17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5ee519a1fSgjelinek * Common Development and Distribution License (the "License"). 6ee519a1fSgjelinek * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 21ffbafc53Scomay 227c478bd9Sstevel@tonic-gate /* 23f4b3ec61Sdh155122 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 247c478bd9Sstevel@tonic-gate * Use is subject to license terms. 257c478bd9Sstevel@tonic-gate */ 267c478bd9Sstevel@tonic-gate 277c478bd9Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI" 287c478bd9Sstevel@tonic-gate 29cf8f45c7Sdstaff #include <libsysevent.h> 30cf8f45c7Sdstaff #include <pthread.h> 31cf8f45c7Sdstaff #include <stdlib.h> 327c478bd9Sstevel@tonic-gate #include <errno.h> 337c478bd9Sstevel@tonic-gate #include <fnmatch.h> 347c478bd9Sstevel@tonic-gate #include <strings.h> 357c478bd9Sstevel@tonic-gate #include <unistd.h> 367c478bd9Sstevel@tonic-gate #include <assert.h> 377c478bd9Sstevel@tonic-gate #include <libgen.h> 387c478bd9Sstevel@tonic-gate #include <libintl.h> 397c478bd9Sstevel@tonic-gate #include <alloca.h> 407c478bd9Sstevel@tonic-gate #include <ctype.h> 419acbbeafSnn35248 #include <sys/acl.h> 429acbbeafSnn35248 #include <sys/stat.h> 439acbbeafSnn35248 #include <sys/brand.h> 447c478bd9Sstevel@tonic-gate #include <sys/mntio.h> 457c478bd9Sstevel@tonic-gate #include <sys/mnttab.h> 46cf8f45c7Sdstaff #include <sys/nvpair.h> 479acbbeafSnn35248 #include <sys/types.h> 48f4b3ec61Sdh155122 #include <sys/sockio.h> 49ee519a1fSgjelinek #include <ftw.h> 500209230bSgjelinek #include <pool.h> 510209230bSgjelinek #include <libscf.h> 520209230bSgjelinek #include <libproc.h> 530209230bSgjelinek #include <sys/priocntl.h> 547c478bd9Sstevel@tonic-gate 557c478bd9Sstevel@tonic-gate #include <arpa/inet.h> 567c478bd9Sstevel@tonic-gate #include <netdb.h> 577c478bd9Sstevel@tonic-gate 587c478bd9Sstevel@tonic-gate #include <libxml/xmlmemory.h> 597c478bd9Sstevel@tonic-gate #include <libxml/parser.h> 607c478bd9Sstevel@tonic-gate 617c478bd9Sstevel@tonic-gate #include <libdevinfo.h> 62108322fbScarlsonj #include <uuid/uuid.h> 63ee519a1fSgjelinek #include <dirent.h> 649acbbeafSnn35248 #include <libbrand.h> 65ee519a1fSgjelinek 667c478bd9Sstevel@tonic-gate #include <libzonecfg.h> 677c478bd9Sstevel@tonic-gate #include "zonecfg_impl.h" 687c478bd9Sstevel@tonic-gate 697c478bd9Sstevel@tonic-gate #define _PATH_TMPFILE "/zonecfg.XXXXXX" 70cf8f45c7Sdstaff #define ZONE_CB_RETRY_COUNT 10 71cf8f45c7Sdstaff #define ZONE_EVENT_PING_SUBCLASS "ping" 72cf8f45c7Sdstaff #define ZONE_EVENT_PING_PUBLISHER "solaris" 737c478bd9Sstevel@tonic-gate 747c478bd9Sstevel@tonic-gate /* Hard-code the DTD element/attribute/entity names just once, here. */ 757c478bd9Sstevel@tonic-gate #define DTD_ELEM_ATTR (const xmlChar *) "attr" 767c478bd9Sstevel@tonic-gate #define DTD_ELEM_COMMENT (const xmlChar *) "comment" 777c478bd9Sstevel@tonic-gate #define DTD_ELEM_DEVICE (const xmlChar *) "device" 787c478bd9Sstevel@tonic-gate #define DTD_ELEM_FS (const xmlChar *) "filesystem" 797c478bd9Sstevel@tonic-gate #define DTD_ELEM_FSOPTION (const xmlChar *) "fsoption" 807c478bd9Sstevel@tonic-gate #define DTD_ELEM_IPD (const xmlChar *) "inherited-pkg-dir" 817c478bd9Sstevel@tonic-gate #define DTD_ELEM_NET (const xmlChar *) "network" 827c478bd9Sstevel@tonic-gate #define DTD_ELEM_RCTL (const xmlChar *) "rctl" 837c478bd9Sstevel@tonic-gate #define DTD_ELEM_RCTLVALUE (const xmlChar *) "rctl-value" 847c478bd9Sstevel@tonic-gate #define DTD_ELEM_ZONE (const xmlChar *) "zone" 85fa9e4066Sahrens #define DTD_ELEM_DATASET (const xmlChar *) "dataset" 860209230bSgjelinek #define DTD_ELEM_TMPPOOL (const xmlChar *) "tmp_pool" 870209230bSgjelinek #define DTD_ELEM_PSET (const xmlChar *) "pset" 880209230bSgjelinek #define DTD_ELEM_MCAP (const xmlChar *) "mcap" 89ee519a1fSgjelinek #define DTD_ELEM_PACKAGE (const xmlChar *) "package" 90ee519a1fSgjelinek #define DTD_ELEM_PATCH (const xmlChar *) "patch" 91ee519a1fSgjelinek #define DTD_ELEM_OBSOLETES (const xmlChar *) "obsoletes" 92ee519a1fSgjelinek #define DTD_ELEM_INCOMPATIBLE (const xmlChar *) "incompatible" 93ee519a1fSgjelinek #define DTD_ELEM_DEV_PERM (const xmlChar *) "dev-perm" 947c478bd9Sstevel@tonic-gate 957c478bd9Sstevel@tonic-gate #define DTD_ATTR_ACTION (const xmlChar *) "action" 967c478bd9Sstevel@tonic-gate #define DTD_ATTR_ADDRESS (const xmlChar *) "address" 977c478bd9Sstevel@tonic-gate #define DTD_ATTR_AUTOBOOT (const xmlChar *) "autoboot" 98f4b3ec61Sdh155122 #define DTD_ATTR_IPTYPE (const xmlChar *) "ip-type" 997c478bd9Sstevel@tonic-gate #define DTD_ATTR_DIR (const xmlChar *) "directory" 1007c478bd9Sstevel@tonic-gate #define DTD_ATTR_LIMIT (const xmlChar *) "limit" 101ffbafc53Scomay #define DTD_ATTR_LIMITPRIV (const xmlChar *) "limitpriv" 1023f2f09c1Sdp #define DTD_ATTR_BOOTARGS (const xmlChar *) "bootargs" 1030209230bSgjelinek #define DTD_ATTR_SCHED (const xmlChar *) "scheduling-class" 1047c478bd9Sstevel@tonic-gate #define DTD_ATTR_MATCH (const xmlChar *) "match" 1057c478bd9Sstevel@tonic-gate #define DTD_ATTR_NAME (const xmlChar *) "name" 1067c478bd9Sstevel@tonic-gate #define DTD_ATTR_PHYSICAL (const xmlChar *) "physical" 1077c478bd9Sstevel@tonic-gate #define DTD_ATTR_POOL (const xmlChar *) "pool" 1087c478bd9Sstevel@tonic-gate #define DTD_ATTR_PRIV (const xmlChar *) "priv" 1097c478bd9Sstevel@tonic-gate #define DTD_ATTR_RAW (const xmlChar *) "raw" 1107c478bd9Sstevel@tonic-gate #define DTD_ATTR_SPECIAL (const xmlChar *) "special" 1117c478bd9Sstevel@tonic-gate #define DTD_ATTR_TYPE (const xmlChar *) "type" 1127c478bd9Sstevel@tonic-gate #define DTD_ATTR_VALUE (const xmlChar *) "value" 1137c478bd9Sstevel@tonic-gate #define DTD_ATTR_ZONEPATH (const xmlChar *) "zonepath" 1140209230bSgjelinek #define DTD_ATTR_NCPU_MIN (const xmlChar *) "ncpu_min" 1150209230bSgjelinek #define DTD_ATTR_NCPU_MAX (const xmlChar *) "ncpu_max" 1160209230bSgjelinek #define DTD_ATTR_IMPORTANCE (const xmlChar *) "importance" 1170209230bSgjelinek #define DTD_ATTR_PHYSCAP (const xmlChar *) "physcap" 118ee519a1fSgjelinek #define DTD_ATTR_VERSION (const xmlChar *) "version" 119ee519a1fSgjelinek #define DTD_ATTR_ID (const xmlChar *) "id" 120ee519a1fSgjelinek #define DTD_ATTR_UID (const xmlChar *) "uid" 121ee519a1fSgjelinek #define DTD_ATTR_GID (const xmlChar *) "gid" 122ee519a1fSgjelinek #define DTD_ATTR_MODE (const xmlChar *) "mode" 123ee519a1fSgjelinek #define DTD_ATTR_ACL (const xmlChar *) "acl" 1249acbbeafSnn35248 #define DTD_ATTR_BRAND (const xmlChar *) "brand" 1257c478bd9Sstevel@tonic-gate 1267c478bd9Sstevel@tonic-gate #define DTD_ENTITY_BOOLEAN "boolean" 1277c478bd9Sstevel@tonic-gate #define DTD_ENTITY_DEVPATH "devpath" 1287c478bd9Sstevel@tonic-gate #define DTD_ENTITY_DRIVER "driver" 1297c478bd9Sstevel@tonic-gate #define DTD_ENTITY_DRVMIN "drv_min" 1307c478bd9Sstevel@tonic-gate #define DTD_ENTITY_FALSE "false" 1317c478bd9Sstevel@tonic-gate #define DTD_ENTITY_INT "int" 1327c478bd9Sstevel@tonic-gate #define DTD_ENTITY_STRING "string" 1337c478bd9Sstevel@tonic-gate #define DTD_ENTITY_TRUE "true" 1347c478bd9Sstevel@tonic-gate #define DTD_ENTITY_UINT "uint" 1357c478bd9Sstevel@tonic-gate 136a1be23daSdp #define DTD_ENTITY_BOOL_LEN 6 /* "false" */ 137a1be23daSdp 138ee519a1fSgjelinek #define DETACHED "SUNWdetached.xml" 139ee519a1fSgjelinek #define ATTACH_FORCED "SUNWattached.xml" 140ee519a1fSgjelinek #define PKG_PATH "/var/sadm/pkg" 141ee519a1fSgjelinek #define CONTENTS_FILE "/var/sadm/install/contents" 14245916cd2Sjpk #define SUNW_PKG_ALL_ZONES "SUNW_PKG_ALLZONES=true\n" 14345916cd2Sjpk #define SUNW_PKG_THIS_ZONE "SUNW_PKG_THISZONE=true\n" 144ee519a1fSgjelinek #define VERSION "VERSION=" 145ee519a1fSgjelinek #define PATCHLIST "PATCHLIST=" 146ee519a1fSgjelinek #define PATCHINFO "PATCH_INFO_" 147ee519a1fSgjelinek #define PKGINFO_RD_LEN 128 148ee519a1fSgjelinek 1490209230bSgjelinek #define TMP_POOL_NAME "SUNWtmp_%s" 1500209230bSgjelinek #define MAX_TMP_POOL_NAME (ZONENAME_MAX + 9) 1510209230bSgjelinek #define RCAP_SERVICE "system/rcap:default" 1520209230bSgjelinek #define POOLD_SERVICE "system/pools/dynamic:default" 1530209230bSgjelinek 1540209230bSgjelinek /* 1550209230bSgjelinek * rctl alias definitions 1560209230bSgjelinek * 1570209230bSgjelinek * This holds the alias, the full rctl name, the default priv value, action 1580209230bSgjelinek * and lower limit. The functions that handle rctl aliases step through 1590209230bSgjelinek * this table, matching on the alias, and using the full values for setting 1600209230bSgjelinek * the rctl entry as well the limit for validation. 1610209230bSgjelinek */ 1620209230bSgjelinek static struct alias { 1630209230bSgjelinek char *shortname; 1640209230bSgjelinek char *realname; 1650209230bSgjelinek char *priv; 1660209230bSgjelinek char *action; 1670209230bSgjelinek uint64_t low_limit; 1680209230bSgjelinek } aliases[] = { 1690209230bSgjelinek {ALIAS_MAXLWPS, "zone.max-lwps", "privileged", "deny", 100}, 1700209230bSgjelinek {ALIAS_MAXSHMMEM, "zone.max-shm-memory", "privileged", "deny", 0}, 1710209230bSgjelinek {ALIAS_MAXSHMIDS, "zone.max-shm-ids", "privileged", "deny", 0}, 1720209230bSgjelinek {ALIAS_MAXMSGIDS, "zone.max-msg-ids", "privileged", "deny", 0}, 1730209230bSgjelinek {ALIAS_MAXSEMIDS, "zone.max-sem-ids", "privileged", "deny", 0}, 1740209230bSgjelinek {ALIAS_MAXLOCKEDMEM, "zone.max-locked-memory", "privileged", "deny", 0}, 1750209230bSgjelinek {ALIAS_MAXSWAP, "zone.max-swap", "privileged", "deny", 0}, 1760209230bSgjelinek {ALIAS_SHARES, "zone.cpu-shares", "privileged", "none", 0}, 177*c97ad5cdSakolb {ALIAS_CPUCAP, "zone.cpu-cap", "privileged", "deny", 0}, 1780209230bSgjelinek {NULL, NULL, NULL, NULL, 0} 1790209230bSgjelinek }; 1800209230bSgjelinek 1810209230bSgjelinek /* 1820209230bSgjelinek * Structure for applying rctls to a running zone. It allows important 1830209230bSgjelinek * process values to be passed together easily. 1840209230bSgjelinek */ 1850209230bSgjelinek typedef struct pr_info_handle { 1860209230bSgjelinek struct ps_prochandle *pr; 1870209230bSgjelinek pid_t pid; 1880209230bSgjelinek } pr_info_handle_t; 1890209230bSgjelinek 1907c478bd9Sstevel@tonic-gate struct zone_dochandle { 1917c478bd9Sstevel@tonic-gate char *zone_dh_rootdir; 1927c478bd9Sstevel@tonic-gate xmlDocPtr zone_dh_doc; 1937c478bd9Sstevel@tonic-gate xmlNodePtr zone_dh_cur; 1947c478bd9Sstevel@tonic-gate xmlNodePtr zone_dh_top; 195087719fdSdp boolean_t zone_dh_newzone; 196087719fdSdp boolean_t zone_dh_snapshot; 197ee519a1fSgjelinek boolean_t zone_dh_sw_inv; 198087719fdSdp char zone_dh_delete_name[ZONENAME_MAX]; 1997c478bd9Sstevel@tonic-gate }; 2007c478bd9Sstevel@tonic-gate 201cf8f45c7Sdstaff struct znotify { 202cf8f45c7Sdstaff void * zn_private; 203cf8f45c7Sdstaff evchan_t *zn_eventchan; 204cf8f45c7Sdstaff int (*zn_callback)(const char *zonename, zoneid_t zid, 205cf8f45c7Sdstaff const char *newstate, const char *oldstate, hrtime_t when, void *p); 206cf8f45c7Sdstaff pthread_mutex_t zn_mutex; 207cf8f45c7Sdstaff pthread_cond_t zn_cond; 208cf8f45c7Sdstaff pthread_mutex_t zn_bigmutex; 209cf8f45c7Sdstaff volatile enum {ZN_UNLOCKED, ZN_LOCKED, ZN_PING_INFLIGHT, 210cf8f45c7Sdstaff ZN_PING_RECEIVED} zn_state; 211cf8f45c7Sdstaff char zn_subscriber_id[MAX_SUBID_LEN]; 212cf8f45c7Sdstaff volatile boolean_t zn_failed; 213cf8f45c7Sdstaff int zn_failure_count; 214cf8f45c7Sdstaff }; 215cf8f45c7Sdstaff 216ee519a1fSgjelinek struct zone_pkginfo { 217ee519a1fSgjelinek boolean_t zpi_all_zones; 218ee519a1fSgjelinek boolean_t zpi_this_zone; 219ee519a1fSgjelinek int zpi_patch_cnt; 220ee519a1fSgjelinek char *zpi_version; 221ee519a1fSgjelinek char **zpi_patchinfo; 222ee519a1fSgjelinek }; 223ee519a1fSgjelinek 224108322fbScarlsonj char *zonecfg_root = ""; 225108322fbScarlsonj 2267c478bd9Sstevel@tonic-gate /* 2277c478bd9Sstevel@tonic-gate * For functions which return int, which is most of the functions herein, 2287c478bd9Sstevel@tonic-gate * the return values should be from the Z_foo set defined in <libzonecfg.h>. 2297c478bd9Sstevel@tonic-gate * In some instances, we take pains mapping some libc errno values to Z_foo 2307c478bd9Sstevel@tonic-gate * values from this set. 2317c478bd9Sstevel@tonic-gate */ 2327c478bd9Sstevel@tonic-gate 2337c478bd9Sstevel@tonic-gate /* 234108322fbScarlsonj * Set the root (/) path for all zonecfg configuration files. This is a 235108322fbScarlsonj * private interface used by Live Upgrade extensions to access zone 236108322fbScarlsonj * configuration inside mounted alternate boot environments. 237108322fbScarlsonj */ 238108322fbScarlsonj void 239108322fbScarlsonj zonecfg_set_root(const char *rootpath) 240108322fbScarlsonj { 241108322fbScarlsonj if (*zonecfg_root != '\0') 242108322fbScarlsonj free(zonecfg_root); 243108322fbScarlsonj if (rootpath == NULL || rootpath[0] == '\0' || rootpath[1] == '\0' || 244108322fbScarlsonj (zonecfg_root = strdup(rootpath)) == NULL) 245108322fbScarlsonj zonecfg_root = ""; 246108322fbScarlsonj } 247108322fbScarlsonj 248108322fbScarlsonj const char * 249108322fbScarlsonj zonecfg_get_root(void) 250108322fbScarlsonj { 251108322fbScarlsonj return (zonecfg_root); 252108322fbScarlsonj } 253108322fbScarlsonj 254108322fbScarlsonj boolean_t 255108322fbScarlsonj zonecfg_in_alt_root(void) 256108322fbScarlsonj { 257108322fbScarlsonj return (*zonecfg_root != '\0'); 258108322fbScarlsonj } 259108322fbScarlsonj 260108322fbScarlsonj /* 2617c478bd9Sstevel@tonic-gate * Callers of the _file_path() functions are expected to have the second 2627c478bd9Sstevel@tonic-gate * parameter be a (char foo[MAXPATHLEN]). 2637c478bd9Sstevel@tonic-gate */ 2647c478bd9Sstevel@tonic-gate 265108322fbScarlsonj static boolean_t 2667c478bd9Sstevel@tonic-gate config_file_path(const char *zonename, char *answer) 2677c478bd9Sstevel@tonic-gate { 268108322fbScarlsonj return (snprintf(answer, MAXPATHLEN, "%s%s/%s.xml", zonecfg_root, 269108322fbScarlsonj ZONE_CONFIG_ROOT, zonename) < MAXPATHLEN); 2707c478bd9Sstevel@tonic-gate } 2717c478bd9Sstevel@tonic-gate 272108322fbScarlsonj static boolean_t 273108322fbScarlsonj snap_file_path(const char *zonename, char *answer) 2747c478bd9Sstevel@tonic-gate { 275108322fbScarlsonj return (snprintf(answer, MAXPATHLEN, "%s%s/%s.snapshot.xml", 276108322fbScarlsonj zonecfg_root, ZONE_SNAPSHOT_ROOT, zonename) < MAXPATHLEN); 2777c478bd9Sstevel@tonic-gate } 2787c478bd9Sstevel@tonic-gate 2797c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 2807c478bd9Sstevel@tonic-gate static void 2817c478bd9Sstevel@tonic-gate zonecfg_error_func(void *ctx, const char *msg, ...) 2827c478bd9Sstevel@tonic-gate { 2837c478bd9Sstevel@tonic-gate /* 2847c478bd9Sstevel@tonic-gate * This function does nothing by design. Its purpose is to prevent 2857c478bd9Sstevel@tonic-gate * libxml from dumping unwanted messages to stdout/stderr. 2867c478bd9Sstevel@tonic-gate */ 2877c478bd9Sstevel@tonic-gate } 2887c478bd9Sstevel@tonic-gate 2897c478bd9Sstevel@tonic-gate zone_dochandle_t 2907c478bd9Sstevel@tonic-gate zonecfg_init_handle(void) 2917c478bd9Sstevel@tonic-gate { 292087719fdSdp zone_dochandle_t handle = calloc(1, sizeof (struct zone_dochandle)); 2937c478bd9Sstevel@tonic-gate if (handle == NULL) { 2947c478bd9Sstevel@tonic-gate errno = Z_NOMEM; 2957c478bd9Sstevel@tonic-gate return (NULL); 2967c478bd9Sstevel@tonic-gate } 2977c478bd9Sstevel@tonic-gate 2987c478bd9Sstevel@tonic-gate /* generic libxml initialization */ 2997c478bd9Sstevel@tonic-gate xmlLineNumbersDefault(1); 3007c478bd9Sstevel@tonic-gate xmlLoadExtDtdDefaultValue |= XML_DETECT_IDS; 3017c478bd9Sstevel@tonic-gate xmlDoValidityCheckingDefaultValue = 1; 3027c478bd9Sstevel@tonic-gate (void) xmlKeepBlanksDefault(0); 3037c478bd9Sstevel@tonic-gate xmlGetWarningsDefaultValue = 0; 3047c478bd9Sstevel@tonic-gate xmlSetGenericErrorFunc(NULL, zonecfg_error_func); 3057c478bd9Sstevel@tonic-gate 3067c478bd9Sstevel@tonic-gate return (handle); 3077c478bd9Sstevel@tonic-gate } 3087c478bd9Sstevel@tonic-gate 3097c478bd9Sstevel@tonic-gate int 3107c478bd9Sstevel@tonic-gate zonecfg_check_handle(zone_dochandle_t handle) 3117c478bd9Sstevel@tonic-gate { 3127c478bd9Sstevel@tonic-gate if (handle == NULL || handle->zone_dh_doc == NULL) 3137c478bd9Sstevel@tonic-gate return (Z_BAD_HANDLE); 3147c478bd9Sstevel@tonic-gate return (Z_OK); 3157c478bd9Sstevel@tonic-gate } 3167c478bd9Sstevel@tonic-gate 3177c478bd9Sstevel@tonic-gate void 3187c478bd9Sstevel@tonic-gate zonecfg_fini_handle(zone_dochandle_t handle) 3197c478bd9Sstevel@tonic-gate { 3207c478bd9Sstevel@tonic-gate if (zonecfg_check_handle(handle) == Z_OK) 3217c478bd9Sstevel@tonic-gate xmlFreeDoc(handle->zone_dh_doc); 3227c478bd9Sstevel@tonic-gate if (handle != NULL) 3237c478bd9Sstevel@tonic-gate free(handle); 3247c478bd9Sstevel@tonic-gate } 3257c478bd9Sstevel@tonic-gate 3267c478bd9Sstevel@tonic-gate static int 3277c478bd9Sstevel@tonic-gate zonecfg_destroy_impl(char *filename) 3287c478bd9Sstevel@tonic-gate { 3297c478bd9Sstevel@tonic-gate if (unlink(filename) == -1) { 3307c478bd9Sstevel@tonic-gate if (errno == EACCES) 3317c478bd9Sstevel@tonic-gate return (Z_ACCES); 3327c478bd9Sstevel@tonic-gate if (errno == ENOENT) 3337c478bd9Sstevel@tonic-gate return (Z_NO_ZONE); 3347c478bd9Sstevel@tonic-gate return (Z_MISC_FS); 3357c478bd9Sstevel@tonic-gate } 3367c478bd9Sstevel@tonic-gate return (Z_OK); 3377c478bd9Sstevel@tonic-gate } 3387c478bd9Sstevel@tonic-gate 3397c478bd9Sstevel@tonic-gate int 340087719fdSdp zonecfg_destroy(const char *zonename, boolean_t force) 3417c478bd9Sstevel@tonic-gate { 3427c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 343087719fdSdp struct zoneent ze; 344087719fdSdp int err, state_err; 345087719fdSdp zone_state_t state; 3467c478bd9Sstevel@tonic-gate 347108322fbScarlsonj if (!config_file_path(zonename, path)) 348108322fbScarlsonj return (Z_MISC_FS); 349087719fdSdp 350087719fdSdp state_err = zone_get_state((char *)zonename, &state); 351087719fdSdp err = access(path, W_OK); 352087719fdSdp 353087719fdSdp /* 354087719fdSdp * If there is no file, and no index entry, reliably indicate that no 355087719fdSdp * such zone exists. 356087719fdSdp */ 357087719fdSdp if ((state_err == Z_NO_ZONE) && (err == -1) && (errno == ENOENT)) 358087719fdSdp return (Z_NO_ZONE); 359087719fdSdp 360087719fdSdp /* 361087719fdSdp * Handle any other filesystem related errors (except if the XML 362087719fdSdp * file is missing, which we treat silently), unless we're forcing, 363087719fdSdp * in which case we plow on. 364087719fdSdp */ 365087719fdSdp if (err == -1 && errno != ENOENT) { 366087719fdSdp if (errno == EACCES) 367087719fdSdp return (Z_ACCES); 368087719fdSdp else if (!force) 369087719fdSdp return (Z_MISC_FS); 370087719fdSdp } 371087719fdSdp 372087719fdSdp if (state > ZONE_STATE_INSTALLED) 373087719fdSdp return (Z_BAD_ZONE_STATE); 374087719fdSdp 375087719fdSdp if (!force && state > ZONE_STATE_CONFIGURED) 376087719fdSdp return (Z_BAD_ZONE_STATE); 377087719fdSdp 378087719fdSdp /* 379087719fdSdp * Index deletion succeeds even if the entry doesn't exist. So this 380087719fdSdp * will fail only if we've had some more severe problem. 381087719fdSdp */ 382087719fdSdp bzero(&ze, sizeof (ze)); 383087719fdSdp (void) strlcpy(ze.zone_name, zonename, sizeof (ze.zone_name)); 384087719fdSdp if ((err = putzoneent(&ze, PZE_REMOVE)) != Z_OK) 385087719fdSdp if (!force) 386087719fdSdp return (err); 387087719fdSdp 388087719fdSdp err = zonecfg_destroy_impl(path); 389087719fdSdp 390087719fdSdp /* 391087719fdSdp * Treat failure to find the XML file silently, since, well, it's 392087719fdSdp * gone, and with the index file cleaned up, we're done. 393087719fdSdp */ 394087719fdSdp if (err == Z_OK || err == Z_NO_ZONE) 395087719fdSdp return (Z_OK); 396087719fdSdp return (err); 3977c478bd9Sstevel@tonic-gate } 3987c478bd9Sstevel@tonic-gate 3997c478bd9Sstevel@tonic-gate int 400108322fbScarlsonj zonecfg_destroy_snapshot(const char *zonename) 4017c478bd9Sstevel@tonic-gate { 4027c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 4037c478bd9Sstevel@tonic-gate 404108322fbScarlsonj if (!snap_file_path(zonename, path)) 405108322fbScarlsonj return (Z_MISC_FS); 4067c478bd9Sstevel@tonic-gate return (zonecfg_destroy_impl(path)); 4077c478bd9Sstevel@tonic-gate } 4087c478bd9Sstevel@tonic-gate 4097c478bd9Sstevel@tonic-gate static int 410a1be23daSdp getroot(zone_dochandle_t handle, xmlNodePtr *root) 4117c478bd9Sstevel@tonic-gate { 4127c478bd9Sstevel@tonic-gate if (zonecfg_check_handle(handle) == Z_BAD_HANDLE) 4137c478bd9Sstevel@tonic-gate return (Z_BAD_HANDLE); 4147c478bd9Sstevel@tonic-gate 415a1be23daSdp *root = xmlDocGetRootElement(handle->zone_dh_doc); 416a1be23daSdp 417a1be23daSdp if (*root == NULL) 4187c478bd9Sstevel@tonic-gate return (Z_EMPTY_DOCUMENT); 419a1be23daSdp 420a1be23daSdp if (xmlStrcmp((*root)->name, DTD_ELEM_ZONE)) 421a1be23daSdp return (Z_WRONG_DOC_TYPE); 422a1be23daSdp 423a1be23daSdp return (Z_OK); 4247c478bd9Sstevel@tonic-gate } 4257c478bd9Sstevel@tonic-gate 426a1be23daSdp static int 427a1be23daSdp operation_prep(zone_dochandle_t handle) 428a1be23daSdp { 429a1be23daSdp xmlNodePtr root; 430a1be23daSdp int err; 431a1be23daSdp 432a1be23daSdp if ((err = getroot(handle, &root)) != 0) 433a1be23daSdp return (err); 434a1be23daSdp 435a1be23daSdp handle->zone_dh_cur = root; 436a1be23daSdp handle->zone_dh_top = root; 437a1be23daSdp return (Z_OK); 4387c478bd9Sstevel@tonic-gate } 439a1be23daSdp 440a1be23daSdp static int 441ffbafc53Scomay fetchprop(xmlNodePtr cur, const xmlChar *propname, char *dst, size_t dstsize) 442ffbafc53Scomay { 443ffbafc53Scomay xmlChar *property; 444ffbafc53Scomay size_t srcsize; 445ffbafc53Scomay 446ffbafc53Scomay if ((property = xmlGetProp(cur, propname)) == NULL) 447ffbafc53Scomay return (Z_BAD_PROPERTY); 448ffbafc53Scomay srcsize = strlcpy(dst, (char *)property, dstsize); 449ffbafc53Scomay xmlFree(property); 450ffbafc53Scomay if (srcsize >= dstsize) 451ffbafc53Scomay return (Z_TOO_BIG); 452ffbafc53Scomay return (Z_OK); 453ffbafc53Scomay } 454ffbafc53Scomay 455ffbafc53Scomay static int 456ffbafc53Scomay fetch_alloc_prop(xmlNodePtr cur, const xmlChar *propname, char **dst) 457ffbafc53Scomay { 458ffbafc53Scomay xmlChar *property; 459ffbafc53Scomay 460ffbafc53Scomay if ((property = xmlGetProp(cur, propname)) == NULL) 461ffbafc53Scomay return (Z_BAD_PROPERTY); 462ffbafc53Scomay if ((*dst = strdup((char *)property)) == NULL) { 463ffbafc53Scomay xmlFree(property); 464ffbafc53Scomay return (Z_NOMEM); 465ffbafc53Scomay } 466ffbafc53Scomay xmlFree(property); 467ffbafc53Scomay return (Z_OK); 468ffbafc53Scomay } 469ffbafc53Scomay 470ffbafc53Scomay static int 471a1be23daSdp getrootattr(zone_dochandle_t handle, const xmlChar *propname, 472a1be23daSdp char *propval, size_t propsize) 473a1be23daSdp { 474a1be23daSdp xmlNodePtr root; 475a1be23daSdp int err; 476a1be23daSdp 477a1be23daSdp if ((err = getroot(handle, &root)) != 0) 478a1be23daSdp return (err); 479a1be23daSdp 480ffbafc53Scomay return (fetchprop(root, propname, propval, propsize)); 481ffbafc53Scomay } 482ffbafc53Scomay 483ffbafc53Scomay static int 484ffbafc53Scomay get_alloc_rootattr(zone_dochandle_t handle, const xmlChar *propname, 485ffbafc53Scomay char **propval) 486ffbafc53Scomay { 487ffbafc53Scomay xmlNodePtr root; 488ffbafc53Scomay int err; 489ffbafc53Scomay 490ffbafc53Scomay if ((err = getroot(handle, &root)) != 0) 491ffbafc53Scomay return (err); 492ffbafc53Scomay 493ffbafc53Scomay return (fetch_alloc_prop(root, propname, propval)); 494a1be23daSdp } 495a1be23daSdp 496a1be23daSdp static int 497108322fbScarlsonj setrootattr(zone_dochandle_t handle, const xmlChar *propname, 498108322fbScarlsonj const char *propval) 499a1be23daSdp { 500a1be23daSdp int err; 501a1be23daSdp xmlNodePtr root; 502a1be23daSdp 503a1be23daSdp if ((err = getroot(handle, &root)) != Z_OK) 504a1be23daSdp return (err); 505a1be23daSdp 5060209230bSgjelinek /* 5070209230bSgjelinek * If we get a null propval remove the property (ignore return since it 5080209230bSgjelinek * may not be set to begin with). 5090209230bSgjelinek */ 5100209230bSgjelinek if (propval == NULL) { 5110209230bSgjelinek (void) xmlUnsetProp(root, propname); 5120209230bSgjelinek } else { 5130209230bSgjelinek if (xmlSetProp(root, propname, (const xmlChar *) propval) 5140209230bSgjelinek == NULL) 515a1be23daSdp return (Z_INVAL); 5160209230bSgjelinek } 5177c478bd9Sstevel@tonic-gate return (Z_OK); 5187c478bd9Sstevel@tonic-gate } 5197c478bd9Sstevel@tonic-gate 520087719fdSdp static void 521087719fdSdp addcomment(zone_dochandle_t handle, const char *comment) 522087719fdSdp { 523087719fdSdp xmlNodePtr node; 524087719fdSdp node = xmlNewComment((xmlChar *) comment); 525087719fdSdp 526087719fdSdp if (node != NULL) 527087719fdSdp (void) xmlAddPrevSibling(handle->zone_dh_top, node); 528087719fdSdp } 529087719fdSdp 530087719fdSdp static void 531087719fdSdp stripcomments(zone_dochandle_t handle) 532087719fdSdp { 533087719fdSdp xmlDocPtr top; 534087719fdSdp xmlNodePtr child, next; 535087719fdSdp 536087719fdSdp top = handle->zone_dh_doc; 537087719fdSdp for (child = top->xmlChildrenNode; child != NULL; child = next) { 538087719fdSdp next = child->next; 539087719fdSdp if (child->name == NULL) 540087719fdSdp continue; 541087719fdSdp if (xmlStrcmp(child->name, DTD_ELEM_COMMENT) == 0) { 542087719fdSdp next = child->next; 543087719fdSdp xmlUnlinkNode(child); 544087719fdSdp xmlFreeNode(child); 545087719fdSdp } 546087719fdSdp } 547087719fdSdp } 548087719fdSdp 549ee519a1fSgjelinek static void 550ee519a1fSgjelinek strip_sw_inv(zone_dochandle_t handle) 551ee519a1fSgjelinek { 552ee519a1fSgjelinek xmlNodePtr root, child, next; 553ee519a1fSgjelinek 554ee519a1fSgjelinek root = xmlDocGetRootElement(handle->zone_dh_doc); 555ee519a1fSgjelinek for (child = root->xmlChildrenNode; child != NULL; child = next) { 556ee519a1fSgjelinek next = child->next; 557ee519a1fSgjelinek if (child->name == NULL) 558ee519a1fSgjelinek continue; 559ee519a1fSgjelinek if (xmlStrcmp(child->name, DTD_ELEM_PACKAGE) == 0 || 560ee519a1fSgjelinek xmlStrcmp(child->name, DTD_ELEM_PATCH) == 0) { 561ee519a1fSgjelinek next = child->next; 562ee519a1fSgjelinek xmlUnlinkNode(child); 563ee519a1fSgjelinek xmlFreeNode(child); 564ee519a1fSgjelinek } 565ee519a1fSgjelinek } 566ee519a1fSgjelinek } 567ee519a1fSgjelinek 5687c478bd9Sstevel@tonic-gate static int 569108322fbScarlsonj zonecfg_get_handle_impl(const char *zonename, const char *filename, 570108322fbScarlsonj zone_dochandle_t handle) 5717c478bd9Sstevel@tonic-gate { 5727c478bd9Sstevel@tonic-gate xmlValidCtxtPtr cvp; 5737c478bd9Sstevel@tonic-gate struct stat statbuf; 5747c478bd9Sstevel@tonic-gate int valid; 5757c478bd9Sstevel@tonic-gate 5767c478bd9Sstevel@tonic-gate if (zonename == NULL) 5777c478bd9Sstevel@tonic-gate return (Z_NO_ZONE); 5789acbbeafSnn35248 5797c478bd9Sstevel@tonic-gate if ((handle->zone_dh_doc = xmlParseFile(filename)) == NULL) { 5807c478bd9Sstevel@tonic-gate /* distinguish file not found vs. found but not parsed */ 5817c478bd9Sstevel@tonic-gate if (stat(filename, &statbuf) == 0) 5827c478bd9Sstevel@tonic-gate return (Z_INVALID_DOCUMENT); 5837c478bd9Sstevel@tonic-gate return (Z_NO_ZONE); 5847c478bd9Sstevel@tonic-gate } 5857c478bd9Sstevel@tonic-gate if ((cvp = xmlNewValidCtxt()) == NULL) 5867c478bd9Sstevel@tonic-gate return (Z_NOMEM); 5877c478bd9Sstevel@tonic-gate cvp->error = zonecfg_error_func; 5887c478bd9Sstevel@tonic-gate cvp->warning = zonecfg_error_func; 5897c478bd9Sstevel@tonic-gate valid = xmlValidateDocument(cvp, handle->zone_dh_doc); 5907c478bd9Sstevel@tonic-gate xmlFreeValidCtxt(cvp); 5917c478bd9Sstevel@tonic-gate if (valid == 0) 5927c478bd9Sstevel@tonic-gate return (Z_INVALID_DOCUMENT); 593087719fdSdp 5947c478bd9Sstevel@tonic-gate /* delete any comments such as inherited Sun copyright / ident str */ 595087719fdSdp stripcomments(handle); 5967c478bd9Sstevel@tonic-gate return (Z_OK); 5977c478bd9Sstevel@tonic-gate } 5987c478bd9Sstevel@tonic-gate 5997c478bd9Sstevel@tonic-gate int 600108322fbScarlsonj zonecfg_get_handle(const char *zonename, zone_dochandle_t handle) 6017c478bd9Sstevel@tonic-gate { 6027c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 6037c478bd9Sstevel@tonic-gate 604108322fbScarlsonj if (!config_file_path(zonename, path)) 605108322fbScarlsonj return (Z_MISC_FS); 606087719fdSdp handle->zone_dh_newzone = B_FALSE; 607087719fdSdp 6087c478bd9Sstevel@tonic-gate return (zonecfg_get_handle_impl(zonename, path, handle)); 6097c478bd9Sstevel@tonic-gate } 6107c478bd9Sstevel@tonic-gate 6117c478bd9Sstevel@tonic-gate int 612ee519a1fSgjelinek zonecfg_get_attach_handle(const char *path, const char *zonename, 613ee519a1fSgjelinek boolean_t preserve_sw, zone_dochandle_t handle) 614ee519a1fSgjelinek { 615ee519a1fSgjelinek char migpath[MAXPATHLEN]; 616ee519a1fSgjelinek int err; 617ee519a1fSgjelinek struct stat buf; 618ee519a1fSgjelinek 619ee519a1fSgjelinek if (snprintf(migpath, sizeof (migpath), "%s/root", path) >= 620ee519a1fSgjelinek sizeof (migpath)) 621ee519a1fSgjelinek return (Z_NOMEM); 622ee519a1fSgjelinek 623ee519a1fSgjelinek if (stat(migpath, &buf) == -1 || !S_ISDIR(buf.st_mode)) 624ee519a1fSgjelinek return (Z_NO_ZONE); 625ee519a1fSgjelinek 626ee519a1fSgjelinek if (snprintf(migpath, sizeof (migpath), "%s/%s", path, DETACHED) >= 627ee519a1fSgjelinek sizeof (migpath)) 628ee519a1fSgjelinek return (Z_NOMEM); 629ee519a1fSgjelinek 630ee519a1fSgjelinek if ((err = zonecfg_get_handle_impl(zonename, migpath, handle)) != Z_OK) 631ee519a1fSgjelinek return (err); 632ee519a1fSgjelinek 633ee519a1fSgjelinek if (!preserve_sw) 634ee519a1fSgjelinek strip_sw_inv(handle); 635ee519a1fSgjelinek 636ee519a1fSgjelinek handle->zone_dh_newzone = B_TRUE; 637ee519a1fSgjelinek if ((err = setrootattr(handle, DTD_ATTR_ZONEPATH, path)) != Z_OK) 638ee519a1fSgjelinek return (err); 639ee519a1fSgjelinek 640ee519a1fSgjelinek return (setrootattr(handle, DTD_ATTR_NAME, zonename)); 641ee519a1fSgjelinek } 642ee519a1fSgjelinek 643ee519a1fSgjelinek int 644108322fbScarlsonj zonecfg_get_snapshot_handle(const char *zonename, zone_dochandle_t handle) 6457c478bd9Sstevel@tonic-gate { 6467c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 6477c478bd9Sstevel@tonic-gate 648108322fbScarlsonj if (!snap_file_path(zonename, path)) 649108322fbScarlsonj return (Z_MISC_FS); 650087719fdSdp handle->zone_dh_newzone = B_FALSE; 6517c478bd9Sstevel@tonic-gate return (zonecfg_get_handle_impl(zonename, path, handle)); 6527c478bd9Sstevel@tonic-gate } 6537c478bd9Sstevel@tonic-gate 6547c478bd9Sstevel@tonic-gate int 655108322fbScarlsonj zonecfg_get_template_handle(const char *template, const char *zonename, 656087719fdSdp zone_dochandle_t handle) 657087719fdSdp { 658087719fdSdp char path[MAXPATHLEN]; 659087719fdSdp int err; 660087719fdSdp 661108322fbScarlsonj if (!config_file_path(template, path)) 662108322fbScarlsonj return (Z_MISC_FS); 663087719fdSdp 664087719fdSdp if ((err = zonecfg_get_handle_impl(template, path, handle)) != Z_OK) 665087719fdSdp return (err); 666087719fdSdp handle->zone_dh_newzone = B_TRUE; 667087719fdSdp return (setrootattr(handle, DTD_ATTR_NAME, zonename)); 668087719fdSdp } 669087719fdSdp 6709acbbeafSnn35248 int 6719acbbeafSnn35248 zonecfg_get_xml_handle(const char *path, zone_dochandle_t handle) 6729acbbeafSnn35248 { 6739acbbeafSnn35248 struct stat buf; 6749acbbeafSnn35248 int err; 6759acbbeafSnn35248 6769acbbeafSnn35248 if (stat(path, &buf) == -1) 6779acbbeafSnn35248 return (Z_MISC_FS); 6789acbbeafSnn35248 6799acbbeafSnn35248 if ((err = zonecfg_get_handle_impl("xml", path, handle)) != Z_OK) 6809acbbeafSnn35248 return (err); 6819acbbeafSnn35248 handle->zone_dh_newzone = B_TRUE; 6829acbbeafSnn35248 return (Z_OK); 6839acbbeafSnn35248 } 6849acbbeafSnn35248 6858cd327d5Sgjelinek /* 6868cd327d5Sgjelinek * Initialize two handles from the manifest read on fd. The rem_handle 6878cd327d5Sgjelinek * is initialized from the input file, including the sw inventory. The 6888cd327d5Sgjelinek * local_handle is initialized with the same zone configuration but with 6898cd327d5Sgjelinek * no sw inventory. 6908cd327d5Sgjelinek */ 6918cd327d5Sgjelinek int 6928cd327d5Sgjelinek zonecfg_attach_manifest(int fd, zone_dochandle_t local_handle, 6938cd327d5Sgjelinek zone_dochandle_t rem_handle) 6948cd327d5Sgjelinek { 6958cd327d5Sgjelinek xmlValidCtxtPtr cvp; 6968cd327d5Sgjelinek int valid; 6978cd327d5Sgjelinek 6988cd327d5Sgjelinek /* load the manifest into the handle for the remote system */ 6998cd327d5Sgjelinek if ((rem_handle->zone_dh_doc = xmlReadFd(fd, NULL, NULL, 0)) == NULL) { 7008cd327d5Sgjelinek return (Z_INVALID_DOCUMENT); 7018cd327d5Sgjelinek } 7028cd327d5Sgjelinek if ((cvp = xmlNewValidCtxt()) == NULL) 7038cd327d5Sgjelinek return (Z_NOMEM); 7048cd327d5Sgjelinek cvp->error = zonecfg_error_func; 7058cd327d5Sgjelinek cvp->warning = zonecfg_error_func; 7068cd327d5Sgjelinek valid = xmlValidateDocument(cvp, rem_handle->zone_dh_doc); 7078cd327d5Sgjelinek xmlFreeValidCtxt(cvp); 7088cd327d5Sgjelinek if (valid == 0) 7098cd327d5Sgjelinek return (Z_INVALID_DOCUMENT); 7108cd327d5Sgjelinek 7118cd327d5Sgjelinek /* delete any comments such as inherited Sun copyright / ident str */ 7128cd327d5Sgjelinek stripcomments(rem_handle); 7138cd327d5Sgjelinek 7148cd327d5Sgjelinek rem_handle->zone_dh_newzone = B_TRUE; 7158cd327d5Sgjelinek rem_handle->zone_dh_sw_inv = B_TRUE; 7168cd327d5Sgjelinek 7178cd327d5Sgjelinek /* 7188cd327d5Sgjelinek * Now use the remote system handle to generate a local system handle 7198cd327d5Sgjelinek * with an identical zones configuration but no sw inventory. 7208cd327d5Sgjelinek */ 7218cd327d5Sgjelinek if ((local_handle->zone_dh_doc = xmlCopyDoc(rem_handle->zone_dh_doc, 7228cd327d5Sgjelinek 1)) == NULL) { 7238cd327d5Sgjelinek return (Z_INVALID_DOCUMENT); 7248cd327d5Sgjelinek } 7258cd327d5Sgjelinek 7268cd327d5Sgjelinek /* 7278cd327d5Sgjelinek * We need to re-run xmlValidateDocument on local_handle to properly 7288cd327d5Sgjelinek * update the in-core representation of the configuration. 7298cd327d5Sgjelinek */ 7308cd327d5Sgjelinek if ((cvp = xmlNewValidCtxt()) == NULL) 7318cd327d5Sgjelinek return (Z_NOMEM); 7328cd327d5Sgjelinek cvp->error = zonecfg_error_func; 7338cd327d5Sgjelinek cvp->warning = zonecfg_error_func; 7348cd327d5Sgjelinek valid = xmlValidateDocument(cvp, local_handle->zone_dh_doc); 7358cd327d5Sgjelinek xmlFreeValidCtxt(cvp); 7368cd327d5Sgjelinek if (valid == 0) 7378cd327d5Sgjelinek return (Z_INVALID_DOCUMENT); 7388cd327d5Sgjelinek 7398cd327d5Sgjelinek strip_sw_inv(local_handle); 7408cd327d5Sgjelinek 7418cd327d5Sgjelinek local_handle->zone_dh_newzone = B_TRUE; 7428cd327d5Sgjelinek local_handle->zone_dh_sw_inv = B_FALSE; 7438cd327d5Sgjelinek 7448cd327d5Sgjelinek return (Z_OK); 7458cd327d5Sgjelinek } 7468cd327d5Sgjelinek 747087719fdSdp static boolean_t 748087719fdSdp is_renaming(zone_dochandle_t handle) 749087719fdSdp { 750087719fdSdp if (handle->zone_dh_newzone) 751087719fdSdp return (B_FALSE); 752087719fdSdp if (strlen(handle->zone_dh_delete_name) > 0) 753087719fdSdp return (B_TRUE); 754087719fdSdp return (B_FALSE); 755087719fdSdp } 756087719fdSdp 757087719fdSdp static boolean_t 758087719fdSdp is_new(zone_dochandle_t handle) 759087719fdSdp { 760087719fdSdp return (handle->zone_dh_newzone || handle->zone_dh_snapshot); 761087719fdSdp } 762087719fdSdp 763087719fdSdp static boolean_t 764087719fdSdp is_snapshot(zone_dochandle_t handle) 765087719fdSdp { 766087719fdSdp return (handle->zone_dh_snapshot); 767087719fdSdp } 768087719fdSdp 769087719fdSdp /* 770087719fdSdp * It would be great to be able to use libc's ctype(3c) macros, but we 771087719fdSdp * can't, as they are locale sensitive, and it would break our limited thread 772087719fdSdp * safety if this routine had to change the app locale on the fly. 773087719fdSdp */ 774087719fdSdp int 775108322fbScarlsonj zonecfg_validate_zonename(const char *zone) 776087719fdSdp { 777087719fdSdp int i; 778087719fdSdp 779087719fdSdp if (strcmp(zone, GLOBAL_ZONENAME) == 0) 780087719fdSdp return (Z_BOGUS_ZONE_NAME); 781087719fdSdp 782087719fdSdp if (strlen(zone) >= ZONENAME_MAX) 783087719fdSdp return (Z_BOGUS_ZONE_NAME); 784087719fdSdp 785087719fdSdp if (!((zone[0] >= 'a' && zone[0] <= 'z') || 786087719fdSdp (zone[0] >= 'A' && zone[0] <= 'Z') || 787087719fdSdp (zone[0] >= '0' && zone[0] <= '9'))) 788087719fdSdp return (Z_BOGUS_ZONE_NAME); 789087719fdSdp 790087719fdSdp for (i = 1; zone[i] != '\0'; i++) { 791087719fdSdp if (!((zone[i] >= 'a' && zone[i] <= 'z') || 792087719fdSdp (zone[i] >= 'A' && zone[i] <= 'Z') || 793087719fdSdp (zone[i] >= '0' && zone[i] <= '9') || 794087719fdSdp (zone[i] == '-') || (zone[i] == '_') || (zone[i] == '.'))) 795087719fdSdp return (Z_BOGUS_ZONE_NAME); 796087719fdSdp } 797087719fdSdp 798087719fdSdp return (Z_OK); 799087719fdSdp } 800087719fdSdp 801087719fdSdp /* 802087719fdSdp * Changing the zone name requires us to track both the old and new 803087719fdSdp * name of the zone until commit time. 804087719fdSdp */ 805087719fdSdp int 8067c478bd9Sstevel@tonic-gate zonecfg_get_name(zone_dochandle_t handle, char *name, size_t namesize) 8077c478bd9Sstevel@tonic-gate { 808a1be23daSdp return (getrootattr(handle, DTD_ATTR_NAME, name, namesize)); 8097c478bd9Sstevel@tonic-gate } 8107c478bd9Sstevel@tonic-gate 811a1be23daSdp int 812a1be23daSdp zonecfg_set_name(zone_dochandle_t handle, char *name) 813a1be23daSdp { 814087719fdSdp zone_state_t state; 815087719fdSdp char curname[ZONENAME_MAX], old_delname[ZONENAME_MAX]; 816087719fdSdp int err; 817087719fdSdp 818087719fdSdp if ((err = getrootattr(handle, DTD_ATTR_NAME, curname, 819087719fdSdp sizeof (curname))) != Z_OK) 820087719fdSdp return (err); 821087719fdSdp 822087719fdSdp if (strcmp(name, curname) == 0) 823087719fdSdp return (Z_OK); 824087719fdSdp 825087719fdSdp /* 826087719fdSdp * Switching zone names to one beginning with SUNW is not permitted. 827087719fdSdp */ 828087719fdSdp if (strncmp(name, "SUNW", 4) == 0) 829087719fdSdp return (Z_BOGUS_ZONE_NAME); 830087719fdSdp 831087719fdSdp if ((err = zonecfg_validate_zonename(name)) != Z_OK) 832087719fdSdp return (err); 833087719fdSdp 834087719fdSdp /* 835087719fdSdp * Setting the name back to the original name (effectively a revert of 836087719fdSdp * the name) is fine. But if we carry on, we'll falsely identify the 837087719fdSdp * name as "in use," so special case here. 838087719fdSdp */ 839087719fdSdp if (strcmp(name, handle->zone_dh_delete_name) == 0) { 840087719fdSdp err = setrootattr(handle, DTD_ATTR_NAME, name); 841087719fdSdp handle->zone_dh_delete_name[0] = '\0'; 842087719fdSdp return (err); 843087719fdSdp } 844087719fdSdp 845087719fdSdp /* Check to see if new name chosen is already in use */ 846087719fdSdp if (zone_get_state(name, &state) != Z_NO_ZONE) 847087719fdSdp return (Z_NAME_IN_USE); 848087719fdSdp 849087719fdSdp /* 850087719fdSdp * If this isn't already "new" or in a renaming transition, then 851087719fdSdp * we're initiating a rename here; so stash the "delete name" 852087719fdSdp * (i.e. the name of the zone we'll be removing) for the rename. 853087719fdSdp */ 854087719fdSdp (void) strlcpy(old_delname, handle->zone_dh_delete_name, 855087719fdSdp sizeof (old_delname)); 856087719fdSdp if (!is_new(handle) && !is_renaming(handle)) { 857087719fdSdp /* 858087719fdSdp * Name change is allowed only when the zone we're altering 859087719fdSdp * is not ready or running. 860087719fdSdp */ 861087719fdSdp err = zone_get_state(curname, &state); 862087719fdSdp if (err == Z_OK) { 863087719fdSdp if (state > ZONE_STATE_INSTALLED) 864087719fdSdp return (Z_BAD_ZONE_STATE); 865087719fdSdp } else if (err != Z_NO_ZONE) { 866087719fdSdp return (err); 867087719fdSdp } 868087719fdSdp 869087719fdSdp (void) strlcpy(handle->zone_dh_delete_name, curname, 870087719fdSdp sizeof (handle->zone_dh_delete_name)); 871087719fdSdp assert(is_renaming(handle)); 872087719fdSdp } else if (is_renaming(handle)) { 873087719fdSdp err = zone_get_state(handle->zone_dh_delete_name, &state); 874087719fdSdp if (err == Z_OK) { 875087719fdSdp if (state > ZONE_STATE_INSTALLED) 876087719fdSdp return (Z_BAD_ZONE_STATE); 877087719fdSdp } else if (err != Z_NO_ZONE) { 878087719fdSdp return (err); 879087719fdSdp } 880087719fdSdp } 881087719fdSdp 882087719fdSdp if ((err = setrootattr(handle, DTD_ATTR_NAME, name)) != Z_OK) { 883087719fdSdp /* 884087719fdSdp * Restore the deletename to whatever it was at the 885087719fdSdp * top of the routine, since we've had a failure. 886087719fdSdp */ 887087719fdSdp (void) strlcpy(handle->zone_dh_delete_name, old_delname, 888087719fdSdp sizeof (handle->zone_dh_delete_name)); 889087719fdSdp return (err); 890087719fdSdp } 891087719fdSdp 892087719fdSdp return (Z_OK); 8937c478bd9Sstevel@tonic-gate } 894a1be23daSdp 895a1be23daSdp int 896a1be23daSdp zonecfg_get_zonepath(zone_dochandle_t handle, char *path, size_t pathsize) 897a1be23daSdp { 898108322fbScarlsonj size_t len; 899108322fbScarlsonj 900108322fbScarlsonj if ((len = strlcpy(path, zonecfg_root, pathsize)) >= pathsize) 901108322fbScarlsonj return (Z_TOO_BIG); 902108322fbScarlsonj return (getrootattr(handle, DTD_ATTR_ZONEPATH, path + len, 903108322fbScarlsonj pathsize - len)); 904a1be23daSdp } 905a1be23daSdp 906a1be23daSdp int 907a1be23daSdp zonecfg_set_zonepath(zone_dochandle_t handle, char *zonepath) 908a1be23daSdp { 909555afedfScarlsonj size_t len; 910555afedfScarlsonj 911555afedfScarlsonj /* 912555afedfScarlsonj * The user deals in absolute paths in the running global zone, but the 913555afedfScarlsonj * internal configuration files deal with boot environment relative 914555afedfScarlsonj * paths. Strip out the alternate root when specified. 