2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afs/param.h>
12 #include <afs/cellconfig.h>
13 #include <afs/ptserver.h>
27 #include "afsd_init.h"
28 #include <WINNT\afsreg.h>
46 /* Copied from afs_tokens.h */
47 #define PIOCTL_LOGON 0x1
50 const char utf8_prefix[] = UTF8_PREFIX;
51 const int utf8_prefix_size = sizeof(utf8_prefix) - sizeof(char);
53 osi_mutex_t cm_Afsdsbmt_Lock;
55 extern afs_int32 cryptall;
56 extern char cm_NetbiosName[];
57 extern clientchar_t cm_NetbiosNameC[];
59 extern void afsi_log(char *pattern, ...);
61 void cm_InitIoctl(void)
63 lock_InitializeMutex(&cm_Afsdsbmt_Lock, "AFSDSBMT.INI Access Lock",
64 LOCK_HIERARCHY_AFSDBSBMT_GLOBAL);
68 * Utility function. (Not currently in use.)
69 * This function forces all dirty buffers to the file server and
70 * then discards the status info.
73 cm_CleanFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
77 code = buf_CleanVnode(scp, userp, reqp);
79 lock_ObtainWrite(&scp->rw);
80 cm_DiscardSCache(scp);
81 lock_ReleaseWrite(&scp->rw);
83 osi_Log2(afsd_logp,"cm_CleanFile scp 0x%x returns error: [%x]",scp, code);
88 * Utility function. Used within this file.
89 * scp must be held but not locked.
92 cm_FlushFile(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
96 #ifdef AFS_FREELANCE_CLIENT
97 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
98 cm_noteLocalMountPointChange();
103 code = buf_FlushCleanPages(scp, userp, reqp);
105 lock_ObtainWrite(&scp->rw);
106 cm_DiscardSCache(scp);
107 if (scp->fileType == CM_SCACHETYPE_DIRECTORY)
108 cm_ResetSCacheDirectory(scp);
109 lock_ReleaseWrite(&scp->rw);
111 osi_Log2(afsd_logp,"cm_FlushFile scp 0x%x returns error: [%x]",scp, code);
116 * Utility function. (Not currently in use)
117 * IoctlPath must be parsed or skipped prior to calling.
118 * scp must be held but not locked.
121 cm_FlushParent(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
126 pscp = cm_FindSCacheParent(scp);
128 /* now flush the file */
129 code = cm_FlushFile(pscp, userp, reqp);
130 cm_ReleaseSCache(pscp);
136 * Utility function. Used within this function.
139 cm_FlushVolume(cm_user_t *userp, cm_req_t *reqp, afs_uint32 cell, afs_uint32 volume)
145 #ifdef AFS_FREELANCE_CLIENT
146 if ( cell == AFS_FAKE_ROOT_CELL_ID && volume == AFS_FAKE_ROOT_VOL_ID ) {
147 cm_noteLocalMountPointChange();
152 lock_ObtainWrite(&cm_scacheLock);
153 for (i=0; i<cm_data.scacheHashTableSize; i++) {
154 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
155 if (scp->fid.volume == volume && scp->fid.cell == cell) {
156 cm_HoldSCacheNoLock(scp);
157 lock_ReleaseWrite(&cm_scacheLock);
159 /* now flush the file */
160 code = cm_FlushFile(scp, userp, reqp);
161 lock_ObtainWrite(&cm_scacheLock);
162 cm_ReleaseSCacheNoLock(scp);
166 lock_ReleaseWrite(&cm_scacheLock);
172 * TranslateExtendedChars - This is a fix for TR 54482.
174 * If an extended character (80 - FF) is entered into a file
175 * or directory name in Windows, the character is translated
176 * into the OEM character map before being passed to us.
177 * The pioctl functions must match
178 * this translation for paths given via our own commands (like
179 * fs). If we do not do this, then we will try to perform an
180 * operation on a non-translated path, which we will fail to
181 * find, since the path was created with the translated chars.
182 * This function performs the required translation.
184 * OEM character code pages are used by the non-Unicode SMB
185 * mode. Do not use if the CM_IOCTLFLAG_USEUTF8 is set.
188 TranslateExtendedChars(char *str)
193 CharToOemA(str, str);
196 void cm_SkipIoctlPath(cm_ioctl_t *ioctlp)
200 temp = strlen(ioctlp->inDatap) + 1;
201 ioctlp->inDatap += temp;
205 clientchar_t * cm_ParseIoctlStringAlloc(cm_ioctl_t *ioctlp, const char * ext_instrp)
207 clientchar_t * rs = NULL;
210 instrp = (ext_instrp)?ext_instrp:ioctlp->inDatap;
212 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
213 rs = cm_Utf8ToClientStringAlloc(instrp, -1, NULL);
217 /* Not a UTF-8 string */
218 if (smb_StoreAnsiFilenames) {
219 cch = cm_AnsiToClientString(instrp, -1, NULL, 0);
223 rs = malloc(cch * sizeof(clientchar_t));
224 cm_AnsiToClientString(instrp, -1, rs, cch);
226 cch = cm_OemToClientString(instrp, -1, NULL, 0);
230 rs = malloc(cch * sizeof(clientchar_t));
231 cm_OemToClientString(instrp, -1, rs, cch);
235 if (ext_instrp == NULL) {
236 ioctlp->inDatap += strlen(ioctlp->inDatap) + 1;
241 int cm_UnparseIoctlString(cm_ioctl_t *ioctlp,
243 const clientchar_t * cstr, int cchlen)
248 outp = ((ext_outp == NULL)? ioctlp->outDatap : ext_outp);
250 if ((ioctlp->flags & CM_IOCTLFLAG_USEUTF8) == CM_IOCTLFLAG_USEUTF8) {
251 cchout = cm_ClientStringToUtf8(cstr, cchlen, outp,
252 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp));
254 if (smb_StoreAnsiFilenames) {
255 cchout = WideCharToMultiByte(CP_ACP, 0, cstr, cchlen,
257 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
260 cchout = WideCharToMultiByte(CP_OEMCP, 0, cstr, cchlen,
262 SMB_IOCTL_MAXDATA - (outp - ioctlp->outAllocp),
267 if (cchout > 0 && ext_outp == NULL) {
268 ioctlp->outDatap += cchout;
275 * Must be called before XXX_ParseIoctlPath or cm_SkipIoctlPath
277 cm_ioctlQueryOptions_t *
278 cm_IoctlGetQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
280 afs_uint32 pathlen = strlen(ioctlp->inDatap) + 1;
281 char *p = ioctlp->inDatap + pathlen;
282 cm_ioctlQueryOptions_t * optionsp = NULL;
284 if (ioctlp->inCopied > p - ioctlp->inAllocp) {
285 optionsp = (cm_ioctlQueryOptions_t *)p;
286 if (optionsp->size < 12 /* minimum size of struct */)
294 * Must be called after smb_ParseIoctlPath or cm_SkipIoctlPath
295 * or any other time that ioctlp->inDatap points at the
296 * cm_ioctlQueryOptions_t object.
299 cm_IoctlSkipQueryOptions(struct cm_ioctl *ioctlp, struct cm_user *userp)
301 cm_ioctlQueryOptions_t * optionsp = (cm_ioctlQueryOptions_t *)ioctlp->inDatap;
302 ioctlp->inDatap += optionsp->size;
305 /* format the specified path to look like "/afs/<cellname>/usr", by
306 * adding "/afs" (if necessary) in front, changing any \'s to /'s, and
307 * removing any trailing "/"'s. One weirdo caveat: "/afs" will be
308 * intentionally returned as "/afs/"--this makes submount manipulation
309 * easier (because we can always jump past the initial "/afs" to find
310 * the AFS path that should be written into afsdsbmt.ini).
313 cm_NormalizeAfsPath(clientchar_t *outpathp, long cchlen, clientchar_t *inpathp)
316 clientchar_t bslash_mountRoot[256];
318 cm_ClientStrCpy(bslash_mountRoot, lengthof(bslash_mountRoot), cm_mountRootC);
319 bslash_mountRoot[0] = '\\';
321 if (!cm_ClientStrCmpNI(inpathp, cm_mountRootC, cm_mountRootCLen))
322 cm_ClientStrCpy(outpathp, cchlen, inpathp);
323 else if (!cm_ClientStrCmpNI(inpathp, bslash_mountRoot,
324 cm_ClientStrLen(bslash_mountRoot)))
325 cm_ClientStrCpy(outpathp, cchlen, inpathp);
326 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
327 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s%s"), cm_mountRootC, inpathp);
328 else // inpathp looks like "<cell>/usr"
329 cm_ClientStrPrintfN(outpathp, cchlen, _C("%s/%s"), cm_mountRootC, inpathp);
331 for (cp = outpathp; *cp != 0; ++cp) {
336 if (cm_ClientStrLen(outpathp) && (outpathp[cm_ClientStrLen(outpathp)-1] == '/')) {
337 outpathp[cm_ClientStrLen(outpathp)-1] = 0;
340 if (!cm_ClientStrCmpI(outpathp, cm_mountRootC)) {
341 cm_ClientStrCpy(outpathp, cchlen, cm_mountRootC);
345 void cm_NormalizeAfsPathAscii(char *outpathp, long outlen, char *inpathp)
348 char bslash_mountRoot[256];
350 strncpy(bslash_mountRoot, cm_mountRoot, sizeof(bslash_mountRoot) - 1);
351 bslash_mountRoot[0] = '\\';
353 if (!strnicmp (inpathp, cm_mountRoot, strlen(cm_mountRoot)))
354 StringCbCopy(outpathp, outlen, inpathp);
355 else if (!strnicmp (inpathp, bslash_mountRoot, strlen(bslash_mountRoot)))
356 StringCbCopy(outpathp, outlen, inpathp);
357 else if ((inpathp[0] == '/') || (inpathp[0] == '\\'))
358 StringCbPrintfA(outpathp, outlen, "%s%s", cm_mountRoot, inpathp);
359 else // inpathp looks like "<cell>/usr"
360 StringCbPrintfA(outpathp, outlen, "%s/%s", cm_mountRoot, inpathp);
362 for (cp = outpathp; *cp != 0; ++cp) {
367 if (strlen(outpathp) && (outpathp[strlen(outpathp)-1] == '/')) {
368 outpathp[strlen(outpathp)-1] = 0;
371 if (!strcmpi (outpathp, cm_mountRoot)) {
372 StringCbCopy(outpathp, outlen, cm_mountRoot);
378 * VIOCGETAL internals.
380 * Assumes that pioctl path has been parsed or skipped.
381 * scp is held but not locked.
