1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 /* 27 * Copyright 2020, Joyent, Inc. All rights reserved. 28 */ 29 30 /* 31 * svcadm - request adminstrative actions for service instances 32 */ 33 34 #include <locale.h> 35 #include <libintl.h> 36 #include <libscf.h> 37 #include <libscf_priv.h> 38 #include <libcontract.h> 39 #include <libcontract_priv.h> 40 #include <sys/contract/process.h> 41 #include <libuutil.h> 42 #include <stddef.h> 43 #include <stdio.h> 44 #include <stdlib.h> 45 #include <string.h> 46 #include <unistd.h> 47 #include <fcntl.h> 48 #include <procfs.h> 49 #include <assert.h> 50 #include <errno.h> 51 #include <zone.h> 52 53 #ifndef TEXT_DOMAIN 54 #define TEXT_DOMAIN "SUNW_OST_OSCMD" 55 #endif /* TEXT_DOMAIN */ 56 57 /* Must be a power of two */ 58 #define HT_BUCKETS 64 59 60 /* 61 * Exit codes for enable and disable -s. 62 */ 63 #define EXIT_SVC_FAILURE 3 64 #define EXIT_DEP_FAILURE 4 65 66 #define WALK_FLAGS (SCF_WALK_UNIPARTIAL | SCF_WALK_MULTIPLE) 67 68 /* 69 * How long we will wait (in seconds) for a service to change state 70 * before re-checking its dependencies. 71 */ 72 #define WAIT_INTERVAL 3 73 74 #define bad_error(func, err) \ 75 uu_panic("%s:%d: %s() failed with unexpected error %d.\n", \ 76 __FILE__, __LINE__, (func), (err)); 77 78 struct ht_elt { 79 struct ht_elt *next; 80 boolean_t active; 81 char str[1]; 82 }; 83 84 85 /* 86 * Callback data for enable/disable. 87 */ 88 #define SET_ENABLED 0x1 89 #define SET_TEMPORARY 0x2 90 #define SET_RECURSIVE 0x4 91 92 typedef struct { 93 char ed_comment[SCF_COMMENT_MAX_LENGTH]; 94 int ed_flags; 95 } enable_data_t; 96 97 98 scf_handle_t *h; 99 ssize_t max_scf_fmri_sz; 100 static const char *emsg_permission_denied; 101 static const char *emsg_nomem; 102 static const char *emsg_create_pg_perm_denied; 103 static const char *emsg_pg_perm_denied; 104 static const char *emsg_prop_perm_denied; 105 static const char *emsg_no_service; 106 107 static int exit_status = 0; 108 static int verbose = 0; 109 static char *scratch_fmri; 110 static char *g_zonename = NULL; 111 static char svcstate[80]; 112 static boolean_t svcsearch = B_FALSE; 113 114 static struct ht_elt **visited; 115 116 void do_scfdie(int lineno) __NORETURN; 117 static void usage_milestone(void) __NORETURN; 118 static void set_astring_prop(const char *, const char *, const char *, 119 uint32_t, const char *, const char *); 120 static void pr_warn(const char *format, ...); 121 122 /* 123 * Visitors from synch.c, needed for enable -s and disable -s. 124 */ 125 extern int is_enabled(scf_instance_t *); 126 extern int has_potential(scf_instance_t *, int); 127 128 void 129 do_scfdie(int lineno) 130 { 131 scf_error_t err; 132 133 switch (err = scf_error()) { 134 case SCF_ERROR_CONNECTION_BROKEN: 135 uu_die(gettext("Connection to repository server broken. " 136 "Exiting.\n")); 137 /* NOTREACHED */ 138 139 case SCF_ERROR_BACKEND_READONLY: 140 uu_die(gettext("Repository is read-only. Exiting.\n")); 141 /* NOTREACHED */ 142 143 default: 144 #ifdef NDEBUG 145 uu_die(gettext("Unexpected libscf error: %s. Exiting.\n"), 146 scf_strerror(err)); 147 #else 148 uu_die("Unexpected libscf error on line %d: %s.\n", lineno, 149 scf_strerror(err)); 150 #endif 151 } 152 } 153 154 #define scfdie() do_scfdie(__LINE__) 155 156 static void 157 usage() 158 { 159 (void) fprintf(stderr, gettext( 160 "Usage: %1$s [-S <state>] [-v] [-Z | -z zone] [cmd [args ... ]]\n\n" 161 "\t%1$s enable [-rst] [<service> ...]\t- enable and online service(s)\n" 162 "\t%1$s disable [-c comment] [-st] [<service> ...] - disable " 163 "service(s)\n" 164 "\t%1$s restart [-d] [<service> ...]\t- restart specified service(s)\n" 165 "\t%1$s refresh [<service> ...]\t\t- re-read service configuration\n" 166 "\t%1$s mark [-It] <state> [<service> ...] - set maintenance state\n" 167 "\t%1$s clear [<service> ...]\t\t- clear maintenance state\n" 168 "\t%1$s milestone [-d] <milestone>\t- advance to a service milestone\n" 169 "\n\t" 170 "Services can be specified using an FMRI, abbreviation, or fnmatch(5)\n" 171 "\tpattern, as shown in these examples for svc:/network/smtp:sendmail\n" 172 "\n" 173 "\t%1$s <cmd> svc:/network/smtp:sendmail\n" 174 "\t%1$s <cmd> network/smtp:sendmail\n" 175 "\t%1$s <cmd> network/*mail\n" 176 "\t%1$s <cmd> network/smtp\n" 177 "\t%1$s <cmd> smtp:sendmail\n" 178 "\t%1$s <cmd> smtp\n" 179 "\t%1$s <cmd> sendmail\n"), uu_getpname()); 180 181 exit(UU_EXIT_USAGE); 182 } 183 184 185 /* 186 * FMRI hash table for recursive enable. 187 */ 188 189 static uint32_t 190 hash_fmri(const char *str) 191 { 192 uint32_t h = 0, g; 193 const char *p; 194 195 /* Generic hash function from uts/common/os/modhash.c . */ 196 for (p = str; *p != '\0'; ++p) { 197 h = (h << 4) + *p; 198 if ((g = (h & 0xf0000000)) != 0) { 199 h ^= (g >> 24); 200 h ^= g; 201 } 202 } 203 204 return (h); 205 } 206 207 /* 208 * Return 1 if str has been visited, 0 if it has not, and -1 if memory could not 209 * be allocated. 210 */ 211 static int 212 visited_find_or_add(const char *str, struct ht_elt **hep) 213 { 214 uint32_t h; 215 uint_t i; 216 struct ht_elt *he; 217 218 h = hash_fmri(str); 219 i = h & (HT_BUCKETS - 1); 220 221 for (he = visited[i]; he != NULL; he = he->next) { 222 if (strcmp(he->str, str) == 0) { 223 if (hep) 224 *hep = he; 225 return (1); 226 } 227 } 228 229 he = malloc(offsetof(struct ht_elt, str) + strlen(str) + 1); 230 if (he == NULL) 231 return (-1); 232 233 (void) strcpy(he->str, str); 234 235 he->next = visited[i]; 236 visited[i] = he; 237 238 if (hep) 239 *hep = he; 240 return (0); 241 } 242 243 244 /* 245 * Returns 0, ECANCELED if pg is deleted, ENOENT if propname doesn't exist, 246 * EINVAL if the property is not of boolean type or has no values, and E2BIG 247 * if it has more than one value. *bp is set if 0 or E2BIG is returned. 248 */ 249 int 250 get_bool_prop(scf_propertygroup_t *pg, const char *propname, uint8_t *bp) 251 { 252 scf_property_t *prop; 253 scf_value_t *val; 254 int ret; 255 256 if ((prop = scf_property_create(h)) == NULL || 257 (val = scf_value_create(h)) == NULL) 258 scfdie(); 259 260 if (scf_pg_get_property(pg, propname, prop) != 0) { 261 switch (scf_error()) { 262 case SCF_ERROR_DELETED: 263 ret = ECANCELED; 264 goto out; 265 266 case SCF_ERROR_NOT_FOUND: 267 ret = ENOENT; 268 goto out; 269 270 case SCF_ERROR_NOT_SET: 271 assert(0); 272 abort(); 273 /* NOTREACHED */ 274 275 default: 276 scfdie(); 277 } 278 } 279 280 if (scf_property_get_value(prop, val) == 0) { 281 ret = 0; 282 } else { 283 switch (scf_error()) { 284 case SCF_ERROR_DELETED: 285 ret = ENOENT; 286 goto out; 287 288 case SCF_ERROR_NOT_FOUND: 289 ret = EINVAL; 290 goto out; 291 292 case SCF_ERROR_CONSTRAINT_VIOLATED: 293 ret = E2BIG; 294 break; 295 296 case SCF_ERROR_NOT_SET: 297 assert(0); 298 abort(); 299 /* NOTREACHED */ 300 301 default: 302 scfdie(); 303 } 304 } 305 306 if (scf_value_get_boolean(val, bp) != 0) { 307 if (scf_error() != SCF_ERROR_TYPE_MISMATCH) 308 scfdie(); 309 310 ret = EINVAL; 311 goto out; 312 } 313 314 out: 315 scf_value_destroy(val); 316 scf_property_destroy(prop); 317 return (ret); 318 } 319 320 /* 321 * Returns 0, EPERM, or EROFS. 322 */ 323 static int 324 set_bool_prop(scf_propertygroup_t *pg, const char *propname, boolean_t b) 325 { 326 scf_value_t *v; 327 scf_transaction_t *tx; 328 scf_transaction_entry_t *ent; 329 int ret = 0, r; 330 331 if ((tx = scf_transaction_create(h)) == NULL || 332 (ent = scf_entry_create(h)) == NULL || 333 (v = scf_value_create(h)) == NULL) 334 scfdie(); 335 336 scf_value_set_boolean(v, b); 337 338 for (;;) { 339 if (scf_transaction_start(tx, pg) == -1) { 340 switch (scf_error()) { 341 case SCF_ERROR_PERMISSION_DENIED: 342 ret = EPERM; 343 goto out; 344 345 case SCF_ERROR_BACKEND_READONLY: 346 ret = EROFS; 347 goto out; 348 349 default: 350 scfdie(); 351 } 352 } 353 354 if (scf_transaction_property_change_type(tx, ent, propname, 355 SCF_TYPE_BOOLEAN) != 0) { 356 if (scf_error() != SCF_ERROR_NOT_FOUND) 357 scfdie(); 358 359 if (scf_transaction_property_new(tx, ent, propname, 360 SCF_TYPE_BOOLEAN) != 0) 361 scfdie(); 362 } 363 364 r = scf_entry_add_value(ent, v); 365 assert(r == 0); 366 367 r = scf_transaction_commit(tx); 368 if (r == 1) 369 break; 370 371 scf_transaction_reset(tx); 372 373 if (r != 0) { 374 switch (scf_error()) { 375 case SCF_ERROR_PERMISSION_DENIED: 376 ret = EPERM; 377 goto out; 378 379 case SCF_ERROR_BACKEND_READONLY: 380 ret = EROFS; 