2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afsconfig.h>
11 #include <afs/param.h>
15 #include <afs/cellconfig.h>
16 #include <afs/afs_consts.h>
17 #include <afs/ptserver.h>
31 #include "afsd_init.h"
32 #include <WINNT\afsreg.h>
50 /* Copied from afs_tokens.h */
51 #define PIOCTL_LOGON 0x1
54 const char utf8_prefix[] = UTF8_PREFIX;
55 const int utf8_prefix_size = sizeof(utf8_prefix) - sizeof(char);
57 osi_mutex_t cm_Afsdsbmt_Lock;
59 extern afs_int32 cryptall;
60 extern char cm_NetbiosName[];
61 extern clientchar_t cm_NetbiosNameC[];
63 extern void afsi_log(char *pattern, ...);
65 void cm_InitIoctl(void)
67 lock_InitializeMutex(&cm_Afsdsbmt_Lock, "AFSDSBMT.INI Access Lock",
68 LOCK_HIERARCHY_AFSDBSBMT_GLOBAL);
72 * Utility function. (Not currently in use.)
73 * This function forces all dirty buffers to the file server and
74 * then discards the status info.
77 cm_CleanFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
81 if (RDR_Initialized &&
82 RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
83 scp->fid.hash, scp->fileType, AFS_INVALIDATE_FLUSHED))
84 code = CM_ERROR_WOULDBLOCK;
86 code = cm_FSync(scp, userp, reqp, FALSE);
88 lock_ObtainWrite(&scp->rw);
89 cm_DiscardSCache(scp);
90 lock_ReleaseWrite(&scp->rw);
92 osi_Log2(afsd_logp,"cm_CleanFile scp 0x%x returns error: [%x]",scp, code);
97 * Utility function. Used within this file.
98 * scp must be held but not locked.
101 cm_FlushFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
105 #ifdef AFS_FREELANCE_CLIENT
106 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
107 cm_noteLocalMountPointChange(FALSE);
113 * The file system will forget all knowledge of the object
114 * when it receives this message.
116 if (RDR_Initialized &&
117 RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
118 scp->fid.hash, scp->fileType, AFS_INVALIDATE_FLUSHED))
119 code = CM_ERROR_WOULDBLOCK;
121 code = buf_FlushCleanPages(scp, userp, reqp);
123 if (scp->fileType == CM_SCACHETYPE_DIRECTORY)
124 lock_ObtainWrite(&scp->dirlock);
125 lock_ObtainWrite(&scp->rw);
126 cm_DiscardSCache(scp);
127 if (scp->fileType == CM_SCACHETYPE_DIRECTORY) {
128 cm_ResetSCacheDirectory(scp, 1);
129 lock_ReleaseWrite(&scp->dirlock);
131 lock_ReleaseWrite(&scp->rw);
133 osi_Log2(afsd_logp,"cm_FlushFile scp 0x%x returns error: [%x]",scp, code);
138 * Utility function. (Not currently in use)
139 * IoctlPath must be parsed or skipped prior to calling.
140 * scp must be held but not locked.
143 cm_FlushParent(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
148 pscp = cm_FindSCacheParent(scp);
150 /* now flush the file */
151 code = cm_FlushFile(pscp, userp, reqp);
152 cm_ReleaseSCache(pscp);
158 * Utility function. Used within this function.
161 cm_FlushVolume(cm_user_t *userp, cm_req_t *reqp, afs_uint32 cell, afs_uint32 volume)
167 #ifdef AFS_FREELANCE_CLIENT
168 if ( cell == AFS_FAKE_ROOT_CELL_ID && volume == AFS_FAKE_ROOT_VOL_ID ) {
169 cm_noteLocalMountPointChange(FALSE);
174 lock_ObtainWrite(&cm_scacheLock);
175 for (i=0; i<cm_data.scacheHashTableSize; i++) {
176 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
177 if (scp->fid.volume == volume && scp->fid.cell == cell) {
178 cm_HoldSCacheNoLock(scp);
179 lock_ReleaseWrite(&cm_scacheLock);
181 /* now flush the file */
182 code = cm_FlushFile(scp, userp, reqp);
183 lock_ObtainWrite(&cm_scacheLock);
184 cm_ReleaseSCacheNoLock(scp);
188 lock_ReleaseWrite(&cm_scacheLock);
194 * TranslateExtendedChars - This is a fix for TR 54482.
196 * If an extended character (80 - FF) is entered into a file
197 * or directory name in Windows, the character is translated
198 * into the OEM character map before being passed to us.
199 * The pioctl functions must match
200 * this translation for paths given via our own commands (like
201 * fs). If we do not do this, then we will try to perform an
202 * operation on a non-translated path, which we will fail to
203 * find, since the path was created with the translated chars.
204 * This function performs the required translation.
206 * OEM character code pages are used by the non-Unicode SMB
207 * mode. Do not use if the CM_IOCTLFLAG_USEUTF8 is set.
210 TranslateExtendedChars(char *str)
215 CharToOemA(str, str);
218 void cm_SkipIoctlPath(cm_ioctl_t *ioctlp)
222 temp = strlen(ioctlp->inDatap) + 1;
223 ioctlp->inDatap += temp;
227 clientchar_t * cm_ParseIoctlStringAlloc(cm_ioctl_t *ioctlp, const char * ext_instrp)
229 clientchar_t * rs = NULL;
232 instrp = (ext_instrp)?ext_instrp:ioctlp->inDatap;
234 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
235 rs = cm_Utf8ToClientStringAlloc(instrp, -1, NULL);
239 /* Not a UTF-8 string */
240 if (smb_StoreAnsiFilenames) {
241 cch = cm_AnsiToClientString(instrp, -1, NULL, 0);
245 rs = malloc(cch * sizeof(clientchar_t));
246 cm_AnsiToClientString(instrp, -1, rs, cch);
248 cch = cm_OemToClientString(instrp, -1, NULL, 0);
252 rs = malloc(cch * sizeof(clientchar_t));
253 cm_OemToClientString(instrp, -1, rs, cch);
257 if (ext_instrp == NULL) {
258 ioctlp->inDatap += strlen(ioctlp->inDatap) + 1;
263 int cm_UnparseIoctlString(cm_ioctl_t *ioctlp,
265 const clientchar_t * cstr, int cchlen)
270 outp = ((ext_outp == NULL)? ioctlp->outDatap : ext_outp);
272 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
273 cchout = cm_ClientStringToUtf8(cstr, cchlen, outp,
274 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)));
276 if (smb_StoreAnsiFilenames) {
277 cchout = WideCharToMultiByte(CP_ACP, 0, cstr, cchlen,
279 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)),
282 cchout = WideCharToMultiByte(CP_OEMCP, 0, cstr, cchlen,
284 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)),
289 if (cchout > 0 && ext_outp == NULL) {
290 ioctlp->outDatap += cchout;
297 * Must be called before XXX_ParseIoctlPath or cm_SkipIoctlPath
299 cm_ioctlQueryOptions_t *
300 cm_IoctlGetQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
302 afs_uint32 pathlen = (afs_uint32) strlen(ioctlp->inDatap) + 1;
303 char *p = ioctlp->inDatap + pathlen;
304 cm_ioctlQueryOptions_t * optionsp = NULL;
306 if (ioctlp->inCopied > p - ioctlp->inAllocp) {
307 optionsp = (cm_ioctlQueryOptions_t *)p;
308 if (optionsp->size < 12 /* minimum size of struct */)
316 * Must be called after smb_ParseIoctlPath or cm_SkipIoctlPath
317 * or any other time that ioctlp->inDatap points at the
318 * cm_ioctlQueryOptions_t object.
321 cm_IoctlSkipQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
323 cm_ioctlQueryOptions_t * optionsp = (cm_ioctlQueryOptions_t *)ioctlp->inDatap;
324 ioctlp->inDatap += optionsp->size;
325 ioctlp->inCopied -= optionsp->size;
328 /* format the specified path to look like "/afs/<cellname>/usr", by
329 * adding "/afs" (if necessary) in front, changing any \'s to /'s, and
330 * removing any trailing "/"'s. One weirdo caveat: "/afs" will be
331 * intentionally returned as "/afs/"--this makes submount manipulation
332 * easier (because we can always jump past the initial "/afs" to find
333 * the AFS path that should be written into afsdsbmt.ini).
336 cm_NormalizeAfsPath(clientchar_t *outpathp, long cchlen, clientchar_t *inpathp)
339 clientchar_t bslash_mountRoot[256];
341 cm_ClientStrCpy(bslash_mountRoot, lengthof(bslash_mountRoot), cm_mountRootC);
342 bslash_mountRoot[0] = '\\';
344 if (!cm_ClientStrCmpNI(inpathp, cm_mountRootC, cm_mountRootCLen))
345 cm_ClientStrCpy(outpathp, cchlen, inpathp);
346 else if (!cm_ClientStrCmpNI(inpathp, bslash_mountRoot,
347 (int)cm_ClientStrLen(bslash_mountRoot)))
348 cm_ClientStrCpy(outpathp, cchlen, inpathp);
349 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
350 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s%s"), cm_mountRootC, inpathp);
351 else // inpathp looks like "<cell>/usr"
352 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s/%s"), cm_mountRootC, inpathp);
354 for (cp = outpathp; *cp != 0; ++cp) {
359 if (cm_ClientStrLen(outpathp) && (outpathp[cm_ClientStrLen(outpathp)-1] == '/')) {
360 outpathp[cm_ClientStrLen(outpathp)-1] = 0;
363 if (!cm_ClientStrCmpI(outpathp, cm_mountRootC)) {
364 cm_ClientStrCpy(outpathp, cchlen, cm_mountRootC);
368 void cm_NormalizeAfsPathAscii(char *outpathp, long outlen, char *inpathp)
371 char bslash_mountRoot[256];
373 strncpy(bslash_mountRoot, cm_mountRoot, sizeof(bslash_mountRoot) - 1);
374 bslash_mountRoot[0] = '\\';
376 if (!strnicmp (inpathp, cm_mountRoot, strlen(cm_mountRoot)))
377 StringCbCopy(outpathp, outlen, inpathp);
378 else if (!strnicmp (inpathp, bslash_mountRoot, strlen(bslash_mountRoot)))
379 StringCbCopy(outpathp, outlen, inpathp);
380 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
381 StringCbPrintfA(outpathp, outlen, "%s%s", cm_mountRoot, inpathp);
382 else // inpathp looks like "<cell>/usr"
383 StringCbPrintfA(outpathp, outlen, "%s/%s", cm_mountRoot, inpathp);
385 for (cp = outpathp; *cp != 0; ++cp) {
390 if (strlen(outpathp) && (outpathp[strlen(outpathp)-1] == '/')) {
391 outpathp[strlen(outpathp)-1] = 0;
394 if (!_stricmp (outpathp, cm_mountRoot)) {
395 StringCbCopy(outpathp, outlen, cm_mountRoot);
401 * VIOCGETAL internals.
403 * Assumes that pioctl path has been parsed or skipped.
404 * scp is held but not locked.
407 cm_IoctlGetACL(cm_ioctl_t *ioctlp, cm_user_t *userp, cm_scache_t *scp, cm_req_t *reqp)
412 AFSFetchStatus fileStatus;
416 struct rx_connection * rxconnp;
418 memset(&volSync, 0, sizeof(volSync));
420 /* now make the get acl call */
421 #ifdef AFS_FREELANCE_CLIENT
422 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
424 ioctlp->outDatap[0] ='\0';
428 afid.Volume = scp->fid.volume;
429 afid.Vnode = scp->fid.vnode;
430 afid.Unique = scp->fid.unique;
432 acl.AFSOpaque_val = ioctlp->outDatap;
433 acl.AFSOpaque_len = 0;
434 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
438 rxconnp = cm_GetRxConn(connp);
439 code = RXAFS_FetchACL(rxconnp, &afid, &acl, &fileStatus, &volSync);
440 rx_PutConnection(rxconnp);
442 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, 0, &fileStatus, &volSync, NULL, NULL, code));
443 code = cm_MapRPCError(code, reqp);
448 /* skip over return data */
449 tlen = (int)strlen(ioctlp->outDatap) + 1;
450 ioctlp->outDatap += tlen;
452 /* and return success */
458 * VIOC_FILE_CELL_NAME internals.
