2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afs/param.h>
12 #include <afs/cellconfig.h>
13 #include <afs/ptserver.h>
27 #include "afsd_init.h"
28 #include <WINNT\afsreg.h>
46 /* Copied from afs_tokens.h */
47 #define PIOCTL_LOGON 0x1
50 const char utf8_prefix[] = UTF8_PREFIX;
51 const int utf8_prefix_size = sizeof(utf8_prefix) - sizeof(char);
53 osi_mutex_t cm_Afsdsbmt_Lock;
55 extern afs_int32 cryptall;
56 extern char cm_NetbiosName[];
57 extern clientchar_t cm_NetbiosNameC[];
59 extern void afsi_log(char *pattern, ...);
61 void cm_InitIoctl(void)
63 lock_InitializeMutex(&cm_Afsdsbmt_Lock, "AFSDSBMT.INI Access Lock",
64 LOCK_HIERARCHY_AFSDBSBMT_GLOBAL);
68 * Utility function. (Not currently in use.)
69 * This function forces all dirty buffers to the file server and
70 * then discards the status info.
73 cm_CleanFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
77 code = buf_CleanVnode(scp, userp, reqp);
79 lock_ObtainWrite(&scp->rw);
80 cm_DiscardSCache(scp);
81 lock_ReleaseWrite(&scp->rw);
83 osi_Log2(afsd_logp,"cm_CleanFile scp 0x%x returns error: [%x]",scp, code);
88 * Utility function. Used within this file.
89 * scp must be held but not locked.
92 cm_FlushFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
96 #ifdef AFS_FREELANCE_CLIENT
97 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
98 cm_noteLocalMountPointChange();
103 code = buf_FlushCleanPages(scp, userp, reqp);
105 lock_ObtainWrite(&scp->rw);
106 cm_DiscardSCache(scp);
107 if (scp->fileType == CM_SCACHETYPE_DIRECTORY)
108 cm_ResetSCacheDirectory(scp);
109 lock_ReleaseWrite(&scp->rw);
111 osi_Log2(afsd_logp,"cm_FlushFile scp 0x%x returns error: [%x]",scp, code);
116 * Utility function. (Not currently in use)
117 * IoctlPath must be parsed or skipped prior to calling.
118 * scp must be held but not locked.
121 cm_FlushParent(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
126 pscp = cm_FindSCacheParent(scp);
128 /* now flush the file */
129 code = cm_FlushFile(pscp, userp, reqp);
130 cm_ReleaseSCache(pscp);
136 * Utility function. Used within this function.
139 cm_FlushVolume(cm_user_t *userp, cm_req_t *reqp, afs_uint32 cell, afs_uint32 volume)
145 #ifdef AFS_FREELANCE_CLIENT
146 if ( cell == AFS_FAKE_ROOT_CELL_ID && volume == AFS_FAKE_ROOT_VOL_ID ) {
147 cm_noteLocalMountPointChange();
152 lock_ObtainWrite(&cm_scacheLock);
153 for (i=0; i<cm_data.scacheHashTableSize; i++) {
154 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
155 if (scp->fid.volume == volume && scp->fid.cell == cell) {
156 cm_HoldSCacheNoLock(scp);
157 lock_ReleaseWrite(&cm_scacheLock);
159 /* now flush the file */
160 code = cm_FlushFile(scp, userp, reqp);
161 lock_ObtainWrite(&cm_scacheLock);
162 cm_ReleaseSCacheNoLock(scp);
166 lock_ReleaseWrite(&cm_scacheLock);
172 * Utility function. Used within this file.
173 * Invalidate ACL info for a user that has just obtained or lost tokens.
176 cm_ResetACLCache(cm_user_t *userp)
181 lock_ObtainWrite(&cm_scacheLock);
182 for (hash=0; hash < cm_data.scacheHashTableSize; hash++) {
183 for (scp=cm_data.scacheHashTablep[hash]; scp; scp=scp->nextp) {
184 cm_HoldSCacheNoLock(scp);
185 lock_ReleaseWrite(&cm_scacheLock);
186 lock_ObtainWrite(&scp->rw);
187 cm_InvalidateACLUser(scp, userp);
188 lock_ReleaseWrite(&scp->rw);
189 lock_ObtainWrite(&cm_scacheLock);
190 cm_ReleaseSCacheNoLock(scp);
193 lock_ReleaseWrite(&cm_scacheLock);
197 * TranslateExtendedChars - This is a fix for TR 54482.
199 * If an extended character (80 - FF) is entered into a file
200 * or directory name in Windows, the character is translated
201 * into the OEM character map before being passed to us.
202 * The pioctl functions must match
203 * this translation for paths given via our own commands (like
204 * fs). If we do not do this, then we will try to perform an
205 * operation on a non-translated path, which we will fail to
206 * find, since the path was created with the translated chars.
207 * This function performs the required translation.
209 * OEM character code pages are used by the non-Unicode SMB
210 * mode. Do not use if the CM_IOCTLFLAG_USEUTF8 is set.
213 TranslateExtendedChars(char *str)
218 CharToOemA(str, str);
221 void cm_SkipIoctlPath(cm_ioctl_t *ioctlp)
225 temp = strlen(ioctlp->inDatap) + 1;
226 ioctlp->inDatap += temp;
230 clientchar_t * cm_ParseIoctlStringAlloc(cm_ioctl_t *ioctlp, const char * ext_instrp)
232 clientchar_t * rs = NULL;
235 instrp = (ext_instrp)?ext_instrp:ioctlp->inDatap;
237 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
238 rs = cm_Utf8ToClientStringAlloc(instrp, -1, NULL);
242 /* Not a UTF-8 string */
243 if (smb_StoreAnsiFilenames) {
244 cch = cm_AnsiToClientString(instrp, -1, NULL, 0);
248 rs = malloc(cch * sizeof(clientchar_t));
249 cm_AnsiToClientString(instrp, -1, rs, cch);
251 cch = cm_OemToClientString(instrp, -1, NULL, 0);
255 rs = malloc(cch * sizeof(clientchar_t));
256 cm_OemToClientString(instrp, -1, rs, cch);
260 if (ext_instrp == NULL) {
261 ioctlp->inDatap += strlen(ioctlp->inDatap) + 1;
266 int cm_UnparseIoctlString(cm_ioctl_t *ioctlp,
268 const clientchar_t * cstr, int cchlen)
273 outp = ((ext_outp == NULL)? ioctlp->outDatap : ext_outp);
275 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
276 cchout = cm_ClientStringToUtf8(cstr, cchlen, outp,
277 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp));
279 if (smb_StoreAnsiFilenames) {
280 cchout = WideCharToMultiByte(CP_ACP, 0, cstr, cchlen,
282 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
285 cchout = WideCharToMultiByte(CP_OEMCP, 0, cstr, cchlen,
287 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
292 if (cchout > 0 && ext_outp == NULL) {
293 ioctlp->outDatap += cchout;
300 * Must be called before XXX_ParseIoctlPath or cm_SkipIoctlPath
302 cm_ioctlQueryOptions_t *
303 cm_IoctlGetQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
305 afs_uint32 pathlen = strlen(ioctlp->inDatap) + 1;
306 char *p = ioctlp->inDatap + pathlen;
307 cm_ioctlQueryOptions_t * optionsp = NULL;
309 if (ioctlp->inCopied > p - ioctlp->inAllocp) {
310 optionsp = (cm_ioctlQueryOptions_t *)p;
311 if (optionsp->size < 12 /* minimum size of struct */)
319 * Must be called after smb_ParseIoctlPath or cm_SkipIoctlPath
320 * or any other time that ioctlp->inDatap points at the
321 * cm_ioctlQueryOptions_t object.
324 cm_IoctlSkipQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
326 cm_ioctlQueryOptions_t * optionsp = (cm_ioctlQueryOptions_t *)ioctlp->inDatap;
327 ioctlp->inDatap += optionsp->size;
330 /* format the specified path to look like "/afs/<cellname>/usr", by
331 * adding "/afs" (if necessary) in front, changing any \'s to /'s, and
332 * removing any trailing "/"'s. One weirdo caveat: "/afs" will be
333 * intentionally returned as "/afs/"--this makes submount manipulation
334 * easier (because we can always jump past the initial "/afs" to find
335 * the AFS path that should be written into afsdsbmt.ini).
338 cm_NormalizeAfsPath(clientchar_t *outpathp, long cchlen, clientchar_t *inpathp)
341 clientchar_t bslash_mountRoot[256];
343 cm_ClientStrCpy(bslash_mountRoot, lengthof(bslash_mountRoot), cm_mountRootC);
344 bslash_mountRoot[0] = '\\';
346 if (!cm_ClientStrCmpNI(inpathp, cm_mountRootC, cm_mountRootCLen))
347 cm_ClientStrCpy(outpathp, cchlen, inpathp);
348 else if (!cm_ClientStrCmpNI(inpathp, bslash_mountRoot,
349 cm_ClientStrLen(bslash_mountRoot)))
350 cm_ClientStrCpy(outpathp, cchlen, inpathp);
351 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
352 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s%s"), cm_mountRootC, inpathp);
353 else // inpathp looks like "<cell>/usr"
354 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s/%s"), cm_mountRootC, inpathp);
356 for (cp = outpathp; *cp != 0; ++cp) {
361 if (cm_ClientStrLen(outpathp) && (outpathp[cm_ClientStrLen(outpathp)-1] == '/')) {
362 outpathp[cm_ClientStrLen(outpathp)-1] = 0;
365 if (!cm_ClientStrCmpI(outpathp, cm_mountRootC)) {
366 cm_ClientStrCpy(outpathp, cchlen, cm_mountRootC);
370 void cm_NormalizeAfsPathAscii(char *outpathp, long outlen, char *inpathp)
373 char bslash_mountRoot[256];
375 strncpy(bslash_mountRoot, cm_mountRoot, sizeof(bslash_mountRoot) - 1);
376 bslash_mountRoot[0] = '\\';
378 if (!strnicmp (inpathp, cm_mountRoot, strlen(cm_mountRoot)))
379 StringCbCopy(outpathp, outlen, inpathp);
380 else if (!strnicmp (inpathp, bslash_mountRoot, strlen(bslash_mountRoot)))
381 StringCbCopy(outpathp, outlen, inpathp);
382 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
383 StringCbPrintfA(outpathp, outlen, "%s%s", cm_mountRoot, inpathp);
384 else // inpathp looks like "<cell>/usr"
385 StringCbPrintfA(outpathp, outlen, "%s/%s", cm_mountRoot, inpathp);
387 for (cp = outpathp; *cp != 0; ++cp) {
392 if (strlen(outpathp) && (outpathp[strlen(outpathp)-1] == '/')) {
393 outpathp[strlen(outpathp)-1] = 0;
396 if (!strcmpi (outpathp, cm_mountRoot)) {
397 StringCbCopy(outpathp, outlen, cm_mountRoot);
403 * VIOCGETAL internals.
