1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21
22 /*
23 * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
24 */
25
26 /*
27 * The ipmgmtd daemon is started by ip-interface-management SMF service. This
28 * daemon is used to manage, mapping of 'address object' to 'interface name' and
29 * 'logical interface number', on which the address is created. It also provides
30 * a means to update the ipadm persistent data-store.
31 *
32 * The daemon tracks the <addrobj, lifname> mapping in-memory using a linked
33 * list `aobjmap'. Access to this list is synchronized using a readers-writers
34 * lock. The active <addrobj, lifname> mapping is kept in
35 * /etc/svc/volatile/ipadm/aobjmap.conf cache file, so that the mapping can be
36 * recovered when ipmgmtd exits for some reason (e.g., when ipmgmtd is restarted
37 * using svcadm or accidentally killed).
38 *
39 * Today, the persistent configuration of interfaces, addresses and protocol
40 * properties is kept in /etc/ipadm/ipadm.conf. The access to the persistent
41 * data store is synchronized using reader-writers lock `ipmgmt_dbconf_lock'.
42 *
43 * The communication between the library, libipadm.so and the daemon, is through
44 * doors RPC. The library interacts with the daemon using the commands defined
45 * by `ipmgmt_door_cmd_type_t'. Further any 'write' operation would require
46 * the `NETWORK_INTERFACE_CONFIG_AUTH' authorization.
47 *
48 * On reboot, the aforementioned SMF service starts the daemon before any other
49 * networking service that configures network IP interfaces is started.
50 * Afterwards, the network/physical SMF script instantiates the persisted
51 * network interfaces, interface properties and addresses.
52 */
53
54 #include <errno.h>
55 #include <fcntl.h>
56 #include <priv_utils.h>
57 #include <signal.h>
58 #include <stdlib.h>
59 #include <stdio.h>
60 #include <strings.h>
61 #include <sys/param.h>
62 #include <sys/stat.h>
63 #include <unistd.h>
64 #include "ipmgmt_impl.h"
65 #include <zone.h>
66 #include <libipadm.h>
67 #include <libdladm.h>
68 #include <libdllink.h>
69 #include <net/route.h>
70 #include <ipadm_ipmgmt.h>
71 #include <sys/brand.h>
72
73 const char *progname;
74
75 /* readers-writers lock for reading/writing daemon data store */
76 pthread_rwlock_t ipmgmt_dbconf_lock = PTHREAD_RWLOCK_INITIALIZER;
77
78 /* tracks address object to {ifname|logical number|interface id} mapping */
79 ipmgmt_aobjmap_list_t aobjmap;
80
81 /* used to communicate failure to parent process, which spawned the daemon */
82 static int pfds[2];
83
84 /* file descriptor to IPMGMT_DOOR */
85 static int ipmgmt_door_fd = -1;
86
87 static void ipmgmt_exit(int);
88 static int ipmgmt_init();
89 static int ipmgmt_init_privileges();
90 static void ipmgmt_ngz_persist_if();
91
92 static ipadm_handle_t iph;
93 typedef struct ipmgmt_pif_s {
94 struct ipmgmt_pif_s *pif_next;
95 char pif_ifname[LIFNAMSIZ];
96 boolean_t pif_v4;
97 boolean_t pif_v6;
98 } ipmgmt_pif_t;
99
100 static ipmgmt_pif_t *ngz_pifs;
101
102 static int
ipmgmt_db_init()103 ipmgmt_db_init()
104 {
105 int fd, err, scferr;
106 scf_resources_t res;
107 boolean_t upgrade = B_TRUE;
108
109 /*
110 * Check to see if we need to upgrade the data-store. We need to
111 * upgrade, if the version of the data-store does not match with
112 * IPADM_DB_VERSION. Further, if we cannot determine the current
113 * version of the data-store, we always err on the side of caution
114 * and upgrade the data-store to current version.
115 */
116 if ((scferr = ipmgmt_create_scf_resources(IPMGMTD_FMRI, &res)) == 0)
117 upgrade = ipmgmt_needs_upgrade(&res);
118 if (upgrade) {
119 err = ipmgmt_db_walk(ipmgmt_db_upgrade, NULL, IPADM_DB_WRITE);
120 if (err != 0) {
121 ipmgmt_log(LOG_ERR, "could not upgrade the "
122 "ipadm data-store: %s", strerror(err));
123 err = 0;
124 } else {
125 /*
126 * upgrade was success, let's update SCF with the
127 * current data-store version number.
