2 Unix SMB/CIFS implementation.
4 Async helpers for blocking functions
6 Copyright (C) Volker Lendecke 2005
7 Copyright (C) Gerald Carter 2006
9 The helpers always consist of three functions:
11 * A request setup function that takes the necessary parameters together
12 with a continuation function that is to be called upon completion
14 * A private continuation function that is internal only. This is to be
15 called by the lower-level functions in do_async(). Its only task is to
16 properly call the continuation function named above.
18 * A worker function that is called inside the appropriate child process.
20 This program is free software; you can redistribute it and/or modify
21 it under the terms of the GNU General Public License as published by
22 the Free Software Foundation; either version 3 of the License, or
23 (at your option) any later version.
25 This program is distributed in the hope that it will be useful,
26 but WITHOUT ANY WARRANTY; without even the implied warranty of
27 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
28 GNU General Public License for more details.
30 You should have received a copy of the GNU General Public License
31 along with this program. If not, see <http://www.gnu.org/licenses/>.
38 #define DBGC_CLASS DBGC_WINBIND
40 static const struct winbindd_child_dispatch_table idmap_dispatch_table[];
42 static struct winbindd_child static_idmap_child;
44 void init_idmap_child(void)
46 setup_domain_child(NULL,
52 struct winbindd_child *idmap_child(void)
54 return &static_idmap_child;
57 static void winbindd_set_mapping_recv(TALLOC_CTX *mem_ctx, bool success,
58 struct winbindd_response *response,
59 void *c, void *private_data)
61 void (*cont)(void *priv, bool succ) = (void (*)(void *, bool))c;
64 DEBUG(5, ("Could not trigger idmap_set_mapping\n"));
65 cont(private_data, False);
69 if (response->result != WINBINDD_OK) {
70 DEBUG(5, ("idmap_set_mapping returned an error\n"));
71 cont(private_data, False);
75 cont(private_data, True);
78 void winbindd_set_mapping_async(TALLOC_CTX *mem_ctx, const struct id_map *map,
79 void (*cont)(void *private_data, bool success),
82 struct winbindd_request request;
84 request.cmd = WINBINDD_DUAL_SET_MAPPING;
85 request.data.dual_idmapset.id = map->xid.id;
86 request.data.dual_idmapset.type = map->xid.type;
87 sid_to_string(request.data.dual_idmapset.sid, map->sid);
89 do_async(mem_ctx, idmap_child(), &request, winbindd_set_mapping_recv,
90 (void *)cont, private_data);
93 enum winbindd_result winbindd_dual_set_mapping(struct winbindd_domain *domain,
94 struct winbindd_cli_state *state)
100 DEBUG(3, ("[%5lu]: dual_idmapset\n", (unsigned long)state->pid));
102 if (!string_to_sid(&sid, state->request.data.dual_idmapset.sid))
103 return WINBINDD_ERROR;
106 map.xid.id = state->request.data.dual_idmapset.id;
107 map.xid.type = state->request.data.dual_idmapset.type;
108 map.status = ID_MAPPED;
110 result = idmap_set_mapping(&map);
111 return NT_STATUS_IS_OK(result) ? WINBINDD_OK : WINBINDD_ERROR;
114 static void winbindd_set_hwm_recv(TALLOC_CTX *mem_ctx, bool success,
115 struct winbindd_response *response,
116 void *c, void *private_data)
118 void (*cont)(void *priv, bool succ) = (void (*)(void *, bool))c;
121 DEBUG(5, ("Could not trigger idmap_set_hwm\n"));
122 cont(private_data, False);
126 if (response->result != WINBINDD_OK) {
127 DEBUG(5, ("idmap_set_hwm returned an error\n"));
128 cont(private_data, False);
132 cont(private_data, True);
135 void winbindd_set_hwm_async(TALLOC_CTX *mem_ctx, const struct unixid *xid,
136 void (*cont)(void *private_data, bool success),
139 struct winbindd_request request;
140 ZERO_STRUCT(request);
141 request.cmd = WINBINDD_DUAL_SET_HWM;
142 request.data.dual_idmapset.id = xid->id;
143 request.data.dual_idmapset.type = xid->type;
145 do_async(mem_ctx, idmap_child(), &request, winbindd_set_hwm_recv,
