1d62bc4baSyz /* 2d62bc4baSyz * CDDL HEADER START 3d62bc4baSyz * 4d62bc4baSyz * The contents of this file are subject to the terms of the 5d62bc4baSyz * Common Development and Distribution License (the "License"). 6d62bc4baSyz * You may not use this file except in compliance with the License. 7d62bc4baSyz * 8d62bc4baSyz * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9d62bc4baSyz * or http://www.opensolaris.org/os/licensing. 10d62bc4baSyz * See the License for the specific language governing permissions 11d62bc4baSyz * and limitations under the License. 12d62bc4baSyz * 13d62bc4baSyz * When distributing Covered Code, include this CDDL HEADER in each 14d62bc4baSyz * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15d62bc4baSyz * If applicable, add the following below this CDDL HEADER, with the 16d62bc4baSyz * fields enclosed by brackets "[]" replaced with your own identifying 17d62bc4baSyz * information: Portions Copyright [yyyy] [name of copyright owner] 18d62bc4baSyz * 19d62bc4baSyz * CDDL HEADER END 20d62bc4baSyz */ 21d62bc4baSyz 22d62bc4baSyz /* 23fd4e42c3SSebastien Roy * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 24d62bc4baSyz * Use is subject to license terms. 25d62bc4baSyz */ 26d62bc4baSyz 27d62bc4baSyz /* 28d62bc4baSyz * The dlmgmtd daemon is started by the datalink-management SMF service. 29d62bc4baSyz * This daemon is used to manage <link name, linkid> mapping and the 30d62bc4baSyz * persistent datalink configuration. 31d62bc4baSyz * 32d62bc4baSyz * Today, the <link name, linkid> mapping and the persistent configuration 33d62bc4baSyz * of datalinks is kept in /etc/dladm/datalink.conf, and the daemon keeps 34d62bc4baSyz * a copy of the datalinks in the memory (see dlmgmt_id_avl and 35d62bc4baSyz * dlmgmt_name_avl). The active <link name, linkid> mapping is kept in 36b9e076dcSyz * /etc/svc/volatile/dladm cache file, so that the mapping can be recovered 37b9e076dcSyz * when dlmgmtd exits for some reason (e.g., when dlmgmtd is accidentally 38b9e076dcSyz * killed). 39d62bc4baSyz */ 40d62bc4baSyz 41d62bc4baSyz #include <assert.h> 42d62bc4baSyz #include <errno.h> 43d62bc4baSyz #include <fcntl.h> 44b9e076dcSyz #include <priv_utils.h> 45d62bc4baSyz #include <signal.h> 46d62bc4baSyz #include <stdlib.h> 47d62bc4baSyz #include <stdio.h> 48d62bc4baSyz #include <strings.h> 49d62bc4baSyz #include <syslog.h> 50d62bc4baSyz #include <sys/dld.h> 51*82a2fc47SJames Carlson #include <sys/dld_ioc.h> 52b9e076dcSyz #include <sys/param.h> 53b9e076dcSyz #include <sys/stat.h> 54d62bc4baSyz #include <unistd.h> 554ac67f02SAnurag S. Maskey #include <libdladm_impl.h> 56d62bc4baSyz #include <libdlmgmt.h> 57d62bc4baSyz #include "dlmgmt_impl.h" 58d62bc4baSyz 59d62bc4baSyz const char *progname; 60d62bc4baSyz boolean_t debug; 61d62bc4baSyz static int pfds[2]; 624ac67f02SAnurag S. Maskey /* 634ac67f02SAnurag S. Maskey * This file descriptor to DLMGMT_DOOR cannot be in the libdladm 644ac67f02SAnurag S. Maskey * handle because the door isn't created when the handle is created. 