1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 #pragma ident "%Z%%M% %I% %E% SMI" 28 29 /* 30 * zonecfg is a lex/yacc based command interpreter used to manage zone 31 * configurations. The lexer (see zonecfg_lex.l) builds up tokens, which 32 * the grammar (see zonecfg_grammar.y) builds up into commands, some of 33 * which takes resources and/or properties as arguments. See the block 34 * comments near the end of zonecfg_grammar.y for how the data structures 35 * which keep track of these resources and properties are built up. 36 * 37 * The resource/property data structures are inserted into a command 38 * structure (see zonecfg.h), which also keeps track of command names, 39 * miscellaneous arguments, and function handlers. The grammar selects 40 * the appropriate function handler, each of which takes a pointer to a 41 * command structure as its sole argument, and invokes it. The grammar 42 * itself is "entered" (a la the Matrix) by yyparse(), which is called 43 * from read_input(), our main driving function. That in turn is called 44 * by one of do_interactive(), cmd_file() or one_command_at_a_time(), each 45 * of which is called from main() depending on how the program was invoked. 46 * 47 * The rest of this module consists of the various function handlers and 48 * their helper functions. Some of these functions, particularly the 49 * X_to_str() functions, which maps command, resource and property numbers 50 * to strings, are used quite liberally, as doing so results in a better 51 * program w/rt I18N, reducing the need for translation notes. 52 */ 53 54 #include <sys/mntent.h> 55 #include <sys/varargs.h> 56 #include <sys/sysmacros.h> 57 58 #include <errno.h> 59 #include <fcntl.h> 60 #include <strings.h> 61 #include <unistd.h> 62 #include <ctype.h> 63 #include <stdlib.h> 64 #include <assert.h> 65 #include <sys/stat.h> 66 #include <zone.h> 67 #include <arpa/inet.h> 68 #include <netdb.h> 69 #include <locale.h> 70 #include <libintl.h> 71 #include <alloca.h> 72 #include <signal.h> 73 #include <wait.h> 74 #include <libtecla.h> 75 #include <libzfs.h> 76 #include <sys/brand.h> 77 #include <libbrand.h> 78 79 #include <libzonecfg.h> 80 #include "zonecfg.h" 81 82 #if !defined(TEXT_DOMAIN) /* should be defined by cc -D */ 83 #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it wasn't */ 84 #endif 85 86 #define PAGER "/usr/bin/more" 87 #define EXEC_PREFIX "exec " 88 #define EXEC_LEN (strlen(EXEC_PREFIX)) 89 90 struct help { 91 uint_t cmd_num; 92 char *cmd_name; 93 uint_t flags; 94 char *short_usage; 95 }; 96 97 extern int yyparse(void); 98 extern int lex_lineno; 99 100 #define MAX_LINE_LEN 1024 101 #define MAX_CMD_HIST 1024 102 #define MAX_CMD_LEN 1024 103 104 #define ONE_MB 1048576 105 106 /* 107 * Each SHELP_ should be a simple string. 108 */ 109 110 #define SHELP_ADD "add <resource-type>\n\t(global scope)\n" \ 111 "add <property-name> <property-value>\n\t(resource scope)" 112 #define SHELP_CANCEL "cancel" 113 #define SHELP_CLEAR "clear <property-name>" 114 #define SHELP_COMMIT "commit" 115 #define SHELP_CREATE "create [-F] [ -a <path> | -b | -t <template> ]" 116 #define SHELP_DELETE "delete [-F]" 117 #define SHELP_END "end" 118 #define SHELP_EXIT "exit [-F]" 119 #define SHELP_EXPORT "export [-f output-file]" 120 #define SHELP_HELP "help [commands] [syntax] [usage] [<command-name>]" 121 #define SHELP_INFO "info [<resource-type> [property-name=property-value]*]" 122 #define SHELP_REMOVE "remove [-F] <resource-type> " \ 123 "[ <property-name>=<property-value> ]*\n" \ 124 "\t(global scope)\n" \ 125 "remove <property-name> <property-value>\n" \ 126 "\t(resource scope)" 127 #define SHELP_REVERT "revert [-F]" 128 #define SHELP_SELECT "select <resource-type> { <property-name>=" \ 129 "<property-value> }" 130 #define SHELP_SET "set <property-name>=<property-value>" 131 #define SHELP_VERIFY "verify" 132 133 static struct help helptab[] = { 134 { CMD_ADD, "add", HELP_RES_PROPS, SHELP_ADD, }, 135 { CMD_CANCEL, "cancel", 0, SHELP_CANCEL, }, 136 { CMD_CLEAR, "clear", HELP_PROPS, SHELP_CLEAR, }, 137 { CMD_COMMIT, "commit", 0, SHELP_COMMIT, }, 138 { CMD_CREATE, "create", 0, SHELP_CREATE, }, 139 { CMD_DELETE, "delete", 0, SHELP_DELETE, }, 140 { CMD_END, "end", 0, SHELP_END, }, 141 { CMD_EXIT, "exit", 0, SHELP_EXIT, }, 142 { CMD_EXPORT, "export", 0, SHELP_EXPORT, }, 143 { CMD_HELP, "help", 0, SHELP_HELP }, 144 { CMD_INFO, "info", HELP_RES_PROPS, SHELP_INFO, }, 145 { CMD_REMOVE, "remove", HELP_RES_PROPS, SHELP_REMOVE, }, 146 { CMD_REVERT, "revert", 0, SHELP_REVERT, }, 147 { CMD_SELECT, "select", HELP_RES_PROPS, SHELP_SELECT, }, 148 { CMD_SET, "set", HELP_PROPS, SHELP_SET, }, 149 { CMD_VERIFY, "verify", 0, SHELP_VERIFY, }, 150 { 0 }, 151 }; 152 153 #define MAX_RT_STRLEN 16 154 155 /* These *must* match the order of the RT_ define's from zonecfg.h */ 156 static char *res_types[] = { 157 "unknown", 158 "zonename", 159 "zonepath", 160 "autoboot", 161 "pool", 162 "fs", 163 "inherit-pkg-dir", 164 "net", 165 "device", 166 "rctl", 167 "attr", 168 "dataset", 169 "limitpriv", 170 "bootargs", 171 "brand", 172 "dedicated-cpu", 173 "capped-memory", 174 ALIAS_MAXLWPS, 175 ALIAS_MAXSHMMEM, 176 ALIAS_MAXSHMIDS, 177 ALIAS_MAXMSGIDS, 178 ALIAS_MAXSEMIDS, 179 ALIAS_SHARES, 180 "scheduling-class", 181 "ip-type", 182 "capped-cpu", 183 NULL 184 }; 185 186 /* These *must* match the order of the PT_ define's from zonecfg.h */ 187 static char *prop_types[] = { 188 "unknown", 189 "zonename", 190 "zonepath", 191 "autoboot", 192 "pool", 193 "dir", 194 "special", 195 "type", 196 "options", 197 "address", 198 "physical", 199 "name", 200 "value", 201 "match", 202 "priv", 203 "limit", 204 "action", 205 "raw", 206 "limitpriv", 207 "bootargs", 208 "brand", 209 "ncpus", 210 "importance", 211 "swap", 212 "locked", 213 ALIAS_SHARES, 214 ALIAS_MAXLWPS, 215 ALIAS_MAXSHMMEM, 216 ALIAS_MAXSHMIDS, 217 ALIAS_MAXMSGIDS, 218 ALIAS_MAXSEMIDS, 219 ALIAS_MAXLOCKEDMEM, 220 ALIAS_MAXSWAP, 221 "scheduling-class", 222 "ip-type", 223 NULL 224 }; 225 226 /* These *must* match the order of the PROP_VAL_ define's from zonecfg.h */ 227 static char *prop_val_types[] = { 228 "simple", 229 "complex", 230 "list", 231 }; 232 233 /* 234 * The various _cmds[] lists below are for command tab-completion. 235 */ 236 237 /* 238 * remove has a space afterwards because it has qualifiers; the other commands 239 * that have qualifiers (add, select, etc.) don't need a space here because 240 * they have their own _cmds[] lists below. 241 */ 242 static const char *global_scope_cmds[] = { 243 "add", 244 "clear", 245 "commit", 246 "create", 247 "delete", 248 "exit", 249 "export", 250 "help", 251 "info", 252 "remove ", 253 "revert", 254 "select", 255 "set", 256 "verify", 257 NULL 258 }; 259 260 static const char *add_cmds[] = { 261 "add fs", 262 "add inherit-pkg-dir", 263 "add net", 264 "add device", 265 "add rctl", 266 "add attr", 267 "add dataset", 268 "add dedicated-cpu", 269 "add capped-cpu", 270 "add capped-memory", 271 NULL 272 }; 273 274 static const char *clear_cmds[] = { 275 "clear autoboot", 276 "clear pool", 277 "clear limitpriv", 278 "clear bootargs", 279 "clear scheduling-class", 280 "clear ip-type", 281 "clear " ALIAS_MAXLWPS, 282 "clear " ALIAS_MAXSHMMEM, 283 "clear " ALIAS_MAXSHMIDS, 284 "clear " ALIAS_MAXMSGIDS, 285 "clear " ALIAS_MAXSEMIDS, 286 "clear " ALIAS_SHARES, 287 NULL 288 }; 289 290 static const char *remove_cmds[] = { 291 "remove fs ", 292 "remove inherit-pkg-dir ", 293 "remove net ", 294 "remove device ", 295 "remove rctl ", 296 "remove attr ", 297 "remove dataset ", 298 "remove dedicated-cpu ", 299 "remove capped-cpu ", 300 "remove capped-memory ", 301 NULL 302 }; 303 304 static const char *select_cmds[] = { 305 "select fs ", 306 "select inherit-pkg-dir ", 307 "select net ", 308 "select device ", 309 "select rctl ", 310 "select attr ", 311 "select dataset ", 312 "select dedicated-cpu", 313 "select capped-cpu", 314 "select capped-memory", 315 NULL 316 }; 317 318 static const char *set_cmds[] = { 319 "set zonename=", 320 "set zonepath=", 321 "set brand=", 322 "set autoboot=", 323 "set pool=", 324 "set limitpriv=", 325 "set bootargs=", 326 "set scheduling-class=", 327 "set ip-type=", 328 "set " ALIAS_MAXLWPS "=", 329 "set " ALIAS_MAXSHMMEM "=", 330 "set " ALIAS_MAXSHMIDS "=", 331 "set " ALIAS_MAXMSGIDS "=", 332 "set " ALIAS_MAXSEMIDS "=", 333 "set " ALIAS_SHARES "=", 334 NULL 335 }; 336 337 static const char *info_cmds[] = { 338 "info fs ", 339 "info inherit-pkg-dir ", 340 "info net ", 341 "info device ", 342 "info rctl ", 343 "info attr ", 344 "info dataset ", 345 "info capped-memory", 346 "info dedicated-cpu", 347 "info capped-cpu", 348 "info zonename", 349 "info zonepath", 350 "info autoboot", 351 "info pool", 352 "info limitpriv", 353 "info bootargs", 354 "info brand", 355 "info scheduling-class", 356 "info ip-type", 357 "info max-lwps", 358 "info max-shm-memory", 359 "info max-shm-ids", 360 "info max-msg-ids", 361 "info max-sem-ids", 362 "info cpu-shares", 363 NULL 364 }; 365 366 static const char *fs_res_scope_cmds[] = { 367 "add options ", 368 "cancel", 369 "end", 370 "exit", 371 "help", 372 "info", 373 "remove options ", 374 "set dir=", 375 "set raw=", 376 "set special=", 377 "set type=", 378 "clear raw", 379 NULL 380 }; 381 382 static const char *net_res_scope_cmds[] = { 383 "cancel", 384 "end", 385 "exit", 386 "help", 387 "info", 388 "set address=", 389 "set physical=", 390 NULL 391 }; 392 393 static const char *ipd_res_scope_cmds[] = { 394 "cancel", 395 "end", 396 "exit", 397 "help", 398 "info", 399 "set dir=", 400 NULL 401 }; 402 403 static const char *device_res_scope_cmds[] = { 404 "cancel", 405 "end", 406 "exit", 407 "help", 408 "info", 409 "set match=", 410 NULL 411 }; 412 413 static const char *attr_res_scope_cmds[] = { 414 "cancel", 415 "end", 416 "exit", 417 "help", 418 "info", 419 "set name=", 420 "set type=", 421 "set value=", 422 NULL 423 }; 424 425 static const char *rctl_res_scope_cmds[] = { 426 "add value ", 427 "cancel", 428 "end", 429 "exit", 430 "help", 431 "info", 432 "remove value ", 433 "set name=", 434 NULL 435 }; 436 437 static const char *dataset_res_scope_cmds[] = { 438 "cancel", 439 "end", 440 "exit", 441 "help", 442 "info", 443 "set name=", 444 NULL 445 }; 446 447 static const char *pset_res_scope_cmds[] = { 448 "cancel", 449 "end", 450 "exit", 451 "help", 452 "info", 453 "set ncpus=", 454 "set importance=", 455 "clear importance", 456 NULL 457 }; 458 459 static const char *pcap_res_scope_cmds[] = { 460 "cancel", 461 "end", 462 "exit", 463 "help", 464 "info", 465 "set ncpus=", 466 NULL 467 }; 468 469 static const char *mcap_res_scope_cmds[] = { 470 "cancel", 471 "end", 472 "exit", 473 "help", 474 "info", 475 "set physical=", 476 "set swap=", 477 "set locked=", 478 "clear physical", 479 "clear swap", 480 "clear locked", 481 NULL 482 }; 483 484 /* Global variables */ 485 486 /* set early in main(), never modified thereafter, used all over the place */ 487 static char *execname; 488 489 /* set in main(), used all over the place */ 490 static zone_dochandle_t handle; 491 492 /* used all over the place */ 493 static char zone[ZONENAME_MAX]; 494 static char revert_zone[ZONENAME_MAX]; 495 496 /* global brand operations */ 497 static brand_handle_t brand; 498 499 /* set in modifying functions, checked in read_input() */ 500 static bool need_to_commit = FALSE; 501 bool saw_error; 502 503 /* set in yacc parser, checked in read_input() */ 504 bool newline_terminated; 505 506 /* set in main(), checked in lex error handler */ 507 bool cmd_file_mode; 508 509 /* set in exit_func(), checked in read_input() */ 510 static bool time_to_exit = FALSE, force_exit = FALSE; 511 512 /* used in short_usage() and zerr() */ 513 static char *cmd_file_name = NULL; 514 515 /* checked in read_input() and other places */ 516 static bool ok_to_prompt = FALSE; 517 518 /* set and checked in initialize() */ 519 static bool got_handle = FALSE; 520 521 /* initialized in do_interactive(), checked in initialize() */ 522 static bool interactive_mode; 523 524 /* set if configuring the global zone */ 525 static bool global_zone = FALSE; 526 527 /* set in main(), checked in multiple places */ 528 static bool read_only_mode; 529 530 static bool global_scope = TRUE; /* scope is outer/global or inner/resource */ 531 static int resource_scope; /* should be in the RT_ list from zonecfg.h */ 532 static int end_op = -1; /* operation on end is either add or modify */ 533 534 int num_prop_vals; /* for grammar */ 535 536 /* 537 * These are for keeping track of resources as they are specified as part of 538 * the multi-step process. They should be initialized by add_resource() or 539 * select_func() and filled in by add_property() or set_func(). 540 */ 541 static struct zone_fstab old_fstab, in_progress_fstab; 542 static struct zone_fstab old_ipdtab, in_progress_ipdtab; 543 static struct zone_nwiftab old_nwiftab, in_progress_nwiftab; 544 static struct zone_devtab old_devtab, in_progress_devtab; 545 static struct zone_rctltab old_rctltab, in_progress_rctltab; 546 static struct zone_attrtab old_attrtab, in_progress_attrtab; 547 static struct zone_dstab old_dstab, in_progress_dstab; 548 static struct zone_psettab old_psettab, in_progress_psettab; 549 static struct zone_mcaptab old_mcaptab, in_progress_mcaptab; 550 551 static GetLine *gl; /* The gl_get_line() resource object */ 552 553 static void bytes_to_units(char *str, char *buf, int bufsize); 554 555 /* Functions begin here */ 556 557 static bool 558 initial_match(const char *line1, const char *line2, int word_end) 559 { 560 if (word_end <= 0) 561 return (TRUE); 562 return (strncmp(line1, line2, word_end) == 0); 563 } 564 565 static int 566 add_stuff(WordCompletion *cpl, const char *line1, const char **list, 567 int word_end) 568 { 569 int i, err; 570 571 for (i = 0; list[i] != NULL; i++) { 572 if (initial_match(line1, list[i], word_end)) { 573 err = cpl_add_completion(cpl, line1, 0, word_end, 574 list[i] + word_end, "", ""); 575 if (err != 0) 576 return (err); 577 } 578 } 579 return (0); 580 } 581 582 static 583 /* ARGSUSED */ 584 CPL_MATCH_FN(cmd_cpl_fn) 585 { 586 if (global_scope) { 587 /* 588 * The MAX/MIN tests below are to make sure we have at least 589 * enough characters to distinguish from other prefixes (MAX) 590 * but only check MIN(what we have, what we're checking). 591 */ 592 if (strncmp(line, "add ", MAX(MIN(word_end, 4), 1)) == 0) 593 return (add_stuff(cpl, line, add_cmds, word_end)); 594 if (strncmp(line, "clear ", MAX(MIN(word_end, 6), 2)) == 0) 595 return (add_stuff(cpl, line, clear_cmds, word_end)); 596 if (strncmp(line, "select ", MAX(MIN(word_end, 7), 3)) == 0) 597 return (add_stuff(cpl, line, select_cmds, word_end)); 598 if (strncmp(line, "set ", MAX(MIN(word_end, 4), 3)) == 0) 599 return (add_stuff(cpl, line, set_cmds, word_end)); 600 if (strncmp(line, "remove ", MAX(MIN(word_end, 7), 1)) == 0) 601 return (add_stuff(cpl, line, remove_cmds, word_end)); 602 if (strncmp(line, "info ", MAX(MIN(word_end, 5), 1)) == 0) 603 return (add_stuff(cpl, line, info_cmds, word_end)); 604 return (add_stuff(cpl, line, global_scope_cmds, word_end)); 605 } 606 switch (resource_scope) { 607 case RT_FS: 608 return (add_stuff(cpl, line, fs_res_scope_cmds, word_end)); 609 case RT_IPD: 610 return (add_stuff(cpl, line, ipd_res_scope_cmds, word_end)); 611 case RT_NET: 612 return (add_stuff(cpl, line, net_res_scope_cmds, word_end)); 613 case RT_DEVICE: 614 return (add_stuff(cpl, line, device_res_scope_cmds, word_end)); 615 case RT_RCTL: 616 return (add_stuff(cpl, line, rctl_res_scope_cmds, word_end)); 617 case RT_ATTR: 618 return (add_stuff(cpl, line, attr_res_scope_cmds, word_end)); 619 case RT_DATASET: 620 return (add_stuff(cpl, line, dataset_res_scope_cmds, word_end)); 621 case RT_DCPU: 622 return (add_stuff(cpl, line, pset_res_scope_cmds, word_end)); 623 case RT_PCAP: 624 return (add_stuff(cpl, line, pcap_res_scope_cmds, word_end)); 625 case RT_MCAP: 626 return (add_stuff(cpl, line, mcap_res_scope_cmds, word_end)); 627 } 628 return (0); 629 } 630 631 /* 632 * For the main CMD_func() functions below, several of them call getopt() 633 * then check optind against argc to make sure an extra parameter was not 634 * passed in. The reason this is not caught in the grammar is that the 635 * grammar just checks for a miscellaneous TOKEN, which is *expected* to 636 * be "-F" (for example), but could be anything. So (for example) this 637 * check will prevent "create bogus". 638 */ 639 640 cmd_t * 641 alloc_cmd(void) 642 { 643 return (calloc(1, sizeof (cmd_t))); 644 } 645 646 void 647 free_cmd(cmd_t *cmd) 648 { 649 int i; 650 651 for (i = 0; i < MAX_EQ_PROP_PAIRS; i++) 652 if (cmd->cmd_property_ptr[i] != NULL) { 653 property_value_ptr_t pp = cmd->cmd_property_ptr[i]; 654 655 switch (pp->pv_type) { 656 case PROP_VAL_SIMPLE: 657 free(pp->pv_simple); 658 break; 659 case PROP_VAL_COMPLEX: 660 free_complex(pp->pv_complex); 661 break; 662 case PROP_VAL_LIST: 663 free_list(pp->pv_list); 664 break; 665 } 666 } 667 for (i = 0; i < cmd->cmd_argc; i++) 668 free(cmd->cmd_argv[i]); 669 free(cmd); 670 } 671 672 complex_property_ptr_t 673 alloc_complex(void) 674 { 675 return (calloc(1, sizeof (complex_property_t))); 676 } 677 678 void 679 free_complex(complex_property_ptr_t complex) 680 { 681 if (complex == NULL) 682 return; 683 free_complex(complex->cp_next); 684 if (complex->cp_value != NULL) 685 free(complex->cp_value); 686 free(complex); 687 } 688 689 list_property_ptr_t 690 alloc_list(void) 691 { 692 return (calloc(1, sizeof (list_property_t))); 693 } 694 695 void 696 free_list(list_property_ptr_t list) 697 { 698 if (list == NULL) 699 return; 700 if (list->lp_simple != NULL) 701 free(list->lp_simple); 702 free_complex(list->lp_complex); 703 free_list(list->lp_next); 704 free(list); 705 } 706 707 void 708 free_outer_list(list_property_ptr_t list) 709 { 710 if (list == NULL) 711 return; 712 free_outer_list(list->lp_next); 713 free(list); 714 } 715 716 static struct zone_rctlvaltab * 717 alloc_rctlvaltab(void) 718 { 719 return (calloc(1, sizeof (struct zone_rctlvaltab))); 720 } 721 722 static char * 723 rt_to_str(int res_type) 724 { 725 assert(res_type >= RT_MIN && res_type <= RT_MAX); 726 return (res_types[res_type]); 727 } 728 729 static char * 730 pt_to_str(int prop_type) 731 { 732 assert(prop_type >= PT_MIN && prop_type <= PT_MAX); 733 return (prop_types[prop_type]); 734 } 735 736 static char * 737 pvt_to_str(int pv_type) 738 { 739 assert(pv_type >= PROP_VAL_MIN && pv_type <= PROP_VAL_MAX); 740 return (prop_val_types[pv_type]); 741 } 742 743 static char * 744 cmd_to_str(int cmd_num) 745 { 746 assert(cmd_num >= CMD_MIN && cmd_num <= CMD_MAX); 747 return (helptab[cmd_num].cmd_name); 748 } 749 750 /* 751 * This is a separate function rather than a set of define's because of the 752 * gettext() wrapping. 753 */ 754 755 /* 756 * TRANSLATION_NOTE 757 * Each string below should have \t follow \n whenever needed; the 758 * initial \t and the terminal \n will be provided by the calling function. 759 */ 760 761 static char * 762 long_help(int cmd_num) 763 { 764 static char line[1024]; /* arbitrary large amount */ 765 766 assert(cmd_num >= CMD_MIN && cmd_num <= CMD_MAX); 767 switch (cmd_num) { 768 case CMD_HELP: 769 return (gettext("Prints help message.")); 770 case CMD_CREATE: 771 (void) snprintf(line, sizeof (line), 772 gettext("Creates a configuration for the " 773 "specified zone. %s should be\n\tused to " 774 "begin configuring a new zone. If overwriting an " 775 "existing\n\tconfiguration, the -F flag can be " 776 "used to force the action. If\n\t-t template is " 777 "given, creates a configuration identical to the\n" 778 "\tspecified template, except that the zone name " 779 "is changed from\n\ttemplate to zonename. '%s -a' " 780 "creates a configuration from a\n\tdetached " 781 "zonepath. '%s -b' results in a blank " 782 "configuration.\n\t'%s' with no arguments applies " 783 "the Sun default settings."), 784 cmd_to_str(CMD_CREATE), cmd_to_str(CMD_CREATE), 785 cmd_to_str(CMD_CREATE), cmd_to_str(CMD_CREATE)); 786 return (line); 787 case CMD_EXIT: 788 return (gettext("Exits the program. The -F flag can " 789 "be used to force the action.")); 790 case CMD_EXPORT: 791 return (gettext("Prints configuration to standard " 792 "output, or to output-file if\n\tspecified, in " 793 "a form suitable for use in a command-file.")); 794 case CMD_ADD: 795 return (gettext("Add specified resource to " 796 "configuration.")); 797 case CMD_DELETE: 798 return (gettext("Deletes the specified zone. The -F " 799 "flag can be used to force the\n\taction.")); 800 case CMD_REMOVE: 801 return (gettext("Remove specified resource from " 802 "configuration. The -F flag can be used\n\tto " 803 "force the action.")); 804 case CMD_SELECT: 805 (void) snprintf(line, sizeof (line), 806 gettext("Selects a resource to modify. " 807 "Resource modification is completed\n\twith the " 808 "command \"%s\". The property name/value pairs " 809 "must uniquely\n\tidentify a resource. Note that " 810 "the curly braces ('{', '}') mean one\n\tor more " 811 "of whatever is between them."), 812 cmd_to_str(CMD_END)); 813 return (line); 814 case CMD_SET: 815 return (gettext("Sets property values.")); 816 case CMD_CLEAR: 817 return (gettext("Clears property values.")); 818 case CMD_INFO: 819 return (gettext("Displays information about the " 820 "current configuration. If resource\n\ttype is " 821 "specified, displays only information about " 822 "resources of\n\tthe relevant type. If resource " 823 "id is specified, displays only\n\tinformation " 824 "about that resource.")); 825 case CMD_VERIFY: 826 return (gettext("Verifies current configuration " 827 "for correctness (some resource types\n\thave " 828 "required properties).")); 829 case CMD_COMMIT: 830 (void) snprintf(line, sizeof (line), 831 gettext("Commits current configuration. " 832 "Configuration must be committed to\n\tbe used by " 833 "%s. Until the configuration is committed, " 834 "changes \n\tcan be removed with the %s " 835 "command. This operation is\n\tattempted " 836 "automatically upon completion of a %s " 837 "session."), "zoneadm", cmd_to_str(CMD_REVERT), 838 "zonecfg"); 839 return (line); 840 case CMD_REVERT: 841 return (gettext("Reverts configuration back to the " 842 "last committed state. The -F flag\n\tcan be " 843 "used to force the action.")); 844 case CMD_CANCEL: 845 return (gettext("Cancels resource/property " 846 "specification.")); 847 case CMD_END: 848 return (gettext("Ends resource/property " 849 "specification.")); 850 } 851 /* NOTREACHED */ 852 return (NULL); 853 } 854 855 /* 856 * Called with verbose TRUE when help is explicitly requested, FALSE for 857 * unexpected errors. 858 */ 859 860 void 861 usage(bool verbose, uint_t flags) 862 { 863 FILE *fp = verbose ? stdout : stderr, *newfp; 864 bool need_to_close = FALSE; 865 char *pager; 866 int i; 867 868 /* don't page error output */ 869 if (verbose && interactive_mode) { 870 if ((pager = getenv("PAGER")) == NULL) 871 pager = PAGER; 872 if ((newfp = popen(pager, "w")) != NULL) { 873 need_to_close = TRUE; 874 fp = newfp; 875 } 876 } 877 if (flags & HELP_META) { 878 (void) fprintf(fp, gettext("More help is available for the " 879 "following:\n")); 880 (void) fprintf(fp, "\n\tcommands ('%s commands')\n", 881 cmd_to_str(CMD_HELP)); 882 (void) fprintf(fp, "\tsyntax ('%s syntax')\n", 883 cmd_to_str(CMD_HELP)); 884 (void) fprintf(fp, "\tusage ('%s usage')\n\n", 885 cmd_to_str(CMD_HELP)); 886 (void) fprintf(fp, gettext("You may also obtain help on any " 887 "command by typing '%s <command-name>.'\n"), 888 cmd_to_str(CMD_HELP)); 889 } 890 if (flags & HELP_RES_SCOPE) { 891 switch (resource_scope) { 892 case RT_FS: 893 (void) fprintf(fp, gettext("The '%s' resource scope is " 894 "used to configure a file-system.