/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License (the "License"). * You may not use this file except in compliance with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved. * Copyright 2014 Nexenta Systems, Inc. All rights reserved. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "smbd.h" /* * The list contains asynchronous requests that have been initiated * but have not yet been collected (via smbd_dop_async_response). */ typedef struct smbd_doorsvc { mutex_t sd_mutex; cond_t sd_cv; list_t sd_async_list; uint32_t sd_async_count; } smbd_doorsvc_t; static int smbd_dop_null(smbd_arg_t *); static int smbd_dop_async_response(smbd_arg_t *); static int smbd_dop_user_auth_logon(smbd_arg_t *); static int smbd_dop_user_nonauth_logon(smbd_arg_t *); static int smbd_dop_user_auth_logoff(smbd_arg_t *); static int smbd_dop_lookup_sid(smbd_arg_t *); static int smbd_dop_lookup_name(smbd_arg_t *); static int smbd_dop_join(smbd_arg_t *); static int smbd_dop_get_dcinfo(smbd_arg_t *); static int smbd_dop_vss_get_count(smbd_arg_t *); static int smbd_dop_vss_get_snapshots(smbd_arg_t *); static int smbd_dop_vss_map_gmttoken(smbd_arg_t *); static int smbd_dop_ads_find_host(smbd_arg_t *); static int smbd_dop_quota_query(smbd_arg_t *); static int smbd_dop_quota_set(smbd_arg_t *); static int smbd_dop_dfs_get_referrals(smbd_arg_t *); static int smbd_dop_shr_hostaccess(smbd_arg_t *); static int smbd_dop_shr_exec(smbd_arg_t *); static int smbd_dop_notify_dc_changed(smbd_arg_t *); typedef int (*smbd_dop_t)(smbd_arg_t *); typedef struct smbd_doorop { smb_dopcode_t opcode; smbd_dop_t op; } smbd_doorop_t; smbd_doorop_t smbd_doorops[] = { { SMB_DR_NULL, smbd_dop_null }, { SMB_DR_ASYNC_RESPONSE, smbd_dop_async_response }, { SMB_DR_USER_AUTH_LOGON, smbd_dop_user_auth_logon }, { SMB_DR_USER_NONAUTH_LOGON, smbd_dop_user_nonauth_logon }, { SMB_DR_USER_AUTH_LOGOFF, smbd_dop_user_auth_logoff }, { SMB_DR_LOOKUP_SID, smbd_dop_lookup_sid }, { SMB_DR_LOOKUP_NAME, smbd_dop_lookup_name }, { SMB_DR_JOIN, smbd_dop_join }, { SMB_DR_GET_DCINFO, smbd_dop_get_dcinfo }, { SMB_DR_VSS_GET_COUNT, smbd_dop_vss_get_count }, { SMB_DR_VSS_GET_SNAPSHOTS, smbd_dop_vss_get_snapshots }, { SMB_DR_VSS_MAP_GMTTOKEN, smbd_dop_vss_map_gmttoken }, { SMB_DR_ADS_FIND_HOST, smbd_dop_ads_find_host }, { SMB_DR_QUOTA_QUERY, smbd_dop_quota_query }, { SMB_DR_QUOTA_SET, smbd_dop_quota_set }, { SMB_DR_DFS_GET_REFERRALS, smbd_dop_dfs_get_referrals }, { SMB_DR_SHR_HOSTACCESS, smbd_dop_shr_hostaccess }, { SMB_DR_SHR_EXEC, smbd_dop_shr_exec }, { SMB_DR_NOTIFY_DC_CHANGED, smbd_dop_notify_dc_changed } }; static int smbd_ndoorop = (sizeof (smbd_doorops) / sizeof (smbd_doorops[0])); static smbd_doorsvc_t smbd_doorsvc; static int smbd_door_fd = -1; static int smbd_door_cookie = 0x534D4244; /* SMBD */ static smbd_door_t smbd_door_sdh; static char *smbd_door_name = NULL; static void smbd_door_dispatch(void *, char *, size_t, door_desc_t *, uint_t); static int smbd_door_dispatch_async(smbd_arg_t *); static void smbd_door_release_async(smbd_arg_t *); /* * Start the smbd door service. Create and bind to a door. * Returns 0 on success. Otherwise, -1. */ int smbd_door_start(void) { int newfd; (void) mutex_lock(&smbd_doorsvc.sd_mutex); if (smbd_door_fd != -1) { (void) fprintf(stderr, "smb_doorsrv_start: already started"); (void) mutex_unlock(&smbd_doorsvc.sd_mutex); return (-1); } smbd_door_name = getenv("SMBD_DOOR_NAME"); if (smbd_door_name == NULL) smbd_door_name = SMBD_DOOR_NAME; smbd_door_init(&smbd_door_sdh, "doorsrv"); list_create(&smbd_doorsvc.sd_async_list, sizeof (smbd_arg_t), offsetof(smbd_arg_t, lnd)); smbd_doorsvc.sd_async_count = 0; if ((smbd_door_fd = door_create(smbd_door_dispatch, &smbd_door_cookie, DOOR_UNREF)) < 0) { (void) fprintf(stderr, "smb_doorsrv_start: door_create: %s", strerror(errno)); smbd_door_fd = -1; (void) mutex_unlock(&smbd_doorsvc.sd_mutex); return (-1); } (void) unlink(smbd_door_name); if ((newfd = creat(smbd_door_name, 0644)) < 0) { (void) fprintf(stderr, "smb_doorsrv_start: open: %s", strerror(errno)); (void) door_revoke(smbd_door_fd); smbd_door_fd = -1; (void) mutex_unlock(&smbd_doorsvc.sd_mutex); return (-1); } (void) close(newfd); (void) fdetach(smbd_door_name); if (fattach(smbd_door_fd, smbd_door_name) < 0) { (void) fprintf(stderr, "smb_doorsrv_start: fattach: %s", strerror(errno)); (void) door_revoke(smbd_door_fd); smbd_door_fd = -1; (void) mutex_unlock(&smbd_doorsvc.sd_mutex); return (-1); } (void) mutex_unlock(&smbd_doorsvc.sd_mutex); return (smbd_door_fd); } /* * Stop the smbd door service. */ void smbd_door_stop(void) { (void) mutex_lock(&smbd_doorsvc.sd_mutex); smbd_door_fini(&smbd_door_sdh); if (smbd_door_name) (void) fdetach(smbd_door_name); if (smbd_door_fd != -1) { (void) door_revoke(smbd_door_fd); smbd_door_fd = -1; } (void) mutex_unlock(&smbd_doorsvc.sd_mutex); } /*ARGSUSED*/ static void smbd_door_dispatch(void *cookie, char *argp, size_t arg_size, door_desc_t *dp, uint_t n_desc) { smbd_arg_t dop_arg; smb_doorhdr_t *hdr; size_t hdr_size; char *rbuf = NULL; smbd_door_enter(&smbd_door_sdh); if (!smbd_online()) smbd_door_return(&smbd_door_sdh, NULL, 0, NULL, 0); bzero(&dop_arg, sizeof (smbd_arg_t)); hdr = &dop_arg.hdr; hdr_size = xdr_sizeof(smb_doorhdr_xdr, hdr); if ((cookie != &smbd_door_cookie) || (argp == NULL) || (arg_size < hdr_size)) { smbd_door_return(&smbd_door_sdh, NULL, 0, NULL, 0); } if (smb_doorhdr_decode(hdr, (uint8_t *)argp, hdr_size) == -1) { syslog(LOG_DEBUG, "smbd_door_dispatch: header decode failed"); smbd_door_return(&smbd_door_sdh, NULL, 0, NULL, 0); } if ((hdr->dh_magic != SMB_DOOR_HDR_MAGIC) || (hdr->dh_txid == 0)) { syslog(LOG_DEBUG, "smbd_door_dispatch: invalid header"); smbd_door_return(&smbd_door_sdh, NULL, 0, NULL, 0); } dop_arg.opname = smb_doorhdr_opname(hdr->dh_op); dop_arg.data = argp + hdr_size; dop_arg.datalen = hdr->dh_datalen; if (hdr->dh_op == SMB_DR_ASYNC_RESPONSE) { /* * ASYNC_RESPONSE is used to collect the response * to an async call; it cannot be an async call. */ hdr->dh_flags &= ~SMB_DF_ASYNC; } if (hdr->dh_flags & SMB_DF_ASYNC) { if (smbd_door_dispatch_async(&dop_arg) == 0) hdr->dh_door_rc = SMB_DOP_SUCCESS; else hdr->dh_door_rc = SMB_DOP_NOT_CALLED; } else { (void) smbd_door_dispatch_op(&dop_arg); } if ((rbuf = (char *)alloca(dop_arg.rsize + hdr_size)) == NULL) { errno = ENOMEM; syslog(LOG_DEBUG, "smbd_door_dispatch[%s]: alloca %m", dop_arg.opname); smbd_door_return(&smbd_door_sdh, NULL, 0, NULL, 0); } if (dop_arg.rbuf != NULL) { (void) memcpy(rbuf + hdr_size, dop_arg.rbuf, dop_arg.rsize); free(dop_arg.rbuf); } hdr->dh_datalen = dop_arg.rsize; (void) smb_doorhdr_encode(hdr, (uint8_t *)rbuf, hdr_size); dop_arg.rsize += hdr_size; smbd_door_return(&smbd_door_sdh, rbuf, dop_arg.rsize, NULL, 0); /*NOTREACHED*/ } /* * Launch a thread to process an asynchronous door call. */ static int smbd_door_dispatch_async(smbd_arg_t *req_arg) { smbd_arg_t *arg = NULL; char *data = NULL; pthread_attr_t attr; pthread_t tid; int rc; if ((req_arg->hdr.dh_flags & SMB_DF_ASYNC) == 0) { errno = EINVAL; return (-1); } if ((arg = malloc(sizeof (smbd_arg_t))) == NULL) { syslog(LOG_DEBUG, "smbd_door_dispatch_async[%s]: %m", req_arg->opname); return (-1); } (void) memcpy(arg, req_arg, sizeof (smbd_arg_t)); arg->data = NULL; if (req_arg->datalen != 0) { if ((data = malloc(req_arg->datalen)) == NULL) { free(arg); syslog(LOG_DEBUG, "smbd_door_dispatch_async[%s]: %m", req_arg->opname); return (-1); } (void) memcpy(data, req_arg->data, req_arg->datalen); arg->data = data; } (void) mutex_lock(&smbd_doorsvc.sd_mutex); arg->magic = SMBD_ARG_MAGIC; list_insert_tail(&smbd_doorsvc.sd_async_list, arg); ++smbd_doorsvc.sd_async_count; (void) mutex_unlock(&smbd_doorsvc.sd_mutex); (void) pthread_attr_init(&attr); (void) pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); rc = pthread_create(&tid, &attr, smbd_door_dispatch_op, arg); (void) pthread_attr_destroy(&attr); if (rc != 0) { (void) mutex_lock(&smbd_doorsvc.sd_mutex); smbd_door_release_async(arg); (void) mutex_unlock(&smbd_doorsvc.sd_mutex); } return (rc); } /* * Remove an entry from the async response pending list and free * the arg and associated data. * * Must only be called while holding the smbd_doorsvc mutex. */ static void smbd_door_release_async(smbd_arg_t *arg) { if (arg != NULL) { assert(arg->magic == SMBD_ARG_MAGIC); arg->magic = (uint32_t)~SMBD_ARG_MAGIC; list_remove(&smbd_doorsvc.sd_async_list, arg); --smbd_doorsvc.sd_async_count; free(arg->data); arg->data = NULL; free(arg); } } /* * All door calls are processed here: synchronous or asynchronous: * - synchronous calls are invoked by direct function call * - asynchronous calls are invoked from a launched thread * * If the kernel has attempted to collect a response before the op * has completed, the arg will have been marked as response_abort * and we can discard the response data and release the arg. * * We send a notification when asynchronous (ASYNC) door calls * from the kernel (SYSSPACE) have completed. */ void * smbd_door_dispatch_op(void *thread_arg) { smbd_arg_t *arg = (smbd_arg_t *)thread_arg; smbd_doorop_t *doorop; smb_doorhdr_t *hdr; int i; if ((!smbd_online()) || arg == NULL) return (NULL); hdr = &arg->hdr; arg->opname = smb_doorhdr_opname(hdr->dh_op); for (i = 0; i < smbd_ndoorop; ++i) { doorop = &smbd_doorops[i]; if (hdr->dh_op == doorop->opcode) { hdr->dh_door_rc = doorop->op(arg); hdr->dh_status = arg->status; if ((hdr->dh_flags & SMB_DF_SYSSPACE) && (hdr->dh_flags & SMB_DF_ASYNC)) { assert(hdr->dh_op != SMB_DR_ASYNC_RESPONSE); (void) mutex_lock(&smbd_doorsvc.sd_mutex); if (arg->response_abort) { free(arg->rbuf); arg->rbuf = NULL; smbd_door_release_async(arg); } else { arg->response_ready = B_TRUE; } (void) mutex_unlock(&smbd_doorsvc.sd_mutex); (void) smb_kmod_event_notify(hdr->dh_txid); } return (NULL); } } syslog(LOG_ERR, "smbd_door_dispatch_op[%s]: invalid op %u", arg->opname, hdr->dh_op); return (NULL); } /* * Wrapper for door_return. smbd_door_enter() increments a reference count * when a door call is dispatched and smbd_door_return() decrements the * reference count when it completes. * * The reference counting is used in smbd_door_fini() to wait for active * calls to complete before closing the door. */ void smbd_door_init(smbd_door_t *sdh, const char *name) { (void) strlcpy(sdh->sd_name, name, sizeof (sdh->sd_name)); } void smbd_door_enter(smbd_door_t *sdh) { (void) mutex_lock(&sdh->sd_mutex); ++sdh->sd_ncalls; (void) mutex_unlock(&sdh->sd_mutex); } /* * We have two calls to door_return because the first call (with data) * can fail, which can leave the door call blocked here. The second * call (with NULL) is guaranteed to unblock and return to the caller. */ void smbd_door_return(smbd_door_t *sdh, char *data_ptr, size_t data_size, door_desc_t *desc_ptr, uint_t num_desc) { (void) mutex_lock(&sdh->sd_mutex); if (sdh->sd_ncalls == 0) syslog(LOG_ERR, "smbd_door_return[%s]: unexpected count=0", sdh->sd_name); else --sdh->sd_ncalls; (void) cond_broadcast(&sdh->sd_cv); (void) mutex_unlock(&sdh->sd_mutex); (void) door_return(data_ptr, data_size, desc_ptr, num_desc); (void) door_return(NULL, 0, NULL, 0); /* NOTREACHED */ } /* * A door service is about to terminate. * Give active requests a small grace period to complete. */ void smbd_door_fini(smbd_door_t *sdh) { timestruc_t delay; int rc = 0; (void) mutex_lock(&sdh->sd_mutex); while (rc != ETIME && sdh->sd_ncalls != 0) { delay.tv_sec = 1; delay.tv_nsec = 0; rc = cond_reltimedwait(&sdh->sd_cv, &sdh->sd_mutex, &delay); } if (sdh->sd_ncalls != 0) syslog(LOG_NOTICE, "smbd_door_fini[%s]: %d remaining", sdh->sd_name, sdh->sd_ncalls); (void) mutex_unlock(&sdh->sd_mutex); } /* * Null door operation: always returns success. * Assumes no request or response data. */ /*ARGSUSED*/ static int smbd_dop_null(smbd_arg_t *arg) { return (SMB_DOP_SUCCESS); } /* * Async response handler: setup the rbuf and rsize for the specified * transaction. This function is used by the kernel to collect the * response half of an asynchronous door call. * * If a door client attempts to collect a response before the op has * completed (!response_ready), mark the arg as response_abort and * set an error. The response will be discarded when the op completes. */ static int smbd_dop_async_response(smbd_arg_t *rsp_arg) { list_t *arg_list = &smbd_doorsvc.sd_async_list; smbd_arg_t *arg; (void) mutex_lock(&smbd_doorsvc.sd_mutex); arg = list_head(arg_list); while (arg != NULL) { assert(arg->magic == SMBD_ARG_MAGIC); if (arg->hdr.dh_txid == rsp_arg->hdr.dh_txid) { if (!arg->response_ready) { arg->response_abort = B_TRUE; rsp_arg->hdr.dh_door_rc = SMB_DOP_NOT_CALLED; syslog(LOG_NOTICE, "doorsvc[%s]: %u not ready", arg->opname, arg->hdr.dh_txid); break; } rsp_arg->rbuf = arg->rbuf; rsp_arg->rsize = arg->rsize; arg->rbuf = NULL; arg->rsize = 0; smbd_door_release_async(arg); break; } arg = list_next(arg_list, arg); } (void) mutex_unlock(&smbd_doorsvc.sd_mutex); return (SMB_DOP_SUCCESS); } static int smbd_dop_user_nonauth_logon(smbd_arg_t *arg) { uint32_t sid = 0; if (smb_common_decode(arg->data, arg->datalen, xdr_uint32_t, &sid) != 0) return (SMB_DOP_DECODE_ERROR); smbd_user_nonauth_logon(sid); return (SMB_DOP_SUCCESS); } static int smbd_dop_user_auth_logoff(smbd_arg_t *arg) { uint32_t sid = 0; if (smb_common_decode(arg->data, arg->datalen, xdr_uint32_t, &sid) != 0) return (SMB_DOP_DECODE_ERROR); smbd_user_auth_logoff(sid); return (SMB_DOP_SUCCESS); } /* * Obtains an access token on successful user authentication. */ static int smbd_dop_user_auth_logon(smbd_arg_t *arg) { _NOTE(ARGUNUSED(arg)) /* No longer used */ return (SMB_DOP_EMPTYBUF); } static int smbd_dop_lookup_name(smbd_arg_t *arg) { smb_domain_t dinfo; smb_account_t ainfo; lsa_account_t acct; char buf[MAXNAMELEN]; bzero(&acct, sizeof (lsa_account_t)); if (smb_common_decode(arg->data, arg->datalen, lsa_account_xdr, &acct) != 0) return (SMB_DOP_DECODE_ERROR); if (*acct.a_domain == '\0') (void) snprintf(buf, MAXNAMELEN, "%s", acct.a_name); else if (strchr(acct.a_domain, '.') != NULL) (void) snprintf(buf, MAXNAMELEN, "%s@%s", acct.a_name, acct.a_domain); else (void) snprintf(buf, MAXNAMELEN, "%s\\%s", acct.a_domain, acct.a_name); acct.a_status = lsa_lookup_name(buf, acct.a_sidtype, &ainfo); if (acct.a_status == NT_STATUS_SUCCESS) { acct.a_sidtype = ainfo.a_type; smb_sid_tostr(ainfo.a_sid, acct.a_sid); (void) strlcpy(acct.a_name, ainfo.a_name, MAXNAMELEN); if (smb_domain_lookup_name(ainfo.a_domain, &dinfo)) (void) strlcpy(acct.a_domain, dinfo.di_fqname, MAXNAMELEN); else (void) strlcpy(acct.a_domain, ainfo.a_domain, MAXNAMELEN); smb_account_free(&ainfo); } arg->rbuf = smb_common_encode(&acct, lsa_account_xdr, &arg->rsize); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } static int smbd_dop_lookup_sid(smbd_arg_t *arg) { smb_domain_t dinfo; smb_account_t ainfo; lsa_account_t acct; smb_sid_t *sid; bzero(&acct, sizeof (lsa_account_t)); if (smb_common_decode(arg->data, arg->datalen, lsa_account_xdr, &acct) != 0) return (SMB_DOP_DECODE_ERROR); sid = smb_sid_fromstr(acct.a_sid); acct.a_status = lsa_lookup_sid(sid, &ainfo); smb_sid_free(sid); if (acct.a_status == NT_STATUS_SUCCESS) { acct.a_sidtype = ainfo.a_type; smb_sid_tostr(ainfo.a_sid, acct.a_sid); (void) strlcpy(acct.a_name, ainfo.a_name, MAXNAMELEN); if (smb_domain_lookup_name(ainfo.a_domain, &dinfo)) (void) strlcpy(acct.a_domain, dinfo.di_fqname, MAXNAMELEN); else (void) strlcpy(acct.a_domain, ainfo.a_domain, MAXNAMELEN); smb_account_free(&ainfo); } arg->rbuf = smb_common_encode(&acct, lsa_account_xdr, &arg->rsize); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } static int smbd_dop_join(smbd_arg_t *arg) { smb_joininfo_t jdi; smb_joinres_t jdres; bzero(&jdi, sizeof (smb_joininfo_t)); bzero(&jdres, sizeof (smb_joinres_t)); if (smb_common_decode(arg->data, arg->datalen, smb_joininfo_xdr, &jdi) != 0) return (SMB_DOP_DECODE_ERROR); smbd_join(&jdi, &jdres); arg->rbuf = smb_common_encode(&jdres, smb_joinres_xdr, &arg->rsize); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } static int smbd_dop_get_dcinfo(smbd_arg_t *arg) { smb_domainex_t dxi; if (!smb_domain_getinfo(&dxi)) return (SMB_DOP_EMPTYBUF); arg->rbuf = smb_string_encode(dxi.d_dci.dc_name, &arg->rsize); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } /* * Return