2 Unix SMB/CIFS implementation.
4 Async helpers for blocking functions
6 Copyright (C) Volker Lendecke 2005
7 Copyright (C) Gerald Carter 2006
8 Copyright (C) Simo Sorce 2007
10 The helpers always consist of three functions:
12 * A request setup function that takes the necessary parameters together
13 with a continuation function that is to be called upon completion
15 * A private continuation function that is internal only. This is to be
16 called by the lower-level functions in do_async(). Its only task is to
17 properly call the continuation function named above.
19 * A worker function that is called inside the appropriate child process.
21 This program is free software; you can redistribute it and/or modify
22 it under the terms of the GNU General Public License as published by
23 the Free Software Foundation; either version 3 of the License, or
24 (at your option) any later version.
26 This program is distributed in the hope that it will be useful,
27 but WITHOUT ANY WARRANTY; without even the implied warranty of
28 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
29 GNU General Public License for more details.
31 You should have received a copy of the GNU General Public License
32 along with this program. If not, see <http://www.gnu.org/licenses/>.
39 #define DBGC_CLASS DBGC_WINBIND
41 static const struct winbindd_child_dispatch_table idmap_dispatch_table[];
43 static struct winbindd_child static_idmap_child;
45 void init_idmap_child(void)
47 setup_domain_child(NULL,
53 struct winbindd_child *idmap_child(void)
55 return &static_idmap_child;
58 static void winbindd_set_mapping_recv(TALLOC_CTX *mem_ctx, BOOL success,
59 struct winbindd_response *response,
60 void *c, void *private_data)
62 void (*cont)(void *priv, BOOL succ) = (void (*)(void *, BOOL))c;
65 DEBUG(5, ("Could not trigger idmap_set_mapping\n"));
66 cont(private_data, False);
70 if (response->result != WINBINDD_OK) {
71 DEBUG(5, ("idmap_set_mapping returned an error\n"));
72 cont(private_data, False);
76 cont(private_data, True);
79 void winbindd_set_mapping_async(TALLOC_CTX *mem_ctx, const struct id_map *map,
80 void (*cont)(void *private_data, BOOL success),
83 struct winbindd_request request;
85 request.cmd = WINBINDD_DUAL_SET_MAPPING;
86 request.data.dual_idmapset.id = map->xid.id;
87 request.data.dual_idmapset.type = map->xid.type;
88 sid_to_string(request.data.dual_idmapset.sid, map->sid);
90 do_async(mem_ctx, idmap_child(), &request, winbindd_set_mapping_recv,
91 (void *)cont, private_data);
94 enum winbindd_result winbindd_dual_set_mapping(struct winbindd_domain *domain,
95 struct winbindd_cli_state *state)
101 DEBUG(3, ("[%5lu]: dual_idmapset\n", (unsigned long)state->pid));
103 if (!string_to_sid(&sid, state->request.data.dual_idmapset.sid))
104 return WINBINDD_ERROR;
107 map.xid.id = state->request.data.dual_idmapset.id;
108 map.xid.type = state->request.data.dual_idmapset.type;
109 map.status = ID_MAPPED;
111 result = idmap_set_mapping(&map);
112 return NT_STATUS_IS_OK(result) ? WINBINDD_OK : WINBINDD_ERROR;
115 static void winbindd_set_hwm_recv(TALLOC_CTX *mem_ctx, BOOL success,
116 struct winbindd_response *response,
117 void *c, void *private_data)
119 void (*cont)(void *priv, BOOL succ) = (void (*)(void *, BOOL))c;
122 DEBUG(5, ("Could not trigger idmap_set_hwm\n"));
123 cont(private_data, False);
127 if (response->result != WINBINDD_OK) {
128 DEBUG(5, ("idmap_set_hwm returned an error\n"));
129 cont(private_data, False);
133 cont(private_data, True);
