mirror of
https://git.openafs.org/openafs.git
synced 2025-01-22 17:00:15 +00:00
4a1d319177
Upstream decided to rename the kernel functions that implement syscalls to have a sys_prefix (including afs3_syscall!). We use a couple of them, so we need to conditionalize accordingly. Unfortunately, __FreeBSD_version was not bumped with the change, so we use something close to it and hope it's close enough. Change-Id: I228805a813af70b30f94f659e4da602210a6d6df Reviewed-on: http://gerrit.openafs.org/5572 Reviewed-by: Derrick Brashear <shadow@dementix.org> Tested-by: Derrick Brashear <shadow@dementix.org>
5511 lines
139 KiB
C
5511 lines
139 KiB
C
/*
|
|
* Copyright 2000, International Business Machines Corporation and others.
|
|
* All Rights Reserved.
|
|
*
|
|
* This software has been released under the terms of the IBM Public
|
|
* License. For details, see the LICENSE file in the top-level source
|
|
* directory or online at http://www.openafs.org/dl/license10.html
|
|
*/
|
|
|
|
#include <afsconfig.h>
|
|
#include "afs/param.h"
|
|
|
|
|
|
#include "afs/sysincludes.h" /* Standard vendor system headers */
|
|
#ifdef AFS_OBSD_ENV
|
|
#include "h/syscallargs.h"
|
|
#endif
|
|
#ifdef AFS_FBSD_ENV
|
|
#include "h/sysproto.h"
|
|
#endif
|
|
#ifdef AFS_NBSD40_ENV
|
|
#include <sys/ioctl.h>
|
|
#include <sys/ioccom.h>
|
|
#endif
|
|
#include "afsincludes.h" /* Afs-based standard headers */
|
|
#include "afs/afs_stats.h" /* afs statistics */
|
|
#include "afs/vice.h"
|
|
#include "afs/afs_bypasscache.h"
|
|
#include "rx/rx_globals.h"
|
|
#include "token.h"
|
|
|
|
struct VenusFid afs_rootFid;
|
|
afs_int32 afs_waitForever = 0;
|
|
short afs_waitForeverCount = 0;
|
|
afs_int32 afs_showflags = GAGUSER | GAGCONSOLE; /* show all messages */
|
|
|
|
afs_int32 afs_is_disconnected;
|
|
afs_int32 afs_is_discon_rw;
|
|
/* On reconnection, turn this knob on until it finishes,
|
|
* then turn it off.
|
|
*/
|
|
afs_int32 afs_in_sync = 0;
|
|
|
|
struct afs_pdata {
|
|
char *ptr;
|
|
size_t remaining;
|
|
};
|
|
|
|
/*
|
|
* A set of handy little functions for encoding and decoding
|
|
* pioctls without losing your marbles, or memory integrity
|
|
*/
|
|
|
|
static_inline int
|
|
afs_pd_alloc(struct afs_pdata *apd, size_t size)
|
|
{
|
|
|
|
if (size > AFS_LRALLOCSIZ)
|
|
apd->ptr = osi_Alloc(size + 1);
|
|
else
|
|
apd->ptr = osi_AllocLargeSpace(AFS_LRALLOCSIZ);
|
|
|
|
if (apd->ptr == NULL)
|
|
return ENOMEM;
|
|
|
|
apd->remaining = size;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static_inline void
|
|
afs_pd_free(struct afs_pdata *apd)
|
|
{
|
|
if (apd->ptr == NULL)
|
|
return;
|
|
|
|
if (apd->remaining > AFS_LRALLOCSIZ)
|
|
osi_Free(apd->ptr, apd->remaining + 1);
|
|
else
|
|
osi_FreeLargeSpace(apd->ptr);
|
|
|
|
apd->ptr = NULL;
|
|
apd->remaining = 0;
|
|
}
|
|
|
|
static_inline char *
|
|
afs_pd_where(struct afs_pdata *apd)
|
|
{
|
|
return apd ? apd->ptr : NULL;
|
|
}
|
|
|
|
static_inline size_t
|
|
afs_pd_remaining(struct afs_pdata *apd)
|
|
{
|
|
return apd ? apd->remaining : 0;
|
|
}
|
|
|
|
static_inline int
|
|
afs_pd_skip(struct afs_pdata *apd, size_t skip)
|
|
{
|
|
if (apd == NULL || apd->remaining < skip)
|
|
return EINVAL;
|
|
apd->remaining -= skip;
|
|
apd->ptr += skip;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static_inline int
|
|
afs_pd_getBytes(struct afs_pdata *apd, void *dest, size_t bytes)
|
|
{
|
|
if (apd == NULL || apd->remaining < bytes)
|
|
return EINVAL;
|
|
apd->remaining -= bytes;
|
|
memcpy(dest, apd->ptr, bytes);
|
|
apd->ptr += bytes;
|
|
return 0;
|
|
}
|
|
|
|
static_inline int
|
|
afs_pd_getInt(struct afs_pdata *apd, afs_int32 *val)
|
|
{
|
|
return afs_pd_getBytes(apd, val, sizeof(*val));
|
|
}
|
|
|
|
static_inline int
|
|
afs_pd_getUint(struct afs_pdata *apd, afs_uint32 *val)
|
|
{
|
|
return afs_pd_getBytes(apd, val, sizeof(*val));
|
|
}
|
|
|
|
static_inline void *
|
|
afs_pd_inline(struct afs_pdata *apd, size_t bytes)
|
|
{
|
|
void *ret;
|
|
|
|
if (apd == NULL || apd->remaining < bytes)
|
|
return NULL;
|
|
|
|
ret = apd->ptr;
|
|
|
|
apd->remaining -= bytes;
|
|
apd->ptr += bytes;
|
|
|
|
return ret;
|
|
}
|
|
|
|
static_inline void
|
|
afs_pd_xdrStart(struct afs_pdata *apd, XDR *xdrs, enum xdr_op op) {
|
|
xdrmem_create(xdrs, apd->ptr, apd->remaining, op);
|
|
}
|
|
|
|
static_inline void
|
|
afs_pd_xdrEnd(struct afs_pdata *apd, XDR *xdrs) {
|
|
size_t pos;
|
|
|
|
pos = xdr_getpos(xdrs);
|
|
apd->ptr += pos;
|
|
apd->remaining -= pos;
|
|
xdr_destroy(xdrs);
|
|
}
|
|
|
|
|
|
|
|
static_inline int
|
|
afs_pd_getString(struct afs_pdata *apd, char *str, size_t maxLen)
|
|
{
|
|
size_t len;
|
|
|
|
if (apd == NULL || apd->remaining <= 0)
|
|
return EINVAL;
|
|
len = strlen(apd->ptr) + 1;
|
|
if (len > maxLen)
|
|
return E2BIG;
|
|
memcpy(str, apd->ptr, len);
|
|
apd->ptr += len;
|
|
apd->remaining -= len;
|
|
return 0;
|
|
}
|
|
|
|
static_inline int
|
|
afs_pd_getStringPtr(struct afs_pdata *apd, char **str)
|
|
{
|
|
size_t len;
|
|
|
|
if (apd == NULL || apd->remaining <= 0)
|
|
return EINVAL;
|
|
len = strlen(apd->ptr) + 1;
|
|
*str = apd->ptr;
|
|
apd->ptr += len;
|
|
apd->remaining -= len;
|
|
return 0;
|
|
}
|
|
|
|
static_inline int
|
|
afs_pd_putBytes(struct afs_pdata *apd, const void *bytes, size_t len)
|
|
{
|
|
if (apd == NULL || apd->remaining < len)
|
|
return E2BIG;
|
|
memcpy(apd->ptr, bytes, len);
|
|
apd->ptr += len;
|
|
apd->remaining -= len;
|
|
return 0;
|
|
}
|
|
|
|
static_inline int
|
|
afs_pd_putInt(struct afs_pdata *apd, afs_int32 val)
|
|
{
|
|
return afs_pd_putBytes(apd, &val, sizeof(val));
|
|
}
|
|
|
|
static_inline int
|
|
afs_pd_putString(struct afs_pdata *apd, char *str) {
|
|
|
|
/* Add 1 so we copy the NULL too */
|
|
return afs_pd_putBytes(apd, str, strlen(str) +1);
|
|
}
|
|
|
|
/*!
|
|
* \defgroup pioctl Path IOCTL functions
|
|
*
|
|
* DECL_PIOCTL is a macro defined to contain the following parameters for functions:
|
|
*
|
|
* \param[in] avc
|
|
* the AFS vcache structure in use by pioctl
|
|
* \param[in] afun
|
|
* not in use
|
|
* \param[in] areq
|
|
* the AFS vrequest structure
|
|
* \param[in] ain
|
|
* an afs_pdata block describing the data received from the caller
|
|
* \param[in] aout
|
|
* an afs_pdata block describing a pre-allocated block for output
|
|
* \param[in] acred
|
|
* UNIX credentials structure underlying the operation
|
|
*/
|
|
|
|
#define DECL_PIOCTL(x) \
|
|
static int x(struct vcache *avc, int afun, struct vrequest *areq, \
|
|
struct afs_pdata *ain, struct afs_pdata *aout, \
|
|
afs_ucred_t **acred)
|
|
|
|
/* Prototypes for pioctl routines */
|
|
DECL_PIOCTL(PGetFID);
|
|
DECL_PIOCTL(PSetAcl);
|
|
DECL_PIOCTL(PStoreBehind);
|
|
DECL_PIOCTL(PGCPAGs);
|
|
DECL_PIOCTL(PGetAcl);
|
|
DECL_PIOCTL(PNoop);
|
|
DECL_PIOCTL(PBogus);
|
|
DECL_PIOCTL(PGetFileCell);
|
|
DECL_PIOCTL(PGetWSCell);
|
|
DECL_PIOCTL(PGetUserCell);
|
|
DECL_PIOCTL(PSetTokens);
|
|
DECL_PIOCTL(PSetTokens2);
|
|
DECL_PIOCTL(PGetVolumeStatus);
|
|
DECL_PIOCTL(PSetVolumeStatus);
|
|
DECL_PIOCTL(PFlush);
|
|
DECL_PIOCTL(PNewStatMount);
|
|
DECL_PIOCTL(PGetTokens);
|
|
DECL_PIOCTL(PGetTokens2);
|
|
DECL_PIOCTL(PUnlog);
|
|
DECL_PIOCTL(PMariner);
|
|
DECL_PIOCTL(PCheckServers);
|
|
DECL_PIOCTL(PCheckVolNames);
|
|
DECL_PIOCTL(PCheckAuth);
|
|
DECL_PIOCTL(PFindVolume);
|
|
DECL_PIOCTL(PViceAccess);
|
|
DECL_PIOCTL(PSetCacheSize);
|
|
DECL_PIOCTL(PGetCacheSize);
|
|
DECL_PIOCTL(PRemoveCallBack);
|
|
DECL_PIOCTL(PNewCell);
|
|
DECL_PIOCTL(PNewAlias);
|
|
DECL_PIOCTL(PListCells);
|
|
DECL_PIOCTL(PListAliases);
|
|
DECL_PIOCTL(PRemoveMount);
|
|
DECL_PIOCTL(PGetCellStatus);
|
|
DECL_PIOCTL(PSetCellStatus);
|
|
DECL_PIOCTL(PFlushVolumeData);
|
|
DECL_PIOCTL(PGetVnodeXStatus);
|
|
DECL_PIOCTL(PGetVnodeXStatus2);
|
|
DECL_PIOCTL(PSetSysName);
|
|
DECL_PIOCTL(PSetSPrefs);
|
|
DECL_PIOCTL(PSetSPrefs33);
|
|
DECL_PIOCTL(PGetSPrefs);
|
|
DECL_PIOCTL(PExportAfs);
|
|
DECL_PIOCTL(PGag);
|
|
DECL_PIOCTL(PTwiddleRx);
|
|
DECL_PIOCTL(PGetInitParams);
|
|
DECL_PIOCTL(PGetRxkcrypt);
|
|
DECL_PIOCTL(PSetRxkcrypt);
|
|
DECL_PIOCTL(PGetCPrefs);
|
|
DECL_PIOCTL(PSetCPrefs);
|
|
DECL_PIOCTL(PFlushMount);
|
|
DECL_PIOCTL(PRxStatProc);
|
|
DECL_PIOCTL(PRxStatPeer);
|
|
DECL_PIOCTL(PPrefetchFromTape);
|
|
DECL_PIOCTL(PFsCmd);
|
|
DECL_PIOCTL(PCallBackAddr);
|
|
DECL_PIOCTL(PDiscon);
|
|
DECL_PIOCTL(PNFSNukeCreds);
|
|
DECL_PIOCTL(PNewUuid);
|
|
DECL_PIOCTL(PPrecache);
|
|
DECL_PIOCTL(PGetPAG);
|
|
#if defined(AFS_CACHE_BYPASS) && defined(AFS_LINUX24_ENV)
|
|
DECL_PIOCTL(PSetCachingThreshold);
|
|
#endif
|
|
|
|
/*
|
|
* A macro that says whether we're going to need HandleClientContext().
|
|
* This is currently used only by the nfs translator.
|
|
*/
|
|
#if !defined(AFS_NONFSTRANS) || defined(AFS_AIX_IAUTH_ENV)
|
|
#define AFS_NEED_CLIENTCONTEXT
|
|
#endif
|
|
|
|
/* Prototypes for private routines */
|
|
#ifdef AFS_NEED_CLIENTCONTEXT
|
|
static int HandleClientContext(struct afs_ioctl *ablob, int *com,
|
|
afs_ucred_t **acred,
|
|
afs_ucred_t *credp);
|
|
#endif
|
|
int HandleIoctl(struct vcache *avc, afs_int32 acom,
|
|
struct afs_ioctl *adata);
|
|
int afs_HandlePioctl(struct vnode *avp, afs_int32 acom,
|
|
struct afs_ioctl *ablob, int afollow,
|
|
afs_ucred_t **acred);
|
|
static int Prefetch(uparmtype apath, struct afs_ioctl *adata, int afollow,
|
|
afs_ucred_t *acred);
|
|
|
|
typedef int (*pioctlFunction) (struct vcache *, int, struct vrequest *,
|
|
struct afs_pdata *, struct afs_pdata *,
|
|
afs_ucred_t **);
|
|
|
|
static pioctlFunction VpioctlSw[] = {
|
|
PBogus, /* 0 */
|
|
PSetAcl, /* 1 */
|
|
PGetAcl, /* 2 */
|
|
PSetTokens, /* 3 */
|
|
PGetVolumeStatus, /* 4 */
|
|
PSetVolumeStatus, /* 5 */
|
|
PFlush, /* 6 */
|
|
PBogus, /* 7 */
|
|
PGetTokens, /* 8 */
|
|
PUnlog, /* 9 */
|
|
PCheckServers, /* 10 */
|
|
PCheckVolNames, /* 11 */
|
|
PCheckAuth, /* 12 */
|
|
PBogus, /* 13 -- used to be quick check time */
|
|
PFindVolume, /* 14 */
|
|
PBogus, /* 15 -- prefetch is now special-cased; see pioctl code! */
|
|
PBogus, /* 16 -- used to be testing code */
|
|
PNoop, /* 17 -- used to be enable group */
|
|
PNoop, /* 18 -- used to be disable group */
|
|
PBogus, /* 19 -- used to be list group */
|
|
PViceAccess, /* 20 */
|
|
PUnlog, /* 21 -- unlog *is* unpag in this system */
|
|
PGetFID, /* 22 -- get file ID */
|
|
PBogus, /* 23 -- used to be waitforever */
|
|
PSetCacheSize, /* 24 */
|
|
PRemoveCallBack, /* 25 -- flush only the callback */
|
|
PNewCell, /* 26 */
|
|
PListCells, /* 27 */
|
|
PRemoveMount, /* 28 -- delete mount point */
|
|
PNewStatMount, /* 29 -- new style mount point stat */
|
|
PGetFileCell, /* 30 -- get cell name for input file */
|
|
PGetWSCell, /* 31 -- get cell name for workstation */
|
|
PMariner, /* 32 - set/get mariner host */
|
|
PGetUserCell, /* 33 -- get cell name for user */
|
|
PBogus, /* 34 -- Enable/Disable logging */
|
|
PGetCellStatus, /* 35 */
|
|
PSetCellStatus, /* 36 */
|
|
PFlushVolumeData, /* 37 -- flush all data from a volume */
|
|
PSetSysName, /* 38 - Set system name */
|
|
PExportAfs, /* 39 - Export Afs to remote nfs clients */
|
|
PGetCacheSize, /* 40 - get cache size and usage */
|
|
PGetVnodeXStatus, /* 41 - get vcache's special status */
|
|
PSetSPrefs33, /* 42 - Set CM Server preferences... */
|
|
PGetSPrefs, /* 43 - Get CM Server preferences... */
|
|
PGag, /* 44 - turn off/on all CM messages */
|
|
PTwiddleRx, /* 45 - adjust some RX params */
|
|
PSetSPrefs, /* 46 - Set CM Server preferences... */
|
|
PStoreBehind, /* 47 - set degree of store behind to be done */
|
|
PGCPAGs, /* 48 - disable automatic pag gc-ing */
|
|
PGetInitParams, /* 49 - get initial cm params */
|
|
PGetCPrefs, /* 50 - get client interface addresses */
|
|
PSetCPrefs, /* 51 - set client interface addresses */
|
|
PFlushMount, /* 52 - flush mount symlink data */
|
|
PRxStatProc, /* 53 - control process RX statistics */
|
|
PRxStatPeer, /* 54 - control peer RX statistics */
|
|
PGetRxkcrypt, /* 55 -- Get rxkad encryption flag */
|
|
PSetRxkcrypt, /* 56 -- Set rxkad encryption flag */
|
|
PBogus, /* 57 -- arla: set file prio */
|
|
PBogus, /* 58 -- arla: fallback getfh */
|
|
PBogus, /* 59 -- arla: fallback fhopen */
|
|
PBogus, /* 60 -- arla: controls xfsdebug */
|
|
PBogus, /* 61 -- arla: controls arla debug */
|
|
PBogus, /* 62 -- arla: debug interface */
|
|
PBogus, /* 63 -- arla: print xfs status */
|
|
PBogus, /* 64 -- arla: force cache check */
|
|
PBogus, /* 65 -- arla: break callback */
|
|
PPrefetchFromTape, /* 66 -- MR-AFS: prefetch file from tape */
|
|
PFsCmd, /* 67 -- RXOSD: generic commnd interface */
|
|
PBogus, /* 68 -- arla: fetch stats */
|
|
PGetVnodeXStatus2, /* 69 - get caller access and some vcache status */
|
|
};
|
|
|
|
static pioctlFunction CpioctlSw[] = {
|
|
PBogus, /* 0 */
|
|
PNewAlias, /* 1 -- create new cell alias */
|
|
PListAliases, /* 2 -- list cell aliases */
|
|
PCallBackAddr, /* 3 -- request addr for callback rxcon */
|
|
PBogus, /* 4 */
|
|
PDiscon, /* 5 -- get/set discon mode */
|
|
PBogus, /* 6 */
|
|
PGetTokens2, /* 7 */
|
|
PSetTokens2, /* 8 */
|
|
PNewUuid, /* 9 */
|
|
PBogus, /* 10 */
|
|
PBogus, /* 11 */
|
|
PPrecache, /* 12 */
|
|
PGetPAG, /* 13 */
|
|
};
|
|
|
|
static pioctlFunction OpioctlSw[] = {
|
|
PBogus, /* 0 */
|
|
PNFSNukeCreds, /* 1 -- nuke all creds for NFS client */
|
|
#if defined(AFS_CACHE_BYPASS) && defined(AFS_LINUX24_ENV)
|
|
PSetCachingThreshold /* 2 -- get/set cache-bypass size threshold */
|
|
#else
|
|
PNoop /* 2 -- get/set cache-bypass size threshold */
|
|
#endif
|
|
};
|
|
|
|
#define PSetClientContext 99 /* Special pioctl to setup caller's creds */
|
|
int afs_nobody = NFS_NOBODY;
|
|
|
|
int
|
|
HandleIoctl(struct vcache *avc, afs_int32 acom,
|
|
struct afs_ioctl *adata)
|
|
{
|
|
afs_int32 code;
|
|
|
|
code = 0;
|
|
AFS_STATCNT(HandleIoctl);
|
|
|
|
switch (acom & 0xff) {
|
|
case 1:
|
|
avc->f.states |= CSafeStore;
|
|
avc->asynchrony = 0;
|
|
/* SXW - Should we force a MetaData flush for this flag setting */
|
|
break;
|
|
|
|
/* case 2 used to be abort store, but this is no longer provided,
|
|
* since it is impossible to implement under normal Unix.
|
|
*/
|
|
|
|
case 3:{
|
|
/* return the name of the cell this file is open on */
|
|
struct cell *tcell;
|
|
afs_int32 i;
|
|
|
|
tcell = afs_GetCell(avc->f.fid.Cell, READ_LOCK);
|
|
if (tcell) {
|
|
i = strlen(tcell->cellName) + 1; /* bytes to copy out */
|
|
|
|
if (i > adata->out_size) {
|
|
/* 0 means we're not interested in the output */
|
|
if (adata->out_size != 0)
|
|
code = EFAULT;
|
|
} else {
|
|
/* do the copy */
|
|
AFS_COPYOUT(tcell->cellName, adata->out, i, code);
|
|
}
|
|
afs_PutCell(tcell, READ_LOCK);
|
|
} else
|
|
code = ENOTTY;
|
|
}
|
|
break;
|
|
|
|
case 49: /* VIOC_GETINITPARAMS */
|
|
if (adata->out_size < sizeof(struct cm_initparams)) {
|
|
code = EFAULT;
|
|
} else {
|
|
AFS_COPYOUT(&cm_initParams, adata->out,
|
|
sizeof(struct cm_initparams), code);
|
|
}
|
|
break;
|
|
|
|
default:
|
|
|
|
code = EINVAL;
|
|
#ifdef AFS_AIX51_ENV
|
|
code = ENOSYS;
|
|
#endif
|
|
break;
|
|
}
|
|
return code; /* so far, none implemented */
|
|
}
|
|
|
|
#ifdef AFS_AIX_ENV
|
|
/* For aix we don't temporarily bypass ioctl(2) but rather do our
|
|
* thing directly in the vnode layer call, VNOP_IOCTL; thus afs_ioctl
|
|
* is now called from afs_gn_ioctl.