\n"), 895 rt_to_str(resource_scope)); 896 (void) fprintf(fp, gettext("Valid commands:\n")); 897 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 898 pt_to_str(PT_DIR), gettext("<path>")); 899 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 900 pt_to_str(PT_SPECIAL), gettext("<path>")); 901 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 902 pt_to_str(PT_RAW), gettext("<raw-device>")); 903 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 904 pt_to_str(PT_TYPE), gettext("<file-system type>")); 905 (void) fprintf(fp, "\t%s %s %s\n", cmd_to_str(CMD_ADD), 906 pt_to_str(PT_OPTIONS), 907 gettext("<file-system options>")); 908 (void) fprintf(fp, "\t%s %s %s\n", 909 cmd_to_str(CMD_REMOVE), pt_to_str(PT_OPTIONS), 910 gettext("<file-system options>")); 911 (void) fprintf(fp, gettext("Consult the file-system " 912 "specific manual page, such as mount_ufs(1M), " 913 "for\ndetails about file-system options. Note " 914 "that any file-system options with an\nembedded " 915 "'=' character must be enclosed in double quotes, " 916 /*CSTYLED*/ 917 "such as \"%s=5\".\n"), MNTOPT_RETRY); 918 break; 919 case RT_IPD: 920 (void) fprintf(fp, gettext("The '%s' resource scope is " 921 "used to configure a directory\ninherited from the " 922 "global zone into a non-global zone in read-only " 923 "mode.\n"), rt_to_str(resource_scope)); 924 (void) fprintf(fp, gettext("Valid commands:\n")); 925 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 926 pt_to_str(PT_DIR), gettext("<path>")); 927 break; 928 case RT_NET: 929 (void) fprintf(fp, gettext("The '%s' resource scope is " 930 "used to configure a network interface.\n"), 931 rt_to_str(resource_scope)); 932 (void) fprintf(fp, gettext("Valid commands:\n")); 933 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 934 pt_to_str(PT_ADDRESS), gettext("<IP-address>")); 935 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 936 pt_to_str(PT_PHYSICAL), gettext("<interface>")); 937 (void) fprintf(fp, gettext("See ifconfig(1M) for " 938 "details of the <interface> string.\n")); 939 (void) fprintf(fp, gettext("%s %s is valid if the %s " 940 "property is set to %s, otherwise it must not be " 941 "set.\n"), 942 cmd_to_str(CMD_SET), pt_to_str(PT_ADDRESS), 943 pt_to_str(PT_IPTYPE), "shared"); 944 break; 945 case RT_DEVICE: 946 (void) fprintf(fp, gettext("The '%s' resource scope is " 947 "used to configure a device node.\n"), 948 rt_to_str(resource_scope)); 949 (void) fprintf(fp, gettext("Valid commands:\n")); 950 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 951 pt_to_str(PT_MATCH), gettext("<device-path>")); 952 break; 953 case RT_RCTL: 954 (void) fprintf(fp, gettext("The '%s' resource scope is " 955 "used to configure a resource control.\n"), 956 rt_to_str(resource_scope)); 957 (void) fprintf(fp, gettext("Valid commands:\n")); 958 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 959 pt_to_str(PT_NAME), gettext("<string>")); 960 (void) fprintf(fp, "\t%s %s (%s=%s,%s=%s,%s=%s)\n", 961 cmd_to_str(CMD_ADD), pt_to_str(PT_VALUE), 962 pt_to_str(PT_PRIV), gettext("<priv-value>"), 963 pt_to_str(PT_LIMIT), gettext("<number>"), 964 pt_to_str(PT_ACTION), gettext("<action-value>")); 965 (void) fprintf(fp, "\t%s %s (%s=%s,%s=%s,%s=%s)\n", 966 cmd_to_str(CMD_REMOVE), pt_to_str(PT_VALUE), 967 pt_to_str(PT_PRIV), gettext("<priv-value>"), 968 pt_to_str(PT_LIMIT), gettext("<number>"), 969 pt_to_str(PT_ACTION), gettext("<action-value>")); 970 (void) fprintf(fp, "%s\n\t%s := privileged\n" 971 "\t%s := none | deny\n", gettext("Where"), 972 gettext("<priv-value>"), gettext("<action-value>")); 973 break; 974 case RT_ATTR: 975 (void) fprintf(fp, gettext("The '%s' resource scope is " 976 "used to configure a generic attribute.\n"), 977 rt_to_str(resource_scope)); 978 (void) fprintf(fp, gettext("Valid commands:\n")); 979 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 980 pt_to_str(PT_NAME), gettext("<name>")); 981 (void) fprintf(fp, "\t%s %s=boolean\n", 982 cmd_to_str(CMD_SET), pt_to_str(PT_TYPE)); 983 (void) fprintf(fp, "\t%s %s=true | false\n", 984 cmd_to_str(CMD_SET), pt_to_str(PT_VALUE)); 985 (void) fprintf(fp, gettext("or\n")); 986 (void) fprintf(fp, "\t%s %s=int\n", cmd_to_str(CMD_SET), 987 pt_to_str(PT_TYPE)); 988 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 989 pt_to_str(PT_VALUE), gettext("<integer>")); 990 (void) fprintf(fp, gettext("or\n")); 991 (void) fprintf(fp, "\t%s %s=string\n", 992 cmd_to_str(CMD_SET), pt_to_str(PT_TYPE)); 993 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 994 pt_to_str(PT_VALUE), gettext("<string>")); 995 (void) fprintf(fp, gettext("or\n")); 996 (void) fprintf(fp, "\t%s %s=uint\n", 997 cmd_to_str(CMD_SET), pt_to_str(PT_TYPE)); 998 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 999 pt_to_str(PT_VALUE), gettext("<unsigned integer>")); 1000 break; 1001 case RT_DATASET: 1002 (void) fprintf(fp, gettext("The '%s' resource scope is " 1003 "used to export ZFS datasets.\n"), 1004 rt_to_str(resource_scope)); 1005 (void) fprintf(fp, gettext("Valid commands:\n")); 1006 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1007 pt_to_str(PT_NAME), gettext("<name>")); 1008 break; 1009 case RT_DCPU: 1010 (void) fprintf(fp, gettext("The '%s' resource scope " 1011 "configures the 'pools' facility to dedicate\na " 1012 "subset of the system's processors to this zone " 1013 "while it is running.\n"), 1014 rt_to_str(resource_scope)); 1015 (void) fprintf(fp, gettext("Valid commands:\n")); 1016 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1017 pt_to_str(PT_NCPUS), 1018 gettext("<unsigned integer | range>")); 1019 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1020 pt_to_str(PT_IMPORTANCE), 1021 gettext("<unsigned integer>")); 1022 break; 1023 case RT_PCAP: 1024 (void) fprintf(fp, gettext("The '%s' resource scope is " 1025 "used to set an upper limit (a cap) on the\n" 1026 "percentage of CPU that can be used by this zone. " 1027 "A '%s' value of 1\ncorresponds to one cpu. The " 1028 "value can be set higher than 1, up to the total\n" 1029 "number of CPUs on the system. The value can " 1030 "also be less than 1,\nrepresenting a fraction of " 1031 "a cpu.\n"), 1032 rt_to_str(resource_scope), pt_to_str(PT_NCPUS)); 1033 (void) fprintf(fp, gettext("Valid commands:\n")); 1034 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1035 pt_to_str(PT_NCPUS), gettext("<unsigned decimal>")); 1036 break; 1037 case RT_MCAP: 1038 (void) fprintf(fp, gettext("The '%s' resource scope is " 1039 "used to set an upper limit (a cap) on the\n" 1040 "amount of physical memory, swap space and locked " 1041 "memory that can be used by\nthis zone.\n"), 1042 rt_to_str(resource_scope)); 1043 (void) fprintf(fp, gettext("Valid commands:\n")); 1044 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1045 pt_to_str(PT_PHYSICAL), 1046 gettext("<qualified unsigned decimal>")); 1047 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1048 pt_to_str(PT_SWAP), 1049 gettext("<qualified unsigned decimal>")); 1050 (void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET), 1051 pt_to_str(PT_LOCKED), 1052 gettext("<qualified unsigned decimal>")); 1053 break; 1054 } 1055 (void) fprintf(fp, gettext("And from any resource scope, you " 1056 "can:\n")); 1057 (void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_END), 1058 gettext("(to conclude this operation)")); 1059 (void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_CANCEL), 1060 gettext("(to cancel this operation)")); 1061 (void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_EXIT), 1062 gettext("(to exit the zonecfg utility)")); 1063 } 1064 if (flags & HELP_USAGE) { 1065 (void) fprintf(fp, "%s:\t%s %s\n", gettext("usage"), 1066 execname, cmd_to_str(CMD_HELP)); 1067 (void) fprintf(fp, "\t%s -z <zone>\t\t\t(%s)\n", 1068 execname, gettext("interactive")); 1069 (void) fprintf(fp, "\t%s -z <zone> <command>\n", execname); 1070 (void) fprintf(fp, "\t%s -z <zone> -f <command-file>\n", 1071 execname); 1072 } 1073 if (flags & HELP_SUBCMDS) { 1074 (void) fprintf(fp, "%s:\n\n", gettext("Commands")); 1075 for (i = 0; i <= CMD_MAX; i++) { 1076 (void) fprintf(fp, "%s\n", helptab[i].short_usage); 1077 if (verbose) 1078 (void) fprintf(fp, "\t%s\n\n", long_help(i)); 1079 } 1080 } 1081 if (flags & HELP_SYNTAX) { 1082 if (!verbose) 1083 (void) fprintf(fp, "\n"); 1084 (void) fprintf(fp, "<zone> := [A-Za-z0-9][A-Za-z0-9_.-]*\n"); 1085 (void) fprintf(fp, gettext("\t(except the reserved words " 1086 "'%s' and anything starting with '%s')\n"), "global", 1087 "SUNW"); 1088 (void) fprintf(fp, 1089 gettext("\tName must be less than %d characters.\n"), 1090 ZONENAME_MAX); 1091 if (verbose) 1092 (void) fprintf(fp, "\n"); 1093 } 1094 if (flags & HELP_NETADDR) { 1095 (void) fprintf(fp, gettext("\n<net-addr> :=")); 1096 (void) fprintf(fp, 1097 gettext("\t<IPv4-address>[/<IPv4-prefix-length>] |\n")); 1098 (void) fprintf(fp, 1099 gettext("\t\t<IPv6-address>/<IPv6-prefix-length> |\n")); 1100 (void) fprintf(fp, 1101 gettext("\t\t<hostname>[/<IPv4-prefix-length>]\n")); 1102 (void) fprintf(fp, gettext("See inet(3SOCKET) for IPv4 and " 1103 "IPv6 address syntax.\n")); 1104 (void) fprintf(fp, gettext("<IPv4-prefix-length> := [0-32]\n")); 1105 (void) fprintf(fp, 1106 gettext("<IPv6-prefix-length> := [0-128]\n")); 1107 (void) fprintf(fp, 1108 gettext("<hostname> := [A-Za-z0-9][A-Za-z0-9-.]*\n")); 1109 } 1110 if (flags & HELP_RESOURCES) { 1111 (void) fprintf(fp, "<%s> := %s | %s | %s | %s | %s | %s |\n\t" 1112 "%s | %s | %s | %s\n\n", 1113 gettext("resource type"), rt_to_str(RT_FS), 1114 rt_to_str(RT_IPD), rt_to_str(RT_NET), rt_to_str(RT_DEVICE), 1115 rt_to_str(RT_RCTL), rt_to_str(RT_ATTR), 1116 rt_to_str(RT_DATASET), rt_to_str(RT_DCPU), 1117 rt_to_str(RT_PCAP), rt_to_str(RT_MCAP)); 1118 } 1119 if (flags & HELP_PROPS) { 1120 (void) fprintf(fp, gettext("For resource type ... there are " 1121 "property types ...:\n")); 1122 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1123 pt_to_str(PT_ZONENAME)); 1124 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1125 pt_to_str(PT_ZONEPATH)); 1126 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1127 pt_to_str(PT_BRAND)); 1128 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1129 pt_to_str(PT_AUTOBOOT)); 1130 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1131 pt_to_str(PT_BOOTARGS)); 1132 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1133 pt_to_str(PT_POOL)); 1134 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1135 pt_to_str(PT_LIMITPRIV)); 1136 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1137 pt_to_str(PT_SCHED)); 1138 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1139 pt_to_str(PT_IPTYPE)); 1140 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1141 pt_to_str(PT_MAXLWPS)); 1142 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1143 pt_to_str(PT_MAXSHMMEM)); 1144 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1145 pt_to_str(PT_MAXSHMIDS)); 1146 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1147 pt_to_str(PT_MAXMSGIDS)); 1148 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1149 pt_to_str(PT_MAXSEMIDS)); 1150 (void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"), 1151 pt_to_str(PT_SHARES)); 1152 (void) fprintf(fp, "\t%s\t\t%s, %s, %s, %s\n", rt_to_str(RT_FS), 1153 pt_to_str(PT_DIR), pt_to_str(PT_SPECIAL), 1154 pt_to_str(PT_RAW), pt_to_str(PT_TYPE), 1155 pt_to_str(PT_OPTIONS)); 1156 (void) fprintf(fp, "\t%s\t%s\n", rt_to_str(RT_IPD), 1157 pt_to_str(PT_DIR)); 1158 (void) fprintf(fp, "\t%s\t\t%s, %s\n", rt_to_str(RT_NET), 1159 pt_to_str(PT_ADDRESS), pt_to_str(PT_PHYSICAL)); 1160 (void) fprintf(fp, "\t%s\t\t%s\n", rt_to_str(RT_DEVICE), 1161 pt_to_str(PT_MATCH)); 1162 (void) fprintf(fp, "\t%s\t\t%s, %s\n", rt_to_str(RT_RCTL), 1163 pt_to_str(PT_NAME), pt_to_str(PT_VALUE)); 1164 (void) fprintf(fp, "\t%s\t\t%s, %s, %s\n", rt_to_str(RT_ATTR), 1165 pt_to_str(PT_NAME), pt_to_str(PT_TYPE), 1166 pt_to_str(PT_VALUE)); 1167 (void) fprintf(fp, "\t%s\t\t%s\n", rt_to_str(RT_DATASET), 1168 pt_to_str(PT_NAME)); 1169 (void) fprintf(fp, "\t%s\t%s, %s\n", rt_to_str(RT_DCPU), 1170 pt_to_str(PT_NCPUS), pt_to_str(PT_IMPORTANCE)); 1171 (void) fprintf(fp, "\t%s\t%s\n", rt_to_str(RT_PCAP), 1172 pt_to_str(PT_NCPUS)); 1173 (void) fprintf(fp, "\t%s\t%s, %s, %s\n", rt_to_str(RT_MCAP), 1174 pt_to_str(PT_PHYSICAL), pt_to_str(PT_SWAP), 1175 pt_to_str(PT_LOCKED)); 1176 } 1177 if (need_to_close) 1178 (void) pclose(fp); 1179 } 1180 1181 /* PRINTFLIKE1 */ 1182 static void 1183 zerr(const char *fmt, ...) 1184 { 1185 va_list alist; 1186 static int last_lineno; 1187 1188 /* lex_lineno has already been incremented in the lexer; compensate */ 1189 if (cmd_file_mode && lex_lineno > last_lineno) { 1190 if (strcmp(cmd_file_name, "-") == 0) 1191 (void) fprintf(stderr, gettext("On line %d:\n"), 1192 lex_lineno - 1); 1193 else 1194 (void) fprintf(stderr, gettext("On line %d of %s:\n"), 1195 lex_lineno - 1, cmd_file_name); 1196 last_lineno = lex_lineno; 1197 } 1198 va_start(alist, fmt); 1199 (void) vfprintf(stderr, fmt, alist); 1200 (void) fprintf(stderr, "\n"); 1201 va_end(alist); 1202 } 1203 1204 static void 1205 zone_perror(char *prefix, int err, bool set_saw) 1206 { 1207 zerr("%s: %s", prefix, zonecfg_strerror(err)); 1208 if (set_saw) 1209 saw_error = TRUE; 1210 } 1211 1212 /* 1213 * zone_perror() expects a single string, but for remove and select 1214 * we have both the command and the resource type, so this wrapper 1215 * function serves the same purpose in a slightly different way. 1216 */ 1217 1218 static void 1219 z_cmd_rt_perror(int cmd_num, int res_num, int err, bool set_saw) 1220 { 1221 zerr("%s %s: %s", cmd_to_str(cmd_num), rt_to_str(res_num), 1222 zonecfg_strerror(err)); 1223 if (set_saw) 1224 saw_error = TRUE; 1225 } 1226 1227 /* returns Z_OK if successful, Z_foo from <libzonecfg.h> otherwise */ 1228 static int 1229 initialize(bool handle_expected) 1230 { 1231 int err; 1232 char brandname[MAXNAMELEN]; 1233 1234 if (zonecfg_check_handle(handle) != Z_OK) { 1235 if ((err = zonecfg_get_handle(zone, handle)) == Z_OK) { 1236 got_handle = TRUE; 1237 if (zonecfg_get_brand(handle, brandname, 1238 sizeof (brandname)) != Z_OK) { 1239 zerr("Zone %s is inconsistent: missing " 1240 "brand attribute", zone); 1241 exit(Z_ERR); 1242 } 1243 if ((brand = brand_open(brandname)) == NULL) { 1244 zerr("Zone %s uses non-existent brand \"%s\"." 1245 " Unable to continue", zone, brandname); 1246 exit(Z_ERR); 1247 } 1248 } else if (global_zone && err == Z_NO_ZONE && !got_handle && 1249 !read_only_mode) { 1250 /* 1251 * We implicitly create the global zone config if it 1252 * doesn't exist. 1253 */ 1254 zone_dochandle_t tmphandle; 1255 1256 if ((tmphandle = zonecfg_init_handle()) == NULL) { 1257 zone_perror(execname, Z_NOMEM, TRUE); 1258 exit(Z_ERR); 1259 } 1260 1261 err = zonecfg_get_template_handle("SUNWblank", zone, 1262 tmphandle); 1263 1264 if (err != Z_OK) { 1265 zonecfg_fini_handle(tmphandle); 1266 zone_perror("SUNWblank", err, TRUE); 1267 return (err); 1268 } 1269 1270 need_to_commit = TRUE; 1271 zonecfg_fini_handle(handle); 1272 handle = tmphandle; 1273 got_handle = TRUE; 1274 1275 } else { 1276 zone_perror(zone, err, handle_expected || got_handle); 1277 if (err == Z_NO_ZONE && !got_handle && 1278 interactive_mode && !read_only_mode) 1279 (void) printf(gettext("Use '%s' to begin " 1280 "configuring a new zone.\n"), 1281 cmd_to_str(CMD_CREATE)); 1282 return (err); 1283 } 1284 } 1285 return (Z_OK); 1286 } 1287 1288 static bool 1289 state_atleast(zone_state_t state) 1290 { 1291 zone_state_t state_num; 1292 int err; 1293 1294 if ((err = zone_get_state(zone, &state_num)) != Z_OK) { 1295 /* all states are greater than "non-existent" */ 1296 if (err == Z_NO_ZONE) 1297 return (B_FALSE); 1298 zerr(gettext("Unexpectedly failed to determine state " 1299 "of zone %s: %s"), zone, zonecfg_strerror(err)); 1300 exit(Z_ERR); 1301 } 1302 return (state_num >= state); 1303 } 1304 1305 /* 1306 * short_usage() is for bad syntax: getopt() issues, too many arguments, etc. 1307 */ 1308 1309 void 1310 short_usage(int command) 1311 { 1312 /* lex_lineno has already been incremented in the lexer; compensate */ 1313 if (cmd_file_mode) { 1314 if (strcmp(cmd_file_name, "-") == 0) 1315 (void) fprintf(stderr, 1316 gettext("syntax error on line %d\n"), 1317 lex_lineno - 1); 1318 else 1319 (void) fprintf(stderr, 1320 gettext("syntax error on line %d of %s\n"), 1321 lex_lineno - 1, cmd_file_name); 1322 } 1323 (void) fprintf(stderr, "%s:\n%s\n", gettext("usage"), 1324 helptab[command].short_usage); 1325 saw_error = TRUE; 1326 } 1327 1328 /* 1329 * long_usage() is for bad semantics: e.g., wrong property type for a given 1330 * resource type. It is also used by longer_usage() below. 1331 */ 1332 1333 void 1334 long_usage(uint_t cmd_num, bool set_saw) 1335 { 1336 (void) fprintf(set_saw ? stderr : stdout, "%s:\n%s\n", gettext("usage"), 1337 helptab[cmd_num].short_usage); 1338 (void) fprintf(set_saw ? stderr : stdout, "\t%s\n", long_help(cmd_num)); 1339 if (set_saw) 1340 saw_error = TRUE; 1341 } 1342 1343 /* 1344 * longer_usage() is for 'help foo' and 'foo -?': call long_usage() and also 1345 * any extra usage() flags as appropriate for whatever command. 1346 */ 1347 1348 void 1349 longer_usage(uint_t cmd_num) 1350 { 1351 long_usage(cmd_num, FALSE); 1352 if (helptab[cmd_num].flags != 0) { 1353 (void) printf("\n"); 1354 usage(TRUE, helptab[cmd_num].flags); 1355 } 1356 } 1357 1358 /* 1359 * scope_usage() is simply used when a command is called from the wrong scope. 1360 */ 1361 1362 static void 1363 scope_usage(uint_t cmd_num) 1364 { 1365 zerr(gettext("The %s command only makes sense in the %s scope."), 1366 cmd_to_str(cmd_num), 1367 global_scope ? gettext("resource") : gettext("global")); 1368 saw_error = TRUE; 1369 } 1370 1371 /* 1372 * On input, TRUE => yes, FALSE => no. 1373 * On return, TRUE => 1, FALSE => no, could not ask => -1. 1374 */ 1375 1376 static int 1377 ask_yesno(bool default_answer, const char *question) 1378 { 1379 char line[64]; /* should be enough to answer yes or no */ 1380 1381 if (!ok_to_prompt) { 1382 saw_error = TRUE; 1383 return (-1); 1384 } 1385 for (;;) { 1386 if (printf("%s (%s)? ", question, 1387 default_answer ? "[y]/n" : "y/[n]") < 0) 1388 return (-1); 1389 if (fgets(line, sizeof (line), stdin) == NULL) 1390 return (-1); 1391 1392 if (line[0] == '\n') 1393 return (default_answer ? 1 : 0); 1394 if (tolower(line[0]) == 'y') 1395 return (1); 1396 if (tolower(line[0]) == 'n') 1397 return (0); 1398 } 1399 } 1400 1401 /* 1402 * Prints warning if zone already exists. 1403 * In interactive mode, prompts if we should continue anyway and returns Z_OK 1404 * if so, Z_ERR if not. In non-interactive mode, exits with Z_ERR. 1405 * 1406 * Note that if a zone exists and its state is >= INSTALLED, an error message 1407 * will be printed and this function will return Z_ERR regardless of mode. 1408 */ 1409 1410 static int 1411 check_if_zone_already_exists(bool force) 1412 { 1413 char line[ZONENAME_MAX + 128]; /* enough to ask a question */ 1414 zone_dochandle_t tmphandle; 1415 int res, answer; 1416 1417 if ((tmphandle = zonecfg_init_handle()) == NULL) { 1418 zone_perror(execname, Z_NOMEM, TRUE); 1419 exit(Z_ERR); 1420 } 1421 res = zonecfg_get_handle(zone, tmphandle); 1422 zonecfg_fini_handle(tmphandle); 1423 if (res != Z_OK) 1424 return (Z_OK); 1425 1426 if (state_atleast(ZONE_STATE_INSTALLED)) { 1427 zerr(gettext("Zone %s already installed; %s not allowed."), 1428 zone, cmd_to_str(CMD_CREATE)); 1429 return (Z_ERR); 1430 } 1431 1432 if (force) { 1433 (void) printf(gettext("Zone %s already exists; overwriting.\n"), 1434 zone); 1435 return (Z_OK); 1436 } 1437 (void) snprintf(line, sizeof (line), 1438 gettext("Zone %s already exists; %s anyway"), zone, 1439 cmd_to_str(CMD_CREATE)); 1440 if ((answer = ask_yesno(FALSE, line)) == -1) { 1441 zerr(gettext("Zone exists, input not from terminal and -F not " 1442 "specified:\n%s command ignored, exiting."), 1443 cmd_to_str(CMD_CREATE)); 1444 exit(Z_ERR); 1445 } 1446 return (answer == 1 ? Z_OK : Z_ERR); 1447 } 1448 1449 static bool 1450 zone_is_read_only(int cmd_num) 1451 { 1452 if (strncmp(zone, "SUNW", 4) == 0) { 1453 zerr(gettext("%s: zones beginning with SUNW are read-only."), 1454 zone); 1455 saw_error = TRUE; 1456 return (TRUE); 1457 } 1458 if (read_only_mode) { 1459 zerr(gettext("%s: cannot %s in read-only mode."), zone, 1460 cmd_to_str(cmd_num)); 1461 saw_error = TRUE; 1462 return (TRUE); 1463 } 1464 return (FALSE); 1465 } 1466 1467 /* 1468 * Create a new configuration. 1469 */ 1470 void 1471 create_func(cmd_t *cmd) 1472 { 1473 int err, arg; 1474 char zone_template[ZONENAME_MAX]; 1475 char attach_path[MAXPATHLEN]; 1476 zone_dochandle_t tmphandle; 1477 bool force = FALSE; 1478 bool attach = FALSE; 1479 bool arg_err = FALSE; 1480 1481 assert(cmd != NULL); 1482 1483 /* This is the default if no arguments are given. */ 1484 (void) strlcpy(zone_template, "SUNWdefault", sizeof (zone_template)); 1485 1486 optind = 0; 1487 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?a:bFt:")) 1488 != EOF) { 1489 switch (arg) { 1490 case '?': 1491 if (optopt == '?') 1492 longer_usage(CMD_CREATE); 1493 else 1494 short_usage(CMD_CREATE); 1495 arg_err = TRUE; 1496 break; 1497 case 'a': 1498 (void) strlcpy(attach_path, optarg, 1499 sizeof (attach_path)); 1500 attach = TRUE; 1501 break; 1502 case 'b': 1503 (void) strlcpy(zone_template, "SUNWblank", 1504 sizeof (zone_template)); 1505 break; 1506 case 'F': 1507 force = TRUE; 1508 break; 1509 case 't': 1510 (void) strlcpy(zone_template, optarg, 1511 sizeof (zone_template)); 1512 break; 1513 default: 1514 short_usage(CMD_CREATE); 1515 arg_err = TRUE; 1516 break; 1517 } 1518 } 1519 if (arg_err) 1520 return; 1521 1522 if (optind != cmd->cmd_argc) { 1523 short_usage(CMD_CREATE); 1524 return; 1525 } 1526 1527 if (zone_is_read_only(CMD_CREATE)) 1528 return; 1529 1530 if (check_if_zone_already_exists(force) != Z_OK) 1531 return; 1532 1533 /* 1534 * Get a temporary handle first. If that fails, the old handle 1535 * will not be lost. Then finish whichever one we don't need, 1536 * to avoid leaks. Then get the handle for zone_template, and 1537 * set the name to zone: this "copy, rename" method is how 1538 * create -[b|t] works. 1539 */ 1540 if ((tmphandle = zonecfg_init_handle()) == NULL) { 1541 zone_perror(execname, Z_NOMEM, TRUE); 1542 exit(Z_ERR); 1543 } 1544 1545 if (attach) 1546 err = zonecfg_get_attach_handle(attach_path, zone, B_FALSE, 1547 tmphandle); 1548 else 1549 err = zonecfg_get_template_handle(zone_template, zone, 1550 tmphandle); 1551 1552 if (err != Z_OK) { 1553 zonecfg_fini_handle(tmphandle); 1554 if (attach && err == Z_NO_ZONE) 1555 (void) fprintf(stderr, gettext("invalid path to " 1556 "detached zone\n")); 1557 else if (attach && err == Z_INVALID_DOCUMENT) 1558 (void) fprintf(stderr, gettext("Cannot attach to an " 1559 "earlier release of the operating system\n")); 1560 else 1561 zone_perror(zone_template, err, TRUE); 1562 return; 1563 } 1564 1565 need_to_commit = TRUE; 1566 zonecfg_fini_handle(handle); 1567 handle = tmphandle; 1568 got_handle = TRUE; 1569 } 1570 1571 /* 1572 * This malloc()'s memory, which must be freed by the caller. 1573 */ 1574 static char * 1575 quoteit(char *instr) 1576 { 1577 char *outstr; 1578 size_t outstrsize = strlen(instr) + 3; /* 2 quotes + '\0' */ 1579 1580 if ((outstr = malloc(outstrsize)) == NULL) { 1581 zone_perror(zone, Z_NOMEM, FALSE); 1582 exit(Z_ERR); 1583 } 1584 if (strchr(instr, ' ') == NULL) { 1585 (void) strlcpy(outstr, instr, outstrsize); 1586 return (outstr); 1587 } 1588 (void) snprintf(outstr, outstrsize, "\"%s\"", instr); 1589 return (outstr); 1590 } 1591 1592 static void 1593 export_prop(FILE *of, int prop_num, char *prop_id) 1594 { 1595 char *quote_str; 1596 1597 if (strlen(prop_id) == 0) 1598 return; 1599 quote_str = quoteit(prop_id); 1600 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1601 pt_to_str(prop_num), quote_str); 1602 free(quote_str); 1603 } 1604 1605 void 1606 export_func(cmd_t *cmd) 1607 { 1608 struct zone_nwiftab nwiftab; 1609 struct zone_fstab fstab; 1610 struct zone_devtab devtab; 1611 struct zone_attrtab attrtab; 1612 struct zone_rctltab rctltab; 1613 struct zone_dstab dstab; 1614 struct zone_psettab psettab; 1615 struct zone_mcaptab mcaptab; 1616 struct zone_rctlvaltab *valptr; 1617 int err, arg; 1618 char zonepath[MAXPATHLEN], outfile[MAXPATHLEN], pool[MAXNAMELEN]; 1619 char bootargs[BOOTARGS_MAX]; 1620 char sched[MAXNAMELEN]; 1621 char brand[MAXNAMELEN]; 1622 char *limitpriv; 1623 FILE *of; 1624 boolean_t autoboot; 1625 zone_iptype_t iptype; 1626 bool need_to_close = FALSE; 1627 bool arg_err = FALSE; 1628 1629 assert(cmd != NULL); 1630 1631 outfile[0] = '\0'; 1632 optind = 0; 1633 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?f:")) != EOF) { 1634 switch (arg) { 1635 case '?': 1636 if (optopt == '?') 