d62bc4badc1c1f1549c961cfb8b420e650e1272byz * CDDL HEADER START
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * The contents of this file are subject to the terms of the
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * Common Development and Distribution License (the "License").
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * You may not use this file except in compliance with the License.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * See the License for the specific language governing permissions
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * and limitations under the License.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * When distributing Covered Code, include this CDDL HEADER in each
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * If applicable, add the following below this CDDL HEADER, with the
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * fields enclosed by brackets "[]" replaced with your own identifying
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * information: Portions Copyright [yyyy] [name of copyright owner]
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * CDDL HEADER END
634e26ec75c89095090605284938356a3145f2b8Casper H.S. Dik * Copyright 2010 Sun Microsystems, Inc. All rights reserved.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * Use is subject to license terms.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * The dlmgmtd daemon is started by the datalink-management SMF service.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * This daemon is used to manage <link name, linkid> mapping and the
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * persistent datalink configuration.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * Today, the <link name, linkid> mapping and the persistent configuration
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * of datalinks is kept in /etc/dladm/datalink.conf, and the daemon keeps
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * a copy of the datalinks in the memory (see dlmgmt_id_avl and
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * dlmgmt_name_avl). The active <link name, linkid> mapping is kept in
b9e076dcc05b713d74073c0d692dfbb0f6f2c594yz * /etc/svc/volatile/dladm cache file, so that the mapping can be recovered
b9e076dcc05b713d74073c0d692dfbb0f6f2c594yz * when dlmgmtd exits for some reason (e.g., when dlmgmtd is accidentally
b9e076dcc05b713d74073c0d692dfbb0f6f2c594yz * killed).
4ac67f0276a8313b5cefec38af347b94b7bfb526Anurag S. Maskey * This file descriptor to DLMGMT_DOOR cannot be in the libdladm
4ac67f0276a8313b5cefec38af347b94b7bfb526Anurag S. Maskey * handle because the door isn't created when the handle is created.
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * This libdladm handle is global so that dlmgmt_upcall_linkprop_init() can
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * pass to libdladm. The handle is opened with "ALL" privileges, before
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * privileges are dropped in dlmgmt_drop_privileges(). It is not able to open
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * DLMGMT_DOOR at that time as it hasn't been created yet. This door in the
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * handle is opened in the first call to dladm_door_fd().
b9e076dcc05b713d74073c0d692dfbb0f6f2c594yzstatic void dlmgmtd_exit(int);
b9e076dcc05b713d74073c0d692dfbb0f6f2c594yzstatic int dlmgmt_init();
b9e076dcc05b713d74073c0d692dfbb0f6f2c594yzstatic void dlmgmt_fini();
4ac67f0276a8313b5cefec38af347b94b7bfb526Anurag S. Maskey if (ioctl(dladm_dld_fd(dld_handle), DLDIOC_DOORSERVER, &did) == -1)
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy if ((dlmgmt_door_fd = door_create(dlmgmt_handler, NULL,
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy dlmgmt_log(LOG_ERR, "door_create() failed: %s",
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy dlmgmt_log(LOG_WARNING, "door_revoke(%s) failed: %s",
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roydlmgmt_door_attach(zoneid_t zoneid, char *rootdir)
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy (void) snprintf(doorpath, sizeof (doorpath), "%s%s", rootdir,
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * Create the door file for dlmgmtd.
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy if ((fd = open(doorpath, O_CREAT|O_RDONLY, 0644)) == -1) {
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy dlmgmt_log(LOG_ERR, "open(%s) failed: %s", doorpath,
6ba597c56d749c61b4f783157f63196d7b2445f0Anurag S. Maskey if (chown(doorpath, UID_DLADM, GID_NETADM) == -1)
fd4e42c38ba5cb6fa799652cefce71cc10314862Sebastien Roy * fdetach first in case a previous daemon instance exited
fd4e42c38ba5cb6fa799652cefce71cc10314862Sebastien Roy * ungracefully.
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy dlmgmt_log(LOG_ERR, "fattach(%s) failed: %s", doorpath,
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy dlmgmt_log(LOG_ERR, "cannot set kernel doorfd: %s",
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * Create the /etc/svc/volatile/dladm/ directory if it doesn't exist, load the
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * datalink.conf data for this zone, and create/attach the door rendezvous
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy char rootdir[MAXPATHLEN], tmpfsdir[MAXPATHLEN];
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy } else if (zone_getattr(zoneid, ZONE_ATTR_ROOT, rootdir,
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy sizeof (rootdir)) < 0) {
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * Create the DLMGMT_TMPFS_DIR directory.
