xref: /illumos-gate/usr/src/cmd/zonecfg/zonecfg.c (revision f3041bfa)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved.
24  * Copyright 2014 Nexenta Systems, Inc.  All rights reserved.
25  * Copyright 2014 Gary Mills
26  */
27 
28 /*
29  * zonecfg is a lex/yacc based command interpreter used to manage zone
30  * configurations.  The lexer (see zonecfg_lex.l) builds up tokens, which
31  * the grammar (see zonecfg_grammar.y) builds up into commands, some of
32  * which takes resources and/or properties as arguments.  See the block
33  * comments near the end of zonecfg_grammar.y for how the data structures
34  * which keep track of these resources and properties are built up.
35  *
36  * The resource/property data structures are inserted into a command
37  * structure (see zonecfg.h), which also keeps track of command names,
38  * miscellaneous arguments, and function handlers.  The grammar selects
39  * the appropriate function handler, each of which takes a pointer to a
40  * command structure as its sole argument, and invokes it.  The grammar
41  * itself is "entered" (a la the Matrix) by yyparse(), which is called
42  * from read_input(), our main driving function.  That in turn is called
43  * by one of do_interactive(), cmd_file() or one_command_at_a_time(), each
44  * of which is called from main() depending on how the program was invoked.
45  *
46  * The rest of this module consists of the various function handlers and
47  * their helper functions.  Some of these functions, particularly the
48  * X_to_str() functions, which maps command, resource and property numbers
49  * to strings, are used quite liberally, as doing so results in a better
50  * program w/rt I18N, reducing the need for translation notes.
51  */
52 
53 #include <sys/mntent.h>
54 #include <sys/varargs.h>
55 #include <sys/sysmacros.h>
56 #include <sys/secflags.h>
57 
58 #include <errno.h>
59 #include <fcntl.h>
60 #include <strings.h>
61 #include <unistd.h>
62 #include <ctype.h>
63 #include <stdlib.h>
64 #include <assert.h>
65 #include <sys/stat.h>
66 #include <zone.h>
67 #include <arpa/inet.h>
68 #include <netdb.h>
69 #include <locale.h>
70 #include <libintl.h>
71 #include <alloca.h>
72 #include <signal.h>
73 #include <wait.h>
74 #include <libtecla.h>
75 #include <libzfs.h>
76 #include <sys/brand.h>
77 #include <libbrand.h>
78 #include <sys/systeminfo.h>
79 #include <libdladm.h>
80 #include <libinetutil.h>
81 #include <pwd.h>
82 #include <inet/ip.h>
83 
84 #include <libzonecfg.h>
85 #include "zonecfg.h"
86 
87 #if !defined(TEXT_DOMAIN)		/* should be defined by cc -D */
88 #define	TEXT_DOMAIN	"SYS_TEST"	/* Use this only if it wasn't */
89 #endif
90 
91 #define	PAGER	"/usr/bin/more"
92 #define	EXEC_PREFIX	"exec "
93 #define	EXEC_LEN	(strlen(EXEC_PREFIX))
94 
95 struct help {
96 	uint_t	cmd_num;
97 	char	*cmd_name;
98 	uint_t	flags;
99 	char	*short_usage;
100 };
101 
102 extern int yyparse(void);
103 extern int lex_lineno;
104 
105 #define	MAX_LINE_LEN	1024
106 #define	MAX_CMD_HIST	1024
107 #define	MAX_CMD_LEN	1024
108 
109 #define	ONE_MB		1048576
110 
111 /*
112  * Each SHELP_ should be a simple string.
113  */
114 
115 #define	SHELP_ADD	"add <resource-type>\n\t(global scope)\n" \
116 	"add <property-name> <property-value>\n\t(resource scope)"
117 #define	SHELP_CANCEL	"cancel"
118 #define	SHELP_CLEAR	"clear <property-name>"
119 #define	SHELP_COMMIT	"commit"
120 #define	SHELP_CREATE	"create [-F] [ -a <path> | -b | -t <template> ]"
121 #define	SHELP_DELETE	"delete [-F]"
122 #define	SHELP_END	"end"
123 #define	SHELP_EXIT	"exit [-F]"
124 #define	SHELP_EXPORT	"export [-f output-file]"
125 #define	SHELP_HELP	"help [commands] [syntax] [usage] [<command-name>]"
126 #define	SHELP_INFO	"info [<resource-type> [property-name=property-value]*]"
127 #define	SHELP_REMOVE	"remove [-F] <resource-type> " \
128 	"[ <property-name>=<property-value> ]*\n" \
129 	"\t(global scope)\n" \
130 	"remove <property-name> <property-value>\n" \
131 	"\t(resource scope)"
132 #define	SHELP_REVERT	"revert [-F]"
133 #define	SHELP_SELECT	"select <resource-type> { <property-name>=" \
134 	"<property-value> }"
135 #define	SHELP_SET	"set <property-name>=<property-value>"
136 #define	SHELP_VERIFY	"verify"
137 
138 static struct help helptab[] = {
139 	{ CMD_ADD,	"add",		HELP_RES_PROPS,	SHELP_ADD, },
140 	{ CMD_CANCEL,	"cancel",	0,		SHELP_CANCEL, },
141 	{ CMD_CLEAR,	"clear",	HELP_PROPS,	SHELP_CLEAR, },
142 	{ CMD_COMMIT,	"commit",	0,		SHELP_COMMIT, },
143 	{ CMD_CREATE,	"create",	0,		SHELP_CREATE, },
144 	{ CMD_DELETE,	"delete",	0,		SHELP_DELETE, },
145 	{ CMD_END,	"end",		0,		SHELP_END, },
146 	{ CMD_EXIT,	"exit",		0,		SHELP_EXIT, },
147 	{ CMD_EXPORT,	"export",	0,		SHELP_EXPORT, },
148 	{ CMD_HELP,	"help",		0,		SHELP_HELP },
149 	{ CMD_INFO,	"info",		HELP_RES_PROPS,	SHELP_INFO, },
150 	{ CMD_REMOVE,	"remove",	HELP_RES_PROPS,	SHELP_REMOVE, },
151 	{ CMD_REVERT,	"revert",	0,		SHELP_REVERT, },
152 	{ CMD_SELECT,	"select",	HELP_RES_PROPS,	SHELP_SELECT, },
153 	{ CMD_SET,	"set",		HELP_PROPS,	SHELP_SET, },
154 	{ CMD_VERIFY,	"verify",	0,		SHELP_VERIFY, },
155 	{ 0 },
156 };
157 
158 #define	MAX_RT_STRLEN	16
159 
160 /* These *must* match the order of the RT_ define's from zonecfg.h */
161 char *res_types[] = {
162 	"unknown",
163 	"zonename",
164 	"zonepath",
165 	"autoboot",
166 	"pool",
167 	"fs",
168 	"net",
169 	"device",
170 	"rctl",
171 	"attr",
172 	"dataset",
173 	"limitpriv",
174 	"bootargs",
175 	"brand",
176 	"dedicated-cpu",
177 	"capped-memory",
178 	ALIAS_MAXLWPS,
179 	ALIAS_MAXSHMMEM,
180 	ALIAS_MAXSHMIDS,
181 	ALIAS_MAXMSGIDS,
182 	ALIAS_MAXSEMIDS,
183 	ALIAS_SHARES,
184 	"scheduling-class",
185 	"ip-type",
186 	"capped-cpu",
187 	"hostid",
188 	"admin",
189 	"fs-allowed",
190 	ALIAS_MAXPROCS,
191 	"security-flags",
192 	NULL
193 };
194 
195 /* These *must* match the order of the PT_ define's from zonecfg.h */
196 char *prop_types[] = {
197 	"unknown",
198 	"zonename",
199 	"zonepath",
200 	"autoboot",
201 	"pool",
202 	"dir",
203 	"special",
204 	"type",
205 	"options",
206 	"address",
207 	"physical",
208 	"name",
209 	"value",
210 	"match",
211 	"priv",
212 	"limit",
213 	"action",
214 	"raw",
215 	"limitpriv",
216 	"bootargs",
217 	"brand",
218 	"ncpus",
219 	"importance",
220 	"swap",
221 	"locked",
222 	ALIAS_SHARES,
223 	ALIAS_MAXLWPS,
224 	ALIAS_MAXSHMMEM,
225 	ALIAS_MAXSHMIDS,
226 	ALIAS_MAXMSGIDS,
227 	ALIAS_MAXSEMIDS,
228 	ALIAS_MAXLOCKEDMEM,
229 	ALIAS_MAXSWAP,
230 	"scheduling-class",
231 	"ip-type",
232 	"defrouter",
233 	"hostid",
234 	"user",
235 	"auths",
236 	"fs-allowed",
237 	ALIAS_MAXPROCS,
238 	"allowed-address",
239 	"default",
240 	"lower",
241 	"upper",
242 	NULL
243 };
244 
245 /* These *must* match the order of the PROP_VAL_ define's from zonecfg.h */
246 static char *prop_val_types[] = {
247 	"simple",
248 	"complex",
249 	"list",
250 };
251 
252 /*
253  * The various _cmds[] lists below are for command tab-completion.
254  */
255 
256 /*
257  * remove has a space afterwards because it has qualifiers; the other commands
258  * that have qualifiers (add, select, etc.) don't need a space here because
259  * they have their own _cmds[] lists below.
260  */
261 static const char *global_scope_cmds[] = {
262 	"add",
263 	"clear",
264 	"commit",
265 	"create",
266 	"delete",
267 	"exit",
268 	"export",
269 	"help",
270 	"info",
271 	"remove ",
272 	"revert",
273 	"select",
274 	"set",
275 	"verify",
276 	NULL
277 };
278 
279 static const char *add_cmds[] = {
280 	"add fs",
281 	"add net",
282 	"add device",
283 	"add rctl",
284 	"add attr",
285 	"add dataset",
286 	"add dedicated-cpu",
287 	"add capped-cpu",
288 	"add capped-memory",
289 	"add admin",
290 	"add security-flags",
291 	NULL
292 };
293 
294 static const char *clear_cmds[] = {
295 	"clear autoboot",
296 	"clear pool",
297 	"clear limitpriv",
298 	"clear bootargs",
299 	"clear scheduling-class",
300 	"clear ip-type",
301 	"clear " ALIAS_MAXLWPS,
302 	"clear " ALIAS_MAXSHMMEM,
303 	"clear " ALIAS_MAXSHMIDS,
304 	"clear " ALIAS_MAXMSGIDS,
305 	"clear " ALIAS_MAXSEMIDS,
306 	"clear " ALIAS_SHARES,
307 	"clear " ALIAS_MAXPROCS,
308 	NULL
309 };
310 
311 static const char *remove_cmds[] = {
312 	"remove fs ",
313 	"remove net ",
314 	"remove device ",
315 	"remove rctl ",
316 	"remove attr ",
317 	"remove dataset ",
318 	"remove dedicated-cpu ",
319 	"remove capped-cpu ",
320 	"remove capped-memory ",
321 	"remove admin ",
322 	"remove security-flags",
323 	NULL
324 };
325 
326 static const char *select_cmds[] = {
327 	"select fs ",
328 	"select net ",
329 	"select device ",
330 	"select rctl ",
331 	"select attr ",
332 	"select dataset ",
333 	"select dedicated-cpu",
334 	"select capped-cpu",
335 	"select capped-memory",
336 	"select admin",
337 	"select security-flags",
338 	NULL
339 };
340 
341 static const char *set_cmds[] = {
342 	"set zonename=",
343 	"set zonepath=",
344 	"set brand=",
345 	"set autoboot=",
346 	"set pool=",
347 	"set limitpriv=",
348 	"set bootargs=",
349 	"set scheduling-class=",
350 	"set ip-type=",
351 	"set " ALIAS_MAXLWPS "=",
352 	"set " ALIAS_MAXSHMMEM "=",
353 	"set " ALIAS_MAXSHMIDS "=",
354 	"set " ALIAS_MAXMSGIDS "=",
355 	"set " ALIAS_MAXSEMIDS "=",
356 	"set " ALIAS_SHARES "=",
357 	"set hostid=",
358 	"set fs-allowed=",
359 	"set " ALIAS_MAXPROCS "=",
360 	NULL
361 };
362 
363 static const char *info_cmds[] = {
364 	"info fs ",
365 	"info net ",
366 	"info device ",
367 	"info rctl ",
368 	"info attr ",
369 	"info dataset ",
370 	"info capped-memory",
371 	"info dedicated-cpu",
372 	"info capped-cpu",
373 	"info security-flags",
374 	"info zonename",
375 	"info zonepath",
376 	"info autoboot",
377 	"info pool",
378 	"info limitpriv",
379 	"info bootargs",
380 	"info brand",
381 	"info scheduling-class",
382 	"info ip-type",
383 	"info max-lwps",
384 	"info max-shm-memory",
385 	"info max-shm-ids",
386 	"info max-msg-ids",
387 	"info max-sem-ids",
388 	"info cpu-shares",
389 	"info hostid",
390 	"info admin",
391 	"info fs-allowed",
392 	"info max-processes",
393 	NULL
394 };
395 
396 static const char *fs_res_scope_cmds[] = {
397 	"add options ",
398 	"cancel",
399 	"end",
400 	"exit",
401 	"help",
402 	"info",
403 	"remove options ",
404 	"set dir=",
405 	"set raw=",
406 	"set special=",
407 	"set type=",
408 	"clear raw",
409 	NULL
410 };
411 
412 static const char *net_res_scope_cmds[] = {
413 	"cancel",
414 	"end",
415 	"exit",
416 	"help",
417 	"info",
418 	"set address=",
419 	"set allowed-address=",
420 	"set physical=",
421 	"set defrouter=",
422 	NULL
423 };
424 
425 static const char *device_res_scope_cmds[] = {
426 	"cancel",
427 	"end",
428 	"exit",
429 	"help",
430 	"info",
431 	"set match=",
432 	NULL
433 };
434 
435 static const char *attr_res_scope_cmds[] = {
436 	"cancel",
437 	"end",
438 	"exit",
439 	"help",
440 	"info",
441 	"set name=",
442 	"set type=",
443 	"set value=",
444 	NULL
445 };
446 
447 static const char *rctl_res_scope_cmds[] = {
448 	"add value ",
449 	"cancel",
450 	"end",
451 	"exit",
452 	"help",
453 	"info",
454 	"remove value ",
455 	"set name=",
456 	NULL
457 };
458 
459 static const char *dataset_res_scope_cmds[] = {
460 	"cancel",
461 	"end",
462 	"exit",
463 	"help",
464 	"info",
465 	"set name=",
466 	NULL
467 };
468 
469 static const char *pset_res_scope_cmds[] = {
470 	"cancel",
471 	"end",
472 	"exit",
473 	"help",
474 	"info",
475 	"set ncpus=",
476 	"set importance=",
477 	"clear importance",
478 	NULL
479 };
480 
481 static const char *pcap_res_scope_cmds[] = {
482 	"cancel",
483 	"end",
484 	"exit",
485 	"help",
486 	"info",
487 	"set ncpus=",
488 	NULL
489 };
490 
491 static const char *mcap_res_scope_cmds[] = {
492 	"cancel",
493 	"end",
494 	"exit",
495 	"help",
496 	"info",
497 	"set physical=",
498 	"set swap=",
499 	"set locked=",
500 	"clear physical",
501 	"clear swap",
502 	"clear locked",
503 	NULL
504 };
505 
506 static const char *admin_res_scope_cmds[] = {
507 	"cancel",
508 	"end",
509 	"exit",
510 	"help",
511 	"info",
512 	"set user=",
513 	"set auths=",
514 	NULL
515 };
516 
517 static const char *secflags_res_scope_cmds[] = {
518 	"cancel",
519 	"end",
520 	"exit",
521 	"set default=",
522 	"set lower=",
523 	"set upper=",
524 	NULL
525 };
526 
527 struct xif {
528 	struct xif	*xif_next;
529 	char		xif_name[LIFNAMSIZ];
530 	boolean_t	xif_has_address;
531 	boolean_t	xif_has_defrouter;
532 };
533 
534 /* Global variables */
535 
536 /* list of network interfaces specified for exclusive IP zone */
537 struct xif *xif;
538 
539 /* set early in main(), never modified thereafter, used all over the place */
540 static char *execname;
541 
542 /* set in main(), used all over the place */
543 static zone_dochandle_t handle;
544 
545 /* used all over the place */
546 static char zone[ZONENAME_MAX];
547 static char revert_zone[ZONENAME_MAX];
548 
549 /* global brand operations */
550 static brand_handle_t brand;
551 
552 /* set in modifying functions, checked in read_input() */
553 static boolean_t need_to_commit = B_FALSE;
554 boolean_t saw_error;
555 
556 /* set in yacc parser, checked in read_input() */
557 boolean_t newline_terminated;
558 
559 /* set in main(), checked in lex error handler */
560 boolean_t cmd_file_mode;
561 
562 /* set in exit_func(), checked in read_input() */
563 static boolean_t time_to_exit = B_FALSE, force_exit = B_FALSE;
564 
565 /* used in short_usage() and zerr() */
566 static char *cmd_file_name = NULL;
567 
568 /* checked in read_input() and other places */
569 static boolean_t ok_to_prompt = B_FALSE;
570 
571 /* set and checked in initialize() */
572 static boolean_t got_handle = B_FALSE;
573 
574 /* initialized in do_interactive(), checked in initialize() */
575 static boolean_t interactive_mode;
576 
577 /* set if configuring the global zone */
578 static boolean_t global_zone = B_FALSE;
579 
580 /* set in main(), checked in multiple places */
581 static boolean_t read_only_mode;
582 
583 /* scope is outer/global or inner/resource */
584 static boolean_t global_scope = B_TRUE;
585 static int resource_scope;	/* should be in the RT_ list from zonecfg.h */
586 static int end_op = -1;		/* operation on end is either add or modify */
587 
588 int num_prop_vals;		/* for grammar */
589 
590 /*
591  * These are for keeping track of resources as they are specified as part of
592  * the multi-step process.  They should be initialized by add_resource() or
593  * select_func() and filled in by add_property() or set_func().
594  */
595 static struct zone_fstab	old_fstab, in_progress_fstab;
596 static struct zone_nwiftab	old_nwiftab, in_progress_nwiftab;
597 static struct zone_devtab	old_devtab, in_progress_devtab;
598 static struct zone_rctltab	old_rctltab, in_progress_rctltab;
599 static struct zone_attrtab	old_attrtab, in_progress_attrtab;
600 static struct zone_dstab	old_dstab, in_progress_dstab;
601 static struct zone_psettab	old_psettab, in_progress_psettab;
602 static struct zone_mcaptab	old_mcaptab, in_progress_mcaptab;
603 static struct zone_admintab	old_admintab, in_progress_admintab;
604 static struct zone_secflagstab	old_secflagstab, in_progress_secflagstab;
605 
606 static GetLine *gl;	/* The gl_get_line() resource object */
607 
608 static void bytes_to_units(char *str, char *buf, int bufsize);
609 
610 /* Functions begin here */
611 
612 static boolean_t
613 initial_match(const char *line1, const char *line2, int word_end)
614 {
615 	if (word_end <= 0)
616 		return (B_TRUE);
617 	return (strncmp(line1, line2, word_end) == 0);
618 }
619 
620 static int
621 add_stuff(WordCompletion *cpl, const char *line1, const char **list,
622     int word_end)
623 {
624 	int i, err;
625 
626 	for (i = 0; list[i] != NULL; i++) {
627 		if (initial_match(line1, list[i], word_end)) {
628 			err = cpl_add_completion(cpl, line1, 0, word_end,
629 			    list[i] + word_end, "", "");
630 			if (err != 0)
631 				return (err);
632 		}
633 	}
634 	return (0);
635 }
636 
637 static
638 /* ARGSUSED */
639 CPL_MATCH_FN(cmd_cpl_fn)
640 {
641 	if (global_scope) {
642 		/*
643 		 * The MAX/MIN tests below are to make sure we have at least
644 		 * enough characters to distinguish from other prefixes (MAX)
645 		 * but only check MIN(what we have, what we're checking).
646 		 */
647 		if (strncmp(line, "add ", MAX(MIN(word_end, 4), 1)) == 0)
648 			return (add_stuff(cpl, line, add_cmds, word_end));
649 		if (strncmp(line, "clear ", MAX(MIN(word_end, 6), 2)) == 0)
650 			return (add_stuff(cpl, line, clear_cmds, word_end));
651 		if (strncmp(line, "select ", MAX(MIN(word_end, 7), 3)) == 0)
652 			return (add_stuff(cpl, line, select_cmds, word_end));
653 		if (strncmp(line, "set ", MAX(MIN(word_end, 4), 3)) == 0)
654 			return (add_stuff(cpl, line, set_cmds, word_end));
655 		if (strncmp(line, "remove ", MAX(MIN(word_end, 7), 1)) == 0)
656 			return (add_stuff(cpl, line, remove_cmds, word_end));
657 		if (strncmp(line, "info ", MAX(MIN(word_end, 5), 1)) == 0)
658 			return (add_stuff(cpl, line, info_cmds, word_end));
659 		return (add_stuff(cpl, line, global_scope_cmds, word_end));
660 	}
661 	switch (resource_scope) {
662 	case RT_FS:
663 		return (add_stuff(cpl, line, fs_res_scope_cmds, word_end));
664 	case RT_NET:
665 		return (add_stuff(cpl, line, net_res_scope_cmds, word_end));
666 	case RT_DEVICE:
667 		return (add_stuff(cpl, line, device_res_scope_cmds, word_end));
668 	case RT_RCTL:
669 		return (add_stuff(cpl, line, rctl_res_scope_cmds, word_end));
670 	case RT_ATTR:
671 		return (add_stuff(cpl, line, attr_res_scope_cmds, word_end));
672 	case RT_DATASET:
673 		return (add_stuff(cpl, line, dataset_res_scope_cmds, word_end));
674 	case RT_DCPU:
675 		return (add_stuff(cpl, line, pset_res_scope_cmds, word_end));
676 	case RT_PCAP:
677 		return (add_stuff(cpl, line, pcap_res_scope_cmds, word_end));
678 	case RT_MCAP:
679 		return (add_stuff(cpl, line, mcap_res_scope_cmds, word_end));
680 	case RT_ADMIN:
681 		return (add_stuff(cpl, line, admin_res_scope_cmds, word_end));
682 	case RT_SECFLAGS:
683 		return (add_stuff(cpl, line, secflags_res_scope_cmds,
684 		    word_end));
685 
686 	}
687 	return (0);
688 }
689 
690 /*
691  * For the main CMD_func() functions below, several of them call getopt()
692  * then check optind against argc to make sure an extra parameter was not
693  * passed in.  The reason this is not caught in the grammar is that the
694  * grammar just checks for a miscellaneous TOKEN, which is *expected* to
695  * be "-F" (for example), but could be anything.  So (for example) this
696  * check will prevent "create bogus".
697  */
698 
699 cmd_t *
700 alloc_cmd(void)
701 {
702 	return (calloc(1, sizeof (cmd_t)));
703 }
704 
705 void
706 free_cmd(cmd_t *cmd)
707 {
708 	int i;
709 
710 	for (i = 0; i < MAX_EQ_PROP_PAIRS; i++)
711 		if (cmd->cmd_property_ptr[i] != NULL) {
712 			property_value_ptr_t pp = cmd->cmd_property_ptr[i];
713 
714 			switch (pp->pv_type) {
715 			case PROP_VAL_SIMPLE:
716 				free(pp->pv_simple);
717 				break;
718 			case PROP_VAL_COMPLEX:
719 				free_complex(pp->pv_complex);
720 				break;
721 			case PROP_VAL_LIST:
722 				free_list(pp->pv_list);
723 				break;
724 			}
725 		}
726 	for (i = 0; i < cmd->cmd_argc; i++)
727 		free(cmd->cmd_argv[i]);
728 	free(cmd);
729 }
730 
731 complex_property_ptr_t
732 alloc_complex(void)
733 {
734 	return (calloc(1, sizeof (complex_property_t)));
735 }
736 
737 void
738 free_complex(complex_property_ptr_t complex)
739 {
740 	if (complex == NULL)
741 		return;
742 	free_complex(complex->cp_next);
743 	if (complex->cp_value != NULL)
744 		free(complex->cp_value);
745 	free(complex);
746 }
747 
748 list_property_ptr_t
749 alloc_list(void)
750 {
751 	return (calloc(1, sizeof (list_property_t)));
752 }
753 
754 void
755 free_list(list_property_ptr_t list)
756 {
757 	if (list == NULL)
758 		return;
759 	if (list->lp_simple != NULL)
760 		free(list->lp_simple);
761 	free_complex(list->lp_complex);
762 	free_list(list->lp_next);
763 	free(list);
764 }
765 
766 void
767 free_outer_list(list_property_ptr_t list)
768 {
769 	if (list == NULL)
770 		return;
771 	free_outer_list(list->lp_next);
772 	free(list);
773 }
774 
775 static struct zone_rctlvaltab *
776 alloc_rctlvaltab(void)
777 {
778 	return (calloc(1, sizeof (struct zone_rctlvaltab)));
779 }
780 
781 static char *
782 rt_to_str(int res_type)
783 {
784 	assert(res_type >= RT_MIN && res_type <= RT_MAX);
785 	return (res_types[res_type]);
786 }
787 
788 static char *
789 pt_to_str(int prop_type)
790 {
791 	assert(prop_type >= PT_MIN && prop_type <= PT_MAX);
792 	return (prop_types[prop_type]);
793 }
794 
795 static char *
796 pvt_to_str(int pv_type)
797 {
798 	assert(pv_type >= PROP_VAL_MIN && pv_type <= PROP_VAL_MAX);
799 	return (prop_val_types[pv_type]);
800 }
801 
802 static char *
803 cmd_to_str(int cmd_num)
804 {
805 	assert(cmd_num >= CMD_MIN && cmd_num <= CMD_MAX);
806 	return (helptab[cmd_num].cmd_name);
807 }
808 
809 /* PRINTFLIKE1 */
810 static void
811 zerr(const char *fmt, ...)
812 {
813 	va_list alist;
814 	static int last_lineno;
815 
816 	/* lex_lineno has already been incremented in the lexer; compensate */
817 	if (cmd_file_mode && lex_lineno > last_lineno) {
818 		if (strcmp(cmd_file_name, "-") == 0)
819 			(void) fprintf(stderr, gettext("On line %d:\n"),
820 			    lex_lineno - 1);
821 		else
822 			(void) fprintf(stderr, gettext("On line %d of %s:\n"),
823 			    lex_lineno - 1, cmd_file_name);
824 		last_lineno = lex_lineno;
825 	}
826 	va_start(alist, fmt);
827 	(void) vfprintf(stderr, fmt, alist);
828 	(void) fprintf(stderr, "\n");
829 	va_end(alist);
830 }
831 
832 /*
833  * This is a separate function rather than a set of define's because of the
834  * gettext() wrapping.
835  */
836 
837 /*
838  * TRANSLATION_NOTE
839  * Each string below should have \t follow \n whenever needed; the
840  * initial \t and the terminal \n will be provided by the calling function.
841  */
842 
843 static char *
844 long_help(int cmd_num)
845 {
846 	static char line[1024];	/* arbitrary large amount */
847 
848 	assert(cmd_num >= CMD_MIN && cmd_num <= CMD_MAX);
849 	switch (cmd_num) {
850 		case CMD_HELP:
851 			return (gettext("Prints help message."));
852 		case CMD_CREATE:
853 			(void) snprintf(line, sizeof (line),
854 			    gettext("Creates a configuration for the "
855 			    "specified zone.  %s should be\n\tused to "
856 			    "begin configuring a new zone.  If overwriting an "
857 			    "existing\n\tconfiguration, the -F flag can be "
858 			    "used to force the action.  If\n\t-t template is "
859 			    "given, creates a configuration identical to the\n"
860 			    "\tspecified template, except that the zone name "
861 			    "is changed from\n\ttemplate to zonename.  '%s -a' "
862 			    "creates a configuration from a\n\tdetached "
863 			    "zonepath.  '%s -b' results in a blank "
864 			    "configuration.\n\t'%s' with no arguments applies "
865 			    "the Sun default settings."),
866 			    cmd_to_str(CMD_CREATE), cmd_to_str(CMD_CREATE),
867 			    cmd_to_str(CMD_CREATE), cmd_to_str(CMD_CREATE));
868 			return (line);
869 		case CMD_EXIT:
870 			return (gettext("Exits the program.  The -F flag can "
871 			    "be used to force the action."));
872 		case CMD_EXPORT:
873 			return (gettext("Prints configuration to standard "
874 			    "output, or to output-file if\n\tspecified, in "
875 			    "a form suitable for use in a command-file."));
876 		case CMD_ADD:
877 			return (gettext("Add specified resource to "
878 			    "configuration."));
879 		case CMD_DELETE:
880 			return (gettext("Deletes the specified zone.  The -F "
881 			    "flag can be used to force the\n\taction."));
882 		case CMD_REMOVE:
883 			return (gettext("Remove specified resource from "
884 			    "configuration.  The -F flag can be used\n\tto "
885 			    "force the action."));
886 		case CMD_SELECT:
887 			(void) snprintf(line, sizeof (line),
888 			    gettext("Selects a resource to modify.  "
889 			    "Resource modification is completed\n\twith the "
890 			    "command \"%s\".  The property name/value pairs "
891 			    "must uniquely\n\tidentify a resource.  Note that "
892 			    "the curly braces ('{', '}') mean one\n\tor more "
893 			    "of whatever is between them."),
894 			    cmd_to_str(CMD_END));
895 			return (line);
896 		case CMD_SET:
897 			return (gettext("Sets property values."));
898 		case CMD_CLEAR:
899 			return (gettext("Clears property values."));
900 		case CMD_INFO:
901 			return (gettext("Displays information about the "
902 			    "current configuration.  If resource\n\ttype is "
903 			    "specified, displays only information about "
904 			    "resources of\n\tthe relevant type.  If resource "
905 			    "id is specified, displays only\n\tinformation "
906 			    "about that resource."));
907 		case CMD_VERIFY:
908 			return (gettext("Verifies current configuration "
909 			    "for correctness (some resource types\n\thave "
910 			    "required properties)."));
911 		case CMD_COMMIT:
912 			(void) snprintf(line, sizeof (line),
913 			    gettext("Commits current configuration.  "
914 			    "Configuration must be committed to\n\tbe used by "
915 			    "%s.  Until the configuration is committed, "
916 			    "changes \n\tcan be removed with the %s "
917 			    "command.  This operation is\n\tattempted "
918 			    "automatically upon completion of a %s "
919 			    "session."), "zoneadm", cmd_to_str(CMD_REVERT),
920 			    "zonecfg");
921 			return (line);
922 		case CMD_REVERT:
923 			return (gettext("Reverts configuration back to the "
924 			    "last committed state.  The -F flag\n\tcan be "
925 			    "used to force the action."));
926 		case CMD_CANCEL:
927 			return (gettext("Cancels resource/property "
928 			    "specification."));
929 		case CMD_END:
930 			return (gettext("Ends resource/property "
931 			    "specification."));
932 	}
933 	/* NOTREACHED */
934 	return (NULL);
935 }
936 
937 /*
938  * Return the input filename appended to each component of the path
939  * or the filename itself if it is absolute.
940  * Parameters: path string, file name, output string.
941  */
942 /* Copied almost verbatim from libtnfctl/prb_findexec.c */
943 static const char *
944 exec_cat(const char *s1, const char *s2, char *si)
945 {
946 	char		   *s;
947 	/* Number of remaining characters in s */
948 	int			 cnt = PATH_MAX + 1;
949 
950 	s = si;
951 	while (*s1 && *s1 != ':') { /* Copy first component of path to si */
952 		if (cnt > 0) {
953 			*s++ = *s1++;
954 			cnt--;
955 		} else {
956 			s1++;
957 		}
958 	}
959 	if (si != s && cnt > 0) { /* Add slash if s2 is not absolute */
960 		*s++ = '/';
961 		cnt--;
962 	}
963 	while (*s2 && cnt > 0) { /* Copy s2 to si */
964 		*s++ = *s2++;
965 		cnt--;
966 	}
967 	*s = '\0';  /* Terminate the output string */
968 	return (*s1 ? ++s1 : NULL);  /* Return next path component or NULL */
969 }
970 
971 /* Determine that a name exists in PATH */
972 /* Copied with changes from libtnfctl/prb_findexec.c */
973 static int
974 path_find(const char *name)
975 {
976 	const char	 *pathstr;
977 	char		fname[PATH_MAX + 2];
978 	const char	 *cp;
979 	struct stat	 stat_buf;
980 
981 	if ((pathstr = getenv("PATH")) == NULL) {
982 		if (geteuid() == 0 || getuid() == 0)
983 			pathstr = "/usr/sbin:/usr/bin";
984 		else
985 			pathstr = "/usr/bin:";
986 	}
987 	cp = strchr(name, '/') ? (const char *) "" : pathstr;
988 
989 	do {
990 		cp = exec_cat(cp, name, fname);
991 		if (stat(fname, &stat_buf) != -1) {
992 			/* successful find of the file */
993 			return (0);
994 		}
995 	} while (cp != NULL);
996 
997 	return (-1);
998 }
999 
1000 static FILE *
1001 pager_open(void)
1002 {
1003 	FILE *newfp;
1004 	char *pager, *space;
1005 
1006 	pager = getenv("PAGER");
1007 	if (pager == NULL || *pager == '\0')
1008 		pager = PAGER;
1009 
1010 	space = strchr(pager, ' ');
1011 	if (space)
1012 		*space = '\0';
1013 	if (path_find(pager) == 0) {
1014 		if (space)
1015 			*space = ' ';
1016 		if ((newfp = popen(pager, "w")) == NULL)
1017 			zerr(gettext("PAGER open failed (%s)."),
1018 			    strerror(errno));
1019 		return (newfp);
1020 	} else {
1021 		zerr(gettext("PAGER %s does not exist (%s)."),
1022 		    pager, strerror(errno));
1023 	}
1024 	return (NULL);
1025 }
1026 
1027 static void
1028 pager_close(FILE *fp)
1029 {
1030 	int status;
1031 
1032 	status = pclose(fp);
1033 	if (status == -1)
1034 		zerr(gettext("PAGER close failed (%s)."),
1035 		    strerror(errno));
1036 }
1037 
1038 /*
1039  * Called with verbose TRUE when help is explicitly requested, FALSE for
1040  * unexpected errors.