the number of snapshots for a dataset */ static int smbd_dop_vss_get_count(smbd_arg_t *arg) { smb_string_t path; uint32_t count; bzero(&path, sizeof (smb_string_t)); arg->rbuf = NULL; if (smb_string_decode(&path, arg->data, arg->datalen) != 0) return (SMB_DOP_DECODE_ERROR); if (smbd_vss_get_count(path.buf, &count) == 0) arg->rbuf = smb_common_encode(&count, xdr_uint32_t, &arg->rsize); xdr_free(smb_string_xdr, (char *)&path); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } /* * Return the count and list of snapshots. * The list is in @GMT token format. */ static int smbd_dop_vss_get_snapshots(smbd_arg_t *arg) { char **gmtp; smb_gmttoken_query_t request; smb_gmttoken_response_t reply; uint_t i; bzero(&request, sizeof (smb_gmttoken_query_t)); bzero(&reply, sizeof (smb_gmttoken_response_t)); if (smb_common_decode(arg->data, arg->datalen, smb_gmttoken_query_xdr, &request) != 0) return (SMB_DOP_DECODE_ERROR); reply.gtr_gmttokens.gtr_gmttokens_val = malloc(request.gtq_count * sizeof (char *)); bzero(reply.gtr_gmttokens.gtr_gmttokens_val, request.gtq_count * sizeof (char *)); if (reply.gtr_gmttokens.gtr_gmttokens_val == NULL) { xdr_free(smb_gmttoken_query_xdr, (char *)&request); return (SMB_DOP_EMPTYBUF); } smbd_vss_get_snapshots(request.gtq_path, request.gtq_count, &reply.gtr_count, &reply.gtr_gmttokens.gtr_gmttokens_len, reply.gtr_gmttokens.gtr_gmttokens_val); arg->rbuf = smb_common_encode(&reply, smb_gmttoken_response_xdr, &arg->rsize); if (arg->rbuf == NULL) { xdr_free(smb_gmttoken_query_xdr, (char *)&request); return (SMB_DOP_ENCODE_ERROR); } for (i = 0, gmtp = reply.gtr_gmttokens.gtr_gmttokens_val; (i < request.gtq_count); i++) { if (*gmtp) free(*gmtp); gmtp++; } free(reply.gtr_gmttokens.gtr_gmttokens_val); xdr_free(smb_gmttoken_query_xdr, (char *)&request); return (SMB_DOP_SUCCESS); } /* * Return the name of the snapshot that matches the dataset path * and @GMT token. */ static int smbd_dop_vss_map_gmttoken(smbd_arg_t *arg) { char *snapname; smb_gmttoken_snapname_t request; bzero(&request, sizeof (smb_gmttoken_snapname_t)); if (smb_common_decode(arg->data, arg->datalen, smb_gmttoken_snapname_xdr, &request) != 0) { xdr_free(smb_gmttoken_snapname_xdr, (char *)&request); return (SMB_DOP_DECODE_ERROR); } if ((snapname = malloc(MAXPATHLEN)) == NULL) { xdr_free(smb_gmttoken_snapname_xdr, (char *)&request); return (SMB_DOP_ENCODE_ERROR); } if ((smbd_vss_map_gmttoken(request.gts_path, request.gts_gmttoken, request.gts_toktime, snapname) != 0)) { *snapname = '\0'; } arg->rbuf = smb_string_encode(snapname, &arg->rsize); xdr_free(smb_gmttoken_snapname_xdr, (char *)&request); free(snapname); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } static int smbd_dop_ads_find_host(smbd_arg_t *arg) { smb_ads_host_info_t *hinfo = NULL; char *hostname = ""; smb_string_t fqdn; bzero(&fqdn, sizeof (smb_string_t)); if (smb_string_decode(&fqdn, arg->data, arg->datalen) != 0) return (SMB_DOP_DECODE_ERROR); if ((hinfo = smb_ads_find_host(fqdn.buf)) != NULL) hostname = hinfo->name; xdr_free(smb_string_xdr, (char *)&fqdn); arg->rbuf = smb_string_encode(hostname, &arg->rsize); free(hinfo); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } /* * Query the list of user/group quota