128 */
129 if (scferr == 0)
130 ipmgmt_update_dbver(&res);
131 }
132 }
133 if (scferr == 0)
134 ipmgmt_release_scf_resources(&res);
135
136 /* creates the address object data store, if it doesn't exist */
137 if ((fd = open(ADDROBJ_MAPPING_DB_FILE, O_CREAT|O_RDONLY,
138 IPADM_FILE_MODE)) == -1) {
139 err = errno;
140 ipmgmt_log(LOG_ERR, "could not open %s: %s",
141 ADDROBJ_MAPPING_DB_FILE, strerror(err));
142 return (err);
143 }
144 (void) close(fd);
145
146 aobjmap.aobjmap_head = NULL;
147 (void) pthread_rwlock_init(&aobjmap.aobjmap_rwlock, NULL);
148
149 /*
150 * If the daemon is recovering from a crash or restart, read the
151 * address object to logical interface mapping and build an in-memory
152 * representation of the mapping. That is, build `aobjmap' structure
153 * from address object data store.
154 */
155 if ((err = ipadm_rw_db(ipmgmt_aobjmap_init, NULL,
156 ADDROBJ_MAPPING_DB_FILE, 0, IPADM_DB_READ)) != 0) {
157 /* if there was nothing to initialize, it's fine */
158 if (err != ENOENT)
159 return (err);
160 err = 0;
161 }
162
163 ipmgmt_ngz_persist_if(); /* create persistent interface info for NGZ */
164
165 return (err);
166 }
167
168 static int
ipmgmt_door_init()169 ipmgmt_door_init()
170 {
171 int fd;
172 int err;
173
174 /* create the door file for ipmgmtd */
175 if ((fd = open(IPMGMT_DOOR, O_CREAT|O_RDONLY, IPADM_FILE_MODE)) == -1) {
176 err = errno;
177 ipmgmt_log(LOG_ERR, "could not open %s: %s",
178 IPMGMT_DOOR, strerror(err));
179 return (err);
180 }
181 (void) close(fd);
182
183 if ((ipmgmt_door_fd = door_create(ipmgmt_handler, NULL,
184 DOOR_REFUSE_DESC | DOOR_NO_CANCEL)) == -1) {
185 err = errno;
186 ipmgmt_log(LOG_ERR, "failed to create door: %s", strerror(err));
187 return (err);
188 }
189 /*
190 * fdetach first in case a previous daemon instance exited
191 * ungracefully.
192 */
193 (void) fdetach(IPMGMT_DOOR);
194 if (fattach(ipmgmt_door_fd, IPMGMT_DOOR) != 0) {
195 err = errno;
196 ipmgmt_log(LOG_ERR, "failed to attach door to %s: %s",
197 IPMGMT_DOOR, strerror(err));
198 goto fail;
199 }
200 return (0);
201 fail:
202 (void) door_revoke(ipmgmt_door_fd);
203 ipmgmt_door_fd = -1;
204 return (err);
205 }
206
207 static void
ipmgmt_door_fini()208 ipmgmt_door_fini()
209 {
210 if (ipmgmt_door_fd == -1)
211 return;
212
213 (void) fdetach(IPMGMT_DOOR);
214 if (door_revoke(ipmgmt_door_fd) == -1) {
215 ipmgmt_log(LOG_ERR, "failed to revoke access to door %s: %s",
216 IPMGMT_DOOR, strerror(errno));
217 }
218 }
219
220 static int
ipmgmt_init()221 ipmgmt_init()
222 {
223 int err;
224
225 if (signal(SIGTERM, ipmgmt_exit) == SIG_ERR ||
226 signal(SIGINT, ipmgmt_exit) == SIG_ERR) {
227 err = errno;
228 ipmgmt_log(LOG_ERR, "signal() for SIGTERM/INT failed: %s",
229 strerror(err));
230 return (err);
231 }
232 if ((err = ipmgmt_db_init()) != 0 || (err = ipmgmt_door_init()) != 0)
233 return (err);
234 return (0);
235 }
236
237 /*
238 * This is called by the child process to inform the parent process to
239 * exit with the given return value.
