MAX]; 764 char buf[8192]; 765 int infd, outfd; 766 size_t len; 767 off_t inlen, outlen, offset; 768 769 time_t now; 770 struct tm now_tm; 771 772 rep_protocol_responseid_t result; 773 774 if (be->be_readonly) 775 return (REP_PROTOCOL_FAIL_BACKEND_READONLY); 776 777 result = backend_backup_base(be, name, finalpath, sizeof (finalpath)); 778 if (result != REP_PROTOCOL_SUCCESS) 779 return (result); 780 781 if (!backend_check_backup_needed(be->be_path, finalpath)) { 782 return (REP_PROTOCOL_SUCCESS); 783 } 784 785 /* 786 * remember the original length, and the basename location 787 */ 788 len = strlen(finalpath); 789 finalname = strrchr(finalpath, '/'); 790 if (finalname != NULL) 791 finalname++; 792 else 793 finalname = finalpath; 794 795 (void) strlcpy(tmppath, finalpath, sizeof (tmppath)); 796 if (strlcat(tmppath, "-tmpXXXXXX", sizeof (tmppath)) >= 797 sizeof (tmppath)) 798 return (REP_PROTOCOL_FAIL_TRUNCATED); 799 800 now = time(NULL); 801 if (localtime_r(&now, &now_tm) == NULL) { 802 configd_critical( 803 "\"%s\" backup failed: localtime(3C) failed: %s\n", name, 804 be->be_path, strerror(errno)); 805 return (REP_PROTOCOL_FAIL_UNKNOWN); 806 } 807 808 if (strftime(finalpath + len, sizeof (finalpath) - len, 809 "-%Y""%m""%d""_""%H""%M""%S", &now_tm) >= 810 sizeof (finalpath) - len) { 811 return (REP_PROTOCOL_FAIL_TRUNCATED); 812 } 813 814 infd = open(be->be_path, O_RDONLY); 815 if (infd < 0) { 816 configd_critical("\"%s\" backup failed: opening %s: %s\n", name, 817 be->be_path, strerror(errno)); 818 return (REP_PROTOCOL_FAIL_UNKNOWN); 819 } 820 821 outfd = mkstemp(tmppath); 822 if (outfd < 0) { 823 configd_critical("\"%s\" backup failed: mkstemp(%s): %s\n", 824 name, tmppath, strerror(errno)); 825 (void) close(infd); 826 return (REP_PROTOCOL_FAIL_UNKNOWN); 827 } 828 829 for (;;) { 830 do { 831 inlen = read(infd, buf, sizeof (buf)); 832 } while (inlen < 0 && errno == EINTR); 833 834 if (inlen <= 0) 835 break; 836 837 for (offset = 0; offset < inlen; offset += outlen) { 838 do { 839 outlen = write(outfd, buf + offset, 840 inlen - offset); 841 } while (outlen < 0 && errno == EINTR); 842 843 if (outlen >= 0) 844 continue; 845 846 configd_critical( 847 "\"%s\" backup failed: write to %s: %s\n", 848 name, tmppath, strerror(errno)); 849 result = REP_PROTOCOL_FAIL_UNKNOWN; 850 goto fail; 851 } 852 } 853 854 if (inlen < 0) { 855 configd_critical( 856 "\"%s\" backup failed: read from %s: %s\n", 857 name, be->be_path, strerror(errno)); 858 goto fail; 859 } 860 861 /* 862 * grab the old list before doing our re-name. 863 */ 864 if (old_max > 0) 865 old_sz = backend_backup_get_prev(finalpath, len, &old_list); 866 867 if (rename(tmppath, finalpath) < 0) { 868 configd_critical( 869 "\"%s\" backup failed: rename(%s, %s): %s\n", 870 name, tmppath, finalpath, strerror(errno)); 871 result = REP_PROTOCOL_FAIL_UNKNOWN; 872 goto fail; 873 } 874 875 tmppath[len] = 0; /* strip -XXXXXX, for reference symlink */ 876 877 (void) unlink(tmppath); 878 if (symlink(finalname, tmppath) < 0) { 879 configd_critical( 880 "\"%s\" backup completed, but updating " 881 "\"%s\" symlink to \"%s\" failed: %s\n", 882 name, tmppath, finalname, strerror(errno)); 883 } 884 885 if (old_max > 0 && old_sz > 0) { 886 /* unlink all but the first (old_max - 1) files */ 887 for (cur = old_max - 1; cur < old_sz; cur++) { 888 (void) strlcpy(finalname, old_list[cur], 889 sizeof (finalpath) - (finalname - finalpath)); 890 if (unlink(finalpath) < 0) 891 configd_critical( 892 "\"%s\" backup completed, but removing old " 893 "file \"%s\" failed: %s\n", 894 name, finalpath, strerror(errno)); 895 } 896 897 backend_backup_cleanup(old_list, old_sz); 898 } 899 900 result = REP_PROTOCOL_SUCCESS; 901 902 fail: 903 (void) close(infd); 904 (void) close(outfd); 905 if (result != REP_PROTOCOL_SUCCESS) 906 (void) unlink(tmppath); 907 908 return (result); 909 } 910 911 static int 912 backend_check_readonly(sqlite_backend_t *be, int writing, hrtime_t t) 913 { 914 char *errp; 915 struct sqlite *new; 916 int r; 917 918 assert(be->be_readonly); 919 assert(be == bes[BACKEND_TYPE_NORMAL]); 920 921 /* 922 * If we don't *need* to be writable, only check every once in a 923 * while. 