xref: /titanic_53/usr/src/cmd/dlmgmtd/dlmgmt_main.c (revision b9e076dcc05b713d74073c0d692dfbb0f6f2c594)
1d62bc4baSyz147064 /*
2d62bc4baSyz147064  * CDDL HEADER START
3d62bc4baSyz147064  *
4d62bc4baSyz147064  * The contents of this file are subject to the terms of the
5d62bc4baSyz147064  * Common Development and Distribution License (the "License").
6d62bc4baSyz147064  * You may not use this file except in compliance with the License.
7d62bc4baSyz147064  *
8d62bc4baSyz147064  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9d62bc4baSyz147064  * or http://www.opensolaris.org/os/licensing.
10d62bc4baSyz147064  * See the License for the specific language governing permissions
11d62bc4baSyz147064  * and limitations under the License.
12d62bc4baSyz147064  *
13d62bc4baSyz147064  * When distributing Covered Code, include this CDDL HEADER in each
14d62bc4baSyz147064  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15d62bc4baSyz147064  * If applicable, add the following below this CDDL HEADER, with the
16d62bc4baSyz147064  * fields enclosed by brackets "[]" replaced with your own identifying
17d62bc4baSyz147064  * information: Portions Copyright [yyyy] [name of copyright owner]
18d62bc4baSyz147064  *
19d62bc4baSyz147064  * CDDL HEADER END
20d62bc4baSyz147064  */
21d62bc4baSyz147064 
22d62bc4baSyz147064 /*
23d62bc4baSyz147064  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
24d62bc4baSyz147064  * Use is subject to license terms.
25d62bc4baSyz147064  */
26d62bc4baSyz147064 
27d62bc4baSyz147064 #pragma ident	"%Z%%M%	%I%	%E% SMI"
28d62bc4baSyz147064 
29d62bc4baSyz147064 /*
30d62bc4baSyz147064  * The dlmgmtd daemon is started by the datalink-management SMF service.
31d62bc4baSyz147064  * This daemon is used to manage <link name, linkid> mapping and the
32d62bc4baSyz147064  * persistent datalink configuration.
33d62bc4baSyz147064  *
34d62bc4baSyz147064  * Today, the <link name, linkid> mapping and the persistent configuration
35d62bc4baSyz147064  * of datalinks is kept in /etc/dladm/datalink.conf, and the daemon keeps
36d62bc4baSyz147064  * a copy of the datalinks in the memory (see dlmgmt_id_avl and
37d62bc4baSyz147064  * dlmgmt_name_avl). The active <link name, linkid> mapping is kept in
38*b9e076dcSyz147064  * /etc/svc/volatile/dladm cache file, so that the mapping can be recovered
39*b9e076dcSyz147064  * when dlmgmtd exits for some reason (e.g., when dlmgmtd is accidentally
40*b9e076dcSyz147064  * killed).