136 void winbindd_set_hwm_async(TALLOC_CTX *mem_ctx, const struct unixid *xid,
137 void (*cont)(void *private_data, BOOL success),
140 struct winbindd_request request;
141 ZERO_STRUCT(request);
142 request.cmd = WINBINDD_DUAL_SET_HWM;
143 request.data.dual_idmapset.id = xid->id;
144 request.data.dual_idmapset.type = xid->type;
146 do_async(mem_ctx, idmap_child(), &request, winbindd_set_hwm_recv,
147 (void *)cont, private_data);
150 enum winbindd_result winbindd_dual_set_hwm(struct winbindd_domain *domain,
151 struct winbindd_cli_state *state)
156 DEBUG(3, ("[%5lu]: dual_set_hwm\n", (unsigned long)state->pid));
158 xid.id = state->request.data.dual_idmapset.id;
159 xid.type = state->request.data.dual_idmapset.type;
163 result = idmap_set_uid_hwm(&xid);
166 result = idmap_set_gid_hwm(&xid);
169 return WINBINDD_ERROR;
171 return NT_STATUS_IS_OK(result) ? WINBINDD_OK : WINBINDD_ERROR;
174 static void winbindd_sids2xids_recv(TALLOC_CTX *mem_ctx, BOOL success,
175 struct winbindd_response *response,
176 void *c, void *private_data)
178 void (*cont)(void *priv, BOOL succ, void *, int) =
179 (void (*)(void *, BOOL, void *, int))c;
182 DEBUG(5, ("Could not trigger sids2xids\n"));
183 cont(private_data, False, NULL, 0);
187 if (response->result != WINBINDD_OK) {
188 DEBUG(5, ("sids2xids returned an error\n"));
189 cont(private_data, False, NULL, 0);
193 cont(private_data, True, response->extra_data.data, response->length - sizeof(response));
196 void winbindd_sids2xids_async(TALLOC_CTX *mem_ctx, void *sids, int size,
197 void (*cont)(void *private_data, BOOL success, void *data, int len),
200 struct winbindd_request request;
201 ZERO_STRUCT(request);
202 request.cmd = WINBINDD_DUAL_SIDS2XIDS;
203 request.extra_data.data = (char *)sids;
204 request.extra_len = size;
205 do_async(mem_ctx, idmap_child(), &request, winbindd_sids2xids_recv,
206 (void *)cont, private_data);
209 enum winbindd_result winbindd_dual_sids2xids(struct winbindd_domain *domain,
210 struct winbindd_cli_state *state)
218 DEBUG(3, ("[%5lu]: sids to unix ids\n", (unsigned long)state->pid));
220 if (state->request.extra_len == 0) {
221 DEBUG(0, ("Invalid buffer size!\n"));
222 return WINBINDD_ERROR;
225 sids = (DOM_SID *)state->request.extra_data.data;
226 num = state->request.extra_len / sizeof(DOM_SID);
228 ids = TALLOC_ZERO_ARRAY(state->mem_ctx, struct id_map *, num + 1);
230 DEBUG(0, ("Out of memory!\n"));
231 return WINBINDD_ERROR;
233 for (i = 0; i < num; i++) {
234 ids[i] = TALLOC_P(ids, struct id_map);
236 DEBUG(0, ("Out of memory!\n"));
238 return WINBINDD_ERROR;
240 ids[i]->sid = &sids[i];
243 result = idmap_sids_to_unixids(ids);
245 if (NT_STATUS_IS_OK(result)) {
247 xids = SMB_MALLOC_ARRAY(struct unixid, num);
249 DEBUG(0, ("Out of memory!\n"));
251 return WINBINDD_ERROR;
254 for (i = 0; i < num; i++) {
255 if (ids[i]->status == ID_MAPPED) {
256 xids[i].type = ids[i]->xid.type;
257 xids[i].id = ids[i]->xid.id;
263 state->response.length = sizeof(state->response) + (sizeof(struct unixid) * num);
264 state->response.extra_data.data = xids;
267 DEBUG (2, ("idmap_sids_to_unixids returned an error: 0x%08x\n", NT_STATUS_V(result)));
269 return WINBINDD_ERROR;
276 static void winbindd_sid2uid_recv(TALLOC_CTX *mem_ctx, BOOL success,
277 struct winbindd_response *response,
278 void *c, void *private_data)
280 void (*cont)(void *priv, BOOL succ, uid_t uid) =
281 (void (*)(void *, BOOL, uid_t))c;
284 DEBUG(5, ("Could not trigger sid2uid\n"));
285 cont(private_data, False, 0);
289 if (response->result != WINBINDD_OK) {
