xref: /titanic_41/usr/src/cmd/tsol/labeld/svc-labeld (revision 36d41b68ce4ecc38f01ced5fe21dddf05a5f9289)
1f875b4ebSrica#!/sbin/sh
2f875b4ebSrica#
3f875b4ebSrica# CDDL HEADER START
4f875b4ebSrica#
5f875b4ebSrica# The contents of this file are subject to the terms of the
6f875b4ebSrica# Common Development and Distribution License (the "License").
7f875b4ebSrica# You may not use this file except in compliance with the License.
8f875b4ebSrica#
9f875b4ebSrica# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10f875b4ebSrica# or http://www.opensolaris.org/os/licensing.
11f875b4ebSrica# See the License for the specific language governing permissions
12f875b4ebSrica# and limitations under the License.
13f875b4ebSrica#
14f875b4ebSrica# When distributing Covered Code, include this CDDL HEADER in each
15f875b4ebSrica# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16f875b4ebSrica# If applicable, add the following below this CDDL HEADER, with the
17f875b4ebSrica# fields enclosed by brackets "[]" replaced with your own identifying
18f875b4ebSrica# information: Portions Copyright [yyyy] [name of copyright owner]
19f875b4ebSrica#
20f875b4ebSrica# CDDL HEADER END
21f875b4ebSrica#
22*36d41b68SNathan Bush# Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23f875b4ebSrica# Use is subject to license terms.
24f875b4ebSrica#
25f875b4ebSrica
26f875b4ebSrica. /lib/svc/share/smf_include.sh
27f875b4ebSrica
28f875b4ebSricaROOT_PATH=""
29f875b4ebSricaif [ $# -gt 1 ]; then
30f875b4ebSrica	if [ $# -ne 3 -o "$2" != "-R" ]; then
31f875b4ebSrica		echo "$0: invalid syntax"
32f875b4ebSrica		exit $SMF_EXIT_ERR_CONFIG
33f875b4ebSrica	fi
34f875b4ebSrica	if [ "$3" != "/" ]; then
35f875b4ebSrica		ROOT_PATH=$3
36f875b4ebSrica	fi
37f875b4ebSricafi
38f875b4ebSricaif [ -n "$ROOT_PATH" -a "$1" != "start" ]; then
39f875b4ebSrica	echo "$0: invalid syntax: -R allowed for start method only"
40f875b4ebSrica	exit $SMF_EXIT_ERR_CONFIG
41f875b4ebSricafi
42f875b4ebSricaif [ -n "$ROOT_PATH" -a ! -d "$ROOT_PATH" ]; then
43f875b4ebSrica	echo "$0: invalid -R rootpath dir specified"
44f875b4ebSrica	exit $SMF_EXIT_ERR_CONFIG
45f875b4ebSricafi
46f875b4ebSrica
47f875b4ebSricaif smf_is_nonglobalzone; then
48f875b4ebSrica	echo "$0: not supported in a local zone"
49f875b4ebSrica	exit $SMF_EXIT_ERR_CONFIG
50f875b4ebSricafi
51f875b4ebSrica
52583b61f6Sajrewrite_logindev()
53583b61f6Saj{
54583b61f6Saj	from="$1"
55583b61f6Saj	to="$2"
56583b61f6Saj	# Comment out audio, usb, removable-media, and hotpluggable device
57583b61f6Saj	# entries in /etc/logindevperm.