381 goto out; 382 383 default: 384 scfdie(); 385 } 386 } 387 388 if (scf_pg_update(pg) == -1) 389 scfdie(); 390 } 391 392 out: 393 scf_transaction_destroy(tx); 394 scf_entry_destroy(ent); 395 scf_value_destroy(v); 396 return (ret); 397 } 398 399 /* 400 * Gets the single astring value of the propname property of pg. prop & v are 401 * scratch space. Returns the length of the string on success or 402 * -ENOENT - pg has no property named propname 403 * -E2BIG - property has no values or multiple values 404 * -EINVAL - property type is not compatible with astring 405 */ 406 ssize_t 407 get_astring_prop(const scf_propertygroup_t *pg, const char *propname, 408 scf_property_t *prop, scf_value_t *v, char *buf, size_t bufsz) 409 { 410 ssize_t sz; 411 412 if (scf_pg_get_property(pg, propname, prop) != 0) { 413 if (scf_error() != SCF_ERROR_NOT_FOUND) 414 scfdie(); 415 416 return (-ENOENT); 417 } 418 419 if (scf_property_get_value(prop, v) != 0) { 420 switch (scf_error()) { 421 case SCF_ERROR_NOT_FOUND: 422 case SCF_ERROR_CONSTRAINT_VIOLATED: 423 return (-E2BIG); 424 425 default: 426 scfdie(); 427 } 428 } 429 430 sz = scf_value_get_astring(v, buf, bufsz); 431 if (sz < 0) { 432 if (scf_error() != SCF_ERROR_TYPE_MISMATCH) 433 scfdie(); 434 435 return (-EINVAL); 436 } 437 438 return (sz); 439 } 440 441 /* 442 * Returns 0 or EPERM. 443 */ 444 static int 445 pg_get_or_add(const scf_instance_t *inst, const char *pgname, 446 const char *pgtype, uint32_t pgflags, scf_propertygroup_t *pg) 447 { 448 again: 449 if (scf_instance_get_pg(inst, pgname, pg) == 0) 450 return (0); 451 452 if (scf_error() != SCF_ERROR_NOT_FOUND) 453 scfdie(); 454 455 if (scf_instance_add_pg(inst, pgname, pgtype, pgflags, pg) == 0) 456 return (0); 457 458 switch (scf_error()) { 459 case SCF_ERROR_EXISTS: 460 goto again; 461 462 case SCF_ERROR_PERMISSION_DENIED: 463 return (EPERM); 464 465 default: 466 scfdie(); 467 /* NOTREACHED */ 468 } 469 } 470 471 static int 472 my_ct_name(char *out, size_t len) 473 { 474 ct_stathdl_t st; 475 char *ct_fmri; 476 ctid_t ct; 477 int fd, errno, ret; 478 479 if ((ct = getctid()) == -1) 480 uu_die(gettext("Could not get contract id for process")); 481 482 fd = contract_open(ct, "process", "status", O_RDONLY); 483 484 if ((errno = ct_status_read(fd, CTD_ALL, &st)) != 0) 485 uu_warn(gettext("Could not read status of contract " 486 "%ld: %s.\n"), ct, strerror(errno)); 487 488 if ((errno = ct_pr_status_get_svc_fmri(st, &ct_fmri)) != 0) 489 uu_warn(gettext("Could not get svc_fmri for contract " 490 "%ld: %s.\n"), ct, strerror(errno)); 491 492 ret = strlcpy(out, ct_fmri, len); 493 494 ct_status_free(st); 495 (void) close(fd); 496 497 return (ret); 498 } 499 500 /* 501 * Set auxiliary_tty and auxiliary_fmri properties in restarter_actions pg to 502 * communicate whether the action is requested from a tty and the fmri of the 503 * responsible process. 504 * 505 * Returns 0, EPERM, or EROFS 506 */ 507 static int 508 restarter_setup(const char *fmri, const scf_instance_t *inst) 509 { 510 boolean_t b = B_FALSE; 511 scf_propertygroup_t *pg = NULL; 512 int ret = 0; 513 514 if ((pg = scf_pg_create(h)) == NULL) 515 scfdie(); 516 517 if (pg_get_or_add(inst, SCF_PG_RESTARTER_ACTIONS, 518 SCF_PG_RESTARTER_ACTIONS_TYPE, SCF_PG_RESTARTER_ACTIONS_FLAGS, 519 pg) == EPERM) { 520 if (!verbose) 521 uu_warn(emsg_permission_denied, fmri); 522 else 523 uu_warn(emsg_create_pg_perm_denied, fmri, 524 SCF_PG_RESTARTER_ACTIONS); 525 526 ret = EPERM; 527 goto out; 528 } 529 530 /* Set auxiliary_tty property */ 531 if (isatty(STDIN_FILENO)) 532 b = B_TRUE; 533 534 /* Create and set state to disabled */ 535 switch (set_bool_prop(pg, SCF_PROPERTY_AUX_TTY, b)) { 536 case 0: 537 break; 538 539 case EPERM: 540 if (!verbose) 541 uu_warn(emsg_permission_denied, fmri); 542 else 543 uu_warn(emsg_prop_perm_denied, fmri, 544 SCF_PG_RESTARTER_ACTIONS, SCF_PROPERTY_AUX_TTY); 545 546 ret = EPERM; 547 goto out; 548 /* NOTREACHED */ 549 550 case EROFS: 551 /* Shouldn't happen, but it can. */ 552 if (!verbose) 553 uu_warn(gettext("%s: Repository read-only.\n"), fmri); 554 else 555 uu_warn(gettext("%s: Could not set %s/%s " 556 "(repository read-only).\n"), fmri, 557 SCF_PG_RESTARTER_ACTIONS, SCF_PROPERTY_AUX_TTY); 558 559 ret = EROFS; 560 goto out; 561 /* NOTREACHED */ 562 563 default: 564 scfdie(); 565 } 566 567 if (my_ct_name(scratch_fmri, max_scf_fmri_sz) > 0) { 568 set_astring_prop(fmri, SCF_PG_RESTARTER_ACTIONS, 569 SCF_PG_RESTARTER_ACTIONS_TYPE, 570 SCF_PG_RESTARTER_ACTIONS_FLAGS, 571 SCF_PROPERTY_AUX_FMRI, scratch_fmri); 572 } else { 573 uu_warn(gettext("%s: Could not set %s/%s: " 574 "my_ct_name failed.\n"), fmri, 575 SCF_PG_RESTARTER_ACTIONS, SCF_PROPERTY_AUX_FMRI); 576 } 577 578 out: 579 scf_pg_destroy(pg); 580 return (ret); 581 } 582 583 static int 584 delete_prop(const char *fmri, scf_instance_t *inst, const char *pgname, 585 const char *propname) 586 { 587 int r = scf_instance_delete_prop(inst, pgname, propname); 588 589 switch (r) { 590 case 0: 591 break; 592 593 case ECANCELED: 594 uu_warn(emsg_no_service, fmri); 595 break; 596 597 case EACCES: 598 uu_warn(gettext("Could not delete %s/%s " 599 "property of %s: backend access denied.\n"), 600 pgname, propname, fmri); 601 break; 602 603 case EROFS: 604 uu_warn(gettext("Could not delete %s/%s " 605 "property of %s: backend is read-only.\n"), 606 pgname, propname, fmri); 607 break; 608 609 default: 610 bad_error("scf_instance_delete_prop", r); 611 } 612 613 return (r); 614 } 615 616 /* 617 * Returns 0, EPERM, or EROFS. 618 */ 619 static int 620 set_enabled_props(scf_propertygroup_t *pg, enable_data_t *ed) 621 { 622 scf_transaction_entry_t *ent1; 623 scf_transaction_entry_t *ent2; 624 scf_transaction_t *tx; 625 scf_value_t *v2; 626 scf_value_t *v1; 627 int ret = 0, r; 628 629 if ((tx = scf_transaction_create(h)) == NULL || 630 (ent1 = scf_entry_create(h)) == NULL || 631 (ent2 = scf_entry_create(h)) == NULL || 632 (v1 = scf_value_create(h)) == NULL || 633 (v2 = scf_value_create(h)) == NULL) 634 scfdie(); 635 636 for (;;) { 637 if (scf_transaction_start(tx, pg) == -1) { 638 switch (scf_error()) { 639 case SCF_ERROR_PERMISSION_DENIED: 640 ret = EPERM; 641 goto out; 642 643 case SCF_ERROR_BACKEND_READONLY: 644 ret = EROFS; 645 goto out; 646 647 default: 648 scfdie(); 649 } 650 } 651 652 if (scf_transaction_property_change_type(tx, ent1, 653 SCF_PROPERTY_ENABLED, SCF_TYPE_BOOLEAN) != 0) { 654 if (scf_error() != SCF_ERROR_NOT_FOUND) 655 scfdie(); 656 657 if (scf_transaction_property_new(tx, ent1, 658 SCF_PROPERTY_ENABLED, SCF_TYPE_BOOLEAN) != 0) 659 scfdie(); 660 } 661 662 scf_value_set_boolean(v1, !!(ed->ed_flags & SET_ENABLED)); 663 664 r = scf_entry_add_value(ent1, v1); 665 assert(r == 0); 666 667 if (scf_transaction_property_change_type(tx, ent2, 668 SCF_PROPERTY_COMMENT, SCF_TYPE_ASTRING) != 0) { 669 if (scf_error() != SCF_ERROR_NOT_FOUND) 670 scfdie(); 671 672 if (scf_transaction_property_new(tx, ent2, 673 SCF_PROPERTY_COMMENT, SCF_TYPE_ASTRING) != 0) 674 scfdie(); 675 } 676 677 if (scf_value_set_astring(v2, ed->ed_comment) != SCF_SUCCESS) 678 scfdie(); 679 680 if (scf_entry_add_value(ent2, v2) != SCF_SUCCESS) 681 scfdie(); 682 683 r = scf_transaction_commit(tx); 684 if (r == 1) 685 break; 686 687 scf_transaction_reset(tx); 688 689 if (r != 0) { 690 switch (scf_error()) { 691 case SCF_ERROR_PERMISSION_DENIED: 692 ret = EPERM; 693 goto out; 694 695 case SCF_ERROR_BACKEND_READONLY: 696 ret = EROFS; 697 goto out; 698 699 default: 700 scfdie(); 701 } 702 } 703 704 if (scf_pg_update(pg) == -1) 705 scfdie(); 706 } 707 708 out: 709 scf_transaction_destroy(tx); 710 scf_entry_destroy(ent1); 711 scf_entry_destroy(ent2); 712 scf_value_destroy(v1); 713 scf_value_destroy(v2); 714 return (ret); 715 } 716 717 /* 718 * Enable or disable an instance. SET_TEMPORARY modifications apply to 719 * general_ovr/ property group. 720 */ 721 static void 722 set_inst_enabled(const char *fmri, scf_instance_t *inst, enable_data_t *ed) 723 { 724 scf_propertygroup_t *pg; 725 uint8_t b; 726 const char *pgname = NULL; /* For emsg_pg_perm_denied */ 727 728 pg = scf_pg_create(h); 729 if (pg == NULL) 730 scfdie(); 731 732 if (restarter_setup(fmri, inst)) 733 goto out; 734 735 /* 736 * An instance's configuration is incomplete if general/enabled 737 * doesn't exist. Create both the property group and property 738 * here if they don't exist. 