|
|
*/
|
|
int
|
|
afs_ioctl(struct vcache *tvc, int cmd, int arg)
|
|
{
|
|
struct afs_ioctl data;
|
|
int error = 0;
|
|
|
|
AFS_STATCNT(afs_ioctl);
|
|
if (((cmd >> 8) & 0xff) == 'V') {
|
|
/* This is a VICEIOCTL call */
|
|
AFS_COPYIN(arg, (caddr_t) & data, sizeof(data), error);
|
|
if (error)
|
|
return (error);
|
|
error = HandleIoctl(tvc, cmd, &data);
|
|
return (error);
|
|
} else {
|
|
/* No-op call; just return. */
|
|
return (ENOTTY);
|
|
}
|
|
}
|
|
# if defined(AFS_AIX32_ENV)
|
|
# if defined(AFS_AIX51_ENV)
|
|
# ifdef __64BIT__
|
|
int
|
|
kioctl(int fdes, int com, caddr_t arg, caddr_t ext, caddr_t arg2,
|
|
caddr_t arg3)
|
|
# else /* __64BIT__ */
|
|
int
|
|
kioctl32(int fdes, int com, caddr_t arg, caddr_t ext, caddr_t arg2,
|
|
caddr_t arg3)
|
|
# endif /* __64BIT__ */
|
|
# else
|
|
int
|
|
kioctl(int fdes, int com, caddr_t arg, caddr_t ext)
|
|
# endif /* AFS_AIX51_ENV */
|
|
{
|
|
struct a {
|
|
int fd, com;
|
|
caddr_t arg, ext;
|
|
# ifdef AFS_AIX51_ENV
|
|
caddr_t arg2, arg3;
|
|
# endif
|
|
} u_uap, *uap = &u_uap;
|
|
struct file *fd;
|
|
struct vcache *tvc;
|
|
int ioctlDone = 0, code = 0;
|
|
|
|
AFS_STATCNT(afs_xioctl);
|
|
uap->fd = fdes;
|
|
uap->com = com;
|
|
uap->arg = arg;
|
|
# ifdef AFS_AIX51_ENV
|
|
uap->arg2 = arg2;
|
|
uap->arg3 = arg3;
|
|
# endif
|
|
if (setuerror(getf(uap->fd, &fd))) {
|
|
return -1;
|
|
}
|
|
if (fd->f_type == DTYPE_VNODE) {
|
|
/* good, this is a vnode; next see if it is an AFS vnode */
|
|
tvc = VTOAFS(fd->f_vnode); /* valid, given a vnode */
|
|
if (tvc && IsAfsVnode(AFSTOV(tvc))) {
|
|
/* This is an AFS vnode */
|
|
if (((uap->com >> 8) & 0xff) == 'V') {
|
|
struct afs_ioctl *datap;
|
|
AFS_GLOCK();
|
|
datap =
|
|
(struct afs_ioctl *)osi_AllocSmallSpace(AFS_SMALLOCSIZ);
|
|
code=copyin_afs_ioctl((char *)uap->arg, datap);
|
|
if (code) {
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
# if defined(AFS_AIX41_ENV)
|
|
ufdrele(uap->fd);
|
|
# endif
|
|
return (setuerror(code), code);
|
|
}
|
|
code = HandleIoctl(tvc, uap->com, datap);
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
ioctlDone = 1;
|
|
# if defined(AFS_AIX41_ENV)
|
|
ufdrele(uap->fd);
|
|
# endif
|
|
}
|
|
}
|
|
}
|
|
if (!ioctlDone) {
|
|
# if defined(AFS_AIX41_ENV)
|
|
ufdrele(uap->fd);
|
|
# if defined(AFS_AIX51_ENV)
|
|
# ifdef __64BIT__
|
|
code = okioctl(fdes, com, arg, ext, arg2, arg3);
|
|
# else /* __64BIT__ */
|
|
code = okioctl32(fdes, com, arg, ext, arg2, arg3);
|
|
# endif /* __64BIT__ */
|
|
# else /* !AFS_AIX51_ENV */
|
|
code = okioctl(fdes, com, arg, ext);
|
|
# endif /* AFS_AIX51_ENV */
|
|
return code;
|
|
# elif defined(AFS_AIX32_ENV)
|
|
okioctl(fdes, com, arg, ext);
|
|
# endif
|
|
}
|
|
# if defined(KERNEL_HAVE_UERROR)
|
|
if (!getuerror())
|
|
setuerror(code);
|
|
# if !defined(AFS_AIX41_ENV)
|
|
return (getuerror()? -1 : u.u_ioctlrv);
|
|
# else
|
|
return getuerror()? -1 : 0;
|
|
# endif
|
|
# endif
|
|
return 0;
|
|
}
|
|
# endif
|
|
|
|
#elif defined(AFS_SGI_ENV)
|
|
# if defined(AFS_SGI65_ENV)
|
|
afs_ioctl(OSI_VN_DECL(tvc), int cmd, void *arg, int flag, cred_t * cr,
|
|
rval_t * rvalp, struct vopbd * vbds)
|
|
# else
|
|
afs_ioctl(OSI_VN_DECL(tvc), int cmd, void *arg, int flag, cred_t * cr,
|
|
rval_t * rvalp, struct vopbd * vbds)
|
|
# endif
|
|
{
|
|
struct afs_ioctl data;
|
|
int error = 0;
|
|
int locked;
|
|
|
|
OSI_VN_CONVERT(tvc);
|
|
|
|
AFS_STATCNT(afs_ioctl);
|
|
if (((cmd >> 8) & 0xff) == 'V') {
|
|
/* This is a VICEIOCTL call */
|
|
error = copyin_afs_ioctl(arg, &data);
|
|
if (error)
|
|
return (error);
|
|
locked = ISAFS_GLOCK();
|
|
if (!locked)
|
|
AFS_GLOCK();
|
|
error = HandleIoctl(tvc, cmd, &data);
|
|
if (!locked)
|
|
AFS_GUNLOCK();
|
|
return (error);
|
|
} else {
|
|
/* No-op call; just return. */
|
|
return (ENOTTY);
|
|
}
|
|
}
|
|
#elif defined(AFS_SUN5_ENV)
|
|
struct afs_ioctl_sys {
|
|
int fd;
|
|
int com;
|
|
int arg;
|
|
};
|
|
|
|
int
|
|
afs_xioctl(struct afs_ioctl_sys *uap, rval_t *rvp)
|
|
{
|
|
struct file *fd;
|
|
struct vcache *tvc;
|
|
int ioctlDone = 0, code = 0;
|
|
|
|
AFS_STATCNT(afs_xioctl);
|
|
fd = getf(uap->fd);
|
|
if (!fd)
|
|
return (EBADF);
|
|
if (fd->f_vnode->v_type == VREG || fd->f_vnode->v_type == VDIR) {
|
|
tvc = VTOAFS(fd->f_vnode); /* valid, given a vnode */
|
|
if (tvc && IsAfsVnode(AFSTOV(tvc))) {
|
|
/* This is an AFS vnode */
|
|
if (((uap->com >> 8) & 0xff) == 'V') {
|
|
struct afs_ioctl *datap;
|
|
AFS_GLOCK();
|
|
datap =
|
|
(struct afs_ioctl *)osi_AllocSmallSpace(AFS_SMALLOCSIZ);
|
|
code=copyin_afs_ioctl((char *)uap->arg, datap);
|
|
if (code) {
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
releasef(uap->fd);
|
|
return (EFAULT);
|
|
}
|
|
code = HandleIoctl(tvc, uap->com, datap);
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
ioctlDone = 1;
|
|
}
|
|
}
|
|
}
|
|
releasef(uap->fd);
|
|
if (!ioctlDone)
|
|
code = ioctl(uap, rvp);
|
|
|
|
return (code);
|
|
}
|
|
#elif defined(AFS_LINUX22_ENV)
|
|
struct afs_ioctl_sys {
|
|
unsigned int com;
|
|
unsigned long arg;
|
|
};
|
|
int
|
|
afs_xioctl(struct inode *ip, struct file *fp, unsigned int com,
|
|
unsigned long arg)
|
|
{
|
|
struct afs_ioctl_sys ua, *uap = &ua;
|
|
struct vcache *tvc;
|
|
int code = 0;
|
|
|
|
AFS_STATCNT(afs_xioctl);
|
|
ua.com = com;
|
|
ua.arg = arg;
|
|
|
|
tvc = VTOAFS(ip);
|
|
if (tvc && IsAfsVnode(AFSTOV(tvc))) {
|
|
/* This is an AFS vnode */
|
|
if (((uap->com >> 8) & 0xff) == 'V') {
|
|
struct afs_ioctl *datap;
|
|
AFS_GLOCK();
|
|
datap = osi_AllocSmallSpace(AFS_SMALLOCSIZ);
|
|
code = copyin_afs_ioctl((char *)uap->arg, datap);
|
|
if (code) {
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
return -code;
|
|
}
|
|
code = HandleIoctl(tvc, uap->com, datap);
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
}
|
|
else
|
|
code = EINVAL;
|
|
}
|
|
return -code;
|
|
}
|
|
#elif defined(AFS_DARWIN_ENV) && !defined(AFS_DARWIN80_ENV)
|
|
struct ioctl_args {
|
|
int fd;
|
|
u_long com;
|
|
caddr_t arg;
|
|
};
|
|
|
|
int
|
|
afs_xioctl(afs_proc_t *p, struct ioctl_args *uap, register_t *retval)
|
|
{
|
|
struct file *fd;
|
|
struct vcache *tvc;
|
|
int ioctlDone = 0, code = 0;
|
|
|
|
AFS_STATCNT(afs_xioctl);
|
|
if ((code = fdgetf(p, uap->fd, &fd)))
|
|
return code;
|
|
if (fd->f_type == DTYPE_VNODE) {
|
|
tvc = VTOAFS((struct vnode *)fd->f_data); /* valid, given a vnode */
|
|
if (tvc && IsAfsVnode(AFSTOV(tvc))) {
|
|
/* This is an AFS vnode */
|
|
if (((uap->com >> 8) & 0xff) == 'V') {
|
|
struct afs_ioctl *datap;
|
|
AFS_GLOCK();
|
|
datap = osi_AllocSmallSpace(AFS_SMALLOCSIZ);
|
|
code = copyin_afs_ioctl((char *)uap->arg, datap);
|
|
if (code) {
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
return code;
|
|
}
|
|
code = HandleIoctl(tvc, uap->com, datap);
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
ioctlDone = 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!ioctlDone)
|
|
return ioctl(p, uap, retval);
|
|
|
|
return (code);
|
|
}
|
|
#elif defined(AFS_XBSD_ENV)
|
|
# if defined(AFS_FBSD_ENV)
|
|
# define arg data
|
|
int
|
|
afs_xioctl(struct thread *td, struct ioctl_args *uap,
|
|
register_t *retval)
|
|
{
|
|
afs_proc_t *p = td->td_proc;
|
|
# elif defined(AFS_NBSD_ENV)
|
|
int
|
|
afs_xioctl(afs_proc_t *p, const struct sys_ioctl_args *uap, register_t *retval)
|
|
{
|
|
# else
|
|
struct ioctl_args {
|
|
int fd;
|
|
u_long com;
|
|
caddr_t arg;
|
|
};
|
|
|
|
int
|
|
afs_xioctl(afs_proc_t *p, const struct ioctl_args *uap, register_t *retval)
|
|
{
|
|
# endif
|
|
struct filedesc *fdp;
|
|
struct vcache *tvc;
|
|
int ioctlDone = 0, code = 0;
|
|
struct file *fd;
|
|
|
|
AFS_STATCNT(afs_xioctl);
|
|
#if defined(AFS_NBSD40_ENV)
|
|
fdp = p->l_proc->p_fd;
|
|
#else
|
|
fdp = p->p_fd;
|
|
#endif
|
|
#if defined(AFS_NBSD50_ENV)
|
|
if ((fd = fd_getfile(SCARG(uap, fd))) == NULL)
|
|
return (EBADF);
|
|
#else
|
|
if ((uap->fd >= fdp->fd_nfiles)
|
|
|| ((fd = fdp->fd_ofiles[uap->fd]) == NULL))
|
|
return EBADF;
|
|
#endif
|
|
if ((fd->f_flag & (FREAD | FWRITE)) == 0)
|
|
return EBADF;
|
|
/* first determine whether this is any sort of vnode */
|
|
if (fd->f_type == DTYPE_VNODE) {
|
|
/* good, this is a vnode; next see if it is an AFS vnode */
|
|
# if defined(AFS_OBSD_ENV)
|
|
tvc =
|
|
IsAfsVnode((struct vnode *)fd->
|
|
f_data) ? VTOAFS((struct vnode *)fd->f_data) : NULL;
|
|
# else
|
|
tvc = VTOAFS((struct vnode *)fd->f_data); /* valid, given a vnode */
|
|
# endif
|
|
if (tvc && IsAfsVnode((struct vnode *)fd->f_data)) {
|
|
/* This is an AFS vnode */
|
|
#if defined(AFS_NBSD50_ENV)
|
|
if (((SCARG(uap, com) >> 8) & 0xff) == 'V') {
|
|
#else
|
|
if (((uap->com >> 8) & 0xff) == 'V') {
|
|
#endif
|
|
struct afs_ioctl *datap;
|
|
AFS_GLOCK();
|
|
datap = osi_AllocSmallSpace(AFS_SMALLOCSIZ);
|
|
#if defined(AFS_NBSD50_ENV)
|
|
code = copyin_afs_ioctl(SCARG(uap, data), datap);
|
|
#else
|
|
code = copyin_afs_ioctl((char *)uap->arg, datap);
|
|
#endif
|
|
if (code) {
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
return code;
|
|
}
|
|
#if defined(AFS_NBSD50_ENV)
|
|
code = HandleIoctl(tvc, SCARG(uap, com), datap);
|
|
#else
|
|
code = HandleIoctl(tvc, uap->com, datap);
|
|
#endif
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
ioctlDone = 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
#if defined(AFS_NBSD50_ENV)
|
|
fd_putfile(SCARG(uap, fd));
|
|
#endif
|
|
|
|
if (!ioctlDone) {
|
|
# if defined(AFS_FBSD_ENV)
|
|
# if (__FreeBSD_version >= 900044)
|
|
return sys_ioctl(td, uap);
|
|
# else
|
|
return ioctl(td, uap);
|
|
# endif
|
|
# elif defined(AFS_OBSD_ENV)
|
|
code = sys_ioctl(p, uap, retval);
|
|
# elif defined(AFS_NBSD_ENV)
|
|
code = sys_ioctl(p, uap, retval);
|
|
# endif
|
|
}
|
|
|
|
return (code);
|
|
}
|
|
#elif defined(UKERNEL)
|
|
int
|
|
afs_xioctl(void)
|
|
{
|
|
struct a {
|
|
int fd;
|
|
int com;
|
|
caddr_t arg;
|
|
} *uap = (struct a *)get_user_struct()->u_ap;
|
|
struct file *fd;
|
|
struct vcache *tvc;
|
|
int ioctlDone = 0, code = 0;
|
|
|
|
AFS_STATCNT(afs_xioctl);
|
|
|
|
fd = getf(uap->fd);
|
|
if (!fd)
|
|
return (EBADF);
|
|
/* first determine whether this is any sort of vnode */
|
|
if (fd->f_type == DTYPE_VNODE) {
|
|
/* good, this is a vnode; next see if it is an AFS vnode */
|
|
tvc = VTOAFS((struct vnode *)fd->f_data); /* valid, given a vnode */
|
|
if (tvc && IsAfsVnode(AFSTOV(tvc))) {
|
|
/* This is an AFS vnode */
|
|
if (((uap->com >> 8) & 0xff) == 'V') {
|
|
struct afs_ioctl *datap;
|
|
AFS_GLOCK();
|
|
datap = osi_AllocSmallSpace(AFS_SMALLOCSIZ);
|
|
code=copyin_afs_ioctl((char *)uap->arg, datap);
|
|
if (code) {
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
|
|
return (setuerror(code), code);
|
|
}
|
|
code = HandleIoctl(tvc, uap->com, datap);
|
|
osi_FreeSmallSpace(datap);
|
|
AFS_GUNLOCK();
|
|
ioctlDone = 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!ioctlDone) {
|
|
ioctl();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif /* AFS_HPUX102_ENV */
|
|
|
|
#if defined(AFS_SGI_ENV)
|
|
/* "pioctl" system call entry point; just pass argument to the parameterized
|
|
* call below */
|
|
struct pioctlargs {
|
|
char *path;
|
|
sysarg_t cmd;
|
|
caddr_t cmarg;
|
|
sysarg_t follow;
|
|
};
|
|
int
|
|
afs_pioctl(struct pioctlargs *uap, rval_t * rvp)
|
|
{
|
|
int code;
|
|
|
|
AFS_STATCNT(afs_pioctl);
|
|
AFS_GLOCK();
|
|
code = afs_syscall_pioctl(uap->path, uap->cmd, uap->cmarg, uap->follow);
|
|
AFS_GUNLOCK();
|
|
# ifdef AFS_SGI64_ENV
|
|
return code;
|
|
# else
|
|
return u.u_error;
|
|
# endif
|
|
}
|
|
|
|
#elif defined(AFS_FBSD_ENV)
|
|
int
|
|
afs_pioctl(struct thread *td, void *args, int *retval)
|
|
{
|
|
struct a {
|
|
char *path;
|
|
int cmd;
|
|
caddr_t cmarg;
|
|
int follow;
|
|
} *uap = (struct a *)args;
|
|
|
|
AFS_STATCNT(afs_pioctl);
|
|
return (afs_syscall_pioctl
|
|
(uap->path, uap->cmd, uap->cmarg, uap->follow, td->td_ucred));
|
|
}
|
|
|
|
#elif defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
|
|
int
|
|
afs_pioctl(afs_proc_t *p, void *args, int *retval)
|
|
{
|
|
struct a {
|
|
char *path;
|
|
int cmd;
|
|
caddr_t cmarg;
|
|
int follow;
|
|
} *uap = (struct a *)args;
|
|
|
|
AFS_STATCNT(afs_pioctl);
|
|
# if defined(AFS_DARWIN80_ENV) || defined(AFS_NBSD40_ENV)
|
|
return (afs_syscall_pioctl
|
|
(uap->path, uap->cmd, uap->cmarg, uap->follow,
|
|
kauth_cred_get()));
|
|
# else
|
|
return (afs_syscall_pioctl
|
|
(uap->path, uap->cmd, uap->cmarg, uap->follow,
|
|
# if defined(AFS_FBSD_ENV)
|
|
td->td_ucred));
|
|
# else
|
|
p->p_cred->pc_ucred));
|
|
# endif
|
|
# endif
|
|
}
|
|
|
|
#endif
|
|
|
|
/* macro to avoid adding any more #ifdef's to pioctl code. */
|
|
#if defined(AFS_LINUX22_ENV) || defined(AFS_AIX41_ENV)
|
|
#define PIOCTL_FREE_CRED() crfree(credp)
|
|
#else
|
|
#define PIOCTL_FREE_CRED()
|
|
#endif
|
|
|
|
int
|
|
#ifdef AFS_SUN5_ENV
|
|
afs_syscall_pioctl(char *path, unsigned int com, caddr_t cmarg, int follow,
|
|
rval_t *vvp, afs_ucred_t *credp)
|
|
#else
|
|
#ifdef AFS_DARWIN100_ENV
|
|
afs_syscall64_pioctl(user_addr_t path, unsigned int com, user_addr_t cmarg,
|
|
int follow, afs_ucred_t *credp)
|
|
#elif defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
|
|
afs_syscall_pioctl(char *path, unsigned int com, caddr_t cmarg, int follow,
|
|
afs_ucred_t *credp)
|
|
#else
|
|
afs_syscall_pioctl(char *path, unsigned int com, caddr_t cmarg, int follow)
|
|
#endif
|
|
#endif
|
|
{
|
|
struct afs_ioctl data;
|
|
#ifdef AFS_NEED_CLIENTCONTEXT
|
|
afs_ucred_t *tmpcred = NULL;
|
|
#endif
|
|
#if defined(AFS_NEED_CLIENTCONTEXT) || defined(AFS_SUN5_ENV) || defined(AFS_AIX41_ENV) || defined(AFS_LINUX22_ENV) || defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
|
|
afs_ucred_t *foreigncreds = NULL;
|
|
#endif
|
|
afs_int32 code = 0;
|
|
struct vnode *vp = NULL;
|
|
#ifdef AFS_AIX41_ENV
|
|
struct ucred *credp = crref(); /* don't free until done! */
|
|
#endif
|
|
#ifdef AFS_LINUX22_ENV
|
|
cred_t *credp = crref(); /* don't free until done! */
|
|
struct dentry *dp;
|
|
#endif
|
|
|
|
AFS_STATCNT(afs_syscall_pioctl);
|
|
if (follow)
|
|
follow = 1; /* compat. with old venus */
|
|
code = copyin_afs_ioctl(cmarg, &data);
|
|
if (code) {
|
|
PIOCTL_FREE_CRED();
|
|
#if defined(KERNEL_HAVE_UERROR)
|
|
setuerror(code);
|
|
#endif
|
|
return (code);
|
|
}
|
|
if ((com & 0xff) == PSetClientContext) {
|
|
#ifdef AFS_NEED_CLIENTCONTEXT
|
|
#if defined(AFS_SUN5_ENV) || defined(AFS_AIX41_ENV) || defined(AFS_LINUX22_ENV)
|
|
code = HandleClientContext(&data, &com, &foreigncreds, credp);
|
|
#else
|
|
code = HandleClientContext(&data, &com, &foreigncreds, osi_curcred());
|
|
#endif
|
|
if (code) {
|
|
if (foreigncreds) {
|
|
crfree(foreigncreds);
|
|
}
|
|
PIOCTL_FREE_CRED();
|
|
#if defined(KERNEL_HAVE_UERROR)
|
|
return (setuerror(code), code);
|
|
#else
|
|
return (code);
|
|
#endif
|
|
}
|
|
#else /* AFS_NEED_CLIENTCONTEXT */
|
|
return EINVAL;
|
|
#endif /* AFS_NEED_CLIENTCONTEXT */
|
|
}
|
|
#ifdef AFS_NEED_CLIENTCONTEXT
|
|
if (foreigncreds) {
|
|
/*
|
|
* We could have done without temporary setting the u.u_cred below
|
|
* (foreigncreds could be passed as param the pioctl modules)
|
|
* but calls such as afs_osi_suser() doesn't allow that since it
|
|
* references u.u_cred directly. We could, of course, do something
|
|
* like afs_osi_suser(cred) which, I think, is better since it
|
|
* generalizes and supports multi cred environments...
|
|
*/
|
|
#if defined(AFS_SUN5_ENV) || defined(AFS_LINUX22_ENV)
|
|
tmpcred = credp;
|
|
credp = foreigncreds;
|
|
#elif defined(AFS_AIX41_ENV)
|
|
tmpcred = crref(); /* XXX */
|
|
crset(foreigncreds);
|
|
#elif defined(AFS_HPUX101_ENV)
|
|
tmpcred = p_cred(u.u_procp);
|
|
set_p_cred(u.u_procp, foreigncreds);
|
|
#elif defined(AFS_SGI_ENV)
|
|
tmpcred = OSI_GET_CURRENT_CRED();
|
|
OSI_SET_CURRENT_CRED(foreigncreds);
|
|
#else
|
|
tmpcred = u.u_cred;
|
|
u.u_cred = foreigncreds;
|
|
#endif
|
|
}
|
|
#endif /* AFS_NEED_CLIENTCONTEXT */
|
|
if ((com & 0xff) == 15) {
|
|
/* special case prefetch so entire pathname eval occurs in helper process.
|
|
* otherwise, the pioctl call is essentially useless */
|
|
#if defined(AFS_SUN5_ENV) || defined(AFS_AIX41_ENV) || defined(AFS_LINUX22_ENV) || defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
|
|
code =
|
|
Prefetch(path, &data, follow,
|
|
foreigncreds ? foreigncreds : credp);
|
|
#else
|
|
code = Prefetch(path, &data, follow, osi_curcred());
|
|
#endif
|
|
vp = NULL;
|
|
#if defined(KERNEL_HAVE_UERROR)
|
|
setuerror(code);
|
|
#endif
|
|
goto rescred;
|
|
}
|
|
if (path) {
|
|
AFS_GUNLOCK();
|
|
#ifdef AFS_AIX41_ENV
|
|
code =
|
|
lookupname(path, USR, follow, NULL, &vp,
|
|
foreigncreds ? foreigncreds : credp);
|
|
#else
|
|
#ifdef AFS_LINUX22_ENV
|
|
code = gop_lookupname_user(path, AFS_UIOUSER, follow, &dp);
|
|
if (!code)
|
|
vp = (struct vnode *)dp->d_inode;
|
|
#else
|
|
code = gop_lookupname_user(path, AFS_UIOUSER, follow, &vp);
|
|
#if defined(AFS_FBSD80_ENV) /* XXX check on 7x */
|
|
if (vp != NULL)
|
|
VN_HOLD(vp);
|
|
#endif /* AFS_FBSD80_ENV */
|
|
#endif /* AFS_LINUX22_ENV */
|
|
#endif /* AFS_AIX41_ENV */
|
|
AFS_GLOCK();
|
|
if (code) {
|
|
vp = NULL;
|
|
#if defined(KERNEL_HAVE_UERROR)
|
|
setuerror(code);
|
|
#endif
|
|
goto rescred;
|
|
}
|
|
} else
|
|
vp = NULL;
|
|
|
|
#if defined(AFS_SUN510_ENV)
|
|
if (vp && !IsAfsVnode(vp)) {
|
|
struct vnode *realvp;
|
|
if
|
|
#ifdef AFS_SUN511_ENV
|
|
(VOP_REALVP(vp, &realvp, NULL) == 0)
|
|
#else
|
|
(VOP_REALVP(vp, &realvp) == 0)
|
|
#endif
|
|
{
|
|
struct vnode *oldvp = vp;
|
|
|
|
VN_HOLD(realvp);
|
|
vp = realvp;
|
|
AFS_RELE(oldvp);
|
|
}
|
|
}
|
|
#endif
|
|
/* now make the call if we were passed no file, or were passed an AFS file */
|
|
if (!vp || IsAfsVnode(vp)) {
|
|
#if defined(AFS_SUN5_ENV)
|
|
code = afs_HandlePioctl(vp, com, &data, follow, &credp);
|
|
#elif defined(AFS_AIX41_ENV)
|
|
{
|
|
struct ucred *cred1, *cred2;
|
|
|
|
if (foreigncreds) {
|
|
cred1 = cred2 = foreigncreds;
|
|
} else {
|
|
cred1 = cred2 = credp;
|
|
}
|
|
code = afs_HandlePioctl(vp, com, &data, follow, &cred1);
|
|
if (cred1 != cred2) {
|
|
/* something changed the creds */
|
|
crset(cred1);
|
|
}
|
|
}
|
|
#elif defined(AFS_HPUX101_ENV)
|
|
{
|
|
struct ucred *cred = p_cred(u.u_procp);
|
|
code = afs_HandlePioctl(vp, com, &data, follow, &cred);
|
|
}
|
|
#elif defined(AFS_SGI_ENV)
|
|
{
|
|
struct cred *credp;
|
|
credp = OSI_GET_CURRENT_CRED();
|
|
code = afs_HandlePioctl(vp, com, &data, follow, &credp);
|
|
}
|
|
#elif defined(AFS_LINUX22_ENV) || defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
|
|
code = afs_HandlePioctl(vp, com, &data, follow, &credp);
|
|
#elif defined(UKERNEL)
|
|
code = afs_HandlePioctl(vp, com, &data, follow,
|
|
&(get_user_struct()->u_cred));
|
|
#else
|
|
code = afs_HandlePioctl(vp, com, &data, follow, &u.u_cred);
|
|
#endif
|
|
} else {
|
|
#if defined(KERNEL_HAVE_UERROR)
|
|
setuerror(EINVAL);
|
|
#else
|
|
code = EINVAL; /* not in /afs */
|
|
#endif
|
|
}
|
|
|
|
rescred:
|
|
#if defined(AFS_NEED_CLIENTCONTEXT)
|
|
if (foreigncreds) {
|
|
#ifdef AFS_AIX41_ENV
|
|
crset(tmpcred); /* restore original credentials */
|
|
#else
|
|
#if defined(AFS_HPUX101_ENV)
|
|
set_p_cred(u.u_procp, tmpcred); /* restore original credentials */
|
|
#elif defined(AFS_SGI_ENV)
|
|
OSI_SET_CURRENT_CRED(tmpcred); /* restore original credentials */
|
|
#elif defined(AFS_SUN5_ENV) || defined(AFS_LINUX22_ENV)
|
|
credp = tmpcred; /* restore original credentials */
|
|
#else
|
|
osi_curcred() = tmpcred; /* restore original credentials */
|
|
#endif /* AFS_HPUX101_ENV */
|
|
crfree(foreigncreds);
|
|
#endif /* AIX41 */
|
|
}
|
|
#endif /* AFS_NEED_CLIENTCONTEXT */
|
|
if (vp) {
|
|
#ifdef AFS_LINUX22_ENV
|
|
dput(dp);
|
|
#else
|
|
#if defined(AFS_FBSD80_ENV)
|
|
if (VOP_ISLOCKED(vp))
|
|
VOP_UNLOCK(vp, 0);
|
|
#endif /* AFS_FBSD80_ENV */
|
|
AFS_RELE(vp); /* put vnode back */
|
|
#endif
|
|
}
|
|
PIOCTL_FREE_CRED();
|
|
#if defined(KERNEL_HAVE_UERROR)
|
|
if (!getuerror())
|
|
setuerror(code);
|
|
return (getuerror());
|
|
#else
|
|
return (code);
|
|
#endif
|
|
}
|
|
|
|
#ifdef AFS_DARWIN100_ENV
|
|
int
|
|
afs_syscall_pioctl(char * path, unsigned int com, caddr_t cmarg,
|
|
int follow, afs_ucred_t *credp)
|
|
{
|
|
return afs_syscall64_pioctl(CAST_USER_ADDR_T(path), com,
|
|
CAST_USER_ADDR_T((unsigned int)cmarg), follow,
|
|
credp);
|
|
}
|
|
#endif
|
|
|
|
#define MAXPIOCTLTOKENLEN \
|
|
(3*sizeof(afs_int32)+MAXKTCTICKETLEN+sizeof(struct ClearToken)+MAXKTCREALMLEN)
|
|
|
|
int
|
|
afs_HandlePioctl(struct vnode *avp, afs_int32 acom,
|
|
struct afs_ioctl *ablob, int afollow,
|
|
afs_ucred_t **acred)
|
|
{
|
|
struct vcache *avc;
|
|
struct vrequest treq;
|
|
afs_int32 code;
|
|
afs_int32 function, device;
|
|
struct afs_pdata input, output;
|
|
struct afs_pdata copyInput, copyOutput;
|
|
size_t outSize;
|
|
pioctlFunction *pioctlSw;
|
|
int pioctlSwSize;
|
|
struct afs_fakestat_state fakestate;
|
|
|
|
memset(&input, 0, sizeof(input));
|
|
memset(&output, 0, sizeof(output));
|
|
|
|
avc = avp ? VTOAFS(avp) : NULL;
|
|
afs_Trace3(afs_iclSetp, CM_TRACE_PIOCTL, ICL_TYPE_INT32, acom & 0xff,
|
|
ICL_TYPE_POINTER, avc, ICL_TYPE_INT32, afollow);
|
|
AFS_STATCNT(HandlePioctl);
|
|
|
|
code = afs_InitReq(&treq, *acred);
|
|
if (code)
|
|
return code;
|
|
|
|
afs_InitFakeStat(&fakestate);
|
|
if (avc) {
|
|
code = afs_EvalFakeStat(&avc, &fakestate, &treq);
|
|
if (code)
|
|
goto out;
|
|
}
|
|
device = (acom & 0xff00) >> 8;
|
|
switch (device) {
|
|
case 'V': /* Original pioctls */
|
|
pioctlSw = VpioctlSw;
|
|
pioctlSwSize = sizeof(VpioctlSw);
|
|
break;
|
|
case 'C': /* Coordinated/common pioctls */
|
|
pioctlSw = CpioctlSw;
|
|
pioctlSwSize = sizeof(CpioctlSw);
|
|
break;
|
|
case 'O': /* Coordinated/common pioctls */
|
|
pioctlSw = OpioctlSw;
|
|
pioctlSwSize = sizeof(OpioctlSw);
|
|
break;
|
|
default:
|
|
code = EINVAL;
|
|
goto out;
|
|
}
|
|
function = acom & 0xff;
|
|
if (function >= (pioctlSwSize / sizeof(char *))) {
|
|
code = EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
/* Do all range checking before continuing */
|
|
if (ablob->in_size > MAXPIOCTLTOKENLEN ||
|
|
ablob->in_size < 0 || ablob->out_size < 0) {
|
|
code = EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
code = afs_pd_alloc(&input, ablob->in_size);
|
|
if (code)
|
|
goto out;
|
|
|
|
if (ablob->in_size > 0) {
|
|
AFS_COPYIN(ablob->in, input.ptr, ablob->in_size, code);
|
|
input.ptr[input.remaining] = '\0';
|
|
}
|
|
if (code)
|
|
goto out;
|
|
|
|
if ((function == 8 && device == 'V') ||
|
|
(function == 7 && device == 'C')) { /* PGetTokens */
|
|
code = afs_pd_alloc(&output, MAXPIOCTLTOKENLEN);
|
|
} else {
|
|
code = afs_pd_alloc(&output, AFS_LRALLOCSIZ);
|
|
}
|
|
if (code)
|
|
goto out;
|
|
|
|
copyInput = input;
|
|
copyOutput = output;
|
|
|
|
code =
|
|
(*pioctlSw[function]) (avc, function, &treq, ©Input,
|
|
©Output, acred);
|
|
|
|
outSize = copyOutput.ptr - output.ptr;
|
|
|
|
if (code == 0 && ablob->out_size > 0) {
|
|
if (outSize > ablob->out_size) {
|
|
code = E2BIG; /* data wont fit in user buffer */
|
|
} else if (outSize) {
|
|
AFS_COPYOUT(output.ptr, ablob->out, outSize, code);
|
|
}
|
|
}
|
|
|
|
out:
|
|
afs_pd_free(&input);
|
|
afs_pd_free(&output);
|
|
|
|
afs_PutFakeStat(&fakestate);
|
|
return afs_CheckCode(code, &treq, 41);
|
|
}
|
|
|
|
/*!
