xref: /illumos-gate/usr/src/cmd/dlmgmtd/dlmgmt_main.c (revision 82a2fc47)
1d62bc4baSyz /*
2d62bc4baSyz  * CDDL HEADER START
3d62bc4baSyz  *
4d62bc4baSyz  * The contents of this file are subject to the terms of the
5d62bc4baSyz  * Common Development and Distribution License (the "License").
6d62bc4baSyz  * You may not use this file except in compliance with the License.
7d62bc4baSyz  *
8d62bc4baSyz  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9d62bc4baSyz  * or http://www.opensolaris.org/os/licensing.
10d62bc4baSyz  * See the License for the specific language governing permissions
11d62bc4baSyz  * and limitations under the License.
12d62bc4baSyz  *
13d62bc4baSyz  * When distributing Covered Code, include this CDDL HEADER in each
14d62bc4baSyz  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15d62bc4baSyz  * If applicable, add the following below this CDDL HEADER, with the
16d62bc4baSyz  * fields enclosed by brackets "[]" replaced with your own identifying
17d62bc4baSyz  * information: Portions Copyright [yyyy] [name of copyright owner]
18d62bc4baSyz  *
19d62bc4baSyz  * CDDL HEADER END
20d62bc4baSyz  */
21d62bc4baSyz 
22d62bc4baSyz /*
23fd4e42c3SSebastien Roy  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
24d62bc4baSyz  * Use is subject to license terms.
25d62bc4baSyz  */
26d62bc4baSyz 
27d62bc4baSyz /*
28d62bc4baSyz  * The dlmgmtd daemon is started by the datalink-management SMF service.
29d62bc4baSyz  * This daemon is used to manage <link name, linkid> mapping and the
30d62bc4baSyz  * persistent datalink configuration.
31d62bc4baSyz  *
32d62bc4baSyz  * Today, the <link name, linkid> mapping and the persistent configuration
33d62bc4baSyz  * of datalinks is kept in /etc/dladm/datalink.conf, and the daemon keeps
34d62bc4baSyz  * a copy of the datalinks in the memory (see dlmgmt_id_avl and
35d62bc4baSyz  * dlmgmt_name_avl). The active <link name, linkid> mapping is kept in
36b9e076dcSyz  * /etc/svc/volatile/dladm cache file, so that the mapping can be recovered
37b9e076dcSyz  * when dlmgmtd exits for some reason (e.g., when dlmgmtd is accidentally
38b9e076dcSyz  * killed).
39d62bc4baSyz  */
40d62bc4baSyz 
41d62bc4baSyz #include <assert.h>
42d62bc4baSyz #include <errno.h>
43d62bc4baSyz #include <fcntl.h>
44b9e076dcSyz #include <priv_utils.h>
45d62bc4baSyz #include <signal.h>
46d62bc4baSyz #include <stdlib.h>
47d62bc4baSyz #include <stdio.h>
48d62bc4baSyz #include <strings.h>
49d62bc4baSyz #include <syslog.h>
50d62bc4baSyz #include <sys/dld.h>
51*82a2fc47SJames Carlson #include <sys/dld_ioc.h>
52b9e076dcSyz #include <sys/param.h>
53b9e076dcSyz #include <sys/stat.h>
54d62bc4baSyz #include <unistd.h>
554ac67f02SAnurag S. Maskey #include <libdladm_impl.h>
56d62bc4baSyz #include <libdlmgmt.h>
57d62bc4baSyz #include "dlmgmt_impl.h"
58d62bc4baSyz 
59d62bc4baSyz const char		*progname;
60d62bc4baSyz boolean_t		debug;
61d62bc4baSyz static int		pfds[2];
624ac67f02SAnurag S. Maskey /*
634ac67f02SAnurag S. Maskey  * This file descriptor to DLMGMT_DOOR cannot be in the libdladm
644ac67f02SAnurag S. Maskey  * handle because the door isn't created when the handle is created.
654ac67f02SAnurag S. Maskey  */
66d62bc4baSyz static int		dlmgmt_door_fd = -1;
674ac67f02SAnurag S. Maskey 
684ac67f02SAnurag S. Maskey /*
694ac67f02SAnurag S. Maskey  * This libdladm handle is global so that dlmgmt_upcall_linkprop_init()
704ac67f02SAnurag S. Maskey  * can pass to libdladm.  The handle is opened during dlmgmt_init_privileges()
714ac67f02SAnurag S. Maskey  * with "ALL" privileges.  It is not able to open DLMGMT_DOOR at that time as
724ac67f02SAnurag S. Maskey  * it hasn't been created yet.  This door in the handle is opened in the first
734ac67f02SAnurag S. Maskey  * call to dladm_door_fd().
