1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2010 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 #include <libsysevent.h> 28 #include <pthread.h> 29 #include <stdlib.h> 30 #include <errno.h> 31 #include <fnmatch.h> 32 #include <strings.h> 33 #include <unistd.h> 34 #include <assert.h> 35 #include <libgen.h> 36 #include <libintl.h> 37 #include <alloca.h> 38 #include <ctype.h> 39 #include <sys/acl.h> 40 #include <sys/stat.h> 41 #include <sys/brand.h> 42 #include <sys/mntio.h> 43 #include <sys/mnttab.h> 44 #include <sys/nvpair.h> 45 #include <sys/types.h> 46 #include <sys/sockio.h> 47 #include <sys/systeminfo.h> 48 #include <ftw.h> 49 #include <pool.h> 50 #include <libscf.h> 51 #include <libproc.h> 52 #include <sys/priocntl.h> 53 #include <libuutil.h> 54 #include <wait.h> 55 #include <bsm/adt.h> 56 57 #include <arpa/inet.h> 58 #include <netdb.h> 59 60 #include <libxml/xmlmemory.h> 61 #include <libxml/parser.h> 62 63 #include <libdevinfo.h> 64 #include <uuid/uuid.h> 65 #include <dirent.h> 66 #include <libbrand.h> 67 68 #include <libzonecfg.h> 69 #include "zonecfg_impl.h" 70 71 #define _PATH_TMPFILE "/zonecfg.XXXXXX" 72 #define ZONE_CB_RETRY_COUNT 10 73 #define ZONE_EVENT_PING_SUBCLASS "ping" 74 #define ZONE_EVENT_PING_PUBLISHER "solaris" 75 76 /* Hard-code the DTD element/attribute/entity names just once, here. */ 77 #define DTD_ELEM_ATTR (const xmlChar *) "attr" 78 #define DTD_ELEM_COMMENT (const xmlChar *) "comment" 79 #define DTD_ELEM_DEVICE (const xmlChar *) "device" 80 #define DTD_ELEM_FS (const xmlChar *) "filesystem" 81 #define DTD_ELEM_FSOPTION (const xmlChar *) "fsoption" 82 #define DTD_ELEM_IPD (const xmlChar *) "inherited-pkg-dir" 83 #define DTD_ELEM_NET (const xmlChar *) "network" 84 #define DTD_ELEM_RCTL (const xmlChar *) "rctl" 85 #define DTD_ELEM_RCTLVALUE (const xmlChar *) "rctl-value" 86 #define DTD_ELEM_ZONE (const xmlChar *) "zone" 87 #define DTD_ELEM_DATASET (const xmlChar *) "dataset" 88 #define DTD_ELEM_TMPPOOL (const xmlChar *) "tmp_pool" 89 #define DTD_ELEM_PSET (const xmlChar *) "pset" 90 #define DTD_ELEM_MCAP (const xmlChar *) "mcap" 91 #define DTD_ELEM_PACKAGE (const xmlChar *) "package" 92 #define DTD_ELEM_PATCH (const xmlChar *) "patch" 93 #define DTD_ELEM_OBSOLETES (const xmlChar *) "obsoletes" 94 #define DTD_ELEM_DEV_PERM (const xmlChar *) "dev-perm" 95 96 #define DTD_ATTR_ACTION (const xmlChar *) "action" 97 #define DTD_ATTR_ADDRESS (const xmlChar *) "address" 98 #define DTD_ATTR_AUTOBOOT (const xmlChar *) "autoboot" 99 #define DTD_ATTR_IPTYPE (const xmlChar *) "ip-type" 100 #define DTD_ATTR_DEFROUTER (const xmlChar *) "defrouter" 101 #define DTD_ATTR_DIR (const xmlChar *) "directory" 102 #define DTD_ATTR_LIMIT (const xmlChar *) "limit" 103 #define DTD_ATTR_LIMITPRIV (const xmlChar *) "limitpriv" 104 #define DTD_ATTR_BOOTARGS (const xmlChar *) "bootargs" 105 #define DTD_ATTR_SCHED (const xmlChar *) "scheduling-class" 106 #define DTD_ATTR_MATCH (const xmlChar *) "match" 107 #define DTD_ATTR_NAME (const xmlChar *) "name" 108 #define DTD_ATTR_PHYSICAL (const xmlChar *) "physical" 109 #define DTD_ATTR_POOL (const xmlChar *) "pool" 110 #define DTD_ATTR_PRIV (const xmlChar *) "priv" 111 #define DTD_ATTR_RAW (const xmlChar *) "raw" 112 #define DTD_ATTR_SPECIAL (const xmlChar *) "special" 113 #define DTD_ATTR_TYPE (const xmlChar *) "type" 114 #define DTD_ATTR_VALUE (const xmlChar *) "value" 115 #define DTD_ATTR_ZONEPATH (const xmlChar *) "zonepath" 116 #define DTD_ATTR_NCPU_MIN (const xmlChar *) "ncpu_min" 117 #define DTD_ATTR_NCPU_MAX (const xmlChar *) "ncpu_max" 118 #define DTD_ATTR_IMPORTANCE (const xmlChar *) "importance" 119 #define DTD_ATTR_PHYSCAP (const xmlChar *) "physcap" 120 #define DTD_ATTR_VERSION (const xmlChar *) "version" 121 #define DTD_ATTR_ID (const xmlChar *) "id" 122 #define DTD_ATTR_UID (const xmlChar *) "uid" 123 #define DTD_ATTR_GID (const xmlChar *) "gid" 124 #define DTD_ATTR_MODE (const xmlChar *) "mode" 125 #define DTD_ATTR_ACL (const xmlChar *) "acl" 126 #define DTD_ATTR_BRAND (const xmlChar *) "brand" 127 #define DTD_ATTR_HOSTID (const xmlChar *) "hostid" 128 129 #define DTD_ENTITY_BOOLEAN "boolean" 130 #define DTD_ENTITY_DEVPATH "devpath" 131 #define DTD_ENTITY_DRIVER "driver" 132 #define DTD_ENTITY_DRVMIN "drv_min" 133 #define DTD_ENTITY_FALSE "false" 134 #define DTD_ENTITY_INT "int" 135 #define DTD_ENTITY_STRING "string" 136 #define DTD_ENTITY_TRUE "true" 137 #define DTD_ENTITY_UINT "uint" 138 139 #define DTD_ENTITY_BOOL_LEN 6 /* "false" */ 140 141 #define ATTACH_FORCED "SUNWattached.xml" 142 143 #define TMP_POOL_NAME "SUNWtmp_%s" 144 #define MAX_TMP_POOL_NAME (ZONENAME_MAX + 9) 145 #define RCAP_SERVICE "system/rcap:default" 146 #define POOLD_SERVICE "system/pools/dynamic:default" 147 148 /* 149 * rctl alias definitions 150 * 151 * This holds the alias, the full rctl name, the default priv value, action 152 * and lower limit. The functions that handle rctl aliases step through 153 * this table, matching on the alias, and using the full values for setting 154 * the rctl entry as well the limit for validation. 155 */ 156 static struct alias { 157 char *shortname; 158 char *realname; 159 char *priv; 160 char *action; 161 uint64_t low_limit; 162 } aliases[] = { 163 {ALIAS_MAXLWPS, "zone.max-lwps", "privileged", "deny", 100}, 164 {ALIAS_MAXSHMMEM, "zone.max-shm-memory", "privileged", "deny", 0}, 165 {ALIAS_MAXSHMIDS, "zone.max-shm-ids", "privileged", "deny", 0}, 166 {ALIAS_MAXMSGIDS, "zone.max-msg-ids", "privileged", "deny", 0}, 167 {ALIAS_MAXSEMIDS, "zone.max-sem-ids", "privileged", "deny", 0}, 168 {ALIAS_MAXLOCKEDMEM, "zone.max-locked-memory", "privileged", "deny", 0}, 169 {ALIAS_MAXSWAP, "zone.max-swap", "privileged", "deny", 0}, 170 {ALIAS_SHARES, "zone.cpu-shares", "privileged", "none", 0}, 171 {ALIAS_CPUCAP, "zone.cpu-cap", "privileged", "deny", 0}, 172 {NULL, NULL, NULL, NULL, 0} 173 }; 174 175 /* 176 * Structure for applying rctls to a running zone. It allows important 177 * process values to be passed together easily. 178 */ 179 typedef struct pr_info_handle { 180 struct ps_prochandle *pr; 181 pid_t pid; 182 } pr_info_handle_t; 183 184 struct zone_dochandle { 185 char *zone_dh_rootdir; 186 xmlDocPtr zone_dh_doc; 187 xmlNodePtr zone_dh_cur; 188 xmlNodePtr zone_dh_top; 189 boolean_t zone_dh_newzone; 190 boolean_t zone_dh_snapshot; 191 boolean_t zone_dh_sw_inv; 192 char zone_dh_delete_name[ZONENAME_MAX]; 193 }; 194 195 struct znotify { 196 void * zn_private; 197 evchan_t *zn_eventchan; 198 int (*zn_callback)(const char *zonename, zoneid_t zid, 199 const char *newstate, const char *oldstate, hrtime_t when, void *p); 200 pthread_mutex_t zn_mutex; 201 pthread_cond_t zn_cond; 202 pthread_mutex_t zn_bigmutex; 203 volatile enum {ZN_UNLOCKED, ZN_LOCKED, ZN_PING_INFLIGHT, 204 ZN_PING_RECEIVED} zn_state; 205 char zn_subscriber_id[MAX_SUBID_LEN]; 206 volatile boolean_t zn_failed; 207 int zn_failure_count; 208 }; 209 210 /* used to track nested zone-lock operations */ 211 static int zone_lock_cnt = 0; 212 213 /* used to communicate lock status to children */ 214 #define LOCK_ENV_VAR "_ZONEADM_LOCK_HELD" 215 static char zoneadm_lock_held[] = LOCK_ENV_VAR"=1"; 216 static char zoneadm_lock_not_held[] = LOCK_ENV_VAR"=0"; 217 218 char *zonecfg_root = ""; 219 220 /* 221 * For functions which return int, which is most of the functions herein, 222 * the return values should be from the Z_foo set defined in <libzonecfg.h>. 223 * In some instances, we take pains mapping some libc errno values to Z_foo 224 * values from this set. 225 */ 226 227 /* 228 * Set the root (/) path for all zonecfg configuration files. This is a 229 * private interface used by Live Upgrade extensions to access zone 230 * configuration inside mounted alternate boot environments. 231 */ 232 void 233 zonecfg_set_root(const char *rootpath) 234 { 235 if (*zonecfg_root != '\0') 236 free(zonecfg_root); 237 if (rootpath == NULL || rootpath[0] == '\0' || rootpath[1] == '\0' || 238 (zonecfg_root = strdup(rootpath)) == NULL) 239 zonecfg_root = ""; 240 } 241 242 const char * 243 zonecfg_get_root(void) 244 { 245 return (zonecfg_root); 246 } 247 248 boolean_t 249 zonecfg_in_alt_root(void) 250 { 251 return (*zonecfg_root != '\0'); 252 } 253 254 /* 255 * Callers of the _file_path() functions are expected to have the second 256 * parameter be a (char foo[MAXPATHLEN]). 257 */ 258 259 static boolean_t 260 config_file_path(const char *zonename, char *answer) 261 { 262 return (snprintf(answer, MAXPATHLEN, "%s%s/%s.xml", zonecfg_root, 263 ZONE_CONFIG_ROOT, zonename) < MAXPATHLEN); 264 } 265 266 static boolean_t 267 snap_file_path(const char *zonename, char *answer) 268 { 269 return (snprintf(answer, MAXPATHLEN, "%s%s/%s.snapshot.xml", 270 zonecfg_root, ZONE_SNAPSHOT_ROOT, zonename) < MAXPATHLEN); 271 } 272 273 /*ARGSUSED*/ 274 static void 275 zonecfg_error_func(void *ctx, const char *msg, ...) 276 { 277 /* 278 * This function does nothing by design. Its purpose is to prevent 279 * libxml from dumping unwanted messages to stdout/stderr. 280 */ 281 } 282 283 zone_dochandle_t 284 zonecfg_init_handle(void) 285 { 286 zone_dochandle_t handle = calloc(1, sizeof (struct zone_dochandle)); 287 if (handle == NULL) { 288 errno = Z_NOMEM; 289 return (NULL); 290 } 291 292 /* generic libxml initialization */ 293 (void) xmlLineNumbersDefault(1); 294 xmlLoadExtDtdDefaultValue |= XML_DETECT_IDS; 295 xmlDoValidityCheckingDefaultValue = 1; 296 (void) xmlKeepBlanksDefault(0); 297 xmlGetWarningsDefaultValue = 0; 298 xmlSetGenericErrorFunc(NULL, zonecfg_error_func); 299 300 return (handle); 301 } 302 303 int 304 zonecfg_check_handle(zone_dochandle_t handle) 305 { 306 if (handle == NULL || handle->zone_dh_doc == NULL) 307 return (Z_BAD_HANDLE); 308 return (Z_OK); 309 } 310 311 void 312 zonecfg_fini_handle(zone_dochandle_t handle) 313 { 314 if (zonecfg_check_handle(handle) == Z_OK) 315 xmlFreeDoc(handle->zone_dh_doc); 316 if (handle != NULL) 317 free(handle); 318 } 319 320 static int 321 zonecfg_destroy_impl(char *filename) 322 { 323 if (unlink(filename) == -1) { 324 if (errno == EACCES) 325 return (Z_ACCES); 326 if (errno == ENOENT) 327 return (Z_NO_ZONE); 328 return (Z_MISC_FS); 329 } 330 return (Z_OK); 331 } 332 333 int 334 zonecfg_destroy(const char *zonename, boolean_t force) 335 { 336 char path[MAXPATHLEN]; 337 struct zoneent ze; 338 int err, state_err; 339 zone_state_t state; 340 341 if (!config_file_path(zonename, path)) 342 return (Z_MISC_FS); 343 344 state_err = zone_get_state((char *)zonename, &state); 345 err = access(path, W_OK); 346 347 /* 348 * If there is no file, and no index entry, reliably indicate that no 349 * such zone exists. 350 */ 351 if ((state_err == Z_NO_ZONE) && (err == -1) && (errno == ENOENT)) 352 return (Z_NO_ZONE); 353 354 /* 355 * Handle any other filesystem related errors (except if the XML 356 * file is missing, which we treat silently), unless we're forcing, 357 * in which case we plow on. 358 */ 359 if (err == -1 && errno != ENOENT) { 360 if (errno == EACCES) 361 return (Z_ACCES); 362 else if (!force) 363 return (Z_MISC_FS); 364 } 365 366 if (state > ZONE_STATE_INSTALLED) 367 return (Z_BAD_ZONE_STATE); 368 369 if (!force && state > ZONE_STATE_CONFIGURED) 370 return (Z_BAD_ZONE_STATE); 371 372 /* 373 * Index deletion succeeds even if the entry doesn't exist. So this 374 * will fail only if we've had some more severe problem. 375 */ 376 bzero(&ze, sizeof (ze)); 377 (void) strlcpy(ze.zone_name, zonename, sizeof (ze.zone_name)); 378 if ((err = putzoneent(&ze, PZE_REMOVE)) != Z_OK) 379 if (!force) 380 return (err); 381 382 err = zonecfg_destroy_impl(path); 383 384 /* 385 * Treat failure to find the XML file silently, since, well, it's 386 * gone, and with the index file cleaned up, we're done. 387 */ 388 if (err == Z_OK || err == Z_NO_ZONE) 389 return (Z_OK); 390 return (err); 391 } 392 393 int 394 zonecfg_destroy_snapshot(const char *zonename) 395 { 396 char path[MAXPATHLEN]; 397 398 if (!snap_file_path(zonename, path)) 399 return (Z_MISC_FS); 400 return (zonecfg_destroy_impl(path)); 401 } 402 403 static int 404 getroot(zone_dochandle_t handle, xmlNodePtr *root) 405 { 406 if (zonecfg_check_handle(handle) == Z_BAD_HANDLE) 407 return (Z_BAD_HANDLE); 408 409 *root = xmlDocGetRootElement(handle->zone_dh_doc); 410 411 if (*root == NULL) 412 return (Z_EMPTY_DOCUMENT); 413 414 if (xmlStrcmp((*root)->name, DTD_ELEM_ZONE)) 415 return (Z_WRONG_DOC_TYPE); 416 417 return (Z_OK); 418 } 419 420 static int 421 operation_prep(zone_dochandle_t handle) 422 { 423 xmlNodePtr root; 424 int err; 425 426 if ((err = getroot(handle, &root)) != 0) 427 return (err); 428 429 handle->zone_dh_cur = root; 430 handle->zone_dh_top = root; 431 return (Z_OK); 432 } 433 434 static int 435 fetchprop(xmlNodePtr cur, const xmlChar *propname, char *dst, size_t dstsize) 436 { 437 xmlChar *property; 438 size_t srcsize; 439 440 if ((property = xmlGetProp(cur, propname)) == NULL) 441 return (Z_BAD_PROPERTY); 442 srcsize = strlcpy(dst, (char *)property, dstsize); 443 xmlFree(property); 444 if (srcsize >= dstsize) 445 return (Z_TOO_BIG); 446 return (Z_OK); 447 } 448 449 static int 450 fetch_alloc_prop(xmlNodePtr cur, const xmlChar *propname, char **dst) 451 { 452 xmlChar *property; 453 454 if ((property = xmlGetProp(cur, propname)) == NULL) 455 return (Z_BAD_PROPERTY); 456 if ((*dst = strdup((char *)property)) == NULL) { 457 xmlFree(property); 458 return (Z_NOMEM); 459 } 460 xmlFree(property); 461 return (Z_OK); 462 } 463 464 static int 465 getrootattr(zone_dochandle_t handle, const xmlChar *propname, 466 char *propval, size_t propsize) 467 { 468 xmlNodePtr root; 469 int err; 470 471 if ((err = getroot(handle, &root)) != 0) 472 return (err); 473 474 return (fetchprop(root, propname, propval, propsize)); 475 } 476 477 static int 478 get_alloc_rootattr(zone_dochandle_t handle, const xmlChar *propname, 479 char **propval) 480 { 481 xmlNodePtr root; 482 int err; 483 484 if ((err = getroot(handle, &root)) != 0) 485 return (err); 486 487 return (fetch_alloc_prop(root, propname, propval)); 488 } 489 490 static int 491 setrootattr(zone_dochandle_t handle, const xmlChar *propname, 492 const char *propval) 493 { 494 int err; 495 xmlNodePtr root; 496 497 if ((err = getroot(handle, &root)) != Z_OK) 498 return (err); 499 500 /* 501 * If we get a null propval remove the property (ignore return since it 502 * may not be set to begin with). 503 */ 504 if (propval == NULL) { 505 (void) xmlUnsetProp(root, propname); 506 } else { 507 if (xmlSetProp(root, propname, (const xmlChar *) propval) 508 == NULL) 509 return (Z_INVAL); 510 } 511 return (Z_OK); 512 } 513 514 static void 515 addcomment(zone_dochandle_t handle, const char *comment) 516 { 517 xmlNodePtr node; 518 node = xmlNewComment((xmlChar *) comment); 519 520 if (node != NULL) 521 (void) xmlAddPrevSibling(handle->zone_dh_top, node); 522 } 523 524 static void 525 stripcomments(zone_dochandle_t handle) 526 { 527 xmlDocPtr top; 528 xmlNodePtr child, next; 529 530 top = handle->zone_dh_doc; 531 for (child = top->xmlChildrenNode; child != NULL; child = next) { 532 next = child->next; 533 if (child->name == NULL) 534 continue; 535 if (xmlStrcmp(child->name, DTD_ELEM_COMMENT) == 0) { 536 next = child->next; 537 xmlUnlinkNode(child); 538 xmlFreeNode(child); 539 } 540 } 541 } 542 543 static void 544 strip_sw_inv(zone_dochandle_t handle) 545 { 546 xmlNodePtr root, child, next; 547 548 root = xmlDocGetRootElement(handle->zone_dh_doc); 549 for (child = root->xmlChildrenNode; child != NULL; child = next) { 550 next = child->next; 551 if (child->name == NULL) 552 continue; 553 if (xmlStrcmp(child->name, DTD_ELEM_PACKAGE) == 0 || 554 xmlStrcmp(child->name, DTD_ELEM_PATCH) == 0) { 555 next = child->next; 556 xmlUnlinkNode(child); 557 xmlFreeNode(child); 558 } 559 } 560 } 561 562 static int 563 zonecfg_get_handle_impl(const char *zonename, const char *filename, 564 zone_dochandle_t handle) 565 { 566 xmlValidCtxtPtr cvp; 567 struct stat statbuf; 568 int valid; 569 570 if (zonename == NULL) 571 return (Z_NO_ZONE); 572 573 if ((handle->zone_dh_doc = xmlParseFile(filename)) == NULL) { 574 /* distinguish file not found vs. found but not parsed */ 575 if (stat(filename, &statbuf) == 0) 576 return (Z_INVALID_DOCUMENT); 577 return (Z_NO_ZONE); 578 } 579 if ((cvp = xmlNewValidCtxt()) == NULL) 580 return (Z_NOMEM); 581 cvp->error = zonecfg_error_func; 582 cvp->warning = zonecfg_error_func; 583 valid = xmlValidateDocument(cvp, handle->zone_dh_doc); 584 xmlFreeValidCtxt(cvp); 585 if (valid == 0) 586 return (Z_INVALID_DOCUMENT); 587 588 /* delete any comments such as inherited Sun copyright / ident str */ 589 stripcomments(handle); 590 return (Z_OK); 591 } 592 593 int 594 zonecfg_get_handle(const char *zonename, zone_dochandle_t handle) 595 { 596 char path[MAXPATHLEN]; 597 598 if (!config_file_path(zonename, path)) 599 return (Z_MISC_FS); 600 handle->zone_dh_newzone = B_FALSE; 601 602 return (zonecfg_get_handle_impl(zonename, path, handle)); 603 } 604 605 int 606 zonecfg_get_attach_handle(const char *path, const char *fname, 607 const char *zonename, boolean_t preserve_sw, zone_dochandle_t handle) 608 { 609 char migpath[MAXPATHLEN]; 610 int err; 611 struct stat buf; 612 613 if (snprintf(migpath, sizeof (migpath), "%s/root", path) >= 614 sizeof (migpath)) 615 return (Z_NOMEM); 616 617 if (stat(migpath, &buf) == -1 || !S_ISDIR(buf.st_mode)) 618 return (Z_NO_ZONE); 619 620 if (snprintf(migpath, sizeof (migpath), "%s/%s", path, fname) >= 621 sizeof (migpath)) 622 return (Z_NOMEM); 623 624 if ((err = zonecfg_get_handle_impl(zonename, migpath, handle)) != Z_OK) 625 return (err); 626 627 if (!preserve_sw) 628 strip_sw_inv(handle); 629 630 handle->zone_dh_newzone = B_TRUE; 631 if ((err = setrootattr(handle, DTD_ATTR_ZONEPATH, path)) != Z_OK) 632 return (err); 633 634 return (setrootattr(handle, DTD_ATTR_NAME, zonename)); 635 } 636 637 int 638 zonecfg_get_snapshot_handle(const char *zonename, zone_dochandle_t handle) 639 { 640 char path[MAXPATHLEN]; 641 642 if (!snap_file_path(zonename, path)) 643 return (Z_MISC_FS); 644 handle->zone_dh_newzone = B_FALSE; 645 return (zonecfg_get_handle_impl(zonename, path, handle)); 646 } 647 648 int 649 zonecfg_get_template_handle(const char *template, const char *zonename, 650 zone_dochandle_t handle) 651 { 652 char path[MAXPATHLEN]; 653 int err; 654 655 if (!config_file_path(template, path)) 656 return (Z_MISC_FS); 657 658 if ((err = zonecfg_get_handle_impl(template, path, handle)) != Z_OK) 659 return (err); 660 handle->zone_dh_newzone = B_TRUE; 661 return (setrootattr(handle, DTD_ATTR_NAME, zonename)); 662 } 663 664 int 665 zonecfg_get_xml_handle(const char *path, zone_dochandle_t handle) 666 { 667 struct stat buf; 668 int err; 669 670 if (stat(path, &buf) == -1) 671 return (Z_MISC_FS); 672 673 if ((err = zonecfg_get_handle_impl("xml", path, handle)) != Z_OK) 674 return (err); 675 handle->zone_dh_newzone = B_TRUE; 676 return (Z_OK); 677 } 678 679 /* 680 * Initialize two handles from the manifest read on fd. The rem_handle 681 * is initialized from the input file, including the sw inventory. The 682 * local_handle is initialized with the same zone configuration but with 683 * no sw inventory. 684 */ 685 int 686 zonecfg_attach_manifest(int fd, zone_dochandle_t local_handle, 687 zone_dochandle_t rem_handle) 688 { 689 xmlValidCtxtPtr cvp; 690 int valid; 691 692 /* load the manifest into the handle for the remote system */ 693 if ((rem_handle->zone_dh_doc = xmlReadFd(fd, NULL, NULL, 0)) == NULL) { 694 return (Z_INVALID_DOCUMENT); 695 } 696 if ((cvp = xmlNewValidCtxt()) == NULL) 697 return (Z_NOMEM); 698 cvp->error = zonecfg_error_func; 699 cvp->warning = zonecfg_error_func; 700 valid = xmlValidateDocument(cvp, rem_handle->zone_dh_doc); 701 xmlFreeValidCtxt(cvp); 702 if (valid == 0) 703 return (Z_INVALID_DOCUMENT); 704 705 /* delete any comments such as inherited Sun copyright / ident str */ 706 stripcomments(rem_handle); 707 708 rem_handle->zone_dh_newzone = B_TRUE; 709 rem_handle->zone_dh_sw_inv = B_TRUE; 710 711 /* 712 * Now use the remote system handle to generate a local system handle 713 * with an identical zones configuration but no sw inventory. 714 */ 715 if ((local_handle->zone_dh_doc = xmlCopyDoc(rem_handle->zone_dh_doc, 716 1)) == NULL) { 717 return (Z_INVALID_DOCUMENT); 718 } 719 720 /* 721 * We need to re-run xmlValidateDocument on local_handle to properly 722 * update the in-core representation of the configuration. 723 */ 724 if ((cvp = xmlNewValidCtxt()) == NULL) 725 return (Z_NOMEM); 726 cvp->error = zonecfg_error_func; 727 cvp->warning = zonecfg_error_func; 728 valid = xmlValidateDocument(cvp, local_handle->zone_dh_doc); 729 xmlFreeValidCtxt(cvp); 730 if (valid == 0) 731 return (Z_INVALID_DOCUMENT); 732 733 strip_sw_inv(local_handle); 734 735 local_handle->zone_dh_newzone = B_TRUE; 736 local_handle->zone_dh_sw_inv = B_FALSE; 737 738 return (Z_OK); 739 } 740 741 static boolean_t 742 is_renaming(zone_dochandle_t handle) 743 { 744 if (handle->zone_dh_newzone) 745 return (B_FALSE); 746 if (strlen(handle->zone_dh_delete_name) > 0) 747 return (B_TRUE); 748 return (B_FALSE); 749 } 750 751 static boolean_t 752 is_new(zone_dochandle_t handle) 753 { 754 return (handle->zone_dh_newzone || handle->zone_dh_snapshot); 755 } 756 757 static boolean_t 758 is_snapshot(zone_dochandle_t handle) 759 { 760 return (handle->zone_dh_snapshot); 761 } 762 763 /* 764 * It would be great to be able to use libc's ctype(3c) macros, but we 765 * can't, as they are locale sensitive, and it would break our limited thread 766 * safety if this routine had to change the app locale on the fly. 767 */ 768 int 769 zonecfg_validate_zonename(const char *zone) 770 { 771 int i; 772 773 if (strcmp(zone, GLOBAL_ZONENAME) == 0) 774 return (Z_BOGUS_ZONE_NAME); 775 776 if (strlen(zone) >= ZONENAME_MAX) 777 return (Z_BOGUS_ZONE_NAME); 778 779 if (!((zone[0] >= 'a' && zone[0] <= 'z') || 780 (zone[0] >= 'A' && zone[0] <= 'Z') || 781 (zone[0] >= '0' && zone[0] <= '9'))) 782 return (Z_BOGUS_ZONE_NAME); 783 784 for (i = 1; zone[i] != '\0'; i++) { 785 if (!((zone[i] >= 'a' && zone[i] <= 'z') || 786 (zone[i] >= 'A' && zone[i] <= 'Z') || 787 (zone[i] >= '0' && zone[i] <= '9') || 788 (zone[i] == '-') || (zone[i] == '_') || (zone[i] == '.'))) 789 return (Z_BOGUS_ZONE_NAME); 790 } 791 792 return (Z_OK); 793 } 794 795 /* 796 * Changing the zone name requires us to track both the old and new 797 * name of the zone until commit time. 798 */ 799 int 800 zonecfg_get_name(zone_dochandle_t handle, char *name, size_t namesize) 801 { 802 return (getrootattr(handle, DTD_ATTR_NAME, name, namesize)); 803 } 804 805 int 806 zonecfg_set_name(zone_dochandle_t handle, char *name) 807 { 808 zone_state_t state; 809 char curname[ZONENAME_MAX], old_delname[ZONENAME_MAX]; 810 int err; 811 812 if ((err = getrootattr(handle, DTD_ATTR_NAME, curname, 813 sizeof (curname))) != Z_OK) 814 return (err); 815 816 if (strcmp(name, curname) == 0) 817 return (Z_OK); 818 819 /* 820 * Switching zone names to one beginning with SUNW is not permitted. 821 */ 822 if (strncmp(name, "SUNW", 4) == 0) 823 return (Z_BOGUS_ZONE_NAME); 824 825 if ((err = zonecfg_validate_zonename(name)) != Z_OK) 826 return (err); 827 828 /* 829 * Setting the name back to the original name (effectively a revert of 830 * the name) is fine. But if we carry on, we'll falsely identify the 831 * name as "in use," so special case here. 832 */ 833 if (strcmp(name, handle->zone_dh_delete_name) == 0) { 834 err = setrootattr(handle, DTD_ATTR_NAME, name); 835 handle->zone_dh_delete_name[0] = '\0'; 836 return (err); 837 } 838 839 /* Check to see if new name chosen is already in use */ 840 if (zone_get_state(name, &state) != Z_NO_ZONE) 841 return (Z_NAME_IN_USE); 842 843 /* 844 * If this isn't already "new" or in a renaming transition, then 845 * we're initiating a rename here; so stash the "delete name" 846 * (i.e. the name of the zone we'll be removing) for the rename. 847 */ 848 (void) strlcpy(old_delname, handle->zone_dh_delete_name, 849 sizeof (old_delname)); 850 if (!is_new(handle) && !is_renaming(handle)) { 851 /* 852 * Name change is allowed only when the zone we're altering 853 * is not ready or running. 854 */ 855 err = zone_get_state(curname, &state); 856 if (err == Z_OK) { 857 if (state > ZONE_STATE_INSTALLED) 858 return (Z_BAD_ZONE_STATE); 859 } else if (err != Z_NO_ZONE) { 860 return (err); 861 } 862 863 (void) strlcpy(handle->zone_dh_delete_name, curname, 864 sizeof (handle->zone_dh_delete_name)); 865 assert(is_renaming(handle)); 866 } else if (is_renaming(handle)) { 867 err = zone_get_state(handle->zone_dh_delete_name, &state); 868 if (err == Z_OK) { 869 if (state > ZONE_STATE_INSTALLED) 870 return (Z_BAD_ZONE_STATE); 871 } else if (err != Z_NO_ZONE) { 872 return (err); 873 } 874 } 875 876 if ((err = setrootattr(handle, DTD_ATTR_NAME, name)) != Z_OK) { 877 /* 878 * Restore the deletename to whatever it was at the 879 * top of the routine, since we've had a failure. 880 */ 881 (void) strlcpy(handle->zone_dh_delete_name, old_delname, 882 sizeof (handle->zone_dh_delete_name)); 883 return (err); 884 } 885 886 return (Z_OK); 887 } 888 889 int 890 zonecfg_get_zonepath(zone_dochandle_t handle, char *path, size_t pathsize) 891 { 892 size_t len; 893 894 if ((len = strlcpy(path, zonecfg_root, pathsize)) >= pathsize) 895 return (Z_TOO_BIG); 896 return (getrootattr(handle, DTD_ATTR_ZONEPATH, path + len, 897 pathsize - len)); 898 } 899 900 int 901 zonecfg_set_zonepath(zone_dochandle_t handle, char *zonepath) 902 { 903 size_t len; 904 905 /* 906 * The user deals in absolute paths in the running global zone, but the 907 * internal configuration files deal with boot environment relative 908 * paths. Strip out the alternate root when specified. 909 */ 910 len = strlen(zonecfg_root); 911 if (strncmp(zonepath, zonecfg_root, len) != 0 || zonepath[len] != '/') 912 return (Z_BAD_PROPERTY); 913 zonepath += len; 914 return (setrootattr(handle, DTD_ATTR_ZONEPATH, zonepath)); 915 } 916 917 static int 918 i_zonecfg_get_brand(zone_dochandle_t handle, char *brand, size_t brandsize, 919 boolean_t default_query) 920 { 921 int ret, sz; 922 923 ret = getrootattr(handle, DTD_ATTR_BRAND, brand, brandsize); 924 925 /* 926 * If the lookup failed, or succeeded in finding a non-null brand 927 * string then return. 