405 * Assumes that pioctl path has been parsed or skipped.
406 * scp is held but not locked.
409 cm_IoctlGetACL(cm_ioctl_t *ioctlp, cm_user_t *userp, cm_scache_t *scp, cm_req_t *reqp)
414 AFSFetchStatus fileStatus;
418 struct rx_connection * rxconnp;
420 /* now make the get acl call */
421 #ifdef AFS_FREELANCE_CLIENT
422 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
424 ioctlp->outDatap[0] ='\0';
428 afid.Volume = scp->fid.volume;
429 afid.Vnode = scp->fid.vnode;
430 afid.Unique = scp->fid.unique;
432 acl.AFSOpaque_val = ioctlp->outDatap;
433 acl.AFSOpaque_len = 0;
434 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
438 rxconnp = cm_GetRxConn(connp);
439 code = RXAFS_FetchACL(rxconnp, &afid, &acl, &fileStatus, &volSync);
440 rx_PutConnection(rxconnp);
442 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
443 code = cm_MapRPCError(code, reqp);
448 /* skip over return data */
449 tlen = (int)strlen(ioctlp->outDatap) + 1;
450 ioctlp->outDatap += tlen;
452 /* and return success */
458 * VIOC_FILE_CELL_NAME internals.
460 * Assumes that pioctl path has been parsed or skipped.
461 * scp is held but not locked.
464 cm_IoctlGetFileCellName(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
469 #ifdef AFS_FREELANCE_CLIENT
470 if ( cm_freelanceEnabled &&
471 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
472 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID &&
473 scp->fid.vnode==0x1 && scp->fid.unique==0x1 ) {
474 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
475 ioctlp->outDatap += strlen(ioctlp->outDatap) + 1;
478 #endif /* AFS_FREELANCE_CLIENT */
480 cellp = cm_FindCellByID(scp->fid.cell, CM_FLAG_NOPROBE);
482 clientchar_t * cellname;
484 cellname = cm_FsStringToClientStringAlloc(cellp->name, -1, NULL);
485 cm_UnparseIoctlString(ioctlp, NULL, cellname, -1);
489 code = CM_ERROR_NOSUCHCELL;
497 * VIOCSETAL internals.
499 * Assumes that pioctl path has been parsed or skipped.
500 * scp is held but not locked.
503 cm_IoctlSetACL(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
508 AFSFetchStatus fileStatus;
511 struct rx_connection * rxconnp;
513 #ifdef AFS_FREELANCE_CLIENT
514 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
515 code = CM_ERROR_NOACCESS;
519 /* now make the get acl call */
520 fid.Volume = scp->fid.volume;
521 fid.Vnode = scp->fid.vnode;
522 fid.Unique = scp->fid.unique;
524 acl.AFSOpaque_val = ioctlp->inDatap;
525 acl.AFSOpaque_len = (u_int)strlen(ioctlp->inDatap)+1;
526 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
530 rxconnp = cm_GetRxConn(connp);
531 code = RXAFS_StoreACL(rxconnp, &fid, &acl, &fileStatus, &volSync);
532 rx_PutConnection(rxconnp);
534 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
535 code = cm_MapRPCError(code, reqp);
537 /* invalidate cache info, since we just trashed the ACL cache */
538 lock_ObtainWrite(&scp->rw);
539 cm_DiscardSCache(scp);
540 lock_ReleaseWrite(&scp->rw);
547 * VIOC_FLUSHALL internals.
549 * Assumes that pioctl path has been parsed or skipped.
552 cm_IoctlFlushAllVolumes(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
558 lock_ObtainWrite(&cm_scacheLock);
559 for (i=0; i<cm_data.scacheHashTableSize; i++) {
560 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
561 cm_HoldSCacheNoLock(scp);
562 lock_ReleaseWrite(&cm_scacheLock);
564 /* now flush the file */
565 code = cm_FlushFile(scp, userp, reqp);
566 lock_ObtainWrite(&cm_scacheLock);
567 cm_ReleaseSCacheNoLock(scp);
570 lock_ReleaseWrite(&cm_scacheLock);
576 * VIOC_FLUSHVOLUME internals.
578 * Assumes that pioctl path has been parsed or skipped.
579 * scp is held but not locked.
582 cm_IoctlFlushVolume(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
588 #ifdef AFS_FREELANCE_CLIENT
589 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
590 code = CM_ERROR_NOACCESS;
594 volume = scp->fid.volume;
595 cell = scp->fid.cell;
596 code = cm_FlushVolume(userp, reqp, cell, volume);
602 * VIOCFLUSH internals.
604 * Assumes that pioctl path has been parsed or skipped.
605 * scp is held but not locked.
608 cm_IoctlFlushFile(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
612 #ifdef AFS_FREELANCE_CLIENT
613 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
614 code = CM_ERROR_NOACCESS;
618 cm_FlushFile(scp, userp, reqp);
625 * VIOCSETVOLSTAT internals.
627 * Assumes that pioctl path has been parsed or skipped.
628 * scp is held but not locked.
631 cm_IoctlSetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
635 char offLineMsg[256];
638 AFSFetchVolumeStatus volStat;
639 AFSStoreVolumeStatus storeStat;
644 struct rx_connection * rxconnp;
646 #ifdef AFS_FREELANCE_CLIENT
647 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
648 code = CM_ERROR_NOACCESS;
652 cellp = cm_FindCellByID(scp->fid.cell, 0);
653 osi_assertx(cellp, "null cm_cell_t");
655 if (scp->flags & CM_SCACHEFLAG_RO)
656 return CM_ERROR_READONLY;
658 code = cm_FindVolumeByID(cellp, scp->fid.volume, userp, reqp,
659 CM_GETVOL_FLAG_CREATE, &tvp);
665 /* Copy the junk out, using cp as a roving pointer. */
666 memcpy((char *)&volStat, ioctlp->inDatap, sizeof(AFSFetchVolumeStatus));
667 ioctlp->inDatap += sizeof(AFSFetchVolumeStatus);
669 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
670 cm_ClientStringToFsString(strp, -1, volName, lengthof(volName));
673 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
674 cm_ClientStringToFsString(strp, -1, offLineMsg, lengthof(offLineMsg));
677 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
678 cm_ClientStringToFsString(strp, -1, motd, lengthof(motd));
684 if (volStat.MinQuota != -1) {
685 storeStat.MinQuota = volStat.MinQuota;
686 storeStat.Mask |= AFS_SETMINQUOTA;
688 if (volStat.MaxQuota != -1) {
689 storeStat.MaxQuota = volStat.MaxQuota;
690 storeStat.Mask |= AFS_SETMAXQUOTA;
694 code = cm_ConnFromFID(&scp->fid, userp, reqp, &tcp);
698 rxconnp = cm_GetRxConn(tcp);
699 code = RXAFS_SetVolumeStatus(rxconnp, scp->fid.volume,
700 &storeStat, volName, offLineMsg, motd);
701 rx_PutConnection(rxconnp);
703 } while (cm_Analyze(tcp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
704 code = cm_MapRPCError(code, reqp);
707 /* return on failure */
711 /* we are sending parms back to make compat. with prev system. should
712 * change interface later to not ask for current status, just set
715 cp = ioctlp->outDatap;
716 memcpy(cp, (char *)&volStat, sizeof(VolumeStatus));
717 cp += sizeof(VolumeStatus);
718 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
719 cp += strlen(volName)+1;
720 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
721 cp += strlen(offLineMsg)+1;
722 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
723 cp += strlen(motd)+1;
725 /* now return updated return data pointer */
726 ioctlp->outDatap = cp;
733 * VIOCGETVOLSTAT internals.
735 * Assumes that pioctl path has been parsed or skipped.
736 * scp is held but not locked.
739 cm_IoctlGetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
742 char volName[32]="(unknown)";
743 char offLineMsg[256]="server temporarily inaccessible";
744 char motd[256]="server temporarily inaccessible";
746 AFSFetchVolumeStatus volStat;
751 struct rx_connection * rxconnp;
753 #ifdef AFS_FREELANCE_CLIENT
754 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
756 strncpy(volName, "Freelance.Local.Root", sizeof(volName));
757 offLineMsg[0] = '\0';
758 strncpy(motd, "Freelance mode in use.", sizeof(motd));
759 volStat.Vid = scp->fid.volume;
760 volStat.MaxQuota = 0;
761 volStat.BlocksInUse = 100;
762 volStat.PartBlocksAvail = 0;
763 volStat.PartMaxBlocks = 100;
768 OfflineMsg = offLineMsg;
771 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
774 rxconnp = cm_GetRxConn(connp);
775 code = RXAFS_GetVolumeStatus(rxconnp, scp->fid.volume,
776 &volStat, &Name, &OfflineMsg, &MOTD);
777 rx_PutConnection(rxconnp);
779 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
780 code = cm_MapRPCError(code, reqp);
786 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
787 cp = ioctlp->outDatap;
788 memcpy(cp, (char *)&volStat, sizeof(AFSFetchVolumeStatus));
789 cp += sizeof(AFSFetchVolumeStatus);
790 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
791 cp += strlen(volName)+1;
792 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
793 cp += strlen(offLineMsg)+1;
794 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
795 cp += strlen(motd)+1;
797 /* return new size */
798 ioctlp->outDatap = cp;
804 * VIOCGETFID internals.
806 * Assumes that pioctl path has been parsed or skipped.
807 * scp is held but not locked.