739 */ 740 pgname = SCF_PG_GENERAL; 741 if (pg_get_or_add(inst, pgname, SCF_PG_GENERAL_TYPE, 742 SCF_PG_GENERAL_FLAGS, pg) != 0) 743 goto eperm; 744 745 if (get_bool_prop(pg, SCF_PROPERTY_ENABLED, &b) != 0) { 746 /* Create and set state to disabled */ 747 switch (set_bool_prop(pg, SCF_PROPERTY_ENABLED, B_FALSE)) { 748 case 0: 749 break; 750 751 case EPERM: 752 goto eperm; 753 754 case EROFS: 755 /* Shouldn't happen, but it can. */ 756 if (!verbose) 757 uu_warn(gettext("%s: Repository read-only.\n"), 758 fmri); 759 else 760 uu_warn(gettext("%s: Could not set %s/%s " 761 "(repository read-only).\n"), fmri, 762 SCF_PG_GENERAL, SCF_PROPERTY_ENABLED); 763 goto out; 764 765 default: 766 assert(0); 767 abort(); 768 } 769 } 770 771 if (ed->ed_flags & SET_TEMPORARY) { 772 pgname = SCF_PG_GENERAL_OVR; 773 if (pg_get_or_add(inst, pgname, SCF_PG_GENERAL_OVR_TYPE, 774 SCF_PG_GENERAL_OVR_FLAGS, pg) != 0) 775 goto eperm; 776 777 switch (set_enabled_props(pg, ed)) { 778 case 0: 779 break; 780 781 case EPERM: 782 goto eperm; 783 784 case EROFS: 785 /* Shouldn't happen, but it can. */ 786 if (!verbose) 787 uu_warn(gettext("%s: Repository read-only.\n"), 788 fmri); 789 else 790 uu_warn(gettext("%s: Could not set %s/%s " 791 "(repository read-only).\n"), fmri, 792 SCF_PG_GENERAL_OVR, SCF_PROPERTY_ENABLED); 793 goto out; 794 795 default: 796 assert(0); 797 abort(); 798 } 799 800 if (verbose) 801 (void) printf((ed->ed_flags & SET_ENABLED) ? 802 gettext("%s temporarily enabled.\n") : 803 gettext("%s temporarily disabled.\n"), fmri); 804 } else { 805 again: 806 /* 807 * Both pg and property should exist since we created 808 * them earlier. However, there's still a chance that 809 * someone may have deleted the property out from under 810 * us. 811 */ 812 if (pg_get_or_add(inst, pgname, SCF_PG_GENERAL_TYPE, 813 SCF_PG_GENERAL_FLAGS, pg) != 0) 814 goto eperm; 815 816 switch (set_enabled_props(pg, ed)) { 817 case 0: 818 break; 819 820 case EPERM: 821 goto eperm; 822 823 case EROFS: 824 /* 825 * If general/enabled is already set the way we want, 826 * proceed. 827 */ 828 switch (get_bool_prop(pg, SCF_PROPERTY_ENABLED, &b)) { 829 case 0: 830 if (!(b) == !(ed->ed_flags & SET_ENABLED)) 831 break; 832 /* FALLTHROUGH */ 833 834 case ENOENT: 835 case EINVAL: 836 case E2BIG: 837 if (!verbose) 838 uu_warn(gettext("%s: Repository " 839 "read-only.\n"), fmri); 840 else 841 uu_warn(gettext("%s: Could not set " 842 "%s/%s (repository read-only).\n"), 843 fmri, SCF_PG_GENERAL, 844 SCF_PROPERTY_ENABLED); 845 goto out; 846 847 case ECANCELED: 848 goto again; 849 850 default: 851 assert(0); 852 abort(); 853 } 854 break; 855 856 default: 857 assert(0); 858 abort(); 859 } 860 861 switch (delete_prop(fmri, inst, SCF_PG_GENERAL_OVR, 862 SCF_PROPERTY_ENABLED)) { 863 case 0: 864 break; 865 866 case EPERM: 867 goto eperm; 868 869 default: 870 goto out; 871 } 872 873 switch (delete_prop(fmri, inst, SCF_PG_GENERAL_OVR, 874 SCF_PROPERTY_COMMENT)) { 875 case 0: 876 break; 877 878 case EPERM: 879 goto eperm; 880 881 default: 882 goto out; 883 } 884 885 if (verbose) { 886 (void) printf((ed->ed_flags & SET_ENABLED) ? 887 gettext("%s enabled.\n") : 888 gettext("%s disabled.\n"), fmri); 889 } 890 } 891 892 scf_pg_destroy(pg); 893 return; 894 895 eperm: 896 assert(pgname != NULL); 897 if (!verbose) 898 uu_warn(emsg_permission_denied, fmri); 899 else 900 uu_warn(emsg_pg_perm_denied, fmri, pgname); 901 902 out: 903 scf_pg_destroy(pg); 904 exit_status = 1; 905 } 906 907 /* 908 * Set inst to the instance which corresponds to fmri. If fmri identifies 909 * a service with a single instance, get that instance. 910 * 911 * Fails with 912 * ENOTSUP - fmri has an unsupported scheme 913 * EINVAL - fmri is invalid 914 * ENOTDIR - fmri does not identify a service or instance 915 * ENOENT - could not locate instance 916 * E2BIG - fmri is a service with multiple instances (warning not printed) 917 */ 918 static int 919 get_inst_mult(const char *fmri, scf_instance_t *inst) 920 { 921 char *cfmri; 922 const char *svc_name, *inst_name, *pg_name; 923 scf_service_t *svc; 924 scf_instance_t *inst2; 925 scf_iter_t *iter; 926 int ret; 927 928 if (strncmp(fmri, "lrc:", sizeof ("lrc:") - 1) == 0) { 929 uu_warn(gettext("FMRI \"%s\" is a legacy service.\n"), fmri); 930 exit_status = 1; 931 return (ENOTSUP); 932 } 933 934 cfmri = strdup(fmri); 935 if (cfmri == NULL) 936 uu_die(emsg_nomem); 937 938 if (scf_parse_svc_fmri(cfmri, NULL, &svc_name, &inst_name, &pg_name, 939 NULL) != SCF_SUCCESS) { 940 free(cfmri); 941 uu_warn(gettext("FMRI \"%s\" is invalid.\n"), fmri); 942 exit_status = 1; 943 return (EINVAL); 944 } 945 946 free(cfmri); 947 948 if (svc_name == NULL || pg_name != NULL) { 949 uu_warn(gettext( 950 "FMRI \"%s\" does not designate a service or instance.\n"), 951 fmri); 952 exit_status = 1; 953 return (ENOTDIR); 954 } 955 956 if (inst_name != NULL) { 957 if (scf_handle_decode_fmri(h, fmri, NULL, NULL, inst, NULL, 958 NULL, SCF_DECODE_FMRI_EXACT) == 0) 959 return (0); 960 961 if (scf_error() != SCF_ERROR_NOT_FOUND) 962 scfdie(); 963 964 uu_warn(gettext("No such instance \"%s\".\n"), fmri); 965 exit_status = 1; 966 967 return (ENOENT); 968 } 969 970 if ((svc = scf_service_create(h)) == NULL || 971 (inst2 = scf_instance_create(h)) == NULL || 972 (iter = scf_iter_create(h)) == NULL) 973 scfdie(); 974 975 if (scf_handle_decode_fmri(h, fmri, NULL, svc, NULL, NULL, NULL, 976 SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS) { 977 if (scf_error() != SCF_ERROR_NOT_FOUND) 978 scfdie(); 979 980 uu_warn(emsg_no_service, fmri); 981 exit_status = 1; 982 983 ret = ENOENT; 984 goto out; 985 } 986 987 /* If the service has only one child, use it. */ 988 if (scf_iter_service_instances(iter, svc) != SCF_SUCCESS) 989 scfdie(); 990 991 ret = scf_iter_next_instance(iter, inst); 992 if (ret < 0) 993 scfdie(); 994 if (ret != 1) { 995 uu_warn(gettext("Service \"%s\" has no instances.\n"), 996 fmri); 997 exit_status = 1; 998 ret = ENOENT; 999 goto out; 1000 } 1001 1002 ret = scf_iter_next_instance(iter, inst2); 1003 if (ret < 0) 1004 scfdie(); 1005 1006 if (ret != 0) { 1007 ret = E2BIG; 1008 goto out; 1009 } 1010 1011 ret = 0; 1012 1013 out: 1014 scf_iter_destroy(iter); 1015 scf_instance_destroy(inst2); 1016 scf_service_destroy(svc); 1017 return (ret); 1018 } 1019 1020 /* 1021 * Same as get_inst_mult(), but on E2BIG prints a warning and returns ENOENT. 1022 */ 1023 static int 1024 get_inst(const char *fmri, scf_instance_t *inst) 1025 { 1026 int r; 1027 1028 r = get_inst_mult(fmri, inst); 1029 if (r != E2BIG) 1030 return (r); 1031 1032 uu_warn(gettext("operation on service %s is ambiguous; " 1033 "instance specification needed.\n"), fmri); 1034 return (ENOENT); 1035 } 1036 1037 static char * 1038 inst_get_fmri(const scf_instance_t *inst) 1039 { 1040 ssize_t sz; 1041 1042 sz = scf_instance_to_fmri(inst, scratch_fmri, max_scf_fmri_sz); 1043 if (sz < 0) 1044 scfdie(); 1045 if (sz >= max_scf_fmri_sz) 1046 uu_die(gettext("scf_instance_to_fmri() returned unexpectedly " 1047 "long value.\n")); 1048 1049 return (scratch_fmri); 1050 } 1051 1052 static ssize_t 1053 dep_get_astring(const char *fmri, const char *pgname, 1054 const scf_propertygroup_t *pg, const char *propname, scf_property_t *prop, 1055 scf_value_t *v, char *buf, size_t bufsz) 1056 { 1057 ssize_t sz; 1058 1059 sz = get_astring_prop(pg, propname, prop, v, buf, bufsz); 1060 if (sz >= 0) 1061 return (sz); 1062 1063 switch (-sz) { 1064 case ENOENT: 1065 uu_warn(gettext("\"%s\" is misconfigured (\"%s\" dependency " 1066 "lacks \"%s\" property.)\n"), fmri, pgname, propname); 1067 return (-1); 1068 1069 case E2BIG: 1070 uu_warn(gettext("\"%s\" is misconfigured (\"%s/%s\" property " 1071 "is not single-valued.)\n"), fmri, pgname, propname); 1072 return (-1); 1073 1074 case EINVAL: 1075 uu_warn(gettext("\"%s\" is misconfigured (\"%s/%s\" property " 1076 "is not of astring type.)