1041  */
1042 
1043 void
1044 usage(boolean_t verbose, uint_t flags)
1045 {
1046 	FILE *fp = verbose ? stdout : stderr;
1047 	FILE *newfp;
1048 	boolean_t need_to_close = B_FALSE;
1049 	int i;
1050 
1051 	/* don't page error output */
1052 	if (verbose && interactive_mode) {
1053 		if ((newfp = pager_open()) != NULL) {
1054 			need_to_close = B_TRUE;
1055 			fp = newfp;
1056 		}
1057 	}
1058 
1059 	if (flags & HELP_META) {
1060 		(void) fprintf(fp, gettext("More help is available for the "
1061 		    "following:\n"));
1062 		(void) fprintf(fp, "\n\tcommands ('%s commands')\n",
1063 		    cmd_to_str(CMD_HELP));
1064 		(void) fprintf(fp, "\tsyntax ('%s syntax')\n",
1065 		    cmd_to_str(CMD_HELP));
1066 		(void) fprintf(fp, "\tusage ('%s usage')\n\n",
1067 		    cmd_to_str(CMD_HELP));
1068 		(void) fprintf(fp, gettext("You may also obtain help on any "
1069 		    "command by typing '%s <command-name>.'\n"),
1070 		    cmd_to_str(CMD_HELP));
1071 	}
1072 	if (flags & HELP_RES_SCOPE) {
1073 		switch (resource_scope) {
1074 		case RT_FS:
1075 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1076 			    "used to configure a file-system.\n"),
1077 			    rt_to_str(resource_scope));
1078 			(void) fprintf(fp, gettext("Valid commands:\n"));
1079 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1080 			    pt_to_str(PT_DIR), gettext("<path>"));
1081 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1082 			    pt_to_str(PT_SPECIAL), gettext("<path>"));
1083 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1084 			    pt_to_str(PT_RAW), gettext("<raw-device>"));
1085 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1086 			    pt_to_str(PT_TYPE), gettext("<file-system type>"));
1087 			(void) fprintf(fp, "\t%s %s %s\n", cmd_to_str(CMD_ADD),
1088 			    pt_to_str(PT_OPTIONS),
1089 			    gettext("<file-system options>"));
1090 			(void) fprintf(fp, "\t%s %s %s\n",
1091 			    cmd_to_str(CMD_REMOVE), pt_to_str(PT_OPTIONS),
1092 			    gettext("<file-system options>"));
1093 			(void) fprintf(fp, gettext("Consult the file-system "
1094 			    "specific manual page, such as mount_ufs(1M), "
1095 			    "for\ndetails about file-system options.  Note "
1096 			    "that any file-system options with an\nembedded "
1097 			    "'=' character must be enclosed in double quotes, "
1098 			    /*CSTYLED*/
1099 			    "such as \"%s=5\".\n"), MNTOPT_RETRY);
1100 			break;
1101 		case RT_NET:
1102 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1103 			    "used to configure a network interface.\n"),
1104 			    rt_to_str(resource_scope));
1105 			(void) fprintf(fp, gettext("Valid commands:\n"));
1106 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1107 			    pt_to_str(PT_ADDRESS), gettext("<IP-address>"));
1108 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1109 			    pt_to_str(PT_ALLOWED_ADDRESS),
1110 			    gettext("<IP-address>"));
1111 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1112 			    pt_to_str(PT_PHYSICAL), gettext("<interface>"));
1113 			(void) fprintf(fp, gettext("See ifconfig(1M) for "
1114 			    "details of the <interface> string.\n"));
1115 			(void) fprintf(fp, gettext("%s %s is valid "
1116 			    "if the %s property is set to %s, otherwise it "
1117 			    "must not be set.\n"),
1118 			    cmd_to_str(CMD_SET), pt_to_str(PT_ADDRESS),
1119 			    pt_to_str(PT_IPTYPE), gettext("shared"));
1120 			(void) fprintf(fp, gettext("%s %s is valid "
1121 			    "if the %s property is set to %s, otherwise it "
1122 			    "must not be set.\n"),
1123 			    cmd_to_str(CMD_SET), pt_to_str(PT_ALLOWED_ADDRESS),
1124 			    pt_to_str(PT_IPTYPE), gettext("exclusive"));
1125 			(void) fprintf(fp, gettext("\t%s %s=%s\n%s %s "
1126 			    "is valid if the %s or %s property is set, "
1127 			    "otherwise it must not be set\n"),
1128 			    cmd_to_str(CMD_SET),
1129 			    pt_to_str(PT_DEFROUTER), gettext("<IP-address>"),
1130 			    cmd_to_str(CMD_SET), pt_to_str(PT_DEFROUTER),
1131 			    gettext(pt_to_str(PT_ADDRESS)),
1132 			    gettext(pt_to_str(PT_ALLOWED_ADDRESS)));
1133 			break;
1134 		case RT_DEVICE:
1135 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1136 			    "used to configure a device node.\n"),
1137 			    rt_to_str(resource_scope));
1138 			(void) fprintf(fp, gettext("Valid commands:\n"));
1139 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1140 			    pt_to_str(PT_MATCH), gettext("<device-path>"));
1141 			break;
1142 		case RT_RCTL:
1143 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1144 			    "used to configure a resource control.\n"),
1145 			    rt_to_str(resource_scope));
1146 			(void) fprintf(fp, gettext("Valid commands:\n"));
1147 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1148 			    pt_to_str(PT_NAME), gettext("<string>"));
1149 			(void) fprintf(fp, "\t%s %s (%s=%s,%s=%s,%s=%s)\n",
1150 			    cmd_to_str(CMD_ADD), pt_to_str(PT_VALUE),
1151 			    pt_to_str(PT_PRIV), gettext("<priv-value>"),
1152 			    pt_to_str(PT_LIMIT), gettext("<number>"),
1153 			    pt_to_str(PT_ACTION), gettext("<action-value>"));
1154 			(void) fprintf(fp, "\t%s %s (%s=%s,%s=%s,%s=%s)\n",
1155 			    cmd_to_str(CMD_REMOVE), pt_to_str(PT_VALUE),
1156 			    pt_to_str(PT_PRIV), gettext("<priv-value>"),
1157 			    pt_to_str(PT_LIMIT), gettext("<number>"),
1158 			    pt_to_str(PT_ACTION), gettext("<action-value>"));
1159 			(void) fprintf(fp, "%s\n\t%s := privileged\n"
1160 			    "\t%s := none | deny\n", gettext("Where"),
1161 			    gettext("<priv-value>"), gettext("<action-value>"));
1162 			break;
1163 		case RT_ATTR:
1164 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1165 			    "used to configure a generic attribute.\n"),
1166 			    rt_to_str(resource_scope));
1167 			(void) fprintf(fp, gettext("Valid commands:\n"));
1168 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1169 			    pt_to_str(PT_NAME), gettext("<name>"));
1170 			(void) fprintf(fp, "\t%s %s=boolean\n",
1171 			    cmd_to_str(CMD_SET), pt_to_str(PT_TYPE));
1172 			(void) fprintf(fp, "\t%s %s=true | false\n",
1173 			    cmd_to_str(CMD_SET), pt_to_str(PT_VALUE));
1174 			(void) fprintf(fp, gettext("or\n"));
1175 			(void) fprintf(fp, "\t%s %s=int\n", cmd_to_str(CMD_SET),
1176 			    pt_to_str(PT_TYPE));
1177 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1178 			    pt_to_str(PT_VALUE), gettext("<integer>"));
1179 			(void) fprintf(fp, gettext("or\n"));
1180 			(void) fprintf(fp, "\t%s %s=string\n",
1181 			    cmd_to_str(CMD_SET), pt_to_str(PT_TYPE));
1182 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1183 			    pt_to_str(PT_VALUE), gettext("<string>"));
1184 			(void) fprintf(fp, gettext("or\n"));
1185 			(void) fprintf(fp, "\t%s %s=uint\n",
1186 			    cmd_to_str(CMD_SET), pt_to_str(PT_TYPE));
1187 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1188 			    pt_to_str(PT_VALUE), gettext("<unsigned integer>"));
1189 			break;
1190 		case RT_DATASET:
1191 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1192 			    "used to export ZFS datasets.\n"),
1193 			    rt_to_str(resource_scope));
1194 			(void) fprintf(fp, gettext("Valid commands:\n"));
1195 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1196 			    pt_to_str(PT_NAME), gettext("<name>"));
1197 			break;
1198 		case RT_DCPU:
1199 			(void) fprintf(fp, gettext("The '%s' resource scope "
1200 			    "configures the 'pools' facility to dedicate\na "
1201 			    "subset of the system's processors to this zone "
1202 			    "while it is running.\n"),
1203 			    rt_to_str(resource_scope));
1204 			(void) fprintf(fp, gettext("Valid commands:\n"));
1205 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1206 			    pt_to_str(PT_NCPUS),
1207 			    gettext("<unsigned integer | range>"));
1208 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1209 			    pt_to_str(PT_IMPORTANCE),
1210 			    gettext("<unsigned integer>"));
1211 			break;
1212 		case RT_PCAP:
1213 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1214 			    "used to set an upper limit (a cap) on the\n"
1215 			    "percentage of CPU that can be used by this zone.  "
1216 			    "A '%s' value of 1\ncorresponds to one cpu.  The "
1217 			    "value can be set higher than 1, up to the total\n"
1218 			    "number of CPUs on the system.  The value can "
1219 			    "also be less than 1,\nrepresenting a fraction of "
1220 			    "a cpu.\n"),
1221 			    rt_to_str(resource_scope), pt_to_str(PT_NCPUS));
1222 			(void) fprintf(fp, gettext("Valid commands:\n"));
1223 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1224 			    pt_to_str(PT_NCPUS), gettext("<unsigned decimal>"));
1225 			break;
1226 		case RT_MCAP:
1227 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1228 			    "used to set an upper limit (a cap) on the\n"
1229 			    "amount of physical memory, swap space and locked "
1230 			    "memory that can be used by\nthis zone.\n"),
1231 			    rt_to_str(resource_scope));
1232 			(void) fprintf(fp, gettext("Valid commands:\n"));
1233 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1234 			    pt_to_str(PT_PHYSICAL),
1235 			    gettext("<qualified unsigned decimal>"));
1236 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1237 			    pt_to_str(PT_SWAP),
1238 			    gettext("<qualified unsigned decimal>"));
1239 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1240 			    pt_to_str(PT_LOCKED),
1241 			    gettext("<qualified unsigned decimal>"));
1242 			break;
1243 		case RT_ADMIN:
1244 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1245 			    "used to delegate specific zone management\n"
1246 			    "rights to users and roles. These rights are "
1247 			    "only applicable to this zone.\n"),
1248 			    rt_to_str(resource_scope));
1249 			(void) fprintf(fp, gettext("Valid commands:\n"));
1250 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1251 			    pt_to_str(PT_USER),
1252 			    gettext("<single user or role name>"));
1253 			(void) fprintf(fp, "\t%s %s=%s\n", cmd_to_str(CMD_SET),
1254 			    pt_to_str(PT_AUTHS),
1255 			    gettext("<comma separated list>"));
1256 			break;
1257 		case RT_SECFLAGS:
1258 			(void) fprintf(fp, gettext("The '%s' resource scope is "
1259 			    "used to specify the default security-flags\n"
1260 			    "of this zone, and their upper and lower bound.\n"),
1261 			    rt_to_str(resource_scope));
1262 			(void) fprintf(fp, "\t%s %s=%s\n",
1263 			    cmd_to_str(CMD_SET), pt_to_str(PT_DEFAULT),
1264 			    gettext("<security flags>"));
1265 			(void) fprintf(fp, "\t%s %s=%s\n",
1266 			    cmd_to_str(CMD_SET), pt_to_str(PT_LOWER),
1267 			    gettext("<security flags>"));
1268 			(void) fprintf(fp, "\t%s %s=%s\n",
1269 			    cmd_to_str(CMD_SET), pt_to_str(PT_UPPER),
1270 			    gettext("<security flags>"));
1271 			break;
1272 		}
1273 		(void) fprintf(fp, gettext("And from any resource scope, you "
1274 		    "can:\n"));
1275 		(void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_END),
1276 		    gettext("(to conclude this operation)"));
1277 		(void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_CANCEL),
1278 		    gettext("(to cancel this operation)"));
1279 		(void) fprintf(fp, "\t%s\t%s\n", cmd_to_str(CMD_EXIT),
1280 		    gettext("(to exit the zonecfg utility)"));
1281 	}
1282 	if (flags & HELP_USAGE) {
1283 		(void) fprintf(fp, "%s:\t%s %s\n", gettext("usage"),
1284 		    execname, cmd_to_str(CMD_HELP));
1285 		(void) fprintf(fp, "\t%s -z <zone>\t\t\t(%s)\n",
1286 		    execname, gettext("interactive"));
1287 		(void) fprintf(fp, "\t%s -z <zone> <command>\n", execname);
1288 		(void) fprintf(fp, "\t%s -z <zone> -f <command-file>\n",
1289 		    execname);
1290 	}
1291 	if (flags & HELP_SUBCMDS) {
1292 		(void) fprintf(fp, "%s:\n\n", gettext("Commands"));
1293 		for (i = 0; i <= CMD_MAX; i++) {
1294 			(void) fprintf(fp, "%s\n", helptab[i].short_usage);
1295 			if (verbose)
1296 				(void) fprintf(fp, "\t%s\n\n", long_help(i));
1297 		}
1298 	}
1299 	if (flags & HELP_SYNTAX) {
1300 		if (!verbose)
1301 			(void) fprintf(fp, "\n");
1302 		(void) fprintf(fp, "<zone> := [A-Za-z0-9][A-Za-z0-9_.-]*\n");
1303 		(void) fprintf(fp, gettext("\t(except the reserved words "
1304 		    "'%s' and anything starting with '%s')\n"), "global",
1305 		    "SUNW");
1306 		(void) fprintf(fp,
1307 		    gettext("\tName must be less than %d characters.\n"),
1308 		    ZONENAME_MAX);
1309 		if (verbose)
1310 			(void) fprintf(fp, "\n");
1311 	}
1312 	if (flags & HELP_NETADDR) {
1313 		(void) fprintf(fp, gettext("\n<net-addr> :="));
1314 		(void) fprintf(fp,
1315 		    gettext("\t<IPv4-address>[/<IPv4-prefix-length>] |\n"));
1316 		(void) fprintf(fp,
1317 		    gettext("\t\t<IPv6-address>/<IPv6-prefix-length> |\n"));
1318 		(void) fprintf(fp,
1319 		    gettext("\t\t<hostname>[/<IPv4-prefix-length>]\n"));
1320 		(void) fprintf(fp, gettext("See inet(3SOCKET) for IPv4 and "
1321 		    "IPv6 address syntax.\n"));
1322 		(void) fprintf(fp, gettext("<IPv4-prefix-length> := [0-32]\n"));
1323 		(void) fprintf(fp,
1324 		    gettext("<IPv6-prefix-length> := [0-128]\n"));
1325 		(void) fprintf(fp,
1326 		    gettext("<hostname> := [A-Za-z0-9][A-Za-z0-9-.]*\n"));
1327 	}
1328 	if (flags & HELP_RESOURCES) {
1329 		(void) fprintf(fp, "<%s> := %s | %s | %s | %s | %s |\n\t"
1330 		    "%s | %s | %s | %s | %s\n\n",
1331 		    gettext("resource type"), rt_to_str(RT_FS),
1332 		    rt_to_str(RT_NET), rt_to_str(RT_DEVICE),
1333 		    rt_to_str(RT_RCTL), rt_to_str(RT_ATTR),
1334 		    rt_to_str(RT_DATASET), rt_to_str(RT_DCPU),
1335 		    rt_to_str(RT_PCAP), rt_to_str(RT_MCAP),
1336 		    rt_to_str(RT_ADMIN), rt_to_str(RT_SECFLAGS));
1337 	}
1338 	if (flags & HELP_PROPS) {
1339 		(void) fprintf(fp, gettext("For resource type ... there are "
1340 		    "property types ...:\n"));
1341 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1342 		    pt_to_str(PT_ZONENAME));
1343 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1344 		    pt_to_str(PT_ZONEPATH));
1345 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1346 		    pt_to_str(PT_BRAND));
1347 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1348 		    pt_to_str(PT_AUTOBOOT));
1349 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1350 		    pt_to_str(PT_BOOTARGS));
1351 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1352 		    pt_to_str(PT_POOL));
1353 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1354 		    pt_to_str(PT_LIMITPRIV));
1355 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1356 		    pt_to_str(PT_SCHED));
1357 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1358 		    pt_to_str(PT_IPTYPE));
1359 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1360 		    pt_to_str(PT_HOSTID));
1361 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1362 		    pt_to_str(PT_FS_ALLOWED));
1363 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1364 		    pt_to_str(PT_MAXLWPS));
1365 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1366 		    pt_to_str(PT_MAXPROCS));
1367 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1368 		    pt_to_str(PT_MAXSHMMEM));
1369 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1370 		    pt_to_str(PT_MAXSHMIDS));
1371 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1372 		    pt_to_str(PT_MAXMSGIDS));
1373 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1374 		    pt_to_str(PT_MAXSEMIDS));
1375 		(void) fprintf(fp, "\t%s\t%s\n", gettext("(global)"),
1376 		    pt_to_str(PT_SHARES));
1377 		(void) fprintf(fp, "\t%s\t\t%s, %s, %s, %s, %s\n",
1378 		    rt_to_str(RT_FS), pt_to_str(PT_DIR),
1379 		    pt_to_str(PT_SPECIAL), pt_to_str(PT_RAW),
1380 		    pt_to_str(PT_TYPE), pt_to_str(PT_OPTIONS));
1381 		(void) fprintf(fp, "\t%s\t\t%s, %s, %s|%s\n", rt_to_str(RT_NET),
1382 		    pt_to_str(PT_ADDRESS), pt_to_str(PT_ALLOWED_ADDRESS),
1383 		    pt_to_str(PT_PHYSICAL), pt_to_str(PT_DEFROUTER));
1384 		(void) fprintf(fp, "\t%s\t\t%s\n", rt_to_str(RT_DEVICE),
1385 		    pt_to_str(PT_MATCH));
1386 		(void) fprintf(fp, "\t%s\t\t%s, %s\n", rt_to_str(RT_RCTL),
1387 		    pt_to_str(PT_NAME), pt_to_str(PT_VALUE));
1388 		(void) fprintf(fp, "\t%s\t\t%s, %s, %s\n", rt_to_str(RT_ATTR),
1389 		    pt_to_str(PT_NAME), pt_to_str(PT_TYPE),
1390 		    pt_to_str(PT_VALUE));
1391 		(void) fprintf(fp, "\t%s\t\t%s\n", rt_to_str(RT_DATASET),
1392 		    pt_to_str(PT_NAME));
1393 		(void) fprintf(fp, "\t%s\t%s, %s\n", rt_to_str(RT_DCPU),
1394 		    pt_to_str(PT_NCPUS), pt_to_str(PT_IMPORTANCE));
1395 		(void) fprintf(fp, "\t%s\t%s\n", rt_to_str(RT_PCAP),
1396 		    pt_to_str(PT_NCPUS));
1397 		(void) fprintf(fp, "\t%s\t%s, %s, %s\n", rt_to_str(RT_MCAP),
1398 		    pt_to_str(PT_PHYSICAL), pt_to_str(PT_SWAP),
1399 		    pt_to_str(PT_LOCKED));
1400 		(void) fprintf(fp, "\t%s\t\t%s, %s\n", rt_to_str(RT_ADMIN),
1401 		    pt_to_str(PT_USER), pt_to_str(PT_AUTHS));
1402 		(void) fprintf(fp, "\t%s\t\t%s, %s, %s\n",
1403 		    rt_to_str(RT_SECFLAGS), pt_to_str(PT_DEFAULT),
1404 		    pt_to_str(PT_LOWER), pt_to_str(PT_UPPER));
1405 	}
1406 	if (need_to_close)
1407 		(void) pager_close(fp);
1408 }
1409 
1410 static void
1411 zone_perror(char *prefix, int err, boolean_t set_saw)
1412 {
1413 	zerr("%s: %s", prefix, zonecfg_strerror(err));
1414 	if (set_saw)
1415 		saw_error = B_TRUE;
1416 }
1417 
1418 /*
1419  * zone_perror() expects a single string, but for remove and select
1420  * we have both the command and the resource type, so this wrapper
1421  * function serves the same purpose in a slightly different way.
1422  */
1423 
1424 static void
1425 z_cmd_rt_perror(int cmd_num, int res_num, int err, boolean_t set_saw)
1426 {
1427 	zerr("%s %s: %s", cmd_to_str(cmd_num), rt_to_str(res_num),
1428 	    zonecfg_strerror(err));
1429 	if (set_saw)
1430 		saw_error = B_TRUE;
1431 }
1432 
1433 /* returns Z_OK if successful, Z_foo from <libzonecfg.h> otherwise */
1434 static int
1435 initialize(boolean_t handle_expected)
1436 {
1437 	int err;
1438 	char brandname[MAXNAMELEN];
1439 
1440 	if (zonecfg_check_handle(handle) != Z_OK) {
1441 		if ((err = zonecfg_get_handle(zone, handle)) == Z_OK) {
1442 			got_handle = B_TRUE;
1443 			if (zonecfg_get_brand(handle, brandname,
1444 			    sizeof (brandname)) != Z_OK) {
1445 				zerr("Zone %s is inconsistent: missing "
1446 				    "brand attribute", zone);
1447 				exit(Z_ERR);
1448 			}
1449 			if ((brand = brand_open(brandname)) == NULL) {
1450 				zerr("Zone %s uses non-existent brand \"%s\"."
1451 				    "  Unable to continue", zone, brandname);
1452 				exit(Z_ERR);
1453 			}
1454 			/*
1455 			 * If the user_attr file is newer than
1456 			 * the zone config file, the admins
1457 			 * may need to be updated since the
1458 			 * RBAC files are authoritative for
1459 			 * authorization checks.
1460 			 */
1461 			err = zonecfg_update_userauths(handle, zone);
1462 			if (err == Z_OK) {
1463 				zerr(gettext("The administrative rights "
1464 				    "were updated to match "
1465 				    "the current RBAC configuration.\n"
1466 				    "Use \"info admin\" and \"revert\" to "
1467 				    "compare with the previous settings."));
1468 				need_to_commit = B_TRUE;
1469 			} else if (err != Z_NO_ENTRY) {
1470 				zerr(gettext("failed to update "
1471 				    "admin  rights."));
1472 				exit(Z_ERR);
1473 			} else if (need_to_commit) {
1474 				zerr(gettext("admin rights were updated "
1475 				    "to match RBAC configuration."));
1476 			}
1477 
1478 		} else if (global_zone && err == Z_NO_ZONE && !got_handle &&
1479 		    !read_only_mode) {
1480 			/*
1481 			 * We implicitly create the global zone config if it
1482 			 * doesn't exist.
1483 			 */
1484 			zone_dochandle_t tmphandle;
1485 
1486 			if ((tmphandle = zonecfg_init_handle()) == NULL) {
1487 				zone_perror(execname, Z_NOMEM, B_TRUE);
1488 				exit(Z_ERR);
1489 			}
1490 
1491 			err = zonecfg_get_template_handle("SUNWblank", zone,
1492 			    tmphandle);
1493 
1494 			if (err != Z_OK) {
1495 				zonecfg_fini_handle(tmphandle);
1496 				zone_perror("SUNWblank", err, B_TRUE);
1497 				return (err);
1498 			}
1499 
1500 			need_to_commit = B_TRUE;
1501 			zonecfg_fini_handle(handle);
1502 			handle = tmphandle;
1503 			got_handle = B_TRUE;
1504 
1505 		} else {
1506 			zone_perror(zone, err, handle_expected || got_handle);
1507 			if (err == Z_NO_ZONE && !got_handle &&
1508 			    interactive_mode && !read_only_mode)
1509 				(void) printf(gettext("Use '%s' to begin "
1510 				    "configuring a new zone.\n"),
1511 				    cmd_to_str(CMD_CREATE));
1512 			return (err);
1513 		}
1514 	}
1515 	return (Z_OK);
1516 }
1517 
1518 static boolean_t
1519 state_atleast(zone_state_t state)
1520 {
1521 	zone_state_t state_num;
1522 	int err;
1523 
1524 	if ((err = zone_get_state(zone, &state_num)) != Z_OK) {
1525 		/* all states are greater than "non-existent" */
1526 		if (err == Z_NO_ZONE)
1527 			return (B_FALSE);
1528 		zerr(gettext("Unexpectedly failed to determine state "
1529 		    "of zone %s: %s"), zone, zonecfg_strerror(err));
1530 		exit(Z_ERR);
1531 	}
1532 	return (state_num >= state);
1533 }
1534 
1535 /*
1536  * short_usage() is for bad syntax: getopt() issues, too many arguments, etc.
1537  */
1538 
1539 void
1540 short_usage(int command)
1541 {
1542 	/* lex_lineno has already been incremented in the lexer; compensate */
1543 	if (cmd_file_mode) {
1544 		if (strcmp(cmd_file_name, "-") == 0)
1545 			(void) fprintf(stderr,
1546 			    gettext("syntax error on line %d\n"),
1547 			    lex_lineno - 1);
1548 		else
1549 			(void) fprintf(stderr,
1550 			    gettext("syntax error on line %d of %s\n"),
1551 			    lex_lineno - 1, cmd_file_name);
1552 	}
1553 	(void) fprintf(stderr, "%s:\n%s\n", gettext("usage"),
1554 	    helptab[command].short_usage);
1555 	saw_error = B_TRUE;
1556 }
1557 
1558 /*
1559  * long_usage() is for bad semantics: e.g., wrong property type for a given
1560  * resource type.  It is also used by longer_usage() below.
1561  */
1562 
1563 void
1564 long_usage(uint_t cmd_num, boolean_t set_saw)
1565 {
1566 	(void) fprintf(set_saw ? stderr : stdout, "%s:\n%s\n", gettext("usage"),
1567 	    helptab[cmd_num].short_usage);
1568 	(void) fprintf(set_saw ? stderr : stdout, "\t%s\n", long_help(cmd_num));
1569 	if (set_saw)
1570 		saw_error = B_TRUE;
1571 }
1572 
1573 /*
1574  * longer_usage() is for 'help foo' and 'foo -?': call long_usage() and also
1575  * any extra usage() flags as appropriate for whatever command.
1576  */
1577 
1578 void
1579 longer_usage(uint_t cmd_num)
1580 {
1581 	long_usage(cmd_num, B_FALSE);
1582 	if (helptab[cmd_num].flags != 0) {
1583 		(void) printf("\n");
1584 		usage(B_TRUE, helptab[cmd_num].flags);
1585 	}
1586 }
1587 
1588 /*
1589  * scope_usage() is simply used when a command is called from the wrong scope.
1590  */
1591 
1592 static void
1593 scope_usage(uint_t cmd_num)
1594 {
1595 	zerr(gettext("The %s command only makes sense in the %s scope."),
1596 	    cmd_to_str(cmd_num),
1597 	    global_scope ?  gettext("resource") : gettext("global"));
1598 	saw_error = B_TRUE;
1599 }
1600 
1601 /*
1602  * On input, B_TRUE => yes, B_FALSE => no.
1603  * On return, B_TRUE => 1, B_FALSE => no, could not ask => -1.
1604  */
1605 
1606 static int
1607 ask_yesno(boolean_t default_answer, const char *question)
1608 {
1609 	char line[64];	/* should be enough to answer yes or no */
1610 
1611 	if (!ok_to_prompt) {
1612 		saw_error = B_TRUE;
1613 		return (-1);
1614 	}
1615 	for (;;) {
1616 		if (printf("%s (%s)? ", question,
1617 		    default_answer ? "[y]/n" : "y/[n]") < 0)
1618 			return (-1);
1619 		if (fgets(line, sizeof (line), stdin) == NULL)
1620 			return (-1);
1621 
1622 		if (line[0] == '\n')
1623 			return (default_answer ? 1 : 0);
1624 		if (tolower(line[0]) == 'y')
1625 			return (1);
1626 		if (tolower(line[0]) == 'n')
1627 			return (0);
1628 	}
1629 }
1630 
1631 /*
1632  * Prints warning if zone already exists.
1633  * In interactive mode, prompts if we should continue anyway and returns Z_OK
1634  * if so, Z_ERR if not.  In non-interactive mode, exits with Z_ERR.
1635  *
1636  * Note that if a zone exists and its state is >= INSTALLED, an error message
1637  * will be printed and this function will return Z_ERR regardless of mode.
1638  */
1639 
1640 static int
1641 check_if_zone_already_exists(boolean_t force)
1642 {
1643 	char line[ZONENAME_MAX + 128];	/* enough to ask a question */
1644 	zone_dochandle_t tmphandle;
1645 	int res, answer;
1646 
1647 	if ((tmphandle = zonecfg_init_handle()) == NULL) {
1648 		zone_perror(execname, Z_NOMEM, B_TRUE);
1649 		exit(Z_ERR);
1650 	}
1651 	res = zonecfg_get_handle(zone, tmphandle);
1652 	zonecfg_fini_handle(tmphandle);
1653 	if (res != Z_OK)
1654 		return (Z_OK);
1655 
1656 	if (state_atleast(ZONE_STATE_INSTALLED)) {
1657 		zerr(gettext("Zone %s already installed; %s not allowed."),
1658 		    zone, cmd_to_str(CMD_CREATE));
1659 		return (Z_ERR);
1660 	}
1661 
1662 	if (force) {
1663 		(void) printf(gettext("Zone %s already exists; overwriting.\n"),
1664 		    zone);
1665 		return (Z_OK);
1666 	}
1667 	(void) snprintf(line, sizeof (line),
1668 	    gettext("Zone %s already exists; %s anyway"), zone,
1669 	    cmd_to_str(CMD_CREATE));
1670 	if ((answer = ask_yesno(B_FALSE, line)) == -1) {
1671 		zerr(gettext("Zone exists, input not from terminal and -F not "
1672 		    "specified:\n%s command ignored, exiting."),
1673 		    cmd_to_str(CMD_CREATE));
1674 		exit(Z_ERR);
1675 	}
1676 	return (answer == 1 ? Z_OK : Z_ERR);
1677 }
1678 
1679 static boolean_t
1680 zone_is_read_only(int cmd_num)
1681 {
1682 	if (strncmp(zone, "SUNW", 4) == 0) {
1683 		zerr(gettext("%s: zones beginning with SUNW are read-only."),
1684 		    zone);
1685 		saw_error = B_TRUE;
1686 		return (B_TRUE);
1687 	}
1688 	if (read_only_mode) {
1689 		zerr(gettext("%s: cannot %s in read-only mode."), zone,
1690 		    cmd_to_str(cmd_num));
1691 		saw_error = B_TRUE;
1692 		return (B_TRUE);
1693 	}
1694 	return (B_FALSE);
1695 }
1696 
1697 /*
1698  * Create a new configuration.
1699  */
1700 void
1701 create_func(cmd_t *cmd)
1702 {
1703 	int err, arg;
1704 	char zone_template[ZONENAME_MAX];
1705 	char attach_path[MAXPATHLEN];
1706 	zone_dochandle_t tmphandle;
1707 	boolean_t force = B_FALSE;
1708 	boolean_t attach = B_FALSE;
1709 	boolean_t arg_err = B_FALSE;
1710 
1711 	assert(cmd != NULL);
1712 
1713 	/* This is the default if no arguments are given. */
1714 	(void) strlcpy(zone_template, "SUNWdefault", sizeof (zone_template));
1715 
1716 	optind = 0;
1717 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?a:bFt:"))
1718 	    != EOF) {
1719 		switch (arg) {
1720 		case '?':
1721 			if (optopt == '?')
1722 				longer_usage(CMD_CREATE);
1723 			else
1724 				short_usage(CMD_CREATE);
1725 			arg_err = B_TRUE;
1726 			break;
1727 		case 'a':
1728 			(void) strlcpy(attach_path, optarg,
1729 			    sizeof (attach_path));
1730 			attach = B_TRUE;
1731 			break;
1732 		case 'b':
1733 			(void) strlcpy(zone_template, "SUNWblank",
1734 			    sizeof (zone_template));
1735 			break;
1736 		case 'F':
1737 			force = B_TRUE;
1738 			break;
1739 		case 't':
1740 			(void) strlcpy(zone_template, optarg,
1741 			    sizeof (zone_template));
1742 			break;
1743 		default:
1744 			short_usage(CMD_CREATE);
1745 			arg_err = B_TRUE;
1746 			break;
1747 		}
1748 	}
1749 	if (arg_err)
1750 		return;
1751 
1752 	if (optind != cmd->cmd_argc) {
1753 		short_usage(CMD_CREATE);
1754 		return;
1755 	}
1756 
1757 	if (zone_is_read_only(CMD_CREATE))
1758 		return;
1759 
1760 	if (check_if_zone_already_exists(force) != Z_OK)
1761 		return;
1762 
1763 	/*
1764 	 * Get a temporary handle first.  If that fails, the old handle
1765 	 * will not be lost.  Then finish whichever one we don't need,
1766 	 * to avoid leaks.  Then get the handle for zone_template, and
1767 	 * set the name to zone: this "copy, rename" method is how
1768 	 * create -[b|t] works.
1769 	 */
1770 	if ((tmphandle = zonecfg_init_handle()) == NULL) {
1771 		zone_perror(execname, Z_NOMEM, B_TRUE);
1772 		exit(Z_ERR);
1773 	}
1774 
1775 	if (attach)
1776 		err = zonecfg_get_attach_handle(attach_path, ZONE_DETACHED,
1777 		    zone, B_FALSE, tmphandle);
1778 	else
1779 		err = zonecfg_get_template_handle(zone_template, zone,
1780 		    tmphandle);
1781 
1782 	if (err != Z_OK) {
1783 		zonecfg_fini_handle(tmphandle);
1784 		if (attach && err == Z_NO_ZONE)
1785 			(void) fprintf(stderr, gettext("invalid path to "
1786 			    "detached zone\n"));
1787 		else if (attach && err == Z_INVALID_DOCUMENT)
1788 			(void) fprintf(stderr, gettext("Cannot attach to an "
1789 			    "earlier release of the operating system\n"));
1790 		else
1791 			zone_perror(zone_template, err, B_TRUE);
1792 		return;
1793 	}
1794 
1795 	need_to_commit = B_TRUE;
1796 	zonecfg_fini_handle(handle);
1797 	handle = tmphandle;
1798 	got_handle = B_TRUE;
1799 }
1800 
1801 /*
1802  * This malloc()'s memory, which must be freed by the caller.
1803  */
1804 static char *
1805 quoteit(char *instr)
1806 {
1807 	char *outstr;
1808 	size_t outstrsize = strlen(instr) + 3;	/* 2 quotes + '\0' */
1809 
1810 	if ((outstr = malloc(outstrsize)) == NULL) {
1811 		zone_perror(zone, Z_NOMEM, B_FALSE);
1812 		exit(Z_ERR);
1813 	}
1814 	if (strchr(instr, ' ') == NULL) {
1815 		(void) strlcpy(outstr, instr, outstrsize);
1816 		return (outstr);
1817 	}
1818 	(void) snprintf(outstr, outstrsize, "\"%s\"", instr);
1819 	return (outstr);
1820 }
1821 
1822 static void
1823 export_prop(FILE *of, int prop_num, char *prop_id)
1824 {
1825 	char *quote_str;
1826 
1827 	if (strlen(prop_id) == 0)
1828 		return;
1829 	quote_str = quoteit(prop_id);
1830 	(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1831 	    pt_to_str(prop_num), quote_str);
1832 	free(quote_str);
1833 }
1834 
1835 void
1836 export_func(cmd_t *cmd)
1837 {
1838 	struct zone_nwiftab nwiftab;
1839 	struct zone_fstab fstab;
1840 	struct zone_devtab devtab;
1841 	struct zone_attrtab attrtab;
1842 	struct zone_rctltab rctltab;
1843 	struct zone_dstab dstab;
1844 	struct zone_psettab psettab;
1845 	struct zone_mcaptab mcaptab;
1846 	struct zone_rctlvaltab *valptr;
1847 	struct zone_admintab admintab;
1848 	struct zone_secflagstab secflagstab;
1849 	int err, arg;
1850 	char zonepath[MAXPATHLEN], outfile[MAXPATHLEN], pool[MAXNAMELEN];
1851 	char bootargs[BOOTARGS_MAX];
1852 	char sched[MAXNAMELEN];
1853 	char brand[MAXNAMELEN];
1854 	char hostidp[HW_HOSTID_LEN];
1855 	char fsallowedp[ZONE_FS_ALLOWED_MAX];
1856 	char *limitpriv;
1857 	FILE *of;
1858 	boolean_t autoboot;
1859 	zone_iptype_t iptype;
1860 	boolean_t need_to_close = B_FALSE;
1861 	boolean_t arg_err = B_FALSE;
1862 
1863 	assert(cmd != NULL);
1864 
1865 	outfile[0] = '\0';
1866 	optind = 0;
1867 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?f:")) != EOF) {
1868 		switch (arg) {
1869 		case '?':
1870 			if (optopt == '?')
1871 				longer_usage(CMD_EXPORT);
1872 			else
1873 				short_usage(CMD_EXPORT);
1874 			arg_err = B_TRUE;
1875 			break;
1876 		case 'f':
1877 			(void) strlcpy(outfile, optarg, sizeof (outfile));
1878 			break;
1879 		default:
1880 			short_usage(CMD_EXPORT);
1881 			arg_err = B_TRUE;
1882 			break;
1883 		}
1884 	}
1885 	if (arg_err)
1886 		return;
1887 
1888 	if (optind != cmd->cmd_argc) {
1889 		short_usage(CMD_EXPORT);
1890 		return;
1891 	}
1892 	if (strlen(outfile) == 0) {
1893 		of = stdout;
1894 	} else {
1895 		if ((of = fopen(outfile, "w")) == NULL) {
1896 			zerr(gettext("opening file %s: %s"),
1897 			    outfile, strerror(errno));
1898 			goto done;
1899 		}
1900 		setbuf(of, NULL);
1901 		need_to_close = B_TRUE;
1902 	}
1903 
1904 	if ((err = initialize(B_TRUE)) != Z_OK)
1905 		goto done;
1906 
1907 	(void) fprintf(of, "%s -b\n", cmd_to_str(CMD_CREATE));
1908 
1909 	if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) == Z_OK &&
1910 	    strlen(zonepath) > 0)
1911 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1912 		    pt_to_str(PT_ZONEPATH), zonepath);
1913 
1914 	if ((zone_get_brand(zone, brand, sizeof (brand)) == Z_OK) &&
1915 	    (strcmp(brand, NATIVE_BRAND_NAME) != 0))
1916 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1917 		    pt_to_str(PT_BRAND), brand);
1918 
1919 	if (zonecfg_get_autoboot(handle, &autoboot) == Z_OK)
1920 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1921 		    pt_to_str(PT_AUTOBOOT), autoboot ? "true" : "false");
1922 
1923 	if (zonecfg_get_bootargs(handle, bootargs, sizeof (bootargs)) == Z_OK &&
1924 	    strlen(bootargs) > 0) {
1925 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1926 		    pt_to_str(PT_BOOTARGS), bootargs);
1927 	}
1928 
1929 	if (zonecfg_get_pool(handle, pool, sizeof (pool)) == Z_OK &&
1930 	    strlen(pool) > 0)
1931 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1932 		    pt_to_str(PT_POOL), pool);
1933 
1934 	if (zonecfg_get_limitpriv(handle, &limitpriv) == Z_OK &&
1935 	    strlen(limitpriv) > 0) {
1936 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1937 		    pt_to_str(PT_LIMITPRIV), limitpriv);
1938 		free(limitpriv);
1939 	}
1940 
1941 	if (zonecfg_get_sched_class(handle, sched, sizeof (sched)) == Z_OK &&
1942 	    strlen(sched) > 0)
1943 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1944 		    pt_to_str(PT_SCHED), sched);
1945 
1946 	if (zonecfg_get_iptype(handle, &iptype) == Z_OK) {
1947 		switch (iptype) {
1948 		case ZS_SHARED:
1949 			(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1950 			    pt_to_str(PT_IPTYPE), "shared");
1951 			break;
1952 		case ZS_EXCLUSIVE:
1953 			(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1954 			    pt_to_str(PT_IPTYPE), "exclusive");
1955 			break;
1956 		}
1957 	}
1958 
1959 	if (zonecfg_get_hostid(handle, hostidp, sizeof (hostidp)) == Z_OK) {
1960 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1961 		    pt_to_str(PT_HOSTID), hostidp);
1962 	}
1963 
1964 	if (zonecfg_get_fs_allowed(handle, fsallowedp,
1965 	    sizeof (fsallowedp)) == Z_OK) {
1966 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
1967 		    pt_to_str(PT_FS_ALLOWED), fsallowedp);
1968 	}
1969 
1970 	if ((err = zonecfg_setfsent(handle)) != Z_OK) {
1971 		zone_perror(zone, err, B_FALSE);
1972 		goto done;
1973 	}
1974 	while (zonecfg_getfsent(handle, &fstab) == Z_OK) {
1975 		zone_fsopt_t *optptr;
1976 
1977 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
1978 		    rt_to_str(RT_FS));
1979 		export_prop(of, PT_DIR, fstab.zone_fs_dir);
1980 		export_prop(of, PT_SPECIAL, fstab.zone_fs_special);
1981 		export_prop(of, PT_RAW, fstab.zone_fs_raw);
1982 		export_prop(of, PT_TYPE, fstab.zone_fs_type);
1983 		for (optptr = fstab.zone_fs_options; optptr != NULL;
1984 		    optptr = optptr->zone_fsopt_next) {
1985 			/*
1986 			 * Simple property values with embedded equal signs
1987 			 * need to be quoted to prevent the lexer from
1988 			 * mis-parsing them as complex name=value pairs.
