2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afs/param.h>
12 #include <afs/cellconfig.h>
13 #include <afs/ptserver.h>
27 #include "afsd_init.h"
28 #include <WINNT\afsreg.h>
46 /* Copied from afs_tokens.h */
47 #define PIOCTL_LOGON 0x1
50 const char utf8_prefix[] = UTF8_PREFIX;
51 const int utf8_prefix_size = sizeof(utf8_prefix) - sizeof(char);
53 osi_mutex_t cm_Afsdsbmt_Lock;
55 extern afs_int32 cryptall;
56 extern char cm_NetbiosName[];
57 extern clientchar_t cm_NetbiosNameC[];
59 extern void afsi_log(char *pattern, ...);
61 void cm_InitIoctl(void)
63 lock_InitializeMutex(&cm_Afsdsbmt_Lock, "AFSDSBMT.INI Access Lock",
64 LOCK_HIERARCHY_AFSDBSBMT_GLOBAL);
68 * Utility function. (Not currently in use.)
69 * This function forces all dirty buffers to the file server and
70 * then discards the status info.
73 cm_CleanFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
77 code = buf_CleanVnode(scp, userp, reqp);
79 lock_ObtainWrite(&scp->rw);
80 cm_DiscardSCache(scp);
81 lock_ReleaseWrite(&scp->rw);
83 osi_Log2(afsd_logp,"cm_CleanFile scp 0x%x returns error: [%x]",scp, code);
88 * Utility function. Used within this file.
89 * scp must be held but not locked.
92 cm_FlushFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
96 #ifdef AFS_FREELANCE_CLIENT
97 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
98 cm_noteLocalMountPointChange();
103 code = buf_FlushCleanPages(scp, userp, reqp);
105 lock_ObtainWrite(&scp->rw);
106 cm_DiscardSCache(scp);
107 lock_ReleaseWrite(&scp->rw);
109 osi_Log2(afsd_logp,"cm_FlushFile scp 0x%x returns error: [%x]",scp, code);
114 * Utility function. (Not currently in use)
115 * IoctlPath must be parsed or skipped prior to calling.
116 * scp must be held but not locked.
119 cm_FlushParent(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
124 pscp = cm_FindSCacheParent(scp);
126 /* now flush the file */
127 code = cm_FlushFile(pscp, userp, reqp);
128 cm_ReleaseSCache(pscp);
134 * Utility function. Used within this function.
137 cm_FlushVolume(cm_user_t *userp, cm_req_t *reqp, afs_uint32 cell, afs_uint32 volume)
143 #ifdef AFS_FREELANCE_CLIENT
144 if ( cell == AFS_FAKE_ROOT_CELL_ID && volume == AFS_FAKE_ROOT_VOL_ID ) {
145 cm_noteLocalMountPointChange();
150 lock_ObtainWrite(&cm_scacheLock);
151 for (i=0; i<cm_data.scacheHashTableSize; i++) {
152 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
153 if (scp->fid.volume == volume && scp->fid.cell == cell) {
154 cm_HoldSCacheNoLock(scp);
155 lock_ReleaseWrite(&cm_scacheLock);
157 /* now flush the file */
158 code = cm_FlushFile(scp, userp, reqp);
159 lock_ObtainWrite(&cm_scacheLock);
160 cm_ReleaseSCacheNoLock(scp);
164 lock_ReleaseWrite(&cm_scacheLock);
170 * Utility function. Used within this file.
171 * Invalidate ACL info for a user that has just obtained or lost tokens.
174 cm_ResetACLCache(cm_user_t *userp)
179 lock_ObtainWrite(&cm_scacheLock);
180 for (hash=0; hash < cm_data.scacheHashTableSize; hash++) {
181 for (scp=cm_data.scacheHashTablep[hash]; scp; scp=scp->nextp) {
182 cm_HoldSCacheNoLock(scp);
183 lock_ReleaseWrite(&cm_scacheLock);
184 lock_ObtainWrite(&scp->rw);
185 cm_InvalidateACLUser(scp, userp);
186 lock_ReleaseWrite(&scp->rw);
187 lock_ObtainWrite(&cm_scacheLock);
188 cm_ReleaseSCacheNoLock(scp);
191 lock_ReleaseWrite(&cm_scacheLock);
195 * TranslateExtendedChars - This is a fix for TR 54482.
197 * If an extended character (80 - FF) is entered into a file
198 * or directory name in Windows, the character is translated
199 * into the OEM character map before being passed to us.
200 * The pioctl functions must match
201 * this translation for paths given via our own commands (like
202 * fs). If we do not do this, then we will try to perform an
203 * operation on a non-translated path, which we will fail to
204 * find, since the path was created with the translated chars.
205 * This function performs the required translation.
207 * OEM character code pages are used by the non-Unicode SMB
208 * mode. Do not use if the CM_IOCTLFLAG_USEUTF8 is set.
211 TranslateExtendedChars(char *str)
216 CharToOemA(str, str);
219 void cm_SkipIoctlPath(cm_ioctl_t *ioctlp)
223 temp = strlen(ioctlp->inDatap) + 1;
224 ioctlp->inDatap += temp;
228 clientchar_t * cm_ParseIoctlStringAlloc(cm_ioctl_t *ioctlp, const char * ext_instrp)
230 clientchar_t * rs = NULL;
233 instrp = (ext_instrp)?ext_instrp:ioctlp->inDatap;
235 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
236 rs = cm_Utf8ToClientStringAlloc(instrp, -1, NULL);
240 /* Not a UTF-8 string */
241 if (smb_StoreAnsiFilenames) {
242 cch = cm_AnsiToClientString(instrp, -1, NULL, 0);
246 rs = malloc(cch * sizeof(clientchar_t));
247 cm_AnsiToClientString(instrp, -1, rs, cch);
249 cch = cm_OemToClientString(instrp, -1, NULL, 0);
253 rs = malloc(cch * sizeof(clientchar_t));
254 cm_OemToClientString(instrp, -1, rs, cch);
258 if (ext_instrp == NULL) {
259 ioctlp->inDatap += strlen(ioctlp->inDatap) + 1;
264 int cm_UnparseIoctlString(cm_ioctl_t *ioctlp,
266 const clientchar_t * cstr, int cchlen)
271 outp = ((ext_outp == NULL)? ioctlp->outDatap : ext_outp);
273 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
274 cchout = cm_ClientStringToUtf8(cstr, cchlen, outp,
275 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp));
277 if (smb_StoreAnsiFilenames) {
278 cchout = WideCharToMultiByte(CP_ACP, 0, cstr, cchlen,
280 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
283 cchout = WideCharToMultiByte(CP_OEMCP, 0, cstr, cchlen,
285 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
290 if (cchout > 0 && ext_outp == NULL) {
291 ioctlp->outDatap += cchout;
298 * Must be called before XXX_ParseIoctlPath or cm_SkipIoctlPath
300 cm_ioctlQueryOptions_t *
301 cm_IoctlGetQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
303 afs_uint32 pathlen = strlen(ioctlp->inDatap) + 1;
304 char *p = ioctlp->inDatap + pathlen;
305 cm_ioctlQueryOptions_t * optionsp = NULL;
307 if (ioctlp->inCopied > p - ioctlp->inAllocp) {
308 optionsp = (cm_ioctlQueryOptions_t *)p;
309 if (optionsp->size < 12 /* minimum size of struct */)
317 * Must be called after smb_ParseIoctlPath or cm_SkipIoctlPath
318 * or any other time that ioctlp->inDatap points at the
319 * cm_ioctlQueryOptions_t object.
322 cm_IoctlSkipQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
324 cm_ioctlQueryOptions_t * optionsp = (cm_ioctlQueryOptions_t *)ioctlp->inDatap;
325 ioctlp->inDatap += optionsp->size;
328 /* format the specified path to look like "/afs/<cellname>/usr", by
329 * adding "/afs" (if necessary) in front, changing any \'s to /'s, and
330 * removing any trailing "/"'s. One weirdo caveat: "/afs" will be
331 * intentionally returned as "/afs/"--this makes submount manipulation
332 * easier (because we can always jump past the initial "/afs" to find
333 * the AFS path that should be written into afsdsbmt.ini).
336 cm_NormalizeAfsPath(clientchar_t *outpathp, long cchlen, clientchar_t *inpathp)
339 clientchar_t bslash_mountRoot[256];
341 cm_ClientStrCpy(bslash_mountRoot, lengthof(bslash_mountRoot), cm_mountRootC);
342 bslash_mountRoot[0] = '\\';
344 if (!cm_ClientStrCmpNI(inpathp, cm_mountRootC, cm_mountRootCLen))
345 cm_ClientStrCpy(outpathp, cchlen, inpathp);
346 else if (!cm_ClientStrCmpNI(inpathp, bslash_mountRoot,
347 cm_ClientStrLen(bslash_mountRoot)))
348 cm_ClientStrCpy(outpathp, cchlen, inpathp);
349 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
350 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s%s"), cm_mountRootC, inpathp);
351 else // inpathp looks like "<cell>/usr"
352 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s/%s"), cm_mountRootC, inpathp);
354 for (cp = outpathp; *cp != 0; ++cp) {
359 if (cm_ClientStrLen(outpathp) && (outpathp[cm_ClientStrLen(outpathp)-1] == '/')) {
360 outpathp[cm_ClientStrLen(outpathp)-1] = 0;
363 if (!cm_ClientStrCmpI(outpathp, cm_mountRootC)) {
364 cm_ClientStrCpy(outpathp, cchlen, cm_mountRootC);
368 void cm_NormalizeAfsPathAscii(char *outpathp, long outlen, char *inpathp)
371 char bslash_mountRoot[256];
373 strncpy(bslash_mountRoot, cm_mountRoot, sizeof(bslash_mountRoot) - 1);
374 bslash_mountRoot[0] = '\\';
376 if (!strnicmp (inpathp, cm_mountRoot, strlen(cm_mountRoot)))
377 StringCbCopy(outpathp, outlen, inpathp);
378 else if (!strnicmp (inpathp, bslash_mountRoot, strlen(bslash_mountRoot)))
379 StringCbCopy(outpathp, outlen, inpathp);
380 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
381 StringCbPrintfA(outpathp, outlen, "%s%s", cm_mountRoot, inpathp);
382 else // inpathp looks like "<cell>/usr"
383 StringCbPrintfA(outpathp, outlen, "%s/%s", cm_mountRoot, inpathp);
385 for (cp = outpathp; *cp != 0; ++cp) {
390 if (strlen(outpathp) && (outpathp[strlen(outpathp)-1] == '/')) {
391 outpathp[strlen(outpathp)-1] = 0;
394 if (!strcmpi (outpathp, cm_mountRoot)) {
395 StringCbCopy(outpathp, outlen, cm_mountRoot);
401 * VIOCGETAL internals.