41d62bc4baSyz147064  */
42d62bc4baSyz147064 
43d62bc4baSyz147064 #include <assert.h>
44d62bc4baSyz147064 #include <errno.h>
45d62bc4baSyz147064 #include <fcntl.h>
46*b9e076dcSyz147064 #include <priv_utils.h>
47d62bc4baSyz147064 #include <signal.h>
48d62bc4baSyz147064 #include <stdlib.h>
49d62bc4baSyz147064 #include <stdio.h>
50d62bc4baSyz147064 #include <stropts.h>
51d62bc4baSyz147064 #include <strings.h>
52d62bc4baSyz147064 #include <syslog.h>
53d62bc4baSyz147064 #include <sys/dld.h>
54*b9e076dcSyz147064 #include <sys/param.h>
55*b9e076dcSyz147064 #include <sys/stat.h>
56d62bc4baSyz147064 #include <unistd.h>
57d62bc4baSyz147064 #include <libdlmgmt.h>
58d62bc4baSyz147064 #include "dlmgmt_impl.h"
59d62bc4baSyz147064 
60d62bc4baSyz147064 const char		*progname;
61d62bc4baSyz147064 boolean_t		debug;
62d62bc4baSyz147064 static int		pfds[2];
63d62bc4baSyz147064 static int		dlmgmt_door_fd = -1;
64*b9e076dcSyz147064 static int		dld_control_fd = -1;
65*b9e076dcSyz147064 
66*b9e076dcSyz147064 static void		dlmgmtd_exit(int);
67*b9e076dcSyz147064 static int		dlmgmt_init();
68*b9e076dcSyz147064 static void		dlmgmt_fini();
69*b9e076dcSyz147064 static int		dlmgmt_init_privileges();
70*b9e076dcSyz147064 static void		dlmgmt_fini_privileges();
71d62bc4baSyz147064 
72d62bc4baSyz147064 static int
73d62bc4baSyz147064 dlmgmt_set_doorfd(boolean_t start)
74d62bc4baSyz147064 {
75d62bc4baSyz147064 	dld_ioc_door_t did;
76d62bc4baSyz147064 	struct strioctl iocb;
77d62bc4baSyz147064 	int err = 0;
78d62bc4baSyz147064 
79*b9e076dcSyz147064 	assert(dld_control_fd != -1);
80d62bc4baSyz147064 
81d62bc4baSyz147064 	did.did_start_door = start;
82d62bc4baSyz147064 
83d62bc4baSyz147064 	iocb.ic_cmd	= DLDIOC_DOORSERVER;
84d62bc4baSyz147064 	iocb.ic_timout	= 0;
85d62bc4baSyz147064 	iocb.ic_len	= sizeof (did);
86d62bc4baSyz147064 	iocb.ic_dp	= (char *)&did;
87d62bc4baSyz147064 
88*b9e076dcSyz147064 	if (ioctl(dld_control_fd, I_STR, &iocb) == -1)
89d62bc4baSyz147064 		err = errno;
90d62bc4baSyz147064 
91d62bc4baSyz147064 	return (err);
92d62bc4baSyz147064 }
93d62bc4baSyz147064 
94d62bc4baSyz147064 static int
95d62bc4baSyz147064 dlmgmt_door_init()
96d62bc4baSyz147064 {
97*b9e076dcSyz147064 	int fd;
98d62bc4baSyz147064 	int err;
99d62bc4baSyz147064 
100*b9e076dcSyz147064 	/*
101*b9e076dcSyz147064 	 * Create the door file for dlmgmtd.
102*b9e076dcSyz147064 	 */
103*b9e076dcSyz147064 	if ((fd = open(DLMGMT_DOOR, O_CREAT|O_RDONLY, 0644)) == -1) {
104*b9e076dcSyz147064 		err = errno;
105*b9e076dcSyz147064 		dlmgmt_log(LOG_ERR, "open(%s) failed: %s",
106*b9e076dcSyz147064 		    DLMGMT_DOOR, strerror(err));
107*b9e076dcSyz147064 		return (err);
108*b9e076dcSyz147064 	}
109*b9e076dcSyz147064 	(void) close(fd);
110*b9e076dcSyz147064 
111d62bc4baSyz147064 	if ((dlmgmt_door_fd = door_create(dlmgmt_handler, NULL,
112d62bc4baSyz147064 	    DOOR_REFUSE_DESC | DOOR_NO_CANCEL)) == -1) {
113d62bc4baSyz147064 		err = errno;