1989 			 */
1990 			if (strchr(optptr->zone_fsopt_opt, '='))
1991 				(void) fprintf(of, "%s %s \"%s\"\n",
1992 				    cmd_to_str(CMD_ADD),
1993 				    pt_to_str(PT_OPTIONS),
1994 				    optptr->zone_fsopt_opt);
1995 			else
1996 				(void) fprintf(of, "%s %s %s\n",
1997 				    cmd_to_str(CMD_ADD),
1998 				    pt_to_str(PT_OPTIONS),
1999 				    optptr->zone_fsopt_opt);
2000 		}
2001 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2002 		zonecfg_free_fs_option_list(fstab.zone_fs_options);
2003 	}
2004 	(void) zonecfg_endfsent(handle);
2005 
2006 	if ((err = zonecfg_setnwifent(handle)) != Z_OK) {
2007 		zone_perror(zone, err, B_FALSE);
2008 		goto done;
2009 	}
2010 	while (zonecfg_getnwifent(handle, &nwiftab) == Z_OK) {
2011 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
2012 		    rt_to_str(RT_NET));
2013 		export_prop(of, PT_ADDRESS, nwiftab.zone_nwif_address);
2014 		export_prop(of, PT_ALLOWED_ADDRESS,
2015 		    nwiftab.zone_nwif_allowed_address);
2016 		export_prop(of, PT_PHYSICAL, nwiftab.zone_nwif_physical);
2017 		export_prop(of, PT_DEFROUTER, nwiftab.zone_nwif_defrouter);
2018 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2019 	}
2020 	(void) zonecfg_endnwifent(handle);
2021 
2022 	if ((err = zonecfg_setdevent(handle)) != Z_OK) {
2023 		zone_perror(zone, err, B_FALSE);
2024 		goto done;
2025 	}
2026 	while (zonecfg_getdevent(handle, &devtab) == Z_OK) {
2027 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
2028 		    rt_to_str(RT_DEVICE));
2029 		export_prop(of, PT_MATCH, devtab.zone_dev_match);
2030 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2031 	}
2032 	(void) zonecfg_enddevent(handle);
2033 
2034 	if (zonecfg_getmcapent(handle, &mcaptab) == Z_OK) {
2035 		char buf[128];
2036 
2037 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
2038 		    rt_to_str(RT_MCAP));
2039 		bytes_to_units(mcaptab.zone_physmem_cap, buf, sizeof (buf));
2040 		(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
2041 		    pt_to_str(PT_PHYSICAL), buf);
2042 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2043 	}
2044 
2045 	if ((err = zonecfg_setrctlent(handle)) != Z_OK) {
2046 		zone_perror(zone, err, B_FALSE);
2047 		goto done;
2048 	}
2049 	while (zonecfg_getrctlent(handle, &rctltab) == Z_OK) {
2050 		(void) fprintf(of, "%s rctl\n", cmd_to_str(CMD_ADD));
2051 		export_prop(of, PT_NAME, rctltab.zone_rctl_name);
2052 		for (valptr = rctltab.zone_rctl_valptr; valptr != NULL;
2053 		    valptr = valptr->zone_rctlval_next) {
2054 			fprintf(of, "%s %s (%s=%s,%s=%s,%s=%s)\n",
2055 			    cmd_to_str(CMD_ADD), pt_to_str(PT_VALUE),
2056 			    pt_to_str(PT_PRIV), valptr->zone_rctlval_priv,
2057 			    pt_to_str(PT_LIMIT), valptr->zone_rctlval_limit,
2058 			    pt_to_str(PT_ACTION), valptr->zone_rctlval_action);
2059 		}
2060 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2061 		zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr);
2062 	}
2063 	(void) zonecfg_endrctlent(handle);
2064 
2065 	if ((err = zonecfg_setattrent(handle)) != Z_OK) {
2066 		zone_perror(zone, err, B_FALSE);
2067 		goto done;
2068 	}
2069 	while (zonecfg_getattrent(handle, &attrtab) == Z_OK) {
2070 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
2071 		    rt_to_str(RT_ATTR));
2072 		export_prop(of, PT_NAME, attrtab.zone_attr_name);
2073 		export_prop(of, PT_TYPE, attrtab.zone_attr_type);
2074 		export_prop(of, PT_VALUE, attrtab.zone_attr_value);
2075 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2076 	}
2077 	(void) zonecfg_endattrent(handle);
2078 
2079 	if ((err = zonecfg_setdsent(handle)) != Z_OK) {
2080 		zone_perror(zone, err, B_FALSE);
2081 		goto done;
2082 	}
2083 	while (zonecfg_getdsent(handle, &dstab) == Z_OK) {
2084 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
2085 		    rt_to_str(RT_DATASET));
2086 		export_prop(of, PT_NAME, dstab.zone_dataset_name);
2087 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2088 	}
2089 	(void) zonecfg_enddsent(handle);
2090 
2091 	if (zonecfg_getpsetent(handle, &psettab) == Z_OK) {
2092 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
2093 		    rt_to_str(RT_DCPU));
2094 		if (strcmp(psettab.zone_ncpu_min, psettab.zone_ncpu_max) == 0)
2095 			(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
2096 			    pt_to_str(PT_NCPUS), psettab.zone_ncpu_max);
2097 		else
2098 			(void) fprintf(of, "%s %s=%s-%s\n", cmd_to_str(CMD_SET),
2099 			    pt_to_str(PT_NCPUS), psettab.zone_ncpu_min,
2100 			    psettab.zone_ncpu_max);
2101 		if (psettab.zone_importance[0] != '\0')
2102 			(void) fprintf(of, "%s %s=%s\n", cmd_to_str(CMD_SET),
2103 			    pt_to_str(PT_IMPORTANCE), psettab.zone_importance);
2104 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2105 	}
2106 
2107 	if ((err = zonecfg_setadminent(handle)) != Z_OK) {
2108 		zone_perror(zone, err, B_FALSE);
2109 		goto done;
2110 	}
2111 	while (zonecfg_getadminent(handle, &admintab) == Z_OK) {
2112 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
2113 		    rt_to_str(RT_ADMIN));
2114 		export_prop(of, PT_USER, admintab.zone_admin_user);
2115 		export_prop(of, PT_AUTHS, admintab.zone_admin_auths);
2116 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2117 	}
2118 
2119 	(void) zonecfg_endadminent(handle);
2120 
2121 	if (zonecfg_getsecflagsent(handle, &secflagstab) == Z_OK) {
2122 		(void) fprintf(of, "%s %s\n", cmd_to_str(CMD_ADD),
2123 		    rt_to_str(RT_SECFLAGS));
2124 		export_prop(of, PT_DEFAULT, secflagstab.zone_secflags_default);
2125 		export_prop(of, PT_LOWER, secflagstab.zone_secflags_lower);
2126 		export_prop(of, PT_UPPER, secflagstab.zone_secflags_upper);
2127 		(void) fprintf(of, "%s\n", cmd_to_str(CMD_END));
2128 	}
2129 
2130 	/*
2131 	 * There is nothing to export for pcap since this resource is just
2132 	 * a container for an rctl alias.
2133 	 */
2134 
2135 done:
2136 	if (need_to_close)
2137 		(void) fclose(of);
2138 }
2139 
2140 void
2141 exit_func(cmd_t *cmd)
2142 {
2143 	int arg, answer;
2144 	boolean_t arg_err = B_FALSE;
2145 
2146 	optind = 0;
2147 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) {
2148 		switch (arg) {
2149 		case '?':
2150 			longer_usage(CMD_EXIT);
2151 			arg_err = B_TRUE;
2152 			break;
2153 		case 'F':
2154 			force_exit = B_TRUE;
2155 			break;
2156 		default:
2157 			short_usage(CMD_EXIT);
2158 			arg_err = B_TRUE;
2159 			break;
2160 		}
2161 	}
2162 	if (arg_err)
2163 		return;
2164 
2165 	if (optind < cmd->cmd_argc) {
2166 		short_usage(CMD_EXIT);
2167 		return;
2168 	}
2169 
2170 	if (global_scope || force_exit) {
2171 		time_to_exit = B_TRUE;
2172 		return;
2173 	}
2174 
2175 	answer = ask_yesno(B_FALSE, "Resource incomplete; really quit");
2176 	if (answer == -1) {
2177 		zerr(gettext("Resource incomplete, input "
2178 		    "not from terminal and -F not specified:\n%s command "
2179 		    "ignored, but exiting anyway."), cmd_to_str(CMD_EXIT));
2180 		exit(Z_ERR);
2181 	} else if (answer == 1) {
2182 		time_to_exit = B_TRUE;
2183 	}
2184 	/* (answer == 0) => just return */
2185 }
2186 
2187 static int
2188 validate_zonepath_syntax(char *path)
2189 {
2190 	if (path[0] != '/') {
2191 		zerr(gettext("%s is not an absolute path."), path);
2192 		return (Z_ERR);
2193 	}
2194 	/* If path is all slashes, then fail */
2195 	if (strspn(path, "/") == strlen(path)) {
2196 		zerr(gettext("/ is not allowed as a %s."),
2197 		    pt_to_str(PT_ZONEPATH));
2198 		return (Z_ERR);
2199 	}
2200 	return (Z_OK);
2201 }
2202 
2203 static void
2204 add_resource(cmd_t *cmd)
2205 {
2206 	int type;
2207 	struct zone_psettab tmp_psettab;
2208 	struct zone_mcaptab tmp_mcaptab;
2209 	struct zone_secflagstab tmp_secflagstab;
2210 	uint64_t tmp;
2211 	uint64_t tmp_mcap;
2212 	char pool[MAXNAMELEN];
2213 
2214 	if ((type = cmd->cmd_res_type) == RT_UNKNOWN) {
2215 		long_usage(CMD_ADD, B_TRUE);
2216 		goto bad;
2217 	}
2218 
2219 	switch (type) {
2220 	case RT_FS:
2221 		bzero(&in_progress_fstab, sizeof (in_progress_fstab));
2222 		return;
2223 	case RT_NET:
2224 		bzero(&in_progress_nwiftab, sizeof (in_progress_nwiftab));
2225 		return;
2226 	case RT_DEVICE:
2227 		bzero(&in_progress_devtab, sizeof (in_progress_devtab));
2228 		return;
2229 	case RT_RCTL:
2230 		if (global_zone)
2231 			zerr(gettext("WARNING: Setting a global zone resource "
2232 			    "control too low could deny\nservice "
2233 			    "to even the root user; "
2234 			    "this could render the system impossible\n"
2235 			    "to administer.  Please use caution."));
2236 		bzero(&in_progress_rctltab, sizeof (in_progress_rctltab));
2237 		return;
2238 	case RT_ATTR:
2239 		bzero(&in_progress_attrtab, sizeof (in_progress_attrtab));
2240 		return;
2241 	case RT_DATASET:
2242 		bzero(&in_progress_dstab, sizeof (in_progress_dstab));
2243 		return;
2244 	case RT_DCPU:
2245 		/* Make sure there isn't already a cpu-set or cpu-cap entry. */
2246 		if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) {
2247 			zerr(gettext("The %s resource already exists."),
2248 			    rt_to_str(RT_DCPU));
2249 			goto bad;
2250 		}
2251 		if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp) !=
2252 		    Z_NO_ENTRY) {
2253 			zerr(gettext("The %s resource already exists."),
2254 			    rt_to_str(RT_PCAP));
2255 			goto bad;
2256 		}
2257 
2258 		/* Make sure the pool property isn't set. */
2259 		if (zonecfg_get_pool(handle, pool, sizeof (pool)) == Z_OK &&
2260 		    strlen(pool) > 0) {
2261 			zerr(gettext("The %s property is already set.  "
2262 			    "A persistent pool is incompatible with\nthe %s "
2263 			    "resource."),
2264 			    pt_to_str(PT_POOL), rt_to_str(RT_DCPU));
2265 			goto bad;
2266 		}
2267 
2268 		bzero(&in_progress_psettab, sizeof (in_progress_psettab));
2269 		return;
2270 	case RT_PCAP:
2271 		/*
2272 		 * Make sure there isn't already a cpu-set or incompatible
2273 		 * cpu-cap rctls.
2274 		 */
2275 		if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) {
2276 			zerr(gettext("The %s resource already exists."),
2277 			    rt_to_str(RT_DCPU));
2278 			goto bad;
2279 		}
2280 
2281 		switch (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp)) {
2282 		case Z_ALIAS_DISALLOW:
2283 			zone_perror(rt_to_str(RT_PCAP), Z_ALIAS_DISALLOW,
2284 			    B_FALSE);
2285 			goto bad;
2286 
2287 		case Z_OK:
2288 			zerr(gettext("The %s resource already exists."),
2289 			    rt_to_str(RT_PCAP));
2290 			goto bad;
2291 
2292 		default:
2293 			break;
2294 		}
2295 		return;
2296 	case RT_MCAP:
2297 		/*
2298 		 * Make sure there isn't already a mem-cap entry or max-swap
2299 		 * or max-locked rctl.
2300 		 */
2301 		if (zonecfg_lookup_mcap(handle, &tmp_mcaptab) == Z_OK ||
2302 		    zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &tmp_mcap)
2303 		    == Z_OK ||
2304 		    zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM,
2305 		    &tmp_mcap) == Z_OK) {
2306 			zerr(gettext("The %s resource or a related resource "
2307 			    "control already exists."), rt_to_str(RT_MCAP));
2308 			goto bad;
2309 		}
2310 		if (global_zone)
2311 			zerr(gettext("WARNING: Setting a global zone memory "
2312 			    "cap too low could deny\nservice "
2313 			    "to even the root user; "
2314 			    "this could render the system impossible\n"
2315 			    "to administer.  Please use caution."));
2316 		bzero(&in_progress_mcaptab, sizeof (in_progress_mcaptab));
2317 		return;
2318 	case RT_ADMIN:
2319 		bzero(&in_progress_admintab, sizeof (in_progress_admintab));
2320 		return;
2321 	case RT_SECFLAGS:
2322 		/* Make sure we haven't already set this */
2323 		if (zonecfg_lookup_secflags(handle, &tmp_secflagstab) == Z_OK)
2324 			zerr(gettext("The %s resource already exists."),
2325 			    rt_to_str(RT_SECFLAGS));
2326 		bzero(&in_progress_secflagstab,
2327 		    sizeof (in_progress_secflagstab));
2328 		return;
2329 	default:
2330 		zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, B_TRUE);
2331 		long_usage(CMD_ADD, B_TRUE);
2332 		usage(B_FALSE, HELP_RESOURCES);
2333 	}
2334 bad:
2335 	global_scope = B_TRUE;
2336 	end_op = -1;
2337 }
2338 
2339 static void
2340 do_complex_rctl_val(complex_property_ptr_t cp)
2341 {
2342 	struct zone_rctlvaltab *rctlvaltab;
2343 	complex_property_ptr_t cx;
2344 	boolean_t seen_priv = B_FALSE, seen_limit = B_FALSE,
2345 	    seen_action = B_FALSE;
2346 	rctlblk_t *rctlblk;
2347 	int err;
2348 
2349 	if ((rctlvaltab = alloc_rctlvaltab()) == NULL) {
2350 		zone_perror(zone, Z_NOMEM, B_TRUE);
2351 		exit(Z_ERR);
2352 	}
2353 	for (cx = cp; cx != NULL; cx = cx->cp_next) {
2354 		switch (cx->cp_type) {
2355 		case PT_PRIV:
2356 			if (seen_priv) {
2357 				zerr(gettext("%s already specified"),
2358 				    pt_to_str(PT_PRIV));
2359 				goto bad;
2360 			}
2361 			(void) strlcpy(rctlvaltab->zone_rctlval_priv,
2362 			    cx->cp_value,
2363 			    sizeof (rctlvaltab->zone_rctlval_priv));
2364 			seen_priv = B_TRUE;
2365 			break;
2366 		case PT_LIMIT:
2367 			if (seen_limit) {
2368 				zerr(gettext("%s already specified"),
2369 				    pt_to_str(PT_LIMIT));
2370 				goto bad;
2371 			}
2372 			(void) strlcpy(rctlvaltab->zone_rctlval_limit,
2373 			    cx->cp_value,
2374 			    sizeof (rctlvaltab->zone_rctlval_limit));
2375 			seen_limit = B_TRUE;
2376 			break;
2377 		case PT_ACTION:
2378 			if (seen_action) {
2379 				zerr(gettext("%s already specified"),
2380 				    pt_to_str(PT_ACTION));
2381 				goto bad;
2382 			}
2383 			(void) strlcpy(rctlvaltab->zone_rctlval_action,
2384 			    cx->cp_value,
2385 			    sizeof (rctlvaltab->zone_rctlval_action));
2386 			seen_action = B_TRUE;
2387 			break;
2388 		default:
2389 			zone_perror(pt_to_str(PT_VALUE),
2390 			    Z_NO_PROPERTY_TYPE, B_TRUE);
2391 			long_usage(CMD_ADD, B_TRUE);
2392 			usage(B_FALSE, HELP_PROPS);
2393 			zonecfg_free_rctl_value_list(rctlvaltab);
2394 			return;
2395 		}
2396 	}
2397 	if (!seen_priv)
2398 		zerr(gettext("%s not specified"), pt_to_str(PT_PRIV));
2399 	if (!seen_limit)
2400 		zerr(gettext("%s not specified"), pt_to_str(PT_LIMIT));
2401 	if (!seen_action)
2402 		zerr(gettext("%s not specified"), pt_to_str(PT_ACTION));
2403 	if (!seen_priv || !seen_limit || !seen_action)
2404 		goto bad;
2405 	rctlvaltab->zone_rctlval_next = NULL;
2406 	rctlblk = alloca(rctlblk_size());
2407 	/*
2408 	 * Make sure the rctl value looks roughly correct; we won't know if
2409 	 * it's truly OK until we verify the configuration on the target
2410 	 * system.
2411 	 */
2412 	if (zonecfg_construct_rctlblk(rctlvaltab, rctlblk) != Z_OK ||
2413 	    !zonecfg_valid_rctlblk(rctlblk)) {
2414 		zerr(gettext("Invalid %s %s specification"), rt_to_str(RT_RCTL),
2415 		    pt_to_str(PT_VALUE));
2416 		goto bad;
2417 	}
2418 	err = zonecfg_add_rctl_value(&in_progress_rctltab, rctlvaltab);
2419 	if (err != Z_OK)
2420 		zone_perror(pt_to_str(PT_VALUE), err, B_TRUE);
2421 	return;
2422 
2423 bad:
2424 	zonecfg_free_rctl_value_list(rctlvaltab);
2425 }
2426 
2427 static void
2428 add_property(cmd_t *cmd)
2429 {
2430 	char *prop_id;
2431 	int err, res_type, prop_type;
2432 	property_value_ptr_t pp;
2433 	list_property_ptr_t l;
2434 
2435 	res_type = resource_scope;
2436 	prop_type = cmd->cmd_prop_name[0];
2437 	if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) {
2438 		long_usage(CMD_ADD, B_TRUE);
2439 		return;
2440 	}
2441 
2442 	if (cmd->cmd_prop_nv_pairs != 1) {
2443 		long_usage(CMD_ADD, B_TRUE);
2444 		return;
2445 	}
2446 
2447 	if (initialize(B_TRUE) != Z_OK)
2448 		return;
2449 
2450 	switch (res_type) {
2451 	case RT_FS:
2452 		if (prop_type != PT_OPTIONS) {
2453 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
2454 			    B_TRUE);
2455 			long_usage(CMD_ADD, B_TRUE);
2456 			usage(B_FALSE, HELP_PROPS);
2457 			return;
2458 		}
2459 		pp = cmd->cmd_property_ptr[0];
2460 		if (pp->pv_type != PROP_VAL_SIMPLE &&
2461 		    pp->pv_type != PROP_VAL_LIST) {
2462 			zerr(gettext("A %s or %s value was expected here."),
2463 			    pvt_to_str(PROP_VAL_SIMPLE),
2464 			    pvt_to_str(PROP_VAL_LIST));
2465 			saw_error = B_TRUE;
2466 			return;
2467 		}
2468 		if (pp->pv_type == PROP_VAL_SIMPLE) {
2469 			if (pp->pv_simple == NULL) {
2470 				long_usage(CMD_ADD, B_TRUE);
2471 				return;
2472 			}
2473 			prop_id = pp->pv_simple;
2474 			err = zonecfg_add_fs_option(&in_progress_fstab,
2475 			    prop_id);
2476 			if (err != Z_OK)
2477 				zone_perror(pt_to_str(prop_type), err, B_TRUE);
2478 		} else {
2479 			list_property_ptr_t list;
2480 
2481 			for (list = pp->pv_list; list != NULL;
2482 			    list = list->lp_next) {
2483 				prop_id = list->lp_simple;
2484 				if (prop_id == NULL)
2485 					break;
2486 				err = zonecfg_add_fs_option(
2487 				    &in_progress_fstab, prop_id);
2488 				if (err != Z_OK)
2489 					zone_perror(pt_to_str(prop_type), err,
2490 					    B_TRUE);
2491 			}
2492 		}
2493 		return;
2494 	case RT_RCTL:
2495 		if (prop_type != PT_VALUE) {
2496 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
2497 			    B_TRUE);
2498 			long_usage(CMD_ADD, B_TRUE);
2499 			usage(B_FALSE, HELP_PROPS);
2500 			return;
2501 		}
2502 		pp = cmd->cmd_property_ptr[0];
2503 		if (pp->pv_type != PROP_VAL_COMPLEX &&
2504 		    pp->pv_type != PROP_VAL_LIST) {
2505 			zerr(gettext("A %s or %s value was expected here."),
2506 			    pvt_to_str(PROP_VAL_COMPLEX),
2507 			    pvt_to_str(PROP_VAL_LIST));
2508 			saw_error = B_TRUE;
2509 			return;
2510 		}
2511 		if (pp->pv_type == PROP_VAL_COMPLEX) {
2512 			do_complex_rctl_val(pp->pv_complex);
2513 			return;
2514 		}
2515 		for (l = pp->pv_list; l != NULL; l = l->lp_next)
2516 			do_complex_rctl_val(l->lp_complex);
2517 		return;
2518 	default:
2519 		zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, B_TRUE);
2520 		long_usage(CMD_ADD, B_TRUE);
2521 		usage(B_FALSE, HELP_RESOURCES);
2522 		return;
2523 	}
2524 }
2525 
2526 static boolean_t
2527 gz_invalid_resource(int type)
2528 {
2529 	return (global_zone && (type == RT_FS ||
2530 	    type == RT_NET || type == RT_DEVICE || type == RT_ATTR ||
2531 	    type == RT_DATASET));
2532 }
2533 
2534 static boolean_t
2535 gz_invalid_rt_property(int type)
2536 {
2537 	return (global_zone && (type == RT_ZONENAME || type == RT_ZONEPATH ||
2538 	    type == RT_AUTOBOOT || type == RT_LIMITPRIV ||
2539 	    type == RT_BOOTARGS || type == RT_BRAND || type == RT_SCHED ||
2540 	    type == RT_IPTYPE || type == RT_HOSTID || type == RT_FS_ALLOWED));
2541 }
2542 
2543 static boolean_t
2544 gz_invalid_property(int type)
2545 {
2546 	return (global_zone && (type == PT_ZONENAME || type == PT_ZONEPATH ||
2547 	    type == PT_AUTOBOOT || type == PT_LIMITPRIV ||
2548 	    type == PT_BOOTARGS || type == PT_BRAND || type == PT_SCHED ||
2549 	    type == PT_IPTYPE || type == PT_HOSTID || type == PT_FS_ALLOWED));
2550 }
2551 
2552 void
2553 add_func(cmd_t *cmd)
2554 {
2555 	int arg;
2556 	boolean_t arg_err = B_FALSE;
2557 
2558 	assert(cmd != NULL);
2559 
2560 	optind = 0;
2561 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) {
2562 		switch (arg) {
2563 		case '?':
2564 			longer_usage(CMD_ADD);
2565 			arg_err = B_TRUE;
2566 			break;
2567 		default:
2568 			short_usage(CMD_ADD);
2569 			arg_err = B_TRUE;
2570 			break;
2571 		}
2572 	}
2573 	if (arg_err)
2574 		return;
2575 
2576 	if (optind != cmd->cmd_argc) {
2577 		short_usage(CMD_ADD);
2578 		return;
2579 	}
2580 
2581 	if (zone_is_read_only(CMD_ADD))
2582 		return;
2583 
2584 	if (initialize(B_TRUE) != Z_OK)
2585 		return;
2586 	if (global_scope) {
2587 		if (gz_invalid_resource(cmd->cmd_res_type)) {
2588 			zerr(gettext("Cannot add a %s resource to the "
2589 			    "global zone."), rt_to_str(cmd->cmd_res_type));
2590 			saw_error = B_TRUE;
2591 			return;
2592 		}
2593 
2594 		global_scope = B_FALSE;
2595 		resource_scope = cmd->cmd_res_type;
2596 		end_op = CMD_ADD;
2597 		add_resource(cmd);
2598 	} else
2599 		add_property(cmd);
2600 }
2601 
2602 /*
2603  * This routine has an unusual implementation, because it tries very
2604  * hard to succeed in the face of a variety of failure modes.
2605  * The most common and most vexing occurs when the index file and
2606  * the /etc/zones/<zonename.xml> file are not both present.  In
2607  * this case, delete must eradicate as much of the zone state as is left
2608  * so that the user can later create a new zone with the same name.
2609  */
2610 void
2611 delete_func(cmd_t *cmd)
2612 {
2613 	int err, arg, answer;
2614 	char line[ZONENAME_MAX + 128];	/* enough to ask a question */
2615 	boolean_t force = B_FALSE;
2616 	boolean_t arg_err = B_FALSE;
2617 
2618 	optind = 0;
2619 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) {
2620 		switch (arg) {
2621 		case '?':
2622 			longer_usage(CMD_DELETE);
2623 			arg_err = B_TRUE;
2624 			break;
2625 		case 'F':
2626 			force = B_TRUE;
2627 			break;
2628 		default:
2629 			short_usage(CMD_DELETE);
2630 			arg_err = B_TRUE;
2631 			break;
2632 		}
2633 	}
2634 	if (arg_err)
2635 		return;
2636 
2637 	if (optind != cmd->cmd_argc) {
2638 		short_usage(CMD_DELETE);
2639 		return;
2640 	}
2641 
2642 	if (zone_is_read_only(CMD_DELETE))
2643 		return;
2644 
2645 	if (!force) {
2646 		/*
2647 		 * Initialize sets up the global called "handle" and warns the
2648 		 * user if the zone is not configured.  In force mode, we don't
2649 		 * trust that evaluation, and hence skip it.  (We don't need the
2650 		 * handle to be loaded anyway, since zonecfg_destroy is done by
2651 		 * zonename). However, we also have to take care to emulate the
2652 		 * messages spit out by initialize; see below.
2653 		 */
2654 		if (initialize(B_TRUE) != Z_OK)
2655 			return;
2656 
2657 		(void) snprintf(line, sizeof (line),
2658 		    gettext("Are you sure you want to delete zone %s"), zone);
2659 		if ((answer = ask_yesno(B_FALSE, line)) == -1) {
2660 			zerr(gettext("Input not from terminal and -F not "
2661 			    "specified:\n%s command ignored, exiting."),
2662 			    cmd_to_str(CMD_DELETE));
2663 			exit(Z_ERR);
2664 		}
2665 		if (answer != 1)
2666 			return;
2667 	}
2668 
2669 	/*
2670 	 * This function removes the authorizations from user_attr
2671 	 * that correspond to those specified in the configuration
2672 	 */
2673 	if (initialize(B_TRUE) == Z_OK) {
2674 		(void) zonecfg_deauthorize_users(handle, zone);
2675 	}
2676 	if ((err = zonecfg_destroy(zone, force)) != Z_OK) {
2677 		if ((err == Z_BAD_ZONE_STATE) && !force) {
2678 			zerr(gettext("Zone %s not in %s state; %s not "
2679 			    "allowed.  Use -F to force %s."),
2680 			    zone, zone_state_str(ZONE_STATE_CONFIGURED),
2681 			    cmd_to_str(CMD_DELETE), cmd_to_str(CMD_DELETE));
2682 		} else {
2683 			zone_perror(zone, err, B_TRUE);
2684 		}
2685 	}
2686 	need_to_commit = B_FALSE;
2687 
2688 	/*
2689 	 * Emulate initialize's messaging; if there wasn't a valid handle to
2690 	 * begin with, then user had typed delete (or delete -F) multiple
2691 	 * times.  So we emit a message.
2692 	 *
2693 	 * We only do this in the 'force' case because normally, initialize()
2694 	 * takes care of this for us.
2695 	 */
2696 	if (force && zonecfg_check_handle(handle) != Z_OK && interactive_mode)
2697 		(void) printf(gettext("Use '%s' to begin "
2698 		    "configuring a new zone.\n"), cmd_to_str(CMD_CREATE));
2699 
2700 	/*
2701 	 * Time for a new handle: finish the old one off first
2702 	 * then get a new one properly to avoid leaks.
2703 	 */
2704 	if (got_handle) {
2705 		zonecfg_fini_handle(handle);
2706 		if ((handle = zonecfg_init_handle()) == NULL) {
2707 			zone_perror(execname, Z_NOMEM, B_TRUE);
2708 			exit(Z_ERR);
2709 		}
2710 		if ((err = zonecfg_get_handle(zone, handle)) != Z_OK) {
2711 			/* If there was no zone before, that's OK */
2712 			if (err != Z_NO_ZONE)
2713 				zone_perror(zone, err, B_TRUE);
2714 			got_handle = B_FALSE;
2715 		}
2716 	}
2717 }
2718 
2719 static int
2720 fill_in_fstab(cmd_t *cmd, struct zone_fstab *fstab, boolean_t fill_in_only)
2721 {
2722 	int err, i;
2723 	property_value_ptr_t pp;
2724 
2725 	if ((err = initialize(B_TRUE)) != Z_OK)
2726 		return (err);
2727 
2728 	bzero(fstab, sizeof (*fstab));
2729 	for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) {
2730 		pp = cmd->cmd_property_ptr[i];
2731 		if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) {
2732 			zerr(gettext("A simple value was expected here."));
2733 			saw_error = B_TRUE;
2734 			return (Z_INSUFFICIENT_SPEC);
2735 		}
2736 		switch (cmd->cmd_prop_name[i]) {
2737 		case PT_DIR:
2738 			(void) strlcpy(fstab->zone_fs_dir, pp->pv_simple,
2739 			    sizeof (fstab->zone_fs_dir));
2740 			break;
2741 		case PT_SPECIAL:
2742 			(void) strlcpy(fstab->zone_fs_special, pp->pv_simple,
2743 			    sizeof (fstab->zone_fs_special));
2744 			break;
2745 		case PT_RAW:
2746 			(void) strlcpy(fstab->zone_fs_raw, pp->pv_simple,
2747 			    sizeof (fstab->zone_fs_raw));
2748 			break;
2749 		case PT_TYPE:
2750 			(void) strlcpy(fstab->zone_fs_type, pp->pv_simple,
2751 			    sizeof (fstab->zone_fs_type));
2752 			break;
2753 		default:
2754 			zone_perror(pt_to_str(cmd->cmd_prop_name[i]),
2755 			    Z_NO_PROPERTY_TYPE, B_TRUE);
2756 			return (Z_INSUFFICIENT_SPEC);
2757 		}
2758 	}
2759 	if (fill_in_only)
2760 		return (Z_OK);
2761 	return (zonecfg_lookup_filesystem(handle, fstab));
2762 }
2763 
2764 static int
2765 fill_in_nwiftab(cmd_t *cmd, struct zone_nwiftab *nwiftab,
2766     boolean_t fill_in_only)
2767 {
2768 	int err, i;
2769 	property_value_ptr_t pp;
2770 
2771 	if ((err = initialize(B_TRUE)) != Z_OK)
2772 		return (err);
2773 
2774 	bzero(nwiftab, sizeof (*nwiftab));
2775 	for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) {
2776 		pp = cmd->cmd_property_ptr[i];
2777 		if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) {
2778 			zerr(gettext("A simple value was expected here."));
2779 			saw_error = B_TRUE;
2780 			return (Z_INSUFFICIENT_SPEC);
2781 		}
2782 		switch (cmd->cmd_prop_name[i]) {
2783 		case PT_ADDRESS:
2784 			(void) strlcpy(nwiftab->zone_nwif_address,
2785 			    pp->pv_simple, sizeof (nwiftab->zone_nwif_address));
2786 			break;
2787 		case PT_ALLOWED_ADDRESS:
2788 			(void) strlcpy(nwiftab->zone_nwif_allowed_address,
2789 			    pp->pv_simple,
2790 			    sizeof (nwiftab->zone_nwif_allowed_address));
2791 			break;
2792 		case PT_PHYSICAL:
2793 			(void) strlcpy(nwiftab->zone_nwif_physical,
2794 			    pp->pv_simple,
2795 			    sizeof (nwiftab->zone_nwif_physical));
2796 			break;
2797 		case PT_DEFROUTER:
2798 			(void) strlcpy(nwiftab->zone_nwif_defrouter,
2799 			    pp->pv_simple,
2800 			    sizeof (nwiftab->zone_nwif_defrouter));
2801 			break;
2802 		default:
2803 			zone_perror(pt_to_str(cmd->cmd_prop_name[i]),
2804 			    Z_NO_PROPERTY_TYPE, B_TRUE);
2805 			return (Z_INSUFFICIENT_SPEC);
2806 		}
2807 	}
2808 	if (fill_in_only)
2809 		return (Z_OK);
2810 	err = zonecfg_lookup_nwif(handle, nwiftab);
2811 	return (err);
2812 }
2813 
2814 static int
2815 fill_in_devtab(cmd_t *cmd, struct zone_devtab *devtab, boolean_t fill_in_only)
2816 {
2817 	int err, i;
2818 	property_value_ptr_t pp;
2819 
2820 	if ((err = initialize(B_TRUE)) != Z_OK)
2821 		return (err);
2822 
2823 	bzero(devtab, sizeof (*devtab));
2824 	for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) {
2825 		pp = cmd->cmd_property_ptr[i];
2826 		if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) {
2827 			zerr(gettext("A simple value was expected here."));
2828 			saw_error = B_TRUE;
2829 			return (Z_INSUFFICIENT_SPEC);
2830 		}
2831 		switch (cmd->cmd_prop_name[i]) {
2832 		case PT_MATCH:
2833 			(void) strlcpy(devtab->zone_dev_match, pp->pv_simple,
2834 			    sizeof (devtab->zone_dev_match));
2835 			break;
2836 		default:
2837 			zone_perror(pt_to_str(cmd->cmd_prop_name[i]),
2838 			    Z_NO_PROPERTY_TYPE, B_TRUE);
2839 			return (Z_INSUFFICIENT_SPEC);
2840 		}
2841 	}
2842 	if (fill_in_only)
2843 		return (Z_OK);
2844 	err = zonecfg_lookup_dev(handle, devtab);
2845 	return (err);
2846 }
2847 
2848 static int
2849 fill_in_rctltab(cmd_t *cmd, struct zone_rctltab *rctltab,
2850     boolean_t fill_in_only)
2851 {
2852 	int err, i;
2853 	property_value_ptr_t pp;
2854 
2855 	if ((err = initialize(B_TRUE)) != Z_OK)
2856 		return (err);
2857 
2858 	bzero(rctltab, sizeof (*rctltab));
2859 	for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) {
2860 		pp = cmd->cmd_property_ptr[i];
2861 		if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) {
2862 			zerr(gettext("A simple value was expected here."));
2863 			saw_error = B_TRUE;
2864 			return (Z_INSUFFICIENT_SPEC);
2865 		}
2866 		switch (cmd->cmd_prop_name[i]) {
2867 		case PT_NAME:
2868 			(void) strlcpy(rctltab->zone_rctl_name, pp->pv_simple,
2869 			    sizeof (rctltab->zone_rctl_name));
2870 			break;
2871 		default:
2872 			zone_perror(pt_to_str(cmd->cmd_prop_name[i]),
2873 			    Z_NO_PROPERTY_TYPE, B_TRUE);
2874 			return (Z_INSUFFICIENT_SPEC);
2875 		}
2876 	}
2877 	if (fill_in_only)
2878 		return (Z_OK);
2879 	err = zonecfg_lookup_rctl(handle, rctltab);
2880 	return (err);
2881 }
2882 
2883 static int
2884 fill_in_attrtab(cmd_t *cmd, struct zone_attrtab *attrtab,
2885     boolean_t fill_in_only)
2886 {
2887 	int err, i;
2888 	property_value_ptr_t pp;
2889 
2890 	if ((err = initialize(B_TRUE)) != Z_OK)
2891 		return (err);
2892 
2893 	bzero(attrtab, sizeof (*attrtab));
2894 	for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) {
2895 		pp = cmd->cmd_property_ptr[i];
2896 		if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) {
2897 			zerr(gettext("A simple value was expected here."));
2898 			saw_error = B_TRUE;
2899 			return (Z_INSUFFICIENT_SPEC);
2900 		}
2901 		switch (cmd->cmd_prop_name[i]) {
2902 		case PT_NAME:
2903 			(void) strlcpy(attrtab->zone_attr_name, pp->pv_simple,
2904 			    sizeof (attrtab->zone_attr_name));
2905 			break;
2906 		case PT_TYPE:
2907 			(void) strlcpy(attrtab->zone_attr_type, pp->pv_simple,
2908 			    sizeof (attrtab->zone_attr_type));
2909 			break;
2910 		case PT_VALUE:
2911 			(void) strlcpy(attrtab->zone_attr_value, pp->pv_simple,
2912 			    sizeof (attrtab->zone_attr_value));
2913 			break;
2914 		default:
2915 			zone_perror(pt_to_str(cmd->cmd_prop_name[i]),
2916 			    Z_NO_PROPERTY_TYPE, B_TRUE);
2917 			return (Z_INSUFFICIENT_SPEC);
2918 		}
2919 	}
2920 	if (fill_in_only)
2921 		return (Z_OK);
2922 	err = zonecfg_lookup_attr(handle, attrtab);
2923 	return (err);
2924 }
2925 
2926 static int
2927 fill_in_dstab(cmd_t *cmd, struct zone_dstab *dstab, boolean_t fill_in_only)
2928 {
2929 	int err, i;
2930 	property_value_ptr_t pp;
2931 
2932 	if ((err = initialize(B_TRUE)) != Z_OK)
2933 		return (err);
2934 
2935 	dstab->zone_dataset_name[0] = '\0';
2936 	for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) {
2937 		pp = cmd->cmd_property_ptr[i];
2938 		if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) {
2939 			zerr(gettext("A simple value was expected here."));
2940 			saw_error = B_TRUE;
2941 			return (Z_INSUFFICIENT_SPEC);
2942 		}
2943 		switch (cmd->cmd_prop_name[i]) {
2944 		case PT_NAME:
2945 			(void) strlcpy(dstab->zone_dataset_name, pp->pv_simple,
2946 			    sizeof (dstab->zone_dataset_name));
2947 			break;
2948 		default:
2949 			zone_perror(pt_to_str(cmd->cmd_prop_name[i]),
2950 			    Z_NO_PROPERTY_TYPE, B_TRUE);
2951 			return (Z_INSUFFICIENT_SPEC);
2952 		}
2953 	}
2954 	if (fill_in_only)
2955 		return (Z_OK);
2956 	return (zonecfg_lookup_ds(handle, dstab));
2957 }
2958 
2959 static int
2960 fill_in_admintab(cmd_t *cmd, struct zone_admintab *admintab,
2961     boolean_t fill_in_only)
2962 {
2963 	int err, i;
2964 	property_value_ptr_t pp;
2965 
2966 	if ((err = initialize(B_TRUE)) != Z_OK)
2967 		return (err);
2968 
2969 	bzero(admintab, sizeof (*admintab));
2970 	for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) {
2971 		pp = cmd->cmd_property_ptr[i];
2972 		if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) {
2973 			zerr(gettext("A simple value was expected here."));
2974 			saw_error = B_TRUE;
2975 			return (Z_INSUFFICIENT_SPEC);
2976 		}
2977 		switch (cmd->cmd_prop_name[i]) {
2978 		case PT_USER:
2979 			(void) strlcpy(admintab->zone_admin_user, pp->pv_simple,
2980 			    sizeof (admintab->zone_admin_user));
2981 			break;
2982 		case PT_AUTHS:
2983 			(void) strlcpy(admintab->zone_admin_auths,
2984 			    pp->pv_simple, sizeof (admintab->zone_admin_auths));
2985 			break;
2986 		default:
2987 			zone_perror(pt_to_str(cmd->cmd_prop_name[i]),
2988 			    Z_NO_PROPERTY_TYPE, B_TRUE);
2989 			return (Z_INSUFFICIENT_SPEC);
2990 		}
2991 	}
2992 	if (fill_in_only)
2993 		return (Z_OK);
2994 	err = zonecfg_lookup_admin(handle, admintab);
2995 	return (err);
2996 }
2997 
2998 static int
2999 fill_in_secflagstab(cmd_t *cmd, struct zone_secflagstab *secflagstab,
3000     boolean_t fill_in_only)
3001 {
3002 	int err, i;
3003 	property_value_ptr_t pp;
3004 
3005 	if ((err = initialize(B_TRUE)) != Z_OK)
3006 		return (err);
3007 
3008 	bzero(secflagstab, sizeof (*secflagstab));
3009 	for (i = 0; i < cmd->cmd_prop_nv_pairs; i++) {
3010 		pp = cmd->cmd_property_ptr[i];
3011 		if (pp->pv_type != PROP_VAL_SIMPLE || pp->pv_simple == NULL) {
3012 			zerr(gettext("A simple value was expected here."));
3013 			saw_error = B_TRUE;
3014 			return (Z_INSUFFICIENT_SPEC);
3015 		}
3016 		switch (cmd->cmd_prop_name[i]) {
3017 		case PT_DEFAULT:
3018 			(void) strlcpy(secflagstab->zone_secflags_default,
3019 			    pp->pv_simple,
3020 			    sizeof (secflagstab->zone_secflags_default));
3021 			break;
3022 		case PT_LOWER:
3023 			(void) strlcpy(secflagstab->zone_secflags_lower,
3024 			    pp->pv_simple,
3025 			    sizeof (secflagstab->zone_secflags_lower));
3026 			break;
3027 		case PT_UPPER:
3028 			(void) strlcpy(secflagstab->zone_secflags_upper,
3029 			    pp->pv_simple,
3030 			    sizeof (secflagstab->zone_secflags_upper));
3031 			break;
3032 		default:
3033 			zone_perror(pt_to_str(cmd->cmd_prop_name[i]),
3034 			    Z_NO_PROPERTY_TYPE, B_TRUE);
3035 			return (Z_INSUFFICIENT_SPEC);
3036 		}
3037 	}
3038 	if (fill_in_only)
3039 		return (Z_OK);
3040 
3041 	err = zonecfg_lookup_secflags(handle, secflagstab);
3042 
3043 	return (err);
3044 }
3045 
3046 static void
3047 remove_aliased_rctl(int type, char *name)
3048 {
3049 	int err;
3050 	uint64_t tmp;
3051 
3052 	if ((err = zonecfg_get_aliased_rctl(handle, name, &tmp)) != Z_OK) {
3053 		zerr("%s %s: %s", cmd_to_str(CMD_CLEAR), pt_to_str(type),
3054 		    zonecfg_strerror(err));
3055 		saw_error = B_TRUE;
3056 		return;
3057 	}
3058 	if ((err = zonecfg_rm_aliased_rctl(handle, name)) != Z_OK) {
3059 		zerr("%s %s: %s", cmd_to_str(CMD_CLEAR), pt_to_str(type),
3060 		    zonecfg_strerror(err));
3061 		saw_error = B_TRUE;
3062 	} else {
3063 		need_to_commit = B_TRUE;
3064 	}
3065 }
3066 
3067 static boolean_t
3068 prompt_remove_resource(cmd_t *cmd, char *rsrc)
3069 {
3070 	int num;
3071 	int answer;
3072 	int arg;
3073 	boolean_t force = B_FALSE;
3074 	char prompt[128];
3075 	boolean_t arg_err = B_FALSE;
3076 
3077 	optind = 0;
3078 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "F")) != EOF) {
3079 		switch (arg) {
3080 		case 'F':
3081 			force = B_TRUE;
3082 			break;
3083 		default:
3084 			arg_err = B_TRUE;
3085 			break;
3086 		}
3087 	}
3088 	if (arg_err)
3089 		return (B_FALSE);
3090 
3091 
3092 	num = zonecfg_num_resources(handle, rsrc);
3093 
3094 	if (num == 0) {
3095 		z_cmd_rt_perror(CMD_REMOVE, cmd->cmd_res_type, Z_NO_ENTRY,
3096 		    B_TRUE);
3097 		return (B_FALSE);
3098 	}
3099 	if (num > 1 && !force) {
3100 		if (!interactive_mode) {
3101 			zerr(gettext("There are multiple instances of this "
3102 			    "resource.  Either qualify the resource to\n"
3103 			    "remove a single instance or use the -F option to "
3104 			    "remove all instances."));
3105 			saw_error = B_TRUE;
3106 			return (B_FALSE);
3107 		}
3108 		(void) snprintf(prompt, sizeof (prompt), gettext(
3109 		    "Are you sure you want to remove ALL '%s' resources"),
3110 		    rsrc);
3111 		answer = ask_yesno(B_FALSE, prompt);
3112 		if (answer == -1) {
3113 			zerr(gettext("Resource incomplete."));
3114 			return (B_FALSE);
3115 		}
3116 		if (answer != 1)
3117 			return (B_FALSE);
3118 	}
3119 	return (B_TRUE);
3120 }
3121 
3122 static void
3123 remove_fs(cmd_t *cmd)
3124 {
3125 	int err;
3126 
3127 	/* traditional, qualified fs removal */
3128 	if (cmd->cmd_prop_nv_pairs > 0) {
3129 		struct zone_fstab fstab;
3130 
3131 		if ((err = fill_in_fstab(cmd, &fstab, B_FALSE)) != Z_OK) {
3132 			z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, B_TRUE);
3133 			return;
3134 		}
3135 		if ((err = zonecfg_delete_filesystem(handle, &fstab)) != Z_OK)
3136 			z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, B_TRUE);
3137 		else
3138 			need_to_commit = B_TRUE;
3139 		zonecfg_free_fs_option_list(fstab.zone_fs_options);
3140 		return;
3141 	}
3142 
3143 	/*
3144 	 * unqualified fs removal.  remove all fs's but prompt if more
3145 	 * than one.
