xref: /illumos-gate/usr/src/lib/libshare/smb/libshare_smb.c (revision faa1795a28a5c712eed6d0a3f84d98c368a316c6)
1da6c28aaSamw /*
2da6c28aaSamw  * CDDL HEADER START
3da6c28aaSamw  *
4da6c28aaSamw  * The contents of this file are subject to the terms of the
5da6c28aaSamw  * Common Development and Distribution License (the "License").
6da6c28aaSamw  * You may not use this file except in compliance with the License.
7da6c28aaSamw  *
8da6c28aaSamw  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9da6c28aaSamw  * or http://www.opensolaris.org/os/licensing.
10da6c28aaSamw  * See the License for the specific language governing permissions
11da6c28aaSamw  * and limitations under the License.
12da6c28aaSamw  *
13da6c28aaSamw  * When distributing Covered Code, include this CDDL HEADER in each
14da6c28aaSamw  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15da6c28aaSamw  * If applicable, add the following below this CDDL HEADER, with the
16da6c28aaSamw  * fields enclosed by brackets "[]" replaced with your own identifying
17da6c28aaSamw  * information: Portions Copyright [yyyy] [name of copyright owner]
18da6c28aaSamw  *
19da6c28aaSamw  * CDDL HEADER END
20da6c28aaSamw  */
21da6c28aaSamw 
22da6c28aaSamw /*
23dc20a302Sas200622  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
24da6c28aaSamw  * Use is subject to license terms.
25da6c28aaSamw  */
26da6c28aaSamw 
27da6c28aaSamw #pragma ident	"%Z%%M%	%I%	%E% SMI"
28da6c28aaSamw 
29da6c28aaSamw /*
30da6c28aaSamw  * SMB specific functions
31da6c28aaSamw  */
32da6c28aaSamw #include <stdio.h>
33da6c28aaSamw #include <string.h>
34da6c28aaSamw #include <ctype.h>
35da6c28aaSamw #include <stdlib.h>
36da6c28aaSamw #include <unistd.h>
37da6c28aaSamw #include <zone.h>
38da6c28aaSamw #include <errno.h>
39da6c28aaSamw #include <locale.h>
40da6c28aaSamw #include <fcntl.h>
41da6c28aaSamw #include <sys/types.h>
42da6c28aaSamw #include <sys/stat.h>
43da6c28aaSamw #include <syslog.h>
44da6c28aaSamw #include "libshare.h"
45da6c28aaSamw #include "libshare_impl.h"
46da6c28aaSamw #include <pwd.h>
47da6c28aaSamw #include <limits.h>
48da6c28aaSamw #include <libscf.h>
49da6c28aaSamw #include <strings.h>
50da6c28aaSamw #include "libshare_smb.h"
51da6c28aaSamw #include <rpcsvc/daemon_utils.h>
52da6c28aaSamw #include <smbsrv/lmshare.h>
53da6c28aaSamw #include <smbsrv/lmshare_door.h>
54da6c28aaSamw #include <smbsrv/smbinfo.h>
55da6c28aaSamw #include <smbsrv/libsmb.h>
56da6c28aaSamw 
57da6c28aaSamw /* internal functions */
58da6c28aaSamw static int smb_share_init(void);
59da6c28aaSamw static void smb_share_fini(void);
60da6c28aaSamw static int smb_enable_share(sa_share_t);
61da6c28aaSamw static int smb_share_changed(sa_share_t);
62da6c28aaSamw static int smb_resource_changed(sa_resource_t);
63da6c28aaSamw static int smb_rename_resource(sa_handle_t, sa_resource_t, char *);
64da6c28aaSamw static int smb_disable_share(sa_share_t share, char *);
65da6c28aaSamw static int smb_validate_property(sa_property_t, sa_optionset_t);
66da6c28aaSamw static int smb_set_proto_prop(sa_property_t);
67da6c28aaSamw static sa_protocol_properties_t smb_get_proto_set(void);
68da6c28aaSamw static char *smb_get_status(void);
69da6c28aaSamw static int smb_parse_optstring(sa_group_t, char *);
70da6c28aaSamw static char *smb_format_options(sa_group_t, int);
71da6c28aaSamw 
72da6c28aaSamw static int smb_enable_service(void);
73da6c28aaSamw 
74da6c28aaSamw static int range_check_validator(int, char *);
75da6c28aaSamw static int range_check_validator_zero_ok(int, char *);
76da6c28aaSamw static int string_length_check_validator(int, char *);
77da6c28aaSamw static int true_false_validator(int, char *);
78da6c28aaSamw static int ip_address_validator_empty_ok(int, char *);
79da6c28aaSamw static int ip_address_csv_list_validator_empty_ok(int, char *);
80da6c28aaSamw static int path_validator(int, char *);
81da6c28aaSamw 
82da6c28aaSamw static int smb_enable_resource(sa_resource_t);
83da6c28aaSamw static int smb_disable_resource(sa_resource_t);
84da6c28aaSamw static uint64_t smb_share_features(void);
85da6c28aaSamw static int smb_list_transient(sa_handle_t);
86dc20a302Sas200622 
87dc20a302Sas200622 extern void lmshrd_door_close(void);
88da6c28aaSamw 
89da6c28aaSamw /* size of basic format allocation */
90da6c28aaSamw #define	OPT_CHUNK	1024
91da6c28aaSamw 
92dc20a302Sas200622 /* size of string for types - big enough to hold "dependency" */
93dc20a302Sas200622 #define	SCFTYPE_LEN	32
94dc20a302Sas200622 
95da6c28aaSamw /*
96da6c28aaSamw  * Indexes of entries in smb_proto_options table.
97da6c28aaSamw  * Changes to smb_proto_options table may require
98da6c28aaSamw  * an update to these values.
99da6c28aaSamw  */
100da6c28aaSamw #define	PROTO_OPT_WINS1			6
101da6c28aaSamw #define	PROTO_OPT_WINS_EXCLUDE		8
102da6c28aaSamw 
103da6c28aaSamw 
104da6c28aaSamw /*
105da6c28aaSamw  * ops vector that provides the protocol specific info and operations
106da6c28aaSamw  * for share management.
107da6c28aaSamw  */
108da6c28aaSamw 
109da6c28aaSamw struct sa_plugin_ops sa_plugin_ops = {
110da6c28aaSamw 	SA_PLUGIN_VERSION,
111da6c28aaSamw 	SMB_PROTOCOL_NAME,
112da6c28aaSamw 	smb_share_init,
113da6c28aaSamw 	smb_share_fini,
114da6c28aaSamw 	smb_enable_share,
115da6c28aaSamw 	smb_disable_share,
116da6c28aaSamw 	smb_validate_property,
1174bff34e3Sthurlow 	NULL,	/* valid_space */
1184bff34e3Sthurlow 	NULL,	/* security_prop */
119da6c28aaSamw 	smb_parse_optstring,
120da6c28aaSamw 	smb_format_options,
121da6c28aaSamw 	smb_set_proto_prop,
122da6c28aaSamw 	smb_get_proto_set,
123da6c28aaSamw 	smb_get_status,
1244bff34e3Sthurlow 	NULL,	/* space_alias */
1254bff34e3Sthurlow 	NULL,	/* update_legacy */
1264bff34e3Sthurlow 	NULL,	/* delete_legacy */
127da6c28aaSamw 	smb_share_changed,
128da6c28aaSamw 	smb_enable_resource,
129da6c28aaSamw 	smb_disable_resource,
130da6c28aaSamw 	smb_share_features,
131da6c28aaSamw 	smb_list_transient,
132da6c28aaSamw 	smb_resource_changed,
133da6c28aaSamw 	smb_rename_resource,
1344bff34e3Sthurlow 	NULL,	/* run_command */
1354bff34e3Sthurlow 	NULL,	/* command_help */
1364bff34e3Sthurlow 	NULL	/* delete_proto_section */
137da6c28aaSamw };
138da6c28aaSamw 
139da6c28aaSamw /*
140da6c28aaSamw  * option definitions.  Make sure to keep the #define for the option
141da6c28aaSamw  * index just before the entry it is the index for. Changing the order
142da6c28aaSamw  * can cause breakage.
143da6c28aaSamw  */
144da6c28aaSamw 
145da6c28aaSamw struct option_defs optdefs[] = {
146da6c28aaSamw 	{SHOPT_AD_CONTAINER, OPT_TYPE_STRING},
147da6c28aaSamw 	{SHOPT_NAME, OPT_TYPE_NAME},
148da6c28aaSamw 	{NULL, NULL},
149da6c28aaSamw };
150da6c28aaSamw 
151da6c28aaSamw /*
152da6c28aaSamw  * findopt(name)
153da6c28aaSamw  *
154da6c28aaSamw  * Lookup option "name" in the option table and return the table
155da6c28aaSamw  * index.
156da6c28aaSamw  */
157da6c28aaSamw 
158da6c28aaSamw static int
159da6c28aaSamw findopt(char *name)
160da6c28aaSamw {
161da6c28aaSamw 	int i;
162da6c28aaSamw 	if (name != NULL) {
163da6c28aaSamw 		for (i = 0; optdefs[i].tag != NULL; i++) {
164da6c28aaSamw 			if (strcmp(optdefs[i].tag, name) == 0)
165da6c28aaSamw 				return (i);
166da6c28aaSamw 		}
167da6c28aaSamw 	}
168da6c28aaSamw 	return (-1);
169da6c28aaSamw }
170da6c28aaSamw 
171da6c28aaSamw /*
172da6c28aaSamw  * is_a_number(number)
173da6c28aaSamw  *
174da6c28aaSamw  * is the string a number in one of the forms we want to use?
175da6c28aaSamw  */
176da6c28aaSamw 
177da6c28aaSamw static int
178da6c28aaSamw is_a_number(char *number)
179da6c28aaSamw {
180da6c28aaSamw 	int ret = 1;
181da6c28aaSamw 	int hex = 0;
182da6c28aaSamw 
183da6c28aaSamw 	if (strncmp(number, "0x", 2) == 0) {
184da6c28aaSamw 		number += 2;
185da6c28aaSamw 		hex = 1;
186da6c28aaSamw 	} else if (*number == '-') {
187da6c28aaSamw 		number++; /* skip the minus */
188da6c28aaSamw 	}
189da6c28aaSamw 
190da6c28aaSamw 	while (ret == 1 && *number != '\0') {
191da6c28aaSamw 		if (hex) {
192da6c28aaSamw 			ret = isxdigit(*number++);
193da6c28aaSamw 		} else {
194da6c28aaSamw 			ret = isdigit(*number++);
195da6c28aaSamw 		}
196da6c28aaSamw 	}
197da6c28aaSamw 	return (ret);
198da6c28aaSamw }
199da6c28aaSamw 
200da6c28aaSamw /*
201da6c28aaSamw  * validresource(name)
202da6c28aaSamw  *
203da6c28aaSamw  * Check that name only has valid characters in it. The current valid
204da6c28aaSamw  * set are the printable characters but not including:
205da6c28aaSamw  *	" / \ [ ] : | < > + ; , ? * = \t
206da6c28aaSamw  * Note that space is included and there is a maximum length.
207da6c28aaSamw  */
208da6c28aaSamw static int
209da6c28aaSamw validresource(const char *name)
210da6c28aaSamw {
211da6c28aaSamw 	const char *cp;
212da6c28aaSamw 	size_t len;
213da6c28aaSamw 
214da6c28aaSamw 	if (name == NULL)
215da6c28aaSamw 		return (B_FALSE);
216da6c28aaSamw 
217da6c28aaSamw 	len = strlen(name);
218da6c28aaSamw 	if (len == 0 || len > SA_MAX_RESOURCE_NAME)
219da6c28aaSamw 		return (B_FALSE);
220da6c28aaSamw 
221da6c28aaSamw 	if (strpbrk(name, "\"/\\[]:|<>+;,?*=\t") != NULL) {
222da6c28aaSamw 		return (B_FALSE);
223da6c28aaSamw 	}
224da6c28aaSamw 
225da6c28aaSamw 	for (cp = name; *cp != '\0'; cp++)
226da6c28aaSamw 		if (iscntrl(*cp))
227da6c28aaSamw 			return (B_FALSE);
228da6c28aaSamw 
229da6c28aaSamw 	return (B_TRUE);
230da6c28aaSamw }
231da6c28aaSamw 
232da6c28aaSamw /*
233da6c28aaSamw  * smb_isonline()
234da6c28aaSamw  *
235da6c28aaSamw  * Determine if the SMF service instance is in the online state or
236da6c28aaSamw  * not. A number of operations depend on this state.