\n"), fmri, pgname, propname); 1077 return (-1); 1078 1079 default: 1080 assert(0); 1081 abort(); 1082 /* NOTREACHED */ 1083 } 1084 } 1085 1086 static boolean_t 1087 multiple_instances(scf_iter_t *iter, scf_value_t *v, char *buf) 1088 { 1089 int count = 0, r; 1090 boolean_t ret; 1091 scf_instance_t *inst; 1092 1093 inst = scf_instance_create(h); 1094 if (inst == NULL) 1095 scfdie(); 1096 1097 for (;;) { 1098 r = scf_iter_next_value(iter, v); 1099 if (r == 0) { 1100 ret = B_FALSE; 1101 goto out; 1102 } 1103 if (r != 1) 1104 scfdie(); 1105 1106 if (scf_value_get_astring(v, buf, max_scf_fmri_sz) < 0) 1107 scfdie(); 1108 1109 switch (get_inst_mult(buf, inst)) { 1110 case 0: 1111 ++count; 1112 if (count > 1) { 1113 ret = B_TRUE; 1114 goto out; 1115 } 1116 break; 1117 1118 case ENOTSUP: 1119 case EINVAL: 1120 case ENOTDIR: 1121 case ENOENT: 1122 continue; 1123 1124 case E2BIG: 1125 ret = B_TRUE; 1126 goto out; 1127 1128 default: 1129 assert(0); 1130 abort(); 1131 } 1132 } 1133 1134 out: 1135 scf_instance_destroy(inst); 1136 return (ret); 1137 } 1138 1139 /* 1140 * Enable the service or instance identified by fmri and its dependencies, 1141 * recursively. Specifically, call get_inst(fmri), enable the result, and 1142 * recurse on its restarter and the dependencies. To avoid duplication of 1143 * effort or looping around a dependency cycle, each FMRI is entered into the 1144 * "visited" hash table. While recursing, the hash table entry is marked 1145 * "active", so that if we come upon it again, we know we've hit a cycle. 1146 * exclude_all and optional_all dependencies are ignored. require_any 1147 * dependencies are followed only if they comprise a single service; otherwise 1148 * the user is warned. 1149 * 1150 * fmri must point to a writable max_scf_fmri_sz buffer. Returns EINVAL if fmri 1151 * is invalid, E2BIG if fmri identifies a service with multiple instances, ELOOP 1152 * on cycle detection, or 0 on success. 1153 */ 1154 static int 1155 enable_fmri_rec(char *fmri, enable_data_t *ed) 1156 { 1157 scf_instance_t *inst; 1158 scf_snapshot_t *snap; 1159 scf_propertygroup_t *pg; 1160 scf_property_t *prop; 1161 scf_value_t *v; 1162 scf_iter_t *pg_iter, *val_iter; 1163 scf_type_t ty; 1164 char *buf, *pgname; 1165 ssize_t name_sz, len, sz; 1166 int ret; 1167 struct ht_elt *he; 1168 1169 len = scf_canonify_fmri(fmri, fmri, max_scf_fmri_sz); 1170 if (len < 0) { 1171 assert(scf_error() == SCF_ERROR_INVALID_ARGUMENT); 1172 return (EINVAL); 1173 } 1174 assert(len < max_scf_fmri_sz); 1175 1176 switch (visited_find_or_add(fmri, &he)) { 1177 case 0: 1178 he->active = B_TRUE; 1179 break; 1180 1181 case 1: 1182 return (he->active ? ELOOP : 0); 1183 1184 case -1: 1185 uu_die(emsg_nomem); 1186 1187 default: 1188 assert(0); 1189 abort(); 1190 } 1191 1192 inst = scf_instance_create(h); 1193 if (inst == NULL) 1194 scfdie(); 1195 1196 switch (get_inst_mult(fmri, inst)) { 1197 case 0: 1198 break; 1199 1200 case E2BIG: 1201 he->active = B_FALSE; 1202 return (E2BIG); 1203 1204 default: 1205 he->active = B_FALSE; 1206 return (0); 1207 } 1208 1209 set_inst_enabled(fmri, inst, ed); 1210 1211 if ((snap = scf_snapshot_create(h)) == NULL || 1212 (pg = scf_pg_create(h)) == NULL || 1213 (prop = scf_property_create(h)) == NULL || 1214 (v = scf_value_create(h)) == NULL || 1215 (pg_iter = scf_iter_create(h)) == NULL || 1216 (val_iter = scf_iter_create(h)) == NULL) 1217 scfdie(); 1218 1219 buf = malloc(max_scf_fmri_sz); 1220 if (buf == NULL) 1221 uu_die(emsg_nomem); 1222 1223 name_sz = scf_limit(SCF_LIMIT_MAX_NAME_LENGTH); 1224 if (name_sz < 0) 1225 scfdie(); 1226 ++name_sz; 1227 pgname = malloc(name_sz); 1228 if (pgname == NULL) 1229 uu_die(emsg_nomem); 1230 1231 if (scf_instance_get_snapshot(inst, "running", snap) != 0) { 1232 if (scf_error() != SCF_ERROR_NOT_FOUND) 1233 scfdie(); 1234 1235 scf_snapshot_destroy(snap); 1236 snap = NULL; 1237 } 1238 1239 /* Enable restarter */ 1240 if (scf_instance_get_pg_composed(inst, snap, SCF_PG_GENERAL, pg) != 0) { 1241 if (scf_error() != SCF_ERROR_NOT_FOUND) 1242 scfdie(); 1243 1244 uu_warn(gettext("\"%s\" is misconfigured (lacks \"%s\" " 1245 "property group).\n"), fmri, SCF_PG_GENERAL); 1246 ret = 0; 1247 goto out; 1248 } 1249 1250 sz = get_astring_prop(pg, SCF_PROPERTY_RESTARTER, prop, v, buf, 1251 max_scf_fmri_sz); 1252 if (sz > max_scf_fmri_sz) { 1253 uu_warn(gettext("\"%s\" is misconfigured (the value of " 1254 "\"%s/%s\" is too long).\n"), fmri, SCF_PG_GENERAL, 1255 SCF_PROPERTY_RESTARTER); 1256 ret = 0; 1257 goto out; 1258 } else if (sz >= 0) { 1259 switch (enable_fmri_rec(buf, ed)) { 1260 case 0: 1261 break; 1262 1263 case EINVAL: 1264 uu_warn(gettext("Restarter FMRI for \"%s\" is " 1265 "invalid.\n"), fmri); 1266 break; 1267 1268 case E2BIG: 1269 uu_warn(gettext("Restarter FMRI for \"%s\" identifies " 1270 "a service with multiple instances.\n"), fmri); 1271 break; 1272 1273 case ELOOP: 1274 ret = ELOOP; 1275 goto out; 1276 1277 default: 1278 assert(0); 1279 abort(); 1280 } 1281 } else if (sz < 0) { 1282 switch (-sz) { 1283 case ENOENT: 1284 break; 1285 1286 case E2BIG: 1287 uu_warn(gettext("\"%s\" is misconfigured (\"%s/%s\" " 1288 "property is not single-valued).\n"), fmri, 1289 SCF_PG_GENERAL, SCF_PROPERTY_RESTARTER); 1290 ret = 0; 1291 goto out; 1292 1293 case EINVAL: 1294 uu_warn(gettext("\"%s\" is misconfigured (\"%s/%s\" " 1295 "property is not of astring type).\n"), fmri, 1296 SCF_PG_GENERAL, SCF_PROPERTY_RESTARTER); 1297 ret = 0; 1298 goto out; 1299 1300 default: 1301 assert(0); 1302 abort(); 1303 } 1304 } 1305 1306 if (scf_iter_instance_pgs_typed_composed(pg_iter, inst, snap, 1307 SCF_GROUP_DEPENDENCY) == -1) 1308 scfdie(); 1309 1310 while (scf_iter_next_pg(pg_iter, pg) > 0) { 1311 len = scf_pg_get_name(pg, pgname, name_sz); 1312 if (len < 0) 1313 scfdie(); 1314 assert(len < name_sz); 1315 1316 if (dep_get_astring(fmri, pgname, pg, SCF_PROPERTY_TYPE, prop, 1317 v, buf, max_scf_fmri_sz) < 0) 1318 continue; 1319 1320 if (strcmp(buf, "service") != 0) 1321 continue; 1322 1323 if (dep_get_astring(fmri, pgname, pg, SCF_PROPERTY_GROUPING, 1324 prop, v, buf, max_scf_fmri_sz) < 0) 1325 continue; 1326 1327 if (strcmp(buf, SCF_DEP_EXCLUDE_ALL) == 0 || 1328 strcmp(buf, SCF_DEP_OPTIONAL_ALL) == 0) 1329 continue; 1330 1331 if (strcmp(buf, SCF_DEP_REQUIRE_ALL) != 0 && 1332 strcmp(buf, SCF_DEP_REQUIRE_ANY) != 0) { 1333 uu_warn(gettext("Dependency \"%s\" of \"%s\" has " 1334 "unknown type \"%s\".\n"), pgname, fmri, buf); 1335 continue; 1336 } 1337 1338 if (scf_pg_get_property(pg, SCF_PROPERTY_ENTITIES, prop) == 1339 -1) { 1340 if (scf_error() != SCF_ERROR_NOT_FOUND) 1341 scfdie(); 1342 1343 uu_warn(gettext("\"%s\" is misconfigured (\"%s\" " 1344 "dependency lacks \"%s\" property.)\n"), fmri, 1345 pgname, SCF_PROPERTY_ENTITIES); 1346 continue; 1347 } 1348 1349 if (scf_property_type(prop, &ty) != SCF_SUCCESS) 1350 scfdie(); 1351 1352 if (ty != SCF_TYPE_FMRI) { 1353 uu_warn(gettext("\"%s\" is misconfigured (property " 1354 "\"%s/%s\" is not of fmri type).\n"), fmri, pgname, 1355 SCF_PROPERTY_ENTITIES); 1356 continue; 1357 } 1358 1359 if (scf_iter_property_values(val_iter, prop) == -1) 1360 scfdie(); 1361 1362 if (strcmp(buf, SCF_DEP_REQUIRE_ANY) == 0) { 1363 if (multiple_instances(val_iter, v, buf)) { 1364 (void) printf(gettext("%s requires one of:\n"), 1365 fmri); 1366 1367 if (scf_iter_property_values(val_iter, prop) != 1368 0) 1369 scfdie(); 1370 1371 for (;;) { 1372 int r; 1373 1374 r = scf_iter_next_value(val_iter, v); 1375 if (r == 0) 1376 break; 1377 if (r != 1) 1378 scfdie(); 1379 1380 if (scf_value_get_astring(v, buf, 1381 max_scf_fmri_sz) < 0) 1382 scfdie(); 1383 1384 (void) fputs(" ", stdout); 1385 (void) puts(buf); 1386 } 1387 1388 continue; 1389 } 1390 1391 /* 1392 * Since there's only one instance, we can enable it. 1393 * Reset val_iter and continue. 1394 */ 1395 if (scf_iter_property_values(val_iter, prop) != 0) 1396 scfdie(); 1397 } 1398 1399 for (;;) { 1400 ret = scf_iter_next_value(val_iter, v); 1401 if (ret == 0) 1402 break; 1403 if (ret != 1) 1404 scfdie(); 1405 1406 if (scf_value_get_astring(v, buf, max_scf_fmri_sz) == 1407 -1) 1408 scfdie(); 1409 1410 switch (enable_fmri_rec(buf, ed)) { 1411 case 0: 1412 break; 1413 1414 case EINVAL: 1415 uu_warn(gettext("\"%s\" dependency of \"%s\" " 1416 "has invalid FMRI \"%s\".\n"), pgname, 1417 fmri, buf); 1418 break; 1419 1420 case E2BIG: 1421 uu_warn(gettext("%s depends on %s, which has " 1422 "multiple instances.\n"), fmri, buf); 1423 break; 1424 1425 case ELOOP: 1426 ret = ELOOP; 1427 goto out; 1428 1429 default: 1430 assert(0); 1431 abort(); 1432 } 1433 } 1434 } 1435 1436 ret = 0; 1437 1438 out: 1439 he->active = B_FALSE; 1440 1441 free(buf); 1442 free(pgname); 1443 1444 (void) scf_value_destroy(v); 1445 scf_property_destroy(prop); 1446 scf_pg_destroy(pg); 1447 scf_snapshot_destroy(snap); 1448 scf_iter_destroy(pg_iter); 1449 scf_iter_destroy(val_iter); 1450 1451 return (ret); 1452 } 1453 1454 /* 1455 * fmri here is only used for verbose messages. 