DESCRIPTION
The nfssvc system call is used by the NFS daemons to pass information into and out of the kernel and also to enter the kernel as a server daemon. The flags argument consists of several bits that show what action is to be taken once in the kernel and the argstructp points to one of three structures depending on which bits are set in flags. On the client side, nfsiod(8) calls nfssvc with the flags argument set to NFSSVC_BIOD and argstructp set to NULL to enter the kernel as a block I/O server daemon. For NQNFS, mount_nfs(8) calls nfssvc with the NFSSVC_MNTD flag, optionally ord with the flags NFSSVC_GOTAUTH and NFSSVC_AUTHINFAIL along with a pointer to a
struct nfsd_cargs {
char *ncd_dirp; /* Mount dir path */
uid_t ncd_authuid; /* Effective uid */
int ncd_authtype; /* Type of authenticator */
int ncd_authlen; /* Length of authenticator string */
u_char*ncd_authstr; /* Authenticator string */
int ncd_verflen; /* and the verifier */
u_char*ncd_verfstr;
NFSKERBKEY_T ncd_key; /* Session key */
};
structure. The initial call has only the NFSSVC_MNTD flag set to specify service for the mount point. If the mount point is using Kerberos, then the mount_nfs(8) utility will return from nfssvc with errno == ENEEDAUTH whenever the client side requires an rcmd authentication ticket for the user. The mount_nfs(8) utility will attempt to get the Kerberos ticket, and if successful will call nfssvc with the flags NFSSVC_MNTD and NFSSVC_GOTAUTH after filling the ticket into the ncd_authstr field and setting the ncd_authlen and ncd_authtype fields of the nfsd_cargs structure. If mount_nfs(8) failed to get the ticket, nfssvc will be called with the flags NFSSVC_MNTD, NFSSVC_GOTAUTH and NFSSVC_AUTHINFAIL to denote a failed authentication attempt.
On the server side, nfssvc is called with the flag NFSSVC_NFSD and a pointer to a
struct nfsd_srvargs {
struct nfsd*nsd_nfsd; /* Pointer to in kernel nfsd struct */
uid_t nsd_uid; /* Effective uid mapped to cred */
u_int32_t nsd_haddr; /* Ip address of client */
struct ucred nsd_cr; /* Cred. uid maps to */
int nsd_authlen; /* Length of auth string (ret) */
u_char*nsd_authstr; /* Auth string (ret) */
int nsd_verflen; /* and the verifier */
u_char*nsd_verfstr;
struct timeval nsd_timestamp; /* timestamp from verifier */
u_int32_t nsd_ttl; /* credential ttl (sec) */
NFSKERBKEY_T nsd_key; /* Session key */
};
to enter the kernel as an nfsd(8) daemon. Whenever an nfsd(8) daemon receives a Kerberos authentication ticket, it will return from nfssvc with errno == ENEEDAUTH. The nfsd(8) utility will attempt to authenticate the ticket and generate a set of credentials on the server for the user id specified in the field nsd_uid. This is done by first authenticating the Kerberos ticket and then mapping the Kerberos principal to a local name and getting a set of credentials for that user via getpwnam(3) and getgrouplist(3). If successful, the nfsd(8) utility will call nfssvc with the NFSSVC_NFSD and NFSSVC_AUTHIN flags set to pass the credential mapping in nsd_cr into the kernel to be cached on the server socket for that client. If the authentication failed, nfsd(8) calls nfssvc with the flags NFSSVC_NFSD and NFSSVC_AUTHINFAIL to denote an authentication failure.
The master nfsd(8) server daemon calls nfssvc with the flag NFSSVC_ADDSOCK and a pointer to a
struct nfsd_args {
intsock; /* Socket to serve */
caddr_t name; /* Client address for connection based sockets */
intnamelen;/* Length of name */
};
to pass a server side NFS socket into the kernel for servicing by the nfsd(8) daemons.
RETURN VALUES
Normally nfssvc does not return unless the server is terminated by a signal when a value of 0 is returned. Otherwise, -1 is returned and the global variable errno is set to specify the error.
ERRORS