237da6c28aaSamw  */
238da6c28aaSamw static boolean_t
239da6c28aaSamw smb_isonline(void)
240da6c28aaSamw {
241da6c28aaSamw 	char *str;
242da6c28aaSamw 	boolean_t ret = B_FALSE;
243da6c28aaSamw 
244da6c28aaSamw 	if ((str = smf_get_state(SMBD_DEFAULT_INSTANCE_FMRI)) != NULL) {
245da6c28aaSamw 		ret = (strcmp(str, SCF_STATE_STRING_ONLINE) == 0);
246da6c28aaSamw 		free(str);
247da6c28aaSamw 	}
248da6c28aaSamw 	return (ret);
249da6c28aaSamw }
250da6c28aaSamw 
251da6c28aaSamw /*
252dc20a302Sas200622  * smb_isdisabled()
253dc20a302Sas200622  *
254dc20a302Sas200622  * Determine if the SMF service instance is in the disabled state or
255dc20a302Sas200622  * not. A number of operations depend on this state.
256dc20a302Sas200622  */
257dc20a302Sas200622 static boolean_t
258dc20a302Sas200622 smb_isdisabled(void)
259dc20a302Sas200622 {
260dc20a302Sas200622 	char *str;
261dc20a302Sas200622 	boolean_t ret = B_FALSE;
262dc20a302Sas200622 
263dc20a302Sas200622 	if ((str = smf_get_state(SMBD_DEFAULT_INSTANCE_FMRI)) != NULL) {
264dc20a302Sas200622 		ret = (strcmp(str, SCF_STATE_STRING_DISABLED) == 0);
265dc20a302Sas200622 		free(str);
266dc20a302Sas200622 	}
267dc20a302Sas200622 	return (ret);
268dc20a302Sas200622 }
269dc20a302Sas200622 
270dc20a302Sas200622 /*
271dc20a302Sas200622  * smb_isautoenable()
272dc20a302Sas200622  *
273dc20a302Sas200622  * Determine if the SMF service instance auto_enabled set or not. A
274dc20a302Sas200622  * number of operations depend on this state.  The property not being
275dc20a302Sas200622  * set or being set to true means autoenable.  Only being set to false
276dc20a302Sas200622  * is not autoenabled.
277dc20a302Sas200622  */
278dc20a302Sas200622 static boolean_t
279dc20a302Sas200622 smb_isautoenable(void)
280dc20a302Sas200622 {
281dc20a302Sas200622 	boolean_t ret = B_TRUE;
282dc20a302Sas200622 	scf_simple_prop_t *prop;
283dc20a302Sas200622 	uint8_t *retstr;
284dc20a302Sas200622 
285dc20a302Sas200622 	prop = scf_simple_prop_get(NULL, SMBD_DEFAULT_INSTANCE_FMRI,
286dc20a302Sas200622 	    "application", "auto_enable");
287dc20a302Sas200622 	if (prop != NULL) {
288dc20a302Sas200622 		retstr = scf_simple_prop_next_boolean(prop);
289dc20a302Sas200622 		ret = *retstr != 0;
290dc20a302Sas200622 		scf_simple_prop_free(prop);
291dc20a302Sas200622 	}
292dc20a302Sas200622 	return (ret);
293dc20a302Sas200622 }
294dc20a302Sas200622 
295dc20a302Sas200622 /*
2967b59d02dSjb150015  * smb_ismaint()
2977b59d02dSjb150015  *
2987b59d02dSjb150015  * Determine if the SMF service instance is in the disabled state or
2997b59d02dSjb150015  * not. A number of operations depend on this state.
3007b59d02dSjb150015  */
3017b59d02dSjb150015 static boolean_t
3027b59d02dSjb150015 smb_ismaint(void)
3037b59d02dSjb150015 {
3047b59d02dSjb150015 	char *str;
3057b59d02dSjb150015 	boolean_t ret = B_FALSE;
3067b59d02dSjb150015 
3077b59d02dSjb150015 	if ((str = smf_get_state(SMBD_DEFAULT_INSTANCE_FMRI)) != NULL) {
3087b59d02dSjb150015 		ret = (strcmp(str, SCF_STATE_STRING_MAINT) == 0);
3097b59d02dSjb150015 		free(str);
3107b59d02dSjb150015 	}
3117b59d02dSjb150015 	return (ret);
3127b59d02dSjb150015 }
3137b59d02dSjb150015 
3147b59d02dSjb150015 /*
315da6c28aaSamw  * smb_enable_share tells the implementation that it is to enable the share.
316da6c28aaSamw  * This entails converting the path and options into the appropriate ioctl
317da6c28aaSamw  * calls. It is assumed that all error checking of paths, etc. were
318da6c28aaSamw  * done earlier.
319da6c28aaSamw  */
320da6c28aaSamw static int
321da6c28aaSamw smb_enable_share(sa_share_t share)
322da6c28aaSamw {
323da6c28aaSamw 	char *path;
324da6c28aaSamw 	char *rname;
325da6c28aaSamw 	lmshare_info_t si;
326da6c28aaSamw 	sa_resource_t resource;
327da6c28aaSamw 	boolean_t iszfs;
328da6c28aaSamw 	boolean_t privileged;
329da6c28aaSamw 	int err = SA_OK;
330da6c28aaSamw 	priv_set_t *priv_effective;
331da6c28aaSamw 	boolean_t online;
332da6c28aaSamw 
333da6c28aaSamw 	priv_effective = priv_allocset();
334da6c28aaSamw 	(void) getppriv(PRIV_EFFECTIVE, priv_effective);
335da6c28aaSamw 	privileged = (priv_isfullset(priv_effective) == B_TRUE);
336da6c28aaSamw 	priv_freeset(priv_effective);
337da6c28aaSamw 
338da6c28aaSamw 	/* get the path since it is important in several places */
339da6c28aaSamw 	path = sa_get_share_attr(share, "path");
340da6c28aaSamw 	if (path == NULL)
341da6c28aaSamw 		return (SA_NO_SUCH_PATH);
342da6c28aaSamw 
343dc20a302Sas200622 	/*
344dc20a302Sas200622 	 * If administratively disabled, don't try to start anything.
345dc20a302Sas200622 	 */
346da6c28aaSamw 	online = smb_isonline();
347dc20a302Sas200622 	if (!online && !smb_isautoenable() && smb_isdisabled())
348dc20a302Sas200622 		goto done;
349da6c28aaSamw 
350da6c28aaSamw 	iszfs = sa_path_is_zfs(path);
351da6c28aaSamw 
352da6c28aaSamw 	if (iszfs) {
353da6c28aaSamw 
354da6c28aaSamw 		if (privileged == B_FALSE && !online) {
355da6c28aaSamw 
356da6c28aaSamw 			if (!online) {
357da6c28aaSamw 				(void) printf(dgettext(TEXT_DOMAIN,
358da6c28aaSamw 				    "SMB: Cannot share remove "
359da6c28aaSamw 				    "file system: %s\n"), path);
360da6c28aaSamw 				(void) printf(dgettext(TEXT_DOMAIN,
361da6c28aaSamw 				    "SMB: Service needs to be enabled "
362da6c28aaSamw 				    "by a privileged user\n"));
363da6c28aaSamw 				err = SA_NO_PERMISSION;
364da6c28aaSamw 				errno = EPERM;
365da6c28aaSamw 			}
366da6c28aaSamw 			if (err) {
367da6c28aaSamw 				sa_free_attr_string(path);
368da6c28aaSamw 				return (err);
369da6c28aaSamw 			}
370da6c28aaSamw 
371da6c28aaSamw 		}
372da6c28aaSamw 	}
373da6c28aaSamw 
374da6c28aaSamw 	if (privileged == B_TRUE && !online) {
375da6c28aaSamw 		err = smb_enable_service();
376da6c28aaSamw 		if (err != SA_OK) {
377da6c28aaSamw 			(void) printf(dgettext(TEXT_DOMAIN,
378da6c28aaSamw 			    "SMB: Unable to enable service\n"));
379da6c28aaSamw 			/*
380da6c28aaSamw 			 * For now, it is OK to not be able to enable
381da6c28aaSamw 			 * the service.
382da6c28aaSamw 			 */
3837b59d02dSjb150015 			if (err == SA_BUSY || err == SA_SYSTEM_ERR)
384da6c28aaSamw 				err = SA_OK;
385da6c28aaSamw 		} else {
386da6c28aaSamw 			online = B_TRUE;
387da6c28aaSamw 		}
388da6c28aaSamw 	}
389da6c28aaSamw 
390da6c28aaSamw 	/*
391da6c28aaSamw 	 * Don't bother trying to start shares if the service isn't
392da6c28aaSamw 	 * running.
393da6c28aaSamw 	 */
394da6c28aaSamw 	if (!online)
395da6c28aaSamw 		goto done;
396da6c28aaSamw 
397da6c28aaSamw 	/* Each share can have multiple resources */
398da6c28aaSamw 	for (resource = sa_get_share_resource(share, NULL);
399da6c28aaSamw 	    resource != NULL;
400da6c28aaSamw 	    resource = sa_get_next_resource(resource)) {
401da6c28aaSamw 		sa_optionset_t opts;
402da6c28aaSamw 		bzero(&si, sizeof (lmshare_info_t));
403da6c28aaSamw 		rname = sa_get_resource_attr(resource, "name");
404da6c28aaSamw 		if (rname == NULL) {
405da6c28aaSamw 			sa_free_attr_string(path);
406da6c28aaSamw 			return (SA_NO_SUCH_RESOURCE);
407da6c28aaSamw 		}
408da6c28aaSamw 
409da6c28aaSamw 		opts = sa_get_derived_optionset(resource, SMB_PROTOCOL_NAME, 1);
410da6c28aaSamw 		smb_build_lmshare_info(rname, path, opts, &si);
411da6c28aaSamw 		sa_free_attr_string(rname);
412da6c28aaSamw 
413da6c28aaSamw 		sa_free_derived_optionset(opts);
414da6c28aaSamw 		if (!iszfs) {
415da6c28aaSamw 			err = lmshrd_add(&si);
416da6c28aaSamw 		} else {
417da6c28aaSamw 			share_t sh;
418da6c28aaSamw 
419da6c28aaSamw 			sa_sharetab_fill_zfs(share, &sh, "smb");
420da6c28aaSamw 			err = sa_share_zfs(share, (char *)path, &sh,
421da6c28aaSamw 			    &si, ZFS_SHARE_SMB);
422da6c28aaSamw 
423da6c28aaSamw 			sa_emptyshare(&sh);
424da6c28aaSamw 		}
425da6c28aaSamw 	}
426da6c28aaSamw 	if (!iszfs)
427da6c28aaSamw 		(void) sa_update_sharetab(share, "smb");
428da6c28aaSamw done:
429da6c28aaSamw 	sa_free_attr_string(path);
430da6c28aaSamw 
431da6c28aaSamw 	return (err == NERR_DuplicateShare ? 0 : err);
432da6c28aaSamw }
433da6c28aaSamw 
434da6c28aaSamw /*
435da6c28aaSamw  * This is the share for CIFS all shares have resource names.
436da6c28aaSamw  * Enable tells the smb server to update its hash. If it fails
437da6c28aaSamw  * because smb server is down, we just ignore as smb server loads
438da6c28aaSamw  * the resources from sharemanager at startup.
439da6c28aaSamw  */
440da6c28aaSamw 
441da6c28aaSamw static int
442da6c28aaSamw smb_enable_resource(sa_resource_t resource)
443da6c28aaSamw {
444da6c28aaSamw 	char *path;
445da6c28aaSamw 	char *rname;
446da6c28aaSamw 	sa_optionset_t opts;
447da6c28aaSamw 	sa_share_t share;
448da6c28aaSamw 	lmshare_info_t si;
449dc20a302Sas200622 	int ret = SA_OK;
450dc20a302Sas200622 	int err;
451dc20a302Sas200622 	boolean_t isonline;
452da6c28aaSamw 
453da6c28aaSamw 	share = sa_get_resource_parent(resource);
454da6c28aaSamw 	if (share == NULL)
455da6c28aaSamw 		return (SA_NO_SUCH_PATH);
456dc20a302Sas200622 
457dc20a302Sas200622 	/*
458dc20a302Sas200622 	 * If administratively disabled, don't try to start anything.
