2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afsconfig.h>
11 #include <afs/param.h>
15 #include <afs/cellconfig.h>
16 #include <afs/afs_consts.h>
17 #include <afs/ptserver.h>
31 #include "afsd_init.h"
32 #include <WINNT\afsreg.h>
50 /* Copied from afs_tokens.h */
51 #define PIOCTL_LOGON 0x1
54 const char utf8_prefix[] = UTF8_PREFIX;
55 const int utf8_prefix_size = sizeof(utf8_prefix) - sizeof(char);
57 osi_mutex_t cm_Afsdsbmt_Lock;
59 extern afs_int32 cryptall;
60 extern char cm_NetbiosName[];
61 extern clientchar_t cm_NetbiosNameC[];
63 extern void afsi_log(char *pattern, ...);
65 void cm_InitIoctl(void)
67 lock_InitializeMutex(&cm_Afsdsbmt_Lock, "AFSDSBMT.INI Access Lock",
68 LOCK_HIERARCHY_AFSDBSBMT_GLOBAL);
72 * Utility function. (Not currently in use.)
73 * This function forces all dirty buffers to the file server and
74 * then discards the status info.
77 cm_CleanFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
81 code = cm_FSync(scp, userp, reqp, FALSE);
83 lock_ObtainWrite(&scp->rw);
84 cm_DiscardSCache(scp);
85 lock_ReleaseWrite(&scp->rw);
87 osi_Log2(afsd_logp,"cm_CleanFile scp 0x%x returns error: [%x]",scp, code);
92 * Utility function. Used within this file.
93 * scp must be held but not locked.
96 cm_FlushFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
100 #ifdef AFS_FREELANCE_CLIENT
101 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
102 cm_noteLocalMountPointChange(FALSE);
107 code = buf_FlushCleanPages(scp, userp, reqp);
109 if (scp->fileType == CM_SCACHETYPE_DIRECTORY)
110 lock_ObtainWrite(&scp->dirlock);
111 lock_ObtainWrite(&scp->rw);
112 cm_DiscardSCache(scp);
113 if (scp->fileType == CM_SCACHETYPE_DIRECTORY) {
114 cm_ResetSCacheDirectory(scp, 1);
115 lock_ReleaseWrite(&scp->dirlock);
117 lock_ReleaseWrite(&scp->rw);
119 osi_Log2(afsd_logp,"cm_FlushFile scp 0x%x returns error: [%x]",scp, code);
124 * Utility function. (Not currently in use)
125 * IoctlPath must be parsed or skipped prior to calling.
126 * scp must be held but not locked.
129 cm_FlushParent(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
134 pscp = cm_FindSCacheParent(scp);
136 /* now flush the file */
137 code = cm_FlushFile(pscp, userp, reqp);
138 cm_ReleaseSCache(pscp);
144 * Utility function. Used within this function.
147 cm_FlushVolume(cm_user_t *userp, cm_req_t *reqp, afs_uint32 cell, afs_uint32 volume)
153 #ifdef AFS_FREELANCE_CLIENT
154 if ( cell == AFS_FAKE_ROOT_CELL_ID && volume == AFS_FAKE_ROOT_VOL_ID ) {
155 cm_noteLocalMountPointChange(FALSE);
160 lock_ObtainWrite(&cm_scacheLock);
161 for (i=0; i<cm_data.scacheHashTableSize; i++) {
162 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
163 if (scp->fid.volume == volume && scp->fid.cell == cell) {
164 cm_HoldSCacheNoLock(scp);
165 lock_ReleaseWrite(&cm_scacheLock);
167 /* now flush the file */
168 code = cm_FlushFile(scp, userp, reqp);
169 lock_ObtainWrite(&cm_scacheLock);
170 cm_ReleaseSCacheNoLock(scp);
174 lock_ReleaseWrite(&cm_scacheLock);
180 * TranslateExtendedChars - This is a fix for TR 54482.
182 * If an extended character (80 - FF) is entered into a file
183 * or directory name in Windows, the character is translated
184 * into the OEM character map before being passed to us.
185 * The pioctl functions must match
186 * this translation for paths given via our own commands (like
187 * fs). If we do not do this, then we will try to perform an
188 * operation on a non-translated path, which we will fail to
189 * find, since the path was created with the translated chars.
190 * This function performs the required translation.
192 * OEM character code pages are used by the non-Unicode SMB
193 * mode. Do not use if the CM_IOCTLFLAG_USEUTF8 is set.
196 TranslateExtendedChars(char *str)
201 CharToOemA(str, str);
204 void cm_SkipIoctlPath(cm_ioctl_t *ioctlp)
208 temp = strlen(ioctlp->inDatap) + 1;
209 ioctlp->inDatap += temp;
213 clientchar_t * cm_ParseIoctlStringAlloc(cm_ioctl_t *ioctlp, const char * ext_instrp)
215 clientchar_t * rs = NULL;
218 instrp = (ext_instrp)?ext_instrp:ioctlp->inDatap;
220 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
221 rs = cm_Utf8ToClientStringAlloc(instrp, -1, NULL);
225 /* Not a UTF-8 string */
226 if (smb_StoreAnsiFilenames) {
227 cch = cm_AnsiToClientString(instrp, -1, NULL, 0);
231 rs = malloc(cch * sizeof(clientchar_t));
232 cm_AnsiToClientString(instrp, -1, rs, cch);
234 cch = cm_OemToClientString(instrp, -1, NULL, 0);
238 rs = malloc(cch * sizeof(clientchar_t));
239 cm_OemToClientString(instrp, -1, rs, cch);
243 if (ext_instrp == NULL) {
244 ioctlp->inDatap += strlen(ioctlp->inDatap) + 1;
249 int cm_UnparseIoctlString(cm_ioctl_t *ioctlp,
251 const clientchar_t * cstr, int cchlen)
256 outp = ((ext_outp == NULL)? ioctlp->outDatap : ext_outp);
258 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
259 cchout = cm_ClientStringToUtf8(cstr, cchlen, outp,
260 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)));
262 if (smb_StoreAnsiFilenames) {
263 cchout = WideCharToMultiByte(CP_ACP, 0, cstr, cchlen,
265 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)),
268 cchout = WideCharToMultiByte(CP_OEMCP, 0, cstr, cchlen,
270 (int)(SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp)),
275 if (cchout > 0 && ext_outp == NULL) {
276 ioctlp->outDatap += cchout;
283 * Must be called before XXX_ParseIoctlPath or cm_SkipIoctlPath
285 cm_ioctlQueryOptions_t *
286 cm_IoctlGetQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
288 afs_uint32 pathlen = (afs_uint32) strlen(ioctlp->inDatap) + 1;
289 char *p = ioctlp->inDatap + pathlen;
290 cm_ioctlQueryOptions_t * optionsp = NULL;
292 if (ioctlp->inCopied > p - ioctlp->inAllocp) {
293 optionsp = (cm_ioctlQueryOptions_t *)p;
294 if (optionsp->size < 12 /* minimum size of struct */)
302 * Must be called after smb_ParseIoctlPath or cm_SkipIoctlPath
303 * or any other time that ioctlp->inDatap points at the
304 * cm_ioctlQueryOptions_t object.
307 cm_IoctlSkipQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
309 cm_ioctlQueryOptions_t * optionsp = (cm_ioctlQueryOptions_t *)ioctlp->inDatap;
310 ioctlp->inDatap += optionsp->size;
311 ioctlp->inCopied -= optionsp->size;
314 /* format the specified path to look like "/afs/<cellname>/usr", by
315 * adding "/afs" (if necessary) in front, changing any \'s to /'s, and
316 * removing any trailing "/"'s. One weirdo caveat: "/afs" will be
317 * intentionally returned as "/afs/"--this makes submount manipulation
318 * easier (because we can always jump past the initial "/afs" to find
319 * the AFS path that should be written into afsdsbmt.ini).
322 cm_NormalizeAfsPath(clientchar_t *outpathp, long cchlen, clientchar_t *inpathp)
325 clientchar_t bslash_mountRoot[256];
327 cm_ClientStrCpy(bslash_mountRoot, lengthof(bslash_mountRoot), cm_mountRootC);
328 bslash_mountRoot[0] = '\\';
330 if (!cm_ClientStrCmpNI(inpathp, cm_mountRootC, cm_mountRootCLen))
331 cm_ClientStrCpy(outpathp, cchlen, inpathp);
332 else if (!cm_ClientStrCmpNI(inpathp, bslash_mountRoot,
333 (int)cm_ClientStrLen(bslash_mountRoot)))
334 cm_ClientStrCpy(outpathp, cchlen, inpathp);
335 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
336 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s%s"), cm_mountRootC, inpathp);
337 else // inpathp looks like "<cell>/usr"
338 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s/%s"), cm_mountRootC, inpathp);
340 for (cp = outpathp; *cp != 0; ++cp) {
345 if (cm_ClientStrLen(outpathp) && (outpathp[cm_ClientStrLen(outpathp)-1] == '/')) {
346 outpathp[cm_ClientStrLen(outpathp)-1] = 0;
349 if (!cm_ClientStrCmpI(outpathp, cm_mountRootC)) {
350 cm_ClientStrCpy(outpathp, cchlen, cm_mountRootC);
354 void cm_NormalizeAfsPathAscii(char *outpathp, long outlen, char *inpathp)
357 char bslash_mountRoot[256];
359 strncpy(bslash_mountRoot, cm_mountRoot, sizeof(bslash_mountRoot) - 1);
360 bslash_mountRoot[0] = '\\';
362 if (!strnicmp (inpathp, cm_mountRoot, strlen(cm_mountRoot)))
363 StringCbCopy(outpathp, outlen, inpathp);
364 else if (!strnicmp (inpathp, bslash_mountRoot, strlen(bslash_mountRoot)))
365 StringCbCopy(outpathp, outlen, inpathp);
366 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
367 StringCbPrintfA(outpathp, outlen, "%s%s", cm_mountRoot, inpathp);
368 else // inpathp looks like "<cell>/usr"
369 StringCbPrintfA(outpathp, outlen, "%s/%s", cm_mountRoot, inpathp);
371 for (cp = outpathp; *cp != 0; ++cp) {
376 if (strlen(outpathp) && (outpathp[strlen(outpathp)-1] == '/')) {
377 outpathp[strlen(outpathp)-1] = 0;
380 if (!_stricmp (outpathp, cm_mountRoot)) {
381 StringCbCopy(outpathp, outlen, cm_mountRoot);
387 * VIOCGETAL internals.
389 * Assumes that pioctl path has been parsed or skipped.
390 * scp is held but not locked.