1637 longer_usage(CMD_EXPORT); 1638 else 1639 short_usage(CMD_EXPORT); 1640 arg_err = TRUE; 1641 break; 1642 case 'f': 1643 (void) strlcpy(outfile, optarg, sizeof (outfile)); 1644 break; 1645 default: 1646 short_usage(CMD_EXPORT); 1647 arg_err = TRUE; 1648 break; 1649 } 1650 } 1651 if (arg_err) 1652 return; 1653 1654 if (optind != cmd->cmd_argc) { 1655 short_usage(CMD_EXPORT); 1656 return; 1657 } 1658 if (strlen(outfile) == 0) { 1659 of = stdout; 1660 } else { 1661 if ((of = fopen(outfile, "w")) == NULL) { 1662 zerr(gettext("opening file %s: %s"), 1663 outfile, strerror(errno)); 1664 goto done; 1665 } 1666 setbuf(of, NULL); 1667 need_to_close = TRUE; 1668 } 1669 1670 if ((err = initialize(TRUE)) != Z_OK) 1671 goto done; 1672 1673 (void) fprintf(of, "%s -b\n", cmd_to_str(CMD_CREATE)); 1674 1675 if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) == Z_OK && 1676 strlen(zonepath) > 0) 1677 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1678 pt_to_str(PT_ZONEPATH), zonepath); 1679 1680 if ((zone_get_brand(zone, brand, sizeof (brand)) == Z_OK) && 1681 (strcmp(brand, NATIVE_BRAND_NAME) != 0)) 1682 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1683 pt_to_str(PT_BRAND), brand); 1684 1685 if (zonecfg_get_autoboot(handle, &autoboot) == Z_OK) 1686 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1687 pt_to_str(PT_AUTOBOOT), autoboot ? "true" : "false"); 1688 1689 if (zonecfg_get_bootargs(handle, bootargs, sizeof (bootargs)) == Z_OK && 1690 strlen(bootargs) > 0) { 1691 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1692 pt_to_str(PT_BOOTARGS), bootargs); 1693 } 1694 1695 if (zonecfg_get_pool(handle, pool, sizeof (pool)) == Z_OK && 1696 strlen(pool) > 0) 1697 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1698 pt_to_str(PT_POOL), pool); 1699 1700 if (zonecfg_get_limitpriv(handle, &limitpriv) == Z_OK && 1701 strlen(limitpriv) > 0) { 1702 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1703 pt_to_str(PT_LIMITPRIV), limitpriv); 1704 free(limitpriv); 1705 } 1706 1707 if (zonecfg_get_sched_class(handle, sched, sizeof (sched)) == Z_OK && 1708 strlen(sched) > 0) 1709 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1710 pt_to_str(PT_SCHED), sched); 1711 1712 if (zonecfg_get_iptype(handle, &iptype) == Z_OK) { 1713 switch (iptype) { 1714 case ZS_SHARED: 1715 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1716 pt_to_str(PT_IPTYPE), "shared"); 1717 break; 1718 case ZS_EXCLUSIVE: 1719 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1720 pt_to_str(PT_IPTYPE), "exclusive"); 1721 break; 1722 } 1723 } 1724 1725 if ((err = zonecfg_setipdent(handle)) != Z_OK) { 1726 zone_perror(zone, err, FALSE); 1727 goto done; 1728 } 1729 while (zonecfg_getipdent(handle, &fstab) == Z_OK) { 1730 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1731 rt_to_str(RT_IPD)); 1732 export_prop(of, PT_DIR, fstab.zone_fs_dir); 1733 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1734 } 1735 (void) zonecfg_endipdent(handle); 1736 1737 if ((err = zonecfg_setfsent(handle)) != Z_OK) { 1738 zone_perror(zone, err, FALSE); 1739 goto done; 1740 } 1741 while (zonecfg_getfsent(handle, &fstab) == Z_OK) { 1742 zone_fsopt_t *optptr; 1743 1744 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1745 rt_to_str(RT_FS)); 1746 export_prop(of, PT_DIR, fstab.zone_fs_dir); 1747 export_prop(of, PT_SPECIAL, fstab.zone_fs_special); 1748 export_prop(of, PT_RAW, fstab.zone_fs_raw); 1749 export_prop(of, PT_TYPE, fstab.zone_fs_type); 1750 for (optptr = fstab.zone_fs_options; optptr != NULL; 1751 optptr = optptr->zone_fsopt_next) { 1752 /* 1753 * Simple property values with embedded equal signs 1754 * need to be quoted to prevent the lexer from 1755 * mis-parsing them as complex name=value pairs. 1756 */ 1757 if (strchr(optptr->zone_fsopt_opt, '=')) 1758 (void) fprintf(of, "%s %s \"%s\"\n", 1759 cmd_to_str(CMD_ADD), 1760 pt_to_str(PT_OPTIONS), 1761 optptr->zone_fsopt_opt); 1762 else 1763 (void) fprintf(of, "%s %s %s\n", 1764 cmd_to_str(CMD_ADD), 1765 pt_to_str(PT_OPTIONS), 1766 optptr->zone_fsopt_opt); 1767 } 1768 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1769 zonecfg_free_fs_option_list(fstab.zone_fs_options); 1770 } 1771 (void) zonecfg_endfsent(handle); 1772 1773 if ((err = zonecfg_setnwifent(handle)) != Z_OK) { 1774 zone_perror(zone, err, FALSE); 1775 goto done; 1776 } 1777 while (zonecfg_getnwifent(handle, &nwiftab) == Z_OK) { 1778 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1779 rt_to_str(RT_NET)); 1780 export_prop(of, PT_ADDRESS, nwiftab.zone_nwif_address); 1781 export_prop(of, PT_PHYSICAL, nwiftab.zone_nwif_physical); 1782 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1783 } 1784 (void) zonecfg_endnwifent(handle); 1785 1786 if ((err = zonecfg_setdevent(handle)) != Z_OK) { 1787 zone_perror(zone, err, FALSE); 1788 goto done; 1789 } 1790 while (zonecfg_getdevent(handle, &devtab) == Z_OK) { 1791 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1792 rt_to_str(RT_DEVICE)); 1793 export_prop(of, PT_MATCH, devtab.zone_dev_match); 1794 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1795 } 1796 (void) zonecfg_enddevent(handle); 1797 1798 if ((err = zonecfg_setrctlent(handle)) != Z_OK) { 1799 zone_perror(zone, err, FALSE); 1800 goto done; 1801 } 1802 while (zonecfg_getrctlent(handle, &rctltab) == Z_OK) { 1803 (void) fprintf(of, "%s rctl\n", cmd_to_str(CMD_ADD)); 1804 export_prop(of, PT_NAME, rctltab.zone_rctl_name); 1805 for (valptr = rctltab.zone_rctl_valptr; valptr != NULL; 1806 valptr = valptr->zone_rctlval_next) { 1807 fprintf(of, "%s %s (%s=%s,%s=%s,%s=%s)\n", 1808 cmd_to_str(CMD_ADD), pt_to_str(PT_VALUE), 1809 pt_to_str(PT_PRIV), valptr->zone_rctlval_priv, 1810 pt_to_str(PT_LIMIT), valptr->zone_rctlval_limit, 1811 pt_to_str(PT_ACTION), valptr->zone_rctlval_action); 1812 } 1813 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1814 zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr); 1815 } 1816 (void) zonecfg_endrctlent(handle); 1817 1818 if ((err = zonecfg_setattrent(handle)) != Z_OK) { 1819 zone_perror(zone, err, FALSE); 1820 goto done; 1821 } 1822 while (zonecfg_getattrent(handle, &attrtab) == Z_OK) { 1823 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1824 rt_to_str(RT_ATTR)); 1825 export_prop(of, PT_NAME, attrtab.zone_attr_name); 1826 export_prop(of, PT_TYPE, attrtab.zone_attr_type); 1827 export_prop(of, PT_VALUE, attrtab.zone_attr_value); 1828 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1829 } 1830 (void) zonecfg_endattrent(handle); 1831 1832 if ((err = zonecfg_setdsent(handle)) != Z_OK) { 1833 zone_perror(zone, err, FALSE); 1834 goto done; 1835 } 1836 while (zonecfg_getdsent(handle, &dstab) == Z_OK) { 1837 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1838 rt_to_str(RT_DATASET)); 1839 export_prop(of, PT_NAME, dstab.zone_dataset_name); 1840 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1841 } 1842 (void) zonecfg_enddsent(handle); 1843 1844 if (zonecfg_getpsetent(handle, &psettab) == Z_OK) { 1845 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1846 rt_to_str(RT_DCPU)); 1847 if (strcmp(psettab.zone_ncpu_min, psettab.zone_ncpu_max) == 0) 1848 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1849 pt_to_str(PT_NCPUS), psettab.zone_ncpu_max); 1850 else 1851 (void) fprintf(of, "%s %s=%s-%s\n", cmd_to_str(CMD_SET), 1852 pt_to_str(PT_NCPUS), psettab.zone_ncpu_min, 1853 psettab.zone_ncpu_max); 1854 if (psettab.zone_importance[0] != '\0') 1855 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1856 pt_to_str(PT_IMPORTANCE), psettab.zone_importance); 1857 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1858 } 1859 1860 if (zonecfg_getmcapent(handle, &mcaptab) == Z_OK) { 1861 char buf[128]; 1862 1863 (void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD), 1864 rt_to_str(RT_MCAP)); 1865 bytes_to_units(mcaptab.zone_physmem_cap, buf, sizeof (buf)); 1866 (void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET), 1867 pt_to_str(PT_PHYSICAL), buf); 1868 (void) fprintf(of, "%s\n", cmd_to_str(CMD_END)); 1869 } 1870 1871 /* 1872 * There is nothing to export for pcap since this resource is just 1873 * a container for an rctl alias. 1874 */ 1875 1876 done: 1877 if (need_to_close) 1878 (void) fclose(of); 1879 } 1880 1881 void 1882 exit_func(cmd_t *cmd) 1883 { 1884 int arg, answer; 1885 bool arg_err = FALSE; 1886 1887 optind = 0; 1888 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) { 1889 switch (arg) { 1890 case '?': 1891 longer_usage(CMD_EXIT); 1892 arg_err = TRUE; 1893 break; 1894 case 'F': 1895 force_exit = TRUE; 1896 break; 1897 default: 1898 short_usage(CMD_EXIT); 1899 arg_err = TRUE; 1900 break; 1901 } 1902 } 1903 if (arg_err) 1904 return; 1905 1906 if (optind < cmd->cmd_argc) { 1907 short_usage(CMD_EXIT); 1908 return; 1909 } 1910 1911 if (global_scope || force_exit) { 1912 time_to_exit = TRUE; 1913 return; 1914 } 1915 1916 answer = ask_yesno(FALSE, "Resource incomplete; really quit"); 1917 if (answer == -1) { 1918 zerr(gettext("Resource incomplete, input " 1919 "not from terminal and -F not specified:\n%s command " 1920 "ignored, but exiting anyway."), cmd_to_str(CMD_EXIT)); 1921 exit(Z_ERR); 1922 } else if (answer == 1) { 1923 time_to_exit = TRUE; 1924 } 1925 /* (answer == 0) => just return */ 1926 } 1927 1928 static int 1929 validate_zonepath_syntax(char *path) 1930 { 1931 if (path[0] != '/') { 1932 zerr(gettext("%s is not an absolute path."), path); 1933 return (Z_ERR); 1934 } 1935 if (strcmp(path, "/") == 0) { 1936 zerr(gettext("/ is not allowed as a %s."), 1937 pt_to_str(PT_ZONEPATH)); 1938 return (Z_ERR); 1939 } 1940 return (Z_OK); 1941 } 1942 1943 static void 1944 add_resource(cmd_t *cmd) 1945 { 1946 int type; 1947 struct zone_psettab tmp_psettab; 1948 struct zone_mcaptab tmp_mcaptab; 1949 uint64_t tmp; 1950 uint64_t tmp_mcap; 1951 char pool[MAXNAMELEN]; 1952 1953 if ((type = cmd->cmd_res_type) == RT_UNKNOWN) { 1954 long_usage(CMD_ADD, TRUE); 1955 goto bad; 1956 } 1957 1958 switch (type) { 1959 case RT_FS: 1960 bzero(&in_progress_fstab, sizeof (in_progress_fstab)); 1961 return; 1962 case RT_IPD: 1963 if (state_atleast(ZONE_STATE_INSTALLED)) { 1964 zerr(gettext("Zone %s already installed; %s %s not " 1965 "allowed."), zone, cmd_to_str(CMD_ADD), 1966 rt_to_str(RT_IPD)); 1967 goto bad; 1968 } 1969 bzero(&in_progress_ipdtab, sizeof (in_progress_ipdtab)); 1970 return; 1971 case RT_NET: 1972 bzero(&in_progress_nwiftab, sizeof (in_progress_nwiftab)); 1973 return; 1974 case RT_DEVICE: 1975 bzero(&in_progress_devtab, sizeof (in_progress_devtab)); 1976 return; 1977 case RT_RCTL: 1978 if (global_zone) 1979 zerr(gettext("WARNING: Setting a global zone resource " 1980 "control too low could deny\nservice " 1981 "to even the root user; " 1982 "this could render the system impossible\n" 1983 "to administer. Please use caution.")); 1984 bzero(&in_progress_rctltab, sizeof (in_progress_rctltab)); 1985 return; 1986 case RT_ATTR: 1987 bzero(&in_progress_attrtab, sizeof (in_progress_attrtab)); 1988 return; 1989 case RT_DATASET: 1990 bzero(&in_progress_dstab, sizeof (in_progress_dstab)); 1991 return; 1992 case RT_DCPU: 1993 /* Make sure there isn't already a cpu-set or cpu-cap entry. */ 1994 if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) { 1995 zerr(gettext("The %s resource already exists."), 1996 rt_to_str(RT_DCPU)); 1997 goto bad; 1998 } 1999 if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp) != 2000 Z_NO_ENTRY) { 2001 zerr(gettext("The %s resource already exists."), 2002 rt_to_str(RT_PCAP)); 2003 goto bad; 2004 } 2005 2006 /* Make sure the pool property isn't set. */ 2007 if (zonecfg_get_pool(handle, pool, sizeof (pool)) == Z_OK && 2008 strlen(pool) > 0) { 2009 zerr(gettext("The %s property is already set. " 2010 "A persistent pool is incompatible with\nthe %s " 2011 "resource."), 2012 pt_to_str(PT_POOL), rt_to_str(RT_DCPU)); 2013 goto bad; 2014 } 2015 2016 bzero(&in_progress_psettab, sizeof (in_progress_psettab)); 2017 return; 2018 case RT_PCAP: 2019 /* 2020 * Make sure there isn't already a cpu-set or incompatible 2021 * cpu-cap rctls. 2022 */ 2023 if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) { 2024 zerr(gettext("The %s resource already exists."), 2025 rt_to_str(RT_DCPU)); 2026 goto bad; 2027 } 2028 2029 switch (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp)) { 2030 case Z_ALIAS_DISALLOW: 2031 zone_perror(rt_to_str(RT_PCAP), Z_ALIAS_DISALLOW, 2032 FALSE); 2033 goto bad; 2034 2035 case Z_OK: 2036 zerr(gettext("The %s resource already exists."), 2037 rt_to_str(RT_PCAP)); 2038 goto bad; 2039 2040 default: 2041 break; 2042 } 2043 return; 2044 case RT_MCAP: 2045 /* 2046 * Make sure there isn't already a mem-cap entry or max-swap 2047 * or max-locked rctl. 2048 */ 2049 if (zonecfg_lookup_mcap(handle, &tmp_mcaptab) == Z_OK || 2050 zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &tmp_mcap) 2051 == Z_OK || 2052 zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, 2053 &tmp_mcap) == Z_OK) { 2054 zerr(gettext("The %s resource or a related resource " 2055 "control already exists."), rt_to_str(RT_MCAP)); 2056 goto bad; 2057 } 2058 if (global_zone) 2059 zerr(gettext("WARNING: Setting a global zone memory " 2060 "cap too low could deny\nservice " 2061 "to even the root user; " 2062 "this could render the system impossible\n" 2063 "to administer. Please use caution.")); 2064 bzero(&in_progress_mcaptab, sizeof (in_progress_mcaptab)); 2065 return; 2066 default: 2067 zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, TRUE); 2068 long_usage(CMD_ADD, TRUE); 2069 usage(FALSE, HELP_RESOURCES); 2070 } 2071 bad: 2072 global_scope = TRUE; 2073 end_op = -1; 2074 } 2075 2076 static void 2077 do_complex_rctl_val(complex_property_ptr_t cp) 2078 { 2079 struct zone_rctlvaltab *rctlvaltab; 2080 complex_property_ptr_t cx; 2081 bool seen_priv = FALSE, seen_limit = FALSE, seen_action = FALSE; 2082 rctlblk_t *rctlblk; 2083 int err; 2084 2085 if ((rctlvaltab = alloc_rctlvaltab()) == NULL) { 2086 zone_perror(zone, Z_NOMEM, TRUE); 2087 exit(Z_ERR); 2088 } 2089 for (cx = cp; cx != NULL; cx = cx->cp_next) { 2090 switch (cx->cp_type) { 2091 case PT_PRIV: 2092 if (seen_priv) { 2093 zerr(gettext("%s already specified"), 2094 pt_to_str(PT_PRIV)); 2095 goto bad; 2096 } 2097 (void) strlcpy(rctlvaltab->zone_rctlval_priv, 2098 cx->cp_value, 2099 sizeof (rctlvaltab->zone_rctlval_priv)); 2100 seen_priv = TRUE; 2101 break; 2102 case PT_LIMIT: 2103 if (seen_limit) { 2104 zerr(gettext("%s already specified"), 2105 pt_to_str(PT_LIMIT)); 2106 goto bad; 2107 } 2108 (void) strlcpy(rctlvaltab->zone_rctlval_limit, 2109 cx->cp_value, 2110 sizeof (rctlvaltab->zone_rctlval_limit)); 2111 seen_limit = TRUE; 2112 break; 2113 case PT_ACTION: 2114 if (seen_action) { 2115 zerr(gettext("%s already specified"), 2116 pt_to_str(PT_ACTION)); 2117 goto bad; 2118 } 2119 (void) strlcpy(rctlvaltab->zone_rctlval_action, 2120 cx->cp_value, 2121 sizeof (rctlvaltab->zone_rctlval_action)); 2122 seen_action = TRUE; 2123 break; 2124 default: 2125 zone_perror(pt_to_str(PT_VALUE), 2126 Z_NO_PROPERTY_TYPE, TRUE); 2127 long_usage(CMD_ADD, TRUE); 2128 usage(FALSE, HELP_PROPS); 2129 zonecfg_free_rctl_value_list(rctlvaltab); 2130 return; 2131 } 2132 } 2133 if (!seen_priv) 2134 zerr(gettext("%s not specified"), pt_to_str(PT_PRIV)); 2135 if (!seen_limit) 2136 zerr(gettext("%s not specified"), pt_to_str(PT_LIMIT)); 2137 if (!seen_action) 2138 zerr(gettext("%s not specified"), pt_to_str(PT_ACTION)); 2139 if (!seen_priv || !seen_limit || !seen_action) 2140 goto bad; 2141 rctlvaltab->zone_rctlval_next = NULL; 2142 rctlblk = alloca(rctlblk_size()); 2143 /* 2144 * Make sure the rctl value looks roughly correct; we won't know if 2145 * it's truly OK until we verify the configuration on the target 2146 * system. 2147 */ 2148 if (zonecfg_construct_rctlblk(rctlvaltab, rctlblk) != Z_OK || 2149 !zonecfg_valid_rctlblk(rctlblk)) { 2150 zerr(gettext("Invalid %s %s specification"), rt_to_str(RT_RCTL), 2151 pt_to_str(PT_VALUE)); 2152 goto bad; 2153 } 2154 err = zonecfg_add_rctl_value(&in_progress_rctltab, rctlvaltab); 2155 if (err != Z_OK) 2156 zone_perror(pt_to_str(PT_VALUE), err, TRUE); 2157 return; 2158 2159 bad: 2160 zonecfg_free_rctl_value_list(rctlvaltab); 2161 } 2162 2163 static void 2164 add_property(cmd_t *cmd) 2165 { 2166 char *prop_id; 2167 int err, res_type, prop_type; 2168 property_value_ptr_t pp; 2169 list_property_ptr_t l; 2170 2171 res_type = resource_scope; 2172 prop_type = cmd->cmd_prop_name[0]; 2173 if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) { 2174 long_usage(CMD_ADD, TRUE); 2175 return; 2176 } 2177 2178 if (cmd->cmd_prop_nv_pairs != 1) { 2179 long_usage(CMD_ADD, TRUE); 2180 return; 2181 } 2182 2183 if (initialize(TRUE) != Z_OK) 2184 return; 2185 2186 switch (res_type) { 2187 case RT_FS: 2188 if (prop_type != PT_OPTIONS) { 2189 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 2190 TRUE); 2191 long_usage(CMD_ADD, TRUE); 2192 usage(FALSE, HELP_PROPS); 2193 return; 2194 } 2195 pp = cmd->cmd_property_ptr[0]; 2196 if (pp->pv_type != PROP_VAL_SIMPLE && 2197 pp->pv_type != PROP_VAL_LIST) { 2198 zerr(gettext("A %s or %s value was expected here."), 2199 pvt_to_str(PROP_VAL_SIMPLE), 2200 pvt_to_str(PROP_VAL_LIST)); 2201 saw_error = TRUE; 2202 return; 2203 } 2204 if (pp->pv_type == PROP_VAL_SIMPLE) { 2205 if (pp->pv_simple == NULL) { 2206 long_usage(CMD_ADD, TRUE); 2207 return; 2208 } 2209 prop_id = pp->pv_simple; 2210 err = zonecfg_add_fs_option(&in_progress_fstab, 2211 prop_id); 2212 if (err != Z_OK) 2213 zone_perror(pt_to_str(prop_type), err, TRUE); 2214 } else { 2215 list_property_ptr_t list; 2216 2217 for (list = pp->pv_list; list != NULL; 2218 list = list->lp_next) { 2219 prop_id = list->lp_simple; 2220 if (prop_id == NULL) 2221 break; 2222 err = zonecfg_add_fs_option( 2223 &in_progress_fstab, prop_id); 2224 if (err != Z_OK) 2225 zone_perror(pt_to_str(prop_type), err, 2226 TRUE); 2227 } 2228 } 2229 return; 2230 case RT_RCTL: 2231 if (prop_type != PT_VALUE) { 2232 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 2233 TRUE); 2234 long_usage(CMD_ADD, TRUE); 2235 usage(FALSE, HELP_PROPS); 2236 return; 2237 } 2238 pp = cmd->cmd_property_ptr[0]; 2239 if (pp->pv_type != PROP_VAL_COMPLEX && 2240 pp->pv_type != PROP_VAL_LIST) { 2241 zerr(gettext("A %s or %s value was expected here."), 2242 pvt_to_str(PROP_VAL_COMPLEX), 2243 pvt_to_str(PROP_VAL_LIST)); 2244 saw_error = TRUE; 2245 return; 2246 } 2247 if (pp->pv_type == PROP_VAL_COMPLEX) { 2248 do_complex_rctl_val(pp->pv_complex); 2249 return; 2250 } 2251 for (l = pp->pv_list; l != NULL; l = l->lp_next) 2252 do_complex_rctl_val(l->lp_complex); 2253 return; 2254 default: 2255 zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, TRUE); 2256 long_usage(CMD_ADD, TRUE); 2257 usage(FALSE, HELP_RESOURCES); 2258 return; 2259 } 2260 } 2261 2262 static boolean_t 2263 gz_invalid_resource(int type) 2264 { 2265 return (global_zone && (type == RT_FS || type == RT_IPD || 2266 type == RT_NET || type == RT_DEVICE || type == RT_ATTR || 2267 type == RT_DATASET)); 2268 } 2269 2270 static boolean_t 2271 gz_invalid_rt_property(int type) 2272 { 2273 return (global_zone && (type == RT_ZONENAME || type == RT_ZONEPATH || 2274 type == RT_AUTOBOOT || type == RT_LIMITPRIV || 2275 type == RT_BOOTARGS || type == RT_BRAND || type == RT_SCHED || 2276 type == RT_IPTYPE)); 2277 } 2278 2279 static boolean_t 2280 gz_invalid_property(int type) 2281 { 2282 return (global_zone && (type == PT_ZONENAME || type == PT_ZONEPATH || 2283 type == PT_AUTOBOOT || type == PT_LIMITPRIV || 2284 type == PT_BOOTARGS || type == PT_BRAND || type == PT_SCHED || 2285 type == PT_IPTYPE)); 2286 } 2287 2288 void 2289 add_func(cmd_t *cmd) 2290 { 2291 int arg; 2292 bool arg_err = FALSE; 2293 2294 assert(cmd != NULL); 2295 2296 optind = 0; 2297 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 2298 switch (arg) { 2299 case '?': 2300 longer_usage(CMD_ADD); 2301 arg_err = TRUE; 2302 break; 2303 default: 2304 short_usage(CMD_ADD); 2305 arg_err = TRUE; 2306 break; 2307 } 2308 } 2309 if (arg_err) 2310 return; 2311 2312 if (optind != cmd->cmd_argc) { 2313 short_usage(CMD_ADD); 2314 return; 2315 } 2316 2317 if (zone_is_read_only(CMD_ADD)) 2318 return; 2319 2320 if (initialize(TRUE) != Z_OK) 2321 return; 2322 if (global_scope) { 2323 if (gz_invalid_resource(cmd->cmd_res_type)) { 2324 zerr(gettext("Cannot add a %s resource to the " 2325 "global zone."), rt_to_str(cmd->cmd_res_type)); 2326 saw_error = TRUE; 2327 return; 2328 } 2329 2330 global_scope = FALSE; 2331 resource_scope = cmd->cmd_res_type; 2332 end_op = CMD_ADD; 2333 add_resource(cmd); 2334 } else 2335 add_property(cmd); 2336 } 2337 2338 /* 2339 * This routine has an unusual implementation, because it tries very 2340 * hard to succeed in the face of a variety of failure modes. 2341 * The most common and most vexing occurs when the index file and 2342 * the /etc/zones/<zonename.xml> file are not both present. In 2343 * this case, delete must eradicate as much of the zone state as is left 2344 * so that the user can later create a new zone with the same name. 2345 */ 2346 void 2347 delete_func(cmd_t *cmd) 2348 { 2349 int err, arg, answer; 2350 char line[ZONENAME_MAX + 128]; /* enough to ask a question */ 2351 bool force = FALSE; 2352 bool arg_err = FALSE; 2353 2354 optind = 0; 2355 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) { 2356 switch (arg) { 2357 case '?': 2358 longer_usage(CMD_DELETE); 2359 arg_err = TRUE; 2360 break; 2361 case 'F': 2362 force = TRUE; 2363 break; 2364 default: 2365 short_usage(CMD_DELETE); 2366 arg_err = TRUE; 2367 break; 2368 } 2369 } 2370 if (arg_err) 2371 return; 2372 2373 if (optind != cmd->cmd_argc) { 2374 short_usage(CMD_DELETE); 2375 return; 2376 } 2377 2378 if (zone_is_read_only(CMD_DELETE)) 2379 return; 2380 2381 if (!force) { 2382 /* 2383 * Initialize sets up the global called "handle" and warns the 2384 * user if the zone is not configured. In force mode, we don't 2385 * trust that evaluation, and hence skip it. (We don't need the 2386 * handle to be loaded anyway, since zonecfg_destroy is done by 2387 * zonename). However, we also have to take care to emulate the 2388 * messages spit out by initialize; see below. 2389 */ 2390 if (initialize(TRUE) != Z_OK) 2391 return; 2392 2393 (void) snprintf(line, sizeof (line), 2394 gettext("Are you sure you want to delete zone %s"), zone); 2395 if ((answer = ask_yesno(FALSE, line)) == -1) { 2396 zerr(gettext("Input not from terminal and -F not " 2397 "specified:\n%s command ignored, exiting."), 2398 cmd_to_str(CMD_DELETE)); 2399 exit(Z_ERR); 2400 } 2401 if (answer != 1) 2402 return; 2403 } 2404 2405 if ((err = zonecfg_destroy(zone, force)) != Z_OK) { 2406 if ((err == Z_BAD_ZONE_STATE) && !force) { 2407 zerr(gettext("Zone %s not in %s state; %s not " 2408 "allowed. Use -F to force %s."), 2409 zone, zone_state_str(ZONE_STATE_CONFIGURED), 2410 cmd_to_str(CMD_DELETE), cmd_to_str(CMD_DELETE)); 2411 } else { 2412 zone_perror(zone, err, TRUE); 2413 } 2414 } 2415 need_to_commit = FALSE; 2416 2417 /* 2418 * Emulate initialize's messaging; if there wasn't a valid handle to 2419 * begin with, then user had typed delete (or delete -F) multiple 2420 * times. So we emit a message. 2421 * 2422 * We only do this in the 'force' case because normally, initialize() 2423 * takes care of this for us. 2424 */ 2425 if (force && zonecfg_check_handle(handle) != Z_OK && interactive_mode) 2426 (void) printf(gettext("Use '%s' to begin " 2427 "configuring a new zone.\n"), cmd_to_str(CMD_CREATE)); 2428 2429 /* 2430 * Time for a new handle: finish the old one off first 2431 * then get a new one properly to avoid leaks. 