384 cm_IoctlGetACL(cm_ioctl_t *ioctlp, cm_user_t *userp, cm_scache_t *scp, cm_req_t *reqp)
389 AFSFetchStatus fileStatus;
393 struct rx_connection * rxconnp;
395 /* now make the get acl call */
396 #ifdef AFS_FREELANCE_CLIENT
397 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
399 ioctlp->outDatap[0] ='\0';
403 afid.Volume = scp->fid.volume;
404 afid.Vnode = scp->fid.vnode;
405 afid.Unique = scp->fid.unique;
407 acl.AFSOpaque_val = ioctlp->outDatap;
408 acl.AFSOpaque_len = 0;
409 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
413 rxconnp = cm_GetRxConn(connp);
414 code = RXAFS_FetchACL(rxconnp, &afid, &acl, &fileStatus, &volSync);
415 rx_PutConnection(rxconnp);
417 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
418 code = cm_MapRPCError(code, reqp);
423 /* skip over return data */
424 tlen = (int)strlen(ioctlp->outDatap) + 1;
425 ioctlp->outDatap += tlen;
427 /* and return success */
433 * VIOC_FILE_CELL_NAME internals.
435 * Assumes that pioctl path has been parsed or skipped.
436 * scp is held but not locked.
439 cm_IoctlGetFileCellName(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
444 #ifdef AFS_FREELANCE_CLIENT
445 if ( cm_freelanceEnabled &&
446 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
447 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID &&
448 scp->fid.vnode==0x1 && scp->fid.unique==0x1 ) {
449 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
450 ioctlp->outDatap += strlen(ioctlp->outDatap) + 1;
453 #endif /* AFS_FREELANCE_CLIENT */
455 cellp = cm_FindCellByID(scp->fid.cell, CM_FLAG_NOPROBE);
457 clientchar_t * cellname;
459 cellname = cm_FsStringToClientStringAlloc(cellp->name, -1, NULL);
460 if (cellname == NULL) {
461 code = CM_ERROR_NOSUCHCELL;
463 cm_UnparseIoctlString(ioctlp, NULL, cellname, -1);
468 code = CM_ERROR_NOSUCHCELL;
476 * VIOCSETAL internals.
478 * Assumes that pioctl path has been parsed or skipped.
479 * scp is held but not locked.
482 cm_IoctlSetACL(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
487 AFSFetchStatus fileStatus;
490 struct rx_connection * rxconnp;
492 #ifdef AFS_FREELANCE_CLIENT
493 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
494 code = CM_ERROR_NOACCESS;
498 /* now make the get acl call */
499 fid.Volume = scp->fid.volume;
500 fid.Vnode = scp->fid.vnode;
501 fid.Unique = scp->fid.unique;
503 acl.AFSOpaque_val = ioctlp->inDatap;
504 acl.AFSOpaque_len = (u_int)strlen(ioctlp->inDatap)+1;
505 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
509 rxconnp = cm_GetRxConn(connp);
510 code = RXAFS_StoreACL(rxconnp, &fid, &acl, &fileStatus, &volSync);
511 rx_PutConnection(rxconnp);
513 } while (cm_Analyze(connp, userp, reqp, &scp->fid, &volSync, NULL, NULL, code));
514 code = cm_MapRPCError(code, reqp);
516 /* invalidate cache info, since we just trashed the ACL cache */
517 lock_ObtainWrite(&scp->rw);
518 cm_DiscardSCache(scp);
519 lock_ReleaseWrite(&scp->rw);
526 * VIOC_FLUSHALL internals.
528 * Assumes that pioctl path has been parsed or skipped.
531 cm_IoctlFlushAllVolumes(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
537 lock_ObtainWrite(&cm_scacheLock);
538 for (i=0; i<cm_data.scacheHashTableSize; i++) {
539 for (scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp) {
540 cm_HoldSCacheNoLock(scp);
541 lock_ReleaseWrite(&cm_scacheLock);
543 /* now flush the file */
544 code = cm_FlushFile(scp, userp, reqp);
545 lock_ObtainWrite(&cm_scacheLock);
546 cm_ReleaseSCacheNoLock(scp);
549 lock_ReleaseWrite(&cm_scacheLock);
555 * VIOC_FLUSHVOLUME internals.
557 * Assumes that pioctl path has been parsed or skipped.
558 * scp is held but not locked.
561 cm_IoctlFlushVolume(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
567 #ifdef AFS_FREELANCE_CLIENT
568 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
569 code = CM_ERROR_NOACCESS;
573 volume = scp->fid.volume;
574 cell = scp->fid.cell;
575 code = cm_FlushVolume(userp, reqp, cell, volume);
581 * VIOCFLUSH internals.
583 * Assumes that pioctl path has been parsed or skipped.
584 * scp is held but not locked.
587 cm_IoctlFlushFile(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
591 #ifdef AFS_FREELANCE_CLIENT
592 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
593 code = CM_ERROR_NOACCESS;
597 cm_FlushFile(scp, userp, reqp);
604 * VIOCSETVOLSTAT internals.
606 * Assumes that pioctl path has been parsed or skipped.
607 * scp is held but not locked.
610 cm_IoctlSetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
614 char offLineMsg[256];
617 AFSFetchVolumeStatus volStat;
618 AFSStoreVolumeStatus storeStat;
623 struct rx_connection * rxconnp;
625 #ifdef AFS_FREELANCE_CLIENT
626 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
627 code = CM_ERROR_NOACCESS;
631 cellp = cm_FindCellByID(scp->fid.cell, 0);
632 osi_assertx(cellp, "null cm_cell_t");
634 if (scp->flags & CM_SCACHEFLAG_RO)
635 return CM_ERROR_READONLY;
637 code = cm_FindVolumeByID(cellp, scp->fid.volume, userp, reqp,
638 CM_GETVOL_FLAG_CREATE, &tvp);
644 /* Copy the junk out, using cp as a roving pointer. */
645 memcpy((char *)&volStat, ioctlp->inDatap, sizeof(AFSFetchVolumeStatus));
646 ioctlp->inDatap += sizeof(AFSFetchVolumeStatus);
648 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
649 cm_ClientStringToFsString(strp, -1, volName, lengthof(volName));
652 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
653 cm_ClientStringToFsString(strp, -1, offLineMsg, lengthof(offLineMsg));
656 strp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
657 cm_ClientStringToFsString(strp, -1, motd, lengthof(motd));
663 if (volStat.MinQuota != -1) {
664 storeStat.MinQuota = volStat.MinQuota;
665 storeStat.Mask |= AFS_SETMINQUOTA;
667 if (volStat.MaxQuota != -1) {
668 storeStat.MaxQuota = volStat.MaxQuota;
669 storeStat.Mask |= AFS_SETMAXQUOTA;
673 code = cm_ConnFromFID(&scp->fid, userp, reqp, &tcp);
677 rxconnp = cm_GetRxConn(tcp);
678 code = RXAFS_SetVolumeStatus(rxconnp, scp->fid.volume,
679 &storeStat, volName, offLineMsg, motd);
680 rx_PutConnection(rxconnp);
682 } while (cm_Analyze(tcp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
683 code = cm_MapRPCError(code, reqp);
686 /* return on failure */
690 /* we are sending parms back to make compat. with prev system. should
691 * change interface later to not ask for current status, just set
694 cp = ioctlp->outDatap;
695 memcpy(cp, (char *)&volStat, sizeof(VolumeStatus));
696 cp += sizeof(VolumeStatus);
697 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
698 cp += strlen(volName)+1;
699 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
700 cp += strlen(offLineMsg)+1;
701 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
702 cp += strlen(motd)+1;
704 /* now return updated return data pointer */
705 ioctlp->outDatap = cp;
712 * VIOCGETVOLSTAT internals.
714 * Assumes that pioctl path has been parsed or skipped.
715 * scp is held but not locked.
718 cm_IoctlGetVolumeStatus(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
721 char volName[32]="(unknown)";
722 char offLineMsg[256]="server temporarily inaccessible";
723 char motd[256]="server temporarily inaccessible";
725 AFSFetchVolumeStatus volStat;
730 struct rx_connection * rxconnp;
732 #ifdef AFS_FREELANCE_CLIENT
733 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
735 strncpy(volName, "Freelance.Local.Root", sizeof(volName));
736 offLineMsg[0] = '\0';
737 strncpy(motd, "Freelance mode in use.", sizeof(motd));
738 volStat.Vid = scp->fid.volume;
739 volStat.MaxQuota = 0;
740 volStat.BlocksInUse = 100;
741 volStat.PartBlocksAvail = 0;
742 volStat.PartMaxBlocks = 100;
747 OfflineMsg = offLineMsg;
750 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
753 rxconnp = cm_GetRxConn(connp);
754 code = RXAFS_GetVolumeStatus(rxconnp, scp->fid.volume,
755 &volStat, &Name, &OfflineMsg, &MOTD);
756 rx_PutConnection(rxconnp);
758 } while (cm_Analyze(connp, userp, reqp, &scp->fid, NULL, NULL, NULL, code));
759 code = cm_MapRPCError(code, reqp);
765 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
766 cp = ioctlp->outDatap;
767 memcpy(cp, (char *)&volStat, sizeof(AFSFetchVolumeStatus));
768 cp += sizeof(AFSFetchVolumeStatus);
769 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), volName);
770 cp += strlen(volName)+1;
771 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), offLineMsg);
772 cp += strlen(offLineMsg)+1;
773 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), motd);
774 cp += strlen(motd)+1;
776 /* return new size */
777 ioctlp->outDatap = cp;
783 * VIOCGETFID internals.
785 * Assumes that pioctl path has been parsed or skipped.
786 * scp is held but not locked.
789 cm_IoctlGetFid(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
794 memset(&fid, 0, sizeof(cm_fid_t));
795 fid.cell = scp->fid.cell;
796 fid.volume = scp->fid.volume;
797 fid.vnode = scp->fid.vnode;
798 fid.unique = scp->fid.unique;
800 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
801 cp = ioctlp->outDatap;
802 memcpy(cp, (char *)&fid, sizeof(cm_fid_t));
803 cp += sizeof(cm_fid_t);
805 /* return new size */
806 ioctlp->outDatap = cp;
812 * VIOC_GETFILETYPE internals.
814 * Assumes that pioctl path has been parsed or skipped.
815 * scp is held but not locked.
818 cm_IoctlGetFileType(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
822 afs_uint32 fileType = 0;
824 if (scp->fileType == 0) {
825 lock_ObtainWrite(&scp->rw);
826 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
827 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
829 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
830 lock_ReleaseWrite(&scp->rw);
834 fileType = scp->fileType;
836 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
837 cp = ioctlp->outDatap;
838 memcpy(cp, (char *)&fileType, sizeof(fileType));
839 cp += sizeof(fileType);
841 /* return new size */
842 ioctlp->outDatap = cp;
848 * VIOCGETOWNER internals.
