2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afs/param.h>
12 #include <afs/cellconfig.h>
13 #include <afs/ptserver.h>
27 #include "afsd_init.h"
28 #include <WINNT\afsreg.h>
46 /* Copied from afs_tokens.h */
47 #define PIOCTL_LOGON 0x1
50 const char utf8_prefix[] = UTF8_PREFIX;
51 const int utf8_prefix_size = sizeof(utf8_prefix) - sizeof(char);
53 osi_mutex_t cm_Afsdsbmt_Lock;
55 extern afs_int32 cryptall;
56 extern char cm_NetbiosName[];
57 extern clientchar_t cm_NetbiosNameC[];
59 extern void afsi_log(char *pattern, ...);
61 void cm_InitIoctl(void)
63 lock_InitializeMutex(&cm_Afsdsbmt_Lock, "AFSDSBMT.INI Access Lock",
64 LOCK_HIERARCHY_AFSDBSBMT_GLOBAL);
68 * Utility function. (Not currently in use.)
69 * This function forces all dirty buffers to the file server and
70 * then discards the status info.
73 cm_CleanFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
77 code = buf_CleanVnode(scp, userp, reqp);
79 lock_ObtainWrite(&scp->rw);
80 cm_DiscardSCache(scp);
81 lock_ReleaseWrite(&scp->rw);
83 osi_Log2(afsd_logp,"cm_CleanFile scp 0x%x returns error: [%x]",scp, code);
88 * Utility function. Used within this file.
89 * scp must be held but not locked.
92 cm_FlushFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
96 #ifdef AFS_FREELANCE_CLIENT
97 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
98 cm_noteLocalMountPointChange();
103 code = buf_FlushCleanPages(scp, userp, reqp);
105 if (scp->fileType == CM_SCACHETYPE_DIRECTORY)
106 lock_ObtainWrite(&scp->dirlock);
107 lock_ObtainWrite(&scp->rw);
108 cm_DiscardSCache(scp);
109 if (scp->fileType == CM_SCACHETYPE_DIRECTORY) {
110 cm_ResetSCacheDirectory(scp, 1);
111 lock_ReleaseWrite(&scp->dirlock);
113 lock_ReleaseWrite(&scp->rw);
115 osi_Log2(afsd_logp,"cm_FlushFile scp 0x%x returns error: [%x]",scp, code);
120 * Utility function. (Not currently in use)
121 * IoctlPath must be parsed or skipped prior to calling.
122 * scp must be held but not locked.
125 cm_FlushParent(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
130 pscp = cm_FindSCacheParent(scp);
132 /* now flush the file */
133 code = cm_FlushFile(pscp, userp, reqp);
134 cm_ReleaseSCache(pscp);
140 * Utility function. Used within this function.
143 cm_FlushVolume(cm_user_t *userp, cm_req_t *reqp, afs_uint32 cell, afs_uint32 volume)
149 #ifdef AFS_FREELANCE_CLIENT
150 if ( cell == AFS_FAKE_ROOT_CELL_ID && volume == AFS_FAKE_ROOT_VOL_ID ) {
151 cm_noteLocalMountPointChange();
156 lock_ObtainWrite(&cm_scacheLock);
157 for (i=0; i<cm_data.scacheHashTableSize; i++) {
158 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
159 if (scp->fid.volume == volume && scp->fid.cell == cell) {
160 cm_HoldSCacheNoLock(scp);
161 lock_ReleaseWrite(&cm_scacheLock);
163 /* now flush the file */
164 code = cm_FlushFile(scp, userp, reqp);
165 lock_ObtainWrite(&cm_scacheLock);
166 cm_ReleaseSCacheNoLock(scp);
170 lock_ReleaseWrite(&cm_scacheLock);
176 * TranslateExtendedChars - This is a fix for TR 54482.
178 * If an extended character (80 - FF) is entered into a file
179 * or directory name in Windows, the character is translated
180 * into the OEM character map before being passed to us.
181 * The pioctl functions must match
182 * this translation for paths given via our own commands (like
183 * fs). If we do not do this, then we will try to perform an
184 * operation on a non-translated path, which we will fail to
185 * find, since the path was created with the translated chars.
186 * This function performs the required translation.
188 * OEM character code pages are used by the non-Unicode SMB
189 * mode. Do not use if the CM_IOCTLFLAG_USEUTF8 is set.
192 TranslateExtendedChars(char *str)
197 CharToOemA(str, str);
200 void cm_SkipIoctlPath(cm_ioctl_t *ioctlp)
204 temp = strlen(ioctlp->inDatap) + 1;
205 ioctlp->inDatap += temp;
209 clientchar_t * cm_ParseIoctlStringAlloc(cm_ioctl_t *ioctlp, const char * ext_instrp)
211 clientchar_t * rs = NULL;
214 instrp = (ext_instrp)?ext_instrp:ioctlp->inDatap;
216 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
217 rs = cm_Utf8ToClientStringAlloc(instrp, -1, NULL);
221 /* Not a UTF-8 string */
222 if (smb_StoreAnsiFilenames) {
223 cch = cm_AnsiToClientString(instrp, -1, NULL, 0);
227 rs = malloc(cch * sizeof(clientchar_t));
228 cm_AnsiToClientString(instrp, -1, rs, cch);
230 cch = cm_OemToClientString(instrp, -1, NULL, 0);
234 rs = malloc(cch * sizeof(clientchar_t));
235 cm_OemToClientString(instrp, -1, rs, cch);
239 if (ext_instrp == NULL) {
240 ioctlp->inDatap += strlen(ioctlp->inDatap) + 1;
245 int cm_UnparseIoctlString(cm_ioctl_t *ioctlp,
247 const clientchar_t * cstr, int cchlen)
252 outp = ((ext_outp == NULL)? ioctlp->outDatap : ext_outp);
254 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
255 cchout = cm_ClientStringToUtf8(cstr, cchlen, outp,
256 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp));
258 if (smb_StoreAnsiFilenames) {
259 cchout = WideCharToMultiByte(CP_ACP, 0, cstr, cchlen,
261 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
264 cchout = WideCharToMultiByte(CP_OEMCP, 0, cstr, cchlen,
266 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
271 if (cchout > 0 && ext_outp == NULL) {
272 ioctlp->outDatap += cchout;
279 * Must be called before XXX_ParseIoctlPath or cm_SkipIoctlPath
281 cm_ioctlQueryOptions_t *
282 cm_IoctlGetQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
284 afs_uint32 pathlen = strlen(ioctlp->inDatap) + 1;
285 char *p = ioctlp->inDatap + pathlen;
286 cm_ioctlQueryOptions_t * optionsp = NULL;
288 if (ioctlp->inCopied > p - ioctlp->inAllocp) {
289 optionsp = (cm_ioctlQueryOptions_t *)p;
290 if (optionsp->size < 12 /* minimum size of struct */)
298 * Must be called after smb_ParseIoctlPath or cm_SkipIoctlPath
299 * or any other time that ioctlp->inDatap points at the
300 * cm_ioctlQueryOptions_t object.
303 cm_IoctlSkipQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
305 cm_ioctlQueryOptions_t * optionsp = (cm_ioctlQueryOptions_t *)ioctlp->inDatap;
306 ioctlp->inDatap += optionsp->size;
309 /* format the specified path to look like "/afs/<cellname>/usr", by
310 * adding "/afs" (if necessary) in front, changing any \'s to /'s, and
311 * removing any trailing "/"'s. One weirdo caveat: "/afs" will be
312 * intentionally returned as "/afs/"--this makes submount manipulation
313 * easier (because we can always jump past the initial "/afs" to find
314 * the AFS path that should be written into afsdsbmt.ini).
317 cm_NormalizeAfsPath(clientchar_t *outpathp, long cchlen, clientchar_t *inpathp)
320 clientchar_t bslash_mountRoot[256];
322 cm_ClientStrCpy(bslash_mountRoot, lengthof(bslash_mountRoot), cm_mountRootC);
323 bslash_mountRoot[0] = '\\';
325 if (!cm_ClientStrCmpNI(inpathp, cm_mountRootC, cm_mountRootCLen))
326 cm_ClientStrCpy(outpathp, cchlen, inpathp);
327 else if (!cm_ClientStrCmpNI(inpathp, bslash_mountRoot,
328 cm_ClientStrLen(bslash_mountRoot)))
329 cm_ClientStrCpy(outpathp, cchlen, inpathp);
330 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
331 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s%s"), cm_mountRootC, inpathp);
332 else // inpathp looks like "<cell>/usr"
333 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s/%s"), cm_mountRootC, inpathp);
335 for (cp = outpathp; *cp != 0; ++cp) {
340 if (cm_ClientStrLen(outpathp) && (outpathp[cm_ClientStrLen(outpathp)-1] == '/')) {
341 outpathp[cm_ClientStrLen(outpathp)-1] = 0;
344 if (!cm_ClientStrCmpI(outpathp, cm_mountRootC)) {
345 cm_ClientStrCpy(outpathp, cchlen, cm_mountRootC);
349 void cm_NormalizeAfsPathAscii(char *outpathp, long outlen, char *inpathp)
352 char bslash_mountRoot[256];
354 strncpy(bslash_mountRoot, cm_mountRoot, sizeof(bslash_mountRoot) - 1);
355 bslash_mountRoot[0] = '\\';
357 if (!strnicmp (inpathp, cm_mountRoot, strlen(cm_mountRoot)))
358 StringCbCopy(outpathp, outlen, inpathp);
359 else if (!strnicmp (inpathp, bslash_mountRoot, strlen(bslash_mountRoot)))
360 StringCbCopy(outpathp, outlen, inpathp);
361 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
362 StringCbPrintfA(outpathp, outlen, "%s%s", cm_mountRoot, inpathp);
363 else // inpathp looks like "<cell>/usr"
364 StringCbPrintfA(outpathp, outlen, "%s/%s", cm_mountRoot, inpathp);
366 for (cp = outpathp; *cp != 0; ++cp) {
371 if (strlen(outpathp) && (outpathp[strlen(outpathp)-1] == '/')) {
372 outpathp[strlen(outpathp)-1] = 0;
375 if (!_stricmp (outpathp, cm_mountRoot)) {
376 StringCbCopy(outpathp, outlen, cm_mountRoot);
382 * VIOCGETAL internals.
384 * Assumes that pioctl path has been parsed or skipped.
385 * scp is held but not locked.