2432 */ 2433 if (got_handle) { 2434 zonecfg_fini_handle(handle); 2435 if ((handle = zonecfg_init_handle()) == NULL) { 2436 zone_perror(execname, Z_NOMEM, TRUE); 2437 exit(Z_ERR); 2438 } 2439 if ((err = zonecfg_get_handle(zone, handle)) != Z_OK) { 2440 /* If there was no zone before, that's OK */ 2441 if (err != Z_NO_ZONE) 2442 zone_perror(zone, err, TRUE); 2443 got_handle = FALSE; 2444 } 2445 } 2446 } 2447 2448 static int 2449 fill_in_fstab(cmd_t *cmd, struct zone_fstab *fstab, bool fill_in_only) 2450 { 2451 int err, i; 2452 property_value_ptr_t pp; 2453 2454 if ((err = initialize(TRUE)) != Z_OK) 2455 return (err); 2456 2457 bzero(fstab, sizeof (*fstab)); 2458 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2459 pp = cmd->cmd_property_ptr[i]; 2460 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2461 zerr(gettext("A simple value was expected here.")); 2462 saw_error = TRUE; 2463 return (Z_INSUFFICIENT_SPEC); 2464 } 2465 switch (cmd->cmd_prop_name[i]) { 2466 case PT_DIR: 2467 (void) strlcpy(fstab->zone_fs_dir, pp->pv_simple, 2468 sizeof (fstab->zone_fs_dir)); 2469 break; 2470 case PT_SPECIAL: 2471 (void) strlcpy(fstab->zone_fs_special, pp->pv_simple, 2472 sizeof (fstab->zone_fs_special)); 2473 break; 2474 case PT_RAW: 2475 (void) strlcpy(fstab->zone_fs_raw, pp->pv_simple, 2476 sizeof (fstab->zone_fs_raw)); 2477 break; 2478 case PT_TYPE: 2479 (void) strlcpy(fstab->zone_fs_type, pp->pv_simple, 2480 sizeof (fstab->zone_fs_type)); 2481 break; 2482 default: 2483 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2484 Z_NO_PROPERTY_TYPE, TRUE); 2485 return (Z_INSUFFICIENT_SPEC); 2486 } 2487 } 2488 if (fill_in_only) 2489 return (Z_OK); 2490 return (zonecfg_lookup_filesystem(handle, fstab)); 2491 } 2492 2493 static int 2494 fill_in_ipdtab(cmd_t *cmd, struct zone_fstab *ipdtab, bool fill_in_only) 2495 { 2496 int err, i; 2497 property_value_ptr_t pp; 2498 2499 if ((err = initialize(TRUE)) != Z_OK) 2500 return (err); 2501 2502 bzero(ipdtab, sizeof (*ipdtab)); 2503 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2504 pp = cmd->cmd_property_ptr[i]; 2505 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2506 zerr(gettext("A simple value was expected here.")); 2507 saw_error = TRUE; 2508 return (Z_INSUFFICIENT_SPEC); 2509 } 2510 switch (cmd->cmd_prop_name[i]) { 2511 case PT_DIR: 2512 (void) strlcpy(ipdtab->zone_fs_dir, pp->pv_simple, 2513 sizeof (ipdtab->zone_fs_dir)); 2514 break; 2515 default: 2516 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2517 Z_NO_PROPERTY_TYPE, TRUE); 2518 return (Z_INSUFFICIENT_SPEC); 2519 } 2520 } 2521 if (fill_in_only) 2522 return (Z_OK); 2523 return (zonecfg_lookup_ipd(handle, ipdtab)); 2524 } 2525 2526 static int 2527 fill_in_nwiftab(cmd_t *cmd, struct zone_nwiftab *nwiftab, bool fill_in_only) 2528 { 2529 int err, i; 2530 property_value_ptr_t pp; 2531 2532 if ((err = initialize(TRUE)) != Z_OK) 2533 return (err); 2534 2535 bzero(nwiftab, sizeof (*nwiftab)); 2536 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2537 pp = cmd->cmd_property_ptr[i]; 2538 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2539 zerr(gettext("A simple value was expected here.")); 2540 saw_error = TRUE; 2541 return (Z_INSUFFICIENT_SPEC); 2542 } 2543 switch (cmd->cmd_prop_name[i]) { 2544 case PT_ADDRESS: 2545 (void) strlcpy(nwiftab->zone_nwif_address, 2546 pp->pv_simple, sizeof (nwiftab->zone_nwif_address)); 2547 break; 2548 case PT_PHYSICAL: 2549 (void) strlcpy(nwiftab->zone_nwif_physical, 2550 pp->pv_simple, 2551 sizeof (nwiftab->zone_nwif_physical)); 2552 break; 2553 default: 2554 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2555 Z_NO_PROPERTY_TYPE, TRUE); 2556 return (Z_INSUFFICIENT_SPEC); 2557 } 2558 } 2559 if (fill_in_only) 2560 return (Z_OK); 2561 err = zonecfg_lookup_nwif(handle, nwiftab); 2562 return (err); 2563 } 2564 2565 static int 2566 fill_in_devtab(cmd_t *cmd, struct zone_devtab *devtab, bool fill_in_only) 2567 { 2568 int err, i; 2569 property_value_ptr_t pp; 2570 2571 if ((err = initialize(TRUE)) != Z_OK) 2572 return (err); 2573 2574 bzero(devtab, sizeof (*devtab)); 2575 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2576 pp = cmd->cmd_property_ptr[i]; 2577 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2578 zerr(gettext("A simple value was expected here.")); 2579 saw_error = TRUE; 2580 return (Z_INSUFFICIENT_SPEC); 2581 } 2582 switch (cmd->cmd_prop_name[i]) { 2583 case PT_MATCH: 2584 (void) strlcpy(devtab->zone_dev_match, pp->pv_simple, 2585 sizeof (devtab->zone_dev_match)); 2586 break; 2587 default: 2588 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2589 Z_NO_PROPERTY_TYPE, TRUE); 2590 return (Z_INSUFFICIENT_SPEC); 2591 } 2592 } 2593 if (fill_in_only) 2594 return (Z_OK); 2595 err = zonecfg_lookup_dev(handle, devtab); 2596 return (err); 2597 } 2598 2599 static int 2600 fill_in_rctltab(cmd_t *cmd, struct zone_rctltab *rctltab, bool fill_in_only) 2601 { 2602 int err, i; 2603 property_value_ptr_t pp; 2604 2605 if ((err = initialize(TRUE)) != Z_OK) 2606 return (err); 2607 2608 bzero(rctltab, sizeof (*rctltab)); 2609 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2610 pp = cmd->cmd_property_ptr[i]; 2611 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2612 zerr(gettext("A simple value was expected here.")); 2613 saw_error = TRUE; 2614 return (Z_INSUFFICIENT_SPEC); 2615 } 2616 switch (cmd->cmd_prop_name[i]) { 2617 case PT_NAME: 2618 (void) strlcpy(rctltab->zone_rctl_name, pp->pv_simple, 2619 sizeof (rctltab->zone_rctl_name)); 2620 break; 2621 default: 2622 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2623 Z_NO_PROPERTY_TYPE, TRUE); 2624 return (Z_INSUFFICIENT_SPEC); 2625 } 2626 } 2627 if (fill_in_only) 2628 return (Z_OK); 2629 err = zonecfg_lookup_rctl(handle, rctltab); 2630 return (err); 2631 } 2632 2633 static int 2634 fill_in_attrtab(cmd_t *cmd, struct zone_attrtab *attrtab, bool fill_in_only) 2635 { 2636 int err, i; 2637 property_value_ptr_t pp; 2638 2639 if ((err = initialize(TRUE)) != Z_OK) 2640 return (err); 2641 2642 bzero(attrtab, sizeof (*attrtab)); 2643 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2644 pp = cmd->cmd_property_ptr[i]; 2645 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2646 zerr(gettext("A simple value was expected here.")); 2647 saw_error = TRUE; 2648 return (Z_INSUFFICIENT_SPEC); 2649 } 2650 switch (cmd->cmd_prop_name[i]) { 2651 case PT_NAME: 2652 (void) strlcpy(attrtab->zone_attr_name, pp->pv_simple, 2653 sizeof (attrtab->zone_attr_name)); 2654 break; 2655 case PT_TYPE: 2656 (void) strlcpy(attrtab->zone_attr_type, pp->pv_simple, 2657 sizeof (attrtab->zone_attr_type)); 2658 break; 2659 case PT_VALUE: 2660 (void) strlcpy(attrtab->zone_attr_value, pp->pv_simple, 2661 sizeof (attrtab->zone_attr_value)); 2662 break; 2663 default: 2664 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2665 Z_NO_PROPERTY_TYPE, TRUE); 2666 return (Z_INSUFFICIENT_SPEC); 2667 } 2668 } 2669 if (fill_in_only) 2670 return (Z_OK); 2671 err = zonecfg_lookup_attr(handle, attrtab); 2672 return (err); 2673 } 2674 2675 static int 2676 fill_in_dstab(cmd_t *cmd, struct zone_dstab *dstab, bool fill_in_only) 2677 { 2678 int err, i; 2679 property_value_ptr_t pp; 2680 2681 if ((err = initialize(TRUE)) != Z_OK) 2682 return (err); 2683 2684 dstab->zone_dataset_name[0] = '\0'; 2685 for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) { 2686 pp = cmd->cmd_property_ptr[i]; 2687 if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) { 2688 zerr(gettext("A simple value was expected here.")); 2689 saw_error = TRUE; 2690 return (Z_INSUFFICIENT_SPEC); 2691 } 2692 switch (cmd->cmd_prop_name[i]) { 2693 case PT_NAME: 2694 (void) strlcpy(dstab->zone_dataset_name, pp->pv_simple, 2695 sizeof (dstab->zone_dataset_name)); 2696 break; 2697 default: 2698 zone_perror(pt_to_str(cmd->cmd_prop_name[i]), 2699 Z_NO_PROPERTY_TYPE, TRUE); 2700 return (Z_INSUFFICIENT_SPEC); 2701 } 2702 } 2703 if (fill_in_only) 2704 return (Z_OK); 2705 return (zonecfg_lookup_ds(handle, dstab)); 2706 } 2707 2708 static void 2709 remove_aliased_rctl(int type, char *name) 2710 { 2711 int err; 2712 uint64_t tmp; 2713 2714 if ((err = zonecfg_get_aliased_rctl(handle, name, &tmp)) != Z_OK) { 2715 zerr("%s %s: %s", cmd_to_str(CMD_CLEAR), pt_to_str(type), 2716 zonecfg_strerror(err)); 2717 saw_error = TRUE; 2718 return; 2719 } 2720 if ((err = zonecfg_rm_aliased_rctl(handle, name)) != Z_OK) { 2721 zerr("%s %s: %s", cmd_to_str(CMD_CLEAR), pt_to_str(type), 2722 zonecfg_strerror(err)); 2723 saw_error = TRUE; 2724 } else { 2725 need_to_commit = TRUE; 2726 } 2727 } 2728 2729 static boolean_t 2730 prompt_remove_resource(cmd_t *cmd, char *rsrc) 2731 { 2732 int num; 2733 int answer; 2734 int arg; 2735 boolean_t force = B_FALSE; 2736 char prompt[128]; 2737 bool arg_err = FALSE; 2738 2739 optind = 0; 2740 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "F")) != EOF) { 2741 switch (arg) { 2742 case 'F': 2743 force = B_TRUE; 2744 break; 2745 default: 2746 arg_err = TRUE; 2747 break; 2748 } 2749 } 2750 if (arg_err) 2751 return (B_FALSE); 2752 2753 2754 num = zonecfg_num_resources(handle, rsrc); 2755 2756 if (num == 0) { 2757 z_cmd_rt_perror(CMD_REMOVE, cmd->cmd_res_type, Z_NO_ENTRY, 2758 TRUE); 2759 return (B_FALSE); 2760 } 2761 if (num > 1 && !force) { 2762 if (!interactive_mode) { 2763 zerr(gettext("There are multiple instances of this " 2764 "resource. Either qualify the resource to\n" 2765 "remove a single instance or use the -F option to " 2766 "remove all instances.")); 2767 saw_error = TRUE; 2768 return (B_FALSE); 2769 } 2770 (void) snprintf(prompt, sizeof (prompt), gettext( 2771 "Are you sure you want to remove ALL '%s' resources"), 2772 rsrc); 2773 answer = ask_yesno(FALSE, prompt); 2774 if (answer == -1) { 2775 zerr(gettext("Resource incomplete.")); 2776 return (B_FALSE); 2777 } 2778 if (answer != 1) 2779 return (B_FALSE); 2780 } 2781 return (B_TRUE); 2782 } 2783 2784 static void 2785 remove_fs(cmd_t *cmd) 2786 { 2787 int err; 2788 2789 /* traditional, qualified fs removal */ 2790 if (cmd->cmd_prop_nv_pairs > 0) { 2791 struct zone_fstab fstab; 2792 2793 if ((err = fill_in_fstab(cmd, &fstab, FALSE)) != Z_OK) { 2794 z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, TRUE); 2795 return; 2796 } 2797 if ((err = zonecfg_delete_filesystem(handle, &fstab)) != Z_OK) 2798 z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, TRUE); 2799 else 2800 need_to_commit = TRUE; 2801 zonecfg_free_fs_option_list(fstab.zone_fs_options); 2802 return; 2803 } 2804 2805 /* 2806 * unqualified fs removal. remove all fs's but prompt if more 2807 * than one. 2808 */ 2809 if (!prompt_remove_resource(cmd, "fs")) 2810 return; 2811 2812 if ((err = zonecfg_del_all_resources(handle, "fs")) != Z_OK) 2813 z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, TRUE); 2814 else 2815 need_to_commit = TRUE; 2816 } 2817 2818 static void 2819 remove_ipd(cmd_t *cmd) 2820 { 2821 int err; 2822 2823 if (state_atleast(ZONE_STATE_INSTALLED)) { 2824 zerr(gettext("Zone %s already installed; %s %s not allowed."), 2825 zone, cmd_to_str(CMD_REMOVE), rt_to_str(RT_IPD)); 2826 return; 2827 } 2828 2829 /* traditional, qualified ipd removal */ 2830 if (cmd->cmd_prop_nv_pairs > 0) { 2831 struct zone_fstab fstab; 2832 2833 if ((err = fill_in_ipdtab(cmd, &fstab, FALSE)) != Z_OK) { 2834 z_cmd_rt_perror(CMD_REMOVE, RT_IPD, err, TRUE); 2835 return; 2836 } 2837 if ((err = zonecfg_delete_ipd(handle, &fstab)) != Z_OK) 2838 z_cmd_rt_perror(CMD_REMOVE, RT_IPD, err, TRUE); 2839 else 2840 need_to_commit = TRUE; 2841 return; 2842 } 2843 2844 /* 2845 * unqualified ipd removal. remove all ipds but prompt if more 2846 * than one. 2847 */ 2848 if (!prompt_remove_resource(cmd, "inherit-pkg-dir")) 2849 return; 2850 2851 if ((err = zonecfg_del_all_resources(handle, "inherit-pkg-dir")) 2852 != Z_OK) 2853 z_cmd_rt_perror(CMD_REMOVE, RT_IPD, err, TRUE); 2854 else 2855 need_to_commit = TRUE; 2856 } 2857 2858 static void 2859 remove_net(cmd_t *cmd) 2860 { 2861 int err; 2862 2863 /* traditional, qualified net removal */ 2864 if (cmd->cmd_prop_nv_pairs > 0) { 2865 struct zone_nwiftab nwiftab; 2866 2867 if ((err = fill_in_nwiftab(cmd, &nwiftab, FALSE)) != Z_OK) { 2868 z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, TRUE); 2869 return; 2870 } 2871 if ((err = zonecfg_delete_nwif(handle, &nwiftab)) != Z_OK) 2872 z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, TRUE); 2873 else 2874 need_to_commit = TRUE; 2875 return; 2876 } 2877 2878 /* 2879 * unqualified net removal. remove all nets but prompt if more 2880 * than one. 2881 */ 2882 if (!prompt_remove_resource(cmd, "net")) 2883 return; 2884 2885 if ((err = zonecfg_del_all_resources(handle, "net")) != Z_OK) 2886 z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, TRUE); 2887 else 2888 need_to_commit = TRUE; 2889 } 2890 2891 static void 2892 remove_device(cmd_t *cmd) 2893 { 2894 int err; 2895 2896 /* traditional, qualified device removal */ 2897 if (cmd->cmd_prop_nv_pairs > 0) { 2898 struct zone_devtab devtab; 2899 2900 if ((err = fill_in_devtab(cmd, &devtab, FALSE)) != Z_OK) { 2901 z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, TRUE); 2902 return; 2903 } 2904 if ((err = zonecfg_delete_dev(handle, &devtab)) != Z_OK) 2905 z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, TRUE); 2906 else 2907 need_to_commit = TRUE; 2908 return; 2909 } 2910 2911 /* 2912 * unqualified device removal. remove all devices but prompt if more 2913 * than one. 2914 */ 2915 if (!prompt_remove_resource(cmd, "device")) 2916 return; 2917 2918 if ((err = zonecfg_del_all_resources(handle, "device")) != Z_OK) 2919 z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, TRUE); 2920 else 2921 need_to_commit = TRUE; 2922 } 2923 2924 static void 2925 remove_attr(cmd_t *cmd) 2926 { 2927 int err; 2928 2929 /* traditional, qualified attr removal */ 2930 if (cmd->cmd_prop_nv_pairs > 0) { 2931 struct zone_attrtab attrtab; 2932 2933 if ((err = fill_in_attrtab(cmd, &attrtab, FALSE)) != Z_OK) { 2934 z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, TRUE); 2935 return; 2936 } 2937 if ((err = zonecfg_delete_attr(handle, &attrtab)) != Z_OK) 2938 z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, TRUE); 2939 else 2940 need_to_commit = TRUE; 2941 return; 2942 } 2943 2944 /* 2945 * unqualified attr removal. remove all attrs but prompt if more 2946 * than one. 2947 */ 2948 if (!prompt_remove_resource(cmd, "attr")) 2949 return; 2950 2951 if ((err = zonecfg_del_all_resources(handle, "attr")) != Z_OK) 2952 z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, TRUE); 2953 else 2954 need_to_commit = TRUE; 2955 } 2956 2957 static void 2958 remove_dataset(cmd_t *cmd) 2959 { 2960 int err; 2961 2962 /* traditional, qualified dataset removal */ 2963 if (cmd->cmd_prop_nv_pairs > 0) { 2964 struct zone_dstab dstab; 2965 2966 if ((err = fill_in_dstab(cmd, &dstab, FALSE)) != Z_OK) { 2967 z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, TRUE); 2968 return; 2969 } 2970 if ((err = zonecfg_delete_ds(handle, &dstab)) != Z_OK) 2971 z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, TRUE); 2972 else 2973 need_to_commit = TRUE; 2974 return; 2975 } 2976 2977 /* 2978 * unqualified dataset removal. remove all datasets but prompt if more 2979 * than one. 2980 */ 2981 if (!prompt_remove_resource(cmd, "dataset")) 2982 return; 2983 2984 if ((err = zonecfg_del_all_resources(handle, "dataset")) != Z_OK) 2985 z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, TRUE); 2986 else 2987 need_to_commit = TRUE; 2988 } 2989 2990 static void 2991 remove_rctl(cmd_t *cmd) 2992 { 2993 int err; 2994 2995 /* traditional, qualified rctl removal */ 2996 if (cmd->cmd_prop_nv_pairs > 0) { 2997 struct zone_rctltab rctltab; 2998 2999 if ((err = fill_in_rctltab(cmd, &rctltab, FALSE)) != Z_OK) { 3000 z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, TRUE); 3001 return; 3002 } 3003 if ((err = zonecfg_delete_rctl(handle, &rctltab)) != Z_OK) 3004 z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, TRUE); 3005 else 3006 need_to_commit = TRUE; 3007 zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr); 3008 return; 3009 } 3010 3011 /* 3012 * unqualified rctl removal. remove all rctls but prompt if more 3013 * than one. 3014 */ 3015 if (!prompt_remove_resource(cmd, "rctl")) 3016 return; 3017 3018 if ((err = zonecfg_del_all_resources(handle, "rctl")) != Z_OK) 3019 z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, TRUE); 3020 else 3021 need_to_commit = TRUE; 3022 } 3023 3024 static void 3025 remove_pset() 3026 { 3027 int err; 3028 struct zone_psettab psettab; 3029 3030 if ((err = zonecfg_lookup_pset(handle, &psettab)) != Z_OK) { 3031 z_cmd_rt_perror(CMD_REMOVE, RT_DCPU, err, TRUE); 3032 return; 3033 } 3034 if ((err = zonecfg_delete_pset(handle)) != Z_OK) 3035 z_cmd_rt_perror(CMD_REMOVE, RT_DCPU, err, TRUE); 3036 else 3037 need_to_commit = TRUE; 3038 } 3039 3040 static void 3041 remove_pcap() 3042 { 3043 int err; 3044 uint64_t tmp; 3045 3046 if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp) != Z_OK) { 3047 zerr("%s %s: %s", cmd_to_str(CMD_REMOVE), rt_to_str(RT_PCAP), 3048 zonecfg_strerror(Z_NO_RESOURCE_TYPE)); 3049 saw_error = TRUE; 3050 return; 3051 } 3052 3053 if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_CPUCAP)) != Z_OK) 3054 z_cmd_rt_perror(CMD_REMOVE, RT_PCAP, err, TRUE); 3055 else 3056 need_to_commit = TRUE; 3057 } 3058 3059 static void 3060 remove_mcap() 3061 { 3062 int err, res1, res2, res3; 3063 uint64_t tmp; 3064 struct zone_mcaptab mcaptab; 3065 boolean_t revert = B_FALSE; 3066 3067 res1 = zonecfg_lookup_mcap(handle, &mcaptab); 3068 res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &tmp); 3069 res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, &tmp); 3070 3071 /* if none of these exist, there is no resource to remove */ 3072 if (res1 != Z_OK && res2 != Z_OK && res3 != Z_OK) { 3073 zerr("%s %s: %s", cmd_to_str(CMD_REMOVE), rt_to_str(RT_MCAP), 3074 zonecfg_strerror(Z_NO_RESOURCE_TYPE)); 3075 saw_error = TRUE; 3076 return; 3077 } 3078 if (res1 == Z_OK) { 3079 if ((err = zonecfg_delete_mcap(handle)) != Z_OK) { 3080 z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, TRUE); 3081 revert = B_TRUE; 3082 } else { 3083 need_to_commit = TRUE; 3084 } 3085 } 3086 if (res2 == Z_OK) { 3087 if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_MAXSWAP)) 3088 != Z_OK) { 3089 z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, TRUE); 3090 revert = B_TRUE; 3091 } else { 3092 need_to_commit = TRUE; 3093 } 3094 } 3095 if (res3 == Z_OK) { 3096 if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM)) 3097 != Z_OK) { 3098 z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, TRUE); 3099 revert = B_TRUE; 3100 } else { 3101 need_to_commit = TRUE; 3102 } 3103 } 3104 3105 if (revert) 3106 need_to_commit = FALSE; 3107 } 3108 3109 static void 3110 remove_resource(cmd_t *cmd) 3111 { 3112 int type; 3113 int arg; 3114 bool arg_err = FALSE; 3115 3116 if ((type = cmd->cmd_res_type) == RT_UNKNOWN) { 3117 long_usage(CMD_REMOVE, TRUE); 3118 return; 3119 } 3120 3121 optind = 0; 3122 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) { 3123 switch (arg) { 3124 case '?': 3125 longer_usage(CMD_REMOVE); 3126 arg_err = TRUE; 3127 break; 3128 case 'F': 3129 break; 3130 default: 3131 short_usage(CMD_REMOVE); 3132 arg_err = TRUE; 3133 break; 3134 } 3135 } 3136 if (arg_err) 3137 return; 3138 3139 if (initialize(TRUE) != Z_OK) 3140 return; 3141 3142 switch (type) { 3143 case RT_FS: 3144 remove_fs(cmd); 3145 return; 3146 case RT_IPD: 3147 remove_ipd(cmd); 3148 return; 3149 case RT_NET: 3150 remove_net(cmd); 3151 return; 3152 case RT_DEVICE: 3153 remove_device(cmd); 3154 return; 3155 case RT_RCTL: 3156 remove_rctl(cmd); 3157 return; 3158 case RT_ATTR: 3159 remove_attr(cmd); 3160 return; 3161 case RT_DATASET: 3162 remove_dataset(cmd); 3163 return; 3164 case RT_DCPU: 3165 remove_pset(); 3166 return; 3167 case RT_PCAP: 3168 remove_pcap(); 3169 return; 3170 case RT_MCAP: 3171 remove_mcap(); 3172 return; 3173 default: 3174 zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, TRUE); 3175 long_usage(CMD_REMOVE, TRUE); 3176 usage(FALSE, HELP_RESOURCES); 3177 return; 3178 } 3179 } 3180 3181 static void 3182 remove_property(cmd_t *cmd) 3183 { 3184 char *prop_id; 3185 int err, res_type, prop_type; 3186 property_value_ptr_t pp; 3187 struct zone_rctlvaltab *rctlvaltab; 3188 complex_property_ptr_t cx; 3189 3190 res_type = resource_scope; 3191 prop_type = cmd->cmd_prop_name[0]; 3192 if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) { 3193 long_usage(CMD_REMOVE, TRUE); 3194 return; 3195 } 3196 3197 if (cmd->cmd_prop_nv_pairs != 1) { 3198 long_usage(CMD_ADD, TRUE); 3199 return; 3200 } 3201 3202 if (initialize(TRUE) != Z_OK) 3203 return; 3204 3205 switch (res_type) { 3206 case RT_FS: 3207 if (prop_type != PT_OPTIONS) { 3208 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 3209 TRUE); 3210 long_usage(CMD_REMOVE, TRUE); 3211 usage(FALSE, HELP_PROPS); 3212 return; 3213 } 3214 pp = cmd->cmd_property_ptr[0]; 3215 if (pp->pv_type == PROP_VAL_COMPLEX) { 3216 zerr(gettext("A %s or %s value was expected here."), 3217 pvt_to_str(PROP_VAL_SIMPLE), 3218 pvt_to_str(PROP_VAL_LIST)); 3219 saw_error = TRUE; 3220 return; 3221 } 3222 if (pp->pv_type == PROP_VAL_SIMPLE) { 3223 if (pp->pv_simple == NULL) { 3224 long_usage(CMD_ADD, TRUE); 3225 return; 3226 } 3227 prop_id = pp->pv_simple; 3228 err = zonecfg_remove_fs_option(&in_progress_fstab, 3229 prop_id); 3230 if (err != Z_OK) 3231 zone_perror(pt_to_str(prop_type), err, TRUE); 3232 } else { 3233 list_property_ptr_t list; 3234 3235 for (list = pp->pv_list; list != NULL; 3236 list = list->lp_next) { 3237 prop_id = list->lp_simple; 3238 if (prop_id == NULL) 3239 break; 3240 err = zonecfg_remove_fs_option( 3241 &in_progress_fstab, prop_id); 3242 if (err != Z_OK) 3243 zone_perror(pt_to_str(prop_type), err, 3244 TRUE); 3245 } 3246 } 3247 return; 3248 case RT_RCTL: 3249 if (prop_type != PT_VALUE) { 3250 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 3251 TRUE); 3252 long_usage(CMD_REMOVE, TRUE); 3253 usage(FALSE, HELP_PROPS); 3254 return; 3255 } 3256 pp = cmd->cmd_property_ptr[0]; 3257 if (pp->pv_type != PROP_VAL_COMPLEX) { 3258 zerr(gettext("A %s value was expected here."), 3259 pvt_to_str(PROP_VAL_COMPLEX)); 3260 saw_error = TRUE; 3261 return; 3262 } 3263 if ((rctlvaltab = alloc_rctlvaltab()) == NULL) { 3264 zone_perror(zone, Z_NOMEM, TRUE); 3265 exit(Z_ERR); 3266 } 3267 for (cx = pp->pv_complex; cx != NULL; cx = cx->cp_next) { 3268 switch (cx->cp_type) { 3269 case PT_PRIV: 3270 (void) strlcpy(rctlvaltab->zone_rctlval_priv, 3271 cx->cp_value, 3272 sizeof (rctlvaltab->zone_rctlval_priv)); 3273 break; 3274 case PT_LIMIT: 3275 (void) strlcpy(rctlvaltab->zone_rctlval_limit, 3276 cx->cp_value, 3277 sizeof (rctlvaltab->zone_rctlval_limit)); 3278 break; 3279 case PT_ACTION: 3280 (void) strlcpy(rctlvaltab->zone_rctlval_action, 3281 cx->cp_value, 3282 sizeof (rctlvaltab->zone_rctlval_action)); 3283 break; 3284 default: 3285 zone_perror(pt_to_str(prop_type), 3286 Z_NO_PROPERTY_TYPE, TRUE); 3287 long_usage(CMD_ADD, TRUE); 3288 usage(FALSE, HELP_PROPS); 3289 zonecfg_free_rctl_value_list(rctlvaltab); 3290 return; 3291 } 3292 } 3293 rctlvaltab->zone_rctlval_next = NULL; 3294 err = zonecfg_remove_rctl_value(&in_progress_rctltab, 3295 rctlvaltab); 3296 if (err != Z_OK) 3297 zone_perror(pt_to_str(prop_type), err, TRUE); 3298 zonecfg_free_rctl_value_list(rctlvaltab); 3299 return; 3300 default: 3301 zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, TRUE); 3302 long_usage(CMD_REMOVE, TRUE); 3303 usage(FALSE, HELP_RESOURCES); 3304 return; 3305 } 3306 } 3307 3308 void 3309 remove_func(cmd_t *cmd) 3310 { 3311 if (zone_is_read_only(CMD_REMOVE)) 3312 return; 3313 3314 assert(cmd != NULL); 3315 3316 if (global_scope) { 3317 if (gz_invalid_resource(cmd->cmd_res_type)) { 3318 zerr(gettext("%s is not a valid resource for the " 3319 "global zone."), rt_to_str(cmd->cmd_res_type)); 3320 saw_error = TRUE; 3321 return; 3322 } 3323 remove_resource(cmd); 3324 } else { 3325 remove_property(cmd); 3326 } 3327 } 3328 3329 static void 3330 clear_property(cmd_t *cmd) 3331 { 3332 int res_type, prop_type; 3333 3334 res_type = resource_scope; 3335 prop_type = cmd->cmd_res_type; 3336 if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) { 3337 long_usage(CMD_CLEAR, TRUE); 3338 return; 3339 } 3340 3341 if (initialize(TRUE) != Z_OK) 3342 return; 3343 3344 switch (res_type) { 