|
|
* VIOCGETFID (22) - Get file ID quickly
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout fid of requested file
|
|
*
|
|
* \retval EINVAL Error if some of the initial arguments aren't set
|
|
*
|
|
* \post get the file id of some file
|
|
*/
|
|
DECL_PIOCTL(PGetFID)
|
|
{
|
|
AFS_STATCNT(PGetFID);
|
|
if (!avc)
|
|
return EINVAL;
|
|
if (afs_pd_putBytes(aout, &avc->f.fid, sizeof(struct VenusFid)) != 0)
|
|
return EINVAL;
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCSETAL (1) - Set access control list
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the ACL being set
|
|
* \param[out] aout the ACL being set returned
|
|
*
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
*
|
|
* \post Changed ACL, via direct writing to the wire
|
|
*/
|
|
int
|
|
dummy_PSetAcl(char *ain, char *aout)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
DECL_PIOCTL(PSetAcl)
|
|
{
|
|
afs_int32 code;
|
|
struct afs_conn *tconn;
|
|
struct AFSOpaque acl;
|
|
struct AFSVolSync tsync;
|
|
struct AFSFetchStatus OutStatus;
|
|
struct rx_connection *rxconn;
|
|
XSTATS_DECLS;
|
|
|
|
AFS_STATCNT(PSetAcl);
|
|
if (!avc)
|
|
return EINVAL;
|
|
|
|
if (afs_pd_getStringPtr(ain, &acl.AFSOpaque_val) != 0)
|
|
return EINVAL;
|
|
acl.AFSOpaque_len = strlen(acl.AFSOpaque_val) + 1;
|
|
if (acl.AFSOpaque_len > 1024)
|
|
return EINVAL;
|
|
|
|
do {
|
|
tconn = afs_Conn(&avc->f.fid, areq, SHARED_LOCK, &rxconn);
|
|
if (tconn) {
|
|
XSTATS_START_TIME(AFS_STATS_FS_RPCIDX_STOREACL);
|
|
RX_AFS_GUNLOCK();
|
|
code =
|
|
RXAFS_StoreACL(rxconn, (struct AFSFid *)&avc->f.fid.Fid,
|
|
&acl, &OutStatus, &tsync);
|
|
RX_AFS_GLOCK();
|
|
XSTATS_END_TIME;
|
|
} else
|
|
code = -1;
|
|
} while (afs_Analyze
|
|
(tconn, rxconn, code, &avc->f.fid, areq, AFS_STATS_FS_RPCIDX_STOREACL,
|
|
SHARED_LOCK, NULL));
|
|
|
|
/* now we've forgotten all of the access info */
|
|
ObtainWriteLock(&afs_xcbhash, 455);
|
|
avc->callback = 0;
|
|
afs_DequeueCallback(avc);
|
|
avc->f.states &= ~(CStatd | CUnique);
|
|
ReleaseWriteLock(&afs_xcbhash);
|
|
if (avc->f.fid.Fid.Vnode & 1 || (vType(avc) == VDIR))
|
|
osi_dnlc_purgedp(avc);
|
|
|
|
/* SXW - Should we flush metadata here? */
|
|
return code;
|
|
}
|
|
|
|
int afs_defaultAsynchrony = 0;
|
|
|
|
/*!
|
|
* VIOC_STOREBEHIND (47) Adjust store asynchrony
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain sbstruct (store behind structure) input
|
|
* \param[out] aout resulting sbstruct
|
|
*
|
|
* \retval EPERM
|
|
* Error if the user doesn't have super-user credentials
|
|
* \retval EACCES
|
|
* Error if there isn't enough access to not check the mode bits
|
|
*
|
|
* \post
|
|
* Changes either the default asynchrony (the amount of data that
|
|
* can remain to be written when the cache manager returns control
|
|
* to the user), or the asyncrony for the specified file.
|
|
*/
|
|
DECL_PIOCTL(PStoreBehind)
|
|
{
|
|
struct sbstruct sbr;
|
|
|
|
if (afs_pd_getBytes(ain, &sbr, sizeof(struct sbstruct)) != 0)
|
|
return EINVAL;
|
|
|
|
if (sbr.sb_default != -1) {
|
|
if (afs_osi_suser(*acred))
|
|
afs_defaultAsynchrony = sbr.sb_default;
|
|
else
|
|
return EPERM;
|
|
}
|
|
|
|
if (avc && (sbr.sb_thisfile != -1)) {
|
|
if (afs_AccessOK
|
|
(avc, PRSFS_WRITE | PRSFS_ADMINISTER, areq, DONT_CHECK_MODE_BITS))
|
|
avc->asynchrony = sbr.sb_thisfile;
|
|
else
|
|
return EACCES;
|
|
}
|
|
|
|
memset(&sbr, 0, sizeof(sbr));
|
|
sbr.sb_default = afs_defaultAsynchrony;
|
|
if (avc) {
|
|
sbr.sb_thisfile = avc->asynchrony;
|
|
}
|
|
|
|
return afs_pd_putBytes(aout, &sbr, sizeof(sbr));
|
|
}
|
|
|
|
/*!
|
|
* VIOC_GCPAGS (48) - Disable automatic PAG gc'ing
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
*
|
|
* \post set the gcpags to GCPAGS_USERDISABLED
|
|
*/
|
|
DECL_PIOCTL(PGCPAGs)
|
|
{
|
|
if (!afs_osi_suser(*acred)) {
|
|
return EACCES;
|
|
}
|
|
afs_gcpags = AFS_GCPAGS_USERDISABLED;
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCGETAL (2) - Get access control list
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout the ACL
|
|
*
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
* \retval ERANGE Error if the vnode of the file id is too large
|
|
* \retval -1 Error if getting the ACL failed
|
|
*
|
|
* \post Obtain the ACL, based on file ID
|
|
*
|
|
* \notes
|
|
* There is a hack to tell which type of ACL is being returned, checks
|
|
* the top 2-bytes of the input size to judge what type of ACL it is,
|
|
* only for dfs xlator ACLs
|
|
*/
|
|
DECL_PIOCTL(PGetAcl)
|
|
{
|
|
struct AFSOpaque acl;
|
|
struct AFSVolSync tsync;
|
|
struct AFSFetchStatus OutStatus;
|
|
afs_int32 code;
|
|
struct afs_conn *tconn;
|
|
struct AFSFid Fid;
|
|
struct rx_connection *rxconn;
|
|
XSTATS_DECLS;
|
|
|
|
AFS_STATCNT(PGetAcl);
|
|
if (!avc)
|
|
return EINVAL;
|
|
Fid.Volume = avc->f.fid.Fid.Volume;
|
|
Fid.Vnode = avc->f.fid.Fid.Vnode;
|
|
Fid.Unique = avc->f.fid.Fid.Unique;
|
|
if (avc->f.states & CForeign) {
|
|
/*
|
|
* For a dfs xlator acl we have a special hack so that the
|
|
* xlator will distinguish which type of acl will return. So
|
|
* we currently use the top 2-bytes (vals 0-4) to tell which
|
|
* type of acl to bring back. Horrible hack but this will
|
|
* cause the least number of changes to code size and interfaces.
|
|
*/
|
|
if (Fid.Vnode & 0xc0000000)
|
|
return ERANGE;
|
|
Fid.Vnode |= (ain->remaining << 30);
|
|
}
|
|
acl.AFSOpaque_val = aout->ptr;
|
|
do {
|
|
tconn = afs_Conn(&avc->f.fid, areq, SHARED_LOCK, &rxconn);
|
|
if (tconn) {
|
|
acl.AFSOpaque_val[0] = '\0';
|
|
XSTATS_START_TIME(AFS_STATS_FS_RPCIDX_FETCHACL);
|
|
RX_AFS_GUNLOCK();
|
|
code = RXAFS_FetchACL(rxconn, &Fid, &acl, &OutStatus, &tsync);
|
|
RX_AFS_GLOCK();
|
|
XSTATS_END_TIME;
|
|
} else
|
|
code = -1;
|
|
} while (afs_Analyze
|
|
(tconn, rxconn, code, &avc->f.fid, areq, AFS_STATS_FS_RPCIDX_FETCHACL,
|
|
SHARED_LOCK, NULL));
|
|
|
|
if (code == 0) {
|
|
if (acl.AFSOpaque_len == 0)
|
|
afs_pd_skip(aout, 1); /* leave the NULL */
|
|
else
|
|
afs_pd_skip(aout, acl.AFSOpaque_len); /* Length of the ACL */
|
|
}
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* PNoop returns success. Used for functions which are not implemented
|
|
* or are no longer in use.
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \retval Always returns success
|
|
*
|
|
* \notes
|
|
* Functions involved in this:
|
|
* 17 (VIOCENGROUP) -- used to be enable group;
|
|
* 18 (VIOCDISGROUP) -- used to be disable group;
|
|
* 2 (?) -- get/set cache-bypass size threshold
|
|
*/
|
|
DECL_PIOCTL(PNoop)
|
|
{
|
|
AFS_STATCNT(PNoop);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* PBogus returns fail. Used for functions which are not implemented or
|
|
* are no longer in use.
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \retval EINVAL Always returns this value
|
|
*
|
|
* \notes
|
|
* Functions involved in this:
|
|
* 0 (?);
|
|
* 4 (?);
|
|
* 6 (?);
|
|
* 7 (VIOCSTAT);
|
|
* 8 (?);
|
|
* 13 (VIOCGETTIME) -- used to be quick check time;
|
|
* 15 (VIOCPREFETCH) -- prefetch is now special-cased; see pioctl code!;
|
|
* 16 (VIOCNOP) -- used to be testing code;
|
|
* 19 (VIOCLISTGROUPS) -- used to be list group;
|
|
* 23 (VIOCWAITFOREVER) -- used to be waitforever;
|
|
* 57 (VIOC_FPRIOSTATUS) -- arla: set file prio;
|
|
* 58 (VIOC_FHGET) -- arla: fallback getfh;
|
|
* 59 (VIOC_FHOPEN) -- arla: fallback fhopen;
|
|
* 60 (VIOC_XFSDEBUG) -- arla: controls xfsdebug;
|
|
* 61 (VIOC_ARLADEBUG) -- arla: controls arla debug;
|
|
* 62 (VIOC_AVIATOR) -- arla: debug interface;
|
|
* 63 (VIOC_XFSDEBUG_PRINT) -- arla: print xfs status;
|
|
* 64 (VIOC_CALCULATE_CACHE) -- arla: force cache check;
|
|
* 65 (VIOC_BREAKCELLBACK) -- arla: break callback;
|
|
* 68 (?) -- arla: fetch stats;
|
|
*/
|
|
DECL_PIOCTL(PBogus)
|
|
{
|
|
AFS_STATCNT(PBogus);
|
|
return EINVAL;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_FILE_CELL_NAME (30) - Get cell in which file lives
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use (avc used to pass in file id)
|
|
* \param[out] aout cell name
|
|
*
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
* \retval ESRCH Error if the file isn't part of a cell
|
|
*
|
|
* \post Get a cell based on a passed in file id
|
|
*/
|
|
DECL_PIOCTL(PGetFileCell)
|
|
{
|
|
struct cell *tcell;
|
|
|
|
AFS_STATCNT(PGetFileCell);
|
|
if (!avc)
|
|
return EINVAL;
|
|
tcell = afs_GetCell(avc->f.fid.Cell, READ_LOCK);
|
|
if (!tcell)
|
|
return ESRCH;
|
|
|
|
if (afs_pd_putString(aout, tcell->cellName) != 0)
|
|
return EINVAL;
|
|
|
|
afs_PutCell(tcell, READ_LOCK);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_GET_WS_CELL (31) - Get cell in which workstation lives
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout cell name
|
|
*
|
|
* \retval EIO
|
|
* Error if the afs daemon hasn't started yet
|
|
* \retval ESRCH
|
|
* Error if the machine isn't part of a cell, for whatever reason
|
|
*
|
|
* \post Get the primary cell that the machine is a part of.
|
|
*/
|
|
DECL_PIOCTL(PGetWSCell)
|
|
{
|
|
struct cell *tcell = NULL;
|
|
|
|
AFS_STATCNT(PGetWSCell);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
tcell = afs_GetPrimaryCell(READ_LOCK);
|
|
if (!tcell) /* no primary cell? */
|
|
return ESRCH;
|
|
|
|
if (afs_pd_putString(aout, tcell->cellName) != 0)
|
|
return EINVAL;
|
|
afs_PutCell(tcell, READ_LOCK);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_GET_PRIMARY_CELL (33) - Get primary cell for caller
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use (user id found via areq)
|
|
* \param[out] aout cell name
|
|
*
|
|
* \retval ESRCH
|
|
* Error if the user id doesn't have a primary cell specified
|
|
*
|
|
* \post Get the primary cell for a certain user, based on the user's uid
|
|
*/
|
|
DECL_PIOCTL(PGetUserCell)
|
|
{
|
|
afs_int32 i;
|
|
struct unixuser *tu;
|
|
struct cell *tcell;
|
|
|
|
AFS_STATCNT(PGetUserCell);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
/* return the cell name of the primary cell for this user */
|
|
i = UHash(areq->uid);
|
|
ObtainWriteLock(&afs_xuser, 224);
|
|
for (tu = afs_users[i]; tu; tu = tu->next) {
|
|
if (tu->uid == areq->uid && (tu->states & UPrimary)) {
|
|
tu->refCount++;
|
|
ReleaseWriteLock(&afs_xuser);
|
|
afs_LockUser(tu, READ_LOCK, 0);
|
|
break;
|
|
}
|
|
}
|
|
if (tu) {
|
|
tcell = afs_GetCell(tu->cell, READ_LOCK);
|
|
afs_PutUser(tu, READ_LOCK);
|
|
if (!tcell)
|
|
return ESRCH;
|
|
else {
|
|
if (afs_pd_putString(aout, tcell->cellName) != 0)
|
|
return E2BIG;
|
|
afs_PutCell(tcell, READ_LOCK);
|
|
}
|
|
} else {
|
|
ReleaseWriteLock(&afs_xuser);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/* Work out which cell we're changing tokens for */
|
|
static_inline int
|
|
_settok_tokenCell(char *cellName, int *cellNum, int *primary) {
|
|
int t1;
|
|
struct cell *cell;
|
|
|
|
if (primary) {
|
|
*primary = 0;
|
|
}
|
|
|
|
if (cellName && strlen(cellName) > 0) {
|
|
cell = afs_GetCellByName(cellName, READ_LOCK);
|
|
} else {
|
|
cell = afs_GetPrimaryCell(READ_LOCK);
|
|
if (primary)
|
|
*primary = 1;
|
|
}
|
|
if (!cell) {
|
|
t1 = afs_initState;
|
|
if (t1 < 101)
|
|
return EIO;
|
|
else
|
|
return ESRCH;
|
|
}
|
|
*cellNum = cell->cellNum;
|
|
afs_PutCell(cell, READ_LOCK);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static_inline int
|
|
_settok_setParentPag(afs_ucred_t **cred) {
|
|
afs_uint32 pag;
|
|
#if defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
|
|
char procname[256];
|
|
osi_procname(procname, 256);
|
|
afs_warnuser("Process %d (%s) tried to change pags in PSetTokens\n",
|
|
MyPidxx2Pid(MyPidxx), procname);
|
|
return setpag(osi_curproc(), cred, -1, &pag, 1);
|
|
#else
|
|
return setpag(cred, -1, &pag, 1);
|
|
#endif
|
|
}
|
|
|
|
/*!
|
|
* VIOCSETTOK (3) - Set authentication tokens
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the krb tickets from which to set the afs tokens
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EINVAL
|
|
* Error if the ticket is either too long or too short
|
|
* \retval EIO
|
|
* Error if the AFS initState is below 101
|
|
* \retval ESRCH
|
|
* Error if the cell for which the Token is being set can't be found
|
|
*
|
|
* \post
|
|
* Set the Tokens for a specific cell name, unless there is none set,
|
|
* then default to primary
|
|
*
|
|
*/
|
|
DECL_PIOCTL(PSetTokens)
|
|
{
|
|
afs_int32 cellNum;
|
|
afs_int32 size;
|
|
afs_int32 code;
|
|
struct unixuser *tu;
|
|
struct ClearToken clear;
|
|
char *stp;
|
|
char *cellName;
|
|
int stLen;
|
|
struct vrequest treq;
|
|
afs_int32 flag, set_parent_pag = 0;
|
|
|
|
AFS_STATCNT(PSetTokens);
|
|
if (!afs_resourceinit_flag) {
|
|
return EIO;
|
|
}
|
|
|
|
if (afs_pd_getInt(ain, &stLen) != 0)
|
|
return EINVAL;
|
|
|
|
stp = afs_pd_where(ain); /* remember where the ticket is */
|
|
if (stLen < 0 || stLen > MAXKTCTICKETLEN)
|
|
return EINVAL; /* malloc may fail */
|
|
if (afs_pd_skip(ain, stLen) != 0)
|
|
return EINVAL;
|
|
|
|
if (afs_pd_getInt(ain, &size) != 0)
|
|
return EINVAL;
|
|
if (size != sizeof(struct ClearToken))
|
|
return EINVAL;
|
|
|
|
if (afs_pd_getBytes(ain, &clear, sizeof(struct ClearToken)) !=0)
|
|
return EINVAL;
|
|
|
|
if (clear.AuthHandle == -1)
|
|
clear.AuthHandle = 999; /* more rxvab compat stuff */
|
|
|
|
if (afs_pd_remaining(ain) != 0) {
|
|
/* still stuff left? we've got primary flag and cell name.
