1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #pragma ident "%Z%%M% %I% %E% SMI" 27 28 /* 29 * NOTES: To be expanded. 30 * 31 * The SMF inetd. 32 * 33 * Below are some high level notes of the operation of the SMF inetd. The 34 * notes don't go into any real detail, and the viewer of this file is 35 * encouraged to look at the code and its associated comments to better 36 * understand inetd's operation. This saves the potential for the code 37 * and these notes diverging over time. 38 * 39 * Inetd's major work is done from the context of event_loop(). Within this 40 * loop, inetd polls for events arriving from a number of different file 41 * descriptors, representing the following event types, and initiates 42 * any necessary event processing: 43 * - incoming network connections/datagrams. 44 * - notification of terminated processes (discovered via contract events). 45 * - instance specific events originating from the SMF master restarter. 46 * - stop/refresh requests from the inetd method processes (coming in on a 47 * Unix Domain socket). 48 * There's also a timeout set for the poll, which is set to the nearest 49 * scheduled timer in a timer queue that inetd uses to perform delayed 50 * processing, such as bind retries. 51 * The SIGHUP and SIGINT signals can also interrupt the poll, and will 52 * result in inetd being refreshed or stopped respectively, as was the 53 * behavior with the old inetd. 54 * 55 * Inetd implements a state machine for each instance. The states within the 56 * machine are: offline, online, disabled, maintenance, uninitialized and 57 * specializations of the offline state for when an instance exceeds one of 58 * its DOS limits. The state of an instance can be changed as a 59 * result/side-effect of one of the above events occurring, or inetd being 60 * started up. The ongoing state of an instance is stored in the SMF 61 * repository, as required of SMF restarters. This enables an administrator 62 * to view the state of each instance, and, if inetd was to terminate 63 * unexpectedly, it could use the stored state to re-commence where it left off. 64 * 65 * Within the state machine a number of methods are run (if provided) as part 66 * of a state transition to aid/ effect a change in an instance's state. The 67 * supported methods are: offline, online, disable, refresh and start. The 68 * latter of these is the equivalent of the server program and its arguments 69 * in the old inetd. 70 * 71 * Events from the SMF master restarter come in on a number of threads 72 * created in the registration routine of librestart, the delegated restarter 73 * library. These threads call into the restart_event_proxy() function 74 * when an event arrives. To serialize the processing of instances, these events 75 * are then written down a pipe to the process's main thread, which listens 76 * for these events via a poll call, with the file descriptor of the other 77 * end of the pipe in its read set, and processes the event appropriately. 78 * When the event has been processed (which may be delayed if the instance 79 * for which the event is for is in the process of executing one of its methods 80 * as part of a state transition) it writes an acknowledgement back down the 81 * pipe the event was received on. The thread in restart_event_proxy() that 82 * wrote the event will read the acknowledgement it was blocked upon, and will 83 * then be able to return to its caller, thus implicitly acknowledging the 84 * event, and allowing another event to be written down the pipe for the main 85 * thread to process. 86 */ 87 88 89 #include <netdb.h> 90 #include <stdio.h> 91 #include <stdio_ext.h> 92 #include <stdlib.h> 93 #include <strings.h> 94 #include <unistd.h> 95 #include <assert.h> 96 #include <sys/types.h> 97 #include <sys/socket.h> 98 #include <netinet/in.h> 99 #include <fcntl.h> 100 #include <signal.h> 101 #include <errno.h> 102 #include <locale.h> 103 #include <syslog.h> 104 #include <libintl.h> 105 #include <librestart.h> 106 #include <pthread.h> 107 #include <sys/stat.h> 108 #include <time.h> 109 #include <limits.h> 110 #include <libgen.h> 111 #include <tcpd.h> 112 #include <libscf.h> 113 #include <libuutil.h> 114 #include <stddef.h> 115 #include <bsm/adt_event.h> 116 #include "inetd_impl.h" 117 118 /* path to inetd's binary */ 119 #define INETD_PATH "/usr/lib/inet/inetd" 120 121 /* 122 * inetd's default configuration file paths. /etc/inetd/inetd.conf is set 123 * be be the primary file, so it is checked before /etc/inetd.conf. 124 */ 125 #define PRIMARY_DEFAULT_CONF_FILE "/etc/inet/inetd.conf" 126 #define SECONDARY_DEFAULT_CONF_FILE "/etc/inetd.conf" 127 128 /* Arguments passed to this binary to request which method to execute. */ 129 #define START_METHOD_ARG "start" 130 #define STOP_METHOD_ARG "stop" 131 #define REFRESH_METHOD_ARG "refresh" 132 133 /* connection backlog for unix domain socket */ 134 #define UDS_BACKLOG 2 135 136 /* number of retries to recv() a request on the UDS socket before giving up */ 137 #define UDS_RECV_RETRIES 10 138 139 /* enumeration of the different ends of a pipe */ 140 enum pipe_end { 141 PE_CONSUMER, 142 PE_PRODUCER 143 }; 144 145 typedef struct { 146 internal_inst_state_t istate; 147 const char *name; 148 restarter_instance_state_t smf_state; 149 instance_method_t method_running; 150 } state_info_t; 151 152 153 /* 154 * Collection of information for each state. 155 * NOTE: This table is indexed into using the internal_inst_state_t 156 * enumeration, so the ordering needs to be kept in synch. 157 */ 158 static state_info_t states[] = { 159 {IIS_UNINITIALIZED, "uninitialized", RESTARTER_STATE_UNINIT, 160 IM_NONE}, 161 {IIS_ONLINE, "online", RESTARTER_STATE_ONLINE, IM_START}, 162 {IIS_IN_ONLINE_METHOD, "online_method", RESTARTER_STATE_OFFLINE, 163 IM_ONLINE}, 164 {IIS_OFFLINE, "offline", RESTARTER_STATE_OFFLINE, IM_NONE}, 165 {IIS_IN_OFFLINE_METHOD, "offline_method", RESTARTER_STATE_OFFLINE, 166 IM_OFFLINE}, 167 {IIS_DISABLED, "disabled", RESTARTER_STATE_DISABLED, IM_NONE}, 168 {IIS_IN_DISABLE_METHOD, "disabled_method", RESTARTER_STATE_OFFLINE, 169 IM_DISABLE}, 170 {IIS_IN_REFRESH_METHOD, "refresh_method", RESTARTER_STATE_ONLINE, 171 IM_REFRESH}, 172 {IIS_MAINTENANCE, "maintenance", RESTARTER_STATE_MAINT, IM_NONE}, 173 {IIS_OFFLINE_CONRATE, "cr_offline", RESTARTER_STATE_OFFLINE, IM_NONE}, 174 {IIS_OFFLINE_BIND, "bind_offline", RESTARTER_STATE_OFFLINE, IM_NONE}, 175 {IIS_OFFLINE_COPIES, "copies_offline", RESTARTER_STATE_OFFLINE, 176 IM_NONE}, 177 {IIS_DEGRADED, "degraded", RESTARTER_STATE_DEGRADED, IM_NONE}, 178 {IIS_NONE, "none", RESTARTER_STATE_NONE, IM_NONE} 179 }; 180 181 /* 182 * Pipe used to send events from the threads created by restarter_bind_handle() 183 * to the main thread of control. 184 */ 185 static int rst_event_pipe[] = {-1, -1}; 186 /* 187 * Used to protect the critical section of code in restarter_event_proxy() that 188 * involves writing an event down the event pipe and reading an acknowledgement. 189 */ 190 static pthread_mutex_t rst_event_pipe_mtx = PTHREAD_MUTEX_INITIALIZER; 191 192 /* handle used in communication with the master restarter */ 193 static restarter_event_handle_t *rst_event_handle = NULL; 194 195 /* set to indicate a refresh of inetd is requested */ 196 static boolean_t refresh_inetd_requested = B_FALSE; 197 198 /* set by the SIGTERM handler to flag we got a SIGTERM */ 199 static boolean_t got_sigterm = B_FALSE; 200 201 /* 202 * Timer queue used to store timers for delayed event processing, such as 203 * bind retries. 204 */ 205 iu_tq_t *timer_queue = NULL; 206 207 /* 208 * fd of Unix Domain socket used to communicate stop and refresh requests 209 * to the inetd start method process. 210 */ 211 static int uds_fd = -1; 212 213 /* 214 * List of inetd's currently managed instances; each containing its state, 215 * and in certain states its configuration. 216 */ 217 static uu_list_pool_t *instance_pool = NULL; 218 uu_list_t *instance_list = NULL; 219 220 /* set to indicate we're being stopped */ 221 boolean_t inetd_stopping = B_FALSE; 222 223 /* TCP wrappers syslog globals. Consumed by libwrap. */ 224 int allow_severity = LOG_INFO; 225 int deny_severity = LOG_WARNING; 226 227 /* path of the configuration file being monitored by check_conf_file() */ 228 static char *conf_file = NULL; 229 230 /* Auditing session handle */ 231 static adt_session_data_t *audit_handle; 232 233 static void uds_fini(void); 234 static int uds_init(void); 235 static int run_method(instance_t *, instance_method_t, const proto_info_t *); 236 static void create_bound_fds(instance_t *); 237 static void destroy_bound_fds(instance_t *); 238 static void destroy_instance(instance_t *); 239 static void inetd_stop(void); 240 static void 241 exec_method(instance_t *instance, instance_method_t method, method_info_t *mi, 242 struct method_context *mthd_ctxt, const proto_info_t *pi) __NORETURN; 243 244 /* 245 * The following two functions are callbacks that libumem uses to determine 246 * inetd's desired debugging/logging levels. The interface they consume is 247 * exported by FMA and is consolidation private. The comments in the two 248 * functions give the environment variable that will effectively be set to 249 * their returned value, and thus whose behavior for this value, described in 250 * umem_debug(3MALLOC), will be followed. 251 */ 252 253 const char * 254 _umem_debug_init(void) 255 { 256 return ("default,verbose"); /* UMEM_DEBUG setting */ 257 } 258 259 const char * 260 _umem_logging_init(void) 261 { 262 return ("fail,contents"); /* UMEM_LOGGING setting */ 263 } 264 265 static void 266 log_invalid_cfg(const char *fmri) 267 { 268 error_msg(gettext( 269 "Invalid configuration for instance %s, placing in maintenance"), 270 fmri); 271 } 272 273 /* 274 * Returns B_TRUE if the instance is in a suitable state for inetd to stop. 275 */ 276 static boolean_t 277 instance_stopped(const instance_t *inst) 278 { 279 return ((inst->cur_istate == IIS_OFFLINE) || 280 (inst->cur_istate == IIS_MAINTENANCE) || 281 (inst->cur_istate == IIS_DISABLED) || 282 (inst->cur_istate == IIS_UNINITIALIZED)); 283 } 284 285 /* 286 * Updates the current and next repository states of instance 'inst'. If 287 * any errors occur an error message is output. 288 */ 289 static void 290 update_instance_states(instance_t *inst, internal_inst_state_t new_cur_state, 291 internal_inst_state_t new_next_state, restarter_error_t err) 292 { 293 internal_inst_state_t old_cur = inst->cur_istate; 294 internal_inst_state_t old_next = inst->next_istate; 295 scf_error_t sret; 296 int ret; 297 298 debug_msg("Entering update_instance_states: oldcur: %s, newcur: %s " 299 "oldnext: %s, newnext: %s", states[old_cur].name, 300 states[new_cur_state].name, states[old_next].name, 301 states[new_next_state].name); 302 303 304 /* update the repository/cached internal state */ 305 inst->cur_istate = new_cur_state; 306 inst->next_istate = new_next_state; 307 (void) set_single_rep_val(inst->cur_istate_rep, 308 (int64_t)new_cur_state); 309 (void) set_single_rep_val(inst->next_istate_rep, 310 (int64_t)new_next_state); 311 312 if (((sret = store_rep_vals(inst->cur_istate_rep, inst->fmri, 313 PR_NAME_CUR_INT_STATE)) != 0) || 314 ((sret = store_rep_vals(inst->next_istate_rep, inst->fmri, 315 PR_NAME_NEXT_INT_STATE)) != 0)) 316 error_msg(gettext("Failed to update state of instance %s in " 317 "repository: %s"), inst->fmri, scf_strerror(sret)); 318 319 /* update the repository SMF state */ 320 if ((ret = restarter_set_states(rst_event_handle, inst->fmri, 321 states[old_cur].smf_state, states[new_cur_state].smf_state, 322 states[old_next].smf_state, states[new_next_state].smf_state, 323 err, 0)) != 0) 324 error_msg(gettext("Failed to update state of instance %s in " 325 "repository: %s"), inst->fmri, strerror(ret)); 326 327 } 328 329 void 330 update_state(instance_t *inst, internal_inst_state_t new_cur, 331 restarter_error_t err) 332 { 333 update_instance_states(inst, new_cur, IIS_NONE, err); 334 } 335 336 /* 337 * Sends a refresh event to the inetd start method process and returns 338 * SMF_EXIT_OK if it managed to send it. If it fails to send the request for 339 * some reason it returns SMF_EXIT_ERR_OTHER. 340 */ 341 static int 342 refresh_method(void) 343 { 344 uds_request_t req = UR_REFRESH_INETD; 345 int fd; 346 347 debug_msg("Entering refresh_method"); 348 349 if ((fd = connect_to_inetd()) < 0) { 350 error_msg(gettext("Failed to connect to inetd: %s"), 351 strerror(errno)); 352 return (SMF_EXIT_ERR_OTHER); 353 } 354 355 /* write the request and return success */ 356 if (safe_write(fd, &req, sizeof (req)) == -1) { 357 error_msg( 358 gettext("Failed to send refresh request to inetd: %s"), 359 strerror(errno)); 360 (void) close(fd); 361 return (SMF_EXIT_ERR_OTHER); 362 } 363 364 (void) close(fd); 365 366 return (SMF_EXIT_OK); 367 } 368 369 /* 370 * Sends a stop event to the inetd start method process and wait till it goes 371 * away. If inetd is determined to have stopped SMF_EXIT_OK is returned, else 372 * SMF_EXIT_ERR_OTHER is returned. 373 */ 374 static int 375 stop_method(void) 376 { 377 uds_request_t req = UR_STOP_INETD; 378 int fd; 379 char c; 380 ssize_t ret; 381 382 debug_msg("Entering stop_method"); 383 384 if ((fd = connect_to_inetd()) == -1) { 385 debug_msg(gettext("Failed to connect to inetd: %s"), 386 strerror(errno)); 387 /* 388 * Assume connect_to_inetd() failed because inetd was already 389 * stopped, and return success. 390 */ 391 return (SMF_EXIT_OK); 392 } 393 394 /* 395 * This is safe to do since we're fired off in a separate process 396 * than inetd and in the case we get wedged, the stop method timeout 397 * will occur and we'd be killed by our restarter. 398 */ 399 enable_blocking(fd); 400 401 /* write the stop request to inetd and wait till it goes away */ 402 if (safe_write(fd, &req, sizeof (req)) != 0) { 403 error_msg(gettext("Failed to send stop request to inetd")); 404 (void) close(fd); 405 return (SMF_EXIT_ERR_OTHER); 406 } 407 408 /* wait until remote end of socket is closed */ 409 while (((ret = recv(fd, &c, sizeof (c), 0)) != 0) && (errno == EINTR)) 410 ; 411 412 (void) close(fd); 413 414 if (ret != 0) { 415 error_msg(gettext("Failed to determine whether inetd stopped")); 416 return (SMF_EXIT_ERR_OTHER); 417 } 418 419 return (SMF_EXIT_OK); 420 } 421 422 423 /* 424 * This function is called to handle restarter events coming in from the 425 * master restarter. It is registered with the master restarter via 426 * restarter_bind_handle() and simply passes a pointer to the event down 427 * the event pipe, which will be discovered by the poll in the event loop 428 * and processed there. It waits for an acknowledgement to be written back down 429 * the pipe before returning. 