2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afsconfig.h>
11 #include <afs/param.h>
15 #include <afs/cellconfig.h>
16 #include <afs/afs_consts.h>
17 #include <afs/ptserver.h>
31 #include "afsd_init.h"
32 #include <WINNT\afsreg.h>
50 /* Copied from afs_tokens.h */
51 #define PIOCTL_LOGON 0x1
54 const char utf8_prefix[] = UTF8_PREFIX;
55 const int utf8_prefix_size = sizeof(utf8_prefix) - sizeof(char);
57 osi_mutex_t cm_Afsdsbmt_Lock;
59 extern afs_int32 cryptall;
60 extern char cm_NetbiosName[];
61 extern clientchar_t cm_NetbiosNameC[];
63 extern void afsi_log(char *pattern, ...);
65 void cm_InitIoctl(void)
67 lock_InitializeMutex(&cm_Afsdsbmt_Lock, "AFSDSBMT.INI Access Lock",
68 LOCK_HIERARCHY_AFSDBSBMT_GLOBAL);
72 * Utility function. (Not currently in use.)
73 * This function forces all dirty buffers to the file server and
74 * then discards the status info.
77 cm_CleanFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
81 if (RDR_Initialized &&
82 RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
83 scp->fid.hash, scp->fileType, AFS_INVALIDATE_FLUSHED))
84 code = CM_ERROR_WOULDBLOCK;
86 code = cm_FSync(scp, userp, reqp, FALSE);
88 lock_ObtainWrite(&scp->rw);
89 cm_DiscardSCache(scp);
90 lock_ReleaseWrite(&scp->rw);
92 osi_Log2(afsd_logp,"cm_CleanFile scp 0x%x returns error: [%x]",scp, code);
97 * Utility function. Used within this file.
98 * scp must be held but not locked.
101 cm_FlushFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
105 #ifdef AFS_FREELANCE_CLIENT
106 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
107 return CM_ERROR_NOACCESS;
112 * The file system will forget all knowledge of the object
113 * when it receives this message.
115 if (RDR_Initialized &&
116 RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
117 scp->fid.hash, scp->fileType, AFS_INVALIDATE_FLUSHED))
118 code = CM_ERROR_WOULDBLOCK;
120 code = buf_FlushCleanPages(scp, userp, reqp);
122 if (scp->fileType == CM_SCACHETYPE_DIRECTORY)
123 lock_ObtainWrite(&scp->dirlock);
124 lock_ObtainWrite(&scp->rw);
125 cm_DiscardSCache(scp);
126 if (scp->fileType == CM_SCACHETYPE_MOUNTPOINT ||
127 scp->fileType == CM_SCACHETYPE_SYMLINK) {
128 scp->mpDataVersion = CM_SCACHE_VERSION_BAD;
129 scp->mountPointStringp[0] = '\0';
131 if (scp->fileType == CM_SCACHETYPE_DIRECTORY) {
132 cm_ResetSCacheDirectory(scp, 1);
133 lock_ReleaseWrite(&scp->dirlock);
135 lock_ReleaseWrite(&scp->rw);
137 osi_Log2(afsd_logp,"cm_FlushFile scp 0x%x returns error: [%x]",scp, code);
142 * Utility function. (Not currently in use)
143 * IoctlPath must be parsed or skipped prior to calling.
144 * scp must be held but not locked.
147 cm_FlushParent(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
152 pscp = cm_FindSCacheParent(scp);
154 /* now flush the file */
155 code = cm_FlushFile(pscp, userp, reqp);
156 cm_ReleaseSCache(pscp);
162 * Utility function. Used within this function.
165 cm_FlushVolume(cm_user_t *userp, cm_req_t *reqp, afs_uint32 cell, afs_uint32 volume)
171 #ifdef AFS_FREELANCE_CLIENT
172 if ( cell == AFS_FAKE_ROOT_CELL_ID && volume == AFS_FAKE_ROOT_VOL_ID ) {
173 return CM_ERROR_NOACCESS;
177 lock_ObtainWrite(&cm_scacheLock);
178 for (i=0; i<cm_data.scacheHashTableSize; i++) {
179 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
180 if (scp->fid.volume == volume && scp->fid.cell == cell) {
181 cm_HoldSCacheNoLock(scp);
182 lock_ReleaseWrite(&cm_scacheLock);
184 /* now flush the file */
185 code = cm_FlushFile(scp, userp, reqp);
186 lock_ObtainWrite(&cm_scacheLock);
187 cm_ReleaseSCacheNoLock(scp);
191 lock_ReleaseWrite(&cm_scacheLock);
197 * TranslateExtendedChars - This is a fix for TR 54482.
199 * If an extended character (80 - FF) is entered into a file
200 * or directory name in Windows, the character is translated
201 * into the OEM character map before being passed to us.
202 * The pioctl functions must match
203 * this translation for paths given via our own commands (like
204 * fs). If we do not do this, then we will try to perform an
205 * operation on a non-translated path, which we will fail to
206 * find, since the path was created with the translated chars.
207 * This function performs the required translation.
209 * OEM character code pages are used by the non-Unicode SMB
210 * mode. Do not use if the CM_IOCTLFLAG_USEUTF8 is set.
213 TranslateExtendedChars(char *str)
218 CharToOemA(str, str);
221 void cm_SkipIoctlPath(cm_ioctl_t *ioctlp)
225 temp = strlen(ioctlp->inDatap) + 1;
226 ioctlp->inDatap += temp;
230 clientchar_t * cm_ParseIoctlStringAlloc(cm_ioctl_t *ioctlp, const char * ext_instrp)
232 clientchar_t * rs = NULL;
235 instrp = (ext_instrp)?ext_instrp:ioctlp->inDatap;
237 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
238 rs = cm_Utf8ToClientStringAlloc(instrp, -1, NULL);
242 /* Not a UTF-8 string */
243 if (smb_StoreAnsiFilenames) {
244 cch = cm_AnsiToClientString(instrp, -1, NULL, 0);
248 rs = malloc(cch * sizeof(clientchar_t));
249 cm_AnsiToClientString(instrp, -1, rs, cch);
251 cch = cm_OemToClientString(instrp, -1, NULL, 0);
255 rs = malloc(cch * sizeof(clientchar_t));
256 cm_OemToClientString(instrp, -1, rs, cch);
260 if (ext_instrp == NULL) {
261 ioctlp->inDatap += strlen(ioctlp->inDatap) + 1;
266 int cm_UnparseIoctlString(cm_ioctl_t *ioctlp,
268 const clientchar_t * cstr, int cchlen)
273 outp = ((ext_outp == NULL)? ioctlp->outDatap : ext_outp);
275 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
276 cchout = cm_ClientStringToUtf8(cstr, cchlen, outp,
277 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)));
279 if (smb_StoreAnsiFilenames) {
280 cchout = WideCharToMultiByte(CP_ACP, 0, cstr, cchlen,
282 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)),
285 cchout = WideCharToMultiByte(CP_OEMCP, 0, cstr, cchlen,
287 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)),
292 if (cchout > 0 && ext_outp == NULL) {
293 ioctlp->outDatap += cchout;
300 * Must be called before XXX_ParseIoctlPath or cm_SkipIoctlPath
302 cm_ioctlQueryOptions_t *
303 cm_IoctlGetQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
305 afs_uint32 pathlen = (afs_uint32) strlen(ioctlp->inDatap) + 1;
306 char *p = ioctlp->inDatap + pathlen;
307 cm_ioctlQueryOptions_t * optionsp = NULL;
309 if (ioctlp->inCopied > p - ioctlp->inAllocp) {
310 optionsp = (cm_ioctlQueryOptions_t *)p;
311 if (optionsp->size < 12 /* minimum size of struct */)
319 * Must be called after smb_ParseIoctlPath or cm_SkipIoctlPath
320 * or any other time that ioctlp->inDatap points at the
321 * cm_ioctlQueryOptions_t object.
324 cm_IoctlSkipQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
326 cm_ioctlQueryOptions_t * optionsp = (cm_ioctlQueryOptions_t *)ioctlp->inDatap;
327 ioctlp->inDatap += optionsp->size;
328 ioctlp->inCopied -= optionsp->size;
331 /* format the specified path to look like "/afs/<cellname>/usr", by
332 * adding "/afs" (if necessary) in front, changing any \'s to /'s, and
333 * removing any trailing "/"'s. One weirdo caveat: "/afs" will be
334 * intentionally returned as "/afs/"--this makes submount manipulation
335 * easier (because we can always jump past the initial "/afs" to find
336 * the AFS path that should be written into afsdsbmt.ini).
339 cm_NormalizeAfsPath(clientchar_t *outpathp, long cchlen, clientchar_t *inpathp)
342 clientchar_t bslash_mountRoot[256];
344 cm_ClientStrCpy(bslash_mountRoot, lengthof(bslash_mountRoot), cm_mountRootC);
345 bslash_mountRoot[0] = '\\';
347 if (!cm_ClientStrCmpNI(inpathp, cm_mountRootC, cm_mountRootCLen))
348 cm_ClientStrCpy(outpathp, cchlen, inpathp);
349 else if (!cm_ClientStrCmpNI(inpathp, bslash_mountRoot,
350 (int)cm_ClientStrLen(bslash_mountRoot)))
351 cm_ClientStrCpy(outpathp, cchlen, inpathp);
352 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
353 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s%s"), cm_mountRootC, inpathp);
354 else // inpathp looks like "<cell>/usr"
355 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s/%s"), cm_mountRootC, inpathp);
357 for (cp = outpathp; *cp != 0; ++cp) {
362 if (cm_ClientStrLen(outpathp) && (outpathp[cm_ClientStrLen(outpathp)-1] == '/')) {
363 outpathp[cm_ClientStrLen(outpathp)-1] = 0;
366 if (!cm_ClientStrCmpI(outpathp, cm_mountRootC)) {
367 cm_ClientStrCpy(outpathp, cchlen, cm_mountRootC);
371 void cm_NormalizeAfsPathAscii(char *outpathp, long outlen, char *inpathp)
374 char bslash_mountRoot[256];
376 strncpy(bslash_mountRoot, cm_mountRoot, sizeof(bslash_mountRoot) - 1);
377 bslash_mountRoot[0] = '\\';
379 if (!strnicmp (inpathp, cm_mountRoot, strlen(cm_mountRoot)))
380 StringCbCopy(outpathp, outlen, inpathp);
381 else if (!strnicmp (inpathp, bslash_mountRoot, strlen(bslash_mountRoot)))
382 StringCbCopy(outpathp, outlen, inpathp);
383 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
384 StringCbPrintfA(outpathp, outlen, "%s%s", cm_mountRoot, inpathp);
385 else // inpathp looks like "<cell>/usr"
386 StringCbPrintfA(outpathp, outlen, "%s/%s", cm_mountRoot, inpathp);
388 for (cp = outpathp; *cp != 0; ++cp) {
393 if (strlen(outpathp) && (outpathp[strlen(outpathp)-1] == '/')) {
394 outpathp[strlen(outpathp)-1] = 0;
397 if (!_stricmp (outpathp, cm_mountRoot)) {
398 StringCbCopy(outpathp, outlen, cm_mountRoot);
404 * VIOCGETAL internals.
406 * Assumes that pioctl path has been parsed or skipped.
407 * scp is held but not locked.
