Print this page
NEX-17772 libfmd_snmp should learn about new FmProblem fields
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
| Split |
Close |
| Expand all |
| Collapse all |
--- old/usr/src/cmd/fm/fmd/common/fmd_protocol.c
+++ new/usr/src/cmd/fm/fmd/common/fmd_protocol.c
1 1 /*
2 2 * CDDL HEADER START
3 3 *
4 4 * The contents of this file are subject to the terms of the
5 5 * Common Development and Distribution License (the "License").
6 6 * You may not use this file except in compliance with the License.
7 7 *
8 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 9 * or http://www.opensolaris.org/os/licensing.
10 10 * See the License for the specific language governing permissions
11 11 * and limitations under the License.
12 12 *
13 13 * When distributing Covered Code, include this CDDL HEADER in each
14 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 15 * If applicable, add the following below this CDDL HEADER, with the
16 16 * fields enclosed by brackets "[]" replaced with your own identifying
|
↓ open down ↓ |
16 lines elided |
↑ open up ↑ |
17 17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 18 *
19 19 * CDDL HEADER END
20 20 */
21 21
22 22 /*
23 23 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
24 24 * Use is subject to license terms.
25 25 */
26 26
27 +/*
28 + * Copyright 2018 Nexenta Systems, Inc.
29 + */
30 +
27 31 #include <sys/fm/protocol.h>
32 +
28 33 #include <fm/fmd_msg.h>
29 -#include <strings.h>
34 +
30 35 #include <alloca.h>
31 36 #include <stdio.h>
37 +#include <strings.h>
32 38
33 39 #include <fmd_protocol.h>
34 40 #include <fmd_module.h>
35 41 #include <fmd_conf.h>
36 42 #include <fmd_subr.h>
37 43 #include <fmd_error.h>
38 44 #include <fmd_time.h>
39 45 #include <fmd.h>
40 46
41 47 /*
42 48 * Create an FMRI authority element for the environment in which this instance
43 49 * of fmd is deployed. This function is called once and the result is cached.
44 50 */
45 51 nvlist_t *
46 52 fmd_protocol_authority(void)
47 53 {
48 54 const char *str;
49 55 nvlist_t *nvl;
50 56 int err = 0;
51 57
52 58 if (nvlist_xalloc(&nvl, NV_UNIQUE_NAME, &fmd.d_nva) != 0)
53 59 fmd_panic("failed to xalloc authority nvlist");
54 60
55 61 err |= nvlist_add_uint8(nvl, FM_VERSION, FM_FMRI_AUTH_VERSION);
56 62
57 63 if ((str = fmd_conf_getnzstr(fmd.d_conf, "product")) == NULL)
58 64 str = fmd_conf_getnzstr(fmd.d_conf, "platform");
59 65
60 66 if (str != NULL)
61 67 err |= nvlist_add_string(nvl, FM_FMRI_AUTH_PRODUCT, str);
62 68
63 69 if ((str = fmd_conf_getnzstr(fmd.d_conf, "product_sn")) != NULL)
64 70 err |= nvlist_add_string(nvl, FM_FMRI_AUTH_PRODUCT_SN, str);
65 71
66 72 if ((str = fmd_conf_getnzstr(fmd.d_conf, "chassis")) != NULL)
67 73 err |= nvlist_add_string(nvl, FM_FMRI_AUTH_CHASSIS, str);
68 74
69 75 if ((str = fmd_conf_getnzstr(fmd.d_conf, "domain")) != NULL)
70 76 err |= nvlist_add_string(nvl, FM_FMRI_AUTH_DOMAIN, str);
71 77
72 78 if ((str = fmd_conf_getnzstr(fmd.d_conf, "server")) != NULL)
73 79 err |= nvlist_add_string(nvl, FM_FMRI_AUTH_SERVER, str);
74 80
75 81 if (err != 0)
76 82 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
77 83
78 84 return (nvl);
79 85 }
80 86
81 87 /*
82 88 * Create an FMRI for the specified module. We use the cached authority
83 89 * nvlist saved in fmd.d_auth to fill in the authority member.