430 * Writing a pointer to the function's 'event' parameter down the pipe will 431 * be safe, as the thread in restarter_event_proxy() doesn't return until 432 * the main thread has finished its processing of the passed event, thus 433 * the referenced event will remain around until the function returns. 434 * To impose the limit of only one event being in the pipe and processed 435 * at once, a lock is taken on entry to this function and returned on exit. 436 * Always returns 0. 437 */ 438 static int 439 restarter_event_proxy(restarter_event_t *event) 440 { 441 restarter_event_type_t ev_type; 442 boolean_t processed; 443 444 debug_msg("Entering restarter_event_proxy"); 445 ev_type = restarter_event_get_type(event); 446 debug_msg("event: %x, event type: %d", event, ev_type); 447 448 (void) pthread_mutex_lock(&rst_event_pipe_mtx); 449 450 /* write the event to the main worker thread down the pipe */ 451 if (safe_write(rst_event_pipe[PE_PRODUCER], &event, 452 sizeof (event)) != 0) 453 goto pipe_error; 454 455 /* 456 * Wait for an acknowledgement that the event has been processed from 457 * the same pipe. In the case that inetd is stopping, any thread in 458 * this function will simply block on this read until inetd eventually 459 * exits. This will result in this function not returning success to 460 * its caller, and the event that was being processed when the 461 * function exited will be re-sent when inetd is next started. 462 */ 463 if (safe_read(rst_event_pipe[PE_PRODUCER], &processed, 464 sizeof (processed)) != 0) 465 goto pipe_error; 466 467 (void) pthread_mutex_unlock(&rst_event_pipe_mtx); 468 469 return (processed ? 0 : EAGAIN); 470 471 pipe_error: 472 /* 473 * Something's seriously wrong with the event pipe. Notify the 474 * worker thread by closing this end of the event pipe and pause till 475 * inetd exits. 476 */ 477 error_msg(gettext("Can't process restarter events: %s"), 478 strerror(errno)); 479 (void) close(rst_event_pipe[PE_PRODUCER]); 480 for (;;) 481 (void) pause(); 482 483 /* NOTREACHED */ 484 } 485 486 /* 487 * Let restarter_event_proxy() know we're finished with the event it's blocked 488 * upon. The 'processed' argument denotes whether we successfully processed the 489 * event. 490 */ 491 static void 492 ack_restarter_event(boolean_t processed) 493 { 494 debug_msg("Entering ack_restarter_event"); 495 496 /* 497 * If safe_write returns -1 something's seriously wrong with the event 498 * pipe, so start the shutdown proceedings. 499 */ 500 if (safe_write(rst_event_pipe[PE_CONSUMER], &processed, 501 sizeof (processed)) == -1) 502 inetd_stop(); 503 } 504 505 /* 506 * Switch the syslog identification string to 'ident'. 507 */ 508 static void 509 change_syslog_ident(const char *ident) 510 { 511 debug_msg("Entering change_syslog_ident: ident: %s", ident); 512 513 closelog(); 514 openlog(ident, LOG_PID|LOG_CONS, LOG_DAEMON); 515 } 516 517 /* 518 * Perform TCP wrappers checks on this instance. Due to the fact that the 519 * current wrappers code used in Solaris is taken untouched from the open 520 * source version, we're stuck with using the daemon name for the checks, as 521 * opposed to making use of instance FMRIs. Sigh. 522 * Returns B_TRUE if the check passed, else B_FALSE. 523 */ 524 static boolean_t 525 tcp_wrappers_ok(instance_t *instance) 526 { 527 boolean_t rval = B_TRUE; 528 char *daemon_name; 529 basic_cfg_t *cfg = instance->config->basic; 530 struct request_info req; 531 532 debug_msg("Entering tcp_wrappers_ok, instance: %s", instance->fmri); 533 534 /* 535 * Wrap the service using libwrap functions. The code below implements 536 * the functionality of tcpd. This is done only for stream,nowait 537 * services, following the convention of other vendors. udp/dgram and 538 * stream/wait can NOT be wrapped with this libwrap, so be wary of 539 * changing the test below. 540 */ 541 if (cfg->do_tcp_wrappers && !cfg->iswait && !cfg->istlx) { 542 543 daemon_name = instance->config->methods[ 544 IM_START]->exec_args_we.we_wordv[0]; 545 if (*daemon_name == '/') 546 daemon_name = strrchr(daemon_name, '/') + 1; 547 548 /* 549 * Change the syslog message identity to the name of the 550 * daemon being wrapped, as opposed to "inetd". 551 */ 552 change_syslog_ident(daemon_name); 553 554 (void) request_init(&req, RQ_DAEMON, daemon_name, RQ_FILE, 555 instance->conn_fd, NULL); 556 fromhost(&req); 557 558 if (strcasecmp(eval_hostname(req.client), paranoid) == 0) { 559 syslog(deny_severity, 560 "refused connect from %s (name/address mismatch)", 561 eval_client(&req)); 562 if (req.sink != NULL) 563 req.sink(instance->conn_fd); 564 rval = B_FALSE; 565 } else if (!hosts_access(&req)) { 566 syslog(deny_severity, 567 "refused connect from %s (access denied)", 568 eval_client(&req)); 569 if (req.sink != NULL) 570 req.sink(instance->conn_fd); 571 rval = B_FALSE; 572 } else { 573 syslog(allow_severity, "connect from %s", 574 eval_client(&req)); 575 } 576 577 /* Revert syslog identity back to "inetd". */ 578 change_syslog_ident(SYSLOG_IDENT); 579 } 580 return (rval); 581 } 582 583 /* 584 * Handler registered with the timer queue code to remove an instance from 585 * the connection rate offline state when it has been there for its allotted 586 * time. 587 */ 588 /* ARGSUSED */ 589 static void 590 conn_rate_online(iu_tq_t *tq, void *arg) 591 { 592 instance_t *instance = arg; 593 594 debug_msg("Entering conn_rate_online, instance: %s", 595 instance->fmri); 596 597 assert(instance->cur_istate == IIS_OFFLINE_CONRATE); 598 instance->timer_id = -1; 599 update_state(instance, IIS_OFFLINE, RERR_RESTART); 600 process_offline_inst(instance); 601 } 602 603 /* 604 * Check whether this instance in the offline state is in transition to 605 * another state and do the work to continue this transition. 606 */ 607 void 608 process_offline_inst(instance_t *inst) 609 { 610 debug_msg("Entering process_offline_inst"); 611 612 if (inst->disable_req) { 613 inst->disable_req = B_FALSE; 614 (void) run_method(inst, IM_DISABLE, NULL); 615 } else if (inst->maintenance_req) { 616 inst->maintenance_req = B_FALSE; 617 update_state(inst, IIS_MAINTENANCE, RERR_RESTART); 618 /* 619 * If inetd is in the process of stopping, we don't want to enter 620 * any states but offline, disabled and maintenance. 621 */ 622 } else if (!inetd_stopping) { 623 if (inst->conn_rate_exceeded) { 624 basic_cfg_t *cfg = inst->config->basic; 625 626 inst->conn_rate_exceeded = B_FALSE; 627 update_state(inst, IIS_OFFLINE_CONRATE, RERR_RESTART); 628 /* 629 * Schedule a timer to bring the instance out of the 630 * connection rate offline state. 631 */ 632 inst->timer_id = iu_schedule_timer(timer_queue, 633 cfg->conn_rate_offline, conn_rate_online, 634 inst); 635 if (inst->timer_id == -1) { 636 error_msg(gettext("%s unable to set timer, " 637 "won't be brought on line after %d " 638 "seconds."), inst->fmri, 639 cfg->conn_rate_offline); 640 } 641 642 } else if (copies_limit_exceeded(inst)) { 643 update_state(inst, IIS_OFFLINE_COPIES, RERR_RESTART); 644 } 645 } 646 } 647 648 /* 649 * Create a socket bound to the instance's configured address. If the 650 * bind fails, returns -1, else the fd of the bound socket. 651 */ 652 static int 653 create_bound_socket(const char *fmri, socket_info_t *sock_info) 654 { 655 int fd; 656 int on = 1; 657 rpc_info_t *rpc = sock_info->pr_info.ri; 658 const char *proto = sock_info->pr_info.proto; 659 660 debug_msg("Entering create_bound_socket"); 661 662 fd = socket(sock_info->local_addr.ss_family, sock_info->type, 663 sock_info->protocol); 664 if (fd < 0) { 665 error_msg(gettext( 666 "Socket creation failure for instance %s, proto %s: %s"), 667 fmri, proto, strerror(errno)); 668 return (-1); 669 } 670 671 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof (on)) == -1) { 672 error_msg(gettext("setsockopt SO_REUSEADDR failed for service " 673 "instance %s, proto %s: %s"), fmri, proto, strerror(errno)); 674 (void) close(fd); 675 return (-1); 676 } 677 if (sock_info->pr_info.v6only) { 678 /* restrict socket to IPv6 communications only */ 679 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &on, 680 sizeof (on)) == -1) { 681 error_msg(gettext("setsockopt IPV6_V6ONLY failed for " 682 "service instance %s, proto %s: %s"), fmri, proto, 683 strerror(errno)); 684 (void) close(fd); 685 return (-1); 686 } 687 } 688 689 if (rpc != NULL) 690 SS_SETPORT(sock_info->local_addr, 0); 691 692 if (bind(fd, (struct sockaddr *)&(sock_info->local_addr), 693 SS_ADDRLEN(sock_info->local_addr)) < 0) { 694 error_msg(gettext( 695 "Failed to bind to the port of service instance %s, " 696 "proto %s: %s"), fmri, proto, strerror(errno)); 697 (void) close(fd); 698 return (-1); 699 } 700 701 /* 702 * Retrieve and store the address bound to for RPC services. 703 */ 704 if (rpc != NULL) { 705 struct sockaddr_storage ss; 706 int ss_size = sizeof (ss); 707 708 if (getsockname(fd, (struct sockaddr *)&ss, &ss_size) < 0) { 709 error_msg(gettext("Failed getsockname for instance %s, " 710 "proto %s: %s"), fmri, proto, strerror(errno)); 711 (void) close(fd); 712 return (-1); 713 } 714 (void) memcpy(rpc->netbuf.buf, &ss, 715 sizeof (struct sockaddr_storage)); 716 rpc->netbuf.len = SS_ADDRLEN(ss); 717 rpc->netbuf.maxlen = SS_ADDRLEN(ss); 718 } 719 720 if (sock_info->type == SOCK_STREAM) 721 (void) listen(fd, CONNECTION_BACKLOG); 722 723 return (fd); 724 } 725 726 /* 727 * Handler registered with the timer queue code to retry the creation 728 * of a bound fd. 729 */ 730 /* ARGSUSED */ 731 static void 732 retry_bind(iu_tq_t *tq, void *arg) 733 { 734 instance_t *instance = arg; 735 736 debug_msg("Entering retry_bind, instance: %s", instance->fmri); 737 738 switch (instance->cur_istate) { 739 case IIS_OFFLINE_BIND: 740 case IIS_ONLINE: 741 case IIS_DEGRADED: 742 case IIS_IN_ONLINE_METHOD: 743 case IIS_IN_REFRESH_METHOD: 744 break; 745 default: 746 #ifndef NDEBUG 747 (void) fprintf(stderr, "%s:%d: Unknown instance state %d.\n", 748 __FILE__, __LINE__, instance->cur_istate); 749 #endif 750 abort(); 751 } 752 753 instance->bind_timer_id = -1; 754 create_bound_fds(instance); 755 } 756 757 /* 758 * For each of the fds for the given instance that are bound, if 'listen' is 759 * set add them to the poll set, else remove them from it. If any additions 760 * fail, returns -1, else 0 on success. 761 */ 762 int 763 poll_bound_fds(instance_t *instance, boolean_t listen) 764 { 765 basic_cfg_t *cfg = instance->config->basic; 766 proto_info_t *pi; 767 int ret = 0; 768 769 debug_msg("Entering poll_bound_fds: instance: %s, on: %d", 770 instance->fmri, listen); 771 772 for (pi = uu_list_first(cfg->proto_list); pi != NULL; 773 pi = uu_list_next(cfg->proto_list, pi)) { 774 if (pi->listen_fd != -1) { /* fd bound */ 775 if (!listen) { 776 clear_pollfd(pi->listen_fd); 777 } else if (set_pollfd(pi->listen_fd, POLLIN) == -1) { 778 ret = -1; 779 } 780 } 781 } 782 783 return (ret); 784 } 785 786 /* 787 * Handle the case were we either fail to create a bound fd or we fail 788 * to add a bound fd to the poll set for the given instance. 789 */ 790 static void 791 handle_bind_failure(instance_t *instance) 792 { 793 basic_cfg_t *cfg = instance->config->basic; 794 795 debug_msg("Entering handle_bind_failure: instance: %s", instance); 796 797 /* 798 * We must be being called as a result of a failed poll_bound_fds() 799 * as a bind retry is already scheduled. Just return and let it do 800 * the work. 801 */ 802 if (instance->bind_timer_id != -1) 803 return; 804 805 /* 806 * Check if the rebind retries limit is operative and if so, 807 * if it has been reached. 808 */ 809 if (((cfg->bind_fail_interval <= 0) || /* no retries */ 810 ((cfg->bind_fail_max >= 0) && /* limit reached */ 811 (++instance->bind_fail_count > cfg->bind_fail_max))) || 812 ((instance->bind_timer_id = iu_schedule_timer(timer_queue, 813 cfg->bind_fail_interval, retry_bind, instance)) == -1)) { 814 proto_info_t *pi; 815 816 instance->bind_fail_count = 0; 817 818 switch (instance->cur_istate) { 819 case IIS_DEGRADED: 820 case IIS_ONLINE: 821 /* check if any of the fds are being poll'd upon */ 822 for (pi = uu_list_first(cfg->proto_list); pi != NULL; 823 pi = uu_list_next(cfg->proto_list, pi)) { 824 if ((pi->listen_fd != -1) && 825 (find_pollfd(pi->listen_fd) != NULL)) 826 break; 827 } 828 if (pi != NULL) { /* polling on > 0 fds */ 829 warn_msg(gettext("Failed to bind on " 830 "all protocols for instance %s, " 831 "transitioning to degraded"), 832 instance->fmri); 833 update_state(instance, IIS_DEGRADED, RERR_NONE); 834 instance->bind_retries_exceeded = B_TRUE; 835 break; 836 } 837 838 destroy_bound_fds(instance); 839 /* 840 * In the case we failed the 'bind' because set_pollfd() 841 * failed on all bound fds, use the offline handling. 842 */ 843 /* FALLTHROUGH */ 844 case IIS_OFFLINE: 845 case IIS_OFFLINE_BIND: 846 error_msg(gettext("Too many bind failures for instance " 847 "%s, transitioning to maintenance"), instance->fmri); 848 update_state(instance, IIS_MAINTENANCE, 849 RERR_FAULT); 850 break; 851 case IIS_IN_ONLINE_METHOD: 852 case IIS_IN_REFRESH_METHOD: 853 warn_msg(gettext("Failed to bind on all " 854 "protocols for instance %s, instance will go to " 855 "degraded"), instance->fmri); 856 /* 857 * Set the retries exceeded flag so when the method 858 * completes the instance goes to the degraded state. 859 */ 860 instance->bind_retries_exceeded = B_TRUE; 861 break; 862 default: 863 #ifndef NDEBUG 864 (void) fprintf(stderr, 865 "%s:%d: Unknown instance state %d.\n", 866 __FILE__, __LINE__, instance->cur_istate); 867 #endif 868 abort(); 869 } 870 } else if (instance->cur_istate == IIS_OFFLINE) { 871 /* 872 * bind re-scheduled, so if we're offline reflect this in the 873 * state. 874 */ 875 update_state(instance, IIS_OFFLINE_BIND, RERR_NONE); 876 } 877 } 878 879 880 /* 881 * Check if two transport protocols for RPC conflict. 