654ac67f02SAnurag S. Maskey */ 66d62bc4baSyz static int dlmgmt_door_fd = -1; 674ac67f02SAnurag S. Maskey 684ac67f02SAnurag S. Maskey /* 694ac67f02SAnurag S. Maskey * This libdladm handle is global so that dlmgmt_upcall_linkprop_init() 704ac67f02SAnurag S. Maskey * can pass to libdladm. The handle is opened during dlmgmt_init_privileges() 714ac67f02SAnurag S. Maskey * with "ALL" privileges. It is not able to open DLMGMT_DOOR at that time as 724ac67f02SAnurag S. Maskey * it hasn't been created yet. This door in the handle is opened in the first 734ac67f02SAnurag S. Maskey * call to dladm_door_fd(). 744ac67f02SAnurag S. Maskey */ 754ac67f02SAnurag S. Maskey dladm_handle_t dld_handle = NULL; 76b9e076dcSyz 77b9e076dcSyz static void dlmgmtd_exit(int); 78b9e076dcSyz static int dlmgmt_init(); 79b9e076dcSyz static void dlmgmt_fini(); 80b9e076dcSyz static int dlmgmt_init_privileges(); 81b9e076dcSyz static void dlmgmt_fini_privileges(); 82d62bc4baSyz 83d62bc4baSyz static int 84d62bc4baSyz dlmgmt_set_doorfd(boolean_t start) 85d62bc4baSyz { 86d62bc4baSyz dld_ioc_door_t did; 87d62bc4baSyz int err = 0; 88d62bc4baSyz 894ac67f02SAnurag S. Maskey assert(dld_handle != NULL); 90d62bc4baSyz 91d62bc4baSyz did.did_start_door = start; 92d62bc4baSyz 934ac67f02SAnurag S. Maskey if (ioctl(dladm_dld_fd(dld_handle), DLDIOC_DOORSERVER, &did) == -1) 94d62bc4baSyz err = errno; 95d62bc4baSyz 96d62bc4baSyz return (err); 97d62bc4baSyz } 98d62bc4baSyz 99d62bc4baSyz static int 100d62bc4baSyz dlmgmt_door_init() 101d62bc4baSyz { 102b9e076dcSyz int fd; 103d62bc4baSyz int err; 104d62bc4baSyz 105b9e076dcSyz /* 106b9e076dcSyz * Create the door file for dlmgmtd. 107b9e076dcSyz */ 108b9e076dcSyz if ((fd = open(DLMGMT_DOOR, O_CREAT|O_RDONLY, 0644)) == -1) { 109b9e076dcSyz err = errno; 110b9e076dcSyz dlmgmt_log(LOG_ERR, "open(%s) failed: %s", 111b9e076dcSyz DLMGMT_DOOR, strerror(err)); 112b9e076dcSyz return (err); 113b9e076dcSyz } 114b9e076dcSyz (void) close(fd); 115b9e076dcSyz 116d62bc4baSyz if ((dlmgmt_door_fd = door_create(dlmgmt_handler, NULL, 117d62bc4baSyz DOOR_REFUSE_DESC | DOOR_NO_CANCEL)) == -1) { 118d62bc4baSyz err = errno; 119b9e076dcSyz dlmgmt_log(LOG_ERR, "door_create() failed: %s", 120d62bc4baSyz strerror(err)); 121d62bc4baSyz return (err); 122d62bc4baSyz } 123fd4e42c3SSebastien Roy /* 124fd4e42c3SSebastien Roy * fdetach first in case a previous daemon instance exited 125fd4e42c3SSebastien Roy * ungracefully. 