924 */ 925 if (!writing) { 926 if ((uint64_t)(t - be->be_lastcheck) < 927 BACKEND_READONLY_CHECK_INTERVAL) 928 return (REP_PROTOCOL_SUCCESS); 929 be->be_lastcheck = t; 930 } 931 932 new = sqlite_open(be->be_path, 0600, &errp); 933 if (new == NULL) { 934 backend_panic("reopening %s: %s\n", be->be_path, errp); 935 /*NOTREACHED*/ 936 } 937 r = backend_is_readonly(new, be->be_path); 938 939 if (r != SQLITE_OK) { 940 sqlite_close(new); 941 if (writing) 942 return (REP_PROTOCOL_FAIL_BACKEND_READONLY); 943 return (REP_PROTOCOL_SUCCESS); 944 } 945 946 /* 947 * We can write! Swap the db handles, mark ourself writable, 948 * and make a backup. 949 */ 950 sqlite_close(be->be_db); 951 be->be_db = new; 952 be->be_readonly = 0; 953 954 if (backend_create_backup_locked(be, REPOSITORY_BOOT_BACKUP) != 955 REP_PROTOCOL_SUCCESS) { 956 configd_critical( 957 "unable to create \"%s\" backup of \"%s\"\n", 958 REPOSITORY_BOOT_BACKUP, be->be_path); 959 } 960 961 return (REP_PROTOCOL_SUCCESS); 962 } 963 964 /* 965 * If t is not BACKEND_TYPE_NORMAL, can fail with 966 * _BACKEND_ACCESS - backend does not exist 967 * 968 * If writing is nonzero, can also fail with 969 * _BACKEND_READONLY - backend is read-only 970 */ 971 static int 972 backend_lock(backend_type_t t, int writing, sqlite_backend_t **bep) 973 { 974 sqlite_backend_t *be = NULL; 975 hrtime_t ts, vts; 976 977 *bep = NULL; 978 979 assert(t == BACKEND_TYPE_NORMAL || 980 t == BACKEND_TYPE_NONPERSIST); 981 982 be = bes[t]; 983 if (t == BACKEND_TYPE_NORMAL) 984 assert(be != NULL); /* should always be there */ 985 986 if (be == NULL) 987 return (REP_PROTOCOL_FAIL_BACKEND_ACCESS); 988 989 if (backend_panic_thread != 0) 990 backend_panic(NULL); /* don't proceed */ 991 992 ts = gethrtime(); 993 vts = gethrvtime(); 994 (void) pthread_mutex_lock(&be->be_lock); 995 UPDATE_TOTALS_WR(be, writing, bt_lock, ts, vts); 996 997 if (backend_panic_thread != 0) { 998 (void) pthread_mutex_unlock(&be->be_lock); 999 backend_panic(NULL); /* don't proceed */ 1000 } 1001 be->be_thread = pthread_self(); 1002 1003 if (be->be_readonly) { 1004 int r; 1005 assert(t == BACKEND_TYPE_NORMAL); 1006 1007 r = backend_check_readonly(be, writing, ts); 1008 if (r != REP_PROTOCOL_SUCCESS) { 1009 be->be_thread = 0; 1010 (void) pthread_mutex_unlock(&be->be_lock); 1011 return (r); 1012 } 1013 } 1014 1015 if (backend_do_trace) 1016 (void) sqlite_trace(be->be_db, backend_trace_sql, be); 1017 else 1018 (void) sqlite_trace(be->be_db, NULL, NULL); 1019 1020 be->be_writing = writing; 1021 *bep = be; 1022 return (REP_PROTOCOL_SUCCESS); 1023 } 1024 1025 static void 1026 backend_unlock(sqlite_backend_t *be) 1027 { 1028 be->be_writing = 0; 1029 be->be_thread = 0; 1030 (void) pthread_mutex_unlock(&be->be_lock); 1031 } 1032 1033 static void 1034 backend_destroy(sqlite_backend_t *be) 1035 { 1036 if (be->be_db != NULL) { 1037 sqlite_close(be->be_db); 1038 be->be_db = NULL; 1039 } 1040 be->be_thread = 0; 1041 (void) pthread_mutex_unlock(&be->be_lock); 1042 (void) pthread_mutex_destroy(&be->be_lock); 1043 } 1044 1045 static void 1046 backend_create_finish(backend_type_t backend_id, sqlite_backend_t *be) 1047 { 1048 assert(MUTEX_HELD(&be->be_lock)); 1049 assert(be == &be_info[backend_id]); 1050 1051 bes[backend_id] = be; 1052 (void) pthread_mutex_unlock(&be->be_lock); 1053 } 1054 1055 static int 1056 backend_fd_write(int fd, const char *mess) 1057 { 1058 int len = strlen(mess); 1059 int written; 1060 1061 while (len > 0) { 1062 if ((written = write(fd, mess, len)) < 0) 1063 return (-1); 1064 mess += written; 1065 len -= written; 1066 } 1067 return (0); 1068 } 1069 1070 /* 1071 * Can return: 1072 * _BAD_REQUEST name is not valid 1073 * _TRUNCATED name is too long for current repository path 1074 * _UNKNOWN failed for unknown reason (details written to 1075 * console) 1076 * _BACKEND_READONLY backend is not writable 1077 * 1078 * _SUCCESS Backup completed successfully. 