1456 */ 1457 static void 1458 set_inst_action(const char *fmri, const scf_instance_t *inst, 1459 const char *action) 1460 { 1461 scf_transaction_t *tx; 1462 scf_transaction_entry_t *ent; 1463 scf_propertygroup_t *pg; 1464 scf_property_t *prop; 1465 scf_value_t *v; 1466 int ret; 1467 int64_t t; 1468 hrtime_t timestamp; 1469 1470 const char * const scf_pg_restarter_actions = SCF_PG_RESTARTER_ACTIONS; 1471 1472 if ((pg = scf_pg_create(h)) == NULL || 1473 (prop = scf_property_create(h)) == NULL || 1474 (v = scf_value_create(h)) == NULL || 1475 (tx = scf_transaction_create(h)) == NULL || 1476 (ent = scf_entry_create(h)) == NULL) 1477 scfdie(); 1478 1479 if (restarter_setup(fmri, inst)) { 1480 exit_status = 1; 1481 goto out; 1482 } 1483 1484 if (scf_instance_get_pg(inst, scf_pg_restarter_actions, pg) == -1) { 1485 if (scf_error() != SCF_ERROR_NOT_FOUND) 1486 scfdie(); 1487 1488 /* Try creating the restarter_actions property group. */ 1489 if (scf_instance_add_pg(inst, scf_pg_restarter_actions, 1490 SCF_PG_RESTARTER_ACTIONS_TYPE, 1491 SCF_PG_RESTARTER_ACTIONS_FLAGS, pg) == -1) { 1492 switch (scf_error()) { 1493 case SCF_ERROR_EXISTS: 1494 /* Someone must have added it. */ 1495 break; 1496 1497 case SCF_ERROR_PERMISSION_DENIED: 1498 if (!verbose) 1499 uu_warn(emsg_permission_denied, fmri); 1500 else 1501 uu_warn(emsg_create_pg_perm_denied, 1502 fmri, scf_pg_restarter_actions); 1503 goto out; 1504 1505 default: 1506 scfdie(); 1507 } 1508 } 1509 } 1510 1511 /* 1512 * If we lose the transaction race and need to retry, there are 2 1513 * potential other winners: 1514 * - another process setting actions 1515 * - the restarter marking the action complete 1516 * Therefore, re-read the property every time through the loop before 1517 * making any decisions based on their values. 1518 */ 1519 do { 1520 timestamp = gethrtime(); 1521 1522 if (scf_transaction_start(tx, pg) == -1) { 1523 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 1524 scfdie(); 1525 1526 if (!verbose) 1527 uu_warn(emsg_permission_denied, fmri); 1528 else 1529 uu_warn(emsg_pg_perm_denied, fmri, 1530 scf_pg_restarter_actions); 1531 goto out; 1532 } 1533 1534 if (scf_pg_get_property(pg, action, prop) == -1) { 1535 if (scf_error() != SCF_ERROR_NOT_FOUND) 1536 scfdie(); 1537 if (scf_transaction_property_new(tx, ent, 1538 action, SCF_TYPE_INTEGER) == -1) 1539 scfdie(); 1540 goto action_set; 1541 } else { 1542 if (scf_transaction_property_change_type(tx, ent, 1543 action, SCF_TYPE_INTEGER) == -1) 1544 scfdie(); 1545 } 1546 1547 if (scf_property_get_value(prop, v) == -1) { 1548 switch (scf_error()) { 1549 case SCF_ERROR_CONSTRAINT_VIOLATED: 1550 case SCF_ERROR_NOT_FOUND: 1551 /* Misconfigured, so set anyway. */ 1552 goto action_set; 1553 1554 default: 1555 scfdie(); 1556 } 1557 } else { 1558 if (scf_value_get_integer(v, &t) == -1) { 1559 assert(scf_error() == SCF_ERROR_TYPE_MISMATCH); 1560 goto action_set; 1561 } 1562 if (t > timestamp) 1563 break; 1564 } 1565 1566 action_set: 1567 scf_value_set_integer(v, timestamp); 1568 if (scf_entry_add_value(ent, v) == -1) 1569 scfdie(); 1570 1571 ret = scf_transaction_commit(tx); 1572 if (ret == -1) { 1573 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 1574 scfdie(); 1575 1576 if (!verbose) 1577 uu_warn(emsg_permission_denied, fmri); 1578 else 1579 uu_warn(emsg_prop_perm_denied, fmri, 1580 scf_pg_restarter_actions, action); 1581 scf_transaction_reset(tx); 1582 goto out; 1583 } 1584 1585 scf_transaction_reset(tx); 1586 1587 if (ret == 0) { 1588 if (scf_pg_update(pg) == -1) 1589 scfdie(); 1590 } 1591 } while (ret == 0); 1592 1593 if (verbose) 1594 (void) printf(gettext("Action %s set for %s.\n"), action, fmri); 1595 1596 out: 1597 scf_value_destroy(v); 1598 scf_entry_destroy(ent); 1599 scf_transaction_destroy(tx); 1600 scf_property_destroy(prop); 1601 scf_pg_destroy(pg); 1602 } 1603 1604 /* 1605 * Get the state of inst. state should point to a buffer of 1606 * MAX_SCF_STATE_STRING_SZ bytes. Returns 0 on success or -1 if 1607 * no restarter property group 1608 * no state property 1609 * state property is misconfigured (wrong type, not single-valued) 1610 * state value is too long 1611 * In these cases, fmri is used to print a warning. 1612 * 1613 * If pgp is non-NULL, a successful call to inst_get_state will store 1614 * the SCF_PG_RESTARTER property group in *pgp, and the caller will be 1615 * responsible for calling scf_pg_destroy on the property group. 1616 */ 1617 int 1618 inst_get_state(scf_instance_t *inst, char *state, const char *fmri, 1619 scf_propertygroup_t **pgp) 1620 { 1621 scf_propertygroup_t *pg; 1622 scf_property_t *prop; 1623 scf_value_t *val; 1624 int ret = -1; 1625 ssize_t szret; 1626 1627 if ((pg = scf_pg_create(h)) == NULL || 1628 (prop = scf_property_create(h)) == NULL || 1629 (val = scf_value_create(h)) == NULL) 1630 scfdie(); 1631 1632 if (scf_instance_get_pg(inst, SCF_PG_RESTARTER, pg) != SCF_SUCCESS) { 1633 if (scf_error() != SCF_ERROR_NOT_FOUND) 1634 scfdie(); 1635 1636 uu_warn(gettext("%s is misconfigured (lacks \"%s\" property " 1637 "group).\n"), fmri ? fmri : inst_get_fmri(inst), 1638 SCF_PG_RESTARTER); 1639 goto out; 1640 } 1641 1642 szret = get_astring_prop(pg, SCF_PROPERTY_STATE, prop, val, state, 1643 MAX_SCF_STATE_STRING_SZ); 1644 if (szret < 0) { 1645 switch (-szret) { 1646 case ENOENT: 1647 uu_warn(gettext("%s is misconfigured (\"%s\" property " 1648 "group lacks \"%s\" property).\n"), 1649 fmri ? fmri : inst_get_fmri(inst), SCF_PG_RESTARTER, 1650 SCF_PROPERTY_STATE); 1651 goto out; 1652 1653 case E2BIG: 1654 uu_warn(gettext("%s is misconfigured (\"%s/%s\" " 1655 "property is not single-valued).\n"), 1656 fmri ? fmri : inst_get_fmri(inst), SCF_PG_RESTARTER, 1657 SCF_PROPERTY_STATE); 1658 goto out; 1659 1660 case EINVAL: 1661 uu_warn(gettext("%s is misconfigured (\"%s/%s\" " 1662 "property is not of type astring).\n"), 1663 fmri ? fmri : inst_get_fmri(inst), SCF_PG_RESTARTER, 1664 SCF_PROPERTY_STATE); 1665 goto out; 1666 1667 default: 1668 assert(0); 1669 abort(); 1670 } 1671 } 1672 if (szret >= MAX_SCF_STATE_STRING_SZ) { 1673 uu_warn(gettext("%s is misconfigured (\"%s/%s\" property value " 1674 "is too long).\n"), fmri ? fmri : inst_get_fmri(inst), 1675 SCF_PG_RESTARTER, SCF_PROPERTY_STATE); 1676 goto out; 1677 } 1678 1679 ret = 0; 1680 if (pgp) 1681 *pgp = pg; 1682 1683 out: 1684 (void) scf_value_destroy(val); 1685 scf_property_destroy(prop); 1686 if (ret || pgp == NULL) 1687 scf_pg_destroy(pg); 1688 return (ret); 1689 } 1690 1691 static void 1692 set_astring_prop(const char *fmri, const char *pgname, const char *pgtype, 1693 uint32_t pgflags, const char *propname, const char *str) 1694 { 1695 scf_instance_t *inst; 1696 scf_propertygroup_t *pg; 1697 scf_property_t *prop; 1698 scf_value_t *val; 1699 scf_transaction_t *tx; 1700 scf_transaction_entry_t *txent; 1701 int ret; 1702 1703 inst = scf_instance_create(h); 1704 if (inst == NULL) 1705 scfdie(); 1706 1707 if (get_inst(fmri, inst) != 0) 1708 return; 1709 1710 if ((pg = scf_pg_create(h)) == NULL || 1711 (prop = scf_property_create(h)) == NULL || 1712 (val = scf_value_create(h)) == NULL || 1713 (tx = scf_transaction_create(h)) == NULL || 1714 (txent = scf_entry_create(h)) == NULL) 1715 scfdie(); 1716 1717 if (scf_instance_get_pg(inst, pgname, pg) != SCF_SUCCESS) { 1718 if (scf_error() != SCF_ERROR_NOT_FOUND) 1719 scfdie(); 1720 1721 if (scf_instance_add_pg(inst, pgname, pgtype, pgflags, pg) != 1722 SCF_SUCCESS) { 1723 switch (scf_error()) { 1724 case SCF_ERROR_EXISTS: 1725 if (scf_instance_get_pg(inst, pgname, pg) != 1726 SCF_SUCCESS) { 1727 if (scf_error() != SCF_ERROR_NOT_FOUND) 1728 scfdie(); 1729 1730 uu_warn(gettext("Repository write " 1731 "contention.