410 cm_IoctlGetACL(cm_ioctl_t *ioctlp, cm_user_t *userp, cm_scache_t *scp, cm_req_t *reqp)
415 AFSFetchStatus fileStatus;
419 struct rx_connection * rxconnp;
421 memset(&volSync, 0, sizeof(volSync));
423 /* now make the get acl call */
424 #ifdef AFS_FREELANCE_CLIENT
425 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
427 ioctlp->outDatap[0] ='\0';
431 afid.Volume = scp->fid.volume;
432 afid.Vnode = scp->fid.vnode;
433 afid.Unique = scp->fid.unique;
435 acl.AFSOpaque_val = ioctlp->outDatap;
436 acl.AFSOpaque_len = 0;
437 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
441 rxconnp = cm_GetRxConn(connp);
442 code = RXAFS_FetchACL(rxconnp, &afid, &acl, &fileStatus, &volSync);
443 rx_PutConnection(rxconnp);
445 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, 0, &fileStatus, &volSync, NULL, NULL, code));
446 code = cm_MapRPCError(code, reqp);
451 /* skip over return data */
452 tlen = (int)strlen(ioctlp->outDatap) + 1;
453 ioctlp->outDatap += tlen;
455 /* and return success */
461 * VIOC_FILE_CELL_NAME internals.
463 * Assumes that pioctl path has been parsed or skipped.
464 * scp is held but not locked.
467 cm_IoctlGetFileCellName(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
472 #ifdef AFS_FREELANCE_CLIENT
473 if ( cm_freelanceEnabled &&
474 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
475 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID &&
476 scp->fid.vnode==0x1 && scp->fid.unique==0x1 ) {
477 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
478 ioctlp->outDatap += strlen(ioctlp->outDatap) + 1;
481 #endif /* AFS_FREELANCE_CLIENT */
483 cellp = cm_FindCellByID(scp->fid.cell, CM_FLAG_NOPROBE);
485 clientchar_t * cellname;
487 cellname = cm_FsStringToClientStringAlloc(cellp->name, -1, NULL);
488 if (cellname == NULL) {
489 code = CM_ERROR_NOSUCHCELL;
491 cm_UnparseIoctlString(ioctlp, NULL, cellname, -1);
496 code = CM_ERROR_NOSUCHCELL;
504 * VIOCSETAL internals.
506 * Assumes that pioctl path has been parsed or skipped.
507 * scp is held but not locked.
510 cm_IoctlSetACL(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
515 AFSFetchStatus fileStatus;
518 struct rx_connection * rxconnp;
520 memset(&volSync, 0, sizeof(volSync));
522 #ifdef AFS_FREELANCE_CLIENT
523 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
524 code = CM_ERROR_NOACCESS;
528 /* now make the get acl call */
529 fid.Volume = scp->fid.volume;
530 fid.Vnode = scp->fid.vnode;
531 fid.Unique = scp->fid.unique;
533 acl.AFSOpaque_val = ioctlp->inDatap;
534 acl.AFSOpaque_len = (u_int)strlen(ioctlp->inDatap)+1;
535 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
539 rxconnp = cm_GetRxConn(connp);
540 code = RXAFS_StoreACL(rxconnp, &fid, &acl, &fileStatus, &volSync);
541 rx_PutConnection(rxconnp);
543 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, 1, &fileStatus, &volSync, NULL, NULL, code));
544 code = cm_MapRPCError(code, reqp);
546 /* invalidate cache info, since we just trashed the ACL cache */
547 lock_ObtainWrite(&scp->rw);
548 cm_DiscardSCache(scp);
549 lock_ReleaseWrite(&scp->rw);
552 RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
553 scp->fid.hash, scp->fileType, AFS_INVALIDATE_CREDS);
560 * VIOC_FLUSHALL internals.
562 * Assumes that pioctl path has been parsed or skipped.
565 cm_IoctlFlushAllVolumes(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
571 lock_ObtainWrite(&cm_scacheLock);
572 for (i=0; i<cm_data.scacheHashTableSize; i++) {
573 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
574 cm_HoldSCacheNoLock(scp);
575 lock_ReleaseWrite(&cm_scacheLock);
577 /* now flush the file */
578 code = cm_FlushFile(scp, userp, reqp);
579 lock_ObtainWrite(&cm_scacheLock);
580 cm_ReleaseSCacheNoLock(scp);
583 lock_ReleaseWrite(&cm_scacheLock);
585 #ifdef AFS_FREELANCE_CLIENT
586 cm_noteLocalMountPointChange(FALSE);
593 * VIOC_FLUSHVOLUME internals.
595 * Assumes that pioctl path has been parsed or skipped.
596 * scp is held but not locked.
599 cm_IoctlFlushVolume(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
602 #ifdef AFS_FREELANCE_CLIENT
603 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
604 cm_noteLocalMountPointChange(FALSE);
609 return cm_FlushVolume(userp, reqp, scp->fid.cell, scp->fid.volume);
613 * VIOCFLUSH internals.
615 * Assumes that pioctl path has been parsed or skipped.
616 * scp is held but not locked.
619 cm_IoctlFlushFile(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
623 #ifdef AFS_FREELANCE_CLIENT
624 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
625 return CM_ERROR_NOACCESS;
629 return cm_FlushFile(scp, userp, reqp);
634 * VIOCSETVOLSTAT internals.
636 * Assumes that pioctl path has been parsed or skipped.
637 * scp is held but not locked.
640 cm_IoctlSetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
644 char offLineMsg[256];
647 AFSFetchVolumeStatus volStat;
648 AFSStoreVolumeStatus storeStat;
653 struct rx_connection * rxconnp;
655 #ifdef AFS_FREELANCE_CLIENT
656 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
657 code = CM_ERROR_NOACCESS;
661 cellp = cm_FindCellByID(scp->fid.cell, 0);
662 osi_assertx(cellp, "null cm_cell_t");
664 if (scp->flags & CM_SCACHEFLAG_RO)
665 return CM_ERROR_READONLY;
667 code = cm_FindVolumeByID(cellp, scp->fid.volume, userp, reqp,
668 CM_GETVOL_FLAG_CREATE, &tvp);
674 /* Copy the junk out, using cp as a roving pointer. */
675 memcpy((char *)&volStat, ioctlp->inDatap, sizeof(AFSFetchVolumeStatus));
676 ioctlp->inDatap += sizeof(AFSFetchVolumeStatus);
678 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
679 cm_ClientStringToFsString(strp, -1, volName, lengthof(volName));
682 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
683 cm_ClientStringToFsString(strp, -1, offLineMsg, lengthof(offLineMsg));
686 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
687 cm_ClientStringToFsString(strp, -1, motd, lengthof(motd));
693 if (volStat.MinQuota != -1) {
694 storeStat.MinQuota = volStat.MinQuota;
695 storeStat.Mask |= AFS_SETMINQUOTA;
697 if (volStat.MaxQuota != -1) {
698 storeStat.MaxQuota = volStat.MaxQuota;
699 storeStat.Mask |= AFS_SETMAXQUOTA;
703 code = cm_ConnFromFID(&scp->fid, userp, reqp, &tcp);
707 rxconnp = cm_GetRxConn(tcp);
708 code = RXAFS_SetVolumeStatus(rxconnp, scp->fid.volume,
709 &storeStat, volName, offLineMsg, motd);
710 rx_PutConnection(rxconnp);
712 } while (cm_Analyze(tcp, userp, reqp, &scp->fid, NULL, 1, NULL, NULL, NULL, NULL, code));
713 code = cm_MapRPCError(code, reqp);
716 /* return on failure */
720 /* we are sending parms back to make compat. with prev system. should
721 * change interface later to not ask for current status, just set
724 cp = ioctlp->outDatap;
725 memcpy(cp, (char *)&volStat, sizeof(VolumeStatus));
726 cp += sizeof(VolumeStatus);
727 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
728 cp += strlen(volName)+1;
729 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
730 cp += strlen(offLineMsg)+1;
731 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
732 cp += strlen(motd)+1;
734 /* now return updated return data pointer */
735 ioctlp->outDatap = cp;
742 * VIOCGETVOLSTAT internals.
744 * Assumes that pioctl path has been parsed or skipped.
745 * scp is held but not locked.
748 cm_IoctlGetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
751 char volName[32]="(unknown)";
752 char offLineMsg[256]="server temporarily inaccessible";
753 char motd[256]="server temporarily inaccessible";
755 AFSFetchVolumeStatus volStat;
760 struct rx_connection * rxconnp;
762 #ifdef AFS_FREELANCE_CLIENT
763 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
765 strncpy(volName, "Freelance.Local.Root", sizeof(volName));
766 offLineMsg[0] = '\0';
767 strncpy(motd, "Freelance mode in use.", sizeof(motd));
768 volStat.Vid = scp->fid.volume;
769 volStat.MaxQuota = 0;
770 volStat.BlocksInUse = 100;
771 volStat.PartBlocksAvail = 0;
772 volStat.PartMaxBlocks = 100;
779 cm_SetFid(&vfid, scp->fid.cell, scp->fid.volume, 1, 1);
780 code = cm_GetSCache(&vfid, NULL, &vscp, userp, reqp);
784 lock_ObtainWrite(&vscp->rw);
785 code = cm_SyncOp(vscp, NULL, userp, reqp, PRSFS_READ,
786 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
787 lock_ReleaseWrite(&vscp->rw);
792 OfflineMsg = offLineMsg;
795 code = cm_ConnFromFID(&vfid, userp, reqp, &connp);
798 rxconnp = cm_GetRxConn(connp);
799 code = RXAFS_GetVolumeStatus(rxconnp, vfid.volume,
800 &volStat, &Name, &OfflineMsg, &MOTD);
801 rx_PutConnection(rxconnp);
803 } while (cm_Analyze(connp, userp, reqp, &vfid, NULL, 0, NULL, NULL, NULL, NULL, code));
804 code = cm_MapRPCError(code, reqp);
806 lock_ObtainWrite(&vscp->rw);
807 cm_SyncOpDone(vscp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
808 lock_ReleaseWrite(&vscp->rw);
809 cm_ReleaseSCache(vscp);
815 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
816 cp = ioctlp->outDatap;
817 memcpy(cp, (char *)&volStat, sizeof(AFSFetchVolumeStatus));
818 cp += sizeof(AFSFetchVolumeStatus);
819 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
820 cp += strlen(volName)+1;
821 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
822 cp += strlen(offLineMsg)+1;
823 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
824 cp += strlen(motd)+1;
826 /* return new size */
827 ioctlp->outDatap = cp;
833 * VIOCGETFID internals.
835 * Assumes that pioctl path has been parsed or skipped.
836 * scp is held but not locked.
839 cm_IoctlGetFid(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
844 memset(&fid, 0, sizeof(cm_fid_t));
845 fid.cell = scp->fid.cell;
846 fid.volume = scp->fid.volume;
847 fid.vnode = scp->fid.vnode;
848 fid.unique = scp->fid.unique;
850 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
851 cp = ioctlp->outDatap;
852 memcpy(cp, (char *)&fid, sizeof(cm_fid_t));
853 cp += sizeof(cm_fid_t);
855 /* return new size */
856 ioctlp->outDatap = cp;
862 * VIOC_GETFILETYPE internals.
864 * Assumes that pioctl path has been parsed or skipped.
865 * scp is held but not locked.
868 cm_IoctlGetFileType(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
872 afs_uint32 fileType = 0;
874 if (scp->fileType == 0) {
875 lock_ObtainWrite(&scp->rw);
876 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
877 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
879 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
880 lock_ReleaseWrite(&scp->rw);
884 fileType = scp->fileType;
886 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
887 cp = ioctlp->outDatap;
888 memcpy(cp, (char *)&fileType, sizeof(fileType));
889 cp += sizeof(fileType);
891 /* return new size */
892 ioctlp->outDatap = cp;
898 * VIOCGETOWNER internals.
900 * Assumes that pioctl path has been parsed or skipped.
901 * scp is held but not locked.
904 cm_IoctlGetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
909 lock_ObtainWrite(&scp->rw);
910 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
911 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
913 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
914 lock_ReleaseWrite(&scp->rw);
917 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
918 cp = ioctlp->outDatap;
919 memcpy(cp, (char *)&scp->owner, sizeof(afs_uint32));
920 cp += sizeof(afs_uint32);
921 memcpy(cp, (char *)&scp->group, sizeof(afs_uint32));
922 cp += sizeof(afs_uint32);
924 /* return new size */
925 ioctlp->outDatap = cp;
932 * VIOC_SETOWNER internals.