459dc20a302Sas200622 	 */
460dc20a302Sas200622 	isonline = smb_isonline();
461dc20a302Sas200622 	if (!isonline && !smb_isautoenable() && smb_isdisabled())
462dc20a302Sas200622 		goto done;
463dc20a302Sas200622 
464dc20a302Sas200622 	if (!isonline)
465dc20a302Sas200622 		ret = smb_enable_service();
466dc20a302Sas200622 	if (!smb_isonline()) {
467dc20a302Sas200622 		ret = SA_OK;
468dc20a302Sas200622 		goto done;
469dc20a302Sas200622 	}
470dc20a302Sas200622 
471da6c28aaSamw 	path = sa_get_share_attr(share, "path");
472da6c28aaSamw 	if (path == NULL)
473da6c28aaSamw 		return (SA_SYSTEM_ERR);
474da6c28aaSamw 	rname = sa_get_resource_attr(resource, "name");
475da6c28aaSamw 	if (rname == NULL) {
476da6c28aaSamw 		sa_free_attr_string(path);
477da6c28aaSamw 		return (SA_NO_SUCH_RESOURCE);
478da6c28aaSamw 	}
479da6c28aaSamw 
480da6c28aaSamw 	opts = sa_get_derived_optionset(resource, SMB_PROTOCOL_NAME, 1);
481da6c28aaSamw 	smb_build_lmshare_info(rname, path, opts, &si);
482da6c28aaSamw 	sa_free_attr_string(path);
483da6c28aaSamw 	sa_free_attr_string(rname);
484da6c28aaSamw 	sa_free_derived_optionset(opts);
485dc20a302Sas200622 
486dc20a302Sas200622 	/*
487dc20a302Sas200622 	 * Attempt to add the share. Any error that occurs if it was
488dc20a302Sas200622 	 * online is an error but don't count NERR_DuplicateName if
489dc20a302Sas200622 	 * smb/server had to be brought online since bringing the
490dc20a302Sas200622 	 * service up will enable the share that was just added prior
491dc20a302Sas200622 	 * to the attempt to enable.
492dc20a302Sas200622 	 */
493dc20a302Sas200622 
494dc20a302Sas200622 	err = lmshrd_add(&si);
495dc20a302Sas200622 	if (err == NERR_Success || !(!isonline && err == NERR_DuplicateName))
496da6c28aaSamw 		(void) sa_update_sharetab(share, "smb");
497dc20a302Sas200622 	else
498dc20a302Sas200622 		return (SA_NOT_SHARED);
499da6c28aaSamw 
500da6c28aaSamw done:
501da6c28aaSamw 	return (ret);
502da6c28aaSamw }
503da6c28aaSamw 
504da6c28aaSamw /*
505da6c28aaSamw  * Remove it from smb server hash.
506da6c28aaSamw  */
507da6c28aaSamw static int
508da6c28aaSamw smb_disable_resource(sa_resource_t resource)
509da6c28aaSamw {
510da6c28aaSamw 	char *rname;
511da6c28aaSamw 	DWORD res;
512da6c28aaSamw 	sa_share_t share;
513da6c28aaSamw 
514da6c28aaSamw 	rname = sa_get_resource_attr(resource, "name");
515da6c28aaSamw 	if (rname == NULL)
516da6c28aaSamw 		return (SA_NO_SUCH_RESOURCE);
517da6c28aaSamw 
518da6c28aaSamw 	if (smb_isonline()) {
519da6c28aaSamw 		res = lmshrd_delete(rname);
520da6c28aaSamw 		if (res != NERR_Success) {
521da6c28aaSamw 			sa_free_attr_string(rname);
522da6c28aaSamw 			return (SA_CONFIG_ERR);
523da6c28aaSamw 		}
524da6c28aaSamw 	}
5255b6e0c46Sdougm 
5265b6e0c46Sdougm 	sa_free_attr_string(rname);
5275b6e0c46Sdougm 
528da6c28aaSamw 	share = sa_get_resource_parent(resource);
529da6c28aaSamw 	if (share != NULL) {
530da6c28aaSamw 		rname = sa_get_share_attr(share, "path");
531da6c28aaSamw 		if (rname != NULL) {
5325b6e0c46Sdougm 			sa_handle_t handle;
5335b6e0c46Sdougm 
5345b6e0c46Sdougm 			handle = sa_find_group_handle((sa_group_t)resource);
5355b6e0c46Sdougm 			(void) sa_delete_sharetab(handle, rname, "smb");
536da6c28aaSamw 			sa_free_attr_string(rname);
537da6c28aaSamw 		}
538da6c28aaSamw 	}
539da6c28aaSamw 	/*
540da6c28aaSamw 	 * Always return OK as smb/server may be down and
541da6c28aaSamw 	 * Shares will be picked up when loaded.
542da6c28aaSamw 	 */
543da6c28aaSamw 	return (SA_OK);
544da6c28aaSamw }
545da6c28aaSamw 
546da6c28aaSamw /*
547da6c28aaSamw  * smb_share_changed(sa_share_t share)
548da6c28aaSamw  *
549da6c28aaSamw  * The specified share has changed.
550da6c28aaSamw  */
551da6c28aaSamw static int
552da6c28aaSamw smb_share_changed(sa_share_t share)
553da6c28aaSamw {
554da6c28aaSamw 	char *path;
555da6c28aaSamw 	sa_resource_t resource;
556da6c28aaSamw 
557da6c28aaSamw 	/* get the path since it is important in several places */
558da6c28aaSamw 	path = sa_get_share_attr(share, "path");
559da6c28aaSamw 	if (path == NULL)
560da6c28aaSamw 		return (SA_NO_SUCH_PATH);
561da6c28aaSamw 	for (resource = sa_get_share_resource(share, NULL);
562da6c28aaSamw 	    resource != NULL;
563da6c28aaSamw 	    resource = sa_get_next_resource(resource))
564da6c28aaSamw 		(void) smb_resource_changed(resource);
565da6c28aaSamw 
566da6c28aaSamw 	sa_free_attr_string(path);
567da6c28aaSamw 
568da6c28aaSamw 	return (SA_OK);
569da6c28aaSamw }
570da6c28aaSamw 
571da6c28aaSamw /*
572da6c28aaSamw  * smb_resource_changed(sa_resource_t resource)
573da6c28aaSamw  *
574da6c28aaSamw  * The specified resource has changed.
575da6c28aaSamw  */
576da6c28aaSamw static int
577da6c28aaSamw smb_resource_changed(sa_resource_t resource)
578da6c28aaSamw {
579da6c28aaSamw 	DWORD res;
580da6c28aaSamw 	lmshare_info_t si;
581da6c28aaSamw 	lmshare_info_t new_si;
582da6c28aaSamw 	char *rname, *path;
583da6c28aaSamw 	sa_optionset_t opts;
584da6c28aaSamw 	sa_share_t share;
585da6c28aaSamw 
586da6c28aaSamw 	rname = sa_get_resource_attr(resource, "name");
587da6c28aaSamw 	if (rname == NULL)
588da6c28aaSamw 		return (SA_NO_SUCH_RESOURCE);
589da6c28aaSamw 
590da6c28aaSamw 	share = sa_get_resource_parent(resource);
591da6c28aaSamw 	if (share == NULL) {
592da6c28aaSamw 		sa_free_attr_string(rname);
593da6c28aaSamw 		return (SA_CONFIG_ERR);
594da6c28aaSamw 	}
595da6c28aaSamw 
596da6c28aaSamw 	path = sa_get_share_attr(share, "path");
597da6c28aaSamw 	if (path == NULL) {
598da6c28aaSamw 		sa_free_attr_string(rname);
599da6c28aaSamw 		return (SA_NO_SUCH_PATH);
600da6c28aaSamw 	}
601da6c28aaSamw 
602da6c28aaSamw 	if (!smb_isonline()) {
603da6c28aaSamw 		sa_free_attr_string(rname);
604da6c28aaSamw 		return (SA_OK);
605da6c28aaSamw 	}
606da6c28aaSamw 
607da6c28aaSamw 	/* Update the share cache in smb/server */
608da6c28aaSamw 	res = lmshrd_getinfo(rname, &si);
609da6c28aaSamw 	if (res != NERR_Success) {
610da6c28aaSamw 		sa_free_attr_string(path);
611da6c28aaSamw 		sa_free_attr_string(rname);
612da6c28aaSamw 		return (SA_CONFIG_ERR);
613da6c28aaSamw 	}
614da6c28aaSamw 
615da6c28aaSamw 	opts = sa_get_derived_optionset(resource, SMB_PROTOCOL_NAME, 1);
616da6c28aaSamw 	smb_build_lmshare_info(rname, path, opts, &new_si);
617da6c28aaSamw 	sa_free_derived_optionset(opts);
618da6c28aaSamw 	sa_free_attr_string(path);
619da6c28aaSamw 	sa_free_attr_string(rname);
620da6c28aaSamw 
621da6c28aaSamw 	/*
622da6c28aaSamw 	 * Update all fields from sa_share_t
623da6c28aaSamw 	 * Get derived values.
624da6c28aaSamw 	 */
625da6c28aaSamw 	if (lmshrd_setinfo(&new_si) != LMSHR_DOOR_SRV_SUCCESS)
626da6c28aaSamw 		return (SA_CONFIG_ERR);
627da6c28aaSamw 	return (smb_enable_service());
628da6c28aaSamw }
629da6c28aaSamw 
630da6c28aaSamw /*
6318e314a44Sdougm  * smb_disable_share(sa_share_t share, char *path)
632da6c28aaSamw  *
6338e314a44Sdougm  * Unshare the specified share. Note that "path" is the same
6348e314a44Sdougm  * path as what is in the "share" object. It is passed in to avoid an
6358e314a44Sdougm  * additional lookup. A missing "path" value makes this a no-op
6368e314a44Sdougm  * function.
637da6c28aaSamw  */
638da6c28aaSamw static int
639da6c28aaSamw smb_disable_share(sa_share_t share, char *path)
640da6c28aaSamw {
641da6c28aaSamw 	char *rname;
642da6c28aaSamw 	sa_resource_t resource;
6438e314a44Sdougm 	sa_group_t parent;
644da6c28aaSamw 	boolean_t iszfs;
645da6c28aaSamw 	int err = SA_OK;
6465b6e0c46Sdougm 	sa_handle_t handle;
647da6c28aaSamw 
6488e314a44Sdougm 	if (path == NULL)
6498e314a44Sdougm 		return (err);
6508e314a44Sdougm 
6518e314a44Sdougm 	/*
6528e314a44Sdougm 	 * If the share is in a ZFS group we need to handle it
6538e314a44Sdougm 	 * differently.  Just being on a ZFS file system isn't
6548e314a44Sdougm 	 * enough since we may be in a legacy share case.
6558e314a44Sdougm 	 */
6568e314a44Sdougm 	parent = sa_get_parent_group(share);
6578e314a44Sdougm 	iszfs = sa_group_is_zfs(parent);
6588e314a44Sdougm 
659da6c28aaSamw 	if (!smb_isonline())
660da6c28aaSamw 		goto done;
661da6c28aaSamw 
662da6c28aaSamw 	for (resource = sa_get_share_resource(share, NULL);
663da6c28aaSamw 	    resource != NULL;
664da6c28aaSamw 	    resource = sa_get_next_resource(resource)) {
665da6c28aaSamw 		rname = sa_get_resource_attr(resource, "name");
666da6c28aaSamw 		if (rname == NULL) {
667da6c28aaSamw 			continue;
668da6c28aaSamw 		}
669da6c28aaSamw 		if (!iszfs) {
670da6c28aaSamw 			err = lmshrd_delete(rname);
671da6c28aaSamw 			switch (err) {
672da6c28aaSamw 			case NERR_NetNameNotFound:
673da6c28aaSamw 			case NERR_Success:
674da6c28aaSamw 				err = SA_OK;
675da6c28aaSamw 				break;
676da6c28aaSamw 			default:
677da6c28aaSamw 				err = SA_CONFIG_ERR;
678da6c28aaSamw 				break;
679da6c28aaSamw 			}
680da6c28aaSamw 		} else {
681da6c28aaSamw 			share_t sh;
682da6c28aaSamw 
683da6c28aaSamw 			sa_sharetab_fill_zfs(share, &sh, "smb");
684da6c28aaSamw 			err = sa_share_zfs(share, (char *)path, &sh,
685da6c28aaSamw 			    rname, ZFS_UNSHARE_SMB);
686da6c28aaSamw 			sa_emptyshare(&sh);
687da6c28aaSamw 		}
688da6c28aaSamw 		sa_free_attr_string(rname);
689da6c28aaSamw 	}
690da6c28aaSamw done:
6915b6e0c46Sdougm 	if (!iszfs) {
6925b6e0c46Sdougm 		handle = sa_find_group_handle((sa_group_t)share);
6935b6e0c46Sdougm 		if (handle != NULL)
6945b6e0c46Sdougm 			(void) sa_delete_sharetab(handle, path, "smb");
6955b6e0c46Sdougm 		else
6965b6e0c46Sdougm 			err = SA_SYSTEM_ERR;
6975b6e0c46Sdougm 	}
698da6c28aaSamw 	return (err);
699da6c28aaSamw }
700da6c28aaSamw 
701da6c28aaSamw /*
702da6c28aaSamw  * smb_validate_property(property, parent)
703da6c28aaSamw  *
704da6c28aaSamw  * Check that the property has a legitimate value for its type.