3146 	 */
3147 	if (!prompt_remove_resource(cmd, "fs"))
3148 		return;
3149 
3150 	if ((err = zonecfg_del_all_resources(handle, "fs")) != Z_OK)
3151 		z_cmd_rt_perror(CMD_REMOVE, RT_FS, err, B_TRUE);
3152 	else
3153 		need_to_commit = B_TRUE;
3154 }
3155 
3156 static void
3157 remove_net(cmd_t *cmd)
3158 {
3159 	int err;
3160 
3161 	/* traditional, qualified net removal */
3162 	if (cmd->cmd_prop_nv_pairs > 0) {
3163 		struct zone_nwiftab nwiftab;
3164 
3165 		if ((err = fill_in_nwiftab(cmd, &nwiftab, B_FALSE)) != Z_OK) {
3166 			z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, B_TRUE);
3167 			return;
3168 		}
3169 		if ((err = zonecfg_delete_nwif(handle, &nwiftab)) != Z_OK)
3170 			z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, B_TRUE);
3171 		else
3172 			need_to_commit = B_TRUE;
3173 		return;
3174 	}
3175 
3176 	/*
3177 	 * unqualified net removal.  remove all nets but prompt if more
3178 	 * than one.
3179 	 */
3180 	if (!prompt_remove_resource(cmd, "net"))
3181 		return;
3182 
3183 	if ((err = zonecfg_del_all_resources(handle, "net")) != Z_OK)
3184 		z_cmd_rt_perror(CMD_REMOVE, RT_NET, err, B_TRUE);
3185 	else
3186 		need_to_commit = B_TRUE;
3187 }
3188 
3189 static void
3190 remove_device(cmd_t *cmd)
3191 {
3192 	int err;
3193 
3194 	/* traditional, qualified device removal */
3195 	if (cmd->cmd_prop_nv_pairs > 0) {
3196 		struct zone_devtab devtab;
3197 
3198 		if ((err = fill_in_devtab(cmd, &devtab, B_FALSE)) != Z_OK) {
3199 			z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, B_TRUE);
3200 			return;
3201 		}
3202 		if ((err = zonecfg_delete_dev(handle, &devtab)) != Z_OK)
3203 			z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, B_TRUE);
3204 		else
3205 			need_to_commit = B_TRUE;
3206 		return;
3207 	}
3208 
3209 	/*
3210 	 * unqualified device removal.  remove all devices but prompt if more
3211 	 * than one.
3212 	 */
3213 	if (!prompt_remove_resource(cmd, "device"))
3214 		return;
3215 
3216 	if ((err = zonecfg_del_all_resources(handle, "device")) != Z_OK)
3217 		z_cmd_rt_perror(CMD_REMOVE, RT_DEVICE, err, B_TRUE);
3218 	else
3219 		need_to_commit = B_TRUE;
3220 }
3221 
3222 static void
3223 remove_attr(cmd_t *cmd)
3224 {
3225 	int err;
3226 
3227 	/* traditional, qualified attr removal */
3228 	if (cmd->cmd_prop_nv_pairs > 0) {
3229 		struct zone_attrtab attrtab;
3230 
3231 		if ((err = fill_in_attrtab(cmd, &attrtab, B_FALSE)) != Z_OK) {
3232 			z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, B_TRUE);
3233 			return;
3234 		}
3235 		if ((err = zonecfg_delete_attr(handle, &attrtab)) != Z_OK)
3236 			z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, B_TRUE);
3237 		else
3238 			need_to_commit = B_TRUE;
3239 		return;
3240 	}
3241 
3242 	/*
3243 	 * unqualified attr removal.  remove all attrs but prompt if more
3244 	 * than one.
3245 	 */
3246 	if (!prompt_remove_resource(cmd, "attr"))
3247 		return;
3248 
3249 	if ((err = zonecfg_del_all_resources(handle, "attr")) != Z_OK)
3250 		z_cmd_rt_perror(CMD_REMOVE, RT_ATTR, err, B_TRUE);
3251 	else
3252 		need_to_commit = B_TRUE;
3253 }
3254 
3255 static void
3256 remove_dataset(cmd_t *cmd)
3257 {
3258 	int err;
3259 
3260 	/* traditional, qualified dataset removal */
3261 	if (cmd->cmd_prop_nv_pairs > 0) {
3262 		struct zone_dstab dstab;
3263 
3264 		if ((err = fill_in_dstab(cmd, &dstab, B_FALSE)) != Z_OK) {
3265 			z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, B_TRUE);
3266 			return;
3267 		}
3268 		if ((err = zonecfg_delete_ds(handle, &dstab)) != Z_OK)
3269 			z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, B_TRUE);
3270 		else
3271 			need_to_commit = B_TRUE;
3272 		return;
3273 	}
3274 
3275 	/*
3276 	 * unqualified dataset removal.  remove all datasets but prompt if more
3277 	 * than one.
3278 	 */
3279 	if (!prompt_remove_resource(cmd, "dataset"))
3280 		return;
3281 
3282 	if ((err = zonecfg_del_all_resources(handle, "dataset")) != Z_OK)
3283 		z_cmd_rt_perror(CMD_REMOVE, RT_DATASET, err, B_TRUE);
3284 	else
3285 		need_to_commit = B_TRUE;
3286 }
3287 
3288 static void
3289 remove_rctl(cmd_t *cmd)
3290 {
3291 	int err;
3292 
3293 	/* traditional, qualified rctl removal */
3294 	if (cmd->cmd_prop_nv_pairs > 0) {
3295 		struct zone_rctltab rctltab;
3296 
3297 		if ((err = fill_in_rctltab(cmd, &rctltab, B_FALSE)) != Z_OK) {
3298 			z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, B_TRUE);
3299 			return;
3300 		}
3301 		if ((err = zonecfg_delete_rctl(handle, &rctltab)) != Z_OK)
3302 			z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, B_TRUE);
3303 		else
3304 			need_to_commit = B_TRUE;
3305 		zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr);
3306 		return;
3307 	}
3308 
3309 	/*
3310 	 * unqualified rctl removal.  remove all rctls but prompt if more
3311 	 * than one.
3312 	 */
3313 	if (!prompt_remove_resource(cmd, "rctl"))
3314 		return;
3315 
3316 	if ((err = zonecfg_del_all_resources(handle, "rctl")) != Z_OK)
3317 		z_cmd_rt_perror(CMD_REMOVE, RT_RCTL, err, B_TRUE);
3318 	else
3319 		need_to_commit = B_TRUE;
3320 }
3321 
3322 static void
3323 remove_pset()
3324 {
3325 	int err;
3326 	struct zone_psettab psettab;
3327 
3328 	if ((err = zonecfg_lookup_pset(handle, &psettab)) != Z_OK) {
3329 		z_cmd_rt_perror(CMD_REMOVE, RT_DCPU, err, B_TRUE);
3330 		return;
3331 	}
3332 	if ((err = zonecfg_delete_pset(handle)) != Z_OK)
3333 		z_cmd_rt_perror(CMD_REMOVE, RT_DCPU, err, B_TRUE);
3334 	else
3335 		need_to_commit = B_TRUE;
3336 }
3337 
3338 static void
3339 remove_pcap()
3340 {
3341 	int err;
3342 	uint64_t tmp;
3343 
3344 	if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp) != Z_OK) {
3345 		zerr("%s %s: %s", cmd_to_str(CMD_REMOVE), rt_to_str(RT_PCAP),
3346 		    zonecfg_strerror(Z_NO_RESOURCE_TYPE));
3347 		saw_error = B_TRUE;
3348 		return;
3349 	}
3350 
3351 	if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_CPUCAP)) != Z_OK)
3352 		z_cmd_rt_perror(CMD_REMOVE, RT_PCAP, err, B_TRUE);
3353 	else
3354 		need_to_commit = B_TRUE;
3355 }
3356 
3357 static void
3358 remove_mcap()
3359 {
3360 	int err, res1, res2, res3;
3361 	uint64_t tmp;
3362 	struct zone_mcaptab mcaptab;
3363 	boolean_t revert = B_FALSE;
3364 
3365 	res1 = zonecfg_lookup_mcap(handle, &mcaptab);
3366 	res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &tmp);
3367 	res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, &tmp);
3368 
3369 	/* if none of these exist, there is no resource to remove */
3370 	if (res1 != Z_OK && res2 != Z_OK && res3 != Z_OK) {
3371 		zerr("%s %s: %s", cmd_to_str(CMD_REMOVE), rt_to_str(RT_MCAP),
3372 		    zonecfg_strerror(Z_NO_RESOURCE_TYPE));
3373 		saw_error = B_TRUE;
3374 		return;
3375 	}
3376 	if (res1 == Z_OK) {
3377 		if ((err = zonecfg_delete_mcap(handle)) != Z_OK) {
3378 			z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, B_TRUE);
3379 			revert = B_TRUE;
3380 		} else {
3381 			need_to_commit = B_TRUE;
3382 		}
3383 	}
3384 	if (res2 == Z_OK) {
3385 		if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_MAXSWAP))
3386 		    != Z_OK) {
3387 			z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, B_TRUE);
3388 			revert = B_TRUE;
3389 		} else {
3390 			need_to_commit = B_TRUE;
3391 		}
3392 	}
3393 	if (res3 == Z_OK) {
3394 		if ((err = zonecfg_rm_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM))
3395 		    != Z_OK) {
3396 			z_cmd_rt_perror(CMD_REMOVE, RT_MCAP, err, B_TRUE);
3397 			revert = B_TRUE;
3398 		} else {
3399 			need_to_commit = B_TRUE;
3400 		}
3401 	}
3402 
3403 	if (revert)
3404 		need_to_commit = B_FALSE;
3405 }
3406 
3407 static void
3408 remove_admin(cmd_t *cmd)
3409 {
3410 	int err;
3411 
3412 	/* traditional, qualified attr removal */
3413 	if (cmd->cmd_prop_nv_pairs > 0) {
3414 		struct zone_admintab admintab;
3415 
3416 		if ((err = fill_in_admintab(cmd, &admintab, B_FALSE)) != Z_OK) {
3417 			z_cmd_rt_perror(CMD_REMOVE, RT_ADMIN,
3418 			    err, B_TRUE);
3419 			return;
3420 		}
3421 		if ((err = zonecfg_delete_admin(handle, &admintab,
3422 		    zone))
3423 		    != Z_OK)
3424 			z_cmd_rt_perror(CMD_REMOVE, RT_ADMIN,
3425 			    err, B_TRUE);
3426 		else
3427 			need_to_commit = B_TRUE;
3428 		return;
3429 	} else {
3430 		/*
3431 		 * unqualified admin removal.
3432 		 * remove all admins but prompt if more
3433 		 * than one.
3434 		 */
3435 		if (!prompt_remove_resource(cmd, "admin"))
3436 			return;
3437 
3438 		if ((err = zonecfg_delete_admins(handle, zone))
3439 		    != Z_OK)
3440 			z_cmd_rt_perror(CMD_REMOVE, RT_ADMIN,
3441 			    err, B_TRUE);
3442 		else
3443 			need_to_commit = B_TRUE;
3444 	}
3445 }
3446 
3447 static void
3448 remove_secflags()
3449 {
3450 	int err;
3451 	struct zone_secflagstab sectab = { 0 };
3452 
3453 	if (zonecfg_lookup_secflags(handle, &sectab) != Z_OK) {
3454 		zerr("%s %s: %s", cmd_to_str(CMD_REMOVE),
3455 		    rt_to_str(RT_SECFLAGS),
3456 		    zonecfg_strerror(Z_NO_RESOURCE_TYPE));
3457 		return;
3458 	}
3459 
3460 	if ((err = zonecfg_delete_secflags(handle, &sectab)) != Z_OK) {
3461 		z_cmd_rt_perror(CMD_REMOVE, RT_SECFLAGS, err, B_TRUE);
3462 		return;
3463 	}
3464 
3465 	need_to_commit = B_TRUE;
3466 }
3467 
3468 static void
3469 remove_resource(cmd_t *cmd)
3470 {
3471 	int type;
3472 	int arg;
3473 	boolean_t arg_err = B_FALSE;
3474 
3475 	if ((type = cmd->cmd_res_type) == RT_UNKNOWN) {
3476 		long_usage(CMD_REMOVE, B_TRUE);
3477 		return;
3478 	}
3479 
3480 	optind = 0;
3481 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) {
3482 		switch (arg) {
3483 		case '?':
3484 			longer_usage(CMD_REMOVE);
3485 			arg_err = B_TRUE;
3486 			break;
3487 		case 'F':
3488 			break;
3489 		default:
3490 			short_usage(CMD_REMOVE);
3491 			arg_err = B_TRUE;
3492 			break;
3493 		}
3494 	}
3495 	if (arg_err)
3496 		return;
3497 
3498 	if (initialize(B_TRUE) != Z_OK)
3499 		return;
3500 
3501 	switch (type) {
3502 	case RT_FS:
3503 		remove_fs(cmd);
3504 		return;
3505 	case RT_NET:
3506 		remove_net(cmd);
3507 		return;
3508 	case RT_DEVICE:
3509 		remove_device(cmd);
3510 		return;
3511 	case RT_RCTL:
3512 		remove_rctl(cmd);
3513 		return;
3514 	case RT_ATTR:
3515 		remove_attr(cmd);
3516 		return;
3517 	case RT_DATASET:
3518 		remove_dataset(cmd);
3519 		return;
3520 	case RT_DCPU:
3521 		remove_pset();
3522 		return;
3523 	case RT_PCAP:
3524 		remove_pcap();
3525 		return;
3526 	case RT_MCAP:
3527 		remove_mcap();
3528 		return;
3529 	case RT_ADMIN:
3530 		remove_admin(cmd);
3531 		return;
3532 	case RT_SECFLAGS:
3533 		remove_secflags();
3534 		return;
3535 	default:
3536 		zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, B_TRUE);
3537 		long_usage(CMD_REMOVE, B_TRUE);
3538 		usage(B_FALSE, HELP_RESOURCES);
3539 		return;
3540 	}
3541 }
3542 
3543 static void
3544 remove_property(cmd_t *cmd)
3545 {
3546 	char *prop_id;
3547 	int err, res_type, prop_type;
3548 	property_value_ptr_t pp;
3549 	struct zone_rctlvaltab *rctlvaltab;
3550 	complex_property_ptr_t cx;
3551 
3552 	res_type = resource_scope;
3553 	prop_type = cmd->cmd_prop_name[0];
3554 	if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) {
3555 		long_usage(CMD_REMOVE, B_TRUE);
3556 		return;
3557 	}
3558 
3559 	if (cmd->cmd_prop_nv_pairs != 1) {
3560 		long_usage(CMD_ADD, B_TRUE);
3561 		return;
3562 	}
3563 
3564 	if (initialize(B_TRUE) != Z_OK)
3565 		return;
3566 
3567 	switch (res_type) {
3568 	case RT_FS:
3569 		if (prop_type != PT_OPTIONS) {
3570 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
3571 			    B_TRUE);
3572 			long_usage(CMD_REMOVE, B_TRUE);
3573 			usage(B_FALSE, HELP_PROPS);
3574 			return;
3575 		}
3576 		pp = cmd->cmd_property_ptr[0];
3577 		if (pp->pv_type == PROP_VAL_COMPLEX) {
3578 			zerr(gettext("A %s or %s value was expected here."),
3579 			    pvt_to_str(PROP_VAL_SIMPLE),
3580 			    pvt_to_str(PROP_VAL_LIST));
3581 			saw_error = B_TRUE;
3582 			return;
3583 		}
3584 		if (pp->pv_type == PROP_VAL_SIMPLE) {
3585 			if (pp->pv_simple == NULL) {
3586 				long_usage(CMD_ADD, B_TRUE);
3587 				return;
3588 			}
3589 			prop_id = pp->pv_simple;
3590 			err = zonecfg_remove_fs_option(&in_progress_fstab,
3591 			    prop_id);
3592 			if (err != Z_OK)
3593 				zone_perror(pt_to_str(prop_type), err, B_TRUE);
3594 		} else {
3595 			list_property_ptr_t list;
3596 
3597 			for (list = pp->pv_list; list != NULL;
3598 			    list = list->lp_next) {
3599 				prop_id = list->lp_simple;
3600 				if (prop_id == NULL)
3601 					break;
3602 				err = zonecfg_remove_fs_option(
3603 				    &in_progress_fstab, prop_id);
3604 				if (err != Z_OK)
3605 					zone_perror(pt_to_str(prop_type), err,
3606 					    B_TRUE);
3607 			}
3608 		}
3609 		return;
3610 	case RT_RCTL:
3611 		if (prop_type != PT_VALUE) {
3612 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
3613 			    B_TRUE);
3614 			long_usage(CMD_REMOVE, B_TRUE);
3615 			usage(B_FALSE, HELP_PROPS);
3616 			return;
3617 		}
3618 		pp = cmd->cmd_property_ptr[0];
3619 		if (pp->pv_type != PROP_VAL_COMPLEX) {
3620 			zerr(gettext("A %s value was expected here."),
3621 			    pvt_to_str(PROP_VAL_COMPLEX));
3622 			saw_error = B_TRUE;
3623 			return;
3624 		}
3625 		if ((rctlvaltab = alloc_rctlvaltab()) == NULL) {
3626 			zone_perror(zone, Z_NOMEM, B_TRUE);
3627 			exit(Z_ERR);
3628 		}
3629 		for (cx = pp->pv_complex; cx != NULL; cx = cx->cp_next) {
3630 			switch (cx->cp_type) {
3631 			case PT_PRIV:
3632 				(void) strlcpy(rctlvaltab->zone_rctlval_priv,
3633 				    cx->cp_value,
3634 				    sizeof (rctlvaltab->zone_rctlval_priv));
3635 				break;
3636 			case PT_LIMIT:
3637 				(void) strlcpy(rctlvaltab->zone_rctlval_limit,
3638 				    cx->cp_value,
3639 				    sizeof (rctlvaltab->zone_rctlval_limit));
3640 				break;
3641 			case PT_ACTION:
3642 				(void) strlcpy(rctlvaltab->zone_rctlval_action,
3643 				    cx->cp_value,
3644 				    sizeof (rctlvaltab->zone_rctlval_action));
3645 				break;
3646 			default:
3647 				zone_perror(pt_to_str(prop_type),
3648 				    Z_NO_PROPERTY_TYPE, B_TRUE);
3649 				long_usage(CMD_ADD, B_TRUE);
3650 				usage(B_FALSE, HELP_PROPS);
3651 				zonecfg_free_rctl_value_list(rctlvaltab);
3652 				return;
3653 			}
3654 		}
3655 		rctlvaltab->zone_rctlval_next = NULL;
3656 		err = zonecfg_remove_rctl_value(&in_progress_rctltab,
3657 		    rctlvaltab);
3658 		if (err != Z_OK)
3659 			zone_perror(pt_to_str(prop_type), err, B_TRUE);
3660 		zonecfg_free_rctl_value_list(rctlvaltab);
3661 		return;
3662 	case RT_NET:
3663 		if (prop_type != PT_DEFROUTER) {
3664 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
3665 			    B_TRUE);
3666 			long_usage(CMD_REMOVE, B_TRUE);
3667 			usage(B_FALSE, HELP_PROPS);
3668 			return;
3669 		} else {
3670 			bzero(&in_progress_nwiftab.zone_nwif_defrouter,
3671 			    sizeof (in_progress_nwiftab.zone_nwif_defrouter));
3672 			return;
3673 		}
3674 	default:
3675 		zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, B_TRUE);
3676 		long_usage(CMD_REMOVE, B_TRUE);
3677 		usage(B_FALSE, HELP_RESOURCES);
3678 		return;
3679 	}
3680 }
3681 
3682 void
3683 remove_func(cmd_t *cmd)
3684 {
3685 	if (zone_is_read_only(CMD_REMOVE))
3686 		return;
3687 
3688 	assert(cmd != NULL);
3689 
3690 	if (global_scope) {
3691 		if (gz_invalid_resource(cmd->cmd_res_type)) {
3692 			zerr(gettext("%s is not a valid resource for the "
3693 			    "global zone."), rt_to_str(cmd->cmd_res_type));
3694 			saw_error = B_TRUE;
3695 			return;
3696 		}
3697 		remove_resource(cmd);
3698 	} else {
3699 		remove_property(cmd);
3700 	}
3701 }
3702 
3703 static void
3704 clear_property(cmd_t *cmd)
3705 {
3706 	int res_type, prop_type;
3707 
3708 	res_type = resource_scope;
3709 	prop_type = cmd->cmd_res_type;
3710 	if (res_type == RT_UNKNOWN || prop_type == PT_UNKNOWN) {
3711 		long_usage(CMD_CLEAR, B_TRUE);
3712 		return;
3713 	}
3714 
3715 	if (initialize(B_TRUE) != Z_OK)
3716 		return;
3717 
3718 	switch (res_type) {
3719 	case RT_FS:
3720 		if (prop_type == PT_RAW) {
3721 			in_progress_fstab.zone_fs_raw[0] = '\0';
3722 			need_to_commit = B_TRUE;
3723 			return;
3724 		}
3725 		break;
3726 	case RT_DCPU:
3727 		if (prop_type == PT_IMPORTANCE) {
3728 			in_progress_psettab.zone_importance[0] = '\0';
3729 			need_to_commit = B_TRUE;
3730 			return;
3731 		}
3732 		break;
3733 	case RT_MCAP:
3734 		switch (prop_type) {
3735 		case PT_PHYSICAL:
3736 			in_progress_mcaptab.zone_physmem_cap[0] = '\0';
3737 			need_to_commit = B_TRUE;
3738 			return;
3739 		case PT_SWAP:
3740 			remove_aliased_rctl(PT_SWAP, ALIAS_MAXSWAP);
3741 			return;
3742 		case PT_LOCKED:
3743 			remove_aliased_rctl(PT_LOCKED, ALIAS_MAXLOCKEDMEM);
3744 			return;
3745 		}
3746 		break;
3747 	case RT_SECFLAGS:
3748 		switch (prop_type) {
3749 		case PT_LOWER:
3750 			in_progress_secflagstab.zone_secflags_lower[0] = '\0';
3751 			need_to_commit = B_TRUE;
3752 			return;
3753 		case PT_DEFAULT:
3754 			in_progress_secflagstab.zone_secflags_default[0] = '\0';
3755 			need_to_commit = B_TRUE;
3756 			return;
3757 		case PT_UPPER:
3758 			in_progress_secflagstab.zone_secflags_upper[0] = '\0';
3759 			need_to_commit = B_TRUE;
3760 			return;
3761 		}
3762 		break;
3763 	default:
3764 		break;
3765 	}
3766 
3767 	zone_perror(pt_to_str(prop_type), Z_CLEAR_DISALLOW, B_TRUE);
3768 }
3769 
3770 static void
3771 clear_global(cmd_t *cmd)
3772 {
3773 	int err, type;
3774 
3775 	if ((type = cmd->cmd_res_type) == RT_UNKNOWN) {
3776 		long_usage(CMD_CLEAR, B_TRUE);
3777 		return;
3778 	}
3779 
3780 	if (initialize(B_TRUE) != Z_OK)
3781 		return;
3782 
3783 	switch (type) {
3784 	case PT_ZONENAME:
3785 		/* FALLTHRU */
3786 	case PT_ZONEPATH:
3787 		/* FALLTHRU */
3788 	case PT_BRAND:
3789 		zone_perror(pt_to_str(type), Z_CLEAR_DISALLOW, B_TRUE);
3790 		return;
3791 	case PT_AUTOBOOT:
3792 		/* false is default; we'll treat as equivalent to clearing */
3793 		if ((err = zonecfg_set_autoboot(handle, B_FALSE)) != Z_OK)
3794 			z_cmd_rt_perror(CMD_CLEAR, RT_AUTOBOOT, err, B_TRUE);
3795 		else
3796 			need_to_commit = B_TRUE;
3797 		return;
3798 	case PT_POOL:
3799 		if ((err = zonecfg_set_pool(handle, NULL)) != Z_OK)
3800 			z_cmd_rt_perror(CMD_CLEAR, RT_POOL, err, B_TRUE);
3801 		else
3802 			need_to_commit = B_TRUE;
3803 		return;
3804 	case PT_LIMITPRIV:
3805 		if ((err = zonecfg_set_limitpriv(handle, NULL)) != Z_OK)
3806 			z_cmd_rt_perror(CMD_CLEAR, RT_LIMITPRIV, err, B_TRUE);
3807 		else
3808 			need_to_commit = B_TRUE;
3809 		return;
3810 	case PT_BOOTARGS:
3811 		if ((err = zonecfg_set_bootargs(handle, NULL)) != Z_OK)
3812 			z_cmd_rt_perror(CMD_CLEAR, RT_BOOTARGS, err, B_TRUE);
3813 		else
3814 			need_to_commit = B_TRUE;
3815 		return;
3816 	case PT_SCHED:
3817 		if ((err = zonecfg_set_sched(handle, NULL)) != Z_OK)
3818 			z_cmd_rt_perror(CMD_CLEAR, RT_SCHED, err, B_TRUE);
3819 		else
3820 			need_to_commit = B_TRUE;
3821 		return;
3822 	case PT_IPTYPE:
3823 		/* shared is default; we'll treat as equivalent to clearing */
3824 		if ((err = zonecfg_set_iptype(handle, ZS_SHARED)) != Z_OK)
3825 			z_cmd_rt_perror(CMD_CLEAR, RT_IPTYPE, err, B_TRUE);
3826 		else
3827 			need_to_commit = B_TRUE;
3828 		return;
3829 	case PT_MAXLWPS:
3830 		remove_aliased_rctl(PT_MAXLWPS, ALIAS_MAXLWPS);
3831 		return;
3832 	case PT_MAXPROCS:
3833 		remove_aliased_rctl(PT_MAXPROCS, ALIAS_MAXPROCS);
3834 		return;
3835 	case PT_MAXSHMMEM:
3836 		remove_aliased_rctl(PT_MAXSHMMEM, ALIAS_MAXSHMMEM);
3837 		return;
3838 	case PT_MAXSHMIDS:
3839 		remove_aliased_rctl(PT_MAXSHMIDS, ALIAS_MAXSHMIDS);
3840 		return;
3841 	case PT_MAXMSGIDS:
3842 		remove_aliased_rctl(PT_MAXMSGIDS, ALIAS_MAXMSGIDS);
3843 		return;
3844 	case PT_MAXSEMIDS:
3845 		remove_aliased_rctl(PT_MAXSEMIDS, ALIAS_MAXSEMIDS);
3846 		return;
3847 	case PT_SHARES:
3848 		remove_aliased_rctl(PT_SHARES, ALIAS_SHARES);
3849 		return;
3850 	case PT_HOSTID:
3851 		if ((err = zonecfg_set_hostid(handle, NULL)) != Z_OK)
3852 			z_cmd_rt_perror(CMD_CLEAR, RT_HOSTID, err, B_TRUE);
3853 		else
3854 			need_to_commit = B_TRUE;
3855 		return;
3856 	case PT_FS_ALLOWED:
3857 		if ((err = zonecfg_set_fs_allowed(handle, NULL)) != Z_OK)
3858 			z_cmd_rt_perror(CMD_CLEAR, RT_FS_ALLOWED, err, B_TRUE);
3859 		else
3860 			need_to_commit = B_TRUE;
3861 		return;
3862 	default:
3863 		zone_perror(pt_to_str(type), Z_NO_PROPERTY_TYPE, B_TRUE);
3864 		long_usage(CMD_CLEAR, B_TRUE);
3865 		usage(B_FALSE, HELP_PROPS);
3866 		return;
3867 	}
3868 }
3869 
3870 void
3871 clear_func(cmd_t *cmd)
3872 {
3873 	if (zone_is_read_only(CMD_CLEAR))
3874 		return;
3875 
3876 	assert(cmd != NULL);
3877 
3878 	if (global_scope) {
3879 		if (gz_invalid_property(cmd->cmd_res_type)) {
3880 			zerr(gettext("%s is not a valid property for the "
3881 			    "global zone."), pt_to_str(cmd->cmd_res_type));
3882 			saw_error = B_TRUE;
3883 			return;
3884 		}
3885 
3886 		clear_global(cmd);
3887 	} else {
3888 		clear_property(cmd);
3889 	}
3890 }
3891 
3892 void
3893 select_func(cmd_t *cmd)
3894 {
3895 	int type, err, res;
3896 	uint64_t limit;
3897 	uint64_t tmp;
3898 
3899 	if (zone_is_read_only(CMD_SELECT))
3900 		return;
3901 
3902 	assert(cmd != NULL);
3903 
3904 	if (global_scope) {
3905 		global_scope = B_FALSE;
3906 		resource_scope = cmd->cmd_res_type;
3907 		end_op = CMD_SELECT;
3908 	} else {
3909 		scope_usage(CMD_SELECT);
3910 		return;
3911 	}
3912 
3913 	if ((type = cmd->cmd_res_type) == RT_UNKNOWN) {
3914 		long_usage(CMD_SELECT, B_TRUE);
3915 		return;
3916 	}
3917 
3918 	if (initialize(B_TRUE) != Z_OK)
3919 		return;
3920 
3921 	switch (type) {
3922 	case RT_FS:
3923 		if ((err = fill_in_fstab(cmd, &old_fstab, B_FALSE)) != Z_OK) {
3924 			z_cmd_rt_perror(CMD_SELECT, RT_FS, err, B_TRUE);
3925 			global_scope = B_TRUE;
3926 		}
3927 		bcopy(&old_fstab, &in_progress_fstab,
3928 		    sizeof (struct zone_fstab));
3929 		return;
3930 	case RT_NET:
3931 		if ((err = fill_in_nwiftab(cmd, &old_nwiftab, B_FALSE))
3932 		    != Z_OK) {
3933 			z_cmd_rt_perror(CMD_SELECT, RT_NET, err, B_TRUE);
3934 			global_scope = B_TRUE;
3935 		}
3936 		bcopy(&old_nwiftab, &in_progress_nwiftab,
3937 		    sizeof (struct zone_nwiftab));
3938 		return;
3939 	case RT_DEVICE:
3940 		if ((err = fill_in_devtab(cmd, &old_devtab, B_FALSE)) != Z_OK) {
3941 			z_cmd_rt_perror(CMD_SELECT, RT_DEVICE, err, B_TRUE);
3942 			global_scope = B_TRUE;
3943 		}
3944 		bcopy(&old_devtab, &in_progress_devtab,
3945 		    sizeof (struct zone_devtab));
3946 		return;
3947 	case RT_RCTL:
3948 		if ((err = fill_in_rctltab(cmd, &old_rctltab, B_FALSE))
3949 		    != Z_OK) {
3950 			z_cmd_rt_perror(CMD_SELECT, RT_RCTL, err, B_TRUE);
3951 			global_scope = B_TRUE;
3952 		}
3953 		bcopy(&old_rctltab, &in_progress_rctltab,
3954 		    sizeof (struct zone_rctltab));
3955 		return;
3956 	case RT_ATTR:
3957 		if ((err = fill_in_attrtab(cmd, &old_attrtab, B_FALSE))
3958 		    != Z_OK) {
3959 			z_cmd_rt_perror(CMD_SELECT, RT_ATTR, err, B_TRUE);
3960 			global_scope = B_TRUE;
3961 		}
3962 		bcopy(&old_attrtab, &in_progress_attrtab,
3963 		    sizeof (struct zone_attrtab));
3964 		return;
3965 	case RT_DATASET:
3966 		if ((err = fill_in_dstab(cmd, &old_dstab, B_FALSE)) != Z_OK) {
3967 			z_cmd_rt_perror(CMD_SELECT, RT_DATASET, err, B_TRUE);
3968 			global_scope = B_TRUE;
3969 		}
3970 		bcopy(&old_dstab, &in_progress_dstab,
3971 		    sizeof (struct zone_dstab));
3972 		return;
3973 	case RT_DCPU:
3974 		if ((err = zonecfg_lookup_pset(handle, &old_psettab)) != Z_OK) {
3975 			z_cmd_rt_perror(CMD_SELECT, RT_DCPU, err, B_TRUE);
3976 			global_scope = B_TRUE;
3977 		}
3978 		bcopy(&old_psettab, &in_progress_psettab,
3979 		    sizeof (struct zone_psettab));
3980 		return;
3981 	case RT_PCAP:
3982 		if ((err = zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &tmp))
3983 		    != Z_OK) {
3984 			z_cmd_rt_perror(CMD_SELECT, RT_PCAP, err, B_TRUE);
3985 			global_scope = B_TRUE;
3986 		}
3987 		return;
3988 	case RT_MCAP:
3989 		/* if none of these exist, there is no resource to select */
3990 		if ((res = zonecfg_lookup_mcap(handle, &old_mcaptab)) != Z_OK &&
3991 		    zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &limit)
3992 		    != Z_OK &&
3993 		    zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM, &limit)
3994 		    != Z_OK) {
3995 			z_cmd_rt_perror(CMD_SELECT, RT_MCAP, Z_NO_RESOURCE_TYPE,
3996 			    B_TRUE);
3997 			global_scope = B_TRUE;
3998 		}
3999 		if (res == Z_OK)
4000 			bcopy(&old_mcaptab, &in_progress_mcaptab,
4001 			    sizeof (struct zone_mcaptab));
4002 		else
4003 			bzero(&in_progress_mcaptab,
4004 			    sizeof (in_progress_mcaptab));
4005 		return;
4006 	case RT_ADMIN:
4007 		if ((err = fill_in_admintab(cmd, &old_admintab, B_FALSE))
4008 		    != Z_OK) {
4009 			z_cmd_rt_perror(CMD_SELECT, RT_ADMIN, err,
4010 			    B_TRUE);
4011 			global_scope = B_TRUE;
4012 		}
4013 		bcopy(&old_admintab, &in_progress_admintab,
4014 		    sizeof (struct zone_admintab));
4015 		return;
4016 	case RT_SECFLAGS:
4017 		if ((err = fill_in_secflagstab(cmd, &old_secflagstab, B_FALSE))
4018 		    != Z_OK) {
4019 			z_cmd_rt_perror(CMD_SELECT, RT_SECFLAGS, err,
4020 			    B_TRUE);
4021 			global_scope = B_TRUE;
4022 		}
4023 		bcopy(&old_secflagstab, &in_progress_secflagstab,
4024 		    sizeof (struct zone_secflagstab));
4025 		return;
4026 	default:
4027 		zone_perror(rt_to_str(type), Z_NO_RESOURCE_TYPE, B_TRUE);
4028 		long_usage(CMD_SELECT, B_TRUE);
4029 		usage(B_FALSE, HELP_RESOURCES);
4030 		return;
4031 	}
4032 }
4033 
4034 /*
4035  * Network "addresses" can be one of the following forms:
4036  *	<IPv4 address>
4037  *	<IPv4 address>/<prefix length>
4038  *	<IPv6 address>/<prefix length>
4039  *	<host name>
4040  *	<host name>/<prefix length>
4041  * In other words, the "/" followed by a prefix length is allowed but not
4042  * required for IPv4 addresses and host names, and required for IPv6 addresses.