850 * Assumes that pioctl path has been parsed or skipped.
851 * scp is held but not locked.
854 cm_IoctlGetOwner(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
859 lock_ObtainWrite(&scp->rw);
860 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
861 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
863 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
864 lock_ReleaseWrite(&scp->rw);
867 /* Copy all this junk into msg->im_data, keeping track of the lengths. */
868 cp = ioctlp->outDatap;
869 memcpy(cp, (char *)&scp->owner, sizeof(afs_uint32));
870 cp += sizeof(afs_uint32);
871 memcpy(cp, (char *)&scp->group, sizeof(afs_uint32));
872 cp += sizeof(afs_uint32);
874 /* return new size */
875 ioctlp->outDatap = cp;
882 * VIOCWHEREIS internals.
884 * Assumes that pioctl path has been parsed or skipped.
885 * scp is held but not locked.
888 cm_IoctlWhereIs(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
893 cm_serverRef_t **tsrpp, *current;
898 volume = scp->fid.volume;
900 cellp = cm_FindCellByID(scp->fid.cell, 0);
903 return CM_ERROR_NOSUCHCELL;
905 #ifdef AFS_FREELANCE_CLIENT
906 if ( cellp->cellID == AFS_FAKE_ROOT_CELL_ID) {
914 cp = ioctlp->outDatap;
916 memcpy(cp, (char *)&addr, sizeof(addr));
919 /* still room for terminating NULL, add it on */
921 memcpy(cp, (char *)&addr, sizeof(addr));
924 ioctlp->outDatap = cp;
928 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
932 cp = ioctlp->outDatap;
934 tsrpp = cm_GetVolServers(tvp, volume, userp, reqp);
936 code = CM_ERROR_NOSUCHVOLUME;
938 lock_ObtainRead(&cm_serverLock);
939 for (current = *tsrpp; current; current = current->next) {
940 tsp = current->server;
941 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
944 lock_ReleaseRead(&cm_serverLock);
945 cm_FreeServerList(tsrpp, 0);
947 /* still room for terminating NULL, add it on */
948 volume = 0; /* reuse vbl */
949 memcpy(cp, (char *)&volume, sizeof(long));
952 ioctlp->outDatap = cp;
959 * VIOC_AFS_STAT_MT_PT internals.
961 * Assumes that pioctl path has been parsed or skipped.
962 * scp is held but not locked.
965 cm_IoctlStatMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
971 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
973 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
977 lock_ObtainWrite(&scp->rw);
978 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
979 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
981 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
985 /* now check that this is a real mount point */
986 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
987 code = CM_ERROR_INVAL;
991 code = cm_ReadMountPoint(scp, userp, reqp);
994 strp = ioctlp->outDatap;
995 StringCbCopyA(strp, SMB_IOCTL_MAXDATA - (strp - ioctlp->outAllocp), scp->mountPointStringp);
996 strp += strlen(strp) + 1;
997 ioctlp->outDatap = strp;
1001 lock_ReleaseWrite(&scp->rw);
1002 cm_ReleaseSCache(scp);
1012 * VIOC_AFS_DELETE_MT_PT internals.
1014 * Assumes that pioctl path has been parsed or skipped.
1015 * scp is held but not locked.
1018 cm_IoctlDeleteMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1022 clientchar_t *cp = NULL;
1023 fschar_t *originalName = NULL;
1026 cp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1028 code = cm_Lookup(dscp, cp[0] ? cp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1030 /* if something went wrong, bail out now */
1034 lock_ObtainWrite(&scp->rw);
1035 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
1036 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1040 /* now check that this is a real mount point */
1041 if (scp->fileType != CM_SCACHETYPE_MOUNTPOINT) {
1042 code = CM_ERROR_INVAL;
1046 /* time to make the RPC, so drop the lock */
1047 lock_ReleaseWrite(&scp->rw);
1050 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
1052 code = cm_BPlusDirLookupOriginalName(&dirop, cp, &originalName);
1053 /* The cm_Dir* functions can't be used to lookup the
1054 originalName. Those functions only know of the original
1056 cm_EndDirOp(&dirop);
1060 /* If this name doesn't have a non-normalized name associated with
1061 it, we assume that what we had is what is actually present on
1064 if (originalName == NULL) {
1065 originalName = cm_ClientStringToFsStringAlloc(cp, -1, NULL);
1068 /* cp is a normalized name. originalName is the actual name we
1069 saw on the fileserver. */
1070 #ifdef AFS_FREELANCE_CLIENT
1071 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1072 /* we are removing the mount point to the root dir., so call
1073 * the freelance code to do the deletion. */
1074 osi_Log0(afsd_logp,"IoctlDeleteMountPoint from Freelance root dir");
1075 code = cm_FreelanceRemoveMount(originalName);
1079 /* easier to do it this way */
1080 code = cm_Unlink(dscp, originalName, cp, userp, reqp);
1082 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1083 smb_NotifyChange(FILE_ACTION_REMOVED,
1084 FILE_NOTIFY_CHANGE_DIR_NAME,
1085 dscp, cp, NULL, TRUE);
1087 lock_ObtainWrite(&scp->rw);
1089 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1092 cm_DiscardSCache(scp);
1093 lock_ReleaseWrite(&scp->rw);
1094 cm_ReleaseSCache(scp);
1097 if (originalName != NULL)
1107 * VIOCCKSERV internals.
1109 * Assumes that pioctl path has been parsed or skipped.
1112 cm_IoctlCheckServers(struct cm_ioctl *ioctlp, struct cm_user *userp)
1122 tp = ioctlp->inDatap;
1125 memcpy(&temp, tp, sizeof(temp));
1126 if (temp == 0x12345678) { /* For afs3.3 version */
1127 memcpy(&csi, tp, sizeof(csi));
1128 if (csi.tinterval >= 0) {
1129 cp = ioctlp->outDatap;
1130 memcpy(cp, (char *)&cm_daemonCheckDownInterval, sizeof(long));
1131 ioctlp->outDatap += sizeof(long);
1132 if (csi.tinterval > 0) {
1133 if (!smb_SUser(userp))
1134 return CM_ERROR_NOACCESS;
1135 cm_daemonCheckDownInterval = csi.tinterval;
1143 } else { /* For pre afs3.3 versions */
1144 memcpy((char *)&temp, ioctlp->inDatap, sizeof(long));
1145 ioctlp->inDatap = cp = ioctlp->inDatap + sizeof(long);
1146 if (cp - ioctlp->inAllocp < ioctlp->inCopied) /* still more data available */
1151 * 1: fast check, don't contact servers.
1152 * 2: local cell only.
1155 /* have cell name, too */
1156 cellp = cm_GetCell(cp, (temp & 1) ? CM_FLAG_NOPROBE : 0);
1158 return CM_ERROR_NOSUCHCELL;
1161 cellp = (cm_cell_t *) 0;
1162 if (!cellp && (temp & 2)) {
1163 /* use local cell */
1164 fschar_t wscell[CELL_MAXNAMELEN+1];
1165 cm_GetRootCellName(wscell);
1166 cellp = cm_GetCell(wscell, 0);
1168 if (!(temp & 1)) { /* if not fast, call server checker routine */
1169 /* check down servers */
1170 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS | CM_FLAG_CHECKUPSERVERS, cellp);
1173 /* now return the current down server list */
1174 cp = ioctlp->outDatap;
1175 lock_ObtainRead(&cm_serverLock);
1176 for (tsp = cm_allServersp; tsp; tsp=tsp->allNextp) {
1177 if (cellp && tsp->cellp != cellp)
1178 continue; /* cell spec'd and wrong */
1179 if ((tsp->flags & CM_SERVERFLAG_DOWN)
1180 && tsp->type == CM_SERVER_FILE) {
1181 memcpy(cp, (char *)&tsp->addr.sin_addr.s_addr, sizeof(long));
1185 lock_ReleaseRead(&cm_serverLock);
1187 ioctlp->outDatap = cp;
1192 * VIOCCKBACK internals.
1194 * Assumes that pioctl path has been parsed or skipped.
1197 cm_IoctlCheckVolumes(cm_ioctl_t *ioctlp, cm_user_t *userp)
1199 cm_RefreshVolumes();
1204 * VIOCSETCACHESIZE internals.
1206 * Assumes that pioctl path has been parsed or skipped.
1208 * This function is no longer meaningful in the current day world
1209 * of persistent caches. The buf_SetNBuffers() function will
1213 cm_IoctlSetCacheSize(struct cm_ioctl *ioctlp, struct cm_user *userp)
1218 memcpy(&temp, ioctlp->inDatap, sizeof(temp));
1220 temp = cm_data.buf_nOrigBuffers;
1222 /* temp is in 1K units, convert to # of buffers */
1223 temp = temp / (cm_data.buf_blockSize / 1024);
1226 /* now adjust the cache size */
1227 code = buf_SetNBuffers(temp);
1233 * VIOC_TRACECTL internals.
1235 * Assumes that pioctl path has been parsed or skipped.
1238 cm_IoctlTraceControl(cm_ioctl_t *ioctlp, cm_user_t *userp)
1242 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_uint32));
1246 afsd_ForceTrace(FALSE);
1247 buf_ForceTrace(FALSE);
1251 /* set tracing value to low order bit */
1252 if ((inValue & 1) == 0) {
1253 /* disable tracing */
1254 osi_LogDisable(afsd_logp);
1255 rx_DebugOnOff(FALSE);
1258 /* enable tracing */
1259 osi_LogEnable(afsd_logp);
1260 rx_DebugOnOff(TRUE);
1264 /* see if we're supposed to do a reset, too */
1266 osi_LogReset(afsd_logp);
1269 /* and copy out tracing flag */
1270 inValue = afsd_logp->enabled; /* use as a temp vbl */
1271 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_uint32));
1272 ioctlp->outDatap += sizeof(afs_uint32);
1277 * VIOCGETCACHEPARMS internals.
1279 * Assumes that pioctl path has been parsed or skipped.
1282 cm_IoctlGetCacheParms(struct cm_ioctl *ioctlp, struct cm_user *userp)
1284 cm_cacheParms_t parms;
1286 memset(&parms, 0, sizeof(parms));
1288 /* first we get, in 1K units, the cache size */
1289 parms.parms[0] = cm_data.buf_nbuffers * (cm_data.buf_blockSize / 1024);
1291 /* and then the actual # of buffers in use (not in the free list, I guess,
1292 * will be what we do).