934 * Assumes that pioctl path has been parsed or skipped
935 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
937 * scp is held but not locked.
941 cm_IoctlSetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
946 lock_ObtainWrite(&scp->rw);
947 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
948 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
950 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
951 lock_ReleaseWrite(&scp->rw);
957 memset(&attr, 0, sizeof(attr));
959 cp = ioctlp->inDatap;
960 memcpy((char *)&owner, cp, sizeof(afs_uint32));
962 attr.mask = CM_ATTRMASK_OWNER;
965 code = cm_SetAttr(scp, &attr, userp, reqp);
972 * VIOC_SETGROUP internals.
974 * Assumes that pioctl path has been parsed or skipped
975 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
979 cm_IoctlSetGroup(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
984 lock_ObtainWrite(&scp->rw);
985 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
986 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
988 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
989 lock_ReleaseWrite(&scp->rw);
995 memset(&attr, 0, sizeof(attr));
997 cp = ioctlp->inDatap;
998 memcpy((char *)&group, cp, sizeof(afs_uint32));
1000 attr.mask = CM_ATTRMASK_GROUP;
1003 code = cm_SetAttr(scp, &attr, userp, reqp);
1010 * VIOCWHEREIS internals.
1012 * Assumes that pioctl path has been parsed or skipped.
1013 * scp is held but not locked.
1016 cm_IoctlWhereIs(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
1021 cm_serverRef_t **tsrpp, *current;
1026 volume = scp->fid.volume;
1028 cellp = cm_FindCellByID(scp->fid.cell, 0);
1031 return CM_ERROR_NOSUCHCELL;
1033 #ifdef AFS_FREELANCE_CLIENT
1034 if ( cellp->cellID == AFS_FAKE_ROOT_CELL_ID) {
1035 struct in_addr addr;
1042 cp = ioctlp->outDatap;
1044 memcpy(cp, (char *)&addr, sizeof(addr));
1047 /* still room for terminating NULL, add it on */
1049 memcpy(cp, (char *)&addr, sizeof(addr));
1052 ioctlp->outDatap = cp;
1056 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
1060 cp = ioctlp->outDatap;
1062 tsrpp = cm_GetVolServers(tvp, volume, userp, reqp, NULL);
1063 if (tsrpp == NULL) {
1064 code = CM_ERROR_NOSUCHVOLUME;
1066 lock_ObtainRead(&cm_serverLock);
1067 for (current = *tsrpp; current; current = current->next) {
1068 tsp = current->server;
1069 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1072 lock_ReleaseRead(&cm_serverLock);
1073 cm_FreeServerList(tsrpp, 0);
1075 /* still room for terminating NULL, add it on */
1076 volume = 0; /* reuse vbl */
1077 memcpy(cp, (char *)&volume, sizeof(long));
1080 ioctlp->outDatap = cp;
1087 * VIOC_AFS_STAT_MT_PT internals.
1089 * Assumes that pioctl path has been parsed or skipped.
1090 * scp is held but not locked.
1093 cm_IoctlStatMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1099 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1101 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1105 lock_ObtainWrite(&scp->rw);
1106 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1107 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1109 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1113 /* now check that this is a real mount point */
1114 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1115 code = CM_ERROR_INVAL;
1119 code = cm_ReadMountPoint(scp, userp, reqp);
1122 strp = ioctlp->outDatap;
1123 StringCbCopyA(strp, SMB_IOCTL_MAXDATA - (strp - ioctlp->outAllocp), scp->mountPointStringp);
1124 strp += strlen(strp) + 1;
1125 ioctlp->outDatap = strp;
1129 lock_ReleaseWrite(&scp->rw);
1130 cm_ReleaseSCache(scp);
1140 * VIOC_AFS_DELETE_MT_PT internals.
1142 * Assumes that pioctl path has been parsed or skipped.
1143 * scp is held but not locked.
1146 cm_IoctlDeleteMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1150 clientchar_t *cp = NULL;
1151 fschar_t *originalName = NULL;
1154 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1156 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1158 /* if something went wrong, bail out now */
1162 lock_ObtainWrite(&scp->rw);
1163 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1164 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1168 /* now check that this is a real mount point */
1169 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1170 code = CM_ERROR_INVAL;
1174 /* time to make the RPC, so drop the lock */
1175 lock_ReleaseWrite(&scp->rw);
1178 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
1179 CM_DIROP_FLAG_NONE, &dirop);
1181 code = cm_BPlusDirLookupOriginalName(&dirop, cp, &originalName);
1182 /* The cm_Dir* functions can't be used to lookup the
1183 originalName. Those functions only know of the original
1185 cm_EndDirOp(&dirop);
1189 /* If this name doesn't have a non-normalized name associated with
1190 it, we assume that what we had is what is actually present on
1193 if (originalName == NULL) {
1194 originalName = cm_ClientStringToFsStringAlloc(cp, -1, NULL);
1197 /* cp is a normalized name. originalName is the actual name we
1198 saw on the fileserver. */
1199 #ifdef AFS_FREELANCE_CLIENT
1200 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1201 /* we are removing the mount point to the root dir., so call
1202 * the freelance code to do the deletion. */
1203 osi_Log0(afsd_logp,"IoctlDeleteMountPoint from Freelance root dir");
1204 code = cm_FreelanceRemoveMount(originalName);
1208 /* easier to do it this way */
1209 code = cm_Unlink(dscp, originalName, cp, userp, reqp);
1211 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1212 smb_NotifyChange(FILE_ACTION_REMOVED,
1213 FILE_NOTIFY_CHANGE_DIR_NAME,
1214 dscp, cp, NULL, TRUE);
1216 lock_ObtainWrite(&scp->rw);
1218 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1221 cm_DiscardSCache(scp);
1222 lock_ReleaseWrite(&scp->rw);
1223 cm_ReleaseSCache(scp);
1225 if (RDR_Initialized &&
1226 !RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
1227 scp->fid.hash, scp->fileType, AFS_INVALIDATE_DELETED))
1228 buf_ClearRDRFlag(scp, "deleted mp");
1231 if (originalName != NULL)
1241 * VIOCCKSERV internals.
1243 * Assumes that pioctl path has been parsed or skipped.
1246 cm_IoctlCheckServers(struct cm_ioctl *ioctlp, struct cm_user *userp)
1253 cm_server_t *tsp, *csp;
1256 tp = ioctlp->inDatap;
1259 memcpy(&temp, tp, sizeof(temp));
1260 if (temp == 0x12345678) { /* For afs3.3 version */
1261 memcpy(&csi, tp, sizeof(csi));
1262 if (csi.tinterval >= 0) {
1263 cp = ioctlp->outDatap;
1264 memcpy(cp, (char *)&cm_daemonCheckDownInterval, sizeof(long));
1265 ioctlp->outDatap += sizeof(long);
1266 if (csi.tinterval > 0) {
1267 if (!smb_SUser(userp))
1268 return CM_ERROR_NOACCESS;
1269 cm_daemonCheckDownInterval = csi.tinterval;
1277 } else { /* For pre afs3.3 versions */
1278 memcpy((char *)&temp, ioctlp->inDatap, sizeof(long));
1279 ioctlp->inDatap = cp = ioctlp->inDatap + sizeof(long);
1280 if (cp - ioctlp->inAllocp < ioctlp->inCopied) /* still more data available */
1285 * 1: fast check, don't contact servers.
1286 * 2: local cell only.
1289 /* have cell name, too */
1290 cellp = cm_GetCell(cp, (temp & 1) ? CM_FLAG_NOPROBE : 0);
1292 return CM_ERROR_NOSUCHCELL;
1295 cellp = (cm_cell_t *) 0;
1296 if (!cellp && (temp & 2)) {
1297 /* use local cell */
1298 fschar_t wscell[CELL_MAXNAMELEN+1];
1299 cm_GetRootCellName(wscell);
1300 cellp = cm_GetCell(wscell, 0);
1302 if (!(temp & 1)) { /* if not fast, call server checker routine */
1303 /* check down servers */
1304 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS | CM_FLAG_CHECKUPSERVERS, cellp);
1307 /* now return the current down server list */
1308 cp = ioctlp->outDatap;
1309 lock_ObtainRead(&cm_serverLock);
1310 for (tsp = cm_allServersp; tsp; tsp=tsp->allNextp) {
1311 if (cellp && tsp->cellp != cellp)
1312 continue; /* cell spec'd and wrong */
1313 if (tsp->flags & CM_SERVERFLAG_DOWN) {
1315 * for a multi-homed file server, if one of the interfaces
1316 * is up, do not report the server as down.
1318 if (tsp->type == CM_SERVER_FILE) {
1319 for (csp = cm_allServersp; csp; csp=csp->allNextp) {
1320 if (csp->type == CM_SERVER_FILE &&
1321 !(csp->flags & CM_SERVERFLAG_DOWN) &&
1322 afs_uuid_equal(&tsp->uuid, &csp->uuid)) {
1326 if (csp) /* found alternate up interface */
1331 * all server types are being reported by ipaddr. only report
1332 * a server once regardless of how many services are down.
1334 for (tp = ioctlp->outDatap; tp < cp; tp += sizeof(long)) {
1335 if (!memcmp(tp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long)))
1340 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1345 lock_ReleaseRead(&cm_serverLock);
1347 ioctlp->outDatap = cp;
1352 * VIOCCKBACK internals.
1354 * Assumes that pioctl path has been parsed or skipped.
1357 cm_IoctlCheckVolumes(cm_ioctl_t *ioctlp, cm_user_t *userp)
1359 cm_RefreshVolumes(0);
1364 * VIOCSETCACHESIZE internals.
1366 * Assumes that pioctl path has been parsed or skipped.
1368 * This function is no longer meaningful in the current day world
1369 * of persistent caches. The buf_SetNBuffers() function will
1373 cm_IoctlSetCacheSize(struct cm_ioctl *ioctlp, struct cm_user *userp)
1378 memcpy(&temp, ioctlp->inDatap, sizeof(temp));
1380 temp = cm_data.buf_nOrigBuffers;
1382 /* temp is in 1K units, convert to # of buffers */
1383 temp = temp / (cm_data.buf_blockSize / 1024);
1386 /* now adjust the cache size */
1387 code = buf_SetNBuffers(temp);
1393 * VIOC_TRACECTL internals.
1395 * Assumes that pioctl path has been parsed or skipped.
1398 cm_IoctlTraceControl(cm_ioctl_t *ioctlp, cm_user_t *userp)
1402 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_uint32));
1406 afsd_ForceTrace(FALSE);
1407 buf_ForceTrace(FALSE);
1411 /* set tracing value to low order bit */
1412 if ((inValue & 1) == 0) {
1413 /* disable tracing */
1414 osi_LogDisable(afsd_logp);
1415 rx_DebugOnOff(FALSE);
1418 /* enable tracing */
1419 osi_LogEnable(afsd_logp);
1420 rx_DebugOnOff(TRUE);
1424 /* see if we're supposed to do a reset, too */
1426 osi_LogReset(afsd_logp);
1429 /* and copy out tracing flag */
1430 inValue = afsd_logp->enabled; /* use as a temp vbl */
1431 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_uint32));
1432 ioctlp->outDatap += sizeof(afs_uint32);
1437 * VIOCGETCACHEPARMS internals.
1439 * Assumes that pioctl path has been parsed or skipped.
1442 cm_IoctlGetCacheParms(struct cm_ioctl *ioctlp, struct cm_user *userp)
1444 cm_cacheParms_t parms;
1446 memset(&parms, 0, sizeof(parms));
1448 /* the cache size */
1449 parms.parms[0] = cm_data.buf_nbuffers * (cm_data.buf_blockSize / 1024);
1452 * the used cache space. this number is not available on windows.
1453 * the cm_data.buf_freeCount represents all buffers eligible for recycling.