403 * Assumes that pioctl path has been parsed or skipped.
404 * scp is held but not locked.
407 cm_IoctlGetACL(cm_ioctl_t *ioctlp, cm_user_t *userp, cm_scache_t *scp, cm_req_t *reqp)
412 AFSFetchStatus fileStatus;
416 struct rx_connection * rxconnp;
418 /* now make the get acl call */
419 #ifdef AFS_FREELANCE_CLIENT
420 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
422 ioctlp->outDatap[0] ='\0';
426 afid.Volume = scp->fid.volume;
427 afid.Vnode = scp->fid.vnode;
428 afid.Unique = scp->fid.unique;
430 acl.AFSOpaque_val = ioctlp->outDatap;
431 acl.AFSOpaque_len = 0;
432 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
436 rxconnp = cm_GetRxConn(connp);
437 code = RXAFS_FetchACL(rxconnp, &afid, &acl, &fileStatus, &volSync);
438 rx_PutConnection(rxconnp);
440 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
441 code = cm_MapRPCError(code, reqp);
446 /* skip over return data */
447 tlen = (int)strlen(ioctlp->outDatap) + 1;
448 ioctlp->outDatap += tlen;
450 /* and return success */
456 * VIOC_FILE_CELL_NAME internals.
458 * Assumes that pioctl path has been parsed or skipped.
459 * scp is held but not locked.
462 cm_IoctlGetFileCellName(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
467 #ifdef AFS_FREELANCE_CLIENT
468 if ( cm_freelanceEnabled &&
469 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
470 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID &&
471 scp->fid.vnode==0x1 && scp->fid.unique==0x1 ) {
472 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
473 ioctlp->outDatap += strlen(ioctlp->outDatap) + 1;
476 #endif /* AFS_FREELANCE_CLIENT */
478 cellp = cm_FindCellByID(scp->fid.cell, CM_FLAG_NOPROBE);
480 clientchar_t * cellname;
482 cellname = cm_FsStringToClientStringAlloc(cellp->name, -1, NULL);
483 cm_UnparseIoctlString(ioctlp, NULL, cellname, -1);
487 code = CM_ERROR_NOSUCHCELL;
495 * VIOCSETAL internals.
497 * Assumes that pioctl path has been parsed or skipped.
498 * scp is held but not locked.
501 cm_IoctlSetACL(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
506 AFSFetchStatus fileStatus;
509 struct rx_connection * rxconnp;
511 #ifdef AFS_FREELANCE_CLIENT
512 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
513 code = CM_ERROR_NOACCESS;
517 /* now make the get acl call */
518 fid.Volume = scp->fid.volume;
519 fid.Vnode = scp->fid.vnode;
520 fid.Unique = scp->fid.unique;
522 acl.AFSOpaque_val = ioctlp->inDatap;
523 acl.AFSOpaque_len = (u_int)strlen(ioctlp->inDatap)+1;
524 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
528 rxconnp = cm_GetRxConn(connp);
529 code = RXAFS_StoreACL(rxconnp, &fid, &acl, &fileStatus, &volSync);
530 rx_PutConnection(rxconnp);
532 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
533 code = cm_MapRPCError(code, reqp);
535 /* invalidate cache info, since we just trashed the ACL cache */
536 lock_ObtainWrite(&scp->rw);
537 cm_DiscardSCache(scp);
538 lock_ReleaseWrite(&scp->rw);
545 * VIOC_FLUSHALL internals.
547 * Assumes that pioctl path has been parsed or skipped.
550 cm_IoctlFlushAllVolumes(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
556 lock_ObtainWrite(&cm_scacheLock);
557 for (i=0; i<cm_data.scacheHashTableSize; i++) {
558 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
559 cm_HoldSCacheNoLock(scp);
560 lock_ReleaseWrite(&cm_scacheLock);
562 /* now flush the file */
563 code = cm_FlushFile(scp, userp, reqp);
564 lock_ObtainWrite(&cm_scacheLock);
565 cm_ReleaseSCacheNoLock(scp);
568 lock_ReleaseWrite(&cm_scacheLock);
574 * VIOC_FLUSHVOLUME internals.
576 * Assumes that pioctl path has been parsed or skipped.
577 * scp is held but not locked.
580 cm_IoctlFlushVolume(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
586 #ifdef AFS_FREELANCE_CLIENT
587 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
588 code = CM_ERROR_NOACCESS;
592 volume = scp->fid.volume;
593 cell = scp->fid.cell;
594 code = cm_FlushVolume(userp, reqp, cell, volume);
600 * VIOCFLUSH internals.
602 * Assumes that pioctl path has been parsed or skipped.
603 * scp is held but not locked.
606 cm_IoctlFlushFile(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
610 #ifdef AFS_FREELANCE_CLIENT
611 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
612 code = CM_ERROR_NOACCESS;
616 cm_FlushFile(scp, userp, reqp);
623 * VIOCSETVOLSTAT internals.
625 * Assumes that pioctl path has been parsed or skipped.
626 * scp is held but not locked.
629 cm_IoctlSetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
633 char offLineMsg[256];
636 AFSFetchVolumeStatus volStat;
637 AFSStoreVolumeStatus storeStat;
642 struct rx_connection * rxconnp;
644 #ifdef AFS_FREELANCE_CLIENT
645 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
646 code = CM_ERROR_NOACCESS;
650 cellp = cm_FindCellByID(scp->fid.cell, 0);
651 osi_assertx(cellp, "null cm_cell_t");
653 if (scp->flags & CM_SCACHEFLAG_RO)
654 return CM_ERROR_READONLY;
656 code = cm_FindVolumeByID(cellp, scp->fid.volume, userp, reqp,
657 CM_GETVOL_FLAG_CREATE, &tvp);
663 /* Copy the junk out, using cp as a roving pointer. */
664 memcpy((char *)&volStat, ioctlp->inDatap, sizeof(AFSFetchVolumeStatus));
665 ioctlp->inDatap += sizeof(AFSFetchVolumeStatus);
667 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
668 cm_ClientStringToFsString(strp, -1, volName, lengthof(volName));
671 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
672 cm_ClientStringToFsString(strp, -1, offLineMsg, lengthof(offLineMsg));
675 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
676 cm_ClientStringToFsString(strp, -1, motd, lengthof(motd));
682 if (volStat.MinQuota != -1) {
683 storeStat.MinQuota = volStat.MinQuota;
684 storeStat.Mask |= AFS_SETMINQUOTA;
686 if (volStat.MaxQuota != -1) {
687 storeStat.MaxQuota = volStat.MaxQuota;
688 storeStat.Mask |= AFS_SETMAXQUOTA;
692 code = cm_ConnFromFID(&scp->fid, userp, reqp, &tcp);
696 rxconnp = cm_GetRxConn(tcp);
697 code = RXAFS_SetVolumeStatus(rxconnp, scp->fid.volume,
698 &storeStat, volName, offLineMsg, motd);
699 rx_PutConnection(rxconnp);
701 } while (cm_Analyze(tcp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
702 code = cm_MapRPCError(code, reqp);
705 /* return on failure */
709 /* we are sending parms back to make compat. with prev system. should
710 * change interface later to not ask for current status, just set
713 cp = ioctlp->outDatap;
714 memcpy(cp, (char *)&volStat, sizeof(VolumeStatus));
715 cp += sizeof(VolumeStatus);
716 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
717 cp += strlen(volName)+1;
718 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
719 cp += strlen(offLineMsg)+1;
720 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
721 cp += strlen(motd)+1;
723 /* now return updated return data pointer */
724 ioctlp->outDatap = cp;
731 * VIOCGETVOLSTAT internals.
733 * Assumes that pioctl path has been parsed or skipped.
734 * scp is held but not locked.
737 cm_IoctlGetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
740 char volName[32]="(unknown)";
741 char offLineMsg[256]="server temporarily inaccessible";
742 char motd[256]="server temporarily inaccessible";
744 AFSFetchVolumeStatus volStat;
749 struct rx_connection * rxconnp;
751 #ifdef AFS_FREELANCE_CLIENT
752 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
754 strncpy(volName, "Freelance.Local.Root", sizeof(volName));
755 offLineMsg[0] = '\0';
756 strncpy(motd, "Freelance mode in use.", sizeof(motd));
757 volStat.Vid = scp->fid.volume;
758 volStat.MaxQuota = 0;
759 volStat.BlocksInUse = 100;
760 volStat.PartBlocksAvail = 0;
761 volStat.PartMaxBlocks = 100;
766 OfflineMsg = offLineMsg;
769 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
772 rxconnp = cm_GetRxConn(connp);
773 code = RXAFS_GetVolumeStatus(rxconnp, scp->fid.volume,
774 &volStat, &Name, &OfflineMsg, &MOTD);
775 rx_PutConnection(rxconnp);
777 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
778 code = cm_MapRPCError(code, reqp);
784 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
785 cp = ioctlp->outDatap;
786 memcpy(cp, (char *)&volStat, sizeof(AFSFetchVolumeStatus));
787 cp += sizeof(AFSFetchVolumeStatus);
788 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
789 cp += strlen(volName)+1;
790 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
791 cp += strlen(offLineMsg)+1;
792 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
793 cp += strlen(motd)+1;
795 /* return new size */
796 ioctlp->outDatap = cp;
802 * VIOCGETFID internals.
804 * Assumes that pioctl path has been parsed or skipped.
805 * scp is held but not locked.