114*b9e076dcSyz147064 		dlmgmt_log(LOG_ERR, "door_create() failed: %s",
115d62bc4baSyz147064 		    strerror(err));
116d62bc4baSyz147064 		return (err);
117d62bc4baSyz147064 	}
118d62bc4baSyz147064 	if (fattach(dlmgmt_door_fd, DLMGMT_DOOR) != 0) {
119d62bc4baSyz147064 		err = errno;
120*b9e076dcSyz147064 		dlmgmt_log(LOG_ERR, "fattach(%s) failed: %s",
121d62bc4baSyz147064 		    DLMGMT_DOOR, strerror(err));
122d62bc4baSyz147064 		goto fail;
123d62bc4baSyz147064 	}
124d62bc4baSyz147064 	if ((err = dlmgmt_set_doorfd(B_TRUE)) != 0) {
125*b9e076dcSyz147064 		dlmgmt_log(LOG_ERR, "cannot set kernel doorfd: %s",
126d62bc4baSyz147064 		    strerror(err));
127*b9e076dcSyz147064 		(void) fdetach(DLMGMT_DOOR);
128d62bc4baSyz147064 		goto fail;
129d62bc4baSyz147064 	}
130d62bc4baSyz147064 
131d62bc4baSyz147064 	return (0);
132d62bc4baSyz147064 fail:
133d62bc4baSyz147064 	(void) door_revoke(dlmgmt_door_fd);
134d62bc4baSyz147064 	dlmgmt_door_fd = -1;
135d62bc4baSyz147064 	return (err);
136d62bc4baSyz147064 }
137d62bc4baSyz147064 
138d62bc4baSyz147064 static void
139d62bc4baSyz147064 dlmgmt_door_fini()
140d62bc4baSyz147064 {
141*b9e076dcSyz147064 	if (dlmgmt_door_fd == -1)
142*b9e076dcSyz147064 		return;
143*b9e076dcSyz147064 
144*b9e076dcSyz147064 	if (door_revoke(dlmgmt_door_fd) == -1) {
145d62bc4baSyz147064 		dlmgmt_log(LOG_WARNING, "door_revoke(%s) failed: %s",
146*b9e076dcSyz147064 		    DLMGMT_DOOR, strerror(errno));
147d62bc4baSyz147064 	}
148*b9e076dcSyz147064 
149d62bc4baSyz147064 	(void) fdetach(DLMGMT_DOOR);
150*b9e076dcSyz147064 	(void) dlmgmt_set_doorfd(B_FALSE);
151d62bc4baSyz147064 }
152d62bc4baSyz147064 
153d62bc4baSyz147064 static int
154d62bc4baSyz147064 dlmgmt_init()
155d62bc4baSyz147064 {
156d62bc4baSyz147064 	int		err;
157d62bc4baSyz147064 
158*b9e076dcSyz147064 	if (signal(SIGTERM, dlmgmtd_exit) == SIG_ERR ||
159*b9e076dcSyz147064 	    signal(SIGINT, dlmgmtd_exit) == SIG_ERR) {
160*b9e076dcSyz147064 		err = errno;
161*b9e076dcSyz147064 		dlmgmt_log(LOG_ERR, "signal() for SIGTERM/INT failed: %s",
162*b9e076dcSyz147064 		    strerror(err));
163*b9e076dcSyz147064 		return (err);
164*b9e076dcSyz147064 	}
165*b9e076dcSyz147064 
166d62bc4baSyz147064 	if ((err = dlmgmt_linktable_init()) != 0)
167d62bc4baSyz147064 		return (err);
168d62bc4baSyz147064 
169d62bc4baSyz147064 	if ((err = dlmgmt_db_init()) != 0 || (err = dlmgmt_door_init()) != 0)
170d62bc4baSyz147064 		dlmgmt_linktable_fini();
171d62bc4baSyz147064 
172d62bc4baSyz147064 	return (err);
173d62bc4baSyz147064 }
174d62bc4baSyz147064 
175d62bc4baSyz147064 static void
176d62bc4baSyz147064 dlmgmt_fini()
177d62bc4baSyz147064 {
178d62bc4baSyz147064 	dlmgmt_door_fini();
179d62bc4baSyz147064 	dlmgmt_linktable_fini();
180d62bc4baSyz147064 }
181d62bc4baSyz147064 
182d62bc4baSyz147064 /*
183d62bc4baSyz147064  * This is called by the child process to inform the parent process to
184d62bc4baSyz147064  * exit with the given return value.