915555afedfScarlsonj */ 916555afedfScarlsonj len = strlen(zonecfg_root); 917555afedfScarlsonj if (strncmp(zonepath, zonecfg_root, len) != 0 || zonepath[len] != '/') 918555afedfScarlsonj return (Z_BAD_PROPERTY); 919555afedfScarlsonj zonepath += len; 920a1be23daSdp return (setrootattr(handle, DTD_ATTR_ZONEPATH, zonepath)); 921a1be23daSdp } 922a1be23daSdp 923a1be23daSdp int 9249acbbeafSnn35248 zonecfg_get_brand(zone_dochandle_t handle, char *brand, size_t brandsize) 9259acbbeafSnn35248 { 9269acbbeafSnn35248 int ret, sz; 9279acbbeafSnn35248 9289acbbeafSnn35248 ret = getrootattr(handle, DTD_ATTR_BRAND, brand, brandsize); 9299acbbeafSnn35248 9309acbbeafSnn35248 /* If the zone has no brand, it is native. */ 9319acbbeafSnn35248 if (ret == Z_OK && brand[0] == '\0') { 9329acbbeafSnn35248 sz = strlcpy(brand, NATIVE_BRAND_NAME, brandsize); 9339acbbeafSnn35248 if (sz >= brandsize) 9349acbbeafSnn35248 ret = Z_TOO_BIG; 9359acbbeafSnn35248 else 9369acbbeafSnn35248 ret = Z_OK; 9379acbbeafSnn35248 } 9389acbbeafSnn35248 9399acbbeafSnn35248 return (ret); 9409acbbeafSnn35248 } 9419acbbeafSnn35248 9429acbbeafSnn35248 int 9439acbbeafSnn35248 zonecfg_set_brand(zone_dochandle_t handle, char *brand) 9449acbbeafSnn35248 { 9459acbbeafSnn35248 return (setrootattr(handle, DTD_ATTR_BRAND, brand)); 9469acbbeafSnn35248 } 9479acbbeafSnn35248 9489acbbeafSnn35248 int 949a1be23daSdp zonecfg_get_autoboot(zone_dochandle_t handle, boolean_t *autoboot) 950a1be23daSdp { 951a1be23daSdp char autobootstr[DTD_ENTITY_BOOL_LEN]; 952a1be23daSdp int ret; 953a1be23daSdp 954a1be23daSdp if ((ret = getrootattr(handle, DTD_ATTR_AUTOBOOT, autobootstr, 955a1be23daSdp sizeof (autobootstr))) != Z_OK) 956a1be23daSdp return (ret); 957a1be23daSdp 958a1be23daSdp if (strcmp(autobootstr, DTD_ENTITY_TRUE) == 0) 959a1be23daSdp *autoboot = B_TRUE; 960a1be23daSdp else if (strcmp(autobootstr, DTD_ENTITY_FALSE) == 0) 961a1be23daSdp *autoboot = B_FALSE; 962a1be23daSdp else 963a1be23daSdp ret = Z_BAD_PROPERTY; 964a1be23daSdp return (ret); 965a1be23daSdp } 966a1be23daSdp 967a1be23daSdp int 968a1be23daSdp zonecfg_set_autoboot(zone_dochandle_t handle, boolean_t autoboot) 969a1be23daSdp { 970a1be23daSdp return (setrootattr(handle, DTD_ATTR_AUTOBOOT, 971a1be23daSdp autoboot ? DTD_ENTITY_TRUE : DTD_ENTITY_FALSE)); 972a1be23daSdp } 973a1be23daSdp 974a1be23daSdp int 975a1be23daSdp zonecfg_get_pool(zone_dochandle_t handle, char *pool, size_t poolsize) 976a1be23daSdp { 977a1be23daSdp return (getrootattr(handle, DTD_ATTR_POOL, pool, poolsize)); 978a1be23daSdp } 979a1be23daSdp 980a1be23daSdp int 981a1be23daSdp zonecfg_set_pool(zone_dochandle_t handle, char *pool) 982a1be23daSdp { 983a1be23daSdp return (setrootattr(handle, DTD_ATTR_POOL, pool)); 984a1be23daSdp } 985a1be23daSdp 986ffbafc53Scomay int 987ffbafc53Scomay zonecfg_get_limitpriv(zone_dochandle_t handle, char **limitpriv) 988ffbafc53Scomay { 989ffbafc53Scomay return (get_alloc_rootattr(handle, DTD_ATTR_LIMITPRIV, limitpriv)); 990ffbafc53Scomay } 991ffbafc53Scomay 992ffbafc53Scomay int 9933f2f09c1Sdp zonecfg_set_limitpriv(zone_dochandle_t handle, char *limitpriv) 994ffbafc53Scomay { 9953f2f09c1Sdp return (setrootattr(handle, DTD_ATTR_LIMITPRIV, limitpriv)); 9963f2f09c1Sdp } 9973f2f09c1Sdp 9983f2f09c1Sdp int 9993f2f09c1Sdp zonecfg_get_bootargs(zone_dochandle_t handle, char *bargs, size_t bargssize) 10003f2f09c1Sdp { 10013f2f09c1Sdp return (getrootattr(handle, DTD_ATTR_BOOTARGS, bargs, bargssize)); 10023f2f09c1Sdp } 10033f2f09c1Sdp 10043f2f09c1Sdp int 10053f2f09c1Sdp zonecfg_set_bootargs(zone_dochandle_t handle, char *bargs) 10063f2f09c1Sdp { 10073f2f09c1Sdp return (setrootattr(handle, DTD_ATTR_BOOTARGS, bargs)); 1008ffbafc53Scomay } 1009ffbafc53Scomay 10100209230bSgjelinek int 10110209230bSgjelinek zonecfg_get_sched_class(zone_dochandle_t handle, char *sched, size_t schedsize) 10120209230bSgjelinek { 10130209230bSgjelinek return (getrootattr(handle, DTD_ATTR_SCHED, sched, schedsize)); 10140209230bSgjelinek } 10150209230bSgjelinek 10160209230bSgjelinek int 10170209230bSgjelinek zonecfg_set_sched(zone_dochandle_t handle, char *sched) 10180209230bSgjelinek { 10190209230bSgjelinek return (setrootattr(handle, DTD_ATTR_SCHED, sched)); 10200209230bSgjelinek } 10210209230bSgjelinek 1022a1be23daSdp /* 1023a1be23daSdp * /etc/zones/index caches a vital piece of information which is also 1024a1be23daSdp * in the <zonename>.xml file: the path to the zone. This is for performance, 1025a1be23daSdp * since we need to walk all zonepath's in order to be able to detect conflicts 1026a1be23daSdp * (see crosscheck_zonepaths() in the zoneadm command). 1027087719fdSdp * 1028087719fdSdp * An additional complexity is that when doing a rename, we'd like the entire 1029087719fdSdp * index update operation (rename, and potential state changes) to be atomic. 1030087719fdSdp * In general, the operation of this function should succeed or fail as 1031087719fdSdp * a unit. 1032a1be23daSdp */ 1033a1be23daSdp int 1034a1be23daSdp zonecfg_refresh_index_file(zone_dochandle_t handle) 1035a1be23daSdp { 1036a1be23daSdp char name[ZONENAME_MAX], zonepath[MAXPATHLEN]; 1037a1be23daSdp struct zoneent ze; 1038a1be23daSdp int err; 1039087719fdSdp int opcode; 1040087719fdSdp char *zn; 1041087719fdSdp 1042087719fdSdp bzero(&ze, sizeof (ze)); 1043087719fdSdp ze.zone_state = -1; /* Preserve existing state in index */ 1044a1be23daSdp 1045a1be23daSdp if ((err = zonecfg_get_name(handle, name, sizeof (name))) != Z_OK) 1046a1be23daSdp return (err); 1047087719fdSdp (void) strlcpy(ze.zone_name, name, sizeof (ze.zone_name)); 1048087719fdSdp 1049a1be23daSdp if ((err = zonecfg_get_zonepath(handle, zonepath, 1050a1be23daSdp sizeof (zonepath))) != Z_OK) 1051a1be23daSdp return (err); 1052555afedfScarlsonj (void) strlcpy(ze.zone_path, zonepath + strlen(zonecfg_root), 1053555afedfScarlsonj sizeof (ze.zone_path)); 1054087719fdSdp 1055087719fdSdp if (is_renaming(handle)) { 1056087719fdSdp opcode = PZE_MODIFY; 1057087719fdSdp (void) strlcpy(ze.zone_name, handle->zone_dh_delete_name, 1058087719fdSdp sizeof (ze.zone_name)); 1059087719fdSdp (void) strlcpy(ze.zone_newname, name, sizeof (ze.zone_newname)); 1060087719fdSdp } else if (is_new(handle)) { 1061087719fdSdp FILE *cookie; 1062087719fdSdp /* 1063087719fdSdp * Be tolerant of the zone already existing in the index file, 1064087719fdSdp * since we might be forcibly overwriting an existing 1065087719fdSdp * configuration with a new one (for example 'create -F' 1066087719fdSdp * in zonecfg). 1067087719fdSdp */ 1068087719fdSdp opcode = PZE_ADD; 1069087719fdSdp cookie = setzoneent(); 1070087719fdSdp while ((zn = getzoneent(cookie)) != NULL) { 1071087719fdSdp if (strcmp(zn, name) == 0) { 1072087719fdSdp opcode = PZE_MODIFY; 1073087719fdSdp free(zn); 1074087719fdSdp break; 1075087719fdSdp } 1076087719fdSdp free(zn); 1077087719fdSdp } 1078087719fdSdp endzoneent(cookie); 1079087719fdSdp ze.zone_state = ZONE_STATE_CONFIGURED; 1080087719fdSdp } else { 1081087719fdSdp opcode = PZE_MODIFY; 10827c478bd9Sstevel@tonic-gate } 10837c478bd9Sstevel@tonic-gate 1084087719fdSdp if ((err = putzoneent(&ze, opcode)) != Z_OK) 1085087719fdSdp return (err); 1086087719fdSdp 1087087719fdSdp return (Z_OK); 1088087719fdSdp } 1089087719fdSdp 1090087719fdSdp /* 1091087719fdSdp * The goal of this routine is to cause the index file update and the 1092087719fdSdp * document save to happen as an atomic operation. We do the document 1093087719fdSdp * first, saving a backup copy using a hard link; if that succeeds, we go 1094087719fdSdp * on to the index. If that fails, we roll the document back into place. 1095087719fdSdp * 1096087719fdSdp * Strategy: 1097087719fdSdp * 1098087719fdSdp * New zone 'foo' configuration: 1099087719fdSdp * Create tmpfile (zonecfg.xxxxxx) 1100087719fdSdp * Write XML to tmpfile 1101087719fdSdp * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> foo.xml) 1102087719fdSdp * Add entry to index file 1103087719fdSdp * If it fails, delete foo.xml, leaving nothing behind. 1104087719fdSdp * 1105087719fdSdp * Save existing zone 'foo': 1106087719fdSdp * Make backup of foo.xml -> .backup 1107087719fdSdp * Create tmpfile (zonecfg.xxxxxx) 1108087719fdSdp * Write XML to tmpfile 1109087719fdSdp * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> foo.xml) 1110087719fdSdp * Modify index file as needed 1111087719fdSdp * If it fails, recover from .backup -> foo.xml 1112087719fdSdp * 1113087719fdSdp * Rename 'foo' to 'bar': 1114087719fdSdp * Create tmpfile (zonecfg.xxxxxx) 1115087719fdSdp * Write XML to tmpfile 1116087719fdSdp * Rename tmpfile to xmlfile (zonecfg.xxxxxx -> bar.xml) 1117087719fdSdp * Add entry for 'bar' to index file, Remove entry for 'foo' (refresh) 1118087719fdSdp * If it fails, delete bar.xml; foo.xml is left behind. 1119087719fdSdp */ 11207c478bd9Sstevel@tonic-gate static int 11217c478bd9Sstevel@tonic-gate zonecfg_save_impl(zone_dochandle_t handle, char *filename) 11227c478bd9Sstevel@tonic-gate { 11237c478bd9Sstevel@tonic-gate char tmpfile[MAXPATHLEN]; 1124087719fdSdp char bakdir[MAXPATHLEN], bakbase[MAXPATHLEN], bakfile[MAXPATHLEN]; 11259acbbeafSnn35248 int tmpfd, err, valid; 11267c478bd9Sstevel@tonic-gate xmlValidCtxt cvp = { NULL }; 1127087719fdSdp boolean_t backup; 11287c478bd9Sstevel@tonic-gate 11297c478bd9Sstevel@tonic-gate (void) strlcpy(tmpfile, filename, sizeof (tmpfile)); 11307c478bd9Sstevel@tonic-gate (void) dirname(tmpfile); 11317c478bd9Sstevel@tonic-gate (void) strlcat(tmpfile, _PATH_TMPFILE, sizeof (tmpfile)); 11327c478bd9Sstevel@tonic-gate 11337c478bd9Sstevel@tonic-gate tmpfd = mkstemp(tmpfile); 11347c478bd9Sstevel@tonic-gate if (tmpfd == -1) { 11357c478bd9Sstevel@tonic-gate (void) unlink(tmpfile); 11367c478bd9Sstevel@tonic-gate return (Z_TEMP_FILE); 11377c478bd9Sstevel@tonic-gate } 11387c478bd9Sstevel@tonic-gate (void) close(tmpfd); 11397c478bd9Sstevel@tonic-gate 11407c478bd9Sstevel@tonic-gate cvp.error = zonecfg_error_func; 11417c478bd9Sstevel@tonic-gate cvp.warning = zonecfg_error_func; 11427c478bd9Sstevel@tonic-gate 1143087719fdSdp /* 11449acbbeafSnn35248 * We do a final validation of the document. Since the library has 11459acbbeafSnn35248 * malfunctioned if it fails to validate, we follow-up with an 11469acbbeafSnn35248 * assert() that the doc is valid. 1147087719fdSdp */ 11489acbbeafSnn35248 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 11499acbbeafSnn35248 assert(valid != 0); 11507c478bd9Sstevel@tonic-gate 11517c478bd9Sstevel@tonic-gate if (xmlSaveFormatFile(tmpfile, handle->zone_dh_doc, 1) <= 0) 11527c478bd9Sstevel@tonic-gate goto err; 1153087719fdSdp 11547c478bd9Sstevel@tonic-gate (void) chmod(tmpfile, 0644); 11557c478bd9Sstevel@tonic-gate 1156087719fdSdp /* 1157087719fdSdp * In the event we are doing a standard save, hard link a copy of the 1158087719fdSdp * original file in .backup.<pid>.filename so we can restore it if 1159087719fdSdp * something goes wrong. 1160087719fdSdp */ 1161087719fdSdp if (!is_new(handle) && !is_renaming(handle)) { 1162087719fdSdp backup = B_TRUE; 1163087719fdSdp 1164087719fdSdp (void) strlcpy(bakdir, filename, sizeof (bakdir)); 1165087719fdSdp (void) strlcpy(bakbase, filename, sizeof (bakbase)); 1166087719fdSdp (void) snprintf(bakfile, sizeof (bakfile), "%s/.backup.%d.%s", 1167087719fdSdp dirname(bakdir), getpid(), basename(bakbase)); 1168087719fdSdp 1169087719fdSdp if (link(filename, bakfile) == -1) { 1170087719fdSdp err = errno; 11717c478bd9Sstevel@tonic-gate (void) unlink(tmpfile); 11727c478bd9Sstevel@tonic-gate if (errno == EACCES) 11737c478bd9Sstevel@tonic-gate return (Z_ACCES); 11747c478bd9Sstevel@tonic-gate return (Z_MISC_FS); 11757c478bd9Sstevel@tonic-gate } 1176087719fdSdp } 1177a1be23daSdp 1178087719fdSdp /* 1179087719fdSdp * Move the new document over top of the old. 1180087719fdSdp * i.e.: zonecfg.XXXXXX -> myzone.xml 1181087719fdSdp */ 1182087719fdSdp if (rename(tmpfile, filename) == -1) { 1183087719fdSdp err = errno; 1184087719fdSdp (void) unlink(tmpfile); 1185087719fdSdp if (backup) 1186087719fdSdp (void) unlink(bakfile); 1187087719fdSdp if (err == EACCES) 1188087719fdSdp return (Z_ACCES); 1189087719fdSdp return (Z_MISC_FS); 1190087719fdSdp } 1191087719fdSdp 1192087719fdSdp /* 1193087719fdSdp * If this is a snapshot, we're done-- don't add an index entry. 1194087719fdSdp */ 1195087719fdSdp if (is_snapshot(handle)) 1196087719fdSdp return (Z_OK); 1197087719fdSdp 1198087719fdSdp /* now update the index file to reflect whatever we just did */ 1199087719fdSdp if ((err = zonecfg_refresh_index_file(handle)) != Z_OK) { 1200087719fdSdp if (backup) { 1201087719fdSdp /* 1202087719fdSdp * Try to restore from our backup. 1203087719fdSdp */ 1204087719fdSdp (void) unlink(filename); 1205087719fdSdp (void) rename(bakfile, filename); 1206087719fdSdp } else { 1207087719fdSdp /* 1208087719fdSdp * Either the zone is new, in which case we can delete 1209087719fdSdp * new.xml, or we're doing a rename, so ditto. 1210087719fdSdp */ 1211087719fdSdp assert(is_new(handle) || is_renaming(handle)); 1212087719fdSdp (void) unlink(filename); 1213087719fdSdp } 1214087719fdSdp return (Z_UPDATING_INDEX); 1215087719fdSdp } 1216087719fdSdp 1217087719fdSdp if (backup) 1218087719fdSdp (void) unlink(bakfile); 1219087719fdSdp 1220087719fdSdp return (Z_OK); 12217c478bd9Sstevel@tonic-gate 12227c478bd9Sstevel@tonic-gate err: 12237c478bd9Sstevel@tonic-gate (void) unlink(tmpfile); 12247c478bd9Sstevel@tonic-gate return (Z_SAVING_FILE); 12257c478bd9Sstevel@tonic-gate } 12267c478bd9Sstevel@tonic-gate 12277c478bd9Sstevel@tonic-gate int 12287c478bd9Sstevel@tonic-gate zonecfg_save(zone_dochandle_t handle) 12297c478bd9Sstevel@tonic-gate { 1230087719fdSdp char zname[ZONENAME_MAX], path[MAXPATHLEN]; 1231087719fdSdp char delpath[MAXPATHLEN]; 1232087719fdSdp int err = Z_SAVING_FILE; 12337c478bd9Sstevel@tonic-gate 1234087719fdSdp if (zonecfg_check_handle(handle) != Z_OK) 1235087719fdSdp return (Z_BAD_HANDLE); 1236087719fdSdp 1237087719fdSdp /* 1238ee519a1fSgjelinek * We don't support saving snapshots or a tree containing a sw 1239ee519a1fSgjelinek * inventory at this time. 1240087719fdSdp */ 1241ee519a1fSgjelinek if (handle->zone_dh_snapshot || handle->zone_dh_sw_inv) 1242087719fdSdp return (Z_INVAL); 1243087719fdSdp 1244087719fdSdp if ((err = zonecfg_get_name(handle, zname, sizeof (zname))) != Z_OK) 12457c478bd9Sstevel@tonic-gate return (err); 1246087719fdSdp 1247108322fbScarlsonj if (!config_file_path(zname, path)) 1248108322fbScarlsonj return (Z_MISC_FS); 1249087719fdSdp 1250087719fdSdp addcomment(handle, "\n DO NOT EDIT THIS " 1251087719fdSdp "FILE. Use zonecfg(1M) instead.\n"); 1252087719fdSdp 1253087719fdSdp err = zonecfg_save_impl(handle, path); 1254087719fdSdp 1255087719fdSdp stripcomments(handle); 1256087719fdSdp 1257087719fdSdp if (err != Z_OK) 1258087719fdSdp return (err); 1259087719fdSdp 1260087719fdSdp handle->zone_dh_newzone = B_FALSE; 1261087719fdSdp 1262087719fdSdp if (is_renaming(handle)) { 1263108322fbScarlsonj if (config_file_path(handle->zone_dh_delete_name, delpath)) 1264087719fdSdp (void) unlink(delpath); 1265087719fdSdp handle->zone_dh_delete_name[0] = '\0'; 1266087719fdSdp } 1267087719fdSdp 1268087719fdSdp return (Z_OK); 12697c478bd9Sstevel@tonic-gate } 12707c478bd9Sstevel@tonic-gate 1271ee519a1fSgjelinek int 12729acbbeafSnn35248 zonecfg_verify_save(zone_dochandle_t handle, char *filename) 12739acbbeafSnn35248 { 12749acbbeafSnn35248 int valid; 12759acbbeafSnn35248 12769acbbeafSnn35248 xmlValidCtxt cvp = { NULL }; 12779acbbeafSnn35248 12789acbbeafSnn35248 if (zonecfg_check_handle(handle) != Z_OK) 12799acbbeafSnn35248 return (Z_BAD_HANDLE); 12809acbbeafSnn35248 12819acbbeafSnn35248 cvp.error = zonecfg_error_func; 12829acbbeafSnn35248 cvp.warning = zonecfg_error_func; 12839acbbeafSnn35248 12849acbbeafSnn35248 /* 12859acbbeafSnn35248 * We do a final validation of the document. Since the library has 12869acbbeafSnn35248 * malfunctioned if it fails to validate, we follow-up with an 12879acbbeafSnn35248 * assert() that the doc is valid. 12889acbbeafSnn35248 */ 12899acbbeafSnn35248 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 12909acbbeafSnn35248 assert(valid != 0); 12919acbbeafSnn35248 12929acbbeafSnn35248 if (xmlSaveFormatFile(filename, handle->zone_dh_doc, 1) <= 0) 12939acbbeafSnn35248 return (Z_SAVING_FILE); 12949acbbeafSnn35248 12959acbbeafSnn35248 return (Z_OK); 12969acbbeafSnn35248 } 12979acbbeafSnn35248 12989acbbeafSnn35248 int 12998cd327d5Sgjelinek zonecfg_detach_save(zone_dochandle_t handle, uint_t flags) 1300ee519a1fSgjelinek { 1301ee519a1fSgjelinek char zname[ZONENAME_MAX]; 1302ee519a1fSgjelinek char path[MAXPATHLEN]; 1303ee519a1fSgjelinek char migpath[MAXPATHLEN]; 1304ee519a1fSgjelinek xmlValidCtxt cvp = { NULL }; 1305ee519a1fSgjelinek int err = Z_SAVING_FILE; 13069acbbeafSnn35248 int valid; 1307ee519a1fSgjelinek 1308ee519a1fSgjelinek if (zonecfg_check_handle(handle) != Z_OK) 1309ee519a1fSgjelinek return (Z_BAD_HANDLE); 1310ee519a1fSgjelinek 1311ee519a1fSgjelinek /* 1312ee519a1fSgjelinek * We can only detach if we have taken a sw inventory. 1313ee519a1fSgjelinek */ 1314ee519a1fSgjelinek if (!handle->zone_dh_sw_inv) 1315ee519a1fSgjelinek return (Z_INVAL); 1316ee519a1fSgjelinek 13178cd327d5Sgjelinek if (flags & ZONE_DRY_RUN) { 13188cd327d5Sgjelinek (void) strlcpy(migpath, "-", sizeof (migpath)); 13198cd327d5Sgjelinek } else { 13208cd327d5Sgjelinek if ((err = zonecfg_get_name(handle, zname, sizeof (zname))) 13218cd327d5Sgjelinek != Z_OK) 1322ee519a1fSgjelinek return (err); 1323ee519a1fSgjelinek 13248cd327d5Sgjelinek if ((err = zone_get_zonepath(zname, path, sizeof (path))) 13258cd327d5Sgjelinek != Z_OK) 1326ee519a1fSgjelinek return (err); 1327ee519a1fSgjelinek 13288cd327d5Sgjelinek if (snprintf(migpath, sizeof (migpath), "%s/%s", path, DETACHED) 13298cd327d5Sgjelinek >= sizeof (migpath)) 1330ee519a1fSgjelinek return (Z_NOMEM); 13318cd327d5Sgjelinek } 1332ee519a1fSgjelinek 1333ee519a1fSgjelinek if ((err = operation_prep(handle)) != Z_OK) 1334ee519a1fSgjelinek return (err); 1335ee519a1fSgjelinek 1336ee519a1fSgjelinek addcomment(handle, "\n DO NOT EDIT THIS FILE. " 1337ee519a1fSgjelinek "Use zonecfg(1M) and zoneadm(1M) attach.\n"); 1338ee519a1fSgjelinek 1339ee519a1fSgjelinek cvp.error = zonecfg_error_func; 1340ee519a1fSgjelinek cvp.warning = zonecfg_error_func; 1341ee519a1fSgjelinek 1342ee519a1fSgjelinek /* 13439acbbeafSnn35248 * We do a final validation of the document. Since the library has 13449acbbeafSnn35248 * malfunctioned if it fails to validate, we follow-up with an 13459acbbeafSnn35248 * assert() that the doc is valid. 1346ee519a1fSgjelinek */ 13479acbbeafSnn35248 valid = xmlValidateDocument(&cvp, handle->zone_dh_doc); 13489acbbeafSnn35248 assert(valid != 0); 1349ee519a1fSgjelinek 1350ee519a1fSgjelinek if (xmlSaveFormatFile(migpath, handle->zone_dh_doc, 1) <= 0) 1351ee519a1fSgjelinek return (Z_SAVING_FILE); 1352ee519a1fSgjelinek 13538cd327d5Sgjelinek if (!(flags & ZONE_DRY_RUN)) 1354ee519a1fSgjelinek (void) chmod(migpath, 0644); 1355ee519a1fSgjelinek 1356ee519a1fSgjelinek stripcomments(handle); 1357ee519a1fSgjelinek 1358ee519a1fSgjelinek handle->zone_dh_newzone = B_FALSE; 1359ee519a1fSgjelinek 1360ee519a1fSgjelinek return (Z_OK); 1361ee519a1fSgjelinek } 1362ee519a1fSgjelinek 1363ee519a1fSgjelinek boolean_t 1364ee519a1fSgjelinek zonecfg_detached(const char *path) 1365ee519a1fSgjelinek { 1366ee519a1fSgjelinek char migpath[MAXPATHLEN]; 1367ee519a1fSgjelinek struct stat buf; 1368ee519a1fSgjelinek 1369ee519a1fSgjelinek if (snprintf(migpath, sizeof (migpath), "%s/%s", path, DETACHED) >= 1370ee519a1fSgjelinek sizeof (migpath)) 1371ee519a1fSgjelinek return (B_FALSE); 1372ee519a1fSgjelinek 1373ee519a1fSgjelinek if (stat(migpath, &buf) != -1) 1374ee519a1fSgjelinek return (B_TRUE); 1375ee519a1fSgjelinek 1376ee519a1fSgjelinek return (B_FALSE); 1377ee519a1fSgjelinek } 1378ee519a1fSgjelinek 1379ee519a1fSgjelinek void 1380ee519a1fSgjelinek zonecfg_rm_detached(zone_dochandle_t handle, boolean_t forced) 1381ee519a1fSgjelinek { 1382ee519a1fSgjelinek char zname[ZONENAME_MAX]; 1383ee519a1fSgjelinek char path[MAXPATHLEN]; 1384ee519a1fSgjelinek char detached[MAXPATHLEN]; 1385ee519a1fSgjelinek char attached[MAXPATHLEN]; 1386ee519a1fSgjelinek 1387ee519a1fSgjelinek if (zonecfg_check_handle(handle) != Z_OK) 1388ee519a1fSgjelinek return; 1389ee519a1fSgjelinek 1390ee519a1fSgjelinek if (zonecfg_get_name(handle, zname, sizeof (zname)) != Z_OK) 1391ee519a1fSgjelinek return; 1392ee519a1fSgjelinek 1393ee519a1fSgjelinek if (zone_get_zonepath(zname, path, sizeof (path)) != Z_OK) 1394ee519a1fSgjelinek return; 1395ee519a1fSgjelinek 1396ee519a1fSgjelinek (void) snprintf(detached, sizeof (detached), "%s/%s", path, DETACHED); 1397ee519a1fSgjelinek (void) snprintf(attached, sizeof (attached), "%s/%s", path, 1398ee519a1fSgjelinek ATTACH_FORCED); 1399ee519a1fSgjelinek 1400ee519a1fSgjelinek if (forced) { 1401ee519a1fSgjelinek (void) rename(detached, attached); 1402ee519a1fSgjelinek } else { 1403ee519a1fSgjelinek (void) unlink(attached); 1404ee519a1fSgjelinek (void) unlink(detached); 1405ee519a1fSgjelinek } 1406ee519a1fSgjelinek } 1407ee519a1fSgjelinek 14087c478bd9Sstevel@tonic-gate /* 14097c478bd9Sstevel@tonic-gate * Special case: if access(2) fails with ENOENT, then try again using 14107c478bd9Sstevel@tonic-gate * ZONE_CONFIG_ROOT instead of config_file_path(zonename). This is how we 14117c478bd9Sstevel@tonic-gate * work around the case of a config file which has not been created yet: 14127c478bd9Sstevel@tonic-gate * the user will need access to the directory so use that as a heuristic. 14137c478bd9Sstevel@tonic-gate */ 14147c478bd9Sstevel@tonic-gate 14157c478bd9Sstevel@tonic-gate int 14167c478bd9Sstevel@tonic-gate zonecfg_access(const char *zonename, int amode) 14177c478bd9Sstevel@tonic-gate { 14187c478bd9Sstevel@tonic-gate char path[MAXPATHLEN]; 14197c478bd9Sstevel@tonic-gate 1420108322fbScarlsonj if (!config_file_path(zonename, path)) 1421108322fbScarlsonj return (Z_INVAL); 14227c478bd9Sstevel@tonic-gate if (access(path, amode) == 0) 14237c478bd9Sstevel@tonic-gate return (Z_OK); 1424108322fbScarlsonj if (errno == ENOENT) { 1425108322fbScarlsonj if (snprintf(path, sizeof (path), "%s%s", zonecfg_root, 1426108322fbScarlsonj ZONE_CONFIG_ROOT) >= sizeof (path)) 1427108322fbScarlsonj return (Z_INVAL); 1428108322fbScarlsonj if (access(path, amode) == 0) 14297c478bd9Sstevel@tonic-gate return (Z_OK); 1430108322fbScarlsonj } 14317c478bd9Sstevel@tonic-gate if (errno == EACCES) 14327c478bd9Sstevel@tonic-gate return (Z_ACCES); 14337c478bd9Sstevel@tonic-gate if (errno == EINVAL) 14347c478bd9Sstevel@tonic-gate return (Z_INVAL); 14357c478bd9Sstevel@tonic-gate return (Z_MISC_FS); 14367c478bd9Sstevel@tonic-gate } 14377c478bd9Sstevel@tonic-gate 14387c478bd9Sstevel@tonic-gate int 1439108322fbScarlsonj zonecfg_create_snapshot(const char *zonename) 14407c478bd9Sstevel@tonic-gate { 14417c478bd9Sstevel@tonic-gate zone_dochandle_t handle; 14427c478bd9Sstevel@tonic-gate char path[MAXPATHLEN], zonepath[MAXPATHLEN], rpath[MAXPATHLEN]; 14437c478bd9Sstevel@tonic-gate int error = Z_OK, res; 14447c478bd9Sstevel@tonic-gate 14457c478bd9Sstevel@tonic-gate if ((handle = zonecfg_init_handle()) == NULL) { 14467c478bd9Sstevel@tonic-gate return (Z_NOMEM); 14477c478bd9Sstevel@tonic-gate } 14487c478bd9Sstevel@tonic-gate 1449087719fdSdp handle->zone_dh_newzone = B_TRUE; 1450087719fdSdp handle->zone_dh_snapshot = B_TRUE; 1451087719fdSdp 14527c478bd9Sstevel@tonic-gate if ((error = zonecfg_get_handle(zonename, handle)) != Z_OK) 14537c478bd9Sstevel@tonic-gate goto out; 14547c478bd9Sstevel@tonic-gate if ((error = operation_prep(handle)) != Z_OK) 14557c478bd9Sstevel@tonic-gate goto out; 14567c478bd9Sstevel@tonic-gate error = zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)); 14577c478bd9Sstevel@tonic-gate if (error != Z_OK) 14587c478bd9Sstevel@tonic-gate goto out; 14597c478bd9Sstevel@tonic-gate if ((res = resolvepath(zonepath, rpath, sizeof (rpath))) == -1) { 14607c478bd9Sstevel@tonic-gate error = Z_RESOLVED_PATH; 14617c478bd9Sstevel@tonic-gate goto out; 14627c478bd9Sstevel@tonic-gate } 14637c478bd9Sstevel@tonic-gate /* 14647c478bd9Sstevel@tonic-gate * If the resolved path is not the same as the original path, then 14657c478bd9Sstevel@tonic-gate * save the resolved path in the snapshot, thus preventing any 14667c478bd9Sstevel@tonic-gate * potential problems down the line when zoneadmd goes to unmount 14677c478bd9Sstevel@tonic-gate * file systems and depends on initial string matches with resolved 14687c478bd9Sstevel@tonic-gate * paths. 14697c478bd9Sstevel@tonic-gate */ 14707c478bd9Sstevel@tonic-gate rpath[res] = '\0'; 14717c478bd9Sstevel@tonic-gate if (strcmp(zonepath, rpath) != 0) { 14727c478bd9Sstevel@tonic-gate if ((error = zonecfg_set_zonepath(handle, rpath)) != Z_OK) 14737c478bd9Sstevel@tonic-gate goto out; 14747c478bd9Sstevel@tonic-gate } 1475108322fbScarlsonj if (snprintf(path, sizeof (path), "%s%s", zonecfg_root, 1476108322fbScarlsonj ZONE_SNAPSHOT_ROOT) >= sizeof (path)) { 1477108322fbScarlsonj error = Z_MISC_FS; 1478108322fbScarlsonj goto out; 1479108322fbScarlsonj } 1480108322fbScarlsonj if ((mkdir(path, S_IRWXU) == -1) && (errno != EEXIST)) { 14817c478bd9Sstevel@tonic-gate error = Z_MISC_FS; 14827c478bd9Sstevel@tonic-gate goto out; 14837c478bd9Sstevel@tonic-gate } 14847c478bd9Sstevel@tonic-gate 1485108322fbScarlsonj if (!snap_file_path(zonename, path)) { 1486108322fbScarlsonj error = Z_MISC_FS; 1487108322fbScarlsonj goto out; 1488108322fbScarlsonj } 1489087719fdSdp 1490087719fdSdp addcomment(handle, "\n DO NOT EDIT THIS FILE. " 1491087719fdSdp "It is a snapshot of running zone state.\n"); 1492087719fdSdp 14937c478bd9Sstevel@tonic-gate error = zonecfg_save_impl(handle, path); 14947c478bd9Sstevel@tonic-gate 1495087719fdSdp stripcomments(handle); 1496087719fdSdp 14977c478bd9Sstevel@tonic-gate out: 14987c478bd9Sstevel@tonic-gate zonecfg_fini_handle(handle); 14997c478bd9Sstevel@tonic-gate return (error); 15007c478bd9Sstevel@tonic-gate } 15017c478bd9Sstevel@tonic-gate 1502f4b3ec61Sdh155122 int 1503f4b3ec61Sdh155122 zonecfg_get_iptype(zone_dochandle_t handle, zone_iptype_t *iptypep) 1504f4b3ec61Sdh155122 { 1505f4b3ec61Sdh155122 char property[10]; /* 10 is big enough for "shared"/"exclusive" */ 1506f4b3ec61Sdh155122 int err; 1507f4b3ec61Sdh155122 1508f4b3ec61Sdh155122 err = getrootattr(handle, DTD_ATTR_IPTYPE, property, sizeof (property)); 1509f4b3ec61Sdh155122 if (err == Z_BAD_PROPERTY) { 1510f4b3ec61Sdh155122 /* Return default value */ 1511f4b3ec61Sdh155122 *iptypep = ZS_SHARED; 1512f4b3ec61Sdh155122 return (Z_OK); 1513f4b3ec61Sdh155122 } else if (err != Z_OK) { 1514f4b3ec61Sdh155122 return (err); 1515f4b3ec61Sdh155122 } 1516f4b3ec61Sdh155122 1517f4b3ec61Sdh155122 if (strlen(property) == 0 || 1518f4b3ec61Sdh155122 strcmp(property, "shared") == 0) 1519f4b3ec61Sdh155122 *iptypep = ZS_SHARED; 1520f4b3ec61Sdh155122 else if (strcmp(property, "exclusive") == 0) 1521f4b3ec61Sdh155122 *iptypep = ZS_EXCLUSIVE; 1522f4b3ec61Sdh155122 else 1523f4b3ec61Sdh155122 return (Z_INVAL); 1524f4b3ec61Sdh155122 1525f4b3ec61Sdh155122 return (Z_OK); 1526f4b3ec61Sdh155122 } 1527f4b3ec61Sdh155122 1528f4b3ec61Sdh155122 int 1529f4b3ec61Sdh155122 zonecfg_set_iptype(zone_dochandle_t handle, zone_iptype_t iptype) 1530f4b3ec61Sdh155122 { 1531f4b3ec61Sdh155122 xmlNodePtr cur; 1532f4b3ec61Sdh155122 1533f4b3ec61Sdh155122 if (handle == NULL) 1534f4b3ec61Sdh155122 return (Z_INVAL); 1535f4b3ec61Sdh155122 1536f4b3ec61Sdh155122 cur = xmlDocGetRootElement(handle->zone_dh_doc); 1537f4b3ec61Sdh155122 if (cur == NULL) { 1538f4b3ec61Sdh155122 return (Z_EMPTY_DOCUMENT); 1539f4b3ec61Sdh155122 } 1540f4b3ec61Sdh155122 1541f4b3ec61Sdh155122 if (xmlStrcmp(cur->name, DTD_ELEM_ZONE) != 0) { 1542f4b3ec61Sdh155122 return (Z_WRONG_DOC_TYPE); 1543f4b3ec61Sdh155122 } 1544f4b3ec61Sdh155122 switch (iptype) { 1545f4b3ec61Sdh155122 case ZS_SHARED: 1546f4b3ec61Sdh155122 /* 1547f4b3ec61Sdh155122 * Since "shared" is the default, we don't write it to the 1548f4b3ec61Sdh155122 * configuration file, so that it's easier to migrate those 1549f4b3ec61Sdh155122 * zones elsewhere, eg., to systems which are not IP-Instances 1550f4b3ec61Sdh155122 * aware. 1551f4b3ec61Sdh155122 * xmlUnsetProp only fails when the attribute doesn't exist, 1552f4b3ec61Sdh155122 * which we don't care. 1553f4b3ec61Sdh155122 */ 1554f4b3ec61Sdh155122 (void) xmlUnsetProp(cur, DTD_ATTR_IPTYPE); 1555f4b3ec61Sdh155122 break; 1556f4b3ec61Sdh155122 case ZS_EXCLUSIVE: 1557f4b3ec61Sdh155122 if (xmlSetProp(cur, DTD_ATTR_IPTYPE, 1558f4b3ec61Sdh155122 (const xmlChar *) "exclusive") == NULL) 1559f4b3ec61Sdh155122 return (Z_INVAL); 1560f4b3ec61Sdh155122 break; 1561f4b3ec61Sdh155122 } 1562f4b3ec61Sdh155122 return (Z_OK); 1563f4b3ec61Sdh155122 } 1564f4b3ec61Sdh155122 15657c478bd9Sstevel@tonic-gate static int 1566a1be23daSdp newprop(xmlNodePtr node, const xmlChar *attrname, char *src) 15677c478bd9Sstevel@tonic-gate { 15687c478bd9Sstevel@tonic-gate xmlAttrPtr newattr; 15697c478bd9Sstevel@tonic-gate 15707c478bd9Sstevel@tonic-gate newattr = xmlNewProp(node, attrname, (xmlChar *)src); 15717c478bd9Sstevel@tonic-gate if (newattr == NULL) { 15727c478bd9Sstevel@tonic-gate xmlUnlinkNode(node); 15737c478bd9Sstevel@tonic-gate xmlFreeNode(node); 15747c478bd9Sstevel@tonic-gate return (Z_BAD_PROPERTY); 15757c478bd9Sstevel@tonic-gate } 15767c478bd9Sstevel@tonic-gate return (Z_OK); 15777c478bd9Sstevel@tonic-gate } 15787c478bd9Sstevel@tonic-gate 15797c478bd9Sstevel@tonic-gate static int 15807c478bd9Sstevel@tonic-gate zonecfg_add_filesystem_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 15817c478bd9Sstevel@tonic-gate { 15827c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur, options_node; 15837c478bd9Sstevel@tonic-gate zone_fsopt_t *ptr; 15847c478bd9Sstevel@tonic-gate int err; 15857c478bd9Sstevel@tonic-gate 15867c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_FS, NULL); 1587a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_SPECIAL, 15887c478bd9Sstevel@tonic-gate tabptr->zone_fs_special)) != Z_OK) 15897c478bd9Sstevel@tonic-gate return (err); 15907c478bd9Sstevel@tonic-gate if (tabptr->zone_fs_raw[0] != '\0' && 1591a1be23daSdp (err = newprop(newnode, DTD_ATTR_RAW, tabptr->zone_fs_raw)) != Z_OK) 15927c478bd9Sstevel@tonic-gate return (err); 1593a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_DIR, tabptr->zone_fs_dir)) != Z_OK) 15947c478bd9Sstevel@tonic-gate return (err); 1595a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_TYPE, 15967c478bd9Sstevel@tonic-gate tabptr->zone_fs_type)) != Z_OK) 15977c478bd9Sstevel@tonic-gate return (err); 15987c478bd9Sstevel@tonic-gate if (tabptr->zone_fs_options != NULL) { 15997c478bd9Sstevel@tonic-gate for (ptr = tabptr->zone_fs_options; ptr != NULL; 16007c478bd9Sstevel@tonic-gate ptr = ptr->zone_fsopt_next) { 16017c478bd9Sstevel@tonic-gate options_node = xmlNewTextChild(newnode, NULL, 16027c478bd9Sstevel@tonic-gate DTD_ELEM_FSOPTION, NULL); 1603a1be23daSdp if ((err = newprop(options_node, DTD_ATTR_NAME, 16047c478bd9Sstevel@tonic-gate ptr->zone_fsopt_opt)) != Z_OK) 16057c478bd9Sstevel@tonic-gate return (err); 16067c478bd9Sstevel@tonic-gate } 16077c478bd9Sstevel@tonic-gate } 16087c478bd9Sstevel@tonic-gate return (Z_OK); 16097c478bd9Sstevel@tonic-gate } 16107c478bd9Sstevel@tonic-gate 16117c478bd9Sstevel@tonic-gate int 16127c478bd9Sstevel@tonic-gate zonecfg_add_filesystem(zone_dochandle_t handle, struct zone_fstab *tabptr) 16137c478bd9Sstevel@tonic-gate { 16147c478bd9Sstevel@tonic-gate int err; 16157c478bd9Sstevel@tonic-gate 16167c478bd9Sstevel@tonic-gate if (tabptr == NULL) 16177c478bd9Sstevel@tonic-gate return (Z_INVAL); 16187c478bd9Sstevel@tonic-gate 16197c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 16207c478bd9Sstevel@tonic-gate return (err); 16217c478bd9Sstevel@tonic-gate 16227c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_filesystem_core(handle, tabptr)) != Z_OK) 16237c478bd9Sstevel@tonic-gate return (err); 16247c478bd9Sstevel@tonic-gate 16257c478bd9Sstevel@tonic-gate return (Z_OK); 16267c478bd9Sstevel@tonic-gate } 16277c478bd9Sstevel@tonic-gate 16287c478bd9Sstevel@tonic-gate static int 16297c478bd9Sstevel@tonic-gate zonecfg_add_ipd_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 16307c478bd9Sstevel@tonic-gate { 16317c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur; 16327c478bd9Sstevel@tonic-gate int err; 16337c478bd9Sstevel@tonic-gate 16347c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_IPD, NULL); 1635a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_DIR, tabptr->zone_fs_dir)) != Z_OK) 16367c478bd9Sstevel@tonic-gate return (err); 16377c478bd9Sstevel@tonic-gate return (Z_OK); 16387c478bd9Sstevel@tonic-gate } 16397c478bd9Sstevel@tonic-gate 16407c478bd9Sstevel@tonic-gate int 16417c478bd9Sstevel@tonic-gate zonecfg_add_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 16427c478bd9Sstevel@tonic-gate { 16437c478bd9Sstevel@tonic-gate int err; 16447c478bd9Sstevel@tonic-gate 16457c478bd9Sstevel@tonic-gate if (tabptr == NULL) 16467c478bd9Sstevel@tonic-gate return (Z_INVAL); 16477c478bd9Sstevel@tonic-gate 16487c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 16497c478bd9Sstevel@tonic-gate return (err); 16507c478bd9Sstevel@tonic-gate 16517c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_ipd_core(handle, tabptr)) != Z_OK) 16527c478bd9Sstevel@tonic-gate return (err); 16537c478bd9Sstevel@tonic-gate 16547c478bd9Sstevel@tonic-gate return (Z_OK); 16557c478bd9Sstevel@tonic-gate } 16567c478bd9Sstevel@tonic-gate 16577c478bd9Sstevel@tonic-gate int 16587c478bd9Sstevel@tonic-gate zonecfg_add_fs_option(struct zone_fstab *tabptr, char *option) 16597c478bd9Sstevel@tonic-gate { 16607c478bd9Sstevel@tonic-gate zone_fsopt_t *last, *old, *new; 16617c478bd9Sstevel@tonic-gate 16627c478bd9Sstevel@tonic-gate last = tabptr->zone_fs_options; 16637c478bd9Sstevel@tonic-gate for (old = last; old != NULL; old = old->zone_fsopt_next) 16647c478bd9Sstevel@tonic-gate last = old; /* walk to the end of the list */ 16657c478bd9Sstevel@tonic-gate new = (zone_fsopt_t *)malloc(sizeof (zone_fsopt_t)); 16667c478bd9Sstevel@tonic-gate if (new == NULL) 16677c478bd9Sstevel@tonic-gate return (Z_NOMEM); 16687c478bd9Sstevel@tonic-gate (void) strlcpy(new->zone_fsopt_opt, option, 16697c478bd9Sstevel@tonic-gate sizeof (new->zone_fsopt_opt)); 16707c478bd9Sstevel@tonic-gate new->zone_fsopt_next = NULL; 16717c478bd9Sstevel@tonic-gate if (last == NULL) 16727c478bd9Sstevel@tonic-gate tabptr->zone_fs_options = new; 16737c478bd9Sstevel@tonic-gate else 16747c478bd9Sstevel@tonic-gate last->zone_fsopt_next = new; 16757c478bd9Sstevel@tonic-gate return (Z_OK); 16767c478bd9Sstevel@tonic-gate } 16777c478bd9Sstevel@tonic-gate 16787c478bd9Sstevel@tonic-gate int 16797c478bd9Sstevel@tonic-gate zonecfg_remove_fs_option(struct zone_fstab *tabptr, char *option) 16807c478bd9Sstevel@tonic-gate { 16817c478bd9Sstevel@tonic-gate zone_fsopt_t *last, *this, *next; 16827c478bd9Sstevel@tonic-gate 16837c478bd9Sstevel@tonic-gate last = tabptr->zone_fs_options; 16847c478bd9Sstevel@tonic-gate for (this = last; this != NULL; this = this->zone_fsopt_next) { 16857c478bd9Sstevel@tonic-gate if (strcmp(this->zone_fsopt_opt, option) == 0) { 16867c478bd9Sstevel@tonic-gate next = this->zone_fsopt_next; 16877c478bd9Sstevel@tonic-gate if (this == tabptr->zone_fs_options) 16887c478bd9Sstevel@tonic-gate tabptr->zone_fs_options = next; 16897c478bd9Sstevel@tonic-gate else 16907c478bd9Sstevel@tonic-gate last->zone_fsopt_next = next; 16917c478bd9Sstevel@tonic-gate free(this); 16927c478bd9Sstevel@tonic-gate return (Z_OK); 16937c478bd9Sstevel@tonic-gate } else 16947c478bd9Sstevel@tonic-gate last = this; 16957c478bd9Sstevel@tonic-gate } 16967c478bd9Sstevel@tonic-gate return (Z_NO_PROPERTY_ID); 16977c478bd9Sstevel@tonic-gate } 16987c478bd9Sstevel@tonic-gate 16997c478bd9Sstevel@tonic-gate void 17007c478bd9Sstevel@tonic-gate zonecfg_free_fs_option_list(zone_fsopt_t *list) 17017c478bd9Sstevel@tonic-gate { 17027c478bd9Sstevel@tonic-gate zone_fsopt_t *this, *next; 17037c478bd9Sstevel@tonic-gate 17047c478bd9Sstevel@tonic-gate for (this = list; this != NULL; this = next) { 17057c478bd9Sstevel@tonic-gate next = this->zone_fsopt_next; 17067c478bd9Sstevel@tonic-gate free(this); 17077c478bd9Sstevel@tonic-gate } 17087c478bd9Sstevel@tonic-gate } 17097c478bd9Sstevel@tonic-gate 17107c478bd9Sstevel@tonic-gate void 17117c478bd9Sstevel@tonic-gate zonecfg_free_rctl_value_list(struct zone_rctlvaltab *valtab) 17127c478bd9Sstevel@tonic-gate { 17137c478bd9Sstevel@tonic-gate if (valtab == NULL) 17147c478bd9Sstevel@tonic-gate return; 17157c478bd9Sstevel@tonic-gate zonecfg_free_rctl_value_list(valtab->zone_rctlval_next); 17167c478bd9Sstevel@tonic-gate free(valtab); 17177c478bd9Sstevel@tonic-gate } 17187c478bd9Sstevel@tonic-gate 17197c478bd9Sstevel@tonic-gate static boolean_t 17207c478bd9Sstevel@tonic-gate match_prop(xmlNodePtr cur, const xmlChar *attr, char *user_prop) 17217c478bd9Sstevel@tonic-gate { 17227c478bd9Sstevel@tonic-gate xmlChar *gotten_prop; 17237c478bd9Sstevel@tonic-gate int prop_result; 17247c478bd9Sstevel@tonic-gate 17257c478bd9Sstevel@tonic-gate gotten_prop = xmlGetProp(cur, attr); 17267c478bd9Sstevel@tonic-gate if (gotten_prop == NULL) /* shouldn't happen */ 17277c478bd9Sstevel@tonic-gate return (B_FALSE); 17287c478bd9Sstevel@tonic-gate prop_result = xmlStrcmp(gotten_prop, (const xmlChar *) user_prop); 17297c478bd9Sstevel@tonic-gate xmlFree(gotten_prop); 17307c478bd9Sstevel@tonic-gate return ((prop_result == 0)); 17317c478bd9Sstevel@tonic-gate } 17327c478bd9Sstevel@tonic-gate 17337c478bd9Sstevel@tonic-gate static int 17347c478bd9Sstevel@tonic-gate zonecfg_delete_filesystem_core(zone_dochandle_t handle, 17357c478bd9Sstevel@tonic-gate struct zone_fstab *tabptr) 17367c478bd9Sstevel@tonic-gate { 17377c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 17387c478bd9Sstevel@tonic-gate boolean_t dir_match, spec_match, raw_match, type_match; 17397c478bd9Sstevel@tonic-gate 17407c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 17417c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_FS)) 17427c478bd9Sstevel@tonic-gate continue; 17437c478bd9Sstevel@tonic-gate dir_match = match_prop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir); 17447c478bd9Sstevel@tonic-gate spec_match = match_prop(cur, DTD_ATTR_SPECIAL, 17457c478bd9Sstevel@tonic-gate tabptr->zone_fs_special); 17467c478bd9Sstevel@tonic-gate raw_match = match_prop(cur, DTD_ATTR_RAW, 17477c478bd9Sstevel@tonic-gate tabptr->zone_fs_raw); 17487c478bd9Sstevel@tonic-gate type_match = match_prop(cur, DTD_ATTR_TYPE, 17497c478bd9Sstevel@tonic-gate tabptr->zone_fs_type); 17507c478bd9Sstevel@tonic-gate if (dir_match && spec_match && raw_match && type_match) { 17517c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 17527c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 17537c478bd9Sstevel@tonic-gate return (Z_OK); 17547c478bd9Sstevel@tonic-gate } 17557c478bd9Sstevel@tonic-gate } 17567c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 17577c478bd9Sstevel@tonic-gate } 17587c478bd9Sstevel@tonic-gate 17597c478bd9Sstevel@tonic-gate int 17607c478bd9Sstevel@tonic-gate zonecfg_delete_filesystem(zone_dochandle_t handle, struct zone_fstab *tabptr) 17617c478bd9Sstevel@tonic-gate { 17627c478bd9Sstevel@tonic-gate int err; 17637c478bd9Sstevel@tonic-gate 17647c478bd9Sstevel@tonic-gate if (tabptr == NULL) 17657c478bd9Sstevel@tonic-gate return (Z_INVAL); 17667c478bd9Sstevel@tonic-gate 17677c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 17687c478bd9Sstevel@tonic-gate return (err); 17697c478bd9Sstevel@tonic-gate 17707c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_filesystem_core(handle, tabptr)) != Z_OK) 17717c478bd9Sstevel@tonic-gate return (err); 17727c478bd9Sstevel@tonic-gate 17737c478bd9Sstevel@tonic-gate return (Z_OK); 17747c478bd9Sstevel@tonic-gate } 17757c478bd9Sstevel@tonic-gate 17767c478bd9Sstevel@tonic-gate int 17777c478bd9Sstevel@tonic-gate zonecfg_modify_filesystem( 17787c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 17797c478bd9Sstevel@tonic-gate struct zone_fstab *oldtabptr, 17807c478bd9Sstevel@tonic-gate struct zone_fstab *newtabptr) 17817c478bd9Sstevel@tonic-gate { 17827c478bd9Sstevel@tonic-gate int err; 17837c478bd9Sstevel@tonic-gate 17847c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 17857c478bd9Sstevel@tonic-gate return (Z_INVAL); 17867c478bd9Sstevel@tonic-gate 17877c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 17887c478bd9Sstevel@tonic-gate return (err); 17897c478bd9Sstevel@tonic-gate 17907c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_filesystem_core(handle, oldtabptr)) != Z_OK) 17917c478bd9Sstevel@tonic-gate return (err); 17927c478bd9Sstevel@tonic-gate 17937c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_filesystem_core(handle, newtabptr)) != Z_OK) 17947c478bd9Sstevel@tonic-gate return (err); 17957c478bd9Sstevel@tonic-gate 17967c478bd9Sstevel@tonic-gate return (Z_OK); 17977c478bd9Sstevel@tonic-gate } 17987c478bd9Sstevel@tonic-gate 17997c478bd9Sstevel@tonic-gate static int 18007c478bd9Sstevel@tonic-gate zonecfg_delete_ipd_core(zone_dochandle_t handle, struct zone_fstab *tabptr) 18017c478bd9Sstevel@tonic-gate { 18027c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 18037c478bd9Sstevel@tonic-gate 18047c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 18057c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_IPD)) 18067c478bd9Sstevel@tonic-gate continue; 18077c478bd9Sstevel@tonic-gate if (match_prop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir)) { 18087c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 18097c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 18107c478bd9Sstevel@tonic-gate return (Z_OK); 18117c478bd9Sstevel@tonic-gate } 18127c478bd9Sstevel@tonic-gate } 18137c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 18147c478bd9Sstevel@tonic-gate } 18157c478bd9Sstevel@tonic-gate 18167c478bd9Sstevel@tonic-gate int 18177c478bd9Sstevel@tonic-gate zonecfg_delete_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 18187c478bd9Sstevel@tonic-gate { 18197c478bd9Sstevel@tonic-gate int err; 18207c478bd9Sstevel@tonic-gate 18217c478bd9Sstevel@tonic-gate if (tabptr == NULL) 18227c478bd9Sstevel@tonic-gate return (Z_INVAL); 18237c478bd9Sstevel@tonic-gate 18247c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 18257c478bd9Sstevel@tonic-gate return (err); 18267c478bd9Sstevel@tonic-gate 18277c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_ipd_core(handle, tabptr)) != Z_OK) 18287c478bd9Sstevel@tonic-gate return (err); 18297c478bd9Sstevel@tonic-gate 18307c478bd9Sstevel@tonic-gate return (Z_OK); 18317c478bd9Sstevel@tonic-gate } 18327c478bd9Sstevel@tonic-gate 18337c478bd9Sstevel@tonic-gate int 18347c478bd9Sstevel@tonic-gate zonecfg_modify_ipd(zone_dochandle_t handle, struct zone_fstab *oldtabptr, 18357c478bd9Sstevel@tonic-gate struct zone_fstab *newtabptr) 18367c478bd9Sstevel@tonic-gate { 18377c478bd9Sstevel@tonic-gate int err; 18387c478bd9Sstevel@tonic-gate 18397c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 18407c478bd9Sstevel@tonic-gate return (Z_INVAL); 18417c478bd9Sstevel@tonic-gate 18427c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 18437c478bd9Sstevel@tonic-gate return (err); 18447c478bd9Sstevel@tonic-gate 18457c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_ipd_core(handle, oldtabptr)) != Z_OK) 18467c478bd9Sstevel@tonic-gate return (err); 18477c478bd9Sstevel@tonic-gate 18487c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_ipd_core(handle, newtabptr)) != Z_OK) 18497c478bd9Sstevel@tonic-gate return (err); 18507c478bd9Sstevel@tonic-gate 18517c478bd9Sstevel@tonic-gate return (Z_OK); 18527c478bd9Sstevel@tonic-gate } 18537c478bd9Sstevel@tonic-gate 18547c478bd9Sstevel@tonic-gate int 18557c478bd9Sstevel@tonic-gate zonecfg_lookup_filesystem( 18567c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 18577c478bd9Sstevel@tonic-gate struct zone_fstab *tabptr) 18587c478bd9Sstevel@tonic-gate { 18597c478bd9Sstevel@tonic-gate xmlNodePtr cur, options, firstmatch; 18607c478bd9Sstevel@tonic-gate int err; 18617c478bd9Sstevel@tonic-gate char dirname[MAXPATHLEN], special[MAXPATHLEN], raw[MAXPATHLEN]; 