3345 case RT_FS: 3346 if (prop_type == PT_RAW) { 3347 in_progress_fstab.zone_fs_raw[0] = '\0'; 3348 need_to_commit = TRUE; 3349 return; 3350 } 3351 break; 3352 case RT_DCPU: 3353 if (prop_type == PT_IMPORTANCE) { 3354 in_progress_psettab.zone_importance[0] = '\0'; 3355 need_to_commit = TRUE; 3356 return; 3357 } 3358 break; 3359 case RT_MCAP: 3360 switch (prop_type) { 3361 case PT_PHYSICAL: 3362 in_progress_mcaptab.zone_physmem_cap[0] = '\0'; 3363 need_to_commit = TRUE; 3364 return; 3365 case PT_SWAP: 3366 remove_aliased_rctl(PT_SWAP, ALIAS_MAXSWAP); 3367 return; 3368 case PT_LOCKED: 3369 remove_aliased_rctl(PT_LOCKED, ALIAS_MAXLOCKEDMEM); 3370 return; 3371 } 3372 break; 3373 default: 3374 break; 3375 } 3376 3377 zone_perror(pt_to_str(prop_type), Z_CLEAR_DISALLOW, TRUE); 3378 } 3379 3380 static void 3381 clear_global(cmd_t *cmd) 3382 { 3383 int err, type; 3384 3385 if ((type = cmd->cmd_res_type) == RT_UNKNOWN) { 3386 long_usage(CMD_CLEAR, TRUE); 3387 return; 3388 } 3389 3390 if (initialize(TRUE) != Z_OK) 3391 return; 3392 3393 switch (type) { 3394 case PT_ZONENAME: 3395 /* FALLTHRU */ 3396 case PT_ZONEPATH: 3397 /* FALLTHRU */ 3398 case PT_BRAND: 3399 zone_perror(pt_to_str(type), Z_CLEAR_DISALLOW, TRUE); 3400 return; 3401 case PT_AUTOBOOT: 3402 /* false is default; we'll treat as equivalent to clearing */ 3403 if ((err = zonecfg_set_autoboot(handle, B_FALSE)) != Z_OK) 3404 z_cmd_rt_perror(CMD_CLEAR, RT_AUTOBOOT, err, TRUE); 3405 else 3406 need_to_commit = TRUE; 3407 return; 3408 case PT_POOL: 3409 if ((err = zonecfg_set_pool(handle, NULL)) != Z_OK) 3410 z_cmd_rt_perror(CMD_CLEAR, RT_POOL, err, TRUE); 3411 else 3412 need_to_commit = TRUE; 3413 return; 3414 case PT_LIMITPRIV: 3415 if ((err = zonecfg_set_limitpriv(handle, NULL)) != Z_OK) 3416 z_cmd_rt_perror(CMD_CLEAR, RT_LIMITPRIV, err, TRUE); 3417 else 3418 need_to_commit = TRUE; 3419 return; 3420 case PT_BOOTARGS: 3421 if ((err = zonecfg_set_bootargs(handle, NULL)) != Z_OK) 3422 z_cmd_rt_perror(CMD_CLEAR, RT_BOOTARGS, err, TRUE); 3423 else 3424 need_to_commit = TRUE; 3425 return; 3426 case PT_SCHED: 3427 if ((err = zonecfg_set_sched(handle, NULL)) != Z_OK) 3428 z_cmd_rt_perror(CMD_CLEAR, RT_SCHED, err, TRUE); 3429 else 3430 need_to_commit = TRUE; 3431 return; 3432 case PT_IPTYPE: 3433 /* shared is default; we'll treat as equivalent to clearing */ 3434 if ((err = zonecfg_set_iptype(handle, ZS_SHARED)) != Z_OK) 3435 z_cmd_rt_perror(CMD_CLEAR, RT_IPTYPE, err, TRUE); 3436 else 3437 need_to_commit = TRUE; 3438 return; 3439 case PT_MAXLWPS: 3440 remove_aliased_rctl(PT_MAXLWPS, ALIAS_MAXLWPS); 3441 return; 3442 case PT_MAXSHMMEM: 3443 remove_aliased_rctl(PT_MAXSHMMEM, ALIAS_MAXSHMMEM); 3444 return; 3445 case PT_MAXSHMIDS: 3446 remove_aliased_rctl(PT_MAXSHMIDS, ALIAS_MAXSHMIDS); 3447 return; 3448 case PT_MAXMSGIDS: 3449 remove_aliased_rctl(PT_MAXMSGIDS, ALIAS_MAXMSGIDS); 3450 return; 3451 case PT_MAXSEMIDS: 3452 remove_aliased_rctl(PT_MAXSEMIDS, ALIAS_MAXSEMIDS); 3453 return; 3454 case PT_SHARES: 3455 remove_aliased_rctl(PT_SHARES, ALIAS_SHARES); 3456 return; 3457 default: 3458 zone_perror(pt_to_str(type), Z_NO_PROPERTY_TYPE, TRUE); 3459 long_usage(CMD_CLEAR, TRUE); 3460 usage(FALSE, HELP_PROPS); 3461 return; 3462 } 3463 } 3464 3465 void 3466 clear_func(cmd_t *cmd) 3467 { 3468 if (zone_is_read_only(CMD_CLEAR)) 3469 return; 3470 3471 assert(cmd != NULL); 3472 3473 if (global_scope) { 3474 if (gz_invalid_property(cmd->cmd_res_type)) { 3475 zerr(gettext("%s is not a valid property for the " 3476 "global zone."), pt_to_str(cmd->cmd_res_type)); 3477 saw_error = TRUE; 3478 return; 3479 } 3480 3481 clear_global(cmd); 3482 } else { 3483 clear_property(cmd); 3484 } 3485 } 3486 3487 void 3488 select_func(cmd_t *cmd) 3489 { 3490 int type, err, res; 3491 uint64_t limit; 3492 uint64_t tmp; 3493 3494 if (zone_is_read_only(CMD_SELECT)) 3495 return; 3496 3497 assert(cmd != NULL); 3498 3499 if (global_scope) { 3500 global_scope = FALSE; 3501 resource_scope = cmd->cmd_res_type; 3502 end_op = CMD_SELECT; 3503 } else { 3504 scope_usage(CMD_SELECT); 3505 return; 3506 } 3507 3508 if ((type = cmd->cmd_res_type) == RT_UNKNOWN) { 3509 long_usage(CMD_SELECT, TRUE); 3510 return; 3511 } 3512 3513 if (initialize(TRUE) != Z_OK) 3514 return; 3515 3516 switch (type) { 3517 case RT_FS: 3518 if ((err = fill_in_fstab(cmd, &old_fstab, FALSE)) != Z_OK) { 3519 z_cmd_rt_perror(CMD_SELECT, RT_FS, err, TRUE); 3520 global_scope = TRUE; 3521 } 3522 bcopy(&old_fstab, &in_progress_fstab, 3523 sizeof (struct zone_fstab)); 3524 return; 3525 case RT_IPD: 3526 if (state_atleast(ZONE_STATE_INCOMPLETE)) { 3527 zerr(gettext("Zone %s not in %s state; %s %s not " 3528 "allowed."), zone, 3529 zone_state_str(ZONE_STATE_CONFIGURED), 3530 cmd_to_str(CMD_SELECT), rt_to_str(RT_IPD)); 3531 global_scope = TRUE; 3532 end_op = -1; 3533 return; 3534 } 3535 if ((err = fill_in_ipdtab(cmd, &old_ipdtab, FALSE)) != Z_OK) { 3536 z_cmd_rt_perror(CMD_SELECT, RT_IPD, err, TRUE); 3537 global_scope = TRUE; 3538 } 3539 bcopy(&old_ipdtab, &in_progress_ipdtab, 3540 sizeof (struct zone_fstab)); 3541 return; 3542 case RT_NET: 3543 if ((err = fill_in_nwiftab(cmd, &old_nwiftab, FALSE)) != Z_OK) { 3544 z_cmd_rt_perror(CMD_SELECT, RT_NET, err, TRUE); 3545 global_scope = TRUE; 3546 } 3547 bcopy(&old_nwiftab, &in_progress_nwiftab, 3548 sizeof (struct zone_nwiftab)); 3549 return; 3550 case RT_DEVICE: 3551 if ((err = fill_in_devtab(cmd, &old_devtab, FALSE)) != Z_OK) { 3552 z_cmd_rt_perror(CMD_SELECT, RT_DEVICE, err, TRUE); 3553 global_scope = TRUE; 3554 } 3555 bcopy(&old_devtab, &in_progress_devtab, 3556 sizeof (struct zone_devtab)); 3557 return; 3558 case RT_RCTL: 3559 if ((err = fill_in_rctltab(cmd, &old_rctltab, FALSE)) != Z_OK) { 3560 z_cmd_rt_perror(CMD_SELECT, RT_RCTL, err, TRUE); 3561 global_scope = TRUE; 3562 } 3563 bcopy(&old_rctltab, &in_progress_rctltab, 3564 sizeof (struct zone_rctltab)); 3565 return; 3566 case RT_ATTR: 3567 if ((err = fill_in_attrtab(cmd, &old_attrtab, FALSE)) != Z_OK) { 3568 z_cmd_rt_perror(CMD_SELECT, RT_ATTR, err, TRUE); 3569 global_scope = TRUE; 3570 } 3571 bcopy(&old_attrtab, &in_progress_attrtab, 3572 sizeof (struct zone_attrtab)); 3573 return; 3574 case RT_DATASET: 3575 if ((err = fill_in_dstab(cmd, &old_dstab, FALSE)) != Z_OK) { 3576 z_cmd_rt_perror(CMD_SELECT, RT_DATASET, err, TRUE); 3577 global_scope = TRUE; 3578 } 3579 bcopy(&old_dstab, &in_progress_dstab, 3580 sizeof (struct zone_dstab)); 3581 return; 3582 case RT_DCPU: 3583 if ((err = zonecfg_lookup_pset(handle, &old_psettab)) != Z_OK) { 3584 z_cmd_rt_perror(CMD_SELECT, RT_DCPU, err, TRUE); 3585 global_scope = TRUE; 3586 } 3587 bcopy(&old_psettab, &in_progress_psettab, 3588 sizeof (struct zone_psettab)); 3589 return; 3590 case RT_PCAP: 3591 if ((err = zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp)) 3592 != Z_OK) { 3593 z_cmd_rt_perror(CMD_SELECT, RT_PCAP, err, TRUE); 3594 global_scope = TRUE; 3595 } 3596 return; 3597 case RT_MCAP: 3598 /* if none of these exist, there is no resource to select */ 3599 if ((res = zonecfg_lookup_mcap(handle, &old_mcaptab)) != Z_OK && 3600 zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &limit) 3601 != Z_OK && 3602 zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, &limit) 3603 != Z_OK) { 3604 z_cmd_rt_perror(CMD_SELECT, RT_MCAP, Z_NO_RESOURCE_TYPE, 3605 TRUE); 3606 global_scope = TRUE; 3607 } 3608 if (res == Z_OK) 3609 bcopy(&old_mcaptab, &in_progress_mcaptab, 3610 sizeof (struct zone_mcaptab)); 3611 else 3612 bzero(&in_progress_mcaptab, 3613 sizeof (in_progress_mcaptab)); 3614 return; 3615 default: 3616 zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, TRUE); 3617 long_usage(CMD_SELECT, TRUE); 3618 usage(FALSE, HELP_RESOURCES); 3619 return; 3620 } 3621 } 3622 3623 /* 3624 * Network "addresses" can be one of the following forms: 3625 * <IPv4 address> 3626 * <IPv4 address>/<prefix length> 3627 * <IPv6 address>/<prefix length> 3628 * <host name> 3629 * <host name>/<prefix length> 3630 * In other words, the "/" followed by a prefix length is allowed but not 3631 * required for IPv4 addresses and host names, and required for IPv6 addresses. 3632 * If a prefix length is given, it must be in the allowable range: 0 to 32 for 3633 * IPv4 addresses and host names, 0 to 128 for IPv6 addresses. 3634 * Host names must start with an alpha-numeric character, and all subsequent 3635 * characters must be either alpha-numeric or "-". 3636 */ 3637 3638 static int 3639 validate_net_address_syntax(char *address) 3640 { 3641 char *slashp, part1[MAXHOSTNAMELEN]; 3642 struct in6_addr in6; 3643 struct in_addr in4; 3644 int prefixlen, i; 3645 3646 /* 3647 * Copy the part before any '/' into part1 or copy the whole 3648 * thing if there is no '/'. 3649 */ 3650 if ((slashp = strchr(address, '/')) != NULL) { 3651 *slashp = '\0'; 3652 (void) strlcpy(part1, address, sizeof (part1)); 3653 *slashp = '/'; 3654 prefixlen = atoi(++slashp); 3655 } else { 3656 (void) strlcpy(part1, address, sizeof (part1)); 3657 } 3658 3659 if (inet_pton(AF_INET6, part1, &in6) == 1) { 3660 if (slashp == NULL) { 3661 zerr(gettext("%s: IPv6 addresses " 3662 "require /prefix-length suffix."), address); 3663 return (Z_ERR); 3664 } 3665 if (prefixlen < 0 || prefixlen > 128) { 3666 zerr(gettext("%s: IPv6 address " 3667 "prefix lengths must be 0 - 128."), address); 3668 return (Z_ERR); 3669 } 3670 return (Z_OK); 3671 } 3672 3673 /* At this point, any /prefix must be for IPv4. */ 3674 if (slashp != NULL) { 3675 if (prefixlen < 0 || prefixlen > 32) { 3676 zerr(gettext("%s: IPv4 address " 3677 "prefix lengths must be 0 - 32."), address); 3678 return (Z_ERR); 3679 } 3680 } 3681 if (inet_pton(AF_INET, part1, &in4) == 1) 3682 return (Z_OK); 3683 3684 /* address may also be a host name */ 3685 if (!isalnum(part1[0])) { 3686 zerr(gettext("%s: bogus host name or network address syntax"), 3687 part1); 3688 saw_error = TRUE; 3689 usage(FALSE, HELP_NETADDR); 3690 return (Z_ERR); 3691 } 3692 for (i = 1; part1[i]; i++) 3693 if (!isalnum(part1[i]) && part1[i] != '-' && part1[i] != '.') { 3694 zerr(gettext("%s: bogus host name or " 3695 "network address syntax"), part1); 3696 saw_error = TRUE; 3697 usage(FALSE, HELP_NETADDR); 3698 return (Z_ERR); 3699 } 3700 return (Z_OK); 3701 } 3702 3703 static int 3704 validate_net_physical_syntax(char *ifname) 3705 { 3706 if (strchr(ifname, ':') == NULL) 3707 return (Z_OK); 3708 zerr(gettext("%s: physical interface name required; " 3709 "logical interface name not allowed"), ifname); 3710 return (Z_ERR); 3711 } 3712 3713 static boolean_t 3714 valid_fs_type(const char *type) 3715 { 3716 /* 3717 * Is this a valid path component? 3718 */ 3719 if (strlen(type) + 1 > MAXNAMELEN) 3720 return (B_FALSE); 3721 /* 3722 * Make sure a bad value for "type" doesn't make 3723 * /usr/lib/fs/<type>/mount turn into something else. 3724 */ 3725 if (strchr(type, '/') != NULL || type[0] == '\0' || 3726 strcmp(type, ".") == 0 || strcmp(type, "..") == 0) 3727 return (B_FALSE); 3728 /* 3729 * More detailed verification happens later by zoneadm(1m). 3730 */ 3731 return (B_TRUE); 3732 } 3733 3734 static boolean_t 3735 allow_exclusive() 3736 { 3737 brand_handle_t bh; 3738 char brand[MAXNAMELEN]; 3739 boolean_t ret; 3740 3741 if (zonecfg_get_brand(handle, brand, sizeof (brand)) != Z_OK) { 3742 zerr("%s: %s\n", zone, gettext("could not get zone brand")); 3743 return (B_FALSE); 3744 } 3745 if ((bh = brand_open(brand)) == NULL) { 3746 zerr("%s: %s\n", zone, gettext("unknown brand.")); 3747 return (B_FALSE); 3748 } 3749 ret = brand_allow_exclusive_ip(bh); 3750 brand_close(bh); 3751 if (!ret) 3752 zerr(gettext("%s cannot be '%s' when %s is '%s'."), 3753 pt_to_str(PT_IPTYPE), "exclusive", 3754 pt_to_str(PT_BRAND), brand); 3755 return (ret); 3756 } 3757 3758 static void 3759 set_aliased_rctl(char *alias, int prop_type, char *s) 3760 { 3761 uint64_t limit; 3762 int err; 3763 char tmp[128]; 3764 3765 if (global_zone && strcmp(alias, ALIAS_SHARES) != 0) 3766 zerr(gettext("WARNING: Setting a global zone resource " 3767 "control too low could deny\nservice " 3768 "to even the root user; " 3769 "this could render the system impossible\n" 3770 "to administer. Please use caution.")); 3771 3772 /* convert memory based properties */ 3773 if (prop_type == PT_MAXSHMMEM) { 3774 if (!zonecfg_valid_memlimit(s, &limit)) { 3775 zerr(gettext("A non-negative number with a required " 3776 "scale suffix (K, M, G or T) was expected\nhere.")); 3777 saw_error = TRUE; 3778 return; 3779 } 3780 3781 (void) snprintf(tmp, sizeof (tmp), "%llu", limit); 3782 s = tmp; 3783 } 3784 3785 if (!zonecfg_aliased_rctl_ok(handle, alias)) { 3786 zone_perror(pt_to_str(prop_type), Z_ALIAS_DISALLOW, FALSE); 3787 saw_error = TRUE; 3788 } else if (!zonecfg_valid_alias_limit(alias, s, &limit)) { 3789 zerr(gettext("%s property is out of range."), 3790 pt_to_str(prop_type)); 3791 saw_error = TRUE; 3792 } else if ((err = zonecfg_set_aliased_rctl(handle, alias, limit)) 3793 != Z_OK) { 3794 zone_perror(zone, err, TRUE); 3795 saw_error = TRUE; 3796 } else { 3797 need_to_commit = TRUE; 3798 } 3799 } 3800 3801 void 3802 set_func(cmd_t *cmd) 3803 { 3804 char *prop_id; 3805 int arg, err, res_type, prop_type; 3806 property_value_ptr_t pp; 3807 boolean_t autoboot; 3808 zone_iptype_t iptype; 3809 boolean_t force_set = FALSE; 3810 size_t physmem_size = sizeof (in_progress_mcaptab.zone_physmem_cap); 3811 uint64_t mem_cap, mem_limit; 3812 float cap; 3813 char *unitp; 3814 struct zone_psettab tmp_psettab; 3815 bool arg_err = FALSE; 3816 3817 if (zone_is_read_only(CMD_SET)) 3818 return; 3819 3820 assert(cmd != NULL); 3821 3822 optind = opterr = 0; 3823 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "F")) != EOF) { 3824 switch (arg) { 3825 case 'F': 3826 force_set = TRUE; 3827 break; 3828 default: 3829 if (optopt == '?') 3830 longer_usage(CMD_SET); 3831 else 3832 short_usage(CMD_SET); 3833 arg_err = TRUE; 3834 break; 3835 } 3836 } 3837 if (arg_err) 3838 return; 3839 3840 prop_type = cmd->cmd_prop_name[0]; 3841 if (global_scope) { 3842 if (gz_invalid_property(prop_type)) { 3843 zerr(gettext("%s is not a valid property for the " 3844 "global zone."), pt_to_str(prop_type)); 3845 saw_error = TRUE; 3846 return; 3847 } 3848 3849 if (prop_type == PT_ZONENAME) { 3850 res_type = RT_ZONENAME; 3851 } else if (prop_type == PT_ZONEPATH) { 3852 res_type = RT_ZONEPATH; 3853 } else if (prop_type == PT_AUTOBOOT) { 3854 res_type = RT_AUTOBOOT; 3855 } else if (prop_type == PT_BRAND) { 3856 res_type = RT_BRAND; 3857 } else if (prop_type == PT_POOL) { 3858 res_type = RT_POOL; 3859 } else if (prop_type == PT_LIMITPRIV) { 3860 res_type = RT_LIMITPRIV; 3861 } else if (prop_type == PT_BOOTARGS) { 3862 res_type = RT_BOOTARGS; 3863 } else if (prop_type == PT_SCHED) { 3864 res_type = RT_SCHED; 3865 } else if (prop_type == PT_IPTYPE) { 3866 res_type = RT_IPTYPE; 3867 } else if (prop_type == PT_MAXLWPS) { 3868 res_type = RT_MAXLWPS; 3869 } else if (prop_type == PT_MAXSHMMEM) { 3870 res_type = RT_MAXSHMMEM; 3871 } else if (prop_type == PT_MAXSHMIDS) { 3872 res_type = RT_MAXSHMIDS; 3873 } else if (prop_type == PT_MAXMSGIDS) { 3874 res_type = RT_MAXMSGIDS; 3875 } else if (prop_type == PT_MAXSEMIDS) { 3876 res_type = RT_MAXSEMIDS; 3877 } else if (prop_type == PT_SHARES) { 3878 res_type = RT_SHARES; 3879 } else { 3880 zerr(gettext("Cannot set a resource-specific property " 3881 "from the global scope.")); 3882 saw_error = TRUE; 3883 return; 3884 } 3885 } else { 3886 res_type = resource_scope; 3887 } 3888 3889 if (force_set) { 3890 if (res_type != RT_ZONEPATH) { 3891 zerr(gettext("Only zonepath setting can be forced.")); 3892 saw_error = TRUE; 3893 return; 3894 } 3895 if (!zonecfg_in_alt_root()) { 3896 zerr(gettext("Zonepath is changeable only in an " 3897 "alternate root.")); 3898 saw_error = TRUE; 3899 return; 3900 } 3901 } 3902 3903 pp = cmd->cmd_property_ptr[0]; 3904 /* 3905 * A nasty expression but not that complicated: 3906 * 1. fs options are simple or list (tested below) 3907 * 2. rctl value's are complex or list (tested below) 3908 * Anything else should be simple. 3909 */ 3910 if (!(res_type == RT_FS && prop_type == PT_OPTIONS) && 3911 !(res_type == RT_RCTL && prop_type == PT_VALUE) && 3912 (pp->pv_type != PROP_VAL_SIMPLE || 3913 (prop_id = pp->pv_simple) == NULL)) { 3914 zerr(gettext("A %s value was expected here."), 3915 pvt_to_str(PROP_VAL_SIMPLE)); 3916 saw_error = TRUE; 3917 return; 3918 } 3919 if (prop_type == PT_UNKNOWN) { 3920 long_usage(CMD_SET, TRUE); 3921 return; 3922 } 3923 3924 /* 3925 * Special case: the user can change the zone name prior to 'create'; 3926 * if the zone already exists, we fall through letting initialize() 3927 * and the rest of the logic run. 3928 */ 3929 if (res_type == RT_ZONENAME && got_handle == FALSE && 3930 !state_atleast(ZONE_STATE_CONFIGURED)) { 3931 if ((err = zonecfg_validate_zonename(prop_id)) != Z_OK) { 3932 zone_perror(prop_id, err, TRUE); 3933 usage(FALSE, HELP_SYNTAX); 3934 return; 3935 } 3936 (void) strlcpy(zone, prop_id, sizeof (zone)); 3937 return; 3938 } 3939 3940 if (initialize(TRUE) != Z_OK) 3941 return; 3942 3943 switch (res_type) { 3944 case RT_ZONENAME: 3945 if ((err = zonecfg_set_name(handle, prop_id)) != Z_OK) { 3946 /* 3947 * Use prop_id instead of 'zone' here, since we're 3948 * reporting a problem about the *new* zonename. 3949 */ 3950 zone_perror(prop_id, err, TRUE); 3951 usage(FALSE, HELP_SYNTAX); 3952 } else { 3953 need_to_commit = TRUE; 3954 (void) strlcpy(zone, prop_id, sizeof (zone)); 3955 } 3956 return; 3957 case RT_ZONEPATH: 3958 if (!force_set && state_atleast(ZONE_STATE_INSTALLED)) { 3959 zerr(gettext("Zone %s already installed; %s %s not " 3960 "allowed."), zone, cmd_to_str(CMD_SET), 3961 rt_to_str(RT_ZONEPATH)); 3962 return; 3963 } 3964 if (validate_zonepath_syntax(prop_id) != Z_OK) { 3965 saw_error = TRUE; 3966 return; 3967 } 3968 if ((err = zonecfg_set_zonepath(handle, prop_id)) != Z_OK) 3969 zone_perror(zone, err, TRUE); 3970 else 3971 need_to_commit = TRUE; 3972 return; 3973 case RT_BRAND: 3974 if (state_atleast(ZONE_STATE_INSTALLED)) { 3975 zerr(gettext("Zone %s already installed; %s %s not " 3976 "allowed."), zone, cmd_to_str(CMD_SET), 3977 rt_to_str(RT_BRAND)); 3978 return; 3979 } 3980 if ((err = zonecfg_set_brand(handle, prop_id)) != Z_OK) 3981 zone_perror(zone, err, TRUE); 3982 else 3983 need_to_commit = TRUE; 3984 return; 3985 case RT_AUTOBOOT: 3986 if (strcmp(prop_id, "true") == 0) { 3987 autoboot = B_TRUE; 3988 } else if (strcmp(prop_id, "false") == 0) { 3989 autoboot = B_FALSE; 3990 } else { 3991 zerr(gettext("%s value must be '%s' or '%s'."), 3992 pt_to_str(PT_AUTOBOOT), "true", "false"); 3993 saw_error = TRUE; 3994 return; 3995 } 3996 if ((err = zonecfg_set_autoboot(handle, autoboot)) != Z_OK) 3997 zone_perror(zone, err, TRUE); 3998 else 3999 need_to_commit = TRUE; 4000 return; 4001 case RT_POOL: 4002 /* don't allow use of the reserved temporary pool names */ 4003 if (strncmp("SUNW", prop_id, 4) == 0) { 4004 zerr(gettext("pool names starting with SUNW are " 4005 "reserved.")); 4006 saw_error = TRUE; 4007 return; 4008 } 4009 4010 /* can't set pool if dedicated-cpu exists */ 4011 if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) { 4012 zerr(gettext("The %s resource already exists. " 4013 "A persistent pool is incompatible\nwith the %s " 4014 "resource."), rt_to_str(RT_DCPU), 4015 rt_to_str(RT_DCPU)); 4016 saw_error = TRUE; 4017 return; 4018 } 4019 4020 if ((err = zonecfg_set_pool(handle, prop_id)) != Z_OK) 4021 zone_perror(zone, err, TRUE); 4022 else 4023 need_to_commit = TRUE; 4024 return; 4025 case RT_LIMITPRIV: 4026 if ((err = zonecfg_set_limitpriv(handle, prop_id)) != Z_OK) 4027 zone_perror(zone, err, TRUE); 4028 else 4029 need_to_commit = TRUE; 4030 return; 4031 case RT_BOOTARGS: 4032 if ((err = zonecfg_set_bootargs(handle, prop_id)) != Z_OK) 4033 zone_perror(zone, err, TRUE); 4034 else 4035 need_to_commit = TRUE; 4036 return; 4037 case RT_SCHED: 4038 if ((err = zonecfg_set_sched(handle, prop_id)) != Z_OK) 4039 zone_perror(zone, err, TRUE); 4040 else 4041 need_to_commit = TRUE; 4042 return; 4043 case RT_IPTYPE: 4044 if (strcmp(prop_id, "shared") == 0) { 4045 iptype = ZS_SHARED; 4046 } else if (strcmp(prop_id, "exclusive") == 0) { 4047 iptype = ZS_EXCLUSIVE; 4048 } else { 4049 zerr(gettext("%s value must be '%s' or '%s'."), 4050 pt_to_str(PT_IPTYPE), "shared", "exclusive"); 4051 saw_error = TRUE; 4052 return; 4053 } 4054 if (iptype == ZS_EXCLUSIVE && !allow_exclusive()) { 4055 saw_error = TRUE; 4056 return; 4057 } 4058 if ((err = zonecfg_set_iptype(handle, iptype)) != Z_OK) 4059 zone_perror(zone, err, TRUE); 4060 else 4061 need_to_commit = TRUE; 4062 return; 4063 case RT_MAXLWPS: 4064 set_aliased_rctl(ALIAS_MAXLWPS, prop_type, prop_id); 4065 return; 4066 case RT_MAXSHMMEM: 4067 set_aliased_rctl(ALIAS_MAXSHMMEM, prop_type, prop_id); 4068 return; 4069 case RT_MAXSHMIDS: 4070 set_aliased_rctl(ALIAS_MAXSHMIDS, prop_type, prop_id); 4071 return; 4072 case RT_MAXMSGIDS: 4073 set_aliased_rctl(ALIAS_MAXMSGIDS, prop_type, prop_id); 4074 return; 4075 case RT_MAXSEMIDS: 4076 set_aliased_rctl(ALIAS_MAXSEMIDS, prop_type, prop_id); 4077 return; 4078 case RT_SHARES: 4079 set_aliased_rctl(ALIAS_SHARES, prop_type, prop_id); 4080 return; 4081 case RT_FS: 4082 switch (prop_type) { 4083 case PT_DIR: 4084 (void) strlcpy(in_progress_fstab.zone_fs_dir, prop_id, 4085 sizeof (in_progress_fstab.zone_fs_dir)); 4086 return; 4087 case PT_SPECIAL: 4088 (void) strlcpy(in_progress_fstab.zone_fs_special, 4089 prop_id, 4090 sizeof (in_progress_fstab.zone_fs_special)); 4091 return; 4092 case PT_RAW: 4093 (void) strlcpy(in_progress_fstab.zone_fs_raw, 4094 prop_id, sizeof (in_progress_fstab.zone_fs_raw)); 4095 return; 4096 case PT_TYPE: 4097 if (!valid_fs_type(prop_id)) { 4098 zerr(gettext("\"%s\" is not a valid %s."), 4099 prop_id, pt_to_str(PT_TYPE)); 4100 saw_error = TRUE; 4101 return; 4102 } 4103 (void) strlcpy(in_progress_fstab.zone_fs_type, prop_id, 4104 sizeof (in_progress_fstab.zone_fs_type)); 4105 return; 4106 case PT_OPTIONS: 4107 if (pp->pv_type != PROP_VAL_SIMPLE && 4108 pp->pv_type != PROP_VAL_LIST) { 4109 zerr(gettext("A %s or %s value was expected " 4110 "here."), pvt_to_str(PROP_VAL_SIMPLE), 4111 pvt_to_str(PROP_VAL_LIST)); 4112 saw_error = TRUE; 4113 return; 4114 } 4115 zonecfg_free_fs_option_list( 4116 in_progress_fstab.zone_fs_options); 4117 in_progress_fstab.zone_fs_options = NULL; 4118 if (!(pp->pv_type == PROP_VAL_LIST && 4119 pp->pv_list == NULL)) 4120 add_property(cmd); 4121 return; 4122 default: 4123 break; 4124 } 4125 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, TRUE); 4126 long_usage(CMD_SET, TRUE); 4127 usage(FALSE, HELP_PROPS); 4128 return; 4129 case RT_IPD: 4130 switch (prop_type) { 4131 case PT_DIR: 4132 (void) strlcpy(in_progress_ipdtab.zone_fs_dir, prop_id, 4133 sizeof (in_progress_ipdtab.zone_fs_dir)); 4134 return; 4135 default: 4136 break; 4137 } 4138 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, TRUE); 4139 long_usage(CMD_SET, TRUE); 4140 usage(FALSE, HELP_PROPS); 4141 return; 4142 case RT_NET: 4143 switch (prop_type) { 4144 case PT_ADDRESS: 4145 if (validate_net_address_syntax(prop_id) != Z_OK) { 4146 saw_error = TRUE; 4147 return; 4148 } 4149 (void) strlcpy(in_progress_nwiftab.zone_nwif_address, 4150 prop_id, 4151 sizeof (in_progress_nwiftab.zone_nwif_address)); 4152 break; 4153 case PT_PHYSICAL: 4154 if (validate_net_physical_syntax(prop_id) != Z_OK) { 4155 saw_error = TRUE; 4156 return; 4157 } 4158 (void) strlcpy(in_progress_nwiftab.zone_nwif_physical, 4159 prop_id, 4160 sizeof (in_progress_nwiftab.zone_nwif_physical)); 4161 break; 4162 default: 4163 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4164 TRUE); 4165 long_usage(CMD_SET, TRUE); 4166 usage(FALSE, HELP_PROPS); 4167 return; 4168 } 4169 return; 4170 case RT_DEVICE: 4171 switch (prop_type) { 4172 case PT_MATCH: 4173 (void) strlcpy(in_progress_devtab.zone_dev_match, 4174 prop_id, 4175 sizeof (in_progress_devtab.zone_dev_match)); 4176 break; 4177 default: 4178 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4179 TRUE); 4180 long_usage(CMD_SET, TRUE); 4181 usage(FALSE, HELP_PROPS); 4182 return; 4183 } 4184 return; 4185 case RT_RCTL: 4186 switch (prop_type) { 4187 case PT_NAME: 4188 if (!zonecfg_valid_rctlname(prop_id)) { 4189 zerr(gettext("'%s' is not a valid zone %s " 4190 "name."), prop_id, rt_to_str(RT_RCTL)); 4191 return; 4192 } 4193 (void) strlcpy(in_progress_rctltab.zone_rctl_name, 4194 prop_id, 4195 sizeof (in_progress_rctltab.zone_rctl_name)); 4196 break; 4197 case PT_VALUE: 4198 if (pp->pv_type != PROP_VAL_COMPLEX && 4199 pp->pv_type != PROP_VAL_LIST) { 4200 zerr(gettext("A %s or %s value was expected " 4201 "here."), pvt_to_str(PROP_VAL_COMPLEX), 4202 pvt_to_str(PROP_VAL_LIST)); 4203 saw_error = TRUE; 4204 return; 4205 } 4206 zonecfg_free_rctl_value_list( 4207 in_progress_rctltab.zone_rctl_valptr); 4208 in_progress_rctltab.zone_rctl_valptr = NULL; 4209 if (!