17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5ee519a1fSgjelinek * Common Development and Distribution License (the "License"). 6ee519a1fSgjelinek * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 21ffbafc53Scomay 227c478bd9Sstevel@tonic-gate /* 23a20ee416SGlenn Faden * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 247c478bd9Sstevel@tonic-gate */ 257c478bd9Sstevel@tonic-gate 26cf8f45c7Sdstaff #include <libsysevent.h> 27cf8f45c7Sdstaff #include <pthread.h> 28cf8f45c7Sdstaff #include <stdlib.h> 297c478bd9Sstevel@tonic-gate #include <errno.h> 307c478bd9Sstevel@tonic-gate #include <fnmatch.h> 317c478bd9Sstevel@tonic-gate #include <strings.h> 327c478bd9Sstevel@tonic-gate #include <unistd.h> 337c478bd9Sstevel@tonic-gate #include <assert.h> 347c478bd9Sstevel@tonic-gate #include <libgen.h> 357c478bd9Sstevel@tonic-gate #include <libintl.h> 367c478bd9Sstevel@tonic-gate #include <alloca.h> 377c478bd9Sstevel@tonic-gate #include <ctype.h> 389acbbeafSnn35248 #include <sys/acl.h> 399acbbeafSnn35248 #include <sys/stat.h> 409acbbeafSnn35248 #include <sys/brand.h> 417c478bd9Sstevel@tonic-gate #include <sys/mntio.h> 427c478bd9Sstevel@tonic-gate #include <sys/mnttab.h> 43cf8f45c7Sdstaff #include <sys/nvpair.h> 449acbbeafSnn35248 #include <sys/types.h> 45f4b3ec61Sdh155122 #include <sys/sockio.h> 465679c89fSjv227347 #include <sys/systeminfo.h> 47ee519a1fSgjelinek #include <ftw.h> 480209230bSgjelinek #include <pool.h> 490209230bSgjelinek #include <libscf.h> 500209230bSgjelinek #include <libproc.h> 510209230bSgjelinek #include <sys/priocntl.h> 5239935be5Sgjelinek #include <libuutil.h> 53ff17c8bfSgjelinek #include <wait.h> 54ff17c8bfSgjelinek #include <bsm/adt.h> 55cb8a054bSGlenn Faden #include <auth_attr.h> 56cb8a054bSGlenn Faden #include <auth_list.h> 57cb8a054bSGlenn Faden #include <secdb.h> 58cb8a054bSGlenn Faden #include <user_attr.h> 59cb8a054bSGlenn Faden #include <prof_attr.h> 607c478bd9Sstevel@tonic-gate 617c478bd9Sstevel@tonic-gate #include <arpa/inet.h> 627c478bd9Sstevel@tonic-gate #include <netdb.h> 637c478bd9Sstevel@tonic-gate 647c478bd9Sstevel@tonic-gate #include <libxml/xmlmemory.h> 657c478bd9Sstevel@tonic-gate #include <libxml/parser.h> 667c478bd9Sstevel@tonic-gate 677c478bd9Sstevel@tonic-gate #include <libdevinfo.h> 68108322fbScarlsonj #include <uuid/uuid.h> 69ee519a1fSgjelinek #include <dirent.h> 709acbbeafSnn35248 #include <libbrand.h> 71ee519a1fSgjelinek 727c478bd9Sstevel@tonic-gate #include <libzonecfg.h> 737c478bd9Sstevel@tonic-gate #include "zonecfg_impl.h" 747c478bd9Sstevel@tonic-gate 757c478bd9Sstevel@tonic-gate #define _PATH_TMPFILE "/zonecfg.XXXXXX" 76cf8f45c7Sdstaff #define ZONE_CB_RETRY_COUNT 10 77cf8f45c7Sdstaff #define ZONE_EVENT_PING_SUBCLASS "ping" 78cf8f45c7Sdstaff #define ZONE_EVENT_PING_PUBLISHER "solaris" 797c478bd9Sstevel@tonic-gate 807c478bd9Sstevel@tonic-gate /* Hard-code the DTD element/attribute/entity names just once, here. */ 817c478bd9Sstevel@tonic-gate #define DTD_ELEM_ATTR (const xmlChar *) "attr" 827c478bd9Sstevel@tonic-gate #define DTD_ELEM_COMMENT (const xmlChar *) "comment" 837c478bd9Sstevel@tonic-gate #define DTD_ELEM_DEVICE (const xmlChar *) "device" 847c478bd9Sstevel@tonic-gate #define DTD_ELEM_FS (const xmlChar *) "filesystem" 857c478bd9Sstevel@tonic-gate #define DTD_ELEM_FSOPTION (const xmlChar *) "fsoption" 867c478bd9Sstevel@tonic-gate #define DTD_ELEM_IPD (const xmlChar *) "inherited-pkg-dir" 877c478bd9Sstevel@tonic-gate #define DTD_ELEM_NET (const xmlChar *) "network" 887c478bd9Sstevel@tonic-gate #define DTD_ELEM_RCTL (const xmlChar *) "rctl" 897c478bd9Sstevel@tonic-gate #define DTD_ELEM_RCTLVALUE (const xmlChar *) "rctl-value" 907c478bd9Sstevel@tonic-gate #define DTD_ELEM_ZONE (const xmlChar *) "zone" 91fa9e4066Sahrens #define DTD_ELEM_DATASET (const xmlChar *) "dataset" 920209230bSgjelinek #define DTD_ELEM_TMPPOOL (const xmlChar *) "tmp_pool" 930209230bSgjelinek #define DTD_ELEM_PSET (const xmlChar *) "pset" 940209230bSgjelinek #define DTD_ELEM_MCAP (const xmlChar *) "mcap" 95ee519a1fSgjelinek #define DTD_ELEM_PACKAGE (const xmlChar *) "package" 96ee519a1fSgjelinek #define DTD_ELEM_PATCH (const xmlChar *) "patch" 976cfd72c6Sgjelinek #define DTD_ELEM_OBSOLETES (const xmlChar *) "obsoletes" 98ee519a1fSgjelinek #define DTD_ELEM_DEV_PERM (const xmlChar *) "dev-perm" 99cb8a054bSGlenn Faden #define DTD_ELEM_ADMIN (const xmlChar *) "admin" 1007c478bd9Sstevel@tonic-gate 1017c478bd9Sstevel@tonic-gate #define DTD_ATTR_ACTION (const xmlChar *) "action" 1027c478bd9Sstevel@tonic-gate #define DTD_ATTR_ADDRESS (const xmlChar *) "address" 1037c478bd9Sstevel@tonic-gate #define DTD_ATTR_AUTOBOOT (const xmlChar *) "autoboot" 104f4b3ec61Sdh155122 #define DTD_ATTR_IPTYPE (const xmlChar *) "ip-type" 105de860bd9Sgfaden #define DTD_ATTR_DEFROUTER (const xmlChar *) "defrouter" 1067c478bd9Sstevel@tonic-gate #define DTD_ATTR_DIR (const xmlChar *) "directory" 1077c478bd9Sstevel@tonic-gate #define DTD_ATTR_LIMIT (const xmlChar *) "limit" 108ffbafc53Scomay #define DTD_ATTR_LIMITPRIV (const xmlChar *) "limitpriv" 1093f2f09c1Sdp #define DTD_ATTR_BOOTARGS (const xmlChar *) "bootargs" 1100209230bSgjelinek #define DTD_ATTR_SCHED (const xmlChar *) "scheduling-class" 1117c478bd9Sstevel@tonic-gate #define DTD_ATTR_MATCH (const xmlChar *) "match" 1127c478bd9Sstevel@tonic-gate #define DTD_ATTR_NAME (const xmlChar *) "name" 1137c478bd9Sstevel@tonic-gate #define DTD_ATTR_PHYSICAL (const xmlChar *) "physical" 1147c478bd9Sstevel@tonic-gate #define DTD_ATTR_POOL (const xmlChar *) "pool" 1157c478bd9Sstevel@tonic-gate #define DTD_ATTR_PRIV (const xmlChar *) "priv" 1167c478bd9Sstevel@tonic-gate #define DTD_ATTR_RAW (const xmlChar *) "raw" 1177c478bd9Sstevel@tonic-gate #define DTD_ATTR_SPECIAL (const xmlChar *) "special" 1187c478bd9Sstevel@tonic-gate #define DTD_ATTR_TYPE (const xmlChar *) "type" 1197c478bd9Sstevel@tonic-gate #define DTD_ATTR_VALUE (const xmlChar *) "value" 1207c478bd9Sstevel@tonic-gate #define DTD_ATTR_ZONEPATH (const xmlChar *) "zonepath" 1210209230bSgjelinek #define DTD_ATTR_NCPU_MIN (const xmlChar *) "ncpu_min" 1220209230bSgjelinek #define DTD_ATTR_NCPU_MAX (const xmlChar *) "ncpu_max" 1230209230bSgjelinek #define DTD_ATTR_IMPORTANCE (const xmlChar *) "importance" 1240209230bSgjelinek #define DTD_ATTR_PHYSCAP (const xmlChar *) "physcap" 125ee519a1fSgjelinek #define DTD_ATTR_VERSION (const xmlChar *) "version" 126ee519a1fSgjelinek #define DTD_ATTR_ID (const xmlChar *) "id" 127ee519a1fSgjelinek #define DTD_ATTR_UID (const xmlChar *) "uid" 128ee519a1fSgjelinek #define DTD_ATTR_GID (const xmlChar *) "gid" 129ee519a1fSgjelinek #define DTD_ATTR_MODE (const xmlChar *) "mode" 130ee519a1fSgjelinek #define DTD_ATTR_ACL (const xmlChar *) "acl" 1319acbbeafSnn35248 #define DTD_ATTR_BRAND (const xmlChar *) "brand" 1325679c89fSjv227347 #define DTD_ATTR_HOSTID (const xmlChar *) "hostid" 133cb8a054bSGlenn Faden #define DTD_ATTR_USER (const xmlChar *) "user" 134cb8a054bSGlenn Faden #define DTD_ATTR_AUTHS (const xmlChar *) "auths" 135*0fbb751dSJohn Levon #define DTD_ATTR_FS_ALLOWED (const xmlChar *) "fs-allowed" 1367c478bd9Sstevel@tonic-gate 1377c478bd9Sstevel@tonic-gate #define DTD_ENTITY_BOOLEAN "boolean" 1387c478bd9Sstevel@tonic-gate #define DTD_ENTITY_DEVPATH "devpath" 1397c478bd9Sstevel@tonic-gate #define DTD_ENTITY_DRIVER "driver" 1407c478bd9Sstevel@tonic-gate #define DTD_ENTITY_DRVMIN "drv_min" 1417c478bd9Sstevel@tonic-gate #define DTD_ENTITY_FALSE "false" 1427c478bd9Sstevel@tonic-gate #define DTD_ENTITY_INT "int" 1437c478bd9Sstevel@tonic-gate #define DTD_ENTITY_STRING "string" 1447c478bd9Sstevel@tonic-gate #define DTD_ENTITY_TRUE "true" 1457c478bd9Sstevel@tonic-gate #define DTD_ENTITY_UINT "uint" 1467c478bd9Sstevel@tonic-gate 147a1be23daSdp #define DTD_ENTITY_BOOL_LEN 6 /* "false" */ 148a1be23daSdp 149ee519a1fSgjelinek #define ATTACH_FORCED "SUNWattached.xml" 150ee519a1fSgjelinek 1510209230bSgjelinek #define TMP_POOL_NAME "SUNWtmp_%s" 1520209230bSgjelinek #define MAX_TMP_POOL_NAME (ZONENAME_MAX + 9) 1530209230bSgjelinek #define RCAP_SERVICE "system/rcap:default" 1540209230bSgjelinek #define POOLD_SERVICE "system/pools/dynamic:default" 1550209230bSgjelinek 1560209230bSgjelinek /* 1570209230bSgjelinek * rctl alias definitions 1580209230bSgjelinek * 1590209230bSgjelinek * This holds the alias, the full rctl name, the default priv value, action 1600209230bSgjelinek * and lower limit. The functions that handle rctl aliases step through 1610209230bSgjelinek * this table, matching on the alias, and using the full values for setting 1620209230bSgjelinek * the rctl entry as well the limit for validation. 1630209230bSgjelinek */ 1640209230bSgjelinek static struct alias { 1650209230bSgjelinek char *shortname; 1660209230bSgjelinek char *realname; 1670209230bSgjelinek char *priv; 1680209230bSgjelinek char *action; 1690209230bSgjelinek uint64_t low_limit; 1700209230bSgjelinek } aliases[] = { 1710209230bSgjelinek {ALIAS_MAXLWPS, "zone.max-lwps", "privileged", "deny", 100}, 1720209230bSgjelinek {ALIAS_MAXSHMMEM, "zone.max-shm-memory", "privileged", "deny", 0}, 1730209230bSgjelinek {ALIAS_MAXSHMIDS, "zone.max-shm-ids", "privileged", "deny", 0}, 1740209230bSgjelinek {ALIAS_MAXMSGIDS, "zone.max-msg-ids", "privileged", "deny", 0}, 1750209230bSgjelinek {ALIAS_MAXSEMIDS, "zone.max-sem-ids", "privileged", "deny", 0}, 1760209230bSgjelinek {ALIAS_MAXLOCKEDMEM, "zone.max-locked-memory", "privileged", "deny", 0}, 1770209230bSgjelinek {ALIAS_MAXSWAP, "zone.max-swap", "privileged", "deny", 0}, 1780209230bSgjelinek {ALIAS_SHARES, "zone.cpu-shares", "privileged", "none", 0}, 179c97ad5cdSakolb {ALIAS_CPUCAP, "zone.cpu-cap", "privileged", "deny", 0}, 1800209230bSgjelinek {NULL, NULL, NULL, NULL, 0} 1810209230bSgjelinek }; 1820209230bSgjelinek 1830209230bSgjelinek /* 1840209230bSgjelinek * Structure for applying rctls to a running zone. It allows important 1850209230bSgjelinek * process values to be passed together easily. 1860209230bSgjelinek */ 1870209230bSgjelinek typedef struct pr_info_handle { 1880209230bSgjelinek struct ps_prochandle *pr; 1890209230bSgjelinek pid_t pid; 1900209230bSgjelinek } pr_info_handle_t; 1910209230bSgjelinek 1927c478bd9Sstevel@tonic-gate struct zone_dochandle { 1937c478bd9Sstevel@tonic-gate char *zone_dh_rootdir; 1947c478bd9Sstevel@tonic-gate xmlDocPtr zone_dh_doc; 1957c478bd9Sstevel@tonic-gate xmlNodePtr zone_dh_cur; 1967c478bd9Sstevel@tonic-gate xmlNodePtr zone_dh_top; 197087719fdSdp boolean_t zone_dh_newzone; 198087719fdSdp boolean_t zone_dh_snapshot; 199ee519a1fSgjelinek boolean_t zone_dh_sw_inv; 200cb8a054bSGlenn Faden zone_userauths_t *zone_dh_userauths; 201087719fdSdp char zone_dh_delete_name[ZONENAME_MAX]; 2027c478bd9Sstevel@tonic-gate }; 2037c478bd9Sstevel@tonic-gate 204cf8f45c7Sdstaff struct znotify { 205cf8f45c7Sdstaff void * zn_private; 206cf8f45c7Sdstaff evchan_t *zn_eventchan; 207cf8f45c7Sdstaff int (*zn_callback)(const char *zonename, zoneid_t zid, 208cf8f45c7Sdstaff const char *newstate, const char *oldstate, hrtime_t when, void *p); 209cf8f45c7Sdstaff pthread_mutex_t zn_mutex; 210cf8f45c7Sdstaff pthread_cond_t zn_cond; 211cf8f45c7Sdstaff pthread_mutex_t zn_bigmutex; 212cf8f45c7Sdstaff volatile enum {ZN_UNLOCKED, ZN_LOCKED, ZN_PING_INFLIGHT, 213cf8f45c7Sdstaff ZN_PING_RECEIVED} zn_state; 214cf8f45c7Sdstaff char zn_subscriber_id[MAX_SUBID_LEN]; 215cf8f45c7Sdstaff volatile boolean_t zn_failed; 216cf8f45c7Sdstaff int zn_failure_count; 217cf8f45c7Sdstaff }; 218cf8f45c7Sdstaff 219ff17c8bfSgjelinek /* used to track nested zone-lock operations */ 220ff17c8bfSgjelinek static int zone_lock_cnt = 0; 221ee519a1fSgjelinek 222ff17c8bfSgjelinek /* used to communicate lock status to children */ 223ff17c8bfSgjelinek #define LOCK_ENV_VAR "_ZONEADM_LOCK_HELD" 224ff17c8bfSgjelinek static char zoneadm_lock_held[] = LOCK_ENV_VAR"=1"; 225ff17c8bfSgjelinek static char zoneadm_lock_not_held[] = LOCK_ENV_VAR"=0"; 22639935be5Sgjelinek 227108322fbScarlsonj char *zonecfg_root = ""; 228108322fbScarlsonj 2297c478bd9Sstevel@tonic-gate /* 2307c478bd9Sstevel@tonic-gate * For functions which return int, which is most of the functions herein, 2317c478bd9Sstevel@tonic-gate * the return values should be from the Z_foo set defined in <libzonecfg.h>. 2327c478bd9Sstevel@tonic-gate * In some instances, we take pains mapping some libc errno values to Z_foo 2337c478bd9Sstevel@tonic-gate * values from this set. 2347c478bd9Sstevel@tonic-gate */ 2357c478bd9Sstevel@tonic-gate 2367c478bd9Sstevel@tonic-gate /* 237108322fbScarlsonj * Set the root (/) path for all zonecfg configuration files. This is a 238108322fbScarlsonj * private interface used by Live Upgrade extensions to access zone 239108322fbScarlsonj * configuration inside mounted alternate boot environments. 240108322fbScarlsonj */ 241108322fbScarlsonj void 242108322fbScarlsonj zonecfg_set_root(const char *rootpath) 243108322fbScarlsonj { 244108322fbScarlsonj if (*zonecfg_root != '\0') 245108322fbScarlsonj free(zonecfg_root); 246108322fbScarlsonj if (rootpath == NULL || rootpath[0] == '\0' || rootpath[1] == '\0' || 247108322fbScarlsonj (zonecfg_root = strdup(rootpath)) == NULL) 248108322fbScarlsonj zonecfg_root = ""; 249108322fbScarlsonj } 250108322fbScarlsonj 251108322fbScarlsonj const char * 252108322fbScarlsonj zonecfg_get_root(void) 253108322fbScarlsonj { 254108322fbScarlsonj return (zonecfg_root); 255108322fbScarlsonj } 256108322fbScarlsonj 257108322fbScarlsonj boolean_t 258108322fbScarlsonj zonecfg_in_alt_root(void) 259108322fbScarlsonj { 260108322fbScarlsonj return (*zonecfg_root != '\0'); 261108322fbScarlsonj } 262108322fbScarlsonj 263108322fbScarlsonj /* 2647c478bd9Sstevel@tonic-gate * Callers of the _file_path() functions are expected to have the second 2657c478bd9Sstevel@tonic-gate * parameter be a (char foo[MAXPATHLEN]). 2667c478bd9Sstevel@tonic-gate */ 2677c478bd9Sstevel@tonic-gate 268108322fbScarlsonj static boolean_t 2697c478bd9Sstevel@tonic-gate config_file_path(const char *zonename, char *answer) 2707c478bd9Sstevel@tonic-gate { 271108322fbScarlsonj return (snprintf(answer, MAXPATHLEN, "%s%s/%s.xml", zonecfg_root, 272108322fbScarlsonj ZONE_CONFIG_ROOT, zonename) < MAXPATHLEN); 2737c478bd9Sstevel@tonic-gate } 2747c478bd9Sstevel@tonic-gate 275108322fbScarlsonj static boolean_t 276108322fbScarlsonj snap_file_path(const char *zonename, char *answer) 2777c478bd9Sstevel@tonic-gate { 278108322fbScarlsonj return (snprintf(answer, MAXPATHLEN, "%s%s/%s.snapshot.xml", 279108322fbScarlsonj zonecfg_root, ZONE_SNAPSHOT_ROOT, zonename) < MAXPATHLEN); 2807c478bd9Sstevel@tonic-gate } 2817c478bd9Sstevel@tonic-gate 2827c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 2837c478bd9Sstevel@tonic-gate static void 2847c478bd9Sstevel@tonic-gate zonecfg_error_func(void *ctx, const char *msg, ...) 2857c478bd9Sstevel@tonic-gate { 2867c478bd9Sstevel@tonic-gate /* 2877c478bd9Sstevel@tonic-gate * This function does nothing by design. Its purpose is to prevent 2887c478bd9Sstevel@tonic-gate * libxml from dumping unwanted messages to stdout/stderr. 2897c478bd9Sstevel@tonic-gate */ 2907c478bd9Sstevel@tonic-gate } 2917c478bd9Sstevel@tonic-gate 2927c478bd9Sstevel@tonic-gate zone_dochandle_t 2937c478bd9Sstevel@tonic-gate zonecfg_init_handle(void) 2947c478bd9Sstevel@tonic-gate { 295087719fdSdp zone_dochandle_t handle = calloc(1, sizeof (struct zone_dochandle)); 2967c478bd9Sstevel@tonic-gate if (handle == NULL) { 2977c478bd9Sstevel@tonic-gate errno = Z_NOMEM; 2987c478bd9Sstevel@tonic-gate return (NULL); 2997c478bd9Sstevel@tonic-gate } 3007c478bd9Sstevel@tonic-gate 3017c478bd9Sstevel@tonic-gate /* generic libxml initialization */ 302ced33dd6Sjv227347 (void) xmlLineNumbersDefault(1); 3037c478bd9Sstevel@tonic-gate xmlLoadExtDtdDefaultValue |= XML_DETECT_IDS; 3047c478bd9Sstevel@tonic-gate xmlDoValidityCheckingDefaultValue = 1; 3057c478bd9Sstevel@tonic-gate (void) xmlKeepBlanksDefault(0); 3067c478bd9Sstevel@tonic-gate xmlGetWarningsDefaultValue = 0; 3077c478bd9Sstevel@tonic-gate xmlSetGenericErrorFunc(NULL, zonecfg_error_func); 3087c478bd9Sstevel@tonic-gate 3097c478bd9Sstevel@tonic-gate return (handle); 3107c478bd9Sstevel@tonic-gate } 3117c478bd9Sstevel@tonic-gate 3127c478bd9Sstevel@tonic-gate int 3137c478bd9Sstevel@tonic-gate zonecfg_check_handle(zone_dochandle_t handle) 3147c478bd9Sstevel@tonic-gate { 3157c478bd9Sstevel@tonic-gate if (handle == NULL || handle->zone_dh_doc == NULL) 3167c478bd9Sstevel@tonic-gate return (Z_BAD_HANDLE); 3177c478bd9Sstevel@tonic-gate return (Z_OK); 3187c478bd9Sstevel@tonic-gate } 3197c478bd9Sstevel@tonic-gate 3207c478bd9Sstevel@tonic-gate void 3217c478bd9Sstevel@tonic-gate zonecfg_fini_handle(zone_dochandle_t handle) 3227c478bd9Sstevel@tonic-gate { 3237c478bd9Sstevel@tonic-gate if (zonecfg_check_handle(handle) == Z_OK) 3247c478bd9Sstevel@tonic-gate xmlFreeDoc(handle->zone_dh_doc); 3257c478bd9Sstevel@tonic-gate if (handle != NULL) 3267c478bd9Sstevel@tonic-gate free(handle); 3277c478bd9Sstevel@tonic-gate } 3287c478bd9Sstevel@tonic-gate 3297c478bd9Sstevel@tonic-gate static int 3307c478bd9Sstevel@tonic-gate zonecfg_destroy_impl(char *filename) 3317c478bd9Sstevel@tonic-gate { 3327c478bd9Sstevel@tonic-gate if (unlink(filename) == -1) { 3337c478bd9Sstevel@tonic-gate if (errno == EACCES) 3347c478bd9Sstevel@tonic-gate return (Z_ACCES); 3357c478bd9Sstevel@tonic-gate if (errno == ENOENT) 3367c478bd9Sstevel@tonic-gate return (Z_NO_ZONE); 3377c478bd9Sstevel@tonic-gate return (Z_MISC_FS); 3387c478bd9Sstevel@tonic-gate } 3397c478bd9Sstevel@tonic-gate return (Z_OK); 3407c478bd9Sstevel@tonic-gate } 3417c478bd9Sstevel@tonic-gate 3427c478bd9Sstevel@tonic-gate int 343087719fdSdp zonecfg_destroy(const char *zonename, boolean_t force) 3447c478bd9Sstevel@tonic-gate { 3457c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 346087719fdSdp struct zoneent ze; 347087719fdSdp int err, state_err; 348087719fdSdp zone_state_t state; 3497c478bd9Sstevel@tonic-gate 350108322fbScarlsonj if (!config_file_path(zonename, path)) 351108322fbScarlsonj return (Z_MISC_FS); 352087719fdSdp 353087719fdSdp state_err = zone_get_state((char *)zonename, &state); 354087719fdSdp err = access(path, W_OK); 355087719fdSdp 356087719fdSdp /* 357087719fdSdp * If there is no file, and no index entry, reliably indicate that no 358087719fdSdp * such zone exists. 359087719fdSdp */ 360087719fdSdp if ((state_err == Z_NO_ZONE) && (err == -1) && (errno == ENOENT)) 361087719fdSdp return (Z_NO_ZONE); 362087719fdSdp 363087719fdSdp /* 364087719fdSdp * Handle any other filesystem related errors (except if the XML 365087719fdSdp * file is missing, which we treat silently), unless we're forcing, 366087719fdSdp * in which case we plow on. 367087719fdSdp */ 368087719fdSdp if (err == -1 && errno != ENOENT) { 369087719fdSdp if (errno == EACCES) 370087719fdSdp return (Z_ACCES); 371087719fdSdp else if (!force) 372087719fdSdp return (Z_MISC_FS); 373087719fdSdp } 374087719fdSdp 375087719fdSdp if (state > ZONE_STATE_INSTALLED) 376087719fdSdp return (Z_BAD_ZONE_STATE); 377087719fdSdp 378087719fdSdp if (!force && state > ZONE_STATE_CONFIGURED) 379087719fdSdp return (Z_BAD_ZONE_STATE); 380087719fdSdp 381087719fdSdp /* 382087719fdSdp * Index deletion succeeds even if the entry doesn't exist. So this 383087719fdSdp * will fail only if we've had some more severe problem. 384087719fdSdp */ 385087719fdSdp bzero(&ze, sizeof (ze)); 386087719fdSdp (void) strlcpy(ze.zone_name, zonename, sizeof (ze.zone_name)); 387087719fdSdp if ((err = putzoneent(&ze, PZE_REMOVE)) != Z_OK) 388087719fdSdp if (!force) 389087719fdSdp return (err); 390087719fdSdp 391087719fdSdp err = zonecfg_destroy_impl(path); 392087719fdSdp 393087719fdSdp /* 394087719fdSdp * Treat failure to find the XML file silently, since, well, it's 395087719fdSdp * gone, and with the index file cleaned up, we're done. 396087719fdSdp */ 397087719fdSdp if (err == Z_OK || err == Z_NO_ZONE) 398087719fdSdp return (Z_OK); 399087719fdSdp return (err); 4007c478bd9Sstevel@tonic-gate } 4017c478bd9Sstevel@tonic-gate 4027c478bd9Sstevel@tonic-gate int 403108322fbScarlsonj zonecfg_destroy_snapshot(const char *zonename) 4047c478bd9Sstevel@tonic-gate { 4057c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 4067c478bd9Sstevel@tonic-gate 407108322fbScarlsonj if (!snap_file_path(zonename, path)) 408108322fbScarlsonj return (Z_MISC_FS); 4097c478bd9Sstevel@tonic-gate return (zonecfg_destroy_impl(path)); 4107c478bd9Sstevel@tonic-gate } 4117c478bd9Sstevel@tonic-gate 4127c478bd9Sstevel@tonic-gate static int 413a1be23daSdp getroot(zone_dochandle_t handle, xmlNodePtr *root) 4147c478bd9Sstevel@tonic-gate { 4157c478bd9Sstevel@tonic-gate if (zonecfg_check_handle(handle) == Z_BAD_HANDLE) 4167c478bd9Sstevel@tonic-gate return (Z_BAD_HANDLE); 4177c478bd9Sstevel@tonic-gate 418a1be23daSdp *root = xmlDocGetRootElement(handle->zone_dh_doc); 419a1be23daSdp 420a1be23daSdp if (*root == NULL) 4217c478bd9Sstevel@tonic-gate return (Z_EMPTY_DOCUMENT); 422a1be23daSdp 423a1be23daSdp if (xmlStrcmp((*root)->name, DTD_ELEM_ZONE)) 424a1be23daSdp return (Z_WRONG_DOC_TYPE); 425a1be23daSdp 426a1be23daSdp return (Z_OK); 4277c478bd9Sstevel@tonic-gate } 4287c478bd9Sstevel@tonic-gate 429a1be23daSdp static int 430a1be23daSdp operation_prep(zone_dochandle_t handle) 431a1be23daSdp { 432a1be23daSdp xmlNodePtr root; 433a1be23daSdp int err; 434a1be23daSdp 435a1be23daSdp if ((err = getroot(handle, &root)) != 0) 436a1be23daSdp return (err); 437a1be23daSdp 438a1be23daSdp handle->zone_dh_cur = root; 439a1be23daSdp handle->zone_dh_top = root; 440a1be23daSdp return (Z_OK); 4417c478bd9Sstevel@tonic-gate } 442a1be23daSdp 443a1be23daSdp static int 444ffbafc53Scomay fetchprop(xmlNodePtr cur, const xmlChar *propname, char *dst, size_t dstsize) 445ffbafc53Scomay { 446ffbafc53Scomay xmlChar *property; 447ffbafc53Scomay size_t srcsize; 448ffbafc53Scomay 449ffbafc53Scomay if ((property = xmlGetProp(cur, propname)) == NULL) 450ffbafc53Scomay return (Z_BAD_PROPERTY); 451ffbafc53Scomay srcsize = strlcpy(dst, (char *)property, dstsize); 452ffbafc53Scomay xmlFree(property); 453ffbafc53Scomay if (srcsize >= dstsize) 454ffbafc53Scomay return (Z_TOO_BIG); 455ffbafc53Scomay return (Z_OK); 456ffbafc53Scomay } 457ffbafc53Scomay 458ffbafc53Scomay static int 459ffbafc53Scomay fetch_alloc_prop(xmlNodePtr cur, const xmlChar *propname, char **dst) 460ffbafc53Scomay { 461ffbafc53Scomay xmlChar *property; 462ffbafc53Scomay 463ffbafc53Scomay if ((property = xmlGetProp(cur, propname)) == NULL) 464ffbafc53Scomay return (Z_BAD_PROPERTY); 465ffbafc53Scomay if ((*dst = strdup((char *)property)) == NULL) { 466ffbafc53Scomay xmlFree(property); 467ffbafc53Scomay return (Z_NOMEM); 468ffbafc53Scomay } 469ffbafc53Scomay xmlFree(property); 470ffbafc53Scomay return (Z_OK); 471ffbafc53Scomay } 472ffbafc53Scomay 473ffbafc53Scomay static int 474a1be23daSdp getrootattr(zone_dochandle_t handle, const xmlChar *propname, 475a1be23daSdp char *propval, size_t propsize) 476a1be23daSdp { 477a1be23daSdp xmlNodePtr root; 478a1be23daSdp int err; 479a1be23daSdp 480a1be23daSdp if ((err = getroot(handle, &root)) != 0) 481a1be23daSdp return (err); 482a1be23daSdp 483ffbafc53Scomay return (fetchprop(root, propname, propval, propsize)); 484ffbafc53Scomay } 485ffbafc53Scomay 486ffbafc53Scomay static int 487ffbafc53Scomay get_alloc_rootattr(zone_dochandle_t handle, const xmlChar *propname, 488ffbafc53Scomay char **propval) 489ffbafc53Scomay { 490ffbafc53Scomay xmlNodePtr root; 491ffbafc53Scomay int err; 492ffbafc53Scomay 493ffbafc53Scomay if ((err = getroot(handle, &root)) != 0) 494ffbafc53Scomay return (err); 495ffbafc53Scomay 496ffbafc53Scomay return (fetch_alloc_prop(root, propname, propval)); 497a1be23daSdp } 498a1be23daSdp 499a1be23daSdp static int 500108322fbScarlsonj setrootattr(zone_dochandle_t handle, const xmlChar *propname, 501108322fbScarlsonj const char *propval) 502a1be23daSdp { 503a1be23daSdp int err; 504a1be23daSdp xmlNodePtr root; 505a1be23daSdp 506a1be23daSdp if ((err = getroot(handle, &root)) != Z_OK) 507a1be23daSdp return (err); 508a1be23daSdp 5090209230bSgjelinek /* 5100209230bSgjelinek * If we get a null propval remove the property (ignore return since it 5110209230bSgjelinek * may not be set to begin with). 5120209230bSgjelinek */ 5130209230bSgjelinek if (propval == NULL) { 5140209230bSgjelinek (void) xmlUnsetProp(root, propname); 5150209230bSgjelinek } else { 5160209230bSgjelinek if (xmlSetProp(root, propname, (const xmlChar *) propval) 5170209230bSgjelinek == NULL) 518a1be23daSdp return (Z_INVAL); 5190209230bSgjelinek } 5207c478bd9Sstevel@tonic-gate return (Z_OK); 5217c478bd9Sstevel@tonic-gate } 5227c478bd9Sstevel@tonic-gate 523087719fdSdp static void 524087719fdSdp addcomment(zone_dochandle_t handle, const char *comment) 525087719fdSdp { 526087719fdSdp xmlNodePtr node; 527087719fdSdp node = xmlNewComment((xmlChar *) comment); 528087719fdSdp 529087719fdSdp if (node != NULL) 530087719fdSdp (void) xmlAddPrevSibling(handle->zone_dh_top, node); 531087719fdSdp } 532087719fdSdp 533087719fdSdp static void 534087719fdSdp stripcomments(zone_dochandle_t handle) 535087719fdSdp { 536087719fdSdp xmlDocPtr top; 537087719fdSdp xmlNodePtr child, next; 538087719fdSdp 539087719fdSdp top = handle->zone_dh_doc; 540087719fdSdp for (child = top->xmlChildrenNode; child != NULL; child = next) { 541087719fdSdp next = child->next; 542087719fdSdp if (child->name == NULL) 543087719fdSdp continue; 544087719fdSdp if (xmlStrcmp(child->name, DTD_ELEM_COMMENT) == 0) { 545087719fdSdp next = child->next; 546087719fdSdp xmlUnlinkNode(child); 547087719fdSdp xmlFreeNode(child); 548087719fdSdp } 549087719fdSdp } 550087719fdSdp } 551087719fdSdp 552ee519a1fSgjelinek static void 553ee519a1fSgjelinek strip_sw_inv(zone_dochandle_t handle) 554ee519a1fSgjelinek { 555ee519a1fSgjelinek xmlNodePtr root, child, next; 556ee519a1fSgjelinek 557ee519a1fSgjelinek root = xmlDocGetRootElement(handle->zone_dh_doc); 558ee519a1fSgjelinek for (child = root->xmlChildrenNode; child != NULL; child = next) { 559ee519a1fSgjelinek next = child->next; 560ee519a1fSgjelinek if (child->name == NULL) 561ee519a1fSgjelinek continue; 562ee519a1fSgjelinek if (xmlStrcmp(child->name, DTD_ELEM_PACKAGE) == 0 || 563ee519a1fSgjelinek xmlStrcmp(child->name, DTD_ELEM_PATCH) == 0) { 564ee519a1fSgjelinek next = child->next; 565ee519a1fSgjelinek xmlUnlinkNode(child); 566ee519a1fSgjelinek xmlFreeNode(child); 567ee519a1fSgjelinek } 568ee519a1fSgjelinek } 569ee519a1fSgjelinek } 570ee519a1fSgjelinek 5717c478bd9Sstevel@tonic-gate static int 572108322fbScarlsonj zonecfg_get_handle_impl(const char *zonename, const char *filename, 573108322fbScarlsonj zone_dochandle_t handle) 5747c478bd9Sstevel@tonic-gate { 5757c478bd9Sstevel@tonic-gate xmlValidCtxtPtr cvp; 5767c478bd9Sstevel@tonic-gate struct stat statbuf; 5777c478bd9Sstevel@tonic-gate int valid; 5787c478bd9Sstevel@tonic-gate 5797c478bd9Sstevel@tonic-gate if (zonename == NULL) 5807c478bd9Sstevel@tonic-gate return (Z_NO_ZONE); 5819acbbeafSnn35248 5827c478bd9Sstevel@tonic-gate if ((handle->zone_dh_doc = xmlParseFile(filename)) == NULL) { 5837c478bd9Sstevel@tonic-gate /* distinguish file not found vs. found but not parsed */ 5847c478bd9Sstevel@tonic-gate if (stat(filename, &statbuf) == 0) 5857c478bd9Sstevel@tonic-gate return (Z_INVALID_DOCUMENT); 5867c478bd9Sstevel@tonic-gate return (Z_NO_ZONE); 5877c478bd9Sstevel@tonic-gate } 5887c478bd9Sstevel@tonic-gate if ((cvp = xmlNewValidCtxt()) == NULL) 5897c478bd9Sstevel@tonic-gate return (Z_NOMEM); 5907c478bd9Sstevel@tonic-gate cvp->error = zonecfg_error_func; 5917c478bd9Sstevel@tonic-gate cvp->warning = zonecfg_error_func; 5927c478bd9Sstevel@tonic-gate valid = xmlValidateDocument(cvp, handle->zone_dh_doc); 5937c478bd9Sstevel@tonic-gate xmlFreeValidCtxt(cvp); 5947c478bd9Sstevel@tonic-gate if (valid == 0) 5957c478bd9Sstevel@tonic-gate return (Z_INVALID_DOCUMENT); 596087719fdSdp 5977c478bd9Sstevel@tonic-gate /* delete any comments such as inherited Sun copyright / ident str */ 598087719fdSdp stripcomments(handle); 5997c478bd9Sstevel@tonic-gate return (Z_OK); 6007c478bd9Sstevel@tonic-gate } 6017c478bd9Sstevel@tonic-gate 6027c478bd9Sstevel@tonic-gate int 603108322fbScarlsonj zonecfg_get_handle(const char *zonename, zone_dochandle_t handle) 6047c478bd9Sstevel@tonic-gate { 6057c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 6067c478bd9Sstevel@tonic-gate 607108322fbScarlsonj if (!config_file_path(zonename, path)) 608108322fbScarlsonj return (Z_MISC_FS); 609087719fdSdp handle->zone_dh_newzone = B_FALSE; 610087719fdSdp 6117c478bd9Sstevel@tonic-gate return (zonecfg_get_handle_impl(zonename, path, handle)); 6127c478bd9Sstevel@tonic-gate } 6137c478bd9Sstevel@tonic-gate 6147c478bd9Sstevel@tonic-gate int 61516ab8c7bSgjelinek zonecfg_get_attach_handle(const char *path, const char *fname, 61616ab8c7bSgjelinek const char *zonename, boolean_t preserve_sw, zone_dochandle_t handle) 617ee519a1fSgjelinek { 618ee519a1fSgjelinek char migpath[MAXPATHLEN]; 619ee519a1fSgjelinek int err; 620ee519a1fSgjelinek struct stat buf; 621ee519a1fSgjelinek 622ee519a1fSgjelinek if (snprintf(migpath, sizeof (migpath), "%s/root", path) >= 623ee519a1fSgjelinek sizeof (migpath)) 624ee519a1fSgjelinek return (Z_NOMEM); 625ee519a1fSgjelinek 626ee519a1fSgjelinek if (stat(migpath, &buf) == -1 || !S_ISDIR(buf.st_mode)) 627ee519a1fSgjelinek return (Z_NO_ZONE); 628ee519a1fSgjelinek 62916ab8c7bSgjelinek if (snprintf(migpath, sizeof (migpath), "%s/%s", path, fname) >= 630ee519a1fSgjelinek sizeof (migpath)) 631ee519a1fSgjelinek return (Z_NOMEM); 632ee519a1fSgjelinek 633ee519a1fSgjelinek if ((err = zonecfg_get_handle_impl(zonename, migpath, handle)) != Z_OK) 634ee519a1fSgjelinek return (err); 635ee519a1fSgjelinek 636ee519a1fSgjelinek if (!preserve_sw) 637ee519a1fSgjelinek strip_sw_inv(handle); 638ee519a1fSgjelinek 639ee519a1fSgjelinek handle->zone_dh_newzone = B_TRUE; 640ee519a1fSgjelinek if ((err = setrootattr(handle, DTD_ATTR_ZONEPATH, path)) != Z_OK) 641ee519a1fSgjelinek return (err); 642ee519a1fSgjelinek 643ee519a1fSgjelinek return (setrootattr(handle, DTD_ATTR_NAME, zonename)); 644ee519a1fSgjelinek } 645ee519a1fSgjelinek 646ee519a1fSgjelinek int 647108322fbScarlsonj zonecfg_get_snapshot_handle(const char *zonename, zone_dochandle_t handle) 6487c478bd9Sstevel@tonic-gate { 6497c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 6507c478bd9Sstevel@tonic-gate 651108322fbScarlsonj if (!snap_file_path(zonename, path)) 652108322fbScarlsonj return (Z_MISC_FS); 653087719fdSdp handle->zone_dh_newzone = B_FALSE; 6547c478bd9Sstevel@tonic-gate return (zonecfg_get_handle_impl(zonename, path, handle)); 6557c478bd9Sstevel@tonic-gate } 6567c478bd9Sstevel@tonic-gate 6577c478bd9Sstevel@tonic-gate int 658108322fbScarlsonj zonecfg_get_template_handle(const char *template, const char *zonename, 659087719fdSdp zone_dochandle_t handle) 660087719fdSdp { 661087719fdSdp char path[MAXPATHLEN]; 662087719fdSdp int err; 663087719fdSdp 664108322fbScarlsonj if (!config_file_path(template, path)) 665108322fbScarlsonj return (Z_MISC_FS); 666087719fdSdp 667087719fdSdp if ((err = zonecfg_get_handle_impl(template, path, handle)) != Z_OK) 668087719fdSdp return (err); 669087719fdSdp handle->zone_dh_newzone = B_TRUE; 670087719fdSdp return (setrootattr(handle, DTD_ATTR_NAME, zonename)); 671087719fdSdp } 672087719fdSdp 6739acbbeafSnn35248 int 6749acbbeafSnn35248 zonecfg_get_xml_handle(const char *path, zone_dochandle_t handle) 6759acbbeafSnn35248 { 6769acbbeafSnn35248 struct stat buf; 6779acbbeafSnn35248 int err; 6789acbbeafSnn35248 6799acbbeafSnn35248 if (stat(path, &buf) == -1) 6809acbbeafSnn35248 return (Z_MISC_FS); 6819acbbeafSnn35248 6829acbbeafSnn35248 if ((err = zonecfg_get_handle_impl("xml", path, handle)) != Z_OK) 6839acbbeafSnn35248 return (err); 6849acbbeafSnn35248 handle->zone_dh_newzone = B_TRUE; 6859acbbeafSnn35248 return (Z_OK); 6869acbbeafSnn35248 } 6879acbbeafSnn35248 6888cd327d5Sgjelinek /* 6898cd327d5Sgjelinek * Initialize two handles from the manifest read on fd. The rem_handle 6908cd327d5Sgjelinek * is initialized from the input file, including the sw inventory. The 6918cd327d5Sgjelinek * local_handle is initialized with the same zone configuration but with 6928cd327d5Sgjelinek * no sw inventory. 6938cd327d5Sgjelinek */ 6948cd327d5Sgjelinek int 6958cd327d5Sgjelinek zonecfg_attach_manifest(int fd, zone_dochandle_t local_handle, 6968cd327d5Sgjelinek zone_dochandle_t rem_handle) 6978cd327d5Sgjelinek { 6988cd327d5Sgjelinek xmlValidCtxtPtr cvp; 6998cd327d5Sgjelinek int valid; 7008cd327d5Sgjelinek 7018cd327d5Sgjelinek /* load the manifest into the handle for the remote system */ 7028cd327d5Sgjelinek if ((rem_handle->zone_dh_doc = xmlReadFd(fd, NULL, NULL, 0)) == NULL) { 7038cd327d5Sgjelinek return (Z_INVALID_DOCUMENT); 7048cd327d5Sgjelinek } 7058cd327d5Sgjelinek if ((cvp = xmlNewValidCtxt()) == NULL) 7068cd327d5Sgjelinek return (Z_NOMEM); 7078cd327d5Sgjelinek cvp->error = zonecfg_error_func; 7088cd327d5Sgjelinek cvp->warning = zonecfg_error_func; 7098cd327d5Sgjelinek valid = xmlValidateDocument(cvp, rem_handle->zone_dh_doc); 7108cd327d5Sgjelinek xmlFreeValidCtxt(cvp); 7118cd327d5Sgjelinek if (valid == 0) 7128cd327d5Sgjelinek return (Z_INVALID_DOCUMENT); 7138cd327d5Sgjelinek 7148cd327d5Sgjelinek /* delete any comments such as inherited Sun copyright / ident str */ 7158cd327d5Sgjelinek stripcomments(rem_handle); 7168cd327d5Sgjelinek 7178cd327d5Sgjelinek rem_handle->zone_dh_newzone = B_TRUE; 7188cd327d5Sgjelinek rem_handle->zone_dh_sw_inv = B_TRUE; 7198cd327d5Sgjelinek 7208cd327d5Sgjelinek /* 7218cd327d5Sgjelinek * Now use the remote system handle to generate a local system handle 7228cd327d5Sgjelinek * with an identical zones configuration but no sw inventory. 7238cd327d5Sgjelinek */ 7248cd327d5Sgjelinek if ((local_handle->zone_dh_doc = xmlCopyDoc(rem_handle->zone_dh_doc, 7258cd327d5Sgjelinek 1)) == NULL) { 7268cd327d5Sgjelinek return (Z_INVALID_DOCUMENT); 7278cd327d5Sgjelinek } 7288cd327d5Sgjelinek 7298cd327d5Sgjelinek /* 7308cd327d5Sgjelinek * We need to re-run xmlValidateDocument on local_handle to properly 7318cd327d5Sgjelinek * update the in-core representation of the configuration. 7328cd327d5Sgjelinek */ 7338cd327d5Sgjelinek if ((cvp = xmlNewValidCtxt()) == NULL) 7348cd327d5Sgjelinek return (Z_NOMEM); 7358cd327d5Sgjelinek cvp->error = zonecfg_error_func; 7368cd327d5Sgjelinek cvp->warning = zonecfg_error_func; 7378cd327d5Sgjelinek valid = xmlValidateDocument(cvp, local_handle->zone_dh_doc); 7388cd327d5Sgjelinek xmlFreeValidCtxt(cvp); 7398cd327d5Sgjelinek if (valid == 0) 7408cd327d5Sgjelinek return (Z_INVALID_DOCUMENT); 7418cd327d5Sgjelinek 7428cd327d5Sgjelinek strip_sw_inv(local_handle); 7438cd327d5Sgjelinek 7448cd327d5Sgjelinek local_handle->zone_dh_newzone = B_TRUE; 7458cd327d5Sgjelinek local_handle->zone_dh_sw_inv = B_FALSE; 7468cd327d5Sgjelinek 7478cd327d5Sgjelinek return (Z_OK); 7488cd327d5Sgjelinek } 7498cd327d5Sgjelinek 750087719fdSdp static boolean_t 751087719fdSdp is_renaming(zone_dochandle_t handle) 752087719fdSdp { 753087719fdSdp if (handle->zone_dh_newzone) 754087719fdSdp return (B_FALSE); 755087719fdSdp if (strlen(handle->zone_dh_delete_name) > 0) 756087719fdSdp return (B_TRUE); 757087719fdSdp return (B_FALSE); 758087719fdSdp } 759087719fdSdp 760087719fdSdp static boolean_t 761087719fdSdp is_new(zone_dochandle_t handle) 762087719fdSdp { 763087719fdSdp return (handle->zone_dh_newzone || handle->zone_dh_snapshot); 764087719fdSdp } 765087719fdSdp 766087719fdSdp static boolean_t 767087719fdSdp is_snapshot(zone_dochandle_t handle) 768087719fdSdp { 769087719fdSdp return (handle->zone_dh_snapshot); 770087719fdSdp } 771087719fdSdp 772087719fdSdp /* 773087719fdSdp * It would be great to be able to use libc's ctype(3c) macros, but we 774087719fdSdp * can't, as they are locale sensitive, and it would break our limited thread 775087719fdSdp * safety if this routine had to change the app locale on the fly. 776087719fdSdp */ 777087719fdSdp int 778108322fbScarlsonj zonecfg_validate_zonename(const char *zone) 779087719fdSdp { 780087719fdSdp int i; 781087719fdSdp 782087719fdSdp if (strcmp(zone, GLOBAL_ZONENAME) == 0) 783087719fdSdp return (Z_BOGUS_ZONE_NAME); 784087719fdSdp 785087719fdSdp if (strlen(zone) >= ZONENAME_MAX) 786087719fdSdp return (Z_BOGUS_ZONE_NAME); 787087719fdSdp 788087719fdSdp if (!((zone[0] >= 'a' && zone[0] <= 'z') || 789087719fdSdp (zone[0] >= 'A' && zone[0] <= 'Z') || 790087719fdSdp (zone[0] >= '0' && zone[0] <= '9'))) 791087719fdSdp return (Z_BOGUS_ZONE_NAME); 792087719fdSdp 793087719fdSdp for (i = 1; zone[i] != '\0'; i++) { 794087719fdSdp if (!((zone[i] >= 'a' && zone[i] <= 'z') || 795087719fdSdp (zone[i] >= 'A' && zone[i] <= 'Z') || 796087719fdSdp (zone[i] >= '0' && zone[i] <= '9') || 797087719fdSdp (zone[i] == '-') || (zone[i] == '_') || (zone[i] == '.'))) 798087719fdSdp return (Z_BOGUS_ZONE_NAME); 799087719fdSdp } 800087719fdSdp 801087719fdSdp return (Z_OK); 802087719fdSdp } 803087719fdSdp 804087719fdSdp /* 805087719fdSdp * Changing the zone name requires us to track both the old and new 806087719fdSdp * name of the zone until commit time. 807087719fdSdp */ 808087719fdSdp int 8097c478bd9Sstevel@tonic-gate zonecfg_get_name(zone_dochandle_t handle, char *name, size_t namesize) 8107c478bd9Sstevel@tonic-gate { 811a1be23daSdp return (getrootattr(handle, DTD_ATTR_NAME, name, namesize)); 8127c478bd9Sstevel@tonic-gate } 8137c478bd9Sstevel@tonic-gate 814cb8a054bSGlenn Faden static int 815cb8a054bSGlenn Faden insert_admins(zone_dochandle_t handle, char *zonename) 816cb8a054bSGlenn Faden { 817cb8a054bSGlenn Faden int err; 818cb8a054bSGlenn Faden struct zone_admintab admintab; 819cb8a054bSGlenn Faden 820cb8a054bSGlenn Faden if ((err = zonecfg_setadminent(handle)) != Z_OK) { 821cb8a054bSGlenn Faden return (err); 822cb8a054bSGlenn Faden } 823cb8a054bSGlenn Faden while (zonecfg_getadminent(handle, &admintab) == Z_OK) { 824cb8a054bSGlenn Faden err = zonecfg_insert_userauths(handle, 825cb8a054bSGlenn Faden admintab.zone_admin_user, zonename); 826cb8a054bSGlenn Faden if (err != Z_OK) { 827cb8a054bSGlenn Faden (void) zonecfg_endadminent(handle); 828cb8a054bSGlenn Faden return (err); 829cb8a054bSGlenn Faden } 830cb8a054bSGlenn Faden } 831cb8a054bSGlenn Faden (void) zonecfg_endadminent(handle); 832cb8a054bSGlenn Faden return (Z_OK); 833cb8a054bSGlenn Faden } 834cb8a054bSGlenn Faden 835a1be23daSdp int 836a1be23daSdp zonecfg_set_name(zone_dochandle_t handle, char *name) 837a1be23daSdp { 838087719fdSdp zone_state_t state; 839087719fdSdp char curname[ZONENAME_MAX], old_delname[ZONENAME_MAX]; 840087719fdSdp int err; 841087719fdSdp 842087719fdSdp if ((err = getrootattr(handle, DTD_ATTR_NAME, curname, 843087719fdSdp sizeof (curname))) != Z_OK) 844087719fdSdp return (err); 845087719fdSdp 846087719fdSdp if (strcmp(name, curname) == 0) 847087719fdSdp return (Z_OK); 848087719fdSdp 849087719fdSdp /* 850087719fdSdp * Switching zone names to one beginning with SUNW is not permitted. 851087719fdSdp */ 852087719fdSdp if (strncmp(name, "SUNW", 4) == 0) 853087719fdSdp return (Z_BOGUS_ZONE_NAME); 854087719fdSdp 855087719fdSdp if ((err = zonecfg_validate_zonename(name)) != Z_OK) 856087719fdSdp return (err); 857087719fdSdp 858087719fdSdp /* 859087719fdSdp * Setting the name back to the original name (effectively a revert of 860087719fdSdp * the name) is fine. But if we carry on, we'll falsely identify the 861087719fdSdp * name as "in use," so special case here. 862087719fdSdp */ 863087719fdSdp if (strcmp(name, handle->zone_dh_delete_name) == 0) { 864087719fdSdp err = setrootattr(handle, DTD_ATTR_NAME, name); 865087719fdSdp handle->zone_dh_delete_name[0] = '\0'; 866087719fdSdp return (err); 867087719fdSdp } 868087719fdSdp 869087719fdSdp /* Check to see if new name chosen is already in use */ 870087719fdSdp if (zone_get_state(name, &state) != Z_NO_ZONE) 871087719fdSdp return (Z_NAME_IN_USE); 872087719fdSdp 873087719fdSdp /* 874087719fdSdp * If this isn't already "new" or in a renaming transition, then 875087719fdSdp * we're initiating a rename here; so stash the "delete name" 876087719fdSdp * (i.e. the name of the zone we'll be removing) for the rename. 877087719fdSdp */ 878087719fdSdp (void) strlcpy(old_delname, handle->zone_dh_delete_name, 879087719fdSdp sizeof (old_delname)); 880087719fdSdp if (!is_new(handle) && !is_renaming(handle)) { 881087719fdSdp /* 882087719fdSdp * Name change is allowed only when the zone we're altering 883087719fdSdp * is not ready or running. 884087719fdSdp */ 885087719fdSdp err = zone_get_state(curname, &state); 886087719fdSdp if (err == Z_OK) { 887087719fdSdp if (state > ZONE_STATE_INSTALLED) 888087719fdSdp return (Z_BAD_ZONE_STATE); 889087719fdSdp } else if (err != Z_NO_ZONE) { 890087719fdSdp return (err); 891087719fdSdp } 892087719fdSdp 893087719fdSdp (void) strlcpy(handle->zone_dh_delete_name, curname, 894087719fdSdp sizeof (handle->zone_dh_delete_name)); 895087719fdSdp assert(is_renaming(handle)); 896087719fdSdp } else if (is_renaming(handle)) { 897087719fdSdp err = zone_get_state(handle->zone_dh_delete_name, &state); 898087719fdSdp if (err == Z_OK) { 899087719fdSdp if (state > ZONE_STATE_INSTALLED) 900087719fdSdp return (Z_BAD_ZONE_STATE); 901087719fdSdp } else if (err != Z_NO_ZONE) { 902087719fdSdp return (err); 903087719fdSdp } 904087719fdSdp } 905087719fdSdp 906087719fdSdp if ((err = setrootattr(handle, DTD_ATTR_NAME, name)) != Z_OK) { 907087719fdSdp /* 908087719fdSdp * Restore the deletename to whatever it was at the 909087719fdSdp * top of the routine, since we've had a failure. 910087719fdSdp */ 911087719fdSdp (void) strlcpy(handle->zone_dh_delete_name, old_delname, 912087719fdSdp sizeof (handle->zone_dh_delete_name)); 913087719fdSdp return (err); 914087719fdSdp } 915087719fdSdp 916cb8a054bSGlenn Faden /* 917cb8a054bSGlenn Faden * Record the old admins from the old zonename 918cb8a054bSGlenn Faden * so that they can be deleted when the operation is committed. 919cb8a054bSGlenn Faden */ 920cb8a054bSGlenn Faden if ((err = insert_admins(handle, curname)) != Z_OK) 921cb8a054bSGlenn Faden return (err); 922cb8a054bSGlenn Faden else 923087719fdSdp return (Z_OK); 9247c478bd9Sstevel@tonic-gate } 925a1be23daSdp 926a1be23daSdp int 927a1be23daSdp zonecfg_get_zonepath(zone_dochandle_t handle, char *path, size_t pathsize) 928a1be23daSdp { 929108322fbScarlsonj size_t len; 930108322fbScarlsonj 931108322fbScarlsonj if ((len = strlcpy(path, zonecfg_root, pathsize)) >= pathsize) 932108322fbScarlsonj return (Z_TOO_BIG); 933108322fbScarlsonj return (getrootattr(handle, DTD_ATTR_ZONEPATH, path + len, 934108322fbScarlsonj pathsize - len)); 935a1be23daSdp } 936a1be23daSdp 937a1be23daSdp int 938a1be23daSdp zonecfg_set_zonepath(zone_dochandle_t handle, char *zonepath) 939a1be23daSdp { 940555afedfScarlsonj size_t len; 941555afedfScarlsonj 942555afedfScarlsonj /* 943555afedfScarlsonj * The user deals in absolute paths in the running global zone, but the 944555afedfScarlsonj * internal configuration files deal with boot environment relative 945555afedfScarlsonj * paths. Strip out the alternate root when specified. 946555afedfScarlsonj */ 947555afedfScarlsonj len = strlen(zonecfg_root); 948555afedfScarlsonj if (strncmp(zonepath, zonecfg_root, len) != 0 || zonepath[len] != '/') 949555afedfScarlsonj return (Z_BAD_PROPERTY); 950555afedfScarlsonj zonepath += len; 951a1be23daSdp return (setrootattr(handle, DTD_ATTR_ZONEPATH, zonepath)); 952a1be23daSdp } 953a1be23daSdp 954e5816e35SEdward Pilatowicz static int 955e5816e35SEdward Pilatowicz i_zonecfg_get_brand(zone_dochandle_t handle, char *brand, size_t brandsize, 956e5816e35SEdward Pilatowicz boolean_t default_query) 9579acbbeafSnn35248 { 9589acbbeafSnn35248 int ret, sz; 9599acbbeafSnn35248 9609acbbeafSnn35248 ret = getrootattr(handle, DTD_ATTR_BRAND, brand, brandsize); 9619acbbeafSnn35248 962e5816e35SEdward Pilatowicz /* 963e5816e35SEdward Pilatowicz * If the lookup failed, or succeeded in finding a non-null brand 964e5816e35SEdward Pilatowicz * string then return. 965e5816e35SEdward Pilatowicz */ 966e5816e35SEdward Pilatowicz if (ret != Z_OK || brand[0] != '\0') 967e5816e35SEdward Pilatowicz return (ret); 968e5816e35SEdward Pilatowicz 969e5816e35SEdward Pilatowicz if (!default_query) { 970e5816e35SEdward Pilatowicz /* If the zone has no brand, it is the default brand. */ 971b08d9f75SEdward Pilatowicz return (zonecfg_default_brand(brand, brandsize)); 9729acbbeafSnn35248 } 9739acbbeafSnn35248 974e5816e35SEdward Pilatowicz /* if SUNWdefault didn't specify a brand, fallback to "native" */ 975e5816e35SEdward Pilatowicz sz = strlcpy(brand, NATIVE_BRAND_NAME, brandsize); 976e5816e35SEdward Pilatowicz if (sz >= brandsize) 977e5816e35SEdward Pilatowicz return (Z_TOO_BIG); 978e5816e35SEdward Pilatowicz return (Z_OK); 979e5816e35SEdward Pilatowicz } 980e5816e35SEdward Pilatowicz 981e5816e35SEdward Pilatowicz int 982e5816e35SEdward Pilatowicz zonecfg_get_brand(zone_dochandle_t handle, char *brand, size_t brandsize) 983e5816e35SEdward Pilatowicz { 984e5816e35SEdward Pilatowicz return (i_zonecfg_get_brand(handle, brand, brandsize, B_FALSE)); 9859acbbeafSnn35248 } 9869acbbeafSnn35248 9879acbbeafSnn35248 int 9889acbbeafSnn35248 zonecfg_set_brand(zone_dochandle_t handle, char *brand) 9899acbbeafSnn35248 { 9909acbbeafSnn35248 return (setrootattr(handle, DTD_ATTR_BRAND, brand)); 9919acbbeafSnn35248 } 9929acbbeafSnn35248 9939acbbeafSnn35248 int 994a1be23daSdp zonecfg_get_autoboot(zone_dochandle_t handle, boolean_t *autoboot) 995a1be23daSdp { 996a1be23daSdp char autobootstr[DTD_ENTITY_BOOL_LEN]; 997a1be23daSdp int ret; 998a1be23daSdp 999a1be23daSdp if ((ret = getrootattr(handle, DTD_ATTR_AUTOBOOT, autobootstr, 1000a1be23daSdp sizeof (autobootstr))) != Z_OK) 1001a1be23daSdp return (ret); 1002a1be23daSdp 1003a1be23daSdp if (strcmp(autobootstr, DTD_ENTITY_TRUE) == 0) 1004a1be23daSdp *autoboot = B_TRUE; 1005a1be23daSdp else if (strcmp(autobootstr, DTD_ENTITY_FALSE) == 0) 1006a1be23daSdp *autoboot = B_FALSE; 1007a1be23daSdp else 1008a1be23daSdp ret = Z_BAD_PROPERTY; 1009a1be23daSdp return (ret); 1010a1be23daSdp } 1011a1be23daSdp 1012a1be23daSdp int 1013a1be23daSdp zonecfg_set_autoboot(zone_dochandle_t handle, boolean_t autoboot) 1014a1be23daSdp { 1015a1be23daSdp return (setrootattr(handle, DTD_ATTR_AUTOBOOT, 1016a1be23daSdp autoboot ? DTD_ENTITY_TRUE : DTD_ENTITY_FALSE)); 1017a1be23daSdp } 1018a1be23daSdp 1019a1be23daSdp int 1020a1be23daSdp zonecfg_get_pool(zone_dochandle_t handle, char *pool, size_t poolsize) 1021a1be23daSdp { 1022a1be23daSdp return (getrootattr(handle, DTD_ATTR_POOL, pool, poolsize)); 1023a1be23daSdp } 1024a1be23daSdp 1025a1be23daSdp int 1026a1be23daSdp zonecfg_set_pool(zone_dochandle_t handle, char *pool) 1027a1be23daSdp { 1028a1be23daSdp return (setrootattr(handle, DTD_ATTR_POOL, pool)); 1029a1be23daSdp } 1030a1be23daSdp 1031ffbafc53Scomay int 1032ffbafc53Scomay zonecfg_get_limitpriv(zone_dochandle_t handle, char **limitpriv) 1033ffbafc53Scomay { 1034ffbafc53Scomay return (get_alloc_rootattr(handle, DTD_ATTR_LIMITPRIV, limitpriv)); 1035ffbafc53Scomay } 1036ffbafc53Scomay 1037ffbafc53Scomay int 10383f2f09c1Sdp zonecfg_set_limitpriv(zone_dochandle_t handle, char *limitpriv) 1039ffbafc53Scomay { 10403f2f09c1Sdp return (setrootattr(handle, DTD_ATTR_LIMITPRIV, limitpriv)); 10413f2f09c1Sdp } 10423f2f09c1Sdp 10433f2f09c1Sdp int 10443f2f09c1Sdp zonecfg_get_bootargs(zone_dochandle_t handle, char *bargs, size_t bargssize) 10453f2f09c1Sdp { 10463f2f09c1Sdp return (getrootattr(handle, DTD_ATTR_BOOTARGS, bargs, bargssize)); 10473f2f09c1Sdp } 10483f2f09c1Sdp 10493f2f09c1Sdp int 10503f2f09c1Sdp zonecfg_set_bootargs(zone_dochandle_t handle, char *bargs) 10513f2f09c1Sdp { 10523f2f09c1Sdp return (setrootattr(handle, DTD_ATTR_BOOTARGS, bargs)); 1053ffbafc53Scomay } 1054ffbafc53Scomay 10550209230bSgjelinek int 10560209230bSgjelinek zonecfg_get_sched_class(zone_dochandle_t handle, char *sched, size_t schedsize) 10570209230bSgjelinek { 10580209230bSgjelinek return (getrootattr(handle, DTD_ATTR_SCHED, sched, schedsize)); 10590209230bSgjelinek } 10600209230bSgjelinek 10610209230bSgjelinek int 10620209230bSgjelinek zonecfg_set_sched(zone_dochandle_t handle, char *sched) 10630209230bSgjelinek { 10640209230bSgjelinek return (setrootattr(handle, DTD_ATTR_SCHED, sched)); 10650209230bSgjelinek } 10660209230bSgjelinek 1067a1be23daSdp /* 1068a1be23daSdp * /etc/zones/index caches a vital piece of information which is also 1069a1be23daSdp * in the <zonename>.xml file: the path to the zone. This is for performance, 1070a1be23daSdp * since we need to walk all zonepath's in order to be able to detect conflicts 1071a1be23daSdp * (see crosscheck_zonepaths() in the zoneadm command). 1072087719fdSdp * 1073087719fdSdp * An additional complexity is that when doing a rename, we'd like the entire 1074087719fdSdp * index update operation (rename, and potential state changes) to be atomic. 1075087719fdSdp * In general, the operation of this function should succeed or fail as 1076087719fdSdp * a unit. 1077a1be23daSdp */ 1078a1be23daSdp int 1079a1be23daSdp zonecfg_refresh_index_file(zone_dochandle_t handle) 1080a1be23daSdp { 1081a1be23daSdp char name[ZONENAME_MAX], zonepath[MAXPATHLEN]; 1082a1be23daSdp struct zoneent ze; 1083a1be23daSdp int err; 1084087719fdSdp int opcode; 1085087719fdSdp char *zn; 1086087719fdSdp 1087087719fdSdp bzero(&ze, sizeof (ze)); 1088087719fdSdp ze.zone_state = -1; /* Preserve existing state in index */ 1089a1be23daSdp 1090a1be23daSdp if ((err = zonecfg_get_name(handle, name, sizeof (name))) != Z_OK) 1091a1be23daSdp return (err); 1092087719fdSdp (void) strlcpy(ze.zone_name, name, sizeof (ze.zone_name)); 1093087719fdSdp 1094a1be23daSdp if ((err = zonecfg_get_zonepath(handle, zonepath, 1095a1be23daSdp sizeof (zonepath))) != Z_OK) 1096a1be23daSdp return (err); 1097555afedfScarlsonj (void) strlcpy(ze.zone_path, zonepath + strlen(zonecfg_root), 1098555afedfScarlsonj sizeof (ze.zone_path)); 1099087719fdSdp 1100087719fdSdp if (is_renaming(handle)) { 1101087719fdSdp opcode = PZE_MODIFY; 1102087719fdSdp (void) strlcpy(ze.zone_name, handle->zone_dh_delete_name, 1103087719fdSdp sizeof (ze.zone_name)); 1104087719fdSdp (void) strlcpy(ze.zone_newname, name, sizeof (ze.zone_newname)); 1105087719fdSdp } else if (is_new(handle)) { 1106087719fdSdp FILE *cookie; 1107087719fdSdp /* 1108087719fdSdp * Be tolerant of the zone already existing in the index file, 1109087719fdSdp * since we might be forcibly overwriting an existing 1110087719fdSdp * configuration with a new one (for example 'create -F' 1111087719fdSdp * in zonecfg). 1112087719fdSdp */ 1113087719fdSdp opcode = PZE_ADD; 1114087719fdSdp cookie = setzoneent(); 1115087719fdSdp while ((zn = getzoneent(cookie)) != NULL) { 1116087719fdSdp if (strcmp(zn, name) == 0) { 1117087719fdSdp opcode = PZE_MODIFY; 1118087719fdSdp free(zn); 1119087719fdSdp break; 1120087719fdSdp } 1121087719fdSdp free(zn); 1122087719fdSdp } 1123087719fdSdp endzoneent(cookie); 1124087719fdSdp ze.zone_state = ZONE_STATE_CONFIGURED; 1125087719fdSdp } else { 1126087719fdSdp opcode = PZE_MODIFY; 11277c478bd9Sstevel@tonic-gate } 11287c478bd9Sstevel@tonic-gate 1129087719fdSdp if ((err = putzoneent(&ze, opcode)) != Z_OK) 1130087719fdSdp return (err); 1131087719fdSdp 1132087719fdSdp return (Z_OK); 1133087719fdSdp } 1134087719fdSdp 1135087719fdSdp /* 1136087719fdSdp * The goal of this routine is to cause the index file update and the 1137087719fdSdp * document save to happen as an atomic operation. We do the document 1138087719fdSdp * first, saving a backup copy using a hard link; if that succeeds, we go 1139087719fdSdp * on to the index. If that fails, we roll the document back into place. 1140087719fdSdp * 1141087719fdSdp * Strategy: 1142087719fdSdp * 1143087719fdSdp * New zone 'foo' configuration: 1144087719fdSdp * Create tmpfile (zonecfg.xxxxxx) 1145087719fdSdp * Write XML to tmpfile 1146087719fdSdp * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> foo.xml) 1147087719fdSdp * Add entry to index file 1148087719fdSdp * If it fails, delete foo.xml, leaving nothing behind. 1149087719fdSdp * 1150087719fdSdp * Save existing zone 'foo': 1151087719fdSdp * Make backup of foo.xml -> .backup 1152087719fdSdp * Create tmpfile (zonecfg.xxxxxx) 1153087719fdSdp * Write XML to tmpfile 1154087719fdSdp * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> foo.xml) 1155087719fdSdp * Modify index file as needed 1156087719fdSdp * If it fails, recover from .backup -> foo.xml 1157087719fdSdp * 1158087719fdSdp * Rename 'foo' to 'bar': 1159087719fdSdp * Create tmpfile (zonecfg.xxxxxx) 1160087719fdSdp * Write XML to tmpfile 1161087719fdSdp * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> bar.xml) 1162087719fdSdp * Add entry for 'bar' to index file, Remove entry for 'foo' (refresh) 1163087719fdSdp * If it fails, delete bar.xml; foo.xml is left behind. 1164087719fdSdp */ 11657c478bd9Sstevel@tonic-gate static int 11667c478bd9Sstevel@tonic-gate zonecfg_save_impl(zone_dochandle_t handle, char *filename) 11677c478bd9Sstevel@tonic-gate { 11687c478bd9Sstevel@tonic-gate char tmpfile[MAXPATHLEN]; 1169087719fdSdp char bakdir[MAXPATHLEN], bakbase[MAXPATHLEN], bakfile[MAXPATHLEN]; 11709acbbeafSnn35248 int tmpfd, err, valid; 11717c478bd9Sstevel@tonic-gate xmlValidCtxt cvp = { NULL }; 1172087719fdSdp boolean_t backup; 11737c478bd9Sstevel@tonic-gate 11747c478bd9Sstevel@tonic-gate (void) strlcpy(tmpfile, filename, sizeof (tmpfile)); 11757c478bd9Sstevel@tonic-gate (void) dirname(tmpfile); 11767c478bd9Sstevel@tonic-gate (void) strlcat(tmpfile, _PATH_TMPFILE, sizeof (tmpfile)); 11777c478bd9Sstevel@tonic-gate 11787c478bd9Sstevel@tonic-gate tmpfd = mkstemp(tmpfile); 11797c478bd9Sstevel@tonic-gate if (tmpfd == -1) { 11807c478bd9Sstevel@tonic-gate (void) unlink(tmpfile); 11817c478bd9Sstevel@tonic-gate return (Z_TEMP_FILE); 11827c478bd9Sstevel@tonic-gate } 11837c478bd9Sstevel@tonic-gate (void) close(tmpfd); 11847c478bd9Sstevel@tonic-gate 11857c478bd9Sstevel@tonic-gate cvp.error = zonecfg_error_func; 11867c478bd9Sstevel@tonic-gate cvp.warning = zonecfg_error_func; 11877c478bd9Sstevel@tonic-gate 1188087719fdSdp /* 11899acbbeafSnn35248 * We do a final validation of the document. Since the library has 11909acbbeafSnn35248 * malfunctioned if it fails to validate, we follow-up with an 11919acbbeafSnn35248 * assert() that the doc is valid. 1192087719fdSdp */ 11939acbbeafSnn35248 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 11949acbbeafSnn35248 assert(valid != 0); 11957c478bd9Sstevel@tonic-gate 11967c478bd9Sstevel@tonic-gate if (xmlSaveFormatFile(tmpfile, handle->zone_dh_doc, 1) <= 0) 11977c478bd9Sstevel@tonic-gate goto err; 1198087719fdSdp 11997c478bd9Sstevel@tonic-gate (void) chmod(tmpfile, 0644); 12007c478bd9Sstevel@tonic-gate 1201087719fdSdp /* 1202087719fdSdp * In the event we are doing a standard save, hard link a copy of the 1203087719fdSdp * original file in .backup.<pid>.filename so we can restore it if 1204087719fdSdp * something goes wrong. 1205087719fdSdp */ 1206087719fdSdp if (!is_new(handle) && !is_renaming(handle)) { 1207087719fdSdp backup = B_TRUE; 1208087719fdSdp 1209087719fdSdp (void) strlcpy(bakdir, filename, sizeof (bakdir)); 1210087719fdSdp (void) strlcpy(bakbase, filename, sizeof (bakbase)); 1211087719fdSdp (void) snprintf(bakfile, sizeof (bakfile), "%s/.backup.%d.%s", 1212087719fdSdp dirname(bakdir), getpid(), basename(bakbase)); 1213087719fdSdp 1214087719fdSdp if (link(filename, bakfile) == -1) { 1215087719fdSdp err = errno; 12167c478bd9Sstevel@tonic-gate (void) unlink(tmpfile); 12177c478bd9Sstevel@tonic-gate if (errno == EACCES) 12187c478bd9Sstevel@tonic-gate return (Z_ACCES); 12197c478bd9Sstevel@tonic-gate return (Z_MISC_FS); 12207c478bd9Sstevel@tonic-gate } 1221087719fdSdp } 1222a1be23daSdp 1223087719fdSdp /* 1224087719fdSdp * Move the new document over top of the old. 1225087719fdSdp * i.e.: zonecfg.XXXXXX -> myzone.xml 1226087719fdSdp */ 1227087719fdSdp if (rename(tmpfile, filename) == -1) { 1228087719fdSdp err = errno; 1229087719fdSdp (void) unlink(tmpfile); 1230087719fdSdp if (backup) 1231087719fdSdp (void) unlink(bakfile); 1232087719fdSdp if (err == EACCES) 1233087719fdSdp return (Z_ACCES); 1234087719fdSdp return (Z_MISC_FS); 1235087719fdSdp } 1236087719fdSdp 1237087719fdSdp /* 1238087719fdSdp * If this is a snapshot, we're done-- don't add an index entry. 1239087719fdSdp */ 1240087719fdSdp if (is_snapshot(handle)) 1241087719fdSdp return (Z_OK); 1242087719fdSdp 1243087719fdSdp /* now update the index file to reflect whatever we just did */ 1244087719fdSdp if ((err = zonecfg_refresh_index_file(handle)) != Z_OK) { 1245087719fdSdp if (backup) { 1246087719fdSdp /* 1247087719fdSdp * Try to restore from our backup. 1248087719fdSdp */ 1249087719fdSdp (void) unlink(filename); 1250087719fdSdp (void) rename(bakfile, filename); 1251087719fdSdp } else { 1252087719fdSdp /* 1253087719fdSdp * Either the zone is new, in which case we can delete 1254087719fdSdp * new.xml, or we're doing a rename, so ditto. 1255087719fdSdp */ 1256087719fdSdp assert(is_new(handle) || is_renaming(handle)); 1257087719fdSdp (void) unlink(filename); 1258087719fdSdp } 1259087719fdSdp return (Z_UPDATING_INDEX); 1260087719fdSdp } 1261087719fdSdp 1262087719fdSdp if (backup) 1263087719fdSdp (void) unlink(bakfile); 1264087719fdSdp 1265087719fdSdp return (Z_OK); 12667c478bd9Sstevel@tonic-gate 12677c478bd9Sstevel@tonic-gate err: 12687c478bd9Sstevel@tonic-gate (void) unlink(tmpfile); 12697c478bd9Sstevel@tonic-gate return (Z_SAVING_FILE); 12707c478bd9Sstevel@tonic-gate } 12717c478bd9Sstevel@tonic-gate 12727c478bd9Sstevel@tonic-gate int 12737c478bd9Sstevel@tonic-gate zonecfg_save(zone_dochandle_t handle) 12747c478bd9Sstevel@tonic-gate { 1275087719fdSdp char zname[ZONENAME_MAX], path[MAXPATHLEN]; 1276087719fdSdp char delpath[MAXPATHLEN]; 1277087719fdSdp int err = Z_SAVING_FILE; 12787c478bd9Sstevel@tonic-gate 1279087719fdSdp if (zonecfg_check_handle(handle) != Z_OK) 1280087719fdSdp return (Z_BAD_HANDLE); 1281087719fdSdp 1282087719fdSdp /* 1283ee519a1fSgjelinek * We don't support saving snapshots or a tree containing a sw 1284ee519a1fSgjelinek * inventory at this time. 1285087719fdSdp */ 1286ee519a1fSgjelinek if (handle->zone_dh_snapshot || handle->zone_dh_sw_inv) 1287087719fdSdp return (Z_INVAL); 1288087719fdSdp 1289087719fdSdp if ((err = zonecfg_get_name(handle, zname, sizeof (zname))) != Z_OK) 12907c478bd9Sstevel@tonic-gate return (err); 1291087719fdSdp 1292108322fbScarlsonj if (!config_file_path(zname, path)) 1293108322fbScarlsonj return (Z_MISC_FS); 1294087719fdSdp 1295087719fdSdp addcomment(handle, "\n DO NOT EDIT THIS " 1296087719fdSdp "FILE. Use zonecfg(1M) instead.\n"); 1297087719fdSdp 1298cb8a054bSGlenn Faden /* 1299cb8a054bSGlenn Faden * Update user_attr first so that it will be older 1300cb8a054bSGlenn Faden * than the config file. 1301cb8a054bSGlenn Faden */ 1302cb8a054bSGlenn Faden (void) zonecfg_authorize_users(handle, zname); 1303087719fdSdp err = zonecfg_save_impl(handle, path); 1304087719fdSdp 1305087719fdSdp stripcomments(handle); 1306087719fdSdp 1307087719fdSdp if (err != Z_OK) 1308087719fdSdp return (err); 1309087719fdSdp 1310087719fdSdp handle->zone_dh_newzone = B_FALSE; 1311087719fdSdp 1312087719fdSdp if (is_renaming(handle)) { 1313108322fbScarlsonj if (config_file_path(handle->zone_dh_delete_name, delpath)) 1314087719fdSdp (void) unlink(delpath); 1315087719fdSdp handle->zone_dh_delete_name[0] = '\0'; 1316087719fdSdp } 1317087719fdSdp 1318087719fdSdp return (Z_OK); 13197c478bd9Sstevel@tonic-gate } 13207c478bd9Sstevel@tonic-gate 1321ee519a1fSgjelinek int 13229acbbeafSnn35248 zonecfg_verify_save(zone_dochandle_t handle, char *filename) 13239acbbeafSnn35248 { 13249acbbeafSnn35248 int valid; 13259acbbeafSnn35248 13269acbbeafSnn35248 xmlValidCtxt cvp = { NULL }; 13279acbbeafSnn35248 13289acbbeafSnn35248 if (zonecfg_check_handle(handle) != Z_OK) 13299acbbeafSnn35248 return (Z_BAD_HANDLE); 13309acbbeafSnn35248 13319acbbeafSnn35248 cvp.error = zonecfg_error_func; 13329acbbeafSnn35248 cvp.warning = zonecfg_error_func; 13339acbbeafSnn35248 13349acbbeafSnn35248 /* 13359acbbeafSnn35248 * We do a final validation of the document. Since the library has 13369acbbeafSnn35248 * malfunctioned if it fails to validate, we follow-up with an 13379acbbeafSnn35248 * assert() that the doc is valid. 13389acbbeafSnn35248 */ 13399acbbeafSnn35248 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 13409acbbeafSnn35248 assert(valid != 0); 13419acbbeafSnn35248 13429acbbeafSnn35248 if (xmlSaveFormatFile(filename, handle->zone_dh_doc, 1) <= 0) 13439acbbeafSnn35248 return (Z_SAVING_FILE); 13449acbbeafSnn35248 13459acbbeafSnn35248 return (Z_OK); 13469acbbeafSnn35248 } 13479acbbeafSnn35248 13489acbbeafSnn35248 int 13498cd327d5Sgjelinek zonecfg_detach_save(zone_dochandle_t handle, uint_t flags) 1350ee519a1fSgjelinek { 1351ee519a1fSgjelinek char zname[ZONENAME_MAX]; 1352ee519a1fSgjelinek char path[MAXPATHLEN]; 1353ee519a1fSgjelinek char migpath[MAXPATHLEN]; 1354ee519a1fSgjelinek xmlValidCtxt cvp = { NULL }; 1355ee519a1fSgjelinek int err = Z_SAVING_FILE; 13569acbbeafSnn35248 int valid; 1357ee519a1fSgjelinek 1358ee519a1fSgjelinek if (zonecfg_check_handle(handle) != Z_OK) 1359ee519a1fSgjelinek return (Z_BAD_HANDLE); 1360ee519a1fSgjelinek 13618cd327d5Sgjelinek if (flags & ZONE_DRY_RUN) { 13628cd327d5Sgjelinek (void) strlcpy(migpath, "-", sizeof (migpath)); 13638cd327d5Sgjelinek } else { 13648cd327d5Sgjelinek if ((err = zonecfg_get_name(handle, zname, sizeof (zname))) 13658cd327d5Sgjelinek != Z_OK) 1366ee519a1fSgjelinek return (err); 1367ee519a1fSgjelinek 13688cd327d5Sgjelinek if ((err = zone_get_zonepath(zname, path, sizeof (path))) 13698cd327d5Sgjelinek != Z_OK) 1370ee519a1fSgjelinek return (err); 1371ee519a1fSgjelinek 137216ab8c7bSgjelinek if (snprintf(migpath, sizeof (migpath), "%s/%s", path, 137316ab8c7bSgjelinek ZONE_DETACHED) >= sizeof (migpath)) 1374ee519a1fSgjelinek return (Z_NOMEM); 13758cd327d5Sgjelinek } 1376ee519a1fSgjelinek 1377ee519a1fSgjelinek if ((err = operation_prep(handle)) != Z_OK) 1378ee519a1fSgjelinek return (err); 1379ee519a1fSgjelinek 1380ee519a1fSgjelinek addcomment(handle, "\n DO NOT EDIT THIS FILE. " 1381ee519a1fSgjelinek "Use zonecfg(1M) and zoneadm(1M) attach.\n"); 1382ee519a1fSgjelinek 1383ee519a1fSgjelinek cvp.error = zonecfg_error_func; 1384ee519a1fSgjelinek cvp.warning = zonecfg_error_func; 1385ee519a1fSgjelinek 1386ee519a1fSgjelinek /* 13879acbbeafSnn35248 * We do a final validation of the document. Since the library has 13889acbbeafSnn35248 * malfunctioned if it fails to validate, we follow-up with an 13899acbbeafSnn35248 * assert() that the doc is valid. 1390ee519a1fSgjelinek */ 13919acbbeafSnn35248 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 13929acbbeafSnn35248 assert(valid != 0); 1393ee519a1fSgjelinek 1394ee519a1fSgjelinek if (xmlSaveFormatFile(migpath, handle->zone_dh_doc, 1) <= 0) 1395ee519a1fSgjelinek return (Z_SAVING_FILE); 1396ee519a1fSgjelinek 13978cd327d5Sgjelinek if (!(flags & ZONE_DRY_RUN)) 1398ee519a1fSgjelinek (void) chmod(migpath, 0644); 1399ee519a1fSgjelinek 1400ee519a1fSgjelinek stripcomments(handle); 1401ee519a1fSgjelinek 1402ee519a1fSgjelinek handle->zone_dh_newzone = B_FALSE; 1403ee519a1fSgjelinek 1404ee519a1fSgjelinek return (Z_OK); 1405ee519a1fSgjelinek } 1406ee519a1fSgjelinek 1407ee519a1fSgjelinek boolean_t 1408ee519a1fSgjelinek zonecfg_detached(const char *path) 1409ee519a1fSgjelinek { 1410ee519a1fSgjelinek char migpath[MAXPATHLEN]; 1411ee519a1fSgjelinek struct stat buf; 1412ee519a1fSgjelinek 141316ab8c7bSgjelinek if (snprintf(migpath, sizeof (migpath), "%s/%s", path, ZONE_DETACHED) >= 1414ee519a1fSgjelinek sizeof (migpath)) 1415ee519a1fSgjelinek return (B_FALSE); 1416ee519a1fSgjelinek 1417ee519a1fSgjelinek if (stat(migpath, &buf) != -1) 1418ee519a1fSgjelinek return (B_TRUE); 1419ee519a1fSgjelinek 1420ee519a1fSgjelinek return (B_FALSE); 1421ee519a1fSgjelinek } 1422ee519a1fSgjelinek 1423ee519a1fSgjelinek void 1424ee519a1fSgjelinek zonecfg_rm_detached(zone_dochandle_t handle, boolean_t forced) 1425ee519a1fSgjelinek { 1426ee519a1fSgjelinek char zname[ZONENAME_MAX]; 1427ee519a1fSgjelinek char path[MAXPATHLEN]; 1428ee519a1fSgjelinek char detached[MAXPATHLEN]; 1429ee519a1fSgjelinek char attached[MAXPATHLEN]; 1430ee519a1fSgjelinek 1431ee519a1fSgjelinek if (zonecfg_check_handle(handle) != Z_OK) 1432ee519a1fSgjelinek return; 1433ee519a1fSgjelinek 1434ee519a1fSgjelinek if (zonecfg_get_name(handle, zname, sizeof (zname)) != Z_OK) 1435ee519a1fSgjelinek return; 1436ee519a1fSgjelinek 1437ee519a1fSgjelinek if (zone_get_zonepath(zname, path, sizeof (path)) != Z_OK) 1438ee519a1fSgjelinek return; 1439ee519a1fSgjelinek 144016ab8c7bSgjelinek (void) snprintf(detached, sizeof (detached), "%s/%s", path, 144116ab8c7bSgjelinek ZONE_DETACHED); 1442ee519a1fSgjelinek (void) snprintf(attached, sizeof (attached), "%s/%s", path, 1443ee519a1fSgjelinek ATTACH_FORCED); 1444ee519a1fSgjelinek 1445ee519a1fSgjelinek if (forced) { 1446ee519a1fSgjelinek (void) rename(detached, attached); 1447ee519a1fSgjelinek } else { 1448ee519a1fSgjelinek (void) unlink(attached); 1449ee519a1fSgjelinek (void) unlink(detached); 1450ee519a1fSgjelinek } 1451ee519a1fSgjelinek } 1452ee519a1fSgjelinek 14537c478bd9Sstevel@tonic-gate /* 14547c478bd9Sstevel@tonic-gate * Special case: if access(2) fails with ENOENT, then try again using 14557c478bd9Sstevel@tonic-gate * ZONE_CONFIG_ROOT instead of config_file_path(zonename). This is how we 14567c478bd9Sstevel@tonic-gate * work around the case of a config file which has not been created yet: 14577c478bd9Sstevel@tonic-gate * the user will need access to the directory so use that as a heuristic. 14587c478bd9Sstevel@tonic-gate */ 14597c478bd9Sstevel@tonic-gate 14607c478bd9Sstevel@tonic-gate int 14617c478bd9Sstevel@tonic-gate zonecfg_access(const char *zonename, int amode) 14627c478bd9Sstevel@tonic-gate { 14637c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 14647c478bd9Sstevel@tonic-gate 1465108322fbScarlsonj if (!config_file_path(zonename, path)) 1466108322fbScarlsonj return (Z_INVAL); 14677c478bd9Sstevel@tonic-gate if (access(path, amode) == 0) 14687c478bd9Sstevel@tonic-gate return (Z_OK); 1469108322fbScarlsonj if (errno == ENOENT) { 1470108322fbScarlsonj if (snprintf(path, sizeof (path), "%s%s", zonecfg_root, 1471108322fbScarlsonj ZONE_CONFIG_ROOT) >= sizeof (path)) 1472108322fbScarlsonj return (Z_INVAL); 1473108322fbScarlsonj if (access(path, amode) == 0) 14747c478bd9Sstevel@tonic-gate return (Z_OK); 1475108322fbScarlsonj } 14767c478bd9Sstevel@tonic-gate if (errno == EACCES) 14777c478bd9Sstevel@tonic-gate return (Z_ACCES); 14787c478bd9Sstevel@tonic-gate if (errno == EINVAL) 14797c478bd9Sstevel@tonic-gate return (Z_INVAL); 14807c478bd9Sstevel@tonic-gate return (Z_MISC_FS); 14817c478bd9Sstevel@tonic-gate } 14827c478bd9Sstevel@tonic-gate 14837c478bd9Sstevel@tonic-gate int 1484108322fbScarlsonj zonecfg_create_snapshot(const char *zonename) 14857c478bd9Sstevel@tonic-gate { 14867c478bd9Sstevel@tonic-gate zone_dochandle_t handle; 14877c478bd9Sstevel@tonic-gate char path[MAXPATHLEN], zonepath[MAXPATHLEN], rpath[MAXPATHLEN]; 14887c478bd9Sstevel@tonic-gate int error = Z_OK, res; 14897c478bd9Sstevel@tonic-gate 14907c478bd9Sstevel@tonic-gate if ((handle = zonecfg_init_handle()) == NULL) { 14917c478bd9Sstevel@tonic-gate return (Z_NOMEM); 14927c478bd9Sstevel@tonic-gate } 14937c478bd9Sstevel@tonic-gate 1494087719fdSdp handle->zone_dh_newzone = B_TRUE; 1495087719fdSdp handle->zone_dh_snapshot = B_TRUE; 1496087719fdSdp 14977c478bd9Sstevel@tonic-gate if ((error = zonecfg_get_handle(zonename, handle)) != Z_OK) 14987c478bd9Sstevel@tonic-gate goto out; 14997c478bd9Sstevel@tonic-gate if ((error = operation_prep(handle)) != Z_OK) 15007c478bd9Sstevel@tonic-gate goto out; 15017c478bd9Sstevel@tonic-gate error = zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)); 15027c478bd9Sstevel@tonic-gate if (error != Z_OK) 15037c478bd9Sstevel@tonic-gate goto out; 15047c478bd9Sstevel@tonic-gate if ((res = resolvepath(zonepath, rpath, sizeof (rpath))) == -1) { 15057c478bd9Sstevel@tonic-gate error = Z_RESOLVED_PATH; 15067c478bd9Sstevel@tonic-gate goto out; 15077c478bd9Sstevel@tonic-gate } 15087c478bd9Sstevel@tonic-gate /* 15097c478bd9Sstevel@tonic-gate * If the resolved path is not the same as the original path, then 15107c478bd9Sstevel@tonic-gate * save the resolved path in the snapshot, thus preventing any 15117c478bd9Sstevel@tonic-gate * potential problems down the line when zoneadmd goes to unmount 15127c478bd9Sstevel@tonic-gate * file systems and depends on initial string matches with resolved 15137c478bd9Sstevel@tonic-gate * paths. 15147c478bd9Sstevel@tonic-gate */ 15157c478bd9Sstevel@tonic-gate rpath[res] = '\0'; 15167c478bd9Sstevel@tonic-gate if (strcmp(zonepath, rpath) != 0) { 15177c478bd9Sstevel@tonic-gate if ((error = zonecfg_set_zonepath(handle, rpath)) != Z_OK) 15187c478bd9Sstevel@tonic-gate goto out; 15197c478bd9Sstevel@tonic-gate } 1520108322fbScarlsonj if (snprintf(path, sizeof (path), "%s%s", zonecfg_root, 1521108322fbScarlsonj ZONE_SNAPSHOT_ROOT) >= sizeof (path)) { 1522108322fbScarlsonj error = Z_MISC_FS; 1523108322fbScarlsonj goto out; 1524108322fbScarlsonj } 1525108322fbScarlsonj if ((mkdir(path, S_IRWXU) == -1) && (errno != EEXIST)) { 15267c478bd9Sstevel@tonic-gate error = Z_MISC_FS; 15277c478bd9Sstevel@tonic-gate goto out; 15287c478bd9Sstevel@tonic-gate } 15297c478bd9Sstevel@tonic-gate 1530108322fbScarlsonj if (!snap_file_path(zonename, path)) { 1531108322fbScarlsonj error = Z_MISC_FS; 1532108322fbScarlsonj goto out; 1533108322fbScarlsonj } 1534087719fdSdp 1535087719fdSdp addcomment(handle, "\n DO NOT EDIT THIS FILE. " 1536087719fdSdp "It is a snapshot of running zone state.\n"); 1537087719fdSdp 15387c478bd9Sstevel@tonic-gate error = zonecfg_save_impl(handle, path); 15397c478bd9Sstevel@tonic-gate 1540087719fdSdp stripcomments(handle); 1541087719fdSdp 15427c478bd9Sstevel@tonic-gate out: 15437c478bd9Sstevel@tonic-gate zonecfg_fini_handle(handle); 15447c478bd9Sstevel@tonic-gate return (error); 15457c478bd9Sstevel@tonic-gate } 15467c478bd9Sstevel@tonic-gate 1547f4b3ec61Sdh155122 int 1548f4b3ec61Sdh155122 zonecfg_get_iptype(zone_dochandle_t handle, zone_iptype_t *iptypep) 1549f4b3ec61Sdh155122 { 1550f4b3ec61Sdh155122 char property[10]; /* 10 is big enough for "shared"/"exclusive" */ 1551f4b3ec61Sdh155122 int err; 1552f4b3ec61Sdh155122 1553f4b3ec61Sdh155122 err = getrootattr(handle, DTD_ATTR_IPTYPE, property, sizeof (property)); 1554f4b3ec61Sdh155122 if (err == Z_BAD_PROPERTY) { 1555f4b3ec61Sdh155122 /* Return default value */ 1556f4b3ec61Sdh155122 *iptypep = ZS_SHARED; 1557f4b3ec61Sdh155122 return (Z_OK); 1558f4b3ec61Sdh155122 } else if (err != Z_OK) { 1559f4b3ec61Sdh155122 return (err); 1560f4b3ec61Sdh155122 } 1561f4b3ec61Sdh155122 1562f4b3ec61Sdh155122 if (strlen(property) == 0 || 1563f4b3ec61Sdh155122 strcmp(property, "shared") == 0) 1564f4b3ec61Sdh155122 *iptypep = ZS_SHARED; 1565f4b3ec61Sdh155122 else if (strcmp(property, "exclusive") == 0) 1566f4b3ec61Sdh155122 *iptypep = ZS_EXCLUSIVE; 1567f4b3ec61Sdh155122 else 1568f4b3ec61Sdh155122 return (Z_INVAL); 1569f4b3ec61Sdh155122 1570f4b3ec61Sdh155122 return (Z_OK); 1571f4b3ec61Sdh155122 } 1572f4b3ec61Sdh155122 1573f4b3ec61Sdh155122 int 1574f4b3ec61Sdh155122 zonecfg_set_iptype(zone_dochandle_t handle, zone_iptype_t iptype) 1575f4b3ec61Sdh155122 { 1576f4b3ec61Sdh155122 xmlNodePtr cur; 1577f4b3ec61Sdh155122 1578f4b3ec61Sdh155122 if (handle == NULL) 1579f4b3ec61Sdh155122 return (Z_INVAL); 1580f4b3ec61Sdh155122 1581f4b3ec61Sdh155122 cur = xmlDocGetRootElement(handle->zone_dh_doc); 1582f4b3ec61Sdh155122 if (cur == NULL) { 1583f4b3ec61Sdh155122 return (Z_EMPTY_DOCUMENT); 1584f4b3ec61Sdh155122 } 1585f4b3ec61Sdh155122 1586f4b3ec61Sdh155122 if (xmlStrcmp(cur->name, DTD_ELEM_ZONE) != 0) { 1587f4b3ec61Sdh155122 return (Z_WRONG_DOC_TYPE); 1588f4b3ec61Sdh155122 } 1589f4b3ec61Sdh155122 switch (iptype) { 1590f4b3ec61Sdh155122 case ZS_SHARED: 1591f4b3ec61Sdh155122 /* 1592f4b3ec61Sdh155122 * Since "shared" is the default, we don't write it to the 1593f4b3ec61Sdh155122 * configuration file, so that it's easier to migrate those 1594f4b3ec61Sdh155122 * zones elsewhere, eg., to systems which are not IP-Instances 1595f4b3ec61Sdh155122 * aware. 1596f4b3ec61Sdh155122 * xmlUnsetProp only fails when the attribute doesn't exist, 1597f4b3ec61Sdh155122 * which we don't care. 1598f4b3ec61Sdh155122 */ 1599f4b3ec61Sdh155122 (void) xmlUnsetProp(cur, DTD_ATTR_IPTYPE); 1600f4b3ec61Sdh155122 break; 1601f4b3ec61Sdh155122 case ZS_EXCLUSIVE: 1602f4b3ec61Sdh155122 if (xmlSetProp(cur, DTD_ATTR_IPTYPE, 1603f4b3ec61Sdh155122 (const xmlChar *) "exclusive") == NULL) 1604f4b3ec61Sdh155122 return (Z_INVAL); 1605f4b3ec61Sdh155122 break; 1606f4b3ec61Sdh155122 } 1607f4b3ec61Sdh155122 return (Z_OK); 1608f4b3ec61Sdh155122 } 1609f4b3ec61Sdh155122 16107c478bd9Sstevel@tonic-gate static int 1611a1be23daSdp newprop(xmlNodePtr node, const xmlChar *attrname, char *src) 16127c478bd9Sstevel@tonic-gate { 16137c478bd9Sstevel@tonic-gate xmlAttrPtr newattr; 16147c478bd9Sstevel@tonic-gate 16157c478bd9Sstevel@tonic-gate newattr = xmlNewProp(node, attrname, (xmlChar *)src); 16167c478bd9Sstevel@tonic-gate if (newattr == NULL) { 16177c478bd9Sstevel@tonic-gate xmlUnlinkNode(node); 16187c478bd9Sstevel@tonic-gate xmlFreeNode(node); 16197c478bd9Sstevel@tonic-gate return (Z_BAD_PROPERTY); 16207c478bd9Sstevel@tonic-gate } 16217c478bd9Sstevel@tonic-gate return (Z_OK); 16227c478bd9Sstevel@tonic-gate } 16237c478bd9Sstevel@tonic-gate 16247c478bd9Sstevel@tonic-gate static int 16257c478bd9Sstevel@tonic-gate zonecfg_add_filesystem_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 16267c478bd9Sstevel@tonic-gate { 16277c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur, options_node; 16287c478bd9Sstevel@tonic-gate zone_fsopt_t *ptr; 16297c478bd9Sstevel@tonic-gate int err; 16307c478bd9Sstevel@tonic-gate 16317c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_FS, NULL); 1632a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_SPECIAL, 16337c478bd9Sstevel@tonic-gate tabptr->zone_fs_special)) != Z_OK) 16347c478bd9Sstevel@tonic-gate return (err); 16357c478bd9Sstevel@tonic-gate if (tabptr->zone_fs_raw[0] != '\0' && 1636a1be23daSdp (err = newprop(newnode, DTD_ATTR_RAW, tabptr->zone_fs_raw)) != Z_OK) 16377c478bd9Sstevel@tonic-gate return (err); 1638a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_DIR, tabptr->zone_fs_dir)) != Z_OK) 16397c478bd9Sstevel@tonic-gate return (err); 1640a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_TYPE, 16417c478bd9Sstevel@tonic-gate tabptr->zone_fs_type)) != Z_OK) 16427c478bd9Sstevel@tonic-gate return (err); 16437c478bd9Sstevel@tonic-gate if (tabptr->zone_fs_options != NULL) { 16447c478bd9Sstevel@tonic-gate for (ptr = tabptr->zone_fs_options; ptr != NULL; 16457c478bd9Sstevel@tonic-gate ptr = ptr->zone_fsopt_next) { 16467c478bd9Sstevel@tonic-gate options_node = xmlNewTextChild(newnode, NULL, 16477c478bd9Sstevel@tonic-gate DTD_ELEM_FSOPTION, NULL); 1648a1be23daSdp if ((err = newprop(options_node, DTD_ATTR_NAME, 16497c478bd9Sstevel@tonic-gate ptr->zone_fsopt_opt)) != Z_OK) 16507c478bd9Sstevel@tonic-gate return (err); 16517c478bd9Sstevel@tonic-gate } 16527c478bd9Sstevel@tonic-gate } 16537c478bd9Sstevel@tonic-gate return (Z_OK); 16547c478bd9Sstevel@tonic-gate } 16557c478bd9Sstevel@tonic-gate 16567c478bd9Sstevel@tonic-gate int 16577c478bd9Sstevel@tonic-gate zonecfg_add_filesystem(zone_dochandle_t handle, struct zone_fstab *tabptr) 16587c478bd9Sstevel@tonic-gate { 16597c478bd9Sstevel@tonic-gate int err; 16607c478bd9Sstevel@tonic-gate 16617c478bd9Sstevel@tonic-gate if (tabptr == NULL) 16627c478bd9Sstevel@tonic-gate return (Z_INVAL); 16637c478bd9Sstevel@tonic-gate 16647c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 16657c478bd9Sstevel@tonic-gate return (err); 16667c478bd9Sstevel@tonic-gate 16677c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_filesystem_core(handle, tabptr)) != Z_OK) 16687c478bd9Sstevel@tonic-gate return (err); 16697c478bd9Sstevel@tonic-gate 16707c478bd9Sstevel@tonic-gate return (Z_OK); 16717c478bd9Sstevel@tonic-gate } 16727c478bd9Sstevel@tonic-gate 16737c478bd9Sstevel@tonic-gate static int 16747c478bd9Sstevel@tonic-gate zonecfg_add_ipd_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 16757c478bd9Sstevel@tonic-gate { 16767c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur; 16777c478bd9Sstevel@tonic-gate int err; 16787c478bd9Sstevel@tonic-gate 16797c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_IPD, NULL); 1680a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_DIR, tabptr->zone_fs_dir)) != Z_OK) 16817c478bd9Sstevel@tonic-gate return (err); 16827c478bd9Sstevel@tonic-gate return (Z_OK); 16837c478bd9Sstevel@tonic-gate } 16847c478bd9Sstevel@tonic-gate 16857c478bd9Sstevel@tonic-gate int 16867c478bd9Sstevel@tonic-gate zonecfg_add_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 16877c478bd9Sstevel@tonic-gate { 16887c478bd9Sstevel@tonic-gate int err; 16897c478bd9Sstevel@tonic-gate 16907c478bd9Sstevel@tonic-gate if (tabptr == NULL) 16917c478bd9Sstevel@tonic-gate return (Z_INVAL); 16927c478bd9Sstevel@tonic-gate 16937c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 16947c478bd9Sstevel@tonic-gate return (err); 16957c478bd9Sstevel@tonic-gate 16967c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_ipd_core(handle, tabptr)) != Z_OK) 16977c478bd9Sstevel@tonic-gate return (err); 16987c478bd9Sstevel@tonic-gate 16997c478bd9Sstevel@tonic-gate return (Z_OK); 17007c478bd9Sstevel@tonic-gate } 17017c478bd9Sstevel@tonic-gate 17027c478bd9Sstevel@tonic-gate int 17037c478bd9Sstevel@tonic-gate zonecfg_add_fs_option(struct zone_fstab *tabptr, char *option) 17047c478bd9Sstevel@tonic-gate { 17057c478bd9Sstevel@tonic-gate zone_fsopt_t *last, *old, *new; 17067c478bd9Sstevel@tonic-gate 17077c478bd9Sstevel@tonic-gate last = tabptr->zone_fs_options; 17087c478bd9Sstevel@tonic-gate for (old = last; old != NULL; old = old->zone_fsopt_next) 17097c478bd9Sstevel@tonic-gate last = old; /* walk to the end of the list */ 17107c478bd9Sstevel@tonic-gate new = (zone_fsopt_t *)malloc(sizeof (zone_fsopt_t)); 17117c478bd9Sstevel@tonic-gate if (new == NULL) 17127c478bd9Sstevel@tonic-gate return (Z_NOMEM); 17137c478bd9Sstevel@tonic-gate (void) strlcpy(new->zone_fsopt_opt, option, 17147c478bd9Sstevel@tonic-gate sizeof (new->zone_fsopt_opt)); 17157c478bd9Sstevel@tonic-gate new->zone_fsopt_next = NULL; 17167c478bd9Sstevel@tonic-gate if (last == NULL) 17177c478bd9Sstevel@tonic-gate tabptr->zone_fs_options = new; 17187c478bd9Sstevel@tonic-gate else 17197c478bd9Sstevel@tonic-gate last->zone_fsopt_next = new; 17207c478bd9Sstevel@tonic-gate return (Z_OK); 17217c478bd9Sstevel@tonic-gate } 17227c478bd9Sstevel@tonic-gate 17237c478bd9Sstevel@tonic-gate int 17247c478bd9Sstevel@tonic-gate zonecfg_remove_fs_option(struct zone_fstab *tabptr, char *option) 17257c478bd9Sstevel@tonic-gate { 17267c478bd9Sstevel@tonic-gate zone_fsopt_t *last, *this, *next; 17277c478bd9Sstevel@tonic-gate 17287c478bd9Sstevel@tonic-gate last = tabptr->zone_fs_options; 17297c478bd9Sstevel@tonic-gate for (this = last; this != NULL; this = this->zone_fsopt_next) { 17307c478bd9Sstevel@tonic-gate if (strcmp(this->zone_fsopt_opt, option) == 0) { 17317c478bd9Sstevel@tonic-gate next = this->zone_fsopt_next; 17327c478bd9Sstevel@tonic-gate if (this == tabptr->zone_fs_options) 17337c478bd9Sstevel@tonic-gate tabptr->zone_fs_options = next; 17347c478bd9Sstevel@tonic-gate else 17357c478bd9Sstevel@tonic-gate last->zone_fsopt_next = next; 17367c478bd9Sstevel@tonic-gate free(this); 17377c478bd9Sstevel@tonic-gate return (Z_OK); 17387c478bd9Sstevel@tonic-gate } else 17397c478bd9Sstevel@tonic-gate last = this; 17407c478bd9Sstevel@tonic-gate } 17417c478bd9Sstevel@tonic-gate return (Z_NO_PROPERTY_ID); 17427c478bd9Sstevel@tonic-gate } 17437c478bd9Sstevel@tonic-gate 17447c478bd9Sstevel@tonic-gate void 17457c478bd9Sstevel@tonic-gate zonecfg_free_fs_option_list(zone_fsopt_t *list) 17467c478bd9Sstevel@tonic-gate { 17477c478bd9Sstevel@tonic-gate zone_fsopt_t *this, *next; 17487c478bd9Sstevel@tonic-gate 17497c478bd9Sstevel@tonic-gate for (this = list; this != NULL; this = next) { 17507c478bd9Sstevel@tonic-gate next = this->zone_fsopt_next; 17517c478bd9Sstevel@tonic-gate free(this); 17527c478bd9Sstevel@tonic-gate } 17537c478bd9Sstevel@tonic-gate } 17547c478bd9Sstevel@tonic-gate 17557c478bd9Sstevel@tonic-gate void 17567c478bd9Sstevel@tonic-gate zonecfg_free_rctl_value_list(struct zone_rctlvaltab *valtab) 17577c478bd9Sstevel@tonic-gate { 17587c478bd9Sstevel@tonic-gate if (valtab == NULL) 17597c478bd9Sstevel@tonic-gate return; 17607c478bd9Sstevel@tonic-gate zonecfg_free_rctl_value_list(valtab->zone_rctlval_next); 17617c478bd9Sstevel@tonic-gate free(valtab); 17627c478bd9Sstevel@tonic-gate } 17637c478bd9Sstevel@tonic-gate 17647c478bd9Sstevel@tonic-gate static boolean_t 17657c478bd9Sstevel@tonic-gate match_prop(xmlNodePtr cur, const xmlChar *attr, char *user_prop) 17667c478bd9Sstevel@tonic-gate { 17677c478bd9Sstevel@tonic-gate xmlChar *gotten_prop; 17687c478bd9Sstevel@tonic-gate int prop_result; 17697c478bd9Sstevel@tonic-gate 17707c478bd9Sstevel@tonic-gate gotten_prop = xmlGetProp(cur, attr); 17717c478bd9Sstevel@tonic-gate if (gotten_prop == NULL) /* shouldn't happen */ 17727c478bd9Sstevel@tonic-gate return (B_FALSE); 17737c478bd9Sstevel@tonic-gate prop_result = xmlStrcmp(gotten_prop, (const xmlChar *) user_prop); 17747c478bd9Sstevel@tonic-gate xmlFree(gotten_prop); 17757c478bd9Sstevel@tonic-gate return ((prop_result == 0)); 17767c478bd9Sstevel@tonic-gate } 17777c478bd9Sstevel@tonic-gate 17787c478bd9Sstevel@tonic-gate static int 17797c478bd9Sstevel@tonic-gate zonecfg_delete_filesystem_core(zone_dochandle_t handle, 17807c478bd9Sstevel@tonic-gate struct zone_fstab *tabptr) 17817c478bd9Sstevel@tonic-gate { 17827c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 17837c478bd9Sstevel@tonic-gate boolean_t dir_match, spec_match, raw_match, type_match; 17847c478bd9Sstevel@tonic-gate 17857c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 17867c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_FS)) 17877c478bd9Sstevel@tonic-gate continue; 17887c478bd9Sstevel@tonic-gate dir_match = match_prop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir); 17897c478bd9Sstevel@tonic-gate spec_match = match_prop(cur, DTD_ATTR_SPECIAL, 17907c478bd9Sstevel@tonic-gate tabptr->zone_fs_special); 17917c478bd9Sstevel@tonic-gate raw_match = match_prop(cur, DTD_ATTR_RAW, 17927c478bd9Sstevel@tonic-gate tabptr->zone_fs_raw); 17937c478bd9Sstevel@tonic-gate type_match = match_prop(cur, DTD_ATTR_TYPE, 17947c478bd9Sstevel@tonic-gate tabptr->zone_fs_type); 17957c478bd9Sstevel@tonic-gate if (dir_match && spec_match && raw_match && type_match) { 17967c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 17977c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 17987c478bd9Sstevel@tonic-gate return (Z_OK); 17997c478bd9Sstevel@tonic-gate } 18007c478bd9Sstevel@tonic-gate } 18017c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 18027c478bd9Sstevel@tonic-gate } 18037c478bd9Sstevel@tonic-gate 18047c478bd9Sstevel@tonic-gate int 18057c478bd9Sstevel@tonic-gate zonecfg_delete_filesystem(zone_dochandle_t handle, struct zone_fstab *tabptr) 18067c478bd9Sstevel@tonic-gate { 18077c478bd9Sstevel@tonic-gate int err; 18087c478bd9Sstevel@tonic-gate 18097c478bd9Sstevel@tonic-gate if (tabptr == NULL) 18107c478bd9Sstevel@tonic-gate return (Z_INVAL); 18117c478bd9Sstevel@tonic-gate 18127c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 18137c478bd9Sstevel@tonic-gate return (err); 18147c478bd9Sstevel@tonic-gate 18157c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_filesystem_core(handle, tabptr)) != Z_OK) 18167c478bd9Sstevel@tonic-gate return (err); 18177c478bd9Sstevel@tonic-gate 18187c478bd9Sstevel@tonic-gate return (Z_OK); 18197c478bd9Sstevel@tonic-gate } 18207c478bd9Sstevel@tonic-gate 18217c478bd9Sstevel@tonic-gate int 18227c478bd9Sstevel@tonic-gate zonecfg_modify_filesystem( 18237c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 18247c478bd9Sstevel@tonic-gate struct zone_fstab *oldtabptr, 18257c478bd9Sstevel@tonic-gate struct zone_fstab *newtabptr) 18267c478bd9Sstevel@tonic-gate { 18277c478bd9Sstevel@tonic-gate int err; 18287c478bd9Sstevel@tonic-gate 18297c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 18307c478bd9Sstevel@tonic-gate return (Z_INVAL); 18317c478bd9Sstevel@tonic-gate 18327c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 18337c478bd9Sstevel@tonic-gate return (err); 18347c478bd9Sstevel@tonic-gate 18357c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_filesystem_core(handle, oldtabptr)) != Z_OK) 18367c478bd9Sstevel@tonic-gate return (err); 18377c478bd9Sstevel@tonic-gate 18387c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_filesystem_core(handle, newtabptr)) != Z_OK) 18397c478bd9Sstevel@tonic-gate return (err); 18407c478bd9Sstevel@tonic-gate 18417c478bd9Sstevel@tonic-gate return (Z_OK); 18427c478bd9Sstevel@tonic-gate } 18437c478bd9Sstevel@tonic-gate 18447c478bd9Sstevel@tonic-gate static int 18457c478bd9Sstevel@tonic-gate zonecfg_delete_ipd_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 18467c478bd9Sstevel@tonic-gate { 18477c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 18487c478bd9Sstevel@tonic-gate 18497c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 18507c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_IPD)) 18517c478bd9Sstevel@tonic-gate continue; 18527c478bd9Sstevel@tonic-gate if (match_prop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir)) { 18537c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 18547c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 18557c478bd9Sstevel@tonic-gate return (Z_OK); 18567c478bd9Sstevel@tonic-gate } 18577c478bd9Sstevel@tonic-gate } 18587c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 18597c478bd9Sstevel@tonic-gate } 18607c478bd9Sstevel@tonic-gate 18617c478bd9Sstevel@tonic-gate int 18627c478bd9Sstevel@tonic-gate zonecfg_delete_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 18637c478bd9Sstevel@tonic-gate { 18647c478bd9Sstevel@tonic-gate int err; 18657c478bd9Sstevel@tonic-gate 18667c478bd9Sstevel@tonic-gate if (tabptr == NULL) 18677c478bd9Sstevel@tonic-gate return (Z_INVAL); 18687c478bd9Sstevel@tonic-gate 18697c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 18707c478bd9Sstevel@tonic-gate return (err); 18717c478bd9Sstevel@tonic-gate 18727c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_ipd_core(handle, tabptr)) != Z_OK) 18737c478bd9Sstevel@tonic-gate return (err); 18747c478bd9Sstevel@tonic-gate 18757c478bd9Sstevel@tonic-gate return (Z_OK); 18767c478bd9Sstevel@tonic-gate } 18777c478bd9Sstevel@tonic-gate 18787c478bd9Sstevel@tonic-gate int 18797c478bd9Sstevel@tonic-gate zonecfg_modify_ipd(zone_dochandle_t handle, struct zone_fstab *oldtabptr, 18807c478bd9Sstevel@tonic-gate struct zone_fstab *newtabptr) 18817c478bd9Sstevel@tonic-gate { 18827c478bd9Sstevel@tonic-gate int err; 18837c478bd9Sstevel@tonic-gate 18847c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 18857c478bd9Sstevel@tonic-gate return (Z_INVAL); 18867c478bd9Sstevel@tonic-gate 18877c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 18887c478bd9Sstevel@tonic-gate return (err); 18897c478bd9Sstevel@tonic-gate 18907c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_ipd_core(handle, oldtabptr)) != Z_OK) 18917c478bd9Sstevel@tonic-gate return (err); 18927c478bd9Sstevel@tonic-gate 18937c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_ipd_core(handle, newtabptr)) != Z_OK) 18947c478bd9Sstevel@tonic-gate return (err); 18957c478bd9Sstevel@tonic-gate 18967c478bd9Sstevel@tonic-gate return (Z_OK); 18977c478bd9Sstevel@tonic-gate } 18987c478bd9Sstevel@tonic-gate 18997c478bd9Sstevel@tonic-gate int 19007c478bd9Sstevel@tonic-gate zonecfg_lookup_filesystem( 19017c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 19027c478bd9Sstevel@tonic-gate struct zone_fstab *tabptr) 19037c478bd9Sstevel@tonic-gate { 19047c478bd9Sstevel@tonic-gate xmlNodePtr cur, options, firstmatch; 19057c478bd9Sstevel@tonic-gate int err; 19067c478bd9Sstevel@tonic-gate char dirname[MAXPATHLEN], special[MAXPATHLEN], raw[MAXPATHLEN]; 19077c478bd9Sstevel@tonic-gate char type[FSTYPSZ]; 19087c478bd9Sstevel@tonic-gate char options_str[MAX_MNTOPT_STR]; 19097c478bd9Sstevel@tonic-gate 19107c478bd9Sstevel@tonic-gate if (tabptr == NULL) 19117c478bd9Sstevel@tonic-gate return (Z_INVAL); 19127c478bd9Sstevel@tonic-gate 19137c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 19147c478bd9Sstevel@tonic-gate return (err); 19157c478bd9Sstevel@tonic-gate 19167c478bd9Sstevel@tonic-gate /* 19177c478bd9Sstevel@tonic-gate * Walk the list of children looking for matches on any properties 19187c478bd9Sstevel@tonic-gate * specified in the fstab parameter. If more than one resource 19197c478bd9Sstevel@tonic-gate * matches, we return Z_INSUFFICIENT_SPEC; if none match, we return 19207c478bd9Sstevel@tonic-gate * Z_NO_RESOURCE_ID. 19217c478bd9Sstevel@tonic-gate */ 19227c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 19237c478bd9Sstevel@tonic-gate firstmatch = NULL; 19247c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 19257c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_FS)) 19267c478bd9Sstevel@tonic-gate continue; 19277c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_dir) > 0) { 19287c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_DIR, dirname, 19297c478bd9Sstevel@tonic-gate sizeof (dirname)) == Z_OK) && 19307c478bd9Sstevel@tonic-gate (strcmp(tabptr->zone_fs_dir, dirname) == 0)) { 19317c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 19327c478bd9Sstevel@tonic-gate firstmatch = cur; 19337c478bd9Sstevel@tonic-gate else 19347c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 19357c478bd9Sstevel@tonic-gate } 19367c478bd9Sstevel@tonic-gate } 19377c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_special) > 0) { 19387c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_SPECIAL, special, 19397c478bd9Sstevel@tonic-gate sizeof (special)) == Z_OK)) { 19407c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_fs_special, 19417c478bd9Sstevel@tonic-gate special) == 0) { 19427c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 19437c478bd9Sstevel@tonic-gate firstmatch = cur; 19447c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 19457c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 19467c478bd9Sstevel@tonic-gate } else { 19477c478bd9Sstevel@tonic-gate /* 19487c478bd9Sstevel@tonic-gate * If another property matched but this 19497c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 19507c478bd9Sstevel@tonic-gate */ 19517c478bd9Sstevel@tonic-gate if (firstmatch == cur) 19527c478bd9Sstevel@tonic-gate firstmatch = NULL; 19537c478bd9Sstevel@tonic-gate } 19547c478bd9Sstevel@tonic-gate } 19557c478bd9Sstevel@tonic-gate } 19567c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_raw) > 0) { 19577c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_RAW, raw, 19587c478bd9Sstevel@tonic-gate sizeof (raw)) == Z_OK)) { 19597c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_fs_raw, raw) == 0) { 19607c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 19617c478bd9Sstevel@tonic-gate firstmatch = cur; 19627c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 19637c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 19647c478bd9Sstevel@tonic-gate } else { 19657c478bd9Sstevel@tonic-gate /* 19667c478bd9Sstevel@tonic-gate * If another property matched but this 19677c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 19687c478bd9Sstevel@tonic-gate */ 19697c478bd9Sstevel@tonic-gate if (firstmatch == cur) 19707c478bd9Sstevel@tonic-gate firstmatch = NULL; 19717c478bd9Sstevel@tonic-gate } 19727c478bd9Sstevel@tonic-gate } 19737c478bd9Sstevel@tonic-gate } 19747c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_type) > 0) { 19757c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_TYPE, type, 19767c478bd9Sstevel@tonic-gate sizeof (type)) == Z_OK)) { 19777c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_fs_type, type) == 0) { 19787c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 19797c478bd9Sstevel@tonic-gate firstmatch = cur; 19807c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 19817c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 19827c478bd9Sstevel@tonic-gate } else { 19837c478bd9Sstevel@tonic-gate /* 19847c478bd9Sstevel@tonic-gate * If another property matched but this 19857c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 19867c478bd9Sstevel@tonic-gate */ 19877c478bd9Sstevel@tonic-gate if (firstmatch == cur) 19887c478bd9Sstevel@tonic-gate firstmatch = NULL; 19897c478bd9Sstevel@tonic-gate } 19907c478bd9Sstevel@tonic-gate } 19917c478bd9Sstevel@tonic-gate } 19927c478bd9Sstevel@tonic-gate } 19937c478bd9Sstevel@tonic-gate 19947c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 19957c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 19967c478bd9Sstevel@tonic-gate 19977c478bd9Sstevel@tonic-gate cur = firstmatch; 19987c478bd9Sstevel@tonic-gate 19997c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 20007c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_dir))) != Z_OK) 20017c478bd9Sstevel@tonic-gate return (err); 20027c478bd9Sstevel@tonic-gate 20037c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_SPECIAL, tabptr->zone_fs_special, 20047c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_special))) != Z_OK) 20057c478bd9Sstevel@tonic-gate return (err); 20067c478bd9Sstevel@tonic-gate 20077c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_RAW, tabptr->zone_fs_raw, 20087c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_raw))) != Z_OK) 20097c478bd9Sstevel@tonic-gate return (err); 20107c478bd9Sstevel@tonic-gate 20117c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_fs_type, 20127c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_type))) != Z_OK) 20137c478bd9Sstevel@tonic-gate return (err); 20147c478bd9Sstevel@tonic-gate 20157c478bd9Sstevel@tonic-gate /* options are optional */ 20167c478bd9Sstevel@tonic-gate tabptr->zone_fs_options = NULL; 20177c478bd9Sstevel@tonic-gate for (options = cur->xmlChildrenNode; options != NULL; 20187c478bd9Sstevel@tonic-gate options = options->next) { 20197c478bd9Sstevel@tonic-gate if ((fetchprop(options, DTD_ATTR_NAME, options_str, 20207c478bd9Sstevel@tonic-gate sizeof (options_str)) != Z_OK)) 20217c478bd9Sstevel@tonic-gate break; 20227c478bd9Sstevel@tonic-gate if (zonecfg_add_fs_option(tabptr, options_str) != Z_OK) 20237c478bd9Sstevel@tonic-gate break; 20247c478bd9Sstevel@tonic-gate } 20257c478bd9Sstevel@tonic-gate return (Z_OK); 20267c478bd9Sstevel@tonic-gate } 20277c478bd9Sstevel@tonic-gate 20287c478bd9Sstevel@tonic-gate int 20297c478bd9Sstevel@tonic-gate zonecfg_lookup_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 20307c478bd9Sstevel@tonic-gate { 20317c478bd9Sstevel@tonic-gate xmlNodePtr cur, match; 20327c478bd9Sstevel@tonic-gate int err; 20337c478bd9Sstevel@tonic-gate char dirname[MAXPATHLEN]; 20347c478bd9Sstevel@tonic-gate 20357c478bd9Sstevel@tonic-gate if (tabptr == NULL) 20367c478bd9Sstevel@tonic-gate return (Z_INVAL); 20377c478bd9Sstevel@tonic-gate 20387c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 20397c478bd9Sstevel@tonic-gate return (err); 20407c478bd9Sstevel@tonic-gate 20417c478bd9Sstevel@tonic-gate /* 20427c478bd9Sstevel@tonic-gate * General algorithm: 20437c478bd9Sstevel@tonic-gate * Walk the list of children looking for matches on any properties 20447c478bd9Sstevel@tonic-gate * specified in the fstab parameter. If more than one resource 20457c478bd9Sstevel@tonic-gate * matches, we return Z_INSUFFICIENT_SPEC; if none match, we return 20467c478bd9Sstevel@tonic-gate * Z_NO_RESOURCE_ID. 20477c478bd9Sstevel@tonic-gate */ 20487c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 20497c478bd9Sstevel@tonic-gate match = NULL; 20507c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 20517c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_IPD)) 20527c478bd9Sstevel@tonic-gate continue; 20537c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_dir) > 0) { 20547c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_DIR, dirname, 20557c478bd9Sstevel@tonic-gate sizeof (dirname)) == Z_OK) && 20567c478bd9Sstevel@tonic-gate (strcmp(tabptr->zone_fs_dir, dirname) == 0)) { 20577c478bd9Sstevel@tonic-gate if (match == NULL) 20587c478bd9Sstevel@tonic-gate match = cur; 20597c478bd9Sstevel@tonic-gate else 20607c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 20617c478bd9Sstevel@tonic-gate } 20627c478bd9Sstevel@tonic-gate } 20637c478bd9Sstevel@tonic-gate } 20647c478bd9Sstevel@tonic-gate 20657c478bd9Sstevel@tonic-gate if (match == NULL) 20667c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 20677c478bd9Sstevel@tonic-gate 20687c478bd9Sstevel@tonic-gate cur = match; 20697c478bd9Sstevel@tonic-gate 20707c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 20717c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_dir))) != Z_OK) 20727c478bd9Sstevel@tonic-gate return (err); 20737c478bd9Sstevel@tonic-gate 20747c478bd9Sstevel@tonic-gate return (Z_OK); 20757c478bd9Sstevel@tonic-gate } 20767c478bd9Sstevel@tonic-gate 20777c478bd9Sstevel@tonic-gate /* 20787c478bd9Sstevel@tonic-gate * Compare two IP addresses in string form. Allow for the possibility that 20797c478bd9Sstevel@tonic-gate * one might have "/<prefix-length>" at the end: allow a match on just the 20807c478bd9Sstevel@tonic-gate * IP address (or host name) part. 20817c478bd9Sstevel@tonic-gate */ 20827c478bd9Sstevel@tonic-gate 20837c478bd9Sstevel@tonic-gate boolean_t 20847c478bd9Sstevel@tonic-gate zonecfg_same_net_address(char *a1, char *a2) 20857c478bd9Sstevel@tonic-gate { 20867c478bd9Sstevel@tonic-gate char *slashp, *slashp1, *slashp2; 20877c478bd9Sstevel@tonic-gate int result; 20887c478bd9Sstevel@tonic-gate 20897c478bd9Sstevel@tonic-gate if (strcmp(a1, a2) == 0) 20907c478bd9Sstevel@tonic-gate return (B_TRUE); 20917c478bd9Sstevel@tonic-gate 20927c478bd9Sstevel@tonic-gate /* 20937c478bd9Sstevel@tonic-gate * If neither has a slash or both do, they need to match to be 20947c478bd9Sstevel@tonic-gate * considered the same, but they did not match above, so fail. 20957c478bd9Sstevel@tonic-gate */ 20967c478bd9Sstevel@tonic-gate slashp1 = strchr(a1, '/'); 20977c478bd9Sstevel@tonic-gate slashp2 = strchr(a2, '/'); 20987c478bd9Sstevel@tonic-gate if ((slashp1 == NULL && slashp2 == NULL) || 20997c478bd9Sstevel@tonic-gate (slashp1 != NULL && slashp2 != NULL)) 21007c478bd9Sstevel@tonic-gate return (B_FALSE); 21017c478bd9Sstevel@tonic-gate 21027c478bd9Sstevel@tonic-gate /* 21037c478bd9Sstevel@tonic-gate * Only one had a slash: pick that one, zero out the slash, compare 21047c478bd9Sstevel@tonic-gate * the "address only" strings, restore the slash, and return the 21057c478bd9Sstevel@tonic-gate * result of the comparison. 21067c478bd9Sstevel@tonic-gate */ 21077c478bd9Sstevel@tonic-gate slashp = (slashp1 == NULL) ? slashp2 : slashp1; 21087c478bd9Sstevel@tonic-gate *slashp = '\0'; 21097c478bd9Sstevel@tonic-gate result = strcmp(a1, a2); 21107c478bd9Sstevel@tonic-gate *slashp = '/'; 21117c478bd9Sstevel@tonic-gate return ((result == 0)); 21127c478bd9Sstevel@tonic-gate } 21137c478bd9Sstevel@tonic-gate 21147c478bd9Sstevel@tonic-gate int 21157c478bd9Sstevel@tonic-gate zonecfg_valid_net_address(char *address, struct lifreq *lifr) 21167c478bd9Sstevel@tonic-gate { 21177c478bd9Sstevel@tonic-gate struct sockaddr_in *sin4; 21187c478bd9Sstevel@tonic-gate struct sockaddr_in6 *sin6; 21197c478bd9Sstevel@tonic-gate struct addrinfo hints, *result; 21207c478bd9Sstevel@tonic-gate char *slashp = strchr(address, '/'); 21217c478bd9Sstevel@tonic-gate 21227c478bd9Sstevel@tonic-gate bzero(lifr, sizeof (struct lifreq)); 21237c478bd9Sstevel@tonic-gate sin4 = (struct sockaddr_in *)&lifr->lifr_addr; 21247c478bd9Sstevel@tonic-gate sin6 = (struct sockaddr_in6 *)&lifr->lifr_addr; 21257c478bd9Sstevel@tonic-gate if (slashp != NULL) 21267c478bd9Sstevel@tonic-gate *slashp = '\0'; 21277c478bd9Sstevel@tonic-gate if (inet_pton(AF_INET, address, &sin4->sin_addr) == 1) { 21287c478bd9Sstevel@tonic-gate sin4->sin_family = AF_INET; 21297c478bd9Sstevel@tonic-gate } else if (inet_pton(AF_INET6, address, &sin6->sin6_addr) == 1) { 21307c478bd9Sstevel@tonic-gate if (slashp == NULL) 21317c478bd9Sstevel@tonic-gate return (Z_IPV6_ADDR_PREFIX_LEN); 21327c478bd9Sstevel@tonic-gate sin6->sin6_family = AF_INET6; 21337c478bd9Sstevel@tonic-gate } else { 21347c478bd9Sstevel@tonic-gate /* "address" may be a host name */ 21357c478bd9Sstevel@tonic-gate (void) memset(&hints, 0, sizeof (hints)); 21367c478bd9Sstevel@tonic-gate hints.ai_family = PF_INET; 21377c478bd9Sstevel@tonic-gate if (getaddrinfo(address, NULL, &hints, &result) != 0) 21387c478bd9Sstevel@tonic-gate return (Z_BOGUS_ADDRESS); 21397c478bd9Sstevel@tonic-gate sin4->sin_family = result->ai_family; 2140a1be23daSdp 21417c478bd9Sstevel@tonic-gate (void) memcpy(&sin4->sin_addr, 21427c478bd9Sstevel@tonic-gate /* LINTED E_BAD_PTR_CAST_ALIGN */ 21437c478bd9Sstevel@tonic-gate &((struct sockaddr_in *)result->ai_addr)->sin_addr, 21447c478bd9Sstevel@tonic-gate sizeof (struct in_addr)); 2145a1be23daSdp 21467c478bd9Sstevel@tonic-gate freeaddrinfo(result); 21477c478bd9Sstevel@tonic-gate } 21487c478bd9Sstevel@tonic-gate return (Z_OK); 21497c478bd9Sstevel@tonic-gate } 21507c478bd9Sstevel@tonic-gate 2151f4b3ec61Sdh155122 boolean_t 2152f4b3ec61Sdh155122 zonecfg_ifname_exists(sa_family_t af, char *ifname) 2153f4b3ec61Sdh155122 { 2154f4b3ec61Sdh155122 struct lifreq lifr; 2155f4b3ec61Sdh155122 int so; 2156f4b3ec61Sdh155122 int save_errno; 2157f4b3ec61Sdh155122 2158f4b3ec61Sdh155122 (void) memset(&lifr, 0, sizeof (lifr)); 2159f4b3ec61Sdh155122 (void) strlcpy(lifr.lifr_name, ifname, sizeof (lifr.lifr_name)); 2160f4b3ec61Sdh155122 lifr.lifr_addr.ss_family = af; 2161f4b3ec61Sdh155122 if ((so = socket(af, SOCK_DGRAM, 0)) < 0) { 2162f4b3ec61Sdh155122 /* Odd - can't tell if the ifname exists */ 2163f4b3ec61Sdh155122 return (B_FALSE); 2164f4b3ec61Sdh155122 } 2165f4b3ec61Sdh155122 if (ioctl(so, SIOCGLIFFLAGS, (caddr_t)&lifr) < 0) { 2166f4b3ec61Sdh155122 save_errno = errno; 2167f4b3ec61Sdh155122 (void) close(so); 2168f4b3ec61Sdh155122 errno = save_errno; 2169f4b3ec61Sdh155122 return (B_FALSE); 2170f4b3ec61Sdh155122 } 2171f4b3ec61Sdh155122 (void) close(so); 2172f4b3ec61Sdh155122 return (B_TRUE); 2173f4b3ec61Sdh155122 } 2174f4b3ec61Sdh155122 2175a8053275Sjv227347 /* 217634eb7836Sjv227347 * Determines whether there is a net resource with the physical interface, IP 217734eb7836Sjv227347 * address, and default router specified by 'tabptr' in the zone configuration 217834eb7836Sjv227347 * to which 'handle' refers. 'tabptr' must have an interface, an address, a 217934eb7836Sjv227347 * default router, or a combination of the three. This function returns Z_OK 218034eb7836Sjv227347 * iff there is exactly one net resource matching the query specified by 218134eb7836Sjv227347 * 'tabptr'. The function returns Z_INSUFFICIENT_SPEC if there are multiple 218234eb7836Sjv227347 * matches or 'tabptr' does not specify a physical interface, address, or 218334eb7836Sjv227347 * default router. The function returns Z_NO_RESOURCE_ID if are no matches. 2184a8053275Sjv227347 * 2185a8053275Sjv227347 * Errors might also be returned if the entry that exactly matches the 2186a8053275Sjv227347 * query lacks critical network resource information. 2187a8053275Sjv227347 * 218834eb7836Sjv227347 * If there is a single match, then the matching entry's physical interface, IP 218934eb7836Sjv227347 * address, and default router information are stored in 'tabptr'. 2190a8053275Sjv227347 */ 21917c478bd9Sstevel@tonic-gate int 21927c478bd9Sstevel@tonic-gate zonecfg_lookup_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 21937c478bd9Sstevel@tonic-gate { 2194a8053275Sjv227347 xmlNodePtr cur; 2195a8053275Sjv227347 xmlNodePtr firstmatch; 21967c478bd9Sstevel@tonic-gate int err; 2197a8053275Sjv227347 char address[INET6_ADDRSTRLEN]; 2198a8053275Sjv227347 char physical[LIFNAMSIZ]; 2199a8053275Sjv227347 size_t addrspec; /* nonzero if tabptr has IP addr */ 2200a8053275Sjv227347 size_t physspec; /* nonzero if tabptr has interface */ 220134eb7836Sjv227347 size_t defrouterspec; /* nonzero if tabptr has def. router */ 22027c478bd9Sstevel@tonic-gate 22037c478bd9Sstevel@tonic-gate if (tabptr == NULL) 22047c478bd9Sstevel@tonic-gate return (Z_INVAL); 22057c478bd9Sstevel@tonic-gate 2206a8053275Sjv227347 /* 220734eb7836Sjv227347 * Determine the fields that will be searched. There must be at least 220834eb7836Sjv227347 * one. 220934eb7836Sjv227347 * 221034eb7836Sjv227347 * zone_nwif_address, zone_nwif_physical, and zone_nwif_defrouter are 221134eb7836Sjv227347 * arrays, so no NULL checks are necessary. 2212a8053275Sjv227347 */ 2213a8053275Sjv227347 addrspec = strlen(tabptr->zone_nwif_address); 2214a8053275Sjv227347 physspec = strlen(tabptr->zone_nwif_physical); 221534eb7836Sjv227347 defrouterspec = strlen(tabptr->zone_nwif_defrouter); 221634eb7836Sjv227347 if (addrspec == 0 && physspec == 0 && defrouterspec == 0) 221734eb7836Sjv227347 return (Z_INSUFFICIENT_SPEC); 2218a8053275Sjv227347 22197c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 22207c478bd9Sstevel@tonic-gate return (err); 22217c478bd9Sstevel@tonic-gate 222234eb7836Sjv227347 /* 222334eb7836Sjv227347 * Iterate over the configuration's elements and look for net elements 222434eb7836Sjv227347 * that match the query. 222534eb7836Sjv227347 */ 22267c478bd9Sstevel@tonic-gate firstmatch = NULL; 2227a8053275Sjv227347 cur = handle->zone_dh_cur; 22287c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2229a8053275Sjv227347 /* Skip non-net elements */ 22307c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_NET)) 22317c478bd9Sstevel@tonic-gate continue; 2232a8053275Sjv227347 2233a8053275Sjv227347 /* 223434eb7836Sjv227347 * If any relevant fields don't match the query, then skip 223534eb7836Sjv227347 * the current net element. 2236a8053275Sjv227347 */ 223734eb7836Sjv227347 if (physspec != 0 && (fetchprop(cur, DTD_ATTR_PHYSICAL, 223834eb7836Sjv227347 physical, sizeof (physical)) != Z_OK || 223934eb7836Sjv227347 strcmp(tabptr->zone_nwif_physical, physical) != 0)) 224034eb7836Sjv227347 continue; 224134eb7836Sjv227347 if (addrspec != 0 && (fetchprop(cur, DTD_ATTR_ADDRESS, address, 224234eb7836Sjv227347 sizeof (address)) != Z_OK || 224334eb7836Sjv227347 !zonecfg_same_net_address(tabptr->zone_nwif_address, 224434eb7836Sjv227347 address))) 224534eb7836Sjv227347 continue; 224634eb7836Sjv227347 if (defrouterspec != 0 && (fetchprop(cur, DTD_ATTR_DEFROUTER, 224734eb7836Sjv227347 address, sizeof (address)) != Z_OK || 224834eb7836Sjv227347 !zonecfg_same_net_address(tabptr->zone_nwif_defrouter, 224934eb7836Sjv227347 address))) 225034eb7836Sjv227347 continue; 225134eb7836Sjv227347 22527c478bd9Sstevel@tonic-gate /* 225334eb7836Sjv227347 * The current net element matches the query. Select it if 225434eb7836Sjv227347 * it's the first match; otherwise, abort the search. 2255a8053275Sjv227347 */ 2256a8053275Sjv227347 if (firstmatch == NULL) 2257a8053275Sjv227347 firstmatch = cur; 2258a8053275Sjv227347 else 2259a8053275Sjv227347 return (Z_INSUFFICIENT_SPEC); 22607c478bd9Sstevel@tonic-gate } 22617c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 22627c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 22637c478bd9Sstevel@tonic-gate 22647c478bd9Sstevel@tonic-gate cur = firstmatch; 22657c478bd9Sstevel@tonic-gate 22667c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_PHYSICAL, tabptr->zone_nwif_physical, 22677c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_nwif_physical))) != Z_OK) 22687c478bd9Sstevel@tonic-gate return (err); 22697c478bd9Sstevel@tonic-gate 22707c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_ADDRESS, tabptr->zone_nwif_address, 22717c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_nwif_address))) != Z_OK) 22727c478bd9Sstevel@tonic-gate return (err); 22737c478bd9Sstevel@tonic-gate 2274de860bd9Sgfaden if ((err = fetchprop(cur, DTD_ATTR_DEFROUTER, 2275de860bd9Sgfaden tabptr->zone_nwif_defrouter, 2276de860bd9Sgfaden sizeof (tabptr->zone_nwif_defrouter))) != Z_OK) 2277de860bd9Sgfaden return (err); 2278de860bd9Sgfaden 22797c478bd9Sstevel@tonic-gate return (Z_OK); 22807c478bd9Sstevel@tonic-gate } 22817c478bd9Sstevel@tonic-gate 22827c478bd9Sstevel@tonic-gate static int 22837c478bd9Sstevel@tonic-gate zonecfg_add_nwif_core(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 22847c478bd9Sstevel@tonic-gate { 22857c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur; 22867c478bd9Sstevel@tonic-gate int err; 22877c478bd9Sstevel@tonic-gate 22887c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_NET, NULL); 2289a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_ADDRESS, 22907c478bd9Sstevel@tonic-gate tabptr->zone_nwif_address)) != Z_OK) 22917c478bd9Sstevel@tonic-gate return (err); 2292a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_PHYSICAL, 22937c478bd9Sstevel@tonic-gate tabptr->zone_nwif_physical)) != Z_OK) 22947c478bd9Sstevel@tonic-gate return (err); 229544ce818bSjparcel /* 229644ce818bSjparcel * Do not add this property when it is not set, for backwards 229744ce818bSjparcel * compatibility and because it is optional. 229844ce818bSjparcel */ 229944ce818bSjparcel if ((strlen(tabptr->zone_nwif_defrouter) > 0) && 230044ce818bSjparcel ((err = newprop(newnode, DTD_ATTR_DEFROUTER, 230144ce818bSjparcel tabptr->zone_nwif_defrouter)) != Z_OK)) 2302de860bd9Sgfaden return (err); 23037c478bd9Sstevel@tonic-gate return (Z_OK); 23047c478bd9Sstevel@tonic-gate } 23057c478bd9Sstevel@tonic-gate 23067c478bd9Sstevel@tonic-gate int 23077c478bd9Sstevel@tonic-gate zonecfg_add_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 23087c478bd9Sstevel@tonic-gate { 23097c478bd9Sstevel@tonic-gate int err; 23107c478bd9Sstevel@tonic-gate 23117c478bd9Sstevel@tonic-gate if (tabptr == NULL) 23127c478bd9Sstevel@tonic-gate return (Z_INVAL); 23137c478bd9Sstevel@tonic-gate 23147c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 23157c478bd9Sstevel@tonic-gate return (err); 23167c478bd9Sstevel@tonic-gate 23177c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_nwif_core(handle, tabptr)) != Z_OK) 23187c478bd9Sstevel@tonic-gate return (err); 23197c478bd9Sstevel@tonic-gate 23207c478bd9Sstevel@tonic-gate return (Z_OK); 23217c478bd9Sstevel@tonic-gate } 23227c478bd9Sstevel@tonic-gate 23237c478bd9Sstevel@tonic-gate static int 23247c478bd9Sstevel@tonic-gate zonecfg_delete_nwif_core(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 23257c478bd9Sstevel@tonic-gate { 23267c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 23277c478bd9Sstevel@tonic-gate boolean_t addr_match, phys_match; 23287c478bd9Sstevel@tonic-gate 23297c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 23307c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_NET)) 23317c478bd9Sstevel@tonic-gate continue; 23327c478bd9Sstevel@tonic-gate 23337c478bd9Sstevel@tonic-gate addr_match = match_prop(cur, DTD_ATTR_ADDRESS, 23347c478bd9Sstevel@tonic-gate tabptr->zone_nwif_address); 23357c478bd9Sstevel@tonic-gate phys_match = match_prop(cur, DTD_ATTR_PHYSICAL, 23367c478bd9Sstevel@tonic-gate tabptr->zone_nwif_physical); 23377c478bd9Sstevel@tonic-gate 23387c478bd9Sstevel@tonic-gate if (addr_match && phys_match) { 23397c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 23407c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 23417c478bd9Sstevel@tonic-gate return (Z_OK); 23427c478bd9Sstevel@tonic-gate } 23437c478bd9Sstevel@tonic-gate } 23447c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 23457c478bd9Sstevel@tonic-gate } 23467c478bd9Sstevel@tonic-gate 23477c478bd9Sstevel@tonic-gate int 23487c478bd9Sstevel@tonic-gate zonecfg_delete_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 23497c478bd9Sstevel@tonic-gate { 23507c478bd9Sstevel@tonic-gate int err; 23517c478bd9Sstevel@tonic-gate 23527c478bd9Sstevel@tonic-gate if (tabptr == NULL) 23537c478bd9Sstevel@tonic-gate return (Z_INVAL); 23547c478bd9Sstevel@tonic-gate 23557c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 23567c478bd9Sstevel@tonic-gate return (err); 23577c478bd9Sstevel@tonic-gate 23587c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_nwif_core(handle, tabptr)) != Z_OK) 23597c478bd9Sstevel@tonic-gate return (err); 23607c478bd9Sstevel@tonic-gate 23617c478bd9Sstevel@tonic-gate return (Z_OK); 23627c478bd9Sstevel@tonic-gate } 23637c478bd9Sstevel@tonic-gate 23647c478bd9Sstevel@tonic-gate int 23657c478bd9Sstevel@tonic-gate zonecfg_modify_nwif( 23667c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 23677c478bd9Sstevel@tonic-gate struct zone_nwiftab *oldtabptr, 23687c478bd9Sstevel@tonic-gate struct zone_nwiftab *newtabptr) 23697c478bd9Sstevel@tonic-gate { 23707c478bd9Sstevel@tonic-gate int err; 23717c478bd9Sstevel@tonic-gate 23727c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 23737c478bd9Sstevel@tonic-gate return (Z_INVAL); 23747c478bd9Sstevel@tonic-gate 23757c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 23767c478bd9Sstevel@tonic-gate return (err); 23777c478bd9Sstevel@tonic-gate 23787c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_nwif_core(handle, oldtabptr)) != Z_OK) 23797c478bd9Sstevel@tonic-gate return (err); 23807c478bd9Sstevel@tonic-gate 23817c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_nwif_core(handle, newtabptr)) != Z_OK) 23827c478bd9Sstevel@tonic-gate return (err); 23837c478bd9Sstevel@tonic-gate 23847c478bd9Sstevel@tonic-gate return (Z_OK); 23857c478bd9Sstevel@tonic-gate } 23867c478bd9Sstevel@tonic-gate 23875679c89fSjv227347 /* 2388*0fbb751dSJohn Levon * Must be a comma-separated list of alpha-numeric file system names. 2389*0fbb751dSJohn Levon */ 2390*0fbb751dSJohn Levon static int 2391*0fbb751dSJohn Levon zonecfg_valid_fs_allowed(const char *fsallowedp) 2392*0fbb751dSJohn Levon { 2393*0fbb751dSJohn Levon char tmp[ZONE_FS_ALLOWED_MAX]; 2394*0fbb751dSJohn Levon char *cp = tmp; 2395*0fbb751dSJohn Levon char *p; 2396*0fbb751dSJohn Levon 2397*0fbb751dSJohn Levon if (strlen(fsallowedp) > ZONE_FS_ALLOWED_MAX) 2398*0fbb751dSJohn Levon return (Z_TOO_BIG); 2399*0fbb751dSJohn Levon 2400*0fbb751dSJohn Levon (void) strlcpy(tmp, fsallowedp, sizeof (tmp)); 2401*0fbb751dSJohn Levon 2402*0fbb751dSJohn Levon while (*cp != '\0') { 2403*0fbb751dSJohn Levon p = cp; 2404*0fbb751dSJohn Levon while (*p != '\0' && *p != ',') { 2405*0fbb751dSJohn Levon if (!isalnum(*p)) 2406*0fbb751dSJohn Levon return (Z_INVALID_PROPERTY); 2407*0fbb751dSJohn Levon p++; 2408*0fbb751dSJohn Levon } 2409*0fbb751dSJohn Levon 2410*0fbb751dSJohn Levon if (*p == ',') { 2411*0fbb751dSJohn Levon if (p == cp) 2412*0fbb751dSJohn Levon return (Z_INVALID_PROPERTY); 2413*0fbb751dSJohn Levon 2414*0fbb751dSJohn Levon p++; 2415*0fbb751dSJohn Levon 2416*0fbb751dSJohn Levon if (*p == '\0') 2417*0fbb751dSJohn Levon return (Z_INVALID_PROPERTY); 2418*0fbb751dSJohn Levon } 2419*0fbb751dSJohn Levon 2420*0fbb751dSJohn Levon cp = p; 2421*0fbb751dSJohn Levon } 2422*0fbb751dSJohn Levon 2423*0fbb751dSJohn Levon return (Z_OK); 2424*0fbb751dSJohn Levon } 2425*0fbb751dSJohn Levon 2426*0fbb751dSJohn Levon int 2427*0fbb751dSJohn Levon zonecfg_get_fs_allowed(zone_dochandle_t handle, char *bufp, size_t buflen) 2428*0fbb751dSJohn Levon { 2429*0fbb751dSJohn Levon int err; 2430*0fbb751dSJohn Levon 2431*0fbb751dSJohn Levon if ((err = getrootattr(handle, DTD_ATTR_FS_ALLOWED, 2432*0fbb751dSJohn Levon bufp, buflen)) != Z_OK) 2433*0fbb751dSJohn Levon return (err); 2434*0fbb751dSJohn Levon if (bufp[0] == '\0') 2435*0fbb751dSJohn Levon return (Z_BAD_PROPERTY); 2436*0fbb751dSJohn Levon return (zonecfg_valid_fs_allowed(bufp)); 2437*0fbb751dSJohn Levon } 2438*0fbb751dSJohn Levon 2439*0fbb751dSJohn Levon int 2440*0fbb751dSJohn Levon zonecfg_set_fs_allowed(zone_dochandle_t handle, const char *bufp) 2441*0fbb751dSJohn Levon { 2442*0fbb751dSJohn Levon int err; 2443*0fbb751dSJohn Levon 2444*0fbb751dSJohn Levon if (bufp == NULL || (err = zonecfg_valid_fs_allowed(bufp)) == Z_OK) 2445*0fbb751dSJohn Levon return (setrootattr(handle, DTD_ATTR_FS_ALLOWED, bufp)); 2446*0fbb751dSJohn Levon return (err); 2447*0fbb751dSJohn Levon } 2448*0fbb751dSJohn Levon 2449*0fbb751dSJohn Levon /* 2450*0fbb751dSJohn Levon * Determines if the specified string is a valid hostid string. This function 2451*0fbb751dSJohn Levon * returns Z_OK if the string is a valid hostid string. It returns Z_INVAL if 2452*0fbb751dSJohn Levon * 'hostidp' is NULL, Z_TOO_BIG if 'hostidp' refers to a string buffer 2453*0fbb751dSJohn Levon * containing a hex string with more than 8 digits, and Z_INVALID_PROPERTY if 2454*0fbb751dSJohn Levon * the string has an invalid format. 2455*0fbb751dSJohn Levon */ 2456*0fbb751dSJohn Levon static int 2457*0fbb751dSJohn Levon zonecfg_valid_hostid(const char *hostidp) 2458*0fbb751dSJohn Levon { 2459*0fbb751dSJohn Levon char *currentp; 2460*0fbb751dSJohn Levon u_longlong_t hostidval; 2461*0fbb751dSJohn Levon size_t len; 2462*0fbb751dSJohn Levon 2463*0fbb751dSJohn Levon if (hostidp == NULL) 2464*0fbb751dSJohn Levon return (Z_INVAL); 2465*0fbb751dSJohn Levon 2466*0fbb751dSJohn Levon /* Empty strings and strings with whitespace are invalid. */ 2467*0fbb751dSJohn Levon if (*hostidp == '\0') 2468*0fbb751dSJohn Levon return (Z_INVALID_PROPERTY); 2469*0fbb751dSJohn Levon for (currentp = (char *)hostidp; *currentp != '\0'; ++currentp) { 2470*0fbb751dSJohn Levon if (isspace(*currentp)) 2471*0fbb751dSJohn Levon return (Z_INVALID_PROPERTY); 2472*0fbb751dSJohn Levon } 2473*0fbb751dSJohn Levon len = (size_t)(currentp - hostidp); 2474*0fbb751dSJohn Levon 2475*0fbb751dSJohn Levon /* 2476*0fbb751dSJohn Levon * The caller might pass a hostid that is larger than the maximum 2477*0fbb751dSJohn Levon * unsigned 32-bit integral value. Check for this! Also, make sure 2478*0fbb751dSJohn Levon * that the whole string is converted (this helps us find illegal 2479*0fbb751dSJohn Levon * characters) and that the whole string fits within a buffer of size 2480*0fbb751dSJohn Levon * HW_HOSTID_LEN. 2481*0fbb751dSJohn Levon */ 2482*0fbb751dSJohn Levon currentp = (char *)hostidp; 2483*0fbb751dSJohn Levon if (strncmp(hostidp, "0x", 2) == 0 || strncmp(hostidp, "0X", 2) == 0) 2484*0fbb751dSJohn Levon currentp += 2; 2485*0fbb751dSJohn Levon hostidval = strtoull(currentp, ¤tp, 16); 2486*0fbb751dSJohn Levon if ((size_t)(currentp - hostidp) >= HW_HOSTID_LEN) 2487*0fbb751dSJohn Levon return (Z_TOO_BIG); 2488*0fbb751dSJohn Levon if (hostidval > UINT_MAX || hostidval == HW_INVALID_HOSTID || 2489*0fbb751dSJohn Levon currentp != hostidp + len) 2490*0fbb751dSJohn Levon return (Z_INVALID_PROPERTY); 2491*0fbb751dSJohn Levon return (Z_OK); 2492*0fbb751dSJohn Levon } 2493*0fbb751dSJohn Levon 2494*0fbb751dSJohn Levon /* 24955679c89fSjv227347 * Gets the zone hostid string stored in the specified zone configuration 24965679c89fSjv227347 * document. This function returns Z_OK on success. Z_BAD_PROPERTY is returned 24975679c89fSjv227347 * if the config file doesn't specify a hostid or if the hostid is blank. 24985679c89fSjv227347 * 24995679c89fSjv227347 * Note that buflen should be at least HW_HOSTID_LEN. 25005679c89fSjv227347 */ 25015679c89fSjv227347 int 25025679c89fSjv227347 zonecfg_get_hostid(zone_dochandle_t handle, char *bufp, size_t buflen) 25035679c89fSjv227347 { 25045679c89fSjv227347 int err; 25055679c89fSjv227347 25065679c89fSjv227347 if ((err = getrootattr(handle, DTD_ATTR_HOSTID, bufp, buflen)) != Z_OK) 25075679c89fSjv227347 return (err); 25085679c89fSjv227347 if (bufp[0] == '\0') 25095679c89fSjv227347 return (Z_BAD_PROPERTY); 2510*0fbb751dSJohn Levon return (zonecfg_valid_hostid(bufp)); 25115679c89fSjv227347 } 25125679c89fSjv227347 25135679c89fSjv227347 /* 25145679c89fSjv227347 * Sets the hostid string in the specified zone config document to the given 25155679c89fSjv227347 * string value. If 'hostidp' is NULL, then the config document's hostid 25165679c89fSjv227347 * attribute is cleared. Non-NULL hostids are validated. This function returns 25175679c89fSjv227347 * Z_OK on success. Any other return value indicates failure. 25185679c89fSjv227347 */ 25195679c89fSjv227347 int 25205679c89fSjv227347 zonecfg_set_hostid(zone_dochandle_t handle, const char *hostidp) 25215679c89fSjv227347 { 25225679c89fSjv227347 int err; 25235679c89fSjv227347 25245679c89fSjv227347 /* 25255679c89fSjv227347 * A NULL hostid string is interpreted as a request to clear the 25265679c89fSjv227347 * hostid. 25275679c89fSjv227347 */ 25285679c89fSjv227347 if (hostidp == NULL || (err = zonecfg_valid_hostid(hostidp)) == Z_OK) 25295679c89fSjv227347 return (setrootattr(handle, DTD_ATTR_HOSTID, hostidp)); 25305679c89fSjv227347 return (err); 25315679c89fSjv227347 } 25325679c89fSjv227347 25337c478bd9Sstevel@tonic-gate int 25347c478bd9Sstevel@tonic-gate zonecfg_lookup_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 25357c478bd9Sstevel@tonic-gate { 25367c478bd9Sstevel@tonic-gate xmlNodePtr cur, firstmatch; 25377c478bd9Sstevel@tonic-gate int err; 25387c478bd9Sstevel@tonic-gate char match[MAXPATHLEN]; 25397c478bd9Sstevel@tonic-gate 25407c478bd9Sstevel@tonic-gate if (tabptr == NULL) 25417c478bd9Sstevel@tonic-gate return (Z_INVAL); 25427c478bd9Sstevel@tonic-gate 25437c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 25447c478bd9Sstevel@tonic-gate return (err); 25457c478bd9Sstevel@tonic-gate 25467c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 25477c478bd9Sstevel@tonic-gate firstmatch = NULL; 25487c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 25497c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 25507c478bd9Sstevel@tonic-gate continue; 25517c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_dev_match) == 0) 25527c478bd9Sstevel@tonic-gate continue; 25537c478bd9Sstevel@tonic-gate 25547c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_MATCH, match, 25557c478bd9Sstevel@tonic-gate sizeof (match)) == Z_OK)) { 25567c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_dev_match, 25577c478bd9Sstevel@tonic-gate match) == 0) { 25587c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 25597c478bd9Sstevel@tonic-gate firstmatch = cur; 25607c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 25617c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 25627c478bd9Sstevel@tonic-gate } else { 25637c478bd9Sstevel@tonic-gate /* 25647c478bd9Sstevel@tonic-gate * If another property matched but this 25657c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 25667c478bd9Sstevel@tonic-gate */ 25677c478bd9Sstevel@tonic-gate if (firstmatch == cur) 25687c478bd9Sstevel@tonic-gate firstmatch = NULL; 25697c478bd9Sstevel@tonic-gate } 25707c478bd9Sstevel@tonic-gate } 25717c478bd9Sstevel@tonic-gate } 25727c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 25737c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 25747c478bd9Sstevel@tonic-gate 25757c478bd9Sstevel@tonic-gate cur = firstmatch; 25767c478bd9Sstevel@tonic-gate 25777c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_MATCH, tabptr->zone_dev_match, 25787c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_dev_match))) != Z_OK) 25797c478bd9Sstevel@tonic-gate return (err); 25807c478bd9Sstevel@tonic-gate 25817c478bd9Sstevel@tonic-gate return (Z_OK); 25827c478bd9Sstevel@tonic-gate } 25837c478bd9Sstevel@tonic-gate 25847c478bd9Sstevel@tonic-gate static int 25857c478bd9Sstevel@tonic-gate zonecfg_add_dev_core(zone_dochandle_t handle, struct zone_devtab *tabptr) 25867c478bd9Sstevel@tonic-gate { 25877c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur; 25887c478bd9Sstevel@tonic-gate int err; 25897c478bd9Sstevel@tonic-gate 25907c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DEVICE, NULL); 25917c478bd9Sstevel@tonic-gate 2592a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_MATCH, 25937c478bd9Sstevel@tonic-gate tabptr->zone_dev_match)) != Z_OK) 25947c478bd9Sstevel@tonic-gate return (err); 25957c478bd9Sstevel@tonic-gate 25967c478bd9Sstevel@tonic-gate return (Z_OK); 25977c478bd9Sstevel@tonic-gate } 25987c478bd9Sstevel@tonic-gate 25997c478bd9Sstevel@tonic-gate int 26007c478bd9Sstevel@tonic-gate zonecfg_add_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 26017c478bd9Sstevel@tonic-gate { 26027c478bd9Sstevel@tonic-gate int err; 26037c478bd9Sstevel@tonic-gate 26047c478bd9Sstevel@tonic-gate if (tabptr == NULL) 26057c478bd9Sstevel@tonic-gate return (Z_INVAL); 26067c478bd9Sstevel@tonic-gate 26077c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 26087c478bd9Sstevel@tonic-gate return (err); 26097c478bd9Sstevel@tonic-gate 26107c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_dev_core(handle, tabptr)) != Z_OK) 26117c478bd9Sstevel@tonic-gate return (err); 26127c478bd9Sstevel@tonic-gate 26137c478bd9Sstevel@tonic-gate return (Z_OK); 26147c478bd9Sstevel@tonic-gate } 26157c478bd9Sstevel@tonic-gate 26167c478bd9Sstevel@tonic-gate static int 26177c478bd9Sstevel@tonic-gate zonecfg_delete_dev_core(zone_dochandle_t handle, struct zone_devtab *tabptr) 26187c478bd9Sstevel@tonic-gate { 2619facf4a8dSllai1 xmlNodePtr cur = handle->zone_dh_cur; 26207c478bd9Sstevel@tonic-gate int match_match; 26217c478bd9Sstevel@tonic-gate 26227c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 26237c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 26247c478bd9Sstevel@tonic-gate continue; 26257c478bd9Sstevel@tonic-gate 26267c478bd9Sstevel@tonic-gate match_match = match_prop(cur, DTD_ATTR_MATCH, 26277c478bd9Sstevel@tonic-gate tabptr->zone_dev_match); 26287c478bd9Sstevel@tonic-gate 26297c478bd9Sstevel@tonic-gate if (match_match) { 26307c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 26317c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 26327c478bd9Sstevel@tonic-gate return (Z_OK); 26337c478bd9Sstevel@tonic-gate } 26347c478bd9Sstevel@tonic-gate } 26357c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 26367c478bd9Sstevel@tonic-gate } 26377c478bd9Sstevel@tonic-gate 26387c478bd9Sstevel@tonic-gate int 26397c478bd9Sstevel@tonic-gate zonecfg_delete_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 26407c478bd9Sstevel@tonic-gate { 26417c478bd9Sstevel@tonic-gate int err; 26427c478bd9Sstevel@tonic-gate 26437c478bd9Sstevel@tonic-gate if (tabptr == NULL) 26447c478bd9Sstevel@tonic-gate return (Z_INVAL); 26457c478bd9Sstevel@tonic-gate 26467c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 26477c478bd9Sstevel@tonic-gate return (err); 26487c478bd9Sstevel@tonic-gate 26497c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_dev_core(handle, tabptr)) != Z_OK) 26507c478bd9Sstevel@tonic-gate return (err); 26517c478bd9Sstevel@tonic-gate 26527c478bd9Sstevel@tonic-gate return (Z_OK); 26537c478bd9Sstevel@tonic-gate } 26547c478bd9Sstevel@tonic-gate 26557c478bd9Sstevel@tonic-gate int 26567c478bd9Sstevel@tonic-gate zonecfg_modify_dev( 26577c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 26587c478bd9Sstevel@tonic-gate struct zone_devtab *oldtabptr, 26597c478bd9Sstevel@tonic-gate struct zone_devtab *newtabptr) 26607c478bd9Sstevel@tonic-gate { 26617c478bd9Sstevel@tonic-gate int err; 26627c478bd9Sstevel@tonic-gate 26637c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 26647c478bd9Sstevel@tonic-gate return (Z_INVAL); 26657c478bd9Sstevel@tonic-gate 26667c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 26677c478bd9Sstevel@tonic-gate return (err); 26687c478bd9Sstevel@tonic-gate 26697c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_dev_core(handle, oldtabptr)) != Z_OK) 26707c478bd9Sstevel@tonic-gate return (err); 26717c478bd9Sstevel@tonic-gate 26727c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_dev_core(handle, newtabptr)) != Z_OK) 26737c478bd9Sstevel@tonic-gate return (err); 26747c478bd9Sstevel@tonic-gate 26757c478bd9Sstevel@tonic-gate return (Z_OK); 26767c478bd9Sstevel@tonic-gate } 26777c478bd9Sstevel@tonic-gate 2678cb8a054bSGlenn Faden static int 2679cb8a054bSGlenn Faden zonecfg_add_auth_core(zone_dochandle_t handle, struct zone_admintab *tabptr, 2680cb8a054bSGlenn Faden char *zonename) 2681cb8a054bSGlenn Faden { 2682cb8a054bSGlenn Faden xmlNodePtr newnode, cur = handle->zone_dh_cur; 2683cb8a054bSGlenn Faden int err; 2684cb8a054bSGlenn Faden 2685cb8a054bSGlenn Faden newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_ADMIN, NULL); 2686cb8a054bSGlenn Faden err = newprop(newnode, DTD_ATTR_USER, tabptr->zone_admin_user); 2687cb8a054bSGlenn Faden if (err != Z_OK) 2688cb8a054bSGlenn Faden return (err); 2689cb8a054bSGlenn Faden err = newprop(newnode, DTD_ATTR_AUTHS, tabptr->zone_admin_auths); 2690cb8a054bSGlenn Faden if (err != Z_OK) 2691cb8a054bSGlenn Faden return (err); 2692cb8a054bSGlenn Faden if ((err = zonecfg_remove_userauths( 2693cb8a054bSGlenn Faden handle, tabptr->zone_admin_user, zonename, B_FALSE)) != Z_OK) 2694cb8a054bSGlenn Faden return (err); 2695cb8a054bSGlenn Faden return (Z_OK); 2696cb8a054bSGlenn Faden } 2697cb8a054bSGlenn Faden 2698cb8a054bSGlenn Faden int 2699cb8a054bSGlenn Faden zonecfg_add_admin(zone_dochandle_t handle, struct zone_admintab *tabptr, 2700cb8a054bSGlenn Faden char *zonename) 2701cb8a054bSGlenn Faden { 2702cb8a054bSGlenn Faden int err; 2703cb8a054bSGlenn Faden 2704cb8a054bSGlenn Faden if (tabptr == NULL) 2705cb8a054bSGlenn Faden return (Z_INVAL); 2706cb8a054bSGlenn Faden 2707cb8a054bSGlenn Faden if ((err = operation_prep(handle)) != Z_OK) 2708cb8a054bSGlenn Faden return (err); 2709cb8a054bSGlenn Faden 2710cb8a054bSGlenn Faden if ((err = zonecfg_add_auth_core(handle, tabptr, 2711cb8a054bSGlenn Faden zonename)) != Z_OK) 2712cb8a054bSGlenn Faden return (err); 2713cb8a054bSGlenn Faden 2714cb8a054bSGlenn Faden return (Z_OK); 2715cb8a054bSGlenn Faden } 2716cb8a054bSGlenn Faden static int 2717cb8a054bSGlenn Faden zonecfg_delete_auth_core(zone_dochandle_t handle, struct zone_admintab *tabptr, 2718cb8a054bSGlenn Faden char *zonename) 2719cb8a054bSGlenn Faden { 2720cb8a054bSGlenn Faden xmlNodePtr cur = handle->zone_dh_cur; 2721cb8a054bSGlenn Faden boolean_t auth_match; 2722cb8a054bSGlenn Faden int err; 2723cb8a054bSGlenn Faden 2724cb8a054bSGlenn Faden for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2725cb8a054bSGlenn Faden if (xmlStrcmp(cur->name, DTD_ELEM_ADMIN)) 2726cb8a054bSGlenn Faden continue; 2727cb8a054bSGlenn Faden auth_match = match_prop(cur, DTD_ATTR_USER, 2728cb8a054bSGlenn Faden tabptr->zone_admin_user); 2729cb8a054bSGlenn Faden if (auth_match) { 2730cb8a054bSGlenn Faden if ((err = zonecfg_insert_userauths( 2731cb8a054bSGlenn Faden handle, tabptr->zone_admin_user, 2732cb8a054bSGlenn Faden zonename)) != Z_OK) 2733cb8a054bSGlenn Faden return (err); 2734cb8a054bSGlenn Faden xmlUnlinkNode(cur); 2735cb8a054bSGlenn Faden xmlFreeNode(cur); 2736cb8a054bSGlenn Faden return (Z_OK); 2737cb8a054bSGlenn Faden } 2738cb8a054bSGlenn Faden } 2739cb8a054bSGlenn Faden return (Z_NO_RESOURCE_ID); 2740cb8a054bSGlenn Faden } 2741cb8a054bSGlenn Faden 2742cb8a054bSGlenn Faden int 2743cb8a054bSGlenn Faden zonecfg_delete_admin(zone_dochandle_t handle, struct zone_admintab *tabptr, 2744cb8a054bSGlenn Faden char *zonename) 2745cb8a054bSGlenn Faden { 2746cb8a054bSGlenn Faden int err; 2747cb8a054bSGlenn Faden 2748cb8a054bSGlenn Faden if (tabptr == NULL) 2749cb8a054bSGlenn Faden return (Z_INVAL); 2750cb8a054bSGlenn Faden 2751cb8a054bSGlenn Faden if ((err = operation_prep(handle)) != Z_OK) 2752cb8a054bSGlenn Faden return (err); 2753cb8a054bSGlenn Faden 2754cb8a054bSGlenn Faden if ((err = zonecfg_delete_auth_core(handle, tabptr, zonename)) != Z_OK) 2755cb8a054bSGlenn Faden return (err); 2756cb8a054bSGlenn Faden 2757cb8a054bSGlenn Faden return (Z_OK); 2758cb8a054bSGlenn Faden } 2759cb8a054bSGlenn Faden 2760cb8a054bSGlenn Faden int 2761cb8a054bSGlenn Faden zonecfg_modify_admin(zone_dochandle_t handle, struct zone_admintab *oldtabptr, 2762cb8a054bSGlenn Faden struct zone_admintab *newtabptr, char *zonename) 2763cb8a054bSGlenn Faden { 2764cb8a054bSGlenn Faden int err; 2765cb8a054bSGlenn Faden 2766cb8a054bSGlenn Faden if (oldtabptr == NULL || newtabptr == NULL) 2767cb8a054bSGlenn Faden return (Z_INVAL); 2768cb8a054bSGlenn Faden 2769cb8a054bSGlenn Faden if ((err = operation_prep(handle)) != Z_OK) 2770cb8a054bSGlenn Faden return (err); 2771cb8a054bSGlenn Faden 2772cb8a054bSGlenn Faden if ((err = zonecfg_delete_auth_core(handle, oldtabptr, zonename)) 2773cb8a054bSGlenn Faden != Z_OK) 2774cb8a054bSGlenn Faden return (err); 2775cb8a054bSGlenn Faden 2776cb8a054bSGlenn Faden if ((err = zonecfg_add_auth_core(handle, newtabptr, 2777cb8a054bSGlenn Faden zonename)) != Z_OK) 2778cb8a054bSGlenn Faden return (err); 2779cb8a054bSGlenn Faden 2780cb8a054bSGlenn Faden return (Z_OK); 2781cb8a054bSGlenn Faden } 2782cb8a054bSGlenn Faden 2783cb8a054bSGlenn Faden int 2784cb8a054bSGlenn Faden zonecfg_lookup_admin(zone_dochandle_t handle, struct zone_admintab *tabptr) 2785cb8a054bSGlenn Faden { 2786cb8a054bSGlenn Faden xmlNodePtr cur, firstmatch; 2787cb8a054bSGlenn Faden int err; 2788cb8a054bSGlenn Faden char user[MAXUSERNAME]; 2789cb8a054bSGlenn Faden 2790cb8a054bSGlenn Faden if (tabptr == NULL) 2791cb8a054bSGlenn Faden return (Z_INVAL); 2792cb8a054bSGlenn Faden 2793cb8a054bSGlenn Faden if ((err = operation_prep(handle)) != Z_OK) 2794cb8a054bSGlenn Faden return (err); 2795cb8a054bSGlenn Faden 2796cb8a054bSGlenn Faden cur = handle->zone_dh_cur; 2797cb8a054bSGlenn Faden firstmatch = NULL; 2798cb8a054bSGlenn Faden for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 2799cb8a054bSGlenn Faden if (xmlStrcmp(cur->name, DTD_ELEM_ADMIN)) 2800cb8a054bSGlenn Faden continue; 2801cb8a054bSGlenn Faden if (strlen(tabptr->zone_admin_user) > 0) { 2802cb8a054bSGlenn Faden if ((fetchprop(cur, DTD_ATTR_USER, user, 2803cb8a054bSGlenn Faden sizeof (user)) == Z_OK) && 2804cb8a054bSGlenn Faden (strcmp(tabptr->zone_admin_user, user) == 0)) { 2805cb8a054bSGlenn Faden if (firstmatch == NULL) 2806cb8a054bSGlenn Faden firstmatch = cur; 2807cb8a054bSGlenn Faden else 2808cb8a054bSGlenn Faden return (Z_INSUFFICIENT_SPEC); 2809cb8a054bSGlenn Faden } 2810cb8a054bSGlenn Faden } 2811cb8a054bSGlenn Faden } 2812cb8a054bSGlenn Faden if (firstmatch == NULL) 2813cb8a054bSGlenn Faden return (Z_NO_RESOURCE_ID); 2814cb8a054bSGlenn Faden 2815cb8a054bSGlenn Faden cur = firstmatch; 2816cb8a054bSGlenn Faden 2817cb8a054bSGlenn Faden if ((err = fetchprop(cur, DTD_ATTR_USER, tabptr->zone_admin_user, 2818cb8a054bSGlenn Faden sizeof (tabptr->zone_admin_user))) != Z_OK) 2819cb8a054bSGlenn Faden return (err); 2820cb8a054bSGlenn Faden 2821cb8a054bSGlenn Faden if ((err = fetchprop(cur, DTD_ATTR_AUTHS, tabptr->zone_admin_auths, 2822cb8a054bSGlenn Faden sizeof (tabptr->zone_admin_auths))) != Z_OK) 2823cb8a054bSGlenn Faden return (err); 2824cb8a054bSGlenn Faden 2825cb8a054bSGlenn Faden return (Z_OK); 2826cb8a054bSGlenn Faden } 2827cb8a054bSGlenn Faden 2828cb8a054bSGlenn Faden 2829ff17c8bfSgjelinek /* Lock to serialize all devwalks */ 2830ee519a1fSgjelinek static pthread_mutex_t zonecfg_devwalk_lock = PTHREAD_MUTEX_INITIALIZER; 2831ee519a1fSgjelinek /* 2832ff17c8bfSgjelinek * Global variables used to pass data from zonecfg_dev_manifest to the nftw 2833ee519a1fSgjelinek * call-back (zonecfg_devwalk_cb). g_devwalk_data is really the void* 2834ff17c8bfSgjelinek * parameter and g_devwalk_cb is really the *cb parameter from 2835ff17c8bfSgjelinek * zonecfg_dev_manifest. 2836ee519a1fSgjelinek */ 2837ff17c8bfSgjelinek typedef struct __g_devwalk_data *g_devwalk_data_t; 2838ff17c8bfSgjelinek static g_devwalk_data_t g_devwalk_data; 2839ee519a1fSgjelinek static int (*g_devwalk_cb)(const char *, uid_t, gid_t, mode_t, const char *, 2840ee519a1fSgjelinek void *); 2841ee519a1fSgjelinek static size_t g_devwalk_skip_prefix; 2842ee519a1fSgjelinek 2843ee519a1fSgjelinek /* 2844ff17c8bfSgjelinek * zonecfg_dev_manifest call-back function used during detach to generate the 2845ff17c8bfSgjelinek * dev info in the manifest. 2846ff17c8bfSgjelinek */ 2847ff17c8bfSgjelinek static int 2848ff17c8bfSgjelinek get_detach_dev_entry(const char *name, uid_t uid, gid_t gid, mode_t mode, 2849ff17c8bfSgjelinek const char *acl, void *hdl) 2850ff17c8bfSgjelinek { 2851ff17c8bfSgjelinek zone_dochandle_t handle = (zone_dochandle_t)hdl; 2852ff17c8bfSgjelinek xmlNodePtr newnode; 2853ff17c8bfSgjelinek xmlNodePtr cur; 2854ff17c8bfSgjelinek int err; 2855ff17c8bfSgjelinek char buf[128]; 2856ff17c8bfSgjelinek 2857ff17c8bfSgjelinek if ((err = operation_prep(handle)) != Z_OK) 2858ff17c8bfSgjelinek return (err); 2859ff17c8bfSgjelinek 2860ff17c8bfSgjelinek cur = handle->zone_dh_cur; 2861ff17c8bfSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DEV_PERM, NULL); 2862ff17c8bfSgjelinek if ((err = newprop(newnode, DTD_ATTR_NAME, (char *)name)) != Z_OK) 2863ff17c8bfSgjelinek return (err); 2864ff17c8bfSgjelinek (void) snprintf(buf, sizeof (buf), "%lu", uid); 2865ff17c8bfSgjelinek if ((err = newprop(newnode, DTD_ATTR_UID, buf)) != Z_OK) 2866ff17c8bfSgjelinek return (err); 2867ff17c8bfSgjelinek (void) snprintf(buf, sizeof (buf), "%lu", gid); 2868ff17c8bfSgjelinek if ((err = newprop(newnode, DTD_ATTR_GID, buf)) != Z_OK) 2869ff17c8bfSgjelinek return (err); 2870ff17c8bfSgjelinek (void) snprintf(buf, sizeof (buf), "%o", mode); 2871ff17c8bfSgjelinek if ((err = newprop(newnode, DTD_ATTR_MODE, buf)) != Z_OK) 2872ff17c8bfSgjelinek return (err); 2873ff17c8bfSgjelinek if ((err = newprop(newnode, DTD_ATTR_ACL, (char *)acl)) != Z_OK) 2874ff17c8bfSgjelinek return (err); 2875ff17c8bfSgjelinek return (Z_OK); 2876ff17c8bfSgjelinek } 2877ff17c8bfSgjelinek 2878ff17c8bfSgjelinek /* 2879ff17c8bfSgjelinek * This is the nftw call-back function used by zonecfg_dev_manifest. It is 2880ff17c8bfSgjelinek * responsible for calling the actual call-back. 2881ee519a1fSgjelinek */ 2882ee519a1fSgjelinek /* ARGSUSED2 */ 2883ee519a1fSgjelinek static int 2884ee519a1fSgjelinek zonecfg_devwalk_cb(const char *path, const struct stat *st, int f, 2885ee519a1fSgjelinek struct FTW *ftw) 2886ee519a1fSgjelinek { 2887ee519a1fSgjelinek acl_t *acl; 2888ee519a1fSgjelinek char *acl_txt = NULL; 2889ee519a1fSgjelinek 2890ee519a1fSgjelinek /* skip all but character and block devices */ 2891ee519a1fSgjelinek if (!S_ISBLK(st->st_mode) && !S_ISCHR(st->st_mode)) 2892ee519a1fSgjelinek return (0); 2893ee519a1fSgjelinek 2894ee519a1fSgjelinek if ((acl_get(path, ACL_NO_TRIVIAL, &acl) == 0) && 2895ee519a1fSgjelinek acl != NULL) { 2896ee519a1fSgjelinek acl_txt = acl_totext(acl, ACL_NORESOLVE); 2897ee519a1fSgjelinek acl_free(acl); 2898ee519a1fSgjelinek } 2899ee519a1fSgjelinek 2900ee519a1fSgjelinek if (strlen(path) <= g_devwalk_skip_prefix) 2901ee519a1fSgjelinek return (0); 2902ee519a1fSgjelinek 2903ee519a1fSgjelinek g_devwalk_cb(path + g_devwalk_skip_prefix, st->st_uid, st->st_gid, 2904ee519a1fSgjelinek st->st_mode & S_IAMB, acl_txt != NULL ? acl_txt : "", 2905ee519a1fSgjelinek g_devwalk_data); 2906ee519a1fSgjelinek free(acl_txt); 2907ee519a1fSgjelinek return (0); 2908ee519a1fSgjelinek } 2909ee519a1fSgjelinek 2910ee519a1fSgjelinek /* 2911ff17c8bfSgjelinek * Walk the dev tree for the zone specified by hdl and call the 2912ff17c8bfSgjelinek * get_detach_dev_entry call-back function for each entry in the tree. The 2913ff17c8bfSgjelinek * call-back will be passed the name, uid, gid, mode, acl string and the 2914ff17c8bfSgjelinek * handle input parameter for each dev entry. 2915ee519a1fSgjelinek * 2916ff17c8bfSgjelinek * Data is passed to get_detach_dev_entry through the global variables 2917ee519a1fSgjelinek * g_devwalk_data, *g_devwalk_cb, and g_devwalk_skip_prefix. The 2918ff17c8bfSgjelinek * zonecfg_devwalk_cb function will actually call get_detach_dev_entry. 2919ee519a1fSgjelinek */ 2920ee519a1fSgjelinek int 2921ff17c8bfSgjelinek zonecfg_dev_manifest(zone_dochandle_t hdl) 2922ee519a1fSgjelinek { 2923ee519a1fSgjelinek char path[MAXPATHLEN]; 2924ee519a1fSgjelinek int ret; 2925ee519a1fSgjelinek 2926ee519a1fSgjelinek if ((ret = zonecfg_get_zonepath(hdl, path, sizeof (path))) != Z_OK) 2927ee519a1fSgjelinek return (ret); 2928ee519a1fSgjelinek 2929ee519a1fSgjelinek if (strlcat(path, "/dev", sizeof (path)) >= sizeof (path)) 2930ee519a1fSgjelinek return (Z_TOO_BIG); 2931ee519a1fSgjelinek 2932ee519a1fSgjelinek /* 2933ff17c8bfSgjelinek * We have to serialize all devwalks in the same process 2934ee519a1fSgjelinek * (which should be fine), since nftw() is so badly designed. 2935ee519a1fSgjelinek */ 2936ee519a1fSgjelinek (void) pthread_mutex_lock(&zonecfg_devwalk_lock); 2937ee519a1fSgjelinek 2938ff17c8bfSgjelinek g_devwalk_skip_prefix = strlen(path) + 1; 2939ff17c8bfSgjelinek g_devwalk_data = (g_devwalk_data_t)hdl; 2940ff17c8bfSgjelinek g_devwalk_cb = get_detach_dev_entry; 2941ee519a1fSgjelinek (void) nftw(path, zonecfg_devwalk_cb, 0, FTW_PHYS); 2942ee519a1fSgjelinek 2943ee519a1fSgjelinek (void) pthread_mutex_unlock(&zonecfg_devwalk_lock); 2944ee519a1fSgjelinek return (Z_OK); 2945ee519a1fSgjelinek } 2946ee519a1fSgjelinek 2947ee519a1fSgjelinek /* 2948ee519a1fSgjelinek * Update the owner, group, mode and acl on the specified dev (inpath) for 2949ee519a1fSgjelinek * the zone (hdl). This function can be used to fix up the dev tree after 2950ee519a1fSgjelinek * attaching a migrated zone. 2951ee519a1fSgjelinek */ 2952ee519a1fSgjelinek int 2953ee519a1fSgjelinek zonecfg_devperms_apply(zone_dochandle_t hdl, const char *inpath, uid_t owner, 2954ee519a1fSgjelinek gid_t group, mode_t mode, const char *acltxt) 2955ee519a1fSgjelinek { 2956ee519a1fSgjelinek int ret; 2957ee519a1fSgjelinek char path[MAXPATHLEN]; 2958ee519a1fSgjelinek struct stat st; 2959ee519a1fSgjelinek acl_t *aclp; 2960ee519a1fSgjelinek 2961ee519a1fSgjelinek if ((ret = zonecfg_get_zonepath(hdl, path, sizeof (path))) != Z_OK) 2962ee519a1fSgjelinek return (ret); 2963ee519a1fSgjelinek 2964ee519a1fSgjelinek if (strlcat(path, "/dev/", sizeof (path)) >= sizeof (path)) 2965ee519a1fSgjelinek return (Z_TOO_BIG); 2966ee519a1fSgjelinek if (strlcat(path, inpath, sizeof (path)) >= sizeof (path)) 2967ee519a1fSgjelinek return (Z_TOO_BIG); 2968ee519a1fSgjelinek 2969ee519a1fSgjelinek if (stat(path, &st) == -1) 2970ee519a1fSgjelinek return (Z_INVAL); 2971ee519a1fSgjelinek 2972ee519a1fSgjelinek /* make sure we're only touching device nodes */ 2973ee519a1fSgjelinek if (!S_ISCHR(st.st_mode) && !S_ISBLK(st.st_mode)) 2974ee519a1fSgjelinek return (Z_INVAL); 2975ee519a1fSgjelinek 2976ee519a1fSgjelinek if (chown(path, owner, group) == -1) 2977ee519a1fSgjelinek return (Z_SYSTEM); 2978ee519a1fSgjelinek 2979ee519a1fSgjelinek if (chmod(path, mode) == -1) 2980ee519a1fSgjelinek return (Z_SYSTEM); 2981ee519a1fSgjelinek 2982ee519a1fSgjelinek if ((acltxt == NULL) || (strcmp(acltxt, "") == 0)) 2983ee519a1fSgjelinek return (Z_OK); 2984ee519a1fSgjelinek 29852ad45a84Sjv227347 if (acl_fromtext(acltxt, &aclp) != 0) { 29862ad45a84Sjv227347 errno = EINVAL; 2987ee519a1fSgjelinek return (Z_SYSTEM); 29882ad45a84Sjv227347 } 2989ee519a1fSgjelinek 2990ee519a1fSgjelinek errno = 0; 2991ee519a1fSgjelinek if (acl_set(path, aclp) == -1) { 2992ee519a1fSgjelinek free(aclp); 2993ee519a1fSgjelinek return (Z_SYSTEM); 2994ee519a1fSgjelinek } 2995ee519a1fSgjelinek 2996ee519a1fSgjelinek free(aclp); 2997ee519a1fSgjelinek return (Z_OK); 2998ee519a1fSgjelinek } 2999ee519a1fSgjelinek 30007c478bd9Sstevel@tonic-gate /* 30017c478bd9Sstevel@tonic-gate * This function finds everything mounted under a zone's rootpath. 30027c478bd9Sstevel@tonic-gate * This returns the number of mounts under rootpath, or -1 on error. 30037c478bd9Sstevel@tonic-gate * callback is called once per mount found with the first argument 30040094b373Sjv227347 * pointing to a mnttab structure containing the mount's information. 30057c478bd9Sstevel@tonic-gate * 30067c478bd9Sstevel@tonic-gate * If the callback function returns non-zero zonecfg_find_mounts 30077c478bd9Sstevel@tonic-gate * aborts with an error. 30087c478bd9Sstevel@tonic-gate */ 30097c478bd9Sstevel@tonic-gate int 30100094b373Sjv227347 zonecfg_find_mounts(char *rootpath, int (*callback)(const struct mnttab *, 30110094b373Sjv227347 void *), void *priv) { 30127c478bd9Sstevel@tonic-gate FILE *mnttab; 30137c478bd9Sstevel@tonic-gate struct mnttab m; 30147c478bd9Sstevel@tonic-gate size_t l; 301507b574eeSgjelinek int zfsl; 30167c478bd9Sstevel@tonic-gate int rv = 0; 301707b574eeSgjelinek char zfs_path[MAXPATHLEN]; 30187c478bd9Sstevel@tonic-gate 30197c478bd9Sstevel@tonic-gate assert(rootpath != NULL); 30207c478bd9Sstevel@tonic-gate 302107b574eeSgjelinek if ((zfsl = snprintf(zfs_path, sizeof (zfs_path), "%s/.zfs/", rootpath)) 302207b574eeSgjelinek >= sizeof (zfs_path)) 302307b574eeSgjelinek return (-1); 302407b574eeSgjelinek 30257c478bd9Sstevel@tonic-gate l = strlen(rootpath); 30267c478bd9Sstevel@tonic-gate 30277c478bd9Sstevel@tonic-gate mnttab = fopen("/etc/mnttab", "r"); 30287c478bd9Sstevel@tonic-gate 30297c478bd9Sstevel@tonic-gate if (mnttab == NULL) 30307c478bd9Sstevel@tonic-gate return (-1); 30317c478bd9Sstevel@tonic-gate 30327c478bd9Sstevel@tonic-gate if (ioctl(fileno(mnttab), MNTIOC_SHOWHIDDEN, NULL) < 0) { 30337c478bd9Sstevel@tonic-gate rv = -1; 30347c478bd9Sstevel@tonic-gate goto out; 30357c478bd9Sstevel@tonic-gate } 30367c478bd9Sstevel@tonic-gate 30377c478bd9Sstevel@tonic-gate while (!getmntent(mnttab, &m)) { 30387c478bd9Sstevel@tonic-gate if ((strncmp(rootpath, m.mnt_mountp, l) == 0) && 303907b574eeSgjelinek (m.mnt_mountp[l] == '/') && 304007b574eeSgjelinek (strncmp(zfs_path, m.mnt_mountp, zfsl) != 0)) { 30417c478bd9Sstevel@tonic-gate rv++; 30427c478bd9Sstevel@tonic-gate if (callback == NULL) 30437c478bd9Sstevel@tonic-gate continue; 30440094b373Sjv227347 if (callback(&m, priv)) { 30457c478bd9Sstevel@tonic-gate rv = -1; 30467c478bd9Sstevel@tonic-gate goto out; 30477c478bd9Sstevel@tonic-gate 30487c478bd9Sstevel@tonic-gate } 30497c478bd9Sstevel@tonic-gate } 30507c478bd9Sstevel@tonic-gate } 30517c478bd9Sstevel@tonic-gate 30527c478bd9Sstevel@tonic-gate out: 30537c478bd9Sstevel@tonic-gate (void) fclose(mnttab); 30547c478bd9Sstevel@tonic-gate return (rv); 30557c478bd9Sstevel@tonic-gate } 30567c478bd9Sstevel@tonic-gate 30577c478bd9Sstevel@tonic-gate int 30587c478bd9Sstevel@tonic-gate zonecfg_lookup_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 30597c478bd9Sstevel@tonic-gate { 30607c478bd9Sstevel@tonic-gate xmlNodePtr cur, firstmatch; 30617c478bd9Sstevel@tonic-gate int err; 30627c478bd9Sstevel@tonic-gate char name[MAXNAMELEN], type[MAXNAMELEN], value[MAXNAMELEN]; 30637c478bd9Sstevel@tonic-gate 30647c478bd9Sstevel@tonic-gate if (tabptr == NULL) 30657c478bd9Sstevel@tonic-gate return (Z_INVAL); 30667c478bd9Sstevel@tonic-gate 30677c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 30687c478bd9Sstevel@tonic-gate return (err); 30697c478bd9Sstevel@tonic-gate 30707c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 30717c478bd9Sstevel@tonic-gate firstmatch = NULL; 30727c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 30737c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 30747c478bd9Sstevel@tonic-gate continue; 30757c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_attr_name) > 0) { 30767c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_NAME, name, 30777c478bd9Sstevel@tonic-gate sizeof (name)) == Z_OK) && 30787c478bd9Sstevel@tonic-gate (strcmp(tabptr->zone_attr_name, name) == 0)) { 30797c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 30807c478bd9Sstevel@tonic-gate firstmatch = cur; 30817c478bd9Sstevel@tonic-gate else 30827c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 30837c478bd9Sstevel@tonic-gate } 30847c478bd9Sstevel@tonic-gate } 30857c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_attr_type) > 0) { 30867c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_TYPE, type, 30877c478bd9Sstevel@tonic-gate sizeof (type)) == Z_OK)) { 30887c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_attr_type, type) == 0) { 30897c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 30907c478bd9Sstevel@tonic-gate firstmatch = cur; 30917c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 30927c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 30937c478bd9Sstevel@tonic-gate } else { 30947c478bd9Sstevel@tonic-gate /* 30957c478bd9Sstevel@tonic-gate * If another property matched but this 30967c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 30977c478bd9Sstevel@tonic-gate */ 30987c478bd9Sstevel@tonic-gate if (firstmatch == cur) 30997c478bd9Sstevel@tonic-gate firstmatch = NULL; 31007c478bd9Sstevel@tonic-gate } 31017c478bd9Sstevel@tonic-gate } 31027c478bd9Sstevel@tonic-gate } 31037c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_attr_value) > 0) { 31047c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_VALUE, value, 31057c478bd9Sstevel@tonic-gate sizeof (value)) == Z_OK)) { 31067c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_attr_value, value) == 31077c478bd9Sstevel@tonic-gate 0) { 31087c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 31097c478bd9Sstevel@tonic-gate firstmatch = cur; 31107c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 31117c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 31127c478bd9Sstevel@tonic-gate } else { 31137c478bd9Sstevel@tonic-gate /* 31147c478bd9Sstevel@tonic-gate * If another property matched but this 31157c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 31167c478bd9Sstevel@tonic-gate */ 31177c478bd9Sstevel@tonic-gate if (firstmatch == cur) 31187c478bd9Sstevel@tonic-gate firstmatch = NULL; 31197c478bd9Sstevel@tonic-gate } 31207c478bd9Sstevel@tonic-gate } 31217c478bd9Sstevel@tonic-gate } 31227c478bd9Sstevel@tonic-gate } 31237c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 31247c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 31257c478bd9Sstevel@tonic-gate 31267c478bd9Sstevel@tonic-gate cur = firstmatch; 31277c478bd9Sstevel@tonic-gate 31287c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_attr_name, 31297c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_name))) != Z_OK) 31307c478bd9Sstevel@tonic-gate return (err); 31317c478bd9Sstevel@tonic-gate 31327c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_attr_type, 31337c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_type))) != Z_OK) 31347c478bd9Sstevel@tonic-gate return (err); 31357c478bd9Sstevel@tonic-gate 31367c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_VALUE, tabptr->zone_attr_value, 31377c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_value))) != Z_OK) 31387c478bd9Sstevel@tonic-gate return (err); 31397c478bd9Sstevel@tonic-gate 31407c478bd9Sstevel@tonic-gate return (Z_OK); 31417c478bd9Sstevel@tonic-gate } 31427c478bd9Sstevel@tonic-gate 31437c478bd9Sstevel@tonic-gate static int 31447c478bd9Sstevel@tonic-gate zonecfg_add_attr_core(zone_dochandle_t handle, struct zone_attrtab *tabptr) 31457c478bd9Sstevel@tonic-gate { 31467c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur; 31477c478bd9Sstevel@tonic-gate int err; 31487c478bd9Sstevel@tonic-gate 31497c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_ATTR, NULL); 3150a1be23daSdp err = newprop(newnode, DTD_ATTR_NAME, tabptr->zone_attr_name); 31517c478bd9Sstevel@tonic-gate if (err != Z_OK) 31527c478bd9Sstevel@tonic-gate return (err); 3153a1be23daSdp err = newprop(newnode, DTD_ATTR_TYPE, tabptr->zone_attr_type); 31547c478bd9Sstevel@tonic-gate if (err != Z_OK) 31557c478bd9Sstevel@tonic-gate return (err); 3156a1be23daSdp err = newprop(newnode, DTD_ATTR_VALUE, tabptr->zone_attr_value); 31577c478bd9Sstevel@tonic-gate if (err != Z_OK) 31587c478bd9Sstevel@tonic-gate return (err); 31597c478bd9Sstevel@tonic-gate return (Z_OK); 31607c478bd9Sstevel@tonic-gate } 31617c478bd9Sstevel@tonic-gate 31627c478bd9Sstevel@tonic-gate int 31637c478bd9Sstevel@tonic-gate zonecfg_add_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 31647c478bd9Sstevel@tonic-gate { 31657c478bd9Sstevel@tonic-gate int err; 31667c478bd9Sstevel@tonic-gate 31677c478bd9Sstevel@tonic-gate if (tabptr == NULL) 31687c478bd9Sstevel@tonic-gate return (Z_INVAL); 31697c478bd9Sstevel@tonic-gate 31707c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 31717c478bd9Sstevel@tonic-gate return (err); 31727c478bd9Sstevel@tonic-gate 31737c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_attr_core(handle, tabptr)) != Z_OK) 31747c478bd9Sstevel@tonic-gate return (err); 31757c478bd9Sstevel@tonic-gate 31767c478bd9Sstevel@tonic-gate return (Z_OK); 31777c478bd9Sstevel@tonic-gate } 31787c478bd9Sstevel@tonic-gate 31797c478bd9Sstevel@tonic-gate static int 31807c478bd9Sstevel@tonic-gate zonecfg_delete_attr_core(zone_dochandle_t handle, struct zone_attrtab *tabptr) 31817c478bd9Sstevel@tonic-gate { 31827c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 31837c478bd9Sstevel@tonic-gate int name_match, type_match, value_match; 31847c478bd9Sstevel@tonic-gate 31857c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 31867c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 31877c478bd9Sstevel@tonic-gate continue; 31887c478bd9Sstevel@tonic-gate 31897c478bd9Sstevel@tonic-gate name_match = match_prop(cur, DTD_ATTR_NAME, 31907c478bd9Sstevel@tonic-gate tabptr->zone_attr_name); 31917c478bd9Sstevel@tonic-gate type_match = match_prop(cur, DTD_ATTR_TYPE, 31927c478bd9Sstevel@tonic-gate tabptr->zone_attr_type); 31937c478bd9Sstevel@tonic-gate value_match = match_prop(cur, DTD_ATTR_VALUE, 31947c478bd9Sstevel@tonic-gate tabptr->zone_attr_value); 31957c478bd9Sstevel@tonic-gate 31967c478bd9Sstevel@tonic-gate if (name_match && type_match && value_match) { 31977c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 31987c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 31997c478bd9Sstevel@tonic-gate return (Z_OK); 32007c478bd9Sstevel@tonic-gate } 32017c478bd9Sstevel@tonic-gate } 32027c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 32037c478bd9Sstevel@tonic-gate } 32047c478bd9Sstevel@tonic-gate 32057c478bd9Sstevel@tonic-gate int 32067c478bd9Sstevel@tonic-gate zonecfg_delete_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 32077c478bd9Sstevel@tonic-gate { 32087c478bd9Sstevel@tonic-gate int err; 32097c478bd9Sstevel@tonic-gate 32107c478bd9Sstevel@tonic-gate if (tabptr == NULL) 32117c478bd9Sstevel@tonic-gate return (Z_INVAL); 32127c478bd9Sstevel@tonic-gate 32137c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 32147c478bd9Sstevel@tonic-gate return (err); 32157c478bd9Sstevel@tonic-gate 32167c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_attr_core(handle, tabptr)) != Z_OK) 32177c478bd9Sstevel@tonic-gate return (err); 32187c478bd9Sstevel@tonic-gate 32197c478bd9Sstevel@tonic-gate return (Z_OK); 32207c478bd9Sstevel@tonic-gate } 32217c478bd9Sstevel@tonic-gate 32227c478bd9Sstevel@tonic-gate int 32237c478bd9Sstevel@tonic-gate zonecfg_modify_attr( 32247c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 32257c478bd9Sstevel@tonic-gate struct zone_attrtab *oldtabptr, 32267c478bd9Sstevel@tonic-gate struct zone_attrtab *newtabptr) 32277c478bd9Sstevel@tonic-gate { 32287c478bd9Sstevel@tonic-gate int err; 32297c478bd9Sstevel@tonic-gate 32307c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 32317c478bd9Sstevel@tonic-gate return (Z_INVAL); 32327c478bd9Sstevel@tonic-gate 32337c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 32347c478bd9Sstevel@tonic-gate return (err); 32357c478bd9Sstevel@tonic-gate 32367c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_attr_core(handle, oldtabptr)) != Z_OK) 32377c478bd9Sstevel@tonic-gate return (err); 32387c478bd9Sstevel@tonic-gate 32397c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_attr_core(handle, newtabptr)) != Z_OK) 32407c478bd9Sstevel@tonic-gate return (err); 32417c478bd9Sstevel@tonic-gate 32427c478bd9Sstevel@tonic-gate return (Z_OK); 32437c478bd9Sstevel@tonic-gate } 32447c478bd9Sstevel@tonic-gate 32457c478bd9Sstevel@tonic-gate int 32467c478bd9Sstevel@tonic-gate zonecfg_get_attr_boolean(const struct zone_attrtab *attr, boolean_t *value) 32477c478bd9Sstevel@tonic-gate { 32487c478bd9Sstevel@tonic-gate if (attr == NULL) 32497c478bd9Sstevel@tonic-gate return (Z_INVAL); 32507c478bd9Sstevel@tonic-gate 32517c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_type, DTD_ENTITY_BOOLEAN) != 0) 32527c478bd9Sstevel@tonic-gate return (Z_INVAL); 32537c478bd9Sstevel@tonic-gate 32547c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_value, DTD_ENTITY_TRUE) == 0) { 32557c478bd9Sstevel@tonic-gate *value = B_TRUE; 32567c478bd9Sstevel@tonic-gate return (Z_OK); 32577c478bd9Sstevel@tonic-gate } 32587c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_value, DTD_ENTITY_FALSE) == 0) { 32597c478bd9Sstevel@tonic-gate *value = B_FALSE; 32607c478bd9Sstevel@tonic-gate return (Z_OK); 32617c478bd9Sstevel@tonic-gate } 32627c478bd9Sstevel@tonic-gate return (Z_INVAL); 32637c478bd9Sstevel@tonic-gate } 32647c478bd9Sstevel@tonic-gate 32657c478bd9Sstevel@tonic-gate int 32667c478bd9Sstevel@tonic-gate zonecfg_get_attr_int(const struct zone_attrtab *attr, int64_t *value) 32677c478bd9Sstevel@tonic-gate { 32687c478bd9Sstevel@tonic-gate long long result; 32697c478bd9Sstevel@tonic-gate char *endptr; 32707c478bd9Sstevel@tonic-gate 32717c478bd9Sstevel@tonic-gate if (attr == NULL) 32727c478bd9Sstevel@tonic-gate return (Z_INVAL); 32737c478bd9Sstevel@tonic-gate 32747c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_type, DTD_ENTITY_INT) != 0) 32757c478bd9Sstevel@tonic-gate return (Z_INVAL); 32767c478bd9Sstevel@tonic-gate 32777c478bd9Sstevel@tonic-gate errno = 0; 32787c478bd9Sstevel@tonic-gate result = strtoll(attr->zone_attr_value, &endptr, 10); 32797c478bd9Sstevel@tonic-gate if (errno != 0 || *endptr != '\0') 32807c478bd9Sstevel@tonic-gate return (Z_INVAL); 32817c478bd9Sstevel@tonic-gate *value = result; 32827c478bd9Sstevel@tonic-gate return (Z_OK); 32837c478bd9Sstevel@tonic-gate } 32847c478bd9Sstevel@tonic-gate 32857c478bd9Sstevel@tonic-gate int 32867c478bd9Sstevel@tonic-gate zonecfg_get_attr_string(const struct zone_attrtab *attr, char *value, 32877c478bd9Sstevel@tonic-gate size_t val_sz) 32887c478bd9Sstevel@tonic-gate { 32897c478bd9Sstevel@tonic-gate if (attr == NULL) 32907c478bd9Sstevel@tonic-gate return (Z_INVAL); 32917c478bd9Sstevel@tonic-gate 32927c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_type, DTD_ENTITY_STRING) != 0) 32937c478bd9Sstevel@tonic-gate return (Z_INVAL); 32947c478bd9Sstevel@tonic-gate 32957c478bd9Sstevel@tonic-gate if (strlcpy(value, attr->zone_attr_value, val_sz) >= val_sz) 32967c478bd9Sstevel@tonic-gate return (Z_TOO_BIG); 32977c478bd9Sstevel@tonic-gate return (Z_OK); 32987c478bd9Sstevel@tonic-gate } 32997c478bd9Sstevel@tonic-gate 33007c478bd9Sstevel@tonic-gate int 33017c478bd9Sstevel@tonic-gate zonecfg_get_attr_uint(const struct zone_attrtab *attr, uint64_t *value) 33027c478bd9Sstevel@tonic-gate { 33037c478bd9Sstevel@tonic-gate unsigned long long result; 33047c478bd9Sstevel@tonic-gate long long neg_result; 33057c478bd9Sstevel@tonic-gate char *endptr; 33067c478bd9Sstevel@tonic-gate 33077c478bd9Sstevel@tonic-gate if (attr == NULL) 33087c478bd9Sstevel@tonic-gate return (Z_INVAL); 33097c478bd9Sstevel@tonic-gate 33107c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_type, DTD_ENTITY_UINT) != 0) 33117c478bd9Sstevel@tonic-gate return (Z_INVAL); 33127c478bd9Sstevel@tonic-gate 33137c478bd9Sstevel@tonic-gate errno = 0; 33147c478bd9Sstevel@tonic-gate result = strtoull(attr->zone_attr_value, &endptr, 10); 33157c478bd9Sstevel@tonic-gate if (errno != 0 || *endptr != '\0') 33167c478bd9Sstevel@tonic-gate return (Z_INVAL); 33177c478bd9Sstevel@tonic-gate errno = 0; 33187c478bd9Sstevel@tonic-gate neg_result = strtoll(attr->zone_attr_value, &endptr, 10); 33197c478bd9Sstevel@tonic-gate /* 33207c478bd9Sstevel@tonic-gate * Incredibly, strtoull("<negative number>", ...) will not fail but 33217c478bd9Sstevel@tonic-gate * return whatever (negative) number cast as a u_longlong_t, so we 33227c478bd9Sstevel@tonic-gate * need to look for this here. 33237c478bd9Sstevel@tonic-gate */ 33247c478bd9Sstevel@tonic-gate if (errno == 0 && neg_result < 0) 33257c478bd9Sstevel@tonic-gate return (Z_INVAL); 33267c478bd9Sstevel@tonic-gate *value = result; 33277c478bd9Sstevel@tonic-gate return (Z_OK); 33287c478bd9Sstevel@tonic-gate } 33297c478bd9Sstevel@tonic-gate 33307c478bd9Sstevel@tonic-gate int 33317c478bd9Sstevel@tonic-gate zonecfg_lookup_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 33327c478bd9Sstevel@tonic-gate { 33337c478bd9Sstevel@tonic-gate xmlNodePtr cur, val; 33347c478bd9Sstevel@tonic-gate char savedname[MAXNAMELEN]; 33357c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valptr; 33367c478bd9Sstevel@tonic-gate int err; 33377c478bd9Sstevel@tonic-gate 33382ad45a84Sjv227347 if (strlen(tabptr->zone_rctl_name) == 0) 33397c478bd9Sstevel@tonic-gate return (Z_INVAL); 33407c478bd9Sstevel@tonic-gate 33417c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 33427c478bd9Sstevel@tonic-gate return (err); 33437c478bd9Sstevel@tonic-gate 33447c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 33457c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 33467c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 33477c478bd9Sstevel@tonic-gate continue; 33487c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_NAME, savedname, 33497c478bd9Sstevel@tonic-gate sizeof (savedname)) == Z_OK) && 33507c478bd9Sstevel@tonic-gate (strcmp(savedname, tabptr->zone_rctl_name) == 0)) { 33517c478bd9Sstevel@tonic-gate tabptr->zone_rctl_valptr = NULL; 33527c478bd9Sstevel@tonic-gate for (val = cur->xmlChildrenNode; val != NULL; 33537c478bd9Sstevel@tonic-gate val = val->next) { 33547c478bd9Sstevel@tonic-gate valptr = (struct zone_rctlvaltab *)malloc( 33557c478bd9Sstevel@tonic-gate sizeof (struct zone_rctlvaltab)); 33567c478bd9Sstevel@tonic-gate if (valptr == NULL) 33577c478bd9Sstevel@tonic-gate return (Z_NOMEM); 33587c478bd9Sstevel@tonic-gate if ((fetchprop(val, DTD_ATTR_PRIV, 33597c478bd9Sstevel@tonic-gate valptr->zone_rctlval_priv, 33607c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_priv)) != 33617c478bd9Sstevel@tonic-gate Z_OK)) 33627c478bd9Sstevel@tonic-gate break; 33637c478bd9Sstevel@tonic-gate if ((fetchprop(val, DTD_ATTR_LIMIT, 33647c478bd9Sstevel@tonic-gate valptr->zone_rctlval_limit, 33657c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_limit)) != 33667c478bd9Sstevel@tonic-gate Z_OK)) 33677c478bd9Sstevel@tonic-gate break; 33687c478bd9Sstevel@tonic-gate if ((fetchprop(val, DTD_ATTR_ACTION, 33697c478bd9Sstevel@tonic-gate valptr->zone_rctlval_action, 33707c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_action)) != 33717c478bd9Sstevel@tonic-gate Z_OK)) 33727c478bd9Sstevel@tonic-gate break; 33737c478bd9Sstevel@tonic-gate if (zonecfg_add_rctl_value(tabptr, valptr) != 33747c478bd9Sstevel@tonic-gate Z_OK) 33757c478bd9Sstevel@tonic-gate break; 33767c478bd9Sstevel@tonic-gate } 33777c478bd9Sstevel@tonic-gate return (Z_OK); 33787c478bd9Sstevel@tonic-gate } 33797c478bd9Sstevel@tonic-gate } 33807c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 33817c478bd9Sstevel@tonic-gate } 33827c478bd9Sstevel@tonic-gate 33837c478bd9Sstevel@tonic-gate static int 33847c478bd9Sstevel@tonic-gate zonecfg_add_rctl_core(zone_dochandle_t handle, struct zone_rctltab *tabptr) 33857c478bd9Sstevel@tonic-gate { 33867c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur, valnode; 33877c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valptr; 33887c478bd9Sstevel@tonic-gate int err; 33897c478bd9Sstevel@tonic-gate 33907c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_RCTL, NULL); 3391a1be23daSdp err = newprop(newnode, DTD_ATTR_NAME, tabptr->zone_rctl_name); 33927c478bd9Sstevel@tonic-gate if (err != Z_OK) 33937c478bd9Sstevel@tonic-gate return (err); 33947c478bd9Sstevel@tonic-gate for (valptr = tabptr->zone_rctl_valptr; valptr != NULL; 33957c478bd9Sstevel@tonic-gate valptr = valptr->zone_rctlval_next) { 33967c478bd9Sstevel@tonic-gate valnode = xmlNewTextChild(newnode, NULL, 33977c478bd9Sstevel@tonic-gate DTD_ELEM_RCTLVALUE, NULL); 3398a1be23daSdp err = newprop(valnode, DTD_ATTR_PRIV, 33997c478bd9Sstevel@tonic-gate valptr->zone_rctlval_priv); 34007c478bd9Sstevel@tonic-gate if (err != Z_OK) 34017c478bd9Sstevel@tonic-gate return (err); 3402a1be23daSdp err = newprop(valnode, DTD_ATTR_LIMIT, 34037c478bd9Sstevel@tonic-gate valptr->zone_rctlval_limit); 34047c478bd9Sstevel@tonic-gate if (err != Z_OK) 34057c478bd9Sstevel@tonic-gate return (err); 3406a1be23daSdp err = newprop(valnode, DTD_ATTR_ACTION, 34077c478bd9Sstevel@tonic-gate valptr->zone_rctlval_action); 34087c478bd9Sstevel@tonic-gate if (err != Z_OK) 34097c478bd9Sstevel@tonic-gate return (err); 34107c478bd9Sstevel@tonic-gate } 34117c478bd9Sstevel@tonic-gate return (Z_OK); 34127c478bd9Sstevel@tonic-gate } 34137c478bd9Sstevel@tonic-gate 34147c478bd9Sstevel@tonic-gate int 34157c478bd9Sstevel@tonic-gate zonecfg_add_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 34167c478bd9Sstevel@tonic-gate { 34177c478bd9Sstevel@tonic-gate int err; 34187c478bd9Sstevel@tonic-gate 34192ad45a84Sjv227347 if (tabptr == NULL) 34207c478bd9Sstevel@tonic-gate return (Z_INVAL); 34217c478bd9Sstevel@tonic-gate 34227c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 34237c478bd9Sstevel@tonic-gate return (err); 34247c478bd9Sstevel@tonic-gate 34257c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_rctl_core(handle, tabptr)) != Z_OK) 34267c478bd9Sstevel@tonic-gate return (err); 34277c478bd9Sstevel@tonic-gate 34287c478bd9Sstevel@tonic-gate return (Z_OK); 34297c478bd9Sstevel@tonic-gate } 34307c478bd9Sstevel@tonic-gate 34317c478bd9Sstevel@tonic-gate static int 34327c478bd9Sstevel@tonic-gate zonecfg_delete_rctl_core(zone_dochandle_t handle, struct zone_rctltab *tabptr) 34337c478bd9Sstevel@tonic-gate { 34347c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 34357c478bd9Sstevel@tonic-gate xmlChar *savedname; 34367c478bd9Sstevel@tonic-gate int name_result; 34377c478bd9Sstevel@tonic-gate 34387c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 34397c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 34407c478bd9Sstevel@tonic-gate continue; 34417c478bd9Sstevel@tonic-gate 34427c478bd9Sstevel@tonic-gate savedname = xmlGetProp(cur, DTD_ATTR_NAME); 34437c478bd9Sstevel@tonic-gate if (savedname == NULL) /* shouldn't happen */ 34447c478bd9Sstevel@tonic-gate continue; 34457c478bd9Sstevel@tonic-gate name_result = xmlStrcmp(savedname, 34467c478bd9Sstevel@tonic-gate (const xmlChar *) tabptr->zone_rctl_name); 34477c478bd9Sstevel@tonic-gate xmlFree(savedname); 34487c478bd9Sstevel@tonic-gate 34497c478bd9Sstevel@tonic-gate if (name_result == 0) { 34507c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 34517c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 34527c478bd9Sstevel@tonic-gate return (Z_OK); 34537c478bd9Sstevel@tonic-gate } 34547c478bd9Sstevel@tonic-gate } 34557c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 34567c478bd9Sstevel@tonic-gate } 34577c478bd9Sstevel@tonic-gate 34587c478bd9Sstevel@tonic-gate int 34597c478bd9Sstevel@tonic-gate zonecfg_delete_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 34607c478bd9Sstevel@tonic-gate { 34617c478bd9Sstevel@tonic-gate int err; 34627c478bd9Sstevel@tonic-gate 34632ad45a84Sjv227347 if (tabptr == NULL) 34647c478bd9Sstevel@tonic-gate return (Z_INVAL); 34657c478bd9Sstevel@tonic-gate 34667c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 34677c478bd9Sstevel@tonic-gate return (err); 34687c478bd9Sstevel@tonic-gate 34697c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_rctl_core(handle, tabptr)) != Z_OK) 34707c478bd9Sstevel@tonic-gate return (err); 34717c478bd9Sstevel@tonic-gate 34727c478bd9Sstevel@tonic-gate return (Z_OK); 34737c478bd9Sstevel@tonic-gate } 34747c478bd9Sstevel@tonic-gate 34757c478bd9Sstevel@tonic-gate int 34767c478bd9Sstevel@tonic-gate zonecfg_modify_rctl( 34777c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 34787c478bd9Sstevel@tonic-gate struct zone_rctltab *oldtabptr, 34797c478bd9Sstevel@tonic-gate struct zone_rctltab *newtabptr) 34807c478bd9Sstevel@tonic-gate { 34817c478bd9Sstevel@tonic-gate int err; 34827c478bd9Sstevel@tonic-gate 34832ad45a84Sjv227347 if (oldtabptr == NULL || newtabptr == NULL) 34847c478bd9Sstevel@tonic-gate return (Z_INVAL); 34857c478bd9Sstevel@tonic-gate 34867c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 34877c478bd9Sstevel@tonic-gate return (err); 34887c478bd9Sstevel@tonic-gate 34897c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_rctl_core(handle, oldtabptr)) != Z_OK) 34907c478bd9Sstevel@tonic-gate return (err); 34917c478bd9Sstevel@tonic-gate 34927c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_rctl_core(handle, newtabptr)) != Z_OK) 34937c478bd9Sstevel@tonic-gate return (err); 34947c478bd9Sstevel@tonic-gate 34957c478bd9Sstevel@tonic-gate return (Z_OK); 34967c478bd9Sstevel@tonic-gate } 34977c478bd9Sstevel@tonic-gate 34987c478bd9Sstevel@tonic-gate int 34997c478bd9Sstevel@tonic-gate zonecfg_add_rctl_value( 35007c478bd9Sstevel@tonic-gate struct zone_rctltab *tabptr, 35017c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valtabptr) 35027c478bd9Sstevel@tonic-gate { 35037c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *last, *old, *new; 35047c478bd9Sstevel@tonic-gate rctlblk_t *rctlblk = alloca(rctlblk_size()); 35057c478bd9Sstevel@tonic-gate 35067c478bd9Sstevel@tonic-gate last = tabptr->zone_rctl_valptr; 35077c478bd9Sstevel@tonic-gate for (old = last; old != NULL; old = old->zone_rctlval_next) 35087c478bd9Sstevel@tonic-gate last = old; /* walk to the end of the list */ 35097c478bd9Sstevel@tonic-gate new = valtabptr; /* alloc'd by caller */ 35107c478bd9Sstevel@tonic-gate new->zone_rctlval_next = NULL; 35117c478bd9Sstevel@tonic-gate if (zonecfg_construct_rctlblk(valtabptr, rctlblk) != Z_OK) 35127c478bd9Sstevel@tonic-gate return (Z_INVAL); 35137c478bd9Sstevel@tonic-gate if (!zonecfg_valid_rctlblk(rctlblk)) 35147c478bd9Sstevel@tonic-gate return (Z_INVAL); 35157c478bd9Sstevel@tonic-gate if (last == NULL) 35167c478bd9Sstevel@tonic-gate tabptr->zone_rctl_valptr = new; 35177c478bd9Sstevel@tonic-gate else 35187c478bd9Sstevel@tonic-gate last->zone_rctlval_next = new; 35197c478bd9Sstevel@tonic-gate return (Z_OK); 35207c478bd9Sstevel@tonic-gate } 35217c478bd9Sstevel@tonic-gate 35227c478bd9Sstevel@tonic-gate int 35237c478bd9Sstevel@tonic-gate zonecfg_remove_rctl_value( 35247c478bd9Sstevel@tonic-gate struct zone_rctltab *tabptr, 35257c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valtabptr) 35267c478bd9Sstevel@tonic-gate { 35277c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *last, *this, *next; 35287c478bd9Sstevel@tonic-gate 35297c478bd9Sstevel@tonic-gate last = tabptr->zone_rctl_valptr; 35307c478bd9Sstevel@tonic-gate for (this = last; this != NULL; this = this->zone_rctlval_next) { 35317c478bd9Sstevel@tonic-gate if (strcmp(this->zone_rctlval_priv, 35327c478bd9Sstevel@tonic-gate valtabptr->zone_rctlval_priv) == 0 && 35337c478bd9Sstevel@tonic-gate strcmp(this->zone_rctlval_limit, 35347c478bd9Sstevel@tonic-gate valtabptr->zone_rctlval_limit) == 0 && 35357c478bd9Sstevel@tonic-gate strcmp(this->zone_rctlval_action, 35367c478bd9Sstevel@tonic-gate valtabptr->zone_rctlval_action) == 0) { 35377c478bd9Sstevel@tonic-gate next = this->zone_rctlval_next; 35387c478bd9Sstevel@tonic-gate if (this == tabptr->zone_rctl_valptr) 35397c478bd9Sstevel@tonic-gate tabptr->zone_rctl_valptr = next; 35407c478bd9Sstevel@tonic-gate else 35417c478bd9Sstevel@tonic-gate last->zone_rctlval_next = next; 35427c478bd9Sstevel@tonic-gate free(this); 35437c478bd9Sstevel@tonic-gate return (Z_OK); 35447c478bd9Sstevel@tonic-gate } else 35457c478bd9Sstevel@tonic-gate last = this; 35467c478bd9Sstevel@tonic-gate } 35477c478bd9Sstevel@tonic-gate return (Z_NO_PROPERTY_ID); 35487c478bd9Sstevel@tonic-gate } 35497c478bd9Sstevel@tonic-gate 3550ff17c8bfSgjelinek void 3551ff17c8bfSgjelinek zonecfg_set_swinv(zone_dochandle_t handle) 3552ff17c8bfSgjelinek { 3553ff17c8bfSgjelinek handle->zone_dh_sw_inv = B_TRUE; 3554ff17c8bfSgjelinek } 3555ff17c8bfSgjelinek 3556ff17c8bfSgjelinek /* 3557ff17c8bfSgjelinek * Add the pkg to the sw inventory on the handle. 3558ff17c8bfSgjelinek */ 3559ff17c8bfSgjelinek int 3560ff17c8bfSgjelinek zonecfg_add_pkg(zone_dochandle_t handle, char *name, char *version) 3561ff17c8bfSgjelinek { 3562ff17c8bfSgjelinek xmlNodePtr newnode; 3563ff17c8bfSgjelinek xmlNodePtr cur; 3564ff17c8bfSgjelinek int err; 3565ff17c8bfSgjelinek 3566ff17c8bfSgjelinek if ((err = operation_prep(handle)) != Z_OK) 3567ff17c8bfSgjelinek return (err); 3568ff17c8bfSgjelinek 3569ff17c8bfSgjelinek cur = handle->zone_dh_cur; 3570ff17c8bfSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_PACKAGE, NULL); 3571ff17c8bfSgjelinek if ((err = newprop(newnode, DTD_ATTR_NAME, name)) != Z_OK) 3572ff17c8bfSgjelinek return (err); 3573ff17c8bfSgjelinek if ((err = newprop(newnode, DTD_ATTR_VERSION, version)) != Z_OK) 3574ff17c8bfSgjelinek return (err); 3575ff17c8bfSgjelinek return (Z_OK); 3576ff17c8bfSgjelinek } 3577ff17c8bfSgjelinek 3578ff17c8bfSgjelinek int 3579ff17c8bfSgjelinek zonecfg_add_patch(zone_dochandle_t handle, char *id, void **pnode) 3580ff17c8bfSgjelinek { 3581ff17c8bfSgjelinek xmlNodePtr node = (xmlNodePtr)*pnode; 3582ff17c8bfSgjelinek xmlNodePtr cur; 3583ff17c8bfSgjelinek int err; 3584ff17c8bfSgjelinek 3585ff17c8bfSgjelinek if ((err = operation_prep(handle)) != Z_OK) 3586ff17c8bfSgjelinek return (err); 3587ff17c8bfSgjelinek 3588ff17c8bfSgjelinek cur = handle->zone_dh_cur; 3589ff17c8bfSgjelinek node = xmlNewTextChild(cur, NULL, DTD_ELEM_PATCH, NULL); 3590ff17c8bfSgjelinek if ((err = newprop(node, DTD_ATTR_ID, id)) != Z_OK) 3591ff17c8bfSgjelinek return (err); 3592ff17c8bfSgjelinek *pnode = (void *)node; 3593ff17c8bfSgjelinek return (Z_OK); 3594ff17c8bfSgjelinek } 3595ff17c8bfSgjelinek 3596ff17c8bfSgjelinek int 3597ff17c8bfSgjelinek zonecfg_add_patch_obs(char *id, void *cur) 3598ff17c8bfSgjelinek { 3599ff17c8bfSgjelinek xmlNodePtr node; 3600ff17c8bfSgjelinek int err; 3601ff17c8bfSgjelinek 3602ff17c8bfSgjelinek node = xmlNewTextChild((xmlNodePtr)cur, NULL, DTD_ELEM_OBSOLETES, NULL); 3603ff17c8bfSgjelinek if ((err = newprop(node, DTD_ATTR_ID, id)) != Z_OK) 3604ff17c8bfSgjelinek return (err); 3605ff17c8bfSgjelinek return (Z_OK); 3606ff17c8bfSgjelinek } 3607ff17c8bfSgjelinek 36087c478bd9Sstevel@tonic-gate char * 36097c478bd9Sstevel@tonic-gate zonecfg_strerror(int errnum) 36107c478bd9Sstevel@tonic-gate { 36117c478bd9Sstevel@tonic-gate switch (errnum) { 36127c478bd9Sstevel@tonic-gate case Z_OK: 36137c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "OK")); 36147c478bd9Sstevel@tonic-gate case Z_EMPTY_DOCUMENT: 36157c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Empty document")); 36167c478bd9Sstevel@tonic-gate case Z_WRONG_DOC_TYPE: 36177c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Wrong document type")); 36187c478bd9Sstevel@tonic-gate case Z_BAD_PROPERTY: 36197c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Bad document property")); 36207c478bd9Sstevel@tonic-gate case Z_TEMP_FILE: 36217c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 36227c478bd9Sstevel@tonic-gate "Problem creating temporary file")); 36237c478bd9Sstevel@tonic-gate case Z_SAVING_FILE: 36247c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Problem saving file")); 36257c478bd9Sstevel@tonic-gate case Z_NO_ENTRY: 36267c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such entry")); 36277c478bd9Sstevel@tonic-gate case Z_BOGUS_ZONE_NAME: 36287c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Bogus zone name")); 36297c478bd9Sstevel@tonic-gate case Z_REQD_RESOURCE_MISSING: 36307c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Required resource missing")); 36317c478bd9Sstevel@tonic-gate case Z_REQD_PROPERTY_MISSING: 36327c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Required property missing")); 36337c478bd9Sstevel@tonic-gate case Z_BAD_HANDLE: 36347c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Bad handle")); 36357c478bd9Sstevel@tonic-gate case Z_NOMEM: 36367c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Out of memory")); 36377c478bd9Sstevel@tonic-gate case Z_INVAL: 36387c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Invalid argument")); 36397c478bd9Sstevel@tonic-gate case Z_ACCES: 36407c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Permission denied")); 36417c478bd9Sstevel@tonic-gate case Z_TOO_BIG: 36427c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Argument list too long")); 36437c478bd9Sstevel@tonic-gate case Z_MISC_FS: 36447c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 36457c478bd9Sstevel@tonic-gate "Miscellaneous file system error")); 36467c478bd9Sstevel@tonic-gate case Z_NO_ZONE: 36477c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such zone configured")); 36487c478bd9Sstevel@tonic-gate case Z_NO_RESOURCE_TYPE: 36497c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such resource type")); 36507c478bd9Sstevel@tonic-gate case Z_NO_RESOURCE_ID: 36517c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such resource with that id")); 36527c478bd9Sstevel@tonic-gate case Z_NO_PROPERTY_TYPE: 36537c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such property type")); 36547c478bd9Sstevel@tonic-gate case Z_NO_PROPERTY_ID: 36557c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such property with that id")); 3656087719fdSdp case Z_BAD_ZONE_STATE: 36577c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 3658087719fdSdp "Zone state is invalid for the requested operation")); 36597c478bd9Sstevel@tonic-gate case Z_INVALID_DOCUMENT: 36607c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Invalid document")); 3661087719fdSdp case Z_NAME_IN_USE: 3662087719fdSdp return (dgettext(TEXT_DOMAIN, "Zone name already in use")); 36637c478bd9Sstevel@tonic-gate case Z_NO_SUCH_ID: 36647c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such zone ID")); 36657c478bd9Sstevel@tonic-gate case Z_UPDATING_INDEX: 36667c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Problem updating index file")); 36677c478bd9Sstevel@tonic-gate case Z_LOCKING_FILE: 36687c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Locking index file")); 36697c478bd9Sstevel@tonic-gate case Z_UNLOCKING_FILE: 36707c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Unlocking index file")); 36717c478bd9Sstevel@tonic-gate case Z_INSUFFICIENT_SPEC: 36727c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Insufficient specification")); 36737c478bd9Sstevel@tonic-gate case Z_RESOLVED_PATH: 36747c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Resolved path mismatch")); 36757c478bd9Sstevel@tonic-gate case Z_IPV6_ADDR_PREFIX_LEN: 36767c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 36777c478bd9Sstevel@tonic-gate "IPv6 address missing required prefix length")); 36787c478bd9Sstevel@tonic-gate case Z_BOGUS_ADDRESS: 36797c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 36807c478bd9Sstevel@tonic-gate "Neither an IPv4 nor an IPv6 address nor a host name")); 3681ffbafc53Scomay case Z_PRIV_PROHIBITED: 3682ffbafc53Scomay return (dgettext(TEXT_DOMAIN, 3683ffbafc53Scomay "Specified privilege is prohibited")); 3684ffbafc53Scomay case Z_PRIV_REQUIRED: 3685ffbafc53Scomay return (dgettext(TEXT_DOMAIN, 3686ffbafc53Scomay "Required privilege is missing")); 3687ffbafc53Scomay case Z_PRIV_UNKNOWN: 3688ffbafc53Scomay return (dgettext(TEXT_DOMAIN, 3689ffbafc53Scomay "Specified privilege is unknown")); 36909acbbeafSnn35248 case Z_BRAND_ERROR: 36919acbbeafSnn35248 return (dgettext(TEXT_DOMAIN, 36929acbbeafSnn35248 "Brand-specific error")); 36930209230bSgjelinek case Z_INCOMPATIBLE: 36940209230bSgjelinek return (dgettext(TEXT_DOMAIN, "Incompatible settings")); 36950209230bSgjelinek case Z_ALIAS_DISALLOW: 36960209230bSgjelinek return (dgettext(TEXT_DOMAIN, 36970209230bSgjelinek "An incompatible rctl already exists for this property")); 36980209230bSgjelinek case Z_CLEAR_DISALLOW: 36990209230bSgjelinek return (dgettext(TEXT_DOMAIN, 37000209230bSgjelinek "Clearing this property is not allowed")); 37010209230bSgjelinek case Z_POOL: 37020209230bSgjelinek return (dgettext(TEXT_DOMAIN, "libpool(3LIB) error")); 37030209230bSgjelinek case Z_POOLS_NOT_ACTIVE: 37040209230bSgjelinek return (dgettext(TEXT_DOMAIN, "Pools facility not active; " 37050209230bSgjelinek "zone will not be bound to pool")); 37060209230bSgjelinek case Z_POOL_ENABLE: 37070209230bSgjelinek return (dgettext(TEXT_DOMAIN, 37080209230bSgjelinek "Could not enable pools facility")); 37090209230bSgjelinek case Z_NO_POOL: 37100209230bSgjelinek return (dgettext(TEXT_DOMAIN, 37110209230bSgjelinek "Pool not found; using default pool")); 37120209230bSgjelinek case Z_POOL_CREATE: 37130209230bSgjelinek return (dgettext(TEXT_DOMAIN, 37140209230bSgjelinek "Could not create a temporary pool")); 37150209230bSgjelinek case Z_POOL_BIND: 37160209230bSgjelinek return (dgettext(TEXT_DOMAIN, "Could not bind zone to pool")); 3717*0fbb751dSJohn Levon case Z_INVALID_PROPERTY: 3718*0fbb751dSJohn Levon return (dgettext(TEXT_DOMAIN, "Specified property is invalid")); 37192ad45a84Sjv227347 case Z_SYSTEM: 37202ad45a84Sjv227347 return (strerror(errno)); 37217c478bd9Sstevel@tonic-gate default: 37227c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Unknown error")); 37237c478bd9Sstevel@tonic-gate } 37247c478bd9Sstevel@tonic-gate } 37257c478bd9Sstevel@tonic-gate 37267c478bd9Sstevel@tonic-gate /* 37277c478bd9Sstevel@tonic-gate * Note that the zonecfg_setXent() and zonecfg_endXent() calls are all the 37287c478bd9Sstevel@tonic-gate * same, as they just turn around and call zonecfg_setent() / zonecfg_endent(). 37297c478bd9Sstevel@tonic-gate */ 37307c478bd9Sstevel@tonic-gate 37317c478bd9Sstevel@tonic-gate static int 37327c478bd9Sstevel@tonic-gate zonecfg_setent(zone_dochandle_t handle) 37337c478bd9Sstevel@tonic-gate { 37347c478bd9Sstevel@tonic-gate xmlNodePtr cur; 37357c478bd9Sstevel@tonic-gate int err; 37367c478bd9Sstevel@tonic-gate 37377c478bd9Sstevel@tonic-gate if (handle == NULL) 37387c478bd9Sstevel@tonic-gate return (Z_INVAL); 37397c478bd9Sstevel@tonic-gate 37407c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) { 37417c478bd9Sstevel@tonic-gate handle->zone_dh_cur = NULL; 37427c478bd9Sstevel@tonic-gate return (err); 37437c478bd9Sstevel@tonic-gate } 37447c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 37457c478bd9Sstevel@tonic-gate cur = cur->xmlChildrenNode; 37467c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur; 37477c478bd9Sstevel@tonic-gate return (Z_OK); 37487c478bd9Sstevel@tonic-gate } 37497c478bd9Sstevel@tonic-gate 37507c478bd9Sstevel@tonic-gate static int 37517c478bd9Sstevel@tonic-gate zonecfg_endent(zone_dochandle_t handle) 37527c478bd9Sstevel@tonic-gate { 37537c478bd9Sstevel@tonic-gate if (handle == NULL) 37547c478bd9Sstevel@tonic-gate return (Z_INVAL); 37557c478bd9Sstevel@tonic-gate 37567c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 37577c478bd9Sstevel@tonic-gate return (Z_OK); 37587c478bd9Sstevel@tonic-gate } 37597c478bd9Sstevel@tonic-gate 37600209230bSgjelinek /* 37610209230bSgjelinek * Do the work required to manipulate a process through libproc. 37620209230bSgjelinek * If grab_process() returns no errors (0), then release_process() 37630209230bSgjelinek * must eventually be called. 37640209230bSgjelinek * 37650209230bSgjelinek * Return values: 37660209230bSgjelinek * 0 Successful creation of agent thread 37670209230bSgjelinek * 1 Error grabbing 37680209230bSgjelinek * 2 Error creating agent 37690209230bSgjelinek */ 37700209230bSgjelinek static int 37710209230bSgjelinek grab_process(pr_info_handle_t *p) 37720209230bSgjelinek { 37730209230bSgjelinek int ret; 37740209230bSgjelinek 37750209230bSgjelinek if ((p->pr = Pgrab(p->pid, 0, &ret)) != NULL) { 37760209230bSgjelinek 37770209230bSgjelinek if (Psetflags(p->pr, PR_RLC) != 0) { 37780209230bSgjelinek Prelease(p->pr, 0); 37790209230bSgjelinek return (1); 37800209230bSgjelinek } 37810209230bSgjelinek if (Pcreate_agent(p->pr) == 0) { 37820209230bSgjelinek return (0); 37830209230bSgjelinek 37840209230bSgjelinek } else { 37850209230bSgjelinek Prelease(p->pr, 0); 37860209230bSgjelinek return (2); 37870209230bSgjelinek } 37880209230bSgjelinek } else { 37890209230bSgjelinek return (1); 37900209230bSgjelinek } 37910209230bSgjelinek } 37920209230bSgjelinek 37930209230bSgjelinek /* 37940209230bSgjelinek * Release the specified process. This destroys the agent 37950209230bSgjelinek * and releases the process. If the process is NULL, nothing 37960209230bSgjelinek * is done. This function should only be called if grab_process() 37970209230bSgjelinek * has previously been called and returned success. 37980209230bSgjelinek * 37990209230bSgjelinek * This function is Pgrab-safe. 38000209230bSgjelinek */ 38010209230bSgjelinek static void 38020209230bSgjelinek release_process(struct ps_prochandle *Pr) 38030209230bSgjelinek { 38040209230bSgjelinek if (Pr == NULL) 38050209230bSgjelinek return; 38060209230bSgjelinek 38070209230bSgjelinek Pdestroy_agent(Pr); 38080209230bSgjelinek Prelease(Pr, 0); 38090209230bSgjelinek } 38100209230bSgjelinek 38110209230bSgjelinek static boolean_t 38120209230bSgjelinek grab_zone_proc(char *zonename, pr_info_handle_t *p) 38130209230bSgjelinek { 38140209230bSgjelinek DIR *dirp; 38150209230bSgjelinek struct dirent *dentp; 38160209230bSgjelinek zoneid_t zoneid; 38170209230bSgjelinek int pid_self; 38180209230bSgjelinek psinfo_t psinfo; 38190209230bSgjelinek 38200209230bSgjelinek if (zone_get_id(zonename, &zoneid) != 0) 38210209230bSgjelinek return (B_FALSE); 38220209230bSgjelinek 38230209230bSgjelinek pid_self = getpid(); 38240209230bSgjelinek 38250209230bSgjelinek if ((dirp = opendir("/proc")) == NULL) 38260209230bSgjelinek return (B_FALSE); 38270209230bSgjelinek 38280209230bSgjelinek while (dentp = readdir(dirp)) { 38290209230bSgjelinek p->pid = atoi(dentp->d_name); 38300209230bSgjelinek 38310209230bSgjelinek /* Skip self */ 38320209230bSgjelinek if (p->pid == pid_self) 38330209230bSgjelinek continue; 38340209230bSgjelinek 38350209230bSgjelinek if (proc_get_psinfo(p->pid, &psinfo) != 0) 38360209230bSgjelinek continue; 38370209230bSgjelinek 38380209230bSgjelinek if (psinfo.pr_zoneid != zoneid) 38390209230bSgjelinek continue; 38400209230bSgjelinek 38410209230bSgjelinek /* attempt to grab process */ 38420209230bSgjelinek if (grab_process(p) != 0) 38430209230bSgjelinek continue; 38440209230bSgjelinek 38450209230bSgjelinek if (pr_getzoneid(p->pr) != zoneid) { 38460209230bSgjelinek release_process(p->pr); 38470209230bSgjelinek continue; 38480209230bSgjelinek } 38490209230bSgjelinek 38500209230bSgjelinek (void) closedir(dirp); 38510209230bSgjelinek return (B_TRUE); 38520209230bSgjelinek } 38530209230bSgjelinek 38540209230bSgjelinek (void) closedir(dirp); 38550209230bSgjelinek return (B_FALSE); 38560209230bSgjelinek } 38570209230bSgjelinek 38580209230bSgjelinek static boolean_t 38590209230bSgjelinek get_priv_rctl(struct ps_prochandle *pr, char *name, rctlblk_t *rblk) 38600209230bSgjelinek { 38610209230bSgjelinek if (pr_getrctl(pr, name, NULL, rblk, RCTL_FIRST)) 38620209230bSgjelinek return (B_FALSE); 38630209230bSgjelinek 38640209230bSgjelinek if (rctlblk_get_privilege(rblk) == RCPRIV_PRIVILEGED) 38650209230bSgjelinek return (B_TRUE); 38660209230bSgjelinek 38670209230bSgjelinek while (pr_getrctl(pr, name, rblk, rblk, RCTL_NEXT) == 0) { 38680209230bSgjelinek if (rctlblk_get_privilege(rblk) == RCPRIV_PRIVILEGED) 38690209230bSgjelinek return (B_TRUE); 38700209230bSgjelinek } 38710209230bSgjelinek 38720209230bSgjelinek return (B_FALSE); 38730209230bSgjelinek } 38740209230bSgjelinek 38750209230bSgjelinek /* 38760209230bSgjelinek * Apply the current rctl settings to the specified, running zone. 38770209230bSgjelinek */ 38780209230bSgjelinek int 38790209230bSgjelinek zonecfg_apply_rctls(char *zone_name, zone_dochandle_t handle) 38800209230bSgjelinek { 38810209230bSgjelinek int err; 38820209230bSgjelinek int res = Z_OK; 38830209230bSgjelinek rctlblk_t *rblk; 38840209230bSgjelinek pr_info_handle_t p; 38850209230bSgjelinek struct zone_rctltab rctl; 38860209230bSgjelinek 38870209230bSgjelinek if ((err = zonecfg_setrctlent(handle)) != Z_OK) 38880209230bSgjelinek return (err); 38890209230bSgjelinek 38900209230bSgjelinek if ((rblk = (rctlblk_t *)malloc(rctlblk_size())) == NULL) { 38910209230bSgjelinek (void) zonecfg_endrctlent(handle); 38920209230bSgjelinek return (Z_NOMEM); 38930209230bSgjelinek } 38940209230bSgjelinek 38950209230bSgjelinek if (!grab_zone_proc(zone_name, &p)) { 38960209230bSgjelinek (void) zonecfg_endrctlent(handle); 38970209230bSgjelinek free(rblk); 38980209230bSgjelinek return (Z_SYSTEM); 38990209230bSgjelinek } 39000209230bSgjelinek 39010209230bSgjelinek while (zonecfg_getrctlent(handle, &rctl) == Z_OK) { 39020209230bSgjelinek char *rname; 39030209230bSgjelinek struct zone_rctlvaltab *valptr; 39040209230bSgjelinek 39050209230bSgjelinek rname = rctl.zone_rctl_name; 39060209230bSgjelinek 39070209230bSgjelinek /* first delete all current privileged settings for this rctl */ 39080209230bSgjelinek while (get_priv_rctl(p.pr, rname, rblk)) { 39090209230bSgjelinek if (pr_setrctl(p.pr, rname, NULL, rblk, RCTL_DELETE) != 39100209230bSgjelinek 0) { 39110209230bSgjelinek res = Z_SYSTEM; 39120209230bSgjelinek goto done; 39130209230bSgjelinek } 39140209230bSgjelinek } 39150209230bSgjelinek 39160209230bSgjelinek /* now set each new value for the rctl */ 39170209230bSgjelinek for (valptr = rctl.zone_rctl_valptr; valptr != NULL; 39180209230bSgjelinek valptr = valptr->zone_rctlval_next) { 39190209230bSgjelinek if ((err = zonecfg_construct_rctlblk(valptr, rblk)) 39200209230bSgjelinek != Z_OK) { 39210209230bSgjelinek res = errno = err; 39220209230bSgjelinek goto done; 39230209230bSgjelinek } 39240209230bSgjelinek 39250209230bSgjelinek if (pr_setrctl(p.pr, rname, NULL, rblk, RCTL_INSERT)) { 39260209230bSgjelinek res = Z_SYSTEM; 39270209230bSgjelinek goto done; 39280209230bSgjelinek } 39290209230bSgjelinek } 39300209230bSgjelinek } 39310209230bSgjelinek 39320209230bSgjelinek done: 39330209230bSgjelinek release_process(p.pr); 39340209230bSgjelinek free(rblk); 39350209230bSgjelinek (void) zonecfg_endrctlent(handle); 39360209230bSgjelinek 39370209230bSgjelinek return (res); 39380209230bSgjelinek } 39390209230bSgjelinek 39400209230bSgjelinek static const xmlChar * 39410209230bSgjelinek nm_to_dtd(char *nm) 39420209230bSgjelinek { 39430209230bSgjelinek if (strcmp(nm, "device") == 0) 39440209230bSgjelinek return (DTD_ELEM_DEVICE); 39450209230bSgjelinek if (strcmp(nm, "fs") == 0) 39460209230bSgjelinek return (DTD_ELEM_FS); 39470209230bSgjelinek if (strcmp(nm, "inherit-pkg-dir") == 0) 39480209230bSgjelinek return (DTD_ELEM_IPD); 39490209230bSgjelinek if (strcmp(nm, "net") == 0) 39500209230bSgjelinek return (DTD_ELEM_NET); 39510209230bSgjelinek if (strcmp(nm, "attr") == 0) 39520209230bSgjelinek return (DTD_ELEM_ATTR); 39530209230bSgjelinek if (strcmp(nm, "rctl") == 0) 39540209230bSgjelinek return (DTD_ELEM_RCTL); 39550209230bSgjelinek if (strcmp(nm, "dataset") == 0) 39560209230bSgjelinek return (DTD_ELEM_DATASET); 3957cb8a054bSGlenn Faden if (strcmp(nm, "admin") == 0) 3958cb8a054bSGlenn Faden return (DTD_ELEM_ADMIN); 39590209230bSgjelinek 39600209230bSgjelinek return (NULL); 39610209230bSgjelinek } 39620209230bSgjelinek 39630209230bSgjelinek int 39640209230bSgjelinek zonecfg_num_resources(zone_dochandle_t handle, char *rsrc) 39650209230bSgjelinek { 39660209230bSgjelinek int num = 0; 39670209230bSgjelinek const xmlChar *dtd; 39680209230bSgjelinek xmlNodePtr cur; 39690209230bSgjelinek 39700209230bSgjelinek if ((dtd = nm_to_dtd(rsrc)) == NULL) 39710209230bSgjelinek return (num); 39720209230bSgjelinek 39730209230bSgjelinek if (zonecfg_setent(handle) != Z_OK) 39740209230bSgjelinek return (num); 39750209230bSgjelinek 39760209230bSgjelinek for (cur = handle->zone_dh_cur; cur != NULL; cur = cur->next) 39770209230bSgjelinek if (xmlStrcmp(cur->name, dtd) == 0) 39780209230bSgjelinek num++; 39790209230bSgjelinek 39800209230bSgjelinek (void) zonecfg_endent(handle); 39810209230bSgjelinek 39820209230bSgjelinek return (num); 39830209230bSgjelinek } 39840209230bSgjelinek 39850209230bSgjelinek int 39860209230bSgjelinek zonecfg_del_all_resources(zone_dochandle_t handle, char *rsrc) 39870209230bSgjelinek { 39880209230bSgjelinek int err; 39890209230bSgjelinek const xmlChar *dtd; 39900209230bSgjelinek xmlNodePtr cur; 39910209230bSgjelinek 39920209230bSgjelinek if ((dtd = nm_to_dtd(rsrc)) == NULL) 39930209230bSgjelinek return (Z_NO_RESOURCE_TYPE); 39940209230bSgjelinek 39950209230bSgjelinek if ((err = zonecfg_setent(handle)) != Z_OK) 39960209230bSgjelinek return (err); 39970209230bSgjelinek 39980209230bSgjelinek cur = handle->zone_dh_cur; 39990209230bSgjelinek while (cur != NULL) { 40000209230bSgjelinek xmlNodePtr tmp; 40010209230bSgjelinek 40020209230bSgjelinek if (xmlStrcmp(cur->name, dtd)) { 40030209230bSgjelinek cur = cur->next; 40040209230bSgjelinek continue; 40050209230bSgjelinek } 40060209230bSgjelinek 40070209230bSgjelinek tmp = cur->next; 40080209230bSgjelinek xmlUnlinkNode(cur); 40090209230bSgjelinek xmlFreeNode(cur); 40100209230bSgjelinek cur = tmp; 40110209230bSgjelinek } 40120209230bSgjelinek 40130209230bSgjelinek (void) zonecfg_endent(handle); 40140209230bSgjelinek return (Z_OK); 40150209230bSgjelinek } 40160209230bSgjelinek 40170209230bSgjelinek static boolean_t 40180209230bSgjelinek valid_uint(char *s, uint64_t *n) 40190209230bSgjelinek { 40200209230bSgjelinek char *endp; 40210209230bSgjelinek 40220209230bSgjelinek /* strtoull accepts '-'?! so we want to flag that as an error */ 40230209230bSgjelinek if (strchr(s, '-') != NULL) 40240209230bSgjelinek return (B_FALSE); 40250209230bSgjelinek 40260209230bSgjelinek errno = 0; 40270209230bSgjelinek *n = strtoull(s, &endp, 10); 40280209230bSgjelinek 40290209230bSgjelinek if (errno != 0 || *endp != '\0') 40300209230bSgjelinek return (B_FALSE); 40310209230bSgjelinek return (B_TRUE); 40320209230bSgjelinek } 40330209230bSgjelinek 40340209230bSgjelinek /* 40350209230bSgjelinek * Convert a string representing a number (possibly a fraction) into an integer. 40360209230bSgjelinek * The string can have a modifier (K, M, G or T). The modifiers are treated 40370209230bSgjelinek * as powers of two (not 10). 40380209230bSgjelinek */ 40390209230bSgjelinek int 40400209230bSgjelinek zonecfg_str_to_bytes(char *str, uint64_t *bytes) 40410209230bSgjelinek { 40420209230bSgjelinek long double val; 40430209230bSgjelinek char *unitp; 40440209230bSgjelinek uint64_t scale; 40450209230bSgjelinek 40460209230bSgjelinek if ((val = strtold(str, &unitp)) < 0) 40470209230bSgjelinek return (-1); 40480209230bSgjelinek 40490209230bSgjelinek /* remove any leading white space from units string */ 40500209230bSgjelinek while (isspace(*unitp) != 0) 40510209230bSgjelinek ++unitp; 40520209230bSgjelinek 40530209230bSgjelinek /* if no units explicitly set, error */ 40540209230bSgjelinek if (unitp == NULL || *unitp == '\0') { 40550209230bSgjelinek scale = 1; 40560209230bSgjelinek } else { 40570209230bSgjelinek int i; 40580209230bSgjelinek char *units[] = {"K", "M", "G", "T", NULL}; 40590209230bSgjelinek 40600209230bSgjelinek scale = 1024; 40610209230bSgjelinek 40620209230bSgjelinek /* update scale based on units */ 40630209230bSgjelinek for (i = 0; units[i] != NULL; i++) { 40640209230bSgjelinek if (strcasecmp(unitp, units[i]) == 0) 40650209230bSgjelinek break; 40660209230bSgjelinek scale <<= 10; 40670209230bSgjelinek } 40680209230bSgjelinek 40690209230bSgjelinek if (units[i] == NULL) 40700209230bSgjelinek return (-1); 40710209230bSgjelinek } 40720209230bSgjelinek 40730209230bSgjelinek *bytes = (uint64_t)(val * scale); 40740209230bSgjelinek return (0); 40750209230bSgjelinek } 40760209230bSgjelinek 40770209230bSgjelinek boolean_t 40780209230bSgjelinek zonecfg_valid_ncpus(char *lowstr, char *highstr) 40790209230bSgjelinek { 40800209230bSgjelinek uint64_t low, high; 40810209230bSgjelinek 40820209230bSgjelinek if (!valid_uint(lowstr, &low) || !valid_uint(highstr, &high) || 40830209230bSgjelinek low < 1 || low > high) 40840209230bSgjelinek return (B_FALSE); 40850209230bSgjelinek 40860209230bSgjelinek return (B_TRUE); 40870209230bSgjelinek } 40880209230bSgjelinek 40890209230bSgjelinek boolean_t 40900209230bSgjelinek zonecfg_valid_importance(char *impstr) 40910209230bSgjelinek { 40920209230bSgjelinek uint64_t num; 40930209230bSgjelinek 40940209230bSgjelinek if (!valid_uint(impstr, &num)) 40950209230bSgjelinek return (B_FALSE); 40960209230bSgjelinek 40970209230bSgjelinek return (B_TRUE); 40980209230bSgjelinek } 40990209230bSgjelinek 41000209230bSgjelinek boolean_t 41010209230bSgjelinek zonecfg_valid_alias_limit(char *name, char *limitstr, uint64_t *limit) 41020209230bSgjelinek { 41030209230bSgjelinek int i; 41040209230bSgjelinek 41050209230bSgjelinek for (i = 0; aliases[i].shortname != NULL; i++) 41060209230bSgjelinek if (strcmp(name, aliases[i].shortname) == 0) 41070209230bSgjelinek break; 41080209230bSgjelinek 41090209230bSgjelinek if (aliases[i].shortname == NULL) 41100209230bSgjelinek return (B_FALSE); 41110209230bSgjelinek 41120209230bSgjelinek if (!valid_uint(limitstr, limit) || *limit < aliases[i].low_limit) 41130209230bSgjelinek return (B_FALSE); 41140209230bSgjelinek 41150209230bSgjelinek return (B_TRUE); 41160209230bSgjelinek } 41170209230bSgjelinek 41180209230bSgjelinek boolean_t 41190209230bSgjelinek zonecfg_valid_memlimit(char *memstr, uint64_t *mem_val) 41200209230bSgjelinek { 41210209230bSgjelinek if (zonecfg_str_to_bytes(memstr, mem_val) != 0) 41220209230bSgjelinek return (B_FALSE); 41230209230bSgjelinek 41240209230bSgjelinek return (B_TRUE); 41250209230bSgjelinek } 41260209230bSgjelinek 41270209230bSgjelinek static int 41280209230bSgjelinek zerr_pool(char *pool_err, int err_size, int res) 41290209230bSgjelinek { 41300209230bSgjelinek (void) strlcpy(pool_err, pool_strerror(pool_error()), err_size); 41310209230bSgjelinek return (res); 41320209230bSgjelinek } 41330209230bSgjelinek 41340209230bSgjelinek static int 41350209230bSgjelinek create_tmp_pset(char *pool_err, int err_size, pool_conf_t *pconf, pool_t *pool, 41360209230bSgjelinek char *name, int min, int max) 41370209230bSgjelinek { 41380209230bSgjelinek pool_resource_t *res; 41390209230bSgjelinek pool_elem_t *elem; 41400209230bSgjelinek pool_value_t *val; 41410209230bSgjelinek 41420209230bSgjelinek if ((res = pool_resource_create(pconf, "pset", name)) == NULL) 41430209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 41440209230bSgjelinek 41450209230bSgjelinek if (pool_associate(pconf, pool, res) != PO_SUCCESS) 41460209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 41470209230bSgjelinek 41480209230bSgjelinek if ((elem = pool_resource_to_elem(pconf, res)) == NULL) 41490209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 41500209230bSgjelinek 41510209230bSgjelinek if ((val = pool_value_alloc()) == NULL) 41520209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 41530209230bSgjelinek 41540209230bSgjelinek /* set the maximum number of cpus for the pset */ 41550209230bSgjelinek pool_value_set_uint64(val, (uint64_t)max); 41560209230bSgjelinek 41570209230bSgjelinek if (pool_put_property(pconf, elem, "pset.max", val) != PO_SUCCESS) { 41580209230bSgjelinek pool_value_free(val); 41590209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 41600209230bSgjelinek } 41610209230bSgjelinek 41620209230bSgjelinek /* set the minimum number of cpus for the pset */ 41630209230bSgjelinek pool_value_set_uint64(val, (uint64_t)min); 41640209230bSgjelinek 41650209230bSgjelinek if (pool_put_property(pconf, elem, "pset.min", val) != PO_SUCCESS) { 41660209230bSgjelinek pool_value_free(val); 41670209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 41680209230bSgjelinek } 41690209230bSgjelinek 41700209230bSgjelinek pool_value_free(val); 41710209230bSgjelinek 41720209230bSgjelinek return (Z_OK); 41730209230bSgjelinek } 41740209230bSgjelinek 41750209230bSgjelinek static int 41760209230bSgjelinek create_tmp_pool(char *pool_err, int err_size, pool_conf_t *pconf, char *name, 41770209230bSgjelinek struct zone_psettab *pset_tab) 41780209230bSgjelinek { 41790209230bSgjelinek pool_t *pool; 41800209230bSgjelinek int res = Z_OK; 41810209230bSgjelinek 41820209230bSgjelinek /* create a temporary pool configuration */ 41830209230bSgjelinek if (pool_conf_open(pconf, NULL, PO_TEMP) != PO_SUCCESS) { 41840209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 41850209230bSgjelinek return (res); 41860209230bSgjelinek } 41870209230bSgjelinek 41880209230bSgjelinek if ((pool = pool_create(pconf, name)) == NULL) { 41890209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL_CREATE); 41900209230bSgjelinek goto done; 41910209230bSgjelinek } 41920209230bSgjelinek 41930209230bSgjelinek /* set pool importance */ 41940209230bSgjelinek if (pset_tab->zone_importance[0] != '\0') { 41950209230bSgjelinek pool_elem_t *elem; 41960209230bSgjelinek pool_value_t *val; 41970209230bSgjelinek 41980209230bSgjelinek if ((elem = pool_to_elem(pconf, pool)) == NULL) { 41990209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 42000209230bSgjelinek goto done; 42010209230bSgjelinek } 42020209230bSgjelinek 42030209230bSgjelinek if ((val = pool_value_alloc()) == NULL) { 42040209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 42050209230bSgjelinek goto done; 42060209230bSgjelinek } 42070209230bSgjelinek 42080209230bSgjelinek pool_value_set_int64(val, 42090209230bSgjelinek (int64_t)atoi(pset_tab->zone_importance)); 42100209230bSgjelinek 42110209230bSgjelinek if (pool_put_property(pconf, elem, "pool.importance", val) 42120209230bSgjelinek != PO_SUCCESS) { 42130209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 42140209230bSgjelinek pool_value_free(val); 42150209230bSgjelinek goto done; 42160209230bSgjelinek } 42170209230bSgjelinek 42180209230bSgjelinek pool_value_free(val); 42190209230bSgjelinek } 42200209230bSgjelinek 42210209230bSgjelinek if ((res = create_tmp_pset(pool_err, err_size, pconf, pool, name, 42220209230bSgjelinek atoi(pset_tab->zone_ncpu_min), 42230209230bSgjelinek atoi(pset_tab->zone_ncpu_max))) != Z_OK) 42240209230bSgjelinek goto done; 42250209230bSgjelinek 42260209230bSgjelinek /* validation */ 42270209230bSgjelinek if (pool_conf_status(pconf) == POF_INVALID) { 42280209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 42290209230bSgjelinek goto done; 42300209230bSgjelinek } 42310209230bSgjelinek 42320209230bSgjelinek /* 42330209230bSgjelinek * This validation is the one we expect to fail if the user specified 42340209230bSgjelinek * an invalid configuration (too many cpus) for this system. 42350209230bSgjelinek */ 42360209230bSgjelinek if (pool_conf_validate(pconf, POV_RUNTIME) != PO_SUCCESS) { 42370209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL_CREATE); 42380209230bSgjelinek goto done; 42390209230bSgjelinek } 42400209230bSgjelinek 42410209230bSgjelinek /* 42420209230bSgjelinek * Commit the dynamic configuration but not the pool configuration 42430209230bSgjelinek * file. 42440209230bSgjelinek */ 42450209230bSgjelinek if (pool_conf_commit(pconf, 1) != PO_SUCCESS) 42460209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 42470209230bSgjelinek 42480209230bSgjelinek done: 42490209230bSgjelinek (void) pool_conf_close(pconf); 42500209230bSgjelinek return (res); 42510209230bSgjelinek } 42520209230bSgjelinek 42530209230bSgjelinek static int 42540209230bSgjelinek get_running_tmp_pset(pool_conf_t *pconf, pool_t *pool, pool_resource_t *pset, 42550209230bSgjelinek struct zone_psettab *pset_tab) 42560209230bSgjelinek { 42570209230bSgjelinek int nfound = 0; 42580209230bSgjelinek pool_elem_t *pe; 42590209230bSgjelinek pool_value_t *pv = pool_value_alloc(); 42600209230bSgjelinek uint64_t val_uint; 42610209230bSgjelinek 42620209230bSgjelinek if (pool != NULL) { 42630209230bSgjelinek pe = pool_to_elem(pconf, pool); 42640209230bSgjelinek if (pool_get_property(pconf, pe, "pool.importance", pv) 42650209230bSgjelinek != POC_INVAL) { 42660209230bSgjelinek int64_t val_int; 42670209230bSgjelinek 42680209230bSgjelinek (void) pool_value_get_int64(pv, &val_int); 42690209230bSgjelinek (void) snprintf(pset_tab->zone_importance, 42700209230bSgjelinek sizeof (pset_tab->zone_importance), "%d", val_int); 42710209230bSgjelinek nfound++; 42720209230bSgjelinek } 42730209230bSgjelinek } 42740209230bSgjelinek 42750209230bSgjelinek if (pset != NULL) { 42760209230bSgjelinek pe = pool_resource_to_elem(pconf, pset); 42770209230bSgjelinek if (pool_get_property(pconf, pe, "pset.min", pv) != POC_INVAL) { 42780209230bSgjelinek (void) pool_value_get_uint64(pv, &val_uint); 42790209230bSgjelinek (void) snprintf(pset_tab->zone_ncpu_min, 42800209230bSgjelinek sizeof (pset_tab->zone_ncpu_min), "%u", val_uint); 42810209230bSgjelinek nfound++; 42820209230bSgjelinek } 42830209230bSgjelinek 42840209230bSgjelinek if (pool_get_property(pconf, pe, "pset.max", pv) != POC_INVAL) { 42850209230bSgjelinek (void) pool_value_get_uint64(pv, &val_uint); 42860209230bSgjelinek (void) snprintf(pset_tab->zone_ncpu_max, 42870209230bSgjelinek sizeof (pset_tab->zone_ncpu_max), "%u", val_uint); 42880209230bSgjelinek nfound++; 42890209230bSgjelinek } 42900209230bSgjelinek } 42910209230bSgjelinek 42920209230bSgjelinek pool_value_free(pv); 42930209230bSgjelinek 42940209230bSgjelinek if (nfound == 3) 42950209230bSgjelinek return (PO_SUCCESS); 42960209230bSgjelinek 42970209230bSgjelinek return (PO_FAIL); 42980209230bSgjelinek } 42990209230bSgjelinek 43000209230bSgjelinek /* 43010209230bSgjelinek * Determine if a tmp pool is configured and if so, if the configuration is 43020209230bSgjelinek * still valid or if it has been changed since the tmp pool was created. 43030209230bSgjelinek * If the tmp pool configuration is no longer valid, delete the tmp pool. 43040209230bSgjelinek * 43050209230bSgjelinek * Set *valid=B_TRUE if there is an existing, valid tmp pool configuration. 43060209230bSgjelinek */ 43070209230bSgjelinek static int 43080209230bSgjelinek verify_del_tmp_pool(pool_conf_t *pconf, char *tmp_name, char *pool_err, 43090209230bSgjelinek int err_size, struct zone_psettab *pset_tab, boolean_t *exists) 43100209230bSgjelinek { 43110209230bSgjelinek int res = Z_OK; 43120209230bSgjelinek pool_t *pool; 43130209230bSgjelinek pool_resource_t *pset; 43140209230bSgjelinek struct zone_psettab pset_current; 43150209230bSgjelinek 43160209230bSgjelinek *exists = B_FALSE; 43170209230bSgjelinek 43180209230bSgjelinek if (pool_conf_open(pconf, pool_dynamic_location(), PO_RDWR) 43190209230bSgjelinek != PO_SUCCESS) { 43200209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 43210209230bSgjelinek return (res); 43220209230bSgjelinek } 43230209230bSgjelinek 43240209230bSgjelinek pool = pool_get_pool(pconf, tmp_name); 43250209230bSgjelinek pset = pool_get_resource(pconf, "pset", tmp_name); 43260209230bSgjelinek 43270209230bSgjelinek if (pool == NULL && pset == NULL) { 43280209230bSgjelinek /* no tmp pool configured */ 43290209230bSgjelinek goto done; 43300209230bSgjelinek } 43310209230bSgjelinek 43320209230bSgjelinek /* 43330209230bSgjelinek * If an existing tmp pool for this zone is configured with the proper 43340209230bSgjelinek * settings, then the tmp pool is valid. 43350209230bSgjelinek */ 43360209230bSgjelinek if (get_running_tmp_pset(pconf, pool, pset, &pset_current) 43370209230bSgjelinek == PO_SUCCESS && 43380209230bSgjelinek strcmp(pset_tab->zone_ncpu_min, 43390209230bSgjelinek pset_current.zone_ncpu_min) == 0 && 43400209230bSgjelinek strcmp(pset_tab->zone_ncpu_max, 43410209230bSgjelinek pset_current.zone_ncpu_max) == 0 && 43420209230bSgjelinek strcmp(pset_tab->zone_importance, 43430209230bSgjelinek pset_current.zone_importance) == 0) { 43440209230bSgjelinek *exists = B_TRUE; 43450209230bSgjelinek 43460209230bSgjelinek } else { 43470209230bSgjelinek /* 43480209230bSgjelinek * An out-of-date tmp pool configuration exists. Delete it 43490209230bSgjelinek * so that we can create the correct tmp pool config. 43500209230bSgjelinek */ 43510209230bSgjelinek if (pset != NULL && 43520209230bSgjelinek pool_resource_destroy(pconf, pset) != PO_SUCCESS) { 43530209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 43540209230bSgjelinek goto done; 43550209230bSgjelinek } 43560209230bSgjelinek 43570209230bSgjelinek if (pool != NULL && 43580209230bSgjelinek pool_destroy(pconf, pool) != PO_SUCCESS) { 43590209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 43600209230bSgjelinek goto done; 43610209230bSgjelinek } 43620209230bSgjelinek 43630209230bSgjelinek /* commit dynamic config */ 43640209230bSgjelinek if (pool_conf_commit(pconf, 0) != PO_SUCCESS) 43650209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 43660209230bSgjelinek } 43670209230bSgjelinek 43680209230bSgjelinek done: 43690209230bSgjelinek (void) pool_conf_close(pconf); 43700209230bSgjelinek 43710209230bSgjelinek return (res); 43720209230bSgjelinek } 43730209230bSgjelinek 43740209230bSgjelinek /* 43750209230bSgjelinek * Destroy any existing tmp pool. 43760209230bSgjelinek */ 43770209230bSgjelinek int 43780209230bSgjelinek zonecfg_destroy_tmp_pool(char *zone_name, char *pool_err, int err_size) 43790209230bSgjelinek { 43800209230bSgjelinek int status; 43810209230bSgjelinek int res = Z_OK; 43820209230bSgjelinek pool_conf_t *pconf; 43830209230bSgjelinek pool_t *pool; 43840209230bSgjelinek pool_resource_t *pset; 43850209230bSgjelinek char tmp_name[MAX_TMP_POOL_NAME]; 43860209230bSgjelinek 43870209230bSgjelinek /* if pools not enabled then nothing to do */ 43880209230bSgjelinek if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 43890209230bSgjelinek return (Z_OK); 43900209230bSgjelinek 43910209230bSgjelinek if ((pconf = pool_conf_alloc()) == NULL) 43920209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 43930209230bSgjelinek 43940209230bSgjelinek (void) snprintf(tmp_name, sizeof (tmp_name), TMP_POOL_NAME, zone_name); 43950209230bSgjelinek 43960209230bSgjelinek if (pool_conf_open(pconf, pool_dynamic_location(), PO_RDWR) 43970209230bSgjelinek != PO_SUCCESS) { 43980209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 43990209230bSgjelinek pool_conf_free(pconf); 44000209230bSgjelinek return (res); 44010209230bSgjelinek } 44020209230bSgjelinek 44030209230bSgjelinek pool = pool_get_pool(pconf, tmp_name); 44040209230bSgjelinek pset = pool_get_resource(pconf, "pset", tmp_name); 44050209230bSgjelinek 44060209230bSgjelinek if (pool == NULL && pset == NULL) { 44070209230bSgjelinek /* nothing to destroy, we're done */ 44080209230bSgjelinek goto done; 44090209230bSgjelinek } 44100209230bSgjelinek 44110209230bSgjelinek if (pset != NULL && pool_resource_destroy(pconf, pset) != PO_SUCCESS) { 44120209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 44130209230bSgjelinek goto done; 44140209230bSgjelinek } 44150209230bSgjelinek 44160209230bSgjelinek if (pool != NULL && pool_destroy(pconf, pool) != PO_SUCCESS) { 44170209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 44180209230bSgjelinek goto done; 44190209230bSgjelinek } 44200209230bSgjelinek 44210209230bSgjelinek /* commit dynamic config */ 44220209230bSgjelinek if (pool_conf_commit(pconf, 0) != PO_SUCCESS) 44230209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 44240209230bSgjelinek 44250209230bSgjelinek done: 44260209230bSgjelinek (void) pool_conf_close(pconf); 44270209230bSgjelinek pool_conf_free(pconf); 44280209230bSgjelinek 44290209230bSgjelinek return (res); 44300209230bSgjelinek } 44310209230bSgjelinek 44320209230bSgjelinek /* 44330209230bSgjelinek * Attempt to bind to a tmp pool for this zone. If there is no tmp pool 44340209230bSgjelinek * configured, we just return Z_OK. 44350209230bSgjelinek * 44360209230bSgjelinek * We either attempt to create the tmp pool for this zone or rebind to an 44370209230bSgjelinek * existing tmp pool for this zone. 44380209230bSgjelinek * 44390209230bSgjelinek * Rebinding is used when a zone with a tmp pool reboots so that we don't have 44400209230bSgjelinek * to recreate the tmp pool. To do this we need to be sure we work correctly 44410209230bSgjelinek * for the following cases: 44420209230bSgjelinek * 44430209230bSgjelinek * - there is an existing, properly configured tmp pool. 44440209230bSgjelinek * - zonecfg added tmp pool after zone was booted, must now create. 44450209230bSgjelinek * - zonecfg updated tmp pool config after zone was booted, in this case 44460209230bSgjelinek * we destroy the old tmp pool and create a new one. 44470209230bSgjelinek */ 44480209230bSgjelinek int 44490209230bSgjelinek zonecfg_bind_tmp_pool(zone_dochandle_t handle, zoneid_t zoneid, char *pool_err, 44500209230bSgjelinek int err_size) 44510209230bSgjelinek { 44520209230bSgjelinek struct zone_psettab pset_tab; 44530209230bSgjelinek int err; 44540209230bSgjelinek int status; 44550209230bSgjelinek pool_conf_t *pconf; 44560209230bSgjelinek boolean_t exists; 44570209230bSgjelinek char zone_name[ZONENAME_MAX]; 44580209230bSgjelinek char tmp_name[MAX_TMP_POOL_NAME]; 44590209230bSgjelinek 44600209230bSgjelinek (void) getzonenamebyid(zoneid, zone_name, sizeof (zone_name)); 44610209230bSgjelinek 44620209230bSgjelinek err = zonecfg_lookup_pset(handle, &pset_tab); 44630209230bSgjelinek 44640209230bSgjelinek /* if no temporary pool configured, we're done */ 44650209230bSgjelinek if (err == Z_NO_ENTRY) 44660209230bSgjelinek return (Z_OK); 44670209230bSgjelinek 44680209230bSgjelinek /* 44690209230bSgjelinek * importance might not have a value but we need to validate it here, 44700209230bSgjelinek * so set the default. 44710209230bSgjelinek */ 44720209230bSgjelinek if (pset_tab.zone_importance[0] == '\0') 44730209230bSgjelinek (void) strlcpy(pset_tab.zone_importance, "1", 44740209230bSgjelinek sizeof (pset_tab.zone_importance)); 44750209230bSgjelinek 44760209230bSgjelinek /* if pools not enabled, enable them now */ 44770209230bSgjelinek if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) { 44780209230bSgjelinek if (pool_set_status(POOL_ENABLED) != PO_SUCCESS) 44790209230bSgjelinek return (Z_POOL_ENABLE); 44800209230bSgjelinek } 44810209230bSgjelinek 44820209230bSgjelinek if ((pconf = pool_conf_alloc()) == NULL) 44830209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 44840209230bSgjelinek 44850209230bSgjelinek (void) snprintf(tmp_name, sizeof (tmp_name), TMP_POOL_NAME, zone_name); 44860209230bSgjelinek 44870209230bSgjelinek /* 44880209230bSgjelinek * Check if a valid tmp pool/pset already exists. If so, we just 44890209230bSgjelinek * reuse it. 44900209230bSgjelinek */ 44910209230bSgjelinek if ((err = verify_del_tmp_pool(pconf, tmp_name, pool_err, err_size, 44920209230bSgjelinek &pset_tab, &exists)) != Z_OK) { 44930209230bSgjelinek pool_conf_free(pconf); 44940209230bSgjelinek return (err); 44950209230bSgjelinek } 44960209230bSgjelinek 44970209230bSgjelinek if (!exists) 44980209230bSgjelinek err = create_tmp_pool(pool_err, err_size, pconf, tmp_name, 44990209230bSgjelinek &pset_tab); 45000209230bSgjelinek 45010209230bSgjelinek pool_conf_free(pconf); 45020209230bSgjelinek 45030209230bSgjelinek if (err != Z_OK) 45040209230bSgjelinek return (err); 45050209230bSgjelinek 45060209230bSgjelinek /* Bind the zone to the pool. */ 45070209230bSgjelinek if (pool_set_binding(tmp_name, P_ZONEID, zoneid) != PO_SUCCESS) 45080209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL_BIND)); 45090209230bSgjelinek 45100209230bSgjelinek return (Z_OK); 45110209230bSgjelinek } 45120209230bSgjelinek 45130209230bSgjelinek /* 45140209230bSgjelinek * Attempt to bind to a permanent pool for this zone. If there is no 45150209230bSgjelinek * permanent pool configured, we just return Z_OK. 45160209230bSgjelinek */ 45170209230bSgjelinek int 45180209230bSgjelinek zonecfg_bind_pool(zone_dochandle_t handle, zoneid_t zoneid, char *pool_err, 45190209230bSgjelinek int err_size) 45200209230bSgjelinek { 45210209230bSgjelinek pool_conf_t *poolconf; 45220209230bSgjelinek pool_t *pool; 45230209230bSgjelinek char poolname[MAXPATHLEN]; 45240209230bSgjelinek int status; 45250209230bSgjelinek int error; 45260209230bSgjelinek 45270209230bSgjelinek /* 45280209230bSgjelinek * Find the pool mentioned in the zone configuration, and bind to it. 45290209230bSgjelinek */ 45300209230bSgjelinek error = zonecfg_get_pool(handle, poolname, sizeof (poolname)); 45310209230bSgjelinek if (error == Z_NO_ENTRY || (error == Z_OK && strlen(poolname) == 0)) { 45320209230bSgjelinek /* 45330209230bSgjelinek * The property is not set on the zone, so the pool 45340209230bSgjelinek * should be bound to the default pool. But that's 45350209230bSgjelinek * already done by the kernel, so we can just return. 45360209230bSgjelinek */ 45370209230bSgjelinek return (Z_OK); 45380209230bSgjelinek } 45390209230bSgjelinek if (error != Z_OK) { 45400209230bSgjelinek /* 45410209230bSgjelinek * Not an error, even though it shouldn't be happening. 45420209230bSgjelinek */ 45430209230bSgjelinek return (Z_OK); 45440209230bSgjelinek } 45450209230bSgjelinek /* 45460209230bSgjelinek * Don't do anything if pools aren't enabled. 45470209230bSgjelinek */ 45480209230bSgjelinek if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 45490209230bSgjelinek return (Z_POOLS_NOT_ACTIVE); 45500209230bSgjelinek 45510209230bSgjelinek /* 45520209230bSgjelinek * Try to provide a sane error message if the requested pool doesn't 45530209230bSgjelinek * exist. 45540209230bSgjelinek */ 45550209230bSgjelinek if ((poolconf = pool_conf_alloc()) == NULL) 45560209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 45570209230bSgjelinek 45580209230bSgjelinek if (pool_conf_open(poolconf, pool_dynamic_location(), PO_RDONLY) != 45590209230bSgjelinek PO_SUCCESS) { 45600209230bSgjelinek pool_conf_free(poolconf); 45610209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 45620209230bSgjelinek } 45630209230bSgjelinek pool = pool_get_pool(poolconf, poolname); 45640209230bSgjelinek (void) pool_conf_close(poolconf); 45650209230bSgjelinek pool_conf_free(poolconf); 45660209230bSgjelinek if (pool == NULL) 45670209230bSgjelinek return (Z_NO_POOL); 45680209230bSgjelinek 45690209230bSgjelinek /* 45700209230bSgjelinek * Bind the zone to the pool. 45710209230bSgjelinek */ 45720209230bSgjelinek if (pool_set_binding(poolname, P_ZONEID, zoneid) != PO_SUCCESS) { 45730209230bSgjelinek /* if bind fails, return poolname for the error msg */ 45740209230bSgjelinek (void) strlcpy(pool_err, poolname, err_size); 45750209230bSgjelinek return (Z_POOL_BIND); 45760209230bSgjelinek } 45770209230bSgjelinek 45780209230bSgjelinek return (Z_OK); 45790209230bSgjelinek } 45800209230bSgjelinek 45810dc2366fSVenugopal Iyer int 45820dc2366fSVenugopal Iyer zonecfg_get_poolname(zone_dochandle_t handle, char *zone, char *pool, 45830dc2366fSVenugopal Iyer size_t poolsize) 45840dc2366fSVenugopal Iyer { 45850dc2366fSVenugopal Iyer int err; 45860dc2366fSVenugopal Iyer struct zone_psettab pset_tab; 45870dc2366fSVenugopal Iyer 45880dc2366fSVenugopal Iyer err = zonecfg_lookup_pset(handle, &pset_tab); 45890dc2366fSVenugopal Iyer if ((err != Z_NO_ENTRY) && (err != Z_OK)) 45900dc2366fSVenugopal Iyer return (err); 45910dc2366fSVenugopal Iyer 45920dc2366fSVenugopal Iyer /* pset was found so a temporary pool was created */ 45930dc2366fSVenugopal Iyer if (err == Z_OK) { 45940dc2366fSVenugopal Iyer (void) snprintf(pool, poolsize, TMP_POOL_NAME, zone); 45950dc2366fSVenugopal Iyer return (Z_OK); 45960dc2366fSVenugopal Iyer } 45970dc2366fSVenugopal Iyer 45980dc2366fSVenugopal Iyer /* lookup the poolname in zonecfg */ 45990dc2366fSVenugopal Iyer return (zonecfg_get_pool(handle, pool, poolsize)); 46000dc2366fSVenugopal Iyer } 46010209230bSgjelinek 46020209230bSgjelinek static boolean_t 46030209230bSgjelinek svc_enabled(char *svc_name) 46040209230bSgjelinek { 46050209230bSgjelinek scf_simple_prop_t *prop; 46060209230bSgjelinek boolean_t found = B_FALSE; 46070209230bSgjelinek 46080209230bSgjelinek prop = scf_simple_prop_get(NULL, svc_name, SCF_PG_GENERAL, 46090209230bSgjelinek SCF_PROPERTY_ENABLED); 46100209230bSgjelinek 46110209230bSgjelinek if (scf_simple_prop_numvalues(prop) == 1 && 46120209230bSgjelinek *scf_simple_prop_next_boolean(prop) != 0) 46130209230bSgjelinek found = B_TRUE; 46140209230bSgjelinek 46150209230bSgjelinek scf_simple_prop_free(prop); 46160209230bSgjelinek 46170209230bSgjelinek return (found); 46180209230bSgjelinek } 46190209230bSgjelinek 46200209230bSgjelinek /* 46210209230bSgjelinek * If the zone has capped-memory, make sure the rcap service is enabled. 46220209230bSgjelinek */ 46230209230bSgjelinek int 46240209230bSgjelinek zonecfg_enable_rcapd(char *err, int size) 46250209230bSgjelinek { 46260209230bSgjelinek if (!svc_enabled(RCAP_SERVICE) && 46270209230bSgjelinek smf_enable_instance(RCAP_SERVICE, 0) == -1) { 46280209230bSgjelinek (void) strlcpy(err, scf_strerror(scf_error()), size); 46290209230bSgjelinek return (Z_SYSTEM); 46300209230bSgjelinek } 46310209230bSgjelinek 46320209230bSgjelinek return (Z_OK); 46330209230bSgjelinek } 46340209230bSgjelinek 46350209230bSgjelinek /* 46360209230bSgjelinek * Return true if pset has cpu range specified and poold is not enabled. 46370209230bSgjelinek */ 46380209230bSgjelinek boolean_t 46390209230bSgjelinek zonecfg_warn_poold(zone_dochandle_t handle) 46400209230bSgjelinek { 46410209230bSgjelinek struct zone_psettab pset_tab; 46420209230bSgjelinek int min, max; 46430209230bSgjelinek int err; 46440209230bSgjelinek 46450209230bSgjelinek err = zonecfg_lookup_pset(handle, &pset_tab); 46460209230bSgjelinek 46470209230bSgjelinek /* if no temporary pool configured, we're done */ 46480209230bSgjelinek if (err == Z_NO_ENTRY) 46490209230bSgjelinek return (B_FALSE); 46500209230bSgjelinek 46510209230bSgjelinek min = atoi(pset_tab.zone_ncpu_min); 46520209230bSgjelinek max = atoi(pset_tab.zone_ncpu_max); 46530209230bSgjelinek 46540209230bSgjelinek /* range not specified, no need for poold */ 46550209230bSgjelinek if (min == max) 46560209230bSgjelinek return (B_FALSE); 46570209230bSgjelinek 46580209230bSgjelinek /* we have a range, check if poold service is enabled */ 46590209230bSgjelinek if (svc_enabled(POOLD_SERVICE)) 46600209230bSgjelinek return (B_FALSE); 46610209230bSgjelinek 46620209230bSgjelinek return (B_TRUE); 46630209230bSgjelinek } 46640209230bSgjelinek 466534eb7836Sjv227347 /* 466634eb7836Sjv227347 * Retrieve the specified pool's thread scheduling class. 'poolname' must 466734eb7836Sjv227347 * refer to the name of a configured resource pool. The thread scheduling 466834eb7836Sjv227347 * class specified by the pool will be stored in the buffer to which 'class' 466934eb7836Sjv227347 * points. 'clsize' is the byte size of the buffer to which 'class' points. 467034eb7836Sjv227347 * 467134eb7836Sjv227347 * This function returns Z_OK if it successfully stored the specified pool's 467234eb7836Sjv227347 * thread scheduling class into the buffer to which 'class' points. It returns 467334eb7836Sjv227347 * Z_NO_POOL if resource pools are not enabled, the function is unable to 467434eb7836Sjv227347 * access the system's resource pools configuration, or the specified pool 467534eb7836Sjv227347 * does not exist. The function returns Z_TOO_BIG if the buffer to which 467634eb7836Sjv227347 * 'class' points is not large enough to contain the thread scheduling class' 467734eb7836Sjv227347 * name. The function returns Z_NO_ENTRY if the pool does not specify a thread 467834eb7836Sjv227347 * scheduling class. 467934eb7836Sjv227347 */ 46800209230bSgjelinek static int 46810209230bSgjelinek get_pool_sched_class(char *poolname, char *class, int clsize) 46820209230bSgjelinek { 46830209230bSgjelinek int status; 46840209230bSgjelinek pool_conf_t *poolconf; 46850209230bSgjelinek pool_t *pool; 46860209230bSgjelinek pool_elem_t *pe; 46870209230bSgjelinek pool_value_t *pv = pool_value_alloc(); 46880209230bSgjelinek const char *sched_str; 46890209230bSgjelinek 46900209230bSgjelinek if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 46910209230bSgjelinek return (Z_NO_POOL); 46920209230bSgjelinek 46930209230bSgjelinek if ((poolconf = pool_conf_alloc()) == NULL) 46940209230bSgjelinek return (Z_NO_POOL); 46950209230bSgjelinek 46960209230bSgjelinek if (pool_conf_open(poolconf, pool_dynamic_location(), PO_RDONLY) != 46970209230bSgjelinek PO_SUCCESS) { 46980209230bSgjelinek pool_conf_free(poolconf); 46990209230bSgjelinek return (Z_NO_POOL); 47000209230bSgjelinek } 47010209230bSgjelinek 47020209230bSgjelinek if ((pool = pool_get_pool(poolconf, poolname)) == NULL) { 47030209230bSgjelinek (void) pool_conf_close(poolconf); 47040209230bSgjelinek pool_conf_free(poolconf); 47050209230bSgjelinek return (Z_NO_POOL); 47060209230bSgjelinek } 47070209230bSgjelinek 47080209230bSgjelinek pe = pool_to_elem(poolconf, pool); 470934eb7836Sjv227347 if (pool_get_property(poolconf, pe, "pool.scheduler", pv) != 471034eb7836Sjv227347 POC_STRING) { 47110209230bSgjelinek (void) pool_conf_close(poolconf); 47120209230bSgjelinek pool_conf_free(poolconf); 471334eb7836Sjv227347 return (Z_NO_ENTRY); 471434eb7836Sjv227347 } 471534eb7836Sjv227347 (void) pool_value_get_string(pv, &sched_str); 471634eb7836Sjv227347 (void) pool_conf_close(poolconf); 471734eb7836Sjv227347 pool_conf_free(poolconf); 471834eb7836Sjv227347 if (strlcpy(class, sched_str, clsize) >= clsize) 471934eb7836Sjv227347 return (Z_TOO_BIG); 47200209230bSgjelinek return (Z_OK); 47210209230bSgjelinek } 47220209230bSgjelinek 47230209230bSgjelinek /* 47240209230bSgjelinek * Get the default scheduling class for the zone. This will either be the 47250209230bSgjelinek * class set on the zone's pool or the system default scheduling class. 47260209230bSgjelinek */ 47270209230bSgjelinek int 47280209230bSgjelinek zonecfg_get_dflt_sched_class(zone_dochandle_t handle, char *class, int clsize) 47290209230bSgjelinek { 47300209230bSgjelinek char poolname[MAXPATHLEN]; 47310209230bSgjelinek 47320209230bSgjelinek if (zonecfg_get_pool(handle, poolname, sizeof (poolname)) == Z_OK) { 47330209230bSgjelinek /* check if the zone's pool specified a sched class */ 47340209230bSgjelinek if (get_pool_sched_class(poolname, class, clsize) == Z_OK) 47350209230bSgjelinek return (Z_OK); 47360209230bSgjelinek } 47370209230bSgjelinek 47380209230bSgjelinek if (priocntl(0, 0, PC_GETDFLCL, class, (uint64_t)clsize) == -1) 47390209230bSgjelinek return (Z_TOO_BIG); 47400209230bSgjelinek 47410209230bSgjelinek return (Z_OK); 47420209230bSgjelinek } 47430209230bSgjelinek 47447c478bd9Sstevel@tonic-gate int 47457c478bd9Sstevel@tonic-gate zonecfg_setfsent(zone_dochandle_t handle) 47467c478bd9Sstevel@tonic-gate { 47477c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 47487c478bd9Sstevel@tonic-gate } 47497c478bd9Sstevel@tonic-gate 47507c478bd9Sstevel@tonic-gate int 47517c478bd9Sstevel@tonic-gate zonecfg_getfsent(zone_dochandle_t handle, struct zone_fstab *tabptr) 47527c478bd9Sstevel@tonic-gate { 47537c478bd9Sstevel@tonic-gate xmlNodePtr cur, options; 47547c478bd9Sstevel@tonic-gate char options_str[MAX_MNTOPT_STR]; 47557c478bd9Sstevel@tonic-gate int err; 47567c478bd9Sstevel@tonic-gate 47577c478bd9Sstevel@tonic-gate if (handle == NULL) 47587c478bd9Sstevel@tonic-gate return (Z_INVAL); 47597c478bd9Sstevel@tonic-gate 47607c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 47617c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 47627c478bd9Sstevel@tonic-gate 47637c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 47647c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_FS)) 47657c478bd9Sstevel@tonic-gate break; 47667c478bd9Sstevel@tonic-gate if (cur == NULL) { 47677c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 47687c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 47697c478bd9Sstevel@tonic-gate } 47707c478bd9Sstevel@tonic-gate 47717c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_SPECIAL, tabptr->zone_fs_special, 47727c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_special))) != Z_OK) { 47737c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 47747c478bd9Sstevel@tonic-gate return (err); 47757c478bd9Sstevel@tonic-gate } 47767c478bd9Sstevel@tonic-gate 47777c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_RAW, tabptr->zone_fs_raw, 47787c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_raw))) != Z_OK) { 47797c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 47807c478bd9Sstevel@tonic-gate return (err); 47817c478bd9Sstevel@tonic-gate } 47827c478bd9Sstevel@tonic-gate 47837c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 47847c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_dir))) != Z_OK) { 47857c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 47867c478bd9Sstevel@tonic-gate return (err); 47877c478bd9Sstevel@tonic-gate } 47887c478bd9Sstevel@tonic-gate 47897c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_fs_type, 47907c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_type))) != Z_OK) { 47917c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 47927c478bd9Sstevel@tonic-gate return (err); 47937c478bd9Sstevel@tonic-gate } 47947c478bd9Sstevel@tonic-gate 47957c478bd9Sstevel@tonic-gate /* OK for options to be NULL */ 47967c478bd9Sstevel@tonic-gate tabptr->zone_fs_options = NULL; 47977c478bd9Sstevel@tonic-gate for (options = cur->xmlChildrenNode; options != NULL; 47987c478bd9Sstevel@tonic-gate options = options->next) { 47997c478bd9Sstevel@tonic-gate if (fetchprop(options, DTD_ATTR_NAME, options_str, 48007c478bd9Sstevel@tonic-gate sizeof (options_str)) != Z_OK) 48017c478bd9Sstevel@tonic-gate break; 48027c478bd9Sstevel@tonic-gate if (zonecfg_add_fs_option(tabptr, options_str) != Z_OK) 48037c478bd9Sstevel@tonic-gate break; 48047c478bd9Sstevel@tonic-gate } 48057c478bd9Sstevel@tonic-gate 48067c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 48077c478bd9Sstevel@tonic-gate return (Z_OK); 48087c478bd9Sstevel@tonic-gate } 48097c478bd9Sstevel@tonic-gate 48107c478bd9Sstevel@tonic-gate int 48117c478bd9Sstevel@tonic-gate zonecfg_endfsent(zone_dochandle_t handle) 48127c478bd9Sstevel@tonic-gate { 48137c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 48147c478bd9Sstevel@tonic-gate } 48157c478bd9Sstevel@tonic-gate 48167c478bd9Sstevel@tonic-gate int 48177c478bd9Sstevel@tonic-gate zonecfg_setipdent(zone_dochandle_t handle) 48187c478bd9Sstevel@tonic-gate { 48197c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 48207c478bd9Sstevel@tonic-gate } 48217c478bd9Sstevel@tonic-gate 48227c478bd9Sstevel@tonic-gate int 48237c478bd9Sstevel@tonic-gate zonecfg_getipdent(zone_dochandle_t handle, struct zone_fstab *tabptr) 48247c478bd9Sstevel@tonic-gate { 48257c478bd9Sstevel@tonic-gate xmlNodePtr cur; 48267c478bd9Sstevel@tonic-gate int err; 48277c478bd9Sstevel@tonic-gate 48287c478bd9Sstevel@tonic-gate if (handle == NULL) 48297c478bd9Sstevel@tonic-gate return (Z_INVAL); 48307c478bd9Sstevel@tonic-gate 48317c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 48327c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 48337c478bd9Sstevel@tonic-gate 48347c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 48357c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_IPD)) 48367c478bd9Sstevel@tonic-gate break; 48377c478bd9Sstevel@tonic-gate if (cur == NULL) { 48387c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 48397c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 48407c478bd9Sstevel@tonic-gate } 48417c478bd9Sstevel@tonic-gate 48427c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 48437c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_dir))) != Z_OK) { 48447c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 48457c478bd9Sstevel@tonic-gate return (err); 48467c478bd9Sstevel@tonic-gate } 48477c478bd9Sstevel@tonic-gate 48487c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 48497c478bd9Sstevel@tonic-gate return (Z_OK); 48507c478bd9Sstevel@tonic-gate } 48517c478bd9Sstevel@tonic-gate 48527c478bd9Sstevel@tonic-gate int 48537c478bd9Sstevel@tonic-gate zonecfg_endipdent(zone_dochandle_t handle) 48547c478bd9Sstevel@tonic-gate { 48557c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 48567c478bd9Sstevel@tonic-gate } 48577c478bd9Sstevel@tonic-gate 48587c478bd9Sstevel@tonic-gate int 48597c478bd9Sstevel@tonic-gate zonecfg_setnwifent(zone_dochandle_t handle) 48607c478bd9Sstevel@tonic-gate { 48617c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 48627c478bd9Sstevel@tonic-gate } 48637c478bd9Sstevel@tonic-gate 48647c478bd9Sstevel@tonic-gate int 48657c478bd9Sstevel@tonic-gate zonecfg_getnwifent(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 48667c478bd9Sstevel@tonic-gate { 48677c478bd9Sstevel@tonic-gate xmlNodePtr cur; 48687c478bd9Sstevel@tonic-gate int err; 48697c478bd9Sstevel@tonic-gate 48707c478bd9Sstevel@tonic-gate if (handle == NULL) 48717c478bd9Sstevel@tonic-gate return (Z_INVAL); 48727c478bd9Sstevel@tonic-gate 48737c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 48747c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 48757c478bd9Sstevel@tonic-gate 48767c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 48777c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_NET)) 48787c478bd9Sstevel@tonic-gate break; 48797c478bd9Sstevel@tonic-gate if (cur == NULL) { 48807c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 48817c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 48827c478bd9Sstevel@tonic-gate } 48837c478bd9Sstevel@tonic-gate 48847c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_ADDRESS, tabptr->zone_nwif_address, 48857c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_nwif_address))) != Z_OK) { 48867c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 48877c478bd9Sstevel@tonic-gate return (err); 48887c478bd9Sstevel@tonic-gate } 48897c478bd9Sstevel@tonic-gate 48907c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_PHYSICAL, tabptr->zone_nwif_physical, 48917c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_nwif_physical))) != Z_OK) { 48927c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 48937c478bd9Sstevel@tonic-gate return (err); 48947c478bd9Sstevel@tonic-gate } 48957c478bd9Sstevel@tonic-gate 4896de860bd9Sgfaden if ((err = fetchprop(cur, DTD_ATTR_DEFROUTER, 4897de860bd9Sgfaden tabptr->zone_nwif_defrouter, 4898de860bd9Sgfaden sizeof (tabptr->zone_nwif_defrouter))) != Z_OK) { 4899de860bd9Sgfaden handle->zone_dh_cur = handle->zone_dh_top; 4900de860bd9Sgfaden return (err); 4901de860bd9Sgfaden } 4902de860bd9Sgfaden 49037c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 49047c478bd9Sstevel@tonic-gate return (Z_OK); 49057c478bd9Sstevel@tonic-gate } 49067c478bd9Sstevel@tonic-gate 49077c478bd9Sstevel@tonic-gate int 49087c478bd9Sstevel@tonic-gate zonecfg_endnwifent(zone_dochandle_t handle) 49097c478bd9Sstevel@tonic-gate { 49107c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 49117c478bd9Sstevel@tonic-gate } 49127c478bd9Sstevel@tonic-gate 49137c478bd9Sstevel@tonic-gate int 49147c478bd9Sstevel@tonic-gate zonecfg_setdevent(zone_dochandle_t handle) 49157c478bd9Sstevel@tonic-gate { 49167c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 49177c478bd9Sstevel@tonic-gate } 49187c478bd9Sstevel@tonic-gate 49197c478bd9Sstevel@tonic-gate int 49207c478bd9Sstevel@tonic-gate zonecfg_getdevent(zone_dochandle_t handle, struct zone_devtab *tabptr) 49217c478bd9Sstevel@tonic-gate { 49227c478bd9Sstevel@tonic-gate xmlNodePtr cur; 49237c478bd9Sstevel@tonic-gate int err; 49247c478bd9Sstevel@tonic-gate 49257c478bd9Sstevel@tonic-gate if (handle == NULL) 49267c478bd9Sstevel@tonic-gate return (Z_INVAL); 49277c478bd9Sstevel@tonic-gate 49287c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 49297c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 49307c478bd9Sstevel@tonic-gate 49317c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 49327c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 49337c478bd9Sstevel@tonic-gate break; 49347c478bd9Sstevel@tonic-gate if (cur == NULL) { 49357c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 49367c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 49377c478bd9Sstevel@tonic-gate } 49387c478bd9Sstevel@tonic-gate 49397c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_MATCH, tabptr->zone_dev_match, 49407c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_dev_match))) != Z_OK) { 49417c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 49427c478bd9Sstevel@tonic-gate return (err); 49437c478bd9Sstevel@tonic-gate } 49447c478bd9Sstevel@tonic-gate 49457c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 49467c478bd9Sstevel@tonic-gate return (Z_OK); 49477c478bd9Sstevel@tonic-gate } 49487c478bd9Sstevel@tonic-gate 49497c478bd9Sstevel@tonic-gate int 49507c478bd9Sstevel@tonic-gate zonecfg_enddevent(zone_dochandle_t handle) 49517c478bd9Sstevel@tonic-gate { 49527c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 49537c478bd9Sstevel@tonic-gate } 49547c478bd9Sstevel@tonic-gate 49557c478bd9Sstevel@tonic-gate int 49567c478bd9Sstevel@tonic-gate zonecfg_setrctlent(zone_dochandle_t handle) 49577c478bd9Sstevel@tonic-gate { 49587c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 49597c478bd9Sstevel@tonic-gate } 49607c478bd9Sstevel@tonic-gate 49617c478bd9Sstevel@tonic-gate int 49627c478bd9Sstevel@tonic-gate zonecfg_getrctlent(zone_dochandle_t handle, struct zone_rctltab *tabptr) 49637c478bd9Sstevel@tonic-gate { 49647c478bd9Sstevel@tonic-gate xmlNodePtr cur, val; 49657c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valptr; 49667c478bd9Sstevel@tonic-gate int err; 49677c478bd9Sstevel@tonic-gate 49687c478bd9Sstevel@tonic-gate if (handle == NULL) 49697c478bd9Sstevel@tonic-gate return (Z_INVAL); 49707c478bd9Sstevel@tonic-gate 49717c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 49727c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 49737c478bd9Sstevel@tonic-gate 49747c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 49757c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 49767c478bd9Sstevel@tonic-gate break; 49777c478bd9Sstevel@tonic-gate if (cur == NULL) { 49787c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 49797c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 49807c478bd9Sstevel@tonic-gate } 49817c478bd9Sstevel@tonic-gate 49827c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_rctl_name, 49837c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_rctl_name))) != Z_OK) { 49847c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 49857c478bd9Sstevel@tonic-gate return (err); 49867c478bd9Sstevel@tonic-gate } 49877c478bd9Sstevel@tonic-gate 49887c478bd9Sstevel@tonic-gate tabptr->zone_rctl_valptr = NULL; 49897c478bd9Sstevel@tonic-gate for (val = cur->xmlChildrenNode; val != NULL; val = val->next) { 49907c478bd9Sstevel@tonic-gate valptr = (struct zone_rctlvaltab *)malloc( 49917c478bd9Sstevel@tonic-gate sizeof (struct zone_rctlvaltab)); 49927c478bd9Sstevel@tonic-gate if (valptr == NULL) 49937c478bd9Sstevel@tonic-gate return (Z_NOMEM); 49947c478bd9Sstevel@tonic-gate if (fetchprop(val, DTD_ATTR_PRIV, valptr->zone_rctlval_priv, 49957c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_priv)) != Z_OK) 49967c478bd9Sstevel@tonic-gate break; 49977c478bd9Sstevel@tonic-gate if (fetchprop(val, DTD_ATTR_LIMIT, valptr->zone_rctlval_limit, 49987c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_limit)) != Z_OK) 49997c478bd9Sstevel@tonic-gate break; 50007c478bd9Sstevel@tonic-gate if (fetchprop(val, DTD_ATTR_ACTION, valptr->zone_rctlval_action, 50017c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_action)) != Z_OK) 50027c478bd9Sstevel@tonic-gate break; 50037c478bd9Sstevel@tonic-gate if (zonecfg_add_rctl_value(tabptr, valptr) != Z_OK) 50047c478bd9Sstevel@tonic-gate break; 50057c478bd9Sstevel@tonic-gate } 50067c478bd9Sstevel@tonic-gate 50077c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 50087c478bd9Sstevel@tonic-gate return (Z_OK); 50097c478bd9Sstevel@tonic-gate } 50107c478bd9Sstevel@tonic-gate 50117c478bd9Sstevel@tonic-gate int 50127c478bd9Sstevel@tonic-gate zonecfg_endrctlent(zone_dochandle_t handle) 50137c478bd9Sstevel@tonic-gate { 50147c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 50157c478bd9Sstevel@tonic-gate } 50167c478bd9Sstevel@tonic-gate 50177c478bd9Sstevel@tonic-gate int 50187c478bd9Sstevel@tonic-gate zonecfg_setattrent(zone_dochandle_t handle) 50197c478bd9Sstevel@tonic-gate { 50207c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 50217c478bd9Sstevel@tonic-gate } 50227c478bd9Sstevel@tonic-gate 50237c478bd9Sstevel@tonic-gate int 50247c478bd9Sstevel@tonic-gate zonecfg_getattrent(zone_dochandle_t handle, struct zone_attrtab *tabptr) 50257c478bd9Sstevel@tonic-gate { 50267c478bd9Sstevel@tonic-gate xmlNodePtr cur; 50277c478bd9Sstevel@tonic-gate int err; 50287c478bd9Sstevel@tonic-gate 50297c478bd9Sstevel@tonic-gate if (handle == NULL) 50307c478bd9Sstevel@tonic-gate return (Z_INVAL); 50317c478bd9Sstevel@tonic-gate 50327c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 50337c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 50347c478bd9Sstevel@tonic-gate 50357c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 50367c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 50377c478bd9Sstevel@tonic-gate break; 50387c478bd9Sstevel@tonic-gate if (cur == NULL) { 50397c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 50407c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 50417c478bd9Sstevel@tonic-gate } 50427c478bd9Sstevel@tonic-gate 50437c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_attr_name, 50447c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_name))) != Z_OK) { 50457c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 50467c478bd9Sstevel@tonic-gate return (err); 50477c478bd9Sstevel@tonic-gate } 50487c478bd9Sstevel@tonic-gate 50497c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_attr_type, 50507c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_type))) != Z_OK) { 50517c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 50527c478bd9Sstevel@tonic-gate return (err); 50537c478bd9Sstevel@tonic-gate } 50547c478bd9Sstevel@tonic-gate 50557c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_VALUE, tabptr->zone_attr_value, 50567c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_value))) != Z_OK) { 50577c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 50587c478bd9Sstevel@tonic-gate return (err); 50597c478bd9Sstevel@tonic-gate } 50607c478bd9Sstevel@tonic-gate 50617c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 50627c478bd9Sstevel@tonic-gate return (Z_OK); 50637c478bd9Sstevel@tonic-gate } 50647c478bd9Sstevel@tonic-gate 50657c478bd9Sstevel@tonic-gate int 50667c478bd9Sstevel@tonic-gate zonecfg_endattrent(zone_dochandle_t handle) 50677c478bd9Sstevel@tonic-gate { 50687c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 50697c478bd9Sstevel@tonic-gate } 50707c478bd9Sstevel@tonic-gate 5071cb8a054bSGlenn Faden int 5072cb8a054bSGlenn Faden zonecfg_setadminent(zone_dochandle_t handle) 5073cb8a054bSGlenn Faden { 5074cb8a054bSGlenn Faden return (zonecfg_setent(handle)); 5075cb8a054bSGlenn Faden } 5076cb8a054bSGlenn Faden 5077cb8a054bSGlenn Faden int 5078cb8a054bSGlenn Faden zonecfg_getadminent(zone_dochandle_t handle, struct zone_admintab *tabptr) 5079cb8a054bSGlenn Faden { 5080cb8a054bSGlenn Faden xmlNodePtr cur; 5081cb8a054bSGlenn Faden int err; 5082cb8a054bSGlenn Faden 5083cb8a054bSGlenn Faden if (handle == NULL) 5084cb8a054bSGlenn Faden return (Z_INVAL); 5085cb8a054bSGlenn Faden 5086cb8a054bSGlenn Faden if ((cur = handle->zone_dh_cur) == NULL) 5087cb8a054bSGlenn Faden return (Z_NO_ENTRY); 5088cb8a054bSGlenn Faden 5089cb8a054bSGlenn Faden for (; cur != NULL; cur = cur->next) 5090cb8a054bSGlenn Faden if (!xmlStrcmp(cur->name, DTD_ELEM_ADMIN)) 5091cb8a054bSGlenn Faden break; 5092cb8a054bSGlenn Faden if (cur == NULL) { 5093cb8a054bSGlenn Faden handle->zone_dh_cur = handle->zone_dh_top; 5094cb8a054bSGlenn Faden return (Z_NO_ENTRY); 5095cb8a054bSGlenn Faden } 5096cb8a054bSGlenn Faden 5097cb8a054bSGlenn Faden if ((err = fetchprop(cur, DTD_ATTR_USER, tabptr->zone_admin_user, 5098cb8a054bSGlenn Faden sizeof (tabptr->zone_admin_user))) != Z_OK) { 5099cb8a054bSGlenn Faden handle->zone_dh_cur = handle->zone_dh_top; 5100cb8a054bSGlenn Faden return (err); 5101cb8a054bSGlenn Faden } 5102cb8a054bSGlenn Faden 5103cb8a054bSGlenn Faden 5104cb8a054bSGlenn Faden if ((err = fetchprop(cur, DTD_ATTR_AUTHS, tabptr->zone_admin_auths, 5105cb8a054bSGlenn Faden sizeof (tabptr->zone_admin_auths))) != Z_OK) { 5106cb8a054bSGlenn Faden handle->zone_dh_cur = handle->zone_dh_top; 5107cb8a054bSGlenn Faden return (err); 5108cb8a054bSGlenn Faden } 5109cb8a054bSGlenn Faden 5110cb8a054bSGlenn Faden handle->zone_dh_cur = cur->next; 5111cb8a054bSGlenn Faden return (Z_OK); 5112cb8a054bSGlenn Faden } 5113cb8a054bSGlenn Faden 5114cb8a054bSGlenn Faden int 5115cb8a054bSGlenn Faden zonecfg_endadminent(zone_dochandle_t handle) 5116cb8a054bSGlenn Faden { 5117cb8a054bSGlenn Faden return (zonecfg_endent(handle)); 5118cb8a054bSGlenn Faden } 5119cb8a054bSGlenn Faden 5120ffbafc53Scomay /* 5121ffbafc53Scomay * The privileges available on the system and described in privileges(5) 51229acbbeafSnn35248 * fall into four categories with respect to non-global zones: 51239acbbeafSnn35248 * 51249acbbeafSnn35248 * Default set of privileges considered safe for all non-global 51259acbbeafSnn35248 * zones. These privileges are "safe" in the sense that a 51269acbbeafSnn35248 * privileged process in the zone cannot affect processes in any 51279acbbeafSnn35248 * other zone on the system. 51289acbbeafSnn35248 * 51299acbbeafSnn35248 * Set of privileges not currently permitted within a non-global 51309acbbeafSnn35248 * zone. These privileges are considered by default, "unsafe," 51319acbbeafSnn35248 * and include ones which affect global resources (such as the 51329acbbeafSnn35248 * system clock or physical memory) or are overly broad and cover 51339acbbeafSnn35248 * more than one mechanism in the system. In other cases, there 51349acbbeafSnn35248 * has not been sufficient virtualization in the parts of the 51359acbbeafSnn35248 * system the privilege covers to allow its use within a 51369acbbeafSnn35248 * non-global zone. 51379acbbeafSnn35248 * 51389acbbeafSnn35248 * Set of privileges required in order to get a zone booted and 51399acbbeafSnn35248 * init(1M) started. These cannot be removed from the zone's 51409acbbeafSnn35248 * privilege set. 51419acbbeafSnn35248 * 51429acbbeafSnn35248 * All other privileges are optional and are potentially useful for 5143ffbafc53Scomay * processes executing inside a non-global zone. 5144ffbafc53Scomay * 5145ffbafc53Scomay * When privileges are added to the system, a determination needs to be 5146ffbafc53Scomay * made as to which category the privilege belongs to. Ideally, 5147ffbafc53Scomay * privileges should be fine-grained enough and the mechanisms they cover 5148ffbafc53Scomay * virtualized enough so that they can be made available to non-global 5149ffbafc53Scomay * zones. 5150ffbafc53Scomay */ 5151ffbafc53Scomay 5152ffbafc53Scomay /* 5153ffbafc53Scomay * Define some of the tokens that priv_str_to_set(3C) recognizes. Since 5154ffbafc53Scomay * the privilege string separator can be any character, although it is 5155ffbafc53Scomay * usually a comma character, define these here as well in the event that 5156ffbafc53Scomay * they change or are augmented in the future. 5157ffbafc53Scomay */ 5158ffbafc53Scomay #define BASIC_TOKEN "basic" 5159ffbafc53Scomay #define DEFAULT_TOKEN "default" 5160ffbafc53Scomay #define ZONE_TOKEN "zone" 5161ffbafc53Scomay #define TOKEN_PRIV_CHAR ',' 5162ffbafc53Scomay #define TOKEN_PRIV_STR "," 5163ffbafc53Scomay 51649acbbeafSnn35248 typedef struct priv_node { 51659acbbeafSnn35248 struct priv_node *pn_next; /* Next privilege */ 51669acbbeafSnn35248 char *pn_priv; /* Privileges name */ 51679acbbeafSnn35248 } priv_node_t; 51689acbbeafSnn35248 51699acbbeafSnn35248 /* Privileges lists can differ across brands */ 51709acbbeafSnn35248 typedef struct priv_lists { 51719acbbeafSnn35248 /* Privileges considered safe for all non-global zones of a brand */ 51729acbbeafSnn35248 struct priv_node *pl_default; 51739acbbeafSnn35248 51749acbbeafSnn35248 /* Privileges not permitted for all non-global zones of a brand */ 51759acbbeafSnn35248 struct priv_node *pl_prohibited; 51769acbbeafSnn35248 51779acbbeafSnn35248 /* Privileges required for all non-global zones of a brand */ 51789acbbeafSnn35248 struct priv_node *pl_required; 5179bf1d7e28Sdh155122 5180bf1d7e28Sdh155122 /* 5181bf1d7e28Sdh155122 * ip-type of the zone these privileges lists apply to. 5182bf1d7e28Sdh155122 * It is used to pass ip-type to the callback function, 5183bf1d7e28Sdh155122 * priv_lists_cb, which has no way of getting the ip-type. 5184bf1d7e28Sdh155122 */ 5185bf1d7e28Sdh155122 const char *pl_iptype; 51869acbbeafSnn35248 } priv_lists_t; 51879acbbeafSnn35248 51889acbbeafSnn35248 static int 5189bf1d7e28Sdh155122 priv_lists_cb(void *data, priv_iter_t *priv_iter) 51907c478bd9Sstevel@tonic-gate { 51919acbbeafSnn35248 priv_lists_t *plp = (priv_lists_t *)data; 51929acbbeafSnn35248 priv_node_t *pnp; 51939acbbeafSnn35248 5194bf1d7e28Sdh155122 /* Skip this privilege if ip-type does not match */ 5195bf1d7e28Sdh155122 if ((strcmp(priv_iter->pi_iptype, "all") != 0) && 5196bf1d7e28Sdh155122 (strcmp(priv_iter->pi_iptype, plp->pl_iptype) != 0)) 5197bf1d7e28Sdh155122 return (0); 5198bf1d7e28Sdh155122 51999acbbeafSnn35248 /* Allocate a new priv list node. */ 52009acbbeafSnn35248 if ((pnp = malloc(sizeof (*pnp))) == NULL) 52019acbbeafSnn35248 return (-1); 5202bf1d7e28Sdh155122 if ((pnp->pn_priv = strdup(priv_iter->pi_name)) == NULL) { 52039acbbeafSnn35248 free(pnp); 52049acbbeafSnn35248 return (-1); 52059acbbeafSnn35248 } 52069acbbeafSnn35248 52079acbbeafSnn35248 /* Insert the new priv list node into the right list */ 5208bf1d7e28Sdh155122 if (strcmp(priv_iter->pi_set, "default") == 0) { 52099acbbeafSnn35248 pnp->pn_next = plp->pl_default; 52109acbbeafSnn35248 plp->pl_default = pnp; 5211bf1d7e28Sdh155122 } else if (strcmp(priv_iter->pi_set, "prohibited") == 0) { 52129acbbeafSnn35248 pnp->pn_next = plp->pl_prohibited; 52139acbbeafSnn35248 plp->pl_prohibited = pnp; 5214bf1d7e28Sdh155122 } else if (strcmp(priv_iter->pi_set, "required") == 0) { 52159acbbeafSnn35248 pnp->pn_next = plp->pl_required; 52169acbbeafSnn35248 plp->pl_required = pnp; 52179acbbeafSnn35248 } else { 52189acbbeafSnn35248 free(pnp->pn_priv); 52199acbbeafSnn35248 free(pnp); 52209acbbeafSnn35248 return (-1); 52219acbbeafSnn35248 } 52229acbbeafSnn35248 return (0); 52239acbbeafSnn35248 } 52249acbbeafSnn35248 52259acbbeafSnn35248 static void 52269acbbeafSnn35248 priv_lists_destroy(priv_lists_t *plp) 52279acbbeafSnn35248 { 52289acbbeafSnn35248 priv_node_t *pnp; 52299acbbeafSnn35248 52309acbbeafSnn35248 assert(plp != NULL); 52319acbbeafSnn35248 52329acbbeafSnn35248 while ((pnp = plp->pl_default) != NULL) { 52339acbbeafSnn35248 plp->pl_default = pnp->pn_next; 52349acbbeafSnn35248 free(pnp->pn_priv); 52359acbbeafSnn35248 free(pnp); 52369acbbeafSnn35248 } 52379acbbeafSnn35248 while ((pnp = plp->pl_prohibited) != NULL) { 52389acbbeafSnn35248 plp->pl_prohibited = pnp->pn_next; 52399acbbeafSnn35248 free(pnp->pn_priv); 52409acbbeafSnn35248 free(pnp); 52419acbbeafSnn35248 } 52429acbbeafSnn35248 while ((pnp = plp->pl_required) != NULL) { 52439acbbeafSnn35248 plp->pl_required = pnp->pn_next; 52449acbbeafSnn35248 free(pnp->pn_priv); 52459acbbeafSnn35248 free(pnp); 52469acbbeafSnn35248 } 52479acbbeafSnn35248 free(plp); 52489acbbeafSnn35248 } 52499acbbeafSnn35248 52509acbbeafSnn35248 static int 5251e5816e35SEdward Pilatowicz priv_lists_create(zone_dochandle_t handle, char *brand, priv_lists_t **plpp, 5252bf1d7e28Sdh155122 const char *curr_iptype) 52539acbbeafSnn35248 { 52549acbbeafSnn35248 priv_lists_t *plp; 5255123807fbSedp brand_handle_t bh; 5256e5816e35SEdward Pilatowicz char brand_str[MAXNAMELEN]; 5257e5816e35SEdward Pilatowicz 5258e5816e35SEdward Pilatowicz /* handle or brand must be set, but never both */ 5259e5816e35SEdward Pilatowicz assert((handle != NULL) || (brand != NULL)); 5260e5816e35SEdward Pilatowicz assert((handle == NULL) || (brand == NULL)); 52619acbbeafSnn35248 52629acbbeafSnn35248 if (handle != NULL) { 5263e5816e35SEdward Pilatowicz brand = brand_str; 5264e5816e35SEdward Pilatowicz if (zonecfg_get_brand(handle, brand, sizeof (brand_str)) != 0) 52659acbbeafSnn35248 return (Z_BRAND_ERROR); 52669acbbeafSnn35248 } 52679acbbeafSnn35248 5268123807fbSedp if ((bh = brand_open(brand)) == NULL) 52699acbbeafSnn35248 return (Z_BRAND_ERROR); 52709acbbeafSnn35248 52719acbbeafSnn35248 if ((plp = calloc(1, sizeof (priv_lists_t))) == NULL) { 5272123807fbSedp brand_close(bh); 52739acbbeafSnn35248 return (Z_NOMEM); 52749acbbeafSnn35248 } 52759acbbeafSnn35248 5276bf1d7e28Sdh155122 plp->pl_iptype = curr_iptype; 5277bf1d7e28Sdh155122 52789acbbeafSnn35248 /* construct the privilege lists */ 5279123807fbSedp if (brand_config_iter_privilege(bh, priv_lists_cb, plp) != 0) { 52809acbbeafSnn35248 priv_lists_destroy(plp); 5281123807fbSedp brand_close(bh); 52829acbbeafSnn35248 return (Z_BRAND_ERROR); 52839acbbeafSnn35248 } 52849acbbeafSnn35248 5285123807fbSedp brand_close(bh); 52869acbbeafSnn35248 *plpp = plp; 52879acbbeafSnn35248 return (Z_OK); 52889acbbeafSnn35248 } 52899acbbeafSnn35248 52909acbbeafSnn35248 static int 52919acbbeafSnn35248 get_default_privset(priv_set_t *privs, priv_lists_t *plp) 52929acbbeafSnn35248 { 52939acbbeafSnn35248 priv_node_t *pnp; 5294ffbafc53Scomay priv_set_t *basic; 52957c478bd9Sstevel@tonic-gate 5296ffbafc53Scomay basic = priv_str_to_set(BASIC_TOKEN, TOKEN_PRIV_STR, NULL); 52977c478bd9Sstevel@tonic-gate if (basic == NULL) 5298ffbafc53Scomay return (errno == ENOMEM ? Z_NOMEM : Z_INVAL); 52997c478bd9Sstevel@tonic-gate 53007c478bd9Sstevel@tonic-gate priv_union(basic, privs); 53017c478bd9Sstevel@tonic-gate priv_freeset(basic); 53027c478bd9Sstevel@tonic-gate 53039acbbeafSnn35248 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) { 53049acbbeafSnn35248 if (priv_addset(privs, pnp->pn_priv) != 0) 53057c478bd9Sstevel@tonic-gate return (Z_INVAL); 53067c478bd9Sstevel@tonic-gate } 53079acbbeafSnn35248 53087c478bd9Sstevel@tonic-gate return (Z_OK); 53097c478bd9Sstevel@tonic-gate } 53107c478bd9Sstevel@tonic-gate 53119acbbeafSnn35248 int 5312e5816e35SEdward Pilatowicz zonecfg_default_brand(char *brand, size_t brandsize) 5313e5816e35SEdward Pilatowicz { 5314e5816e35SEdward Pilatowicz zone_dochandle_t handle; 53157522f2fcSEdward Pilatowicz int myzoneid = getzoneid(); 5316e5816e35SEdward Pilatowicz int ret; 5317e5816e35SEdward Pilatowicz 53187522f2fcSEdward Pilatowicz /* 53197522f2fcSEdward Pilatowicz * If we're running within a zone, then the default brand is the 53207522f2fcSEdward Pilatowicz * current zone's brand. 53217522f2fcSEdward Pilatowicz */ 53227522f2fcSEdward Pilatowicz if (myzoneid != GLOBAL_ZONEID) { 53237522f2fcSEdward Pilatowicz ret = zone_getattr(myzoneid, ZONE_ATTR_BRAND, brand, brandsize); 53247522f2fcSEdward Pilatowicz if (ret < 0) 53257522f2fcSEdward Pilatowicz return ((errno == EFAULT) ? Z_TOO_BIG : Z_INVAL); 53267522f2fcSEdward Pilatowicz return (Z_OK); 53277522f2fcSEdward Pilatowicz } 53287522f2fcSEdward Pilatowicz 5329e5816e35SEdward Pilatowicz if ((handle = zonecfg_init_handle()) == NULL) 5330e5816e35SEdward Pilatowicz return (Z_NOMEM); 5331e5816e35SEdward Pilatowicz if ((ret = zonecfg_get_handle("SUNWdefault", handle)) == Z_OK) { 5332e5816e35SEdward Pilatowicz ret = i_zonecfg_get_brand(handle, brand, brandsize, B_TRUE); 5333e5816e35SEdward Pilatowicz zonecfg_fini_handle(handle); 5334e5816e35SEdward Pilatowicz return (ret); 5335e5816e35SEdward Pilatowicz } 5336e5816e35SEdward Pilatowicz return (ret); 5337e5816e35SEdward Pilatowicz } 5338e5816e35SEdward Pilatowicz 5339e5816e35SEdward Pilatowicz int 5340bf1d7e28Sdh155122 zonecfg_default_privset(priv_set_t *privs, const char *curr_iptype) 53419acbbeafSnn35248 { 53429acbbeafSnn35248 priv_lists_t *plp; 5343e5816e35SEdward Pilatowicz char buf[MAXNAMELEN]; 53449acbbeafSnn35248 int ret; 53459acbbeafSnn35248 5346e5816e35SEdward Pilatowicz if ((ret = zonecfg_default_brand(buf, sizeof (buf))) != Z_OK) 5347e5816e35SEdward Pilatowicz return (ret); 5348e5816e35SEdward Pilatowicz if ((ret = priv_lists_create(NULL, buf, &plp, curr_iptype)) != Z_OK) 53499acbbeafSnn35248 return (ret); 53509acbbeafSnn35248 ret = get_default_privset(privs, plp); 53519acbbeafSnn35248 priv_lists_destroy(plp); 53529acbbeafSnn35248 return (ret); 53539acbbeafSnn35248 } 53549acbbeafSnn35248 5355ffbafc53Scomay void 5356ffbafc53Scomay append_priv_token(char *priv, char *str, size_t strlen) 5357ffbafc53Scomay { 5358ffbafc53Scomay if (*str != '\0') 5359ffbafc53Scomay (void) strlcat(str, TOKEN_PRIV_STR, strlen); 5360ffbafc53Scomay (void) strlcat(str, priv, strlen); 5361ffbafc53Scomay } 5362ffbafc53Scomay 5363ffbafc53Scomay /* 5364ffbafc53Scomay * Verify that the supplied string is a valid privilege limit set for a 5365ffbafc53Scomay * non-global zone. This string must not only be acceptable to 5366ffbafc53Scomay * priv_str_to_set(3C) which parses it, but it also must resolve to a 5367ffbafc53Scomay * privilege set that includes certain required privileges and lacks 5368ffbafc53Scomay * certain prohibited privileges. 5369ffbafc53Scomay */ 5370ffbafc53Scomay static int 5371ffbafc53Scomay verify_privset(char *privbuf, priv_set_t *privs, char **privname, 53729acbbeafSnn35248 boolean_t add_default, priv_lists_t *plp) 5373ffbafc53Scomay { 53749acbbeafSnn35248 priv_node_t *pnp; 53759acbbeafSnn35248 char *tmp, *cp, *lasts; 5376ffbafc53Scomay size_t len; 5377ffbafc53Scomay priv_set_t *mergeset; 5378ffbafc53Scomay const char *token; 5379ffbafc53Scomay 5380ffbafc53Scomay /* 5381ffbafc53Scomay * The verification of the privilege string occurs in several 5382ffbafc53Scomay * phases. In the first phase, the supplied string is scanned for 5383ffbafc53Scomay * the ZONE_TOKEN token which is not support as part of the 5384ffbafc53Scomay * "limitpriv" property. 5385ffbafc53Scomay * 5386ffbafc53Scomay * Duplicate the supplied privilege string since strtok_r(3C) 5387ffbafc53Scomay * tokenizes its input by null-terminating the tokens. 5388ffbafc53Scomay */ 5389ffbafc53Scomay if ((tmp = strdup(privbuf)) == NULL) 5390ffbafc53Scomay return (Z_NOMEM); 5391ffbafc53Scomay for (cp = strtok_r(tmp, TOKEN_PRIV_STR, &lasts); cp != NULL; 5392ffbafc53Scomay cp = strtok_r(NULL, TOKEN_PRIV_STR, &lasts)) { 5393ffbafc53Scomay if (strcmp(cp, ZONE_TOKEN) == 0) { 5394ffbafc53Scomay free(tmp); 5395ffbafc53Scomay if ((*privname = strdup(ZONE_TOKEN)) == NULL) 5396ffbafc53Scomay return (Z_NOMEM); 5397ffbafc53Scomay else 5398ffbafc53Scomay return (Z_PRIV_UNKNOWN); 5399ffbafc53Scomay } 5400ffbafc53Scomay } 5401ffbafc53Scomay free(tmp); 5402ffbafc53Scomay 5403ffbafc53Scomay if (add_default) { 5404ffbafc53Scomay /* 5405ffbafc53Scomay * If DEFAULT_TOKEN was specified, a string needs to be 5406ffbafc53Scomay * built containing the privileges from the default, safe 5407ffbafc53Scomay * set along with those of the "limitpriv" property. 5408ffbafc53Scomay */ 5409ffbafc53Scomay len = strlen(privbuf) + sizeof (BASIC_TOKEN) + 2; 54109acbbeafSnn35248 54119acbbeafSnn35248 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) 54129acbbeafSnn35248 len += strlen(pnp->pn_priv) + 1; 5413ffbafc53Scomay tmp = alloca(len); 5414ffbafc53Scomay *tmp = '\0'; 5415ffbafc53Scomay 5416ffbafc53Scomay append_priv_token(BASIC_TOKEN, tmp, len); 54179acbbeafSnn35248 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) 54189acbbeafSnn35248 append_priv_token(pnp->pn_priv, tmp, len); 5419ffbafc53Scomay (void) strlcat(tmp, TOKEN_PRIV_STR, len); 5420ffbafc53Scomay (void) strlcat(tmp, privbuf, len); 5421ffbafc53Scomay } else { 5422ffbafc53Scomay tmp = privbuf; 5423ffbafc53Scomay } 5424ffbafc53Scomay 5425ffbafc53Scomay 5426ffbafc53Scomay /* 5427ffbafc53Scomay * In the next phase, attempt to convert the merged privilege 5428ffbafc53Scomay * string into a privilege set. In the case of an error, either 5429ffbafc53Scomay * there was a memory allocation failure or there was an invalid 5430ffbafc53Scomay * privilege token in the string. In either case, return an 5431ffbafc53Scomay * appropriate error code but in the event of an invalid token, 5432ffbafc53Scomay * allocate a string containing its name and return that back to 5433ffbafc53Scomay * the caller. 5434ffbafc53Scomay */ 5435ffbafc53Scomay mergeset = priv_str_to_set(tmp, TOKEN_PRIV_STR, &token); 5436ffbafc53Scomay if (mergeset == NULL) { 5437ffbafc53Scomay if (token == NULL) 5438ffbafc53Scomay return (Z_NOMEM); 5439ffbafc53Scomay if ((cp = strchr(token, TOKEN_PRIV_CHAR)) != NULL) 5440ffbafc53Scomay *cp = '\0'; 5441ffbafc53Scomay if ((*privname = strdup(token)) == NULL) 5442ffbafc53Scomay return (Z_NOMEM); 5443ffbafc53Scomay else 5444ffbafc53Scomay return (Z_PRIV_UNKNOWN); 5445ffbafc53Scomay } 5446ffbafc53Scomay 5447ffbafc53Scomay /* 5448ffbafc53Scomay * Next, verify that none of the prohibited zone privileges are 5449ffbafc53Scomay * present in the merged privilege set. 5450ffbafc53Scomay */ 54519acbbeafSnn35248 for (pnp = plp->pl_prohibited; pnp != NULL; pnp = pnp->pn_next) { 54529acbbeafSnn35248 if (priv_ismember(mergeset, pnp->pn_priv)) { 5453ffbafc53Scomay priv_freeset(mergeset); 54549acbbeafSnn35248 if ((*privname = strdup(pnp->pn_priv)) == NULL) 5455ffbafc53Scomay return (Z_NOMEM); 5456ffbafc53Scomay else 5457ffbafc53Scomay return (Z_PRIV_PROHIBITED); 5458ffbafc53Scomay } 5459ffbafc53Scomay } 5460ffbafc53Scomay 5461ffbafc53Scomay /* 5462ffbafc53Scomay * Finally, verify that all of the required zone privileges are 5463ffbafc53Scomay * present in the merged privilege set. 5464ffbafc53Scomay */ 54659acbbeafSnn35248 for (pnp = plp->pl_required; pnp != NULL; pnp = pnp->pn_next) { 54669acbbeafSnn35248 if (!priv_ismember(mergeset, pnp->pn_priv)) { 5467ffbafc53Scomay priv_freeset(mergeset); 54689acbbeafSnn35248 if ((*privname = strdup(pnp->pn_priv)) == NULL) 5469ffbafc53Scomay return (Z_NOMEM); 5470ffbafc53Scomay else 5471ffbafc53Scomay return (Z_PRIV_REQUIRED); 5472ffbafc53Scomay } 5473ffbafc53Scomay } 5474ffbafc53Scomay 5475ffbafc53Scomay priv_copyset(mergeset, privs); 5476ffbafc53Scomay priv_freeset(mergeset); 5477ffbafc53Scomay return (Z_OK); 5478ffbafc53Scomay } 5479ffbafc53Scomay 5480ffbafc53Scomay /* 5481ffbafc53Scomay * Fill in the supplied privilege set with either the default, safe set of 5482ffbafc53Scomay * privileges suitable for a non-global zone, or one based on the 5483ffbafc53Scomay * "limitpriv" property in the zone's configuration. 5484ffbafc53Scomay * 5485ffbafc53Scomay * In the event of an invalid privilege specification in the 5486ffbafc53Scomay * configuration, a string is allocated and returned containing the 5487ffbafc53Scomay * "privilege" causing the issue. It is the caller's responsibility to 5488ffbafc53Scomay * free this memory when it is done with it. 5489ffbafc53Scomay */ 5490ffbafc53Scomay int 5491ffbafc53Scomay zonecfg_get_privset(zone_dochandle_t handle, priv_set_t *privs, 5492ffbafc53Scomay char **privname) 5493ffbafc53Scomay { 54949acbbeafSnn35248 priv_lists_t *plp; 54959acbbeafSnn35248 char *cp, *limitpriv = NULL; 54969acbbeafSnn35248 int err, limitlen; 5497bf1d7e28Sdh155122 zone_iptype_t iptype; 5498bf1d7e28Sdh155122 const char *curr_iptype; 5499ffbafc53Scomay 5500ffbafc53Scomay /* 5501ffbafc53Scomay * Attempt to lookup the "limitpriv" property. If it does not 5502ffbafc53Scomay * exist or matches the string DEFAULT_TOKEN exactly, then the 5503ffbafc53Scomay * default, safe privilege set is returned. 5504ffbafc53Scomay */ 55059acbbeafSnn35248 if ((err = zonecfg_get_limitpriv(handle, &limitpriv)) != Z_OK) 5506ffbafc53Scomay return (err); 55079acbbeafSnn35248 5508bf1d7e28Sdh155122 if ((err = zonecfg_get_iptype(handle, &iptype)) != Z_OK) 5509bf1d7e28Sdh155122 return (err); 5510bf1d7e28Sdh155122 5511bf1d7e28Sdh155122 switch (iptype) { 5512bf1d7e28Sdh155122 case ZS_SHARED: 5513bf1d7e28Sdh155122 curr_iptype = "shared"; 5514bf1d7e28Sdh155122 break; 5515bf1d7e28Sdh155122 case ZS_EXCLUSIVE: 5516bf1d7e28Sdh155122 curr_iptype = "exclusive"; 5517bf1d7e28Sdh155122 break; 5518bf1d7e28Sdh155122 } 5519bf1d7e28Sdh155122 5520e5816e35SEdward Pilatowicz if ((err = priv_lists_create(handle, NULL, &plp, curr_iptype)) != Z_OK) 55219acbbeafSnn35248 return (err); 55229acbbeafSnn35248 5523ffbafc53Scomay limitlen = strlen(limitpriv); 5524ffbafc53Scomay if (limitlen == 0 || strcmp(limitpriv, DEFAULT_TOKEN) == 0) { 5525ffbafc53Scomay free(limitpriv); 55269acbbeafSnn35248 err = get_default_privset(privs, plp); 55279acbbeafSnn35248 priv_lists_destroy(plp); 55289acbbeafSnn35248 return (err); 5529ffbafc53Scomay } 5530ffbafc53Scomay 5531ffbafc53Scomay /* 5532ffbafc53Scomay * Check if the string DEFAULT_TOKEN is the first token in a list 5533ffbafc53Scomay * of privileges. 5534ffbafc53Scomay */ 5535ffbafc53Scomay cp = strchr(limitpriv, TOKEN_PRIV_CHAR); 5536ffbafc53Scomay if (cp != NULL && 5537ffbafc53Scomay strncmp(limitpriv, DEFAULT_TOKEN, cp - limitpriv) == 0) 55389acbbeafSnn35248 err = verify_privset(cp + 1, privs, privname, B_TRUE, plp); 5539ffbafc53Scomay else 55409acbbeafSnn35248 err = verify_privset(limitpriv, privs, privname, B_FALSE, plp); 5541ffbafc53Scomay 5542ffbafc53Scomay free(limitpriv); 55439acbbeafSnn35248 priv_lists_destroy(plp); 5544ffbafc53Scomay return (err); 5545ffbafc53Scomay } 5546ffbafc53Scomay 55477c478bd9Sstevel@tonic-gate int 55487c478bd9Sstevel@tonic-gate zone_get_zonepath(char *zone_name, char *zonepath, size_t rp_sz) 55497c478bd9Sstevel@tonic-gate { 55507c478bd9Sstevel@tonic-gate zone_dochandle_t handle; 55517c478bd9Sstevel@tonic-gate boolean_t found = B_FALSE; 55527c478bd9Sstevel@tonic-gate struct zoneent *ze; 55537c478bd9Sstevel@tonic-gate FILE *cookie; 55547c478bd9Sstevel@tonic-gate int err; 5555108322fbScarlsonj char *cp; 55567c478bd9Sstevel@tonic-gate 55577c478bd9Sstevel@tonic-gate if (zone_name == NULL) 55587c478bd9Sstevel@tonic-gate return (Z_INVAL); 55597c478bd9Sstevel@tonic-gate 5560108322fbScarlsonj (void) strlcpy(zonepath, zonecfg_root, rp_sz); 5561108322fbScarlsonj cp = zonepath + strlen(zonepath); 5562108322fbScarlsonj while (cp > zonepath && cp[-1] == '/') 5563108322fbScarlsonj *--cp = '\0'; 5564108322fbScarlsonj 55657c478bd9Sstevel@tonic-gate if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) { 5566108322fbScarlsonj if (zonepath[0] == '\0') 55677c478bd9Sstevel@tonic-gate (void) strlcpy(zonepath, "/", rp_sz); 55687c478bd9Sstevel@tonic-gate return (Z_OK); 55697c478bd9Sstevel@tonic-gate } 55707c478bd9Sstevel@tonic-gate 55717c478bd9Sstevel@tonic-gate /* 55727c478bd9Sstevel@tonic-gate * First check the index file. Because older versions did not have 55737c478bd9Sstevel@tonic-gate * a copy of the zone path, allow for it to be zero length, in which 55747c478bd9Sstevel@tonic-gate * case we ignore this result and fall back to the XML files. 55757c478bd9Sstevel@tonic-gate */ 55767c478bd9Sstevel@tonic-gate cookie = setzoneent(); 55777c478bd9Sstevel@tonic-gate while ((ze = getzoneent_private(cookie)) != NULL) { 55787c478bd9Sstevel@tonic-gate if (strcmp(ze->zone_name, zone_name) == 0) { 55797c478bd9Sstevel@tonic-gate found = B_TRUE; 5580108322fbScarlsonj if (ze->zone_path[0] != '\0') 5581108322fbScarlsonj (void) strlcpy(cp, ze->zone_path, 5582108322fbScarlsonj rp_sz - (cp - zonepath)); 55837c478bd9Sstevel@tonic-gate } 55847c478bd9Sstevel@tonic-gate free(ze); 55857c478bd9Sstevel@tonic-gate if (found) 55867c478bd9Sstevel@tonic-gate break; 55877c478bd9Sstevel@tonic-gate } 55887c478bd9Sstevel@tonic-gate endzoneent(cookie); 5589108322fbScarlsonj if (found && *cp != '\0') 55907c478bd9Sstevel@tonic-gate return (Z_OK); 55917c478bd9Sstevel@tonic-gate 55927c478bd9Sstevel@tonic-gate /* Fall back to the XML files. */ 55937c478bd9Sstevel@tonic-gate if ((handle = zonecfg_init_handle()) == NULL) 55947c478bd9Sstevel@tonic-gate return (Z_NOMEM); 55957c478bd9Sstevel@tonic-gate 55967c478bd9Sstevel@tonic-gate /* 55977c478bd9Sstevel@tonic-gate * Check the snapshot first: if a zone is running, its zonepath 55987c478bd9Sstevel@tonic-gate * may have changed. 55997c478bd9Sstevel@tonic-gate */ 56007c478bd9Sstevel@tonic-gate if (zonecfg_get_snapshot_handle(zone_name, handle) != Z_OK) { 5601e767a340Sgjelinek if ((err = zonecfg_get_handle(zone_name, handle)) != Z_OK) { 5602e767a340Sgjelinek zonecfg_fini_handle(handle); 56037c478bd9Sstevel@tonic-gate return (err); 56047c478bd9Sstevel@tonic-gate } 5605e767a340Sgjelinek } 56067c478bd9Sstevel@tonic-gate err = zonecfg_get_zonepath(handle, zonepath, rp_sz); 56077c478bd9Sstevel@tonic-gate zonecfg_fini_handle(handle); 56087c478bd9Sstevel@tonic-gate return (err); 56097c478bd9Sstevel@tonic-gate } 56107c478bd9Sstevel@tonic-gate 56117c478bd9Sstevel@tonic-gate int 56127c478bd9Sstevel@tonic-gate zone_get_rootpath(char *zone_name, char *rootpath, size_t rp_sz) 56137c478bd9Sstevel@tonic-gate { 56147c478bd9Sstevel@tonic-gate int err; 56157c478bd9Sstevel@tonic-gate 56167c478bd9Sstevel@tonic-gate /* This function makes sense for non-global zones only. */ 56177c478bd9Sstevel@tonic-gate if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) 56187c478bd9Sstevel@tonic-gate return (Z_BOGUS_ZONE_NAME); 56197c478bd9Sstevel@tonic-gate if ((err = zone_get_zonepath(zone_name, rootpath, rp_sz)) != Z_OK) 56207c478bd9Sstevel@tonic-gate return (err); 56217c478bd9Sstevel@tonic-gate if (strlcat(rootpath, "/root", rp_sz) >= rp_sz) 56227c478bd9Sstevel@tonic-gate return (Z_TOO_BIG); 56237c478bd9Sstevel@tonic-gate return (Z_OK); 56247c478bd9Sstevel@tonic-gate } 56257c478bd9Sstevel@tonic-gate 56269acbbeafSnn35248 int 56279acbbeafSnn35248 zone_get_brand(char *zone_name, char *brandname, size_t rp_sz) 56289acbbeafSnn35248 { 56299acbbeafSnn35248 int err; 56309acbbeafSnn35248 zone_dochandle_t handle; 56319acbbeafSnn35248 char myzone[MAXNAMELEN]; 56329acbbeafSnn35248 int myzoneid = getzoneid(); 56339acbbeafSnn35248 56349acbbeafSnn35248 /* 56359acbbeafSnn35248 * If we are not in the global zone, then we don't have the zone 56369acbbeafSnn35248 * .xml files with the brand name available. Thus, we are going to 56379acbbeafSnn35248 * have to ask the kernel for the information. 56389acbbeafSnn35248 */ 56399acbbeafSnn35248 if (myzoneid != GLOBAL_ZONEID) { 56402ec67e04Sgjelinek if (is_system_labeled()) { 56412ec67e04Sgjelinek (void) strlcpy(brandname, NATIVE_BRAND_NAME, rp_sz); 56422ec67e04Sgjelinek return (Z_OK); 56432ec67e04Sgjelinek } 56449acbbeafSnn35248 if (zone_getattr(myzoneid, ZONE_ATTR_NAME, myzone, 56459acbbeafSnn35248 sizeof (myzone)) < 0) 56469acbbeafSnn35248 return (Z_NO_ZONE); 56471d6979b7Ssaurabh vyas - Sun Microsystems - Bangalore India if (!zonecfg_is_scratch(myzone)) { 56481d6979b7Ssaurabh vyas - Sun Microsystems - Bangalore India if (strncmp(zone_name, myzone, MAXNAMELEN) != 0) 56499acbbeafSnn35248 return (Z_NO_ZONE); 56501d6979b7Ssaurabh vyas - Sun Microsystems - Bangalore India } 56519acbbeafSnn35248 err = zone_getattr(myzoneid, ZONE_ATTR_BRAND, brandname, rp_sz); 56529acbbeafSnn35248 if (err < 0) 56539acbbeafSnn35248 return ((errno == EFAULT) ? Z_TOO_BIG : Z_INVAL); 56541d6979b7Ssaurabh vyas - Sun Microsystems - Bangalore India 56559acbbeafSnn35248 return (Z_OK); 56569acbbeafSnn35248 } 56579acbbeafSnn35248 5658e5816e35SEdward Pilatowicz if (strcmp(zone_name, "global") == 0) 5659e5816e35SEdward Pilatowicz return (zonecfg_default_brand(brandname, rp_sz)); 5660e5816e35SEdward Pilatowicz 56619acbbeafSnn35248 if ((handle = zonecfg_init_handle()) == NULL) 56629acbbeafSnn35248 return (Z_NOMEM); 56639acbbeafSnn35248 56649acbbeafSnn35248 err = zonecfg_get_handle((char *)zone_name, handle); 56659acbbeafSnn35248 if (err == Z_OK) 56669acbbeafSnn35248 err = zonecfg_get_brand(handle, brandname, rp_sz); 56679acbbeafSnn35248 56689acbbeafSnn35248 zonecfg_fini_handle(handle); 56699acbbeafSnn35248 return (err); 56709acbbeafSnn35248 } 56719acbbeafSnn35248 5672facf4a8dSllai1 /* 5673facf4a8dSllai1 * Return the appropriate root for the active /dev. 5674facf4a8dSllai1 * For normal zone, the path is $ZONEPATH/root; 5675facf4a8dSllai1 * for scratch zone, the dev path is $ZONEPATH/lu. 5676facf4a8dSllai1 */ 5677facf4a8dSllai1 int 5678facf4a8dSllai1 zone_get_devroot(char *zone_name, char *devroot, size_t rp_sz) 5679facf4a8dSllai1 { 5680facf4a8dSllai1 int err; 5681facf4a8dSllai1 char *suffix; 5682facf4a8dSllai1 zone_state_t state; 5683facf4a8dSllai1 5684facf4a8dSllai1 /* This function makes sense for non-global zones only. */ 5685facf4a8dSllai1 if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) 5686facf4a8dSllai1 return (Z_BOGUS_ZONE_NAME); 5687facf4a8dSllai1 if ((err = zone_get_zonepath(zone_name, devroot, rp_sz)) != Z_OK) 5688facf4a8dSllai1 return (err); 5689facf4a8dSllai1 5690facf4a8dSllai1 if (zone_get_state(zone_name, &state) == Z_OK && 5691facf4a8dSllai1 state == ZONE_STATE_MOUNTED) 5692facf4a8dSllai1 suffix = "/lu"; 5693facf4a8dSllai1 else 5694facf4a8dSllai1 suffix = "/root"; 5695facf4a8dSllai1 if (strlcat(devroot, suffix, rp_sz) >= rp_sz) 5696facf4a8dSllai1 return (Z_TOO_BIG); 5697facf4a8dSllai1 return (Z_OK); 5698facf4a8dSllai1 } 5699facf4a8dSllai1 57007c478bd9Sstevel@tonic-gate static zone_state_t 5701108322fbScarlsonj kernel_state_to_user_state(zoneid_t zoneid, zone_status_t kernel_state) 57027c478bd9Sstevel@tonic-gate { 5703108322fbScarlsonj char zoneroot[MAXPATHLEN]; 5704108322fbScarlsonj size_t zlen; 5705108322fbScarlsonj 57067c478bd9Sstevel@tonic-gate assert(kernel_state <= ZONE_MAX_STATE); 57077c478bd9Sstevel@tonic-gate switch (kernel_state) { 57087c478bd9Sstevel@tonic-gate case ZONE_IS_UNINITIALIZED: 5709bd41d0a8Snordmark case ZONE_IS_INITIALIZED: 5710bd41d0a8Snordmark /* The kernel will not return these two states */ 5711108322fbScarlsonj return (ZONE_STATE_READY); 57127c478bd9Sstevel@tonic-gate case ZONE_IS_READY: 5713108322fbScarlsonj /* 5714108322fbScarlsonj * If the zone's root is mounted on $ZONEPATH/lu, then 5715108322fbScarlsonj * it's a mounted scratch zone. 5716108322fbScarlsonj */ 5717108322fbScarlsonj if (zone_getattr(zoneid, ZONE_ATTR_ROOT, zoneroot, 5718108322fbScarlsonj sizeof (zoneroot)) >= 0) { 5719108322fbScarlsonj zlen = strlen(zoneroot); 5720108322fbScarlsonj if (zlen > 3 && 5721108322fbScarlsonj strcmp(zoneroot + zlen - 3, "/lu") == 0) 5722108322fbScarlsonj return (ZONE_STATE_MOUNTED); 5723108322fbScarlsonj } 57247c478bd9Sstevel@tonic-gate return (ZONE_STATE_READY); 57257c478bd9Sstevel@tonic-gate case ZONE_IS_BOOTING: 57267c478bd9Sstevel@tonic-gate case ZONE_IS_RUNNING: 57277c478bd9Sstevel@tonic-gate return (ZONE_STATE_RUNNING); 57287c478bd9Sstevel@tonic-gate case ZONE_IS_SHUTTING_DOWN: 57297c478bd9Sstevel@tonic-gate case ZONE_IS_EMPTY: 57307c478bd9Sstevel@tonic-gate return (ZONE_STATE_SHUTTING_DOWN); 57317c478bd9Sstevel@tonic-gate case ZONE_IS_DOWN: 57327c478bd9Sstevel@tonic-gate case ZONE_IS_DYING: 57337c478bd9Sstevel@tonic-gate case ZONE_IS_DEAD: 57347c478bd9Sstevel@tonic-gate default: 57357c478bd9Sstevel@tonic-gate return (ZONE_STATE_DOWN); 57367c478bd9Sstevel@tonic-gate } 57377c478bd9Sstevel@tonic-gate /* NOTREACHED */ 57387c478bd9Sstevel@tonic-gate } 57397c478bd9Sstevel@tonic-gate 57407c478bd9Sstevel@tonic-gate int 57417c478bd9Sstevel@tonic-gate zone_get_state(char *zone_name, zone_state_t *state_num) 57427c478bd9Sstevel@tonic-gate { 57437c478bd9Sstevel@tonic-gate zone_status_t status; 57447c478bd9Sstevel@tonic-gate zoneid_t zone_id; 57457c478bd9Sstevel@tonic-gate struct zoneent *ze; 57467c478bd9Sstevel@tonic-gate boolean_t found = B_FALSE; 57477c478bd9Sstevel@tonic-gate FILE *cookie; 5748108322fbScarlsonj char kernzone[ZONENAME_MAX]; 5749108322fbScarlsonj FILE *fp; 57507c478bd9Sstevel@tonic-gate 57517c478bd9Sstevel@tonic-gate if (zone_name == NULL) 57527c478bd9Sstevel@tonic-gate return (Z_INVAL); 57537c478bd9Sstevel@tonic-gate 5754108322fbScarlsonj /* 5755108322fbScarlsonj * If we're looking at an alternate root, then we need to query the 5756108322fbScarlsonj * kernel using the scratch zone name. 5757108322fbScarlsonj */ 5758108322fbScarlsonj zone_id = -1; 5759108322fbScarlsonj if (*zonecfg_root != '\0' && !zonecfg_is_scratch(zone_name)) { 5760108322fbScarlsonj if ((fp = zonecfg_open_scratch("", B_FALSE)) != NULL) { 5761108322fbScarlsonj if (zonecfg_find_scratch(fp, zone_name, zonecfg_root, 5762108322fbScarlsonj kernzone, sizeof (kernzone)) == 0) 5763108322fbScarlsonj zone_id = getzoneidbyname(kernzone); 5764108322fbScarlsonj zonecfg_close_scratch(fp); 5765108322fbScarlsonj } 5766108322fbScarlsonj } else { 5767108322fbScarlsonj zone_id = getzoneidbyname(zone_name); 5768108322fbScarlsonj } 5769108322fbScarlsonj 57707c478bd9Sstevel@tonic-gate /* check to see if zone is running */ 5771108322fbScarlsonj if (zone_id != -1 && 57727c478bd9Sstevel@tonic-gate zone_getattr(zone_id, ZONE_ATTR_STATUS, &status, 57737c478bd9Sstevel@tonic-gate sizeof (status)) >= 0) { 5774108322fbScarlsonj *state_num = kernel_state_to_user_state(zone_id, status); 57757c478bd9Sstevel@tonic-gate return (Z_OK); 57767c478bd9Sstevel@tonic-gate } 57777c478bd9Sstevel@tonic-gate 57787c478bd9Sstevel@tonic-gate cookie = setzoneent(); 57797c478bd9Sstevel@tonic-gate while ((ze = getzoneent_private(cookie)) != NULL) { 57807c478bd9Sstevel@tonic-gate if (strcmp(ze->zone_name, zone_name) == 0) { 57817c478bd9Sstevel@tonic-gate found = B_TRUE; 57827c478bd9Sstevel@tonic-gate *state_num = ze->zone_state; 57837c478bd9Sstevel@tonic-gate } 57847c478bd9Sstevel@tonic-gate free(ze); 57857c478bd9Sstevel@tonic-gate if (found) 57867c478bd9Sstevel@tonic-gate break; 57877c478bd9Sstevel@tonic-gate } 57887c478bd9Sstevel@tonic-gate endzoneent(cookie); 57897c478bd9Sstevel@tonic-gate return ((found) ? Z_OK : Z_NO_ZONE); 57907c478bd9Sstevel@tonic-gate } 57917c478bd9Sstevel@tonic-gate 57927c478bd9Sstevel@tonic-gate int 57937c478bd9Sstevel@tonic-gate zone_set_state(char *zone, zone_state_t state) 57947c478bd9Sstevel@tonic-gate { 57957c478bd9Sstevel@tonic-gate struct zoneent ze; 57967c478bd9Sstevel@tonic-gate 57977c478bd9Sstevel@tonic-gate if (state != ZONE_STATE_CONFIGURED && state != ZONE_STATE_INSTALLED && 57987c478bd9Sstevel@tonic-gate state != ZONE_STATE_INCOMPLETE) 57997c478bd9Sstevel@tonic-gate return (Z_INVAL); 58007c478bd9Sstevel@tonic-gate 5801087719fdSdp bzero(&ze, sizeof (ze)); 58027c478bd9Sstevel@tonic-gate (void) strlcpy(ze.zone_name, zone, sizeof (ze.zone_name)); 58037c478bd9Sstevel@tonic-gate ze.zone_state = state; 58047c478bd9Sstevel@tonic-gate (void) strlcpy(ze.zone_path, "", sizeof (ze.zone_path)); 58057c478bd9Sstevel@tonic-gate return (putzoneent(&ze, PZE_MODIFY)); 58067c478bd9Sstevel@tonic-gate } 58077c478bd9Sstevel@tonic-gate 58087c478bd9Sstevel@tonic-gate /* 58097c478bd9Sstevel@tonic-gate * Get id (if any) for specified zone. There are four possible outcomes: 58107c478bd9Sstevel@tonic-gate * - If the string corresponds to the numeric id of an active (booted) 58117c478bd9Sstevel@tonic-gate * zone, sets *zip to the zone id and returns 0. 58127c478bd9Sstevel@tonic-gate * - If the string corresponds to the name of an active (booted) zone, 58137c478bd9Sstevel@tonic-gate * sets *zip to the zone id and returns 0. 58147c478bd9Sstevel@tonic-gate * - If the string is a name in the configuration but is not booted, 58157c478bd9Sstevel@tonic-gate * sets *zip to ZONE_ID_UNDEFINED and returns 0. 58167c478bd9Sstevel@tonic-gate * - Otherwise, leaves *zip unchanged and returns -1. 58177c478bd9Sstevel@tonic-gate * 58187c478bd9Sstevel@tonic-gate * This function acts as an auxiliary filter on the function of the same 58197c478bd9Sstevel@tonic-gate * name in libc; the linker binds to this version if libzonecfg exists, 58207c478bd9Sstevel@tonic-gate * and the libc version if it doesn't. Any changes to this version of 58217c478bd9Sstevel@tonic-gate * the function should probably be reflected in the libc version as well. 58227c478bd9Sstevel@tonic-gate */ 58237c478bd9Sstevel@tonic-gate int 58247c478bd9Sstevel@tonic-gate zone_get_id(const char *str, zoneid_t *zip) 58257c478bd9Sstevel@tonic-gate { 58267c478bd9Sstevel@tonic-gate zone_dochandle_t hdl; 58277c478bd9Sstevel@tonic-gate zoneid_t zoneid; 58287c478bd9Sstevel@tonic-gate char *cp; 58297c478bd9Sstevel@tonic-gate int err; 58307c478bd9Sstevel@tonic-gate 58317c478bd9Sstevel@tonic-gate /* first try looking for active zone by id */ 58327c478bd9Sstevel@tonic-gate errno = 0; 58337c478bd9Sstevel@tonic-gate zoneid = (zoneid_t)strtol(str, &cp, 0); 58347c478bd9Sstevel@tonic-gate if (errno == 0 && cp != str && *cp == '\0' && 58357c478bd9Sstevel@tonic-gate getzonenamebyid(zoneid, NULL, 0) != -1) { 58367c478bd9Sstevel@tonic-gate *zip = zoneid; 58377c478bd9Sstevel@tonic-gate return (0); 58387c478bd9Sstevel@tonic-gate } 58397c478bd9Sstevel@tonic-gate 58407c478bd9Sstevel@tonic-gate /* then look for active zone by name */ 58417c478bd9Sstevel@tonic-gate if ((zoneid = getzoneidbyname(str)) != -1) { 58427c478bd9Sstevel@tonic-gate *zip = zoneid; 58437c478bd9Sstevel@tonic-gate return (0); 58447c478bd9Sstevel@tonic-gate } 58457c478bd9Sstevel@tonic-gate 58467c478bd9Sstevel@tonic-gate /* if in global zone, try looking up name in configuration database */ 58477c478bd9Sstevel@tonic-gate if (getzoneid() != GLOBAL_ZONEID || 58487c478bd9Sstevel@tonic-gate (hdl = zonecfg_init_handle()) == NULL) 58497c478bd9Sstevel@tonic-gate return (-1); 58507c478bd9Sstevel@tonic-gate 5851108322fbScarlsonj if (zonecfg_get_handle(str, hdl) == Z_OK) { 58527c478bd9Sstevel@tonic-gate /* zone exists but isn't active */ 58537c478bd9Sstevel@tonic-gate *zip = ZONE_ID_UNDEFINED; 58547c478bd9Sstevel@tonic-gate err = 0; 58557c478bd9Sstevel@tonic-gate } else { 58567c478bd9Sstevel@tonic-gate err = -1; 58577c478bd9Sstevel@tonic-gate } 58587c478bd9Sstevel@tonic-gate 58597c478bd9Sstevel@tonic-gate zonecfg_fini_handle(hdl); 58607c478bd9Sstevel@tonic-gate return (err); 58617c478bd9Sstevel@tonic-gate } 58627c478bd9Sstevel@tonic-gate 58637c478bd9Sstevel@tonic-gate char * 58647c478bd9Sstevel@tonic-gate zone_state_str(zone_state_t state_num) 58657c478bd9Sstevel@tonic-gate { 58667c478bd9Sstevel@tonic-gate switch (state_num) { 58677c478bd9Sstevel@tonic-gate case ZONE_STATE_CONFIGURED: 58687c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_CONFIGURED); 58697c478bd9Sstevel@tonic-gate case ZONE_STATE_INCOMPLETE: 58707c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_INCOMPLETE); 58717c478bd9Sstevel@tonic-gate case ZONE_STATE_INSTALLED: 58727c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_INSTALLED); 58737c478bd9Sstevel@tonic-gate case ZONE_STATE_READY: 58747c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_READY); 5875108322fbScarlsonj case ZONE_STATE_MOUNTED: 5876108322fbScarlsonj return (ZONE_STATE_STR_MOUNTED); 58777c478bd9Sstevel@tonic-gate case ZONE_STATE_RUNNING: 58787c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_RUNNING); 58797c478bd9Sstevel@tonic-gate case ZONE_STATE_SHUTTING_DOWN: 58807c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_SHUTTING_DOWN); 58817c478bd9Sstevel@tonic-gate case ZONE_STATE_DOWN: 58827c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_DOWN); 58837c478bd9Sstevel@tonic-gate default: 58847c478bd9Sstevel@tonic-gate return ("unknown"); 58857c478bd9Sstevel@tonic-gate } 58867c478bd9Sstevel@tonic-gate } 58877c478bd9Sstevel@tonic-gate 58887c478bd9Sstevel@tonic-gate /* 5889108322fbScarlsonj * Given a UUID value, find an associated zone name. This is intended to be 5890108322fbScarlsonj * used by callers who set up some 'default' name (corresponding to the 5891108322fbScarlsonj * expected name for the zone) in the zonename buffer, and thus the function 5892108322fbScarlsonj * doesn't touch this buffer on failure. 5893108322fbScarlsonj */ 5894108322fbScarlsonj int 5895555afedfScarlsonj zonecfg_get_name_by_uuid(const uuid_t uuidin, char *zonename, size_t namelen) 5896108322fbScarlsonj { 5897108322fbScarlsonj FILE *fp; 5898108322fbScarlsonj struct zoneent *ze; 5899555afedfScarlsonj uchar_t *uuid; 5900108322fbScarlsonj 5901108322fbScarlsonj /* 5902108322fbScarlsonj * A small amount of subterfuge via casts is necessary here because 5903108322fbScarlsonj * libuuid doesn't use const correctly, but we don't want to export 5904108322fbScarlsonj * this brokenness to our clients. 5905108322fbScarlsonj */ 5906555afedfScarlsonj uuid = (uchar_t *)uuidin; 5907555afedfScarlsonj if (uuid_is_null(uuid)) 5908108322fbScarlsonj return (Z_NO_ZONE); 5909108322fbScarlsonj if ((fp = setzoneent()) == NULL) 5910108322fbScarlsonj return (Z_NO_ZONE); 5911108322fbScarlsonj while ((ze = getzoneent_private(fp)) != NULL) { 5912555afedfScarlsonj if (uuid_compare(uuid, ze->zone_uuid) == 0) 5913108322fbScarlsonj break; 5914108322fbScarlsonj free(ze); 5915108322fbScarlsonj } 5916108322fbScarlsonj endzoneent(fp); 5917108322fbScarlsonj if (ze != NULL) { 5918108322fbScarlsonj (void) strlcpy(zonename, ze->zone_name, namelen); 5919108322fbScarlsonj free(ze); 5920108322fbScarlsonj return (Z_OK); 5921108322fbScarlsonj } else { 5922108322fbScarlsonj return (Z_NO_ZONE); 5923108322fbScarlsonj } 5924108322fbScarlsonj } 5925108322fbScarlsonj 5926108322fbScarlsonj /* 5927108322fbScarlsonj * Given a zone name, get its UUID. Returns a "NULL" UUID value if the zone 5928108322fbScarlsonj * exists but the file doesn't have a value set yet. Returns an error if the 5929108322fbScarlsonj * zone cannot be located. 5930108322fbScarlsonj */ 5931108322fbScarlsonj int 5932108322fbScarlsonj zonecfg_get_uuid(const char *zonename, uuid_t uuid) 5933108322fbScarlsonj { 5934108322fbScarlsonj FILE *fp; 5935108322fbScarlsonj struct zoneent *ze; 5936108322fbScarlsonj 5937108322fbScarlsonj if ((fp = setzoneent()) == NULL) 5938108322fbScarlsonj return (Z_NO_ZONE); 5939108322fbScarlsonj while ((ze = getzoneent_private(fp)) != NULL) { 5940108322fbScarlsonj if (strcmp(ze->zone_name, zonename) == 0) 5941108322fbScarlsonj break; 5942108322fbScarlsonj free(ze); 5943108322fbScarlsonj } 5944108322fbScarlsonj endzoneent(fp); 5945108322fbScarlsonj if (ze != NULL) { 5946108322fbScarlsonj uuid_copy(uuid, ze->zone_uuid); 5947108322fbScarlsonj free(ze); 5948108322fbScarlsonj return (Z_OK); 5949108322fbScarlsonj } else { 5950108322fbScarlsonj return (Z_NO_ZONE); 5951108322fbScarlsonj } 5952108322fbScarlsonj } 5953108322fbScarlsonj 5954108322fbScarlsonj /* 59557c478bd9Sstevel@tonic-gate * File-system convenience functions. 59567c478bd9Sstevel@tonic-gate */ 59577c478bd9Sstevel@tonic-gate boolean_t 59587c478bd9Sstevel@tonic-gate zonecfg_valid_fs_type(const char *type) 59597c478bd9Sstevel@tonic-gate { 59607c478bd9Sstevel@tonic-gate /* 59617c478bd9Sstevel@tonic-gate * We already know which FS types don't work. 59627c478bd9Sstevel@tonic-gate */ 59637c478bd9Sstevel@tonic-gate if (strcmp(type, "proc") == 0 || 59647c478bd9Sstevel@tonic-gate strcmp(type, "mntfs") == 0 || 59657c478bd9Sstevel@tonic-gate strcmp(type, "autofs") == 0 || 59667c478bd9Sstevel@tonic-gate strncmp(type, "nfs", sizeof ("nfs") - 1) == 0 || 59677c478bd9Sstevel@tonic-gate strcmp(type, "cachefs") == 0) 59687c478bd9Sstevel@tonic-gate return (B_FALSE); 59697c478bd9Sstevel@tonic-gate /* 59707c478bd9Sstevel@tonic-gate * The caller may do more detailed verification to make sure other 59717c478bd9Sstevel@tonic-gate * aspects of this filesystem type make sense. 59727c478bd9Sstevel@tonic-gate */ 59737c478bd9Sstevel@tonic-gate return (B_TRUE); 59747c478bd9Sstevel@tonic-gate } 59757c478bd9Sstevel@tonic-gate 59767c478bd9Sstevel@tonic-gate /* 59777c478bd9Sstevel@tonic-gate * Generally uninteresting rctl convenience functions. 59787c478bd9Sstevel@tonic-gate */ 59797c478bd9Sstevel@tonic-gate 59807c478bd9Sstevel@tonic-gate int 59817c478bd9Sstevel@tonic-gate zonecfg_construct_rctlblk(const struct zone_rctlvaltab *rctlval, 59827c478bd9Sstevel@tonic-gate rctlblk_t *rctlblk) 59837c478bd9Sstevel@tonic-gate { 59847c478bd9Sstevel@tonic-gate unsigned long long ull; 59857c478bd9Sstevel@tonic-gate char *endp; 59867c478bd9Sstevel@tonic-gate rctl_priv_t priv; 59877c478bd9Sstevel@tonic-gate rctl_qty_t limit; 59887c478bd9Sstevel@tonic-gate uint_t action; 59897c478bd9Sstevel@tonic-gate 59907c478bd9Sstevel@tonic-gate /* Get the privilege */ 59917c478bd9Sstevel@tonic-gate if (strcmp(rctlval->zone_rctlval_priv, "basic") == 0) { 59927c478bd9Sstevel@tonic-gate priv = RCPRIV_BASIC; 59937c478bd9Sstevel@tonic-gate } else if (strcmp(rctlval->zone_rctlval_priv, "privileged") == 0) { 59947c478bd9Sstevel@tonic-gate priv = RCPRIV_PRIVILEGED; 59957c478bd9Sstevel@tonic-gate } else { 59967c478bd9Sstevel@tonic-gate /* Invalid privilege */ 59977c478bd9Sstevel@tonic-gate return (Z_INVAL); 59987c478bd9Sstevel@tonic-gate } 59997c478bd9Sstevel@tonic-gate 60007c478bd9Sstevel@tonic-gate /* deal with negative input; strtoull(3c) doesn't do what we want */ 60017c478bd9Sstevel@tonic-gate if (rctlval->zone_rctlval_limit[0] == '-') 60027c478bd9Sstevel@tonic-gate return (Z_INVAL); 60037c478bd9Sstevel@tonic-gate /* Get the limit */ 60047c478bd9Sstevel@tonic-gate errno = 0; 60057c478bd9Sstevel@tonic-gate ull = strtoull(rctlval->zone_rctlval_limit, &endp, 0); 60067c478bd9Sstevel@tonic-gate if (errno != 0 || *endp != '\0') { 60077c478bd9Sstevel@tonic-gate /* parse failed */ 60087c478bd9Sstevel@tonic-gate return (Z_INVAL); 60097c478bd9Sstevel@tonic-gate } 60107c478bd9Sstevel@tonic-gate limit = (rctl_qty_t)ull; 60117c478bd9Sstevel@tonic-gate 60127c478bd9Sstevel@tonic-gate /* Get the action */ 60137c478bd9Sstevel@tonic-gate if (strcmp(rctlval->zone_rctlval_action, "none") == 0) { 60147c478bd9Sstevel@tonic-gate action = RCTL_LOCAL_NOACTION; 60157c478bd9Sstevel@tonic-gate } else if (strcmp(rctlval->zone_rctlval_action, "signal") == 0) { 60167c478bd9Sstevel@tonic-gate action = RCTL_LOCAL_SIGNAL; 60177c478bd9Sstevel@tonic-gate } else if (strcmp(rctlval->zone_rctlval_action, "deny") == 0) { 60187c478bd9Sstevel@tonic-gate action = RCTL_LOCAL_DENY; 60197c478bd9Sstevel@tonic-gate } else { 60207c478bd9Sstevel@tonic-gate /* Invalid Action */ 60217c478bd9Sstevel@tonic-gate return (Z_INVAL); 60227c478bd9Sstevel@tonic-gate } 60237c478bd9Sstevel@tonic-gate rctlblk_set_local_action(rctlblk, action, 0); 60247c478bd9Sstevel@tonic-gate rctlblk_set_privilege(rctlblk, priv); 60257c478bd9Sstevel@tonic-gate rctlblk_set_value(rctlblk, limit); 60267c478bd9Sstevel@tonic-gate return (Z_OK); 60277c478bd9Sstevel@tonic-gate } 60287c478bd9Sstevel@tonic-gate 60297c478bd9Sstevel@tonic-gate static int 60307c478bd9Sstevel@tonic-gate rctl_check(const char *rctlname, void *arg) 60317c478bd9Sstevel@tonic-gate { 60327c478bd9Sstevel@tonic-gate const char *attrname = arg; 60337c478bd9Sstevel@tonic-gate 60347c478bd9Sstevel@tonic-gate /* 60357c478bd9Sstevel@tonic-gate * Returning 1 here is our signal to zonecfg_is_rctl() that it is 60367c478bd9Sstevel@tonic-gate * indeed an rctl name recognized by the system. 60377c478bd9Sstevel@tonic-gate */ 60387c478bd9Sstevel@tonic-gate return (strcmp(rctlname, attrname) == 0 ? 1 : 0); 60397c478bd9Sstevel@tonic-gate } 60407c478bd9Sstevel@tonic-gate 60417c478bd9Sstevel@tonic-gate boolean_t 60427c478bd9Sstevel@tonic-gate zonecfg_is_rctl(const char *name) 60437c478bd9Sstevel@tonic-gate { 60447c478bd9Sstevel@tonic-gate return (rctl_walk(rctl_check, (void *)name) == 1); 60457c478bd9Sstevel@tonic-gate } 60467c478bd9Sstevel@tonic-gate 60477c478bd9Sstevel@tonic-gate boolean_t 60487c478bd9Sstevel@tonic-gate zonecfg_valid_rctlname(const char *name) 60497c478bd9Sstevel@tonic-gate { 60507c478bd9Sstevel@tonic-gate const char *c; 60517c478bd9Sstevel@tonic-gate 60527c478bd9Sstevel@tonic-gate if (strncmp(name, "zone.", sizeof ("zone.") - 1) != 0) 60537c478bd9Sstevel@tonic-gate return (B_FALSE); 60547c478bd9Sstevel@tonic-gate if (strlen(name) == sizeof ("zone.") - 1) 60557c478bd9Sstevel@tonic-gate return (B_FALSE); 60567c478bd9Sstevel@tonic-gate for (c = name + sizeof ("zone.") - 1; *c != '\0'; c++) { 60577c478bd9Sstevel@tonic-gate if (!isalpha(*c) && *c != '-') 60587c478bd9Sstevel@tonic-gate return (B_FALSE); 60597c478bd9Sstevel@tonic-gate } 60607c478bd9Sstevel@tonic-gate return (B_TRUE); 60617c478bd9Sstevel@tonic-gate } 60627c478bd9Sstevel@tonic-gate 60637c478bd9Sstevel@tonic-gate boolean_t 60647c478bd9Sstevel@tonic-gate zonecfg_valid_rctlblk(const rctlblk_t *rctlblk) 60657c478bd9Sstevel@tonic-gate { 60667c478bd9Sstevel@tonic-gate rctl_priv_t priv = rctlblk_get_privilege((rctlblk_t *)rctlblk); 60677c478bd9Sstevel@tonic-gate uint_t action = rctlblk_get_local_action((rctlblk_t *)rctlblk, NULL); 60687c478bd9Sstevel@tonic-gate 60697c478bd9Sstevel@tonic-gate if (priv != RCPRIV_PRIVILEGED) 60707c478bd9Sstevel@tonic-gate return (B_FALSE); 60717c478bd9Sstevel@tonic-gate if (action != RCTL_LOCAL_NOACTION && action != RCTL_LOCAL_DENY) 60727c478bd9Sstevel@tonic-gate return (B_FALSE); 60737c478bd9Sstevel@tonic-gate return (B_TRUE); 60747c478bd9Sstevel@tonic-gate } 60757c478bd9Sstevel@tonic-gate 60767c478bd9Sstevel@tonic-gate boolean_t 60777c478bd9Sstevel@tonic-gate zonecfg_valid_rctl(const char *name, const rctlblk_t *rctlblk) 60787c478bd9Sstevel@tonic-gate { 60797c478bd9Sstevel@tonic-gate rctlblk_t *current, *next; 60807c478bd9Sstevel@tonic-gate rctl_qty_t limit = rctlblk_get_value((rctlblk_t *)rctlblk); 60817c478bd9Sstevel@tonic-gate uint_t action = rctlblk_get_local_action((rctlblk_t *)rctlblk, NULL); 60827c478bd9Sstevel@tonic-gate uint_t global_flags; 60837c478bd9Sstevel@tonic-gate 60847c478bd9Sstevel@tonic-gate if (!zonecfg_valid_rctlblk(rctlblk)) 60857c478bd9Sstevel@tonic-gate return (B_FALSE); 60867c478bd9Sstevel@tonic-gate if (!zonecfg_valid_rctlname(name)) 60877c478bd9Sstevel@tonic-gate return (B_FALSE); 60887c478bd9Sstevel@tonic-gate 60897c478bd9Sstevel@tonic-gate current = alloca(rctlblk_size()); 60907c478bd9Sstevel@tonic-gate if (getrctl(name, NULL, current, RCTL_FIRST) != 0) 60917c478bd9Sstevel@tonic-gate return (B_TRUE); /* not an rctl on this system */ 60927c478bd9Sstevel@tonic-gate /* 60937c478bd9Sstevel@tonic-gate * Make sure the proposed value isn't greater than the current system 60947c478bd9Sstevel@tonic-gate * value. 60957c478bd9Sstevel@tonic-gate */ 60967c478bd9Sstevel@tonic-gate next = alloca(rctlblk_size()); 60977c478bd9Sstevel@tonic-gate while (rctlblk_get_privilege(current) != RCPRIV_SYSTEM) { 60987c478bd9Sstevel@tonic-gate rctlblk_t *tmp; 60997c478bd9Sstevel@tonic-gate 61007c478bd9Sstevel@tonic-gate if (getrctl(name, current, next, RCTL_NEXT) != 0) 61017c478bd9Sstevel@tonic-gate return (B_FALSE); /* shouldn't happen */ 61027c478bd9Sstevel@tonic-gate tmp = current; 61037c478bd9Sstevel@tonic-gate current = next; 61047c478bd9Sstevel@tonic-gate next = tmp; 61057c478bd9Sstevel@tonic-gate } 61067c478bd9Sstevel@tonic-gate if (limit > rctlblk_get_value(current)) 61077c478bd9Sstevel@tonic-gate return (B_FALSE); 61087c478bd9Sstevel@tonic-gate 61097c478bd9Sstevel@tonic-gate /* 61107c478bd9Sstevel@tonic-gate * Make sure the proposed action is allowed. 61117c478bd9Sstevel@tonic-gate */ 61127c478bd9Sstevel@tonic-gate global_flags = rctlblk_get_global_flags(current); 61137c478bd9Sstevel@tonic-gate if ((global_flags & RCTL_GLOBAL_DENY_NEVER) && 61147c478bd9Sstevel@tonic-gate action == RCTL_LOCAL_DENY) 61157c478bd9Sstevel@tonic-gate return (B_FALSE); 61167c478bd9Sstevel@tonic-gate if ((global_flags & RCTL_GLOBAL_DENY_ALWAYS) && 61177c478bd9Sstevel@tonic-gate action == RCTL_LOCAL_NOACTION) 61187c478bd9Sstevel@tonic-gate return (B_FALSE); 61197c478bd9Sstevel@tonic-gate 61207c478bd9Sstevel@tonic-gate return (B_TRUE); 61217c478bd9Sstevel@tonic-gate } 6122fa9e4066Sahrens 6123cf8f45c7Sdstaff /* 6124cf8f45c7Sdstaff * There is always a race condition between reading the initial copy of 6125cf8f45c7Sdstaff * a zones state and its state changing. We address this by providing 6126cf8f45c7Sdstaff * zonecfg_notify_critical_enter and zonecfg_noticy_critical_exit functions. 6127cf8f45c7Sdstaff * When zonecfg_critical_enter is called, sets the state field to LOCKED 6128cf8f45c7Sdstaff * and aquires biglock. Biglock protects against other threads executing 6129cf8f45c7Sdstaff * critical_enter and the state field protects against state changes during 6130cf8f45c7Sdstaff * the critical period. 6131cf8f45c7Sdstaff * 6132cf8f45c7Sdstaff * If any state changes occur, zn_cb will set the failed field of the znotify 6133cf8f45c7Sdstaff * structure. This will cause the critical_exit function to re-lock the 6134cf8f45c7Sdstaff * channel and return an error. Since evsnts may be delayed, the critical_exit 6135cf8f45c7Sdstaff * function "flushes" the queue by putting an event on the queue and waiting for 6136cf8f45c7Sdstaff * zn_cb to notify critical_exit that it received the ping event. 6137cf8f45c7Sdstaff */ 6138cf8f45c7Sdstaff static const char * 6139cf8f45c7Sdstaff string_get_tok(const char *in, char delim, int num) 6140cf8f45c7Sdstaff { 6141cf8f45c7Sdstaff int i = 0; 6142cf8f45c7Sdstaff 6143cf8f45c7Sdstaff for (; i < num; in++) { 6144cf8f45c7Sdstaff if (*in == delim) 6145cf8f45c7Sdstaff i++; 6146cf8f45c7Sdstaff if (*in == 0) 6147cf8f45c7Sdstaff return (NULL); 6148cf8f45c7Sdstaff } 6149cf8f45c7Sdstaff return (in); 6150cf8f45c7Sdstaff } 6151cf8f45c7Sdstaff 6152cf8f45c7Sdstaff static boolean_t 6153cf8f45c7Sdstaff is_ping(sysevent_t *ev) 6154cf8f45c7Sdstaff { 6155cf8f45c7Sdstaff if (strcmp(sysevent_get_subclass_name(ev), 6156cf8f45c7Sdstaff ZONE_EVENT_PING_SUBCLASS) == 0) { 6157cf8f45c7Sdstaff return (B_TRUE); 6158cf8f45c7Sdstaff } else { 6159cf8f45c7Sdstaff return (B_FALSE); 6160cf8f45c7Sdstaff } 6161cf8f45c7Sdstaff } 6162cf8f45c7Sdstaff 6163cf8f45c7Sdstaff static boolean_t 6164cf8f45c7Sdstaff is_my_ping(sysevent_t *ev) 6165cf8f45c7Sdstaff { 6166cf8f45c7Sdstaff const char *sender; 6167cf8f45c7Sdstaff char mypid[sizeof (pid_t) * 3 + 1]; 6168cf8f45c7Sdstaff 6169cf8f45c7Sdstaff (void) snprintf(mypid, sizeof (mypid), "%i", getpid()); 6170cf8f45c7Sdstaff sender = string_get_tok(sysevent_get_pub(ev), ':', 3); 6171cf8f45c7Sdstaff if (sender == NULL) 6172cf8f45c7Sdstaff return (B_FALSE); 6173cf8f45c7Sdstaff if (strcmp(sender, mypid) != 0) 6174cf8f45c7Sdstaff return (B_FALSE); 6175cf8f45c7Sdstaff return (B_TRUE); 6176cf8f45c7Sdstaff } 6177cf8f45c7Sdstaff 6178cf8f45c7Sdstaff static int 6179cf8f45c7Sdstaff do_callback(struct znotify *zevtchan, sysevent_t *ev) 6180cf8f45c7Sdstaff { 6181cf8f45c7Sdstaff nvlist_t *l; 6182cf8f45c7Sdstaff int zid; 6183cf8f45c7Sdstaff char *zonename; 6184cf8f45c7Sdstaff char *newstate; 6185cf8f45c7Sdstaff char *oldstate; 6186cf8f45c7Sdstaff int ret; 6187cf8f45c7Sdstaff hrtime_t when; 6188cf8f45c7Sdstaff 6189cf8f45c7Sdstaff if (strcmp(sysevent_get_subclass_name(ev), 6190cf8f45c7Sdstaff ZONE_EVENT_STATUS_SUBCLASS) == 0) { 6191cf8f45c7Sdstaff 6192cf8f45c7Sdstaff if (sysevent_get_attr_list(ev, &l) != 0) { 6193cf8f45c7Sdstaff if (errno == ENOMEM) { 6194cf8f45c7Sdstaff zevtchan->zn_failure_count++; 6195cf8f45c7Sdstaff return (EAGAIN); 6196cf8f45c7Sdstaff } 6197cf8f45c7Sdstaff return (0); 6198cf8f45c7Sdstaff } 6199cf8f45c7Sdstaff ret = 0; 6200cf8f45c7Sdstaff 6201cf8f45c7Sdstaff if ((nvlist_lookup_string(l, ZONE_CB_NAME, &zonename) == 0) && 6202cf8f45c7Sdstaff (nvlist_lookup_string(l, ZONE_CB_NEWSTATE, &newstate) 6203cf8f45c7Sdstaff == 0) && 6204cf8f45c7Sdstaff (nvlist_lookup_string(l, ZONE_CB_OLDSTATE, &oldstate) 6205cf8f45c7Sdstaff == 0) && 6206cf8f45c7Sdstaff (nvlist_lookup_uint64(l, ZONE_CB_TIMESTAMP, 6207cf8f45c7Sdstaff (uint64_t *)&when) == 0) && 6208cf8f45c7Sdstaff (nvlist_lookup_int32(l, ZONE_CB_ZONEID, &zid) == 0)) { 6209cf8f45c7Sdstaff ret = zevtchan->zn_callback(zonename, zid, newstate, 6210cf8f45c7Sdstaff oldstate, when, zevtchan->zn_private); 6211cf8f45c7Sdstaff } 6212cf8f45c7Sdstaff 6213cf8f45c7Sdstaff zevtchan->zn_failure_count = 0; 6214cf8f45c7Sdstaff nvlist_free(l); 6215cf8f45c7Sdstaff return (ret); 6216cf8f45c7Sdstaff } else { 6217cf8f45c7Sdstaff /* 6218cf8f45c7Sdstaff * We have received an event in an unknown subclass. Ignore. 6219cf8f45c7Sdstaff */ 6220cf8f45c7Sdstaff zevtchan->zn_failure_count = 0; 6221cf8f45c7Sdstaff return (0); 6222cf8f45c7Sdstaff } 6223cf8f45c7Sdstaff } 6224cf8f45c7Sdstaff 6225cf8f45c7Sdstaff static int 6226cf8f45c7Sdstaff zn_cb(sysevent_t *ev, void *p) 6227cf8f45c7Sdstaff { 6228cf8f45c7Sdstaff struct znotify *zevtchan = p; 6229cf8f45c7Sdstaff int error; 6230cf8f45c7Sdstaff 6231cf8f45c7Sdstaff (void) pthread_mutex_lock(&(zevtchan->zn_mutex)); 6232cf8f45c7Sdstaff 6233cf8f45c7Sdstaff if (is_ping(ev) && !is_my_ping(ev)) { 6234cf8f45c7Sdstaff (void) pthread_mutex_unlock((&zevtchan->zn_mutex)); 6235cf8f45c7Sdstaff return (0); 6236cf8f45c7Sdstaff } 6237cf8f45c7Sdstaff 6238cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_LOCKED) { 6239cf8f45c7Sdstaff assert(!is_ping(ev)); 6240cf8f45c7Sdstaff zevtchan->zn_failed = B_TRUE; 6241cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6242cf8f45c7Sdstaff return (0); 6243cf8f45c7Sdstaff } 6244cf8f45c7Sdstaff 6245cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_PING_INFLIGHT) { 6246cf8f45c7Sdstaff if (is_ping(ev)) { 6247cf8f45c7Sdstaff zevtchan->zn_state = ZN_PING_RECEIVED; 6248cf8f45c7Sdstaff (void) pthread_cond_signal(&(zevtchan->zn_cond)); 6249cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6250cf8f45c7Sdstaff return (0); 6251cf8f45c7Sdstaff } else { 6252cf8f45c7Sdstaff zevtchan->zn_failed = B_TRUE; 6253cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6254cf8f45c7Sdstaff return (0); 6255cf8f45c7Sdstaff } 6256cf8f45c7Sdstaff } 6257cf8f45c7Sdstaff 6258cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_UNLOCKED) { 6259cf8f45c7Sdstaff 6260cf8f45c7Sdstaff error = do_callback(zevtchan, ev); 6261cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6262cf8f45c7Sdstaff /* 6263cf8f45c7Sdstaff * Every ENOMEM failure causes do_callback to increment 6264cf8f45c7Sdstaff * zn_failure_count and every success causes it to 6265cf8f45c7Sdstaff * set zn_failure_count to zero. If we got EAGAIN, 6266cf8f45c7Sdstaff * we will sleep for zn_failure_count seconds and return 6267cf8f45c7Sdstaff * EAGAIN to gpec to try again. 6268cf8f45c7Sdstaff * 6269cf8f45c7Sdstaff * After 55 seconds, or 10 try's we give up and drop the 6270cf8f45c7Sdstaff * event. 6271cf8f45c7Sdstaff */ 6272cf8f45c7Sdstaff if (error == EAGAIN) { 6273cf8f45c7Sdstaff if (zevtchan->zn_failure_count > ZONE_CB_RETRY_COUNT) { 6274cf8f45c7Sdstaff return (0); 6275cf8f45c7Sdstaff } 6276cf8f45c7Sdstaff (void) sleep(zevtchan->zn_failure_count); 6277cf8f45c7Sdstaff } 6278cf8f45c7Sdstaff return (error); 6279cf8f45c7Sdstaff } 6280cf8f45c7Sdstaff 6281cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_PING_RECEIVED) { 6282cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6283cf8f45c7Sdstaff return (0); 6284cf8f45c7Sdstaff } 6285cf8f45c7Sdstaff 6286cf8f45c7Sdstaff abort(); 6287cf8f45c7Sdstaff return (0); 6288cf8f45c7Sdstaff } 6289cf8f45c7Sdstaff 6290cf8f45c7Sdstaff void 6291cf8f45c7Sdstaff zonecfg_notify_critical_enter(void *h) 6292cf8f45c7Sdstaff { 6293cf8f45c7Sdstaff struct znotify *zevtchan = h; 6294cf8f45c7Sdstaff 6295cf8f45c7Sdstaff (void) pthread_mutex_lock(&(zevtchan->zn_bigmutex)); 6296cf8f45c7Sdstaff zevtchan->zn_state = ZN_LOCKED; 6297cf8f45c7Sdstaff } 6298cf8f45c7Sdstaff 6299cf8f45c7Sdstaff int 6300cf8f45c7Sdstaff zonecfg_notify_critical_exit(void * h) 6301cf8f45c7Sdstaff { 6302cf8f45c7Sdstaff 6303cf8f45c7Sdstaff struct znotify *zevtchan = h; 6304cf8f45c7Sdstaff 6305cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_UNLOCKED) 6306cf8f45c7Sdstaff return (0); 6307cf8f45c7Sdstaff 6308cf8f45c7Sdstaff (void) pthread_mutex_lock(&(zevtchan->zn_mutex)); 6309cf8f45c7Sdstaff zevtchan->zn_state = ZN_PING_INFLIGHT; 6310cf8f45c7Sdstaff 6311ee519a1fSgjelinek (void) sysevent_evc_publish(zevtchan->zn_eventchan, 6312ee519a1fSgjelinek ZONE_EVENT_STATUS_CLASS, 6313cf8f45c7Sdstaff ZONE_EVENT_PING_SUBCLASS, ZONE_EVENT_PING_PUBLISHER, 6314cf8f45c7Sdstaff zevtchan->zn_subscriber_id, NULL, EVCH_SLEEP); 6315cf8f45c7Sdstaff 6316cf8f45c7Sdstaff while (zevtchan->zn_state != ZN_PING_RECEIVED) { 6317cf8f45c7Sdstaff (void) pthread_cond_wait(&(zevtchan->zn_cond), 6318cf8f45c7Sdstaff &(zevtchan->zn_mutex)); 6319cf8f45c7Sdstaff } 6320cf8f45c7Sdstaff 6321cf8f45c7Sdstaff if (zevtchan->zn_failed == B_TRUE) { 6322cf8f45c7Sdstaff zevtchan->zn_state = ZN_LOCKED; 6323cf8f45c7Sdstaff zevtchan->zn_failed = B_FALSE; 6324cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6325cf8f45c7Sdstaff return (1); 6326cf8f45c7Sdstaff } 6327cf8f45c7Sdstaff 6328cf8f45c7Sdstaff zevtchan->zn_state = ZN_UNLOCKED; 6329cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 6330cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_bigmutex)); 6331cf8f45c7Sdstaff return (0); 6332cf8f45c7Sdstaff } 6333cf8f45c7Sdstaff 6334cf8f45c7Sdstaff void 6335cf8f45c7Sdstaff zonecfg_notify_critical_abort(void *h) 6336cf8f45c7Sdstaff { 6337cf8f45c7Sdstaff struct znotify *zevtchan = h; 6338cf8f45c7Sdstaff 6339cf8f45c7Sdstaff zevtchan->zn_state = ZN_UNLOCKED; 6340cf8f45c7Sdstaff zevtchan->zn_failed = B_FALSE; 6341cf8f45c7Sdstaff /* 6342cf8f45c7Sdstaff * Don't do anything about zn_lock. If it is held, it could only be 6343cf8f45c7Sdstaff * held by zn_cb and it will be unlocked soon. 6344cf8f45c7Sdstaff */ 6345cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_bigmutex)); 6346cf8f45c7Sdstaff } 6347cf8f45c7Sdstaff 6348cf8f45c7Sdstaff void * 6349cf8f45c7Sdstaff zonecfg_notify_bind(int(*func)(const char *zonename, zoneid_t zid, 6350cf8f45c7Sdstaff const char *newstate, const char *oldstate, hrtime_t when, void *p), 6351cf8f45c7Sdstaff void *p) 6352cf8f45c7Sdstaff { 6353cf8f45c7Sdstaff struct znotify *zevtchan; 6354cf8f45c7Sdstaff int i = 1; 6355cf8f45c7Sdstaff int r; 6356cf8f45c7Sdstaff 6357cf8f45c7Sdstaff zevtchan = malloc(sizeof (struct znotify)); 6358cf8f45c7Sdstaff 6359cf8f45c7Sdstaff if (zevtchan == NULL) 6360cf8f45c7Sdstaff return (NULL); 6361cf8f45c7Sdstaff 6362cf8f45c7Sdstaff zevtchan->zn_private = p; 6363cf8f45c7Sdstaff zevtchan->zn_callback = func; 6364cf8f45c7Sdstaff zevtchan->zn_state = ZN_UNLOCKED; 6365cf8f45c7Sdstaff zevtchan->zn_failed = B_FALSE; 6366cf8f45c7Sdstaff 6367cf8f45c7Sdstaff if (pthread_mutex_init(&(zevtchan->zn_mutex), NULL)) 63689d4be64eSdstaff goto out3; 6369cf8f45c7Sdstaff if (pthread_cond_init(&(zevtchan->zn_cond), NULL)) { 6370cf8f45c7Sdstaff (void) pthread_mutex_destroy(&(zevtchan->zn_mutex)); 63719d4be64eSdstaff goto out3; 6372cf8f45c7Sdstaff } 6373cf8f45c7Sdstaff if (pthread_mutex_init(&(zevtchan->zn_bigmutex), NULL)) { 6374cf8f45c7Sdstaff (void) pthread_mutex_destroy(&(zevtchan->zn_mutex)); 6375cf8f45c7Sdstaff (void) pthread_cond_destroy(&(zevtchan->zn_cond)); 63769d4be64eSdstaff goto out3; 6377cf8f45c7Sdstaff } 6378cf8f45c7Sdstaff 6379cf8f45c7Sdstaff if (sysevent_evc_bind(ZONE_EVENT_CHANNEL, &(zevtchan->zn_eventchan), 6380cf8f45c7Sdstaff 0) != 0) 6381cf8f45c7Sdstaff goto out2; 6382cf8f45c7Sdstaff 6383cf8f45c7Sdstaff do { 6384cf8f45c7Sdstaff /* 6385cf8f45c7Sdstaff * At 4 digits the subscriber ID gets too long and we have 6386cf8f45c7Sdstaff * no chance of successfully registering. 6387cf8f45c7Sdstaff */ 6388cf8f45c7Sdstaff if (i > 999) 63899d4be64eSdstaff goto out1; 6390cf8f45c7Sdstaff 6391cf8f45c7Sdstaff (void) sprintf(zevtchan->zn_subscriber_id, "zone_%li_%i", 6392cf8f45c7Sdstaff getpid() % 999999l, i); 6393cf8f45c7Sdstaff 6394cf8f45c7Sdstaff r = sysevent_evc_subscribe(zevtchan->zn_eventchan, 6395cf8f45c7Sdstaff zevtchan->zn_subscriber_id, ZONE_EVENT_STATUS_CLASS, zn_cb, 6396cf8f45c7Sdstaff zevtchan, 0); 6397cf8f45c7Sdstaff 6398cf8f45c7Sdstaff i++; 6399cf8f45c7Sdstaff 6400cf8f45c7Sdstaff } while (r); 6401cf8f45c7Sdstaff 6402cf8f45c7Sdstaff return (zevtchan); 64039d4be64eSdstaff out1: 640449b225e1SGavin Maltby (void) sysevent_evc_unbind(zevtchan->zn_eventchan); 64059d4be64eSdstaff out2: 6406cf8f45c7Sdstaff (void) pthread_mutex_destroy(&zevtchan->zn_mutex); 6407cf8f45c7Sdstaff (void) pthread_cond_destroy(&zevtchan->zn_cond); 6408cf8f45c7Sdstaff (void) pthread_mutex_destroy(&(zevtchan->zn_bigmutex)); 64099d4be64eSdstaff out3: 6410cf8f45c7Sdstaff free(zevtchan); 6411cf8f45c7Sdstaff 6412cf8f45c7Sdstaff return (NULL); 6413cf8f45c7Sdstaff } 6414cf8f45c7Sdstaff 6415cf8f45c7Sdstaff void 6416cf8f45c7Sdstaff zonecfg_notify_unbind(void *handle) 6417cf8f45c7Sdstaff { 6418cf8f45c7Sdstaff 6419cf8f45c7Sdstaff int ret; 6420cf8f45c7Sdstaff 642149b225e1SGavin Maltby (void) sysevent_evc_unbind(((struct znotify *)handle)->zn_eventchan); 6422cf8f45c7Sdstaff /* 6423cf8f45c7Sdstaff * Check that all evc threads have gone away. This should be 6424cf8f45c7Sdstaff * enforced by sysevent_evc_unbind. 6425cf8f45c7Sdstaff */ 6426cf8f45c7Sdstaff ret = pthread_mutex_trylock(&((struct znotify *)handle)->zn_mutex); 6427cf8f45c7Sdstaff 6428cf8f45c7Sdstaff if (ret) 6429cf8f45c7Sdstaff abort(); 6430cf8f45c7Sdstaff 6431cf8f45c7Sdstaff (void) pthread_mutex_unlock(&((struct znotify *)handle)->zn_mutex); 6432cf8f45c7Sdstaff (void) pthread_mutex_destroy(&((struct znotify *)handle)->zn_mutex); 6433cf8f45c7Sdstaff (void) pthread_cond_destroy(&((struct znotify *)handle)->zn_cond); 6434cf8f45c7Sdstaff (void) pthread_mutex_destroy(&((struct znotify *)handle)->zn_bigmutex); 6435cf8f45c7Sdstaff 6436cf8f45c7Sdstaff free(handle); 6437cf8f45c7Sdstaff } 6438cf8f45c7Sdstaff 6439fa9e4066Sahrens static int 6440fa9e4066Sahrens zonecfg_add_ds_core(zone_dochandle_t handle, struct zone_dstab *tabptr) 6441fa9e4066Sahrens { 6442fa9e4066Sahrens xmlNodePtr newnode, cur = handle->zone_dh_cur; 6443fa9e4066Sahrens int err; 6444fa9e4066Sahrens 6445fa9e4066Sahrens newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DATASET, NULL); 6446fa9e4066Sahrens if ((err = newprop(newnode, DTD_ATTR_NAME, 6447fa9e4066Sahrens tabptr->zone_dataset_name)) != Z_OK) 6448fa9e4066Sahrens return (err); 6449fa9e4066Sahrens return (Z_OK); 6450fa9e4066Sahrens } 6451fa9e4066Sahrens 6452fa9e4066Sahrens int 6453fa9e4066Sahrens zonecfg_add_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 6454fa9e4066Sahrens { 6455fa9e4066Sahrens int err; 6456fa9e4066Sahrens 6457fa9e4066Sahrens if (tabptr == NULL) 6458fa9e4066Sahrens return (Z_INVAL); 6459fa9e4066Sahrens 6460fa9e4066Sahrens if ((err = operation_prep(handle)) != Z_OK) 6461fa9e4066Sahrens return (err); 6462fa9e4066Sahrens 6463fa9e4066Sahrens if ((err = zonecfg_add_ds_core(handle, tabptr)) != Z_OK) 6464fa9e4066Sahrens return (err); 6465fa9e4066Sahrens 6466fa9e4066Sahrens return (Z_OK); 6467fa9e4066Sahrens } 6468fa9e4066Sahrens 6469fa9e4066Sahrens static int 6470fa9e4066Sahrens zonecfg_delete_ds_core(zone_dochandle_t handle, struct zone_dstab *tabptr) 6471fa9e4066Sahrens { 6472fa9e4066Sahrens xmlNodePtr cur = handle->zone_dh_cur; 6473fa9e4066Sahrens 6474fa9e4066Sahrens for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6475fa9e4066Sahrens if (xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 6476fa9e4066Sahrens continue; 6477fa9e4066Sahrens 6478fa9e4066Sahrens if (match_prop(cur, DTD_ATTR_NAME, 6479fa9e4066Sahrens tabptr->zone_dataset_name)) { 6480fa9e4066Sahrens xmlUnlinkNode(cur); 6481fa9e4066Sahrens xmlFreeNode(cur); 6482fa9e4066Sahrens return (Z_OK); 6483fa9e4066Sahrens } 6484fa9e4066Sahrens } 6485fa9e4066Sahrens return (Z_NO_RESOURCE_ID); 6486fa9e4066Sahrens } 6487fa9e4066Sahrens 6488fa9e4066Sahrens int 6489fa9e4066Sahrens zonecfg_delete_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 6490fa9e4066Sahrens { 6491fa9e4066Sahrens int err; 6492fa9e4066Sahrens 6493fa9e4066Sahrens if (tabptr == NULL) 6494fa9e4066Sahrens return (Z_INVAL); 6495fa9e4066Sahrens 6496fa9e4066Sahrens if ((err = operation_prep(handle)) != Z_OK) 6497fa9e4066Sahrens return (err); 6498fa9e4066Sahrens 6499fa9e4066Sahrens if ((err = zonecfg_delete_ds_core(handle, tabptr)) != Z_OK) 6500fa9e4066Sahrens return (err); 6501fa9e4066Sahrens 6502fa9e4066Sahrens return (Z_OK); 6503fa9e4066Sahrens } 6504fa9e4066Sahrens 6505fa9e4066Sahrens int 6506fa9e4066Sahrens zonecfg_modify_ds( 6507fa9e4066Sahrens zone_dochandle_t handle, 6508fa9e4066Sahrens struct zone_dstab *oldtabptr, 6509fa9e4066Sahrens struct zone_dstab *newtabptr) 6510fa9e4066Sahrens { 6511fa9e4066Sahrens int err; 6512fa9e4066Sahrens 6513fa9e4066Sahrens if (oldtabptr == NULL || newtabptr == NULL) 6514fa9e4066Sahrens return (Z_INVAL); 6515fa9e4066Sahrens 6516fa9e4066Sahrens if ((err = operation_prep(handle)) != Z_OK) 6517fa9e4066Sahrens return (err); 6518fa9e4066Sahrens 6519fa9e4066Sahrens if ((err = zonecfg_delete_ds_core(handle, oldtabptr)) != Z_OK) 6520fa9e4066Sahrens return (err); 6521fa9e4066Sahrens 6522fa9e4066Sahrens if ((err = zonecfg_add_ds_core(handle, newtabptr)) != Z_OK) 6523fa9e4066Sahrens return (err); 6524fa9e4066Sahrens 6525fa9e4066Sahrens return (Z_OK); 6526fa9e4066Sahrens } 6527fa9e4066Sahrens 6528fa9e4066Sahrens int 6529fa9e4066Sahrens zonecfg_lookup_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 6530fa9e4066Sahrens { 6531fa9e4066Sahrens xmlNodePtr cur, firstmatch; 6532fa9e4066Sahrens int err; 6533fa9e4066Sahrens char dataset[MAXNAMELEN]; 6534fa9e4066Sahrens 6535fa9e4066Sahrens if (tabptr == NULL) 6536fa9e4066Sahrens return (Z_INVAL); 6537fa9e4066Sahrens 6538fa9e4066Sahrens if ((err = operation_prep(handle)) != Z_OK) 6539fa9e4066Sahrens return (err); 6540fa9e4066Sahrens 6541fa9e4066Sahrens cur = handle->zone_dh_cur; 6542fa9e4066Sahrens firstmatch = NULL; 6543fa9e4066Sahrens for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 6544fa9e4066Sahrens if (xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 6545fa9e4066Sahrens continue; 6546fa9e4066Sahrens if (strlen(tabptr->zone_dataset_name) > 0) { 6547fa9e4066Sahrens if ((fetchprop(cur, DTD_ATTR_NAME, dataset, 6548fa9e4066Sahrens sizeof (dataset)) == Z_OK) && 6549fa9e4066Sahrens (strcmp(tabptr->zone_dataset_name, 6550fa9e4066Sahrens dataset) == 0)) { 6551fa9e4066Sahrens if (firstmatch == NULL) 6552fa9e4066Sahrens firstmatch = cur; 6553fa9e4066Sahrens else 6554fa9e4066Sahrens return (Z_INSUFFICIENT_SPEC); 6555fa9e4066Sahrens } 6556fa9e4066Sahrens } 6557fa9e4066Sahrens } 6558fa9e4066Sahrens if (firstmatch == NULL) 6559fa9e4066Sahrens return (Z_NO_RESOURCE_ID); 6560fa9e4066Sahrens 6561fa9e4066Sahrens cur = firstmatch; 6562fa9e4066Sahrens 6563fa9e4066Sahrens if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_dataset_name, 6564fa9e4066Sahrens sizeof (tabptr->zone_dataset_name))) != Z_OK) 6565fa9e4066Sahrens return (err); 6566fa9e4066Sahrens 6567fa9e4066Sahrens return (Z_OK); 6568fa9e4066Sahrens } 6569fa9e4066Sahrens 6570fa9e4066Sahrens int 6571fa9e4066Sahrens zonecfg_setdsent(zone_dochandle_t handle) 6572fa9e4066Sahrens { 6573fa9e4066Sahrens return (zonecfg_setent(handle)); 6574fa9e4066Sahrens } 6575fa9e4066Sahrens 6576fa9e4066Sahrens int 6577fa9e4066Sahrens zonecfg_getdsent(zone_dochandle_t handle, struct zone_dstab *tabptr) 6578fa9e4066Sahrens { 6579fa9e4066Sahrens xmlNodePtr cur; 6580fa9e4066Sahrens int err; 6581fa9e4066Sahrens 6582fa9e4066Sahrens if (handle == NULL) 6583fa9e4066Sahrens return (Z_INVAL); 6584fa9e4066Sahrens 6585fa9e4066Sahrens if ((cur = handle->zone_dh_cur) == NULL) 6586fa9e4066Sahrens return (Z_NO_ENTRY); 6587fa9e4066Sahrens 6588fa9e4066Sahrens for (; cur != NULL; cur = cur->next) 6589fa9e4066Sahrens if (!xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 6590fa9e4066Sahrens break; 6591fa9e4066Sahrens if (cur == NULL) { 6592fa9e4066Sahrens handle->zone_dh_cur = handle->zone_dh_top; 6593fa9e4066Sahrens return (Z_NO_ENTRY); 6594fa9e4066Sahrens } 6595fa9e4066Sahrens 6596fa9e4066Sahrens if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_dataset_name, 6597fa9e4066Sahrens sizeof (tabptr->zone_dataset_name))) != Z_OK) { 6598fa9e4066Sahrens handle->zone_dh_cur = handle->zone_dh_top; 6599fa9e4066Sahrens return (err); 6600fa9e4066Sahrens } 6601fa9e4066Sahrens 6602fa9e4066Sahrens handle->zone_dh_cur = cur->next; 6603fa9e4066Sahrens return (Z_OK); 6604fa9e4066Sahrens } 6605fa9e4066Sahrens 6606fa9e4066Sahrens int 6607fa9e4066Sahrens zonecfg_enddsent(zone_dochandle_t handle) 6608fa9e4066Sahrens { 6609fa9e4066Sahrens return (zonecfg_endent(handle)); 6610fa9e4066Sahrens } 6611ee519a1fSgjelinek 66120209230bSgjelinek /* 66130209230bSgjelinek * Support for aliased rctls; that is, rctls that have simplified names in 66140209230bSgjelinek * zonecfg. For example, max-lwps is an alias for a well defined zone.max-lwps 66150209230bSgjelinek * rctl. If there are multiple existing values for one of these rctls or if 66160209230bSgjelinek * there is a single value that does not match the well defined template (i.e. 66170209230bSgjelinek * it has a different action) then we cannot treat the rctl as having an alias 66180209230bSgjelinek * so we return Z_ALIAS_DISALLOW. That means that the rctl cannot be 66190209230bSgjelinek * managed in zonecfg via an alias and that the standard rctl syntax must be 66200209230bSgjelinek * used. 66210209230bSgjelinek * 66220209230bSgjelinek * The possible return values are: 66230209230bSgjelinek * Z_NO_PROPERTY_ID - invalid alias name 66240209230bSgjelinek * Z_ALIAS_DISALLOW - pre-existing, incompatible rctl definition 66250209230bSgjelinek * Z_NO_ENTRY - no rctl is configured for this alias 66260209230bSgjelinek * Z_OK - we got a valid rctl for the specified alias 66270209230bSgjelinek */ 66280209230bSgjelinek int 66290209230bSgjelinek zonecfg_get_aliased_rctl(zone_dochandle_t handle, char *name, uint64_t *rval) 66300209230bSgjelinek { 66310209230bSgjelinek boolean_t found = B_FALSE; 66320209230bSgjelinek boolean_t found_val = B_FALSE; 66330209230bSgjelinek xmlNodePtr cur, val; 66340209230bSgjelinek char savedname[MAXNAMELEN]; 66350209230bSgjelinek struct zone_rctlvaltab rctl; 66360209230bSgjelinek int i; 66370209230bSgjelinek int err; 66380209230bSgjelinek 66390209230bSgjelinek for (i = 0; aliases[i].shortname != NULL; i++) 66400209230bSgjelinek if (strcmp(name, aliases[i].shortname) == 0) 66410209230bSgjelinek break; 66420209230bSgjelinek 66430209230bSgjelinek if (aliases[i].shortname == NULL) 66440209230bSgjelinek return (Z_NO_PROPERTY_ID); 66450209230bSgjelinek 66460209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 66470209230bSgjelinek return (err); 66480209230bSgjelinek 66490209230bSgjelinek cur = handle->zone_dh_cur; 66500209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 66510209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_RCTL) != 0) 66520209230bSgjelinek continue; 66530209230bSgjelinek if ((fetchprop(cur, DTD_ATTR_NAME, savedname, 66540209230bSgjelinek sizeof (savedname)) == Z_OK) && 66550209230bSgjelinek (strcmp(savedname, aliases[i].realname) == 0)) { 66560209230bSgjelinek 66570209230bSgjelinek /* 66580209230bSgjelinek * If we already saw one of these, we can't have an 66590209230bSgjelinek * alias since we just found another. 66600209230bSgjelinek */ 66610209230bSgjelinek if (found) 66620209230bSgjelinek return (Z_ALIAS_DISALLOW); 66630209230bSgjelinek found = B_TRUE; 66640209230bSgjelinek 66650209230bSgjelinek for (val = cur->xmlChildrenNode; val != NULL; 66660209230bSgjelinek val = val->next) { 66670209230bSgjelinek /* 66680209230bSgjelinek * If we already have one value, we can't have 66690209230bSgjelinek * an alias since we just found another. 66700209230bSgjelinek */ 66710209230bSgjelinek if (found_val) 66720209230bSgjelinek return (Z_ALIAS_DISALLOW); 66730209230bSgjelinek found_val = B_TRUE; 66740209230bSgjelinek 66750209230bSgjelinek if ((fetchprop(val, DTD_ATTR_PRIV, 66760209230bSgjelinek rctl.zone_rctlval_priv, 66770209230bSgjelinek sizeof (rctl.zone_rctlval_priv)) != Z_OK)) 66780209230bSgjelinek break; 66790209230bSgjelinek if ((fetchprop(val, DTD_ATTR_LIMIT, 66800209230bSgjelinek rctl.zone_rctlval_limit, 66810209230bSgjelinek sizeof (rctl.zone_rctlval_limit)) != Z_OK)) 66820209230bSgjelinek break; 66830209230bSgjelinek if ((fetchprop(val, DTD_ATTR_ACTION, 66840209230bSgjelinek rctl.zone_rctlval_action, 66850209230bSgjelinek sizeof (rctl.zone_rctlval_action)) != Z_OK)) 66860209230bSgjelinek break; 66870209230bSgjelinek } 66880209230bSgjelinek 66890209230bSgjelinek /* check priv and action match the expected vals */ 66900209230bSgjelinek if (strcmp(rctl.zone_rctlval_priv, 66910209230bSgjelinek aliases[i].priv) != 0 || 66920209230bSgjelinek strcmp(rctl.zone_rctlval_action, 66930209230bSgjelinek aliases[i].action) != 0) 66940209230bSgjelinek return (Z_ALIAS_DISALLOW); 66950209230bSgjelinek } 66960209230bSgjelinek } 66970209230bSgjelinek 66980209230bSgjelinek if (found) { 66990209230bSgjelinek *rval = strtoull(rctl.zone_rctlval_limit, NULL, 10); 67000209230bSgjelinek return (Z_OK); 67010209230bSgjelinek } 67020209230bSgjelinek 67030209230bSgjelinek return (Z_NO_ENTRY); 67040209230bSgjelinek } 67050209230bSgjelinek 67060209230bSgjelinek int 67070209230bSgjelinek zonecfg_rm_aliased_rctl(zone_dochandle_t handle, char *name) 67080209230bSgjelinek { 67090209230bSgjelinek int i; 67100209230bSgjelinek uint64_t val; 67110209230bSgjelinek struct zone_rctltab rctltab; 67120209230bSgjelinek 67130209230bSgjelinek /* 67140209230bSgjelinek * First check that we have a valid aliased rctl to remove. 67150209230bSgjelinek * This will catch an rctl entry with non-standard values or 67160209230bSgjelinek * multiple rctl values for this name. We need to ignore those 67170209230bSgjelinek * rctl entries. 67180209230bSgjelinek */ 67190209230bSgjelinek if (zonecfg_get_aliased_rctl(handle, name, &val) != Z_OK) 67200209230bSgjelinek return (Z_OK); 67210209230bSgjelinek 67220209230bSgjelinek for (i = 0; aliases[i].shortname != NULL; i++) 67230209230bSgjelinek if (strcmp(name, aliases[i].shortname) == 0) 67240209230bSgjelinek break; 67250209230bSgjelinek 67260209230bSgjelinek if (aliases[i].shortname == NULL) 67270209230bSgjelinek return (Z_NO_RESOURCE_ID); 67280209230bSgjelinek 67290209230bSgjelinek (void) strlcpy(rctltab.zone_rctl_name, aliases[i].realname, 67300209230bSgjelinek sizeof (rctltab.zone_rctl_name)); 67310209230bSgjelinek 67320209230bSgjelinek return (zonecfg_delete_rctl(handle, &rctltab)); 67330209230bSgjelinek } 67340209230bSgjelinek 67350209230bSgjelinek boolean_t 67360209230bSgjelinek zonecfg_aliased_rctl_ok(zone_dochandle_t handle, char *name) 67370209230bSgjelinek { 67380209230bSgjelinek uint64_t tmp_val; 67390209230bSgjelinek 67400209230bSgjelinek switch (zonecfg_get_aliased_rctl(handle, name, &tmp_val)) { 67410209230bSgjelinek case Z_OK: 67420209230bSgjelinek /*FALLTHRU*/ 67430209230bSgjelinek case Z_NO_ENTRY: 67440209230bSgjelinek return (B_TRUE); 67450209230bSgjelinek default: 67460209230bSgjelinek return (B_FALSE); 67470209230bSgjelinek } 67480209230bSgjelinek } 67490209230bSgjelinek 67500209230bSgjelinek int 67510209230bSgjelinek zonecfg_set_aliased_rctl(zone_dochandle_t handle, char *name, uint64_t val) 67520209230bSgjelinek { 67530209230bSgjelinek int i; 67540209230bSgjelinek int err; 67550209230bSgjelinek struct zone_rctltab rctltab; 67560209230bSgjelinek struct zone_rctlvaltab *rctlvaltab; 67570209230bSgjelinek char buf[128]; 67580209230bSgjelinek 67590209230bSgjelinek if (!zonecfg_aliased_rctl_ok(handle, name)) 67600209230bSgjelinek return (Z_ALIAS_DISALLOW); 67610209230bSgjelinek 67620209230bSgjelinek for (i = 0; aliases[i].shortname != NULL; i++) 67630209230bSgjelinek if (strcmp(name, aliases[i].shortname) == 0) 67640209230bSgjelinek break; 67650209230bSgjelinek 67660209230bSgjelinek if (aliases[i].shortname == NULL) 67670209230bSgjelinek return (Z_NO_RESOURCE_ID); 67680209230bSgjelinek 67690209230bSgjelinek /* remove any pre-existing definition for this rctl */ 67700209230bSgjelinek (void) zonecfg_rm_aliased_rctl(handle, name); 67710209230bSgjelinek 67720209230bSgjelinek (void) strlcpy(rctltab.zone_rctl_name, aliases[i].realname, 67730209230bSgjelinek sizeof (rctltab.zone_rctl_name)); 67740209230bSgjelinek 67750209230bSgjelinek rctltab.zone_rctl_valptr = NULL; 67760209230bSgjelinek 67770209230bSgjelinek if ((rctlvaltab = calloc(1, sizeof (struct zone_rctlvaltab))) == NULL) 67780209230bSgjelinek return (Z_NOMEM); 67790209230bSgjelinek 67800209230bSgjelinek (void) snprintf(buf, sizeof (buf), "%llu", (long long)val); 67810209230bSgjelinek 67820209230bSgjelinek (void) strlcpy(rctlvaltab->zone_rctlval_priv, aliases[i].priv, 67830209230bSgjelinek sizeof (rctlvaltab->zone_rctlval_priv)); 67840209230bSgjelinek (void) strlcpy(rctlvaltab->zone_rctlval_limit, buf, 67850209230bSgjelinek sizeof (rctlvaltab->zone_rctlval_limit)); 67860209230bSgjelinek (void) strlcpy(rctlvaltab->zone_rctlval_action, aliases[i].action, 67870209230bSgjelinek sizeof (rctlvaltab->zone_rctlval_action)); 67880209230bSgjelinek 67890209230bSgjelinek rctlvaltab->zone_rctlval_next = NULL; 67900209230bSgjelinek 67910209230bSgjelinek if ((err = zonecfg_add_rctl_value(&rctltab, rctlvaltab)) != Z_OK) 67920209230bSgjelinek return (err); 67930209230bSgjelinek 67940209230bSgjelinek return (zonecfg_add_rctl(handle, &rctltab)); 67950209230bSgjelinek } 67960209230bSgjelinek 67970209230bSgjelinek static int 67980209230bSgjelinek delete_tmp_pool(zone_dochandle_t handle) 67990209230bSgjelinek { 68000209230bSgjelinek int err; 68010209230bSgjelinek xmlNodePtr cur = handle->zone_dh_cur; 68020209230bSgjelinek 68030209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 68040209230bSgjelinek return (err); 68050209230bSgjelinek 68060209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 68070209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_TMPPOOL) == 0) { 68080209230bSgjelinek xmlUnlinkNode(cur); 68090209230bSgjelinek xmlFreeNode(cur); 68100209230bSgjelinek return (Z_OK); 68110209230bSgjelinek } 68120209230bSgjelinek } 68130209230bSgjelinek 68140209230bSgjelinek return (Z_NO_RESOURCE_ID); 68150209230bSgjelinek } 68160209230bSgjelinek 68170209230bSgjelinek static int 68180209230bSgjelinek modify_tmp_pool(zone_dochandle_t handle, char *pool_importance) 68190209230bSgjelinek { 68200209230bSgjelinek int err; 68210209230bSgjelinek xmlNodePtr cur = handle->zone_dh_cur; 68220209230bSgjelinek xmlNodePtr newnode; 68230209230bSgjelinek 68240209230bSgjelinek err = delete_tmp_pool(handle); 68250209230bSgjelinek if (err != Z_OK && err != Z_NO_RESOURCE_ID) 68260209230bSgjelinek return (err); 68270209230bSgjelinek 68280209230bSgjelinek if (*pool_importance != '\0') { 68290209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 68300209230bSgjelinek return (err); 68310209230bSgjelinek 68320209230bSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_TMPPOOL, NULL); 68330209230bSgjelinek if ((err = newprop(newnode, DTD_ATTR_IMPORTANCE, 68340209230bSgjelinek pool_importance)) != Z_OK) 68350209230bSgjelinek return (err); 68360209230bSgjelinek } 68370209230bSgjelinek 68380209230bSgjelinek return (Z_OK); 68390209230bSgjelinek } 68400209230bSgjelinek 68410209230bSgjelinek static int 68420209230bSgjelinek add_pset_core(zone_dochandle_t handle, struct zone_psettab *tabptr) 68430209230bSgjelinek { 68440209230bSgjelinek xmlNodePtr newnode, cur = handle->zone_dh_cur; 68450209230bSgjelinek int err; 68460209230bSgjelinek 68470209230bSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_PSET, NULL); 68480209230bSgjelinek if ((err = newprop(newnode, DTD_ATTR_NCPU_MIN, 68490209230bSgjelinek tabptr->zone_ncpu_min)) != Z_OK) 68500209230bSgjelinek return (err); 68510209230bSgjelinek if ((err = newprop(newnode, DTD_ATTR_NCPU_MAX, 68520209230bSgjelinek tabptr->zone_ncpu_max)) != Z_OK) 68530209230bSgjelinek return (err); 68540209230bSgjelinek 68550209230bSgjelinek if ((err = modify_tmp_pool(handle, tabptr->zone_importance)) != Z_OK) 68560209230bSgjelinek return (err); 68570209230bSgjelinek 68580209230bSgjelinek return (Z_OK); 68590209230bSgjelinek } 68600209230bSgjelinek 68610209230bSgjelinek int 68620209230bSgjelinek zonecfg_add_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 68630209230bSgjelinek { 68640209230bSgjelinek int err; 68650209230bSgjelinek 68660209230bSgjelinek if (tabptr == NULL) 68670209230bSgjelinek return (Z_INVAL); 68680209230bSgjelinek 68690209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 68700209230bSgjelinek return (err); 68710209230bSgjelinek 68720209230bSgjelinek if ((err = add_pset_core(handle, tabptr)) != Z_OK) 68730209230bSgjelinek return (err); 68740209230bSgjelinek 68750209230bSgjelinek return (Z_OK); 68760209230bSgjelinek } 68770209230bSgjelinek 68780209230bSgjelinek int 68790209230bSgjelinek zonecfg_delete_pset(zone_dochandle_t handle) 68800209230bSgjelinek { 68810209230bSgjelinek int err; 68820209230bSgjelinek int res = Z_NO_RESOURCE_ID; 68830209230bSgjelinek xmlNodePtr cur = handle->zone_dh_cur; 68840209230bSgjelinek 68850209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 68860209230bSgjelinek return (err); 68870209230bSgjelinek 68880209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 68890209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_PSET) == 0) { 68900209230bSgjelinek xmlUnlinkNode(cur); 68910209230bSgjelinek xmlFreeNode(cur); 68920209230bSgjelinek res = Z_OK; 68930209230bSgjelinek break; 68940209230bSgjelinek } 68950209230bSgjelinek } 68960209230bSgjelinek 68970209230bSgjelinek /* 68980209230bSgjelinek * Once we have msets, we should check that a mset 68990209230bSgjelinek * do not exist before we delete the tmp_pool data. 69000209230bSgjelinek */ 69010209230bSgjelinek err = delete_tmp_pool(handle); 69020209230bSgjelinek if (err != Z_OK && err != Z_NO_RESOURCE_ID) 69030209230bSgjelinek return (err); 69040209230bSgjelinek 69050209230bSgjelinek return (res); 69060209230bSgjelinek } 69070209230bSgjelinek 69080209230bSgjelinek int 69090209230bSgjelinek zonecfg_modify_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 69100209230bSgjelinek { 69110209230bSgjelinek int err; 69120209230bSgjelinek 69130209230bSgjelinek if (tabptr == NULL) 69140209230bSgjelinek return (Z_INVAL); 69150209230bSgjelinek 69160209230bSgjelinek if ((err = zonecfg_delete_pset(handle)) != Z_OK) 69170209230bSgjelinek return (err); 69180209230bSgjelinek 69190209230bSgjelinek if ((err = add_pset_core(handle, tabptr)) != Z_OK) 69200209230bSgjelinek return (err); 69210209230bSgjelinek 69220209230bSgjelinek return (Z_OK); 69230209230bSgjelinek } 69240209230bSgjelinek 69250209230bSgjelinek int 69260209230bSgjelinek zonecfg_lookup_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 69270209230bSgjelinek { 69280209230bSgjelinek xmlNodePtr cur; 69290209230bSgjelinek int err; 69300209230bSgjelinek int res = Z_NO_ENTRY; 69310209230bSgjelinek 69320209230bSgjelinek if (tabptr == NULL) 69330209230bSgjelinek return (Z_INVAL); 69340209230bSgjelinek 69350209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 69360209230bSgjelinek return (err); 69370209230bSgjelinek 69380209230bSgjelinek /* this is an optional component */ 69390209230bSgjelinek tabptr->zone_importance[0] = '\0'; 69400209230bSgjelinek 69410209230bSgjelinek cur = handle->zone_dh_cur; 69420209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 69430209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_PSET) == 0) { 69440209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_NCPU_MIN, 69450209230bSgjelinek tabptr->zone_ncpu_min, 69460209230bSgjelinek sizeof (tabptr->zone_ncpu_min))) != Z_OK) { 69470209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 69480209230bSgjelinek return (err); 69490209230bSgjelinek } 69500209230bSgjelinek 69510209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_NCPU_MAX, 69520209230bSgjelinek tabptr->zone_ncpu_max, 69530209230bSgjelinek sizeof (tabptr->zone_ncpu_max))) != Z_OK) { 69540209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 69550209230bSgjelinek return (err); 69560209230bSgjelinek } 69570209230bSgjelinek 69580209230bSgjelinek res = Z_OK; 69590209230bSgjelinek 69600209230bSgjelinek } else if (xmlStrcmp(cur->name, DTD_ELEM_TMPPOOL) == 0) { 69610209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_IMPORTANCE, 69620209230bSgjelinek tabptr->zone_importance, 69630209230bSgjelinek sizeof (tabptr->zone_importance))) != Z_OK) { 69640209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 69650209230bSgjelinek return (err); 69660209230bSgjelinek } 69670209230bSgjelinek } 69680209230bSgjelinek } 69690209230bSgjelinek 69700209230bSgjelinek return (res); 69710209230bSgjelinek } 69720209230bSgjelinek 69730209230bSgjelinek int 69740209230bSgjelinek zonecfg_getpsetent(zone_dochandle_t handle, struct zone_psettab *tabptr) 69750209230bSgjelinek { 69760209230bSgjelinek int err; 69770209230bSgjelinek 69780209230bSgjelinek if ((err = zonecfg_setent(handle)) != Z_OK) 69790209230bSgjelinek return (err); 69800209230bSgjelinek 69810209230bSgjelinek err = zonecfg_lookup_pset(handle, tabptr); 69820209230bSgjelinek 69830209230bSgjelinek (void) zonecfg_endent(handle); 69840209230bSgjelinek 69850209230bSgjelinek return (err); 69860209230bSgjelinek } 69870209230bSgjelinek 69880209230bSgjelinek static int 69890209230bSgjelinek add_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 69900209230bSgjelinek { 69910209230bSgjelinek xmlNodePtr newnode, cur = handle->zone_dh_cur; 69920209230bSgjelinek int err; 69930209230bSgjelinek 69940209230bSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_MCAP, NULL); 69950209230bSgjelinek if ((err = newprop(newnode, DTD_ATTR_PHYSCAP, tabptr->zone_physmem_cap)) 69960209230bSgjelinek != Z_OK) 69970209230bSgjelinek return (err); 69980209230bSgjelinek 69990209230bSgjelinek return (Z_OK); 70000209230bSgjelinek } 70010209230bSgjelinek 70020209230bSgjelinek int 70030209230bSgjelinek zonecfg_delete_mcap(zone_dochandle_t handle) 70040209230bSgjelinek { 70050209230bSgjelinek int err; 70060209230bSgjelinek xmlNodePtr cur = handle->zone_dh_cur; 70070209230bSgjelinek 70080209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 70090209230bSgjelinek return (err); 70100209230bSgjelinek 70110209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 70120209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) != 0) 70130209230bSgjelinek continue; 70140209230bSgjelinek 70150209230bSgjelinek xmlUnlinkNode(cur); 70160209230bSgjelinek xmlFreeNode(cur); 70170209230bSgjelinek return (Z_OK); 70180209230bSgjelinek } 70190209230bSgjelinek return (Z_NO_RESOURCE_ID); 70200209230bSgjelinek } 70210209230bSgjelinek 70220209230bSgjelinek int 70230209230bSgjelinek zonecfg_modify_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 70240209230bSgjelinek { 70250209230bSgjelinek int err; 70260209230bSgjelinek 70270209230bSgjelinek if (tabptr == NULL) 70280209230bSgjelinek return (Z_INVAL); 70290209230bSgjelinek 70300209230bSgjelinek err = zonecfg_delete_mcap(handle); 70310209230bSgjelinek /* it is ok if there is no mcap entry */ 70320209230bSgjelinek if (err != Z_OK && err != Z_NO_RESOURCE_ID) 70330209230bSgjelinek return (err); 70340209230bSgjelinek 70350209230bSgjelinek if ((err = add_mcap(handle, tabptr)) != Z_OK) 70360209230bSgjelinek return (err); 70370209230bSgjelinek 70380209230bSgjelinek return (Z_OK); 70390209230bSgjelinek } 70400209230bSgjelinek 70410209230bSgjelinek int 70420209230bSgjelinek zonecfg_lookup_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 70430209230bSgjelinek { 70440209230bSgjelinek xmlNodePtr cur; 70450209230bSgjelinek int err; 70460209230bSgjelinek 70470209230bSgjelinek if (tabptr == NULL) 70480209230bSgjelinek return (Z_INVAL); 70490209230bSgjelinek 70500209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 70510209230bSgjelinek return (err); 70520209230bSgjelinek 70530209230bSgjelinek cur = handle->zone_dh_cur; 70540209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 70550209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) != 0) 70560209230bSgjelinek continue; 70570209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_PHYSCAP, 70580209230bSgjelinek tabptr->zone_physmem_cap, 70590209230bSgjelinek sizeof (tabptr->zone_physmem_cap))) != Z_OK) { 70600209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 70610209230bSgjelinek return (err); 70620209230bSgjelinek } 70630209230bSgjelinek 70640209230bSgjelinek return (Z_OK); 70650209230bSgjelinek } 70660209230bSgjelinek 70670209230bSgjelinek return (Z_NO_ENTRY); 70680209230bSgjelinek } 70690209230bSgjelinek 70700209230bSgjelinek static int 70710209230bSgjelinek getmcapent_core(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 70720209230bSgjelinek { 70730209230bSgjelinek xmlNodePtr cur; 70740209230bSgjelinek int err; 70750209230bSgjelinek 70760209230bSgjelinek if (handle == NULL) 70770209230bSgjelinek return (Z_INVAL); 70780209230bSgjelinek 70790209230bSgjelinek if ((cur = handle->zone_dh_cur) == NULL) 70800209230bSgjelinek return (Z_NO_ENTRY); 70810209230bSgjelinek 70820209230bSgjelinek for (; cur != NULL; cur = cur->next) 70830209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) == 0) 70840209230bSgjelinek break; 70850209230bSgjelinek if (cur == NULL) { 70860209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 70870209230bSgjelinek return (Z_NO_ENTRY); 70880209230bSgjelinek } 70890209230bSgjelinek 70900209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_PHYSCAP, tabptr->zone_physmem_cap, 70910209230bSgjelinek sizeof (tabptr->zone_physmem_cap))) != Z_OK) { 70920209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 70930209230bSgjelinek return (err); 70940209230bSgjelinek } 70950209230bSgjelinek 70960209230bSgjelinek handle->zone_dh_cur = cur->next; 70970209230bSgjelinek return (Z_OK); 70980209230bSgjelinek } 70990209230bSgjelinek 71000209230bSgjelinek int 71010209230bSgjelinek zonecfg_getmcapent(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 71020209230bSgjelinek { 71030209230bSgjelinek int err; 71040209230bSgjelinek 71050209230bSgjelinek if ((err = zonecfg_setent(handle)) != Z_OK) 71060209230bSgjelinek return (err); 71070209230bSgjelinek 71080209230bSgjelinek err = getmcapent_core(handle, tabptr); 71090209230bSgjelinek 71100209230bSgjelinek (void) zonecfg_endent(handle); 71110209230bSgjelinek 71120209230bSgjelinek return (err); 71130209230bSgjelinek } 71140209230bSgjelinek 71156cfd72c6Sgjelinek /* 71166cfd72c6Sgjelinek * Get the full tree of pkg/patch metadata in a set of nested AVL trees. 71176cfd72c6Sgjelinek * pkgs_avl is an AVL tree of pkgs. Each pkg element contains a 71186cfd72c6Sgjelinek * zpe_patches_avl member which holds an AVL tree of patches for that pkg. 71196cfd72c6Sgjelinek * The patch elements have the same zpe_patches_avl member, each of which can 71206cfd72c6Sgjelinek * hold an AVL tree of patches that are obsoleted by the patch. 71216cfd72c6Sgjelinek * 71226cfd72c6Sgjelinek * The zone xml data contains DTD_ELEM_PACKAGE elements, followed by 71236cfd72c6Sgjelinek * DTD_ELEM_PATCH elements. The DTD_ELEM_PATCH patch element applies to the 71246cfd72c6Sgjelinek * DTD_ELEM_PACKAGE that precedes it. The DTD_ELEM_PATCH element may have 71256cfd72c6Sgjelinek * child DTD_ELEM_OBSOLETES nodes associated with it. The DTD_ELEM_PACKAGE 71266cfd72c6Sgjelinek * really should have had the DTD_ELEM_PATCH elements as children but it 71276cfd72c6Sgjelinek * was not defined that way initially so we are stuck with the DTD definition 71286cfd72c6Sgjelinek * now. However, we can safely assume the ordering for compatibility. 71296cfd72c6Sgjelinek */ 7130ee519a1fSgjelinek int 71316cfd72c6Sgjelinek zonecfg_getpkgdata(zone_dochandle_t handle, uu_avl_pool_t *pkg_pool, 71326cfd72c6Sgjelinek uu_avl_t *pkgs_avl) 7133ee519a1fSgjelinek { 7134ee519a1fSgjelinek xmlNodePtr cur; 71356cfd72c6Sgjelinek int res; 71366cfd72c6Sgjelinek zone_pkg_entry_t *pkg; 71376cfd72c6Sgjelinek char name[MAXNAMELEN]; 71386cfd72c6Sgjelinek char version[ZONE_PKG_VERSMAX]; 7139ee519a1fSgjelinek 7140ee519a1fSgjelinek if (handle == NULL) 7141ee519a1fSgjelinek return (Z_INVAL); 7142ee519a1fSgjelinek 71436cfd72c6Sgjelinek if ((res = zonecfg_setent(handle)) != Z_OK) 71446cfd72c6Sgjelinek return (res); 7145ee519a1fSgjelinek 71466cfd72c6Sgjelinek if ((cur = handle->zone_dh_cur) == NULL) { 71476cfd72c6Sgjelinek res = Z_NO_ENTRY; 71486cfd72c6Sgjelinek goto done; 7149ee519a1fSgjelinek } 7150ee519a1fSgjelinek 71516cfd72c6Sgjelinek for (; cur != NULL; cur = cur->next) { 71526cfd72c6Sgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_PACKAGE) == 0) { 71536cfd72c6Sgjelinek uu_avl_index_t where; 71546cfd72c6Sgjelinek 71556cfd72c6Sgjelinek if ((res = fetchprop(cur, DTD_ATTR_NAME, name, 71566cfd72c6Sgjelinek sizeof (name))) != Z_OK) 71576cfd72c6Sgjelinek goto done; 71586cfd72c6Sgjelinek 71596cfd72c6Sgjelinek if ((res = fetchprop(cur, DTD_ATTR_VERSION, version, 71606cfd72c6Sgjelinek sizeof (version))) != Z_OK) 71616cfd72c6Sgjelinek goto done; 71626cfd72c6Sgjelinek 71636cfd72c6Sgjelinek if ((pkg = (zone_pkg_entry_t *) 71646cfd72c6Sgjelinek malloc(sizeof (zone_pkg_entry_t))) == NULL) { 71656cfd72c6Sgjelinek res = Z_NOMEM; 71666cfd72c6Sgjelinek goto done; 7167ee519a1fSgjelinek } 7168ee519a1fSgjelinek 71696cfd72c6Sgjelinek if ((pkg->zpe_name = strdup(name)) == NULL) { 71706cfd72c6Sgjelinek free(pkg); 71716cfd72c6Sgjelinek res = Z_NOMEM; 71726cfd72c6Sgjelinek goto done; 7173ee519a1fSgjelinek } 7174ee519a1fSgjelinek 71756cfd72c6Sgjelinek if ((pkg->zpe_vers = strdup(version)) == NULL) { 71766cfd72c6Sgjelinek free(pkg->zpe_name); 71776cfd72c6Sgjelinek free(pkg); 71786cfd72c6Sgjelinek res = Z_NOMEM; 71796cfd72c6Sgjelinek goto done; 7180ee519a1fSgjelinek } 7181ee519a1fSgjelinek 71826cfd72c6Sgjelinek pkg->zpe_patches_avl = NULL; 71836cfd72c6Sgjelinek 71846cfd72c6Sgjelinek uu_avl_node_init(pkg, &pkg->zpe_entry, pkg_pool); 71856cfd72c6Sgjelinek if (uu_avl_find(pkgs_avl, pkg, NULL, &where) != NULL) { 71866cfd72c6Sgjelinek free(pkg->zpe_name); 71876cfd72c6Sgjelinek free(pkg->zpe_vers); 71886cfd72c6Sgjelinek free(pkg); 71896cfd72c6Sgjelinek } else { 71906cfd72c6Sgjelinek uu_avl_insert(pkgs_avl, pkg, where); 7191ee519a1fSgjelinek } 7192ee519a1fSgjelinek 71936cfd72c6Sgjelinek } else if (xmlStrcmp(cur->name, DTD_ELEM_PATCH) == 0) { 71946cfd72c6Sgjelinek zone_pkg_entry_t *patch; 71956cfd72c6Sgjelinek uu_avl_index_t where; 71966cfd72c6Sgjelinek char *p; 71976cfd72c6Sgjelinek char *dashp = NULL; 71986cfd72c6Sgjelinek xmlNodePtr child; 71996cfd72c6Sgjelinek 72006cfd72c6Sgjelinek if ((res = fetchprop(cur, DTD_ATTR_ID, name, 72016cfd72c6Sgjelinek sizeof (name))) != Z_OK) 72026cfd72c6Sgjelinek goto done; 72036cfd72c6Sgjelinek 72046cfd72c6Sgjelinek if ((patch = (zone_pkg_entry_t *) 72056cfd72c6Sgjelinek malloc(sizeof (zone_pkg_entry_t))) == NULL) { 72066cfd72c6Sgjelinek res = Z_NOMEM; 72076cfd72c6Sgjelinek goto done; 7208ee519a1fSgjelinek } 7209ee519a1fSgjelinek 72106cfd72c6Sgjelinek if ((p = strchr(name, '-')) != NULL) { 72116cfd72c6Sgjelinek dashp = p; 72126cfd72c6Sgjelinek *p++ = '\0'; 72136cfd72c6Sgjelinek } else { 72146cfd72c6Sgjelinek p = ""; 7215ee519a1fSgjelinek } 7216ee519a1fSgjelinek 72176cfd72c6Sgjelinek if ((patch->zpe_name = strdup(name)) == NULL) { 72186cfd72c6Sgjelinek free(patch); 72196cfd72c6Sgjelinek res = Z_NOMEM; 72206cfd72c6Sgjelinek goto done; 7221ee519a1fSgjelinek } 7222ee519a1fSgjelinek 72236cfd72c6Sgjelinek if ((patch->zpe_vers = strdup(p)) == NULL) { 72246cfd72c6Sgjelinek free(patch->zpe_name); 72256cfd72c6Sgjelinek free(patch); 72266cfd72c6Sgjelinek res = Z_NOMEM; 72276cfd72c6Sgjelinek goto done; 7228ee519a1fSgjelinek } 7229ee519a1fSgjelinek 72306cfd72c6Sgjelinek if (dashp != NULL) 72316cfd72c6Sgjelinek *dashp = '-'; 72326cfd72c6Sgjelinek 72336cfd72c6Sgjelinek patch->zpe_patches_avl = NULL; 72346cfd72c6Sgjelinek 72356cfd72c6Sgjelinek if (pkg->zpe_patches_avl == NULL) { 72366cfd72c6Sgjelinek pkg->zpe_patches_avl = uu_avl_create(pkg_pool, 72376cfd72c6Sgjelinek NULL, UU_DEFAULT); 72386cfd72c6Sgjelinek if (pkg->zpe_patches_avl == NULL) { 72396cfd72c6Sgjelinek free(patch->zpe_name); 72406cfd72c6Sgjelinek free(patch->zpe_vers); 72416cfd72c6Sgjelinek free(patch); 72426cfd72c6Sgjelinek res = Z_NOMEM; 72436cfd72c6Sgjelinek goto done; 72446cfd72c6Sgjelinek } 72456cfd72c6Sgjelinek } 72466cfd72c6Sgjelinek 72476cfd72c6Sgjelinek uu_avl_node_init(patch, &patch->zpe_entry, pkg_pool); 72486cfd72c6Sgjelinek if (uu_avl_find(pkg->zpe_patches_avl, patch, NULL, 72496cfd72c6Sgjelinek &where) != NULL) { 72506cfd72c6Sgjelinek free(patch->zpe_name); 72516cfd72c6Sgjelinek free(patch->zpe_vers); 72526cfd72c6Sgjelinek free(patch); 72536cfd72c6Sgjelinek } else { 72546cfd72c6Sgjelinek uu_avl_insert(pkg->zpe_patches_avl, patch, 72556cfd72c6Sgjelinek where); 72566cfd72c6Sgjelinek } 72576cfd72c6Sgjelinek 72586cfd72c6Sgjelinek /* Add any patches this patch obsoletes. */ 72596cfd72c6Sgjelinek for (child = cur->xmlChildrenNode; child != NULL; 72606cfd72c6Sgjelinek child = child->next) { 72616cfd72c6Sgjelinek zone_pkg_entry_t *obs; 72626cfd72c6Sgjelinek 72636cfd72c6Sgjelinek if (xmlStrcmp(child->name, DTD_ELEM_OBSOLETES) 72646cfd72c6Sgjelinek != 0) 72656cfd72c6Sgjelinek continue; 72666cfd72c6Sgjelinek 72676cfd72c6Sgjelinek if ((res = fetchprop(child, DTD_ATTR_ID, 72686cfd72c6Sgjelinek name, sizeof (name))) != Z_OK) 72696cfd72c6Sgjelinek goto done; 72706cfd72c6Sgjelinek 72716cfd72c6Sgjelinek if ((obs = (zone_pkg_entry_t *)malloc( 72726cfd72c6Sgjelinek sizeof (zone_pkg_entry_t))) == NULL) { 72736cfd72c6Sgjelinek res = Z_NOMEM; 72746cfd72c6Sgjelinek goto done; 72756cfd72c6Sgjelinek } 72766cfd72c6Sgjelinek 72776cfd72c6Sgjelinek if ((obs->zpe_name = strdup(name)) == NULL) { 72786cfd72c6Sgjelinek free(obs); 72796cfd72c6Sgjelinek res = Z_NOMEM; 72806cfd72c6Sgjelinek goto done; 72816cfd72c6Sgjelinek } 72826cfd72c6Sgjelinek /* 72836cfd72c6Sgjelinek * The version doesn't matter for obsoleted 72846cfd72c6Sgjelinek * patches. 72856cfd72c6Sgjelinek */ 72866cfd72c6Sgjelinek obs->zpe_vers = NULL; 72876cfd72c6Sgjelinek obs->zpe_patches_avl = NULL; 72886cfd72c6Sgjelinek 72896cfd72c6Sgjelinek /* 72906cfd72c6Sgjelinek * If this is the first obsolete patch, add an 72916cfd72c6Sgjelinek * AVL tree to the parent patch element. 72926cfd72c6Sgjelinek */ 72936cfd72c6Sgjelinek if (patch->zpe_patches_avl == NULL) { 72946cfd72c6Sgjelinek patch->zpe_patches_avl = 72956cfd72c6Sgjelinek uu_avl_create(pkg_pool, NULL, 72966cfd72c6Sgjelinek UU_DEFAULT); 72976cfd72c6Sgjelinek if (patch->zpe_patches_avl == NULL) { 72986cfd72c6Sgjelinek free(obs->zpe_name); 72996cfd72c6Sgjelinek free(obs); 73006cfd72c6Sgjelinek res = Z_NOMEM; 73016cfd72c6Sgjelinek goto done; 73026cfd72c6Sgjelinek } 73036cfd72c6Sgjelinek } 73046cfd72c6Sgjelinek 73056cfd72c6Sgjelinek /* Insert obsolete patch into the AVL tree. */ 73066cfd72c6Sgjelinek uu_avl_node_init(obs, &obs->zpe_entry, 73076cfd72c6Sgjelinek pkg_pool); 73086cfd72c6Sgjelinek if (uu_avl_find(patch->zpe_patches_avl, obs, 73096cfd72c6Sgjelinek NULL, &where) != NULL) { 73106cfd72c6Sgjelinek free(obs->zpe_name); 73116cfd72c6Sgjelinek free(obs); 73126cfd72c6Sgjelinek } else { 73136cfd72c6Sgjelinek uu_avl_insert(patch->zpe_patches_avl, 73146cfd72c6Sgjelinek obs, where); 73156cfd72c6Sgjelinek } 73166cfd72c6Sgjelinek } 73176cfd72c6Sgjelinek } 73186cfd72c6Sgjelinek } 73196cfd72c6Sgjelinek 73206cfd72c6Sgjelinek done: 73216cfd72c6Sgjelinek (void) zonecfg_endent(handle); 73226cfd72c6Sgjelinek return (res); 7323ee519a1fSgjelinek } 7324ee519a1fSgjelinek 7325ee519a1fSgjelinek int 7326ee519a1fSgjelinek zonecfg_setdevperment(zone_dochandle_t handle) 7327ee519a1fSgjelinek { 7328ee519a1fSgjelinek return (zonecfg_setent(handle)); 7329ee519a1fSgjelinek } 7330ee519a1fSgjelinek 7331ee519a1fSgjelinek int 7332ee519a1fSgjelinek zonecfg_getdevperment(zone_dochandle_t handle, struct zone_devpermtab *tabptr) 7333ee519a1fSgjelinek { 7334ee519a1fSgjelinek xmlNodePtr cur; 7335ee519a1fSgjelinek int err; 7336ee519a1fSgjelinek char buf[128]; 7337ee519a1fSgjelinek 7338ee519a1fSgjelinek tabptr->zone_devperm_acl = NULL; 7339ee519a1fSgjelinek 7340ee519a1fSgjelinek if (handle == NULL) 7341ee519a1fSgjelinek return (Z_INVAL); 7342ee519a1fSgjelinek 7343ee519a1fSgjelinek if ((cur = handle->zone_dh_cur) == NULL) 7344ee519a1fSgjelinek return (Z_NO_ENTRY); 7345ee519a1fSgjelinek 7346ee519a1fSgjelinek for (; cur != NULL; cur = cur->next) 7347ee519a1fSgjelinek if (!xmlStrcmp(cur->name, DTD_ELEM_DEV_PERM)) 7348ee519a1fSgjelinek break; 7349ee519a1fSgjelinek if (cur == NULL) { 7350ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 7351ee519a1fSgjelinek return (Z_NO_ENTRY); 7352ee519a1fSgjelinek } 7353ee519a1fSgjelinek 7354ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_devperm_name, 7355ee519a1fSgjelinek sizeof (tabptr->zone_devperm_name))) != Z_OK) { 7356ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 7357ee519a1fSgjelinek return (err); 7358ee519a1fSgjelinek } 7359ee519a1fSgjelinek 7360ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_UID, buf, sizeof (buf))) != Z_OK) { 7361ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 7362ee519a1fSgjelinek return (err); 7363ee519a1fSgjelinek } 7364ee519a1fSgjelinek tabptr->zone_devperm_uid = (uid_t)atol(buf); 7365ee519a1fSgjelinek 7366ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_GID, buf, sizeof (buf))) != Z_OK) { 7367ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 7368ee519a1fSgjelinek return (err); 7369ee519a1fSgjelinek } 7370ee519a1fSgjelinek tabptr->zone_devperm_gid = (gid_t)atol(buf); 7371ee519a1fSgjelinek 7372ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_MODE, buf, sizeof (buf))) != Z_OK) { 7373ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 7374ee519a1fSgjelinek return (err); 7375ee519a1fSgjelinek } 7376ee519a1fSgjelinek tabptr->zone_devperm_mode = (mode_t)strtol(buf, (char **)NULL, 8); 7377ee519a1fSgjelinek 7378ee519a1fSgjelinek if ((err = fetch_alloc_prop(cur, DTD_ATTR_ACL, 7379ee519a1fSgjelinek &(tabptr->zone_devperm_acl))) != Z_OK) { 7380ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 7381ee519a1fSgjelinek return (err); 7382ee519a1fSgjelinek } 7383ee519a1fSgjelinek 7384ee519a1fSgjelinek handle->zone_dh_cur = cur->next; 7385ee519a1fSgjelinek return (Z_OK); 7386ee519a1fSgjelinek } 7387ee519a1fSgjelinek 7388ee519a1fSgjelinek int 7389ee519a1fSgjelinek zonecfg_enddevperment(zone_dochandle_t handle) 7390ee519a1fSgjelinek { 7391ee519a1fSgjelinek return (zonecfg_endent(handle)); 7392ee519a1fSgjelinek } 7393ee519a1fSgjelinek 7394ff17c8bfSgjelinek /* PRINTFLIKE1 */ 7395ff17c8bfSgjelinek static void 7396ff17c8bfSgjelinek zerror(const char *zone_name, const char *fmt, ...) 739739935be5Sgjelinek { 7398ff17c8bfSgjelinek va_list alist; 739939935be5Sgjelinek 7400ff17c8bfSgjelinek va_start(alist, fmt); 7401ff17c8bfSgjelinek (void) fprintf(stderr, "zone '%s': ", zone_name); 7402ff17c8bfSgjelinek (void) vfprintf(stderr, fmt, alist); 7403ff17c8bfSgjelinek (void) fprintf(stderr, "\n"); 7404ff17c8bfSgjelinek va_end(alist); 7405ee519a1fSgjelinek } 7406ee519a1fSgjelinek 7407ee519a1fSgjelinek static void 7408ff17c8bfSgjelinek zperror(const char *str) 7409ee519a1fSgjelinek { 7410ff17c8bfSgjelinek (void) fprintf(stderr, "%s: %s\n", str, strerror(errno)); 7411ee519a1fSgjelinek } 7412ee519a1fSgjelinek 7413ee519a1fSgjelinek /* 7414ff17c8bfSgjelinek * The following three routines implement a simple locking mechanism to 7415ff17c8bfSgjelinek * ensure that only one instance of zoneadm at a time is able to manipulate 7416ff17c8bfSgjelinek * a given zone. The lock is built on top of an fcntl(2) lock of 7417ff17c8bfSgjelinek * [<altroot>]/var/run/zones/<zonename>.zoneadm.lock. If a zoneadm instance 7418ff17c8bfSgjelinek * can grab that lock, it is allowed to manipulate the zone. 7419ff17c8bfSgjelinek * 7420ff17c8bfSgjelinek * Since zoneadm may call external applications which in turn invoke 7421ff17c8bfSgjelinek * zoneadm again, we introduce the notion of "lock inheritance". Any 7422ff17c8bfSgjelinek * instance of zoneadm that has another instance in its ancestry is assumed 7423ff17c8bfSgjelinek * to be acting on behalf of the original zoneadm, and is thus allowed to 7424ff17c8bfSgjelinek * manipulate its zone. 7425ff17c8bfSgjelinek * 7426ff17c8bfSgjelinek * This inheritance is implemented via the _ZONEADM_LOCK_HELD environment 7427ff17c8bfSgjelinek * variable. When zoneadm is granted a lock on its zone, this environment 7428ff17c8bfSgjelinek * variable is set to 1. When it releases the lock, the variable is set to 7429ff17c8bfSgjelinek * 0. Since a child process inherits its parent's environment, checking 7430ff17c8bfSgjelinek * the state of this variable indicates whether or not any ancestor owns 7431ff17c8bfSgjelinek * the lock. 743239935be5Sgjelinek */ 7433ff17c8bfSgjelinek void 7434ff17c8bfSgjelinek zonecfg_init_lock_file(const char *zone_name, char **lock_env) 743539935be5Sgjelinek { 7436ff17c8bfSgjelinek *lock_env = getenv(LOCK_ENV_VAR); 7437ff17c8bfSgjelinek if (*lock_env == NULL) { 7438ff17c8bfSgjelinek if (putenv(zoneadm_lock_not_held) != 0) { 7439ff17c8bfSgjelinek zerror(zone_name, gettext("could not set env: %s"), 7440ff17c8bfSgjelinek strerror(errno)); 7441ff17c8bfSgjelinek exit(1); 7442ff17c8bfSgjelinek } 744339935be5Sgjelinek } else { 7444ff17c8bfSgjelinek if (atoi(*lock_env) == 1) 7445ff17c8bfSgjelinek zone_lock_cnt = 1; 744639935be5Sgjelinek } 744739935be5Sgjelinek } 744839935be5Sgjelinek 7449ff17c8bfSgjelinek void 7450ff17c8bfSgjelinek zonecfg_release_lock_file(const char *zone_name, int lockfd) 7451ff17c8bfSgjelinek { 7452ff17c8bfSgjelinek /* 7453ff17c8bfSgjelinek * If we are cleaning up from a failed attempt to lock the zone for 7454ff17c8bfSgjelinek * the first time, we might have a zone_lock_cnt of 0. In that 7455ff17c8bfSgjelinek * error case, we don't want to do anything but close the lock 7456ff17c8bfSgjelinek * file. 7457ff17c8bfSgjelinek */ 7458ff17c8bfSgjelinek assert(zone_lock_cnt >= 0); 7459ff17c8bfSgjelinek if (zone_lock_cnt > 0) { 7460ff17c8bfSgjelinek assert(getenv(LOCK_ENV_VAR) != NULL); 7461ff17c8bfSgjelinek assert(atoi(getenv(LOCK_ENV_VAR)) == 1); 7462ff17c8bfSgjelinek if (--zone_lock_cnt > 0) { 7463ff17c8bfSgjelinek assert(lockfd == -1); 7464ff17c8bfSgjelinek return; 746539935be5Sgjelinek } 7466ff17c8bfSgjelinek if (putenv(zoneadm_lock_not_held) != 0) { 7467ff17c8bfSgjelinek zerror(zone_name, gettext("could not set env: %s"), 7468ff17c8bfSgjelinek strerror(errno)); 7469ff17c8bfSgjelinek exit(1); 7470ff17c8bfSgjelinek } 7471ff17c8bfSgjelinek } 7472ff17c8bfSgjelinek assert(lockfd >= 0); 7473ff17c8bfSgjelinek (void) close(lockfd); 747439935be5Sgjelinek } 747539935be5Sgjelinek 7476ff17c8bfSgjelinek int 7477ff17c8bfSgjelinek zonecfg_grab_lock_file(const char *zone_name, int *lockfd) 7478ff17c8bfSgjelinek { 7479ff17c8bfSgjelinek char pathbuf[PATH_MAX]; 7480ff17c8bfSgjelinek struct flock flock; 7481ff17c8bfSgjelinek 7482ff17c8bfSgjelinek /* 7483ff17c8bfSgjelinek * If we already have the lock, we can skip this expensive song 7484ff17c8bfSgjelinek * and dance. 7485ff17c8bfSgjelinek */ 7486ff17c8bfSgjelinek assert(zone_lock_cnt >= 0); 7487ff17c8bfSgjelinek assert(getenv(LOCK_ENV_VAR) != NULL); 7488ff17c8bfSgjelinek if (zone_lock_cnt > 0) { 7489ff17c8bfSgjelinek assert(atoi(getenv(LOCK_ENV_VAR)) == 1); 7490ff17c8bfSgjelinek zone_lock_cnt++; 7491ff17c8bfSgjelinek *lockfd = -1; 749239935be5Sgjelinek return (Z_OK); 749339935be5Sgjelinek } 7494ff17c8bfSgjelinek assert(getenv(LOCK_ENV_VAR) != NULL); 7495ff17c8bfSgjelinek assert(atoi(getenv(LOCK_ENV_VAR)) == 0); 749639935be5Sgjelinek 7497ff17c8bfSgjelinek if (snprintf(pathbuf, sizeof (pathbuf), "%s%s", zonecfg_get_root(), 7498ff17c8bfSgjelinek ZONES_TMPDIR) >= sizeof (pathbuf)) { 7499ff17c8bfSgjelinek zerror(zone_name, gettext("alternate root path is too long")); 750039935be5Sgjelinek return (-1); 750139935be5Sgjelinek } 7502ff17c8bfSgjelinek if (mkdir(pathbuf, S_IRWXU) < 0 && errno != EEXIST) { 7503ff17c8bfSgjelinek zerror(zone_name, gettext("could not mkdir %s: %s"), pathbuf, 7504ff17c8bfSgjelinek strerror(errno)); 7505ff17c8bfSgjelinek return (-1); 7506ff17c8bfSgjelinek } 7507ff17c8bfSgjelinek (void) chmod(pathbuf, S_IRWXU); 750839935be5Sgjelinek 750939935be5Sgjelinek /* 7510ff17c8bfSgjelinek * One of these lock files is created for each zone (when needed). 7511ff17c8bfSgjelinek * The lock files are not cleaned up (except on system reboot), 7512ff17c8bfSgjelinek * but since there is only one per zone, there is no resource 7513ff17c8bfSgjelinek * starvation issue. 751439935be5Sgjelinek */ 7515ff17c8bfSgjelinek if (snprintf(pathbuf, sizeof (pathbuf), "%s%s/%s.zoneadm.lock", 7516ff17c8bfSgjelinek zonecfg_get_root(), ZONES_TMPDIR, zone_name) >= sizeof (pathbuf)) { 7517ff17c8bfSgjelinek zerror(zone_name, gettext("alternate root path is too long")); 7518ff17c8bfSgjelinek return (-1); 7519ff17c8bfSgjelinek } 7520ff17c8bfSgjelinek if ((*lockfd = open(pathbuf, O_RDWR|O_CREAT, S_IRUSR|S_IWUSR)) < 0) { 7521ff17c8bfSgjelinek zerror(zone_name, gettext("could not open %s: %s"), pathbuf, 7522ff17c8bfSgjelinek strerror(errno)); 7523ff17c8bfSgjelinek return (-1); 7524ff17c8bfSgjelinek } 7525ff17c8bfSgjelinek /* 7526ff17c8bfSgjelinek * Lock the file to synchronize with other zoneadmds 7527ff17c8bfSgjelinek */ 7528ff17c8bfSgjelinek flock.l_type = F_WRLCK; 7529ff17c8bfSgjelinek flock.l_whence = SEEK_SET; 7530ff17c8bfSgjelinek flock.l_start = (off_t)0; 7531ff17c8bfSgjelinek flock.l_len = (off_t)0; 7532ff17c8bfSgjelinek if ((fcntl(*lockfd, F_SETLKW, &flock) < 0) || 7533ff17c8bfSgjelinek (putenv(zoneadm_lock_held) != 0)) { 7534ff17c8bfSgjelinek zerror(zone_name, gettext("unable to lock %s: %s"), pathbuf, 7535ff17c8bfSgjelinek strerror(errno)); 7536ff17c8bfSgjelinek zonecfg_release_lock_file(zone_name, *lockfd); 7537ff17c8bfSgjelinek return (-1); 7538ff17c8bfSgjelinek } 7539ff17c8bfSgjelinek zone_lock_cnt = 1; 7540ff17c8bfSgjelinek return (Z_OK); 7541ff17c8bfSgjelinek } 7542ff17c8bfSgjelinek 7543edfa49ffS boolean_t 7544edfa49ffS zonecfg_lock_file_held(int *lockfd) 7545edfa49ffS { 7546edfa49ffS if (*lockfd >= 0 || zone_lock_cnt > 0) 7547edfa49ffS return (B_TRUE); 7548edfa49ffS return (B_FALSE); 7549edfa49ffS } 7550edfa49ffS 7551ff17c8bfSgjelinek static boolean_t 7552ff17c8bfSgjelinek get_doorname(const char *zone_name, char *buffer) 755339935be5Sgjelinek { 7554ff17c8bfSgjelinek return (snprintf(buffer, PATH_MAX, "%s" ZONE_DOOR_PATH, 7555ff17c8bfSgjelinek zonecfg_get_root(), zone_name) < PATH_MAX); 7556e66285fdSgjelinek } 7557ee519a1fSgjelinek 7558ee519a1fSgjelinek /* 7559ff17c8bfSgjelinek * system daemons are not audited. For the global zone, this occurs 7560ff17c8bfSgjelinek * "naturally" since init is started with the default audit 7561ff17c8bfSgjelinek * characteristics. Since zoneadmd is a system daemon and it starts 7562ff17c8bfSgjelinek * init for a zone, it is necessary to clear out the audit 7563ff17c8bfSgjelinek * characteristics inherited from whomever started zoneadmd. This is 7564ff17c8bfSgjelinek * indicated by the audit id, which is set from the ruid parameter of 7565ff17c8bfSgjelinek * adt_set_user(), below. 7566ee519a1fSgjelinek */ 7567ff17c8bfSgjelinek 7568ff17c8bfSgjelinek static void 7569ff17c8bfSgjelinek prepare_audit_context(const char *zone_name) 7570ff17c8bfSgjelinek { 7571ff17c8bfSgjelinek adt_session_data_t *ah; 7572ff17c8bfSgjelinek char *failure = gettext("audit failure: %s"); 7573ff17c8bfSgjelinek 7574ff17c8bfSgjelinek if (adt_start_session(&ah, NULL, 0)) { 7575ff17c8bfSgjelinek zerror(zone_name, failure, strerror(errno)); 7576ff17c8bfSgjelinek return; 7577ff17c8bfSgjelinek } 7578ff17c8bfSgjelinek if (adt_set_user(ah, ADT_NO_AUDIT, ADT_NO_AUDIT, 7579ff17c8bfSgjelinek ADT_NO_AUDIT, ADT_NO_AUDIT, NULL, ADT_NEW)) { 7580ff17c8bfSgjelinek zerror(zone_name, failure, strerror(errno)); 7581ff17c8bfSgjelinek (void) adt_end_session(ah); 7582ff17c8bfSgjelinek return; 7583ff17c8bfSgjelinek } 7584ff17c8bfSgjelinek if (adt_set_proc(ah)) 7585ff17c8bfSgjelinek zerror(zone_name, failure, strerror(errno)); 7586ff17c8bfSgjelinek 7587ff17c8bfSgjelinek (void) adt_end_session(ah); 7588ff17c8bfSgjelinek } 7589ff17c8bfSgjelinek 7590ff17c8bfSgjelinek static int 7591ff17c8bfSgjelinek start_zoneadmd(const char *zone_name, boolean_t lock) 7592ff17c8bfSgjelinek { 7593ff17c8bfSgjelinek char doorpath[PATH_MAX]; 7594ff17c8bfSgjelinek pid_t child_pid; 7595ff17c8bfSgjelinek int error = -1; 7596ff17c8bfSgjelinek int doorfd, lockfd; 7597ff17c8bfSgjelinek struct door_info info; 7598ff17c8bfSgjelinek 7599ff17c8bfSgjelinek if (!get_doorname(zone_name, doorpath)) 7600ff17c8bfSgjelinek return (-1); 7601ff17c8bfSgjelinek 7602ff17c8bfSgjelinek if (lock) 7603ff17c8bfSgjelinek if (zonecfg_grab_lock_file(zone_name, &lockfd) != Z_OK) 7604ff17c8bfSgjelinek return (-1); 7605ff17c8bfSgjelinek 7606ff17c8bfSgjelinek /* 7607ff17c8bfSgjelinek * Now that we have the lock, re-confirm that the daemon is 7608ff17c8bfSgjelinek * *not* up and working fine. If it is still down, we have a green 7609ff17c8bfSgjelinek * light to start it. 7610ff17c8bfSgjelinek */ 7611ff17c8bfSgjelinek if ((doorfd = open(doorpath, O_RDONLY)) < 0) { 7612ff17c8bfSgjelinek if (errno != ENOENT) { 7613ff17c8bfSgjelinek zperror(doorpath); 7614ff17c8bfSgjelinek goto out; 7615ff17c8bfSgjelinek } 7616ff17c8bfSgjelinek } else { 7617ff17c8bfSgjelinek if (door_info(doorfd, &info) == 0 && 7618ff17c8bfSgjelinek ((info.di_attributes & DOOR_REVOKED) == 0)) { 7619ff17c8bfSgjelinek error = Z_OK; 7620ff17c8bfSgjelinek (void) close(doorfd); 7621ff17c8bfSgjelinek goto out; 7622ff17c8bfSgjelinek } 7623ff17c8bfSgjelinek (void) close(doorfd); 7624ff17c8bfSgjelinek } 7625ff17c8bfSgjelinek 7626ff17c8bfSgjelinek if ((child_pid = fork()) == -1) { 7627ff17c8bfSgjelinek zperror(gettext("could not fork")); 7628ff17c8bfSgjelinek goto out; 7629ff17c8bfSgjelinek } 7630ff17c8bfSgjelinek 7631ff17c8bfSgjelinek if (child_pid == 0) { 7632ff17c8bfSgjelinek const char *argv[6], **ap; 7633ff17c8bfSgjelinek 7634ff17c8bfSgjelinek /* child process */ 7635ff17c8bfSgjelinek prepare_audit_context(zone_name); 7636ff17c8bfSgjelinek 7637ff17c8bfSgjelinek ap = argv; 7638ff17c8bfSgjelinek *ap++ = "zoneadmd"; 7639ff17c8bfSgjelinek *ap++ = "-z"; 7640ff17c8bfSgjelinek *ap++ = zone_name; 7641ff17c8bfSgjelinek if (zonecfg_in_alt_root()) { 7642ff17c8bfSgjelinek *ap++ = "-R"; 7643ff17c8bfSgjelinek *ap++ = zonecfg_get_root(); 7644ff17c8bfSgjelinek } 7645ff17c8bfSgjelinek *ap = NULL; 7646ff17c8bfSgjelinek 7647ff17c8bfSgjelinek (void) execv("/usr/lib/zones/zoneadmd", (char * const *)argv); 7648ff17c8bfSgjelinek /* 7649ff17c8bfSgjelinek * TRANSLATION_NOTE 7650ff17c8bfSgjelinek * zoneadmd is a literal that should not be translated. 7651ff17c8bfSgjelinek */ 7652ff17c8bfSgjelinek zperror(gettext("could not exec zoneadmd")); 7653ff17c8bfSgjelinek _exit(1); 7654ff17c8bfSgjelinek } else { 7655ff17c8bfSgjelinek /* parent process */ 7656ff17c8bfSgjelinek pid_t retval; 7657ff17c8bfSgjelinek int pstatus = 0; 7658ee519a1fSgjelinek 7659ee519a1fSgjelinek do { 7660ff17c8bfSgjelinek retval = waitpid(child_pid, &pstatus, 0); 7661ff17c8bfSgjelinek } while (retval != child_pid); 7662ff17c8bfSgjelinek if (WIFSIGNALED(pstatus) || (WIFEXITED(pstatus) && 7663ff17c8bfSgjelinek WEXITSTATUS(pstatus) != 0)) { 7664ff17c8bfSgjelinek zerror(zone_name, gettext("could not start %s"), 7665ff17c8bfSgjelinek "zoneadmd"); 7666ff17c8bfSgjelinek goto out; 76676cfd72c6Sgjelinek } 76686cfd72c6Sgjelinek } 7669ff17c8bfSgjelinek error = Z_OK; 7670ff17c8bfSgjelinek out: 7671ff17c8bfSgjelinek if (lock) 7672ff17c8bfSgjelinek zonecfg_release_lock_file(zone_name, lockfd); 7673ff17c8bfSgjelinek return (error); 7674ee519a1fSgjelinek } 7675ee519a1fSgjelinek 7676ee519a1fSgjelinek int 7677ff17c8bfSgjelinek zonecfg_ping_zoneadmd(const char *zone_name) 7678ee519a1fSgjelinek { 7679ff17c8bfSgjelinek char doorpath[PATH_MAX]; 7680ff17c8bfSgjelinek int doorfd; 7681ff17c8bfSgjelinek struct door_info info; 7682ee519a1fSgjelinek 7683ff17c8bfSgjelinek if (!get_doorname(zone_name, doorpath)) 7684ff17c8bfSgjelinek return (-1); 7685ee519a1fSgjelinek 7686ff17c8bfSgjelinek if ((doorfd = open(doorpath, O_RDONLY)) < 0) { 7687ff17c8bfSgjelinek return (-1); 7688ff17c8bfSgjelinek } 7689ff17c8bfSgjelinek if (door_info(doorfd, &info) == 0 && 7690ff17c8bfSgjelinek ((info.di_attributes & DOOR_REVOKED) == 0)) { 7691ff17c8bfSgjelinek (void) close(doorfd); 7692ff17c8bfSgjelinek return (Z_OK); 7693ff17c8bfSgjelinek } 7694ff17c8bfSgjelinek (void) close(doorfd); 7695ff17c8bfSgjelinek return (-1); 7696ff17c8bfSgjelinek } 7697ee519a1fSgjelinek 7698ff17c8bfSgjelinek int 7699ff17c8bfSgjelinek zonecfg_call_zoneadmd(const char *zone_name, zone_cmd_arg_t *arg, char *locale, 7700ff17c8bfSgjelinek boolean_t lock) 7701ff17c8bfSgjelinek { 7702ff17c8bfSgjelinek char doorpath[PATH_MAX]; 7703ff17c8bfSgjelinek int doorfd, result; 7704ff17c8bfSgjelinek door_arg_t darg; 7705ff17c8bfSgjelinek 7706ff17c8bfSgjelinek zoneid_t zoneid; 7707ff17c8bfSgjelinek uint64_t uniqid = 0; 7708ff17c8bfSgjelinek 7709ff17c8bfSgjelinek zone_cmd_rval_t *rvalp; 7710ff17c8bfSgjelinek size_t rlen; 7711ff17c8bfSgjelinek char *cp, *errbuf; 7712ff17c8bfSgjelinek 7713ff17c8bfSgjelinek rlen = getpagesize(); 7714ff17c8bfSgjelinek if ((rvalp = malloc(rlen)) == NULL) { 7715ff17c8bfSgjelinek zerror(zone_name, gettext("failed to allocate %lu bytes: %s"), 7716ff17c8bfSgjelinek rlen, strerror(errno)); 7717ff17c8bfSgjelinek return (-1); 7718ff17c8bfSgjelinek } 7719ff17c8bfSgjelinek 7720ff17c8bfSgjelinek if ((zoneid = getzoneidbyname(zone_name)) != ZONE_ID_UNDEFINED) { 7721ff17c8bfSgjelinek (void) zone_getattr(zoneid, ZONE_ATTR_UNIQID, &uniqid, 7722ff17c8bfSgjelinek sizeof (uniqid)); 7723ff17c8bfSgjelinek } 7724ff17c8bfSgjelinek arg->uniqid = uniqid; 7725ff17c8bfSgjelinek (void) strlcpy(arg->locale, locale, sizeof (arg->locale)); 7726ff17c8bfSgjelinek if (!get_doorname(zone_name, doorpath)) { 7727ff17c8bfSgjelinek zerror(zone_name, gettext("alternate root path is too long")); 7728ff17c8bfSgjelinek free(rvalp); 7729ff17c8bfSgjelinek return (-1); 7730ff17c8bfSgjelinek } 7731ff17c8bfSgjelinek 7732ff17c8bfSgjelinek /* 7733ff17c8bfSgjelinek * Loop trying to start zoneadmd; if something goes seriously 7734ff17c8bfSgjelinek * wrong we break out and fail. 7735ff17c8bfSgjelinek */ 7736ff17c8bfSgjelinek for (;;) { 7737ff17c8bfSgjelinek if (start_zoneadmd(zone_name, lock) != Z_OK) 7738ff17c8bfSgjelinek break; 7739ff17c8bfSgjelinek 7740ff17c8bfSgjelinek if ((doorfd = open(doorpath, O_RDONLY)) < 0) { 7741ff17c8bfSgjelinek zperror(gettext("failed to open zone door")); 7742ff17c8bfSgjelinek break; 7743ff17c8bfSgjelinek } 7744ff17c8bfSgjelinek 7745ff17c8bfSgjelinek darg.data_ptr = (char *)arg; 7746ff17c8bfSgjelinek darg.data_size = sizeof (*arg); 7747ff17c8bfSgjelinek darg.desc_ptr = NULL; 7748ff17c8bfSgjelinek darg.desc_num = 0; 7749ff17c8bfSgjelinek darg.rbuf = (char *)rvalp; 7750ff17c8bfSgjelinek darg.rsize = rlen; 7751ff17c8bfSgjelinek if (door_call(doorfd, &darg) != 0) { 7752ff17c8bfSgjelinek (void) close(doorfd); 7753ff17c8bfSgjelinek /* 7754ff17c8bfSgjelinek * We'll get EBADF if the door has been revoked. 7755ff17c8bfSgjelinek */ 7756ff17c8bfSgjelinek if (errno != EBADF) { 7757ff17c8bfSgjelinek zperror(gettext("door_call failed")); 7758ff17c8bfSgjelinek break; 7759ff17c8bfSgjelinek } 7760ff17c8bfSgjelinek continue; /* take another lap */ 7761ff17c8bfSgjelinek } 7762ff17c8bfSgjelinek (void) close(doorfd); 7763ff17c8bfSgjelinek 7764ff17c8bfSgjelinek if (darg.data_size == 0) { 7765ff17c8bfSgjelinek /* Door server is going away; kick it again. */ 7766ff17c8bfSgjelinek continue; 7767ff17c8bfSgjelinek } 7768ff17c8bfSgjelinek 7769ff17c8bfSgjelinek errbuf = rvalp->errbuf; 7770ff17c8bfSgjelinek while (*errbuf != '\0') { 7771ff17c8bfSgjelinek /* 7772ff17c8bfSgjelinek * Remove any newlines since zerror() 7773ff17c8bfSgjelinek * will append one automatically. 7774ff17c8bfSgjelinek */ 7775ff17c8bfSgjelinek cp = strchr(errbuf, '\n'); 7776ff17c8bfSgjelinek if (cp != NULL) 7777ff17c8bfSgjelinek *cp = '\0'; 7778ff17c8bfSgjelinek zerror(zone_name, "%s", errbuf); 7779ff17c8bfSgjelinek if (cp == NULL) 7780ff17c8bfSgjelinek break; 7781ff17c8bfSgjelinek errbuf = cp + 1; 7782ff17c8bfSgjelinek } 7783ff17c8bfSgjelinek result = rvalp->rval == 0 ? 0 : -1; 7784ff17c8bfSgjelinek free(rvalp); 7785ff17c8bfSgjelinek return (result); 7786ff17c8bfSgjelinek } 7787ff17c8bfSgjelinek 7788ff17c8bfSgjelinek free(rvalp); 7789ff17c8bfSgjelinek return (-1); 7790ee519a1fSgjelinek } 7791cb8a054bSGlenn Faden 7792cb8a054bSGlenn Faden boolean_t 7793cb8a054bSGlenn Faden zonecfg_valid_auths(const char *auths, const char *zonename) 7794cb8a054bSGlenn Faden { 7795cb8a054bSGlenn Faden char *right; 7796cb8a054bSGlenn Faden char *tmpauths; 7797cb8a054bSGlenn Faden char *lasts; 7798cb8a054bSGlenn Faden char authname[MAXAUTHS]; 7799cb8a054bSGlenn Faden boolean_t status = B_TRUE; 7800cb8a054bSGlenn Faden 7801cb8a054bSGlenn Faden tmpauths = strdup(auths); 7802cb8a054bSGlenn Faden if (tmpauths == NULL) { 7803cb8a054bSGlenn Faden zerror(zonename, gettext("Out of memory")); 7804cb8a054bSGlenn Faden return (B_FALSE); 7805cb8a054bSGlenn Faden } 7806cb8a054bSGlenn Faden right = strtok_r(tmpauths, ",", &lasts); 7807cb8a054bSGlenn Faden while (right != NULL) { 7808cb8a054bSGlenn Faden (void) snprintf(authname, MAXAUTHS, "%s%s", 7809cb8a054bSGlenn Faden ZONE_AUTH_PREFIX, right); 7810cb8a054bSGlenn Faden if (getauthnam(authname) == NULL) { 7811cb8a054bSGlenn Faden status = B_FALSE; 7812a20ee416SGlenn Faden zerror(zonename, 7813a20ee416SGlenn Faden gettext("%s is not a valid authorization"), 7814cb8a054bSGlenn Faden right); 7815cb8a054bSGlenn Faden } 7816cb8a054bSGlenn Faden right = strtok_r(NULL, ",", &lasts); 7817cb8a054bSGlenn Faden } 7818cb8a054bSGlenn Faden free(tmpauths); 7819cb8a054bSGlenn Faden return (status); 7820cb8a054bSGlenn Faden } 7821cb8a054bSGlenn Faden 7822cb8a054bSGlenn Faden int 7823cb8a054bSGlenn Faden zonecfg_delete_admins(zone_dochandle_t handle, char *zonename) 7824cb8a054bSGlenn Faden { 7825cb8a054bSGlenn Faden int err; 7826cb8a054bSGlenn Faden struct zone_admintab admintab; 7827cb8a054bSGlenn Faden boolean_t changed = B_FALSE; 7828cb8a054bSGlenn Faden 7829cb8a054bSGlenn Faden if ((err = zonecfg_setadminent(handle)) != Z_OK) { 7830cb8a054bSGlenn Faden return (err); 7831cb8a054bSGlenn Faden } 7832cb8a054bSGlenn Faden while (zonecfg_getadminent(handle, &admintab) == Z_OK) { 7833cb8a054bSGlenn Faden err = zonecfg_delete_admin(handle, &admintab, 7834cb8a054bSGlenn Faden zonename); 7835cb8a054bSGlenn Faden if (err != Z_OK) { 7836cb8a054bSGlenn Faden (void) zonecfg_endadminent(handle); 7837cb8a054bSGlenn Faden return (err); 7838cb8a054bSGlenn Faden } else { 7839cb8a054bSGlenn Faden changed = B_TRUE; 7840cb8a054bSGlenn Faden } 7841cb8a054bSGlenn Faden if ((err = zonecfg_setadminent(handle)) != Z_OK) { 7842cb8a054bSGlenn Faden return (err); 7843cb8a054bSGlenn Faden } 7844cb8a054bSGlenn Faden } 7845cb8a054bSGlenn Faden (void) zonecfg_endadminent(handle); 7846cb8a054bSGlenn Faden return (changed? Z_OK:Z_NO_ENTRY); 7847cb8a054bSGlenn Faden } 7848cb8a054bSGlenn Faden 7849cb8a054bSGlenn Faden /* 7850cb8a054bSGlenn Faden * Checks if a long authorization applies to this zone. 7851cb8a054bSGlenn Faden * If so, it returns true, after destructively stripping 7852cb8a054bSGlenn Faden * the authorization of its prefix and zone suffix. 7853cb8a054bSGlenn Faden */ 7854cb8a054bSGlenn Faden static boolean_t 7855cb8a054bSGlenn Faden is_zone_auth(char **auth, char *zonename, char *oldzonename) 7856cb8a054bSGlenn Faden { 7857cb8a054bSGlenn Faden char *suffix; 7858cb8a054bSGlenn Faden size_t offset; 7859cb8a054bSGlenn Faden 7860cb8a054bSGlenn Faden offset = strlen(ZONE_AUTH_PREFIX); 7861cb8a054bSGlenn Faden if ((strncmp(*auth, ZONE_AUTH_PREFIX, offset) == 0) && 7862cb8a054bSGlenn Faden ((suffix = strchr(*auth, '/')) != NULL)) { 7863cb8a054bSGlenn Faden if (strncmp(suffix + 1, zonename, strlen(zonename)) == 0) { 7864cb8a054bSGlenn Faden *auth += offset; 7865cb8a054bSGlenn Faden suffix[0] = '\0'; 7866cb8a054bSGlenn Faden return (B_TRUE); 7867cb8a054bSGlenn Faden } else if ((oldzonename != NULL) && 7868cb8a054bSGlenn Faden (strncmp(suffix + 1, oldzonename, 7869cb8a054bSGlenn Faden strlen(oldzonename)) == 0)) { 7870cb8a054bSGlenn Faden *auth += offset; 7871cb8a054bSGlenn Faden suffix[0] = '\0'; 7872cb8a054bSGlenn Faden return (B_TRUE); 7873cb8a054bSGlenn Faden } 7874cb8a054bSGlenn Faden } 7875cb8a054bSGlenn Faden return (B_FALSE); 7876cb8a054bSGlenn Faden } 7877cb8a054bSGlenn Faden 7878cb8a054bSGlenn Faden /* 7879cb8a054bSGlenn Faden * This function determines whether the zone-specific authorization 7880cb8a054bSGlenn Faden * assignments in /etc/user_attr have been changed more recently 7881cb8a054bSGlenn Faden * than the equivalent data stored in the zone's configuration file. 7882cb8a054bSGlenn Faden * This should only happen if the zone-specific authorizations in 7883cb8a054bSGlenn Faden * the user_attr file were modified using a tool other than zonecfg. 7884cb8a054bSGlenn Faden * If the configuration file is out-of-date with respect to these 7885cb8a054bSGlenn Faden * authorization assignments, it is updated to match those specified 7886cb8a054bSGlenn Faden * in /etc/user_attr. 7887cb8a054bSGlenn Faden */ 7888cb8a054bSGlenn Faden 7889cb8a054bSGlenn Faden int 7890cb8a054bSGlenn Faden zonecfg_update_userauths(zone_dochandle_t handle, char *zonename) 7891cb8a054bSGlenn Faden { 7892cb8a054bSGlenn Faden userattr_t *ua_ptr; 7893cb8a054bSGlenn Faden char *authlist; 7894cb8a054bSGlenn Faden char *lasts; 7895cb8a054bSGlenn Faden FILE *uaf; 7896cb8a054bSGlenn Faden struct zone_admintab admintab; 7897cb8a054bSGlenn Faden struct stat config_st, ua_st; 7898cb8a054bSGlenn Faden char config_file[MAXPATHLEN]; 7899cb8a054bSGlenn Faden boolean_t changed = B_FALSE; 7900cb8a054bSGlenn Faden int err; 7901cb8a054bSGlenn Faden 7902cb8a054bSGlenn Faden if ((uaf = fopen(USERATTR_FILENAME, "r")) == NULL) { 7903cb8a054bSGlenn Faden zerror(zonename, gettext("could not open file %s: %s"), 7904cb8a054bSGlenn Faden USERATTR_FILENAME, strerror(errno)); 7905cb8a054bSGlenn Faden if (errno == EACCES) 7906cb8a054bSGlenn Faden return (Z_ACCES); 7907cb8a054bSGlenn Faden if (errno == ENOENT) 7908cb8a054bSGlenn Faden return (Z_NO_ZONE); 7909cb8a054bSGlenn Faden return (Z_MISC_FS); 7910cb8a054bSGlenn Faden } 7911cb8a054bSGlenn Faden if ((err = fstat(fileno(uaf), &ua_st)) != 0) { 7912cb8a054bSGlenn Faden zerror(zonename, gettext("could not stat file %s: %s"), 7913cb8a054bSGlenn Faden USERATTR_FILENAME, strerror(errno)); 7914cb8a054bSGlenn Faden (void) fclose(uaf); 7915cb8a054bSGlenn Faden return (Z_MISC_FS); 7916cb8a054bSGlenn Faden } 7917cb8a054bSGlenn Faden if (!config_file_path(zonename, config_file)) { 7918cb8a054bSGlenn Faden (void) fclose(uaf); 7919cb8a054bSGlenn Faden return (Z_MISC_FS); 7920cb8a054bSGlenn Faden } 7921cb8a054bSGlenn Faden 7922cb8a054bSGlenn Faden if ((err = stat(config_file, &config_st)) != 0) { 7923cb8a054bSGlenn Faden zerror(zonename, gettext("could not stat file %s: %s"), 7924cb8a054bSGlenn Faden config_file, strerror(errno)); 7925cb8a054bSGlenn Faden (void) fclose(uaf); 7926cb8a054bSGlenn Faden return (Z_MISC_FS); 7927cb8a054bSGlenn Faden } 7928cb8a054bSGlenn Faden if (config_st.st_mtime >= ua_st.st_mtime) { 7929cb8a054bSGlenn Faden (void) fclose(uaf); 7930cb8a054bSGlenn Faden return (Z_NO_ENTRY); 7931cb8a054bSGlenn Faden } 7932cb8a054bSGlenn Faden if ((err = zonecfg_delete_admins(handle, zonename)) == Z_OK) { 7933cb8a054bSGlenn Faden changed = B_TRUE; 7934cb8a054bSGlenn Faden } else if (err != Z_NO_ENTRY) { 7935cb8a054bSGlenn Faden (void) fclose(uaf); 7936cb8a054bSGlenn Faden return (err); 7937cb8a054bSGlenn Faden } 7938cb8a054bSGlenn Faden while ((ua_ptr = fgetuserattr(uaf)) != NULL) { 7939cb8a054bSGlenn Faden if (ua_ptr->name[0] == '#') { 7940cb8a054bSGlenn Faden continue; 7941cb8a054bSGlenn Faden } 7942cb8a054bSGlenn Faden authlist = kva_match(ua_ptr->attr, USERATTR_AUTHS_KW); 7943cb8a054bSGlenn Faden if (authlist != NULL) { 7944cb8a054bSGlenn Faden char *cur_auth; 7945cb8a054bSGlenn Faden boolean_t first; 7946cb8a054bSGlenn Faden 7947cb8a054bSGlenn Faden first = B_TRUE; 7948cb8a054bSGlenn Faden bzero(&admintab.zone_admin_auths, MAXAUTHS); 7949cb8a054bSGlenn Faden cur_auth = strtok_r(authlist, ",", &lasts); 7950cb8a054bSGlenn Faden while (cur_auth != NULL) { 7951cb8a054bSGlenn Faden if (is_zone_auth(&cur_auth, zonename, 7952cb8a054bSGlenn Faden NULL)) { 7953cb8a054bSGlenn Faden /* 7954cb8a054bSGlenn Faden * Add auths for this zone 7955cb8a054bSGlenn Faden */ 7956cb8a054bSGlenn Faden if (first) { 7957cb8a054bSGlenn Faden first = B_FALSE; 7958cb8a054bSGlenn Faden } else { 7959cb8a054bSGlenn Faden (void) strlcat( 7960cb8a054bSGlenn Faden admintab.zone_admin_auths, 7961cb8a054bSGlenn Faden ",", MAXAUTHS); 7962cb8a054bSGlenn Faden } 7963cb8a054bSGlenn Faden (void) strlcat( 7964cb8a054bSGlenn Faden admintab.zone_admin_auths, 7965cb8a054bSGlenn Faden cur_auth, MAXAUTHS); 7966cb8a054bSGlenn Faden } 7967cb8a054bSGlenn Faden cur_auth = strtok_r(NULL, ",", &lasts); 7968cb8a054bSGlenn Faden } 7969cb8a054bSGlenn Faden if (!first) { 7970cb8a054bSGlenn Faden /* 7971cb8a054bSGlenn Faden * Add this right to config file 7972cb8a054bSGlenn Faden */ 7973cb8a054bSGlenn Faden (void) strlcpy(admintab.zone_admin_user, 7974cb8a054bSGlenn Faden ua_ptr->name, 7975cb8a054bSGlenn Faden sizeof (admintab.zone_admin_user)); 7976cb8a054bSGlenn Faden err = zonecfg_add_admin(handle, 7977cb8a054bSGlenn Faden &admintab, zonename); 7978cb8a054bSGlenn Faden if (err != Z_OK) { 7979cb8a054bSGlenn Faden (void) fclose(uaf); 7980cb8a054bSGlenn Faden return (err); 7981cb8a054bSGlenn Faden } else { 7982cb8a054bSGlenn Faden changed = B_TRUE; 7983cb8a054bSGlenn Faden } 7984cb8a054bSGlenn Faden } 7985cb8a054bSGlenn Faden } 7986cb8a054bSGlenn Faden } /* end-of-while-loop */ 7987cb8a054bSGlenn Faden (void) fclose(uaf); 7988cb8a054bSGlenn Faden return (changed? Z_OK: Z_NO_ENTRY); 7989cb8a054bSGlenn Faden } 7990cb8a054bSGlenn Faden 7991cb8a054bSGlenn Faden static void 7992cb8a054bSGlenn Faden update_profiles(char *rbac_profs, boolean_t add) 7993cb8a054bSGlenn Faden { 7994cb8a054bSGlenn Faden char new_profs[MAXPROFS]; 7995cb8a054bSGlenn Faden char *cur_prof; 7996cb8a054bSGlenn Faden boolean_t first = B_TRUE; 7997cb8a054bSGlenn Faden boolean_t found = B_FALSE; 7998cb8a054bSGlenn Faden char *lasts; 7999cb8a054bSGlenn Faden 8000cb8a054bSGlenn Faden cur_prof = strtok_r(rbac_profs, ",", &lasts); 8001cb8a054bSGlenn Faden while (cur_prof != NULL) { 8002cb8a054bSGlenn Faden if (strcmp(cur_prof, ZONE_MGMT_PROF) == 0) { 8003cb8a054bSGlenn Faden found = B_TRUE; 8004cb8a054bSGlenn Faden if (!add) { 8005cb8a054bSGlenn Faden cur_prof = strtok_r(NULL, ",", &lasts); 8006cb8a054bSGlenn Faden continue; 8007cb8a054bSGlenn Faden } 8008cb8a054bSGlenn Faden } 8009cb8a054bSGlenn Faden if (first) { 8010cb8a054bSGlenn Faden first = B_FALSE; 8011cb8a054bSGlenn Faden } else { 8012cb8a054bSGlenn Faden (void) strlcat(new_profs, ",", 8013cb8a054bSGlenn Faden MAXPROFS); 8014cb8a054bSGlenn Faden } 8015cb8a054bSGlenn Faden (void) strlcat(new_profs, cur_prof, 8016cb8a054bSGlenn Faden MAXPROFS); 8017cb8a054bSGlenn Faden cur_prof = strtok_r(NULL, ",", &lasts); 8018cb8a054bSGlenn Faden } 8019cb8a054bSGlenn Faden /* 8020cb8a054bSGlenn Faden * Now prepend the Zone Management profile at the beginning 8021cb8a054bSGlenn Faden * of the list if it is needed, and append the rest. 8022cb8a054bSGlenn Faden * Return the updated list in the original buffer. 8023cb8a054bSGlenn Faden */ 8024cb8a054bSGlenn Faden if (add && !found) { 8025cb8a054bSGlenn Faden first = B_FALSE; 8026cb8a054bSGlenn Faden (void) strlcpy(rbac_profs, ZONE_MGMT_PROF, MAXPROFS); 8027cb8a054bSGlenn Faden } else { 8028cb8a054bSGlenn Faden first = B_TRUE; 8029cb8a054bSGlenn Faden rbac_profs[0] = '\0'; 8030cb8a054bSGlenn Faden } 8031cb8a054bSGlenn Faden if (strlen(new_profs) > 0) { 8032cb8a054bSGlenn Faden if (!first) 8033cb8a054bSGlenn Faden (void) strlcat(rbac_profs, ",", MAXPROFS); 8034cb8a054bSGlenn Faden (void) strlcat(rbac_profs, new_profs, MAXPROFS); 8035cb8a054bSGlenn Faden } 8036cb8a054bSGlenn Faden } 8037cb8a054bSGlenn Faden 8038cb8a054bSGlenn Faden #define MAX_CMD_LEN 1024 8039cb8a054bSGlenn Faden 8040cb8a054bSGlenn Faden static int 8041cb8a054bSGlenn Faden do_subproc(char *zonename, char *cmdbuf) 8042cb8a054bSGlenn Faden { 8043cb8a054bSGlenn Faden char inbuf[MAX_CMD_LEN]; 8044cb8a054bSGlenn Faden FILE *file; 8045cb8a054bSGlenn Faden int status; 8046cb8a054bSGlenn Faden 8047cb8a054bSGlenn Faden file = popen(cmdbuf, "r"); 8048cb8a054bSGlenn Faden if (file == NULL) { 8049cb8a054bSGlenn Faden zerror(zonename, gettext("Could not launch: %s"), cmdbuf); 8050cb8a054bSGlenn Faden return (-1); 8051cb8a054bSGlenn Faden } 8052cb8a054bSGlenn Faden 8053cb8a054bSGlenn Faden while (fgets(inbuf, sizeof (inbuf), file) != NULL) 8054cb8a054bSGlenn Faden (void) fprintf(stderr, "%s", inbuf); 8055cb8a054bSGlenn Faden status = pclose(file); 8056cb8a054bSGlenn Faden 8057cb8a054bSGlenn Faden if (WIFSIGNALED(status)) { 8058cb8a054bSGlenn Faden zerror(zonename, gettext("%s unexpectedly terminated " 8059cb8a054bSGlenn Faden "due to signal %d"), 8060cb8a054bSGlenn Faden cmdbuf, WTERMSIG(status)); 8061cb8a054bSGlenn Faden return (-1); 8062cb8a054bSGlenn Faden } 8063cb8a054bSGlenn Faden assert(WIFEXITED(status)); 8064cb8a054bSGlenn Faden return (WEXITSTATUS(status)); 8065cb8a054bSGlenn Faden } 8066cb8a054bSGlenn Faden 8067cb8a054bSGlenn Faden /* 8068cb8a054bSGlenn Faden * This function updates the local /etc/user_attr file to 8069cb8a054bSGlenn Faden * correspond to the admin settings that are currently being 8070cb8a054bSGlenn Faden * committed. The updates are done via usermod and/or rolemod 8071cb8a054bSGlenn Faden * depending on the type of the specified user. It is also 8072cb8a054bSGlenn Faden * invoked to remove entries from user_attr corresponding to 8073cb8a054bSGlenn Faden * removed admin assignments, using an empty auths string. 8074cb8a054bSGlenn Faden * 8075cb8a054bSGlenn Faden * Because the removed entries are no longer included in the 8076cb8a054bSGlenn Faden * cofiguration that is being committed, a linked list of 8077cb8a054bSGlenn Faden * removed admin entries is maintained to keep track of such 8078cb8a054bSGlenn Faden * transactions. The head of the list is stored in the zone_dh_userauths 8079cb8a054bSGlenn Faden * element of the handle strcture. 8080cb8a054bSGlenn Faden */ 8081cb8a054bSGlenn Faden static int 8082cb8a054bSGlenn Faden zonecfg_authorize_user_impl(zone_dochandle_t handle, char *user, 8083cb8a054bSGlenn Faden char *auths, char *zonename) 8084cb8a054bSGlenn Faden { 8085cb8a054bSGlenn Faden char *right; 8086cb8a054bSGlenn Faden char old_auths[MAXAUTHS]; 8087cb8a054bSGlenn Faden char new_auths[MAXAUTHS]; 8088cb8a054bSGlenn Faden char rbac_profs[MAXPROFS]; 8089cb8a054bSGlenn Faden char *lasts; 8090cb8a054bSGlenn Faden userattr_t *u; 8091cb8a054bSGlenn Faden boolean_t first = B_TRUE; 8092cb8a054bSGlenn Faden boolean_t is_zone_admin = B_FALSE; 8093cb8a054bSGlenn Faden char user_cmd[] = "/usr/sbin/usermod"; 8094cb8a054bSGlenn Faden char role_cmd[] = "/usr/sbin/rolemod"; 8095cb8a054bSGlenn Faden char *auths_cmd = user_cmd; 8096cb8a054bSGlenn Faden 8097cb8a054bSGlenn Faden /* 8098cb8a054bSGlenn Faden * First get the existing authorizations for this user 8099cb8a054bSGlenn Faden */ 8100cb8a054bSGlenn Faden 8101cb8a054bSGlenn Faden bzero(&old_auths, sizeof (old_auths)); 8102cb8a054bSGlenn Faden bzero(&new_auths, sizeof (new_auths)); 8103cb8a054bSGlenn Faden bzero(&rbac_profs, sizeof (rbac_profs)); 8104cb8a054bSGlenn Faden if ((u = getusernam(user)) != NULL) { 8105cb8a054bSGlenn Faden char *current_auths; 8106cb8a054bSGlenn Faden char *current_profs; 8107cb8a054bSGlenn Faden char *type; 8108cb8a054bSGlenn Faden 8109cb8a054bSGlenn Faden type = kva_match(u->attr, USERATTR_TYPE_KW); 8110cb8a054bSGlenn Faden if (type != NULL) { 8111cb8a054bSGlenn Faden if (strcmp(type, USERATTR_TYPE_NONADMIN_KW) == 0) 8112cb8a054bSGlenn Faden auths_cmd = role_cmd; 8113cb8a054bSGlenn Faden } 8114cb8a054bSGlenn Faden 8115cb8a054bSGlenn Faden current_auths = kva_match(u->attr, USERATTR_AUTHS_KW); 8116cb8a054bSGlenn Faden if (current_auths != NULL) { 8117cb8a054bSGlenn Faden char *cur_auth; 8118cb8a054bSGlenn Faden char *delete_name; 8119cb8a054bSGlenn Faden size_t offset; 8120cb8a054bSGlenn Faden 8121cb8a054bSGlenn Faden offset = strlen(ZONE_AUTH_PREFIX); 8122cb8a054bSGlenn Faden 8123cb8a054bSGlenn Faden (void) strlcpy(old_auths, current_auths, MAXAUTHS); 8124cb8a054bSGlenn Faden cur_auth = strtok_r(current_auths, ",", &lasts); 8125cb8a054bSGlenn Faden 8126cb8a054bSGlenn Faden /* 8127cb8a054bSGlenn Faden * Next, remove any existing authorizations 8128cb8a054bSGlenn Faden * for this zone, and determine if the 8129cb8a054bSGlenn Faden * user still needs the Zone Management Profile. 8130cb8a054bSGlenn Faden */ 8131cb8a054bSGlenn Faden if (is_renaming(handle)) 8132cb8a054bSGlenn Faden delete_name = handle->zone_dh_delete_name; 8133cb8a054bSGlenn Faden else 8134cb8a054bSGlenn Faden delete_name = NULL; 8135cb8a054bSGlenn Faden while (cur_auth != NULL) { 8136cb8a054bSGlenn Faden if (!is_zone_auth(&cur_auth, zonename, 8137cb8a054bSGlenn Faden delete_name)) { 8138cb8a054bSGlenn Faden if (first) { 8139cb8a054bSGlenn Faden first = B_FALSE; 8140cb8a054bSGlenn Faden } else { 8141cb8a054bSGlenn Faden (void) strlcat(new_auths, ",", 8142cb8a054bSGlenn Faden MAXAUTHS); 8143cb8a054bSGlenn Faden } 8144cb8a054bSGlenn Faden (void) strlcat(new_auths, cur_auth, 8145cb8a054bSGlenn Faden MAXAUTHS); 8146cb8a054bSGlenn Faden /* 8147cb8a054bSGlenn Faden * If the user has authorizations 8148cb8a054bSGlenn Faden * for other zones, then set a 8149cb8a054bSGlenn Faden * flag indicate that the Zone 8150cb8a054bSGlenn Faden * Management profile should be 8151cb8a054bSGlenn Faden * preserved in user_attr. 8152cb8a054bSGlenn Faden */ 8153cb8a054bSGlenn Faden if (strncmp(cur_auth, 8154cb8a054bSGlenn Faden ZONE_AUTH_PREFIX, offset) == 0) 8155cb8a054bSGlenn Faden is_zone_admin = B_TRUE; 8156cb8a054bSGlenn Faden } 8157cb8a054bSGlenn Faden cur_auth = strtok_r(NULL, ",", &lasts); 8158cb8a054bSGlenn Faden } 8159cb8a054bSGlenn Faden } 8160cb8a054bSGlenn Faden current_profs = kva_match(u->attr, USERATTR_PROFILES_KW); 8161cb8a054bSGlenn Faden if (current_profs != NULL) { 8162cb8a054bSGlenn Faden (void) strlcpy(rbac_profs, current_profs, MAXPROFS); 8163cb8a054bSGlenn Faden } 8164cb8a054bSGlenn Faden free_userattr(u); 8165cb8a054bSGlenn Faden } 8166cb8a054bSGlenn Faden /* 8167cb8a054bSGlenn Faden * The following is done to avoid revisiting the 8168cb8a054bSGlenn Faden * user_attr entry for this user 8169cb8a054bSGlenn Faden */ 8170cb8a054bSGlenn Faden (void) zonecfg_remove_userauths(handle, user, "", B_FALSE); 8171cb8a054bSGlenn Faden 8172cb8a054bSGlenn Faden /* 8173cb8a054bSGlenn Faden * Convert each right into a properly formatted authorization 8174cb8a054bSGlenn Faden */ 8175cb8a054bSGlenn Faden right = strtok_r(auths, ",", &lasts); 8176cb8a054bSGlenn Faden while (right != NULL) { 8177cb8a054bSGlenn Faden char auth[MAXAUTHS]; 8178cb8a054bSGlenn Faden 8179cb8a054bSGlenn Faden (void) snprintf(auth, MAXAUTHS, "%s%s/%s", 8180cb8a054bSGlenn Faden ZONE_AUTH_PREFIX, right, zonename); 8181cb8a054bSGlenn Faden if (first) { 8182cb8a054bSGlenn Faden first = B_FALSE; 8183cb8a054bSGlenn Faden } else { 8184cb8a054bSGlenn Faden (void) strlcat(new_auths, ",", MAXAUTHS); 8185cb8a054bSGlenn Faden } 8186cb8a054bSGlenn Faden (void) strlcat(new_auths, auth, MAXAUTHS); 8187cb8a054bSGlenn Faden is_zone_admin = B_TRUE; 8188cb8a054bSGlenn Faden right = strtok_r(NULL, ",", &lasts); 8189cb8a054bSGlenn Faden } 8190cb8a054bSGlenn Faden 8191cb8a054bSGlenn Faden /* 8192cb8a054bSGlenn Faden * If the user's previous authorizations have changed 8193cb8a054bSGlenn Faden * execute the usermod progam to update them in user_attr 8194cb8a054bSGlenn Faden */ 8195cb8a054bSGlenn Faden if (strcmp(old_auths, new_auths) != 0) { 8196cb8a054bSGlenn Faden char *cmdbuf; 8197cb8a054bSGlenn Faden size_t cmd_len; 8198cb8a054bSGlenn Faden 8199cb8a054bSGlenn Faden update_profiles(rbac_profs, is_zone_admin); 8200cb8a054bSGlenn Faden cmd_len = snprintf(NULL, 0, "%s -A \"%s\" -P \"%s\" %s", 8201cb8a054bSGlenn Faden auths_cmd, new_auths, rbac_profs, user) + 1; 8202cb8a054bSGlenn Faden if ((cmdbuf = malloc(cmd_len)) == NULL) { 8203cb8a054bSGlenn Faden return (Z_NOMEM); 8204cb8a054bSGlenn Faden } 8205cb8a054bSGlenn Faden (void) snprintf(cmdbuf, cmd_len, "%s -A \"%s\" -P \"%s\" %s", 8206cb8a054bSGlenn Faden auths_cmd, new_auths, rbac_profs, user); 8207cb8a054bSGlenn Faden if (do_subproc(zonename, cmdbuf) != 0) { 8208cb8a054bSGlenn Faden free(cmdbuf); 8209cb8a054bSGlenn Faden return (Z_SYSTEM); 8210cb8a054bSGlenn Faden } 8211cb8a054bSGlenn Faden free(cmdbuf); 8212cb8a054bSGlenn Faden } 8213cb8a054bSGlenn Faden 8214cb8a054bSGlenn Faden return (Z_OK); 8215cb8a054bSGlenn Faden } 8216cb8a054bSGlenn Faden 8217cb8a054bSGlenn Faden int 8218cb8a054bSGlenn Faden zonecfg_authorize_users(zone_dochandle_t handle, char *zonename) 8219cb8a054bSGlenn Faden { 8220cb8a054bSGlenn Faden xmlNodePtr cur; 8221cb8a054bSGlenn Faden int err; 8222cb8a054bSGlenn Faden char user[MAXUSERNAME]; 8223cb8a054bSGlenn Faden char auths[MAXAUTHS]; 8224cb8a054bSGlenn Faden 8225cb8a054bSGlenn Faden if ((err = operation_prep(handle)) != Z_OK) 8226cb8a054bSGlenn Faden return (err); 8227cb8a054bSGlenn Faden 8228cb8a054bSGlenn Faden cur = handle->zone_dh_cur; 8229cb8a054bSGlenn Faden for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 8230cb8a054bSGlenn Faden if (xmlStrcmp(cur->name, DTD_ELEM_ADMIN)) 8231cb8a054bSGlenn Faden continue; 8232cb8a054bSGlenn Faden if (fetchprop(cur, DTD_ATTR_USER, user, 8233cb8a054bSGlenn Faden sizeof (user)) != Z_OK) 8234cb8a054bSGlenn Faden continue; 8235cb8a054bSGlenn Faden if (fetchprop(cur, DTD_ATTR_AUTHS, auths, 8236cb8a054bSGlenn Faden sizeof (auths)) != Z_OK) 8237cb8a054bSGlenn Faden continue; 8238cb8a054bSGlenn Faden if (zonecfg_authorize_user_impl(handle, user, auths, zonename) 8239cb8a054bSGlenn Faden != Z_OK) 8240cb8a054bSGlenn Faden return (Z_SYSTEM); 8241cb8a054bSGlenn Faden } 8242cb8a054bSGlenn Faden (void) zonecfg_remove_userauths(handle, "", "", B_TRUE); 8243cb8a054bSGlenn Faden 8244cb8a054bSGlenn Faden return (Z_OK); 8245cb8a054bSGlenn Faden } 8246cb8a054bSGlenn Faden 8247cb8a054bSGlenn Faden int 8248cb8a054bSGlenn Faden zonecfg_deauthorize_user(zone_dochandle_t handle, char *user, char *zonename) 8249cb8a054bSGlenn Faden { 8250cb8a054bSGlenn Faden return (zonecfg_authorize_user_impl(handle, user, "", zonename)); 8251cb8a054bSGlenn Faden } 8252cb8a054bSGlenn Faden 8253cb8a054bSGlenn Faden int 8254cb8a054bSGlenn Faden zonecfg_deauthorize_users(zone_dochandle_t handle, char *zonename) 8255cb8a054bSGlenn Faden { 8256cb8a054bSGlenn Faden xmlNodePtr cur; 8257cb8a054bSGlenn Faden int err; 8258cb8a054bSGlenn Faden char user[MAXUSERNAME]; 8259cb8a054bSGlenn Faden 8260cb8a054bSGlenn Faden if ((err = operation_prep(handle)) != Z_OK) 8261cb8a054bSGlenn Faden return (err); 8262cb8a054bSGlenn Faden 8263cb8a054bSGlenn Faden cur = handle->zone_dh_cur; 8264cb8a054bSGlenn Faden for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 8265cb8a054bSGlenn Faden if (xmlStrcmp(cur->name, DTD_ELEM_ADMIN)) 8266cb8a054bSGlenn Faden continue; 8267cb8a054bSGlenn Faden if (fetchprop(cur, DTD_ATTR_USER, user, 8268cb8a054bSGlenn Faden sizeof (user)) != Z_OK) 8269cb8a054bSGlenn Faden continue; 8270cb8a054bSGlenn Faden if ((err = zonecfg_deauthorize_user(handle, user, 8271cb8a054bSGlenn Faden zonename)) != Z_OK) 8272cb8a054bSGlenn Faden return (err); 8273cb8a054bSGlenn Faden } 8274cb8a054bSGlenn Faden return (Z_OK); 8275cb8a054bSGlenn Faden } 8276cb8a054bSGlenn Faden 8277cb8a054bSGlenn Faden int 8278cb8a054bSGlenn Faden zonecfg_insert_userauths(zone_dochandle_t handle, char *user, char *zonename) 8279cb8a054bSGlenn Faden { 8280cb8a054bSGlenn Faden zone_userauths_t *new, **prev, *next; 8281cb8a054bSGlenn Faden 8282cb8a054bSGlenn Faden prev = &handle->zone_dh_userauths; 8283cb8a054bSGlenn Faden next = *prev; 8284cb8a054bSGlenn Faden while (next) { 8285cb8a054bSGlenn Faden if ((strncmp(next->user, user, MAXUSERNAME) == 0) && 8286cb8a054bSGlenn Faden (strncmp(next->zonename, zonename, 8287cb8a054bSGlenn Faden ZONENAME_MAX) == 0)) { 8288cb8a054bSGlenn Faden /* 8289cb8a054bSGlenn Faden * user is already in list 8290cb8a054bSGlenn Faden * which isn't supposed to happen! 8291cb8a054bSGlenn Faden */ 8292cb8a054bSGlenn Faden return (Z_OK); 8293cb8a054bSGlenn Faden } 8294cb8a054bSGlenn Faden prev = &next->next; 8295cb8a054bSGlenn Faden next = *prev; 8296cb8a054bSGlenn Faden } 8297cb8a054bSGlenn Faden new = (zone_userauths_t *)malloc(sizeof (zone_userauths_t)); 8298cb8a054bSGlenn Faden if (new == NULL) 8299cb8a054bSGlenn Faden return (Z_NOMEM); 8300cb8a054bSGlenn Faden 8301cb8a054bSGlenn Faden (void) strlcpy(new->user, user, sizeof (new->user)); 8302cb8a054bSGlenn Faden (void) strlcpy(new->zonename, zonename, sizeof (new->zonename)); 8303cb8a054bSGlenn Faden new->next = NULL; 8304cb8a054bSGlenn Faden *prev = new; 8305cb8a054bSGlenn Faden return (Z_OK); 8306cb8a054bSGlenn Faden } 8307cb8a054bSGlenn Faden 8308cb8a054bSGlenn Faden int 8309cb8a054bSGlenn Faden zonecfg_remove_userauths(zone_dochandle_t handle, char *user, char *zonename, 8310cb8a054bSGlenn Faden boolean_t deauthorize) 8311cb8a054bSGlenn Faden { 8312cb8a054bSGlenn Faden zone_userauths_t *new, **prev, *next; 8313cb8a054bSGlenn Faden 8314cb8a054bSGlenn Faden prev = &handle->zone_dh_userauths; 8315cb8a054bSGlenn Faden next = *prev; 8316cb8a054bSGlenn Faden 8317cb8a054bSGlenn Faden while (next) { 8318cb8a054bSGlenn Faden if ((strlen(user) == 0 || 8319cb8a054bSGlenn Faden strncmp(next->user, user, MAXUSERNAME) == 0) && 8320cb8a054bSGlenn Faden (strlen(zonename) == 0 || 8321cb8a054bSGlenn Faden (strncmp(next->zonename, zonename, ZONENAME_MAX) == 0))) { 8322cb8a054bSGlenn Faden new = next; 8323cb8a054bSGlenn Faden *prev = next->next; 8324cb8a054bSGlenn Faden next = *prev; 8325cb8a054bSGlenn Faden if (deauthorize) 8326cb8a054bSGlenn Faden (void) zonecfg_deauthorize_user(handle, 8327cb8a054bSGlenn Faden new->user, new->zonename); 8328cb8a054bSGlenn Faden free(new); 8329cb8a054bSGlenn Faden continue; 8330cb8a054bSGlenn Faden } 8331cb8a054bSGlenn Faden prev = &next->next; 8332cb8a054bSGlenn Faden next = *prev; 8333cb8a054bSGlenn Faden } 8334cb8a054bSGlenn Faden return (Z_OK); 8335cb8a054bSGlenn Faden } 8336