146 (void *)cont, private_data);
149 enum winbindd_result winbindd_dual_set_hwm(struct winbindd_domain *domain,
150 struct winbindd_cli_state *state)
155 DEBUG(3, ("[%5lu]: dual_set_hwm\n", (unsigned long)state->pid));
157 xid.id = state->request.data.dual_idmapset.id;
158 xid.type = state->request.data.dual_idmapset.type;
162 result = idmap_set_uid_hwm(&xid);
165 result = idmap_set_gid_hwm(&xid);
168 return WINBINDD_ERROR;
170 return NT_STATUS_IS_OK(result) ? WINBINDD_OK : WINBINDD_ERROR;
173 static void winbindd_sids2xids_recv(TALLOC_CTX *mem_ctx, bool success,
174 struct winbindd_response *response,
175 void *c, void *private_data)
177 void (*cont)(void *priv, bool succ, void *, int) =
178 (void (*)(void *, bool, void *, int))c;
181 DEBUG(5, ("Could not trigger sids2xids\n"));
182 cont(private_data, False, NULL, 0);
186 if (response->result != WINBINDD_OK) {
187 DEBUG(5, ("sids2xids returned an error\n"));
188 cont(private_data, False, NULL, 0);
192 cont(private_data, True, response->extra_data.data, response->length - sizeof(response));
195 void winbindd_sids2xids_async(TALLOC_CTX *mem_ctx, void *sids, int size,
196 void (*cont)(void *private_data, bool success, void *data, int len),
199 struct winbindd_request request;
200 ZERO_STRUCT(request);
201 request.cmd = WINBINDD_DUAL_SIDS2XIDS;
202 request.extra_data.data = (char *)sids;
203 request.extra_len = size;
204 do_async(mem_ctx, idmap_child(), &request, winbindd_sids2xids_recv,
205 (void *)cont, private_data);
208 enum winbindd_result winbindd_dual_sids2xids(struct winbindd_domain *domain,
209 struct winbindd_cli_state *state)
217 DEBUG(3, ("[%5lu]: sids to unix ids\n", (unsigned long)state->pid));
219 if (state->request.extra_len == 0) {
220 DEBUG(0, ("Invalid buffer size!\n"));
221 return WINBINDD_ERROR;
224 sids = (DOM_SID *)state->request.extra_data.data;
225 num = state->request.extra_len / sizeof(DOM_SID);
227 ids = TALLOC_ZERO_ARRAY(state->mem_ctx, struct id_map *, num + 1);
229 DEBUG(0, ("Out of memory!\n"));
230 return WINBINDD_ERROR;
232 for (i = 0; i < num; i++) {
233 ids[i] = TALLOC_P(ids, struct id_map);
235 DEBUG(0, ("Out of memory!\n"));
237 return WINBINDD_ERROR;
239 ids[i]->sid = &sids[i];
242 result = idmap_sids_to_unixids(ids);
244 if (NT_STATUS_IS_OK(result)) {
246 xids = SMB_MALLOC_ARRAY(struct unixid, num);
248 DEBUG(0, ("Out of memory!\n"));
250 return WINBINDD_ERROR;
253 for (i = 0; i < num; i++) {
254 if (ids[i]->status == ID_MAPPED) {
255 xids[i].type = ids[i]->xid.type;
256 xids[i].id = ids[i]->xid.id;
262 state->response.length = sizeof(state->response) + (sizeof(struct unixid) * num);
263 state->response.extra_data.data = xids;
266 DEBUG (2, ("idmap_sids_to_unixids returned an error: 0x%08x\n", NT_STATUS_V(result)));
268 return WINBINDD_ERROR;
275 static void winbindd_sid2uid_recv(TALLOC_CTX *mem_ctx, bool success,
276 struct winbindd_response *response,
277 void *c, void *private_data)
279 void (*cont)(void *priv, bool succ, uid_t uid) =
280 (void (*)(void *, bool, uid_t))c;
283 DEBUG(5, ("Could not trigger sid2uid\n"));
284 cont(private_data, False, 0);
288 if (response->result != WINBINDD_OK) {
289 DEBUG(5, ("sid2uid returned an error\n"));
290 cont(private_data, False, 0);
294 cont(private_data, True, response->data.uid);
297 void winbindd_sid2uid_async(TALLOC_CTX *mem_ctx, const DOM_SID *sid,
298 void (*cont)(void *private_data, bool success, uid_t uid),
301 struct winbindd_request request;
302 ZERO_STRUCT(request);
303 request.cmd = WINBINDD_DUAL_SID2UID;
304 sid_to_string(request.data.dual_sid2id.sid, sid);
305 do_async(mem_ctx, idmap_child(), &request, winbindd_sid2uid_recv,
306 (void *)cont, private_data);
309 enum winbindd_result winbindd_dual_sid2uid(struct winbindd_domain *domain,
310 struct winbindd_cli_state *state)
315 DEBUG(3, ("[%5lu]: sid to uid %s\n", (unsigned long)state->pid,