1454 * so we report the entire cache in use since reporting 0 in use disturbs
1457 parms.parms[1] = cm_data.buf_usedCount * (cm_data.buf_blockSize / 1024);
1459 memcpy(ioctlp->outDatap, &parms, sizeof(parms));
1460 ioctlp->outDatap += sizeof(parms);
1466 * VIOCGETCELL internals.
1468 * Assumes that pioctl path has been parsed or skipped.
1471 cm_IoctlGetCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1476 cm_serverRef_t *serverRefp;
1477 cm_server_t *serverp;
1483 tp = ioctlp->inDatap;
1485 memcpy((char *)&whichCell, tp, sizeof(long));
1488 /* see if more than one long passed in, ignoring the null pathname (the -1) */
1489 if (ioctlp->inCopied-1 > sizeof(afs_uint32)) {
1490 memcpy((char *)&magic, tp, sizeof(afs_uint32));
1493 lock_ObtainRead(&cm_cellLock);
1494 for (tcellp = cm_data.allCellsp; tcellp; tcellp = tcellp->allNextp) {
1499 lock_ReleaseRead(&cm_cellLock);
1502 clientchar_t * cellnamep;
1504 cp = ioctlp->outDatap;
1506 if (magic == 0x12345678) {
1507 memcpy(cp, (char *)&magic, sizeof(long));
1510 memset(cp, 0, max * sizeof(long));
1512 lock_ObtainRead(&cm_serverLock); /* for going down server list */
1513 for (i=0, serverRefp = tcellp->vlServersp;
1514 serverRefp && i<max;
1515 i++, serverRefp = serverRefp->next) {
1516 serverp = serverRefp->server;
1517 memcpy(cp, &serverp->addr.sin_addr.s_addr, sizeof(long));
1520 lock_ReleaseRead(&cm_serverLock);
1521 ioctlp->outDatap = basep + max * sizeof(afs_int32);
1523 cellnamep = cm_FsStringToClientStringAlloc(tcellp->name, -1, NULL);
1525 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1535 return CM_ERROR_NOMORETOKENS; /* mapped to EDOM */
1540 * VIOCNEWCELL internals.
1542 * Assumes that pioctl path has been parsed or skipped.
1545 cm_IoctlNewCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1548 * All that needs to be done is to refresh server information for all cells that
1549 * are already loaded.
1551 * cell list will be cm_CellLock and cm_ServerLock will be held for write.
1555 cm_cell_rock_t rock;
1557 lock_ObtainWrite(&cm_cellLock);
1559 for (cp = cm_data.allCellsp; cp; cp=cp->allNextp)
1563 /* delete all previous server lists - cm_FreeServerList will ask for write on cm_ServerLock*/
1564 cm_FreeServerList(&cp->vlServersp, CM_FREESERVERLIST_DELETE);
1565 lock_ReleaseWrite(&cm_cellLock);
1569 code = cm_SearchCellRegistry(1, cp->name, cp->name, cp->linkedName, cm_AddCellProc, &rock);
1570 if (code && code != CM_ERROR_FORCE_DNS_LOOKUP)
1571 code = cm_SearchCellFileEx(cp->name, cp->name, cp->linkedName, cm_AddCellProc, &rock);
1573 if (cm_dnsEnabled) {
1575 code = cm_SearchCellByDNS(cp->name, cp->name, &ttl, cm_AddCellProc, &rock);
1576 if ( code == 0 ) { /* got cell from DNS */
1577 lock_ObtainMutex(&cp->mx);
1578 _InterlockedOr(&cp->flags, CM_CELLFLAG_DNS);
1579 _InterlockedAnd(&cp->flags, ~CM_CELLFLAG_VLSERVER_INVALID);
1580 cp->timeout = time(0) + ttl;
1581 lock_ReleaseMutex(&cp->mx);
1586 lock_ObtainMutex(&cp->mx);
1587 _InterlockedAnd(&cp->flags, ~CM_CELLFLAG_DNS);
1588 lock_ReleaseMutex(&cp->mx);
1591 lock_ObtainMutex(&cp->mx);
1592 _InterlockedOr(&cp->flags, CM_CELLFLAG_VLSERVER_INVALID);
1593 lock_ReleaseMutex(&cp->mx);
1594 lock_ObtainWrite(&cm_cellLock);
1597 lock_ObtainMutex(&cp->mx);
1598 _InterlockedAnd(&cp->flags, ~CM_CELLFLAG_VLSERVER_INVALID);
1599 lock_ReleaseMutex(&cp->mx);
1600 lock_ObtainWrite(&cm_cellLock);
1601 cm_RandomizeServer(&cp->vlServersp);
1604 lock_ReleaseWrite(&cm_cellLock);
1609 * VIOCNEWCELL2 internals.
1611 * Assumes that pioctl path has been parsed or skipped.
1613 * The pioctl data buffer consists of the following structure:
1616 * afs_uint32 alternative fs port
1617 * afs_uint32 alternative vl port
1618 * afs_uint32 count of vldb servers
1621 * n * char[] hostnames
1624 cm_IoctlNewCell2(struct cm_ioctl *ioctlp, struct cm_user *userp)
1626 afs_uint32 code = 0;
1627 afs_uint32 flags = 0;
1628 afs_uint32 fsport = 0;
1629 afs_uint32 vlport = 0;
1630 afs_uint32 i, host_count = 0;
1631 char * cellname = NULL;
1632 char * linked_cellname = NULL;
1636 char * hostname[AFS_MAXHOSTS];
1639 memset(hostname, 0, sizeof(hostname));
1641 tp = ioctlp->inDatap;
1642 tplen = ioctlp->inCopied;
1643 lp = (afs_uint32 *)tp;
1645 if (tplen >= 4 * sizeof(afs_uint32)) {
1651 tplen -= 4 * sizeof(afs_uint32);
1654 if ( FAILED(StringCbLength(tp, tplen, &len)) ||
1655 len + 1 > CELL_MAXNAMELEN)
1656 return CM_ERROR_INVAL;
1661 if ( FAILED(StringCbLength(tp, tplen, &len)) ||
1662 len + 1 > CELL_MAXNAMELEN)
1663 return CM_ERROR_INVAL;
1664 linked_cellname = tp;
1668 if (!(flags & VIOC_NEWCELL2_FLAG_USEDNS)) {
1669 for ( i=0; i<host_count; i++) {
1670 if ( FAILED(StringCbLength(tp, tplen, &len)) )
1671 return CM_ERROR_INVAL;
1678 code = cm_CreateCellWithInfo( cellname, linked_cellname,
1681 (flags & VIOC_NEWCELL2_FLAG_USEDNS) ? CM_CELLFLAG_DNS : 0);
1683 if (code == 0 && (flags & VIOC_NEWCELL2_FLAG_USEREG)) {
1684 cm_AddCellToRegistry( cellname, linked_cellname,
1687 (flags & VIOC_NEWCELL2_FLAG_USEDNS) ? CM_CELLFLAG_DNS : 0);
1693 * VIOC_GET_WS_CELL internals.
1695 * Assumes that pioctl path has been parsed or skipped.
1698 cm_IoctlGetWsCell(cm_ioctl_t *ioctlp, cm_user_t *userp)
1702 if (cm_freelanceEnabled) {
1703 if (cm_GetRootCellName(ioctlp->outDatap))
1704 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
1705 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
1706 } else if (cm_data.rootCellp) {
1707 clientchar_t * cellnamep = cm_FsStringToClientStringAlloc(cm_data.rootCellp->name, -1, NULL);
1708 /* return the default cellname to the caller */
1710 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1713 code = CM_ERROR_NOSUCHCELL;
1716 /* if we don't know our default cell, return failure */
1717 code = CM_ERROR_NOSUCHCELL;
1724 * VIOC_AFS_SYSNAME internals.
1726 * Assumes that pioctl path has been parsed or skipped.
1728 * In order to support both 32-bit and 64-bit sysname lists
1729 * we will treat bit-31 of the setSysName value as a flag
1730 * indicating which architecture is being indicated. If unset
1731 * the architecture is 32-bit and if set the architecture is
1732 * 64-bit. This change is backward compatible with cache
1733 * managers that do not support this extension.
1736 cm_IoctlSysName(struct cm_ioctl *ioctlp, struct cm_user *userp)
1738 afs_uint32 setSysName;
1740 clientchar_t *inname = NULL;
1745 memcpy(&setSysName, ioctlp->inDatap, sizeof(afs_uint32));
1746 ioctlp->inDatap += sizeof(afs_uint32);
1748 arch64 = (setSysName & 0x8000000) ? 1 : 0;
1749 setSysName &= 0x7FFFFFF;
1753 if ( setSysName < 0 || setSysName > MAXNUMSYSNAMES )
1755 cp2 = ioctlp->inDatap;
1756 for ( cp=ioctlp->inDatap, count = 0; count < setSysName; count++ ) {
1757 /* won't go past end of ioctlp->inDatap since
1758 maxsysname*num < ioctlp->inDatap length */
1759 t = (int)strlen(cp);
1760 if (t >= MAXSYSNAME || t <= 0)
1762 /* check for names that can shoot us in the foot */
1763 if (*cp == '.' && (cp[1] == 0 || (cp[1] == '.' && cp[2] == 0)))
1769 /* inname gets first entry in case we're being a translator */
1770 /* (we are never a translator) */
1771 inname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1774 /* Not xlating, so local case */
1776 /* Local guy; only root can change sysname */
1777 /* clear @sys entries from the dnlc, once afs_lookup can
1778 * do lookups of @sys entries and thinks it can trust them */
1779 /* privs ok, store the entry, ... */
1781 cm_ClientStrCpy(arch64 ? cm_sysName64List[0] : cm_sysNameList[0], MAXSYSNAME, inname);
1783 if (setSysName > 1) { /* ... or list */
1784 for (count = 1; count < setSysName; ++count) {
1785 clientchar_t * newsysname;
1787 if (!(arch64 ? cm_sysName64List[count] : cm_sysNameList[count]))
1788 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to write\n",
1789 __FILE__, __LINE__);
1791 newsysname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1792 cm_ClientStrCpy(arch64 ? cm_sysName64List[count] : cm_sysNameList[count], MAXSYSNAME, newsysname);
1797 cm_sysName64Count = setSysName;
1798 if (cm_sysName64Count)
1799 RDR_SysName( AFS_SYSNAME_ARCH_64BIT, cm_sysName64Count, cm_sysName64List );
1800 else if (cm_sysNameCount)
1801 RDR_SysName( AFS_SYSNAME_ARCH_64BIT, cm_sysNameCount, cm_sysNameList );
1803 cm_sysNameCount = setSysName;
1804 RDR_SysName( AFS_SYSNAME_ARCH_32BIT, cm_sysNameCount, cm_sysNameList );
1809 /* return the sysname list to the caller.
1810 * if there is no 64-bit list and 64-bit is requested, use the 32-bit list.
1812 if ( arch64 && cm_sysName64Count == 0 )
1815 i32 = arch64 ? cm_sysName64Count : cm_sysNameCount;
1816 memcpy(ioctlp->outDatap, &i32, sizeof(afs_int32));
1817 ioctlp->outDatap += sizeof(afs_int32); /* skip found flag */
1820 for ( count=0; count < i32 ; ++count) { /* ... or list */
1821 if ( !(arch64 ? cm_sysName64List[count] : cm_sysNameList[count]) ||
1822 *(arch64 ? cm_sysName64List[count] : cm_sysNameList[count]) == _C('\0'))
1823 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to read\n",
1824 __FILE__, __LINE__);
1825 cm_UnparseIoctlString(ioctlp, NULL, arch64 ? cm_sysName64List[count] : cm_sysNameList[count], -1);
1840 * VIOC_GETCELLSTATUS internals.
1842 * Assumes that pioctl path has been parsed or skipped.