1294 parms.parms[1] = (cm_data.buf_nbuffers - buf_CountFreeList()) * (cm_data.buf_blockSize / 1024);
1296 memcpy(ioctlp->outDatap, &parms, sizeof(parms));
1297 ioctlp->outDatap += sizeof(parms);
1303 * VIOCGETCELL internals.
1305 * Assumes that pioctl path has been parsed or skipped.
1308 cm_IoctlGetCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1313 cm_serverRef_t *serverRefp;
1314 cm_server_t *serverp;
1320 tp = ioctlp->inDatap;
1322 memcpy((char *)&whichCell, tp, sizeof(long));
1325 /* see if more than one long passed in, ignoring the null pathname (the -1) */
1326 if (ioctlp->inCopied-1 > sizeof(afs_uint32)) {
1327 memcpy((char *)&magic, tp, sizeof(afs_uint32));
1330 lock_ObtainRead(&cm_cellLock);
1331 for (tcellp = cm_data.allCellsp; tcellp; tcellp = tcellp->allNextp) {
1336 lock_ReleaseRead(&cm_cellLock);
1339 clientchar_t * cellnamep;
1341 cp = ioctlp->outDatap;
1343 if (magic == 0x12345678) {
1344 memcpy(cp, (char *)&magic, sizeof(long));
1347 memset(cp, 0, max * sizeof(long));
1349 lock_ObtainRead(&cm_serverLock); /* for going down server list */
1350 for (i=0, serverRefp = tcellp->vlServersp;
1351 serverRefp && i<max;
1352 i++, serverRefp = serverRefp->next) {
1353 serverp = serverRefp->server;
1354 memcpy(cp, &serverp->addr.sin_addr.s_addr, sizeof(long));
1357 lock_ReleaseRead(&cm_serverLock);
1358 ioctlp->outDatap = basep + max * sizeof(afs_int32);
1360 cellnamep = cm_FsStringToClientStringAlloc(tcellp->name, -1, NULL);
1362 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1372 return CM_ERROR_NOMORETOKENS; /* mapped to EDOM */
1377 * VIOCNEWCELL internals.
1379 * Assumes that pioctl path has been parsed or skipped.
1382 cm_IoctlNewCell(struct cm_ioctl *ioctlp, struct cm_user *userp)
1385 * All that needs to be done is to refresh server information for all cells that
1386 * are already loaded.
1388 * cell list will be cm_CellLock and cm_ServerLock will be held for write.
1392 cm_cell_rock_t rock;
1394 lock_ObtainWrite(&cm_cellLock);
1396 for (cp = cm_data.allCellsp; cp; cp=cp->allNextp)
1400 /* delete all previous server lists - cm_FreeServerList will ask for write on cm_ServerLock*/
1401 cm_FreeServerList(&cp->vlServersp, CM_FREESERVERLIST_DELETE);
1402 cp->vlServersp = NULL;
1403 lock_ReleaseWrite(&cm_cellLock);
1407 code = cm_SearchCellFile(cp->name, cp->name, cm_AddCellProc, &rock);
1408 #ifdef AFS_AFSDB_ENV
1410 if (cm_dnsEnabled) {
1412 code = cm_SearchCellByDNS(cp->name, cp->name, &ttl, cm_AddCellProc, &rock);
1413 if ( code == 0 ) { /* got cell from DNS */
1414 lock_ObtainMutex(&cp->mx);
1415 cp->flags |= CM_CELLFLAG_DNS;
1416 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1417 cp->timeout = time(0) + ttl;
1418 lock_ReleaseMutex(&cp->mx);
1423 lock_ObtainMutex(&cp->mx);
1424 cp->flags &= ~CM_CELLFLAG_DNS;
1425 lock_ReleaseMutex(&cp->mx);
1427 #endif /* AFS_AFSDB_ENV */
1429 lock_ObtainMutex(&cp->mx);
1430 cp->flags |= CM_CELLFLAG_VLSERVER_INVALID;
1431 lock_ReleaseMutex(&cp->mx);
1432 lock_ObtainWrite(&cm_cellLock);
1435 lock_ObtainMutex(&cp->mx);
1436 cp->flags &= ~CM_CELLFLAG_VLSERVER_INVALID;
1437 lock_ReleaseMutex(&cp->mx);
1438 lock_ObtainWrite(&cm_cellLock);
1439 cm_RandomizeServer(&cp->vlServersp);
1442 lock_ReleaseWrite(&cm_cellLock);
1447 * VIOC_GET_WS_CELL internals.
1449 * Assumes that pioctl path has been parsed or skipped.
1452 cm_IoctlGetWsCell(cm_ioctl_t *ioctlp, cm_user_t *userp)
1456 if (cm_freelanceEnabled) {
1457 if (cm_GetRootCellName(ioctlp->outDatap))
1458 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "Freelance.Local.Root");
1459 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
1460 } else if (cm_data.rootCellp) {
1461 clientchar_t * cellnamep = cm_FsStringToClientStringAlloc(cm_data.rootCellp->name, -1, NULL);
1462 /* return the default cellname to the caller */
1464 cm_UnparseIoctlString(ioctlp, NULL, cellnamep, -1);
1467 code = CM_ERROR_NOSUCHCELL;
1470 /* if we don't know our default cell, return failure */
1471 code = CM_ERROR_NOSUCHCELL;
1478 * VIOC_AFS_SYSNAME internals.
1480 * Assumes that pioctl path has been parsed or skipped.
1483 cm_IoctlSysName(struct cm_ioctl *ioctlp, struct cm_user *userp)
1485 afs_uint32 setSysName;
1487 clientchar_t *inname = NULL;
1490 memcpy(&setSysName, ioctlp->inDatap, sizeof(afs_uint32));
1491 ioctlp->inDatap += sizeof(afs_uint32);
1495 if ( setSysName < 0 || setSysName > MAXNUMSYSNAMES )
1497 cp2 = ioctlp->inDatap;
1498 for ( cp=ioctlp->inDatap, count = 0; count < setSysName; count++ ) {
1499 /* won't go past end of ioctlp->inDatap since
1500 maxsysname*num < ioctlp->inDatap length */
1501 t = (int)strlen(cp);
1502 if (t >= MAXSYSNAME || t <= 0)
1504 /* check for names that can shoot us in the foot */
1505 if (*cp == '.' && (cp[1] == 0 || (cp[1] == '.' && cp[2] == 0)))
1511 /* inname gets first entry in case we're being a translator */
1512 /* (we are never a translator) */
1513 inname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1516 /* Not xlating, so local case */
1518 osi_panic("cm_IoctlSysName: !cm_sysName\n", __FILE__, __LINE__);
1521 /* Local guy; only root can change sysname */
1522 /* clear @sys entries from the dnlc, once afs_lookup can
1523 * do lookups of @sys entries and thinks it can trust them */
1524 /* privs ok, store the entry, ... */
1526 cm_ClientStrCpy(cm_sysName, lengthof(cm_sysName), inname);
1527 cm_ClientStrCpy(cm_sysNameList[0], MAXSYSNAME, inname);
1529 if (setSysName > 1) { /* ... or list */
1530 for (count = 1; count < setSysName; ++count) {
1531 clientchar_t * newsysname;
1533 if (!cm_sysNameList[count])
1534 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to write\n",
1535 __FILE__, __LINE__);
1537 newsysname = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1538 cm_ClientStrCpy(cm_sysNameList[count], MAXSYSNAME, newsysname);
1542 cm_sysNameCount = setSysName;
1546 /* return the sysname to the caller */
1547 i32 = cm_sysNameCount;
1548 memcpy(ioctlp->outDatap, &i32, sizeof(afs_int32));
1549 ioctlp->outDatap += sizeof(afs_int32); /* skip found flag */
1551 if (cm_sysNameCount) {
1552 for ( count=0; count < cm_sysNameCount ; ++count) { /* ... or list */
1553 if ( !cm_sysNameList[count] || *cm_sysNameList[count] == _C('\0'))
1554 osi_panic("cm_IoctlSysName: no cm_sysNameList entry to read\n",
1555 __FILE__, __LINE__);
1556 cm_UnparseIoctlString(ioctlp, NULL, cm_sysNameList[count], -1);
1571 * VIOC_GETCELLSTATUS internals.
1573 * Assumes that pioctl path has been parsed or skipped.
1576 cm_IoctlGetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1580 clientchar_t * cellnamep;
1581 fschar_t * fscellnamep;
1583 cellnamep = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1584 fscellnamep = cm_ClientStringToFsStringAlloc(cellnamep, -1, NULL);
1585 cellp = cm_GetCell(fscellnamep, 0);
1590 return CM_ERROR_NOSUCHCELL;
1593 lock_ObtainMutex(&cellp->mx);
1594 if (cellp->flags & CM_CELLFLAG_SUID)
1595 temp |= CM_SETCELLFLAG_SUID;
1596 lock_ReleaseMutex(&cellp->mx);
1598 /* now copy out parm */
1599 memcpy(ioctlp->outDatap, &temp, sizeof(afs_uint32));
1600 ioctlp->outDatap += sizeof(afs_uint32);
1606 * VIOC_SETCELLSTATUS internals.
1608 * Assumes that pioctl path has been parsed or skipped.
1611 cm_IoctlSetCellStatus(struct cm_ioctl *ioctlp, struct cm_user *userp)
1616 fschar_t * cellnamep;
1618 temp = cm_ParseIoctlStringAlloc(ioctlp, ioctlp->inDatap + 2*sizeof(afs_uint32));
1619 cellnamep = cm_ClientStringToFsStringAlloc(temp, -1, NULL);
1620 cellp = cm_GetCell(cellnamep, 0);
1625 return CM_ERROR_NOSUCHCELL;
1627 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_uint32));
1629 lock_ObtainMutex(&cellp->mx);
1630 if (flags & CM_SETCELLFLAG_SUID)
1631 cellp->flags |= CM_CELLFLAG_SUID;
1633 cellp->flags &= ~CM_CELLFLAG_SUID;
1634 lock_ReleaseMutex(&cellp->mx);
1640 * VIOC_SETSPREFS internals.
1642 * Assumes that pioctl path has been parsed or skipped.