808 cm_IoctlGetFid(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
813 memset(&fid, 0, sizeof(cm_fid_t));
814 fid.cell = scp->fid.cell;
815 fid.volume = scp->fid.volume;
816 fid.vnode = scp->fid.vnode;
817 fid.unique = scp->fid.unique;
819 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
820 cp = ioctlp->outDatap;
821 memcpy(cp, (char *)&fid, sizeof(cm_fid_t));
822 cp += sizeof(cm_fid_t);
824 /* return new size */
825 ioctlp->outDatap = cp;
831 * VIOC_GETFILETYPE internals.
833 * Assumes that pioctl path has been parsed or skipped.
834 * scp is held but not locked.
837 cm_IoctlGetFileType(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
841 afs_uint32 fileType = 0;
843 if (scp->fileType == 0) {
844 lock_ObtainWrite(&scp->rw);
845 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
846 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
848 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
849 lock_ReleaseWrite(&scp->rw);
853 fileType = scp->fileType;
855 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
856 cp = ioctlp->outDatap;
857 memcpy(cp, (char *)&fileType, sizeof(fileType));
858 cp += sizeof(fileType);
860 /* return new size */
861 ioctlp->outDatap = cp;
867 * VIOCGETOWNER internals.
869 * Assumes that pioctl path has been parsed or skipped.
870 * scp is held but not locked.
873 cm_IoctlGetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
878 lock_ObtainWrite(&scp->rw);
879 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
880 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
882 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
883 lock_ReleaseWrite(&scp->rw);
886 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
887 cp = ioctlp->outDatap;
888 memcpy(cp, (char *)&scp->owner, sizeof(afs_uint32));
889 cp += sizeof(afs_uint32);
890 memcpy(cp, (char *)&scp->group, sizeof(afs_uint32));
891 cp += sizeof(afs_uint32);
893 /* return new size */
894 ioctlp->outDatap = cp;
901 * VIOCWHEREIS internals.
903 * Assumes that pioctl path has been parsed or skipped.
904 * scp is held but not locked.
907 cm_IoctlWhereIs(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
912 cm_serverRef_t **tsrpp, *current;
917 volume = scp->fid.volume;
919 cellp = cm_FindCellByID(scp->fid.cell, 0);
922 return CM_ERROR_NOSUCHCELL;
924 #ifdef AFS_FREELANCE_CLIENT
925 if ( cellp->cellID == AFS_FAKE_ROOT_CELL_ID) {
933 cp = ioctlp->outDatap;
935 memcpy(cp, (char *)&addr, sizeof(addr));
938 /* still room for terminating NULL, add it on */
940 memcpy(cp, (char *)&addr, sizeof(addr));
943 ioctlp->outDatap = cp;
947 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
951 cp = ioctlp->outDatap;
953 tsrpp = cm_GetVolServers(tvp, volume);
954 lock_ObtainRead(&cm_serverLock);
955 for (current = *tsrpp; current; current = current->next) {
956 tsp = current->server;
957 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
960 lock_ReleaseRead(&cm_serverLock);
961 cm_FreeServerList(tsrpp, 0);
963 /* still room for terminating NULL, add it on */
964 volume = 0; /* reuse vbl */
965 memcpy(cp, (char *)&volume, sizeof(long));
968 ioctlp->outDatap = cp;
975 * VIOC_AFS_STAT_MT_PT internals.
977 * Assumes that pioctl path has been parsed or skipped.
978 * scp is held but not locked.
981 cm_IoctlStatMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
987 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
989 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
993 lock_ObtainWrite(&scp->rw);
994 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
995 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
997 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1001 /* now check that this is a real mount point */
1002 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1003 code = CM_ERROR_INVAL;
1007 code = cm_ReadMountPoint(scp, userp, reqp);
1010 strp = ioctlp->outDatap;
1011 StringCbCopyA(strp, SMB_IOCTL_MAXDATA - (strp - ioctlp->outAllocp), scp->mountPointStringp);
1012 strp += strlen(strp) + 1;
1013 ioctlp->outDatap = strp;
1017 lock_ReleaseWrite(&scp->rw);
1018 cm_ReleaseSCache(scp);
1028 * VIOC_AFS_DELETE_MT_PT internals.
1030 * Assumes that pioctl path has been parsed or skipped.
1031 * scp is held but not locked.
1034 cm_IoctlDeleteMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1038 clientchar_t *cp = NULL;
1039 fschar_t *originalName = NULL;
1042 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1044 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1046 /* if something went wrong, bail out now */
1050 lock_ObtainWrite(&scp->rw);
1051 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1052 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1056 /* now check that this is a real mount point */
1057 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1058 code = CM_ERROR_INVAL;
1062 /* time to make the RPC, so drop the lock */
1063 lock_ReleaseWrite(&scp->rw);
1066 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
1068 code = cm_BPlusDirLookupOriginalName(&dirop, cp, &originalName);
1069 /* The cm_Dir* functions can't be used to lookup the
1070 originalName. Those functions only know of the original
1072 cm_EndDirOp(&dirop);
1076 /* If this name doesn't have a non-normalized name associated with
1077 it, we assume that what we had is what is actually present on
1080 if (originalName == NULL) {
1081 originalName = cm_ClientStringToFsStringAlloc(cp, -1, NULL);
1084 /* cp is a normalized name. originalName is the actual name we
1085 saw on the fileserver. */
1086 #ifdef AFS_FREELANCE_CLIENT
1087 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1088 /* we are removing the mount point to the root dir., so call
1089 * the freelance code to do the deletion. */
1090 osi_Log0(afsd_logp,"IoctlDeleteMountPoint from Freelance root dir");
1091 code = cm_FreelanceRemoveMount(originalName);
1095 /* easier to do it this way */
1096 code = cm_Unlink(dscp, originalName, cp, userp, reqp);
1098 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1099 smb_NotifyChange(FILE_ACTION_REMOVED,
1100 FILE_NOTIFY_CHANGE_DIR_NAME,
1101 dscp, cp, NULL, TRUE);
1103 lock_ObtainWrite(&scp->rw);
1105 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1108 cm_DiscardSCache(scp);
1109 lock_ReleaseWrite(&scp->rw);
1110 cm_ReleaseSCache(scp);
1113 if (originalName != NULL)
1123 * VIOCCKSERV internals.
1125 * Assumes that pioctl path has been parsed or skipped.
1128 cm_IoctlCheckServers(struct cm_ioctl *ioctlp, struct cm_user *userp)
1138 tp = ioctlp->inDatap;
1141 memcpy(&temp, tp, sizeof(temp));
1142 if (temp == 0x12345678) { /* For afs3.3 version */
1143 memcpy(&csi, tp, sizeof(csi));
1144 if (csi.tinterval >= 0) {
1145 cp = ioctlp->outDatap;
1146 memcpy(cp, (char *)&cm_daemonCheckDownInterval, sizeof(long));
1147 ioctlp->outDatap += sizeof(long);
1148 if (csi.tinterval > 0) {
1149 if (!smb_SUser(userp))
1150 return CM_ERROR_NOACCESS;
1151 cm_daemonCheckDownInterval = csi.tinterval;
1159 } else { /* For pre afs3.3 versions */
1160 memcpy((char *)&temp, ioctlp->inDatap, sizeof(long));
1161 ioctlp->inDatap = cp = ioctlp->inDatap + sizeof(long);
1162 if (cp - ioctlp->inAllocp < ioctlp->inCopied) /* still more data available */
1167 * 1: fast check, don't contact servers.
1168 * 2: local cell only.
1171 /* have cell name, too */
1172 cellp = cm_GetCell(cp, (temp & 1) ? CM_FLAG_NOPROBE : 0);
1174 return CM_ERROR_NOSUCHCELL;
1177 cellp = (cm_cell_t *) 0;
1178 if (!cellp && (temp & 2)) {
1179 /* use local cell */
1180 fschar_t wscell[CELL_MAXNAMELEN+1];
1181 cm_GetRootCellName(wscell);
1182 cellp = cm_GetCell(wscell, 0);
1184 if (!(temp & 1)) { /* if not fast, call server checker routine */
1185 /* check down servers */
1186 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS | CM_FLAG_CHECKUPSERVERS, cellp);
1189 /* now return the current down server list */
1190 cp = ioctlp->outDatap;
1191 lock_ObtainRead(&cm_serverLock);
1192 for (tsp = cm_allServersp; tsp; tsp=tsp->allNextp) {
1193 if (cellp && tsp->cellp != cellp)
1194 continue; /* cell spec'd and wrong */
1195 if ((tsp->flags & CM_SERVERFLAG_DOWN)
1196 && tsp->type == CM_SERVER_FILE) {
1197 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1201 lock_ReleaseRead(&cm_serverLock);
1203 ioctlp->outDatap = cp;
1208 * VIOCCKBACK internals.
1210 * Assumes that pioctl path has been parsed or skipped.
1213 cm_IoctlCheckVolumes(cm_ioctl_t *ioctlp, cm_user_t *userp)
1215 cm_RefreshVolumes();
1220 * VIOCSETCACHESIZE internals.
1222 * Assumes that pioctl path has been parsed or skipped.
1224 * This function is no longer meaningful in the current day world
1225 * of persistent caches. The buf_SetNBuffers() function will
1229 cm_IoctlSetCacheSize(struct cm_ioctl *ioctlp, struct cm_user *userp)
1234 memcpy(&temp, ioctlp->inDatap, sizeof(temp));
1236 temp = cm_data.buf_nOrigBuffers;
1238 /* temp is in 1K units, convert to # of buffers */
1239 temp = temp / (cm_data.buf_blockSize / 1024);
1242 /* now adjust the cache size */
1243 code = buf_SetNBuffers(temp);
1249 * VIOC_TRACECTL internals.
1251 * Assumes that pioctl path has been parsed or skipped.
1254 cm_IoctlTraceControl(cm_ioctl_t *ioctlp, cm_user_t *userp)
1258 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_uint32));
1262 afsd_ForceTrace(FALSE);
1263 buf_ForceTrace(FALSE);
1267 /* set tracing value to low order bit */
1268 if ((inValue & 1) == 0) {
1269 /* disable tracing */
1270 osi_LogDisable(afsd_logp);
1271 rx_DebugOnOff(FALSE);
1274 /* enable tracing */
1275 osi_LogEnable(afsd_logp);
1276 rx_DebugOnOff(TRUE);
1280 /* see if we're supposed to do a reset, too */
1282 osi_LogReset(afsd_logp);
1285 /* and copy out tracing flag */
1286 inValue = afsd_logp->enabled; /* use as a temp vbl */
1287 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_uint32));
1288 ioctlp->outDatap += sizeof(afs_uint32);
1293 * VIOCGETCACHEPARMS internals.