744ac67f02SAnurag S. Maskey  */
754ac67f02SAnurag S. Maskey dladm_handle_t		dld_handle = NULL;
76b9e076dcSyz 
77b9e076dcSyz static void		dlmgmtd_exit(int);
78b9e076dcSyz static int		dlmgmt_init();
79b9e076dcSyz static void		dlmgmt_fini();
80b9e076dcSyz static int		dlmgmt_init_privileges();
81b9e076dcSyz static void		dlmgmt_fini_privileges();
82d62bc4baSyz 
83d62bc4baSyz static int
84d62bc4baSyz dlmgmt_set_doorfd(boolean_t start)
85d62bc4baSyz {
86d62bc4baSyz 	dld_ioc_door_t did;
87d62bc4baSyz 	int err = 0;
88d62bc4baSyz 
894ac67f02SAnurag S. Maskey 	assert(dld_handle != NULL);
90d62bc4baSyz 
91d62bc4baSyz 	did.did_start_door = start;
92d62bc4baSyz 
934ac67f02SAnurag S. Maskey 	if (ioctl(dladm_dld_fd(dld_handle), DLDIOC_DOORSERVER, &did) == -1)
94d62bc4baSyz 		err = errno;
95d62bc4baSyz 
96d62bc4baSyz 	return (err);
97d62bc4baSyz }
98d62bc4baSyz 
99d62bc4baSyz static int
100d62bc4baSyz dlmgmt_door_init()
101d62bc4baSyz {
102b9e076dcSyz 	int fd;
103d62bc4baSyz 	int err;
104d62bc4baSyz 
105b9e076dcSyz 	/*
106b9e076dcSyz 	 * Create the door file for dlmgmtd.
107b9e076dcSyz 	 */
108b9e076dcSyz 	if ((fd = open(DLMGMT_DOOR, O_CREAT|O_RDONLY, 0644)) == -1) {
109b9e076dcSyz 		err = errno;
110b9e076dcSyz 		dlmgmt_log(LOG_ERR, "open(%s) failed: %s",
111b9e076dcSyz 		    DLMGMT_DOOR, strerror(err));
112b9e076dcSyz 		return (err);
113b9e076dcSyz 	}
114b9e076dcSyz 	(void) close(fd);
115b9e076dcSyz 
116d62bc4baSyz 	if ((dlmgmt_door_fd = door_create(dlmgmt_handler, NULL,
117d62bc4baSyz 	    DOOR_REFUSE_DESC | DOOR_NO_CANCEL)) == -1) {
118d62bc4baSyz 		err = errno;
119b9e076dcSyz 		dlmgmt_log(LOG_ERR, "door_create() failed: %s",
120d62bc4baSyz 		    strerror(err));
121d62bc4baSyz 		return (err);
122d62bc4baSyz 	}
123fd4e42c3SSebastien Roy 	/*
124fd4e42c3SSebastien Roy 	 * fdetach first in case a previous daemon instance exited
125fd4e42c3SSebastien Roy 	 * ungracefully.
126fd4e42c3SSebastien Roy 	 */
127fd4e42c3SSebastien Roy 	(void) fdetach(DLMGMT_DOOR);
128d62bc4baSyz 	if (fattach(dlmgmt_door_fd, DLMGMT_DOOR) != 0) {
129d62bc4baSyz 		err = errno;
130b9e076dcSyz 		dlmgmt_log(LOG_ERR, "fattach(%s) failed: %s",
131d62bc4baSyz 		    DLMGMT_DOOR, strerror(err));
132d62bc4baSyz 		goto fail;
133d62bc4baSyz 	}
134d62bc4baSyz 	if ((err = dlmgmt_set_doorfd(B_TRUE)) != 0) {
135b9e076dcSyz 		dlmgmt_log(LOG_ERR, "cannot set kernel doorfd: %s",
136d62bc4baSyz 		    strerror(err));
137b9e076dcSyz 		(void) fdetach(DLMGMT_DOOR);
138d62bc4baSyz 		goto fail;
139d62bc4baSyz 	}
140d62bc4baSyz 
141d62bc4baSyz 	return (0);
142d62bc4baSyz fail:
143b9e076dcSyz 	(void) door_revoke(dlmgmt_door_fd);
144b9e076dcSyz 	dlmgmt_door_fd = -1;
145d62bc4baSyz 	return (err);
146d62bc4baSyz }
147d62bc4baSyz 
148d62bc4baSyz static void
149d62bc4baSyz dlmgmt_door_fini()
150d62bc4baSyz {
151b9e076dcSyz 	if (dlmgmt_door_fd == -1)
152b9e076dcSyz 		return;
153b9e076dcSyz 
154b9e076dcSyz 	if (door_revoke(dlmgmt_door_fd) == -1) {
155d62bc4baSyz 		dlmgmt_log(LOG_WARNING, "door_revoke(%s) failed: %s",