1645 cm_IoctlSetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1647 cm_SSetPref_t *spin; /* input */
1648 cm_SPref_t *srvin; /* one input component */
1650 int i, vlonly, noServers, type;
1651 struct sockaddr_in tmp;
1652 unsigned short rank;
1654 spin = (cm_SSetPref_t *)ioctlp->inDatap;
1655 noServers = spin->num_servers;
1656 vlonly = spin->flags;
1658 type = CM_SERVER_VLDB;
1660 type = CM_SERVER_FILE;
1662 for ( i=0; i < noServers; i++)
1664 srvin = &(spin->servers[i]);
1665 rank = srvin->rank + (rand() & 0x000f);
1666 tmp.sin_addr = srvin->host;
1667 tmp.sin_family = AF_INET;
1669 tsp = cm_FindServer(&tmp, type);
1670 if ( tsp ) /* an existing server - ref count increased */
1672 tsp->ipRank = rank; /* no need to protect by mutex*/
1674 if (type == CM_SERVER_FILE)
1676 /* find volumes which might have RO copy
1677 /* on server and change the ordering of
1680 cm_ChangeRankVolume(tsp);
1684 /* set preferences for an existing vlserver */
1685 cm_ChangeRankCellVLServer(tsp);
1688 else /* add a new server without a cell */
1690 tsp = cm_NewServer(&tmp, type, NULL, CM_FLAG_NOPROBE); /* refcount = 1 */
1693 lock_ObtainMutex(&tsp->mx);
1694 tsp->flags |= CM_SERVERFLAG_PREF_SET;
1695 lock_ReleaseMutex(&tsp->mx);
1696 cm_PutServer(tsp); /* decrease refcount */
1702 * VIOC_GETSPREFS internals.
1704 * Assumes that pioctl path has been parsed or skipped.
1707 cm_IoctlGetSPrefs(struct cm_ioctl *ioctlp, struct cm_user *userp)
1709 cm_SPrefRequest_t *spin; /* input */
1710 cm_SPrefInfo_t *spout; /* output */
1711 cm_SPref_t *srvout; /* one output component */
1713 int i, vlonly, noServers;
1715 spin = (cm_SPrefRequest_t *)ioctlp->inDatap;
1716 spout = (cm_SPrefInfo_t *) ioctlp->outDatap;
1717 srvout = spout->servers;
1718 noServers = spin->num_servers;
1719 vlonly = spin->flags & CM_SPREF_VLONLY;
1720 spout->num_servers = 0;
1722 lock_ObtainRead(&cm_serverLock); /* get server lock */
1724 for (tsp=cm_allServersp, i=0; tsp && noServers; tsp=tsp->allNextp,i++){
1725 if (spin->offset > i) {
1726 continue; /* catch up to where we left off */
1729 if ( vlonly && (tsp->type == CM_SERVER_FILE) )
1730 continue; /* ignore fileserver for -vlserver option*/
1731 if ( !vlonly && (tsp->type == CM_SERVER_VLDB) )
1732 continue; /* ignore vlservers */
1734 srvout->host = tsp->addr.sin_addr;
1735 srvout->rank = tsp->ipRank;
1737 spout->num_servers++;
1740 lock_ReleaseRead(&cm_serverLock); /* release server lock */
1742 if ( tsp ) /* we ran out of space in the output buffer */
1743 spout->next_offset = i;
1745 spout->next_offset = 0;
1746 ioctlp->outDatap += sizeof(cm_SPrefInfo_t) +
1747 (spout->num_servers -1 ) * sizeof(cm_SPref_t) ;
1753 * VIOC_AFS_CREATE_MT_PT internals.
1755 * Assumes that pioctl path has been parsed or skipped.
1756 * dscp is held but not locked.
1759 cm_IoctlCreateMountPoint(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1764 fschar_t mpInfo[512]; /* mount point string */
1765 fschar_t fullCell[CELL_MAXNAMELEN];
1766 fschar_t *fscell = NULL;
1767 fschar_t *fsvolume = NULL;
1768 clientchar_t volume[VL_MAXNAMELEN];
1769 clientchar_t *mpp = NULL;
1770 clientchar_t *cell = NULL;
1771 cm_volume_t *volp = NULL;
1772 cm_cell_t *cellp = NULL;
1776 * The fs command allows the user to specify partial cell names on NT. These must
1777 * be expanded to the full cell name for mount points so that the mount points will
1778 * work on UNIX clients.
1781 /* Extract the possibly partial cell name */
1782 mpp = cm_ParseIoctlStringAlloc(ioctlp, NULL);
1783 cell = cm_ClientCharNext(mpp);
1784 if (cp = cm_ClientStrChr(cell, ':')) {
1786 /* Extract the volume name */
1788 cm_ClientStrCpy(volume, lengthof(volume), cm_ClientCharNext(cp));
1790 fscell = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1791 fsvolume = cm_ClientStringToFsStringAlloc(volume, -1, NULL);
1793 /* Get the full name for this cell */
1794 cellp = cm_GetCell_Gen(fscell, fullCell, CM_FLAG_NOPROBE);
1796 code = CM_ERROR_NOSUCHCELL;
1800 StringCbPrintfA(mpInfo, sizeof(mpInfo), "%c%s:%s", (char) *mpp,
1801 fullCell, fsvolume);
1804 /* No cell name specified, so cell points at the volume instead. */
1805 fsvolume = cm_ClientStringToFsStringAlloc(cell, -1, NULL);
1806 cm_ClientStringToFsString(mpp, -1, mpInfo, lengthof(mpInfo));
1807 cellp = cm_FindCellByID(dscp->fid.cell, CM_FLAG_NOPROBE);
1810 /* remove the trailing dot if it is present */
1811 len = strlen(fsvolume);
1812 if (len > 1 && fsvolume[len-1] == '.')
1813 fsvolume[len-1] = '\0';
1815 /* validate the target info */
1816 if (cm_VolNameIsID(fsvolume)) {
1817 code = cm_FindVolumeByID(cellp, atoi(fsvolume), userp, reqp,
1818 CM_GETVOL_FLAG_CREATE, &volp);
1820 code = cm_FindVolumeByName(cellp, fsvolume, userp, reqp,
1821 CM_GETVOL_FLAG_CREATE, &volp);
1826 #ifdef AFS_FREELANCE_CLIENT
1827 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1828 /* we are adding the mount point to the root dir, so call
1829 * the freelance code to do the add. */
1830 fschar_t * fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1831 osi_Log0(afsd_logp,"IoctlCreateMountPoint within Freelance root dir");
1832 code = cm_FreelanceAddMount(fsleaf, fullCell, fsvolume, *mpInfo == '%', NULL);
1837 /* create the symlink with mode 644. The lack of X bits tells
1838 * us that it is a mount point.
1840 tattr.mask = CM_ATTRMASK_UNIXMODEBITS | CM_ATTRMASK_CLIENTMODTIME;
1841 tattr.unixModeBits = 0644;
1842 tattr.clientModTime = time(NULL);
1844 code = cm_SymLink(dscp, leaf, mpInfo, 0, &tattr, userp, reqp);
1847 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1848 smb_NotifyChange(FILE_ACTION_ADDED,
1849 FILE_NOTIFY_CHANGE_DIR_NAME,
1850 dscp, leaf, NULL, TRUE);
1866 * VIOC_SYMLINK internals.
1868 * Assumes that pioctl path has been parsed or skipped.
1869 * dscp is held but not locked.
1872 cm_IoctlSymlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp, clientchar_t *leaf)
1878 int free_syml = FALSE;
1880 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1881 /* Translate chars for the linked to name */
1882 TranslateExtendedChars(ioctlp->inDatap);
1885 cp = symlp = ioctlp->inDatap; /* contents of link */
1887 #ifdef AFS_FREELANCE_CLIENT
1888 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1889 /* we are adding the symlink to the root dir., so call
1890 * the freelance code to do the add. */
1893 if (cp[0] == cp[1] && cp[1] == '\\' &&
1894 !_strnicmp(cm_NetbiosName,cp+2,strlen(cm_NetbiosName)))
1896 /* skip \\AFS\ or \\AFS\all\ */
1898 p = cp + 2 + strlen(cm_NetbiosName) + 1;
1899 if ( !_strnicmp("all", p, 3) )
1904 osi_Log0(afsd_logp,"IoctlCreateSymlink within Freelance root dir");
1905 fsleaf = cm_ClientStringToFsStringAlloc(leaf, -1, NULL);
1906 code = cm_FreelanceAddSymlink(fsleaf, cp, NULL);
1911 /* Create symlink with mode 0755. */
1912 tattr.mask = CM_ATTRMASK_UNIXMODEBITS;
1913 tattr.unixModeBits = 0755;
1915 code = cm_SymLink(dscp, leaf, cp, 0, &tattr, userp, reqp);
1918 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
1919 smb_NotifyChange(FILE_ACTION_ADDED,
1920 FILE_NOTIFY_CHANGE_FILE_NAME
1921 | FILE_NOTIFY_CHANGE_DIR_NAME,
1922 dscp, leaf, NULL, TRUE);
1928 * VIOC_LISTSYMLINK internals.
1930 * Assumes that pioctl path has been parsed or skipped.
1931 * dscp is held but not locked.
1934 cm_IoctlListlink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
1940 cm_scache_t *newRootScp;
1941 clientchar_t *clientp;
1943 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
1944 /* Translate chars for the link name */
1945 TranslateExtendedChars(ioctlp->inDatap);
1947 cp = ioctlp->inDatap;
1949 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
1950 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1955 /* Check that it's a real symlink */
1956 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
1957 scp->fileType != CM_SCACHETYPE_DFSLINK &&
1958 scp->fileType != CM_SCACHETYPE_INVALID) {
1959 cm_ReleaseSCache(scp);
1960 return CM_ERROR_INVAL;
1963 code = cm_AssembleLink(scp, "", &newRootScp, &spacep, userp, reqp);
1964 cm_ReleaseSCache(scp);
1967 cp = ioctlp->outDatap;
1968 if (newRootScp != NULL) {
1969 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), cm_mountRoot);
1970 StringCbCatA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), "/");
1974 linkstr = cm_ClientStringToFsStringAlloc(spacep->wdata, -1, NULL);
1975 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), linkstr);
1976 cp += strlen(cp) + 1;
1977 ioctlp->outDatap = cp;
1978 cm_FreeSpace(spacep);
1980 if (newRootScp != NULL)
1981 cm_ReleaseSCache(newRootScp);
1983 } else if (code == CM_ERROR_PATH_NOT_COVERED &&
1984 scp->fileType == CM_SCACHETYPE_DFSLINK ||
1985 code == CM_ERROR_NOSUCHPATH &&
1986 scp->fileType == CM_SCACHETYPE_INVALID) {
1988 cp = ioctlp->outDatap;
1989 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), scp->mountPointStringp);
1990 cp += strlen(cp) + 1;
1991 ioctlp->outDatap = cp;
1999 * VIOC_ISSYMLINK internals.
2001 * Assumes that pioctl path has been parsed or skipped.
2002 * dscp is held but not locked.