1295 * Assumes that pioctl path has been parsed or skipped.
1298 cm_IoctlGetCacheParms(struct cm_ioctl *ioctlp, struct cm_user *userp)
1300 cm_cacheParms_t parms;
1302 memset(&parms, 0, sizeof(parms));
1304 /* first we get, in 1K units, the cache size */
1305 parms.parms[0] = cm_data.buf_nbuffers * (cm_data.buf_blockSize / 1024);
1307 /* and then the actual # of buffers in use (not in the free list, I guess,
1308 * will be what we do).
1310 parms.parms[1] = (cm_data.buf_nbuffers - buf_CountFreeList()) * (cm_data.buf_blockSize / 1024);
1312 memcpy(ioctlp->outDatap, &parms, sizeof(parms));
1313 ioctlp->outDatap += sizeof(parms);
1319 * VIOCGETCELL internals.
1321 * Assumes that pioctl path has been parsed or skipped.
1324 cm_IoctlGetCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1329 cm_serverRef_t *serverRefp;
1330 cm_server_t *serverp;
1336 tp = ioctlp->inDatap;
1338 memcpy((char *)&whichCell, tp, sizeof(long));
1341 /* see if more than one long passed in, ignoring the null pathname (the -1) */
1342 if (ioctlp->inCopied-1 > sizeof(afs_uint32)) {
1343 memcpy((char *)&magic, tp, sizeof(afs_uint32));
1346 lock_ObtainRead(&cm_cellLock);
1347 for (tcellp = cm_data.allCellsp; tcellp; tcellp = tcellp->allNextp) {
1352 lock_ReleaseRead(&cm_cellLock);
1355 clientchar_t * cellnamep;
1357 cp = ioctlp->outDatap;
1359 if (magic == 0x12345678) {
1360 memcpy(cp, (char *)&magic, sizeof(long));
1363 memset(cp, 0, max * sizeof(long));
1365 lock_ObtainRead(&cm_serverLock); /* for going down server list */
1366 for (i=0, serverRefp = tcellp->vlServersp;
1367 serverRefp && i<max;
1368 i++, serverRefp = serverRefp->next) {
1369 serverp = serverRefp->server;
1370 memcpy(cp, &serverp->addr.sin_addr.s_addr, sizeof(long));
1373 lock_ReleaseRead(&cm_serverLock);
1374 ioctlp->outDatap = basep + max * sizeof(afs_int32);
1376 cellnamep = cm_FsStringToClientStringAlloc(tcellp->name, -1, NULL);
1377 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1384 return CM_ERROR_NOMORETOKENS; /* mapped to EDOM */
1389 * VIOCNEWCELL internals.
1391 * Assumes that pioctl path has been parsed or skipped.
1394 cm_IoctlNewCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1397 * All that needs to be done is to refresh server information for all cells that
1398 * are already loaded.
1400 * cell list will be cm_CellLock and cm_ServerLock will be held for write.
1404 cm_cell_rock_t rock;
1406 lock_ObtainWrite(&cm_cellLock);
1408 for (cp = cm_data.allCellsp; cp; cp=cp->allNextp)
1412 /* delete all previous server lists - cm_FreeServerList will ask for write on cm_ServerLock*/
1413 cm_FreeServerList(&cp->vlServersp, CM_FREESERVERLIST_DELETE);
1414 cp->vlServersp = NULL;
1415 lock_ReleaseWrite(&cm_cellLock);
1419 code = cm_SearchCellFile(cp->name, cp->name, cm_AddCellProc, &rock);
1420 #ifdef AFS_AFSDB_ENV
1422 if (cm_dnsEnabled) {
1424 code = cm_SearchCellByDNS(cp->name, cp->name, &ttl, cm_AddCellProc, &rock);
1425 if ( code == 0 ) { /* got cell from DNS */
1426 lock_ObtainMutex(&cp->mx);
1427 cp->flags |= CM_CELLFLAG_DNS;
1428 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1429 cp->timeout = time(0) + ttl;
1430 lock_ReleaseMutex(&cp->mx);
1435 lock_ObtainMutex(&cp->mx);
1436 cp->flags &= ~CM_CELLFLAG_DNS;
1437 lock_ReleaseMutex(&cp->mx);
1439 #endif /* AFS_AFSDB_ENV */
1441 lock_ObtainMutex(&cp->mx);
1442 cp->flags |= CM_CELLFLAG_VLSERVER_INVALID;
1443 lock_ReleaseMutex(&cp->mx);
1444 lock_ObtainWrite(&cm_cellLock);
1447 lock_ObtainMutex(&cp->mx);
1448 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1449 lock_ReleaseMutex(&cp->mx);
1450 lock_ObtainWrite(&cm_cellLock);
1451 cm_RandomizeServer(&cp->vlServersp);
1454 lock_ReleaseWrite(&cm_cellLock);
1459 * VIOC_GET_WS_CELL internals.
1461 * Assumes that pioctl path has been parsed or skipped.
1464 cm_IoctlGetWsCell(cm_ioctl_t *ioctlp, cm_user_t *userp)
1468 if (cm_freelanceEnabled) {
1469 if (cm_GetRootCellName(ioctlp->outDatap))
1470 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
1471 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
1472 } else if (cm_data.rootCellp) {
1473 clientchar_t * cellnamep = cm_FsStringToClientStringAlloc(cm_data.rootCellp->name, -1, NULL);
1474 /* return the default cellname to the caller */
1475 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1478 /* if we don't know our default cell, return failure */
1479 code = CM_ERROR_NOSUCHCELL;
1486 * VIOC_AFS_SYSNAME internals.
1488 * Assumes that pioctl path has been parsed or skipped.
1491 cm_IoctlSysName(struct cm_ioctl *ioctlp, struct cm_user *userp)
1493 afs_uint32 setSysName;
1495 clientchar_t *inname = NULL;
1498 memcpy(&setSysName, ioctlp->inDatap, sizeof(afs_uint32));
1499 ioctlp->inDatap += sizeof(afs_uint32);
1503 if ( setSysName < 0 || setSysName > MAXNUMSYSNAMES )
1505 cp2 = ioctlp->inDatap;
1506 for ( cp=ioctlp->inDatap, count = 0; count < setSysName; count++ ) {
1507 /* won't go past end of ioctlp->inDatap since
1508 maxsysname*num < ioctlp->inDatap length */
1509 t = (int)strlen(cp);
1510 if (t >= MAXSYSNAME || t <= 0)
1512 /* check for names that can shoot us in the foot */
1513 if (*cp == '.' && (cp[1] == 0 || (cp[1] == '.' && cp[2] == 0)))
1519 /* inname gets first entry in case we're being a translator */
1520 /* (we are never a translator) */
1521 inname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1524 /* Not xlating, so local case */
1526 osi_panic("cm_IoctlSysName: !cm_sysName\n", __FILE__, __LINE__);
1529 /* Local guy; only root can change sysname */
1530 /* clear @sys entries from the dnlc, once afs_lookup can
1531 * do lookups of @sys entries and thinks it can trust them */
1532 /* privs ok, store the entry, ... */
1534 cm_ClientStrCpy(cm_sysName, lengthof(cm_sysName), inname);
1535 cm_ClientStrCpy(cm_sysNameList[0], MAXSYSNAME, inname);
1537 if (setSysName > 1) { /* ... or list */
1538 for (count = 1; count < setSysName; ++count) {
1539 clientchar_t * newsysname;
1541 if (!cm_sysNameList[count])
1542 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to write\n",
1543 __FILE__, __LINE__);
1545 newsysname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1546 cm_ClientStrCpy(cm_sysNameList[count], MAXSYSNAME, newsysname);
1550 cm_sysNameCount = setSysName;
1554 /* return the sysname to the caller */
1555 i32 = cm_sysNameCount;
1556 memcpy(ioctlp->outDatap, &i32, sizeof(afs_int32));
1557 ioctlp->outDatap += sizeof(afs_int32); /* skip found flag */
1559 if (cm_sysNameCount) {
1560 for ( count=0; count < cm_sysNameCount ; ++count) { /* ... or list */
1561 if ( !cm_sysNameList[count] || *cm_sysNameList[count] == _C('\0'))
1562 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to read\n",
1563 __FILE__, __LINE__);
1564 cm_UnparseIoctlString(ioctlp, NULL, cm_sysNameList[count], -1);
1579 * VIOC_GETCELLSTATUS internals.
1581 * Assumes that pioctl path has been parsed or skipped.
1584 cm_IoctlGetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1588 clientchar_t * cellnamep;
1589 fschar_t * fscellnamep;
1591 cellnamep = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1592 fscellnamep = cm_ClientStringToFsStringAlloc(cellnamep, -1, NULL);
1593 cellp = cm_GetCell(fscellnamep, 0);
1598 return CM_ERROR_NOSUCHCELL;
1601 lock_ObtainMutex(&cellp->mx);
1602 if (cellp->flags & CM_CELLFLAG_SUID)
1603 temp |= CM_SETCELLFLAG_SUID;
1604 lock_ReleaseMutex(&cellp->mx);
1606 /* now copy out parm */
1607 memcpy(ioctlp->outDatap, &temp, sizeof(afs_uint32));
1608 ioctlp->outDatap += sizeof(afs_uint32);
1614 * VIOC_SETCELLSTATUS internals.
1616 * Assumes that pioctl path has been parsed or skipped.
1619 cm_IoctlSetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1624 fschar_t * cellnamep;
1626 temp = cm_ParseIoctlStringAlloc(ioctlp, ioctlp->inDatap + 2*sizeof(afs_uint32));
1627 cellnamep = cm_ClientStringToFsStringAlloc(temp, -1, NULL);
1628 cellp = cm_GetCell(cellnamep, 0);
1633 return CM_ERROR_NOSUCHCELL;
1635 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_uint32));
1637 lock_ObtainMutex(&cellp->mx);
1638 if (flags & CM_SETCELLFLAG_SUID)
1639 cellp->flags |= CM_CELLFLAG_SUID;
1641 cellp->flags &= ~CM_CELLFLAG_SUID;
1642 lock_ReleaseMutex(&cellp->mx);
1648 * VIOC_SETSPREFS internals.
