1d62bc4baSyz147064 /* 2d62bc4baSyz147064 * CDDL HEADER START 3d62bc4baSyz147064 * 4d62bc4baSyz147064 * The contents of this file are subject to the terms of the 5d62bc4baSyz147064 * Common Development and Distribution License (the "License"). 6d62bc4baSyz147064 * You may not use this file except in compliance with the License. 7d62bc4baSyz147064 * 8d62bc4baSyz147064 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9d62bc4baSyz147064 * or http://www.opensolaris.org/os/licensing. 10d62bc4baSyz147064 * See the License for the specific language governing permissions 11d62bc4baSyz147064 * and limitations under the License. 12d62bc4baSyz147064 * 13d62bc4baSyz147064 * When distributing Covered Code, include this CDDL HEADER in each 14d62bc4baSyz147064 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15d62bc4baSyz147064 * If applicable, add the following below this CDDL HEADER, with the 16d62bc4baSyz147064 * fields enclosed by brackets "[]" replaced with your own identifying 17d62bc4baSyz147064 * information: Portions Copyright [yyyy] [name of copyright owner] 18d62bc4baSyz147064 * 19d62bc4baSyz147064 * CDDL HEADER END 20d62bc4baSyz147064 */ 21d62bc4baSyz147064 22d62bc4baSyz147064 /* 23*fd4e42c3SSebastien Roy * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 24d62bc4baSyz147064 * Use is subject to license terms. 25d62bc4baSyz147064 */ 26d62bc4baSyz147064 27d62bc4baSyz147064 /* 28d62bc4baSyz147064 * The dlmgmtd daemon is started by the datalink-management SMF service. 29d62bc4baSyz147064 * This daemon is used to manage <link name, linkid> mapping and the 30d62bc4baSyz147064 * persistent datalink configuration. 31d62bc4baSyz147064 * 32d62bc4baSyz147064 * Today, the <link name, linkid> mapping and the persistent configuration 33d62bc4baSyz147064 * of datalinks is kept in /etc/dladm/datalink.conf, and the daemon keeps 34d62bc4baSyz147064 * a copy of the datalinks in the memory (see dlmgmt_id_avl and 35d62bc4baSyz147064 * dlmgmt_name_avl). The active <link name, linkid> mapping is kept in 36b9e076dcSyz147064 * /etc/svc/volatile/dladm cache file, so that the mapping can be recovered 37b9e076dcSyz147064 * when dlmgmtd exits for some reason (e.g., when dlmgmtd is accidentally 38b9e076dcSyz147064 * killed). 39d62bc4baSyz147064 */ 40d62bc4baSyz147064 41d62bc4baSyz147064 #include <assert.h> 42d62bc4baSyz147064 #include <errno.h> 43d62bc4baSyz147064 #include <fcntl.h> 44b9e076dcSyz147064 #include <priv_utils.h> 45d62bc4baSyz147064 #include <signal.h> 46d62bc4baSyz147064 #include <stdlib.h> 47d62bc4baSyz147064 #include <stdio.h> 48d62bc4baSyz147064 #include <strings.h> 49d62bc4baSyz147064 #include <syslog.h> 50d62bc4baSyz147064 #include <sys/dld.h> 51b9e076dcSyz147064 #include <sys/param.h> 52b9e076dcSyz147064 #include <sys/stat.h> 53d62bc4baSyz147064 #include <unistd.h> 544ac67f02SAnurag S. Maskey #include <libdladm_impl.h> 55d62bc4baSyz147064 #include <libdlmgmt.h> 56d62bc4baSyz147064 #include "dlmgmt_impl.h" 57d62bc4baSyz147064 58d62bc4baSyz147064 const char *progname; 59d62bc4baSyz147064 boolean_t debug; 60d62bc4baSyz147064 static int pfds[2]; 614ac67f02SAnurag S. Maskey /* 624ac67f02SAnurag S. Maskey * This file descriptor to DLMGMT_DOOR cannot be in the libdladm 634ac67f02SAnurag S. Maskey * handle because the door isn't created when the handle is created. 644ac67f02SAnurag S. Maskey */ 65d62bc4baSyz147064 static int dlmgmt_door_fd = -1; 664ac67f02SAnurag S. Maskey 674ac67f02SAnurag S. Maskey /* 684ac67f02SAnurag S. Maskey * This libdladm handle is global so that dlmgmt_upcall_linkprop_init() 694ac67f02SAnurag S. Maskey * can pass to libdladm. The handle is opened during dlmgmt_init_privileges() 704ac67f02SAnurag S. Maskey * with "ALL" privileges. It is not able to open DLMGMT_DOOR at that time as 714ac67f02SAnurag S. Maskey * it hasn't been created yet. This door in the handle is opened in the first 724ac67f02SAnurag S. Maskey * call to dladm_door_fd(). 734ac67f02SAnurag S. Maskey */ 744ac67f02SAnurag S. Maskey dladm_handle_t dld_handle = NULL; 75b9e076dcSyz147064 76b9e076dcSyz147064 static void dlmgmtd_exit(int); 77b9e076dcSyz147064 static int dlmgmt_init(); 78b9e076dcSyz147064 static void dlmgmt_fini(); 79b9e076dcSyz147064 static int dlmgmt_init_privileges(); 80b9e076dcSyz147064 static void dlmgmt_fini_privileges(); 81d62bc4baSyz147064 82d62bc4baSyz147064 static int 83d62bc4baSyz147064 dlmgmt_set_doorfd(boolean_t start) 84d62bc4baSyz147064 { 85d62bc4baSyz147064 dld_ioc_door_t did; 86d62bc4baSyz147064 int err = 0; 87d62bc4baSyz147064 884ac67f02SAnurag S. Maskey assert(dld_handle != NULL); 89d62bc4baSyz147064 90d62bc4baSyz147064 did.did_start_door = start; 91d62bc4baSyz147064 924ac67f02SAnurag S. Maskey if (ioctl(dladm_dld_fd(dld_handle), DLDIOC_DOORSERVER, &did) == -1) 93d62bc4baSyz147064 err = errno; 94d62bc4baSyz147064 95d62bc4baSyz147064 return (err); 96d62bc4baSyz147064 } 97d62bc4baSyz147064 98d62bc4baSyz147064 static int 99d62bc4baSyz147064 dlmgmt_door_init() 100d62bc4baSyz147064 { 101b9e076dcSyz147064 int fd; 102d62bc4baSyz147064 int err; 103d62bc4baSyz147064 104b9e076dcSyz147064 /* 105b9e076dcSyz147064 * Create the door file for dlmgmtd. 106b9e076dcSyz147064 */ 107b9e076dcSyz147064 if ((fd = open(DLMGMT_DOOR, O_CREAT|O_RDONLY, 0644)) == -1) { 108b9e076dcSyz147064 err = errno; 109b9e076dcSyz147064 dlmgmt_log(LOG_ERR, "open(%s) failed: %s", 110b9e076dcSyz147064 DLMGMT_DOOR, strerror(err)); 111b9e076dcSyz147064 return (err); 112b9e076dcSyz147064 } 113b9e076dcSyz147064 (void) close(fd); 114b9e076dcSyz147064 115d62bc4baSyz147064 if ((dlmgmt_door_fd = door_create(dlmgmt_handler, NULL, 