705da6c28aaSamw  */
706da6c28aaSamw 
707da6c28aaSamw static int
708da6c28aaSamw smb_validate_property(sa_property_t property, sa_optionset_t parent)
709da6c28aaSamw {
710da6c28aaSamw 	int ret = SA_OK;
711da6c28aaSamw 	char *propname;
712da6c28aaSamw 	int optindex;
713da6c28aaSamw 	sa_group_t parent_group;
714da6c28aaSamw 	char *value;
715da6c28aaSamw 
716da6c28aaSamw 	propname = sa_get_property_attr(property, "type");
717da6c28aaSamw 
718da6c28aaSamw 	if ((optindex = findopt(propname)) < 0)
719da6c28aaSamw 		ret = SA_NO_SUCH_PROP;
720da6c28aaSamw 
721da6c28aaSamw 	/* need to validate value range here as well */
722da6c28aaSamw 	if (ret == SA_OK) {
723da6c28aaSamw 		parent_group = sa_get_parent_group((sa_share_t)parent);
724da6c28aaSamw 		if (optdefs[optindex].share && !sa_is_share(parent_group))
725da6c28aaSamw 			ret = SA_PROP_SHARE_ONLY;
726da6c28aaSamw 	}
727da6c28aaSamw 	if (ret != SA_OK) {
728da6c28aaSamw 		if (propname != NULL)
729da6c28aaSamw 			sa_free_attr_string(propname);
730da6c28aaSamw 		return (ret);
731da6c28aaSamw 	}
732da6c28aaSamw 
733da6c28aaSamw 	value = sa_get_property_attr(property, "value");
734da6c28aaSamw 	if (value != NULL) {
735da6c28aaSamw 		/* first basic type checking */
736da6c28aaSamw 		switch (optdefs[optindex].type) {
737da6c28aaSamw 		case OPT_TYPE_NUMBER:
738da6c28aaSamw 			/* check that the value is all digits */
739da6c28aaSamw 			if (!is_a_number(value))
740da6c28aaSamw 				ret = SA_BAD_VALUE;
741da6c28aaSamw 			break;
742da6c28aaSamw 		case OPT_TYPE_BOOLEAN:
743da6c28aaSamw 			if (strlen(value) == 0 ||
744da6c28aaSamw 			    strcasecmp(value, "true") == 0 ||
745da6c28aaSamw 			    strcmp(value, "1") == 0 ||
746da6c28aaSamw 			    strcasecmp(value, "false") == 0 ||
747da6c28aaSamw 			    strcmp(value, "0") == 0) {
748da6c28aaSamw 				ret = SA_OK;
749da6c28aaSamw 			} else {
750da6c28aaSamw 				ret = SA_BAD_VALUE;
751da6c28aaSamw 			}
752da6c28aaSamw 			break;
753da6c28aaSamw 		case OPT_TYPE_NAME:
754da6c28aaSamw 			/*
755da6c28aaSamw 			 * Make sure no invalid characters
756da6c28aaSamw 			 */
757da6c28aaSamw 			if (validresource(value) == B_FALSE)
758da6c28aaSamw 				ret = SA_BAD_VALUE;
759da6c28aaSamw 			break;
760da6c28aaSamw 		case OPT_TYPE_STRING:
761da6c28aaSamw 			/* whatever is here should be ok */
762da6c28aaSamw 			break;
763da6c28aaSamw 		default:
764da6c28aaSamw 			break;
765da6c28aaSamw 		}
766da6c28aaSamw 	}
767da6c28aaSamw 
768da6c28aaSamw 	if (value != NULL)
769da6c28aaSamw 		sa_free_attr_string(value);
770da6c28aaSamw 	if (ret == SA_OK && optdefs[optindex].check != NULL)
771da6c28aaSamw 		/* do the property specific check */
772da6c28aaSamw 		ret = optdefs[optindex].check(property);
773da6c28aaSamw 
774da6c28aaSamw 	if (propname != NULL)
775da6c28aaSamw 		sa_free_attr_string(propname);
776da6c28aaSamw 	return (ret);
777da6c28aaSamw }
778da6c28aaSamw 
779da6c28aaSamw /*
780da6c28aaSamw  * Protocol management functions
781da6c28aaSamw  *
782da6c28aaSamw  * properties defined in the default files are defined in
783da6c28aaSamw  * proto_option_defs for parsing and validation.
784da6c28aaSamw  */
785da6c28aaSamw 
786da6c28aaSamw struct smb_proto_option_defs {
787da6c28aaSamw 	int smb_index;
788da6c28aaSamw 	int32_t minval;
789da6c28aaSamw 	int32_t maxval; /* In case of length of string this should be max */
790da6c28aaSamw 	int (*validator)(int, char *);
791da6c28aaSamw 	int32_t	refresh;
792da6c28aaSamw } smb_proto_options[] = {
793dc20a302Sas200622 	{ SMB_CI_SYS_CMNT, 0, MAX_VALUE_BUFLEN,
794da6c28aaSamw 	    string_length_check_validator, SMB_REFRESH_REFRESH },
795dc20a302Sas200622 	{ SMB_CI_MAX_WORKERS, 64, 1024, range_check_validator,
796da6c28aaSamw 	    SMB_REFRESH_REFRESH },
797dc20a302Sas200622 	{ SMB_CI_NBSCOPE, 0, MAX_VALUE_BUFLEN,
798dc20a302Sas200622 	    string_length_check_validator, 0 },
799dc20a302Sas200622 	{ SMB_CI_LM_LEVEL, 2, 5, range_check_validator, 0 },
800dc20a302Sas200622 	{ SMB_CI_KEEPALIVE, 20, 5400, range_check_validator_zero_ok,
801da6c28aaSamw 	    SMB_REFRESH_REFRESH },
802dc20a302Sas200622 	{ SMB_CI_WINS_SRV1, 0, MAX_VALUE_BUFLEN,
803da6c28aaSamw 	    ip_address_validator_empty_ok, SMB_REFRESH_REFRESH },
804dc20a302Sas200622 	{ SMB_CI_WINS_SRV2, 0, MAX_VALUE_BUFLEN,
805da6c28aaSamw 	    ip_address_validator_empty_ok, SMB_REFRESH_REFRESH },
806dc20a302Sas200622 	{ SMB_CI_WINS_EXCL, 0, MAX_VALUE_BUFLEN,
807da6c28aaSamw 	    ip_address_csv_list_validator_empty_ok, SMB_REFRESH_REFRESH },
808dc20a302Sas200622 	{ SMB_CI_SIGNING_ENABLE, 0, 0, true_false_validator,
809da6c28aaSamw 	    SMB_REFRESH_REFRESH },
810dc20a302Sas200622 	{ SMB_CI_SIGNING_REQD, 0, 0, true_false_validator,
811da6c28aaSamw 	    SMB_REFRESH_REFRESH },
812dc20a302Sas200622 	{ SMB_CI_RESTRICT_ANON, 0, 0, true_false_validator,
813da6c28aaSamw 	    SMB_REFRESH_REFRESH },
814dc20a302Sas200622 	{ SMB_CI_DOMAIN_SRV, 0, MAX_VALUE_BUFLEN,
815dc20a302Sas200622 	    ip_address_validator_empty_ok, 0 },
816dc20a302Sas200622 	{ SMB_CI_ADS_SITE, 0, MAX_VALUE_BUFLEN,
817da6c28aaSamw 	    string_length_check_validator, SMB_REFRESH_REFRESH },
818dc20a302Sas200622 	{ SMB_CI_DYNDNS_ENABLE, 0, 0, true_false_validator, 0 },
819dc20a302Sas200622 	{ SMB_CI_AUTOHOME_MAP, 0, MAX_VALUE_BUFLEN, path_validator, 0 },
820da6c28aaSamw };
821da6c28aaSamw 
822dc20a302Sas200622 #define	SMB_OPT_NUM \
823dc20a302Sas200622 	(sizeof (smb_proto_options) / sizeof (smb_proto_options[0]))
824dc20a302Sas200622 
825da6c28aaSamw /*
826da6c28aaSamw  * Check the range of value as int range.
827da6c28aaSamw  */
828da6c28aaSamw static int
829da6c28aaSamw range_check_validator(int index, char *value)
830da6c28aaSamw {
831da6c28aaSamw 	int ret = SA_OK;
832da6c28aaSamw 
833da6c28aaSamw 	if (!is_a_number(value)) {
834da6c28aaSamw 		ret = SA_BAD_VALUE;
835da6c28aaSamw 	} else {
836da6c28aaSamw 		int val;
837da6c28aaSamw 		val = strtoul(value, NULL, 0);
838da6c28aaSamw 		if (val < smb_proto_options[index].minval ||
839da6c28aaSamw 		    val > smb_proto_options[index].maxval)
840da6c28aaSamw 			ret = SA_BAD_VALUE;
841da6c28aaSamw 	}
842da6c28aaSamw 	return (ret);
843da6c28aaSamw }
844da6c28aaSamw 
845da6c28aaSamw /*
846da6c28aaSamw  * Check the range of value as int range.
847da6c28aaSamw  */
848da6c28aaSamw static int
849da6c28aaSamw range_check_validator_zero_ok(int index, char *value)
850da6c28aaSamw {
851da6c28aaSamw 	int ret = SA_OK;
852da6c28aaSamw 
853da6c28aaSamw 	if (!is_a_number(value)) {
854da6c28aaSamw 		ret = SA_BAD_VALUE;
855da6c28aaSamw 	} else {
856da6c28aaSamw 		int val;
857da6c28aaSamw 		val = strtoul(value, NULL, 0);
858da6c28aaSamw 		if (val == 0)
859da6c28aaSamw 			ret = SA_OK;
860da6c28aaSamw 		else {
861da6c28aaSamw 			if (val < smb_proto_options[index].minval ||
862da6c28aaSamw 			    val > smb_proto_options[index].maxval)
863da6c28aaSamw 			ret = SA_BAD_VALUE;
864da6c28aaSamw 		}
865da6c28aaSamw 	}
866da6c28aaSamw 	return (ret);
867da6c28aaSamw }
868da6c28aaSamw 
869da6c28aaSamw /*
870da6c28aaSamw  * Check the length of the string
871da6c28aaSamw  */
872da6c28aaSamw static int
873da6c28aaSamw string_length_check_validator(int index, char *value)
874da6c28aaSamw {
875da6c28aaSamw 	int ret = SA_OK;
876da6c28aaSamw 
877da6c28aaSamw 	if (value == NULL)
878da6c28aaSamw 		return (SA_BAD_VALUE);
879da6c28aaSamw 	if (strlen(value) > smb_proto_options[index].maxval)
880da6c28aaSamw 		ret = SA_BAD_VALUE;
881da6c28aaSamw 	return (ret);
882da6c28aaSamw }
883da6c28aaSamw 
884da6c28aaSamw /*
885da6c28aaSamw  * Check yes/no
886da6c28aaSamw  */
887da6c28aaSamw /*ARGSUSED*/
888da6c28aaSamw static int
889da6c28aaSamw true_false_validator(int index, char *value)
890da6c28aaSamw {
891da6c28aaSamw 	if (value == NULL)
892da6c28aaSamw 		return (SA_BAD_VALUE);
893da6c28aaSamw 	if ((strcasecmp(value, "true") == 0) ||
894da6c28aaSamw 	    (strcasecmp(value, "false") == 0))
895da6c28aaSamw 		return (SA_OK);
896da6c28aaSamw 	return (SA_BAD_VALUE);
897da6c28aaSamw }
898da6c28aaSamw 
899da6c28aaSamw /*
900da6c28aaSamw  * Check IP address.