84 90 */
85 91 nvlist_t *
86 92 fmd_protocol_fmri_module(fmd_module_t *mp)
87 93 {
88 94 nvlist_t *nvl;
89 95 int err = 0;
90 96
91 97 if (nvlist_xalloc(&nvl, NV_UNIQUE_NAME, &fmd.d_nva) != 0)
92 98 fmd_panic("failed to xalloc diag-engine fmri nvlist");
93 99
94 100 err |= nvlist_add_uint8(nvl, FM_VERSION, FM_FMD_SCHEME_VERSION);
95 101 err |= nvlist_add_string(nvl, FM_FMRI_SCHEME, FM_FMRI_SCHEME_FMD);
96 102 err |= nvlist_add_nvlist(nvl, FM_FMRI_AUTHORITY, fmd.d_auth);
97 103 err |= nvlist_add_string(nvl, FM_FMRI_FMD_NAME, mp->mod_name);
98 104
99 105 if (mp->mod_info != NULL) {
100 106 err |= nvlist_add_string(nvl,
101 107 FM_FMRI_FMD_VERSION, mp->mod_info->fmdi_vers);
102 108 } else if (mp == fmd.d_rmod) {
103 109 err |= nvlist_add_string(nvl,
104 110 FM_FMRI_FMD_VERSION, fmd.d_version);
105 111 }
106 112
107 113 if (err != 0)
108 114 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
109 115
110 116 return (nvl);
111 117 }
112 118
113 119 nvlist_t *
114 120 fmd_protocol_fault(const char *class, uint8_t certainty,
115 121 nvlist_t *asru, nvlist_t *fru, nvlist_t *resource, const char *location)
116 122 {
117 123 nvlist_t *nvl;
118 124 int err = 0;
119 125
120 126 if (nvlist_xalloc(&nvl, NV_UNIQUE_NAME, &fmd.d_nva) != 0)
121 127 fmd_panic("failed to xalloc fault nvlist");
122 128
123 129 err |= nvlist_add_uint8(nvl, FM_VERSION, FM_FAULT_VERSION);
124 130 err |= nvlist_add_string(nvl, FM_CLASS, class);
125 131 err |= nvlist_add_uint8(nvl, FM_FAULT_CERTAINTY, certainty);
126 132
127 133 if (asru != NULL)
128 134 err |= nvlist_add_nvlist(nvl, FM_FAULT_ASRU, asru);
129 135 if (fru != NULL)
130 136 err |= nvlist_add_nvlist(nvl, FM_FAULT_FRU, fru);
131 137 if (resource != NULL)
132 138 err |= nvlist_add_nvlist(nvl, FM_FAULT_RESOURCE, resource);
133 139 if (location != NULL)
134 140 err |= nvlist_add_string(nvl, FM_FAULT_LOCATION, location);
135 141
136 142 if (err != 0)
137 143 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
138 144
139 145 return (nvl);
140 146 }
|
↓ open down ↓ |
99 lines elided |
↑ open up ↑ |
141 147
142 148 nvlist_t *
143 149 fmd_protocol_list(const char *class, nvlist_t *de_fmri, const char *uuid,
144 150 const char *code, uint_t argc, nvlist_t **argv, uint8_t *flagv, int domsg,
145 151 struct timeval *tvp, int injected)
146 152 {
147 153 int64_t tod[2];
148 154 nvlist_t *nvl;
149 155 int err = 0;
150 156 fmd_msg_hdl_t *msghdl;
151 - char *severity;
157 + char *item;
152 158
153 159 tod[0] = tvp->tv_sec;
154 160 tod[1] = tvp->tv_usec;
155 161
156 162 if (nvlist_xalloc(&nvl, NV_UNIQUE_NAME, &fmd.d_nva) != 0)
157 163 fmd_panic("failed to xalloc suspect list nvlist");
158 164
159 165 err |= nvlist_add_uint8(nvl, FM_VERSION, FM_SUSPECT_VERSION);
160 166 err |= nvlist_add_string(nvl, FM_CLASS, class);
161 167 err |= nvlist_add_string(nvl, FM_SUSPECT_UUID, uuid);
162 168 err |= nvlist_add_string(nvl, FM_SUSPECT_DIAG_CODE, code);
163 169 err |= nvlist_add_int64_array(nvl, FM_SUSPECT_DIAG_TIME, tod, 2);
164 170 err |= nvlist_add_nvlist(nvl, FM_SUSPECT_DE, de_fmri);
165 171 err |= nvlist_add_uint32(nvl, FM_SUSPECT_FAULT_SZ, argc);
166 172
167 173 if (injected)
168 174 err |= nvlist_add_boolean_value(nvl, FM_SUSPECT_INJECTED,
169 175 B_TRUE);
170 176
171 177 if (!domsg) {
172 178 err |= nvlist_add_boolean_value(nvl,
173 179 FM_SUSPECT_MESSAGE, B_FALSE);
|
↓ open down ↓ |
12 lines elided |
↑ open up ↑ |
174 180 }
175 181
176 182 if (argc != 0) {
177 183 err |= nvlist_add_nvlist_array(nvl,
178 184 FM_SUSPECT_FAULT_LIST, argv, argc);
179 185 err |= nvlist_add_uint8_array(nvl,
180 186 FM_SUSPECT_FAULT_STATUS, flagv, argc);
181 187 }
182 188
183 189 /*
184 - * Attempt to lookup the severity associated with this diagnosis from
185 - * the portable object file using the diag code. Failure to init
186 - * libfmd_msg or add to the nvlist will be treated as fatal. However,
187 - * we won't treat a fmd_msg_getitem_id failure as fatal since during
188 - * development it's not uncommon to be working with po/dict files that
189 - * haven't yet been updated with newly added diagnoses.