2005 cm_IoctlIslink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2006 {/*CHECK FOR VALID SYMLINK*/
2010 clientchar_t *clientp;
2012 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2013 /* Translate chars for the link name */
2014 TranslateExtendedChars(ioctlp->inDatap);
2016 cp = ioctlp->inDatap;
2017 osi_LogEvent("cm_IoctlListlink",NULL," name[%s]",cp);
2019 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2020 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2025 /* Check that it's a real symlink */
2026 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2027 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2028 scp->fileType != CM_SCACHETYPE_INVALID)
2029 code = CM_ERROR_INVAL;
2030 cm_ReleaseSCache(scp);
2035 * VIOC_DELSYMLINK internals.
2037 * Assumes that pioctl path has been parsed or skipped.
2038 * dscp is held but not locked.
2041 cm_IoctlDeletelink(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *dscp, cm_req_t *reqp)
2046 char * originalName = NULL;
2048 clientchar_t *clientp;
2050 if (!(ioctlp->flags & CM_IOCTLFLAG_USEUTF8)) {
2051 /* Translate chars for the link name */
2052 TranslateExtendedChars(ioctlp->inDatap);
2054 cp = ioctlp->inDatap;
2056 clientp = cm_Utf8ToClientStringAlloc(cp, -1, NULL);
2057 code = cm_Lookup(dscp, clientp[0] ? clientp : L".", CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
2059 /* if something went wrong, bail out now */
2063 lock_ObtainWrite(&scp->rw);
2064 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2065 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2069 /* now check that this is a real symlink */
2070 if (scp->fileType != CM_SCACHETYPE_SYMLINK &&
2071 scp->fileType != CM_SCACHETYPE_DFSLINK &&
2072 scp->fileType != CM_SCACHETYPE_INVALID) {
2073 code = CM_ERROR_INVAL;
2077 /* time to make the RPC, so drop the lock */
2078 lock_ReleaseWrite(&scp->rw);
2081 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
2083 code = cm_BPlusDirLookupOriginalName(&dirop, clientp, &originalName);
2084 /* cm_Dir*() functions can't be used to lookup the original
2085 name since those functions only know of the original
2087 cm_EndDirOp(&dirop);
2091 /* If this name doesn't have a non-normalized name associated with
2092 it, we assume that what we had is what is actually present on
2095 if (originalName == NULL)
2098 /* cp is a normalized name. originalName is the actual name we
2099 saw on the fileserver. */
2102 #ifdef AFS_FREELANCE_CLIENT
2103 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
2104 /* we are adding the mount point to the root dir., so call
2105 * the freelance code to do the add. */
2106 osi_Log0(afsd_logp,"IoctlDeletelink from Freelance root dir");
2107 code = cm_FreelanceRemoveSymlink(originalName);
2111 /* easier to do it this way */
2112 code = cm_Unlink(dscp, originalName, clientp, userp, reqp);
2114 if (code == 0 && (dscp->flags & CM_SCACHEFLAG_ANYWATCH))
2115 smb_NotifyChange(FILE_ACTION_REMOVED,
2116 FILE_NOTIFY_CHANGE_FILE_NAME
2117 | FILE_NOTIFY_CHANGE_DIR_NAME,
2118 dscp, clientp, NULL, TRUE);
2120 if (originalName != NULL && originalName != cp) {
2122 originalName = NULL;
2125 lock_ObtainWrite(&scp->rw);
2127 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2130 cm_DiscardSCache(scp);
2131 lock_ReleaseWrite(&scp->rw);
2132 cm_ReleaseSCache(scp);
2141 /* Utility function. Not currently used.
2142 * This function performs a PTS lookup which has traditionally
2143 * not been performed by the cache manager.
2146 cm_UsernameToId(char *uname, cm_ucell_t * ucellp, afs_uint32* uid)
2151 static struct afsconf_cell info;
2152 struct rx_connection *serverconns[MAXSERVERS];
2153 struct rx_securityClass *sc[3];
2154 afs_int32 scIndex = 2; /* authenticated - we have a token */
2155 struct ubik_client *pruclient = NULL;
2156 struct afsconf_dir *tdir;
2160 tdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH);
2161 code = afsconf_GetCellInfo(tdir, ucellp->cellp->name, "afsprot", &info);
2162 afsconf_Close(tdir);
2168 /* we have the token that was given to us in the settoken
2169 * call. we just have to use it.
2171 scIndex = 2; /* kerberos ticket */
2172 sc[2] = rxkad_NewClientSecurityObject(rxkad_clear, &ucellp->sessionKey,
2173 ucellp->kvno, ucellp->ticketLen,
2176 memset(serverconns, 0, sizeof(serverconns)); /* terminate list!!! */
2177 for (i = 0; i < info.numServers; i++)
2179 rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
2180 info.hostAddr[i].sin_port, PRSRV, sc[scIndex],
2183 code = ubik_ClientInit(serverconns, &pruclient);
2188 code = rxs_Release(sc[scIndex]);
2190 lids.idlist_len = 0;
2191 lids.idlist_val = 0;
2192 lnames.namelist_len = 1;
2193 lnames.namelist_val = (prname *) malloc(PR_MAXNAMELEN);
2194 strncpy(lnames.namelist_val[0], uname, PR_MAXNAMELEN);
2195 lnames.namelist_val[0][PR_MAXNAMELEN-1] = '\0';
2196 for ( p=lnames.namelist_val[0], r=NULL; *p; p++ ) {
2202 if (r && !cm_stricmp_utf8(r+1,ucellp->cellp->name))
2205 code = ubik_PR_NameToID(pruclient, 0, &lnames, &lids);
2206 if (lids.idlist_val) {
2207 *uid = *lids.idlist_val;
2208 free(lids.idlist_val);
2210 if (lnames.namelist_val)
2211 free(lnames.namelist_val);
2214 ubik_ClientDestroy(pruclient);
2220 #endif /* QUERY_AFSID */
2223 /* This has been copied to smb_IoctlSetToken in its entirety.
2224 * An equivalent version will need to be produced for the
2225 * redirector and some extensive refactoring might be required.
2228 cm_IoctlSetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2235 struct ClearToken ct;
2243 int release_userp = 0;
2246 saveDataPtr = ioctlp->inDatap;
2248 cm_SkipIoctlPath(ioctlp);
2250 tp = ioctlp->inDatap;
2253 memcpy(&ticketLen, tp, sizeof(ticketLen));
2254 tp += sizeof(ticketLen);
2255 if (ticketLen < MINKTCTICKETLEN || ticketLen > MAXKTCTICKETLEN)
2256 return CM_ERROR_INVAL;
2258 /* remember ticket and skip over it for now */
2262 /* clear token size */
2263 memcpy(&ctSize, tp, sizeof(ctSize));
2264 tp += sizeof(ctSize);
2265 if (ctSize != sizeof(struct ClearToken))
2266 return CM_ERROR_INVAL;
2269 memcpy(&ct, tp, ctSize);
2271 if (ct.AuthHandle == -1)
2272 ct.AuthHandle = 999; /* more rxvab compat stuff */
2274 /* more stuff, if any */
2275 if (ioctlp->inCopied > tp - saveDataPtr) {
2276 /* flags: logon flag */
2277 memcpy(&flags, tp, sizeof(int));
2281 cellp = cm_GetCell(tp, CM_FLAG_CREATE | CM_FLAG_NOPROBE);
2283 return CM_ERROR_NOSUCHCELL;
2284 tp += strlen(tp) + 1;
2288 tp += strlen(tp) + 1;
2290 if (flags & PIOCTL_LOGON) {
2291 /* SMB user name with which to associate tokens */
2293 osi_Log2(smb_logp,"cm_IoctlSetToken for user [%s] smbname [%s]",
2294 osi_LogSaveString(smb_logp,uname), osi_LogSaveString(smb_logp,smbname));
2295 fprintf(stderr, "SMB name = %s\n", smbname);
2296 tp += strlen(tp) + 1;
2298 osi_Log1(smb_logp,"cm_IoctlSetToken for user [%s]",
2299 osi_LogSaveString(smb_logp, uname));
2303 memcpy(&uuid, tp, sizeof(uuid));
2304 if (!cm_FindTokenEvent(uuid, sessionKey))
2305 return CM_ERROR_INVAL;
2307 cellp = cm_data.rootCellp;
2308 osi_Log0(smb_logp,"cm_IoctlSetToken - no name specified");
2311 if (flags & PIOCTL_LOGON) {
2312 userp = smb_FindCMUserByName(smbname, ioctlp->fidp->vcp->rname,
2313 SMB_FLAG_CREATE|SMB_FLAG_AFSLOGON);
2317 /* store the token */
2318 lock_ObtainMutex(&userp->mx);
2319 ucellp = cm_GetUCell(userp, cellp);
2320 osi_Log1(smb_logp,"cm_IoctlSetToken ucellp %lx", ucellp);
2321 ucellp->ticketLen = ticketLen;
2322 if (ucellp->ticketp)
2323 free(ucellp->ticketp); /* Discard old token if any */
2324 ucellp->ticketp = malloc(ticketLen);
2325 memcpy(ucellp->ticketp, ticket, ticketLen);
2327 * Get the session key from the RPC, rather than from the pioctl.
2330 memcpy(&ucellp->sessionKey, ct.HandShakeKey, sizeof(ct.HandShakeKey));
2332 memcpy(ucellp->sessionKey.data, sessionKey, sizeof(sessionKey));
2333 ucellp->kvno = ct.AuthHandle;
2334 ucellp->expirationTime = ct.EndTimestamp;
2337 ucellp->uid = ANONYMOUSID;
2340 StringCbCopyA(ucellp->userName, MAXKTCNAMELEN, uname);
2342 cm_UsernameToId(uname, ucellp, &ucellp->uid);
2345 ucellp->flags |= CM_UCELLFLAG_RXKAD;
2346 lock_ReleaseMutex(&userp->mx);
2348 if (flags & PIOCTL_LOGON) {
2349 ioctlp->flags |= CM_IOCTLFLAG_LOGON;
2352 cm_ResetACLCache(userp);
2355 cm_ReleaseUser(userp);
2362 * VIOC_GETTOK internals.
2364 * Assumes that pioctl path has been parsed or skipped.
2367 cm_IoctlGetTokenIter(struct cm_ioctl *ioctlp, struct cm_user *userp)
2373 struct ClearToken ct;
2375 tp = ioctlp->inDatap;
2376 cp = ioctlp->outDatap;
2379 memcpy(&iterator, tp, sizeof(iterator));
2380 tp += sizeof(iterator);
2382 lock_ObtainMutex(&userp->mx);
2384 /* look for token */
2385 for (;;iterator++) {
2386 ucellp = cm_FindUCell(userp, iterator);
2388 lock_ReleaseMutex(&userp->mx);
2389 return CM_ERROR_NOMORETOKENS;
2391 if (ucellp->flags & CM_UCELLFLAG_RXKAD)
2396 temp = ucellp->iterator + 1;
2397 memcpy(cp, &temp, sizeof(temp));
2401 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2402 cp += sizeof(ucellp->ticketLen);
2405 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2406 cp += ucellp->ticketLen;
2408 /* clear token size */
2410 memcpy(cp, &temp, sizeof(temp));
2414 ct.AuthHandle = ucellp->kvno;
2417 * This field is supposed to hold the session key
2418 * but we don't want to make it easier for someone
2419 * to attack the cache. The user gave us the session
2420 * key in the first place.
