4 Copyright (c) 2000 The Regents of the University of Michigan.
7 Copyright (c) 2000 Dug Song <dugsong@UMICH.EDU>.
8 Copyright (c) 2002 Andy Adamson <andros@UMICH.EDU>.
9 Copyright (c) 2002 Marius Aamodt Eriksen <marius@UMICH.EDU>.
10 Copyright (c) 2002 J. Bruce Fields <bfields@UMICH.EDU>.
11 All rights reserved, all wrongs reversed.
13 Redistribution and use in source and binary forms, with or without
14 modification, are permitted provided that the following conditions
17 1. Redistributions of source code must retain the above copyright
18 notice, this list of conditions and the following disclaimer.
19 2. Redistributions in binary form must reproduce the above copyright
20 notice, this list of conditions and the following disclaimer in the
21 documentation and/or other materials provided with the distribution.
22 3. Neither the name of the University nor the names of its
23 contributors may be used to endorse or promote products derived
24 from this software without specific prior written permission.
26 THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
27 WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
28 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
29 DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
33 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
34 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
35 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
36 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
42 #include <sys/param.h>
43 #include <sys/types.h>
45 #include <sys/socket.h>
69 DIR *dir = opendir("/proc/self/fd");
74 while ((d = readdir(dir)) != NULL) {
76 long n = strtol(d->d_name, &endp, 10);
77 if (*endp != '\0' && n >= min && n != dfd)
82 int fd = sysconf(_SC_OPEN_MAX);
89 * mydaemon creates a pipe between the partent and child
90 * process. The parent process will wait until the
91 * child dies or writes a '1' on the pipe signaling
92 * that it started successfully.
94 int pipefds[2] = { -1, -1};
97 mydaemon(int nochdir, int noclose)
99 int pid, status, tempfd;
101 if (pipe(pipefds) < 0) {
102 printerr(1, "mydaemon: pipe() failed: errno %d (%s)\n",
103 errno, strerror(errno));
106 if ((pid = fork ()) < 0) {
107 printerr(1, "mydaemon: fork() failed: errno %d (%s)\n",
108 errno, strerror(errno));
114 * Parent. Wait for status from child.
117 if (read(pipefds[0], &status, 1) != 1)
125 if (chdir ("/") == -1) {
126 printerr(1, "mydaemon: chdir() failed: errno %d (%s)\n",
127 errno, strerror(errno));
132 while (pipefds[1] <= 2) {
133 pipefds[1] = dup(pipefds[1]);
134 if (pipefds[1] < 0) {
135 printerr(1, "mydaemon: dup() failed: errno %d (%s)\n",
136 errno, strerror(errno));
142 tempfd = open("/dev/null", O_RDWR);
156 ssize_t sret __attribute__ ((unused));
158 if (pipefds[1] > 0) {
159 sret = write(pipefds[1], &status, 1);
168 /* destroy krb5 machine creds */
170 printerr(1, "exiting on signal %d\n", signal);
177 /* don't exit on SIGHUP */
178 printerr(1, "Received SIGHUP... Ignoring.\n");
183 usage(FILE *fp, char *progname)
185 fprintf(fp, "usage: %s [ -fnvmogk ]\n",
187 fprintf(stderr, "-f - Run in foreground\n");
188 fprintf(stderr, "-n - Don't establish kerberos credentials\n");
189 fprintf(stderr, "-v - Verbosity\n");
190 fprintf(stderr, "-m - Service MDS\n");
191 fprintf(stderr, "-o - Service OSS\n");
192 fprintf(stderr, "-g - Service MGS\n");
193 fprintf(stderr, "-k - Enable kerberos support\n");
194 #ifdef HAVE_OPENSSL_SSK
195 fprintf(stderr, "-s - Enable shared key support\n");
197 fprintf(stderr, "-z - Enable gssnull support\n");
203 main(int argc, char *argv[])
209 int must_srv_mds = 0, must_srv_oss = 0, must_srv_mgs = 0;
212 while ((opt = getopt(argc, argv, "fnvmogksz")) != -1) {
239 usage(stdout, argv[0]);
242 #ifdef HAVE_OPENSSL_SSK
245 printerr(0, "ERROR: Request for sk but service "
246 "support not enabled\n");
253 usage(stderr, argv[0]);
258 if ((progname = strrchr(argv[0], '/')))
263 initerr(progname, verbosity, fg);
265 /* For kerberos use gss mechanisms but ignore for sk and null */
267 if (gssd_check_mechs()) {
268 printerr(0, "ERROR: problem with gssapi library\n");
271 if (gssd_get_local_realm()) {
272 printerr(0, "ERROR: Can't get Local Kerberos realm\n");
277 gssd_prepare_creds(must_srv_mgs, must_srv_mds,
279 printerr(0, "unable to obtain root (machine) "
281 printerr(0, "do you have a keytab entry for "
282 "<lustre_xxs>/<your.host>@<YOUR.REALM> in "
283 "/etc/krb5.keytab?\n");
292 * XXX: There is risk of memory leak for missing call
293 * cleanup_mapping() for SIGKILL and SIGSTOP.
295 signal(SIGINT, sig_die);
296 signal(SIGTERM, sig_die);
297 signal(SIGHUP, sig_hup);
302 gssd_init_unique(GSSD_SVC);
306 printerr(0, "gssd_run returned!\n");