1650 * Assumes that pioctl path has been parsed or skipped.
1653 cm_IoctlSetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1655 cm_SSetPref_t *spin; /* input */
1656 cm_SPref_t *srvin; /* one input component */
1658 int i, vlonly, noServers, type;
1659 struct sockaddr_in tmp;
1660 unsigned short rank;
1662 spin = (cm_SSetPref_t *)ioctlp->inDatap;
1663 noServers = spin->num_servers;
1664 vlonly = spin->flags;
1666 type = CM_SERVER_VLDB;
1668 type = CM_SERVER_FILE;
1670 for ( i=0; i < noServers; i++)
1672 srvin = &(spin->servers[i]);
1673 rank = srvin->rank + (rand() & 0x000f);
1674 tmp.sin_addr = srvin->host;
1675 tmp.sin_family = AF_INET;
1677 tsp = cm_FindServer(&tmp, type);
1678 if ( tsp ) /* an existing server - ref count increased */
1680 tsp->ipRank = rank; /* no need to protect by mutex*/
1682 if (type == CM_SERVER_FILE)
1684 /* find volumes which might have RO copy
1685 /* on server and change the ordering of
1688 cm_ChangeRankVolume(tsp);
1692 /* set preferences for an existing vlserver */
1693 cm_ChangeRankCellVLServer(tsp);
1696 else /* add a new server without a cell */
1698 tsp = cm_NewServer(&tmp, type, NULL, CM_FLAG_NOPROBE); /* refcount = 1 */
1701 lock_ObtainMutex(&tsp->mx);
1702 tsp->flags |= CM_SERVERFLAG_PREF_SET;
1703 lock_ReleaseMutex(&tsp->mx);
1704 cm_PutServer(tsp); /* decrease refcount */
1710 * VIOC_GETSPREFS internals.
1712 * Assumes that pioctl path has been parsed or skipped.
1715 cm_IoctlGetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1717 cm_SPrefRequest_t *spin; /* input */
1718 cm_SPrefInfo_t *spout; /* output */
1719 cm_SPref_t *srvout; /* one output component */
1721 int i, vlonly, noServers;
1723 spin = (cm_SPrefRequest_t *)ioctlp->inDatap;
1724 spout = (cm_SPrefInfo_t *) ioctlp->outDatap;
1725 srvout = spout->servers;
1726 noServers = spin->num_servers;
1727 vlonly = spin->flags & CM_SPREF_VLONLY;
1728 spout->num_servers = 0;
1730 lock_ObtainRead(&cm_serverLock); /* get server lock */
1732 for (tsp=cm_allServersp, i=0; tsp && noServers; tsp=tsp->allNextp,i++){
1733 if (spin->offset > i) {
1734 continue; /* catch up to where we left off */
1737 if ( vlonly && (tsp->type == CM_SERVER_FILE) )
1738 continue; /* ignore fileserver for -vlserver option*/
1739 if ( !vlonly && (tsp->type == CM_SERVER_VLDB) )
1740 continue; /* ignore vlservers */
1742 srvout->host = tsp->addr.sin_addr;
1743 srvout->rank = tsp->ipRank;
1745 spout->num_servers++;
1748 lock_ReleaseRead(&cm_serverLock); /* release server lock */
1750 if ( tsp ) /* we ran out of space in the output buffer */
1751 spout->next_offset = i;
1753 spout->next_offset = 0;
1754 ioctlp->outDatap += sizeof(cm_SPrefInfo_t) +
1755 (spout->num_servers -1 ) * sizeof(cm_SPref_t) ;
1761 * VIOC_AFS_CREATE_MT_PT internals.
1763 * Assumes that pioctl path has been parsed or skipped.
1764 * dscp is held but not locked.
1767 cm_IoctlCreateMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1772 fschar_t mpInfo[512]; /* mount point string */
1773 fschar_t fullCell[CELL_MAXNAMELEN];
1774 fschar_t *fscell = NULL;
1775 fschar_t *fsvolume = NULL;
1776 clientchar_t volume[VL_MAXNAMELEN];
1777 clientchar_t *mpp = NULL;
1778 clientchar_t *cell = NULL;
1779 cm_volume_t *volp = NULL;
1780 cm_cell_t *cellp = NULL;
1784 * The fs command allows the user to specify partial cell names on NT. These must
1785 * be expanded to the full cell name for mount points so that the mount points will
1786 * work on UNIX clients.
1789 /* Extract the possibly partial cell name */
1790 mpp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1791 cell = cm_ClientCharNext(mpp);
1792 if (cp = cm_ClientStrChr(cell, ':')) {
1794 /* Extract the volume name */
1796 cm_ClientStrCpy(volume, lengthof(volume), cm_ClientCharNext(cp));
1798 fscell = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1799 fsvolume = cm_ClientStringToFsStringAlloc(volume, -1, NULL);
1801 /* Get the full name for this cell */
1802 cellp = cm_GetCell_Gen(fscell, fullCell, CM_FLAG_NOPROBE);
1804 code = CM_ERROR_NOSUCHCELL;
1808 StringCbPrintfA(mpInfo, sizeof(mpInfo), "%c%s:%s", (char) *mpp,
1809 fullCell, fsvolume);
1812 /* No cell name specified, so cell points at the volume instead. */
1813 fsvolume = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1814 cm_ClientStringToFsString(mpp, -1, mpInfo, lengthof(mpInfo));
1815 cellp = cm_FindCellByID(dscp->fid.cell, CM_FLAG_NOPROBE);
1818 /* remove the trailing dot if it is present */
1819 len = strlen(fsvolume);
1820 if (len > 1 && fsvolume[len-1] == '.')
1821 fsvolume[len-1] = '\0';
1823 /* validate the target info */
1824 if (cm_VolNameIsID(fsvolume)) {
1825 code = cm_FindVolumeByID(cellp, atoi(fsvolume), userp, reqp,
1826 CM_GETVOL_FLAG_CREATE, &volp);
1828 code = cm_FindVolumeByName(cellp, fsvolume, userp, reqp,
1829 CM_GETVOL_FLAG_CREATE, &volp);
1834 #ifdef AFS_FREELANCE_CLIENT
1835 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1836 /* we are adding the mount point to the root dir, so call
1837 * the freelance code to do the add. */
1838 fschar_t * fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1839 osi_Log0(afsd_logp,"IoctlCreateMountPoint within Freelance root dir");
1840 code = cm_FreelanceAddMount(fsleaf, fullCell, fsvolume, *mpInfo == '%', NULL);
1845 /* create the symlink with mode 644. The lack of X bits tells
1846 * us that it is a mount point.
1848 tattr.mask = CM_ATTRMASK_UNIXMODEBITS | CM_ATTRMASK_CLIENTMODTIME;
1849 tattr.unixModeBits = 0644;
1850 tattr.clientModTime = time(NULL);
1852 code = cm_SymLink(dscp, leaf, mpInfo, 0, &tattr, userp, reqp);
1855 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1856 smb_NotifyChange(FILE_ACTION_ADDED,
1857 FILE_NOTIFY_CHANGE_DIR_NAME,
1858 dscp, leaf, NULL, TRUE);
1874 * VIOC_SYMLINK internals.
1876 * Assumes that pioctl path has been parsed or skipped.
1877 * dscp is held but not locked.
1880 cm_IoctlSymlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1886 int free_syml = FALSE;
1888 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1889 /* Translate chars for the linked to name */
1890 TranslateExtendedChars(ioctlp->inDatap);
1893 cp = symlp = ioctlp->inDatap; /* contents of link */
1895 #ifdef AFS_FREELANCE_CLIENT
1896 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1897 /* we are adding the symlink to the root dir., so call
1898 * the freelance code to do the add. */
1901 if (cp[0] == cp[1] && cp[1] == '\\' &&
1902 !_strnicmp(cm_NetbiosName,cp+2,strlen(cm_NetbiosName)))
1904 /* skip \\AFS\ or \\AFS\all\ */
1906 p = cp + 2 + strlen(cm_NetbiosName) + 1;
1907 if ( !_strnicmp("all", p, 3) )
1912 osi_Log0(afsd_logp,"IoctlCreateSymlink within Freelance root dir");
1913 fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1914 code = cm_FreelanceAddSymlink(fsleaf, cp, NULL);
1919 /* Create symlink with mode 0755. */
1920 tattr.mask = CM_ATTRMASK_UNIXMODEBITS;
1921 tattr.unixModeBits = 0755;
1923 code = cm_SymLink(dscp, leaf, cp, 0, &tattr, userp, reqp);
1926 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1927 smb_NotifyChange(FILE_ACTION_ADDED,
1928 FILE_NOTIFY_CHANGE_FILE_NAME
1929 | FILE_NOTIFY_CHANGE_DIR_NAME,
1930 dscp, leaf, NULL, TRUE);
1936 * VIOC_LISTSYMLINK internals.
1938 * Assumes that pioctl path has been parsed or skipped.
1939 * dscp is held but not locked.
1942 cm_IoctlListlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1948 cm_scache_t *newRootScp;
1949 clientchar_t *clientp;
1951 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1952 /* Translate chars for the link name */
1953 TranslateExtendedChars(ioctlp->inDatap);
1955 cp = ioctlp->inDatap;
1957 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
1958 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1963 /* Check that it's a real symlink */
1964 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
1965 scp->fileType != CM_SCACHETYPE_DFSLINK &&
1966 scp->fileType != CM_SCACHETYPE_INVALID) {
1967 cm_ReleaseSCache(scp);
1968 return CM_ERROR_INVAL;
1971 code = cm_AssembleLink(scp, "", &newRootScp, &spacep, userp, reqp);
1972 cm_ReleaseSCache(scp);
1975 cp = ioctlp->outDatap;
1976 if (newRootScp != NULL) {
1977 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), cm_mountRoot);
1978 StringCbCatA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), "/");
1982 linkstr = cm_ClientStringToFsStringAlloc(spacep->wdata, -1, NULL);
1983 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), linkstr);
1984 cp += strlen(cp) + 1;
1985 ioctlp->outDatap = cp;
1986 cm_FreeSpace(spacep);
1988 if (newRootScp != NULL)
1989 cm_ReleaseSCache(newRootScp);
1991 } else if (code == CM_ERROR_PATH_NOT_COVERED &&
1992 scp->fileType == CM_SCACHETYPE_DFSLINK ||
1993 code == CM_ERROR_NOSUCHPATH &&
1994 scp->fileType == CM_SCACHETYPE_INVALID) {
1996 cp = ioctlp->outDatap;
1997 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), scp->mountPointStringp);
1998 cp += strlen(cp) + 1;
1999 ioctlp->outDatap = cp;
2007 * VIOC_ISSYMLINK internals.