290 DEBUG(5, ("sid2uid returned an error\n"));
291 cont(private_data, False, 0);
295 cont(private_data, True, response->data.uid);
298 void winbindd_sid2uid_async(TALLOC_CTX *mem_ctx, const DOM_SID *sid,
299 void (*cont)(void *private_data, BOOL success, uid_t uid),
302 struct winbindd_request request;
303 ZERO_STRUCT(request);
304 request.cmd = WINBINDD_DUAL_SID2UID;
305 sid_to_string(request.data.dual_sid2id.sid, sid);
306 do_async(mem_ctx, idmap_child(), &request, winbindd_sid2uid_recv,
307 (void *)cont, private_data);
310 enum winbindd_result winbindd_dual_sid2uid(struct winbindd_domain *domain,
311 struct winbindd_cli_state *state)
316 DEBUG(3, ("[%5lu]: sid to uid %s\n", (unsigned long)state->pid,
317 state->request.data.dual_sid2id.sid));
319 if (!string_to_sid(&sid, state->request.data.dual_sid2id.sid)) {
320 DEBUG(1, ("Could not get convert sid %s from string\n",
321 state->request.data.dual_sid2id.sid));
322 return WINBINDD_ERROR;
325 /* Find uid for this sid and return it, possibly ask the slow remote idmap */
327 result = idmap_sid_to_uid(&sid, &(state->response.data.uid));
329 return NT_STATUS_IS_OK(result) ? WINBINDD_OK : WINBINDD_ERROR;
333 static void uid2name_recv(TALLOC_CTX *mem_ctx, BOOL success,
334 struct winbindd_response *response,
335 void *c, void *private_data);
337 void winbindd_uid2name_async(TALLOC_CTX *mem_ctx, uid_t uid,
338 void (*cont)(void *private_data, BOOL success,
342 struct winbindd_request request;
343 ZERO_STRUCT(request);
344 request.cmd = WINBINDD_DUAL_UID2NAME;
345 request.data.uid = uid;
346 do_async(mem_ctx, idmap_child(), &request, uid2name_recv,
347 (void *)cont, private_data);
349 #endif /* not used */
351 enum winbindd_result winbindd_dual_uid2name(struct winbindd_domain *domain,
352 struct winbindd_cli_state *state)
356 DEBUG(3, ("[%5lu]: uid2name %lu\n", (unsigned long)state->pid,
357 (unsigned long)state->request.data.uid));
359 pw = getpwuid(state->request.data.uid);
361 DEBUG(5, ("User %lu not found\n",
362 (unsigned long)state->request.data.uid));
363 return WINBINDD_ERROR;
366 fstrcpy(state->response.data.name.name, pw->pw_name);
371 static void uid2name_recv(TALLOC_CTX *mem_ctx, BOOL success,
372 struct winbindd_response *response,
373 void *c, void *private_data)
375 void (*cont)(void *priv, BOOL succ, const char *name) =
376 (void (*)(void *, BOOL, const char *))c;
379 DEBUG(5, ("Could not trigger uid2name\n"));
380 cont(private_data, False, NULL);
384 if (response->result != WINBINDD_OK) {
385 DEBUG(5, ("uid2name returned an error\n"));
386 cont(private_data, False, NULL);
390 cont(private_data, True, response->data.name.name);
393 static void name2uid_recv(TALLOC_CTX *mem_ctx, BOOL success,
394 struct winbindd_response *response,
395 void *c, void *private_data);
397 static void winbindd_name2uid_async(TALLOC_CTX *mem_ctx, const char *name,
398 void (*cont)(void *private_data, BOOL success,
402 struct winbindd_request request;
403 ZERO_STRUCT(request);
404 request.cmd = WINBINDD_DUAL_NAME2UID;
405 fstrcpy(request.data.username, name);
406 do_async(mem_ctx, idmap_child(), &request, name2uid_recv,
407 (void *)cont, private_data);
409 #endif /* not used */
411 enum winbindd_result winbindd_dual_name2uid(struct winbindd_domain *domain,
412 struct winbindd_cli_state *state)
416 /* Ensure null termination */
417 state->request.data.username
418 [sizeof(state->request.data.username)-1] = '\0';
420 DEBUG(3, ("[%5lu]: name2uid %s\n", (unsigned long)state->pid,
421 state->request.data.username));
423 pw = getpwnam(state->request.data.username);
