xref: /titanic_41/usr/src/lib/smbsrv/libsmb/common/smb_lgrp.c (revision 989f28072d20c73ae0955d6a1e3e2fc74831cb39)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2011 Nexenta Systems, Inc.  All rights reserved.
24  * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved.
25  */
26 
27 #include <stdlib.h>
28 #include <strings.h>
29 #include <unistd.h>
30 #include <syslog.h>
31 #include <thread.h>
32 #include <synch.h>
33 #include <grp.h>
34 #include <assert.h>
35 #include <libintl.h>
36 #include <smbsrv/libsmb.h>
37 #include <smb_sqlite.h>
38 #include <sys/types.h>
39 #include <sys/stat.h>
40 #include <sys/param.h>
41 
42 /*
43  * Local domain SID (aka machine SID) is not stored in the domain table
44  * therefore the index is 0
45  */
46 #define	SMB_LGRP_LOCAL_IDX	0
47 #define	SMB_LGRP_BUILTIN_IDX	1
48 
49 #define	SMB_LGRP_DB_NAME	"/var/smb/smbgroup.db"
50 #define	SMB_LGRP_DB_TIMEOUT	3000		/* in millisecond */
51 #define	SMB_LGRP_DB_VERMAJOR	1
52 #define	SMB_LGRP_DB_VERMINOR	0
53 #define	SMB_LGRP_DB_MAGIC	0x4C475250	/* LGRP */
54 
55 #define	SMB_LGRP_DB_ORD		1		/* open read-only */
56 #define	SMB_LGRP_DB_ORW		2		/* open read/write */
57 
58 #define	SMB_LGRP_DB_ADDMEMBER	1
59 #define	SMB_LGRP_DB_DELMEMBER	2
60 
61 /*
62  * members column of the groups table is an array of
63  * member structure smb_lgmid_t defined below.
64  *
65  * privs column of the groups table is an array of bytes
66  * where each byte is the id of an enable privilege
67  */
68 #define	SMB_LGRP_DB_SQL \
69 	"CREATE TABLE db_info ("				\
70 	"	ver_major INTEGER,"				\
71 	"	ver_minor INTEGER,"				\
72 	"	magic     INTEGER"				\
73 	");"							\
74 	""							\
75 	"CREATE TABLE domains ("				\
76 	"	dom_idx INTEGER PRIMARY KEY,"			\
77 	"	dom_sid TEXT UNIQUE,"				\
78 	"       dom_cnt INTEGER"				\
79 	");"							\
80 	""							\
81 	"CREATE UNIQUE INDEX domsid_idx ON domains (dom_sid);"	\
82 	""							\
83 	"CREATE TABLE groups ("					\
84 	"	name      TEXT PRIMARY KEY,"			\
85 	"	sid_idx   INTEGER,"				\
86 	"	sid_rid   INTEGER,"				\
87 	"	sid_type  INTEGER,"				\
88 	"	sid_attrs INTEGER,"				\
89 	"	comment   TEXT,"				\
90 	"	n_privs   INTEGER,"				\
91 	"	privs     BLOB,"				\
92 	"	n_members INTEGER,"				\
93 	"	members   BLOB"					\
94 	");"							\
95 	""							\
96 	"CREATE INDEX grprid_idx ON groups (sid_rid);"
97 
98 /*
99  * Number of groups table columns
100  */
101 #define	SMB_LGRP_GTBL_NCOL	10
102 
103 #define	SMB_LGRP_GTBL_NAME	0
104 #define	SMB_LGRP_GTBL_SIDIDX	1
105 #define	SMB_LGRP_GTBL_SIDRID	2
106 #define	SMB_LGRP_GTBL_SIDTYP	3
107 #define	SMB_LGRP_GTBL_SIDATR	4
108 #define	SMB_LGRP_GTBL_CMNT	5
109 #define	SMB_LGRP_GTBL_NPRIVS	6
110 #define	SMB_LGRP_GTBL_PRIVS	7
111 #define	SMB_LGRP_GTBL_NMEMBS	8
112 #define	SMB_LGRP_GTBL_MEMBS	9
113 
114 #define	SMB_LGRP_INFO_NONE	0x00
115 #define	SMB_LGRP_INFO_NAME	0x01
116 #define	SMB_LGRP_INFO_CMNT	0x02
117 #define	SMB_LGRP_INFO_SID	0x04
118 #define	SMB_LGRP_INFO_PRIV	0x08
119 #define	SMB_LGRP_INFO_MEMB	0x10
120 #define	SMB_LGRP_INFO_ALL	0x1F
121 
122 #define	SMB_LGRP_PGRP_GRPTMP	"/etc/gtmp"
123 #define	SMB_LGRP_PGRP_GRPBUFSIZ	5120
124 #define	SMB_LGRP_PGRP_GROUP	"/etc/group"
125 #define	SMB_LGRP_PGRP_MAXGLEN	9	/* max length of group name */
126 #define	SMB_LGRP_PGRP_DEFRID	99	/* max reserved id */
127 
128 #define	SMB_LGRP_PGRP_NOTUNIQUE	0
129 #define	SMB_LGRP_PGRP_RESERVED	1
130 #define	SMB_LGRP_PGRP_UNIQUE	2
131 #define	SMB_LGRP_PGRP_TOOBIG	3
132 #define	SMB_LGRP_PGRP_INVALID	4
133 
134 #define	NULL_MSGCHK(msg)	((msg) ? (msg) : "NULL")
135 
136 /* Member ID */
137 typedef struct smb_lgmid {
138 	uint32_t m_idx;
139 	uint32_t m_rid;
140 	uint16_t m_type;
141 } smb_lgmid_t;
142 
143 #define	SMB_LGRP_MID_HEXSZ	32
144 
145 /* Member list */
146 typedef struct smb_lgmlist {
147 	uint32_t	m_cnt;
148 	char		*m_ids;
149 } smb_lgmlist_t;
150 
151 /* Privilege ID */
152 typedef uint8_t smb_lgpid_t;
153 
154 /* Privilege list */
155 typedef struct smb_lgplist {
156 	uint32_t	p_cnt;
157 	smb_lgpid_t	*p_ids;
158 } smb_lgplist_t;
159 
160 static struct {
161 	int	errnum;
162 	char	*errmsg;
163 } errtab[] = {
164 	{ SMB_LGRP_SUCCESS,		"success" },
165 	{ SMB_LGRP_INVALID_ARG,		"invalid argument" },
166 	{ SMB_LGRP_INVALID_MEMBER,	"invalid member type" },
167 	{ SMB_LGRP_INVALID_NAME,	"invalid name" },
168 	{ SMB_LGRP_NOT_FOUND,		"group not found" },
169 	{ SMB_LGRP_EXISTS,		"group exists" },
170 	{ SMB_LGRP_NO_SID,		"cannot obtain a SID" },
171 	{ SMB_LGRP_NO_LOCAL_SID,	"cannot get the machine SID" },
172 	{ SMB_LGRP_SID_NOTLOCAL,	"local account has non-local SID" },
173 	{ SMB_LGRP_WKSID,
174 		"operation not permitted on well-known account" },
175 	{ SMB_LGRP_NO_MEMORY,		"not enough memory" },
176 	{ SMB_LGRP_DB_ERROR,		"database operation error" },
177 	{ SMB_LGRP_DBINIT_ERROR,	"database initialization error" },
178 	{ SMB_LGRP_INTERNAL_ERROR,	"internal error" },
179 	{ SMB_LGRP_MEMBER_IN_GROUP,	"member already in group" },
180 	{ SMB_LGRP_MEMBER_NOT_IN_GROUP,	"not a member" },
181 	{ SMB_LGRP_NO_SUCH_PRIV,	"no such privilege" },
182 	{ SMB_LGRP_NO_SUCH_DOMAIN,	"no such domain SID" },
183 	{ SMB_LGRP_PRIV_HELD,		"privilege already held" },
184 	{ SMB_LGRP_PRIV_NOT_HELD,	"privilege not held" },
185 	{ SMB_LGRP_BAD_DATA,		"bad data" },
186 	{ SMB_LGRP_NO_MORE,		"no more groups" },
187 	{ SMB_LGRP_DBOPEN_FAILED,	"database open failed" },
188 	{ SMB_LGRP_DBEXEC_FAILED,	"database operation failed" },
189 	{ SMB_LGRP_DBINIT_FAILED,	"database initialization failed" },
190 	{ SMB_LGRP_DOMLKP_FAILED,	"domain SID lookup failed" },
191 	{ SMB_LGRP_DOMINS_FAILED,	"domain SID insert failed" },
192 	{ SMB_LGRP_INSERT_FAILED,	"group insert failed" },
193 	{ SMB_LGRP_DELETE_FAILED,	"group delete failed" },
194 	{ SMB_LGRP_UPDATE_FAILED,	"group update failed" },
195 	{ SMB_LGRP_LOOKUP_FAILED,	"group lookup failed" },
196 	{ SMB_LGRP_OFFLINE,		"local group service is offline" },
197 	{ SMB_LGRP_POSIXCREATE_FAILED,	"posix group create failed" }
198 };
199 
200 /*
201  * Serialization for the local group API.
202  */
203 typedef struct {
204 	mutex_t		lg_mutex;
205 	cond_t		lg_cv;
206 	boolean_t	lg_online;
207 	uint32_t	lg_refcnt;
208 	smb_sid_t	*lg_machine_sid;
209 } smb_localgrp_t;
210 
211 static smb_localgrp_t smb_localgrp;
212 
213 static boolean_t smb_lgrp_enter(void);
214 static void smb_lgrp_exit(void);
215 static int smb_lgrp_db_init(void);
216 static sqlite *smb_lgrp_db_open(int);
217 static void smb_lgrp_db_close(sqlite *);
218 static int smb_lgrp_db_setinfo(sqlite *);
219 
220 static boolean_t smb_lgrp_gtbl_exists(sqlite *, char *);
221 static int smb_lgrp_gtbl_lookup(sqlite *, int, smb_group_t *, int, ...);
222 static int smb_lgrp_gtbl_insert(sqlite *, smb_group_t *);
223 static int smb_lgrp_gtbl_update(sqlite *, char *, smb_group_t *, int);
224 static int smb_lgrp_gtbl_delete(sqlite *, char *);
225 static int smb_lgrp_gtbl_update_mlist(sqlite *, char *, smb_gsid_t *, int);
226 static int smb_lgrp_gtbl_update_plist(sqlite *, char *, uint8_t, boolean_t);
227 static int smb_lgrp_gtbl_count(sqlite *, int, int *);
228 
229 static int smb_lgrp_dtbl_insert(sqlite *, char *, uint32_t *);
230 static int smb_lgrp_dtbl_getidx(sqlite *, smb_sid_t *, uint16_t,
231     uint32_t *, uint32_t *);
232 static int smb_lgrp_dtbl_getsid(sqlite *, uint32_t, smb_sid_t **);
233 
234 static int smb_lgrp_mlist_add(smb_lgmlist_t *, smb_lgmid_t *, smb_lgmlist_t *);
235 static int smb_lgrp_mlist_del(smb_lgmlist_t *, smb_lgmid_t *, smb_lgmlist_t *);
236 
237 static int smb_lgrp_plist_add(smb_lgplist_t *, smb_lgpid_t, smb_lgplist_t *);
238 static int smb_lgrp_plist_del(smb_lgplist_t *, smb_lgpid_t, smb_lgplist_t *);
239 
240 static void smb_lgrp_encode_privset(smb_group_t *, smb_lgplist_t *);
241 
242 static int smb_lgrp_decode(smb_group_t *, char **, int, sqlite *);
243 static int smb_lgrp_decode_privset(smb_group_t *, char *, char *);
244 static int smb_lgrp_decode_members(smb_group_t *, char *, char *, sqlite *);
245 
246 static void smb_lgrp_set_default_privs(smb_group_t *);
247 static boolean_t smb_lgrp_normalize_name(char *);
248 static boolean_t smb_lgrp_chkmember(uint16_t);
249 static int smb_lgrp_getsid(int, uint32_t *, uint16_t, sqlite *, smb_sid_t **);
250 static int smb_lgrp_getgid(uint32_t rid, gid_t *gid);
251 static boolean_t smb_lgrp_exists(char *);
252 static int smb_lgrp_pgrp_add(char *);
253 
254 /*
255  * smb_lgrp_add
256  *
257  * Create a local group with the given name and comment.
258  * This new group doesn't have any members and no enabled
259  * privileges.
260  *
261  * No well-known accounts can be added other than Administators,
262  * Backup Operators and Power Users. These built-in groups
263  * won't have any members when created but a set of default
264  * privileges will be enabled for them.