|
|
* Set these */
|
|
|
|
if (afs_pd_getInt(ain, &flag) != 0)
|
|
return EINVAL;
|
|
|
|
/* some versions of gcc appear to need != 0 in order to get this
|
|
* right */
|
|
if ((flag & 0x8000) != 0) { /* XXX Use Constant XXX */
|
|
flag &= ~0x8000;
|
|
set_parent_pag = 1;
|
|
}
|
|
|
|
if (afs_pd_getStringPtr(ain, &cellName) != 0)
|
|
return EINVAL;
|
|
|
|
code = _settok_tokenCell(cellName, &cellNum, NULL);
|
|
if (code)
|
|
return code;
|
|
} else {
|
|
/* default to primary cell, primary id */
|
|
code = _settok_tokenCell(NULL, &cellNum, &flag);
|
|
if (code)
|
|
return code;
|
|
}
|
|
|
|
if (set_parent_pag) {
|
|
if (_settok_setParentPag(acred) == 0) {
|
|
afs_InitReq(&treq, *acred);
|
|
areq = &treq;
|
|
}
|
|
}
|
|
|
|
/* now we just set the tokens */
|
|
tu = afs_GetUser(areq->uid, cellNum, WRITE_LOCK);
|
|
/* Set tokens destroys any that are already there */
|
|
afs_FreeTokens(&tu->tokens);
|
|
afs_AddRxkadToken(&tu->tokens, stp, stLen, &clear);
|
|
#ifndef AFS_NOSTATS
|
|
afs_stats_cmfullperf.authent.TicketUpdates++;
|
|
afs_ComputePAGStats();
|
|
#endif /* AFS_NOSTATS */
|
|
tu->states |= UHasTokens;
|
|
tu->states &= ~UTokensBad;
|
|
afs_SetPrimary(tu, flag);
|
|
tu->tokenTime = osi_Time();
|
|
afs_ResetUserConns(tu);
|
|
afs_NotifyUser(tu, UTokensObtained);
|
|
afs_PutUser(tu, WRITE_LOCK);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCGETVOLSTAT (4) - Get volume status
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout status of the volume
|
|
*
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
*
|
|
* \post
|
|
* The status of a volume (based on the FID of the volume), or an
|
|
* offline message /motd
|
|
*/
|
|
DECL_PIOCTL(PGetVolumeStatus)
|
|
{
|
|
char volName[32];
|
|
char *offLineMsg = afs_osi_Alloc(256);
|
|
char *motd = afs_osi_Alloc(256);
|
|
struct afs_conn *tc;
|
|
afs_int32 code = 0;
|
|
struct AFSFetchVolumeStatus volstat;
|
|
char *Name;
|
|
struct rx_connection *rxconn;
|
|
XSTATS_DECLS;
|
|
|
|
osi_Assert(offLineMsg != NULL);
|
|
osi_Assert(motd != NULL);
|
|
AFS_STATCNT(PGetVolumeStatus);
|
|
if (!avc) {
|
|
code = EINVAL;
|
|
goto out;
|
|
}
|
|
Name = volName;
|
|
do {
|
|
tc = afs_Conn(&avc->f.fid, areq, SHARED_LOCK, &rxconn);
|
|
if (tc) {
|
|
XSTATS_START_TIME(AFS_STATS_FS_RPCIDX_GETVOLUMESTATUS);
|
|
RX_AFS_GUNLOCK();
|
|
code =
|
|
RXAFS_GetVolumeStatus(rxconn, avc->f.fid.Fid.Volume, &volstat,
|
|
&Name, &offLineMsg, &motd);
|
|
RX_AFS_GLOCK();
|
|
XSTATS_END_TIME;
|
|
} else
|
|
code = -1;
|
|
} while (afs_Analyze
|
|
(tc, rxconn, code, &avc->f.fid, areq, AFS_STATS_FS_RPCIDX_GETVOLUMESTATUS,
|
|
SHARED_LOCK, NULL));
|
|
|
|
if (code)
|
|
goto out;
|
|
/* Copy all this junk into msg->im_data, keeping track of the lengths. */
|
|
if (afs_pd_putBytes(aout, &volstat, sizeof(VolumeStatus)) != 0)
|
|
return E2BIG;
|
|
if (afs_pd_putString(aout, volName) != 0)
|
|
return E2BIG;
|
|
if (afs_pd_putString(aout, offLineMsg) != 0)
|
|
return E2BIG;
|
|
if (afs_pd_putString(aout, motd) != 0)
|
|
return E2BIG;
|
|
out:
|
|
afs_osi_Free(offLineMsg, 256);
|
|
afs_osi_Free(motd, 256);
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* VIOCSETVOLSTAT (5) - Set volume status
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain
|
|
* values to set the status at, offline message, message of the day,
|
|
* volume name, minimum quota, maximum quota
|
|
* \param[out] aout
|
|
* status of a volume, offlines messages, minimum quota, maximumm quota
|
|
*
|
|
* \retval EINVAL
|
|
* Error if some of the standard args aren't set
|
|
* \retval EROFS
|
|
* Error if the volume is read only, or a backup volume
|
|
* \retval ENODEV
|
|
* Error if the volume can't be accessed
|
|
* \retval E2BIG
|
|
* Error if the volume name, offline message, and motd are too big
|
|
*
|
|
* \post
|
|
* Set the status of a volume, including any offline messages,
|
|
* a minimum quota, and a maximum quota
|
|
*/
|
|
DECL_PIOCTL(PSetVolumeStatus)
|
|
{
|
|
char *volName;
|
|
char *offLineMsg;
|
|
char *motd;
|
|
struct afs_conn *tc;
|
|
afs_int32 code = 0;
|
|
struct AFSFetchVolumeStatus volstat;
|
|
struct AFSStoreVolumeStatus storeStat;
|
|
struct volume *tvp;
|
|
struct rx_connection *rxconn;
|
|
XSTATS_DECLS;
|
|
|
|
AFS_STATCNT(PSetVolumeStatus);
|
|
if (!avc)
|
|
return EINVAL;
|
|
|
|
tvp = afs_GetVolume(&avc->f.fid, areq, READ_LOCK);
|
|
if (tvp) {
|
|
if (tvp->states & (VRO | VBackup)) {
|
|
afs_PutVolume(tvp, READ_LOCK);
|
|
return EROFS;
|
|
}
|
|
afs_PutVolume(tvp, READ_LOCK);
|
|
} else
|
|
return ENODEV;
|
|
|
|
|
|
if (afs_pd_getBytes(ain, &volstat, sizeof(AFSFetchVolumeStatus)) != 0)
|
|
return EINVAL;
|
|
|
|
if (afs_pd_getStringPtr(ain, &volName) != 0)
|
|
return EINVAL;
|
|
if (strlen(volName) > 32)
|
|
return E2BIG;
|
|
|
|
if (afs_pd_getStringPtr(ain, &offLineMsg) != 0)
|
|
return EINVAL;
|
|
if (strlen(offLineMsg) > 256)
|
|
return E2BIG;
|
|
|
|
if (afs_pd_getStringPtr(ain, &motd) != 0)
|
|
return EINVAL;
|
|
if (strlen(motd) > 256)
|
|
return E2BIG;
|
|
|
|
/* Done reading ... */
|
|
|
|
storeStat.Mask = 0;
|
|
if (volstat.MinQuota != -1) {
|
|
storeStat.MinQuota = volstat.MinQuota;
|
|
storeStat.Mask |= AFS_SETMINQUOTA;
|
|
}
|
|
if (volstat.MaxQuota != -1) {
|
|
storeStat.MaxQuota = volstat.MaxQuota;
|
|
storeStat.Mask |= AFS_SETMAXQUOTA;
|
|
}
|
|
do {
|
|
tc = afs_Conn(&avc->f.fid, areq, SHARED_LOCK, &rxconn);
|
|
if (tc) {
|
|
XSTATS_START_TIME(AFS_STATS_FS_RPCIDX_SETVOLUMESTATUS);
|
|
RX_AFS_GUNLOCK();
|
|
code =
|
|
RXAFS_SetVolumeStatus(rxconn, avc->f.fid.Fid.Volume, &storeStat,
|
|
volName, offLineMsg, motd);
|
|
RX_AFS_GLOCK();
|
|
XSTATS_END_TIME;
|
|
} else
|
|
code = -1;
|
|
} while (afs_Analyze
|
|
(tc, rxconn, code, &avc->f.fid, areq, AFS_STATS_FS_RPCIDX_SETVOLUMESTATUS,
|
|
SHARED_LOCK, NULL));
|
|
|
|
if (code)
|
|
return code;
|
|
/* we are sending parms back to make compat. with prev system. should
|
|
* change interface later to not ask for current status, just set new
|
|
* status */
|
|
|
|
if (afs_pd_putBytes(aout, &volstat, sizeof(VolumeStatus)) != 0)
|
|
return EINVAL;
|
|
if (afs_pd_putString(aout, volName) != 0)
|
|
return EINVAL;
|
|
if (afs_pd_putString(aout, offLineMsg) != 0)
|
|
return EINVAL;
|
|
if (afs_pd_putString(aout, motd) != 0)
|
|
return EINVAL;
|
|
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* VIOCFLUSH (6) - Invalidate cache entry
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
*
|
|
* \post Flush any information the cache manager has on an entry
|
|
*/
|
|
DECL_PIOCTL(PFlush)
|
|
{
|
|
AFS_STATCNT(PFlush);
|
|
if (!avc)
|
|
return EINVAL;
|
|
#ifdef AFS_BOZONLOCK_ENV
|
|
afs_BozonLock(&avc->pvnLock, avc); /* Since afs_TryToSmush will do a pvn_vptrunc */
|
|
#endif
|
|
ObtainWriteLock(&avc->lock, 225);
|
|
afs_ResetVCache(avc, *acred);
|
|
ReleaseWriteLock(&avc->lock);
|
|
#ifdef AFS_BOZONLOCK_ENV
|
|
afs_BozonUnlock(&avc->pvnLock, avc);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_AFS_STAT_MT_PT (29) - Stat mount point
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain
|
|
* the last component in a path, related to mountpoint that we're
|
|
* looking for information about
|
|
* \param[out] aout
|
|
* volume, cell, link data
|
|
*
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
* \retval ENOTDIR Error if the 'mount point' argument isn't a directory
|
|
* \retval EIO Error if the link data can't be accessed
|
|
*
|
|
* \post Get the volume, and cell, as well as the link data for a mount point
|
|
*/
|
|
DECL_PIOCTL(PNewStatMount)
|
|
{
|
|
afs_int32 code;
|
|
struct vcache *tvc;
|
|
struct dcache *tdc;
|
|
struct VenusFid tfid;
|
|
char *bufp;
|
|
char *name;
|
|
struct sysname_info sysState;
|
|
afs_size_t offset, len;
|
|
|
|
AFS_STATCNT(PNewStatMount);
|
|
if (!avc)
|
|
return EINVAL;
|
|
|
|
if (afs_pd_getStringPtr(ain, &name) != 0)
|
|
return EINVAL;
|
|
|
|
code = afs_VerifyVCache(avc, areq);
|
|
if (code)
|
|
return code;
|
|
if (vType(avc) != VDIR) {
|
|
return ENOTDIR;
|
|
}
|
|
tdc = afs_GetDCache(avc, (afs_size_t) 0, areq, &offset, &len, 1);
|
|
if (!tdc)
|
|
return ENOENT;
|
|
Check_AtSys(avc, name, &sysState, areq);
|
|
ObtainReadLock(&tdc->lock);
|
|
do {
|
|
code = afs_dir_Lookup(tdc, sysState.name, &tfid.Fid);
|
|
} while (code == ENOENT && Next_AtSys(avc, areq, &sysState));
|
|
ReleaseReadLock(&tdc->lock);
|
|
afs_PutDCache(tdc); /* we're done with the data */
|
|
bufp = sysState.name;
|
|
if (code) {
|
|
goto out;
|
|
}
|
|
tfid.Cell = avc->f.fid.Cell;
|
|
tfid.Fid.Volume = avc->f.fid.Fid.Volume;
|
|
if (!tfid.Fid.Unique && (avc->f.states & CForeign)) {
|
|
tvc = afs_LookupVCache(&tfid, areq, NULL, avc, bufp);
|
|
} else {
|
|
tvc = afs_GetVCache(&tfid, areq, NULL, NULL);
|
|
}
|
|
if (!tvc) {
|
|
code = ENOENT;
|
|
goto out;
|
|
}
|
|
if (tvc->mvstat != 1) {
|
|
afs_PutVCache(tvc);
|
|
code = EINVAL;
|
|
goto out;
|
|
}
|
|
ObtainWriteLock(&tvc->lock, 226);
|
|
code = afs_HandleLink(tvc, areq);
|
|
if (code == 0) {
|
|
if (tvc->linkData) {
|
|
if ((tvc->linkData[0] != '#') && (tvc->linkData[0] != '%'))
|
|
code = EINVAL;
|
|
else {
|
|
/* we have the data */
|
|
if (afs_pd_putString(aout, tvc->linkData) != 0)
|
|
code = EINVAL;
|
|
}
|
|
} else
|
|
code = EIO;
|
|
}
|
|
ReleaseWriteLock(&tvc->lock);
|
|
afs_PutVCache(tvc);
|
|
out:
|
|
if (sysState.allocked)
|
|
osi_FreeLargeSpace(bufp);
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* A helper function to get the n'th cell which a particular user has tokens
|
|
* for. This is racy. If new tokens are added whilst we're iterating, then
|
|
* we may return some cells twice. If tokens expire mid run, then we'll
|
|
* miss some cells from our output. So, could be better, but that would
|
|
* require an interface change.
|
|
*/
|
|
|
|
static struct unixuser *
|
|
getNthCell(afs_int32 uid, afs_int32 iterator) {
|
|
int i;
|
|
struct unixuser *tu = NULL;
|
|
|
|
i = UHash(uid);
|
|
ObtainReadLock(&afs_xuser);
|
|
for (tu = afs_users[i]; tu; tu = tu->next) {
|
|
if (tu->uid == uid && (tu->states & UHasTokens)) {
|
|
if (iterator-- == 0)
|
|
break; /* are we done yet? */
|
|
}
|
|
}
|
|
if (tu) {
|
|
tu->refCount++;
|
|
}
|
|
ReleaseReadLock(&afs_xuser);
|
|
if (tu) {
|
|
afs_LockUser(tu, READ_LOCK, 0);
|
|
}
|
|
|
|
|
|
return tu;
|
|
}
|
|
/*!
|
|
* VIOCGETTOK (8) - Get authentication tokens
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain cellid to return tokens for
|
|
* \param[out] aout token
|
|
*
|
|
* \retval EIO
|
|
* Error if the afs daemon hasn't started yet
|
|
* \retval EDOM
|
|
* Error if the input parameter is out of the bounds of the available
|
|
* tokens
|
|
* \retval ENOTCONN
|
|
* Error if there aren't tokens for this cell
|
|
*
|
|
* \post
|
|
* If the input paramater exists, get the token that corresponds to
|
|
* the parameter value, if there is no token at this value, get the
|
|
* token for the first cell
|
|
*
|
|
* \notes "it's a weird interface (from comments in the code)"
|
|
*/
|
|
|
|
DECL_PIOCTL(PGetTokens)
|
|
{
|
|
struct cell *tcell;
|
|
struct unixuser *tu = NULL;
|
|
union tokenUnion *token;
|
|
afs_int32 iterator = 0;
|
|
int newStyle;
|
|
int cellNum;
|
|
int code = E2BIG;
|
|
|
|
AFS_STATCNT(PGetTokens);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
/* weird interface. If input parameter is present, it is an integer and
|
|
* we're supposed to return the parm'th tokens for this unix uid.
|
|
* If not present, we just return tokens for cell 1.
|
|
* If counter out of bounds, return EDOM.
|
|
* If no tokens for the particular cell, return ENOTCONN.
|
|
* Also, if this mysterious parm is present, we return, along with the
|
|
* tokens, the primary cell indicator (an afs_int32 0) and the cell name
|
|
* at the end, in that order.
|
|
*/
|
|
newStyle = (afs_pd_remaining(ain) > 0);
|
|
if (newStyle) {
|
|
if (afs_pd_getInt(ain, &iterator) != 0)
|
|
return EINVAL;
|
|
}
|
|
if (newStyle) {
|
|
tu = getNthCell(areq->uid, iterator);
|
|
} else {
|
|
cellNum = afs_GetPrimaryCellNum();
|
|
if (cellNum)
|
|
tu = afs_FindUser(areq->uid, cellNum, READ_LOCK);
|
|
}
|
|
if (!tu) {
|
|
return EDOM;
|
|
}
|
|
if (!(tu->states & UHasTokens)
|
|
|| !afs_HasUsableTokens(tu->tokens, osi_Time())) {
|
|
tu->states |= (UTokensBad | UNeedsReset);
|
|
afs_NotifyUser(tu, UTokensDropped);
|
|
afs_PutUser(tu, READ_LOCK);
|
|
return ENOTCONN;
|
|
}
|
|
token = afs_FindToken(tu->tokens, RX_SECIDX_KAD);
|
|
|
|
/* If they don't have an RXKAD token, but do have other tokens,
|
|
* then sadly there's nothing this interface can do to help them. */
|
|
if (token == NULL)
|
|
return ENOTCONN;
|
|
|
|
/* for compat, we try to return 56 byte tix if they fit */
|
|
iterator = token->rxkad.ticketLen;
|
|
if (iterator < 56)
|
|
iterator = 56; /* # of bytes we're returning */
|
|
|
|
if (afs_pd_putInt(aout, iterator) != 0)
|
|
goto out;
|
|
if (afs_pd_putBytes(aout, token->rxkad.ticket, token->rxkad.ticketLen) != 0)
|
|
goto out;
|
|
if (token->rxkad.ticketLen < 56) {
|
|
/* Tokens are always 56 bytes or larger */
|
|
if (afs_pd_skip(aout, iterator - token->rxkad.ticketLen) != 0) {
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
if (afs_pd_putInt(aout, sizeof(struct ClearToken)) != 0)
|
|
goto out;
|
|
if (afs_pd_putBytes(aout, &token->rxkad.clearToken,
|
|
sizeof(struct ClearToken)) != 0)
|
|
goto out;
|
|
|
|
if (newStyle) {
|
|
/* put out primary id and cell name, too */
|
|
iterator = (tu->states & UPrimary ? 1 : 0);
|
|
if (afs_pd_putInt(aout, iterator) != 0)
|
|
goto out;
|
|
tcell = afs_GetCell(tu->cell, READ_LOCK);
|
|
if (tcell) {
|
|
if (afs_pd_putString(aout, tcell->cellName) != 0)
|
|
goto out;
|
|
afs_PutCell(tcell, READ_LOCK);
|
|
} else
|
|
if (afs_pd_putString(aout, "") != 0)
|
|
goto out;
|
|
}
|
|
/* Got here, all is good */
|
|
code = 0;
|
|
out:
|
|
afs_PutUser(tu, READ_LOCK);
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* VIOCUNLOG (9) - Invalidate tokens
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't been started yet
|
|
*
|
|
* \post remove tokens from a user, specified by the user id
|
|
*
|
|
* \notes sets the token's time to 0, which then causes it to be removed
|
|
* \notes Unlog is the same as un-pag in OpenAFS
|
|
*/
|
|
DECL_PIOCTL(PUnlog)
|
|
{
|
|
afs_int32 i;
|
|
struct unixuser *tu;
|
|
|
|
AFS_STATCNT(PUnlog);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
i = UHash(areq->uid);
|
|
ObtainWriteLock(&afs_xuser, 227);
|
|
for (tu = afs_users[i]; tu; tu = tu->next) {
|
|
if (tu->uid == areq->uid) {
|
|
tu->refCount++;
|
|
ReleaseWriteLock(&afs_xuser);
|
|
|
|
afs_LockUser(tu, WRITE_LOCK, 366);
|
|
|
|
tu->states &= ~UHasTokens;
|
|
afs_FreeTokens(&tu->tokens);
|
|
afs_NotifyUser(tu, UTokensDropped);
|
|
/* We have to drop the lock over the call to afs_ResetUserConns,
|
|
* since it obtains the afs_xvcache lock. We could also keep
|
|
* the lock, and modify ResetUserConns to take parm saying we
|
|
* obtained the lock already, but that is overkill. By keeping
|
|
* the "tu" pointer held over the released lock, we guarantee
|
|
* that we won't lose our place, and that we'll pass over
|
|
* every user conn that existed when we began this call.
|
|
*/
|
|
afs_ResetUserConns(tu);
|
|
afs_PutUser(tu, WRITE_LOCK);
|
|
ObtainWriteLock(&afs_xuser, 228);
|
|
#ifdef UKERNEL
|
|
/* set the expire times to 0, causes
|
|
* afs_GCUserData to remove this entry
|
|
*/
|
|
tu->tokenTime = 0;
|
|
#endif /* UKERNEL */
|
|
}
|
|
}
|
|
ReleaseWriteLock(&afs_xuser);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_AFS_MARINER_HOST (32) - Get/set mariner (cache manager monitor) host
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain host address to be set
|
|
* \param[out] aout old host address
|
|
*
|
|
* \post
|
|
* depending on whether or not a variable is set, either get the host
|
|
* for the cache manager monitor, or set the old address and give it
|
|
* a new address
|
|
*
|
|
* \notes Errors turn off mariner
|
|
*/
|
|
DECL_PIOCTL(PMariner)
|
|
{
|
|
afs_int32 newHostAddr;
|
|
afs_int32 oldHostAddr;
|
|
|
|
AFS_STATCNT(PMariner);
|
|
if (afs_mariner)
|
|
memcpy((char *)&oldHostAddr, (char *)&afs_marinerHost,
|
|
sizeof(afs_int32));
|
|
else
|
|
oldHostAddr = 0xffffffff; /* disabled */
|
|
|
|
if (afs_pd_getInt(ain, &newHostAddr) != 0)
|
|
return EINVAL;
|
|
|
|
if (newHostAddr == 0xffffffff) {
|
|
/* disable mariner operations */
|
|
afs_mariner = 0;
|
|
} else if (newHostAddr) {
|
|
afs_mariner = 1;
|
|
afs_marinerHost = newHostAddr;
|
|
}
|
|
|
|
if (afs_pd_putInt(aout, oldHostAddr) != 0)
|
|
return E2BIG;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCCKSERV (10) - Check that servers are up
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain name of the cell
|
|
* \param[out] aout current down server list
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
* \retval ENOENT Error if we are unable to obtain the cell
|
|
*
|
|
* \post
|
|
* Either a fast check (where it doesn't contact servers) or a
|
|
* local check (checks local cell only)
|
|
*/
|
|
DECL_PIOCTL(PCheckServers)
|
|
{
|
|
int i;
|
|
struct server *ts;
|
|
afs_int32 temp;
|
|
char *cellName = NULL;
|
|
struct cell *cellp;
|
|
struct chservinfo *pcheck;
|
|
|
|
AFS_STATCNT(PCheckServers);
|
|
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
/* This is tricky, because we need to peak at the datastream to see
|
|
* what we're getting. For now, let's cheat. */
|
|
|
|
/* ain contains either an int32 or a string */
|
|
if (ain->remaining == 0)
|
|
return EINVAL;
|
|
|
|
if (*(afs_int32 *)ain->ptr == 0x12345678) { /* For afs3.3 version */
|
|
pcheck = afs_pd_inline(ain, sizeof(*pcheck));
|
|
if (pcheck == NULL)
|
|
return EINVAL;
|
|
|
|
if (pcheck->tinterval >= 0) {
|
|
if (afs_pd_putInt(aout, afs_probe_interval) != 0)
|
|
return E2BIG;
|
|
if (pcheck->tinterval > 0) {
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
afs_probe_interval = pcheck->tinterval;
|
|
}
|
|
return 0;
|
|
}
|
|
temp = pcheck->tflags;
|
|
if (pcheck->tsize)
|
|
cellName = pcheck->tbuffer;
|
|
} else { /* For pre afs3.3 versions */
|
|
if (afs_pd_getInt(ain, &temp) != 0)
|
|
return EINVAL;
|
|
if (afs_pd_remaining(ain) > 0) {
|
|
if (afs_pd_getStringPtr(ain, &cellName) != 0)
|
|
return EINVAL;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* 1: fast check, don't contact servers.
|
|
* 2: local cell only.
|
|
*/
|
|
if (cellName) {
|
|
/* have cell name, too */
|
|
cellp = afs_GetCellByName(cellName, READ_LOCK);
|
|
if (!cellp)
|
|
return ENOENT;
|
|
} else
|
|
cellp = NULL;
|
|
if (!cellp && (temp & 2)) {
|
|
/* use local cell */
|
|
cellp = afs_GetPrimaryCell(READ_LOCK);
|
|
}
|
|
if (!(temp & 1)) { /* if not fast, call server checker routine */
|
|
afs_CheckServers(1, cellp); /* check down servers */
|
|
afs_CheckServers(0, cellp); /* check up servers */
|
|
}
|
|
/* now return the current down server list */
|
|
ObtainReadLock(&afs_xserver);
|
|
for (i = 0; i < NSERVERS; i++) {
|
|
for (ts = afs_servers[i]; ts; ts = ts->next) {
|
|
if (cellp && ts->cell != cellp)
|
|
continue; /* cell spec'd and wrong */
|
|
if ((ts->flags & SRVR_ISDOWN)
|
|
&& ts->addr->sa_portal != ts->cell->vlport) {
|
|
afs_pd_putInt(aout, ts->addr->sa_ip);
|
|
}
|
|
}
|
|
}
|
|
ReleaseReadLock(&afs_xserver);
|
|
if (cellp)
|
|
afs_PutCell(cellp, READ_LOCK);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCCKBACK (11) - Check backup volume mappings
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
*
|
|
* \post
|
|
* Check the root volume, and then check the names if the volume
|
|
* check variable is set to force, has expired, is busy, or if
|
|
* the mount points variable is set
|
|
*/
|
|
DECL_PIOCTL(PCheckVolNames)
|
|
{
|
|
AFS_STATCNT(PCheckVolNames);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
afs_CheckRootVolume();
|
|
afs_CheckVolumeNames(AFS_VOLCHECK_FORCE | AFS_VOLCHECK_EXPIRED |
|
|
AFS_VOLCHECK_BUSY | AFS_VOLCHECK_MTPTS);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCCKCONN (12) - Check connections for a user
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EACCESS
|
|
* Error if no user is specififed, the user has no tokens set,
|
|
* or if the user's tokens are bad
|
|
*
|
|
* \post
|
|
* check to see if a user has the correct authentication.
|
|
* If so, allow access.