393 cm_IoctlGetACL(cm_ioctl_t *ioctlp, cm_user_t *userp, cm_scache_t *scp, cm_req_t *reqp)
398 AFSFetchStatus fileStatus;
402 struct rx_connection * rxconnp;
404 memset(&volSync, 0, sizeof(volSync));
406 /* now make the get acl call */
407 #ifdef AFS_FREELANCE_CLIENT
408 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
410 ioctlp->outDatap[0] ='\0';
414 afid.Volume = scp->fid.volume;
415 afid.Vnode = scp->fid.vnode;
416 afid.Unique = scp->fid.unique;
418 acl.AFSOpaque_val = ioctlp->outDatap;
419 acl.AFSOpaque_len = 0;
420 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
424 rxconnp = cm_GetRxConn(connp);
425 code = RXAFS_FetchACL(rxconnp, &afid, &acl, &fileStatus, &volSync);
426 rx_PutConnection(rxconnp);
428 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
429 code = cm_MapRPCError(code, reqp);
434 /* skip over return data */
435 tlen = (int)strlen(ioctlp->outDatap) + 1;
436 ioctlp->outDatap += tlen;
438 /* and return success */
444 * VIOC_FILE_CELL_NAME internals.
446 * Assumes that pioctl path has been parsed or skipped.
447 * scp is held but not locked.
450 cm_IoctlGetFileCellName(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
455 #ifdef AFS_FREELANCE_CLIENT
456 if ( cm_freelanceEnabled &&
457 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
458 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID &&
459 scp->fid.vnode==0x1 && scp->fid.unique==0x1 ) {
460 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
461 ioctlp->outDatap += strlen(ioctlp->outDatap) + 1;
464 #endif /* AFS_FREELANCE_CLIENT */
466 cellp = cm_FindCellByID(scp->fid.cell, CM_FLAG_NOPROBE);
468 clientchar_t * cellname;
470 cellname = cm_FsStringToClientStringAlloc(cellp->name, -1, NULL);
471 if (cellname == NULL) {
472 code = CM_ERROR_NOSUCHCELL;
474 cm_UnparseIoctlString(ioctlp, NULL, cellname, -1);
479 code = CM_ERROR_NOSUCHCELL;
487 * VIOCSETAL internals.
489 * Assumes that pioctl path has been parsed or skipped.
490 * scp is held but not locked.
493 cm_IoctlSetACL(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
498 AFSFetchStatus fileStatus;
501 struct rx_connection * rxconnp;
503 memset(&volSync, 0, sizeof(volSync));
505 #ifdef AFS_FREELANCE_CLIENT
506 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
507 code = CM_ERROR_NOACCESS;
511 /* now make the get acl call */
512 fid.Volume = scp->fid.volume;
513 fid.Vnode = scp->fid.vnode;
514 fid.Unique = scp->fid.unique;
516 acl.AFSOpaque_val = ioctlp->inDatap;
517 acl.AFSOpaque_len = (u_int)strlen(ioctlp->inDatap)+1;
518 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
522 rxconnp = cm_GetRxConn(connp);
523 code = RXAFS_StoreACL(rxconnp, &fid, &acl, &fileStatus, &volSync);
524 rx_PutConnection(rxconnp);
526 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
527 code = cm_MapRPCError(code, reqp);
529 /* invalidate cache info, since we just trashed the ACL cache */
530 lock_ObtainWrite(&scp->rw);
531 cm_DiscardSCache(scp);
532 lock_ReleaseWrite(&scp->rw);
539 * VIOC_FLUSHALL internals.
541 * Assumes that pioctl path has been parsed or skipped.
544 cm_IoctlFlushAllVolumes(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
550 lock_ObtainWrite(&cm_scacheLock);
551 for (i=0; i<cm_data.scacheHashTableSize; i++) {
552 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
553 cm_HoldSCacheNoLock(scp);
554 lock_ReleaseWrite(&cm_scacheLock);
556 /* now flush the file */
557 code = cm_FlushFile(scp, userp, reqp);
558 lock_ObtainWrite(&cm_scacheLock);
559 cm_ReleaseSCacheNoLock(scp);
562 lock_ReleaseWrite(&cm_scacheLock);
568 * VIOC_FLUSHVOLUME internals.
570 * Assumes that pioctl path has been parsed or skipped.
571 * scp is held but not locked.
574 cm_IoctlFlushVolume(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
580 #ifdef AFS_FREELANCE_CLIENT
581 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
582 code = CM_ERROR_NOACCESS;
586 volume = scp->fid.volume;
587 cell = scp->fid.cell;
588 code = cm_FlushVolume(userp, reqp, cell, volume);
594 * VIOCFLUSH internals.
596 * Assumes that pioctl path has been parsed or skipped.
597 * scp is held but not locked.
600 cm_IoctlFlushFile(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
604 #ifdef AFS_FREELANCE_CLIENT
605 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
606 code = CM_ERROR_NOACCESS;
610 cm_FlushFile(scp, userp, reqp);
617 * VIOCSETVOLSTAT internals.
619 * Assumes that pioctl path has been parsed or skipped.
620 * scp is held but not locked.
623 cm_IoctlSetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
627 char offLineMsg[256];
630 AFSFetchVolumeStatus volStat;
631 AFSStoreVolumeStatus storeStat;
636 struct rx_connection * rxconnp;
638 #ifdef AFS_FREELANCE_CLIENT
639 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
640 code = CM_ERROR_NOACCESS;
644 cellp = cm_FindCellByID(scp->fid.cell, 0);
645 osi_assertx(cellp, "null cm_cell_t");
647 if (scp->flags & CM_SCACHEFLAG_RO)
648 return CM_ERROR_READONLY;
650 code = cm_FindVolumeByID(cellp, scp->fid.volume, userp, reqp,
651 CM_GETVOL_FLAG_CREATE, &tvp);
657 /* Copy the junk out, using cp as a roving pointer. */
658 memcpy((char *)&volStat, ioctlp->inDatap, sizeof(AFSFetchVolumeStatus));
659 ioctlp->inDatap += sizeof(AFSFetchVolumeStatus);
661 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
662 cm_ClientStringToFsString(strp, -1, volName, lengthof(volName));
665 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
666 cm_ClientStringToFsString(strp, -1, offLineMsg, lengthof(offLineMsg));
669 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
670 cm_ClientStringToFsString(strp, -1, motd, lengthof(motd));
676 if (volStat.MinQuota != -1) {
677 storeStat.MinQuota = volStat.MinQuota;
678 storeStat.Mask |= AFS_SETMINQUOTA;
680 if (volStat.MaxQuota != -1) {
681 storeStat.MaxQuota = volStat.MaxQuota;
682 storeStat.Mask |= AFS_SETMAXQUOTA;
686 code = cm_ConnFromFID(&scp->fid, userp, reqp, &tcp);
690 rxconnp = cm_GetRxConn(tcp);
691 code = RXAFS_SetVolumeStatus(rxconnp, scp->fid.volume,
692 &storeStat, volName, offLineMsg, motd);
693 rx_PutConnection(rxconnp);
695 } while (cm_Analyze(tcp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
696 code = cm_MapRPCError(code, reqp);
699 /* return on failure */
703 /* we are sending parms back to make compat. with prev system. should
704 * change interface later to not ask for current status, just set
707 cp = ioctlp->outDatap;
708 memcpy(cp, (char *)&volStat, sizeof(VolumeStatus));
709 cp += sizeof(VolumeStatus);
710 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
711 cp += strlen(volName)+1;
712 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
713 cp += strlen(offLineMsg)+1;
714 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
715 cp += strlen(motd)+1;
717 /* now return updated return data pointer */
718 ioctlp->outDatap = cp;
725 * VIOCGETVOLSTAT internals.
727 * Assumes that pioctl path has been parsed or skipped.
728 * scp is held but not locked.
731 cm_IoctlGetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
734 char volName[32]="(unknown)";
735 char offLineMsg[256]="server temporarily inaccessible";
736 char motd[256]="server temporarily inaccessible";
738 AFSFetchVolumeStatus volStat;
743 struct rx_connection * rxconnp;
745 #ifdef AFS_FREELANCE_CLIENT
746 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
748 strncpy(volName, "Freelance.Local.Root", sizeof(volName));
749 offLineMsg[0] = '\0';
750 strncpy(motd, "Freelance mode in use.", sizeof(motd));
751 volStat.Vid = scp->fid.volume;
752 volStat.MaxQuota = 0;
753 volStat.BlocksInUse = 100;
754 volStat.PartBlocksAvail = 0;
755 volStat.PartMaxBlocks = 100;
760 OfflineMsg = offLineMsg;
763 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
766 rxconnp = cm_GetRxConn(connp);
767 code = RXAFS_GetVolumeStatus(rxconnp, scp->fid.volume,
768 &volStat, &Name, &OfflineMsg, &MOTD);
769 rx_PutConnection(rxconnp);
771 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
772 code = cm_MapRPCError(code, reqp);
778 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
779 cp = ioctlp->outDatap;
780 memcpy(cp, (char *)&volStat, sizeof(AFSFetchVolumeStatus));
781 cp += sizeof(AFSFetchVolumeStatus);
782 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
783 cp += strlen(volName)+1;
784 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
785 cp += strlen(offLineMsg)+1;
786 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
787 cp += strlen(motd)+1;
789 /* return new size */
790 ioctlp->outDatap = cp;
796 * VIOCGETFID internals.
798 * Assumes that pioctl path has been parsed or skipped.
799 * scp is held but not locked.
802 cm_IoctlGetFid(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
807 memset(&fid, 0, sizeof(cm_fid_t));
808 fid.cell = scp->fid.cell;
809 fid.volume = scp->fid.volume;
810 fid.vnode = scp->fid.vnode;
811 fid.unique = scp->fid.unique;
813 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
814 cp = ioctlp->outDatap;
815 memcpy(cp, (char *)&fid, sizeof(cm_fid_t));
816 cp += sizeof(cm_fid_t);
818 /* return new size */
819 ioctlp->outDatap = cp;
825 * VIOC_GETFILETYPE internals.
827 * Assumes that pioctl path has been parsed or skipped.
828 * scp is held but not locked.
831 cm_IoctlGetFileType(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
835 afs_uint32 fileType = 0;
837 if (scp->fileType == 0) {
838 lock_ObtainWrite(&scp->rw);
839 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
840 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
842 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
843 lock_ReleaseWrite(&scp->rw);
847 fileType = scp->fileType;
849 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
850 cp = ioctlp->outDatap;
851 memcpy(cp, (char *)&fileType, sizeof(fileType));
852 cp += sizeof(fileType);
854 /* return new size */
855 ioctlp->outDatap = cp;
861 * VIOCGETOWNER internals.
863 * Assumes that pioctl path has been parsed or skipped.
864 * scp is held but not locked.
867 cm_IoctlGetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
872 lock_ObtainWrite(&scp->rw);
873 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
874 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
876 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
877 lock_ReleaseWrite(&scp->rw);
880 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
881 cp = ioctlp->outDatap;
882 memcpy(cp, (char *)&scp->owner, sizeof(afs_uint32));
883 cp += sizeof(afs_uint32);
884 memcpy(cp, (char *)&scp->group, sizeof(afs_uint32));
885 cp += sizeof(afs_uint32);
887 /* return new size */
888 ioctlp->outDatap = cp;
895 * VIOC_SETOWNER internals.
897 * Assumes that pioctl path has been parsed or skipped
898 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
900 * scp is held but not locked.
904 cm_IoctlSetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
909 lock_ObtainWrite(&scp->rw);
910 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
911 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
913 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
914 lock_ReleaseWrite(&scp->rw);
920 memset(&attr, 0, sizeof(attr));
922 cp = ioctlp->inDatap;
923 memcpy((char *)&owner, cp, sizeof(afs_uint32));
925 attr.mask = CM_ATTRMASK_OWNER;
928 code = cm_SetAttr(scp, &attr, userp, reqp);
935 * VIOC_SETGROUP internals.
937 * Assumes that pioctl path has been parsed or skipped
938 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
942 cm_IoctlSetGroup(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
947 lock_ObtainWrite(&scp->rw);
948 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
949 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
951 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
952 lock_ReleaseWrite(&scp->rw);
958 memset(&attr, 0, sizeof(attr));
960 cp = ioctlp->inDatap;
961 memcpy((char *)&group, cp, sizeof(afs_uint32));
963 attr.mask = CM_ATTRMASK_GROUP;
966 code = cm_SetAttr(scp, &attr, userp, reqp);
973 * VIOCWHEREIS internals.
975 * Assumes that pioctl path has been parsed or skipped.
976 * scp is held but not locked.
979 cm_IoctlWhereIs(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
984 cm_serverRef_t **tsrpp, *current;
989 volume = scp->fid.volume;
991 cellp = cm_FindCellByID(scp->fid.cell, 0);
994 return CM_ERROR_NOSUCHCELL;
996 #ifdef AFS_FREELANCE_CLIENT
997 if ( cellp->cellID == AFS_FAKE_ROOT_CELL_ID) {
1005 cp = ioctlp->outDatap;
1007 memcpy(cp, (char *)&addr, sizeof(addr));
1010 /* still room for terminating NULL, add it on */
1012 memcpy(cp, (char *)&addr, sizeof(addr));
1015 ioctlp->outDatap = cp;
1019 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
1023 cp = ioctlp->outDatap;
1025 tsrpp = cm_GetVolServers(tvp, volume, userp, reqp);
1026 if (tsrpp == NULL) {
1027 code = CM_ERROR_NOSUCHVOLUME;
1029 lock_ObtainRead(&cm_serverLock);
1030 for (current = *tsrpp; current; current = current->next) {
1031 tsp = current->server;
1032 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1035 lock_ReleaseRead(&cm_serverLock);
1036 cm_FreeServerList(tsrpp, 0);
1038 /* still room for terminating NULL, add it on */
1039 volume = 0; /* reuse vbl */
1040 memcpy(cp, (char *)&volume, sizeof(long));
1043 ioctlp->outDatap = cp;
1050 * VIOC_AFS_STAT_MT_PT internals.
1052 * Assumes that pioctl path has been parsed or skipped.
1053 * scp is held but not locked.
1056 cm_IoctlStatMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1062 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1064 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1068 lock_ObtainWrite(&scp->rw);
1069 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1070 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1072 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1076 /* now check that this is a real mount point */
1077 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1078 code = CM_ERROR_INVAL;
1082 code = cm_ReadMountPoint(scp, userp, reqp);
1085 strp = ioctlp->outDatap;
1086 StringCbCopyA(strp, SMB_IOCTL_MAXDATA - (strp - ioctlp->outAllocp), scp->mountPointStringp);
1087 strp += strlen(strp) + 1;
1088 ioctlp->outDatap = strp;
1092 lock_ReleaseWrite(&scp->rw);
1093 cm_ReleaseSCache(scp);
1103 * VIOC_AFS_DELETE_MT_PT internals.
1105 * Assumes that pioctl path has been parsed or skipped.
1106 * scp is held but not locked.
1109 cm_IoctlDeleteMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1113 clientchar_t *cp = NULL;
1114 fschar_t *originalName = NULL;
1117 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1119 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1121 /* if something went wrong, bail out now */
1125 lock_ObtainWrite(&scp->rw);
1126 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1127 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1131 /* now check that this is a real mount point */
1132 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1133 code = CM_ERROR_INVAL;
1137 /* time to make the RPC, so drop the lock */
1138 lock_ReleaseWrite(&scp->rw);
1141 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
1142 CM_DIROP_FLAG_NONE, &dirop);
1144 code = cm_BPlusDirLookupOriginalName(&dirop, cp, &originalName);
1145 /* The cm_Dir* functions can't be used to lookup the
1146 originalName. Those functions only know of the original
1148 cm_EndDirOp(&dirop);
1152 /* If this name doesn't have a non-normalized name associated with
1153 it, we assume that what we had is what is actually present on
1156 if (originalName == NULL) {
1157 originalName = cm_ClientStringToFsStringAlloc(cp, -1, NULL);
1160 /* cp is a normalized name. originalName is the actual name we
1161 saw on the fileserver. */
1162 #ifdef AFS_FREELANCE_CLIENT
1163 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1164 /* we are removing the mount point to the root dir., so call
1165 * the freelance code to do the deletion. */
1166 osi_Log0(afsd_logp,"IoctlDeleteMountPoint from Freelance root dir");
1167 code = cm_FreelanceRemoveMount(originalName);
1171 /* easier to do it this way */
1172 code = cm_Unlink(dscp, originalName, cp, userp, reqp);
1174 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1175 smb_NotifyChange(FILE_ACTION_REMOVED,
1176 FILE_NOTIFY_CHANGE_DIR_NAME,
1177 dscp, cp, NULL, TRUE);
1179 lock_ObtainWrite(&scp->rw);
1181 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1184 cm_DiscardSCache(scp);
1185 lock_ReleaseWrite(&scp->rw);
1186 cm_ReleaseSCache(scp);
1189 if (originalName != NULL)
1199 * VIOCCKSERV internals.
1201 * Assumes that pioctl path has been parsed or skipped.
1204 cm_IoctlCheckServers(struct cm_ioctl *ioctlp, struct cm_user *userp)
1211 cm_server_t *tsp, *csp;
1214 tp = ioctlp->inDatap;
1217 memcpy(&temp, tp, sizeof(temp));
1218 if (temp == 0x12345678) { /* For afs3.3 version */
1219 memcpy(&csi, tp, sizeof(csi));
1220 if (csi.tinterval >= 0) {
1221 cp = ioctlp->outDatap;
1222 memcpy(cp, (char *)&cm_daemonCheckDownInterval, sizeof(long));
1223 ioctlp->outDatap += sizeof(long);
1224 if (csi.tinterval > 0) {
1225 if (!smb_SUser(userp))
1226 return CM_ERROR_NOACCESS;
1227 cm_daemonCheckDownInterval = csi.tinterval;
1235 } else { /* For pre afs3.3 versions */
1236 memcpy((char *)&temp, ioctlp->inDatap, sizeof(long));
1237 ioctlp->inDatap = cp = ioctlp->inDatap + sizeof(long);
1238 if (cp - ioctlp->inAllocp < ioctlp->inCopied) /* still more data available */
1243 * 1: fast check, don't contact servers.
1244 * 2: local cell only.
1247 /* have cell name, too */
1248 cellp = cm_GetCell(cp, (temp & 1) ? CM_FLAG_NOPROBE : 0);
1250 return CM_ERROR_NOSUCHCELL;
1253 cellp = (cm_cell_t *) 0;
1254 if (!cellp && (temp & 2)) {
1255 /* use local cell */
1256 fschar_t wscell[CELL_MAXNAMELEN+1];
1257 cm_GetRootCellName(wscell);
1258 cellp = cm_GetCell(wscell, 0);
1260 if (!(temp & 1)) { /* if not fast, call server checker routine */
1261 /* check down servers */
1262 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS | CM_FLAG_CHECKUPSERVERS, cellp);
1265 /* now return the current down server list */
1266 cp = ioctlp->outDatap;
1267 lock_ObtainRead(&cm_serverLock);
1268 for (tsp = cm_allServersp; tsp; tsp=tsp->allNextp) {
1269 if (cellp && tsp->cellp != cellp)
1270 continue; /* cell spec'd and wrong */
1271 if (tsp->flags & CM_SERVERFLAG_DOWN) {
1273 * for a multi-homed file server, if one of the interfaces
1274 * is up, do not report the server as down.
1276 if (tsp->type == CM_SERVER_FILE) {
1277 for (csp = cm_allServersp; csp; csp=csp->allNextp) {
1278 if (csp->type == CM_SERVER_FILE &&
1279 !(csp->flags & CM_SERVERFLAG_DOWN) &&
1280 afs_uuid_equal(&tsp->uuid, &csp->uuid)) {
1284 if (csp) /* found alternate up interface */
1289 * all server types are being reported by ipaddr. only report
1290 * a server once regardless of how many services are down.
1292 for (tp = ioctlp->outDatap; tp < cp; tp += sizeof(long)) {
1293 if (!memcmp(tp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long)))
1298 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1303 lock_ReleaseRead(&cm_serverLock);
1305 ioctlp->outDatap = cp;
1310 * VIOCCKBACK internals.
1312 * Assumes that pioctl path has been parsed or skipped.
1315 cm_IoctlCheckVolumes(cm_ioctl_t *ioctlp, cm_user_t *userp)
1317 cm_RefreshVolumes(0);
1322 * VIOCSETCACHESIZE internals.
1324 * Assumes that pioctl path has been parsed or skipped.
1326 * This function is no longer meaningful in the current day world
1327 * of persistent caches. The buf_SetNBuffers() function will
1331 cm_IoctlSetCacheSize(struct cm_ioctl *ioctlp, struct cm_user *userp)
1336 memcpy(&temp, ioctlp->inDatap, sizeof(temp));
1338 temp = cm_data.buf_nOrigBuffers;
1340 /* temp is in 1K units, convert to # of buffers */
1341 temp = temp / (cm_data.buf_blockSize / 1024);
1344 /* now adjust the cache size */
1345 code = buf_SetNBuffers(temp);
1351 * VIOC_TRACECTL internals.
1353 * Assumes that pioctl path has been parsed or skipped.
1356 cm_IoctlTraceControl(cm_ioctl_t *ioctlp, cm_user_t *userp)
1360 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_uint32));
1364 afsd_ForceTrace(FALSE);
1365 buf_ForceTrace(FALSE);
1369 /* set tracing value to low order bit */
1370 if ((inValue & 1) == 0) {
1371 /* disable tracing */
1372 osi_LogDisable(afsd_logp);
1373 rx_DebugOnOff(FALSE);
1376 /* enable tracing */
1377 osi_LogEnable(afsd_logp);
1378 rx_DebugOnOff(TRUE);
1382 /* see if we're supposed to do a reset, too */
1384 osi_LogReset(afsd_logp);
1387 /* and copy out tracing flag */
1388 inValue = afsd_logp->enabled; /* use as a temp vbl */
1389 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_uint32));
1390 ioctlp->outDatap += sizeof(afs_uint32);
1395 * VIOCGETCACHEPARMS internals.
1397 * Assumes that pioctl path has been parsed or skipped.
1400 cm_IoctlGetCacheParms(struct cm_ioctl *ioctlp, struct cm_user *userp)
1402 cm_cacheParms_t parms;
1404 memset(&parms, 0, sizeof(parms));
1406 /* first we get, in 1K units, the cache size */
1407 parms.parms[0] = cm_data.buf_nbuffers * (cm_data.buf_blockSize / 1024);
1409 /* and then the actual # of buffers in use (not in the free list, I guess,
1410 * will be what we do).
1412 parms.parms[1] = (cm_data.buf_nbuffers - buf_CountFreeList()) * (cm_data.buf_blockSize / 1024);
1414 memcpy(ioctlp->outDatap, &parms, sizeof(parms));
1415 ioctlp->outDatap += sizeof(parms);
1421 * VIOCGETCELL internals.
1423 * Assumes that pioctl path has been parsed or skipped.
1426 cm_IoctlGetCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1431 cm_serverRef_t *serverRefp;
1432 cm_server_t *serverp;
1438 tp = ioctlp->inDatap;
1440 memcpy((char *)&whichCell, tp, sizeof(long));
1443 /* see if more than one long passed in, ignoring the null pathname (the -1) */
1444 if (ioctlp->inCopied-1 > sizeof(afs_uint32)) {
1445 memcpy((char *)&magic, tp, sizeof(afs_uint32));
1448 lock_ObtainRead(&cm_cellLock);
1449 for (tcellp = cm_data.allCellsp; tcellp; tcellp = tcellp->allNextp) {
1454 lock_ReleaseRead(&cm_cellLock);
1457 clientchar_t * cellnamep;
1459 cp = ioctlp->outDatap;
1461 if (magic == 0x12345678) {
1462 memcpy(cp, (char *)&magic, sizeof(long));
1465 memset(cp, 0, max * sizeof(long));
1467 lock_ObtainRead(&cm_serverLock); /* for going down server list */
1468 for (i=0, serverRefp = tcellp->vlServersp;
1469 serverRefp && i<max;
1470 i++, serverRefp = serverRefp->next) {
1471 serverp = serverRefp->server;
1472 memcpy(cp, &serverp->addr.sin_addr.s_addr, sizeof(long));
1475 lock_ReleaseRead(&cm_serverLock);
1476 ioctlp->outDatap = basep + max * sizeof(afs_int32);
1478 cellnamep = cm_FsStringToClientStringAlloc(tcellp->name, -1, NULL);
1480 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1490 return CM_ERROR_NOMORETOKENS; /* mapped to EDOM */
1495 * VIOCNEWCELL internals.
1497 * Assumes that pioctl path has been parsed or skipped.
1500 cm_IoctlNewCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1503 * All that needs to be done is to refresh server information for all cells that
1504 * are already loaded.
1506 * cell list will be cm_CellLock and cm_ServerLock will be held for write.
1510 cm_cell_rock_t rock;
1512 lock_ObtainWrite(&cm_cellLock);
1514 for (cp = cm_data.allCellsp; cp; cp=cp->allNextp)
1518 /* delete all previous server lists - cm_FreeServerList will ask for write on cm_ServerLock*/
1519 cm_FreeServerList(&cp->vlServersp, CM_FREESERVERLIST_DELETE);
1520 lock_ReleaseWrite(&cm_cellLock);
1524 code = cm_SearchCellRegistry(1, cp->name, cp->name, cp->linkedName, cm_AddCellProc, &rock);
1525 if (code && code != CM_ERROR_FORCE_DNS_LOOKUP)
1526 code = cm_SearchCellFileEx(cp->name, cp->name, cp->linkedName, cm_AddCellProc, &rock);
1528 if (cm_dnsEnabled) {
1530 code = cm_SearchCellByDNS(cp->name, cp->name, &ttl, cm_AddCellProc, &rock);
1531 if ( code == 0 ) { /* got cell from DNS */
1532 lock_ObtainMutex(&cp->mx);
1533 cp->flags |= CM_CELLFLAG_DNS;
1534 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1535 cp->timeout = time(0) + ttl;
1536 lock_ReleaseMutex(&cp->mx);
1541 lock_ObtainMutex(&cp->mx);
1542 cp->flags &= ~CM_CELLFLAG_DNS;
1543 lock_ReleaseMutex(&cp->mx);
1546 lock_ObtainMutex(&cp->mx);
1547 cp->flags |= CM_CELLFLAG_VLSERVER_INVALID;
1548 lock_ReleaseMutex(&cp->mx);
1549 lock_ObtainWrite(&cm_cellLock);
1552 lock_ObtainMutex(&cp->mx);
1553 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1554 lock_ReleaseMutex(&cp->mx);
1555 lock_ObtainWrite(&cm_cellLock);
1556 cm_RandomizeServer(&cp->vlServersp);
1559 lock_ReleaseWrite(&cm_cellLock);
1564 * VIOCNEWCELL2 internals.
1566 * Assumes that pioctl path has been parsed or skipped.
1568 * The pioctl data buffer consists of the following structure:
1571 * afs_uint32 alternative fs port
1572 * afs_uint32 alternative vl port
1573 * afs_uint32 count of vldb servers
1576 * n * char[] hostnames
1579 cm_IoctlNewCell2(struct cm_ioctl *ioctlp, struct cm_user *userp)
1581 afs_uint32 code = 0;
1582 afs_uint32 flags = 0;
1583 afs_uint32 fsport = 0;
1584 afs_uint32 vlport = 0;
1585 afs_uint32 i, host_count = 0;
1586 char * cellname = NULL;
1587 char * linked_cellname = NULL;
1591 char * hostname[AFS_MAXHOSTS];
1594 memset(hostname, 0, sizeof(hostname));
1596 tp = ioctlp->inDatap;
1597 tplen = ioctlp->inCopied;
1598 lp = (afs_uint32 *)tp;
1600 if (tplen >= 4 * sizeof(afs_uint32)) {
1606 tplen -= 4 * sizeof(afs_uint32);
1609 if ( FAILED(StringCbLength(tp, tplen, &len)) ||
1610 len + 1 > CELL_MAXNAMELEN)
1611 return CM_ERROR_INVAL;
1616 if ( FAILED(StringCbLength(tp, tplen, &len)) ||
1617 len + 1 > CELL_MAXNAMELEN)
1618 return CM_ERROR_INVAL;
1619 linked_cellname = tp;
1623 if (!(flags & VIOC_NEWCELL2_FLAG_USEDNS)) {
1624 for ( i=0; i<host_count; i++) {
1625 if ( FAILED(StringCbLength(tp, tplen, &len)) )
1626 return CM_ERROR_INVAL;
1633 code = cm_CreateCellWithInfo( cellname, linked_cellname,
1636 (flags & VIOC_NEWCELL2_FLAG_USEDNS) ? CM_CELLFLAG_DNS : 0);
1638 if (code == 0 && (flags & VIOC_NEWCELL2_FLAG_USEREG)) {
1639 cm_AddCellToRegistry( cellname, linked_cellname,
1642 (flags & VIOC_NEWCELL2_FLAG_USEDNS) ? CM_CELLFLAG_DNS : 0);
1648 * VIOC_GET_WS_CELL internals.
1650 * Assumes that pioctl path has been parsed or skipped.
1653 cm_IoctlGetWsCell(cm_ioctl_t *ioctlp, cm_user_t *userp)
1657 if (cm_freelanceEnabled) {
1658 if (cm_GetRootCellName(ioctlp->outDatap))
1659 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
1660 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
1661 } else if (cm_data.rootCellp) {
1662 clientchar_t * cellnamep = cm_FsStringToClientStringAlloc(cm_data.rootCellp->name, -1, NULL);
1663 /* return the default cellname to the caller */
1665 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1668 code = CM_ERROR_NOSUCHCELL;
1671 /* if we don't know our default cell, return failure */
1672 code = CM_ERROR_NOSUCHCELL;
1679 * VIOC_AFS_SYSNAME internals.
1681 * Assumes that pioctl path has been parsed or skipped.
1684 cm_IoctlSysName(struct cm_ioctl *ioctlp, struct cm_user *userp)
1686 afs_uint32 setSysName;
1688 clientchar_t *inname = NULL;
1692 memcpy(&setSysName, ioctlp->inDatap, sizeof(afs_uint32));
1693 ioctlp->inDatap += sizeof(afs_uint32);
1697 if ( setSysName < 0 || setSysName > MAXNUMSYSNAMES )
1699 cp2 = ioctlp->inDatap;
1700 for ( cp=ioctlp->inDatap, count = 0; count < setSysName; count++ ) {
1701 /* won't go past end of ioctlp->inDatap since
1702 maxsysname*num < ioctlp->inDatap length */
1703 t = (int)strlen(cp);
1704 if (t >= MAXSYSNAME || t <= 0)
1706 /* check for names that can shoot us in the foot */
1707 if (*cp == '.' && (cp[1] == 0 || (cp[1] == '.' && cp[2] == 0)))
1713 /* inname gets first entry in case we're being a translator */
1714 /* (we are never a translator) */
1715 inname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1718 /* Not xlating, so local case */
1720 osi_panic("cm_IoctlSysName: !cm_sysName\n", __FILE__, __LINE__);
1723 /* Local guy; only root can change sysname */
1724 /* clear @sys entries from the dnlc, once afs_lookup can
1725 * do lookups of @sys entries and thinks it can trust them */
1726 /* privs ok, store the entry, ... */
1728 cm_ClientStrCpy(cm_sysName, lengthof(cm_sysName), inname);
1729 cm_ClientStrCpy(cm_sysNameList[0], MAXSYSNAME, inname);
1731 if (setSysName > 1) { /* ... or list */
1732 for (count = 1; count < setSysName; ++count) {
1733 clientchar_t * newsysname;
1735 if (!cm_sysNameList[count])
1736 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to write\n",
1737 __FILE__, __LINE__);
1739 newsysname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1740 cm_ClientStrCpy(cm_sysNameList[count], MAXSYSNAME, newsysname);
1744 cm_sysNameCount = setSysName;
1748 /* return the sysname to the caller */
1749 i32 = cm_sysNameCount;
1750 memcpy(ioctlp->outDatap, &i32, sizeof(afs_int32));
1751 ioctlp->outDatap += sizeof(afs_int32); /* skip found flag */
1753 if (cm_sysNameCount) {
1754 for ( count=0; count < cm_sysNameCount ; ++count) { /* ... or list */
1755 if ( !cm_sysNameList[count] || *cm_sysNameList[count] == _C('\0'))
1756 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to read\n",
1757 __FILE__, __LINE__);
1758 cm_UnparseIoctlString(ioctlp, NULL, cm_sysNameList[count], -1);
1773 * VIOC_GETCELLSTATUS internals.
1775 * Assumes that pioctl path has been parsed or skipped.
1778 cm_IoctlGetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1782 clientchar_t * cellnamep;
1783 fschar_t * fscellnamep;
1785 cellnamep = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1786 fscellnamep = cm_ClientStringToFsStringAlloc(cellnamep, -1, NULL);
1787 cellp = cm_GetCell(fscellnamep, 0);
1792 return CM_ERROR_NOSUCHCELL;
1795 lock_ObtainMutex(&cellp->mx);
1796 if (cellp->flags & CM_CELLFLAG_SUID)
1797 temp |= CM_SETCELLFLAG_SUID;
1798 lock_ReleaseMutex(&cellp->mx);
1800 /* now copy out parm */
1801 memcpy(ioctlp->outDatap, &temp, sizeof(afs_uint32));
1802 ioctlp->outDatap += sizeof(afs_uint32);
1808 * VIOC_SETCELLSTATUS internals.
1810 * Assumes that pioctl path has been parsed or skipped.
1813 cm_IoctlSetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1818 fschar_t * cellnamep;
1820 temp = cm_ParseIoctlStringAlloc(ioctlp, ioctlp->inDatap + 2*sizeof(afs_uint32));
1821 cellnamep = cm_ClientStringToFsStringAlloc(temp, -1, NULL);
1822 cellp = cm_GetCell(cellnamep, 0);
1827 return CM_ERROR_NOSUCHCELL;
1829 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_uint32));
1831 lock_ObtainMutex(&cellp->mx);
1832 if (flags & CM_SETCELLFLAG_SUID)
1833 cellp->flags |= CM_CELLFLAG_SUID;
1835 cellp->flags &= ~CM_CELLFLAG_SUID;
1836 lock_ReleaseMutex(&cellp->mx);
1842 * VIOC_SETSPREFS internals.
1844 * Assumes that pioctl path has been parsed or skipped.
1847 cm_IoctlSetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1849 cm_SSetPref_t *spin; /* input */
1850 cm_SPref_t *srvin; /* one input component */
1852 int i, vlonly, noServers, type;
1853 struct sockaddr_in tmp;
1854 unsigned short rank;
1856 spin = (cm_SSetPref_t *)ioctlp->inDatap;
1857 noServers = spin->num_servers;
1858 vlonly = spin->flags;
1860 type = CM_SERVER_VLDB;
1862 type = CM_SERVER_FILE;
1864 for ( i=0; i < noServers; i++)
1866 srvin = &(spin->servers[i]);
1867 rank = srvin->rank + (rand() & 0x000f);
1868 tmp.sin_addr = srvin->host;
1870 case CM_SERVER_VLDB:
1871 tmp.sin_port = htons(7003);
1873 case CM_SERVER_FILE:
1874 tmp.sin_port = htons(7000);
1877 tmp.sin_family = AF_INET;
1879 tsp = cm_FindServer(&tmp, type, FALSE);
1880 if ( tsp ) /* an existing server - ref count increased */
1882 lock_ObtainMutex(&tsp->mx);
1884 _InterlockedOr(&tsp->flags, CM_SERVERFLAG_PREF_SET);
1885 tsp->adminRank = tsp->ipRank;
1886 lock_ReleaseMutex(&tsp->mx);
1889 case CM_SERVER_FILE:
1891 * find volumes which might have RO copy
1892 * on server and change the ordering of
1895 cm_ChangeRankVolume(tsp);
1897 case CM_SERVER_VLDB:
1898 /* set preferences for an existing vlserver */
1899 cm_ChangeRankCellVLServer(tsp);
1903 else /* add a new server without a cell */
1905 tsp = cm_NewServer(&tmp, type, NULL, NULL, CM_FLAG_NOPROBE); /* refcount = 1 */
1906 lock_ObtainMutex(&tsp->mx);
1908 _InterlockedOr(&tsp->flags, CM_SERVERFLAG_PREF_SET);
1909 tsp->adminRank = tsp->ipRank;
1910 lock_ReleaseMutex(&tsp->mx);
1913 cm_PutServer(tsp); /* decrease refcount */
1919 * VIOC_GETSPREFS internals.
1921 * Assumes that pioctl path has been parsed or skipped.
1924 cm_IoctlGetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1926 cm_SPrefRequest_t *spin; /* input */
1927 cm_SPrefInfo_t *spout; /* output */
1928 cm_SPref_t *srvout; /* one output component */
1930 int i, vlonly, noServers;
1932 spin = (cm_SPrefRequest_t *)ioctlp->inDatap;
1933 spout = (cm_SPrefInfo_t *) ioctlp->outDatap;
1934 srvout = spout->servers;
1935 noServers = spin->num_servers;
1936 vlonly = spin->flags & CM_SPREF_VLONLY;
1937 spout->num_servers = 0;
1939 lock_ObtainRead(&cm_serverLock); /* get server lock */
1941 for (tsp=cm_allServersp, i=0; tsp && noServers; tsp=tsp->allNextp,i++){
1942 if (spin->offset > i) {
1943 continue; /* catch up to where we left off */
1946 if ( vlonly && (tsp->type != CM_SERVER_VLDB) )
1947 continue; /* ignore fileserver for -vlserver option*/
1948 if ( !vlonly && (tsp->type != CM_SERVER_FILE) )
1949 continue; /* ignore vlservers */
1951 srvout->host = tsp->addr.sin_addr;
1952 srvout->rank = tsp->ipRank;
1954 spout->num_servers++;
1957 lock_ReleaseRead(&cm_serverLock); /* release server lock */
1959 if ( tsp ) /* we ran out of space in the output buffer */
1960 spout->next_offset = i;
1962 spout->next_offset = 0;
1963 ioctlp->outDatap += sizeof(cm_SPrefInfo_t) +
1964 (spout->num_servers -1 ) * sizeof(cm_SPref_t) ;
1970 * VIOC_AFS_CREATE_MT_PT internals.
1972 * Assumes that pioctl path has been parsed or skipped.
1973 * dscp is held but not locked.
1976 cm_IoctlCreateMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1981 fschar_t mpInfo[512]; /* mount point string */
1982 fschar_t fullCell[CELL_MAXNAMELEN];
1983 fschar_t *fscell = NULL;
1984 fschar_t *fsvolume = NULL;
1985 clientchar_t volume[VL_MAXNAMELEN];
1986 clientchar_t *mpp = NULL;
1987 clientchar_t *cell = NULL;
1988 cm_volume_t *volp = NULL;
1989 cm_cell_t *cellp = NULL;
1993 * The fs command allows the user to specify partial cell names on NT. These must
1994 * be expanded to the full cell name for mount points so that the mount points will
1995 * work on UNIX clients.
1998 /* Extract the possibly partial cell name */
1999 mpp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
2000 cell = cm_ClientCharNext(mpp);
2001 if (cp = cm_ClientStrChr(cell, ':')) {
2003 /* Extract the volume name */
2005 cm_ClientStrCpy(volume, lengthof(volume), cm_ClientCharNext(cp));
2007 fscell = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
2008 fsvolume = cm_ClientStringToFsStringAlloc(volume, -1, NULL);
2010 /* Get the full name for this cell */
2011 cellp = cm_GetCell_Gen(fscell, fullCell, CM_FLAG_NOPROBE);
2013 code = CM_ERROR_NOSUCHCELL;
2017 StringCbPrintfA(mpInfo, sizeof(mpInfo), "%c%s:%s", (char) *mpp,
2018 fullCell, fsvolume);
2021 /* No cell name specified, so cell points at the volume instead. */
2022 fsvolume = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
2023 cm_ClientStringToFsString(mpp, -1, mpInfo, lengthof(mpInfo));
2024 cellp = cm_FindCellByID(dscp->fid.cell, CM_FLAG_NOPROBE);
2027 /* remove the trailing dot if it is present */
2028 len = strlen(fsvolume);
2029 if (len > 1 && fsvolume[len-1] == '.')
2030 fsvolume[len-1] = '\0';
2032 /* validate the target info */
2033 if (cm_VolNameIsID(fsvolume)) {
2034 code = cm_FindVolumeByID(cellp, atoi(fsvolume), userp, reqp,
2035 CM_GETVOL_FLAG_CREATE, &volp);
2037 code = cm_FindVolumeByName(cellp, fsvolume, userp, reqp,
2038 CM_GETVOL_FLAG_CREATE, &volp);
2043 #ifdef AFS_FREELANCE_CLIENT
2044 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2045 /* we are adding the mount point to the root dir, so call
2046 * the freelance code to do the add. */
2047 fschar_t * fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
2048 osi_Log0(afsd_logp,"IoctlCreateMountPoint within Freelance root dir");
2049 code = cm_FreelanceAddMount(fsleaf, fullCell, fsvolume, *mpInfo == '%', NULL);
2054 /* create the symlink with mode 644. The lack of X bits tells
2055 * us that it is a mount point.
2057 tattr.mask = CM_ATTRMASK_UNIXMODEBITS | CM_ATTRMASK_CLIENTMODTIME;
2058 tattr.unixModeBits = 0644;
2059 tattr.clientModTime = time(NULL);
2061 code = cm_SymLink(dscp, leaf, mpInfo, 0, &tattr, userp, reqp);
2064 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2065 smb_NotifyChange(FILE_ACTION_ADDED,
2066 FILE_NOTIFY_CHANGE_DIR_NAME,
2067 dscp, leaf, NULL, TRUE);
2083 * VIOC_SYMLINK internals.
2085 * Assumes that pioctl path has been parsed or skipped.
2086 * dscp is held but not locked.
2089 cm_IoctlSymlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
2095 int free_syml = FALSE;
2097 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2098 /* Translate chars for the linked to name */
2099 TranslateExtendedChars(ioctlp->inDatap);
2102 cp = symlp = ioctlp->inDatap; /* contents of link */
2104 #ifdef AFS_FREELANCE_CLIENT
2105 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2106 /* we are adding the symlink to the root dir., so call
2107 * the freelance code to do the add. */
2110 if (cp[0] == cp[1] && cp[1] == '\\' &&
2111 !_strnicmp(cm_NetbiosName,cp+2,strlen(cm_NetbiosName)))
2113 /* skip \\AFS\ or \\AFS\all\ */
2115 p = cp + 2 + strlen(cm_NetbiosName) + 1;
2116 if ( !_strnicmp("all", p, 3) )
2121 osi_Log0(afsd_logp,"IoctlCreateSymlink within Freelance root dir");
2122 fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
2123 code = cm_FreelanceAddSymlink(fsleaf, cp, NULL);
2128 /* Create symlink with mode 0755. */
2129 tattr.mask = CM_ATTRMASK_UNIXMODEBITS;
2130 tattr.unixModeBits = 0755;
2132 code = cm_SymLink(dscp, leaf, cp, 0, &tattr, userp, reqp);
2135 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2136 smb_NotifyChange(FILE_ACTION_ADDED,
2137 FILE_NOTIFY_CHANGE_FILE_NAME
2138 | FILE_NOTIFY_CHANGE_DIR_NAME,
2139 dscp, leaf, NULL, TRUE);
2145 * VIOC_LISTSYMLINK internals.
2147 * Assumes that pioctl path has been parsed or skipped.
2148 * dscp is held but not locked.
2151 cm_IoctlListlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2157 cm_scache_t *newRootScp;
2158 clientchar_t *clientp;
2160 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2161 /* Translate chars for the link name */
2162 TranslateExtendedChars(ioctlp->inDatap);
2164 cp = ioctlp->inDatap;
2166 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2167 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2172 /* Check that it's a real symlink */
2173 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2174 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2175 scp->fileType != CM_SCACHETYPE_INVALID) {
2176 cm_ReleaseSCache(scp);
2177 return CM_ERROR_INVAL;
2180 code = cm_AssembleLink(scp, "", &newRootScp, &spacep, userp, reqp);
2181 cm_ReleaseSCache(scp);
2184 cp = ioctlp->outDatap;
2185 if (newRootScp != NULL) {
2186 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), cm_mountRoot);
2187 StringCbCatA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), "/");
2191 linkstr = cm_ClientStringToFsStringAlloc(spacep->wdata, -1, NULL);
2192 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), linkstr);
2193 cp += strlen(cp) + 1;
2194 ioctlp->outDatap = cp;
2195 cm_FreeSpace(spacep);
2197 if (newRootScp != NULL)
2198 cm_ReleaseSCache(newRootScp);
2200 } else if (code == CM_ERROR_PATH_NOT_COVERED &&
2201 scp->fileType == CM_SCACHETYPE_DFSLINK ||
2202 code == CM_ERROR_NOSUCHPATH &&
2203 scp->fileType == CM_SCACHETYPE_INVALID) {
2205 cp = ioctlp->outDatap;
2206 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), scp->mountPointStringp);
2207 cp += strlen(cp) + 1;
2208 ioctlp->outDatap = cp;
2216 * VIOC_ISSYMLINK internals.
2218 * Assumes that pioctl path has been parsed or skipped.
2219 * dscp is held but not locked.
2222 cm_IoctlIslink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2223 {/*CHECK FOR VALID SYMLINK*/
2227 clientchar_t *clientp;
2229 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2230 /* Translate chars for the link name */
2231 TranslateExtendedChars(ioctlp->inDatap);
2233 cp = ioctlp->inDatap;
2234 osi_LogEvent("cm_IoctlListlink",NULL," name[%s]",cp);
2236 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2237 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2242 /* Check that it's a real symlink */
2243 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2244 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2245 scp->fileType != CM_SCACHETYPE_INVALID)
2246 code = CM_ERROR_INVAL;
2247 cm_ReleaseSCache(scp);
2252 * VIOC_DELSYMLINK internals.
2254 * Assumes that pioctl path has been parsed or skipped.
2255 * dscp is held but not locked.
2258 cm_IoctlDeletelink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2263 char * originalName = NULL;
2265 clientchar_t *clientp;
2267 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2268 /* Translate chars for the link name */
2269 TranslateExtendedChars(ioctlp->inDatap);
2271 cp = ioctlp->inDatap;
2273 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2274 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2276 /* if something went wrong, bail out now */
2280 lock_ObtainWrite(&scp->rw);
2281 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2282 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2286 /* now check that this is a real symlink */
2287 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2288 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2289 scp->fileType != CM_SCACHETYPE_INVALID) {
2290 code = CM_ERROR_INVAL;
2294 /* time to make the RPC, so drop the lock */
2295 lock_ReleaseWrite(&scp->rw);
2298 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
2299 CM_DIROP_FLAG_NONE, &dirop);
2301 code = cm_BPlusDirLookupOriginalName(&dirop, clientp, &originalName);
2302 /* cm_Dir*() functions can't be used to lookup the original
2303 name since those functions only know of the original
2305 cm_EndDirOp(&dirop);
2309 /* If this name doesn't have a non-normalized name associated with
2310 it, we assume that what we had is what is actually present on
2313 if (originalName == NULL)
2316 /* cp is a normalized name. originalName is the actual name we
2317 saw on the fileserver. */
2320 #ifdef AFS_FREELANCE_CLIENT
2321 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2322 /* we are adding the mount point to the root dir., so call
2323 * the freelance code to do the add. */
2324 osi_Log0(afsd_logp,"IoctlDeletelink from Freelance root dir");
2325 code = cm_FreelanceRemoveSymlink(originalName);
2329 /* easier to do it this way */
2330 code = cm_Unlink(dscp, originalName, clientp, userp, reqp);
2332 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2333 smb_NotifyChange(FILE_ACTION_REMOVED,
2334 FILE_NOTIFY_CHANGE_FILE_NAME
2335 | FILE_NOTIFY_CHANGE_DIR_NAME,
2336 dscp, clientp, NULL, TRUE);
2338 if (originalName != NULL && originalName != cp) {
2340 originalName = NULL;
2343 lock_ObtainWrite(&scp->rw);
2345 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2348 cm_DiscardSCache(scp);
2349 lock_ReleaseWrite(&scp->rw);
2350 cm_ReleaseSCache(scp);
2359 /* Utility function. Not currently used.
2360 * This function performs a PTS lookup which has traditionally
2361 * not been performed by the cache manager.
2364 cm_UsernameToId(char *uname, cm_ucell_t * ucellp, afs_uint32* uid)
2369 static struct afsconf_cell info;
2370 struct rx_connection *serverconns[MAXSERVERS];
2371 struct rx_securityClass *sc[3];
2372 afs_int32 scIndex = 2; /* authenticated - we have a token */
2373 struct ubik_client *pruclient = NULL;
2374 struct afsconf_dir *tdir;
2378 memset(&info, 0, sizeof(info));
2379 tdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH);
2380 code = afsconf_GetCellInfo(tdir, ucellp->cellp->name, "afsprot", &info);
2381 afsconf_Close(tdir);
2387 /* we have the token that was given to us in the settoken
2388 * call. we just have to use it.
2390 scIndex = 2; /* kerberos ticket */
2391 sc[2] = rxkad_NewClientSecurityObject(rxkad_clear, &ucellp->sessionKey,
2392 ucellp->kvno, ucellp->ticketLen,
2395 memset(serverconns, 0, sizeof(serverconns)); /* terminate list!!! */
2396 for (i = 0; i < info.numServers; i++)
2398 rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
2399 info.hostAddr[i].sin_port, PRSRV, sc[scIndex],
2402 code = ubik_ClientInit(serverconns, &pruclient);
2404 if (info.linkedCell)
2405 free(info.linkedCell);
2409 code = rxs_Release(sc[scIndex]);
2411 lids.idlist_len = 0;
2412 lids.idlist_val = 0;
2413 lnames.namelist_len = 1;
2414 lnames.namelist_val = (prname *) malloc(PR_MAXNAMELEN);
2415 strncpy(lnames.namelist_val[0], uname, PR_MAXNAMELEN);
2416 lnames.namelist_val[0][PR_MAXNAMELEN-1] = '\0';
2417 for ( p=lnames.namelist_val[0], r=NULL; *p; p++ ) {
2423 if (r && !cm_stricmp_utf8(r+1,ucellp->cellp->name))
2426 code = ubik_PR_NameToID(pruclient, 0, &lnames, &lids);
2427 if (lids.idlist_val) {
2428 *uid = *lids.idlist_val;
2429 free(lids.idlist_val);
2431 if (lnames.namelist_val)
2432 free(lnames.namelist_val);
2435 ubik_ClientDestroy(pruclient);
2439 if (info.linkedCell)
2440 free(info.linkedCell);
2443 #endif /* QUERY_AFSID */
2446 /* This has been copied to smb_IoctlSetToken in its entirety.
2447 * An equivalent version will need to be produced for the
2448 * redirector and some extensive refactoring might be required.
2451 cm_IoctlSetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2458 struct ClearToken ct;
2466 int release_userp = 0;
2469 saveDataPtr = ioctlp->inDatap;
2471 cm_SkipIoctlPath(ioctlp);
2473 tp = ioctlp->inDatap;
2476 memcpy(&ticketLen, tp, sizeof(ticketLen));
2477 tp += sizeof(ticketLen);
2478 if (ticketLen < MINKTCTICKETLEN || ticketLen > MAXKTCTICKETLEN)
2479 return CM_ERROR_INVAL;
2481 /* remember ticket and skip over it for now */
2485 /* clear token size */
2486 memcpy(&ctSize, tp, sizeof(ctSize));
2487 tp += sizeof(ctSize);
2488 if (ctSize != sizeof(struct ClearToken))
2489 return CM_ERROR_INVAL;
2492 memcpy(&ct, tp, ctSize);
2494 if (ct.AuthHandle == -1)
2495 ct.AuthHandle = 999; /* more rxvab compat stuff */
2497 /* more stuff, if any */
2498 if (ioctlp->inCopied > tp - saveDataPtr) {
2499 /* flags: logon flag */
2500 memcpy(&flags, tp, sizeof(int));
2504 cellp = cm_GetCell(tp, CM_FLAG_CREATE | CM_FLAG_NOPROBE);
2506 return CM_ERROR_NOSUCHCELL;
2507 tp += strlen(tp) + 1;
2511 tp += strlen(tp) + 1;
2513 if (flags & PIOCTL_LOGON) {
2514 /* SMB user name with which to associate tokens */
2516 osi_Log2(smb_logp,"cm_IoctlSetToken for user [%s] smbname [%s]",
2517 osi_LogSaveString(smb_logp,uname), osi_LogSaveString(smb_logp,smbname));
2518 fprintf(stderr, "SMB name = %s\n", smbname);
2519 tp += strlen(tp) + 1;
2521 osi_Log1(smb_logp,"cm_IoctlSetToken for user [%s]",
2522 osi_LogSaveString(smb_logp, uname));
2526 memcpy(&uuid, tp, sizeof(uuid));
2527 if (!cm_FindTokenEvent(uuid, sessionKey))
2528 return CM_ERROR_INVAL;
2530 cellp = cm_data.rootCellp;
2531 osi_Log0(smb_logp,"cm_IoctlSetToken - no name specified");
2534 if (flags & PIOCTL_LOGON) {
2535 userp = smb_FindCMUserByName(smbname, ioctlp->fidp->vcp->rname,
2536 SMB_FLAG_CREATE|SMB_FLAG_AFSLOGON);
2540 /* store the token */
2541 lock_ObtainMutex(&userp->mx);
2542 ucellp = cm_GetUCell(userp, cellp);
2543 osi_Log1(smb_logp,"cm_IoctlSetToken ucellp %lx", ucellp);
2544 ucellp->ticketLen = ticketLen;
2545 if (ucellp->ticketp)
2546 free(ucellp->ticketp); /* Discard old token if any */
2547 ucellp->ticketp = malloc(ticketLen);
2548 memcpy(ucellp->ticketp, ticket, ticketLen);
2550 * Get the session key from the RPC, rather than from the pioctl.
2553 memcpy(&ucellp->sessionKey, ct.HandShakeKey, sizeof(ct.HandShakeKey));
2555 memcpy(ucellp->sessionKey.data, sessionKey, sizeof(sessionKey));
2556 ucellp->kvno = ct.AuthHandle;
2557 ucellp->expirationTime = ct.EndTimestamp;
2560 ucellp->uid = ANONYMOUSID;
2563 StringCbCopyA(ucellp->userName, MAXKTCNAMELEN, uname);
2565 cm_UsernameToId(uname, ucellp, &ucellp->uid);
2568 ucellp->flags |= CM_UCELLFLAG_RXKAD;
2569 lock_ReleaseMutex(&userp->mx);
2571 if (flags & PIOCTL_LOGON) {
2572 ioctlp->flags |= CM_IOCTLFLAG_LOGON;
2575 cm_ResetACLCache(cellp, userp);
2578 cm_ReleaseUser(userp);
2585 * VIOC_GETTOK internals.
2587 * Assumes that pioctl path has been parsed or skipped.
2590 cm_IoctlGetTokenIter(struct cm_ioctl *ioctlp, struct cm_user *userp)
2596 struct ClearToken ct;
2598 tp = ioctlp->inDatap;
2599 cp = ioctlp->outDatap;
2602 memcpy(&iterator, tp, sizeof(iterator));
2603 tp += sizeof(iterator);
2605 lock_ObtainMutex(&userp->mx);
2607 /* look for token */
2608 for (;;iterator++) {
2609 ucellp = cm_FindUCell(userp, iterator);
2611 lock_ReleaseMutex(&userp->mx);
2612 return CM_ERROR_NOMORETOKENS;
2614 if (ucellp->flags & CM_UCELLFLAG_RXKAD)
2619 temp = ucellp->iterator + 1;
2620 memcpy(cp, &temp, sizeof(temp));
2624 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2625 cp += sizeof(ucellp->ticketLen);
2628 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2629 cp += ucellp->ticketLen;
2631 /* clear token size */
2633 memcpy(cp, &temp, sizeof(temp));
2637 ct.AuthHandle = ucellp->kvno;
2640 * This field is supposed to hold the session key
2641 * but we don't want to make it easier for someone
2642 * to attack the cache. The user gave us the session
2643 * key in the first place.
2645 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2646 ct.ViceId = 37; /* XXX */
2647 ct.BeginTimestamp = 0; /* XXX */
2648 ct.EndTimestamp = ucellp->expirationTime;
2649 memcpy(cp, &ct, sizeof(ct));
2652 /* Primary flag (unused) */
2654 memcpy(cp, &temp, sizeof(temp));
2658 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2659 cp += strlen(cp) + 1;
2662 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2663 cp += strlen(cp) + 1;
2665 ioctlp->outDatap = cp;
2667 lock_ReleaseMutex(&userp->mx);
2673 * VIOC_NEWGETTOK internals.
2675 * Assumes that pioctl path has been parsed or skipped.
2678 cm_IoctlGetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2684 struct ClearToken ct;
2688 tp = ioctlp->inDatap;
2690 cp = ioctlp->outDatap;
2692 /* cell name is right here */
2693 cellp = cm_GetCell(tp, 0);
2695 return CM_ERROR_NOSUCHCELL;
2696 tp += strlen(tp) + 1;
2699 memcpy(&uuid, tp, sizeof(uuid));
2701 lock_ObtainMutex(&userp->mx);
2703 ucellp = cm_GetUCell(userp, cellp);
2704 if (!ucellp || !(ucellp->flags & CM_UCELLFLAG_RXKAD)) {
2705 lock_ReleaseMutex(&userp->mx);
2706 return CM_ERROR_NOMORETOKENS;
2710 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2711 cp += sizeof(ucellp->ticketLen);
2714 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2715 cp += ucellp->ticketLen;
2717 /* clear token size */
2719 memcpy(cp, &temp, sizeof(temp));
2723 ct.AuthHandle = ucellp->kvno;
2725 /* do not give out the session key */
2726 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2727 ct.ViceId = 37; /* XXX */
2728 ct.BeginTimestamp = 0; /* XXX */
2729 ct.EndTimestamp = ucellp->expirationTime;
2730 memcpy(cp, &ct, sizeof(ct));
2733 /* Primary flag (unused) */
2735 memcpy(cp, &temp, sizeof(temp));
2739 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2740 cp += strlen(cp) + 1;
2743 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2744 cp += strlen(cp) + 1;
2746 ioctlp->outDatap = cp;
2748 lock_ReleaseMutex(&userp->mx);
2750 cm_RegisterNewTokenEvent(uuid, ucellp->sessionKey.data, NULL);
2756 * VIOCDELTOK internals.
2758 * Assumes that pioctl path has been parsed or skipped.
2761 cm_IoctlDelToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2767 cp = ioctlp->outDatap;
2769 /* cell name is right here */
2770 cellp = cm_GetCell(ioctlp->inDatap, 0);
2772 return CM_ERROR_NOSUCHCELL;
2774 lock_ObtainMutex(&userp->mx);
2776 ucellp = cm_GetUCell(userp, cellp);
2778 lock_ReleaseMutex(&userp->mx);
2779 return CM_ERROR_NOMORETOKENS;
2782 osi_Log1(smb_logp,"cm_IoctlDelToken ucellp %lx", ucellp);
2784 if (ucellp->ticketp) {
2785 free(ucellp->ticketp);
2786 ucellp->ticketp = NULL;
2788 ucellp->ticketLen = 0;
2789 memset(ucellp->sessionKey.data, 0, 8);
2791 ucellp->expirationTime = 0;
2792 ucellp->userName[0] = '\0';
2793 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2796 lock_ReleaseMutex(&userp->mx);
2798 cm_ResetACLCache(cellp, userp);
2804 * VIOCDELALLTOK internals.
2806 * Assumes that pioctl path has been parsed or skipped.
2809 cm_IoctlDelAllToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2813 lock_ObtainMutex(&userp->mx);
2815 for (ucellp = userp->cellInfop; ucellp; ucellp = ucellp->nextp) {
2816 osi_Log1(smb_logp,"cm_IoctlDelAllToken ucellp %lx", ucellp);
2818 if (ucellp->ticketp) {
2819 free(ucellp->ticketp);
2820 ucellp->ticketp = NULL;
2822 ucellp->ticketLen = 0;
2823 memset(ucellp->sessionKey.data, 0, 8);
2825 ucellp->expirationTime = 0;
2826 ucellp->userName[0] = '\0';
2827 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2831 lock_ReleaseMutex(&userp->mx);
2833 cm_ResetACLCache(NULL, userp);
2839 * VIOC_MAKESUBMOUNT internals. (This function should be deprecated)
2841 * Assumes that pioctl path has been parsed or skipped.
2844 cm_IoctlMakeSubmount(cm_ioctl_t *ioctlp, cm_user_t *userp)
2846 char afspath[MAX_PATH];
2848 int nextAutoSubmount;
2850 DWORD dwType, dwSize;
2855 /* Serialize this one, to prevent simultaneous mods
2858 lock_ObtainMutex(&cm_Afsdsbmt_Lock);
2860 /* Parse the input parameters--first the required afs path,
2861 * then the requested submount name (which may be "").
2863 cm_NormalizeAfsPathAscii(afspath, sizeof(afspath), ioctlp->inDatap);
2864 submountreqp = ioctlp->inDatap + (strlen(ioctlp->inDatap)+1);
2866 /* If the caller supplied a suggested submount name, see if
2867 * that submount name is in use... if so, the submount's path
2868 * has to match our path.
2871 RegCreateKeyEx( HKEY_LOCAL_MACHINE,
2872 AFSREG_CLT_OPENAFS_SUBKEY "\\Submounts",
2875 REG_OPTION_NON_VOLATILE,
2876 KEY_READ|KEY_WRITE|KEY_QUERY_VALUE,
2881 if (submountreqp && *submountreqp) {
2882 char submountPath[MAX_PATH];
2884 dwSize = sizeof(submountPath);
2885 status = RegQueryValueEx( hkSubmounts, submountreqp, 0,
2886 &dwType, submountPath, &dwSize);
2888 if (status != ERROR_SUCCESS) {
2890 /* The suggested submount name isn't in use now--
2891 * so we can safely map the requested submount name
2892 * to the supplied path. Remember not to write the
2893 * leading "/afs" when writing out the submount.
2895 RegSetValueEx( hkSubmounts, submountreqp, 0,
2897 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2898 &afspath[strlen(cm_mountRoot)]:"/",
2899 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2900 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2902 RegCloseKey( hkSubmounts );
2903 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2904 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2905 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2909 /* The suggested submount name is already in use--if the
2910 * supplied path matches the submount's path, we can still
2911 * use the suggested submount name.
2913 if (!strcmp (submountPath, afspath)) {
2914 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2915 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2916 RegCloseKey( hkSubmounts );
2917 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2922 RegQueryInfoKey( hkSubmounts,
2924 NULL, /* lpcClass */
2925 NULL, /* lpReserved */
2926 NULL, /* lpcSubKeys */
2927 NULL, /* lpcMaxSubKeyLen */
2928 NULL, /* lpcMaxClassLen */
2929 &dwSubmounts, /* lpcValues */
2930 NULL, /* lpcMaxValueNameLen */
2931 NULL, /* lpcMaxValueLen */
2932 NULL, /* lpcbSecurityDescriptor */
2933 NULL /* lpftLastWriteTime */
2937 /* Having obtained a list of all available submounts, start
2938 * searching that list for a path which matches the requested
2939 * AFS path. We'll also keep track of the highest "auto15"/"auto47"
2940 * submount, in case we need to add a new one later.
2943 nextAutoSubmount = 1;
2945 for ( dwIndex = 0; dwIndex < dwSubmounts; dwIndex ++ ) {
2946 char submountPath[MAX_PATH] = "";
2947 DWORD submountPathLen = sizeof(submountPath);
2948 char submountName[MAX_PATH];
2949 DWORD submountNameLen = sizeof(submountName);
2952 RegEnumValue( hkSubmounts, dwIndex, submountName, &submountNameLen, NULL,
2953 &dwType, submountPath, &submountPathLen);
2954 if (dwType == REG_EXPAND_SZ) {
2956 StringCbCopyA(buf, MAX_PATH, submountPath);
2957 submountPathLen = ExpandEnvironmentStrings(buf, submountPath, MAX_PATH);
2958 if (submountPathLen > MAX_PATH)
2962 /* If this is an Auto### submount, remember its ### value */
2963 if ((!strnicmp (submountName, "auto", 4)) &&
2964 (isdigit (submountName[strlen("auto")]))) {
2965 int thisAutoSubmount;
2966 thisAutoSubmount = atoi (&submountName[strlen("auto")]);
2967 nextAutoSubmount = max (nextAutoSubmount,
2968 thisAutoSubmount+1);
2971 if ((submountPathLen == 0) ||
2972 (submountPathLen == sizeof(submountPath) - 1)) {
2976 /* See if the path for this submount matches the path
2977 * that our caller specified. If so, we can return
2980 if (!strcmp (submountPath, afspath)) {
2981 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountName);
2982 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2983 RegCloseKey(hkSubmounts);
2984 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2990 /* We've been through the entire list of existing submounts, and
2991 * didn't find any which matched the specified path. So, we'll
2992 * just have to add one. Remember not to write the leading "/afs"
2993 * when writing out the submount.
2996 StringCbPrintfA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "auto%ld", nextAutoSubmount);
2998 RegSetValueEx( hkSubmounts,
3002 (strlen(&afspath[strlen(cm_mountRoot)])) ?
3003 &afspath[strlen(cm_mountRoot)]:"/",
3004 (strlen(&afspath[strlen(cm_mountRoot)])) ?