928 */ 929 if (ret != Z_OK || brand[0] != '\0') 930 return (ret); 931 932 if (!default_query) { 933 /* If the zone has no brand, it is the default brand. */ 934 return (zonecfg_default_brand(brand, brandsize)); 935 } 936 937 /* if SUNWdefault didn't specify a brand, fallback to "native" */ 938 sz = strlcpy(brand, NATIVE_BRAND_NAME, brandsize); 939 if (sz >= brandsize) 940 return (Z_TOO_BIG); 941 return (Z_OK); 942 } 943 944 int 945 zonecfg_get_brand(zone_dochandle_t handle, char *brand, size_t brandsize) 946 { 947 return (i_zonecfg_get_brand(handle, brand, brandsize, B_FALSE)); 948 } 949 950 int 951 zonecfg_set_brand(zone_dochandle_t handle, char *brand) 952 { 953 return (setrootattr(handle, DTD_ATTR_BRAND, brand)); 954 } 955 956 int 957 zonecfg_get_autoboot(zone_dochandle_t handle, boolean_t *autoboot) 958 { 959 char autobootstr[DTD_ENTITY_BOOL_LEN]; 960 int ret; 961 962 if ((ret = getrootattr(handle, DTD_ATTR_AUTOBOOT, autobootstr, 963 sizeof (autobootstr))) != Z_OK) 964 return (ret); 965 966 if (strcmp(autobootstr, DTD_ENTITY_TRUE) == 0) 967 *autoboot = B_TRUE; 968 else if (strcmp(autobootstr, DTD_ENTITY_FALSE) == 0) 969 *autoboot = B_FALSE; 970 else 971 ret = Z_BAD_PROPERTY; 972 return (ret); 973 } 974 975 int 976 zonecfg_set_autoboot(zone_dochandle_t handle, boolean_t autoboot) 977 { 978 return (setrootattr(handle, DTD_ATTR_AUTOBOOT, 979 autoboot ? DTD_ENTITY_TRUE : DTD_ENTITY_FALSE)); 980 } 981 982 int 983 zonecfg_get_pool(zone_dochandle_t handle, char *pool, size_t poolsize) 984 { 985 return (getrootattr(handle, DTD_ATTR_POOL, pool, poolsize)); 986 } 987 988 int 989 zonecfg_set_pool(zone_dochandle_t handle, char *pool) 990 { 991 return (setrootattr(handle, DTD_ATTR_POOL, pool)); 992 } 993 994 int 995 zonecfg_get_limitpriv(zone_dochandle_t handle, char **limitpriv) 996 { 997 return (get_alloc_rootattr(handle, DTD_ATTR_LIMITPRIV, limitpriv)); 998 } 999 1000 int 1001 zonecfg_set_limitpriv(zone_dochandle_t handle, char *limitpriv) 1002 { 1003 return (setrootattr(handle, DTD_ATTR_LIMITPRIV, limitpriv)); 1004 } 1005 1006 int 1007 zonecfg_get_bootargs(zone_dochandle_t handle, char *bargs, size_t bargssize) 1008 { 1009 return (getrootattr(handle, DTD_ATTR_BOOTARGS, bargs, bargssize)); 1010 } 1011 1012 int 1013 zonecfg_set_bootargs(zone_dochandle_t handle, char *bargs) 1014 { 1015 return (setrootattr(handle, DTD_ATTR_BOOTARGS, bargs)); 1016 } 1017 1018 int 1019 zonecfg_get_sched_class(zone_dochandle_t handle, char *sched, size_t schedsize) 1020 { 1021 return (getrootattr(handle, DTD_ATTR_SCHED, sched, schedsize)); 1022 } 1023 1024 int 1025 zonecfg_set_sched(zone_dochandle_t handle, char *sched) 1026 { 1027 return (setrootattr(handle, DTD_ATTR_SCHED, sched)); 1028 } 1029 1030 /* 1031 * /etc/zones/index caches a vital piece of information which is also 1032 * in the <zonename>.xml file: the path to the zone. This is for performance, 1033 * since we need to walk all zonepath's in order to be able to detect conflicts 1034 * (see crosscheck_zonepaths() in the zoneadm command). 1035 * 1036 * An additional complexity is that when doing a rename, we'd like the entire 1037 * index update operation (rename, and potential state changes) to be atomic. 1038 * In general, the operation of this function should succeed or fail as 1039 * a unit. 1040 */ 1041 int 1042 zonecfg_refresh_index_file(zone_dochandle_t handle) 1043 { 1044 char name[ZONENAME_MAX], zonepath[MAXPATHLEN]; 1045 struct zoneent ze; 1046 int err; 1047 int opcode; 1048 char *zn; 1049 1050 bzero(&ze, sizeof (ze)); 1051 ze.zone_state = -1; /* Preserve existing state in index */ 1052 1053 if ((err = zonecfg_get_name(handle, name, sizeof (name))) != Z_OK) 1054 return (err); 1055 (void) strlcpy(ze.zone_name, name, sizeof (ze.zone_name)); 1056 1057 if ((err = zonecfg_get_zonepath(handle, zonepath, 1058 sizeof (zonepath))) != Z_OK) 1059 return (err); 1060 (void) strlcpy(ze.zone_path, zonepath + strlen(zonecfg_root), 1061 sizeof (ze.zone_path)); 1062 1063 if (is_renaming(handle)) { 1064 opcode = PZE_MODIFY; 1065 (void) strlcpy(ze.zone_name, handle->zone_dh_delete_name, 1066 sizeof (ze.zone_name)); 1067 (void) strlcpy(ze.zone_newname, name, sizeof (ze.zone_newname)); 1068 } else if (is_new(handle)) { 1069 FILE *cookie; 1070 /* 1071 * Be tolerant of the zone already existing in the index file, 1072 * since we might be forcibly overwriting an existing 1073 * configuration with a new one (for example 'create -F' 1074 * in zonecfg). 1075 */ 1076 opcode = PZE_ADD; 1077 cookie = setzoneent(); 1078 while ((zn = getzoneent(cookie)) != NULL) { 1079 if (strcmp(zn, name) == 0) { 1080 opcode = PZE_MODIFY; 1081 free(zn); 1082 break; 1083 } 1084 free(zn); 1085 } 1086 endzoneent(cookie); 1087 ze.zone_state = ZONE_STATE_CONFIGURED; 1088 } else { 1089 opcode = PZE_MODIFY; 1090 } 1091 1092 if ((err = putzoneent(&ze, opcode)) != Z_OK) 1093 return (err); 1094 1095 return (Z_OK); 1096 } 1097 1098 /* 1099 * The goal of this routine is to cause the index file update and the 1100 * document save to happen as an atomic operation. We do the document 1101 * first, saving a backup copy using a hard link; if that succeeds, we go 1102 * on to the index. If that fails, we roll the document back into place. 1103 * 1104 * Strategy: 1105 * 1106 * New zone 'foo' configuration: 1107 * Create tmpfile (zonecfg.xxxxxx) 1108 * Write XML to tmpfile 1109 * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> foo.xml) 1110 * Add entry to index file 1111 * If it fails, delete foo.xml, leaving nothing behind. 1112 * 1113 * Save existing zone 'foo': 1114 * Make backup of foo.xml -> .backup 1115 * Create tmpfile (zonecfg.xxxxxx) 1116 * Write XML to tmpfile 1117 * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> foo.xml) 1118 * Modify index file as needed 1119 * If it fails, recover from .backup -> foo.xml 1120 * 1121 * Rename 'foo' to 'bar': 1122 * Create tmpfile (zonecfg.xxxxxx) 1123 * Write XML to tmpfile 1124 * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> bar.xml) 1125 * Add entry for 'bar' to index file, Remove entry for 'foo' (refresh) 1126 * If it fails, delete bar.xml; foo.xml is left behind. 1127 */ 1128 static int 1129 zonecfg_save_impl(zone_dochandle_t handle, char *filename) 1130 { 1131 char tmpfile[MAXPATHLEN]; 1132 char bakdir[MAXPATHLEN], bakbase[MAXPATHLEN], bakfile[MAXPATHLEN]; 1133 int tmpfd, err, valid; 1134 xmlValidCtxt cvp = { NULL }; 1135 boolean_t backup; 1136 1137 (void) strlcpy(tmpfile, filename, sizeof (tmpfile)); 1138 (void) dirname(tmpfile); 1139 (void) strlcat(tmpfile, _PATH_TMPFILE, sizeof (tmpfile)); 1140 1141 tmpfd = mkstemp(tmpfile); 1142 if (tmpfd == -1) { 1143 (void) unlink(tmpfile); 1144 return (Z_TEMP_FILE); 1145 } 1146 (void) close(tmpfd); 1147 1148 cvp.error = zonecfg_error_func; 1149 cvp.warning = zonecfg_error_func; 1150 1151 /* 1152 * We do a final validation of the document. Since the library has 1153 * malfunctioned if it fails to validate, we follow-up with an 1154 * assert() that the doc is valid. 1155 */ 1156 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 1157 assert(valid != 0); 1158 1159 if (xmlSaveFormatFile(tmpfile, handle->zone_dh_doc, 1) <= 0) 1160 goto err; 1161 1162 (void) chmod(tmpfile, 0644); 1163 1164 /* 1165 * In the event we are doing a standard save, hard link a copy of the 1166 * original file in .backup.<pid>.filename so we can restore it if 1167 * something goes wrong. 1168 */ 1169 if (!is_new(handle) && !is_renaming(handle)) { 1170 backup = B_TRUE; 1171 1172 (void) strlcpy(bakdir, filename, sizeof (bakdir)); 1173 (void) strlcpy(bakbase, filename, sizeof (bakbase)); 1174 (void) snprintf(bakfile, sizeof (bakfile), "%s/.backup.%d.%s", 1175 dirname(bakdir), getpid(), basename(bakbase)); 1176 1177 if (link(filename, bakfile) == -1) { 1178 err = errno; 1179 (void) unlink(tmpfile); 1180 if (errno == EACCES) 1181 return (Z_ACCES); 1182 return (Z_MISC_FS); 1183 } 1184 } 1185 1186 /* 1187 * Move the new document over top of the old. 1188 * i.e.: zonecfg.XXXXXX -> myzone.xml 1189 */ 1190 if (rename(tmpfile, filename) == -1) { 1191 err = errno; 1192 (void) unlink(tmpfile); 1193 if (backup) 1194 (void) unlink(bakfile); 1195 if (err == EACCES) 1196 return (Z_ACCES); 1197 return (Z_MISC_FS); 1198 } 1199 1200 /* 1201 * If this is a snapshot, we're done-- don't add an index entry. 1202 */ 1203 if (is_snapshot(handle)) 1204 return (Z_OK); 1205 1206 /* now update the index file to reflect whatever we just did */ 1207 if ((err = zonecfg_refresh_index_file(handle)) != Z_OK) { 1208 if (backup) { 1209 /* 1210 * Try to restore from our backup. 1211 */ 1212 (void) unlink(filename); 1213 (void) rename(bakfile, filename); 1214 } else { 1215 /* 1216 * Either the zone is new, in which case we can delete 1217 * new.xml, or we're doing a rename, so ditto. 1218 */ 1219 assert(is_new(handle) || is_renaming(handle)); 1220 (void) unlink(filename); 1221 } 1222 return (Z_UPDATING_INDEX); 1223 } 1224 1225 if (backup) 1226 (void) unlink(bakfile); 1227 1228 return (Z_OK); 1229 1230 err: 1231 (void) unlink(tmpfile); 1232 return (Z_SAVING_FILE); 1233 } 1234 1235 int 1236 zonecfg_save(zone_dochandle_t handle) 1237 { 1238 char zname[ZONENAME_MAX], path[MAXPATHLEN]; 1239 char delpath[MAXPATHLEN]; 1240 int err = Z_SAVING_FILE; 1241 1242 if (zonecfg_check_handle(handle) != Z_OK) 1243 return (Z_BAD_HANDLE); 1244 1245 /* 1246 * We don't support saving snapshots or a tree containing a sw 1247 * inventory at this time. 1248 */ 1249 if (handle->zone_dh_snapshot || handle->zone_dh_sw_inv) 1250 return (Z_INVAL); 1251 1252 if ((err = zonecfg_get_name(handle, zname, sizeof (zname))) != Z_OK) 1253 return (err); 1254 1255 if (!config_file_path(zname, path)) 1256 return (Z_MISC_FS); 1257 1258 addcomment(handle, "\n DO NOT EDIT THIS " 1259 "FILE. Use zonecfg(1M) instead.\n"); 1260 1261 err = zonecfg_save_impl(handle, path); 1262 1263 stripcomments(handle); 1264 1265 if (err != Z_OK) 1266 return (err); 1267 1268 handle->zone_dh_newzone = B_FALSE; 1269 1270 if (is_renaming(handle)) { 1271 if (config_file_path(handle->zone_dh_delete_name, delpath)) 1272 (void) unlink(delpath); 1273 handle->zone_dh_delete_name[0] = '\0'; 1274 } 1275 1276 return (Z_OK); 1277 } 1278 1279 int 1280 zonecfg_verify_save(zone_dochandle_t handle, char *filename) 1281 { 1282 int valid; 1283 1284 xmlValidCtxt cvp = { NULL }; 1285 1286 if (zonecfg_check_handle(handle) != Z_OK) 1287 return (Z_BAD_HANDLE); 1288 1289 cvp.error = zonecfg_error_func; 1290 cvp.warning = zonecfg_error_func; 1291 1292 /* 1293 * We do a final validation of the document. Since the library has 1294 * malfunctioned if it fails to validate, we follow-up with an 1295 * assert() that the doc is valid. 1296 */ 1297 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 1298 assert(valid != 0); 1299 1300 if (xmlSaveFormatFile(filename, handle->zone_dh_doc, 1) <= 0) 1301 return (Z_SAVING_FILE); 1302 1303 return (Z_OK); 1304 } 1305 1306 int 1307 zonecfg_detach_save(zone_dochandle_t handle, uint_t flags) 1308 { 1309 char zname[ZONENAME_MAX]; 1310 char path[MAXPATHLEN]; 1311 char migpath[MAXPATHLEN]; 1312 xmlValidCtxt cvp = { NULL }; 1313 int err = Z_SAVING_FILE; 1314 int valid; 1315 1316 if (zonecfg_check_handle(handle) != Z_OK) 1317 return (Z_BAD_HANDLE); 1318 1319 if (flags & ZONE_DRY_RUN) { 1320 (void) strlcpy(migpath, "-", sizeof (migpath)); 1321 } else { 1322 if ((err = zonecfg_get_name(handle, zname, sizeof (zname))) 1323 != Z_OK) 1324 return (err); 1325 1326 if ((err = zone_get_zonepath(zname, path, sizeof (path))) 1327 != Z_OK) 1328 return (err); 1329 1330 if (snprintf(migpath, sizeof (migpath), "%s/%s", path, 1331 ZONE_DETACHED) >= sizeof (migpath)) 1332 return (Z_NOMEM); 1333 } 1334 1335 if ((err = operation_prep(handle)) != Z_OK) 1336 return (err); 1337 1338 addcomment(handle, "\n DO NOT EDIT THIS FILE. " 1339 "Use zonecfg(1M) and zoneadm(1M) attach.\n"); 1340 1341 cvp.error = zonecfg_error_func; 1342 cvp.warning = zonecfg_error_func; 1343 1344 /* 1345 * We do a final validation of the document. Since the library has 1346 * malfunctioned if it fails to validate, we follow-up with an 1347 * assert() that the doc is valid. 1348 */ 1349 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 1350 assert(valid != 0); 1351 1352 if (xmlSaveFormatFile(migpath, handle->zone_dh_doc, 1) <= 0) 1353 return (Z_SAVING_FILE); 1354 1355 if (!(flags & ZONE_DRY_RUN)) 1356 (void) chmod(migpath, 0644); 1357 1358 stripcomments(handle); 1359 1360 handle->zone_dh_newzone = B_FALSE; 1361 1362 return (Z_OK); 1363 } 1364 1365 boolean_t 1366 zonecfg_detached(const char *path) 1367 { 1368 char migpath[MAXPATHLEN]; 1369 struct stat buf; 1370 1371 if (snprintf(migpath, sizeof (migpath), "%s/%s", path, ZONE_DETACHED) >= 1372 sizeof (migpath)) 1373 return (B_FALSE); 1374 1375 if (stat(migpath, &buf) != -1) 1376 return (B_TRUE); 1377 1378 return (B_FALSE); 1379 } 1380 1381 void 1382 zonecfg_rm_detached(zone_dochandle_t handle, boolean_t forced) 1383 { 1384 char zname[ZONENAME_MAX]; 1385 char path[MAXPATHLEN]; 1386 char detached[MAXPATHLEN]; 1387 char attached[MAXPATHLEN]; 1388 1389 if (zonecfg_check_handle(handle) != Z_OK) 1390 return; 1391 1392 if (zonecfg_get_name(handle, zname, sizeof (zname)) != Z_OK) 1393 return; 1394 1395 if (zone_get_zonepath(zname, path, sizeof (path)) != Z_OK) 1396 return; 1397 1398 (void) snprintf(detached, sizeof (detached), "%s/%s", path, 1399 ZONE_DETACHED); 1400 (void) snprintf(attached, sizeof (attached), "%s/%s", path, 1401 ATTACH_FORCED); 1402 1403 if (forced) { 1404 (void) rename(detached, attached); 1405 } else { 1406 (void) unlink(attached); 1407 (void) unlink(detached); 1408 } 1409 } 1410 1411 /* 1412 * Special case: if access(2) fails with ENOENT, then try again using 1413 * ZONE_CONFIG_ROOT instead of config_file_path(zonename). This is how we 1414 * work around the case of a config file which has not been created yet: 1415 * the user will need access to the directory so use that as a heuristic. 1416 */ 1417 1418 int 1419 zonecfg_access(const char *zonename, int amode) 1420 { 1421 char path[MAXPATHLEN]; 1422 1423 if (!config_file_path(zonename, path)) 1424 return (Z_INVAL); 1425 if (access(path, amode) == 0) 1426 return (Z_OK); 1427 if (errno == ENOENT) { 1428 if (snprintf(path, sizeof (path), "%s%s", zonecfg_root, 1429 ZONE_CONFIG_ROOT) >= sizeof (path)) 1430 return (Z_INVAL); 1431 if (access(path, amode) == 0) 1432 return (Z_OK); 1433 } 1434 if (errno == EACCES) 1435 return (Z_ACCES); 1436 if (errno == EINVAL) 1437 return (Z_INVAL); 1438 return (Z_MISC_FS); 1439 } 1440 1441 int 1442 zonecfg_create_snapshot(const char *zonename) 1443 { 1444 zone_dochandle_t handle; 1445 char path[MAXPATHLEN], zonepath[MAXPATHLEN], rpath[MAXPATHLEN]; 1446 int error = Z_OK, res; 1447 1448 if ((handle = zonecfg_init_handle()) == NULL) { 1449 return (Z_NOMEM); 1450 } 1451 1452 handle->zone_dh_newzone = B_TRUE; 1453 handle->zone_dh_snapshot = B_TRUE; 1454 1455 if ((error = zonecfg_get_handle(zonename, handle)) != Z_OK) 1456 goto out; 1457 if ((error = operation_prep(handle)) != Z_OK) 1458 goto out; 1459 error = zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)); 1460 if (error != Z_OK) 1461 goto out; 1462 if ((res = resolvepath(zonepath, rpath, sizeof (rpath))) == -1) { 1463 error = Z_RESOLVED_PATH; 1464 goto out; 1465 } 1466 /* 1467 * If the resolved path is not the same as the original path, then 1468 * save the resolved path in the snapshot, thus preventing any 1469 * potential problems down the line when zoneadmd goes to unmount 1470 * file systems and depends on initial string matches with resolved 1471 * paths. 1472 */ 1473 rpath[res] = '\0'; 1474 if (strcmp(zonepath, rpath) != 0) { 1475 if ((error = zonecfg_set_zonepath(handle, rpath)) != Z_OK) 1476 goto out; 1477 } 1478 if (snprintf(path, sizeof (path), "%s%s", zonecfg_root, 1479 ZONE_SNAPSHOT_ROOT) >= sizeof (path)) { 1480 error = Z_MISC_FS; 1481 goto out; 1482 } 1483 if ((mkdir(path, S_IRWXU) == -1) && (errno != EEXIST)) { 1484 error = Z_MISC_FS; 1485 goto out; 1486 } 1487 1488 if (!snap_file_path(zonename, path)) { 1489 error = Z_MISC_FS; 1490 goto out; 1491 } 1492 1493 addcomment(handle, "\n DO NOT EDIT THIS FILE. " 1494 "It is a snapshot of running zone state.\n"); 1495 1496 error = zonecfg_save_impl(handle, path); 1497 1498 stripcomments(handle); 1499 1500 out: 1501 zonecfg_fini_handle(handle); 1502 return (error); 1503 } 1504 1505 int 1506 zonecfg_get_iptype(zone_dochandle_t handle, zone_iptype_t *iptypep) 1507 { 1508 char property[10]; /* 10 is big enough for "shared"/"exclusive" */ 1509 int err; 1510 1511 err = getrootattr(handle, DTD_ATTR_IPTYPE, property, sizeof (property)); 1512 if (err == Z_BAD_PROPERTY) { 1513 /* Return default value */ 1514 *iptypep = ZS_SHARED; 1515 return (Z_OK); 1516 } else if (err != Z_OK) { 1517 return (err); 1518 } 1519 1520 if (strlen(property) == 0 || 1521 strcmp(property, "shared") == 0) 1522 *iptypep = ZS_SHARED; 1523 else if (strcmp(property, "exclusive") == 0) 1524 *iptypep = ZS_EXCLUSIVE; 1525 else 1526 return (Z_INVAL); 1527 1528 return (Z_OK); 1529 } 1530 1531 int 1532 zonecfg_set_iptype(zone_dochandle_t handle, zone_iptype_t iptype) 1533 { 1534 xmlNodePtr cur; 1535 1536 if (handle == NULL) 1537 return (Z_INVAL); 1538 1539 cur = xmlDocGetRootElement(handle->zone_dh_doc); 1540 if (cur == NULL) { 1541 return (Z_EMPTY_DOCUMENT); 1542 } 1543 1544 if (xmlStrcmp(cur->name, DTD_ELEM_ZONE) != 0) { 1545 return (Z_WRONG_DOC_TYPE); 1546 } 1547 switch (iptype) { 1548 case ZS_SHARED: 1549 /* 1550 * Since "shared" is the default, we don't write it to the 1551 * configuration file, so that it's easier to migrate those 1552 * zones elsewhere, eg., to systems which are not IP-Instances 1553 * aware. 1554 * xmlUnsetProp only fails when the attribute doesn't exist, 1555 * which we don't care. 1556 */ 1557 (void) xmlUnsetProp(cur, DTD_ATTR_IPTYPE); 1558 break; 1559 case ZS_EXCLUSIVE: 1560 if (xmlSetProp(cur, DTD_ATTR_IPTYPE, 1561 (const xmlChar *) "exclusive") == NULL) 1562 return (Z_INVAL); 1563 break; 1564 } 1565 return (Z_OK); 1566 } 1567 1568 static int 1569 newprop(xmlNodePtr node, const xmlChar *attrname, char *src) 1570 { 1571 xmlAttrPtr newattr; 1572 1573 newattr = xmlNewProp(node, attrname, (xmlChar *)src); 1574 if (newattr == NULL) { 1575 xmlUnlinkNode(node); 1576 xmlFreeNode(node); 1577 return (Z_BAD_PROPERTY); 1578 } 1579 return (Z_OK); 1580 } 1581 1582 static int 1583 zonecfg_add_filesystem_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 1584 { 1585 xmlNodePtr newnode, cur = handle->zone_dh_cur, options_node; 1586 zone_fsopt_t *ptr; 1587 int err; 1588 1589 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_FS, NULL); 1590 if ((err = newprop(newnode, DTD_ATTR_SPECIAL, 1591 tabptr->zone_fs_special)) != Z_OK) 1592 return (err); 1593 if (tabptr->zone_fs_raw[0] != '\0' && 1594 (err = newprop(newnode, DTD_ATTR_RAW, tabptr->zone_fs_raw)) != Z_OK) 1595 return (err); 1596 if ((err = newprop(newnode, DTD_ATTR_DIR, tabptr->zone_fs_dir)) != Z_OK) 1597 return (err); 1598 if ((err = newprop(newnode, DTD_ATTR_TYPE, 1599 tabptr->zone_fs_type)) != Z_OK) 1600 return (err); 1601 if (tabptr->zone_fs_options != NULL) { 1602 for (ptr = tabptr->zone_fs_options; ptr != NULL; 1603 ptr = ptr->zone_fsopt_next) { 1604 options_node = xmlNewTextChild(newnode, NULL, 1605 DTD_ELEM_FSOPTION, NULL); 1606 if ((err = newprop(options_node, DTD_ATTR_NAME, 1607 ptr->zone_fsopt_opt)) != Z_OK) 1608 return (err); 1609 } 1610 } 1611 return (Z_OK); 1612 } 1613 1614 int 1615 zonecfg_add_filesystem(zone_dochandle_t handle, struct zone_fstab *tabptr) 1616 { 1617 int err; 1618 1619 if (tabptr == NULL) 1620 return (Z_INVAL); 1621 1622 if ((err = operation_prep(handle)) != Z_OK) 1623 return (err); 1624 1625 if ((err = zonecfg_add_filesystem_core(handle, tabptr)) != Z_OK) 1626 return (err); 1627 1628 return (Z_OK); 1629 } 1630 1631 static int 1632 zonecfg_add_ipd_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 1633 { 1634 xmlNodePtr newnode, cur = handle->zone_dh_cur; 1635 int err; 1636 1637 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_IPD, NULL); 1638 if ((err = newprop(newnode, DTD_ATTR_DIR, tabptr->zone_fs_dir)) != Z_OK) 1639 return (err); 1640 return (Z_OK); 1641 } 1642 1643 int 1644 zonecfg_add_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 1645 { 1646 int err; 1647 1648 if (tabptr == NULL) 1649 return (Z_INVAL); 1650 1651 if ((err = operation_prep(handle)) != Z_OK) 1652 return (err); 1653 1654 if ((err = zonecfg_add_ipd_core(handle, tabptr)) != Z_OK) 1655 return (err); 1656 1657 return (Z_OK); 1658 } 1659 1660 int 1661 zonecfg_add_fs_option(struct zone_fstab *tabptr, char *option) 1662 { 1663 zone_fsopt_t *last, *old, *new; 1664 1665 last = tabptr->zone_fs_options; 1666 for (old = last; old != NULL; old = old->zone_fsopt_next) 1667 last = old; /* walk to the end of the list */ 1668 new = (zone_fsopt_t *)malloc(sizeof (zone_fsopt_t)); 1669 if (new == NULL) 1670 return (Z_NOMEM); 1671 (void) strlcpy(new->zone_fsopt_opt, option, 1672 sizeof (new->zone_fsopt_opt)); 1673 new->zone_fsopt_next = NULL; 1674 if (last == NULL) 1675 tabptr->zone_fs_options = new; 1676 else 1677 last->zone_fsopt_next = new; 1678 return (Z_OK); 1679 } 1680 1681 int 1682 zonecfg_remove_fs_option(struct zone_fstab *tabptr, char *option) 1683 { 1684 zone_fsopt_t *last, *this, *next; 1685 1686 last = tabptr->zone_fs_options; 1687 for (this = last; this != NULL; this = this->zone_fsopt_next) { 1688 if (strcmp(this->zone_fsopt_opt, option) == 0) { 1689 next = this->zone_fsopt_next; 1690 if (this == tabptr->zone_fs_options) 1691 tabptr->zone_fs_options = next; 1692 else 1693 last->zone_fsopt_next = next; 1694 free(this); 1695 return (Z_OK); 1696 } else 1697 last = this; 1698 } 1699 return (Z_NO_PROPERTY_ID); 1700 } 1701 1702 void 1703 zonecfg_free_fs_option_list(zone_fsopt_t *list) 1704 { 1705 zone_fsopt_t *this, *next; 1706 1707 for (this = list; this != NULL; this = next) { 1708 next = this->zone_fsopt_next; 1709 free(this); 1710 } 1711 } 1712 1713 void 1714 zonecfg_free_rctl_value_list(struct zone_rctlvaltab *valtab) 1715 { 1716 if (valtab == NULL) 1717 return; 1718 zonecfg_free_rctl_value_list(valtab->zone_rctlval_next); 1719 free(valtab); 1720 } 1721 1722 static boolean_t 1723 match_prop(xmlNodePtr cur, const xmlChar *attr, char *user_prop) 1724 { 1725 xmlChar *gotten_prop; 1726 int prop_result; 1727 1728 gotten_prop = xmlGetProp(cur, attr); 1729 if (gotten_prop == NULL) /* shouldn't happen */ 1730 return (B_FALSE); 1731 prop_result = xmlStrcmp(gotten_prop, (const xmlChar *) user_prop); 1732 xmlFree(gotten_prop); 1733 return ((prop_result == 0)); 1734 } 1735 1736 static int 1737 zonecfg_delete_filesystem_core(zone_dochandle_t handle, 1738 struct zone_fstab *tabptr) 1739 { 1740 xmlNodePtr cur = handle->zone_dh_cur; 1741 boolean_t dir_match, spec_match, raw_match, type_match; 1742 1743 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 1744 if (xmlStrcmp(cur->name, DTD_ELEM_FS)) 1745 continue; 1746 dir_match = match_prop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir); 1747 spec_match = match_prop(cur, DTD_ATTR_SPECIAL, 1748 tabptr->zone_fs_special); 1749 raw_match = match_prop(cur, DTD_ATTR_RAW, 1750 tabptr->zone_fs_raw); 1751 type_match = match_prop(cur, DTD_ATTR_TYPE, 1752 tabptr->zone_fs_type); 1753 if (dir_match && spec_match && raw_match && type_match) { 1754 xmlUnlinkNode(cur); 1755 xmlFreeNode(cur); 1756 return (Z_OK); 1757 } 1758 } 1759 return (Z_NO_RESOURCE_ID); 1760 } 1761 1762 int 1763 zonecfg_delete_filesystem(zone_dochandle_t handle, struct zone_fstab *tabptr) 1764 { 1765 int err; 1766 1767 if (tabptr == NULL) 1768 return (Z_INVAL); 1769 1770 if ((err = operation_prep(handle)) != Z_OK) 1771 return (err); 1772 1773 if ((err = zonecfg_delete_filesystem_core(handle, tabptr)) != Z_OK) 1774 return (err); 1775 1776 return (Z_OK); 1777 } 1778 1779 int 1780 zonecfg_modify_filesystem( 1781 zone_dochandle_t handle, 1782 struct zone_fstab *oldtabptr, 1783 struct zone_fstab *newtabptr) 1784 { 1785 int err; 1786 1787 if (oldtabptr == NULL || newtabptr == NULL) 1788 return (Z_INVAL); 1789 1790 if ((err = operation_prep(handle)) != Z_OK) 1791 return (err); 1792 1793 if ((err = zonecfg_delete_filesystem_core(handle, oldtabptr)) != Z_OK) 1794 return (err); 1795 1796 if ((err = zonecfg_add_filesystem_core(handle, newtabptr)) != Z_OK) 1797 return (err); 1798 1799 return (Z_OK); 1800 } 1801 1802 static int 1803 zonecfg_delete_ipd_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 1804 { 1805 xmlNodePtr cur = handle->zone_dh_cur; 1806 1807 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 1808 if (xmlStrcmp(cur->name, DTD_ELEM_IPD)) 1809 continue; 1810 if (match_prop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir)) { 1811 xmlUnlinkNode(cur); 1812 xmlFreeNode(cur); 1813 return (Z_OK); 1814 } 1815 } 1816 return (Z_NO_RESOURCE_ID); 1817 } 1818 1819 int 1820 zonecfg_delete_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 1821 { 1822 int err; 1823 1824 if (tabptr == NULL) 1825 return (Z_INVAL); 1826 1827 if ((err = operation_prep(handle)) != Z_OK) 1828 return (err); 1829 1830 if ((err = zonecfg_delete_ipd_core(handle, tabptr)) != Z_OK) 1831 return (err); 1832 1833 return (Z_OK); 1834 } 1835 1836 int 1837 zonecfg_modify_ipd(zone_dochandle_t handle, struct zone_fstab *oldtabptr, 1838 struct zone_fstab *newtabptr) 1839 { 1840 int err; 1841 1842 if (oldtabptr == NULL || newtabptr == NULL) 1843 return (Z_INVAL); 1844 1845 if ((err = operation_prep(handle)) != Z_OK) 1846 return (err); 1847 1848 if ((err = zonecfg_delete_ipd_core(handle, oldtabptr)) != Z_OK) 1849 return (err); 1850 1851 if ((err = zonecfg_add_ipd_core(handle, newtabptr)) != Z_OK) 1852 return (err); 1853 1854 return (Z_OK); 1855 } 1856 1857 int 1858 zonecfg_lookup_filesystem( 1859 zone_dochandle_t handle, 1860 struct zone_fstab *tabptr) 1861 { 1862 xmlNodePtr cur, options, firstmatch; 1863 int err; 1864 char dirname[MAXPATHLEN], special[MAXPATHLEN], raw[MAXPATHLEN]; 1865 char type[FSTYPSZ]; 1866 char options_str[MAX_MNTOPT_STR]; 1867 1868 if (tabptr == NULL) 1869 return (Z_INVAL); 1870 1871 if ((err = operation_prep(handle)) != Z_OK) 1872 return (err); 1873 1874 /* 1875 * Walk the list of children looking for matches on any properties 1876 * specified in the fstab parameter. If more than one resource 1877 * matches, we return Z_INSUFFICIENT_SPEC; if none match, we return 1878 * Z_NO_RESOURCE_ID. 1879 */ 1880 cur = handle->zone_dh_cur; 1881 firstmatch = NULL; 1882 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 1883 if (xmlStrcmp(cur->name, DTD_ELEM_FS)) 1884 continue; 1885 if (strlen(tabptr->zone_fs_dir) > 0) { 1886 if ((fetchprop(cur, DTD_ATTR_DIR, dirname, 1887 sizeof (dirname)) == Z_OK) && 1888 (strcmp(tabptr->zone_fs_dir, dirname) == 0)) { 1889 if (firstmatch == NULL) 1890 firstmatch = cur; 1891 else 1892 return (Z_INSUFFICIENT_SPEC); 1893 } 1894 } 1895 if (strlen(tabptr->zone_fs_special) > 0) { 1896 if ((fetchprop(cur, DTD_ATTR_SPECIAL, special, 1897 sizeof (special)) == Z_OK)) { 1898 if (strcmp(tabptr->zone_fs_special, 1899 special) == 0) { 1900 if (firstmatch == NULL) 1901 firstmatch = cur; 1902 else if (firstmatch != cur) 1903 return (Z_INSUFFICIENT_SPEC); 1904 } else { 1905 /* 1906 * If another property matched but this 1907 * one doesn't then reset firstmatch. 