388 cm_IoctlGetACL(cm_ioctl_t *ioctlp, cm_user_t *userp, cm_scache_t *scp, cm_req_t *reqp)
393 AFSFetchStatus fileStatus;
397 struct rx_connection * rxconnp;
399 memset(&volSync, 0, sizeof(volSync));
401 /* now make the get acl call */
402 #ifdef AFS_FREELANCE_CLIENT
403 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
405 ioctlp->outDatap[0] ='\0';
409 afid.Volume = scp->fid.volume;
410 afid.Vnode = scp->fid.vnode;
411 afid.Unique = scp->fid.unique;
413 acl.AFSOpaque_val = ioctlp->outDatap;
414 acl.AFSOpaque_len = 0;
415 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
419 rxconnp = cm_GetRxConn(connp);
420 code = RXAFS_FetchACL(rxconnp, &afid, &acl, &fileStatus, &volSync);
421 rx_PutConnection(rxconnp);
423 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
424 code = cm_MapRPCError(code, reqp);
429 /* skip over return data */
430 tlen = (int)strlen(ioctlp->outDatap) + 1;
431 ioctlp->outDatap += tlen;
433 /* and return success */
439 * VIOC_FILE_CELL_NAME internals.
441 * Assumes that pioctl path has been parsed or skipped.
442 * scp is held but not locked.
445 cm_IoctlGetFileCellName(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
450 #ifdef AFS_FREELANCE_CLIENT
451 if ( cm_freelanceEnabled &&
452 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
453 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID &&
454 scp->fid.vnode==0x1 && scp->fid.unique==0x1 ) {
455 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
456 ioctlp->outDatap += strlen(ioctlp->outDatap) + 1;
459 #endif /* AFS_FREELANCE_CLIENT */
461 cellp = cm_FindCellByID(scp->fid.cell, CM_FLAG_NOPROBE);
463 clientchar_t * cellname;
465 cellname = cm_FsStringToClientStringAlloc(cellp->name, -1, NULL);
466 if (cellname == NULL) {
467 code = CM_ERROR_NOSUCHCELL;
469 cm_UnparseIoctlString(ioctlp, NULL, cellname, -1);
474 code = CM_ERROR_NOSUCHCELL;
482 * VIOCSETAL internals.
484 * Assumes that pioctl path has been parsed or skipped.
485 * scp is held but not locked.
488 cm_IoctlSetACL(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
493 AFSFetchStatus fileStatus;
496 struct rx_connection * rxconnp;
498 memset(&volSync, 0, sizeof(volSync));
500 #ifdef AFS_FREELANCE_CLIENT
501 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
502 code = CM_ERROR_NOACCESS;
506 /* now make the get acl call */
507 fid.Volume = scp->fid.volume;
508 fid.Vnode = scp->fid.vnode;
509 fid.Unique = scp->fid.unique;
511 acl.AFSOpaque_val = ioctlp->inDatap;
512 acl.AFSOpaque_len = (u_int)strlen(ioctlp->inDatap)+1;
513 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
517 rxconnp = cm_GetRxConn(connp);
518 code = RXAFS_StoreACL(rxconnp, &fid, &acl, &fileStatus, &volSync);
519 rx_PutConnection(rxconnp);
521 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
522 code = cm_MapRPCError(code, reqp);
524 /* invalidate cache info, since we just trashed the ACL cache */
525 lock_ObtainWrite(&scp->rw);
526 cm_DiscardSCache(scp);
527 lock_ReleaseWrite(&scp->rw);
534 * VIOC_FLUSHALL internals.
536 * Assumes that pioctl path has been parsed or skipped.
539 cm_IoctlFlushAllVolumes(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
545 lock_ObtainWrite(&cm_scacheLock);
546 for (i=0; i<cm_data.scacheHashTableSize; i++) {
547 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
548 cm_HoldSCacheNoLock(scp);
549 lock_ReleaseWrite(&cm_scacheLock);
551 /* now flush the file */
552 code = cm_FlushFile(scp, userp, reqp);
553 lock_ObtainWrite(&cm_scacheLock);
554 cm_ReleaseSCacheNoLock(scp);
557 lock_ReleaseWrite(&cm_scacheLock);
563 * VIOC_FLUSHVOLUME internals.
565 * Assumes that pioctl path has been parsed or skipped.
566 * scp is held but not locked.
569 cm_IoctlFlushVolume(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
575 #ifdef AFS_FREELANCE_CLIENT
576 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
577 code = CM_ERROR_NOACCESS;
581 volume = scp->fid.volume;
582 cell = scp->fid.cell;
583 code = cm_FlushVolume(userp, reqp, cell, volume);
589 * VIOCFLUSH internals.
591 * Assumes that pioctl path has been parsed or skipped.
592 * scp is held but not locked.
595 cm_IoctlFlushFile(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
599 #ifdef AFS_FREELANCE_CLIENT
600 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
601 code = CM_ERROR_NOACCESS;
605 cm_FlushFile(scp, userp, reqp);
612 * VIOCSETVOLSTAT internals.
614 * Assumes that pioctl path has been parsed or skipped.
615 * scp is held but not locked.
618 cm_IoctlSetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
622 char offLineMsg[256];
625 AFSFetchVolumeStatus volStat;
626 AFSStoreVolumeStatus storeStat;
631 struct rx_connection * rxconnp;
633 #ifdef AFS_FREELANCE_CLIENT
634 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
635 code = CM_ERROR_NOACCESS;
639 cellp = cm_FindCellByID(scp->fid.cell, 0);
640 osi_assertx(cellp, "null cm_cell_t");
642 if (scp->flags & CM_SCACHEFLAG_RO)
643 return CM_ERROR_READONLY;
645 code = cm_FindVolumeByID(cellp, scp->fid.volume, userp, reqp,
646 CM_GETVOL_FLAG_CREATE, &tvp);
652 /* Copy the junk out, using cp as a roving pointer. */
653 memcpy((char *)&volStat, ioctlp->inDatap, sizeof(AFSFetchVolumeStatus));
654 ioctlp->inDatap += sizeof(AFSFetchVolumeStatus);
656 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
657 cm_ClientStringToFsString(strp, -1, volName, lengthof(volName));
660 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
661 cm_ClientStringToFsString(strp, -1, offLineMsg, lengthof(offLineMsg));
664 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
665 cm_ClientStringToFsString(strp, -1, motd, lengthof(motd));
671 if (volStat.MinQuota != -1) {
672 storeStat.MinQuota = volStat.MinQuota;
673 storeStat.Mask |= AFS_SETMINQUOTA;
675 if (volStat.MaxQuota != -1) {
676 storeStat.MaxQuota = volStat.MaxQuota;
677 storeStat.Mask |= AFS_SETMAXQUOTA;
681 code = cm_ConnFromFID(&scp->fid, userp, reqp, &tcp);
685 rxconnp = cm_GetRxConn(tcp);
686 code = RXAFS_SetVolumeStatus(rxconnp, scp->fid.volume,
687 &storeStat, volName, offLineMsg, motd);
688 rx_PutConnection(rxconnp);
690 } while (cm_Analyze(tcp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
691 code = cm_MapRPCError(code, reqp);
694 /* return on failure */
698 /* we are sending parms back to make compat. with prev system. should
699 * change interface later to not ask for current status, just set
702 cp = ioctlp->outDatap;
703 memcpy(cp, (char *)&volStat, sizeof(VolumeStatus));
704 cp += sizeof(VolumeStatus);
705 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
706 cp += strlen(volName)+1;
707 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
708 cp += strlen(offLineMsg)+1;
709 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
710 cp += strlen(motd)+1;
712 /* now return updated return data pointer */
713 ioctlp->outDatap = cp;
720 * VIOCGETVOLSTAT internals.
722 * Assumes that pioctl path has been parsed or skipped.
723 * scp is held but not locked.
726 cm_IoctlGetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
729 char volName[32]="(unknown)";
730 char offLineMsg[256]="server temporarily inaccessible";
731 char motd[256]="server temporarily inaccessible";
733 AFSFetchVolumeStatus volStat;
738 struct rx_connection * rxconnp;
740 #ifdef AFS_FREELANCE_CLIENT
741 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
743 strncpy(volName, "Freelance.Local.Root", sizeof(volName));
744 offLineMsg[0] = '\0';
745 strncpy(motd, "Freelance mode in use.", sizeof(motd));
746 volStat.Vid = scp->fid.volume;
747 volStat.MaxQuota = 0;
748 volStat.BlocksInUse = 100;
749 volStat.PartBlocksAvail = 0;
750 volStat.PartMaxBlocks = 100;
755 OfflineMsg = offLineMsg;
758 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
761 rxconnp = cm_GetRxConn(connp);
762 code = RXAFS_GetVolumeStatus(rxconnp, scp->fid.volume,
763 &volStat, &Name, &OfflineMsg, &MOTD);
764 rx_PutConnection(rxconnp);
766 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
767 code = cm_MapRPCError(code, reqp);
773 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
774 cp = ioctlp->outDatap;
775 memcpy(cp, (char *)&volStat, sizeof(AFSFetchVolumeStatus));
776 cp += sizeof(AFSFetchVolumeStatus);
777 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
778 cp += strlen(volName)+1;
779 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
780 cp += strlen(offLineMsg)+1;
781 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
782 cp += strlen(motd)+1;
784 /* return new size */
785 ioctlp->outDatap = cp;
791 * VIOCGETFID internals.
793 * Assumes that pioctl path has been parsed or skipped.
794 * scp is held but not locked.
797 cm_IoctlGetFid(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
802 memset(&fid, 0, sizeof(cm_fid_t));
803 fid.cell = scp->fid.cell;
804 fid.volume = scp->fid.volume;
805 fid.vnode = scp->fid.vnode;
806 fid.unique = scp->fid.unique;
808 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
809 cp = ioctlp->outDatap;
810 memcpy(cp, (char *)&fid, sizeof(cm_fid_t));
811 cp += sizeof(cm_fid_t);
813 /* return new size */
814 ioctlp->outDatap = cp;
820 * VIOC_GETFILETYPE internals.
822 * Assumes that pioctl path has been parsed or skipped.
823 * scp is held but not locked.
826 cm_IoctlGetFileType(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
830 afs_uint32 fileType = 0;
832 if (scp->fileType == 0) {
833 lock_ObtainWrite(&scp->rw);
834 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
835 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
837 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
838 lock_ReleaseWrite(&scp->rw);
842 fileType = scp->fileType;
844 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
845 cp = ioctlp->outDatap;
846 memcpy(cp, (char *)&fileType, sizeof(fileType));
847 cp += sizeof(fileType);
849 /* return new size */
850 ioctlp->outDatap = cp;
856 * VIOCGETOWNER internals.