460 * Assumes that pioctl path has been parsed or skipped.
461 * scp is held but not locked.
464 cm_IoctlGetFileCellName(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
469 #ifdef AFS_FREELANCE_CLIENT
470 if ( cm_freelanceEnabled &&
471 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
472 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID &&
473 scp->fid.vnode==0x1 && scp->fid.unique==0x1 ) {
474 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
475 ioctlp->outDatap += strlen(ioctlp->outDatap) + 1;
478 #endif /* AFS_FREELANCE_CLIENT */
480 cellp = cm_FindCellByID(scp->fid.cell, CM_FLAG_NOPROBE);
482 clientchar_t * cellname;
484 cellname = cm_FsStringToClientStringAlloc(cellp->name, -1, NULL);
485 if (cellname == NULL) {
486 code = CM_ERROR_NOSUCHCELL;
488 cm_UnparseIoctlString(ioctlp, NULL, cellname, -1);
493 code = CM_ERROR_NOSUCHCELL;
501 * VIOCSETAL internals.
503 * Assumes that pioctl path has been parsed or skipped.
504 * scp is held but not locked.
507 cm_IoctlSetACL(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
512 AFSFetchStatus fileStatus;
515 struct rx_connection * rxconnp;
517 memset(&volSync, 0, sizeof(volSync));
519 #ifdef AFS_FREELANCE_CLIENT
520 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
521 code = CM_ERROR_NOACCESS;
525 /* now make the get acl call */
526 fid.Volume = scp->fid.volume;
527 fid.Vnode = scp->fid.vnode;
528 fid.Unique = scp->fid.unique;
530 acl.AFSOpaque_val = ioctlp->inDatap;
531 acl.AFSOpaque_len = (u_int)strlen(ioctlp->inDatap)+1;
532 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
536 rxconnp = cm_GetRxConn(connp);
537 code = RXAFS_StoreACL(rxconnp, &fid, &acl, &fileStatus, &volSync);
538 rx_PutConnection(rxconnp);
540 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, 1, &fileStatus, &volSync, NULL, NULL, code));
541 code = cm_MapRPCError(code, reqp);
543 /* invalidate cache info, since we just trashed the ACL cache */
544 lock_ObtainWrite(&scp->rw);
545 cm_DiscardSCache(scp);
546 lock_ReleaseWrite(&scp->rw);
549 RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
550 scp->fid.hash, scp->fileType, AFS_INVALIDATE_CREDS);
557 * VIOC_FLUSHALL internals.
559 * Assumes that pioctl path has been parsed or skipped.
562 cm_IoctlFlushAllVolumes(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
568 lock_ObtainWrite(&cm_scacheLock);
569 for (i=0; i<cm_data.scacheHashTableSize; i++) {
570 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
571 cm_HoldSCacheNoLock(scp);
572 lock_ReleaseWrite(&cm_scacheLock);
574 /* now flush the file */
575 code = cm_FlushFile(scp, userp, reqp);
576 lock_ObtainWrite(&cm_scacheLock);
577 cm_ReleaseSCacheNoLock(scp);
580 lock_ReleaseWrite(&cm_scacheLock);
586 * VIOC_FLUSHVOLUME internals.
588 * Assumes that pioctl path has been parsed or skipped.
589 * scp is held but not locked.
592 cm_IoctlFlushVolume(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
598 #ifdef AFS_FREELANCE_CLIENT
599 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
600 code = CM_ERROR_NOACCESS;
604 volume = scp->fid.volume;
605 cell = scp->fid.cell;
606 code = cm_FlushVolume(userp, reqp, cell, volume);
612 * VIOCFLUSH internals.
614 * Assumes that pioctl path has been parsed or skipped.
615 * scp is held but not locked.
618 cm_IoctlFlushFile(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
622 #ifdef AFS_FREELANCE_CLIENT
623 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
624 code = CM_ERROR_NOACCESS;
628 cm_FlushFile(scp, userp, reqp);
635 * VIOCSETVOLSTAT internals.
637 * Assumes that pioctl path has been parsed or skipped.
638 * scp is held but not locked.
641 cm_IoctlSetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
645 char offLineMsg[256];
648 AFSFetchVolumeStatus volStat;
649 AFSStoreVolumeStatus storeStat;
654 struct rx_connection * rxconnp;
656 #ifdef AFS_FREELANCE_CLIENT
657 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
658 code = CM_ERROR_NOACCESS;
662 cellp = cm_FindCellByID(scp->fid.cell, 0);
663 osi_assertx(cellp, "null cm_cell_t");
665 if (scp->flags & CM_SCACHEFLAG_RO)
666 return CM_ERROR_READONLY;
668 code = cm_FindVolumeByID(cellp, scp->fid.volume, userp, reqp,
669 CM_GETVOL_FLAG_CREATE, &tvp);
675 /* Copy the junk out, using cp as a roving pointer. */
676 memcpy((char *)&volStat, ioctlp->inDatap, sizeof(AFSFetchVolumeStatus));
677 ioctlp->inDatap += sizeof(AFSFetchVolumeStatus);
679 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
680 cm_ClientStringToFsString(strp, -1, volName, lengthof(volName));
683 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
684 cm_ClientStringToFsString(strp, -1, offLineMsg, lengthof(offLineMsg));
687 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
688 cm_ClientStringToFsString(strp, -1, motd, lengthof(motd));
694 if (volStat.MinQuota != -1) {
695 storeStat.MinQuota = volStat.MinQuota;
696 storeStat.Mask |= AFS_SETMINQUOTA;
698 if (volStat.MaxQuota != -1) {
699 storeStat.MaxQuota = volStat.MaxQuota;
700 storeStat.Mask |= AFS_SETMAXQUOTA;
704 code = cm_ConnFromFID(&scp->fid, userp, reqp, &tcp);
708 rxconnp = cm_GetRxConn(tcp);
709 code = RXAFS_SetVolumeStatus(rxconnp, scp->fid.volume,
710 &storeStat, volName, offLineMsg, motd);
711 rx_PutConnection(rxconnp);
713 } while (cm_Analyze(tcp, userp, reqp, &scp->fid, NULL, 1, NULL, NULL, NULL, NULL, code));
714 code = cm_MapRPCError(code, reqp);
717 /* return on failure */
721 /* we are sending parms back to make compat. with prev system. should
722 * change interface later to not ask for current status, just set
725 cp = ioctlp->outDatap;
726 memcpy(cp, (char *)&volStat, sizeof(VolumeStatus));
727 cp += sizeof(VolumeStatus);
728 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
729 cp += strlen(volName)+1;
730 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
731 cp += strlen(offLineMsg)+1;
732 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
733 cp += strlen(motd)+1;
735 /* now return updated return data pointer */
736 ioctlp->outDatap = cp;
743 * VIOCGETVOLSTAT internals.
745 * Assumes that pioctl path has been parsed or skipped.
746 * scp is held but not locked.
749 cm_IoctlGetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
752 char volName[32]="(unknown)";
753 char offLineMsg[256]="server temporarily inaccessible";
754 char motd[256]="server temporarily inaccessible";
756 AFSFetchVolumeStatus volStat;
761 struct rx_connection * rxconnp;
763 #ifdef AFS_FREELANCE_CLIENT
764 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
766 strncpy(volName, "Freelance.Local.Root", sizeof(volName));
767 offLineMsg[0] = '\0';
768 strncpy(motd, "Freelance mode in use.", sizeof(motd));
769 volStat.Vid = scp->fid.volume;
770 volStat.MaxQuota = 0;
771 volStat.BlocksInUse = 100;
772 volStat.PartBlocksAvail = 0;
773 volStat.PartMaxBlocks = 100;
780 cm_SetFid(&vfid, scp->fid.cell, scp->fid.volume, 1, 1);
781 code = cm_GetSCache(&vfid, NULL, &vscp, userp, reqp);
785 lock_ObtainWrite(&vscp->rw);
786 code = cm_SyncOp(vscp, NULL, userp, reqp, PRSFS_READ,
787 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
788 lock_ReleaseWrite(&vscp->rw);
793 OfflineMsg = offLineMsg;
796 code = cm_ConnFromFID(&vfid, userp, reqp, &connp);
799 rxconnp = cm_GetRxConn(connp);
800 code = RXAFS_GetVolumeStatus(rxconnp, vfid.volume,
801 &volStat, &Name, &OfflineMsg, &MOTD);
802 rx_PutConnection(rxconnp);
804 } while (cm_Analyze(connp, userp, reqp, &vfid, NULL, 0, NULL, NULL, NULL, NULL, code));
805 code = cm_MapRPCError(code, reqp);
807 lock_ObtainWrite(&vscp->rw);
808 cm_SyncOpDone(vscp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
809 lock_ReleaseWrite(&vscp->rw);
810 cm_ReleaseSCache(vscp);
816 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
817 cp = ioctlp->outDatap;
818 memcpy(cp, (char *)&volStat, sizeof(AFSFetchVolumeStatus));
819 cp += sizeof(AFSFetchVolumeStatus);
820 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
821 cp += strlen(volName)+1;
822 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
823 cp += strlen(offLineMsg)+1;
824 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
825 cp += strlen(motd)+1;
827 /* return new size */
828 ioctlp->outDatap = cp;
834 * VIOCGETFID internals.
836 * Assumes that pioctl path has been parsed or skipped.
837 * scp is held but not locked.
840 cm_IoctlGetFid(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
845 memset(&fid, 0, sizeof(cm_fid_t));
846 fid.cell = scp->fid.cell;
847 fid.volume = scp->fid.volume;
848 fid.vnode = scp->fid.vnode;
849 fid.unique = scp->fid.unique;
851 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
852 cp = ioctlp->outDatap;
853 memcpy(cp, (char *)&fid, sizeof(cm_fid_t));
854 cp += sizeof(cm_fid_t);
856 /* return new size */
857 ioctlp->outDatap = cp;
863 * VIOC_GETFILETYPE internals.
865 * Assumes that pioctl path has been parsed or skipped.
866 * scp is held but not locked.
869 cm_IoctlGetFileType(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
873 afs_uint32 fileType = 0;
875 if (scp->fileType == 0) {
876 lock_ObtainWrite(&scp->rw);
877 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
878 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
880 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
881 lock_ReleaseWrite(&scp->rw);
885 fileType = scp->fileType;
887 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
888 cp = ioctlp->outDatap;
889 memcpy(cp, (char *)&fileType, sizeof(fileType));
890 cp += sizeof(fileType);
892 /* return new size */
893 ioctlp->outDatap = cp;
899 * VIOCGETOWNER internals.
901 * Assumes that pioctl path has been parsed or skipped.
902 * scp is held but not locked.
905 cm_IoctlGetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
910 lock_ObtainWrite(&scp->rw);
911 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
912 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
914 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
915 lock_ReleaseWrite(&scp->rw);
918 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
919 cp = ioctlp->outDatap;
920 memcpy(cp, (char *)&scp->owner, sizeof(afs_uint32));
921 cp += sizeof(afs_uint32);
922 memcpy(cp, (char *)&scp->group, sizeof(afs_uint32));
923 cp += sizeof(afs_uint32);
925 /* return new size */
926 ioctlp->outDatap = cp;
933 * VIOC_SETOWNER internals.
935 * Assumes that pioctl path has been parsed or skipped
936 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
938 * scp is held but not locked.