882 */ 883 884 boolean_t 885 is_rpc_proto_conflict(const char *proto0, const char *proto1) { 886 if (strcmp(proto0, "tcp") == 0) { 887 if (strcmp(proto1, "tcp") == 0) 888 return (B_TRUE); 889 if (strcmp(proto1, "tcp6") == 0) 890 return (B_TRUE); 891 return (B_FALSE); 892 } 893 894 if (strcmp(proto0, "tcp6") == 0) { 895 if (strcmp(proto1, "tcp") == 0) 896 return (B_TRUE); 897 if (strcmp(proto1, "tcp6only") == 0) 898 return (B_TRUE); 899 if (strcmp(proto1, "tcp6") == 0) 900 return (B_TRUE); 901 return (B_FALSE); 902 } 903 904 if (strcmp(proto0, "tcp6only") == 0) { 905 if (strcmp(proto1, "tcp6only") == 0) 906 return (B_TRUE); 907 if (strcmp(proto1, "tcp6") == 0) 908 return (B_TRUE); 909 return (B_FALSE); 910 } 911 912 if (strcmp(proto0, "udp") == 0) { 913 if (strcmp(proto1, "udp") == 0) 914 return (B_TRUE); 915 if (strcmp(proto1, "udp6") == 0) 916 return (B_TRUE); 917 return (B_FALSE); 918 } 919 920 if (strcmp(proto0, "udp6") == 0) { 921 922 if (strcmp(proto1, "udp") == 0) 923 return (B_TRUE); 924 if (strcmp(proto1, "udp6only") == 0) 925 return (B_TRUE); 926 if (strcmp(proto1, "udp6") == 0) 927 return (B_TRUE); 928 return (B_FALSE); 929 } 930 931 if (strcmp(proto0, "udp6only") == 0) { 932 933 if (strcmp(proto1, "udp6only") == 0) 934 return (B_TRUE); 935 if (strcmp(proto1, "udp6") == 0) 936 return (B_TRUE); 937 return (0); 938 } 939 940 /* 941 * If the protocol isn't TCP/IP or UDP/IP assume that it has its own 942 * port namepsace and that conflicts can be detected by literal string 943 * comparison. 944 */ 945 946 if (strcmp(proto0, proto1)) 947 return (FALSE); 948 949 return (B_TRUE); 950 } 951 952 953 /* 954 * Check if inetd thinks this RPC program number is already registered. 955 * 956 * An RPC protocol conflict occurs if 957 * a) the program numbers are the same and, 958 * b) the version numbers overlap, 959 * c) the protocols (TCP vs UDP vs tic*) are the same. 960 */ 961 962 boolean_t 963 is_rpc_num_in_use(int rpc_n, char *proto, int lowver, int highver) { 964 instance_t *i; 965 basic_cfg_t *cfg; 966 proto_info_t *pi; 967 968 for (i = uu_list_first(instance_list); i != NULL; 969 i = uu_list_next(instance_list, i)) { 970 971 if (i->cur_istate != IIS_ONLINE) 972 continue; 973 cfg = i->config->basic; 974 975 for (pi = uu_list_first(cfg->proto_list); pi != NULL; 976 pi = uu_list_next(cfg->proto_list, pi)) { 977 978 if (pi->ri == NULL) 979 continue; 980 if (pi->ri->prognum != rpc_n) 981 continue; 982 if (!is_rpc_proto_conflict(pi->proto, proto)) 983 continue; 984 if ((lowver < pi->ri->lowver && 985 highver < pi->ri->lowver) || 986 (lowver > pi->ri->highver && 987 highver > pi->ri->highver)) 988 continue; 989 return (B_TRUE); 990 } 991 } 992 return (B_FALSE); 993 } 994 995 996 /* 997 * Independent of the transport, for each of the entries in the instance's 998 * proto list this function first attempts to create an associated network fd; 999 * for RPC services these are then bound to a kernel chosen port and the 1000 * fd is registered with rpcbind; for non-RPC services the fds are bound 1001 * to the port associated with the instance's service name. On any successful 1002 * binds the instance is taken online. Failed binds are handled by 1003 * handle_bind_failure(). 1004 */ 1005 void 1006 create_bound_fds(instance_t *instance) 1007 { 1008 basic_cfg_t *cfg = instance->config->basic; 1009 boolean_t failure = B_FALSE; 1010 boolean_t success = B_FALSE; 1011 proto_info_t *pi; 1012 1013 debug_msg("Entering create_bound_fd: instance: %s", instance->fmri); 1014 1015 /* 1016 * Loop through and try and bind any unbound protos. 1017 */ 1018 for (pi = uu_list_first(cfg->proto_list); pi != NULL; 1019 pi = uu_list_next(cfg->proto_list, pi)) { 1020 if (pi->listen_fd != -1) 1021 continue; 1022 if (cfg->istlx) { 1023 pi->listen_fd = create_bound_endpoint(instance->fmri, 1024 (tlx_info_t *)pi); 1025 } else { 1026 /* 1027 * We cast pi to a void so we can then go on to cast 1028 * it to a socket_info_t without lint complaining 1029 * about alignment. This is done because the x86 1030 * version of lint thinks a lint suppression directive 1031 * is unnecessary and flags it as such, yet the sparc 1032 * version complains if it's absent. 1033 */ 1034 void *p = pi; 1035 pi->listen_fd = create_bound_socket(instance->fmri, 1036 (socket_info_t *)p); 1037 } 1038 if (pi->listen_fd == -1) { 1039 failure = B_TRUE; 1040 continue; 1041 } 1042 1043 if (pi->ri != NULL) { 1044 1045 /* 1046 * Don't register the same RPC program number twice. 1047 * Doing so silently discards the old service 1048 * without causing an error. 1049 */ 1050 if (is_rpc_num_in_use(pi->ri->prognum, pi->proto, 1051 pi->ri->lowver, pi->ri->highver)) { 1052 failure = B_TRUE; 1053 close_net_fd(instance, pi->listen_fd); 1054 pi->listen_fd = -1; 1055 continue; 1056 } 1057 1058 unregister_rpc_service(instance->fmri, pi->ri); 1059 if (register_rpc_service(instance->fmri, pi->ri) == 1060 -1) { 1061 close_net_fd(instance, pi->listen_fd); 1062 pi->listen_fd = -1; 1063 failure = B_TRUE; 1064 continue; 1065 } 1066 } 1067 1068 success = B_TRUE; 1069 } 1070 1071 switch (instance->cur_istate) { 1072 case IIS_OFFLINE: 1073 case IIS_OFFLINE_BIND: 1074 /* 1075 * If we've managed to bind at least one proto lets run the 1076 * online method, so we can start listening for it. 1077 */ 1078 if (success && run_method(instance, IM_ONLINE, NULL) == -1) 1079 return; /* instance gone to maintenance */ 1080 break; 1081 case IIS_ONLINE: 1082 case IIS_IN_REFRESH_METHOD: 1083 /* 1084 * We're 'online', so start polling on any bound fds we're 1085 * currently not. 1086 */ 1087 if (poll_bound_fds(instance, B_TRUE) != 0) { 1088 failure = B_TRUE; 1089 } else if (!failure) { 1090 /* 1091 * We've successfully bound and poll'd upon all protos, 1092 * so reset the failure count. 1093 */ 1094 instance->bind_fail_count = 0; 1095 } 1096 break; 1097 case IIS_IN_ONLINE_METHOD: 1098 /* 1099 * Nothing to do here as the method completion code will start 1100 * listening for any successfully bound fds. 1101 */ 1102 break; 1103 default: 1104 #ifndef NDEBUG 1105 (void) fprintf(stderr, "%s:%d: Unknown instance state %d.\n", 1106 __FILE__, __LINE__, instance->cur_istate); 1107 #endif 1108 abort(); 1109 } 1110 1111 if (failure) 1112 handle_bind_failure(instance); 1113 } 1114 1115 /* 1116 * Counter to create_bound_fds(), for each of the bound network fds this 1117 * function unregisters the instance from rpcbind if it's an RPC service, 1118 * stops listening for new connections for it and then closes the listening fd. 1119 */ 1120 static void 1121 destroy_bound_fds(instance_t *instance) 1122 { 1123 basic_cfg_t *cfg = instance->config->basic; 1124 proto_info_t *pi; 1125 1126 debug_msg("Entering destroy_bound_fds: instance: %s", instance->fmri); 1127 1128 for (pi = uu_list_first(cfg->proto_list); pi != NULL; 1129 pi = uu_list_next(cfg->proto_list, pi)) { 1130 if (pi->listen_fd != -1) { 1131 if (pi->ri != NULL) 1132 unregister_rpc_service(instance->fmri, pi->ri); 1133 clear_pollfd(pi->listen_fd); 1134 close_net_fd(instance, pi->listen_fd); 1135 pi->listen_fd = -1; 1136 } 1137 } 1138 1139 /* cancel any bind retries */ 1140 if (instance->bind_timer_id != -1) 1141 cancel_bind_timer(instance); 1142 1143 instance->bind_retries_exceeded = B_FALSE; 1144 } 1145 1146 /* 1147 * Perform %A address expansion and return a pointer to a static string 1148 * array containing crafted arguments. This expansion is provided for 1149 * compatibility with 4.2BSD daemons, and as such we've copied the logic of 1150 * the legacy inetd to maintain this compatibility as much as possible. This 1151 * logic is a bit scatty, but it dates back at least as far as SunOS 4.x. 1152 */ 1153 static char ** 1154 expand_address(instance_t *inst, const proto_info_t *pi) 1155 { 1156 static char addrbuf[sizeof ("ffffffff.65536")]; 1157 static char *ret[3]; 1158 instance_cfg_t *cfg = inst->config; 1159 /* 1160 * We cast pi to a void so we can then go on to cast it to a 1161 * socket_info_t without lint complaining about alignment. This 1162 * is done because the x86 version of lint thinks a lint suppression 1163 * directive is unnecessary and flags it as such, yet the sparc 1164 * version complains if it's absent. 1165 */ 1166 const void *p = pi; 1167 1168 debug_msg("Entering expand_address"); 1169 1170 /* set ret[0] to the basename of exec path */ 1171 if ((ret[0] = strrchr(cfg->methods[IM_START]->exec_path, '/')) 1172 != NULL) { 1173 ret[0]++; 1174 } else { 1175 ret[0] = cfg->methods[IM_START]->exec_path; 1176 } 1177 1178 if (!cfg->basic->istlx && 1179 (((socket_info_t *)p)->type == SOCK_DGRAM)) { 1180 ret[1] = NULL; 1181 } else { 1182 addrbuf[0] = '\0'; 1183 if (!cfg->basic->iswait && 1184 (inst->remote_addr.ss_family == AF_INET)) { 1185 struct sockaddr_in *sp; 1186 1187 sp = (struct sockaddr_in *)&(inst->remote_addr); 1188 (void) snprintf(addrbuf, sizeof (addrbuf), "%x.%hu", 1189 ntohl(sp->sin_addr.s_addr), ntohs(sp->sin_port)); 1190 } 1191 ret[1] = addrbuf; 1192 ret[2] = NULL; 1193 } 1194 1195 return (ret); 1196 } 1197 1198 /* 1199 * Returns the state associated with the supplied method being run for an 1200 * instance. 1201 */ 1202 static internal_inst_state_t 1203 get_method_state(instance_method_t method) 1204 { 1205 state_info_t *sip; 1206 1207 for (sip = states; sip->istate != IIS_NONE; sip++) { 1208 if (sip->method_running == method) 1209 break; 1210 } 1211 assert(sip->istate != IIS_NONE); 1212 1213 return (sip->istate); 1214 } 1215 1216 /* 1217 * Store the method's PID and CID in the repository. If the store fails 1218 * we ignore it and just drive on. 1219 */ 1220 static void 1221 add_method_ids(instance_t *ins, pid_t pid, ctid_t cid, instance_method_t mthd) 1222 { 1223 debug_msg("Entering add_method_ids"); 1224 1225 if (cid != -1) 1226 (void) add_remove_contract(ins, B_TRUE, cid); 1227 1228 if (mthd == IM_START) { 1229 if (add_rep_val(ins->start_pids, (int64_t)pid) == 0) { 1230 (void) store_rep_vals(ins->start_pids, ins->fmri, 1231 PR_NAME_START_PIDS); 1232 } 1233 } else { 1234 if (add_rep_val(ins->non_start_pid, (int64_t)pid) == 0) { 1235 (void) store_rep_vals(ins->non_start_pid, ins->fmri, 1236 PR_NAME_NON_START_PID); 1237 } 1238 } 1239 } 1240 1241 /* 1242 * Remove the method's PID and CID from the repository. If the removal 1243 * fails we ignore it and drive on. 1244 */ 1245 void 1246 remove_method_ids(instance_t *inst, pid_t pid, ctid_t cid, 1247 instance_method_t mthd) 1248 { 1249 debug_msg("Entering remove_method_ids"); 1250 1251 if (cid != -1) 1252 (void) add_remove_contract(inst, B_FALSE, cid); 1253 1254 if (mthd == IM_START) { 1255 remove_rep_val(inst->start_pids, (int64_t)pid); 1256 (void) store_rep_vals(inst->start_pids, inst->fmri, 1257 PR_NAME_START_PIDS); 1258 } else { 1259 remove_rep_val(inst->non_start_pid, (int64_t)pid); 1260 (void) store_rep_vals(inst->non_start_pid, inst->fmri, 1261 PR_NAME_NON_START_PID); 1262 } 1263 } 1264 1265 static instance_t * 1266 create_instance(const char *fmri) 1267 { 1268 instance_t *ret; 1269 1270 debug_msg("Entering create_instance, instance: %s", fmri); 1271 1272 if (((ret = calloc(1, sizeof (instance_t))) == NULL) || 1273 ((ret->fmri = strdup(fmri)) == NULL)) 1274 goto alloc_fail; 1275 1276 ret->conn_fd = -1; 1277 1278 ret->copies = 0; 1279 1280 ret->conn_rate_count = 0; 1281 ret->fail_rate_count = 0; 1282 ret->bind_fail_count = 0; 1283 1284 if (((ret->non_start_pid = create_rep_val_list()) == NULL) || 1285 ((ret->start_pids = create_rep_val_list()) == NULL) || 1286 ((ret->start_ctids = create_rep_val_list()) == NULL)) 1287 goto alloc_fail; 1288 1289 ret->cur_istate = IIS_NONE; 1290 ret->next_istate = IIS_NONE; 1291 1292 if (((ret->cur_istate_rep = create_rep_val_list()) == NULL) || 1293 ((ret->next_istate_rep = create_rep_val_list()) == NULL)) 1294 goto alloc_fail; 1295 1296 ret->config = NULL; 1297 ret->new_config = NULL; 1298 1299 ret->timer_id = -1; 1300 ret->bind_timer_id = -1; 1301 1302 ret->disable_req = B_FALSE; 1303 ret->maintenance_req = B_FALSE; 1304 ret->conn_rate_exceeded = B_FALSE; 1305 ret->bind_retries_exceeded = B_FALSE; 1306 1307 ret->pending_rst_event = RESTARTER_EVENT_TYPE_INVALID; 1308 1309 return (ret); 1310 1311 alloc_fail: 1312 error_msg(strerror(errno)); 1313 destroy_instance(ret); 1314 return (NULL); 1315 } 1316 1317 static void 1318 destroy_instance(instance_t *inst) 1319 { 1320 debug_msg("Entering destroy_instance"); 1321 1322 if (inst == NULL) 1323 return; 1324 1325 destroy_instance_cfg(inst->config); 1326 destroy_instance_cfg(inst->new_config); 1327 1328 destroy_rep_val_list(inst->cur_istate_rep); 1329 destroy_rep_val_list(inst->next_istate_rep); 1330 1331 destroy_rep_val_list(inst->start_pids); 1332 destroy_rep_val_list(inst->non_start_pid); 1333 destroy_rep_val_list(inst->start_ctids); 1334 1335 free(inst->fmri); 1336 1337 free(inst); 1338 } 1339 1340 /* 1341 * Retrieves the current and next states internal states. Returns 0 on success, 1342 * else returns one of the following on error: 1343 * SCF_ERROR_NO_MEMORY if memory allocation failed. 1344 * SCF_ERROR_CONNECTION_BROKEN if the connection to the repository was broken. 1345 * SCF_ERROR_TYPE_MISMATCH if the property was of an unexpected type. 1346 * SCF_ERROR_NO_RESOURCES if the server doesn't have adequate resources. 1347 * SCF_ERROR_NO_SERVER if the server isn't running. 1348 */ 1349 static scf_error_t 1350 retrieve_instance_state(instance_t *inst) 1351 { 1352 scf_error_t ret; 1353 1354 debug_msg("Entering retrieve_instance_state: instance: %s", 1355 inst->fmri); 1356 1357 /* retrieve internal states */ 1358 if (((ret = retrieve_rep_vals(inst->cur_istate_rep, inst->fmri, 1359 PR_NAME_CUR_INT_STATE)) != 0) || 1360 ((ret = retrieve_rep_vals(inst->next_istate_rep, inst->fmri, 1361 PR_NAME_NEXT_INT_STATE)) != 0)) { 1362 if (ret != SCF_ERROR_NOT_FOUND) { 1363 error_msg(gettext( 1364 "Failed to read state of instance %s: %s"), 1365 inst->fmri, scf_strerror(scf_error())); 1366 return (ret); 1367 } 1368 1369 debug_msg("instance with no previous int state - " 1370 "setting state to uninitialized"); 1371 1372 if ((set_single_rep_val(inst->cur_istate_rep, 1373 (int64_t)IIS_UNINITIALIZED) == -1) || 1374 (set_single_rep_val(inst->next_istate_rep, 1375 (int64_t)IIS_NONE) == -1)) { 1376 return (SCF_ERROR_NO_MEMORY); 1377 } 1378 } 1379 1380 /* update convenience states */ 1381 inst->cur_istate = get_single_rep_val(inst->cur_istate_rep); 1382 inst->next_istate = get_single_rep_val(inst->next_istate_rep); 1383 debug_msg("previous states: cur: %d, next: %d", inst->cur_istate, 1384 inst->next_istate); 1385 1386 return (0); 1387 } 1388 1389 /* 1390 * Retrieve stored process ids and register each of them so we process their 1391 * termination. 