1079 */ 1080 rep_protocol_responseid_t 1081 backend_create_backup(const char *name) 1082 { 1083 rep_protocol_responseid_t result; 1084 sqlite_backend_t *be; 1085 1086 result = backend_lock(BACKEND_TYPE_NORMAL, 0, &be); 1087 if (result != REP_PROTOCOL_SUCCESS) 1088 return (result); 1089 1090 result = backend_create_backup_locked(be, name); 1091 backend_unlock(be); 1092 1093 return (result); 1094 } 1095 1096 /*ARGSUSED*/ 1097 static int 1098 backend_integrity_callback(void *private, int narg, char **vals, char **cols) 1099 { 1100 char **out = private; 1101 char *old = *out; 1102 char *new; 1103 const char *info; 1104 size_t len; 1105 int x; 1106 1107 for (x = 0; x < narg; x++) { 1108 if ((info = vals[x]) != NULL && 1109 strcmp(info, "ok") != 0) { 1110 len = (old == NULL)? 0 : strlen(old); 1111 len += strlen(info) + 2; /* '\n' + '\0' */ 1112 1113 new = realloc(old, len); 1114 if (new == NULL) 1115 return (BACKEND_CALLBACK_ABORT); 1116 if (old == NULL) 1117 new[0] = 0; 1118 old = *out = new; 1119 (void) strlcat(new, info, len); 1120 (void) strlcat(new, "\n", len); 1121 } 1122 } 1123 return (BACKEND_CALLBACK_CONTINUE); 1124 } 1125 1126 #define BACKEND_CREATE_LOCKED -2 1127 #define BACKEND_CREATE_FAIL -1 1128 #define BACKEND_CREATE_SUCCESS 0 1129 #define BACKEND_CREATE_READONLY 1 1130 #define BACKEND_CREATE_NEED_INIT 2 1131 static int 1132 backend_create(backend_type_t backend_id, const char *db_file, 1133 sqlite_backend_t **bep) 1134 { 1135 char *errp; 1136 char *integrity_results = NULL; 1137 sqlite_backend_t *be; 1138 int r; 1139 uint32_t val = -1UL; 1140 struct run_single_int_info info; 1141 int fd; 1142 1143 assert(backend_id >= 0 && backend_id < BACKEND_TYPE_TOTAL); 1144 1145 be = &be_info[backend_id]; 1146 assert(be->be_db == NULL); 1147 1148 (void) pthread_mutex_init(&be->be_lock, NULL); 1149 (void) pthread_mutex_lock(&be->be_lock); 1150 1151 be->be_type = backend_id; 1152 be->be_path = strdup(db_file); 1153 if (be->be_path == NULL) { 1154 perror("malloc"); 1155 goto fail; 1156 } 1157 1158 be->be_db = sqlite_open(be->be_path, 0600, &errp); 1159 1160 if (be->be_db == NULL) { 1161 if (strstr(errp, "out of memory") != NULL) { 1162 configd_critical("%s: %s\n", db_file, errp); 1163 free(errp); 1164 1165 goto fail; 1166 } 1167 1168 /* report it as an integrity failure */ 1169 integrity_results = errp; 1170 errp = NULL; 1171 goto integrity_fail; 1172 } 1173 1174 /* 1175 * check if we are inited and of the correct schema version 1176 * 1177 * Eventually, we'll support schema upgrade here. 1178 */ 1179 info.rs_out = &val; 1180 info.rs_result = REP_PROTOCOL_FAIL_NOT_FOUND; 1181 1182 r = sqlite_exec(be->be_db, "SELECT schema_version FROM schema_version;", 1183 run_single_int_callback, &info, &errp); 1184 if (r == SQLITE_ERROR && 1185 strcmp("no such table: schema_version", errp) == 0) { 1186 free(errp); 1187 /* 1188 * Could be an empty repository, could be pre-schema_version 1189 * schema. Check for id_tbl, which has always been there. 1190 */ 1191 r = sqlite_exec(be->be_db, "SELECT count() FROM id_tbl;", 1192 NULL, NULL, &errp); 1193 if (r == SQLITE_ERROR && 1194 strcmp("no such table: id_tbl", errp) == 0) { 1195 free(errp); 1196 *bep = be; 1197 return (BACKEND_CREATE_NEED_INIT); 1198 } 1199 1200 configd_critical("%s: schema version mismatch\n", db_file); 1201 goto fail; 1202 } 1203 if (r == SQLITE_BUSY || r == SQLITE_LOCKED) { 1204 free(errp); 1205 *bep = NULL; 1206 backend_destroy(be); 1207 return (BACKEND_CREATE_LOCKED); 1208 } 1209 if (r == SQLITE_OK) { 1210 if (info.rs_result == REP_PROTOCOL_FAIL_NOT_FOUND || 1211 val != BACKEND_SCHEMA_VERSION) { 1212 configd_critical("%s: schema version mismatch\n", 1213 db_file); 1214 goto fail; 1215 } 1216 } 1217 1218 /* 1219 * pull in the whole database sequentially. 1220 */ 1221 if ((fd = open(db_file, O_RDONLY)) >= 0) { 1222 size_t sz = 64 * 1024; 1223 char *buffer = malloc(sz); 1224 if (buffer != NULL) { 1225 while (read(fd, buffer, sz) > 0) 1226 ; 1227 free(buffer); 1228 } 1229 (void) close(fd); 1230 } 1231 1232 /* 1233 * run an integrity check 1234 */ 1235 r = sqlite_exec(be->be_db, "PRAGMA integrity_check;", 1236 backend_integrity_callback, &integrity_results, &errp); 1237 1238 if (r == SQLITE_BUSY || r == SQLITE_LOCKED) { 1239 free(errp); 1240 *bep = NULL; 1241 backend_destroy(be); 1242 return (BACKEND_CREATE_LOCKED); 1243 } 1244 if (r == SQLITE_ABORT) { 1245 free(errp); 1246 errp = NULL; 1247 integrity_results = "out of memory running