18627c478bd9Sstevel@tonic-gate char type[FSTYPSZ]; 18637c478bd9Sstevel@tonic-gate char options_str[MAX_MNTOPT_STR]; 18647c478bd9Sstevel@tonic-gate 18657c478bd9Sstevel@tonic-gate if (tabptr == NULL) 18667c478bd9Sstevel@tonic-gate return (Z_INVAL); 18677c478bd9Sstevel@tonic-gate 18687c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 18697c478bd9Sstevel@tonic-gate return (err); 18707c478bd9Sstevel@tonic-gate 18717c478bd9Sstevel@tonic-gate /* 18727c478bd9Sstevel@tonic-gate * Walk the list of children looking for matches on any properties 18737c478bd9Sstevel@tonic-gate * specified in the fstab parameter. If more than one resource 18747c478bd9Sstevel@tonic-gate * matches, we return Z_INSUFFICIENT_SPEC; if none match, we return 18757c478bd9Sstevel@tonic-gate * Z_NO_RESOURCE_ID. 18767c478bd9Sstevel@tonic-gate */ 18777c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 18787c478bd9Sstevel@tonic-gate firstmatch = NULL; 18797c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 18807c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_FS)) 18817c478bd9Sstevel@tonic-gate continue; 18827c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_dir) > 0) { 18837c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_DIR, dirname, 18847c478bd9Sstevel@tonic-gate sizeof (dirname)) == Z_OK) && 18857c478bd9Sstevel@tonic-gate (strcmp(tabptr->zone_fs_dir, dirname) == 0)) { 18867c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 18877c478bd9Sstevel@tonic-gate firstmatch = cur; 18887c478bd9Sstevel@tonic-gate else 18897c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 18907c478bd9Sstevel@tonic-gate } 18917c478bd9Sstevel@tonic-gate } 18927c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_special) > 0) { 18937c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_SPECIAL, special, 18947c478bd9Sstevel@tonic-gate sizeof (special)) == Z_OK)) { 18957c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_fs_special, 18967c478bd9Sstevel@tonic-gate special) == 0) { 18977c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 18987c478bd9Sstevel@tonic-gate firstmatch = cur; 18997c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 19007c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 19017c478bd9Sstevel@tonic-gate } else { 19027c478bd9Sstevel@tonic-gate /* 19037c478bd9Sstevel@tonic-gate * If another property matched but this 19047c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 19057c478bd9Sstevel@tonic-gate */ 19067c478bd9Sstevel@tonic-gate if (firstmatch == cur) 19077c478bd9Sstevel@tonic-gate firstmatch = NULL; 19087c478bd9Sstevel@tonic-gate } 19097c478bd9Sstevel@tonic-gate } 19107c478bd9Sstevel@tonic-gate } 19117c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_raw) > 0) { 19127c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_RAW, raw, 19137c478bd9Sstevel@tonic-gate sizeof (raw)) == Z_OK)) { 19147c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_fs_raw, raw) == 0) { 19157c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 19167c478bd9Sstevel@tonic-gate firstmatch = cur; 19177c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 19187c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 19197c478bd9Sstevel@tonic-gate } else { 19207c478bd9Sstevel@tonic-gate /* 19217c478bd9Sstevel@tonic-gate * If another property matched but this 19227c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 19237c478bd9Sstevel@tonic-gate */ 19247c478bd9Sstevel@tonic-gate if (firstmatch == cur) 19257c478bd9Sstevel@tonic-gate firstmatch = NULL; 19267c478bd9Sstevel@tonic-gate } 19277c478bd9Sstevel@tonic-gate } 19287c478bd9Sstevel@tonic-gate } 19297c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_type) > 0) { 19307c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_TYPE, type, 19317c478bd9Sstevel@tonic-gate sizeof (type)) == Z_OK)) { 19327c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_fs_type, type) == 0) { 19337c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 19347c478bd9Sstevel@tonic-gate firstmatch = cur; 19357c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 19367c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 19377c478bd9Sstevel@tonic-gate } else { 19387c478bd9Sstevel@tonic-gate /* 19397c478bd9Sstevel@tonic-gate * If another property matched but this 19407c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 19417c478bd9Sstevel@tonic-gate */ 19427c478bd9Sstevel@tonic-gate if (firstmatch == cur) 19437c478bd9Sstevel@tonic-gate firstmatch = NULL; 19447c478bd9Sstevel@tonic-gate } 19457c478bd9Sstevel@tonic-gate } 19467c478bd9Sstevel@tonic-gate } 19477c478bd9Sstevel@tonic-gate } 19487c478bd9Sstevel@tonic-gate 19497c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 19507c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 19517c478bd9Sstevel@tonic-gate 19527c478bd9Sstevel@tonic-gate cur = firstmatch; 19537c478bd9Sstevel@tonic-gate 19547c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 19557c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_dir))) != Z_OK) 19567c478bd9Sstevel@tonic-gate return (err); 19577c478bd9Sstevel@tonic-gate 19587c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_SPECIAL, tabptr->zone_fs_special, 19597c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_special))) != Z_OK) 19607c478bd9Sstevel@tonic-gate return (err); 19617c478bd9Sstevel@tonic-gate 19627c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_RAW, tabptr->zone_fs_raw, 19637c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_raw))) != Z_OK) 19647c478bd9Sstevel@tonic-gate return (err); 19657c478bd9Sstevel@tonic-gate 19667c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_fs_type, 19677c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_type))) != Z_OK) 19687c478bd9Sstevel@tonic-gate return (err); 19697c478bd9Sstevel@tonic-gate 19707c478bd9Sstevel@tonic-gate /* options are optional */ 19717c478bd9Sstevel@tonic-gate tabptr->zone_fs_options = NULL; 19727c478bd9Sstevel@tonic-gate for (options = cur->xmlChildrenNode; options != NULL; 19737c478bd9Sstevel@tonic-gate options = options->next) { 19747c478bd9Sstevel@tonic-gate if ((fetchprop(options, DTD_ATTR_NAME, options_str, 19757c478bd9Sstevel@tonic-gate sizeof (options_str)) != Z_OK)) 19767c478bd9Sstevel@tonic-gate break; 19777c478bd9Sstevel@tonic-gate if (zonecfg_add_fs_option(tabptr, options_str) != Z_OK) 19787c478bd9Sstevel@tonic-gate break; 19797c478bd9Sstevel@tonic-gate } 19807c478bd9Sstevel@tonic-gate return (Z_OK); 19817c478bd9Sstevel@tonic-gate } 19827c478bd9Sstevel@tonic-gate 19837c478bd9Sstevel@tonic-gate int 19847c478bd9Sstevel@tonic-gate zonecfg_lookup_ipd(zone_dochandle_t handle, struct zone_fstab *tabptr) 19857c478bd9Sstevel@tonic-gate { 19867c478bd9Sstevel@tonic-gate xmlNodePtr cur, match; 19877c478bd9Sstevel@tonic-gate int err; 19887c478bd9Sstevel@tonic-gate char dirname[MAXPATHLEN]; 19897c478bd9Sstevel@tonic-gate 19907c478bd9Sstevel@tonic-gate if (tabptr == NULL) 19917c478bd9Sstevel@tonic-gate return (Z_INVAL); 19927c478bd9Sstevel@tonic-gate 19937c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 19947c478bd9Sstevel@tonic-gate return (err); 19957c478bd9Sstevel@tonic-gate 19967c478bd9Sstevel@tonic-gate /* 19977c478bd9Sstevel@tonic-gate * General algorithm: 19987c478bd9Sstevel@tonic-gate * Walk the list of children looking for matches on any properties 19997c478bd9Sstevel@tonic-gate * specified in the fstab parameter. If more than one resource 20007c478bd9Sstevel@tonic-gate * matches, we return Z_INSUFFICIENT_SPEC; if none match, we return 20017c478bd9Sstevel@tonic-gate * Z_NO_RESOURCE_ID. 20027c478bd9Sstevel@tonic-gate */ 20037c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 20047c478bd9Sstevel@tonic-gate match = NULL; 20057c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 20067c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_IPD)) 20077c478bd9Sstevel@tonic-gate continue; 20087c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_fs_dir) > 0) { 20097c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_DIR, dirname, 20107c478bd9Sstevel@tonic-gate sizeof (dirname)) == Z_OK) && 20117c478bd9Sstevel@tonic-gate (strcmp(tabptr->zone_fs_dir, dirname) == 0)) { 20127c478bd9Sstevel@tonic-gate if (match == NULL) 20137c478bd9Sstevel@tonic-gate match = cur; 20147c478bd9Sstevel@tonic-gate else 20157c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 20167c478bd9Sstevel@tonic-gate } 20177c478bd9Sstevel@tonic-gate } 20187c478bd9Sstevel@tonic-gate } 20197c478bd9Sstevel@tonic-gate 20207c478bd9Sstevel@tonic-gate if (match == NULL) 20217c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 20227c478bd9Sstevel@tonic-gate 20237c478bd9Sstevel@tonic-gate cur = match; 20247c478bd9Sstevel@tonic-gate 20257c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 20267c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_dir))) != Z_OK) 20277c478bd9Sstevel@tonic-gate return (err); 20287c478bd9Sstevel@tonic-gate 20297c478bd9Sstevel@tonic-gate return (Z_OK); 20307c478bd9Sstevel@tonic-gate } 20317c478bd9Sstevel@tonic-gate 20327c478bd9Sstevel@tonic-gate /* 20337c478bd9Sstevel@tonic-gate * Compare two IP addresses in string form. Allow for the possibility that 20347c478bd9Sstevel@tonic-gate * one might have "/<prefix-length>" at the end: allow a match on just the 20357c478bd9Sstevel@tonic-gate * IP address (or host name) part. 20367c478bd9Sstevel@tonic-gate */ 20377c478bd9Sstevel@tonic-gate 20387c478bd9Sstevel@tonic-gate boolean_t 20397c478bd9Sstevel@tonic-gate zonecfg_same_net_address(char *a1, char *a2) 20407c478bd9Sstevel@tonic-gate { 20417c478bd9Sstevel@tonic-gate char *slashp, *slashp1, *slashp2; 20427c478bd9Sstevel@tonic-gate int result; 20437c478bd9Sstevel@tonic-gate 20447c478bd9Sstevel@tonic-gate if (strcmp(a1, a2) == 0) 20457c478bd9Sstevel@tonic-gate return (B_TRUE); 20467c478bd9Sstevel@tonic-gate 20477c478bd9Sstevel@tonic-gate /* 20487c478bd9Sstevel@tonic-gate * If neither has a slash or both do, they need to match to be 20497c478bd9Sstevel@tonic-gate * considered the same, but they did not match above, so fail. 20507c478bd9Sstevel@tonic-gate */ 20517c478bd9Sstevel@tonic-gate slashp1 = strchr(a1, '/'); 20527c478bd9Sstevel@tonic-gate slashp2 = strchr(a2, '/'); 20537c478bd9Sstevel@tonic-gate if ((slashp1 == NULL && slashp2 == NULL) || 20547c478bd9Sstevel@tonic-gate (slashp1 != NULL && slashp2 != NULL)) 20557c478bd9Sstevel@tonic-gate return (B_FALSE); 20567c478bd9Sstevel@tonic-gate 20577c478bd9Sstevel@tonic-gate /* 20587c478bd9Sstevel@tonic-gate * Only one had a slash: pick that one, zero out the slash, compare 20597c478bd9Sstevel@tonic-gate * the "address only" strings, restore the slash, and return the 20607c478bd9Sstevel@tonic-gate * result of the comparison. 20617c478bd9Sstevel@tonic-gate */ 20627c478bd9Sstevel@tonic-gate slashp = (slashp1 == NULL) ? slashp2 : slashp1; 20637c478bd9Sstevel@tonic-gate *slashp = '\0'; 20647c478bd9Sstevel@tonic-gate result = strcmp(a1, a2); 20657c478bd9Sstevel@tonic-gate *slashp = '/'; 20667c478bd9Sstevel@tonic-gate return ((result == 0)); 20677c478bd9Sstevel@tonic-gate } 20687c478bd9Sstevel@tonic-gate 20697c478bd9Sstevel@tonic-gate int 20707c478bd9Sstevel@tonic-gate zonecfg_valid_net_address(char *address, struct lifreq *lifr) 20717c478bd9Sstevel@tonic-gate { 20727c478bd9Sstevel@tonic-gate struct sockaddr_in *sin4; 20737c478bd9Sstevel@tonic-gate struct sockaddr_in6 *sin6; 20747c478bd9Sstevel@tonic-gate struct addrinfo hints, *result; 20757c478bd9Sstevel@tonic-gate char *slashp = strchr(address, '/'); 20767c478bd9Sstevel@tonic-gate 20777c478bd9Sstevel@tonic-gate bzero(lifr, sizeof (struct lifreq)); 20787c478bd9Sstevel@tonic-gate sin4 = (struct sockaddr_in *)&lifr->lifr_addr; 20797c478bd9Sstevel@tonic-gate sin6 = (struct sockaddr_in6 *)&lifr->lifr_addr; 20807c478bd9Sstevel@tonic-gate if (slashp != NULL) 20817c478bd9Sstevel@tonic-gate *slashp = '\0'; 20827c478bd9Sstevel@tonic-gate if (inet_pton(AF_INET, address, &sin4->sin_addr) == 1) { 20837c478bd9Sstevel@tonic-gate sin4->sin_family = AF_INET; 20847c478bd9Sstevel@tonic-gate } else if (inet_pton(AF_INET6, address, &sin6->sin6_addr) == 1) { 20857c478bd9Sstevel@tonic-gate if (slashp == NULL) 20867c478bd9Sstevel@tonic-gate return (Z_IPV6_ADDR_PREFIX_LEN); 20877c478bd9Sstevel@tonic-gate sin6->sin6_family = AF_INET6; 20887c478bd9Sstevel@tonic-gate } else { 20897c478bd9Sstevel@tonic-gate /* "address" may be a host name */ 20907c478bd9Sstevel@tonic-gate (void) memset(&hints, 0, sizeof (hints)); 20917c478bd9Sstevel@tonic-gate hints.ai_family = PF_INET; 20927c478bd9Sstevel@tonic-gate if (getaddrinfo(address, NULL, &hints, &result) != 0) 20937c478bd9Sstevel@tonic-gate return (Z_BOGUS_ADDRESS); 20947c478bd9Sstevel@tonic-gate sin4->sin_family = result->ai_family; 2095a1be23daSdp 20967c478bd9Sstevel@tonic-gate (void) memcpy(&sin4->sin_addr, 20977c478bd9Sstevel@tonic-gate /* LINTED E_BAD_PTR_CAST_ALIGN */ 20987c478bd9Sstevel@tonic-gate &((struct sockaddr_in *)result->ai_addr)->sin_addr, 20997c478bd9Sstevel@tonic-gate sizeof (struct in_addr)); 2100a1be23daSdp 21017c478bd9Sstevel@tonic-gate freeaddrinfo(result); 21027c478bd9Sstevel@tonic-gate } 21037c478bd9Sstevel@tonic-gate return (Z_OK); 21047c478bd9Sstevel@tonic-gate } 21057c478bd9Sstevel@tonic-gate 2106f4b3ec61Sdh155122 boolean_t 2107f4b3ec61Sdh155122 zonecfg_ifname_exists(sa_family_t af, char *ifname) 2108f4b3ec61Sdh155122 { 2109f4b3ec61Sdh155122 struct lifreq lifr; 2110f4b3ec61Sdh155122 int so; 2111f4b3ec61Sdh155122 int save_errno; 2112f4b3ec61Sdh155122 2113f4b3ec61Sdh155122 (void) memset(&lifr, 0, sizeof (lifr)); 2114f4b3ec61Sdh155122 (void) strlcpy(lifr.lifr_name, ifname, sizeof (lifr.lifr_name)); 2115f4b3ec61Sdh155122 lifr.lifr_addr.ss_family = af; 2116f4b3ec61Sdh155122 if ((so = socket(af, SOCK_DGRAM, 0)) < 0) { 2117f4b3ec61Sdh155122 /* Odd - can't tell if the ifname exists */ 2118f4b3ec61Sdh155122 return (B_FALSE); 2119f4b3ec61Sdh155122 } 2120f4b3ec61Sdh155122 if (ioctl(so, SIOCGLIFFLAGS, (caddr_t)&lifr) < 0) { 2121f4b3ec61Sdh155122 save_errno = errno; 2122f4b3ec61Sdh155122 (void) close(so); 2123f4b3ec61Sdh155122 errno = save_errno; 2124f4b3ec61Sdh155122 return (B_FALSE); 2125f4b3ec61Sdh155122 } 2126f4b3ec61Sdh155122 (void) close(so); 2127f4b3ec61Sdh155122 return (B_TRUE); 2128f4b3ec61Sdh155122 } 2129f4b3ec61Sdh155122 21307c478bd9Sstevel@tonic-gate int 21317c478bd9Sstevel@tonic-gate zonecfg_lookup_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 21327c478bd9Sstevel@tonic-gate { 21337c478bd9Sstevel@tonic-gate xmlNodePtr cur, firstmatch; 21347c478bd9Sstevel@tonic-gate int err; 21357c478bd9Sstevel@tonic-gate char address[INET6_ADDRSTRLEN], physical[LIFNAMSIZ]; 21367c478bd9Sstevel@tonic-gate 21377c478bd9Sstevel@tonic-gate if (tabptr == NULL) 21387c478bd9Sstevel@tonic-gate return (Z_INVAL); 21397c478bd9Sstevel@tonic-gate 21407c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 21417c478bd9Sstevel@tonic-gate return (err); 21427c478bd9Sstevel@tonic-gate 21437c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 21447c478bd9Sstevel@tonic-gate firstmatch = NULL; 21457c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 21467c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_NET)) 21477c478bd9Sstevel@tonic-gate continue; 21487c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_nwif_physical) > 0) { 21497c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_PHYSICAL, physical, 21507c478bd9Sstevel@tonic-gate sizeof (physical)) == Z_OK) && 21517c478bd9Sstevel@tonic-gate (strcmp(tabptr->zone_nwif_physical, 21527c478bd9Sstevel@tonic-gate physical) == 0)) { 21537c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 21547c478bd9Sstevel@tonic-gate firstmatch = cur; 21557c478bd9Sstevel@tonic-gate else 21567c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 21577c478bd9Sstevel@tonic-gate } 21587c478bd9Sstevel@tonic-gate } 21597c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_nwif_address) > 0) { 21607c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_ADDRESS, address, 21617c478bd9Sstevel@tonic-gate sizeof (address)) == Z_OK)) { 21627c478bd9Sstevel@tonic-gate if (zonecfg_same_net_address( 21637c478bd9Sstevel@tonic-gate tabptr->zone_nwif_address, address)) { 21647c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 21657c478bd9Sstevel@tonic-gate firstmatch = cur; 21667c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 21677c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 21687c478bd9Sstevel@tonic-gate } else { 21697c478bd9Sstevel@tonic-gate /* 21707c478bd9Sstevel@tonic-gate * If another property matched but this 21717c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 21727c478bd9Sstevel@tonic-gate */ 21737c478bd9Sstevel@tonic-gate if (firstmatch == cur) 21747c478bd9Sstevel@tonic-gate firstmatch = NULL; 21757c478bd9Sstevel@tonic-gate } 21767c478bd9Sstevel@tonic-gate } 21777c478bd9Sstevel@tonic-gate } 21787c478bd9Sstevel@tonic-gate } 21797c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 21807c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 21817c478bd9Sstevel@tonic-gate 21827c478bd9Sstevel@tonic-gate cur = firstmatch; 21837c478bd9Sstevel@tonic-gate 21847c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_PHYSICAL, tabptr->zone_nwif_physical, 21857c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_nwif_physical))) != Z_OK) 21867c478bd9Sstevel@tonic-gate return (err); 21877c478bd9Sstevel@tonic-gate 21887c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_ADDRESS, tabptr->zone_nwif_address, 21897c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_nwif_address))) != Z_OK) 21907c478bd9Sstevel@tonic-gate return (err); 21917c478bd9Sstevel@tonic-gate 21927c478bd9Sstevel@tonic-gate return (Z_OK); 21937c478bd9Sstevel@tonic-gate } 21947c478bd9Sstevel@tonic-gate 21957c478bd9Sstevel@tonic-gate static int 21967c478bd9Sstevel@tonic-gate zonecfg_add_nwif_core(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 21977c478bd9Sstevel@tonic-gate { 21987c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur; 21997c478bd9Sstevel@tonic-gate int err; 22007c478bd9Sstevel@tonic-gate 22017c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_NET, NULL); 2202a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_ADDRESS, 22037c478bd9Sstevel@tonic-gate tabptr->zone_nwif_address)) != Z_OK) 22047c478bd9Sstevel@tonic-gate return (err); 2205a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_PHYSICAL, 22067c478bd9Sstevel@tonic-gate tabptr->zone_nwif_physical)) != Z_OK) 22077c478bd9Sstevel@tonic-gate return (err); 22087c478bd9Sstevel@tonic-gate return (Z_OK); 22097c478bd9Sstevel@tonic-gate } 22107c478bd9Sstevel@tonic-gate 22117c478bd9Sstevel@tonic-gate int 22127c478bd9Sstevel@tonic-gate zonecfg_add_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 22137c478bd9Sstevel@tonic-gate { 22147c478bd9Sstevel@tonic-gate int err; 22157c478bd9Sstevel@tonic-gate 22167c478bd9Sstevel@tonic-gate if (tabptr == NULL) 22177c478bd9Sstevel@tonic-gate return (Z_INVAL); 22187c478bd9Sstevel@tonic-gate 22197c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 22207c478bd9Sstevel@tonic-gate return (err); 22217c478bd9Sstevel@tonic-gate 22227c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_nwif_core(handle, tabptr)) != Z_OK) 22237c478bd9Sstevel@tonic-gate return (err); 22247c478bd9Sstevel@tonic-gate 22257c478bd9Sstevel@tonic-gate return (Z_OK); 22267c478bd9Sstevel@tonic-gate } 22277c478bd9Sstevel@tonic-gate 22287c478bd9Sstevel@tonic-gate static int 22297c478bd9Sstevel@tonic-gate zonecfg_delete_nwif_core(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 22307c478bd9Sstevel@tonic-gate { 22317c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 22327c478bd9Sstevel@tonic-gate boolean_t addr_match, phys_match; 22337c478bd9Sstevel@tonic-gate 22347c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 22357c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_NET)) 22367c478bd9Sstevel@tonic-gate continue; 22377c478bd9Sstevel@tonic-gate 22387c478bd9Sstevel@tonic-gate addr_match = match_prop(cur, DTD_ATTR_ADDRESS, 22397c478bd9Sstevel@tonic-gate tabptr->zone_nwif_address); 22407c478bd9Sstevel@tonic-gate phys_match = match_prop(cur, DTD_ATTR_PHYSICAL, 22417c478bd9Sstevel@tonic-gate tabptr->zone_nwif_physical); 22427c478bd9Sstevel@tonic-gate 22437c478bd9Sstevel@tonic-gate if (addr_match && phys_match) { 22447c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 22457c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 22467c478bd9Sstevel@tonic-gate return (Z_OK); 22477c478bd9Sstevel@tonic-gate } 22487c478bd9Sstevel@tonic-gate } 22497c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 22507c478bd9Sstevel@tonic-gate } 22517c478bd9Sstevel@tonic-gate 22527c478bd9Sstevel@tonic-gate int 22537c478bd9Sstevel@tonic-gate zonecfg_delete_nwif(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 22547c478bd9Sstevel@tonic-gate { 22557c478bd9Sstevel@tonic-gate int err; 22567c478bd9Sstevel@tonic-gate 22577c478bd9Sstevel@tonic-gate if (tabptr == NULL) 22587c478bd9Sstevel@tonic-gate return (Z_INVAL); 22597c478bd9Sstevel@tonic-gate 22607c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 22617c478bd9Sstevel@tonic-gate return (err); 22627c478bd9Sstevel@tonic-gate 22637c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_nwif_core(handle, tabptr)) != Z_OK) 22647c478bd9Sstevel@tonic-gate return (err); 22657c478bd9Sstevel@tonic-gate 22667c478bd9Sstevel@tonic-gate return (Z_OK); 22677c478bd9Sstevel@tonic-gate } 22687c478bd9Sstevel@tonic-gate 22697c478bd9Sstevel@tonic-gate int 22707c478bd9Sstevel@tonic-gate zonecfg_modify_nwif( 22717c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 22727c478bd9Sstevel@tonic-gate struct zone_nwiftab *oldtabptr, 22737c478bd9Sstevel@tonic-gate struct zone_nwiftab *newtabptr) 22747c478bd9Sstevel@tonic-gate { 22757c478bd9Sstevel@tonic-gate int err; 22767c478bd9Sstevel@tonic-gate 22777c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 22787c478bd9Sstevel@tonic-gate return (Z_INVAL); 22797c478bd9Sstevel@tonic-gate 22807c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 22817c478bd9Sstevel@tonic-gate return (err); 22827c478bd9Sstevel@tonic-gate 22837c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_nwif_core(handle, oldtabptr)) != Z_OK) 22847c478bd9Sstevel@tonic-gate return (err); 22857c478bd9Sstevel@tonic-gate 22867c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_nwif_core(handle, newtabptr)) != Z_OK) 22877c478bd9Sstevel@tonic-gate return (err); 22887c478bd9Sstevel@tonic-gate 22897c478bd9Sstevel@tonic-gate return (Z_OK); 22907c478bd9Sstevel@tonic-gate } 22917c478bd9Sstevel@tonic-gate 22927c478bd9Sstevel@tonic-gate int 22937c478bd9Sstevel@tonic-gate zonecfg_lookup_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 22947c478bd9Sstevel@tonic-gate { 22957c478bd9Sstevel@tonic-gate xmlNodePtr cur, firstmatch; 22967c478bd9Sstevel@tonic-gate int err; 22977c478bd9Sstevel@tonic-gate char match[MAXPATHLEN]; 22987c478bd9Sstevel@tonic-gate 22997c478bd9Sstevel@tonic-gate if (tabptr == NULL) 23007c478bd9Sstevel@tonic-gate return (Z_INVAL); 23017c478bd9Sstevel@tonic-gate 23027c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 23037c478bd9Sstevel@tonic-gate return (err); 23047c478bd9Sstevel@tonic-gate 23057c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 23067c478bd9Sstevel@tonic-gate firstmatch = NULL; 23077c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 23087c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 23097c478bd9Sstevel@tonic-gate continue; 23107c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_dev_match) == 0) 23117c478bd9Sstevel@tonic-gate continue; 23127c478bd9Sstevel@tonic-gate 23137c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_MATCH, match, 23147c478bd9Sstevel@tonic-gate sizeof (match)) == Z_OK)) { 23157c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_dev_match, 23167c478bd9Sstevel@tonic-gate match) == 0) { 23177c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 23187c478bd9Sstevel@tonic-gate firstmatch = cur; 23197c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 23207c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 23217c478bd9Sstevel@tonic-gate } else { 23227c478bd9Sstevel@tonic-gate /* 23237c478bd9Sstevel@tonic-gate * If another property matched but this 23247c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 23257c478bd9Sstevel@tonic-gate */ 23267c478bd9Sstevel@tonic-gate if (firstmatch == cur) 23277c478bd9Sstevel@tonic-gate firstmatch = NULL; 23287c478bd9Sstevel@tonic-gate } 23297c478bd9Sstevel@tonic-gate } 23307c478bd9Sstevel@tonic-gate } 23317c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 23327c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 23337c478bd9Sstevel@tonic-gate 23347c478bd9Sstevel@tonic-gate cur = firstmatch; 23357c478bd9Sstevel@tonic-gate 23367c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_MATCH, tabptr->zone_dev_match, 23377c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_dev_match))) != Z_OK) 23387c478bd9Sstevel@tonic-gate return (err); 23397c478bd9Sstevel@tonic-gate 23407c478bd9Sstevel@tonic-gate return (Z_OK); 23417c478bd9Sstevel@tonic-gate } 23427c478bd9Sstevel@tonic-gate 23437c478bd9Sstevel@tonic-gate static int 23447c478bd9Sstevel@tonic-gate zonecfg_add_dev_core(zone_dochandle_t handle, struct zone_devtab *tabptr) 23457c478bd9Sstevel@tonic-gate { 23467c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur; 23477c478bd9Sstevel@tonic-gate int err; 23487c478bd9Sstevel@tonic-gate 23497c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DEVICE, NULL); 23507c478bd9Sstevel@tonic-gate 2351a1be23daSdp if ((err = newprop(newnode, DTD_ATTR_MATCH, 23527c478bd9Sstevel@tonic-gate tabptr->zone_dev_match)) != Z_OK) 23537c478bd9Sstevel@tonic-gate return (err); 23547c478bd9Sstevel@tonic-gate 23557c478bd9Sstevel@tonic-gate return (Z_OK); 23567c478bd9Sstevel@tonic-gate } 23577c478bd9Sstevel@tonic-gate 23587c478bd9Sstevel@tonic-gate int 23597c478bd9Sstevel@tonic-gate zonecfg_add_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 23607c478bd9Sstevel@tonic-gate { 23617c478bd9Sstevel@tonic-gate int err; 23627c478bd9Sstevel@tonic-gate 23637c478bd9Sstevel@tonic-gate if (tabptr == NULL) 23647c478bd9Sstevel@tonic-gate return (Z_INVAL); 23657c478bd9Sstevel@tonic-gate 23667c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 23677c478bd9Sstevel@tonic-gate return (err); 23687c478bd9Sstevel@tonic-gate 23697c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_dev_core(handle, tabptr)) != Z_OK) 23707c478bd9Sstevel@tonic-gate return (err); 23717c478bd9Sstevel@tonic-gate 23727c478bd9Sstevel@tonic-gate return (Z_OK); 23737c478bd9Sstevel@tonic-gate } 23747c478bd9Sstevel@tonic-gate 23757c478bd9Sstevel@tonic-gate static int 23767c478bd9Sstevel@tonic-gate zonecfg_delete_dev_core(zone_dochandle_t handle, struct zone_devtab *tabptr) 23777c478bd9Sstevel@tonic-gate { 2378facf4a8dSllai1 xmlNodePtr cur = handle->zone_dh_cur; 23797c478bd9Sstevel@tonic-gate int match_match; 23807c478bd9Sstevel@tonic-gate 23817c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 23827c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 23837c478bd9Sstevel@tonic-gate continue; 23847c478bd9Sstevel@tonic-gate 23857c478bd9Sstevel@tonic-gate match_match = match_prop(cur, DTD_ATTR_MATCH, 23867c478bd9Sstevel@tonic-gate tabptr->zone_dev_match); 23877c478bd9Sstevel@tonic-gate 23887c478bd9Sstevel@tonic-gate if (match_match) { 23897c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 23907c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 23917c478bd9Sstevel@tonic-gate return (Z_OK); 23927c478bd9Sstevel@tonic-gate } 23937c478bd9Sstevel@tonic-gate } 23947c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 23957c478bd9Sstevel@tonic-gate } 23967c478bd9Sstevel@tonic-gate 23977c478bd9Sstevel@tonic-gate int 23987c478bd9Sstevel@tonic-gate zonecfg_delete_dev(zone_dochandle_t handle, struct zone_devtab *tabptr) 23997c478bd9Sstevel@tonic-gate { 24007c478bd9Sstevel@tonic-gate int err; 24017c478bd9Sstevel@tonic-gate 24027c478bd9Sstevel@tonic-gate if (tabptr == NULL) 24037c478bd9Sstevel@tonic-gate return (Z_INVAL); 24047c478bd9Sstevel@tonic-gate 24057c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 24067c478bd9Sstevel@tonic-gate return (err); 24077c478bd9Sstevel@tonic-gate 24087c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_dev_core(handle, tabptr)) != Z_OK) 24097c478bd9Sstevel@tonic-gate return (err); 24107c478bd9Sstevel@tonic-gate 24117c478bd9Sstevel@tonic-gate return (Z_OK); 24127c478bd9Sstevel@tonic-gate } 24137c478bd9Sstevel@tonic-gate 24147c478bd9Sstevel@tonic-gate int 24157c478bd9Sstevel@tonic-gate zonecfg_modify_dev( 24167c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 24177c478bd9Sstevel@tonic-gate struct zone_devtab *oldtabptr, 24187c478bd9Sstevel@tonic-gate struct zone_devtab *newtabptr) 24197c478bd9Sstevel@tonic-gate { 24207c478bd9Sstevel@tonic-gate int err; 24217c478bd9Sstevel@tonic-gate 24227c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 24237c478bd9Sstevel@tonic-gate return (Z_INVAL); 24247c478bd9Sstevel@tonic-gate 24257c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 24267c478bd9Sstevel@tonic-gate return (err); 24277c478bd9Sstevel@tonic-gate 24287c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_dev_core(handle, oldtabptr)) != Z_OK) 24297c478bd9Sstevel@tonic-gate return (err); 24307c478bd9Sstevel@tonic-gate 24317c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_dev_core(handle, newtabptr)) != Z_OK) 24327c478bd9Sstevel@tonic-gate return (err); 24337c478bd9Sstevel@tonic-gate 24347c478bd9Sstevel@tonic-gate return (Z_OK); 24357c478bd9Sstevel@tonic-gate } 24367c478bd9Sstevel@tonic-gate 2437ee519a1fSgjelinek /* Lock to serialize all zonecfg_devwalks */ 2438ee519a1fSgjelinek static pthread_mutex_t zonecfg_devwalk_lock = PTHREAD_MUTEX_INITIALIZER; 2439ee519a1fSgjelinek /* 2440ee519a1fSgjelinek * Global variables used to pass data from zonecfg_devwalk to the nftw 2441ee519a1fSgjelinek * call-back (zonecfg_devwalk_cb). g_devwalk_data is really the void* 2442ee519a1fSgjelinek * parameter and g_devwalk_cb is really the *cb parameter from zonecfg_devwalk. 2443ee519a1fSgjelinek */ 2444ee519a1fSgjelinek static void *g_devwalk_data; 2445ee519a1fSgjelinek static int (*g_devwalk_cb)(const char *, uid_t, gid_t, mode_t, const char *, 2446ee519a1fSgjelinek void *); 2447ee519a1fSgjelinek static size_t g_devwalk_skip_prefix; 2448ee519a1fSgjelinek 2449ee519a1fSgjelinek /* 2450ee519a1fSgjelinek * This is the nftw call-back function used by zonecfg_devwalk. It is 2451ee519a1fSgjelinek * responsible for calling the actual call-back that is passed in to 2452ee519a1fSgjelinek * zonecfg_devwalk as the *cb argument. 2453ee519a1fSgjelinek */ 2454ee519a1fSgjelinek /* ARGSUSED2 */ 2455ee519a1fSgjelinek static int 2456ee519a1fSgjelinek zonecfg_devwalk_cb(const char *path, const struct stat *st, int f, 2457ee519a1fSgjelinek struct FTW *ftw) 2458ee519a1fSgjelinek { 2459ee519a1fSgjelinek acl_t *acl; 2460ee519a1fSgjelinek char *acl_txt = NULL; 2461ee519a1fSgjelinek 2462ee519a1fSgjelinek /* skip all but character and block devices */ 2463ee519a1fSgjelinek if (!S_ISBLK(st->st_mode) && !S_ISCHR(st->st_mode)) 2464ee519a1fSgjelinek return (0); 2465ee519a1fSgjelinek 2466ee519a1fSgjelinek if ((acl_get(path, ACL_NO_TRIVIAL, &acl) == 0) && 2467ee519a1fSgjelinek acl != NULL) { 2468ee519a1fSgjelinek acl_txt = acl_totext(acl, ACL_NORESOLVE); 2469ee519a1fSgjelinek acl_free(acl); 2470ee519a1fSgjelinek } 2471ee519a1fSgjelinek 2472ee519a1fSgjelinek if (strlen(path) <= g_devwalk_skip_prefix) 2473ee519a1fSgjelinek return (0); 2474ee519a1fSgjelinek 2475ee519a1fSgjelinek g_devwalk_cb(path + g_devwalk_skip_prefix, st->st_uid, st->st_gid, 2476ee519a1fSgjelinek st->st_mode & S_IAMB, acl_txt != NULL ? acl_txt : "", 2477ee519a1fSgjelinek g_devwalk_data); 2478ee519a1fSgjelinek free(acl_txt); 2479ee519a1fSgjelinek return (0); 2480ee519a1fSgjelinek } 2481ee519a1fSgjelinek 2482ee519a1fSgjelinek /* 2483ee519a1fSgjelinek * Walk the dev tree for the zone specified by hdl and call the call-back (cb) 2484ee519a1fSgjelinek * function for each entry in the tree. The call-back will be passed the 2485ee519a1fSgjelinek * name, uid, gid, mode, acl string and the void *data input parameter 2486ee519a1fSgjelinek * for each dev entry. 2487ee519a1fSgjelinek * 2488ee519a1fSgjelinek * Data is passed to the zonecfg_devwalk_cb through the global variables 2489ee519a1fSgjelinek * g_devwalk_data, *g_devwalk_cb, and g_devwalk_skip_prefix. The 2490ee519a1fSgjelinek * zonecfg_devwalk_cb function will actually call *cb. 2491ee519a1fSgjelinek */ 2492ee519a1fSgjelinek int 2493ee519a1fSgjelinek zonecfg_devwalk(zone_dochandle_t hdl, 2494ee519a1fSgjelinek int (*cb)(const char *, uid_t, gid_t, mode_t, const char *, void *), 2495ee519a1fSgjelinek void *data) 2496ee519a1fSgjelinek { 2497ee519a1fSgjelinek char path[MAXPATHLEN]; 2498ee519a1fSgjelinek int ret; 2499ee519a1fSgjelinek 2500ee519a1fSgjelinek if ((ret = zonecfg_get_zonepath(hdl, path, sizeof (path))) != Z_OK) 2501ee519a1fSgjelinek return (ret); 2502ee519a1fSgjelinek 2503ee519a1fSgjelinek if (strlcat(path, "/dev", sizeof (path)) >= sizeof (path)) 2504ee519a1fSgjelinek return (Z_TOO_BIG); 2505ee519a1fSgjelinek g_devwalk_skip_prefix = strlen(path) + 1; 2506ee519a1fSgjelinek 2507ee519a1fSgjelinek /* 2508ee519a1fSgjelinek * We have to serialize all zonecfg_devwalks in the same process 2509ee519a1fSgjelinek * (which should be fine), since nftw() is so badly designed. 2510ee519a1fSgjelinek */ 2511ee519a1fSgjelinek (void) pthread_mutex_lock(&zonecfg_devwalk_lock); 2512ee519a1fSgjelinek 2513ee519a1fSgjelinek g_devwalk_data = data; 2514ee519a1fSgjelinek g_devwalk_cb = cb; 2515ee519a1fSgjelinek (void) nftw(path, zonecfg_devwalk_cb, 0, FTW_PHYS); 2516ee519a1fSgjelinek 2517ee519a1fSgjelinek (void) pthread_mutex_unlock(&zonecfg_devwalk_lock); 2518ee519a1fSgjelinek return (Z_OK); 2519ee519a1fSgjelinek } 2520ee519a1fSgjelinek 2521ee519a1fSgjelinek /* 2522ee519a1fSgjelinek * Update the owner, group, mode and acl on the specified dev (inpath) for 2523ee519a1fSgjelinek * the zone (hdl). This function can be used to fix up the dev tree after 2524ee519a1fSgjelinek * attaching a migrated zone. 2525ee519a1fSgjelinek */ 2526ee519a1fSgjelinek int 2527ee519a1fSgjelinek zonecfg_devperms_apply(zone_dochandle_t hdl, const char *inpath, uid_t owner, 2528ee519a1fSgjelinek gid_t group, mode_t mode, const char *acltxt) 2529ee519a1fSgjelinek { 2530ee519a1fSgjelinek int ret; 2531ee519a1fSgjelinek char path[MAXPATHLEN]; 2532ee519a1fSgjelinek struct stat st; 2533ee519a1fSgjelinek acl_t *aclp; 2534ee519a1fSgjelinek 2535ee519a1fSgjelinek if ((ret = zonecfg_get_zonepath(hdl, path, sizeof (path))) != Z_OK) 2536ee519a1fSgjelinek return (ret); 2537ee519a1fSgjelinek 2538ee519a1fSgjelinek if (strlcat(path, "/dev/", sizeof (path)) >= sizeof (path)) 2539ee519a1fSgjelinek return (Z_TOO_BIG); 2540ee519a1fSgjelinek if (strlcat(path, inpath, sizeof (path)) >= sizeof (path)) 2541ee519a1fSgjelinek return (Z_TOO_BIG); 2542ee519a1fSgjelinek 2543ee519a1fSgjelinek if (stat(path, &st) == -1) 2544ee519a1fSgjelinek return (Z_INVAL); 2545ee519a1fSgjelinek 2546ee519a1fSgjelinek /* make sure we're only touching device nodes */ 2547ee519a1fSgjelinek if (!S_ISCHR(st.st_mode) && !S_ISBLK(st.st_mode)) 2548ee519a1fSgjelinek return (Z_INVAL); 2549ee519a1fSgjelinek 2550ee519a1fSgjelinek if (chown(path, owner, group) == -1) 2551ee519a1fSgjelinek return (Z_SYSTEM); 2552ee519a1fSgjelinek 2553ee519a1fSgjelinek if (chmod(path, mode) == -1) 2554ee519a1fSgjelinek return (Z_SYSTEM); 2555ee519a1fSgjelinek 2556ee519a1fSgjelinek if ((acltxt == NULL) || (strcmp(acltxt, "") == 0)) 2557ee519a1fSgjelinek return (Z_OK); 2558ee519a1fSgjelinek 2559ee519a1fSgjelinek if (acl_fromtext(acltxt, &aclp) != 0) 2560ee519a1fSgjelinek return (Z_SYSTEM); 2561ee519a1fSgjelinek 2562ee519a1fSgjelinek errno = 0; 2563ee519a1fSgjelinek if (acl_set(path, aclp) == -1) { 2564ee519a1fSgjelinek free(aclp); 2565ee519a1fSgjelinek return (Z_SYSTEM); 2566ee519a1fSgjelinek } 2567ee519a1fSgjelinek 2568ee519a1fSgjelinek free(aclp); 2569ee519a1fSgjelinek return (Z_OK); 2570ee519a1fSgjelinek } 2571ee519a1fSgjelinek 25727c478bd9Sstevel@tonic-gate /* 25737c478bd9Sstevel@tonic-gate * This function finds everything mounted under a zone's rootpath. 25747c478bd9Sstevel@tonic-gate * This returns the number of mounts under rootpath, or -1 on error. 25757c478bd9Sstevel@tonic-gate * callback is called once per mount found with the first argument 25767c478bd9Sstevel@tonic-gate * pointing to the mount point. 25777c478bd9Sstevel@tonic-gate * 25787c478bd9Sstevel@tonic-gate * If the callback function returns non-zero zonecfg_find_mounts 25797c478bd9Sstevel@tonic-gate * aborts with an error. 25807c478bd9Sstevel@tonic-gate */ 25817c478bd9Sstevel@tonic-gate int 25827c478bd9Sstevel@tonic-gate zonecfg_find_mounts(char *rootpath, int (*callback)(const char *, void *), 25837c478bd9Sstevel@tonic-gate void *priv) { 25847c478bd9Sstevel@tonic-gate FILE *mnttab; 25857c478bd9Sstevel@tonic-gate struct mnttab m; 25867c478bd9Sstevel@tonic-gate size_t l; 258707b574eeSgjelinek int zfsl; 25887c478bd9Sstevel@tonic-gate int rv = 0; 258907b574eeSgjelinek char zfs_path[MAXPATHLEN]; 25907c478bd9Sstevel@tonic-gate 25917c478bd9Sstevel@tonic-gate assert(rootpath != NULL); 25927c478bd9Sstevel@tonic-gate 259307b574eeSgjelinek if ((zfsl = snprintf(zfs_path, sizeof (zfs_path), "%s/.zfs/", rootpath)) 259407b574eeSgjelinek >= sizeof (zfs_path)) 259507b574eeSgjelinek return (-1); 259607b574eeSgjelinek 25977c478bd9Sstevel@tonic-gate l = strlen(rootpath); 25987c478bd9Sstevel@tonic-gate 25997c478bd9Sstevel@tonic-gate mnttab = fopen("/etc/mnttab", "r"); 26007c478bd9Sstevel@tonic-gate 26017c478bd9Sstevel@tonic-gate if (mnttab == NULL) 26027c478bd9Sstevel@tonic-gate return (-1); 26037c478bd9Sstevel@tonic-gate 26047c478bd9Sstevel@tonic-gate if (ioctl(fileno(mnttab), MNTIOC_SHOWHIDDEN, NULL) < 0) { 26057c478bd9Sstevel@tonic-gate rv = -1; 26067c478bd9Sstevel@tonic-gate goto out; 26077c478bd9Sstevel@tonic-gate } 26087c478bd9Sstevel@tonic-gate 26097c478bd9Sstevel@tonic-gate while (!getmntent(mnttab, &m)) { 26107c478bd9Sstevel@tonic-gate if ((strncmp(rootpath, m.mnt_mountp, l) == 0) && 261107b574eeSgjelinek (m.mnt_mountp[l] == '/') && 261207b574eeSgjelinek (strncmp(zfs_path, m.mnt_mountp, zfsl) != 0)) { 26137c478bd9Sstevel@tonic-gate rv++; 26147c478bd9Sstevel@tonic-gate if (callback == NULL) 26157c478bd9Sstevel@tonic-gate continue; 26167c478bd9Sstevel@tonic-gate if (callback(m.mnt_mountp, priv)) { 26177c478bd9Sstevel@tonic-gate rv = -1; 26187c478bd9Sstevel@tonic-gate goto out; 26197c478bd9Sstevel@tonic-gate 26207c478bd9Sstevel@tonic-gate } 26217c478bd9Sstevel@tonic-gate } 26227c478bd9Sstevel@tonic-gate } 26237c478bd9Sstevel@tonic-gate 26247c478bd9Sstevel@tonic-gate out: 26257c478bd9Sstevel@tonic-gate (void) fclose(mnttab); 26267c478bd9Sstevel@tonic-gate return (rv); 26277c478bd9Sstevel@tonic-gate } 26287c478bd9Sstevel@tonic-gate 26297c478bd9Sstevel@tonic-gate int 26307c478bd9Sstevel@tonic-gate zonecfg_lookup_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 26317c478bd9Sstevel@tonic-gate { 26327c478bd9Sstevel@tonic-gate xmlNodePtr cur, firstmatch; 26337c478bd9Sstevel@tonic-gate int err; 26347c478bd9Sstevel@tonic-gate char name[MAXNAMELEN], type[MAXNAMELEN], value[MAXNAMELEN]; 26357c478bd9Sstevel@tonic-gate 26367c478bd9Sstevel@tonic-gate if (tabptr == NULL) 26377c478bd9Sstevel@tonic-gate return (Z_INVAL); 26387c478bd9Sstevel@tonic-gate 26397c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 26407c478bd9Sstevel@tonic-gate return (err); 26417c478bd9Sstevel@tonic-gate 26427c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 26437c478bd9Sstevel@tonic-gate firstmatch = NULL; 26447c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 26457c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 26467c478bd9Sstevel@tonic-gate continue; 26477c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_attr_name) > 0) { 26487c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_NAME, name, 26497c478bd9Sstevel@tonic-gate sizeof (name)) == Z_OK) && 26507c478bd9Sstevel@tonic-gate (strcmp(tabptr->zone_attr_name, name) == 0)) { 26517c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 26527c478bd9Sstevel@tonic-gate firstmatch = cur; 26537c478bd9Sstevel@tonic-gate else 26547c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 26557c478bd9Sstevel@tonic-gate } 26567c478bd9Sstevel@tonic-gate } 26577c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_attr_type) > 0) { 26587c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_TYPE, type, 26597c478bd9Sstevel@tonic-gate sizeof (type)) == Z_OK)) { 26607c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_attr_type, type) == 0) { 26617c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 26627c478bd9Sstevel@tonic-gate firstmatch = cur; 26637c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 26647c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 26657c478bd9Sstevel@tonic-gate } else { 26667c478bd9Sstevel@tonic-gate /* 26677c478bd9Sstevel@tonic-gate * If another property matched but this 26687c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 26697c478bd9Sstevel@tonic-gate */ 26707c478bd9Sstevel@tonic-gate if (firstmatch == cur) 26717c478bd9Sstevel@tonic-gate firstmatch = NULL; 26727c478bd9Sstevel@tonic-gate } 26737c478bd9Sstevel@tonic-gate } 26747c478bd9Sstevel@tonic-gate } 26757c478bd9Sstevel@tonic-gate if (strlen(tabptr->zone_attr_value) > 0) { 26767c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_VALUE, value, 26777c478bd9Sstevel@tonic-gate sizeof (value)) == Z_OK)) { 26787c478bd9Sstevel@tonic-gate if (strcmp(tabptr->zone_attr_value, value) == 26797c478bd9Sstevel@tonic-gate 0) { 26807c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 26817c478bd9Sstevel@tonic-gate firstmatch = cur; 26827c478bd9Sstevel@tonic-gate else if (firstmatch != cur) 26837c478bd9Sstevel@tonic-gate return (Z_INSUFFICIENT_SPEC); 26847c478bd9Sstevel@tonic-gate } else { 26857c478bd9Sstevel@tonic-gate /* 26867c478bd9Sstevel@tonic-gate * If another property matched but this 26877c478bd9Sstevel@tonic-gate * one doesn't then reset firstmatch. 