58583b61f6Saj	LOGINDEVPERM=$ROOT_PATH/etc/logindevperm
59583b61f6Saj	if [ ! -f $LOGINDEVPERM ]; then
60583b61f6Saj		return
61583b61f6Saj	fi
62583b61f6Saj	for line in \
63*36d41b68SNathan Bush		"/dev/sound/" \
64*36d41b68SNathan Bush		"/dev/removable-media/" \
65*36d41b68SNathan Bush		"/dev/hotpluggable/" \
66*36d41b68SNathan Bush		"/dev/usb/\[0-9a-f\]" \
67583b61f6Saj			; do
68*36d41b68SNathan Bush		sed -e "s!^$from\([^# 	]\{1,\}[ 	}\{1,\}[0-9]\{1,\}[ 	]\{1,\}\)$line!$to\1$line!" \
69*36d41b68SNathan Bush		    $LOGINDEVPERM > /tmp/tmp.$$
70583b61f6Saj		cp /tmp/tmp.$$ $LOGINDEVPERM
71583b61f6Saj	done
72583b61f6Saj	rm -f /tmp/tmp.$$
73583b61f6Saj}
74583b61f6Saj
75f875b4ebSricado_logindev()
76f875b4ebSrica{
77583b61f6Saj	rewrite_logindev "" "#"
78f875b4ebSrica}
79f875b4ebSrica
80f875b4ebSricado_otherservices()
81f875b4ebSrica{
82f875b4ebSrica	# Setup dependent services
83f875b4ebSrica	cat >> $ROOT_PATH/var/svc/profile/upgrade <<\__ENABLE_OTHERS
84f875b4ebSrica		/usr/sbin/svcadm enable -s svc:/network/tnd:default
85f875b4ebSrica		/usr/sbin/svcadm enable -s svc:/system/tsol-zones:default
86f875b4ebSrica		/usr/sbin/svccfg -s svc:/application/x11/x11-server \
87f875b4ebSrica		    setprop options/tcp_listen = true
88f875b4ebSrica		/usr/sbin/svcadm enable svc:/network/rpc/rstat:default
89f875b4ebSrica__ENABLE_OTHERS
90f875b4ebSrica
91f875b4ebSrica}
92f875b4ebSrica
93f875b4ebSricado_bsmconv()
94f875b4ebSrica{
95f875b4ebSrica	# Run bsmconv so audit and device allocation is enabled by
96f875b4ebSrica	# default with Trusted Extensions.
97f875b4ebSrica	if [ "$ROOT_PATH" = "/" -o "$ROOT_PATH" = "" ]; then
98f875b4ebSrica		BSMDIR=""
99f875b4ebSrica	else
100f875b4ebSrica		BSMDIR=$ROOT_PATH
101f875b4ebSrica	fi
102f875b4ebSrica	echo "Running bsmconv ..."
103f875b4ebSrica	echo `TEXTDOMAIN="SUNW_OST_OSCMD" gettext "y"` | \
104f875b4ebSrica	    $ROOT_PATH/etc/security/bsmconv $ROOT_PATH
105f875b4ebSrica}
106f875b4ebSrica
107f875b4ebSricado_nscd()
108f875b4ebSrica{
109f875b4ebSrica# For Trusted Extensions, make nscd service transient in local zones.
110f875b4ebSricacat >> $ROOT_PATH/var/svc/profile/upgrade <<\_DEL_LOCAL_NSCD
111f875b4ebSrica	if [ `/sbin/zonename` != "global" ]; then
112f875b4ebSrica		nscd="svc:/system/name-service-cache"
113f875b4ebSrica		duration=""
114f875b4ebSrica		if /bin/svcprop -q -c -p startd/duration $nscd ; then
115f875b4ebSrica			duration=`/bin/svcprop -c -p startd/duration $nscd`
116f875b4ebSrica		fi
117f875b4ebSrica		if [ "$duration" != "transient" ]; then
118f875b4ebSrica			/usr/sbin/svccfg -s $nscd addpg startd framework
119f875b4ebSrica			/usr/sbin/svccfg -s $nscd setprop \
120f875b4ebSrica			    startd/duration = astring: transient
121f875b4ebSrica			/usr/sbin/svccfg -s $nscd setprop stop/exec = :true
122f875b4ebSrica			/usr/sbin/svcadm refresh $nscd
123f875b4ebSrica		fi
124f875b4ebSrica	fi
125f875b4ebSrica_DEL_LOCAL_NSCD
126f875b4ebSrica}
127f875b4ebSrica
128f875b4ebSricado_bootupd()
129f875b4ebSrica{
130f875b4ebSrica	if [ -f $ROOT_PATH/platform/`/sbin/uname -m`/boot_archive ]; then
131f875b4ebSrica		if [ -z "$ROOT_PATH" -o "$ROOT_PATH" = "/" ]; then
132f875b4ebSrica			/sbin/bootadm update-archive