942 cm_IoctlSetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
947 lock_ObtainWrite(&scp->rw);
948 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
949 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
951 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
952 lock_ReleaseWrite(&scp->rw);
958 memset(&attr, 0, sizeof(attr));
960 cp = ioctlp->inDatap;
961 memcpy((char *)&owner, cp, sizeof(afs_uint32));
963 attr.mask = CM_ATTRMASK_OWNER;
966 code = cm_SetAttr(scp, &attr, userp, reqp);
973 * VIOC_SETGROUP internals.
975 * Assumes that pioctl path has been parsed or skipped
976 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
980 cm_IoctlSetGroup(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
985 lock_ObtainWrite(&scp->rw);
986 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
987 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
989 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
990 lock_ReleaseWrite(&scp->rw);
996 memset(&attr, 0, sizeof(attr));
998 cp = ioctlp->inDatap;
999 memcpy((char *)&group, cp, sizeof(afs_uint32));
1001 attr.mask = CM_ATTRMASK_GROUP;
1004 code = cm_SetAttr(scp, &attr, userp, reqp);
1011 * VIOCWHEREIS internals.
1013 * Assumes that pioctl path has been parsed or skipped.
1014 * scp is held but not locked.
1017 cm_IoctlWhereIs(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
1022 cm_serverRef_t **tsrpp, *current;
1027 volume = scp->fid.volume;
1029 cellp = cm_FindCellByID(scp->fid.cell, 0);
1032 return CM_ERROR_NOSUCHCELL;
1034 #ifdef AFS_FREELANCE_CLIENT
1035 if ( cellp->cellID == AFS_FAKE_ROOT_CELL_ID) {
1036 struct in_addr addr;
1043 cp = ioctlp->outDatap;
1045 memcpy(cp, (char *)&addr, sizeof(addr));
1048 /* still room for terminating NULL, add it on */
1050 memcpy(cp, (char *)&addr, sizeof(addr));
1053 ioctlp->outDatap = cp;
1057 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
1061 cp = ioctlp->outDatap;
1063 tsrpp = cm_GetVolServers(tvp, volume, userp, reqp, NULL);
1064 if (tsrpp == NULL) {
1065 code = CM_ERROR_NOSUCHVOLUME;
1067 lock_ObtainRead(&cm_serverLock);
1068 for (current = *tsrpp; current; current = current->next) {
1069 tsp = current->server;
1070 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1073 lock_ReleaseRead(&cm_serverLock);
1074 cm_FreeServerList(tsrpp, 0);
1076 /* still room for terminating NULL, add it on */
1077 volume = 0; /* reuse vbl */
1078 memcpy(cp, (char *)&volume, sizeof(long));
1081 ioctlp->outDatap = cp;
1088 * VIOC_AFS_STAT_MT_PT internals.
1090 * Assumes that pioctl path has been parsed or skipped.
1091 * scp is held but not locked.
1094 cm_IoctlStatMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1100 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1102 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1106 lock_ObtainWrite(&scp->rw);
1107 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1108 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1110 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1114 /* now check that this is a real mount point */
1115 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1116 code = CM_ERROR_INVAL;
1120 code = cm_ReadMountPoint(scp, userp, reqp);
1123 strp = ioctlp->outDatap;
1124 StringCbCopyA(strp, SMB_IOCTL_MAXDATA - (strp - ioctlp->outAllocp), scp->mountPointStringp);
1125 strp += strlen(strp) + 1;
1126 ioctlp->outDatap = strp;
1130 lock_ReleaseWrite(&scp->rw);
1131 cm_ReleaseSCache(scp);
1141 * VIOC_AFS_DELETE_MT_PT internals.
1143 * Assumes that pioctl path has been parsed or skipped.
1144 * scp is held but not locked.
1147 cm_IoctlDeleteMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1151 clientchar_t *cp = NULL;
1152 fschar_t *originalName = NULL;
1155 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1157 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1159 /* if something went wrong, bail out now */
1163 lock_ObtainWrite(&scp->rw);
1164 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1165 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1169 /* now check that this is a real mount point */
1170 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1171 code = CM_ERROR_INVAL;
1175 /* time to make the RPC, so drop the lock */
1176 lock_ReleaseWrite(&scp->rw);
1179 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
1180 CM_DIROP_FLAG_NONE, &dirop);
1182 code = cm_BPlusDirLookupOriginalName(&dirop, cp, &originalName);
1183 /* The cm_Dir* functions can't be used to lookup the
1184 originalName. Those functions only know of the original
1186 cm_EndDirOp(&dirop);
1190 /* If this name doesn't have a non-normalized name associated with
1191 it, we assume that what we had is what is actually present on
1194 if (originalName == NULL) {
1195 originalName = cm_ClientStringToFsStringAlloc(cp, -1, NULL);
1198 /* cp is a normalized name. originalName is the actual name we
1199 saw on the fileserver. */
1200 #ifdef AFS_FREELANCE_CLIENT
1201 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1202 /* we are removing the mount point to the root dir., so call
1203 * the freelance code to do the deletion. */
1204 osi_Log0(afsd_logp,"IoctlDeleteMountPoint from Freelance root dir");
1205 code = cm_FreelanceRemoveMount(originalName);
1209 /* easier to do it this way */
1210 code = cm_Unlink(dscp, originalName, cp, userp, reqp);
1212 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1213 smb_NotifyChange(FILE_ACTION_REMOVED,
1214 FILE_NOTIFY_CHANGE_DIR_NAME,
1215 dscp, cp, NULL, TRUE);
1217 lock_ObtainWrite(&scp->rw);
1219 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1222 cm_DiscardSCache(scp);
1223 lock_ReleaseWrite(&scp->rw);
1224 cm_ReleaseSCache(scp);
1226 if (RDR_Initialized &&
1227 !RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
1228 scp->fid.hash, scp->fileType, AFS_INVALIDATE_DELETED))
1229 buf_ClearRDRFlag(scp, "deleted mp");
1232 if (originalName != NULL)
1242 * VIOCCKSERV internals.
1244 * Assumes that pioctl path has been parsed or skipped.
1247 cm_IoctlCheckServers(struct cm_ioctl *ioctlp, struct cm_user *userp)
1254 cm_server_t *tsp, *csp;
1257 tp = ioctlp->inDatap;
1260 memcpy(&temp, tp, sizeof(temp));
1261 if (temp == 0x12345678) { /* For afs3.3 version */
1262 memcpy(&csi, tp, sizeof(csi));
1263 if (csi.tinterval >= 0) {
1264 cp = ioctlp->outDatap;
1265 memcpy(cp, (char *)&cm_daemonCheckDownInterval, sizeof(long));
1266 ioctlp->outDatap += sizeof(long);
1267 if (csi.tinterval > 0) {
1268 if (!smb_SUser(userp))
1269 return CM_ERROR_NOACCESS;
1270 cm_daemonCheckDownInterval = csi.tinterval;
1278 } else { /* For pre afs3.3 versions */
1279 memcpy((char *)&temp, ioctlp->inDatap, sizeof(long));
1280 ioctlp->inDatap = cp = ioctlp->inDatap + sizeof(long);
1281 if (cp - ioctlp->inAllocp < ioctlp->inCopied) /* still more data available */
1286 * 1: fast check, don't contact servers.
1287 * 2: local cell only.
1290 /* have cell name, too */
1291 cellp = cm_GetCell(cp, (temp & 1) ? CM_FLAG_NOPROBE : 0);
1293 return CM_ERROR_NOSUCHCELL;
1296 cellp = (cm_cell_t *) 0;
1297 if (!cellp && (temp & 2)) {
1298 /* use local cell */
1299 fschar_t wscell[CELL_MAXNAMELEN+1];
1300 cm_GetRootCellName(wscell);
1301 cellp = cm_GetCell(wscell, 0);
1303 if (!(temp & 1)) { /* if not fast, call server checker routine */
1304 /* check down servers */
1305 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS | CM_FLAG_CHECKUPSERVERS, cellp);
1308 /* now return the current down server list */
1309 cp = ioctlp->outDatap;
1310 lock_ObtainRead(&cm_serverLock);
1311 for (tsp = cm_allServersp; tsp; tsp=tsp->allNextp) {
1312 if (cellp && tsp->cellp != cellp)
1313 continue; /* cell spec'd and wrong */
1314 if (tsp->flags & CM_SERVERFLAG_DOWN) {
1316 * for a multi-homed file server, if one of the interfaces
1317 * is up, do not report the server as down.
1319 if (tsp->type == CM_SERVER_FILE) {
1320 for (csp = cm_allServersp; csp; csp=csp->allNextp) {
1321 if (csp->type == CM_SERVER_FILE &&
1322 !(csp->flags & CM_SERVERFLAG_DOWN) &&
1323 afs_uuid_equal(&tsp->uuid, &csp->uuid)) {
1327 if (csp) /* found alternate up interface */
1332 * all server types are being reported by ipaddr. only report
1333 * a server once regardless of how many services are down.
1335 for (tp = ioctlp->outDatap; tp < cp; tp += sizeof(long)) {
1336 if (!memcmp(tp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long)))
1341 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1346 lock_ReleaseRead(&cm_serverLock);
1348 ioctlp->outDatap = cp;
1353 * VIOCCKBACK internals.
1355 * Assumes that pioctl path has been parsed or skipped.
1358 cm_IoctlCheckVolumes(cm_ioctl_t *ioctlp, cm_user_t *userp)
1360 cm_RefreshVolumes(0);
1365 * VIOCSETCACHESIZE internals.
1367 * Assumes that pioctl path has been parsed or skipped.
1369 * This function is no longer meaningful in the current day world
1370 * of persistent caches. The buf_SetNBuffers() function will
1374 cm_IoctlSetCacheSize(struct cm_ioctl *ioctlp, struct cm_user *userp)
1379 memcpy(&temp, ioctlp->inDatap, sizeof(temp));
1381 temp = cm_data.buf_nOrigBuffers;
1383 /* temp is in 1K units, convert to # of buffers */
1384 temp = temp / (cm_data.buf_blockSize / 1024);
1387 /* now adjust the cache size */
1388 code = buf_SetNBuffers(temp);
1394 * VIOC_TRACECTL internals.
1396 * Assumes that pioctl path has been parsed or skipped.
1399 cm_IoctlTraceControl(cm_ioctl_t *ioctlp, cm_user_t *userp)
1403 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_uint32));
1407 afsd_ForceTrace(FALSE);
1408 buf_ForceTrace(FALSE);
1412 /* set tracing value to low order bit */
1413 if ((inValue & 1) == 0) {
1414 /* disable tracing */
1415 osi_LogDisable(afsd_logp);
1416 rx_DebugOnOff(FALSE);
1419 /* enable tracing */
1420 osi_LogEnable(afsd_logp);
1421 rx_DebugOnOff(TRUE);
1425 /* see if we're supposed to do a reset, too */
1427 osi_LogReset(afsd_logp);
1430 /* and copy out tracing flag */
1431 inValue = afsd_logp->enabled; /* use as a temp vbl */
1432 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_uint32));
1433 ioctlp->outDatap += sizeof(afs_uint32);
1438 * VIOCGETCACHEPARMS internals.
1440 * Assumes that pioctl path has been parsed or skipped.
1443 cm_IoctlGetCacheParms(struct cm_ioctl *ioctlp, struct cm_user *userp)
1445 cm_cacheParms_t parms;
1447 memset(&parms, 0, sizeof(parms));
1449 /* the cache size */
1450 parms.parms[0] = cm_data.buf_nbuffers * (cm_data.buf_blockSize / 1024);
1453 * the used cache space. this number is not available on windows.
1454 * the cm_data.buf_freeCount represents all buffers eligible for recycling.
1455 * so we report the entire cache in use since reporting 0 in use disturbs
1458 parms.parms[1] = cm_data.buf_usedCount * (cm_data.buf_blockSize / 1024);
1460 memcpy(ioctlp->outDatap, &parms, sizeof(parms));
1461 ioctlp->outDatap += sizeof(parms);
1467 * VIOCGETCELL internals.