858 * Assumes that pioctl path has been parsed or skipped.
859 * scp is held but not locked.
862 cm_IoctlGetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
867 lock_ObtainWrite(&scp->rw);
868 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
869 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
871 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
872 lock_ReleaseWrite(&scp->rw);
875 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
876 cp = ioctlp->outDatap;
877 memcpy(cp, (char *)&scp->owner, sizeof(afs_uint32));
878 cp += sizeof(afs_uint32);
879 memcpy(cp, (char *)&scp->group, sizeof(afs_uint32));
880 cp += sizeof(afs_uint32);
882 /* return new size */
883 ioctlp->outDatap = cp;
890 * VIOC_SETOWNER internals.
892 * Assumes that pioctl path has been parsed or skipped
893 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
895 * scp is held but not locked.
899 cm_IoctlSetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
904 lock_ObtainWrite(&scp->rw);
905 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
906 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
908 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
909 lock_ReleaseWrite(&scp->rw);
915 memset(&attr, 0, sizeof(attr));
917 cp = ioctlp->inDatap;
918 memcpy((char *)&owner, cp, sizeof(afs_uint32));
920 attr.mask = CM_ATTRMASK_OWNER;
923 code = cm_SetAttr(scp, &attr, userp, reqp);
930 * VIOC_SETGROUP internals.
932 * Assumes that pioctl path has been parsed or skipped
933 * and that cm_ioctlQueryOptions_t have been parsed and skipped.
937 cm_IoctlSetGroup(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
942 lock_ObtainWrite(&scp->rw);
943 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
944 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
946 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
947 lock_ReleaseWrite(&scp->rw);
953 memset(&attr, 0, sizeof(attr));
955 cp = ioctlp->inDatap;
956 memcpy((char *)&group, cp, sizeof(afs_uint32));
958 attr.mask = CM_ATTRMASK_GROUP;
961 code = cm_SetAttr(scp, &attr, userp, reqp);
968 * VIOCWHEREIS internals.
970 * Assumes that pioctl path has been parsed or skipped.
971 * scp is held but not locked.
974 cm_IoctlWhereIs(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
979 cm_serverRef_t **tsrpp, *current;
984 volume = scp->fid.volume;
986 cellp = cm_FindCellByID(scp->fid.cell, 0);
989 return CM_ERROR_NOSUCHCELL;
991 #ifdef AFS_FREELANCE_CLIENT
992 if ( cellp->cellID == AFS_FAKE_ROOT_CELL_ID) {
1000 cp = ioctlp->outDatap;
1002 memcpy(cp, (char *)&addr, sizeof(addr));
1005 /* still room for terminating NULL, add it on */
1007 memcpy(cp, (char *)&addr, sizeof(addr));
1010 ioctlp->outDatap = cp;
1014 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
1018 cp = ioctlp->outDatap;
1020 tsrpp = cm_GetVolServers(tvp, volume, userp, reqp);
1021 if (tsrpp == NULL) {
1022 code = CM_ERROR_NOSUCHVOLUME;
1024 lock_ObtainRead(&cm_serverLock);
1025 for (current = *tsrpp; current; current = current->next) {
1026 tsp = current->server;
1027 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1030 lock_ReleaseRead(&cm_serverLock);
1031 cm_FreeServerList(tsrpp, 0);
1033 /* still room for terminating NULL, add it on */
1034 volume = 0; /* reuse vbl */
1035 memcpy(cp, (char *)&volume, sizeof(long));
1038 ioctlp->outDatap = cp;
1045 * VIOC_AFS_STAT_MT_PT internals.
1047 * Assumes that pioctl path has been parsed or skipped.
1048 * scp is held but not locked.
1051 cm_IoctlStatMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1057 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1059 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1063 lock_ObtainWrite(&scp->rw);
1064 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1065 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1067 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1071 /* now check that this is a real mount point */
1072 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1073 code = CM_ERROR_INVAL;
1077 code = cm_ReadMountPoint(scp, userp, reqp);
1080 strp = ioctlp->outDatap;
1081 StringCbCopyA(strp, SMB_IOCTL_MAXDATA - (strp - ioctlp->outAllocp), scp->mountPointStringp);
1082 strp += strlen(strp) + 1;
1083 ioctlp->outDatap = strp;
1087 lock_ReleaseWrite(&scp->rw);
1088 cm_ReleaseSCache(scp);
1098 * VIOC_AFS_DELETE_MT_PT internals.
1100 * Assumes that pioctl path has been parsed or skipped.
1101 * scp is held but not locked.
1104 cm_IoctlDeleteMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1108 clientchar_t *cp = NULL;
1109 fschar_t *originalName = NULL;
1112 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1114 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1116 /* if something went wrong, bail out now */
1120 lock_ObtainWrite(&scp->rw);
1121 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1122 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1126 /* now check that this is a real mount point */
1127 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1128 code = CM_ERROR_INVAL;
1132 /* time to make the RPC, so drop the lock */
1133 lock_ReleaseWrite(&scp->rw);
1136 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
1138 code = cm_BPlusDirLookupOriginalName(&dirop, cp, &originalName);
1139 /* The cm_Dir* functions can't be used to lookup the
1140 originalName. Those functions only know of the original
1142 cm_EndDirOp(&dirop);
1146 /* If this name doesn't have a non-normalized name associated with
1147 it, we assume that what we had is what is actually present on
1150 if (originalName == NULL) {
1151 originalName = cm_ClientStringToFsStringAlloc(cp, -1, NULL);
1154 /* cp is a normalized name. originalName is the actual name we
1155 saw on the fileserver. */
1156 #ifdef AFS_FREELANCE_CLIENT
1157 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1158 /* we are removing the mount point to the root dir., so call
1159 * the freelance code to do the deletion. */
1160 osi_Log0(afsd_logp,"IoctlDeleteMountPoint from Freelance root dir");
1161 code = cm_FreelanceRemoveMount(originalName);
1165 /* easier to do it this way */
1166 code = cm_Unlink(dscp, originalName, cp, userp, reqp);
1168 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1169 smb_NotifyChange(FILE_ACTION_REMOVED,
1170 FILE_NOTIFY_CHANGE_DIR_NAME,
1171 dscp, cp, NULL, TRUE);
1173 lock_ObtainWrite(&scp->rw);
1175 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1178 cm_DiscardSCache(scp);
1179 lock_ReleaseWrite(&scp->rw);
1180 cm_ReleaseSCache(scp);
1183 if (originalName != NULL)
1193 * VIOCCKSERV internals.
1195 * Assumes that pioctl path has been parsed or skipped.
1198 cm_IoctlCheckServers(struct cm_ioctl *ioctlp, struct cm_user *userp)
1208 tp = ioctlp->inDatap;
1211 memcpy(&temp, tp, sizeof(temp));
1212 if (temp == 0x12345678) { /* For afs3.3 version */
1213 memcpy(&csi, tp, sizeof(csi));
1214 if (csi.tinterval >= 0) {
1215 cp = ioctlp->outDatap;
1216 memcpy(cp, (char *)&cm_daemonCheckDownInterval, sizeof(long));
1217 ioctlp->outDatap += sizeof(long);
1218 if (csi.tinterval > 0) {
1219 if (!smb_SUser(userp))
1220 return CM_ERROR_NOACCESS;
1221 cm_daemonCheckDownInterval = csi.tinterval;
1229 } else { /* For pre afs3.3 versions */
1230 memcpy((char *)&temp, ioctlp->inDatap, sizeof(long));
1231 ioctlp->inDatap = cp = ioctlp->inDatap + sizeof(long);
1232 if (cp - ioctlp->inAllocp < ioctlp->inCopied) /* still more data available */
1237 * 1: fast check, don't contact servers.
1238 * 2: local cell only.
1241 /* have cell name, too */
1242 cellp = cm_GetCell(cp, (temp & 1) ? CM_FLAG_NOPROBE : 0);
1244 return CM_ERROR_NOSUCHCELL;
1247 cellp = (cm_cell_t *) 0;
1248 if (!cellp && (temp & 2)) {
1249 /* use local cell */
1250 fschar_t wscell[CELL_MAXNAMELEN+1];
1251 cm_GetRootCellName(wscell);
1252 cellp = cm_GetCell(wscell, 0);
1254 if (!(temp & 1)) { /* if not fast, call server checker routine */
1255 /* check down servers */
1256 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS | CM_FLAG_CHECKUPSERVERS, cellp);
1259 /* now return the current down server list */
1260 cp = ioctlp->outDatap;
1261 lock_ObtainRead(&cm_serverLock);
1262 for (tsp = cm_allServersp; tsp; tsp=tsp->allNextp) {
1263 if (cellp && tsp->cellp != cellp)
1264 continue; /* cell spec'd and wrong */
1265 if ((tsp->flags & CM_SERVERFLAG_DOWN)
1266 && tsp->type == CM_SERVER_FILE) {
1267 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1271 lock_ReleaseRead(&cm_serverLock);
1273 ioctlp->outDatap = cp;
1278 * VIOCCKBACK internals.
1280 * Assumes that pioctl path has been parsed or skipped.
1283 cm_IoctlCheckVolumes(cm_ioctl_t *ioctlp, cm_user_t *userp)
1285 cm_RefreshVolumes();
1290 * VIOCSETCACHESIZE internals.
1292 * Assumes that pioctl path has been parsed or skipped.
1294 * This function is no longer meaningful in the current day world
1295 * of persistent caches. The buf_SetNBuffers() function will
1299 cm_IoctlSetCacheSize(struct cm_ioctl *ioctlp, struct cm_user *userp)
1304 memcpy(&temp, ioctlp->inDatap, sizeof(temp));
1306 temp = cm_data.buf_nOrigBuffers;
1308 /* temp is in 1K units, convert to # of buffers */
1309 temp = temp / (cm_data.buf_blockSize / 1024);
1312 /* now adjust the cache size */
1313 code = buf_SetNBuffers(temp);
1319 * VIOC_TRACECTL internals.
1321 * Assumes that pioctl path has been parsed or skipped.