4043  * If a prefix length is given, it must be in the allowable range: 0 to 32 for
4044  * IPv4 addresses and host names, 0 to 128 for IPv6 addresses.
4045  * Host names must start with an alpha-numeric character, and all subsequent
4046  * characters must be either alpha-numeric or "-".
4047  *
4048  * In some cases, e.g., the nexthop for the defrouter, the context indicates
4049  * that this is the IPV4_ABITS or IPV6_ABITS netmask, in which case we don't
4050  * require the /<prefix length> (and should ignore it if provided).
4051  */
4052 
4053 static int
4054 validate_net_address_syntax(char *address, boolean_t ishost)
4055 {
4056 	char *slashp, part1[MAXHOSTNAMELEN];
4057 	struct in6_addr in6;
4058 	struct in_addr in4;
4059 	int prefixlen, i;
4060 
4061 	/*
4062 	 * Copy the part before any '/' into part1 or copy the whole
4063 	 * thing if there is no '/'.
4064 	 */
4065 	if ((slashp = strchr(address, '/')) != NULL) {
4066 		*slashp = '\0';
4067 		(void) strlcpy(part1, address, sizeof (part1));
4068 		*slashp = '/';
4069 		prefixlen = atoi(++slashp);
4070 	} else {
4071 		(void) strlcpy(part1, address, sizeof (part1));
4072 	}
4073 
4074 	if (ishost && slashp != NULL) {
4075 		zerr(gettext("Warning: prefix length in %s is not required and "
4076 		    "will be ignored. The default host-prefix length "
4077 		    "will be used"), address);
4078 	}
4079 
4080 
4081 	if (inet_pton(AF_INET6, part1, &in6) == 1) {
4082 		if (ishost) {
4083 			prefixlen = IPV6_ABITS;
4084 		} else if (slashp == NULL) {
4085 			zerr(gettext("%s: IPv6 addresses "
4086 			    "require /prefix-length suffix."), address);
4087 			return (Z_ERR);
4088 		}
4089 		if (prefixlen < 0 || prefixlen > 128) {
4090 			zerr(gettext("%s: IPv6 address "
4091 			    "prefix lengths must be 0 - 128."), address);
4092 			return (Z_ERR);
4093 		}
4094 		return (Z_OK);
4095 	}
4096 
4097 	/* At this point, any /prefix must be for IPv4. */
4098 	if (ishost)
4099 		prefixlen = IPV4_ABITS;
4100 	else if (slashp != NULL) {
4101 		if (prefixlen < 0 || prefixlen > 32) {
4102 			zerr(gettext("%s: IPv4 address "
4103 			    "prefix lengths must be 0 - 32."), address);
4104 			return (Z_ERR);
4105 		}
4106 	}
4107 
4108 	if (inet_pton(AF_INET, part1, &in4) == 1)
4109 		return (Z_OK);
4110 
4111 	/* address may also be a host name */
4112 	if (!isalnum(part1[0])) {
4113 		zerr(gettext("%s: bogus host name or network address syntax"),
4114 		    part1);
4115 		saw_error = B_TRUE;
4116 		usage(B_FALSE, HELP_NETADDR);
4117 		return (Z_ERR);
4118 	}
4119 	for (i = 1; part1[i]; i++)
4120 		if (!isalnum(part1[i]) && part1[i] != '-' && part1[i] != '.') {
4121 			zerr(gettext("%s: bogus host name or "
4122 			    "network address syntax"), part1);
4123 			saw_error = B_TRUE;
4124 			usage(B_FALSE, HELP_NETADDR);
4125 			return (Z_ERR);
4126 		}
4127 	return (Z_OK);
4128 }
4129 
4130 static int
4131 validate_net_physical_syntax(const char *ifname)
4132 {
4133 	ifspec_t ifnameprop;
4134 	zone_iptype_t iptype;
4135 
4136 	if (zonecfg_get_iptype(handle, &iptype) != Z_OK) {
4137 		zerr(gettext("zone configuration has an invalid or nonexistent "
4138 		    "ip-type property"));
4139 		return (Z_ERR);
4140 	}
4141 	switch (iptype) {
4142 	case ZS_SHARED:
4143 		if (ifparse_ifspec(ifname, &ifnameprop) == B_FALSE) {
4144 			zerr(gettext("%s: invalid physical interface name"),
4145 			    ifname);
4146 			return (Z_ERR);
4147 		}
4148 		if (ifnameprop.ifsp_lunvalid) {
4149 			zerr(gettext("%s: LUNs not allowed in physical "
4150 			    "interface names"), ifname);
4151 			return (Z_ERR);
4152 		}
4153 		break;
4154 	case ZS_EXCLUSIVE:
4155 		if (dladm_valid_linkname(ifname) == B_FALSE) {
4156 			if (strchr(ifname, ':') != NULL)
4157 				zerr(gettext("%s: physical interface name "
4158 				    "required; logical interface name not "
4159 				    "allowed"), ifname);
4160 			else
4161 				zerr(gettext("%s: invalid physical interface "
4162 				    "name"), ifname);
4163 			return (Z_ERR);
4164 		}
4165 		break;
4166 	}
4167 	return (Z_OK);
4168 }
4169 
4170 static boolean_t
4171 valid_fs_type(const char *type)
4172 {
4173 	/*
4174 	 * Is this a valid path component?
4175 	 */
4176 	if (strlen(type) + 1 > MAXNAMELEN)
4177 		return (B_FALSE);
4178 	/*
4179 	 * Make sure a bad value for "type" doesn't make
4180 	 * /usr/lib/fs/<type>/mount turn into something else.
4181 	 */
4182 	if (strchr(type, '/') != NULL || type[0] == '\0' ||
4183 	    strcmp(type, ".") == 0 || strcmp(type, "..") == 0)
4184 		return (B_FALSE);
4185 	/*
4186 	 * More detailed verification happens later by zoneadm(1m).
4187 	 */
4188 	return (B_TRUE);
4189 }
4190 
4191 static boolean_t
4192 allow_exclusive()
4193 {
4194 	brand_handle_t	bh;
4195 	char		brand[MAXNAMELEN];
4196 	boolean_t	ret;
4197 
4198 	if (zonecfg_get_brand(handle, brand, sizeof (brand)) != Z_OK) {
4199 		zerr("%s: %s\n", zone, gettext("could not get zone brand"));
4200 		return (B_FALSE);
4201 	}
4202 	if ((bh = brand_open(brand)) == NULL) {
4203 		zerr("%s: %s\n", zone, gettext("unknown brand."));
4204 		return (B_FALSE);
4205 	}
4206 	ret = brand_allow_exclusive_ip(bh);
4207 	brand_close(bh);
4208 	if (!ret)
4209 		zerr(gettext("%s cannot be '%s' when %s is '%s'."),
4210 		    pt_to_str(PT_IPTYPE), "exclusive",
4211 		    pt_to_str(PT_BRAND), brand);
4212 	return (ret);
4213 }
4214 
4215 static void
4216 set_aliased_rctl(char *alias, int prop_type, char *s)
4217 {
4218 	uint64_t limit;
4219 	int err;
4220 	char tmp[128];
4221 
4222 	if (global_zone && strcmp(alias, ALIAS_SHARES) != 0)
4223 		zerr(gettext("WARNING: Setting a global zone resource "
4224 		    "control too low could deny\nservice "
4225 		    "to even the root user; "
4226 		    "this could render the system impossible\n"
4227 		    "to administer.  Please use caution."));
4228 
4229 	/* convert memory based properties */
4230 	if (prop_type == PT_MAXSHMMEM) {
4231 		if (!zonecfg_valid_memlimit(s, &limit)) {
4232 			zerr(gettext("A non-negative number with a required "
4233 			    "scale suffix (K, M, G or T) was expected\nhere."));
4234 			saw_error = B_TRUE;
4235 			return;
4236 		}
4237 
4238 		(void) snprintf(tmp, sizeof (tmp), "%llu", limit);
4239 		s = tmp;
4240 	}
4241 
4242 	if (!zonecfg_aliased_rctl_ok(handle, alias)) {
4243 		zone_perror(pt_to_str(prop_type), Z_ALIAS_DISALLOW, B_FALSE);
4244 		saw_error = B_TRUE;
4245 	} else if (!zonecfg_valid_alias_limit(alias, s, &limit)) {
4246 		zerr(gettext("%s property is out of range."),
4247 		    pt_to_str(prop_type));
4248 		saw_error = B_TRUE;
4249 	} else if ((err = zonecfg_set_aliased_rctl(handle, alias, limit))
4250 	    != Z_OK) {
4251 		zone_perror(zone, err, B_TRUE);
4252 		saw_error = B_TRUE;
4253 	} else {
4254 		need_to_commit = B_TRUE;
4255 	}
4256 }
4257 
4258 static void
4259 set_in_progress_nwiftab_address(char *prop_id, int prop_type)
4260 {
4261 	if (prop_type == PT_ADDRESS) {
4262 		(void) strlcpy(in_progress_nwiftab.zone_nwif_address, prop_id,
4263 		    sizeof (in_progress_nwiftab.zone_nwif_address));
4264 	} else {
4265 		assert(prop_type == PT_ALLOWED_ADDRESS);
4266 		(void) strlcpy(in_progress_nwiftab.zone_nwif_allowed_address,
4267 		    prop_id,
4268 		    sizeof (in_progress_nwiftab.zone_nwif_allowed_address));
4269 	}
4270 }
4271 
4272 void
4273 set_func(cmd_t *cmd)
4274 {
4275 	char *prop_id;
4276 	int arg, err, res_type, prop_type;
4277 	property_value_ptr_t pp;
4278 	boolean_t autoboot;
4279 	zone_iptype_t iptype;
4280 	boolean_t force_set = B_FALSE;
4281 	size_t physmem_size = sizeof (in_progress_mcaptab.zone_physmem_cap);
4282 	uint64_t mem_cap, mem_limit;
4283 	float cap;
4284 	char *unitp;
4285 	struct zone_psettab tmp_psettab;
4286 	boolean_t arg_err = B_FALSE;
4287 
4288 	if (zone_is_read_only(CMD_SET))
4289 		return;
4290 
4291 	assert(cmd != NULL);
4292 
4293 	optind = opterr = 0;
4294 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "F")) != EOF) {
4295 		switch (arg) {
4296 		case 'F':
4297 			force_set = B_TRUE;
4298 			break;
4299 		default:
4300 			if (optopt == '?')
4301 				longer_usage(CMD_SET);
4302 			else
4303 				short_usage(CMD_SET);
4304 			arg_err = B_TRUE;
4305 			break;
4306 		}
4307 	}
4308 	if (arg_err)
4309 		return;
4310 
4311 	prop_type = cmd->cmd_prop_name[0];
4312 	if (global_scope) {
4313 		if (gz_invalid_property(prop_type)) {
4314 			zerr(gettext("%s is not a valid property for the "
4315 			    "global zone."), pt_to_str(prop_type));
4316 			saw_error = B_TRUE;
4317 			return;
4318 		}
4319 
4320 		if (prop_type == PT_ZONENAME) {
4321 			res_type = RT_ZONENAME;
4322 		} else if (prop_type == PT_ZONEPATH) {
4323 			res_type = RT_ZONEPATH;
4324 		} else if (prop_type == PT_AUTOBOOT) {
4325 			res_type = RT_AUTOBOOT;
4326 		} else if (prop_type == PT_BRAND) {
4327 			res_type = RT_BRAND;
4328 		} else if (prop_type == PT_POOL) {
4329 			res_type = RT_POOL;
4330 		} else if (prop_type == PT_LIMITPRIV) {
4331 			res_type = RT_LIMITPRIV;
4332 		} else if (prop_type == PT_BOOTARGS) {
4333 			res_type = RT_BOOTARGS;
4334 		} else if (prop_type == PT_SCHED) {
4335 			res_type = RT_SCHED;
4336 		} else if (prop_type == PT_IPTYPE) {
4337 			res_type = RT_IPTYPE;
4338 		} else if (prop_type == PT_MAXLWPS) {
4339 			res_type = RT_MAXLWPS;
4340 		} else if (prop_type == PT_MAXPROCS) {
4341 			res_type = RT_MAXPROCS;
4342 		} else if (prop_type == PT_MAXSHMMEM) {
4343 			res_type = RT_MAXSHMMEM;
4344 		} else if (prop_type == PT_MAXSHMIDS) {
4345 			res_type = RT_MAXSHMIDS;
4346 		} else if (prop_type == PT_MAXMSGIDS) {
4347 			res_type = RT_MAXMSGIDS;
4348 		} else if (prop_type == PT_MAXSEMIDS) {
4349 			res_type = RT_MAXSEMIDS;
4350 		} else if (prop_type == PT_SHARES) {
4351 			res_type = RT_SHARES;
4352 		} else if (prop_type == PT_HOSTID) {
4353 			res_type = RT_HOSTID;
4354 		} else if (prop_type == PT_FS_ALLOWED) {
4355 			res_type = RT_FS_ALLOWED;
4356 		} else {
4357 			zerr(gettext("Cannot set a resource-specific property "
4358 			    "from the global scope."));
4359 			saw_error = B_TRUE;
4360 			return;
4361 		}
4362 	} else {
4363 		res_type = resource_scope;
4364 	}
4365 
4366 	if (force_set) {
4367 		if (res_type != RT_ZONEPATH) {
4368 			zerr(gettext("Only zonepath setting can be forced."));
4369 			saw_error = B_TRUE;
4370 			return;
4371 		}
4372 		if (!zonecfg_in_alt_root()) {
4373 			zerr(gettext("Zonepath is changeable only in an "
4374 			    "alternate root."));
4375 			saw_error = B_TRUE;
4376 			return;
4377 		}
4378 	}
4379 
4380 	pp = cmd->cmd_property_ptr[0];
4381 	/*
4382 	 * A nasty expression but not that complicated:
4383 	 * 1. fs options are simple or list (tested below)
4384 	 * 2. rctl value's are complex or list (tested below)
4385 	 * Anything else should be simple.
4386 	 */
4387 	if (!(res_type == RT_FS && prop_type == PT_OPTIONS) &&
4388 	    !(res_type == RT_RCTL && prop_type == PT_VALUE) &&
4389 	    (pp->pv_type != PROP_VAL_SIMPLE ||
4390 	    (prop_id = pp->pv_simple) == NULL)) {
4391 		zerr(gettext("A %s value was expected here."),
4392 		    pvt_to_str(PROP_VAL_SIMPLE));
4393 		saw_error = B_TRUE;
4394 		return;
4395 	}
4396 	if (prop_type == PT_UNKNOWN) {
4397 		long_usage(CMD_SET, B_TRUE);
4398 		return;
4399 	}
4400 
4401 	/*
4402 	 * Special case: the user can change the zone name prior to 'create';
4403 	 * if the zone already exists, we fall through letting initialize()
4404 	 * and the rest of the logic run.
4405 	 */
4406 	if (res_type == RT_ZONENAME && got_handle == B_FALSE &&
4407 	    !state_atleast(ZONE_STATE_CONFIGURED)) {
4408 		if ((err = zonecfg_validate_zonename(prop_id)) != Z_OK) {
4409 			zone_perror(prop_id, err, B_TRUE);
4410 			usage(B_FALSE, HELP_SYNTAX);
4411 			return;
4412 		}
4413 		(void) strlcpy(zone, prop_id, sizeof (zone));
4414 		return;
4415 	}
4416 
4417 	if (initialize(B_TRUE) != Z_OK)
4418 		return;
4419 
4420 	switch (res_type) {
4421 	case RT_ZONENAME:
4422 		if ((err = zonecfg_set_name(handle, prop_id)) != Z_OK) {
4423 			/*
4424 			 * Use prop_id instead of 'zone' here, since we're
4425 			 * reporting a problem about the *new* zonename.
4426 			 */
4427 			zone_perror(prop_id, err, B_TRUE);
4428 			usage(B_FALSE, HELP_SYNTAX);
4429 		} else {
4430 			need_to_commit = B_TRUE;
4431 			(void) strlcpy(zone, prop_id, sizeof (zone));
4432 		}
4433 		return;
4434 	case RT_ZONEPATH:
4435 		if (!force_set && state_atleast(ZONE_STATE_INSTALLED)) {
4436 			zerr(gettext("Zone %s already installed; %s %s not "
4437 			    "allowed."), zone, cmd_to_str(CMD_SET),
4438 			    rt_to_str(RT_ZONEPATH));
4439 			return;
4440 		}
4441 		if (validate_zonepath_syntax(prop_id) != Z_OK) {
4442 			saw_error = B_TRUE;
4443 			return;
4444 		}
4445 		if ((err = zonecfg_set_zonepath(handle, prop_id)) != Z_OK)
4446 			zone_perror(zone, err, B_TRUE);
4447 		else
4448 			need_to_commit = B_TRUE;
4449 		return;
4450 	case RT_BRAND:
4451 		if (state_atleast(ZONE_STATE_INSTALLED)) {
4452 			zerr(gettext("Zone %s already installed; %s %s not "
4453 			    "allowed."), zone, cmd_to_str(CMD_SET),
4454 			    rt_to_str(RT_BRAND));
4455 			return;
4456 		}
4457 		if ((err = zonecfg_set_brand(handle, prop_id)) != Z_OK)
4458 			zone_perror(zone, err, B_TRUE);
4459 		else
4460 			need_to_commit = B_TRUE;
4461 		return;
4462 	case RT_AUTOBOOT:
4463 		if (strcmp(prop_id, "true") == 0) {
4464 			autoboot = B_TRUE;
4465 		} else if (strcmp(prop_id, "false") == 0) {
4466 			autoboot = B_FALSE;
4467 		} else {
4468 			zerr(gettext("%s value must be '%s' or '%s'."),
4469 			    pt_to_str(PT_AUTOBOOT), "true", "false");
4470 			saw_error = B_TRUE;
4471 			return;
4472 		}
4473 		if ((err = zonecfg_set_autoboot(handle, autoboot)) != Z_OK)
4474 			zone_perror(zone, err, B_TRUE);
4475 		else
4476 			need_to_commit = B_TRUE;
4477 		return;
4478 	case RT_POOL:
4479 		/* don't allow use of the reserved temporary pool names */
4480 		if (strncmp("SUNW", prop_id, 4) == 0) {
4481 			zerr(gettext("pool names starting with SUNW are "
4482 			    "reserved."));
4483 			saw_error = B_TRUE;
4484 			return;
4485 		}
4486 
4487 		/* can't set pool if dedicated-cpu exists */
4488 		if (zonecfg_lookup_pset(handle, &tmp_psettab) == Z_OK) {
4489 			zerr(gettext("The %s resource already exists.  "
4490 			    "A persistent pool is incompatible\nwith the %s "
4491 			    "resource."), rt_to_str(RT_DCPU),
4492 			    rt_to_str(RT_DCPU));
4493 			saw_error = B_TRUE;
4494 			return;
4495 		}
4496 
4497 		if ((err = zonecfg_set_pool(handle, prop_id)) != Z_OK)
4498 			zone_perror(zone, err, B_TRUE);
4499 		else
4500 			need_to_commit = B_TRUE;
4501 		return;
4502 	case RT_LIMITPRIV:
4503 		if ((err = zonecfg_set_limitpriv(handle, prop_id)) != Z_OK)
4504 			zone_perror(zone, err, B_TRUE);
4505 		else
4506 			need_to_commit = B_TRUE;
4507 		return;
4508 	case RT_BOOTARGS:
4509 		if ((err = zonecfg_set_bootargs(handle, prop_id)) != Z_OK)
4510 			zone_perror(zone, err, B_TRUE);
4511 		else
4512 			need_to_commit = B_TRUE;
4513 		return;
4514 	case RT_SCHED:
4515 		if ((err = zonecfg_set_sched(handle, prop_id)) != Z_OK)
4516 			zone_perror(zone, err, B_TRUE);
4517 		else
4518 			need_to_commit = B_TRUE;
4519 		return;
4520 	case RT_IPTYPE:
4521 		if (strcmp(prop_id, "shared") == 0) {
4522 			iptype = ZS_SHARED;
4523 		} else if (strcmp(prop_id, "exclusive") == 0) {
4524 			iptype = ZS_EXCLUSIVE;
4525 		} else {
4526 			zerr(gettext("%s value must be '%s' or '%s'."),
4527 			    pt_to_str(PT_IPTYPE), "shared", "exclusive");
4528 			saw_error = B_TRUE;
4529 			return;
4530 		}
4531 		if (iptype == ZS_EXCLUSIVE && !allow_exclusive()) {
4532 			saw_error = B_TRUE;
4533 			return;
4534 		}
4535 		if ((err = zonecfg_set_iptype(handle, iptype)) != Z_OK)
4536 			zone_perror(zone, err, B_TRUE);
4537 		else
4538 			need_to_commit = B_TRUE;
4539 		return;
4540 	case RT_MAXLWPS:
4541 		set_aliased_rctl(ALIAS_MAXLWPS, prop_type, prop_id);
4542 		return;
4543 	case RT_MAXPROCS:
4544 		set_aliased_rctl(ALIAS_MAXPROCS, prop_type, prop_id);
4545 		return;
4546 	case RT_MAXSHMMEM:
4547 		set_aliased_rctl(ALIAS_MAXSHMMEM, prop_type, prop_id);
4548 		return;
4549 	case RT_MAXSHMIDS:
4550 		set_aliased_rctl(ALIAS_MAXSHMIDS, prop_type, prop_id);
4551 		return;
4552 	case RT_MAXMSGIDS:
4553 		set_aliased_rctl(ALIAS_MAXMSGIDS, prop_type, prop_id);
4554 		return;
4555 	case RT_MAXSEMIDS:
4556 		set_aliased_rctl(ALIAS_MAXSEMIDS, prop_type, prop_id);
4557 		return;
4558 	case RT_SHARES:
4559 		set_aliased_rctl(ALIAS_SHARES, prop_type, prop_id);
4560 		return;
4561 	case RT_HOSTID:
4562 		if ((err = zonecfg_set_hostid(handle, prop_id)) != Z_OK) {
4563 			if (err == Z_TOO_BIG) {
4564 				zerr(gettext("hostid string is too large: %s"),
4565 				    prop_id);
4566 				saw_error = B_TRUE;
4567 			} else {
4568 				zone_perror(pt_to_str(prop_type), err, B_TRUE);
4569 			}
4570 			return;
4571 		}
4572 		need_to_commit = B_TRUE;
4573 		return;
4574 	case RT_FS_ALLOWED:
4575 		if ((err = zonecfg_set_fs_allowed(handle, prop_id)) != Z_OK)
4576 			zone_perror(zone, err, B_TRUE);
4577 		else
4578 			need_to_commit = B_TRUE;
4579 		return;
4580 	case RT_FS:
4581 		switch (prop_type) {
4582 		case PT_DIR:
4583 			(void) strlcpy(in_progress_fstab.zone_fs_dir, prop_id,
4584 			    sizeof (in_progress_fstab.zone_fs_dir));
4585 			return;
4586 		case PT_SPECIAL:
4587 			(void) strlcpy(in_progress_fstab.zone_fs_special,
4588 			    prop_id,
4589 			    sizeof (in_progress_fstab.zone_fs_special));
4590 			return;
4591 		case PT_RAW:
4592 			(void) strlcpy(in_progress_fstab.zone_fs_raw,
4593 			    prop_id, sizeof (in_progress_fstab.zone_fs_raw));
4594 			return;
4595 		case PT_TYPE:
4596 			if (!valid_fs_type(prop_id)) {
4597 				zerr(gettext("\"%s\" is not a valid %s."),
4598 				    prop_id, pt_to_str(PT_TYPE));
4599 				saw_error = B_TRUE;
4600 				return;
4601 			}
4602 			(void) strlcpy(in_progress_fstab.zone_fs_type, prop_id,
4603 			    sizeof (in_progress_fstab.zone_fs_type));
4604 			return;
4605 		case PT_OPTIONS:
4606 			if (pp->pv_type != PROP_VAL_SIMPLE &&
4607 			    pp->pv_type != PROP_VAL_LIST) {
4608 				zerr(gettext("A %s or %s value was expected "
4609 				    "here."), pvt_to_str(PROP_VAL_SIMPLE),
4610 				    pvt_to_str(PROP_VAL_LIST));
4611 				saw_error = B_TRUE;
4612 				return;
4613 			}
4614 			zonecfg_free_fs_option_list(
4615 			    in_progress_fstab.zone_fs_options);
4616 			in_progress_fstab.zone_fs_options = NULL;
4617 			if (!(pp->pv_type == PROP_VAL_LIST &&
4618 			    pp->pv_list == NULL))
4619 				add_property(cmd);
4620 			return;
4621 		default:
4622 			break;
4623 		}
4624 		zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, B_TRUE);
4625 		long_usage(CMD_SET, B_TRUE);
4626 		usage(B_FALSE, HELP_PROPS);
4627 		return;
4628 	case RT_NET:
4629 		switch (prop_type) {
4630 		case PT_ADDRESS:
4631 		case PT_ALLOWED_ADDRESS:
4632 			if (validate_net_address_syntax(prop_id, B_FALSE)
4633 			    != Z_OK) {
4634 				saw_error = B_TRUE;
4635 				return;
4636 			}
4637 			set_in_progress_nwiftab_address(prop_id, prop_type);
4638 			break;
4639 		case PT_PHYSICAL:
4640 			if (validate_net_physical_syntax(prop_id) != Z_OK) {
4641 				saw_error = B_TRUE;
4642 				return;
4643 			}
4644 			(void) strlcpy(in_progress_nwiftab.zone_nwif_physical,
4645 			    prop_id,
4646 			    sizeof (in_progress_nwiftab.zone_nwif_physical));
4647 			break;
4648 		case PT_DEFROUTER:
4649 			if (validate_net_address_syntax(prop_id, B_TRUE)
4650 			    != Z_OK) {
4651 				saw_error = B_TRUE;
4652 				return;
4653 			}
4654 			(void) strlcpy(in_progress_nwiftab.zone_nwif_defrouter,
4655 			    prop_id,
4656 			    sizeof (in_progress_nwiftab.zone_nwif_defrouter));
4657 			break;
4658 		default:
4659 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
4660 			    B_TRUE);
4661 			long_usage(CMD_SET, B_TRUE);
4662 			usage(B_FALSE, HELP_PROPS);
4663 			return;
4664 		}
4665 		return;
4666 	case RT_DEVICE:
4667 		switch (prop_type) {
4668 		case PT_MATCH:
4669 			(void) strlcpy(in_progress_devtab.zone_dev_match,
4670 			    prop_id,
4671 			    sizeof (in_progress_devtab.zone_dev_match));
4672 			break;
4673 		default:
4674 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
4675 			    B_TRUE);
4676 			long_usage(CMD_SET, B_TRUE);
4677 			usage(B_FALSE, HELP_PROPS);
4678 			return;
4679 		}
4680 		return;
4681 	case RT_RCTL:
4682 		switch (prop_type) {
4683 		case PT_NAME:
4684 			if (!zonecfg_valid_rctlname(prop_id)) {
4685 				zerr(gettext("'%s' is not a valid zone %s "
4686 				    "name."), prop_id, rt_to_str(RT_RCTL));
4687 				return;
4688 			}
4689 			(void) strlcpy(in_progress_rctltab.zone_rctl_name,
4690 			    prop_id,
4691 			    sizeof (in_progress_rctltab.zone_rctl_name));
4692 			break;
4693 		case PT_VALUE:
4694 			if (pp->pv_type != PROP_VAL_COMPLEX &&
4695 			    pp->pv_type != PROP_VAL_LIST) {
4696 				zerr(gettext("A %s or %s value was expected "
4697 				    "here."), pvt_to_str(PROP_VAL_COMPLEX),
4698 				    pvt_to_str(PROP_VAL_LIST));
4699 				saw_error = B_TRUE;
4700 				return;
4701 			}
4702 			zonecfg_free_rctl_value_list(
4703 			    in_progress_rctltab.zone_rctl_valptr);
4704 			in_progress_rctltab.zone_rctl_valptr = NULL;
4705 			if (!(pp->pv_type == PROP_VAL_LIST &&
4706 			    pp->pv_list == NULL))
4707 				add_property(cmd);
4708 			break;
4709 		default:
4710 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
4711 			    B_TRUE);
4712 			long_usage(CMD_SET, B_TRUE);
4713 			usage(B_FALSE, HELP_PROPS);
4714 			return;
4715 		}
4716 		return;
4717 	case RT_ATTR:
4718 		switch (prop_type) {
4719 		case PT_NAME:
4720 			(void) strlcpy(in_progress_attrtab.zone_attr_name,
4721 			    prop_id,
4722 			    sizeof (in_progress_attrtab.zone_attr_name));
4723 			break;
4724 		case PT_TYPE:
4725 			(void) strlcpy(in_progress_attrtab.zone_attr_type,
4726 			    prop_id,
4727 			    sizeof (in_progress_attrtab.zone_attr_type));
4728 			break;
4729 		case PT_VALUE:
4730 			(void) strlcpy(in_progress_attrtab.zone_attr_value,
4731 			    prop_id,
4732 			    sizeof (in_progress_attrtab.zone_attr_value));
4733 			break;
4734 		default:
4735 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
4736 			    B_TRUE);
4737 			long_usage(CMD_SET, B_TRUE);
4738 			usage(B_FALSE, HELP_PROPS);
4739 			return;
4740 		}
4741 		return;
4742 	case RT_DATASET:
4743 		switch (prop_type) {
4744 		case PT_NAME:
4745 			(void) strlcpy(in_progress_dstab.zone_dataset_name,
4746 			    prop_id,
4747 			    sizeof (in_progress_dstab.zone_dataset_name));
4748 			return;
4749 		default:
4750 			break;
4751 		}
4752 		zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, B_TRUE);
4753 		long_usage(CMD_SET, B_TRUE);
4754 		usage(B_FALSE, HELP_PROPS);
4755 		return;
4756 	case RT_DCPU:
4757 		switch (prop_type) {
4758 		char *lowp, *highp;
4759 
4760 		case PT_NCPUS:
4761 			lowp = prop_id;
4762 			if ((highp = strchr(prop_id, '-')) != NULL)
4763 				*highp++ = '\0';
4764 			else
4765 				highp = lowp;
4766 
4767 			/* Make sure the input makes sense. */
4768 			if (!zonecfg_valid_ncpus(lowp, highp)) {
4769 				zerr(gettext("%s property is out of range."),
4770 				    pt_to_str(PT_NCPUS));
4771 				saw_error = B_TRUE;
4772 				return;
4773 			}
4774 
4775 			(void) strlcpy(
4776 			    in_progress_psettab.zone_ncpu_min, lowp,
4777 			    sizeof (in_progress_psettab.zone_ncpu_min));
4778 			(void) strlcpy(
4779 			    in_progress_psettab.zone_ncpu_max, highp,
4780 			    sizeof (in_progress_psettab.zone_ncpu_max));
4781 			return;
4782 		case PT_IMPORTANCE:
4783 			/* Make sure the value makes sense. */
4784 			if (!zonecfg_valid_importance(prop_id)) {
4785 				zerr(gettext("%s property is out of range."),
4786 				    pt_to_str(PT_IMPORTANCE));
4787 				saw_error = B_TRUE;
4788 				return;
4789 			}
4790 
4791 			(void) strlcpy(in_progress_psettab.zone_importance,
4792 			    prop_id,
4793 			    sizeof (in_progress_psettab.zone_importance));
4794 			return;
4795 		default:
4796 			break;
4797 		}
4798 		zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE, B_TRUE);
4799 		long_usage(CMD_SET, B_TRUE);
4800 		usage(B_FALSE, HELP_PROPS);
4801 		return;
4802 	case RT_PCAP:
4803 		if (prop_type != PT_NCPUS) {
4804 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
4805 			    B_TRUE);
4806 			long_usage(CMD_SET, B_TRUE);
4807 			usage(B_FALSE, HELP_PROPS);
4808 			return;
4809 		}
4810 
4811 		/*
4812 		 * We already checked that an rctl alias is allowed in
4813 		 * the add_resource() function.