316 state->request.data.dual_sid2id.sid));
318 if (!string_to_sid(&sid, state->request.data.dual_sid2id.sid)) {
319 DEBUG(1, ("Could not get convert sid %s from string\n",
320 state->request.data.dual_sid2id.sid));
321 return WINBINDD_ERROR;
324 /* Find uid for this sid and return it, possibly ask the slow remote idmap */
326 result = idmap_sid_to_uid(&sid, &(state->response.data.uid));
328 return NT_STATUS_IS_OK(result) ? WINBINDD_OK : WINBINDD_ERROR;
332 static void uid2name_recv(TALLOC_CTX *mem_ctx, bool success,
333 struct winbindd_response *response,
334 void *c, void *private_data);
336 void winbindd_uid2name_async(TALLOC_CTX *mem_ctx, uid_t uid,
337 void (*cont)(void *private_data, bool success,
341 struct winbindd_request request;
342 ZERO_STRUCT(request);
343 request.cmd = WINBINDD_DUAL_UID2NAME;
344 request.data.uid = uid;
345 do_async(mem_ctx, idmap_child(), &request, uid2name_recv,
346 (void *)cont, private_data);
348 #endif /* not used */
350 enum winbindd_result winbindd_dual_uid2name(struct winbindd_domain *domain,
351 struct winbindd_cli_state *state)
355 DEBUG(3, ("[%5lu]: uid2name %lu\n", (unsigned long)state->pid,
356 (unsigned long)state->request.data.uid));
358 pw = getpwuid(state->request.data.uid);
360 DEBUG(5, ("User %lu not found\n",
361 (unsigned long)state->request.data.uid));
362 return WINBINDD_ERROR;
365 fstrcpy(state->response.data.name.name, pw->pw_name);
370 static void uid2name_recv(TALLOC_CTX *mem_ctx, bool success,
371 struct winbindd_response *response,
372 void *c, void *private_data)
374 void (*cont)(void *priv, bool succ, const char *name) =
375 (void (*)(void *, bool, const char *))c;
378 DEBUG(5, ("Could not trigger uid2name\n"));
379 cont(private_data, False, NULL);
383 if (response->result != WINBINDD_OK) {
384 DEBUG(5, ("uid2name returned an error\n"));
385 cont(private_data, False, NULL);
389 cont(private_data, True, response->data.name.name);
392 static void name2uid_recv(TALLOC_CTX *mem_ctx, bool success,
393 struct winbindd_response *response,
394 void *c, void *private_data);
396 static void winbindd_name2uid_async(TALLOC_CTX *mem_ctx, const char *name,
397 void (*cont)(void *private_data, bool success,
401 struct winbindd_request request;
402 ZERO_STRUCT(request);
403 request.cmd = WINBINDD_DUAL_NAME2UID;
404 fstrcpy(request.data.username, name);
405 do_async(mem_ctx, idmap_child(), &request, name2uid_recv,
406 (void *)cont, private_data);
408 #endif /* not used */
410 enum winbindd_result winbindd_dual_name2uid(struct winbindd_domain *domain,
411 struct winbindd_cli_state *state)
415 /* Ensure null termination */
416 state->request.data.username
417 [sizeof(state->request.data.username)-1] = '\0';
419 DEBUG(3, ("[%5lu]: name2uid %s\n", (unsigned long)state->pid,
420 state->request.data.username));
422 pw = getpwnam(state->request.data.username);
424 return WINBINDD_ERROR;
427 state->response.data.uid = pw->pw_uid;
432 static void name2uid_recv(TALLOC_CTX *mem_ctx, bool success,
433 struct winbindd_response *response,
434 void *c, void *private_data)
436 void (*cont)(void *priv, bool succ, uid_t uid) =
437 (void (*)(void *, bool, uid_t))c;
440 DEBUG(5, ("Could not trigger name2uid\n"));
441 cont(private_data, False, 0);
445 if (response->result != WINBINDD_OK) {
446 DEBUG(5, ("name2uid returned an error\n"));
447 cont(private_data, False, 0);
451 cont(private_data, True, response->data.uid);
453 #endif /* not used */
455 static void winbindd_sid2gid_recv(TALLOC_CTX *mem_ctx, bool success,
456 struct winbindd_response *response,
457 void *c, void *private_data)
459 void (*cont)(void *priv, bool succ, gid_t gid) =
460 (void (*)(void *, bool, gid_t))c;
463 DEBUG(5, ("Could not trigger sid2gid\n"));
464 cont(private_data, False, 0);
468 if (response->result != WINBINDD_OK) {
469 DEBUG(5, ("sid2gid returned an error\n"));