240 */
241 static void
ipmgmt_inform_parent_exit(int rv)242 ipmgmt_inform_parent_exit(int rv)
243 {
244 if (write(pfds[1], &rv, sizeof (int)) != sizeof (int)) {
245 ipmgmt_log(LOG_WARNING,
246 "failed to inform parent process of status: %s",
247 strerror(errno));
248 (void) close(pfds[1]);
249 exit(EXIT_FAILURE);
250 }
251 (void) close(pfds[1]);
252 }
253
254 /*ARGSUSED*/
255 static void
ipmgmt_exit(int signo)256 ipmgmt_exit(int signo)
257 {
258 (void) close(pfds[1]);
259 ipmgmt_door_fini();
260 exit(EXIT_FAILURE);
261 }
262
263 /*
264 * On the first reboot after installation of an ipkg zone,
265 * ipmgmt_persist_if_cb() is used in non-global zones to track the interfaces
266 * that have IP address configuration assignments from the global zone.
267 * Persistent configuration for the interfaces is created on the first boot
268 * by ipmgmtd, and the addresses assigned to the interfaces by the GZ
269 * will be subsequently configured when the interface is enabled.
270 * Note that ipmgmt_persist_if_cb() only sets up a list of interfaces
271 * that need to be persisted- the actual update of the ipadm data-store happens
272 * in ipmgmt_persist_if() after the appropriate privs/uid state has been set up.
273 */
274 static void
ipmgmt_persist_if_cb(char * ifname,boolean_t v4,boolean_t v6)275 ipmgmt_persist_if_cb(char *ifname, boolean_t v4, boolean_t v6)
276 {
277 ipmgmt_pif_t *pif;
278
279 pif = calloc(1, sizeof (*pif));
280 if (pif == NULL) {
281 ipmgmt_log(LOG_WARNING,
282 "Could not allocate memory to configure %s", ifname);
283 return;
284 }
285 (void) strlcpy(pif->pif_ifname, ifname, sizeof (pif->pif_ifname));
286 pif->pif_v4 = v4;
287 pif->pif_v6 = v6;
288 pif->pif_next = ngz_pifs;
289 ngz_pifs = pif;
290 }
291
292 /*
293 * ipmgmt_ngz_init() initializes exclusive-IP stack non-global zones by
294 * extracting configuration that has been saved in the kernel and applying
295 * it at zone boot.
296 */
297 static void
ipmgmt_ngz_init()298 ipmgmt_ngz_init()
299 {
300 zoneid_t zoneid;
301 boolean_t firstboot = B_TRUE, s10c = B_FALSE;
302 char brand[MAXNAMELEN];
303 ipadm_status_t ipstatus;
304
305 zoneid = getzoneid();
306 if (zoneid != GLOBAL_ZONEID) {
307
308 if (zone_getattr(zoneid, ZONE_ATTR_BRAND, brand,
309 sizeof (brand)) < 0) {
310 ipmgmt_log(LOG_ERR, "Could not get brand name");
311 return;
312 }
313 /*
314 * firstboot is always true for S10C zones, where ipadm is not
315 * available for restoring persistent configuration.
316 */
317 if (strcmp(brand, NATIVE_BRAND_NAME) == 0)
318 firstboot = ipmgmt_ngz_firstboot_postinstall();
319 else
320 s10c = B_TRUE;
321
322 if (!firstboot)
323 return;
324
325 ipstatus = ipadm_open(&iph, IPH_IPMGMTD);
326 if (ipstatus != IPADM_SUCCESS) {
327 ipmgmt_log(LOG_ERR, "could not open ipadm handle",
328 ipadm_status2str(ipstatus));
329 return;
330 }
331 /*
332 * Only pass down the callback to persist the interface
333 * for NATIVE (ipkg) zones.