1469 * Assumes that pioctl path has been parsed or skipped.
1472 cm_IoctlGetCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1477 cm_serverRef_t *serverRefp;
1478 cm_server_t *serverp;
1484 tp = ioctlp->inDatap;
1486 memcpy((char *)&whichCell, tp, sizeof(long));
1489 /* see if more than one long passed in, ignoring the null pathname (the -1) */
1490 if (ioctlp->inCopied-1 > sizeof(afs_uint32)) {
1491 memcpy((char *)&magic, tp, sizeof(afs_uint32));
1494 lock_ObtainRead(&cm_cellLock);
1495 for (tcellp = cm_data.allCellsp; tcellp; tcellp = tcellp->allNextp) {
1500 lock_ReleaseRead(&cm_cellLock);
1503 clientchar_t * cellnamep;
1505 cp = ioctlp->outDatap;
1507 if (magic == 0x12345678) {
1508 memcpy(cp, (char *)&magic, sizeof(long));
1511 memset(cp, 0, max * sizeof(long));
1513 lock_ObtainRead(&cm_serverLock); /* for going down server list */
1514 for (i=0, serverRefp = tcellp->vlServersp;
1515 serverRefp && i<max;
1516 i++, serverRefp = serverRefp->next) {
1517 serverp = serverRefp->server;
1518 memcpy(cp, &serverp->addr.sin_addr.s_addr, sizeof(long));
1521 lock_ReleaseRead(&cm_serverLock);
1522 ioctlp->outDatap = basep + max * sizeof(afs_int32);
1524 cellnamep = cm_FsStringToClientStringAlloc(tcellp->name, -1, NULL);
1526 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1536 return CM_ERROR_NOMORETOKENS; /* mapped to EDOM */
1541 * VIOCNEWCELL internals.
1543 * Assumes that pioctl path has been parsed or skipped.
1546 cm_IoctlNewCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1549 * All that needs to be done is to refresh server information for all cells that
1550 * are already loaded.
1552 * cell list will be cm_CellLock and cm_ServerLock will be held for write.
1556 cm_cell_rock_t rock;
1558 lock_ObtainWrite(&cm_cellLock);
1560 for (cp = cm_data.allCellsp; cp; cp=cp->allNextp)
1564 /* delete all previous server lists - cm_FreeServerList will ask for write on cm_ServerLock*/
1565 cm_FreeServerList(&cp->vlServersp, CM_FREESERVERLIST_DELETE);
1566 lock_ReleaseWrite(&cm_cellLock);
1570 code = cm_SearchCellRegistry(1, cp->name, cp->name, cp->linkedName, cm_AddCellProc, &rock);
1571 if (code && code != CM_ERROR_FORCE_DNS_LOOKUP)
1572 code = cm_SearchCellFileEx(cp->name, cp->name, cp->linkedName, cm_AddCellProc, &rock);
1574 if (cm_dnsEnabled) {
1576 code = cm_SearchCellByDNS(cp->name, cp->name, &ttl, cm_AddCellProc, &rock);
1577 if ( code == 0 ) { /* got cell from DNS */
1578 lock_ObtainMutex(&cp->mx);
1579 _InterlockedOr(&cp->flags, CM_CELLFLAG_DNS);
1580 _InterlockedAnd(&cp->flags, ~CM_CELLFLAG_VLSERVER_INVALID);
1581 cp->timeout = time(0) + ttl;
1582 lock_ReleaseMutex(&cp->mx);
1587 lock_ObtainMutex(&cp->mx);
1588 _InterlockedAnd(&cp->flags, ~CM_CELLFLAG_DNS);
1589 lock_ReleaseMutex(&cp->mx);
1592 lock_ObtainMutex(&cp->mx);
1593 _InterlockedOr(&cp->flags, CM_CELLFLAG_VLSERVER_INVALID);
1594 lock_ReleaseMutex(&cp->mx);
1595 lock_ObtainWrite(&cm_cellLock);
1598 lock_ObtainMutex(&cp->mx);
1599 _InterlockedAnd(&cp->flags, ~CM_CELLFLAG_VLSERVER_INVALID);
1600 lock_ReleaseMutex(&cp->mx);
1601 lock_ObtainWrite(&cm_cellLock);
1602 cm_RandomizeServer(&cp->vlServersp);
1605 lock_ReleaseWrite(&cm_cellLock);
1610 * VIOCNEWCELL2 internals.
1612 * Assumes that pioctl path has been parsed or skipped.
1614 * The pioctl data buffer consists of the following structure:
1617 * afs_uint32 alternative fs port
1618 * afs_uint32 alternative vl port
1619 * afs_uint32 count of vldb servers
1622 * n * char[] hostnames
1625 cm_IoctlNewCell2(struct cm_ioctl *ioctlp, struct cm_user *userp)
1627 afs_uint32 code = 0;
1628 afs_uint32 flags = 0;
1629 afs_uint32 fsport = 0;
1630 afs_uint32 vlport = 0;
1631 afs_uint32 i, host_count = 0;
1632 char * cellname = NULL;
1633 char * linked_cellname = NULL;
1637 char * hostname[AFS_MAXHOSTS];
1640 memset(hostname, 0, sizeof(hostname));
1642 tp = ioctlp->inDatap;
1643 tplen = ioctlp->inCopied;
1644 lp = (afs_uint32 *)tp;
1646 if (tplen >= 4 * sizeof(afs_uint32)) {
1652 tplen -= 4 * sizeof(afs_uint32);
1655 if ( FAILED(StringCbLength(tp, tplen, &len)) ||
1656 len + 1 > CELL_MAXNAMELEN)
1657 return CM_ERROR_INVAL;
1662 if ( FAILED(StringCbLength(tp, tplen, &len)) ||
1663 len + 1 > CELL_MAXNAMELEN)
1664 return CM_ERROR_INVAL;
1665 linked_cellname = tp;
1669 if (!(flags & VIOC_NEWCELL2_FLAG_USEDNS)) {
1670 for ( i=0; i<host_count; i++) {
1671 if ( FAILED(StringCbLength(tp, tplen, &len)) )
1672 return CM_ERROR_INVAL;
1679 code = cm_CreateCellWithInfo( cellname, linked_cellname,
1682 (flags & VIOC_NEWCELL2_FLAG_USEDNS) ? CM_CELLFLAG_DNS : 0);
1684 if (code == 0 && (flags & VIOC_NEWCELL2_FLAG_USEREG)) {
1685 cm_AddCellToRegistry( cellname, linked_cellname,
1688 (flags & VIOC_NEWCELL2_FLAG_USEDNS) ? CM_CELLFLAG_DNS : 0);
1694 * VIOC_GET_WS_CELL internals.
1696 * Assumes that pioctl path has been parsed or skipped.
1699 cm_IoctlGetWsCell(cm_ioctl_t *ioctlp, cm_user_t *userp)
1703 if (cm_freelanceEnabled) {
1704 if (cm_GetRootCellName(ioctlp->outDatap))
1705 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
1706 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
1707 } else if (cm_data.rootCellp) {
1708 clientchar_t * cellnamep = cm_FsStringToClientStringAlloc(cm_data.rootCellp->name, -1, NULL);
1709 /* return the default cellname to the caller */
1711 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1714 code = CM_ERROR_NOSUCHCELL;
1717 /* if we don't know our default cell, return failure */
1718 code = CM_ERROR_NOSUCHCELL;
1725 * VIOC_AFS_SYSNAME internals.
1727 * Assumes that pioctl path has been parsed or skipped.
1729 * In order to support both 32-bit and 64-bit sysname lists
1730 * we will treat bit-31 of the setSysName value as a flag
1731 * indicating which architecture is being indicated. If unset
1732 * the architecture is 32-bit and if set the architecture is
1733 * 64-bit. This change is backward compatible with cache
1734 * managers that do not support this extension.
1737 cm_IoctlSysName(struct cm_ioctl *ioctlp, struct cm_user *userp)
1739 afs_uint32 setSysName;
1741 clientchar_t *inname = NULL;
1746 memcpy(&setSysName, ioctlp->inDatap, sizeof(afs_uint32));
1747 ioctlp->inDatap += sizeof(afs_uint32);
1749 arch64 = (setSysName & 0x8000000) ? 1 : 0;
1750 setSysName &= 0x7FFFFFF;
1754 if ( setSysName < 0 || setSysName > MAXNUMSYSNAMES )
1756 cp2 = ioctlp->inDatap;
1757 for ( cp=ioctlp->inDatap, count = 0; count < setSysName; count++ ) {
1758 /* won't go past end of ioctlp->inDatap since
1759 maxsysname*num < ioctlp->inDatap length */
1760 t = (int)strlen(cp);
1761 if (t >= MAXSYSNAME || t <= 0)
1763 /* check for names that can shoot us in the foot */
1764 if (*cp == '.' && (cp[1] == 0 || (cp[1] == '.' && cp[2] == 0)))
1770 /* inname gets first entry in case we're being a translator */
1771 /* (we are never a translator) */
1772 inname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1775 /* Not xlating, so local case */
1777 /* Local guy; only root can change sysname */
1778 /* clear @sys entries from the dnlc, once afs_lookup can
1779 * do lookups of @sys entries and thinks it can trust them */
1780 /* privs ok, store the entry, ... */
1782 cm_ClientStrCpy(arch64 ? cm_sysName64List[0] : cm_sysNameList[0], MAXSYSNAME, inname);
1784 if (setSysName > 1) { /* ... or list */
1785 for (count = 1; count < setSysName; ++count) {
1786 clientchar_t * newsysname;
1788 if (!(arch64 ? cm_sysName64List[count] : cm_sysNameList[count]))
1789 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to write\n",
1790 __FILE__, __LINE__);
1792 newsysname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1793 cm_ClientStrCpy(arch64 ? cm_sysName64List[count] : cm_sysNameList[count], MAXSYSNAME, newsysname);
1798 cm_sysName64Count = setSysName;
1799 if (cm_sysName64Count)
1800 RDR_SysName( AFS_SYSNAME_ARCH_64BIT, cm_sysName64Count, cm_sysName64List );
1801 else if (cm_sysNameCount)
1802 RDR_SysName( AFS_SYSNAME_ARCH_64BIT, cm_sysNameCount, cm_sysNameList );
1804 cm_sysNameCount = setSysName;
1805 RDR_SysName( AFS_SYSNAME_ARCH_32BIT, cm_sysNameCount, cm_sysNameList );
1810 /* return the sysname list to the caller.
1811 * if there is no 64-bit list and 64-bit is requested, use the 32-bit list.
1813 if ( arch64 && cm_sysName64Count == 0 )
1816 i32 = arch64 ? cm_sysName64Count : cm_sysNameCount;
1817 memcpy(ioctlp->outDatap, &i32, sizeof(afs_int32));
1818 ioctlp->outDatap += sizeof(afs_int32); /* skip found flag */
1821 for ( count=0; count < i32 ; ++count) { /* ... or list */
1822 if ( !(arch64 ? cm_sysName64List[count] : cm_sysNameList[count]) ||
1823 *(arch64 ? cm_sysName64List[count] : cm_sysNameList[count]) == _C('\0'))
1824 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to read\n",
1825 __FILE__, __LINE__);
1826 cm_UnparseIoctlString(ioctlp, NULL, arch64 ? cm_sysName64List[count] : cm_sysNameList[count], -1);
1841 * VIOC_GETCELLSTATUS internals.
1843 * Assumes that pioctl path has been parsed or skipped.