116d62bc4baSyz147064 DOOR_REFUSE_DESC | DOOR_NO_CANCEL)) == -1) { 117d62bc4baSyz147064 err = errno; 118b9e076dcSyz147064 dlmgmt_log(LOG_ERR, "door_create() failed: %s", 119d62bc4baSyz147064 strerror(err)); 120d62bc4baSyz147064 return (err); 121d62bc4baSyz147064 } 122*fd4e42c3SSebastien Roy /* 123*fd4e42c3SSebastien Roy * fdetach first in case a previous daemon instance exited 124*fd4e42c3SSebastien Roy * ungracefully. 125*fd4e42c3SSebastien Roy */ 126*fd4e42c3SSebastien Roy (void) fdetach(DLMGMT_DOOR); 127d62bc4baSyz147064 if (fattach(dlmgmt_door_fd, DLMGMT_DOOR) != 0) { 128d62bc4baSyz147064 err = errno; 129b9e076dcSyz147064 dlmgmt_log(LOG_ERR, "fattach(%s) failed: %s", 130d62bc4baSyz147064 DLMGMT_DOOR, strerror(err)); 131d62bc4baSyz147064 goto fail; 132d62bc4baSyz147064 } 133d62bc4baSyz147064 if ((err = dlmgmt_set_doorfd(B_TRUE)) != 0) { 134b9e076dcSyz147064 dlmgmt_log(LOG_ERR, "cannot set kernel doorfd: %s", 135d62bc4baSyz147064 strerror(err)); 136b9e076dcSyz147064 (void) fdetach(DLMGMT_DOOR); 137d62bc4baSyz147064 goto fail; 138d62bc4baSyz147064 } 139d62bc4baSyz147064 140d62bc4baSyz147064 return (0); 141d62bc4baSyz147064 fail: 142d62bc4baSyz147064 (void) door_revoke(dlmgmt_door_fd); 143d62bc4baSyz147064 dlmgmt_door_fd = -1; 144d62bc4baSyz147064 return (err); 145d62bc4baSyz147064 } 146d62bc4baSyz147064 147d62bc4baSyz147064 static void 148d62bc4baSyz147064 dlmgmt_door_fini() 149d62bc4baSyz147064 { 150b9e076dcSyz147064 if (dlmgmt_door_fd == -1) 151b9e076dcSyz147064 return; 152b9e076dcSyz147064 153b9e076dcSyz147064 if (door_revoke(dlmgmt_door_fd) == -1) { 154d62bc4baSyz147064 dlmgmt_log(LOG_WARNING, "door_revoke(%s) failed: %s", 155b9e076dcSyz147064 DLMGMT_DOOR, strerror(errno)); 156d62bc4baSyz147064 } 157b9e076dcSyz147064 158d62bc4baSyz147064 (void) fdetach(DLMGMT_DOOR); 159b9e076dcSyz147064 (void) dlmgmt_set_doorfd(B_FALSE); 160d62bc4baSyz147064 } 161d62bc4baSyz147064 162d62bc4baSyz147064 static int 163d62bc4baSyz147064 dlmgmt_init() 164d62bc4baSyz147064 { 165d62bc4baSyz147064 int err; 166d62bc4baSyz147064 167b9e076dcSyz147064 if (signal(SIGTERM, dlmgmtd_exit) == SIG_ERR || 168b9e076dcSyz147064 signal(SIGINT, dlmgmtd_exit) == SIG_ERR) { 169b9e076dcSyz147064 err = errno; 170b9e076dcSyz147064 dlmgmt_log(LOG_ERR, "signal() for SIGTERM/INT failed: %s", 171b9e076dcSyz147064 strerror(err)); 172b9e076dcSyz147064 return (err); 173b9e076dcSyz147064 } 174b9e076dcSyz147064 175d62bc4baSyz147064 if ((err = dlmgmt_linktable_init()) != 0) 176d62bc4baSyz147064 return (err); 177d62bc4baSyz147064 178d62bc4baSyz147064 if ((err = dlmgmt_db_init()) != 0 || (err = dlmgmt_door_init()) != 0) 179d62bc4baSyz147064 dlmgmt_linktable_fini(); 180d62bc4baSyz147064 181d62bc4baSyz147064 return (err); 182d62bc4baSyz147064 } 183d62bc4baSyz147064 184d62bc4baSyz147064 static void 185d62bc4baSyz147064 dlmgmt_fini() 186d62bc4baSyz147064 { 187d62bc4baSyz147064 dlmgmt_door_fini(); 188d62bc4baSyz147064 dlmgmt_linktable_fini(); 189d62bc4baSyz147064 } 190d62bc4baSyz147064 191d62bc4baSyz147064 /* 192d62bc4baSyz147064 * This is called by the child process to inform the parent process to 193d62bc4baSyz147064 * exit with the given return value. 