425 return WINBINDD_ERROR;
428 state->response.data.uid = pw->pw_uid;
433 static void name2uid_recv(TALLOC_CTX *mem_ctx, BOOL success,
434 struct winbindd_response *response,
435 void *c, void *private_data)
437 void (*cont)(void *priv, BOOL succ, uid_t uid) =
438 (void (*)(void *, BOOL, uid_t))c;
441 DEBUG(5, ("Could not trigger name2uid\n"));
442 cont(private_data, False, 0);
446 if (response->result != WINBINDD_OK) {
447 DEBUG(5, ("name2uid returned an error\n"));
448 cont(private_data, False, 0);
452 cont(private_data, True, response->data.uid);
454 #endif /* not used */
456 static void winbindd_sid2gid_recv(TALLOC_CTX *mem_ctx, BOOL success,
457 struct winbindd_response *response,
458 void *c, void *private_data)
460 void (*cont)(void *priv, BOOL succ, gid_t gid) =
461 (void (*)(void *, BOOL, gid_t))c;
464 DEBUG(5, ("Could not trigger sid2gid\n"));
465 cont(private_data, False, 0);
469 if (response->result != WINBINDD_OK) {
470 DEBUG(5, ("sid2gid returned an error\n"));
471 cont(private_data, False, 0);
475 cont(private_data, True, response->data.gid);
478 void winbindd_sid2gid_async(TALLOC_CTX *mem_ctx, const DOM_SID *sid,
479 void (*cont)(void *private_data, BOOL success, gid_t gid),
482 struct winbindd_request request;
483 ZERO_STRUCT(request);
484 request.cmd = WINBINDD_DUAL_SID2GID;
485 sid_to_string(request.data.dual_sid2id.sid, sid);
487 DEBUG(7,("winbindd_sid2gid_async: Resolving %s to a gid\n",
488 request.data.dual_sid2id.sid));
490 do_async(mem_ctx, idmap_child(), &request, winbindd_sid2gid_recv,
491 (void *)cont, private_data);
494 enum winbindd_result winbindd_dual_sid2gid(struct winbindd_domain *domain,
495 struct winbindd_cli_state *state)
500 DEBUG(3, ("[%5lu]: sid to gid %s\n", (unsigned long)state->pid,
501 state->request.data.dual_sid2id.sid));
503 if (!string_to_sid(&sid, state->request.data.dual_sid2id.sid)) {
504 DEBUG(1, ("Could not get convert sid %s from string\n",
505 state->request.data.dual_sid2id.sid));
506 return WINBINDD_ERROR;
509 /* Find gid for this sid and return it, possibly ask the slow remote idmap */
511 result = idmap_sid_to_gid(&sid, &state->response.data.gid);
513 DEBUG(10, ("winbindd_dual_sid2gid: 0x%08x - %s - %u\n", NT_STATUS_V(result), sid_string_static(&sid), state->response.data.gid));
515 return NT_STATUS_IS_OK(result) ? WINBINDD_OK : WINBINDD_ERROR;
518 static void gid2name_recv(TALLOC_CTX *mem_ctx, BOOL success,
519 struct winbindd_response *response,
520 void *c, void *private_data)
522 void (*cont)(void *priv, BOOL succ, const char *name) =
523 (void (*)(void *, BOOL, const char *))c;
526 DEBUG(5, ("Could not trigger gid2name\n"));
527 cont(private_data, False, NULL);
531 if (response->result != WINBINDD_OK) {
532 DEBUG(5, ("gid2name returned an error\n"));
533 cont(private_data, False, NULL);
537 cont(private_data, True, response->data.name.name);
540 void winbindd_gid2name_async(TALLOC_CTX *mem_ctx, gid_t gid,
541 void (*cont)(void *private_data, BOOL success,
545 struct winbindd_request request;
546 ZERO_STRUCT(request);
547 request.cmd = WINBINDD_DUAL_GID2NAME;
548 request.data.gid = gid;
549 do_async(mem_ctx, idmap_child(), &request, gid2name_recv,
550 (void *)cont, private_data);
553 enum winbindd_result winbindd_dual_gid2name(struct winbindd_domain *domain,
554 struct winbindd_cli_state *state)
558 DEBUG(3, ("[%5lu]: gid2name %lu\n", (unsigned long)state->pid,
559 (unsigned long)state->request.data.gid));
561 gr = getgrgid(state->request.data.gid);
563 return WINBINDD_ERROR;