integrity check\n"; 1248 } else if (r != SQLITE_OK && integrity_results == NULL) { 1249 integrity_results = errp; 1250 errp = NULL; 1251 } 1252 1253 integrity_fail: 1254 if (integrity_results != NULL) { 1255 const char *fname = "/etc/svc/volatile/db_errors"; 1256 if ((fd = open(fname, O_CREAT|O_WRONLY|O_APPEND, 0600)) < 0) { 1257 fname = NULL; 1258 } else { 1259 if (backend_fd_write(fd, "\n\n") < 0 || 1260 backend_fd_write(fd, db_file) < 0 || 1261 backend_fd_write(fd, 1262 ": PRAGMA integrity_check; failed. Results:\n") < 1263 0 || backend_fd_write(fd, integrity_results) < 0 || 1264 backend_fd_write(fd, "\n\n") < 0) { 1265 fname = NULL; 1266 } 1267 (void) close(fd); 1268 } 1269 1270 if (!is_main_repository || 1271 backend_id == BACKEND_TYPE_NONPERSIST) { 1272 if (fname != NULL) 1273 configd_critical( 1274 "%s: integrity check failed. Details in " 1275 "%s\n", db_file, fname); 1276 else 1277 configd_critical( 1278 "%s: integrity check failed: %s\n", 1279 db_file); 1280 } else { 1281 (void) fprintf(stderr, 1282 "\n" 1283 "svc.configd: smf(5) database integrity check of:\n" 1284 "\n" 1285 " %s\n" 1286 "\n" 1287 " failed. The database might be damaged or a media error might have\n" 1288 " prevented it from being verified. Additional information useful to\n" 1289 " your service provider%s%s\n" 1290 "\n" 1291 " The system will not be able to boot until you have restored a working\n" 1292 " database. svc.startd(1M) will provide a sulogin(1M) prompt for recovery\n" 1293 " purposes. The command:\n" 1294 "\n" 1295 " /lib/svc/bin/restore_repository\n" 1296 "\n" 1297 " can be run to restore a backup version of your repository. See\n" 1298 " http://sun.com/msg/SMF-8000-MY for more information.\n" 1299 "\n", 1300 db_file, 1301 (fname == NULL)? ":\n\n" : " is in:\n\n ", 1302 (fname == NULL)? integrity_results : fname); 1303 } 1304 free(errp); 1305 goto fail; 1306 } 1307 1308 /* 1309 * check if we are writable 1310 */ 1311 r = backend_is_readonly(be->be_db, be->be_path); 1312 1313 if (r == SQLITE_BUSY || r == SQLITE_LOCKED) { 1314 free(errp); 1315 *bep = NULL; 1316 backend_destroy(be); 1317 return (BACKEND_CREATE_LOCKED); 1318 } 1319 if (r != SQLITE_OK && r != SQLITE_FULL) { 1320 free(errp); 1321 be->be_readonly = 1; 1322 *bep = be; 1323 return (BACKEND_CREATE_READONLY); 1324 } 1325 *bep = be; 1326 return (BACKEND_CREATE_SUCCESS); 1327 1328 fail: 1329 *bep = NULL; 1330 backend_destroy(be); 1331 return (BACKEND_CREATE_FAIL); 1332 } 1333 1334 /* 1335 * (arg & -arg) is, through the magic of twos-complement arithmetic, the 1336 * lowest set bit in arg. 1337 */ 1338 static size_t 1339 round_up_to_p2(size_t arg) 1340 { 1341 /* 1342 * Don't allow a zero result. 1343 */ 1344 assert(arg > 0 && ((ssize_t)arg > 0)); 1345 1346 while ((arg & (arg - 1)) != 0) 1347 arg += (arg & -arg); 1348 1349 return (arg); 1350 } 1351 1352 /* 1353 * Returns 1354 * _NO_RESOURCES - out of memory 1355 * _BACKEND_ACCESS - backend type t (other than _NORMAL) doesn't exist 1356 * _DONE - callback aborted query 1357 * _SUCCESS 1358 */ 1359 int 1360 backend_run(backend_type_t t, backend_query_t *q, 1361 backend_run_callback_f *cb, void *data) 1362 { 1363 char *errmsg = NULL; 1364 int ret; 1365 sqlite_backend_t *be; 1366 hrtime_t ts, vts; 1367 1368 if (q == NULL || q->bq_buf == NULL) 1369 return (REP_PROTOCOL_FAIL_NO_RESOURCES); 1370 1371 if ((ret = backend_lock(t, 0, &be)) != REP_PROTOCOL_SUCCESS) 1372 return (ret); 1373 1374 ts = gethrtime(); 1375 vts = gethrvtime(); 1376 ret = sqlite_exec(be->be_db, q->bq_buf, cb, data, &errmsg); 1377 UPDATE_TOTALS(be, bt_exec, ts, vts); 1378 ret = backend_error(be, ret, errmsg); 1379 backend_unlock(be); 1380 1381 return (ret); 1382 } 1383 1384 /* 1385 * Starts a "read-only" transaction -- i.e., locks out writers as long 1386 * as it is active. 