1845 cm_IoctlGetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1849 clientchar_t * cellnamep;
1850 fschar_t * fscellnamep;
1852 cellnamep = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1853 fscellnamep = cm_ClientStringToFsStringAlloc(cellnamep, -1, NULL);
1854 cellp = cm_GetCell(fscellnamep, 0);
1859 return CM_ERROR_NOSUCHCELL;
1862 lock_ObtainMutex(&cellp->mx);
1863 if (cellp->flags & CM_CELLFLAG_SUID)
1864 temp |= CM_SETCELLFLAG_SUID;
1865 lock_ReleaseMutex(&cellp->mx);
1867 /* now copy out parm */
1868 memcpy(ioctlp->outDatap, &temp, sizeof(afs_uint32));
1869 ioctlp->outDatap += sizeof(afs_uint32);
1875 * VIOC_SETCELLSTATUS internals.
1877 * Assumes that pioctl path has been parsed or skipped.
1880 cm_IoctlSetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1885 fschar_t * cellnamep;
1887 temp = cm_ParseIoctlStringAlloc(ioctlp, ioctlp->inDatap + 2*sizeof(afs_uint32));
1888 cellnamep = cm_ClientStringToFsStringAlloc(temp, -1, NULL);
1889 cellp = cm_GetCell(cellnamep, 0);
1894 return CM_ERROR_NOSUCHCELL;
1896 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_uint32));
1898 lock_ObtainMutex(&cellp->mx);
1899 if (flags & CM_SETCELLFLAG_SUID)
1900 _InterlockedOr(&cellp->flags, CM_CELLFLAG_SUID);
1902 _InterlockedAnd(&cellp->flags, ~CM_CELLFLAG_SUID);
1903 lock_ReleaseMutex(&cellp->mx);
1909 * VIOC_SETSPREFS internals.
1911 * Assumes that pioctl path has been parsed or skipped.
1914 cm_IoctlSetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1916 cm_SSetPref_t *spin; /* input */
1917 cm_SPref_t *srvin; /* one input component */
1919 int i, vlonly, noServers, type;
1920 struct sockaddr_in tmp;
1921 unsigned short rank;
1923 spin = (cm_SSetPref_t *)ioctlp->inDatap;
1924 noServers = spin->num_servers;
1925 vlonly = spin->flags;
1927 type = CM_SERVER_VLDB;
1929 type = CM_SERVER_FILE;
1931 for ( i=0; i < noServers; i++)
1933 srvin = &(spin->servers[i]);
1934 rank = srvin->rank + (rand() & 0x000f);
1935 tmp.sin_addr = srvin->host;
1937 case CM_SERVER_VLDB:
1938 tmp.sin_port = htons(7003);
1940 case CM_SERVER_FILE:
1941 tmp.sin_port = htons(7000);
1944 tmp.sin_family = AF_INET;
1946 tsp = cm_FindServer(&tmp, type, FALSE);
1947 if ( tsp ) /* an existing server - ref count increased */
1949 lock_ObtainMutex(&tsp->mx);
1950 tsp->adminRank = rank;
1951 _InterlockedOr(&tsp->flags, CM_SERVERFLAG_PREF_SET);
1953 lock_ReleaseMutex(&tsp->mx);
1956 case CM_SERVER_FILE:
1958 * find volumes which might have RO copy
1959 * on server and change the ordering of
1962 cm_ChangeRankVolume(tsp);
1964 case CM_SERVER_VLDB:
1965 /* set preferences for an existing vlserver */
1966 cm_ChangeRankCellVLServer(tsp);
1970 else /* add a new server without a cell */
1972 tsp = cm_NewServer(&tmp, type, NULL, NULL, CM_FLAG_NOPROBE); /* refcount = 1 */
1973 lock_ObtainMutex(&tsp->mx);
1974 tsp->adminRank = rank;
1975 _InterlockedOr(&tsp->flags, CM_SERVERFLAG_PREF_SET);
1976 lock_ReleaseMutex(&tsp->mx);
1978 cm_PutServer(tsp); /* decrease refcount */
1984 * VIOC_GETSPREFS internals.
1986 * Assumes that pioctl path has been parsed or skipped.
1989 cm_IoctlGetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1991 cm_SPrefRequest_t *spin; /* input */
1992 cm_SPrefInfo_t *spout; /* output */
1993 cm_SPref_t *srvout; /* one output component */
1995 int i, vlonly, noServers;
1997 spin = (cm_SPrefRequest_t *)ioctlp->inDatap;
1998 spout = (cm_SPrefInfo_t *) ioctlp->outDatap;
1999 srvout = spout->servers;
2000 noServers = spin->num_servers;
2001 vlonly = spin->flags & CM_SPREF_VLONLY;
2002 spout->num_servers = 0;
2004 lock_ObtainRead(&cm_serverLock); /* get server lock */
2006 for (tsp=cm_allServersp, i=0; tsp && noServers; tsp=tsp->allNextp,i++){
2007 if (spin->offset > i) {
2008 continue; /* catch up to where we left off */
2011 if ( vlonly && (tsp->type != CM_SERVER_VLDB) )
2012 continue; /* ignore fileserver for -vlserver option*/
2013 if ( !vlonly && (tsp->type != CM_SERVER_FILE) )
2014 continue; /* ignore vlservers */
2016 srvout->host = tsp->addr.sin_addr;
2017 srvout->rank = tsp->activeRank;
2019 spout->num_servers++;
2022 lock_ReleaseRead(&cm_serverLock); /* release server lock */
2024 if ( tsp ) /* we ran out of space in the output buffer */
2025 spout->next_offset = i;
2027 spout->next_offset = 0;
2028 ioctlp->outDatap += sizeof(cm_SPrefInfo_t) +
2029 (spout->num_servers -1 ) * sizeof(cm_SPref_t) ;
2035 * VIOC_AFS_CREATE_MT_PT internals.
2037 * Assumes that pioctl path has been parsed or skipped.
2038 * dscp is held but not locked.
2041 cm_IoctlCreateMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
2046 fschar_t mpInfo[512]; /* mount point string */
2047 fschar_t fullCell[CELL_MAXNAMELEN];
2048 fschar_t *fscell = NULL;
2049 fschar_t *fsvolume = NULL;
2050 clientchar_t volume[VL_MAXNAMELEN];
2051 clientchar_t *mpp = NULL;
2052 clientchar_t *cell = NULL;
2053 cm_volume_t *volp = NULL;
2054 cm_cell_t *cellp = NULL;
2058 * The fs command allows the user to specify partial cell names on NT. These must
2059 * be expanded to the full cell name for mount points so that the mount points will
2060 * work on UNIX clients.
2063 /* Extract the possibly partial cell name */
2064 mpp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
2066 len = cm_ClientStrLen(mpp);
2067 if (len <= 1 || mpp[len-1] != L'.') {
2068 code = CM_ERROR_INVAL;
2072 cell = cm_ClientCharNext(mpp);
2073 if (cp = cm_ClientStrChr(cell, ':')) {
2075 /* Extract the volume name */
2077 cm_ClientStrCpy(volume, lengthof(volume), cm_ClientCharNext(cp));
2079 fscell = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
2080 fsvolume = cm_ClientStringToFsStringAlloc(volume, -1, NULL);
2082 /* Get the full name for this cell */
2083 cellp = cm_GetCell_Gen(fscell, fullCell, CM_FLAG_NOPROBE);
2085 code = CM_ERROR_NOSUCHCELL;
2089 /* fsvolume includes the trailing dot */
2090 StringCbPrintfA(mpInfo, sizeof(mpInfo), "%c%s:%s", (char) *mpp,
2091 fullCell, fsvolume);
2094 /* No cell name specified, so cell points at the volume instead. */
2095 fsvolume = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
2096 cm_ClientStringToFsString(mpp, -1, mpInfo, lengthof(mpInfo));
2097 cellp = cm_FindCellByID(dscp->fid.cell, CM_FLAG_NOPROBE);
2100 /* remove the trailing dot */
2101 len = strlen(fsvolume);
2102 fsvolume[len-1] = '\0';
2104 /* validate the target info */
2105 if (cm_VolNameIsID(fsvolume)) {
2106 code = cm_FindVolumeByID(cellp, atoi(fsvolume), userp, reqp,
2107 CM_GETVOL_FLAG_CREATE, &volp);
2109 code = cm_FindVolumeByName(cellp, fsvolume, userp, reqp,
2110 CM_GETVOL_FLAG_CREATE, &volp);
2115 #ifdef AFS_FREELANCE_CLIENT
2116 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2117 /* we are adding the mount point to the root dir, so call
2118 * the freelance code to do the add. */
2119 fschar_t * fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
2120 osi_Log0(afsd_logp,"IoctlCreateMountPoint within Freelance root dir");
2121 code = cm_FreelanceAddMount(fsleaf, fullCell, fsvolume, *mpInfo == '%', NULL);
2126 /* create the symlink with mode 644. The lack of X bits tells
2127 * us that it is a mount point.
2129 tattr.mask = CM_ATTRMASK_UNIXMODEBITS | CM_ATTRMASK_CLIENTMODTIME;
2130 tattr.unixModeBits = 0644;
2131 tattr.clientModTime = time(NULL);
2133 code = cm_SymLink(dscp, leaf, mpInfo, 0, &tattr, userp, reqp, NULL);
2137 if (dscp->flags & CM_SCACHEFLAG_ANYWATCH)
2138 smb_NotifyChange(FILE_ACTION_ADDED,
2139 FILE_NOTIFY_CHANGE_DIR_NAME,
2140 dscp, leaf, NULL, TRUE);
2142 if (RDR_Initialized)
2143 RDR_InvalidateObject(dscp->fid.cell, dscp->fid.volume, dscp->fid.vnode, dscp->fid.unique,
2144 dscp->fid.hash, dscp->fileType, AFS_INVALIDATE_DATA_VERSION);
2161 * VIOC_SYMLINK internals.
2163 * Assumes that pioctl path has been parsed or skipped.
2164 * dscp is held but not locked.
2167 cm_IoctlSymlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
2173 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2174 /* Translate chars for the linked to name */
2175 TranslateExtendedChars(ioctlp->inDatap);
2178 cp = ioctlp->inDatap; /* contents of link */
2180 #ifdef AFS_FREELANCE_CLIENT
2181 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2182 /* we are adding the symlink to the root dir., so call
2183 * the freelance code to do the add. */
2186 if (cp[0] == cp[1] && cp[1] == '\\' &&
2187 !_strnicmp(cm_NetbiosName,cp+2,strlen(cm_NetbiosName)))
2189 /* skip \\AFS\ or \\AFS\all\ */
2191 p = cp + 2 + strlen(cm_NetbiosName) + 1;
2192 if ( !_strnicmp("all", p, 3) )
2197 osi_Log0(afsd_logp,"IoctlSymlink within Freelance root dir");
2198 fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
2199 code = cm_FreelanceAddSymlink(fsleaf, cp, NULL);
2204 /* Create symlink with mode 0755. */
2205 tattr.mask = CM_ATTRMASK_UNIXMODEBITS;
2206 tattr.unixModeBits = 0755;
2208 code = cm_SymLink(dscp, leaf, cp, 0, &tattr, userp, reqp, NULL);
2212 if (dscp->flags & CM_SCACHEFLAG_ANYWATCH)
2213 smb_NotifyChange(FILE_ACTION_ADDED,
2214 FILE_NOTIFY_CHANGE_FILE_NAME
2215 | FILE_NOTIFY_CHANGE_DIR_NAME,
2216 dscp, leaf, NULL, TRUE);
2218 if (RDR_Initialized)
2219 RDR_InvalidateObject(dscp->fid.cell, dscp->fid.volume, dscp->fid.vnode, dscp->fid.unique,
2220 dscp->fid.hash, dscp->fileType, AFS_INVALIDATE_DATA_VERSION);
2228 * VIOC_LISTSYMLINK internals.
2230 * Assumes that pioctl path has been parsed or skipped.
2231 * dscp is held but not locked.