1908 */ 1909 if (firstmatch == cur) 1910 firstmatch = NULL; 1911 } 1912 } 1913 } 1914 if (strlen(tabptr->zone_fs_raw) > 0) { 1915 if ((fetchprop(cur, DTD_ATTR_RAW, raw, 1916 sizeof (raw)) == Z_OK)) { 1917 if (strcmp(tabptr->zone_fs_raw, raw) == 0) { 1918 if (firstmatch == NULL) 1919 firstmatch = cur; 1920 else if (firstmatch != cur) 1921 return (Z_INSUFFICIENT_SPEC); 1922 } else { 1923 /* 1924 * If another property matched but this 1925 * one doesn't then reset firstmatch. 1926 */ 1927 if (firstmatch == cur) 1928 firstmatch = NULL; 1929 } 1930 } 1931 } 1932 if (strlen(tabptr->zone_fs_type) > 0) { 1933 if ((fetchprop(cur, DTD_ATTR_TYPE, type, 1934 sizeof (type)) == Z_OK)) { 1935 if (strcmp(tabptr->zone_fs_type, type) == 0) { 1936 if (firstmatch == NULL) 1937 firstmatch = cur; 1938 else if (firstmatch != cur) 1939 return (Z_INSUFFICIENT_SPEC); 1940 } else { 1941 /* 1942 * If another property matched but this 1943 * one doesn't then reset firstmatch. 1944 */ 1945 if (firstmatch == cur) 1946 firstmatch = NULL; 1947 } 1948 } 1949 } 1950 } 1951 1952 if (firstmatch == NULL) 1953 return (Z_NO_RESOURCE_ID); 1954 1955 cur = firstmatch; 1956 1957 if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 1958 sizeof (tabptr->zone_fs_dir))) != Z_OK) 1959 return (err); 1960 1961 if ((err = fetchprop(cur, DTD_ATTR_SPECIAL, tabptr->zone_fs_special, 1962 sizeof (tabptr->zone_fs_special))) != Z_OK) 1963 return (err); 1964 1965 if ((err = fetchprop(cur, DTD_ATTR_RAW, tabptr->zone_fs_raw, 1966 sizeof (tabptr->zone_fs_raw))) != Z_OK) 1967 return (err); 1968 1969 if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_fs_type, 1970 sizeof (tabptr->zone_fs_type))) != Z_OK) 1971 return (err); 1972 1973 /* options are optional */ 1974 tabptr->zone_fs_options = NULL; 1975 for (options = cur->xmlChildrenNode; options != NULL; 1976 options = options->next) { 1977 if ((fetchprop(options, DTD_ATTR_NAME, options_str, 1978 sizeof (options_str)) != Z_OK)) 1979 break; 1980 if (zonecfg_add_fs_option(tabptr, options_str) != Z_OK) 1981 break; 1982 } 1983 return (Z_OK); 1984 } 1985 1986 int 1987 zonecfg_lookup_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 1988 { 1989 xmlNodePtr cur, match; 1990 int err; 1991 char dirname[MAXPATHLEN]; 1992 1993 if (tabptr == NULL) 1994 return (Z_INVAL); 1995 1996 if ((err = operation_prep(handle)) != Z_OK) 1997 return (err); 1998 1999 /* 2000 * General algorithm: 2001 * Walk the list of children looking for matches on any properties 2002 * specified in the fstab parameter. If more than one resource 2003 * matches, we return Z_INSUFFICIENT_SPEC; if none match, we return 2004 * Z_NO_RESOURCE_ID. 2005 */ 2006 cur = handle->zone_dh_cur; 2007 match = NULL; 2008 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2009 if (xmlStrcmp(cur->name, DTD_ELEM_IPD)) 2010 continue; 2011 if (strlen(tabptr->zone_fs_dir) > 0) { 2012 if ((fetchprop(cur, DTD_ATTR_DIR, dirname, 2013 sizeof (dirname)) == Z_OK) && 2014 (strcmp(tabptr->zone_fs_dir, dirname) == 0)) { 2015 if (match == NULL) 2016 match = cur; 2017 else 2018 return (Z_INSUFFICIENT_SPEC); 2019 } 2020 } 2021 } 2022 2023 if (match == NULL) 2024 return (Z_NO_RESOURCE_ID); 2025 2026 cur = match; 2027 2028 if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 2029 sizeof (tabptr->zone_fs_dir))) != Z_OK) 2030 return (err); 2031 2032 return (Z_OK); 2033 } 2034 2035 /* 2036 * Compare two IP addresses in string form. Allow for the possibility that 2037 * one might have "/<prefix-length>" at the end: allow a match on just the 2038 * IP address (or host name) part. 2039 */ 2040 2041 boolean_t 2042 zonecfg_same_net_address(char *a1, char *a2) 2043 { 2044 char *slashp, *slashp1, *slashp2; 2045 int result; 2046 2047 if (strcmp(a1, a2) == 0) 2048 return (B_TRUE); 2049 2050 /* 2051 * If neither has a slash or both do, they need to match to be 2052 * considered the same, but they did not match above, so fail. 2053 */ 2054 slashp1 = strchr(a1, '/'); 2055 slashp2 = strchr(a2, '/'); 2056 if ((slashp1 == NULL && slashp2 == NULL) || 2057 (slashp1 != NULL && slashp2 != NULL)) 2058 return (B_FALSE); 2059 2060 /* 2061 * Only one had a slash: pick that one, zero out the slash, compare 2062 * the "address only" strings, restore the slash, and return the 2063 * result of the comparison. 2064 */ 2065 slashp = (slashp1 == NULL) ? slashp2 : slashp1; 2066 *slashp = '\0'; 2067 result = strcmp(a1, a2); 2068 *slashp = '/'; 2069 return ((result == 0)); 2070 } 2071 2072 int 2073 zonecfg_valid_net_address(char *address, struct lifreq *lifr) 2074 { 2075 struct sockaddr_in *sin4; 2076 struct sockaddr_in6 *sin6; 2077 struct addrinfo hints, *result; 2078 char *slashp = strchr(address, '/'); 2079 2080 bzero(lifr, sizeof (struct lifreq)); 2081 sin4 = (struct sockaddr_in *)&lifr->lifr_addr; 2082 sin6 = (struct sockaddr_in6 *)&lifr->lifr_addr; 2083 if (slashp != NULL) 2084 *slashp = '\0'; 2085 if (inet_pton(AF_INET, address, &sin4->sin_addr) == 1) { 2086 sin4->sin_family = AF_INET; 2087 } else if (inet_pton(AF_INET6, address, &sin6->sin6_addr) == 1) { 2088 if (slashp == NULL) 2089 return (Z_IPV6_ADDR_PREFIX_LEN); 2090 sin6->sin6_family = AF_INET6; 2091 } else { 2092 /* "address" may be a host name */ 2093 (void) memset(&hints, 0, sizeof (hints)); 2094 hints.ai_family = PF_INET; 2095 if (getaddrinfo(address, NULL, &hints, &result) != 0) 2096 return (Z_BOGUS_ADDRESS); 2097 sin4->sin_family = result->ai_family; 2098 2099 (void) memcpy(&sin4->sin_addr, 2100 /* LINTED E_BAD_PTR_CAST_ALIGN */ 2101 &((struct sockaddr_in *)result->ai_addr)->sin_addr, 2102 sizeof (struct in_addr)); 2103 2104 freeaddrinfo(result); 2105 } 2106 return (Z_OK); 2107 } 2108 2109 boolean_t 2110 zonecfg_ifname_exists(sa_family_t af, char *ifname) 2111 { 2112 struct lifreq lifr; 2113 int so; 2114 int save_errno; 2115 2116 (void) memset(&lifr, 0, sizeof (lifr)); 2117 (void) strlcpy(lifr.lifr_name, ifname, sizeof (lifr.lifr_name)); 2118 lifr.lifr_addr.ss_family = af; 2119 if ((so = socket(af, SOCK_DGRAM, 0)) < 0) { 2120 /* Odd - can't tell if the ifname exists */ 2121 return (B_FALSE); 2122 } 2123 if (ioctl(so, SIOCGLIFFLAGS, (caddr_t)&lifr) < 0) { 2124 save_errno = errno; 2125 (void) close(so); 2126 errno = save_errno; 2127 return (B_FALSE); 2128 } 2129 (void) close(so); 2130 return (B_TRUE); 2131 } 2132 2133 /* 2134 * Determines whether there is a net resource with the physical interface, IP 2135 * address, and default router specified by 'tabptr' in the zone configuration 2136 * to which 'handle' refers. 'tabptr' must have an interface, an address, a 2137 * default router, or a combination of the three. This function returns Z_OK 2138 * iff there is exactly one net resource matching the query specified by 2139 * 'tabptr'. The function returns Z_INSUFFICIENT_SPEC if there are multiple 2140 * matches or 'tabptr' does not specify a physical interface, address, or 2141 * default router. The function returns Z_NO_RESOURCE_ID if are no matches. 2142 * 2143 * Errors might also be returned if the entry that exactly matches the 2144 * query lacks critical network resource information. 2145 * 2146 * If there is a single match, then the matching entry's physical interface, IP 2147 * address, and default router information are stored in 'tabptr'. 2148 */ 2149 int 2150 zonecfg_lookup_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 2151 { 2152 xmlNodePtr cur; 2153 xmlNodePtr firstmatch; 2154 int err; 2155 char address[INET6_ADDRSTRLEN]; 2156 char physical[LIFNAMSIZ]; 2157 size_t addrspec; /* nonzero if tabptr has IP addr */ 2158 size_t physspec; /* nonzero if tabptr has interface */ 2159 size_t defrouterspec; /* nonzero if tabptr has def. router */ 2160 2161 if (tabptr == NULL) 2162 return (Z_INVAL); 2163 2164 /* 2165 * Determine the fields that will be searched. There must be at least 2166 * one. 2167 * 2168 * zone_nwif_address, zone_nwif_physical, and zone_nwif_defrouter are 2169 * arrays, so no NULL checks are necessary. 2170 */ 2171 addrspec = strlen(tabptr->zone_nwif_address); 2172 physspec = strlen(tabptr->zone_nwif_physical); 2173 defrouterspec = strlen(tabptr->zone_nwif_defrouter); 2174 if (addrspec == 0 && physspec == 0 && defrouterspec == 0) 2175 return (Z_INSUFFICIENT_SPEC); 2176 2177 if ((err = operation_prep(handle)) != Z_OK) 2178 return (err); 2179 2180 /* 2181 * Iterate over the configuration's elements and look for net elements 2182 * that match the query. 2183 */ 2184 firstmatch = NULL; 2185 cur = handle->zone_dh_cur; 2186 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2187 /* Skip non-net elements */ 2188 if (xmlStrcmp(cur->name, DTD_ELEM_NET)) 2189 continue; 2190 2191 /* 2192 * If any relevant fields don't match the query, then skip 2193 * the current net element. 2194 */ 2195 if (physspec != 0 && (fetchprop(cur, DTD_ATTR_PHYSICAL, 2196 physical, sizeof (physical)) != Z_OK || 2197 strcmp(tabptr->zone_nwif_physical, physical) != 0)) 2198 continue; 2199 if (addrspec != 0 && (fetchprop(cur, DTD_ATTR_ADDRESS, address, 2200 sizeof (address)) != Z_OK || 2201 !zonecfg_same_net_address(tabptr->zone_nwif_address, 2202 address))) 2203 continue; 2204 if (defrouterspec != 0 && (fetchprop(cur, DTD_ATTR_DEFROUTER, 2205 address, sizeof (address)) != Z_OK || 2206 !zonecfg_same_net_address(tabptr->zone_nwif_defrouter, 2207 address))) 2208 continue; 2209 2210 /* 2211 * The current net element matches the query. Select it if 2212 * it's the first match; otherwise, abort the search. 2213 */ 2214 if (firstmatch == NULL) 2215 firstmatch = cur; 2216 else 2217 return (Z_INSUFFICIENT_SPEC); 2218 } 2219 if (firstmatch == NULL) 2220 return (Z_NO_RESOURCE_ID); 2221 2222 cur = firstmatch; 2223 2224 if ((err = fetchprop(cur, DTD_ATTR_PHYSICAL, tabptr->zone_nwif_physical, 2225 sizeof (tabptr->zone_nwif_physical))) != Z_OK) 2226 return (err); 2227 2228 if ((err = fetchprop(cur, DTD_ATTR_ADDRESS, tabptr->zone_nwif_address, 2229 sizeof (tabptr->zone_nwif_address))) != Z_OK) 2230 return (err); 2231 2232 if ((err = fetchprop(cur, DTD_ATTR_DEFROUTER, 2233 tabptr->zone_nwif_defrouter, 2234 sizeof (tabptr->zone_nwif_defrouter))) != Z_OK) 2235 return (err); 2236 2237 return (Z_OK); 2238 } 2239 2240 static int 2241 zonecfg_add_nwif_core(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 2242 { 2243 xmlNodePtr newnode, cur = handle->zone_dh_cur; 2244 int err; 2245 2246 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_NET, NULL); 2247 if ((err = newprop(newnode, DTD_ATTR_ADDRESS, 2248 tabptr->zone_nwif_address)) != Z_OK) 2249 return (err); 2250 if ((err = newprop(newnode, DTD_ATTR_PHYSICAL, 2251 tabptr->zone_nwif_physical)) != Z_OK) 2252 return (err); 2253 /* 2254 * Do not add this property when it is not set, for backwards 2255 * compatibility and because it is optional. 2256 */ 2257 if ((strlen(tabptr->zone_nwif_defrouter) > 0) && 2258 ((err = newprop(newnode, DTD_ATTR_DEFROUTER, 2259 tabptr->zone_nwif_defrouter)) != Z_OK)) 2260 return (err); 2261 return (Z_OK); 2262 } 2263 2264 int 2265 zonecfg_add_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 2266 { 2267 int err; 2268 2269 if (tabptr == NULL) 2270 return (Z_INVAL); 2271 2272 if ((err = operation_prep(handle)) != Z_OK) 2273 return (err); 2274 2275 if ((err = zonecfg_add_nwif_core(handle, tabptr)) != Z_OK) 2276 return (err); 2277 2278 return (Z_OK); 2279 } 2280 2281 static int 2282 zonecfg_delete_nwif_core(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 2283 { 2284 xmlNodePtr cur = handle->zone_dh_cur; 2285 boolean_t addr_match, phys_match; 2286 2287 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2288 if (xmlStrcmp(cur->name, DTD_ELEM_NET)) 2289 continue; 2290 2291 addr_match = match_prop(cur, DTD_ATTR_ADDRESS, 2292 tabptr->zone_nwif_address); 2293 phys_match = match_prop(cur, DTD_ATTR_PHYSICAL, 2294 tabptr->zone_nwif_physical); 2295 2296 if (addr_match && phys_match) { 2297 xmlUnlinkNode(cur); 2298 xmlFreeNode(cur); 2299 return (Z_OK); 2300 } 2301 } 2302 return (Z_NO_RESOURCE_ID); 2303 } 2304 2305 int 2306 zonecfg_delete_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 2307 { 2308 int err; 2309 2310 if (tabptr == NULL) 2311 return (Z_INVAL); 2312 2313 if ((err = operation_prep(handle)) != Z_OK) 2314 return (err); 2315 2316 if ((err = zonecfg_delete_nwif_core(handle, tabptr)) != Z_OK) 2317 return (err); 2318 2319 return (Z_OK); 2320 } 2321 2322 int 2323 zonecfg_modify_nwif( 2324 zone_dochandle_t handle, 2325 struct zone_nwiftab *oldtabptr, 2326 struct zone_nwiftab *newtabptr) 2327 { 2328 int err; 2329 2330 if (oldtabptr == NULL || newtabptr == NULL) 2331 return (Z_INVAL); 2332 2333 if ((err = operation_prep(handle)) != Z_OK) 2334 return (err); 2335 2336 if ((err = zonecfg_delete_nwif_core(handle, oldtabptr)) != Z_OK) 2337 return (err); 2338 2339 if ((err = zonecfg_add_nwif_core(handle, newtabptr)) != Z_OK) 2340 return (err); 2341 2342 return (Z_OK); 2343 } 2344 2345 /* 2346 * Gets the zone hostid string stored in the specified zone configuration 2347 * document. This function returns Z_OK on success. Z_BAD_PROPERTY is returned 2348 * if the config file doesn't specify a hostid or if the hostid is blank. 2349 * 2350 * Note that buflen should be at least HW_HOSTID_LEN. 2351 */ 2352 int 2353 zonecfg_get_hostid(zone_dochandle_t handle, char *bufp, size_t buflen) 2354 { 2355 int err; 2356 2357 if ((err = getrootattr(handle, DTD_ATTR_HOSTID, bufp, buflen)) != Z_OK) 2358 return (err); 2359 if (bufp[0] == '\0') 2360 return (Z_BAD_PROPERTY); 2361 return (Z_OK); 2362 } 2363 2364 /* 2365 * Sets the hostid string in the specified zone config document to the given 2366 * string value. If 'hostidp' is NULL, then the config document's hostid 2367 * attribute is cleared. Non-NULL hostids are validated. This function returns 2368 * Z_OK on success. Any other return value indicates failure. 2369 */ 2370 int 2371 zonecfg_set_hostid(zone_dochandle_t handle, const char *hostidp) 2372 { 2373 int err; 2374 2375 /* 2376 * A NULL hostid string is interpreted as a request to clear the 2377 * hostid. 2378 */ 2379 if (hostidp == NULL || (err = zonecfg_valid_hostid(hostidp)) == Z_OK) 2380 return (setrootattr(handle, DTD_ATTR_HOSTID, hostidp)); 2381 return (err); 2382 } 2383 2384 /* 2385 * Determines if the specified string is a valid hostid string. This function 2386 * returns Z_OK if the string is a valid hostid string. It returns Z_INVAL if 2387 * 'hostidp' is NULL, Z_TOO_BIG if 'hostidp' refers to a string buffer 2388 * containing a hex string with more than 8 digits, and Z_HOSTID_FUBAR if the 2389 * string has an invalid format. 2390 */ 2391 int 2392 zonecfg_valid_hostid(const char *hostidp) 2393 { 2394 char *currentp; 2395 u_longlong_t hostidval; 2396 size_t len; 2397 2398 if (hostidp == NULL) 2399 return (Z_INVAL); 2400 2401 /* Empty strings and strings with whitespace are invalid. */ 2402 if (*hostidp == '\0') 2403 return (Z_HOSTID_FUBAR); 2404 for (currentp = (char *)hostidp; *currentp != '\0'; ++currentp) { 2405 if (isspace(*currentp)) 2406 return (Z_HOSTID_FUBAR); 2407 } 2408 len = (size_t)(currentp - hostidp); 2409 2410 /* 2411 * The caller might pass a hostid that is larger than the maximum 2412 * unsigned 32-bit integral value. Check for this! Also, make sure 2413 * that the whole string is converted (this helps us find illegal 2414 * characters) and that the whole string fits within a buffer of size 2415 * HW_HOSTID_LEN. 2416 */ 2417 currentp = (char *)hostidp; 2418 if (strncmp(hostidp, "0x", 2) == 0 || strncmp(hostidp, "0X", 2) == 0) 2419 currentp += 2; 2420 hostidval = strtoull(currentp, ¤tp, 16); 2421 if ((size_t)(currentp - hostidp) >= HW_HOSTID_LEN) 2422 return (Z_TOO_BIG); 2423 if (hostidval > UINT_MAX || hostidval == HW_INVALID_HOSTID || 2424 currentp != hostidp + len) 2425 return (Z_HOSTID_FUBAR); 2426 return (Z_OK); 2427 } 2428 2429 int 2430 zonecfg_lookup_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 2431 { 2432 xmlNodePtr cur, firstmatch; 2433 int err; 2434 char match[MAXPATHLEN]; 2435 2436 if (tabptr == NULL) 2437 return (Z_INVAL); 2438 2439 if ((err = operation_prep(handle)) != Z_OK) 2440 return (err); 2441 2442 cur = handle->zone_dh_cur; 2443 firstmatch = NULL; 2444 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2445 if (xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 2446 continue; 2447 if (strlen(tabptr->zone_dev_match) == 0) 2448 continue; 2449 2450 if ((fetchprop(cur, DTD_ATTR_MATCH, match, 2451 sizeof (match)) == Z_OK)) { 2452 if (strcmp(tabptr->zone_dev_match, 2453 match) == 0) { 2454 if (firstmatch == NULL) 2455 firstmatch = cur; 2456 else if (firstmatch != cur) 2457 return (Z_INSUFFICIENT_SPEC); 2458 } else { 2459 /* 2460 * If another property matched but this 2461 * one doesn't then reset firstmatch. 2462 */ 2463 if (firstmatch == cur) 2464 firstmatch = NULL; 2465 } 2466 } 2467 } 2468 if (firstmatch == NULL) 2469 return (Z_NO_RESOURCE_ID); 2470 2471 cur = firstmatch; 2472 2473 if ((err = fetchprop(cur, DTD_ATTR_MATCH, tabptr->zone_dev_match, 2474 sizeof (tabptr->zone_dev_match))) != Z_OK) 2475 return (err); 2476 2477 return (Z_OK); 2478 } 2479 2480 static int 2481 zonecfg_add_dev_core(zone_dochandle_t handle, struct zone_devtab *tabptr) 2482 { 2483 xmlNodePtr newnode, cur = handle->zone_dh_cur; 2484 int err; 2485 2486 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DEVICE, NULL); 2487 2488 if ((err = newprop(newnode, DTD_ATTR_MATCH, 2489 tabptr->zone_dev_match)) != Z_OK) 2490 return (err); 2491 2492 return (Z_OK); 2493 } 2494 2495 int 2496 zonecfg_add_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 2497 { 2498 int err; 2499 2500 if (tabptr == NULL) 2501 return (Z_INVAL); 2502 2503 if ((err = operation_prep(handle)) != Z_OK) 2504 return (err); 2505 2506 if ((err = zonecfg_add_dev_core(handle, tabptr)) != Z_OK) 2507 return (err); 2508 2509 return (Z_OK); 2510 } 2511 2512 static int 2513 zonecfg_delete_dev_core(zone_dochandle_t handle, struct zone_devtab *tabptr) 2514 { 2515 xmlNodePtr cur = handle->zone_dh_cur; 2516 int match_match; 2517 2518 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2519 if (xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 2520 continue; 2521 2522 match_match = match_prop(cur, DTD_ATTR_MATCH, 2523 tabptr->zone_dev_match); 2524 2525 if (match_match) { 2526 xmlUnlinkNode(cur); 2527 xmlFreeNode(cur); 2528 return (Z_OK); 2529 } 2530 } 2531 return (Z_NO_RESOURCE_ID); 2532 } 2533 2534 int 2535 zonecfg_delete_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 2536 { 2537 int err; 2538 2539 if (tabptr == NULL) 2540 return (Z_INVAL); 2541 2542 if ((err = operation_prep(handle)) != Z_OK) 2543 return (err); 2544 2545 if ((err = zonecfg_delete_dev_core(handle, tabptr)) != Z_OK) 2546 return (err); 2547 2548 return (Z_OK); 2549 } 2550 2551 int 2552 zonecfg_modify_dev( 2553 zone_dochandle_t handle, 2554 struct zone_devtab *oldtabptr, 2555 struct zone_devtab *newtabptr) 2556 { 2557 int err; 2558 2559 if (oldtabptr == NULL || newtabptr == NULL) 2560 return (Z_INVAL); 2561 2562 if ((err = operation_prep(handle)) != Z_OK) 2563 return (err); 2564 2565 if ((err = zonecfg_delete_dev_core(handle, oldtabptr)) != Z_OK) 2566 return (err); 2567 2568 if ((err = zonecfg_add_dev_core(handle, newtabptr)) != Z_OK) 2569 return (err); 2570 2571 return (Z_OK); 2572 } 2573 2574 /* Lock to serialize all devwalks */ 2575 static pthread_mutex_t zonecfg_devwalk_lock = PTHREAD_MUTEX_INITIALIZER; 2576 /* 2577 * Global variables used to pass data from zonecfg_dev_manifest to the nftw 2578 * call-back (zonecfg_devwalk_cb). g_devwalk_data is really the void* 2579 * parameter and g_devwalk_cb is really the *cb parameter from 2580 * zonecfg_dev_manifest. 2581 */ 2582 typedef struct __g_devwalk_data *g_devwalk_data_t; 2583 static g_devwalk_data_t g_devwalk_data; 2584 static int (*g_devwalk_cb)(const char *, uid_t, gid_t, mode_t, const char *, 2585 void *); 2586 static size_t g_devwalk_skip_prefix; 2587 2588 /* 2589 * zonecfg_dev_manifest call-back function used during detach to generate the 2590 * dev info in the manifest. 2591 */ 2592 static int 2593 get_detach_dev_entry(const char *name, uid_t uid, gid_t gid, mode_t mode, 2594 const char *acl, void *hdl) 2595 { 2596 zone_dochandle_t handle = (zone_dochandle_t)hdl; 2597 xmlNodePtr newnode; 2598 xmlNodePtr cur; 2599 int err; 2600 char buf[128]; 2601 2602 if ((err = operation_prep(handle)) != Z_OK) 2603 return (err); 2604 2605 cur = handle->zone_dh_cur; 2606 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DEV_PERM, NULL); 2607 if ((err = newprop(newnode, DTD_ATTR_NAME, (char *)name)) != Z_OK) 2608 return (err); 2609 (void) snprintf(buf, sizeof (buf), "%lu", uid); 2610 if ((err = newprop(newnode, DTD_ATTR_UID, buf)) != Z_OK) 2611 return (err); 2612 (void) snprintf(buf, sizeof (buf), "%lu", gid); 2613 if ((err = newprop(newnode, DTD_ATTR_GID, buf)) != Z_OK) 2614 return (err); 2615 (void) snprintf(buf, sizeof (buf), "%o", mode); 2616 if ((err = newprop(newnode, DTD_ATTR_MODE, buf)) != Z_OK) 2617 return (err); 2618 if ((err = newprop(newnode, DTD_ATTR_ACL, (char *)acl)) != Z_OK) 2619 return (err); 2620 return (Z_OK); 2621 } 2622 2623 /* 2624 * This is the nftw call-back function used by zonecfg_dev_manifest. It is 2625 * responsible for calling the actual call-back. 2626 */ 2627 /* ARGSUSED2 */ 2628 static int 2629 zonecfg_devwalk_cb(const char *path, const struct stat *st, int f, 2630 struct FTW *ftw) 2631 { 2632 acl_t *acl; 2633 char *acl_txt = NULL; 2634 2635 /* skip all but character and block devices */ 2636 if (!S_ISBLK(st->st_mode) && !S_ISCHR(st->st_mode)) 2637 return (0); 2638 2639 if ((acl_get(path, ACL_NO_TRIVIAL, &acl) == 0) && 2640 acl != NULL) { 2641 acl_txt = acl_totext(acl, ACL_NORESOLVE); 2642 acl_free(acl); 2643 } 2644 2645 if (strlen(path) <= g_devwalk_skip_prefix) 2646 return (0); 2647 2648 g_devwalk_cb(path + g_devwalk_skip_prefix, st->st_uid, st->st_gid, 2649 st->st_mode & S_IAMB, acl_txt != NULL ? acl_txt : "", 2650 g_devwalk_data); 2651 free(acl_txt); 2652 return (0); 2653 } 2654 2655 /* 2656 * Walk the dev tree for the zone specified by hdl and call the 2657 * get_detach_dev_entry call-back function for each entry in the tree. The 2658 * call-back will be passed the name, uid, gid, mode, acl string and the 2659 * handle input parameter for each dev entry. 2660 * 2661 * Data is passed to get_detach_dev_entry through the global variables 2662 * g_devwalk_data, *g_devwalk_cb, and g_devwalk_skip_prefix. The 2663 * zonecfg_devwalk_cb function will actually call get_detach_dev_entry. 2664 */ 2665 int 2666 zonecfg_dev_manifest(zone_dochandle_t hdl) 2667 { 2668 char path[MAXPATHLEN]; 2669 int ret; 2670 2671 if ((ret = zonecfg_get_zonepath(hdl, path, sizeof (path))) != Z_OK) 2672 return (ret); 2673 2674 if (strlcat(path, "/dev", sizeof (path)) >= sizeof (path)) 2675 return (Z_TOO_BIG); 2676 2677 /* 2678 * We have to serialize all devwalks in the same process 2679 * (which should be fine), since nftw() is so badly designed. 2680 */ 2681 (void) pthread_mutex_lock(&zonecfg_devwalk_lock); 2682 2683 g_devwalk_skip_prefix = strlen(path) + 1; 2684 g_devwalk_data = (g_devwalk_data_t)hdl; 2685 g_devwalk_cb = get_detach_dev_entry; 2686 (void) nftw(path, zonecfg_devwalk_cb, 0, FTW_PHYS); 2687 2688 (void) pthread_mutex_unlock(&zonecfg_devwalk_lock); 2689 return (Z_OK); 2690 } 2691 2692 /* 2693 * Update the owner, group, mode and acl on the specified dev (inpath) for 2694 * the zone (hdl). This function can be used to fix up the dev tree after 2695 * attaching a migrated zone. 2696 */ 2697 int 2698 zonecfg_devperms_apply(zone_dochandle_t hdl, const char *inpath, uid_t owner, 2699 gid_t group, mode_t mode, const char *acltxt) 2700 { 2701 int ret; 2702 char path[MAXPATHLEN]; 2703 struct stat st; 2704 acl_t *aclp; 2705 2706 if ((ret = zonecfg_get_zonepath(hdl, path, sizeof (path))) != Z_OK) 2707 return (ret); 2708 2709 if (strlcat(path, "/dev/", sizeof (path)) >= sizeof (path)) 2710 return (Z_TOO_BIG); 2711 if (strlcat(path, inpath, sizeof (path)) >= sizeof (path)) 2712 return (Z_TOO_BIG); 2713 2714 if (stat(path, &st) == -1) 2715 return (Z_INVAL); 2716 2717 /* make sure we're only touching device nodes */ 2718 if (!S_ISCHR(st.st_mode) && !S_ISBLK(st.st_mode)) 2719 return (Z_INVAL); 2720 2721 if (chown(path, owner, group) == -1) 2722 return (Z_SYSTEM); 2723 2724 if (chmod(path, mode) == -1) 2725 return (Z_SYSTEM); 2726 2727 if ((acltxt == NULL) || (strcmp(acltxt, "") == 0)) 2728 return (Z_OK); 2729 2730 if (acl_fromtext(acltxt, &aclp) != 0) { 2731 errno = EINVAL; 2732 return (Z_SYSTEM); 2733 } 2734 2735 errno = 0; 2736 if (acl_set(path, aclp) == -1) { 2737 free(aclp); 2738 return (Z_SYSTEM); 2739 } 2740 2741 free(aclp); 2742 return (Z_OK); 2743 } 2744 2745 /* 2746 * This function finds everything mounted under a zone's rootpath. 2747 * This returns the number of mounts under rootpath, or -1 on error. 2748 * callback is called once per mount found with the first argument 2749 * pointing to a mnttab structure containing the mount's information. 2750 * 2751 * If the callback function returns non-zero zonecfg_find_mounts 2752 * aborts with an error. 