|
|
*
|
|
* \notes Check the connections to all the servers specified
|
|
*/
|
|
DECL_PIOCTL(PCheckAuth)
|
|
{
|
|
int i;
|
|
struct srvAddr *sa;
|
|
struct sa_conn_vector *tcv;
|
|
struct unixuser *tu;
|
|
afs_int32 retValue;
|
|
|
|
AFS_STATCNT(PCheckAuth);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
retValue = 0;
|
|
tu = afs_GetUser(areq->uid, 1, READ_LOCK); /* check local cell authentication */
|
|
if (!tu)
|
|
retValue = EACCES;
|
|
else {
|
|
/* we have a user */
|
|
ObtainReadLock(&afs_xsrvAddr);
|
|
ObtainReadLock(&afs_xconn);
|
|
|
|
/* any tokens set? */
|
|
if ((tu->states & UHasTokens) == 0)
|
|
retValue = EACCES;
|
|
/* all connections in cell 1 working? */
|
|
for (i = 0; i < NSERVERS; i++) {
|
|
for (sa = afs_srvAddrs[i]; sa; sa = sa->next_bkt) {
|
|
for (tcv = sa->conns; tcv; tcv = tcv->next) {
|
|
if (tcv->user == tu && (tu->states & UTokensBad))
|
|
retValue = EACCES;
|
|
}
|
|
}
|
|
}
|
|
ReleaseReadLock(&afs_xsrvAddr);
|
|
ReleaseReadLock(&afs_xconn);
|
|
afs_PutUser(tu, READ_LOCK);
|
|
}
|
|
if (afs_pd_putInt(aout, retValue) != 0)
|
|
return E2BIG;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
Prefetch(uparmtype apath, struct afs_ioctl *adata, int afollow,
|
|
afs_ucred_t *acred)
|
|
{
|
|
char *tp;
|
|
afs_int32 code;
|
|
#if defined(AFS_SGI61_ENV) || defined(AFS_SUN5_ENV) || defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
|
|
size_t bufferSize;
|
|
#else
|
|
u_int bufferSize;
|
|
#endif
|
|
|
|
AFS_STATCNT(Prefetch);
|
|
if (!apath)
|
|
return EINVAL;
|
|
tp = osi_AllocLargeSpace(1024);
|
|
AFS_COPYINSTR(apath, tp, 1024, &bufferSize, code);
|
|
if (code) {
|
|
osi_FreeLargeSpace(tp);
|
|
return code;
|
|
}
|
|
if (afs_BBusy()) { /* do this as late as possible */
|
|
osi_FreeLargeSpace(tp);
|
|
return EWOULDBLOCK; /* pretty close */
|
|
}
|
|
afs_BQueue(BOP_PATH, (struct vcache *)0, 0, 0, acred, (afs_size_t) 0,
|
|
(afs_size_t) 0, tp, (void *)0, (void *)0);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCWHEREIS (14) - Find out where a volume is located
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout volume location
|
|
*
|
|
* \retval EINVAL Error if some of the default arguments don't exist
|
|
* \retval ENODEV Error if there is no such volume
|
|
*
|
|
* \post fine a volume, based on a volume file id
|
|
*
|
|
* \notes check each of the servers specified
|
|
*/
|
|
DECL_PIOCTL(PFindVolume)
|
|
{
|
|
struct volume *tvp;
|
|
struct server *ts;
|
|
afs_int32 i;
|
|
int code = 0;
|
|
|
|
AFS_STATCNT(PFindVolume);
|
|
if (!avc)
|
|
return EINVAL;
|
|
tvp = afs_GetVolume(&avc->f.fid, areq, READ_LOCK);
|
|
if (!tvp)
|
|
return ENODEV;
|
|
|
|
for (i = 0; i < AFS_MAXHOSTS; i++) {
|
|
ts = tvp->serverHost[i];
|
|
if (!ts)
|
|
break;
|
|
if (afs_pd_putInt(aout, ts->addr->sa_ip) != 0) {
|
|
code = E2BIG;
|
|
goto out;
|
|
}
|
|
}
|
|
if (i < AFS_MAXHOSTS) {
|
|
/* still room for terminating NULL, add it on */
|
|
if (afs_pd_putInt(aout, 0) != 0) {
|
|
code = E2BIG;
|
|
goto out;
|
|
}
|
|
}
|
|
out:
|
|
afs_PutVolume(tvp, READ_LOCK);
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* VIOCACCESS (20) - Access using PRS_FS bits
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain PRS_FS bits
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EINVAL Error if some of the initial arguments aren't set
|
|
* \retval EACCES Error if access is denied
|
|
*
|
|
* \post check to make sure access is allowed
|
|
*/
|
|
DECL_PIOCTL(PViceAccess)
|
|
{
|
|
afs_int32 code;
|
|
afs_int32 temp;
|
|
|
|
AFS_STATCNT(PViceAccess);
|
|
if (!avc)
|
|
return EINVAL;
|
|
|
|
code = afs_VerifyVCache(avc, areq);
|
|
if (code)
|
|
return code;
|
|
|
|
if (afs_pd_getInt(ain, &temp) != 0)
|
|
return EINVAL;
|
|
|
|
code = afs_AccessOK(avc, temp, areq, CHECK_MODE_BITS);
|
|
if (code)
|
|
return 0;
|
|
else
|
|
return EACCES;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_GETPAG (13) - Get PAG value
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout PAG value or NOPAG
|
|
*
|
|
* \post get PAG value for the caller's cred
|
|
*/
|
|
DECL_PIOCTL(PGetPAG)
|
|
{
|
|
afs_int32 pag;
|
|
|
|
pag = PagInCred(*acred);
|
|
|
|
return afs_pd_putInt(aout, pag);
|
|
}
|
|
|
|
DECL_PIOCTL(PPrecache)
|
|
{
|
|
afs_int32 newValue;
|
|
|
|
/*AFS_STATCNT(PPrecache);*/
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
if (afs_pd_getInt(ain, &newValue) != 0)
|
|
return EINVAL;
|
|
|
|
afs_preCache = newValue*1024;
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCSETCACHESIZE (24) - Set venus cache size in 1000 units
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the size the venus cache should be set to
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
* \retval EROFS Error if the cache is set to be in memory
|
|
*
|
|
* \post
|
|
* Set the cache size based on user input. If no size is given,
|
|
* set it to the default OpenAFS cache size.
|
|
*
|
|
* \notes
|
|
* recompute the general cache parameters for every single block allocated
|
|
*/
|
|
DECL_PIOCTL(PSetCacheSize)
|
|
{
|
|
afs_int32 newValue;
|
|
int waitcnt = 0;
|
|
|
|
AFS_STATCNT(PSetCacheSize);
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
/* too many things are setup initially in mem cache version */
|
|
if (cacheDiskType == AFS_FCACHE_TYPE_MEM)
|
|
return EROFS;
|
|
if (afs_pd_getInt(ain, &newValue) != 0)
|
|
return EINVAL;
|
|
if (newValue == 0)
|
|
afs_cacheBlocks = afs_stats_cmperf.cacheBlocksOrig;
|
|
else {
|
|
if (newValue < afs_min_cache)
|
|
afs_cacheBlocks = afs_min_cache;
|
|
else
|
|
afs_cacheBlocks = newValue;
|
|
}
|
|
afs_stats_cmperf.cacheBlocksTotal = afs_cacheBlocks;
|
|
afs_ComputeCacheParms(); /* recompute basic cache parameters */
|
|
afs_MaybeWakeupTruncateDaemon();
|
|
while (waitcnt++ < 100 && afs_cacheBlocks < afs_blocksUsed) {
|
|
afs_osi_Wait(1000, 0, 0);
|
|
afs_MaybeWakeupTruncateDaemon();
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#define MAXGCSTATS 16
|
|
/*!
|
|
* VIOCGETCACHEPARMS (40) - Get cache stats
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain afs index flags
|
|
* \param[out] aout cache blocks, blocks used, blocks files (in an array)
|
|
*
|
|
* \post Get the cache blocks, and how many of the cache blocks there are
|
|
*/
|
|
DECL_PIOCTL(PGetCacheSize)
|
|
{
|
|
afs_int32 results[MAXGCSTATS];
|
|
afs_int32 flags;
|
|
struct dcache * tdc;
|
|
int i, size;
|
|
|
|
AFS_STATCNT(PGetCacheSize);
|
|
|
|
if (afs_pd_remaining(ain) == sizeof(afs_int32)) {
|
|
afs_pd_getInt(ain, &flags); /* can't error, we just checked size */
|
|
} else if (afs_pd_remaining(ain) == 0) {
|
|
flags = 0;
|
|
} else {
|
|
return EINVAL;
|
|
}
|
|
|
|
memset(results, 0, sizeof(results));
|
|
results[0] = afs_cacheBlocks;
|
|
results[1] = afs_blocksUsed;
|
|
results[2] = afs_cacheFiles;
|
|
|
|
if (1 == flags){
|
|
for (i = 0; i < afs_cacheFiles; i++) {
|
|
if (afs_indexFlags[i] & IFFree) results[3]++;
|
|
}
|
|
} else if (2 == flags){
|
|
for (i = 0; i < afs_cacheFiles; i++) {
|
|
if (afs_indexFlags[i] & IFFree) results[3]++;
|
|
if (afs_indexFlags[i] & IFEverUsed) results[4]++;
|
|
if (afs_indexFlags[i] & IFDataMod) results[5]++;
|
|
if (afs_indexFlags[i] & IFDirtyPages) results[6]++;
|
|
if (afs_indexFlags[i] & IFAnyPages) results[7]++;
|
|
if (afs_indexFlags[i] & IFDiscarded) results[8]++;
|
|
|
|
tdc = afs_indexTable[i];
|
|
if (tdc){
|
|
results[9]++;
|
|
size = tdc->validPos;
|
|
if ( 0 < size && size < (1<<12) ) results[10]++;
|
|
else if (size < (1<<14) ) results[11]++;
|
|
else if (size < (1<<16) ) results[12]++;
|
|
else if (size < (1<<18) ) results[13]++;
|
|
else if (size < (1<<20) ) results[14]++;
|
|
else if (size >= (1<<20) ) results[15]++;
|
|
}
|
|
}
|
|
}
|
|
return afs_pd_putBytes(aout, results, sizeof(results));
|
|
}
|
|
|
|
/*!
|
|
* VIOCFLUSHCB (25) - Flush callback only
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
* \retval 0 0 returned if the volume is set to read-only
|
|
*
|
|
* \post
|
|
* Flushes callbacks, by setting the length of callbacks to one,
|
|
* setting the next callback to be sent to the CB_DROPPED value,
|
|
* and then dequeues everything else.
|
|
*/
|
|
DECL_PIOCTL(PRemoveCallBack)
|
|
{
|
|
struct afs_conn *tc;
|
|
afs_int32 code = 0;
|
|
struct AFSCallBack CallBacks_Array[1];
|
|
struct AFSCBFids theFids;
|
|
struct AFSCBs theCBs;
|
|
struct rx_connection *rxconn;
|
|
XSTATS_DECLS;
|
|
|
|
AFS_STATCNT(PRemoveCallBack);
|
|
if (!avc)
|
|
return EINVAL;
|
|
if (avc->f.states & CRO)
|
|
return 0; /* read-only-ness can't change */
|
|
ObtainWriteLock(&avc->lock, 229);
|
|
theFids.AFSCBFids_len = 1;
|
|
theCBs.AFSCBs_len = 1;
|
|
theFids.AFSCBFids_val = (struct AFSFid *)&avc->f.fid.Fid;
|
|
theCBs.AFSCBs_val = CallBacks_Array;
|
|
CallBacks_Array[0].CallBackType = CB_DROPPED;
|
|
if (avc->callback) {
|
|
do {
|
|
tc = afs_Conn(&avc->f.fid, areq, SHARED_LOCK, &rxconn);
|
|
if (tc) {
|
|
XSTATS_START_TIME(AFS_STATS_FS_RPCIDX_GIVEUPCALLBACKS);
|
|
RX_AFS_GUNLOCK();
|
|
code = RXAFS_GiveUpCallBacks(rxconn, &theFids, &theCBs);
|
|
RX_AFS_GLOCK();
|
|
XSTATS_END_TIME;
|
|
}
|
|
/* don't set code on failure since we wouldn't use it */
|
|
} while (afs_Analyze
|
|
(tc, rxconn, code, &avc->f.fid, areq,
|
|
AFS_STATS_FS_RPCIDX_GIVEUPCALLBACKS, SHARED_LOCK, NULL));
|
|
|
|
ObtainWriteLock(&afs_xcbhash, 457);
|
|
afs_DequeueCallback(avc);
|
|
avc->callback = 0;
|
|
avc->f.states &= ~(CStatd | CUnique);
|
|
ReleaseWriteLock(&afs_xcbhash);
|
|
if (avc->f.fid.Fid.Vnode & 1 || (vType(avc) == VDIR))
|
|
osi_dnlc_purgedp(avc);
|
|
}
|
|
ReleaseWriteLock(&avc->lock);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOCNEWCELL (26) - Configure new cell
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain
|
|
* the name of the cell, the hosts that will be a part of the cell,
|
|
* whether or not it's linked with another cell, the other cell it's
|
|
* linked with, the file server port, and the volume server port
|
|
* \param[out] aout
|
|
* not in use
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval EACCES Error if the user doesn't have super-user cedentials
|
|
* \retval EINVAL Error if some 'magic' var doesn't have a certain bit set
|
|
*
|
|
* \post creates a new cell
|
|
*/
|
|
DECL_PIOCTL(PNewCell)
|
|
{
|
|
afs_int32 cellHosts[AFS_MAXCELLHOSTS], magic = 0;
|
|
char *newcell = NULL;
|
|
char *linkedcell = NULL;
|
|
afs_int32 code, ls;
|
|
afs_int32 linkedstate = 0;
|
|
afs_int32 fsport = 0, vlport = 0;
|
|
int skip;
|
|
|
|
AFS_STATCNT(PNewCell);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
if (afs_pd_getInt(ain, &magic) != 0)
|
|
return EINVAL;
|
|
if (magic != 0x12345678)
|
|
return EINVAL;
|
|
|
|
/* A 3.4 fs newcell command will pass an array of AFS_MAXCELLHOSTS
|
|
* server addresses while the 3.5 fs newcell command passes
|
|
* AFS_MAXHOSTS. To figure out which is which, check if the cellname
|
|
* is good.
|
|
*
|
|
* This whole logic is bogus, because it relies on the newer command
|
|
* sending its 12th address as 0.
|
|
*/
|
|
if ((afs_pd_remaining(ain) < AFS_MAXCELLHOSTS +3) * sizeof(afs_int32))
|
|
return EINVAL;
|
|
|
|
newcell = afs_pd_where(ain) + (AFS_MAXCELLHOSTS + 3) * sizeof(afs_int32);
|
|
if (newcell[0] != '\0') {
|
|
skip = 0;
|
|
} else {
|
|
skip = AFS_MAXHOSTS - AFS_MAXCELLHOSTS;
|
|
}
|
|
|
|
/* AFS_MAXCELLHOSTS (=8) is less than AFS_MAXHOSTS (=13) */
|
|
if (afs_pd_getBytes(ain, &cellHosts,
|
|
AFS_MAXCELLHOSTS * sizeof(afs_int32)) != 0)
|
|
return EINVAL;
|
|
if (afs_pd_skip(ain, skip * sizeof(afs_int32)) !=0)
|
|
return EINVAL;
|
|
|
|
if (afs_pd_getInt(ain, &fsport) != 0)
|
|
return EINVAL;
|
|
if (fsport < 1024)
|
|
fsport = 0; /* Privileged ports not allowed */
|
|
|
|
if (afs_pd_getInt(ain, &vlport) != 0)
|
|
return EINVAL;
|
|
if (vlport < 1024)
|
|
vlport = 0; /* Privileged ports not allowed */
|
|
|
|
if (afs_pd_getInt(ain, &ls) != 0)
|
|
return EINVAL;
|
|
|
|
if (afs_pd_getStringPtr(ain, &newcell) != 0)
|
|
return EINVAL;
|
|
|
|
if (ls & 1) {
|
|
if (afs_pd_getStringPtr(ain, &linkedcell) != 0)
|
|
return EINVAL;
|
|
linkedstate |= CLinkedCell;
|
|
}
|
|
|
|
linkedstate |= CNoSUID; /* setuid is disabled by default for fs newcell */
|
|
code =
|
|
afs_NewCell(newcell, cellHosts, linkedstate, linkedcell, fsport,
|
|
vlport, (int)0);
|
|
return code;
|
|
}
|
|
|
|
DECL_PIOCTL(PNewAlias)
|
|
{
|
|
/* create a new cell alias */
|
|
char *realName, *aliasName;
|
|
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
if (afs_pd_getStringPtr(ain, &aliasName) != 0)
|
|
return EINVAL;
|
|
if (afs_pd_getStringPtr(ain, &realName) != 0)
|
|
return EINVAL;
|
|
|
|
return afs_NewCellAlias(aliasName, realName);
|
|
}
|
|
|
|
/*!
|
|
* VIOCGETCELL (27) - Get cell info
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain The cell index of a specific cell
|
|
* \param[out] aout list of servers in the cell
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval EDOM Error if there is no cell asked about
|
|
*
|
|
* \post Lists the cell's server names and and addresses
|
|
*/
|
|
DECL_PIOCTL(PListCells)
|
|
{
|
|
afs_int32 whichCell;
|
|
struct cell *tcell = 0;
|
|
afs_int32 i;
|
|
int code;
|
|
|
|
AFS_STATCNT(PListCells);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (afs_pd_getInt(ain, &whichCell) != 0)
|
|
return EINVAL;
|
|
|
|
tcell = afs_GetCellByIndex(whichCell, READ_LOCK);
|
|
if (!tcell)
|
|
return EDOM;
|
|
|
|
code = E2BIG;
|
|
|
|
for (i = 0; i < AFS_MAXCELLHOSTS; i++) {
|
|
if (tcell->cellHosts[i] == 0)
|
|
break;
|
|
if (afs_pd_putInt(aout, tcell->cellHosts[i]->addr->sa_ip) != 0)
|
|
goto out;
|
|
}
|
|
for (;i < AFS_MAXCELLHOSTS; i++) {
|
|
if (afs_pd_putInt(aout, 0) != 0)
|
|
goto out;
|
|
}
|
|
if (afs_pd_putString(aout, tcell->cellName) != 0)
|
|
goto out;
|
|
code = 0;
|
|
|
|
out:
|
|
afs_PutCell(tcell, READ_LOCK);
|
|
return code;
|
|
}
|
|
|
|
DECL_PIOCTL(PListAliases)
|
|
{
|
|
afs_int32 whichAlias;
|
|
struct cell_alias *tcalias = 0;
|
|
int code;
|
|
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (afs_pd_getInt(ain, &whichAlias) != 0)
|
|
return EINVAL;
|
|
|
|
tcalias = afs_GetCellAlias(whichAlias);
|
|
if (tcalias == NULL)
|
|
return EDOM;
|
|
|
|
code = E2BIG;
|
|
if (afs_pd_putString(aout, tcalias->alias) != 0)
|
|
goto out;
|
|
if (afs_pd_putString(aout, tcalias->cell) != 0)
|
|
goto out;
|
|
|
|
code = 0;
|
|
out:
|
|
afs_PutCellAlias(tcalias);
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_AFS_DELETE_MT_PT (28) - Delete mount point
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the name of the file in this dir to remove
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EINVAL
|
|
* Error if some of the standard args aren't set
|
|
* \retval ENOTDIR
|
|
* Error if the argument to remove is not a directory
|
|
* \retval ENOENT
|
|
* Error if there is no cache to remove the mount point from or
|
|
* if a vcache doesn't exist
|
|
*
|
|
* \post
|
|
* Ensure that everything is OK before deleting the mountpoint.
|
|
* If not, don't delete. Delete a mount point based on a file id.
|
|
*/
|
|
DECL_PIOCTL(PRemoveMount)
|
|
{
|
|
afs_int32 code;
|
|
char *bufp;
|
|
char *name;
|
|
struct sysname_info sysState;
|
|
afs_size_t offset, len;
|
|
struct afs_conn *tc;
|
|
struct dcache *tdc;
|
|
struct vcache *tvc;
|
|
struct AFSFetchStatus OutDirStatus;
|
|
struct VenusFid tfid;
|
|
struct AFSVolSync tsync;
|
|
struct rx_connection *rxconn;
|
|
XSTATS_DECLS;
|
|
|
|
/* "ain" is the name of the file in this dir to remove */
|
|
|
|
AFS_STATCNT(PRemoveMount);
|
|
if (!avc)
|
|
return EINVAL;
|
|
if (afs_pd_getStringPtr(ain, &name) != 0)
|
|
return EINVAL;
|
|
|
|
code = afs_VerifyVCache(avc, areq);
|
|
if (code)
|
|
return code;
|
|
if (vType(avc) != VDIR)
|
|
return ENOTDIR;
|
|
|
|
tdc = afs_GetDCache(avc, (afs_size_t) 0, areq, &offset, &len, 1); /* test for error below */
|
|
if (!tdc)
|
|
return ENOENT;
|
|
Check_AtSys(avc, name, &sysState, areq);
|
|
ObtainReadLock(&tdc->lock);
|
|
do {
|
|
code = afs_dir_Lookup(tdc, sysState.name, &tfid.Fid);
|
|
} while (code == ENOENT && Next_AtSys(avc, areq, &sysState));
|
|
ReleaseReadLock(&tdc->lock);
|
|
bufp = sysState.name;
|
|
if (code) {
|
|
afs_PutDCache(tdc);
|
|
goto out;
|
|
}
|
|
tfid.Cell = avc->f.fid.Cell;
|
|
tfid.Fid.Volume = avc->f.fid.Fid.Volume;
|
|
if (!tfid.Fid.Unique && (avc->f.states & CForeign)) {
|
|
tvc = afs_LookupVCache(&tfid, areq, NULL, avc, bufp);
|
|
} else {
|
|
tvc = afs_GetVCache(&tfid, areq, NULL, NULL);
|
|
}
|
|
if (!tvc) {
|
|
code = ENOENT;
|
|
afs_PutDCache(tdc);
|
|
goto out;
|
|
}
|
|
if (tvc->mvstat != 1) {
|
|
afs_PutDCache(tdc);
|
|
afs_PutVCache(tvc);
|
|
code = EINVAL;
|
|
goto out;
|
|
}
|
|
ObtainWriteLock(&tvc->lock, 230);
|
|
code = afs_HandleLink(tvc, areq);
|
|
if (!code) {
|
|
if (tvc->linkData) {
|
|
if ((tvc->linkData[0] != '#') && (tvc->linkData[0] != '%'))
|
|
code = EINVAL;
|
|
} else
|
|
code = EIO;
|
|
}
|
|
ReleaseWriteLock(&tvc->lock);
|
|
osi_dnlc_purgedp(tvc);
|
|
afs_PutVCache(tvc);
|
|
if (code) {
|
|
afs_PutDCache(tdc);
|
|
goto out;
|
|
}
|
|
ObtainWriteLock(&avc->lock, 231);
|
|
osi_dnlc_remove(avc, bufp, tvc);
|
|
do {
|
|
tc = afs_Conn(&avc->f.fid, areq, SHARED_LOCK, &rxconn);
|
|
if (tc) {
|
|
XSTATS_START_TIME(AFS_STATS_FS_RPCIDX_REMOVEFILE);
|
|
RX_AFS_GUNLOCK();
|
|
code =
|
|
RXAFS_RemoveFile(rxconn, (struct AFSFid *)&avc->f.fid.Fid, bufp,
|
|
&OutDirStatus, &tsync);
|
|
RX_AFS_GLOCK();
|
|
XSTATS_END_TIME;
|
|
} else
|
|
code = -1;
|
|
} while (afs_Analyze
|
|
(tc, rxconn, code, &avc->f.fid, areq, AFS_STATS_FS_RPCIDX_REMOVEFILE,
|
|
SHARED_LOCK, NULL));
|
|
|
|
if (code) {
|
|
if (tdc)
|
|
afs_PutDCache(tdc);
|
|
ReleaseWriteLock(&avc->lock);
|
|
goto out;
|
|
}
|
|
if (tdc) {
|
|
/* we have the thing in the cache */
|
|
ObtainWriteLock(&tdc->lock, 661);
|
|
if (afs_LocalHero(avc, tdc, &OutDirStatus, 1)) {
|
|
/* we can do it locally */
|
|
code = afs_dir_Delete(tdc, bufp);
|
|
if (code) {
|
|
ZapDCE(tdc); /* surprise error -- invalid value */
|
|
DZap(tdc);
|
|
}
|
|
}
|
|
ReleaseWriteLock(&tdc->lock);
|
|
afs_PutDCache(tdc); /* drop ref count */
|
|
}
|
|
avc->f.states &= ~CUnique; /* For the dfs xlator */
|
|
ReleaseWriteLock(&avc->lock);
|
|
code = 0;
|
|
out:
|
|
if (sysState.allocked)
|
|
osi_FreeLargeSpace(bufp);
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_GETCELLSTATUS (35) - Get cell status info
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain The cell you want status information on
|
|
* \param[out] aout cell state (as a struct)
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval ENOENT Error if the cell doesn't exist
|
|
*
|
|
* \post Returns the state of the cell as defined in a struct cell
|
|
*/
|
|
DECL_PIOCTL(PGetCellStatus)
|
|
{
|
|
struct cell *tcell;
|
|
char *cellName;
|
|
afs_int32 temp;
|
|
|
|
AFS_STATCNT(PGetCellStatus);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (afs_pd_getStringPtr(ain, &cellName) != 0)
|
|
return EINVAL;
|
|
|
|
tcell = afs_GetCellByName(cellName, READ_LOCK);
|
|
if (!tcell)
|
|
return ENOENT;
|
|
temp = tcell->states;
|
|
afs_PutCell(tcell, READ_LOCK);
|
|
|
|
return afs_pd_putInt(aout, temp);
|
|
}
|
|
|
|
/*!
|
|
* VIOC_SETCELLSTATUS (36) - Set corresponding info
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain
|
|
* The cell you want to set information about, and the values you
|
|
* want to set
|
|
* \param[out] aout
|
|
* not in use
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
*
|
|
* \post
|
|
* Set the state of the cell in a defined struct cell, based on
|
|
* whether or not SetUID is allowed
|
|
*/
|
|
DECL_PIOCTL(PSetCellStatus)
|
|
{
|
|
struct cell *tcell;
|
|
char *cellName;
|
|
afs_int32 flags0, flags1;
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (afs_pd_getInt(ain, &flags0) != 0)
|
|
return EINVAL;
|
|
if (afs_pd_getInt(ain, &flags1) != 0)
|
|
return EINVAL;
|
|
if (afs_pd_getStringPtr(ain, &cellName) != 0)
|
|
return EINVAL;
|
|
|
|
tcell = afs_GetCellByName(cellName, WRITE_LOCK);
|
|
if (!tcell)
|
|
return ENOENT;
|
|
if (flags0 & CNoSUID)
|
|
tcell->states |= CNoSUID;
|
|
else
|
|
tcell->states &= ~CNoSUID;
|
|
afs_PutCell(tcell, WRITE_LOCK);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_FLUSHVOLUME (37) - Flush whole volume's data
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use (args in avc)
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
*
|
|
* \post
|
|
* Flush all cached contents of a volume. Exactly what stays and what
|
|
* goes depends on the platform.
|
|
*
|
|
* \notes
|
|
* Does not flush a file that a user has open and is using, because
|
|
* it will be re-created on next write. Also purges the dnlc,
|
|
* because things are screwed up.
|
|
*/
|
|
DECL_PIOCTL(PFlushVolumeData)
|
|
{
|
|
afs_int32 i;
|
|
struct dcache *tdc;
|
|
struct vcache *tvc;
|
|
struct volume *tv;
|
|
afs_int32 cell, volume;
|
|
struct afs_q *tq, *uq;
|
|
#ifdef AFS_DARWIN80_ENV
|
|
vnode_t vp;
|
|
#endif
|
|
|
|
AFS_STATCNT(PFlushVolumeData);
|
|
if (!avc)
|
|
return EINVAL;
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
volume = avc->f.fid.Fid.Volume; /* who to zap */
|
|
cell = avc->f.fid.Cell;
|
|
|
|
/*
|
|
* Clear stat'd flag from all vnodes from this volume; this will
|
|
* invalidate all the vcaches associated with the volume.