810 cm_IoctlGetFid(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
815 memset(&fid, 0, sizeof(cm_fid_t));
816 fid.cell = scp->fid.cell;
817 fid.volume = scp->fid.volume;
818 fid.vnode = scp->fid.vnode;
819 fid.unique = scp->fid.unique;
821 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
822 cp = ioctlp->outDatap;
823 memcpy(cp, (char *)&fid, sizeof(cm_fid_t));
824 cp += sizeof(cm_fid_t);
826 /* return new size */
827 ioctlp->outDatap = cp;
833 * VIOC_GETFILETYPE internals.
835 * Assumes that pioctl path has been parsed or skipped.
836 * scp is held but not locked.
839 cm_IoctlGetFileType(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
843 afs_uint32 fileType = 0;
845 if (scp->fileType == 0) {
846 lock_ObtainWrite(&scp->rw);
847 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
848 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
850 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
851 lock_ReleaseWrite(&scp->rw);
855 fileType = scp->fileType;
857 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
858 cp = ioctlp->outDatap;
859 memcpy(cp, (char *)&fileType, sizeof(fileType));
860 cp += sizeof(fileType);
862 /* return new size */
863 ioctlp->outDatap = cp;
869 * VIOCGETOWNER internals.
871 * Assumes that pioctl path has been parsed or skipped.
872 * scp is held but not locked.
875 cm_IoctlGetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
880 lock_ObtainWrite(&scp->rw);
881 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
882 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
884 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
885 lock_ReleaseWrite(&scp->rw);
888 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
889 cp = ioctlp->outDatap;
890 memcpy(cp, (char *)&scp->owner, sizeof(afs_uint32));
891 cp += sizeof(afs_uint32);
892 memcpy(cp, (char *)&scp->group, sizeof(afs_uint32));
893 cp += sizeof(afs_uint32);
895 /* return new size */
896 ioctlp->outDatap = cp;
903 * VIOCWHEREIS internals.
905 * Assumes that pioctl path has been parsed or skipped.
906 * scp is held but not locked.
909 cm_IoctlWhereIs(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
914 cm_serverRef_t **tsrpp, *current;
919 volume = scp->fid.volume;
921 cellp = cm_FindCellByID(scp->fid.cell, 0);
924 return CM_ERROR_NOSUCHCELL;
926 #ifdef AFS_FREELANCE_CLIENT
927 if ( cellp->cellID == AFS_FAKE_ROOT_CELL_ID) {
935 cp = ioctlp->outDatap;
937 memcpy(cp, (char *)&addr, sizeof(addr));
940 /* still room for terminating NULL, add it on */
942 memcpy(cp, (char *)&addr, sizeof(addr));
945 ioctlp->outDatap = cp;
949 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
953 cp = ioctlp->outDatap;
955 tsrpp = cm_GetVolServers(tvp, volume);
956 lock_ObtainRead(&cm_serverLock);
957 for (current = *tsrpp; current; current = current->next) {
958 tsp = current->server;
959 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
962 lock_ReleaseRead(&cm_serverLock);
963 cm_FreeServerList(tsrpp, 0);
965 /* still room for terminating NULL, add it on */
966 volume = 0; /* reuse vbl */
967 memcpy(cp, (char *)&volume, sizeof(long));
970 ioctlp->outDatap = cp;
977 * VIOC_AFS_STAT_MT_PT internals.
979 * Assumes that pioctl path has been parsed or skipped.
980 * scp is held but not locked.
983 cm_IoctlStatMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
989 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
991 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
995 lock_ObtainWrite(&scp->rw);
996 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
997 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
999 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1003 /* now check that this is a real mount point */
1004 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1005 code = CM_ERROR_INVAL;
1009 code = cm_ReadMountPoint(scp, userp, reqp);
1012 strp = ioctlp->outDatap;
1013 StringCbCopyA(strp, SMB_IOCTL_MAXDATA - (strp - ioctlp->outAllocp), scp->mountPointStringp);
1014 strp += strlen(strp) + 1;
1015 ioctlp->outDatap = strp;
1019 lock_ReleaseWrite(&scp->rw);
1020 cm_ReleaseSCache(scp);
1030 * VIOC_AFS_DELETE_MT_PT internals.
1032 * Assumes that pioctl path has been parsed or skipped.
1033 * scp is held but not locked.
1036 cm_IoctlDeleteMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1040 clientchar_t *cp = NULL;
1041 fschar_t *originalName = NULL;
1044 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1046 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1048 /* if something went wrong, bail out now */
1052 lock_ObtainWrite(&scp->rw);
1053 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1054 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1058 /* now check that this is a real mount point */
1059 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1060 code = CM_ERROR_INVAL;
1064 /* time to make the RPC, so drop the lock */
1065 lock_ReleaseWrite(&scp->rw);
1068 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
1070 code = cm_BPlusDirLookupOriginalName(&dirop, cp, &originalName);
1071 /* The cm_Dir* functions can't be used to lookup the
1072 originalName. Those functions only know of the original
1074 cm_EndDirOp(&dirop);
1078 /* If this name doesn't have a non-normalized name associated with
1079 it, we assume that what we had is what is actually present on
1082 if (originalName == NULL) {
1083 originalName = cm_ClientStringToFsStringAlloc(cp, -1, NULL);
1086 /* cp is a normalized name. originalName is the actual name we
1087 saw on the fileserver. */
1088 #ifdef AFS_FREELANCE_CLIENT
1089 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1090 /* we are removing the mount point to the root dir., so call
1091 * the freelance code to do the deletion. */
1092 osi_Log0(afsd_logp,"IoctlDeleteMountPoint from Freelance root dir");
1093 code = cm_FreelanceRemoveMount(originalName);
1097 /* easier to do it this way */
1098 code = cm_Unlink(dscp, originalName, cp, userp, reqp);
1100 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1101 smb_NotifyChange(FILE_ACTION_REMOVED,
1102 FILE_NOTIFY_CHANGE_DIR_NAME,
1103 dscp, cp, NULL, TRUE);
1105 lock_ObtainWrite(&scp->rw);
1107 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1110 cm_DiscardSCache(scp);
1111 lock_ReleaseWrite(&scp->rw);
1112 cm_ReleaseSCache(scp);
1115 if (originalName != NULL)
1125 * VIOCCKSERV internals.
1127 * Assumes that pioctl path has been parsed or skipped.
1130 cm_IoctlCheckServers(struct cm_ioctl *ioctlp, struct cm_user *userp)
1140 tp = ioctlp->inDatap;
1143 memcpy(&temp, tp, sizeof(temp));
1144 if (temp == 0x12345678) { /* For afs3.3 version */
1145 memcpy(&csi, tp, sizeof(csi));
1146 if (csi.tinterval >= 0) {
1147 cp = ioctlp->outDatap;
1148 memcpy(cp, (char *)&cm_daemonCheckDownInterval, sizeof(long));
1149 ioctlp->outDatap += sizeof(long);
1150 if (csi.tinterval > 0) {
1151 if (!smb_SUser(userp))
1152 return CM_ERROR_NOACCESS;
1153 cm_daemonCheckDownInterval = csi.tinterval;
1161 } else { /* For pre afs3.3 versions */
1162 memcpy((char *)&temp, ioctlp->inDatap, sizeof(long));
1163 ioctlp->inDatap = cp = ioctlp->inDatap + sizeof(long);
1164 if (cp - ioctlp->inAllocp < ioctlp->inCopied) /* still more data available */
1169 * 1: fast check, don't contact servers.
1170 * 2: local cell only.
1173 /* have cell name, too */
1174 cellp = cm_GetCell(cp, (temp & 1) ? CM_FLAG_NOPROBE : 0);
1176 return CM_ERROR_NOSUCHCELL;
1179 cellp = (cm_cell_t *) 0;
1180 if (!cellp && (temp & 2)) {
1181 /* use local cell */
1182 fschar_t wscell[CELL_MAXNAMELEN+1];
1183 cm_GetRootCellName(wscell);
1184 cellp = cm_GetCell(wscell, 0);
1186 if (!(temp & 1)) { /* if not fast, call server checker routine */
1187 /* check down servers */
1188 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS | CM_FLAG_CHECKUPSERVERS, cellp);
1191 /* now return the current down server list */
1192 cp = ioctlp->outDatap;
1193 lock_ObtainRead(&cm_serverLock);
1194 for (tsp = cm_allServersp; tsp; tsp=tsp->allNextp) {
1195 if (cellp && tsp->cellp != cellp)
1196 continue; /* cell spec'd and wrong */
1197 if ((tsp->flags & CM_SERVERFLAG_DOWN)
1198 && tsp->type == CM_SERVER_FILE) {
1199 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1203 lock_ReleaseRead(&cm_serverLock);
1205 ioctlp->outDatap = cp;
1210 * VIOCCKBACK internals.
1212 * Assumes that pioctl path has been parsed or skipped.
1215 cm_IoctlCheckVolumes(cm_ioctl_t *ioctlp, cm_user_t *userp)
1217 cm_RefreshVolumes();
1222 * VIOCSETCACHESIZE internals.
1224 * Assumes that pioctl path has been parsed or skipped.
1226 * This function is no longer meaningful in the current day world
1227 * of persistent caches. The buf_SetNBuffers() function will
1231 cm_IoctlSetCacheSize(struct cm_ioctl *ioctlp, struct cm_user *userp)
1236 memcpy(&temp, ioctlp->inDatap, sizeof(temp));
1238 temp = cm_data.buf_nOrigBuffers;
1240 /* temp is in 1K units, convert to # of buffers */
1241 temp = temp / (cm_data.buf_blockSize / 1024);
1244 /* now adjust the cache size */
1245 code = buf_SetNBuffers(temp);
1251 * VIOC_TRACECTL internals.
1253 * Assumes that pioctl path has been parsed or skipped.
1256 cm_IoctlTraceControl(cm_ioctl_t *ioctlp, cm_user_t *userp)
1260 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_uint32));
1264 afsd_ForceTrace(FALSE);
1265 buf_ForceTrace(FALSE);
1269 /* set tracing value to low order bit */
1270 if ((inValue & 1) == 0) {
1271 /* disable tracing */
1272 osi_LogDisable(afsd_logp);
1273 rx_DebugOnOff(FALSE);
1276 /* enable tracing */
1277 osi_LogEnable(afsd_logp);
1278 rx_DebugOnOff(TRUE);
1282 /* see if we're supposed to do a reset, too */
1284 osi_LogReset(afsd_logp);
1287 /* and copy out tracing flag */
1288 inValue = afsd_logp->enabled; /* use as a temp vbl */
1289 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_uint32));
1290 ioctlp->outDatap += sizeof(afs_uint32);
1295 * VIOCGETCACHEPARMS internals.