265  */
266 int
267 smb_lgrp_add(char *gname, char *cmnt)
268 {
269 	smb_wka_t *wka;
270 	struct group *pxgrp;
271 	smb_group_t grp;
272 	smb_sid_t *sid = NULL;
273 	sqlite *db;
274 	int rc;
275 
276 	if (!smb_lgrp_normalize_name(gname))
277 		return (SMB_LGRP_INVALID_NAME);
278 
279 	if (cmnt && (strlen(cmnt) > SMB_LGRP_COMMENT_MAX))
280 		return (SMB_LGRP_INVALID_ARG);
281 
282 	bzero(&grp, sizeof (grp));
283 	grp.sg_name = smb_strlwr(gname);
284 	grp.sg_cmnt = cmnt;
285 
286 	if (!smb_lgrp_enter())
287 		return (SMB_LGRP_OFFLINE);
288 
289 	wka = smb_wka_lookup_name(gname);
290 	if (wka == NULL) {
291 		if ((pxgrp = getgrnam(gname)) == NULL) {
292 			if (smb_lgrp_pgrp_add(gname) != 0) {
293 				smb_lgrp_exit();
294 				return (SMB_LGRP_POSIXCREATE_FAILED);
295 			}
296 
297 			if ((pxgrp = getgrnam(gname)) == NULL) {
298 				smb_lgrp_exit();
299 				return (SMB_LGRP_NOT_FOUND);
300 			}
301 		}
302 
303 		/*
304 		 * Make sure a local SID can be obtained
305 		 */
306 		if (smb_idmap_getsid(pxgrp->gr_gid, SMB_IDMAP_GROUP, &sid)
307 		    != IDMAP_SUCCESS) {
308 			smb_lgrp_exit();
309 			return (SMB_LGRP_NO_SID);
310 		}
311 
312 		if (!smb_sid_indomain(smb_localgrp.lg_machine_sid, sid)) {
313 			free(sid);
314 			smb_lgrp_exit();
315 			return (SMB_LGRP_SID_NOTLOCAL);
316 		}
317 
318 		free(sid);
319 		grp.sg_id.gs_type = SidTypeAlias;
320 		grp.sg_domain = SMB_DOMAIN_LOCAL;
321 		grp.sg_rid = pxgrp->gr_gid;
322 	} else {
323 		if ((wka->wka_flags & SMB_WKAFLG_LGRP_ENABLE) == 0) {
324 			/* cannot add well-known accounts */
325 			smb_lgrp_exit();
326 			return (SMB_LGRP_WKSID);
327 		}
328 
329 		grp.sg_id.gs_type = wka->wka_type;
330 		if ((sid = smb_sid_fromstr(wka->wka_sid)) == NULL) {
331 			smb_lgrp_exit();
332 			return (SMB_LGRP_NO_MEMORY);
333 		}
334 
335 		(void) smb_sid_getrid(sid, &grp.sg_rid);
336 		free(sid);
337 		grp.sg_domain = SMB_DOMAIN_BUILTIN;
338 		grp.sg_privs = smb_privset_new();
339 		smb_lgrp_set_default_privs(&grp);
340 	}
341 
342 	if (smb_lgrp_exists(grp.sg_name)) {
343 		smb_lgrp_exit();
344 		return (SMB_LGRP_EXISTS);
345 	}
346 
347 	grp.sg_attr = SE_GROUP_MANDATORY | SE_GROUP_ENABLED_BY_DEFAULT |
348 	    SE_GROUP_ENABLED;
349 
350 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
351 	rc = smb_lgrp_gtbl_insert(db, &grp);
352 	smb_lgrp_db_close(db);
353 
354 	smb_privset_free(grp.sg_privs);
355 	smb_lgrp_exit();
356 	return (rc);
357 }
358 
359 /*
360  * smb_lgrp_rename
361  *
362  * Renames the given group
363  */
364 int
365 smb_lgrp_rename(char *gname, char *new_gname)
366 {
367 	smb_group_t grp;
368 	sqlite *db;
369 	int rc;
370 
371 	if (!smb_lgrp_normalize_name(gname))
372 		return (SMB_LGRP_INVALID_NAME);
373 
374 	if (!smb_lgrp_normalize_name(gname))
375 		return (SMB_LGRP_INVALID_NAME);
376 
377 	if (smb_strcasecmp(gname, new_gname, 0) == 0)
378 		return (SMB_LGRP_SUCCESS);
379 
380 	/* Cannot rename well-known groups */
381 	if (smb_wka_lookup_name(gname) != NULL)
382 		return (SMB_LGRP_WKSID);
383 
384 	/* Cannot rename to a well-known groups */
385 	if (smb_wka_lookup_name(new_gname) != NULL)
386 		return (SMB_LGRP_WKSID);
387 
388 	grp.sg_name = new_gname;
389 
390 	if (!smb_lgrp_enter())
391 		return (SMB_LGRP_OFFLINE);
392 
393 	if (getgrnam(new_gname) == NULL) {
394 		if (smb_lgrp_pgrp_add(new_gname) != 0) {
395 			smb_lgrp_exit();
396 			return (SMB_LGRP_POSIXCREATE_FAILED);
397 		}
398 
399 		if (getgrnam(new_gname) == NULL) {
400 			smb_lgrp_exit();
401 			return (SMB_LGRP_NOT_FOUND);
402 		}
403 	}
404 
405 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
406 	rc = smb_lgrp_gtbl_update(db, gname, &grp, SMB_LGRP_GTBL_NAME);
407 	smb_lgrp_db_close(db);
408 
409 	smb_lgrp_exit();
410 	return (rc);
411 }
412 
413 /*
414  * smb_lgrp_delete
415  *
416  * Deletes the specified local group.
417  */
418 int
419 smb_lgrp_delete(char *gname)
420 {
421 	sqlite *db;
422 	int rc;
423 
424 	if (!smb_lgrp_normalize_name(gname))
425 		return (SMB_LGRP_INVALID_NAME);
426 
427 	/* Cannot remove a built-in group */
428 	if (smb_wka_lookup_name(gname) != NULL)
429 		return (SMB_LGRP_WKSID);
430 
431 
432 	if (!smb_lgrp_exists(gname))
433 		return (SMB_LGRP_NOT_FOUND);
434 
435 	if (!smb_lgrp_enter())
436 		return (SMB_LGRP_OFFLINE);
437 
438 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
439 	rc = smb_lgrp_gtbl_delete(db, gname);
440 	smb_lgrp_db_close(db);
441 
442 	smb_lgrp_exit();
443 	return (rc);
444 }
445 
446 /*
447  * smb_lgrp_setcmnt
448  *
449  * Sets the description for the given group
450  */
451 int
452 smb_lgrp_setcmnt(char *gname, char *cmnt)
453 {
454 	smb_group_t grp;
455 	sqlite *db;
456 	int rc;
457 
458 	if (!smb_lgrp_normalize_name(gname))
459 		return (SMB_LGRP_INVALID_NAME);
460 
461 	if (cmnt && (strlen(cmnt) > SMB_LGRP_COMMENT_MAX))
462 		return (SMB_LGRP_INVALID_ARG);
463 
464 	grp.sg_cmnt = cmnt;
465 
466 	if (!smb_lgrp_enter())
467 		return (SMB_LGRP_OFFLINE);
468 
469 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
470 	rc = smb_lgrp_gtbl_update(db, gname, &grp, SMB_LGRP_GTBL_CMNT);
471 	smb_lgrp_db_close(db);
472 
473 	smb_lgrp_exit();
474 	return (rc);
475 }
476 
477 /*
478  * smb_lgrp_getcmnt
479  *
480  * Obtain the description of the specified group
481  */
482 int
483 smb_lgrp_getcmnt(char *gname, char **cmnt)
484 {
485 	smb_group_t grp;
486 	sqlite *db;
487 	int rc;
488 
489 	if (!smb_lgrp_normalize_name(gname))
490 		return (SMB_LGRP_INVALID_NAME);
491 
492 	if (cmnt == NULL)
493 		return (SMB_LGRP_INVALID_ARG);
494 
495 	if (!smb_lgrp_enter())
496 		return (SMB_LGRP_OFFLINE);
497 
498 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
499 	rc = smb_lgrp_gtbl_lookup(db, SMB_LGRP_GTBL_NAME, &grp,
500 	    SMB_LGRP_INFO_CMNT, gname);
501 	smb_lgrp_db_close(db);
502 	smb_lgrp_exit();
503 
504 	if (rc == SMB_LGRP_SUCCESS) {
505 		*cmnt = grp.sg_cmnt;
506 		grp.sg_cmnt = NULL;
507 		smb_lgrp_free(&grp);
508 	}
509 
510 	return (rc);
511 }
512 
513 
514 /*
515  * smb_lgrp_setpriv
516  *
517  * Enable/disable the specified privilge for the group
518  */
519 int
520 smb_lgrp_setpriv(char *gname, uint8_t priv_lid, boolean_t enable)
521 {
522 	sqlite *db;
523 	int rc;
524 
525 	if (!smb_lgrp_normalize_name(gname))
526 		return (SMB_LGRP_INVALID_NAME);
527 
528 	if ((priv_lid < SE_MIN_LUID) || (priv_lid > SE_MAX_LUID))
529 		return (SMB_LGRP_NO_SUCH_PRIV);
530 
531 	if (!smb_lgrp_enter())
532 		return (SMB_LGRP_OFFLINE);
533 
534 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
535 	rc = smb_lgrp_gtbl_update_plist(db, gname, priv_lid, enable);
536 	smb_lgrp_db_close(db);
537 	smb_lgrp_exit();
538 
539 	if (enable) {
540 		if (rc == SMB_LGRP_PRIV_HELD)
541 			rc = SMB_LGRP_SUCCESS;
542 	} else {
543 		if (rc == SMB_LGRP_PRIV_NOT_HELD)
544 			rc = SMB_LGRP_SUCCESS;
545 	}
546 
547 	return (rc);
548 }
549 
550 /*
551  * smb_lgrp_getpriv
552  *
553  * Obtain the status of the specified privilge for the group
554  */
555 int
556 smb_lgrp_getpriv(char *gname, uint8_t priv_lid, boolean_t *enable)
557 {
558 	sqlite *db;
559 	smb_group_t grp;
560 	int rc;
561 
562 	if (!smb_lgrp_normalize_name(gname))
563 		return (SMB_LGRP_INVALID_NAME);
564 
565 	if ((priv_lid < SE_MIN_LUID) || (priv_lid > SE_MAX_LUID))
566 		return (SMB_LGRP_NO_SUCH_PRIV);
567 
568 	if (!smb_lgrp_enter())
569 		return (SMB_LGRP_OFFLINE);
570 
571 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
572 	rc = smb_lgrp_gtbl_lookup(db, SMB_LGRP_GTBL_NAME, &grp,
573 	    SMB_LGRP_INFO_PRIV, gname);
574 	smb_lgrp_db_close(db);
575 	smb_lgrp_exit();
576 
577 	if (rc == SMB_LGRP_SUCCESS) {
578 		*enable = (smb_privset_query(grp.sg_privs, priv_lid) == 1);
579 		smb_lgrp_free(&grp);
580 	}
581 
582 	return (rc);
583 }
584 
585 /*
586  * smb_lgrp_add_member
587  *
588  * Add the given account to the specified group as its member.
589  */
590 int
591 smb_lgrp_add_member(char *gname, smb_sid_t *msid, uint16_t sid_type)
592 {
593 	sqlite *db;
594 	smb_gsid_t mid;
595 	int rc;
596 
597 	if (!smb_lgrp_normalize_name(gname))
598 		return (SMB_LGRP_INVALID_NAME);
599 
600 	if (!smb_sid_isvalid(msid))
601 		return (SMB_LGRP_INVALID_ARG);
602 
603 	if (!smb_lgrp_chkmember(sid_type))
604 		return (SMB_LGRP_INVALID_MEMBER);
605 
606 	mid.gs_sid = msid;
607 	mid.gs_type = sid_type;
608 
609 	if (!smb_lgrp_enter())
610 		return (SMB_LGRP_OFFLINE);
611 
612 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
613 	rc = smb_lgrp_gtbl_update_mlist(db, gname, &mid, SMB_LGRP_DB_ADDMEMBER);
614 	smb_lgrp_db_close(db);
615 
616 	smb_lgrp_exit();
617 	return (rc);
618 }
619 
620 /*
621  * smb_lgrp_del_member
622  *
623  * Delete the specified member from the given group.
624  */
625 int
626 smb_lgrp_del_member(char *gname, smb_sid_t *msid, uint16_t sid_type)
627 {
628 	sqlite *db;
629 	smb_gsid_t mid;
630 	int rc;
631 
632 	if (!smb_lgrp_normalize_name(gname))
633 		return (SMB_LGRP_INVALID_NAME);
634 
635 	if (!smb_sid_isvalid(msid))
636 		return (SMB_LGRP_INVALID_ARG);
637 
638 	mid.gs_sid = msid;
639 	mid.gs_type = sid_type;
640 
641 	if (!smb_lgrp_enter())
642 		return (SMB_LGRP_OFFLINE);
643 
644 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
645 	rc = smb_lgrp_gtbl_update_mlist(db, gname, &mid, SMB_LGRP_DB_DELMEMBER);
646 	smb_lgrp_db_close(db);
647 
648 	smb_lgrp_exit();
649 	return (rc);
650 }
651 
652 /*
653  * smb_lgrp_getbyname
654  *
655  * Retrieves the information of the group specified by
656  * the given name.
657  *
658  * Note that this function doesn't allocate the group
659  * structure itself only the fields, so the given grp
660  * pointer has to point to a group structure.
661  * Caller must free the allocated memories for the fields
662  * by calling smb_lgrp_free().