2009 * Assumes that pioctl path has been parsed or skipped.
2010 * dscp is held but not locked.
2013 cm_IoctlIslink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2014 {/*CHECK FOR VALID SYMLINK*/
2018 clientchar_t *clientp;
2020 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2021 /* Translate chars for the link name */
2022 TranslateExtendedChars(ioctlp->inDatap);
2024 cp = ioctlp->inDatap;
2025 osi_LogEvent("cm_IoctlListlink",NULL," name[%s]",cp);
2027 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2028 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2033 /* Check that it's a real symlink */
2034 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2035 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2036 scp->fileType != CM_SCACHETYPE_INVALID)
2037 code = CM_ERROR_INVAL;
2038 cm_ReleaseSCache(scp);
2043 * VIOC_DELSYMLINK internals.
2045 * Assumes that pioctl path has been parsed or skipped.
2046 * dscp is held but not locked.
2049 cm_IoctlDeletelink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2054 char * originalName = NULL;
2056 clientchar_t *clientp;
2058 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2059 /* Translate chars for the link name */
2060 TranslateExtendedChars(ioctlp->inDatap);
2062 cp = ioctlp->inDatap;
2064 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2065 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2067 /* if something went wrong, bail out now */
2071 lock_ObtainWrite(&scp->rw);
2072 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2073 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2077 /* now check that this is a real symlink */
2078 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2079 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2080 scp->fileType != CM_SCACHETYPE_INVALID) {
2081 code = CM_ERROR_INVAL;
2085 /* time to make the RPC, so drop the lock */
2086 lock_ReleaseWrite(&scp->rw);
2089 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
2091 code = cm_BPlusDirLookupOriginalName(&dirop, clientp, &originalName);
2092 /* cm_Dir*() functions can't be used to lookup the original
2093 name since those functions only know of the original
2095 cm_EndDirOp(&dirop);
2099 /* If this name doesn't have a non-normalized name associated with
2100 it, we assume that what we had is what is actually present on
2103 if (originalName == NULL)
2106 /* cp is a normalized name. originalName is the actual name we
2107 saw on the fileserver. */
2110 #ifdef AFS_FREELANCE_CLIENT
2111 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2112 /* we are adding the mount point to the root dir., so call
2113 * the freelance code to do the add. */
2114 osi_Log0(afsd_logp,"IoctlDeletelink from Freelance root dir");
2115 code = cm_FreelanceRemoveSymlink(originalName);
2119 /* easier to do it this way */
2120 code = cm_Unlink(dscp, originalName, clientp, userp, reqp);
2122 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2123 smb_NotifyChange(FILE_ACTION_REMOVED,
2124 FILE_NOTIFY_CHANGE_FILE_NAME
2125 | FILE_NOTIFY_CHANGE_DIR_NAME,
2126 dscp, clientp, NULL, TRUE);
2128 if (originalName != NULL && originalName != cp) {
2130 originalName = NULL;
2133 lock_ObtainWrite(&scp->rw);
2135 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2138 cm_DiscardSCache(scp);
2139 lock_ReleaseWrite(&scp->rw);
2140 cm_ReleaseSCache(scp);
2149 /* Utility function. Not currently used.
2150 * This function performs a PTS lookup which has traditionally
2151 * not been performed by the cache manager.
2154 cm_UsernameToId(char *uname, cm_ucell_t * ucellp, afs_uint32* uid)
2159 static struct afsconf_cell info;
2160 struct rx_connection *serverconns[MAXSERVERS];
2161 struct rx_securityClass *sc[3];
2162 afs_int32 scIndex = 2; /* authenticated - we have a token */
2163 struct ubik_client *pruclient = NULL;
2164 struct afsconf_dir *tdir;
2168 tdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH);
2169 code = afsconf_GetCellInfo(tdir, ucellp->cellp->name, "afsprot", &info);
2170 afsconf_Close(tdir);
2176 /* we have the token that was given to us in the settoken
2177 * call. we just have to use it.
2179 scIndex = 2; /* kerberos ticket */
2180 sc[2] = rxkad_NewClientSecurityObject(rxkad_clear, &ucellp->sessionKey,
2181 ucellp->kvno, ucellp->ticketLen,
2184 memset(serverconns, 0, sizeof(serverconns)); /* terminate list!!! */
2185 for (i = 0; i < info.numServers; i++)
2187 rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
2188 info.hostAddr[i].sin_port, PRSRV, sc[scIndex],
2191 code = ubik_ClientInit(serverconns, &pruclient);
2196 code = rxs_Release(sc[scIndex]);
2198 lids.idlist_len = 0;
2199 lids.idlist_val = 0;
2200 lnames.namelist_len = 1;
2201 lnames.namelist_val = (prname *) malloc(PR_MAXNAMELEN);
2202 strncpy(lnames.namelist_val[0], uname, PR_MAXNAMELEN);
2203 lnames.namelist_val[0][PR_MAXNAMELEN-1] = '\0';
2204 for ( p=lnames.namelist_val[0], r=NULL; *p; p++ ) {
2210 if (r && !cm_stricmp_utf8(r+1,ucellp->cellp->name))
2213 code = ubik_PR_NameToID(pruclient, 0, &lnames, &lids);
2214 if (lids.idlist_val) {
2215 *uid = *lids.idlist_val;
2216 free(lids.idlist_val);
2218 if (lnames.namelist_val)
2219 free(lnames.namelist_val);
2222 ubik_ClientDestroy(pruclient);
2228 #endif /* QUERY_AFSID */
2231 /* This has been copied to smb_IoctlSetToken in its entirety.
2232 * An equivalent version will need to be produced for the
2233 * redirector and some extensive refactoring might be required.
2236 cm_IoctlSetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2243 struct ClearToken ct;
2251 int release_userp = 0;
2254 saveDataPtr = ioctlp->inDatap;
2256 cm_SkipIoctlPath(ioctlp);
2258 tp = ioctlp->inDatap;
2261 memcpy(&ticketLen, tp, sizeof(ticketLen));
2262 tp += sizeof(ticketLen);
2263 if (ticketLen < MINKTCTICKETLEN || ticketLen > MAXKTCTICKETLEN)
2264 return CM_ERROR_INVAL;
2266 /* remember ticket and skip over it for now */
2270 /* clear token size */
2271 memcpy(&ctSize, tp, sizeof(ctSize));
2272 tp += sizeof(ctSize);
2273 if (ctSize != sizeof(struct ClearToken))
2274 return CM_ERROR_INVAL;
2277 memcpy(&ct, tp, ctSize);
2279 if (ct.AuthHandle == -1)
2280 ct.AuthHandle = 999; /* more rxvab compat stuff */
2282 /* more stuff, if any */
2283 if (ioctlp->inCopied > tp - saveDataPtr) {
2284 /* flags: logon flag */
2285 memcpy(&flags, tp, sizeof(int));
2289 cellp = cm_GetCell(tp, CM_FLAG_CREATE | CM_FLAG_NOPROBE);
2291 return CM_ERROR_NOSUCHCELL;
2292 tp += strlen(tp) + 1;
2296 tp += strlen(tp) + 1;
2298 if (flags & PIOCTL_LOGON) {
2299 /* SMB user name with which to associate tokens */
2301 osi_Log2(smb_logp,"cm_IoctlSetToken for user [%s] smbname [%s]",
2302 osi_LogSaveString(smb_logp,uname), osi_LogSaveString(smb_logp,smbname));
2303 fprintf(stderr, "SMB name = %s\n", smbname);
2304 tp += strlen(tp) + 1;
2306 osi_Log1(smb_logp,"cm_IoctlSetToken for user [%s]",
2307 osi_LogSaveString(smb_logp, uname));
2311 memcpy(&uuid, tp, sizeof(uuid));
2312 if (!cm_FindTokenEvent(uuid, sessionKey))
2313 return CM_ERROR_INVAL;
2315 cellp = cm_data.rootCellp;
2316 osi_Log0(smb_logp,"cm_IoctlSetToken - no name specified");
2319 if (flags & PIOCTL_LOGON) {
2320 userp = smb_FindCMUserByName(smbname, ioctlp->fidp->vcp->rname,
2321 SMB_FLAG_CREATE|SMB_FLAG_AFSLOGON);
2325 /* store the token */
2326 lock_ObtainMutex(&userp->mx);
2327 ucellp = cm_GetUCell(userp, cellp);
2328 osi_Log1(smb_logp,"cm_IoctlSetToken ucellp %lx", ucellp);
2329 ucellp->ticketLen = ticketLen;
2330 if (ucellp->ticketp)
2331 free(ucellp->ticketp); /* Discard old token if any */
2332 ucellp->ticketp = malloc(ticketLen);
2333 memcpy(ucellp->ticketp, ticket, ticketLen);
2335 * Get the session key from the RPC, rather than from the pioctl.
2338 memcpy(&ucellp->sessionKey, ct.HandShakeKey, sizeof(ct.HandShakeKey));
2340 memcpy(ucellp->sessionKey.data, sessionKey, sizeof(sessionKey));
2341 ucellp->kvno = ct.AuthHandle;
2342 ucellp->expirationTime = ct.EndTimestamp;
2345 ucellp->uid = ANONYMOUSID;
2348 StringCbCopyA(ucellp->userName, MAXKTCNAMELEN, uname);
2350 cm_UsernameToId(uname, ucellp, &ucellp->uid);
2353 ucellp->flags |= CM_UCELLFLAG_RXKAD;
2354 lock_ReleaseMutex(&userp->mx);
2356 if (flags & PIOCTL_LOGON) {
2357 ioctlp->flags |= CM_IOCTLFLAG_LOGON;
2360 cm_ResetACLCache(userp);
2363 cm_ReleaseUser(userp);
2370 * VIOC_GETTOK internals.