26887c478bd9Sstevel@tonic-gate */ 26897c478bd9Sstevel@tonic-gate if (firstmatch == cur) 26907c478bd9Sstevel@tonic-gate firstmatch = NULL; 26917c478bd9Sstevel@tonic-gate } 26927c478bd9Sstevel@tonic-gate } 26937c478bd9Sstevel@tonic-gate } 26947c478bd9Sstevel@tonic-gate } 26957c478bd9Sstevel@tonic-gate if (firstmatch == NULL) 26967c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 26977c478bd9Sstevel@tonic-gate 26987c478bd9Sstevel@tonic-gate cur = firstmatch; 26997c478bd9Sstevel@tonic-gate 27007c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_attr_name, 27017c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_name))) != Z_OK) 27027c478bd9Sstevel@tonic-gate return (err); 27037c478bd9Sstevel@tonic-gate 27047c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_attr_type, 27057c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_type))) != Z_OK) 27067c478bd9Sstevel@tonic-gate return (err); 27077c478bd9Sstevel@tonic-gate 27087c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_VALUE, tabptr->zone_attr_value, 27097c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_value))) != Z_OK) 27107c478bd9Sstevel@tonic-gate return (err); 27117c478bd9Sstevel@tonic-gate 27127c478bd9Sstevel@tonic-gate return (Z_OK); 27137c478bd9Sstevel@tonic-gate } 27147c478bd9Sstevel@tonic-gate 27157c478bd9Sstevel@tonic-gate static int 27167c478bd9Sstevel@tonic-gate zonecfg_add_attr_core(zone_dochandle_t handle, struct zone_attrtab *tabptr) 27177c478bd9Sstevel@tonic-gate { 27187c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur; 27197c478bd9Sstevel@tonic-gate int err; 27207c478bd9Sstevel@tonic-gate 27217c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_ATTR, NULL); 2722a1be23daSdp err = newprop(newnode, DTD_ATTR_NAME, tabptr->zone_attr_name); 27237c478bd9Sstevel@tonic-gate if (err != Z_OK) 27247c478bd9Sstevel@tonic-gate return (err); 2725a1be23daSdp err = newprop(newnode, DTD_ATTR_TYPE, tabptr->zone_attr_type); 27267c478bd9Sstevel@tonic-gate if (err != Z_OK) 27277c478bd9Sstevel@tonic-gate return (err); 2728a1be23daSdp err = newprop(newnode, DTD_ATTR_VALUE, tabptr->zone_attr_value); 27297c478bd9Sstevel@tonic-gate if (err != Z_OK) 27307c478bd9Sstevel@tonic-gate return (err); 27317c478bd9Sstevel@tonic-gate return (Z_OK); 27327c478bd9Sstevel@tonic-gate } 27337c478bd9Sstevel@tonic-gate 27347c478bd9Sstevel@tonic-gate int 27357c478bd9Sstevel@tonic-gate zonecfg_add_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 27367c478bd9Sstevel@tonic-gate { 27377c478bd9Sstevel@tonic-gate int err; 27387c478bd9Sstevel@tonic-gate 27397c478bd9Sstevel@tonic-gate if (tabptr == NULL) 27407c478bd9Sstevel@tonic-gate return (Z_INVAL); 27417c478bd9Sstevel@tonic-gate 27427c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 27437c478bd9Sstevel@tonic-gate return (err); 27447c478bd9Sstevel@tonic-gate 27457c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_attr_core(handle, tabptr)) != Z_OK) 27467c478bd9Sstevel@tonic-gate return (err); 27477c478bd9Sstevel@tonic-gate 27487c478bd9Sstevel@tonic-gate return (Z_OK); 27497c478bd9Sstevel@tonic-gate } 27507c478bd9Sstevel@tonic-gate 27517c478bd9Sstevel@tonic-gate static int 27527c478bd9Sstevel@tonic-gate zonecfg_delete_attr_core(zone_dochandle_t handle, struct zone_attrtab *tabptr) 27537c478bd9Sstevel@tonic-gate { 27547c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 27557c478bd9Sstevel@tonic-gate int name_match, type_match, value_match; 27567c478bd9Sstevel@tonic-gate 27577c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 27587c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 27597c478bd9Sstevel@tonic-gate continue; 27607c478bd9Sstevel@tonic-gate 27617c478bd9Sstevel@tonic-gate name_match = match_prop(cur, DTD_ATTR_NAME, 27627c478bd9Sstevel@tonic-gate tabptr->zone_attr_name); 27637c478bd9Sstevel@tonic-gate type_match = match_prop(cur, DTD_ATTR_TYPE, 27647c478bd9Sstevel@tonic-gate tabptr->zone_attr_type); 27657c478bd9Sstevel@tonic-gate value_match = match_prop(cur, DTD_ATTR_VALUE, 27667c478bd9Sstevel@tonic-gate tabptr->zone_attr_value); 27677c478bd9Sstevel@tonic-gate 27687c478bd9Sstevel@tonic-gate if (name_match && type_match && value_match) { 27697c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 27707c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 27717c478bd9Sstevel@tonic-gate return (Z_OK); 27727c478bd9Sstevel@tonic-gate } 27737c478bd9Sstevel@tonic-gate } 27747c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 27757c478bd9Sstevel@tonic-gate } 27767c478bd9Sstevel@tonic-gate 27777c478bd9Sstevel@tonic-gate int 27787c478bd9Sstevel@tonic-gate zonecfg_delete_attr(zone_dochandle_t handle, struct zone_attrtab *tabptr) 27797c478bd9Sstevel@tonic-gate { 27807c478bd9Sstevel@tonic-gate int err; 27817c478bd9Sstevel@tonic-gate 27827c478bd9Sstevel@tonic-gate if (tabptr == NULL) 27837c478bd9Sstevel@tonic-gate return (Z_INVAL); 27847c478bd9Sstevel@tonic-gate 27857c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 27867c478bd9Sstevel@tonic-gate return (err); 27877c478bd9Sstevel@tonic-gate 27887c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_attr_core(handle, tabptr)) != Z_OK) 27897c478bd9Sstevel@tonic-gate return (err); 27907c478bd9Sstevel@tonic-gate 27917c478bd9Sstevel@tonic-gate return (Z_OK); 27927c478bd9Sstevel@tonic-gate } 27937c478bd9Sstevel@tonic-gate 27947c478bd9Sstevel@tonic-gate int 27957c478bd9Sstevel@tonic-gate zonecfg_modify_attr( 27967c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 27977c478bd9Sstevel@tonic-gate struct zone_attrtab *oldtabptr, 27987c478bd9Sstevel@tonic-gate struct zone_attrtab *newtabptr) 27997c478bd9Sstevel@tonic-gate { 28007c478bd9Sstevel@tonic-gate int err; 28017c478bd9Sstevel@tonic-gate 28027c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || newtabptr == NULL) 28037c478bd9Sstevel@tonic-gate return (Z_INVAL); 28047c478bd9Sstevel@tonic-gate 28057c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 28067c478bd9Sstevel@tonic-gate return (err); 28077c478bd9Sstevel@tonic-gate 28087c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_attr_core(handle, oldtabptr)) != Z_OK) 28097c478bd9Sstevel@tonic-gate return (err); 28107c478bd9Sstevel@tonic-gate 28117c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_attr_core(handle, newtabptr)) != Z_OK) 28127c478bd9Sstevel@tonic-gate return (err); 28137c478bd9Sstevel@tonic-gate 28147c478bd9Sstevel@tonic-gate return (Z_OK); 28157c478bd9Sstevel@tonic-gate } 28167c478bd9Sstevel@tonic-gate 28177c478bd9Sstevel@tonic-gate int 28187c478bd9Sstevel@tonic-gate zonecfg_get_attr_boolean(const struct zone_attrtab *attr, boolean_t *value) 28197c478bd9Sstevel@tonic-gate { 28207c478bd9Sstevel@tonic-gate if (attr == NULL) 28217c478bd9Sstevel@tonic-gate return (Z_INVAL); 28227c478bd9Sstevel@tonic-gate 28237c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_type, DTD_ENTITY_BOOLEAN) != 0) 28247c478bd9Sstevel@tonic-gate return (Z_INVAL); 28257c478bd9Sstevel@tonic-gate 28267c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_value, DTD_ENTITY_TRUE) == 0) { 28277c478bd9Sstevel@tonic-gate *value = B_TRUE; 28287c478bd9Sstevel@tonic-gate return (Z_OK); 28297c478bd9Sstevel@tonic-gate } 28307c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_value, DTD_ENTITY_FALSE) == 0) { 28317c478bd9Sstevel@tonic-gate *value = B_FALSE; 28327c478bd9Sstevel@tonic-gate return (Z_OK); 28337c478bd9Sstevel@tonic-gate } 28347c478bd9Sstevel@tonic-gate return (Z_INVAL); 28357c478bd9Sstevel@tonic-gate } 28367c478bd9Sstevel@tonic-gate 28377c478bd9Sstevel@tonic-gate int 28387c478bd9Sstevel@tonic-gate zonecfg_get_attr_int(const struct zone_attrtab *attr, int64_t *value) 28397c478bd9Sstevel@tonic-gate { 28407c478bd9Sstevel@tonic-gate long long result; 28417c478bd9Sstevel@tonic-gate char *endptr; 28427c478bd9Sstevel@tonic-gate 28437c478bd9Sstevel@tonic-gate if (attr == NULL) 28447c478bd9Sstevel@tonic-gate return (Z_INVAL); 28457c478bd9Sstevel@tonic-gate 28467c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_type, DTD_ENTITY_INT) != 0) 28477c478bd9Sstevel@tonic-gate return (Z_INVAL); 28487c478bd9Sstevel@tonic-gate 28497c478bd9Sstevel@tonic-gate errno = 0; 28507c478bd9Sstevel@tonic-gate result = strtoll(attr->zone_attr_value, &endptr, 10); 28517c478bd9Sstevel@tonic-gate if (errno != 0 || *endptr != '\0') 28527c478bd9Sstevel@tonic-gate return (Z_INVAL); 28537c478bd9Sstevel@tonic-gate *value = result; 28547c478bd9Sstevel@tonic-gate return (Z_OK); 28557c478bd9Sstevel@tonic-gate } 28567c478bd9Sstevel@tonic-gate 28577c478bd9Sstevel@tonic-gate int 28587c478bd9Sstevel@tonic-gate zonecfg_get_attr_string(const struct zone_attrtab *attr, char *value, 28597c478bd9Sstevel@tonic-gate size_t val_sz) 28607c478bd9Sstevel@tonic-gate { 28617c478bd9Sstevel@tonic-gate if (attr == NULL) 28627c478bd9Sstevel@tonic-gate return (Z_INVAL); 28637c478bd9Sstevel@tonic-gate 28647c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_type, DTD_ENTITY_STRING) != 0) 28657c478bd9Sstevel@tonic-gate return (Z_INVAL); 28667c478bd9Sstevel@tonic-gate 28677c478bd9Sstevel@tonic-gate if (strlcpy(value, attr->zone_attr_value, val_sz) >= val_sz) 28687c478bd9Sstevel@tonic-gate return (Z_TOO_BIG); 28697c478bd9Sstevel@tonic-gate return (Z_OK); 28707c478bd9Sstevel@tonic-gate } 28717c478bd9Sstevel@tonic-gate 28727c478bd9Sstevel@tonic-gate int 28737c478bd9Sstevel@tonic-gate zonecfg_get_attr_uint(const struct zone_attrtab *attr, uint64_t *value) 28747c478bd9Sstevel@tonic-gate { 28757c478bd9Sstevel@tonic-gate unsigned long long result; 28767c478bd9Sstevel@tonic-gate long long neg_result; 28777c478bd9Sstevel@tonic-gate char *endptr; 28787c478bd9Sstevel@tonic-gate 28797c478bd9Sstevel@tonic-gate if (attr == NULL) 28807c478bd9Sstevel@tonic-gate return (Z_INVAL); 28817c478bd9Sstevel@tonic-gate 28827c478bd9Sstevel@tonic-gate if (strcmp(attr->zone_attr_type, DTD_ENTITY_UINT) != 0) 28837c478bd9Sstevel@tonic-gate return (Z_INVAL); 28847c478bd9Sstevel@tonic-gate 28857c478bd9Sstevel@tonic-gate errno = 0; 28867c478bd9Sstevel@tonic-gate result = strtoull(attr->zone_attr_value, &endptr, 10); 28877c478bd9Sstevel@tonic-gate if (errno != 0 || *endptr != '\0') 28887c478bd9Sstevel@tonic-gate return (Z_INVAL); 28897c478bd9Sstevel@tonic-gate errno = 0; 28907c478bd9Sstevel@tonic-gate neg_result = strtoll(attr->zone_attr_value, &endptr, 10); 28917c478bd9Sstevel@tonic-gate /* 28927c478bd9Sstevel@tonic-gate * Incredibly, strtoull("<negative number>", ...) will not fail but 28937c478bd9Sstevel@tonic-gate * return whatever (negative) number cast as a u_longlong_t, so we 28947c478bd9Sstevel@tonic-gate * need to look for this here. 28957c478bd9Sstevel@tonic-gate */ 28967c478bd9Sstevel@tonic-gate if (errno == 0 && neg_result < 0) 28977c478bd9Sstevel@tonic-gate return (Z_INVAL); 28987c478bd9Sstevel@tonic-gate *value = result; 28997c478bd9Sstevel@tonic-gate return (Z_OK); 29007c478bd9Sstevel@tonic-gate } 29017c478bd9Sstevel@tonic-gate 29027c478bd9Sstevel@tonic-gate int 29037c478bd9Sstevel@tonic-gate zonecfg_lookup_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 29047c478bd9Sstevel@tonic-gate { 29057c478bd9Sstevel@tonic-gate xmlNodePtr cur, val; 29067c478bd9Sstevel@tonic-gate char savedname[MAXNAMELEN]; 29077c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valptr; 29087c478bd9Sstevel@tonic-gate int err; 29097c478bd9Sstevel@tonic-gate 29107c478bd9Sstevel@tonic-gate if (tabptr->zone_rctl_name == NULL || 29117c478bd9Sstevel@tonic-gate strlen(tabptr->zone_rctl_name) == 0) 29127c478bd9Sstevel@tonic-gate return (Z_INVAL); 29137c478bd9Sstevel@tonic-gate 29147c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 29157c478bd9Sstevel@tonic-gate return (err); 29167c478bd9Sstevel@tonic-gate 29177c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 29187c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 29197c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 29207c478bd9Sstevel@tonic-gate continue; 29217c478bd9Sstevel@tonic-gate if ((fetchprop(cur, DTD_ATTR_NAME, savedname, 29227c478bd9Sstevel@tonic-gate sizeof (savedname)) == Z_OK) && 29237c478bd9Sstevel@tonic-gate (strcmp(savedname, tabptr->zone_rctl_name) == 0)) { 29247c478bd9Sstevel@tonic-gate tabptr->zone_rctl_valptr = NULL; 29257c478bd9Sstevel@tonic-gate for (val = cur->xmlChildrenNode; val != NULL; 29267c478bd9Sstevel@tonic-gate val = val->next) { 29277c478bd9Sstevel@tonic-gate valptr = (struct zone_rctlvaltab *)malloc( 29287c478bd9Sstevel@tonic-gate sizeof (struct zone_rctlvaltab)); 29297c478bd9Sstevel@tonic-gate if (valptr == NULL) 29307c478bd9Sstevel@tonic-gate return (Z_NOMEM); 29317c478bd9Sstevel@tonic-gate if ((fetchprop(val, DTD_ATTR_PRIV, 29327c478bd9Sstevel@tonic-gate valptr->zone_rctlval_priv, 29337c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_priv)) != 29347c478bd9Sstevel@tonic-gate Z_OK)) 29357c478bd9Sstevel@tonic-gate break; 29367c478bd9Sstevel@tonic-gate if ((fetchprop(val, DTD_ATTR_LIMIT, 29377c478bd9Sstevel@tonic-gate valptr->zone_rctlval_limit, 29387c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_limit)) != 29397c478bd9Sstevel@tonic-gate Z_OK)) 29407c478bd9Sstevel@tonic-gate break; 29417c478bd9Sstevel@tonic-gate if ((fetchprop(val, DTD_ATTR_ACTION, 29427c478bd9Sstevel@tonic-gate valptr->zone_rctlval_action, 29437c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_action)) != 29447c478bd9Sstevel@tonic-gate Z_OK)) 29457c478bd9Sstevel@tonic-gate break; 29467c478bd9Sstevel@tonic-gate if (zonecfg_add_rctl_value(tabptr, valptr) != 29477c478bd9Sstevel@tonic-gate Z_OK) 29487c478bd9Sstevel@tonic-gate break; 29497c478bd9Sstevel@tonic-gate } 29507c478bd9Sstevel@tonic-gate return (Z_OK); 29517c478bd9Sstevel@tonic-gate } 29527c478bd9Sstevel@tonic-gate } 29537c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 29547c478bd9Sstevel@tonic-gate } 29557c478bd9Sstevel@tonic-gate 29567c478bd9Sstevel@tonic-gate static int 29577c478bd9Sstevel@tonic-gate zonecfg_add_rctl_core(zone_dochandle_t handle, struct zone_rctltab *tabptr) 29587c478bd9Sstevel@tonic-gate { 29597c478bd9Sstevel@tonic-gate xmlNodePtr newnode, cur = handle->zone_dh_cur, valnode; 29607c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valptr; 29617c478bd9Sstevel@tonic-gate int err; 29627c478bd9Sstevel@tonic-gate 29637c478bd9Sstevel@tonic-gate newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_RCTL, NULL); 2964a1be23daSdp err = newprop(newnode, DTD_ATTR_NAME, tabptr->zone_rctl_name); 29657c478bd9Sstevel@tonic-gate if (err != Z_OK) 29667c478bd9Sstevel@tonic-gate return (err); 29677c478bd9Sstevel@tonic-gate for (valptr = tabptr->zone_rctl_valptr; valptr != NULL; 29687c478bd9Sstevel@tonic-gate valptr = valptr->zone_rctlval_next) { 29697c478bd9Sstevel@tonic-gate valnode = xmlNewTextChild(newnode, NULL, 29707c478bd9Sstevel@tonic-gate DTD_ELEM_RCTLVALUE, NULL); 2971a1be23daSdp err = newprop(valnode, DTD_ATTR_PRIV, 29727c478bd9Sstevel@tonic-gate valptr->zone_rctlval_priv); 29737c478bd9Sstevel@tonic-gate if (err != Z_OK) 29747c478bd9Sstevel@tonic-gate return (err); 2975a1be23daSdp err = newprop(valnode, DTD_ATTR_LIMIT, 29767c478bd9Sstevel@tonic-gate valptr->zone_rctlval_limit); 29777c478bd9Sstevel@tonic-gate if (err != Z_OK) 29787c478bd9Sstevel@tonic-gate return (err); 2979a1be23daSdp err = newprop(valnode, DTD_ATTR_ACTION, 29807c478bd9Sstevel@tonic-gate valptr->zone_rctlval_action); 29817c478bd9Sstevel@tonic-gate if (err != Z_OK) 29827c478bd9Sstevel@tonic-gate return (err); 29837c478bd9Sstevel@tonic-gate } 29847c478bd9Sstevel@tonic-gate return (Z_OK); 29857c478bd9Sstevel@tonic-gate } 29867c478bd9Sstevel@tonic-gate 29877c478bd9Sstevel@tonic-gate int 29887c478bd9Sstevel@tonic-gate zonecfg_add_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 29897c478bd9Sstevel@tonic-gate { 29907c478bd9Sstevel@tonic-gate int err; 29917c478bd9Sstevel@tonic-gate 29927c478bd9Sstevel@tonic-gate if (tabptr == NULL || tabptr->zone_rctl_name == NULL) 29937c478bd9Sstevel@tonic-gate return (Z_INVAL); 29947c478bd9Sstevel@tonic-gate 29957c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 29967c478bd9Sstevel@tonic-gate return (err); 29977c478bd9Sstevel@tonic-gate 29987c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_rctl_core(handle, tabptr)) != Z_OK) 29997c478bd9Sstevel@tonic-gate return (err); 30007c478bd9Sstevel@tonic-gate 30017c478bd9Sstevel@tonic-gate return (Z_OK); 30027c478bd9Sstevel@tonic-gate } 30037c478bd9Sstevel@tonic-gate 30047c478bd9Sstevel@tonic-gate static int 30057c478bd9Sstevel@tonic-gate zonecfg_delete_rctl_core(zone_dochandle_t handle, struct zone_rctltab *tabptr) 30067c478bd9Sstevel@tonic-gate { 30077c478bd9Sstevel@tonic-gate xmlNodePtr cur = handle->zone_dh_cur; 30087c478bd9Sstevel@tonic-gate xmlChar *savedname; 30097c478bd9Sstevel@tonic-gate int name_result; 30107c478bd9Sstevel@tonic-gate 30117c478bd9Sstevel@tonic-gate for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 30127c478bd9Sstevel@tonic-gate if (xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 30137c478bd9Sstevel@tonic-gate continue; 30147c478bd9Sstevel@tonic-gate 30157c478bd9Sstevel@tonic-gate savedname = xmlGetProp(cur, DTD_ATTR_NAME); 30167c478bd9Sstevel@tonic-gate if (savedname == NULL) /* shouldn't happen */ 30177c478bd9Sstevel@tonic-gate continue; 30187c478bd9Sstevel@tonic-gate name_result = xmlStrcmp(savedname, 30197c478bd9Sstevel@tonic-gate (const xmlChar *) tabptr->zone_rctl_name); 30207c478bd9Sstevel@tonic-gate xmlFree(savedname); 30217c478bd9Sstevel@tonic-gate 30227c478bd9Sstevel@tonic-gate if (name_result == 0) { 30237c478bd9Sstevel@tonic-gate xmlUnlinkNode(cur); 30247c478bd9Sstevel@tonic-gate xmlFreeNode(cur); 30257c478bd9Sstevel@tonic-gate return (Z_OK); 30267c478bd9Sstevel@tonic-gate } 30277c478bd9Sstevel@tonic-gate } 30287c478bd9Sstevel@tonic-gate return (Z_NO_RESOURCE_ID); 30297c478bd9Sstevel@tonic-gate } 30307c478bd9Sstevel@tonic-gate 30317c478bd9Sstevel@tonic-gate int 30327c478bd9Sstevel@tonic-gate zonecfg_delete_rctl(zone_dochandle_t handle, struct zone_rctltab *tabptr) 30337c478bd9Sstevel@tonic-gate { 30347c478bd9Sstevel@tonic-gate int err; 30357c478bd9Sstevel@tonic-gate 30367c478bd9Sstevel@tonic-gate if (tabptr == NULL || tabptr->zone_rctl_name == NULL) 30377c478bd9Sstevel@tonic-gate return (Z_INVAL); 30387c478bd9Sstevel@tonic-gate 30397c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 30407c478bd9Sstevel@tonic-gate return (err); 30417c478bd9Sstevel@tonic-gate 30427c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_rctl_core(handle, tabptr)) != Z_OK) 30437c478bd9Sstevel@tonic-gate return (err); 30447c478bd9Sstevel@tonic-gate 30457c478bd9Sstevel@tonic-gate return (Z_OK); 30467c478bd9Sstevel@tonic-gate } 30477c478bd9Sstevel@tonic-gate 30487c478bd9Sstevel@tonic-gate int 30497c478bd9Sstevel@tonic-gate zonecfg_modify_rctl( 30507c478bd9Sstevel@tonic-gate zone_dochandle_t handle, 30517c478bd9Sstevel@tonic-gate struct zone_rctltab *oldtabptr, 30527c478bd9Sstevel@tonic-gate struct zone_rctltab *newtabptr) 30537c478bd9Sstevel@tonic-gate { 30547c478bd9Sstevel@tonic-gate int err; 30557c478bd9Sstevel@tonic-gate 30567c478bd9Sstevel@tonic-gate if (oldtabptr == NULL || oldtabptr->zone_rctl_name == NULL || 30577c478bd9Sstevel@tonic-gate newtabptr == NULL || newtabptr->zone_rctl_name == NULL) 30587c478bd9Sstevel@tonic-gate return (Z_INVAL); 30597c478bd9Sstevel@tonic-gate 30607c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) 30617c478bd9Sstevel@tonic-gate return (err); 30627c478bd9Sstevel@tonic-gate 30637c478bd9Sstevel@tonic-gate if ((err = zonecfg_delete_rctl_core(handle, oldtabptr)) != Z_OK) 30647c478bd9Sstevel@tonic-gate return (err); 30657c478bd9Sstevel@tonic-gate 30667c478bd9Sstevel@tonic-gate if ((err = zonecfg_add_rctl_core(handle, newtabptr)) != Z_OK) 30677c478bd9Sstevel@tonic-gate return (err); 30687c478bd9Sstevel@tonic-gate 30697c478bd9Sstevel@tonic-gate return (Z_OK); 30707c478bd9Sstevel@tonic-gate } 30717c478bd9Sstevel@tonic-gate 30727c478bd9Sstevel@tonic-gate int 30737c478bd9Sstevel@tonic-gate zonecfg_add_rctl_value( 30747c478bd9Sstevel@tonic-gate struct zone_rctltab *tabptr, 30757c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valtabptr) 30767c478bd9Sstevel@tonic-gate { 30777c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *last, *old, *new; 30787c478bd9Sstevel@tonic-gate rctlblk_t *rctlblk = alloca(rctlblk_size()); 30797c478bd9Sstevel@tonic-gate 30807c478bd9Sstevel@tonic-gate last = tabptr->zone_rctl_valptr; 30817c478bd9Sstevel@tonic-gate for (old = last; old != NULL; old = old->zone_rctlval_next) 30827c478bd9Sstevel@tonic-gate last = old; /* walk to the end of the list */ 30837c478bd9Sstevel@tonic-gate new = valtabptr; /* alloc'd by caller */ 30847c478bd9Sstevel@tonic-gate new->zone_rctlval_next = NULL; 30857c478bd9Sstevel@tonic-gate if (zonecfg_construct_rctlblk(valtabptr, rctlblk) != Z_OK) 30867c478bd9Sstevel@tonic-gate return (Z_INVAL); 30877c478bd9Sstevel@tonic-gate if (!zonecfg_valid_rctlblk(rctlblk)) 30887c478bd9Sstevel@tonic-gate return (Z_INVAL); 30897c478bd9Sstevel@tonic-gate if (last == NULL) 30907c478bd9Sstevel@tonic-gate tabptr->zone_rctl_valptr = new; 30917c478bd9Sstevel@tonic-gate else 30927c478bd9Sstevel@tonic-gate last->zone_rctlval_next = new; 30937c478bd9Sstevel@tonic-gate return (Z_OK); 30947c478bd9Sstevel@tonic-gate } 30957c478bd9Sstevel@tonic-gate 30967c478bd9Sstevel@tonic-gate int 30977c478bd9Sstevel@tonic-gate zonecfg_remove_rctl_value( 30987c478bd9Sstevel@tonic-gate struct zone_rctltab *tabptr, 30997c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valtabptr) 31007c478bd9Sstevel@tonic-gate { 31017c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *last, *this, *next; 31027c478bd9Sstevel@tonic-gate 31037c478bd9Sstevel@tonic-gate last = tabptr->zone_rctl_valptr; 31047c478bd9Sstevel@tonic-gate for (this = last; this != NULL; this = this->zone_rctlval_next) { 31057c478bd9Sstevel@tonic-gate if (strcmp(this->zone_rctlval_priv, 31067c478bd9Sstevel@tonic-gate valtabptr->zone_rctlval_priv) == 0 && 31077c478bd9Sstevel@tonic-gate strcmp(this->zone_rctlval_limit, 31087c478bd9Sstevel@tonic-gate valtabptr->zone_rctlval_limit) == 0 && 31097c478bd9Sstevel@tonic-gate strcmp(this->zone_rctlval_action, 31107c478bd9Sstevel@tonic-gate valtabptr->zone_rctlval_action) == 0) { 31117c478bd9Sstevel@tonic-gate next = this->zone_rctlval_next; 31127c478bd9Sstevel@tonic-gate if (this == tabptr->zone_rctl_valptr) 31137c478bd9Sstevel@tonic-gate tabptr->zone_rctl_valptr = next; 31147c478bd9Sstevel@tonic-gate else 31157c478bd9Sstevel@tonic-gate last->zone_rctlval_next = next; 31167c478bd9Sstevel@tonic-gate free(this); 31177c478bd9Sstevel@tonic-gate return (Z_OK); 31187c478bd9Sstevel@tonic-gate } else 31197c478bd9Sstevel@tonic-gate last = this; 31207c478bd9Sstevel@tonic-gate } 31217c478bd9Sstevel@tonic-gate return (Z_NO_PROPERTY_ID); 31227c478bd9Sstevel@tonic-gate } 31237c478bd9Sstevel@tonic-gate 31247c478bd9Sstevel@tonic-gate char * 31257c478bd9Sstevel@tonic-gate zonecfg_strerror(int errnum) 31267c478bd9Sstevel@tonic-gate { 31277c478bd9Sstevel@tonic-gate switch (errnum) { 31287c478bd9Sstevel@tonic-gate case Z_OK: 31297c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "OK")); 31307c478bd9Sstevel@tonic-gate case Z_EMPTY_DOCUMENT: 31317c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Empty document")); 31327c478bd9Sstevel@tonic-gate case Z_WRONG_DOC_TYPE: 31337c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Wrong document type")); 31347c478bd9Sstevel@tonic-gate case Z_BAD_PROPERTY: 31357c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Bad document property")); 31367c478bd9Sstevel@tonic-gate case Z_TEMP_FILE: 31377c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 31387c478bd9Sstevel@tonic-gate "Problem creating temporary file")); 31397c478bd9Sstevel@tonic-gate case Z_SAVING_FILE: 31407c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Problem saving file")); 31417c478bd9Sstevel@tonic-gate case Z_NO_ENTRY: 31427c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such entry")); 31437c478bd9Sstevel@tonic-gate case Z_BOGUS_ZONE_NAME: 31447c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Bogus zone name")); 31457c478bd9Sstevel@tonic-gate case Z_REQD_RESOURCE_MISSING: 31467c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Required resource missing")); 31477c478bd9Sstevel@tonic-gate case Z_REQD_PROPERTY_MISSING: 31487c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Required property missing")); 31497c478bd9Sstevel@tonic-gate case Z_BAD_HANDLE: 31507c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Bad handle")); 31517c478bd9Sstevel@tonic-gate case Z_NOMEM: 31527c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Out of memory")); 31537c478bd9Sstevel@tonic-gate case Z_INVAL: 31547c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Invalid argument")); 31557c478bd9Sstevel@tonic-gate case Z_ACCES: 31567c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Permission denied")); 31577c478bd9Sstevel@tonic-gate case Z_TOO_BIG: 31587c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Argument list too long")); 31597c478bd9Sstevel@tonic-gate case Z_MISC_FS: 31607c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 31617c478bd9Sstevel@tonic-gate "Miscellaneous file system error")); 31627c478bd9Sstevel@tonic-gate case Z_NO_ZONE: 31637c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such zone configured")); 31647c478bd9Sstevel@tonic-gate case Z_NO_RESOURCE_TYPE: 31657c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such resource type")); 31667c478bd9Sstevel@tonic-gate case Z_NO_RESOURCE_ID: 31677c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such resource with that id")); 31687c478bd9Sstevel@tonic-gate case Z_NO_PROPERTY_TYPE: 31697c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such property type")); 31707c478bd9Sstevel@tonic-gate case Z_NO_PROPERTY_ID: 31717c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such property with that id")); 3172087719fdSdp case Z_BAD_ZONE_STATE: 31737c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 3174087719fdSdp "Zone state is invalid for the requested operation")); 31757c478bd9Sstevel@tonic-gate case Z_INVALID_DOCUMENT: 31767c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Invalid document")); 3177087719fdSdp case Z_NAME_IN_USE: 3178087719fdSdp return (dgettext(TEXT_DOMAIN, "Zone name already in use")); 31797c478bd9Sstevel@tonic-gate case Z_NO_SUCH_ID: 31807c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "No such zone ID")); 31817c478bd9Sstevel@tonic-gate case Z_UPDATING_INDEX: 31827c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Problem updating index file")); 31837c478bd9Sstevel@tonic-gate case Z_LOCKING_FILE: 31847c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Locking index file")); 31857c478bd9Sstevel@tonic-gate case Z_UNLOCKING_FILE: 31867c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Unlocking index file")); 31877c478bd9Sstevel@tonic-gate case Z_INSUFFICIENT_SPEC: 31887c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Insufficient specification")); 31897c478bd9Sstevel@tonic-gate case Z_RESOLVED_PATH: 31907c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Resolved path mismatch")); 31917c478bd9Sstevel@tonic-gate case Z_IPV6_ADDR_PREFIX_LEN: 31927c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 31937c478bd9Sstevel@tonic-gate "IPv6 address missing required prefix length")); 31947c478bd9Sstevel@tonic-gate case Z_BOGUS_ADDRESS: 31957c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, 31967c478bd9Sstevel@tonic-gate "Neither an IPv4 nor an IPv6 address nor a host name")); 3197ffbafc53Scomay case Z_PRIV_PROHIBITED: 3198ffbafc53Scomay return (dgettext(TEXT_DOMAIN, 3199ffbafc53Scomay "Specified privilege is prohibited")); 3200ffbafc53Scomay case Z_PRIV_REQUIRED: 3201ffbafc53Scomay return (dgettext(TEXT_DOMAIN, 3202ffbafc53Scomay "Required privilege is missing")); 3203ffbafc53Scomay case Z_PRIV_UNKNOWN: 3204ffbafc53Scomay return (dgettext(TEXT_DOMAIN, 3205ffbafc53Scomay "Specified privilege is unknown")); 32069acbbeafSnn35248 case Z_BRAND_ERROR: 32079acbbeafSnn35248 return (dgettext(TEXT_DOMAIN, 32089acbbeafSnn35248 "Brand-specific error")); 32090209230bSgjelinek case Z_INCOMPATIBLE: 32100209230bSgjelinek return (dgettext(TEXT_DOMAIN, "Incompatible settings")); 32110209230bSgjelinek case Z_ALIAS_DISALLOW: 32120209230bSgjelinek return (dgettext(TEXT_DOMAIN, 32130209230bSgjelinek "An incompatible rctl already exists for this property")); 32140209230bSgjelinek case Z_CLEAR_DISALLOW: 32150209230bSgjelinek return (dgettext(TEXT_DOMAIN, 32160209230bSgjelinek "Clearing this property is not allowed")); 32170209230bSgjelinek case Z_POOL: 32180209230bSgjelinek return (dgettext(TEXT_DOMAIN, "libpool(3LIB) error")); 32190209230bSgjelinek case Z_POOLS_NOT_ACTIVE: 32200209230bSgjelinek return (dgettext(TEXT_DOMAIN, "Pools facility not active; " 32210209230bSgjelinek "zone will not be bound to pool")); 32220209230bSgjelinek case Z_POOL_ENABLE: 32230209230bSgjelinek return (dgettext(TEXT_DOMAIN, 32240209230bSgjelinek "Could not enable pools facility")); 32250209230bSgjelinek case Z_NO_POOL: 32260209230bSgjelinek return (dgettext(TEXT_DOMAIN, 32270209230bSgjelinek "Pool not found; using default pool")); 32280209230bSgjelinek case Z_POOL_CREATE: 32290209230bSgjelinek return (dgettext(TEXT_DOMAIN, 32300209230bSgjelinek "Could not create a temporary pool")); 32310209230bSgjelinek case Z_POOL_BIND: 32320209230bSgjelinek return (dgettext(TEXT_DOMAIN, "Could not bind zone to pool")); 32337c478bd9Sstevel@tonic-gate default: 32347c478bd9Sstevel@tonic-gate return (dgettext(TEXT_DOMAIN, "Unknown error")); 32357c478bd9Sstevel@tonic-gate } 32367c478bd9Sstevel@tonic-gate } 32377c478bd9Sstevel@tonic-gate 32387c478bd9Sstevel@tonic-gate /* 32397c478bd9Sstevel@tonic-gate * Note that the zonecfg_setXent() and zonecfg_endXent() calls are all the 32407c478bd9Sstevel@tonic-gate * same, as they just turn around and call zonecfg_setent() / zonecfg_endent(). 32417c478bd9Sstevel@tonic-gate */ 32427c478bd9Sstevel@tonic-gate 32437c478bd9Sstevel@tonic-gate static int 32447c478bd9Sstevel@tonic-gate zonecfg_setent(zone_dochandle_t handle) 32457c478bd9Sstevel@tonic-gate { 32467c478bd9Sstevel@tonic-gate xmlNodePtr cur; 32477c478bd9Sstevel@tonic-gate int err; 32487c478bd9Sstevel@tonic-gate 32497c478bd9Sstevel@tonic-gate if (handle == NULL) 32507c478bd9Sstevel@tonic-gate return (Z_INVAL); 32517c478bd9Sstevel@tonic-gate 32527c478bd9Sstevel@tonic-gate if ((err = operation_prep(handle)) != Z_OK) { 32537c478bd9Sstevel@tonic-gate handle->zone_dh_cur = NULL; 32547c478bd9Sstevel@tonic-gate return (err); 32557c478bd9Sstevel@tonic-gate } 32567c478bd9Sstevel@tonic-gate cur = handle->zone_dh_cur; 32577c478bd9Sstevel@tonic-gate cur = cur->xmlChildrenNode; 32587c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur; 32597c478bd9Sstevel@tonic-gate return (Z_OK); 32607c478bd9Sstevel@tonic-gate } 32617c478bd9Sstevel@tonic-gate 32627c478bd9Sstevel@tonic-gate static int 32637c478bd9Sstevel@tonic-gate zonecfg_endent(zone_dochandle_t handle) 32647c478bd9Sstevel@tonic-gate { 32657c478bd9Sstevel@tonic-gate if (handle == NULL) 32667c478bd9Sstevel@tonic-gate return (Z_INVAL); 32677c478bd9Sstevel@tonic-gate 32687c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 32697c478bd9Sstevel@tonic-gate return (Z_OK); 32707c478bd9Sstevel@tonic-gate } 32717c478bd9Sstevel@tonic-gate 32720209230bSgjelinek /* 32730209230bSgjelinek * Do the work required to manipulate a process through libproc. 32740209230bSgjelinek * If grab_process() returns no errors (0), then release_process() 32750209230bSgjelinek * must eventually be called. 32760209230bSgjelinek * 32770209230bSgjelinek * Return values: 32780209230bSgjelinek * 0 Successful creation of agent thread 32790209230bSgjelinek * 1 Error grabbing 32800209230bSgjelinek * 2 Error creating agent 32810209230bSgjelinek */ 32820209230bSgjelinek static int 32830209230bSgjelinek grab_process(pr_info_handle_t *p) 32840209230bSgjelinek { 32850209230bSgjelinek int ret; 32860209230bSgjelinek 32870209230bSgjelinek if ((p->pr = Pgrab(p->pid, 0, &ret)) != NULL) { 32880209230bSgjelinek 32890209230bSgjelinek if (Psetflags(p->pr, PR_RLC) != 0) { 32900209230bSgjelinek Prelease(p->pr, 0); 32910209230bSgjelinek return (1); 32920209230bSgjelinek } 32930209230bSgjelinek if (Pcreate_agent(p->pr) == 0) { 32940209230bSgjelinek return (0); 32950209230bSgjelinek 32960209230bSgjelinek } else { 32970209230bSgjelinek Prelease(p->pr, 0); 32980209230bSgjelinek return (2); 32990209230bSgjelinek } 33000209230bSgjelinek } else { 33010209230bSgjelinek return (1); 33020209230bSgjelinek } 33030209230bSgjelinek } 33040209230bSgjelinek 33050209230bSgjelinek /* 33060209230bSgjelinek * Release the specified process. This destroys the agent 33070209230bSgjelinek * and releases the process. If the process is NULL, nothing 33080209230bSgjelinek * is done. This function should only be called if grab_process() 33090209230bSgjelinek * has previously been called and returned success. 33100209230bSgjelinek * 33110209230bSgjelinek * This function is Pgrab-safe. 33120209230bSgjelinek */ 33130209230bSgjelinek static void 33140209230bSgjelinek release_process(struct ps_prochandle *Pr) 33150209230bSgjelinek { 33160209230bSgjelinek if (Pr == NULL) 33170209230bSgjelinek return; 33180209230bSgjelinek 33190209230bSgjelinek Pdestroy_agent(Pr); 33200209230bSgjelinek Prelease(Pr, 0); 33210209230bSgjelinek } 33220209230bSgjelinek 33230209230bSgjelinek static boolean_t 33240209230bSgjelinek grab_zone_proc(char *zonename, pr_info_handle_t *p) 33250209230bSgjelinek { 33260209230bSgjelinek DIR *dirp; 33270209230bSgjelinek struct dirent *dentp; 33280209230bSgjelinek zoneid_t zoneid; 33290209230bSgjelinek int pid_self; 33300209230bSgjelinek psinfo_t psinfo; 33310209230bSgjelinek 33320209230bSgjelinek if (zone_get_id(zonename, &zoneid) != 0) 33330209230bSgjelinek return (B_FALSE); 33340209230bSgjelinek 33350209230bSgjelinek pid_self = getpid(); 33360209230bSgjelinek 33370209230bSgjelinek if ((dirp = opendir("/proc")) == NULL) 33380209230bSgjelinek return (B_FALSE); 33390209230bSgjelinek 33400209230bSgjelinek while (dentp = readdir(dirp)) { 33410209230bSgjelinek p->pid = atoi(dentp->d_name); 33420209230bSgjelinek 33430209230bSgjelinek /* Skip self */ 33440209230bSgjelinek if (p->pid == pid_self) 33450209230bSgjelinek continue; 33460209230bSgjelinek 33470209230bSgjelinek if (proc_get_psinfo(p->pid, &psinfo) != 0) 33480209230bSgjelinek continue; 33490209230bSgjelinek 33500209230bSgjelinek if (psinfo.pr_zoneid != zoneid) 33510209230bSgjelinek continue; 33520209230bSgjelinek 33530209230bSgjelinek /* attempt to grab process */ 33540209230bSgjelinek if (grab_process(p) != 0) 33550209230bSgjelinek continue; 33560209230bSgjelinek 33570209230bSgjelinek if (pr_getzoneid(p->pr) != zoneid) { 33580209230bSgjelinek release_process(p->pr); 33590209230bSgjelinek continue; 33600209230bSgjelinek } 33610209230bSgjelinek 33620209230bSgjelinek (void) closedir(dirp); 33630209230bSgjelinek return (B_TRUE); 33640209230bSgjelinek } 33650209230bSgjelinek 33660209230bSgjelinek (void) closedir(dirp); 33670209230bSgjelinek return (B_FALSE); 33680209230bSgjelinek } 33690209230bSgjelinek 33700209230bSgjelinek static boolean_t 33710209230bSgjelinek get_priv_rctl(struct ps_prochandle *pr, char *name, rctlblk_t *rblk) 33720209230bSgjelinek { 33730209230bSgjelinek if (pr_getrctl(pr, name, NULL, rblk, RCTL_FIRST)) 33740209230bSgjelinek return (B_FALSE); 33750209230bSgjelinek 33760209230bSgjelinek if (rctlblk_get_privilege(rblk) == RCPRIV_PRIVILEGED) 33770209230bSgjelinek return (B_TRUE); 33780209230bSgjelinek 33790209230bSgjelinek while (pr_getrctl(pr, name, rblk, rblk, RCTL_NEXT) == 0) { 33800209230bSgjelinek if (rctlblk_get_privilege(rblk) == RCPRIV_PRIVILEGED) 33810209230bSgjelinek return (B_TRUE); 33820209230bSgjelinek } 33830209230bSgjelinek 33840209230bSgjelinek return (B_FALSE); 33850209230bSgjelinek } 33860209230bSgjelinek 33870209230bSgjelinek /* 33880209230bSgjelinek * Apply the current rctl settings to the specified, running zone. 33890209230bSgjelinek */ 33900209230bSgjelinek int 33910209230bSgjelinek zonecfg_apply_rctls(char *zone_name, zone_dochandle_t handle) 33920209230bSgjelinek { 33930209230bSgjelinek int err; 33940209230bSgjelinek int res = Z_OK; 33950209230bSgjelinek rctlblk_t *rblk; 33960209230bSgjelinek pr_info_handle_t p; 33970209230bSgjelinek struct zone_rctltab rctl; 33980209230bSgjelinek 33990209230bSgjelinek if ((err = zonecfg_setrctlent(handle)) != Z_OK) 34000209230bSgjelinek return (err); 34010209230bSgjelinek 34020209230bSgjelinek if ((rblk = (rctlblk_t *)malloc(rctlblk_size())) == NULL) { 34030209230bSgjelinek (void) zonecfg_endrctlent(handle); 34040209230bSgjelinek return (Z_NOMEM); 34050209230bSgjelinek } 34060209230bSgjelinek 34070209230bSgjelinek if (!grab_zone_proc(zone_name, &p)) { 34080209230bSgjelinek (void) zonecfg_endrctlent(handle); 34090209230bSgjelinek free(rblk); 34100209230bSgjelinek return (Z_SYSTEM); 34110209230bSgjelinek } 34120209230bSgjelinek 34130209230bSgjelinek while (zonecfg_getrctlent(handle, &rctl) == Z_OK) { 34140209230bSgjelinek char *rname; 34150209230bSgjelinek struct zone_rctlvaltab *valptr; 34160209230bSgjelinek 34170209230bSgjelinek rname = rctl.zone_rctl_name; 34180209230bSgjelinek 34190209230bSgjelinek /* first delete all current privileged settings for this rctl */ 34200209230bSgjelinek while (get_priv_rctl(p.pr, rname, rblk)) { 34210209230bSgjelinek if (pr_setrctl(p.pr, rname, NULL, rblk, RCTL_DELETE) != 34220209230bSgjelinek 0) { 34230209230bSgjelinek res = Z_SYSTEM; 34240209230bSgjelinek goto done; 34250209230bSgjelinek } 34260209230bSgjelinek } 34270209230bSgjelinek 34280209230bSgjelinek /* now set each new value for the rctl */ 34290209230bSgjelinek for (valptr = rctl.zone_rctl_valptr; valptr != NULL; 34300209230bSgjelinek valptr = valptr->zone_rctlval_next) { 34310209230bSgjelinek if ((err = zonecfg_construct_rctlblk(valptr, rblk)) 34320209230bSgjelinek != Z_OK) { 34330209230bSgjelinek res = errno = err; 34340209230bSgjelinek goto done; 34350209230bSgjelinek } 34360209230bSgjelinek 34370209230bSgjelinek if (pr_setrctl(p.pr, rname, NULL, rblk, RCTL_INSERT)) { 34380209230bSgjelinek res = Z_SYSTEM; 34390209230bSgjelinek goto done; 34400209230bSgjelinek } 34410209230bSgjelinek } 34420209230bSgjelinek } 34430209230bSgjelinek 34440209230bSgjelinek done: 34450209230bSgjelinek release_process(p.pr); 34460209230bSgjelinek free(rblk); 34470209230bSgjelinek (void) zonecfg_endrctlent(handle); 34480209230bSgjelinek 34490209230bSgjelinek return (res); 34500209230bSgjelinek } 34510209230bSgjelinek 34520209230bSgjelinek static const xmlChar * 34530209230bSgjelinek nm_to_dtd(char *nm) 34540209230bSgjelinek { 34550209230bSgjelinek if (strcmp(nm, "device") == 0) 34560209230bSgjelinek return (DTD_ELEM_DEVICE); 34570209230bSgjelinek if (strcmp(nm, "fs") == 0) 34580209230bSgjelinek return (DTD_ELEM_FS); 34590209230bSgjelinek if (strcmp(nm, "inherit-pkg-dir") == 0) 34600209230bSgjelinek return (DTD_ELEM_IPD); 34610209230bSgjelinek if (strcmp(nm, "net") == 0) 34620209230bSgjelinek return (DTD_ELEM_NET); 34630209230bSgjelinek if (strcmp(nm, "attr") == 0) 34640209230bSgjelinek return (DTD_ELEM_ATTR); 34650209230bSgjelinek if (strcmp(nm, "rctl") == 0) 34660209230bSgjelinek return (DTD_ELEM_RCTL); 34670209230bSgjelinek if (strcmp(nm, "dataset") == 0) 34680209230bSgjelinek return (DTD_ELEM_DATASET); 34690209230bSgjelinek 34700209230bSgjelinek return (NULL); 34710209230bSgjelinek } 34720209230bSgjelinek 34730209230bSgjelinek int 34740209230bSgjelinek zonecfg_num_resources(zone_dochandle_t handle, char *rsrc) 34750209230bSgjelinek { 34760209230bSgjelinek int num = 0; 34770209230bSgjelinek const xmlChar *dtd; 34780209230bSgjelinek xmlNodePtr cur; 34790209230bSgjelinek 34800209230bSgjelinek if ((dtd = nm_to_dtd(rsrc)) == NULL) 34810209230bSgjelinek return (num); 34820209230bSgjelinek 34830209230bSgjelinek if (zonecfg_setent(handle) != Z_OK) 34840209230bSgjelinek return (num); 34850209230bSgjelinek 34860209230bSgjelinek for (cur = handle->zone_dh_cur; cur != NULL; cur = cur->next) 34870209230bSgjelinek if (xmlStrcmp(cur->name, dtd) == 0) 34880209230bSgjelinek num++; 34890209230bSgjelinek 34900209230bSgjelinek (void) zonecfg_endent(handle); 34910209230bSgjelinek 34920209230bSgjelinek return (num); 34930209230bSgjelinek } 34940209230bSgjelinek 34950209230bSgjelinek int 34960209230bSgjelinek zonecfg_del_all_resources(zone_dochandle_t handle, char *rsrc) 34970209230bSgjelinek { 34980209230bSgjelinek int err; 34990209230bSgjelinek const xmlChar *dtd; 35000209230bSgjelinek xmlNodePtr cur; 35010209230bSgjelinek 35020209230bSgjelinek if ((dtd = nm_to_dtd(rsrc)) == NULL) 35030209230bSgjelinek return (Z_NO_RESOURCE_TYPE); 35040209230bSgjelinek 35050209230bSgjelinek if ((err = zonecfg_setent(handle)) != Z_OK) 35060209230bSgjelinek return (err); 35070209230bSgjelinek 35080209230bSgjelinek cur = handle->zone_dh_cur; 35090209230bSgjelinek while (cur != NULL) { 35100209230bSgjelinek xmlNodePtr tmp; 35110209230bSgjelinek 35120209230bSgjelinek if (xmlStrcmp(cur->name, dtd)) { 35130209230bSgjelinek cur = cur->next; 35140209230bSgjelinek continue; 35150209230bSgjelinek } 35160209230bSgjelinek 35170209230bSgjelinek tmp = cur->next; 35180209230bSgjelinek xmlUnlinkNode(cur); 35190209230bSgjelinek xmlFreeNode(cur); 35200209230bSgjelinek cur = tmp; 35210209230bSgjelinek } 35220209230bSgjelinek 35230209230bSgjelinek (void) zonecfg_endent(handle); 35240209230bSgjelinek return (Z_OK); 35250209230bSgjelinek } 35260209230bSgjelinek 35270209230bSgjelinek static boolean_t 35280209230bSgjelinek valid_uint(char *s, uint64_t *n) 35290209230bSgjelinek { 35300209230bSgjelinek char *endp; 35310209230bSgjelinek 35320209230bSgjelinek /* strtoull accepts '-'?! so we want to flag that as an error */ 35330209230bSgjelinek if (strchr(s, '-') != NULL) 35340209230bSgjelinek return (B_FALSE); 35350209230bSgjelinek 35360209230bSgjelinek errno = 0; 35370209230bSgjelinek *n = strtoull(s, &endp, 10); 35380209230bSgjelinek 35390209230bSgjelinek if (errno != 0 || *endp != '\0') 35400209230bSgjelinek return (B_FALSE); 35410209230bSgjelinek return (B_TRUE); 35420209230bSgjelinek } 35430209230bSgjelinek 35440209230bSgjelinek /* 35450209230bSgjelinek * Convert a string representing a number (possibly a fraction) into an integer. 35460209230bSgjelinek * The string can have a modifier (K, M, G or T). The modifiers are treated 35470209230bSgjelinek * as powers of two (not 10). 