565 fstrcpy(state->response.data.name.name, gr->gr_name);
570 static void name2gid_recv(TALLOC_CTX *mem_ctx, BOOL success,
571 struct winbindd_response *response,
572 void *c, void *private_data);
574 static void winbindd_name2gid_async(TALLOC_CTX *mem_ctx, const char *name,
575 void (*cont)(void *private_data, BOOL success,
579 struct winbindd_request request;
580 ZERO_STRUCT(request);
581 request.cmd = WINBINDD_DUAL_NAME2GID;
582 fstrcpy(request.data.groupname, name);
583 do_async(mem_ctx, idmap_child(), &request, name2gid_recv,
584 (void *)cont, private_data);
586 #endif /* not used */
588 enum winbindd_result winbindd_dual_name2gid(struct winbindd_domain *domain,
589 struct winbindd_cli_state *state)
593 /* Ensure null termination */
594 state->request.data.groupname
595 [sizeof(state->request.data.groupname)-1] = '\0';
597 DEBUG(3, ("[%5lu]: name2gid %s\n", (unsigned long)state->pid,
598 state->request.data.groupname));
600 gr = getgrnam(state->request.data.groupname);
602 return WINBINDD_ERROR;
605 state->response.data.gid = gr->gr_gid;
610 static void name2gid_recv(TALLOC_CTX *mem_ctx, BOOL success,
611 struct winbindd_response *response,
612 void *c, void *private_data)
614 void (*cont)(void *priv, BOOL succ, gid_t gid) =
615 (void (*)(void *, BOOL, gid_t))c;
618 DEBUG(5, ("Could not trigger name2gid\n"));
619 cont(private_data, False, 0);
623 if (response->result != WINBINDD_OK) {
624 DEBUG(5, ("name2gid returned an error\n"));
625 cont(private_data, False, 0);
629 cont(private_data, True, response->data.gid);
631 #endif /* not used */
633 /* The following uid2sid/gid2sid functions has been contributed by
634 * Keith Reynolds <Keith.Reynolds@centrify.com> */
636 static void winbindd_uid2sid_recv(TALLOC_CTX *mem_ctx, BOOL success,
637 struct winbindd_response *response,
638 void *c, void *private_data)
640 void (*cont)(void *priv, BOOL succ, const char *sid) =
641 (void (*)(void *, BOOL, const char *))c;
644 DEBUG(5, ("Could not trigger uid2sid\n"));
645 cont(private_data, False, NULL);
649 if (response->result != WINBINDD_OK) {
650 DEBUG(5, ("uid2sid returned an error\n"));
651 cont(private_data, False, NULL);
655 cont(private_data, True, response->data.sid.sid);
658 void winbindd_uid2sid_async(TALLOC_CTX *mem_ctx, uid_t uid,
659 void (*cont)(void *private_data, BOOL success, const char *sid),
662 struct winbindd_request request;
664 ZERO_STRUCT(request);
665 request.cmd = WINBINDD_DUAL_UID2SID;
666 request.data.uid = uid;
667 do_async(mem_ctx, idmap_child(), &request, winbindd_uid2sid_recv,
668 (void *)cont, private_data);
671 enum winbindd_result winbindd_dual_uid2sid(struct winbindd_domain *domain,
672 struct winbindd_cli_state *state)
677 DEBUG(3,("[%5lu]: uid to sid %lu\n",
678 (unsigned long)state->pid,
679 (unsigned long) state->request.data.uid));
681 /* Find sid for this uid and return it, possibly ask the slow remote idmap */
682 result = idmap_uid_to_sid(&sid, state->request.data.uid);
684 if (NT_STATUS_IS_OK(result)) {
685 sid_to_string(state->response.data.sid.sid, &sid);
686 state->response.data.sid.type = SID_NAME_USER;
690 return WINBINDD_ERROR;
693 static void winbindd_gid2sid_recv(TALLOC_CTX *mem_ctx, BOOL success,
694 struct winbindd_response *response,
695 void *c, void *private_data)
697 void (*cont)(void *priv, BOOL succ, const char *sid) =
698 (void (*)(void *, BOOL, const char *))c;
701 DEBUG(5, ("Could not trigger gid2sid\n"));
702 cont(private_data, False, NULL);
706 if (response->result != WINBINDD_OK) {
707 DEBUG(5, ("gid2sid returned an error\n"));