1387 * 1388 * Fails with 1389 * _NO_RESOURCES - out of memory 1390 * 1391 * If t is not _NORMAL, can also fail with 1392 * _BACKEND_ACCESS - backend does not exist 1393 * 1394 * If writable is true, can also fail with 1395 * _BACKEND_READONLY 1396 */ 1397 static int 1398 backend_tx_begin_common(backend_type_t t, backend_tx_t **txp, int writable) 1399 { 1400 backend_tx_t *ret; 1401 sqlite_backend_t *be; 1402 int r; 1403 1404 *txp = NULL; 1405 1406 ret = uu_zalloc(sizeof (*ret)); 1407 if (ret == NULL) 1408 return (REP_PROTOCOL_FAIL_NO_RESOURCES); 1409 1410 if ((r = backend_lock(t, writable, &be)) != REP_PROTOCOL_SUCCESS) { 1411 uu_free(ret); 1412 return (r); 1413 } 1414 1415 ret->bt_be = be; 1416 ret->bt_readonly = !writable; 1417 ret->bt_type = t; 1418 ret->bt_full = 0; 1419 1420 *txp = ret; 1421 return (REP_PROTOCOL_SUCCESS); 1422 } 1423 1424 int 1425 backend_tx_begin_ro(backend_type_t t, backend_tx_t **txp) 1426 { 1427 return (backend_tx_begin_common(t, txp, 0)); 1428 } 1429 1430 static void 1431 backend_tx_end(backend_tx_t *tx) 1432 { 1433 sqlite_backend_t *be; 1434 1435 be = tx->bt_be; 1436 1437 if (tx->bt_full) { 1438 struct sqlite *new; 1439 1440 /* 1441 * sqlite tends to be sticky with SQLITE_FULL, so we try 1442 * to get a fresh database handle if we got a FULL warning 1443 * along the way. If that fails, no harm done. 1444 */ 1445 new = sqlite_open(be->be_path, 0600, NULL); 1446 if (new != NULL) { 1447 sqlite_close(be->be_db); 1448 be->be_db = new; 1449 } 1450 } 1451 backend_unlock(be); 1452 tx->bt_be = NULL; 1453 uu_free(tx); 1454 } 1455 1456 void 1457 backend_tx_end_ro(backend_tx_t *tx) 1458 { 1459 assert(tx->bt_readonly); 1460 backend_tx_end(tx); 1461 } 1462 1463 /* 1464 * Fails with 1465 * _NO_RESOURCES - out of memory 1466 * _BACKEND_ACCESS 1467 * _BACKEND_READONLY 1468 */ 1469 int 1470 backend_tx_begin(backend_type_t t, backend_tx_t **txp) 1471 { 1472 int r; 1473 char *errmsg; 1474 hrtime_t ts, vts; 1475 1476 r = backend_tx_begin_common(t, txp, 1); 1477 if (r != REP_PROTOCOL_SUCCESS) 1478 return (r); 1479 1480 ts = gethrtime(); 1481 vts = gethrvtime(); 1482 r = sqlite_exec((*txp)->bt_be->be_db, "BEGIN TRANSACTION", NULL, NULL, 1483 &errmsg); 1484 UPDATE_TOTALS((*txp)->bt_be, bt_exec, ts, vts); 1485 if (r == SQLITE_FULL) 1486 (*txp)->bt_full = 1; 1487 r = backend_error((*txp)->bt_be, r, errmsg); 1488 1489 if (r != REP_PROTOCOL_SUCCESS) { 1490 assert(r != REP_PROTOCOL_DONE); 1491 (void) sqlite_exec((*txp)->bt_be->be_db, 1492 "ROLLBACK TRANSACTION", NULL, NULL, NULL); 1493 backend_tx_end(*txp); 1494 *txp = NULL; 1495 return (r); 1496 } 1497 1498 (*txp)->bt_readonly = 0; 1499 1500 return (REP_PROTOCOL_SUCCESS); 1501 } 1502 1503 void 1504 backend_tx_rollback(backend_tx_t *tx) 1505 { 1506 int r; 1507 char *errmsg; 1508 sqlite_backend_t *be; 1509 hrtime_t ts, vts; 1510 1511 assert(tx != NULL && tx->bt_be != NULL && !tx->bt_readonly); 1512 be = tx->bt_be; 1513 1514 ts = gethrtime(); 1515 vts = gethrvtime(); 1516 r = sqlite_exec(be->be_db, "ROLLBACK TRANSACTION", NULL, NULL, 1517 &errmsg); 1518 UPDATE_TOTALS(be, bt_exec, ts, vts); 1519 if (r == SQLITE_FULL) 1520 tx->bt_full = 1; 1521 (void) backend_error(be, r, errmsg); 1522 1523 backend_tx_end(tx); 1524 } 1525 1526 /* 1527 * Fails with 1528 * _NO_RESOURCES - out of memory 1529 */ 1530 int 1531 backend_tx_commit(backend_tx_t *tx) 1532 { 1533 int r, r2; 1534 char *errmsg; 1535 sqlite_backend_t *be; 1536 hrtime_t ts, vts; 1537 1538 assert(tx != NULL && tx->bt_be != NULL && !tx->bt_readonly); 1539 be = tx->bt_be; 1540 ts = gethrtime(); 1541 vts = gethrvtime(); 1542 r = sqlite_exec(be->be_db, "COMMIT TRANSACTION", NULL, NULL, 1543 &errmsg); 1544 UPDATE_TOTALS(be, bt_exec, ts, vts); 1545 if (r == SQLITE_FULL) 1546 tx->bt_full = 1; 1547 1548 r = backend_error(be, r, errmsg); 1549 assert(r != REP_PROTOCOL_DONE); 1550 1551 if (r != REP_PROTOCOL_SUCCESS) { 1552 r2 = sqlite_exec(be->be_db, "ROLLBACK TRANSACTION", NULL, NULL, 1553 &errmsg); 1554 r2 = backend_error(be, r2, errmsg); 1555 if (r2 != REP_PROTOCOL_SUCCESS) 1556 backend_panic("cannot rollback failed commit"); 1557 1558 backend_tx_end(tx); 1559 return (r); 1560 } 1561 backend_tx_end(tx); 1562 return (REP_PROTOCOL_SUCCESS); 1563 } 1564 1565 static const char * 1566 id_space_to_name(enum id_space id) 1567 { 1568 switch (id) { 1569 case BACKEND_ID_SERVICE_INSTANCE: 1570 return ("SI"); 1571 case BACKEND_ID_PROPERTYGRP: 1572 return ("PG"); 1573 case BACKEND_ID_GENERATION: 1574 return ("GEN"); 1575 case BACKEND_ID_PROPERTY: 1576 return ("PROP"); 1577 case BACKEND_ID_VALUE: 1578 return ("VAL"); 1579 case BACKEND_ID_SNAPNAME: 1580 return ("SNAME"); 1581 case BACKEND_ID_SNAPSHOT: 1582 return ("SHOT"); 1583 case BACKEND_ID_SNAPLEVEL: 1584 return ("SLVL"); 1585 default: 1586 abort(); 1587 /*NOTREACHED*/ 1588 } 1589 } 1590 1591 /* 1592 * Returns a new id or 0 if the id argument is invalid or the query fails. 