185d62bc4baSyz147064  */
186d62bc4baSyz147064 static void
187d62bc4baSyz147064 dlmgmt_inform_parent_exit(int rv)
188d62bc4baSyz147064 {
189d62bc4baSyz147064 	if (debug)
190d62bc4baSyz147064 		return;
191d62bc4baSyz147064 
192d62bc4baSyz147064 	if (write(pfds[1], &rv, sizeof (int)) != sizeof (int)) {
193d62bc4baSyz147064 		dlmgmt_log(LOG_WARNING,
194d62bc4baSyz147064 		    "dlmgmt_inform_parent_exit() failed: %s", strerror(errno));
195d62bc4baSyz147064 		(void) close(pfds[1]);
196d62bc4baSyz147064 		exit(EXIT_FAILURE);
197d62bc4baSyz147064 	}
198d62bc4baSyz147064 	(void) close(pfds[1]);
199d62bc4baSyz147064 }
200d62bc4baSyz147064 
201d62bc4baSyz147064 /*ARGSUSED*/
202d62bc4baSyz147064 static void
203d62bc4baSyz147064 dlmgmtd_exit(int signo)
204d62bc4baSyz147064 {
205d62bc4baSyz147064 	(void) close(pfds[1]);
206d62bc4baSyz147064 	dlmgmt_fini();
207*b9e076dcSyz147064 	dlmgmt_fini_privileges();
208d62bc4baSyz147064 	exit(EXIT_FAILURE);
209d62bc4baSyz147064 }
210d62bc4baSyz147064 
211d62bc4baSyz147064 static void
212d62bc4baSyz147064 usage(void)
213d62bc4baSyz147064 {
214d62bc4baSyz147064 	(void) fprintf(stderr, "Usage: %s [-d]\n", progname);
215d62bc4baSyz147064 	exit(EXIT_FAILURE);
216d62bc4baSyz147064 }
217d62bc4baSyz147064 
218*b9e076dcSyz147064 /*
219*b9e076dcSyz147064  * Set the uid of this daemon to the "dladm" user. Finish the following
220*b9e076dcSyz147064  * operations before setuid() because they need root privileges:
221*b9e076dcSyz147064  *
222*b9e076dcSyz147064  *    - create the /etc/svc/volatile/dladm directory;
223*b9e076dcSyz147064  *    - change its uid/gid to "dladm"/"sys";
224*b9e076dcSyz147064  *    - open the dld control node
225*b9e076dcSyz147064  */
226d62bc4baSyz147064 static int
227*b9e076dcSyz147064 dlmgmt_init_privileges()
228d62bc4baSyz147064 {
229*b9e076dcSyz147064 	struct stat	statbuf;
230d62bc4baSyz147064 
231*b9e076dcSyz147064 	/*
232*b9e076dcSyz147064 	 * Create the DLMGMT_TMPFS_DIR directory.
233*b9e076dcSyz147064 	 */
234*b9e076dcSyz147064 	if (stat(DLMGMT_TMPFS_DIR, &statbuf) < 0) {
235*b9e076dcSyz147064 		if (mkdir(DLMGMT_TMPFS_DIR, (mode_t)0755) < 0)
236*b9e076dcSyz147064 			return (errno);
237*b9e076dcSyz147064 	} else {
238*b9e076dcSyz147064 		if ((statbuf.st_mode & S_IFMT) != S_IFDIR)
239*b9e076dcSyz147064 			return (ENOTDIR);
240d62bc4baSyz147064 	}
241d62bc4baSyz147064 
242*b9e076dcSyz147064 	if ((chmod(DLMGMT_TMPFS_DIR, 0755) < 0) ||
243*b9e076dcSyz147064 	    (chown(DLMGMT_TMPFS_DIR, UID_DLADM, GID_SYS) < 0)) {
244*b9e076dcSyz147064 		return (EPERM);
245d62bc4baSyz147064 	}
246d62bc4baSyz147064 
247*b9e076dcSyz147064 	/*
248*b9e076dcSyz147064 	 * When dlmgmtd is started at boot, "ALL" privilege is required
249*b9e076dcSyz147064 	 * to open the dld control node.