entries for a given filesystem. */ static int smbd_dop_quota_query(smbd_arg_t *arg) { smb_quota_query_t request; smb_quota_response_t reply; uint32_t status; bzero(&request, sizeof (smb_quota_query_t)); bzero(&reply, sizeof (smb_quota_response_t)); if (smb_common_decode(arg->data, arg->datalen, smb_quota_query_xdr, &request) != 0) return (SMB_DOP_DECODE_ERROR); status = smb_quota_query(&request, &reply); reply.qr_status = status; arg->rbuf = smb_common_encode(&reply, smb_quota_response_xdr, &arg->rsize); xdr_free(smb_quota_query_xdr, (char *)&request); smb_quota_free(&reply); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } /* * Set a list of user/group quota entries for a given filesystem. */ static int smbd_dop_quota_set(smbd_arg_t *arg) { smb_quota_set_t request; uint32_t status = 0; bzero(&request, sizeof (smb_quota_set_t)); if (smb_common_decode(arg->data, arg->datalen, smb_quota_set_xdr, &request) != 0) return (SMB_DOP_DECODE_ERROR); status = smb_quota_set(&request); arg->rbuf = smb_common_encode(&status, xdr_uint32_t, &arg->rsize); xdr_free(smb_quota_set_xdr, (char *)&request); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } static int smbd_dop_dfs_get_referrals(smbd_arg_t *arg) { dfs_referral_query_t request; dfs_referral_response_t reply; bzero(&request, sizeof (request)); bzero(&reply, sizeof (reply)); if (smb_common_decode(arg->data, arg->datalen, dfs_referral_query_xdr, &request) != 0) return (SMB_DOP_DECODE_ERROR); reply.rp_status = dfs_get_referrals((const char *)request.rq_path, request.rq_type, &reply.rp_referrals); if (reply.rp_status != ERROR_SUCCESS) bzero(&reply.rp_referrals, sizeof (dfs_info_t)); arg->rbuf = smb_common_encode(&reply, dfs_referral_response_xdr, &arg->rsize); if (reply.rp_status == ERROR_SUCCESS) dfs_info_free(&reply.rp_referrals); xdr_free(dfs_referral_query_xdr, (char *)&request); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } static int smbd_dop_shr_hostaccess(smbd_arg_t *arg) { smb_shr_hostaccess_query_t request; uint32_t reply; bzero(&request, sizeof (request)); bzero(&reply, sizeof (reply)); if (smb_common_decode(arg->data, arg->datalen, smb_shr_hostaccess_query_xdr, &request) != 0) return (SMB_DOP_DECODE_ERROR); reply = smb_shr_hostaccess(&request.shq_ipaddr, request.shq_none, request.shq_ro, request.shq_rw, request.shq_flag); arg->rbuf = smb_common_encode(&reply, xdr_uint32_t, &arg->rsize); xdr_free(smb_shr_hostaccess_query_xdr, (char *)&request); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } static int smbd_dop_shr_exec(smbd_arg_t *arg) { smb_shr_execinfo_t request; int reply; bzero(&request, sizeof (request)); bzero(&reply, sizeof (reply)); if (smb_common_decode(arg->data, arg->datalen, smb_shr_execinfo_xdr, &request) != 0) return (SMB_DOP_DECODE_ERROR); reply = smb_shr_exec(&request); if (reply != 0) syslog(LOG_NOTICE, "Failed to execute %s command", (request.e_type == SMB_EXEC_MAP) ? "map" : "unmap"); arg->rbuf = smb_common_encode(&reply, xdr_int, &arg->rsize); xdr_free(smb_shr_execinfo_xdr, (char *)&request); if (arg->rbuf == NULL) return (SMB_DOP_ENCODE_ERROR); return (SMB_DOP_SUCCESS); } /* ARGSUSED */ static int smbd_dop_notify_dc_changed(smbd_arg_t *arg) { smbd_dc_monitor_refresh(); return (SMB_DOP_SUCCESS); }