4 * Copyright (c) 2000 The Regents of the University of Michigan.
7 * Copyright (c) 2000 Dug Song <dugsong@UMICH.EDU>.
8 * Copyright (c) 2002 Andy Adamson <andros@UMICH.EDU>.
9 * Copyright (c) 2002 Marius Aamodt Eriksen <marius@UMICH.EDU>.
10 * Copyright (c) 2002 J. Bruce Fields <bfields@UMICH.EDU>.
12 * Copyright (c) 2016, Intel Corporation.
14 * All rights reserved, all wrongs reversed.
16 * Redistribution and use in source and binary forms, with or without
17 * modification, are permitted provided that the following conditions
20 * 1. Redistributions of source code must retain the above copyright
21 * notice, this list of conditions and the following disclaimer.
22 * 2. Redistributions in binary form must reproduce the above copyright
23 * notice, this list of conditions and the following disclaimer in the
24 * documentation and/or other materials provided with the distribution.
25 * 3. Neither the name of the University nor the names of its
26 * contributors may be used to endorse or promote products derived
27 * from this software without specific prior written permission.
29 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
30 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
31 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
32 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
33 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
34 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
35 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
36 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
37 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
38 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
39 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
44 #include <sys/param.h>
45 #include <sys/types.h>
47 #include <sys/socket.h>
62 #include <linux/lustre/lustre_ver.h>
71 DIR *dir = opendir("/proc/self/fd");
76 while ((d = readdir(dir)) != NULL) {
78 long n = strtol(d->d_name, &endp, 10);
79 if (*endp != '\0' && n >= min && n != dfd)
84 int fd = sysconf(_SC_OPEN_MAX);
91 * mydaemon creates a pipe between the partent and child
92 * process. The parent process will wait until the
93 * child dies or writes a '1' on the pipe signaling
94 * that it started successfully.
96 int pipefds[2] = { -1, -1};
99 mydaemon(int nochdir, int noclose)
101 int pid, status, tempfd;
103 if (pipe(pipefds) < 0) {
104 printerr(LL_ERR, "%s: pipe() failed: errno %d (%s)\n",
105 __func__, errno, strerror(errno));
108 if ((pid = fork ()) < 0) {
109 printerr(LL_ERR, "%s: fork() failed: errno %d (%s)\n",
110 __func__, errno, strerror(errno));
116 * Parent. Wait for status from child.
119 if (read(pipefds[0], &status, 1) != 1)
127 if (chdir ("/") == -1) {
129 "%s: chdir() failed: errno %d (%s)\n",
130 __func__, errno, strerror(errno));
135 while (pipefds[1] <= 2) {
136 pipefds[1] = dup(pipefds[1]);
137 if (pipefds[1] < 0) {
138 printerr(LL_ERR, "%s: dup() failed: errno %d (%s)\n",
139 __func__, errno, strerror(errno));
145 tempfd = open("/dev/null", O_RDWR);
157 ssize_t sret __attribute__ ((unused));
159 if (pipefds[1] > 0) {
160 sret = write(pipefds[1], &status, 1);
169 /* destroy krb5 machine creds */
171 /* cleanup allocated strings for realms */
172 gssd_cleanup_realms();
174 unlink(GSS_SOCKET_PATH);
175 printerr(LL_WARN, "exiting on signal %d\n", signal);
182 /* don't exit on SIGHUP */
183 printerr(LL_WARN, "Received SIGHUP... Ignoring.\n");
187 usage(FILE *fp, char *progname)
189 fprintf(fp, "usage: %s [ -fnvmogkRsz ]\n",
191 fprintf(stderr, "-f - Run in foreground\n");
192 fprintf(stderr, "-g - Service MGS\n");
193 fprintf(stderr, "-k - Enable kerberos support\n");
194 fprintf(stderr, "-m - Service MDS\n");
195 fprintf(stderr, "-n - Don't establish kerberos credentials\n");
196 fprintf(stderr, "-o - Service OSS\n");
197 fprintf(stderr, "-R REALM - Kerberos Realm to use, instead of default\n");
198 #ifdef HAVE_OPENSSL_SSK
199 fprintf(stderr, "-s - Enable shared secret key support\n");
201 fprintf(stderr, "-v - Verbosity\n");
202 fprintf(stderr, "-z - Enable gssnull support\n");
208 main(int argc, char *argv[])
214 int must_srv_mds = 0, must_srv_oss = 0, must_srv_mgs = 0;
218 while ((opt = getopt(argc, argv, "fgkmnoR:svz")) != -1) {
228 usage(stdout, argv[0]);
248 #ifdef HAVE_OPENSSL_SSK
251 fprintf(stderr, "error: request for SSK but service "
252 "support not enabled\n");
253 usage(stderr, argv[0]);
263 usage(stderr, argv[0]);
268 if ((progname = strrchr(argv[0], '/')))
273 if (!sk_enabled && !krb_enabled && !null_enabled) {
274 #if LUSTRE_VERSION_CODE < OBD_OCD_VERSION(3, 0, 53, 0)
275 fprintf(stderr, "warning: no -k, -s, or -z option given, "
276 "assume -k for backward compatibility\n");
279 fprintf(stderr, "error: need one of -k, -s, or -z options\n");
280 usage(stderr, argv[0]);
285 if (realm && !krb_enabled) {
286 fprintf(stderr, "error: need -k option if -R is used\n");
287 usage(stderr, argv[0]);
290 initerr(progname, verbosity, fg);
292 /* For kerberos use gss mechanisms but ignore for sk and null */
296 if (gssd_check_mechs()) {
298 "ERROR: problem with gssapi library\n");
301 ret = gss_get_realm(realm);
303 printerr(LL_ERR, "ERROR: no Kerberos realm: %s\n",
307 printerr(LL_WARN, "Kerberos realm: %s\n", krb5_this_realm);
309 gssd_prepare_creds(must_srv_mgs, must_srv_mds,
312 "unable to obtain root (machine) credentials\n");
314 "do you have a keytab entry for <lustre_xxs>/<your.host>@<YOUR.REALM> in /etc/krb5.keytab?\n");
323 * XXX: There is risk of memory leak for missing call
324 * cleanup_mapping() for SIGKILL and SIGSTOP.
326 signal(SIGINT, sig_die);
327 signal(SIGTERM, sig_die);
328 signal(SIGHUP, sig_hup);
333 gssd_init_unique(GSSD_SVC);
337 gssd_cleanup_realms();
338 printerr(LL_ERR, "svcgssd_run returned!\n");