250*b9e076dcSyz147064 	 */
251*b9e076dcSyz147064 	if ((dld_control_fd = open(DLD_CONTROL_DEV, O_RDWR)) < 0)
252*b9e076dcSyz147064 		return (errno);
253*b9e076dcSyz147064 
254*b9e076dcSyz147064 	if (__init_daemon_priv(PU_RESETGROUPS|PU_CLEARLIMITSET, UID_DLADM,
255*b9e076dcSyz147064 	    GID_SYS, NULL) == -1) {
256*b9e076dcSyz147064 		(void) close(dld_control_fd);
257*b9e076dcSyz147064 		dld_control_fd = -1;
258*b9e076dcSyz147064 		return (EPERM);
259d62bc4baSyz147064 	}
260d62bc4baSyz147064 
261d62bc4baSyz147064 	return (0);
262d62bc4baSyz147064 }
263d62bc4baSyz147064 
264*b9e076dcSyz147064 static void
265*b9e076dcSyz147064 dlmgmt_fini_privileges()
266*b9e076dcSyz147064 {
267*b9e076dcSyz147064 	if (dld_control_fd != -1) {
268*b9e076dcSyz147064 		(void) close(dld_control_fd);
269*b9e076dcSyz147064 		dld_control_fd = -1;
270*b9e076dcSyz147064 	}
271*b9e076dcSyz147064 }
272*b9e076dcSyz147064 
273d62bc4baSyz147064 /*
274d62bc4baSyz147064  * Keep the pfds fd open, close other fds.
275d62bc4baSyz147064  */
276d62bc4baSyz147064 /*ARGSUSED*/
277d62bc4baSyz147064 static int
278d62bc4baSyz147064 closefunc(void *arg, int fd)
279d62bc4baSyz147064 {
280d62bc4baSyz147064 	if (fd != pfds[1])
281d62bc4baSyz147064 		(void) close(fd);
282d62bc4baSyz147064 	return (0);
283d62bc4baSyz147064 }
284d62bc4baSyz147064 
285d62bc4baSyz147064 static boolean_t
286d62bc4baSyz147064 dlmgmt_daemonize(void)
287d62bc4baSyz147064 {
288d62bc4baSyz147064 	pid_t pid;
289d62bc4baSyz147064 	int rv;
290d62bc4baSyz147064 
291d62bc4baSyz147064 	if (pipe(pfds) < 0) {
292d62bc4baSyz147064 		(void) fprintf(stderr, "%s: pipe() failed: %s\n",
293d62bc4baSyz147064 		    progname, strerror(errno));
294d62bc4baSyz147064 		exit(EXIT_FAILURE);
295d62bc4baSyz147064 	}
296d62bc4baSyz147064 
297d62bc4baSyz147064 	if ((pid = fork()) == -1) {
298d62bc4baSyz147064 		(void) fprintf(stderr, "%s: fork() failed: %s\n",
299d62bc4baSyz147064 		    progname, strerror(errno));
300d62bc4baSyz147064 		exit(EXIT_FAILURE);
301d62bc4baSyz147064 	} else if (pid > 0) { /* Parent */
302d62bc4baSyz147064 		(void) close(pfds[1]);
303d62bc4baSyz147064 
304d62bc4baSyz147064 		/*
305d62bc4baSyz147064 		 * Read the child process's return value from the pfds.
306d62bc4baSyz147064 		 * If the child process exits unexpected, read() returns -1.