1297 * Assumes that pioctl path has been parsed or skipped.
1300 cm_IoctlGetCacheParms(struct cm_ioctl *ioctlp, struct cm_user *userp)
1302 cm_cacheParms_t parms;
1304 memset(&parms, 0, sizeof(parms));
1306 /* first we get, in 1K units, the cache size */
1307 parms.parms[0] = cm_data.buf_nbuffers * (cm_data.buf_blockSize / 1024);
1309 /* and then the actual # of buffers in use (not in the free list, I guess,
1310 * will be what we do).
1312 parms.parms[1] = (cm_data.buf_nbuffers - buf_CountFreeList()) * (cm_data.buf_blockSize / 1024);
1314 memcpy(ioctlp->outDatap, &parms, sizeof(parms));
1315 ioctlp->outDatap += sizeof(parms);
1321 * VIOCGETCELL internals.
1323 * Assumes that pioctl path has been parsed or skipped.
1326 cm_IoctlGetCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1331 cm_serverRef_t *serverRefp;
1332 cm_server_t *serverp;
1338 tp = ioctlp->inDatap;
1340 memcpy((char *)&whichCell, tp, sizeof(long));
1343 /* see if more than one long passed in, ignoring the null pathname (the -1) */
1344 if (ioctlp->inCopied-1 > sizeof(afs_uint32)) {
1345 memcpy((char *)&magic, tp, sizeof(afs_uint32));
1348 lock_ObtainRead(&cm_cellLock);
1349 for (tcellp = cm_data.allCellsp; tcellp; tcellp = tcellp->allNextp) {
1354 lock_ReleaseRead(&cm_cellLock);
1357 clientchar_t * cellnamep;
1359 cp = ioctlp->outDatap;
1361 if (magic == 0x12345678) {
1362 memcpy(cp, (char *)&magic, sizeof(long));
1365 memset(cp, 0, max * sizeof(long));
1367 lock_ObtainRead(&cm_serverLock); /* for going down server list */
1368 for (i=0, serverRefp = tcellp->vlServersp;
1369 serverRefp && i<max;
1370 i++, serverRefp = serverRefp->next) {
1371 serverp = serverRefp->server;
1372 memcpy(cp, &serverp->addr.sin_addr.s_addr, sizeof(long));
1375 lock_ReleaseRead(&cm_serverLock);
1376 ioctlp->outDatap = basep + max * sizeof(afs_int32);
1378 cellnamep = cm_FsStringToClientStringAlloc(tcellp->name, -1, NULL);
1379 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1386 return CM_ERROR_NOMORETOKENS; /* mapped to EDOM */
1391 * VIOCNEWCELL internals.
1393 * Assumes that pioctl path has been parsed or skipped.
1396 cm_IoctlNewCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1399 * All that needs to be done is to refresh server information for all cells that
1400 * are already loaded.
1402 * cell list will be cm_CellLock and cm_ServerLock will be held for write.
1406 cm_cell_rock_t rock;
1408 lock_ObtainWrite(&cm_cellLock);
1410 for (cp = cm_data.allCellsp; cp; cp=cp->allNextp)
1414 /* delete all previous server lists - cm_FreeServerList will ask for write on cm_ServerLock*/
1415 cm_FreeServerList(&cp->vlServersp, CM_FREESERVERLIST_DELETE);
1416 cp->vlServersp = NULL;
1417 lock_ReleaseWrite(&cm_cellLock);
1421 code = cm_SearchCellFile(cp->name, cp->name, cm_AddCellProc, &rock);
1422 #ifdef AFS_AFSDB_ENV
1424 if (cm_dnsEnabled) {
1426 code = cm_SearchCellByDNS(cp->name, cp->name, &ttl, cm_AddCellProc, &rock);
1427 if ( code == 0 ) { /* got cell from DNS */
1428 lock_ObtainMutex(&cp->mx);
1429 cp->flags |= CM_CELLFLAG_DNS;
1430 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1431 cp->timeout = time(0) + ttl;
1432 lock_ReleaseMutex(&cp->mx);
1437 lock_ObtainMutex(&cp->mx);
1438 cp->flags &= ~CM_CELLFLAG_DNS;
1439 lock_ReleaseMutex(&cp->mx);
1441 #endif /* AFS_AFSDB_ENV */
1443 lock_ObtainMutex(&cp->mx);
1444 cp->flags |= CM_CELLFLAG_VLSERVER_INVALID;
1445 lock_ReleaseMutex(&cp->mx);
1446 lock_ObtainWrite(&cm_cellLock);
1449 lock_ObtainMutex(&cp->mx);
1450 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1451 lock_ReleaseMutex(&cp->mx);
1452 lock_ObtainWrite(&cm_cellLock);
1453 cm_RandomizeServer(&cp->vlServersp);
1456 lock_ReleaseWrite(&cm_cellLock);
1461 * VIOC_GET_WS_CELL internals.
1463 * Assumes that pioctl path has been parsed or skipped.
1466 cm_IoctlGetWsCell(cm_ioctl_t *ioctlp, cm_user_t *userp)
1470 if (cm_freelanceEnabled) {
1471 if (cm_GetRootCellName(ioctlp->outDatap))
1472 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
1473 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
1474 } else if (cm_data.rootCellp) {
1475 clientchar_t * cellnamep = cm_FsStringToClientStringAlloc(cm_data.rootCellp->name, -1, NULL);
1476 /* return the default cellname to the caller */
1477 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1480 /* if we don't know our default cell, return failure */
1481 code = CM_ERROR_NOSUCHCELL;
1488 * VIOC_AFS_SYSNAME internals.
1490 * Assumes that pioctl path has been parsed or skipped.
1493 cm_IoctlSysName(struct cm_ioctl *ioctlp, struct cm_user *userp)
1495 afs_uint32 setSysName;
1497 clientchar_t *inname = NULL;
1500 memcpy(&setSysName, ioctlp->inDatap, sizeof(afs_uint32));
1501 ioctlp->inDatap += sizeof(afs_uint32);
1505 if ( setSysName < 0 || setSysName > MAXNUMSYSNAMES )
1507 cp2 = ioctlp->inDatap;
1508 for ( cp=ioctlp->inDatap, count = 0; count < setSysName; count++ ) {
1509 /* won't go past end of ioctlp->inDatap since
1510 maxsysname*num < ioctlp->inDatap length */
1511 t = (int)strlen(cp);
1512 if (t >= MAXSYSNAME || t <= 0)
1514 /* check for names that can shoot us in the foot */
1515 if (*cp == '.' && (cp[1] == 0 || (cp[1] == '.' && cp[2] == 0)))
1521 /* inname gets first entry in case we're being a translator */
1522 /* (we are never a translator) */
1523 inname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1526 /* Not xlating, so local case */
1528 osi_panic("cm_IoctlSysName: !cm_sysName\n", __FILE__, __LINE__);
1531 /* Local guy; only root can change sysname */
1532 /* clear @sys entries from the dnlc, once afs_lookup can
1533 * do lookups of @sys entries and thinks it can trust them */
1534 /* privs ok, store the entry, ... */
1536 cm_ClientStrCpy(cm_sysName, lengthof(cm_sysName), inname);
1537 cm_ClientStrCpy(cm_sysNameList[0], MAXSYSNAME, inname);
1539 if (setSysName > 1) { /* ... or list */
1540 for (count = 1; count < setSysName; ++count) {
1541 clientchar_t * newsysname;
1543 if (!cm_sysNameList[count])
1544 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to write\n",
1545 __FILE__, __LINE__);
1547 newsysname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1548 cm_ClientStrCpy(cm_sysNameList[count], MAXSYSNAME, newsysname);
1552 cm_sysNameCount = setSysName;
1556 /* return the sysname to the caller */
1557 i32 = cm_sysNameCount;
1558 memcpy(ioctlp->outDatap, &i32, sizeof(afs_int32));
1559 ioctlp->outDatap += sizeof(afs_int32); /* skip found flag */
1561 if (cm_sysNameCount) {
1562 for ( count=0; count < cm_sysNameCount ; ++count) { /* ... or list */
1563 if ( !cm_sysNameList[count] || *cm_sysNameList[count] == _C('\0'))
1564 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to read\n",
1565 __FILE__, __LINE__);
1566 cm_UnparseIoctlString(ioctlp, NULL, cm_sysNameList[count], -1);
1581 * VIOC_GETCELLSTATUS internals.
1583 * Assumes that pioctl path has been parsed or skipped.
1586 cm_IoctlGetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1590 clientchar_t * cellnamep;
1591 fschar_t * fscellnamep;
1593 cellnamep = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1594 fscellnamep = cm_ClientStringToFsStringAlloc(cellnamep, -1, NULL);
1595 cellp = cm_GetCell(fscellnamep, 0);
1600 return CM_ERROR_NOSUCHCELL;
1603 lock_ObtainMutex(&cellp->mx);
1604 if (cellp->flags & CM_CELLFLAG_SUID)
1605 temp |= CM_SETCELLFLAG_SUID;
1606 lock_ReleaseMutex(&cellp->mx);
1608 /* now copy out parm */
1609 memcpy(ioctlp->outDatap, &temp, sizeof(afs_uint32));
1610 ioctlp->outDatap += sizeof(afs_uint32);
1616 * VIOC_SETCELLSTATUS internals.
1618 * Assumes that pioctl path has been parsed or skipped.
1621 cm_IoctlSetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1626 fschar_t * cellnamep;
1628 temp = cm_ParseIoctlStringAlloc(ioctlp, ioctlp->inDatap + 2*sizeof(afs_uint32));
1629 cellnamep = cm_ClientStringToFsStringAlloc(temp, -1, NULL);
1630 cellp = cm_GetCell(cellnamep, 0);
1635 return CM_ERROR_NOSUCHCELL;
1637 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_uint32));
1639 lock_ObtainMutex(&cellp->mx);
1640 if (flags & CM_SETCELLFLAG_SUID)
1641 cellp->flags |= CM_CELLFLAG_SUID;
1643 cellp->flags &= ~CM_CELLFLAG_SUID;
1644 lock_ReleaseMutex(&cellp->mx);
1650 * VIOC_SETSPREFS internals.