\n")); 1732 goto out; 1733 } 1734 break; 1735 1736 case SCF_ERROR_PERMISSION_DENIED: 1737 if (!verbose) 1738 uu_warn(emsg_permission_denied, fmri); 1739 else 1740 uu_warn(emsg_create_pg_perm_denied, 1741 fmri, pgname); 1742 goto out; 1743 1744 default: 1745 scfdie(); 1746 } 1747 } 1748 } 1749 1750 do { 1751 if (scf_transaction_start(tx, pg) != SCF_SUCCESS) { 1752 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 1753 scfdie(); 1754 1755 if (!verbose) 1756 uu_warn(emsg_permission_denied, fmri); 1757 else 1758 uu_warn(emsg_pg_perm_denied, fmri, pgname); 1759 goto out; 1760 } 1761 1762 if (scf_transaction_property_change_type(tx, txent, propname, 1763 SCF_TYPE_ASTRING) != 0) { 1764 if (scf_error() != SCF_ERROR_NOT_FOUND) 1765 scfdie(); 1766 1767 if (scf_transaction_property_new(tx, txent, propname, 1768 SCF_TYPE_ASTRING) != 0) 1769 scfdie(); 1770 } 1771 1772 if (scf_value_set_astring(val, str) != SCF_SUCCESS) 1773 scfdie(); 1774 1775 if (scf_entry_add_value(txent, val) != SCF_SUCCESS) 1776 scfdie(); 1777 1778 ret = scf_transaction_commit(tx); 1779 if (ret == -1) { 1780 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 1781 scfdie(); 1782 1783 if (!verbose) 1784 uu_warn(emsg_permission_denied, fmri); 1785 else 1786 uu_warn(emsg_prop_perm_denied, fmri, pgname, 1787 propname); 1788 goto out; 1789 } 1790 1791 if (ret == 0) { 1792 scf_transaction_reset(tx); 1793 1794 if (scf_pg_update(pg) == -1) 1795 scfdie(); 1796 } 1797 } while (ret == 0); 1798 1799 out: 1800 scf_transaction_destroy(tx); 1801 scf_entry_destroy(txent); 1802 scf_value_destroy(val); 1803 scf_property_destroy(prop); 1804 scf_pg_destroy(pg); 1805 scf_instance_destroy(inst); 1806 } 1807 1808 1809 static int 1810 set_fmri_enabled(void *data, scf_walkinfo_t *wip) 1811 { 1812 enable_data_t *ed = data; 1813 1814 assert(wip->inst != NULL); 1815 assert(wip->pg == NULL); 1816 1817 if (svcsearch) { 1818 char state[MAX_SCF_STATE_STRING_SZ]; 1819 1820 if (inst_get_state(wip->inst, state, wip->fmri, NULL) != 0) 1821 return (0); 1822 if (strcmp(state, svcstate) != 0) 1823 return (0); 1824 } 1825 1826 if (ed->ed_flags & SET_RECURSIVE) { 1827 char *fmri_buf = malloc(max_scf_fmri_sz); 1828 if (fmri_buf == NULL) 1829 uu_die(emsg_nomem); 1830 1831 visited = calloc(HT_BUCKETS, sizeof (*visited)); 1832 if (visited == NULL) 1833 uu_die(emsg_nomem); 1834 1835 /* scf_walk_fmri() guarantees that fmri isn't too long */ 1836 assert(strlen(wip->fmri) <= max_scf_fmri_sz); 1837 (void) strlcpy(fmri_buf, wip->fmri, max_scf_fmri_sz); 1838 1839 switch (enable_fmri_rec(fmri_buf, ed)) { 1840 case E2BIG: 1841 uu_warn(gettext("operation on service %s is ambiguous; " 1842 "instance specification needed.\n"), fmri_buf); 1843 break; 1844 1845 case ELOOP: 1846 uu_warn(gettext("%s: Dependency cycle detected.\n"), 1847 fmri_buf); 1848 } 1849 1850 free(visited); 1851 free(fmri_buf); 1852 1853 } else { 1854 set_inst_enabled(wip->fmri, wip->inst, ed); 1855 } 1856 1857 return (0); 1858 } 1859 1860 /* ARGSUSED */ 1861 static int 1862 wait_fmri_enabled(void *data, scf_walkinfo_t *wip) 1863 { 1864 scf_propertygroup_t *pg = NULL; 1865 char state[MAX_SCF_STATE_STRING_SZ]; 1866 1867 assert(wip->inst != NULL); 1868 assert(wip->pg == NULL); 1869 1870 do { 1871 if (pg) 1872 scf_pg_destroy(pg); 1873 if (inst_get_state(wip->inst, state, wip->fmri, &pg) != 0) { 1874 exit_status = EXIT_SVC_FAILURE; 1875 return (0); 1876 } 1877 1878 if (strcmp(state, SCF_STATE_STRING_ONLINE) == 0 || 1879 strcmp(state, SCF_STATE_STRING_DEGRADED) == 0) { 1880 /* 1881 * We're done. 1882 */ 1883 goto out; 1884 } 1885 1886 if (strcmp(state, SCF_STATE_STRING_MAINT) == 0) { 1887 /* 1888 * The service is ill. 1889 */ 1890 uu_warn(gettext("Instance \"%s\" is in maintenance" 1891 " state.\n"), wip->fmri); 1892 exit_status = EXIT_SVC_FAILURE; 1893 goto out; 1894 } 1895 1896 if (!is_enabled(wip->inst)) { 1897 /* 1898 * Someone stepped in and disabled the service. 1899 */ 1900 uu_warn(gettext("Instance \"%s\" has been disabled" 1901 " by another entity.\n"), wip->fmri); 1902 exit_status = EXIT_SVC_FAILURE; 1903 goto out; 1904 } 1905 1906 if (!has_potential(wip->inst, B_FALSE)) { 1907 /* 1908 * Our dependencies aren't met. We'll never 1909 * amount to anything. 1910 */ 1911 uu_warn(gettext("Instance \"%s\" has unsatisfied" 1912 " dependencies.\n"), wip->fmri); 1913 /* 1914 * EXIT_SVC_FAILURE takes precedence over 1915 * EXIT_DEP_FAILURE 1916 */ 1917 if (exit_status == 0) 1918 exit_status = EXIT_DEP_FAILURE; 1919 goto out; 1920 } 1921 } while (_scf_pg_wait(pg, WAIT_INTERVAL) >= 0); 1922 scfdie(); 1923 /* NOTREACHED */ 1924 1925 out: 1926 scf_pg_destroy(pg); 1927 return (0); 1928 } 1929 1930 /* ARGSUSED */ 1931 static int 1932 wait_fmri_disabled(void *data, scf_walkinfo_t *wip) 1933 { 1934 scf_propertygroup_t *pg = NULL; 1935 char state[MAX_SCF_STATE_STRING_SZ]; 1936 1937 assert(wip->inst != NULL); 1938 assert(wip->pg == NULL); 1939 1940 do { 1941 if (pg) 1942 scf_pg_destroy(pg); 1943 if (inst_get_state(wip->inst, state, wip->fmri, &pg) != 0) { 1944 exit_status = EXIT_SVC_FAILURE; 1945 return (0); 1946 } 1947 1948 if (strcmp(state, SCF_STATE_STRING_DISABLED) == 0) { 1949 /* 1950 * We're done. 1951 */ 1952 goto out; 1953 } 1954 1955 if (is_enabled(wip->inst)) { 1956 /* 1957 * Someone stepped in and enabled the service. 1958 */ 1959 uu_warn(gettext("Instance \"%s\" has been enabled" 1960 " by another entity.\n"), wip->fmri); 1961 exit_status = EXIT_SVC_FAILURE; 1962 goto out; 1963 } 1964 1965 if (!has_potential(wip->inst, B_TRUE)) { 1966 /* 1967 * Our restarter is hopeless. 1968 */ 1969 uu_warn(gettext("Restarter for instance \"%s\" is" 1970 " unavailable.\n"), wip->fmri); 1971 /* 1972 * EXIT_SVC_FAILURE takes precedence over 1973 * EXIT_DEP_FAILURE 1974 */ 1975 if (exit_status == 0) 1976 exit_status = EXIT_DEP_FAILURE; 1977 goto out; 1978 } 1979 1980 } while (_scf_pg_wait(pg, WAIT_INTERVAL) >= 0); 1981 scfdie(); 1982 /* NOTREACHED */ 1983 1984 out: 1985 scf_pg_destroy(pg); 1986 return (0); 1987 } 1988 1989 /* ARGSUSED */ 1990 static int 1991 clear_instance(void *data, scf_walkinfo_t *wip) 1992 { 1993 char state[MAX_SCF_STATE_STRING_SZ]; 1994 1995 assert(wip->inst != NULL); 1996 assert(wip->pg == NULL); 1997 1998 if (inst_get_state(wip->inst, state, wip->fmri, NULL) != 0) 1999 return (0); 2000 2001 if (svcsearch && strcmp(state, svcstate) != 0) 2002 return (0); 2003 2004 if (strcmp(state, SCF_STATE_STRING_MAINT) == 0) { 2005 set_inst_action(wip->fmri, wip->inst, SCF_PROPERTY_MAINT_OFF); 2006 } else if (strcmp(state, SCF_STATE_STRING_DEGRADED) == 2007 0) { 2008 set_inst_action(wip->fmri, wip->inst, SCF_PROPERTY_RESTORE); 2009 } else { 2010 uu_warn(gettext("Instance \"%s\" is not in a " 2011 "maintenance or degraded state.\n"), wip->fmri); 2012 2013 exit_status = 1; 2014 } 2015 2016 return (0); 2017 } 2018 2019 static int 2020 set_fmri_action(void *action, scf_walkinfo_t *wip) 2021 { 2022 assert(wip->inst != NULL && wip->pg == NULL); 2023 2024 if (svcsearch) { 2025 char state[MAX_SCF_STATE_STRING_SZ]; 2026 2027 if (inst_get_state(wip->inst, state, wip->fmri, NULL) != 0) 2028 return (0); 2029 if (strcmp(state, svcstate) != 0) 2030 return (0); 2031 } 2032 2033 set_inst_action(wip->fmri, wip->inst, action); 2034 2035 return (0); 2036 } 2037 2038 /* 2039 * Flags to control 'mark' action. 2040 */ 2041 #define MARK_IMMEDIATE 0x1 2042 #define MARK_TEMPORARY 0x2 2043 2044 static int 2045 force_degraded(void *data, scf_walkinfo_t *wip) 2046 { 2047 int flags = (int)data; 2048 char state[MAX_SCF_STATE_STRING_SZ]; 2049 2050 if (inst_get_state(wip->inst, state, wip->fmri, NULL) != 0) { 2051 exit_status = 1; 2052 return (0); 2053 } 2054 2055 if (svcsearch && strcmp(state, svcstate) != 0) 2056 return (0); 2057 2058 if (strcmp(state, SCF_STATE_STRING_ONLINE) != 0) { 2059 uu_warn(gettext("Instance \"%s\" is not online.\n"), wip->fmri); 2060 exit_status = 1; 2061 return (0); 2062 } 2063 2064 set_inst_action(wip->fmri, wip->inst, (flags & MARK_IMMEDIATE) ? 2065 SCF_PROPERTY_DEGRADE_IMMEDIATE : SCF_PROPERTY_DEGRADED); 2066 2067 return (0); 2068 } 2069 2070 static int 2071 force_maintenance(void *data, scf_walkinfo_t *wip) 2072 { 2073 int flags = (int)data; 2074 const char *prop; 2075 2076 if (svcsearch) { 2077 char state[MAX_SCF_STATE_STRING_SZ]; 2078 2079 if (inst_get_state(wip->inst, state, wip->fmri, NULL) != 0) 2080 return (0); 2081 if (strcmp(state, svcstate) != 0) 2082 return (0); 2083 } 2084 2085 if (flags & MARK_IMMEDIATE) { 2086 prop = (flags & MARK_TEMPORARY) ? 2087 SCF_PROPERTY_MAINT_ON_IMMTEMP : 2088 SCF_PROPERTY_MAINT_ON_IMMEDIATE; 2089 } else { 2090 prop = (flags & MARK_TEMPORARY) ? 2091 SCF_PROPERTY_MAINT_ON_TEMPORARY : 2092 SCF_PROPERTY_MAINT_ON; 2093 } 2094 2095 set_inst_action(wip->fmri, wip->inst, prop); 2096 2097 return (0); 2098 } 2099 2100 static void 2101 set_milestone(const char *fmri, boolean_t temporary) 2102 { 2103 scf_instance_t *inst; 2104 scf_propertygroup_t *pg; 2105 2106 if (temporary) { 2107 set_astring_prop(SCF_SERVICE_STARTD, SCF_PG_OPTIONS_OVR, 2108 SCF_PG_OPTIONS_OVR_TYPE, SCF_PG_OPTIONS_OVR_FLAGS, 2109 SCF_PROPERTY_MILESTONE, fmri); 2110 return; 2111 } 2112 2113 if ((inst = scf_instance_create(h)) == NULL || 2114 (pg = scf_pg_create(h)) == NULL) 2115 scfdie(); 2116 2117 if (get_inst(SCF_SERVICE_STARTD, inst) != 0) { 2118 scf_instance_destroy(inst); 2119 return; 2120 } 2121 2122 /* 2123 * Set the persistent milestone before deleting the override so we don't 2124 * glitch. 