133f875b4ebSrica		else
134f875b4ebSrica			/sbin/bootadm update-archive -R $ROOT_PATH
135f875b4ebSrica		fi
136f875b4ebSrica	fi
137f875b4ebSrica}
138f875b4ebSrica
1398700009eSricasetup_tx_changes(){
1408700009eSrica#
1418700009eSrica# No comments or blanks lines allowed in entries below
1428700009eSrica#
1438700009eSricacat > ${TX_ENTRIES} << EOF
1448700009eSricadtlogin		account		requisite	pam_roles.so.1
1458700009eSricadtlogin		account		required	pam_unix_account.so.1
1468700009eSricadtsession	account		requisite	pam_roles.so.1
1478700009eSricadtsession	account		required	pam_unix_account.so.1
1488700009eSricagdm		account		requisite	pam_roles.so.1
1498700009eSricagdm		account		required	pam_unix_account.so.1
1508700009eSricaxscreensaver	account		requisite	pam_roles.so.1
1518700009eSricaxscreensaver	account		required	pam_unix_account.so.1
1528700009eSricapasswd		account		requisite	pam_roles.so.1
1538700009eSricapasswd		account		required	pam_unix_account.so.1
1548700009eSricadtpasswd	account		requisite	pam_roles.so.1
1558700009eSricadtpasswd	account		required	pam_unix_account.so.1
156c64380fdSricatsoljds-tstripe	account		requisite	pam_roles.so.1
157c64380fdSricatsoljds-tstripe	account		required	pam_unix_account.so.1
1588700009eSricaother		account		required	pam_tsol_account.so.1
1598700009eSricaEOF
1608700009eSrica}
1618700009eSrica
1628700009eSricado_addpam()
1638700009eSrica{
1648700009eSrica	PAM_TMP=/tmp/pam_conf.$$
1658700009eSrica	TX_ENTRIES=$PAM_TMP/sct.$$
1668700009eSrica	PAM_DEST=$ROOT_PATH/etc/pam.conf
1678700009eSrica
1688700009eSrica	mkdir $PAM_TMP  || exit $SMF_EXIT_ERR_FATAL
1698700009eSrica	setup_tx_changes
1708700009eSrica
1718700009eSrica	# verify that pam.conf file exists...
1728700009eSrica	if [ ! -f ${PAM_DEST} ]; then
1738700009eSrica		echo "$0: ${PAM_DEST} not found; aborting"
1748700009eSrica		exit $SMF_EXIT_ERR_FATAL
1758700009eSrica	fi
1768700009eSrica
1778700009eSrica	#
1788700009eSrica	# Update pam.conf to append Trusted Extensions entries if not
1798700009eSrica	# already present.
1808700009eSrica	#
1818700009eSrica	rm -f /tmp/pamconf.$$
1828700009eSrica	while read e1 e2 e3 e4 e5
1838700009eSrica	do
1848700009eSrica		# If this is the 'other' entry, add it unless it already
1858700009eSrica		# exists.
1868700009eSrica		if [ $e1 = "other" ]; then
1878700009eSrica			grep \
1888700009eSrica"^[# 	]*$e1[ 	][ 	]*$e2[ 	][ 	]*$e3[ 	][ 	]*$e4" \
1898700009eSrica			    $PAM_DEST >/dev/null 2>&1
1908700009eSrica			if [ $? = 1 ] ; then
1918700009eSrica				# Doesn't exist, enter into pam.conf
1928700009eSrica				echo "$e1\t$e2 $e3\t\t$e4 $e5" \
1938700009eSrica				    >> /tmp/pamconf.$$
1948700009eSrica			fi
1958700009eSrica		else
1968700009eSrica			# Add other entries unless they already have a
1978700009eSrica			# stack of their own.
1988700009eSrica			grep "^[# 	]*$e1[ 	][ 	]*$e2[ 	]" \
1998700009eSrica			    $PAM_DEST >/dev/null 2>&1
2008700009eSrica			if [ $? = 1 ] ; then
2018700009eSrica				echo "$e1\t$e2 $e3\t\t$e4 $e5" \
2028700009eSrica				    >> /tmp/pamconf.$$
2038700009eSrica			fi
2048700009eSrica		fi
2058700009eSrica	done < ${TX_ENTRIES}
2068700009eSrica	# Append TX lines if any were not present already.