190 + * Attempt to lookup the type, severity, and description associated with
191 + * this diagnosis from the portable object file using the diag code.
192 + * Failure to init libfmd_msg or add to the nvlist will be treated as
193 + * fatal. However, we won't treat a fmd_msg_getitem_id failure as fatal
194 + * since during development it's not uncommon to be working with po/dict
195 + * files that haven't yet been updated with newly added diagnoses.
190 196 */
191 197 msghdl = fmd_msg_init(fmd.d_rootdir, FMD_MSG_VERSION);
192 198 if (msghdl == NULL)
193 199 fmd_panic("failed to initialize libfmd_msg\n");
194 200
195 - if ((severity = fmd_msg_getitem_id(msghdl, NULL, code,
201 + if ((item = fmd_msg_getitem_id(msghdl, NULL, code,
202 + FMD_MSG_ITEM_TYPE)) != NULL) {
203 + err |= nvlist_add_string(nvl, FM_SUSPECT_TYPE, item);
204 + free(item);
205 + }
206 + if ((item = fmd_msg_getitem_id(msghdl, NULL, code,
196 207 FMD_MSG_ITEM_SEVERITY)) != NULL) {
197 - err |= nvlist_add_string(nvl, FM_SUSPECT_SEVERITY, severity);
198 - free(severity);
208 + err |= nvlist_add_string(nvl, FM_SUSPECT_SEVERITY, item);
209 + free(item);
199 210 }
211 + if ((item = fmd_msg_getitem_id(msghdl, NULL, code,
212 + FMD_MSG_ITEM_DESC)) != NULL) {
213 + err |= nvlist_add_string(nvl, FM_SUSPECT_DESC, item);
214 + free(item);
215 + }
200 216 fmd_msg_fini(msghdl);
201 217
202 218 if (err != 0)
203 219 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
204 220
205 221 return (nvl);
206 222 }
207 223
208 224 nvlist_t *
209 225 fmd_protocol_rsrc_asru(const char *class,
210 226 nvlist_t *fmri, const char *uuid, const char *code,
211 227 boolean_t faulty, boolean_t unusable, boolean_t message, nvlist_t *event,
212 228 struct timeval *tvp, boolean_t repaired, boolean_t replaced,
213 229 boolean_t acquitted, boolean_t resolved, nvlist_t *diag_de,
214 230 boolean_t injected)
215 231 {
216 232 nvlist_t *nvl;
217 233 int64_t tod[2];
218 234 int err = 0;
219 235
220 236 tod[0] = tvp->tv_sec;
221 237 tod[1] = tvp->tv_usec;
222 238
223 239 if (nvlist_xalloc(&nvl, NV_UNIQUE_NAME, &fmd.d_nva) != 0)
224 240 fmd_panic("failed to xalloc resource nvlist");
225 241
226 242 err |= nvlist_add_uint8(nvl, FM_VERSION, FM_RSRC_VERSION);
227 243 err |= nvlist_add_string(nvl, FM_CLASS, class);
228 244 if (fmri != NULL)
229 245 err |= nvlist_add_nvlist(nvl, FM_RSRC_RESOURCE, fmri);
230 246
231 247 if (uuid != NULL)
232 248 err |= nvlist_add_string(nvl, FM_RSRC_ASRU_UUID, uuid);
233 249
234 250 if (code != NULL)
235 251 err |= nvlist_add_string(nvl, FM_RSRC_ASRU_CODE, code);
236 252
237 253 err |= nvlist_add_boolean_value(nvl, FM_RSRC_ASRU_FAULTY, faulty);
238 254 err |= nvlist_add_boolean_value(nvl, FM_RSRC_ASRU_REPAIRED, repaired);
239 255 err |= nvlist_add_boolean_value(nvl, FM_RSRC_ASRU_REPLACED, replaced);