3005 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
3007 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
3008 RegCloseKey(hkSubmounts);
3009 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
3014 * VIOC_GETRXKCRYPT internals.
3016 * Assumes that pioctl path has been parsed or skipped.
3019 cm_IoctlGetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
3021 memcpy(ioctlp->outDatap, &cryptall, sizeof(cryptall));
3022 ioctlp->outDatap += sizeof(cryptall);
3028 * VIOC_SETRXKCRYPT internals.
3030 * Assumes that pioctl path has been parsed or skipped.
3033 cm_IoctlSetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
3035 afs_int32 c = cryptall;
3037 memcpy(&cryptall, ioctlp->inDatap, sizeof(cryptall));
3039 if (c != cryptall) {
3041 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_ON);
3042 else if (cryptall == 2)
3043 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_AUTH);
3045 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_OFF);
3051 * VIOC_RXSTAT_PROC internals.
3053 * Assumes that pioctl path has been parsed or skipped.
3056 cm_IoctlRxStatProcess(struct cm_ioctl *ioctlp, struct cm_user *userp)
3061 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
3062 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
3065 if (flags & AFSCALL_RXSTATS_ENABLE) {
3066 rx_enableProcessRPCStats();
3068 if (flags & AFSCALL_RXSTATS_DISABLE) {
3069 rx_disableProcessRPCStats();
3071 if (flags & AFSCALL_RXSTATS_CLEAR) {
3072 rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
3078 * VIOC_RXSTAT_PEER internals.
3080 * Assumes that pioctl path has been parsed or skipped.
3083 cm_IoctlRxStatPeer(struct cm_ioctl *ioctlp, struct cm_user *userp)
3088 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
3089 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
3092 if (flags & AFSCALL_RXSTATS_ENABLE) {
3093 rx_enablePeerRPCStats();
3095 if (flags & AFSCALL_RXSTATS_DISABLE) {
3096 rx_disablePeerRPCStats();
3098 if (flags & AFSCALL_RXSTATS_CLEAR) {
3099 rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
3105 * VIOC_UNICODECTL internals.
3107 * Assumes that pioctl path has been parsed or skipped.
3110 cm_IoctlUnicodeControl(struct cm_ioctl *ioctlp, struct cm_user * userp)
3112 afs_int32 result = 0;
3116 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
3119 /* Setting the Unicode flag */
3122 newflag = ((cmd & 1) == 1);
3124 InterlockedExchange(&smb_UseUnicode, newflag);
3127 result = smb_UseUnicode;
3132 memcpy(ioctlp->outDatap, &result, sizeof(result));
3133 ioctlp->outDatap += sizeof(result);
3139 * VIOC_UUIDCTL internals.
3141 * Assumes that pioctl path has been parsed or skipped.
3144 cm_IoctlUUIDControl(struct cm_ioctl * ioctlp, struct cm_user *userp)
3149 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
3151 if (cmd) { /* generate a new UUID */
3152 UuidCreate((UUID *) &uuid);
3153 cm_data.Uuid = uuid;
3154 cm_ForceNewConnectionsAllServers();
3157 memcpy(ioctlp->outDatap, &cm_data.Uuid, sizeof(cm_data.Uuid));
3158 ioctlp->outDatap += sizeof(cm_data.Uuid);
3166 * functions to dump contents of various structures.
3167 * In debug build (linked with crt debug library) will dump allocated but not freed memory
3169 extern int cm_DumpSCache(FILE *outputFile, char *cookie, int lock);
3170 extern int cm_DumpBufHashTable(FILE *outputFile, char *cookie, int lock);
3173 * VIOC_TRACEMEMDUMP internals.
3175 * Assumes that pioctl path has been parsed or skipped.
3176 * dscp is held but not locked.
3179 cm_IoctlMemoryDump(struct cm_ioctl *ioctlp, struct cm_user *userp)
3181 afs_int32 inValue = 0;
3183 char logfileName[MAX_PATH+1];
3188 static _CrtMemState memstate;
3191 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_int32));
3193 dwSize = GetEnvironmentVariable("TEMP", logfileName, sizeof(logfileName));
3194 if ( dwSize == 0 || dwSize > sizeof(logfileName) )
3196 GetWindowsDirectory(logfileName, sizeof(logfileName));
3198 strncat(logfileName, "\\afsd_alloc.log", sizeof(logfileName));
3200 hLogFile = CreateFile(logfileName, GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
3206 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_int32));
3207 ioctlp->outDatap += sizeof(afs_int32);
3212 SetFilePointer(hLogFile, 0, NULL, FILE_END);
3214 cookie = inValue ? "b" : "e";
3220 _CrtMemCheckpoint(&memstate);
3224 _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
3225 _CrtSetReportFile(_CRT_WARN, hLogFile);
3226 _CrtMemDumpAllObjectsSince(&memstate);
3230 /* dump all interesting data */
3231 cm_MemDumpDirStats(hLogFile, cookie, 1);
3232 cm_MemDumpBPlusStats(hLogFile, cookie, 1);
3233 cm_DumpCells(hLogFile, cookie, 1);
3234 cm_DumpVolumes(hLogFile, cookie, 1);
3235 cm_DumpSCache(hLogFile, cookie, 1);
3236 cm_DumpBufHashTable(hLogFile, cookie, 1);
3237 cm_DumpServers(hLogFile, cookie, 1);
3238 smb_DumpVCP(hLogFile, cookie, 1);
3239 rx_DumpCalls(hLogFile, cookie);
3240 rx_DumpPackets(hLogFile, cookie);
3242 CloseHandle(hLogFile);
3244 inValue = 0; /* success */
3245 memcpy(ioctlp->outDatap, &inValue, sizeof(long));
3246 ioctlp->outDatap += sizeof(long);
3251 /* Utility functon. Not currently used. */
3253 cm_CheckServersStatus(cm_serverRef_t *serversp)
3256 cm_serverRef_t *tsrp;
3258 int someBusy = 0, someOffline = 0, allOffline = 1, allBusy = 1, allDown = 1;
3260 if (serversp == NULL) {
3261 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", CM_ERROR_ALLDOWN);
3262 return CM_ERROR_ALLDOWN;
3265 lock_ObtainRead(&cm_serverLock);
3266 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
3267 if (tsrp->status == srv_deleted)
3269 if (tsp = tsrp->server) {
3270 cm_GetServerNoLock(tsp);
3271 lock_ReleaseRead(&cm_serverLock);
3272 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
3274 if (tsrp->status == srv_busy) {
3277 } else if (tsrp->status == srv_offline) {
3287 lock_ObtainRead(&cm_serverLock);
3288 cm_PutServerNoLock(tsp);
3291 lock_ReleaseRead(&cm_serverLock);
3294 code = CM_ERROR_ALLDOWN;
3296 code = CM_ERROR_ALLBUSY;
3297 else if (allOffline || (someBusy && someOffline))
3298 code = CM_ERROR_ALLOFFLINE;
3301 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", code);
3306 * VIOC_PATH_AVAILABILITY internals.
3308 * Assumes that pioctl path has been parsed or skipped.
3309 * scp is held but not locked.
3312 cm_IoctlPathAvailability(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3317 cm_vol_state_t *statep;
3320 #ifdef AFS_FREELANCE_CLIENT
3321 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
3326 volume = scp->fid.volume;
3328 cellp = cm_FindCellByID(scp->fid.cell, 0);
3331 return CM_ERROR_NOSUCHCELL;
3333 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
3337 statep = cm_VolumeStateByID(tvp, volume);
3338 switch (statep->state) {
3344 code = CM_ERROR_ALLBUSY;
3347 code = CM_ERROR_ALLOFFLINE;
3350 code = CM_ERROR_ALLDOWN;
3359 * VIOC_VOLSTAT_TEST internals.
3361 * Assumes that pioctl path has been parsed or skipped.
3364 cm_IoctlVolStatTest(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
3367 cm_cell_t *cellp = NULL;
3369 cm_vol_state_t *statep;
3370 struct VolStatTest * testp;
3373 testp = (struct VolStatTest *)ioctlp->inDatap;
3375 #ifdef AFS_FREELANCE_CLIENT
3376 if (testp->fid.cell == -1)
3377 return CM_ERROR_NOACCESS;
3380 if (testp->flags & VOLSTAT_TEST_CHECK_VOLUME) {
3381 cm_CheckOfflineVolumes();
3385 if (testp->flags & VOLSTAT_TEST_NETWORK_UP) {
3386 cm_VolStatus_Network_Started(cm_NetbiosName
3394 if (testp->flags & VOLSTAT_TEST_NETWORK_DOWN) {
3395 cm_VolStatus_Network_Stopped(cm_NetbiosName
3403 if (testp->cellname[0]) {
3404 n = atoi(testp->cellname);
3406 testp->fid.cell = n;
3408 cellp = cm_GetCell(testp->cellname, 0);
3411 if (testp->fid.cell > 0) {
3412 cellp = cm_FindCellByID(testp->fid.cell, 0);
3416 return CM_ERROR_NOSUCHCELL;
3418 if (testp->volname[0]) {
3419 n = atoi(testp->volname);
3421 testp->fid.volume = n;
3423 code = cm_FindVolumeByName(cellp, testp->volname, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3426 if (testp->fid.volume > 0)
3427 code = cm_FindVolumeByID(cellp, testp->fid.volume, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3432 if (testp->fid.volume)
3433 statep = cm_VolumeStateByID(volp, testp->fid.volume);
3435 statep = cm_VolumeStateByName(volp, testp->volname);
3438 statep->state = testp->state;
3439 code = cm_VolStatus_Change_Notification(cellp->cellID, statep->ID, testp->state);
3448 * VIOC_GETUNIXMODE internals.
3450 * Assumes that pioctl path has been parsed or skipped.
3451 * scp is held but not locked.
3454 cm_IoctlGetUnixMode(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3459 lock_ObtainWrite(&scp->rw);
3460 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
3461 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3463 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3464 lock_ReleaseWrite(&scp->rw);
3467 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
3468 cp = ioctlp->outDatap;
3469 memcpy(cp, (char *)&scp->unixModeBits, sizeof(afs_uint32));
3470 cp += sizeof(afs_uint32);
3472 /* return new size */
3473 ioctlp->outDatap = cp;
3480 * VIOC_SETUNIXMODE internals.
3482 * Assumes that pioctl path has been parsed or skipped
3483 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
3485 * scp is held but not locked.
3488 cm_IoctlSetUnixMode(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3493 lock_ObtainWrite(&scp->rw);
3494 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
3495 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3497 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
3498 lock_ReleaseWrite(&scp->rw);
3501 afs_uint32 unixModeBits;
3504 memset(&attr, 0, sizeof(attr));
3506 cp = ioctlp->inDatap;
3507 memcpy((char *)&unixModeBits, cp, sizeof(afs_uint32));
3509 attr.mask = CM_ATTRMASK_UNIXMODEBITS;
3510 attr.unixModeBits = unixModeBits;
3512 code = cm_SetAttr(scp, &attr, userp, reqp);