2753 */ 2754 int 2755 zonecfg_find_mounts(char *rootpath, int (*callback)(const struct mnttab *, 2756 void *), void *priv) { 2757 FILE *mnttab; 2758 struct mnttab m; 2759 size_t l; 2760 int zfsl; 2761 int rv = 0; 2762 char zfs_path[MAXPATHLEN]; 2763 2764 assert(rootpath != NULL); 2765 2766 if ((zfsl = snprintf(zfs_path, sizeof (zfs_path), "%s/.zfs/", rootpath)) 2767 >= sizeof (zfs_path)) 2768 return (-1); 2769 2770 l = strlen(rootpath); 2771 2772 mnttab = fopen("/etc/mnttab", "r"); 2773 2774 if (mnttab == NULL) 2775 return (-1); 2776 2777 if (ioctl(fileno(mnttab), MNTIOC_SHOWHIDDEN, NULL) < 0) { 2778 rv = -1; 2779 goto out; 2780 } 2781 2782 while (!getmntent(mnttab, &m)) { 2783 if ((strncmp(rootpath, m.mnt_mountp, l) == 0) && 2784 (m.mnt_mountp[l] == '/') && 2785 (strncmp(zfs_path, m.mnt_mountp, zfsl) != 0)) { 2786 rv++; 2787 if (callback == NULL) 2788 continue; 2789 if (callback(&m, priv)) { 2790 rv = -1; 2791 goto out; 2792 2793 } 2794 } 2795 } 2796 2797 out: 2798 (void) fclose(mnttab); 2799 return (rv); 2800 } 2801 2802 int 2803 zonecfg_lookup_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 2804 { 2805 xmlNodePtr cur, firstmatch; 2806 int err; 2807 char name[MAXNAMELEN], type[MAXNAMELEN], value[MAXNAMELEN]; 2808 2809 if (tabptr == NULL) 2810 return (Z_INVAL); 2811 2812 if ((err = operation_prep(handle)) != Z_OK) 2813 return (err); 2814 2815 cur = handle->zone_dh_cur; 2816 firstmatch = NULL; 2817 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2818 if (xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 2819 continue; 2820 if (strlen(tabptr->zone_attr_name) > 0) { 2821 if ((fetchprop(cur, DTD_ATTR_NAME, name, 2822 sizeof (name)) == Z_OK) && 2823 (strcmp(tabptr->zone_attr_name, name) == 0)) { 2824 if (firstmatch == NULL) 2825 firstmatch = cur; 2826 else 2827 return (Z_INSUFFICIENT_SPEC); 2828 } 2829 } 2830 if (strlen(tabptr->zone_attr_type) > 0) { 2831 if ((fetchprop(cur, DTD_ATTR_TYPE, type, 2832 sizeof (type)) == Z_OK)) { 2833 if (strcmp(tabptr->zone_attr_type, type) == 0) { 2834 if (firstmatch == NULL) 2835 firstmatch = cur; 2836 else if (firstmatch != cur) 2837 return (Z_INSUFFICIENT_SPEC); 2838 } else { 2839 /* 2840 * If another property matched but this 2841 * one doesn't then reset firstmatch. 2842 */ 2843 if (firstmatch == cur) 2844 firstmatch = NULL; 2845 } 2846 } 2847 } 2848 if (strlen(tabptr->zone_attr_value) > 0) { 2849 if ((fetchprop(cur, DTD_ATTR_VALUE, value, 2850 sizeof (value)) == Z_OK)) { 2851 if (strcmp(tabptr->zone_attr_value, value) == 2852 0) { 2853 if (firstmatch == NULL) 2854 firstmatch = cur; 2855 else if (firstmatch != cur) 2856 return (Z_INSUFFICIENT_SPEC); 2857 } else { 2858 /* 2859 * If another property matched but this 2860 * one doesn't then reset firstmatch. 2861 */ 2862 if (firstmatch == cur) 2863 firstmatch = NULL; 2864 } 2865 } 2866 } 2867 } 2868 if (firstmatch == NULL) 2869 return (Z_NO_RESOURCE_ID); 2870 2871 cur = firstmatch; 2872 2873 if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_attr_name, 2874 sizeof (tabptr->zone_attr_name))) != Z_OK) 2875 return (err); 2876 2877 if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_attr_type, 2878 sizeof (tabptr->zone_attr_type))) != Z_OK) 2879 return (err); 2880 2881 if ((err = fetchprop(cur, DTD_ATTR_VALUE, tabptr->zone_attr_value, 2882 sizeof (tabptr->zone_attr_value))) != Z_OK) 2883 return (err); 2884 2885 return (Z_OK); 2886 } 2887 2888 static int 2889 zonecfg_add_attr_core(zone_dochandle_t handle, struct zone_attrtab *tabptr) 2890 { 2891 xmlNodePtr newnode, cur = handle->zone_dh_cur; 2892 int err; 2893 2894 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_ATTR, NULL); 2895 err = newprop(newnode, DTD_ATTR_NAME, tabptr->zone_attr_name); 2896 if (err != Z_OK) 2897 return (err); 2898 err = newprop(newnode, DTD_ATTR_TYPE, tabptr->zone_attr_type); 2899 if (err != Z_OK) 2900 return (err); 2901 err = newprop(newnode, DTD_ATTR_VALUE, tabptr->zone_attr_value); 2902 if (err != Z_OK) 2903 return (err); 2904 return (Z_OK); 2905 } 2906 2907 int 2908 zonecfg_add_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 2909 { 2910 int err; 2911 2912 if (tabptr == NULL) 2913 return (Z_INVAL); 2914 2915 if ((err = operation_prep(handle)) != Z_OK) 2916 return (err); 2917 2918 if ((err = zonecfg_add_attr_core(handle, tabptr)) != Z_OK) 2919 return (err); 2920 2921 return (Z_OK); 2922 } 2923 2924 static int 2925 zonecfg_delete_attr_core(zone_dochandle_t handle, struct zone_attrtab *tabptr) 2926 { 2927 xmlNodePtr cur = handle->zone_dh_cur; 2928 int name_match, type_match, value_match; 2929 2930 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2931 if (xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 2932 continue; 2933 2934 name_match = match_prop(cur, DTD_ATTR_NAME, 2935 tabptr->zone_attr_name); 2936 type_match = match_prop(cur, DTD_ATTR_TYPE, 2937 tabptr->zone_attr_type); 2938 value_match = match_prop(cur, DTD_ATTR_VALUE, 2939 tabptr->zone_attr_value); 2940 2941 if (name_match && type_match && value_match) { 2942 xmlUnlinkNode(cur); 2943 xmlFreeNode(cur); 2944 return (Z_OK); 2945 } 2946 } 2947 return (Z_NO_RESOURCE_ID); 2948 } 2949 2950 int 2951 zonecfg_delete_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 2952 { 2953 int err; 2954 2955 if (tabptr == NULL) 2956 return (Z_INVAL); 2957 2958 if ((err = operation_prep(handle)) != Z_OK) 2959 return (err); 2960 2961 if ((err = zonecfg_delete_attr_core(handle, tabptr)) != Z_OK) 2962 return (err); 2963 2964 return (Z_OK); 2965 } 2966 2967 int 2968 zonecfg_modify_attr( 2969 zone_dochandle_t handle, 2970 struct zone_attrtab *oldtabptr, 2971 struct zone_attrtab *newtabptr) 2972 { 2973 int err; 2974 2975 if (oldtabptr == NULL || newtabptr == NULL) 2976 return (Z_INVAL); 2977 2978 if ((err = operation_prep(handle)) != Z_OK) 2979 return (err); 2980 2981 if ((err = zonecfg_delete_attr_core(handle, oldtabptr)) != Z_OK) 2982 return (err); 2983 2984 if ((err = zonecfg_add_attr_core(handle, newtabptr)) != Z_OK) 2985 return (err); 2986 2987 return (Z_OK); 2988 } 2989 2990 int 2991 zonecfg_get_attr_boolean(const struct zone_attrtab *attr, boolean_t *value) 2992 { 2993 if (attr == NULL) 2994 return (Z_INVAL); 2995 2996 if (strcmp(attr->zone_attr_type, DTD_ENTITY_BOOLEAN) != 0) 2997 return (Z_INVAL); 2998 2999 if (strcmp(attr->zone_attr_value, DTD_ENTITY_TRUE) == 0) { 3000 *value = B_TRUE; 3001 return (Z_OK); 3002 } 3003 if (strcmp(attr->zone_attr_value, DTD_ENTITY_FALSE) == 0) { 3004 *value = B_FALSE; 3005 return (Z_OK); 3006 } 3007 return (Z_INVAL); 3008 } 3009 3010 int 3011 zonecfg_get_attr_int(const struct zone_attrtab *attr, int64_t *value) 3012 { 3013 long long result; 3014 char *endptr; 3015 3016 if (attr == NULL) 3017 return (Z_INVAL); 3018 3019 if (strcmp(attr->zone_attr_type, DTD_ENTITY_INT) != 0) 3020 return (Z_INVAL); 3021 3022 errno = 0; 3023 result = strtoll(attr->zone_attr_value, &endptr, 10); 3024 if (errno != 0 || *endptr != '\0') 3025 return (Z_INVAL); 3026 *value = result; 3027 return (Z_OK); 3028 } 3029 3030 int 3031 zonecfg_get_attr_string(const struct zone_attrtab *attr, char *value, 3032 size_t val_sz) 3033 { 3034 if (attr == NULL) 3035 return (Z_INVAL); 3036 3037 if (strcmp(attr->zone_attr_type, DTD_ENTITY_STRING) != 0) 3038 return (Z_INVAL); 3039 3040 if (strlcpy(value, attr->zone_attr_value, val_sz) >= val_sz) 3041 return (Z_TOO_BIG); 3042 return (Z_OK); 3043 } 3044 3045 int 3046 zonecfg_get_attr_uint(const struct zone_attrtab *attr, uint64_t *value) 3047 { 3048 unsigned long long result; 3049 long long neg_result; 3050 char *endptr; 3051 3052 if (attr == NULL) 3053 return (Z_INVAL); 3054 3055 if (strcmp(attr->zone_attr_type, DTD_ENTITY_UINT) != 0) 3056 return (Z_INVAL); 3057 3058 errno = 0; 3059 result = strtoull(attr->zone_attr_value, &endptr, 10); 3060 if (errno != 0 || *endptr != '\0') 3061 return (Z_INVAL); 3062 errno = 0; 3063 neg_result = strtoll(attr->zone_attr_value, &endptr, 10); 3064 /* 3065 * Incredibly, strtoull("<negative number>", ...) will not fail but 3066 * return whatever (negative) number cast as a u_longlong_t, so we 3067 * need to look for this here. 3068 */ 3069 if (errno == 0 && neg_result < 0) 3070 return (Z_INVAL); 3071 *value = result; 3072 return (Z_OK); 3073 } 3074 3075 int 3076 zonecfg_lookup_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 3077 { 3078 xmlNodePtr cur, val; 3079 char savedname[MAXNAMELEN]; 3080 struct zone_rctlvaltab *valptr; 3081 int err; 3082 3083 if (strlen(tabptr->zone_rctl_name) == 0) 3084 return (Z_INVAL); 3085 3086 if ((err = operation_prep(handle)) != Z_OK) 3087 return (err); 3088 3089 cur = handle->zone_dh_cur; 3090 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 3091 if (xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 3092 continue; 3093 if ((fetchprop(cur, DTD_ATTR_NAME, savedname, 3094 sizeof (savedname)) == Z_OK) && 3095 (strcmp(savedname, tabptr->zone_rctl_name) == 0)) { 3096 tabptr->zone_rctl_valptr = NULL; 3097 for (val = cur->xmlChildrenNode; val != NULL; 3098 val = val->next) { 3099 valptr = (struct zone_rctlvaltab *)malloc( 3100 sizeof (struct zone_rctlvaltab)); 3101 if (valptr == NULL) 3102 return (Z_NOMEM); 3103 if ((fetchprop(val, DTD_ATTR_PRIV, 3104 valptr->zone_rctlval_priv, 3105 sizeof (valptr->zone_rctlval_priv)) != 3106 Z_OK)) 3107 break; 3108 if ((fetchprop(val, DTD_ATTR_LIMIT, 3109 valptr->zone_rctlval_limit, 3110 sizeof (valptr->zone_rctlval_limit)) != 3111 Z_OK)) 3112 break; 3113 if ((fetchprop(val, DTD_ATTR_ACTION, 3114 valptr->zone_rctlval_action, 3115 sizeof (valptr->zone_rctlval_action)) != 3116 Z_OK)) 3117 break; 3118 if (zonecfg_add_rctl_value(tabptr, valptr) != 3119 Z_OK) 3120 break; 3121 } 3122 return (Z_OK); 3123 } 3124 } 3125 return (Z_NO_RESOURCE_ID); 3126 } 3127 3128 static int 3129 zonecfg_add_rctl_core(zone_dochandle_t handle, struct zone_rctltab *tabptr) 3130 { 3131 xmlNodePtr newnode, cur = handle->zone_dh_cur, valnode; 3132 struct zone_rctlvaltab *valptr; 3133 int err; 3134 3135 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_RCTL, NULL); 3136 err = newprop(newnode, DTD_ATTR_NAME, tabptr->zone_rctl_name); 3137 if (err != Z_OK) 3138 return (err); 3139 for (valptr = tabptr->zone_rctl_valptr; valptr != NULL; 3140 valptr = valptr->zone_rctlval_next) { 3141 valnode = xmlNewTextChild(newnode, NULL, 3142 DTD_ELEM_RCTLVALUE, NULL); 3143 err = newprop(valnode, DTD_ATTR_PRIV, 3144 valptr->zone_rctlval_priv); 3145 if (err != Z_OK) 3146 return (err); 3147 err = newprop(valnode, DTD_ATTR_LIMIT, 3148 valptr->zone_rctlval_limit); 3149 if (err != Z_OK) 3150 return (err); 3151 err = newprop(valnode, DTD_ATTR_ACTION, 3152 valptr->zone_rctlval_action); 3153 if (err != Z_OK) 3154 return (err); 3155 } 3156 return (Z_OK); 3157 } 3158 3159 int 3160 zonecfg_add_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 3161 { 3162 int err; 3163 3164 if (tabptr == NULL) 3165 return (Z_INVAL); 3166 3167 if ((err = operation_prep(handle)) != Z_OK) 3168 return (err); 3169 3170 if ((err = zonecfg_add_rctl_core(handle, tabptr)) != Z_OK) 3171 return (err); 3172 3173 return (Z_OK); 3174 } 3175 3176 static int 3177 zonecfg_delete_rctl_core(zone_dochandle_t handle, struct zone_rctltab *tabptr) 3178 { 3179 xmlNodePtr cur = handle->zone_dh_cur; 3180 xmlChar *savedname; 3181 int name_result; 3182 3183 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 3184 if (xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 3185 continue; 3186 3187 savedname = xmlGetProp(cur, DTD_ATTR_NAME); 3188 if (savedname == NULL) /* shouldn't happen */ 3189 continue; 3190 name_result = xmlStrcmp(savedname, 3191 (const xmlChar *) tabptr->zone_rctl_name); 3192 xmlFree(savedname); 3193 3194 if (name_result == 0) { 3195 xmlUnlinkNode(cur); 3196 xmlFreeNode(cur); 3197 return (Z_OK); 3198 } 3199 } 3200 return (Z_NO_RESOURCE_ID); 3201 } 3202 3203 int 3204 zonecfg_delete_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 3205 { 3206 int err; 3207 3208 if (tabptr == NULL) 3209 return (Z_INVAL); 3210 3211 if ((err = operation_prep(handle)) != Z_OK) 3212 return (err); 3213 3214 if ((err = zonecfg_delete_rctl_core(handle, tabptr)) != Z_OK) 3215 return (err); 3216 3217 return (Z_OK); 3218 } 3219 3220 int 3221 zonecfg_modify_rctl( 3222 zone_dochandle_t handle, 3223 struct zone_rctltab *oldtabptr, 3224 struct zone_rctltab *newtabptr) 3225 { 3226 int err; 3227 3228 if (oldtabptr == NULL || newtabptr == NULL) 3229 return (Z_INVAL); 3230 3231 if ((err = operation_prep(handle)) != Z_OK) 3232 return (err); 3233 3234 if ((err = zonecfg_delete_rctl_core(handle, oldtabptr)) != Z_OK) 3235 return (err); 3236 3237 if ((err = zonecfg_add_rctl_core(handle, newtabptr)) != Z_OK) 3238 return (err); 3239 3240 return (Z_OK); 3241 } 3242 3243 int 3244 zonecfg_add_rctl_value( 3245 struct zone_rctltab *tabptr, 3246 struct zone_rctlvaltab *valtabptr) 3247 { 3248 struct zone_rctlvaltab *last, *old, *new; 3249 rctlblk_t *rctlblk = alloca(rctlblk_size()); 3250 3251 last = tabptr->zone_rctl_valptr; 3252 for (old = last; old != NULL; old = old->zone_rctlval_next) 3253 last = old; /* walk to the end of the list */ 3254 new = valtabptr; /* alloc'd by caller */ 3255 new->zone_rctlval_next = NULL; 3256 if (zonecfg_construct_rctlblk(valtabptr, rctlblk) != Z_OK) 3257 return (Z_INVAL); 3258 if (!zonecfg_valid_rctlblk(rctlblk)) 3259 return (Z_INVAL); 3260 if (last == NULL) 3261 tabptr->zone_rctl_valptr = new; 3262 else 3263 last->zone_rctlval_next = new; 3264 return (Z_OK); 3265 } 3266 3267 int 3268 zonecfg_remove_rctl_value( 3269 struct zone_rctltab *tabptr, 3270 struct zone_rctlvaltab *valtabptr) 3271 { 3272 struct zone_rctlvaltab *last, *this, *next; 3273 3274 last = tabptr->zone_rctl_valptr; 3275 for (this = last; this != NULL; this = this->zone_rctlval_next) { 3276 if (strcmp(this->zone_rctlval_priv, 3277 valtabptr->zone_rctlval_priv) == 0 && 3278 strcmp(this->zone_rctlval_limit, 3279 valtabptr->zone_rctlval_limit) == 0 && 3280 strcmp(this->zone_rctlval_action, 3281 valtabptr->zone_rctlval_action) == 0) { 3282 next = this->zone_rctlval_next; 3283 if (this == tabptr->zone_rctl_valptr) 3284 tabptr->zone_rctl_valptr = next; 3285 else 3286 last->zone_rctlval_next = next; 3287 free(this); 3288 return (Z_OK); 3289 } else 3290 last = this; 3291 } 3292 return (Z_NO_PROPERTY_ID); 3293 } 3294 3295 void 3296 zonecfg_set_swinv(zone_dochandle_t handle) 3297 { 3298 handle->zone_dh_sw_inv = B_TRUE; 3299 } 3300 3301 /* 3302 * Add the pkg to the sw inventory on the handle. 3303 */ 3304 int 3305 zonecfg_add_pkg(zone_dochandle_t handle, char *name, char *version) 3306 { 3307 xmlNodePtr newnode; 3308 xmlNodePtr cur; 3309 int err; 3310 3311 if ((err = operation_prep(handle)) != Z_OK) 3312 return (err); 3313 3314 cur = handle->zone_dh_cur; 3315 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_PACKAGE, NULL); 3316 if ((err = newprop(newnode, DTD_ATTR_NAME, name)) != Z_OK) 3317 return (err); 3318 if ((err = newprop(newnode, DTD_ATTR_VERSION, version)) != Z_OK) 3319 return (err); 3320 return (Z_OK); 3321 } 3322 3323 int 3324 zonecfg_add_patch(zone_dochandle_t handle, char *id, void **pnode) 3325 { 3326 xmlNodePtr node = (xmlNodePtr)*pnode; 3327 xmlNodePtr cur; 3328 int err; 3329 3330 if ((err = operation_prep(handle)) != Z_OK) 3331 return (err); 3332 3333 cur = handle->zone_dh_cur; 3334 node = xmlNewTextChild(cur, NULL, DTD_ELEM_PATCH, NULL); 3335 if ((err = newprop(node, DTD_ATTR_ID, id)) != Z_OK) 3336 return (err); 3337 *pnode = (void *)node; 3338 return (Z_OK); 3339 } 3340 3341 int 3342 zonecfg_add_patch_obs(char *id, void *cur) 3343 { 3344 xmlNodePtr node; 3345 int err; 3346 3347 node = xmlNewTextChild((xmlNodePtr)cur, NULL, DTD_ELEM_OBSOLETES, NULL); 3348 if ((err = newprop(node, DTD_ATTR_ID, id)) != Z_OK) 3349 return (err); 3350 return (Z_OK); 3351 } 3352 3353 char * 3354 zonecfg_strerror(int errnum) 3355 { 3356 switch (errnum) { 3357 case Z_OK: 3358 return (dgettext(TEXT_DOMAIN, "OK")); 3359 case Z_EMPTY_DOCUMENT: 3360 return (dgettext(TEXT_DOMAIN, "Empty document")); 3361 case Z_WRONG_DOC_TYPE: 3362 return (dgettext(TEXT_DOMAIN, "Wrong document type")); 3363 case Z_BAD_PROPERTY: 3364 return (dgettext(TEXT_DOMAIN, "Bad document property")); 3365 case Z_TEMP_FILE: 3366 return (dgettext(TEXT_DOMAIN, 3367 "Problem creating temporary file")); 3368 case Z_SAVING_FILE: 3369 return (dgettext(TEXT_DOMAIN, "Problem saving file")); 3370 case Z_NO_ENTRY: 3371 return (dgettext(TEXT_DOMAIN, "No such entry")); 3372 case Z_BOGUS_ZONE_NAME: 3373 return (dgettext(TEXT_DOMAIN, "Bogus zone name")); 3374 case Z_REQD_RESOURCE_MISSING: 3375 return (dgettext(TEXT_DOMAIN, "Required resource missing")); 3376 case Z_REQD_PROPERTY_MISSING: 3377 return (dgettext(TEXT_DOMAIN, "Required property missing")); 3378 case Z_BAD_HANDLE: 3379 return (dgettext(TEXT_DOMAIN, "Bad handle")); 3380 case Z_NOMEM: 3381 return (dgettext(TEXT_DOMAIN, "Out of memory")); 3382 case Z_INVAL: 3383 return (dgettext(TEXT_DOMAIN, "Invalid argument")); 3384 case Z_ACCES: 3385 return (dgettext(TEXT_DOMAIN, "Permission denied")); 3386 case Z_TOO_BIG: 3387 return (dgettext(TEXT_DOMAIN, "Argument list too long")); 3388 case Z_MISC_FS: 3389 return (dgettext(TEXT_DOMAIN, 3390 "Miscellaneous file system error")); 3391 case Z_NO_ZONE: 3392 return (dgettext(TEXT_DOMAIN, "No such zone configured")); 3393 case Z_NO_RESOURCE_TYPE: 3394 return (dgettext(TEXT_DOMAIN, "No such resource type")); 3395 case Z_NO_RESOURCE_ID: 3396 return (dgettext(TEXT_DOMAIN, "No such resource with that id")); 3397 case Z_NO_PROPERTY_TYPE: 3398 return (dgettext(TEXT_DOMAIN, "No such property type")); 3399 case Z_NO_PROPERTY_ID: 3400 return (dgettext(TEXT_DOMAIN, "No such property with that id")); 3401 case Z_BAD_ZONE_STATE: 3402 return (dgettext(TEXT_DOMAIN, 3403 "Zone state is invalid for the requested operation")); 3404 case Z_INVALID_DOCUMENT: 3405 return (dgettext(TEXT_DOMAIN, "Invalid document")); 3406 case Z_NAME_IN_USE: 3407 return (dgettext(TEXT_DOMAIN, "Zone name already in use")); 3408 case Z_NO_SUCH_ID: 3409 return (dgettext(TEXT_DOMAIN, "No such zone ID")); 3410 case Z_UPDATING_INDEX: 3411 return (dgettext(TEXT_DOMAIN, "Problem updating index file")); 3412 case Z_LOCKING_FILE: 3413 return (dgettext(TEXT_DOMAIN, "Locking index file")); 3414 case Z_UNLOCKING_FILE: 3415 return (dgettext(TEXT_DOMAIN, "Unlocking index file")); 3416 case Z_INSUFFICIENT_SPEC: 3417 return (dgettext(TEXT_DOMAIN, "Insufficient specification")); 3418 case Z_RESOLVED_PATH: 3419 return (dgettext(TEXT_DOMAIN, "Resolved path mismatch")); 3420 case Z_IPV6_ADDR_PREFIX_LEN: 3421 return (dgettext(TEXT_DOMAIN, 3422 "IPv6 address missing required prefix length")); 3423 case Z_BOGUS_ADDRESS: 3424 return (dgettext(TEXT_DOMAIN, 3425 "Neither an IPv4 nor an IPv6 address nor a host name")); 3426 case Z_PRIV_PROHIBITED: 3427 return (dgettext(TEXT_DOMAIN, 3428 "Specified privilege is prohibited")); 3429 case Z_PRIV_REQUIRED: 3430 return (dgettext(TEXT_DOMAIN, 3431 "Required privilege is missing")); 3432 case Z_PRIV_UNKNOWN: 3433 return (dgettext(TEXT_DOMAIN, 3434 "Specified privilege is unknown")); 3435 case Z_BRAND_ERROR: 3436 return (dgettext(TEXT_DOMAIN, 3437 "Brand-specific error")); 3438 case Z_INCOMPATIBLE: 3439 return (dgettext(TEXT_DOMAIN, "Incompatible settings")); 3440 case Z_ALIAS_DISALLOW: 3441 return (dgettext(TEXT_DOMAIN, 3442 "An incompatible rctl already exists for this property")); 3443 case Z_CLEAR_DISALLOW: 3444 return (dgettext(TEXT_DOMAIN, 3445 "Clearing this property is not allowed")); 3446 case Z_POOL: 3447 return (dgettext(TEXT_DOMAIN, "libpool(3LIB) error")); 3448 case Z_POOLS_NOT_ACTIVE: 3449 return (dgettext(TEXT_DOMAIN, "Pools facility not active; " 3450 "zone will not be bound to pool")); 3451 case Z_POOL_ENABLE: 3452 return (dgettext(TEXT_DOMAIN, 3453 "Could not enable pools facility")); 3454 case Z_NO_POOL: 3455 return (dgettext(TEXT_DOMAIN, 3456 "Pool not found; using default pool")); 3457 case Z_POOL_CREATE: 3458 return (dgettext(TEXT_DOMAIN, 3459 "Could not create a temporary pool")); 3460 case Z_POOL_BIND: 3461 return (dgettext(TEXT_DOMAIN, "Could not bind zone to pool")); 3462 case Z_HOSTID_FUBAR: 3463 return (dgettext(TEXT_DOMAIN, "Specified hostid is invalid")); 3464 case Z_SYSTEM: 3465 return (strerror(errno)); 3466 default: 3467 return (dgettext(TEXT_DOMAIN, "Unknown error")); 3468 } 3469 } 3470 3471 /* 3472 * Note that the zonecfg_setXent() and zonecfg_endXent() calls are all the 3473 * same, as they just turn around and call zonecfg_setent() / zonecfg_endent(). 3474 */ 3475 3476 static int 3477 zonecfg_setent(zone_dochandle_t handle) 3478 { 3479 xmlNodePtr cur; 3480 int err; 3481 3482 if (handle == NULL) 3483 return (Z_INVAL); 3484 3485 if ((err = operation_prep(handle)) != Z_OK) { 3486 handle->zone_dh_cur = NULL; 3487 return (err); 3488 } 3489 cur = handle->zone_dh_cur; 3490 cur = cur->xmlChildrenNode; 3491 handle->zone_dh_cur = cur; 3492 return (Z_OK); 3493 } 3494 3495 static int 3496 zonecfg_endent(zone_dochandle_t handle) 3497 { 3498 if (handle == NULL) 3499 return (Z_INVAL); 3500 3501 handle->zone_dh_cur = handle->zone_dh_top; 3502 return (Z_OK); 3503 } 3504 3505 /* 3506 * Do the work required to manipulate a process through libproc. 3507 * If grab_process() returns no errors (0), then release_process() 3508 * must eventually be called. 3509 * 3510 * Return values: 3511 * 0 Successful creation of agent thread 3512 * 1 Error grabbing 3513 * 2 Error creating agent 3514 */ 3515 static int 3516 grab_process(pr_info_handle_t *p) 3517 { 3518 int ret; 3519 3520 if ((p->pr = Pgrab(p->pid, 0, &ret)) != NULL) { 3521 3522 if (Psetflags(p->pr, PR_RLC) != 0) { 3523 Prelease(p->pr, 0); 3524 return (1); 3525 } 3526 if (Pcreate_agent(p->pr) == 0) { 3527 return (0); 3528 3529 } else { 3530 Prelease(p->pr, 0); 3531 return (2); 3532 } 3533 } else { 3534 return (1); 3535 } 3536 } 3537 3538 /* 3539 * Release the specified process. This destroys the agent 3540 * and releases the process. If the process is NULL, nothing 3541 * is done. This function should only be called if grab_process() 3542 * has previously been called and returned success. 3543 * 3544 * This function is Pgrab-safe. 3545 */ 3546 static void 3547 release_process(struct ps_prochandle *Pr) 3548 { 3549 if (Pr == NULL) 3550 return; 3551 3552 Pdestroy_agent(Pr); 3553 Prelease(Pr, 0); 3554 } 3555 3556 static boolean_t 3557 grab_zone_proc(char *zonename, pr_info_handle_t *p) 3558 { 3559 DIR *dirp; 3560 struct dirent *dentp; 3561 zoneid_t zoneid; 3562 int pid_self; 3563 psinfo_t psinfo; 3564 3565 if (zone_get_id(zonename, &zoneid) != 0) 3566 return (B_FALSE); 3567 3568 pid_self = getpid(); 3569 3570 if ((dirp = opendir("/proc")) == NULL) 3571 return (B_FALSE); 3572 3573 while (dentp = readdir(dirp)) { 3574 p->pid = atoi(dentp->d_name); 3575 3576 /* Skip self */ 3577 if (p->pid == pid_self) 3578 continue; 3579 3580 if (proc_get_psinfo(p->pid, &psinfo) != 0) 3581 continue; 3582 3583 if (psinfo.pr_zoneid != zoneid) 3584 continue; 3585 3586 /* attempt to grab process */ 3587 if (grab_process(p) != 0) 3588 continue; 3589 3590 if (pr_getzoneid(p->pr) != zoneid) { 3591 release_process(p->pr); 3592 continue; 3593 } 3594 3595 (void) closedir(dirp); 3596 return (B_TRUE); 3597 } 3598 3599 (void) closedir(dirp); 3600 return (B_FALSE); 3601 } 3602 3603 static boolean_t 3604 get_priv_rctl(struct ps_prochandle *pr, char *name, rctlblk_t *rblk) 3605 { 3606 if (pr_getrctl(pr, name, NULL, rblk, RCTL_FIRST)) 3607 return (B_FALSE); 3608 3609 if (rctlblk_get_privilege(rblk) == RCPRIV_PRIVILEGED) 3610 return (B_TRUE); 3611 3612 while (pr_getrctl(pr, name, rblk, rblk, RCTL_NEXT) == 0) { 3613 if (rctlblk_get_privilege(rblk) == RCPRIV_PRIVILEGED) 3614 return (B_TRUE); 3615 } 3616 3617 return (B_FALSE); 3618 } 3619 3620 /* 3621 * Apply the current rctl settings to the specified, running zone. 3622 */ 3623 int 3624 zonecfg_apply_rctls(char *zone_name, zone_dochandle_t handle) 3625 { 3626 int err; 3627 int res = Z_OK; 3628 rctlblk_t *rblk; 3629 pr_info_handle_t p; 3630 struct zone_rctltab rctl; 3631 3632 if ((err = zonecfg_setrctlent(handle)) != Z_OK) 3633 return (err); 3634 3635 if ((rblk = (rctlblk_t *)malloc(rctlblk_size())) == NULL) { 3636 (void) zonecfg_endrctlent(handle); 3637 return (Z_NOMEM); 3638 } 3639 3640 if (!grab_zone_proc(zone_name, &p)) { 3641 (void) zonecfg_endrctlent(handle); 3642 free(rblk); 3643 return (Z_SYSTEM); 3644 } 3645 3646 while (zonecfg_getrctlent(handle, &rctl) == Z_OK) { 3647 char *rname; 3648 struct zone_rctlvaltab *valptr; 3649 3650 rname = rctl.zone_rctl_name; 3651 3652 /* first delete all current privileged settings for this rctl */ 3653 while (get_priv_rctl(p.pr, rname, rblk)) { 3654 if (pr_setrctl(p.pr, rname, NULL, rblk, RCTL_DELETE) != 3655 0) { 3656 res = Z_SYSTEM; 3657 goto done; 3658 } 3659 } 3660 3661 /* now set each new value for the rctl */ 3662 for (valptr = rctl.zone_rctl_valptr; valptr != NULL; 3663 valptr = valptr->zone_rctlval_next) { 3664 if ((err = zonecfg_construct_rctlblk(valptr, rblk)) 3665 != Z_OK) { 3666 res = errno = err; 3667 goto done; 3668 } 3669 3670 if (pr_setrctl(p.pr, rname, NULL, rblk, RCTL_INSERT)) { 3671 res = Z_SYSTEM; 3672 goto done; 3673 } 3674 } 3675 } 3676 3677 done: 3678 release_process(p.pr); 3679 free(rblk); 3680 (void) zonecfg_endrctlent(handle); 3681 3682 return (res); 3683 } 3684 3685 static const xmlChar * 3686 nm_to_dtd(char *nm) 3687 { 3688 if (strcmp(nm, "device") == 0) 3689 return (DTD_ELEM_DEVICE); 3690 if (strcmp(nm, "fs") == 0) 3691 return (DTD_ELEM_FS); 3692 if (strcmp(nm, "inherit-pkg-dir") == 0) 3693 return (DTD_ELEM_IPD); 3694 if (strcmp(nm, "net") == 0) 3695 return (DTD_ELEM_NET); 3696 if (strcmp(nm, "attr") == 0) 3697 return (DTD_ELEM_ATTR); 3698 if (strcmp(nm, "rctl") == 0) 3699 return (DTD_ELEM_RCTL); 3700 if (strcmp(nm, "dataset") == 0) 3701 return (DTD_ELEM_DATASET); 3702 3703 return (NULL); 3704 } 3705 3706 int 3707 zonecfg_num_resources(zone_dochandle_t handle, char *rsrc) 3708 { 3709 int num = 0; 3710 const xmlChar *dtd; 3711 xmlNodePtr cur; 3712 3713 if ((dtd = nm_to_dtd(rsrc)) == NULL) 3714 return (num); 3715 3716 if (zonecfg_setent(handle) != Z_OK) 3717 return (num); 3718 3719 for (cur = handle->zone_dh_cur; cur != NULL; cur = cur->next) 3720 if (xmlStrcmp(cur->name, dtd) == 0) 3721 num++; 3722 3723 (void) zonecfg_endent(handle); 3724 3725 return (num); 3726 } 3727 3728 int 3729 zonecfg_del_all_resources(zone_dochandle_t handle, char *rsrc) 3730 { 3731 int err; 3732 const xmlChar *dtd; 3733 xmlNodePtr cur; 3734 3735 if ((dtd = nm_to_dtd(rsrc)) == NULL) 3736 return (Z_NO_RESOURCE_TYPE); 3737 3738 if ((err = zonecfg_setent(handle)) != Z_OK) 3739 return (err); 3740 3741 cur = handle->zone_dh_cur; 3742 while (cur != NULL) { 3743 xmlNodePtr tmp; 3744 3745 if (xmlStrcmp(cur->name, dtd)) { 3746 cur = cur->next; 3747 continue; 3748 } 3749 3750 tmp = cur->next; 3751 xmlUnlinkNode(cur); 3752 xmlFreeNode(cur); 3753 cur = tmp; 3754 } 3755 3756 (void) zonecfg_endent(handle); 3757 return (Z_OK); 3758 } 3759 3760 static boolean_t 3761 valid_uint(char *s, uint64_t *n) 3762 { 3763 char *endp; 3764 3765 /* strtoull accepts '-'?! so we want to flag that as an error */ 3766 if (strchr(s, '-') != NULL) 3767 return (B_FALSE); 3768 3769 errno = 0; 3770 *n = strtoull(s, &endp, 10); 3771 3772 if (errno != 0 || *endp != '\0') 3773 return (B_FALSE); 3774 return (B_TRUE); 3775 } 3776 3777 /* 3778 * Convert a string representing a number (possibly a fraction) into an integer. 