1392 */ 1393 static int 1394 retrieve_method_pids(instance_t *inst) 1395 { 1396 rep_val_t *rv; 1397 1398 debug_msg("Entering remove_method_pids"); 1399 1400 switch (retrieve_rep_vals(inst->start_pids, inst->fmri, 1401 PR_NAME_START_PIDS)) { 1402 case 0: 1403 break; 1404 case SCF_ERROR_NOT_FOUND: 1405 return (0); 1406 default: 1407 error_msg(gettext("Failed to retrieve the start pids of " 1408 "instance %s from repository: %s"), inst->fmri, 1409 scf_strerror(scf_error())); 1410 return (-1); 1411 } 1412 1413 rv = uu_list_first(inst->start_pids); 1414 while (rv != NULL) { 1415 if (register_method(inst, (pid_t)rv->val, (ctid_t)-1, 1416 IM_START) == 0) { 1417 inst->copies++; 1418 rv = uu_list_next(inst->start_pids, rv); 1419 } else if (errno == ENOENT) { 1420 pid_t pid = (pid_t)rv->val; 1421 1422 /* 1423 * The process must have already terminated. Remove 1424 * it from the list. 1425 */ 1426 rv = uu_list_next(inst->start_pids, rv); 1427 remove_rep_val(inst->start_pids, pid); 1428 } else { 1429 error_msg(gettext("Failed to listen for the completion " 1430 "of %s method of instance %s"), START_METHOD_NAME, 1431 inst->fmri); 1432 rv = uu_list_next(inst->start_pids, rv); 1433 } 1434 } 1435 1436 /* synch the repository pid list to remove any terminated pids */ 1437 (void) store_rep_vals(inst->start_pids, inst->fmri, PR_NAME_START_PIDS); 1438 1439 return (0); 1440 } 1441 1442 /* 1443 * Remove the passed instance from inetd control. 1444 */ 1445 static void 1446 remove_instance(instance_t *instance) 1447 { 1448 debug_msg("Entering remove_instance"); 1449 1450 switch (instance->cur_istate) { 1451 case IIS_ONLINE: 1452 case IIS_DEGRADED: 1453 /* stop listening for network connections */ 1454 destroy_bound_fds(instance); 1455 break; 1456 case IIS_OFFLINE_BIND: 1457 cancel_bind_timer(instance); 1458 break; 1459 case IIS_OFFLINE_CONRATE: 1460 cancel_inst_timer(instance); 1461 break; 1462 } 1463 1464 /* stop listening for terminated methods */ 1465 unregister_instance_methods(instance); 1466 1467 uu_list_remove(instance_list, instance); 1468 destroy_instance(instance); 1469 } 1470 1471 /* 1472 * Refresh the configuration of instance 'inst'. This method gets called as 1473 * a result of a refresh event for the instance from the master restarter, so 1474 * we can rely upon the instance's running snapshot having been updated from 1475 * its configuration snapshot. 1476 */ 1477 void 1478 refresh_instance(instance_t *inst) 1479 { 1480 instance_cfg_t *cfg; 1481 1482 debug_msg("Entering refresh_instance: inst: %s", inst->fmri); 1483 1484 switch (inst->cur_istate) { 1485 case IIS_MAINTENANCE: 1486 case IIS_DISABLED: 1487 case IIS_UNINITIALIZED: 1488 /* 1489 * Ignore any possible changes, we'll re-read the configuration 1490 * automatically when we exit these states. 1491 */ 1492 break; 1493 1494 case IIS_OFFLINE_COPIES: 1495 case IIS_OFFLINE_BIND: 1496 case IIS_OFFLINE: 1497 case IIS_OFFLINE_CONRATE: 1498 destroy_instance_cfg(inst->config); 1499 if ((inst->config = read_instance_cfg(inst->fmri)) == NULL) { 1500 log_invalid_cfg(inst->fmri); 1501 if (inst->cur_istate == IIS_OFFLINE_BIND) { 1502 cancel_bind_timer(inst); 1503 } else if (inst->cur_istate == IIS_OFFLINE_CONRATE) { 1504 cancel_inst_timer(inst); 1505 } 1506 update_state(inst, IIS_MAINTENANCE, RERR_FAULT); 1507 } else { 1508 switch (inst->cur_istate) { 1509 case IIS_OFFLINE_BIND: 1510 if (copies_limit_exceeded(inst)) { 1511 /* Cancel scheduled bind retries. */ 1512 cancel_bind_timer(inst); 1513 1514 /* 1515 * Take the instance to the copies 1516 * offline state, via the offline 1517 * state. 1518 */ 1519 update_state(inst, IIS_OFFLINE, 1520 RERR_RESTART); 1521 process_offline_inst(inst); 1522 } 1523 break; 1524 1525 case IIS_OFFLINE: 1526 process_offline_inst(inst); 1527 break; 1528 1529 case IIS_OFFLINE_CONRATE: 1530 /* 1531 * Since we're already in a DOS state, 1532 * don't bother evaluating the copies 1533 * limit. This will be evaluated when 1534 * we leave this state in 1535 * process_offline_inst(). 1536 */ 1537 break; 1538 1539 case IIS_OFFLINE_COPIES: 1540 /* 1541 * Check if the copies limit has been increased 1542 * above the current count. 1543 */ 1544 if (!copies_limit_exceeded(inst)) { 1545 update_state(inst, IIS_OFFLINE, 1546 RERR_RESTART); 1547 process_offline_inst(inst); 1548 } 1549 break; 1550 1551 default: 1552 assert(0); 1553 } 1554 } 1555 break; 1556 1557 case IIS_DEGRADED: 1558 case IIS_ONLINE: 1559 if ((cfg = read_instance_cfg(inst->fmri)) != NULL) { 1560 instance_cfg_t *ocfg = inst->config; 1561 1562 /* 1563 * Try to avoid the overhead of taking an instance 1564 * offline and back on again. We do this by limiting 1565 * this behavior to two eventualities: 1566 * - there needs to be a re-bind to listen on behalf 1567 * of the instance with its new configuration. This 1568 * could be because for example its service has been 1569 * associated with a different port, or because the 1570 * v6only protocol option has been newly applied to 1571 * the instance. 1572 * - one or both of the start or online methods of the 1573 * instance have changed in the new configuration. 1574 * Without taking the instance offline when the 1575 * start method changed the instance may be running 1576 * with unwanted parameters (or event an unwanted 1577 * binary); and without taking the instance offline 1578 * if its online method was to change, some part of 1579 * its running environment may have changed and would 1580 * not be picked up until the instance next goes 1581 * offline for another reason. 1582 */ 1583 if ((!bind_config_equal(ocfg->basic, cfg->basic)) || 1584 !method_info_equal(ocfg->methods[IM_ONLINE], 1585 cfg->methods[IM_ONLINE]) || 1586 !method_info_equal(ocfg->methods[IM_START], 1587 cfg->methods[IM_START])) { 1588 destroy_bound_fds(inst); 1589 1590 assert(inst->new_config == NULL); 1591 inst->new_config = cfg; 1592 1593 (void) run_method(inst, IM_OFFLINE, NULL); 1594 } else { /* no bind config / method changes */ 1595 1596 /* 1597 * swap the proto list over from the old 1598 * configuration to the new, so we retain 1599 * our set of network fds. 1600 */ 1601 destroy_proto_list(cfg->basic); 1602 cfg->basic->proto_list = 1603 ocfg->basic->proto_list; 1604 ocfg->basic->proto_list = NULL; 1605 destroy_instance_cfg(ocfg); 1606 inst->config = cfg; 1607 1608 /* re-evaluate copies limits based on new cfg */ 1609 if (copies_limit_exceeded(inst)) { 1610 destroy_bound_fds(inst); 1611 (void) run_method(inst, IM_OFFLINE, 1612 NULL); 1613 } else { 1614 /* 1615 * Since the instance isn't being 1616 * taken offline, where we assume it 1617 * would pick-up any configuration 1618 * changes automatically when it goes 1619 * back online, run its refresh method 1620 * to allow it to pick-up any changes 1621 * whilst still online. 1622 */ 1623 (void) run_method(inst, IM_REFRESH, 1624 NULL); 1625 } 1626 } 1627 } else { 1628 log_invalid_cfg(inst->fmri); 1629 1630 destroy_bound_fds(inst); 1631 1632 inst->maintenance_req = B_TRUE; 1633 (void) run_method(inst, IM_OFFLINE, NULL); 1634 } 1635 break; 1636 1637 default: 1638 debug_msg("Unhandled current state %d for instance in " 1639 "refresh_instance", inst->cur_istate); 1640 assert(0); 1641 } 1642 } 1643 1644 /* 1645 * Called by process_restarter_event() to handle a restarter event for an 1646 * instance. 1647 */ 1648 static void 1649 handle_restarter_event(instance_t *instance, restarter_event_type_t event, 1650 boolean_t send_ack) 1651 { 1652 debug_msg("Entering handle_restarter_event: inst: %s, event: %d, " 1653 "curr state: %d", instance->fmri, event, instance->cur_istate); 1654 1655 switch (event) { 1656 case RESTARTER_EVENT_TYPE_ADMIN_REFRESH: 1657 refresh_instance(instance); 1658 goto done; 1659 case RESTARTER_EVENT_TYPE_REMOVE_INSTANCE: 1660 remove_instance(instance); 1661 goto done; 1662 case RESTARTER_EVENT_TYPE_STOP: 1663 switch (instance->cur_istate) { 1664 case IIS_OFFLINE_CONRATE: 1665 case IIS_OFFLINE_BIND: 1666 case IIS_OFFLINE_COPIES: 1667 /* 1668 * inetd must be closing down as we wouldn't get this 1669 * event in one of these states from the master 1670 * restarter. Take the instance to the offline resting 1671 * state. 1672 */ 1673 if (instance->cur_istate == IIS_OFFLINE_BIND) { 1674 cancel_bind_timer(instance); 1675 } else if (instance->cur_istate == 1676 IIS_OFFLINE_CONRATE) { 1677 cancel_inst_timer(instance); 1678 } 1679 update_state(instance, IIS_OFFLINE, RERR_RESTART); 1680 goto done; 1681 } 1682 break; 1683 case RESTARTER_EVENT_TYPE_ADMIN_RESTART: 1684 /* 1685 * We've got a restart event, so if the instance is online 1686 * in any way initiate taking it offline, and rely upon 1687 * our restarter to send us an online event to bring 1688 * it back online. 1689 */ 1690 switch (instance->cur_istate) { 1691 case IIS_ONLINE: 1692 case IIS_DEGRADED: 1693 destroy_bound_fds(instance); 1694 (void) run_method(instance, IM_OFFLINE, NULL); 1695 } 1696 goto done; 1697 } 1698 1699 switch (instance->cur_istate) { 1700 case IIS_OFFLINE: 1701 switch (event) { 1702 case RESTARTER_EVENT_TYPE_START: 1703 /* 1704 * Dependencies are met, let's take the service online. 1705 * Only try and bind for a wait type service if 1706 * no process is running on its behalf. Otherwise, just 1707 * mark the service online and binding will be attempted 1708 * when the process exits. 1709 */ 1710 if (!(instance->config->basic->iswait && 1711 (uu_list_first(instance->start_pids) != NULL))) { 1712 create_bound_fds(instance); 1713 } else { 1714 update_state(instance, IIS_ONLINE, RERR_NONE); 1715 } 1716 break; 1717 case RESTARTER_EVENT_TYPE_DISABLE: 1718 case RESTARTER_EVENT_TYPE_ADMIN_DISABLE: 1719 /* 1720 * The instance should be disabled, so run the 1721 * instance's disabled method that will do the work 1722 * to take it there. 1723 */ 1724 (void) run_method(instance, IM_DISABLE, NULL); 1725 break; 1726 case RESTARTER_EVENT_TYPE_ADMIN_MAINT_ON: 1727 case RESTARTER_EVENT_TYPE_DEPENDENCY_CYCLE: 1728 case RESTARTER_EVENT_TYPE_INVALID_DEPENDENCY: 1729 /* 1730 * The master restarter has requested the instance 1731 * go to maintenance; since we're already offline 1732 * just update the state to the maintenance state. 1733 */ 1734 update_state(instance, IIS_MAINTENANCE, RERR_RESTART); 1735 break; 1736 } 1737 break; 1738 1739 case IIS_OFFLINE_BIND: 1740 switch (event) { 1741 case RESTARTER_EVENT_TYPE_DISABLE: 1742 case RESTARTER_EVENT_TYPE_ADMIN_DISABLE: 1743 /* 1744 * The instance should be disabled. Firstly, as for 1745 * the above dependencies unmet comment, cancel 1746 * the bind retry timer and update the state to 1747 * offline. Then, run the disable method to do the 1748 * work to take the instance from offline to 1749 * disabled. 1750 */ 1751 cancel_bind_timer(instance); 1752 update_state(instance, IIS_OFFLINE, RERR_RESTART); 1753 (void) run_method(instance, IM_DISABLE, NULL); 1754 break; 1755 case RESTARTER_EVENT_TYPE_ADMIN_MAINT_ON: 1756 case RESTARTER_EVENT_TYPE_DEPENDENCY_CYCLE: 1757 case RESTARTER_EVENT_TYPE_INVALID_DEPENDENCY: 1758 /* 1759 * The master restarter has requested the instance 1760 * be placed in the maintenance state. Cancel the 1761 * outstanding retry timer, and since we're already 1762 * offline, update the state to maintenance. 1763 */ 1764 cancel_bind_timer(instance); 1765 update_state(instance, IIS_MAINTENANCE, RERR_RESTART); 1766 break; 1767 } 1768 break; 1769 1770 case IIS_DEGRADED: 1771 case IIS_ONLINE: 1772 switch (event) { 1773 case RESTARTER_EVENT_TYPE_DISABLE: 1774 case RESTARTER_EVENT_TYPE_ADMIN_DISABLE: 1775 /* 1776 * The instance needs to be disabled. Do the same work 1777 * as for the dependencies unmet event below to 1778 * take the instance offline. 1779 */ 1780 destroy_bound_fds(instance); 1781 /* 1782 * Indicate that the offline method is being run 1783 * as part of going to the disabled state, and to 1784 * carry on this transition. 1785 */ 1786 instance->disable_req = B_TRUE; 1787 (void) run_method(instance, IM_OFFLINE, NULL); 1788 break; 1789 case RESTARTER_EVENT_TYPE_ADMIN_MAINT_ON: 1790 case RESTARTER_EVENT_TYPE_DEPENDENCY_CYCLE: 1791 case RESTARTER_EVENT_TYPE_INVALID_DEPENDENCY: 1792 /* 1793 * The master restarter has requested the instance be 1794 * placed in the maintenance state. This involves 1795 * firstly taking the service offline, so do the 1796 * same work as for the dependencies unmet event 1797 * below. We set the maintenance_req flag to 1798 * indicate that when we get to the offline state 1799 * we should be placed directly into the maintenance 1800 * state. 1801 */ 1802 instance->maintenance_req = B_TRUE; 1803 /* FALLTHROUGH */ 1804 case RESTARTER_EVENT_TYPE_STOP: 1805 /* 1806 * Dependencies have become unmet. Close and 1807 * stop listening on the instance's network file 1808 * descriptor, and run the offline method to do 1809 * any work required to take us to the offline state. 1810 */ 1811 destroy_bound_fds(instance); 1812 (void) run_method(instance, IM_OFFLINE, NULL); 1813 } 1814 break; 1815 1816 case IIS_UNINITIALIZED: 1817 if (event == RESTARTER_EVENT_TYPE_DISABLE || 1818 event == RESTARTER_EVENT_TYPE_ADMIN_DISABLE) { 1819 update_state(instance, IIS_DISABLED, RERR_NONE); 1820 break; 1821 } else if (event != RESTARTER_EVENT_TYPE_ENABLE) { 1822 /* 1823 * Ignore other events until we know whether we're 1824 * enabled or not. 1825 */ 1826 break; 1827 } 1828 1829 /* 1830 * We've got an enabled event; make use of the handling in the 1831 * disable case. 1832 */ 1833 /* FALLTHROUGH */ 1834 1835 case IIS_DISABLED: 1836 switch (event) { 1837 case RESTARTER_EVENT_TYPE_ENABLE: 1838 /* 1839 * The instance needs enabling. Commence reading its 1840 * configuration and if successful place the instance 1841 * in the offline state and let process_offline_inst() 1842 * take it from there. 1843 */ 1844 destroy_instance_cfg(instance->config); 1845 instance->config = read_instance_cfg(instance->fmri); 1846 if (instance->config != NULL) { 1847 update_state(instance, IIS_OFFLINE, 1848 RERR_RESTART); 1849 process_offline_inst(instance); 1850 } else { 1851 log_invalid_cfg(instance->fmri); 1852 update_state(instance, IIS_MAINTENANCE, 1853 RERR_RESTART); 1854 } 1855 1856 break; 1857 case RESTARTER_EVENT_TYPE_ADMIN_MAINT_ON: 1858 case RESTARTER_EVENT_TYPE_DEPENDENCY_CYCLE: 1859 case RESTARTER_EVENT_TYPE_INVALID_DEPENDENCY: 1860 /* 1861 * The master restarter has requested the instance be 1862 * placed in the maintenance state, so just update its 1863 * state to maintenance. 