1652 * Assumes that pioctl path has been parsed or skipped.
1655 cm_IoctlSetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1657 cm_SSetPref_t *spin; /* input */
1658 cm_SPref_t *srvin; /* one input component */
1660 int i, vlonly, noServers, type;
1661 struct sockaddr_in tmp;
1662 unsigned short rank;
1664 spin = (cm_SSetPref_t *)ioctlp->inDatap;
1665 noServers = spin->num_servers;
1666 vlonly = spin->flags;
1668 type = CM_SERVER_VLDB;
1670 type = CM_SERVER_FILE;
1672 for ( i=0; i < noServers; i++)
1674 srvin = &(spin->servers[i]);
1675 rank = srvin->rank + (rand() & 0x000f);
1676 tmp.sin_addr = srvin->host;
1677 tmp.sin_family = AF_INET;
1679 tsp = cm_FindServer(&tmp, type);
1680 if ( tsp ) /* an existing server - ref count increased */
1682 tsp->ipRank = rank; /* no need to protect by mutex*/
1684 if (type == CM_SERVER_FILE)
1686 /* find volumes which might have RO copy
1687 /* on server and change the ordering of
1690 cm_ChangeRankVolume(tsp);
1694 /* set preferences for an existing vlserver */
1695 cm_ChangeRankCellVLServer(tsp);
1698 else /* add a new server without a cell */
1700 tsp = cm_NewServer(&tmp, type, NULL, CM_FLAG_NOPROBE); /* refcount = 1 */
1703 lock_ObtainMutex(&tsp->mx);
1704 tsp->flags |= CM_SERVERFLAG_PREF_SET;
1705 lock_ReleaseMutex(&tsp->mx);
1706 cm_PutServer(tsp); /* decrease refcount */
1712 * VIOC_GETSPREFS internals.
1714 * Assumes that pioctl path has been parsed or skipped.
1717 cm_IoctlGetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1719 cm_SPrefRequest_t *spin; /* input */
1720 cm_SPrefInfo_t *spout; /* output */
1721 cm_SPref_t *srvout; /* one output component */
1723 int i, vlonly, noServers;
1725 spin = (cm_SPrefRequest_t *)ioctlp->inDatap;
1726 spout = (cm_SPrefInfo_t *) ioctlp->outDatap;
1727 srvout = spout->servers;
1728 noServers = spin->num_servers;
1729 vlonly = spin->flags & CM_SPREF_VLONLY;
1730 spout->num_servers = 0;
1732 lock_ObtainRead(&cm_serverLock); /* get server lock */
1734 for (tsp=cm_allServersp, i=0; tsp && noServers; tsp=tsp->allNextp,i++){
1735 if (spin->offset > i) {
1736 continue; /* catch up to where we left off */
1739 if ( vlonly && (tsp->type == CM_SERVER_FILE) )
1740 continue; /* ignore fileserver for -vlserver option*/
1741 if ( !vlonly && (tsp->type == CM_SERVER_VLDB) )
1742 continue; /* ignore vlservers */
1744 srvout->host = tsp->addr.sin_addr;
1745 srvout->rank = tsp->ipRank;
1747 spout->num_servers++;
1750 lock_ReleaseRead(&cm_serverLock); /* release server lock */
1752 if ( tsp ) /* we ran out of space in the output buffer */
1753 spout->next_offset = i;
1755 spout->next_offset = 0;
1756 ioctlp->outDatap += sizeof(cm_SPrefInfo_t) +
1757 (spout->num_servers -1 ) * sizeof(cm_SPref_t) ;
1763 * VIOC_AFS_CREATE_MT_PT internals.
1765 * Assumes that pioctl path has been parsed or skipped.
1766 * dscp is held but not locked.
1769 cm_IoctlCreateMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1774 fschar_t mpInfo[512]; /* mount point string */
1775 fschar_t fullCell[CELL_MAXNAMELEN];
1776 fschar_t *fscell = NULL;
1777 fschar_t *fsvolume = NULL;
1778 clientchar_t volume[VL_MAXNAMELEN];
1779 clientchar_t *mpp = NULL;
1780 clientchar_t *cell = NULL;
1781 cm_volume_t *volp = NULL;
1782 cm_cell_t *cellp = NULL;
1786 * The fs command allows the user to specify partial cell names on NT. These must
1787 * be expanded to the full cell name for mount points so that the mount points will
1788 * work on UNIX clients.
1791 /* Extract the possibly partial cell name */
1792 mpp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1793 cell = cm_ClientCharNext(mpp);
1794 if (cp = cm_ClientStrChr(cell, ':')) {
1796 /* Extract the volume name */
1798 cm_ClientStrCpy(volume, lengthof(volume), cm_ClientCharNext(cp));
1800 fscell = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1801 fsvolume = cm_ClientStringToFsStringAlloc(volume, -1, NULL);
1803 /* Get the full name for this cell */
1804 cellp = cm_GetCell_Gen(fscell, fullCell, CM_FLAG_NOPROBE);
1806 code = CM_ERROR_NOSUCHCELL;
1810 StringCbPrintfA(mpInfo, sizeof(mpInfo), "%c%s:%s", (char) *mpp,
1811 fullCell, fsvolume);
1814 /* No cell name specified, so cell points at the volume instead. */
1815 fsvolume = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1816 cm_ClientStringToFsString(mpp, -1, mpInfo, lengthof(mpInfo));
1817 cellp = cm_FindCellByID(dscp->fid.cell, CM_FLAG_NOPROBE);
1820 /* remove the trailing dot if it is present */
1821 len = strlen(fsvolume);
1822 if (len > 1 && fsvolume[len-1] == '.')
1823 fsvolume[len-1] = '\0';
1825 /* validate the target info */
1826 if (cm_VolNameIsID(fsvolume)) {
1827 code = cm_FindVolumeByID(cellp, atoi(fsvolume), userp, reqp,
1828 CM_GETVOL_FLAG_CREATE, &volp);
1830 code = cm_FindVolumeByName(cellp, fsvolume, userp, reqp,
1831 CM_GETVOL_FLAG_CREATE, &volp);
1836 #ifdef AFS_FREELANCE_CLIENT
1837 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1838 /* we are adding the mount point to the root dir, so call
1839 * the freelance code to do the add. */
1840 fschar_t * fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1841 osi_Log0(afsd_logp,"IoctlCreateMountPoint within Freelance root dir");
1842 code = cm_FreelanceAddMount(fsleaf, fullCell, fsvolume, *mpInfo == '%', NULL);
1847 /* create the symlink with mode 644. The lack of X bits tells
1848 * us that it is a mount point.
1850 tattr.mask = CM_ATTRMASK_UNIXMODEBITS | CM_ATTRMASK_CLIENTMODTIME;
1851 tattr.unixModeBits = 0644;
1852 tattr.clientModTime = time(NULL);
1854 code = cm_SymLink(dscp, leaf, mpInfo, 0, &tattr, userp, reqp);
1857 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1858 smb_NotifyChange(FILE_ACTION_ADDED,
1859 FILE_NOTIFY_CHANGE_DIR_NAME,
1860 dscp, leaf, NULL, TRUE);
1876 * VIOC_SYMLINK internals.
1878 * Assumes that pioctl path has been parsed or skipped.
1879 * dscp is held but not locked.
1882 cm_IoctlSymlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1888 int free_syml = FALSE;
1890 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1891 /* Translate chars for the linked to name */
1892 TranslateExtendedChars(ioctlp->inDatap);
1895 cp = symlp = ioctlp->inDatap; /* contents of link */
1897 #ifdef AFS_FREELANCE_CLIENT
1898 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1899 /* we are adding the symlink to the root dir., so call
1900 * the freelance code to do the add. */
1903 if (cp[0] == cp[1] && cp[1] == '\\' &&
1904 !_strnicmp(cm_NetbiosName,cp+2,strlen(cm_NetbiosName)))
1906 /* skip \\AFS\ or \\AFS\all\ */
1908 p = cp + 2 + strlen(cm_NetbiosName) + 1;
1909 if ( !_strnicmp("all", p, 3) )
1914 osi_Log0(afsd_logp,"IoctlCreateSymlink within Freelance root dir");
1915 fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1916 code = cm_FreelanceAddSymlink(fsleaf, cp, NULL);
1921 /* Create symlink with mode 0755. */
1922 tattr.mask = CM_ATTRMASK_UNIXMODEBITS;
1923 tattr.unixModeBits = 0755;
1925 code = cm_SymLink(dscp, leaf, cp, 0, &tattr, userp, reqp);
1928 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1929 smb_NotifyChange(FILE_ACTION_ADDED,
1930 FILE_NOTIFY_CHANGE_FILE_NAME
1931 | FILE_NOTIFY_CHANGE_DIR_NAME,
1932 dscp, leaf, NULL, TRUE);
1938 * VIOC_LISTSYMLINK internals.
1940 * Assumes that pioctl path has been parsed or skipped.
1941 * dscp is held but not locked.
1944 cm_IoctlListlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1950 cm_scache_t *newRootScp;
1951 clientchar_t *clientp;
1953 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1954 /* Translate chars for the link name */
1955 TranslateExtendedChars(ioctlp->inDatap);
1957 cp = ioctlp->inDatap;
1959 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
1960 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1965 /* Check that it's a real symlink */
1966 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
1967 scp->fileType != CM_SCACHETYPE_DFSLINK &&
1968 scp->fileType != CM_SCACHETYPE_INVALID) {
1969 cm_ReleaseSCache(scp);
1970 return CM_ERROR_INVAL;
1973 code = cm_AssembleLink(scp, "", &newRootScp, &spacep, userp, reqp);
1974 cm_ReleaseSCache(scp);
1977 cp = ioctlp->outDatap;
1978 if (newRootScp != NULL) {
1979 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), cm_mountRoot);
1980 StringCbCatA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), "/");
1984 linkstr = cm_ClientStringToFsStringAlloc(spacep->wdata, -1, NULL);
1985 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), linkstr);
1986 cp += strlen(cp) + 1;
1987 ioctlp->outDatap = cp;
1988 cm_FreeSpace(spacep);
1990 if (newRootScp != NULL)
1991 cm_ReleaseSCache(newRootScp);
1993 } else if (code == CM_ERROR_PATH_NOT_COVERED &&
1994 scp->fileType == CM_SCACHETYPE_DFSLINK ||
1995 code == CM_ERROR_NOSUCHPATH &&
1996 scp->fileType == CM_SCACHETYPE_INVALID) {
1998 cp = ioctlp->outDatap;
1999 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), scp->mountPointStringp);
2000 cp += strlen(cp) + 1;
2001 ioctlp->outDatap = cp;
2009 * VIOC_ISSYMLINK internals.