2078700009eSrica	if [ -f /tmp/pamconf.$$ ] ; then
2088700009eSrica		echo "# Entries for Trusted Extensions" >> $PAM_DEST
2098700009eSrica		cat /tmp/pamconf.$$ >> $PAM_DEST
2108700009eSrica		echo "$0: updating $PAM_DEST entries for Trusted Extensions;"
2118700009eSrica		echo "$0: please examine/update any new entries"
2128700009eSrica    		rm -f /tmp/pamconf.$$
2138700009eSrica    	fi
2148700009eSrica
2158700009eSrica	rm -rf $PAM_TMP
2168700009eSrica}
2178700009eSrica
2188700009eSricado_pamremove()
2198700009eSrica{
2208700009eSrica	PAM_TMP=/tmp/pam_conf.$$
2218700009eSrica	TX_ENTRIES=$PAM_TMP/sct.$$
2228700009eSrica	PAM_DEST=$ROOT_PATH/etc/pam.conf
2238700009eSrica	TMPFILE=$PAM_TMP/pam.conf
2248700009eSrica
2258700009eSrica	mkdir $PAM_TMP  || exit $SMF_EXIT_ERR_FATAL
2268700009eSrica
2278700009eSrica	# verify that pam.conf file exists...
2288700009eSrica	if [ ! -f ${PAM_DEST} ]; then
2298700009eSrica		echo "$0: ${PAM_DEST} not found; aborting"
2308700009eSrica		exit $SMF_EXIT_ERR_FATAL
2318700009eSrica	fi
2328700009eSrica
2338700009eSrica
2348700009eSrica	grep '^[a-z].*pam_tsol_account' $PAM_DEST > /dev/null 2>&1
2358700009eSrica	if [ $? -ne 0 ]; then
2368700009eSrica		echo "$0: pam_tsol_account module not present,"
2378700009eSrica		echo "$0: No changes were made to $PAM_DEST."
2388700009eSrica		return
2398700009eSrica	fi
2408700009eSrica
2418700009eSrica	grep -v pam_tsol_account $PAM_DEST > $TMPFILE
2428700009eSrica	echo "$0: $PAM_DEST "tsol" entries removed"
2438700009eSrica	cp $TMPFILE $PAM_DEST
2448700009eSrica
2458700009eSrica	rm -rf $PAM_TMP
2468700009eSrica}
2478700009eSrica
248f875b4ebSricado_commonstart()
249f875b4ebSrica{
250f875b4ebSrica	echo "$0: Updating $ROOT_PATH/etc/system..."
251f875b4ebSrica	if [ ! -f ${ROOT_PATH}/etc/system ]; then
252f875b4ebSrica		touch ${ROOT_PATH}/etc/system
253f875b4ebSrica	fi
254f875b4ebSrica
255f875b4ebSrica	# Set sys_labeling in etc/system
256f875b4ebSrica	grep -v "sys_labeling=" ${ROOT_PATH}/etc/system > /tmp/etc.system.$$
257f875b4ebSrica	echo "set sys_labeling=1" >> /tmp/etc.system.$$
258f875b4ebSrica	mv /tmp/etc.system.$$ ${ROOT_PATH}/etc/system
259f875b4ebSrica	grep "set sys_labeling=1" ${ROOT_PATH}/etc/system > /dev/null 2>&1
260f875b4ebSrica	if [ $? -ne 0 ]; then
261f875b4ebSrica    		echo "$0: ERROR: cannot set sys_labeling in $ROOT_PATH/etc/system"
262f875b4ebSrica		exit $SMF_EXIT_ERR_FATAL
263f875b4ebSrica	fi
264f875b4ebSrica
265f875b4ebSrica	# Setup dependent services
266f875b4ebSrica	do_otherservices
267f875b4ebSrica
268f875b4ebSrica	do_logindev
269f875b4ebSrica	do_bsmconv
270f875b4ebSrica	do_nscd
2718700009eSrica	do_addpam
2728700009eSrica
2738700009eSrica	do_bootupd
274f875b4ebSrica}
275f875b4ebSrica
276e9958a6cSjpkdo_servicetag_register()
277e9958a6cSjpk{
278e9958a6cSjpk	ROOTDIR=$1
279e9958a6cSjpk	SOL_ARCH=`/sbin/uname -p`
280e9958a6cSjpk	SOL_VERS=`/sbin/uname -r`