1864 */ 1865 update_state(instance, IIS_MAINTENANCE, RERR_RESTART); 1866 break; 1867 } 1868 break; 1869 1870 case IIS_MAINTENANCE: 1871 switch (event) { 1872 case RESTARTER_EVENT_TYPE_ADMIN_MAINT_OFF: 1873 case RESTARTER_EVENT_TYPE_ADMIN_DISABLE: 1874 /* 1875 * The master restarter has requested that the instance 1876 * be taken out of maintenance. Read its configuration, 1877 * and if successful place the instance in the offline 1878 * state and call process_offline_inst() to take it 1879 * from there. 1880 */ 1881 destroy_instance_cfg(instance->config); 1882 instance->config = read_instance_cfg(instance->fmri); 1883 if (instance->config != NULL) { 1884 update_state(instance, IIS_OFFLINE, 1885 RERR_RESTART); 1886 process_offline_inst(instance); 1887 } else { 1888 boolean_t enabled; 1889 1890 /* 1891 * The configuration was invalid. If the 1892 * service has disabled requested, let's 1893 * just place the instance in disabled even 1894 * though we haven't been able to run its 1895 * disable method, as the slightly incorrect 1896 * state is likely to be less of an issue to 1897 * an administrator than refusing to move an 1898 * instance to disabled. If disable isn't 1899 * requested, re-mark the service's state 1900 * as maintenance, so the administrator can 1901 * see the request was processed. 1902 */ 1903 if ((read_enable_merged(instance->fmri, 1904 &enabled) == 0) && !enabled) { 1905 update_state(instance, IIS_DISABLED, 1906 RERR_RESTART); 1907 } else { 1908 log_invalid_cfg(instance->fmri); 1909 update_state(instance, IIS_MAINTENANCE, 1910 RERR_FAULT); 1911 } 1912 } 1913 break; 1914 } 1915 break; 1916 1917 case IIS_OFFLINE_CONRATE: 1918 switch (event) { 1919 case RESTARTER_EVENT_TYPE_DISABLE: 1920 /* 1921 * The instance wants disabling. Take the instance 1922 * offline as for the dependencies unmet event above, 1923 * and then from there run the disable method to do 1924 * the work to take the instance to the disabled state. 1925 */ 1926 cancel_inst_timer(instance); 1927 update_state(instance, IIS_OFFLINE, RERR_RESTART); 1928 (void) run_method(instance, IM_DISABLE, NULL); 1929 break; 1930 case RESTARTER_EVENT_TYPE_ADMIN_MAINT_ON: 1931 case RESTARTER_EVENT_TYPE_DEPENDENCY_CYCLE: 1932 case RESTARTER_EVENT_TYPE_INVALID_DEPENDENCY: 1933 /* 1934 * The master restarter has requested the instance 1935 * be taken to maintenance. Cancel the timer setup 1936 * when we entered this state, and go directly to 1937 * maintenance. 1938 */ 1939 cancel_inst_timer(instance); 1940 update_state(instance, IIS_MAINTENANCE, RERR_RESTART); 1941 break; 1942 } 1943 break; 1944 1945 case IIS_OFFLINE_COPIES: 1946 switch (event) { 1947 case RESTARTER_EVENT_TYPE_DISABLE: 1948 /* 1949 * The instance wants disabling. Update the state 1950 * to offline, and run the disable method to do the 1951 * work to take it to the disabled state. 1952 */ 1953 update_state(instance, IIS_OFFLINE, RERR_RESTART); 1954 (void) run_method(instance, IM_DISABLE, NULL); 1955 break; 1956 case RESTARTER_EVENT_TYPE_ADMIN_MAINT_ON: 1957 case RESTARTER_EVENT_TYPE_DEPENDENCY_CYCLE: 1958 case RESTARTER_EVENT_TYPE_INVALID_DEPENDENCY: 1959 /* 1960 * The master restarter has requested the instance be 1961 * placed in maintenance. Since it's already offline 1962 * simply update the state. 1963 */ 1964 update_state(instance, IIS_MAINTENANCE, RERR_RESTART); 1965 break; 1966 } 1967 break; 1968 1969 default: 1970 debug_msg("handle_restarter_event: instance in an " 1971 "unexpected state"); 1972 assert(0); 1973 } 1974 1975 done: 1976 if (send_ack) 1977 ack_restarter_event(B_TRUE); 1978 } 1979 1980 /* 1981 * Tries to read and process an event from the event pipe. If there isn't one 1982 * or an error occurred processing the event it returns -1. Else, if the event 1983 * is for an instance we're not already managing we read its state, add it to 1984 * our list to manage, and if appropriate read its configuration. Whether it's 1985 * new to us or not, we then handle the specific event. 1986 * Returns 0 if an event was read and processed successfully, else -1. 1987 */ 1988 static int 1989 process_restarter_event(void) 1990 { 1991 char *fmri; 1992 size_t fmri_size; 1993 restarter_event_type_t event_type; 1994 instance_t *instance; 1995 restarter_event_t *event; 1996 ssize_t sz; 1997 1998 debug_msg("Entering process_restarter_event"); 1999 2000 /* 2001 * Try to read an event pointer from the event pipe. 2002 */ 2003 errno = 0; 2004 switch (safe_read(rst_event_pipe[PE_CONSUMER], &event, 2005 sizeof (event))) { 2006 case 0: 2007 break; 2008 case 1: 2009 if (errno == EAGAIN) /* no event to read */ 2010 return (-1); 2011 2012 /* other end of pipe closed */ 2013 2014 /* FALLTHROUGH */ 2015 default: /* unexpected read error */ 2016 /* 2017 * There's something wrong with the event pipe. Let's 2018 * shutdown and be restarted. 2019 */ 2020 inetd_stop(); 2021 return (-1); 2022 } 2023 2024 /* 2025 * Check if we're currently managing the instance which the event 2026 * pertains to. If not, read its complete state and add it to our 2027 * list to manage. 2028 */ 2029 2030 fmri_size = scf_limit(SCF_LIMIT_MAX_FMRI_LENGTH); 2031 if ((fmri = malloc(fmri_size)) == NULL) { 2032 error_msg(strerror(errno)); 2033 goto fail; 2034 } 2035 sz = restarter_event_get_instance(event, fmri, fmri_size); 2036 if (sz >= fmri_size) 2037 assert(0); 2038 2039 for (instance = uu_list_first(instance_list); instance != NULL; 2040 instance = uu_list_next(instance_list, instance)) { 2041 if (strcmp(instance->fmri, fmri) == 0) 2042 break; 2043 } 2044 2045 if (instance == NULL) { 2046 int err; 2047 2048 debug_msg("New instance to manage: %s", fmri); 2049 2050 if (((instance = create_instance(fmri)) == NULL) || 2051 (retrieve_instance_state(instance) != 0) || 2052 (retrieve_method_pids(instance) != 0)) { 2053 destroy_instance(instance); 2054 free(fmri); 2055 goto fail; 2056 } 2057 2058 if (((err = iterate_repository_contracts(instance, 0)) 2059 != 0) && (err != ENOENT)) { 2060 error_msg(gettext( 2061 "Failed to adopt contracts of instance %s: %s"), 2062 instance->fmri, strerror(err)); 2063 destroy_instance(instance); 2064 free(fmri); 2065 goto fail; 2066 } 2067 2068 uu_list_node_init(instance, &instance->link, instance_pool); 2069 (void) uu_list_insert_after(instance_list, NULL, instance); 2070 2071 /* 2072 * Only read configuration for instances that aren't in any of 2073 * the disabled, maintenance or uninitialized states, since 2074 * they'll read it on state exit. 2075 */ 2076 if ((instance->cur_istate != IIS_DISABLED) && 2077 (instance->cur_istate != IIS_MAINTENANCE) && 2078 (instance->cur_istate != IIS_UNINITIALIZED)) { 2079 instance->config = read_instance_cfg(instance->fmri); 2080 if (instance->config == NULL) { 2081 log_invalid_cfg(instance->fmri); 2082 update_state(instance, IIS_MAINTENANCE, 2083 RERR_FAULT); 2084 } 2085 } 2086 } 2087 2088 free(fmri); 2089 2090 event_type = restarter_event_get_type(event); 2091 debug_msg("Event type: %d for instance: %s", event_type, 2092 instance->fmri); 2093 2094 /* 2095 * If the instance is currently running a method, don't process the 2096 * event now, but attach it to the instance for processing when 2097 * the instance finishes its transition. 2098 */ 2099 if (INST_IN_TRANSITION(instance)) { 2100 debug_msg("storing event %d for instance %s", event_type, 2101 instance->fmri); 2102 instance->pending_rst_event = event_type; 2103 } else { 2104 handle_restarter_event(instance, event_type, B_TRUE); 2105 } 2106 2107 return (0); 2108 2109 fail: 2110 ack_restarter_event(B_FALSE); 2111 return (-1); 2112 } 2113 2114 /* 2115 * Do the state machine processing associated with the termination of instance 2116 * 'inst''s start method. 2117 */ 2118 void 2119 process_start_term(instance_t *inst) 2120 { 2121 basic_cfg_t *cfg; 2122 2123 debug_msg("Entering process_start_term: inst: %s", inst->fmri); 2124 2125 inst->copies--; 2126 2127 if ((inst->cur_istate == IIS_MAINTENANCE) || 2128 (inst->cur_istate == IIS_DISABLED)) { 2129 /* do any further processing/checks when we exit these states */ 2130 return; 2131 } 2132 2133 cfg = inst->config->basic; 2134 2135 if (cfg->iswait) { 2136 proto_info_t *pi; 2137 2138 switch (inst->cur_istate) { 2139 case IIS_ONLINE: 2140 case IIS_DEGRADED: 2141 case IIS_IN_REFRESH_METHOD: 2142 /* 2143 * A wait type service's start method has exited. 2144 * Check if the method was fired off in this inetd's 2145 * lifetime, or a previous one; if the former, 2146 * re-commence listening on the service's behalf; if 2147 * the latter, mark the service offline and let bind 2148 * attempts commence. 2149 */ 2150 for (pi = uu_list_first(cfg->proto_list); pi != NULL; 2151 pi = uu_list_next(cfg->proto_list, pi)) { 2152 /* 2153 * If a bound fd exists, the method was fired 2154 * off during this inetd's lifetime. 2155 */ 2156 if (pi->listen_fd != -1) 2157 break; 2158 } 2159 if (pi != NULL) { 2160 if (poll_bound_fds(inst, B_TRUE) != 0) 2161 handle_bind_failure(inst); 2162 } else { 2163 update_state(inst, IIS_OFFLINE, RERR_RESTART); 2164 create_bound_fds(inst); 2165 } 2166 } 2167 } else { 2168 /* 2169 * Check if a nowait service should be brought back online 2170 * after exceeding its copies limit. 2171 */ 2172 if ((inst->cur_istate == IIS_OFFLINE_COPIES) && 2173 !copies_limit_exceeded(inst)) { 2174 update_state(inst, IIS_OFFLINE, RERR_NONE); 2175 process_offline_inst(inst); 2176 } 2177 } 2178 } 2179 2180 /* 2181 * If the instance has a pending event process it and initiate the 2182 * acknowledgement. 2183 */ 2184 static void 2185 process_pending_rst_event(instance_t *inst) 2186 { 2187 if (inst->pending_rst_event != RESTARTER_EVENT_TYPE_INVALID) { 2188 restarter_event_type_t re; 2189 2190 debug_msg("Injecting pending event %d for instance %s", 2191 inst->pending_rst_event, inst->fmri); 2192 re = inst->pending_rst_event; 2193 inst->pending_rst_event = RESTARTER_EVENT_TYPE_INVALID; 2194 handle_restarter_event(inst, re, B_TRUE); 2195 } 2196 } 2197 2198 /* 2199 * Do the state machine processing associated with the termination 2200 * of the specified instance's non-start method with the specified status. 2201 * Once the processing of the termination is done, the function also picks up 2202 * any processing that was blocked on the method running. 2203 */ 2204 void 2205 process_non_start_term(instance_t *inst, int status) 2206 { 2207 boolean_t ran_online_method = B_FALSE; 2208 2209 debug_msg("Entering process_non_start_term: inst: %s, method: %s", 2210 inst->fmri, methods[states[inst->cur_istate].method_running].name); 2211 2212 if (status == IMRET_FAILURE) { 2213 error_msg(gettext("The %s method of instance %s failed, " 2214 "transitioning to maintenance"), 2215 methods[states[inst->cur_istate].method_running].name, 2216 inst->fmri); 2217 2218 if ((inst->cur_istate == IIS_IN_ONLINE_METHOD) || 2219 (inst->cur_istate == IIS_IN_REFRESH_METHOD)) 2220 destroy_bound_fds(inst); 2221 2222 update_state(inst, IIS_MAINTENANCE, RERR_FAULT); 2223 2224 inst->maintenance_req = B_FALSE; 2225 inst->conn_rate_exceeded = B_FALSE; 2226 2227 if (inst->new_config != NULL) { 2228 destroy_instance_cfg(inst->new_config); 2229 inst->new_config = NULL; 2230 } 2231 2232 if (!inetd_stopping) 2233 process_pending_rst_event(inst); 2234 2235 return; 2236 } 2237 2238 /* non-failure method return */ 2239 2240 if (status != IMRET_SUCCESS) { 2241 /* 2242 * An instance method never returned a supported return code. 2243 * We'll assume this means the method succeeded for now whilst 2244 * non-GL-cognizant methods are used - eg. pkill. 2245 */ 2246 debug_msg("The %s method of instance %s returned " 2247 "non-compliant exit code: %d, assuming success", 2248 methods[states[inst->cur_istate].method_running].name, 2249 inst->fmri, status); 2250 } 2251 2252 /* 2253 * Update the state from the in-transition state. 2254 */ 2255 switch (inst->cur_istate) { 2256 case IIS_IN_ONLINE_METHOD: 2257 ran_online_method = B_TRUE; 2258 /* FALLTHROUGH */ 2259 case IIS_IN_REFRESH_METHOD: 2260 /* 2261 * If we've exhausted the bind retries, flag that by setting 2262 * the instance's state to degraded. 2263 */ 2264 if (inst->bind_retries_exceeded) { 2265 update_state(inst, IIS_DEGRADED, RERR_NONE); 2266 break; 2267 } 2268 /* FALLTHROUGH */ 2269 default: 2270 update_state(inst, 2271 methods[states[inst->cur_istate].method_running].dst_state, 2272 RERR_NONE); 2273 } 2274 2275 if (inst->cur_istate == IIS_OFFLINE) { 2276 if (inst->new_config != NULL) { 2277 /* 2278 * This instance was found during refresh to need 2279 * taking offline because its newly read configuration 2280 * was sufficiently different. Now we're offline, 2281 * activate this new configuration. 2282 */ 2283 destroy_instance_cfg(inst->config); 2284 inst->config = inst->new_config; 2285 inst->new_config = NULL; 2286 } 2287 2288 /* continue/complete any transitions that are in progress */ 2289 process_offline_inst(inst); 2290 2291 } else if (ran_online_method) { 2292 /* 2293 * We've just successfully executed the online method. We have 2294 * a set of bound network fds that were created before running 2295 * this method, so now we're online start listening for 2296 * connections on them. 2297 */ 2298 if (poll_bound_fds(inst, B_TRUE) != 0) 2299 handle_bind_failure(inst); 2300 } 2301 2302 /* 2303 * If we're now out of transition (process_offline_inst() could have 2304 * fired off another method), carry out any jobs that were blocked by 2305 * us being in transition. 2306 */ 2307 if (!INST_IN_TRANSITION(inst)) { 2308 if (inetd_stopping) { 2309 if (!instance_stopped(inst)) { 2310 /* 2311 * inetd is stopping, and this instance hasn't 2312 * been stopped. Inject a stop event. 2313 */ 2314 handle_restarter_event(inst, 2315 RESTARTER_EVENT_TYPE_STOP, B_FALSE); 2316 } 2317 } else { 2318 process_pending_rst_event(inst); 2319 } 2320 } 2321 } 2322 2323 /* 2324 * Check if configuration file specified is readable. If not return B_FALSE, 2325 * else return B_TRUE. 2326 */ 2327 static boolean_t 2328 can_read_file(const char *path) 2329 { 2330 int ret; 2331 int serrno; 2332 2333 debug_msg("Entering can_read_file"); 2334 do { 2335 ret = access(path, R_OK); 2336 } while ((ret < 0) && (errno == EINTR)); 2337 if (ret < 0) { 2338 if (errno != ENOENT) { 2339 serrno = errno; 2340 error_msg(gettext("Failed to access configuration " 2341 "file %s for performing modification checks: %s"), 2342 path, strerror(errno)); 2343 errno = serrno; 2344 } 2345 return (B_FALSE); 2346 } 2347 return (B_TRUE); 2348 } 2349 2350 /* 2351 * Check whether the configuration file has changed contents since inetd 2352 * was last started/refreshed, and if so, log a message indicating that 2353 * inetconv needs to be run. 2354 */ 2355 static void 2356 check_conf_file(void) 2357 { 2358 char *new_hash; 2359 char *old_hash = NULL; 2360 scf_error_t ret; 2361 const char *file; 2362 2363 debug_msg("Entering check_conf_file"); 2364 2365 if (conf_file == NULL) { 2366 /* 2367 * No explicit config file specified, so see if one of the 2368 * default two are readable, checking the primary one first 2369 * followed by the secondary. 