708 cont(private_data, False, NULL);
712 cont(private_data, True, response->data.sid.sid);
715 void winbindd_gid2sid_async(TALLOC_CTX *mem_ctx, gid_t gid,
716 void (*cont)(void *private_data, BOOL success, const char *sid),
719 struct winbindd_request request;
721 ZERO_STRUCT(request);
722 request.cmd = WINBINDD_DUAL_GID2SID;
723 request.data.gid = gid;
724 do_async(mem_ctx, idmap_child(), &request, winbindd_gid2sid_recv,
725 (void *)cont, private_data);
728 enum winbindd_result winbindd_dual_gid2sid(struct winbindd_domain *domain,
729 struct winbindd_cli_state *state)
734 DEBUG(3,("[%5lu]: gid %lu to sid\n",
735 (unsigned long)state->pid,
736 (unsigned long) state->request.data.gid));
738 /* Find sid for this gid and return it, possibly ask the slow remote idmap */
739 result = idmap_gid_to_sid(&sid, state->request.data.gid);
741 if (NT_STATUS_IS_OK(result)) {
742 sid_to_string(state->response.data.sid.sid, &sid);
743 DEBUG(10, ("[%5lu]: retrieved sid: %s\n",
744 (unsigned long)state->pid,
745 state->response.data.sid.sid));
746 state->response.data.sid.type = SID_NAME_DOM_GRP;
750 return WINBINDD_ERROR;
753 static void winbindd_dump_id_maps_recv(TALLOC_CTX *mem_ctx, BOOL success,
754 struct winbindd_response *response,
755 void *c, void *private_data)
757 void (*cont)(void *priv, BOOL succ) =
758 (void (*)(void *, BOOL))c;
761 DEBUG(5, ("Could not trigger a map dump\n"));
762 cont(private_data, False);
766 if (response->result != WINBINDD_OK) {
767 DEBUG(5, ("idmap dump maps returned an error\n"));
768 cont(private_data, False);
772 cont(private_data, True);
775 void winbindd_dump_maps_async(TALLOC_CTX *mem_ctx, void *data, int size,
776 void (*cont)(void *private_data, BOOL success),
779 struct winbindd_request request;
780 ZERO_STRUCT(request);
781 request.cmd = WINBINDD_DUAL_DUMP_MAPS;
782 request.extra_data.data = (char *)data;
783 request.extra_len = size;
784 do_async(mem_ctx, idmap_child(), &request, winbindd_dump_id_maps_recv,
785 (void *)cont, private_data);
788 enum winbindd_result winbindd_dual_dump_maps(struct winbindd_domain *domain,
789 struct winbindd_cli_state *state)
791 DEBUG(3, ("[%5lu]: dual dump maps\n", (unsigned long)state->pid));
793 idmap_dump_maps((char *)state->request.extra_data.data);
798 static const struct winbindd_child_dispatch_table idmap_dispatch_table[] = {
800 { WINBINDD_DUAL_SID2UID, winbindd_dual_sid2uid, "DUAL_SID2UID" },
801 { WINBINDD_DUAL_SID2GID, winbindd_dual_sid2gid, "DUAL_SID2GID" },
802 #if 0 /* DISABLED until we fix the interface in Samba 3.0.26 --jerry */
803 { WINBINDD_DUAL_SIDS2XIDS, winbindd_dual_sids2xids, "DUAL_SIDS2XIDS" },
804 #endif /* end DISABLED */
805 { WINBINDD_DUAL_UID2SID, winbindd_dual_uid2sid, "DUAL_UID2SID" },
806 { WINBINDD_DUAL_GID2SID, winbindd_dual_gid2sid, "DUAL_GID2SID" },
807 { WINBINDD_DUAL_UID2NAME, winbindd_dual_uid2name, "DUAL_UID2NAME" },
808 { WINBINDD_DUAL_NAME2UID, winbindd_dual_name2uid, "DUAL_NAME2UID" },
809 { WINBINDD_DUAL_GID2NAME, winbindd_dual_gid2name, "DUAL_GID2NAME" },
810 { WINBINDD_DUAL_NAME2GID, winbindd_dual_name2gid, "DUAL_NAME2GID" },
811 { WINBINDD_DUAL_SET_MAPPING, winbindd_dual_set_mapping, "DUAL_SET_MAPPING" },
812 { WINBINDD_DUAL_SET_HWM, winbindd_dual_set_hwm, "DUAL_SET_HWMS" },
813 { WINBINDD_DUAL_DUMP_MAPS, winbindd_dual_dump_maps, "DUAL_DUMP_MAPS" },
814 { WINBINDD_ALLOCATE_UID, winbindd_dual_allocate_uid, "ALLOCATE_UID" },
815 { WINBINDD_ALLOCATE_GID, winbindd_dual_allocate_gid, "ALLOCATE_GID" },
818 { WINBINDD_NUM_CMDS, NULL, "NONE" }