126fd4e42c3SSebastien Roy */ 127fd4e42c3SSebastien Roy (void) fdetach(DLMGMT_DOOR); 128d62bc4baSyz if (fattach(dlmgmt_door_fd, DLMGMT_DOOR) != 0) { 129d62bc4baSyz err = errno; 130b9e076dcSyz dlmgmt_log(LOG_ERR, "fattach(%s) failed: %s", 131d62bc4baSyz DLMGMT_DOOR, strerror(err)); 132d62bc4baSyz goto fail; 133d62bc4baSyz } 134d62bc4baSyz if ((err = dlmgmt_set_doorfd(B_TRUE)) != 0) { 135b9e076dcSyz dlmgmt_log(LOG_ERR, "cannot set kernel doorfd: %s", 136d62bc4baSyz strerror(err)); 137b9e076dcSyz (void) fdetach(DLMGMT_DOOR); 138d62bc4baSyz goto fail; 139d62bc4baSyz } 140d62bc4baSyz 141d62bc4baSyz return (0); 142d62bc4baSyz fail: 143b9e076dcSyz (void) door_revoke(dlmgmt_door_fd); 144b9e076dcSyz dlmgmt_door_fd = -1; 145d62bc4baSyz return (err); 146d62bc4baSyz } 147d62bc4baSyz 148d62bc4baSyz static void 149d62bc4baSyz dlmgmt_door_fini() 150d62bc4baSyz { 151b9e076dcSyz if (dlmgmt_door_fd == -1) 152b9e076dcSyz return; 153b9e076dcSyz 154b9e076dcSyz if (door_revoke(dlmgmt_door_fd) == -1) { 155d62bc4baSyz dlmgmt_log(LOG_WARNING, "door_revoke(%s) failed: %s", 156b9e076dcSyz DLMGMT_DOOR, strerror(errno)); 157d62bc4baSyz } 158b9e076dcSyz 159d62bc4baSyz (void) fdetach(DLMGMT_DOOR); 160b9e076dcSyz (void) dlmgmt_set_doorfd(B_FALSE); 161d62bc4baSyz } 162d62bc4baSyz 163d62bc4baSyz static int 164d62bc4baSyz dlmgmt_init() 165d62bc4baSyz { 1664ac67f02SAnurag S. Maskey int err; 167b9e076dcSyz 168b9e076dcSyz if (signal(SIGTERM, dlmgmtd_exit) == SIG_ERR || 169b9e076dcSyz signal(SIGINT, dlmgmtd_exit) == SIG_ERR) { 170b9e076dcSyz err = errno; 171b9e076dcSyz dlmgmt_log(LOG_ERR, "signal() for SIGTERM/INT failed: %s", 172b9e076dcSyz strerror(err)); 173b9e076dcSyz return (err); 174b9e076dcSyz } 175d62bc4baSyz 176d62bc4baSyz if ((err = dlmgmt_linktable_init()) != 0) 177d62bc4baSyz return (err); 178d62bc4baSyz 179d62bc4baSyz if ((err = dlmgmt_db_init()) != 0 || (err = dlmgmt_door_init()) != 0) 180d62bc4baSyz dlmgmt_linktable_fini(); 181d62bc4baSyz 182d62bc4baSyz return (err); 183d62bc4baSyz } 184d62bc4baSyz 185d62bc4baSyz static void 186d62bc4baSyz dlmgmt_fini() 187d62bc4baSyz { 188d62bc4baSyz dlmgmt_door_fini(); 189d62bc4baSyz dlmgmt_linktable_fini(); 190d62bc4baSyz } 191d62bc4baSyz 192d62bc4baSyz /* 193d62bc4baSyz * This is called by the child process to inform the parent process to 194d62bc4baSyz * exit with the given return value. 195d62bc4baSyz */ 196d62bc4baSyz static void 197d62bc4baSyz dlmgmt_inform_parent_exit(int rv) 198d62bc4baSyz { 199d62bc4baSyz if (debug) 200d62bc4baSyz return; 201d62bc4baSyz 202d62bc4baSyz if (write(pfds[1], &rv, sizeof (int)) != sizeof (int)) { 203d62bc4baSyz dlmgmt_log(LOG_WARNING, 204d62bc4baSyz "dlmgmt_inform_parent_exit() failed: %s", strerror(errno)); 205d62bc4baSyz (void) close(pfds[1]); 206d62bc4baSyz exit(EXIT_FAILURE); 207d62bc4baSyz } 208d62bc4baSyz (void) close(pfds[1]); 209d62bc4baSyz } 210d62bc4baSyz 211d62bc4baSyz /*ARGSUSED*/ 212d62bc4baSyz static void 213d62bc4baSyz dlmgmtd_exit(int signo) 214d62bc4baSyz { 215d62bc4baSyz (void) close(pfds[1]); 216d62bc4baSyz dlmgmt_fini(); 217b9e076dcSyz dlmgmt_fini_privileges(); 218d62bc4baSyz exit(EXIT_FAILURE); 219d62bc4baSyz } 220d62bc4baSyz 221d62bc4baSyz static void 222d62bc4baSyz usage(void) 223d62bc4baSyz { 224d62bc4baSyz (void) fprintf(stderr, "Usage: %s [-d]\n", progname); 225d62bc4baSyz exit(EXIT_FAILURE); 226d62bc4baSyz } 227d62bc4baSyz 228b9e076dcSyz /* 229b9e076dcSyz * Set the uid of this daemon to the "dladm" user. Finish the following 230b9e076dcSyz * operations before setuid() because they need root privileges: 231b9e076dcSyz * 232b9e076dcSyz * - create the /etc/svc/volatile/dladm directory; 233b9e076dcSyz * - change its uid/gid to "dladm"/"sys"; 234b9e076dcSyz * - open the dld control node 235b9e076dcSyz */ 236d62bc4baSyz static int 237b9e076dcSyz dlmgmt_init_privileges() 238d62bc4baSyz { 239b9e076dcSyz struct stat statbuf; 240d62bc4baSyz 241b9e076dcSyz /* 242b9e076dcSyz * Create the DLMGMT_TMPFS_DIR directory. 243b9e076dcSyz */ 244b9e076dcSyz if (stat(DLMGMT_TMPFS_DIR, &statbuf) < 0) { 245b9e076dcSyz if (mkdir(DLMGMT_TMPFS_DIR, (mode_t)0755) < 0) 246b9e076dcSyz return (errno); 247b9e076dcSyz } else { 248b9e076dcSyz if ((statbuf.st_mode & S_IFMT) != S_IFDIR) 249b9e076dcSyz return (ENOTDIR); 250d62bc4baSyz } 251d62bc4baSyz 252b9e076dcSyz if ((chmod(DLMGMT_TMPFS_DIR, 0755) < 0) || 253b9e076dcSyz (chown(DLMGMT_TMPFS_DIR, UID_DLADM, GID_SYS) < 0)) { 254b9e076dcSyz return (EPERM); 255d62bc4baSyz } 256d62bc4baSyz 257b9e076dcSyz /* 258b9e076dcSyz * When dlmgmtd is started at boot, "ALL" privilege is required 2594ac67f02SAnurag S. Maskey * to open the dld control node. The door isn't created yet. 260b9e076dcSyz */ 2614ac67f02SAnurag S. Maskey if (dladm_open(&dld_handle) != DLADM_STATUS_OK) { 2624ac67f02SAnurag S. Maskey dlmgmt_log(LOG_ERR, "dladm_open() failed"); 2634ac67f02SAnurag S. Maskey return (EPERM); 2644ac67f02SAnurag S. Maskey } 265b9e076dcSyz 2660dc974a9SCathy Zhou /* 267eae72b5bSSebastien Roy * We need PRIV_SYS_DL_CONFIG for the DLDIOC_DOORSERVER ioctl, 268eae72b5bSSebastien Roy * and PRIV_SYS_CONFIG to post sysevents. 2690dc974a9SCathy Zhou */ 270b9e076dcSyz if (__init_daemon_priv(PU_RESETGROUPS|PU_CLEARLIMITSET, UID_DLADM, 271eae72b5bSSebastien Roy GID_SYS, PRIV_SYS_DL_CONFIG, PRIV_SYS_CONFIG, NULL) == -1) { 2724ac67f02SAnurag S. Maskey dladm_close(dld_handle); 2734ac67f02SAnurag S. Maskey dld_handle = NULL; 274b9e076dcSyz return (EPERM); 275d62bc4baSyz } 276d62bc4baSyz 2774ac67f02SAnurag S. Maskey 278d62bc4baSyz return (0); 279d62bc4baSyz } 280d62bc4baSyz 281b9e076dcSyz static void 282b9e076dcSyz dlmgmt_fini_privileges() 283b9e076dcSyz { 2844ac67f02SAnurag S. Maskey if (dld_handle != NULL) { 2854ac67f02SAnurag S. Maskey dladm_close(dld_handle); 2864ac67f02SAnurag S. Maskey dld_handle = NULL; 287b9e076dcSyz } 288b9e076dcSyz } 289b9e076dcSyz 290d62bc4baSyz /* 291d62bc4baSyz * Keep the pfds fd open, close other fds. 292d62bc4baSyz */ 293d62bc4baSyz /*ARGSUSED*/ 294d62bc4baSyz static int 295d62bc4baSyz closefunc(void *arg, int fd) 296d62bc4baSyz { 297d62bc4baSyz if (fd != pfds[1]) 298d62bc4baSyz (void) close(fd); 299d62bc4baSyz return (0); 300d62bc4baSyz } 301d62bc4baSyz 302d62bc4baSyz static boolean_t 303d62bc4baSyz dlmgmt_daemonize(void) 304d62bc4baSyz { 305d62bc4baSyz pid_t pid; 306d62bc4baSyz int rv; 307d62bc4baSyz 