|
|
*/
|
|
loop:
|
|
ObtainReadLock(&afs_xvcache);
|
|
i = VCHashV(&avc->f.fid);
|
|
for (tq = afs_vhashTV[i].prev; tq != &afs_vhashTV[i]; tq = uq) {
|
|
uq = QPrev(tq);
|
|
tvc = QTOVH(tq);
|
|
if (tvc->f.fid.Fid.Volume == volume && tvc->f.fid.Cell == cell) {
|
|
if (tvc->f.states & CVInit) {
|
|
ReleaseReadLock(&afs_xvcache);
|
|
afs_osi_Sleep(&tvc->f.states);
|
|
goto loop;
|
|
}
|
|
#ifdef AFS_DARWIN80_ENV
|
|
if (tvc->f.states & CDeadVnode) {
|
|
ReleaseReadLock(&afs_xvcache);
|
|
afs_osi_Sleep(&tvc->f.states);
|
|
goto loop;
|
|
}
|
|
vp = AFSTOV(tvc);
|
|
if (vnode_get(vp))
|
|
continue;
|
|
if (vnode_ref(vp)) {
|
|
AFS_GUNLOCK();
|
|
vnode_put(vp);
|
|
AFS_GLOCK();
|
|
continue;
|
|
}
|
|
#else
|
|
AFS_FAST_HOLD(tvc);
|
|
#endif
|
|
ReleaseReadLock(&afs_xvcache);
|
|
#ifdef AFS_BOZONLOCK_ENV
|
|
afs_BozonLock(&tvc->pvnLock, tvc); /* Since afs_TryToSmush will do a pvn_vptrunc */
|
|
#endif
|
|
ObtainWriteLock(&tvc->lock, 232);
|
|
|
|
ObtainWriteLock(&afs_xcbhash, 458);
|
|
afs_DequeueCallback(tvc);
|
|
tvc->f.states &= ~(CStatd | CDirty);
|
|
ReleaseWriteLock(&afs_xcbhash);
|
|
if (tvc->f.fid.Fid.Vnode & 1 || (vType(tvc) == VDIR))
|
|
osi_dnlc_purgedp(tvc);
|
|
afs_TryToSmush(tvc, *acred, 1);
|
|
ReleaseWriteLock(&tvc->lock);
|
|
#ifdef AFS_BOZONLOCK_ENV
|
|
afs_BozonUnlock(&tvc->pvnLock, tvc);
|
|
#endif
|
|
#ifdef AFS_DARWIN80_ENV
|
|
vnode_put(AFSTOV(tvc));
|
|
#endif
|
|
ObtainReadLock(&afs_xvcache);
|
|
uq = QPrev(tq);
|
|
/* our tvc ptr is still good until now */
|
|
AFS_FAST_RELE(tvc);
|
|
}
|
|
}
|
|
ReleaseReadLock(&afs_xvcache);
|
|
|
|
|
|
ObtainWriteLock(&afs_xdcache, 328); /* needed to flush any stuff */
|
|
for (i = 0; i < afs_cacheFiles; i++) {
|
|
if (!(afs_indexFlags[i] & IFEverUsed))
|
|
continue; /* never had any data */
|
|
tdc = afs_GetDSlot(i, NULL);
|
|
if (tdc->refCount <= 1) { /* too high, in use by running sys call */
|
|
ReleaseReadLock(&tdc->tlock);
|
|
if (tdc->f.fid.Fid.Volume == volume && tdc->f.fid.Cell == cell) {
|
|
if (!(afs_indexFlags[i] & IFDataMod)) {
|
|
/* if the file is modified, but has a ref cnt of only 1,
|
|
* then someone probably has the file open and is writing
|
|
* into it. Better to skip flushing such a file, it will be
|
|
* brought back immediately on the next write anyway.
|
|
*
|
|
* If we *must* flush, then this code has to be rearranged
|
|
* to call afs_storeAllSegments() first */
|
|
afs_FlushDCache(tdc);
|
|
}
|
|
}
|
|
} else {
|
|
ReleaseReadLock(&tdc->tlock);
|
|
}
|
|
afs_PutDCache(tdc); /* bumped by getdslot */
|
|
}
|
|
ReleaseWriteLock(&afs_xdcache);
|
|
|
|
ObtainReadLock(&afs_xvolume);
|
|
for (i = 0; i < NVOLS; i++) {
|
|
for (tv = afs_volumes[i]; tv; tv = tv->next) {
|
|
if (tv->volume == volume) {
|
|
afs_ResetVolumeInfo(tv);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
ReleaseReadLock(&afs_xvolume);
|
|
|
|
/* probably, a user is doing this, probably, because things are screwed up.
|
|
* maybe it's the dnlc's fault? */
|
|
osi_dnlc_purge();
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*!
|
|
* VIOCGETVCXSTATUS (41) - gets vnode x status
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain
|
|
* not in use (avc used)
|
|
* \param[out] aout
|
|
* vcxstat: the file id, the data version, any lock, the parent vnode,
|
|
* the parent unique id, the trunc position, the callback, cbExpires,
|
|
* what access is being made, what files are open,
|
|
* any users executing/writing, the flock count, the states,
|
|
* the move stat
|
|
*
|
|
* \retval EINVAL
|
|
* Error if some of the initial default arguments aren't set
|
|
* \retval EACCES
|
|
* Error if access to check the mode bits is denied
|
|
*
|
|
* \post
|
|
* gets stats for the vnode, a struct listed in vcxstat
|
|
*/
|
|
DECL_PIOCTL(PGetVnodeXStatus)
|
|
{
|
|
afs_int32 code;
|
|
struct vcxstat stat;
|
|
afs_int32 mode, i;
|
|
|
|
/* AFS_STATCNT(PGetVnodeXStatus); */
|
|
if (!avc)
|
|
return EINVAL;
|
|
code = afs_VerifyVCache(avc, areq);
|
|
if (code)
|
|
return code;
|
|
if (vType(avc) == VDIR)
|
|
mode = PRSFS_LOOKUP;
|
|
else
|
|
mode = PRSFS_READ;
|
|
if (!afs_AccessOK(avc, mode, areq, CHECK_MODE_BITS))
|
|
return EACCES;
|
|
|
|
memset(&stat, 0, sizeof(struct vcxstat));
|
|
stat.fid = avc->f.fid;
|
|
hset32(stat.DataVersion, hgetlo(avc->f.m.DataVersion));
|
|
stat.lock = avc->lock;
|
|
stat.parentVnode = avc->f.parent.vnode;
|
|
stat.parentUnique = avc->f.parent.unique;
|
|
hset(stat.flushDV, avc->flushDV);
|
|
hset(stat.mapDV, avc->mapDV);
|
|
stat.truncPos = avc->f.truncPos;
|
|
{ /* just grab the first two - won't break anything... */
|
|
struct axscache *ac;
|
|
|
|
for (i = 0, ac = avc->Access; ac && i < CPSIZE; i++, ac = ac->next) {
|
|
stat.randomUid[i] = ac->uid;
|
|
stat.randomAccess[i] = ac->axess;
|
|
}
|
|
}
|
|
stat.callback = afs_data_pointer_to_int32(avc->callback);
|
|
stat.cbExpires = avc->cbExpires;
|
|
stat.anyAccess = avc->f.anyAccess;
|
|
stat.opens = avc->opens;
|
|
stat.execsOrWriters = avc->execsOrWriters;
|
|
stat.flockCount = avc->flockCount;
|
|
stat.mvstat = avc->mvstat;
|
|
stat.states = avc->f.states;
|
|
return afs_pd_putBytes(aout, &stat, sizeof(struct vcxstat));
|
|
}
|
|
|
|
|
|
DECL_PIOCTL(PGetVnodeXStatus2)
|
|
{
|
|
afs_int32 code;
|
|
struct vcxstat2 stat;
|
|
afs_int32 mode;
|
|
|
|
if (!avc)
|
|
return EINVAL;
|
|
code = afs_VerifyVCache(avc, areq);
|
|
if (code)
|
|
return code;
|
|
if (vType(avc) == VDIR)
|
|
mode = PRSFS_LOOKUP;
|
|
else
|
|
mode = PRSFS_READ;
|
|
if (!afs_AccessOK(avc, mode, areq, CHECK_MODE_BITS))
|
|
return EACCES;
|
|
|
|
memset(&stat, 0, sizeof(struct vcxstat2));
|
|
|
|
stat.cbExpires = avc->cbExpires;
|
|
stat.anyAccess = avc->f.anyAccess;
|
|
stat.mvstat = avc->mvstat;
|
|
stat.callerAccess = afs_GetAccessBits(avc, ~0, areq);
|
|
|
|
return afs_pd_putBytes(aout, &stat, sizeof(struct vcxstat2));
|
|
}
|
|
|
|
|
|
/*!
|
|
* VIOC_AFS_SYSNAME (38) - Change @sys value
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain new value for @sys
|
|
* \param[out] aout count, entry, list (debug values?)
|
|
*
|
|
* \retval EINVAL
|
|
* Error if afsd isn't running, the new sysname is too large,
|
|
* the new sysname causes issues (starts with a . or ..),
|
|
* there is no PAG set in the credentials, or the user of a PAG
|
|
* can't be found
|
|
* \retval EACCES
|
|
* Error if the user doesn't have super-user credentials
|
|
*
|
|
* \post
|
|
* Set the value of @sys if these things work: if the input isn't
|
|
* too long or if input doesn't start with . or ..
|
|
*
|
|
* \notes
|
|
* We require root for local sysname changes, but not for remote
|
|
* (since we don't really believe remote uids anyway)
|
|
* outname[] shouldn't really be needed- this is left as an
|
|
* exercise for the reader.
|
|
*/
|
|
DECL_PIOCTL(PSetSysName)
|
|
{
|
|
char *inname = NULL;
|
|
char outname[MAXSYSNAME];
|
|
afs_int32 setsysname;
|
|
int foundname = 0;
|
|
struct afs_exporter *exporter;
|
|
struct unixuser *au;
|
|
afs_int32 pag, error;
|
|
int t, count, num = 0, allpags = 0;
|
|
char **sysnamelist;
|
|
struct afs_pdata validate;
|
|
|
|
AFS_STATCNT(PSetSysName);
|
|
if (!afs_globalVFS) {
|
|
/* Afsd is NOT running; disable it */
|
|
#if defined(KERNEL_HAVE_UERROR)
|
|
return (setuerror(EINVAL), EINVAL);
|
|
#else
|
|
return (EINVAL);
|
|
#endif
|
|
}
|
|
if (afs_pd_getInt(ain, &setsysname) != 0)
|
|
return EINVAL;
|
|
if (setsysname & 0x8000) {
|
|
allpags = 1;
|
|
setsysname &= ~0x8000;
|
|
}
|
|
if (setsysname) {
|
|
|
|
/* Check my args */
|
|
if (setsysname < 0 || setsysname > MAXNUMSYSNAMES)
|
|
return EINVAL;
|
|
validate = *ain;
|
|
for (count = 0; count < setsysname; count++) {
|
|
if (afs_pd_getStringPtr(&validate, &inname) != 0)
|
|
return EINVAL;
|
|
t = strlen(inname);
|
|
if (t >= MAXSYSNAME || t <= 0)
|
|
return EINVAL;
|
|
/* check for names that can shoot us in the foot */
|
|
if (inname[0] == '.' && (inname[1] == 0
|
|
|| (inname[1] == '.' && inname[2] == 0)))
|
|
return EINVAL;
|
|
}
|
|
/* args ok, so go back to the beginning of that section */
|
|
|
|
if (afs_pd_getStringPtr(ain, &inname) != 0)
|
|
return EINVAL;
|
|
num = count;
|
|
}
|
|
if (afs_cr_gid(*acred) == RMTUSER_REQ ||
|
|
afs_cr_gid(*acred) == RMTUSER_REQ_PRIV) { /* Handles all exporters */
|
|
if (allpags && afs_cr_gid(*acred) != RMTUSER_REQ_PRIV) {
|
|
return EPERM;
|
|
}
|
|
pag = PagInCred(*acred);
|
|
if (pag == NOPAG) {
|
|
return EINVAL; /* Better than panicing */
|
|
}
|
|
if (!(au = afs_FindUser(pag, -1, READ_LOCK))) {
|
|
return EINVAL; /* Better than panicing */
|
|
}
|
|
if (!(exporter = au->exporter)) {
|
|
afs_PutUser(au, READ_LOCK);
|
|
return EINVAL; /* Better than panicing */
|
|
}
|
|
error = EXP_SYSNAME(exporter, inname, &sysnamelist,
|
|
&num, allpags);
|
|
if (error) {
|
|
if (error == ENODEV)
|
|
foundname = 0; /* sysname not set yet! */
|
|
else {
|
|
afs_PutUser(au, READ_LOCK);
|
|
return error;
|
|
}
|
|
} else {
|
|
foundname = num;
|
|
strcpy(outname, sysnamelist[0]);
|
|
}
|
|
afs_PutUser(au, READ_LOCK);
|
|
if (setsysname)
|
|
afs_sysnamegen++;
|
|
} else {
|
|
/* Not xlating, so local case */
|
|
if (!afs_sysname)
|
|
osi_Panic("PSetSysName: !afs_sysname\n");
|
|
if (!setsysname) { /* user just wants the info */
|
|
strcpy(outname, afs_sysname);
|
|
foundname = afs_sysnamecount;
|
|
sysnamelist = afs_sysnamelist;
|
|
} else { /* Local guy; only root can change sysname */
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
/* allpags makes no sense for local use */
|
|
if (allpags)
|
|
return EINVAL;
|
|
|
|
/* clear @sys entries from the dnlc, once afs_lookup can
|
|
* do lookups of @sys entries and thinks it can trust them */
|
|
/* privs ok, store the entry, ... */
|
|
|
|
if (strlen(inname) >= MAXSYSNAME-1)
|
|
return EINVAL;
|
|
strcpy(afs_sysname, inname);
|
|
|
|
if (setsysname > 1) { /* ... or list */
|
|
for (count = 1; count < setsysname; ++count) {
|
|
if (!afs_sysnamelist[count])
|
|
osi_Panic
|
|
("PSetSysName: no afs_sysnamelist entry to write\n");
|
|
if (afs_pd_getString(ain, afs_sysnamelist[count],
|
|
MAXSYSNAME) != 0)
|
|
return EINVAL;
|
|
}
|
|
}
|
|
afs_sysnamecount = setsysname;
|
|
afs_sysnamegen++;
|
|
}
|
|
}
|
|
if (!setsysname) {
|
|
if (afs_pd_putInt(aout, foundname) != 0)
|
|
return E2BIG;
|
|
if (foundname) {
|
|
if (afs_pd_putString(aout, outname) != 0)
|
|
return E2BIG;
|
|
for (count = 1; count < foundname; ++count) { /* ... or list. */
|
|
if (!sysnamelist[count])
|
|
osi_Panic
|
|
("PSetSysName: no afs_sysnamelist entry to read\n");
|
|
t = strlen(sysnamelist[count]);
|
|
if (t >= MAXSYSNAME)
|
|
osi_Panic("PSetSysName: sysname entry garbled\n");
|
|
if (afs_pd_putString(aout, sysnamelist[count]) != 0)
|
|
return E2BIG;
|
|
}
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/* sequential search through the list of touched cells is not a good
|
|
* long-term solution here. For small n, though, it should be just
|
|
* fine. Should consider special-casing the local cell for large n.
|
|
* Likewise for PSetSPrefs.
|
|
*
|
|
* s - number of ids in array l[] -- NOT index of last id
|
|
* l - array of cell ids which have volumes that need to be sorted
|
|
* vlonly - sort vl servers or file servers?
|
|
*/
|
|
static void *
|
|
ReSortCells_cb(struct cell *cell, void *arg)
|
|
{
|
|
afs_int32 *p = (afs_int32 *) arg;
|
|
afs_int32 *l = p + 1;
|
|
int i, s = p[0];
|
|
|
|
for (i = 0; i < s; i++) {
|
|
if (l[i] == cell->cellNum) {
|
|
ObtainWriteLock(&cell->lock, 690);
|
|
afs_SortServers(cell->cellHosts, AFS_MAXCELLHOSTS);
|
|
ReleaseWriteLock(&cell->lock);
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void
|
|
ReSortCells(int s, afs_int32 * l, int vlonly)
|
|
{
|
|
int i;
|
|
struct volume *j;
|
|
int k;
|
|
|
|
if (vlonly) {
|
|
afs_int32 *p;
|
|
p = afs_osi_Alloc(sizeof(afs_int32) * (s + 1));
|
|
osi_Assert(p != NULL);
|
|
p[0] = s;
|
|
memcpy(p + 1, l, s * sizeof(afs_int32));
|
|
afs_TraverseCells(&ReSortCells_cb, p);
|
|
afs_osi_Free(p, sizeof(afs_int32) * (s + 1));
|
|
return;
|
|
}
|
|
|
|
ObtainReadLock(&afs_xvolume);
|
|
for (i = 0; i < NVOLS; i++) {
|
|
for (j = afs_volumes[i]; j; j = j->next) {
|
|
for (k = 0; k < s; k++)
|
|
if (j->cell == l[k]) {
|
|
ObtainWriteLock(&j->lock, 233);
|
|
afs_SortServers(j->serverHost, AFS_MAXHOSTS);
|
|
ReleaseWriteLock(&j->lock);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
ReleaseReadLock(&afs_xvolume);
|
|
}
|
|
|
|
|
|
static int debugsetsp = 0;
|
|
static int
|
|
afs_setsprefs(struct spref *sp, unsigned int num, unsigned int vlonly)
|
|
{
|
|
struct srvAddr *sa;
|
|
int i, j, k, matches, touchedSize;
|
|
struct server *srvr = NULL;
|
|
afs_int32 touched[34];
|
|
int isfs;
|
|
|
|
touchedSize = 0;
|
|
for (k = 0; k < num; sp++, k++) {
|
|
if (debugsetsp) {
|
|
afs_warn("sp host=%x, rank=%d\n", sp->host.s_addr, sp->rank);
|
|
}
|
|
matches = 0;
|
|
ObtainReadLock(&afs_xserver);
|
|
|
|
i = SHash(sp->host.s_addr);
|
|
for (sa = afs_srvAddrs[i]; sa; sa = sa->next_bkt) {
|
|
if (sa->sa_ip == sp->host.s_addr) {
|
|
srvr = sa->server;
|
|
isfs = (srvr->cell && (sa->sa_portal == srvr->cell->fsport))
|
|
|| (sa->sa_portal == AFS_FSPORT);
|
|
if ((!vlonly && isfs) || (vlonly && !isfs)) {
|
|
matches++;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (sa && matches) { /* found one! */
|
|
if (debugsetsp) {
|
|
afs_warn("sa ip=%x, ip_rank=%d\n", sa->sa_ip, sa->sa_iprank);
|
|
}
|
|
sa->sa_iprank = sp->rank + afs_randomMod15();
|
|
afs_SortOneServer(sa->server);
|
|
|
|
if (srvr->cell) {
|
|
/* if we don't know yet what cell it's in, this is moot */
|
|
for (j = touchedSize - 1;
|
|
j >= 0 && touched[j] != srvr->cell->cellNum; j--)
|
|
/* is it in our list of touched cells ? */ ;
|
|
if (j < 0) { /* no, it's not */
|
|
touched[touchedSize++] = srvr->cell->cellNum;
|
|
if (touchedSize >= 32) { /* watch for ovrflow */
|
|
ReleaseReadLock(&afs_xserver);
|
|
ReSortCells(touchedSize, touched, vlonly);
|
|
touchedSize = 0;
|
|
ObtainReadLock(&afs_xserver);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
ReleaseReadLock(&afs_xserver);
|
|
/* if we didn't find one, start to create one. */
|
|
/* Note that it doesn't have a cell yet... */
|
|
if (!matches) {
|
|
afs_uint32 temp = sp->host.s_addr;
|
|
srvr =
|
|
afs_GetServer(&temp, 1, 0, (vlonly ? AFS_VLPORT : AFS_FSPORT),
|
|
WRITE_LOCK, (afsUUID *) 0, 0, NULL);
|
|
srvr->addr->sa_iprank = sp->rank + afs_randomMod15();
|
|
afs_PutServer(srvr, WRITE_LOCK);
|
|
}
|
|
} /* for all cited preferences */
|
|
|
|
ReSortCells(touchedSize, touched, vlonly);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_SETPREFS (46) - Set server ranks
|
|
*
|
|
* \param[in] ain the sprefs value you want the sprefs to be set to
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EIO
|
|
* Error if the afs daemon hasn't started yet
|
|
* \retval EACCES
|
|
* Error if the user doesn't have super-user credentials
|
|
* \retval EINVAL
|
|
* Error if the struct setsprefs is too large or if it multiplied
|
|
* by the number of servers is too large
|
|
*
|
|
* \post set the sprefs using the afs_setsprefs() function
|
|
*/
|
|
DECL_PIOCTL(PSetSPrefs)
|
|
{
|
|
struct setspref *ssp;
|
|
char *ainPtr;
|
|
size_t ainSize;
|
|
|
|
AFS_STATCNT(PSetSPrefs);
|
|
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
/* The I/O handling here is ghastly, as it relies on overrunning the ends
|
|
* of arrays. But, i'm not quite brave enough to change it yet. */
|
|
ainPtr = ain->ptr;
|
|
ainSize = ain->remaining;
|
|
|
|
if (ainSize < sizeof(struct setspref))
|
|
return EINVAL;
|
|
|
|
ssp = (struct setspref *)ainPtr;
|
|
if (ainSize < (sizeof(struct setspref)
|
|
+ sizeof(struct spref) * (ssp->num_servers-1)))
|
|
return EINVAL;
|
|
|
|
afs_setsprefs(&(ssp->servers[0]), ssp->num_servers,
|
|
(ssp->flags & DBservers));
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* VIOC_SETPREFS33 (42) - Set server ranks (deprecated)
|
|
*
|
|
* \param[in] ain the server preferences to be set
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
*
|
|
* \post set the server preferences, calling a function
|
|
*
|
|
* \notes this may only be performed by the local root user.
|
|
*/
|
|
DECL_PIOCTL(PSetSPrefs33)
|
|
{
|
|
AFS_STATCNT(PSetSPrefs);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
afs_setsprefs((struct spref *)afs_pd_where(ain),
|
|
afs_pd_remaining(ain) / sizeof(struct spref),
|
|
0 /*!vlonly */ );
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* VIOC_GETSPREFS (43) - Get server ranks
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the server preferences to get
|
|
* \param[out] aout the server preferences information
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval ENOENT Error if the sprefrequest is too large
|
|
*
|
|
* \post Get the sprefs
|
|
*
|
|
* \notes
|
|
* in the hash table of server structs, all servers with the same
|
|
* IP address; will be on the same overflow chain; This could be
|
|
* sped slightly in some circumstances by having it cache the
|
|
* immediately previous slot in the hash table and some
|
|
* supporting information; Only reports file servers now.
|
|
*/
|
|
DECL_PIOCTL(PGetSPrefs)
|
|
{
|
|
struct sprefrequest spin; /* input */
|
|
struct sprefinfo *spout; /* output */
|
|
struct spref *srvout; /* one output component */
|
|
int i, j; /* counters for hash table traversal */
|
|
struct server *srvr; /* one of CM's server structs */
|
|
struct srvAddr *sa;
|
|
int vlonly; /* just return vlservers ? */
|
|
int isfs;
|
|
|
|
AFS_STATCNT(PGetSPrefs);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
/* Work out from the size whether we've got a new, or old, style pioctl */
|
|
if (afs_pd_remaining(ain) < sizeof(struct sprefrequest)) {
|
|
if (afs_pd_getBytes(ain, &spin, sizeof(struct sprefrequest_33)) != 0)
|
|
return ENOENT;
|
|
vlonly = 0;
|
|
spin.flags = 0;
|
|
} else {
|
|
if (afs_pd_getBytes(ain, &spin, sizeof(struct sprefrequest)) != 0)
|
|
return EINVAL;
|
|
vlonly = (spin.flags & DBservers);
|
|
}
|
|
|
|
/* This code relies on overflowing arrays. It's ghastly, but I'm not
|
|
* quite brave enough to tackle it yet ...
|
|
*/
|
|
|
|
/* struct sprefinfo includes 1 server struct... that size gets added
|
|
* in during the loop that follows.
|
|
*/
|
|
spout = afs_pd_inline(aout,
|
|
sizeof(struct sprefinfo) - sizeof(struct spref));
|
|
spout->next_offset = spin.offset;
|
|
spout->num_servers = 0;
|
|
srvout = spout->servers;
|
|
|
|
ObtainReadLock(&afs_xserver);
|
|
for (i = 0, j = 0; j < NSERVERS; j++) { /* sift through hash table */
|
|
for (sa = afs_srvAddrs[j]; sa; sa = sa->next_bkt, i++) {
|
|
if (spin.offset > (unsigned short)i) {
|
|
continue; /* catch up to where we left off */
|
|
}
|
|
spout->next_offset++;
|
|
|
|
srvr = sa->server;
|
|
isfs = (srvr->cell && (sa->sa_portal == srvr->cell->fsport))
|
|
|| (sa->sa_portal == AFS_FSPORT);
|
|
|
|
if ((vlonly && isfs) || (!vlonly && !isfs)) {
|
|
/* only report ranks for vl servers */
|
|
continue;
|
|
}
|
|
|
|
/* Check we've actually got the space we're about to use */
|
|
if (afs_pd_inline(aout, sizeof(struct spref)) == NULL) {
|
|
ReleaseReadLock(&afs_xserver); /* no more room! */
|
|
return 0;
|
|
}
|
|
|
|
srvout->host.s_addr = sa->sa_ip;
|
|
srvout->rank = sa->sa_iprank;
|
|
spout->num_servers++;
|
|
srvout++;
|
|
}
|
|
}
|
|
ReleaseReadLock(&afs_xserver);
|
|
|
|
spout->next_offset = 0; /* start over from the beginning next time */
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Enable/Disable the specified exporter. Must be root to disable an exporter */
|
|
int afs_NFSRootOnly = 1;
|
|
/*!
|
|
* VIOC_EXPORTAFS (39) - Export afs to nfs clients
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain
|
|
* an integer containing the desired exportee flags
|
|
* \param[out] aout
|
|
* an integer containing the current exporter flags
|
|
*
|
|
* \retval ENODEV Error if the exporter doesn't exist
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
*
|
|
* \post
|
|
* Changes the state of various values to reflect the change
|
|
* of the export values between nfs and afs.
|
|
*
|
|
* \notes Legacy code obtained from IBM.