1324 cm_IoctlTraceControl(cm_ioctl_t *ioctlp, cm_user_t *userp)
1328 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_uint32));
1332 afsd_ForceTrace(FALSE);
1333 buf_ForceTrace(FALSE);
1337 /* set tracing value to low order bit */
1338 if ((inValue & 1) == 0) {
1339 /* disable tracing */
1340 osi_LogDisable(afsd_logp);
1341 rx_DebugOnOff(FALSE);
1344 /* enable tracing */
1345 osi_LogEnable(afsd_logp);
1346 rx_DebugOnOff(TRUE);
1350 /* see if we're supposed to do a reset, too */
1352 osi_LogReset(afsd_logp);
1355 /* and copy out tracing flag */
1356 inValue = afsd_logp->enabled; /* use as a temp vbl */
1357 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_uint32));
1358 ioctlp->outDatap += sizeof(afs_uint32);
1363 * VIOCGETCACHEPARMS internals.
1365 * Assumes that pioctl path has been parsed or skipped.
1368 cm_IoctlGetCacheParms(struct cm_ioctl *ioctlp, struct cm_user *userp)
1370 cm_cacheParms_t parms;
1372 memset(&parms, 0, sizeof(parms));
1374 /* first we get, in 1K units, the cache size */
1375 parms.parms[0] = cm_data.buf_nbuffers * (cm_data.buf_blockSize / 1024);
1377 /* and then the actual # of buffers in use (not in the free list, I guess,
1378 * will be what we do).
1380 parms.parms[1] = (cm_data.buf_nbuffers - buf_CountFreeList()) * (cm_data.buf_blockSize / 1024);
1382 memcpy(ioctlp->outDatap, &parms, sizeof(parms));
1383 ioctlp->outDatap += sizeof(parms);
1389 * VIOCGETCELL internals.
1391 * Assumes that pioctl path has been parsed or skipped.
1394 cm_IoctlGetCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1399 cm_serverRef_t *serverRefp;
1400 cm_server_t *serverp;
1406 tp = ioctlp->inDatap;
1408 memcpy((char *)&whichCell, tp, sizeof(long));
1411 /* see if more than one long passed in, ignoring the null pathname (the -1) */
1412 if (ioctlp->inCopied-1 > sizeof(afs_uint32)) {
1413 memcpy((char *)&magic, tp, sizeof(afs_uint32));
1416 lock_ObtainRead(&cm_cellLock);
1417 for (tcellp = cm_data.allCellsp; tcellp; tcellp = tcellp->allNextp) {
1422 lock_ReleaseRead(&cm_cellLock);
1425 clientchar_t * cellnamep;
1427 cp = ioctlp->outDatap;
1429 if (magic == 0x12345678) {
1430 memcpy(cp, (char *)&magic, sizeof(long));
1433 memset(cp, 0, max * sizeof(long));
1435 lock_ObtainRead(&cm_serverLock); /* for going down server list */
1436 for (i=0, serverRefp = tcellp->vlServersp;
1437 serverRefp && i<max;
1438 i++, serverRefp = serverRefp->next) {
1439 serverp = serverRefp->server;
1440 memcpy(cp, &serverp->addr.sin_addr.s_addr, sizeof(long));
1443 lock_ReleaseRead(&cm_serverLock);
1444 ioctlp->outDatap = basep + max * sizeof(afs_int32);
1446 cellnamep = cm_FsStringToClientStringAlloc(tcellp->name, -1, NULL);
1448 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1458 return CM_ERROR_NOMORETOKENS; /* mapped to EDOM */
1463 * VIOCNEWCELL internals.
1465 * Assumes that pioctl path has been parsed or skipped.
1468 cm_IoctlNewCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1471 * All that needs to be done is to refresh server information for all cells that
1472 * are already loaded.
1474 * cell list will be cm_CellLock and cm_ServerLock will be held for write.
1478 cm_cell_rock_t rock;
1480 lock_ObtainWrite(&cm_cellLock);
1482 for (cp = cm_data.allCellsp; cp; cp=cp->allNextp)
1486 /* delete all previous server lists - cm_FreeServerList will ask for write on cm_ServerLock*/
1487 cm_FreeServerList(&cp->vlServersp, CM_FREESERVERLIST_DELETE);
1488 cp->vlServersp = NULL;
1489 lock_ReleaseWrite(&cm_cellLock);
1493 code = cm_SearchCellRegistry(1, cp->name, cp->name, cp->linkedName, cm_AddCellProc, &rock);
1494 if (code && code != CM_ERROR_FORCE_DNS_LOOKUP)
1495 code = cm_SearchCellFileEx(cp->name, cp->name, cp->linkedName, cm_AddCellProc, &rock);
1496 #ifdef AFS_AFSDB_ENV
1498 if (cm_dnsEnabled) {
1500 code = cm_SearchCellByDNS(cp->name, cp->name, &ttl, cm_AddCellProc, &rock);
1501 if ( code == 0 ) { /* got cell from DNS */
1502 lock_ObtainMutex(&cp->mx);
1503 cp->flags |= CM_CELLFLAG_DNS;
1504 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1505 cp->timeout = time(0) + ttl;
1506 lock_ReleaseMutex(&cp->mx);
1511 lock_ObtainMutex(&cp->mx);
1512 cp->flags &= ~CM_CELLFLAG_DNS;
1513 lock_ReleaseMutex(&cp->mx);
1515 #endif /* AFS_AFSDB_ENV */
1517 lock_ObtainMutex(&cp->mx);
1518 cp->flags |= CM_CELLFLAG_VLSERVER_INVALID;
1519 lock_ReleaseMutex(&cp->mx);
1520 lock_ObtainWrite(&cm_cellLock);
1523 lock_ObtainMutex(&cp->mx);
1524 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1525 lock_ReleaseMutex(&cp->mx);
1526 lock_ObtainWrite(&cm_cellLock);
1527 cm_RandomizeServer(&cp->vlServersp);
1530 lock_ReleaseWrite(&cm_cellLock);
1535 * VIOC_GET_WS_CELL internals.
1537 * Assumes that pioctl path has been parsed or skipped.
1540 cm_IoctlGetWsCell(cm_ioctl_t *ioctlp, cm_user_t *userp)
1544 if (cm_freelanceEnabled) {
1545 if (cm_GetRootCellName(ioctlp->outDatap))
1546 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
1547 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
1548 } else if (cm_data.rootCellp) {
1549 clientchar_t * cellnamep = cm_FsStringToClientStringAlloc(cm_data.rootCellp->name, -1, NULL);
1550 /* return the default cellname to the caller */
1552 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1555 code = CM_ERROR_NOSUCHCELL;
1558 /* if we don't know our default cell, return failure */
1559 code = CM_ERROR_NOSUCHCELL;
1566 * VIOC_AFS_SYSNAME internals.
1568 * Assumes that pioctl path has been parsed or skipped.
1571 cm_IoctlSysName(struct cm_ioctl *ioctlp, struct cm_user *userp)
1573 afs_uint32 setSysName;
1575 clientchar_t *inname = NULL;
1578 memcpy(&setSysName, ioctlp->inDatap, sizeof(afs_uint32));
1579 ioctlp->inDatap += sizeof(afs_uint32);
1583 if ( setSysName < 0 || setSysName > MAXNUMSYSNAMES )
1585 cp2 = ioctlp->inDatap;
1586 for ( cp=ioctlp->inDatap, count = 0; count < setSysName; count++ ) {
1587 /* won't go past end of ioctlp->inDatap since
1588 maxsysname*num < ioctlp->inDatap length */
1589 t = (int)strlen(cp);
1590 if (t >= MAXSYSNAME || t <= 0)
1592 /* check for names that can shoot us in the foot */
1593 if (*cp == '.' && (cp[1] == 0 || (cp[1] == '.' && cp[2] == 0)))
1599 /* inname gets first entry in case we're being a translator */
1600 /* (we are never a translator) */
1601 inname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1604 /* Not xlating, so local case */
1606 osi_panic("cm_IoctlSysName: !cm_sysName\n", __FILE__, __LINE__);
1609 /* Local guy; only root can change sysname */
1610 /* clear @sys entries from the dnlc, once afs_lookup can
1611 * do lookups of @sys entries and thinks it can trust them */
1612 /* privs ok, store the entry, ... */
1614 cm_ClientStrCpy(cm_sysName, lengthof(cm_sysName), inname);
1615 cm_ClientStrCpy(cm_sysNameList[0], MAXSYSNAME, inname);
1617 if (setSysName > 1) { /* ... or list */
1618 for (count = 1; count < setSysName; ++count) {
1619 clientchar_t * newsysname;
1621 if (!cm_sysNameList[count])
1622 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to write\n",
1623 __FILE__, __LINE__);
1625 newsysname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1626 cm_ClientStrCpy(cm_sysNameList[count], MAXSYSNAME, newsysname);
1630 cm_sysNameCount = setSysName;
1634 /* return the sysname to the caller */
1635 i32 = cm_sysNameCount;
1636 memcpy(ioctlp->outDatap, &i32, sizeof(afs_int32));
1637 ioctlp->outDatap += sizeof(afs_int32); /* skip found flag */
1639 if (cm_sysNameCount) {
1640 for ( count=0; count < cm_sysNameCount ; ++count) { /* ... or list */
1641 if ( !cm_sysNameList[count] || *cm_sysNameList[count] == _C('\0'))
1642 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to read\n",
1643 __FILE__, __LINE__);
1644 cm_UnparseIoctlString(ioctlp, NULL, cm_sysNameList[count], -1);
1659 * VIOC_GETCELLSTATUS internals.
1661 * Assumes that pioctl path has been parsed or skipped.
1664 cm_IoctlGetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1668 clientchar_t * cellnamep;
1669 fschar_t * fscellnamep;
1671 cellnamep = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1672 fscellnamep = cm_ClientStringToFsStringAlloc(cellnamep, -1, NULL);
1673 cellp = cm_GetCell(fscellnamep, 0);
1678 return CM_ERROR_NOSUCHCELL;
1681 lock_ObtainMutex(&cellp->mx);
1682 if (cellp->flags & CM_CELLFLAG_SUID)
1683 temp |= CM_SETCELLFLAG_SUID;
1684 lock_ReleaseMutex(&cellp->mx);
1686 /* now copy out parm */
1687 memcpy(ioctlp->outDatap, &temp, sizeof(afs_uint32));
1688 ioctlp->outDatap += sizeof(afs_uint32);
1694 * VIOC_SETCELLSTATUS internals.
1696 * Assumes that pioctl path has been parsed or skipped.