1846 cm_IoctlGetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1850 clientchar_t * cellnamep;
1851 fschar_t * fscellnamep;
1853 cellnamep = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1854 fscellnamep = cm_ClientStringToFsStringAlloc(cellnamep, -1, NULL);
1855 cellp = cm_GetCell(fscellnamep, 0);
1860 return CM_ERROR_NOSUCHCELL;
1863 lock_ObtainMutex(&cellp->mx);
1864 if (cellp->flags & CM_CELLFLAG_SUID)
1865 temp |= CM_SETCELLFLAG_SUID;
1866 lock_ReleaseMutex(&cellp->mx);
1868 /* now copy out parm */
1869 memcpy(ioctlp->outDatap, &temp, sizeof(afs_uint32));
1870 ioctlp->outDatap += sizeof(afs_uint32);
1876 * VIOC_SETCELLSTATUS internals.
1878 * Assumes that pioctl path has been parsed or skipped.
1881 cm_IoctlSetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1886 fschar_t * cellnamep;
1888 temp = cm_ParseIoctlStringAlloc(ioctlp, ioctlp->inDatap + 2*sizeof(afs_uint32));
1889 cellnamep = cm_ClientStringToFsStringAlloc(temp, -1, NULL);
1890 cellp = cm_GetCell(cellnamep, 0);
1895 return CM_ERROR_NOSUCHCELL;
1897 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_uint32));
1899 lock_ObtainMutex(&cellp->mx);
1900 if (flags & CM_SETCELLFLAG_SUID)
1901 _InterlockedOr(&cellp->flags, CM_CELLFLAG_SUID);
1903 _InterlockedAnd(&cellp->flags, ~CM_CELLFLAG_SUID);
1904 lock_ReleaseMutex(&cellp->mx);
1910 * VIOC_SETSPREFS internals.
1912 * Assumes that pioctl path has been parsed or skipped.
1915 cm_IoctlSetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1917 cm_SSetPref_t *spin; /* input */
1918 cm_SPref_t *srvin; /* one input component */
1920 int i, vlonly, noServers, type;
1921 struct sockaddr_in tmp;
1922 unsigned short rank;
1924 spin = (cm_SSetPref_t *)ioctlp->inDatap;
1925 noServers = spin->num_servers;
1926 vlonly = spin->flags;
1928 type = CM_SERVER_VLDB;
1930 type = CM_SERVER_FILE;
1932 for ( i=0; i < noServers; i++)
1934 srvin = &(spin->servers[i]);
1935 rank = srvin->rank + (rand() & 0x000f);
1936 tmp.sin_addr = srvin->host;
1938 case CM_SERVER_VLDB:
1939 tmp.sin_port = htons(7003);
1941 case CM_SERVER_FILE:
1942 tmp.sin_port = htons(7000);
1945 tmp.sin_family = AF_INET;
1947 tsp = cm_FindServer(&tmp, type, FALSE);
1948 if ( tsp ) /* an existing server - ref count increased */
1950 lock_ObtainMutex(&tsp->mx);
1951 tsp->adminRank = rank;
1952 _InterlockedOr(&tsp->flags, CM_SERVERFLAG_PREF_SET);
1954 lock_ReleaseMutex(&tsp->mx);
1957 case CM_SERVER_FILE:
1959 * find volumes which might have RO copy
1960 * on server and change the ordering of
1963 cm_ChangeRankVolume(tsp);
1965 case CM_SERVER_VLDB:
1966 /* set preferences for an existing vlserver */
1967 cm_ChangeRankCellVLServer(tsp);
1971 else /* add a new server without a cell */
1973 tsp = cm_NewServer(&tmp, type, NULL, NULL, CM_FLAG_NOPROBE); /* refcount = 1 */
1974 lock_ObtainMutex(&tsp->mx);
1975 tsp->adminRank = rank;
1976 _InterlockedOr(&tsp->flags, CM_SERVERFLAG_PREF_SET);
1977 lock_ReleaseMutex(&tsp->mx);
1979 cm_PutServer(tsp); /* decrease refcount */
1985 * VIOC_GETSPREFS internals.
1987 * Assumes that pioctl path has been parsed or skipped.
1990 cm_IoctlGetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1992 cm_SPrefRequest_t *spin; /* input */
1993 cm_SPrefInfo_t *spout; /* output */
1994 cm_SPref_t *srvout; /* one output component */
1996 int i, vlonly, noServers;
1998 spin = (cm_SPrefRequest_t *)ioctlp->inDatap;
1999 spout = (cm_SPrefInfo_t *) ioctlp->outDatap;
2000 srvout = spout->servers;
2001 noServers = spin->num_servers;
2002 vlonly = spin->flags & CM_SPREF_VLONLY;
2003 spout->num_servers = 0;
2005 lock_ObtainRead(&cm_serverLock); /* get server lock */
2007 for (tsp=cm_allServersp, i=0; tsp && noServers; tsp=tsp->allNextp,i++){
2008 if (spin->offset > i) {
2009 continue; /* catch up to where we left off */
2012 if ( vlonly && (tsp->type != CM_SERVER_VLDB) )
2013 continue; /* ignore fileserver for -vlserver option*/
2014 if ( !vlonly && (tsp->type != CM_SERVER_FILE) )
2015 continue; /* ignore vlservers */
2017 srvout->host = tsp->addr.sin_addr;
2018 srvout->rank = tsp->activeRank;
2020 spout->num_servers++;
2023 lock_ReleaseRead(&cm_serverLock); /* release server lock */
2025 if ( tsp ) /* we ran out of space in the output buffer */
2026 spout->next_offset = i;
2028 spout->next_offset = 0;
2029 ioctlp->outDatap += sizeof(cm_SPrefInfo_t) +
2030 (spout->num_servers -1 ) * sizeof(cm_SPref_t) ;
2036 * VIOC_AFS_CREATE_MT_PT internals.
2038 * Assumes that pioctl path has been parsed or skipped.
2039 * dscp is held but not locked.
2042 cm_IoctlCreateMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
2047 fschar_t mpInfo[512]; /* mount point string */
2048 fschar_t fullCell[CELL_MAXNAMELEN];
2049 fschar_t *fscell = NULL;
2050 fschar_t *fsvolume = NULL;
2051 clientchar_t volume[VL_MAXNAMELEN];
2052 clientchar_t *mpp = NULL;
2053 clientchar_t *cell = NULL;
2054 cm_volume_t *volp = NULL;
2055 cm_cell_t *cellp = NULL;
2059 * The fs command allows the user to specify partial cell names on NT. These must
2060 * be expanded to the full cell name for mount points so that the mount points will
2061 * work on UNIX clients.
2064 /* Extract the possibly partial cell name */
2065 mpp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
2067 len = cm_ClientStrLen(mpp);
2068 if (len <= 1 || mpp[len-1] != L'.') {
2069 code = CM_ERROR_INVAL;
2073 cell = cm_ClientCharNext(mpp);
2074 if (cp = cm_ClientStrChr(cell, ':')) {
2076 /* Extract the volume name */
2078 cm_ClientStrCpy(volume, lengthof(volume), cm_ClientCharNext(cp));
2080 fscell = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
2081 fsvolume = cm_ClientStringToFsStringAlloc(volume, -1, NULL);
2083 /* Get the full name for this cell */
2084 cellp = cm_GetCell_Gen(fscell, fullCell, CM_FLAG_NOPROBE);
2086 code = CM_ERROR_NOSUCHCELL;
2090 /* fsvolume includes the trailing dot */
2091 StringCbPrintfA(mpInfo, sizeof(mpInfo), "%c%s:%s", (char) *mpp,
2092 fullCell, fsvolume);
2095 /* No cell name specified, so cell points at the volume instead. */
2096 fsvolume = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
2097 cm_ClientStringToFsString(mpp, -1, mpInfo, lengthof(mpInfo));
2098 cellp = cm_FindCellByID(dscp->fid.cell, CM_FLAG_NOPROBE);
2101 /* remove the trailing dot */
2102 len = strlen(fsvolume);
2103 fsvolume[len-1] = '\0';
2105 /* validate the target info */
2106 if (cm_VolNameIsID(fsvolume)) {
2107 code = cm_FindVolumeByID(cellp, atoi(fsvolume), userp, reqp,
2108 CM_GETVOL_FLAG_CREATE, &volp);
2110 code = cm_FindVolumeByName(cellp, fsvolume, userp, reqp,
2111 CM_GETVOL_FLAG_CREATE, &volp);
2116 #ifdef AFS_FREELANCE_CLIENT
2117 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2118 /* we are adding the mount point to the root dir, so call
2119 * the freelance code to do the add. */
2120 fschar_t * fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
2121 osi_Log0(afsd_logp,"IoctlCreateMountPoint within Freelance root dir");
2122 code = cm_FreelanceAddMount(fsleaf, fullCell, fsvolume, *mpInfo == '%', NULL);
2127 /* create the symlink with mode 644. The lack of X bits tells
2128 * us that it is a mount point.
2130 tattr.mask = CM_ATTRMASK_UNIXMODEBITS | CM_ATTRMASK_CLIENTMODTIME;
2131 tattr.unixModeBits = 0644;
2132 tattr.clientModTime = time(NULL);
2134 code = cm_SymLink(dscp, leaf, mpInfo, 0, &tattr, userp, reqp, NULL);
2138 if (dscp->flags & CM_SCACHEFLAG_ANYWATCH)
2139 smb_NotifyChange(FILE_ACTION_ADDED,
2140 FILE_NOTIFY_CHANGE_DIR_NAME,
2141 dscp, leaf, NULL, TRUE);
2143 if (RDR_Initialized)
2144 RDR_InvalidateObject(dscp->fid.cell, dscp->fid.volume, dscp->fid.vnode, dscp->fid.unique,
2145 dscp->fid.hash, dscp->fileType, AFS_INVALIDATE_DATA_VERSION);
2162 * VIOC_SYMLINK internals.
2164 * Assumes that pioctl path has been parsed or skipped.
2165 * dscp is held but not locked.
2168 cm_IoctlSymlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
2174 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2175 /* Translate chars for the linked to name */
2176 TranslateExtendedChars(ioctlp->inDatap);
2179 cp = ioctlp->inDatap; /* contents of link */
2181 #ifdef AFS_FREELANCE_CLIENT
2182 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2183 /* we are adding the symlink to the root dir., so call
2184 * the freelance code to do the add. */
2187 if (cp[0] == cp[1] && cp[1] == '\\' &&
2188 !_strnicmp(cm_NetbiosName,cp+2,strlen(cm_NetbiosName)))
2190 /* skip \\AFS\ or \\AFS\all\ */
2192 p = cp + 2 + strlen(cm_NetbiosName) + 1;
2193 if ( !_strnicmp("all", p, 3) )
2198 osi_Log0(afsd_logp,"IoctlSymlink within Freelance root dir");
2199 fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
2200 code = cm_FreelanceAddSymlink(fsleaf, cp, NULL);
2205 /* Create symlink with mode 0755. */
2206 tattr.mask = CM_ATTRMASK_UNIXMODEBITS;
2207 tattr.unixModeBits = 0755;
2209 code = cm_SymLink(dscp, leaf, cp, 0, &tattr, userp, reqp, NULL);
2213 if (dscp->flags & CM_SCACHEFLAG_ANYWATCH)
2214 smb_NotifyChange(FILE_ACTION_ADDED,
2215 FILE_NOTIFY_CHANGE_FILE_NAME
2216 | FILE_NOTIFY_CHANGE_DIR_NAME,
2217 dscp, leaf, NULL, TRUE);
2219 if (RDR_Initialized)
2220 RDR_InvalidateObject(dscp->fid.cell, dscp->fid.volume, dscp->fid.vnode, dscp->fid.unique,
2221 dscp->fid.hash, dscp->fileType, AFS_INVALIDATE_DATA_VERSION);
2229 * VIOC_LISTSYMLINK internals.
2231 * Assumes that pioctl path has been parsed or skipped.
2232 * dscp is held but not locked.