(pp->pv_type == PROP_VAL_LIST && 4210 pp->pv_list == NULL)) 4211 add_property(cmd); 4212 break; 4213 default: 4214 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4215 TRUE); 4216 long_usage(CMD_SET, TRUE); 4217 usage(FALSE, HELP_PROPS); 4218 return; 4219 } 4220 return; 4221 case RT_ATTR: 4222 switch (prop_type) { 4223 case PT_NAME: 4224 (void) strlcpy(in_progress_attrtab.zone_attr_name, 4225 prop_id, 4226 sizeof (in_progress_attrtab.zone_attr_name)); 4227 break; 4228 case PT_TYPE: 4229 (void) strlcpy(in_progress_attrtab.zone_attr_type, 4230 prop_id, 4231 sizeof (in_progress_attrtab.zone_attr_type)); 4232 break; 4233 case PT_VALUE: 4234 (void) strlcpy(in_progress_attrtab.zone_attr_value, 4235 prop_id, 4236 sizeof (in_progress_attrtab.zone_attr_value)); 4237 break; 4238 default: 4239 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4240 TRUE); 4241 long_usage(CMD_SET, TRUE); 4242 usage(FALSE, HELP_PROPS); 4243 return; 4244 } 4245 return; 4246 case RT_DATASET: 4247 switch (prop_type) { 4248 case PT_NAME: 4249 (void) strlcpy(in_progress_dstab.zone_dataset_name, 4250 prop_id, 4251 sizeof (in_progress_dstab.zone_dataset_name)); 4252 return; 4253 default: 4254 break; 4255 } 4256 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, TRUE); 4257 long_usage(CMD_SET, TRUE); 4258 usage(FALSE, HELP_PROPS); 4259 return; 4260 case RT_DCPU: 4261 switch (prop_type) { 4262 char *lowp, *highp; 4263 4264 case PT_NCPUS: 4265 lowp = prop_id; 4266 if ((highp = strchr(prop_id, '-')) != NULL) 4267 *highp++ = '\0'; 4268 else 4269 highp = lowp; 4270 4271 /* Make sure the input makes sense. */ 4272 if (!zonecfg_valid_ncpus(lowp, highp)) { 4273 zerr(gettext("%s property is out of range."), 4274 pt_to_str(PT_NCPUS)); 4275 saw_error = TRUE; 4276 return; 4277 } 4278 4279 (void) strlcpy( 4280 in_progress_psettab.zone_ncpu_min, lowp, 4281 sizeof (in_progress_psettab.zone_ncpu_min)); 4282 (void) strlcpy( 4283 in_progress_psettab.zone_ncpu_max, highp, 4284 sizeof (in_progress_psettab.zone_ncpu_max)); 4285 return; 4286 case PT_IMPORTANCE: 4287 /* Make sure the value makes sense. */ 4288 if (!zonecfg_valid_importance(prop_id)) { 4289 zerr(gettext("%s property is out of range."), 4290 pt_to_str(PT_IMPORTANCE)); 4291 saw_error = TRUE; 4292 return; 4293 } 4294 4295 (void) strlcpy(in_progress_psettab.zone_importance, 4296 prop_id, 4297 sizeof (in_progress_psettab.zone_importance)); 4298 return; 4299 default: 4300 break; 4301 } 4302 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, TRUE); 4303 long_usage(CMD_SET, TRUE); 4304 usage(FALSE, HELP_PROPS); 4305 return; 4306 case RT_PCAP: 4307 if (prop_type != PT_NCPUS) { 4308 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4309 TRUE); 4310 long_usage(CMD_SET, TRUE); 4311 usage(FALSE, HELP_PROPS); 4312 return; 4313 } 4314 4315 /* 4316 * We already checked that an rctl alias is allowed in 4317 * the add_resource() function. 4318 */ 4319 4320 if ((cap = strtof(prop_id, &unitp)) <= 0 || *unitp != '\0' || 4321 (int)(cap * 100) < 1) { 4322 zerr(gettext("%s property is out of range."), 4323 pt_to_str(PT_NCPUS)); 4324 saw_error = TRUE; 4325 return; 4326 } 4327 4328 if ((err = zonecfg_set_aliased_rctl(handle, ALIAS_CPUCAP, 4329 (int)(cap * 100))) != Z_OK) 4330 zone_perror(zone, err, TRUE); 4331 else 4332 need_to_commit = TRUE; 4333 return; 4334 case RT_MCAP: 4335 switch (prop_type) { 4336 case PT_PHYSICAL: 4337 if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) { 4338 zerr(gettext("A positive number with a " 4339 "required scale suffix (K, M, G or T) was " 4340 "expected here.")); 4341 saw_error = TRUE; 4342 } else if (mem_cap < ONE_MB) { 4343 zerr(gettext("%s value is too small. It must " 4344 "be at least 1M."), pt_to_str(PT_PHYSICAL)); 4345 saw_error = TRUE; 4346 } else { 4347 snprintf(in_progress_mcaptab.zone_physmem_cap, 4348 physmem_size, "%llu", mem_cap); 4349 } 4350 break; 4351 case PT_SWAP: 4352 /* 4353 * We have to check if an rctl is allowed here since 4354 * there might already be a rctl defined that blocks 4355 * the alias. 4356 */ 4357 if (!zonecfg_aliased_rctl_ok(handle, ALIAS_MAXSWAP)) { 4358 zone_perror(pt_to_str(PT_MAXSWAP), 4359 Z_ALIAS_DISALLOW, FALSE); 4360 saw_error = TRUE; 4361 return; 4362 } 4363 4364 if (global_zone) 4365 mem_limit = ONE_MB * 100; 4366 else 4367 mem_limit = ONE_MB * 50; 4368 4369 if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) { 4370 zerr(gettext("A positive number with a " 4371 "required scale suffix (K, M, G or T) was " 4372 "expected here.")); 4373 saw_error = TRUE; 4374 } else if (mem_cap < mem_limit) { 4375 char buf[128]; 4376 4377 (void) snprintf(buf, sizeof (buf), "%llu", 4378 mem_limit); 4379 bytes_to_units(buf, buf, sizeof (buf)); 4380 zerr(gettext("%s value is too small. It must " 4381 "be at least %s."), pt_to_str(PT_SWAP), 4382 buf); 4383 saw_error = TRUE; 4384 } else { 4385 if ((err = zonecfg_set_aliased_rctl(handle, 4386 ALIAS_MAXSWAP, mem_cap)) != Z_OK) 4387 zone_perror(zone, err, TRUE); 4388 else 4389 need_to_commit = TRUE; 4390 } 4391 break; 4392 case PT_LOCKED: 4393 /* 4394 * We have to check if an rctl is allowed here since 4395 * there might already be a rctl defined that blocks 4396 * the alias. 4397 */ 4398 if (!zonecfg_aliased_rctl_ok(handle, 4399 ALIAS_MAXLOCKEDMEM)) { 4400 zone_perror(pt_to_str(PT_LOCKED), 4401 Z_ALIAS_DISALLOW, FALSE); 4402 saw_error = TRUE; 4403 return; 4404 } 4405 4406 if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) { 4407 zerr(gettext("A non-negative number with a " 4408 "required scale suffix (K, M, G or T) was " 4409 "expected\nhere.")); 4410 saw_error = TRUE; 4411 } else { 4412 if ((err = zonecfg_set_aliased_rctl(handle, 4413 ALIAS_MAXLOCKEDMEM, mem_cap)) != Z_OK) 4414 zone_perror(zone, err, TRUE); 4415 else 4416 need_to_commit = TRUE; 4417 } 4418 break; 4419 default: 4420 zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, 4421 TRUE); 4422 long_usage(CMD_SET, TRUE); 4423 usage(FALSE, HELP_PROPS); 4424 return; 4425 } 4426 4427 return; 4428 default: 4429 zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, TRUE); 4430 long_usage(CMD_SET, TRUE); 4431 usage(FALSE, HELP_RESOURCES); 4432 return; 4433 } 4434 } 4435 4436 static void 4437 output_prop(FILE *fp, int pnum, char *pval, bool print_notspec) 4438 { 4439 char *qstr; 4440 4441 if (*pval != '\0') { 4442 qstr = quoteit(pval); 4443 if (pnum == PT_SWAP || pnum == PT_LOCKED) 4444 (void) fprintf(fp, "\t[%s: %s]\n", pt_to_str(pnum), 4445 qstr); 4446 else 4447 (void) fprintf(fp, "\t%s: %s\n", pt_to_str(pnum), qstr); 4448 free(qstr); 4449 } else if (print_notspec) 4450 (void) fprintf(fp, gettext("\t%s not specified\n"), 4451 pt_to_str(pnum)); 4452 } 4453 4454 static void 4455 info_zonename(zone_dochandle_t handle, FILE *fp) 4456 { 4457 char zonename[ZONENAME_MAX]; 4458 4459 if (zonecfg_get_name(handle, zonename, sizeof (zonename)) == Z_OK) 4460 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_ZONENAME), 4461 zonename); 4462 else 4463 (void) fprintf(fp, gettext("%s not specified\n"), 4464 pt_to_str(PT_ZONENAME)); 4465 } 4466 4467 static void 4468 info_zonepath(zone_dochandle_t handle, FILE *fp) 4469 { 4470 char zonepath[MAXPATHLEN]; 4471 4472 if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) == Z_OK) 4473 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_ZONEPATH), 4474 zonepath); 4475 else { 4476 (void) fprintf(fp, gettext("%s not specified\n"), 4477 pt_to_str(PT_ZONEPATH)); 4478 } 4479 } 4480 4481 static void 4482 info_brand(zone_dochandle_t handle, FILE *fp) 4483 { 4484 char brand[MAXNAMELEN]; 4485 4486 if (zonecfg_get_brand(handle, brand, sizeof (brand)) == Z_OK) 4487 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_BRAND), 4488 brand); 4489 else 4490 (void) fprintf(fp, "%s %s\n", pt_to_str(PT_BRAND), 4491 gettext("not specified")); 4492 } 4493 4494 static void 4495 info_autoboot(zone_dochandle_t handle, FILE *fp) 4496 { 4497 boolean_t autoboot; 4498 int err; 4499 4500 if ((err = zonecfg_get_autoboot(handle, &autoboot)) == Z_OK) 4501 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_AUTOBOOT), 4502 autoboot ? "true" : "false"); 4503 else 4504 zone_perror(zone, err, TRUE); 4505 } 4506 4507 static void 4508 info_pool(zone_dochandle_t handle, FILE *fp) 4509 { 4510 char pool[MAXNAMELEN]; 4511 int err; 4512 4513 if ((err = zonecfg_get_pool(handle, pool, sizeof (pool))) == Z_OK) 4514 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_POOL), pool); 4515 else 4516 zone_perror(zone, err, TRUE); 4517 } 4518 4519 static void 4520 info_limitpriv(zone_dochandle_t handle, FILE *fp) 4521 { 4522 char *limitpriv; 4523 int err; 4524 4525 if ((err = zonecfg_get_limitpriv(handle, &limitpriv)) == Z_OK) { 4526 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_LIMITPRIV), 4527 limitpriv); 4528 free(limitpriv); 4529 } else { 4530 zone_perror(zone, err, TRUE); 4531 } 4532 } 4533 4534 static void 4535 info_bootargs(zone_dochandle_t handle, FILE *fp) 4536 { 4537 char bootargs[BOOTARGS_MAX]; 4538 int err; 4539 4540 if ((err = zonecfg_get_bootargs(handle, bootargs, 4541 sizeof (bootargs))) == Z_OK) { 4542 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_BOOTARGS), 4543 bootargs); 4544 } else { 4545 zone_perror(zone, err, TRUE); 4546 } 4547 } 4548 4549 static void 4550 info_sched(zone_dochandle_t handle, FILE *fp) 4551 { 4552 char sched[MAXNAMELEN]; 4553 int err; 4554 4555 if ((err = zonecfg_get_sched_class(handle, sched, sizeof (sched))) 4556 == Z_OK) { 4557 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_SCHED), sched); 4558 } else { 4559 zone_perror(zone, err, TRUE); 4560 } 4561 } 4562 4563 static void 4564 info_iptype(zone_dochandle_t handle, FILE *fp) 4565 { 4566 zone_iptype_t iptype; 4567 int err; 4568 4569 if ((err = zonecfg_get_iptype(handle, &iptype)) == Z_OK) { 4570 switch (iptype) { 4571 case ZS_SHARED: 4572 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_IPTYPE), 4573 "shared"); 4574 break; 4575 case ZS_EXCLUSIVE: 4576 (void) fprintf(fp, "%s: %s\n", pt_to_str(PT_IPTYPE), 4577 "exclusive"); 4578 break; 4579 } 4580 } else { 4581 zone_perror(zone, err, TRUE); 4582 } 4583 } 4584 4585 static void 4586 output_fs(FILE *fp, struct zone_fstab *fstab) 4587 { 4588 zone_fsopt_t *this; 4589 4590 (void) fprintf(fp, "%s:\n", rt_to_str(RT_FS)); 4591 output_prop(fp, PT_DIR, fstab->zone_fs_dir, B_TRUE); 4592 output_prop(fp, PT_SPECIAL, fstab->zone_fs_special, B_TRUE); 4593 output_prop(fp, PT_RAW, fstab->zone_fs_raw, B_TRUE); 4594 output_prop(fp, PT_TYPE, fstab->zone_fs_type, B_TRUE); 4595 (void) fprintf(fp, "\t%s: [", pt_to_str(PT_OPTIONS)); 4596 for (this = fstab->zone_fs_options; this != NULL; 4597 this = this->zone_fsopt_next) { 4598 if (strchr(this->zone_fsopt_opt, '=')) 4599 (void) fprintf(fp, "\"%s\"", this->zone_fsopt_opt); 4600 else 4601 (void) fprintf(fp, "%s", this->zone_fsopt_opt); 4602 if (this->zone_fsopt_next != NULL) 4603 (void) fprintf(fp, ","); 4604 } 4605 (void) fprintf(fp, "]\n"); 4606 } 4607 4608 static void 4609 output_ipd(FILE *fp, struct zone_fstab *ipdtab) 4610 { 4611 (void) fprintf(fp, "%s:\n", rt_to_str(RT_IPD)); 4612 output_prop(fp, PT_DIR, ipdtab->zone_fs_dir, B_TRUE); 4613 } 4614 4615 static void 4616 info_fs(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 4617 { 4618 struct zone_fstab lookup, user; 4619 bool output = FALSE; 4620 4621 if (zonecfg_setfsent(handle) != Z_OK) 4622 return; 4623 while (zonecfg_getfsent(handle, &lookup) == Z_OK) { 4624 if (cmd->cmd_prop_nv_pairs == 0) { 4625 output_fs(fp, &lookup); 4626 goto loopend; 4627 } 4628 if (fill_in_fstab(cmd, &user, TRUE) != Z_OK) 4629 goto loopend; 4630 if (strlen(user.zone_fs_dir) > 0 && 4631 strcmp(user.zone_fs_dir, lookup.zone_fs_dir) != 0) 4632 goto loopend; /* no match */ 4633 if (strlen(user.zone_fs_special) > 0 && 4634 strcmp(user.zone_fs_special, lookup.zone_fs_special) != 0) 4635 goto loopend; /* no match */ 4636 if (strlen(user.zone_fs_type) > 0 && 4637 strcmp(user.zone_fs_type, lookup.zone_fs_type) != 0) 4638 goto loopend; /* no match */ 4639 output_fs(fp, &lookup); 4640 output = TRUE; 4641 loopend: 4642 zonecfg_free_fs_option_list(lookup.zone_fs_options); 4643 } 4644 (void) zonecfg_endfsent(handle); 4645 /* 4646 * If a property n/v pair was specified, warn the user if there was 4647 * nothing to output. 4648 */ 4649 if (!output && cmd->cmd_prop_nv_pairs > 0) 4650 (void) printf(gettext("No such %s resource.\n"), 4651 rt_to_str(RT_FS)); 4652 } 4653 4654 static void 4655 info_ipd(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 4656 { 4657 struct zone_fstab lookup, user; 4658 bool output = FALSE; 4659 4660 if (zonecfg_setipdent(handle) != Z_OK) 4661 return; 4662 while (zonecfg_getipdent(handle, &lookup) == Z_OK) { 4663 if (cmd->cmd_prop_nv_pairs == 0) { 4664 output_ipd(fp, &lookup); 4665 continue; 4666 } 4667 if (fill_in_ipdtab(cmd, &user, TRUE) != Z_OK) 4668 continue; 4669 if (strlen(user.zone_fs_dir) > 0 && 4670 strcmp(user.zone_fs_dir, lookup.zone_fs_dir) != 0) 4671 continue; /* no match */ 4672 output_ipd(fp, &lookup); 4673 output = TRUE; 4674 } 4675 (void) zonecfg_endipdent(handle); 4676 /* 4677 * If a property n/v pair was specified, warn the user if there was 4678 * nothing to output. 4679 */ 4680 if (!output && cmd->cmd_prop_nv_pairs > 0) 4681 (void) printf(gettext("No such %s resource.\n"), 4682 rt_to_str(RT_IPD)); 4683 } 4684 4685 static void 4686 output_net(FILE *fp, struct zone_nwiftab *nwiftab) 4687 { 4688 (void) fprintf(fp, "%s:\n", rt_to_str(RT_NET)); 4689 output_prop(fp, PT_ADDRESS, nwiftab->zone_nwif_address, B_TRUE); 4690 output_prop(fp, PT_PHYSICAL, nwiftab->zone_nwif_physical, B_TRUE); 4691 } 4692 4693 static void 4694 info_net(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 4695 { 4696 struct zone_nwiftab lookup, user; 4697 bool output = FALSE; 4698 4699 if (zonecfg_setnwifent(handle) != Z_OK) 4700 return; 4701 while (zonecfg_getnwifent(handle, &lookup) == Z_OK) { 4702 if (cmd->cmd_prop_nv_pairs == 0) { 4703 output_net(fp, &lookup); 4704 continue; 4705 } 4706 if (fill_in_nwiftab(cmd, &user, TRUE) != Z_OK) 4707 continue; 4708 if (strlen(user.zone_nwif_physical) > 0 && 4709 strcmp(user.zone_nwif_physical, 4710 lookup.zone_nwif_physical) != 0) 4711 continue; /* no match */ 4712 /* If present make sure it matches */ 4713 if (strlen(user.zone_nwif_address) > 0 && 4714 !zonecfg_same_net_address(user.zone_nwif_address, 4715 lookup.zone_nwif_address)) 4716 continue; /* no match */ 4717 output_net(fp, &lookup); 4718 output = TRUE; 4719 } 4720 (void) zonecfg_endnwifent(handle); 4721 /* 4722 * If a property n/v pair was specified, warn the user if there was 4723 * nothing to output. 4724 */ 4725 if (!output && cmd->cmd_prop_nv_pairs > 0) 4726 (void) printf(gettext("No such %s resource.\n"), 4727 rt_to_str(RT_NET)); 4728 } 4729 4730 static void 4731 output_dev(FILE *fp, struct zone_devtab *devtab) 4732 { 4733 (void) fprintf(fp, "%s\n", rt_to_str(RT_DEVICE)); 4734 output_prop(fp, PT_MATCH, devtab->zone_dev_match, B_TRUE); 4735 } 4736 4737 static void 4738 info_dev(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 4739 { 4740 struct zone_devtab lookup, user; 4741 bool output = FALSE; 4742 4743 if (zonecfg_setdevent(handle) != Z_OK) 4744 return; 4745 while (zonecfg_getdevent(handle, &lookup) == Z_OK) { 4746 if (cmd->cmd_prop_nv_pairs == 0) { 4747 output_dev(fp, &lookup); 4748 continue; 4749 } 4750 if (fill_in_devtab(cmd, &user, TRUE) != Z_OK) 4751 continue; 4752 if (strlen(user.zone_dev_match) > 0 && 4753 strcmp(user.zone_dev_match, lookup.zone_dev_match) != 0) 4754 continue; /* no match */ 4755 output_dev(fp, &lookup); 4756 output = TRUE; 4757 } 4758 (void) zonecfg_enddevent(handle); 4759 /* 4760 * If a property n/v pair was specified, warn the user if there was 4761 * nothing to output. 4762 */ 4763 if (!output && cmd->cmd_prop_nv_pairs > 0) 4764 (void) printf(gettext("No such %s resource.\n"), 4765 rt_to_str(RT_DEVICE)); 4766 } 4767 4768 static void 4769 output_rctl(FILE *fp, struct zone_rctltab *rctltab) 4770 { 4771 struct zone_rctlvaltab *valptr; 4772 4773 (void) fprintf(fp, "%s:\n", rt_to_str(RT_RCTL)); 4774 output_prop(fp, PT_NAME, rctltab->zone_rctl_name, B_TRUE); 4775 for (valptr = rctltab->zone_rctl_valptr; valptr != NULL; 4776 valptr = valptr->zone_rctlval_next) { 4777 fprintf(fp, "\t%s: (%s=%s,%s=%s,%s=%s)\n", 4778 pt_to_str(PT_VALUE), 4779 pt_to_str(PT_PRIV), valptr->zone_rctlval_priv, 4780 pt_to_str(PT_LIMIT), valptr->zone_rctlval_limit, 4781 pt_to_str(PT_ACTION), valptr->zone_rctlval_action); 4782 } 4783 } 4784 4785 static void 4786 info_rctl(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 4787 { 4788 struct zone_rctltab lookup, user; 4789 bool output = FALSE; 4790 4791 if (zonecfg_setrctlent(handle) != Z_OK) 4792 return; 4793 while (zonecfg_getrctlent(handle, &lookup) == Z_OK) { 4794 if (cmd->cmd_prop_nv_pairs == 0) { 4795 output_rctl(fp, &lookup); 4796 } else if (fill_in_rctltab(cmd, &user, TRUE) == Z_OK && 4797 (strlen(user.zone_rctl_name) == 0 || 4798 strcmp(user.zone_rctl_name, lookup.zone_rctl_name) == 0)) { 4799 output_rctl(fp, &lookup); 4800 output = TRUE; 4801 } 4802 zonecfg_free_rctl_value_list(lookup.zone_rctl_valptr); 4803 } 4804 (void) zonecfg_endrctlent(handle); 4805 /* 4806 * If a property n/v pair was specified, warn the user if there was 4807 * nothing to output. 4808 */ 4809 if (!output && cmd->cmd_prop_nv_pairs > 0) 4810 (void) printf(gettext("No such %s resource.\n"), 4811 rt_to_str(RT_RCTL)); 4812 } 4813 4814 static void 4815 output_attr(FILE *fp, struct zone_attrtab *attrtab) 4816 { 4817 (void) fprintf(fp, "%s:\n", rt_to_str(RT_ATTR)); 4818 output_prop(fp, PT_NAME, attrtab->zone_attr_name, B_TRUE); 4819 output_prop(fp, PT_TYPE, attrtab->zone_attr_type, B_TRUE); 4820 output_prop(fp, PT_VALUE, attrtab->zone_attr_value, B_TRUE); 4821 } 4822 4823 static void 4824 info_attr(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 4825 { 4826 struct zone_attrtab lookup, user; 4827 bool output = FALSE; 4828 4829 if (zonecfg_setattrent(handle) != Z_OK) 4830 return; 4831 while (zonecfg_getattrent(handle, &lookup) == Z_OK) { 4832 if (cmd->cmd_prop_nv_pairs == 0) { 4833 output_attr(fp, &lookup); 4834 continue; 4835 } 4836 if (fill_in_attrtab(cmd, &user, TRUE) != Z_OK) 4837 continue; 4838 if (strlen(user.zone_attr_name) > 0 && 4839 strcmp(user.zone_attr_name, lookup.zone_attr_name) != 0) 4840 continue; /* no match */ 4841 if (strlen(user.zone_attr_type) > 0 && 4842 strcmp(user.zone_attr_type, lookup.zone_attr_type) != 0) 4843 continue; /* no match */ 4844 if (strlen(user.zone_attr_value) > 0 && 4845 strcmp(user.zone_attr_value, lookup.zone_attr_value) != 0) 4846 continue; /* no match */ 4847 output_attr(fp, &lookup); 4848 output = TRUE; 4849 } 4850 (void) zonecfg_endattrent(handle); 4851 /* 4852 * If a property n/v pair was specified, warn the user if there was 4853 * nothing to output. 4854 */ 4855 if (!output && cmd->cmd_prop_nv_pairs > 0) 4856 (void) printf(gettext("No such %s resource.\n"), 4857 rt_to_str(RT_ATTR)); 4858 } 4859 4860 static void 4861 output_ds(FILE *fp, struct zone_dstab *dstab) 4862 { 4863 (void) fprintf(fp, "%s:\n", rt_to_str(RT_DATASET)); 4864 output_prop(fp, PT_NAME, dstab->zone_dataset_name, B_TRUE); 4865 } 4866 4867 static void 4868 info_ds(zone_dochandle_t handle, FILE *fp, cmd_t *cmd) 4869 { 4870 struct zone_dstab lookup, user; 4871 bool output = FALSE; 4872 4873 if (zonecfg_setdsent(handle) != Z_OK) 4874 return; 4875 while (zonecfg_getdsent(handle, &lookup) == Z_OK) { 4876 if (cmd->cmd_prop_nv_pairs == 0) { 4877 output_ds(fp, &lookup); 4878 continue; 4879 } 4880 if (fill_in_dstab(cmd, &user, TRUE) != Z_OK) 4881 continue; 4882 if (strlen(user.zone_dataset_name) > 0 && 4883 strcmp(user.zone_dataset_name, 4884 lookup.zone_dataset_name) != 0) 4885 continue; /* no match */ 4886 output_ds(fp, &lookup); 4887 output = TRUE; 4888 } 4889 (void) zonecfg_enddsent(handle); 4890 /* 4891 * If a property n/v pair was specified, warn the user if there was 4892 * nothing to output. 4893 */ 4894 if (!output && cmd->cmd_prop_nv_pairs > 0) 4895 (void) printf(gettext("No such %s resource.