1699 cm_IoctlSetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1704 fschar_t * cellnamep;
1706 temp = cm_ParseIoctlStringAlloc(ioctlp, ioctlp->inDatap + 2*sizeof(afs_uint32));
1707 cellnamep = cm_ClientStringToFsStringAlloc(temp, -1, NULL);
1708 cellp = cm_GetCell(cellnamep, 0);
1713 return CM_ERROR_NOSUCHCELL;
1715 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_uint32));
1717 lock_ObtainMutex(&cellp->mx);
1718 if (flags & CM_SETCELLFLAG_SUID)
1719 cellp->flags |= CM_CELLFLAG_SUID;
1721 cellp->flags &= ~CM_CELLFLAG_SUID;
1722 lock_ReleaseMutex(&cellp->mx);
1728 * VIOC_SETSPREFS internals.
1730 * Assumes that pioctl path has been parsed or skipped.
1733 cm_IoctlSetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1735 cm_SSetPref_t *spin; /* input */
1736 cm_SPref_t *srvin; /* one input component */
1738 int i, vlonly, noServers, type;
1739 struct sockaddr_in tmp;
1740 unsigned short rank;
1742 spin = (cm_SSetPref_t *)ioctlp->inDatap;
1743 noServers = spin->num_servers;
1744 vlonly = spin->flags;
1746 type = CM_SERVER_VLDB;
1748 type = CM_SERVER_FILE;
1750 for ( i=0; i < noServers; i++)
1752 srvin = &(spin->servers[i]);
1753 rank = srvin->rank + (rand() & 0x000f);
1754 tmp.sin_addr = srvin->host;
1756 case CM_SERVER_VLDB:
1757 tmp.sin_port = htons(7003);
1759 case CM_SERVER_FILE:
1760 tmp.sin_port = htons(7000);
1763 tmp.sin_family = AF_INET;
1765 tsp = cm_FindServer(&tmp, type);
1766 if ( tsp ) /* an existing server - ref count increased */
1768 lock_ObtainMutex(&tsp->mx);
1770 tsp->flags |= CM_SERVERFLAG_PREF_SET;
1771 tsp->adminRank = tsp->ipRank;
1772 lock_ReleaseMutex(&tsp->mx);
1775 case CM_SERVER_FILE:
1777 * find volumes which might have RO copy
1778 * on server and change the ordering of
1781 cm_ChangeRankVolume(tsp);
1783 case CM_SERVER_VLDB:
1784 /* set preferences for an existing vlserver */
1785 cm_ChangeRankCellVLServer(tsp);
1789 else /* add a new server without a cell */
1791 tsp = cm_NewServer(&tmp, type, NULL, NULL, CM_FLAG_NOPROBE); /* refcount = 1 */
1792 lock_ObtainMutex(&tsp->mx);
1794 tsp->flags |= CM_SERVERFLAG_PREF_SET;
1795 tsp->adminRank = tsp->ipRank;
1796 lock_ReleaseMutex(&tsp->mx);
1799 cm_PutServer(tsp); /* decrease refcount */
1805 * VIOC_GETSPREFS internals.
1807 * Assumes that pioctl path has been parsed or skipped.
1810 cm_IoctlGetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1812 cm_SPrefRequest_t *spin; /* input */
1813 cm_SPrefInfo_t *spout; /* output */
1814 cm_SPref_t *srvout; /* one output component */
1816 int i, vlonly, noServers;
1818 spin = (cm_SPrefRequest_t *)ioctlp->inDatap;
1819 spout = (cm_SPrefInfo_t *) ioctlp->outDatap;
1820 srvout = spout->servers;
1821 noServers = spin->num_servers;
1822 vlonly = spin->flags & CM_SPREF_VLONLY;
1823 spout->num_servers = 0;
1825 lock_ObtainRead(&cm_serverLock); /* get server lock */
1827 for (tsp=cm_allServersp, i=0; tsp && noServers; tsp=tsp->allNextp,i++){
1828 if (spin->offset > i) {
1829 continue; /* catch up to where we left off */
1832 if ( vlonly && (tsp->type != CM_SERVER_VLDB) )
1833 continue; /* ignore fileserver for -vlserver option*/
1834 if ( !vlonly && (tsp->type != CM_SERVER_FILE) )
1835 continue; /* ignore vlservers */
1837 srvout->host = tsp->addr.sin_addr;
1838 srvout->rank = tsp->ipRank;
1840 spout->num_servers++;
1843 lock_ReleaseRead(&cm_serverLock); /* release server lock */
1845 if ( tsp ) /* we ran out of space in the output buffer */
1846 spout->next_offset = i;
1848 spout->next_offset = 0;
1849 ioctlp->outDatap += sizeof(cm_SPrefInfo_t) +
1850 (spout->num_servers -1 ) * sizeof(cm_SPref_t) ;
1856 * VIOC_AFS_CREATE_MT_PT internals.
1858 * Assumes that pioctl path has been parsed or skipped.
1859 * dscp is held but not locked.
1862 cm_IoctlCreateMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1867 fschar_t mpInfo[512]; /* mount point string */
1868 fschar_t fullCell[CELL_MAXNAMELEN];
1869 fschar_t *fscell = NULL;
1870 fschar_t *fsvolume = NULL;
1871 clientchar_t volume[VL_MAXNAMELEN];
1872 clientchar_t *mpp = NULL;
1873 clientchar_t *cell = NULL;
1874 cm_volume_t *volp = NULL;
1875 cm_cell_t *cellp = NULL;
1879 * The fs command allows the user to specify partial cell names on NT. These must
1880 * be expanded to the full cell name for mount points so that the mount points will
1881 * work on UNIX clients.
1884 /* Extract the possibly partial cell name */
1885 mpp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1886 cell = cm_ClientCharNext(mpp);
1887 if (cp = cm_ClientStrChr(cell, ':')) {
1889 /* Extract the volume name */
1891 cm_ClientStrCpy(volume, lengthof(volume), cm_ClientCharNext(cp));
1893 fscell = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1894 fsvolume = cm_ClientStringToFsStringAlloc(volume, -1, NULL);
1896 /* Get the full name for this cell */
1897 cellp = cm_GetCell_Gen(fscell, fullCell, CM_FLAG_NOPROBE);
1899 code = CM_ERROR_NOSUCHCELL;
1903 StringCbPrintfA(mpInfo, sizeof(mpInfo), "%c%s:%s", (char) *mpp,
1904 fullCell, fsvolume);
1907 /* No cell name specified, so cell points at the volume instead. */
1908 fsvolume = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1909 cm_ClientStringToFsString(mpp, -1, mpInfo, lengthof(mpInfo));
1910 cellp = cm_FindCellByID(dscp->fid.cell, CM_FLAG_NOPROBE);
1913 /* remove the trailing dot if it is present */
1914 len = strlen(fsvolume);
1915 if (len > 1 && fsvolume[len-1] == '.')
1916 fsvolume[len-1] = '\0';
1918 /* validate the target info */
1919 if (cm_VolNameIsID(fsvolume)) {
1920 code = cm_FindVolumeByID(cellp, atoi(fsvolume), userp, reqp,
1921 CM_GETVOL_FLAG_CREATE, &volp);
1923 code = cm_FindVolumeByName(cellp, fsvolume, userp, reqp,
1924 CM_GETVOL_FLAG_CREATE, &volp);
1929 #ifdef AFS_FREELANCE_CLIENT
1930 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1931 /* we are adding the mount point to the root dir, so call
1932 * the freelance code to do the add. */
1933 fschar_t * fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1934 osi_Log0(afsd_logp,"IoctlCreateMountPoint within Freelance root dir");
1935 code = cm_FreelanceAddMount(fsleaf, fullCell, fsvolume, *mpInfo == '%', NULL);
1940 /* create the symlink with mode 644. The lack of X bits tells
1941 * us that it is a mount point.
1943 tattr.mask = CM_ATTRMASK_UNIXMODEBITS | CM_ATTRMASK_CLIENTMODTIME;
1944 tattr.unixModeBits = 0644;
1945 tattr.clientModTime = time(NULL);
1947 code = cm_SymLink(dscp, leaf, mpInfo, 0, &tattr, userp, reqp);
1950 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1951 smb_NotifyChange(FILE_ACTION_ADDED,
1952 FILE_NOTIFY_CHANGE_DIR_NAME,
1953 dscp, leaf, NULL, TRUE);
1969 * VIOC_SYMLINK internals.
1971 * Assumes that pioctl path has been parsed or skipped.
1972 * dscp is held but not locked.
1975 cm_IoctlSymlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1981 int free_syml = FALSE;
1983 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1984 /* Translate chars for the linked to name */
1985 TranslateExtendedChars(ioctlp->inDatap);
1988 cp = symlp = ioctlp->inDatap; /* contents of link */
1990 #ifdef AFS_FREELANCE_CLIENT
1991 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1992 /* we are adding the symlink to the root dir., so call
1993 * the freelance code to do the add. */
1996 if (cp[0] == cp[1] && cp[1] == '\\' &&
1997 !_strnicmp(cm_NetbiosName,cp+2,strlen(cm_NetbiosName)))
1999 /* skip \\AFS\ or \\AFS\all\ */
2001 p = cp + 2 + strlen(cm_NetbiosName) + 1;
2002 if ( !_strnicmp("all", p, 3) )
2007 osi_Log0(afsd_logp,"IoctlCreateSymlink within Freelance root dir");
2008 fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
2009 code = cm_FreelanceAddSymlink(fsleaf, cp, NULL);
2014 /* Create symlink with mode 0755. */
2015 tattr.mask = CM_ATTRMASK_UNIXMODEBITS;
2016 tattr.unixModeBits = 0755;
2018 code = cm_SymLink(dscp, leaf, cp, 0, &tattr, userp, reqp);
2021 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2022 smb_NotifyChange(FILE_ACTION_ADDED,
2023 FILE_NOTIFY_CHANGE_FILE_NAME
2024 | FILE_NOTIFY_CHANGE_DIR_NAME,
2025 dscp, leaf, NULL, TRUE);
2031 * VIOC_LISTSYMLINK internals.
2033 * Assumes that pioctl path has been parsed or skipped.
2034 * dscp is held but not locked.