240 256 err |= nvlist_add_boolean_value(nvl, FM_RSRC_ASRU_ACQUITTED, acquitted);
241 257 err |= nvlist_add_boolean_value(nvl, FM_RSRC_ASRU_RESOLVED, resolved);
242 258 err |= nvlist_add_boolean_value(nvl, FM_RSRC_ASRU_UNUSABLE, unusable);
243 259 err |= nvlist_add_boolean_value(nvl, FM_SUSPECT_MESSAGE, message);
244 260 err |= nvlist_add_int64_array(nvl, FM_SUSPECT_DIAG_TIME, tod, 2);
245 261
246 262 if (diag_de != NULL)
247 263 err |= nvlist_add_nvlist(nvl, FM_SUSPECT_DE, diag_de);
248 264 if (injected)
249 265 err |= nvlist_add_boolean_value(nvl, FM_SUSPECT_INJECTED,
250 266 B_TRUE);
251 267
252 268 if (event != NULL)
253 269 err |= nvlist_add_nvlist(nvl, FM_RSRC_ASRU_EVENT, event);
254 270
255 271 if (err != 0)
256 272 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
257 273
258 274 return (nvl);
259 275 }
260 276
261 277 nvlist_t *
262 278 fmd_protocol_fmderror(int errnum, const char *format, va_list ap)
263 279 {
264 280 uint64_t ena = fmd_ena();
265 281 nvlist_t *nvl;
266 282 int err = 0;
267 283 char c, *msg;
268 284 size_t len;
269 285
270 286 if (nvlist_xalloc(&nvl, NV_UNIQUE_NAME, &fmd.d_nva) != 0)
271 287 return (NULL);
272 288
273 289 len = vsnprintf(&c, 1, format, ap);
274 290 msg = alloca(len + 1);
275 291 (void) vsnprintf(msg, len + 1, format, ap);
276 292
277 293 if (msg[len] == '\n')
278 294 msg[len] = '\0';
279 295
280 296 err |= nvlist_add_uint8(nvl, FM_VERSION, FM_EREPORT_VERSION);
281 297 err |= nvlist_add_string(nvl, FM_CLASS, fmd_errclass(errnum));
282 298 err |= nvlist_add_uint64(nvl, FM_EREPORT_ENA, ena);
283 299 err |= nvlist_add_string(nvl, FMD_ERR_MOD_MSG, msg);
284 300
285 301 if (err != 0) {
286 302 nvlist_free(nvl);
287 303 return (NULL);
288 304 }
289 305
290 306 return (nvl);
291 307 }
292 308
293 309 nvlist_t *
294 310 fmd_protocol_moderror(fmd_module_t *mp, int oserr, const char *msg)
295 311 {
296 312 uint64_t ena = fmd_ena();
297 313 nvlist_t *nvl, *fmri;
298 314 int err = 0;
299 315
300 316 if (nvlist_xalloc(&nvl, NV_UNIQUE_NAME, &fmd.d_nva) != 0)
301 317 fmd_panic("failed to xalloc module error nvlist");
302 318
303 319 if (mp->mod_fmri == NULL)
304 320 fmri = fmd_protocol_fmri_module(mp);
305 321 else
306 322 fmri = mp->mod_fmri;
307 323
308 324 err |= nvlist_add_uint8(nvl, FM_VERSION, FM_EREPORT_VERSION);
309 325 err |= nvlist_add_string(nvl, FM_CLASS, fmd_errclass(EFMD_MODULE));
310 326 err |= nvlist_add_nvlist(nvl, FM_EREPORT_DETECTOR, fmri);
311 327 err |= nvlist_add_uint64(nvl, FM_EREPORT_ENA, ena);
312 328 err |= nvlist_add_string(nvl, FMD_ERR_MOD_MSG, msg);
313 329
314 330 if (mp->mod_fmri == NULL)
315 331 nvlist_free(fmri);
316 332
317 333 if (oserr != 0) {
318 334 err |= nvlist_add_int32(nvl, FMD_ERR_MOD_ERRNO, oserr);
319 335 err |= nvlist_add_string(nvl, FMD_ERR_MOD_ERRCLASS,
320 336 fmd_errclass(oserr));
321 337 }
322 338
