4 Copyright (c) 2000 The Regents of the University of Michigan.
7 Copyright (c) 2000 Dug Song <dugsong@UMICH.EDU>.
8 Copyright (c) 2002 Andy Adamson <andros@UMICH.EDU>.
9 Copyright (c) 2002 Marius Aamodt Eriksen <marius@UMICH.EDU>.
10 All rights reserved, all wrongs reversed.
12 Copyright (c) 2014, Intel Corporation.
14 Redistribution and use in source and binary forms, with or without
15 modification, are permitted provided that the following conditions
18 1. Redistributions of source code must retain the above copyright
19 notice, this list of conditions and the following disclaimer.
20 2. Redistributions in binary form must reproduce the above copyright
21 notice, this list of conditions and the following disclaimer in the
22 documentation and/or other materials provided with the distribution.
23 3. Neither the name of the University nor the names of its
24 contributors may be used to endorse or promote products derived
25 from this software without specific prior written permission.
27 THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
28 WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
29 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
30 DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
31 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
32 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
33 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
34 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
35 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
36 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
37 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
43 #include <sys/types.h>
44 #include <sys/param.h>
45 #include <sys/socket.h>
60 #include "krb5_util.h"
63 char pipefs_dir[PATH_MAX] = GSSD_PIPEFS_DIR;
64 char pipefs_nfsdir[PATH_MAX] = GSSD_PIPEFS_DIR;
65 char keytabfile[PATH_MAX] = GSSD_DEFAULT_KEYTAB_FILE;
66 char ccachedir[PATH_MAX] = GSSD_DEFAULT_CRED_DIR;
68 int lgssd_mutex_downcall = -1;
70 static int lgssd_create_mutex(int *semid)
75 id = semget(IPC_PRIVATE, 1, IPC_CREAT);
77 printerr(0, "semget: %s\n", strerror(errno));
82 if (semctl(id, 0, SETVAL, arg) != 0) {
83 printerr(0, "semctl: %s\n", strerror(errno));
84 semctl(id, 1, IPC_RMID, arg);
92 void lgssd_init_mutexs(void)
94 if (lgssd_create_mutex(&lgssd_mutex_downcall)) {
95 printerr(0, "can't create downcall mutex\n");
100 void lgssd_fini_mutexs(void)
104 if (lgssd_mutex_downcall != -1)
105 semctl(lgssd_mutex_downcall, 1, IPC_RMID, arg);
108 void lgssd_mutex_get(int semid)
110 struct sembuf op[1] = { {0, -1, SEM_UNDO} };
113 rc = semop(semid, op, 1);
115 printerr(0, "exit on mutex_get err %d: %s\n",
116 rc, strerror(errno));
121 void lgssd_mutex_put(int semid)
123 struct sembuf op[1] = { {0, 1, 0} };
126 rc = semop(semid, op, 1);
128 printerr(0, "ignore mutex_put err %d: %s\n",
129 rc, strerror(errno));
133 static void lgssd_cleanup(void)
137 /* make sure all children finished */
139 child_pid = waitpid(-1, NULL, 0);
143 printerr(3, "cleanup: child %d terminated\n", child_pid);
148 /* destroy krb5 machine creds */
149 gssd_destroy_krb5_machine_creds();
155 printerr(1, "exiting on signal %d\n", signal);
163 /* don't exit on SIGHUP */
164 printerr(1, "Received SIGHUP... Ignoring.\n");
169 usage(char *progname)
171 fprintf(stderr, "usage: %s [-f] [-v] [-p pipefsdir] [-k keytab] [-d ccachedir]\n",
177 main(int argc, char *argv[])
185 while ((opt = getopt(argc, argv, "fvrmMp:k:d:")) != -1) {
197 strlcpy(pipefs_dir, optarg, sizeof(pipefs_dir));
198 if (pipefs_dir[sizeof(pipefs_dir)-1] != '\0')
199 errx(1, "pipefs path name too long");
202 strlcpy(keytabfile, optarg, sizeof(keytabfile));
203 if (keytabfile[sizeof(keytabfile)-1] != '\0')
204 errx(1, "keytab path name too long");
207 strlcpy(ccachedir, optarg, sizeof(ccachedir));
208 if (ccachedir[sizeof(ccachedir)-1] != '\0')
209 errx(1, "ccachedir path name too long");
217 if ((progname = strrchr(argv[0], '/')))
222 initerr(progname, verbosity, fg);
224 if (gssd_check_mechs() != 0)
225 errx(1, "Problem with gssapi library");
227 if (gssd_get_local_realm())
228 errx(1, "get local realm");
230 if (!fg && daemon(0, 0) < 0)
233 /* This should be checked _after_ daemon(), because we need to own
234 * the undo-able semaphore by this process
236 gssd_init_unique(GSSD_CLI);
238 /* Process keytab file and get machine credentials. This will modify
239 * disk status so do it after we are sure we are the only instance
241 if (gssd_refresh_krb5_machine_creds())
244 signal(SIGINT, sig_die);
245 signal(SIGTERM, sig_die);
246 signal(SIGHUP, sig_hup);
249 /* Determine Kerberos information from the kernel */
250 gssd_obtain_kernel_krb5_info();
255 printerr(0, "lgssd initialized and ready to serve\n");
259 printerr(0, "lgssd exiting\n");