2235 cm_IoctlListlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2241 cm_scache_t *newRootScp;
2242 clientchar_t *clientp;
2244 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2245 /* Translate chars for the link name */
2246 TranslateExtendedChars(ioctlp->inDatap);
2248 cp = ioctlp->inDatap;
2250 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2251 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2256 /* Check that it's a real symlink */
2257 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2258 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2259 scp->fileType != CM_SCACHETYPE_INVALID) {
2260 cm_ReleaseSCache(scp);
2261 return CM_ERROR_INVAL;
2264 code = cm_AssembleLink(scp, "", &newRootScp, &spacep, userp, reqp);
2265 cm_ReleaseSCache(scp);
2268 cp = ioctlp->outDatap;
2269 if (newRootScp != NULL) {
2270 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), cm_mountRoot);
2271 StringCbCatA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), "/");
2275 linkstr = cm_ClientStringToFsStringAlloc(spacep->wdata, -1, NULL);
2276 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), linkstr);
2277 cp += strlen(cp) + 1;
2278 ioctlp->outDatap = cp;
2279 cm_FreeSpace(spacep);
2281 if (newRootScp != NULL)
2282 cm_ReleaseSCache(newRootScp);
2284 } else if (code == CM_ERROR_PATH_NOT_COVERED &&
2285 scp->fileType == CM_SCACHETYPE_DFSLINK ||
2286 code == CM_ERROR_NOSUCHPATH &&
2287 scp->fileType == CM_SCACHETYPE_INVALID) {
2289 cp = ioctlp->outDatap;
2290 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), scp->mountPointStringp);
2291 cp += strlen(cp) + 1;
2292 ioctlp->outDatap = cp;
2300 * VIOC_ISSYMLINK internals.
2302 * Assumes that pioctl path has been parsed or skipped.
2303 * dscp is held but not locked.
2306 cm_IoctlIslink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2307 {/*CHECK FOR VALID SYMLINK*/
2311 clientchar_t *clientp;
2313 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2314 /* Translate chars for the link name */
2315 TranslateExtendedChars(ioctlp->inDatap);
2317 cp = ioctlp->inDatap;
2319 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2320 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2325 /* Check that it's a real symlink */
2326 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2327 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2328 scp->fileType != CM_SCACHETYPE_INVALID)
2329 code = CM_ERROR_INVAL;
2330 cm_ReleaseSCache(scp);
2335 * VIOC_DELSYMLINK internals.
2337 * Assumes that pioctl path has been parsed or skipped.
2338 * dscp is held but not locked.
2341 cm_IoctlDeletelink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2346 char * originalName = NULL;
2348 clientchar_t *clientp;
2350 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2351 /* Translate chars for the link name */
2352 TranslateExtendedChars(ioctlp->inDatap);
2354 cp = ioctlp->inDatap;
2356 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2357 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2359 /* if something went wrong, bail out now */
2363 lock_ObtainWrite(&scp->rw);
2364 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2365 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2369 /* now check that this is a real symlink */
2370 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2371 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2372 scp->fileType != CM_SCACHETYPE_INVALID) {
2373 code = CM_ERROR_INVAL;
2377 /* time to make the RPC, so drop the lock */
2378 lock_ReleaseWrite(&scp->rw);
2381 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
2382 CM_DIROP_FLAG_NONE, &dirop);
2384 code = cm_BPlusDirLookupOriginalName(&dirop, clientp, &originalName);
2385 /* cm_Dir*() functions can't be used to lookup the original
2386 name since those functions only know of the original
2388 cm_EndDirOp(&dirop);
2392 /* If this name doesn't have a non-normalized name associated with
2393 it, we assume that what we had is what is actually present on
2396 if (originalName == NULL)
2399 /* cp is a normalized name. originalName is the actual name we
2400 saw on the fileserver. */
2403 #ifdef AFS_FREELANCE_CLIENT
2404 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2405 /* we are adding the mount point to the root dir., so call
2406 * the freelance code to do the add. */
2407 osi_Log0(afsd_logp,"IoctlDeletelink from Freelance root dir");
2408 code = cm_FreelanceRemoveSymlink(originalName);
2412 /* easier to do it this way */
2413 code = cm_Unlink(dscp, originalName, clientp, userp, reqp);
2415 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2416 smb_NotifyChange(FILE_ACTION_REMOVED,
2417 FILE_NOTIFY_CHANGE_FILE_NAME
2418 | FILE_NOTIFY_CHANGE_DIR_NAME,
2419 dscp, clientp, NULL, TRUE);
2421 if (originalName != NULL && originalName != cp) {
2423 originalName = NULL;
2426 lock_ObtainWrite(&scp->rw);
2428 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2431 cm_DiscardSCache(scp);
2432 lock_ReleaseWrite(&scp->rw);
2433 cm_ReleaseSCache(scp);
2435 if (RDR_Initialized &&
2436 !RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
2437 scp->fid.hash, scp->fileType, AFS_INVALIDATE_DELETED))
2438 buf_ClearRDRFlag(scp, "deleted link");
2447 /* Utility function. Not currently used.
2448 * This function performs a PTS lookup which has traditionally
2449 * not been performed by the cache manager.
2452 cm_UsernameToId(char *uname, cm_ucell_t * ucellp, afs_uint32* uid)
2457 static struct afsconf_cell info;
2458 struct rx_connection *serverconns[MAXSERVERS];
2459 struct rx_securityClass *sc[3];
2460 afs_int32 scIndex = 2; /* authenticated - we have a token */
2461 struct ubik_client *pruclient = NULL;
2462 struct afsconf_dir *tdir;
2466 memset(&info, 0, sizeof(info));
2467 tdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH);
2468 code = afsconf_GetCellInfo(tdir, ucellp->cellp->name, "afsprot", &info);
2469 afsconf_Close(tdir);
2475 /* we have the token that was given to us in the settoken
2476 * call. we just have to use it.
2478 scIndex = 2; /* kerberos ticket */
2479 sc[2] = rxkad_NewClientSecurityObject(rxkad_clear, &ucellp->sessionKey,
2480 ucellp->kvno, ucellp->ticketLen,
2483 memset(serverconns, 0, sizeof(serverconns)); /* terminate list!!! */
2484 for (i = 0; i < info.numServers; i++)
2486 rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
2487 info.hostAddr[i].sin_port, PRSRV, sc[scIndex],
2490 code = ubik_ClientInit(serverconns, &pruclient);
2492 if (info.linkedCell)
2493 free(info.linkedCell);
2497 code = rxs_Release(sc[scIndex]);
2499 lids.idlist_len = 0;
2500 lids.idlist_val = 0;
2501 lnames.namelist_len = 1;
2502 lnames.namelist_val = (prname *) malloc(PR_MAXNAMELEN);
2503 strncpy(lnames.namelist_val[0], uname, PR_MAXNAMELEN);
2504 lnames.namelist_val[0][PR_MAXNAMELEN-1] = '\0';
2505 for ( p=lnames.namelist_val[0], r=NULL; *p; p++ ) {
2511 if (r && !cm_stricmp_utf8(r+1,ucellp->cellp->name))
2514 code = ubik_PR_NameToID(pruclient, 0, &lnames, &lids);
2515 if (lids.idlist_val) {
2516 *uid = *lids.idlist_val;
2517 free(lids.idlist_val);
2519 if (lnames.namelist_val)
2520 free(lnames.namelist_val);
2523 ubik_ClientDestroy(pruclient);
2527 if (info.linkedCell)
2528 free(info.linkedCell);
2531 #endif /* QUERY_AFSID */
2534 /* This has been copied to smb_IoctlSetToken in its entirety.
2535 * An equivalent version will need to be produced for the
2536 * redirector and some extensive refactoring might be required.
2539 cm_IoctlSetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2546 struct ClearToken ct;
2554 int release_userp = 0;
2557 saveDataPtr = ioctlp->inDatap;
2559 cm_SkipIoctlPath(ioctlp);
2561 tp = ioctlp->inDatap;
2564 memcpy(&ticketLen, tp, sizeof(ticketLen));
2565 tp += sizeof(ticketLen);
2566 if (ticketLen < MINKTCTICKETLEN || ticketLen > MAXKTCTICKETLEN)
2567 return CM_ERROR_INVAL;
2569 /* remember ticket and skip over it for now */
2573 /* clear token size */
2574 memcpy(&ctSize, tp, sizeof(ctSize));
2575 tp += sizeof(ctSize);
2576 if (ctSize != sizeof(struct ClearToken))
2577 return CM_ERROR_INVAL;
2580 memcpy(&ct, tp, ctSize);
2582 if (ct.AuthHandle == -1)
2583 ct.AuthHandle = 999; /* more rxvab compat stuff */
2585 /* more stuff, if any */
2586 if (ioctlp->inCopied > tp - saveDataPtr) {
2587 /* flags: logon flag */
2588 memcpy(&flags, tp, sizeof(int));
2592 cellp = cm_GetCell(tp, CM_FLAG_CREATE | CM_FLAG_NOPROBE);
2594 return CM_ERROR_NOSUCHCELL;
2595 tp += strlen(tp) + 1;
2599 tp += strlen(tp) + 1;
2601 if (flags & PIOCTL_LOGON) {
2602 /* SMB user name with which to associate tokens */
2604 osi_Log2(smb_logp,"cm_IoctlSetToken for user [%s] smbname [%s]",
2605 osi_LogSaveString(smb_logp,uname), osi_LogSaveString(smb_logp,smbname));
2606 fprintf(stderr, "SMB name = %s\n", smbname);
2607 tp += strlen(tp) + 1;
2609 osi_Log1(smb_logp,"cm_IoctlSetToken for user [%s]",
2610 osi_LogSaveString(smb_logp, uname));
2614 memcpy(&uuid, tp, sizeof(uuid));
2615 if (!cm_FindTokenEvent(uuid, sessionKey))
2616 return CM_ERROR_INVAL;
2618 cellp = cm_data.rootCellp;
2619 osi_Log0(smb_logp,"cm_IoctlSetToken - no name specified");
2622 if (flags & PIOCTL_LOGON) {
2623 clientchar_t *cname;
2625 cname = cm_FsStringToClientStringAlloc(smbname, -1, NULL);
2627 userp = smb_FindCMUserByName(cname, ioctlp->fidp->vcp->rname,
2628 SMB_FLAG_CREATE|SMB_FLAG_AFSLOGON);
2634 /* store the token */
2635 lock_ObtainMutex(&userp->mx);
2636 ucellp = cm_GetUCell(userp, cellp);
2637 osi_Log1(smb_logp,"cm_IoctlSetToken ucellp %lx", ucellp);
2638 ucellp->ticketLen = ticketLen;
2639 if (ucellp->ticketp)
2640 free(ucellp->ticketp); /* Discard old token if any */
2641 ucellp->ticketp = malloc(ticketLen);
2642 memcpy(ucellp->ticketp, ticket, ticketLen);
2644 * Get the session key from the RPC, rather than from the pioctl.
2647 memcpy(&ucellp->sessionKey, ct.HandShakeKey, sizeof(ct.HandShakeKey));
2649 memcpy(ucellp->sessionKey.data, sessionKey, sizeof(sessionKey));
2650 ucellp->kvno = ct.AuthHandle;
2651 ucellp->expirationTime = ct.EndTimestamp;
2654 ucellp->uid = ANONYMOUSID;
2657 StringCbCopyA(ucellp->userName, MAXKTCNAMELEN, uname);
2659 cm_UsernameToId(uname, ucellp, &ucellp->uid);
2662 _InterlockedOr(&ucellp->flags, CM_UCELLFLAG_RXKAD);
2663 lock_ReleaseMutex(&userp->mx);
2665 if (flags & PIOCTL_LOGON) {
2666 ioctlp->flags |= CM_IOCTLFLAG_LOGON;
2669 cm_ResetACLCache(cellp, userp);
2672 cm_ReleaseUser(userp);
2679 * VIOC_GETTOK internals.
2681 * Assumes that pioctl path has been parsed or skipped.