901da6c28aaSamw  */
902da6c28aaSamw /*ARGSUSED*/
903da6c28aaSamw static int
904da6c28aaSamw ip_address_validator_empty_ok(int index, char *value)
905da6c28aaSamw {
906da6c28aaSamw 	char sbytes[16];
907da6c28aaSamw 	int len;
908da6c28aaSamw 
909da6c28aaSamw 	if (value == NULL)
910da6c28aaSamw 		return (SA_OK);
911da6c28aaSamw 	len = strlen(value);
912da6c28aaSamw 	if (len == 0)
913da6c28aaSamw 		return (SA_OK);
914da6c28aaSamw 	if (inet_pton(AF_INET, value, (void *)sbytes) != 1)
915da6c28aaSamw 		return (SA_BAD_VALUE);
916da6c28aaSamw 
917da6c28aaSamw 	return (SA_OK);
918da6c28aaSamw }
919da6c28aaSamw 
920da6c28aaSamw /*
921da6c28aaSamw  * Check IP address list
922da6c28aaSamw  */
923da6c28aaSamw /*ARGSUSED*/
924da6c28aaSamw static int
925da6c28aaSamw ip_address_csv_list_validator_empty_ok(int index, char *value)
926da6c28aaSamw {
927da6c28aaSamw 	char sbytes[16];
928da6c28aaSamw 	char *ip, *tmp, *ctx;
929da6c28aaSamw 
930da6c28aaSamw 	if (value == NULL || *value == '\0')
931da6c28aaSamw 		return (SA_OK);
932da6c28aaSamw 
933da6c28aaSamw 	if (strlen(value) > MAX_VALUE_BUFLEN)
934da6c28aaSamw 		return (SA_BAD_VALUE);
935da6c28aaSamw 
936da6c28aaSamw 	if ((tmp = strdup(value)) == NULL)
937da6c28aaSamw 		return (SA_NO_MEMORY);
938da6c28aaSamw 
939da6c28aaSamw 	ip = strtok_r(tmp, ",", &ctx);
940da6c28aaSamw 	while (ip) {
941da6c28aaSamw 		if (strlen(ip) == 0) {
942da6c28aaSamw 			free(tmp);
943da6c28aaSamw 			return (SA_BAD_VALUE);
944da6c28aaSamw 		}
945da6c28aaSamw 		if (*ip != 0) {
946da6c28aaSamw 			if (inet_pton(AF_INET, ip,
947da6c28aaSamw 			    (void *)sbytes) != 1) {
948da6c28aaSamw 				free(tmp);
949da6c28aaSamw 				return (SA_BAD_VALUE);
950da6c28aaSamw 			}
951da6c28aaSamw 		}
952da6c28aaSamw 		ip = strtok_r(0, ",", &ctx);
953da6c28aaSamw 	}
954da6c28aaSamw 
955da6c28aaSamw 	free(tmp);
956da6c28aaSamw 	return (SA_OK);
957da6c28aaSamw }
958da6c28aaSamw 
959da6c28aaSamw /*
960da6c28aaSamw  * Check path
961da6c28aaSamw  */
962da6c28aaSamw /*ARGSUSED*/
963da6c28aaSamw static int
964da6c28aaSamw path_validator(int index, char *value)
965da6c28aaSamw {
966da6c28aaSamw 	struct stat buffer;
967da6c28aaSamw 	int fd, status;
968da6c28aaSamw 
969da6c28aaSamw 	if (value == NULL)
970da6c28aaSamw 		return (SA_BAD_VALUE);
971da6c28aaSamw 
972da6c28aaSamw 	fd = open(value, O_RDONLY);
973da6c28aaSamw 	if (fd < 0)
974da6c28aaSamw 		return (SA_BAD_VALUE);
975da6c28aaSamw 
976da6c28aaSamw 	status = fstat(fd, &buffer);
977da6c28aaSamw 	(void) close(fd);
978da6c28aaSamw 
979da6c28aaSamw 	if (status < 0)
980da6c28aaSamw 		return (SA_BAD_VALUE);
981da6c28aaSamw 
982da6c28aaSamw 	if (buffer.st_mode & S_IFDIR)
983da6c28aaSamw 		return (SA_OK);
984da6c28aaSamw 	return (SA_BAD_VALUE);
985da6c28aaSamw }
986da6c28aaSamw 
987da6c28aaSamw /*
988da6c28aaSamw  * the protoset holds the defined options so we don't have to read
989da6c28aaSamw  * them multiple times
990da6c28aaSamw  */
991da6c28aaSamw static sa_protocol_properties_t protoset;
992da6c28aaSamw 
993da6c28aaSamw static int
994da6c28aaSamw findprotoopt(char *name)
995da6c28aaSamw {
996da6c28aaSamw 	int i;
997dc20a302Sas200622 	char *sc_name;
998dc20a302Sas200622 
999dc20a302Sas200622 	for (i = 0; i < SMB_OPT_NUM; i++) {
1000dc20a302Sas200622 		sc_name = smb_config_getname(smb_proto_options[i].smb_index);
1001dc20a302Sas200622 		if (strcasecmp(sc_name, name) == 0)
1002da6c28aaSamw 			return (i);
1003da6c28aaSamw 	}
1004dc20a302Sas200622 
1005da6c28aaSamw 	return (-1);
1006da6c28aaSamw }
1007da6c28aaSamw 
1008da6c28aaSamw /*
1009da6c28aaSamw  * smb_load_proto_properties()
1010da6c28aaSamw  *
1011da6c28aaSamw  * read the smb config values from SMF.
1012da6c28aaSamw  */
1013da6c28aaSamw 
1014da6c28aaSamw static int
1015da6c28aaSamw smb_load_proto_properties()
1016da6c28aaSamw {
1017da6c28aaSamw 	sa_property_t prop;
1018dc20a302Sas200622 	char value[MAX_VALUE_BUFLEN];
1019dc20a302Sas200622 	char *name;
1020da6c28aaSamw 	int index;
1021e7bab347Sdougm 	int ret = SA_OK;
1022dc20a302Sas200622 	int rc;
1023da6c28aaSamw 
1024da6c28aaSamw 	protoset = sa_create_protocol_properties(SMB_PROTOCOL_NAME);
1025da6c28aaSamw 	if (protoset == NULL)
1026da6c28aaSamw 		return (SA_NO_MEMORY);
1027da6c28aaSamw 
1028e7bab347Sdougm 	for (index = 0; index < SMB_OPT_NUM && ret == SA_OK; index++) {
1029dc20a302Sas200622 		rc = smb_config_get(smb_proto_options[index].smb_index,
1030dc20a302Sas200622 		    value, sizeof (value));
1031dc20a302Sas200622 		if (rc != SMBD_SMF_OK)
1032dc20a302Sas200622 			continue;
1033dc20a302Sas200622 		name = smb_config_getname(smb_proto_options[index].smb_index);
1034dc20a302Sas200622 		prop = sa_create_property(name, value);
103597df5ac9Sdougm 		if (prop != NULL)
1036e7bab347Sdougm 			ret = sa_add_protocol_property(protoset, prop);
1037e7bab347Sdougm 		else
1038e7bab347Sdougm 			ret = SA_NO_MEMORY;
1039da6c28aaSamw 	}
1040e7bab347Sdougm 	return (ret);
1041da6c28aaSamw }
1042da6c28aaSamw 
1043da6c28aaSamw /*
1044da6c28aaSamw  * smb_share_init()
1045da6c28aaSamw  *
1046da6c28aaSamw  * Initialize the smb plugin.
1047da6c28aaSamw  */
1048da6c28aaSamw 
1049da6c28aaSamw static int
1050da6c28aaSamw smb_share_init(void)
1051da6c28aaSamw {
1052da6c28aaSamw 	int ret = SA_OK;
1053da6c28aaSamw 
1054da6c28aaSamw 	if (sa_plugin_ops.sa_init != smb_share_init)
1055da6c28aaSamw 		return (SA_SYSTEM_ERR);
1056da6c28aaSamw 
1057e7bab347Sdougm 	ret = smb_load_proto_properties();
1058da6c28aaSamw 
1059da6c28aaSamw 	return (ret);
1060da6c28aaSamw }
1061da6c28aaSamw 
1062da6c28aaSamw /*
1063da6c28aaSamw  * smb_share_fini()
1064da6c28aaSamw  *
1065da6c28aaSamw  */
1066da6c28aaSamw static void
1067da6c28aaSamw smb_share_fini(void)
1068da6c28aaSamw {
1069da6c28aaSamw 	xmlFreeNode(protoset);
1070da6c28aaSamw 	protoset = NULL;
1071dc20a302Sas200622 
1072dc20a302Sas200622 	(void) lmshrd_door_close();
1073da6c28aaSamw }
1074da6c28aaSamw 
1075da6c28aaSamw /*
1076da6c28aaSamw  * smb_get_proto_set()
1077da6c28aaSamw  *
1078da6c28aaSamw  * Return an optionset with all the protocol specific properties in
1079da6c28aaSamw  * it.
1080da6c28aaSamw  */
1081da6c28aaSamw static sa_protocol_properties_t
1082da6c28aaSamw smb_get_proto_set(void)
1083da6c28aaSamw {
1084da6c28aaSamw 	return (protoset);
1085da6c28aaSamw }
1086da6c28aaSamw 
1087da6c28aaSamw /*
1088dc20a302Sas200622  * smb_enable_dependencies()
1089dc20a302Sas200622  *
1090dc20a302Sas200622  * SMBD_DEFAULT_INSTANCE_FMRI may have some dependencies that aren't
1091dc20a302Sas200622  * enabled. This will attempt to enable all of them.
1092dc20a302Sas200622  */
1093dc20a302Sas200622 static void
1094dc20a302Sas200622 smb_enable_dependencies(const char *fmri)
1095dc20a302Sas200622 {
1096dc20a302Sas200622 	scf_handle_t *handle;
1097dc20a302Sas200622 	scf_service_t *service;
1098dc20a302Sas200622 	scf_instance_t *inst = NULL;
1099dc20a302Sas200622 	scf_iter_t *iter;
1100dc20a302Sas200622 	scf_property_t *prop;
1101dc20a302Sas200622 	scf_value_t *value;
1102dc20a302Sas200622 	scf_propertygroup_t *pg;
1103dc20a302Sas200622 	scf_scope_t *scope;
1104dc20a302Sas200622 	char type[SCFTYPE_LEN];
1105dc20a302Sas200622 	char *dependency;
1106dc20a302Sas200622 	char *servname;
1107dc20a302Sas200622 	int maxlen;
1108dc20a302Sas200622 
1109dc20a302Sas200622 	/*
1110dc20a302Sas200622 	 * Get all required handles and storage.
1111dc20a302Sas200622 	 */
1112dc20a302Sas200622 	handle = scf_handle_create(SCF_VERSION);
1113dc20a302Sas200622 	if (handle == NULL)
1114dc20a302Sas200622 		return;
1115dc20a302Sas200622 
1116dc20a302Sas200622 	if (scf_handle_bind(handle) != 0) {
1117dc20a302Sas200622 		scf_handle_destroy(handle);
1118dc20a302Sas200622 		return;
1119dc20a302Sas200622 	}
1120dc20a302Sas200622 
1121dc20a302Sas200622 	maxlen = scf_limit(SCF_LIMIT_MAX_VALUE_LENGTH);
1122dc20a302Sas200622 	if (maxlen == (ssize_t)-1)
1123dc20a302Sas200622 		maxlen = MAXPATHLEN;
1124dc20a302Sas200622 
1125dc20a302Sas200622 	dependency = malloc(maxlen);
1126dc20a302Sas200622 
1127dc20a302Sas200622 	service = scf_service_create(handle);
1128dc20a302Sas200622 
1129dc20a302Sas200622 	iter = scf_iter_create(handle);
1130dc20a302Sas200622 
1131dc20a302Sas200622 	pg = scf_pg_create(handle);
1132dc20a302Sas200622 
1133dc20a302Sas200622 	prop = scf_property_create(handle);
1134dc20a302Sas200622 
1135dc20a302Sas200622 	value = scf_value_create(handle);
1136dc20a302Sas200622 
1137dc20a302Sas200622 	scope = scf_scope_create(handle);
1138dc20a302Sas200622 
1139dc20a302Sas200622 	if (service == NULL || iter == NULL || pg == NULL || prop == NULL ||
1140dc20a302Sas200622 	    value == NULL || scope == NULL || dependency == NULL)
1141dc20a302Sas200622 		goto done;
1142dc20a302Sas200622 
1143dc20a302Sas200622 	/*
1144dc20a302Sas200622 	 *  We passed in the FMRI for the default instance but for
1145dc20a302Sas200622 	 *  some things we need the simple form so construct it. Since
1146dc20a302Sas200622 	 *  we reuse the storage that dependency points to, we need to
1147dc20a302Sas200622 	 *  use the servname early.
1148dc20a302Sas200622 	 */
1149dc20a302Sas200622 	(void) snprintf(dependency, maxlen, "%s", fmri + sizeof ("svc:"));
1150dc20a302Sas200622 	servname = strrchr(dependency, ':');
1151dc20a302Sas200622 	if (servname == NULL)
1152dc20a302Sas200622 		goto done;
1153dc20a302Sas200622 	*servname = '\0';
1154dc20a302Sas200622 	servname = dependency;
1155dc20a302Sas200622 
1156dc20a302Sas200622 	/*
1157dc20a302Sas200622 	 * Setup to iterate over the service property groups, only
1158dc20a302Sas200622 	 * looking at those that are "dependency" types. The "entity"
1159dc20a302Sas200622 	 * property will have the FMRI of the service we are dependent
1160dc20a302Sas200622 	 * on.
1161dc20a302Sas200622 	 */
1162dc20a302Sas200622 	if (scf_handle_get_scope(handle, SCF_SCOPE_LOCAL, scope) != 0)
1163dc20a302Sas200622 		goto done;
1164dc20a302Sas200622 
1165dc20a302Sas200622 	if (scf_scope_get_service(scope, servname, service) != 0)
1166dc20a302Sas200622 		goto done;
1167dc20a302Sas200622 
1168dc20a302Sas200622 	if (scf_iter_service_pgs(iter, service) != 0)
1169dc20a302Sas200622 		goto done;
1170dc20a302Sas200622 
1171dc20a302Sas200622 	while (scf_iter_next_pg(iter, pg) > 0) {
1172dc20a302Sas200622 		char *services[2];
1173dc20a302Sas200622 		/*
1174dc20a302Sas200622 		 * Have a property group for the service. See if it is
1175dc20a302Sas200622 		 * a dependency pg and only do operations on those.