194d62bc4baSyz147064 */ 195d62bc4baSyz147064 static void 196d62bc4baSyz147064 dlmgmt_inform_parent_exit(int rv) 197d62bc4baSyz147064 { 198d62bc4baSyz147064 if (debug) 199d62bc4baSyz147064 return; 200d62bc4baSyz147064 201d62bc4baSyz147064 if (write(pfds[1], &rv, sizeof (int)) != sizeof (int)) { 202d62bc4baSyz147064 dlmgmt_log(LOG_WARNING, 203d62bc4baSyz147064 "dlmgmt_inform_parent_exit() failed: %s", strerror(errno)); 204d62bc4baSyz147064 (void) close(pfds[1]); 205d62bc4baSyz147064 exit(EXIT_FAILURE); 206d62bc4baSyz147064 } 207d62bc4baSyz147064 (void) close(pfds[1]); 208d62bc4baSyz147064 } 209d62bc4baSyz147064 210d62bc4baSyz147064 /*ARGSUSED*/ 211d62bc4baSyz147064 static void 212d62bc4baSyz147064 dlmgmtd_exit(int signo) 213d62bc4baSyz147064 { 214d62bc4baSyz147064 (void) close(pfds[1]); 215d62bc4baSyz147064 dlmgmt_fini(); 216b9e076dcSyz147064 dlmgmt_fini_privileges(); 217d62bc4baSyz147064 exit(EXIT_FAILURE); 218d62bc4baSyz147064 } 219d62bc4baSyz147064 220d62bc4baSyz147064 static void 221d62bc4baSyz147064 usage(void) 222d62bc4baSyz147064 { 223d62bc4baSyz147064 (void) fprintf(stderr, "Usage: %s [-d]\n", progname); 224d62bc4baSyz147064 exit(EXIT_FAILURE); 225d62bc4baSyz147064 } 226d62bc4baSyz147064 227b9e076dcSyz147064 /* 228b9e076dcSyz147064 * Set the uid of this daemon to the "dladm" user. Finish the following 229b9e076dcSyz147064 * operations before setuid() because they need root privileges: 230b9e076dcSyz147064 * 231b9e076dcSyz147064 * - create the /etc/svc/volatile/dladm directory; 232b9e076dcSyz147064 * - change its uid/gid to "dladm"/"sys"; 233b9e076dcSyz147064 * - open the dld control node 234b9e076dcSyz147064 */ 235d62bc4baSyz147064 static int 236b9e076dcSyz147064 dlmgmt_init_privileges() 237d62bc4baSyz147064 { 238b9e076dcSyz147064 struct stat statbuf; 239d62bc4baSyz147064 240b9e076dcSyz147064 /* 241b9e076dcSyz147064 * Create the DLMGMT_TMPFS_DIR directory. 242b9e076dcSyz147064 */ 243b9e076dcSyz147064 if (stat(DLMGMT_TMPFS_DIR, &statbuf) < 0) { 244b9e076dcSyz147064 if (mkdir(DLMGMT_TMPFS_DIR, (mode_t)0755) < 0) 245b9e076dcSyz147064 return (errno); 246b9e076dcSyz147064 } else { 247b9e076dcSyz147064 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) 248b9e076dcSyz147064 return (ENOTDIR); 249d62bc4baSyz147064 } 250d62bc4baSyz147064 251b9e076dcSyz147064 if ((chmod(DLMGMT_TMPFS_DIR, 0755) < 0) || 252b9e076dcSyz147064 (chown(DLMGMT_TMPFS_DIR, UID_DLADM, GID_SYS) < 0)) { 253b9e076dcSyz147064 