156b9e076dcSyz 		    DLMGMT_DOOR, strerror(errno));
157d62bc4baSyz 	}
158b9e076dcSyz 
159d62bc4baSyz 	(void) fdetach(DLMGMT_DOOR);
160b9e076dcSyz 	(void) dlmgmt_set_doorfd(B_FALSE);
161d62bc4baSyz }
162d62bc4baSyz 
163d62bc4baSyz static int
164d62bc4baSyz dlmgmt_init()
165d62bc4baSyz {
1664ac67f02SAnurag S. Maskey 	int err;
167b9e076dcSyz 
168b9e076dcSyz 	if (signal(SIGTERM, dlmgmtd_exit) == SIG_ERR ||
169b9e076dcSyz 	    signal(SIGINT, dlmgmtd_exit) == SIG_ERR) {
170b9e076dcSyz 		err = errno;
171b9e076dcSyz 		dlmgmt_log(LOG_ERR, "signal() for SIGTERM/INT failed: %s",
172b9e076dcSyz 		    strerror(err));
173b9e076dcSyz 		return (err);
174b9e076dcSyz 	}
175d62bc4baSyz 
176d62bc4baSyz 	if ((err = dlmgmt_linktable_init()) != 0)
177d62bc4baSyz 		return (err);
178d62bc4baSyz 
179d62bc4baSyz 	if ((err = dlmgmt_db_init()) != 0 || (err = dlmgmt_door_init()) != 0)
180d62bc4baSyz 		dlmgmt_linktable_fini();
181d62bc4baSyz 
182d62bc4baSyz 	return (err);
183d62bc4baSyz }
184d62bc4baSyz 
185d62bc4baSyz static void
186d62bc4baSyz dlmgmt_fini()
187d62bc4baSyz {
188d62bc4baSyz 	dlmgmt_door_fini();
189d62bc4baSyz 	dlmgmt_linktable_fini();
190d62bc4baSyz }
191d62bc4baSyz 
192d62bc4baSyz /*
193d62bc4baSyz  * This is called by the child process to inform the parent process to
194d62bc4baSyz  * exit with the given return value.
195d62bc4baSyz  */
196d62bc4baSyz static void
197d62bc4baSyz dlmgmt_inform_parent_exit(int rv)
198d62bc4baSyz {
199d62bc4baSyz 	if (debug)
200d62bc4baSyz 		return;
201d62bc4baSyz 
202d62bc4baSyz 	if (write(pfds[1], &rv, sizeof (int)) != sizeof (int)) {
203d62bc4baSyz 		dlmgmt_log(LOG_WARNING,
204d62bc4baSyz 		    "dlmgmt_inform_parent_exit() failed: %s", strerror(errno));
205d62bc4baSyz 		(void) close(pfds[1]);
206d62bc4baSyz 		exit(EXIT_FAILURE);
207d62bc4baSyz 	}
208d62bc4baSyz 	(void) close(pfds[1]);
209d62bc4baSyz }
210d62bc4baSyz 
211d62bc4baSyz /*ARGSUSED*/
212d62bc4baSyz static void
213d62bc4baSyz dlmgmtd_exit(int signo)
214d62bc4baSyz {
215d62bc4baSyz 	(void) close(pfds[1]);
216d62bc4baSyz 	dlmgmt_fini();
217b9e076dcSyz 	dlmgmt_fini_privileges();
218d62bc4baSyz 	exit(EXIT_FAILURE);
219d62bc4baSyz }
220d62bc4baSyz 
221d62bc4baSyz static void
222d62bc4baSyz usage(void)
223d62bc4baSyz {
224d62bc4baSyz 	(void) fprintf(stderr, "Usage: %s [-d]\n", progname);
225d62bc4baSyz 	exit(EXIT_FAILURE);
226d62bc4baSyz }
227d62bc4baSyz 
228b9e076dcSyz /*
229b9e076dcSyz  * Set the uid of this daemon to the "dladm" user. Finish the following
230b9e076dcSyz  * operations before setuid() because they need root privileges:
231b9e076dcSyz  *
232b9e076dcSyz  *    - create the /etc/svc/volatile/dladm directory;
233b9e076dcSyz  *    - change its uid/gid to "dladm"/"sys";
234b9e076dcSyz  *    - open the dld control node
235b9e076dcSyz  */
236d62bc4baSyz static int
237b9e076dcSyz dlmgmt_init_privileges()
238d62bc4baSyz {
239b9e076dcSyz 	struct stat	statbuf;
240d62bc4baSyz 
241b9e076dcSyz 	/*
242b9e076dcSyz 	 * Create the DLMGMT_TMPFS_DIR directory.