3779 * The string can have a modifier (K, M, G or T). The modifiers are treated 3780 * as powers of two (not 10). 3781 */ 3782 int 3783 zonecfg_str_to_bytes(char *str, uint64_t *bytes) 3784 { 3785 long double val; 3786 char *unitp; 3787 uint64_t scale; 3788 3789 if ((val = strtold(str, &unitp)) < 0) 3790 return (-1); 3791 3792 /* remove any leading white space from units string */ 3793 while (isspace(*unitp) != 0) 3794 ++unitp; 3795 3796 /* if no units explicitly set, error */ 3797 if (unitp == NULL || *unitp == '\0') { 3798 scale = 1; 3799 } else { 3800 int i; 3801 char *units[] = {"K", "M", "G", "T", NULL}; 3802 3803 scale = 1024; 3804 3805 /* update scale based on units */ 3806 for (i = 0; units[i] != NULL; i++) { 3807 if (strcasecmp(unitp, units[i]) == 0) 3808 break; 3809 scale <<= 10; 3810 } 3811 3812 if (units[i] == NULL) 3813 return (-1); 3814 } 3815 3816 *bytes = (uint64_t)(val * scale); 3817 return (0); 3818 } 3819 3820 boolean_t 3821 zonecfg_valid_ncpus(char *lowstr, char *highstr) 3822 { 3823 uint64_t low, high; 3824 3825 if (!valid_uint(lowstr, &low) || !valid_uint(highstr, &high) || 3826 low < 1 || low > high) 3827 return (B_FALSE); 3828 3829 return (B_TRUE); 3830 } 3831 3832 boolean_t 3833 zonecfg_valid_importance(char *impstr) 3834 { 3835 uint64_t num; 3836 3837 if (!valid_uint(impstr, &num)) 3838 return (B_FALSE); 3839 3840 return (B_TRUE); 3841 } 3842 3843 boolean_t 3844 zonecfg_valid_alias_limit(char *name, char *limitstr, uint64_t *limit) 3845 { 3846 int i; 3847 3848 for (i = 0; aliases[i].shortname != NULL; i++) 3849 if (strcmp(name, aliases[i].shortname) == 0) 3850 break; 3851 3852 if (aliases[i].shortname == NULL) 3853 return (B_FALSE); 3854 3855 if (!valid_uint(limitstr, limit) || *limit < aliases[i].low_limit) 3856 return (B_FALSE); 3857 3858 return (B_TRUE); 3859 } 3860 3861 boolean_t 3862 zonecfg_valid_memlimit(char *memstr, uint64_t *mem_val) 3863 { 3864 if (zonecfg_str_to_bytes(memstr, mem_val) != 0) 3865 return (B_FALSE); 3866 3867 return (B_TRUE); 3868 } 3869 3870 static int 3871 zerr_pool(char *pool_err, int err_size, int res) 3872 { 3873 (void) strlcpy(pool_err, pool_strerror(pool_error()), err_size); 3874 return (res); 3875 } 3876 3877 static int 3878 create_tmp_pset(char *pool_err, int err_size, pool_conf_t *pconf, pool_t *pool, 3879 char *name, int min, int max) 3880 { 3881 pool_resource_t *res; 3882 pool_elem_t *elem; 3883 pool_value_t *val; 3884 3885 if ((res = pool_resource_create(pconf, "pset", name)) == NULL) 3886 return (zerr_pool(pool_err, err_size, Z_POOL)); 3887 3888 if (pool_associate(pconf, pool, res) != PO_SUCCESS) 3889 return (zerr_pool(pool_err, err_size, Z_POOL)); 3890 3891 if ((elem = pool_resource_to_elem(pconf, res)) == NULL) 3892 return (zerr_pool(pool_err, err_size, Z_POOL)); 3893 3894 if ((val = pool_value_alloc()) == NULL) 3895 return (zerr_pool(pool_err, err_size, Z_POOL)); 3896 3897 /* set the maximum number of cpus for the pset */ 3898 pool_value_set_uint64(val, (uint64_t)max); 3899 3900 if (pool_put_property(pconf, elem, "pset.max", val) != PO_SUCCESS) { 3901 pool_value_free(val); 3902 return (zerr_pool(pool_err, err_size, Z_POOL)); 3903 } 3904 3905 /* set the minimum number of cpus for the pset */ 3906 pool_value_set_uint64(val, (uint64_t)min); 3907 3908 if (pool_put_property(pconf, elem, "pset.min", val) != PO_SUCCESS) { 3909 pool_value_free(val); 3910 return (zerr_pool(pool_err, err_size, Z_POOL)); 3911 } 3912 3913 pool_value_free(val); 3914 3915 return (Z_OK); 3916 } 3917 3918 static int 3919 create_tmp_pool(char *pool_err, int err_size, pool_conf_t *pconf, char *name, 3920 struct zone_psettab *pset_tab) 3921 { 3922 pool_t *pool; 3923 int res = Z_OK; 3924 3925 /* create a temporary pool configuration */ 3926 if (pool_conf_open(pconf, NULL, PO_TEMP) != PO_SUCCESS) { 3927 res = zerr_pool(pool_err, err_size, Z_POOL); 3928 return (res); 3929 } 3930 3931 if ((pool = pool_create(pconf, name)) == NULL) { 3932 res = zerr_pool(pool_err, err_size, Z_POOL_CREATE); 3933 goto done; 3934 } 3935 3936 /* set pool importance */ 3937 if (pset_tab->zone_importance[0] != '\0') { 3938 pool_elem_t *elem; 3939 pool_value_t *val; 3940 3941 if ((elem = pool_to_elem(pconf, pool)) == NULL) { 3942 res = zerr_pool(pool_err, err_size, Z_POOL); 3943 goto done; 3944 } 3945 3946 if ((val = pool_value_alloc()) == NULL) { 3947 res = zerr_pool(pool_err, err_size, Z_POOL); 3948 goto done; 3949 } 3950 3951 pool_value_set_int64(val, 3952 (int64_t)atoi(pset_tab->zone_importance)); 3953 3954 if (pool_put_property(pconf, elem, "pool.importance", val) 3955 != PO_SUCCESS) { 3956 res = zerr_pool(pool_err, err_size, Z_POOL); 3957 pool_value_free(val); 3958 goto done; 3959 } 3960 3961 pool_value_free(val); 3962 } 3963 3964 if ((res = create_tmp_pset(pool_err, err_size, pconf, pool, name, 3965 atoi(pset_tab->zone_ncpu_min), 3966 atoi(pset_tab->zone_ncpu_max))) != Z_OK) 3967 goto done; 3968 3969 /* validation */ 3970 if (pool_conf_status(pconf) == POF_INVALID) { 3971 res = zerr_pool(pool_err, err_size, Z_POOL); 3972 goto done; 3973 } 3974 3975 /* 3976 * This validation is the one we expect to fail if the user specified 3977 * an invalid configuration (too many cpus) for this system. 3978 */ 3979 if (pool_conf_validate(pconf, POV_RUNTIME) != PO_SUCCESS) { 3980 res = zerr_pool(pool_err, err_size, Z_POOL_CREATE); 3981 goto done; 3982 } 3983 3984 /* 3985 * Commit the dynamic configuration but not the pool configuration 3986 * file. 3987 */ 3988 if (pool_conf_commit(pconf, 1) != PO_SUCCESS) 3989 res = zerr_pool(pool_err, err_size, Z_POOL); 3990 3991 done: 3992 (void) pool_conf_close(pconf); 3993 return (res); 3994 } 3995 3996 static int 3997 get_running_tmp_pset(pool_conf_t *pconf, pool_t *pool, pool_resource_t *pset, 3998 struct zone_psettab *pset_tab) 3999 { 4000 int nfound = 0; 4001 pool_elem_t *pe; 4002 pool_value_t *pv = pool_value_alloc(); 4003 uint64_t val_uint; 4004 4005 if (pool != NULL) { 4006 pe = pool_to_elem(pconf, pool); 4007 if (pool_get_property(pconf, pe, "pool.importance", pv) 4008 != POC_INVAL) { 4009 int64_t val_int; 4010 4011 (void) pool_value_get_int64(pv, &val_int); 4012 (void) snprintf(pset_tab->zone_importance, 4013 sizeof (pset_tab->zone_importance), "%d", val_int); 4014 nfound++; 4015 } 4016 } 4017 4018 if (pset != NULL) { 4019 pe = pool_resource_to_elem(pconf, pset); 4020 if (pool_get_property(pconf, pe, "pset.min", pv) != POC_INVAL) { 4021 (void) pool_value_get_uint64(pv, &val_uint); 4022 (void) snprintf(pset_tab->zone_ncpu_min, 4023 sizeof (pset_tab->zone_ncpu_min), "%u", val_uint); 4024 nfound++; 4025 } 4026 4027 if (pool_get_property(pconf, pe, "pset.max", pv) != POC_INVAL) { 4028 (void) pool_value_get_uint64(pv, &val_uint); 4029 (void) snprintf(pset_tab->zone_ncpu_max, 4030 sizeof (pset_tab->zone_ncpu_max), "%u", val_uint); 4031 nfound++; 4032 } 4033 } 4034 4035 pool_value_free(pv); 4036 4037 if (nfound == 3) 4038 return (PO_SUCCESS); 4039 4040 return (PO_FAIL); 4041 } 4042 4043 /* 4044 * Determine if a tmp pool is configured and if so, if the configuration is 4045 * still valid or if it has been changed since the tmp pool was created. 4046 * If the tmp pool configuration is no longer valid, delete the tmp pool. 4047 * 4048 * Set *valid=B_TRUE if there is an existing, valid tmp pool configuration. 4049 */ 4050 static int 4051 verify_del_tmp_pool(pool_conf_t *pconf, char *tmp_name, char *pool_err, 4052 int err_size, struct zone_psettab *pset_tab, boolean_t *exists) 4053 { 4054 int res = Z_OK; 4055 pool_t *pool; 4056 pool_resource_t *pset; 4057 struct zone_psettab pset_current; 4058 4059 *exists = B_FALSE; 4060 4061 if (pool_conf_open(pconf, pool_dynamic_location(), PO_RDWR) 4062 != PO_SUCCESS) { 4063 res = zerr_pool(pool_err, err_size, Z_POOL); 4064 return (res); 4065 } 4066 4067 pool = pool_get_pool(pconf, tmp_name); 4068 pset = pool_get_resource(pconf, "pset", tmp_name); 4069 4070 if (pool == NULL && pset == NULL) { 4071 /* no tmp pool configured */ 4072 goto done; 4073 } 4074 4075 /* 4076 * If an existing tmp pool for this zone is configured with the proper 4077 * settings, then the tmp pool is valid. 4078 */ 4079 if (get_running_tmp_pset(pconf, pool, pset, &pset_current) 4080 == PO_SUCCESS && 4081 strcmp(pset_tab->zone_ncpu_min, 4082 pset_current.zone_ncpu_min) == 0 && 4083 strcmp(pset_tab->zone_ncpu_max, 4084 pset_current.zone_ncpu_max) == 0 && 4085 strcmp(pset_tab->zone_importance, 4086 pset_current.zone_importance) == 0) { 4087 *exists = B_TRUE; 4088 4089 } else { 4090 /* 4091 * An out-of-date tmp pool configuration exists. Delete it 4092 * so that we can create the correct tmp pool config. 4093 */ 4094 if (pset != NULL && 4095 pool_resource_destroy(pconf, pset) != PO_SUCCESS) { 4096 res = zerr_pool(pool_err, err_size, Z_POOL); 4097 goto done; 4098 } 4099 4100 if (pool != NULL && 4101 pool_destroy(pconf, pool) != PO_SUCCESS) { 4102 res = zerr_pool(pool_err, err_size, Z_POOL); 4103 goto done; 4104 } 4105 4106 /* commit dynamic config */ 4107 if (pool_conf_commit(pconf, 0) != PO_SUCCESS) 4108 res = zerr_pool(pool_err, err_size, Z_POOL); 4109 } 4110 4111 done: 4112 (void) pool_conf_close(pconf); 4113 4114 return (res); 4115 } 4116 4117 /* 4118 * Destroy any existing tmp pool. 4119 */ 4120 int 4121 zonecfg_destroy_tmp_pool(char *zone_name, char *pool_err, int err_size) 4122 { 4123 int status; 4124 int res = Z_OK; 4125 pool_conf_t *pconf; 4126 pool_t *pool; 4127 pool_resource_t *pset; 4128 char tmp_name[MAX_TMP_POOL_NAME]; 4129 4130 /* if pools not enabled then nothing to do */ 4131 if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 4132 return (Z_OK); 4133 4134 if ((pconf = pool_conf_alloc()) == NULL) 4135 return (zerr_pool(pool_err, err_size, Z_POOL)); 4136 4137 (void) snprintf(tmp_name, sizeof (tmp_name), TMP_POOL_NAME, zone_name); 4138 4139 if (pool_conf_open(pconf, pool_dynamic_location(), PO_RDWR) 4140 != PO_SUCCESS) { 4141 res = zerr_pool(pool_err, err_size, Z_POOL); 4142 pool_conf_free(pconf); 4143 return (res); 4144 } 4145 4146 pool = pool_get_pool(pconf, tmp_name); 4147 pset = pool_get_resource(pconf, "pset", tmp_name); 4148 4149 if (pool == NULL && pset == NULL) { 4150 /* nothing to destroy, we're done */ 4151 goto done; 4152 } 4153 4154 if (pset != NULL && pool_resource_destroy(pconf, pset) != PO_SUCCESS) { 4155 res = zerr_pool(pool_err, err_size, Z_POOL); 4156 goto done; 4157 } 4158 4159 if (pool != NULL && pool_destroy(pconf, pool) != PO_SUCCESS) { 4160 res = zerr_pool(pool_err, err_size, Z_POOL); 4161 goto done; 4162 } 4163 4164 /* commit dynamic config */ 4165 if (pool_conf_commit(pconf, 0) != PO_SUCCESS) 4166 res = zerr_pool(pool_err, err_size, Z_POOL); 4167 4168 done: 4169 (void) pool_conf_close(pconf); 4170 pool_conf_free(pconf); 4171 4172 return (res); 4173 } 4174 4175 /* 4176 * Attempt to bind to a tmp pool for this zone. If there is no tmp pool 4177 * configured, we just return Z_OK. 4178 * 4179 * We either attempt to create the tmp pool for this zone or rebind to an 4180 * existing tmp pool for this zone. 4181 * 4182 * Rebinding is used when a zone with a tmp pool reboots so that we don't have 4183 * to recreate the tmp pool. To do this we need to be sure we work correctly 4184 * for the following cases: 4185 * 4186 * - there is an existing, properly configured tmp pool. 4187 * - zonecfg added tmp pool after zone was booted, must now create. 4188 * - zonecfg updated tmp pool config after zone was booted, in this case 4189 * we destroy the old tmp pool and create a new one. 4190 */ 4191 int 4192 zonecfg_bind_tmp_pool(zone_dochandle_t handle, zoneid_t zoneid, char *pool_err, 4193 int err_size) 4194 { 4195 struct zone_psettab pset_tab; 4196 int err; 4197 int status; 4198 pool_conf_t *pconf; 4199 boolean_t exists; 4200 char zone_name[ZONENAME_MAX]; 4201 char tmp_name[MAX_TMP_POOL_NAME]; 4202 4203 (void) getzonenamebyid(zoneid, zone_name, sizeof (zone_name)); 4204 4205 err = zonecfg_lookup_pset(handle, &pset_tab); 4206 4207 /* if no temporary pool configured, we're done */ 4208 if (err == Z_NO_ENTRY) 4209 return (Z_OK); 4210 4211 /* 4212 * importance might not have a value but we need to validate it here, 4213 * so set the default. 4214 */ 4215 if (pset_tab.zone_importance[0] == '\0') 4216 (void) strlcpy(pset_tab.zone_importance, "1", 4217 sizeof (pset_tab.zone_importance)); 4218 4219 /* if pools not enabled, enable them now */ 4220 if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) { 4221 if (pool_set_status(POOL_ENABLED) != PO_SUCCESS) 4222 return (Z_POOL_ENABLE); 4223 } 4224 4225 if ((pconf = pool_conf_alloc()) == NULL) 4226 return (zerr_pool(pool_err, err_size, Z_POOL)); 4227 4228 (void) snprintf(tmp_name, sizeof (tmp_name), TMP_POOL_NAME, zone_name); 4229 4230 /* 4231 * Check if a valid tmp pool/pset already exists. If so, we just 4232 * reuse it. 4233 */ 4234 if ((err = verify_del_tmp_pool(pconf, tmp_name, pool_err, err_size, 4235 &pset_tab, &exists)) != Z_OK) { 4236 pool_conf_free(pconf); 4237 return (err); 4238 } 4239 4240 if (!exists) 4241 err = create_tmp_pool(pool_err, err_size, pconf, tmp_name, 4242 &pset_tab); 4243 4244 pool_conf_free(pconf); 4245 4246 if (err != Z_OK) 4247 return (err); 4248 4249 /* Bind the zone to the pool. */ 4250 if (pool_set_binding(tmp_name, P_ZONEID, zoneid) != PO_SUCCESS) 4251 return (zerr_pool(pool_err, err_size, Z_POOL_BIND)); 4252 4253 return (Z_OK); 4254 } 4255 4256 /* 4257 * Attempt to bind to a permanent pool for this zone. If there is no 4258 * permanent pool configured, we just return Z_OK. 4259 */ 4260 int 4261 zonecfg_bind_pool(zone_dochandle_t handle, zoneid_t zoneid, char *pool_err, 4262 int err_size) 4263 { 4264 pool_conf_t *poolconf; 4265 pool_t *pool; 4266 char poolname[MAXPATHLEN]; 4267 int status; 4268 int error; 4269 4270 /* 4271 * Find the pool mentioned in the zone configuration, and bind to it. 4272 */ 4273 error = zonecfg_get_pool(handle, poolname, sizeof (poolname)); 4274 if (error == Z_NO_ENTRY || (error == Z_OK && strlen(poolname) == 0)) { 4275 /* 4276 * The property is not set on the zone, so the pool 4277 * should be bound to the default pool. But that's 4278 * already done by the kernel, so we can just return. 4279 */ 4280 return (Z_OK); 4281 } 4282 if (error != Z_OK) { 4283 /* 4284 * Not an error, even though it shouldn't be happening. 4285 */ 4286 return (Z_OK); 4287 } 4288 /* 4289 * Don't do anything if pools aren't enabled. 4290 */ 4291 if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 4292 return (Z_POOLS_NOT_ACTIVE); 4293 4294 /* 4295 * Try to provide a sane error message if the requested pool doesn't 4296 * exist. 4297 */ 4298 if ((poolconf = pool_conf_alloc()) == NULL) 4299 return (zerr_pool(pool_err, err_size, Z_POOL)); 4300 4301 if (pool_conf_open(poolconf, pool_dynamic_location(), PO_RDONLY) != 4302 PO_SUCCESS) { 4303 pool_conf_free(poolconf); 4304 return (zerr_pool(pool_err, err_size, Z_POOL)); 4305 } 4306 pool = pool_get_pool(poolconf, poolname); 4307 (void) pool_conf_close(poolconf); 4308 pool_conf_free(poolconf); 4309 if (pool == NULL) 4310 return (Z_NO_POOL); 4311 4312 /* 4313 * Bind the zone to the pool. 4314 */ 4315 if (pool_set_binding(poolname, P_ZONEID, zoneid) != PO_SUCCESS) { 4316 /* if bind fails, return poolname for the error msg */ 4317 (void) strlcpy(pool_err, poolname, err_size); 4318 return (Z_POOL_BIND); 4319 } 4320 4321 return (Z_OK); 4322 } 4323 4324 int 4325 zonecfg_get_poolname(zone_dochandle_t handle, char *zone, char *pool, 4326 size_t poolsize) 4327 { 4328 int err; 4329 struct zone_psettab pset_tab; 4330 4331 err = zonecfg_lookup_pset(handle, &pset_tab); 4332 if ((err != Z_NO_ENTRY) && (err != Z_OK)) 4333 return (err); 4334 4335 /* pset was found so a temporary pool was created */ 4336 if (err == Z_OK) { 4337 (void) snprintf(pool, poolsize, TMP_POOL_NAME, zone); 4338 return (Z_OK); 4339 } 4340 4341 /* lookup the poolname in zonecfg */ 4342 return (zonecfg_get_pool(handle, pool, poolsize)); 4343 } 4344 4345 static boolean_t 4346 svc_enabled(char *svc_name) 4347 { 4348 scf_simple_prop_t *prop; 4349 boolean_t found = B_FALSE; 4350 4351 prop = scf_simple_prop_get(NULL, svc_name, SCF_PG_GENERAL, 4352 SCF_PROPERTY_ENABLED); 4353 4354 if (scf_simple_prop_numvalues(prop) == 1 && 4355 *scf_simple_prop_next_boolean(prop) != 0) 4356 found = B_TRUE; 4357 4358 scf_simple_prop_free(prop); 4359 4360 return (found); 4361 } 4362 4363 /* 4364 * If the zone has capped-memory, make sure the rcap service is enabled. 4365 */ 4366 int 4367 zonecfg_enable_rcapd(char *err, int size) 4368 { 4369 if (!svc_enabled(RCAP_SERVICE) && 4370 smf_enable_instance(RCAP_SERVICE, 0) == -1) { 4371 (void) strlcpy(err, scf_strerror(scf_error()), size); 4372 return (Z_SYSTEM); 4373 } 4374 4375 return (Z_OK); 4376 } 4377 4378 /* 4379 * Return true if pset has cpu range specified and poold is not enabled. 4380 */ 4381 boolean_t 4382 zonecfg_warn_poold(zone_dochandle_t handle) 4383 { 4384 struct zone_psettab pset_tab; 4385 int min, max; 4386 int err; 4387 4388 err = zonecfg_lookup_pset(handle, &pset_tab); 4389 4390 /* if no temporary pool configured, we're done */ 4391 if (err == Z_NO_ENTRY) 4392 return (B_FALSE); 4393 4394 min = atoi(pset_tab.zone_ncpu_min); 4395 max = atoi(pset_tab.zone_ncpu_max); 4396 4397 /* range not specified, no need for poold */ 4398 if (min == max) 4399 return (B_FALSE); 4400 4401 /* we have a range, check if poold service is enabled */ 4402 if (svc_enabled(POOLD_SERVICE)) 4403 return (B_FALSE); 4404 4405 return (B_TRUE); 4406 } 4407 4408 /* 4409 * Retrieve the specified pool's thread scheduling class. 'poolname' must 4410 * refer to the name of a configured resource pool. The thread scheduling 4411 * class specified by the pool will be stored in the buffer to which 'class' 4412 * points. 'clsize' is the byte size of the buffer to which 'class' points. 4413 * 4414 * This function returns Z_OK if it successfully stored the specified pool's 4415 * thread scheduling class into the buffer to which 'class' points. It returns 4416 * Z_NO_POOL if resource pools are not enabled, the function is unable to 4417 * access the system's resource pools configuration, or the specified pool 4418 * does not exist. The function returns Z_TOO_BIG if the buffer to which 4419 * 'class' points is not large enough to contain the thread scheduling class' 4420 * name. The function returns Z_NO_ENTRY if the pool does not specify a thread 4421 * scheduling class. 4422 */ 4423 static int 4424 get_pool_sched_class(char *poolname, char *class, int clsize) 4425 { 4426 int status; 4427 pool_conf_t *poolconf; 4428 pool_t *pool; 4429 pool_elem_t *pe; 4430 pool_value_t *pv = pool_value_alloc(); 4431 const char *sched_str; 4432 4433 if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 4434 return (Z_NO_POOL); 4435 4436 if ((poolconf = pool_conf_alloc()) == NULL) 4437 return (Z_NO_POOL); 4438 4439 if (pool_conf_open(poolconf, pool_dynamic_location(), PO_RDONLY) != 4440 PO_SUCCESS) { 4441 pool_conf_free(poolconf); 4442 return (Z_NO_POOL); 4443 } 4444 4445 if ((pool = pool_get_pool(poolconf, poolname)) == NULL) { 4446 (void) pool_conf_close(poolconf); 4447 pool_conf_free(poolconf); 4448 return (Z_NO_POOL); 4449 } 4450 4451 pe = pool_to_elem(poolconf, pool); 4452 if (pool_get_property(poolconf, pe, "pool.scheduler", pv) != 4453 POC_STRING) { 4454 (void) pool_conf_close(poolconf); 4455 pool_conf_free(poolconf); 4456 return (Z_NO_ENTRY); 4457 } 4458 (void) pool_value_get_string(pv, &sched_str); 4459 (void) pool_conf_close(poolconf); 4460 pool_conf_free(poolconf); 4461 if (strlcpy(class, sched_str, clsize) >= clsize) 4462 return (Z_TOO_BIG); 4463 return (Z_OK); 4464 } 4465 4466 /* 4467 * Get the default scheduling class for the zone. This will either be the 4468 * class set on the zone's pool or the system default scheduling class. 4469 */ 4470 int 4471 zonecfg_get_dflt_sched_class(zone_dochandle_t handle, char *class, int clsize) 4472 { 4473 char poolname[MAXPATHLEN]; 4474 4475 if (zonecfg_get_pool(handle, poolname, sizeof (poolname)) == Z_OK) { 4476 /* check if the zone's pool specified a sched class */ 4477 if (get_pool_sched_class(poolname, class, clsize) == Z_OK) 4478 return (Z_OK); 4479 } 4480 4481 if (priocntl(0, 0, PC_GETDFLCL, class, (uint64_t)clsize) == -1) 4482 return (Z_TOO_BIG); 4483 4484 return (Z_OK); 4485 } 4486 4487 int 4488 zonecfg_setfsent(zone_dochandle_t handle) 4489 { 4490 return (zonecfg_setent(handle)); 4491 } 4492 4493 int 4494 zonecfg_getfsent(zone_dochandle_t handle, struct zone_fstab *tabptr) 4495 { 4496 xmlNodePtr cur, options; 4497 char options_str[MAX_MNTOPT_STR]; 4498 int err; 4499 4500 if (handle == NULL) 4501 return (Z_INVAL); 4502 4503 if ((cur = handle->zone_dh_cur) == NULL) 4504 return (Z_NO_ENTRY); 4505 4506 for (; cur != NULL; cur = cur->next) 4507 if (!xmlStrcmp(cur->name, DTD_ELEM_FS)) 4508 break; 4509 if (cur == NULL) { 4510 handle->zone_dh_cur = handle->zone_dh_top; 4511 return (Z_NO_ENTRY); 4512 } 4513 4514 if ((err = fetchprop(cur, DTD_ATTR_SPECIAL, tabptr->zone_fs_special, 4515 sizeof (tabptr->zone_fs_special))) != Z_OK) { 4516 handle->zone_dh_cur = handle->zone_dh_top; 4517 return (err); 4518 } 4519 4520 if ((err = fetchprop(cur, DTD_ATTR_RAW, tabptr->zone_fs_raw, 4521 sizeof (tabptr->zone_fs_raw))) != Z_OK) { 4522 handle->zone_dh_cur = handle->zone_dh_top; 4523 return (err); 4524 } 4525 4526 if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 4527 sizeof (tabptr->zone_fs_dir))) != Z_OK) { 4528 handle->zone_dh_cur = handle->zone_dh_top; 4529 return (err); 4530 } 4531 4532 if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_fs_type, 4533 sizeof (tabptr->zone_fs_type))) != Z_OK) { 4534 handle->zone_dh_cur = handle->zone_dh_top; 4535 return (err); 4536 } 4537 4538 /* OK for options to be NULL */ 4539 tabptr->zone_fs_options = NULL; 4540 for (options = cur->xmlChildrenNode; options != NULL; 4541 options = options->next) { 4542 if (fetchprop(options, DTD_ATTR_NAME, options_str, 4543 sizeof (options_str)) != Z_OK) 4544 break; 4545 if (zonecfg_add_fs_option(tabptr, options_str) != Z_OK) 4546 break; 4547 } 4548 4549 handle->zone_dh_cur = cur->next; 4550 return (Z_OK); 4551 } 4552 4553 int 4554 zonecfg_endfsent(zone_dochandle_t handle) 4555 { 4556 return (zonecfg_endent(handle)); 4557 } 4558 4559 int 4560 zonecfg_setipdent(zone_dochandle_t handle) 4561 { 4562 return (zonecfg_setent(handle)); 4563 } 4564 4565 int 4566 zonecfg_getipdent(zone_dochandle_t handle, struct zone_fstab *tabptr) 4567 { 4568 xmlNodePtr cur; 4569 int err; 4570 4571 if (handle == NULL) 4572 return (Z_INVAL); 4573 4574 if ((cur = handle->zone_dh_cur) == NULL) 4575 return (Z_NO_ENTRY); 4576 4577 for (; cur != NULL; cur = cur->next) 4578 if (!xmlStrcmp(cur->name, DTD_ELEM_IPD)) 4579 break; 4580 if (cur == NULL) { 4581 handle->zone_dh_cur = handle->zone_dh_top; 4582 return (Z_NO_ENTRY); 4583 } 4584 4585 if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 4586 sizeof (tabptr->zone_fs_dir))) != Z_OK) { 4587 handle->zone_dh_cur = handle->zone_dh_top; 4588 return (err); 4589 } 4590 4591 handle->zone_dh_cur = cur->next; 4592 return (Z_OK); 4593 } 4594 4595 int 4596 zonecfg_endipdent(zone_dochandle_t handle) 4597 { 4598 return (zonecfg_endent(handle)); 4599 } 4600 4601 int 4602 zonecfg_setnwifent(zone_dochandle_t handle) 4603 { 4604 return (zonecfg_setent(handle)); 4605 } 4606 4607 int 4608 zonecfg_getnwifent(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 4609 { 4610 xmlNodePtr cur; 4611 int err; 4612 4613 if (handle == NULL) 4614 return (Z_INVAL); 4615 4616 if ((cur = handle->zone_dh_cur) == NULL) 4617 return (Z_NO_ENTRY); 4618 4619 for (; cur != NULL; cur = cur->next) 4620 if (!xmlStrcmp(cur->name, DTD_ELEM_NET)) 4621 break; 4622 if (cur == NULL) { 4623 handle->zone_dh_cur = handle->zone_dh_top; 4624 return (Z_NO_ENTRY); 4625 } 4626 4627 if ((err = fetchprop(cur, DTD_ATTR_ADDRESS, tabptr->zone_nwif_address, 4628 sizeof (tabptr->zone_nwif_address))) != Z_OK) { 4629 handle->zone_dh_cur = handle->zone_dh_top; 4630 return (err); 4631 } 4632 4633 if ((err = fetchprop(cur, DTD_ATTR_PHYSICAL, tabptr->zone_nwif_physical, 4634 sizeof (tabptr->zone_nwif_physical))) != Z_OK) { 4635 handle->zone_dh_cur = handle->zone_dh_top; 4636 return (err); 4637 } 4638 4639 if ((err = fetchprop(cur, DTD_ATTR_DEFROUTER, 4640 tabptr->zone_nwif_defrouter, 4641 sizeof (tabptr->zone_nwif_defrouter))) != Z_OK) { 4642 handle->zone_dh_cur = handle->zone_dh_top; 4643 return (err); 4644 } 4645 4646 handle->zone_dh_cur = cur->next; 4647 return (Z_OK); 4648 } 4649 4650 int 4651 zonecfg_endnwifent(zone_dochandle_t handle) 4652 { 4653 return (zonecfg_endent(handle)); 4654 } 4655 4656 int 4657 zonecfg_setdevent(zone_dochandle_t handle) 4658 { 4659 return (zonecfg_setent(handle)); 4660 } 4661 4662 int 4663 zonecfg_getdevent(zone_dochandle_t handle, struct zone_devtab *tabptr) 4664 { 4665 xmlNodePtr cur; 4666 int err; 4667 4668 if (handle == NULL) 4669 return (Z_INVAL); 4670 4671 if ((cur = handle->zone_dh_cur) == NULL) 4672 return (Z_NO_ENTRY); 4673 4674 for (; cur != NULL; cur = cur->next) 4675 if (!xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 4676 break; 4677 if (cur == NULL) { 4678 