663  */
664 int
665 smb_lgrp_getbyname(char *gname, smb_group_t *grp)
666 {
667 	sqlite *db;
668 	int rc;
669 
670 	if (!smb_lgrp_normalize_name(gname))
671 		return (SMB_LGRP_INVALID_NAME);
672 
673 	if (!smb_lgrp_enter())
674 		return (SMB_LGRP_OFFLINE);
675 
676 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
677 	rc = smb_lgrp_gtbl_lookup(db, SMB_LGRP_GTBL_NAME, grp,
678 	    SMB_LGRP_INFO_ALL, gname);
679 	smb_lgrp_db_close(db);
680 
681 	smb_lgrp_exit();
682 	return (rc);
683 }
684 
685 /*
686  * smb_lgrp_getbyrid
687  *
688  * Retrieves the information of the group specified by
689  * the given RID and domain type.
690  *
691  * Note that this function doesn't allocate the group
692  * structure itself only the fields, so the given grp
693  * pointer has to point to a group structure.
694  * Caller must free the allocated memories for the fields
695  * by calling smb_lgrp_free().
696  *
697  * If grp is NULL no information would be returned. The
698  * return value of SMB_LGRP_SUCCESS will indicate that a
699  * group with the given information exists.
700  */
701 int
702 smb_lgrp_getbyrid(uint32_t rid, smb_domain_type_t domtype, smb_group_t *grp)
703 {
704 	smb_group_t tmpgrp;
705 	sqlite *db;
706 	int infolvl = SMB_LGRP_INFO_ALL;
707 	int rc;
708 
709 	if (!smb_lgrp_enter())
710 		return (SMB_LGRP_OFFLINE);
711 
712 	if (grp == NULL) {
713 		grp = &tmpgrp;
714 		infolvl = SMB_LGRP_INFO_NONE;
715 	}
716 
717 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
718 	rc = smb_lgrp_gtbl_lookup(db, SMB_LGRP_GTBL_SIDRID, grp, infolvl,
719 	    rid, domtype);
720 	smb_lgrp_db_close(db);
721 
722 	smb_lgrp_exit();
723 	return (rc);
724 }
725 
726 /*
727  * smb_lgrp_numbydomain
728  *
729  * Returns the number of groups in the given domain in the
730  * arg 'count'
731  */
732 int
733 smb_lgrp_numbydomain(smb_domain_type_t dom_type, int *count)
734 {
735 	sqlite *db;
736 	int dom_idx;
737 	int rc;
738 
739 	switch (dom_type) {
740 	case SMB_DOMAIN_LOCAL:
741 		dom_idx = SMB_LGRP_LOCAL_IDX;
742 		break;
743 	case SMB_DOMAIN_BUILTIN:
744 		dom_idx = SMB_LGRP_BUILTIN_IDX;
745 		break;
746 	default:
747 		*count = 0;
748 		return (SMB_LGRP_INVALID_ARG);
749 	}
750 
751 	if (!smb_lgrp_enter())
752 		return (SMB_LGRP_OFFLINE);
753 
754 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
755 	rc = smb_lgrp_gtbl_count(db, dom_idx, count);
756 	smb_lgrp_db_close(db);
757 
758 	smb_lgrp_exit();
759 	return (rc);
760 }
761 
762 /*
763  * smb_lgrp_free
764  *
765  * Frees the allocated memory for the fields of the given
766  * group structure. Note that this function doesn't free
767  * the group itself.
768  */
769 void
770 smb_lgrp_free(smb_group_t *grp)
771 {
772 	int i;
773 
774 	if (grp == NULL)
775 		return;
776 
777 	free(grp->sg_name);
778 	free(grp->sg_cmnt);
779 	smb_sid_free(grp->sg_id.gs_sid);
780 	smb_privset_free(grp->sg_privs);
781 
782 	for (i = 0; i < grp->sg_nmembers; i++)
783 		smb_sid_free(grp->sg_members[i].gs_sid);
784 	free(grp->sg_members);
785 }
786 
787 /*
788  * smb_lgrp_iteropen
789  *
790  * Initializes the given group iterator by opening
791  * the group database and creating a virtual machine
792  * for iteration.
793  */
794 int
795 smb_lgrp_iteropen(smb_giter_t *iter)
796 {
797 	char *sql;
798 	char *errmsg = NULL;
799 	int rc = SMB_LGRP_SUCCESS;
800 
801 	assert(iter);
802 
803 	if (!smb_lgrp_enter())
804 		return (SMB_LGRP_OFFLINE);
805 
806 	bzero(iter, sizeof (smb_giter_t));
807 
808 	sql = sqlite_mprintf("SELECT * FROM groups");
809 	if (sql == NULL) {
810 		smb_lgrp_exit();
811 		return (SMB_LGRP_NO_MEMORY);
812 	}
813 
814 	iter->sgi_db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
815 	if (iter->sgi_db == NULL) {
816 		sqlite_freemem(sql);
817 		smb_lgrp_exit();
818 		return (SMB_LGRP_DBOPEN_FAILED);
819 	}
820 
821 	rc = sqlite_compile(iter->sgi_db, sql, NULL, &iter->sgi_vm, &errmsg);
822 	sqlite_freemem(sql);
823 
824 	if (rc != SQLITE_OK) {
825 		syslog(LOG_DEBUG, "failed to create a VM (%s)",
826 		    NULL_MSGCHK(errmsg));
827 		rc = SMB_LGRP_DB_ERROR;
828 	}
829 
830 	smb_lgrp_exit();
831 	return (rc);
832 }
833 
834 /*
835  * smb_lgrp_iterclose
836  *
837  * Closes the given group iterator.
838  */
839 void
840 smb_lgrp_iterclose(smb_giter_t *iter)
841 {
842 	char *errmsg = NULL;
843 	int rc;
844 
845 	assert(iter);
846 
847 	if (!smb_lgrp_enter())
848 		return;
849 
850 	rc = sqlite_finalize(iter->sgi_vm, &errmsg);
851 	if (rc != SQLITE_OK) {
852 		syslog(LOG_DEBUG, "failed to destroy a VM (%s)",
853 		    NULL_MSGCHK(errmsg));
854 	}
855 
856 	smb_lgrp_db_close(iter->sgi_db);
857 	smb_lgrp_exit();
858 }
859 
860 /*
861  * Returns B_TRUE if there has been an error during
862  * iteration.
863  */
864 boolean_t
865 smb_lgrp_itererror(smb_giter_t *iter)
866 {
867 	return (iter->sgi_nerr != 0);
868 }
869 
870 /*
871  * smb_lgrp_iterate
872  *
873  * Iterate through group database
874  * Group information is returned in provided group structure.
875  *
876  * Note that this function doesn't allocate the group
877  * structure itself only the fields, so the given grp
878  * pointer has to point to a group structure.
879  * Caller must free the allocated memories for the fields
880  * by calling smb_lgrp_free().
881  */
882 int
883 smb_lgrp_iterate(smb_giter_t *iter, smb_group_t *grp)
884 {
885 	const char **values;
886 	int ncol;
887 	int rc;
888 	int i;
889 
890 	if (iter->sgi_vm == NULL || iter->sgi_db == NULL)
891 		return (SMB_LGRP_INVALID_ARG);
892 
893 	if (!smb_lgrp_enter())
894 		return (SMB_LGRP_OFFLINE);
895 
896 	for (;;) {
897 		bzero(grp, sizeof (smb_group_t));
898 		rc = sqlite_step(iter->sgi_vm, &ncol, &values, NULL);
899 		if (rc == SQLITE_DONE) {
900 			smb_lgrp_exit();
901 			return (SMB_LGRP_NO_MORE);
902 		}
903 
904 		if (rc != SQLITE_ROW) {
905 			smb_lgrp_exit();
906 			return (SMB_LGRP_DBEXEC_FAILED);
907 		}
908 
909 		if (ncol != SMB_LGRP_GTBL_NCOL) {
910 			smb_lgrp_exit();
911 			return (SMB_LGRP_DB_ERROR);
912 		}
913 
914 		for (i = 0; i < ncol; i++) {
915 			if (values[i] == NULL) {
916 				smb_lgrp_exit();
917 				return (SMB_LGRP_DB_ERROR);
918 			}
919 		}
920 
921 		rc = smb_lgrp_decode(grp, (char **)values, SMB_LGRP_INFO_ALL,
922 		    iter->sgi_db);
923 		if (rc == SMB_LGRP_SUCCESS)
924 			break;
925 
926 		iter->sgi_nerr++;
927 		syslog(LOG_ERR, "smb_lgrp_iterate: %s", smb_lgrp_strerror(rc));
928 	}
929 
930 	smb_lgrp_exit();
931 	return (rc);
932 
933 }
934 
935 /*
936  * smb_lgrp_is_member
937  *
938  * Check to see if the specified account is a member of
939  * the given group.
940  */
941 boolean_t
942 smb_lgrp_is_member(smb_group_t *grp, smb_sid_t *sid)
943 {
944 	int i;
945 
946 	if (grp == NULL || grp->sg_members == NULL || sid == NULL)
947 		return (B_FALSE);
948 
949 	for (i = 0; i < grp->sg_nmembers; i++) {
950 		if (smb_sid_cmp(grp->sg_members[i].gs_sid, sid))
951 			return (B_TRUE);
952 	}
953 
954 	return (B_FALSE);
955 }
956 
957 /*
958  * smb_lgrp_strerror
959  *
960  * Returns a text for the given group error code.
961  */
962 char *
963 smb_lgrp_strerror(int errnum)
964 {
965 	int	i;
966 	int	nerr = (sizeof (errtab) / sizeof (errtab[0]));
967 
968 	for (i = 0; i < nerr; ++i) {
969 		if (errnum == errtab[i].errnum)
970 			return (errtab[i].errmsg);
971 	}
972 
973 	return ("unknown local group error");
974 }
975 
976 /*
977  * smb_lgrp_err_to_ntstatus
978  *
979  * This routine maps Local group operation errors to NT Status error codes.
980  */
981 uint32_t
982 smb_lgrp_err_to_ntstatus(uint32_t lgrp_err)
983 {
984 	int i;
985 	static struct err_map {
986 		uint32_t lgrp_err;
987 		uint32_t nt_status;
988 	} err_map[] = {
989 		{ SMB_LGRP_SUCCESS,		NT_STATUS_SUCCESS },
990 		{ SMB_LGRP_INVALID_ARG,		NT_STATUS_INVALID_PARAMETER },
991 		{ SMB_LGRP_INVALID_MEMBER,	NT_STATUS_INVALID_MEMBER },
992 		{ SMB_LGRP_INVALID_NAME,	NT_STATUS_INVALID_PARAMETER },
993 		{ SMB_LGRP_NOT_FOUND,		NT_STATUS_NO_SUCH_ALIAS },
994 		{ SMB_LGRP_EXISTS,		NT_STATUS_ALIAS_EXISTS },
995 		{ SMB_LGRP_NO_SID,		NT_STATUS_INVALID_SID },
996 		{ SMB_LGRP_NO_LOCAL_SID,	NT_STATUS_INVALID_SID },
997 		{ SMB_LGRP_SID_NOTLOCAL,	NT_STATUS_INVALID_SID },
998 		{ SMB_LGRP_WKSID,		NT_STATUS_INVALID_SID },
999 		{ SMB_LGRP_NO_MEMORY,		NT_STATUS_NO_MEMORY },
1000 		{ SMB_LGRP_DB_ERROR,		NT_STATUS_INTERNAL_DB_ERROR },
1001 		{ SMB_LGRP_DBINIT_ERROR,	NT_STATUS_INTERNAL_DB_ERROR },
1002 		{ SMB_LGRP_INTERNAL_ERROR,	NT_STATUS_INTERNAL_ERROR },
1003 		{ SMB_LGRP_MEMBER_IN_GROUP,	NT_STATUS_MEMBER_IN_ALIAS },
1004 		{ SMB_LGRP_MEMBER_NOT_IN_GROUP,	NT_STATUS_MEMBER_NOT_IN_ALIAS },
1005 		{ SMB_LGRP_NO_SUCH_PRIV,	NT_STATUS_NO_SUCH_PRIVILEGE },
1006 		{ SMB_LGRP_NO_SUCH_DOMAIN,	NT_STATUS_NO_SUCH_DOMAIN },
1007 		{ SMB_LGRP_PRIV_HELD,		NT_STATUS_SUCCESS },
1008 		{ SMB_LGRP_PRIV_NOT_HELD,	NT_STATUS_PRIVILEGE_NOT_HELD },
1009 		{ SMB_LGRP_BAD_DATA,		NT_STATUS_DATA_ERROR },
1010 		{ SMB_LGRP_NO_MORE,		NT_STATUS_NO_MORE_ENTRIES },
1011 		{ SMB_LGRP_DBOPEN_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1012 		{ SMB_LGRP_DBEXEC_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1013 		{ SMB_LGRP_DBINIT_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1014 		{ SMB_LGRP_DOMLKP_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1015 		{ SMB_LGRP_DOMINS_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1016 		{ SMB_LGRP_INSERT_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1017 		{ SMB_LGRP_DELETE_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1018 		{ SMB_LGRP_UPDATE_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1019 		{ SMB_LGRP_LOOKUP_FAILED,	NT_STATUS_INTERNAL_DB_ERROR },
1020 		{ SMB_LGRP_NOT_SUPPORTED,	NT_STATUS_NOT_SUPPORTED },
1021 		{ SMB_LGRP_OFFLINE,		NT_STATUS_INTERNAL_ERROR },
1022 		{ SMB_LGRP_POSIXCREATE_FAILED,	NT_STATUS_UNSUCCESSFUL }
1023 	};
1024 
1025 	for (i = 0; i < sizeof (err_map)/sizeof (err_map[0]); ++i) {
1026 		if (err_map[i].lgrp_err == lgrp_err)
1027 			return (err_map[i].nt_status);
1028 	}
1029 
1030 	return (NT_STATUS_INTERNAL_ERROR);
1031 }
1032 
1033 /*
1034  * smb_lgrp_chkmember
1035  *
1036  * Determines valid account types for being member of
1037  * a local group.  We really have no business trying to
1038  * keep track of the "type" of SIDs in a group, so just
1039  * validate that the SID type is a known enum value.