|
|
*/
|
|
DECL_PIOCTL(PExportAfs)
|
|
{
|
|
afs_int32 export, newint = 0;
|
|
afs_int32 type, changestate, handleValue, convmode, pwsync, smounts;
|
|
afs_int32 rempags = 0, pagcb = 0;
|
|
struct afs_exporter *exporter;
|
|
|
|
AFS_STATCNT(PExportAfs);
|
|
if (afs_pd_getInt(ain, &handleValue) != 0)
|
|
return EINVAL;
|
|
type = handleValue >> 24;
|
|
if (type == 0x71) {
|
|
newint = 1;
|
|
type = 1; /* nfs */
|
|
}
|
|
exporter = exporter_find(type);
|
|
if (newint) {
|
|
export = handleValue & 3;
|
|
changestate = handleValue & 0xfff;
|
|
smounts = (handleValue >> 2) & 3;
|
|
pwsync = (handleValue >> 4) & 3;
|
|
convmode = (handleValue >> 6) & 3;
|
|
rempags = (handleValue >> 8) & 3;
|
|
pagcb = (handleValue >> 10) & 3;
|
|
} else {
|
|
changestate = (handleValue >> 16) & 0x1;
|
|
convmode = (handleValue >> 16) & 0x2;
|
|
pwsync = (handleValue >> 16) & 0x4;
|
|
smounts = (handleValue >> 16) & 0x8;
|
|
export = handleValue & 0xff;
|
|
}
|
|
if (!exporter) {
|
|
/* Failed finding desired exporter; */
|
|
return ENODEV;
|
|
}
|
|
if (!changestate) {
|
|
handleValue = exporter->exp_states;
|
|
if (afs_pd_putInt(aout, handleValue) != 0)
|
|
return E2BIG;
|
|
} else {
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES; /* Only superuser can do this */
|
|
if (newint) {
|
|
if (export & 2) {
|
|
if (export & 1)
|
|
exporter->exp_states |= EXP_EXPORTED;
|
|
else
|
|
exporter->exp_states &= ~EXP_EXPORTED;
|
|
}
|
|
if (convmode & 2) {
|
|
if (convmode & 1)
|
|
exporter->exp_states |= EXP_UNIXMODE;
|
|
else
|
|
exporter->exp_states &= ~EXP_UNIXMODE;
|
|
}
|
|
if (pwsync & 2) {
|
|
if (pwsync & 1)
|
|
exporter->exp_states |= EXP_PWSYNC;
|
|
else
|
|
exporter->exp_states &= ~EXP_PWSYNC;
|
|
}
|
|
if (smounts & 2) {
|
|
if (smounts & 1) {
|
|
afs_NFSRootOnly = 0;
|
|
exporter->exp_states |= EXP_SUBMOUNTS;
|
|
} else {
|
|
afs_NFSRootOnly = 1;
|
|
exporter->exp_states &= ~EXP_SUBMOUNTS;
|
|
}
|
|
}
|
|
if (rempags & 2) {
|
|
if (rempags & 1)
|
|
exporter->exp_states |= EXP_CLIPAGS;
|
|
else
|
|
exporter->exp_states &= ~EXP_CLIPAGS;
|
|
}
|
|
if (pagcb & 2) {
|
|
if (pagcb & 1)
|
|
exporter->exp_states |= EXP_CALLBACK;
|
|
else
|
|
exporter->exp_states &= ~EXP_CALLBACK;
|
|
}
|
|
handleValue = exporter->exp_states;
|
|
if (afs_pd_putInt(aout, handleValue) != 0)
|
|
return E2BIG;
|
|
} else {
|
|
if (export)
|
|
exporter->exp_states |= EXP_EXPORTED;
|
|
else
|
|
exporter->exp_states &= ~EXP_EXPORTED;
|
|
if (convmode)
|
|
exporter->exp_states |= EXP_UNIXMODE;
|
|
else
|
|
exporter->exp_states &= ~EXP_UNIXMODE;
|
|
if (pwsync)
|
|
exporter->exp_states |= EXP_PWSYNC;
|
|
else
|
|
exporter->exp_states &= ~EXP_PWSYNC;
|
|
if (smounts) {
|
|
afs_NFSRootOnly = 0;
|
|
exporter->exp_states |= EXP_SUBMOUNTS;
|
|
} else {
|
|
afs_NFSRootOnly = 1;
|
|
exporter->exp_states &= ~EXP_SUBMOUNTS;
|
|
}
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_GAG (44) - Silence Cache Manager
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the flags to either gag or de-gag the cache manager
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
*
|
|
* \post set the gag flags, then show these flags
|
|
*/
|
|
DECL_PIOCTL(PGag)
|
|
{
|
|
struct gaginfo *gagflags;
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
gagflags = afs_pd_inline(ain, sizeof(*gagflags));
|
|
if (gagflags == NULL)
|
|
return EINVAL;
|
|
afs_showflags = gagflags->showflags;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_TWIDDLE (45) - Adjust RX knobs
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the previous settings of the 'knobs'
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
*
|
|
* \post build out the struct rxp, from a struct rx
|
|
*/
|
|
DECL_PIOCTL(PTwiddleRx)
|
|
{
|
|
struct rxparams *rxp;
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
rxp = afs_pd_inline(ain, sizeof(*rxp));
|
|
if (rxp == NULL)
|
|
return EINVAL;
|
|
|
|
if (rxp->rx_initReceiveWindow)
|
|
rx_initReceiveWindow = rxp->rx_initReceiveWindow;
|
|
if (rxp->rx_maxReceiveWindow)
|
|
rx_maxReceiveWindow = rxp->rx_maxReceiveWindow;
|
|
if (rxp->rx_initSendWindow)
|
|
rx_initSendWindow = rxp->rx_initSendWindow;
|
|
if (rxp->rx_maxSendWindow)
|
|
rx_maxSendWindow = rxp->rx_maxSendWindow;
|
|
if (rxp->rxi_nSendFrags)
|
|
rxi_nSendFrags = rxp->rxi_nSendFrags;
|
|
if (rxp->rxi_nRecvFrags)
|
|
rxi_nRecvFrags = rxp->rxi_nRecvFrags;
|
|
if (rxp->rxi_OrphanFragSize)
|
|
rxi_OrphanFragSize = rxp->rxi_OrphanFragSize;
|
|
if (rxp->rx_maxReceiveSize) {
|
|
rx_maxReceiveSize = rxp->rx_maxReceiveSize;
|
|
rx_maxReceiveSizeUser = rxp->rx_maxReceiveSize;
|
|
}
|
|
if (rxp->rx_MyMaxSendSize)
|
|
rx_MyMaxSendSize = rxp->rx_MyMaxSendSize;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_GETINITPARAMS (49) - Get initial cache manager parameters
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout initial cache manager params
|
|
*
|
|
* \retval E2BIG
|
|
* Error if the initial parameters are bigger than some PIGGYSIZE
|
|
*
|
|
* \post return the initial cache manager parameters
|
|
*/
|
|
DECL_PIOCTL(PGetInitParams)
|
|
{
|
|
if (sizeof(struct cm_initparams) > PIGGYSIZE)
|
|
return E2BIG;
|
|
|
|
return afs_pd_putBytes(aout, &cm_initParams,
|
|
sizeof(struct cm_initparams));
|
|
}
|
|
|
|
#ifdef AFS_SGI65_ENV
|
|
/* They took crget() from us, so fake it. */
|
|
static cred_t *
|
|
crget(void)
|
|
{
|
|
cred_t *cr;
|
|
cr = crdup(get_current_cred());
|
|
memset(cr, 0, sizeof(cred_t));
|
|
#if CELL || CELL_PREPARE
|
|
cr->cr_id = -1;
|
|
#endif
|
|
return cr;
|
|
}
|
|
#endif
|
|
|
|
/*!
|
|
* VIOC_GETRXKCRYPT (55) - Get rxkad encryption flag
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain not in use
|
|
* \param[out] aout value of cryptall
|
|
*
|
|
* \post Turns on, or disables, rxkad encryption by setting the cryptall global
|
|
*/
|
|
DECL_PIOCTL(PGetRxkcrypt)
|
|
{
|
|
return afs_pd_putInt(aout, cryptall);
|
|
}
|
|
|
|
/*!
|
|
* VIOC_SETRXKCRYPT (56) - Set rxkad encryption flag
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the argument whether or not things should be encrypted
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EPERM
|
|
* Error if the user doesn't have super-user credentials
|
|
* \retval EINVAL
|
|
* Error if the input is too big, or if the input is outside the
|
|
* bounds of what it can be set to
|
|
*
|
|
* \post set whether or not things should be encrypted
|
|
*
|
|
* \notes
|
|
* may need to be modified at a later date to take into account
|
|
* other values for cryptall (beyond true or false)
|
|
*/
|
|
DECL_PIOCTL(PSetRxkcrypt)
|
|
{
|
|
afs_int32 tmpval;
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EPERM;
|
|
if (afs_pd_getInt(ain, &tmpval) != 0)
|
|
return EINVAL;
|
|
/* if new mappings added later this will need to be changed */
|
|
if (tmpval != 0 && tmpval != 1)
|
|
return EINVAL;
|
|
cryptall = tmpval;
|
|
return 0;
|
|
}
|
|
|
|
#ifdef AFS_NEED_CLIENTCONTEXT
|
|
/*
|
|
* Create new credentials to correspond to a remote user with given
|
|
* <hostaddr, uid, g0, g1>. This allows a server running as root to
|
|
* provide pioctl (and other) services to foreign clients (i.e. nfs
|
|
* clients) by using this call to `become' the client.
|
|
*/
|
|
#define PSETPAG 110
|
|
#define PIOCTL_HEADER 6
|
|
static int
|
|
HandleClientContext(struct afs_ioctl *ablob, int *com,
|
|
afs_ucred_t **acred, afs_ucred_t *credp)
|
|
{
|
|
char *ain, *inData;
|
|
afs_uint32 hostaddr;
|
|
afs_int32 uid, g0, g1, i, code, pag, exporter_type, isroot = 0;
|
|
struct afs_exporter *exporter, *outexporter;
|
|
afs_ucred_t *newcred;
|
|
struct unixuser *au;
|
|
afs_uint32 comp = *com & 0xff00;
|
|
afs_uint32 h, l;
|
|
#if defined(AFS_SUN510_ENV)
|
|
gid_t gids[2];
|
|
#endif
|
|
|
|
#if defined(AFS_SGIMP_ENV)
|
|
osi_Assert(ISAFS_GLOCK());
|
|
#endif
|
|
AFS_STATCNT(HandleClientContext);
|
|
if (ablob->in_size < PIOCTL_HEADER * sizeof(afs_int32)) {
|
|
/* Must at least include the PIOCTL_HEADER header words
|
|
* required by the protocol */
|
|
return EINVAL; /* Too small to be good */
|
|
}
|
|
ain = inData = osi_AllocLargeSpace(AFS_LRALLOCSIZ);
|
|
AFS_COPYIN(ablob->in, ain, PIOCTL_HEADER * sizeof(afs_int32), code);
|
|
if (code) {
|
|
osi_FreeLargeSpace(inData);
|
|
return code;
|
|
}
|
|
|
|
/* Extract information for remote user */
|
|
hostaddr = *((afs_uint32 *) ain);
|
|
ain += sizeof(hostaddr);
|
|
uid = *((afs_uint32 *) ain);
|
|
ain += sizeof(uid);
|
|
g0 = *((afs_uint32 *) ain);
|
|
ain += sizeof(g0);
|
|
g1 = *((afs_uint32 *) ain);
|
|
ain += sizeof(g1);
|
|
*com = *((afs_uint32 *) ain);
|
|
ain += sizeof(afs_int32);
|
|
exporter_type = *((afs_uint32 *) ain);/* In case we support more than NFS */
|
|
|
|
/*
|
|
* Of course, one must be root for most of these functions, but
|
|
* we'll allow (for knfs) you to set things if the pag is 0 and
|
|
* you're setting tokens or unlogging.
|
|
*/
|
|
i = (*com) & 0xff;
|
|
if (!afs_osi_suser(credp)) {
|
|
#if defined(AFS_SGI_ENV) && !defined(AFS_SGI64_ENV)
|
|
/* Since SGI's suser() returns explicit failure after the call.. */
|
|
u.u_error = 0;
|
|
#endif
|
|
/* check for acceptable opcodes for normal folks, which are, so far,
|
|
* get/set tokens, sysname, and unlog.
|
|
*/
|
|
if (i != 9 && i != 3 && i != 38 && i != 8) {
|
|
osi_FreeLargeSpace(inData);
|
|
return EACCES;
|
|
}
|
|
}
|
|
|
|
ablob->in_size -= PIOCTL_HEADER * sizeof(afs_int32);
|
|
ablob->in += PIOCTL_HEADER * sizeof(afs_int32);
|
|
osi_FreeLargeSpace(inData);
|
|
if (uid == 0) {
|
|
/*
|
|
* We map uid 0 to nobody to match the mapping that the nfs
|
|
* server does and to ensure that the suser() calls in the afs
|
|
* code fails for remote client roots.
|
|
*/
|
|
uid = afs_nobody; /* NFS_NOBODY == -2 */
|
|
isroot = 1;
|
|
}
|
|
newcred = crget();
|
|
#ifdef AFS_AIX41_ENV
|
|
setuerror(0);
|
|
#endif
|
|
afs_set_cr_gid(newcred, isroot ? RMTUSER_REQ_PRIV : RMTUSER_REQ);
|
|
#ifdef AFS_AIX51_ENV
|
|
newcred->cr_groupset.gs_union.un_groups[0] = g0;
|
|
newcred->cr_groupset.gs_union.un_groups[1] = g1;
|
|
#elif defined(AFS_LINUX26_ENV)
|
|
# ifdef AFS_LINUX26_ONEGROUP_ENV
|
|
afs_set_cr_group_info(newcred, groups_alloc(1)); /* nothing sets this */
|
|
l = (((g0-0x3f00) & 0x3fff) << 14) | ((g1-0x3f00) & 0x3fff);
|
|
h = ((g0-0x3f00) >> 14);
|
|
h = ((g1-0x3f00) >> 14) + h + h + h;
|
|
GROUP_AT(afs_cr_group_info(newcred), 0) = ((h << 28) | l);
|
|
# else
|
|
afs_set_cr_group_info(newcred, groups_alloc(2));
|
|
GROUP_AT(afs_cr_group_info(newcred), 0) = g0;
|
|
GROUP_AT(afs_cr_group_info(newcred), 1) = g1;
|
|
# endif
|
|
#elif defined(AFS_SUN510_ENV)
|
|
gids[0] = g0;
|
|
gids[1] = g1;
|
|
crsetgroups(newcred, 2, gids);
|
|
#else
|
|
newcred->cr_groups[0] = g0;
|
|
newcred->cr_groups[1] = g1;
|
|
#endif
|
|
#ifdef AFS_AIX_ENV
|
|
newcred->cr_ngrps = 2;
|
|
#elif !defined(AFS_LINUX26_ENV) && !defined(AFS_SUN510_ENV)
|
|
# if defined(AFS_SGI_ENV) || defined(AFS_SUN5_ENV) || defined(AFS_LINUX22_ENV) || defined(AFS_FBSD80_ENV)
|
|
newcred->cr_ngroups = 2;
|
|
# else
|
|
for (i = 2; i < NGROUPS; i++)
|
|
newcred->cr_groups[i] = NOGROUP;
|
|
# endif
|
|
#endif
|
|
if (!(exporter = exporter_find(exporter_type))) {
|
|
/* Exporter wasn't initialized or an invalid exporter type */
|
|
crfree(newcred);
|
|
return EINVAL;
|
|
}
|
|
if (exporter->exp_states & EXP_PWSYNC) {
|
|
if (uid != afs_cr_uid(credp)) {
|
|
crfree(newcred);
|
|
return ENOEXEC; /* XXX Find a better errno XXX */
|
|
}
|
|
}
|
|
afs_set_cr_uid(newcred, uid); /* Only temporary */
|
|
code = EXP_REQHANDLER(exporter, &newcred, hostaddr, &pag, &outexporter);
|
|
/* The client's pag is the only unique identifier for it */
|
|
afs_set_cr_uid(newcred, pag);
|
|
*acred = newcred;
|
|
if (!code && *com == PSETPAG) {
|
|
/* Special case for 'setpag' */
|
|
afs_uint32 pagvalue = genpag();
|
|
|
|
au = afs_GetUser(pagvalue, -1, WRITE_LOCK); /* a new unixuser struct */
|
|
/*
|
|
* Note that we leave the 'outexporter' struct held so it won't
|
|
* dissappear on us
|
|
*/
|
|
au->exporter = outexporter;
|
|
if (ablob->out_size >= 4) {
|
|
AFS_COPYOUT((char *)&pagvalue, ablob->out, sizeof(afs_int32),
|
|
code);
|
|
}
|
|
afs_PutUser(au, WRITE_LOCK);
|
|
if (code)
|
|
return code;
|
|
return PSETPAG; /* Special return for setpag */
|
|
} else if (!code) {
|
|
EXP_RELE(outexporter);
|
|
}
|
|
if (!code)
|
|
*com = (*com) | comp;
|
|
return code;
|
|
}
|
|
#endif /* AFS_NEED_CLIENTCONTEXT */
|
|
|
|
|
|
/*!
|
|
* VIOC_GETCPREFS (50) - Get client interface
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain sprefrequest input
|
|
* \param[out] aout spref information
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval EINVAL Error if some of the standard args aren't set
|
|
*
|
|
* \post
|
|
* get all interface addresses and other information of the client
|
|
* interface
|
|
*/
|
|
DECL_PIOCTL(PGetCPrefs)
|
|
{
|
|
struct sprefrequest *spin; /* input */
|
|
struct sprefinfo *spout; /* output */
|
|
struct spref *srvout; /* one output component */
|
|
int maxNumber;
|
|
int i, j;
|
|
|
|
AFS_STATCNT(PGetCPrefs);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
spin = afs_pd_inline(ain, sizeof(*spin));
|
|
if (spin == NULL)
|
|
return EINVAL;
|
|
|
|
/* Output spout relies on writing past the end of arrays. It's horrible,
|
|
* but I'm not quite brave enough to tackle it yet */
|
|
spout = (struct sprefinfo *)aout->ptr;
|
|
|
|
maxNumber = spin->num_servers; /* max addrs this time */
|
|
srvout = spout->servers;
|
|
|
|
ObtainReadLock(&afs_xinterface);
|
|
|
|
/* copy out the client interface information from the
|
|
* kernel data structure "interface" to the output buffer
|
|
*/
|
|
for (i = spin->offset, j = 0; (i < afs_cb_interface.numberOfInterfaces)
|
|
&& (j < maxNumber); i++, j++, srvout++)
|
|
srvout->host.s_addr = afs_cb_interface.addr_in[i];
|
|
|
|
spout->num_servers = j;
|
|
aout->ptr += sizeof(struct sprefinfo) + (j - 1) * sizeof(struct spref);
|
|
|
|
if (i >= afs_cb_interface.numberOfInterfaces)
|
|
spout->next_offset = 0; /* start from beginning again */
|
|
else
|
|
spout->next_offset = spin->offset + j;
|
|
|
|
ReleaseReadLock(&afs_xinterface);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_SETCPREFS (51) - Set client interface
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the interfaces you want set
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EIO Error if the afs daemon hasn't started yet
|
|
* \retval EINVAL Error if the input is too large for the struct
|
|
* \retval ENOMEM Error if there are too many servers
|
|
*
|
|
* \post set the callbak interfaces addresses to those of the hosts
|
|
*/
|
|
DECL_PIOCTL(PSetCPrefs)
|
|
{
|
|
char *ainPtr;
|
|
size_t ainSize;
|
|
struct setspref *sin;
|
|
int i;
|
|
|
|
AFS_STATCNT(PSetCPrefs);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
/* Yuck. Input to this function relies on reading past the end of
|
|
* structures. Bodge it for now.
|
|
*/
|
|
ainPtr = ain->ptr;
|
|
ainSize = ain->remaining;
|
|
|
|
sin = (struct setspref *)ainPtr;
|
|
|
|
if (ainSize < sizeof(struct setspref))
|
|
return EINVAL;
|
|
#if 0 /* num_servers is unsigned */
|
|
if (sin->num_servers < 0)
|
|
return EINVAL;
|
|
#endif
|
|
if (sin->num_servers > AFS_MAX_INTERFACE_ADDR)
|
|
return ENOMEM;
|
|
|
|
ObtainWriteLock(&afs_xinterface, 412);
|
|
afs_cb_interface.numberOfInterfaces = sin->num_servers;
|
|
for (i = 0; (unsigned short)i < sin->num_servers; i++)
|
|
afs_cb_interface.addr_in[i] = sin->servers[i].host.s_addr;
|
|
|
|
ReleaseWriteLock(&afs_xinterface);
|
|
return 0;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_AFS_FLUSHMOUNT (52) - Flush mount symlink data
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain
|
|
* the last part of a path to a mount point, which tells us what to flush
|
|
* \param[out] aout
|
|
* not in use
|
|
*
|
|
* \retval EINVAL
|
|
* Error if some of the initial arguments aren't set
|
|
* \retval ENOTDIR
|
|
* Error if the initial argument for the mount point isn't a directory
|
|
* \retval ENOENT
|
|
* Error if the dcache entry isn't set
|
|
*
|
|
* \post
|
|
* remove all of the mount data from the dcache regarding a
|
|
* certain mount point
|
|
*/
|
|
DECL_PIOCTL(PFlushMount)
|
|
{
|
|
afs_int32 code;
|
|
struct vcache *tvc;
|
|
struct dcache *tdc;
|
|
struct VenusFid tfid;
|
|
char *bufp;
|
|
char *mount;
|
|
struct sysname_info sysState;
|
|
afs_size_t offset, len;
|
|
|
|
AFS_STATCNT(PFlushMount);
|
|
if (!avc)
|
|
return EINVAL;
|
|
|
|
if (afs_pd_getStringPtr(ain, &mount) != 0)
|
|
return EINVAL;
|
|
|
|
code = afs_VerifyVCache(avc, areq);
|
|
if (code)
|
|
return code;
|
|
if (vType(avc) != VDIR) {
|
|
return ENOTDIR;
|
|
}
|
|
tdc = afs_GetDCache(avc, (afs_size_t) 0, areq, &offset, &len, 1);
|
|
if (!tdc)
|
|
return ENOENT;
|
|
Check_AtSys(avc, mount, &sysState, areq);
|
|
ObtainReadLock(&tdc->lock);
|
|
do {
|
|
code = afs_dir_Lookup(tdc, sysState.name, &tfid.Fid);
|
|
} while (code == ENOENT && Next_AtSys(avc, areq, &sysState));
|
|
ReleaseReadLock(&tdc->lock);
|
|
afs_PutDCache(tdc); /* we're done with the data */
|
|
bufp = sysState.name;
|
|
if (code) {
|
|
goto out;
|
|
}
|
|
tfid.Cell = avc->f.fid.Cell;
|
|
tfid.Fid.Volume = avc->f.fid.Fid.Volume;
|
|
if (!tfid.Fid.Unique && (avc->f.states & CForeign)) {
|
|
tvc = afs_LookupVCache(&tfid, areq, NULL, avc, bufp);
|
|
} else {
|
|
tvc = afs_GetVCache(&tfid, areq, NULL, NULL);
|
|
}
|
|
if (!tvc) {
|
|
code = ENOENT;
|
|
goto out;
|
|
}
|
|
if (tvc->mvstat != 1) {
|
|
afs_PutVCache(tvc);
|
|
code = EINVAL;
|
|
goto out;
|
|
}
|
|
#ifdef AFS_BOZONLOCK_ENV
|
|
afs_BozonLock(&tvc->pvnLock, tvc); /* Since afs_TryToSmush will do a pvn_vptrunc */
|
|
#endif
|
|
ObtainWriteLock(&tvc->lock, 649);
|
|
ObtainWriteLock(&afs_xcbhash, 650);
|
|
afs_DequeueCallback(tvc);
|
|
tvc->f.states &= ~(CStatd | CDirty); /* next reference will re-stat cache entry */
|
|
ReleaseWriteLock(&afs_xcbhash);
|
|
/* now find the disk cache entries */
|
|
afs_TryToSmush(tvc, *acred, 1);
|
|
osi_dnlc_purgedp(tvc);
|
|
if (tvc->linkData && !(tvc->f.states & CCore)) {
|
|
afs_osi_Free(tvc->linkData, strlen(tvc->linkData) + 1);
|
|
tvc->linkData = NULL;
|
|
}
|
|
ReleaseWriteLock(&tvc->lock);
|
|
#ifdef AFS_BOZONLOCK_ENV
|
|
afs_BozonUnlock(&tvc->pvnLock, tvc);
|
|
#endif
|
|
afs_PutVCache(tvc);
|
|
out:
|
|
if (sysState.allocked)
|
|
osi_FreeLargeSpace(bufp);
|
|
return code;
|
|
}
|
|
|
|
/*!
|
|
* VIOC_RXSTAT_PROC (53) - Control process RX statistics
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the flags that control which stats to use
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
* \retval EINVAL Error if the flag input is too long
|
|
*
|
|
* \post
|
|
* either enable process RPCStats, disable process RPCStats,
|
|
* or clear the process RPCStats
|
|
*/
|
|
DECL_PIOCTL(PRxStatProc)
|
|
{
|
|
afs_int32 flags;
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
if (afs_pd_getInt(ain, &flags) != 0)
|
|
return EINVAL;
|
|
|
|
if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK))
|
|
return EINVAL;
|
|
|
|
if (flags & AFSCALL_RXSTATS_ENABLE) {
|
|
rx_enableProcessRPCStats();
|
|
}
|
|
if (flags & AFSCALL_RXSTATS_DISABLE) {
|
|
rx_disableProcessRPCStats();
|
|
}
|
|
if (flags & AFSCALL_RXSTATS_CLEAR) {
|
|
rx_clearProcessRPCStats(AFS_RX_STATS_CLEAR_ALL);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*!