2372 * Assumes that pioctl path has been parsed or skipped.
2375 cm_IoctlGetTokenIter(struct cm_ioctl *ioctlp, struct cm_user *userp)
2381 struct ClearToken ct;
2383 tp = ioctlp->inDatap;
2384 cp = ioctlp->outDatap;
2387 memcpy(&iterator, tp, sizeof(iterator));
2388 tp += sizeof(iterator);
2390 lock_ObtainMutex(&userp->mx);
2392 /* look for token */
2393 for (;;iterator++) {
2394 ucellp = cm_FindUCell(userp, iterator);
2396 lock_ReleaseMutex(&userp->mx);
2397 return CM_ERROR_NOMORETOKENS;
2399 if (ucellp->flags & CM_UCELLFLAG_RXKAD)
2404 temp = ucellp->iterator + 1;
2405 memcpy(cp, &temp, sizeof(temp));
2409 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2410 cp += sizeof(ucellp->ticketLen);
2413 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2414 cp += ucellp->ticketLen;
2416 /* clear token size */
2418 memcpy(cp, &temp, sizeof(temp));
2422 ct.AuthHandle = ucellp->kvno;
2425 * This field is supposed to hold the session key
2426 * but we don't want to make it easier for someone
2427 * to attack the cache. The user gave us the session
2428 * key in the first place.
2430 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2431 ct.ViceId = 37; /* XXX */
2432 ct.BeginTimestamp = 0; /* XXX */
2433 ct.EndTimestamp = ucellp->expirationTime;
2434 memcpy(cp, &ct, sizeof(ct));
2437 /* Primary flag (unused) */
2439 memcpy(cp, &temp, sizeof(temp));
2443 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2444 cp += strlen(cp) + 1;
2447 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2448 cp += strlen(cp) + 1;
2450 ioctlp->outDatap = cp;
2452 lock_ReleaseMutex(&userp->mx);
2458 * VIOC_NEWGETTOK internals.
2460 * Assumes that pioctl path has been parsed or skipped.
2463 cm_IoctlGetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2469 struct ClearToken ct;
2473 tp = ioctlp->inDatap;
2475 cp = ioctlp->outDatap;
2477 /* cell name is right here */
2478 cellp = cm_GetCell(tp, 0);
2480 return CM_ERROR_NOSUCHCELL;
2481 tp += strlen(tp) + 1;
2484 memcpy(&uuid, tp, sizeof(uuid));
2486 lock_ObtainMutex(&userp->mx);
2488 ucellp = cm_GetUCell(userp, cellp);
2489 if (!ucellp || !(ucellp->flags & CM_UCELLFLAG_RXKAD)) {
2490 lock_ReleaseMutex(&userp->mx);
2491 return CM_ERROR_NOMORETOKENS;
2495 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2496 cp += sizeof(ucellp->ticketLen);
2499 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2500 cp += ucellp->ticketLen;
2502 /* clear token size */
2504 memcpy(cp, &temp, sizeof(temp));
2508 ct.AuthHandle = ucellp->kvno;
2510 /* do not give out the session key */
2511 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2512 ct.ViceId = 37; /* XXX */
2513 ct.BeginTimestamp = 0; /* XXX */
2514 ct.EndTimestamp = ucellp->expirationTime;
2515 memcpy(cp, &ct, sizeof(ct));
2518 /* Primary flag (unused) */
2520 memcpy(cp, &temp, sizeof(temp));
2524 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2525 cp += strlen(cp) + 1;
2528 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2529 cp += strlen(cp) + 1;
2531 ioctlp->outDatap = cp;
2533 lock_ReleaseMutex(&userp->mx);
2535 cm_RegisterNewTokenEvent(uuid, ucellp->sessionKey.data);
2541 * VIOCDELTOK internals.
2543 * Assumes that pioctl path has been parsed or skipped.
2546 cm_IoctlDelToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2552 cp = ioctlp->outDatap;
2554 /* cell name is right here */
2555 cellp = cm_GetCell(ioctlp->inDatap, 0);
2557 return CM_ERROR_NOSUCHCELL;
2559 lock_ObtainMutex(&userp->mx);
2561 ucellp = cm_GetUCell(userp, cellp);
2563 lock_ReleaseMutex(&userp->mx);
2564 return CM_ERROR_NOMORETOKENS;
2567 osi_Log1(smb_logp,"cm_IoctlDelToken ucellp %lx", ucellp);
2569 if (ucellp->ticketp) {
2570 free(ucellp->ticketp);
2571 ucellp->ticketp = NULL;
2573 ucellp->ticketLen = 0;
2574 memset(ucellp->sessionKey.data, 0, 8);
2576 ucellp->expirationTime = 0;
2577 ucellp->userName[0] = '\0';
2578 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2581 lock_ReleaseMutex(&userp->mx);
2583 cm_ResetACLCache(userp);
2589 * VIOCDELALLTOK internals.
2591 * Assumes that pioctl path has been parsed or skipped.
2594 cm_IoctlDelAllToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2598 lock_ObtainMutex(&userp->mx);
2600 for (ucellp = userp->cellInfop; ucellp; ucellp = ucellp->nextp) {
2601 osi_Log1(smb_logp,"cm_IoctlDelAllToken ucellp %lx", ucellp);
2603 if (ucellp->ticketp) {
2604 free(ucellp->ticketp);
2605 ucellp->ticketp = NULL;
2607 ucellp->ticketLen = 0;
2608 memset(ucellp->sessionKey.data, 0, 8);
2610 ucellp->expirationTime = 0;
2611 ucellp->userName[0] = '\0';
2612 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2616 lock_ReleaseMutex(&userp->mx);
2618 cm_ResetACLCache(userp);
2624 * VIOC_MAKESUBMOUNT internals. (This function should be deprecated)
2626 * Assumes that pioctl path has been parsed or skipped.
2629 cm_IoctlMakeSubmount(cm_ioctl_t *ioctlp, cm_user_t *userp)
2631 char afspath[MAX_PATH];
2633 int nextAutoSubmount;
2635 DWORD dwType, dwSize;
2640 /* Serialize this one, to prevent simultaneous mods
2643 lock_ObtainMutex(&cm_Afsdsbmt_Lock);
2645 /* Parse the input parameters--first the required afs path,
2646 * then the requested submount name (which may be "").
2648 cm_NormalizeAfsPathAscii(afspath, sizeof(afspath), ioctlp->inDatap);
2649 submountreqp = ioctlp->inDatap + (strlen(ioctlp->inDatap)+1);
2651 /* If the caller supplied a suggested submount name, see if
2652 * that submount name is in use... if so, the submount's path
2653 * has to match our path.
2656 RegCreateKeyEx( HKEY_LOCAL_MACHINE,
2657 AFSREG_CLT_OPENAFS_SUBKEY "\\Submounts",
2660 REG_OPTION_NON_VOLATILE,
2661 KEY_READ|KEY_WRITE|KEY_QUERY_VALUE,
2666 if (submountreqp && *submountreqp) {
2667 char submountPath[MAX_PATH];
2669 dwSize = sizeof(submountPath);
2670 status = RegQueryValueEx( hkSubmounts, submountreqp, 0,
2671 &dwType, submountPath, &dwSize);
2673 if (status != ERROR_SUCCESS) {
2675 /* The suggested submount name isn't in use now--
2676 * so we can safely map the requested submount name
2677 * to the supplied path. Remember not to write the
2678 * leading "/afs" when writing out the submount.
2680 RegSetValueEx( hkSubmounts, submountreqp, 0,
2682 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2683 &afspath[strlen(cm_mountRoot)]:"/",
2684 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2685 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2687 RegCloseKey( hkSubmounts );
2688 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2689 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2690 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2694 /* The suggested submount name is already in use--if the
2695 * supplied path matches the submount's path, we can still
2696 * use the suggested submount name.
2698 if (!strcmp (submountPath, afspath)) {
2699 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2700 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2701 RegCloseKey( hkSubmounts );
2702 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2707 RegQueryInfoKey( hkSubmounts,
2709 NULL, /* lpcClass */
2710 NULL, /* lpReserved */
2711 NULL, /* lpcSubKeys */
2712 NULL, /* lpcMaxSubKeyLen */
2713 NULL, /* lpcMaxClassLen */
2714 &dwSubmounts, /* lpcValues */
2715 NULL, /* lpcMaxValueNameLen */
2716 NULL, /* lpcMaxValueLen */
2717 NULL, /* lpcbSecurityDescriptor */
2718 NULL /* lpftLastWriteTime */
2722 /* Having obtained a list of all available submounts, start
2723 * searching that list for a path which matches the requested
2724 * AFS path. We'll also keep track of the highest "auto15"/"auto47"
2725 * submount, in case we need to add a new one later.
2728 nextAutoSubmount = 1;
2730 for ( dwIndex = 0; dwIndex < dwSubmounts; dwIndex ++ ) {
2731 char submountPath[MAX_PATH] = "";
2732 DWORD submountPathLen = sizeof(submountPath);
2733 char submountName[MAX_PATH];
2734 DWORD submountNameLen = sizeof(submountName);
2737 RegEnumValue( hkSubmounts, dwIndex, submountName, &submountNameLen, NULL,
2738 &dwType, submountPath, &submountPathLen);
2739 if (dwType == REG_EXPAND_SZ) {
2741 StringCbCopyA(buf, MAX_PATH, submountPath);
2742 submountPathLen = ExpandEnvironmentStrings(buf, submountPath, MAX_PATH);
2743 if (submountPathLen > MAX_PATH)
2747 /* If this is an Auto### submount, remember its ### value */
2748 if ((!strnicmp (submountName, "auto", 4)) &&
2749 (isdigit (submountName[strlen("auto")]))) {
2750 int thisAutoSubmount;
2751 thisAutoSubmount = atoi (&submountName[strlen("auto")]);
2752 nextAutoSubmount = max (nextAutoSubmount,
2753 thisAutoSubmount+1);
2756 if ((submountPathLen == 0) ||
2757 (submountPathLen == sizeof(submountPath) - 1)) {
2761 /* See if the path for this submount matches the path
2762 * that our caller specified. If so, we can return
2765 if (!strcmp (submountPath, afspath)) {
2766 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountName);
2767 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2768 RegCloseKey(hkSubmounts);
2769 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2775 /* We've been through the entire list of existing submounts, and
2776 * didn't find any which matched the specified path. So, we'll
2777 * just have to add one. Remember not to write the leading "/afs"
2778 * when writing out the submount.