2370 */ 2371 if (can_read_file(PRIMARY_DEFAULT_CONF_FILE)) { 2372 file = PRIMARY_DEFAULT_CONF_FILE; 2373 } else if ((errno == ENOENT) && 2374 can_read_file(SECONDARY_DEFAULT_CONF_FILE)) { 2375 file = SECONDARY_DEFAULT_CONF_FILE; 2376 } else { 2377 return; 2378 } 2379 } else { 2380 file = conf_file; 2381 if (!can_read_file(file)) 2382 return; 2383 } 2384 2385 if (calculate_hash(file, &new_hash) == 0) { 2386 ret = retrieve_inetd_hash(&old_hash); 2387 if (((ret == SCF_ERROR_NONE) && 2388 (strcmp(old_hash, new_hash) != 0))) { 2389 /* modified config file */ 2390 warn_msg(gettext( 2391 "Configuration file %s has been modified since " 2392 "inetconv was last run. \"inetconv -i %s\" must be " 2393 "run to apply any changes to the SMF"), file, file); 2394 } else if ((ret != SCF_ERROR_NOT_FOUND) && 2395 (ret != SCF_ERROR_NONE)) { 2396 /* No message if hash not yet computed */ 2397 error_msg(gettext("Failed to check whether " 2398 "configuration file %s has been modified: %s"), 2399 file, scf_strerror(ret)); 2400 } 2401 free(old_hash); 2402 free(new_hash); 2403 } else { 2404 error_msg(gettext("Failed to check whether configuration file " 2405 "%s has been modified: %s"), file, strerror(errno)); 2406 } 2407 } 2408 2409 /* 2410 * Refresh all inetd's managed instances and check the configuration file 2411 * for any updates since inetconv was last run, logging a message if there 2412 * are. We call the SMF refresh function to refresh each instance so that 2413 * the refresh request goes through the framework, and thus results in the 2414 * running snapshot of each instance being updated from the configuration 2415 * snapshot. 2416 */ 2417 static void 2418 inetd_refresh(void) 2419 { 2420 instance_t *inst; 2421 2422 debug_msg("Entering inetd_refresh"); 2423 2424 /* call libscf to send refresh requests for all managed instances */ 2425 for (inst = uu_list_first(instance_list); inst != NULL; 2426 inst = uu_list_next(instance_list, inst)) { 2427 if (smf_refresh_instance(inst->fmri) < 0) { 2428 error_msg(gettext("Failed to refresh instance %s: %s"), 2429 inst->fmri, scf_strerror(scf_error())); 2430 } 2431 } 2432 2433 /* 2434 * Log a message if the configuration file has changed since inetconv 2435 * was last run. 2436 */ 2437 check_conf_file(); 2438 } 2439 2440 /* 2441 * Initiate inetd's shutdown. 2442 */ 2443 static void 2444 inetd_stop(void) 2445 { 2446 instance_t *inst; 2447 2448 debug_msg("Entering inetd_stop"); 2449 2450 /* Block handling signals for stop and refresh */ 2451 (void) sighold(SIGHUP); 2452 (void) sighold(SIGTERM); 2453 2454 /* Indicate inetd is coming down */ 2455 inetd_stopping = B_TRUE; 2456 2457 /* Stop polling on restarter events. */ 2458 clear_pollfd(rst_event_pipe[PE_CONSUMER]); 2459 2460 /* Stop polling for any more stop/refresh requests. */ 2461 clear_pollfd(uds_fd); 2462 2463 /* 2464 * Send a stop event to all currently unstopped instances that 2465 * aren't in transition. For those that are in transition, the 2466 * event will get sent when the transition completes. 2467 */ 2468 for (inst = uu_list_first(instance_list); inst != NULL; 2469 inst = uu_list_next(instance_list, inst)) { 2470 if (!instance_stopped(inst) && !INST_IN_TRANSITION(inst)) 2471 handle_restarter_event(inst, 2472 RESTARTER_EVENT_TYPE_STOP, B_FALSE); 2473 } 2474 } 2475 2476 /* 2477 * Sets up the intra-inetd-process Unix Domain Socket. 2478 * Returns -1 on error, else 0. 2479 */ 2480 static int 2481 uds_init(void) 2482 { 2483 struct sockaddr_un addr; 2484 2485 debug_msg("Entering uds_init"); 2486 2487 if ((uds_fd = socket(AF_UNIX, SOCK_STREAM, 0)) < 0) { 2488 error_msg("socket: %s", strerror(errno)); 2489 return (-1); 2490 } 2491 2492 disable_blocking(uds_fd); 2493 2494 (void) unlink(INETD_UDS_PATH); /* clean-up any stale files */ 2495 2496 (void) memset(&addr, 0, sizeof (addr)); 2497 addr.sun_family = AF_UNIX; 2498 /* CONSTCOND */ 2499 assert(sizeof (INETD_UDS_PATH) <= sizeof (addr.sun_path)); 2500 (void) strlcpy(addr.sun_path, INETD_UDS_PATH, sizeof (addr.sun_path)); 2501 2502 if (bind(uds_fd, (struct sockaddr *)(&addr), sizeof (addr)) < 0) { 2503 error_msg(gettext("Failed to bind socket to %s: %s"), 2504 INETD_UDS_PATH, strerror(errno)); 2505 (void) close(uds_fd); 2506 return (-1); 2507 } 2508 2509 (void) listen(uds_fd, UDS_BACKLOG); 2510 2511 if ((set_pollfd(uds_fd, POLLIN)) == -1) { 2512 (void) close(uds_fd); 2513 (void) unlink(INETD_UDS_PATH); 2514 return (-1); 2515 } 2516 2517 return (0); 2518 } 2519 2520 static void 2521 uds_fini(void) 2522 { 2523 if (uds_fd != -1) 2524 (void) close(uds_fd); 2525 (void) unlink(INETD_UDS_PATH); 2526 } 2527 2528 /* 2529 * Handle an incoming request on the Unix Domain Socket. Returns -1 if there 2530 * was an error handling the event, else 0. 2531 */ 2532 static int 2533 process_uds_event(void) 2534 { 2535 uds_request_t req; 2536 int fd; 2537 struct sockaddr_un addr; 2538 socklen_t len = sizeof (addr); 2539 int ret; 2540 uint_t retries = 0; 2541 2542 debug_msg("Entering process_uds_event"); 2543 2544 do { 2545 fd = accept(uds_fd, (struct sockaddr *)&addr, &len); 2546 } while ((fd < 0) && (errno == EINTR)); 2547 if (fd < 0) { 2548 if (errno != EWOULDBLOCK) 2549 error_msg("accept failed: %s", strerror(errno)); 2550 return (-1); 2551 } 2552 2553 for (retries = 0; retries < UDS_RECV_RETRIES; retries++) { 2554 if (((ret = safe_read(fd, &req, sizeof (req))) != 1) || 2555 (errno != EAGAIN)) 2556 break; 2557 2558 (void) poll(NULL, 0, 100); /* 100ms pause */ 2559 } 2560 2561 if (ret != 0) { 2562 error_msg(gettext("Failed read: %s"), strerror(errno)); 2563 (void) close(fd); 2564 return (-1); 2565 } 2566 2567 switch (req) { 2568 case UR_REFRESH_INETD: 2569 /* flag the request for event_loop() to process */ 2570 refresh_inetd_requested = B_TRUE; 2571 (void) close(fd); 2572 break; 2573 case UR_STOP_INETD: 2574 inetd_stop(); 2575 break; 2576 default: 2577 error_msg("unexpected UDS request"); 2578 (void) close(fd); 2579 return (-1); 2580 } 2581 2582 return (0); 2583 } 2584 2585 /* 2586 * Perform checks for common exec string errors. We limit the checks to 2587 * whether the file exists, is a regular file, and has at least one execute 2588 * bit set. We leave the core security checks to exec() so as not to duplicate 2589 * and thus incur the associated drawbacks, but hope to catch the common 2590 * errors here. 2591 */ 2592 static boolean_t 2593 passes_basic_exec_checks(const char *instance, const char *method, 2594 const char *path) 2595 { 2596 struct stat sbuf; 2597 2598 debug_msg("Entering passes_basic_exec_checks"); 2599 2600 /* check the file exists */ 2601 while (stat(path, &sbuf) == -1) { 2602 if (errno != EINTR) { 2603 error_msg(gettext( 2604 "Can't stat the %s method of instance %s: %s"), 2605 method, instance, strerror(errno)); 2606 return (B_FALSE); 2607 } 2608 } 2609 2610 /* 2611 * Check if the file is a regular file and has at least one execute 2612 * bit set. 2613 */ 2614 if ((sbuf.st_mode & S_IFMT) != S_IFREG) { 2615 error_msg(gettext( 2616 "The %s method of instance %s isn't a regular file"), 2617 method, instance); 2618 return (B_FALSE); 2619 } else if ((sbuf.st_mode & (S_IXUSR | S_IXGRP | S_IXOTH)) == 0) { 2620 error_msg(gettext("The %s method instance %s doesn't have " 2621 "any execute permissions set"), method, instance); 2622 return (B_FALSE); 2623 } 2624 2625 return (B_TRUE); 2626 } 2627 2628 static void 2629 exec_method(instance_t *instance, instance_method_t method, method_info_t *mi, 2630 struct method_context *mthd_ctxt, const proto_info_t *pi) 2631 { 2632 char **args; 2633 char **env; 2634 const char *errf; 2635 int serrno; 2636 basic_cfg_t *cfg = instance->config->basic; 2637 2638 if (method == IM_START) { 2639 /* 2640 * If wrappers checks fail, pretend the method was exec'd and 2641 * failed. 2642 */ 2643 if (!tcp_wrappers_ok(instance)) 2644 exit(IMRET_FAILURE); 2645 } 2646 2647 /* 2648 * Revert the disposition of handled signals and ignored signals to 2649 * their defaults, unblocking any blocked ones as a side effect. 2650 */ 2651 (void) sigset(SIGHUP, SIG_DFL); 2652 (void) sigset(SIGTERM, SIG_DFL); 2653 (void) sigset(SIGINT, SIG_DFL); 2654 2655 /* 2656 * Setup exec arguments. Do this before the fd setup below, so our 2657 * logging related file fd doesn't get taken over before we call 2658 * expand_address(). 2659 */ 2660 if ((method == IM_START) && 2661 (strcmp(mi->exec_args_we.we_wordv[0], "%A") == 0)) { 2662 args = expand_address(instance, pi); 2663 } else { 2664 args = mi->exec_args_we.we_wordv; 2665 } 2666 2667 /* Generate audit trail for start operations */ 2668 if (method == IM_START) { 2669 adt_event_data_t *ae; 2670 struct sockaddr_storage ss; 2671 priv_set_t *privset; 2672 socklen_t sslen = sizeof (ss); 2673 2674 if ((ae = adt_alloc_event(audit_handle, ADT_inetd_connect)) 2675 == NULL) { 2676 error_msg(gettext("Unable to allocate audit event for " 2677 "the %s method of instance %s"), 2678 methods[method].name, instance->fmri); 2679 exit(IMRET_FAILURE); 2680 } 2681 2682 /* 2683 * The inetd_connect audit record consists of: 2684 * Service name 2685 * Execution path 2686 * Remote address and port 2687 * Local port 2688 * Process privileges 2689 */ 2690 ae->adt_inetd_connect.service_name = cfg->svc_name; 2691 ae->adt_inetd_connect.cmd = mi->exec_path; 2692 2693 if (instance->remote_addr.ss_family == AF_INET) { 2694 struct in_addr *in = SS_SINADDR(instance->remote_addr); 2695 ae->adt_inetd_connect.ip_adr[0] = in->s_addr; 2696 ae->adt_inetd_connect.ip_type = ADT_IPv4; 2697 } else { 2698 uint32_t *addr6; 2699 int i; 2700 2701 ae->adt_inetd_connect.ip_type = ADT_IPv6; 2702 addr6 = (uint32_t *)SS_SINADDR(instance->remote_addr); 2703 for (i = 0; i < 4; ++i) 2704 ae->adt_inetd_connect.ip_adr[i] = addr6[i]; 2705 } 2706 2707 ae->adt_inetd_connect.ip_remote_port = 2708 ntohs(SS_PORT(instance->remote_addr)); 2709 2710 if (getsockname(instance->conn_fd, (struct sockaddr *)&ss, 2711 &sslen) == 0) 2712 ae->adt_inetd_connect.ip_local_port = 2713 ntohs(SS_PORT(ss)); 2714 2715 privset = mthd_ctxt->priv_set; 2716 if (privset == NULL) { 2717 privset = priv_allocset(); 2718 if (privset != NULL && 2719 getppriv(PRIV_EFFECTIVE, privset) != 0) { 2720 priv_freeset(privset); 2721 privset = NULL; 2722 } 2723 } 2724 2725 ae->adt_inetd_connect.privileges = privset; 2726 2727 (void) adt_put_event(ae, ADT_SUCCESS, ADT_SUCCESS); 2728 adt_free_event(ae); 2729 2730 if (privset != NULL && mthd_ctxt->priv_set == NULL) 2731 priv_freeset(privset); 2732 } 2733 2734 /* 2735 * Set method context before the fd setup below so we can output an 2736 * error message if it fails. 2737 */ 2738 if ((errno = restarter_set_method_context(mthd_ctxt, &errf)) != 0) { 2739 const char *msg; 2740 2741 if (errno == -1) { 2742 if (strcmp(errf, "core_set_process_path") == 0) { 2743 msg = gettext("Failed to set the corefile path " 2744 "for the %s method of instance %s"); 2745 } else if (strcmp(errf, "setproject") == 0) { 2746 msg = gettext("Failed to assign a resource " 2747 "control for the %s method of instance %s"); 2748 } else if (strcmp(errf, "pool_set_binding") == 0) { 2749 msg = gettext("Failed to bind the %s method of " 2750 "instance %s to a pool due to a system " 2751 "error"); 2752 } else { 2753 assert(0); 2754 abort(); 2755 } 2756 2757 error_msg(msg, methods[method].name, instance->fmri); 2758 2759 exit(IMRET_FAILURE); 2760 } 2761 2762 if (errf != NULL && strcmp(errf, "pool_set_binding") == 0) { 2763 switch (errno) { 2764 case ENOENT: 2765 msg = gettext("Failed to find resource pool " 2766 "for the %s method of instance %s"); 2767 break; 2768 2769 case EBADF: 2770 msg = gettext("Failed to bind the %s method of " 2771 "instance %s to a pool due to invalid " 2772 "configuration"); 2773 break; 2774 2775 case EINVAL: 2776 msg = gettext("Failed to bind the %s method of " 2777 "instance %s to a pool due to invalid " 2778 "pool name"); 2779 break; 2780 2781 default: 2782 assert(0); 2783 abort(); 2784 } 2785 2786 exit(IMRET_FAILURE); 2787 } 2788 2789 if (errf != NULL) { 2790 error_msg(gettext("Failed to set credentials for the " 2791 "%s method of instance %s (%s: %s)"), 2792 methods[method].name, instance->fmri, errf, 2793 strerror(errno)); 2794 exit(IMRET_FAILURE); 2795 } 2796 2797 switch (errno) { 2798 case ENOMEM: 2799 msg = gettext("Failed to set credentials for the %s " 2800 "method of instance %s (out of memory)"); 2801 break; 2802 2803 case ENOENT: 2804 msg = gettext("Failed to set credentials for the %s " 2805 "method of instance %s (no passwd or shadow " 2806 "entry for user)"); 2807 break; 2808 2809 default: 2810 assert(0); 2811 abort(); 2812 } 2813 2814 error_msg(msg, methods[method].name, instance->fmri); 2815 exit(IMRET_FAILURE); 2816 } 2817 2818 /* let exec() free mthd_ctxt */ 2819 2820 /* setup standard fds */ 2821 if (method == IM_START) { 2822 (void) dup2(instance->conn_fd, STDIN_FILENO); 2823 } else { 2824 (void) close(STDIN_FILENO); 2825 (void) open("/dev/null", O_RDONLY); 2826 } 2827 (void) dup2(STDIN_FILENO, STDOUT_FILENO); 2828 (void) dup2(STDIN_FILENO, STDERR_FILENO); 2829 2830 closefrom(STDERR_FILENO + 1); 2831 2832 method_preexec(); 2833 2834 env = set_smf_env(mthd_ctxt, instance, methods[method].name); 2835 2836 if (env != NULL) { 2837 do { 2838 (void) execve(mi->exec_path, args, env); 2839 } while (errno == EINTR); 2840 } 2841 2842 serrno = errno; 2843 /* start up logging again to report the error */ 2844 msg_init(); 2845 errno = serrno; 2846 2847 error_msg( 2848 gettext("Failed to exec %s method of instance %s: %s"), 2849 methods[method].name, instance->fmri, strerror(errno)); 2850 2851 if ((method == IM_START) && (instance->config->basic->iswait)) { 2852 /* 2853 * We couldn't exec the start method for a wait type service. 