323 339 if (err != 0)
324 340 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
325 341
326 342 return (nvl);
327 343 }
328 344
329 345 nvlist_t *
330 346 fmd_protocol_xprt_ctl(fmd_module_t *mp, const char *class, uint8_t version)
331 347 {
332 348 nvlist_t *nvl;
333 349 int err = 0;
334 350
335 351 if (nvlist_xalloc(&nvl, NV_UNIQUE_NAME, &fmd.d_nva) != 0)
336 352 fmd_panic("failed to xalloc rsrc xprt nvlist");
337 353
338 354 err |= nvlist_add_uint8(nvl, FM_VERSION, version);
339 355 err |= nvlist_add_string(nvl, FM_CLASS, class);
340 356 err |= nvlist_add_nvlist(nvl, FM_RSRC_RESOURCE, mp->mod_fmri);
341 357
342 358 if (err != 0)
343 359 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
344 360
345 361 return (nvl);
346 362 }
347 363
348 364 nvlist_t *
349 365 fmd_protocol_xprt_sub(fmd_module_t *mp,
350 366 const char *class, uint8_t version, const char *subclass)
351 367 {
352 368 nvlist_t *nvl = fmd_protocol_xprt_ctl(mp, class, version);
353 369 int err = nvlist_add_string(nvl, FM_RSRC_XPRT_SUBCLASS, subclass);
354 370
355 371 if (err != 0)
356 372 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
357 373
358 374 return (nvl);
359 375 }
360 376
361 377 nvlist_t *
362 378 fmd_protocol_xprt_uuclose(fmd_module_t *mp, const char *class, uint8_t version,
363 379 const char *uuid)
364 380 {
365 381 nvlist_t *nvl = fmd_protocol_xprt_ctl(mp, class, version);
366 382 int err = nvlist_add_string(nvl, FM_RSRC_XPRT_UUID, uuid);
367 383
368 384 if (err != 0)
369 385 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
370 386
371 387 return (nvl);
372 388 }
373 389
374 390 nvlist_t *
375 391 fmd_protocol_xprt_uuresolved(fmd_module_t *mp, const char *class,
376 392 uint8_t version, const char *uuid)
377 393 {
378 394 nvlist_t *nvl = fmd_protocol_xprt_ctl(mp, class, version);
379 395 int err = nvlist_add_string(nvl, FM_RSRC_XPRT_UUID, uuid);
380 396
381 397 if (err != 0)
382 398 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
383 399
384 400 return (nvl);
385 401 }
386 402
387 403 nvlist_t *
388 404 fmd_protocol_xprt_updated(fmd_module_t *mp, const char *class, uint8_t version,
389 405 const char *uuid, uint8_t *statusp, uint8_t *has_asrup, uint_t nelem)
390 406 {
391 407 nvlist_t *nvl = fmd_protocol_xprt_ctl(mp, class, version);
392 408 int err = nvlist_add_string(nvl, FM_RSRC_XPRT_UUID, uuid);
393 409
394 410 err |= nvlist_add_uint8_array(nvl, FM_RSRC_XPRT_FAULT_STATUS, statusp,
395 411 nelem);
396 412 if (has_asrup)
397 413 err |= nvlist_add_uint8_array(nvl, FM_RSRC_XPRT_FAULT_HAS_ASRU,
398 414 has_asrup, nelem);
399 415
400 416 if (err != 0)
401 417 fmd_panic("failed to populate nvlist: %s\n", fmd_strerror(err));
402 418
403 419 return (nvl);
404 420 }
|
↓ open down ↓ |
195 lines elided |
↑ open up ↑ |
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX