1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 /* 28 * The dlmgmtd daemon is started by the datalink-management SMF service. 29 * This daemon is used to manage <link name, linkid> mapping and the 30 * persistent datalink configuration. 31 * 32 * Today, the <link name, linkid> mapping and the persistent configuration 33 * of datalinks is kept in /etc/dladm/datalink.conf, and the daemon keeps 34 * a copy of the datalinks in the memory (see dlmgmt_id_avl and 35 * dlmgmt_name_avl). The active <link name, linkid> mapping is kept in 36 * /etc/svc/volatile/dladm cache file, so that the mapping can be recovered 37 * when dlmgmtd exits for some reason (e.g., when dlmgmtd is accidentally 38 * killed). 39 */ 40 41 #include <assert.h> 42 #include <errno.h> 43 #include <fcntl.h> 44 #include <priv.h> 45 #include <signal.h> 46 #include <stdlib.h> 47 #include <stdio.h> 48 #include <strings.h> 49 #include <syslog.h> 50 #include <zone.h> 51 #include <sys/dld.h> 52 #include <sys/dld_ioc.h> 53 #include <sys/param.h> 54 #include <sys/stat.h> 55 #include <unistd.h> 56 #include <libdladm_impl.h> 57 #include <libdlmgmt.h> 58 #include "dlmgmt_impl.h" 59 60 const char *progname; 61 boolean_t debug; 62 static int pfds[2]; 63 /* 64 * This file descriptor to DLMGMT_DOOR cannot be in the libdladm 65 * handle because the door isn't created when the handle is created. 66 */ 67 static int dlmgmt_door_fd = -1; 68 69 /* 70 * This libdladm handle is global so that dlmgmt_upcall_linkprop_init() can 71 * pass to libdladm. The handle is opened with "ALL" privileges, before 72 * privileges are dropped in dlmgmt_drop_privileges(). It is not able to open 73 * DLMGMT_DOOR at that time as it hasn't been created yet. This door in the 74 * handle is opened in the first call to dladm_door_fd(). 75 */ 76 dladm_handle_t dld_handle = NULL; 77 78 static void dlmgmtd_exit(int); 79 static int dlmgmt_init(); 80 static void dlmgmt_fini(); 81 static int dlmgmt_set_privileges(); 82 83 static int 84 dlmgmt_set_doorfd(boolean_t start) 85 { 86 dld_ioc_door_t did; 87 int err = 0; 88 89 assert(dld_handle != NULL); 90 91 did.did_start_door = start; 92 93 if (ioctl(dladm_dld_fd(dld_handle), DLDIOC_DOORSERVER, &did) == -1) 94 err = errno; 95 96 return (err); 97 } 98 99 static int 100 dlmgmt_door_init(void) 101 { 102 int err = 0; 103 104 if ((dlmgmt_door_fd = door_create(dlmgmt_handler, NULL, 105 DOOR_REFUSE_DESC | DOOR_NO_CANCEL)) == -1) { 106 err = errno; 107 dlmgmt_log(LOG_ERR, "door_create() failed: %s", 108 strerror(err)); 109 return (err); 110 } 111 return (err); 112 } 113 114 static void 115 dlmgmt_door_fini(void) 116 { 117 if (dlmgmt_door_fd == -1) 118 return; 119 120 if (door_revoke(dlmgmt_door_fd) == -1) { 121 dlmgmt_log(LOG_WARNING, "door_revoke(%s) failed: %s", 122 DLMGMT_DOOR, strerror(errno)); 123 } 124 (void) dlmgmt_set_doorfd(B_FALSE); 125 dlmgmt_door_fd = -1; 126 } 127 128 int 129 dlmgmt_door_attach(zoneid_t zoneid, char *rootdir) 130 { 131 int fd; 132 int err = 0; 133 char doorpath[MAXPATHLEN]; 134 135 (void) snprintf(doorpath, sizeof (doorpath), "%s%s", rootdir, 136 DLMGMT_DOOR); 137 138 /* 139 * Create the door file for dlmgmtd. 140 */ 141 if ((fd = open(doorpath, O_CREAT|O_RDONLY, 0644)) == -1) { 142 err = errno; 143 dlmgmt_log(LOG_ERR, "open(%s) failed: %s", doorpath, 144 strerror(err)); 145 return (err); 146 } 147 (void) close(fd); 148 if (chown(doorpath, UID_DLADM, GID_SYS) == -1) 149 return (errno); 150 151 /* 152 * fdetach first in case a previous daemon instance exited 153 * ungracefully. 154 */ 155 (void) fdetach(doorpath); 156 if (fattach(dlmgmt_door_fd, doorpath) != 0) { 157 err = errno; 158 dlmgmt_log(LOG_ERR, "fattach(%s) failed: %s", doorpath, 159 strerror(err)); 160 } else if (zoneid == GLOBAL_ZONEID) { 161 if ((err = dlmgmt_set_doorfd(B_TRUE)) != 0) { 162 dlmgmt_log(LOG_ERR, "cannot set kernel doorfd: %s", 163 strerror(err)); 164 } 165 } 166 167 return (err); 168 } 169 170 /* 171 * Create the /etc/svc/volatile/dladm/ directory if it doesn't exist, load the 172 * datalink.conf data for this zone, and create/attach the door rendezvous 173 * file. 174 */ 175 int 176 dlmgmt_zone_init(zoneid_t zoneid) 177 { 178 char rootdir[MAXPATHLEN], tmpfsdir[MAXPATHLEN]; 179 int err; 180 struct stat statbuf; 181 182 if (zoneid == GLOBAL_ZONEID) { 183 rootdir[0] = '\0'; 184 } else if (zone_getattr(zoneid, ZONE_ATTR_ROOT, rootdir, 185 sizeof (rootdir)) < 0) { 186 return (errno); 187 } 188 189 /* 190 * Create the DLMGMT_TMPFS_DIR directory. 191 */ 192 (void) snprintf(tmpfsdir, sizeof (tmpfsdir), "%s%s", rootdir, 193 DLMGMT_TMPFS_DIR); 194 if (stat(tmpfsdir, &statbuf) < 0) { 195 if (mkdir(tmpfsdir, (mode_t)0755) < 0) 196 return (errno); 197 } else if ((statbuf.st_mode & S_IFMT) != S_IFDIR) { 198 return (ENOTDIR); 199 } 200 201 if ((chmod(tmpfsdir, 0755) < 0) || 202 (chown(tmpfsdir, UID_DLADM, GID_SYS) < 0)) { 203 return (EPERM); 204 } 205 206 if ((err = dlmgmt_db_init(zoneid)) != 0) 207 return (err); 208 return (dlmgmt_door_attach(zoneid, rootdir)); 209 } 210 211 /* 212 * Initialize each running zone. 213 */ 214 static int 215 dlmgmt_allzones_init(void) 216 { 217 int err, i; 218 zoneid_t *zids = NULL; 219 uint_t nzids, nzids_saved; 220 221 if (zone_list(NULL, &nzids) != 0) 222 return (errno); 223 again: 224 nzids *= 2; 225 if ((zids = malloc(nzids * sizeof (zoneid_t))) == NULL) 226 return (errno); 227 nzids_saved = nzids; 228 if (zone_list(zids, &nzids) != 0) { 229 free(zids); 230 return (errno); 231 } 232 if (nzids > nzids_saved) { 233 free(zids); 234 goto again; 235 } 236 237 for (i = 0; i < nzids; i++) { 238 if ((err = dlmgmt_zone_init(zids[i])) != 0) 239 break; 240 } 241 free(zids); 242 return (err); 243 } 244 245 static int 246 dlmgmt_init(void) 247 { 248 int err; 249 char *fmri, *c; 250 char filename[MAXPATHLEN]; 251 252 if (dladm_open(&dld_handle) != DLADM_STATUS_OK) { 253 dlmgmt_log(LOG_ERR, "dladm_open() failed"); 254 return (EPERM); 255 } 256 257 if (signal(SIGTERM, dlmgmtd_exit) == SIG_ERR || 258 signal(SIGINT, dlmgmtd_exit) == SIG_ERR) { 259 err = errno; 260 dlmgmt_log(LOG_ERR, "signal() for SIGTERM/INT failed: %s", 261 strerror(err)); 262 return (err); 263 } 264 265 /* 266 * First derive the name of the cache file from the FMRI name. This 267 * cache name is used to keep active datalink configuration. 268 */ 269 if (debug) { 270 (void) snprintf(cachefile, MAXPATHLEN, "%s/%s%s", 271 DLMGMT_TMPFS_DIR, progname, ".debug.cache"); 272 } else { 273 if ((fmri = getenv("SMF_FMRI")) == NULL) { 274 dlmgmt_log(LOG_ERR, "dlmgmtd is an smf(5) managed " 275 "service and should not be run from the command " 276 "line."); 277 return (EINVAL); 278 } 279 280 /* 281 * The FMRI name is in the form of 282 * svc:/service/service:instance. We need to remove the 283 * prefix "svc:/" and replace '/' with '-'. The cache file 284 * name is in the form of "service:instance.cache". 285 */ 286 if ((c = strchr(fmri, '/')) != NULL) 287 c++; 288 else 289 c = fmri; 290 (void) snprintf(filename, MAXPATHLEN, "%s.cache", c); 291 c = filename; 292 while ((c = strchr(c, '/')) != NULL) 293 *c = '-'; 294 295 (void) snprintf(cachefile, MAXPATHLEN, "%s/%s", 296 DLMGMT_TMPFS_DIR, filename); 297 } 298 299 dlmgmt_linktable_init(); 300 if ((err = dlmgmt_door_init()) != 0) 301 goto done; 302 303 /* 304 * Load datalink configuration and create dlmgmtd door files for all 305 * currently running zones. 306 */ 307 if ((err = dlmgmt_allzones_init()) != 0) 308 dlmgmt_door_fini(); 309 310 done: 311 if (err != 0) 312 dlmgmt_linktable_fini(); 313 return (err); 314 } 315 316 static void 317 dlmgmt_fini(void) 318 { 319 dlmgmt_door_fini(); 320 dlmgmt_linktable_fini(); 321 if (dld_handle != NULL) { 322 dladm_close(dld_handle); 323 dld_handle = NULL; 324 } 325 } 326 327 /* 328 * This is called by the child process to inform the parent process to 329 * exit with the given return value. 330 */ 331 static void 332 dlmgmt_inform_parent_exit(int rv) 333 { 334 if (debug) 335 return; 336 337 if (write(pfds[1], &rv, sizeof (int)) != sizeof (int)) { 338 dlmgmt_log(LOG_WARNING, 339 "dlmgmt_inform_parent_exit() failed: %s", strerror(errno)); 340 (void) close(pfds[1]); 341 exit(EXIT_FAILURE); 342 } 343 (void) close(pfds[1]); 344 } 345 346 /*ARGSUSED*/ 347 static void 348 dlmgmtd_exit(int signo) 349 { 350 (void) close(pfds[1]); 351 dlmgmt_fini(); 352 exit(EXIT_FAILURE); 353 } 354 355 static void 356 usage(void) 357 { 358 (void) fprintf(stderr, "Usage: %s [-d]\n", progname); 359 exit(EXIT_FAILURE); 360 } 361 362 /* 363 * Restrict privileges to only those needed. 364 */ 365 int 366 dlmgmt_drop_privileges(void) 367 { 368 priv_set_t *pset; 369 priv_ptype_t ptype; 370 zoneid_t zoneid = getzoneid(); 371 int err = 0; 372 373 if ((pset = priv_allocset()) == NULL) 374 return (errno); 375 376 /* 377 * The global zone needs PRIV_PROC_FORK so that it can fork() when it 378 * issues db ops in non-global zones, PRIV_SYS_CONFIG to post 379 * sysevents, and PRIV_SYS_DL_CONFIG to initialize link properties in 380 * dlmgmt_upcall_linkprop_init(). 381 * 382 * We remove all privileges from the permitted (and thus effective) 383 * set in the non-global zone. When executing in a non-global zone, 384 * dlmgmtd only needs to read and write to files that it already owns. 385 */ 386 priv_emptyset(pset); 387 if (zoneid == GLOBAL_ZONEID) { 388 ptype = PRIV_EFFECTIVE; 389 if (priv_addset(pset, PRIV_PROC_FORK) == -1 || 390 priv_addset(pset, PRIV_SYS_CONFIG) == -1 || 391 priv_addset(pset, PRIV_SYS_DL_CONFIG) == -1) 392 err = errno; 393 } else { 