handle->zone_dh_cur = handle->zone_dh_top; 4679 return (Z_NO_ENTRY); 4680 } 4681 4682 if ((err = fetchprop(cur, DTD_ATTR_MATCH, tabptr->zone_dev_match, 4683 sizeof (tabptr->zone_dev_match))) != Z_OK) { 4684 handle->zone_dh_cur = handle->zone_dh_top; 4685 return (err); 4686 } 4687 4688 handle->zone_dh_cur = cur->next; 4689 return (Z_OK); 4690 } 4691 4692 int 4693 zonecfg_enddevent(zone_dochandle_t handle) 4694 { 4695 return (zonecfg_endent(handle)); 4696 } 4697 4698 int 4699 zonecfg_setrctlent(zone_dochandle_t handle) 4700 { 4701 return (zonecfg_setent(handle)); 4702 } 4703 4704 int 4705 zonecfg_getrctlent(zone_dochandle_t handle, struct zone_rctltab *tabptr) 4706 { 4707 xmlNodePtr cur, val; 4708 struct zone_rctlvaltab *valptr; 4709 int err; 4710 4711 if (handle == NULL) 4712 return (Z_INVAL); 4713 4714 if ((cur = handle->zone_dh_cur) == NULL) 4715 return (Z_NO_ENTRY); 4716 4717 for (; cur != NULL; cur = cur->next) 4718 if (!xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 4719 break; 4720 if (cur == NULL) { 4721 handle->zone_dh_cur = handle->zone_dh_top; 4722 return (Z_NO_ENTRY); 4723 } 4724 4725 if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_rctl_name, 4726 sizeof (tabptr->zone_rctl_name))) != Z_OK) { 4727 handle->zone_dh_cur = handle->zone_dh_top; 4728 return (err); 4729 } 4730 4731 tabptr->zone_rctl_valptr = NULL; 4732 for (val = cur->xmlChildrenNode; val != NULL; val = val->next) { 4733 valptr = (struct zone_rctlvaltab *)malloc( 4734 sizeof (struct zone_rctlvaltab)); 4735 if (valptr == NULL) 4736 return (Z_NOMEM); 4737 if (fetchprop(val, DTD_ATTR_PRIV, valptr->zone_rctlval_priv, 4738 sizeof (valptr->zone_rctlval_priv)) != Z_OK) 4739 break; 4740 if (fetchprop(val, DTD_ATTR_LIMIT, valptr->zone_rctlval_limit, 4741 sizeof (valptr->zone_rctlval_limit)) != Z_OK) 4742 break; 4743 if (fetchprop(val, DTD_ATTR_ACTION, valptr->zone_rctlval_action, 4744 sizeof (valptr->zone_rctlval_action)) != Z_OK) 4745 break; 4746 if (zonecfg_add_rctl_value(tabptr, valptr) != Z_OK) 4747 break; 4748 } 4749 4750 handle->zone_dh_cur = cur->next; 4751 return (Z_OK); 4752 } 4753 4754 int 4755 zonecfg_endrctlent(zone_dochandle_t handle) 4756 { 4757 return (zonecfg_endent(handle)); 4758 } 4759 4760 int 4761 zonecfg_setattrent(zone_dochandle_t handle) 4762 { 4763 return (zonecfg_setent(handle)); 4764 } 4765 4766 int 4767 zonecfg_getattrent(zone_dochandle_t handle, struct zone_attrtab *tabptr) 4768 { 4769 xmlNodePtr cur; 4770 int err; 4771 4772 if (handle == NULL) 4773 return (Z_INVAL); 4774 4775 if ((cur = handle->zone_dh_cur) == NULL) 4776 return (Z_NO_ENTRY); 4777 4778 for (; cur != NULL; cur = cur->next) 4779 if (!xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 4780 break; 4781 if (cur == NULL) { 4782 handle->zone_dh_cur = handle->zone_dh_top; 4783 return (Z_NO_ENTRY); 4784 } 4785 4786 if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_attr_name, 4787 sizeof (tabptr->zone_attr_name))) != Z_OK) { 4788 handle->zone_dh_cur = handle->zone_dh_top; 4789 return (err); 4790 } 4791 4792 if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_attr_type, 4793 sizeof (tabptr->zone_attr_type))) != Z_OK) { 4794 handle->zone_dh_cur = handle->zone_dh_top; 4795 return (err); 4796 } 4797 4798 if ((err = fetchprop(cur, DTD_ATTR_VALUE, tabptr->zone_attr_value, 4799 sizeof (tabptr->zone_attr_value))) != Z_OK) { 4800 handle->zone_dh_cur = handle->zone_dh_top; 4801 return (err); 4802 } 4803 4804 handle->zone_dh_cur = cur->next; 4805 return (Z_OK); 4806 } 4807 4808 int 4809 zonecfg_endattrent(zone_dochandle_t handle) 4810 { 4811 return (zonecfg_endent(handle)); 4812 } 4813 4814 /* 4815 * The privileges available on the system and described in privileges(5) 4816 * fall into four categories with respect to non-global zones: 4817 * 4818 * Default set of privileges considered safe for all non-global 4819 * zones. These privileges are "safe" in the sense that a 4820 * privileged process in the zone cannot affect processes in any 4821 * other zone on the system. 4822 * 4823 * Set of privileges not currently permitted within a non-global 4824 * zone. These privileges are considered by default, "unsafe," 4825 * and include ones which affect global resources (such as the 4826 * system clock or physical memory) or are overly broad and cover 4827 * more than one mechanism in the system. In other cases, there 4828 * has not been sufficient virtualization in the parts of the 4829 * system the privilege covers to allow its use within a 4830 * non-global zone. 4831 * 4832 * Set of privileges required in order to get a zone booted and 4833 * init(1M) started. These cannot be removed from the zone's 4834 * privilege set. 4835 * 4836 * All other privileges are optional and are potentially useful for 4837 * processes executing inside a non-global zone. 4838 * 4839 * When privileges are added to the system, a determination needs to be 4840 * made as to which category the privilege belongs to. Ideally, 4841 * privileges should be fine-grained enough and the mechanisms they cover 4842 * virtualized enough so that they can be made available to non-global 4843 * zones. 4844 */ 4845 4846 /* 4847 * Define some of the tokens that priv_str_to_set(3C) recognizes. Since 4848 * the privilege string separator can be any character, although it is 4849 * usually a comma character, define these here as well in the event that 4850 * they change or are augmented in the future. 4851 */ 4852 #define BASIC_TOKEN "basic" 4853 #define DEFAULT_TOKEN "default" 4854 #define ZONE_TOKEN "zone" 4855 #define TOKEN_PRIV_CHAR ',' 4856 #define TOKEN_PRIV_STR "," 4857 4858 typedef struct priv_node { 4859 struct priv_node *pn_next; /* Next privilege */ 4860 char *pn_priv; /* Privileges name */ 4861 } priv_node_t; 4862 4863 /* Privileges lists can differ across brands */ 4864 typedef struct priv_lists { 4865 /* Privileges considered safe for all non-global zones of a brand */ 4866 struct priv_node *pl_default; 4867 4868 /* Privileges not permitted for all non-global zones of a brand */ 4869 struct priv_node *pl_prohibited; 4870 4871 /* Privileges required for all non-global zones of a brand */ 4872 struct priv_node *pl_required; 4873 4874 /* 4875 * ip-type of the zone these privileges lists apply to. 4876 * It is used to pass ip-type to the callback function, 4877 * priv_lists_cb, which has no way of getting the ip-type. 4878 */ 4879 const char *pl_iptype; 4880 } priv_lists_t; 4881 4882 static int 4883 priv_lists_cb(void *data, priv_iter_t *priv_iter) 4884 { 4885 priv_lists_t *plp = (priv_lists_t *)data; 4886 priv_node_t *pnp; 4887 4888 /* Skip this privilege if ip-type does not match */ 4889 if ((strcmp(priv_iter->pi_iptype, "all") != 0) && 4890 (strcmp(priv_iter->pi_iptype, plp->pl_iptype) != 0)) 4891 return (0); 4892 4893 /* Allocate a new priv list node. */ 4894 if ((pnp = malloc(sizeof (*pnp))) == NULL) 4895 return (-1); 4896 if ((pnp->pn_priv = strdup(priv_iter->pi_name)) == NULL) { 4897 free(pnp); 4898 return (-1); 4899 } 4900 4901 /* Insert the new priv list node into the right list */ 4902 if (strcmp(priv_iter->pi_set, "default") == 0) { 4903 pnp->pn_next = plp->pl_default; 4904 plp->pl_default = pnp; 4905 } else if (strcmp(priv_iter->pi_set, "prohibited") == 0) { 4906 pnp->pn_next = plp->pl_prohibited; 4907 plp->pl_prohibited = pnp; 4908 } else if (strcmp(priv_iter->pi_set, "required") == 0) { 4909 pnp->pn_next = plp->pl_required; 4910 plp->pl_required = pnp; 4911 } else { 4912 free(pnp->pn_priv); 4913 free(pnp); 4914 return (-1); 4915 } 4916 return (0); 4917 } 4918 4919 static void 4920 priv_lists_destroy(priv_lists_t *plp) 4921 { 4922 priv_node_t *pnp; 4923 4924 assert(plp != NULL); 4925 4926 while ((pnp = plp->pl_default) != NULL) { 4927 plp->pl_default = pnp->pn_next; 4928 free(pnp->pn_priv); 4929 free(pnp); 4930 } 4931 while ((pnp = plp->pl_prohibited) != NULL) { 4932 plp->pl_prohibited = pnp->pn_next; 4933 free(pnp->pn_priv); 4934 free(pnp); 4935 } 4936 while ((pnp = plp->pl_required) != NULL) { 4937 plp->pl_required = pnp->pn_next; 4938 free(pnp->pn_priv); 4939 free(pnp); 4940 } 4941 free(plp); 4942 } 4943 4944 static int 4945 priv_lists_create(zone_dochandle_t handle, char *brand, priv_lists_t **plpp, 4946 const char *curr_iptype) 4947 { 4948 priv_lists_t *plp; 4949 brand_handle_t bh; 4950 char brand_str[MAXNAMELEN]; 4951 4952 /* handle or brand must be set, but never both */ 4953 assert((handle != NULL) || (brand != NULL)); 4954 assert((handle == NULL) || (brand == NULL)); 4955 4956 if (handle != NULL) { 4957 brand = brand_str; 4958 if (zonecfg_get_brand(handle, brand, sizeof (brand_str)) != 0) 4959 return (Z_BRAND_ERROR); 4960 } 4961 4962 if ((bh = brand_open(brand)) == NULL) 4963 return (Z_BRAND_ERROR); 4964 4965 if ((plp = calloc(1, sizeof (priv_lists_t))) == NULL) { 4966 brand_close(bh); 4967 return (Z_NOMEM); 4968 } 4969 4970 plp->pl_iptype = curr_iptype; 4971 4972 /* construct the privilege lists */ 4973 if (brand_config_iter_privilege(bh, priv_lists_cb, plp) != 0) { 4974 priv_lists_destroy(plp); 4975 brand_close(bh); 4976 return (Z_BRAND_ERROR); 4977 } 4978 4979 brand_close(bh); 4980 *plpp = plp; 4981 return (Z_OK); 4982 } 4983 4984 static int 4985 get_default_privset(priv_set_t *privs, priv_lists_t *plp) 4986 { 4987 priv_node_t *pnp; 4988 priv_set_t *basic; 4989 4990 basic = priv_str_to_set(BASIC_TOKEN, TOKEN_PRIV_STR, NULL); 4991 if (basic == NULL) 4992 return (errno == ENOMEM ? Z_NOMEM : Z_INVAL); 4993 4994 priv_union(basic, privs); 4995 priv_freeset(basic); 4996 4997 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) { 4998 if (priv_addset(privs, pnp->pn_priv) != 0) 4999 return (Z_INVAL); 5000 } 5001 5002 return (Z_OK); 5003 } 5004 5005 int 5006 zonecfg_default_brand(char *brand, size_t brandsize) 5007 { 5008 zone_dochandle_t handle; 5009 int myzoneid = getzoneid(); 5010 int ret; 5011 5012 /* 5013 * If we're running within a zone, then the default brand is the 5014 * current zone's brand. 5015 */ 5016 if (myzoneid != GLOBAL_ZONEID) { 5017 ret = zone_getattr(myzoneid, ZONE_ATTR_BRAND, brand, brandsize); 5018 if (ret < 0) 5019 return ((errno == EFAULT) ? Z_TOO_BIG : Z_INVAL); 5020 return (Z_OK); 5021 } 5022 5023 if ((handle = zonecfg_init_handle()) == NULL) 5024 return (Z_NOMEM); 5025 if ((ret = zonecfg_get_handle("SUNWdefault", handle)) == Z_OK) { 5026 ret = i_zonecfg_get_brand(handle, brand, brandsize, B_TRUE); 5027 zonecfg_fini_handle(handle); 5028 return (ret); 5029 } 5030 return (ret); 5031 } 5032 5033 int 5034 zonecfg_default_privset(priv_set_t *privs, const char *curr_iptype) 5035 { 5036 priv_lists_t *plp; 5037 char buf[MAXNAMELEN]; 5038 int ret; 5039 5040 if ((ret = zonecfg_default_brand(buf, sizeof (buf))) != Z_OK) 5041 return (ret); 5042 if ((ret = priv_lists_create(NULL, buf, &plp, curr_iptype)) != Z_OK) 5043 return (ret); 5044 ret = get_default_privset(privs, plp); 5045 priv_lists_destroy(plp); 5046 return (ret); 5047 } 5048 5049 void 5050 append_priv_token(char *priv, char *str, size_t strlen) 5051 { 5052 if (*str != '\0') 5053 (void) strlcat(str, TOKEN_PRIV_STR, strlen); 5054 (void) strlcat(str, priv, strlen); 5055 } 5056 5057 /* 5058 * Verify that the supplied string is a valid privilege limit set for a 5059 * non-global zone. This string must not only be acceptable to 5060 * priv_str_to_set(3C) which parses it, but it also must resolve to a 5061 * privilege set that includes certain required privileges and lacks 5062 * certain prohibited privileges. 5063 */ 5064 static int 5065 verify_privset(char *privbuf, priv_set_t *privs, char **privname, 5066 boolean_t add_default, priv_lists_t *plp) 5067 { 5068 priv_node_t *pnp; 5069 char *tmp, *cp, *lasts; 5070 size_t len; 5071 priv_set_t *mergeset; 5072 const char *token; 5073 5074 /* 5075 * The verification of the privilege string occurs in several 5076 * phases. In the first phase, the supplied string is scanned for 5077 * the ZONE_TOKEN token which is not support as part of the 5078 * "limitpriv" property. 5079 * 5080 * Duplicate the supplied privilege string since strtok_r(3C) 5081 * tokenizes its input by null-terminating the tokens. 5082 */ 5083 if ((tmp = strdup(privbuf)) == NULL) 5084 return (Z_NOMEM); 5085 for (cp = strtok_r(tmp, TOKEN_PRIV_STR, &lasts); cp != NULL; 5086 cp = strtok_r(NULL, TOKEN_PRIV_STR, &lasts)) { 5087 if (strcmp(cp, ZONE_TOKEN) == 0) { 5088 free(tmp); 5089 if ((*privname = strdup(ZONE_TOKEN)) == NULL) 5090 return (Z_NOMEM); 5091 else 5092 return (Z_PRIV_UNKNOWN); 5093 } 5094 } 5095 free(tmp); 5096 5097 if (add_default) { 5098 /* 5099 * If DEFAULT_TOKEN was specified, a string needs to be 5100 * built containing the privileges from the default, safe 5101 * set along with those of the "limitpriv" property. 5102 */ 5103 len = strlen(privbuf) + sizeof (BASIC_TOKEN) + 2; 5104 5105 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) 5106 len += strlen(pnp->pn_priv) + 1; 5107 tmp = alloca(len); 5108 *tmp = '\0'; 5109 5110 append_priv_token(BASIC_TOKEN, tmp, len); 5111 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) 5112 append_priv_token(pnp->pn_priv, tmp, len); 5113 (void) strlcat(tmp, TOKEN_PRIV_STR, len); 5114 (void) strlcat(tmp, privbuf, len); 5115 } else { 5116 tmp = privbuf; 5117 } 5118 5119 5120 /* 5121 * In the next phase, attempt to convert the merged privilege 5122 * string into a privilege set. In the case of an error, either 5123 * there was a memory allocation failure or there was an invalid 5124 * privilege token in the string. In either case, return an 5125 * appropriate error code but in the event of an invalid token, 5126 * allocate a string containing its name and return that back to 5127 * the caller. 5128 */ 5129 mergeset = priv_str_to_set(tmp, TOKEN_PRIV_STR, &token); 5130 if (mergeset == NULL) { 5131 if (token == NULL) 5132 return (Z_NOMEM); 5133 if ((cp = strchr(token, TOKEN_PRIV_CHAR)) != NULL) 5134 *cp = '\0'; 5135 if ((*privname = strdup(token)) == NULL) 5136 return (Z_NOMEM); 5137 else 5138 return (Z_PRIV_UNKNOWN); 5139 } 5140 5141 /* 5142 * Next, verify that none of the prohibited zone privileges are 5143 * present in the merged privilege set. 5144 */ 5145 for (pnp = plp->pl_prohibited; pnp != NULL; pnp = pnp->pn_next) { 5146 if (priv_ismember(mergeset, pnp->pn_priv)) { 5147 priv_freeset(mergeset); 5148 if ((*privname = strdup(pnp->pn_priv)) == NULL) 5149 return (Z_NOMEM); 5150 else 5151 return (Z_PRIV_PROHIBITED); 5152 } 5153 } 5154 5155 /* 5156 * Finally, verify that all of the required zone privileges are 5157 * present in the merged privilege set. 5158 */ 5159 for (pnp = plp->pl_required; pnp != NULL; pnp = pnp->pn_next) { 5160 if (!priv_ismember(mergeset, pnp->pn_priv)) { 5161 priv_freeset(mergeset); 5162 if ((*privname = strdup(pnp->pn_priv)) == NULL) 5163 return (Z_NOMEM); 5164 else 5165 return (Z_PRIV_REQUIRED); 5166 } 5167 } 5168 5169 priv_copyset(mergeset, privs); 5170 priv_freeset(mergeset); 5171 return (Z_OK); 5172 } 5173 5174 /* 5175 * Fill in the supplied privilege set with either the default, safe set of 5176 * privileges suitable for a non-global zone, or one based on the 5177 * "limitpriv" property in the zone's configuration. 5178 * 5179 * In the event of an invalid privilege specification in the 5180 * configuration, a string is allocated and returned containing the 5181 * "privilege" causing the issue. It is the caller's responsibility to 5182 * free this memory when it is done with it. 5183 */ 5184 int 5185 zonecfg_get_privset(zone_dochandle_t handle, priv_set_t *privs, 5186 char **privname) 5187 { 5188 priv_lists_t *plp; 5189 char *cp, *limitpriv = NULL; 5190 int err, limitlen; 5191 zone_iptype_t iptype; 5192 const char *curr_iptype; 5193 5194 /* 5195 * Attempt to lookup the "limitpriv" property. If it does not 5196 * exist or matches the string DEFAULT_TOKEN exactly, then the 5197 * default, safe privilege set is returned. 5198 */ 5199 if ((err = zonecfg_get_limitpriv(handle, &limitpriv)) != Z_OK) 5200 return (err); 5201 5202 if ((err = zonecfg_get_iptype(handle, &iptype)) != Z_OK) 5203 return (err); 5204 5205 switch (iptype) { 5206 case ZS_SHARED: 5207 curr_iptype = "shared"; 5208 break; 5209 case ZS_EXCLUSIVE: 5210 curr_iptype = "exclusive"; 5211 break; 5212 } 5213 5214 if ((err = priv_lists_create(handle, NULL, &plp, curr_iptype)) != Z_OK) 5215 return (err); 5216 5217 limitlen = strlen(limitpriv); 5218 if (limitlen == 0 || strcmp(limitpriv, DEFAULT_TOKEN) == 0) { 5219 free(limitpriv); 5220 err = get_default_privset(privs, plp); 5221 priv_lists_destroy(plp); 5222 return (err); 5223 } 5224 5225 /* 5226 * Check if the string DEFAULT_TOKEN is the first token in a list 5227 * of privileges. 5228 */ 5229 cp = strchr(limitpriv, TOKEN_PRIV_CHAR); 5230 if (cp != NULL && 5231 strncmp(limitpriv, DEFAULT_TOKEN, cp - limitpriv) == 0) 5232 err = verify_privset(cp + 1, privs, privname, B_TRUE, plp); 5233 else 5234 err = verify_privset(limitpriv, privs, privname, B_FALSE, plp); 5235 5236 free(limitpriv); 5237 priv_lists_destroy(plp); 5238 return (err); 5239 } 5240 5241 int 5242 zone_get_zonepath(char *zone_name, char *zonepath, size_t rp_sz) 5243 { 5244 zone_dochandle_t handle; 5245 boolean_t found = B_FALSE; 5246 struct zoneent *ze; 5247 FILE *cookie; 5248 int err; 5249 char *cp; 5250 5251 if (zone_name == NULL) 5252 return (Z_INVAL); 5253 5254 (void) strlcpy(zonepath, zonecfg_root, rp_sz); 5255 cp = zonepath + strlen(zonepath); 5256 while (cp > zonepath && cp[-1] == '/') 5257 *--cp = '\0'; 5258 5259 if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) { 5260 if (zonepath[0] == '\0') 5261 (void) strlcpy(zonepath, "/", rp_sz); 5262 return (Z_OK); 5263 } 5264 5265 /* 5266 * First check the index file. Because older versions did not have 5267 * a copy of the zone path, allow for it to be zero length, in which 5268 * case we ignore this result and fall back to the XML files. 5269 */ 5270 cookie = setzoneent(); 5271 while ((ze = getzoneent_private(cookie)) != NULL) { 5272 if (strcmp(ze->zone_name, zone_name) == 0) { 5273 found = B_TRUE; 5274 if (ze->zone_path[0] != '\0') 5275 (void) strlcpy(cp, ze->zone_path, 5276 rp_sz - (cp - zonepath)); 5277 } 5278 free(ze); 5279 if (found) 5280 break; 5281 } 5282 endzoneent(cookie); 5283 if (found && *cp != '\0') 5284 return (Z_OK); 5285 5286 /* Fall back to the XML files. */ 5287 if ((handle = zonecfg_init_handle()) == NULL) 5288 return (Z_NOMEM); 5289 5290 /* 5291 * Check the snapshot first: if a zone is running, its zonepath 5292 * may have changed. 5293 */ 5294 if (zonecfg_get_snapshot_handle(zone_name, handle) != Z_OK) { 5295 if ((err = zonecfg_get_handle(zone_name, handle)) != Z_OK) { 5296 zonecfg_fini_handle(handle); 5297 return (err); 5298 } 5299 } 5300 err = zonecfg_get_zonepath(handle, zonepath, rp_sz); 5301 zonecfg_fini_handle(handle); 5302 return (err); 5303 } 5304 5305 int 5306 zone_get_rootpath(char *zone_name, char *rootpath, size_t rp_sz) 5307 { 5308 int err; 5309 5310 /* This function makes sense for non-global zones only. */ 5311 if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) 5312 return (Z_BOGUS_ZONE_NAME); 5313 if ((err = zone_get_zonepath(zone_name, rootpath, rp_sz)) != Z_OK) 5314 return (err); 5315 if (strlcat(rootpath, "/root", rp_sz) >= rp_sz) 5316 return (Z_TOO_BIG); 5317 return (Z_OK); 5318 } 5319 5320 int 5321 zone_get_brand(char *zone_name, char *brandname, size_t rp_sz) 5322 { 5323 int err; 5324 zone_dochandle_t handle; 5325 char myzone[MAXNAMELEN]; 5326 int myzoneid = getzoneid(); 5327 5328 /* 5329 * If we are not in the global zone, then we don't have the zone 5330 * .xml files with the brand name available. Thus, we are going to 5331 * have to ask the kernel for the information. 5332 */ 5333 if (myzoneid != GLOBAL_ZONEID) { 5334 if (is_system_labeled()) { 5335 (void) strlcpy(brandname, NATIVE_BRAND_NAME, rp_sz); 5336 return (Z_OK); 5337 } 5338 if (zone_getattr(myzoneid, ZONE_ATTR_NAME, myzone, 5339 sizeof (myzone)) < 0) 5340 return (Z_NO_ZONE); 5341 if (!zonecfg_is_scratch(myzone)) { 5342 if (strncmp(zone_name, myzone, MAXNAMELEN) != 0) 5343 return (Z_NO_ZONE); 5344 } 5345 err = zone_getattr(myzoneid, ZONE_ATTR_BRAND, brandname, rp_sz); 5346 if (err < 0) 5347 return ((errno == EFAULT) ? Z_TOO_BIG : Z_INVAL); 5348 5349 return (Z_OK); 5350 } 5351 5352 if (strcmp(zone_name, "global") == 0) 5353 return (zonecfg_default_brand(brandname, rp_sz)); 5354 5355 if ((handle = zonecfg_init_handle()) == NULL) 5356 return (Z_NOMEM); 5357 5358 err = zonecfg_get_handle((char *)zone_name, handle); 5359 if (err == Z_OK) 5360 err = zonecfg_get_brand(handle, brandname, rp_sz); 5361 5362 zonecfg_fini_handle(handle); 5363 return (err); 5364 } 5365 5366 /* 5367 * Return the appropriate root for the active /dev. 5368 * For normal zone, the path is $ZONEPATH/root; 5369 * for scratch zone, the dev path is $ZONEPATH/lu. 5370 */ 5371 int 5372 zone_get_devroot(char *zone_name, char *devroot, size_t rp_sz) 5373 { 5374 int err; 5375 char *suffix; 5376 zone_state_t state; 5377 5378 /* This function makes sense for non-global zones only. */ 5379 if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) 5380 return (Z_BOGUS_ZONE_NAME); 5381 if ((err = zone_get_zonepath(zone_name, devroot, rp_sz)) != Z_OK) 5382 return (err); 5383 5384 if (zone_get_state(zone_name, &state) == Z_OK && 5385 state == ZONE_STATE_MOUNTED) 5386 suffix = "/lu"; 5387 else 5388 suffix = "/root"; 5389 if (strlcat(devroot, suffix, rp_sz) >= rp_sz) 5390 return (Z_TOO_BIG); 5391 return (Z_OK); 5392 } 5393 5394 static zone_state_t 5395 kernel_state_to_user_state(zoneid_t zoneid, zone_status_t kernel_state) 5396 { 5397 char zoneroot[MAXPATHLEN]; 5398 size_t zlen; 5399 5400 assert(kernel_state <= ZONE_MAX_STATE); 5401 switch (kernel_state) { 5402 case ZONE_IS_UNINITIALIZED: 5403 case ZONE_IS_INITIALIZED: 5404 /* The kernel will not return these two states */ 5405 return (ZONE_STATE_READY); 5406 case ZONE_IS_READY: 5407 /* 5408 * If the zone's root is mounted on $ZONEPATH/lu, then 5409 * it's a mounted scratch zone. 5410 */ 5411 if (zone_getattr(zoneid, ZONE_ATTR_ROOT, zoneroot, 5412 sizeof (zoneroot)) >= 0) { 5413 zlen = strlen(zoneroot); 5414 if (zlen > 3 && 5415 strcmp(zoneroot + zlen - 3, "/lu") == 0) 5416 return (ZONE_STATE_MOUNTED); 5417 } 5418 return (ZONE_STATE_READY); 5419 case ZONE_IS_BOOTING: 5420 case ZONE_IS_RUNNING: 5421 return (ZONE_STATE_RUNNING); 5422 case ZONE_IS_SHUTTING_DOWN: 5423 case ZONE_IS_EMPTY: 5424 return (ZONE_STATE_SHUTTING_DOWN); 5425 case ZONE_IS_DOWN: 5426 case ZONE_IS_DYING: 5427 case ZONE_IS_DEAD: 5428 default: 5429 return (ZONE_STATE_DOWN); 5430 } 5431 /* NOTREACHED */ 5432 } 5433 5434 int 5435 zone_get_state(char *zone_name, zone_state_t *state_num) 5436 { 5437 zone_status_t status; 5438 zoneid_t zone_id; 5439 struct zoneent *ze; 5440 boolean_t found = B_FALSE; 5441 FILE *cookie; 5442 char kernzone[ZONENAME_MAX]; 5443 FILE *fp; 5444 5445 if (zone_name == NULL) 5446 return (Z_INVAL); 5447 5448 /* 5449 * If we're looking at an alternate root, then we need to query the 5450 * kernel using the scratch zone name. 5451 */ 5452 zone_id = -1; 5453 if (*zonecfg_root != '\0' && !zonecfg_is_scratch(zone_name)) { 5454 if ((fp = zonecfg_open_scratch("", B_FALSE)) != NULL) { 5455 if (zonecfg_find_scratch(fp, zone_name, zonecfg_root, 5456 kernzone, sizeof (kernzone)) == 0) 5457 zone_id = getzoneidbyname(kernzone); 5458 zonecfg_close_scratch(fp); 5459 } 5460 } else { 5461 zone_id = getzoneidbyname(zone_name); 5462 } 5463 5464 /* check to see if zone is running */ 5465 if (zone_id != -1 && 5466 zone_getattr(zone_id, ZONE_ATTR_STATUS, &status, 5467 sizeof (status)) >= 0) { 5468 *state_num = kernel_state_to_user_state(zone_id, status); 5469 return (Z_OK); 5470 } 5471 5472 cookie = setzoneent(); 5473 while ((ze = getzoneent_private(cookie)) != NULL) { 5474 if (strcmp(ze->zone_name, zone_name) == 0) { 5475 found = B_TRUE; 5476 *state_num = ze->zone_state; 5477 } 5478 free(ze); 5479 if (found) 5480 break; 5481 } 5482 endzoneent(cookie); 5483 return ((found) ? Z_OK : Z_NO_ZONE); 5484 } 5485 5486 int 5487 zone_set_state(char *zone, zone_state_t state) 5488 { 5489 struct zoneent ze; 5490 5491 if (state != ZONE_STATE_CONFIGURED && state != ZONE_STATE_INSTALLED && 5492 state != ZONE_STATE_INCOMPLETE) 5493 return (Z_INVAL); 5494 5495 bzero(&ze, sizeof (ze)); 5496 (void) strlcpy(ze.zone_name, zone, sizeof (ze.zone_name)); 5497 ze.zone_state = state; 5498 (void) strlcpy(ze.zone_path, "", sizeof (ze.zone_path)); 5499 return (putzoneent(&ze, PZE_MODIFY)); 5500 } 5501 5502 /* 5503 * Get id (if any) for specified zone. There are four possible outcomes: 5504 * - If the string corresponds to the numeric id of an active (booted) 5505 * zone, sets *zip to the zone id and returns 0. 5506 * - If the string corresponds to the name of an active (booted) zone, 5507 * sets *zip to the zone id and returns 0. 5508 * - If the string is a name in the configuration but is not booted, 5509 * sets *zip to ZONE_ID_UNDEFINED and returns 0. 5510 * - Otherwise, leaves *zip unchanged and returns -1. 5511 * 5512 * This function acts as an auxiliary filter on the function of the same 5513 * name in libc; the linker binds to this version if libzonecfg exists, 5514 * and the libc version if it doesn't. Any changes to this version of 5515 * the function should probably be reflected in the libc version as well. 5516 */ 5517 int 5518 zone_get_id(const char *str, zoneid_t *zip) 5519 { 5520 zone_dochandle_t hdl; 5521 zoneid_t zoneid; 5522 char *cp; 5523 int err; 5524 5525 /* first try looking for active zone by id */ 5526 errno = 0; 5527 zoneid = (zoneid_t)strtol(str, &cp, 0); 5528 if (errno == 0 && cp != str && *cp == '\0' && 5529 getzonenamebyid(zoneid, NULL, 0) != -1) { 5530 *zip = zoneid; 5531 return (0); 5532 } 5533 5534 /* then look for active zone by name */ 5535 if ((zoneid = getzoneidbyname(str)) != -1) { 5536 *zip = zoneid; 5537 return (0); 5538 } 5539 5540 /* if in global zone, try looking up name in configuration database */ 5541 if (getzoneid() != GLOBAL_ZONEID || 5542 (hdl = zonecfg_init_handle()) == NULL) 5543 return (-1); 5544 5545 if (zonecfg_get_handle(str, hdl) == Z_OK) { 5546 /* zone exists but isn't active */ 5547 *zip = ZONE_ID_UNDEFINED; 5548 err = 0; 5549 } else { 5550 err = -1; 5551 } 5552 5553 zonecfg_fini_handle(hdl); 5554 return (err); 5555 } 5556 5557 char * 5558 zone_state_str(zone_state_t state_num) 5559 { 5560 switch (state_num) { 5561 case ZONE_STATE_CONFIGURED: 5562 return (ZONE_STATE_STR_CONFIGURED); 5563 case ZONE_STATE_INCOMPLETE: 5564 return (ZONE_STATE_STR_INCOMPLETE); 5565 case ZONE_STATE_INSTALLED: 5566 return (ZONE_STATE_STR_INSTALLED); 5567 case ZONE_STATE_READY: 5568 return (ZONE_STATE_STR_READY); 5569 case ZONE_STATE_MOUNTED: 5570 return (ZONE_STATE_STR_MOUNTED); 5571 case ZONE_STATE_RUNNING: 5572 return (ZONE_STATE_STR_RUNNING); 5573 case ZONE_STATE_SHUTTING_DOWN: 5574 return (ZONE_STATE_STR_SHUTTING_DOWN); 5575 case ZONE_STATE_DOWN: 5576 return (ZONE_STATE_STR_DOWN); 5577 default: 5578 return ("unknown"); 5579 } 5580 } 5581 5582 /* 5583 * Given a UUID value, find an associated zone name. This is intended to be 5584 * used by callers who set up some 'default' name (corresponding to the 5585 * expected name for the zone) in the zonename buffer, and thus the function 5586 * doesn't touch this buffer on failure. 