2037 cm_IoctlListlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2043 cm_scache_t *newRootScp;
2044 clientchar_t *clientp;
2046 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2047 /* Translate chars for the link name */
2048 TranslateExtendedChars(ioctlp->inDatap);
2050 cp = ioctlp->inDatap;
2052 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2053 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2058 /* Check that it's a real symlink */
2059 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2060 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2061 scp->fileType != CM_SCACHETYPE_INVALID) {
2062 cm_ReleaseSCache(scp);
2063 return CM_ERROR_INVAL;
2066 code = cm_AssembleLink(scp, "", &newRootScp, &spacep, userp, reqp);
2067 cm_ReleaseSCache(scp);
2070 cp = ioctlp->outDatap;
2071 if (newRootScp != NULL) {
2072 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), cm_mountRoot);
2073 StringCbCatA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), "/");
2077 linkstr = cm_ClientStringToFsStringAlloc(spacep->wdata, -1, NULL);
2078 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), linkstr);
2079 cp += strlen(cp) + 1;
2080 ioctlp->outDatap = cp;
2081 cm_FreeSpace(spacep);
2083 if (newRootScp != NULL)
2084 cm_ReleaseSCache(newRootScp);
2086 } else if (code == CM_ERROR_PATH_NOT_COVERED &&
2087 scp->fileType == CM_SCACHETYPE_DFSLINK ||
2088 code == CM_ERROR_NOSUCHPATH &&
2089 scp->fileType == CM_SCACHETYPE_INVALID) {
2091 cp = ioctlp->outDatap;
2092 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), scp->mountPointStringp);
2093 cp += strlen(cp) + 1;
2094 ioctlp->outDatap = cp;
2102 * VIOC_ISSYMLINK internals.
2104 * Assumes that pioctl path has been parsed or skipped.
2105 * dscp is held but not locked.
2108 cm_IoctlIslink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2109 {/*CHECK FOR VALID SYMLINK*/
2113 clientchar_t *clientp;
2115 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2116 /* Translate chars for the link name */
2117 TranslateExtendedChars(ioctlp->inDatap);
2119 cp = ioctlp->inDatap;
2120 osi_LogEvent("cm_IoctlListlink",NULL," name[%s]",cp);
2122 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2123 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2128 /* Check that it's a real symlink */
2129 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2130 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2131 scp->fileType != CM_SCACHETYPE_INVALID)
2132 code = CM_ERROR_INVAL;
2133 cm_ReleaseSCache(scp);
2138 * VIOC_DELSYMLINK internals.
2140 * Assumes that pioctl path has been parsed or skipped.
2141 * dscp is held but not locked.
2144 cm_IoctlDeletelink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2149 char * originalName = NULL;
2151 clientchar_t *clientp;
2153 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2154 /* Translate chars for the link name */
2155 TranslateExtendedChars(ioctlp->inDatap);
2157 cp = ioctlp->inDatap;
2159 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2160 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2162 /* if something went wrong, bail out now */
2166 lock_ObtainWrite(&scp->rw);
2167 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2168 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2172 /* now check that this is a real symlink */
2173 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2174 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2175 scp->fileType != CM_SCACHETYPE_INVALID) {
2176 code = CM_ERROR_INVAL;
2180 /* time to make the RPC, so drop the lock */
2181 lock_ReleaseWrite(&scp->rw);
2184 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
2186 code = cm_BPlusDirLookupOriginalName(&dirop, clientp, &originalName);
2187 /* cm_Dir*() functions can't be used to lookup the original
2188 name since those functions only know of the original
2190 cm_EndDirOp(&dirop);
2194 /* If this name doesn't have a non-normalized name associated with
2195 it, we assume that what we had is what is actually present on
2198 if (originalName == NULL)
2201 /* cp is a normalized name. originalName is the actual name we
2202 saw on the fileserver. */
2205 #ifdef AFS_FREELANCE_CLIENT
2206 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2207 /* we are adding the mount point to the root dir., so call
2208 * the freelance code to do the add. */
2209 osi_Log0(afsd_logp,"IoctlDeletelink from Freelance root dir");
2210 code = cm_FreelanceRemoveSymlink(originalName);
2214 /* easier to do it this way */
2215 code = cm_Unlink(dscp, originalName, clientp, userp, reqp);
2217 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2218 smb_NotifyChange(FILE_ACTION_REMOVED,
2219 FILE_NOTIFY_CHANGE_FILE_NAME
2220 | FILE_NOTIFY_CHANGE_DIR_NAME,
2221 dscp, clientp, NULL, TRUE);
2223 if (originalName != NULL && originalName != cp) {
2225 originalName = NULL;
2228 lock_ObtainWrite(&scp->rw);
2230 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2233 cm_DiscardSCache(scp);
2234 lock_ReleaseWrite(&scp->rw);
2235 cm_ReleaseSCache(scp);
2244 /* Utility function. Not currently used.
2245 * This function performs a PTS lookup which has traditionally
2246 * not been performed by the cache manager.
2249 cm_UsernameToId(char *uname, cm_ucell_t * ucellp, afs_uint32* uid)
2254 static struct afsconf_cell info;
2255 struct rx_connection *serverconns[MAXSERVERS];
2256 struct rx_securityClass *sc[3];
2257 afs_int32 scIndex = 2; /* authenticated - we have a token */
2258 struct ubik_client *pruclient = NULL;
2259 struct afsconf_dir *tdir;
2263 memset(&info, 0, sizeof(info));
2264 tdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH);
2265 code = afsconf_GetCellInfo(tdir, ucellp->cellp->name, "afsprot", &info);
2266 afsconf_Close(tdir);
2272 /* we have the token that was given to us in the settoken
2273 * call. we just have to use it.
2275 scIndex = 2; /* kerberos ticket */
2276 sc[2] = rxkad_NewClientSecurityObject(rxkad_clear, &ucellp->sessionKey,
2277 ucellp->kvno, ucellp->ticketLen,
2280 memset(serverconns, 0, sizeof(serverconns)); /* terminate list!!! */
2281 for (i = 0; i < info.numServers; i++)
2283 rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
2284 info.hostAddr[i].sin_port, PRSRV, sc[scIndex],
2287 code = ubik_ClientInit(serverconns, &pruclient);
2289 if (info.linkedCell)
2290 free(info.linkedCell);
2294 code = rxs_Release(sc[scIndex]);
2296 lids.idlist_len = 0;
2297 lids.idlist_val = 0;
2298 lnames.namelist_len = 1;
2299 lnames.namelist_val = (prname *) malloc(PR_MAXNAMELEN);
2300 strncpy(lnames.namelist_val[0], uname, PR_MAXNAMELEN);
2301 lnames.namelist_val[0][PR_MAXNAMELEN-1] = '\0';
2302 for ( p=lnames.namelist_val[0], r=NULL; *p; p++ ) {
2308 if (r && !cm_stricmp_utf8(r+1,ucellp->cellp->name))
2311 code = ubik_PR_NameToID(pruclient, 0, &lnames, &lids);
2312 if (lids.idlist_val) {
2313 *uid = *lids.idlist_val;
2314 free(lids.idlist_val);
2316 if (lnames.namelist_val)
2317 free(lnames.namelist_val);
2320 ubik_ClientDestroy(pruclient);
2324 if (info.linkedCell)
2325 free(info.linkedCell);
2328 #endif /* QUERY_AFSID */
2331 /* This has been copied to smb_IoctlSetToken in its entirety.
2332 * An equivalent version will need to be produced for the
2333 * redirector and some extensive refactoring might be required.
2336 cm_IoctlSetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2343 struct ClearToken ct;
2351 int release_userp = 0;
2354 saveDataPtr = ioctlp->inDatap;
2356 cm_SkipIoctlPath(ioctlp);
2358 tp = ioctlp->inDatap;
2361 memcpy(&ticketLen, tp, sizeof(ticketLen));
2362 tp += sizeof(ticketLen);
2363 if (ticketLen < MINKTCTICKETLEN || ticketLen > MAXKTCTICKETLEN)
2364 return CM_ERROR_INVAL;
2366 /* remember ticket and skip over it for now */
2370 /* clear token size */
2371 memcpy(&ctSize, tp, sizeof(ctSize));
2372 tp += sizeof(ctSize);
2373 if (ctSize != sizeof(struct ClearToken))
2374 return CM_ERROR_INVAL;
2377 memcpy(&ct, tp, ctSize);
2379 if (ct.AuthHandle == -1)
2380 ct.AuthHandle = 999; /* more rxvab compat stuff */
2382 /* more stuff, if any */
2383 if (ioctlp->inCopied > tp - saveDataPtr) {
2384 /* flags: logon flag */
2385 memcpy(&flags, tp, sizeof(int));
2389 cellp = cm_GetCell(tp, CM_FLAG_CREATE | CM_FLAG_NOPROBE);
2391 return CM_ERROR_NOSUCHCELL;
2392 tp += strlen(tp) + 1;
2396 tp += strlen(tp) + 1;
2398 if (flags & PIOCTL_LOGON) {
2399 /* SMB user name with which to associate tokens */
2401 osi_Log2(smb_logp,"cm_IoctlSetToken for user [%s] smbname [%s]",
2402 osi_LogSaveString(smb_logp,uname), osi_LogSaveString(smb_logp,smbname));
2403 fprintf(stderr, "SMB name = %s\n", smbname);
2404 tp += strlen(tp) + 1;
2406 osi_Log1(smb_logp,"cm_IoctlSetToken for user [%s]",
2407 osi_LogSaveString(smb_logp, uname));
2411 memcpy(&uuid, tp, sizeof(uuid));
2412 if (!cm_FindTokenEvent(uuid, sessionKey))
2413 return CM_ERROR_INVAL;
2415 cellp = cm_data.rootCellp;
2416 osi_Log0(smb_logp,"cm_IoctlSetToken - no name specified");
2419 if (flags & PIOCTL_LOGON) {
2420 userp = smb_FindCMUserByName(smbname, ioctlp->fidp->vcp->rname,
2421 SMB_FLAG_CREATE|SMB_FLAG_AFSLOGON);
2425 /* store the token */
2426 lock_ObtainMutex(&userp->mx);
2427 ucellp = cm_GetUCell(userp, cellp);
2428 osi_Log1(smb_logp,"cm_IoctlSetToken ucellp %lx", ucellp);
2429 ucellp->ticketLen = ticketLen;
2430 if (ucellp->ticketp)
2431 free(ucellp->ticketp); /* Discard old token if any */
2432 ucellp->ticketp = malloc(ticketLen);
2433 memcpy(ucellp->ticketp, ticket, ticketLen);
2435 * Get the session key from the RPC, rather than from the pioctl.