return (EPERM); 254d62bc4baSyz147064 } 255d62bc4baSyz147064 256b9e076dcSyz147064 /* 257b9e076dcSyz147064 * When dlmgmtd is started at boot, "ALL" privilege is required 2584ac67f02SAnurag S. Maskey * to open the dld control node. The door isn't created yet. 259b9e076dcSyz147064 */ 2604ac67f02SAnurag S. Maskey if (dladm_open(&dld_handle) != DLADM_STATUS_OK) { 2614ac67f02SAnurag S. Maskey dlmgmt_log(LOG_ERR, "dladm_open() failed"); 2624ac67f02SAnurag S. Maskey return (EPERM); 2634ac67f02SAnurag S. Maskey } 264b9e076dcSyz147064 2650dc974a9SCathy Zhou /* 266eae72b5bSSebastien Roy * We need PRIV_SYS_DL_CONFIG for the DLDIOC_DOORSERVER ioctl, 267eae72b5bSSebastien Roy * and PRIV_SYS_CONFIG to post sysevents. 2680dc974a9SCathy Zhou */ 269b9e076dcSyz147064 if (__init_daemon_priv(PU_RESETGROUPS|PU_CLEARLIMITSET, UID_DLADM, 270eae72b5bSSebastien Roy GID_SYS, PRIV_SYS_DL_CONFIG, PRIV_SYS_CONFIG, NULL) == -1) { 2714ac67f02SAnurag S. Maskey dladm_close(dld_handle); 2724ac67f02SAnurag S. Maskey dld_handle = NULL; 273b9e076dcSyz147064 return (EPERM); 274d62bc4baSyz147064 } 275d62bc4baSyz147064 2764ac67f02SAnurag S. Maskey 277d62bc4baSyz147064 return (0); 278d62bc4baSyz147064 } 279d62bc4baSyz147064 280b9e076dcSyz147064 static void 281b9e076dcSyz147064 dlmgmt_fini_privileges() 282b9e076dcSyz147064 { 2834ac67f02SAnurag S. Maskey if (dld_handle != NULL) { 2844ac67f02SAnurag S. Maskey dladm_close(dld_handle); 2854ac67f02SAnurag S. Maskey dld_handle = NULL; 286b9e076dcSyz147064 } 287b9e076dcSyz147064 } 288b9e076dcSyz147064 289d62bc4baSyz147064 /* 290d62bc4baSyz147064 * Keep the pfds fd open, close other fds. 291d62bc4baSyz147064 */ 292d62bc4baSyz147064 /*ARGSUSED*/ 293d62bc4baSyz147064 static int 294d62bc4baSyz147064 closefunc(void *arg, int fd) 295d62bc4baSyz147064 { 296d62bc4baSyz147064 if (fd != pfds[1]) 297d62bc4baSyz147064 (void) close(fd); 298d62bc4baSyz147064 return (0); 299d62bc4baSyz147064 } 300d62bc4baSyz147064 301d62bc4baSyz147064 static boolean_t 302d62bc4baSyz147064 dlmgmt_daemonize(void) 303d62bc4baSyz147064 { 304d62bc4baSyz147064 pid_t pid; 305d62bc4baSyz147064 int rv; 306d62bc4baSyz147064 307d62bc4baSyz147064 if (pipe(pfds) < 0) { 308d62bc4baSyz147064 (void) fprintf(stderr, "%s: pipe() failed: %s\n", 309d62bc4baSyz147064 progname, strerror(errno)); 310d62bc4baSyz147064 exit(EXIT_FAILURE); 311d62bc4baSyz147064 } 312d62bc4baSyz147064 313d62bc4baSyz147064 if ((pid = fork()) == -1) { 314d62bc4baSyz147064 (void) fprintf(stderr, "%s: fork() failed: %s\n", 315d62bc4baSyz147064 progname, strerror(errno)); 316d62bc4baSyz147064 exit(EXIT_FAILURE); 317d62bc4baSyz147064 } else if (pid > 0) { /* Parent */ 318d62bc4baSyz147064 (void) close(pfds[1]); 319d62bc4baSyz147064 320d62bc4baSyz147064 /* 321d62bc4baSyz147064 * Read the child process's return value from the pfds. 322d62bc4baSyz147064 * If the child process exits unexpected, read() returns -1. 