4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
22 * Copyright 2006 Sun Microsystems, Inc. All rights reserved.
23 * Use is subject to license terms.
26 #pragma ident "%Z%%M% %I% %E% SMI"
35 #include <priv_utils.h>
41 #include <nfs/nfsid_map.h>
42 #include <rpcsvc/daemon_utils.h>
43 #include <arpa/nameser.h>
44 #include <nfs/nfssys.h>
49 extern struct group
*_uncached_getgrgid_r(gid_t
, struct group
*, char *, int);
50 extern struct group
*_uncached_getgrnam_r(const char *, struct group
*,
52 extern struct passwd
*_uncached_getpwuid_r(uid_t
, struct passwd
*, char *, int);
53 extern struct passwd
*_uncached_getpwnam_r(const char *, struct passwd
*,
57 * seconds to cache nfsmapid domain info
59 #define NFSCFG_DEFAULT_DOMAIN_TMOUT (5 * 60)
60 #define NFSMAPID_DOOR "/var/run/nfsmapid_door"
62 extern void nfsmapid_func(void *, char *, size_t, door_desc_t
*, uint_t
);
64 extern void check_domain(int);
65 extern void idmap_kcall(int);
66 extern void open_diag_file(void);
68 size_t pwd_buflen
= 0;
69 size_t grp_buflen
= 0;
74 * nfscfg_domain_tmout is used by nfsv4-test scripts to query
75 * the nfsmapid daemon for the proper timeout. Don't delete !
77 time_t nfscfg_domain_tmout
= NFSCFG_DEFAULT_DOMAIN_TMOUT
;
80 * Processing for daemonization
87 perror("nfsmapid: can't fork");
98 syslog(LOG_ERR
, gettext("chdir /: %m"));
101 * Close stdin, stdout, and stderr.
102 * Open again to redirect input+output
107 (void) open("/dev/null", O_RDONLY
);
108 (void) open("/dev/null", O_WRONLY
);
115 sig_handler(void *arg
)
119 struct timespec tmout
;
123 (void) sigemptyset(&sigset
);
124 (void) sigaddset(&sigset
, SIGHUP
);
125 (void) sigaddset(&sigset
, SIGTERM
);
127 (void) sigaddset(&sigset
, SIGINT
);
132 tmout
.tv_sec
= nfscfg_domain_tmout
;
133 if ((ret
= sigtimedwait(&sigset
, &si
, &tmout
)) != 0) {
135 * EAGAIN: no signals arrived during timeout.
136 * check/update config files and continue.
138 if (ret
== -1 && errno
== EAGAIN
) {
143 switch (si
.si_signo
) {
162 * Thread initialization. Mask out all signals we want our
163 * signal handler to handle for us from any other threads.
169 long thr_flags
= (THR_NEW_LWP
|THR_DAEMON
|THR_SUSPENDED
);
172 * Before we kick off any other threads, mask out desired
173 * signals from main thread so that any subsequent threads
174 * don't receive said signals.
176 (void) thr_sigsetmask(NULL
, NULL
, &sigset
);
177 (void) sigaddset(&sigset
, SIGHUP
);
178 (void) sigaddset(&sigset
, SIGTERM
);
180 (void) sigaddset(&sigset
, SIGINT
);
182 (void) thr_sigsetmask(SIG_SETMASK
, &sigset
, NULL
);
185 * Create the signal handler thread suspended ! We do things
186 * this way at setup time to minimize the probability of
187 * introducing any race conditions _if_ the process were to
188 * get a SIGHUP signal while creating a new DNS query thread
189 * in get_dns_txt_domain().
191 if (thr_create(NULL
, 0, sig_handler
, 0, thr_flags
, &sig_thread
)) {
193 gettext("Failed to create signal handling thread"));
207 * passwd/group reentrant interfaces limits
209 pwd_buflen
= (size_t)sysconf(_SC_GETPW_R_SIZE_MAX
);
210 grp_buflen
= (size_t)sysconf(_SC_GETGR_R_SIZE_MAX
);
213 * MT initialization is done first so that if there is the
214 * need to fire an additional thread to continue to query
215 * DNS, that thread is started off with the main thread's
221 * Determine nfsmapid domain.