4814 		 */
4815 
4816 		if ((cap = strtof(prop_id, &unitp)) <= 0 || *unitp != '\0' ||
4817 		    (int)(cap * 100) < 1) {
4818 			zerr(gettext("%s property is out of range."),
4819 			    pt_to_str(PT_NCPUS));
4820 			saw_error = B_TRUE;
4821 			return;
4822 		}
4823 
4824 		if ((err = zonecfg_set_aliased_rctl(handle, ALIAS_CPUCAP,
4825 		    (int)(cap * 100))) != Z_OK)
4826 			zone_perror(zone, err, B_TRUE);
4827 		else
4828 			need_to_commit = B_TRUE;
4829 		return;
4830 	case RT_MCAP:
4831 		switch (prop_type) {
4832 		case PT_PHYSICAL:
4833 			if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) {
4834 				zerr(gettext("A positive number with a "
4835 				    "required scale suffix (K, M, G or T) was "
4836 				    "expected here."));
4837 				saw_error = B_TRUE;
4838 			} else if (mem_cap < ONE_MB) {
4839 				zerr(gettext("%s value is too small.  It must "
4840 				    "be at least 1M."), pt_to_str(PT_PHYSICAL));
4841 				saw_error = B_TRUE;
4842 			} else {
4843 				snprintf(in_progress_mcaptab.zone_physmem_cap,
4844 				    physmem_size, "%llu", mem_cap);
4845 			}
4846 			break;
4847 		case PT_SWAP:
4848 			/*
4849 			 * We have to check if an rctl is allowed here since
4850 			 * there might already be a rctl defined that blocks
4851 			 * the alias.
4852 			 */
4853 			if (!zonecfg_aliased_rctl_ok(handle, ALIAS_MAXSWAP)) {
4854 				zone_perror(pt_to_str(PT_MAXSWAP),
4855 				    Z_ALIAS_DISALLOW, B_FALSE);
4856 				saw_error = B_TRUE;
4857 				return;
4858 			}
4859 
4860 			if (global_zone)
4861 				mem_limit = ONE_MB * 100;
4862 			else
4863 				mem_limit = ONE_MB * 50;
4864 
4865 			if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) {
4866 				zerr(gettext("A positive number with a "
4867 				    "required scale suffix (K, M, G or T) was "
4868 				    "expected here."));
4869 				saw_error = B_TRUE;
4870 			} else if (mem_cap < mem_limit) {
4871 				char buf[128];
4872 
4873 				(void) snprintf(buf, sizeof (buf), "%llu",
4874 				    mem_limit);
4875 				bytes_to_units(buf, buf, sizeof (buf));
4876 				zerr(gettext("%s value is too small.  It must "
4877 				    "be at least %s."), pt_to_str(PT_SWAP),
4878 				    buf);
4879 				saw_error = B_TRUE;
4880 			} else {
4881 				if ((err = zonecfg_set_aliased_rctl(handle,
4882 				    ALIAS_MAXSWAP, mem_cap)) != Z_OK)
4883 					zone_perror(zone, err, B_TRUE);
4884 				else
4885 					need_to_commit = B_TRUE;
4886 			}
4887 			break;
4888 		case PT_LOCKED:
4889 			/*
4890 			 * We have to check if an rctl is allowed here since
4891 			 * there might already be a rctl defined that blocks
4892 			 * the alias.
4893 			 */
4894 			if (!zonecfg_aliased_rctl_ok(handle,
4895 			    ALIAS_MAXLOCKEDMEM)) {
4896 				zone_perror(pt_to_str(PT_LOCKED),
4897 				    Z_ALIAS_DISALLOW, B_FALSE);
4898 				saw_error = B_TRUE;
4899 				return;
4900 			}
4901 
4902 			if (!zonecfg_valid_memlimit(prop_id, &mem_cap)) {
4903 				zerr(gettext("A non-negative number with a "
4904 				    "required scale suffix (K, M, G or T) was "
4905 				    "expected\nhere."));
4906 				saw_error = B_TRUE;
4907 			} else {
4908 				if ((err = zonecfg_set_aliased_rctl(handle,
4909 				    ALIAS_MAXLOCKEDMEM, mem_cap)) != Z_OK)
4910 					zone_perror(zone, err, B_TRUE);
4911 				else
4912 					need_to_commit = B_TRUE;
4913 			}
4914 			break;
4915 		default:
4916 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
4917 			    B_TRUE);
4918 			long_usage(CMD_SET, B_TRUE);
4919 			usage(B_FALSE, HELP_PROPS);
4920 			return;
4921 		}
4922 		return;
4923 	case RT_ADMIN:
4924 		switch (prop_type) {
4925 		case PT_USER:
4926 			(void) strlcpy(in_progress_admintab.zone_admin_user,
4927 			    prop_id,
4928 			    sizeof (in_progress_admintab.zone_admin_user));
4929 			return;
4930 		case PT_AUTHS:
4931 			(void) strlcpy(in_progress_admintab.zone_admin_auths,
4932 			    prop_id,
4933 			    sizeof (in_progress_admintab.zone_admin_auths));
4934 			return;
4935 		default:
4936 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
4937 			    B_TRUE);
4938 			long_usage(CMD_SET, B_TRUE);
4939 			usage(B_FALSE, HELP_PROPS);
4940 			return;
4941 		}
4942 	case RT_SECFLAGS: {
4943 		char *propstr;
4944 
4945 		switch (prop_type) {
4946 		case PT_DEFAULT:
4947 			propstr = in_progress_secflagstab.zone_secflags_default;
4948 			break;
4949 		case PT_UPPER:
4950 			propstr = in_progress_secflagstab.zone_secflags_upper;
4951 			break;
4952 		case PT_LOWER:
4953 			propstr = in_progress_secflagstab.zone_secflags_lower;
4954 			break;
4955 		default:
4956 			zone_perror(pt_to_str(prop_type), Z_NO_PROPERTY_TYPE,
4957 			    B_TRUE);
4958 			long_usage(CMD_SET, B_TRUE);
4959 			usage(B_FALSE, HELP_PROPS);
4960 			return;
4961 		}
4962 		(void) strlcpy(propstr, prop_id, ZONECFG_SECFLAGS_MAX);
4963 		return;
4964 	}
4965 	default:
4966 		zone_perror(rt_to_str(res_type), Z_NO_RESOURCE_TYPE, B_TRUE);
4967 		long_usage(CMD_SET, B_TRUE);
4968 		usage(B_FALSE, HELP_RESOURCES);
4969 		return;
4970 	}
4971 }
4972 
4973 static void
4974 output_prop(FILE *fp, int pnum, char *pval, boolean_t print_notspec)
4975 {
4976 	char *qstr;
4977 
4978 	if (*pval != '\0') {
4979 		qstr = quoteit(pval);
4980 		if (pnum == PT_SWAP || pnum == PT_LOCKED)
4981 			(void) fprintf(fp, "\t[%s: %s]\n", pt_to_str(pnum),
4982 			    qstr);
4983 		else
4984 			(void) fprintf(fp, "\t%s: %s\n", pt_to_str(pnum), qstr);
4985 		free(qstr);
4986 	} else if (print_notspec)
4987 		(void) fprintf(fp, gettext("\t%s not specified\n"),
4988 		    pt_to_str(pnum));
4989 }
4990 
4991 static void
4992 info_zonename(zone_dochandle_t handle, FILE *fp)
4993 {
4994 	char zonename[ZONENAME_MAX];
4995 
4996 	if (zonecfg_get_name(handle, zonename, sizeof (zonename)) == Z_OK)
4997 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_ZONENAME),
4998 		    zonename);
4999 	else
5000 		(void) fprintf(fp, gettext("%s not specified\n"),
5001 		    pt_to_str(PT_ZONENAME));
5002 }
5003 
5004 static void
5005 info_zonepath(zone_dochandle_t handle, FILE *fp)
5006 {
5007 	char zonepath[MAXPATHLEN];
5008 
5009 	if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) == Z_OK)
5010 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_ZONEPATH),
5011 		    zonepath);
5012 	else {
5013 		(void) fprintf(fp, gettext("%s not specified\n"),
5014 		    pt_to_str(PT_ZONEPATH));
5015 	}
5016 }
5017 
5018 static void
5019 info_brand(zone_dochandle_t handle, FILE *fp)
5020 {
5021 	char brand[MAXNAMELEN];
5022 
5023 	if (zonecfg_get_brand(handle, brand, sizeof (brand)) == Z_OK)
5024 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_BRAND),
5025 		    brand);
5026 	else
5027 		(void) fprintf(fp, "%s %s\n", pt_to_str(PT_BRAND),
5028 		    gettext("not specified"));
5029 }
5030 
5031 static void
5032 info_autoboot(zone_dochandle_t handle, FILE *fp)
5033 {
5034 	boolean_t autoboot;
5035 	int err;
5036 
5037 	if ((err = zonecfg_get_autoboot(handle, &autoboot)) == Z_OK)
5038 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_AUTOBOOT),
5039 		    autoboot ? "true" : "false");
5040 	else
5041 		zone_perror(zone, err, B_TRUE);
5042 }
5043 
5044 static void
5045 info_pool(zone_dochandle_t handle, FILE *fp)
5046 {
5047 	char pool[MAXNAMELEN];
5048 	int err;
5049 
5050 	if ((err = zonecfg_get_pool(handle, pool, sizeof (pool))) == Z_OK)
5051 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_POOL), pool);
5052 	else
5053 		zone_perror(zone, err, B_TRUE);
5054 }
5055 
5056 static void
5057 info_limitpriv(zone_dochandle_t handle, FILE *fp)
5058 {
5059 	char *limitpriv;
5060 	int err;
5061 
5062 	if ((err = zonecfg_get_limitpriv(handle, &limitpriv)) == Z_OK) {
5063 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_LIMITPRIV),
5064 		    limitpriv);
5065 		free(limitpriv);
5066 	} else {
5067 		zone_perror(zone, err, B_TRUE);
5068 	}
5069 }
5070 
5071 static void
5072 info_bootargs(zone_dochandle_t handle, FILE *fp)
5073 {
5074 	char bootargs[BOOTARGS_MAX];
5075 	int err;
5076 
5077 	if ((err = zonecfg_get_bootargs(handle, bootargs,
5078 	    sizeof (bootargs))) == Z_OK) {
5079 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_BOOTARGS),
5080 		    bootargs);
5081 	} else {
5082 		zone_perror(zone, err, B_TRUE);
5083 	}
5084 }
5085 
5086 static void
5087 info_sched(zone_dochandle_t handle, FILE *fp)
5088 {
5089 	char sched[MAXNAMELEN];
5090 	int err;
5091 
5092 	if ((err = zonecfg_get_sched_class(handle, sched, sizeof (sched)))
5093 	    == Z_OK) {
5094 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_SCHED), sched);
5095 	} else {
5096 		zone_perror(zone, err, B_TRUE);
5097 	}
5098 }
5099 
5100 static void
5101 info_iptype(zone_dochandle_t handle, FILE *fp)
5102 {
5103 	zone_iptype_t iptype;
5104 	int err;
5105 
5106 	if ((err = zonecfg_get_iptype(handle, &iptype)) == Z_OK) {
5107 		switch (iptype) {
5108 		case ZS_SHARED:
5109 			(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_IPTYPE),
5110 			    "shared");
5111 			break;
5112 		case ZS_EXCLUSIVE:
5113 			(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_IPTYPE),
5114 			    "exclusive");
5115 			break;
5116 		}
5117 	} else {
5118 		zone_perror(zone, err, B_TRUE);
5119 	}
5120 }
5121 
5122 static void
5123 info_hostid(zone_dochandle_t handle, FILE *fp)
5124 {
5125 	char hostidp[HW_HOSTID_LEN];
5126 	int err;
5127 
5128 	if ((err = zonecfg_get_hostid(handle, hostidp,
5129 	    sizeof (hostidp))) == Z_OK) {
5130 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_HOSTID), hostidp);
5131 	} else if (err == Z_BAD_PROPERTY) {
5132 		(void) fprintf(fp, "%s: \n", pt_to_str(PT_HOSTID));
5133 	} else {
5134 		zone_perror(zone, err, B_TRUE);
5135 	}
5136 }
5137 
5138 static void
5139 info_fs_allowed(zone_dochandle_t handle, FILE *fp)
5140 {
5141 	char fsallowedp[ZONE_FS_ALLOWED_MAX];
5142 	int err;
5143 
5144 	if ((err = zonecfg_get_fs_allowed(handle, fsallowedp,
5145 	    sizeof (fsallowedp))) == Z_OK) {
5146 		(void) fprintf(fp, "%s: %s\n", pt_to_str(PT_FS_ALLOWED),
5147 		    fsallowedp);
5148 	} else if (err == Z_BAD_PROPERTY) {
5149 		(void) fprintf(fp, "%s: \n", pt_to_str(PT_FS_ALLOWED));
5150 	} else {
5151 		zone_perror(zone, err, B_TRUE);
5152 	}
5153 }
5154 
5155 static void
5156 output_fs(FILE *fp, struct zone_fstab *fstab)
5157 {
5158 	zone_fsopt_t *this;
5159 
5160 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_FS));
5161 	output_prop(fp, PT_DIR, fstab->zone_fs_dir, B_TRUE);
5162 	output_prop(fp, PT_SPECIAL, fstab->zone_fs_special, B_TRUE);
5163 	output_prop(fp, PT_RAW, fstab->zone_fs_raw, B_TRUE);
5164 	output_prop(fp, PT_TYPE, fstab->zone_fs_type, B_TRUE);
5165 	(void) fprintf(fp, "\t%s: [", pt_to_str(PT_OPTIONS));
5166 	for (this = fstab->zone_fs_options; this != NULL;
5167 	    this = this->zone_fsopt_next) {
5168 		if (strchr(this->zone_fsopt_opt, '='))
5169 			(void) fprintf(fp, "\"%s\"", this->zone_fsopt_opt);
5170 		else
5171 			(void) fprintf(fp, "%s", this->zone_fsopt_opt);
5172 		if (this->zone_fsopt_next != NULL)
5173 			(void) fprintf(fp, ",");
5174 	}
5175 	(void) fprintf(fp, "]\n");
5176 }
5177 
5178 static void
5179 info_fs(zone_dochandle_t handle, FILE *fp, cmd_t *cmd)
5180 {
5181 	struct zone_fstab lookup, user;
5182 	boolean_t output = B_FALSE;
5183 
5184 	if (zonecfg_setfsent(handle) != Z_OK)
5185 		return;
5186 	while (zonecfg_getfsent(handle, &lookup) == Z_OK) {
5187 		if (cmd->cmd_prop_nv_pairs == 0) {
5188 			output_fs(fp, &lookup);
5189 			goto loopend;
5190 		}
5191 		if (fill_in_fstab(cmd, &user, B_TRUE) != Z_OK)
5192 			goto loopend;
5193 		if (strlen(user.zone_fs_dir) > 0 &&
5194 		    strcmp(user.zone_fs_dir, lookup.zone_fs_dir) != 0)
5195 			goto loopend;	/* no match */
5196 		if (strlen(user.zone_fs_special) > 0 &&
5197 		    strcmp(user.zone_fs_special, lookup.zone_fs_special) != 0)
5198 			goto loopend;	/* no match */
5199 		if (strlen(user.zone_fs_type) > 0 &&
5200 		    strcmp(user.zone_fs_type, lookup.zone_fs_type) != 0)
5201 			goto loopend;	/* no match */
5202 		output_fs(fp, &lookup);
5203 		output = B_TRUE;
5204 loopend:
5205 		zonecfg_free_fs_option_list(lookup.zone_fs_options);
5206 	}
5207 	(void) zonecfg_endfsent(handle);
5208 	/*
5209 	 * If a property n/v pair was specified, warn the user if there was
5210 	 * nothing to output.
5211 	 */
5212 	if (!output && cmd->cmd_prop_nv_pairs > 0)
5213 		(void) printf(gettext("No such %s resource.\n"),
5214 		    rt_to_str(RT_FS));
5215 }
5216 
5217 static void
5218 output_net(FILE *fp, struct zone_nwiftab *nwiftab)
5219 {
5220 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_NET));
5221 	output_prop(fp, PT_ADDRESS, nwiftab->zone_nwif_address, B_TRUE);
5222 	output_prop(fp, PT_ALLOWED_ADDRESS,
5223 	    nwiftab->zone_nwif_allowed_address, B_TRUE);
5224 	output_prop(fp, PT_PHYSICAL, nwiftab->zone_nwif_physical, B_TRUE);
5225 	output_prop(fp, PT_DEFROUTER, nwiftab->zone_nwif_defrouter, B_TRUE);
5226 }
5227 
5228 static void
5229 info_net(zone_dochandle_t handle, FILE *fp, cmd_t *cmd)
5230 {
5231 	struct zone_nwiftab lookup, user;
5232 	boolean_t output = B_FALSE;
5233 
5234 	if (zonecfg_setnwifent(handle) != Z_OK)
5235 		return;
5236 	while (zonecfg_getnwifent(handle, &lookup) == Z_OK) {
5237 		if (cmd->cmd_prop_nv_pairs == 0) {
5238 			output_net(fp, &lookup);
5239 			continue;
5240 		}
5241 		if (fill_in_nwiftab(cmd, &user, B_TRUE) != Z_OK)
5242 			continue;
5243 		if (strlen(user.zone_nwif_physical) > 0 &&
5244 		    strcmp(user.zone_nwif_physical,
5245 		    lookup.zone_nwif_physical) != 0)
5246 			continue;	/* no match */
5247 		/* If present make sure it matches */
5248 		if (strlen(user.zone_nwif_address) > 0 &&
5249 		    !zonecfg_same_net_address(user.zone_nwif_address,
5250 		    lookup.zone_nwif_address))
5251 			continue;	/* no match */
5252 		output_net(fp, &lookup);
5253 		output = B_TRUE;
5254 	}
5255 	(void) zonecfg_endnwifent(handle);
5256 	/*
5257 	 * If a property n/v pair was specified, warn the user if there was
5258 	 * nothing to output.
5259 	 */
5260 	if (!output && cmd->cmd_prop_nv_pairs > 0)
5261 		(void) printf(gettext("No such %s resource.\n"),
5262 		    rt_to_str(RT_NET));
5263 }
5264 
5265 static void
5266 output_dev(FILE *fp, struct zone_devtab *devtab)
5267 {
5268 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_DEVICE));
5269 	output_prop(fp, PT_MATCH, devtab->zone_dev_match, B_TRUE);
5270 }
5271 
5272 static void
5273 info_dev(zone_dochandle_t handle, FILE *fp, cmd_t *cmd)
5274 {
5275 	struct zone_devtab lookup, user;
5276 	boolean_t output = B_FALSE;
5277 
5278 	if (zonecfg_setdevent(handle) != Z_OK)
5279 		return;
5280 	while (zonecfg_getdevent(handle, &lookup) == Z_OK) {
5281 		if (cmd->cmd_prop_nv_pairs == 0) {
5282 			output_dev(fp, &lookup);
5283 			continue;
5284 		}
5285 		if (fill_in_devtab(cmd, &user, B_TRUE) != Z_OK)
5286 			continue;
5287 		if (strlen(user.zone_dev_match) > 0 &&
5288 		    strcmp(user.zone_dev_match, lookup.zone_dev_match) != 0)
5289 			continue;	/* no match */
5290 		output_dev(fp, &lookup);
5291 		output = B_TRUE;
5292 	}
5293 	(void) zonecfg_enddevent(handle);
5294 	/*
5295 	 * If a property n/v pair was specified, warn the user if there was
5296 	 * nothing to output.
5297 	 */
5298 	if (!output && cmd->cmd_prop_nv_pairs > 0)
5299 		(void) printf(gettext("No such %s resource.\n"),
5300 		    rt_to_str(RT_DEVICE));
5301 }
5302 
5303 static void
5304 output_rctl(FILE *fp, struct zone_rctltab *rctltab)
5305 {
5306 	struct zone_rctlvaltab *valptr;
5307 
5308 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_RCTL));
5309 	output_prop(fp, PT_NAME, rctltab->zone_rctl_name, B_TRUE);
5310 	for (valptr = rctltab->zone_rctl_valptr; valptr != NULL;
5311 	    valptr = valptr->zone_rctlval_next) {
5312 		fprintf(fp, "\t%s: (%s=%s,%s=%s,%s=%s)\n",
5313 		    pt_to_str(PT_VALUE),
5314 		    pt_to_str(PT_PRIV), valptr->zone_rctlval_priv,
5315 		    pt_to_str(PT_LIMIT), valptr->zone_rctlval_limit,
5316 		    pt_to_str(PT_ACTION), valptr->zone_rctlval_action);
5317 	}
5318 }
5319 
5320 static void
5321 info_rctl(zone_dochandle_t handle, FILE *fp, cmd_t *cmd)
5322 {
5323 	struct zone_rctltab lookup, user;
5324 	boolean_t output = B_FALSE;
5325 
5326 	if (zonecfg_setrctlent(handle) != Z_OK)
5327 		return;
5328 	while (zonecfg_getrctlent(handle, &lookup) == Z_OK) {
5329 		if (cmd->cmd_prop_nv_pairs == 0) {
5330 			output_rctl(fp, &lookup);
5331 		} else if (fill_in_rctltab(cmd, &user, B_TRUE) == Z_OK &&
5332 		    (strlen(user.zone_rctl_name) == 0 ||
5333 		    strcmp(user.zone_rctl_name, lookup.zone_rctl_name) == 0)) {
5334 			output_rctl(fp, &lookup);
5335 			output = B_TRUE;
5336 		}
5337 		zonecfg_free_rctl_value_list(lookup.zone_rctl_valptr);
5338 	}
5339 	(void) zonecfg_endrctlent(handle);
5340 	/*
5341 	 * If a property n/v pair was specified, warn the user if there was
5342 	 * nothing to output.
5343 	 */
5344 	if (!output && cmd->cmd_prop_nv_pairs > 0)
5345 		(void) printf(gettext("No such %s resource.\n"),
5346 		    rt_to_str(RT_RCTL));
5347 }
5348 
5349 static void
5350 output_attr(FILE *fp, struct zone_attrtab *attrtab)
5351 {
5352 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_ATTR));
5353 	output_prop(fp, PT_NAME, attrtab->zone_attr_name, B_TRUE);
5354 	output_prop(fp, PT_TYPE, attrtab->zone_attr_type, B_TRUE);
5355 	output_prop(fp, PT_VALUE, attrtab->zone_attr_value, B_TRUE);
5356 }
5357 
5358 static void
5359 info_attr(zone_dochandle_t handle, FILE *fp, cmd_t *cmd)
5360 {
5361 	struct zone_attrtab lookup, user;
5362 	boolean_t output = B_FALSE;
5363 
5364 	if (zonecfg_setattrent(handle) != Z_OK)
5365 		return;
5366 	while (zonecfg_getattrent(handle, &lookup) == Z_OK) {
5367 		if (cmd->cmd_prop_nv_pairs == 0) {
5368 			output_attr(fp, &lookup);
5369 			continue;
5370 		}
5371 		if (fill_in_attrtab(cmd, &user, B_TRUE) != Z_OK)
5372 			continue;
5373 		if (strlen(user.zone_attr_name) > 0 &&
5374 		    strcmp(user.zone_attr_name, lookup.zone_attr_name) != 0)
5375 			continue;	/* no match */
5376 		if (strlen(user.zone_attr_type) > 0 &&
5377 		    strcmp(user.zone_attr_type, lookup.zone_attr_type) != 0)
5378 			continue;	/* no match */
5379 		if (strlen(user.zone_attr_value) > 0 &&
5380 		    strcmp(user.zone_attr_value, lookup.zone_attr_value) != 0)
5381 			continue;	/* no match */
5382 		output_attr(fp, &lookup);
5383 		output = B_TRUE;
5384 	}
5385 	(void) zonecfg_endattrent(handle);
5386 	/*
5387 	 * If a property n/v pair was specified, warn the user if there was
5388 	 * nothing to output.
5389 	 */
5390 	if (!output && cmd->cmd_prop_nv_pairs > 0)
5391 		(void) printf(gettext("No such %s resource.\n"),
5392 		    rt_to_str(RT_ATTR));
5393 }
5394 
5395 static void
5396 output_ds(FILE *fp, struct zone_dstab *dstab)
5397 {
5398 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_DATASET));
5399 	output_prop(fp, PT_NAME, dstab->zone_dataset_name, B_TRUE);
5400 }
5401 
5402 static void
5403 info_ds(zone_dochandle_t handle, FILE *fp, cmd_t *cmd)
5404 {
5405 	struct zone_dstab lookup, user;
5406 	boolean_t output = B_FALSE;
5407 
5408 	if (zonecfg_setdsent(handle) != Z_OK)
5409 		return;
5410 	while (zonecfg_getdsent(handle, &lookup) == Z_OK) {
5411 		if (cmd->cmd_prop_nv_pairs == 0) {
5412 			output_ds(fp, &lookup);
5413 			continue;
5414 		}
5415 		if (fill_in_dstab(cmd, &user, B_TRUE) != Z_OK)
5416 			continue;
5417 		if (strlen(user.zone_dataset_name) > 0 &&
5418 		    strcmp(user.zone_dataset_name,
5419 		    lookup.zone_dataset_name) != 0)
5420 			continue;	/* no match */
5421 		output_ds(fp, &lookup);
5422 		output = B_TRUE;
5423 	}
5424 	(void) zonecfg_enddsent(handle);
5425 	/*
5426 	 * If a property n/v pair was specified, warn the user if there was
5427 	 * nothing to output.
5428 	 */
5429 	if (!output && cmd->cmd_prop_nv_pairs > 0)
5430 		(void) printf(gettext("No such %s resource.\n"),
5431 		    rt_to_str(RT_DATASET));
5432 }
5433 
5434 static void
5435 output_pset(FILE *fp, struct zone_psettab *psettab)
5436 {
5437 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_DCPU));
5438 	if (strcmp(psettab->zone_ncpu_min, psettab->zone_ncpu_max) == 0)
5439 		(void) fprintf(fp, "\t%s: %s\n", pt_to_str(PT_NCPUS),
5440 		    psettab->zone_ncpu_max);
5441 	else
5442 		(void) fprintf(fp, "\t%s: %s-%s\n", pt_to_str(PT_NCPUS),
5443 		    psettab->zone_ncpu_min, psettab->zone_ncpu_max);
5444 	if (psettab->zone_importance[0] != '\0')
5445 		(void) fprintf(fp, "\t%s: %s\n", pt_to_str(PT_IMPORTANCE),
5446 		    psettab->zone_importance);
5447 }
5448 
5449 static void
5450 info_pset(zone_dochandle_t handle, FILE *fp)
5451 {
5452 	struct zone_psettab lookup;
5453 
5454 	if (zonecfg_getpsetent(handle, &lookup) == Z_OK)
5455 		output_pset(fp, &lookup);
5456 }
5457 
5458 static void
5459 output_pcap(FILE *fp)
5460 {
5461 	uint64_t cap;
5462 
5463 	if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &cap) == Z_OK) {
5464 		float scaled = (float)cap / 100;
5465 		(void) fprintf(fp, "%s:\n", rt_to_str(RT_PCAP));
5466 		(void) fprintf(fp, "\t[%s: %.2f]\n", pt_to_str(PT_NCPUS),
5467 		    scaled);
5468 	}
5469 }
5470 
5471 static void
5472 info_pcap(FILE *fp)
5473 {
5474 	output_pcap(fp);
5475 }
5476 
5477 
5478 static void
5479 info_aliased_rctl(zone_dochandle_t handle, FILE *fp, char *alias)
5480 {
5481 	uint64_t limit;
5482 
5483 	if (zonecfg_get_aliased_rctl(handle, alias, &limit) == Z_OK) {
5484 		/* convert memory based properties */
5485 		if (strcmp(alias, ALIAS_MAXSHMMEM) == 0) {
5486 			char buf[128];
5487 
5488 			(void) snprintf(buf, sizeof (buf), "%llu", limit);
5489 			bytes_to_units(buf, buf, sizeof (buf));
5490 			(void) fprintf(fp, "[%s: %s]\n", alias, buf);
5491 			return;
5492 		}
5493 
5494 		(void) fprintf(fp, "[%s: %llu]\n", alias, limit);
5495 	}
5496 }
5497 
5498 static void
5499 bytes_to_units(char *str, char *buf, int bufsize)
5500 {
5501 	unsigned long long num;
5502 	unsigned long long save = 0;
5503 	char *units = "BKMGT";
5504 	char *up = units;
5505 
5506 	num = strtoll(str, NULL, 10);
5507 
5508 	if (num < 1024) {
5509 		(void) snprintf(buf, bufsize, "%llu", num);
5510 		return;
5511 	}
5512 
5513 	while ((num >= 1024) && (*up != 'T')) {
5514 		up++; /* next unit of measurement */
5515 		save = num;
5516 		num = (num + 512) >> 10;
5517 	}
5518 
5519 	/* check if we should output a fraction.  snprintf will round for us */
5520 	if (save % 1024 != 0 && ((save >> 10) < 10))
5521 		(void) snprintf(buf, bufsize, "%2.1f%c", ((float)save / 1024),
5522 		    *up);
5523 	else
5524 		(void) snprintf(buf, bufsize, "%llu%c", num, *up);
5525 }
5526 
5527 static void
5528 output_mcap(FILE *fp, struct zone_mcaptab *mcaptab, int showswap,
5529     uint64_t maxswap, int showlocked, uint64_t maxlocked)
5530 {
5531 	char buf[128];
5532 
5533 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_MCAP));
5534 	if (mcaptab->zone_physmem_cap[0] != '\0') {
5535 		bytes_to_units(mcaptab->zone_physmem_cap, buf, sizeof (buf));
5536 		output_prop(fp, PT_PHYSICAL, buf, B_TRUE);
5537 	}
5538 
5539 	if (showswap == Z_OK) {
5540 		(void) snprintf(buf, sizeof (buf), "%llu", maxswap);
5541 		bytes_to_units(buf, buf, sizeof (buf));
5542 		output_prop(fp, PT_SWAP, buf, B_TRUE);
5543 	}
5544 
5545 	if (showlocked == Z_OK) {
5546 		(void) snprintf(buf, sizeof (buf), "%llu", maxlocked);
5547 		bytes_to_units(buf, buf, sizeof (buf));
5548 		output_prop(fp, PT_LOCKED, buf, B_TRUE);
5549 	}
5550 }
5551 
5552 static void
5553 info_mcap(zone_dochandle_t handle, FILE *fp)
5554 {
5555 	int res1, res2, res3;
5556 	uint64_t swap_limit;
5557 	uint64_t locked_limit;
5558 	struct zone_mcaptab lookup;
5559 
5560 	bzero(&lookup, sizeof (lookup));
5561 	res1 = zonecfg_getmcapent(handle, &lookup);
5562 	res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP, &swap_limit);
5563 	res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM,
5564 	    &locked_limit);
5565 
5566 	if (res1 == Z_OK || res2 == Z_OK || res3 == Z_OK)
5567 		output_mcap(fp, &lookup, res2, swap_limit, res3, locked_limit);
5568 }
5569 
5570 static void
5571 output_auth(FILE *fp, struct zone_admintab *admintab)
5572 {
5573 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_ADMIN));
5574 	output_prop(fp, PT_USER, admintab->zone_admin_user, B_TRUE);
5575 	output_prop(fp, PT_AUTHS, admintab->zone_admin_auths, B_TRUE);
5576 }
5577 
5578 static void
5579 output_secflags(FILE *fp, struct zone_secflagstab *sftab)
5580 {
5581 	(void) fprintf(fp, "%s:\n", rt_to_str(RT_SECFLAGS));
5582 	output_prop(fp, PT_DEFAULT, sftab->zone_secflags_default, B_TRUE);
5583 	output_prop(fp, PT_LOWER, sftab->zone_secflags_lower, B_TRUE);
5584 	output_prop(fp, PT_UPPER, sftab->zone_secflags_upper, B_TRUE);
5585 }
5586 
5587 static void
5588 info_auth(zone_dochandle_t handle, FILE *fp, cmd_t *cmd)
5589 {
5590 	struct zone_admintab lookup, user;
5591 	boolean_t output = B_FALSE;
5592 	int err;
5593 
5594 	if ((err = zonecfg_setadminent(handle)) != Z_OK) {
5595 		zone_perror(zone, err, B_TRUE);
5596 		return;
5597 	}
5598 	while (zonecfg_getadminent(handle, &lookup) == Z_OK) {
5599 		if (cmd->cmd_prop_nv_pairs == 0) {
5600 			output_auth(fp, &lookup);
5601 			continue;
5602 		}
5603 		if (fill_in_admintab(cmd, &user, B_TRUE) != Z_OK)
5604 			continue;
5605 		if (strlen(user.zone_admin_user) > 0 &&
5606 		    strcmp(user.zone_admin_user, lookup.zone_admin_user) != 0)
5607 			continue;	/* no match */
5608 		output_auth(fp, &lookup);
5609 		output = B_TRUE;
5610 	}
5611 	(void) zonecfg_endadminent(handle);
5612 	/*
5613 	 * If a property n/v pair was specified, warn the user if there was
5614 	 * nothing to output.
5615 	 */
5616 	if (!output && cmd->cmd_prop_nv_pairs > 0)
5617 		(void) printf(gettext("No such %s resource.\n"),
5618 		    rt_to_str(RT_ADMIN));
5619 }
5620 
5621 static void
5622 info_secflags(zone_dochandle_t handle, FILE *fp)
5623 {
5624 	struct zone_secflagstab sftab;
5625 
5626 	if (zonecfg_lookup_secflags(handle, &sftab) == Z_OK) {
5627 		output_secflags(fp, &sftab);
5628 	}
5629 }
5630 
5631 void
5632 info_func(cmd_t *cmd)
5633 {
5634 	FILE *fp = stdout;
5635 	boolean_t need_to_close = B_FALSE;
5636 	int type;
5637 	int res1, res2;
5638 	uint64_t swap_limit;
5639 	uint64_t locked_limit;
5640 
5641 	assert(cmd != NULL);
5642 
5643 	if (initialize(B_TRUE) != Z_OK)
5644 		return;
5645 
5646 	/* don't page error output */
5647 	if (interactive_mode) {
5648 		if ((fp = pager_open()) != NULL)
5649 			need_to_close = B_TRUE;
5650 		else
5651 			fp = stdout;
5652 
5653 		setbuf(fp, NULL);
5654 	}
5655 
5656 	if (!global_scope) {
5657 		switch (resource_scope) {
5658 		case RT_FS:
5659 			output_fs(fp, &in_progress_fstab);
5660 			break;
5661 		case RT_NET:
5662 			output_net(fp, &in_progress_nwiftab);
5663 			break;
5664 		case RT_DEVICE:
5665 			output_dev(fp, &in_progress_devtab);
5666 			break;
5667 		case RT_RCTL:
5668 			output_rctl(fp, &in_progress_rctltab);
5669 			break;
5670 		case RT_ATTR:
5671 			output_attr(fp, &in_progress_attrtab);
5672 			break;
5673 		case RT_DATASET:
5674 			output_ds(fp, &in_progress_dstab);
5675 			break;
5676 		case RT_DCPU:
5677 			output_pset(fp, &in_progress_psettab);
5678 			break;
5679 		case RT_PCAP:
5680 			output_pcap(fp);
5681 			break;
5682 		case RT_MCAP:
5683 			res1 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP,
5684 			    &swap_limit);
5685 			res2 = zonecfg_get_aliased_rctl(handle,
5686 			    ALIAS_MAXLOCKEDMEM, &locked_limit);
5687 			output_mcap(fp, &in_progress_mcaptab, res1, swap_limit,
5688 			    res2, locked_limit);
5689 			break;
5690 		case RT_ADMIN:
5691 			output_auth(fp, &in_progress_admintab);
5692 			break;
5693 		case RT_SECFLAGS:
5694 			output_secflags(fp, &in_progress_secflagstab);
5695 			break;
5696 		}
5697 		goto cleanup;
5698 	}
5699 
5700 	type = cmd->cmd_res_type;
5701 
5702 	if (gz_invalid_rt_property(type)) {
5703 		zerr(gettext("%s is not a valid property for the global zone."),
5704 		    rt_to_str(type));
5705 		goto cleanup;
5706 	}
5707 
5708 	if (gz_invalid_resource(type)) {
5709 		zerr(gettext("%s is not a valid resource for the global zone."),
5710 		    rt_to_str(type));
5711 		goto cleanup;
5712 	}
5713 
5714 	switch (cmd->cmd_res_type) {
5715 	case RT_UNKNOWN:
5716 		info_zonename(handle, fp);
5717 		if (!global_zone) {
5718 			info_zonepath(handle, fp);
5719 			info_brand(handle, fp);
5720 			info_autoboot(handle, fp);
5721 			info_bootargs(handle, fp);
5722 		}
5723 		info_pool(handle, fp);
5724 		if (!global_zone) {
5725 			info_limitpriv(handle, fp);
5726 			info_sched(handle, fp);
5727 			info_iptype(handle, fp);
5728 			info_hostid(handle, fp);
5729 			info_fs_allowed(handle, fp);
5730 		}
5731 		info_aliased_rctl(handle, fp, ALIAS_MAXLWPS);
5732 		info_aliased_rctl(handle, fp, ALIAS_MAXPROCS);
5733 		info_aliased_rctl(handle, fp, ALIAS_MAXSHMMEM);
5734 		info_aliased_rctl(handle, fp, ALIAS_MAXSHMIDS);
5735 		info_aliased_rctl(handle, fp, ALIAS_MAXMSGIDS);
5736 		info_aliased_rctl(handle, fp, ALIAS_MAXSEMIDS);
5737 		info_aliased_rctl(handle, fp, ALIAS_SHARES);
5738 		if (!global_zone) {
5739 			info_fs(handle, fp, cmd);
5740 			info_net(handle, fp, cmd);
5741 			info_dev(handle, fp, cmd);
5742 		}
5743 		info_pset(handle, fp);
5744 		info_pcap(fp);
5745 		info_mcap(handle, fp);
5746 		if (!global_zone) {
5747 			info_attr(handle, fp, cmd);
5748 			info_ds(handle, fp, cmd);
5749 			info_auth(handle, fp, cmd);
5750 		}
5751 		info_rctl(handle, fp, cmd);
5752 		info_secflags(handle, fp);
5753 		break;
5754 	case RT_ZONENAME:
5755 		info_zonename(handle, fp);
5756 		break;
5757 	case RT_ZONEPATH:
5758 		info_zonepath(handle, fp);
5759 		break;
5760 	case RT_BRAND:
5761 		info_brand(handle, fp);
5762 		break;
5763 	case RT_AUTOBOOT:
5764 		info_autoboot(handle, fp);
5765 		break;
5766 	case RT_POOL:
5767 		info_pool(handle, fp);
5768 		break;
5769 	case RT_LIMITPRIV:
5770 		info_limitpriv(handle, fp);
5771 		break;
5772 	case RT_BOOTARGS:
5773 		info_bootargs(handle, fp);
5774 		break;
5775 	case RT_SCHED:
5776 		info_sched(handle, fp);
5777 		break;
5778 	case RT_IPTYPE:
5779 		info_iptype(handle, fp);
5780 		break;
5781 	case RT_MAXLWPS:
5782 		info_aliased_rctl(handle, fp, ALIAS_MAXLWPS);
5783 		break;
5784 	case RT_MAXPROCS:
5785 		info_aliased_rctl(handle, fp, ALIAS_MAXPROCS);
5786 		break;
5787 	case RT_MAXSHMMEM:
5788 		info_aliased_rctl(handle, fp, ALIAS_MAXSHMMEM);
5789 		break;
5790 	case RT_MAXSHMIDS:
5791 		info_aliased_rctl(handle, fp, ALIAS_MAXSHMIDS);
5792 		break;
5793 	case RT_MAXMSGIDS:
5794 		info_aliased_rctl(handle, fp, ALIAS_MAXMSGIDS);
5795 		break;
5796 	case RT_MAXSEMIDS:
5797 		info_aliased_rctl(handle, fp, ALIAS_MAXSEMIDS);
5798 		break;
5799 	case RT_SHARES:
5800 		info_aliased_rctl(handle, fp, ALIAS_SHARES);
5801 		break;
5802 	case RT_FS:
5803 		info_fs(handle, fp, cmd);
5804 		break;
5805 	case RT_NET:
5806 		info_net(handle, fp, cmd);
5807 		break;
5808 	case RT_DEVICE:
5809 		info_dev(handle, fp, cmd);
5810 		break;
5811 	case RT_RCTL:
5812 		info_rctl(handle, fp, cmd);
5813 		break;
5814 	case RT_ATTR:
5815 		info_attr(handle, fp, cmd);
5816 		break;
5817 	case RT_DATASET:
5818 		info_ds(handle, fp, cmd);
5819 		break;
5820 	case RT_DCPU:
5821 		info_pset(handle, fp);
5822 		break;
5823 	case RT_PCAP:
5824 		info_pcap(fp);
5825 		break;
5826 	case RT_MCAP:
5827 		info_mcap(handle, fp);
5828 		break;
5829 	case RT_HOSTID:
5830 		info_hostid(handle, fp);
5831 		break;
5832 	case RT_ADMIN:
5833 		info_auth(handle, fp, cmd);
5834 		break;
5835 	case RT_FS_ALLOWED:
5836 		info_fs_allowed(handle, fp);
5837 		break;
5838 	case RT_SECFLAGS:
5839 		info_secflags(handle, fp);
5840 		break;
5841 	default:
5842 		zone_perror(rt_to_str(cmd->cmd_res_type), Z_NO_RESOURCE_TYPE,
5843 		    B_TRUE);
5844 	}
5845 
5846 cleanup:
5847 	if (need_to_close)
5848 		(void) pager_close(fp);
5849 }
5850 
5851 /*
5852  * Helper function for verify-- checks that a required string property
5853  * exists.