1176dc20a302Sas200622 		 */
1177dc20a302Sas200622 		if (scf_pg_get_type(pg, type, SCFTYPE_LEN) <= 0)
1178dc20a302Sas200622 			continue;
1179dc20a302Sas200622 
1180dc20a302Sas200622 		if (strncmp(type, SCF_GROUP_DEPENDENCY, SCFTYPE_LEN) != 0)
1181dc20a302Sas200622 			continue;
1182dc20a302Sas200622 		/*
1183dc20a302Sas200622 		 * Have a dependency.  Attempt to enable it.
1184dc20a302Sas200622 		 */
1185dc20a302Sas200622 		if (scf_pg_get_property(pg, SCF_PROPERTY_ENTITIES, prop) != 0)
1186dc20a302Sas200622 			continue;
1187dc20a302Sas200622 
1188dc20a302Sas200622 		if (scf_property_get_value(prop, value) != 0)
1189dc20a302Sas200622 			continue;
1190dc20a302Sas200622 
1191dc20a302Sas200622 		services[1] = NULL;
1192dc20a302Sas200622 
1193dc20a302Sas200622 		if (scf_value_get_as_string(value, dependency, maxlen) > 0) {
1194dc20a302Sas200622 			services[0] = dependency;
1195dc20a302Sas200622 			_check_services(services);
1196dc20a302Sas200622 		}
1197dc20a302Sas200622 	}
1198dc20a302Sas200622 
1199dc20a302Sas200622 done:
1200dc20a302Sas200622 	if (dependency != NULL)
1201dc20a302Sas200622 		free(dependency);
1202dc20a302Sas200622 	if (value != NULL)
1203dc20a302Sas200622 		scf_value_destroy(value);
1204dc20a302Sas200622 	if (prop != NULL)
1205dc20a302Sas200622 		scf_property_destroy(prop);
1206dc20a302Sas200622 	if (pg != NULL)
1207dc20a302Sas200622 		scf_pg_destroy(pg);
1208dc20a302Sas200622 	if (iter != NULL)
1209dc20a302Sas200622 		scf_iter_destroy(iter);
1210dc20a302Sas200622 	if (scope != NULL)
1211dc20a302Sas200622 		scf_scope_destroy(scope);
1212dc20a302Sas200622 	if (inst != NULL)
1213dc20a302Sas200622 		scf_instance_destroy(inst);
1214dc20a302Sas200622 	if (service != NULL)
1215dc20a302Sas200622 		scf_service_destroy(service);
1216dc20a302Sas200622 
1217dc20a302Sas200622 	(void) scf_handle_unbind(handle);
1218dc20a302Sas200622 	scf_handle_destroy(handle);
1219dc20a302Sas200622 }
1220dc20a302Sas200622 
1221dc20a302Sas200622 /*
1222da6c28aaSamw  * How long to wait for service to come online
1223da6c28aaSamw  */
1224da6c28aaSamw #define	WAIT_FOR_SERVICE	15
1225da6c28aaSamw 
1226da6c28aaSamw /*
1227da6c28aaSamw  * smb_enable_service()
1228da6c28aaSamw  *
1229da6c28aaSamw  */
1230da6c28aaSamw static int
1231da6c28aaSamw smb_enable_service(void)
1232da6c28aaSamw {
1233da6c28aaSamw 	int i;
1234da6c28aaSamw 	int ret = SA_OK;
1235dc20a302Sas200622 	char *service[] = { SMBD_DEFAULT_INSTANCE_FMRI, NULL };
1236da6c28aaSamw 
1237da6c28aaSamw 	if (!smb_isonline()) {
1238dc20a302Sas200622 		/*
1239dc20a302Sas200622 		 * Attempt to start the idmap, and other dependent
1240dc20a302Sas200622 		 * services, first.  If it fails, the SMB service will
1241dc20a302Sas200622 		 * ultimately fail so we use that as the error.  If we
1242dc20a302Sas200622 		 * don't try to enable idmap, smb won't start the
1243dc20a302Sas200622 		 * first time unless the admin has done it
1244dc20a302Sas200622 		 * manually. The service could be administratively
1245dc20a302Sas200622 		 * disabled so we won't always get started.
1246dc20a302Sas200622 		 */
1247dc20a302Sas200622 		smb_enable_dependencies(SMBD_DEFAULT_INSTANCE_FMRI);
1248dc20a302Sas200622 		_check_services(service);
1249da6c28aaSamw 
1250da6c28aaSamw 		/* Wait for service to come online */
1251da6c28aaSamw 		for (i = 0; i < WAIT_FOR_SERVICE; i++) {
1252da6c28aaSamw 			if (smb_isonline()) {
1253da6c28aaSamw 				ret =  SA_OK;
1254da6c28aaSamw 				break;
12557b59d02dSjb150015 			} else if (smb_ismaint()) {
12567b59d02dSjb150015 				/* maintenance requires help */
12577b59d02dSjb150015 				ret = SA_SYSTEM_ERR;
12587b59d02dSjb150015 				break;
12597b59d02dSjb150015 			} else if (smb_isdisabled()) {
12607b59d02dSjb150015 				/* disabled is ok */
12617b59d02dSjb150015 				ret = SA_OK;
12627b59d02dSjb150015 				break;
1263da6c28aaSamw 			} else {
12647b59d02dSjb150015 				/* try another time */
1265da6c28aaSamw 				ret = SA_BUSY;
1266da6c28aaSamw 				(void) sleep(1);
1267da6c28aaSamw 			}
1268da6c28aaSamw 		}
1269da6c28aaSamw 	}
1270da6c28aaSamw 	return (ret);
1271da6c28aaSamw }
1272da6c28aaSamw 
1273da6c28aaSamw /*
1274da6c28aaSamw  * smb_validate_proto_prop(index, name, value)
1275da6c28aaSamw  *
1276da6c28aaSamw  * Verify that the property specified by name can take the new
1277da6c28aaSamw  * value. This is a sanity check to prevent bad values getting into
1278da6c28aaSamw  * the default files.
1279da6c28aaSamw  */
1280da6c28aaSamw static int
1281da6c28aaSamw smb_validate_proto_prop(int index, char *name, char *value)
1282da6c28aaSamw {
1283da6c28aaSamw 	if ((name == NULL) || (index < 0))
1284da6c28aaSamw 		return (SA_BAD_VALUE);
1285da6c28aaSamw 
1286da6c28aaSamw 	if (smb_proto_options[index].validator == NULL)
1287da6c28aaSamw 		return (SA_OK);
1288da6c28aaSamw 
1289da6c28aaSamw 	if (smb_proto_options[index].validator(index, value) == SA_OK)
1290da6c28aaSamw 		return (SA_OK);
1291da6c28aaSamw 	return (SA_BAD_VALUE);
1292da6c28aaSamw }
1293da6c28aaSamw 
1294da6c28aaSamw /*
1295da6c28aaSamw  * smb_set_proto_prop(prop)
1296da6c28aaSamw  *
1297da6c28aaSamw  * check that prop is valid.
1298da6c28aaSamw  */
1299da6c28aaSamw /*ARGSUSED*/
1300da6c28aaSamw static int
1301da6c28aaSamw smb_set_proto_prop(sa_property_t prop)
1302da6c28aaSamw {
1303da6c28aaSamw 	int ret = SA_OK;
1304da6c28aaSamw 	char *name;
1305da6c28aaSamw 	char *value;
1306da6c28aaSamw 	int index = -1;
130755bf511dSas200622 	struct smb_proto_option_defs *opt;
1308da6c28aaSamw 
1309da6c28aaSamw 	name = sa_get_property_attr(prop, "type");
1310da6c28aaSamw 	value = sa_get_property_attr(prop, "value");
1311da6c28aaSamw 	if (name != NULL && value != NULL) {
1312da6c28aaSamw 		index = findprotoopt(name);
1313da6c28aaSamw 		if (index >= 0) {
1314da6c28aaSamw 			/* should test for valid value */
1315da6c28aaSamw 			ret = smb_validate_proto_prop(index, name, value);
1316da6c28aaSamw 			if (ret == SA_OK) {
131755bf511dSas200622 				opt = &smb_proto_options[index];
131855bf511dSas200622 
1319da6c28aaSamw 				/* Save to SMF */
1320dc20a302Sas200622 				(void) smb_config_set(opt->smb_index, value);
1321da6c28aaSamw 				/*
1322da6c28aaSamw 				 * Specialized refresh mechanisms can
1323da6c28aaSamw 				 * be flagged in the proto_options and
1324da6c28aaSamw 				 * processed here.
1325da6c28aaSamw 				 */
132655bf511dSas200622 				if (opt->refresh & SMB_REFRESH_REFRESH)
1327*faa1795aSjb150015 					(void) smf_refresh_instance(
1328*faa1795aSjb150015 					    SMBD_DEFAULT_INSTANCE_FMRI);
132955bf511dSas200622 				else if (opt->refresh & SMB_REFRESH_RESTART)
1330da6c28aaSamw 					(void) smf_restart_instance(
1331da6c28aaSamw 					    SMBD_DEFAULT_INSTANCE_FMRI);
1332da6c28aaSamw 			}
1333da6c28aaSamw 		}
1334da6c28aaSamw 	}
133555bf511dSas200622 
1336da6c28aaSamw 	if (name != NULL)
1337da6c28aaSamw 		sa_free_attr_string(name);
1338da6c28aaSamw 	if (value != NULL)
1339da6c28aaSamw 		sa_free_attr_string(value);
1340da6c28aaSamw 
1341da6c28aaSamw 	return (ret);
1342da6c28aaSamw }
1343da6c28aaSamw 
1344da6c28aaSamw /*
1345da6c28aaSamw  * smb_get_status()
1346da6c28aaSamw  *
1347da6c28aaSamw  * What is the current status of the smbd? We use the SMF state here.
1348da6c28aaSamw  * Caller must free the returned value.
1349da6c28aaSamw  */
1350da6c28aaSamw 
1351da6c28aaSamw static char *
1352da6c28aaSamw smb_get_status(void)
1353da6c28aaSamw {
1354da6c28aaSamw 	char *state = NULL;
1355da6c28aaSamw 	state = smf_get_state(SMBD_DEFAULT_INSTANCE_FMRI);
1356da6c28aaSamw 	return (state != NULL ? state : "-");
1357da6c28aaSamw }
1358da6c28aaSamw 
1359da6c28aaSamw /*
1360da6c28aaSamw  * This protocol plugin require resource names
1361da6c28aaSamw  */
1362da6c28aaSamw static uint64_t
1363da6c28aaSamw smb_share_features(void)
1364da6c28aaSamw {
1365da6c28aaSamw 	return (SA_FEATURE_RESOURCE | SA_FEATURE_ALLOWSUBDIRS |
13669e5da854Sdougm 	    SA_FEATURE_ALLOWPARDIRS | SA_FEATURE_SERVER);
1367da6c28aaSamw }
1368da6c28aaSamw 
1369da6c28aaSamw /*
1370da6c28aaSamw  * This should be used to convert lmshare_info to sa_resource_t
1371da6c28aaSamw  * Should only be needed to build temp shares/resources to be
1372da6c28aaSamw  * supplied to sharemanager to display temp shares.
1373da6c28aaSamw  */
1374da6c28aaSamw static int
1375da6c28aaSamw smb_build_tmp_sa_resource(sa_handle_t handle, lmshare_info_t *si)
1376da6c28aaSamw {
1377da6c28aaSamw 	int err;
1378da6c28aaSamw 	sa_share_t share;
1379da6c28aaSamw 	sa_group_t group;
1380da6c28aaSamw 	sa_resource_t resource;
1381da6c28aaSamw 
1382da6c28aaSamw 	if (si == NULL)
1383da6c28aaSamw 		return (SA_INVALID_NAME);
1384da6c28aaSamw 
1385da6c28aaSamw 	/*
1386da6c28aaSamw 	 * First determine if the "share path" is already shared
1387da6c28aaSamw 	 * somewhere. If it is, we have to use it as the authority on
1388da6c28aaSamw 	 * where the transient share lives so will use it's parent
1389da6c28aaSamw 	 * group. If it doesn't exist, it needs to land in "smb".