2781 StringCbPrintfA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "auto%ld", nextAutoSubmount);
2783 RegSetValueEx( hkSubmounts,
2787 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2788 &afspath[strlen(cm_mountRoot)]:"/",
2789 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2790 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2792 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2793 RegCloseKey(hkSubmounts);
2794 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2799 * VIOC_GETRXKCRYPT internals.
2801 * Assumes that pioctl path has been parsed or skipped.
2804 cm_IoctlGetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2806 memcpy(ioctlp->outDatap, &cryptall, sizeof(cryptall));
2807 ioctlp->outDatap += sizeof(cryptall);
2813 * VIOC_SETRXKCRYPT internals.
2815 * Assumes that pioctl path has been parsed or skipped.
2818 cm_IoctlSetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2820 afs_int32 c = cryptall;
2822 memcpy(&cryptall, ioctlp->inDatap, sizeof(cryptall));
2824 if (c != cryptall) {
2826 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_ON);
2828 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_OFF);
2834 * VIOC_RXSTAT_PROC internals.
2836 * Assumes that pioctl path has been parsed or skipped.
2839 cm_IoctlRxStatProcess(struct cm_ioctl *ioctlp, struct cm_user *userp)
2844 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2845 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2848 if (flags & AFSCALL_RXSTATS_ENABLE) {
2849 rx_enableProcessRPCStats();
2851 if (flags & AFSCALL_RXSTATS_DISABLE) {
2852 rx_disableProcessRPCStats();
2854 if (flags & AFSCALL_RXSTATS_CLEAR) {
2855 rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
2861 * VIOC_RXSTAT_PEER internals.
2863 * Assumes that pioctl path has been parsed or skipped.
2866 cm_IoctlRxStatPeer(struct cm_ioctl *ioctlp, struct cm_user *userp)
2871 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2872 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2875 if (flags & AFSCALL_RXSTATS_ENABLE) {
2876 rx_enablePeerRPCStats();
2878 if (flags & AFSCALL_RXSTATS_DISABLE) {
2879 rx_disablePeerRPCStats();
2881 if (flags & AFSCALL_RXSTATS_CLEAR) {
2882 rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
2888 * VIOC_UNICODECTL internals.
2890 * Assumes that pioctl path has been parsed or skipped.
2893 cm_IoctlUnicodeControl(struct cm_ioctl *ioctlp, struct cm_user * userp)
2895 afs_int32 result = 0;
2899 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
2902 /* Setting the Unicode flag */
2905 newflag = ((cmd & 1) == 1);
2907 InterlockedExchange(&smb_UseUnicode, newflag);
2910 result = smb_UseUnicode;
2915 memcpy(ioctlp->outDatap, &result, sizeof(result));
2916 ioctlp->outDatap += sizeof(result);
2922 * VIOC_UUIDCTL internals.
2924 * Assumes that pioctl path has been parsed or skipped.
2927 cm_IoctlUUIDControl(struct cm_ioctl * ioctlp, struct cm_user *userp)
2932 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
2934 if (cmd) { /* generate a new UUID */
2935 UuidCreate((UUID *) &uuid);
2936 cm_data.Uuid = uuid;
2937 cm_ForceNewConnectionsAllServers();
2940 memcpy(ioctlp->outDatap, &cm_data.Uuid, sizeof(cm_data.Uuid));
2941 ioctlp->outDatap += sizeof(cm_data.Uuid);
2949 * functions to dump contents of various structures.
2950 * In debug build (linked with crt debug library) will dump allocated but not freed memory
2952 extern int cm_DumpSCache(FILE *outputFile, char *cookie, int lock);
2953 extern int cm_DumpBufHashTable(FILE *outputFile, char *cookie, int lock);
2956 * VIOC_TRACEMEMDUMP internals.
2958 * Assumes that pioctl path has been parsed or skipped.
2959 * dscp is held but not locked.
2962 cm_IoctlMemoryDump(struct cm_ioctl *ioctlp, struct cm_user *userp)
2964 afs_int32 inValue = 0;
2966 char logfileName[MAX_PATH+1];
2971 static _CrtMemState memstate;
2974 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_int32));
2976 dwSize = GetEnvironmentVariable("TEMP", logfileName, sizeof(logfileName));
2977 if ( dwSize == 0 || dwSize > sizeof(logfileName) )
2979 GetWindowsDirectory(logfileName, sizeof(logfileName));
2981 strncat(logfileName, "\\afsd_alloc.log", sizeof(logfileName));
2983 hLogFile = CreateFile(logfileName, GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
2989 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_int32));
2990 ioctlp->outDatap += sizeof(afs_int32);
2995 SetFilePointer(hLogFile, 0, NULL, FILE_END);
2997 cookie = inValue ? "b" : "e";
3003 _CrtMemCheckpoint(&memstate);
3007 _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
3008 _CrtSetReportFile(_CRT_WARN, hLogFile);
3009 _CrtMemDumpAllObjectsSince(&memstate);
3013 /* dump all interesting data */
3014 cm_MemDumpDirStats(hLogFile, cookie, 1);
3015 cm_MemDumpBPlusStats(hLogFile, cookie, 1);
3016 cm_DumpCells(hLogFile, cookie, 1);
3017 cm_DumpVolumes(hLogFile, cookie, 1);
3018 cm_DumpSCache(hLogFile, cookie, 1);
3019 cm_DumpBufHashTable(hLogFile, cookie, 1);
3020 smb_DumpVCP(hLogFile, cookie, 1);
3022 CloseHandle(hLogFile);
3024 inValue = 0; /* success */
3025 memcpy(ioctlp->outDatap, &inValue, sizeof(long));
3026 ioctlp->outDatap += sizeof(long);
3031 /* Utility functon. Not currently used. */
3033 cm_CheckServersStatus(cm_serverRef_t *serversp)
3036 cm_serverRef_t *tsrp;
3038 int someBusy = 0, someOffline = 0, allOffline = 1, allBusy = 1, allDown = 1;
3040 if (serversp == NULL) {
3041 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", CM_ERROR_ALLDOWN);
3042 return CM_ERROR_ALLDOWN;
3045 lock_ObtainRead(&cm_serverLock);
3046 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
3047 if (tsp = tsrp->server) {
3048 cm_GetServerNoLock(tsp);
3049 lock_ReleaseRead(&cm_serverLock);
3050 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
3052 if (tsrp->status == srv_busy) {
3055 } else if (tsrp->status == srv_offline) {
3065 lock_ObtainRead(&cm_serverLock);
3066 cm_PutServerNoLock(tsp);
3069 lock_ReleaseRead(&cm_serverLock);
3072 code = CM_ERROR_ALLDOWN;
3074 code = CM_ERROR_ALLBUSY;
3075 else if (allOffline || (someBusy && someOffline))
3076 code = CM_ERROR_ALLOFFLINE;
3079 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", code);
3084 * VIOC_PATH_AVAILABILITY internals.
3086 * Assumes that pioctl path has been parsed or skipped.
3087 * scp is held but not locked.
3090 cm_IoctlPathAvailability(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3095 cm_vol_state_t *statep;
3098 #ifdef AFS_FREELANCE_CLIENT
3099 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
3104 volume = scp->fid.volume;
3106 cellp = cm_FindCellByID(scp->fid.cell, 0);
3109 return CM_ERROR_NOSUCHCELL;
3111 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
3115 statep = cm_VolumeStateByID(tvp, volume);
3116 switch (statep->state) {
3122 code = CM_ERROR_ALLBUSY;
3125 code = CM_ERROR_ALLOFFLINE;
3128 code = CM_ERROR_ALLDOWN;
3137 * VIOC_VOLSTAT_TEST internals.
3139 * Assumes that pioctl path has been parsed or skipped.
3142 cm_IoctlVolStatTest(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
3145 cm_cell_t *cellp = NULL;
3147 cm_vol_state_t *statep;
3148 struct VolStatTest * testp;
3151 testp = (struct VolStatTest *)ioctlp->inDatap;
3153 #ifdef AFS_FREELANCE_CLIENT
3154 if (testp->fid.cell == -1)
3155 return CM_ERROR_NOACCESS;
3158 if (testp->flags & VOLSTAT_TEST_CHECK_VOLUME) {
3159 cm_CheckOfflineVolumes();
3163 if (testp->flags & VOLSTAT_TEST_NETWORK_UP) {
3164 cm_VolStatus_Network_Started(cm_NetbiosName
3172 if (testp->flags & VOLSTAT_TEST_NETWORK_DOWN) {
3173 cm_VolStatus_Network_Stopped(cm_NetbiosName
3181 if (testp->cellname[0]) {
3182 n = atoi(testp->cellname);
3184 testp->fid.cell = n;
3186 cellp = cm_GetCell(testp->cellname, 0);
3189 if (testp->fid.cell > 0) {
3190 cellp = cm_FindCellByID(testp->fid.cell, 0);
3194 return CM_ERROR_NOSUCHCELL;
3196 if (testp->volname[0]) {
3197 n = atoi(testp->volname);
3199 testp->fid.volume = n;
3201 code = cm_FindVolumeByName(cellp, testp->volname, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3204 if (testp->fid.volume > 0)
3205 code = cm_FindVolumeByID(cellp, testp->fid.volume, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3210 if (testp->fid.volume)
3211 statep = cm_VolumeStateByID(volp, testp->fid.volume);
3213 statep = cm_VolumeStateByName(volp, testp->volname);
3216 statep->state = testp->state;
3217 code = cm_VolStatus_Change_Notification(cellp->cellID, statep->ID, testp->state);