226 * In the case of nfsmapid running diskless, it is important
227 * to get the initial connections to the nameservices
228 * established to prevent problems like opening a devfs
229 * node to contact a nameservice being blocked by the
230 * resolution of an active devfs lookup.
231 * First issue a set*ent to "open" the databases and then
232 * get an entry and finally lookup a bogus entry to trigger
239 if ((pwd_buf
= malloc(pwd_buflen
)) == NULL
)
242 (void) _uncached_getpwnam_r("NF21dmvP", &pwd
, pwd_buf
, pwd_buflen
);
243 (void) _uncached_getpwuid_r(1181794, &pwd
, pwd_buf
, pwd_buflen
);
245 if ((grp_buf
= realloc(pwd_buf
, grp_buflen
)) == NULL
) {
250 (void) _uncached_getgrnam_r("NF21dmvP", &grp
, grp_buf
, grp_buflen
);
251 (void) _uncached_getgrgid_r(1181794, &grp
, grp_buf
, grp_buflen
);
263 if ((doorfd
= door_create(nfsmapid_func
, NULL
,
264 DOOR_REFUSE_DESC
| DOOR_NO_CANCEL
)) == -1) {
265 syslog(LOG_ERR
, "Unable to create door: %m\n");
271 * Create a file system path for the door
273 if ((dfd
= open(NFSMAPID_DOOR
, O_RDWR
|O_CREAT
|O_TRUNC
,
274 S_IRUSR
|S_IWUSR
|S_IRGRP
|S_IROTH
)) == -1) {
275 syslog(LOG_ERR
, "Unable to open %s: %m\n", NFSMAPID_DOOR
);
276 (void) close(doorfd
);
281 * Clean up any stale associations
283 (void) fdetach(NFSMAPID_DOOR
);
286 * Register in namespace to pass to the kernel to door_ki_open
288 if (fattach(doorfd
, NFSMAPID_DOOR
) == -1) {
289 syslog(LOG_ERR
, "Unable to fattach door: %m\n");
291 (void) close(doorfd
);
298 * Now that we're actually running, go
299 * ahead and flush the kernel flushes
300 * Pass door name to kernel for door_ki_open
305 * Wait for incoming calls
311 syslog(LOG_ERR
, gettext("Door server exited"));
317 main(int argc
, char **argv
)
321 (void) setlocale(LC_ALL
, "");
322 (void) textdomain(TEXT_DOMAIN
);
324 /* _check_services() framework setup */
325 (void) _create_daemon_lock(NFSMAPID
, DAEMON_UID
, DAEMON_GID
);
328 * Open diag file in /var/run while we've got the perms
333 * Initialize the daemon to basic + sys_nfs
336 if (__init_daemon_priv(PU_RESETGROUPS
|PU_CLEARLIMITSET
,
337 DAEMON_UID
, DAEMON_GID
, PRIV_SYS_NFS
, (char *)NULL
) == -1) {
338 (void) fprintf(stderr
, gettext("%s PRIV_SYS_NFS privilege "
339 "missing\n"), MyName
);
345 * Take away a subset of basic, while this is not the absolute
346 * minimum, it is important that it is unique among other
347 * daemons to insure that we get a unique cred that will
348 * result in a unique open_owner. If not, we run the risk
349 * of a diskless client deadlocking with a thread holding
350 * the open_owner seqid lock while upcalling the daemon.
351 * XXX This restriction will go away once we stop holding
352 * XXX open_owner lock across rfscalls!
354 (void) priv_set(PRIV_OFF
, PRIV_PERMITTED
,
355 PRIV_FILE_LINK_ANY
, PRIV_PROC_SESSION
,
360 switch (_enter_daemon_lock(NFSMAPID
)) {
365 syslog(LOG_ERR
, "error locking for %s: %s", NFSMAPID
,
370 /* daemon was already running */
374 openlog(MyName
, LOG_PID
| LOG_NDELAY
, LOG_DAEMON
);
376 /* Initialize daemon subsystems */
380 return (start_svcs());