334 */
335 (void) ipadm_init_net_from_gz(iph, NULL,
336 (s10c ? NULL : ipmgmt_persist_if_cb));
337 ipadm_close(iph);
338 }
339 }
340
341 /*
342 * Set the uid of this daemon to the "netadm" user. Finish the following
343 * operations before setuid() because they need root privileges:
344 *
345 * - create the /etc/svc/volatile/ipadm directory;
346 * - change its uid/gid to "netadm"/"netadm";
347 */
348 static int
ipmgmt_init_privileges()349 ipmgmt_init_privileges()
350 {
351 struct stat statbuf;
352 int err;
353
354 /* create the IPADM_TMPFS_DIR directory */
355 if (stat(IPADM_TMPFS_DIR, &statbuf) < 0) {
356 if (mkdir(IPADM_TMPFS_DIR, (mode_t)0755) < 0) {
357 err = errno;
358 goto fail;
359 }
360 } else {
361 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
362 err = ENOTDIR;
363 goto fail;
364 }
365 }
366
367 if ((chmod(IPADM_TMPFS_DIR, 0755) < 0) ||
368 (chown(IPADM_TMPFS_DIR, UID_NETADM, GID_NETADM) < 0)) {
369 err = errno;
370 goto fail;
371 }
372
373 /*
374 * initialize any NGZ specific network information before dropping
375 * privileges. We need these privileges to plumb IP interfaces handed
376 * down from the GZ (for dlpi_open() etc.) and also to configure the
377 * address itself (for any IPI_PRIV ioctls like SLIFADDR)
378 */
379 ipmgmt_ngz_init();
380
381 /*
382 * Apply all protocol module properties. We need to apply all protocol
383 * properties before we drop root privileges.
384 */
385 ipmgmt_init_prop();
386
387 /*
388 * limit the privileges of this daemon and set the uid of this
389 * daemon to UID_NETADM
390 */
391 if (__init_daemon_priv(PU_RESETGROUPS|PU_CLEARLIMITSET, UID_NETADM,
392 GID_NETADM, NULL) == -1) {
393 err = EPERM;
394 goto fail;
395 }
396
397 return (0);
398 fail:
399 (void) ipmgmt_log(LOG_ERR, "failed to initialize the daemon: %s",
400 strerror(err));
401 return (err);
402 }
403
404 /*
405 * Keep the pfds fd open, close other fds.
406 */
407 /*ARGSUSED*/
408 static int
closefunc(void * arg,int fd)409 closefunc(void *arg, int fd)
410 {
411 if (fd != pfds[1])
412 (void) close(fd);
413 return (0);
414 }
415
416 /*
417 * We cannot use libc's daemon() because the door we create is associated with
418 * the process ID. If we create the door before the call to daemon(), it will
419 * be associated with the parent and it's incorrect. On the other hand if we
420 * create the door later, after the call to daemon(), parent process exits
421 * early and gives a false notion to SMF that 'ipmgmtd' is up and running,
422 * which is incorrect. So, we have our own daemon() equivalent.
423 */
424 static boolean_t
ipmgmt_daemonize(void)425 ipmgmt_daemonize(void)
426 {
427 pid_t pid;
428 int rv;
429
430 if (pipe(pfds) < 0) {
431 (void) fprintf(stderr, "%s: pipe() failed: %s\n",
432 progname, strerror(errno));
433 exit(EXIT_FAILURE);
434 }
435
436 if ((pid = fork()) == -1) {
437 (void) fprintf(stderr, "%s: fork() failed: %s\n",
438 progname, strerror(errno));
439 exit(EXIT_FAILURE);
440 } else if (pid > 0) { /* Parent */
441 (void) close(pfds[1]);
442
443 /*
444 * Parent should not exit early, it should wait for the child
445 * to return Success/Failure. If the parent exits early, then
446 * SMF will think 'ipmgmtd' is up and would start all the
447 * depended services.
448 *
449 * If the child process exits unexpectedly, read() returns -1.