|
|
* VIOC_RXSTAT_PEER (54) - Control peer RX statistics
|
|
*
|
|
* \ingroup pioctl
|
|
*
|
|
* \param[in] ain the flags that control which statistics to use
|
|
* \param[out] aout not in use
|
|
*
|
|
* \retval EACCES Error if the user doesn't have super-user credentials
|
|
* \retval EINVAL Error if the flag input is too long
|
|
*
|
|
* \post
|
|
* either enable peer RPCStatws, disable peer RPCStats,
|
|
* or clear the peer RPCStats
|
|
*/
|
|
DECL_PIOCTL(PRxStatPeer)
|
|
{
|
|
afs_int32 flags;
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
if (afs_pd_getInt(ain, &flags) != 0)
|
|
return EINVAL;
|
|
|
|
if (!(flags & AFSCALL_RXSTATS_MASK) || (flags & ~AFSCALL_RXSTATS_MASK))
|
|
return EINVAL;
|
|
|
|
if (flags & AFSCALL_RXSTATS_ENABLE) {
|
|
rx_enablePeerRPCStats();
|
|
}
|
|
if (flags & AFSCALL_RXSTATS_DISABLE) {
|
|
rx_disablePeerRPCStats();
|
|
}
|
|
if (flags & AFSCALL_RXSTATS_CLEAR) {
|
|
rx_clearPeerRPCStats(AFS_RX_STATS_CLEAR_ALL);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
DECL_PIOCTL(PPrefetchFromTape)
|
|
{
|
|
afs_int32 code;
|
|
afs_int32 outval;
|
|
struct afs_conn *tc;
|
|
struct rx_call *tcall;
|
|
struct AFSVolSync tsync;
|
|
struct AFSFetchStatus OutStatus;
|
|
struct AFSCallBack CallBack;
|
|
struct VenusFid tfid;
|
|
struct AFSFid *Fid;
|
|
struct vcache *tvc;
|
|
struct rx_connection *rxconn;
|
|
|
|
AFS_STATCNT(PPrefetchFromTape);
|
|
if (!avc)
|
|
return EINVAL;
|
|
|
|
Fid = afs_pd_inline(ain, sizeof(struct AFSFid));
|
|
if (Fid == NULL)
|
|
Fid = &avc->f.fid.Fid;
|
|
|
|
tfid.Cell = avc->f.fid.Cell;
|
|
tfid.Fid.Volume = Fid->Volume;
|
|
tfid.Fid.Vnode = Fid->Vnode;
|
|
tfid.Fid.Unique = Fid->Unique;
|
|
|
|
tvc = afs_GetVCache(&tfid, areq, NULL, NULL);
|
|
if (!tvc) {
|
|
afs_Trace3(afs_iclSetp, CM_TRACE_PREFETCHCMD, ICL_TYPE_POINTER, tvc,
|
|
ICL_TYPE_FID, &tfid, ICL_TYPE_FID, &avc->f.fid);
|
|
return ENOENT;
|
|
}
|
|
afs_Trace3(afs_iclSetp, CM_TRACE_PREFETCHCMD, ICL_TYPE_POINTER, tvc,
|
|
ICL_TYPE_FID, &tfid, ICL_TYPE_FID, &tvc->f.fid);
|
|
|
|
do {
|
|
tc = afs_Conn(&tvc->f.fid, areq, SHARED_LOCK, &rxconn);
|
|
if (tc) {
|
|
|
|
RX_AFS_GUNLOCK();
|
|
tcall = rx_NewCall(rxconn);
|
|
code =
|
|
StartRXAFS_FetchData(tcall, (struct AFSFid *)&tvc->f.fid.Fid, 0,
|
|
0);
|
|
if (!code) {
|
|
rx_Read(tcall, (char *)&outval, sizeof(afs_int32));
|
|
code =
|
|
EndRXAFS_FetchData(tcall, &OutStatus, &CallBack, &tsync);
|
|
}
|
|
code = rx_EndCall(tcall, code);
|
|
RX_AFS_GLOCK();
|
|
} else
|
|
code = -1;
|
|
} while (afs_Analyze
|
|
(tc, rxconn, code, &tvc->f.fid, areq, AFS_STATS_FS_RPCIDX_RESIDENCYRPCS,
|
|
SHARED_LOCK, NULL));
|
|
/* This call is done only to have the callback things handled correctly */
|
|
afs_FetchStatus(tvc, &tfid, areq, &OutStatus);
|
|
afs_PutVCache(tvc);
|
|
|
|
if (code)
|
|
return code;
|
|
|
|
return afs_pd_putInt(aout, outval);
|
|
}
|
|
|
|
DECL_PIOCTL(PFsCmd)
|
|
{
|
|
afs_int32 code;
|
|
struct afs_conn *tc;
|
|
struct vcache *tvc;
|
|
struct FsCmdInputs *Inputs;
|
|
struct FsCmdOutputs *Outputs;
|
|
struct VenusFid tfid;
|
|
struct AFSFid *Fid;
|
|
struct rx_connection *rxconn;
|
|
|
|
if (!avc)
|
|
return EINVAL;
|
|
|
|
Inputs = afs_pd_inline(ain, sizeof(*Inputs));
|
|
if (Inputs == NULL)
|
|
return EINVAL;
|
|
|
|
Outputs = afs_pd_inline(aout, sizeof(*Outputs));
|
|
if (Outputs == NULL)
|
|
return E2BIG;
|
|
|
|
Fid = &Inputs->fid;
|
|
if (!Fid->Volume)
|
|
Fid = &avc->f.fid.Fid;
|
|
|
|
tfid.Cell = avc->f.fid.Cell;
|
|
tfid.Fid.Volume = Fid->Volume;
|
|
tfid.Fid.Vnode = Fid->Vnode;
|
|
tfid.Fid.Unique = Fid->Unique;
|
|
|
|
tvc = afs_GetVCache(&tfid, areq, NULL, NULL);
|
|
afs_Trace3(afs_iclSetp, CM_TRACE_RESIDCMD, ICL_TYPE_POINTER, tvc,
|
|
ICL_TYPE_INT32, Inputs->command, ICL_TYPE_FID, &tfid);
|
|
if (!tvc)
|
|
return ENOENT;
|
|
|
|
if (Inputs->command) {
|
|
do {
|
|
tc = afs_Conn(&tvc->f.fid, areq, SHARED_LOCK, &rxconn);
|
|
if (tc) {
|
|
RX_AFS_GUNLOCK();
|
|
code =
|
|
RXAFS_FsCmd(rxconn, Fid, Inputs,
|
|
(struct FsCmdOutputs *)aout);
|
|
RX_AFS_GLOCK();
|
|
} else
|
|
code = -1;
|
|
} while (afs_Analyze
|
|
(tc, rxconn, code, &tvc->f.fid, areq,
|
|
AFS_STATS_FS_RPCIDX_RESIDENCYRPCS, SHARED_LOCK, NULL));
|
|
/* This call is done to have the callback things handled correctly */
|
|
afs_FetchStatus(tvc, &tfid, areq, &Outputs->status);
|
|
} else { /* just a status request, return also link data */
|
|
code = 0;
|
|
Outputs->code = afs_FetchStatus(tvc, &tfid, areq, &Outputs->status);
|
|
Outputs->chars[0] = 0;
|
|
if (vType(tvc) == VLNK) {
|
|
ObtainWriteLock(&tvc->lock, 555);
|
|
if (afs_HandleLink(tvc, areq) == 0)
|
|
strncpy((char *)&Outputs->chars, tvc->linkData, MAXCMDCHARS);
|
|
ReleaseWriteLock(&tvc->lock);
|
|
}
|
|
}
|
|
|
|
afs_PutVCache(tvc);
|
|
|
|
return code;
|
|
}
|
|
|
|
DECL_PIOCTL(PNewUuid)
|
|
{
|
|
/*AFS_STATCNT(PNewUuid); */
|
|
if (!afs_resourceinit_flag) /* afs deamons havn't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (!afs_osi_suser(*acred))
|
|
return EACCES;
|
|
|
|
ObtainWriteLock(&afs_xinterface, 555);
|
|
afs_uuid_create(&afs_cb_interface.uuid);
|
|
ReleaseWriteLock(&afs_xinterface);
|
|
ForceAllNewConnections();
|
|
return 0;
|
|
}
|
|
|
|
#if defined(AFS_CACHE_BYPASS) && defined(AFS_LINUX24_ENV)
|
|
|
|
DECL_PIOCTL(PSetCachingThreshold)
|
|
{
|
|
afs_int32 getting = 1;
|
|
afs_int32 setting = 1;
|
|
afs_int32 threshold = AFS_CACHE_BYPASS_DISABLED;
|
|
|
|
if (afs_pd_getInt(ain, &threshold) != 0)
|
|
setting = 0;
|
|
|
|
if (aout == NULL)
|
|
getting = 0;
|
|
|
|
if (setting == 0 && getting == 0)
|
|
return EINVAL;
|
|
|
|
/*
|
|
* If setting, set first, and return the value now in effect
|
|
*/
|
|
if (setting) {
|
|
if (!afs_osi_suser(*acred))
|
|
return EPERM;
|
|
cache_bypass_threshold = threshold;
|
|
afs_warn("Cache Bypass Threshold set to: %d\n", threshold);
|
|
/* TODO: move to separate pioctl, or enhance pioctl */
|
|
cache_bypass_strategy = LARGE_FILES_BYPASS_CACHE;
|
|
}
|
|
|
|
/* Return the current size threshold */
|
|
if (getting)
|
|
return afs_pd_putInt(aout, cache_bypass_threshold);
|
|
|
|
return(0);
|
|
}
|
|
|
|
#endif /* defined(AFS_CACHE_BYPASS) */
|
|
|
|
DECL_PIOCTL(PCallBackAddr)
|
|
{
|
|
#ifndef UKERNEL
|
|
afs_uint32 addr, code;
|
|
int srvAddrCount;
|
|
struct server *ts;
|
|
struct srvAddr *sa;
|
|
struct afs_conn *tc;
|
|
afs_int32 i, j;
|
|
struct unixuser *tu;
|
|
struct srvAddr **addrs;
|
|
struct rx_connection *rxconn;
|
|
|
|
/*AFS_STATCNT(PCallBackAddr); */
|
|
if (!afs_resourceinit_flag) /* afs deamons havn't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (!afs_osi_suser(acred))
|
|
return EACCES;
|
|
|
|
if (afs_pd_getInt(ain, &addr) != 0)
|
|
return EINVAL;
|
|
|
|
ObtainReadLock(&afs_xinterface);
|
|
for (i = 0; (unsigned short)i < afs_cb_interface.numberOfInterfaces; i++) {
|
|
if (afs_cb_interface.addr_in[i] == addr)
|
|
break;
|
|
}
|
|
|
|
ReleaseWriteLock(&afs_xinterface);
|
|
|
|
if (afs_cb_interface.addr_in[i] != addr)
|
|
return EINVAL;
|
|
|
|
ObtainReadLock(&afs_xserver); /* Necessary? */
|
|
ObtainReadLock(&afs_xsrvAddr);
|
|
|
|
srvAddrCount = 0;
|
|
for (i = 0; i < NSERVERS; i++) {
|
|
for (sa = afs_srvAddrs[i]; sa; sa = sa->next_bkt) {
|
|
srvAddrCount++;
|
|
}
|
|
}
|
|
|
|
addrs = afs_osi_Alloc(srvAddrCount * sizeof(*addrs));
|
|
osi_Assert(addrs != NULL);
|
|
j = 0;
|
|
for (i = 0; i < NSERVERS; i++) {
|
|
for (sa = afs_srvAddrs[i]; sa; sa = sa->next_bkt) {
|
|
if (j >= srvAddrCount)
|
|
break;
|
|
addrs[j++] = sa;
|
|
}
|
|
}
|
|
|
|
ReleaseReadLock(&afs_xsrvAddr);
|
|
ReleaseReadLock(&afs_xserver);
|
|
|
|
for (i = 0; i < j; i++) {
|
|
sa = addrs[i];
|
|
ts = sa->server;
|
|
if (!ts)
|
|
continue;
|
|
|
|
/* vlserver has no callback conn */
|
|
if (sa->sa_portal == AFS_VLPORT) {
|
|
continue;
|
|
}
|
|
|
|
if (!ts->cell) /* not really an active server, anyway, it must */
|
|
continue; /* have just been added by setsprefs */
|
|
|
|
/* get a connection, even if host is down; bumps conn ref count */
|
|
tu = afs_GetUser(areq->uid, ts->cell->cellNum, SHARED_LOCK);
|
|
tc = afs_ConnBySA(sa, ts->cell->fsport, ts->cell->cellNum, tu,
|
|
1 /*force */ , 1 /*create */ , SHARED_LOCK, &rxconn);
|
|
afs_PutUser(tu, SHARED_LOCK);
|
|
if (!tc)
|
|
continue;
|
|
|
|
if ((sa->sa_flags & SRVADDR_ISDOWN) || afs_HaveCallBacksFrom(ts)) {
|
|
if (sa->sa_flags & SRVADDR_ISDOWN) {
|
|
rx_SetConnDeadTime(rxconn, 3);
|
|
}
|
|
#ifdef RX_ENABLE_LOCKS
|
|
AFS_GUNLOCK();
|
|
#endif /* RX_ENABLE_LOCKS */
|
|
code = RXAFS_CallBackRxConnAddr(rxconn, &addr);
|
|
#ifdef RX_ENABLE_LOCKS
|
|
AFS_GLOCK();
|
|
#endif /* RX_ENABLE_LOCKS */
|
|
}
|
|
afs_PutConn(tc, rxconn, SHARED_LOCK); /* done with it now */
|
|
} /* Outer loop over addrs */
|
|
#endif /* UKERNEL */
|
|
return 0;
|
|
}
|
|
|
|
DECL_PIOCTL(PDiscon)
|
|
{
|
|
static afs_int32 mode = 1; /* Start up in 'off' */
|
|
afs_int32 force = 0;
|
|
int code = 0;
|
|
char flags[4];
|
|
struct vrequest lreq;
|
|
|
|
if (afs_pd_getBytes(ain, &flags, 4) == 0) {
|
|
if (!afs_osi_suser(*acred))
|
|
return EPERM;
|
|
|
|
if (flags[0])
|
|
mode = flags[0] - 1;
|
|
if (flags[1])
|
|
afs_ConflictPolicy = flags[1] - 1;
|
|
if (flags[2])
|
|
force = 1;
|
|
if (flags[3]) {
|
|
/* Fake InitReq support for UID override */
|
|
memset(&lreq, 0, sizeof(lreq));
|
|
lreq.uid = flags[3];
|
|
areq = &lreq; /* override areq we got */
|
|
}
|
|
|
|
/*
|
|
* All of these numbers are hard coded in fs.c. If they
|
|
* change here, they should change there and vice versa
|
|
*/
|
|
switch (mode) {
|
|
case 0: /* Disconnect ("offline" mode), breaking all callbacks */
|
|
if (!AFS_IS_DISCONNECTED) {
|
|
ObtainWriteLock(&afs_discon_lock, 999);
|
|
afs_DisconGiveUpCallbacks();
|
|
afs_RemoveAllConns();
|
|
afs_is_disconnected = 1;
|
|
afs_is_discon_rw = 1;
|
|
ReleaseWriteLock(&afs_discon_lock);
|
|
}
|
|
break;
|
|
case 1: /* Fully connected, ("online" mode). */
|
|
ObtainWriteLock(&afs_discon_lock, 998);
|
|
|
|
afs_in_sync = 1;
|
|
afs_MarkAllServersUp();
|
|
code = afs_ResyncDisconFiles(areq, *acred);
|
|
afs_in_sync = 0;
|
|
|
|
if (code && !force) {
|
|
afs_warnuser("Files not synchronized properly, still in discon state. \n"
|
|
"Please retry or use \"force\".\n");
|
|
mode = 0;
|
|
} else {
|
|
if (force) {
|
|
afs_DisconDiscardAll(*acred);
|
|
}
|
|
afs_ClearAllStatdFlag();
|
|
afs_is_disconnected = 0;
|
|
afs_is_discon_rw = 0;
|
|
afs_warnuser("\nSync succeeded. You are back online.\n");
|
|
}
|
|
|
|
ReleaseWriteLock(&afs_discon_lock);
|
|
break;
|
|
default:
|
|
return EINVAL;
|
|
}
|
|
} else {
|
|
return EINVAL;
|
|
}
|
|
|
|
if (code)
|
|
return code;
|
|
|
|
return afs_pd_putInt(aout, mode);
|
|
}
|
|
|
|
#define MAX_PIOCTL_TOKENS 10
|
|
|
|
DECL_PIOCTL(PSetTokens2)
|
|
{
|
|
int code =0;
|
|
int i, cellNum, primaryFlag;
|
|
XDR xdrs;
|
|
struct unixuser *tu;
|
|
struct vrequest treq;
|
|
struct ktc_setTokenData tokenSet;
|
|
struct ktc_tokenUnion decodedToken;
|
|
|
|
memset(&tokenSet, 0, sizeof(tokenSet));
|
|
|
|
AFS_STATCNT(PSetTokens2);
|
|
if (!afs_resourceinit_flag)
|
|
return EIO;
|
|
|
|
afs_pd_xdrStart(ain, &xdrs, XDR_DECODE);
|
|
|
|
if (!xdr_ktc_setTokenData(&xdrs, &tokenSet)) {
|
|
afs_pd_xdrEnd(ain, &xdrs);
|
|
return EINVAL;
|
|
}
|
|
|
|
afs_pd_xdrEnd(ain, &xdrs);
|
|
|
|
/* We limit each PAG to 10 tokens to prevent a malicous (or runaway)
|
|
* process from using up the whole of the kernel memory by allocating
|
|
* tokens.
|
|
*/
|
|
if (tokenSet.tokens.tokens_len > MAX_PIOCTL_TOKENS) {
|
|
xdr_free((xdrproc_t) xdr_ktc_setTokenData, &tokenSet);
|
|
return E2BIG;
|
|
}
|
|
|
|
code = _settok_tokenCell(tokenSet.cell, &cellNum, &primaryFlag);
|
|
if (code) {
|
|
xdr_free((xdrproc_t) xdr_ktc_setTokenData, &tokenSet);
|
|
return code;
|
|
}
|
|
|
|
if (tokenSet.flags & AFSTOKEN_EX_SETPAG) {
|
|
if (_settok_setParentPag(acred) == 0) {
|
|
afs_InitReq(&treq, *acred);
|
|
areq = &treq;
|
|
}
|
|
}
|
|
|
|
tu = afs_GetUser(areq->uid, cellNum, WRITE_LOCK);
|
|
/* Free any tokens that we've already got */
|
|
afs_FreeTokens(&tu->tokens);
|
|
|
|
/* Iterate across the set of tokens we've received, and stuff them
|
|
* into this user's tokenJar
|
|
*/
|
|
for (i=0; i < tokenSet.tokens.tokens_len; i++) {
|
|
xdrmem_create(&xdrs,
|
|
tokenSet.tokens.tokens_val[i].token_opaque_val,
|
|
tokenSet.tokens.tokens_val[i].token_opaque_len,
|
|
XDR_DECODE);
|
|
|
|
memset(&decodedToken, 0, sizeof(decodedToken));
|
|
if (!xdr_ktc_tokenUnion(&xdrs, &decodedToken)) {
|
|
xdr_destroy(&xdrs);
|
|
code = EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
xdr_destroy(&xdrs);
|
|
|
|
afs_AddTokenFromPioctl(&tu->tokens, &decodedToken);
|
|
/* This is untidy - the old token interface supported passing
|
|
* the primaryFlag as part of the token interface. Current
|
|
* OpenAFS userland never sets this, but it's specified as being
|
|
* part of the XG interface, so we should probably still support
|
|
* it. Rather than add it to our AddToken interface, just handle
|
|
* it here.
|
|
*/
|
|
if (decodedToken.at_type == AFSTOKEN_UNION_KAD) {
|
|
if (decodedToken.ktc_tokenUnion_u.at_kad.rk_primary_flag)
|
|
primaryFlag = 1;
|
|
}
|
|
|
|
/* XXX - We should think more about destruction here. It's likely that
|
|
* there is key material in what we're about to throw away, which
|
|
* we really should zero out before giving back to the allocator */
|
|
xdr_free((xdrproc_t) xdr_ktc_tokenUnion, &decodedToken);
|
|
}
|
|
|
|
tu->states |= UHasTokens;
|
|
tu->states &= ~UTokensBad;
|
|
afs_SetPrimary(tu, primaryFlag);
|
|
tu->tokenTime = osi_Time();
|
|
|
|
xdr_free((xdrproc_t) xdr_ktc_setTokenData, &tokenSet);
|
|
|
|
out:
|
|
afs_ResetUserConns(tu);
|
|
afs_PutUser(tu, WRITE_LOCK);
|
|
|
|
return code;
|
|
}
|
|
|
|
DECL_PIOCTL(PGetTokens2)
|
|
{
|
|
struct cell *cell = NULL;
|
|
struct unixuser *tu = NULL;
|
|
afs_int32 iterator;
|
|
char *cellName = NULL;
|
|
afs_int32 cellNum;
|
|
int code = 0;
|
|
time_t now;
|
|
XDR xdrs;
|
|
struct ktc_setTokenData tokenSet;
|
|
|
|
AFS_STATCNT(PGetTokens);
|
|
if (!afs_resourceinit_flag)
|
|
return EIO;
|
|
|
|
memset(&tokenSet, 0, sizeof(tokenSet));
|
|
|
|
/* No input data - return tokens for primary cell */
|
|
/* 4 octets of data is an iterator count */
|
|
/* Otherwise, treat as string & return tokens for that cell name */
|
|
|
|
if (afs_pd_remaining(ain) == sizeof(afs_int32)) {
|
|
/* Integer iterator - return tokens for the n'th cell found for user */
|
|
if (afs_pd_getInt(ain, &iterator) != 0)
|
|
return EINVAL;
|
|
tu = getNthCell(areq->uid, iterator);
|
|
} else {
|
|
if (afs_pd_remaining(ain) > 0) {
|
|
if (afs_pd_getStringPtr(ain, &cellName) != 0)
|
|
return EINVAL;
|
|
} else {
|
|
cellName = NULL;
|
|
}
|
|
code = _settok_tokenCell(cellName, &cellNum, NULL);
|
|
if (code)
|
|
return code;
|
|
tu = afs_FindUser(areq->uid, cellNum, READ_LOCK);
|
|
}
|
|
if (tu == NULL)
|
|
return EDOM;
|
|
|
|
now = osi_Time();
|
|
|
|
if (!(tu->states & UHasTokens)
|
|
|| !afs_HasValidTokens(tu->tokens, now)) {
|
|
tu->states |= (UTokensBad | UNeedsReset);
|
|
afs_PutUser(tu, READ_LOCK);
|
|
return ENOTCONN;
|
|
}
|
|
|
|
code = afs_ExtractTokensForPioctl(tu->tokens, now, &tokenSet);
|
|
if (code)
|
|
goto out;
|
|
|
|
cell = afs_GetCell(tu->cell, READ_LOCK);
|
|
tokenSet.cell = cell->cellName;
|
|
afs_pd_xdrStart(aout, &xdrs, XDR_ENCODE);
|
|
if (!xdr_ktc_setTokenData(&xdrs, &tokenSet)) {
|
|
code = E2BIG;
|
|
goto out;
|
|
}
|
|
afs_pd_xdrEnd(aout, &xdrs);
|
|
|
|
out:
|
|
tokenSet.cell = NULL;
|
|
|
|
if (tu)
|
|
afs_PutUser(tu, READ_LOCK);
|
|
if (cell)
|
|
afs_PutCell(cell, READ_LOCK);
|
|
xdr_free((xdrproc_t)xdr_ktc_setTokenData, &tokenSet);
|
|
|
|
return code;
|
|
};
|
|
|
|
DECL_PIOCTL(PNFSNukeCreds)
|
|
{
|
|
afs_uint32 addr;
|
|
afs_int32 i;
|
|
struct unixuser *tu;
|
|
|
|
AFS_STATCNT(PUnlog);
|
|
if (!afs_resourceinit_flag) /* afs daemons haven't started yet */
|
|
return EIO; /* Inappropriate ioctl for device */
|
|
|
|
if (afs_pd_getUint(ain, &addr) != 0)
|
|
return EINVAL;
|
|
|
|
if (afs_cr_gid(*acred) == RMTUSER_REQ_PRIV && !addr) {
|
|
tu = afs_GetUser(areq->uid, -1, SHARED_LOCK);
|
|
if (!tu->exporter || !(addr = EXP_GETHOST(tu->exporter))) {
|
|
afs_PutUser(tu, SHARED_LOCK);
|
|
return EACCES;
|
|
}
|
|
afs_PutUser(tu, SHARED_LOCK);
|
|
} else if (!afs_osi_suser(acred)) {
|
|
return EACCES;
|
|
}
|
|
|
|
ObtainWriteLock(&afs_xuser, 227);
|
|
for (i = 0; i < NUSERS; i++) {
|
|
for (tu = afs_users[i]; tu; tu = tu->next) {
|
|
if (tu->exporter && EXP_CHECKHOST(tu->exporter, addr)) {
|
|
tu->refCount++;
|
|
ReleaseWriteLock(&afs_xuser);
|
|
|
|
afs_LockUser(tu, WRITE_LOCK, 367);
|
|
|
|
tu->states &= ~UHasTokens;
|
|
afs_FreeTokens(&tu->tokens);
|
|
afs_ResetUserConns(tu);
|
|
afs_PutUser(tu, WRITE_LOCK);
|
|
ObtainWriteLock(&afs_xuser, 228);
|
|
#ifdef UKERNEL
|
|
/* set the expire times to 0, causes
|
|
* afs_GCUserData to remove this entry
|
|
*/
|
|
tu->tokenTime = 0;
|
|
#endif /* UKERNEL */
|
|
}
|
|
}
|
|
}
|
|
ReleaseWriteLock(&afs_xuser);
|
|
return 0;
|
|
}
|