2438 memcpy(&ucellp->sessionKey, ct.HandShakeKey, sizeof(ct.HandShakeKey));
2440 memcpy(ucellp->sessionKey.data, sessionKey, sizeof(sessionKey));
2441 ucellp->kvno = ct.AuthHandle;
2442 ucellp->expirationTime = ct.EndTimestamp;
2445 ucellp->uid = ANONYMOUSID;
2448 StringCbCopyA(ucellp->userName, MAXKTCNAMELEN, uname);
2450 cm_UsernameToId(uname, ucellp, &ucellp->uid);
2453 ucellp->flags |= CM_UCELLFLAG_RXKAD;
2454 lock_ReleaseMutex(&userp->mx);
2456 if (flags & PIOCTL_LOGON) {
2457 ioctlp->flags |= CM_IOCTLFLAG_LOGON;
2460 cm_ResetACLCache(cellp, userp);
2463 cm_ReleaseUser(userp);
2470 * VIOC_GETTOK internals.
2472 * Assumes that pioctl path has been parsed or skipped.
2475 cm_IoctlGetTokenIter(struct cm_ioctl *ioctlp, struct cm_user *userp)
2481 struct ClearToken ct;
2483 tp = ioctlp->inDatap;
2484 cp = ioctlp->outDatap;
2487 memcpy(&iterator, tp, sizeof(iterator));
2488 tp += sizeof(iterator);
2490 lock_ObtainMutex(&userp->mx);
2492 /* look for token */
2493 for (;;iterator++) {
2494 ucellp = cm_FindUCell(userp, iterator);
2496 lock_ReleaseMutex(&userp->mx);
2497 return CM_ERROR_NOMORETOKENS;
2499 if (ucellp->flags & CM_UCELLFLAG_RXKAD)
2504 temp = ucellp->iterator + 1;
2505 memcpy(cp, &temp, sizeof(temp));
2509 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2510 cp += sizeof(ucellp->ticketLen);
2513 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2514 cp += ucellp->ticketLen;
2516 /* clear token size */
2518 memcpy(cp, &temp, sizeof(temp));
2522 ct.AuthHandle = ucellp->kvno;
2525 * This field is supposed to hold the session key
2526 * but we don't want to make it easier for someone
2527 * to attack the cache. The user gave us the session
2528 * key in the first place.
2530 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2531 ct.ViceId = 37; /* XXX */
2532 ct.BeginTimestamp = 0; /* XXX */
2533 ct.EndTimestamp = ucellp->expirationTime;
2534 memcpy(cp, &ct, sizeof(ct));
2537 /* Primary flag (unused) */
2539 memcpy(cp, &temp, sizeof(temp));
2543 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2544 cp += strlen(cp) + 1;
2547 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2548 cp += strlen(cp) + 1;
2550 ioctlp->outDatap = cp;
2552 lock_ReleaseMutex(&userp->mx);
2558 * VIOC_NEWGETTOK internals.
2560 * Assumes that pioctl path has been parsed or skipped.
2563 cm_IoctlGetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2569 struct ClearToken ct;
2573 tp = ioctlp->inDatap;
2575 cp = ioctlp->outDatap;
2577 /* cell name is right here */
2578 cellp = cm_GetCell(tp, 0);
2580 return CM_ERROR_NOSUCHCELL;
2581 tp += strlen(tp) + 1;
2584 memcpy(&uuid, tp, sizeof(uuid));
2586 lock_ObtainMutex(&userp->mx);
2588 ucellp = cm_GetUCell(userp, cellp);
2589 if (!ucellp || !(ucellp->flags & CM_UCELLFLAG_RXKAD)) {
2590 lock_ReleaseMutex(&userp->mx);
2591 return CM_ERROR_NOMORETOKENS;
2595 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2596 cp += sizeof(ucellp->ticketLen);
2599 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2600 cp += ucellp->ticketLen;
2602 /* clear token size */
2604 memcpy(cp, &temp, sizeof(temp));
2608 ct.AuthHandle = ucellp->kvno;
2610 /* do not give out the session key */
2611 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2612 ct.ViceId = 37; /* XXX */
2613 ct.BeginTimestamp = 0; /* XXX */
2614 ct.EndTimestamp = ucellp->expirationTime;
2615 memcpy(cp, &ct, sizeof(ct));
2618 /* Primary flag (unused) */
2620 memcpy(cp, &temp, sizeof(temp));
2624 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2625 cp += strlen(cp) + 1;
2628 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2629 cp += strlen(cp) + 1;
2631 ioctlp->outDatap = cp;
2633 lock_ReleaseMutex(&userp->mx);
2635 cm_RegisterNewTokenEvent(uuid, ucellp->sessionKey.data);
2641 * VIOCDELTOK internals.
2643 * Assumes that pioctl path has been parsed or skipped.
2646 cm_IoctlDelToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2652 cp = ioctlp->outDatap;
2654 /* cell name is right here */
2655 cellp = cm_GetCell(ioctlp->inDatap, 0);
2657 return CM_ERROR_NOSUCHCELL;
2659 lock_ObtainMutex(&userp->mx);
2661 ucellp = cm_GetUCell(userp, cellp);
2663 lock_ReleaseMutex(&userp->mx);
2664 return CM_ERROR_NOMORETOKENS;
2667 osi_Log1(smb_logp,"cm_IoctlDelToken ucellp %lx", ucellp);
2669 if (ucellp->ticketp) {
2670 free(ucellp->ticketp);
2671 ucellp->ticketp = NULL;
2673 ucellp->ticketLen = 0;
2674 memset(ucellp->sessionKey.data, 0, 8);
2676 ucellp->expirationTime = 0;
2677 ucellp->userName[0] = '\0';
2678 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2681 lock_ReleaseMutex(&userp->mx);
2683 cm_ResetACLCache(cellp, userp);
2689 * VIOCDELALLTOK internals.
2691 * Assumes that pioctl path has been parsed or skipped.
2694 cm_IoctlDelAllToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2698 lock_ObtainMutex(&userp->mx);
2700 for (ucellp = userp->cellInfop; ucellp; ucellp = ucellp->nextp) {
2701 osi_Log1(smb_logp,"cm_IoctlDelAllToken ucellp %lx", ucellp);
2703 if (ucellp->ticketp) {
2704 free(ucellp->ticketp);
2705 ucellp->ticketp = NULL;
2707 ucellp->ticketLen = 0;
2708 memset(ucellp->sessionKey.data, 0, 8);
2710 ucellp->expirationTime = 0;
2711 ucellp->userName[0] = '\0';
2712 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2716 lock_ReleaseMutex(&userp->mx);
2718 cm_ResetACLCache(NULL, userp);
2724 * VIOC_MAKESUBMOUNT internals. (This function should be deprecated)
2726 * Assumes that pioctl path has been parsed or skipped.
2729 cm_IoctlMakeSubmount(cm_ioctl_t *ioctlp, cm_user_t *userp)
2731 char afspath[MAX_PATH];
2733 int nextAutoSubmount;
2735 DWORD dwType, dwSize;
2740 /* Serialize this one, to prevent simultaneous mods
2743 lock_ObtainMutex(&cm_Afsdsbmt_Lock);
2745 /* Parse the input parameters--first the required afs path,
2746 * then the requested submount name (which may be "").
2748 cm_NormalizeAfsPathAscii(afspath, sizeof(afspath), ioctlp->inDatap);
2749 submountreqp = ioctlp->inDatap + (strlen(ioctlp->inDatap)+1);
2751 /* If the caller supplied a suggested submount name, see if
2752 * that submount name is in use... if so, the submount's path
2753 * has to match our path.
2756 RegCreateKeyEx( HKEY_LOCAL_MACHINE,
2757 AFSREG_CLT_OPENAFS_SUBKEY "\\Submounts",
2760 REG_OPTION_NON_VOLATILE,
2761 KEY_READ|KEY_WRITE|KEY_QUERY_VALUE,
2766 if (submountreqp && *submountreqp) {
2767 char submountPath[MAX_PATH];
2769 dwSize = sizeof(submountPath);
2770 status = RegQueryValueEx( hkSubmounts, submountreqp, 0,
2771 &dwType, submountPath, &dwSize);
2773 if (status != ERROR_SUCCESS) {
2775 /* The suggested submount name isn't in use now--
2776 * so we can safely map the requested submount name
2777 * to the supplied path. Remember not to write the
2778 * leading "/afs" when writing out the submount.
2780 RegSetValueEx( hkSubmounts, submountreqp, 0,
2782 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2783 &afspath[strlen(cm_mountRoot)]:"/",
2784 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2785 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2787 RegCloseKey( hkSubmounts );
2788 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2789 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2790 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2794 /* The suggested submount name is already in use--if the
2795 * supplied path matches the submount's path, we can still
2796 * use the suggested submount name.
2798 if (!strcmp (submountPath, afspath)) {
2799 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2800 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2801 RegCloseKey( hkSubmounts );
2802 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2807 RegQueryInfoKey( hkSubmounts,
2809 NULL, /* lpcClass */
2810 NULL, /* lpReserved */
2811 NULL, /* lpcSubKeys */
2812 NULL, /* lpcMaxSubKeyLen */
2813 NULL, /* lpcMaxClassLen */
2814 &dwSubmounts, /* lpcValues */
2815 NULL, /* lpcMaxValueNameLen */
2816 NULL, /* lpcMaxValueLen */
2817 NULL, /* lpcbSecurityDescriptor */
2818 NULL /* lpftLastWriteTime */
2822 /* Having obtained a list of all available submounts, start
2823 * searching that list for a path which matches the requested
2824 * AFS path. We'll also keep track of the highest "auto15"/"auto47"
2825 * submount, in case we need to add a new one later.
2828 nextAutoSubmount = 1;
2830 for ( dwIndex = 0; dwIndex < dwSubmounts; dwIndex ++ ) {
2831 char submountPath[MAX_PATH] = "";
2832 DWORD submountPathLen = sizeof(submountPath);
2833 char submountName[MAX_PATH];
2834 DWORD submountNameLen = sizeof(submountName);
2837 RegEnumValue( hkSubmounts, dwIndex, submountName, &submountNameLen, NULL,
2838 &dwType, submountPath, &submountPathLen);
2839 if (dwType == REG_EXPAND_SZ) {
2841 StringCbCopyA(buf, MAX_PATH, submountPath);
2842 submountPathLen = ExpandEnvironmentStrings(buf, submountPath, MAX_PATH);
2843 if (submountPathLen > MAX_PATH)
2847 /* If this is an Auto### submount, remember its ### value */
2848 if ((!strnicmp (submountName, "auto", 4)) &&
2849 (isdigit (submountName[strlen("auto")]))) {
2850 int thisAutoSubmount;
2851 thisAutoSubmount = atoi (&submountName[strlen("auto")]);
2852 nextAutoSubmount = max (nextAutoSubmount,
2853 thisAutoSubmount+1);
2856 if ((submountPathLen == 0) ||
2857 (submountPathLen == sizeof(submountPath) - 1)) {
2861 /* See if the path for this submount matches the path
2862 * that our caller specified. If so, we can return
2865 if (!strcmp (submountPath, afspath)) {
2866 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountName);
2867 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2868 RegCloseKey(hkSubmounts);
2869 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2875 /* We've been through the entire list of existing submounts, and
2876 * didn't find any which matched the specified path. So, we'll
2877 * just have to add one. Remember not to write the leading "/afs"
2878 * when writing out the submount.