5854  */
5855 static void
5856 check_reqd_prop(char *attr, int rt, int pt, int *ret_val)
5857 {
5858 	if (strlen(attr) == 0) {
5859 		zerr(gettext("%s: %s not specified"), rt_to_str(rt),
5860 		    pt_to_str(pt));
5861 		saw_error = B_TRUE;
5862 		if (*ret_val == Z_OK)
5863 			*ret_val = Z_REQD_PROPERTY_MISSING;
5864 	}
5865 }
5866 
5867 static int
5868 do_subproc(char *cmdbuf)
5869 {
5870 	char inbuf[MAX_CMD_LEN];
5871 	FILE *file;
5872 	int status;
5873 
5874 	file = popen(cmdbuf, "r");
5875 	if (file == NULL) {
5876 		zerr(gettext("Could not launch: %s"), cmdbuf);
5877 		return (-1);
5878 	}
5879 
5880 	while (fgets(inbuf, sizeof (inbuf), file) != NULL)
5881 		fprintf(stderr, "%s", inbuf);
5882 	status = pclose(file);
5883 
5884 	if (WIFSIGNALED(status)) {
5885 		zerr(gettext("%s unexpectedly terminated due to signal %d"),
5886 		    cmdbuf, WTERMSIG(status));
5887 		return (-1);
5888 	}
5889 	assert(WIFEXITED(status));
5890 	return (WEXITSTATUS(status));
5891 }
5892 
5893 static int
5894 brand_verify(zone_dochandle_t handle)
5895 {
5896 	char xml_file[32];
5897 	char cmdbuf[MAX_CMD_LEN];
5898 	brand_handle_t bh;
5899 	char brand[MAXNAMELEN];
5900 	int err;
5901 
5902 	if (zonecfg_get_brand(handle, brand, sizeof (brand)) != Z_OK) {
5903 		zerr("%s: %s\n", zone, gettext("could not get zone brand"));
5904 		return (Z_INVALID_DOCUMENT);
5905 	}
5906 	if ((bh = brand_open(brand)) == NULL) {
5907 		zerr("%s: %s\n", zone, gettext("unknown brand."));
5908 		return (Z_INVALID_DOCUMENT);
5909 	}
5910 
5911 	/*
5912 	 * Fetch the verify command, if any, from the brand configuration
5913 	 * and build the command line to execute it.
5914 	 */
5915 	strcpy(cmdbuf, EXEC_PREFIX);
5916 	err = brand_get_verify_cfg(bh, cmdbuf + EXEC_LEN,
5917 	    sizeof (cmdbuf) - (EXEC_LEN + (strlen(xml_file) + 1)));
5918 	brand_close(bh);
5919 	if (err != Z_OK) {
5920 		zerr("%s: %s\n", zone,
5921 		    gettext("could not get brand verification command"));
5922 		return (Z_INVALID_DOCUMENT);
5923 	}
5924 
5925 	/*
5926 	 * If the brand doesn't provide a verification routine, we just
5927 	 * return success.
5928 	 */
5929 	if (strlen(cmdbuf) == EXEC_LEN)
5930 		return (Z_OK);
5931 
5932 	/*
5933 	 * Dump the current config information for this zone to a file.
5934 	 */
5935 	strcpy(xml_file, "/tmp/zonecfg_verify.XXXXXX");
5936 	if (mkstemp(xml_file) == NULL)
5937 		return (Z_TEMP_FILE);
5938 	if ((err = zonecfg_verify_save(handle, xml_file)) != Z_OK) {
5939 		(void) unlink(xml_file);
5940 		return (err);
5941 	}
5942 
5943 	/*
5944 	 * Execute the verification command.
5945 	 */
5946 	if ((strlcat(cmdbuf, " ", MAX_CMD_LEN) >= MAX_CMD_LEN) ||
5947 	    (strlcat(cmdbuf, xml_file, MAX_CMD_LEN) >= MAX_CMD_LEN)) {
5948 		err = Z_BRAND_ERROR;
5949 	} else {
5950 		err = do_subproc(cmdbuf);
5951 	}
5952 
5953 	(void) unlink(xml_file);
5954 	return ((err == Z_OK) ? Z_OK : Z_BRAND_ERROR);
5955 }
5956 
5957 /*
5958  * Track the network interfaces listed in zonecfg(1m) in a linked list
5959  * so that we can later check that defrouter is specified for an exclusive IP
5960  * zone if and only if at least one allowed-address has been specified.
5961  */
5962 static boolean_t
5963 add_nwif(struct zone_nwiftab *nwif)
5964 {
5965 	struct xif *tmp;
5966 
5967 	for (tmp = xif; tmp != NULL; tmp = tmp->xif_next) {
5968 		if (strcmp(tmp->xif_name, nwif->zone_nwif_physical) == 0) {
5969 			if (strlen(nwif->zone_nwif_allowed_address) > 0)
5970 				tmp->xif_has_address = B_TRUE;
5971 			if (strlen(nwif->zone_nwif_defrouter) > 0)
5972 				tmp->xif_has_defrouter = B_TRUE;
5973 			return (B_TRUE);
5974 		}
5975 	}
5976 
5977 	tmp = malloc(sizeof (*tmp));
5978 	if (tmp == NULL) {
5979 		zerr(gettext("memory allocation failed for %s"),
5980 		    nwif->zone_nwif_physical);
5981 		return (B_FALSE);
5982 	}
5983 	strlcpy(tmp->xif_name, nwif->zone_nwif_physical,
5984 	    sizeof (tmp->xif_name));
5985 	tmp->xif_has_defrouter = (strlen(nwif->zone_nwif_defrouter) > 0);
5986 	tmp->xif_has_address = (strlen(nwif->zone_nwif_allowed_address) > 0);
5987 	tmp->xif_next = xif;
5988 	xif = tmp;
5989 	return (B_TRUE);
5990 }
5991 
5992 boolean_t
5993 verify_secflags(struct zone_secflagstab *tab)
5994 {
5995 	secflagdelta_t def = {0};
5996 	secflagdelta_t upper = {0};
5997 	secflagdelta_t lower = {0};
5998 	boolean_t def_set = B_FALSE;
5999 	boolean_t upper_set = B_FALSE;
6000 	boolean_t lower_set = B_FALSE;
6001 	boolean_t ret = B_TRUE;
6002 
6003 	if (strlen(tab->zone_secflags_default) > 0) {
6004 		def_set = B_TRUE;
6005 		if (secflags_parse(NULL, tab->zone_secflags_default,
6006 		    &def) == -1) {
6007 			zerr(gettext("default security flags '%s' are invalid"),
6008 			    tab->zone_secflags_default);
6009 			ret = B_FALSE;
6010 		}
6011 	} else {
6012 		secflags_zero(&def.psd_assign);
6013 		def.psd_ass_active = B_TRUE;
6014 	}
6015 
6016 	if (strlen(tab->zone_secflags_upper) > 0) {
6017 		upper_set = B_TRUE;
6018 		if (secflags_parse(NULL, tab->zone_secflags_upper,
6019 		    &upper) == -1) {
6020 			zerr(gettext("upper security flags '%s' are invalid"),
6021 			    tab->zone_secflags_upper);
6022 			ret = B_FALSE;
6023 		}
6024 	} else {
6025 		secflags_fullset(&upper.psd_assign);
6026 		upper.psd_ass_active = B_TRUE;
6027 	}
6028 
6029 	if (strlen(tab->zone_secflags_lower) > 0) {
6030 		lower_set = B_TRUE;
6031 		if (secflags_parse(NULL, tab->zone_secflags_lower,
6032 		    &lower) == -1) {
6033 			zerr(gettext("lower security flags '%s' are invalid"),
6034 			    tab->zone_secflags_lower);
6035 			ret = B_FALSE;
6036 		}
6037 	} else {
6038 		secflags_zero(&lower.psd_assign);
6039 		lower.psd_ass_active = B_TRUE;
6040 	}
6041 
6042 	if (def_set && !def.psd_ass_active) {
6043 		zerr(gettext("only assignment of security flags is "
6044 		    "allowed (default: %s)"), tab->zone_secflags_default);
6045 	}
6046 
6047 	if (lower_set && !lower.psd_ass_active) {
6048 		zerr(gettext("only assignment of security flags is "
6049 		    "allowed (lower: %s)"), tab->zone_secflags_lower);
6050 	}
6051 
6052 	if (upper_set && !upper.psd_ass_active) {
6053 		zerr(gettext("only assignment of security flags is "
6054 		    "allowed (upper: %s)"), tab->zone_secflags_upper);
6055 	}
6056 
6057 	if (def.psd_assign & ~upper.psd_assign)	{ /* In default but not upper */
6058 		zerr(gettext("default secflags must be within the "
6059 		    "upper limit"));
6060 		ret = B_FALSE;
6061 	}
6062 	if (lower.psd_assign & ~def.psd_assign) { /* In lower but not default */
6063 		zerr(gettext("default secflags must be above the lower limit"));
6064 		ret = B_FALSE;
6065 	}
6066 	if (lower.psd_assign & ~upper.psd_assign) { /* In lower but not upper */
6067 		zerr(gettext("lower secflags must be within the upper limit"));
6068 		ret = B_FALSE;
6069 	}
6070 
6071 	return (ret);
6072 }
6073 
6074 /*
6075  * See the DTD for which attributes are required for which resources.
6076  *
6077  * This function can be called by commit_func(), which needs to save things,
6078  * in addition to the general call from parse_and_run(), which doesn't need
6079  * things saved.  Since the parameters are standardized, we distinguish by
6080  * having commit_func() call here with cmd->cmd_arg set to "save" to indicate
6081  * that a save is needed.
6082  */
6083 void
6084 verify_func(cmd_t *cmd)
6085 {
6086 	struct zone_nwiftab nwiftab;
6087 	struct zone_fstab fstab;
6088 	struct zone_attrtab attrtab;
6089 	struct zone_rctltab rctltab;
6090 	struct zone_dstab dstab;
6091 	struct zone_psettab psettab;
6092 	struct zone_admintab admintab;
6093 	struct zone_secflagstab secflagstab;
6094 	char zonepath[MAXPATHLEN];
6095 	char sched[MAXNAMELEN];
6096 	char brand[MAXNAMELEN];
6097 	char hostidp[HW_HOSTID_LEN];
6098 	char fsallowedp[ZONE_FS_ALLOWED_MAX];
6099 	priv_set_t *privs;
6100 	char *privname = NULL;
6101 	int err, ret_val = Z_OK, arg;
6102 	int pset_res;
6103 	boolean_t save = B_FALSE;
6104 	boolean_t arg_err = B_FALSE;
6105 	zone_iptype_t iptype;
6106 	boolean_t has_cpu_shares = B_FALSE;
6107 	boolean_t has_cpu_cap = B_FALSE;
6108 	struct xif *tmp;
6109 
6110 	optind = 0;
6111 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) {
6112 		switch (arg) {
6113 		case '?':
6114 			longer_usage(CMD_VERIFY);
6115 			arg_err = B_TRUE;
6116 			break;
6117 		default:
6118 			short_usage(CMD_VERIFY);
6119 			arg_err = B_TRUE;
6120 			break;
6121 		}
6122 	}
6123 	if (arg_err)
6124 		return;
6125 
6126 	if (optind > cmd->cmd_argc) {
6127 		short_usage(CMD_VERIFY);
6128 		return;
6129 	}
6130 
6131 	if (zone_is_read_only(CMD_VERIFY))
6132 		return;
6133 
6134 	assert(cmd != NULL);
6135 
6136 	if (cmd->cmd_argc > 0 && (strcmp(cmd->cmd_argv[0], "save") == 0))
6137 		save = B_TRUE;
6138 	if (initialize(B_TRUE) != Z_OK)
6139 		return;
6140 
6141 	if (zonecfg_get_zonepath(handle, zonepath, sizeof (zonepath)) != Z_OK &&
6142 	    !global_zone) {
6143 		zerr(gettext("%s not specified"), pt_to_str(PT_ZONEPATH));
6144 		ret_val = Z_REQD_RESOURCE_MISSING;
6145 		saw_error = B_TRUE;
6146 	}
6147 	if (strlen(zonepath) == 0 && !global_zone) {
6148 		zerr(gettext("%s cannot be empty."), pt_to_str(PT_ZONEPATH));
6149 		ret_val = Z_REQD_RESOURCE_MISSING;
6150 		saw_error = B_TRUE;
6151 	}
6152 
6153 	if ((err = zonecfg_get_brand(handle, brand, sizeof (brand))) != Z_OK) {
6154 		zone_perror(zone, err, B_TRUE);
6155 		return;
6156 	}
6157 	if ((err = brand_verify(handle)) != Z_OK) {
6158 		zone_perror(zone, err, B_TRUE);
6159 		return;
6160 	}
6161 
6162 	if (zonecfg_get_iptype(handle, &iptype) != Z_OK) {
6163 		zerr("%s %s", gettext("cannot get"), pt_to_str(PT_IPTYPE));
6164 		ret_val = Z_REQD_RESOURCE_MISSING;
6165 		saw_error = B_TRUE;
6166 	}
6167 
6168 	if ((privs = priv_allocset()) == NULL) {
6169 		zerr(gettext("%s: priv_allocset failed"), zone);
6170 		return;
6171 	}
6172 	if (zonecfg_get_privset(handle, privs, &privname) != Z_OK) {
6173 		zerr(gettext("%s: invalid privilege: %s"), zone, privname);
6174 		priv_freeset(privs);
6175 		free(privname);
6176 		return;
6177 	}
6178 	priv_freeset(privs);
6179 
6180 	if (zonecfg_get_hostid(handle, hostidp,
6181 	    sizeof (hostidp)) == Z_INVALID_PROPERTY) {
6182 		zerr(gettext("%s: invalid hostid: %s"),
6183 		    zone, hostidp);
6184 		return;
6185 	}
6186 
6187 	if (zonecfg_get_fs_allowed(handle, fsallowedp,
6188 	    sizeof (fsallowedp)) == Z_INVALID_PROPERTY) {
6189 		zerr(gettext("%s: invalid fs-allowed: %s"),
6190 		    zone, fsallowedp);
6191 		return;
6192 	}
6193 
6194 	if ((err = zonecfg_setfsent(handle)) != Z_OK) {
6195 		zone_perror(zone, err, B_TRUE);
6196 		return;
6197 	}
6198 	while (zonecfg_getfsent(handle, &fstab) == Z_OK) {
6199 		check_reqd_prop(fstab.zone_fs_dir, RT_FS, PT_DIR, &ret_val);
6200 		check_reqd_prop(fstab.zone_fs_special, RT_FS, PT_SPECIAL,
6201 		    &ret_val);
6202 		check_reqd_prop(fstab.zone_fs_type, RT_FS, PT_TYPE, &ret_val);
6203 
6204 		zonecfg_free_fs_option_list(fstab.zone_fs_options);
6205 	}
6206 	(void) zonecfg_endfsent(handle);
6207 
6208 	if ((err = zonecfg_setnwifent(handle)) != Z_OK) {
6209 		zone_perror(zone, err, B_TRUE);
6210 		return;
6211 	}
6212 	while (zonecfg_getnwifent(handle, &nwiftab) == Z_OK) {
6213 		/*
6214 		 * physical is required in all cases.
6215 		 * A shared IP requires an address,
6216 		 * and may include a default router, while
6217 		 * an exclusive IP must have neither an address
6218 		 * nor a default router.
6219 		 * The physical interface name must be valid in all cases.
6220 		 */
6221 		check_reqd_prop(nwiftab.zone_nwif_physical, RT_NET,
6222 		    PT_PHYSICAL, &ret_val);
6223 		if (validate_net_physical_syntax(nwiftab.zone_nwif_physical) !=
6224 		    Z_OK) {
6225 			saw_error = B_TRUE;
6226 			if (ret_val == Z_OK)
6227 				ret_val = Z_INVAL;
6228 		}
6229 
6230 		switch (iptype) {
6231 		case ZS_SHARED:
6232 			check_reqd_prop(nwiftab.zone_nwif_address, RT_NET,
6233 			    PT_ADDRESS, &ret_val);
6234 			if (strlen(nwiftab.zone_nwif_allowed_address) > 0) {
6235 				zerr(gettext("%s: %s cannot be specified "
6236 				    "for a shared IP type"),
6237 				    rt_to_str(RT_NET),
6238 				    pt_to_str(PT_ALLOWED_ADDRESS));
6239 				saw_error = B_TRUE;
6240 				if (ret_val == Z_OK)
6241 					ret_val = Z_INVAL;
6242 			}
6243 			break;
6244 		case ZS_EXCLUSIVE:
6245 			if (strlen(nwiftab.zone_nwif_address) > 0) {
6246 				zerr(gettext("%s: %s cannot be specified "
6247 				    "for an exclusive IP type"),
6248 				    rt_to_str(RT_NET), pt_to_str(PT_ADDRESS));
6249 				saw_error = B_TRUE;
6250 				if (ret_val == Z_OK)
6251 					ret_val = Z_INVAL;
6252 			} else {
6253 				if (!add_nwif(&nwiftab)) {
6254 					saw_error = B_TRUE;
6255 					if (ret_val == Z_OK)
6256 						ret_val = Z_INVAL;
6257 				}
6258 			}
6259 			break;
6260 		}
6261 	}
6262 	for (tmp = xif; tmp != NULL; tmp = tmp->xif_next) {
6263 		if (!tmp->xif_has_address && tmp->xif_has_defrouter) {
6264 			zerr(gettext("%s: %s for %s cannot be specified "
6265 			    "without %s for an exclusive IP type"),
6266 			    rt_to_str(RT_NET), pt_to_str(PT_DEFROUTER),
6267 			    tmp->xif_name, pt_to_str(PT_ALLOWED_ADDRESS));
6268 			saw_error = B_TRUE;
6269 			ret_val = Z_INVAL;
6270 		}
6271 	}
6272 	free(xif);
6273 	xif = NULL;
6274 	(void) zonecfg_endnwifent(handle);
6275 
6276 	if ((err = zonecfg_setrctlent(handle)) != Z_OK) {
6277 		zone_perror(zone, err, B_TRUE);
6278 		return;
6279 	}
6280 	while (zonecfg_getrctlent(handle, &rctltab) == Z_OK) {
6281 		check_reqd_prop(rctltab.zone_rctl_name, RT_RCTL, PT_NAME,
6282 		    &ret_val);
6283 
6284 		if (strcmp(rctltab.zone_rctl_name, "zone.cpu-shares") == 0)
6285 			has_cpu_shares = B_TRUE;
6286 
6287 		if (strcmp(rctltab.zone_rctl_name, "zone.cpu-cap") == 0)
6288 			has_cpu_cap = B_TRUE;
6289 
6290 		if (rctltab.zone_rctl_valptr == NULL) {
6291 			zerr(gettext("%s: no %s specified"),
6292 			    rt_to_str(RT_RCTL), pt_to_str(PT_VALUE));
6293 			saw_error = B_TRUE;
6294 			if (ret_val == Z_OK)
6295 				ret_val = Z_REQD_PROPERTY_MISSING;
6296 		} else {
6297 			zonecfg_free_rctl_value_list(rctltab.zone_rctl_valptr);
6298 		}
6299 	}
6300 	(void) zonecfg_endrctlent(handle);
6301 
6302 	if ((pset_res = zonecfg_lookup_pset(handle, &psettab)) == Z_OK &&
6303 	    has_cpu_shares) {
6304 		zerr(gettext("%s zone.cpu-shares and %s are incompatible."),
6305 		    rt_to_str(RT_RCTL), rt_to_str(RT_DCPU));
6306 		saw_error = B_TRUE;
6307 		if (ret_val == Z_OK)
6308 			ret_val = Z_INCOMPATIBLE;
6309 	}
6310 
6311 	if (has_cpu_shares && zonecfg_get_sched_class(handle, sched,
6312 	    sizeof (sched)) == Z_OK && strlen(sched) > 0 &&
6313 	    strcmp(sched, "FSS") != 0) {
6314 		zerr(gettext("WARNING: %s zone.cpu-shares and %s=%s are "
6315 		    "incompatible"),
6316 		    rt_to_str(RT_RCTL), rt_to_str(RT_SCHED), sched);
6317 		saw_error = B_TRUE;
6318 		if (ret_val == Z_OK)
6319 			ret_val = Z_INCOMPATIBLE;
6320 	}
6321 
6322 	if (pset_res == Z_OK && has_cpu_cap) {
6323 		zerr(gettext("%s zone.cpu-cap and the %s are incompatible."),
6324 		    rt_to_str(RT_RCTL), rt_to_str(RT_DCPU));
6325 		saw_error = B_TRUE;
6326 		if (ret_val == Z_OK)
6327 			ret_val = Z_INCOMPATIBLE;
6328 	}
6329 
6330 	if ((err = zonecfg_setattrent(handle)) != Z_OK) {
6331 		zone_perror(zone, err, B_TRUE);
6332 		return;
6333 	}
6334 	while (zonecfg_getattrent(handle, &attrtab) == Z_OK) {
6335 		check_reqd_prop(attrtab.zone_attr_name, RT_ATTR, PT_NAME,
6336 		    &ret_val);
6337 		check_reqd_prop(attrtab.zone_attr_type, RT_ATTR, PT_TYPE,
6338 		    &ret_val);
6339 		check_reqd_prop(attrtab.zone_attr_value, RT_ATTR, PT_VALUE,
6340 		    &ret_val);
6341 	}
6342 	(void) zonecfg_endattrent(handle);
6343 
6344 	if ((err = zonecfg_setdsent(handle)) != Z_OK) {
6345 		zone_perror(zone, err, B_TRUE);
6346 		return;
6347 	}
6348 	while (zonecfg_getdsent(handle, &dstab) == Z_OK) {
6349 		if (strlen(dstab.zone_dataset_name) == 0) {
6350 			zerr("%s: %s %s", rt_to_str(RT_DATASET),
6351 			    pt_to_str(PT_NAME), gettext("not specified"));
6352 			saw_error = B_TRUE;
6353 			if (ret_val == Z_OK)
6354 				ret_val = Z_REQD_PROPERTY_MISSING;
6355 		} else if (!zfs_name_valid(dstab.zone_dataset_name,
6356 		    ZFS_TYPE_FILESYSTEM)) {
6357 			zerr("%s: %s %s", rt_to_str(RT_DATASET),
6358 			    pt_to_str(PT_NAME), gettext("invalid"));
6359 			saw_error = B_TRUE;
6360 			if (ret_val == Z_OK)
6361 				ret_val = Z_BAD_PROPERTY;
6362 		}
6363 
6364 	}
6365 	(void) zonecfg_enddsent(handle);
6366 
6367 	if ((err = zonecfg_setadminent(handle)) != Z_OK) {
6368 		zone_perror(zone, err, B_TRUE);
6369 		return;
6370 	}
6371 	while (zonecfg_getadminent(handle, &admintab) == Z_OK) {
6372 		check_reqd_prop(admintab.zone_admin_user, RT_ADMIN,
6373 		    PT_USER, &ret_val);
6374 		check_reqd_prop(admintab.zone_admin_auths, RT_ADMIN,
6375 		    PT_AUTHS, &ret_val);
6376 		if ((ret_val == Z_OK) && (getpwnam(admintab.zone_admin_user)
6377 		    == NULL)) {
6378 			zerr(gettext("%s %s is not a valid username"),
6379 			    pt_to_str(PT_USER),
6380 			    admintab.zone_admin_user);
6381 			ret_val = Z_BAD_PROPERTY;
6382 		}
6383 		if ((ret_val == Z_OK) && (!zonecfg_valid_auths(
6384 		    admintab.zone_admin_auths, zone))) {
6385 			ret_val = Z_BAD_PROPERTY;
6386 		}
6387 	}
6388 	(void) zonecfg_endadminent(handle);
6389 
6390 	if (zonecfg_getsecflagsent(handle, &secflagstab) == Z_OK) {
6391 		/*
6392 		 * No properties are required, but any specified should be
6393 		 * valid
6394 		 */
6395 		if (verify_secflags(&secflagstab) != B_TRUE) {
6396 			/* Error is reported from verify_secflags */
6397 			ret_val = Z_BAD_PROPERTY;
6398 		}
6399 	}
6400 
6401 	if (!global_scope) {
6402 		zerr(gettext("resource specification incomplete"));
6403 		saw_error = B_TRUE;
6404 		if (ret_val == Z_OK)
6405 			ret_val = Z_INSUFFICIENT_SPEC;
6406 	}
6407 
6408 	if (save) {
6409 		if (ret_val == Z_OK) {
6410 			if ((ret_val = zonecfg_save(handle)) == Z_OK) {
6411 				need_to_commit = B_FALSE;
6412 				(void) strlcpy(revert_zone, zone,
6413 				    sizeof (revert_zone));
6414 			}
6415 		} else {
6416 			zerr(gettext("Zone %s failed to verify"), zone);
6417 		}
6418 	}
6419 	if (ret_val != Z_OK)
6420 		zone_perror(zone, ret_val, B_TRUE);
6421 }
6422 
6423 void
6424 cancel_func(cmd_t *cmd)
6425 {
6426 	int arg;
6427 	boolean_t arg_err = B_FALSE;
6428 
6429 	assert(cmd != NULL);
6430 
6431 	optind = 0;
6432 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) {
6433 		switch (arg) {
6434 		case '?':
6435 			longer_usage(CMD_CANCEL);
6436 			arg_err = B_TRUE;
6437 			break;
6438 		default:
6439 			short_usage(CMD_CANCEL);
6440 			arg_err = B_TRUE;
6441 			break;
6442 		}
6443 	}
6444 	if (arg_err)
6445 		return;
6446 
6447 	if (optind != cmd->cmd_argc) {
6448 		short_usage(CMD_CANCEL);
6449 		return;
6450 	}
6451 
6452 	if (global_scope)
6453 		scope_usage(CMD_CANCEL);
6454 	global_scope = B_TRUE;
6455 	zonecfg_free_fs_option_list(in_progress_fstab.zone_fs_options);
6456 	bzero(&in_progress_fstab, sizeof (in_progress_fstab));
6457 	bzero(&in_progress_nwiftab, sizeof (in_progress_nwiftab));
6458 	bzero(&in_progress_devtab, sizeof (in_progress_devtab));
6459 	zonecfg_free_rctl_value_list(in_progress_rctltab.zone_rctl_valptr);
6460 	bzero(&in_progress_rctltab, sizeof (in_progress_rctltab));
6461 	bzero(&in_progress_attrtab, sizeof (in_progress_attrtab));
6462 	bzero(&in_progress_dstab, sizeof (in_progress_dstab));
6463 }
6464 
6465 static int
6466 validate_attr_name(char *name)
6467 {
6468 	int i;
6469 
6470 	if (!isalnum(name[0])) {
6471 		zerr(gettext("Invalid %s %s %s: must start with an alpha-"
6472 		    "numeric character."), rt_to_str(RT_ATTR),
6473 		    pt_to_str(PT_NAME), name);
6474 		return (Z_INVAL);
6475 	}
6476 	for (i = 1; name[i]; i++)
6477 		if (!isalnum(name[i]) && name[i] != '-' && name[i] != '.') {
6478 			zerr(gettext("Invalid %s %s %s: can only contain "
6479 			    "alpha-numeric characters, plus '-' and '.'."),
6480 			    rt_to_str(RT_ATTR), pt_to_str(PT_NAME), name);
6481 			return (Z_INVAL);
6482 		}
6483 	return (Z_OK);
6484 }
6485 
6486 static int
6487 validate_attr_type_val(struct zone_attrtab *attrtab)
6488 {
6489 	boolean_t boolval;
6490 	int64_t intval;
6491 	char strval[MAXNAMELEN];
6492 	uint64_t uintval;
6493 
6494 	if (strcmp(attrtab->zone_attr_type, "boolean") == 0) {
6495 		if (zonecfg_get_attr_boolean(attrtab, &boolval) == Z_OK)
6496 			return (Z_OK);
6497 		zerr(gettext("invalid %s value for %s=%s"),
6498 		    rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "boolean");
6499 		return (Z_ERR);
6500 	}
6501 
6502 	if (strcmp(attrtab->zone_attr_type, "int") == 0) {
6503 		if (zonecfg_get_attr_int(attrtab, &intval) == Z_OK)
6504 			return (Z_OK);
6505 		zerr(gettext("invalid %s value for %s=%s"),
6506 		    rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "int");
6507 		return (Z_ERR);
6508 	}
6509 
6510 	if (strcmp(attrtab->zone_attr_type, "string") == 0) {
6511 		if (zonecfg_get_attr_string(attrtab, strval,
6512 		    sizeof (strval)) == Z_OK)
6513 			return (Z_OK);
6514 		zerr(gettext("invalid %s value for %s=%s"),
6515 		    rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "string");
6516 		return (Z_ERR);
6517 	}
6518 
6519 	if (strcmp(attrtab->zone_attr_type, "uint") == 0) {
6520 		if (zonecfg_get_attr_uint(attrtab, &uintval) == Z_OK)
6521 			return (Z_OK);
6522 		zerr(gettext("invalid %s value for %s=%s"),
6523 		    rt_to_str(RT_ATTR), pt_to_str(PT_TYPE), "uint");
6524 		return (Z_ERR);
6525 	}
6526 
6527 	zerr(gettext("invalid %s %s '%s'"), rt_to_str(RT_ATTR),
6528 	    pt_to_str(PT_TYPE), attrtab->zone_attr_type);
6529 	return (Z_ERR);
6530 }
6531 
6532 /*
6533  * Helper function for end_func-- checks the existence of a given property
6534  * and emits a message if not specified.
6535  */
6536 static int
6537 end_check_reqd(char *attr, int pt, boolean_t *validation_failed)
6538 {
6539 	if (strlen(attr) == 0) {
6540 		*validation_failed = B_TRUE;
6541 		zerr(gettext("%s not specified"), pt_to_str(pt));
6542 		return (Z_ERR);
6543 	}
6544 	return (Z_OK);
6545 }
6546 
6547 static void
6548 net_exists_error(struct zone_nwiftab nwif)
6549 {
6550 	if (strlen(nwif.zone_nwif_address) > 0) {
6551 		zerr(gettext("A %s resource with the %s '%s', "
6552 		    "and %s '%s' already exists."),
6553 		    rt_to_str(RT_NET),
6554 		    pt_to_str(PT_PHYSICAL),
6555 		    nwif.zone_nwif_physical,
6556 		    pt_to_str(PT_ADDRESS),
6557 		    in_progress_nwiftab.zone_nwif_address);
6558 	} else {
6559 		zerr(gettext("A %s resource with the %s '%s', "
6560 		    "and %s '%s' already exists."),
6561 		    rt_to_str(RT_NET),
6562 		    pt_to_str(PT_PHYSICAL),
6563 		    nwif.zone_nwif_physical,
6564 		    pt_to_str(PT_ALLOWED_ADDRESS),
6565 		    nwif.zone_nwif_allowed_address);
6566 	}
6567 }
6568 
6569 void
6570 end_func(cmd_t *cmd)
6571 {
6572 	boolean_t validation_failed = B_FALSE;
6573 	boolean_t arg_err = B_FALSE;
6574 	struct zone_fstab tmp_fstab;
6575 	struct zone_nwiftab tmp_nwiftab;
6576 	struct zone_devtab tmp_devtab;
6577 	struct zone_rctltab tmp_rctltab;
6578 	struct zone_attrtab tmp_attrtab;
6579 	struct zone_dstab tmp_dstab;
6580 	struct zone_admintab tmp_admintab;
6581 	int err, arg, res1, res2, res3;
6582 	uint64_t swap_limit;
6583 	uint64_t locked_limit;
6584 	uint64_t proc_cap;
6585 
6586 	assert(cmd != NULL);
6587 
6588 	optind = 0;
6589 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) {
6590 		switch (arg) {
6591 		case '?':
6592 			longer_usage(CMD_END);
6593 			arg_err = B_TRUE;
6594 			break;
6595 		default:
6596 			short_usage(CMD_END);
6597 			arg_err = B_TRUE;
6598 			break;
6599 		}
6600 	}
6601 	if (arg_err)
6602 		return;
6603 
6604 	if (optind != cmd->cmd_argc) {
6605 		short_usage(CMD_END);
6606 		return;
6607 	}
6608 
6609 	if (global_scope) {
6610 		scope_usage(CMD_END);
6611 		return;
6612 	}
6613 
6614 	assert(end_op == CMD_ADD || end_op == CMD_SELECT);
6615 
6616 	switch (resource_scope) {
6617 	case RT_FS:
6618 		/* First make sure everything was filled in. */
6619 		if (end_check_reqd(in_progress_fstab.zone_fs_dir,
6620 		    PT_DIR, &validation_failed) == Z_OK) {
6621 			if (in_progress_fstab.zone_fs_dir[0] != '/') {
6622 				zerr(gettext("%s %s is not an absolute path."),
6623 				    pt_to_str(PT_DIR),
6624 				    in_progress_fstab.zone_fs_dir);
6625 				validation_failed = B_TRUE;
6626 			}
6627 		}
6628 
6629 		(void) end_check_reqd(in_progress_fstab.zone_fs_special,
6630 		    PT_SPECIAL, &validation_failed);
6631 
6632 		if (in_progress_fstab.zone_fs_raw[0] != '\0' &&
6633 		    in_progress_fstab.zone_fs_raw[0] != '/') {
6634 			zerr(gettext("%s %s is not an absolute path."),
6635 			    pt_to_str(PT_RAW),
6636 			    in_progress_fstab.zone_fs_raw);
6637 			validation_failed = B_TRUE;
6638 		}
6639 
6640 		(void) end_check_reqd(in_progress_fstab.zone_fs_type, PT_TYPE,
6641 		    &validation_failed);
6642 
6643 		if (validation_failed) {
6644 			saw_error = B_TRUE;
6645 			return;
6646 		}
6647 
6648 		if (end_op == CMD_ADD) {
6649 			/* Make sure there isn't already one like this. */
6650 			bzero(&tmp_fstab, sizeof (tmp_fstab));
6651 			(void) strlcpy(tmp_fstab.zone_fs_dir,
6652 			    in_progress_fstab.zone_fs_dir,
6653 			    sizeof (tmp_fstab.zone_fs_dir));
6654 			err = zonecfg_lookup_filesystem(handle, &tmp_fstab);
6655 			zonecfg_free_fs_option_list(tmp_fstab.zone_fs_options);
6656 			if (err == Z_OK) {
6657 				zerr(gettext("A %s resource "
6658 				    "with the %s '%s' already exists."),
6659 				    rt_to_str(RT_FS), pt_to_str(PT_DIR),
6660 				    in_progress_fstab.zone_fs_dir);
6661 				saw_error = B_TRUE;
6662 				return;
6663 			}
6664 			err = zonecfg_add_filesystem(handle,
6665 			    &in_progress_fstab);
6666 		} else {
6667 			err = zonecfg_modify_filesystem(handle, &old_fstab,
6668 			    &in_progress_fstab);
6669 		}
6670 		zonecfg_free_fs_option_list(in_progress_fstab.zone_fs_options);
6671 		in_progress_fstab.zone_fs_options = NULL;
6672 		break;
6673 
6674 	case RT_NET:
6675 		/*
6676 		 * First make sure everything was filled in.