2854 * Eat up data from the endpoint, so that hopefully the 2855 * service's fd won't wake poll up on the next time round 2856 * event_loop(). This behavior is carried over from the old 2857 * inetd, and it seems somewhat arbitrary that it isn't 2858 * also done in the case of fork failures; but I guess 2859 * it assumes an exec failure is less likely to be the result 2860 * of a resource shortage, and is thus not worth retrying. 2861 */ 2862 consume_wait_data(instance, 0); 2863 } 2864 2865 exit(IMRET_FAILURE); 2866 } 2867 2868 static restarter_error_t 2869 get_method_error_success(instance_method_t method) 2870 { 2871 switch (method) { 2872 case IM_OFFLINE: 2873 return (RERR_RESTART); 2874 case IM_ONLINE: 2875 return (RERR_RESTART); 2876 case IM_DISABLE: 2877 return (RERR_RESTART); 2878 case IM_REFRESH: 2879 return (RERR_REFRESH); 2880 case IM_START: 2881 return (RERR_RESTART); 2882 } 2883 (void) fprintf(stderr, gettext("Internal fatal error in inetd.\n")); 2884 2885 abort(); 2886 /* NOTREACHED */ 2887 } 2888 2889 static int 2890 smf_kill_process(instance_t *instance, int sig) 2891 { 2892 rep_val_t *rv; 2893 int ret = IMRET_SUCCESS; 2894 2895 /* Carry out process assassination */ 2896 for (rv = uu_list_first(instance->start_pids); 2897 rv != NULL; 2898 rv = uu_list_next(instance->start_pids, rv)) { 2899 if ((kill((pid_t)rv->val, sig) != 0) && 2900 (errno != ESRCH)) { 2901 ret = IMRET_FAILURE; 2902 error_msg(gettext("Unable to kill " 2903 "start process (%ld) of instance %s: %s"), 2904 rv->val, instance->fmri, strerror(errno)); 2905 } 2906 } 2907 return (ret); 2908 } 2909 2910 /* 2911 * Runs the specified method of the specified service instance. 2912 * If the method was never specified, we handle it the same as if the 2913 * method was called and returned success, carrying on any transition the 2914 * instance may be in the midst of. 2915 * If the method isn't executable in its specified profile or an error occurs 2916 * forking a process to run the method in the function returns -1. 2917 * If a method binary is successfully executed, the function switches the 2918 * instance's cur state to the method's associated 'run' state and the next 2919 * state to the methods associated next state. 2920 * Returns -1 if there's an error before forking, else 0. 2921 */ 2922 int 2923 run_method(instance_t *instance, instance_method_t method, 2924 const proto_info_t *start_info) 2925 { 2926 pid_t child_pid; 2927 method_info_t *mi; 2928 struct method_context *mthd_ctxt = NULL; 2929 const char *errstr; 2930 int sig = 0; 2931 int ret; 2932 instance_cfg_t *cfg = instance->config; 2933 ctid_t cid; 2934 boolean_t trans_failure = B_TRUE; 2935 int serrno; 2936 2937 debug_msg("Entering run_method, instance: %s, method: %s", 2938 instance->fmri, methods[method].name); 2939 2940 /* 2941 * Don't bother updating the instance's state for the start method 2942 * as there isn't a separate start method state. 2943 */ 2944 if (method != IM_START) 2945 update_instance_states(instance, get_method_state(method), 2946 methods[method].dst_state, 2947 get_method_error_success(method)); 2948 2949 if ((mi = cfg->methods[method]) == NULL) { 2950 /* 2951 * If the absent method is IM_OFFLINE, default action needs 2952 * to be taken to avoid lingering processes which can prevent 2953 * the upcoming rebinding from happening. 2954 */ 2955 if ((method == IM_OFFLINE) && instance->config->basic->iswait) { 2956 warn_msg(gettext("inetd_offline method for instance %s " 2957 "is unspecified. Taking default action: kill."), 2958 instance->fmri); 2959 (void) str2sig("TERM", &sig); 2960 ret = smf_kill_process(instance, sig); 2961 process_non_start_term(instance, ret); 2962 return (0); 2963 } else { 2964 process_non_start_term(instance, IMRET_SUCCESS); 2965 return (0); 2966 } 2967 } 2968 2969 /* Handle special method tokens, not allowed on start */ 2970 if (method != IM_START) { 2971 if (restarter_is_null_method(mi->exec_path)) { 2972 /* :true means nothing should be done */ 2973 process_non_start_term(instance, IMRET_SUCCESS); 2974 return (0); 2975 } 2976 2977 if ((sig = restarter_is_kill_method(mi->exec_path)) >= 0) { 2978 /* Carry out contract assassination */ 2979 ret = iterate_repository_contracts(instance, sig); 2980 /* ENOENT means we didn't find any contracts */ 2981 if (ret != 0 && ret != ENOENT) { 2982 error_msg(gettext("Failed to send signal %d " 2983 "to contracts of instance %s: %s"), sig, 2984 instance->fmri, strerror(ret)); 2985 goto prefork_failure; 2986 } else { 2987 process_non_start_term(instance, IMRET_SUCCESS); 2988 return (0); 2989 } 2990 } 2991 2992 if ((sig = restarter_is_kill_proc_method(mi->exec_path)) >= 0) { 2993 ret = smf_kill_process(instance, sig); 2994 process_non_start_term(instance, ret); 2995 return (0); 2996 } 2997 } 2998 2999 /* 3000 * Get the associated method context before the fork so we can 3001 * modify the instances state if things go wrong. 3002 */ 3003 if ((mthd_ctxt = read_method_context(instance->fmri, 3004 methods[method].name, mi->exec_path, &errstr)) == NULL) { 3005 error_msg(gettext("Failed to retrieve method context for the " 3006 "%s method of instance %s: %s"), methods[method].name, 3007 instance->fmri, errstr); 3008 goto prefork_failure; 3009 } 3010 3011 /* 3012 * Perform some basic checks before we fork to limit the possibility 3013 * of exec failures, so we can modify the instance state if necessary. 3014 */ 3015 if (!passes_basic_exec_checks(instance->fmri, methods[method].name, 3016 mi->exec_path)) { 3017 trans_failure = B_FALSE; 3018 goto prefork_failure; 3019 } 3020 3021 if (contract_prefork() == -1) 3022 goto prefork_failure; 3023 child_pid = fork(); 3024 serrno = errno; 3025 contract_postfork(); 3026 3027 switch (child_pid) { 3028 case -1: 3029 error_msg(gettext( 3030 "Unable to fork %s method of instance %s: %s"), 3031 methods[method].name, instance->fmri, strerror(serrno)); 3032 if ((serrno != EAGAIN) && (serrno != ENOMEM)) 3033 trans_failure = B_FALSE; 3034 goto prefork_failure; 3035 case 0: /* child */ 3036 exec_method(instance, method, mi, mthd_ctxt, start_info); 3037 /* NOTREACHED */ 3038 default: /* parent */ 3039 restarter_free_method_context(mthd_ctxt); 3040 mthd_ctxt = NULL; 3041 3042 if (get_latest_contract(&cid) < 0) 3043 cid = -1; 3044 3045 /* 3046 * Register this method so its termination is noticed and 3047 * the state transition this method participates in is 3048 * continued. 3049 */ 3050 if (register_method(instance, child_pid, cid, method) != 0) { 3051 /* 3052 * Since we will never find out about the termination 3053 * of this method, if it's a non-start method treat 3054 * is as a failure so we don't block restarter event 3055 * processing on it whilst it languishes in a method 3056 * running state. 3057 */ 3058 error_msg(gettext("Failed to monitor status of " 3059 "%s method of instance %s"), methods[method].name, 3060 instance->fmri); 3061 if (method != IM_START) 3062 process_non_start_term(instance, IMRET_FAILURE); 3063 } 3064 3065 add_method_ids(instance, child_pid, cid, method); 3066 3067 /* do tcp tracing for those nowait instances that request it */ 3068 if ((method == IM_START) && cfg->basic->do_tcp_trace && 3069 !cfg->basic->iswait) { 3070 char buf[INET6_ADDRSTRLEN]; 3071 3072 syslog(LOG_NOTICE, "%s[%d] from %s %d", 3073 cfg->basic->svc_name, child_pid, 3074 inet_ntop_native(instance->remote_addr.ss_family, 3075 SS_SINADDR(instance->remote_addr), buf, 3076 sizeof (buf)), 3077 ntohs(SS_PORT(instance->remote_addr))); 3078 } 3079 } 3080 3081 return (0); 3082 3083 prefork_failure: 3084 if (mthd_ctxt != NULL) { 3085 restarter_free_method_context(mthd_ctxt); 3086 mthd_ctxt = NULL; 3087 } 3088 3089 if (method == IM_START) { 3090 /* 3091 * Only place a start method in maintenance if we're sure 3092 * that the failure was non-transient. 3093 */ 3094 if (!trans_failure) { 3095 destroy_bound_fds(instance); 3096 update_state(instance, IIS_MAINTENANCE, RERR_FAULT); 3097 } 3098 } else { 3099 /* treat the failure as if the method ran and failed */ 3100 process_non_start_term(instance, IMRET_FAILURE); 3101 } 3102 3103 return (-1); 3104 } 3105 3106 static int 3107 accept_connection(instance_t *instance, proto_info_t *pi) 3108 { 3109 int fd; 3110 socklen_t size; 3111 3112 debug_msg("Entering accept_connection"); 3113 3114 if (instance->config->basic->istlx) { 3115 fd = tlx_accept(instance->fmri, (tlx_info_t *)pi, 3116 &(instance->remote_addr)); 3117 } else { 3118 size = sizeof (instance->remote_addr); 3119 fd = accept(pi->listen_fd, 3120 (struct sockaddr *)&(instance->remote_addr), &size); 3121 if (fd < 0) 3122 error_msg("accept: %s", strerror(errno)); 3123 } 3124 3125 return (fd); 3126 } 3127 3128 /* 3129 * Handle an incoming connection request for a nowait service. 3130 * This involves accepting the incoming connection on a new fd. Connection 3131 * rate checks are then performed, transitioning the service to the 3132 * conrate offline state if these fail. Otherwise, the service's start method 3133 * is run (performing TCP wrappers checks if applicable as we do), and on 3134 * success concurrent copies checking is done, transitioning the service to the 3135 * copies offline state if this fails. 3136 */ 3137 static void 3138 process_nowait_request(instance_t *instance, proto_info_t *pi) 3139 { 3140 basic_cfg_t *cfg = instance->config->basic; 3141 int ret; 3142 adt_event_data_t *ae; 3143 char buf[BUFSIZ]; 3144 3145 debug_msg("Entering process_nowait_req"); 3146 3147 /* accept nowait service connections on a new fd */ 3148 if ((instance->conn_fd = accept_connection(instance, pi)) == -1) { 3149 /* 3150 * Failed accept. Return and allow the event loop to initiate 3151 * another attempt later if the request is still present. 3152 */ 3153 return; 3154 } 3155 3156 /* 3157 * Limit connection rate of nowait services. If either conn_rate_max 3158 * or conn_rate_offline are <= 0, no connection rate limit checking 3159 * is done. If the configured rate is exceeded, the instance is taken 3160 * to the connrate_offline state and a timer scheduled to try and 3161 * bring the instance back online after the configured offline time. 3162 */ 3163 if ((cfg->conn_rate_max > 0) && (cfg->conn_rate_offline > 0)) { 3164 if (instance->conn_rate_count++ == 0) { 3165 instance->conn_rate_start = time(NULL); 3166 } else if (instance->conn_rate_count > 3167 cfg->conn_rate_max) { 3168 time_t now = time(NULL); 3169 3170 if ((now - instance->conn_rate_start) > 1) { 3171 instance->conn_rate_start = now; 3172 instance->conn_rate_count = 1; 3173 } else { 3174 /* Generate audit record */ 3175 if ((ae = adt_alloc_event(audit_handle, 3176 ADT_inetd_ratelimit)) == NULL) { 3177 error_msg(gettext("Unable to allocate " 3178 "rate limit audit event")); 3179 } else { 3180 adt_inetd_ratelimit_t *rl = 3181 &ae->adt_inetd_ratelimit; 3182 /* 3183 * The inetd_ratelimit audit 3184 * record consists of: 3185 * Service name 3186 * Connection rate limit 3187 */ 3188 rl->service_name = cfg->svc_name; 3189 (void) snprintf(buf, sizeof (buf), 3190 "limit=%lld", cfg->conn_rate_max); 3191 rl->limit = buf; 3192 (void) adt_put_event(ae, ADT_SUCCESS, 3193 ADT_SUCCESS); 3194 adt_free_event(ae); 3195 } 3196 3197 error_msg(gettext( 3198 "Instance %s has exceeded its configured " 3199 "connection rate, additional connections " 3200 "will not be accepted for %d seconds"), 3201 instance->fmri, cfg->conn_rate_offline); 3202 3203 close_net_fd(instance, instance->conn_fd); 3204 instance->conn_fd = -1; 3205 3206 destroy_bound_fds(instance); 3207 3208 instance->conn_rate_count = 0; 3209 3210 instance->conn_rate_exceeded = B_TRUE; 3211 (void) run_method(instance, IM_OFFLINE, NULL); 3212 3213 return; 3214 } 3215 } 3216 } 3217 3218 ret = run_method(instance, IM_START, pi); 3219 3220 close_net_fd(instance, instance->conn_fd); 3221 instance->conn_fd = -1; 3222 3223 if (ret == -1) /* the method wasn't forked */ 3224 return; 3225 3226 instance->copies++; 3227 3228 /* 3229 * Limit concurrent connections of nowait services. 3230 */ 3231 if (copies_limit_exceeded(instance)) { 3232 /* Generate audit record */ 3233 if ((ae = adt_alloc_event(audit_handle, ADT_inetd_copylimit)) 3234 == NULL) { 3235 error_msg(gettext("Unable to allocate copy limit " 3236 "audit event")); 3237 } else { 3238 /* 3239 * The inetd_copylimit audit record consists of: 3240 * Service name 3241 * Copy limit 3242 */ 3243 ae->adt_inetd_copylimit.service_name = cfg->svc_name; 3244 (void) snprintf(buf, sizeof (buf), "limit=%lld", 3245 cfg->max_copies); 3246 ae->adt_inetd_copylimit.limit = buf; 3247 (void) adt_put_event(ae, ADT_SUCCESS, ADT_SUCCESS); 3248 adt_free_event(ae); 3249 } 3250 3251 warn_msg(gettext("Instance %s has reached its maximum " 3252 "configured copies, no new connections will be accepted"), 3253 instance->fmri); 3254 destroy_bound_fds(instance); 3255 (void) run_method(instance, IM_OFFLINE, NULL); 3256 } 3257 } 3258 3259 /* 3260 * Handle an incoming request for a wait type service. 3261 * Failure rate checking is done first, taking the service to the maintenance 3262 * state if the checks fail. Following this, the service's start method is run, 3263 * and on success, we stop listening for new requests for this service. 3264 */ 3265 static void 3266 process_wait_request(instance_t *instance, const proto_info_t *pi) 3267 { 3268 basic_cfg_t *cfg = instance->config->basic; 3269 int ret; 3270 adt_event_data_t *ae; 3271 char buf[BUFSIZ]; 3272 3273 debug_msg("Entering process_wait_request"); 3274 3275 instance->conn_fd = pi->listen_fd; 3276 3277 /* 3278 * Detect broken servers and transition them to maintenance. If a 3279 * wait type service exits without accepting the connection or 3280 * consuming (reading) the datagram, that service's descriptor will 3281 * select readable again, and inetd will fork another instance of 3282 * the server. If either wait_fail_cnt or wait_fail_interval are <= 0, 3283 * no failure rate detection is done. 3284 */ 3285 if ((cfg->wait_fail_cnt > 0) && (cfg->wait_fail_interval > 0)) { 3286 if (instance->fail_rate_count++ == 0) { 3287 instance->fail_rate_start = time(NULL); 3288 } else if (instance->fail_rate_count > cfg->wait_fail_cnt) { 3289 time_t now = time(NULL); 3290 3291 if ((now - instance->fail_rate_start) > 3292 cfg->wait_fail_interval) { 3293 instance->fail_rate_start = now; 3294 instance->fail_rate_count = 1; 3295 } else { 3296 /* Generate audit record */ 3297 if ((ae = adt_alloc_event(audit_handle, 3298 ADT_inetd_failrate)) == NULL) { 3299 error_msg(gettext("Unable to allocate " 3300 "failure rate audit event")); 3301 } else { 3302 adt_inetd_failrate_t *fr = 3303 &ae->adt_inetd_failrate; 3304 /* 3305 * The inetd_failrate audit record 3306 * consists of: 3307 * Service name 3308 * Failure rate 3309 * Interval 3310 * Last two are expressed as k=v pairs 3311 * in the values field. 