2881 StringCbPrintfA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "auto%ld", nextAutoSubmount);
2883 RegSetValueEx( hkSubmounts,
2887 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2888 &afspath[strlen(cm_mountRoot)]:"/",
2889 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2890 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2892 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2893 RegCloseKey(hkSubmounts);
2894 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2899 * VIOC_GETRXKCRYPT internals.
2901 * Assumes that pioctl path has been parsed or skipped.
2904 cm_IoctlGetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2906 memcpy(ioctlp->outDatap, &cryptall, sizeof(cryptall));
2907 ioctlp->outDatap += sizeof(cryptall);
2913 * VIOC_SETRXKCRYPT internals.
2915 * Assumes that pioctl path has been parsed or skipped.
2918 cm_IoctlSetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2920 afs_int32 c = cryptall;
2922 memcpy(&cryptall, ioctlp->inDatap, sizeof(cryptall));
2924 if (c != cryptall) {
2926 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_ON);
2927 else if (cryptall == 2)
2928 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_AUTH);
2930 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_OFF);
2936 * VIOC_RXSTAT_PROC internals.
2938 * Assumes that pioctl path has been parsed or skipped.
2941 cm_IoctlRxStatProcess(struct cm_ioctl *ioctlp, struct cm_user *userp)
2946 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2947 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2950 if (flags & AFSCALL_RXSTATS_ENABLE) {
2951 rx_enableProcessRPCStats();
2953 if (flags & AFSCALL_RXSTATS_DISABLE) {
2954 rx_disableProcessRPCStats();
2956 if (flags & AFSCALL_RXSTATS_CLEAR) {
2957 rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
2963 * VIOC_RXSTAT_PEER internals.
2965 * Assumes that pioctl path has been parsed or skipped.
2968 cm_IoctlRxStatPeer(struct cm_ioctl *ioctlp, struct cm_user *userp)
2973 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2974 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2977 if (flags & AFSCALL_RXSTATS_ENABLE) {
2978 rx_enablePeerRPCStats();
2980 if (flags & AFSCALL_RXSTATS_DISABLE) {
2981 rx_disablePeerRPCStats();
2983 if (flags & AFSCALL_RXSTATS_CLEAR) {
2984 rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
2990 * VIOC_UNICODECTL internals.
2992 * Assumes that pioctl path has been parsed or skipped.
2995 cm_IoctlUnicodeControl(struct cm_ioctl *ioctlp, struct cm_user * userp)
2997 afs_int32 result = 0;
3001 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
3004 /* Setting the Unicode flag */
3007 newflag = ((cmd & 1) == 1);
3009 InterlockedExchange(&smb_UseUnicode, newflag);
3012 result = smb_UseUnicode;
3017 memcpy(ioctlp->outDatap, &result, sizeof(result));
3018 ioctlp->outDatap += sizeof(result);
3024 * VIOC_UUIDCTL internals.
3026 * Assumes that pioctl path has been parsed or skipped.
3029 cm_IoctlUUIDControl(struct cm_ioctl * ioctlp, struct cm_user *userp)
3034 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
3036 if (cmd) { /* generate a new UUID */
3037 UuidCreate((UUID *) &uuid);
3038 cm_data.Uuid = uuid;
3039 cm_ForceNewConnectionsAllServers();
3042 memcpy(ioctlp->outDatap, &cm_data.Uuid, sizeof(cm_data.Uuid));
3043 ioctlp->outDatap += sizeof(cm_data.Uuid);
3051 * functions to dump contents of various structures.
3052 * In debug build (linked with crt debug library) will dump allocated but not freed memory
3054 extern int cm_DumpSCache(FILE *outputFile, char *cookie, int lock);
3055 extern int cm_DumpBufHashTable(FILE *outputFile, char *cookie, int lock);
3058 * VIOC_TRACEMEMDUMP internals.
3060 * Assumes that pioctl path has been parsed or skipped.
3061 * dscp is held but not locked.
3064 cm_IoctlMemoryDump(struct cm_ioctl *ioctlp, struct cm_user *userp)
3066 afs_int32 inValue = 0;
3068 char logfileName[MAX_PATH+1];
3073 static _CrtMemState memstate;
3076 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_int32));
3078 dwSize = GetEnvironmentVariable("TEMP", logfileName, sizeof(logfileName));
3079 if ( dwSize == 0 || dwSize > sizeof(logfileName) )
3081 GetWindowsDirectory(logfileName, sizeof(logfileName));
3083 strncat(logfileName, "\\afsd_alloc.log", sizeof(logfileName));
3085 hLogFile = CreateFile(logfileName, GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
3091 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_int32));
3092 ioctlp->outDatap += sizeof(afs_int32);
3097 SetFilePointer(hLogFile, 0, NULL, FILE_END);
3099 cookie = inValue ? "b" : "e";
3105 _CrtMemCheckpoint(&memstate);
3109 _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
3110 _CrtSetReportFile(_CRT_WARN, hLogFile);
3111 _CrtMemDumpAllObjectsSince(&memstate);
3115 /* dump all interesting data */
3116 cm_MemDumpDirStats(hLogFile, cookie, 1);
3117 cm_MemDumpBPlusStats(hLogFile, cookie, 1);
3118 cm_DumpCells(hLogFile, cookie, 1);
3119 cm_DumpVolumes(hLogFile, cookie, 1);
3120 cm_DumpSCache(hLogFile, cookie, 1);
3121 cm_DumpBufHashTable(hLogFile, cookie, 1);
3122 cm_DumpServers(hLogFile, cookie, 1);
3123 smb_DumpVCP(hLogFile, cookie, 1);
3124 rx_DumpCalls(hLogFile, cookie);
3125 rx_DumpPackets(hLogFile, cookie);
3127 CloseHandle(hLogFile);
3129 inValue = 0; /* success */
3130 memcpy(ioctlp->outDatap, &inValue, sizeof(long));
3131 ioctlp->outDatap += sizeof(long);
3136 /* Utility functon. Not currently used. */
3138 cm_CheckServersStatus(cm_serverRef_t *serversp)
3141 cm_serverRef_t *tsrp;
3143 int someBusy = 0, someOffline = 0, allOffline = 1, allBusy = 1, allDown = 1;
3145 if (serversp == NULL) {
3146 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", CM_ERROR_ALLDOWN);
3147 return CM_ERROR_ALLDOWN;
3150 lock_ObtainRead(&cm_serverLock);
3151 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
3152 if (tsrp->status == srv_deleted)
3154 if (tsp = tsrp->server) {
3155 cm_GetServerNoLock(tsp);
3156 lock_ReleaseRead(&cm_serverLock);
3157 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
3159 if (tsrp->status == srv_busy) {
3162 } else if (tsrp->status == srv_offline) {
3172 lock_ObtainRead(&cm_serverLock);
3173 cm_PutServerNoLock(tsp);
3176 lock_ReleaseRead(&cm_serverLock);
3179 code = CM_ERROR_ALLDOWN;
3181 code = CM_ERROR_ALLBUSY;
3182 else if (allOffline || (someBusy && someOffline))
3183 code = CM_ERROR_ALLOFFLINE;
3186 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", code);
3191 * VIOC_PATH_AVAILABILITY internals.
3193 * Assumes that pioctl path has been parsed or skipped.
3194 * scp is held but not locked.
3197 cm_IoctlPathAvailability(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3202 cm_vol_state_t *statep;
3205 #ifdef AFS_FREELANCE_CLIENT
3206 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
3211 volume = scp->fid.volume;
3213 cellp = cm_FindCellByID(scp->fid.cell, 0);
3216 return CM_ERROR_NOSUCHCELL;
3218 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
3222 statep = cm_VolumeStateByID(tvp, volume);
3223 switch (statep->state) {
3229 code = CM_ERROR_ALLBUSY;
3232 code = CM_ERROR_ALLOFFLINE;
3235 code = CM_ERROR_ALLDOWN;
3244 * VIOC_VOLSTAT_TEST internals.
3246 * Assumes that pioctl path has been parsed or skipped.
3249 cm_IoctlVolStatTest(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
3252 cm_cell_t *cellp = NULL;
3254 cm_vol_state_t *statep;
3255 struct VolStatTest * testp;
3258 testp = (struct VolStatTest *)ioctlp->inDatap;
3260 #ifdef AFS_FREELANCE_CLIENT
3261 if (testp->fid.cell == -1)
3262 return CM_ERROR_NOACCESS;
3265 if (testp->flags & VOLSTAT_TEST_CHECK_VOLUME) {
3266 cm_CheckOfflineVolumes();
3270 if (testp->flags & VOLSTAT_TEST_NETWORK_UP) {
3271 cm_VolStatus_Network_Started(cm_NetbiosName
3279 if (testp->flags & VOLSTAT_TEST_NETWORK_DOWN) {
3280 cm_VolStatus_Network_Stopped(cm_NetbiosName
3288 if (testp->cellname[0]) {
3289 n = atoi(testp->cellname);
3291 testp->fid.cell = n;
3293 cellp = cm_GetCell(testp->cellname, 0);
3296 if (testp->fid.cell > 0) {
3297 cellp = cm_FindCellByID(testp->fid.cell, 0);
3301 return CM_ERROR_NOSUCHCELL;
3303 if (testp->volname[0]) {
3304 n = atoi(testp->volname);
3306 testp->fid.volume = n;
3308 code = cm_FindVolumeByName(cellp, testp->volname, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3311 if (testp->fid.volume > 0)
3312 code = cm_FindVolumeByID(cellp, testp->fid.volume, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3317 if (testp->fid.volume)
3318 statep = cm_VolumeStateByID(volp, testp->fid.volume);
3320 statep = cm_VolumeStateByName(volp, testp->volname);
3323 statep->state = testp->state;
3324 code = cm_VolStatus_Change_Notification(cellp->cellID, statep->ID, testp->state);