35480209230bSgjelinek */ 35490209230bSgjelinek int 35500209230bSgjelinek zonecfg_str_to_bytes(char *str, uint64_t *bytes) 35510209230bSgjelinek { 35520209230bSgjelinek long double val; 35530209230bSgjelinek char *unitp; 35540209230bSgjelinek uint64_t scale; 35550209230bSgjelinek 35560209230bSgjelinek if ((val = strtold(str, &unitp)) < 0) 35570209230bSgjelinek return (-1); 35580209230bSgjelinek 35590209230bSgjelinek /* remove any leading white space from units string */ 35600209230bSgjelinek while (isspace(*unitp) != 0) 35610209230bSgjelinek ++unitp; 35620209230bSgjelinek 35630209230bSgjelinek /* if no units explicitly set, error */ 35640209230bSgjelinek if (unitp == NULL || *unitp == '\0') { 35650209230bSgjelinek scale = 1; 35660209230bSgjelinek } else { 35670209230bSgjelinek int i; 35680209230bSgjelinek char *units[] = {"K", "M", "G", "T", NULL}; 35690209230bSgjelinek 35700209230bSgjelinek scale = 1024; 35710209230bSgjelinek 35720209230bSgjelinek /* update scale based on units */ 35730209230bSgjelinek for (i = 0; units[i] != NULL; i++) { 35740209230bSgjelinek if (strcasecmp(unitp, units[i]) == 0) 35750209230bSgjelinek break; 35760209230bSgjelinek scale <<= 10; 35770209230bSgjelinek } 35780209230bSgjelinek 35790209230bSgjelinek if (units[i] == NULL) 35800209230bSgjelinek return (-1); 35810209230bSgjelinek } 35820209230bSgjelinek 35830209230bSgjelinek *bytes = (uint64_t)(val * scale); 35840209230bSgjelinek return (0); 35850209230bSgjelinek } 35860209230bSgjelinek 35870209230bSgjelinek boolean_t 35880209230bSgjelinek zonecfg_valid_ncpus(char *lowstr, char *highstr) 35890209230bSgjelinek { 35900209230bSgjelinek uint64_t low, high; 35910209230bSgjelinek 35920209230bSgjelinek if (!valid_uint(lowstr, &low) || !valid_uint(highstr, &high) || 35930209230bSgjelinek low < 1 || low > high) 35940209230bSgjelinek return (B_FALSE); 35950209230bSgjelinek 35960209230bSgjelinek return (B_TRUE); 35970209230bSgjelinek } 35980209230bSgjelinek 35990209230bSgjelinek boolean_t 36000209230bSgjelinek zonecfg_valid_importance(char *impstr) 36010209230bSgjelinek { 36020209230bSgjelinek uint64_t num; 36030209230bSgjelinek 36040209230bSgjelinek if (!valid_uint(impstr, &num)) 36050209230bSgjelinek return (B_FALSE); 36060209230bSgjelinek 36070209230bSgjelinek return (B_TRUE); 36080209230bSgjelinek } 36090209230bSgjelinek 36100209230bSgjelinek boolean_t 36110209230bSgjelinek zonecfg_valid_alias_limit(char *name, char *limitstr, uint64_t *limit) 36120209230bSgjelinek { 36130209230bSgjelinek int i; 36140209230bSgjelinek 36150209230bSgjelinek for (i = 0; aliases[i].shortname != NULL; i++) 36160209230bSgjelinek if (strcmp(name, aliases[i].shortname) == 0) 36170209230bSgjelinek break; 36180209230bSgjelinek 36190209230bSgjelinek if (aliases[i].shortname == NULL) 36200209230bSgjelinek return (B_FALSE); 36210209230bSgjelinek 36220209230bSgjelinek if (!valid_uint(limitstr, limit) || *limit < aliases[i].low_limit) 36230209230bSgjelinek return (B_FALSE); 36240209230bSgjelinek 36250209230bSgjelinek return (B_TRUE); 36260209230bSgjelinek } 36270209230bSgjelinek 36280209230bSgjelinek boolean_t 36290209230bSgjelinek zonecfg_valid_memlimit(char *memstr, uint64_t *mem_val) 36300209230bSgjelinek { 36310209230bSgjelinek if (zonecfg_str_to_bytes(memstr, mem_val) != 0) 36320209230bSgjelinek return (B_FALSE); 36330209230bSgjelinek 36340209230bSgjelinek return (B_TRUE); 36350209230bSgjelinek } 36360209230bSgjelinek 36370209230bSgjelinek static int 36380209230bSgjelinek zerr_pool(char *pool_err, int err_size, int res) 36390209230bSgjelinek { 36400209230bSgjelinek (void) strlcpy(pool_err, pool_strerror(pool_error()), err_size); 36410209230bSgjelinek return (res); 36420209230bSgjelinek } 36430209230bSgjelinek 36440209230bSgjelinek static int 36450209230bSgjelinek create_tmp_pset(char *pool_err, int err_size, pool_conf_t *pconf, pool_t *pool, 36460209230bSgjelinek char *name, int min, int max) 36470209230bSgjelinek { 36480209230bSgjelinek pool_resource_t *res; 36490209230bSgjelinek pool_elem_t *elem; 36500209230bSgjelinek pool_value_t *val; 36510209230bSgjelinek 36520209230bSgjelinek if ((res = pool_resource_create(pconf, "pset", name)) == NULL) 36530209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 36540209230bSgjelinek 36550209230bSgjelinek if (pool_associate(pconf, pool, res) != PO_SUCCESS) 36560209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 36570209230bSgjelinek 36580209230bSgjelinek if ((elem = pool_resource_to_elem(pconf, res)) == NULL) 36590209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 36600209230bSgjelinek 36610209230bSgjelinek if ((val = pool_value_alloc()) == NULL) 36620209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 36630209230bSgjelinek 36640209230bSgjelinek /* set the maximum number of cpus for the pset */ 36650209230bSgjelinek pool_value_set_uint64(val, (uint64_t)max); 36660209230bSgjelinek 36670209230bSgjelinek if (pool_put_property(pconf, elem, "pset.max", val) != PO_SUCCESS) { 36680209230bSgjelinek pool_value_free(val); 36690209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 36700209230bSgjelinek } 36710209230bSgjelinek 36720209230bSgjelinek /* set the minimum number of cpus for the pset */ 36730209230bSgjelinek pool_value_set_uint64(val, (uint64_t)min); 36740209230bSgjelinek 36750209230bSgjelinek if (pool_put_property(pconf, elem, "pset.min", val) != PO_SUCCESS) { 36760209230bSgjelinek pool_value_free(val); 36770209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 36780209230bSgjelinek } 36790209230bSgjelinek 36800209230bSgjelinek pool_value_free(val); 36810209230bSgjelinek 36820209230bSgjelinek return (Z_OK); 36830209230bSgjelinek } 36840209230bSgjelinek 36850209230bSgjelinek static int 36860209230bSgjelinek create_tmp_pool(char *pool_err, int err_size, pool_conf_t *pconf, char *name, 36870209230bSgjelinek struct zone_psettab *pset_tab) 36880209230bSgjelinek { 36890209230bSgjelinek pool_t *pool; 36900209230bSgjelinek int res = Z_OK; 36910209230bSgjelinek 36920209230bSgjelinek /* create a temporary pool configuration */ 36930209230bSgjelinek if (pool_conf_open(pconf, NULL, PO_TEMP) != PO_SUCCESS) { 36940209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 36950209230bSgjelinek return (res); 36960209230bSgjelinek } 36970209230bSgjelinek 36980209230bSgjelinek if ((pool = pool_create(pconf, name)) == NULL) { 36990209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL_CREATE); 37000209230bSgjelinek goto done; 37010209230bSgjelinek } 37020209230bSgjelinek 37030209230bSgjelinek /* set pool importance */ 37040209230bSgjelinek if (pset_tab->zone_importance[0] != '\0') { 37050209230bSgjelinek pool_elem_t *elem; 37060209230bSgjelinek pool_value_t *val; 37070209230bSgjelinek 37080209230bSgjelinek if ((elem = pool_to_elem(pconf, pool)) == NULL) { 37090209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 37100209230bSgjelinek goto done; 37110209230bSgjelinek } 37120209230bSgjelinek 37130209230bSgjelinek if ((val = pool_value_alloc()) == NULL) { 37140209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 37150209230bSgjelinek goto done; 37160209230bSgjelinek } 37170209230bSgjelinek 37180209230bSgjelinek pool_value_set_int64(val, 37190209230bSgjelinek (int64_t)atoi(pset_tab->zone_importance)); 37200209230bSgjelinek 37210209230bSgjelinek if (pool_put_property(pconf, elem, "pool.importance", val) 37220209230bSgjelinek != PO_SUCCESS) { 37230209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 37240209230bSgjelinek pool_value_free(val); 37250209230bSgjelinek goto done; 37260209230bSgjelinek } 37270209230bSgjelinek 37280209230bSgjelinek pool_value_free(val); 37290209230bSgjelinek } 37300209230bSgjelinek 37310209230bSgjelinek if ((res = create_tmp_pset(pool_err, err_size, pconf, pool, name, 37320209230bSgjelinek atoi(pset_tab->zone_ncpu_min), 37330209230bSgjelinek atoi(pset_tab->zone_ncpu_max))) != Z_OK) 37340209230bSgjelinek goto done; 37350209230bSgjelinek 37360209230bSgjelinek /* validation */ 37370209230bSgjelinek if (pool_conf_status(pconf) == POF_INVALID) { 37380209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 37390209230bSgjelinek goto done; 37400209230bSgjelinek } 37410209230bSgjelinek 37420209230bSgjelinek /* 37430209230bSgjelinek * This validation is the one we expect to fail if the user specified 37440209230bSgjelinek * an invalid configuration (too many cpus) for this system. 37450209230bSgjelinek */ 37460209230bSgjelinek if (pool_conf_validate(pconf, POV_RUNTIME) != PO_SUCCESS) { 37470209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL_CREATE); 37480209230bSgjelinek goto done; 37490209230bSgjelinek } 37500209230bSgjelinek 37510209230bSgjelinek /* 37520209230bSgjelinek * Commit the dynamic configuration but not the pool configuration 37530209230bSgjelinek * file. 37540209230bSgjelinek */ 37550209230bSgjelinek if (pool_conf_commit(pconf, 1) != PO_SUCCESS) 37560209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 37570209230bSgjelinek 37580209230bSgjelinek done: 37590209230bSgjelinek (void) pool_conf_close(pconf); 37600209230bSgjelinek return (res); 37610209230bSgjelinek } 37620209230bSgjelinek 37630209230bSgjelinek static int 37640209230bSgjelinek get_running_tmp_pset(pool_conf_t *pconf, pool_t *pool, pool_resource_t *pset, 37650209230bSgjelinek struct zone_psettab *pset_tab) 37660209230bSgjelinek { 37670209230bSgjelinek int nfound = 0; 37680209230bSgjelinek pool_elem_t *pe; 37690209230bSgjelinek pool_value_t *pv = pool_value_alloc(); 37700209230bSgjelinek uint64_t val_uint; 37710209230bSgjelinek 37720209230bSgjelinek if (pool != NULL) { 37730209230bSgjelinek pe = pool_to_elem(pconf, pool); 37740209230bSgjelinek if (pool_get_property(pconf, pe, "pool.importance", pv) 37750209230bSgjelinek != POC_INVAL) { 37760209230bSgjelinek int64_t val_int; 37770209230bSgjelinek 37780209230bSgjelinek (void) pool_value_get_int64(pv, &val_int); 37790209230bSgjelinek (void) snprintf(pset_tab->zone_importance, 37800209230bSgjelinek sizeof (pset_tab->zone_importance), "%d", val_int); 37810209230bSgjelinek nfound++; 37820209230bSgjelinek } 37830209230bSgjelinek } 37840209230bSgjelinek 37850209230bSgjelinek if (pset != NULL) { 37860209230bSgjelinek pe = pool_resource_to_elem(pconf, pset); 37870209230bSgjelinek if (pool_get_property(pconf, pe, "pset.min", pv) != POC_INVAL) { 37880209230bSgjelinek (void) pool_value_get_uint64(pv, &val_uint); 37890209230bSgjelinek (void) snprintf(pset_tab->zone_ncpu_min, 37900209230bSgjelinek sizeof (pset_tab->zone_ncpu_min), "%u", val_uint); 37910209230bSgjelinek nfound++; 37920209230bSgjelinek } 37930209230bSgjelinek 37940209230bSgjelinek if (pool_get_property(pconf, pe, "pset.max", pv) != POC_INVAL) { 37950209230bSgjelinek (void) pool_value_get_uint64(pv, &val_uint); 37960209230bSgjelinek (void) snprintf(pset_tab->zone_ncpu_max, 37970209230bSgjelinek sizeof (pset_tab->zone_ncpu_max), "%u", val_uint); 37980209230bSgjelinek nfound++; 37990209230bSgjelinek } 38000209230bSgjelinek } 38010209230bSgjelinek 38020209230bSgjelinek pool_value_free(pv); 38030209230bSgjelinek 38040209230bSgjelinek if (nfound == 3) 38050209230bSgjelinek return (PO_SUCCESS); 38060209230bSgjelinek 38070209230bSgjelinek return (PO_FAIL); 38080209230bSgjelinek } 38090209230bSgjelinek 38100209230bSgjelinek /* 38110209230bSgjelinek * Determine if a tmp pool is configured and if so, if the configuration is 38120209230bSgjelinek * still valid or if it has been changed since the tmp pool was created. 38130209230bSgjelinek * If the tmp pool configuration is no longer valid, delete the tmp pool. 38140209230bSgjelinek * 38150209230bSgjelinek * Set *valid=B_TRUE if there is an existing, valid tmp pool configuration. 38160209230bSgjelinek */ 38170209230bSgjelinek static int 38180209230bSgjelinek verify_del_tmp_pool(pool_conf_t *pconf, char *tmp_name, char *pool_err, 38190209230bSgjelinek int err_size, struct zone_psettab *pset_tab, boolean_t *exists) 38200209230bSgjelinek { 38210209230bSgjelinek int res = Z_OK; 38220209230bSgjelinek pool_t *pool; 38230209230bSgjelinek pool_resource_t *pset; 38240209230bSgjelinek struct zone_psettab pset_current; 38250209230bSgjelinek 38260209230bSgjelinek *exists = B_FALSE; 38270209230bSgjelinek 38280209230bSgjelinek if (pool_conf_open(pconf, pool_dynamic_location(), PO_RDWR) 38290209230bSgjelinek != PO_SUCCESS) { 38300209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 38310209230bSgjelinek return (res); 38320209230bSgjelinek } 38330209230bSgjelinek 38340209230bSgjelinek pool = pool_get_pool(pconf, tmp_name); 38350209230bSgjelinek pset = pool_get_resource(pconf, "pset", tmp_name); 38360209230bSgjelinek 38370209230bSgjelinek if (pool == NULL && pset == NULL) { 38380209230bSgjelinek /* no tmp pool configured */ 38390209230bSgjelinek goto done; 38400209230bSgjelinek } 38410209230bSgjelinek 38420209230bSgjelinek /* 38430209230bSgjelinek * If an existing tmp pool for this zone is configured with the proper 38440209230bSgjelinek * settings, then the tmp pool is valid. 38450209230bSgjelinek */ 38460209230bSgjelinek if (get_running_tmp_pset(pconf, pool, pset, &pset_current) 38470209230bSgjelinek == PO_SUCCESS && 38480209230bSgjelinek strcmp(pset_tab->zone_ncpu_min, 38490209230bSgjelinek pset_current.zone_ncpu_min) == 0 && 38500209230bSgjelinek strcmp(pset_tab->zone_ncpu_max, 38510209230bSgjelinek pset_current.zone_ncpu_max) == 0 && 38520209230bSgjelinek strcmp(pset_tab->zone_importance, 38530209230bSgjelinek pset_current.zone_importance) == 0) { 38540209230bSgjelinek *exists = B_TRUE; 38550209230bSgjelinek 38560209230bSgjelinek } else { 38570209230bSgjelinek /* 38580209230bSgjelinek * An out-of-date tmp pool configuration exists. Delete it 38590209230bSgjelinek * so that we can create the correct tmp pool config. 38600209230bSgjelinek */ 38610209230bSgjelinek if (pset != NULL && 38620209230bSgjelinek pool_resource_destroy(pconf, pset) != PO_SUCCESS) { 38630209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 38640209230bSgjelinek goto done; 38650209230bSgjelinek } 38660209230bSgjelinek 38670209230bSgjelinek if (pool != NULL && 38680209230bSgjelinek pool_destroy(pconf, pool) != PO_SUCCESS) { 38690209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 38700209230bSgjelinek goto done; 38710209230bSgjelinek } 38720209230bSgjelinek 38730209230bSgjelinek /* commit dynamic config */ 38740209230bSgjelinek if (pool_conf_commit(pconf, 0) != PO_SUCCESS) 38750209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 38760209230bSgjelinek } 38770209230bSgjelinek 38780209230bSgjelinek done: 38790209230bSgjelinek (void) pool_conf_close(pconf); 38800209230bSgjelinek 38810209230bSgjelinek return (res); 38820209230bSgjelinek } 38830209230bSgjelinek 38840209230bSgjelinek /* 38850209230bSgjelinek * Destroy any existing tmp pool. 38860209230bSgjelinek */ 38870209230bSgjelinek int 38880209230bSgjelinek zonecfg_destroy_tmp_pool(char *zone_name, char *pool_err, int err_size) 38890209230bSgjelinek { 38900209230bSgjelinek int status; 38910209230bSgjelinek int res = Z_OK; 38920209230bSgjelinek pool_conf_t *pconf; 38930209230bSgjelinek pool_t *pool; 38940209230bSgjelinek pool_resource_t *pset; 38950209230bSgjelinek char tmp_name[MAX_TMP_POOL_NAME]; 38960209230bSgjelinek 38970209230bSgjelinek /* if pools not enabled then nothing to do */ 38980209230bSgjelinek if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 38990209230bSgjelinek return (Z_OK); 39000209230bSgjelinek 39010209230bSgjelinek if ((pconf = pool_conf_alloc()) == NULL) 39020209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 39030209230bSgjelinek 39040209230bSgjelinek (void) snprintf(tmp_name, sizeof (tmp_name), TMP_POOL_NAME, zone_name); 39050209230bSgjelinek 39060209230bSgjelinek if (pool_conf_open(pconf, pool_dynamic_location(), PO_RDWR) 39070209230bSgjelinek != PO_SUCCESS) { 39080209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 39090209230bSgjelinek pool_conf_free(pconf); 39100209230bSgjelinek return (res); 39110209230bSgjelinek } 39120209230bSgjelinek 39130209230bSgjelinek pool = pool_get_pool(pconf, tmp_name); 39140209230bSgjelinek pset = pool_get_resource(pconf, "pset", tmp_name); 39150209230bSgjelinek 39160209230bSgjelinek if (pool == NULL && pset == NULL) { 39170209230bSgjelinek /* nothing to destroy, we're done */ 39180209230bSgjelinek goto done; 39190209230bSgjelinek } 39200209230bSgjelinek 39210209230bSgjelinek if (pset != NULL && pool_resource_destroy(pconf, pset) != PO_SUCCESS) { 39220209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 39230209230bSgjelinek goto done; 39240209230bSgjelinek } 39250209230bSgjelinek 39260209230bSgjelinek if (pool != NULL && pool_destroy(pconf, pool) != PO_SUCCESS) { 39270209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 39280209230bSgjelinek goto done; 39290209230bSgjelinek } 39300209230bSgjelinek 39310209230bSgjelinek /* commit dynamic config */ 39320209230bSgjelinek if (pool_conf_commit(pconf, 0) != PO_SUCCESS) 39330209230bSgjelinek res = zerr_pool(pool_err, err_size, Z_POOL); 39340209230bSgjelinek 39350209230bSgjelinek done: 39360209230bSgjelinek (void) pool_conf_close(pconf); 39370209230bSgjelinek pool_conf_free(pconf); 39380209230bSgjelinek 39390209230bSgjelinek return (res); 39400209230bSgjelinek } 39410209230bSgjelinek 39420209230bSgjelinek /* 39430209230bSgjelinek * Attempt to bind to a tmp pool for this zone. If there is no tmp pool 39440209230bSgjelinek * configured, we just return Z_OK. 39450209230bSgjelinek * 39460209230bSgjelinek * We either attempt to create the tmp pool for this zone or rebind to an 39470209230bSgjelinek * existing tmp pool for this zone. 39480209230bSgjelinek * 39490209230bSgjelinek * Rebinding is used when a zone with a tmp pool reboots so that we don't have 39500209230bSgjelinek * to recreate the tmp pool. To do this we need to be sure we work correctly 39510209230bSgjelinek * for the following cases: 39520209230bSgjelinek * 39530209230bSgjelinek * - there is an existing, properly configured tmp pool. 39540209230bSgjelinek * - zonecfg added tmp pool after zone was booted, must now create. 39550209230bSgjelinek * - zonecfg updated tmp pool config after zone was booted, in this case 39560209230bSgjelinek * we destroy the old tmp pool and create a new one. 39570209230bSgjelinek */ 39580209230bSgjelinek int 39590209230bSgjelinek zonecfg_bind_tmp_pool(zone_dochandle_t handle, zoneid_t zoneid, char *pool_err, 39600209230bSgjelinek int err_size) 39610209230bSgjelinek { 39620209230bSgjelinek struct zone_psettab pset_tab; 39630209230bSgjelinek int err; 39640209230bSgjelinek int status; 39650209230bSgjelinek pool_conf_t *pconf; 39660209230bSgjelinek boolean_t exists; 39670209230bSgjelinek char zone_name[ZONENAME_MAX]; 39680209230bSgjelinek char tmp_name[MAX_TMP_POOL_NAME]; 39690209230bSgjelinek 39700209230bSgjelinek (void) getzonenamebyid(zoneid, zone_name, sizeof (zone_name)); 39710209230bSgjelinek 39720209230bSgjelinek err = zonecfg_lookup_pset(handle, &pset_tab); 39730209230bSgjelinek 39740209230bSgjelinek /* if no temporary pool configured, we're done */ 39750209230bSgjelinek if (err == Z_NO_ENTRY) 39760209230bSgjelinek return (Z_OK); 39770209230bSgjelinek 39780209230bSgjelinek /* 39790209230bSgjelinek * importance might not have a value but we need to validate it here, 39800209230bSgjelinek * so set the default. 39810209230bSgjelinek */ 39820209230bSgjelinek if (pset_tab.zone_importance[0] == '\0') 39830209230bSgjelinek (void) strlcpy(pset_tab.zone_importance, "1", 39840209230bSgjelinek sizeof (pset_tab.zone_importance)); 39850209230bSgjelinek 39860209230bSgjelinek /* if pools not enabled, enable them now */ 39870209230bSgjelinek if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) { 39880209230bSgjelinek if (pool_set_status(POOL_ENABLED) != PO_SUCCESS) 39890209230bSgjelinek return (Z_POOL_ENABLE); 39900209230bSgjelinek } 39910209230bSgjelinek 39920209230bSgjelinek if ((pconf = pool_conf_alloc()) == NULL) 39930209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 39940209230bSgjelinek 39950209230bSgjelinek (void) snprintf(tmp_name, sizeof (tmp_name), TMP_POOL_NAME, zone_name); 39960209230bSgjelinek 39970209230bSgjelinek /* 39980209230bSgjelinek * Check if a valid tmp pool/pset already exists. If so, we just 39990209230bSgjelinek * reuse it. 40000209230bSgjelinek */ 40010209230bSgjelinek if ((err = verify_del_tmp_pool(pconf, tmp_name, pool_err, err_size, 40020209230bSgjelinek &pset_tab, &exists)) != Z_OK) { 40030209230bSgjelinek pool_conf_free(pconf); 40040209230bSgjelinek return (err); 40050209230bSgjelinek } 40060209230bSgjelinek 40070209230bSgjelinek if (!exists) 40080209230bSgjelinek err = create_tmp_pool(pool_err, err_size, pconf, tmp_name, 40090209230bSgjelinek &pset_tab); 40100209230bSgjelinek 40110209230bSgjelinek pool_conf_free(pconf); 40120209230bSgjelinek 40130209230bSgjelinek if (err != Z_OK) 40140209230bSgjelinek return (err); 40150209230bSgjelinek 40160209230bSgjelinek /* Bind the zone to the pool. */ 40170209230bSgjelinek if (pool_set_binding(tmp_name, P_ZONEID, zoneid) != PO_SUCCESS) 40180209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL_BIND)); 40190209230bSgjelinek 40200209230bSgjelinek return (Z_OK); 40210209230bSgjelinek } 40220209230bSgjelinek 40230209230bSgjelinek /* 40240209230bSgjelinek * Attempt to bind to a permanent pool for this zone. If there is no 40250209230bSgjelinek * permanent pool configured, we just return Z_OK. 40260209230bSgjelinek */ 40270209230bSgjelinek int 40280209230bSgjelinek zonecfg_bind_pool(zone_dochandle_t handle, zoneid_t zoneid, char *pool_err, 40290209230bSgjelinek int err_size) 40300209230bSgjelinek { 40310209230bSgjelinek pool_conf_t *poolconf; 40320209230bSgjelinek pool_t *pool; 40330209230bSgjelinek char poolname[MAXPATHLEN]; 40340209230bSgjelinek int status; 40350209230bSgjelinek int error; 40360209230bSgjelinek 40370209230bSgjelinek /* 40380209230bSgjelinek * Find the pool mentioned in the zone configuration, and bind to it. 40390209230bSgjelinek */ 40400209230bSgjelinek error = zonecfg_get_pool(handle, poolname, sizeof (poolname)); 40410209230bSgjelinek if (error == Z_NO_ENTRY || (error == Z_OK && strlen(poolname) == 0)) { 40420209230bSgjelinek /* 40430209230bSgjelinek * The property is not set on the zone, so the pool 40440209230bSgjelinek * should be bound to the default pool. But that's 40450209230bSgjelinek * already done by the kernel, so we can just return. 40460209230bSgjelinek */ 40470209230bSgjelinek return (Z_OK); 40480209230bSgjelinek } 40490209230bSgjelinek if (error != Z_OK) { 40500209230bSgjelinek /* 40510209230bSgjelinek * Not an error, even though it shouldn't be happening. 40520209230bSgjelinek */ 40530209230bSgjelinek return (Z_OK); 40540209230bSgjelinek } 40550209230bSgjelinek /* 40560209230bSgjelinek * Don't do anything if pools aren't enabled. 40570209230bSgjelinek */ 40580209230bSgjelinek if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 40590209230bSgjelinek return (Z_POOLS_NOT_ACTIVE); 40600209230bSgjelinek 40610209230bSgjelinek /* 40620209230bSgjelinek * Try to provide a sane error message if the requested pool doesn't 40630209230bSgjelinek * exist. 40640209230bSgjelinek */ 40650209230bSgjelinek if ((poolconf = pool_conf_alloc()) == NULL) 40660209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 40670209230bSgjelinek 40680209230bSgjelinek if (pool_conf_open(poolconf, pool_dynamic_location(), PO_RDONLY) != 40690209230bSgjelinek PO_SUCCESS) { 40700209230bSgjelinek pool_conf_free(poolconf); 40710209230bSgjelinek return (zerr_pool(pool_err, err_size, Z_POOL)); 40720209230bSgjelinek } 40730209230bSgjelinek pool = pool_get_pool(poolconf, poolname); 40740209230bSgjelinek (void) pool_conf_close(poolconf); 40750209230bSgjelinek pool_conf_free(poolconf); 40760209230bSgjelinek if (pool == NULL) 40770209230bSgjelinek return (Z_NO_POOL); 40780209230bSgjelinek 40790209230bSgjelinek /* 40800209230bSgjelinek * Bind the zone to the pool. 40810209230bSgjelinek */ 40820209230bSgjelinek if (pool_set_binding(poolname, P_ZONEID, zoneid) != PO_SUCCESS) { 40830209230bSgjelinek /* if bind fails, return poolname for the error msg */ 40840209230bSgjelinek (void) strlcpy(pool_err, poolname, err_size); 40850209230bSgjelinek return (Z_POOL_BIND); 40860209230bSgjelinek } 40870209230bSgjelinek 40880209230bSgjelinek return (Z_OK); 40890209230bSgjelinek } 40900209230bSgjelinek 40910209230bSgjelinek 40920209230bSgjelinek static boolean_t 40930209230bSgjelinek svc_enabled(char *svc_name) 40940209230bSgjelinek { 40950209230bSgjelinek scf_simple_prop_t *prop; 40960209230bSgjelinek boolean_t found = B_FALSE; 40970209230bSgjelinek 40980209230bSgjelinek prop = scf_simple_prop_get(NULL, svc_name, SCF_PG_GENERAL, 40990209230bSgjelinek SCF_PROPERTY_ENABLED); 41000209230bSgjelinek 41010209230bSgjelinek if (scf_simple_prop_numvalues(prop) == 1 && 41020209230bSgjelinek *scf_simple_prop_next_boolean(prop) != 0) 41030209230bSgjelinek found = B_TRUE; 41040209230bSgjelinek 41050209230bSgjelinek scf_simple_prop_free(prop); 41060209230bSgjelinek 41070209230bSgjelinek return (found); 41080209230bSgjelinek } 41090209230bSgjelinek 41100209230bSgjelinek /* 41110209230bSgjelinek * If the zone has capped-memory, make sure the rcap service is enabled. 41120209230bSgjelinek */ 41130209230bSgjelinek int 41140209230bSgjelinek zonecfg_enable_rcapd(char *err, int size) 41150209230bSgjelinek { 41160209230bSgjelinek if (!svc_enabled(RCAP_SERVICE) && 41170209230bSgjelinek smf_enable_instance(RCAP_SERVICE, 0) == -1) { 41180209230bSgjelinek (void) strlcpy(err, scf_strerror(scf_error()), size); 41190209230bSgjelinek return (Z_SYSTEM); 41200209230bSgjelinek } 41210209230bSgjelinek 41220209230bSgjelinek return (Z_OK); 41230209230bSgjelinek } 41240209230bSgjelinek 41250209230bSgjelinek /* 41260209230bSgjelinek * Return true if pset has cpu range specified and poold is not enabled. 41270209230bSgjelinek */ 41280209230bSgjelinek boolean_t 41290209230bSgjelinek zonecfg_warn_poold(zone_dochandle_t handle) 41300209230bSgjelinek { 41310209230bSgjelinek struct zone_psettab pset_tab; 41320209230bSgjelinek int min, max; 41330209230bSgjelinek int err; 41340209230bSgjelinek 41350209230bSgjelinek err = zonecfg_lookup_pset(handle, &pset_tab); 41360209230bSgjelinek 41370209230bSgjelinek /* if no temporary pool configured, we're done */ 41380209230bSgjelinek if (err == Z_NO_ENTRY) 41390209230bSgjelinek return (B_FALSE); 41400209230bSgjelinek 41410209230bSgjelinek min = atoi(pset_tab.zone_ncpu_min); 41420209230bSgjelinek max = atoi(pset_tab.zone_ncpu_max); 41430209230bSgjelinek 41440209230bSgjelinek /* range not specified, no need for poold */ 41450209230bSgjelinek if (min == max) 41460209230bSgjelinek return (B_FALSE); 41470209230bSgjelinek 41480209230bSgjelinek /* we have a range, check if poold service is enabled */ 41490209230bSgjelinek if (svc_enabled(POOLD_SERVICE)) 41500209230bSgjelinek return (B_FALSE); 41510209230bSgjelinek 41520209230bSgjelinek return (B_TRUE); 41530209230bSgjelinek } 41540209230bSgjelinek 41550209230bSgjelinek static int 41560209230bSgjelinek get_pool_sched_class(char *poolname, char *class, int clsize) 41570209230bSgjelinek { 41580209230bSgjelinek int status; 41590209230bSgjelinek pool_conf_t *poolconf; 41600209230bSgjelinek pool_t *pool; 41610209230bSgjelinek pool_elem_t *pe; 41620209230bSgjelinek pool_value_t *pv = pool_value_alloc(); 41630209230bSgjelinek const char *sched_str; 41640209230bSgjelinek 41650209230bSgjelinek if (pool_get_status(&status) != PO_SUCCESS || status != POOL_ENABLED) 41660209230bSgjelinek return (Z_NO_POOL); 41670209230bSgjelinek 41680209230bSgjelinek if ((poolconf = pool_conf_alloc()) == NULL) 41690209230bSgjelinek return (Z_NO_POOL); 41700209230bSgjelinek 41710209230bSgjelinek if (pool_conf_open(poolconf, pool_dynamic_location(), PO_RDONLY) != 41720209230bSgjelinek PO_SUCCESS) { 41730209230bSgjelinek pool_conf_free(poolconf); 41740209230bSgjelinek return (Z_NO_POOL); 41750209230bSgjelinek } 41760209230bSgjelinek 41770209230bSgjelinek if ((pool = pool_get_pool(poolconf, poolname)) == NULL) { 41780209230bSgjelinek (void) pool_conf_close(poolconf); 41790209230bSgjelinek pool_conf_free(poolconf); 41800209230bSgjelinek return (Z_NO_POOL); 41810209230bSgjelinek } 41820209230bSgjelinek 41830209230bSgjelinek pe = pool_to_elem(poolconf, pool); 41840209230bSgjelinek if (pool_get_property(poolconf, pe, "pool.scheduler", pv) 41850209230bSgjelinek != POC_INVAL) { 41860209230bSgjelinek (void) pool_value_get_string(pv, &sched_str); 41870209230bSgjelinek if (strlcpy(class, sched_str, clsize) >= clsize) 41880209230bSgjelinek return (Z_TOO_BIG); 41890209230bSgjelinek } 41900209230bSgjelinek 41910209230bSgjelinek (void) pool_conf_close(poolconf); 41920209230bSgjelinek pool_conf_free(poolconf); 41930209230bSgjelinek return (Z_OK); 41940209230bSgjelinek } 41950209230bSgjelinek 41960209230bSgjelinek /* 41970209230bSgjelinek * Get the default scheduling class for the zone. This will either be the 41980209230bSgjelinek * class set on the zone's pool or the system default scheduling class. 41990209230bSgjelinek */ 42000209230bSgjelinek int 42010209230bSgjelinek zonecfg_get_dflt_sched_class(zone_dochandle_t handle, char *class, int clsize) 42020209230bSgjelinek { 42030209230bSgjelinek char poolname[MAXPATHLEN]; 42040209230bSgjelinek 42050209230bSgjelinek if (zonecfg_get_pool(handle, poolname, sizeof (poolname)) == Z_OK) { 42060209230bSgjelinek /* check if the zone's pool specified a sched class */ 42070209230bSgjelinek if (get_pool_sched_class(poolname, class, clsize) == Z_OK) 42080209230bSgjelinek return (Z_OK); 42090209230bSgjelinek } 42100209230bSgjelinek 42110209230bSgjelinek if (priocntl(0, 0, PC_GETDFLCL, class, (uint64_t)clsize) == -1) 42120209230bSgjelinek return (Z_TOO_BIG); 42130209230bSgjelinek 42140209230bSgjelinek return (Z_OK); 42150209230bSgjelinek } 42160209230bSgjelinek 42177c478bd9Sstevel@tonic-gate int 42187c478bd9Sstevel@tonic-gate zonecfg_setfsent(zone_dochandle_t handle) 42197c478bd9Sstevel@tonic-gate { 42207c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 42217c478bd9Sstevel@tonic-gate } 42227c478bd9Sstevel@tonic-gate 42237c478bd9Sstevel@tonic-gate int 42247c478bd9Sstevel@tonic-gate zonecfg_getfsent(zone_dochandle_t handle, struct zone_fstab *tabptr) 42257c478bd9Sstevel@tonic-gate { 42267c478bd9Sstevel@tonic-gate xmlNodePtr cur, options; 42277c478bd9Sstevel@tonic-gate char options_str[MAX_MNTOPT_STR]; 42287c478bd9Sstevel@tonic-gate int err; 42297c478bd9Sstevel@tonic-gate 42307c478bd9Sstevel@tonic-gate if (handle == NULL) 42317c478bd9Sstevel@tonic-gate return (Z_INVAL); 42327c478bd9Sstevel@tonic-gate 42337c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 42347c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 42357c478bd9Sstevel@tonic-gate 42367c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 42377c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_FS)) 42387c478bd9Sstevel@tonic-gate break; 42397c478bd9Sstevel@tonic-gate if (cur == NULL) { 42407c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 42417c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 42427c478bd9Sstevel@tonic-gate } 42437c478bd9Sstevel@tonic-gate 42447c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_SPECIAL, tabptr->zone_fs_special, 42457c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_special))) != Z_OK) { 42467c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 42477c478bd9Sstevel@tonic-gate return (err); 42487c478bd9Sstevel@tonic-gate } 42497c478bd9Sstevel@tonic-gate 42507c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_RAW, tabptr->zone_fs_raw, 42517c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_raw))) != Z_OK) { 42527c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 42537c478bd9Sstevel@tonic-gate return (err); 42547c478bd9Sstevel@tonic-gate } 42557c478bd9Sstevel@tonic-gate 42567c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 42577c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_dir))) != Z_OK) { 42587c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 42597c478bd9Sstevel@tonic-gate return (err); 42607c478bd9Sstevel@tonic-gate } 42617c478bd9Sstevel@tonic-gate 42627c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_fs_type, 42637c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_type))) != Z_OK) { 42647c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 42657c478bd9Sstevel@tonic-gate return (err); 42667c478bd9Sstevel@tonic-gate } 42677c478bd9Sstevel@tonic-gate 42687c478bd9Sstevel@tonic-gate /* OK for options to be NULL */ 42697c478bd9Sstevel@tonic-gate tabptr->zone_fs_options = NULL; 42707c478bd9Sstevel@tonic-gate for (options = cur->xmlChildrenNode; options != NULL; 42717c478bd9Sstevel@tonic-gate options = options->next) { 42727c478bd9Sstevel@tonic-gate if (fetchprop(options, DTD_ATTR_NAME, options_str, 42737c478bd9Sstevel@tonic-gate sizeof (options_str)) != Z_OK) 42747c478bd9Sstevel@tonic-gate break; 42757c478bd9Sstevel@tonic-gate if (zonecfg_add_fs_option(tabptr, options_str) != Z_OK) 42767c478bd9Sstevel@tonic-gate break; 42777c478bd9Sstevel@tonic-gate } 42787c478bd9Sstevel@tonic-gate 42797c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 42807c478bd9Sstevel@tonic-gate return (Z_OK); 42817c478bd9Sstevel@tonic-gate } 42827c478bd9Sstevel@tonic-gate 42837c478bd9Sstevel@tonic-gate int 42847c478bd9Sstevel@tonic-gate zonecfg_endfsent(zone_dochandle_t handle) 42857c478bd9Sstevel@tonic-gate { 42867c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 42877c478bd9Sstevel@tonic-gate } 42887c478bd9Sstevel@tonic-gate 42897c478bd9Sstevel@tonic-gate int 42907c478bd9Sstevel@tonic-gate zonecfg_setipdent(zone_dochandle_t handle) 42917c478bd9Sstevel@tonic-gate { 42927c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 42937c478bd9Sstevel@tonic-gate } 42947c478bd9Sstevel@tonic-gate 42957c478bd9Sstevel@tonic-gate int 42967c478bd9Sstevel@tonic-gate zonecfg_getipdent(zone_dochandle_t handle, struct zone_fstab *tabptr) 42977c478bd9Sstevel@tonic-gate { 42987c478bd9Sstevel@tonic-gate xmlNodePtr cur; 42997c478bd9Sstevel@tonic-gate int err; 43007c478bd9Sstevel@tonic-gate 43017c478bd9Sstevel@tonic-gate if (handle == NULL) 43027c478bd9Sstevel@tonic-gate return (Z_INVAL); 43037c478bd9Sstevel@tonic-gate 43047c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 43057c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 43067c478bd9Sstevel@tonic-gate 43077c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 43087c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_IPD)) 43097c478bd9Sstevel@tonic-gate break; 43107c478bd9Sstevel@tonic-gate if (cur == NULL) { 43117c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 43127c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 43137c478bd9Sstevel@tonic-gate } 43147c478bd9Sstevel@tonic-gate 43157c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_DIR, tabptr->zone_fs_dir, 43167c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_fs_dir))) != Z_OK) { 43177c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 43187c478bd9Sstevel@tonic-gate return (err); 43197c478bd9Sstevel@tonic-gate } 43207c478bd9Sstevel@tonic-gate 43217c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 43227c478bd9Sstevel@tonic-gate return (Z_OK); 43237c478bd9Sstevel@tonic-gate } 43247c478bd9Sstevel@tonic-gate 43257c478bd9Sstevel@tonic-gate int 43267c478bd9Sstevel@tonic-gate zonecfg_endipdent(zone_dochandle_t handle) 43277c478bd9Sstevel@tonic-gate { 43287c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 43297c478bd9Sstevel@tonic-gate } 43307c478bd9Sstevel@tonic-gate 43317c478bd9Sstevel@tonic-gate int 43327c478bd9Sstevel@tonic-gate zonecfg_setnwifent(zone_dochandle_t handle) 43337c478bd9Sstevel@tonic-gate { 43347c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 43357c478bd9Sstevel@tonic-gate } 43367c478bd9Sstevel@tonic-gate 43377c478bd9Sstevel@tonic-gate int 43387c478bd9Sstevel@tonic-gate zonecfg_getnwifent(zone_dochandle_t handle, struct zone_nwiftab *tabptr) 43397c478bd9Sstevel@tonic-gate { 43407c478bd9Sstevel@tonic-gate xmlNodePtr cur; 43417c478bd9Sstevel@tonic-gate int err; 43427c478bd9Sstevel@tonic-gate 43437c478bd9Sstevel@tonic-gate if (handle == NULL) 43447c478bd9Sstevel@tonic-gate return (Z_INVAL); 43457c478bd9Sstevel@tonic-gate 43467c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 43477c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 43487c478bd9Sstevel@tonic-gate 43497c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 43507c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_NET)) 43517c478bd9Sstevel@tonic-gate break; 43527c478bd9Sstevel@tonic-gate if (cur == NULL) { 43537c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 43547c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 43557c478bd9Sstevel@tonic-gate } 43567c478bd9Sstevel@tonic-gate 43577c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_ADDRESS, tabptr->zone_nwif_address, 43587c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_nwif_address))) != Z_OK) { 43597c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 43607c478bd9Sstevel@tonic-gate return (err); 43617c478bd9Sstevel@tonic-gate } 43627c478bd9Sstevel@tonic-gate 43637c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_PHYSICAL, tabptr->zone_nwif_physical, 43647c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_nwif_physical))) != Z_OK) { 43657c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 43667c478bd9Sstevel@tonic-gate return (err); 43677c478bd9Sstevel@tonic-gate } 43687c478bd9Sstevel@tonic-gate 43697c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 43707c478bd9Sstevel@tonic-gate return (Z_OK); 43717c478bd9Sstevel@tonic-gate } 43727c478bd9Sstevel@tonic-gate 43737c478bd9Sstevel@tonic-gate int 43747c478bd9Sstevel@tonic-gate zonecfg_endnwifent(zone_dochandle_t handle) 43757c478bd9Sstevel@tonic-gate { 43767c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 43777c478bd9Sstevel@tonic-gate } 43787c478bd9Sstevel@tonic-gate 43797c478bd9Sstevel@tonic-gate int 43807c478bd9Sstevel@tonic-gate zonecfg_setdevent(zone_dochandle_t handle) 43817c478bd9Sstevel@tonic-gate { 43827c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 43837c478bd9Sstevel@tonic-gate } 43847c478bd9Sstevel@tonic-gate 43857c478bd9Sstevel@tonic-gate int 43867c478bd9Sstevel@tonic-gate zonecfg_getdevent(zone_dochandle_t handle, struct zone_devtab *tabptr) 43877c478bd9Sstevel@tonic-gate { 43887c478bd9Sstevel@tonic-gate xmlNodePtr cur; 43897c478bd9Sstevel@tonic-gate int err; 43907c478bd9Sstevel@tonic-gate 43917c478bd9Sstevel@tonic-gate if (handle == NULL) 43927c478bd9Sstevel@tonic-gate return (Z_INVAL); 43937c478bd9Sstevel@tonic-gate 43947c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 43957c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 43967c478bd9Sstevel@tonic-gate 43977c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 43987c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_DEVICE)) 43997c478bd9Sstevel@tonic-gate break; 44007c478bd9Sstevel@tonic-gate if (cur == NULL) { 44017c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 44027c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 44037c478bd9Sstevel@tonic-gate } 44047c478bd9Sstevel@tonic-gate 44057c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_MATCH, tabptr->zone_dev_match, 44067c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_dev_match))) != Z_OK) { 44077c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 44087c478bd9Sstevel@tonic-gate return (err); 44097c478bd9Sstevel@tonic-gate } 44107c478bd9Sstevel@tonic-gate 44117c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 44127c478bd9Sstevel@tonic-gate return (Z_OK); 44137c478bd9Sstevel@tonic-gate } 44147c478bd9Sstevel@tonic-gate 44157c478bd9Sstevel@tonic-gate int 44167c478bd9Sstevel@tonic-gate zonecfg_enddevent(zone_dochandle_t handle) 44177c478bd9Sstevel@tonic-gate { 44187c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 44197c478bd9Sstevel@tonic-gate } 44207c478bd9Sstevel@tonic-gate 44217c478bd9Sstevel@tonic-gate int 44227c478bd9Sstevel@tonic-gate zonecfg_setrctlent(zone_dochandle_t handle) 44237c478bd9Sstevel@tonic-gate { 44247c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 44257c478bd9Sstevel@tonic-gate } 44267c478bd9Sstevel@tonic-gate 44277c478bd9Sstevel@tonic-gate int 44287c478bd9Sstevel@tonic-gate zonecfg_getrctlent(zone_dochandle_t handle, struct zone_rctltab *tabptr) 44297c478bd9Sstevel@tonic-gate { 44307c478bd9Sstevel@tonic-gate xmlNodePtr cur, val; 44317c478bd9Sstevel@tonic-gate struct zone_rctlvaltab *valptr; 44327c478bd9Sstevel@tonic-gate int err; 44337c478bd9Sstevel@tonic-gate 44347c478bd9Sstevel@tonic-gate if (handle == NULL) 44357c478bd9Sstevel@tonic-gate return (Z_INVAL); 44367c478bd9Sstevel@tonic-gate 44377c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 44387c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 44397c478bd9Sstevel@tonic-gate 44407c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 44417c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_RCTL)) 44427c478bd9Sstevel@tonic-gate break; 44437c478bd9Sstevel@tonic-gate if (cur == NULL) { 44447c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 44457c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 44467c478bd9Sstevel@tonic-gate } 44477c478bd9Sstevel@tonic-gate 44487c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_rctl_name, 44497c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_rctl_name))) != Z_OK) { 44507c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 44517c478bd9Sstevel@tonic-gate return (err); 44527c478bd9Sstevel@tonic-gate } 44537c478bd9Sstevel@tonic-gate 44547c478bd9Sstevel@tonic-gate tabptr->zone_rctl_valptr = NULL; 44557c478bd9Sstevel@tonic-gate for (val = cur->xmlChildrenNode; val != NULL; val = val->next) { 44567c478bd9Sstevel@tonic-gate valptr = (struct zone_rctlvaltab *)malloc( 44577c478bd9Sstevel@tonic-gate sizeof (struct zone_rctlvaltab)); 44587c478bd9Sstevel@tonic-gate if (valptr == NULL) 44597c478bd9Sstevel@tonic-gate return (Z_NOMEM); 44607c478bd9Sstevel@tonic-gate if (fetchprop(val, DTD_ATTR_PRIV, valptr->zone_rctlval_priv, 44617c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_priv)) != Z_OK) 44627c478bd9Sstevel@tonic-gate break; 44637c478bd9Sstevel@tonic-gate if (fetchprop(val, DTD_ATTR_LIMIT, valptr->zone_rctlval_limit, 44647c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_limit)) != Z_OK) 44657c478bd9Sstevel@tonic-gate break; 44667c478bd9Sstevel@tonic-gate if (fetchprop(val, DTD_ATTR_ACTION, valptr->zone_rctlval_action, 44677c478bd9Sstevel@tonic-gate sizeof (valptr->zone_rctlval_action)) != Z_OK) 44687c478bd9Sstevel@tonic-gate break; 44697c478bd9Sstevel@tonic-gate if (zonecfg_add_rctl_value(tabptr, valptr) != Z_OK) 44707c478bd9Sstevel@tonic-gate break; 44717c478bd9Sstevel@tonic-gate } 44727c478bd9Sstevel@tonic-gate 44737c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 44747c478bd9Sstevel@tonic-gate return (Z_OK); 44757c478bd9Sstevel@tonic-gate } 44767c478bd9Sstevel@tonic-gate 44777c478bd9Sstevel@tonic-gate int 44787c478bd9Sstevel@tonic-gate zonecfg_endrctlent(zone_dochandle_t handle) 44797c478bd9Sstevel@tonic-gate { 44807c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 44817c478bd9Sstevel@tonic-gate } 44827c478bd9Sstevel@tonic-gate 44837c478bd9Sstevel@tonic-gate int 44847c478bd9Sstevel@tonic-gate zonecfg_setattrent(zone_dochandle_t handle) 44857c478bd9Sstevel@tonic-gate { 44867c478bd9Sstevel@tonic-gate return (zonecfg_setent(handle)); 44877c478bd9Sstevel@tonic-gate } 44887c478bd9Sstevel@tonic-gate 44897c478bd9Sstevel@tonic-gate int 44907c478bd9Sstevel@tonic-gate zonecfg_getattrent(zone_dochandle_t handle, struct zone_attrtab *tabptr) 44917c478bd9Sstevel@tonic-gate { 44927c478bd9Sstevel@tonic-gate xmlNodePtr cur; 44937c478bd9Sstevel@tonic-gate int err; 44947c478bd9Sstevel@tonic-gate 44957c478bd9Sstevel@tonic-gate if (handle == NULL) 44967c478bd9Sstevel@tonic-gate return (Z_INVAL); 44977c478bd9Sstevel@tonic-gate 44987c478bd9Sstevel@tonic-gate if ((cur = handle->zone_dh_cur) == NULL) 44997c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 45007c478bd9Sstevel@tonic-gate 45017c478bd9Sstevel@tonic-gate for (; cur != NULL; cur = cur->next) 45027c478bd9Sstevel@tonic-gate if (!xmlStrcmp(cur->name, DTD_ELEM_ATTR)) 45037c478bd9Sstevel@tonic-gate break; 45047c478bd9Sstevel@tonic-gate if (cur == NULL) { 45057c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 45067c478bd9Sstevel@tonic-gate return (Z_NO_ENTRY); 45077c478bd9Sstevel@tonic-gate } 45087c478bd9Sstevel@tonic-gate 45097c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_attr_name, 45107c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_name))) != Z_OK) { 45117c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 45127c478bd9Sstevel@tonic-gate return (err); 45137c478bd9Sstevel@tonic-gate } 45147c478bd9Sstevel@tonic-gate 45157c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_TYPE, tabptr->zone_attr_type, 45167c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_type))) != Z_OK) { 45177c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 45187c478bd9Sstevel@tonic-gate return (err); 45197c478bd9Sstevel@tonic-gate } 45207c478bd9Sstevel@tonic-gate 45217c478bd9Sstevel@tonic-gate if ((err = fetchprop(cur, DTD_ATTR_VALUE, tabptr->zone_attr_value, 45227c478bd9Sstevel@tonic-gate sizeof (tabptr->zone_attr_value))) != Z_OK) { 45237c478bd9Sstevel@tonic-gate handle->zone_dh_cur = handle->zone_dh_top; 45247c478bd9Sstevel@tonic-gate return (err); 45257c478bd9Sstevel@tonic-gate } 45267c478bd9Sstevel@tonic-gate 45277c478bd9Sstevel@tonic-gate handle->zone_dh_cur = cur->next; 45287c478bd9Sstevel@tonic-gate return (Z_OK); 45297c478bd9Sstevel@tonic-gate } 45307c478bd9Sstevel@tonic-gate 45317c478bd9Sstevel@tonic-gate int 45327c478bd9Sstevel@tonic-gate zonecfg_endattrent(zone_dochandle_t handle) 45337c478bd9Sstevel@tonic-gate { 45347c478bd9Sstevel@tonic-gate return (zonecfg_endent(handle)); 45357c478bd9Sstevel@tonic-gate } 45367c478bd9Sstevel@tonic-gate 4537ffbafc53Scomay /* 4538ffbafc53Scomay * The privileges available on the system and described in privileges(5) 45399acbbeafSnn35248 * fall into four categories with respect to non-global zones: 45409acbbeafSnn35248 * 45419acbbeafSnn35248 * Default set of privileges considered safe for all non-global 45429acbbeafSnn35248 * zones. These privileges are "safe" in the sense that a 45439acbbeafSnn35248 * privileged process in the zone cannot affect processes in any 45449acbbeafSnn35248 * other zone on the system. 