323d62bc4baSyz147064 */ 324d62bc4baSyz147064 if (read(pfds[0], &rv, sizeof (int)) != sizeof (int)) { 325d62bc4baSyz147064 (void) kill(pid, SIGKILL); 326d62bc4baSyz147064 rv = EXIT_FAILURE; 327d62bc4baSyz147064 } 328d62bc4baSyz147064 329d62bc4baSyz147064 (void) close(pfds[0]); 330d62bc4baSyz147064 exit(rv); 331d62bc4baSyz147064 } 332d62bc4baSyz147064 333d62bc4baSyz147064 /* Child */ 334d62bc4baSyz147064 (void) close(pfds[0]); 335d62bc4baSyz147064 (void) setsid(); 336d62bc4baSyz147064 337d62bc4baSyz147064 /* 338d62bc4baSyz147064 * Close all files except pfds[1]. 339d62bc4baSyz147064 */ 340d62bc4baSyz147064 (void) fdwalk(closefunc, NULL); 341d62bc4baSyz147064 (void) chdir("/"); 342d62bc4baSyz147064 openlog(progname, LOG_PID, LOG_DAEMON); 343d62bc4baSyz147064 return (B_TRUE); 344d62bc4baSyz147064 } 345d62bc4baSyz147064 346d62bc4baSyz147064 int 347d62bc4baSyz147064 main(int argc, char *argv[]) 348d62bc4baSyz147064 { 349d62bc4baSyz147064 int opt; 350d62bc4baSyz147064 351d62bc4baSyz147064 progname = strrchr(argv[0], '/'); 352d62bc4baSyz147064 if (progname != NULL) 353d62bc4baSyz147064 progname++; 354d62bc4baSyz147064 else 355d62bc4baSyz147064 progname = argv[0]; 356d62bc4baSyz147064 357d62bc4baSyz147064 /* 358d62bc4baSyz147064 * Process options. 359d62bc4baSyz147064 */ 360d62bc4baSyz147064 while ((opt = getopt(argc, argv, "d")) != EOF) { 361d62bc4baSyz147064 switch (opt) { 362d62bc4baSyz147064 case 'd': 363d62bc4baSyz147064 debug = B_TRUE; 364d62bc4baSyz147064 break; 365d62bc4baSyz147064 default: 366d62bc4baSyz147064 usage(); 367d62bc4baSyz147064 } 368d62bc4baSyz147064 } 369d62bc4baSyz147064 370d62bc4baSyz147064 if (!debug && !dlmgmt_daemonize()) 371d62bc4baSyz147064 return (EXIT_FAILURE); 372d62bc4baSyz147064 373b9e076dcSyz147064 if ((errno = dlmgmt_init_privileges()) != 0) { 374b9e076dcSyz147064 dlmgmt_log(LOG_ERR, "dlmgmt_init_privileges() failed: %s", 375d62bc4baSyz147064 strerror(errno)); 376d62bc4baSyz147064 goto child_out; 377d62bc4baSyz147064 } 378d62bc4baSyz147064 379b9e076dcSyz147064 if (dlmgmt_init() != 0) { 380b9e076dcSyz147064 dlmgmt_fini_privileges(); 381d62bc4baSyz147064 goto child_out; 382b9e076dcSyz147064 } 383d62bc4baSyz147064 384d62bc4baSyz147064 /* 385d62bc4baSyz147064 * Inform the parent process that it can successfully exit. 386d62bc4baSyz147064 */ 387d62bc4baSyz147064 dlmgmt_inform_parent_exit(EXIT_SUCCESS); 388d62bc4baSyz147064 389d62bc4baSyz147064 for (;;) 390d62bc4baSyz147064 (void) pause(); 391d62bc4baSyz147064 392d62bc4baSyz147064 child_out: 393d62bc4baSyz147064 /* return from main() forcibly exits an MT process */ 394d62bc4baSyz147064 dlmgmt_inform_parent_exit(EXIT_FAILURE); 395d62bc4baSyz147064 return (EXIT_FAILURE); 396d62bc4baSyz147064 } 397