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy (void) snprintf(tmpfsdir, sizeof (tmpfsdir), "%s%s", rootdir,
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy } else if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
6ba597c56d749c61b4f783157f63196d7b2445f0Anurag S. Maskey (chown(tmpfsdir, UID_DLADM, GID_NETADM) < 0)) {
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * Initialize each running zone.
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy if ((zids = malloc(nzids * sizeof (zoneid_t))) == NULL)
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy for (i = 0; i < nzids; i++) {
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy if (dladm_open(&dld_handle) != DLADM_STATUS_OK) {
b9e076dcc05b713d74073c0d692dfbb0f6f2c594yz dlmgmt_log(LOG_ERR, "signal() for SIGTERM/INT failed: %s",
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * First derive the name of the cache file from the FMRI name. This
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * cache name is used to keep active datalink configuration.
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy (void) snprintf(cachefile, MAXPATHLEN, "%s/%s%s",
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy dlmgmt_log(LOG_ERR, "dlmgmtd is an smf(5) managed "
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy "service and should not be run from the command "
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * The FMRI name is in the form of
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * svc:/service/service:instance. We need to remove the
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * prefix "svc:/" and replace '/' with '-'. The cache file
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * name is in the form of "service:instance.cache".
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy (void) snprintf(filename, MAXPATHLEN, "%s.cache", c);
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy (void) snprintf(cachefile, MAXPATHLEN, "%s/%s",
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * Load datalink configuration and create dlmgmtd door files for all
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * currently running zones.
d62bc4badc1c1f1549c961cfb8b420e650e1272byzstatic void
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * This is called by the child process to inform the parent process to
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * exit with the given return value.
d62bc4badc1c1f1549c961cfb8b420e650e1272byzstatic void
d62bc4badc1c1f1549c961cfb8b420e650e1272byz "dlmgmt_inform_parent_exit() failed: %s", strerror(errno));
d62bc4badc1c1f1549c961cfb8b420e650e1272byz/*ARGSUSED*/
d62bc4badc1c1f1549c961cfb8b420e650e1272byzstatic void
d62bc4badc1c1f1549c961cfb8b420e650e1272byzstatic void
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * Restrict privileges to only those needed.
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * The global zone needs PRIV_PROC_FORK so that it can fork() when it
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * issues db ops in non-global zones, PRIV_SYS_CONFIG to post
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * sysevents, and PRIV_SYS_DL_CONFIG to initialize link properties in
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * dlmgmt_upcall_linkprop_init().
634e26ec75c89095090605284938356a3145f2b8Casper H.S. Dik * We remove non-basic privileges from the permitted (and thus
634e26ec75c89095090605284938356a3145f2b8Casper H.S. Dik * effective) set. When executing in a non-global zone, dlmgmtd
634e26ec75c89095090605284938356a3145f2b8Casper H.S. Dik * only needs to read and write to files that it already owns.
634e26ec75c89095090605284938356a3145f2b8Casper H.S. Dik (void) priv_delset(pset, PRIV_PROC_SESSION);
634e26ec75c89095090605284938356a3145f2b8Casper H.S. Dik (void) priv_delset(pset, PRIV_FILE_LINK_ANY);
634e26ec75c89095090605284938356a3145f2b8Casper H.S. Dik if (priv_addset(pset, PRIV_SYS_CONFIG) == -1 ||
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy if (err == 0 && setppriv(PRIV_SET, ptype, pset) == -1)
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy if ((privset = priv_str_to_set("zone", ",", NULL)) == NULL)
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy if (setppriv(PRIV_SET, PRIV_EFFECTIVE, privset) == -1)
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * Set the uid of this daemon to the "dladm" user and drop privileges to only
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy * those needed.
6ba597c56d749c61b4f783157f63196d7b2445f0Anurag S. Maskey if (setegid(GID_NETADM) == -1 || seteuid(UID_DLADM) == -1)
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * Keep the pfds fd open, close other fds.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz/*ARGSUSED*/
d62bc4badc1c1f1549c961cfb8b420e650e1272byz return (0);
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * Read the child process's return value from the pfds.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * If the child process exits unexpected, read() returns -1.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz /* Child */
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * Close all files except pfds[1].
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * Process options.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz switch (opt) {
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy dlmgmt_log(LOG_ERR, "unable to initialize daemon: %s",
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy } else if ((err = dlmgmt_set_privileges()) != 0) {
2b24ab6b3865caeede9eeb9db6b83e1d89dcd1eaSebastien Roy dlmgmt_log(LOG_ERR, "unable to set daemon privileges: %s",
d62bc4badc1c1f1549c961cfb8b420e650e1272byz * Inform the parent process that it can successfully exit.
d62bc4badc1c1f1549c961cfb8b420e650e1272byz /* return from main() forcibly exits an MT process */