3312 */ 3313 fr->service_name = cfg->svc_name; 3314 (void) snprintf(buf, sizeof (buf), 3315 "limit=%lld,interval=%d", 3316 cfg->wait_fail_cnt, 3317 cfg->wait_fail_interval); 3318 fr->values = buf; 3319 (void) adt_put_event(ae, ADT_SUCCESS, 3320 ADT_SUCCESS); 3321 adt_free_event(ae); 3322 } 3323 3324 error_msg(gettext( 3325 "Instance %s has exceeded its configured " 3326 "failure rate, transitioning to " 3327 "maintenance"), instance->fmri); 3328 instance->fail_rate_count = 0; 3329 3330 destroy_bound_fds(instance); 3331 3332 instance->maintenance_req = B_TRUE; 3333 (void) run_method(instance, IM_OFFLINE, NULL); 3334 return; 3335 } 3336 } 3337 } 3338 3339 ret = run_method(instance, IM_START, pi); 3340 3341 instance->conn_fd = -1; 3342 3343 if (ret == 0) { 3344 /* 3345 * Stop listening for connections now we've fired off the 3346 * server for a wait type instance. 3347 */ 3348 (void) poll_bound_fds(instance, B_FALSE); 3349 } 3350 } 3351 3352 /* 3353 * Process any networks requests for each proto for each instance. 3354 */ 3355 void 3356 process_network_events(void) 3357 { 3358 instance_t *instance; 3359 3360 debug_msg("Entering process_network_events"); 3361 3362 for (instance = uu_list_first(instance_list); instance != NULL; 3363 instance = uu_list_next(instance_list, instance)) { 3364 basic_cfg_t *cfg; 3365 proto_info_t *pi; 3366 3367 /* 3368 * Ignore instances in states that definitely don't have any 3369 * listening fds. 3370 */ 3371 switch (instance->cur_istate) { 3372 case IIS_ONLINE: 3373 case IIS_DEGRADED: 3374 case IIS_IN_REFRESH_METHOD: 3375 break; 3376 default: 3377 continue; 3378 } 3379 3380 cfg = instance->config->basic; 3381 3382 for (pi = uu_list_first(cfg->proto_list); pi != NULL; 3383 pi = uu_list_next(cfg->proto_list, pi)) { 3384 if ((pi->listen_fd != -1) && 3385 isset_pollfd(pi->listen_fd)) { 3386 if (cfg->iswait) { 3387 process_wait_request(instance, pi); 3388 } else { 3389 process_nowait_request(instance, pi); 3390 } 3391 } 3392 } 3393 } 3394 } 3395 3396 /* ARGSUSED0 */ 3397 static void 3398 sigterm_handler(int sig) 3399 { 3400 debug_msg("Entering sigterm_handler"); 3401 3402 got_sigterm = B_TRUE; 3403 } 3404 3405 /* ARGSUSED0 */ 3406 static void 3407 sighup_handler(int sig) 3408 { 3409 debug_msg("Entering sighup_handler"); 3410 3411 refresh_inetd_requested = B_TRUE; 3412 } 3413 3414 /* 3415 * inetd's major work loop. This function sits in poll waiting for events 3416 * to occur, processing them when they do. The possible events are 3417 * master restarter requests, expired timer queue timers, stop/refresh signal 3418 * requests, contract events indicating process termination, stop/refresh 3419 * requests originating from one of the stop/refresh inetd processes and 3420 * network events. 3421 * The loop is exited when a stop request is received and processed, and 3422 * all the instances have reached a suitable 'stopping' state. 3423 */ 3424 static void 3425 event_loop(void) 3426 { 3427 instance_t *instance; 3428 int timeout; 3429 3430 debug_msg("Entering event_loop"); 3431 3432 for (;;) { 3433 int pret = -1; 3434 3435 timeout = iu_earliest_timer(timer_queue); 3436 3437 debug_msg("Doing signal check/poll"); 3438 if (!got_sigterm && !refresh_inetd_requested) { 3439 pret = poll(poll_fds, num_pollfds, timeout); 3440 if ((pret == -1) && (errno != EINTR)) { 3441 error_msg(gettext("poll failure: %s"), 3442 strerror(errno)); 3443 continue; 3444 } 3445 debug_msg("Exiting poll, returned: %d", pret); 3446 } 3447 3448 if (got_sigterm) { 3449 msg_fini(); 3450 inetd_stop(); 3451 got_sigterm = B_FALSE; 3452 goto check_if_stopped; 3453 } 3454 3455 /* 3456 * Process any stop/refresh requests from the Unix Domain 3457 * Socket. 3458 */ 3459 if ((pret != -1) && isset_pollfd(uds_fd)) { 3460 while (process_uds_event() == 0) 3461 ; 3462 } 3463 3464 /* 3465 * Process refresh request. We do this check after the UDS 3466 * event check above, as it would be wasted processing if we 3467 * started refreshing inetd based on a SIGHUP, and then were 3468 * told to shut-down via a UDS event. 3469 */ 3470 if (refresh_inetd_requested) { 3471 refresh_inetd_requested = B_FALSE; 3472 if (!inetd_stopping) 3473 inetd_refresh(); 3474 } 3475 3476 /* 3477 * We were interrupted by a signal. Don't waste any more 3478 * time processing a potentially inaccurate poll return. 3479 */ 3480 if (pret == -1) 3481 continue; 3482 3483 /* 3484 * Process any instance restarter events. 3485 */ 3486 if (isset_pollfd(rst_event_pipe[PE_CONSUMER])) { 3487 while (process_restarter_event() == 0) 3488 ; 3489 } 3490 3491 /* 3492 * Process any expired timers (bind retry, con-rate offline, 3493 * method timeouts). 3494 */ 3495 (void) iu_expire_timers(timer_queue); 3496 3497 process_terminated_methods(); 3498 3499 /* 3500 * If inetd is stopping, check whether all our managed 3501 * instances have been stopped and we can return. 3502 */ 3503 if (inetd_stopping) { 3504 check_if_stopped: 3505 for (instance = uu_list_first(instance_list); 3506 instance != NULL; 3507 instance = uu_list_next(instance_list, instance)) { 3508 if (!instance_stopped(instance)) { 3509 debug_msg("%s not yet stopped", 3510 instance->fmri); 3511 break; 3512 } 3513 } 3514 /* if all instances are stopped, return */ 3515 if (instance == NULL) 3516 return; 3517 } 3518 3519 process_network_events(); 3520 } 3521 } 3522 3523 static void 3524 fini(void) 3525 { 3526 debug_msg("Entering fini"); 3527 3528 method_fini(); 3529 uds_fini(); 3530 if (timer_queue != NULL) 3531 iu_tq_destroy(timer_queue); 3532 3533 3534 /* 3535 * We don't bother to undo the restarter interface at all. 3536 * Because of quirks in the interface, there is no way to 3537 * disconnect from the channel and cause any new events to be 3538 * queued. However, any events which are received and not 3539 * acknowledged will be re-sent when inetd restarts as long as inetd 3540 * uses the same subscriber ID, which it does. 3541 * 3542 * By keeping the event pipe open but ignoring it, any events which 3543 * occur will cause restarter_event_proxy to hang without breaking 3544 * anything. 3545 */ 3546 3547 if (instance_list != NULL) { 3548 void *cookie = NULL; 3549 instance_t *inst; 3550 3551 while ((inst = uu_list_teardown(instance_list, &cookie)) != 3552 NULL) 3553 destroy_instance(inst); 3554 uu_list_destroy(instance_list); 3555 } 3556 if (instance_pool != NULL) 3557 uu_list_pool_destroy(instance_pool); 3558 tlx_fini(); 3559 config_fini(); 3560 repval_fini(); 3561 poll_fini(); 3562 3563 /* Close audit session */ 3564 (void) adt_end_session(audit_handle); 3565 } 3566 3567 static int 3568 init(void) 3569 { 3570 int err; 3571 3572 debug_msg("Entering init"); 3573 3574 if (repval_init() < 0) 3575 goto failed; 3576 3577 if (config_init() < 0) 3578 goto failed; 3579 3580 if (tlx_init() < 0) 3581 goto failed; 3582 3583 /* Setup instance list. */ 3584 if ((instance_pool = uu_list_pool_create("instance_pool", 3585 sizeof (instance_t), offsetof(instance_t, link), NULL, 3586 UU_LIST_POOL_DEBUG)) == NULL) { 3587 error_msg("%s: %s", 3588 gettext("Failed to create instance pool"), 3589 uu_strerror(uu_error())); 3590 goto failed; 3591 } 3592 if ((instance_list = uu_list_create(instance_pool, NULL, 0)) == NULL) { 3593 error_msg("%s: %s", 3594 gettext("Failed to create instance list"), 3595 uu_strerror(uu_error())); 3596 goto failed; 3597 } 3598 3599 /* 3600 * Create event pipe to communicate events with the main event 3601 * loop and add it to the event loop's fdset. 3602 */ 3603 if (pipe(rst_event_pipe) < 0) { 3604 error_msg("pipe: %s", strerror(errno)); 3605 goto failed; 3606 } 3607 /* 3608 * We only leave the producer end to block on reads/writes as we 3609 * can't afford to block in the main thread, yet need to in 3610 * the restarter event thread, so it can sit and wait for an 3611 * acknowledgement to be written to the pipe. 3612 */ 3613 disable_blocking(rst_event_pipe[PE_CONSUMER]); 3614 if ((set_pollfd(rst_event_pipe[PE_CONSUMER], POLLIN)) == -1) 3615 goto failed; 3616 3617 /* 3618 * Register with master restarter for managed service events. This 3619 * will fail, amongst other reasons, if inetd is already running. 3620 */ 3621 if ((err = restarter_bind_handle(RESTARTER_EVENT_VERSION, 3622 INETD_INSTANCE_FMRI, restarter_event_proxy, 0, 3623 &rst_event_handle)) != 0) { 3624 error_msg(gettext( 3625 "Failed to register for restarter events: %s"), 3626 strerror(err)); 3627 goto failed; 3628 } 3629 3630 if (contract_init() < 0) 3631 goto failed; 3632 3633 if ((timer_queue = iu_tq_create()) == NULL) { 3634 error_msg(gettext("Failed to create timer queue.")); 3635 goto failed; 3636 } 3637 3638 if (uds_init() < 0) 3639 goto failed; 3640 3641 if (method_init() < 0) 3642 goto failed; 3643 3644 /* Initialize auditing session */ 3645 if (adt_start_session(&audit_handle, NULL, ADT_USE_PROC_DATA) != 0) { 3646 error_msg(gettext("Unable to start audit session")); 3647 } 3648 3649 /* 3650 * Initialize signal dispositions/masks 3651 */ 3652 (void) sigset(SIGHUP, sighup_handler); 3653 (void) sigset(SIGTERM, sigterm_handler); 3654 (void) sigignore(SIGINT); 3655 3656 return (0); 3657 3658 failed: 3659 fini(); 3660 return (-1); 3661 } 3662 3663 static int 3664 start_method(void) 3665 { 3666 int i; 3667 int pipe_fds[2]; 3668 int child; 3669 3670 debug_msg("ENTERING START_METHOD:"); 3671 3672 /* Create pipe for child to notify parent of initialization success. */ 3673 if (pipe(pipe_fds) < 0) { 3674 debug_msg("pipe: %s", strerror(errno)); 3675 return (SMF_EXIT_ERR_OTHER); 3676 } 3677 3678 if ((child = fork()) == -1) { 3679 debug_msg("fork: %s", strerror(errno)); 3680 (void) close(pipe_fds[PE_CONSUMER]); 3681 (void) close(pipe_fds[PE_PRODUCER]); 3682 return (SMF_EXIT_ERR_OTHER); 3683 } else if (child > 0) { /* parent */ 3684 3685 /* Wait on child to return success of initialization. */ 3686 (void) close(pipe_fds[PE_PRODUCER]); 3687 if ((safe_read(pipe_fds[PE_CONSUMER], &i, sizeof (i)) != 0) || 3688 (i < 0)) { 3689 error_msg(gettext( 3690 "Initialization failed, unable to start")); 3691 (void) close(pipe_fds[PE_CONSUMER]); 3692 /* 3693 * Batch all initialization errors as 'other' errors, 3694 * resulting in retries being attempted. 3695 */ 3696 return (SMF_EXIT_ERR_OTHER); 3697 } else { 3698 (void) close(pipe_fds[PE_CONSUMER]); 3699 return (SMF_EXIT_OK); 3700 } 3701 } else { /* child */ 3702 /* 3703 * Perform initialization and return success code down 3704 * the pipe. 3705 */ 3706 (void) close(pipe_fds[PE_CONSUMER]); 3707 i = init(); 3708 if ((safe_write(pipe_fds[PE_PRODUCER], &i, sizeof (i)) < 0) || 3709 (i < 0)) { 3710 error_msg(gettext("pipe write failure: %s"), 3711 strerror(errno)); 3712 exit(1); 3713 } 3714 (void) close(pipe_fds[PE_PRODUCER]); 3715 3716 (void) setsid(); 3717 3718 /* 3719 * Log a message if the configuration file has changed since 3720 * inetconv was last run. 3721 */ 3722 check_conf_file(); 3723 3724 event_loop(); 3725 3726 fini(); 3727 debug_msg("inetd stopped"); 3728 msg_fini(); 3729 exit(0); 3730 } 3731 /* NOTREACHED */ 3732 } 3733 3734 /* 3735 * When inetd is run from outside the SMF, this message is output to provide 3736 * the person invoking inetd with further information that will help them 3737 * understand how to start and stop inetd, and to achieve the other 3738 * behaviors achievable with the legacy inetd command line interface, if 3739 * it is possible. 3740 */ 3741 static void 3742 legacy_usage(void) 3743 { 3744 (void) fprintf(stderr, 3745 "inetd is now an smf(5) managed service and can no longer be run " 3746 "from the\n" 3747 "command line. To enable or disable inetd refer to svcadm(1M) on\n" 3748 "how to enable \"%s\", the inetd instance.\n" 3749 "\n" 3750 "The traditional inetd command line option mappings are:\n" 3751 "\t-d : there is no supported debug output\n" 3752 "\t-s : inetd is only runnable from within the SMF\n" 3753 "\t-t : See inetadm(1M) on how to enable TCP tracing\n" 3754 "\t-r : See inetadm(1M) on how to set a failure rate\n" 3755 "\n" 3756 "To specify an alternative configuration file see svccfg(1M)\n" 3757 "for how to modify the \"%s/%s\" string type property of\n" 3758 "the inetd instance, and modify it according to the syntax:\n" 3759 "\"%s [alt_config_file] %%m\".\n" 3760 "\n" 3761 "For further information on inetd see inetd(1M).\n", 3762 INETD_INSTANCE_FMRI, START_METHOD_ARG, SCF_PROPERTY_EXEC, 3763 INETD_PATH); 3764 } 3765 3766 /* 3767 * Usage message printed out for usage errors when running under the SMF. 3768 */ 3769 static void 3770 smf_usage(const char *arg0) 3771 { 3772 error_msg("Usage: %s [alt_conf_file] %s|%s|%s", arg0, START_METHOD_ARG, 3773 STOP_METHOD_ARG, REFRESH_METHOD_ARG); 3774 } 3775 3776 /* 3777 * Returns B_TRUE if we're being run from within the SMF, else B_FALSE. 3778 */ 3779 static boolean_t 3780 run_through_smf(void) 3781 { 3782 char *fmri; 3783 3784 /* 3785 * check if the instance fmri environment variable has been set by 3786 * our restarter. 3787 */ 3788 return (((fmri = getenv("SMF_FMRI")) != NULL) && 3789 (strcmp(fmri, INETD_INSTANCE_FMRI) == 0)); 3790 } 3791 3792 int 3793 main(int argc, char *argv[]) 3794 { 3795 char *method; 3796 int ret; 3797 3798 #if !defined(TEXT_DOMAIN) 3799 #define TEXT_DOMAIN "SYS_TEST" 3800 #endif 3801 (void) textdomain(TEXT_DOMAIN); 3802 (void) setlocale(LC_ALL, ""); 3803 3804 if (!run_through_smf()) { 3805 legacy_usage(); 3806 return (SMF_EXIT_ERR_NOSMF); 3807 } 3808 3809 msg_init(); /* setup logging */ 3810 3811 (void) enable_extended_FILE_stdio(-1, -1); 3812 3813 /* inetd invocation syntax is inetd [alt_conf_file] method_name */ 3814 3815 switch (argc) { 3816 case 2: 3817 method = argv[1]; 3818 break; 3819 case 3: 3820 conf_file = argv[1]; 3821 method = argv[2]; 3822 break; 3823 default: 3824 smf_usage(argv[0]); 3825 return (SMF_EXIT_ERR_CONFIG); 3826 3827 } 3828 3829 if (strcmp(method, START_METHOD_ARG) == 0) { 3830 ret = start_method(); 3831 } else if (strcmp(method, STOP_METHOD_ARG) == 0) { 3832 ret = stop_method(); 3833 } else if (strcmp(method, REFRESH_METHOD_ARG) == 0) { 3834 ret = refresh_method(); 3835 } else { 3836 smf_usage(argv[0]); 3837 return (SMF_EXIT_ERR_CONFIG); 3838 } 3839 3840 return (ret); 3841 } 3842