2422 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2423 ct.ViceId = 37; /* XXX */
2424 ct.BeginTimestamp = 0; /* XXX */
2425 ct.EndTimestamp = ucellp->expirationTime;
2426 memcpy(cp, &ct, sizeof(ct));
2429 /* Primary flag (unused) */
2431 memcpy(cp, &temp, sizeof(temp));
2435 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2436 cp += strlen(cp) + 1;
2439 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2440 cp += strlen(cp) + 1;
2442 ioctlp->outDatap = cp;
2444 lock_ReleaseMutex(&userp->mx);
2450 * VIOC_NEWGETTOK internals.
2452 * Assumes that pioctl path has been parsed or skipped.
2455 cm_IoctlGetToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2461 struct ClearToken ct;
2465 tp = ioctlp->inDatap;
2467 cp = ioctlp->outDatap;
2469 /* cell name is right here */
2470 cellp = cm_GetCell(tp, 0);
2472 return CM_ERROR_NOSUCHCELL;
2473 tp += strlen(tp) + 1;
2476 memcpy(&uuid, tp, sizeof(uuid));
2478 lock_ObtainMutex(&userp->mx);
2480 ucellp = cm_GetUCell(userp, cellp);
2481 if (!ucellp || !(ucellp->flags & CM_UCELLFLAG_RXKAD)) {
2482 lock_ReleaseMutex(&userp->mx);
2483 return CM_ERROR_NOMORETOKENS;
2487 memcpy(cp, &ucellp->ticketLen, sizeof(ucellp->ticketLen));
2488 cp += sizeof(ucellp->ticketLen);
2491 memcpy(cp, ucellp->ticketp, ucellp->ticketLen);
2492 cp += ucellp->ticketLen;
2494 /* clear token size */
2496 memcpy(cp, &temp, sizeof(temp));
2500 ct.AuthHandle = ucellp->kvno;
2502 /* do not give out the session key */
2503 memset(ct.HandShakeKey, 0, sizeof(ct.HandShakeKey));
2504 ct.ViceId = 37; /* XXX */
2505 ct.BeginTimestamp = 0; /* XXX */
2506 ct.EndTimestamp = ucellp->expirationTime;
2507 memcpy(cp, &ct, sizeof(ct));
2510 /* Primary flag (unused) */
2512 memcpy(cp, &temp, sizeof(temp));
2516 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->cellp->name);
2517 cp += strlen(cp) + 1;
2520 StringCbCopyA(cp, SMB_IOCTL_MAXDATA - (cp - ioctlp->outAllocp), ucellp->userName);
2521 cp += strlen(cp) + 1;
2523 ioctlp->outDatap = cp;
2525 lock_ReleaseMutex(&userp->mx);
2527 cm_RegisterNewTokenEvent(uuid, ucellp->sessionKey.data);
2533 * VIOCDELTOK internals.
2535 * Assumes that pioctl path has been parsed or skipped.
2538 cm_IoctlDelToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2544 cp = ioctlp->outDatap;
2546 /* cell name is right here */
2547 cellp = cm_GetCell(ioctlp->inDatap, 0);
2549 return CM_ERROR_NOSUCHCELL;
2551 lock_ObtainMutex(&userp->mx);
2553 ucellp = cm_GetUCell(userp, cellp);
2555 lock_ReleaseMutex(&userp->mx);
2556 return CM_ERROR_NOMORETOKENS;
2559 osi_Log1(smb_logp,"cm_IoctlDelToken ucellp %lx", ucellp);
2561 if (ucellp->ticketp) {
2562 free(ucellp->ticketp);
2563 ucellp->ticketp = NULL;
2565 ucellp->ticketLen = 0;
2566 memset(ucellp->sessionKey.data, 0, 8);
2568 ucellp->expirationTime = 0;
2569 ucellp->userName[0] = '\0';
2570 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2573 lock_ReleaseMutex(&userp->mx);
2575 cm_ResetACLCache(userp);
2581 * VIOCDELALLTOK internals.
2583 * Assumes that pioctl path has been parsed or skipped.
2586 cm_IoctlDelAllToken(struct cm_ioctl *ioctlp, struct cm_user *userp)
2590 lock_ObtainMutex(&userp->mx);
2592 for (ucellp = userp->cellInfop; ucellp; ucellp = ucellp->nextp) {
2593 osi_Log1(smb_logp,"cm_IoctlDelAllToken ucellp %lx", ucellp);
2595 if (ucellp->ticketp) {
2596 free(ucellp->ticketp);
2597 ucellp->ticketp = NULL;
2599 ucellp->ticketLen = 0;
2600 memset(ucellp->sessionKey.data, 0, 8);
2602 ucellp->expirationTime = 0;
2603 ucellp->userName[0] = '\0';
2604 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
2608 lock_ReleaseMutex(&userp->mx);
2610 cm_ResetACLCache(userp);
2616 * VIOC_MAKESUBMOUNT internals. (This function should be deprecated)
2618 * Assumes that pioctl path has been parsed or skipped.
2621 cm_IoctlMakeSubmount(cm_ioctl_t *ioctlp, cm_user_t *userp)
2623 char afspath[MAX_PATH];
2625 int nextAutoSubmount;
2627 DWORD dwType, dwSize;
2632 /* Serialize this one, to prevent simultaneous mods
2635 lock_ObtainMutex(&cm_Afsdsbmt_Lock);
2637 /* Parse the input parameters--first the required afs path,
2638 * then the requested submount name (which may be "").
2640 cm_NormalizeAfsPathAscii(afspath, sizeof(afspath), ioctlp->inDatap);
2641 submountreqp = ioctlp->inDatap + (strlen(ioctlp->inDatap)+1);
2643 /* If the caller supplied a suggested submount name, see if
2644 * that submount name is in use... if so, the submount's path
2645 * has to match our path.
2648 RegCreateKeyEx( HKEY_LOCAL_MACHINE,
2649 AFSREG_CLT_OPENAFS_SUBKEY "\\Submounts",
2652 REG_OPTION_NON_VOLATILE,
2653 KEY_READ|KEY_WRITE|KEY_QUERY_VALUE,
2658 if (submountreqp && *submountreqp) {
2659 char submountPath[MAX_PATH];
2661 dwSize = sizeof(submountPath);
2662 status = RegQueryValueEx( hkSubmounts, submountreqp, 0,
2663 &dwType, submountPath, &dwSize);
2665 if (status != ERROR_SUCCESS) {
2667 /* The suggested submount name isn't in use now--
2668 * so we can safely map the requested submount name
2669 * to the supplied path. Remember not to write the
2670 * leading "/afs" when writing out the submount.
2672 RegSetValueEx( hkSubmounts, submountreqp, 0,
2674 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2675 &afspath[strlen(cm_mountRoot)]:"/",
2676 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2677 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2679 RegCloseKey( hkSubmounts );
2680 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2681 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2682 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2686 /* The suggested submount name is already in use--if the
2687 * supplied path matches the submount's path, we can still
2688 * use the suggested submount name.
2690 if (!strcmp (submountPath, afspath)) {
2691 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountreqp);
2692 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2693 RegCloseKey( hkSubmounts );
2694 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2699 RegQueryInfoKey( hkSubmounts,
2701 NULL, /* lpcClass */
2702 NULL, /* lpReserved */
2703 NULL, /* lpcSubKeys */
2704 NULL, /* lpcMaxSubKeyLen */
2705 NULL, /* lpcMaxClassLen */
2706 &dwSubmounts, /* lpcValues */
2707 NULL, /* lpcMaxValueNameLen */
2708 NULL, /* lpcMaxValueLen */
2709 NULL, /* lpcbSecurityDescriptor */
2710 NULL /* lpftLastWriteTime */
2714 /* Having obtained a list of all available submounts, start
2715 * searching that list for a path which matches the requested
2716 * AFS path. We'll also keep track of the highest "auto15"/"auto47"
2717 * submount, in case we need to add a new one later.
2720 nextAutoSubmount = 1;
2722 for ( dwIndex = 0; dwIndex < dwSubmounts; dwIndex ++ ) {
2723 char submountPath[MAX_PATH] = "";
2724 DWORD submountPathLen = sizeof(submountPath);
2725 char submountName[MAX_PATH];
2726 DWORD submountNameLen = sizeof(submountName);
2729 RegEnumValue( hkSubmounts, dwIndex, submountName, &submountNameLen, NULL,
2730 &dwType, submountPath, &submountPathLen);
2731 if (dwType == REG_EXPAND_SZ) {
2733 StringCbCopyA(buf, MAX_PATH, submountPath);
2734 submountPathLen = ExpandEnvironmentStrings(buf, submountPath, MAX_PATH);
2735 if (submountPathLen > MAX_PATH)
2739 /* If this is an Auto### submount, remember its ### value */
2740 if ((!strnicmp (submountName, "auto", 4)) &&
2741 (isdigit (submountName[strlen("auto")]))) {
2742 int thisAutoSubmount;
2743 thisAutoSubmount = atoi (&submountName[strlen("auto")]);
2744 nextAutoSubmount = max (nextAutoSubmount,
2745 thisAutoSubmount+1);
2748 if ((submountPathLen == 0) ||
2749 (submountPathLen == sizeof(submountPath) - 1)) {
2753 /* See if the path for this submount matches the path
2754 * that our caller specified. If so, we can return
2757 if (!strcmp (submountPath, afspath)) {
2758 StringCbCopyA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), submountName);
2759 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2760 RegCloseKey(hkSubmounts);
2761 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2767 /* We've been through the entire list of existing submounts, and
2768 * didn't find any which matched the specified path. So, we'll
2769 * just have to add one. Remember not to write the leading "/afs"
2770 * when writing out the submount.
2773 StringCbPrintfA(ioctlp->outDatap, SMB_IOCTL_MAXDATA - (ioctlp->outDatap - ioctlp->outAllocp), "auto%ld", nextAutoSubmount);
2775 RegSetValueEx( hkSubmounts,
2779 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2780 &afspath[strlen(cm_mountRoot)]:"/",
2781 (strlen(&afspath[strlen(cm_mountRoot)])) ?