2684 cm_IoctlGetTokenIter(struct cm_ioctl *ioctlp, struct cm_user *userp)
2690 struct ClearToken ct;
2692 tp = ioctlp->inDatap;
2693 cp = ioctlp->outDatap;
2696 memcpy(&iterator, tp, sizeof(iterator));
2697 tp += sizeof(iterator);
2699 lock_ObtainMutex(&userp->mx);
2701 /* look for token */
2702 for (;;iterator++) {
2703 ucellp = cm_FindUCell(userp, iterator);
2705 lock_ReleaseMutex(&userp->mx);
2706 return CM_ERROR_NOMORETOKENS;
2708 if (ucellp->flags & CM_UCELLFLAG_RXKAD)
2713 temp = ucellp->iterator + 1;
2714 memcpy(cp, &temp, sizeof(temp));
2718 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2719 cp += sizeof(ucellp->ticketLen);
2722 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2723 cp += ucellp->ticketLen;
2725 /* clear token size */
2727 memcpy(cp, &temp, sizeof(temp));
2731 ct.AuthHandle = ucellp->kvno;
2734 * This field is supposed to hold the session key
2735 * but we don't want to make it easier for someone
2736 * to attack the cache. The user gave us the session
2737 * key in the first place.
2739 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2740 ct.ViceId = 37; /* XXX */
2741 ct.BeginTimestamp = 0; /* XXX */
2742 ct.EndTimestamp = ucellp->expirationTime;
2743 memcpy(cp, &ct, sizeof(ct));
2746 /* Primary flag (unused) */
2748 memcpy(cp, &temp, sizeof(temp));
2752 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2753 cp += strlen(cp) + 1;
2756 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2757 cp += strlen(cp) + 1;
2759 ioctlp->outDatap = cp;
2761 lock_ReleaseMutex(&userp->mx);
2767 * VIOC_NEWGETTOK internals.
2769 * Assumes that pioctl path has been parsed or skipped.
2772 cm_IoctlGetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2778 struct ClearToken ct;
2782 tp = ioctlp->inDatap;
2784 cp = ioctlp->outDatap;
2786 /* cell name is right here */
2787 cellp = cm_GetCell(tp, 0);
2789 return CM_ERROR_NOSUCHCELL;
2790 tp += strlen(tp) + 1;
2793 memcpy(&uuid, tp, sizeof(uuid));
2795 lock_ObtainMutex(&userp->mx);
2797 ucellp = cm_GetUCell(userp, cellp);
2798 if (!ucellp || !(ucellp->flags & CM_UCELLFLAG_RXKAD)) {
2799 lock_ReleaseMutex(&userp->mx);
2800 return CM_ERROR_NOMORETOKENS;
2804 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2805 cp += sizeof(ucellp->ticketLen);
2808 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2809 cp += ucellp->ticketLen;
2811 /* clear token size */
2813 memcpy(cp, &temp, sizeof(temp));
2817 ct.AuthHandle = ucellp->kvno;
2819 /* do not give out the session key */
2820 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2821 ct.ViceId = 37; /* XXX */
2822 ct.BeginTimestamp = 0; /* XXX */
2823 ct.EndTimestamp = ucellp->expirationTime;
2824 memcpy(cp, &ct, sizeof(ct));
2827 /* Primary flag (unused) */
2829 memcpy(cp, &temp, sizeof(temp));
2833 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2834 cp += strlen(cp) + 1;
2837 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2838 cp += strlen(cp) + 1;
2840 ioctlp->outDatap = cp;
2842 lock_ReleaseMutex(&userp->mx);
2844 cm_RegisterNewTokenEvent(uuid, ucellp->sessionKey.data, NULL);
2850 * VIOCDELTOK internals.
2852 * Assumes that pioctl path has been parsed or skipped.
2855 cm_IoctlDelToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2861 cp = ioctlp->outDatap;
2863 /* cell name is right here */
2864 cellp = cm_GetCell(ioctlp->inDatap, 0);
2866 return CM_ERROR_NOSUCHCELL;
2868 lock_ObtainMutex(&userp->mx);
2870 ucellp = cm_GetUCell(userp, cellp);
2872 lock_ReleaseMutex(&userp->mx);
2873 return CM_ERROR_NOMORETOKENS;
2876 osi_Log1(smb_logp,"cm_IoctlDelToken ucellp %lx", ucellp);
2878 if (ucellp->ticketp) {
2879 free(ucellp->ticketp);
2880 ucellp->ticketp = NULL;
2882 ucellp->ticketLen = 0;
2883 memset(ucellp->sessionKey.data, 0, 8);
2885 ucellp->expirationTime = 0;
2886 ucellp->userName[0] = '\0';
2887 _InterlockedAnd(&ucellp->flags, ~CM_UCELLFLAG_RXKAD);
2890 lock_ReleaseMutex(&userp->mx);
2892 cm_ResetACLCache(cellp, userp);
2898 * VIOCDELALLTOK internals.
2900 * Assumes that pioctl path has been parsed or skipped.
2903 cm_IoctlDelAllToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2907 lock_ObtainMutex(&userp->mx);
2909 for (ucellp = userp->cellInfop; ucellp; ucellp = ucellp->nextp) {
2910 osi_Log1(smb_logp,"cm_IoctlDelAllToken ucellp %lx", ucellp);
2912 if (ucellp->ticketp) {
2913 free(ucellp->ticketp);
2914 ucellp->ticketp = NULL;
2916 ucellp->ticketLen = 0;
2917 memset(ucellp->sessionKey.data, 0, 8);
2919 ucellp->expirationTime = 0;
2920 ucellp->userName[0] = '\0';
2921 _InterlockedAnd(&ucellp->flags, ~CM_UCELLFLAG_RXKAD);
2925 lock_ReleaseMutex(&userp->mx);
2927 cm_ResetACLCache(NULL, userp);
2933 * VIOC_MAKESUBMOUNT internals. (This function should be deprecated)
2935 * Assumes that pioctl path has been parsed or skipped.
2938 cm_IoctlMakeSubmount(cm_ioctl_t *ioctlp, cm_user_t *userp)
2940 char afspath[MAX_PATH];
2942 int nextAutoSubmount;
2944 DWORD dwType, dwSize;
2949 /* Serialize this one, to prevent simultaneous mods
2952 lock_ObtainMutex(&cm_Afsdsbmt_Lock);
2954 /* Parse the input parameters--first the required afs path,
2955 * then the requested submount name (which may be "").
2957 cm_NormalizeAfsPathAscii(afspath, sizeof(afspath), ioctlp->inDatap);
2958 submountreqp = ioctlp->inDatap + (strlen(ioctlp->inDatap)+1);
2960 /* If the caller supplied a suggested submount name, see if
2961 * that submount name is in use... if so, the submount's path
2962 * has to match our path.
2965 RegCreateKeyEx( HKEY_LOCAL_MACHINE,
2966 AFSREG_CLT_OPENAFS_SUBKEY "\\Submounts",
2969 REG_OPTION_NON_VOLATILE,
2970 KEY_READ|KEY_WRITE|KEY_QUERY_VALUE,
2975 if (submountreqp && *submountreqp) {
2976 char submountPath[MAX_PATH];
2978 dwSize = sizeof(submountPath);
2979 status = RegQueryValueEx( hkSubmounts, submountreqp, 0,
2980 &dwType, submountPath, &dwSize);
2982 if (status != ERROR_SUCCESS) {
2984 /* The suggested submount name isn't in use now--
2985 * so we can safely map the requested submount name
2986 * to the supplied path. Remember not to write the
2987 * leading "/afs" when writing out the submount.
2989 RegSetValueEx( hkSubmounts, submountreqp, 0,
2991 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2992 &afspath[strlen(cm_mountRoot)]:"/",
2993 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2994 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2996 RegCloseKey( hkSubmounts );
2997 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2998 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2999 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3003 /* The suggested submount name is already in use--if the
3004 * supplied path matches the submount's path, we can still
3005 * use the suggested submount name.
3007 if (!strcmp (submountPath, afspath)) {
3008 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
3009 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
3010 RegCloseKey( hkSubmounts );
3011 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3016 RegQueryInfoKey( hkSubmounts,
3018 NULL, /* lpcClass */
3019 NULL, /* lpReserved */
3020 NULL, /* lpcSubKeys */
3021 NULL, /* lpcMaxSubKeyLen */
3022 NULL, /* lpcMaxClassLen */
3023 &dwSubmounts, /* lpcValues */
3024 NULL, /* lpcMaxValueNameLen */
3025 NULL, /* lpcMaxValueLen */
3026 NULL, /* lpcbSecurityDescriptor */
3027 NULL /* lpftLastWriteTime */
3031 /* Having obtained a list of all available submounts, start
3032 * searching that list for a path which matches the requested
3033 * AFS path. We'll also keep track of the highest "auto15"/"auto47"
3034 * submount, in case we need to add a new one later.
3037 nextAutoSubmount = 1;
3039 for ( dwIndex = 0; dwIndex < dwSubmounts; dwIndex ++ ) {
3040 char submountPath[MAX_PATH] = "";
3041 DWORD submountPathLen = sizeof(submountPath);
3042 char submountName[MAX_PATH];
3043 DWORD submountNameLen = sizeof(submountName);
3046 RegEnumValue( hkSubmounts, dwIndex, submountName, &submountNameLen, NULL,
3047 &dwType, submountPath, &submountPathLen);
3048 if (dwType == REG_EXPAND_SZ) {
3050 StringCbCopyA(buf, MAX_PATH, submountPath);
3051 submountPathLen = ExpandEnvironmentStrings(buf, submountPath, MAX_PATH);
3052 if (submountPathLen > MAX_PATH)
3056 /* If this is an Auto### submount, remember its ### value */
3057 if ((!strnicmp (submountName, "auto", 4)) &&
3058 (isdigit (submountName[strlen("auto")]))) {
3059 int thisAutoSubmount;
3060 thisAutoSubmount = atoi (&submountName[strlen("auto")]);
3061 nextAutoSubmount = max (nextAutoSubmount,
3062 thisAutoSubmount+1);
3065 if ((submountPathLen == 0) ||
3066 (submountPathLen == sizeof(submountPath) - 1)) {
3070 /* See if the path for this submount matches the path
3071 * that our caller specified. If so, we can return
3074 if (!strcmp (submountPath, afspath)) {
3075 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountName);
3076 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
3077 RegCloseKey(hkSubmounts);
3078 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3084 /* We've been through the entire list of existing submounts, and
3085 * didn't find any which matched the specified path. So, we'll
3086 * just have to add one. Remember not to write the leading "/afs"
3087 * when writing out the submount.
3090 StringCbPrintfA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "auto%ld", nextAutoSubmount);
3092 RegSetValueEx( hkSubmounts,
3096 (strlen(&afspath[strlen(cm_mountRoot)])) ?
3097 &afspath[strlen(cm_mountRoot)]:"/",
3098 (strlen(&afspath[strlen(cm_mountRoot)])) ?
3099 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
3101 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
3102 RegCloseKey(hkSubmounts);
3103 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3108 * VIOC_GETRXKCRYPT internals.
3110 * Assumes that pioctl path has been parsed or skipped.
3113 cm_IoctlGetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
3115 memcpy(ioctlp->outDatap, &cryptall, sizeof(cryptall));
3116 ioctlp->outDatap += sizeof(cryptall);
3122 * VIOC_SETRXKCRYPT internals.
3124 * Assumes that pioctl path has been parsed or skipped.
3127 cm_IoctlSetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
3129 afs_int32 c = cryptall;
3131 memcpy(&cryptall, ioctlp->inDatap, sizeof(cryptall));
3133 if (c != cryptall) {
3135 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_ON);
3136 else if (cryptall == 2)
3137 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_AUTH);
3139 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_OFF);
3145 * VIOC_RXSTAT_PROC internals.