6677 		 * Since we don't know whether IP will be shared
6678 		 * or exclusive here, some checks are deferred until
6679 		 * the verify command.
6680 		 */
6681 		(void) end_check_reqd(in_progress_nwiftab.zone_nwif_physical,
6682 		    PT_PHYSICAL, &validation_failed);
6683 
6684 		if (validation_failed) {
6685 			saw_error = B_TRUE;
6686 			return;
6687 		}
6688 		if (end_op == CMD_ADD) {
6689 			/* Make sure there isn't already one like this. */
6690 			bzero(&tmp_nwiftab, sizeof (tmp_nwiftab));
6691 			(void) strlcpy(tmp_nwiftab.zone_nwif_physical,
6692 			    in_progress_nwiftab.zone_nwif_physical,
6693 			    sizeof (tmp_nwiftab.zone_nwif_physical));
6694 			(void) strlcpy(tmp_nwiftab.zone_nwif_address,
6695 			    in_progress_nwiftab.zone_nwif_address,
6696 			    sizeof (tmp_nwiftab.zone_nwif_address));
6697 			(void) strlcpy(tmp_nwiftab.zone_nwif_allowed_address,
6698 			    in_progress_nwiftab.zone_nwif_allowed_address,
6699 			    sizeof (tmp_nwiftab.zone_nwif_allowed_address));
6700 			(void) strlcpy(tmp_nwiftab.zone_nwif_defrouter,
6701 			    in_progress_nwiftab.zone_nwif_defrouter,
6702 			    sizeof (tmp_nwiftab.zone_nwif_defrouter));
6703 			if (zonecfg_lookup_nwif(handle, &tmp_nwiftab) == Z_OK) {
6704 				net_exists_error(in_progress_nwiftab);
6705 				saw_error = B_TRUE;
6706 				return;
6707 			}
6708 			err = zonecfg_add_nwif(handle, &in_progress_nwiftab);
6709 		} else {
6710 			err = zonecfg_modify_nwif(handle, &old_nwiftab,
6711 			    &in_progress_nwiftab);
6712 		}
6713 		break;
6714 
6715 	case RT_DEVICE:
6716 		/* First make sure everything was filled in. */
6717 		(void) end_check_reqd(in_progress_devtab.zone_dev_match,
6718 		    PT_MATCH, &validation_failed);
6719 
6720 		if (validation_failed) {
6721 			saw_error = B_TRUE;
6722 			return;
6723 		}
6724 
6725 		if (end_op == CMD_ADD) {
6726 			/* Make sure there isn't already one like this. */
6727 			(void) strlcpy(tmp_devtab.zone_dev_match,
6728 			    in_progress_devtab.zone_dev_match,
6729 			    sizeof (tmp_devtab.zone_dev_match));
6730 			if (zonecfg_lookup_dev(handle, &tmp_devtab) == Z_OK) {
6731 				zerr(gettext("A %s resource with the %s '%s' "
6732 				    "already exists."), rt_to_str(RT_DEVICE),
6733 				    pt_to_str(PT_MATCH),
6734 				    in_progress_devtab.zone_dev_match);
6735 				saw_error = B_TRUE;
6736 				return;
6737 			}
6738 			err = zonecfg_add_dev(handle, &in_progress_devtab);
6739 		} else {
6740 			err = zonecfg_modify_dev(handle, &old_devtab,
6741 			    &in_progress_devtab);
6742 		}
6743 		break;
6744 
6745 	case RT_RCTL:
6746 		/* First make sure everything was filled in. */
6747 		(void) end_check_reqd(in_progress_rctltab.zone_rctl_name,
6748 		    PT_NAME, &validation_failed);
6749 
6750 		if (in_progress_rctltab.zone_rctl_valptr == NULL) {
6751 			zerr(gettext("no %s specified"), pt_to_str(PT_VALUE));
6752 			validation_failed = B_TRUE;
6753 		}
6754 
6755 		if (validation_failed) {
6756 			saw_error = B_TRUE;
6757 			return;
6758 		}
6759 
6760 		if (end_op == CMD_ADD) {
6761 			/* Make sure there isn't already one like this. */
6762 			(void) strlcpy(tmp_rctltab.zone_rctl_name,
6763 			    in_progress_rctltab.zone_rctl_name,
6764 			    sizeof (tmp_rctltab.zone_rctl_name));
6765 			tmp_rctltab.zone_rctl_valptr = NULL;
6766 			err = zonecfg_lookup_rctl(handle, &tmp_rctltab);
6767 			zonecfg_free_rctl_value_list(
6768 			    tmp_rctltab.zone_rctl_valptr);
6769 			if (err == Z_OK) {
6770 				zerr(gettext("A %s resource "
6771 				    "with the %s '%s' already exists."),
6772 				    rt_to_str(RT_RCTL), pt_to_str(PT_NAME),
6773 				    in_progress_rctltab.zone_rctl_name);
6774 				saw_error = B_TRUE;
6775 				return;
6776 			}
6777 			err = zonecfg_add_rctl(handle, &in_progress_rctltab);
6778 		} else {
6779 			err = zonecfg_modify_rctl(handle, &old_rctltab,
6780 			    &in_progress_rctltab);
6781 		}
6782 		if (err == Z_OK) {
6783 			zonecfg_free_rctl_value_list(
6784 			    in_progress_rctltab.zone_rctl_valptr);
6785 			in_progress_rctltab.zone_rctl_valptr = NULL;
6786 		}
6787 		break;
6788 
6789 	case RT_ATTR:
6790 		/* First make sure everything was filled in. */
6791 		(void) end_check_reqd(in_progress_attrtab.zone_attr_name,
6792 		    PT_NAME, &validation_failed);
6793 		(void) end_check_reqd(in_progress_attrtab.zone_attr_type,
6794 		    PT_TYPE, &validation_failed);
6795 		(void) end_check_reqd(in_progress_attrtab.zone_attr_value,
6796 		    PT_VALUE, &validation_failed);
6797 
6798 		if (validate_attr_name(in_progress_attrtab.zone_attr_name) !=
6799 		    Z_OK)
6800 			validation_failed = B_TRUE;
6801 
6802 		if (validate_attr_type_val(&in_progress_attrtab) != Z_OK)
6803 			validation_failed = B_TRUE;
6804 
6805 		if (validation_failed) {
6806 			saw_error = B_TRUE;
6807 			return;
6808 		}
6809 		if (end_op == CMD_ADD) {
6810 			/* Make sure there isn't already one like this. */
6811 			bzero(&tmp_attrtab, sizeof (tmp_attrtab));
6812 			(void) strlcpy(tmp_attrtab.zone_attr_name,
6813 			    in_progress_attrtab.zone_attr_name,
6814 			    sizeof (tmp_attrtab.zone_attr_name));
6815 			if (zonecfg_lookup_attr(handle, &tmp_attrtab) == Z_OK) {
6816 				zerr(gettext("An %s resource "
6817 				    "with the %s '%s' already exists."),
6818 				    rt_to_str(RT_ATTR), pt_to_str(PT_NAME),
6819 				    in_progress_attrtab.zone_attr_name);
6820 				saw_error = B_TRUE;
6821 				return;
6822 			}
6823 			err = zonecfg_add_attr(handle, &in_progress_attrtab);
6824 		} else {
6825 			err = zonecfg_modify_attr(handle, &old_attrtab,
6826 			    &in_progress_attrtab);
6827 		}
6828 		break;
6829 	case RT_DATASET:
6830 		/* First make sure everything was filled in. */
6831 		if (strlen(in_progress_dstab.zone_dataset_name) == 0) {
6832 			zerr("%s %s", pt_to_str(PT_NAME),
6833 			    gettext("not specified"));
6834 			saw_error = B_TRUE;
6835 			validation_failed = B_TRUE;
6836 		}
6837 		if (validation_failed)
6838 			return;
6839 		if (end_op == CMD_ADD) {
6840 			/* Make sure there isn't already one like this. */
6841 			bzero(&tmp_dstab, sizeof (tmp_dstab));
6842 			(void) strlcpy(tmp_dstab.zone_dataset_name,
6843 			    in_progress_dstab.zone_dataset_name,
6844 			    sizeof (tmp_dstab.zone_dataset_name));
6845 			err = zonecfg_lookup_ds(handle, &tmp_dstab);
6846 			if (err == Z_OK) {
6847 				zerr(gettext("A %s resource "
6848 				    "with the %s '%s' already exists."),
6849 				    rt_to_str(RT_DATASET), pt_to_str(PT_NAME),
6850 				    in_progress_dstab.zone_dataset_name);
6851 				saw_error = B_TRUE;
6852 				return;
6853 			}
6854 			err = zonecfg_add_ds(handle, &in_progress_dstab);
6855 		} else {
6856 			err = zonecfg_modify_ds(handle, &old_dstab,
6857 			    &in_progress_dstab);
6858 		}
6859 		break;
6860 	case RT_DCPU:
6861 		/* Make sure everything was filled in. */
6862 		if (end_check_reqd(in_progress_psettab.zone_ncpu_min,
6863 		    PT_NCPUS, &validation_failed) != Z_OK) {
6864 			saw_error = B_TRUE;
6865 			return;
6866 		}
6867 
6868 		if (end_op == CMD_ADD) {
6869 			err = zonecfg_add_pset(handle, &in_progress_psettab);
6870 		} else {
6871 			err = zonecfg_modify_pset(handle, &in_progress_psettab);
6872 		}
6873 		break;
6874 	case RT_PCAP:
6875 		/* Make sure everything was filled in. */
6876 		if (zonecfg_get_aliased_rctl(handle, ALIAS_CPUCAP, &proc_cap)
6877 		    != Z_OK) {
6878 			zerr(gettext("%s not specified"), pt_to_str(PT_NCPUS));
6879 			saw_error = B_TRUE;
6880 			validation_failed = B_TRUE;
6881 			return;
6882 		}
6883 		err = Z_OK;
6884 		break;
6885 	case RT_MCAP:
6886 		/* Make sure everything was filled in. */
6887 		res1 = strlen(in_progress_mcaptab.zone_physmem_cap) == 0 ?
6888 		    Z_ERR : Z_OK;
6889 		res2 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXSWAP,
6890 		    &swap_limit);
6891 		res3 = zonecfg_get_aliased_rctl(handle, ALIAS_MAXLOCKEDMEM,
6892 		    &locked_limit);
6893 
6894 		if (res1 != Z_OK && res2 != Z_OK && res3 != Z_OK) {
6895 			zerr(gettext("No property was specified.  One of %s, "
6896 			    "%s or %s is required."), pt_to_str(PT_PHYSICAL),
6897 			    pt_to_str(PT_SWAP), pt_to_str(PT_LOCKED));
6898 			saw_error = B_TRUE;
6899 			return;
6900 		}
6901 
6902 		/* if phys & locked are both set, verify locked <= phys */
6903 		if (res1 == Z_OK && res3 == Z_OK) {
6904 			uint64_t phys_limit;
6905 			char *endp;
6906 
6907 			phys_limit = strtoull(
6908 			    in_progress_mcaptab.zone_physmem_cap, &endp, 10);
6909 			if (phys_limit < locked_limit) {
6910 				zerr(gettext("The %s cap must be less than or "
6911 				    "equal to the %s cap."),
6912 				    pt_to_str(PT_LOCKED),
6913 				    pt_to_str(PT_PHYSICAL));
6914 				saw_error = B_TRUE;
6915 				return;
6916 			}
6917 		}
6918 
6919 		err = Z_OK;
6920 		if (res1 == Z_OK) {
6921 			/*
6922 			 * We could be ending from either an add operation
6923 			 * or a select operation.  Since all of the properties
6924 			 * within this resource are optional, we always use
6925 			 * modify on the mcap entry.  zonecfg_modify_mcap()
6926 			 * will handle both adding and modifying a memory cap.
6927 			 */
6928 			err = zonecfg_modify_mcap(handle, &in_progress_mcaptab);
6929 		} else if (end_op == CMD_SELECT) {
6930 			/*
6931 			 * If we're ending from a select and the physical
6932 			 * memory cap is empty then the user could have cleared
6933 			 * the physical cap value, so try to delete the entry.
6934 			 */
6935 			(void) zonecfg_delete_mcap(handle);
6936 		}
6937 		break;
6938 	case RT_ADMIN:
6939 		/* First make sure everything was filled in. */
6940 		if (end_check_reqd(in_progress_admintab.zone_admin_user,
6941 		    PT_USER, &validation_failed) == Z_OK) {
6942 			if (getpwnam(in_progress_admintab.zone_admin_user)
6943 			    == NULL) {
6944 				zerr(gettext("%s %s is not a valid username"),
6945 				    pt_to_str(PT_USER),
6946 				    in_progress_admintab.zone_admin_user);
6947 				validation_failed = B_TRUE;
6948 			}
6949 		}
6950 
6951 		if (end_check_reqd(in_progress_admintab.zone_admin_auths,
6952 		    PT_AUTHS, &validation_failed) == Z_OK) {
6953 			if (!zonecfg_valid_auths(
6954 			    in_progress_admintab.zone_admin_auths,
6955 			    zone)) {
6956 				validation_failed = B_TRUE;
6957 			}
6958 		}
6959 
6960 		if (validation_failed) {
6961 			saw_error = B_TRUE;
6962 			return;
6963 		}
6964 
6965 		if (end_op == CMD_ADD) {
6966 			/* Make sure there isn't already one like this. */
6967 			bzero(&tmp_admintab, sizeof (tmp_admintab));
6968 			(void) strlcpy(tmp_admintab.zone_admin_user,
6969 			    in_progress_admintab.zone_admin_user,
6970 			    sizeof (tmp_admintab.zone_admin_user));
6971 			err = zonecfg_lookup_admin(
6972 			    handle, &tmp_admintab);
6973 			if (err == Z_OK) {
6974 				zerr(gettext("A %s resource "
6975 				    "with the %s '%s' already exists."),
6976 				    rt_to_str(RT_ADMIN),
6977 				    pt_to_str(PT_USER),
6978 				    in_progress_admintab.zone_admin_user);
6979 				saw_error = B_TRUE;
6980 				return;
6981 			}
6982 			err = zonecfg_add_admin(handle,
6983 			    &in_progress_admintab, zone);
6984 		} else {
6985 			err = zonecfg_modify_admin(handle,
6986 			    &old_admintab, &in_progress_admintab,
6987 			    zone);
6988 		}
6989 		break;
6990 	case RT_SECFLAGS:
6991 		if (verify_secflags(&in_progress_secflagstab) != B_TRUE) {
6992 			saw_error = B_TRUE;
6993 			return;
6994 		}
6995 
6996 		if (end_op == CMD_ADD) {
6997 			err = zonecfg_add_secflags(handle,
6998 			    &in_progress_secflagstab);
6999 		} else {
7000 			err = zonecfg_modify_secflags(handle,
7001 			    &old_secflagstab, &in_progress_secflagstab);
7002 		}
7003 		break;
7004 	default:
7005 		zone_perror(rt_to_str(resource_scope), Z_NO_RESOURCE_TYPE,
7006 		    B_TRUE);
7007 		saw_error = B_TRUE;
7008 		return;
7009 	}
7010 
7011 	if (err != Z_OK) {
7012 		zone_perror(zone, err, B_TRUE);
7013 	} else {
7014 		need_to_commit = B_TRUE;
7015 		global_scope = B_TRUE;
7016 		end_op = -1;
7017 	}
7018 }
7019 
7020 void
7021 commit_func(cmd_t *cmd)
7022 {
7023 	int arg;
7024 	boolean_t arg_err = B_FALSE;
7025 
7026 	optind = 0;
7027 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?")) != EOF) {
7028 		switch (arg) {
7029 		case '?':
7030 			longer_usage(CMD_COMMIT);
7031 			arg_err = B_TRUE;
7032 			break;
7033 		default:
7034 			short_usage(CMD_COMMIT);
7035 			arg_err = B_TRUE;
7036 			break;
7037 		}
7038 	}
7039 	if (arg_err)
7040 		return;
7041 
7042 	if (optind != cmd->cmd_argc) {
7043 		short_usage(CMD_COMMIT);
7044 		return;
7045 	}
7046 
7047 	if (zone_is_read_only(CMD_COMMIT))
7048 		return;
7049 
7050 	assert(cmd != NULL);
7051 
7052 	cmd->cmd_argc = 1;
7053 	/*
7054 	 * cmd_arg normally comes from a strdup() in the lexer, and the
7055 	 * whole cmd structure and its (char *) attributes are freed at
7056 	 * the completion of each command, so the strdup() below is needed
7057 	 * to match this and prevent a core dump from trying to free()
7058 	 * something that can't be.
7059 	 */
7060 	if ((cmd->cmd_argv[0] = strdup("save")) == NULL) {
7061 		zone_perror(zone, Z_NOMEM, B_TRUE);
7062 		exit(Z_ERR);
7063 	}
7064 	cmd->cmd_argv[1] = NULL;
7065 	verify_func(cmd);
7066 }
7067 
7068 void
7069 revert_func(cmd_t *cmd)
7070 {
7071 	char line[128];	/* enough to ask a question */
7072 	boolean_t force = B_FALSE;
7073 	boolean_t arg_err = B_FALSE;
7074 	int err, arg, answer;
7075 
7076 	optind = 0;
7077 	while ((arg = getopt(cmd->cmd_argc, cmd->cmd_argv, "?F")) != EOF) {
7078 		switch (arg) {
7079 		case '?':
7080 			longer_usage(CMD_REVERT);
7081 			arg_err = B_TRUE;
7082 			break;
7083 		case 'F':
7084 			force = B_TRUE;
7085 			break;
7086 		default:
7087 			short_usage(CMD_REVERT);
7088 			arg_err = B_TRUE;
7089 			break;
7090 		}
7091 	}
7092 	if (arg_err)
7093 		return;
7094 
7095 	if (optind != cmd->cmd_argc) {
7096 		short_usage(CMD_REVERT);
7097 		return;
7098 	}
7099 
7100 	if (zone_is_read_only(CMD_REVERT))
7101 		return;
7102 
7103 	if (!global_scope) {
7104 		zerr(gettext("You can only use %s in the global scope.\nUse"
7105 		    " '%s' to cancel changes to a resource specification."),
7106 		    cmd_to_str(CMD_REVERT), cmd_to_str(CMD_CANCEL));
7107 		saw_error = B_TRUE;
7108 		return;
7109 	}
7110 
7111 	if (zonecfg_check_handle(handle) != Z_OK) {
7112 		zerr(gettext("No changes to revert."));
7113 		saw_error = B_TRUE;
7114 		return;
7115 	}
7116 
7117 	if (!force) {
7118 		(void) snprintf(line, sizeof (line),
7119 		    gettext("Are you sure you want to revert"));
7120 		if ((answer = ask_yesno(B_FALSE, line)) == -1) {
7121 			zerr(gettext("Input not from terminal and -F not "
7122 			    "specified:\n%s command ignored, exiting."),
7123 			    cmd_to_str(CMD_REVERT));
7124 			exit(Z_ERR);
7125 		}
7126 		if (answer != 1)
7127 			return;
7128 	}
7129 
7130 	/*
7131 	 * Reset any pending admins that were
7132 	 * removed from the previous zone
7133 	 */
7134 	zonecfg_remove_userauths(handle, "", zone, B_FALSE);
7135 
7136 	/*
7137 	 * Time for a new handle: finish the old one off first
7138 	 * then get a new one properly to avoid leaks.
7139 	 */
7140 	zonecfg_fini_handle(handle);
7141 	if ((handle = zonecfg_init_handle()) == NULL) {
7142 		zone_perror(execname, Z_NOMEM, B_TRUE);
7143 		exit(Z_ERR);
7144 	}
7145 
7146 	if ((err = zonecfg_get_handle(revert_zone, handle)) != Z_OK) {
7147 		saw_error = B_TRUE;
7148 		got_handle = B_FALSE;
7149 		if (err == Z_NO_ZONE)
7150 			zerr(gettext("%s: no such saved zone to revert to."),
7151 			    revert_zone);
7152 		else
7153 			zone_perror(zone, err, B_TRUE);
7154 	}
7155 	(void) strlcpy(zone, revert_zone, sizeof (zone));
7156 }
7157 
7158 void
7159 help_func(cmd_t *cmd)
7160 {
7161 	int i;
7162 
7163 	assert(cmd != NULL);
7164 
7165 	if (cmd->cmd_argc == 0) {
7166 		usage(B_TRUE, global_scope ? HELP_SUBCMDS : HELP_RES_SCOPE);
7167 		return;
7168 	}
7169 	if (strcmp(cmd->cmd_argv[0], "usage") == 0) {
7170 		usage(B_TRUE, HELP_USAGE);
7171 		return;
7172 	}
7173 	if (strcmp(cmd->cmd_argv[0], "commands") == 0) {
7174 		usage(B_TRUE, HELP_SUBCMDS);
7175 		return;
7176 	}
7177 	if (strcmp(cmd->cmd_argv[0], "syntax") == 0) {
7178 		usage(B_TRUE, HELP_SYNTAX | HELP_RES_PROPS);
7179 		return;
7180 	}
7181 	if (strcmp(cmd->cmd_argv[0], "-?") == 0) {
7182 		longer_usage(CMD_HELP);
7183 		return;
7184 	}
7185 
7186 	for (i = 0; i <= CMD_MAX; i++) {
7187 		if (strcmp(cmd->cmd_argv[0], cmd_to_str(i)) == 0) {
7188 			longer_usage(i);
7189 			return;
7190 		}
7191 	}
7192 	/* We do not use zerr() here because we do not want its extra \n. */
7193 	(void) fprintf(stderr, gettext("Unknown help subject %s.  "),
7194 	    cmd->cmd_argv[0]);
7195 	usage(B_FALSE, HELP_META);
7196 }
7197 
7198 static int
7199 string_to_yyin(char *string)
7200 {
7201 	if ((yyin = tmpfile()) == NULL) {
7202 		zone_perror(execname, Z_TEMP_FILE, B_TRUE);
7203 		return (Z_ERR);
7204 	}
7205 	if (fwrite(string, strlen(string), 1, yyin) != 1) {
7206 		zone_perror(execname, Z_TEMP_FILE, B_TRUE);
7207 		return (Z_ERR);
7208 	}
7209 	if (fseek(yyin, 0, SEEK_SET) != 0) {
7210 		zone_perror(execname, Z_TEMP_FILE, B_TRUE);
7211 		return (Z_ERR);
7212 	}
7213 	return (Z_OK);
7214 }
7215 
7216 /* This is the back-end helper function for read_input() below. */
7217 
7218 static int
7219 cleanup()
7220 {
7221 	int answer;
7222 	cmd_t *cmd;
7223 
7224 	if (!interactive_mode && !cmd_file_mode) {
7225 		/*
7226 		 * If we're not in interactive mode, and we're not in command
7227 		 * file mode, then we must be in commands-from-the-command-line
7228 		 * mode.  As such, we can't loop back and ask for more input.
7229 		 * It was OK to prompt for such things as whether or not to
7230 		 * really delete a zone in the command handler called from
7231 		 * yyparse() above, but "really quit?" makes no sense in this
7232 		 * context.  So disable prompting.
7233 		 */
7234 		ok_to_prompt = B_FALSE;
7235 	}
7236 	if (!global_scope) {
7237 		if (!time_to_exit) {
7238 			/*
7239 			 * Just print a simple error message in the -1 case,
7240 			 * since exit_func() already handles that case, and
7241 			 * EOF means we are finished anyway.
7242 			 */
7243 			answer = ask_yesno(B_FALSE,
7244 			    gettext("Resource incomplete; really quit"));
7245 			if (answer == -1) {
7246 				zerr(gettext("Resource incomplete."));
7247 				return (Z_ERR);
7248 			}
7249 			if (answer != 1) {
7250 				yyin = stdin;
7251 				return (Z_REPEAT);
7252 			}
7253 		} else {
7254 			saw_error = B_TRUE;
7255 		}
7256 	}
7257 	/*
7258 	 * Make sure we tried something and that the handle checks
7259 	 * out, or we would get a false error trying to commit.
7260 	 */
7261 	if (need_to_commit && zonecfg_check_handle(handle) == Z_OK) {
7262 		if ((cmd = alloc_cmd()) == NULL) {
7263 			zone_perror(zone, Z_NOMEM, B_TRUE);
7264 			return (Z_ERR);
7265 		}
7266 		cmd->cmd_argc = 0;
7267 		cmd->cmd_argv[0] = NULL;
7268 		commit_func(cmd);
7269 		free_cmd(cmd);
7270 		/*
7271 		 * need_to_commit will get set back to FALSE if the
7272 		 * configuration is saved successfully.
7273 		 */
7274 		if (need_to_commit) {
7275 			if (force_exit) {
7276 				zerr(gettext("Configuration not saved."));
7277 				return (Z_ERR);
7278 			}
7279 			answer = ask_yesno(B_FALSE,
7280 			    gettext("Configuration not saved; really quit"));
7281 			if (answer == -1) {
7282 				zerr(gettext("Configuration not saved."));
7283 				return (Z_ERR);
7284 			}
7285 			if (answer != 1) {
7286 				time_to_exit = B_FALSE;
7287 				yyin = stdin;
7288 				return (Z_REPEAT);
7289 			}
7290 		}
7291 	}
7292 	return ((need_to_commit || saw_error) ? Z_ERR : Z_OK);
7293 }
7294 
7295 /*
7296  * read_input() is the driver of this program.  It is a wrapper around
7297  * yyparse(), printing appropriate prompts when needed, checking for
7298  * exit conditions and reacting appropriately [the latter in its cleanup()
7299  * helper function].
7300  *
7301  * Like most zonecfg functions, it returns Z_OK or Z_ERR, *or* Z_REPEAT
7302  * so do_interactive() knows that we are not really done (i.e, we asked
7303  * the user if we should really quit and the user said no).
7304  */
7305 static int
7306 read_input()
7307 {
7308 	boolean_t yyin_is_a_tty = isatty(fileno(yyin));
7309 	/*
7310 	 * The prompt is "e:z> " or "e:z:r> " where e is execname, z is zone
7311 	 * and r is resource_scope: 5 is for the two ":"s + "> " + terminator.
7312 	 */
7313 	char prompt[MAXPATHLEN + ZONENAME_MAX + MAX_RT_STRLEN + 5], *line;
7314 
7315 	/* yyin should have been set to the appropriate (FILE *) if not stdin */
7316 	newline_terminated = B_TRUE;
7317 	for (;;) {
7318 		if (yyin_is_a_tty) {
7319 			if (newline_terminated) {
7320 				if (global_scope)
7321 					(void) snprintf(prompt, sizeof (prompt),
7322 					    "%s:%s> ", execname, zone);
7323 				else
7324 					(void) snprintf(prompt, sizeof (prompt),
7325 					    "%s:%s:%s> ", execname, zone,
7326 					    rt_to_str(resource_scope));
7327 			}
7328 			/*
7329 			 * If the user hits ^C then we want to catch it and
7330 			 * start over.  If the user hits EOF then we want to
7331 			 * bail out.
7332 			 */
7333 			line = gl_get_line(gl, prompt, NULL, -1);
7334 			if (gl_return_status(gl) == GLR_SIGNAL) {
7335 				gl_abandon_line(gl);
7336 				continue;
7337 			}
7338 			if (line == NULL)
7339 				break;
7340 			(void) string_to_yyin(line);
7341 			while (!feof(yyin))
7342 				yyparse();
7343 		} else {
7344 			yyparse();
7345 		}
7346 		/* Bail out on an error in command file mode. */
7347 		if (saw_error && cmd_file_mode && !interactive_mode)
7348 			time_to_exit = B_TRUE;
7349 		if (time_to_exit || (!yyin_is_a_tty && feof(yyin)))
7350 			break;
7351 	}
7352 	return (cleanup());
7353 }
7354 
7355 /*
7356  * This function is used in the zonecfg-interactive-mode scenario: it just
7357  * calls read_input() until we are done.
7358  */
7359 
7360 static int
7361 do_interactive(void)
7362 {
7363 	int err;
7364 
7365 	interactive_mode = B_TRUE;
7366 	if (!read_only_mode) {
7367 		/*
7368 		 * Try to set things up proactively in interactive mode, so
7369 		 * that if the zone in question does not exist yet, we can
7370 		 * provide the user with a clue.
7371 		 */
7372 		(void) initialize(B_FALSE);
7373 	}
7374 	do {
7375 		err = read_input();
7376 	} while (err == Z_REPEAT);
7377 	return (err);
7378 }
7379 
7380 /*
7381  * cmd_file is slightly more complicated, as it has to open the command file
7382  * and set yyin appropriately.  Once that is done, though, it just calls
7383  * read_input(), and only once, since prompting is not possible.
7384  */
7385 
7386 static int
7387 cmd_file(char *file)
7388 {
7389 	FILE *infile;
7390 	int err;
7391 	struct stat statbuf;
7392 	boolean_t using_real_file = (strcmp(file, "-") != 0);
7393 
7394 	if (using_real_file) {
7395 		/*
7396 		 * zerr() prints a line number in cmd_file_mode, which we do
7397 		 * not want here, so temporarily unset it.
7398 		 */
7399 		cmd_file_mode = B_FALSE;
7400 		if ((infile = fopen(file, "r")) == NULL) {
7401 			zerr(gettext("could not open file %s: %s"),
7402 			    file, strerror(errno));
7403 			return (Z_ERR);
7404 		}
7405 		if ((err = fstat(fileno(infile), &statbuf)) != 0) {
7406 			zerr(gettext("could not stat file %s: %s"),
7407 			    file, strerror(errno));
7408 			err = Z_ERR;
7409 			goto done;
7410 		}
7411 		if (!S_ISREG(statbuf.st_mode)) {
7412 			zerr(gettext("%s is not a regular file."), file);
7413 			err = Z_ERR;
7414 			goto done;
7415 		}
7416 		yyin = infile;
7417 		cmd_file_mode = B_TRUE;
7418 		ok_to_prompt = B_FALSE;
7419 	} else {
7420 		/*
7421 		 * "-f -" is essentially the same as interactive mode,
7422 		 * so treat it that way.
7423 		 */
7424 		interactive_mode = B_TRUE;
7425 	}
7426 	/* Z_REPEAT is for interactive mode; treat it like Z_ERR here. */
7427 	if ((err = read_input()) == Z_REPEAT)
7428 		err = Z_ERR;
7429 done:
7430 	if (using_real_file)
7431 		(void) fclose(infile);
7432 	return (err);
7433 }
7434 
7435 /*
7436  * Since yacc is based on reading from a (FILE *) whereas what we get from
7437  * the command line is in argv format, we need to convert when the user
7438  * gives us commands directly from the command line.  That is done here by
7439  * concatenating the argv list into a space-separated string, writing it
7440  * to a temp file, and rewinding the file so yyin can be set to it.  Then
7441  * we call read_input(), and only once, since prompting about whether to
7442  * continue or quit would make no sense in this context.
7443  */
7444 
7445 static int
7446 one_command_at_a_time(int argc, char *argv[])
7447 {
7448 	char *command;
7449 	size_t len = 2; /* terminal \n\0 */
7450 	int i, err;
7451 
7452 	for (i = 0; i < argc; i++)
7453 		len += strlen(argv[i]) + 1;
7454 	if ((command = malloc(len)) == NULL) {
7455 		zone_perror(execname, Z_NOMEM, B_TRUE);
7456 		return (Z_ERR);
7457 	}
7458 	(void) strlcpy(command, argv[0], len);
7459 	for (i = 1; i < argc; i++) {
7460 		(void) strlcat(command, " ", len);
7461 		(void) strlcat(command, argv[i], len);
7462 	}
7463 	(void) strlcat(command, "\n", len);
7464 	err = string_to_yyin(command);
7465 	free(command);
7466 	if (err != Z_OK)
7467 		return (err);
7468 	while (!feof(yyin))
7469 		yyparse();
7470 	return (cleanup());
7471 }
7472 
7473 static char *
7474 get_execbasename(char *execfullname)
7475 {
7476 	char *last_slash, *execbasename;
7477 
7478 	/* guard against '/' at end of command invocation */
7479 	for (;;) {
7480 		last_slash = strrchr(execfullname, '/');
7481 		if (last_slash == NULL) {
7482 			execbasename = execfullname;
7483 			break;
7484 		} else {
7485 			execbasename = last_slash + 1;
7486 			if (*execbasename == '\0') {
7487 				*last_slash = '\0';
7488 				continue;
7489 			}
7490 			break;
7491 		}
7492 	}
7493 	return (execbasename);
7494 }
7495 
7496 int
7497 main(int argc, char *argv[])
7498 {
7499 	int err, arg;
7500 	struct stat st;
7501 
7502 	/* This must be before anything goes to stdout. */
7503 	setbuf(stdout, NULL);
7504 
7505 	saw_error = B_FALSE;
7506 	cmd_file_mode = B_FALSE;
7507 	execname = get_execbasename(argv[0]);
7508 
7509 	(void) setlocale(LC_ALL, "");
7510 	(void) textdomain(TEXT_DOMAIN);
7511 
7512 	if (getzoneid() != GLOBAL_ZONEID) {
7513 		zerr(gettext("%s can only be run from the global zone."),
7514 		    execname);
7515 		exit(Z_ERR);
7516 	}
7517 
7518 	if (argc < 2) {
7519 		usage(B_FALSE, HELP_USAGE | HELP_SUBCMDS);
7520 		exit(Z_USAGE);
7521 	}
7522 	if (strcmp(argv[1], cmd_to_str(CMD_HELP)) == 0) {
7523 		(void) one_command_at_a_time(argc - 1, &(argv[1]));
7524 		exit(Z_OK);
7525 	}
7526 
7527 	while ((arg = getopt(argc, argv, "?f:R:z:")) != EOF) {
7528 		switch (arg) {
7529 		case '?':
7530 			if (optopt == '?')
7531 				usage(B_TRUE, HELP_USAGE | HELP_SUBCMDS);
7532 			else
7533 				usage(B_FALSE, HELP_USAGE);
7534 			exit(Z_USAGE);
7535 			/* NOTREACHED */
7536 		case 'f':
7537 			cmd_file_name = optarg;
7538 			cmd_file_mode = B_TRUE;
7539 			break;
7540 		case 'R':
7541 			if (*optarg != '/') {
7542 				zerr(gettext("root path must be absolute: %s"),
7543 				    optarg);
7544 				exit(Z_USAGE);
7545 			}
7546 			if (stat(optarg, &st) == -1 || !S_ISDIR(st.st_mode)) {
7547 				zerr(gettext(
7548 				    "root path must be a directory: %s"),
7549 				    optarg);
7550 				exit(Z_USAGE);
7551 			}
7552 			zonecfg_set_root(optarg);
7553 			break;
7554 		case 'z':
7555 			if (strcmp(optarg, GLOBAL_ZONENAME) == 0) {
7556 				global_zone = B_TRUE;
7557 			} else if (zonecfg_validate_zonename(optarg) != Z_OK) {
7558 				zone_perror(optarg, Z_BOGUS_ZONE_NAME, B_TRUE);
7559 				usage(B_FALSE, HELP_SYNTAX);
7560 				exit(Z_USAGE);
7561 			}
7562 			(void) strlcpy(zone, optarg, sizeof (zone));
7563 			(void) strlcpy(revert_zone, optarg, sizeof (zone));
7564 			break;
7565 		default:
7566 			usage(B_FALSE, HELP_USAGE);
7567 			exit(Z_USAGE);
7568 		}
7569 	}
7570 
7571 	if (optind > argc || strcmp(zone, "") == 0) {
7572 		usage(B_FALSE, HELP_USAGE);
7573 		exit(Z_USAGE);
7574 	}
7575 
7576 	if ((err = zonecfg_access(zone, W_OK)) == Z_OK) {
7577 		read_only_mode = B_FALSE;
7578 	} else if (err == Z_ACCES) {
7579 		read_only_mode = B_TRUE;
7580 		/* skip this message in one-off from command line mode */
7581 		if (optind == argc)
7582 			(void) fprintf(stderr, gettext("WARNING: you do not "
7583 			    "have write access to this zone's configuration "
7584 			    "file;\ngoing into read-only mode.\n"));
7585 	} else {
7586 		fprintf(stderr, "%s: Could not access zone configuration "
7587 		    "store: %s\n", execname, zonecfg_strerror(err));
7588 		exit(Z_ERR);
7589 	}
7590 
7591 	if ((handle = zonecfg_init_handle()) == NULL) {
7592 		zone_perror(execname, Z_NOMEM, B_TRUE);
7593 		exit(Z_ERR);
7594 	}
7595 
7596 	/*
7597 	 * This may get set back to FALSE again in cmd_file() if cmd_file_name
7598 	 * is a "real" file as opposed to "-" (i.e. meaning use stdin).
7599 	 */
7600 	if (isatty(STDIN_FILENO))
7601 		ok_to_prompt = B_TRUE;
7602 	if ((gl = new_GetLine(MAX_LINE_LEN, MAX_CMD_HIST)) == NULL)
7603 		exit(Z_ERR);
7604 	if (gl_customize_completion(gl, NULL, cmd_cpl_fn) != 0)
7605 		exit(Z_ERR);
7606 	(void) sigset(SIGINT, SIG_IGN);
7607 	if (optind == argc) {
7608 		if (!cmd_file_mode)
7609 			err = do_interactive();
7610 		else
7611 			err = cmd_file(cmd_file_name);
7612 	} else {
7613 		err = one_command_at_a_time(argc - optind, &(argv[optind]));
7614 	}
7615 	zonecfg_fini_handle(handle);
7616 	if (brand != NULL)
7617 		brand_close(brand);
7618 	(void) del_GetLine(gl);
7619 	return (err);
7620 }
7621