5587 */ 5588 int 5589 zonecfg_get_name_by_uuid(const uuid_t uuidin, char *zonename, size_t namelen) 5590 { 5591 FILE *fp; 5592 struct zoneent *ze; 5593 uchar_t *uuid; 5594 5595 /* 5596 * A small amount of subterfuge via casts is necessary here because 5597 * libuuid doesn't use const correctly, but we don't want to export 5598 * this brokenness to our clients. 5599 */ 5600 uuid = (uchar_t *)uuidin; 5601 if (uuid_is_null(uuid)) 5602 return (Z_NO_ZONE); 5603 if ((fp = setzoneent()) == NULL) 5604 return (Z_NO_ZONE); 5605 while ((ze = getzoneent_private(fp)) != NULL) { 5606 if (uuid_compare(uuid, ze->zone_uuid) == 0) 5607 break; 5608 free(ze); 5609 } 5610 endzoneent(fp); 5611 if (ze != NULL) { 5612 (void) strlcpy(zonename, ze->zone_name, namelen); 5613 free(ze); 5614 return (Z_OK); 5615 } else { 5616 return (Z_NO_ZONE); 5617 } 5618 } 5619 5620 /* 5621 * Given a zone name, get its UUID. Returns a "NULL" UUID value if the zone 5622 * exists but the file doesn't have a value set yet. Returns an error if the 5623 * zone cannot be located. 5624 */ 5625 int 5626 zonecfg_get_uuid(const char *zonename, uuid_t uuid) 5627 { 5628 FILE *fp; 5629 struct zoneent *ze; 5630 5631 if ((fp = setzoneent()) == NULL) 5632 return (Z_NO_ZONE); 5633 while ((ze = getzoneent_private(fp)) != NULL) { 5634 if (strcmp(ze->zone_name, zonename) == 0) 5635 break; 5636 free(ze); 5637 } 5638 endzoneent(fp); 5639 if (ze != NULL) { 5640 uuid_copy(uuid, ze->zone_uuid); 5641 free(ze); 5642 return (Z_OK); 5643 } else { 5644 return (Z_NO_ZONE); 5645 } 5646 } 5647 5648 /* 5649 * File-system convenience functions. 5650 */ 5651 boolean_t 5652 zonecfg_valid_fs_type(const char *type) 5653 { 5654 /* 5655 * We already know which FS types don't work. 5656 */ 5657 if (strcmp(type, "proc") == 0 || 5658 strcmp(type, "mntfs") == 0 || 5659 strcmp(type, "autofs") == 0 || 5660 strncmp(type, "nfs", sizeof ("nfs") - 1) == 0 || 5661 strcmp(type, "cachefs") == 0) 5662 return (B_FALSE); 5663 /* 5664 * The caller may do more detailed verification to make sure other 5665 * aspects of this filesystem type make sense. 5666 */ 5667 return (B_TRUE); 5668 } 5669 5670 /* 5671 * Generally uninteresting rctl convenience functions. 5672 */ 5673 5674 int 5675 zonecfg_construct_rctlblk(const struct zone_rctlvaltab *rctlval, 5676 rctlblk_t *rctlblk) 5677 { 5678 unsigned long long ull; 5679 char *endp; 5680 rctl_priv_t priv; 5681 rctl_qty_t limit; 5682 uint_t action; 5683 5684 /* Get the privilege */ 5685 if (strcmp(rctlval->zone_rctlval_priv, "basic") == 0) { 5686 priv = RCPRIV_BASIC; 5687 } else if (strcmp(rctlval->zone_rctlval_priv, "privileged") == 0) { 5688 priv = RCPRIV_PRIVILEGED; 5689 } else { 5690 /* Invalid privilege */ 5691 return (Z_INVAL); 5692 } 5693 5694 /* deal with negative input; strtoull(3c) doesn't do what we want */ 5695 if (rctlval->zone_rctlval_limit[0] == '-') 5696 return (Z_INVAL); 5697 /* Get the limit */ 5698 errno = 0; 5699 ull = strtoull(rctlval->zone_rctlval_limit, &endp, 0); 5700 if (errno != 0 || *endp != '\0') { 5701 /* parse failed */ 5702 return (Z_INVAL); 5703 } 5704 limit = (rctl_qty_t)ull; 5705 5706 /* Get the action */ 5707 if (strcmp(rctlval->zone_rctlval_action, "none") == 0) { 5708 action = RCTL_LOCAL_NOACTION; 5709 } else if (strcmp(rctlval->zone_rctlval_action, "signal") == 0) { 5710 action = RCTL_LOCAL_SIGNAL; 5711 } else if (strcmp(rctlval->zone_rctlval_action, "deny") == 0) { 5712 action = RCTL_LOCAL_DENY; 5713 } else { 5714 /* Invalid Action */ 5715 return (Z_INVAL); 5716 } 5717 rctlblk_set_local_action(rctlblk, action, 0); 5718 rctlblk_set_privilege(rctlblk, priv); 5719 rctlblk_set_value(rctlblk, limit); 5720 return (Z_OK); 5721 } 5722 5723 static int 5724 rctl_check(const char *rctlname, void *arg) 5725 { 5726 const char *attrname = arg; 5727 5728 /* 5729 * Returning 1 here is our signal to zonecfg_is_rctl() that it is 5730 * indeed an rctl name recognized by the system. 5731 */ 5732 return (strcmp(rctlname, attrname) == 0 ? 1 : 0); 5733 } 5734 5735 boolean_t 5736 zonecfg_is_rctl(const char *name) 5737 { 5738 return (rctl_walk(rctl_check, (void *)name) == 1); 5739 } 5740 5741 boolean_t 5742 zonecfg_valid_rctlname(const char *name) 5743 { 5744 const char *c; 5745 5746 if (strncmp(name, "zone.", sizeof ("zone.") - 1) != 0) 5747 return (B_FALSE); 5748 if (strlen(name) == sizeof ("zone.") - 1) 5749 return (B_FALSE); 5750 for (c = name + sizeof ("zone.") - 1; *c != '\0'; c++) { 5751 if (!isalpha(*c) && *c != '-') 5752 return (B_FALSE); 5753 } 5754 return (B_TRUE); 5755 } 5756 5757 boolean_t 5758 zonecfg_valid_rctlblk(const rctlblk_t *rctlblk) 5759 { 5760 rctl_priv_t priv = rctlblk_get_privilege((rctlblk_t *)rctlblk); 5761 uint_t action = rctlblk_get_local_action((rctlblk_t *)rctlblk, NULL); 5762 5763 if (priv != RCPRIV_PRIVILEGED) 5764 return (B_FALSE); 5765 if (action != RCTL_LOCAL_NOACTION && action != RCTL_LOCAL_DENY) 5766 return (B_FALSE); 5767 return (B_TRUE); 5768 } 5769 5770 boolean_t 5771 zonecfg_valid_rctl(const char *name, const rctlblk_t *rctlblk) 5772 { 5773 rctlblk_t *current, *next; 5774 rctl_qty_t limit = rctlblk_get_value((rctlblk_t *)rctlblk); 5775 uint_t action = rctlblk_get_local_action((rctlblk_t *)rctlblk, NULL); 5776 uint_t global_flags; 5777 5778 if (!zonecfg_valid_rctlblk(rctlblk)) 5779 return (B_FALSE); 5780 if (!zonecfg_valid_rctlname(name)) 5781 return (B_FALSE); 5782 5783 current = alloca(rctlblk_size()); 5784 if (getrctl(name, NULL, current, RCTL_FIRST) != 0) 5785 return (B_TRUE); /* not an rctl on this system */ 5786 /* 5787 * Make sure the proposed value isn't greater than the current system 5788 * value. 5789 */ 5790 next = alloca(rctlblk_size()); 5791 while (rctlblk_get_privilege(current) != RCPRIV_SYSTEM) { 5792 rctlblk_t *tmp; 5793 5794 if (getrctl(name, current, next, RCTL_NEXT) != 0) 5795 return (B_FALSE); /* shouldn't happen */ 5796 tmp = current; 5797 current = next; 5798 next = tmp; 5799 } 5800 if (limit > rctlblk_get_value(current)) 5801 return (B_FALSE); 5802 5803 /* 5804 * Make sure the proposed action is allowed. 5805 */ 5806 global_flags = rctlblk_get_global_flags(current); 5807 if ((global_flags & RCTL_GLOBAL_DENY_NEVER) && 5808 action == RCTL_LOCAL_DENY) 5809 return (B_FALSE); 5810 if ((global_flags & RCTL_GLOBAL_DENY_ALWAYS) && 5811 action == RCTL_LOCAL_NOACTION) 5812 return (B_FALSE); 5813 5814 return (B_TRUE); 5815 } 5816 5817 /* 5818 * There is always a race condition between reading the initial copy of 5819 * a zones state and its state changing. We address this by providing 5820 * zonecfg_notify_critical_enter and zonecfg_noticy_critical_exit functions. 5821 * When zonecfg_critical_enter is called, sets the state field to LOCKED 5822 * and aquires biglock. Biglock protects against other threads executing 5823 * critical_enter and the state field protects against state changes during 5824 * the critical period. 5825 * 5826 * If any state changes occur, zn_cb will set the failed field of the znotify 5827 * structure. This will cause the critical_exit function to re-lock the 5828 * channel and return an error. Since evsnts may be delayed, the critical_exit 5829 * function "flushes" the queue by putting an event on the queue and waiting for 5830 * zn_cb to notify critical_exit that it received the ping event. 5831 */ 5832 static const char * 5833 string_get_tok(const char *in, char delim, int num) 5834 { 5835 int i = 0; 5836 5837 for (; i < num; in++) { 5838 if (*in == delim) 5839 i++; 5840 if (*in == 0) 5841 return (NULL); 5842 } 5843 return (in); 5844 } 5845 5846 static boolean_t 5847 is_ping(sysevent_t *ev) 5848 { 5849 if (strcmp(sysevent_get_subclass_name(ev), 5850 ZONE_EVENT_PING_SUBCLASS) == 0) { 5851 return (B_TRUE); 5852 } else { 5853 return (B_FALSE); 5854 } 5855 } 5856 5857 static boolean_t 5858 is_my_ping(sysevent_t *ev) 5859 { 5860 const char *sender; 5861 char mypid[sizeof (pid_t) * 3 + 1]; 5862 5863 (void) snprintf(mypid, sizeof (mypid), "%i", getpid()); 5864 sender = string_get_tok(sysevent_get_pub(ev), ':', 3); 5865 if (sender == NULL) 5866 return (B_FALSE); 5867 if (strcmp(sender, mypid) != 0) 5868 return (B_FALSE); 5869 return (B_TRUE); 5870 } 5871 5872 static int 5873 do_callback(struct znotify *zevtchan, sysevent_t *ev) 5874 { 5875 nvlist_t *l; 5876 int zid; 5877 char *zonename; 5878 char *newstate; 5879 char *oldstate; 5880 int ret; 5881 hrtime_t when; 5882 5883 if (strcmp(sysevent_get_subclass_name(ev), 5884 ZONE_EVENT_STATUS_SUBCLASS) == 0) { 5885 5886 if (sysevent_get_attr_list(ev, &l) != 0) { 5887 if (errno == ENOMEM) { 5888 zevtchan->zn_failure_count++; 5889 return (EAGAIN); 5890 } 5891 return (0); 5892 } 5893 ret = 0; 5894 5895 if ((nvlist_lookup_string(l, ZONE_CB_NAME, &zonename) == 0) && 5896 (nvlist_lookup_string(l, ZONE_CB_NEWSTATE, &newstate) 5897 == 0) && 5898 (nvlist_lookup_string(l, ZONE_CB_OLDSTATE, &oldstate) 5899 == 0) && 5900 (nvlist_lookup_uint64(l, ZONE_CB_TIMESTAMP, 5901 (uint64_t *)&when) == 0) && 5902 (nvlist_lookup_int32(l, ZONE_CB_ZONEID, &zid) == 0)) { 5903 ret = zevtchan->zn_callback(zonename, zid, newstate, 5904 oldstate, when, zevtchan->zn_private); 5905 } 5906 5907 zevtchan->zn_failure_count = 0; 5908 nvlist_free(l); 5909 return (ret); 5910 } else { 5911 /* 5912 * We have received an event in an unknown subclass. Ignore. 5913 */ 5914 zevtchan->zn_failure_count = 0; 5915 return (0); 5916 } 5917 } 5918 5919 static int 5920 zn_cb(sysevent_t *ev, void *p) 5921 { 5922 struct znotify *zevtchan = p; 5923 int error; 5924 5925 (void) pthread_mutex_lock(&(zevtchan->zn_mutex)); 5926 5927 if (is_ping(ev) && !is_my_ping(ev)) { 5928 (void) pthread_mutex_unlock((&zevtchan->zn_mutex)); 5929 return (0); 5930 } 5931 5932 if (zevtchan->zn_state == ZN_LOCKED) { 5933 assert(!is_ping(ev)); 5934 zevtchan->zn_failed = B_TRUE; 5935 (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5936 return (0); 5937 } 5938 5939 if (zevtchan->zn_state == ZN_PING_INFLIGHT) { 5940 if (is_ping(ev)) { 5941 zevtchan->zn_state = ZN_PING_RECEIVED; 5942 (void) pthread_cond_signal(&(zevtchan->zn_cond)); 5943 (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5944 return (0); 5945 } else { 5946 zevtchan->zn_failed = B_TRUE; 5947 (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5948 return (0); 5949 } 5950 } 5951 5952 if (zevtchan->zn_state == ZN_UNLOCKED) { 5953 5954 error = do_callback(zevtchan, ev); 5955 (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5956 /* 5957 * Every ENOMEM failure causes do_callback to increment 5958 * zn_failure_count and every success causes it to 5959 * set zn_failure_count to zero. If we got EAGAIN, 5960 * we will sleep for zn_failure_count seconds and return 5961 * EAGAIN to gpec to try again. 5962 * 5963 * After 55 seconds, or 10 try's we give up and drop the 5964 * event. 5965 */ 5966 if (error == EAGAIN) { 5967 if (zevtchan->zn_failure_count > ZONE_CB_RETRY_COUNT) { 5968 return (0); 5969 } 5970 (void) sleep(zevtchan->zn_failure_count); 5971 } 5972 return (error); 5973 } 5974 5975 if (zevtchan->zn_state == ZN_PING_RECEIVED) { 5976 (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5977 return (0); 5978 } 5979 5980 abort(); 5981 return (0); 5982 } 5983 5984 void 5985 zonecfg_notify_critical_enter(void *h) 5986 { 5987 struct znotify *zevtchan = h; 5988 5989 (void) pthread_mutex_lock(&(zevtchan->zn_bigmutex)); 5990 zevtchan->zn_state = ZN_LOCKED; 5991 } 5992 5993 int 5994 zonecfg_notify_critical_exit(void * h) 5995 { 5996 5997 struct znotify *zevtchan = h; 5998 5999 if (zevtchan->zn_state == ZN_UNLOCKED) 6000 return (0); 6001 6002 (void) pthread_mutex_lock(&(zevtchan->zn_mutex)); 6003 zevtchan->zn_state = ZN_PING_INFLIGHT; 6004 6005 (void) sysevent_evc_publish(zevtchan->zn_eventchan, 6006 ZONE_EVENT_STATUS_CLASS, 6007 ZONE_EVENT_PING_SUBCLASS, ZONE_EVENT_PING_PUBLISHER, 6008 zevtchan->zn_subscriber_id, NULL, EVCH_SLEEP); 6009 6010 while (zevtchan->zn_state != ZN_PING_RECEIVED) { 6011 (void) pthread_cond_wait(&(zevtchan->zn_cond), 6012 &(zevtchan->zn_mutex)); 6013 } 6014 6015 if (zevtchan->zn_failed == B_TRUE) { 6016 zevtchan->zn_state = ZN_LOCKED; 6017 zevtchan->zn_failed = B_FALSE; 6018 (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6019 return (1); 6020 } 6021 6022 zevtchan->zn_state = ZN_UNLOCKED; 6023 (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6024 (void) pthread_mutex_unlock(&(zevtchan->zn_bigmutex)); 6025 return (0); 6026 } 6027 6028 void 6029 zonecfg_notify_critical_abort(void *h) 6030 { 6031 struct znotify *zevtchan = h; 6032 6033 zevtchan->zn_state = ZN_UNLOCKED; 6034 zevtchan->zn_failed = B_FALSE; 6035 /* 6036 * Don't do anything about zn_lock. If it is held, it could only be 6037 * held by zn_cb and it will be unlocked soon. 6038 */ 6039 (void) pthread_mutex_unlock(&(zevtchan->zn_bigmutex)); 6040 } 6041 6042 void * 6043 zonecfg_notify_bind(int(*func)(const char *zonename, zoneid_t zid, 6044 const char *newstate, const char *oldstate, hrtime_t when, void *p), 6045 void *p) 6046 { 6047 struct znotify *zevtchan; 6048 int i = 1; 6049 int r; 6050 6051 zevtchan = malloc(sizeof (struct znotify)); 6052 6053 if (zevtchan == NULL) 6054 return (NULL); 6055 6056 zevtchan->zn_private = p; 6057 zevtchan->zn_callback = func; 6058 zevtchan->zn_state = ZN_UNLOCKED; 6059 zevtchan->zn_failed = B_FALSE; 6060 6061 if (pthread_mutex_init(&(zevtchan->zn_mutex), NULL)) 6062 goto out3; 6063 if (pthread_cond_init(&(zevtchan->zn_cond), NULL)) { 6064 (void) pthread_mutex_destroy(&(zevtchan->zn_mutex)); 6065 goto out3; 6066 } 6067 if (pthread_mutex_init(&(zevtchan->zn_bigmutex), NULL)) { 6068 (void) pthread_mutex_destroy(&(zevtchan->zn_mutex)); 6069 (void) pthread_cond_destroy(&(zevtchan->zn_cond)); 6070 goto out3; 6071 } 6072 6073 if (sysevent_evc_bind(ZONE_EVENT_CHANNEL, &(zevtchan->zn_eventchan), 6074 0) != 0) 6075 goto out2; 6076 6077 do { 6078 /* 6079 * At 4 digits the subscriber ID gets too long and we have 6080 * no chance of successfully registering. 6081 */ 6082 if (i > 999) 6083 goto out1; 6084 6085 (void) sprintf(zevtchan->zn_subscriber_id, "zone_%li_%i", 6086 getpid() % 999999l, i); 6087 6088 r = sysevent_evc_subscribe(zevtchan->zn_eventchan, 6089 zevtchan->zn_subscriber_id, ZONE_EVENT_STATUS_CLASS, zn_cb, 6090 zevtchan, 0); 6091 6092 i++; 6093 6094 } while (r); 6095 6096 return (zevtchan); 6097 out1: 6098 (void) sysevent_evc_unbind(zevtchan->zn_eventchan); 6099 out2: 6100 (void) pthread_mutex_destroy(&zevtchan->zn_mutex); 6101 (void) pthread_cond_destroy(&zevtchan->zn_cond); 6102 (void) pthread_mutex_destroy(&(zevtchan->zn_bigmutex)); 6103 out3: 6104 free(zevtchan); 6105 6106 return (NULL); 6107 } 6108 6109 void 6110 zonecfg_notify_unbind(void *handle) 6111 { 6112 6113 int ret; 6114 6115 (void) sysevent_evc_unbind(((struct znotify *)handle)->zn_eventchan); 6116 /* 6117 * Check that all evc threads have gone away. This should be 6118 * enforced by sysevent_evc_unbind. 6119 */ 6120 ret = pthread_mutex_trylock(&((struct znotify *)handle)->zn_mutex); 6121 6122 if (ret) 6123 abort(); 6124 6125 (void) pthread_mutex_unlock(&((struct znotify *)handle)->zn_mutex); 6126 (void) pthread_mutex_destroy(&((struct znotify *)handle)->zn_mutex); 6127 (void) pthread_cond_destroy(&((struct znotify *)handle)->zn_cond); 6128 (void) pthread_mutex_destroy(&((struct znotify *)handle)->zn_bigmutex); 6129 6130 free(handle); 6131 } 6132 6133 static int 6134 zonecfg_add_ds_core(zone_dochandle_t handle, struct zone_dstab *tabptr) 6135 { 6136 xmlNodePtr newnode, cur = handle->zone_dh_cur; 6137 int err; 6138 6139 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DATASET, NULL); 6140 if ((err = newprop(newnode, DTD_ATTR_NAME, 6141 tabptr->zone_dataset_name)) != Z_OK) 6142 return (err); 6143 return (Z_OK); 6144 } 6145 6146 int 6147 zonecfg_add_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 6148 { 6149 int err; 6150 6151 if (tabptr == NULL) 6152 return (Z_INVAL); 6153 6154 if ((err = operation_prep(handle)) != Z_OK) 6155 return (err); 6156 6157 if ((err = zonecfg_add_ds_core(handle, tabptr)) != Z_OK) 6158 return (err); 6159 6160 return (Z_OK); 6161 } 6162 6163 static int 6164 zonecfg_delete_ds_core(zone_dochandle_t handle, struct zone_dstab *tabptr) 6165 { 6166 xmlNodePtr cur = handle->zone_dh_cur; 6167 6168 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6169 if (xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 6170 continue; 6171 6172 if (match_prop(cur, DTD_ATTR_NAME, 6173 tabptr->zone_dataset_name)) { 6174 xmlUnlinkNode(cur); 6175 xmlFreeNode(cur); 6176 return (Z_OK); 6177 } 6178 } 6179 return (Z_NO_RESOURCE_ID); 6180 } 6181 6182 int 6183 zonecfg_delete_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 6184 { 6185 int err; 6186 6187 if (tabptr == NULL) 6188 return (Z_INVAL); 6189 6190 if ((err = operation_prep(handle)) != Z_OK) 6191 return (err); 6192 6193 if ((err = zonecfg_delete_ds_core(handle, tabptr)) != Z_OK) 6194 return (err); 6195 6196 return (Z_OK); 6197 } 6198 6199 int 6200 zonecfg_modify_ds( 6201 zone_dochandle_t handle, 6202 struct zone_dstab *oldtabptr, 6203 struct zone_dstab *newtabptr) 6204 { 6205 int err; 6206 6207 if (oldtabptr == NULL || newtabptr == NULL) 6208 return (Z_INVAL); 6209 6210 if ((err = operation_prep(handle)) != Z_OK) 6211 return (err); 6212 6213 if ((err = zonecfg_delete_ds_core(handle, oldtabptr)) != Z_OK) 6214 return (err); 6215 6216 if ((err = zonecfg_add_ds_core(handle, newtabptr)) != Z_OK) 6217 return (err); 6218 6219 return (Z_OK); 6220 } 6221 6222 int 6223 zonecfg_lookup_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 6224 { 6225 xmlNodePtr cur, firstmatch; 6226 int err; 6227 char dataset[MAXNAMELEN]; 6228 6229 if (tabptr == NULL) 6230 return (Z_INVAL); 6231 6232 if ((err = operation_prep(handle)) != Z_OK) 6233 return (err); 6234 6235 cur = handle->zone_dh_cur; 6236 firstmatch = NULL; 6237 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6238 if (xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 6239 continue; 6240 if (strlen(tabptr->zone_dataset_name) > 0) { 6241 if ((fetchprop(cur, DTD_ATTR_NAME, dataset, 6242 sizeof (dataset)) == Z_OK) && 6243 (strcmp(tabptr->zone_dataset_name, 6244 dataset) == 0)) { 6245 if (firstmatch == NULL) 6246 firstmatch = cur; 6247 else 6248 return (Z_INSUFFICIENT_SPEC); 6249 } 6250 } 6251 } 6252 if (firstmatch == NULL) 6253 return (Z_NO_RESOURCE_ID); 6254 6255 cur = firstmatch; 6256 6257 if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_dataset_name, 6258 sizeof (tabptr->zone_dataset_name))) != Z_OK) 6259 return (err); 6260 6261 return (Z_OK); 6262 } 6263 6264 int 6265 zonecfg_setdsent(zone_dochandle_t handle) 6266 { 6267 return (zonecfg_setent(handle)); 6268 } 6269 6270 int 6271 zonecfg_getdsent(zone_dochandle_t handle, struct zone_dstab *tabptr) 6272 { 6273 xmlNodePtr cur; 6274 int err; 6275 6276 if (handle == NULL) 6277 return (Z_INVAL); 6278 6279 if ((cur = handle->zone_dh_cur) == NULL) 6280 return (Z_NO_ENTRY); 6281 6282 for (; cur != NULL; cur = cur->next) 6283 if (!xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 6284 break; 6285 if (cur == NULL) { 6286 handle->zone_dh_cur = handle->zone_dh_top; 6287 return (Z_NO_ENTRY); 6288 } 6289 6290 if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_dataset_name, 6291 sizeof (tabptr->zone_dataset_name))) != Z_OK) { 6292 handle->zone_dh_cur = handle->zone_dh_top; 6293 return (err); 6294 } 6295 6296 handle->zone_dh_cur = cur->next; 6297 return (Z_OK); 6298 } 6299 6300 int 6301 zonecfg_enddsent(zone_dochandle_t handle) 6302 { 6303 return (zonecfg_endent(handle)); 6304 } 6305 6306 /* 6307 * Support for aliased rctls; that is, rctls that have simplified names in 6308 * zonecfg. For example, max-lwps is an alias for a well defined zone.max-lwps 6309 * rctl. If there are multiple existing values for one of these rctls or if 6310 * there is a single value that does not match the well defined template (i.e. 6311 * it has a different action) then we cannot treat the rctl as having an alias 6312 * so we return Z_ALIAS_DISALLOW. That means that the rctl cannot be 6313 * managed in zonecfg via an alias and that the standard rctl syntax must be 6314 * used. 6315 * 6316 * The possible return values are: 6317 * Z_NO_PROPERTY_ID - invalid alias name 6318 * Z_ALIAS_DISALLOW - pre-existing, incompatible rctl definition 6319 * Z_NO_ENTRY - no rctl is configured for this alias 6320 * Z_OK - we got a valid rctl for the specified alias 6321 */ 6322 int 6323 zonecfg_get_aliased_rctl(zone_dochandle_t handle, char *name, uint64_t *rval) 6324 { 6325 boolean_t found = B_FALSE; 6326 boolean_t found_val = B_FALSE; 6327 xmlNodePtr cur, val; 6328 char savedname[MAXNAMELEN]; 6329 struct zone_rctlvaltab rctl; 6330 int i; 6331 int err; 6332 6333 for (i = 0; aliases[i].shortname != NULL; i++) 6334 if (strcmp(name, aliases[i].shortname) == 0) 6335 break; 6336 6337 if (aliases[i].shortname == NULL) 6338 return (Z_NO_PROPERTY_ID); 6339 6340 if ((err = operation_prep(handle)) != Z_OK) 6341 return (err); 6342 6343 cur = handle->zone_dh_cur; 6344 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6345 if (xmlStrcmp(cur->name, DTD_ELEM_RCTL) != 0) 6346 continue; 6347 if ((fetchprop(cur, DTD_ATTR_NAME, savedname, 6348 sizeof (savedname)) == Z_OK) && 6349 (strcmp(savedname, aliases[i].realname) == 0)) { 6350 6351 /* 6352 * If we already saw one of these, we can't have an 6353 * alias since we just found another. 6354 */ 6355 if (found) 6356 return (Z_ALIAS_DISALLOW); 6357 found = B_TRUE; 6358 6359 for (val = cur->xmlChildrenNode; val != NULL; 6360 val = val->next) { 6361 /* 6362 * If we already have one value, we can't have 6363 * an alias since we just found another. 6364 */ 6365 if (found_val) 6366 return (Z_ALIAS_DISALLOW); 6367 found_val = B_TRUE; 6368 6369 if ((fetchprop(val, DTD_ATTR_PRIV, 6370 rctl.zone_rctlval_priv, 6371 sizeof (rctl.zone_rctlval_priv)) != Z_OK)) 6372 break; 6373 if ((fetchprop(val, DTD_ATTR_LIMIT, 6374 rctl.zone_rctlval_limit, 6375 sizeof (rctl.zone_rctlval_limit)) != Z_OK)) 6376 break; 6377 if ((fetchprop(val, DTD_ATTR_ACTION, 6378 rctl.zone_rctlval_action, 6379 sizeof (rctl.zone_rctlval_action)) != Z_OK)) 6380 break; 6381 } 6382 6383 /* check priv and action match the expected vals */ 6384 if (strcmp(rctl.zone_rctlval_priv, 6385 aliases[i].priv) != 0 || 6386 strcmp(rctl.zone_rctlval_action, 6387 aliases[i].action) != 0) 6388 return (Z_ALIAS_DISALLOW); 6389 } 6390 } 6391 6392 if (found) { 6393 *rval = strtoull(rctl.zone_rctlval_limit, NULL, 10); 6394 return (Z_OK); 6395 } 6396 6397 return (Z_NO_ENTRY); 6398 } 6399 6400 int 6401 zonecfg_rm_aliased_rctl(zone_dochandle_t handle, char *name) 6402 { 6403 int i; 6404 uint64_t val; 6405 struct zone_rctltab rctltab; 6406 6407 /* 6408 * First check that we have a valid aliased rctl to remove. 6409 * This will catch an rctl entry with non-standard values or 6410 * multiple rctl values for this name. We need to ignore those 6411 * rctl entries. 