3147 * Assumes that pioctl path has been parsed or skipped.
3150 cm_IoctlRxStatProcess(struct cm_ioctl *ioctlp, struct cm_user *userp)
3155 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
3156 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
3159 if (flags & AFSCALL_RXSTATS_ENABLE) {
3160 rx_enableProcessRPCStats();
3162 if (flags & AFSCALL_RXSTATS_DISABLE) {
3163 rx_disableProcessRPCStats();
3165 if (flags & AFSCALL_RXSTATS_CLEAR) {
3166 rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
3172 * VIOC_RXSTAT_PEER internals.
3174 * Assumes that pioctl path has been parsed or skipped.
3177 cm_IoctlRxStatPeer(struct cm_ioctl *ioctlp, struct cm_user *userp)
3182 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
3183 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
3186 if (flags & AFSCALL_RXSTATS_ENABLE) {
3187 rx_enablePeerRPCStats();
3189 if (flags & AFSCALL_RXSTATS_DISABLE) {
3190 rx_disablePeerRPCStats();
3192 if (flags & AFSCALL_RXSTATS_CLEAR) {
3193 rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
3199 * VIOC_UNICODECTL internals.
3201 * Assumes that pioctl path has been parsed or skipped.
3204 cm_IoctlUnicodeControl(struct cm_ioctl *ioctlp, struct cm_user * userp)
3206 afs_int32 result = 0;
3210 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
3213 /* Setting the Unicode flag */
3216 newflag = ((cmd & 1) == 1);
3218 InterlockedExchange(&smb_UseUnicode, newflag);
3221 result = smb_UseUnicode;
3226 memcpy(ioctlp->outDatap, &result, sizeof(result));
3227 ioctlp->outDatap += sizeof(result);
3233 * VIOC_UUIDCTL internals.
3235 * Assumes that pioctl path has been parsed or skipped.
3238 cm_IoctlUUIDControl(struct cm_ioctl * ioctlp, struct cm_user *userp)
3243 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
3245 if (cmd) { /* generate a new UUID */
3246 UuidCreate((UUID *) &uuid);
3247 cm_data.Uuid = uuid;
3248 cm_ForceNewConnectionsAllServers();
3251 memcpy(ioctlp->outDatap, &cm_data.Uuid, sizeof(cm_data.Uuid));
3252 ioctlp->outDatap += sizeof(cm_data.Uuid);
3260 * functions to dump contents of various structures.
3261 * In debug build (linked with crt debug library) will dump allocated but not freed memory
3263 extern int cm_DumpSCache(FILE *outputFile, char *cookie, int lock);
3264 extern int cm_DumpBufHashTable(FILE *outputFile, char *cookie, int lock);
3267 * VIOC_TRACEMEMDUMP internals.
3269 * Assumes that pioctl path has been parsed or skipped.
3270 * dscp is held but not locked.
3273 cm_IoctlMemoryDump(struct cm_ioctl *ioctlp, struct cm_user *userp)
3275 afs_int32 inValue = 0;
3277 char logfileName[MAX_PATH+1];
3282 static _CrtMemState memstate;
3285 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_int32));
3287 dwSize = GetEnvironmentVariable("TEMP", logfileName, sizeof(logfileName));
3288 if ( dwSize == 0 || dwSize > sizeof(logfileName) )
3290 GetWindowsDirectory(logfileName, sizeof(logfileName));
3292 strncat(logfileName, "\\afsd_alloc.log", sizeof(logfileName));
3294 hLogFile = CreateFile(logfileName, GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
3300 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_int32));
3301 ioctlp->outDatap += sizeof(afs_int32);
3306 SetFilePointer(hLogFile, 0, NULL, FILE_END);
3308 cookie = inValue ? "b" : "e";
3314 _CrtMemCheckpoint(&memstate);
3318 _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
3319 _CrtSetReportFile(_CRT_WARN, hLogFile);
3320 _CrtMemDumpAllObjectsSince(&memstate);
3324 /* dump all interesting data */
3325 cm_MemDumpDirStats(hLogFile, cookie, 1);
3326 cm_MemDumpBPlusStats(hLogFile, cookie, 1);
3327 cm_DumpCells(hLogFile, cookie, !RDR_Initialized);
3328 cm_DumpVolumes(hLogFile, cookie, !RDR_Initialized);
3329 cm_DumpSCache(hLogFile, cookie, !RDR_Initialized);
3330 cm_DumpBufHashTable(hLogFile, cookie, !RDR_Initialized);
3331 cm_DumpServers(hLogFile, cookie, !RDR_Initialized);
3332 smb_DumpVCP(hLogFile, cookie, 1);
3333 rx_DumpCalls(hLogFile, cookie);
3334 rx_DumpPackets(hLogFile, cookie);
3336 CloseHandle(hLogFile);
3338 inValue = 0; /* success */
3339 memcpy(ioctlp->outDatap, &inValue, sizeof(long));
3340 ioctlp->outDatap += sizeof(long);
3345 /* Utility functon. Not currently used. */
3347 cm_CheckServersStatus(cm_serverRef_t *serversp)
3350 cm_serverRef_t *tsrp;
3352 int someBusy = 0, someOffline = 0, allOffline = 1, allBusy = 1, allDown = 1, allDeleted = 1;
3354 if (serversp == NULL) {
3355 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", CM_ERROR_EMPTY);
3356 return CM_ERROR_EMPTY;
3359 lock_ObtainRead(&cm_serverLock);
3360 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
3361 if (tsrp->status == srv_deleted)
3364 if (tsp = tsrp->server) {
3365 cm_GetServerNoLock(tsp);
3366 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
3368 if (tsrp->status == srv_busy) {
3371 } else if (tsrp->status == srv_offline) {
3377 cm_PutServerNoLock(tsp);
3381 cm_PutServerNoLock(tsp);
3384 lock_ReleaseRead(&cm_serverLock);
3387 code = CM_ERROR_EMPTY;
3389 code = CM_ERROR_ALLDOWN;
3391 code = CM_ERROR_ALLBUSY;
3392 else if (allOffline || (someBusy && someOffline))
3393 code = CM_ERROR_ALLOFFLINE;
3396 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", code);
3401 * VIOC_PATH_AVAILABILITY internals.
3403 * Assumes that pioctl path has been parsed or skipped.
3404 * scp is held but not locked.
3407 cm_IoctlPathAvailability(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3412 cm_vol_state_t *statep;
3415 #ifdef AFS_FREELANCE_CLIENT
3416 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
3421 volume = scp->fid.volume;
3423 cellp = cm_FindCellByID(scp->fid.cell, 0);
3426 return CM_ERROR_NOSUCHCELL;
3428 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
3432 statep = cm_VolumeStateByID(tvp, volume);
3433 switch (statep->state) {
3439 code = CM_ERROR_ALLBUSY;
3442 code = CM_ERROR_ALLOFFLINE;
3445 code = CM_ERROR_ALLDOWN;
3454 * VIOC_VOLSTAT_TEST internals.
3456 * Assumes that pioctl path has been parsed or skipped.
3459 cm_IoctlVolStatTest(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
3462 cm_cell_t *cellp = NULL;
3464 cm_vol_state_t *statep;
3465 struct VolStatTest * testp;
3468 testp = (struct VolStatTest *)ioctlp->inDatap;
3470 #ifdef AFS_FREELANCE_CLIENT
3471 if (testp->fid.cell == -1)
3472 return CM_ERROR_NOACCESS;
3475 if (testp->flags & VOLSTAT_TEST_CHECK_VOLUME) {
3476 cm_CheckOfflineVolumes();
3480 if (testp->flags & VOLSTAT_TEST_NETWORK_UP) {
3481 cm_VolStatus_Network_Started(cm_NetbiosName
3489 if (testp->flags & VOLSTAT_TEST_NETWORK_DOWN) {
3490 cm_VolStatus_Network_Stopped(cm_NetbiosName
3498 if (testp->cellname[0]) {
3499 n = atoi(testp->cellname);
3501 testp->fid.cell = n;
3503 cellp = cm_GetCell(testp->cellname, 0);
3506 if (testp->fid.cell > 0) {
3507 cellp = cm_FindCellByID(testp->fid.cell, 0);
3511 return CM_ERROR_NOSUCHCELL;
3513 if (testp->volname[0]) {
3514 n = atoi(testp->volname);
3516 testp->fid.volume = n;
3518 code = cm_FindVolumeByName(cellp, testp->volname, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3521 if (testp->fid.volume > 0)
3522 code = cm_FindVolumeByID(cellp, testp->fid.volume, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3527 if (testp->fid.volume)
3528 statep = cm_VolumeStateByID(volp, testp->fid.volume);
3530 statep = cm_VolumeStateByName(volp, testp->volname);
3533 statep->state = testp->state;
3534 code = cm_VolStatus_Change_Notification(cellp->cellID, statep->ID, testp->state);
3543 * VIOC_GETUNIXMODE internals.
3545 * Assumes that pioctl path has been parsed or skipped.
3546 * scp is held but not locked.
3549 cm_IoctlGetUnixMode(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3554 lock_ObtainWrite(&scp->rw);
3555 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
3556 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3558 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3559 lock_ReleaseWrite(&scp->rw);
3562 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
3563 cp = ioctlp->outDatap;
3564 memcpy(cp, (char *)&scp->unixModeBits, sizeof(afs_uint32));
3565 cp += sizeof(afs_uint32);
3567 /* return new size */
3568 ioctlp->outDatap = cp;
3575 * VIOC_SETUNIXMODE internals.
3577 * Assumes that pioctl path has been parsed or skipped
3578 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
3580 * scp is held but not locked.
3583 cm_IoctlSetUnixMode(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3588 lock_ObtainWrite(&scp->rw);
3589 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
3590 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3592 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3593 lock_ReleaseWrite(&scp->rw);
3596 afs_uint32 unixModeBits;
3599 memset(&attr, 0, sizeof(attr));
3601 cp = ioctlp->inDatap;
3602 memcpy((char *)&unixModeBits, cp, sizeof(afs_uint32));
3604 attr.mask = CM_ATTRMASK_UNIXMODEBITS;
3605 attr.unixModeBits = unixModeBits;
3607 code = cm_SetAttr(scp, &attr, userp, reqp);
3613 * VIOC_GETVERIFYDATA internals.
3615 * Assumes that pioctl path has been parsed or skipped.
3618 cm_IoctlGetVerifyData(cm_ioctl_t *ioctlp)
3620 memcpy(ioctlp->outDatap, &cm_verifyData, sizeof(cm_verifyData));
3621 ioctlp->outDatap += sizeof(cm_verifyData);
3627 * VIOC_SETVERIFYDATA internals.
3629 * Assumes that pioctl path has been parsed or skipped.
3632 cm_IoctlSetVerifyData(cm_ioctl_t *ioctlp)
3634 memcpy(&cm_verifyData, ioctlp->inDatap, sizeof(cm_verifyData));
3640 * VIOC_GETCALLERACCESS internals.
3642 * Assumes that pioctl path has been parsed or skipped.
3646 cm_IoctlGetCallerAccess(cm_ioctl_t *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3649 afs_uint32 rights = 0;
3653 lock_ObtainWrite(&scp->rw);
3654 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
3655 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3657 haveRights = cm_HaveAccessRights(scp, userp, reqp, 0xFF0000FF, &rights);
3658 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3660 lock_ReleaseWrite(&scp->rw);
3662 cp = ioctlp->outDatap;
3663 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
3665 memcpy(cp, (char *)&rights, sizeof(afs_uint32));
3667 memcpy(cp, (char *)&scp->anyAccess, sizeof(afs_uint32));
3668 cp += sizeof(afs_uint32);
3669 memcpy(cp, (char *)&scp->anyAccess, sizeof(afs_uint32));
3670 cp += sizeof(afs_uint32);
3672 /* return new size */
3673 ioctlp->outDatap = cp;