1040  */
1041 static boolean_t
1042 smb_lgrp_chkmember(uint16_t sid_type)
1043 {
1044 	switch (sid_type) {
1045 	case SidTypeNull:
1046 	case SidTypeUser:
1047 	case SidTypeGroup:
1048 	case SidTypeAlias:
1049 	case SidTypeWellKnownGroup:
1050 	case SidTypeDeletedAccount:
1051 	case SidTypeInvalid:
1052 	case SidTypeUnknown:
1053 		return (B_TRUE);
1054 	}
1055 	return (B_FALSE);
1056 }
1057 
1058 /*
1059  * smb_lgrp_start
1060  *
1061  * Initializes the library private global variables.
1062  * Create the database, if it doesn't exist, and add
1063  * the predefined builtin groups.
1064  */
1065 int
1066 smb_lgrp_start(void)
1067 {
1068 	static char	*builtin[] = {
1069 		"Administrators",
1070 		"Backup Operators",
1071 		"Power Users"
1072 	};
1073 	smb_wka_t	*wka;
1074 	char		*localsid;
1075 	int		i, rc;
1076 	int		ngrp = sizeof (builtin) / sizeof (builtin[0]);
1077 
1078 	(void) mutex_lock(&smb_localgrp.lg_mutex);
1079 
1080 	if ((localsid = smb_config_get_localsid()) == NULL) {
1081 		(void) mutex_unlock(&smb_localgrp.lg_mutex);
1082 		return (SMB_LGRP_NO_LOCAL_SID);
1083 	}
1084 
1085 	smb_localgrp.lg_machine_sid = smb_sid_fromstr(localsid);
1086 	free(localsid);
1087 
1088 	if (!smb_sid_isvalid(smb_localgrp.lg_machine_sid)) {
1089 		free(smb_localgrp.lg_machine_sid);
1090 		smb_localgrp.lg_machine_sid = NULL;
1091 		(void) mutex_unlock(&smb_localgrp.lg_mutex);
1092 		return (SMB_LGRP_NO_LOCAL_SID);
1093 	}
1094 
1095 	rc = smb_lgrp_db_init();
1096 	if (rc != SMB_LGRP_SUCCESS) {
1097 		free(smb_localgrp.lg_machine_sid);
1098 		smb_localgrp.lg_machine_sid = NULL;
1099 		(void) mutex_unlock(&smb_localgrp.lg_mutex);
1100 		return (rc);
1101 	}
1102 
1103 	smb_localgrp.lg_online = B_TRUE;
1104 	(void) mutex_unlock(&smb_localgrp.lg_mutex);
1105 
1106 	for (i = 0; i < ngrp; i++) {
1107 		char	*tname;
1108 
1109 		if ((wka = smb_wka_lookup_name(builtin[i])) == NULL)
1110 			continue;
1111 
1112 		if ((tname = strdup(wka->wka_name)) == NULL)
1113 			return (SMB_LGRP_NO_MEMORY);
1114 		if (!smb_lgrp_exists(tname)) {
1115 			rc = smb_lgrp_add(tname, wka->wka_desc);
1116 			if (rc != SMB_LGRP_SUCCESS) {
1117 				syslog(LOG_DEBUG, "failed to add %s",
1118 				    tname);
1119 			}
1120 		}
1121 		free(tname);
1122 	}
1123 
1124 	return (SMB_LGRP_SUCCESS);
1125 }
1126 
1127 /*
1128  * smb_lgrp_stop
1129  *
1130  * Unintialize the library global private variables.
1131  */
1132 void
1133 smb_lgrp_stop(void)
1134 {
1135 	(void) mutex_lock(&smb_localgrp.lg_mutex);
1136 	if (!smb_localgrp.lg_online)
1137 		return;
1138 
1139 	smb_localgrp.lg_online = B_FALSE;
1140 
1141 	while (smb_localgrp.lg_refcnt > 0)
1142 		(void) cond_wait(&smb_localgrp.lg_cv, &smb_localgrp.lg_mutex);
1143 
1144 	free(smb_localgrp.lg_machine_sid);
1145 	smb_localgrp.lg_machine_sid = NULL;
1146 	(void) mutex_unlock(&smb_localgrp.lg_mutex);
1147 }
1148 
1149 static boolean_t
1150 smb_lgrp_enter(void)
1151 {
1152 	boolean_t	status;
1153 
1154 	(void) mutex_lock(&smb_localgrp.lg_mutex);
1155 
1156 	status = smb_localgrp.lg_online;
1157 
1158 	if (smb_localgrp.lg_online)
1159 		++smb_localgrp.lg_refcnt;
1160 
1161 	(void) mutex_unlock(&smb_localgrp.lg_mutex);
1162 	return (status);
1163 }
1164 
1165 static void
1166 smb_lgrp_exit(void)
1167 {
1168 	(void) mutex_lock(&smb_localgrp.lg_mutex);
1169 	assert(smb_localgrp.lg_refcnt > 0);
1170 
1171 	if ((--smb_localgrp.lg_refcnt) == 0)
1172 		(void) cond_signal(&smb_localgrp.lg_cv);
1173 
1174 	(void) mutex_unlock(&smb_localgrp.lg_mutex);
1175 }
1176 
1177 /*
1178  * smb_lgrp_db_open
1179  *
1180  * Opens group database with the given mode.
1181  */
1182 static sqlite *
1183 smb_lgrp_db_open(int mode)
1184 {
1185 	sqlite *db;
1186 	char *errmsg = NULL;
1187 
1188 	db = sqlite_open(SMB_LGRP_DB_NAME, mode, &errmsg);
1189 	if (db == NULL) {
1190 		syslog(LOG_ERR, "failed to open group database (%s)",
1191 		    NULL_MSGCHK(errmsg));
1192 		sqlite_freemem(errmsg);
1193 	}
1194 
1195 	return (db);
1196 }
1197 
1198 /*
1199  * smb_lgrp_db_close
1200  *
1201  * Closes the given database handle
1202  */
1203 static void
1204 smb_lgrp_db_close(sqlite *db)
1205 {
1206 	if (db) {
1207 		sqlite_close(db);
1208 	}
1209 }
1210 
1211 /*
1212  * smb_lgrp_db_init
1213  *
1214  * Creates the group database based on the defined SQL statement.
1215  * It also initializes db_info and domain tables.
1216  */
1217 static int
1218 smb_lgrp_db_init(void)
1219 {
1220 	int dbrc = SQLITE_OK;
1221 	int rc = SMB_LGRP_SUCCESS;
1222 	sqlite *db = NULL;
1223 	char *errmsg = NULL;
1224 
1225 	db = sqlite_open(SMB_LGRP_DB_NAME, 0600, &errmsg);
1226 	if (db == NULL) {
1227 		syslog(LOG_ERR, "failed to create group database (%s)",
1228 		    NULL_MSGCHK(errmsg));
1229 		sqlite_freemem(errmsg);
1230 		return (SMB_LGRP_DBOPEN_FAILED);
1231 	}
1232 
1233 	sqlite_busy_timeout(db, SMB_LGRP_DB_TIMEOUT);
1234 	dbrc = sqlite_exec(db, "BEGIN TRANSACTION;", NULL, NULL, &errmsg);
1235 	if (dbrc != SQLITE_OK) {
1236 		syslog(LOG_DEBUG, "failed to begin database transaction (%s)",
1237 		    NULL_MSGCHK(errmsg));
1238 		sqlite_freemem(errmsg);
1239 		sqlite_close(db);
1240 		return (SMB_LGRP_DBEXEC_FAILED);
1241 	}
1242 
1243 	switch (sqlite_exec(db, SMB_LGRP_DB_SQL, NULL, NULL, &errmsg)) {
1244 	case SQLITE_ERROR:
1245 		/*
1246 		 * This is the normal situation: CREATE probably failed because
1247 		 * tables already exist. It may indicate an error in SQL as well
1248 		 * but we cannot tell.
1249 		 */
1250 		sqlite_freemem(errmsg);
1251 		dbrc = sqlite_exec(db, "ROLLBACK TRANSACTION", NULL, NULL,
1252 		    &errmsg);
1253 		rc = SMB_LGRP_SUCCESS;
1254 		break;
1255 
1256 	case SQLITE_OK:
1257 		dbrc = sqlite_exec(db, "COMMIT TRANSACTION", NULL, NULL,
1258 		    &errmsg);
1259 		if (dbrc != SQLITE_OK)
1260 			break;
1261 		rc = smb_lgrp_dtbl_insert(db, NT_BUILTIN_DOMAIN_SIDSTR,
1262 		    NULL);
1263 		if (rc == SMB_LGRP_SUCCESS)
1264 			rc = smb_lgrp_db_setinfo(db);
1265 		if (rc != SMB_LGRP_SUCCESS) {
1266 			(void) sqlite_close(db);
1267 			(void) unlink(SMB_LGRP_DB_NAME);
1268 			return (rc);
1269 		}
1270 		break;
1271 
1272 	default:
1273 		syslog(LOG_ERR,
1274 		    "failed to initialize group database (%s)", errmsg);
1275 		sqlite_freemem(errmsg);
1276 		dbrc = sqlite_exec(db, "ROLLBACK TRANSACTION", NULL, NULL,
1277 		    &errmsg);
1278 		rc = SMB_LGRP_DBINIT_FAILED;
1279 		break;
1280 	}
1281 
1282 	if (dbrc != SQLITE_OK) {
1283 		/* this is bad - database may be left in a locked state */
1284 		syslog(LOG_DEBUG, "failed to close a transaction (%s)",
1285 		    NULL_MSGCHK(errmsg));
1286 		sqlite_freemem(errmsg);
1287 	}
1288 
1289 	(void) sqlite_close(db);
1290 	return (rc);
1291 }
1292 
1293 /*
1294  * smb_lgrp_gtbl_lookup
1295  *
1296  * This is a flexible lookup function for the group database.
1297  * The key type can be specified by the 'key' arg and the actual key
1298  * values can be passed after the 'infolvl' arg. 'infolvl' arg specifies
1299  * what information items for the specified group is needed.
1300  *
1301  * Note that the function assumes the given key is unique and only
1302  * specifies one or 0 group. The keys that are supported now are
1303  * the group name and the group SID
1304  *
1305  * Note that this function doesn't allocate the group
1306  * structure itself only the fields, so the given grp
1307  * pointer has to point to a group structure.
1308  * Caller must free the allocated memories for the fields
1309  * by calling smb_lgrp_free().
1310  */
1311 static int
1312 smb_lgrp_gtbl_lookup(sqlite *db, int key, smb_group_t *grp, int infolvl, ...)
1313 {
1314 	char *errmsg = NULL;
1315 	char *sql;
1316 	char **result;
1317 	int nrow, ncol;
1318 	int rc, dom_idx;
1319 	smb_group_t grpkey;
1320 	va_list ap;
1321 
1322 	if (db == NULL)
1323 		return (SMB_LGRP_DBOPEN_FAILED);
1324 
1325 	bzero(grp, sizeof (smb_group_t));
1326 	va_start(ap, infolvl);
1327 
1328 	switch (key) {
1329 	case SMB_LGRP_GTBL_NAME:
1330 		grpkey.sg_name = va_arg(ap, char *);
1331 		sql = sqlite_mprintf("SELECT * FROM groups WHERE name = '%s'",
1332 		    grpkey.sg_name);
1333 		break;
1334 
1335 	case SMB_LGRP_GTBL_SIDRID:
1336 		grpkey.sg_rid = va_arg(ap, uint32_t);
1337 		grpkey.sg_domain = va_arg(ap, smb_domain_type_t);
1338 		if (grpkey.sg_domain == SMB_DOMAIN_LOCAL) {
1339 			dom_idx = SMB_LGRP_LOCAL_IDX;
1340 			/* need to map the given rid to a gid */
1341 			rc = smb_lgrp_getgid(grpkey.sg_rid,
1342 			    (gid_t *)&grpkey.sg_rid);
1343 			if (rc != SMB_LGRP_SUCCESS) {
1344 				va_end(ap);
1345 				return (rc);
1346 			}
1347 		} else {
1348 			dom_idx = SMB_LGRP_BUILTIN_IDX;
1349 		}
1350 
1351 		sql = sqlite_mprintf("SELECT * FROM groups "
1352 		    "WHERE (sid_idx = %d) AND (sid_rid = %u)",
1353 		    dom_idx, grpkey.sg_rid);
1354 		break;
1355 
1356 	default:
1357 		va_end(ap);
1358 		return (SMB_LGRP_INVALID_ARG);
1359 	}
1360 
1361 	va_end(ap);
1362 	if (sql == NULL)
1363 		return (SMB_LGRP_NO_MEMORY);
1364 
1365 	rc = sqlite_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
1366 	sqlite_freemem(sql);
1367 
1368 	if (rc != SQLITE_OK) {
1369 		syslog(LOG_DEBUG, "failed to lookup (%s)", NULL_MSGCHK(errmsg));
1370 		sqlite_freemem(errmsg);
1371 		return (SMB_LGRP_LOOKUP_FAILED);
1372 	}
1373 
1374 	if (nrow == 0)  {
1375 		/* group not found */
1376 		sqlite_free_table(result);
1377 		return (SMB_LGRP_NOT_FOUND);
1378 	}
1379 
1380 	if (nrow != 1 || ncol != SMB_LGRP_GTBL_NCOL) {
1381 		sqlite_free_table(result);
1382 		return (SMB_LGRP_DB_ERROR);
1383 	}
1384 
1385 	rc = smb_lgrp_decode(grp, &result[SMB_LGRP_GTBL_NCOL], infolvl, db);
1386 	sqlite_free_table(result);
1387 	return (rc);
1388 }
1389 
1390 /*
1391  * smb_lgrp_gtbl_exists
1392  *
1393  * Checks to see if the given group exists or not.