45459acbbeafSnn35248 * 45469acbbeafSnn35248 * Set of privileges not currently permitted within a non-global 45479acbbeafSnn35248 * zone. These privileges are considered by default, "unsafe," 45489acbbeafSnn35248 * and include ones which affect global resources (such as the 45499acbbeafSnn35248 * system clock or physical memory) or are overly broad and cover 45509acbbeafSnn35248 * more than one mechanism in the system. In other cases, there 45519acbbeafSnn35248 * has not been sufficient virtualization in the parts of the 45529acbbeafSnn35248 * system the privilege covers to allow its use within a 45539acbbeafSnn35248 * non-global zone. 45549acbbeafSnn35248 * 45559acbbeafSnn35248 * Set of privileges required in order to get a zone booted and 45569acbbeafSnn35248 * init(1M) started. These cannot be removed from the zone's 45579acbbeafSnn35248 * privilege set. 45589acbbeafSnn35248 * 45599acbbeafSnn35248 * All other privileges are optional and are potentially useful for 4560ffbafc53Scomay * processes executing inside a non-global zone. 4561ffbafc53Scomay * 4562ffbafc53Scomay * When privileges are added to the system, a determination needs to be 4563ffbafc53Scomay * made as to which category the privilege belongs to. Ideally, 4564ffbafc53Scomay * privileges should be fine-grained enough and the mechanisms they cover 4565ffbafc53Scomay * virtualized enough so that they can be made available to non-global 4566ffbafc53Scomay * zones. 4567ffbafc53Scomay */ 4568ffbafc53Scomay 4569ffbafc53Scomay /* 4570ffbafc53Scomay * Define some of the tokens that priv_str_to_set(3C) recognizes. Since 4571ffbafc53Scomay * the privilege string separator can be any character, although it is 4572ffbafc53Scomay * usually a comma character, define these here as well in the event that 4573ffbafc53Scomay * they change or are augmented in the future. 4574ffbafc53Scomay */ 4575ffbafc53Scomay #define BASIC_TOKEN "basic" 4576ffbafc53Scomay #define DEFAULT_TOKEN "default" 4577ffbafc53Scomay #define ZONE_TOKEN "zone" 4578ffbafc53Scomay #define TOKEN_PRIV_CHAR ',' 4579ffbafc53Scomay #define TOKEN_PRIV_STR "," 4580ffbafc53Scomay 45819acbbeafSnn35248 typedef struct priv_node { 45829acbbeafSnn35248 struct priv_node *pn_next; /* Next privilege */ 45839acbbeafSnn35248 char *pn_priv; /* Privileges name */ 45849acbbeafSnn35248 } priv_node_t; 45859acbbeafSnn35248 45869acbbeafSnn35248 /* Privileges lists can differ across brands */ 45879acbbeafSnn35248 typedef struct priv_lists { 45889acbbeafSnn35248 /* Privileges considered safe for all non-global zones of a brand */ 45899acbbeafSnn35248 struct priv_node *pl_default; 45909acbbeafSnn35248 45919acbbeafSnn35248 /* Privileges not permitted for all non-global zones of a brand */ 45929acbbeafSnn35248 struct priv_node *pl_prohibited; 45939acbbeafSnn35248 45949acbbeafSnn35248 /* Privileges required for all non-global zones of a brand */ 45959acbbeafSnn35248 struct priv_node *pl_required; 4596bf1d7e28Sdh155122 4597bf1d7e28Sdh155122 /* 4598bf1d7e28Sdh155122 * ip-type of the zone these privileges lists apply to. 4599bf1d7e28Sdh155122 * It is used to pass ip-type to the callback function, 4600bf1d7e28Sdh155122 * priv_lists_cb, which has no way of getting the ip-type. 4601bf1d7e28Sdh155122 */ 4602bf1d7e28Sdh155122 const char *pl_iptype; 46039acbbeafSnn35248 } priv_lists_t; 46049acbbeafSnn35248 46059acbbeafSnn35248 static int 4606bf1d7e28Sdh155122 priv_lists_cb(void *data, priv_iter_t *priv_iter) 46077c478bd9Sstevel@tonic-gate { 46089acbbeafSnn35248 priv_lists_t *plp = (priv_lists_t *)data; 46099acbbeafSnn35248 priv_node_t *pnp; 46109acbbeafSnn35248 4611bf1d7e28Sdh155122 /* Skip this privilege if ip-type does not match */ 4612bf1d7e28Sdh155122 if ((strcmp(priv_iter->pi_iptype, "all") != 0) && 4613bf1d7e28Sdh155122 (strcmp(priv_iter->pi_iptype, plp->pl_iptype) != 0)) 4614bf1d7e28Sdh155122 return (0); 4615bf1d7e28Sdh155122 46169acbbeafSnn35248 /* Allocate a new priv list node. */ 46179acbbeafSnn35248 if ((pnp = malloc(sizeof (*pnp))) == NULL) 46189acbbeafSnn35248 return (-1); 4619bf1d7e28Sdh155122 if ((pnp->pn_priv = strdup(priv_iter->pi_name)) == NULL) { 46209acbbeafSnn35248 free(pnp); 46219acbbeafSnn35248 return (-1); 46229acbbeafSnn35248 } 46239acbbeafSnn35248 46249acbbeafSnn35248 /* Insert the new priv list node into the right list */ 4625bf1d7e28Sdh155122 if (strcmp(priv_iter->pi_set, "default") == 0) { 46269acbbeafSnn35248 pnp->pn_next = plp->pl_default; 46279acbbeafSnn35248 plp->pl_default = pnp; 4628bf1d7e28Sdh155122 } else if (strcmp(priv_iter->pi_set, "prohibited") == 0) { 46299acbbeafSnn35248 pnp->pn_next = plp->pl_prohibited; 46309acbbeafSnn35248 plp->pl_prohibited = pnp; 4631bf1d7e28Sdh155122 } else if (strcmp(priv_iter->pi_set, "required") == 0) { 46329acbbeafSnn35248 pnp->pn_next = plp->pl_required; 46339acbbeafSnn35248 plp->pl_required = pnp; 46349acbbeafSnn35248 } else { 46359acbbeafSnn35248 free(pnp->pn_priv); 46369acbbeafSnn35248 free(pnp); 46379acbbeafSnn35248 return (-1); 46389acbbeafSnn35248 } 46399acbbeafSnn35248 return (0); 46409acbbeafSnn35248 } 46419acbbeafSnn35248 46429acbbeafSnn35248 static void 46439acbbeafSnn35248 priv_lists_destroy(priv_lists_t *plp) 46449acbbeafSnn35248 { 46459acbbeafSnn35248 priv_node_t *pnp; 46469acbbeafSnn35248 46479acbbeafSnn35248 assert(plp != NULL); 46489acbbeafSnn35248 46499acbbeafSnn35248 while ((pnp = plp->pl_default) != NULL) { 46509acbbeafSnn35248 plp->pl_default = pnp->pn_next; 46519acbbeafSnn35248 free(pnp->pn_priv); 46529acbbeafSnn35248 free(pnp); 46539acbbeafSnn35248 } 46549acbbeafSnn35248 while ((pnp = plp->pl_prohibited) != NULL) { 46559acbbeafSnn35248 plp->pl_prohibited = pnp->pn_next; 46569acbbeafSnn35248 free(pnp->pn_priv); 46579acbbeafSnn35248 free(pnp); 46589acbbeafSnn35248 } 46599acbbeafSnn35248 while ((pnp = plp->pl_required) != NULL) { 46609acbbeafSnn35248 plp->pl_required = pnp->pn_next; 46619acbbeafSnn35248 free(pnp->pn_priv); 46629acbbeafSnn35248 free(pnp); 46639acbbeafSnn35248 } 46649acbbeafSnn35248 free(plp); 46659acbbeafSnn35248 } 46669acbbeafSnn35248 46679acbbeafSnn35248 static int 4668bf1d7e28Sdh155122 priv_lists_create(zone_dochandle_t handle, priv_lists_t **plpp, 4669bf1d7e28Sdh155122 const char *curr_iptype) 46709acbbeafSnn35248 { 46719acbbeafSnn35248 priv_lists_t *plp; 4672123807fbSedp brand_handle_t bh; 46739acbbeafSnn35248 char brand[MAXNAMELEN]; 46749acbbeafSnn35248 46759acbbeafSnn35248 if (handle != NULL) { 46769acbbeafSnn35248 if (zonecfg_get_brand(handle, brand, sizeof (brand)) != 0) 46779acbbeafSnn35248 return (Z_BRAND_ERROR); 46789acbbeafSnn35248 } else { 46799acbbeafSnn35248 (void) strlcpy(brand, NATIVE_BRAND_NAME, MAXNAMELEN); 46809acbbeafSnn35248 } 46819acbbeafSnn35248 4682123807fbSedp if ((bh = brand_open(brand)) == NULL) 46839acbbeafSnn35248 return (Z_BRAND_ERROR); 46849acbbeafSnn35248 46859acbbeafSnn35248 if ((plp = calloc(1, sizeof (priv_lists_t))) == NULL) { 4686123807fbSedp brand_close(bh); 46879acbbeafSnn35248 return (Z_NOMEM); 46889acbbeafSnn35248 } 46899acbbeafSnn35248 4690bf1d7e28Sdh155122 plp->pl_iptype = curr_iptype; 4691bf1d7e28Sdh155122 46929acbbeafSnn35248 /* construct the privilege lists */ 4693123807fbSedp if (brand_config_iter_privilege(bh, priv_lists_cb, plp) != 0) { 46949acbbeafSnn35248 priv_lists_destroy(plp); 4695123807fbSedp brand_close(bh); 46969acbbeafSnn35248 return (Z_BRAND_ERROR); 46979acbbeafSnn35248 } 46989acbbeafSnn35248 4699123807fbSedp brand_close(bh); 47009acbbeafSnn35248 *plpp = plp; 47019acbbeafSnn35248 return (Z_OK); 47029acbbeafSnn35248 } 47039acbbeafSnn35248 47049acbbeafSnn35248 static int 47059acbbeafSnn35248 get_default_privset(priv_set_t *privs, priv_lists_t *plp) 47069acbbeafSnn35248 { 47079acbbeafSnn35248 priv_node_t *pnp; 4708ffbafc53Scomay priv_set_t *basic; 47097c478bd9Sstevel@tonic-gate 4710ffbafc53Scomay basic = priv_str_to_set(BASIC_TOKEN, TOKEN_PRIV_STR, NULL); 47117c478bd9Sstevel@tonic-gate if (basic == NULL) 4712ffbafc53Scomay return (errno == ENOMEM ? Z_NOMEM : Z_INVAL); 47137c478bd9Sstevel@tonic-gate 47147c478bd9Sstevel@tonic-gate priv_union(basic, privs); 47157c478bd9Sstevel@tonic-gate priv_freeset(basic); 47167c478bd9Sstevel@tonic-gate 47179acbbeafSnn35248 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) { 47189acbbeafSnn35248 if (priv_addset(privs, pnp->pn_priv) != 0) 47197c478bd9Sstevel@tonic-gate return (Z_INVAL); 47207c478bd9Sstevel@tonic-gate } 47219acbbeafSnn35248 47227c478bd9Sstevel@tonic-gate return (Z_OK); 47237c478bd9Sstevel@tonic-gate } 47247c478bd9Sstevel@tonic-gate 47259acbbeafSnn35248 int 4726bf1d7e28Sdh155122 zonecfg_default_privset(priv_set_t *privs, const char *curr_iptype) 47279acbbeafSnn35248 { 47289acbbeafSnn35248 priv_lists_t *plp; 47299acbbeafSnn35248 int ret; 47309acbbeafSnn35248 4731bf1d7e28Sdh155122 if ((ret = priv_lists_create(NULL, &plp, curr_iptype)) != Z_OK) 47329acbbeafSnn35248 return (ret); 47339acbbeafSnn35248 ret = get_default_privset(privs, plp); 47349acbbeafSnn35248 priv_lists_destroy(plp); 47359acbbeafSnn35248 return (ret); 47369acbbeafSnn35248 } 47379acbbeafSnn35248 4738ffbafc53Scomay void 4739ffbafc53Scomay append_priv_token(char *priv, char *str, size_t strlen) 4740ffbafc53Scomay { 4741ffbafc53Scomay if (*str != '\0') 4742ffbafc53Scomay (void) strlcat(str, TOKEN_PRIV_STR, strlen); 4743ffbafc53Scomay (void) strlcat(str, priv, strlen); 4744ffbafc53Scomay } 4745ffbafc53Scomay 4746ffbafc53Scomay /* 4747ffbafc53Scomay * Verify that the supplied string is a valid privilege limit set for a 4748ffbafc53Scomay * non-global zone. This string must not only be acceptable to 4749ffbafc53Scomay * priv_str_to_set(3C) which parses it, but it also must resolve to a 4750ffbafc53Scomay * privilege set that includes certain required privileges and lacks 4751ffbafc53Scomay * certain prohibited privileges. 4752ffbafc53Scomay */ 4753ffbafc53Scomay static int 4754ffbafc53Scomay verify_privset(char *privbuf, priv_set_t *privs, char **privname, 47559acbbeafSnn35248 boolean_t add_default, priv_lists_t *plp) 4756ffbafc53Scomay { 47579acbbeafSnn35248 priv_node_t *pnp; 47589acbbeafSnn35248 char *tmp, *cp, *lasts; 4759ffbafc53Scomay size_t len; 4760ffbafc53Scomay priv_set_t *mergeset; 4761ffbafc53Scomay const char *token; 4762ffbafc53Scomay 4763ffbafc53Scomay /* 4764ffbafc53Scomay * The verification of the privilege string occurs in several 4765ffbafc53Scomay * phases. In the first phase, the supplied string is scanned for 4766ffbafc53Scomay * the ZONE_TOKEN token which is not support as part of the 4767ffbafc53Scomay * "limitpriv" property. 4768ffbafc53Scomay * 4769ffbafc53Scomay * Duplicate the supplied privilege string since strtok_r(3C) 4770ffbafc53Scomay * tokenizes its input by null-terminating the tokens. 4771ffbafc53Scomay */ 4772ffbafc53Scomay if ((tmp = strdup(privbuf)) == NULL) 4773ffbafc53Scomay return (Z_NOMEM); 4774ffbafc53Scomay for (cp = strtok_r(tmp, TOKEN_PRIV_STR, &lasts); cp != NULL; 4775ffbafc53Scomay cp = strtok_r(NULL, TOKEN_PRIV_STR, &lasts)) { 4776ffbafc53Scomay if (strcmp(cp, ZONE_TOKEN) == 0) { 4777ffbafc53Scomay free(tmp); 4778ffbafc53Scomay if ((*privname = strdup(ZONE_TOKEN)) == NULL) 4779ffbafc53Scomay return (Z_NOMEM); 4780ffbafc53Scomay else 4781ffbafc53Scomay return (Z_PRIV_UNKNOWN); 4782ffbafc53Scomay } 4783ffbafc53Scomay } 4784ffbafc53Scomay free(tmp); 4785ffbafc53Scomay 4786ffbafc53Scomay if (add_default) { 4787ffbafc53Scomay /* 4788ffbafc53Scomay * If DEFAULT_TOKEN was specified, a string needs to be 4789ffbafc53Scomay * built containing the privileges from the default, safe 4790ffbafc53Scomay * set along with those of the "limitpriv" property. 4791ffbafc53Scomay */ 4792ffbafc53Scomay len = strlen(privbuf) + sizeof (BASIC_TOKEN) + 2; 47939acbbeafSnn35248 47949acbbeafSnn35248 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) 47959acbbeafSnn35248 len += strlen(pnp->pn_priv) + 1; 4796ffbafc53Scomay tmp = alloca(len); 4797ffbafc53Scomay *tmp = '\0'; 4798ffbafc53Scomay 4799ffbafc53Scomay append_priv_token(BASIC_TOKEN, tmp, len); 48009acbbeafSnn35248 for (pnp = plp->pl_default; pnp != NULL; pnp = pnp->pn_next) 48019acbbeafSnn35248 append_priv_token(pnp->pn_priv, tmp, len); 4802ffbafc53Scomay (void) strlcat(tmp, TOKEN_PRIV_STR, len); 4803ffbafc53Scomay (void) strlcat(tmp, privbuf, len); 4804ffbafc53Scomay } else { 4805ffbafc53Scomay tmp = privbuf; 4806ffbafc53Scomay } 4807ffbafc53Scomay 4808ffbafc53Scomay 4809ffbafc53Scomay /* 4810ffbafc53Scomay * In the next phase, attempt to convert the merged privilege 4811ffbafc53Scomay * string into a privilege set. In the case of an error, either 4812ffbafc53Scomay * there was a memory allocation failure or there was an invalid 4813ffbafc53Scomay * privilege token in the string. In either case, return an 4814ffbafc53Scomay * appropriate error code but in the event of an invalid token, 4815ffbafc53Scomay * allocate a string containing its name and return that back to 4816ffbafc53Scomay * the caller. 4817ffbafc53Scomay */ 4818ffbafc53Scomay mergeset = priv_str_to_set(tmp, TOKEN_PRIV_STR, &token); 4819ffbafc53Scomay if (mergeset == NULL) { 4820ffbafc53Scomay if (token == NULL) 4821ffbafc53Scomay return (Z_NOMEM); 4822ffbafc53Scomay if ((cp = strchr(token, TOKEN_PRIV_CHAR)) != NULL) 4823ffbafc53Scomay *cp = '\0'; 4824ffbafc53Scomay if ((*privname = strdup(token)) == NULL) 4825ffbafc53Scomay return (Z_NOMEM); 4826ffbafc53Scomay else 4827ffbafc53Scomay return (Z_PRIV_UNKNOWN); 4828ffbafc53Scomay } 4829ffbafc53Scomay 4830ffbafc53Scomay /* 4831ffbafc53Scomay * Next, verify that none of the prohibited zone privileges are 4832ffbafc53Scomay * present in the merged privilege set. 4833ffbafc53Scomay */ 48349acbbeafSnn35248 for (pnp = plp->pl_prohibited; pnp != NULL; pnp = pnp->pn_next) { 48359acbbeafSnn35248 if (priv_ismember(mergeset, pnp->pn_priv)) { 4836ffbafc53Scomay priv_freeset(mergeset); 48379acbbeafSnn35248 if ((*privname = strdup(pnp->pn_priv)) == NULL) 4838ffbafc53Scomay return (Z_NOMEM); 4839ffbafc53Scomay else 4840ffbafc53Scomay return (Z_PRIV_PROHIBITED); 4841ffbafc53Scomay } 4842ffbafc53Scomay } 4843ffbafc53Scomay 4844ffbafc53Scomay /* 4845ffbafc53Scomay * Finally, verify that all of the required zone privileges are 4846ffbafc53Scomay * present in the merged privilege set. 4847ffbafc53Scomay */ 48489acbbeafSnn35248 for (pnp = plp->pl_required; pnp != NULL; pnp = pnp->pn_next) { 48499acbbeafSnn35248 if (!priv_ismember(mergeset, pnp->pn_priv)) { 4850ffbafc53Scomay priv_freeset(mergeset); 48519acbbeafSnn35248 if ((*privname = strdup(pnp->pn_priv)) == NULL) 4852ffbafc53Scomay return (Z_NOMEM); 4853ffbafc53Scomay else 4854ffbafc53Scomay return (Z_PRIV_REQUIRED); 4855ffbafc53Scomay } 4856ffbafc53Scomay } 4857ffbafc53Scomay 4858ffbafc53Scomay priv_copyset(mergeset, privs); 4859ffbafc53Scomay priv_freeset(mergeset); 4860ffbafc53Scomay return (Z_OK); 4861ffbafc53Scomay } 4862ffbafc53Scomay 4863ffbafc53Scomay /* 4864ffbafc53Scomay * Fill in the supplied privilege set with either the default, safe set of 4865ffbafc53Scomay * privileges suitable for a non-global zone, or one based on the 4866ffbafc53Scomay * "limitpriv" property in the zone's configuration. 4867ffbafc53Scomay * 4868ffbafc53Scomay * In the event of an invalid privilege specification in the 4869ffbafc53Scomay * configuration, a string is allocated and returned containing the 4870ffbafc53Scomay * "privilege" causing the issue. It is the caller's responsibility to 4871ffbafc53Scomay * free this memory when it is done with it. 4872ffbafc53Scomay */ 4873ffbafc53Scomay int 4874ffbafc53Scomay zonecfg_get_privset(zone_dochandle_t handle, priv_set_t *privs, 4875ffbafc53Scomay char **privname) 4876ffbafc53Scomay { 48779acbbeafSnn35248 priv_lists_t *plp; 48789acbbeafSnn35248 char *cp, *limitpriv = NULL; 48799acbbeafSnn35248 int err, limitlen; 4880bf1d7e28Sdh155122 zone_iptype_t iptype; 4881bf1d7e28Sdh155122 const char *curr_iptype; 4882ffbafc53Scomay 4883ffbafc53Scomay /* 4884ffbafc53Scomay * Attempt to lookup the "limitpriv" property. If it does not 4885ffbafc53Scomay * exist or matches the string DEFAULT_TOKEN exactly, then the 4886ffbafc53Scomay * default, safe privilege set is returned. 4887ffbafc53Scomay */ 48889acbbeafSnn35248 if ((err = zonecfg_get_limitpriv(handle, &limitpriv)) != Z_OK) 4889ffbafc53Scomay return (err); 48909acbbeafSnn35248 4891bf1d7e28Sdh155122 if ((err = zonecfg_get_iptype(handle, &iptype)) != Z_OK) 4892bf1d7e28Sdh155122 return (err); 4893bf1d7e28Sdh155122 4894bf1d7e28Sdh155122 switch (iptype) { 4895bf1d7e28Sdh155122 case ZS_SHARED: 4896bf1d7e28Sdh155122 curr_iptype = "shared"; 4897bf1d7e28Sdh155122 break; 4898bf1d7e28Sdh155122 case ZS_EXCLUSIVE: 4899bf1d7e28Sdh155122 curr_iptype = "exclusive"; 4900bf1d7e28Sdh155122 break; 4901bf1d7e28Sdh155122 } 4902bf1d7e28Sdh155122 4903bf1d7e28Sdh155122 if ((err = priv_lists_create(handle, &plp, curr_iptype)) != Z_OK) 49049acbbeafSnn35248 return (err); 49059acbbeafSnn35248 4906ffbafc53Scomay limitlen = strlen(limitpriv); 4907ffbafc53Scomay if (limitlen == 0 || strcmp(limitpriv, DEFAULT_TOKEN) == 0) { 4908ffbafc53Scomay free(limitpriv); 49099acbbeafSnn35248 err = get_default_privset(privs, plp); 49109acbbeafSnn35248 priv_lists_destroy(plp); 49119acbbeafSnn35248 return (err); 4912ffbafc53Scomay } 4913ffbafc53Scomay 4914ffbafc53Scomay /* 4915ffbafc53Scomay * Check if the string DEFAULT_TOKEN is the first token in a list 4916ffbafc53Scomay * of privileges. 4917ffbafc53Scomay */ 4918ffbafc53Scomay cp = strchr(limitpriv, TOKEN_PRIV_CHAR); 4919ffbafc53Scomay if (cp != NULL && 4920ffbafc53Scomay strncmp(limitpriv, DEFAULT_TOKEN, cp - limitpriv) == 0) 49219acbbeafSnn35248 err = verify_privset(cp + 1, privs, privname, B_TRUE, plp); 4922ffbafc53Scomay else 49239acbbeafSnn35248 err = verify_privset(limitpriv, privs, privname, B_FALSE, plp); 4924ffbafc53Scomay 4925ffbafc53Scomay free(limitpriv); 49269acbbeafSnn35248 priv_lists_destroy(plp); 4927ffbafc53Scomay return (err); 4928ffbafc53Scomay } 4929ffbafc53Scomay 49307c478bd9Sstevel@tonic-gate int 49317c478bd9Sstevel@tonic-gate zone_get_zonepath(char *zone_name, char *zonepath, size_t rp_sz) 49327c478bd9Sstevel@tonic-gate { 49337c478bd9Sstevel@tonic-gate zone_dochandle_t handle; 49347c478bd9Sstevel@tonic-gate boolean_t found = B_FALSE; 49357c478bd9Sstevel@tonic-gate struct zoneent *ze; 49367c478bd9Sstevel@tonic-gate FILE *cookie; 49377c478bd9Sstevel@tonic-gate int err; 4938108322fbScarlsonj char *cp; 49397c478bd9Sstevel@tonic-gate 49407c478bd9Sstevel@tonic-gate if (zone_name == NULL) 49417c478bd9Sstevel@tonic-gate return (Z_INVAL); 49427c478bd9Sstevel@tonic-gate 4943108322fbScarlsonj (void) strlcpy(zonepath, zonecfg_root, rp_sz); 4944108322fbScarlsonj cp = zonepath + strlen(zonepath); 4945108322fbScarlsonj while (cp > zonepath && cp[-1] == '/') 4946108322fbScarlsonj *--cp = '\0'; 4947108322fbScarlsonj 49487c478bd9Sstevel@tonic-gate if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) { 4949108322fbScarlsonj if (zonepath[0] == '\0') 49507c478bd9Sstevel@tonic-gate (void) strlcpy(zonepath, "/", rp_sz); 49517c478bd9Sstevel@tonic-gate return (Z_OK); 49527c478bd9Sstevel@tonic-gate } 49537c478bd9Sstevel@tonic-gate 49547c478bd9Sstevel@tonic-gate /* 49557c478bd9Sstevel@tonic-gate * First check the index file. Because older versions did not have 49567c478bd9Sstevel@tonic-gate * a copy of the zone path, allow for it to be zero length, in which 49577c478bd9Sstevel@tonic-gate * case we ignore this result and fall back to the XML files. 49587c478bd9Sstevel@tonic-gate */ 49597c478bd9Sstevel@tonic-gate cookie = setzoneent(); 49607c478bd9Sstevel@tonic-gate while ((ze = getzoneent_private(cookie)) != NULL) { 49617c478bd9Sstevel@tonic-gate if (strcmp(ze->zone_name, zone_name) == 0) { 49627c478bd9Sstevel@tonic-gate found = B_TRUE; 4963108322fbScarlsonj if (ze->zone_path[0] != '\0') 4964108322fbScarlsonj (void) strlcpy(cp, ze->zone_path, 4965108322fbScarlsonj rp_sz - (cp - zonepath)); 49667c478bd9Sstevel@tonic-gate } 49677c478bd9Sstevel@tonic-gate free(ze); 49687c478bd9Sstevel@tonic-gate if (found) 49697c478bd9Sstevel@tonic-gate break; 49707c478bd9Sstevel@tonic-gate } 49717c478bd9Sstevel@tonic-gate endzoneent(cookie); 4972108322fbScarlsonj if (found && *cp != '\0') 49737c478bd9Sstevel@tonic-gate return (Z_OK); 49747c478bd9Sstevel@tonic-gate 49757c478bd9Sstevel@tonic-gate /* Fall back to the XML files. */ 49767c478bd9Sstevel@tonic-gate if ((handle = zonecfg_init_handle()) == NULL) 49777c478bd9Sstevel@tonic-gate return (Z_NOMEM); 49787c478bd9Sstevel@tonic-gate 49797c478bd9Sstevel@tonic-gate /* 49807c478bd9Sstevel@tonic-gate * Check the snapshot first: if a zone is running, its zonepath 49817c478bd9Sstevel@tonic-gate * may have changed. 49827c478bd9Sstevel@tonic-gate */ 49837c478bd9Sstevel@tonic-gate if (zonecfg_get_snapshot_handle(zone_name, handle) != Z_OK) { 4984e767a340Sgjelinek if ((err = zonecfg_get_handle(zone_name, handle)) != Z_OK) { 4985e767a340Sgjelinek zonecfg_fini_handle(handle); 49867c478bd9Sstevel@tonic-gate return (err); 49877c478bd9Sstevel@tonic-gate } 4988e767a340Sgjelinek } 49897c478bd9Sstevel@tonic-gate err = zonecfg_get_zonepath(handle, zonepath, rp_sz); 49907c478bd9Sstevel@tonic-gate zonecfg_fini_handle(handle); 49917c478bd9Sstevel@tonic-gate return (err); 49927c478bd9Sstevel@tonic-gate } 49937c478bd9Sstevel@tonic-gate 49947c478bd9Sstevel@tonic-gate int 49957c478bd9Sstevel@tonic-gate zone_get_rootpath(char *zone_name, char *rootpath, size_t rp_sz) 49967c478bd9Sstevel@tonic-gate { 49977c478bd9Sstevel@tonic-gate int err; 49987c478bd9Sstevel@tonic-gate 49997c478bd9Sstevel@tonic-gate /* This function makes sense for non-global zones only. */ 50007c478bd9Sstevel@tonic-gate if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) 50017c478bd9Sstevel@tonic-gate return (Z_BOGUS_ZONE_NAME); 50027c478bd9Sstevel@tonic-gate if ((err = zone_get_zonepath(zone_name, rootpath, rp_sz)) != Z_OK) 50037c478bd9Sstevel@tonic-gate return (err); 50047c478bd9Sstevel@tonic-gate if (strlcat(rootpath, "/root", rp_sz) >= rp_sz) 50057c478bd9Sstevel@tonic-gate return (Z_TOO_BIG); 50067c478bd9Sstevel@tonic-gate return (Z_OK); 50077c478bd9Sstevel@tonic-gate } 50087c478bd9Sstevel@tonic-gate 50099acbbeafSnn35248 int 50109acbbeafSnn35248 zone_get_brand(char *zone_name, char *brandname, size_t rp_sz) 50119acbbeafSnn35248 { 50129acbbeafSnn35248 int err; 50139acbbeafSnn35248 zone_dochandle_t handle; 50149acbbeafSnn35248 char myzone[MAXNAMELEN]; 50159acbbeafSnn35248 int myzoneid = getzoneid(); 50169acbbeafSnn35248 50179acbbeafSnn35248 /* 50189acbbeafSnn35248 * If we are not in the global zone, then we don't have the zone 50199acbbeafSnn35248 * .xml files with the brand name available. Thus, we are going to 50209acbbeafSnn35248 * have to ask the kernel for the information. 50219acbbeafSnn35248 */ 50229acbbeafSnn35248 if (myzoneid != GLOBAL_ZONEID) { 50239acbbeafSnn35248 if (zone_getattr(myzoneid, ZONE_ATTR_NAME, myzone, 50249acbbeafSnn35248 sizeof (myzone)) < 0) 50259acbbeafSnn35248 return (Z_NO_ZONE); 50269acbbeafSnn35248 if (strncmp(zone_name, myzone, MAXNAMELEN) != NULL) 50279acbbeafSnn35248 return (Z_NO_ZONE); 50289acbbeafSnn35248 err = zone_getattr(myzoneid, ZONE_ATTR_BRAND, brandname, rp_sz); 50299acbbeafSnn35248 if (err < 0) 50309acbbeafSnn35248 return ((errno == EFAULT) ? Z_TOO_BIG : Z_INVAL); 50319acbbeafSnn35248 return (Z_OK); 50329acbbeafSnn35248 } 50339acbbeafSnn35248 50349acbbeafSnn35248 if (strcmp(zone_name, "global") == NULL) { 50359acbbeafSnn35248 (void) strlcpy(brandname, NATIVE_BRAND_NAME, rp_sz); 50369acbbeafSnn35248 return (0); 50379acbbeafSnn35248 } 50389acbbeafSnn35248 if ((handle = zonecfg_init_handle()) == NULL) 50399acbbeafSnn35248 return (Z_NOMEM); 50409acbbeafSnn35248 50419acbbeafSnn35248 err = zonecfg_get_handle((char *)zone_name, handle); 50429acbbeafSnn35248 if (err == Z_OK) 50439acbbeafSnn35248 err = zonecfg_get_brand(handle, brandname, rp_sz); 50449acbbeafSnn35248 50459acbbeafSnn35248 zonecfg_fini_handle(handle); 50469acbbeafSnn35248 return (err); 50479acbbeafSnn35248 } 50489acbbeafSnn35248 5049facf4a8dSllai1 /* 5050facf4a8dSllai1 * Return the appropriate root for the active /dev. 5051facf4a8dSllai1 * For normal zone, the path is $ZONEPATH/root; 5052facf4a8dSllai1 * for scratch zone, the dev path is $ZONEPATH/lu. 5053facf4a8dSllai1 */ 5054facf4a8dSllai1 int 5055facf4a8dSllai1 zone_get_devroot(char *zone_name, char *devroot, size_t rp_sz) 5056facf4a8dSllai1 { 5057facf4a8dSllai1 int err; 5058facf4a8dSllai1 char *suffix; 5059facf4a8dSllai1 zone_state_t state; 5060facf4a8dSllai1 5061facf4a8dSllai1 /* This function makes sense for non-global zones only. */ 5062facf4a8dSllai1 if (strcmp(zone_name, GLOBAL_ZONENAME) == 0) 5063facf4a8dSllai1 return (Z_BOGUS_ZONE_NAME); 5064facf4a8dSllai1 if ((err = zone_get_zonepath(zone_name, devroot, rp_sz)) != Z_OK) 5065facf4a8dSllai1 return (err); 5066facf4a8dSllai1 5067facf4a8dSllai1 if (zone_get_state(zone_name, &state) == Z_OK && 5068facf4a8dSllai1 state == ZONE_STATE_MOUNTED) 5069facf4a8dSllai1 suffix = "/lu"; 5070facf4a8dSllai1 else 5071facf4a8dSllai1 suffix = "/root"; 5072facf4a8dSllai1 if (strlcat(devroot, suffix, rp_sz) >= rp_sz) 5073facf4a8dSllai1 return (Z_TOO_BIG); 5074facf4a8dSllai1 return (Z_OK); 5075facf4a8dSllai1 } 5076facf4a8dSllai1 50777c478bd9Sstevel@tonic-gate static zone_state_t 5078108322fbScarlsonj kernel_state_to_user_state(zoneid_t zoneid, zone_status_t kernel_state) 50797c478bd9Sstevel@tonic-gate { 5080108322fbScarlsonj char zoneroot[MAXPATHLEN]; 5081108322fbScarlsonj size_t zlen; 5082108322fbScarlsonj 50837c478bd9Sstevel@tonic-gate assert(kernel_state <= ZONE_MAX_STATE); 50847c478bd9Sstevel@tonic-gate switch (kernel_state) { 50857c478bd9Sstevel@tonic-gate case ZONE_IS_UNINITIALIZED: 5086108322fbScarlsonj return (ZONE_STATE_READY); 50877c478bd9Sstevel@tonic-gate case ZONE_IS_READY: 5088108322fbScarlsonj /* 5089108322fbScarlsonj * If the zone's root is mounted on $ZONEPATH/lu, then 5090108322fbScarlsonj * it's a mounted scratch zone. 5091108322fbScarlsonj */ 5092108322fbScarlsonj if (zone_getattr(zoneid, ZONE_ATTR_ROOT, zoneroot, 5093108322fbScarlsonj sizeof (zoneroot)) >= 0) { 5094108322fbScarlsonj zlen = strlen(zoneroot); 5095108322fbScarlsonj if (zlen > 3 && 5096108322fbScarlsonj strcmp(zoneroot + zlen - 3, "/lu") == 0) 5097108322fbScarlsonj return (ZONE_STATE_MOUNTED); 5098108322fbScarlsonj } 50997c478bd9Sstevel@tonic-gate return (ZONE_STATE_READY); 51007c478bd9Sstevel@tonic-gate case ZONE_IS_BOOTING: 51017c478bd9Sstevel@tonic-gate case ZONE_IS_RUNNING: 51027c478bd9Sstevel@tonic-gate return (ZONE_STATE_RUNNING); 51037c478bd9Sstevel@tonic-gate case ZONE_IS_SHUTTING_DOWN: 51047c478bd9Sstevel@tonic-gate case ZONE_IS_EMPTY: 51057c478bd9Sstevel@tonic-gate return (ZONE_STATE_SHUTTING_DOWN); 51067c478bd9Sstevel@tonic-gate case ZONE_IS_DOWN: 51077c478bd9Sstevel@tonic-gate case ZONE_IS_DYING: 51087c478bd9Sstevel@tonic-gate case ZONE_IS_DEAD: 51097c478bd9Sstevel@tonic-gate default: 51107c478bd9Sstevel@tonic-gate return (ZONE_STATE_DOWN); 51117c478bd9Sstevel@tonic-gate } 51127c478bd9Sstevel@tonic-gate /* NOTREACHED */ 51137c478bd9Sstevel@tonic-gate } 51147c478bd9Sstevel@tonic-gate 51157c478bd9Sstevel@tonic-gate int 51167c478bd9Sstevel@tonic-gate zone_get_state(char *zone_name, zone_state_t *state_num) 51177c478bd9Sstevel@tonic-gate { 51187c478bd9Sstevel@tonic-gate zone_status_t status; 51197c478bd9Sstevel@tonic-gate zoneid_t zone_id; 51207c478bd9Sstevel@tonic-gate struct zoneent *ze; 51217c478bd9Sstevel@tonic-gate boolean_t found = B_FALSE; 51227c478bd9Sstevel@tonic-gate FILE *cookie; 5123108322fbScarlsonj char kernzone[ZONENAME_MAX]; 5124108322fbScarlsonj FILE *fp; 51257c478bd9Sstevel@tonic-gate 51267c478bd9Sstevel@tonic-gate if (zone_name == NULL) 51277c478bd9Sstevel@tonic-gate return (Z_INVAL); 51287c478bd9Sstevel@tonic-gate 5129108322fbScarlsonj /* 5130108322fbScarlsonj * If we're looking at an alternate root, then we need to query the 5131108322fbScarlsonj * kernel using the scratch zone name. 5132108322fbScarlsonj */ 5133108322fbScarlsonj zone_id = -1; 5134108322fbScarlsonj if (*zonecfg_root != '\0' && !zonecfg_is_scratch(zone_name)) { 5135108322fbScarlsonj if ((fp = zonecfg_open_scratch("", B_FALSE)) != NULL) { 5136108322fbScarlsonj if (zonecfg_find_scratch(fp, zone_name, zonecfg_root, 5137108322fbScarlsonj kernzone, sizeof (kernzone)) == 0) 5138108322fbScarlsonj zone_id = getzoneidbyname(kernzone); 5139108322fbScarlsonj zonecfg_close_scratch(fp); 5140108322fbScarlsonj } 5141108322fbScarlsonj } else { 5142108322fbScarlsonj zone_id = getzoneidbyname(zone_name); 5143108322fbScarlsonj } 5144108322fbScarlsonj 51457c478bd9Sstevel@tonic-gate /* check to see if zone is running */ 5146108322fbScarlsonj if (zone_id != -1 && 51477c478bd9Sstevel@tonic-gate zone_getattr(zone_id, ZONE_ATTR_STATUS, &status, 51487c478bd9Sstevel@tonic-gate sizeof (status)) >= 0) { 5149108322fbScarlsonj *state_num = kernel_state_to_user_state(zone_id, status); 51507c478bd9Sstevel@tonic-gate return (Z_OK); 51517c478bd9Sstevel@tonic-gate } 51527c478bd9Sstevel@tonic-gate 51537c478bd9Sstevel@tonic-gate cookie = setzoneent(); 51547c478bd9Sstevel@tonic-gate while ((ze = getzoneent_private(cookie)) != NULL) { 51557c478bd9Sstevel@tonic-gate if (strcmp(ze->zone_name, zone_name) == 0) { 51567c478bd9Sstevel@tonic-gate found = B_TRUE; 51577c478bd9Sstevel@tonic-gate *state_num = ze->zone_state; 51587c478bd9Sstevel@tonic-gate } 51597c478bd9Sstevel@tonic-gate free(ze); 51607c478bd9Sstevel@tonic-gate if (found) 51617c478bd9Sstevel@tonic-gate break; 51627c478bd9Sstevel@tonic-gate } 51637c478bd9Sstevel@tonic-gate endzoneent(cookie); 51647c478bd9Sstevel@tonic-gate return ((found) ? Z_OK : Z_NO_ZONE); 51657c478bd9Sstevel@tonic-gate } 51667c478bd9Sstevel@tonic-gate 51677c478bd9Sstevel@tonic-gate int 51687c478bd9Sstevel@tonic-gate zone_set_state(char *zone, zone_state_t state) 51697c478bd9Sstevel@tonic-gate { 51707c478bd9Sstevel@tonic-gate struct zoneent ze; 51717c478bd9Sstevel@tonic-gate 51727c478bd9Sstevel@tonic-gate if (state != ZONE_STATE_CONFIGURED && state != ZONE_STATE_INSTALLED && 51737c478bd9Sstevel@tonic-gate state != ZONE_STATE_INCOMPLETE) 51747c478bd9Sstevel@tonic-gate return (Z_INVAL); 51757c478bd9Sstevel@tonic-gate 5176087719fdSdp bzero(&ze, sizeof (ze)); 51777c478bd9Sstevel@tonic-gate (void) strlcpy(ze.zone_name, zone, sizeof (ze.zone_name)); 51787c478bd9Sstevel@tonic-gate ze.zone_state = state; 51797c478bd9Sstevel@tonic-gate (void) strlcpy(ze.zone_path, "", sizeof (ze.zone_path)); 51807c478bd9Sstevel@tonic-gate return (putzoneent(&ze, PZE_MODIFY)); 51817c478bd9Sstevel@tonic-gate } 51827c478bd9Sstevel@tonic-gate 51837c478bd9Sstevel@tonic-gate /* 51847c478bd9Sstevel@tonic-gate * Get id (if any) for specified zone. There are four possible outcomes: 51857c478bd9Sstevel@tonic-gate * - If the string corresponds to the numeric id of an active (booted) 51867c478bd9Sstevel@tonic-gate * zone, sets *zip to the zone id and returns 0. 51877c478bd9Sstevel@tonic-gate * - If the string corresponds to the name of an active (booted) zone, 51887c478bd9Sstevel@tonic-gate * sets *zip to the zone id and returns 0. 51897c478bd9Sstevel@tonic-gate * - If the string is a name in the configuration but is not booted, 51907c478bd9Sstevel@tonic-gate * sets *zip to ZONE_ID_UNDEFINED and returns 0. 51917c478bd9Sstevel@tonic-gate * - Otherwise, leaves *zip unchanged and returns -1. 51927c478bd9Sstevel@tonic-gate * 51937c478bd9Sstevel@tonic-gate * This function acts as an auxiliary filter on the function of the same 51947c478bd9Sstevel@tonic-gate * name in libc; the linker binds to this version if libzonecfg exists, 51957c478bd9Sstevel@tonic-gate * and the libc version if it doesn't. Any changes to this version of 51967c478bd9Sstevel@tonic-gate * the function should probably be reflected in the libc version as well. 51977c478bd9Sstevel@tonic-gate */ 51987c478bd9Sstevel@tonic-gate int 51997c478bd9Sstevel@tonic-gate zone_get_id(const char *str, zoneid_t *zip) 52007c478bd9Sstevel@tonic-gate { 52017c478bd9Sstevel@tonic-gate zone_dochandle_t hdl; 52027c478bd9Sstevel@tonic-gate zoneid_t zoneid; 52037c478bd9Sstevel@tonic-gate char *cp; 52047c478bd9Sstevel@tonic-gate int err; 52057c478bd9Sstevel@tonic-gate 52067c478bd9Sstevel@tonic-gate /* first try looking for active zone by id */ 52077c478bd9Sstevel@tonic-gate errno = 0; 52087c478bd9Sstevel@tonic-gate zoneid = (zoneid_t)strtol(str, &cp, 0); 52097c478bd9Sstevel@tonic-gate if (errno == 0 && cp != str && *cp == '\0' && 52107c478bd9Sstevel@tonic-gate getzonenamebyid(zoneid, NULL, 0) != -1) { 52117c478bd9Sstevel@tonic-gate *zip = zoneid; 52127c478bd9Sstevel@tonic-gate return (0); 52137c478bd9Sstevel@tonic-gate } 52147c478bd9Sstevel@tonic-gate 52157c478bd9Sstevel@tonic-gate /* then look for active zone by name */ 52167c478bd9Sstevel@tonic-gate if ((zoneid = getzoneidbyname(str)) != -1) { 52177c478bd9Sstevel@tonic-gate *zip = zoneid; 52187c478bd9Sstevel@tonic-gate return (0); 52197c478bd9Sstevel@tonic-gate } 52207c478bd9Sstevel@tonic-gate 52217c478bd9Sstevel@tonic-gate /* if in global zone, try looking up name in configuration database */ 52227c478bd9Sstevel@tonic-gate if (getzoneid() != GLOBAL_ZONEID || 52237c478bd9Sstevel@tonic-gate (hdl = zonecfg_init_handle()) == NULL) 52247c478bd9Sstevel@tonic-gate return (-1); 52257c478bd9Sstevel@tonic-gate 5226108322fbScarlsonj if (zonecfg_get_handle(str, hdl) == Z_OK) { 52277c478bd9Sstevel@tonic-gate /* zone exists but isn't active */ 52287c478bd9Sstevel@tonic-gate *zip = ZONE_ID_UNDEFINED; 52297c478bd9Sstevel@tonic-gate err = 0; 52307c478bd9Sstevel@tonic-gate } else { 52317c478bd9Sstevel@tonic-gate err = -1; 52327c478bd9Sstevel@tonic-gate } 52337c478bd9Sstevel@tonic-gate 52347c478bd9Sstevel@tonic-gate zonecfg_fini_handle(hdl); 52357c478bd9Sstevel@tonic-gate return (err); 52367c478bd9Sstevel@tonic-gate } 52377c478bd9Sstevel@tonic-gate 52387c478bd9Sstevel@tonic-gate char * 52397c478bd9Sstevel@tonic-gate zone_state_str(zone_state_t state_num) 52407c478bd9Sstevel@tonic-gate { 52417c478bd9Sstevel@tonic-gate switch (state_num) { 52427c478bd9Sstevel@tonic-gate case ZONE_STATE_CONFIGURED: 52437c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_CONFIGURED); 52447c478bd9Sstevel@tonic-gate case ZONE_STATE_INCOMPLETE: 52457c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_INCOMPLETE); 52467c478bd9Sstevel@tonic-gate case ZONE_STATE_INSTALLED: 52477c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_INSTALLED); 52487c478bd9Sstevel@tonic-gate case ZONE_STATE_READY: 52497c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_READY); 5250108322fbScarlsonj case ZONE_STATE_MOUNTED: 5251108322fbScarlsonj return (ZONE_STATE_STR_MOUNTED); 52527c478bd9Sstevel@tonic-gate case ZONE_STATE_RUNNING: 52537c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_RUNNING); 52547c478bd9Sstevel@tonic-gate case ZONE_STATE_SHUTTING_DOWN: 52557c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_SHUTTING_DOWN); 52567c478bd9Sstevel@tonic-gate case ZONE_STATE_DOWN: 52577c478bd9Sstevel@tonic-gate return (ZONE_STATE_STR_DOWN); 52587c478bd9Sstevel@tonic-gate default: 52597c478bd9Sstevel@tonic-gate return ("unknown"); 52607c478bd9Sstevel@tonic-gate } 52617c478bd9Sstevel@tonic-gate } 52627c478bd9Sstevel@tonic-gate 52637c478bd9Sstevel@tonic-gate /* 5264108322fbScarlsonj * Given a UUID value, find an associated zone name. This is intended to be 5265108322fbScarlsonj * used by callers who set up some 'default' name (corresponding to the 5266108322fbScarlsonj * expected name for the zone) in the zonename buffer, and thus the function 5267108322fbScarlsonj * doesn't touch this buffer on failure. 5268108322fbScarlsonj */ 5269108322fbScarlsonj int 5270555afedfScarlsonj zonecfg_get_name_by_uuid(const uuid_t uuidin, char *zonename, size_t namelen) 5271108322fbScarlsonj { 5272108322fbScarlsonj FILE *fp; 5273108322fbScarlsonj struct zoneent *ze; 5274555afedfScarlsonj uchar_t *uuid; 5275108322fbScarlsonj 5276108322fbScarlsonj /* 5277108322fbScarlsonj * A small amount of subterfuge via casts is necessary here because 5278108322fbScarlsonj * libuuid doesn't use const correctly, but we don't want to export 5279108322fbScarlsonj * this brokenness to our clients. 5280108322fbScarlsonj */ 5281555afedfScarlsonj uuid = (uchar_t *)uuidin; 5282555afedfScarlsonj if (uuid_is_null(uuid)) 5283108322fbScarlsonj return (Z_NO_ZONE); 5284108322fbScarlsonj if ((fp = setzoneent()) == NULL) 5285108322fbScarlsonj return (Z_NO_ZONE); 5286108322fbScarlsonj while ((ze = getzoneent_private(fp)) != NULL) { 5287555afedfScarlsonj if (uuid_compare(uuid, ze->zone_uuid) == 0) 5288108322fbScarlsonj break; 5289108322fbScarlsonj free(ze); 5290108322fbScarlsonj } 5291108322fbScarlsonj endzoneent(fp); 5292108322fbScarlsonj if (ze != NULL) { 5293108322fbScarlsonj (void) strlcpy(zonename, ze->zone_name, namelen); 5294108322fbScarlsonj free(ze); 5295108322fbScarlsonj return (Z_OK); 5296108322fbScarlsonj } else { 5297108322fbScarlsonj return (Z_NO_ZONE); 5298108322fbScarlsonj } 5299108322fbScarlsonj } 5300108322fbScarlsonj 5301108322fbScarlsonj /* 5302108322fbScarlsonj * Given a zone name, get its UUID. Returns a "NULL" UUID value if the zone 5303108322fbScarlsonj * exists but the file doesn't have a value set yet. Returns an error if the 5304108322fbScarlsonj * zone cannot be located. 5305108322fbScarlsonj */ 5306108322fbScarlsonj int 5307108322fbScarlsonj zonecfg_get_uuid(const char *zonename, uuid_t uuid) 5308108322fbScarlsonj { 5309108322fbScarlsonj FILE *fp; 5310108322fbScarlsonj struct zoneent *ze; 5311108322fbScarlsonj 5312108322fbScarlsonj if ((fp = setzoneent()) == NULL) 5313108322fbScarlsonj return (Z_NO_ZONE); 5314108322fbScarlsonj while ((ze = getzoneent_private(fp)) != NULL) { 5315108322fbScarlsonj if (strcmp(ze->zone_name, zonename) == 0) 5316108322fbScarlsonj break; 5317108322fbScarlsonj free(ze); 5318108322fbScarlsonj } 5319108322fbScarlsonj endzoneent(fp); 5320108322fbScarlsonj if (ze != NULL) { 5321108322fbScarlsonj uuid_copy(uuid, ze->zone_uuid); 5322108322fbScarlsonj free(ze); 5323108322fbScarlsonj return (Z_OK); 5324108322fbScarlsonj } else { 5325108322fbScarlsonj return (Z_NO_ZONE); 5326108322fbScarlsonj } 5327108322fbScarlsonj } 5328108322fbScarlsonj 5329108322fbScarlsonj /* 53307c478bd9Sstevel@tonic-gate * File-system convenience functions. 53317c478bd9Sstevel@tonic-gate */ 53327c478bd9Sstevel@tonic-gate boolean_t 53337c478bd9Sstevel@tonic-gate zonecfg_valid_fs_type(const char *type) 53347c478bd9Sstevel@tonic-gate { 53357c478bd9Sstevel@tonic-gate /* 53367c478bd9Sstevel@tonic-gate * We already know which FS types don't work. 53377c478bd9Sstevel@tonic-gate */ 53387c478bd9Sstevel@tonic-gate if (strcmp(type, "proc") == 0 || 53397c478bd9Sstevel@tonic-gate strcmp(type, "mntfs") == 0 || 53407c478bd9Sstevel@tonic-gate strcmp(type, "autofs") == 0 || 53417c478bd9Sstevel@tonic-gate strncmp(type, "nfs", sizeof ("nfs") - 1) == 0 || 53427c478bd9Sstevel@tonic-gate strcmp(type, "cachefs") == 0) 53437c478bd9Sstevel@tonic-gate return (B_FALSE); 53447c478bd9Sstevel@tonic-gate /* 53457c478bd9Sstevel@tonic-gate * The caller may do more detailed verification to make sure other 53467c478bd9Sstevel@tonic-gate * aspects of this filesystem type make sense. 53477c478bd9Sstevel@tonic-gate */ 53487c478bd9Sstevel@tonic-gate return (B_TRUE); 53497c478bd9Sstevel@tonic-gate } 53507c478bd9Sstevel@tonic-gate 53517c478bd9Sstevel@tonic-gate /* 53527c478bd9Sstevel@tonic-gate * Generally uninteresting rctl convenience functions. 