2234 cm_IoctlListlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2240 cm_scache_t *newRootScp;
2241 clientchar_t *clientp;
2243 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2244 /* Translate chars for the link name */
2245 TranslateExtendedChars(ioctlp->inDatap);
2247 cp = ioctlp->inDatap;
2249 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2250 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2255 /* Check that it's a real symlink */
2256 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2257 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2258 scp->fileType != CM_SCACHETYPE_INVALID) {
2259 cm_ReleaseSCache(scp);
2260 return CM_ERROR_INVAL;
2263 code = cm_AssembleLink(scp, "", &newRootScp, &spacep, userp, reqp);
2264 cm_ReleaseSCache(scp);
2267 cp = ioctlp->outDatap;
2268 if (newRootScp != NULL) {
2269 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), cm_mountRoot);
2270 StringCbCatA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), "/");
2274 linkstr = cm_ClientStringToFsStringAlloc(spacep->wdata, -1, NULL);
2275 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), linkstr);
2276 cp += strlen(cp) + 1;
2277 ioctlp->outDatap = cp;
2278 cm_FreeSpace(spacep);
2280 if (newRootScp != NULL)
2281 cm_ReleaseSCache(newRootScp);
2283 } else if (code == CM_ERROR_PATH_NOT_COVERED &&
2284 scp->fileType == CM_SCACHETYPE_DFSLINK ||
2285 code == CM_ERROR_NOSUCHPATH &&
2286 scp->fileType == CM_SCACHETYPE_INVALID) {
2288 cp = ioctlp->outDatap;
2289 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), scp->mountPointStringp);
2290 cp += strlen(cp) + 1;
2291 ioctlp->outDatap = cp;
2299 * VIOC_ISSYMLINK internals.
2301 * Assumes that pioctl path has been parsed or skipped.
2302 * dscp is held but not locked.
2305 cm_IoctlIslink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2306 {/*CHECK FOR VALID SYMLINK*/
2310 clientchar_t *clientp;
2312 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2313 /* Translate chars for the link name */
2314 TranslateExtendedChars(ioctlp->inDatap);
2316 cp = ioctlp->inDatap;
2318 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2319 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2324 /* Check that it's a real symlink */
2325 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2326 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2327 scp->fileType != CM_SCACHETYPE_INVALID)
2328 code = CM_ERROR_INVAL;
2329 cm_ReleaseSCache(scp);
2334 * VIOC_DELSYMLINK internals.
2336 * Assumes that pioctl path has been parsed or skipped.
2337 * dscp is held but not locked.
2340 cm_IoctlDeletelink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2345 char * originalName = NULL;
2347 clientchar_t *clientp;
2349 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2350 /* Translate chars for the link name */
2351 TranslateExtendedChars(ioctlp->inDatap);
2353 cp = ioctlp->inDatap;
2355 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2356 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2358 /* if something went wrong, bail out now */
2362 lock_ObtainWrite(&scp->rw);
2363 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2364 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2368 /* now check that this is a real symlink */
2369 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2370 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2371 scp->fileType != CM_SCACHETYPE_INVALID) {
2372 code = CM_ERROR_INVAL;
2376 /* time to make the RPC, so drop the lock */
2377 lock_ReleaseWrite(&scp->rw);
2380 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
2381 CM_DIROP_FLAG_NONE, &dirop);
2383 code = cm_BPlusDirLookupOriginalName(&dirop, clientp, &originalName);
2384 /* cm_Dir*() functions can't be used to lookup the original
2385 name since those functions only know of the original
2387 cm_EndDirOp(&dirop);
2391 /* If this name doesn't have a non-normalized name associated with
2392 it, we assume that what we had is what is actually present on
2395 if (originalName == NULL)
2398 /* cp is a normalized name. originalName is the actual name we
2399 saw on the fileserver. */
2402 #ifdef AFS_FREELANCE_CLIENT
2403 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2404 /* we are adding the mount point to the root dir., so call
2405 * the freelance code to do the add. */
2406 osi_Log0(afsd_logp,"IoctlDeletelink from Freelance root dir");
2407 code = cm_FreelanceRemoveSymlink(originalName);
2411 /* easier to do it this way */
2412 code = cm_Unlink(dscp, originalName, clientp, userp, reqp);
2414 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2415 smb_NotifyChange(FILE_ACTION_REMOVED,
2416 FILE_NOTIFY_CHANGE_FILE_NAME
2417 | FILE_NOTIFY_CHANGE_DIR_NAME,
2418 dscp, clientp, NULL, TRUE);
2420 if (originalName != NULL && originalName != cp) {
2422 originalName = NULL;
2425 lock_ObtainWrite(&scp->rw);
2427 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2430 cm_DiscardSCache(scp);
2431 lock_ReleaseWrite(&scp->rw);
2432 cm_ReleaseSCache(scp);
2434 if (RDR_Initialized &&
2435 !RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique,
2436 scp->fid.hash, scp->fileType, AFS_INVALIDATE_DELETED))
2437 buf_ClearRDRFlag(scp, "deleted link");
2446 /* Utility function. Not currently used.
2447 * This function performs a PTS lookup which has traditionally
2448 * not been performed by the cache manager.
2451 cm_UsernameToId(char *uname, cm_ucell_t * ucellp, afs_uint32* uid)
2456 static struct afsconf_cell info;
2457 struct rx_connection *serverconns[MAXSERVERS];
2458 struct rx_securityClass *sc[3];
2459 afs_int32 scIndex = 2; /* authenticated - we have a token */
2460 struct ubik_client *pruclient = NULL;
2461 struct afsconf_dir *tdir;
2465 memset(&info, 0, sizeof(info));
2466 tdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH);
2467 code = afsconf_GetCellInfo(tdir, ucellp->cellp->name, "afsprot", &info);
2468 afsconf_Close(tdir);
2474 /* we have the token that was given to us in the settoken
2475 * call. we just have to use it.
2477 scIndex = 2; /* kerberos ticket */
2478 sc[2] = rxkad_NewClientSecurityObject(rxkad_clear, &ucellp->sessionKey,
2479 ucellp->kvno, ucellp->ticketLen,
2482 memset(serverconns, 0, sizeof(serverconns)); /* terminate list!!! */
2483 for (i = 0; i < info.numServers; i++)
2485 rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
2486 info.hostAddr[i].sin_port, PRSRV, sc[scIndex],
2489 code = ubik_ClientInit(serverconns, &pruclient);
2491 if (info.linkedCell)
2492 free(info.linkedCell);
2496 code = rxs_Release(sc[scIndex]);
2498 lids.idlist_len = 0;
2499 lids.idlist_val = 0;
2500 lnames.namelist_len = 1;
2501 lnames.namelist_val = (prname *) malloc(PR_MAXNAMELEN);
2502 strncpy(lnames.namelist_val[0], uname, PR_MAXNAMELEN);
2503 lnames.namelist_val[0][PR_MAXNAMELEN-1] = '\0';
2504 for ( p=lnames.namelist_val[0], r=NULL; *p; p++ ) {
2510 if (r && !cm_stricmp_utf8(r+1,ucellp->cellp->name))
2513 code = ubik_PR_NameToID(pruclient, 0, &lnames, &lids);
2514 if (lids.idlist_val) {
2515 *uid = *lids.idlist_val;
2516 free(lids.idlist_val);
2518 if (lnames.namelist_val)
2519 free(lnames.namelist_val);
2522 ubik_ClientDestroy(pruclient);
2526 if (info.linkedCell)
2527 free(info.linkedCell);
2530 #endif /* QUERY_AFSID */
2533 /* This has been copied to smb_IoctlSetToken in its entirety.
2534 * An equivalent version will need to be produced for the
2535 * redirector and some extensive refactoring might be required.
2538 cm_IoctlSetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2545 struct ClearToken ct;
2553 int release_userp = 0;
2556 saveDataPtr = ioctlp->inDatap;
2558 cm_SkipIoctlPath(ioctlp);
2560 tp = ioctlp->inDatap;
2563 memcpy(&ticketLen, tp, sizeof(ticketLen));
2564 tp += sizeof(ticketLen);
2565 if (ticketLen < MINKTCTICKETLEN || ticketLen > MAXKTCTICKETLEN)
2566 return CM_ERROR_INVAL;
2568 /* remember ticket and skip over it for now */
2572 /* clear token size */
2573 memcpy(&ctSize, tp, sizeof(ctSize));
2574 tp += sizeof(ctSize);
2575 if (ctSize != sizeof(struct ClearToken))
2576 return CM_ERROR_INVAL;
2579 memcpy(&ct, tp, ctSize);
2581 if (ct.AuthHandle == -1)
2582 ct.AuthHandle = 999; /* more rxvab compat stuff */
2584 /* more stuff, if any */
2585 if (ioctlp->inCopied > tp - saveDataPtr) {
2586 /* flags: logon flag */
2587 memcpy(&flags, tp, sizeof(int));
2591 cellp = cm_GetCell(tp, CM_FLAG_CREATE | CM_FLAG_NOPROBE);
2593 return CM_ERROR_NOSUCHCELL;
2594 tp += strlen(tp) + 1;
2598 tp += strlen(tp) + 1;
2600 if (flags & PIOCTL_LOGON) {
2601 /* SMB user name with which to associate tokens */
2603 osi_Log2(smb_logp,"cm_IoctlSetToken for user [%s] smbname [%s]",
2604 osi_LogSaveString(smb_logp,uname), osi_LogSaveString(smb_logp,smbname));
2605 fprintf(stderr, "SMB name = %s\n", smbname);
2606 tp += strlen(tp) + 1;
2608 osi_Log1(smb_logp,"cm_IoctlSetToken for user [%s]",
2609 osi_LogSaveString(smb_logp, uname));
2613 memcpy(&uuid, tp, sizeof(uuid));
2614 if (!cm_FindTokenEvent(uuid, sessionKey))
2615 return CM_ERROR_INVAL;
2617 cellp = cm_data.rootCellp;
2618 osi_Log0(smb_logp,"cm_IoctlSetToken - no name specified");
2621 if (flags & PIOCTL_LOGON) {
2622 clientchar_t *cname;
2624 cname = cm_FsStringToClientStringAlloc(smbname, -1, NULL);
2626 userp = smb_FindCMUserByName(cname, ioctlp->fidp->vcp->rname,
2627 SMB_FLAG_CREATE|SMB_FLAG_AFSLOGON);
2633 /* store the token */
2634 lock_ObtainMutex(&userp->mx);
2635 ucellp = cm_GetUCell(userp, cellp);
2636 osi_Log1(smb_logp,"cm_IoctlSetToken ucellp %lx", ucellp);
2637 ucellp->ticketLen = ticketLen;
2638 if (ucellp->ticketp)
2639 free(ucellp->ticketp); /* Discard old token if any */
2640 ucellp->ticketp = malloc(ticketLen);
2641 memcpy(ucellp->ticketp, ticket, ticketLen);
2643 * Get the session key from the RPC, rather than from the pioctl.
2646 memcpy(&ucellp->sessionKey, ct.HandShakeKey, sizeof(ct.HandShakeKey));
2648 memcpy(ucellp->sessionKey.data, sessionKey, sizeof(sessionKey));
2649 ucellp->kvno = ct.AuthHandle;
2650 ucellp->expirationTime = ct.EndTimestamp;
2653 ucellp->uid = ANONYMOUSID;
2656 StringCbCopyA(ucellp->userName, MAXKTCNAMELEN, uname);
2658 cm_UsernameToId(uname, ucellp, &ucellp->uid);
2661 _InterlockedOr(&ucellp->flags, CM_UCELLFLAG_RXKAD);
2662 lock_ReleaseMutex(&userp->mx);
2664 if (flags & PIOCTL_LOGON) {
2665 ioctlp->flags |= CM_IOCTLFLAG_LOGON;
2668 cm_ResetACLCache(cellp, userp);
2671 cm_ReleaseUser(userp);
2678 * VIOC_GETTOK internals.