450 */
451 if (read(pfds[0], &rv, sizeof (int)) != sizeof (int)) {
452 (void) kill(pid, SIGKILL);
453 rv = EXIT_FAILURE;
454 }
455
456 (void) close(pfds[0]);
457 exit(rv);
458 }
459
460 /* Child */
461 (void) close(pfds[0]);
462 (void) setsid();
463
464 /* close all files except pfds[1] */
465 (void) fdwalk(closefunc, NULL);
466 (void) chdir("/");
467 openlog(progname, LOG_PID, LOG_DAEMON);
468 return (B_TRUE);
469 }
470
471 int
main(int argc,char * argv[])472 main(int argc, char *argv[])
473 {
474 int opt;
475 boolean_t fg = B_FALSE;
476
477 progname = strrchr(argv[0], '/');
478 if (progname != NULL)
479 progname++;
480 else
481 progname = argv[0];
482
483 /* Process options */
484 while ((opt = getopt(argc, argv, "f")) != EOF) {
485 switch (opt) {
486 case 'f':
487 fg = B_TRUE;
488 break;
489 default:
490 (void) fprintf(stderr, "Usage: %s [-f]\n", progname);
491 return (EXIT_FAILURE);
492 }
493 }
494
495 if (!fg && getenv("SMF_FMRI") == NULL) {
496 (void) fprintf(stderr,
497 "ipmgmtd is a smf(5) managed service and cannot be run "
498 "from the command line.\n");
499 return (EINVAL);
500 }
501
502 if (!fg && !ipmgmt_daemonize())
503 return (EXIT_FAILURE);
504
505 if (ipmgmt_init_privileges() != 0)
506 goto child_out;
507
508 if (ipmgmt_init() != 0)
509 goto child_out;
510
511 /* Inform the parent process that it can successfully exit */
512 ipmgmt_inform_parent_exit(EXIT_SUCCESS);
513
514 for (;;)
515 (void) pause();
516
517 child_out:
518 /* return from main() forcibly exits an MT process */
519 ipmgmt_inform_parent_exit(EXIT_FAILURE);
520 return (EXIT_FAILURE);
521 }
522
523 /*
524 * Return TRUE if `ifname' has persistent configuration for the `af' address
525 * family in the datastore
526 */
527 static boolean_t
ipmgmt_persist_if_exists(char * ifname,sa_family_t af)528 ipmgmt_persist_if_exists(char *ifname, sa_family_t af)
529 {
530 ipmgmt_getif_cbarg_t cbarg;
531 boolean_t exists = B_FALSE;
532 ipadm_if_info_t *ifp;
533
534 bzero(&cbarg, sizeof (cbarg));
535 cbarg.cb_ifname = ifname;
536 (void) ipmgmt_db_walk(ipmgmt_db_getif, &cbarg, IPADM_DB_READ);
537 if ((ifp = cbarg.cb_ifinfo) != NULL) {
538 if ((af == AF_INET && (ifp->ifi_pflags & IFIF_IPV4)) ||
539 (af == AF_INET6 && (ifp->ifi_pflags & IFIF_IPV6))) {
540 exists = B_TRUE;
541 }
542 }
543 free(ifp);
544 return (exists);
545 }
546
547 /*
548 * Persist any NGZ interfaces assigned to us from the global zone if they do
549 * not already exist in the persistent db. We need to
550 * do this before any calls to ipadm_enable_if() can succeed (i.e.,
551 * before opening up for door_calls), and after setuid to 'netadm' so that
552 * the persistent db is created with the right permissions.
553 */
554 static void
ipmgmt_ngz_persist_if()555 ipmgmt_ngz_persist_if()
556 {
557 ipmgmt_pif_t *pif, *next;
558 ipmgmt_if_arg_t ifarg;
559
560 for (pif = ngz_pifs; pif != NULL; pif = next) {
561 next = pif->pif_next;
562 bzero(&ifarg, sizeof (ifarg));
563 (void) strlcpy(ifarg.ia_ifname, pif->pif_ifname,
564 sizeof (ifarg.ia_ifname));
565 ifarg.ia_flags = IPMGMT_PERSIST;
566 if (pif->pif_v4 &&
567 !ipmgmt_persist_if_exists(pif->pif_ifname, AF_INET)) {
568 ifarg.ia_family = AF_INET;
569 (void) ipmgmt_persist_if(&ifarg);
570 }
571 if (pif->pif_v6 &&
572 !ipmgmt_persist_if_exists(pif->pif_ifname, AF_INET6)) {
573 ifarg.ia_family = AF_INET6;
574 (void) ipmgmt_persist_if(&ifarg);
575 }
576 free(pif);
577 }
578 ngz_pifs = NULL; /* no red herrings */
579 }
580