1394  */
1395 static boolean_t
1396 smb_lgrp_gtbl_exists(sqlite *db, char *gname)
1397 {
1398 	char *errmsg = NULL;
1399 	char *sql;
1400 	char **result;
1401 	int nrow, ncol;
1402 	int rc;
1403 
1404 	if (db == NULL)
1405 		return (NULL);
1406 
1407 	sql = sqlite_mprintf("SELECT name FROM groups WHERE name = '%s'",
1408 	    gname);
1409 	rc = sqlite_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
1410 	sqlite_freemem(sql);
1411 
1412 	if (rc != SQLITE_OK) {
1413 		syslog(LOG_DEBUG, "failed to lookup %s (%s)",
1414 		    gname, NULL_MSGCHK(errmsg));
1415 		sqlite_freemem(errmsg);
1416 		return (B_FALSE);
1417 	}
1418 
1419 	sqlite_free_table(result);
1420 	return (nrow != 0);
1421 }
1422 
1423 /*
1424  * smb_lgrp_gtbl_count
1425  *
1426  * Counts the number of groups in the domain specified by
1427  * 'dom_idx'
1428  */
1429 static int
1430 smb_lgrp_gtbl_count(sqlite *db, int dom_idx, int *count)
1431 {
1432 	char *errmsg = NULL;
1433 	char *sql;
1434 	char **result;
1435 	int nrow, ncol;
1436 	int rc;
1437 
1438 	*count = 0;
1439 	if (db == NULL)
1440 		return (SMB_LGRP_DBOPEN_FAILED);
1441 
1442 	sql = sqlite_mprintf("SELECT sid_idx FROM groups WHERE sid_idx = %d",
1443 	    dom_idx);
1444 	rc = sqlite_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
1445 	sqlite_freemem(sql);
1446 
1447 	if (rc != SQLITE_OK) {
1448 		syslog(LOG_DEBUG, "failed to count (%s)", NULL_MSGCHK(errmsg));
1449 		sqlite_freemem(errmsg);
1450 		return (SMB_LGRP_LOOKUP_FAILED);
1451 	}
1452 
1453 	sqlite_free_table(result);
1454 	if (ncol > 1)
1455 		return (SMB_LGRP_DB_ERROR);
1456 
1457 	*count = nrow;
1458 	return (SMB_LGRP_SUCCESS);
1459 }
1460 
1461 /*
1462  * smb_lgrp_gtbl_insert
1463  *
1464  * Insert a record for the given group in the group database.
1465  *
1466  * NOTE: this function assumes that this group has no members
1467  * at this time.
1468  */
1469 static int
1470 smb_lgrp_gtbl_insert(sqlite *db, smb_group_t *grp)
1471 {
1472 	smb_lgpid_t privs[SE_MAX_LUID + 1];
1473 	smb_lgplist_t plist;
1474 	char *errmsg = NULL;
1475 	char *sql;
1476 	int dom_idx;
1477 	int rc;
1478 
1479 	if (db == NULL)
1480 		return (SMB_LGRP_DBOPEN_FAILED);
1481 
1482 	dom_idx = (grp->sg_domain == SMB_DOMAIN_LOCAL)
1483 	    ? SMB_LGRP_LOCAL_IDX : SMB_LGRP_BUILTIN_IDX;
1484 
1485 	plist.p_cnt = SE_MAX_LUID;
1486 	plist.p_ids = privs;
1487 	smb_lgrp_encode_privset(grp, &plist);
1488 
1489 	sql = sqlite_mprintf("INSERT INTO groups "
1490 	    "(name, sid_idx, sid_rid, sid_type, sid_attrs, comment, "
1491 	    "n_privs, privs, n_members, members) "
1492 	    "VALUES('%s', %u, %u, %u, %u, '%q', %u, '%q', %u, '%q')",
1493 	    grp->sg_name, dom_idx, grp->sg_rid, grp->sg_id.gs_type,
1494 	    grp->sg_attr, (grp->sg_cmnt) ? grp->sg_cmnt : "",
1495 	    plist.p_cnt, (char *)plist.p_ids, 0, "");
1496 
1497 	if (sql == NULL)
1498 		return (SMB_LGRP_NO_MEMORY);
1499 
1500 	rc = sqlite_exec(db, sql, NULL, NULL, &errmsg);
1501 	sqlite_freemem(sql);
1502 
1503 	if (rc != SQLITE_OK) {
1504 		syslog(LOG_DEBUG, "failed to insert %s (%s)",
1505 		    grp->sg_name, NULL_MSGCHK(errmsg));
1506 		sqlite_freemem(errmsg);
1507 		rc = SMB_LGRP_INSERT_FAILED;
1508 	} else {
1509 		rc = SMB_LGRP_SUCCESS;
1510 	}
1511 
1512 	return (rc);
1513 }
1514 
1515 /*
1516  * smb_lgrp_gtbl_delete
1517  *
1518  * Removes the specified group from the database
1519  */
1520 static int
1521 smb_lgrp_gtbl_delete(sqlite *db, char *gname)
1522 {
1523 	char *errmsg = NULL;
1524 	char *sql;
1525 	int rc;
1526 
1527 	if (db == NULL)
1528 		return (SMB_LGRP_DBOPEN_FAILED);
1529 
1530 	sql = sqlite_mprintf("DELETE FROM groups WHERE name = '%s'", gname);
1531 	if (sql == NULL)
1532 		return (SMB_LGRP_NO_MEMORY);
1533 
1534 	rc = sqlite_exec(db, sql, NULL, NULL, &errmsg);
1535 	sqlite_freemem(sql);
1536 
1537 	if (rc != SQLITE_OK) {
1538 		syslog(LOG_DEBUG, "failed to delete %s (%s)",
1539 		    gname, NULL_MSGCHK(errmsg));
1540 		sqlite_freemem(errmsg);
1541 		rc = SMB_LGRP_DELETE_FAILED;
1542 	} else {
1543 		rc = SMB_LGRP_SUCCESS;
1544 	}
1545 
1546 	return (rc);
1547 }
1548 
1549 /*
1550  * smb_lgrp_gtbl_update
1551  *
1552  * Updates the specified group information, the supported items
1553  * are group name and comment
1554  */
1555 static int
1556 smb_lgrp_gtbl_update(sqlite *db, char *gname, smb_group_t *grp, int col_id)
1557 {
1558 	char *errmsg = NULL;
1559 	char *sql;
1560 	int rc;
1561 
1562 	if (db == NULL)
1563 		return (SMB_LGRP_DBOPEN_FAILED);
1564 
1565 	/* UPDATE doesn't fail if gname doesn't exist */
1566 	if (!smb_lgrp_gtbl_exists(db, gname))
1567 		return (SMB_LGRP_NOT_FOUND);
1568 
1569 	switch (col_id) {
1570 	case SMB_LGRP_GTBL_NAME:
1571 		if (smb_lgrp_gtbl_exists(db, grp->sg_name))
1572 			return (SMB_LGRP_EXISTS);
1573 		sql = sqlite_mprintf("UPDATE groups SET name = '%s' "
1574 		    "WHERE name = '%s'", grp->sg_name, gname);
1575 		break;
1576 
1577 	case SMB_LGRP_GTBL_CMNT:
1578 		sql = sqlite_mprintf("UPDATE groups SET comment = '%q' "
1579 		"WHERE name = '%s'", grp->sg_cmnt, gname);
1580 		break;
1581 
1582 	default:
1583 		return (SMB_LGRP_INVALID_ARG);
1584 	}
1585 
1586 	if (sql == NULL)
1587 		return (SMB_LGRP_NO_MEMORY);
1588 
1589 	rc = sqlite_exec(db, sql, NULL, NULL, &errmsg);
1590 	sqlite_freemem(sql);
1591 
1592 	if (rc != SQLITE_OK) {
1593 		syslog(LOG_DEBUG, "failed to update %s (%s)",
1594 		    gname, NULL_MSGCHK(errmsg));
1595 		sqlite_freemem(errmsg);
1596 		rc = SMB_LGRP_UPDATE_FAILED;
1597 	} else {
1598 		rc = SMB_LGRP_SUCCESS;
1599 	}
1600 
1601 	return (rc);
1602 }
1603 
1604 /*
1605  * smb_lgrp_gtbl_update_mlist
1606  *
1607  * Adds/removes the specified member from the member list of the
1608  * given group
1609  */
1610 static int
1611 smb_lgrp_gtbl_update_mlist(sqlite *db, char *gname, smb_gsid_t *member,
1612     int flags)
1613 {
1614 	smb_lgmlist_t new_members;
1615 	smb_lgmlist_t members;
1616 	smb_lgmid_t mid;
1617 	char *errmsg = NULL;
1618 	char *sql;
1619 	char **result;
1620 	int nrow, ncol;
1621 	int rc;
1622 
1623 	if (db == NULL)
1624 		return (SMB_LGRP_DBOPEN_FAILED);
1625 
1626 	sql = sqlite_mprintf("SELECT n_members, members FROM groups "
1627 	    "WHERE name = '%s'", gname);
1628 
1629 	if (sql == NULL)
1630 		return (SMB_LGRP_NO_MEMORY);
1631 
1632 	rc = sqlite_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
1633 	sqlite_freemem(sql);
1634 
1635 	if (rc != SQLITE_OK) {
1636 		syslog(LOG_DEBUG, "failed to lookup %s (%s)",
1637 		    gname, NULL_MSGCHK(errmsg));
1638 		sqlite_freemem(errmsg);
1639 		return (SMB_LGRP_LOOKUP_FAILED);
1640 	}
1641 
1642 	if (nrow == 0)  {
1643 		/* group not found */
1644 		sqlite_free_table(result);
1645 		return (SMB_LGRP_NOT_FOUND);
1646 	}
1647 
1648 	if (nrow != 1 || ncol != 2) {
1649 		sqlite_free_table(result);
1650 		return (SMB_LGRP_DB_ERROR);
1651 	}
1652 
1653 	bzero(&mid, sizeof (mid));
1654 	mid.m_type = member->gs_type;
1655 	rc = smb_lgrp_dtbl_getidx(db, member->gs_sid, mid.m_type,
1656 	    &mid.m_idx, &mid.m_rid);
1657 	if (rc != SMB_LGRP_SUCCESS) {
1658 		sqlite_free_table(result);
1659 		return (rc);
1660 	}
1661 
1662 	members.m_cnt = atoi(result[2]);
1663 	members.m_ids = result[3];
1664 
1665 	switch (flags) {
1666 	case SMB_LGRP_DB_ADDMEMBER:
1667 		rc = smb_lgrp_mlist_add(&members, &mid, &new_members);
1668 		break;
1669 	case SMB_LGRP_DB_DELMEMBER:
1670 		rc = smb_lgrp_mlist_del(&members, &mid, &new_members);
1671 		break;
1672 	default:
1673 		rc = SMB_LGRP_INVALID_ARG;
1674 	}
1675 
1676 	sqlite_free_table(result);
1677 	if (rc != SMB_LGRP_SUCCESS)
1678 		return (rc);
1679 
1680 	sql = sqlite_mprintf("UPDATE groups SET n_members = %u, members = '%s'"
1681 	    " WHERE name = '%s'", new_members.m_cnt, new_members.m_ids, gname);
1682 
1683 	free(new_members.m_ids);
1684 
1685 	if (sql == NULL)
1686 		return (SMB_LGRP_NO_MEMORY);
1687 
1688 	rc = sqlite_exec(db, sql, NULL, NULL, &errmsg);
1689 	sqlite_freemem(sql);
1690 
1691 	if (rc != SQLITE_OK) {
1692 		syslog(LOG_DEBUG, "failed to update %s (%s)", gname,
1693 		    NULL_MSGCHK(errmsg));
1694 		sqlite_freemem(errmsg);
1695 		rc = SMB_LGRP_UPDATE_FAILED;
1696 	} else {
1697 		rc = SMB_LGRP_SUCCESS;
1698 	}
1699 
1700 	return (rc);
1701 }
1702 
1703 /*
1704  * smb_lgrp_gtbl_update_plist
1705  *
1706  * Adds/removes the specified privilege from the privilege list of the
1707  * given group
1708  */
1709 static int
1710 smb_lgrp_gtbl_update_plist(sqlite *db, char *gname, uint8_t priv_id,
1711     boolean_t enable)
1712 {
1713 	char *sql;
1714 	char *errmsg = NULL;
1715 	char **result;
1716 	int nrow, ncol;
1717 	int rc;
1718 	smb_lgplist_t privs;
1719 	smb_lgplist_t new_privs;
1720 
1721 	if (db == NULL)
1722 		return (SMB_LGRP_DBOPEN_FAILED);
1723 
1724 	sql = sqlite_mprintf("SELECT n_privs, privs FROM groups "
1725 	    "WHERE name = '%s'", gname);
1726 
1727 	if (sql == NULL)
1728 		return (SMB_LGRP_NO_MEMORY);
1729 
1730 	rc = sqlite_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
1731 	sqlite_freemem(sql);
1732 
1733 	if (rc != SQLITE_OK) {
1734 		syslog(LOG_DEBUG, "failed to lookup %s (%s)",
1735 		    gname, NULL_MSGCHK(errmsg));
1736 		sqlite_freemem(errmsg);
1737 		return (SMB_LGRP_LOOKUP_FAILED);
1738 	}
1739 
1740 	if (nrow == 0)  {
1741 		/* group not found */
1742 		sqlite_free_table(result);
1743 		return (SMB_LGRP_NOT_FOUND);
1744 	}
1745 
1746 	if (nrow != 1 || ncol != 2) {
1747 		sqlite_free_table(result);
1748 		return (SMB_LGRP_DB_ERROR);
1749 	}
1750 
1751 	privs.p_cnt = atoi(result[2]);
1752 	privs.p_ids = (smb_lgpid_t *)result[3];
1753 
1754 	if (enable)
1755 		rc = smb_lgrp_plist_add(&privs, priv_id, &new_privs);
1756 	else
1757 		rc = smb_lgrp_plist_del(&privs, priv_id, &new_privs);
1758 
1759 	sqlite_free_table(result);
1760 	if (rc != SMB_LGRP_SUCCESS)
1761 		return (rc);
1762 
1763 	sql = sqlite_mprintf("UPDATE groups SET n_privs = %u, privs = '%q'"
1764 	    " WHERE name = '%s'", new_privs.p_cnt, (char *)new_privs.p_ids,
1765 	    gname);
1766 
1767 	free(new_privs.p_ids);
1768 
1769 	if (sql == NULL)
1770 		return (SMB_LGRP_NO_MEMORY);
1771 
1772 	rc = sqlite_exec(db, sql, NULL, NULL, &errmsg);
1773 	sqlite_freemem(sql);
1774 
1775 	if (rc != SQLITE_OK) {
1776 		syslog(LOG_DEBUG, "failed to update %s (%s)",
1777 		    gname, NULL_MSGCHK(errmsg));
1778 		sqlite_freemem(errmsg);
1779 		rc = SMB_LGRP_UPDATE_FAILED;
1780 	} else {
1781 		rc = SMB_LGRP_SUCCESS;
1782 	}
1783 
1784 	return (rc);
1785 }
1786 
1787 /*
1788  * smb_lgrp_dtbl_insert
1789  *
1790  * Inserts the specified domain SID in the dmain table.