1390da6c28aaSamw 	 */
1391da6c28aaSamw 
1392da6c28aaSamw 	share = sa_find_share(handle, si->directory);
1393da6c28aaSamw 	if (share != NULL) {
1394da6c28aaSamw 		group = sa_get_parent_group(share);
1395da6c28aaSamw 	} else {
1396da6c28aaSamw 		group = smb_get_smb_share_group(handle);
1397da6c28aaSamw 		if (group == NULL)
1398da6c28aaSamw 			return (SA_NO_SUCH_GROUP);
1399da6c28aaSamw 		share = sa_get_share(group, si->directory);
1400da6c28aaSamw 		if (share == NULL) {
1401da6c28aaSamw 			share = sa_add_share(group, si->directory,
1402da6c28aaSamw 			    SA_SHARE_TRANSIENT, &err);
1403da6c28aaSamw 			if (share == NULL)
1404da6c28aaSamw 				return (SA_NO_SUCH_PATH);
1405da6c28aaSamw 		}
1406da6c28aaSamw 	}
1407da6c28aaSamw 
1408da6c28aaSamw 	/*
1409da6c28aaSamw 	 * Now handle the resource. Make sure that the resource is
1410da6c28aaSamw 	 * transient and added to the share.
1411da6c28aaSamw 	 */
1412da6c28aaSamw 	resource = sa_get_share_resource(share, si->share_name);
1413da6c28aaSamw 	if (resource == NULL) {
1414da6c28aaSamw 		resource = sa_add_resource(share,
1415da6c28aaSamw 		    si->share_name, SA_SHARE_TRANSIENT, &err);
1416da6c28aaSamw 		if (resource == NULL)
1417da6c28aaSamw 			return (SA_NO_SUCH_RESOURCE);
1418da6c28aaSamw 	}
1419da6c28aaSamw 
1420da6c28aaSamw 	/* set resource attributes now */
1421da6c28aaSamw 	(void) sa_set_resource_attr(resource, "description", si->comment);
1422da6c28aaSamw 	(void) sa_set_resource_attr(resource, SHOPT_AD_CONTAINER,
1423da6c28aaSamw 	    si->container);
1424da6c28aaSamw 
1425da6c28aaSamw 	return (SA_OK);
1426da6c28aaSamw }
1427da6c28aaSamw 
1428da6c28aaSamw /*
1429da6c28aaSamw  * Return smb transient shares.  Note that we really want to look at
1430da6c28aaSamw  * all current shares from SMB in order to determine this. Transient
1431da6c28aaSamw  * shares should be those that don't appear in either the SMF or ZFS
1432da6c28aaSamw  * configurations.  Those that are in the repositories will be
1433da6c28aaSamw  * filtered out by smb_build_tmp_sa_resource.
1434da6c28aaSamw  */
1435da6c28aaSamw static int
1436da6c28aaSamw smb_list_transient(sa_handle_t handle)
1437da6c28aaSamw {
1438da6c28aaSamw 	int i, offset, num;
1439da6c28aaSamw 	lmshare_list_t list;
1440da6c28aaSamw 	int res;
1441da6c28aaSamw 
1442da6c28aaSamw 	num = lmshrd_num_shares();
1443da6c28aaSamw 	if (num <= 0)
1444da6c28aaSamw 		return (SA_OK);
1445da6c28aaSamw 	offset = 0;
1446da6c28aaSamw 	while (lmshrd_list(offset, &list) != NERR_InternalError) {
1447da6c28aaSamw 		if (list.no == 0)
1448da6c28aaSamw 			break;
1449da6c28aaSamw 		for (i = 0; i < list.no; i++) {
1450da6c28aaSamw 			res = smb_build_tmp_sa_resource(handle,
1451da6c28aaSamw 			    &(list.smbshr[i]));
1452da6c28aaSamw 			if (res != SA_OK)
1453da6c28aaSamw 				return (res);
1454da6c28aaSamw 		}
1455da6c28aaSamw 		offset += list.no;
1456da6c28aaSamw 	}
1457da6c28aaSamw 
1458da6c28aaSamw 	return (SA_OK);
1459da6c28aaSamw }
1460da6c28aaSamw 
1461da6c28aaSamw /*
1462da6c28aaSamw  * fix_resource_name(share, name,  prefix)
1463da6c28aaSamw  *
1464da6c28aaSamw  * Construct a name where the ZFS dataset has the prefix replaced with "name".
1465da6c28aaSamw  */
1466da6c28aaSamw static char *
1467da6c28aaSamw fix_resource_name(sa_share_t share, char *name, char *prefix)
1468da6c28aaSamw {
1469da6c28aaSamw 	char *dataset = NULL;
1470da6c28aaSamw 	char *newname = NULL;
1471da6c28aaSamw 	size_t psize;
1472da6c28aaSamw 	size_t nsize;
1473da6c28aaSamw 
1474da6c28aaSamw 	dataset = sa_get_share_attr(share, "dataset");
1475da6c28aaSamw 
1476da6c28aaSamw 	if (dataset != NULL && strcmp(dataset, prefix) != 0) {
1477da6c28aaSamw 		psize = strlen(prefix);
1478da6c28aaSamw 		if (strncmp(dataset, prefix, psize) == 0) {
1479da6c28aaSamw 			/* need string plus ',' and NULL */
1480da6c28aaSamw 			nsize = (strlen(dataset) - psize) + strlen(name) + 2;
1481da6c28aaSamw 			newname = calloc(nsize, 1);
1482da6c28aaSamw 			if (newname != NULL) {
1483da6c28aaSamw 				(void) snprintf(newname, nsize, "%s%s", name,
1484da6c28aaSamw 				    dataset + psize);
1485da6c28aaSamw 				sa_fix_resource_name(newname);
1486da6c28aaSamw 			}
1487da6c28aaSamw 			sa_free_attr_string(dataset);
1488da6c28aaSamw 			return (newname);
1489da6c28aaSamw 		}
1490da6c28aaSamw 	}
1491da6c28aaSamw 	if (dataset != NULL)
1492da6c28aaSamw 		sa_free_attr_string(dataset);
1493da6c28aaSamw 	return (strdup(name));
1494da6c28aaSamw }
1495da6c28aaSamw 
1496da6c28aaSamw /*
1497da6c28aaSamw  * smb_parse_optstring(group, options)
1498da6c28aaSamw  *
1499da6c28aaSamw  * parse a compact option string into individual options. This allows
1500da6c28aaSamw  * ZFS sharesmb and sharemgr "share" command to work.  group can be a
1501da6c28aaSamw  * group, a share or a resource.
1502da6c28aaSamw  */
1503da6c28aaSamw static int
1504da6c28aaSamw smb_parse_optstring(sa_group_t group, char *options)
1505da6c28aaSamw {
1506da6c28aaSamw 	char *dup;
1507da6c28aaSamw 	char *base;
1508da6c28aaSamw 	char *lasts;
1509da6c28aaSamw 	char *token;
1510da6c28aaSamw 	sa_optionset_t optionset;
1511da6c28aaSamw 	sa_group_t parent = NULL;
1512da6c28aaSamw 	sa_resource_t resource = NULL;
1513da6c28aaSamw 	int iszfs = 0;
1514da6c28aaSamw 	int persist = 0;
1515da6c28aaSamw 	int need_optionset = 0;
1516da6c28aaSamw 	int ret = SA_OK;
1517da6c28aaSamw 	sa_property_t prop;
1518da6c28aaSamw 
1519da6c28aaSamw 	/*
1520da6c28aaSamw 	 * In order to not attempt to change ZFS properties unless
1521da6c28aaSamw 	 * absolutely necessary, we never do it in the legacy parsing
1522da6c28aaSamw 	 * so we need to keep track of this.
1523da6c28aaSamw 	 */
1524da6c28aaSamw 	if (sa_is_share(group)) {
1525da6c28aaSamw 		char *zfs;
1526da6c28aaSamw 
1527da6c28aaSamw 		parent = sa_get_parent_group(group);
1528da6c28aaSamw 		if (parent != NULL) {
1529da6c28aaSamw 			zfs = sa_get_group_attr(parent, "zfs");
1530da6c28aaSamw 			if (zfs != NULL) {
1531da6c28aaSamw 				sa_free_attr_string(zfs);
1532da6c28aaSamw 				iszfs = 1;
1533da6c28aaSamw 			}
1534da6c28aaSamw 		}
1535da6c28aaSamw 	} else {
1536da6c28aaSamw 		iszfs = sa_group_is_zfs(group);
1537da6c28aaSamw 		/*
1538da6c28aaSamw 		 * If a ZFS group, then we need to see if a resource
1539da6c28aaSamw 		 * name is being set. If so, bail with
1540da6c28aaSamw 		 * SA_PROP_SHARE_ONLY, so we come back in with a share
1541da6c28aaSamw 		 * instead of a group.
1542da6c28aaSamw 		 */
1543da6c28aaSamw 		if (strncmp(options, "name=", sizeof ("name=") - 1) == 0 ||
1544da6c28aaSamw 		    strstr(options, ",name=") != NULL) {
1545da6c28aaSamw 			return (SA_PROP_SHARE_ONLY);
1546da6c28aaSamw 		}
1547da6c28aaSamw 	}
1548da6c28aaSamw 
1549da6c28aaSamw 	/* do we have an existing optionset? */
1550da6c28aaSamw 	optionset = sa_get_optionset(group, "smb");
1551da6c28aaSamw 	if (optionset == NULL) {
1552da6c28aaSamw 		/* didn't find existing optionset so create one */
1553da6c28aaSamw 		optionset = sa_create_optionset(group, "smb");
1554da6c28aaSamw 		if (optionset == NULL)
1555da6c28aaSamw 			return (SA_NO_MEMORY);
1556da6c28aaSamw 	} else {
1557da6c28aaSamw 		/*
1558da6c28aaSamw 		 * If an optionset already exists, we've come through
1559da6c28aaSamw 		 * twice so ignore the second time.
1560da6c28aaSamw 		 */
1561da6c28aaSamw 		return (ret);
1562da6c28aaSamw 	}
1563da6c28aaSamw 
1564da6c28aaSamw 	/* We need a copy of options for the next part. */
1565da6c28aaSamw 	dup = strdup(options);
1566da6c28aaSamw 	if (dup == NULL)
1567da6c28aaSamw 		return (SA_NO_MEMORY);
1568da6c28aaSamw 
1569da6c28aaSamw 	/*
1570da6c28aaSamw 	 * SMB properties are straightforward and are strings,
1571da6c28aaSamw 	 * integers or booleans.  Properties are separated by
1572da6c28aaSamw 	 * commas. It will be necessary to parse quotes due to some
1573da6c28aaSamw 	 * strings not having a restricted characters set.
1574da6c28aaSamw 	 *
1575da6c28aaSamw 	 * Note that names will create a resource. For now, if there
1576da6c28aaSamw 	 * is a set of properties "before" the first name="", those
1577da6c28aaSamw 	 * properties will be placed on the group.
1578da6c28aaSamw 	 */
1579da6c28aaSamw 	persist = sa_is_persistent(group);
1580da6c28aaSamw 	base = dup;
1581da6c28aaSamw 	token = dup;
1582da6c28aaSamw 	lasts = NULL;
1583da6c28aaSamw 	while (token != NULL && ret == SA_OK) {
1584da6c28aaSamw 		ret = SA_OK;
1585da6c28aaSamw 		token = strtok_r(base, ",", &lasts);
1586da6c28aaSamw 		base = NULL;
1587da6c28aaSamw 		if (token != NULL) {
1588da6c28aaSamw 			char *value;
1589da6c28aaSamw 			/*
1590da6c28aaSamw 			 * All SMB properties have values so there
1591da6c28aaSamw 			 * MUST be an '=' character.  If it doesn't,
1592da6c28aaSamw 			 * it is a syntax error.
1593da6c28aaSamw 			 */
1594da6c28aaSamw 			value = strchr(token, '=');
1595da6c28aaSamw 			if (value != NULL) {
1596da6c28aaSamw 				*value++ = '\0';
1597da6c28aaSamw 			} else {
1598da6c28aaSamw 				ret = SA_SYNTAX_ERR;
1599da6c28aaSamw 				break;
1600da6c28aaSamw 			}
1601da6c28aaSamw 			/*
1602da6c28aaSamw 			 * We may need to handle a "name" property
1603da6c28aaSamw 			 * that is a ZFS imposed resource name. Each
1604da6c28aaSamw 			 * name would trigger getting a new "resource"
1605da6c28aaSamw 			 * to put properties on. For now, assume no
1606da6c28aaSamw 			 * "name" property for special handling.
1607da6c28aaSamw 			 */
1608da6c28aaSamw 
1609da6c28aaSamw 			if (strcmp(token, "name") == 0) {
1610da6c28aaSamw 				char *prefix;
1611da6c28aaSamw 				char *name = NULL;
1612da6c28aaSamw 				/*
1613da6c28aaSamw 				 * We have a name, so now work on the
1614da6c28aaSamw 				 * resource level. We have a "share"
1615da6c28aaSamw 				 * in "group" due to the caller having
1616da6c28aaSamw 				 * added it. If we are called with a
1617da6c28aaSamw 				 * group, the check for group/share
1618da6c28aaSamw 				 * at the beginning of this function
1619da6c28aaSamw 				 * will bail out the parse if there is a
1620da6c28aaSamw 				 * "name" but no share.