2011 * Assumes that pioctl path has been parsed or skipped.
2012 * dscp is held but not locked.
2015 cm_IoctlIslink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2016 {/*CHECK FOR VALID SYMLINK*/
2020 clientchar_t *clientp;
2022 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2023 /* Translate chars for the link name */
2024 TranslateExtendedChars(ioctlp->inDatap);
2026 cp = ioctlp->inDatap;
2027 osi_LogEvent("cm_IoctlListlink",NULL," name[%s]",cp);
2029 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2030 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2035 /* Check that it's a real symlink */
2036 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2037 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2038 scp->fileType != CM_SCACHETYPE_INVALID)
2039 code = CM_ERROR_INVAL;
2040 cm_ReleaseSCache(scp);
2045 * VIOC_DELSYMLINK internals.
2047 * Assumes that pioctl path has been parsed or skipped.
2048 * dscp is held but not locked.
2051 cm_IoctlDeletelink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2056 char * originalName = NULL;
2058 clientchar_t *clientp;
2060 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2061 /* Translate chars for the link name */
2062 TranslateExtendedChars(ioctlp->inDatap);
2064 cp = ioctlp->inDatap;
2066 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2067 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2069 /* if something went wrong, bail out now */
2073 lock_ObtainWrite(&scp->rw);
2074 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2075 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2079 /* now check that this is a real symlink */
2080 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2081 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2082 scp->fileType != CM_SCACHETYPE_INVALID) {
2083 code = CM_ERROR_INVAL;
2087 /* time to make the RPC, so drop the lock */
2088 lock_ReleaseWrite(&scp->rw);
2091 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
2093 code = cm_BPlusDirLookupOriginalName(&dirop, clientp, &originalName);
2094 /* cm_Dir*() functions can't be used to lookup the original
2095 name since those functions only know of the original
2097 cm_EndDirOp(&dirop);
2101 /* If this name doesn't have a non-normalized name associated with
2102 it, we assume that what we had is what is actually present on
2105 if (originalName == NULL)
2108 /* cp is a normalized name. originalName is the actual name we
2109 saw on the fileserver. */
2112 #ifdef AFS_FREELANCE_CLIENT
2113 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2114 /* we are adding the mount point to the root dir., so call
2115 * the freelance code to do the add. */
2116 osi_Log0(afsd_logp,"IoctlDeletelink from Freelance root dir");
2117 code = cm_FreelanceRemoveSymlink(originalName);
2121 /* easier to do it this way */
2122 code = cm_Unlink(dscp, originalName, clientp, userp, reqp);
2124 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2125 smb_NotifyChange(FILE_ACTION_REMOVED,
2126 FILE_NOTIFY_CHANGE_FILE_NAME
2127 | FILE_NOTIFY_CHANGE_DIR_NAME,
2128 dscp, clientp, NULL, TRUE);
2130 if (originalName != NULL && originalName != cp) {
2132 originalName = NULL;
2135 lock_ObtainWrite(&scp->rw);
2137 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2140 cm_DiscardSCache(scp);
2141 lock_ReleaseWrite(&scp->rw);
2142 cm_ReleaseSCache(scp);
2151 /* Utility function. Not currently used.
2152 * This function performs a PTS lookup which has traditionally
2153 * not been performed by the cache manager.
2156 cm_UsernameToId(char *uname, cm_ucell_t * ucellp, afs_uint32* uid)
2161 static struct afsconf_cell info;
2162 struct rx_connection *serverconns[MAXSERVERS];
2163 struct rx_securityClass *sc[3];
2164 afs_int32 scIndex = 2; /* authenticated - we have a token */
2165 struct ubik_client *pruclient = NULL;
2166 struct afsconf_dir *tdir;
2170 tdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH);
2171 code = afsconf_GetCellInfo(tdir, ucellp->cellp->name, "afsprot", &info);
2172 afsconf_Close(tdir);
2178 /* we have the token that was given to us in the settoken
2179 * call. we just have to use it.
2181 scIndex = 2; /* kerberos ticket */
2182 sc[2] = rxkad_NewClientSecurityObject(rxkad_clear, &ucellp->sessionKey,
2183 ucellp->kvno, ucellp->ticketLen,
2186 memset(serverconns, 0, sizeof(serverconns)); /* terminate list!!! */
2187 for (i = 0; i < info.numServers; i++)
2189 rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
2190 info.hostAddr[i].sin_port, PRSRV, sc[scIndex],
2193 code = ubik_ClientInit(serverconns, &pruclient);
2198 code = rxs_Release(sc[scIndex]);
2200 lids.idlist_len = 0;
2201 lids.idlist_val = 0;
2202 lnames.namelist_len = 1;
2203 lnames.namelist_val = (prname *) malloc(PR_MAXNAMELEN);
2204 strncpy(lnames.namelist_val[0], uname, PR_MAXNAMELEN);
2205 lnames.namelist_val[0][PR_MAXNAMELEN-1] = '\0';
2206 for ( p=lnames.namelist_val[0], r=NULL; *p; p++ ) {
2212 if (r && !cm_stricmp_utf8(r+1,ucellp->cellp->name))
2215 code = ubik_PR_NameToID(pruclient, 0, &lnames, &lids);
2216 if (lids.idlist_val) {
2217 *uid = *lids.idlist_val;
2218 free(lids.idlist_val);
2220 if (lnames.namelist_val)
2221 free(lnames.namelist_val);
2224 ubik_ClientDestroy(pruclient);
2230 #endif /* QUERY_AFSID */
2233 /* This has been copied to smb_IoctlSetToken in its entirety.
2234 * An equivalent version will need to be produced for the
2235 * redirector and some extensive refactoring might be required.
2238 cm_IoctlSetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2245 struct ClearToken ct;
2253 int release_userp = 0;
2256 saveDataPtr = ioctlp->inDatap;
2258 cm_SkipIoctlPath(ioctlp);
2260 tp = ioctlp->inDatap;
2263 memcpy(&ticketLen, tp, sizeof(ticketLen));
2264 tp += sizeof(ticketLen);
2265 if (ticketLen < MINKTCTICKETLEN || ticketLen > MAXKTCTICKETLEN)
2266 return CM_ERROR_INVAL;
2268 /* remember ticket and skip over it for now */
2272 /* clear token size */
2273 memcpy(&ctSize, tp, sizeof(ctSize));
2274 tp += sizeof(ctSize);
2275 if (ctSize != sizeof(struct ClearToken))
2276 return CM_ERROR_INVAL;
2279 memcpy(&ct, tp, ctSize);
2281 if (ct.AuthHandle == -1)
2282 ct.AuthHandle = 999; /* more rxvab compat stuff */
2284 /* more stuff, if any */
2285 if (ioctlp->inCopied > tp - saveDataPtr) {
2286 /* flags: logon flag */
2287 memcpy(&flags, tp, sizeof(int));
2291 cellp = cm_GetCell(tp, CM_FLAG_CREATE | CM_FLAG_NOPROBE);
2293 return CM_ERROR_NOSUCHCELL;
2294 tp += strlen(tp) + 1;
2298 tp += strlen(tp) + 1;
2300 if (flags & PIOCTL_LOGON) {
2301 /* SMB user name with which to associate tokens */
2303 osi_Log2(smb_logp,"cm_IoctlSetToken for user [%s] smbname [%s]",
2304 osi_LogSaveString(smb_logp,uname), osi_LogSaveString(smb_logp,smbname));
2305 fprintf(stderr, "SMB name = %s\n", smbname);
2306 tp += strlen(tp) + 1;
2308 osi_Log1(smb_logp,"cm_IoctlSetToken for user [%s]",
2309 osi_LogSaveString(smb_logp, uname));
2313 memcpy(&uuid, tp, sizeof(uuid));
2314 if (!cm_FindTokenEvent(uuid, sessionKey))
2315 return CM_ERROR_INVAL;
2317 cellp = cm_data.rootCellp;
2318 osi_Log0(smb_logp,"cm_IoctlSetToken - no name specified");
2321 if (flags & PIOCTL_LOGON) {
2322 userp = smb_FindCMUserByName(smbname, ioctlp->fidp->vcp->rname,
2323 SMB_FLAG_CREATE|SMB_FLAG_AFSLOGON);
2327 /* store the token */
2328 lock_ObtainMutex(&userp->mx);
2329 ucellp = cm_GetUCell(userp, cellp);
2330 osi_Log1(smb_logp,"cm_IoctlSetToken ucellp %lx", ucellp);
2331 ucellp->ticketLen = ticketLen;
2332 if (ucellp->ticketp)
2333 free(ucellp->ticketp); /* Discard old token if any */
2334 ucellp->ticketp = malloc(ticketLen);
2335 memcpy(ucellp->ticketp, ticket, ticketLen);
2337 * Get the session key from the RPC, rather than from the pioctl.
2340 memcpy(&ucellp->sessionKey, ct.HandShakeKey, sizeof(ct.HandShakeKey));
2342 memcpy(ucellp->sessionKey.data, sessionKey, sizeof(sessionKey));
2343 ucellp->kvno = ct.AuthHandle;
2344 ucellp->expirationTime = ct.EndTimestamp;
2347 ucellp->uid = ANONYMOUSID;
2350 StringCbCopyA(ucellp->userName, MAXKTCNAMELEN, uname);
2352 cm_UsernameToId(uname, ucellp, &ucellp->uid);
2355 ucellp->flags |= CM_UCELLFLAG_RXKAD;
2356 lock_ReleaseMutex(&userp->mx);
2358 if (flags & PIOCTL_LOGON) {
2359 ioctlp->flags |= CM_IOCTLFLAG_LOGON;
2362 cm_ResetACLCache(userp);
2365 cm_ReleaseUser(userp);
2372 * VIOC_GETTOK internals.
2374 * Assumes that pioctl path has been parsed or skipped.
2377 cm_IoctlGetTokenIter(struct cm_ioctl *ioctlp, struct cm_user *userp)
2383 struct ClearToken ct;
2385 tp = ioctlp->inDatap;
2386 cp = ioctlp->outDatap;
2389 memcpy(&iterator, tp, sizeof(iterator));
2390 tp += sizeof(iterator);
2392 lock_ObtainMutex(&userp->mx);
2394 /* look for token */
2395 for (;;iterator++) {
2396 ucellp = cm_FindUCell(userp, iterator);
2398 lock_ReleaseMutex(&userp->mx);
2399 return CM_ERROR_NOMORETOKENS;
2401 if (ucellp->flags & CM_UCELLFLAG_RXKAD)
2406 temp = ucellp->iterator + 1;
2407 memcpy(cp, &temp, sizeof(temp));
2411 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2412 cp += sizeof(ucellp->ticketLen);
2415 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2416 cp += ucellp->ticketLen;
2418 /* clear token size */
2420 memcpy(cp, &temp, sizeof(temp));
2424 ct.AuthHandle = ucellp->kvno;
2427 * This field is supposed to hold the session key
2428 * but we don't want to make it easier for someone
2429 * to attack the cache. The user gave us the session
2430 * key in the first place.
2432 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2433 ct.ViceId = 37; /* XXX */
2434 ct.BeginTimestamp = 0; /* XXX */
2435 ct.EndTimestamp = ucellp->expirationTime;
2436 memcpy(cp, &ct, sizeof(ct));
2439 /* Primary flag (unused) */
2441 memcpy(cp, &temp, sizeof(temp));
2445 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2446 cp += strlen(cp) + 1;
2449 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2450 cp += strlen(cp) + 1;
2452 ioctlp->outDatap = cp;
2454 lock_ReleaseMutex(&userp->mx);
2460 * VIOC_NEWGETTOK internals.
2462 * Assumes that pioctl path has been parsed or skipped.
2465 cm_IoctlGetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2471 struct ClearToken ct;
2475 tp = ioctlp->inDatap;
2477 cp = ioctlp->outDatap;
2479 /* cell name is right here */
2480 cellp = cm_GetCell(tp, 0);
2482 return CM_ERROR_NOSUCHCELL;
2483 tp += strlen(tp) + 1;
2486 memcpy(&uuid, tp, sizeof(uuid));
2488 lock_ObtainMutex(&userp->mx);
2490 ucellp = cm_GetUCell(userp, cellp);
2491 if (!ucellp || !(ucellp->flags & CM_UCELLFLAG_RXKAD)) {
2492 lock_ReleaseMutex(&userp->mx);
2493 return CM_ERROR_NOMORETOKENS;
2497 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2498 cp += sizeof(ucellp->ticketLen);
2501 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2502 cp += ucellp->ticketLen;
2504 /* clear token size */
2506 memcpy(cp, &temp, sizeof(temp));
2510 ct.AuthHandle = ucellp->kvno;
2512 /* do not give out the session key */
2513 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2514 ct.ViceId = 37; /* XXX */
2515 ct.BeginTimestamp = 0; /* XXX */
2516 ct.EndTimestamp = ucellp->expirationTime;
2517 memcpy(cp, &ct, sizeof(ct));
2520 /* Primary flag (unused) */
2522 memcpy(cp, &temp, sizeof(temp));
2526 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2527 cp += strlen(cp) + 1;
2530 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2531 cp += strlen(cp) + 1;
2533 ioctlp->outDatap = cp;
2535 lock_ReleaseMutex(&userp->mx);
2537 cm_RegisterNewTokenEvent(uuid, ucellp->sessionKey.data);
2543 * VIOCDELTOK internals.
2545 * Assumes that pioctl path has been parsed or skipped.
2548 cm_IoctlDelToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2554 cp = ioctlp->outDatap;
2556 /* cell name is right here */
2557 cellp = cm_GetCell(ioctlp->inDatap, 0);
2559 return CM_ERROR_NOSUCHCELL;
2561 lock_ObtainMutex(&userp->mx);
2563 ucellp = cm_GetUCell(userp, cellp);
2565 lock_ReleaseMutex(&userp->mx);
2566 return CM_ERROR_NOMORETOKENS;
2569 osi_Log1(smb_logp,"cm_IoctlDelToken ucellp %lx", ucellp);
2571 if (ucellp->ticketp) {
2572 free(ucellp->ticketp);
2573 ucellp->ticketp = NULL;
2575 ucellp->ticketLen = 0;
2576 memset(ucellp->sessionKey.data, 0, 8);
2578 ucellp->expirationTime = 0;
2579 ucellp->userName[0] = '\0';
2580 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2583 lock_ReleaseMutex(&userp->mx);
2585 cm_ResetACLCache(userp);
2591 * VIOCDELALLTOK internals.
2593 * Assumes that pioctl path has been parsed or skipped.
2596 cm_IoctlDelAllToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2600 lock_ObtainMutex(&userp->mx);
2602 for (ucellp = userp->cellInfop; ucellp; ucellp = ucellp->nextp) {
2603 osi_Log1(smb_logp,"cm_IoctlDelAllToken ucellp %lx", ucellp);
2605 if (ucellp->ticketp) {
2606 free(ucellp->ticketp);
2607 ucellp->ticketp = NULL;
2609 ucellp->ticketLen = 0;
2610 memset(ucellp->sessionKey.data, 0, 8);
2612 ucellp->expirationTime = 0;
2613 ucellp->userName[0] = '\0';
2614 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2618 lock_ReleaseMutex(&userp->mx);
2620 cm_ResetACLCache(userp);
2626 * VIOC_MAKESUBMOUNT internals. (This function should be deprecated)
2628 * Assumes that pioctl path has been parsed or skipped.
2631 cm_IoctlMakeSubmount(cm_ioctl_t *ioctlp, cm_user_t *userp)
2633 char afspath[MAX_PATH];
2635 int nextAutoSubmount;
2637 DWORD dwType, dwSize;
2642 /* Serialize this one, to prevent simultaneous mods
2645 lock_ObtainMutex(&cm_Afsdsbmt_Lock);
2647 /* Parse the input parameters--first the required afs path,
2648 * then the requested submount name (which may be "").
2650 cm_NormalizeAfsPathAscii(afspath, sizeof(afspath), ioctlp->inDatap);
2651 submountreqp = ioctlp->inDatap + (strlen(ioctlp->inDatap)+1);
2653 /* If the caller supplied a suggested submount name, see if
2654 * that submount name is in use... if so, the submount's path
2655 * has to match our path.
2658 RegCreateKeyEx( HKEY_LOCAL_MACHINE,
2659 AFSREG_CLT_OPENAFS_SUBKEY "\\Submounts",
2662 REG_OPTION_NON_VOLATILE,
2663 KEY_READ|KEY_WRITE|KEY_QUERY_VALUE,
2668 if (submountreqp && *submountreqp) {
2669 char submountPath[MAX_PATH];
2671 dwSize = sizeof(submountPath);
2672 status = RegQueryValueEx( hkSubmounts, submountreqp, 0,
2673 &dwType, submountPath, &dwSize);
2675 if (status != ERROR_SUCCESS) {
2677 /* The suggested submount name isn't in use now--
2678 * so we can safely map the requested submount name
2679 * to the supplied path. Remember not to write the
2680 * leading "/afs" when writing out the submount.
2682 RegSetValueEx( hkSubmounts, submountreqp, 0,
2684 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2685 &afspath[strlen(cm_mountRoot)]:"/",
2686 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2687 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2689 RegCloseKey( hkSubmounts );
2690 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2691 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2692 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2696 /* The suggested submount name is already in use--if the
2697 * supplied path matches the submount's path, we can still
2698 * use the suggested submount name.
2700 if (!strcmp (submountPath, afspath)) {
2701 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2702 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2703 RegCloseKey( hkSubmounts );
2704 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2709 RegQueryInfoKey( hkSubmounts,
2711 NULL, /* lpcClass */
2712 NULL, /* lpReserved */
2713 NULL, /* lpcSubKeys */
2714 NULL, /* lpcMaxSubKeyLen */
2715 NULL, /* lpcMaxClassLen */
2716 &dwSubmounts, /* lpcValues */
2717 NULL, /* lpcMaxValueNameLen */
2718 NULL, /* lpcMaxValueLen */
2719 NULL, /* lpcbSecurityDescriptor */
2720 NULL /* lpftLastWriteTime */
2724 /* Having obtained a list of all available submounts, start
2725 * searching that list for a path which matches the requested
2726 * AFS path. We'll also keep track of the highest "auto15"/"auto47"
2727 * submount, in case we need to add a new one later.
2730 nextAutoSubmount = 1;
2732 for ( dwIndex = 0; dwIndex < dwSubmounts; dwIndex ++ ) {
2733 char submountPath[MAX_PATH] = "";
2734 DWORD submountPathLen = sizeof(submountPath);
2735 char submountName[MAX_PATH];
2736 DWORD submountNameLen = sizeof(submountName);
2739 RegEnumValue( hkSubmounts, dwIndex, submountName, &submountNameLen, NULL,
2740 &dwType, submountPath, &submountPathLen);
2741 if (dwType == REG_EXPAND_SZ) {
2743 StringCbCopyA(buf, MAX_PATH, submountPath);
2744 submountPathLen = ExpandEnvironmentStrings(buf, submountPath, MAX_PATH);
2745 if (submountPathLen > MAX_PATH)
2749 /* If this is an Auto### submount, remember its ### value */
2750 if ((!strnicmp (submountName, "auto", 4)) &&
2751 (isdigit (submountName[strlen("auto")]))) {
2752 int thisAutoSubmount;
2753 thisAutoSubmount = atoi (&submountName[strlen("auto")]);
2754 nextAutoSubmount = max (nextAutoSubmount,
2755 thisAutoSubmount+1);
2758 if ((submountPathLen == 0) ||
2759 (submountPathLen == sizeof(submountPath) - 1)) {
2763 /* See if the path for this submount matches the path
2764 * that our caller specified. If so, we can return
2767 if (!strcmp (submountPath, afspath)) {
2768 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountName);
2769 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2770 RegCloseKey(hkSubmounts);
2771 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2777 /* We've been through the entire list of existing submounts, and
2778 * didn't find any which matched the specified path. So, we'll
2779 * just have to add one. Remember not to write the leading "/afs"
2780 * when writing out the submount.