2125 */ 2126 set_astring_prop(SCF_SERVICE_STARTD, SCF_PG_OPTIONS, 2127 SCF_PG_OPTIONS_TYPE, SCF_PG_OPTIONS_FLAGS, SCF_PROPERTY_MILESTONE, 2128 fmri); 2129 2130 if (delete_prop(SCF_SERVICE_STARTD, inst, SCF_PG_OPTIONS_OVR, 2131 SCF_PROPERTY_MILESTONE) != 0) 2132 exit_status = 1; 2133 2134 scf_pg_destroy(pg); 2135 scf_instance_destroy(inst); 2136 } 2137 2138 static char const *milestones[] = { 2139 SCF_MILESTONE_SINGLE_USER, 2140 SCF_MILESTONE_MULTI_USER, 2141 SCF_MILESTONE_MULTI_USER_SERVER, 2142 NULL 2143 }; 2144 2145 static void 2146 usage_milestone(void) 2147 { 2148 const char **ms; 2149 2150 (void) fprintf(stderr, gettext( 2151 "Usage: svcadm milestone [-d] <milestone>\n\n" 2152 "\t-d\tmake the specified milestone the default for system boot\n\n" 2153 "\tMilestones can be specified using an FMRI or abbreviation.\n" 2154 "\tThe major milestones are as follows:\n\n" 2155 "\tall\n" 2156 "\tnone\n")); 2157 2158 for (ms = milestones; *ms != NULL; ms++) 2159 (void) fprintf(stderr, "\t%s\n", *ms); 2160 2161 exit(UU_EXIT_USAGE); 2162 } 2163 2164 static const char * 2165 validate_milestone(const char *milestone) 2166 { 2167 const char **ms; 2168 const char *tmp; 2169 size_t len; 2170 2171 if (strcmp(milestone, "all") == 0) 2172 return (milestone); 2173 2174 if (strcmp(milestone, "none") == 0) 2175 return (milestone); 2176 2177 /* 2178 * Determine if this is a full or partial milestone 2179 */ 2180 for (ms = milestones; *ms != NULL; ms++) { 2181 if ((tmp = strstr(*ms, milestone)) != NULL) { 2182 len = strlen(milestone); 2183 2184 /* 2185 * The beginning of the string must align with the start 2186 * of a milestone fmri, or on the boundary between 2187 * elements. The end of the string must align with the 2188 * end of the milestone, or at the instance boundary. 2189 */ 2190 if ((tmp == *ms || tmp[-1] == '/') && 2191 (tmp[len] == '\0' || tmp[len] == ':')) 2192 return (*ms); 2193 } 2194 } 2195 2196 (void) fprintf(stderr, 2197 gettext("\"%s\" is not a valid major milestone.\n"), milestone); 2198 2199 usage_milestone(); 2200 /* NOTREACHED */ 2201 } 2202 2203 /*PRINTFLIKE1*/ 2204 static void 2205 pr_warn(const char *format, ...) 2206 { 2207 const char *pname = uu_getpname(); 2208 va_list alist; 2209 2210 va_start(alist, format); 2211 2212 if (pname != NULL) 2213 (void) fprintf(stderr, "%s", pname); 2214 2215 if (g_zonename != NULL) 2216 (void) fprintf(stderr, " (%s)", g_zonename); 2217 2218 (void) fprintf(stderr, ": "); 2219 2220 (void) vfprintf(stderr, format, alist); 2221 2222 if (strrchr(format, '\n') == NULL) 2223 (void) fprintf(stderr, ": %s\n", strerror(errno)); 2224 2225 va_end(alist); 2226 } 2227 2228 /*ARGSUSED*/ 2229 static void 2230 quiet(const char *fmt, ...) 2231 { 2232 /* Do nothing */ 2233 } 2234 2235 int 2236 main(int argc, char *argv[]) 2237 { 2238 int o; 2239 int err; 2240 int sw_back; 2241 boolean_t do_zones = B_FALSE; 2242 boolean_t do_a_zone = B_FALSE; 2243 char zonename[ZONENAME_MAX]; 2244 uint_t nzents = 0, zent = 0; 2245 zoneid_t *zids = NULL; 2246 int orig_optind, orig_argc; 2247 char **orig_argv; 2248 2249 (void) setlocale(LC_ALL, ""); 2250 (void) textdomain(TEXT_DOMAIN); 2251 2252 (void) uu_setpname(argv[0]); 2253 2254 if (argc < 2) 2255 usage(); 2256 2257 max_scf_fmri_sz = scf_limit(SCF_LIMIT_MAX_FMRI_LENGTH); 2258 if (max_scf_fmri_sz < 0) 2259 scfdie(); 2260 ++max_scf_fmri_sz; 2261 2262 scratch_fmri = malloc(max_scf_fmri_sz); 2263 if (scratch_fmri == NULL) 2264 uu_die(emsg_nomem); 2265 2266 while ((o = getopt(argc, argv, "S:vZz:")) != -1) { 2267 switch (o) { 2268 case 'S': 2269 (void) strlcpy(svcstate, optarg, sizeof (svcstate)); 2270 svcsearch = B_TRUE; 2271 break; 2272 2273 case 'v': 2274 verbose = 1; 2275 break; 2276 2277 case 'z': 2278 if (getzoneid() != GLOBAL_ZONEID) 2279 uu_die(gettext("svcadm -z may only be used " 2280 "from the global zone\n")); 2281 if (do_zones) 2282 usage(); 2283 2284 (void) strlcpy(zonename, optarg, sizeof (zonename)); 2285 do_a_zone = B_TRUE; 2286 break; 2287 2288 case 'Z': 2289 if (getzoneid() != GLOBAL_ZONEID) 2290 uu_die(gettext("svcadm -Z may only be used " 2291 "from the global zone\n")); 2292 if (do_a_zone) 2293 usage(); 2294 2295 do_zones = B_TRUE; 2296 break; 2297 2298 default: 2299 usage(); 2300 } 2301 } 2302 2303 while (do_zones) { 2304 uint_t found; 2305 2306 if (zone_list(NULL, &nzents) != 0) 2307 uu_die(gettext("could not get number of zones")); 2308 2309 if ((zids = malloc(nzents * sizeof (zoneid_t))) == NULL) { 2310 uu_die(gettext("could not allocate array for " 2311 "%d zone IDs"), nzents); 2312 } 2313 2314 found = nzents; 2315 2316 if (zone_list(zids, &found) != 0) 2317 uu_die(gettext("could not get zone list")); 2318 2319 /* 2320 * If the number of zones has not changed between our calls to 2321 * zone_list(), we're done -- otherwise, we must free our array 2322 * of zone IDs and take another lap. 2323 */ 2324 if (found == nzents) 2325 break; 2326 2327 free(zids); 2328 } 2329 2330 emsg_permission_denied = gettext("%s: Permission denied.\n"); 2331 emsg_nomem = gettext("Out of memory.\n"); 2332 emsg_create_pg_perm_denied = gettext("%s: Couldn't create \"%s\" " 2333 "property group (permission denied).\n"); 2334 emsg_pg_perm_denied = gettext("%s: Couldn't modify \"%s\" property " 2335 "group (permission denied).\n"); 2336 emsg_prop_perm_denied = gettext("%s: Couldn't modify \"%s/%s\" " 2337 "property (permission denied).\n"); 2338 emsg_no_service = gettext("No such service \"%s\".\n"); 2339 2340 orig_optind = optind; 2341 orig_argc = argc; 2342 orig_argv = argv; 2343 2344 again: 2345 h = scf_handle_create(SCF_VERSION); 2346 if (h == NULL) 2347 scfdie(); 2348 2349 if (do_zones) { 2350 zone_status_t status; 2351 2352 if (zone_getattr(zids[zent], ZONE_ATTR_STATUS, &status, 2353 sizeof (status)) < 0 || status != ZONE_IS_RUNNING) { 2354 /* 2355 * If this zone is not running or we cannot 2356 * get its status, we do not want to attempt 2357 * to bind an SCF handle to it, lest we 2358 * accidentally interfere with a zone that 2359 * is not yet running by looking up a door 2360 * to its svc.configd (which could potentially 2361 * block a mount with an EBUSY). 2362 */ 2363 zent++; 2364 goto nextzone; 2365 } 2366 2367 if (getzonenamebyid(zids[zent++], zonename, 2368 sizeof (zonename)) < 0) { 2369 uu_warn(gettext("could not get name for " 2370 "zone %d; ignoring"), zids[zent - 1]); 2371 goto nextzone; 2372 } 2373 2374 g_zonename = zonename; 2375 } 2376 2377 if (do_a_zone || do_zones) { 2378 scf_value_t *zone; 2379 2380 if ((zone = scf_value_create(h)) == NULL) 2381 scfdie(); 2382 2383 if (scf_value_set_astring(zone, zonename) != SCF_SUCCESS) 2384 scfdie(); 2385 2386 if (scf_handle_decorate(h, "zone", zone) != SCF_SUCCESS) { 2387 if (do_a_zone) { 2388 uu_die(gettext("invalid zone '%s'\n"), optarg); 2389 } else { 2390 scf_value_destroy(zone); 2391 goto nextzone; 2392 } 2393 } 2394 2395 scf_value_destroy(zone); 2396 } 2397 2398 if (scf_handle_bind(h) == -1) { 2399 if (do_zones) 2400 goto nextzone; 2401 2402 uu_die(gettext("Couldn't bind to configuration repository: " 2403 "%s.\n"), scf_strerror(scf_error())); 2404 } 2405 2406 optind = orig_optind; 2407 argc = orig_argc; 2408 argv = orig_argv; 2409 2410 if (optind >= argc) 2411 usage(); 2412 2413 if (strcmp(argv[optind], "enable") == 0) { 2414 enable_data_t ed = { 2415 .ed_flags = SET_ENABLED, 2416 .ed_comment = "" 2417 }; 2418 int wait = 0; 2419 int error = 0; 2420 2421 ++optind; 2422 2423 while ((o = getopt(argc, argv, "rst")) != -1) { 2424 if (o == 'r') 2425 ed.ed_flags |= SET_RECURSIVE; 2426 else if (o == 't') 2427 ed.ed_flags |= SET_TEMPORARY; 2428 else if (o == 's') 2429 wait = 1; 2430 else if (o == '?') 