2680 * Assumes that pioctl path has been parsed or skipped.
2683 cm_IoctlGetTokenIter(struct cm_ioctl *ioctlp, struct cm_user *userp)
2689 struct ClearToken ct;
2691 tp = ioctlp->inDatap;
2692 cp = ioctlp->outDatap;
2695 memcpy(&iterator, tp, sizeof(iterator));
2696 tp += sizeof(iterator);
2698 lock_ObtainMutex(&userp->mx);
2700 /* look for token */
2701 for (;;iterator++) {
2702 ucellp = cm_FindUCell(userp, iterator);
2704 lock_ReleaseMutex(&userp->mx);
2705 return CM_ERROR_NOMORETOKENS;
2707 if (ucellp->flags & CM_UCELLFLAG_RXKAD)
2712 temp = ucellp->iterator + 1;
2713 memcpy(cp, &temp, sizeof(temp));
2717 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2718 cp += sizeof(ucellp->ticketLen);
2721 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2722 cp += ucellp->ticketLen;
2724 /* clear token size */
2726 memcpy(cp, &temp, sizeof(temp));
2730 ct.AuthHandle = ucellp->kvno;
2733 * This field is supposed to hold the session key
2734 * but we don't want to make it easier for someone
2735 * to attack the cache. The user gave us the session
2736 * key in the first place.
2738 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2739 ct.ViceId = 37; /* XXX */
2740 ct.BeginTimestamp = 0; /* XXX */
2741 ct.EndTimestamp = ucellp->expirationTime;
2742 memcpy(cp, &ct, sizeof(ct));
2745 /* Primary flag (unused) */
2747 memcpy(cp, &temp, sizeof(temp));
2751 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2752 cp += strlen(cp) + 1;
2755 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2756 cp += strlen(cp) + 1;
2758 ioctlp->outDatap = cp;
2760 lock_ReleaseMutex(&userp->mx);
2766 * VIOC_NEWGETTOK internals.
2768 * Assumes that pioctl path has been parsed or skipped.
2771 cm_IoctlGetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2777 struct ClearToken ct;
2781 tp = ioctlp->inDatap;
2783 cp = ioctlp->outDatap;
2785 /* cell name is right here */
2786 cellp = cm_GetCell(tp, 0);
2788 return CM_ERROR_NOSUCHCELL;
2789 tp += strlen(tp) + 1;
2792 memcpy(&uuid, tp, sizeof(uuid));
2794 lock_ObtainMutex(&userp->mx);
2796 ucellp = cm_GetUCell(userp, cellp);
2797 if (!ucellp || !(ucellp->flags & CM_UCELLFLAG_RXKAD)) {
2798 lock_ReleaseMutex(&userp->mx);
2799 return CM_ERROR_NOMORETOKENS;
2803 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2804 cp += sizeof(ucellp->ticketLen);
2807 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2808 cp += ucellp->ticketLen;
2810 /* clear token size */
2812 memcpy(cp, &temp, sizeof(temp));
2816 ct.AuthHandle = ucellp->kvno;
2818 /* do not give out the session key */
2819 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2820 ct.ViceId = 37; /* XXX */
2821 ct.BeginTimestamp = 0; /* XXX */
2822 ct.EndTimestamp = ucellp->expirationTime;
2823 memcpy(cp, &ct, sizeof(ct));
2826 /* Primary flag (unused) */
2828 memcpy(cp, &temp, sizeof(temp));
2832 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2833 cp += strlen(cp) + 1;
2836 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2837 cp += strlen(cp) + 1;
2839 ioctlp->outDatap = cp;
2841 lock_ReleaseMutex(&userp->mx);
2843 cm_RegisterNewTokenEvent(uuid, ucellp->sessionKey.data, NULL);
2849 * VIOCDELTOK internals.
2851 * Assumes that pioctl path has been parsed or skipped.
2854 cm_IoctlDelToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2860 cp = ioctlp->outDatap;
2862 /* cell name is right here */
2863 cellp = cm_GetCell(ioctlp->inDatap, 0);
2865 return CM_ERROR_NOSUCHCELL;
2867 lock_ObtainMutex(&userp->mx);
2869 ucellp = cm_GetUCell(userp, cellp);
2871 lock_ReleaseMutex(&userp->mx);
2872 return CM_ERROR_NOMORETOKENS;
2875 osi_Log1(smb_logp,"cm_IoctlDelToken ucellp %lx", ucellp);
2877 if (ucellp->ticketp) {
2878 free(ucellp->ticketp);
2879 ucellp->ticketp = NULL;
2881 ucellp->ticketLen = 0;
2882 memset(ucellp->sessionKey.data, 0, 8);
2884 ucellp->expirationTime = 0;
2885 ucellp->userName[0] = '\0';
2886 _InterlockedAnd(&ucellp->flags, ~CM_UCELLFLAG_RXKAD);
2889 lock_ReleaseMutex(&userp->mx);
2891 cm_ResetACLCache(cellp, userp);
2897 * VIOCDELALLTOK internals.
2899 * Assumes that pioctl path has been parsed or skipped.
2902 cm_IoctlDelAllToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2906 lock_ObtainMutex(&userp->mx);
2908 for (ucellp = userp->cellInfop; ucellp; ucellp = ucellp->nextp) {
2909 osi_Log1(smb_logp,"cm_IoctlDelAllToken ucellp %lx", ucellp);
2911 if (ucellp->ticketp) {
2912 free(ucellp->ticketp);
2913 ucellp->ticketp = NULL;
2915 ucellp->ticketLen = 0;
2916 memset(ucellp->sessionKey.data, 0, 8);
2918 ucellp->expirationTime = 0;
2919 ucellp->userName[0] = '\0';
2920 _InterlockedAnd(&ucellp->flags, ~CM_UCELLFLAG_RXKAD);
2924 lock_ReleaseMutex(&userp->mx);
2926 cm_ResetACLCache(NULL, userp);
2932 * VIOC_MAKESUBMOUNT internals. (This function should be deprecated)
2934 * Assumes that pioctl path has been parsed or skipped.
2937 cm_IoctlMakeSubmount(cm_ioctl_t *ioctlp, cm_user_t *userp)
2939 char afspath[MAX_PATH];
2941 int nextAutoSubmount;
2943 DWORD dwType, dwSize;
2948 /* Serialize this one, to prevent simultaneous mods
2951 lock_ObtainMutex(&cm_Afsdsbmt_Lock);
2953 /* Parse the input parameters--first the required afs path,
2954 * then the requested submount name (which may be "").
2956 cm_NormalizeAfsPathAscii(afspath, sizeof(afspath), ioctlp->inDatap);
2957 submountreqp = ioctlp->inDatap + (strlen(ioctlp->inDatap)+1);
2959 /* If the caller supplied a suggested submount name, see if
2960 * that submount name is in use... if so, the submount's path
2961 * has to match our path.
2964 RegCreateKeyEx( HKEY_LOCAL_MACHINE,
2965 AFSREG_CLT_OPENAFS_SUBKEY "\\Submounts",
2968 REG_OPTION_NON_VOLATILE,
2969 KEY_READ|KEY_WRITE|KEY_QUERY_VALUE,
2974 if (submountreqp && *submountreqp) {
2975 char submountPath[MAX_PATH];
2977 dwSize = sizeof(submountPath);
2978 status = RegQueryValueEx( hkSubmounts, submountreqp, 0,
2979 &dwType, submountPath, &dwSize);
2981 if (status != ERROR_SUCCESS) {
2983 /* The suggested submount name isn't in use now--
2984 * so we can safely map the requested submount name
2985 * to the supplied path. Remember not to write the
2986 * leading "/afs" when writing out the submount.
2988 RegSetValueEx( hkSubmounts, submountreqp, 0,
2990 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2991 &afspath[strlen(cm_mountRoot)]:"/",
2992 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2993 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2995 RegCloseKey( hkSubmounts );
2996 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2997 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2998 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3002 /* The suggested submount name is already in use--if the
3003 * supplied path matches the submount's path, we can still
3004 * use the suggested submount name.
3006 if (!strcmp (submountPath, afspath)) {
3007 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
3008 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
3009 RegCloseKey( hkSubmounts );
3010 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3015 RegQueryInfoKey( hkSubmounts,
3017 NULL, /* lpcClass */
3018 NULL, /* lpReserved */
3019 NULL, /* lpcSubKeys */
3020 NULL, /* lpcMaxSubKeyLen */
3021 NULL, /* lpcMaxClassLen */
3022 &dwSubmounts, /* lpcValues */
3023 NULL, /* lpcMaxValueNameLen */
3024 NULL, /* lpcMaxValueLen */
3025 NULL, /* lpcbSecurityDescriptor */
3026 NULL /* lpftLastWriteTime */
3030 /* Having obtained a list of all available submounts, start
3031 * searching that list for a path which matches the requested
3032 * AFS path. We'll also keep track of the highest "auto15"/"auto47"
3033 * submount, in case we need to add a new one later.
3036 nextAutoSubmount = 1;
3038 for ( dwIndex = 0; dwIndex < dwSubmounts; dwIndex ++ ) {
3039 char submountPath[MAX_PATH] = "";
3040 DWORD submountPathLen = sizeof(submountPath);
3041 char submountName[MAX_PATH];
3042 DWORD submountNameLen = sizeof(submountName);
3045 RegEnumValue( hkSubmounts, dwIndex, submountName, &submountNameLen, NULL,
3046 &dwType, submountPath, &submountPathLen);
3047 if (dwType == REG_EXPAND_SZ) {
3049 StringCbCopyA(buf, MAX_PATH, submountPath);
3050 submountPathLen = ExpandEnvironmentStrings(buf, submountPath, MAX_PATH);
3051 if (submountPathLen > MAX_PATH)
3055 /* If this is an Auto### submount, remember its ### value */
3056 if ((!strnicmp (submountName, "auto", 4)) &&
3057 (isdigit (submountName[strlen("auto")]))) {
3058 int thisAutoSubmount;
3059 thisAutoSubmount = atoi (&submountName[strlen("auto")]);
3060 nextAutoSubmount = max (nextAutoSubmount,
3061 thisAutoSubmount+1);
3064 if ((submountPathLen == 0) ||
3065 (submountPathLen == sizeof(submountPath) - 1)) {
3069 /* See if the path for this submount matches the path
3070 * that our caller specified. If so, we can return
3073 if (!strcmp (submountPath, afspath)) {
3074 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountName);
3075 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
3076 RegCloseKey(hkSubmounts);
3077 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3083 /* We've been through the entire list of existing submounts, and
3084 * didn't find any which matched the specified path. So, we'll
3085 * just have to add one. Remember not to write the leading "/afs"
3086 * when writing out the submount.
3089 StringCbPrintfA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "auto%ld", nextAutoSubmount);
3091 RegSetValueEx( hkSubmounts,
3095 (strlen(&afspath[strlen(cm_mountRoot)])) ?
3096 &afspath[strlen(cm_mountRoot)]:"/",
3097 (strlen(&afspath[strlen(cm_mountRoot)])) ?
3098 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
3100 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
3101 RegCloseKey(hkSubmounts);
3102 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3107 * VIOC_GETRXKCRYPT internals.
3109 * Assumes that pioctl path has been parsed or skipped.
3112 cm_IoctlGetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
3114 memcpy(ioctlp->outDatap, &cryptall, sizeof(cryptall));
3115 ioctlp->outDatap += sizeof(cryptall);
3121 * VIOC_SETRXKCRYPT internals.
3123 * Assumes that pioctl path has been parsed or skipped.
3126 cm_IoctlSetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
3128 afs_int32 c = cryptall;
3130 memcpy(&cryptall, ioctlp->inDatap, sizeof(cryptall));
3132 if (c != cryptall) {
3134 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_ON);
3135 else if (cryptall == 2)
3136 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_AUTH);
3138 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_OFF);
3144 * VIOC_RXSTAT_PROC internals.