243b9e076dcSyz 	 */
244b9e076dcSyz 	if (stat(DLMGMT_TMPFS_DIR, &statbuf) < 0) {
245b9e076dcSyz 		if (mkdir(DLMGMT_TMPFS_DIR, (mode_t)0755) < 0)
246b9e076dcSyz 			return (errno);
247b9e076dcSyz 	} else {
248b9e076dcSyz 		if ((statbuf.st_mode & S_IFMT) != S_IFDIR)
249b9e076dcSyz 			return (ENOTDIR);
250d62bc4baSyz 	}
251d62bc4baSyz 
252b9e076dcSyz 	if ((chmod(DLMGMT_TMPFS_DIR, 0755) < 0) ||
253b9e076dcSyz 	    (chown(DLMGMT_TMPFS_DIR, UID_DLADM, GID_SYS) < 0)) {
254b9e076dcSyz 		return (EPERM);
255d62bc4baSyz 	}
256d62bc4baSyz 
257b9e076dcSyz 	/*
258b9e076dcSyz 	 * When dlmgmtd is started at boot, "ALL" privilege is required
2594ac67f02SAnurag S. Maskey 	 * to open the dld control node.  The door isn't created yet.
260b9e076dcSyz 	 */
2614ac67f02SAnurag S. Maskey 	if (dladm_open(&dld_handle) != DLADM_STATUS_OK) {
2624ac67f02SAnurag S. Maskey 		dlmgmt_log(LOG_ERR, "dladm_open() failed");
2634ac67f02SAnurag S. Maskey 		return (EPERM);
2644ac67f02SAnurag S. Maskey 	}
265b9e076dcSyz 
2660dc974a9SCathy Zhou 	/*
267eae72b5bSSebastien Roy 	 * We need PRIV_SYS_DL_CONFIG for the DLDIOC_DOORSERVER ioctl,
268eae72b5bSSebastien Roy 	 * and PRIV_SYS_CONFIG to post sysevents.
2690dc974a9SCathy Zhou 	 */
270b9e076dcSyz 	if (__init_daemon_priv(PU_RESETGROUPS|PU_CLEARLIMITSET, UID_DLADM,
271eae72b5bSSebastien Roy 	    GID_SYS, PRIV_SYS_DL_CONFIG, PRIV_SYS_CONFIG, NULL) == -1) {
2724ac67f02SAnurag S. Maskey 		dladm_close(dld_handle);
2734ac67f02SAnurag S. Maskey 		dld_handle = NULL;
274b9e076dcSyz 		return (EPERM);
275d62bc4baSyz 	}
276d62bc4baSyz 
2774ac67f02SAnurag S. Maskey 
278d62bc4baSyz 	return (0);
279d62bc4baSyz }
280d62bc4baSyz 
281b9e076dcSyz static void
282b9e076dcSyz dlmgmt_fini_privileges()
283b9e076dcSyz {
2844ac67f02SAnurag S. Maskey 	if (dld_handle != NULL) {
2854ac67f02SAnurag S. Maskey 		dladm_close(dld_handle);
2864ac67f02SAnurag S. Maskey 		dld_handle = NULL;
287b9e076dcSyz 	}
288b9e076dcSyz }
289b9e076dcSyz 
290d62bc4baSyz /*
291d62bc4baSyz  * Keep the pfds fd open, close other fds.
292d62bc4baSyz  */
293d62bc4baSyz /*ARGSUSED*/
294d62bc4baSyz static int
295d62bc4baSyz closefunc(void *arg, int fd)
296d62bc4baSyz {
297d62bc4baSyz 	if (fd != pfds[1])
298d62bc4baSyz 		(void) close(fd);
299d62bc4baSyz 	return (0);
300d62bc4baSyz }
301d62bc4baSyz 
302d62bc4baSyz static boolean_t
303d62bc4baSyz dlmgmt_daemonize(void)
304d62bc4baSyz {
305d62bc4baSyz 	pid_t pid;
306d62bc4baSyz 	int rv;
307d62bc4baSyz 
308d62bc4baSyz 	if (pipe(pfds) < 0) {
309d62bc4baSyz 		(void) fprintf(stderr, "%s: pipe() failed: %s\n",
310d62bc4baSyz 		    progname, strerror(errno));
311d62bc4baSyz 		exit(EXIT_FAILURE);
312d62bc4baSyz 	}
313d62bc4baSyz 
314d62bc4baSyz 	if ((pid = fork()) == -1) {
315d62bc4baSyz 		(void) fprintf(stderr, "%s: fork() failed: %s\n",
316d62bc4baSyz 		    progname, strerror(errno));
317d62bc4baSyz 		exit(EXIT_FAILURE);
318d62bc4baSyz 	} else if (pid > 0) { /* Parent */
319d62bc4baSyz 		(void) close(pfds[1]);
320d62bc4baSyz 
321d62bc4baSyz 		/*
322d62bc4baSyz 		 * Read the child process's return value from the pfds.