1791  * Upon successful insert the index will be returned in
1792  * 'dom_idx' arg.
1793  */
1794 static int
1795 smb_lgrp_dtbl_insert(sqlite *db, char *dom_sid, uint32_t *dom_idx)
1796 {
1797 	char *errmsg = NULL;
1798 	char *sql;
1799 	int rc;
1800 
1801 	sql = sqlite_mprintf("INSERT INTO domains (dom_sid, dom_cnt)"
1802 	    " VALUES('%s', 1);", dom_sid);
1803 	if (sql == NULL)
1804 		return (SMB_LGRP_NO_MEMORY);
1805 
1806 	rc = sqlite_exec(db, sql, NULL, NULL, &errmsg);
1807 	sqlite_freemem(sql);
1808 
1809 	if (rc != SQLITE_OK) {
1810 		syslog(LOG_DEBUG, "failed to insert domain SID (%s)",
1811 		    NULL_MSGCHK(errmsg));
1812 		sqlite_freemem(errmsg);
1813 		return (SMB_LGRP_DOMINS_FAILED);
1814 	}
1815 
1816 	if (dom_idx)
1817 		*dom_idx = sqlite_last_insert_rowid(db);
1818 	return (SMB_LGRP_SUCCESS);
1819 }
1820 
1821 /*
1822  * smb_lgrp_dtbl_getidx
1823  *
1824  * Searches the domain table for the domain SID of the
1825  * given member SID. If it finds the domain SID it'll
1826  * return the index and the RID, otherwise it'll insert
1827  * it in the domain table as a new SID.
1828  */
1829 static int
1830 smb_lgrp_dtbl_getidx(sqlite *db, smb_sid_t *sid, uint16_t sid_type,
1831     uint32_t *dom_idx, uint32_t *rid)
1832 {
1833 	char sidstr[SMB_SID_STRSZ];
1834 	smb_sid_t *dom_sid;
1835 	char **result;
1836 	int nrow, ncol;
1837 	char *errmsg = NULL;
1838 	char *sql;
1839 	int rc;
1840 
1841 	if (smb_sid_indomain(smb_localgrp.lg_machine_sid, sid)) {
1842 		/* This is a local SID */
1843 		int id_type = (sid_type == SidTypeUser)
1844 		    ? SMB_IDMAP_USER : SMB_IDMAP_GROUP;
1845 		*dom_idx = SMB_LGRP_LOCAL_IDX;
1846 		if (smb_idmap_getid(sid, rid, &id_type) != IDMAP_SUCCESS)
1847 			return (SMB_LGRP_INTERNAL_ERROR);
1848 
1849 		return (SMB_LGRP_SUCCESS);
1850 	}
1851 
1852 	if ((dom_sid = smb_sid_split(sid, rid)) == NULL)
1853 		return (SMB_LGRP_NO_MEMORY);
1854 
1855 	smb_sid_tostr(dom_sid, sidstr);
1856 	free(dom_sid);
1857 
1858 	sql = sqlite_mprintf("SELECT dom_idx FROM domains WHERE dom_sid = '%s'",
1859 	    sidstr);
1860 	if (sql == NULL)
1861 		return (SMB_LGRP_NO_MEMORY);
1862 
1863 	rc = sqlite_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
1864 	sqlite_freemem(sql);
1865 
1866 	if (rc != SQLITE_OK) {
1867 		syslog(LOG_DEBUG, "failed to lookup domain SID (%s)",
1868 		    NULL_MSGCHK(errmsg));
1869 		sqlite_freemem(errmsg);
1870 		return (SMB_LGRP_DOMLKP_FAILED);
1871 	}
1872 
1873 	switch (nrow) {
1874 	case 0:
1875 		/* new domain SID; insert it into the domains table */
1876 		sqlite_free_table(result);
1877 		return (smb_lgrp_dtbl_insert(db, sidstr, dom_idx));
1878 
1879 	case 1:
1880 		*dom_idx = atoi(result[1]);
1881 		sqlite_free_table(result);
1882 		return (SMB_LGRP_SUCCESS);
1883 	}
1884 
1885 	sqlite_free_table(result);
1886 	return (SMB_LGRP_DB_ERROR);
1887 }
1888 
1889 /*
1890  * smb_lgrp_dtbl_getsid
1891  *
1892  * Searchs the domain table for the given domain index.
1893  * Converts the found domain SID to binary format and
1894  * returns it in the 'sid' arg.
1895  *
1896  * Caller must free the returned SID by calling free().
1897  */
1898 static int
1899 smb_lgrp_dtbl_getsid(sqlite *db, uint32_t dom_idx, smb_sid_t **sid)
1900 {
1901 	char **result;
1902 	int nrow, ncol;
1903 	char *errmsg = NULL;
1904 	char *sql;
1905 	int rc;
1906 
1907 	sql = sqlite_mprintf("SELECT dom_sid FROM domains WHERE dom_idx = %u",
1908 	    dom_idx);
1909 	if (sql == NULL)
1910 		return (SMB_LGRP_NO_MEMORY);
1911 
1912 	rc = sqlite_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
1913 	sqlite_freemem(sql);
1914 
1915 	if (rc != SQLITE_OK) {
1916 		syslog(LOG_DEBUG, "failed to lookup domain index (%s)",
1917 		    NULL_MSGCHK(errmsg));
1918 		sqlite_freemem(errmsg);
1919 		return (SMB_LGRP_DOMLKP_FAILED);
1920 	}
1921 
1922 	switch (nrow) {
1923 	case 0:
1924 		rc = SMB_LGRP_NO_SUCH_DOMAIN;
1925 		break;
1926 
1927 	case 1:
1928 		*sid = smb_sid_fromstr(result[1]);
1929 		rc = (*sid == NULL)
1930 		    ? SMB_LGRP_INTERNAL_ERROR : SMB_LGRP_SUCCESS;
1931 		break;
1932 
1933 	default:
1934 		rc = SMB_LGRP_DB_ERROR;
1935 		break;
1936 	}
1937 
1938 	sqlite_free_table(result);
1939 	return (rc);
1940 }
1941 
1942 /*
1943  * smb_lgrp_db_setinfo
1944  *
1945  * Initializes the db_info table upon database creation.
1946  */
1947 static int
1948 smb_lgrp_db_setinfo(sqlite *db)
1949 {
1950 	char *errmsg = NULL;
1951 	char *sql;
1952 	int rc;
1953 
1954 	sql = sqlite_mprintf("INSERT INTO db_info (ver_major, ver_minor,"
1955 	    " magic) VALUES (%d, %d, %u)", SMB_LGRP_DB_VERMAJOR,
1956 	    SMB_LGRP_DB_VERMINOR, SMB_LGRP_DB_MAGIC);
1957 
1958 	if (sql == NULL)
1959 		return (SMB_LGRP_NO_MEMORY);
1960 
1961 	rc = sqlite_exec(db, sql, NULL, NULL, &errmsg);
1962 	sqlite_freemem(sql);
1963 	if (rc != SQLITE_OK) {
1964 		syslog(LOG_DEBUG, "failed to insert database information (%s)",
1965 		    NULL_MSGCHK(errmsg));
1966 		sqlite_freemem(errmsg);
1967 		rc = SMB_LGRP_DBINIT_ERROR;
1968 	} else {
1969 		rc = SMB_LGRP_SUCCESS;
1970 	}
1971 
1972 	return (rc);
1973 }
1974 
1975 /*
1976  * smb_lgrp_mlist_add
1977  *
1978  * Adds the given member (newm) to the input member list (in_members)
1979  * if it's not already there. The result list will be returned in
1980  * out_members. The caller must free the allocated memory for
1981  * out_members by calling free().
1982  *
1983  * in_members and out_members are hex strings.
1984  */
1985 static int
1986 smb_lgrp_mlist_add(smb_lgmlist_t *in_members, smb_lgmid_t *newm,
1987     smb_lgmlist_t *out_members)
1988 {
1989 	char mid_hex[SMB_LGRP_MID_HEXSZ];
1990 	char *in_list;
1991 	char *out_list;
1992 	int in_size;
1993 	int out_size;
1994 	int mid_hexsz;
1995 	int i;
1996 
1997 	out_members->m_cnt = 0;
1998 	out_members->m_ids = NULL;
1999 
2000 	bzero(mid_hex, sizeof (mid_hex));
2001 	mid_hexsz = bintohex((const char *)newm, sizeof (smb_lgmid_t),
2002 	    mid_hex, sizeof (mid_hex));
2003 
2004 	/*
2005 	 * Check to see if this is already a group member
2006 	 */
2007 	in_list = in_members->m_ids;
2008 	for (i = 0; i < in_members->m_cnt; i++) {
2009 		if (strncmp(in_list, mid_hex, mid_hexsz) == 0)
2010 			return (SMB_LGRP_MEMBER_IN_GROUP);
2011 		in_list += mid_hexsz;
2012 	}
2013 
2014 	in_size = (in_members->m_ids) ? strlen(in_members->m_ids) : 0;
2015 	out_size = in_size + sizeof (mid_hex) + 1;
2016 	out_list = malloc(out_size);
2017 	if (out_list == NULL)
2018 		return (SMB_LGRP_NO_MEMORY);
2019 
2020 	bzero(out_list, out_size);
2021 	if (in_members->m_ids)
2022 		(void) strlcpy(out_list, in_members->m_ids, out_size);
2023 	(void) strcat(out_list, mid_hex);
2024 
2025 	out_members->m_cnt = in_members->m_cnt + 1;
2026 	out_members->m_ids = out_list;
2027 
2028 	return (SMB_LGRP_SUCCESS);
2029 }
2030 
2031 /*
2032  * smb_lgrp_mlist_del
2033  *
2034  * Removes the given member (msid) from the input member list
2035  * (in_members) if it's already there. The result list will b
2036  * returned in out_members. The caller must free the allocated
2037  * memory for out_members by calling free().