281e9958a6cSjpk	TX_PROD_URN="urn:uuid:fc720df3-410f-11dc-9b8e-080020a9ed93"
282e9958a6cSjpk
283e9958a6cSjpk	if [ ! -x /usr/bin/stclient ]; then
284e9958a6cSjpk		return
285e9958a6cSjpk	fi
286e9958a6cSjpk
287e9958a6cSjpk	# if already registered then do nothing more here
288e9958a6cSjpk	inst=`/usr/bin/svcprop -p labeld/svctag_inst $SMF_FMRI 2>/dev/null`
289e9958a6cSjpk	if [ -n "$inst" ]; then
290e9958a6cSjpk		# this instance id was saved in a SMF property
291e9958a6cSjpk		/usr/bin/stclient -g -i $inst -r $ROOTDIR >/dev/null 2>&1
292e9958a6cSjpk		if [ $? = 0 ]; then
293e9958a6cSjpk			# matching service tag found, so do nothing
294e9958a6cSjpk			return
295e9958a6cSjpk		else
296e9958a6cSjpk			# no match for instance id saved in SMF property
297e9958a6cSjpk			/usr/sbin/svccfg -s $SMF_FMRI delprop \
298e9958a6cSjpk			    labeld/svctag_inst
299e9958a6cSjpk			/usr/sbin/svcadm refresh $SMF_FMRI
300e9958a6cSjpk		fi
301e9958a6cSjpk	fi
302e9958a6cSjpk
303e9958a6cSjpk
304e9958a6cSjpk	# fall through: no service tag, or does not match saved instance id
305e9958a6cSjpk
306e9958a6cSjpk	# determine the urn of the parent (Solaris)
307e9958a6cSjpk	SOL_PROD_URN=""
308e9958a6cSjpk	case $SOL_VERS in
309e9958a6cSjpk	5.11)
310e9958a6cSjpk		SOL_PROD_URN="-F urn:uuid:6df19e63-7ef5-11db-a4bd-080020a9ed93"
311e9958a6cSjpk		;;
312e9958a6cSjpk	5.10)
313e9958a6cSjpk		SOL_PROD_URN="-F urn:uuid:5005588c-36f3-11d6-9cec-fc96f718e113"
314e9958a6cSjpk		;;
315e9958a6cSjpk	esac
316e9958a6cSjpk
317e9958a6cSjpk	# add the service tag
318e9958a6cSjpk	RC=`/usr/bin/stclient -a -p "Solaris Trusted Extensions"	\
319e9958a6cSjpk	    -e $SOL_VERS -t $TX_PROD_URN -P Solaris $SOL_PROD_URN	\
320e9958a6cSjpk	    -m Sun -A $SOL_ARCH -z global -S $0 -r $ROOTDIR`
321e9958a6cSjpk	if [ $? = 0 ]; then
322e9958a6cSjpk		# save instance id in SMF property
323e9958a6cSjpk		inst=`echo "$RC" | grep -i urn|awk -F=  '{print $2}'`
324e9958a6cSjpk		/usr/sbin/svccfg -s $SMF_FMRI setprop \
325e9958a6cSjpk		    labeld/svctag_inst = astring: "$inst"
326e9958a6cSjpk		/usr/sbin/svcadm refresh $SMF_FMRI
327e9958a6cSjpk	fi
328e9958a6cSjpk}
329e9958a6cSjpk
330e9958a6cSjpkdo_servicetag_delete()
331e9958a6cSjpk{
332e9958a6cSjpk	if [ ! -x /usr/bin/stclient ]; then
333e9958a6cSjpk		return
334e9958a6cSjpk	fi
335e9958a6cSjpk
336e9958a6cSjpk	inst=`/usr/bin/svcprop -p labeld/svctag_inst $SMF_FMRI 2>/dev/null`
337e9958a6cSjpk
338e9958a6cSjpk	if [ -n "$inst" ]; then
339e9958a6cSjpk		# delete service tag
340e9958a6cSjpk		/usr/bin/stclient -d -i $inst
341e9958a6cSjpk		# delete saved instance id
342e9958a6cSjpk		/usr/sbin/svccfg -s $SMF_FMRI delprop labeld/svctag_inst
343e9958a6cSjpk		/usr/sbin/svcadm refresh $SMF_FMRI
344e9958a6cSjpk	fi
345e9958a6cSjpk}
346e9958a6cSjpk
347f875b4ebSrica
348f875b4ebSricadaemon_start()
349f875b4ebSrica{
350f875b4ebSrica	# If a labeld door exists, check for a labeld process and exit
351f875b4ebSrica	# if the daemon is already running.