\n"), 4896 rt_to_str(RT_DATASET)); 4897 } 4898 4899 static void 4900 output_pset(FILE *fp, struct zone_psettab *psettab) 4901 { 4902 (void) fprintf(fp, "%s:\n", rt_to_str(RT_DCPU)); 4903 if (strcmp(psettab->zone_ncpu_min, psettab->zone_ncpu_max) == 0) 4904 (void) fprintf(fp, "\t%s: %s\n", pt_to_str(PT_NCPUS), 4905 psettab->zone_ncpu_max); 4906 else 4907 (void) fprintf(fp, "\t%s: %s-%s\n", pt_to_str(PT_NCPUS), 4908 psettab->zone_ncpu_min, psettab->zone_ncpu_max); 4909 if (psettab->zone_importance[0] != '\0') 4910 (void) fprintf(fp, "\t%s: %s\n", pt_to_str(PT_IMPORTANCE), 4911 psettab->zone_importance); 4912 } 4913 4914 static void 4915 info_pset(zone_dochandle_t handle, FILE *fp) 4916 { 4917 struct zone_psettab lookup; 4918 4919 if (zonecfg_getpsetent(handle, &lookup) == Z_OK) 4920 output_pset(fp, &lookup); 4921 } 4922 4923 static void 4924 output_pcap(FILE *fp) 4925 { 4926 uint64_t cap; 4927 4928 if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &cap) == Z_OK) { 4929 float scaled = (float)cap / 100; 4930 (void) fprintf(fp, "%s:\n", rt_to_str(RT_PCAP)); 4931 (void) fprintf(fp, "\t[%s: %.2f]\n", pt_to_str(PT_NCPUS), 4932 scaled); 4933 } 4934 } 4935 4936 static void 4937 info_pcap(FILE *fp) 4938 { 4939 output_pcap(fp); 4940 } 4941 4942 4943 static void 4944 info_aliased_rctl(zone_dochandle_t handle, FILE *fp, char *alias) 4945 { 4946 uint64_t limit; 4947 4948 if (zonecfg_get_aliased_rctl(handle, alias, &limit) == Z_OK) { 4949 /* convert memory based properties */ 4950 if (strcmp(alias, ALIAS_MAXSHMMEM) == 0) { 4951 char buf[128]; 4952 4953 (void) snprintf(buf, sizeof (buf), "%llu", limit); 4954 bytes_to_units(buf, buf, sizeof (buf)); 4955 (void) fprintf(fp, "[%s: %s]\n", alias, buf); 4956 return; 4957 } 4958 4959 (void) fprintf(fp, "[%s: %llu]\n", alias, limit); 4960 } 4961 } 4962 4963 static void 4964 bytes_to_units(char *str, char *buf, int bufsize) 4965 { 4966 unsigned long long num; 4967 unsigned long long save = 0; 4968 char *units = "BKMGT"; 4969 char *up = units; 4970 4971 num = strtoll(str, NULL, 10); 4972 4973 if (num < 1024) { 4974 (void) snprintf(buf, bufsize, "%llu", num); 4975 return; 4976 } 4977 4978 while ((num >= 1024) && (*up != 'T')) { 4979 up++; /* next unit of measurement */ 4980 save = num; 4981 num = (num + 512) >> 10; 4982 } 4983 4984 /* check if we should output a fraction. snprintf will round for us */ 4985 if (save % 1024 != 0 && ((save >> 10) < 10)) 4986 (void) snprintf(buf, bufsize, "%2.1f%c", ((float)save / 1024), 4987 *up); 4988 else 4989 (void) snprintf(buf, bufsize, "%llu%c", num, *up); 4990 } 4991 4992 static void 4993 output_mcap(FILE *fp, struct zone_mcaptab *mcaptab, int showswap, 4994 uint64_t maxswap, int showlocked, uint64_t maxlocked) 4995 { 4996 char buf[128]; 4997 4998 (void) fprintf(fp, "%s:\n", rt_to_str(RT_MCAP)); 4999 if (mcaptab->zone_physmem_cap[0] != '\0') { 5000 bytes_to_units(mcaptab->zone_physmem_cap, buf, sizeof (buf)); 5001 output_prop(fp, PT_PHYSICAL, buf, B_TRUE); 5002 } 5003 5004 if (showswap == Z_OK) { 5005 (void) snprintf(buf, sizeof (buf), "%llu", maxswap); 5006 bytes_to_units(buf, buf, sizeof (buf)); 5007 output_prop(fp, PT_SWAP, buf, B_TRUE); 5008 } 5009 5010 if (showlocked == Z_OK) { 5011 (void) snprintf(buf, sizeof (buf), "%llu", maxlocked); 5012 bytes_to_units(buf, buf, sizeof (buf)); 5013 output_prop(fp, PT_LOCKED, buf, B_TRUE); 5014 } 5015 } 5016 5017 static void 5018 info_mcap(zone_dochandle_t handle, FILE *fp) 5019 { 5020 int res1, res2, res3; 5021 uint64_t swap_limit; 5022 uint64_t locked_limit; 5023 struct zone_mcaptab lookup; 5024 5025 bzero(&lookup, sizeof (lookup)); 5026 res1 = zonecfg_getmcapent(handle, &lookup); 5027 res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &swap_limit); 5028 res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, 5029 &locked_limit); 5030 5031 if (res1 == Z_OK || res2 == Z_OK || res3 == Z_OK) 5032 output_mcap(fp, &lookup, res2, swap_limit, res3, locked_limit); 5033 } 5034 5035 void 5036 info_func(cmd_t *cmd) 5037 { 5038 FILE *fp = stdout; 5039 bool need_to_close = FALSE; 5040 char *pager; 5041 int type; 5042 int res1, res2; 5043 uint64_t swap_limit; 5044 uint64_t locked_limit; 5045 5046 assert(cmd != NULL); 5047 5048 if (initialize(TRUE) != Z_OK) 5049 return; 5050 5051 /* don't page error output */ 5052 if (interactive_mode) { 5053 if ((pager = getenv("PAGER")) == NULL) 5054 pager = PAGER; 5055 if ((fp = popen(pager, "w")) != NULL) 5056 need_to_close = TRUE; 5057 setbuf(fp, NULL); 5058 } 5059 5060 if (!global_scope) { 5061 switch (resource_scope) { 5062 case RT_FS: 5063 output_fs(fp, &in_progress_fstab); 5064 break; 5065 case RT_IPD: 5066 output_ipd(fp, &in_progress_ipdtab); 5067 break; 5068 case RT_NET: 5069 output_net(fp, &in_progress_nwiftab); 5070 break; 5071 case RT_DEVICE: 5072 output_dev(fp, &in_progress_devtab); 5073 break; 5074 case RT_RCTL: 5075 output_rctl(fp, &in_progress_rctltab); 5076 break; 5077 case RT_ATTR: 5078 output_attr(fp, &in_progress_attrtab); 5079 break; 5080 case RT_DATASET: 5081 output_ds(fp, &in_progress_dstab); 5082 break; 5083 case RT_DCPU: 5084 output_pset(fp, &in_progress_psettab); 5085 break; 5086 case RT_PCAP: 5087 output_pcap(fp); 5088 break; 5089 case RT_MCAP: 5090 res1 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, 5091 &swap_limit); 5092 res2 = zonecfg_get_aliased_rctl(handle, 5093 ALIAS_MAXLOCKEDMEM, &locked_limit); 5094 output_mcap(fp, &in_progress_mcaptab, res1, swap_limit, 5095 res2, locked_limit); 5096 break; 5097 } 5098 goto cleanup; 5099 } 5100 5101 type = cmd->cmd_res_type; 5102 5103 if (gz_invalid_rt_property(type)) { 5104 zerr(gettext("%s is not a valid property for the global zone."), 5105 rt_to_str(type)); 5106 goto cleanup; 5107 } 5108 5109 if (gz_invalid_resource(type)) { 5110 zerr(gettext("%s is not a valid resource for the global zone."), 5111 rt_to_str(type)); 5112 goto cleanup; 5113 } 5114 5115 switch (cmd->cmd_res_type) { 5116 case RT_UNKNOWN: 5117 info_zonename(handle, fp); 5118 if (!global_zone) { 5119 info_zonepath(handle, fp); 5120 info_brand(handle, fp); 5121 info_autoboot(handle, fp); 5122 info_bootargs(handle, fp); 5123 } 5124 info_pool(handle, fp); 5125 if (!global_zone) { 5126 info_limitpriv(handle, fp); 5127 info_sched(handle, fp); 5128 info_iptype(handle, fp); 5129 } 5130 info_aliased_rctl(handle, fp, ALIAS_MAXLWPS); 5131 info_aliased_rctl(handle, fp, ALIAS_MAXSHMMEM); 5132 info_aliased_rctl(handle, fp, ALIAS_MAXSHMIDS); 5133 info_aliased_rctl(handle, fp, ALIAS_MAXMSGIDS); 5134 info_aliased_rctl(handle, fp, ALIAS_MAXSEMIDS); 5135 info_aliased_rctl(handle, fp, ALIAS_SHARES); 5136 if (!global_zone) { 5137 info_ipd(handle, fp, cmd); 5138 info_fs(handle, fp, cmd); 5139 info_net(handle, fp, cmd); 5140 info_dev(handle, fp, cmd); 5141 } 5142 info_pset(handle, fp); 5143 info_pcap(fp); 5144 info_mcap(handle, fp); 5145 if (!global_zone) { 5146 info_attr(handle, fp, cmd); 5147 info_ds(handle, fp, cmd); 5148 } 5149 info_rctl(handle, fp, cmd); 5150 break; 5151 case RT_ZONENAME: 5152 info_zonename(handle, fp); 5153 break; 5154 case RT_ZONEPATH: 5155 info_zonepath(handle, fp); 5156 break; 5157 case RT_BRAND: 5158 info_brand(handle, fp); 5159 break; 5160 case RT_AUTOBOOT: 5161 info_autoboot(handle, fp); 5162 break; 5163 case RT_POOL: 5164 info_pool(handle, fp); 5165 break; 5166 case RT_LIMITPRIV: 5167 info_limitpriv(handle, fp); 5168 break; 5169 case RT_BOOTARGS: 5170 info_bootargs(handle, fp); 5171 break; 5172 case RT_SCHED: 5173 info_sched(handle, fp); 5174 break; 5175 case RT_IPTYPE: 5176 info_iptype(handle, fp); 5177 break; 5178 case RT_MAXLWPS: 5179 info_aliased_rctl(handle, fp, ALIAS_MAXLWPS); 5180 break; 5181 case RT_MAXSHMMEM: 5182 info_aliased_rctl(handle, fp, ALIAS_MAXSHMMEM); 5183 break; 5184 case RT_MAXSHMIDS: 5185 info_aliased_rctl(handle, fp, ALIAS_MAXSHMIDS); 5186 break; 5187 case RT_MAXMSGIDS: 5188 info_aliased_rctl(handle, fp, ALIAS_MAXMSGIDS); 5189 break; 5190 case RT_MAXSEMIDS: 5191 info_aliased_rctl(handle, fp, ALIAS_MAXSEMIDS); 5192 break; 5193 case RT_SHARES: 5194 info_aliased_rctl(handle, fp, ALIAS_SHARES); 5195 break; 5196 case RT_FS: 5197 info_fs(handle, fp, cmd); 5198 break; 5199 case RT_IPD: 5200 info_ipd(handle, fp, cmd); 5201 break; 5202 case RT_NET: 5203 info_net(handle, fp, cmd); 5204 break; 5205 case RT_DEVICE: 5206 info_dev(handle, fp, cmd); 5207 break; 5208 case RT_RCTL: 5209 info_rctl(handle, fp, cmd); 5210 break; 5211 case RT_ATTR: 5212 info_attr(handle, fp, cmd); 5213 break; 5214 case RT_DATASET: 5215 info_ds(handle, fp, cmd); 5216 break; 5217 case RT_DCPU: 5218 info_pset(handle, fp); 5219 break; 5220 case RT_PCAP: 5221 info_pcap(fp); 5222 break; 5223 case RT_MCAP: 5224 info_mcap(handle, fp); 5225 break; 5226 default: 5227 zone_perror(rt_to_str(cmd->cmd_res_type), Z_NO_RESOURCE_TYPE, 5228 TRUE); 5229 } 5230 5231 cleanup: 5232 if (need_to_close) 5233 (void) pclose(fp); 5234 } 5235 5236 /* 5237 * Helper function for verify-- checks that a required string property 5238 * exists. 5239 */ 5240 static void 5241 check_reqd_prop(char *attr, int rt, int pt, int *ret_val) 5242 { 5243 if (strlen(attr) == 0) { 5244 zerr(gettext("%s: %s not specified"), rt_to_str(rt), 5245 pt_to_str(pt)); 5246 saw_error = TRUE; 5247 if (*ret_val == Z_OK) 5248 *ret_val = Z_REQD_PROPERTY_MISSING; 5249 } 5250 } 5251 5252 static int 5253 do_subproc(char *cmdbuf) 5254 { 5255 char inbuf[MAX_CMD_LEN]; 5256 FILE *file; 5257 int status; 5258 5259 file = popen(cmdbuf, "r"); 5260 if (file == NULL) { 5261 zerr(gettext("Could not launch: %s"), cmdbuf); 5262 return (-1); 5263 } 5264 5265 while (fgets(inbuf, sizeof (inbuf), file) != NULL) 5266 fprintf(stderr, "%s", inbuf); 5267 status = pclose(file); 5268 5269 if (WIFSIGNALED(status)) { 5270 zerr(gettext("%s unexpectedly terminated due to signal %d"), 5271 cmdbuf, WTERMSIG(status)); 5272 return (-1); 5273 } 5274 assert(WIFEXITED(status)); 5275 return (WEXITSTATUS(status)); 5276 } 5277 5278 static int 5279 brand_verify(zone_dochandle_t handle) 5280 { 5281 char xml_file[32]; 5282 char cmdbuf[MAX_CMD_LEN]; 5283 brand_handle_t bh; 5284 char brand[MAXNAMELEN]; 5285 int err; 5286 5287 if (zonecfg_get_brand(handle, brand, sizeof (brand)) != Z_OK) { 5288 zerr("%s: %s\n", zone, gettext("could not get zone brand")); 5289 return (Z_INVALID_DOCUMENT); 5290 } 5291 if ((bh = brand_open(brand)) == NULL) { 5292 zerr("%s: %s\n", zone, gettext("unknown brand.")); 5293 return (Z_INVALID_DOCUMENT); 5294 } 5295 5296 /* 5297 * Fetch the verify command, if any, from the brand configuration 5298 * and build the command line to execute it. 5299 */ 5300 strcpy(cmdbuf, EXEC_PREFIX); 5301 err = brand_get_verify_cfg(bh, cmdbuf + EXEC_LEN, 5302 sizeof (cmdbuf) - (EXEC_LEN + (strlen(xml_file) + 1))); 5303 brand_close(bh); 5304 if (err != Z_OK) { 5305 zerr("%s: %s\n", zone, 5306 gettext("could not get brand verification command")); 5307 return (Z_INVALID_DOCUMENT); 5308 } 5309 5310 /* 5311 * If the brand doesn't provide a verification routine, we just 5312 * return success. 5313 */ 5314 if (strlen(cmdbuf) == EXEC_LEN) 5315 return (Z_OK); 5316 5317 /* 5318 * Dump the current config information for this zone to a file. 5319 */ 5320 strcpy(xml_file, "/tmp/zonecfg_verify.XXXXXX"); 5321 if (mkstemp(xml_file) == NULL) 5322 return (Z_TEMP_FILE); 5323 if ((err = zonecfg_verify_save(handle, xml_file)) != Z_OK) { 5324 (void) unlink(xml_file); 5325 return (err); 5326 } 5327 5328 /* 5329 * Execute the verification command. 5330 */ 5331 if ((strlcat(cmdbuf, " ", MAX_CMD_LEN) >= MAX_CMD_LEN) || 5332 (strlcat(cmdbuf, xml_file, MAX_CMD_LEN) >= MAX_CMD_LEN)) { 5333 err = Z_BRAND_ERROR; 5334 } else { 5335 err = do_subproc(cmdbuf); 5336 } 5337 5338 (void) unlink(xml_file); 5339 return ((err == Z_OK) ? Z_OK : Z_BRAND_ERROR); 5340 } 5341 5342 /* 5343 * See the DTD for which attributes are required for which resources. 5344 * 5345 * This function can be called by commit_func(), which needs to save things, 5346 * in addition to the general call from parse_and_run(), which doesn't need 5347 * things saved. Since the parameters are standardized, we distinguish by 5348 * having commit_func() call here with cmd->cmd_arg set to "save" to indicate 5349 * that a save is needed. 5350 */ 5351 void 5352 verify_func(cmd_t *cmd) 5353 { 5354 struct zone_nwiftab nwiftab; 5355 struct zone_fstab fstab; 5356 struct zone_attrtab attrtab; 5357 struct zone_rctltab rctltab; 5358 struct zone_dstab dstab; 5359 struct zone_psettab psettab; 5360 char zonepath[MAXPATHLEN]; 5361 char sched[MAXNAMELEN]; 5362 char brand[MAXNAMELEN]; 5363 int err, ret_val = Z_OK, arg; 5364 int pset_res; 5365 bool save = FALSE; 5366 bool arg_err = FALSE; 5367 zone_iptype_t iptype; 5368 boolean_t has_cpu_shares = B_FALSE; 5369 boolean_t has_cpu_cap = B_FALSE; 5370 5371 optind = 0; 5372 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 5373 switch (arg) { 5374 case '?': 5375 longer_usage(CMD_VERIFY); 5376 arg_err = TRUE; 5377 break; 5378 default: 5379 short_usage(CMD_VERIFY); 5380 arg_err = TRUE; 5381 break; 5382 } 5383 } 5384 if (arg_err) 5385 return; 5386 5387 if (optind > cmd->cmd_argc) { 5388 short_usage(CMD_VERIFY); 5389 return; 5390 } 5391 5392 if (zone_is_read_only(CMD_VERIFY)) 5393 return; 5394 5395 assert(cmd != NULL); 5396 5397 if (cmd->cmd_argc > 0 && (strcmp(cmd->cmd_argv[0], "save") == 0)) 5398 save = TRUE; 5399 if (initialize(TRUE) != Z_OK) 5400 return; 5401 5402 if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) != Z_OK && 5403 !global_zone) { 5404 zerr(gettext("%s not specified"), pt_to_str(PT_ZONEPATH)); 5405 ret_val = Z_REQD_RESOURCE_MISSING; 5406 saw_error = TRUE; 5407 } 5408 if (strlen(zonepath) == 0 && !global_zone) { 5409 zerr(gettext("%s cannot be empty."), pt_to_str(PT_ZONEPATH)); 5410 ret_val = Z_REQD_RESOURCE_MISSING; 5411 saw_error = TRUE; 5412 } 5413 5414 if ((err = zonecfg_get_brand(handle, brand, sizeof (brand))) != Z_OK) { 5415 zone_perror(zone, err, TRUE); 5416 return; 5417 } 5418 if (strcmp(brand, NATIVE_BRAND_NAME) != 0) { 5419 if ((err = brand_verify(handle)) != Z_OK) { 5420 zone_perror(zone, err, TRUE); 5421 return; 5422 } 5423 } 5424 5425 if (zonecfg_get_iptype(handle, &iptype) != Z_OK) { 5426 zerr("%s %s", gettext("cannot get"), pt_to_str(PT_IPTYPE)); 5427 ret_val = Z_REQD_RESOURCE_MISSING; 5428 saw_error = TRUE; 5429 } 5430 if ((err = zonecfg_setipdent(handle)) != Z_OK) { 5431 zone_perror(zone, err, TRUE); 5432 return; 5433 } 5434 while (zonecfg_getipdent(handle, &fstab) == Z_OK) { 5435 check_reqd_prop(fstab.zone_fs_dir, RT_IPD, PT_DIR, &ret_val); 5436 } 5437 (void) zonecfg_endipdent(handle); 5438 5439 if ((err = zonecfg_setfsent(handle)) != Z_OK) { 5440 zone_perror(zone, err, TRUE); 5441 return; 5442 } 5443 while (zonecfg_getfsent(handle, &fstab) == Z_OK) { 5444 check_reqd_prop(fstab.zone_fs_dir, RT_FS, PT_DIR, &ret_val); 5445 check_reqd_prop(fstab.zone_fs_special, RT_FS, PT_SPECIAL, 5446 &ret_val); 5447 check_reqd_prop(fstab.zone_fs_type, RT_FS, PT_TYPE, &ret_val); 5448 5449 zonecfg_free_fs_option_list(fstab.zone_fs_options); 5450 } 5451 (void) zonecfg_endfsent(handle); 5452 5453 if ((err = zonecfg_setnwifent(handle)) != Z_OK) { 5454 zone_perror(zone, err, TRUE); 5455 return; 5456 } 5457 while (zonecfg_getnwifent(handle, &nwiftab) == Z_OK) { 5458 /* 5459 * physical is required in all cases. 5460 * A shared IP requires an address, while 5461 * an exclusive IP must not have an address. 5462 */ 5463 check_reqd_prop(nwiftab.zone_nwif_physical, RT_NET, 5464 PT_PHYSICAL, &ret_val); 5465 5466 switch (iptype) { 5467 case ZS_SHARED: 5468 check_reqd_prop(nwiftab.zone_nwif_address, RT_NET, 5469 PT_ADDRESS, &ret_val); 5470 break; 5471 case ZS_EXCLUSIVE: 5472 if (strlen(nwiftab.zone_nwif_address) > 0) { 5473 zerr(gettext("%s: %s cannot be specified " 5474 "for an exclusive IP type"), 5475 rt_to_str(RT_NET), pt_to_str(PT_ADDRESS)); 5476 saw_error = TRUE; 5477 if (ret_val == Z_OK) 5478 ret_val = Z_INVAL; 5479 } 5480 break; 5481 } 5482 } 5483 (void) zonecfg_endnwifent(handle); 5484 5485 if ((err = zonecfg_setrctlent(handle)) != Z_OK) { 5486 zone_perror(zone, err, TRUE); 5487 return; 5488 } 5489 while (zonecfg_getrctlent(handle, &rctltab) == Z_OK) { 5490 check_reqd_prop(rctltab.zone_rctl_name, RT_RCTL, PT_NAME, 5491 &ret_val); 5492 5493 if (strcmp(rctltab.zone_rctl_name, "zone.cpu-shares") == 0) 5494 has_cpu_shares = B_TRUE; 5495 5496 if (strcmp(rctltab.zone_rctl_name, "zone.cpu-cap") == 0) 5497 has_cpu_cap = B_TRUE; 5498 5499 if (rctltab.zone_rctl_valptr == NULL) { 5500 zerr(gettext("%s: no %s specified"), 5501 rt_to_str(RT_RCTL), pt_to_str(PT_VALUE)); 5502 saw_error = TRUE; 5503 if (ret_val == Z_OK) 5504 ret_val = Z_REQD_PROPERTY_MISSING; 5505 } else { 5506 zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr); 5507 } 5508 } 5509 (void) zonecfg_endrctlent(handle); 5510 5511 if ((pset_res = zonecfg_lookup_pset(handle, &psettab)) == Z_OK && 5512 has_cpu_shares) { 5513 zerr(gettext("%s zone.cpu-shares and %s are incompatible."), 5514 rt_to_str(RT_RCTL), rt_to_str(RT_DCPU)); 5515 saw_error = TRUE; 5516 if (ret_val == Z_OK) 5517 ret_val = Z_INCOMPATIBLE; 5518 } 5519 5520 if (has_cpu_shares && zonecfg_get_sched_class(handle, sched, 5521 sizeof (sched)) == Z_OK && strlen(sched) > 0 && 5522 strcmp(sched, "FSS") != 0) { 5523 zerr(gettext("WARNING: %s zone.cpu-shares and %s=%s are " 5524 "incompatible"), 5525 rt_to_str(RT_RCTL), rt_to_str(RT_SCHED), sched); 5526 saw_error = TRUE; 5527 if (ret_val == Z_OK) 5528 ret_val = Z_INCOMPATIBLE; 5529 } 5530 5531 if (pset_res == Z_OK && has_cpu_cap) { 5532 zerr(gettext("%s zone.cpu-cap and the %s are incompatible."), 5533 rt_to_str(RT_RCTL), rt_to_str(RT_DCPU)); 5534 saw_error = TRUE; 5535 if (ret_val == Z_OK) 5536 ret_val = Z_INCOMPATIBLE; 5537 } 5538 5539 if ((err = zonecfg_setattrent(handle)) != Z_OK) { 5540 zone_perror(zone, err, TRUE); 5541 return; 5542 } 5543 while (zonecfg_getattrent(handle, &attrtab) == Z_OK) { 5544 check_reqd_prop(attrtab.zone_attr_name, RT_ATTR, PT_NAME, 5545 &ret_val); 5546 check_reqd_prop(attrtab.zone_attr_type, RT_ATTR, PT_TYPE, 5547 &ret_val); 5548 check_reqd_prop(attrtab.zone_attr_value, RT_ATTR, PT_VALUE, 5549 &ret_val); 5550 } 5551 (void) zonecfg_endattrent(handle); 5552 5553 if ((err = zonecfg_setdsent(handle)) != Z_OK) { 5554 zone_perror(zone, err, TRUE); 5555 return; 5556 } 5557 while (zonecfg_getdsent(handle, &dstab) == Z_OK) { 5558 if (strlen(dstab.zone_dataset_name) == 0) { 5559 zerr("%s: %s %s", rt_to_str(RT_DATASET), 5560 pt_to_str(PT_NAME), gettext("not specified")); 5561 saw_error = TRUE; 5562 if (ret_val == Z_OK) 5563 ret_val = Z_REQD_PROPERTY_MISSING; 5564 } else if (!zfs_name_valid(dstab.zone_dataset_name, 5565 ZFS_TYPE_FILESYSTEM)) { 5566 zerr("%s: %s %s", rt_to_str(RT_DATASET), 5567 pt_to_str(PT_NAME), gettext("invalid")); 5568 saw_error = TRUE; 5569 if (ret_val == Z_OK) 5570 ret_val = Z_BAD_PROPERTY; 5571 } 5572 5573 } 5574 (void) zonecfg_enddsent(handle); 5575 5576 if (!global_scope) { 5577 zerr(gettext("resource specification incomplete")); 5578 saw_error = TRUE; 5579 if (ret_val == Z_OK) 5580 ret_val = Z_INSUFFICIENT_SPEC; 5581 } 5582 5583 if (save) { 5584 if (ret_val == Z_OK) { 5585 if ((ret_val = zonecfg_save(handle)) == Z_OK) { 5586 need_to_commit = FALSE; 5587 (void) strlcpy(revert_zone, zone, 5588 sizeof (revert_zone)); 5589 } 5590 } else { 5591 zerr(gettext("Zone %s failed to verify"), zone); 5592 } 5593 } 5594 if (ret_val != Z_OK) 5595 zone_perror(zone, ret_val, TRUE); 5596 } 5597 5598 void 5599 cancel_func(cmd_t *cmd) 5600 { 5601 int arg; 5602 bool arg_err = FALSE; 5603 5604 assert(cmd != NULL); 5605 5606 optind = 0; 5607 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 5608 switch (arg) { 5609 case '?': 5610 longer_usage(CMD_CANCEL); 5611 arg_err = TRUE; 5612 break; 5613 default: 5614 short_usage(CMD_CANCEL); 5615 arg_err = TRUE; 5616 break; 5617 } 5618 } 5619 if (arg_err) 5620 return; 5621 5622 if (optind != cmd->cmd_argc) { 5623 short_usage(CMD_CANCEL); 5624 return; 5625 } 5626 5627 if (global_scope) 5628 scope_usage(CMD_CANCEL); 5629 global_scope = TRUE; 5630 zonecfg_free_fs_option_list(in_progress_fstab.zone_fs_options); 5631 bzero(&in_progress_fstab, sizeof (in_progress_fstab)); 5632 bzero(&in_progress_nwiftab, sizeof (in_progress_nwiftab)); 5633 bzero(&in_progress_ipdtab, sizeof (in_progress_ipdtab)); 5634 bzero(&in_progress_devtab, sizeof (in_progress_devtab)); 5635 zonecfg_free_rctl_value_list(in_progress_rctltab.zone_rctl_valptr); 5636 bzero(&in_progress_rctltab, sizeof (in_progress_rctltab)); 5637 bzero(&in_progress_attrtab, sizeof (in_progress_attrtab)); 5638 bzero(&in_progress_dstab, sizeof (in_progress_dstab)); 5639 } 5640 5641 static int 5642 validate_attr_name(char *name) 5643 { 5644 int i; 5645 5646 if (!isalnum(name[0])) { 5647 zerr(gettext("Invalid %s %s %s: must start with an alpha-" 5648 "numeric character."), rt_to_str(RT_ATTR), 5649 pt_to_str(PT_NAME), name); 5650 return (Z_INVAL); 5651 } 5652 for (i = 1; name[i]; i++) 5653 if (!isalnum(name[i]) && name[i] != '-' && name[i] != '.') { 5654 zerr(gettext("Invalid %s %s %s: can only contain " 5655 "alpha-numeric characters, plus '-' and '.'."), 5656 rt_to_str(RT_ATTR), pt_to_str(PT_NAME), name); 5657 return (Z_INVAL); 5658 } 5659 return (Z_OK); 5660 } 5661 5662 static int 5663 validate_attr_type_val(struct zone_attrtab *attrtab) 5664 { 5665 boolean_t boolval; 5666 int64_t intval; 5667 char strval[MAXNAMELEN]; 5668 uint64_t uintval; 5669 5670 if (strcmp(attrtab->zone_attr_type, "boolean") == 0) { 5671 if (zonecfg_get_attr_boolean(attrtab, &boolval) == Z_OK) 5672 return (Z_OK); 5673 zerr(gettext("invalid %s value for %s=%s"), 5674 rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "boolean"); 5675 return (Z_ERR); 5676 } 5677 5678 if (strcmp(attrtab->zone_attr_type, "int") == 0) { 5679 if (zonecfg_get_attr_int(attrtab, &intval) == Z_OK) 5680 return (Z_OK); 5681 zerr(gettext("invalid %s value for %s=%s"), 5682 rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "int"); 5683 return (Z_ERR); 5684 } 5685 5686 if (strcmp(attrtab->zone_attr_type, "string") == 0) { 5687 if (zonecfg_get_attr_string(attrtab, strval, 5688 sizeof (strval)) == Z_OK) 5689 return (Z_OK); 5690 zerr(gettext("invalid %s value for %s=%s"), 5691 rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "string"); 5692 return (Z_ERR); 5693 } 5694 5695 if (strcmp(attrtab->zone_attr_type, "uint") == 0) { 5696 if (zonecfg_get_attr_uint(attrtab, &uintval) == Z_OK) 5697 return (Z_OK); 5698 zerr(gettext("invalid %s value for %s=%s"), 5699 rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "uint"); 5700 return (Z_ERR); 5701 } 5702 5703 zerr(gettext("invalid %s %s '%s'"), rt_to_str(RT_ATTR), 5704 pt_to_str(PT_TYPE), attrtab->zone_attr_type); 5705 return (Z_ERR); 5706 } 5707 5708 /* 5709 * Helper function for end_func-- checks the existence of a given property 5710 * and emits a message if not specified. 5711 */ 5712 static int 5713 end_check_reqd(char *attr, int pt, bool *validation_failed) 5714 { 5715 if (strlen(attr) == 0) { 5716 *validation_failed = TRUE; 5717 zerr(gettext("%s not specified"), pt_to_str(pt)); 5718 return (Z_ERR); 5719 } 5720 return (Z_OK); 5721 } 5722 5723 void 5724 end_func(cmd_t *cmd) 5725 { 5726 bool validation_failed = FALSE; 5727 bool arg_err = FALSE; 5728 struct zone_fstab tmp_fstab; 5729 struct zone_nwiftab tmp_nwiftab; 5730 struct zone_devtab tmp_devtab; 5731 struct zone_rctltab tmp_rctltab; 5732 struct zone_attrtab tmp_attrtab; 5733 struct zone_dstab tmp_dstab; 5734 int err, arg, res1, res2, res3; 5735 uint64_t swap_limit; 5736 uint64_t locked_limit; 5737 uint64_t proc_cap; 5738 5739 assert(cmd != NULL); 5740 5741 optind = 0; 5742 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 5743 switch (arg) { 5744 case '?': 5745 longer_usage(CMD_END); 5746 arg_err = TRUE; 5747 break; 5748 default: 5749 short_usage(CMD_END); 5750 arg_err = TRUE; 5751 break; 5752 } 5753 } 5754 if (arg_err) 5755 return; 5756 5757 if (optind != cmd->cmd_argc) { 5758 short_usage(CMD_END); 5759 return; 5760 } 5761 5762 if (global_scope) { 5763 scope_usage(CMD_END); 5764 return; 5765 } 5766 5767 assert(end_op == CMD_ADD || end_op == CMD_SELECT); 5768 5769 switch (resource_scope) { 5770 case RT_FS: 5771 /* First make sure everything was filled in. */ 5772 if (end_check_reqd(in_progress_fstab.zone_fs_dir, 5773 PT_DIR, &validation_failed) == Z_OK) { 5774 if (in_progress_fstab.zone_fs_dir[0] != '/') { 5775 zerr(gettext("%s %s is not an absolute path."), 5776 pt_to_str(PT_DIR), 5777 in_progress_fstab.zone_fs_dir); 5778 validation_failed = TRUE; 5779 } 5780 } 5781 5782 (void) end_check_reqd(in_progress_fstab.zone_fs_special, 5783 PT_SPECIAL, &validation_failed); 5784 5785 if (in_progress_fstab.zone_fs_raw[0] != '\0' && 5786 in_progress_fstab.zone_fs_raw[0] != '/') { 5787 zerr(gettext("%s %s is not an absolute path."), 5788 pt_to_str(PT_RAW), 5789 in_progress_fstab.zone_fs_raw); 5790 validation_failed = TRUE; 5791 } 5792 5793 (void) end_check_reqd(in_progress_fstab.zone_fs_type, PT_TYPE, 5794 &validation_failed); 5795 5796 if (validation_failed) { 5797 saw_error = TRUE; 5798 return; 5799 } 5800 5801 if (end_op == CMD_ADD) { 5802 /* Make sure there isn't already one like this. */ 5803 bzero(&tmp_fstab, sizeof (tmp_fstab)); 5804 (void) strlcpy(tmp_fstab.zone_fs_dir, 5805 in_progress_fstab.zone_fs_dir, 5806 sizeof (tmp_fstab.zone_fs_dir)); 5807 err = zonecfg_lookup_filesystem(handle, &tmp_fstab); 5808 zonecfg_free_fs_option_list(tmp_fstab.zone_fs_options); 5809 if (err == Z_OK) { 5810 zerr(gettext("A %s resource " 5811 "with the %s '%s' already exists."), 5812 rt_to_str(RT_FS), pt_to_str(PT_DIR), 5813 in_progress_fstab.zone_fs_dir); 5814 saw_error = TRUE; 5815 return; 5816 } 5817 err = zonecfg_add_filesystem(handle, 5818 &in_progress_fstab); 5819 } else { 5820 err = zonecfg_modify_filesystem(handle, &old_fstab, 5821 &in_progress_fstab); 5822 } 5823 zonecfg_free_fs_option_list(in_progress_fstab.zone_fs_options); 5824 in_progress_fstab.zone_fs_options = NULL; 5825 break; 5826 5827 case RT_IPD: 5828 /* First make sure everything was filled in. */ 5829 if (end_check_reqd(in_progress_ipdtab.zone_fs_dir, PT_DIR, 5830 &validation_failed) == Z_OK) { 5831 if (in_progress_ipdtab.zone_fs_dir[0] != '/') { 5832 zerr(gettext("%s %s is not an absolute path."), 5833 pt_to_str(PT_DIR), 5834 in_progress_ipdtab.zone_fs_dir); 5835 validation_failed = TRUE; 5836 } 5837 } 5838 if (validation_failed) { 5839 saw_error = TRUE; 5840 return; 5841 } 5842 5843 if (end_op == CMD_ADD) { 5844 /* Make sure there isn't already one like this. */ 5845 bzero(&tmp_fstab, sizeof (tmp_fstab)); 5846 (void) strlcpy(tmp_fstab.zone_fs_dir, 5847 in_progress_ipdtab.zone_fs_dir, 5848 sizeof (tmp_fstab.zone_fs_dir)); 5849 err = zonecfg_lookup_ipd(handle, &tmp_fstab); 5850 if (err == Z_OK) { 5851 zerr(gettext("An %s resource " 5852 "with the %s '%s' already exists."), 5853 rt_to_str(RT_IPD), pt_to_str(PT_DIR), 5854 in_progress_ipdtab.zone_fs_dir); 5855 saw_error = TRUE; 5856 return; 5857 } 5858 err = zonecfg_add_ipd(handle, &in_progress_ipdtab); 5859 } else { 5860 err = zonecfg_modify_ipd(handle, &old_ipdtab, 5861 &in_progress_ipdtab); 5862 } 5863 break; 5864 case RT_NET: 5865 /* 5866 * First make sure everything was filled in. 5867 * Since we don't know whether IP will be shared 5868 * or exclusive here, some checks are deferred until 5869 * the verify command. 