3146 * Assumes that pioctl path has been parsed or skipped.
3149 cm_IoctlRxStatProcess(struct cm_ioctl *ioctlp, struct cm_user *userp)
3154 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
3155 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
3158 if (flags & AFSCALL_RXSTATS_ENABLE) {
3159 rx_enableProcessRPCStats();
3161 if (flags & AFSCALL_RXSTATS_DISABLE) {
3162 rx_disableProcessRPCStats();
3164 if (flags & AFSCALL_RXSTATS_CLEAR) {
3165 rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
3171 * VIOC_RXSTAT_PEER internals.
3173 * Assumes that pioctl path has been parsed or skipped.
3176 cm_IoctlRxStatPeer(struct cm_ioctl *ioctlp, struct cm_user *userp)
3181 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
3182 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
3185 if (flags & AFSCALL_RXSTATS_ENABLE) {
3186 rx_enablePeerRPCStats();
3188 if (flags & AFSCALL_RXSTATS_DISABLE) {
3189 rx_disablePeerRPCStats();
3191 if (flags & AFSCALL_RXSTATS_CLEAR) {
3192 rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
3198 * VIOC_UNICODECTL internals.
3200 * Assumes that pioctl path has been parsed or skipped.
3203 cm_IoctlUnicodeControl(struct cm_ioctl *ioctlp, struct cm_user * userp)
3205 afs_int32 result = 0;
3209 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
3212 /* Setting the Unicode flag */
3215 newflag = ((cmd & 1) == 1);
3217 InterlockedExchange(&smb_UseUnicode, newflag);
3220 result = smb_UseUnicode;
3225 memcpy(ioctlp->outDatap, &result, sizeof(result));
3226 ioctlp->outDatap += sizeof(result);
3232 * VIOC_UUIDCTL internals.
3234 * Assumes that pioctl path has been parsed or skipped.
3237 cm_IoctlUUIDControl(struct cm_ioctl * ioctlp, struct cm_user *userp)
3242 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
3244 if (cmd) { /* generate a new UUID */
3245 UuidCreate((UUID *) &uuid);
3246 cm_data.Uuid = uuid;
3247 cm_ForceNewConnectionsAllServers();
3250 memcpy(ioctlp->outDatap, &cm_data.Uuid, sizeof(cm_data.Uuid));
3251 ioctlp->outDatap += sizeof(cm_data.Uuid);
3259 * functions to dump contents of various structures.
3260 * In debug build (linked with crt debug library) will dump allocated but not freed memory
3262 extern int cm_DumpSCache(FILE *outputFile, char *cookie, int lock);
3263 extern int cm_DumpBufHashTable(FILE *outputFile, char *cookie, int lock);
3266 * VIOC_TRACEMEMDUMP internals.
3268 * Assumes that pioctl path has been parsed or skipped.
3269 * dscp is held but not locked.
3272 cm_IoctlMemoryDump(struct cm_ioctl *ioctlp, struct cm_user *userp)
3274 afs_int32 inValue = 0;
3276 char logfileName[MAX_PATH+1];
3281 static _CrtMemState memstate;
3284 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_int32));
3286 dwSize = GetEnvironmentVariable("TEMP", logfileName, sizeof(logfileName));
3287 if ( dwSize == 0 || dwSize > sizeof(logfileName) )
3289 GetWindowsDirectory(logfileName, sizeof(logfileName));
3291 strncat(logfileName, "\\afsd_alloc.log", sizeof(logfileName));
3293 hLogFile = CreateFile(logfileName, GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
3299 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_int32));
3300 ioctlp->outDatap += sizeof(afs_int32);
3305 SetFilePointer(hLogFile, 0, NULL, FILE_END);
3307 cookie = inValue ? "b" : "e";
3313 _CrtMemCheckpoint(&memstate);
3317 _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
3318 _CrtSetReportFile(_CRT_WARN, hLogFile);
3319 _CrtMemDumpAllObjectsSince(&memstate);
3323 /* dump all interesting data */
3324 cm_MemDumpDirStats(hLogFile, cookie, 1);
3325 cm_MemDumpBPlusStats(hLogFile, cookie, 1);
3326 cm_DumpCells(hLogFile, cookie, !RDR_Initialized);
3327 cm_DumpVolumes(hLogFile, cookie, !RDR_Initialized);
3328 cm_DumpSCache(hLogFile, cookie, !RDR_Initialized);
3329 cm_DumpBufHashTable(hLogFile, cookie, !RDR_Initialized);
3330 cm_DumpServers(hLogFile, cookie, !RDR_Initialized);
3331 smb_DumpVCP(hLogFile, cookie, 1);
3332 rx_DumpCalls(hLogFile, cookie);
3333 rx_DumpPackets(hLogFile, cookie);
3335 CloseHandle(hLogFile);
3337 inValue = 0; /* success */
3338 memcpy(ioctlp->outDatap, &inValue, sizeof(long));
3339 ioctlp->outDatap += sizeof(long);
3344 /* Utility functon. Not currently used. */
3346 cm_CheckServersStatus(cm_serverRef_t *serversp)
3349 cm_serverRef_t *tsrp;
3351 int someBusy = 0, someOffline = 0, allOffline = 1, allBusy = 1, allDown = 1, allDeleted = 1;
3353 if (serversp == NULL) {
3354 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", CM_ERROR_EMPTY);
3355 return CM_ERROR_EMPTY;
3358 lock_ObtainRead(&cm_serverLock);
3359 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
3360 if (tsrp->status == srv_deleted)
3363 if (tsp = tsrp->server) {
3364 cm_GetServerNoLock(tsp);
3365 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
3367 if (tsrp->status == srv_busy) {
3370 } else if (tsrp->status == srv_offline) {
3376 cm_PutServerNoLock(tsp);
3380 cm_PutServerNoLock(tsp);
3383 lock_ReleaseRead(&cm_serverLock);
3386 code = CM_ERROR_EMPTY;
3388 code = CM_ERROR_ALLDOWN;
3390 code = CM_ERROR_ALLBUSY;
3391 else if (allOffline || (someBusy && someOffline))
3392 code = CM_ERROR_ALLOFFLINE;
3395 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", code);
3400 * VIOC_PATH_AVAILABILITY internals.
3402 * Assumes that pioctl path has been parsed or skipped.
3403 * scp is held but not locked.
3406 cm_IoctlPathAvailability(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3411 cm_vol_state_t *statep;
3414 #ifdef AFS_FREELANCE_CLIENT
3415 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
3420 volume = scp->fid.volume;
3422 cellp = cm_FindCellByID(scp->fid.cell, 0);
3425 return CM_ERROR_NOSUCHCELL;
3427 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
3431 statep = cm_VolumeStateByID(tvp, volume);
3432 switch (statep->state) {
3438 code = CM_ERROR_ALLBUSY;
3441 code = CM_ERROR_ALLOFFLINE;
3444 code = CM_ERROR_ALLDOWN;
3453 * VIOC_VOLSTAT_TEST internals.
3455 * Assumes that pioctl path has been parsed or skipped.
3458 cm_IoctlVolStatTest(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
3461 cm_cell_t *cellp = NULL;
3463 cm_vol_state_t *statep;
3464 struct VolStatTest * testp;
3467 testp = (struct VolStatTest *)ioctlp->inDatap;
3469 #ifdef AFS_FREELANCE_CLIENT
3470 if (testp->fid.cell == -1)
3471 return CM_ERROR_NOACCESS;
3474 if (testp->flags & VOLSTAT_TEST_CHECK_VOLUME) {
3475 cm_CheckOfflineVolumes();
3479 if (testp->flags & VOLSTAT_TEST_NETWORK_UP) {
3480 cm_VolStatus_Network_Started(cm_NetbiosName
3488 if (testp->flags & VOLSTAT_TEST_NETWORK_DOWN) {
3489 cm_VolStatus_Network_Stopped(cm_NetbiosName
3497 if (testp->cellname[0]) {
3498 n = atoi(testp->cellname);
3500 testp->fid.cell = n;
3502 cellp = cm_GetCell(testp->cellname, 0);
3505 if (testp->fid.cell > 0) {
3506 cellp = cm_FindCellByID(testp->fid.cell, 0);
3510 return CM_ERROR_NOSUCHCELL;
3512 if (testp->volname[0]) {
3513 n = atoi(testp->volname);
3515 testp->fid.volume = n;
3517 code = cm_FindVolumeByName(cellp, testp->volname, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3520 if (testp->fid.volume > 0)
3521 code = cm_FindVolumeByID(cellp, testp->fid.volume, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3526 if (testp->fid.volume)
3527 statep = cm_VolumeStateByID(volp, testp->fid.volume);
3529 statep = cm_VolumeStateByName(volp, testp->volname);
3532 statep->state = testp->state;
3533 code = cm_VolStatus_Change_Notification(cellp->cellID, statep->ID, testp->state);
3542 * VIOC_GETUNIXMODE internals.
3544 * Assumes that pioctl path has been parsed or skipped.
3545 * scp is held but not locked.
3548 cm_IoctlGetUnixMode(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3553 lock_ObtainWrite(&scp->rw);
3554 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
3555 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3557 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3558 lock_ReleaseWrite(&scp->rw);
3561 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
3562 cp = ioctlp->outDatap;
3563 memcpy(cp, (char *)&scp->unixModeBits, sizeof(afs_uint32));
3564 cp += sizeof(afs_uint32);
3566 /* return new size */
3567 ioctlp->outDatap = cp;
3574 * VIOC_SETUNIXMODE internals.
3576 * Assumes that pioctl path has been parsed or skipped
3577 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
3579 * scp is held but not locked.
3582 cm_IoctlSetUnixMode(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3587 lock_ObtainWrite(&scp->rw);
3588 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
3589 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3591 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3592 lock_ReleaseWrite(&scp->rw);
3595 afs_uint32 unixModeBits;
3598 memset(&attr, 0, sizeof(attr));
3600 cp = ioctlp->inDatap;
3601 memcpy((char *)&unixModeBits, cp, sizeof(afs_uint32));
3603 attr.mask = CM_ATTRMASK_UNIXMODEBITS;
3604 attr.unixModeBits = unixModeBits;
3606 code = cm_SetAttr(scp, &attr, userp, reqp);
3612 * VIOC_GETVERIFYDATA internals.
3614 * Assumes that pioctl path has been parsed or skipped.
3617 cm_IoctlGetVerifyData(cm_ioctl_t *ioctlp)
3619 memcpy(ioctlp->outDatap, &cm_verifyData, sizeof(cm_verifyData));
3620 ioctlp->outDatap += sizeof(cm_verifyData);
3626 * VIOC_SETVERIFYDATA internals.
3628 * Assumes that pioctl path has been parsed or skipped.
3631 cm_IoctlSetVerifyData(cm_ioctl_t *ioctlp)
3633 memcpy(&cm_verifyData, ioctlp->inDatap, sizeof(cm_verifyData));
3639 * VIOC_GETCALLERACCESS internals.
3641 * Assumes that pioctl path has been parsed or skipped.
3645 cm_IoctlGetCallerAccess(cm_ioctl_t *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3648 afs_uint32 rights = 0;
3652 lock_ObtainWrite(&scp->rw);
3653 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
3654 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3656 haveRights = cm_HaveAccessRights(scp, userp, reqp, 0xFF0000FF, &rights);
3657 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3659 lock_ReleaseWrite(&scp->rw);
3661 cp = ioctlp->outDatap;
3662 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
3664 memcpy(cp, (char *)&rights, sizeof(afs_uint32));
3666 memcpy(cp, (char *)&scp->anyAccess, sizeof(afs_uint32));
3667 cp += sizeof(afs_uint32);
3668 memcpy(cp, (char *)&scp->anyAccess, sizeof(afs_uint32));
3669 cp += sizeof(afs_uint32);
3671 /* return new size */
3672 ioctlp->outDatap = cp;