2431 usage(); 2432 else { 2433 assert(0); 2434 abort(); 2435 } 2436 } 2437 argc -= optind; 2438 argv += optind; 2439 2440 if (argc == 0 && !svcsearch) 2441 usage(); 2442 2443 if (argc > 0 && svcsearch) 2444 usage(); 2445 2446 /* 2447 * We want to continue with -s processing if we had 2448 * invalid options, but not if an enable failed. We 2449 * squelch output the second time we walk fmris; we saw 2450 * the errors the first time. 2451 */ 2452 if ((err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, 2453 set_fmri_enabled, &ed, &error, pr_warn)) != 0) { 2454 2455 pr_warn(gettext("failed to iterate over " 2456 "instances: %s\n"), scf_strerror(err)); 2457 exit_status = UU_EXIT_FATAL; 2458 2459 } else if (wait && exit_status == 0 && 2460 (err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, 2461 wait_fmri_enabled, NULL, &error, quiet)) != 0) { 2462 2463 pr_warn(gettext("failed to iterate over " 2464 "instances: %s\n"), scf_strerror(err)); 2465 exit_status = UU_EXIT_FATAL; 2466 } 2467 2468 if (error > 0) 2469 exit_status = error; 2470 2471 } else if (strcmp(argv[optind], "disable") == 0) { 2472 enable_data_t ed = { 2473 .ed_flags = 0, 2474 .ed_comment = "" 2475 }; 2476 int wait = 0; 2477 int error = 0; 2478 2479 ++optind; 2480 2481 while ((o = getopt(argc, argv, "c:st")) != -1) { 2482 if (o == 'c') { 2483 if (strlcpy(ed.ed_comment, optarg, 2484 sizeof (ed.ed_comment)) >= 2485 sizeof (ed.ed_comment)) { 2486 uu_die(gettext("disable -c comment " 2487 "too long.\n")); 2488 } 2489 } else if (o == 't') 2490 ed.ed_flags |= SET_TEMPORARY; 2491 else if (o == 's') 2492 wait = 1; 2493 else if (o == '?') 2494 usage(); 2495 else { 2496 assert(0); 2497 abort(); 2498 } 2499 } 2500 argc -= optind; 2501 argv += optind; 2502 2503 if (argc == 0 && !svcsearch) 2504 usage(); 2505 2506 if (argc > 0 && svcsearch) 2507 usage(); 2508 2509 /* 2510 * We want to continue with -s processing if we had 2511 * invalid options, but not if a disable failed. We 2512 * squelch output the second time we walk fmris; we saw 2513 * the errors the first time. 2514 */ 2515 if ((err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, 2516 set_fmri_enabled, &ed, &exit_status, 2517 pr_warn)) != 0) { 2518 2519 pr_warn(gettext("failed to iterate over " 2520 "instances: %s\n"), scf_strerror(err)); 2521 exit_status = UU_EXIT_FATAL; 2522 2523 } else if (wait && exit_status == 0 && 2524 (err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, 2525 wait_fmri_disabled, NULL, &error, quiet)) != 0) { 2526 2527 pr_warn(gettext("failed to iterate over " 2528 "instances: %s\n"), scf_strerror(err)); 2529 exit_status = UU_EXIT_FATAL; 2530 } 2531 2532 if (error > 0) 2533 exit_status = error; 2534 2535 } else if (strcmp(argv[optind], "restart") == 0) { 2536 boolean_t do_dump = B_FALSE; 2537 2538 ++optind; 2539 2540 while ((o = getopt(argc, argv, "d")) != -1) { 2541 if (o == 'd') 2542 do_dump = B_TRUE; 2543 else if (o == '?') 2544 usage(); 2545 else { 2546 assert(0); 2547 abort(); 2548 } 2549 } 2550 argc -= optind; 2551 argv += optind; 2552 2553 if (argc == 0 && !svcsearch) 2554 usage(); 2555 2556 if (argc > 0 && svcsearch) 2557 usage(); 2558 2559 if (do_dump) { 2560 if ((err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, 2561 set_fmri_action, (void *)SCF_PROPERTY_DODUMP, 2562 &exit_status, pr_warn)) != 0) { 2563 pr_warn(gettext("failed to iterate over " 2564 "instances: %s\n"), scf_strerror(err)); 2565 exit_status = UU_EXIT_FATAL; 2566 } 2567 } 2568 2569 if ((err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, 2570 set_fmri_action, (void *)SCF_PROPERTY_RESTART, &exit_status, 2571 pr_warn)) != 0) { 2572 pr_warn(gettext("failed to iterate over " 2573 "instances: %s\n"), scf_strerror(err)); 2574 exit_status = UU_EXIT_FATAL; 2575 } 2576 2577 } else if (strcmp(argv[optind], "refresh") == 0) { 2578 ++optind; 2579 argc -= optind; 2580 argv += optind; 2581 2582 if (argc == 0 && !svcsearch) 2583 usage(); 2584 2585 if (argc > 0 && svcsearch) 2586 usage(); 2587 2588 if ((err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, 2589 set_fmri_action, (void *)SCF_PROPERTY_REFRESH, &exit_status, 2590 pr_warn)) != 0) { 2591 pr_warn(gettext("failed to iterate over " 2592 "instances: %s\n"), scf_strerror(scf_error())); 2593 exit_status = UU_EXIT_FATAL; 2594 } 2595 2596 } else if (strcmp(argv[optind], "mark") == 0) { 2597 int flags = 0; 2598 scf_walk_callback callback; 2599 2600 ++optind; 2601 2602 while ((o = getopt(argc, argv, "It")) != -1) { 2603 if (o == 'I') 2604 flags |= MARK_IMMEDIATE; 2605 else if (o == 't') 2606 flags |= MARK_TEMPORARY; 2607 else if (o == '?') 2608 usage(); 2609 else { 2610 assert(0); 2611 abort(); 2612 } 2613 } 2614 2615 if (argc - optind < 2) 2616 usage(); 2617 2618 if (strcmp(argv[optind], "degraded") == 0) { 2619 if (flags & MARK_TEMPORARY) 2620 uu_xdie(UU_EXIT_USAGE, gettext("-t may not be " 2621 "used with degraded.\n")); 2622 callback = force_degraded; 2623 2624 } else if (strcmp(argv[optind], "maintenance") == 0) { 2625 callback = force_maintenance; 2626 } else { 2627 usage(); 2628 } 2629 2630 optind++; 2631 argc -= optind; 2632 argv += optind; 2633 2634 if (argc == 0 && !svcsearch) 2635 usage(); 2636 2637 if (argc > 0 && svcsearch) 2638 usage(); 2639 2640 if ((err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, callback, 2641 NULL, &exit_status, pr_warn)) != 0) { 2642 pr_warn(gettext("failed to iterate over " 2643 "instances: %s\n"), 2644 scf_strerror(err)); 2645 exit_status = UU_EXIT_FATAL; 2646 } 2647 2648 } else if (strcmp(argv[optind], "clear") == 0) { 2649 ++optind; 2650 argc -= optind; 2651 argv += optind; 2652 2653 if (argc == 0 && !svcsearch) 2654 usage(); 2655 2656 if (svcsearch) { 2657 if (argc > 0) 2658 usage(); 2659 if (strcmp(svcstate, SCF_STATE_STRING_MAINT) != 0 && 2660 strcmp(svcstate, SCF_STATE_STRING_DEGRADED) != 0) 2661 uu_die(gettext("State must be '%s' or '%s'\n"), 2662 SCF_STATE_STRING_MAINT, 2663 SCF_STATE_STRING_DEGRADED); 2664 } 2665 2666 if ((err = scf_walk_fmri(h, argc, argv, WALK_FLAGS, 2667 clear_instance, NULL, &exit_status, pr_warn)) != 0) { 2668 pr_warn(gettext("failed to iterate over " 2669 "instances: %s\n"), scf_strerror(err)); 2670 exit_status = UU_EXIT_FATAL; 2671 } 2672 2673 } else if (strcmp(argv[optind], "milestone") == 0) { 2674 boolean_t temporary = B_TRUE; 2675 const char *milestone; 2676 2677 ++optind; 2678 2679 while ((o = getopt(argc, argv, "d")) != -1) { 2680 if (o == 'd') 2681 temporary = B_FALSE; 2682 else if (o == '?') 2683 usage_milestone(); 2684 else { 2685 assert(0); 2686 abort(); 2687 } 2688 } 2689 2690 if (optind >= argc) 2691 usage_milestone(); 2692 2693 milestone = validate_milestone(argv[optind]); 2694 2695 set_milestone(milestone, temporary); 2696 } else if (strcmp(argv[optind], "_smf_backup") == 0) { 2697 const char *reason = NULL; 2698 2699 ++optind; 2700 2701 if (optind != argc - 1) 2702 usage(); 2703 2704 if ((err = _scf_request_backup(h, argv[optind])) != 2705 SCF_SUCCESS) { 2706 switch (scf_error()) { 2707 case SCF_ERROR_NOT_BOUND: 2708 case SCF_ERROR_CONNECTION_BROKEN: 2709 case SCF_ERROR_BACKEND_READONLY: 2710 scfdie(); 2711 break; 2712 2713 case SCF_ERROR_PERMISSION_DENIED: 2714 case SCF_ERROR_INVALID_ARGUMENT: 2715 reason = scf_strerror(scf_error()); 2716 break; 2717 2718 case SCF_ERROR_INTERNAL: 2719 reason = 2720 "unknown error (see console for details)"; 2721 break; 2722 } 2723 2724 pr_warn("failed to backup repository: %s\n", reason); 2725 exit_status = UU_EXIT_FATAL; 2726 } 2727 } else if (strcmp(argv[optind], "_smf_repository_switch") == 0) { 2728 const char *reason = NULL; 2729 2730 ++optind; 2731 2732 /* 2733 * Check argument and setup scf_switch structure 2734 */ 2735 if (optind != argc - 1) 2736 exit(1); 2737 2738 if (strcmp(argv[optind], "fast") == 0) { 2739 sw_back = 0; 2740 } else if (strcmp(argv[optind], "perm") == 0) { 2741 sw_back = 1; 2742 } else { 2743 exit(UU_EXIT_USAGE); 2744 } 2745 2746 /* 2747 * Call into switch primitive 2748 */ 2749 if ((err = _scf_repository_switch(h, sw_back)) != 2750 SCF_SUCCESS) { 2751 /* 2752 * Retrieve per thread SCF error code 2753 */ 2754 switch (scf_error()) { 2755 case SCF_ERROR_NOT_BOUND: 2756 abort(); 2757 /* NOTREACHED */ 2758 2759 case SCF_ERROR_CONNECTION_BROKEN: 2760 case SCF_ERROR_BACKEND_READONLY: 2761 scfdie(); 2762 /* NOTREACHED */ 2763 2764 case SCF_ERROR_PERMISSION_DENIED: 2765 case SCF_ERROR_INVALID_ARGUMENT: 2766 reason = scf_strerror(scf_error()); 2767 break; 2768 2769 case SCF_ERROR_INTERNAL: 2770 reason = "File operation error: (see console)"; 2771 break; 2772 2773 default: 2774 abort(); 2775 /* NOTREACHED */ 2776 } 2777 2778 pr_warn("failed to switch repository: %s\n", reason); 2779 exit_status = UU_EXIT_FATAL; 2780 } 2781 } else { 2782 usage(); 2783 } 2784 2785 if (scf_handle_unbind(h) == -1) 2786 scfdie(); 2787 nextzone: 2788 scf_handle_destroy(h); 2789 if (do_zones && zent < nzents) 2790 goto again; 2791 2792 return (exit_status); 2793 }