2782 (DWORD)strlen(&afspath[strlen(cm_mountRoot)])+1:2);
2784 ioctlp->outDatap += strlen(ioctlp->outDatap) +1;
2785 RegCloseKey(hkSubmounts);
2786 lock_ReleaseMutex(&cm_Afsdsbmt_Lock);
2791 * VIOC_GETRXKCRYPT internals.
2793 * Assumes that pioctl path has been parsed or skipped.
2796 cm_IoctlGetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2798 memcpy(ioctlp->outDatap, &cryptall, sizeof(cryptall));
2799 ioctlp->outDatap += sizeof(cryptall);
2805 * VIOC_SETRXKCRYPT internals.
2807 * Assumes that pioctl path has been parsed or skipped.
2810 cm_IoctlSetRxkcrypt(cm_ioctl_t *ioctlp, cm_user_t *userp)
2812 afs_int32 c = cryptall;
2814 memcpy(&cryptall, ioctlp->inDatap, sizeof(cryptall));
2816 if (c != cryptall) {
2818 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_ON);
2819 else if (cryptall == 2)
2820 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_AUTH);
2822 LogEvent(EVENTLOG_INFORMATION_TYPE, MSG_CRYPT_OFF);
2828 * VIOC_RXSTAT_PROC internals.
2830 * Assumes that pioctl path has been parsed or skipped.
2833 cm_IoctlRxStatProcess(struct cm_ioctl *ioctlp, struct cm_user *userp)
2838 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2839 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2842 if (flags & AFSCALL_RXSTATS_ENABLE) {
2843 rx_enableProcessRPCStats();
2845 if (flags & AFSCALL_RXSTATS_DISABLE) {
2846 rx_disableProcessRPCStats();
2848 if (flags & AFSCALL_RXSTATS_CLEAR) {
2849 rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
2855 * VIOC_RXSTAT_PEER internals.
2857 * Assumes that pioctl path has been parsed or skipped.
2860 cm_IoctlRxStatPeer(struct cm_ioctl *ioctlp, struct cm_user *userp)
2865 memcpy((char *)&flags, ioctlp->inDatap, sizeof(afs_int32));
2866 if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK)) {
2869 if (flags & AFSCALL_RXSTATS_ENABLE) {
2870 rx_enablePeerRPCStats();
2872 if (flags & AFSCALL_RXSTATS_DISABLE) {
2873 rx_disablePeerRPCStats();
2875 if (flags & AFSCALL_RXSTATS_CLEAR) {
2876 rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
2882 * VIOC_UNICODECTL internals.
2884 * Assumes that pioctl path has been parsed or skipped.
2887 cm_IoctlUnicodeControl(struct cm_ioctl *ioctlp, struct cm_user * userp)
2889 afs_int32 result = 0;
2893 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
2896 /* Setting the Unicode flag */
2899 newflag = ((cmd & 1) == 1);
2901 InterlockedExchange(&smb_UseUnicode, newflag);
2904 result = smb_UseUnicode;
2909 memcpy(ioctlp->outDatap, &result, sizeof(result));
2910 ioctlp->outDatap += sizeof(result);
2916 * VIOC_UUIDCTL internals.
2918 * Assumes that pioctl path has been parsed or skipped.
2921 cm_IoctlUUIDControl(struct cm_ioctl * ioctlp, struct cm_user *userp)
2926 memcpy(&cmd, ioctlp->inDatap, sizeof(afs_uint32));
2928 if (cmd) { /* generate a new UUID */
2929 UuidCreate((UUID *) &uuid);
2930 cm_data.Uuid = uuid;
2931 cm_ForceNewConnectionsAllServers();
2934 memcpy(ioctlp->outDatap, &cm_data.Uuid, sizeof(cm_data.Uuid));
2935 ioctlp->outDatap += sizeof(cm_data.Uuid);
2943 * functions to dump contents of various structures.
2944 * In debug build (linked with crt debug library) will dump allocated but not freed memory
2946 extern int cm_DumpSCache(FILE *outputFile, char *cookie, int lock);
2947 extern int cm_DumpBufHashTable(FILE *outputFile, char *cookie, int lock);
2950 * VIOC_TRACEMEMDUMP internals.
2952 * Assumes that pioctl path has been parsed or skipped.
2953 * dscp is held but not locked.
2956 cm_IoctlMemoryDump(struct cm_ioctl *ioctlp, struct cm_user *userp)
2958 afs_int32 inValue = 0;
2960 char logfileName[MAX_PATH+1];
2965 static _CrtMemState memstate;
2968 memcpy(&inValue, ioctlp->inDatap, sizeof(afs_int32));
2970 dwSize = GetEnvironmentVariable("TEMP", logfileName, sizeof(logfileName));
2971 if ( dwSize == 0 || dwSize > sizeof(logfileName) )
2973 GetWindowsDirectory(logfileName, sizeof(logfileName));
2975 strncat(logfileName, "\\afsd_alloc.log", sizeof(logfileName));
2977 hLogFile = CreateFile(logfileName, GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
2983 memcpy(ioctlp->outDatap, &inValue, sizeof(afs_int32));
2984 ioctlp->outDatap += sizeof(afs_int32);
2989 SetFilePointer(hLogFile, 0, NULL, FILE_END);
2991 cookie = inValue ? "b" : "e";
2997 _CrtMemCheckpoint(&memstate);
3001 _CrtSetReportMode(_CRT_WARN, _CRTDBG_MODE_FILE);
3002 _CrtSetReportFile(_CRT_WARN, hLogFile);
3003 _CrtMemDumpAllObjectsSince(&memstate);
3007 /* dump all interesting data */
3008 cm_MemDumpDirStats(hLogFile, cookie, 1);
3009 cm_MemDumpBPlusStats(hLogFile, cookie, 1);
3010 cm_DumpCells(hLogFile, cookie, 1);
3011 cm_DumpVolumes(hLogFile, cookie, 1);
3012 cm_DumpSCache(hLogFile, cookie, 1);
3013 cm_DumpBufHashTable(hLogFile, cookie, 1);
3014 smb_DumpVCP(hLogFile, cookie, 1);
3016 CloseHandle(hLogFile);
3018 inValue = 0; /* success */
3019 memcpy(ioctlp->outDatap, &inValue, sizeof(long));
3020 ioctlp->outDatap += sizeof(long);
3025 /* Utility functon. Not currently used. */
3027 cm_CheckServersStatus(cm_serverRef_t *serversp)
3030 cm_serverRef_t *tsrp;
3032 int someBusy = 0, someOffline = 0, allOffline = 1, allBusy = 1, allDown = 1;
3034 if (serversp == NULL) {
3035 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", CM_ERROR_ALLDOWN);
3036 return CM_ERROR_ALLDOWN;
3039 lock_ObtainRead(&cm_serverLock);
3040 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
3041 if (tsrp->status == srv_deleted)
3043 if (tsp = tsrp->server) {
3044 cm_GetServerNoLock(tsp);
3045 lock_ReleaseRead(&cm_serverLock);
3046 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
3048 if (tsrp->status == srv_busy) {
3051 } else if (tsrp->status == srv_offline) {
3061 lock_ObtainRead(&cm_serverLock);
3062 cm_PutServerNoLock(tsp);
3065 lock_ReleaseRead(&cm_serverLock);
3068 code = CM_ERROR_ALLDOWN;
3070 code = CM_ERROR_ALLBUSY;
3071 else if (allOffline || (someBusy && someOffline))
3072 code = CM_ERROR_ALLOFFLINE;
3075 osi_Log1(afsd_logp, "cm_CheckServersStatus returning 0x%x", code);
3080 * VIOC_PATH_AVAILABILITY internals.
3082 * Assumes that pioctl path has been parsed or skipped.
3083 * scp is held but not locked.
3086 cm_IoctlPathAvailability(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_scache_t *scp, cm_req_t *reqp)
3091 cm_vol_state_t *statep;
3094 #ifdef AFS_FREELANCE_CLIENT
3095 if ( scp->fid.cell == AFS_FAKE_ROOT_CELL_ID && scp->fid.volume == AFS_FAKE_ROOT_VOL_ID ) {
3100 volume = scp->fid.volume;
3102 cellp = cm_FindCellByID(scp->fid.cell, 0);
3105 return CM_ERROR_NOSUCHCELL;
3107 code = cm_FindVolumeByID(cellp, volume, userp, reqp, CM_GETVOL_FLAG_CREATE, &tvp);
3111 statep = cm_VolumeStateByID(tvp, volume);
3112 switch (statep->state) {
3118 code = CM_ERROR_ALLBUSY;
3121 code = CM_ERROR_ALLOFFLINE;
3124 code = CM_ERROR_ALLDOWN;
3133 * VIOC_VOLSTAT_TEST internals.
3135 * Assumes that pioctl path has been parsed or skipped.
3138 cm_IoctlVolStatTest(struct cm_ioctl *ioctlp, struct cm_user *userp, cm_req_t *reqp)
3141 cm_cell_t *cellp = NULL;
3143 cm_vol_state_t *statep;
3144 struct VolStatTest * testp;
3147 testp = (struct VolStatTest *)ioctlp->inDatap;
3149 #ifdef AFS_FREELANCE_CLIENT
3150 if (testp->fid.cell == -1)
3151 return CM_ERROR_NOACCESS;
3154 if (testp->flags & VOLSTAT_TEST_CHECK_VOLUME) {
3155 cm_CheckOfflineVolumes();
3159 if (testp->flags & VOLSTAT_TEST_NETWORK_UP) {
3160 cm_VolStatus_Network_Started(cm_NetbiosName
3168 if (testp->flags & VOLSTAT_TEST_NETWORK_DOWN) {
3169 cm_VolStatus_Network_Stopped(cm_NetbiosName
3177 if (testp->cellname[0]) {
3178 n = atoi(testp->cellname);
3180 testp->fid.cell = n;
3182 cellp = cm_GetCell(testp->cellname, 0);
3185 if (testp->fid.cell > 0) {
3186 cellp = cm_FindCellByID(testp->fid.cell, 0);
3190 return CM_ERROR_NOSUCHCELL;
3192 if (testp->volname[0]) {
3193 n = atoi(testp->volname);
3195 testp->fid.volume = n;
3197 code = cm_FindVolumeByName(cellp, testp->volname, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3200 if (testp->fid.volume > 0)
3201 code = cm_FindVolumeByID(cellp, testp->fid.volume, userp, reqp, CM_GETVOL_FLAG_NO_LRU_UPDATE, &volp);
3206 if (testp->fid.volume)
3207 statep = cm_VolumeStateByID(volp, testp->fid.volume);
3209 statep = cm_VolumeStateByName(volp, testp->volname);
3212 statep->state = testp->state;
3213 code = cm_VolStatus_Change_Notification(cellp->cellID, statep->ID, testp->state);