2038  *
2039  * in_members and out_members are hex strings.
2040  */
2041 static int
2042 smb_lgrp_mlist_del(smb_lgmlist_t *in_members, smb_lgmid_t *mid,
2043     smb_lgmlist_t *out_members)
2044 {
2045 	char mid_hex[SMB_LGRP_MID_HEXSZ];
2046 	char *in_list;
2047 	char *out_list;
2048 	int in_size;
2049 	int out_size;
2050 	int mid_hexsz;
2051 	int out_cnt;
2052 	int i;
2053 
2054 	out_members->m_cnt = 0;
2055 	out_members->m_ids = NULL;
2056 
2057 	if ((in_members == NULL) || (in_members->m_cnt == 0))
2058 		return (SMB_LGRP_MEMBER_NOT_IN_GROUP);
2059 
2060 	in_size = strlen(in_members->m_ids);
2061 	out_size = in_size + sizeof (mid_hex) + 1;
2062 	out_list = malloc(out_size);
2063 	if (out_list == NULL)
2064 		return (SMB_LGRP_NO_MEMORY);
2065 
2066 	*out_list = '\0';
2067 
2068 	bzero(mid_hex, sizeof (mid_hex));
2069 	mid_hexsz = bintohex((const char *)mid, sizeof (smb_lgmid_t),
2070 	    mid_hex, sizeof (mid_hex));
2071 
2072 	in_list = in_members->m_ids;
2073 	for (i = 0, out_cnt = 0; i < in_members->m_cnt; i++) {
2074 		if (strncmp(in_list, mid_hex, mid_hexsz)) {
2075 			(void) strncat(out_list, in_list, mid_hexsz);
2076 			out_cnt++;
2077 		}
2078 		in_list += mid_hexsz;
2079 	}
2080 
2081 	if (out_cnt == in_members->m_cnt) {
2082 		free(out_list);
2083 		return (SMB_LGRP_MEMBER_NOT_IN_GROUP);
2084 	}
2085 
2086 	out_members->m_cnt = out_cnt;
2087 	out_members->m_ids = out_list;
2088 	return (SMB_LGRP_SUCCESS);
2089 }
2090 
2091 /*
2092  * smb_lgrp_plist_add
2093  *
2094  * Adds the given privilege to the input list (in_privs)
2095  * if it's not already there. The result list is returned
2096  * in out_privs. The caller must free the allocated memory
2097  * for out_privs by calling free().
2098  */
2099 static int
2100 smb_lgrp_plist_add(smb_lgplist_t *in_privs, smb_lgpid_t priv_id,
2101     smb_lgplist_t *out_privs)
2102 {
2103 	int i, size;
2104 	smb_lgpid_t *pbuf;
2105 
2106 	out_privs->p_cnt = 0;
2107 	out_privs->p_ids = NULL;
2108 
2109 	for (i = 0; i < in_privs->p_cnt; i++) {
2110 		if (in_privs->p_ids[i] == priv_id)
2111 			return (SMB_LGRP_PRIV_HELD);
2112 	}
2113 
2114 	size = (in_privs->p_cnt + 1) * sizeof (smb_lgpid_t) + 1;
2115 	pbuf = malloc(size);
2116 	if (pbuf == NULL)
2117 		return (SMB_LGRP_NO_MEMORY);
2118 
2119 	bzero(pbuf, size);
2120 	bcopy(in_privs->p_ids, pbuf, in_privs->p_cnt * sizeof (smb_lgpid_t));
2121 	pbuf[in_privs->p_cnt] = priv_id;
2122 
2123 	out_privs->p_cnt = in_privs->p_cnt + 1;
2124 	out_privs->p_ids = pbuf;
2125 
2126 	return (SMB_LGRP_SUCCESS);
2127 }
2128 
2129 /*
2130  * smb_lgrp_plist_del
2131  *
2132  * Removes the given privilege from the input list (in_privs)
2133  * if it's already there. The result list is returned
2134  * in out_privs. The caller must free the allocated memory
2135  * for out_privs by calling free().
2136  */
2137 static int
2138 smb_lgrp_plist_del(smb_lgplist_t *in_privs, smb_lgpid_t priv_id,
2139     smb_lgplist_t *out_privs)
2140 {
2141 	int i, size;
2142 
2143 	out_privs->p_cnt = 0;
2144 	out_privs->p_ids = NULL;
2145 
2146 	if ((in_privs == NULL) || (in_privs->p_cnt == 0))
2147 		return (SMB_LGRP_PRIV_NOT_HELD);
2148 
2149 	size = (in_privs->p_cnt - 1) * sizeof (smb_lgpid_t) + 1;
2150 	out_privs->p_ids = malloc(size);
2151 	if (out_privs->p_ids == NULL)
2152 		return (SMB_LGRP_NO_MEMORY);
2153 
2154 	bzero(out_privs->p_ids, size);
2155 
2156 	for (i = 0; i < in_privs->p_cnt; i++) {
2157 		if (in_privs->p_ids[i] != priv_id)
2158 			out_privs->p_ids[out_privs->p_cnt++] =
2159 			    in_privs->p_ids[i];
2160 	}
2161 
2162 	if (out_privs->p_cnt == in_privs->p_cnt) {
2163 		free(out_privs->p_ids);
2164 		out_privs->p_cnt = 0;
2165 		out_privs->p_ids = NULL;
2166 		return (SMB_LGRP_PRIV_NOT_HELD);
2167 	}
2168 
2169 	return (SMB_LGRP_SUCCESS);
2170 }
2171 
2172 /*
2173  * smb_lgrp_encode_privset
2174  *
2175  * Encodes given privilege set into a buffer to be stored in the group
2176  * database. Each entry of the encoded buffer contains the privilege ID
2177  * of an enable privilege. The returned buffer is null-terminated.
2178  */
2179 static void
2180 smb_lgrp_encode_privset(smb_group_t *grp, smb_lgplist_t *plist)
2181 {
2182 	smb_privset_t *privs;
2183 	uint32_t pcnt = plist->p_cnt;
2184 	int i;
2185 
2186 	bzero(plist->p_ids, sizeof (smb_lgpid_t) * plist->p_cnt);
2187 	plist->p_cnt = 0;
2188 
2189 	privs = grp->sg_privs;
2190 	if ((privs == NULL) || (privs->priv_cnt == 0))
2191 		return;
2192 
2193 	if (pcnt < privs->priv_cnt) {
2194 		assert(0);
2195 	}
2196 
2197 	for (i = 0; i < privs->priv_cnt; i++) {
2198 		if (privs->priv[i].attrs == SE_PRIVILEGE_ENABLED) {
2199 			plist->p_ids[plist->p_cnt++] =
2200 			    (uint8_t)privs->priv[i].luid.lo_part;
2201 		}
2202 	}
2203 }
2204 
2205 /*
2206  * smb_lgrp_decode_privset
2207  *
2208  * Decodes the privilege information read from group table
2209  * (nprivs, privs) into a binray format specified by the
2210  * privilege field of smb_group_t
2211  */
2212 static int
2213 smb_lgrp_decode_privset(smb_group_t *grp, char *nprivs, char *privs)
2214 {
2215 	smb_lgplist_t plist;
2216 	int i;
2217 
2218 	plist.p_cnt = atoi(nprivs);
2219 	if (strlen(privs) != plist.p_cnt)
2220 		return (SMB_LGRP_BAD_DATA);
2221 
2222 	plist.p_ids = (smb_lgpid_t *)privs;
2223 	grp->sg_privs = smb_privset_new();
2224 	if (grp->sg_privs == NULL)
2225 		return (SMB_LGRP_NO_MEMORY);
2226 
2227 	for (i = 0; i < plist.p_cnt; i++)
2228 		smb_privset_enable(grp->sg_privs, plist.p_ids[i]);
2229 
2230 	return (SMB_LGRP_SUCCESS);
2231 }
2232 
2233 /*
2234  * smb_lgrp_decode_members
2235  *
2236  * Decodes the members information read from group table
2237  * (nmembers, members) into a binary format specified by the
2238  * member fields of smb_group_t
2239  */
2240 static int
2241 smb_lgrp_decode_members(smb_group_t *grp, char *nmembers, char *members,
2242     sqlite *db)
2243 {
2244 	smb_lgmid_t *m_id;
2245 	smb_lgmid_t *m_ids;
2246 	smb_gsid_t *m_sid;
2247 	smb_gsid_t *m_sids;
2248 	int m_num;
2249 	int mids_size;
2250 	int i, rc;
2251 
2252 	grp->sg_nmembers = 0;
2253 	grp->sg_members = NULL;
2254 
2255 	m_num = atoi(nmembers);
2256 	mids_size = m_num * sizeof (smb_lgmid_t);
2257 	if ((m_ids = malloc(mids_size)) == NULL)
2258 		return (SMB_LGRP_NO_MEMORY);
2259 
2260 	m_sids = calloc(m_num, sizeof (smb_gsid_t));
2261 	if (m_sids == NULL) {
2262 		free(m_ids);
2263 		return (SMB_LGRP_NO_MEMORY);
2264 	}
2265 
2266 	(void) hextobin(members, strlen(members), (char *)m_ids, mids_size);
2267 
2268 	m_id = m_ids;
2269 	m_sid = m_sids;
2270 	for (i = 0; i < m_num; i++, m_id++, m_sid++) {
2271 		rc = smb_lgrp_getsid(m_id->m_idx, &m_id->m_rid, m_id->m_type,
2272 		    db, &m_sid->gs_sid);
2273 
2274 		if (rc != SMB_LGRP_SUCCESS) {
2275 			free(m_ids);
2276 			for (m_sid = m_sids; m_sid->gs_sid != NULL; m_sid++)
2277 				smb_sid_free(m_sid->gs_sid);
2278 			free(m_sids);
2279 			return (rc);
2280 		}
2281 
2282 		m_sid->gs_type = m_id->m_type;
2283 	}
2284 
2285 	free(m_ids);
2286 
2287 	grp->sg_nmembers = m_num;
2288 	grp->sg_members = m_sids;
2289 	return (SMB_LGRP_SUCCESS);
2290 }
2291 
2292 /*
2293  * smb_lgrp_decode
2294  *
2295  * Fills out the fields of the given group (grp) based in the
2296  * string information read from the group table. infolvl determines
2297  * which fields are requested and need to be decoded.
2298  *
2299  * Allocated memories must be freed by calling smb_lgrp_free()
2300  * upon successful return.
2301  */
2302 static int
2303 smb_lgrp_decode(smb_group_t *grp, char **values, int infolvl, sqlite *db)
2304 {
2305 	uint32_t sid_idx;
2306 	int rc;
2307 
2308 	if (infolvl == SMB_LGRP_INFO_NONE)
2309 		return (SMB_LGRP_SUCCESS);
2310 
2311 	if (infolvl & SMB_LGRP_INFO_NAME) {
2312 		grp->sg_name = strdup(values[SMB_LGRP_GTBL_NAME]);
2313 		if (grp->sg_name == NULL)
2314 			return (SMB_LGRP_NO_MEMORY);
2315 	}
2316 
2317 	if (infolvl & SMB_LGRP_INFO_CMNT) {
2318 		grp->sg_cmnt = strdup(values[SMB_LGRP_GTBL_CMNT]);
2319 		if (grp->sg_cmnt == NULL) {
2320 			smb_lgrp_free(grp);
2321 			return (SMB_LGRP_NO_MEMORY);
2322 		}
2323 	}
2324 
2325 
2326 	if (infolvl & SMB_LGRP_INFO_SID) {
2327 		sid_idx = atoi(values[SMB_LGRP_GTBL_SIDIDX]);
2328 		grp->sg_rid = atoi(values[SMB_LGRP_GTBL_SIDRID]);
2329 		grp->sg_attr = atoi(values[SMB_LGRP_GTBL_SIDATR]);
2330 		grp->sg_id.gs_type = atoi(values[SMB_LGRP_GTBL_SIDTYP]);
2331 		rc = smb_lgrp_getsid(sid_idx, &grp->sg_rid, grp->sg_id.gs_type,
2332 		    db, &grp->sg_id.gs_sid);
2333 		if (rc != SMB_LGRP_SUCCESS) {
2334 			smb_lgrp_free(grp);
2335 			return (rc);
2336 		}
2337 		grp->sg_domain = (sid_idx == SMB_LGRP_LOCAL_IDX)
2338 		    ? SMB_DOMAIN_LOCAL : SMB_DOMAIN_BUILTIN;
2339 	}
2340 
2341 	if (infolvl & SMB_LGRP_INFO_PRIV) {
2342 		rc = smb_lgrp_decode_privset(grp, values[SMB_LGRP_GTBL_NPRIVS],
2343 		    values[SMB_LGRP_GTBL_PRIVS]);
2344 
2345 		if (rc != SMB_LGRP_SUCCESS) {
2346 			smb_lgrp_free(grp);
2347 			return (rc);
2348 		}
2349 	}
2350 
2351 	if (infolvl & SMB_LGRP_INFO_MEMB) {
2352 		rc = smb_lgrp_decode_members(grp, values[SMB_LGRP_GTBL_NMEMBS],
2353 		    values[SMB_LGRP_GTBL_MEMBS], db);
2354 		if (rc != SMB_LGRP_SUCCESS) {
2355 			smb_lgrp_free(grp);
2356 			return (rc);
2357 		}
2358 	}
2359 
2360 	return (SMB_LGRP_SUCCESS);
2361 }
2362 
2363 /*
2364  * smb_lgrp_normalize_name
2365  *
2366  * Trim whitespace, validate the group name and convert it to lowercase.