5870 */ 5871 (void) end_check_reqd(in_progress_nwiftab.zone_nwif_physical, 5872 PT_PHYSICAL, &validation_failed); 5873 5874 if (validation_failed) { 5875 saw_error = TRUE; 5876 return; 5877 } 5878 if (end_op == CMD_ADD) { 5879 /* Make sure there isn't already one like this. */ 5880 bzero(&tmp_nwiftab, sizeof (tmp_nwiftab)); 5881 (void) strlcpy(tmp_nwiftab.zone_nwif_physical, 5882 in_progress_nwiftab.zone_nwif_physical, 5883 sizeof (tmp_nwiftab.zone_nwif_physical)); 5884 (void) strlcpy(tmp_nwiftab.zone_nwif_address, 5885 in_progress_nwiftab.zone_nwif_address, 5886 sizeof (tmp_nwiftab.zone_nwif_address)); 5887 if (zonecfg_lookup_nwif(handle, &tmp_nwiftab) == Z_OK) { 5888 zerr(gettext("A %s resource with the %s '%s', " 5889 "and %s '%s' already exists."), 5890 rt_to_str(RT_NET), 5891 pt_to_str(PT_PHYSICAL), 5892 in_progress_nwiftab.zone_nwif_physical, 5893 pt_to_str(PT_ADDRESS), 5894 in_progress_nwiftab.zone_nwif_address); 5895 saw_error = TRUE; 5896 return; 5897 } 5898 err = zonecfg_add_nwif(handle, &in_progress_nwiftab); 5899 } else { 5900 err = zonecfg_modify_nwif(handle, &old_nwiftab, 5901 &in_progress_nwiftab); 5902 } 5903 break; 5904 5905 case RT_DEVICE: 5906 /* First make sure everything was filled in. */ 5907 (void) end_check_reqd(in_progress_devtab.zone_dev_match, 5908 PT_MATCH, &validation_failed); 5909 5910 if (validation_failed) { 5911 saw_error = TRUE; 5912 return; 5913 } 5914 5915 if (end_op == CMD_ADD) { 5916 /* Make sure there isn't already one like this. */ 5917 (void) strlcpy(tmp_devtab.zone_dev_match, 5918 in_progress_devtab.zone_dev_match, 5919 sizeof (tmp_devtab.zone_dev_match)); 5920 if (zonecfg_lookup_dev(handle, &tmp_devtab) == Z_OK) { 5921 zerr(gettext("A %s resource with the %s '%s' " 5922 "already exists."), rt_to_str(RT_DEVICE), 5923 pt_to_str(PT_MATCH), 5924 in_progress_devtab.zone_dev_match); 5925 saw_error = TRUE; 5926 return; 5927 } 5928 err = zonecfg_add_dev(handle, &in_progress_devtab); 5929 } else { 5930 err = zonecfg_modify_dev(handle, &old_devtab, 5931 &in_progress_devtab); 5932 } 5933 break; 5934 5935 case RT_RCTL: 5936 /* First make sure everything was filled in. */ 5937 (void) end_check_reqd(in_progress_rctltab.zone_rctl_name, 5938 PT_NAME, &validation_failed); 5939 5940 if (in_progress_rctltab.zone_rctl_valptr == NULL) { 5941 zerr(gettext("no %s specified"), pt_to_str(PT_VALUE)); 5942 validation_failed = TRUE; 5943 } 5944 5945 if (validation_failed) { 5946 saw_error = TRUE; 5947 return; 5948 } 5949 5950 if (end_op == CMD_ADD) { 5951 /* Make sure there isn't already one like this. */ 5952 (void) strlcpy(tmp_rctltab.zone_rctl_name, 5953 in_progress_rctltab.zone_rctl_name, 5954 sizeof (tmp_rctltab.zone_rctl_name)); 5955 tmp_rctltab.zone_rctl_valptr = NULL; 5956 err = zonecfg_lookup_rctl(handle, &tmp_rctltab); 5957 zonecfg_free_rctl_value_list( 5958 tmp_rctltab.zone_rctl_valptr); 5959 if (err == Z_OK) { 5960 zerr(gettext("A %s resource " 5961 "with the %s '%s' already exists."), 5962 rt_to_str(RT_RCTL), pt_to_str(PT_NAME), 5963 in_progress_rctltab.zone_rctl_name); 5964 saw_error = TRUE; 5965 return; 5966 } 5967 err = zonecfg_add_rctl(handle, &in_progress_rctltab); 5968 } else { 5969 err = zonecfg_modify_rctl(handle, &old_rctltab, 5970 &in_progress_rctltab); 5971 } 5972 if (err == Z_OK) { 5973 zonecfg_free_rctl_value_list( 5974 in_progress_rctltab.zone_rctl_valptr); 5975 in_progress_rctltab.zone_rctl_valptr = NULL; 5976 } 5977 break; 5978 5979 case RT_ATTR: 5980 /* First make sure everything was filled in. */ 5981 (void) end_check_reqd(in_progress_attrtab.zone_attr_name, 5982 PT_NAME, &validation_failed); 5983 (void) end_check_reqd(in_progress_attrtab.zone_attr_type, 5984 PT_TYPE, &validation_failed); 5985 (void) end_check_reqd(in_progress_attrtab.zone_attr_value, 5986 PT_VALUE, &validation_failed); 5987 5988 if (validate_attr_name(in_progress_attrtab.zone_attr_name) != 5989 Z_OK) 5990 validation_failed = TRUE; 5991 5992 if (validate_attr_type_val(&in_progress_attrtab) != Z_OK) 5993 validation_failed = TRUE; 5994 5995 if (validation_failed) { 5996 saw_error = TRUE; 5997 return; 5998 } 5999 if (end_op == CMD_ADD) { 6000 /* Make sure there isn't already one like this. */ 6001 bzero(&tmp_attrtab, sizeof (tmp_attrtab)); 6002 (void) strlcpy(tmp_attrtab.zone_attr_name, 6003 in_progress_attrtab.zone_attr_name, 6004 sizeof (tmp_attrtab.zone_attr_name)); 6005 if (zonecfg_lookup_attr(handle, &tmp_attrtab) == Z_OK) { 6006 zerr(gettext("An %s resource " 6007 "with the %s '%s' already exists."), 6008 rt_to_str(RT_ATTR), pt_to_str(PT_NAME), 6009 in_progress_attrtab.zone_attr_name); 6010 saw_error = TRUE; 6011 return; 6012 } 6013 err = zonecfg_add_attr(handle, &in_progress_attrtab); 6014 } else { 6015 err = zonecfg_modify_attr(handle, &old_attrtab, 6016 &in_progress_attrtab); 6017 } 6018 break; 6019 case RT_DATASET: 6020 /* First make sure everything was filled in. */ 6021 if (strlen(in_progress_dstab.zone_dataset_name) == 0) { 6022 zerr("%s %s", pt_to_str(PT_NAME), 6023 gettext("not specified")); 6024 saw_error = TRUE; 6025 validation_failed = TRUE; 6026 } 6027 if (validation_failed) 6028 return; 6029 if (end_op == CMD_ADD) { 6030 /* Make sure there isn't already one like this. */ 6031 bzero(&tmp_dstab, sizeof (tmp_dstab)); 6032 (void) strlcpy(tmp_dstab.zone_dataset_name, 6033 in_progress_dstab.zone_dataset_name, 6034 sizeof (tmp_dstab.zone_dataset_name)); 6035 err = zonecfg_lookup_ds(handle, &tmp_dstab); 6036 if (err == Z_OK) { 6037 zerr(gettext("A %s resource " 6038 "with the %s '%s' already exists."), 6039 rt_to_str(RT_DATASET), pt_to_str(PT_NAME), 6040 in_progress_dstab.zone_dataset_name); 6041 saw_error = TRUE; 6042 return; 6043 } 6044 err = zonecfg_add_ds(handle, &in_progress_dstab); 6045 } else { 6046 err = zonecfg_modify_ds(handle, &old_dstab, 6047 &in_progress_dstab); 6048 } 6049 break; 6050 case RT_DCPU: 6051 /* Make sure everything was filled in. */ 6052 if (end_check_reqd(in_progress_psettab.zone_ncpu_min, 6053 PT_NCPUS, &validation_failed) != Z_OK) { 6054 saw_error = TRUE; 6055 return; 6056 } 6057 6058 if (end_op == CMD_ADD) { 6059 err = zonecfg_add_pset(handle, &in_progress_psettab); 6060 } else { 6061 err = zonecfg_modify_pset(handle, &in_progress_psettab); 6062 } 6063 break; 6064 case RT_PCAP: 6065 /* Make sure everything was filled in. */ 6066 if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &proc_cap) 6067 != Z_OK) { 6068 zerr(gettext("%s not specified"), pt_to_str(PT_NCPUS)); 6069 saw_error = TRUE; 6070 validation_failed = TRUE; 6071 return; 6072 } 6073 err = Z_OK; 6074 break; 6075 case RT_MCAP: 6076 /* Make sure everything was filled in. */ 6077 res1 = strlen(in_progress_mcaptab.zone_physmem_cap) == 0 ? 6078 Z_ERR : Z_OK; 6079 res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, 6080 &swap_limit); 6081 res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, 6082 &locked_limit); 6083 6084 if (res1 != Z_OK && res2 != Z_OK && res3 != Z_OK) { 6085 zerr(gettext("No property was specified. One of %s, " 6086 "%s or %s is required."), pt_to_str(PT_PHYSICAL), 6087 pt_to_str(PT_SWAP), pt_to_str(PT_LOCKED)); 6088 saw_error = TRUE; 6089 return; 6090 } 6091 6092 /* if phys & locked are both set, verify locked <= phys */ 6093 if (res1 == Z_OK && res3 == Z_OK) { 6094 uint64_t phys_limit; 6095 char *endp; 6096 6097 phys_limit = strtoull( 6098 in_progress_mcaptab.zone_physmem_cap, &endp, 10); 6099 if (phys_limit < locked_limit) { 6100 zerr(gettext("The %s cap must be less than or " 6101 "equal to the %s cap."), 6102 pt_to_str(PT_LOCKED), 6103 pt_to_str(PT_PHYSICAL)); 6104 saw_error = TRUE; 6105 return; 6106 } 6107 } 6108 6109 err = Z_OK; 6110 if (res1 == Z_OK) { 6111 /* 6112 * We could be ending from either an add operation 6113 * or a select operation. Since all of the properties 6114 * within this resource are optional, we always use 6115 * modify on the mcap entry. zonecfg_modify_mcap() 6116 * will handle both adding and modifying a memory cap. 6117 */ 6118 err = zonecfg_modify_mcap(handle, &in_progress_mcaptab); 6119 } else if (end_op == CMD_SELECT) { 6120 /* 6121 * If we're ending from a select and the physical 6122 * memory cap is empty then the user could have cleared 6123 * the physical cap value, so try to delete the entry. 6124 */ 6125 (void) zonecfg_delete_mcap(handle); 6126 } 6127 break; 6128 default: 6129 zone_perror(rt_to_str(resource_scope), Z_NO_RESOURCE_TYPE, 6130 TRUE); 6131 saw_error = TRUE; 6132 return; 6133 } 6134 6135 if (err != Z_OK) { 6136 zone_perror(zone, err, TRUE); 6137 } else { 6138 need_to_commit = TRUE; 6139 global_scope = TRUE; 6140 end_op = -1; 6141 } 6142 } 6143 6144 void 6145 commit_func(cmd_t *cmd) 6146 { 6147 int arg; 6148 bool arg_err = FALSE; 6149 6150 optind = 0; 6151 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) { 6152 switch (arg) { 6153 case '?': 6154 longer_usage(CMD_COMMIT); 6155 arg_err = TRUE; 6156 break; 6157 default: 6158 short_usage(CMD_COMMIT); 6159 arg_err = TRUE; 6160 break; 6161 } 6162 } 6163 if (arg_err) 6164 return; 6165 6166 if (optind != cmd->cmd_argc) { 6167 short_usage(CMD_COMMIT); 6168 return; 6169 } 6170 6171 if (zone_is_read_only(CMD_COMMIT)) 6172 return; 6173 6174 assert(cmd != NULL); 6175 6176 cmd->cmd_argc = 1; 6177 /* 6178 * cmd_arg normally comes from a strdup() in the lexer, and the 6179 * whole cmd structure and its (char *) attributes are freed at 6180 * the completion of each command, so the strdup() below is needed 6181 * to match this and prevent a core dump from trying to free() 6182 * something that can't be. 6183 */ 6184 if ((cmd->cmd_argv[0] = strdup("save")) == NULL) { 6185 zone_perror(zone, Z_NOMEM, TRUE); 6186 exit(Z_ERR); 6187 } 6188 cmd->cmd_argv[1] = NULL; 6189 verify_func(cmd); 6190 } 6191 6192 void 6193 revert_func(cmd_t *cmd) 6194 { 6195 char line[128]; /* enough to ask a question */ 6196 bool force = FALSE; 6197 bool arg_err = FALSE; 6198 int err, arg, answer; 6199 6200 optind = 0; 6201 while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) { 6202 switch (arg) { 6203 case '?': 6204 longer_usage(CMD_REVERT); 6205 arg_err = TRUE; 6206 break; 6207 case 'F': 6208 force = TRUE; 6209 break; 6210 default: 6211 short_usage(CMD_REVERT); 6212 arg_err = TRUE; 6213 break; 6214 } 6215 } 6216 if (arg_err) 6217 return; 6218 6219 if (optind != cmd->cmd_argc) { 6220 short_usage(CMD_REVERT); 6221 return; 6222 } 6223 6224 if (zone_is_read_only(CMD_REVERT)) 6225 return; 6226 6227 if (zonecfg_check_handle(handle) != Z_OK) { 6228 zerr(gettext("No changes to revert.")); 6229 saw_error = TRUE; 6230 return; 6231 } 6232 6233 if (!force) { 6234 (void) snprintf(line, sizeof (line), 6235 gettext("Are you sure you want to revert")); 6236 if ((answer = ask_yesno(FALSE, line)) == -1) { 6237 zerr(gettext("Input not from terminal and -F not " 6238 "specified:\n%s command ignored, exiting."), 6239 cmd_to_str(CMD_REVERT)); 6240 exit(Z_ERR); 6241 } 6242 if (answer != 1) 6243 return; 6244 } 6245 6246 /* 6247 * Time for a new handle: finish the old one off first 6248 * then get a new one properly to avoid leaks. 6249 */ 6250 zonecfg_fini_handle(handle); 6251 if ((handle = zonecfg_init_handle()) == NULL) { 6252 zone_perror(execname, Z_NOMEM, TRUE); 6253 exit(Z_ERR); 6254 } 6255 if ((err = zonecfg_get_handle(revert_zone, handle)) != Z_OK) { 6256 saw_error = TRUE; 6257 got_handle = FALSE; 6258 if (err == Z_NO_ZONE) 6259 zerr(gettext("%s: no such saved zone to revert to."), 6260 revert_zone); 6261 else 6262 zone_perror(zone, err, TRUE); 6263 } 6264 (void) strlcpy(zone, revert_zone, sizeof (zone)); 6265 } 6266 6267 void 6268 help_func(cmd_t *cmd) 6269 { 6270 int i; 6271 6272 assert(cmd != NULL); 6273 6274 if (cmd->cmd_argc == 0) { 6275 usage(TRUE, global_scope ? HELP_SUBCMDS : HELP_RES_SCOPE); 6276 return; 6277 } 6278 if (strcmp(cmd->cmd_argv[0], "usage") == 0) { 6279 usage(TRUE, HELP_USAGE); 6280 return; 6281 } 6282 if (strcmp(cmd->cmd_argv[0], "commands") == 0) { 6283 usage(TRUE, HELP_SUBCMDS); 6284 return; 6285 } 6286 if (strcmp(cmd->cmd_argv[0], "syntax") == 0) { 6287 usage(TRUE, HELP_SYNTAX | HELP_RES_PROPS); 6288 return; 6289 } 6290 if (strcmp(cmd->cmd_argv[0], "-?") == 0) { 6291 longer_usage(CMD_HELP); 6292 return; 6293 } 6294 6295 for (i = 0; i <= CMD_MAX; i++) { 6296 if (strcmp(cmd->cmd_argv[0], cmd_to_str(i)) == 0) { 6297 longer_usage(i); 6298 return; 6299 } 6300 } 6301 /* We do not use zerr() here because we do not want its extra \n. */ 6302 (void) fprintf(stderr, gettext("Unknown help subject %s. "), 6303 cmd->cmd_argv[0]); 6304 usage(FALSE, HELP_META); 6305 } 6306 6307 static int 6308 string_to_yyin(char *string) 6309 { 6310 if ((yyin = tmpfile()) == NULL) { 6311 zone_perror(execname, Z_TEMP_FILE, TRUE); 6312 return (Z_ERR); 6313 } 6314 if (fwrite(string, strlen(string), 1, yyin) != 1) { 6315 zone_perror(execname, Z_TEMP_FILE, TRUE); 6316 return (Z_ERR); 6317 } 6318 if (fseek(yyin, 0, SEEK_SET) != 0) { 6319 zone_perror(execname, Z_TEMP_FILE, TRUE); 6320 return (Z_ERR); 6321 } 6322 return (Z_OK); 6323 } 6324 6325 /* This is the back-end helper function for read_input() below. */ 6326 6327 static int 6328 cleanup() 6329 { 6330 int answer; 6331 cmd_t *cmd; 6332 6333 if (!interactive_mode && !cmd_file_mode) { 6334 /* 6335 * If we're not in interactive mode, and we're not in command 6336 * file mode, then we must be in commands-from-the-command-line 6337 * mode. As such, we can't loop back and ask for more input. 6338 * It was OK to prompt for such things as whether or not to 6339 * really delete a zone in the command handler called from 6340 * yyparse() above, but "really quit?" makes no sense in this 6341 * context. So disable prompting. 6342 */ 6343 ok_to_prompt = FALSE; 6344 } 6345 if (!global_scope) { 6346 if (!time_to_exit) { 6347 /* 6348 * Just print a simple error message in the -1 case, 6349 * since exit_func() already handles that case, and 6350 * EOF means we are finished anyway. 6351 */ 6352 answer = ask_yesno(FALSE, 6353 gettext("Resource incomplete; really quit")); 6354 if (answer == -1) { 6355 zerr(gettext("Resource incomplete.")); 6356 return (Z_ERR); 6357 } 6358 if (answer != 1) { 6359 yyin = stdin; 6360 return (Z_REPEAT); 6361 } 6362 } else { 6363 saw_error = TRUE; 6364 } 6365 } 6366 /* 6367 * Make sure we tried something and that the handle checks 6368 * out, or we would get a false error trying to commit. 6369 */ 6370 if (need_to_commit && zonecfg_check_handle(handle) == Z_OK) { 6371 if ((cmd = alloc_cmd()) == NULL) { 6372 zone_perror(zone, Z_NOMEM, TRUE); 6373 return (Z_ERR); 6374 } 6375 cmd->cmd_argc = 0; 6376 cmd->cmd_argv[0] = NULL; 6377 commit_func(cmd); 6378 free_cmd(cmd); 6379 /* 6380 * need_to_commit will get set back to FALSE if the 6381 * configuration is saved successfully. 6382 */ 6383 if (need_to_commit) { 6384 if (force_exit) { 6385 zerr(gettext("Configuration not saved.")); 6386 return (Z_ERR); 6387 } 6388 answer = ask_yesno(FALSE, 6389 gettext("Configuration not saved; really quit")); 6390 if (answer == -1) { 6391 zerr(gettext("Configuration not saved.")); 6392 return (Z_ERR); 6393 } 6394 if (answer != 1) { 6395 time_to_exit = FALSE; 6396 yyin = stdin; 6397 return (Z_REPEAT); 6398 } 6399 } 6400 } 6401 return ((need_to_commit || saw_error) ? Z_ERR : Z_OK); 6402 } 6403 6404 /* 6405 * read_input() is the driver of this program. It is a wrapper around 6406 * yyparse(), printing appropriate prompts when needed, checking for 6407 * exit conditions and reacting appropriately [the latter in its cleanup() 6408 * helper function]. 6409 * 6410 * Like most zonecfg functions, it returns Z_OK or Z_ERR, *or* Z_REPEAT 6411 * so do_interactive() knows that we are not really done (i.e, we asked 6412 * the user if we should really quit and the user said no). 6413 */ 6414 static int 6415 read_input() 6416 { 6417 bool yyin_is_a_tty = isatty(fileno(yyin)); 6418 /* 6419 * The prompt is "e:z> " or "e:z:r> " where e is execname, z is zone 6420 * and r is resource_scope: 5 is for the two ":"s + "> " + terminator. 6421 */ 6422 char prompt[MAXPATHLEN + ZONENAME_MAX + MAX_RT_STRLEN + 5], *line; 6423 6424 /* yyin should have been set to the appropriate (FILE *) if not stdin */ 6425 newline_terminated = TRUE; 6426 for (;;) { 6427 if (yyin_is_a_tty) { 6428 if (newline_terminated) { 6429 if (global_scope) 6430 (void) snprintf(prompt, sizeof (prompt), 6431 "%s:%s> ", execname, zone); 6432 else 6433 (void) snprintf(prompt, sizeof (prompt), 6434 "%s:%s:%s> ", execname, zone, 6435 rt_to_str(resource_scope)); 6436 } 6437 /* 6438 * If the user hits ^C then we want to catch it and 6439 * start over. If the user hits EOF then we want to 6440 * bail out. 6441 */ 6442 line = gl_get_line(gl, prompt, NULL, -1); 6443 if (gl_return_status(gl) == GLR_SIGNAL) { 6444 gl_abandon_line(gl); 6445 continue; 6446 } 6447 if (line == NULL) 6448 break; 6449 (void) string_to_yyin(line); 6450 while (!feof(yyin)) 6451 yyparse(); 6452 } else { 6453 yyparse(); 6454 } 6455 /* Bail out on an error in command file mode. */ 6456 if (saw_error && cmd_file_mode && !interactive_mode) 6457 time_to_exit = TRUE; 6458 if (time_to_exit || (!yyin_is_a_tty && feof(yyin))) 6459 break; 6460 } 6461 return (cleanup()); 6462 } 6463 6464 /* 6465 * This function is used in the zonecfg-interactive-mode scenario: it just 6466 * calls read_input() until we are done. 6467 */ 6468 6469 static int 6470 do_interactive(void) 6471 { 6472 int err; 6473 6474 interactive_mode = TRUE; 6475 if (!read_only_mode) { 6476 /* 6477 * Try to set things up proactively in interactive mode, so 6478 * that if the zone in question does not exist yet, we can 6479 * provide the user with a clue. 6480 */ 6481 (void) initialize(FALSE); 6482 } 6483 do { 6484 err = read_input(); 6485 } while (err == Z_REPEAT); 6486 return (err); 6487 } 6488 6489 /* 6490 * cmd_file is slightly more complicated, as it has to open the command file 6491 * and set yyin appropriately. Once that is done, though, it just calls 6492 * read_input(), and only once, since prompting is not possible. 6493 */ 6494 6495 static int 6496 cmd_file(char *file) 6497 { 6498 FILE *infile; 6499 int err; 6500 struct stat statbuf; 6501 bool using_real_file = (strcmp(file, "-") != 0); 6502 6503 if (using_real_file) { 6504 /* 6505 * zerr() prints a line number in cmd_file_mode, which we do 6506 * not want here, so temporarily unset it. 6507 */ 6508 cmd_file_mode = FALSE; 6509 if ((infile = fopen(file, "r")) == NULL) { 6510 zerr(gettext("could not open file %s: %s"), 6511 file, strerror(errno)); 6512 return (Z_ERR); 6513 } 6514 if ((err = fstat(fileno(infile), &statbuf)) != 0) { 6515 zerr(gettext("could not stat file %s: %s"), 6516 file, strerror(errno)); 6517 err = Z_ERR; 6518 goto done; 6519 } 6520 if (!S_ISREG(statbuf.st_mode)) { 6521 zerr(gettext("%s is not a regular file."), file); 6522 err = Z_ERR; 6523 goto done; 6524 } 6525 yyin = infile; 6526 cmd_file_mode = TRUE; 6527 ok_to_prompt = FALSE; 6528 } else { 6529 /* 6530 * "-f -" is essentially the same as interactive mode, 6531 * so treat it that way. 6532 */ 6533 interactive_mode = TRUE; 6534 } 6535 /* Z_REPEAT is for interactive mode; treat it like Z_ERR here. */ 6536 if ((err = read_input()) == Z_REPEAT) 6537 err = Z_ERR; 6538 done: 6539 if (using_real_file) 6540 (void) fclose(infile); 6541 return (err); 6542 } 6543 6544 /* 6545 * Since yacc is based on reading from a (FILE *) whereas what we get from 6546 * the command line is in argv format, we need to convert when the user 6547 * gives us commands directly from the command line. That is done here by 6548 * concatenating the argv list into a space-separated string, writing it 6549 * to a temp file, and rewinding the file so yyin can be set to it. Then 6550 * we call read_input(), and only once, since prompting about whether to 6551 * continue or quit would make no sense in this context. 6552 */ 6553 6554 static int 6555 one_command_at_a_time(int argc, char *argv[]) 6556 { 6557 char *command; 6558 size_t len = 2; /* terminal \n\0 */ 6559 int i, err; 6560 6561 for (i = 0; i < argc; i++) 6562 len += strlen(argv[i]) + 1; 6563 if ((command = malloc(len)) == NULL) { 6564 zone_perror(execname, Z_NOMEM, TRUE); 6565 return (Z_ERR); 6566 } 6567 (void) strlcpy(command, argv[0], len); 6568 for (i = 1; i < argc; i++) { 6569 (void) strlcat(command, " ", len); 6570 (void) strlcat(command, argv[i], len); 6571 } 6572 (void) strlcat(command, "\n", len); 6573 err = string_to_yyin(command); 6574 free(command); 6575 if (err != Z_OK) 6576 return (err); 6577 while (!feof(yyin)) 6578 yyparse(); 6579 return (cleanup()); 6580 } 6581 6582 static char * 6583 get_execbasename(char *execfullname) 6584 { 6585 char *last_slash, *execbasename; 6586 6587 /* guard against '/' at end of command invocation */ 6588 for (;;) { 6589 last_slash = strrchr(execfullname, '/'); 6590 if (last_slash == NULL) { 6591 execbasename = execfullname; 6592 break; 6593 } else { 6594 execbasename = last_slash + 1; 6595 if (*execbasename == '\0') { 6596 *last_slash = '\0'; 6597 continue; 6598 } 6599 break; 6600 } 6601 } 6602 return (execbasename); 6603 } 6604 6605 int 6606 main(int argc, char *argv[]) 6607 { 6608 int err, arg; 6609 struct stat st; 6610 6611 /* This must be before anything goes to stdout. */ 6612 setbuf(stdout, NULL); 6613 6614 saw_error = FALSE; 6615 cmd_file_mode = FALSE; 6616 execname = get_execbasename(argv[0]); 6617 6618 (void) setlocale(LC_ALL, ""); 6619 (void) textdomain(TEXT_DOMAIN); 6620 6621 if (getzoneid() != GLOBAL_ZONEID) { 6622 zerr(gettext("%s can only be run from the global zone."), 6623 execname); 6624 exit(Z_ERR); 6625 } 6626 6627 if (argc < 2) { 6628 usage(FALSE, HELP_USAGE | HELP_SUBCMDS); 6629 exit(Z_USAGE); 6630 } 6631 if (strcmp(argv[1], cmd_to_str(CMD_HELP)) == 0) { 6632 (void) one_command_at_a_time(argc - 1, &(argv[1])); 6633 exit(Z_OK); 6634 } 6635 6636 while ((arg = getopt(argc, argv, "?f:R:z:")) != EOF) { 6637 switch (arg) { 6638 case '?': 6639 if (optopt == '?') 6640 usage(TRUE, HELP_USAGE | HELP_SUBCMDS); 6641 else 6642 usage(FALSE, HELP_USAGE); 6643 exit(Z_USAGE); 6644 /* NOTREACHED */ 6645 case 'f': 6646 cmd_file_name = optarg; 6647 cmd_file_mode = TRUE; 6648 break; 6649 case 'R': 6650 if (*optarg != '/') { 6651 zerr(gettext("root path must be absolute: %s"), 6652 optarg); 6653 exit(Z_USAGE); 6654 } 6655 if (stat(optarg, &st) == -1 || !S_ISDIR(st.st_mode)) { 6656 zerr(gettext( 6657 "root path must be a directory: %s"), 6658 optarg); 6659 exit(Z_USAGE); 6660 } 6661 zonecfg_set_root(optarg); 6662 break; 6663 case 'z': 6664 if (strcmp(optarg, GLOBAL_ZONENAME) == 0) { 6665 global_zone = TRUE; 6666 } else if (zonecfg_validate_zonename(optarg) != Z_OK) { 6667 zone_perror(optarg, Z_BOGUS_ZONE_NAME, TRUE); 6668 usage(FALSE, HELP_SYNTAX); 6669 exit(Z_USAGE); 6670 } 6671 (void) strlcpy(zone, optarg, sizeof (zone)); 6672 (void) strlcpy(revert_zone, optarg, sizeof (zone)); 6673 break; 6674 default: 6675 usage(FALSE, HELP_USAGE); 6676 exit(Z_USAGE); 6677 } 6678 } 6679 6680 if (optind > argc || strcmp(zone, "") == 0) { 6681 usage(FALSE, HELP_USAGE); 6682 exit(Z_USAGE); 6683 } 6684 6685 if ((err = zonecfg_access(zone, W_OK)) == Z_OK) { 6686 read_only_mode = FALSE; 6687 } else if (err == Z_ACCES) { 6688 read_only_mode = TRUE; 6689 /* skip this message in one-off from command line mode */ 6690 if (optind == argc) 6691 (void) fprintf(stderr, gettext("WARNING: you do not " 6692 "have write access to this zone's configuration " 6693 "file;\ngoing into read-only mode.\n")); 6694 } else { 6695 fprintf(stderr, "%s: Could not access zone configuration " 6696 "store: %s\n", execname, zonecfg_strerror(err)); 6697 exit(Z_ERR); 6698 } 6699 6700 if ((handle = zonecfg_init_handle()) == NULL) { 6701 zone_perror(execname, Z_NOMEM, TRUE); 6702 exit(Z_ERR); 6703 } 6704 6705 /* 6706 * This may get set back to FALSE again in cmd_file() if cmd_file_name 6707 * is a "real" file as opposed to "-" (i.e. meaning use stdin). 6708 */ 6709 if (isatty(STDIN_FILENO)) 6710 ok_to_prompt = TRUE; 6711 if ((gl = new_GetLine(MAX_LINE_LEN, MAX_CMD_HIST)) == NULL) 6712 exit(Z_ERR); 6713 if (gl_customize_completion(gl, NULL, cmd_cpl_fn) != 0) 6714 exit(Z_ERR); 6715 (void) sigset(SIGINT, SIG_IGN); 6716 if (optind == argc) { 6717 if (!cmd_file_mode) 6718 err = do_interactive(); 6719 else 6720 err = cmd_file(cmd_file_name); 6721 } else { 6722 err = one_command_at_a_time(argc - optind, &(argv[optind])); 6723 } 6724 zonecfg_fini_handle(handle); 6725 if (brand != NULL) 6726 brand_close(brand); 6727 (void) del_GetLine(gl); 6728 return (err); 6729 } 6730