323d62bc4baSyz 		 * If the child process exits unexpected, read() returns -1.
324d62bc4baSyz 		 */
325d62bc4baSyz 		if (read(pfds[0], &rv, sizeof (int)) != sizeof (int)) {
326d62bc4baSyz 			(void) kill(pid, SIGKILL);
327d62bc4baSyz 			rv = EXIT_FAILURE;
328d62bc4baSyz 		}
329d62bc4baSyz 
330d62bc4baSyz 		(void) close(pfds[0]);
331d62bc4baSyz 		exit(rv);
332d62bc4baSyz 	}
333d62bc4baSyz 
334d62bc4baSyz 	/* Child */
335d62bc4baSyz 	(void) close(pfds[0]);
336d62bc4baSyz 	(void) setsid();
337d62bc4baSyz 
338d62bc4baSyz 	/*
339d62bc4baSyz 	 * Close all files except pfds[1].
340d62bc4baSyz 	 */
341d62bc4baSyz 	(void) fdwalk(closefunc, NULL);
342d62bc4baSyz 	(void) chdir("/");
343d62bc4baSyz 	openlog(progname, LOG_PID, LOG_DAEMON);
344d62bc4baSyz 	return (B_TRUE);
345d62bc4baSyz }
346d62bc4baSyz 
347d62bc4baSyz int
348d62bc4baSyz main(int argc, char *argv[])
349d62bc4baSyz {
350b9e076dcSyz 	int		opt;
351d62bc4baSyz 
352d62bc4baSyz 	progname = strrchr(argv[0], '/');
353d62bc4baSyz 	if (progname != NULL)
354d62bc4baSyz 		progname++;
355d62bc4baSyz 	else
356d62bc4baSyz 		progname = argv[0];
357d62bc4baSyz 
358d62bc4baSyz 	/*
359d62bc4baSyz 	 * Process options.
360d62bc4baSyz 	 */
361d62bc4baSyz 	while ((opt = getopt(argc, argv, "d")) != EOF) {
362d62bc4baSyz 		switch (opt) {
363d62bc4baSyz 		case 'd':
364d62bc4baSyz 			debug = B_TRUE;
365d62bc4baSyz 			break;
366d62bc4baSyz 		default:
367d62bc4baSyz 			usage();
368d62bc4baSyz 		}
369d62bc4baSyz 	}
370d62bc4baSyz 
371d62bc4baSyz 	if (!debug && !dlmgmt_daemonize())
372d62bc4baSyz 		return (EXIT_FAILURE);
373d62bc4baSyz 
374b9e076dcSyz 	if ((errno = dlmgmt_init_privileges()) != 0) {
375b9e076dcSyz 		dlmgmt_log(LOG_ERR, "dlmgmt_init_privileges() failed: %s",
376d62bc4baSyz 		    strerror(errno));
377d62bc4baSyz 		goto child_out;
378d62bc4baSyz 	}
379d62bc4baSyz 
380b9e076dcSyz 	if (dlmgmt_init() != 0) {
381b9e076dcSyz 		dlmgmt_fini_privileges();
382d62bc4baSyz 		goto child_out;
383b9e076dcSyz 	}
384d62bc4baSyz 
385d62bc4baSyz 	/*
386d62bc4baSyz 	 * Inform the parent process that it can successfully exit.
387d62bc4baSyz 	 */
388d62bc4baSyz 	dlmgmt_inform_parent_exit(EXIT_SUCCESS);
389d62bc4baSyz 
390d62bc4baSyz 	for (;;)
391d62bc4baSyz 		(void) pause();
392d62bc4baSyz 
393d62bc4baSyz child_out:
394d62bc4baSyz 	/* return from main() forcibly exits an MT process */
395d62bc4baSyz 	dlmgmt_inform_parent_exit(EXIT_FAILURE);
396d62bc4baSyz 	return (EXIT_FAILURE);
397d62bc4baSyz }
398