Mercurial > illumos > illumos-gate
view usr/src/cmd/dumpadm/main.c @ 12979:ab9ae749152f
PSARC/2009/617 Software Events Notification Parameters CLI
PSARC/2009/618 snmp-notify: SNMP Notification Daemon for Software Events
PSARC/2009/619 smtp-notify: Email Notification Daemon for Software Events
PSARC/2010/225 fmd for non-global Solaris zones
PSARC/2010/226 Solaris Instance UUID
PSARC/2010/227 nvlist_nvflag(3NVPAIR)
PSARC/2010/228 libfmevent additions
PSARC/2010/257 sysevent_evc_setpropnvl and sysevent_evc_getpropnvl
PSARC/2010/265 FMRI and FMA Event Stabilty, 'ireport' category 1 event class, and the 'sw' FMRI scheme
PSARC/2010/278 FMA/SMF integration: instance state transitions
PSARC/2010/279 Modelling panics within FMA
PSARC/2010/290 logadm.conf upgrade
6392476 fmdump needs to pretty-print
6393375 userland ereport/ireport event generation interfaces
6445732 Add email notification agent for FMA and software events
6804168 RFE: Allow an efficient means to monitor SMF services status changes
6866661 scf_values_destroy(3SCF) will segfault if is passed NULL
6884709 Add snmp notification agent for FMA and software events
6884712 Add private interface to tap into libfmd_msg macro expansion capabilities
6897919 fmd to run in a non-global zone
6897937 fmd use of non-private doors is not safe
6900081 add a UUID to Solaris kernel image for use in crashdump identification
6914884 model panic events as a defect diagnosis in FMA
6944862 fmd_case_open_uuid, fmd_case_uuisresolved, fmd_nvl_create_defect
6944866 log legacy sysevents in fmd
6944867 enumerate svc scheme in topo
6944868 software-diagnosis and software-response fmd modules
6944870 model SMF maintenance state as a defect diagnosis in FMA
6944876 savecore runs in foreground for systems with zfs root and dedicated dump
6965796 Implement notification parameters for SMF state transitions and FMA events
6968287 SUN-FM-MIB.mib needs to be updated to reflect Oracle information
6972331 logadm.conf upgrade PSARC/2010/290
author | Gavin Maltby <gavin.maltby@oracle.com> |
---|---|
date | Fri, 30 Jul 2010 17:04:17 +1000 |
parents | eb166ea6e74e |
children |
line wrap: on
line source
/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License (the "License"). * You may not use this file except in compliance with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright (c) 1998, 2010, Oracle and/or its affiliates. All rights reserved. */ #include <sys/stat.h> #include <locale.h> #include <unistd.h> #include <stdlib.h> #include <stdio.h> #include <string.h> #include "dconf.h" #include "minfree.h" #include "utils.h" static const char USAGE[] = "\ Usage: %s [-nuy] [-c kernel | curproc | all ] [-d dump-device | swap ]\n\ [-m min {k|m|%%} ] [-s savecore-dir] [-r root-dir] [-z on|off]\n"; static const char OPTS[] = "inuyc:d:m:s:r:z:"; static const char PATH_DEVICE[] = "/dev/dump"; static const char PATH_CONFIG[] = "/etc/dumpadm.conf"; int main(int argc, char *argv[]) { const char *pname = getpname(argv[0]); u_longlong_t minf; struct stat st; int c; int dflag = 0; /* for checking in use during -d ops */ int dcmode = DC_CURRENT; /* kernel settings override unless -u */ int modified = 0; /* have we modified the dump config? */ char *minfstr = NULL; /* string value of -m argument */ dumpconf_t dc; /* current configuration */ int chrooted = 0; int douuid = 0; (void) setlocale(LC_ALL, ""); (void) textdomain(TEXT_DOMAIN); /* * Take an initial lap through argv hunting for -r root-dir, * so that we can chroot before opening the configuration file. * We also handle -u and any bad options at this point. */ while (optind < argc) { while ((c = getopt(argc, argv, OPTS)) != (int)EOF) { if (c == 'r' && ++chrooted && chroot(optarg) == -1) die(gettext("failed to chroot to %s"), optarg); else if (c == 'u') dcmode = DC_OVERRIDE; else if (c == '?') { (void) fprintf(stderr, gettext(USAGE), pname); return (E_USAGE); } } if (optind < argc) { warn(gettext("illegal argument -- %s\n"), argv[optind]); (void) fprintf(stderr, gettext(USAGE), pname); return (E_USAGE); } } if (geteuid() != 0) die(gettext("you must be root to use %s\n"), pname); /* * If no config file exists yet, we're going to create an empty one, * so set the modified flag to force writing out the file. */ if (access(PATH_CONFIG, F_OK) == -1) modified++; /* * Now open and read in the initial values from the config file. * If it doesn't exist, we create an empty file and dc is * initialized with the default values. */ if (dconf_open(&dc, PATH_DEVICE, PATH_CONFIG, dcmode) == -1) return (E_ERROR); /* * Take another lap through argv, processing options and * modifying the dumpconf_t as appropriate. */ for (optind = 1; optind < argc; optind++) { while ((c = getopt(argc, argv, OPTS)) != (int)EOF) { switch (c) { case 'c': if (dconf_str2content(&dc, optarg) == -1) return (E_USAGE); modified++; break; case 'd': if (dconf_str2device(&dc, optarg) == -1) return (E_USAGE); dflag++; modified++; break; case 'i': /* undocumented option */ if (chrooted) { warn(gettext("-i and -r cannot be " "used together\n")); return (E_USAGE); } douuid++; break; case 'm': minfstr = optarg; break; case 'n': dc.dc_enable = DC_OFF; modified++; break; case 's': if (stat(optarg, &st) == -1 || !S_ISDIR(st.st_mode)) { warn(gettext("%s is missing or not a " "directory\n"), optarg); return (E_USAGE); } if (dconf_str2savdir(&dc, optarg) == -1) return (E_USAGE); modified++; break; case 'y': dc.dc_enable = DC_ON; modified++; break; case 'z': if (dconf_str2csave(&dc, optarg) == -1) return (E_USAGE); modified++; break; } } } if (douuid) return (dconf_write_uuid(&dc) ? E_SUCCESS : E_ERROR); if (minfstr != NULL) { if (minfree_compute(dc.dc_savdir, minfstr, &minf) == -1) return (E_USAGE); if (minfree_write(dc.dc_savdir, minf) == -1) return (E_ERROR); } if (dcmode == DC_OVERRIDE) { /* * In override mode, we try to force an update. If this * fails, we re-load the kernel configuration and write that * out to the file in order to force the file in sync. * * We allow the file to be read-only but print a warning to the * user that indicates it hasn't been updated. */ if (dconf_update(&dc, 0) == -1) (void) dconf_getdev(&dc); if (dc.dc_readonly) warn(gettext("kernel settings updated, but " "%s is read-only\n"), PATH_CONFIG); else if (dconf_write(&dc) == -1) return (E_ERROR); } else if (modified) { /* * If we're modifying the configuration, then try * to update it, and write out the file if successful. */ if (dc.dc_readonly) { warn(gettext("failed to update settings: %s is " "read-only\n"), PATH_CONFIG); return (E_ERROR); } if (dconf_update(&dc, dflag) == -1 || dconf_write(&dc) == -1) return (E_ERROR); } if (dcmode == DC_CURRENT) dconf_print(&dc, stdout); if (dconf_close(&dc) == -1) warn(gettext("failed to close configuration file")); return (E_SUCCESS); }