352f875b4ebSrica	if [ -r /var/tsol/doors/labeld ]; then
353f875b4ebSrica		if /usr/bin/pgrep -x -u 0 -P 1 labeld >/dev/null 2>&1; then
354f875b4ebSrica			echo "$0: labeld is already running"
355f875b4ebSrica			exit $SMF_EXIT_ERR_FATAL
356f875b4ebSrica		fi
357f875b4ebSrica	fi
358f875b4ebSrica	/usr/bin/rm -f /var/tsol/doors/labeld
359f875b4ebSrica	/usr/lib/labeld
360f875b4ebSrica}
361f875b4ebSrica
362f875b4ebSricaPATH=/usr/sbin:/usr/bin; export PATH
363f875b4ebSrica
364f875b4ebSricacase "$1" in
365f875b4ebSrica'start')
366f875b4ebSrica	if [ -z "$ROOT_PATH" -o "$ROOT_PATH" = "/" ]; then
367f875b4ebSrica		# native
368f875b4ebSrica
369f875b4ebSrica		if [ -z "$SMF_FMRI" ]; then
370f875b4ebSrica			echo "$0: this script can only be invoked by smf(5)"
371f875b4ebSrica			exit $SMF_EXIT_ERR_NOSMF
372f875b4ebSrica		fi
373f875b4ebSrica
374f875b4ebSrica		tx_enabled=`/usr/bin/svcprop -c -p general/enabled $SMF_FMRI`
375f875b4ebSrica		if [ "$tx_enabled" = "false" ]; then
376f875b4ebSrica			# A sign of trying temporary enablement...no-no
377f875b4ebSrica			echo "$0: Temporarily enabling Trusted Extensions is not allowed."
378f875b4ebSrica			exit $SMF_EXIT_ERR_CONFIG
379f875b4ebSrica		fi
380f875b4ebSrica
381f875b4ebSrica		if (smf_is_system_labeled); then
38215a2c753Sjpk			do_servicetag_register /
383f875b4ebSrica			daemon_start
384f875b4ebSrica			exit $SMF_EXIT_OK
385f875b4ebSrica		fi
386f875b4ebSrica
387f875b4ebSrica		# Make changes to enable Trusted Extensions
388f875b4ebSrica		grep "^set sys_labeling=1" ${ROOT_PATH}/etc/system > /dev/null 2>&1
389f875b4ebSrica		if [ $? -eq 0 ]; then
390f875b4ebSrica			echo "$0: already enabled. Exiting."
391f875b4ebSrica			exit $SMF_EXIT_OK
392f875b4ebSrica		fi
393f875b4ebSrica
394f875b4ebSrica		if [ "`/usr/sbin/zoneadm list -c`" != "global" ]; then
395f875b4ebSrica			echo "$0: Must remove zones before enabling Trusted Extensions."
396f875b4ebSrica			exit $SMF_EXIT_ERR_CONFIG
397f875b4ebSrica		fi
398f875b4ebSrica
399f875b4ebSrica		do_commonstart
400f875b4ebSrica
401e9958a6cSjpk		do_servicetag_register /
402e9958a6cSjpk
403f875b4ebSrica		# start daemon proccess so our service doesn't go into
404f875b4ebSrica		# maintenance state
405f875b4ebSrica		daemon_start
406f875b4ebSrica
407f875b4ebSrica		echo "$0: Started.  Must reboot and configure Trusted Extensions."