308d62bc4baSyz if (pipe(pfds) < 0) { 309d62bc4baSyz (void) fprintf(stderr, "%s: pipe() failed: %s\n", 310d62bc4baSyz progname, strerror(errno)); 311d62bc4baSyz exit(EXIT_FAILURE); 312d62bc4baSyz } 313d62bc4baSyz 314d62bc4baSyz if ((pid = fork()) == -1) { 315d62bc4baSyz (void) fprintf(stderr, "%s: fork() failed: %s\n", 316d62bc4baSyz progname, strerror(errno)); 317d62bc4baSyz exit(EXIT_FAILURE); 318d62bc4baSyz } else if (pid > 0) { /* Parent */ 319d62bc4baSyz (void) close(pfds[1]); 320d62bc4baSyz 321d62bc4baSyz /* 322d62bc4baSyz * Read the child process's return value from the pfds. 323d62bc4baSyz * If the child process exits unexpected, read() returns -1. 324d62bc4baSyz */ 325d62bc4baSyz if (read(pfds[0], &rv, sizeof (int)) != sizeof (int)) { 326d62bc4baSyz (void) kill(pid, SIGKILL); 327d62bc4baSyz rv = EXIT_FAILURE; 328d62bc4baSyz } 329d62bc4baSyz 330d62bc4baSyz (void) close(pfds[0]); 331d62bc4baSyz exit(rv); 332d62bc4baSyz } 333d62bc4baSyz 334d62bc4baSyz /* Child */ 335d62bc4baSyz (void) close(pfds[0]); 336d62bc4baSyz (void) setsid(); 337d62bc4baSyz 338d62bc4baSyz /* 339d62bc4baSyz * Close all files except pfds[1]. 340d62bc4baSyz */ 341d62bc4baSyz (void) fdwalk(closefunc, NULL); 342d62bc4baSyz (void) chdir("/"); 343d62bc4baSyz openlog(progname, LOG_PID, LOG_DAEMON); 344d62bc4baSyz return (B_TRUE); 345d62bc4baSyz } 346d62bc4baSyz 347d62bc4baSyz int 348d62bc4baSyz main(int argc, char *argv[]) 349d62bc4baSyz { 350b9e076dcSyz int opt; 351d62bc4baSyz 352d62bc4baSyz progname = strrchr(argv[0], '/'); 353d62bc4baSyz if (progname != NULL) 354d62bc4baSyz progname++; 355d62bc4baSyz else 356d62bc4baSyz progname = argv[0]; 357d62bc4baSyz 358d62bc4baSyz /* 359d62bc4baSyz * Process options. 360d62bc4baSyz */ 361d62bc4baSyz while ((opt = getopt(argc, argv, "d")) != EOF) { 362d62bc4baSyz switch (opt) { 363d62bc4baSyz case 'd': 364d62bc4baSyz debug = B_TRUE; 365d62bc4baSyz break; 366d62bc4baSyz default: 367d62bc4baSyz usage(); 368d62bc4baSyz } 369d62bc4baSyz } 370d62bc4baSyz 371d62bc4baSyz if (!debug && !dlmgmt_daemonize()) 372d62bc4baSyz return (EXIT_FAILURE); 373d62bc4baSyz 374b9e076dcSyz if ((errno = dlmgmt_init_privileges()) != 0) { 375b9e076dcSyz dlmgmt_log(LOG_ERR, "dlmgmt_init_privileges() failed: %s", 376d62bc4baSyz strerror(errno)); 377d62bc4baSyz goto child_out; 378d62bc4baSyz } 379d62bc4baSyz 380b9e076dcSyz if (dlmgmt_init() != 0) { 381b9e076dcSyz dlmgmt_fini_privileges(); 382d62bc4baSyz goto child_out; 383b9e076dcSyz } 384d62bc4baSyz 385d62bc4baSyz /* 386d62bc4baSyz * Inform the parent process that it can successfully exit. 387d62bc4baSyz */ 388d62bc4baSyz dlmgmt_inform_parent_exit(EXIT_SUCCESS); 389d62bc4baSyz 390d62bc4baSyz for (;;) 391d62bc4baSyz (void) pause(); 392d62bc4baSyz 393d62bc4baSyz child_out: 394d62bc4baSyz /* return from main() forcibly exits an MT process */ 395d62bc4baSyz dlmgmt_inform_parent_exit(EXIT_FAILURE); 396d62bc4baSyz return (EXIT_FAILURE); 397d62bc4baSyz } 398