4 Copyright (c) 2000 The Regents of the University of Michigan.
7 Copyright (c) 2000 Dug Song <dugsong@UMICH.EDU>.
8 Copyright (c) 2002 Andy Adamson <andros@UMICH.EDU>.
9 Copyright (c) 2002 Marius Aamodt Eriksen <marius@UMICH.EDU>.
10 Copyright (c) 2002 J. Bruce Fields <bfields@UMICH.EDU>.
11 All rights reserved, all wrongs reversed.
13 Redistribution and use in source and binary forms, with or without
14 modification, are permitted provided that the following conditions
17 1. Redistributions of source code must retain the above copyright
18 notice, this list of conditions and the following disclaimer.
19 2. Redistributions in binary form must reproduce the above copyright
20 notice, this list of conditions and the following disclaimer in the
21 documentation and/or other materials provided with the distribution.
22 3. Neither the name of the University nor the names of its
23 contributors may be used to endorse or promote products derived
24 from this software without specific prior written permission.
26 THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
27 WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
28 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
29 DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
33 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
34 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
35 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
36 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
42 #include <sys/param.h>
43 #include <sys/types.h>
45 #include <sys/socket.h>
69 DIR *dir = opendir("/proc/self/fd");
74 while ((d = readdir(dir)) != NULL) {
76 long n = strtol(d->d_name, &endp, 10);
77 if (*endp != '\0' && n >= min && n != dfd)
82 int fd = sysconf(_SC_OPEN_MAX);
89 * mydaemon creates a pipe between the partent and child
90 * process. The parent process will wait until the
91 * child dies or writes a '1' on the pipe signaling
92 * that it started successfully.
94 int pipefds[2] = { -1, -1};
97 mydaemon(int nochdir, int noclose)
99 int pid, status, tempfd;
101 if (pipe(pipefds) < 0) {
102 printerr(1, "mydaemon: pipe() failed: errno %d (%s)\n",
103 errno, strerror(errno));
106 if ((pid = fork ()) < 0) {
107 printerr(1, "mydaemon: fork() failed: errno %d (%s)\n",
108 errno, strerror(errno));
114 * Parent. Wait for status from child.
117 if (read(pipefds[0], &status, 1) != 1)
125 if (chdir ("/") == -1) {
126 printerr(1, "mydaemon: chdir() failed: errno %d (%s)\n",
127 errno, strerror(errno));
132 while (pipefds[1] <= 2) {
133 pipefds[1] = dup(pipefds[1]);
134 if (pipefds[1] < 0) {
135 printerr(1, "mydaemon: dup() failed: errno %d (%s)\n",
136 errno, strerror(errno));
142 tempfd = open("/dev/null", O_RDWR);
156 ssize_t sret __attribute__ ((unused));
158 if (pipefds[1] > 0) {
159 sret = write(pipefds[1], &status, 1);
168 /* destroy krb5 machine creds */
170 printerr(1, "exiting on signal %d\n", signal);
177 /* don't exit on SIGHUP */
178 printerr(1, "Received SIGHUP... Ignoring.\n");
183 usage(FILE *fp, char *progname)
185 fprintf(fp, "usage: %s [ -fnvmogk ]\n",
187 fprintf(stderr, "-f - Run in foreground\n");
188 fprintf(stderr, "-n - Don't establish kerberos credentials\n");
189 fprintf(stderr, "-v - Verbosity\n");
190 fprintf(stderr, "-m - Service MDS\n");
191 fprintf(stderr, "-o - Service OSS\n");
192 fprintf(stderr, "-g - Service MGS\n");
193 fprintf(stderr, "-k - Enable kerberos support\n");
194 fprintf(stderr, "-s - Enable shared key support\n");
195 fprintf(stderr, "-z - Enable gssnull support\n");
201 main(int argc, char *argv[])
207 int must_srv_mds = 0, must_srv_oss = 0, must_srv_mgs = 0;
210 while ((opt = getopt(argc, argv, "fnvmogksz")) != -1) {
237 usage(stdout, argv[0]);
246 usage(stderr, argv[0]);
251 if ((progname = strrchr(argv[0], '/')))
256 initerr(progname, verbosity, fg);
258 /* For kerberos use gss mechanisms but ignore for sk and null */
260 if (gssd_check_mechs()) {
261 printerr(0, "ERROR: problem with gssapi library\n");
264 if (gssd_get_local_realm()) {
265 printerr(0, "ERROR: Can't get Local Kerberos realm\n");
270 gssd_prepare_creds(must_srv_mgs, must_srv_mds,
272 printerr(0, "unable to obtain root (machine) "
274 printerr(0, "do you have a keytab entry for "
275 "<lustre_xxs>/<your.host>@<YOUR.REALM> in "
276 "/etc/krb5.keytab?\n");
285 * XXX: There is risk of memory leak for missing call
286 * cleanup_mapping() for SIGKILL and SIGSTOP.
288 signal(SIGINT, sig_die);
289 signal(SIGTERM, sig_die);
290 signal(SIGHUP, sig_hup);
295 gssd_init_unique(GSSD_SVC);
299 printerr(0, "gssd_run returned!\n");