408f875b4ebSrica	else
409f875b4ebSrica		# Support jumpstart etc
410f875b4ebSrica
411f875b4ebSrica		# Make changes to enable Trusted Extensions
412f875b4ebSrica		grep "^set sys_labeling=1" ${ROOT_PATH}/etc/system > /dev/null 2>&1
413f875b4ebSrica		if [ $? -eq 0 ]; then
414f875b4ebSrica			echo "$0: already enabled. Exiting."
415f875b4ebSrica			exit $SMF_EXIT_OK
416f875b4ebSrica		fi
417f875b4ebSrica
418f875b4ebSrica		# Setup dependent services
419f875b4ebSrica		cat >> $ROOT_PATH/var/svc/profile/upgrade <<\__TRUSTED_ENABLE
420f875b4ebSrica			/usr/sbin/svcadm enable -s svc:/system/labeld:default
421f875b4ebSrica__TRUSTED_ENABLE
422f875b4ebSrica
423f875b4ebSrica		do_commonstart
424e9958a6cSjpk		do_servicetag_register $ROOT_PATH
425f875b4ebSrica		echo "$0: Started.  Must configure Trusted Extensions before booting."
426f875b4ebSrica	fi
427f875b4ebSrica	;;
428f875b4ebSrica
429f875b4ebSrica'stop')
430f875b4ebSrica	tx_enabled=`/usr/bin/svcprop -c -p general/enabled $SMF_FMRI`
431f875b4ebSrica	if [ "$tx_enabled" = "true" ]; then
432f875b4ebSrica		/usr/bin/pkill -x -u 0 -P 1 -z `smf_zonename` labeld
433f875b4ebSrica		exit $SMF_EXIT_OK
434f875b4ebSrica	fi
435f875b4ebSrica
436f875b4ebSrica	if [ "`/usr/sbin/zoneadm list -c`" != "global" ]; then
437f875b4ebSrica		echo "$0: Must remove zones before disabling Trusted Extensions."
438f875b4ebSrica		exit $SMF_EXIT_ERR_CONFIG
439f875b4ebSrica	fi
440f875b4ebSrica
441f875b4ebSrica	# Stop Trusted services.
442f875b4ebSrica	/usr/sbin/svcadm disable svc:/system/tsol-zones:default 2>/dev/null
443f875b4ebSrica	/usr/sbin/svcadm disable svc:/network/tnd:default 2>/dev/null
444f875b4ebSrica
445583b61f6Saj	# Uncomment audio, usb, removable-media, and hotpluggable device
446583b61f6Saj	# entries in /etc/logindevperm.
447583b61f6Saj	rewrite_logindev "#" ""
448f875b4ebSrica
449f875b4ebSrica	# Remove sys_labeling from /etc/system
450f875b4ebSrica	grep -v "sys_labeling" ${ROOT_PATH}/etc/system > /tmp/etc.system.$$
451f875b4ebSrica	mv /tmp/etc.system.$$ ${ROOT_PATH}/etc/system
452f875b4ebSrica	grep "sys_labeling" ${ROOT_PATH}/etc/system > /dev/null 2>&1
453f875b4ebSrica	if [ $? -eq 0 ]; then
454f875b4ebSrica    		echo "$0: ERROR: cannot remove sys_labeling in $ROOT_PATH/etc/system"
455f875b4ebSrica		exit $SMF_EXIT_ERR_FATAL
456f875b4ebSrica	fi
457f875b4ebSrica
4588700009eSrica	do_pamremove
459e9958a6cSjpk	do_servicetag_delete
4608700009eSrica
461f875b4ebSrica	do_bootupd
462f875b4ebSrica
463f875b4ebSrica	/usr/bin/pkill -x -u 0 -P 1 -z `smf_zonename` labeld
464f875b4ebSrica	echo "$0: Stopped.  Will take effect at next boot."
465f875b4ebSrica	;;
466f875b4ebSrica
467f875b4ebSrica*)
468f875b4ebSrica	echo "Usage: $0 { start | stop }"
469f875b4ebSrica	exit 1
470f875b4ebSrica	;;
471f875b4ebSricaesac
472f875b4ebSrica
473f875b4ebSricaexit $SMF_EXIT_OK
474f875b4ebSrica
475e9958a6cSjpk
476