1593 */ 1594 uint32_t 1595 backend_new_id(backend_tx_t *tx, enum id_space id) 1596 { 1597 struct run_single_int_info info; 1598 uint32_t new_id = 0; 1599 const char *name = id_space_to_name(id); 1600 char *errmsg; 1601 int ret; 1602 sqlite_backend_t *be; 1603 hrtime_t ts, vts; 1604 1605 assert(tx != NULL && tx->bt_be != NULL && !tx->bt_readonly); 1606 be = tx->bt_be; 1607 1608 info.rs_out = &new_id; 1609 info.rs_result = REP_PROTOCOL_FAIL_NOT_FOUND; 1610 1611 ts = gethrtime(); 1612 vts = gethrvtime(); 1613 ret = sqlite_exec_printf(be->be_db, 1614 "SELECT id_next FROM id_tbl WHERE (id_name = '%q');" 1615 "UPDATE id_tbl SET id_next = id_next + 1 WHERE (id_name = '%q');", 1616 run_single_int_callback, &info, &errmsg, name, name); 1617 UPDATE_TOTALS(be, bt_exec, ts, vts); 1618 if (ret == SQLITE_FULL) 1619 tx->bt_full = 1; 1620 1621 ret = backend_error(be, ret, errmsg); 1622 1623 if (ret != REP_PROTOCOL_SUCCESS) { 1624 return (0); 1625 } 1626 1627 return (new_id); 1628 } 1629 1630 /* 1631 * Returns 1632 * _NO_RESOURCES - out of memory 1633 * _DONE - callback aborted query 1634 * _SUCCESS 1635 */ 1636 int 1637 backend_tx_run(backend_tx_t *tx, backend_query_t *q, 1638 backend_run_callback_f *cb, void *data) 1639 { 1640 char *errmsg = NULL; 1641 int ret; 1642 sqlite_backend_t *be; 1643 hrtime_t ts, vts; 1644 1645 assert(tx != NULL && tx->bt_be != NULL); 1646 be = tx->bt_be; 1647 1648 if (q == NULL || q->bq_buf == NULL) 1649 return (REP_PROTOCOL_FAIL_NO_RESOURCES); 1650 1651 ts = gethrtime(); 1652 vts = gethrvtime(); 1653 ret = sqlite_exec(be->be_db, q->bq_buf, cb, data, &errmsg); 1654 UPDATE_TOTALS(be, bt_exec, ts, vts); 1655 if (ret == SQLITE_FULL) 1656 tx->bt_full = 1; 1657 ret = backend_error(be, ret, errmsg); 1658 1659 return (ret); 1660 } 1661 1662 /* 1663 * Returns 1664 * _NO_RESOURCES - out of memory 1665 * _NOT_FOUND - the query returned no results 1666 * _SUCCESS - the query returned a single integer 1667 */ 1668 int 1669 backend_tx_run_single_int(backend_tx_t *tx, backend_query_t *q, uint32_t *buf) 1670 { 1671 struct run_single_int_info info; 1672 int ret; 1673 1674 info.rs_out = buf; 1675 info.rs_result = REP_PROTOCOL_FAIL_NOT_FOUND; 1676 1677 ret = backend_tx_run(tx, q, run_single_int_callback, &info); 1678 assert(ret != REP_PROTOCOL_DONE); 1679 1680 if (ret != REP_PROTOCOL_SUCCESS) 1681 return (ret); 1682 1683 return (info.rs_result); 1684 } 1685 1686 /* 1687 * Fails with 1688 * _NO_RESOURCES - out of memory 1689 */ 1690 int 1691 backend_tx_run_update(backend_tx_t *tx, const char *format, ...) 1692 { 1693 va_list a; 1694 char *errmsg; 1695 int ret; 1696 sqlite_backend_t *be; 1697 hrtime_t ts, vts; 1698 1699 assert(tx != NULL && tx->bt_be != NULL && !tx->bt_readonly); 1700 be = tx->bt_be; 1701 1702 va_start(a, format); 1703 ts = gethrtime(); 1704 vts = gethrvtime(); 1705 ret = sqlite_exec_vprintf(be->be_db, format, NULL, NULL, &errmsg, a); 1706 UPDATE_TOTALS(be, bt_exec, ts, vts); 1707 if (ret == SQLITE_FULL) 1708 tx->bt_full = 1; 1709 va_end(a); 1710 ret = backend_error(be, ret, errmsg); 1711 assert(ret != REP_PROTOCOL_DONE); 1712 1713 return (ret); 1714 } 1715 1716 /* 1717 * returns REP_PROTOCOL_FAIL_NOT_FOUND if no changes occured 1718 */ 1719 int 1720 backend_tx_run_update_changed(backend_tx_t *tx, const char *format, ...) 1721 { 1722 va_list a; 1723 char *errmsg; 1724 int ret; 1725 sqlite_backend_t *be; 1726 hrtime_t ts, vts; 1727 1728 assert(tx != NULL && tx->bt_be != NULL && !tx->bt_readonly); 1729 be = tx->bt_be; 1730 1731 va_start(a, format); 1732 ts = gethrtime(); 1733 vts = gethrvtime(); 1734 ret = sqlite_exec_vprintf(be->be_db, format, NULL, NULL, &errmsg, a); 1735 UPDATE_TOTALS(be, bt_exec, ts, vts); 1736 if (ret == SQLITE_FULL) 1737 tx->bt_full = 1; 1738 va_end(a); 1739 1740 ret = backend_error(be, ret, errmsg); 1741 1742 return (ret); 1743 } 1744 1745 #define BACKEND_ADD_SCHEMA(be, file, tbls, idxs) \ 1746 (backend_add_schema((be), (file), \ 1747 (tbls), sizeof (tbls) / sizeof (*(tbls)), \ 1748 (idxs), sizeof (idxs) / sizeof (*(idxs)))) 1749 1750 static int 1751 backend_add_schema(sqlite_backend_t *be, const char *file, 1752 struct backend_tbl_info *tbls, int tbl_count, 1753 struct backend_idx_info *idxs, int idx_count) 1754 { 1755 int i; 1756 char *errmsg; 1757 int ret; 1758 1759 /* 1760 * Create the tables. 