6412 */ 6413 if (zonecfg_get_aliased_rctl(handle, name, &val) != Z_OK) 6414 return (Z_OK); 6415 6416 for (i = 0; aliases[i].shortname != NULL; i++) 6417 if (strcmp(name, aliases[i].shortname) == 0) 6418 break; 6419 6420 if (aliases[i].shortname == NULL) 6421 return (Z_NO_RESOURCE_ID); 6422 6423 (void) strlcpy(rctltab.zone_rctl_name, aliases[i].realname, 6424 sizeof (rctltab.zone_rctl_name)); 6425 6426 return (zonecfg_delete_rctl(handle, &rctltab)); 6427 } 6428 6429 boolean_t 6430 zonecfg_aliased_rctl_ok(zone_dochandle_t handle, char *name) 6431 { 6432 uint64_t tmp_val; 6433 6434 switch (zonecfg_get_aliased_rctl(handle, name, &tmp_val)) { 6435 case Z_OK: 6436 /*FALLTHRU*/ 6437 case Z_NO_ENTRY: 6438 return (B_TRUE); 6439 default: 6440 return (B_FALSE); 6441 } 6442 } 6443 6444 int 6445 zonecfg_set_aliased_rctl(zone_dochandle_t handle, char *name, uint64_t val) 6446 { 6447 int i; 6448 int err; 6449 struct zone_rctltab rctltab; 6450 struct zone_rctlvaltab *rctlvaltab; 6451 char buf[128]; 6452 6453 if (!zonecfg_aliased_rctl_ok(handle, name)) 6454 return (Z_ALIAS_DISALLOW); 6455 6456 for (i = 0; aliases[i].shortname != NULL; i++) 6457 if (strcmp(name, aliases[i].shortname) == 0) 6458 break; 6459 6460 if (aliases[i].shortname == NULL) 6461 return (Z_NO_RESOURCE_ID); 6462 6463 /* remove any pre-existing definition for this rctl */ 6464 (void) zonecfg_rm_aliased_rctl(handle, name); 6465 6466 (void) strlcpy(rctltab.zone_rctl_name, aliases[i].realname, 6467 sizeof (rctltab.zone_rctl_name)); 6468 6469 rctltab.zone_rctl_valptr = NULL; 6470 6471 if ((rctlvaltab = calloc(1, sizeof (struct zone_rctlvaltab))) == NULL) 6472 return (Z_NOMEM); 6473 6474 (void) snprintf(buf, sizeof (buf), "%llu", (long long)val); 6475 6476 (void) strlcpy(rctlvaltab->zone_rctlval_priv, aliases[i].priv, 6477 sizeof (rctlvaltab->zone_rctlval_priv)); 6478 (void) strlcpy(rctlvaltab->zone_rctlval_limit, buf, 6479 sizeof (rctlvaltab->zone_rctlval_limit)); 6480 (void) strlcpy(rctlvaltab->zone_rctlval_action, aliases[i].action, 6481 sizeof (rctlvaltab->zone_rctlval_action)); 6482 6483 rctlvaltab->zone_rctlval_next = NULL; 6484 6485 if ((err = zonecfg_add_rctl_value(&rctltab, rctlvaltab)) != Z_OK) 6486 return (err); 6487 6488 return (zonecfg_add_rctl(handle, &rctltab)); 6489 } 6490 6491 static int 6492 delete_tmp_pool(zone_dochandle_t handle) 6493 { 6494 int err; 6495 xmlNodePtr cur = handle->zone_dh_cur; 6496 6497 if ((err = operation_prep(handle)) != Z_OK) 6498 return (err); 6499 6500 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6501 if (xmlStrcmp(cur->name, DTD_ELEM_TMPPOOL) == 0) { 6502 xmlUnlinkNode(cur); 6503 xmlFreeNode(cur); 6504 return (Z_OK); 6505 } 6506 } 6507 6508 return (Z_NO_RESOURCE_ID); 6509 } 6510 6511 static int 6512 modify_tmp_pool(zone_dochandle_t handle, char *pool_importance) 6513 { 6514 int err; 6515 xmlNodePtr cur = handle->zone_dh_cur; 6516 xmlNodePtr newnode; 6517 6518 err = delete_tmp_pool(handle); 6519 if (err != Z_OK && err != Z_NO_RESOURCE_ID) 6520 return (err); 6521 6522 if (*pool_importance != '\0') { 6523 if ((err = operation_prep(handle)) != Z_OK) 6524 return (err); 6525 6526 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_TMPPOOL, NULL); 6527 if ((err = newprop(newnode, DTD_ATTR_IMPORTANCE, 6528 pool_importance)) != Z_OK) 6529 return (err); 6530 } 6531 6532 return (Z_OK); 6533 } 6534 6535 static int 6536 add_pset_core(zone_dochandle_t handle, struct zone_psettab *tabptr) 6537 { 6538 xmlNodePtr newnode, cur = handle->zone_dh_cur; 6539 int err; 6540 6541 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_PSET, NULL); 6542 if ((err = newprop(newnode, DTD_ATTR_NCPU_MIN, 6543 tabptr->zone_ncpu_min)) != Z_OK) 6544 return (err); 6545 if ((err = newprop(newnode, DTD_ATTR_NCPU_MAX, 6546 tabptr->zone_ncpu_max)) != Z_OK) 6547 return (err); 6548 6549 if ((err = modify_tmp_pool(handle, tabptr->zone_importance)) != Z_OK) 6550 return (err); 6551 6552 return (Z_OK); 6553 } 6554 6555 int 6556 zonecfg_add_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 6557 { 6558 int err; 6559 6560 if (tabptr == NULL) 6561 return (Z_INVAL); 6562 6563 if ((err = operation_prep(handle)) != Z_OK) 6564 return (err); 6565 6566 if ((err = add_pset_core(handle, tabptr)) != Z_OK) 6567 return (err); 6568 6569 return (Z_OK); 6570 } 6571 6572 int 6573 zonecfg_delete_pset(zone_dochandle_t handle) 6574 { 6575 int err; 6576 int res = Z_NO_RESOURCE_ID; 6577 xmlNodePtr cur = handle->zone_dh_cur; 6578 6579 if ((err = operation_prep(handle)) != Z_OK) 6580 return (err); 6581 6582 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6583 if (xmlStrcmp(cur->name, DTD_ELEM_PSET) == 0) { 6584 xmlUnlinkNode(cur); 6585 xmlFreeNode(cur); 6586 res = Z_OK; 6587 break; 6588 } 6589 } 6590 6591 /* 6592 * Once we have msets, we should check that a mset 6593 * do not exist before we delete the tmp_pool data. 6594 */ 6595 err = delete_tmp_pool(handle); 6596 if (err != Z_OK && err != Z_NO_RESOURCE_ID) 6597 return (err); 6598 6599 return (res); 6600 } 6601 6602 int 6603 zonecfg_modify_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 6604 { 6605 int err; 6606 6607 if (tabptr == NULL) 6608 return (Z_INVAL); 6609 6610 if ((err = zonecfg_delete_pset(handle)) != Z_OK) 6611 return (err); 6612 6613 if ((err = add_pset_core(handle, tabptr)) != Z_OK) 6614 return (err); 6615 6616 return (Z_OK); 6617 } 6618 6619 int 6620 zonecfg_lookup_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 6621 { 6622 xmlNodePtr cur; 6623 int err; 6624 int res = Z_NO_ENTRY; 6625 6626 if (tabptr == NULL) 6627 return (Z_INVAL); 6628 6629 if ((err = operation_prep(handle)) != Z_OK) 6630 return (err); 6631 6632 /* this is an optional component */ 6633 tabptr->zone_importance[0] = '\0'; 6634 6635 cur = handle->zone_dh_cur; 6636 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6637 if (xmlStrcmp(cur->name, DTD_ELEM_PSET) == 0) { 6638 if ((err = fetchprop(cur, DTD_ATTR_NCPU_MIN, 6639 tabptr->zone_ncpu_min, 6640 sizeof (tabptr->zone_ncpu_min))) != Z_OK) { 6641 handle->zone_dh_cur = handle->zone_dh_top; 6642 return (err); 6643 } 6644 6645 if ((err = fetchprop(cur, DTD_ATTR_NCPU_MAX, 6646 tabptr->zone_ncpu_max, 6647 sizeof (tabptr->zone_ncpu_max))) != Z_OK) { 6648 handle->zone_dh_cur = handle->zone_dh_top; 6649 return (err); 6650 } 6651 6652 res = Z_OK; 6653 6654 } else if (xmlStrcmp(cur->name, DTD_ELEM_TMPPOOL) == 0) { 6655 if ((err = fetchprop(cur, DTD_ATTR_IMPORTANCE, 6656 tabptr->zone_importance, 6657 sizeof (tabptr->zone_importance))) != Z_OK) { 6658 handle->zone_dh_cur = handle->zone_dh_top; 6659 return (err); 6660 } 6661 } 6662 } 6663 6664 return (res); 6665 } 6666 6667 int 6668 zonecfg_getpsetent(zone_dochandle_t handle, struct zone_psettab *tabptr) 6669 { 6670 int err; 6671 6672 if ((err = zonecfg_setent(handle)) != Z_OK) 6673 return (err); 6674 6675 err = zonecfg_lookup_pset(handle, tabptr); 6676 6677 (void) zonecfg_endent(handle); 6678 6679 return (err); 6680 } 6681 6682 static int 6683 add_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 6684 { 6685 xmlNodePtr newnode, cur = handle->zone_dh_cur; 6686 int err; 6687 6688 newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_MCAP, NULL); 6689 if ((err = newprop(newnode, DTD_ATTR_PHYSCAP, tabptr->zone_physmem_cap)) 6690 != Z_OK) 6691 return (err); 6692 6693 return (Z_OK); 6694 } 6695 6696 int 6697 zonecfg_delete_mcap(zone_dochandle_t handle) 6698 { 6699 int err; 6700 xmlNodePtr cur = handle->zone_dh_cur; 6701 6702 if ((err = operation_prep(handle)) != Z_OK) 6703 return (err); 6704 6705 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6706 if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) != 0) 6707 continue; 6708 6709 xmlUnlinkNode(cur); 6710 xmlFreeNode(cur); 6711 return (Z_OK); 6712 } 6713 return (Z_NO_RESOURCE_ID); 6714 } 6715 6716 int 6717 zonecfg_modify_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 6718 { 6719 int err; 6720 6721 if (tabptr == NULL) 6722 return (Z_INVAL); 6723 6724 err = zonecfg_delete_mcap(handle); 6725 /* it is ok if there is no mcap entry */ 6726 if (err != Z_OK && err != Z_NO_RESOURCE_ID) 6727 return (err); 6728 6729 if ((err = add_mcap(handle, tabptr)) != Z_OK) 6730 return (err); 6731 6732 return (Z_OK); 6733 } 6734 6735 int 6736 zonecfg_lookup_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 6737 { 6738 xmlNodePtr cur; 6739 int err; 6740 6741 if (tabptr == NULL) 6742 return (Z_INVAL); 6743 6744 if ((err = operation_prep(handle)) != Z_OK) 6745 return (err); 6746 6747 cur = handle->zone_dh_cur; 6748 for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6749 if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) != 0) 6750 continue; 6751 if ((err = fetchprop(cur, DTD_ATTR_PHYSCAP, 6752 tabptr->zone_physmem_cap, 6753 sizeof (tabptr->zone_physmem_cap))) != Z_OK) { 6754 handle->zone_dh_cur = handle->zone_dh_top; 6755 return (err); 6756 } 6757 6758 return (Z_OK); 6759 } 6760 6761 return (Z_NO_ENTRY); 6762 } 6763 6764 static int 6765 getmcapent_core(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 6766 { 6767 xmlNodePtr cur; 6768 int err; 6769 6770 if (handle == NULL) 6771 return (Z_INVAL); 6772 6773 if ((cur = handle->zone_dh_cur) == NULL) 6774 return (Z_NO_ENTRY); 6775 6776 for (; cur != NULL; cur = cur->next) 6777 if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) == 0) 6778 break; 6779 if (cur == NULL) { 6780 handle->zone_dh_cur = handle->zone_dh_top; 6781 return (Z_NO_ENTRY); 6782 } 6783 6784 if ((err = fetchprop(cur, DTD_ATTR_PHYSCAP, tabptr->zone_physmem_cap, 6785 sizeof (tabptr->zone_physmem_cap))) != Z_OK) { 6786 handle->zone_dh_cur = handle->zone_dh_top; 6787 return (err); 6788 } 6789 6790 handle->zone_dh_cur = cur->next; 6791 return (Z_OK); 6792 } 6793 6794 int 6795 zonecfg_getmcapent(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 6796 { 6797 int err; 6798 6799 if ((err = zonecfg_setent(handle)) != Z_OK) 6800 return (err); 6801 6802 err = getmcapent_core(handle, tabptr); 6803 6804 (void) zonecfg_endent(handle); 6805 6806 return (err); 6807 } 6808 6809 /* 6810 * Get the full tree of pkg/patch metadata in a set of nested AVL trees. 6811 * pkgs_avl is an AVL tree of pkgs. Each pkg element contains a 6812 * zpe_patches_avl member which holds an AVL tree of patches for that pkg. 6813 * The patch elements have the same zpe_patches_avl member, each of which can 6814 * hold an AVL tree of patches that are obsoleted by the patch. 6815 * 6816 * The zone xml data contains DTD_ELEM_PACKAGE elements, followed by 6817 * DTD_ELEM_PATCH elements. The DTD_ELEM_PATCH patch element applies to the 6818 * DTD_ELEM_PACKAGE that precedes it. The DTD_ELEM_PATCH element may have 6819 * child DTD_ELEM_OBSOLETES nodes associated with it. The DTD_ELEM_PACKAGE 6820 * really should have had the DTD_ELEM_PATCH elements as children but it 6821 * was not defined that way initially so we are stuck with the DTD definition 6822 * now. However, we can safely assume the ordering for compatibility. 6823 */ 6824 int 6825 zonecfg_getpkgdata(zone_dochandle_t handle, uu_avl_pool_t *pkg_pool, 6826 uu_avl_t *pkgs_avl) 6827 { 6828 xmlNodePtr cur; 6829 int res; 6830 zone_pkg_entry_t *pkg; 6831 char name[MAXNAMELEN]; 6832 char version[ZONE_PKG_VERSMAX]; 6833 6834 if (handle == NULL) 6835 return (Z_INVAL); 6836 6837 if ((res = zonecfg_setent(handle)) != Z_OK) 6838 return (res); 6839 6840 if ((cur = handle->zone_dh_cur) == NULL) { 6841 res = Z_NO_ENTRY; 6842 goto done; 6843 } 6844 6845 for (; cur != NULL; cur = cur->next) { 6846 if (xmlStrcmp(cur->name, DTD_ELEM_PACKAGE) == 0) { 6847 uu_avl_index_t where; 6848 6849 if ((res = fetchprop(cur, DTD_ATTR_NAME, name, 6850 sizeof (name))) != Z_OK) 6851 goto done; 6852 6853 if ((res = fetchprop(cur, DTD_ATTR_VERSION, version, 6854 sizeof (version))) != Z_OK) 6855 goto done; 6856 6857 if ((pkg = (zone_pkg_entry_t *) 6858 malloc(sizeof (zone_pkg_entry_t))) == NULL) { 6859 res = Z_NOMEM; 6860 goto done; 6861 } 6862 6863 if ((pkg->zpe_name = strdup(name)) == NULL) { 6864 free(pkg); 6865 res = Z_NOMEM; 6866 goto done; 6867 } 6868 6869 if ((pkg->zpe_vers = strdup(version)) == NULL) { 6870 free(pkg->zpe_name); 6871 free(pkg); 6872 res = Z_NOMEM; 6873 goto done; 6874 } 6875 6876 pkg->zpe_patches_avl = NULL; 6877 6878 uu_avl_node_init(pkg, &pkg->zpe_entry, pkg_pool); 6879 if (uu_avl_find(pkgs_avl, pkg, NULL, &where) != NULL) { 6880 free(pkg->zpe_name); 6881 free(pkg->zpe_vers); 6882 free(pkg); 6883 } else { 6884 uu_avl_insert(pkgs_avl, pkg, where); 6885 } 6886 6887 } else if (xmlStrcmp(cur->name, DTD_ELEM_PATCH) == 0) { 6888 zone_pkg_entry_t *patch; 6889 uu_avl_index_t where; 6890 char *p; 6891 char *dashp = NULL; 6892 xmlNodePtr child; 6893 6894 if ((res = fetchprop(cur, DTD_ATTR_ID, name, 6895 sizeof (name))) != Z_OK) 6896 goto done; 6897 6898 if ((patch = (zone_pkg_entry_t *) 6899 malloc(sizeof (zone_pkg_entry_t))) == NULL) { 6900 res = Z_NOMEM; 6901 goto done; 6902 } 6903 6904 if ((p = strchr(name, '-')) != NULL) { 6905 dashp = p; 6906 *p++ = '\0'; 6907 } else { 6908 p = ""; 6909 } 6910 6911 if ((patch->zpe_name = strdup(name)) == NULL) { 6912 free(patch); 6913 res = Z_NOMEM; 6914 goto done; 6915 } 6916 6917 if ((patch->zpe_vers = strdup(p)) == NULL) { 6918 free(patch->zpe_name); 6919 free(patch); 6920 res = Z_NOMEM; 6921 goto done; 6922 } 6923 6924 if (dashp != NULL) 6925 *dashp = '-'; 6926 6927 patch->zpe_patches_avl = NULL; 6928 6929 if (pkg->zpe_patches_avl == NULL) { 6930 pkg->zpe_patches_avl = uu_avl_create(pkg_pool, 6931 NULL, UU_DEFAULT); 6932 if (pkg->zpe_patches_avl == NULL) { 6933 free(patch->zpe_name); 6934 free(patch->zpe_vers); 6935 free(patch); 6936 res = Z_NOMEM; 6937 goto done; 6938 } 6939 } 6940 6941 uu_avl_node_init(patch, &patch->zpe_entry, pkg_pool); 6942 if (uu_avl_find(pkg->zpe_patches_avl, patch, NULL, 6943 &where) != NULL) { 6944 free(patch->zpe_name); 6945 free(patch->zpe_vers); 6946 free(patch); 6947 } else { 6948 uu_avl_insert(pkg->zpe_patches_avl, patch, 6949 where); 6950 } 6951 6952 /* Add any patches this patch obsoletes. */ 6953 for (child = cur->xmlChildrenNode; child != NULL; 6954 child = child->next) { 6955 zone_pkg_entry_t *obs; 6956 6957 if (xmlStrcmp(child->name, DTD_ELEM_OBSOLETES) 6958 != 0) 6959 continue; 6960 6961 if ((res = fetchprop(child, DTD_ATTR_ID, 6962 name, sizeof (name))) != Z_OK) 6963 goto done; 6964 6965 if ((obs = (zone_pkg_entry_t *)malloc( 6966 sizeof (zone_pkg_entry_t))) == NULL) { 6967 res = Z_NOMEM; 6968 goto done; 6969 } 6970 6971 if ((obs->zpe_name = strdup(name)) == NULL) { 6972 free(obs); 6973 res = Z_NOMEM; 6974 goto done; 6975 } 6976 /* 6977 * The version doesn't matter for obsoleted 6978 * patches. 6979 */ 6980 obs->zpe_vers = NULL; 6981 obs->zpe_patches_avl = NULL; 6982 6983 /* 6984 * If this is the first obsolete patch, add an 6985 * AVL tree to the parent patch element. 6986 */ 6987 if (patch->zpe_patches_avl == NULL) { 6988 patch->zpe_patches_avl = 6989 uu_avl_create(pkg_pool, NULL, 6990 UU_DEFAULT); 6991 if (patch->zpe_patches_avl == NULL) { 6992 free(obs->zpe_name); 6993 free(obs); 6994 res = Z_NOMEM; 6995 goto done; 6996 } 6997 } 6998 6999 /* Insert obsolete patch into the AVL tree. */ 7000 uu_avl_node_init(obs, &obs->zpe_entry, 7001 pkg_pool); 7002 if (uu_avl_find(patch->zpe_patches_avl, obs, 7003 NULL, &where) != NULL) { 7004 free(obs->zpe_name); 7005 free(obs); 7006 } else { 7007 uu_avl_insert(patch->zpe_patches_avl, 7008 obs, where); 7009 } 7010 } 7011 } 7012 } 7013 7014 done: 7015 (void) zonecfg_endent(handle); 7016 return (res); 7017 } 7018 7019 int 7020 zonecfg_setdevperment(zone_dochandle_t handle) 7021 { 7022 return (zonecfg_setent(handle)); 7023 } 7024 7025 int 7026 zonecfg_getdevperment(zone_dochandle_t handle, struct zone_devpermtab *tabptr) 7027 { 7028 xmlNodePtr cur; 7029 int err; 7030 char buf[128]; 7031 7032 tabptr->zone_devperm_acl = NULL; 7033 7034 if (handle == NULL) 7035 return (Z_INVAL); 7036 7037 if ((cur = handle->zone_dh_cur) == NULL) 7038 return (Z_NO_ENTRY); 7039 7040 for (; cur != NULL; cur = cur->next) 7041 if (!xmlStrcmp(cur->name, DTD_ELEM_DEV_PERM)) 7042 break; 7043 if (cur == NULL) { 7044 handle->zone_dh_cur = handle->zone_dh_top; 7045 return (Z_NO_ENTRY); 7046 } 7047 7048 if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_devperm_name, 7049 sizeof (tabptr->zone_devperm_name))) != Z_OK) { 7050 handle->zone_dh_cur = handle->zone_dh_top; 7051 return (err); 7052 } 7053 7054 if ((err = fetchprop(cur, DTD_ATTR_UID, buf, sizeof (buf))) != Z_OK) { 7055 handle->zone_dh_cur = handle->zone_dh_top; 7056 return (err); 7057 } 7058 tabptr->zone_devperm_uid = (uid_t)atol(buf); 7059 7060 if ((err = fetchprop(cur, DTD_ATTR_GID, buf, sizeof (buf))) != Z_OK) { 7061 handle->zone_dh_cur = handle->zone_dh_top; 7062 return (err); 7063 } 7064 tabptr->zone_devperm_gid = (gid_t)atol(buf); 7065 7066 if ((err = fetchprop(cur, DTD_ATTR_MODE, buf, sizeof (buf))) != Z_OK) { 7067 handle->zone_dh_cur = handle->zone_dh_top; 7068 return (err); 7069 } 7070 tabptr->zone_devperm_mode = (mode_t)strtol(buf, (char **)NULL, 8); 7071 7072 if ((err = fetch_alloc_prop(cur, DTD_ATTR_ACL, 7073 &(tabptr->zone_devperm_acl))) != Z_OK) { 7074 handle->zone_dh_cur = handle->zone_dh_top; 7075 return (err); 7076 } 7077 7078 handle->zone_dh_cur = cur->next; 7079 return (Z_OK); 7080 } 7081 7082 int 7083 zonecfg_enddevperment(zone_dochandle_t handle) 7084 { 7085 return (zonecfg_endent(handle)); 7086 } 7087 7088 /* PRINTFLIKE1 */ 7089 static void 7090 zerror(const char *zone_name, const char *fmt, ...) 7091 { 7092 va_list alist; 7093 7094 va_start(alist, fmt); 7095 (void) fprintf(stderr, "zone '%s': ", zone_name); 7096 (void) vfprintf(stderr, fmt, alist); 7097 (void) fprintf(stderr, "\n"); 7098 va_end(alist); 7099 } 7100 7101 static void 7102 zperror(const char *str) 7103 { 7104 (void) fprintf(stderr, "%s: %s\n", str, strerror(errno)); 7105 } 7106 7107 /* 7108 * The following three routines implement a simple locking mechanism to 7109 * ensure that only one instance of zoneadm at a time is able to manipulate 7110 * a given zone. The lock is built on top of an fcntl(2) lock of 7111 * [<altroot>]/var/run/zones/<zonename>.zoneadm.lock. If a zoneadm instance 7112 * can grab that lock, it is allowed to manipulate the zone. 7113 * 7114 * Since zoneadm may call external applications which in turn invoke 7115 * zoneadm again, we introduce the notion of "lock inheritance". Any 7116 * instance of zoneadm that has another instance in its ancestry is assumed 7117 * to be acting on behalf of the original zoneadm, and is thus allowed to 7118 * manipulate its zone. 7119 * 7120 * This inheritance is implemented via the _ZONEADM_LOCK_HELD environment 7121 * variable. When zoneadm is granted a lock on its zone, this environment 7122 * variable is set to 1. When it releases the lock, the variable is set to 7123 * 0. Since a child process inherits its parent's environment, checking 7124 * the state of this variable indicates whether or not any ancestor owns 7125 * the lock. 7126 */ 7127 void 7128 zonecfg_init_lock_file(const char *zone_name, char **lock_env) 7129 { 7130 *lock_env = getenv(LOCK_ENV_VAR); 7131 if (*lock_env == NULL) { 7132 if (putenv(zoneadm_lock_not_held) != 0) { 7133 zerror(zone_name, gettext("could not set env: %s"), 7134 strerror(errno)); 7135 exit(1); 7136 } 7137 } else { 7138 if (atoi(*lock_env) == 1) 7139 zone_lock_cnt = 1; 7140 } 7141 } 7142 7143 void 7144 zonecfg_release_lock_file(const char *zone_name, int lockfd) 7145 { 7146 /* 7147 * If we are cleaning up from a failed attempt to lock the zone for 7148 * the first time, we might have a zone_lock_cnt of 0. In that 7149 * error case, we don't want to do anything but close the lock 7150 * file. 7151 */ 7152 assert(zone_lock_cnt >= 0); 7153 if (zone_lock_cnt > 0) { 7154 assert(getenv(LOCK_ENV_VAR) != NULL); 7155 assert(atoi(getenv(LOCK_ENV_VAR)) == 1); 7156 if (--zone_lock_cnt > 0) { 7157 assert(lockfd == -1); 7158 return; 7159 } 7160 if (putenv(zoneadm_lock_not_held) != 0) { 7161 zerror(zone_name, gettext("could not set env: %s"), 7162 strerror(errno)); 7163 exit(1); 7164 } 7165 } 7166 assert(lockfd >= 0); 7167 (void) close(lockfd); 7168 } 7169 7170 int 7171 zonecfg_grab_lock_file(const char *zone_name, int *lockfd) 7172 { 7173 char pathbuf[PATH_MAX]; 7174 struct flock flock; 7175 7176 /* 7177 * If we already have the lock, we can skip this expensive song 7178 * and dance. 7179 */ 7180 assert(zone_lock_cnt >= 0); 7181 assert(getenv(LOCK_ENV_VAR) != NULL); 7182 if (zone_lock_cnt > 0) { 7183 assert(atoi(getenv(LOCK_ENV_VAR)) == 1); 7184 zone_lock_cnt++; 7185 *lockfd = -1; 7186 return (Z_OK); 7187 } 7188 assert(getenv(LOCK_ENV_VAR) != NULL); 7189 assert(atoi(getenv(LOCK_ENV_VAR)) == 0); 7190 7191 if (snprintf(pathbuf, sizeof (pathbuf), "%s%s", zonecfg_get_root(), 7192 ZONES_TMPDIR) >= sizeof (pathbuf)) { 7193 zerror(zone_name, gettext("alternate root path is too long")); 7194 return (-1); 7195 } 7196 if (mkdir(pathbuf, S_IRWXU) < 0 && errno != EEXIST) { 7197 zerror(zone_name, gettext("could not mkdir %s: %s"), pathbuf, 7198 strerror(errno)); 7199 return (-1); 7200 } 7201 (void) chmod(pathbuf, S_IRWXU); 7202 7203 /* 7204 * One of these lock files is created for each zone (when needed). 7205 * The lock files are not cleaned up (except on system reboot), 7206 * but since there is only one per zone, there is no resource 7207 * starvation issue. 7208 */ 7209 if (snprintf(pathbuf, sizeof (pathbuf), "%s%s/%s.zoneadm.lock", 7210 zonecfg_get_root(), ZONES_TMPDIR, zone_name) >= sizeof (pathbuf)) { 7211 zerror(zone_name, gettext("alternate root path is too long")); 7212 return (-1); 7213 } 7214 if ((*lockfd = open(pathbuf, O_RDWR|O_CREAT, S_IRUSR|S_IWUSR)) < 0) { 7215 zerror(zone_name, gettext("could not open %s: %s"), pathbuf, 7216 strerror(errno)); 7217 return (-1); 7218 } 7219 /* 7220 * Lock the file to synchronize with other zoneadmds 7221 */ 7222 flock.l_type = F_WRLCK; 7223 flock.l_whence = SEEK_SET; 7224 flock.l_start = (off_t)0; 7225 flock.l_len = (off_t)0; 7226 if ((fcntl(*lockfd, F_SETLKW, &flock) < 0) || 7227 (putenv(zoneadm_lock_held) != 0)) { 7228 zerror(zone_name, gettext("unable to lock %s: %s"), pathbuf, 7229 strerror(errno)); 7230 zonecfg_release_lock_file(zone_name, *lockfd); 7231 return (-1); 7232 } 7233 zone_lock_cnt = 1; 7234 return (Z_OK); 7235 } 7236 7237 boolean_t 7238 zonecfg_lock_file_held(int *lockfd) 7239 { 7240 if (*lockfd >= 0 || zone_lock_cnt > 0) 7241 return (B_TRUE); 7242 return (B_FALSE); 7243 } 7244 7245 static boolean_t 7246 get_doorname(const char *zone_name, char *buffer) 7247 { 7248 return (snprintf(buffer, PATH_MAX, "%s" ZONE_DOOR_PATH, 7249 zonecfg_get_root(), zone_name) < PATH_MAX); 7250 } 7251 7252 /* 7253 * system daemons are not audited. For the global zone, this occurs 7254 * "naturally" since init is started with the default audit 7255 * characteristics. Since zoneadmd is a system daemon and it starts 7256 * init for a zone, it is necessary to clear out the audit 7257 * characteristics inherited from whomever started zoneadmd. This is 7258 * indicated by the audit id, which is set from the ruid parameter of 7259 * adt_set_user(), below. 7260 */ 7261 7262 static void 7263 prepare_audit_context(const char *zone_name) 7264 { 7265 adt_session_data_t *ah; 7266 char *failure = gettext("audit failure: %s"); 7267 7268 if (adt_start_session(&ah, NULL, 0)) { 7269 zerror(zone_name, failure, strerror(errno)); 7270 return; 7271 } 7272 if (adt_set_user(ah, ADT_NO_AUDIT, ADT_NO_AUDIT, 7273 ADT_NO_AUDIT, ADT_NO_AUDIT, NULL, ADT_NEW)) { 7274 zerror(zone_name, failure, strerror(errno)); 7275 (void) adt_end_session(ah); 7276 return; 7277 } 7278 if (adt_set_proc(ah)) 7279 zerror(zone_name, failure, strerror(errno)); 7280 7281 (void) adt_end_session(ah); 7282 } 7283 7284 static int 7285 start_zoneadmd(const char *zone_name, boolean_t lock) 7286 { 7287 char doorpath[PATH_MAX]; 7288 pid_t child_pid; 7289 int error = -1; 7290 int doorfd, lockfd; 7291 struct door_info info; 7292 7293 if (!get_doorname(zone_name, doorpath)) 7294 return (-1); 7295 7296 if (lock) 7297 if (zonecfg_grab_lock_file(zone_name, &lockfd) != Z_OK) 7298 return (-1); 7299 7300 /* 7301 * Now that we have the lock, re-confirm that the daemon is 7302 * *not* up and working fine. If it is still down, we have a green 7303 * light to start it. 7304 */ 7305 if ((doorfd = open(doorpath, O_RDONLY)) < 0) { 7306 if (errno != ENOENT) { 7307 zperror(doorpath); 7308 goto out; 7309 } 7310 } else { 7311 if (door_info(doorfd, &info) == 0 && 7312 ((info.di_attributes & DOOR_REVOKED) == 0)) { 7313 error = Z_OK; 7314 (void) close(doorfd); 7315 goto out; 7316 } 7317 (void) close(doorfd); 7318 } 7319 7320 if ((child_pid = fork()) == -1) { 7321 zperror(gettext("could not fork")); 7322 goto out; 7323 } 7324 7325 if (child_pid == 0) { 7326 const char *argv[6], **ap; 7327 7328 /* child process */ 7329 prepare_audit_context(zone_name); 7330 7331 ap = argv; 7332 *ap++ = "zoneadmd"; 7333 *ap++ = "-z"; 7334 *ap++ = zone_name; 7335 if (zonecfg_in_alt_root()) { 7336 *ap++ = "-R"; 7337 *ap++ = zonecfg_get_root(); 7338 } 7339 *ap = NULL; 7340 7341 (void) execv("/usr/lib/zones/zoneadmd", (char * const *)argv); 7342 /* 7343 * TRANSLATION_NOTE 7344 * zoneadmd is a literal that should not be translated. 7345 */ 7346 zperror(gettext("could not exec zoneadmd")); 7347 _exit(1); 7348 } else { 7349 /* parent process */ 7350 pid_t retval; 7351 int pstatus = 0; 7352 7353 do { 7354 retval = waitpid(child_pid, &pstatus, 0); 7355 } while (retval != child_pid); 7356 if (WIFSIGNALED(pstatus) || (WIFEXITED(pstatus) && 7357 WEXITSTATUS(pstatus) != 0)) { 7358 zerror(zone_name, gettext("could not start %s"), 7359 "zoneadmd"); 7360 goto out; 7361 } 7362 } 7363 error = Z_OK; 7364 out: 7365 if (lock) 7366 zonecfg_release_lock_file(zone_name, lockfd); 7367 return (error); 7368 } 7369 7370 int 7371 zonecfg_ping_zoneadmd(const char *zone_name) 7372 { 7373 char doorpath[PATH_MAX]; 7374 int doorfd; 7375 struct door_info info; 7376 7377 if (!get_doorname(zone_name, doorpath)) 7378 return (-1); 7379 7380 if ((doorfd = open(doorpath, O_RDONLY)) < 0) { 7381 return (-1); 7382 } 7383 if (door_info(doorfd, &info) == 0 && 7384 ((info.di_attributes & DOOR_REVOKED) == 0)) { 7385 (void) close(doorfd); 7386 return (Z_OK); 7387 } 7388 (void) close(doorfd); 7389 return (-1); 7390 } 7391 7392 int 7393 zonecfg_call_zoneadmd(const char *zone_name, zone_cmd_arg_t *arg, char *locale, 7394 boolean_t lock) 7395 { 7396 char doorpath[PATH_MAX]; 7397 int doorfd, result; 7398 door_arg_t darg; 7399 7400 zoneid_t zoneid; 7401 uint64_t uniqid = 0; 7402 7403 zone_cmd_rval_t *rvalp; 7404 size_t rlen; 7405 char *cp, *errbuf; 7406 7407 rlen = getpagesize(); 7408 if ((rvalp = malloc(rlen)) == NULL) { 7409 zerror(zone_name, gettext("failed to allocate %lu bytes: %s"), 7410 rlen, strerror(errno)); 7411 return (-1); 7412 } 7413 7414 if ((zoneid = getzoneidbyname(zone_name)) != ZONE_ID_UNDEFINED) { 7415 (void) zone_getattr(zoneid, ZONE_ATTR_UNIQID, &uniqid, 7416 sizeof (uniqid)); 7417 } 7418 arg->uniqid = uniqid; 7419 (void) strlcpy(arg->locale, locale, sizeof (arg->locale)); 7420 if (!get_doorname(zone_name, doorpath)) { 7421 zerror(zone_name, gettext("alternate root path is too long")); 7422 free(rvalp); 7423 return (-1); 7424 } 7425 7426 /* 7427 * Loop trying to start zoneadmd; if something goes seriously 7428 * wrong we break out and fail. 7429 */ 7430 for (;;) { 7431 if (start_zoneadmd(zone_name, lock) != Z_OK) 7432 break; 7433 7434 if ((doorfd = open(doorpath, O_RDONLY)) < 0) { 7435 zperror(gettext("failed to open zone door")); 7436 break; 7437 } 7438 7439 darg.data_ptr = (char *)arg; 7440 darg.data_size = sizeof (*arg); 7441 darg.desc_ptr = NULL; 7442 darg.desc_num = 0; 7443 darg.rbuf = (char *)rvalp; 7444 darg.rsize = rlen; 7445 if (door_call(doorfd, &darg) != 0) { 7446 (void) close(doorfd); 7447 /* 7448 * We'll get EBADF if the door has been revoked. 7449 */ 7450 if (errno != EBADF) { 7451 zperror(gettext("door_call failed")); 7452 break; 7453 } 7454 continue; /* take another lap */ 7455 } 7456 (void) close(doorfd); 7457 7458 if (darg.data_size == 0) { 7459 /* Door server is going away; kick it again. */ 7460 continue; 7461 } 7462 7463 errbuf = rvalp->errbuf; 7464 while (*errbuf != '\0') { 7465 /* 7466 * Remove any newlines since zerror() 7467 * will append one automatically. 7468 */ 7469 cp = strchr(errbuf, '\n'); 7470 if (cp != NULL) 7471 *cp = '\0'; 7472 zerror(zone_name, "%s", errbuf); 7473 if (cp == NULL) 7474 break; 7475 errbuf = cp + 1; 7476 } 7477 result = rvalp->rval == 0 ? 0 : -1; 7478 free(rvalp); 7479 return (result); 7480 } 7481 7482 free(rvalp); 7483 return (-1); 7484 } 7485