394 ptype = PRIV_PERMITTED; 395 } 396 if (err == 0 && setppriv(PRIV_SET, ptype, pset) == -1) 397 err = errno; 398 done: 399 priv_freeset(pset); 400 return (err); 401 } 402 403 int 404 dlmgmt_elevate_privileges(void) 405 { 406 priv_set_t *privset; 407 int err = 0; 408 409 if ((privset = priv_str_to_set("zone", ",", NULL)) == NULL) 410 return (errno); 411 if (setppriv(PRIV_SET, PRIV_EFFECTIVE, privset) == -1) 412 err = errno; 413 priv_freeset(privset); 414 return (err); 415 } 416 417 /* 418 * Set the uid of this daemon to the "dladm" user and drop privileges to only 419 * those needed. 420 */ 421 static int 422 dlmgmt_set_privileges(void) 423 { 424 int err; 425 426 (void) setgroups(0, NULL); 427 if (setegid(GID_SYS) == -1 || seteuid(UID_DLADM) == -1) 428 err = errno; 429 else 430 err = dlmgmt_drop_privileges(); 431 done: 432 return (err); 433 } 434 435 /* 436 * Keep the pfds fd open, close other fds. 437 */ 438 /*ARGSUSED*/ 439 static int 440 closefunc(void *arg, int fd) 441 { 442 if (fd != pfds[1]) 443 (void) close(fd); 444 return (0); 445 } 446 447 static boolean_t 448 dlmgmt_daemonize(void) 449 { 450 pid_t pid; 451 int rv; 452 453 if (pipe(pfds) < 0) { 454 (void) fprintf(stderr, "%s: pipe() failed: %s\n", 455 progname, strerror(errno)); 456 exit(EXIT_FAILURE); 457 } 458 459 if ((pid = fork()) == -1) { 460 (void) fprintf(stderr, "%s: fork() failed: %s\n", 461 progname, strerror(errno)); 462 exit(EXIT_FAILURE); 463 } else if (pid > 0) { /* Parent */ 464 (void) close(pfds[1]); 465 466 /* 467 * Read the child process's return value from the pfds. 468 * If the child process exits unexpected, read() returns -1. 469 */ 470 if (read(pfds[0], &rv, sizeof (int)) != sizeof (int)) { 471 (void) kill(pid, SIGKILL); 472 rv = EXIT_FAILURE; 473 } 474 475 (void) close(pfds[0]); 476 exit(rv); 477 } 478 479 /* Child */ 480 (void) close(pfds[0]); 481 (void) setsid(); 482 483 /* 484 * Close all files except pfds[1]. 485 */ 486 (void) fdwalk(closefunc, NULL); 487 (void) chdir("/"); 488 openlog(progname, LOG_PID, LOG_DAEMON); 489 return (B_TRUE); 490 } 491 492 int 493 main(int argc, char *argv[]) 494 { 495 int opt, err; 496 497 progname = strrchr(argv[0], '/'); 498 if (progname != NULL) 499 progname++; 500 else 501 progname = argv[0]; 502 503 /* 504 * Process options. 505 */ 506 while ((opt = getopt(argc, argv, "d")) != EOF) { 507 switch (opt) { 508 case 'd': 509 debug = B_TRUE; 510 break; 511 default: 512 usage(); 513 } 514 } 515 516 if (!debug && !dlmgmt_daemonize()) 517 return (EXIT_FAILURE); 518 519 if ((err = dlmgmt_init()) != 0) { 520 dlmgmt_log(LOG_ERR, "unable to initialize daemon: %s", 521 strerror(err)); 522 goto child_out; 523 } else if ((err = dlmgmt_set_privileges()) != 0) { 524 dlmgmt_log(LOG_ERR, "unable to set daemon privileges: %s", 525 strerror(err)); 526 dlmgmt_fini(); 527 goto child_out; 528 } 529 530 /* 531 * Inform the parent process that it can successfully exit. 532 */ 533 dlmgmt_inform_parent_exit(EXIT_SUCCESS); 534 535 for (;;) 536 (void) pause(); 537 538 child_out: 539 /* return from main() forcibly exits an MT process */ 540 dlmgmt_inform_parent_exit(EXIT_FAILURE); 541 return (EXIT_FAILURE); 542 } 543