53537c478bd9Sstevel@tonic-gate */ 53547c478bd9Sstevel@tonic-gate 53557c478bd9Sstevel@tonic-gate int 53567c478bd9Sstevel@tonic-gate zonecfg_construct_rctlblk(const struct zone_rctlvaltab *rctlval, 53577c478bd9Sstevel@tonic-gate rctlblk_t *rctlblk) 53587c478bd9Sstevel@tonic-gate { 53597c478bd9Sstevel@tonic-gate unsigned long long ull; 53607c478bd9Sstevel@tonic-gate char *endp; 53617c478bd9Sstevel@tonic-gate rctl_priv_t priv; 53627c478bd9Sstevel@tonic-gate rctl_qty_t limit; 53637c478bd9Sstevel@tonic-gate uint_t action; 53647c478bd9Sstevel@tonic-gate 53657c478bd9Sstevel@tonic-gate /* Get the privilege */ 53667c478bd9Sstevel@tonic-gate if (strcmp(rctlval->zone_rctlval_priv, "basic") == 0) { 53677c478bd9Sstevel@tonic-gate priv = RCPRIV_BASIC; 53687c478bd9Sstevel@tonic-gate } else if (strcmp(rctlval->zone_rctlval_priv, "privileged") == 0) { 53697c478bd9Sstevel@tonic-gate priv = RCPRIV_PRIVILEGED; 53707c478bd9Sstevel@tonic-gate } else { 53717c478bd9Sstevel@tonic-gate /* Invalid privilege */ 53727c478bd9Sstevel@tonic-gate return (Z_INVAL); 53737c478bd9Sstevel@tonic-gate } 53747c478bd9Sstevel@tonic-gate 53757c478bd9Sstevel@tonic-gate /* deal with negative input; strtoull(3c) doesn't do what we want */ 53767c478bd9Sstevel@tonic-gate if (rctlval->zone_rctlval_limit[0] == '-') 53777c478bd9Sstevel@tonic-gate return (Z_INVAL); 53787c478bd9Sstevel@tonic-gate /* Get the limit */ 53797c478bd9Sstevel@tonic-gate errno = 0; 53807c478bd9Sstevel@tonic-gate ull = strtoull(rctlval->zone_rctlval_limit, &endp, 0); 53817c478bd9Sstevel@tonic-gate if (errno != 0 || *endp != '\0') { 53827c478bd9Sstevel@tonic-gate /* parse failed */ 53837c478bd9Sstevel@tonic-gate return (Z_INVAL); 53847c478bd9Sstevel@tonic-gate } 53857c478bd9Sstevel@tonic-gate limit = (rctl_qty_t)ull; 53867c478bd9Sstevel@tonic-gate 53877c478bd9Sstevel@tonic-gate /* Get the action */ 53887c478bd9Sstevel@tonic-gate if (strcmp(rctlval->zone_rctlval_action, "none") == 0) { 53897c478bd9Sstevel@tonic-gate action = RCTL_LOCAL_NOACTION; 53907c478bd9Sstevel@tonic-gate } else if (strcmp(rctlval->zone_rctlval_action, "signal") == 0) { 53917c478bd9Sstevel@tonic-gate action = RCTL_LOCAL_SIGNAL; 53927c478bd9Sstevel@tonic-gate } else if (strcmp(rctlval->zone_rctlval_action, "deny") == 0) { 53937c478bd9Sstevel@tonic-gate action = RCTL_LOCAL_DENY; 53947c478bd9Sstevel@tonic-gate } else { 53957c478bd9Sstevel@tonic-gate /* Invalid Action */ 53967c478bd9Sstevel@tonic-gate return (Z_INVAL); 53977c478bd9Sstevel@tonic-gate } 53987c478bd9Sstevel@tonic-gate rctlblk_set_local_action(rctlblk, action, 0); 53997c478bd9Sstevel@tonic-gate rctlblk_set_privilege(rctlblk, priv); 54007c478bd9Sstevel@tonic-gate rctlblk_set_value(rctlblk, limit); 54017c478bd9Sstevel@tonic-gate return (Z_OK); 54027c478bd9Sstevel@tonic-gate } 54037c478bd9Sstevel@tonic-gate 54047c478bd9Sstevel@tonic-gate static int 54057c478bd9Sstevel@tonic-gate rctl_check(const char *rctlname, void *arg) 54067c478bd9Sstevel@tonic-gate { 54077c478bd9Sstevel@tonic-gate const char *attrname = arg; 54087c478bd9Sstevel@tonic-gate 54097c478bd9Sstevel@tonic-gate /* 54107c478bd9Sstevel@tonic-gate * Returning 1 here is our signal to zonecfg_is_rctl() that it is 54117c478bd9Sstevel@tonic-gate * indeed an rctl name recognized by the system. 54127c478bd9Sstevel@tonic-gate */ 54137c478bd9Sstevel@tonic-gate return (strcmp(rctlname, attrname) == 0 ? 1 : 0); 54147c478bd9Sstevel@tonic-gate } 54157c478bd9Sstevel@tonic-gate 54167c478bd9Sstevel@tonic-gate boolean_t 54177c478bd9Sstevel@tonic-gate zonecfg_is_rctl(const char *name) 54187c478bd9Sstevel@tonic-gate { 54197c478bd9Sstevel@tonic-gate return (rctl_walk(rctl_check, (void *)name) == 1); 54207c478bd9Sstevel@tonic-gate } 54217c478bd9Sstevel@tonic-gate 54227c478bd9Sstevel@tonic-gate boolean_t 54237c478bd9Sstevel@tonic-gate zonecfg_valid_rctlname(const char *name) 54247c478bd9Sstevel@tonic-gate { 54257c478bd9Sstevel@tonic-gate const char *c; 54267c478bd9Sstevel@tonic-gate 54277c478bd9Sstevel@tonic-gate if (strncmp(name, "zone.", sizeof ("zone.") - 1) != 0) 54287c478bd9Sstevel@tonic-gate return (B_FALSE); 54297c478bd9Sstevel@tonic-gate if (strlen(name) == sizeof ("zone.") - 1) 54307c478bd9Sstevel@tonic-gate return (B_FALSE); 54317c478bd9Sstevel@tonic-gate for (c = name + sizeof ("zone.") - 1; *c != '\0'; c++) { 54327c478bd9Sstevel@tonic-gate if (!isalpha(*c) && *c != '-') 54337c478bd9Sstevel@tonic-gate return (B_FALSE); 54347c478bd9Sstevel@tonic-gate } 54357c478bd9Sstevel@tonic-gate return (B_TRUE); 54367c478bd9Sstevel@tonic-gate } 54377c478bd9Sstevel@tonic-gate 54387c478bd9Sstevel@tonic-gate boolean_t 54397c478bd9Sstevel@tonic-gate zonecfg_valid_rctlblk(const rctlblk_t *rctlblk) 54407c478bd9Sstevel@tonic-gate { 54417c478bd9Sstevel@tonic-gate rctl_priv_t priv = rctlblk_get_privilege((rctlblk_t *)rctlblk); 54427c478bd9Sstevel@tonic-gate uint_t action = rctlblk_get_local_action((rctlblk_t *)rctlblk, NULL); 54437c478bd9Sstevel@tonic-gate 54447c478bd9Sstevel@tonic-gate if (priv != RCPRIV_PRIVILEGED) 54457c478bd9Sstevel@tonic-gate return (B_FALSE); 54467c478bd9Sstevel@tonic-gate if (action != RCTL_LOCAL_NOACTION && action != RCTL_LOCAL_DENY) 54477c478bd9Sstevel@tonic-gate return (B_FALSE); 54487c478bd9Sstevel@tonic-gate return (B_TRUE); 54497c478bd9Sstevel@tonic-gate } 54507c478bd9Sstevel@tonic-gate 54517c478bd9Sstevel@tonic-gate boolean_t 54527c478bd9Sstevel@tonic-gate zonecfg_valid_rctl(const char *name, const rctlblk_t *rctlblk) 54537c478bd9Sstevel@tonic-gate { 54547c478bd9Sstevel@tonic-gate rctlblk_t *current, *next; 54557c478bd9Sstevel@tonic-gate rctl_qty_t limit = rctlblk_get_value((rctlblk_t *)rctlblk); 54567c478bd9Sstevel@tonic-gate uint_t action = rctlblk_get_local_action((rctlblk_t *)rctlblk, NULL); 54577c478bd9Sstevel@tonic-gate uint_t global_flags; 54587c478bd9Sstevel@tonic-gate 54597c478bd9Sstevel@tonic-gate if (!zonecfg_valid_rctlblk(rctlblk)) 54607c478bd9Sstevel@tonic-gate return (B_FALSE); 54617c478bd9Sstevel@tonic-gate if (!zonecfg_valid_rctlname(name)) 54627c478bd9Sstevel@tonic-gate return (B_FALSE); 54637c478bd9Sstevel@tonic-gate 54647c478bd9Sstevel@tonic-gate current = alloca(rctlblk_size()); 54657c478bd9Sstevel@tonic-gate if (getrctl(name, NULL, current, RCTL_FIRST) != 0) 54667c478bd9Sstevel@tonic-gate return (B_TRUE); /* not an rctl on this system */ 54677c478bd9Sstevel@tonic-gate /* 54687c478bd9Sstevel@tonic-gate * Make sure the proposed value isn't greater than the current system 54697c478bd9Sstevel@tonic-gate * value. 54707c478bd9Sstevel@tonic-gate */ 54717c478bd9Sstevel@tonic-gate next = alloca(rctlblk_size()); 54727c478bd9Sstevel@tonic-gate while (rctlblk_get_privilege(current) != RCPRIV_SYSTEM) { 54737c478bd9Sstevel@tonic-gate rctlblk_t *tmp; 54747c478bd9Sstevel@tonic-gate 54757c478bd9Sstevel@tonic-gate if (getrctl(name, current, next, RCTL_NEXT) != 0) 54767c478bd9Sstevel@tonic-gate return (B_FALSE); /* shouldn't happen */ 54777c478bd9Sstevel@tonic-gate tmp = current; 54787c478bd9Sstevel@tonic-gate current = next; 54797c478bd9Sstevel@tonic-gate next = tmp; 54807c478bd9Sstevel@tonic-gate } 54817c478bd9Sstevel@tonic-gate if (limit > rctlblk_get_value(current)) 54827c478bd9Sstevel@tonic-gate return (B_FALSE); 54837c478bd9Sstevel@tonic-gate 54847c478bd9Sstevel@tonic-gate /* 54857c478bd9Sstevel@tonic-gate * Make sure the proposed action is allowed. 54867c478bd9Sstevel@tonic-gate */ 54877c478bd9Sstevel@tonic-gate global_flags = rctlblk_get_global_flags(current); 54887c478bd9Sstevel@tonic-gate if ((global_flags & RCTL_GLOBAL_DENY_NEVER) && 54897c478bd9Sstevel@tonic-gate action == RCTL_LOCAL_DENY) 54907c478bd9Sstevel@tonic-gate return (B_FALSE); 54917c478bd9Sstevel@tonic-gate if ((global_flags & RCTL_GLOBAL_DENY_ALWAYS) && 54927c478bd9Sstevel@tonic-gate action == RCTL_LOCAL_NOACTION) 54937c478bd9Sstevel@tonic-gate return (B_FALSE); 54947c478bd9Sstevel@tonic-gate 54957c478bd9Sstevel@tonic-gate return (B_TRUE); 54967c478bd9Sstevel@tonic-gate } 5497fa9e4066Sahrens 5498cf8f45c7Sdstaff /* 5499cf8f45c7Sdstaff * There is always a race condition between reading the initial copy of 5500cf8f45c7Sdstaff * a zones state and its state changing. We address this by providing 5501cf8f45c7Sdstaff * zonecfg_notify_critical_enter and zonecfg_noticy_critical_exit functions. 5502cf8f45c7Sdstaff * When zonecfg_critical_enter is called, sets the state field to LOCKED 5503cf8f45c7Sdstaff * and aquires biglock. Biglock protects against other threads executing 5504cf8f45c7Sdstaff * critical_enter and the state field protects against state changes during 5505cf8f45c7Sdstaff * the critical period. 5506cf8f45c7Sdstaff * 5507cf8f45c7Sdstaff * If any state changes occur, zn_cb will set the failed field of the znotify 5508cf8f45c7Sdstaff * structure. This will cause the critical_exit function to re-lock the 5509cf8f45c7Sdstaff * channel and return an error. Since evsnts may be delayed, the critical_exit 5510cf8f45c7Sdstaff * function "flushes" the queue by putting an event on the queue and waiting for 5511cf8f45c7Sdstaff * zn_cb to notify critical_exit that it received the ping event. 5512cf8f45c7Sdstaff */ 5513cf8f45c7Sdstaff static const char * 5514cf8f45c7Sdstaff string_get_tok(const char *in, char delim, int num) 5515cf8f45c7Sdstaff { 5516cf8f45c7Sdstaff int i = 0; 5517cf8f45c7Sdstaff 5518cf8f45c7Sdstaff for (; i < num; in++) { 5519cf8f45c7Sdstaff if (*in == delim) 5520cf8f45c7Sdstaff i++; 5521cf8f45c7Sdstaff if (*in == 0) 5522cf8f45c7Sdstaff return (NULL); 5523cf8f45c7Sdstaff } 5524cf8f45c7Sdstaff return (in); 5525cf8f45c7Sdstaff } 5526cf8f45c7Sdstaff 5527cf8f45c7Sdstaff static boolean_t 5528cf8f45c7Sdstaff is_ping(sysevent_t *ev) 5529cf8f45c7Sdstaff { 5530cf8f45c7Sdstaff if (strcmp(sysevent_get_subclass_name(ev), 5531cf8f45c7Sdstaff ZONE_EVENT_PING_SUBCLASS) == 0) { 5532cf8f45c7Sdstaff return (B_TRUE); 5533cf8f45c7Sdstaff } else { 5534cf8f45c7Sdstaff return (B_FALSE); 5535cf8f45c7Sdstaff } 5536cf8f45c7Sdstaff } 5537cf8f45c7Sdstaff 5538cf8f45c7Sdstaff static boolean_t 5539cf8f45c7Sdstaff is_my_ping(sysevent_t *ev) 5540cf8f45c7Sdstaff { 5541cf8f45c7Sdstaff const char *sender; 5542cf8f45c7Sdstaff char mypid[sizeof (pid_t) * 3 + 1]; 5543cf8f45c7Sdstaff 5544cf8f45c7Sdstaff (void) snprintf(mypid, sizeof (mypid), "%i", getpid()); 5545cf8f45c7Sdstaff sender = string_get_tok(sysevent_get_pub(ev), ':', 3); 5546cf8f45c7Sdstaff if (sender == NULL) 5547cf8f45c7Sdstaff return (B_FALSE); 5548cf8f45c7Sdstaff if (strcmp(sender, mypid) != 0) 5549cf8f45c7Sdstaff return (B_FALSE); 5550cf8f45c7Sdstaff return (B_TRUE); 5551cf8f45c7Sdstaff } 5552cf8f45c7Sdstaff 5553cf8f45c7Sdstaff static int 5554cf8f45c7Sdstaff do_callback(struct znotify *zevtchan, sysevent_t *ev) 5555cf8f45c7Sdstaff { 5556cf8f45c7Sdstaff nvlist_t *l; 5557cf8f45c7Sdstaff int zid; 5558cf8f45c7Sdstaff char *zonename; 5559cf8f45c7Sdstaff char *newstate; 5560cf8f45c7Sdstaff char *oldstate; 5561cf8f45c7Sdstaff int ret; 5562cf8f45c7Sdstaff hrtime_t when; 5563cf8f45c7Sdstaff 5564cf8f45c7Sdstaff if (strcmp(sysevent_get_subclass_name(ev), 5565cf8f45c7Sdstaff ZONE_EVENT_STATUS_SUBCLASS) == 0) { 5566cf8f45c7Sdstaff 5567cf8f45c7Sdstaff if (sysevent_get_attr_list(ev, &l) != 0) { 5568cf8f45c7Sdstaff if (errno == ENOMEM) { 5569cf8f45c7Sdstaff zevtchan->zn_failure_count++; 5570cf8f45c7Sdstaff return (EAGAIN); 5571cf8f45c7Sdstaff } 5572cf8f45c7Sdstaff return (0); 5573cf8f45c7Sdstaff } 5574cf8f45c7Sdstaff ret = 0; 5575cf8f45c7Sdstaff 5576cf8f45c7Sdstaff if ((nvlist_lookup_string(l, ZONE_CB_NAME, &zonename) == 0) && 5577cf8f45c7Sdstaff (nvlist_lookup_string(l, ZONE_CB_NEWSTATE, &newstate) 5578cf8f45c7Sdstaff == 0) && 5579cf8f45c7Sdstaff (nvlist_lookup_string(l, ZONE_CB_OLDSTATE, &oldstate) 5580cf8f45c7Sdstaff == 0) && 5581cf8f45c7Sdstaff (nvlist_lookup_uint64(l, ZONE_CB_TIMESTAMP, 5582cf8f45c7Sdstaff (uint64_t *)&when) == 0) && 5583cf8f45c7Sdstaff (nvlist_lookup_int32(l, ZONE_CB_ZONEID, &zid) == 0)) { 5584cf8f45c7Sdstaff ret = zevtchan->zn_callback(zonename, zid, newstate, 5585cf8f45c7Sdstaff oldstate, when, zevtchan->zn_private); 5586cf8f45c7Sdstaff } 5587cf8f45c7Sdstaff 5588cf8f45c7Sdstaff zevtchan->zn_failure_count = 0; 5589cf8f45c7Sdstaff nvlist_free(l); 5590cf8f45c7Sdstaff return (ret); 5591cf8f45c7Sdstaff } else { 5592cf8f45c7Sdstaff /* 5593cf8f45c7Sdstaff * We have received an event in an unknown subclass. Ignore. 5594cf8f45c7Sdstaff */ 5595cf8f45c7Sdstaff zevtchan->zn_failure_count = 0; 5596cf8f45c7Sdstaff return (0); 5597cf8f45c7Sdstaff } 5598cf8f45c7Sdstaff } 5599cf8f45c7Sdstaff 5600cf8f45c7Sdstaff static int 5601cf8f45c7Sdstaff zn_cb(sysevent_t *ev, void *p) 5602cf8f45c7Sdstaff { 5603cf8f45c7Sdstaff struct znotify *zevtchan = p; 5604cf8f45c7Sdstaff int error; 5605cf8f45c7Sdstaff 5606cf8f45c7Sdstaff (void) pthread_mutex_lock(&(zevtchan->zn_mutex)); 5607cf8f45c7Sdstaff 5608cf8f45c7Sdstaff if (is_ping(ev) && !is_my_ping(ev)) { 5609cf8f45c7Sdstaff (void) pthread_mutex_unlock((&zevtchan->zn_mutex)); 5610cf8f45c7Sdstaff return (0); 5611cf8f45c7Sdstaff } 5612cf8f45c7Sdstaff 5613cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_LOCKED) { 5614cf8f45c7Sdstaff assert(!is_ping(ev)); 5615cf8f45c7Sdstaff zevtchan->zn_failed = B_TRUE; 5616cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5617cf8f45c7Sdstaff return (0); 5618cf8f45c7Sdstaff } 5619cf8f45c7Sdstaff 5620cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_PING_INFLIGHT) { 5621cf8f45c7Sdstaff if (is_ping(ev)) { 5622cf8f45c7Sdstaff zevtchan->zn_state = ZN_PING_RECEIVED; 5623cf8f45c7Sdstaff (void) pthread_cond_signal(&(zevtchan->zn_cond)); 5624cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5625cf8f45c7Sdstaff return (0); 5626cf8f45c7Sdstaff } else { 5627cf8f45c7Sdstaff zevtchan->zn_failed = B_TRUE; 5628cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5629cf8f45c7Sdstaff return (0); 5630cf8f45c7Sdstaff } 5631cf8f45c7Sdstaff } 5632cf8f45c7Sdstaff 5633cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_UNLOCKED) { 5634cf8f45c7Sdstaff 5635cf8f45c7Sdstaff error = do_callback(zevtchan, ev); 5636cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5637cf8f45c7Sdstaff /* 5638cf8f45c7Sdstaff * Every ENOMEM failure causes do_callback to increment 5639cf8f45c7Sdstaff * zn_failure_count and every success causes it to 5640cf8f45c7Sdstaff * set zn_failure_count to zero. If we got EAGAIN, 5641cf8f45c7Sdstaff * we will sleep for zn_failure_count seconds and return 5642cf8f45c7Sdstaff * EAGAIN to gpec to try again. 5643cf8f45c7Sdstaff * 5644cf8f45c7Sdstaff * After 55 seconds, or 10 try's we give up and drop the 5645cf8f45c7Sdstaff * event. 5646cf8f45c7Sdstaff */ 5647cf8f45c7Sdstaff if (error == EAGAIN) { 5648cf8f45c7Sdstaff if (zevtchan->zn_failure_count > ZONE_CB_RETRY_COUNT) { 5649cf8f45c7Sdstaff return (0); 5650cf8f45c7Sdstaff } 5651cf8f45c7Sdstaff (void) sleep(zevtchan->zn_failure_count); 5652cf8f45c7Sdstaff } 5653cf8f45c7Sdstaff return (error); 5654cf8f45c7Sdstaff } 5655cf8f45c7Sdstaff 5656cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_PING_RECEIVED) { 5657cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5658cf8f45c7Sdstaff return (0); 5659cf8f45c7Sdstaff } 5660cf8f45c7Sdstaff 5661cf8f45c7Sdstaff abort(); 5662cf8f45c7Sdstaff return (0); 5663cf8f45c7Sdstaff } 5664cf8f45c7Sdstaff 5665cf8f45c7Sdstaff void 5666cf8f45c7Sdstaff zonecfg_notify_critical_enter(void *h) 5667cf8f45c7Sdstaff { 5668cf8f45c7Sdstaff struct znotify *zevtchan = h; 5669cf8f45c7Sdstaff 5670cf8f45c7Sdstaff (void) pthread_mutex_lock(&(zevtchan->zn_bigmutex)); 5671cf8f45c7Sdstaff zevtchan->zn_state = ZN_LOCKED; 5672cf8f45c7Sdstaff } 5673cf8f45c7Sdstaff 5674cf8f45c7Sdstaff int 5675cf8f45c7Sdstaff zonecfg_notify_critical_exit(void * h) 5676cf8f45c7Sdstaff { 5677cf8f45c7Sdstaff 5678cf8f45c7Sdstaff struct znotify *zevtchan = h; 5679cf8f45c7Sdstaff 5680cf8f45c7Sdstaff if (zevtchan->zn_state == ZN_UNLOCKED) 5681cf8f45c7Sdstaff return (0); 5682cf8f45c7Sdstaff 5683cf8f45c7Sdstaff (void) pthread_mutex_lock(&(zevtchan->zn_mutex)); 5684cf8f45c7Sdstaff zevtchan->zn_state = ZN_PING_INFLIGHT; 5685cf8f45c7Sdstaff 5686ee519a1fSgjelinek (void) sysevent_evc_publish(zevtchan->zn_eventchan, 5687ee519a1fSgjelinek ZONE_EVENT_STATUS_CLASS, 5688cf8f45c7Sdstaff ZONE_EVENT_PING_SUBCLASS, ZONE_EVENT_PING_PUBLISHER, 5689cf8f45c7Sdstaff zevtchan->zn_subscriber_id, NULL, EVCH_SLEEP); 5690cf8f45c7Sdstaff 5691cf8f45c7Sdstaff while (zevtchan->zn_state != ZN_PING_RECEIVED) { 5692cf8f45c7Sdstaff (void) pthread_cond_wait(&(zevtchan->zn_cond), 5693cf8f45c7Sdstaff &(zevtchan->zn_mutex)); 5694cf8f45c7Sdstaff } 5695cf8f45c7Sdstaff 5696cf8f45c7Sdstaff if (zevtchan->zn_failed == B_TRUE) { 5697cf8f45c7Sdstaff zevtchan->zn_state = ZN_LOCKED; 5698cf8f45c7Sdstaff zevtchan->zn_failed = B_FALSE; 5699cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5700cf8f45c7Sdstaff return (1); 5701cf8f45c7Sdstaff } 5702cf8f45c7Sdstaff 5703cf8f45c7Sdstaff zevtchan->zn_state = ZN_UNLOCKED; 5704cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_mutex)); 5705cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_bigmutex)); 5706cf8f45c7Sdstaff return (0); 5707cf8f45c7Sdstaff } 5708cf8f45c7Sdstaff 5709cf8f45c7Sdstaff void 5710cf8f45c7Sdstaff zonecfg_notify_critical_abort(void *h) 5711cf8f45c7Sdstaff { 5712cf8f45c7Sdstaff struct znotify *zevtchan = h; 5713cf8f45c7Sdstaff 5714cf8f45c7Sdstaff zevtchan->zn_state = ZN_UNLOCKED; 5715cf8f45c7Sdstaff zevtchan->zn_failed = B_FALSE; 5716cf8f45c7Sdstaff /* 5717cf8f45c7Sdstaff * Don't do anything about zn_lock. If it is held, it could only be 5718cf8f45c7Sdstaff * held by zn_cb and it will be unlocked soon. 5719cf8f45c7Sdstaff */ 5720cf8f45c7Sdstaff (void) pthread_mutex_unlock(&(zevtchan->zn_bigmutex)); 5721cf8f45c7Sdstaff } 5722cf8f45c7Sdstaff 5723cf8f45c7Sdstaff void * 5724cf8f45c7Sdstaff zonecfg_notify_bind(int(*func)(const char *zonename, zoneid_t zid, 5725cf8f45c7Sdstaff const char *newstate, const char *oldstate, hrtime_t when, void *p), 5726cf8f45c7Sdstaff void *p) 5727cf8f45c7Sdstaff { 5728cf8f45c7Sdstaff struct znotify *zevtchan; 5729cf8f45c7Sdstaff int i = 1; 5730cf8f45c7Sdstaff int r; 5731cf8f45c7Sdstaff 5732cf8f45c7Sdstaff zevtchan = malloc(sizeof (struct znotify)); 5733cf8f45c7Sdstaff 5734cf8f45c7Sdstaff if (zevtchan == NULL) 5735cf8f45c7Sdstaff return (NULL); 5736cf8f45c7Sdstaff 5737cf8f45c7Sdstaff zevtchan->zn_private = p; 5738cf8f45c7Sdstaff zevtchan->zn_callback = func; 5739cf8f45c7Sdstaff zevtchan->zn_state = ZN_UNLOCKED; 5740cf8f45c7Sdstaff zevtchan->zn_failed = B_FALSE; 5741cf8f45c7Sdstaff 5742cf8f45c7Sdstaff if (pthread_mutex_init(&(zevtchan->zn_mutex), NULL)) 57439d4be64eSdstaff goto out3; 5744cf8f45c7Sdstaff if (pthread_cond_init(&(zevtchan->zn_cond), NULL)) { 5745cf8f45c7Sdstaff (void) pthread_mutex_destroy(&(zevtchan->zn_mutex)); 57469d4be64eSdstaff goto out3; 5747cf8f45c7Sdstaff } 5748cf8f45c7Sdstaff if (pthread_mutex_init(&(zevtchan->zn_bigmutex), NULL)) { 5749cf8f45c7Sdstaff (void) pthread_mutex_destroy(&(zevtchan->zn_mutex)); 5750cf8f45c7Sdstaff (void) pthread_cond_destroy(&(zevtchan->zn_cond)); 57519d4be64eSdstaff goto out3; 5752cf8f45c7Sdstaff } 5753cf8f45c7Sdstaff 5754cf8f45c7Sdstaff if (sysevent_evc_bind(ZONE_EVENT_CHANNEL, &(zevtchan->zn_eventchan), 5755cf8f45c7Sdstaff 0) != 0) 5756cf8f45c7Sdstaff goto out2; 5757cf8f45c7Sdstaff 5758cf8f45c7Sdstaff do { 5759cf8f45c7Sdstaff /* 5760cf8f45c7Sdstaff * At 4 digits the subscriber ID gets too long and we have 5761cf8f45c7Sdstaff * no chance of successfully registering. 5762cf8f45c7Sdstaff */ 5763cf8f45c7Sdstaff if (i > 999) 57649d4be64eSdstaff goto out1; 5765cf8f45c7Sdstaff 5766cf8f45c7Sdstaff (void) sprintf(zevtchan->zn_subscriber_id, "zone_%li_%i", 5767cf8f45c7Sdstaff getpid() % 999999l, i); 5768cf8f45c7Sdstaff 5769cf8f45c7Sdstaff r = sysevent_evc_subscribe(zevtchan->zn_eventchan, 5770cf8f45c7Sdstaff zevtchan->zn_subscriber_id, ZONE_EVENT_STATUS_CLASS, zn_cb, 5771cf8f45c7Sdstaff zevtchan, 0); 5772cf8f45c7Sdstaff 5773cf8f45c7Sdstaff i++; 5774cf8f45c7Sdstaff 5775cf8f45c7Sdstaff } while (r); 5776cf8f45c7Sdstaff 5777cf8f45c7Sdstaff return (zevtchan); 57789d4be64eSdstaff out1: 5779cf8f45c7Sdstaff sysevent_evc_unbind(zevtchan->zn_eventchan); 57809d4be64eSdstaff out2: 5781cf8f45c7Sdstaff (void) pthread_mutex_destroy(&zevtchan->zn_mutex); 5782cf8f45c7Sdstaff (void) pthread_cond_destroy(&zevtchan->zn_cond); 5783cf8f45c7Sdstaff (void) pthread_mutex_destroy(&(zevtchan->zn_bigmutex)); 57849d4be64eSdstaff out3: 5785cf8f45c7Sdstaff free(zevtchan); 5786cf8f45c7Sdstaff 5787cf8f45c7Sdstaff return (NULL); 5788cf8f45c7Sdstaff } 5789cf8f45c7Sdstaff 5790cf8f45c7Sdstaff void 5791cf8f45c7Sdstaff zonecfg_notify_unbind(void *handle) 5792cf8f45c7Sdstaff { 5793cf8f45c7Sdstaff 5794cf8f45c7Sdstaff int ret; 5795cf8f45c7Sdstaff 5796cf8f45c7Sdstaff sysevent_evc_unbind(((struct znotify *)handle)->zn_eventchan); 5797cf8f45c7Sdstaff /* 5798cf8f45c7Sdstaff * Check that all evc threads have gone away. This should be 5799cf8f45c7Sdstaff * enforced by sysevent_evc_unbind. 5800cf8f45c7Sdstaff */ 5801cf8f45c7Sdstaff ret = pthread_mutex_trylock(&((struct znotify *)handle)->zn_mutex); 5802cf8f45c7Sdstaff 5803cf8f45c7Sdstaff if (ret) 5804cf8f45c7Sdstaff abort(); 5805cf8f45c7Sdstaff 5806cf8f45c7Sdstaff (void) pthread_mutex_unlock(&((struct znotify *)handle)->zn_mutex); 5807cf8f45c7Sdstaff (void) pthread_mutex_destroy(&((struct znotify *)handle)->zn_mutex); 5808cf8f45c7Sdstaff (void) pthread_cond_destroy(&((struct znotify *)handle)->zn_cond); 5809cf8f45c7Sdstaff (void) pthread_mutex_destroy(&((struct znotify *)handle)->zn_bigmutex); 5810cf8f45c7Sdstaff 5811cf8f45c7Sdstaff free(handle); 5812cf8f45c7Sdstaff } 5813cf8f45c7Sdstaff 5814fa9e4066Sahrens static int 5815fa9e4066Sahrens zonecfg_add_ds_core(zone_dochandle_t handle, struct zone_dstab *tabptr) 5816fa9e4066Sahrens { 5817fa9e4066Sahrens xmlNodePtr newnode, cur = handle->zone_dh_cur; 5818fa9e4066Sahrens int err; 5819fa9e4066Sahrens 5820fa9e4066Sahrens newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DATASET, NULL); 5821fa9e4066Sahrens if ((err = newprop(newnode, DTD_ATTR_NAME, 5822fa9e4066Sahrens tabptr->zone_dataset_name)) != Z_OK) 5823fa9e4066Sahrens return (err); 5824fa9e4066Sahrens return (Z_OK); 5825fa9e4066Sahrens } 5826fa9e4066Sahrens 5827fa9e4066Sahrens int 5828fa9e4066Sahrens zonecfg_add_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 5829fa9e4066Sahrens { 5830fa9e4066Sahrens int err; 5831fa9e4066Sahrens 5832fa9e4066Sahrens if (tabptr == NULL) 5833fa9e4066Sahrens return (Z_INVAL); 5834fa9e4066Sahrens 5835fa9e4066Sahrens if ((err = operation_prep(handle)) != Z_OK) 5836fa9e4066Sahrens return (err); 5837fa9e4066Sahrens 5838fa9e4066Sahrens if ((err = zonecfg_add_ds_core(handle, tabptr)) != Z_OK) 5839fa9e4066Sahrens return (err); 5840fa9e4066Sahrens 5841fa9e4066Sahrens return (Z_OK); 5842fa9e4066Sahrens } 5843fa9e4066Sahrens 5844fa9e4066Sahrens static int 5845fa9e4066Sahrens zonecfg_delete_ds_core(zone_dochandle_t handle, struct zone_dstab *tabptr) 5846fa9e4066Sahrens { 5847fa9e4066Sahrens xmlNodePtr cur = handle->zone_dh_cur; 5848fa9e4066Sahrens 5849fa9e4066Sahrens for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 5850fa9e4066Sahrens if (xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 5851fa9e4066Sahrens continue; 5852fa9e4066Sahrens 5853fa9e4066Sahrens if (match_prop(cur, DTD_ATTR_NAME, 5854fa9e4066Sahrens tabptr->zone_dataset_name)) { 5855fa9e4066Sahrens xmlUnlinkNode(cur); 5856fa9e4066Sahrens xmlFreeNode(cur); 5857fa9e4066Sahrens return (Z_OK); 5858fa9e4066Sahrens } 5859fa9e4066Sahrens } 5860fa9e4066Sahrens return (Z_NO_RESOURCE_ID); 5861fa9e4066Sahrens } 5862fa9e4066Sahrens 5863fa9e4066Sahrens int 5864fa9e4066Sahrens zonecfg_delete_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 5865fa9e4066Sahrens { 5866fa9e4066Sahrens int err; 5867fa9e4066Sahrens 5868fa9e4066Sahrens if (tabptr == NULL) 5869fa9e4066Sahrens return (Z_INVAL); 5870fa9e4066Sahrens 5871fa9e4066Sahrens if ((err = operation_prep(handle)) != Z_OK) 5872fa9e4066Sahrens return (err); 5873fa9e4066Sahrens 5874fa9e4066Sahrens if ((err = zonecfg_delete_ds_core(handle, tabptr)) != Z_OK) 5875fa9e4066Sahrens return (err); 5876fa9e4066Sahrens 5877fa9e4066Sahrens return (Z_OK); 5878fa9e4066Sahrens } 5879fa9e4066Sahrens 5880fa9e4066Sahrens int 5881fa9e4066Sahrens zonecfg_modify_ds( 5882fa9e4066Sahrens zone_dochandle_t handle, 5883fa9e4066Sahrens struct zone_dstab *oldtabptr, 5884fa9e4066Sahrens struct zone_dstab *newtabptr) 5885fa9e4066Sahrens { 5886fa9e4066Sahrens int err; 5887fa9e4066Sahrens 5888fa9e4066Sahrens if (oldtabptr == NULL || newtabptr == NULL) 5889fa9e4066Sahrens return (Z_INVAL); 5890fa9e4066Sahrens 5891fa9e4066Sahrens if ((err = operation_prep(handle)) != Z_OK) 5892fa9e4066Sahrens return (err); 5893fa9e4066Sahrens 5894fa9e4066Sahrens if ((err = zonecfg_delete_ds_core(handle, oldtabptr)) != Z_OK) 5895fa9e4066Sahrens return (err); 5896fa9e4066Sahrens 5897fa9e4066Sahrens if ((err = zonecfg_add_ds_core(handle, newtabptr)) != Z_OK) 5898fa9e4066Sahrens return (err); 5899fa9e4066Sahrens 5900fa9e4066Sahrens return (Z_OK); 5901fa9e4066Sahrens } 5902fa9e4066Sahrens 5903fa9e4066Sahrens int 5904fa9e4066Sahrens zonecfg_lookup_ds(zone_dochandle_t handle, struct zone_dstab *tabptr) 5905fa9e4066Sahrens { 5906fa9e4066Sahrens xmlNodePtr cur, firstmatch; 5907fa9e4066Sahrens int err; 5908fa9e4066Sahrens char dataset[MAXNAMELEN]; 5909fa9e4066Sahrens 5910fa9e4066Sahrens if (tabptr == NULL) 5911fa9e4066Sahrens return (Z_INVAL); 5912fa9e4066Sahrens 5913fa9e4066Sahrens if ((err = operation_prep(handle)) != Z_OK) 5914fa9e4066Sahrens return (err); 5915fa9e4066Sahrens 5916fa9e4066Sahrens cur = handle->zone_dh_cur; 5917fa9e4066Sahrens firstmatch = NULL; 5918fa9e4066Sahrens for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 5919fa9e4066Sahrens if (xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 5920fa9e4066Sahrens continue; 5921fa9e4066Sahrens if (strlen(tabptr->zone_dataset_name) > 0) { 5922fa9e4066Sahrens if ((fetchprop(cur, DTD_ATTR_NAME, dataset, 5923fa9e4066Sahrens sizeof (dataset)) == Z_OK) && 5924fa9e4066Sahrens (strcmp(tabptr->zone_dataset_name, 5925fa9e4066Sahrens dataset) == 0)) { 5926fa9e4066Sahrens if (firstmatch == NULL) 5927fa9e4066Sahrens firstmatch = cur; 5928fa9e4066Sahrens else 5929fa9e4066Sahrens return (Z_INSUFFICIENT_SPEC); 5930fa9e4066Sahrens } 5931fa9e4066Sahrens } 5932fa9e4066Sahrens } 5933fa9e4066Sahrens if (firstmatch == NULL) 5934fa9e4066Sahrens return (Z_NO_RESOURCE_ID); 5935fa9e4066Sahrens 5936fa9e4066Sahrens cur = firstmatch; 5937fa9e4066Sahrens 5938fa9e4066Sahrens if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_dataset_name, 5939fa9e4066Sahrens sizeof (tabptr->zone_dataset_name))) != Z_OK) 5940fa9e4066Sahrens return (err); 5941fa9e4066Sahrens 5942fa9e4066Sahrens return (Z_OK); 5943fa9e4066Sahrens } 5944fa9e4066Sahrens 5945fa9e4066Sahrens int 5946fa9e4066Sahrens zonecfg_setdsent(zone_dochandle_t handle) 5947fa9e4066Sahrens { 5948fa9e4066Sahrens return (zonecfg_setent(handle)); 5949fa9e4066Sahrens } 5950fa9e4066Sahrens 5951fa9e4066Sahrens int 5952fa9e4066Sahrens zonecfg_getdsent(zone_dochandle_t handle, struct zone_dstab *tabptr) 5953fa9e4066Sahrens { 5954fa9e4066Sahrens xmlNodePtr cur; 5955fa9e4066Sahrens int err; 5956fa9e4066Sahrens 5957fa9e4066Sahrens if (handle == NULL) 5958fa9e4066Sahrens return (Z_INVAL); 5959fa9e4066Sahrens 5960fa9e4066Sahrens if ((cur = handle->zone_dh_cur) == NULL) 5961fa9e4066Sahrens return (Z_NO_ENTRY); 5962fa9e4066Sahrens 5963fa9e4066Sahrens for (; cur != NULL; cur = cur->next) 5964fa9e4066Sahrens if (!xmlStrcmp(cur->name, DTD_ELEM_DATASET)) 5965fa9e4066Sahrens break; 5966fa9e4066Sahrens if (cur == NULL) { 5967fa9e4066Sahrens handle->zone_dh_cur = handle->zone_dh_top; 5968fa9e4066Sahrens return (Z_NO_ENTRY); 5969fa9e4066Sahrens } 5970fa9e4066Sahrens 5971fa9e4066Sahrens if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_dataset_name, 5972fa9e4066Sahrens sizeof (tabptr->zone_dataset_name))) != Z_OK) { 5973fa9e4066Sahrens handle->zone_dh_cur = handle->zone_dh_top; 5974fa9e4066Sahrens return (err); 5975fa9e4066Sahrens } 5976fa9e4066Sahrens 5977fa9e4066Sahrens handle->zone_dh_cur = cur->next; 5978fa9e4066Sahrens return (Z_OK); 5979fa9e4066Sahrens } 5980fa9e4066Sahrens 5981fa9e4066Sahrens int 5982fa9e4066Sahrens zonecfg_enddsent(zone_dochandle_t handle) 5983fa9e4066Sahrens { 5984fa9e4066Sahrens return (zonecfg_endent(handle)); 5985fa9e4066Sahrens } 5986ee519a1fSgjelinek 59870209230bSgjelinek /* 59880209230bSgjelinek * Support for aliased rctls; that is, rctls that have simplified names in 59890209230bSgjelinek * zonecfg. For example, max-lwps is an alias for a well defined zone.max-lwps 59900209230bSgjelinek * rctl. If there are multiple existing values for one of these rctls or if 59910209230bSgjelinek * there is a single value that does not match the well defined template (i.e. 59920209230bSgjelinek * it has a different action) then we cannot treat the rctl as having an alias 59930209230bSgjelinek * so we return Z_ALIAS_DISALLOW. That means that the rctl cannot be 59940209230bSgjelinek * managed in zonecfg via an alias and that the standard rctl syntax must be 59950209230bSgjelinek * used. 59960209230bSgjelinek * 59970209230bSgjelinek * The possible return values are: 59980209230bSgjelinek * Z_NO_PROPERTY_ID - invalid alias name 59990209230bSgjelinek * Z_ALIAS_DISALLOW - pre-existing, incompatible rctl definition 60000209230bSgjelinek * Z_NO_ENTRY - no rctl is configured for this alias 60010209230bSgjelinek * Z_OK - we got a valid rctl for the specified alias 60020209230bSgjelinek */ 60030209230bSgjelinek int 60040209230bSgjelinek zonecfg_get_aliased_rctl(zone_dochandle_t handle, char *name, uint64_t *rval) 60050209230bSgjelinek { 60060209230bSgjelinek boolean_t found = B_FALSE; 60070209230bSgjelinek boolean_t found_val = B_FALSE; 60080209230bSgjelinek xmlNodePtr cur, val; 60090209230bSgjelinek char savedname[MAXNAMELEN]; 60100209230bSgjelinek struct zone_rctlvaltab rctl; 60110209230bSgjelinek int i; 60120209230bSgjelinek int err; 60130209230bSgjelinek 60140209230bSgjelinek for (i = 0; aliases[i].shortname != NULL; i++) 60150209230bSgjelinek if (strcmp(name, aliases[i].shortname) == 0) 60160209230bSgjelinek break; 60170209230bSgjelinek 60180209230bSgjelinek if (aliases[i].shortname == NULL) 60190209230bSgjelinek return (Z_NO_PROPERTY_ID); 60200209230bSgjelinek 60210209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 60220209230bSgjelinek return (err); 60230209230bSgjelinek 60240209230bSgjelinek cur = handle->zone_dh_cur; 60250209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 60260209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_RCTL) != 0) 60270209230bSgjelinek continue; 60280209230bSgjelinek if ((fetchprop(cur, DTD_ATTR_NAME, savedname, 60290209230bSgjelinek sizeof (savedname)) == Z_OK) && 60300209230bSgjelinek (strcmp(savedname, aliases[i].realname) == 0)) { 60310209230bSgjelinek 60320209230bSgjelinek /* 60330209230bSgjelinek * If we already saw one of these, we can't have an 60340209230bSgjelinek * alias since we just found another. 60350209230bSgjelinek */ 60360209230bSgjelinek if (found) 60370209230bSgjelinek return (Z_ALIAS_DISALLOW); 60380209230bSgjelinek found = B_TRUE; 60390209230bSgjelinek 60400209230bSgjelinek for (val = cur->xmlChildrenNode; val != NULL; 60410209230bSgjelinek val = val->next) { 60420209230bSgjelinek /* 60430209230bSgjelinek * If we already have one value, we can't have 60440209230bSgjelinek * an alias since we just found another. 60450209230bSgjelinek */ 60460209230bSgjelinek if (found_val) 60470209230bSgjelinek return (Z_ALIAS_DISALLOW); 60480209230bSgjelinek found_val = B_TRUE; 60490209230bSgjelinek 60500209230bSgjelinek if ((fetchprop(val, DTD_ATTR_PRIV, 60510209230bSgjelinek rctl.zone_rctlval_priv, 60520209230bSgjelinek sizeof (rctl.zone_rctlval_priv)) != Z_OK)) 60530209230bSgjelinek break; 60540209230bSgjelinek if ((fetchprop(val, DTD_ATTR_LIMIT, 60550209230bSgjelinek rctl.zone_rctlval_limit, 60560209230bSgjelinek sizeof (rctl.zone_rctlval_limit)) != Z_OK)) 60570209230bSgjelinek break; 60580209230bSgjelinek if ((fetchprop(val, DTD_ATTR_ACTION, 60590209230bSgjelinek rctl.zone_rctlval_action, 60600209230bSgjelinek sizeof (rctl.zone_rctlval_action)) != Z_OK)) 60610209230bSgjelinek break; 60620209230bSgjelinek } 60630209230bSgjelinek 60640209230bSgjelinek /* check priv and action match the expected vals */ 60650209230bSgjelinek if (strcmp(rctl.zone_rctlval_priv, 60660209230bSgjelinek aliases[i].priv) != 0 || 60670209230bSgjelinek strcmp(rctl.zone_rctlval_action, 60680209230bSgjelinek aliases[i].action) != 0) 60690209230bSgjelinek return (Z_ALIAS_DISALLOW); 60700209230bSgjelinek } 60710209230bSgjelinek } 60720209230bSgjelinek 60730209230bSgjelinek if (found) { 60740209230bSgjelinek *rval = strtoull(rctl.zone_rctlval_limit, NULL, 10); 60750209230bSgjelinek return (Z_OK); 60760209230bSgjelinek } 60770209230bSgjelinek 60780209230bSgjelinek return (Z_NO_ENTRY); 60790209230bSgjelinek } 60800209230bSgjelinek 60810209230bSgjelinek int 60820209230bSgjelinek zonecfg_rm_aliased_rctl(zone_dochandle_t handle, char *name) 60830209230bSgjelinek { 60840209230bSgjelinek int i; 60850209230bSgjelinek uint64_t val; 60860209230bSgjelinek struct zone_rctltab rctltab; 60870209230bSgjelinek 60880209230bSgjelinek /* 60890209230bSgjelinek * First check that we have a valid aliased rctl to remove. 60900209230bSgjelinek * This will catch an rctl entry with non-standard values or 60910209230bSgjelinek * multiple rctl values for this name. We need to ignore those 60920209230bSgjelinek * rctl entries. 60930209230bSgjelinek */ 60940209230bSgjelinek if (zonecfg_get_aliased_rctl(handle, name, &val) != Z_OK) 60950209230bSgjelinek return (Z_OK); 60960209230bSgjelinek 60970209230bSgjelinek for (i = 0; aliases[i].shortname != NULL; i++) 60980209230bSgjelinek if (strcmp(name, aliases[i].shortname) == 0) 60990209230bSgjelinek break; 61000209230bSgjelinek 61010209230bSgjelinek if (aliases[i].shortname == NULL) 61020209230bSgjelinek return (Z_NO_RESOURCE_ID); 61030209230bSgjelinek 61040209230bSgjelinek (void) strlcpy(rctltab.zone_rctl_name, aliases[i].realname, 61050209230bSgjelinek sizeof (rctltab.zone_rctl_name)); 61060209230bSgjelinek 61070209230bSgjelinek return (zonecfg_delete_rctl(handle, &rctltab)); 61080209230bSgjelinek } 61090209230bSgjelinek 61100209230bSgjelinek boolean_t 61110209230bSgjelinek zonecfg_aliased_rctl_ok(zone_dochandle_t handle, char *name) 61120209230bSgjelinek { 61130209230bSgjelinek uint64_t tmp_val; 61140209230bSgjelinek 61150209230bSgjelinek switch (zonecfg_get_aliased_rctl(handle, name, &tmp_val)) { 61160209230bSgjelinek case Z_OK: 61170209230bSgjelinek /*FALLTHRU*/ 61180209230bSgjelinek case Z_NO_ENTRY: 61190209230bSgjelinek return (B_TRUE); 61200209230bSgjelinek default: 61210209230bSgjelinek return (B_FALSE); 61220209230bSgjelinek } 61230209230bSgjelinek } 61240209230bSgjelinek 61250209230bSgjelinek int 61260209230bSgjelinek zonecfg_set_aliased_rctl(zone_dochandle_t handle, char *name, uint64_t val) 61270209230bSgjelinek { 61280209230bSgjelinek int i; 61290209230bSgjelinek int err; 61300209230bSgjelinek struct zone_rctltab rctltab; 61310209230bSgjelinek struct zone_rctlvaltab *rctlvaltab; 61320209230bSgjelinek char buf[128]; 61330209230bSgjelinek 61340209230bSgjelinek if (!zonecfg_aliased_rctl_ok(handle, name)) 61350209230bSgjelinek return (Z_ALIAS_DISALLOW); 61360209230bSgjelinek 61370209230bSgjelinek for (i = 0; aliases[i].shortname != NULL; i++) 61380209230bSgjelinek if (strcmp(name, aliases[i].shortname) == 0) 61390209230bSgjelinek break; 61400209230bSgjelinek 61410209230bSgjelinek if (aliases[i].shortname == NULL) 61420209230bSgjelinek return (Z_NO_RESOURCE_ID); 61430209230bSgjelinek 61440209230bSgjelinek /* remove any pre-existing definition for this rctl */ 61450209230bSgjelinek (void) zonecfg_rm_aliased_rctl(handle, name); 61460209230bSgjelinek 61470209230bSgjelinek (void) strlcpy(rctltab.zone_rctl_name, aliases[i].realname, 61480209230bSgjelinek sizeof (rctltab.zone_rctl_name)); 61490209230bSgjelinek 61500209230bSgjelinek rctltab.zone_rctl_valptr = NULL; 61510209230bSgjelinek 61520209230bSgjelinek if ((rctlvaltab = calloc(1, sizeof (struct zone_rctlvaltab))) == NULL) 61530209230bSgjelinek return (Z_NOMEM); 61540209230bSgjelinek 61550209230bSgjelinek (void) snprintf(buf, sizeof (buf), "%llu", (long long)val); 61560209230bSgjelinek 61570209230bSgjelinek (void) strlcpy(rctlvaltab->zone_rctlval_priv, aliases[i].priv, 61580209230bSgjelinek sizeof (rctlvaltab->zone_rctlval_priv)); 61590209230bSgjelinek (void) strlcpy(rctlvaltab->zone_rctlval_limit, buf, 61600209230bSgjelinek sizeof (rctlvaltab->zone_rctlval_limit)); 61610209230bSgjelinek (void) strlcpy(rctlvaltab->zone_rctlval_action, aliases[i].action, 61620209230bSgjelinek sizeof (rctlvaltab->zone_rctlval_action)); 61630209230bSgjelinek 61640209230bSgjelinek rctlvaltab->zone_rctlval_next = NULL; 61650209230bSgjelinek 61660209230bSgjelinek if ((err = zonecfg_add_rctl_value(&rctltab, rctlvaltab)) != Z_OK) 61670209230bSgjelinek return (err); 61680209230bSgjelinek 61690209230bSgjelinek return (zonecfg_add_rctl(handle, &rctltab)); 61700209230bSgjelinek } 61710209230bSgjelinek 61720209230bSgjelinek static int 61730209230bSgjelinek delete_tmp_pool(zone_dochandle_t handle) 61740209230bSgjelinek { 61750209230bSgjelinek int err; 61760209230bSgjelinek xmlNodePtr cur = handle->zone_dh_cur; 61770209230bSgjelinek 61780209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 61790209230bSgjelinek return (err); 61800209230bSgjelinek 61810209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 61820209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_TMPPOOL) == 0) { 61830209230bSgjelinek xmlUnlinkNode(cur); 61840209230bSgjelinek xmlFreeNode(cur); 61850209230bSgjelinek return (Z_OK); 61860209230bSgjelinek } 61870209230bSgjelinek } 61880209230bSgjelinek 61890209230bSgjelinek return (Z_NO_RESOURCE_ID); 61900209230bSgjelinek } 61910209230bSgjelinek 61920209230bSgjelinek static int 61930209230bSgjelinek modify_tmp_pool(zone_dochandle_t handle, char *pool_importance) 61940209230bSgjelinek { 61950209230bSgjelinek int err; 61960209230bSgjelinek xmlNodePtr cur = handle->zone_dh_cur; 61970209230bSgjelinek xmlNodePtr newnode; 61980209230bSgjelinek 61990209230bSgjelinek err = delete_tmp_pool(handle); 62000209230bSgjelinek if (err != Z_OK && err != Z_NO_RESOURCE_ID) 62010209230bSgjelinek return (err); 62020209230bSgjelinek 62030209230bSgjelinek if (*pool_importance != '\0') { 62040209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 62050209230bSgjelinek return (err); 62060209230bSgjelinek 62070209230bSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_TMPPOOL, NULL); 62080209230bSgjelinek if ((err = newprop(newnode, DTD_ATTR_IMPORTANCE, 62090209230bSgjelinek pool_importance)) != Z_OK) 62100209230bSgjelinek return (err); 62110209230bSgjelinek } 62120209230bSgjelinek 62130209230bSgjelinek return (Z_OK); 62140209230bSgjelinek } 62150209230bSgjelinek 62160209230bSgjelinek static int 62170209230bSgjelinek add_pset_core(zone_dochandle_t handle, struct zone_psettab *tabptr) 62180209230bSgjelinek { 62190209230bSgjelinek xmlNodePtr newnode, cur = handle->zone_dh_cur; 62200209230bSgjelinek int err; 62210209230bSgjelinek 62220209230bSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_PSET, NULL); 62230209230bSgjelinek if ((err = newprop(newnode, DTD_ATTR_NCPU_MIN, 62240209230bSgjelinek tabptr->zone_ncpu_min)) != Z_OK) 62250209230bSgjelinek return (err); 62260209230bSgjelinek if ((err = newprop(newnode, DTD_ATTR_NCPU_MAX, 62270209230bSgjelinek tabptr->zone_ncpu_max)) != Z_OK) 62280209230bSgjelinek return (err); 62290209230bSgjelinek 62300209230bSgjelinek if ((err = modify_tmp_pool(handle, tabptr->zone_importance)) != Z_OK) 62310209230bSgjelinek return (err); 62320209230bSgjelinek 62330209230bSgjelinek return (Z_OK); 62340209230bSgjelinek } 62350209230bSgjelinek 62360209230bSgjelinek int 62370209230bSgjelinek zonecfg_add_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 62380209230bSgjelinek { 62390209230bSgjelinek int err; 62400209230bSgjelinek 62410209230bSgjelinek if (tabptr == NULL) 62420209230bSgjelinek return (Z_INVAL); 62430209230bSgjelinek 62440209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 62450209230bSgjelinek return (err); 62460209230bSgjelinek 62470209230bSgjelinek if ((err = add_pset_core(handle, tabptr)) != Z_OK) 62480209230bSgjelinek return (err); 62490209230bSgjelinek 62500209230bSgjelinek return (Z_OK); 62510209230bSgjelinek } 62520209230bSgjelinek 62530209230bSgjelinek int 62540209230bSgjelinek zonecfg_delete_pset(zone_dochandle_t handle) 62550209230bSgjelinek { 62560209230bSgjelinek int err; 62570209230bSgjelinek int res = Z_NO_RESOURCE_ID; 62580209230bSgjelinek xmlNodePtr cur = handle->zone_dh_cur; 62590209230bSgjelinek 62600209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 62610209230bSgjelinek return (err); 62620209230bSgjelinek 62630209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 62640209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_PSET) == 0) { 62650209230bSgjelinek xmlUnlinkNode(cur); 62660209230bSgjelinek xmlFreeNode(cur); 62670209230bSgjelinek res = Z_OK; 62680209230bSgjelinek break; 62690209230bSgjelinek } 62700209230bSgjelinek } 62710209230bSgjelinek 62720209230bSgjelinek /* 62730209230bSgjelinek * Once we have msets, we should check that a mset 62740209230bSgjelinek * do not exist before we delete the tmp_pool data. 62750209230bSgjelinek */ 62760209230bSgjelinek err = delete_tmp_pool(handle); 62770209230bSgjelinek if (err != Z_OK && err != Z_NO_RESOURCE_ID) 62780209230bSgjelinek return (err); 62790209230bSgjelinek 62800209230bSgjelinek return (res); 62810209230bSgjelinek } 62820209230bSgjelinek 62830209230bSgjelinek int 62840209230bSgjelinek zonecfg_modify_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 62850209230bSgjelinek { 62860209230bSgjelinek int err; 62870209230bSgjelinek 62880209230bSgjelinek if (tabptr == NULL) 62890209230bSgjelinek return (Z_INVAL); 62900209230bSgjelinek 62910209230bSgjelinek if ((err = zonecfg_delete_pset(handle)) != Z_OK) 62920209230bSgjelinek return (err); 62930209230bSgjelinek 62940209230bSgjelinek if ((err = add_pset_core(handle, tabptr)) != Z_OK) 62950209230bSgjelinek return (err); 62960209230bSgjelinek 62970209230bSgjelinek return (Z_OK); 62980209230bSgjelinek } 62990209230bSgjelinek 63000209230bSgjelinek int 63010209230bSgjelinek zonecfg_lookup_pset(zone_dochandle_t handle, struct zone_psettab *tabptr) 63020209230bSgjelinek { 63030209230bSgjelinek xmlNodePtr cur; 63040209230bSgjelinek int err; 63050209230bSgjelinek int res = Z_NO_ENTRY; 63060209230bSgjelinek 63070209230bSgjelinek if (tabptr == NULL) 63080209230bSgjelinek return (Z_INVAL); 63090209230bSgjelinek 63100209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 63110209230bSgjelinek return (err); 63120209230bSgjelinek 63130209230bSgjelinek /* this is an optional component */ 63140209230bSgjelinek tabptr->zone_importance[0] = '\0'; 63150209230bSgjelinek 63160209230bSgjelinek cur = handle->zone_dh_cur; 63170209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 63180209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_PSET) == 0) { 63190209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_NCPU_MIN, 63200209230bSgjelinek tabptr->zone_ncpu_min, 63210209230bSgjelinek sizeof (tabptr->zone_ncpu_min))) != Z_OK) { 63220209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 63230209230bSgjelinek return (err); 63240209230bSgjelinek } 63250209230bSgjelinek 63260209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_NCPU_MAX, 63270209230bSgjelinek tabptr->zone_ncpu_max, 63280209230bSgjelinek sizeof (tabptr->zone_ncpu_max))) != Z_OK) { 63290209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 63300209230bSgjelinek return (err); 63310209230bSgjelinek } 63320209230bSgjelinek 63330209230bSgjelinek res = Z_OK; 63340209230bSgjelinek 63350209230bSgjelinek } else if (xmlStrcmp(cur->name, DTD_ELEM_TMPPOOL) == 0) { 63360209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_IMPORTANCE, 63370209230bSgjelinek tabptr->zone_importance, 63380209230bSgjelinek sizeof (tabptr->zone_importance))) != Z_OK) { 63390209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 63400209230bSgjelinek return (err); 63410209230bSgjelinek } 63420209230bSgjelinek } 63430209230bSgjelinek } 63440209230bSgjelinek 63450209230bSgjelinek return (res); 63460209230bSgjelinek } 63470209230bSgjelinek 63480209230bSgjelinek int 63490209230bSgjelinek zonecfg_getpsetent(zone_dochandle_t handle, struct zone_psettab *tabptr) 63500209230bSgjelinek { 63510209230bSgjelinek int err; 63520209230bSgjelinek 63530209230bSgjelinek if ((err = zonecfg_setent(handle)) != Z_OK) 63540209230bSgjelinek return (err); 63550209230bSgjelinek 63560209230bSgjelinek err = zonecfg_lookup_pset(handle, tabptr); 63570209230bSgjelinek 63580209230bSgjelinek (void) zonecfg_endent(handle); 63590209230bSgjelinek 63600209230bSgjelinek return (err); 63610209230bSgjelinek } 63620209230bSgjelinek 63630209230bSgjelinek static int 63640209230bSgjelinek add_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 63650209230bSgjelinek { 63660209230bSgjelinek xmlNodePtr newnode, cur = handle->zone_dh_cur; 63670209230bSgjelinek int err; 63680209230bSgjelinek 63690209230bSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_MCAP, NULL); 63700209230bSgjelinek if ((err = newprop(newnode, DTD_ATTR_PHYSCAP, tabptr->zone_physmem_cap)) 63710209230bSgjelinek != Z_OK) 63720209230bSgjelinek return (err); 63730209230bSgjelinek 63740209230bSgjelinek return (Z_OK); 63750209230bSgjelinek } 63760209230bSgjelinek 63770209230bSgjelinek int 63780209230bSgjelinek zonecfg_delete_mcap(zone_dochandle_t handle) 63790209230bSgjelinek { 63800209230bSgjelinek int err; 63810209230bSgjelinek xmlNodePtr cur = handle->zone_dh_cur; 63820209230bSgjelinek 63830209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 63840209230bSgjelinek return (err); 63850209230bSgjelinek 63860209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 63870209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) != 0) 63880209230bSgjelinek continue; 63890209230bSgjelinek 63900209230bSgjelinek xmlUnlinkNode(cur); 63910209230bSgjelinek xmlFreeNode(cur); 63920209230bSgjelinek return (Z_OK); 63930209230bSgjelinek } 63940209230bSgjelinek return (Z_NO_RESOURCE_ID); 63950209230bSgjelinek } 63960209230bSgjelinek 63970209230bSgjelinek int 63980209230bSgjelinek zonecfg_modify_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 63990209230bSgjelinek { 64000209230bSgjelinek int err; 64010209230bSgjelinek 64020209230bSgjelinek if (tabptr == NULL) 64030209230bSgjelinek return (Z_INVAL); 64040209230bSgjelinek 64050209230bSgjelinek err = zonecfg_delete_mcap(handle); 64060209230bSgjelinek /* it is ok if there is no mcap entry */ 64070209230bSgjelinek if (err != Z_OK && err != Z_NO_RESOURCE_ID) 64080209230bSgjelinek return (err); 64090209230bSgjelinek 64100209230bSgjelinek if ((err = add_mcap(handle, tabptr)) != Z_OK) 64110209230bSgjelinek return (err); 64120209230bSgjelinek 64130209230bSgjelinek return (Z_OK); 64140209230bSgjelinek } 64150209230bSgjelinek 64160209230bSgjelinek int 64170209230bSgjelinek zonecfg_lookup_mcap(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 64180209230bSgjelinek { 64190209230bSgjelinek xmlNodePtr cur; 64200209230bSgjelinek int err; 64210209230bSgjelinek 64220209230bSgjelinek if (tabptr == NULL) 64230209230bSgjelinek return (Z_INVAL); 64240209230bSgjelinek 64250209230bSgjelinek if ((err = operation_prep(handle)) != Z_OK) 64260209230bSgjelinek return (err); 64270209230bSgjelinek 64280209230bSgjelinek cur = handle->zone_dh_cur; 64290209230bSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 64300209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) != 0) 64310209230bSgjelinek continue; 64320209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_PHYSCAP, 64330209230bSgjelinek tabptr->zone_physmem_cap, 64340209230bSgjelinek sizeof (tabptr->zone_physmem_cap))) != Z_OK) { 64350209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 64360209230bSgjelinek return (err); 64370209230bSgjelinek } 64380209230bSgjelinek 64390209230bSgjelinek return (Z_OK); 64400209230bSgjelinek } 64410209230bSgjelinek 64420209230bSgjelinek return (Z_NO_ENTRY); 64430209230bSgjelinek } 64440209230bSgjelinek 64450209230bSgjelinek static int 64460209230bSgjelinek getmcapent_core(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 64470209230bSgjelinek { 64480209230bSgjelinek xmlNodePtr cur; 64490209230bSgjelinek int err; 64500209230bSgjelinek 64510209230bSgjelinek if (handle == NULL) 64520209230bSgjelinek return (Z_INVAL); 64530209230bSgjelinek 64540209230bSgjelinek if ((cur = handle->zone_dh_cur) == NULL) 64550209230bSgjelinek return (Z_NO_ENTRY); 64560209230bSgjelinek 64570209230bSgjelinek for (; cur != NULL; cur = cur->next) 64580209230bSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_MCAP) == 0) 64590209230bSgjelinek break; 64600209230bSgjelinek if (cur == NULL) { 64610209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 64620209230bSgjelinek return (Z_NO_ENTRY); 64630209230bSgjelinek } 64640209230bSgjelinek 64650209230bSgjelinek if ((err = fetchprop(cur, DTD_ATTR_PHYSCAP, tabptr->zone_physmem_cap, 64660209230bSgjelinek sizeof (tabptr->zone_physmem_cap))) != Z_OK) { 64670209230bSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 64680209230bSgjelinek return (err); 64690209230bSgjelinek } 64700209230bSgjelinek 64710209230bSgjelinek handle->zone_dh_cur = cur->next; 64720209230bSgjelinek return (Z_OK); 64730209230bSgjelinek } 64740209230bSgjelinek 64750209230bSgjelinek int 64760209230bSgjelinek zonecfg_getmcapent(zone_dochandle_t handle, struct zone_mcaptab *tabptr) 64770209230bSgjelinek { 64780209230bSgjelinek int err; 64790209230bSgjelinek 64800209230bSgjelinek if ((err = zonecfg_setent(handle)) != Z_OK) 64810209230bSgjelinek return (err); 64820209230bSgjelinek 64830209230bSgjelinek err = getmcapent_core(handle, tabptr); 64840209230bSgjelinek 64850209230bSgjelinek (void) zonecfg_endent(handle); 64860209230bSgjelinek 64870209230bSgjelinek return (err); 64880209230bSgjelinek } 64890209230bSgjelinek 6490ee519a1fSgjelinek int 6491ee519a1fSgjelinek zonecfg_setpkgent(zone_dochandle_t handle) 6492ee519a1fSgjelinek { 6493ee519a1fSgjelinek return (zonecfg_setent(handle)); 6494ee519a1fSgjelinek } 6495ee519a1fSgjelinek 6496ee519a1fSgjelinek int 6497ee519a1fSgjelinek zonecfg_getpkgent(zone_dochandle_t handle, struct zone_pkgtab *tabptr) 6498ee519a1fSgjelinek { 6499ee519a1fSgjelinek xmlNodePtr cur; 6500ee519a1fSgjelinek int err; 6501ee519a1fSgjelinek 6502ee519a1fSgjelinek if (handle == NULL) 6503ee519a1fSgjelinek return (Z_INVAL); 6504ee519a1fSgjelinek 6505ee519a1fSgjelinek if ((cur = handle->zone_dh_cur) == NULL) 6506ee519a1fSgjelinek return (Z_NO_ENTRY); 6507ee519a1fSgjelinek 6508ee519a1fSgjelinek for (; cur != NULL; cur = cur->next) 6509ee519a1fSgjelinek if (!xmlStrcmp(cur->name, DTD_ELEM_PACKAGE)) 6510ee519a1fSgjelinek break; 6511ee519a1fSgjelinek if (cur == NULL) { 6512ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6513ee519a1fSgjelinek return (Z_NO_ENTRY); 6514ee519a1fSgjelinek } 6515ee519a1fSgjelinek 6516ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_pkg_name, 6517ee519a1fSgjelinek sizeof (tabptr->zone_pkg_name))) != Z_OK) { 6518ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6519ee519a1fSgjelinek return (err); 6520ee519a1fSgjelinek } 6521ee519a1fSgjelinek 6522ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_VERSION, tabptr->zone_pkg_version, 6523ee519a1fSgjelinek sizeof (tabptr->zone_pkg_version))) != Z_OK) { 6524ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6525ee519a1fSgjelinek return (err); 6526ee519a1fSgjelinek } 6527ee519a1fSgjelinek 6528ee519a1fSgjelinek handle->zone_dh_cur = cur->next; 6529ee519a1fSgjelinek return (Z_OK); 6530ee519a1fSgjelinek } 6531ee519a1fSgjelinek 6532ee519a1fSgjelinek int 6533ee519a1fSgjelinek zonecfg_endpkgent(zone_dochandle_t handle) 6534ee519a1fSgjelinek { 6535ee519a1fSgjelinek return (zonecfg_endent(handle)); 6536ee519a1fSgjelinek } 6537ee519a1fSgjelinek 6538ee519a1fSgjelinek int 6539ee519a1fSgjelinek zonecfg_setpatchent(zone_dochandle_t handle) 6540ee519a1fSgjelinek { 6541ee519a1fSgjelinek return (zonecfg_setent(handle)); 6542ee519a1fSgjelinek } 6543ee519a1fSgjelinek 6544ee519a1fSgjelinek int 6545ee519a1fSgjelinek zonecfg_getpatchent(zone_dochandle_t handle, struct zone_patchtab *tabptr) 6546ee519a1fSgjelinek { 6547ee519a1fSgjelinek xmlNodePtr cur; 6548ee519a1fSgjelinek int err; 6549ee519a1fSgjelinek 6550ee519a1fSgjelinek if (handle == NULL) 6551ee519a1fSgjelinek return (Z_INVAL); 6552ee519a1fSgjelinek 6553ee519a1fSgjelinek if ((cur = handle->zone_dh_cur) == NULL) 6554ee519a1fSgjelinek return (Z_NO_ENTRY); 6555ee519a1fSgjelinek 6556ee519a1fSgjelinek for (; cur != NULL; cur = cur->next) 6557ee519a1fSgjelinek if (!xmlStrcmp(cur->name, DTD_ELEM_PATCH)) 6558ee519a1fSgjelinek break; 6559ee519a1fSgjelinek if (cur == NULL) { 6560ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6561ee519a1fSgjelinek return (Z_NO_ENTRY); 6562ee519a1fSgjelinek } 6563ee519a1fSgjelinek 6564ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_ID, tabptr->zone_patch_id, 6565ee519a1fSgjelinek sizeof (tabptr->zone_patch_id))) != Z_OK) { 6566ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6567ee519a1fSgjelinek return (err); 6568ee519a1fSgjelinek } 6569ee519a1fSgjelinek 6570ee519a1fSgjelinek handle->zone_dh_cur = cur->next; 6571ee519a1fSgjelinek return (Z_OK); 6572ee519a1fSgjelinek } 6573ee519a1fSgjelinek 6574ee519a1fSgjelinek int 6575ee519a1fSgjelinek zonecfg_endpatchent(zone_dochandle_t handle) 6576ee519a1fSgjelinek { 6577ee519a1fSgjelinek return (zonecfg_endent(handle)); 6578ee519a1fSgjelinek } 6579ee519a1fSgjelinek 6580ee519a1fSgjelinek int 6581ee519a1fSgjelinek zonecfg_setdevperment(zone_dochandle_t handle) 6582ee519a1fSgjelinek { 6583ee519a1fSgjelinek return (zonecfg_setent(handle)); 6584ee519a1fSgjelinek } 6585ee519a1fSgjelinek 6586ee519a1fSgjelinek int 6587ee519a1fSgjelinek zonecfg_getdevperment(zone_dochandle_t handle, struct zone_devpermtab *tabptr) 6588ee519a1fSgjelinek { 6589ee519a1fSgjelinek xmlNodePtr cur; 6590ee519a1fSgjelinek int err; 6591ee519a1fSgjelinek char buf[128]; 6592ee519a1fSgjelinek 6593ee519a1fSgjelinek tabptr->zone_devperm_acl = NULL; 6594ee519a1fSgjelinek 6595ee519a1fSgjelinek if (handle == NULL) 6596ee519a1fSgjelinek return (Z_INVAL); 6597ee519a1fSgjelinek 6598ee519a1fSgjelinek if ((cur = handle->zone_dh_cur) == NULL) 6599ee519a1fSgjelinek return (Z_NO_ENTRY); 6600ee519a1fSgjelinek 6601ee519a1fSgjelinek for (; cur != NULL; cur = cur->next) 6602ee519a1fSgjelinek if (!xmlStrcmp(cur->name, DTD_ELEM_DEV_PERM)) 6603ee519a1fSgjelinek break; 6604ee519a1fSgjelinek if (cur == NULL) { 6605ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6606ee519a1fSgjelinek return (Z_NO_ENTRY); 6607ee519a1fSgjelinek } 6608ee519a1fSgjelinek 6609ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_NAME, tabptr->zone_devperm_name, 6610ee519a1fSgjelinek sizeof (tabptr->zone_devperm_name))) != Z_OK) { 6611ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6612ee519a1fSgjelinek return (err); 6613ee519a1fSgjelinek } 6614ee519a1fSgjelinek 6615ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_UID, buf, sizeof (buf))) != Z_OK) { 6616ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6617ee519a1fSgjelinek return (err); 6618ee519a1fSgjelinek } 6619ee519a1fSgjelinek tabptr->zone_devperm_uid = (uid_t)atol(buf); 6620ee519a1fSgjelinek 6621ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_GID, buf, sizeof (buf))) != Z_OK) { 6622ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6623ee519a1fSgjelinek return (err); 6624ee519a1fSgjelinek } 6625ee519a1fSgjelinek tabptr->zone_devperm_gid = (gid_t)atol(buf); 6626ee519a1fSgjelinek 6627ee519a1fSgjelinek if ((err = fetchprop(cur, DTD_ATTR_MODE, buf, sizeof (buf))) != Z_OK) { 6628ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6629ee519a1fSgjelinek return (err); 6630ee519a1fSgjelinek } 6631ee519a1fSgjelinek tabptr->zone_devperm_mode = (mode_t)strtol(buf, (char **)NULL, 8); 6632ee519a1fSgjelinek 6633ee519a1fSgjelinek if ((err = fetch_alloc_prop(cur, DTD_ATTR_ACL, 6634ee519a1fSgjelinek &(tabptr->zone_devperm_acl))) != Z_OK) { 6635ee519a1fSgjelinek handle->zone_dh_cur = handle->zone_dh_top; 6636ee519a1fSgjelinek return (err); 6637ee519a1fSgjelinek } 6638ee519a1fSgjelinek 6639ee519a1fSgjelinek handle->zone_dh_cur = cur->next; 6640ee519a1fSgjelinek return (Z_OK); 6641ee519a1fSgjelinek } 6642ee519a1fSgjelinek 6643ee519a1fSgjelinek int 6644ee519a1fSgjelinek zonecfg_enddevperment(zone_dochandle_t handle) 6645ee519a1fSgjelinek { 6646ee519a1fSgjelinek return (zonecfg_endent(handle)); 6647ee519a1fSgjelinek } 6648ee519a1fSgjelinek 6649ee519a1fSgjelinek /* 6650ee519a1fSgjelinek * Process a list of pkgs from an entry in the contents file, adding each pkg 6651ee519a1fSgjelinek * name to the list of pkgs. 6652ee519a1fSgjelinek * 6653ee519a1fSgjelinek * It is possible for the pkg name to be preceeded by a special character 6654ee519a1fSgjelinek * which indicates some bookkeeping information for pkging. Check if the 6655ee519a1fSgjelinek * first char is not an Alpha char. If so, skip over it. 6656ee519a1fSgjelinek */ 6657ee519a1fSgjelinek static int 6658ee519a1fSgjelinek add_pkg_list(char *lastp, char ***plist, int *pcnt) 6659ee519a1fSgjelinek { 6660ee519a1fSgjelinek char *p; 6661ee519a1fSgjelinek int pkg_cnt = *pcnt; 6662ee519a1fSgjelinek char **pkgs = *plist; 6663ee519a1fSgjelinek int res = Z_OK; 6664ee519a1fSgjelinek 6665ee519a1fSgjelinek while ((p = strtok_r(NULL, " ", &lastp)) != NULL) { 6666ee519a1fSgjelinek char **tmpp; 6667ee519a1fSgjelinek int i; 6668ee519a1fSgjelinek 6669ee519a1fSgjelinek /* skip over any special pkg bookkeeping char */ 6670ee519a1fSgjelinek if (!isalpha(*p)) 6671ee519a1fSgjelinek p++; 6672ee519a1fSgjelinek 6673ee519a1fSgjelinek /* Check if the pkg is already in the list */ 6674ee519a1fSgjelinek for (i = 0; i < pkg_cnt; i++) { 6675ee519a1fSgjelinek if (strcmp(p, pkgs[i]) == 0) 6676ee519a1fSgjelinek break; 6677ee519a1fSgjelinek } 6678ee519a1fSgjelinek 6679ee519a1fSgjelinek if (i < pkg_cnt) 6680ee519a1fSgjelinek continue; 6681ee519a1fSgjelinek 6682ee519a1fSgjelinek /* The pkg is not in the list; add it. */ 6683ee519a1fSgjelinek if ((tmpp = (char **)realloc(pkgs, 6684ee519a1fSgjelinek sizeof (char *) * (pkg_cnt + 1))) == NULL) { 6685ee519a1fSgjelinek res = Z_NOMEM; 6686ee519a1fSgjelinek break; 6687ee519a1fSgjelinek } 6688ee519a1fSgjelinek pkgs = tmpp; 6689ee519a1fSgjelinek 6690ee519a1fSgjelinek if ((pkgs[pkg_cnt] = strdup(p)) == NULL) { 6691ee519a1fSgjelinek res = Z_NOMEM; 6692ee519a1fSgjelinek break; 6693ee519a1fSgjelinek } 6694ee519a1fSgjelinek pkg_cnt++; 6695ee519a1fSgjelinek } 6696ee519a1fSgjelinek 6697ee519a1fSgjelinek *plist = pkgs; 6698ee519a1fSgjelinek *pcnt = pkg_cnt; 6699ee519a1fSgjelinek 6700ee519a1fSgjelinek return (res); 6701ee519a1fSgjelinek } 6702ee519a1fSgjelinek 6703ee519a1fSgjelinek /* 6704ee519a1fSgjelinek * Process an entry from the contents file (type "directory") and if the 6705ee519a1fSgjelinek * directory path is in the list of paths, add the associated list of pkgs 6706ee519a1fSgjelinek * to the pkg list. The input parameter "entry" will be broken up by 6707ee519a1fSgjelinek * the parser within this function so its value will be modified when this 6708ee519a1fSgjelinek * function exits. 6709ee519a1fSgjelinek * 6710ee519a1fSgjelinek * The entries we are looking for will look something like: 6711ee519a1fSgjelinek * /usr d none 0755 root sys SUNWctpls SUNWidnl SUNWlibCf .... 6712ee519a1fSgjelinek */ 6713ee519a1fSgjelinek static int 6714ee519a1fSgjelinek get_path_pkgs(char *entry, char **paths, int cnt, char ***pkgs, int *pkg_cnt) 6715ee519a1fSgjelinek { 6716ee519a1fSgjelinek char *f1; 6717ee519a1fSgjelinek char *f2; 6718ee519a1fSgjelinek char *lastp; 6719ee519a1fSgjelinek int i; 6720ee519a1fSgjelinek int res = Z_OK; 6721ee519a1fSgjelinek 6722ee519a1fSgjelinek if ((f1 = strtok_r(entry, " ", &lastp)) == NULL || 6723ee519a1fSgjelinek (f2 = strtok_r(NULL, " ", &lastp)) == NULL || strcmp(f2, "d") != 0) 6724ee519a1fSgjelinek return (Z_OK); 6725ee519a1fSgjelinek 6726ee519a1fSgjelinek /* Check if this directory entry is in the list of paths. */ 6727ee519a1fSgjelinek for (i = 0; i < cnt; i++) { 6728ee519a1fSgjelinek if (fnmatch(paths[i], f1, FNM_PATHNAME) == 0) { 6729ee519a1fSgjelinek /* 6730ee519a1fSgjelinek * We do want the pkgs for this path. First, skip 6731ee519a1fSgjelinek * over the next 4 fields in the entry so that we call 6732ee519a1fSgjelinek * add_pkg_list starting with the pkg names. 6733ee519a1fSgjelinek */ 6734ee519a1fSgjelinek int j; 673507b574eeSgjelinek char *nlp; 6736ee519a1fSgjelinek 6737ee519a1fSgjelinek for (j = 0; j < 4 && 6738ffbafc53Scomay strtok_r(NULL, " ", &lastp) != NULL; j++) 6739ffbafc53Scomay ; 6740ee519a1fSgjelinek /* 6741ee519a1fSgjelinek * If there are < 4 fields this entry is corrupt, 6742ee519a1fSgjelinek * just skip it. 6743ee519a1fSgjelinek */ 6744ee519a1fSgjelinek if (j < 4) 6745ee519a1fSgjelinek return (Z_OK); 6746ee519a1fSgjelinek 674707b574eeSgjelinek /* strip newline from the line */ 674807b574eeSgjelinek nlp = (lastp + strlen(lastp) - 1); 674907b574eeSgjelinek if (*nlp == '\n') 675007b574eeSgjelinek *nlp = '\0'; 675107b574eeSgjelinek 6752ee519a1fSgjelinek res = add_pkg_list(lastp, pkgs, pkg_cnt); 6753ee519a1fSgjelinek break; 6754ee519a1fSgjelinek } 6755ee519a1fSgjelinek } 6756ee519a1fSgjelinek 6757ee519a1fSgjelinek return (res); 6758ee519a1fSgjelinek } 6759ee519a1fSgjelinek 6760ee519a1fSgjelinek /* 6761ee519a1fSgjelinek * Read an entry from a pkginfo or contents file. Some of these lines can 6762ee519a1fSgjelinek * either be arbitrarily long or be continued by a backslash at the end of 6763ee519a1fSgjelinek * the line. This function coalesces lines that are longer than the read 6764ee519a1fSgjelinek * buffer, and lines that are continued, into one buffer which is returned. 6765ee519a1fSgjelinek * The caller must free this memory. NULL is returned when we hit EOF or 6766ee519a1fSgjelinek * if we run out of memory (errno is set to ENOMEM). 6767ee519a1fSgjelinek */ 6768ee519a1fSgjelinek static char * 6769ee519a1fSgjelinek read_pkg_data(FILE *fp) 6770ee519a1fSgjelinek { 6771ee519a1fSgjelinek char *start; 6772ee519a1fSgjelinek char *inp; 6773ee519a1fSgjelinek char *p; 6774ee519a1fSgjelinek int char_cnt = 0; 6775ee519a1fSgjelinek 6776ee519a1fSgjelinek errno = 0; 6777ee519a1fSgjelinek if ((start = (char *)malloc(PKGINFO_RD_LEN)) == NULL) { 6778ee519a1fSgjelinek errno = ENOMEM; 6779ee519a1fSgjelinek return (NULL); 6780ee519a1fSgjelinek } 6781ee519a1fSgjelinek 6782ee519a1fSgjelinek inp = start; 6783ee519a1fSgjelinek while ((p = fgets(inp, PKGINFO_RD_LEN, fp)) != NULL) { 6784ee519a1fSgjelinek int len; 6785ee519a1fSgjelinek 6786ee519a1fSgjelinek len = strlen(inp); 6787ee519a1fSgjelinek if (inp[len - 1] == '\n' && 6788ee519a1fSgjelinek (len == 1 || inp[len - 2] != '\\')) { 6789ee519a1fSgjelinek char_cnt = len; 6790ee519a1fSgjelinek break; 6791ee519a1fSgjelinek } 6792ee519a1fSgjelinek 6793ee519a1fSgjelinek if (inp[len - 2] == '\\') 6794ee519a1fSgjelinek char_cnt += len - 2; 6795ee519a1fSgjelinek else 6796ee519a1fSgjelinek char_cnt += PKGINFO_RD_LEN - 1; 6797ee519a1fSgjelinek 6798ee519a1fSgjelinek if ((p = realloc(start, char_cnt + PKGINFO_RD_LEN)) == NULL) { 6799ee519a1fSgjelinek errno = ENOMEM; 6800ee519a1fSgjelinek break; 6801ee519a1fSgjelinek } 6802ee519a1fSgjelinek 6803ee519a1fSgjelinek start = p; 6804ee519a1fSgjelinek inp = start + char_cnt; 6805ee519a1fSgjelinek } 6806ee519a1fSgjelinek 6807ee519a1fSgjelinek if (errno == ENOMEM || (p == NULL && char_cnt == 0)) { 6808ee519a1fSgjelinek free(start); 6809ee519a1fSgjelinek start = NULL; 6810ee519a1fSgjelinek } 6811ee519a1fSgjelinek 6812ee519a1fSgjelinek return (start); 6813ee519a1fSgjelinek } 6814ee519a1fSgjelinek 6815ee519a1fSgjelinek static void 6816ee519a1fSgjelinek free_ipd_pkgs(char **pkgs, int cnt) 6817ee519a1fSgjelinek { 6818ee519a1fSgjelinek int i; 6819ee519a1fSgjelinek 6820ee519a1fSgjelinek for (i = 0; i < cnt; i++) 6821ee519a1fSgjelinek free(pkgs[i]); 6822ee519a1fSgjelinek free(pkgs); 6823ee519a1fSgjelinek } 6824ee519a1fSgjelinek 6825ee519a1fSgjelinek /* 6826ee519a1fSgjelinek * Get the list of inherited-pkg-dirs (ipd) for the zone and then get the 6827ee519a1fSgjelinek * list of pkgs that deliver into those dirs. 6828ee519a1fSgjelinek */ 6829ee519a1fSgjelinek static int 6830ee519a1fSgjelinek get_ipd_pkgs(zone_dochandle_t handle, char ***pkg_list, int *cnt) 6831ee519a1fSgjelinek { 6832ee519a1fSgjelinek int res; 6833ee519a1fSgjelinek struct zone_fstab fstab; 6834ee519a1fSgjelinek int ipd_cnt = 0; 6835ee519a1fSgjelinek char **ipds = NULL; 6836ee519a1fSgjelinek int pkg_cnt = 0; 6837ee519a1fSgjelinek char **pkgs = NULL; 6838ee519a1fSgjelinek int i; 6839ee519a1fSgjelinek 6840ee519a1fSgjelinek if ((res = zonecfg_setipdent(handle)) != Z_OK) 6841ee519a1fSgjelinek return (res); 6842ee519a1fSgjelinek 6843ee519a1fSgjelinek while (zonecfg_getipdent(handle, &fstab) == Z_OK) { 6844ee519a1fSgjelinek char **p; 6845ee519a1fSgjelinek int len; 6846ee519a1fSgjelinek 6847ee519a1fSgjelinek if ((p = (char **)realloc(ipds, 6848ee519a1fSgjelinek sizeof (char *) * (ipd_cnt + 2))) == NULL) { 6849ee519a1fSgjelinek res = Z_NOMEM; 6850ee519a1fSgjelinek break; 6851ee519a1fSgjelinek } 6852ee519a1fSgjelinek ipds = p; 6853ee519a1fSgjelinek 6854ee519a1fSgjelinek if ((ipds[ipd_cnt] = strdup(fstab.zone_fs_dir)) == NULL) { 6855ee519a1fSgjelinek res = Z_NOMEM; 6856ee519a1fSgjelinek break; 6857ee519a1fSgjelinek } 6858ee519a1fSgjelinek ipd_cnt++; 6859ee519a1fSgjelinek 6860ee519a1fSgjelinek len = strlen(fstab.zone_fs_dir) + 3; 6861ee519a1fSgjelinek if ((ipds[ipd_cnt] = malloc(len)) == NULL) { 6862ee519a1fSgjelinek res = Z_NOMEM; 6863ee519a1fSgjelinek break; 6864ee519a1fSgjelinek } 6865ee519a1fSgjelinek 6866ee519a1fSgjelinek (void) snprintf(ipds[ipd_cnt], len, "%s/*", fstab.zone_fs_dir); 6867ee519a1fSgjelinek ipd_cnt++; 6868ee519a1fSgjelinek } 6869ee519a1fSgjelinek 6870ee519a1fSgjelinek (void) zonecfg_endipdent(handle); 6871ee519a1fSgjelinek 6872ee519a1fSgjelinek if (res != Z_OK) { 6873ee519a1fSgjelinek for (i = 0; i < ipd_cnt; i++) 6874ee519a1fSgjelinek free(ipds[i]); 6875ee519a1fSgjelinek free(ipds); 6876ee519a1fSgjelinek return (res); 6877ee519a1fSgjelinek } 6878ee519a1fSgjelinek 6879ee519a1fSgjelinek /* We only have to process the contents file if we have ipds. */ 6880ee519a1fSgjelinek if (ipd_cnt > 0) { 6881ee519a1fSgjelinek FILE *fp; 6882ee519a1fSgjelinek 6883ee519a1fSgjelinek if ((fp = fopen(CONTENTS_FILE, "r")) != NULL) { 6884ee519a1fSgjelinek char *buf; 6885ee519a1fSgjelinek 6886ee519a1fSgjelinek while ((buf = read_pkg_data(fp)) != NULL) { 6887ee519a1fSgjelinek res = get_path_pkgs(buf, ipds, ipd_cnt, &pkgs, 6888ee519a1fSgjelinek &pkg_cnt); 6889ee519a1fSgjelinek free(buf); 6890ee519a1fSgjelinek if (res != Z_OK) 6891ee519a1fSgjelinek break; 6892ee519a1fSgjelinek } 6893ee519a1fSgjelinek 6894ee519a1fSgjelinek (void) fclose(fp); 6895ee519a1fSgjelinek } 6896ee519a1fSgjelinek } 6897ee519a1fSgjelinek 6898ee519a1fSgjelinek for (i = 0; i < ipd_cnt; i++) 6899ee519a1fSgjelinek free(ipds[i]); 6900ee519a1fSgjelinek free(ipds); 6901ee519a1fSgjelinek 6902ee519a1fSgjelinek if (res != Z_OK) { 6903ee519a1fSgjelinek free_ipd_pkgs(pkgs, pkg_cnt); 6904ee519a1fSgjelinek } else { 6905ee519a1fSgjelinek *pkg_list = pkgs; 6906ee519a1fSgjelinek *cnt = pkg_cnt; 6907ee519a1fSgjelinek } 6908ee519a1fSgjelinek 6909ee519a1fSgjelinek return (res); 6910ee519a1fSgjelinek } 6911ee519a1fSgjelinek 6912ee519a1fSgjelinek /* 6913ee519a1fSgjelinek * Return true if pkg_name is in the list of pkgs that deliver into an 6914ee519a1fSgjelinek * inherited pkg directory for the zone. 6915ee519a1fSgjelinek */ 6916ee519a1fSgjelinek static boolean_t 6917ee519a1fSgjelinek dir_pkg(char *pkg_name, char **pkg_list, int cnt) 6918ee519a1fSgjelinek { 6919ee519a1fSgjelinek int i; 6920ee519a1fSgjelinek 6921ee519a1fSgjelinek for (i = 0; i < cnt; i++) { 6922ee519a1fSgjelinek if (strcmp(pkg_name, pkg_list[i]) == 0) 6923ee519a1fSgjelinek return (B_TRUE); 6924ee519a1fSgjelinek } 6925ee519a1fSgjelinek 6926ee519a1fSgjelinek return (B_FALSE); 6927ee519a1fSgjelinek } 6928ee519a1fSgjelinek 6929ee519a1fSgjelinek /* 6930ee519a1fSgjelinek * Start by adding the patch to the sw inventory on the handle. 6931ee519a1fSgjelinek * 6932ee519a1fSgjelinek * The info parameter will be the portion of the PATCH_INFO_ entry following 6933ee519a1fSgjelinek * the '='. For example: 6934ee519a1fSgjelinek * Installed: Wed Dec 7 07:13:51 PST 2005 From: mum Obsoletes: 120777-03 \ 6935ee519a1fSgjelinek * 121087-02 119108-07 Requires: 119575-02 119255-06 Incompatibles: 6936ee519a1fSgjelinek * 693707b574eeSgjelinek * A backed out patch will have an info line of "backed out\n". We should 693807b574eeSgjelinek * skip these patches. 693907b574eeSgjelinek * 6940ee519a1fSgjelinek * We also want to add the Obsolete and Incompatible patches to the 6941ee519a1fSgjelinek * sw inventory description of this patch. 6942ee519a1fSgjelinek */ 6943ee519a1fSgjelinek static int 6944ee519a1fSgjelinek add_patch(zone_dochandle_t handle, char *patch, char *info) 6945ee519a1fSgjelinek { 6946ee519a1fSgjelinek xmlNodePtr node; 6947ee519a1fSgjelinek xmlNodePtr cur; 6948ee519a1fSgjelinek int err; 6949ee519a1fSgjelinek char *p; 6950ee519a1fSgjelinek char *lastp; 6951ee519a1fSgjelinek boolean_t add_info = B_FALSE; 6952ee519a1fSgjelinek boolean_t obsolete; 6953ee519a1fSgjelinek 695407b574eeSgjelinek if (strcmp(info, "backed out\n") == 0) 695507b574eeSgjelinek return (Z_OK); 695607b574eeSgjelinek 6957ee519a1fSgjelinek if ((err = operation_prep(handle)) != Z_OK) 6958ee519a1fSgjelinek return (err); 6959ee519a1fSgjelinek 6960ee519a1fSgjelinek cur = handle->zone_dh_cur; 6961ee519a1fSgjelinek node = xmlNewTextChild(cur, NULL, DTD_ELEM_PATCH, NULL); 6962ee519a1fSgjelinek if ((err = newprop(node, DTD_ATTR_ID, patch)) != Z_OK) 6963ee519a1fSgjelinek return (err); 6964ee519a1fSgjelinek 6965ee519a1fSgjelinek /* 6966ee519a1fSgjelinek * Start with the first token. This will probably be "Installed:". 6967ee519a1fSgjelinek * If we can't tokenize this entry, just return. 6968ee519a1fSgjelinek */ 6969ee519a1fSgjelinek if ((p = strtok_r(info, " ", &lastp)) == NULL) 6970ee519a1fSgjelinek return (Z_OK); 6971ee519a1fSgjelinek 6972ee519a1fSgjelinek do { 6973ee519a1fSgjelinek xmlNodePtr new_node; 6974ee519a1fSgjelinek char *nlp; 6975ee519a1fSgjelinek 6976ee519a1fSgjelinek if (strcmp(p, "Installed:") == 0 || 6977ee519a1fSgjelinek strcmp(p, "Requires:") == 0 || 6978ee519a1fSgjelinek strcmp(p, "From:") == 0) { 6979ee519a1fSgjelinek add_info = B_FALSE; 6980ee519a1fSgjelinek continue; 6981ee519a1fSgjelinek } else if (strcmp(p, "Obsoletes:") == 0) { 6982ee519a1fSgjelinek obsolete = B_TRUE; 6983ee519a1fSgjelinek add_info = B_TRUE; 6984ee519a1fSgjelinek continue; 6985ee519a1fSgjelinek } else if (strcmp(p, "Incompatibles:") == 0) { 6986ee519a1fSgjelinek obsolete = B_FALSE; 6987ee519a1fSgjelinek add_info = B_TRUE; 6988ee519a1fSgjelinek continue; 6989ee519a1fSgjelinek } 6990ee519a1fSgjelinek 6991ee519a1fSgjelinek if (!add_info) 6992ee519a1fSgjelinek continue; 6993ee519a1fSgjelinek 6994ee519a1fSgjelinek /* strip newline from last patch in the line */ 6995ee519a1fSgjelinek nlp = (p + strlen(p) - 1); 6996ee519a1fSgjelinek if (*nlp == '\n') 6997ee519a1fSgjelinek *nlp = '\0'; 6998ee519a1fSgjelinek 6999ee519a1fSgjelinek if (obsolete) 7000ee519a1fSgjelinek new_node = xmlNewTextChild(node, NULL, 7001ee519a1fSgjelinek DTD_ELEM_OBSOLETES, NULL); 7002ee519a1fSgjelinek else 7003ee519a1fSgjelinek new_node = xmlNewTextChild(node, NULL, 7004ee519a1fSgjelinek DTD_ELEM_INCOMPATIBLE, NULL); 7005ee519a1fSgjelinek 7006ee519a1fSgjelinek if ((err = newprop(new_node, DTD_ATTR_ID, p)) != Z_OK) 7007ee519a1fSgjelinek return (err); 7008ee519a1fSgjelinek 7009ee519a1fSgjelinek } while ((p = strtok_r(NULL, " ", &lastp)) != NULL); 7010ee519a1fSgjelinek 7011ee519a1fSgjelinek return (Z_OK); 7012ee519a1fSgjelinek } 7013ee519a1fSgjelinek 7014ee519a1fSgjelinek static boolean_t 7015ee519a1fSgjelinek unique_patch(zone_dochandle_t handle, char *patch) 7016ee519a1fSgjelinek { 7017ee519a1fSgjelinek xmlNodePtr cur; 7018ee519a1fSgjelinek char id[MAXNAMELEN]; 7019ee519a1fSgjelinek 7020ee519a1fSgjelinek cur = xmlDocGetRootElement(handle->zone_dh_doc); 7021ee519a1fSgjelinek for (cur = cur->xmlChildrenNode; cur != NULL; cur = cur->next) { 7022ee519a1fSgjelinek if (xmlStrcmp(cur->name, DTD_ELEM_PATCH) == 0) { 7023ee519a1fSgjelinek if (fetchprop(cur, DTD_ATTR_ID, id, sizeof (id)) 7024ee519a1fSgjelinek != Z_OK) 7025ee519a1fSgjelinek continue; 7026ee519a1fSgjelinek 7027ee519a1fSgjelinek if (strcmp(patch, id) == 0) 7028ee519a1fSgjelinek return (B_FALSE); 7029ee519a1fSgjelinek } 7030ee519a1fSgjelinek } 7031ee519a1fSgjelinek 7032ee519a1fSgjelinek return (B_TRUE); 7033ee519a1fSgjelinek } 7034ee519a1fSgjelinek 7035ee519a1fSgjelinek /* 7036ee519a1fSgjelinek * Add the unique patches associated with this pkg to the sw inventory on the 7037ee519a1fSgjelinek * handle. 7038ee519a1fSgjelinek * 7039ee519a1fSgjelinek * We are processing entries of the form: 7040ee519a1fSgjelinek * PATCH_INFO_121454-02=Installed: Wed Dec 7 07:13:51 PST 2005 From: mum \ 7041ee519a1fSgjelinek * Obsoletes: 120777-03 121087-02 119108-07 Requires: 119575-02 \ 7042ee519a1fSgjelinek * 119255-06 Incompatibles: 7043ee519a1fSgjelinek * 7044ee519a1fSgjelinek */ 7045ee519a1fSgjelinek static int 7046ee519a1fSgjelinek add_patches(zone_dochandle_t handle, struct zone_pkginfo *infop) 7047ee519a1fSgjelinek { 7048ee519a1fSgjelinek int i; 7049ee519a1fSgjelinek int res = Z_OK; 7050ee519a1fSgjelinek 7051ee519a1fSgjelinek for (i = 0; i < infop->zpi_patch_cnt; i++) { 7052ee519a1fSgjelinek char *p, *ep; 7053ee519a1fSgjelinek 7054ee519a1fSgjelinek if (strlen(infop->zpi_patchinfo[i]) < (sizeof (PATCHINFO) - 1)) 7055ee519a1fSgjelinek continue; 7056ee519a1fSgjelinek 7057ee519a1fSgjelinek /* Skip over "PATCH_INFO_" to get the patch id. */ 7058ee519a1fSgjelinek p = infop->zpi_patchinfo[i] + sizeof (PATCHINFO) - 1; 7059ee519a1fSgjelinek if ((ep = strchr(p, '=')) == NULL) 7060ee519a1fSgjelinek continue; 7061ee519a1fSgjelinek 7062ee519a1fSgjelinek *ep = '\0'; 7063ee519a1fSgjelinek if (unique_patch(handle, p)) 706407b574eeSgjelinek if ((res = add_patch(handle, p, ep + 1)) != Z_OK) 706507b574eeSgjelinek break; 7066ee519a1fSgjelinek } 7067ee519a1fSgjelinek 7068ee519a1fSgjelinek return (res); 7069ee519a1fSgjelinek } 7070ee519a1fSgjelinek 7071ee519a1fSgjelinek /* 7072ee519a1fSgjelinek * Add the pkg to the sw inventory on the handle. 7073ee519a1fSgjelinek */ 7074ee519a1fSgjelinek static int 7075ee519a1fSgjelinek add_pkg(zone_dochandle_t handle, char *name, char *version) 7076ee519a1fSgjelinek { 7077ee519a1fSgjelinek xmlNodePtr newnode; 7078ee519a1fSgjelinek xmlNodePtr cur; 7079ee519a1fSgjelinek int err; 7080ee519a1fSgjelinek 7081ee519a1fSgjelinek if ((err = operation_prep(handle)) != Z_OK) 7082ee519a1fSgjelinek return (err); 7083ee519a1fSgjelinek 7084ee519a1fSgjelinek cur = handle->zone_dh_cur; 7085ee519a1fSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_PACKAGE, NULL); 7086ee519a1fSgjelinek if ((err = newprop(newnode, DTD_ATTR_NAME, name)) != Z_OK) 7087ee519a1fSgjelinek return (err); 7088ee519a1fSgjelinek if ((err = newprop(newnode, DTD_ATTR_VERSION, version)) != Z_OK) 7089ee519a1fSgjelinek return (err); 7090ee519a1fSgjelinek return (Z_OK); 7091ee519a1fSgjelinek } 7092ee519a1fSgjelinek 7093ee519a1fSgjelinek static void 7094ee519a1fSgjelinek free_pkginfo(struct zone_pkginfo *infop) 7095ee519a1fSgjelinek { 7096ee519a1fSgjelinek free(infop->zpi_version); 7097ee519a1fSgjelinek if (infop->zpi_patch_cnt > 0) { 7098ee519a1fSgjelinek int i; 7099ee519a1fSgjelinek 7100ee519a1fSgjelinek for (i = 0; i < infop->zpi_patch_cnt; i++) 7101ee519a1fSgjelinek free(infop->zpi_patchinfo[i]); 7102ee519a1fSgjelinek free(infop->zpi_patchinfo); 7103ee519a1fSgjelinek } 7104ee519a1fSgjelinek } 7105ee519a1fSgjelinek 7106ee519a1fSgjelinek /* 7107ee519a1fSgjelinek * Read the pkginfo file and populate the structure with the data we need 7108ee519a1fSgjelinek * from this pkg for a sw inventory. 7109ee519a1fSgjelinek */ 7110ee519a1fSgjelinek static int 7111ee519a1fSgjelinek get_pkginfo(char *pkginfo, struct zone_pkginfo *infop) 7112ee519a1fSgjelinek { 7113ee519a1fSgjelinek FILE *fp; 7114ee519a1fSgjelinek char *buf; 7115ee519a1fSgjelinek int err = 0; 7116ee519a1fSgjelinek 7117ee519a1fSgjelinek infop->zpi_all_zones = B_FALSE; 7118ee519a1fSgjelinek infop->zpi_this_zone = B_FALSE; 7119ee519a1fSgjelinek infop->zpi_version = NULL; 7120ee519a1fSgjelinek infop->zpi_patch_cnt = 0; 7121ee519a1fSgjelinek infop->zpi_patchinfo = NULL; 7122ee519a1fSgjelinek 7123ee519a1fSgjelinek if ((fp = fopen(pkginfo, "r")) == NULL) 7124ee519a1fSgjelinek return (errno); 7125ee519a1fSgjelinek 7126ee519a1fSgjelinek while ((buf = read_pkg_data(fp)) != NULL) { 7127ee519a1fSgjelinek if (strncmp(buf, VERSION, sizeof (VERSION) - 1) == 0) { 7128ee519a1fSgjelinek int len; 7129ee519a1fSgjelinek 7130ee519a1fSgjelinek if ((infop->zpi_version = 7131ee519a1fSgjelinek strdup(buf + sizeof (VERSION) - 1)) == NULL) { 7132ee519a1fSgjelinek err = ENOMEM; 7133ee519a1fSgjelinek break; 7134ee519a1fSgjelinek } 7135ee519a1fSgjelinek 7136ee519a1fSgjelinek /* remove trailing newline */ 7137ee519a1fSgjelinek len = strlen(infop->zpi_version); 7138ee519a1fSgjelinek *(infop->zpi_version + len - 1) = 0; 7139ee519a1fSgjelinek 714045916cd2Sjpk } else if (strcmp(buf, SUNW_PKG_ALL_ZONES) == 0) { 7141ee519a1fSgjelinek infop->zpi_all_zones = B_TRUE; 7142ee519a1fSgjelinek 714345916cd2Sjpk } else if (strcmp(buf, SUNW_PKG_THIS_ZONE) == 0) { 7144ee519a1fSgjelinek infop->zpi_this_zone = B_TRUE; 7145ee519a1fSgjelinek 7146ee519a1fSgjelinek } else if (strncmp(buf, PATCHINFO, sizeof (PATCHINFO) - 1) 7147ee519a1fSgjelinek == 0) { 7148ee519a1fSgjelinek char **p; 7149ee519a1fSgjelinek 7150ee519a1fSgjelinek if ((p = (char **)realloc(infop->zpi_patchinfo, 7151ee519a1fSgjelinek sizeof (char *) * (infop->zpi_patch_cnt + 1))) 7152ee519a1fSgjelinek == NULL) { 7153ee519a1fSgjelinek err = ENOMEM; 7154ee519a1fSgjelinek break; 7155ee519a1fSgjelinek } 7156ee519a1fSgjelinek infop->zpi_patchinfo = p; 7157ee519a1fSgjelinek 7158ee519a1fSgjelinek if ((infop->zpi_patchinfo[infop->zpi_patch_cnt] = 7159ee519a1fSgjelinek strdup(buf)) == NULL) { 7160ee519a1fSgjelinek err = ENOMEM; 7161ee519a1fSgjelinek break; 7162ee519a1fSgjelinek } 7163ee519a1fSgjelinek infop->zpi_patch_cnt++; 7164ee519a1fSgjelinek } 7165ee519a1fSgjelinek 7166ee519a1fSgjelinek free(buf); 7167ee519a1fSgjelinek } 7168ee519a1fSgjelinek 7169ee519a1fSgjelinek free(buf); 7170ee519a1fSgjelinek 7171ee519a1fSgjelinek if (errno == ENOMEM) { 7172ee519a1fSgjelinek err = ENOMEM; 7173ee519a1fSgjelinek /* Clean up anything we did manage to allocate. */ 7174ee519a1fSgjelinek free_pkginfo(infop); 7175ee519a1fSgjelinek } 7176ee519a1fSgjelinek 7177ee519a1fSgjelinek (void) fclose(fp); 7178ee519a1fSgjelinek 7179ee519a1fSgjelinek return (err); 7180ee519a1fSgjelinek } 7181ee519a1fSgjelinek 7182ee519a1fSgjelinek /* 7183ee519a1fSgjelinek * Take a software inventory of the global zone. We need to get the set of 7184ee519a1fSgjelinek * packages and patches that are on the global zone that the specified 7185ee519a1fSgjelinek * non-global zone depends on. The packages we need in the inventory are: 7186ee519a1fSgjelinek * 7187ee519a1fSgjelinek * - skip the package if SUNW_PKG_THISZONE is 'true' 7188ee519a1fSgjelinek * otherwise, 7189ee519a1fSgjelinek * - add the package if 7190ee519a1fSgjelinek * a) SUNW_PKG_ALLZONES is 'true', 7191ee519a1fSgjelinek * or 7192ee519a1fSgjelinek * b) any file delivered by the package is in a file system that is inherited 7193ee519a1fSgjelinek * from the global zone. 7194ee519a1fSgjelinek * If the zone does not inherit any file systems (whole root) 7195ee519a1fSgjelinek * then (b) will be skipped. 7196ee519a1fSgjelinek * 7197ee519a1fSgjelinek * For each of the packages that is being added to the inventory, we will also 7198ee519a1fSgjelinek * add all of the associated, unique patches to the inventory. 7199ee519a1fSgjelinek */ 7200ee519a1fSgjelinek static int 7201ee519a1fSgjelinek zonecfg_sw_inventory(zone_dochandle_t handle) 7202ee519a1fSgjelinek { 7203ee519a1fSgjelinek char pkginfo[MAXPATHLEN]; 7204ee519a1fSgjelinek int res; 7205ee519a1fSgjelinek struct dirent *dp; 7206ee519a1fSgjelinek DIR *dirp; 7207ee519a1fSgjelinek struct stat buf; 7208ee519a1fSgjelinek struct zone_pkginfo info; 7209ee519a1fSgjelinek int pkg_cnt = 0; 7210ee519a1fSgjelinek char **pkgs = NULL; 7211ee519a1fSgjelinek 7212ee519a1fSgjelinek if ((res = get_ipd_pkgs(handle, &pkgs, &pkg_cnt)) != Z_OK) 7213ee519a1fSgjelinek return (res); 7214ee519a1fSgjelinek 7215ee519a1fSgjelinek if ((dirp = opendir(PKG_PATH)) == NULL) { 7216ee519a1fSgjelinek free_ipd_pkgs(pkgs, pkg_cnt); 7217ee519a1fSgjelinek return (Z_OK); 7218ee519a1fSgjelinek } 7219ee519a1fSgjelinek 7220ee519a1fSgjelinek while ((dp = readdir(dirp)) != (struct dirent *)0) { 7221ee519a1fSgjelinek if (strcmp(dp->d_name, ".") == 0 || 7222ee519a1fSgjelinek strcmp(dp->d_name, "..") == 0) 7223ee519a1fSgjelinek continue; 7224ee519a1fSgjelinek 7225ee519a1fSgjelinek (void) snprintf(pkginfo, sizeof (pkginfo), "%s/%s/pkginfo", 7226ee519a1fSgjelinek PKG_PATH, dp->d_name); 7227ee519a1fSgjelinek 7228ee519a1fSgjelinek if (stat(pkginfo, &buf) == -1 || !S_ISREG(buf.st_mode)) 7229ee519a1fSgjelinek continue; 7230ee519a1fSgjelinek 7231ee519a1fSgjelinek if (get_pkginfo(pkginfo, &info) != 0) { 7232ee519a1fSgjelinek res = Z_NOMEM; 7233ee519a1fSgjelinek break; 7234ee519a1fSgjelinek } 7235ee519a1fSgjelinek 7236ee519a1fSgjelinek if (!info.zpi_this_zone && 7237ee519a1fSgjelinek (info.zpi_all_zones || 7238ee519a1fSgjelinek dir_pkg(dp->d_name, pkgs, pkg_cnt))) { 7239ee519a1fSgjelinek if ((res = add_pkg(handle, dp->d_name, 7240ee519a1fSgjelinek info.zpi_version)) == Z_OK) { 7241ee519a1fSgjelinek if (info.zpi_patch_cnt > 0) 7242ee519a1fSgjelinek res = add_patches(handle, &info); 7243ee519a1fSgjelinek } 7244ee519a1fSgjelinek } 7245ee519a1fSgjelinek 7246ee519a1fSgjelinek free_pkginfo(&info); 7247ee519a1fSgjelinek 7248ee519a1fSgjelinek if (res != Z_OK) 7249ee519a1fSgjelinek break; 7250ee519a1fSgjelinek } 7251ee519a1fSgjelinek 7252ee519a1fSgjelinek (void) closedir(dirp); 7253ee519a1fSgjelinek 7254ee519a1fSgjelinek free_ipd_pkgs(pkgs, pkg_cnt); 7255ee519a1fSgjelinek 7256ee519a1fSgjelinek if (res == Z_OK) 7257ee519a1fSgjelinek handle->zone_dh_sw_inv = B_TRUE; 7258ee519a1fSgjelinek 7259ee519a1fSgjelinek return (res); 7260ee519a1fSgjelinek } 7261ee519a1fSgjelinek 7262ee519a1fSgjelinek /* 7263ee519a1fSgjelinek * zonecfg_devwalk call-back function used during detach to generate the 7264ee519a1fSgjelinek * dev info in the manifest. 7265ee519a1fSgjelinek */ 7266ee519a1fSgjelinek static int 7267ee519a1fSgjelinek get_detach_dev_entry(const char *name, uid_t uid, gid_t gid, mode_t mode, 7268ee519a1fSgjelinek const char *acl, void *hdl) 7269ee519a1fSgjelinek { 7270ee519a1fSgjelinek zone_dochandle_t handle = (zone_dochandle_t)hdl; 7271ee519a1fSgjelinek xmlNodePtr newnode; 7272ee519a1fSgjelinek xmlNodePtr cur; 7273ee519a1fSgjelinek int err; 7274ee519a1fSgjelinek char buf[128]; 7275ee519a1fSgjelinek 7276ee519a1fSgjelinek if ((err = operation_prep(handle)) != Z_OK) 7277ee519a1fSgjelinek return (err); 7278ee519a1fSgjelinek 7279ee519a1fSgjelinek cur = handle->zone_dh_cur; 7280ee519a1fSgjelinek newnode = xmlNewTextChild(cur, NULL, DTD_ELEM_DEV_PERM, NULL); 7281ee519a1fSgjelinek if ((err = newprop(newnode, DTD_ATTR_NAME, (char *)name)) != Z_OK) 7282ee519a1fSgjelinek return (err); 7283ee519a1fSgjelinek (void) snprintf(buf, sizeof (buf), "%lu", uid); 7284ee519a1fSgjelinek if ((err = newprop(newnode, DTD_ATTR_UID, buf)) != Z_OK) 7285ee519a1fSgjelinek return (err); 7286ee519a1fSgjelinek (void) snprintf(buf, sizeof (buf), "%lu", gid); 7287ee519a1fSgjelinek if ((err = newprop(newnode, DTD_ATTR_GID, buf)) != Z_OK) 7288ee519a1fSgjelinek return (err); 7289ee519a1fSgjelinek (void) snprintf(buf, sizeof (buf), "%o", mode); 7290ee519a1fSgjelinek if ((err = newprop(newnode, DTD_ATTR_MODE, buf)) != Z_OK) 7291ee519a1fSgjelinek return (err); 7292ee519a1fSgjelinek if ((err = newprop(newnode, DTD_ATTR_ACL, (char *)acl)) != Z_OK) 7293ee519a1fSgjelinek return (err); 7294ee519a1fSgjelinek return (Z_OK); 7295ee519a1fSgjelinek } 7296ee519a1fSgjelinek 7297ee519a1fSgjelinek /* 7298ee519a1fSgjelinek * Get the information required to support detaching a zone. This is 7299ee519a1fSgjelinek * called on the source system when detaching (the detaching parameter should 7300ee519a1fSgjelinek * be set to true) and on the destination system before attaching (the 7301ee519a1fSgjelinek * detaching parameter should be false). 7302ee519a1fSgjelinek * 7303ee519a1fSgjelinek * For native Solaris zones, the detach/attach process involves validating 7304ee519a1fSgjelinek * that the software on the global zone can support the zone when we attach. 7305ee519a1fSgjelinek * To do this we take a software inventory of the global zone. We also 7306ee519a1fSgjelinek * have to keep track of the device configuration so that we can properly 7307ee519a1fSgjelinek * recreate it on the destination. 7308ee519a1fSgjelinek */ 7309ee519a1fSgjelinek int 7310ee519a1fSgjelinek zonecfg_get_detach_info(zone_dochandle_t handle, boolean_t detaching) 7311ee519a1fSgjelinek { 7312ee519a1fSgjelinek int res; 7313ee519a1fSgjelinek 7314ee519a1fSgjelinek if ((res = zonecfg_sw_inventory(handle)) != Z_OK) 7315ee519a1fSgjelinek return (res); 7316ee519a1fSgjelinek 7317ee519a1fSgjelinek if (detaching) 7318ee519a1fSgjelinek res = zonecfg_devwalk(handle, get_detach_dev_entry, handle); 7319ee519a1fSgjelinek 7320ee519a1fSgjelinek return (res); 7321ee519a1fSgjelinek } 7322