2783 StringCbPrintfA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "auto%ld", nextAutoSubmount);
2785 RegSetValueEx( hkSubmounts,
2789 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2790 &afspath[strlen(cm_mountRoot)]:"/",
2791 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2792 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2794 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2795 RegCloseKey(hkSubmounts);
2796 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2801 * VIOC_GETRXKCRYPT internals.
2803 * Assumes that pioctl path has been parsed or skipped.
2806 cm_IoctlGetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2808 memcpy(ioctlp->outDatap, &cryptall, sizeof(cryptall));
2809 ioctlp->outDatap += sizeof(cryptall);
2815 * VIOC_SETRXKCRYPT internals.
2817 * Assumes that pioctl path has been parsed or skipped.
2820 cm_IoctlSetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2822 afs_int32 c = cryptall;
2824 memcpy(&cryptall, ioctlp->inDatap, sizeof(cryptall));
2826 if (c != cryptall) {
2828 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_ON);
2829 else if (cryptall == 2)
2830 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_AUTH);
2832 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_OFF);
2838 * VIOC_RXSTAT_PROC internals.
2840 * Assumes that pioctl path has been parsed or skipped.
2843 cm_IoctlRxStatProcess(struct cm_ioctl *ioctlp, struct cm_user *userp)
2848 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2849 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2852 if (flags & AFSCALL_RXSTATS_ENABLE) {
2853 rx_enableProcessRPCStats();
2855 if (flags & AFSCALL_RXSTATS_DISABLE) {
2856 rx_disableProcessRPCStats();
2858 if (flags & AFSCALL_RXSTATS_CLEAR) {
2859 rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
2865 * VIOC_RXSTAT_PEER internals.
2867 * Assumes that pioctl path has been parsed or skipped.
2870 cm_IoctlRxStatPeer(struct cm_ioctl *ioctlp, struct cm_user *userp)
2875 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2876 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2879 if (flags & AFSCALL_RXSTATS_ENABLE) {
2880 rx_enablePeerRPCStats();
2882 if (flags & AFSCALL_RXSTATS_DISABLE) {
2883 rx_disablePeerRPCStats();
2885 if (flags & AFSCALL_RXSTATS_CLEAR) {
2886 rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
2892 * VIOC_UNICODECTL internals.
2894 * Assumes that pioctl path has been parsed or skipped.
2897 cm_IoctlUnicodeControl(struct cm_ioctl *ioctlp, struct cm_user * userp)
2899 afs_int32 result = 0;
2903 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
2906 /* Setting the Unicode flag */
2909 newflag = ((cmd & 1) == 1);
2911 InterlockedExchange(&smb_UseUnicode, newflag);
2914 result = smb_UseUnicode;
2919 memcpy(ioctlp->outDatap, &result, sizeof(result));
2920 ioctlp->outDatap += sizeof(result);
2926 * VIOC_UUIDCTL internals.
2928 * Assumes that pioctl path has been parsed or skipped.
2931 cm_IoctlUUIDControl(struct cm_ioctl * ioctlp, struct cm_user *userp)
2936 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
2938 if (cmd) { /* generate a new UUID */
2939 UuidCreate((UUID *) &uuid);
2940 cm_data.Uuid = uuid;
2941 cm_ForceNewConnectionsAllServers();
2944 memcpy(ioctlp->outDatap, &cm_data.Uuid, sizeof(cm_data.Uuid));
2945 ioctlp->outDatap += sizeof(cm_data.Uuid);
2953 * functions to dump contents of various structures.
2954 * In debug build (linked with crt debug library) will dump allocated but not freed memory
2956 extern int cm_DumpSCache(FILE *outputFile, char *cookie, int lock);
2957 extern int cm_DumpBufHashTable(FILE *outputFile, char *cookie, int lock);
2960 * VIOC_TRACEMEMDUMP internals.
2962 * Assumes that pioctl path has been parsed or skipped.
2963 * dscp is held but not locked.
2966 cm_IoctlMemoryDump(struct cm_ioctl *ioctlp, struct cm_user *userp)
2968 afs_int32 inValue = 0;
2970 char logfileName[MAX_PATH+1];
2975 static _CrtMemState memstate;
2978 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_int32));
2980 dwSize = GetEnvironmentVariable("TEMP", logfileName, sizeof(logfileName));
2981 if ( dwSize == 0 || dwSize > sizeof(logfileName) )
2983 GetWindowsDirectory(logfileName, sizeof(logfileName));
2985 strncat(logfileName, "\\afsd_alloc.log", sizeof(logfileName));
2987 hLogFile = CreateFile(logfileName, GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
2993 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_int32));
2994 ioctlp->outDatap += sizeof(afs_int32);
2999 SetFilePointer(hLogFile, 0, NULL, FILE_END);
3001 cookie = inValue ? "b" : "e";
3007 _CrtMemCheckpoint(&memstate);
3011 _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
3012 _CrtSetReportFile(_CRT_WARN, hLogFile);
3013 _CrtMemDumpAllObjectsSince(&memstate);
3017 /* dump all interesting data */
3018 cm_MemDumpDirStats(hLogFile, cookie, 1);
3019 cm_MemDumpBPlusStats(hLogFile, cookie, 1);
3020 cm_DumpCells(hLogFile, cookie, 1);
3021 cm_DumpVolumes(hLogFile, cookie, 1);
3022 cm_DumpSCache(hLogFile, cookie, 1);
3023 cm_DumpBufHashTable(hLogFile, cookie, 1);
3024 smb_DumpVCP(hLogFile, cookie, 1);
3026 CloseHandle(hLogFile);
3028 inValue = 0; /* success */
3029 memcpy(ioctlp->outDatap, &inValue, sizeof(long));
3030 ioctlp->outDatap += sizeof(long);
3035 /* Utility functon. Not currently used. */
3037 cm_CheckServersStatus(cm_serverRef_t *serversp)
3040 cm_serverRef_t *tsrp;
3042 int someBusy = 0, someOffline = 0, allOffline = 1, allBusy = 1, allDown = 1;
3044 if (serversp == NULL) {
3045 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", CM_ERROR_ALLDOWN);
3046 return CM_ERROR_ALLDOWN;
3049 lock_ObtainRead(&cm_serverLock);
3050 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
3051 if (tsrp->status == srv_deleted)
3053 if (tsp = tsrp->server) {
3054 cm_GetServerNoLock(tsp);
3055 lock_ReleaseRead(&cm_serverLock);
3056 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
3058 if (tsrp->status == srv_busy) {
3061 } else if (tsrp->status == srv_offline) {
3071 lock_ObtainRead(&cm_serverLock);
3072 cm_PutServerNoLock(tsp);
3075 lock_ReleaseRead(&cm_serverLock);
3078 code = CM_ERROR_ALLDOWN;
3080 code = CM_ERROR_ALLBUSY;
3081 else if (allOffline || (someBusy && someOffline))
3082 code = CM_ERROR_ALLOFFLINE;
3085 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", code);
3090 * VIOC_PATH_AVAILABILITY internals.
3092 * Assumes that pioctl path has been parsed or skipped.
3093 * scp is held but not locked.
3096 cm_IoctlPathAvailability(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3101 cm_vol_state_t *statep;
3104 #ifdef AFS_FREELANCE_CLIENT
3105 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
3110 volume = scp->fid.volume;
3112 cellp = cm_FindCellByID(scp->fid.cell, 0);
3115 return CM_ERROR_NOSUCHCELL;
3117 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
3121 statep = cm_VolumeStateByID(tvp, volume);
3122 switch (statep->state) {
3128 code = CM_ERROR_ALLBUSY;
3131 code = CM_ERROR_ALLOFFLINE;
3134 code = CM_ERROR_ALLDOWN;
3143 * VIOC_VOLSTAT_TEST internals.
3145 * Assumes that pioctl path has been parsed or skipped.
3148 cm_IoctlVolStatTest(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
3151 cm_cell_t *cellp = NULL;
3153 cm_vol_state_t *statep;
3154 struct VolStatTest * testp;
3157 testp = (struct VolStatTest *)ioctlp->inDatap;
3159 #ifdef AFS_FREELANCE_CLIENT
3160 if (testp->fid.cell == -1)
3161 return CM_ERROR_NOACCESS;
3164 if (testp->flags & VOLSTAT_TEST_CHECK_VOLUME) {
3165 cm_CheckOfflineVolumes();
3169 if (testp->flags & VOLSTAT_TEST_NETWORK_UP) {
3170 cm_VolStatus_Network_Started(cm_NetbiosName
3178 if (testp->flags & VOLSTAT_TEST_NETWORK_DOWN) {
3179 cm_VolStatus_Network_Stopped(cm_NetbiosName
3187 if (testp->cellname[0]) {
3188 n = atoi(testp->cellname);
3190 testp->fid.cell = n;
3192 cellp = cm_GetCell(testp->cellname, 0);
3195 if (testp->fid.cell > 0) {
3196 cellp = cm_FindCellByID(testp->fid.cell, 0);
3200 return CM_ERROR_NOSUCHCELL;
3202 if (testp->volname[0]) {
3203 n = atoi(testp->volname);
3205 testp->fid.volume = n;
3207 code = cm_FindVolumeByName(cellp, testp->volname, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3210 if (testp->fid.volume > 0)
3211 code = cm_FindVolumeByID(cellp, testp->fid.volume, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3216 if (testp->fid.volume)
3217 statep = cm_VolumeStateByID(volp, testp->fid.volume);
3219 statep = cm_VolumeStateByName(volp, testp->volname);
3222 statep->state = testp->state;
3223 code = cm_VolStatus_Change_Notification(cellp->cellID, statep->ID, testp->state);