307d62bc4baSyz147064 		 */
308d62bc4baSyz147064 		if (read(pfds[0], &rv, sizeof (int)) != sizeof (int)) {
309d62bc4baSyz147064 			(void) kill(pid, SIGKILL);
310d62bc4baSyz147064 			rv = EXIT_FAILURE;
311d62bc4baSyz147064 		}
312d62bc4baSyz147064 
313d62bc4baSyz147064 		(void) close(pfds[0]);
314d62bc4baSyz147064 		exit(rv);
315d62bc4baSyz147064 	}
316d62bc4baSyz147064 
317d62bc4baSyz147064 	/* Child */
318d62bc4baSyz147064 	(void) close(pfds[0]);
319d62bc4baSyz147064 	(void) setsid();
320d62bc4baSyz147064 
321d62bc4baSyz147064 	/*
322d62bc4baSyz147064 	 * Close all files except pfds[1].
323d62bc4baSyz147064 	 */
324d62bc4baSyz147064 	(void) fdwalk(closefunc, NULL);
325d62bc4baSyz147064 	(void) chdir("/");
326d62bc4baSyz147064 	openlog(progname, LOG_PID, LOG_DAEMON);
327d62bc4baSyz147064 	return (B_TRUE);
328d62bc4baSyz147064 }
329d62bc4baSyz147064 
330d62bc4baSyz147064 int
331d62bc4baSyz147064 main(int argc, char *argv[])
332d62bc4baSyz147064 {
333d62bc4baSyz147064 	int		opt;
334d62bc4baSyz147064 
335d62bc4baSyz147064 	progname = strrchr(argv[0], '/');
336d62bc4baSyz147064 	if (progname != NULL)
337d62bc4baSyz147064 		progname++;
338d62bc4baSyz147064 	else
339d62bc4baSyz147064 		progname = argv[0];
340d62bc4baSyz147064 
341d62bc4baSyz147064 	/*
342d62bc4baSyz147064 	 * Process options.
343d62bc4baSyz147064 	 */
344d62bc4baSyz147064 	while ((opt = getopt(argc, argv, "d")) != EOF) {
345d62bc4baSyz147064 		switch (opt) {
346d62bc4baSyz147064 		case 'd':
347d62bc4baSyz147064 			debug = B_TRUE;
348d62bc4baSyz147064 			break;
349d62bc4baSyz147064 		default:
350d62bc4baSyz147064 			usage();
351d62bc4baSyz147064 		}
352d62bc4baSyz147064 	}
353d62bc4baSyz147064 
354d62bc4baSyz147064 	if (!debug && !dlmgmt_daemonize())
355d62bc4baSyz147064 		return (EXIT_FAILURE);
356d62bc4baSyz147064 
357*b9e076dcSyz147064 	if ((errno = dlmgmt_init_privileges()) != 0) {
358*b9e076dcSyz147064 		dlmgmt_log(LOG_ERR, "dlmgmt_init_privileges() failed: %s",
359d62bc4baSyz147064 		    strerror(errno));
360d62bc4baSyz147064 		goto child_out;
361d62bc4baSyz147064 	}
362d62bc4baSyz147064 
363*b9e076dcSyz147064 	if (dlmgmt_init() != 0) {
364*b9e076dcSyz147064 		dlmgmt_fini_privileges();
365d62bc4baSyz147064 		goto child_out;
366*b9e076dcSyz147064 	}
367d62bc4baSyz147064 
368d62bc4baSyz147064 	/*
369d62bc4baSyz147064 	 * Inform the parent process that it can successfully exit.
370d62bc4baSyz147064 	 */
371d62bc4baSyz147064 	dlmgmt_inform_parent_exit(EXIT_SUCCESS);
372d62bc4baSyz147064 
373d62bc4baSyz147064 	for (;;)
374d62bc4baSyz147064 		(void) pause();
375d62bc4baSyz147064 
376d62bc4baSyz147064 child_out:
377d62bc4baSyz147064 	/* return from main() forcibly exits an MT process */
378d62bc4baSyz147064 	dlmgmt_inform_parent_exit(EXIT_FAILURE);
379d62bc4baSyz147064 	return (EXIT_FAILURE);
380d62bc4baSyz147064 }
381