2367  */
2368 static boolean_t
2369 smb_lgrp_normalize_name(char *name)
2370 {
2371 	(void) trim_whitespace(name);
2372 
2373 	if (smb_name_validate_account(name) != ERROR_SUCCESS)
2374 		return (B_FALSE);
2375 
2376 	(void) smb_strlwr(name);
2377 	return (B_TRUE);
2378 }
2379 
2380 /*
2381  * smb_lgrp_set_default_privs
2382  *
2383  * set default privileges for Administrators and Backup Operators
2384  */
2385 static void
2386 smb_lgrp_set_default_privs(smb_group_t *grp)
2387 {
2388 	if (smb_strcasecmp(grp->sg_name, "Administrators", 0) == 0) {
2389 		smb_privset_enable(grp->sg_privs, SE_TAKE_OWNERSHIP_LUID);
2390 		return;
2391 	}
2392 
2393 	if (smb_strcasecmp(grp->sg_name, "Backup Operators", 0) == 0) {
2394 		smb_privset_enable(grp->sg_privs, SE_BACKUP_LUID);
2395 		smb_privset_enable(grp->sg_privs, SE_RESTORE_LUID);
2396 		return;
2397 	}
2398 }
2399 
2400 /*
2401  * smb_lgrp_getsid
2402  *
2403  * Returns a SID based on the provided information
2404  * If dom_idx is 0, it means 'rid' contains a UID/GID and the
2405  * returned SID will be a local SID. If dom_idx is not 0 then
2406  * the domain SID will be fetched from the domain table.
2407  */
2408 static int
2409 smb_lgrp_getsid(int dom_idx, uint32_t *rid, uint16_t sid_type,
2410     sqlite *db, smb_sid_t **sid)
2411 {
2412 	smb_sid_t *dom_sid = NULL;
2413 	smb_sid_t *res_sid = NULL;
2414 	idmap_stat stat;
2415 	int id_type;
2416 	int rc;
2417 
2418 	*sid = NULL;
2419 	if (dom_idx == SMB_LGRP_LOCAL_IDX) {
2420 		id_type = (sid_type == SidTypeUser)
2421 		    ? SMB_IDMAP_USER : SMB_IDMAP_GROUP;
2422 		stat = smb_idmap_getsid(*rid, id_type, &res_sid);
2423 		if (stat != IDMAP_SUCCESS) {
2424 			syslog(LOG_ERR, "smb_lgrp_getsid: "
2425 			    "failed to get a SID for %s id=%u (%d)",
2426 			    (id_type == SMB_IDMAP_USER) ? "user" : "group",
2427 			    *rid, stat);
2428 			return (SMB_LGRP_NO_SID);
2429 		}
2430 
2431 		/*
2432 		 * Make sure the returned SID is local
2433 		 */
2434 		if (!smb_sid_indomain(smb_localgrp.lg_machine_sid, res_sid)) {
2435 			syslog(LOG_ERR, "smb_lgrp_getsid: "
2436 			    "local %s (%u) is mapped to a non-local SID",
2437 			    (id_type == SMB_IDMAP_USER) ? "user" : "group",
2438 			    *rid);
2439 			smb_sid_free(res_sid);
2440 			return (SMB_LGRP_SID_NOTLOCAL);
2441 		}
2442 
2443 		(void) smb_sid_getrid(res_sid, rid);
2444 		*sid = res_sid;
2445 		return (SMB_LGRP_SUCCESS);
2446 	}
2447 
2448 	rc = smb_lgrp_dtbl_getsid(db, dom_idx, &dom_sid);
2449 	if (rc != SMB_LGRP_SUCCESS) {
2450 		syslog(LOG_ERR, "smb_lgrp_getsid: %s", smb_lgrp_strerror(rc));
2451 		return (SMB_LGRP_DB_ERROR);
2452 	}
2453 
2454 	res_sid = smb_sid_splice(dom_sid, *rid);
2455 	smb_sid_free(dom_sid);
2456 	if (res_sid == NULL) {
2457 		syslog(LOG_ERR, "smb_lgrp_getsid: %s", smb_lgrp_strerror(rc));
2458 		return (SMB_LGRP_NO_MEMORY);
2459 	}
2460 
2461 	*sid = res_sid;
2462 	return (SMB_LGRP_SUCCESS);
2463 }
2464 
2465 /*
2466  * smb_lgrp_getgid
2467  *
2468  * Converts given local RID to a local gid since for user
2469  * defined local groups, gid is stored in the table.
2470  */
2471 static int
2472 smb_lgrp_getgid(uint32_t rid, gid_t *gid)
2473 {
2474 	smb_sid_t *sid;
2475 	int idtype;
2476 	int rc;
2477 
2478 	if ((sid = smb_sid_splice(smb_localgrp.lg_machine_sid, rid)) == NULL)
2479 		return (SMB_LGRP_NO_MEMORY);
2480 
2481 	idtype = SMB_IDMAP_GROUP;
2482 	rc = smb_idmap_getid(sid, gid, &idtype);
2483 	smb_sid_free(sid);
2484 
2485 	return ((rc == IDMAP_SUCCESS) ? SMB_LGRP_SUCCESS : SMB_LGRP_NOT_FOUND);
2486 }
2487 
2488 /*
2489  * smb_lgrp_exists
2490  *
2491  * Returns B_TRUE if the local group with the given name exists.
2492  * Otherwise, returns B_FALSE.
2493  */
2494 static boolean_t
2495 smb_lgrp_exists(char *gname)
2496 {
2497 	sqlite *db;
2498 	boolean_t rc;
2499 
2500 	if (!smb_lgrp_normalize_name(gname))
2501 		return (B_FALSE);
2502 
2503 	db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
2504 	if (db == NULL)
2505 		return (B_FALSE);
2506 
2507 	rc = smb_lgrp_gtbl_exists(db, gname);
2508 	smb_lgrp_db_close(db);
2509 
2510 	return (rc);
2511 }
2512 
2513 /*
2514  * smb_lgrp_pgrp_valid_gname
2515  *
2516  * Validate posix group name string.
2517  */
2518 static int
2519 smb_lgrp_pgrp_valid_gname(char *group)
2520 {
2521 	char *ptr = group;
2522 	char c;
2523 	int len = 0;
2524 	int badchar = 0;
2525 
2526 	if (!group || !*group)
2527 		return (SMB_LGRP_PGRP_INVALID);
2528 
2529 	for (c = *ptr; c != NULL; ptr++, c = *ptr) {
2530 		len++;
2531 		if (!isprint(c) || (c == ':') || (c == '\n'))
2532 			return (SMB_LGRP_PGRP_INVALID);
2533 
2534 		if (!(islower(c) || isdigit(c)))
2535 			badchar++;
2536 	}
2537 
2538 	if ((len > SMB_LGRP_PGRP_MAXGLEN - 1) || (badchar != 0))
2539 		return (SMB_LGRP_PGRP_INVALID);
2540 
2541 	if (getgrnam(group) != NULL)
2542 		return (SMB_LGRP_PGRP_NOTUNIQUE);
2543 
2544 	return (SMB_LGRP_PGRP_UNIQUE);
2545 }
2546 
2547 /*
2548  * smb_lgrp_pgrp_valid_gid
2549  *
2550  * Check to see that the gid is not a reserved gid
2551  * -- nobody (60001), noaccess (60002) or nogroup (65534)
2552  */
2553 static int
2554 smb_lgrp_pgrp_valid_gid(gid_t gid)
2555 {
2556 	return (gid != 60001 && gid != 60002 && gid != 65534);
2557 }
2558 
2559 /*
2560  * smb_lgrp_pgrp_findnextgid(void)
2561  *
2562  * This method finds the next valid GID.
2563  * It sorts the used GIDs in decreasing order to return MAXUSED + 1.
2564  * It then adds one to obtain the next valid GID.
2565  * On failure, -1 is returned. On success, a valid GID is returned.
2566  */
2567 static int
2568 smb_lgrp_pgrp_findnextgid(void)
2569 {
2570 	FILE *fptr;
2571 	gid_t last, next;
2572 	int gid;
2573 
2574 	if ((fptr = popen("exec sh -c "
2575 	    "\"getent group|cut -f3 -d:|sort -nr|uniq \" 2>/dev/null",
2576 	    "r")) == NULL)
2577 		return (-1);
2578 
2579 	if (fscanf(fptr, "%u\n", &next) == EOF) {
2580 		(void) pclose(fptr);
2581 		return (SMB_LGRP_PGRP_DEFRID + 1);
2582 	}
2583 
2584 	last = MAXUID;
2585 	gid = -1;
2586 	do {
2587 		if (!smb_lgrp_pgrp_valid_gid(next))
2588 			continue;
2589 
2590 		if (next <= SMB_LGRP_PGRP_DEFRID) {
2591 			if (last != SMB_LGRP_PGRP_DEFRID + 1)
2592 				gid = SMB_LGRP_PGRP_DEFRID + 1;
2593 			break;
2594 		}
2595 
2596 		if ((gid = next + 1) != last) {
2597 			while (!smb_lgrp_pgrp_valid_gid((gid_t)gid))
2598 				gid++;
2599 			if (gid > 0 && gid < last)
2600 				break;
2601 		}
2602 
2603 		gid = -1;
2604 		last = next;
2605 	} while (fscanf(fptr, "%u\n", &next) != EOF);
2606 
2607 	(void) pclose(fptr);
2608 	return (gid);
2609 }
2610 
2611 /*
2612  * smb_lgrp_pgrp_add
2613  *
2614  * Create a posix group with the given name.
2615  * This group will be added to the /etc/group file.
2616  */
2617 static int
2618 smb_lgrp_pgrp_add(char *group)
2619 {
2620 	FILE *etcgrp;
2621 	FILE *etctmp;
2622 	int o_mask, gret;
2623 	int newdone = 0;
2624 	struct stat sb;
2625 	char buf[SMB_LGRP_PGRP_GRPBUFSIZ];
2626 	gid_t gid;
2627 	int rc = 0;
2628 
2629 	rc = smb_lgrp_pgrp_valid_gname(group);
2630 	if ((rc == SMB_LGRP_PGRP_INVALID) || (rc == SMB_LGRP_PGRP_NOTUNIQUE))
2631 		return (-1);
2632 
2633 	if ((gret = smb_lgrp_pgrp_findnextgid()) < 0)
2634 		return (-1);
2635 	gid = gret;
2636 
2637 	if ((etcgrp = fopen(SMB_LGRP_PGRP_GROUP, "r")) == NULL)
2638 		return (-1);
2639 
2640 	if (fstat(fileno(etcgrp), &sb) < 0)
2641 		sb.st_mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH;
2642 
2643 	o_mask = umask(077);
2644 	etctmp = fopen(SMB_LGRP_PGRP_GRPTMP, "w+");
2645 	(void) umask(o_mask);
2646 
2647 	if (etctmp == NULL) {
2648 		(void) fclose(etcgrp);
2649 		return (-1);
2650 	}
2651 
2652 	if (lockf(fileno(etctmp), F_LOCK, 0) != 0) {
2653 		(void) fclose(etcgrp);
2654 		(void) fclose(etctmp);
2655 		(void) unlink(SMB_LGRP_PGRP_GRPTMP);
2656 		return (-1);
2657 	}
2658 
2659 	if (fchmod(fileno(etctmp), sb.st_mode) != 0 ||
2660 	    fchown(fileno(etctmp), sb.st_uid, sb.st_gid) != 0) {
2661 		(void) lockf(fileno(etctmp), F_ULOCK, 0);
2662 		(void) fclose(etcgrp);
2663 		(void) fclose(etctmp);
2664 		(void) unlink(SMB_LGRP_PGRP_GRPTMP);
2665 		return (-1);
2666 	}
2667 
2668 	while (fgets(buf, SMB_LGRP_PGRP_GRPBUFSIZ, etcgrp) != NULL) {
2669 		/* Check for NameService reference */
2670 		if (!newdone && (buf[0] == '+' || buf[0] == '-')) {
2671 			(void) fprintf(etctmp, "%s::%u:\n", group, gid);
2672 			newdone = 1;
2673 		}
2674 
2675 		(void) fputs(buf, etctmp);
2676 	}
2677 	(void) fclose(etcgrp);
2678 
2679 	if (!newdone)
2680 		(void) fprintf(etctmp, "%s::%u:\n", group, gid);
2681 
2682 	if (rename(SMB_LGRP_PGRP_GRPTMP, SMB_LGRP_PGRP_GROUP) < 0) {
2683 		(void) lockf(fileno(etctmp), F_ULOCK, 0);
2684 		(void) fclose(etctmp);
2685 		(void) unlink(SMB_LGRP_PGRP_GRPTMP);
2686 		return (-1);
2687 	}
2688 
2689 	(void) lockf(fileno(etctmp), F_ULOCK, 0);
2690 	(void) fclose(etctmp);
2691 	return (0);
2692 }
2693