1761 */ 1762 for (i = 0; i < tbl_count; i++) { 1763 if (tbls[i].bti_name == NULL) { 1764 assert(i + 1 == tbl_count); 1765 break; 1766 } 1767 ret = sqlite_exec_printf(be->be_db, 1768 "CREATE TABLE %s (%s);\n", 1769 NULL, NULL, &errmsg, tbls[i].bti_name, tbls[i].bti_cols); 1770 1771 if (ret != SQLITE_OK) { 1772 configd_critical( 1773 "%s: %s table creation fails: %s\n", file, 1774 tbls[i].bti_name, errmsg); 1775 free(errmsg); 1776 return (-1); 1777 } 1778 } 1779 1780 /* 1781 * Make indices on key tables and columns. 1782 */ 1783 for (i = 0; i < idx_count; i++) { 1784 if (idxs[i].bxi_tbl == NULL) { 1785 assert(i + 1 == idx_count); 1786 break; 1787 } 1788 1789 ret = sqlite_exec_printf(be->be_db, 1790 "CREATE INDEX %s_%s ON %s (%s);\n", 1791 NULL, NULL, &errmsg, idxs[i].bxi_tbl, idxs[i].bxi_idx, 1792 idxs[i].bxi_tbl, idxs[i].bxi_cols); 1793 1794 if (ret != SQLITE_OK) { 1795 configd_critical( 1796 "%s: %s_%s index creation fails: %s\n", file, 1797 idxs[i].bxi_tbl, idxs[i].bxi_idx, errmsg); 1798 free(errmsg); 1799 return (-1); 1800 } 1801 } 1802 return (0); 1803 } 1804 1805 static int 1806 backend_init_schema(sqlite_backend_t *be, const char *db_file, backend_type_t t) 1807 { 1808 int i; 1809 char *errmsg; 1810 int ret; 1811 1812 assert(t == BACKEND_TYPE_NORMAL || t == BACKEND_TYPE_NONPERSIST); 1813 1814 if (t == BACKEND_TYPE_NORMAL) { 1815 ret = BACKEND_ADD_SCHEMA(be, db_file, tbls_normal, idxs_normal); 1816 } else if (t == BACKEND_TYPE_NONPERSIST) { 1817 ret = BACKEND_ADD_SCHEMA(be, db_file, tbls_np, idxs_np); 1818 } else { 1819 abort(); /* can't happen */ 1820 } 1821 1822 if (ret < 0) { 1823 return (ret); 1824 } 1825 1826 ret = BACKEND_ADD_SCHEMA(be, db_file, tbls_common, idxs_common); 1827 if (ret < 0) { 1828 return (ret); 1829 } 1830 1831 /* 1832 * Add the schema version to the table 1833 */ 1834 ret = sqlite_exec_printf(be->be_db, 1835 "INSERT INTO schema_version (schema_version) VALUES (%d)", 1836 NULL, NULL, &errmsg, BACKEND_SCHEMA_VERSION); 1837 if (ret != SQLITE_OK) { 1838 configd_critical( 1839 "setting schema version fails: %s\n", errmsg); 1840 free(errmsg); 1841 } 1842 1843 /* 1844 * Populate id_tbl with initial IDs. 1845 */ 1846 for (i = 0; i < BACKEND_ID_INVALID; i++) { 1847 const char *name = id_space_to_name(i); 1848 1849 ret = sqlite_exec_printf(be->be_db, 1850 "INSERT INTO id_tbl (id_name, id_next) " 1851 "VALUES ('%q', %d);", NULL, NULL, &errmsg, name, 1); 1852 if (ret != SQLITE_OK) { 1853 configd_critical( 1854 "id insertion for %s fails: %s\n", name, errmsg); 1855 free(errmsg); 1856 return (-1); 1857 } 1858 } 1859 /* 1860 * Set the persistance of the database. The normal database is marked 1861 * "synchronous", so that all writes are synchronized to stable storage 1862 * before proceeding. 1863 */ 1864 ret = sqlite_exec_printf(be->be_db, 1865 "PRAGMA default_synchronous = %s; PRAGMA synchronous = %s;", 1866 NULL, NULL, &errmsg, 1867 (t == BACKEND_TYPE_NORMAL)? "ON" : "OFF", 1868 (t == BACKEND_TYPE_NORMAL)? "ON" : "OFF"); 1869 if (ret != SQLITE_OK) { 1870 configd_critical("pragma setting fails: %s\n", errmsg); 1871 free(errmsg); 1872 return (-1); 1873 } 1874 1875 return (0); 1876 } 1877 1878 int 1879 backend_init(const char *db_file, const char *npdb_file, int have_np) 1880 { 1881 sqlite_backend_t *be; 1882 int r; 1883 int writable_persist = 1; 1884 1885 /* set up our temporary directory */ 1886 sqlite_temp_directory = "/etc/svc/volatile"; 1887 1888 if (strcmp(SQLITE_VERSION, sqlite_version) != 0) { 1889 configd_critical("Mismatched link! (%s should be %s)\n", 1890 sqlite_version, SQLITE_VERSION); 1891 return (CONFIGD_EXIT_DATABASE_INIT_FAILED); 1892 } 1893 if (db_file == NULL) 1894 db_file = REPOSITORY_DB; 1895 1896 r = backend_create(BACKEND_TYPE_NORMAL, db_file, &be); 1897 switch (r) { 1898 case BACKEND_CREATE_FAIL: 1899 return (CONFIGD_EXIT_DATABASE_INIT_FAILED); 1900 case BACKEND_CREATE_LOCKED: 1901 return (CONFIGD_EXIT_DATABASE_LOCKED); 1902 case BACKEND_CREATE_SUCCESS: 1903 break; /* success */ 1904 case BACKEND_CREATE_READONLY: 1905 writable_persist = 0; 1906 break; 1907 case BACKEND_CREATE_NEED_INIT: 1908 if (backend_init_schema(be, db_file, BACKEND_TYPE_NORMAL)) { 1909 backend_destroy(be); 1910 return (CONFIGD_EXIT_DATABASE_INIT_FAILED); 1911 } 1912 break; 1913 default: 1914 abort(); 1915 /*NOTREACHED*/ 1916 } 1917 backend_create_finish(BACKEND_TYPE_NORMAL, be); 1918 1919 if (have_np) { 1920 if (npdb_file == NULL) 1921 npdb_file = NONPERSIST_DB; 1922 1923 r = backend_create(BACKEND_TYPE_NONPERSIST, npdb_file, &be); 1924 switch (r) { 1925 case BACKEND_CREATE_SUCCESS: 1926 break; /* success */ 1927 case BACKEND_CREATE_FAIL: 1928 return (CONFIGD_EXIT_DATABASE_INIT_FAILED); 1929 case BACKEND_CREATE_LOCKED: 1930 return (CONFIGD_EXIT_DATABASE_LOCKED); 1931 case BACKEND_CREATE_READONLY: 1932 configd_critical("%s: unable to write\n", npdb_file); 1933 return (CONFIGD_EXIT_DATABASE_INIT_FAILED); 1934 case BACKEND_CREATE_NEED_INIT: 1935 if (backend_init_schema(be, db_file, 1936 BACKEND_TYPE_NONPERSIST)) { 1937 backend_destroy(be); 1938 return (CONFIGD_EXIT_DATABASE_INIT_FAILED); 1939 } 1940 break; 1941 default: 1942 abort(); 1943 /*NOTREACHED*/ 1944 } 1945 backend_create_finish(BACKEND_TYPE_NONPERSIST, be); 1946 1947 /* 1948 * If we started up with a writable filesystem, but the 1949 * non-persistent database needed initialization, we 1950 * are booting a non-global zone, so do a backup. 1951 */ 1952 if (r == BACKEND_CREATE_NEED_INIT && writable_persist && 1953 backend_lock(BACKEND_TYPE_NORMAL, 0, &be) == 1954 REP_PROTOCOL_SUCCESS) { 1955 if (backend_create_backup_locked(be, 1956 REPOSITORY_BOOT_BACKUP) != REP_PROTOCOL_SUCCESS) { 1957 configd_critical( 1958 "unable to create \"%s\" backup of " 1959 "\"%s\"\n", REPOSITORY_BOOT_BACKUP, 1960 be->be_path); 1961 } 1962 backend_unlock(be); 1963 } 1964 } 1965 return (CONFIGD_EXIT_OKAY); 1966 } 1967 1968 /* 1969 * quiesce all database activity prior to exiting 1970 */ 1971 void 1972 backend_fini(void) 1973 { 1974 sqlite_backend_t *be_normal, *be_np; 1975 1976 (void) backend_lock(BACKEND_TYPE_NORMAL, 1, &be_normal); 1977 (void) backend_lock(BACKEND_TYPE_NONPERSIST, 1, &be_np); 1978 } 1979 1980 #define QUERY_BASE 128 1981 backend_query_t * 1982 backend_query_alloc(void) 1983 { 1984 backend_query_t *q; 1985 q = calloc(1, sizeof (backend_query_t)); 1986 if (q != NULL) { 1987 q->bq_size = QUERY_BASE; 1988 q->bq_buf = calloc(1, q->bq_size); 1989 if (q->bq_buf == NULL) { 1990 q->bq_size = 0; 1991 } 1992 1993 } 1994 return (q); 1995 } 1996 1997 void 1998 backend_query_append(backend_query_t *q, const char *value) 1999 { 2000 char *alloc; 2001 int count; 2002 size_t size, old_len; 2003 2004 if (q == NULL) { 2005 /* We'll discover the error when we try to run the query. */ 2006 return; 2007 } 2008 2009 while (q->bq_buf != NULL) { 2010 old_len = strlen(q->bq_buf); 2011 size = q->bq_size; 2012 count = strlcat(q->bq_buf, value, size); 2013 2014 if (count < size) 2015 break; /* success */ 2016 2017 q->bq_buf[old_len] = 0; 2018 size = round_up_to_p2(count + 1); 2019 2020 assert(size > q->bq_size); 2021 alloc = realloc(q->bq_buf, size); 2022 if (alloc == NULL) { 2023 free(q->bq_buf); 2024 q->bq_buf = NULL; 2025 break; /* can't grow */ 2026 } 2027 2028 q->bq_buf = alloc; 2029 q->bq_size = size; 2030 } 2031 } 2032 2033 void 2034 backend_query_add(backend_query_t *q, const char *format, ...) 2035 { 2036 va_list args; 2037 char *new; 2038 2039 if (q == NULL || q->bq_buf == NULL) 2040 return; 2041 2042 va_start(args, format); 2043 new = sqlite_vmprintf(format, args); 2044 va_end(args); 2045 2046 if (new == NULL) { 2047 free(q->bq_buf); 2048 q->bq_buf = NULL; 2049 return; 2050 } 2051 2052 backend_query_append(q, new); 2053 2054 free(new); 2055 } 2056 2057 void 2058 backend_query_free(backend_query_t *q) 2059 { 2060 if (q != NULL) { 2061 if (q->bq_buf != NULL) { 2062 free(q->bq_buf); 2063 } 2064 free(q); 2065 } 2066 } 2067