1621da6c28aaSamw 				 */
1622da6c28aaSamw 				if (!iszfs) {
1623da6c28aaSamw 					ret = SA_SYNTAX_ERR;
1624da6c28aaSamw 					break;
1625da6c28aaSamw 				}
1626da6c28aaSamw 				/*
1627da6c28aaSamw 				 * Make sure the parent group has the
1628da6c28aaSamw 				 * "prefix" property since we will
1629da6c28aaSamw 				 * need to use this for constructing
1630da6c28aaSamw 				 * inherited name= values.
1631da6c28aaSamw 				 */
1632da6c28aaSamw 				prefix = sa_get_group_attr(parent, "prefix");
1633da6c28aaSamw 				if (prefix == NULL) {
1634da6c28aaSamw 					prefix = sa_get_group_attr(parent,
1635da6c28aaSamw 					    "name");
1636da6c28aaSamw 					if (prefix != NULL) {
1637da6c28aaSamw 						(void) sa_set_group_attr(parent,
1638da6c28aaSamw 						    "prefix", prefix);
1639da6c28aaSamw 					}
1640da6c28aaSamw 				}
1641da6c28aaSamw 				name = fix_resource_name((sa_share_t)group,
1642da6c28aaSamw 				    value, prefix);
1643da6c28aaSamw 				if (name != NULL) {
1644da6c28aaSamw 					resource = sa_add_resource(
1645da6c28aaSamw 					    (sa_share_t)group, name,
1646da6c28aaSamw 					    SA_SHARE_TRANSIENT, &ret);
1647da6c28aaSamw 					sa_free_attr_string(name);
1648da6c28aaSamw 				} else {
1649da6c28aaSamw 					ret = SA_NO_MEMORY;
1650da6c28aaSamw 				}
1651da6c28aaSamw 				if (prefix != NULL)
1652da6c28aaSamw 					sa_free_attr_string(prefix);
1653da6c28aaSamw 
1654da6c28aaSamw 				/* A resource level optionset is needed */
1655da6c28aaSamw 
1656da6c28aaSamw 				need_optionset = 1;
1657da6c28aaSamw 				if (resource == NULL) {
1658da6c28aaSamw 					ret = SA_NO_MEMORY;
1659da6c28aaSamw 					break;
1660da6c28aaSamw 				}
1661da6c28aaSamw 				continue;
1662da6c28aaSamw 			}
1663da6c28aaSamw 
1664da6c28aaSamw 			if (need_optionset) {
1665da6c28aaSamw 				optionset = sa_create_optionset(resource,
1666da6c28aaSamw 				    "smb");
1667da6c28aaSamw 				need_optionset = 0;
1668da6c28aaSamw 			}
1669da6c28aaSamw 
1670da6c28aaSamw 			prop = sa_create_property(token, value);
1671da6c28aaSamw 			if (prop == NULL)
1672da6c28aaSamw 				ret = SA_NO_MEMORY;
1673da6c28aaSamw 			else
1674da6c28aaSamw 				ret = sa_add_property(optionset, prop);
1675da6c28aaSamw 			if (ret != SA_OK)
1676da6c28aaSamw 				break;
1677da6c28aaSamw 			if (!iszfs)
1678da6c28aaSamw 				ret = sa_commit_properties(optionset, !persist);
1679da6c28aaSamw 		}
1680da6c28aaSamw 	}
1681da6c28aaSamw 	free(dup);
1682da6c28aaSamw 	return (ret);
1683da6c28aaSamw }
1684da6c28aaSamw 
1685da6c28aaSamw /*
1686da6c28aaSamw  * smb_sprint_option(rbuff, rbuffsize, incr, prop, sep)
1687da6c28aaSamw  *
1688da6c28aaSamw  * provides a mechanism to format SMB properties into legacy output
1689da6c28aaSamw  * format. If the buffer would overflow, it is reallocated and grown
1690da6c28aaSamw  * as appropriate. Special cases of converting internal form of values
1691da6c28aaSamw  * to those used by "share" are done. this function does one property
1692da6c28aaSamw  * at a time.
1693da6c28aaSamw  */
1694da6c28aaSamw 
1695da6c28aaSamw static void
1696da6c28aaSamw smb_sprint_option(char **rbuff, size_t *rbuffsize, size_t incr,
1697da6c28aaSamw 			sa_property_t prop, int sep)
1698da6c28aaSamw {
1699da6c28aaSamw 	char *name;
1700da6c28aaSamw 	char *value;
1701da6c28aaSamw 	int curlen;
1702da6c28aaSamw 	char *buff = *rbuff;
1703da6c28aaSamw 	size_t buffsize = *rbuffsize;
1704da6c28aaSamw 
1705da6c28aaSamw 	name = sa_get_property_attr(prop, "type");
1706da6c28aaSamw 	value = sa_get_property_attr(prop, "value");
1707da6c28aaSamw 	if (buff != NULL)
1708da6c28aaSamw 		curlen = strlen(buff);
1709da6c28aaSamw 	else
1710da6c28aaSamw 		curlen = 0;
1711da6c28aaSamw 	if (name != NULL) {
1712da6c28aaSamw 		int len;
1713da6c28aaSamw 		len = strlen(name) + sep;
1714da6c28aaSamw 
1715da6c28aaSamw 		/*
1716da6c28aaSamw 		 * A future RFE would be to replace this with more
1717da6c28aaSamw 		 * generic code and to possibly handle more types.
1718da6c28aaSamw 		 *
1719da6c28aaSamw 		 * For now, everything else is treated as a string. If
1720da6c28aaSamw 		 * we get any properties that aren't exactly
1721da6c28aaSamw 		 * name/value pairs, we may need to
1722da6c28aaSamw 		 * interpret/transform.
1723da6c28aaSamw 		 */
1724da6c28aaSamw 		if (value != NULL)
1725da6c28aaSamw 			len += 1 + strlen(value);
1726da6c28aaSamw 
1727da6c28aaSamw 		while (buffsize <= (curlen + len)) {
1728da6c28aaSamw 			/* need more room */
1729da6c28aaSamw 			buffsize += incr;
1730da6c28aaSamw 			buff = realloc(buff, buffsize);
1731da6c28aaSamw 			*rbuff = buff;
1732da6c28aaSamw 			*rbuffsize = buffsize;
1733da6c28aaSamw 			if (buff == NULL) {
1734da6c28aaSamw 				/* realloc failed so free everything */
1735da6c28aaSamw 				if (*rbuff != NULL)
1736da6c28aaSamw 					free(*rbuff);
1737da6c28aaSamw 				goto err;
1738da6c28aaSamw 			}
1739da6c28aaSamw 		}
1740da6c28aaSamw 		if (buff == NULL)
1741da6c28aaSamw 			goto err;
1742da6c28aaSamw 		(void) snprintf(buff + curlen, buffsize - curlen,
1743da6c28aaSamw 		    "%s%s=%s", sep ? "," : "",
1744da6c28aaSamw 		    name, value != NULL ? value : "\"\"");
1745da6c28aaSamw 
1746da6c28aaSamw 	}
1747da6c28aaSamw err:
1748da6c28aaSamw 	if (name != NULL)
1749da6c28aaSamw 		sa_free_attr_string(name);
1750da6c28aaSamw 	if (value != NULL)
1751da6c28aaSamw 		sa_free_attr_string(value);
1752da6c28aaSamw }
1753da6c28aaSamw 
1754da6c28aaSamw /*
1755da6c28aaSamw  * smb_format_resource_options(resource, hier)
1756da6c28aaSamw  *
1757da6c28aaSamw  * format all the options on the group into a flattened option
1758da6c28aaSamw  * string. If hier is non-zero, walk up the tree to get inherited
1759da6c28aaSamw  * options.
1760da6c28aaSamw  */
1761da6c28aaSamw 
1762da6c28aaSamw static char *
1763da6c28aaSamw smb_format_options(sa_group_t group, int hier)
1764da6c28aaSamw {
1765da6c28aaSamw 	sa_optionset_t options = NULL;
1766da6c28aaSamw 	sa_property_t prop;
1767da6c28aaSamw 	int sep = 0;
1768da6c28aaSamw 	char *buff;
1769da6c28aaSamw 	size_t buffsize;
1770da6c28aaSamw 
1771da6c28aaSamw 
1772da6c28aaSamw 	buff = malloc(OPT_CHUNK);
1773da6c28aaSamw 	if (buff == NULL)
1774da6c28aaSamw 		return (NULL);
1775da6c28aaSamw 
1776da6c28aaSamw 	buff[0] = '\0';
1777da6c28aaSamw 	buffsize = OPT_CHUNK;
1778da6c28aaSamw 
1779da6c28aaSamw 	/*
1780da6c28aaSamw 	 * We may have a an optionset relative to this item. format
1781da6c28aaSamw 	 * these if we find them and then add any security definitions.
1782da6c28aaSamw 	 */
1783da6c28aaSamw 
1784da6c28aaSamw 	options = sa_get_derived_optionset(group, "smb", hier);
1785da6c28aaSamw 
1786da6c28aaSamw 	/*
1787da6c28aaSamw 	 * do the default set first but skip any option that is also
1788da6c28aaSamw 	 * in the protocol specific optionset.
1789da6c28aaSamw 	 */
1790da6c28aaSamw 	if (options != NULL) {
1791da6c28aaSamw 		for (prop = sa_get_property(options, NULL);
1792da6c28aaSamw 		    prop != NULL; prop = sa_get_next_property(prop)) {
1793da6c28aaSamw 			/*
1794da6c28aaSamw 			 * use this one since we skipped any
1795da6c28aaSamw 			 * of these that were also in
1796da6c28aaSamw 			 * optdefault
1797da6c28aaSamw 			 */
1798da6c28aaSamw 			smb_sprint_option(&buff, &buffsize, OPT_CHUNK,
1799da6c28aaSamw 			    prop, sep);
1800da6c28aaSamw 			if (buff == NULL) {
1801da6c28aaSamw 				/*
1802da6c28aaSamw 				 * buff could become NULL if there
1803da6c28aaSamw 				 * isn't enough memory for
1804da6c28aaSamw 				 * smb_sprint_option to realloc()
1805da6c28aaSamw 				 * as necessary. We can't really
1806da6c28aaSamw 				 * do anything about it at this
1807da6c28aaSamw 				 * point so we return NULL.  The
1808da6c28aaSamw 				 * caller should handle the
1809da6c28aaSamw 				 * failure.
1810da6c28aaSamw 				 */
1811da6c28aaSamw 				if (options != NULL)
1812da6c28aaSamw 					sa_free_derived_optionset(
1813da6c28aaSamw 					    options);
1814da6c28aaSamw 				return (buff);
1815da6c28aaSamw 			}
1816da6c28aaSamw 			sep = 1;
1817da6c28aaSamw 		}
1818da6c28aaSamw 	}
1819da6c28aaSamw 
1820da6c28aaSamw 	if (options != NULL)
1821da6c28aaSamw 		sa_free_derived_optionset(options);
1822da6c28aaSamw 	return (buff);
1823da6c28aaSamw }
1824da6c28aaSamw 
1825da6c28aaSamw /*
1826da6c28aaSamw  * smb_rename_resource(resource, newname)
1827da6c28aaSamw  *
1828da6c28aaSamw  * Change the current exported name of the resource to newname.
1829da6c28aaSamw  */
1830da6c28aaSamw /*ARGSUSED*/
1831da6c28aaSamw int
1832da6c28aaSamw smb_rename_resource(sa_handle_t handle, sa_resource_t resource, char *newname)
1833da6c28aaSamw {
1834da6c28aaSamw 	int ret = SA_OK;
1835da6c28aaSamw 	int err;
1836da6c28aaSamw 	char *oldname;
1837da6c28aaSamw 
1838da6c28aaSamw 	oldname = sa_get_resource_attr(resource, "name");
1839da6c28aaSamw 	if (oldname == NULL)
1840da6c28aaSamw 		return (SA_NO_SUCH_RESOURCE);
1841da6c28aaSamw 
1842da6c28aaSamw 	err = lmshrd_rename(oldname, newname);
1843da6c28aaSamw 
1844da6c28aaSamw 	/* improve error values somewhat */
1845da6c28aaSamw 	switch (err) {
1846da6c28aaSamw 	case NERR_Success:
1847da6c28aaSamw 		break;
1848da6c28aaSamw 	case NERR_InternalError:
1849da6c28aaSamw 		ret = SA_SYSTEM_ERR;
1850da6c28aaSamw 		break;
1851da6c28aaSamw 	case NERR_DuplicateShare:
1852da6c28aaSamw 		ret = SA_DUPLICATE_NAME;
1853da6c28aaSamw 		break;
1854da6c28aaSamw 	default:
1855da6c28aaSamw 		ret = SA_CONFIG_ERR;
1856da6c28aaSamw 		break;
1857da6c28aaSamw 	}
1858da6c28aaSamw 
1859da6c28aaSamw 	return (ret);
1860da6c28aaSamw }
1861