470 cont(private_data, False, 0);
474 cont(private_data, True, response->data.gid);
477 void winbindd_sid2gid_async(TALLOC_CTX *mem_ctx, const DOM_SID *sid,
478 void (*cont)(void *private_data, bool success, gid_t gid),
481 struct winbindd_request request;
482 ZERO_STRUCT(request);
483 request.cmd = WINBINDD_DUAL_SID2GID;
484 sid_to_string(request.data.dual_sid2id.sid, sid);
486 DEBUG(7,("winbindd_sid2gid_async: Resolving %s to a gid\n",
487 request.data.dual_sid2id.sid));
489 do_async(mem_ctx, idmap_child(), &request, winbindd_sid2gid_recv,
490 (void *)cont, private_data);
493 enum winbindd_result winbindd_dual_sid2gid(struct winbindd_domain *domain,
494 struct winbindd_cli_state *state)
499 DEBUG(3, ("[%5lu]: sid to gid %s\n", (unsigned long)state->pid,
500 state->request.data.dual_sid2id.sid));
502 if (!string_to_sid(&sid, state->request.data.dual_sid2id.sid)) {
503 DEBUG(1, ("Could not get convert sid %s from string\n",
504 state->request.data.dual_sid2id.sid));
505 return WINBINDD_ERROR;
508 /* Find gid for this sid and return it, possibly ask the slow remote idmap */
510 result = idmap_sid_to_gid(&sid, &state->response.data.gid);
512 DEBUG(10, ("winbindd_dual_sid2gid: 0x%08x - %s - %u\n", NT_STATUS_V(result), sid_string_static(&sid), state->response.data.gid));
514 return NT_STATUS_IS_OK(result) ? WINBINDD_OK : WINBINDD_ERROR;
517 static void gid2name_recv(TALLOC_CTX *mem_ctx, bool success,
518 struct winbindd_response *response,
519 void *c, void *private_data)
521 void (*cont)(void *priv, bool succ, const char *name) =
522 (void (*)(void *, bool, const char *))c;
525 DEBUG(5, ("Could not trigger gid2name\n"));
526 cont(private_data, False, NULL);
530 if (response->result != WINBINDD_OK) {
531 DEBUG(5, ("gid2name returned an error\n"));
532 cont(private_data, False, NULL);
536 cont(private_data, True, response->data.name.name);
539 void winbindd_gid2name_async(TALLOC_CTX *mem_ctx, gid_t gid,
540 void (*cont)(void *private_data, bool success,
544 struct winbindd_request request;
545 ZERO_STRUCT(request);
546 request.cmd = WINBINDD_DUAL_GID2NAME;
547 request.data.gid = gid;
548 do_async(mem_ctx, idmap_child(), &request, gid2name_recv,
549 (void *)cont, private_data);
552 enum winbindd_result winbindd_dual_gid2name(struct winbindd_domain *domain,
553 struct winbindd_cli_state *state)
557 DEBUG(3, ("[%5lu]: gid2name %lu\n", (unsigned long)state->pid,
558 (unsigned long)state->request.data.gid));
560 gr = getgrgid(state->request.data.gid);
562 return WINBINDD_ERROR;
564 fstrcpy(state->response.data.name.name, gr->gr_name);
569 static void name2gid_recv(TALLOC_CTX *mem_ctx, bool success,
570 struct winbindd_response *response,
571 void *c, void *private_data);
573 static void winbindd_name2gid_async(TALLOC_CTX *mem_ctx, const char *name,
574 void (*cont)(void *private_data, bool success,
578 struct winbindd_request request;
579 ZERO_STRUCT(request);
580 request.cmd = WINBINDD_DUAL_NAME2GID;
581 fstrcpy(request.data.groupname, name);
582 do_async(mem_ctx, idmap_child(), &request, name2gid_recv,
583 (void *)cont, private_data);
585 #endif /* not used */
587 enum winbindd_result winbindd_dual_name2gid(struct winbindd_domain *domain,
588 struct winbindd_cli_state *state)
592 /* Ensure null termination */
593 state->request.data.groupname
594 [sizeof(state->request.data.groupname)-1] = '\0';
596 DEBUG(3, ("[%5lu]: name2gid %s\n", (unsigned long)state->pid,
597 state->request.data.groupname));
599 gr = getgrnam(state->request.data.groupname);
601 return WINBINDD_ERROR;
604 state->response.data.gid = gr->gr_gid;
609 static void name2gid_recv(TALLOC_CTX *mem_ctx, bool success,
610 struct winbindd_response *response,
611 void *c, void *private_data)
613 void (*cont)(void *priv, bool succ, gid_t gid) =
614 (void (*)(void *, bool, gid_t))c;
617 DEBUG(5, ("Could not trigger name2gid\n"));
618 cont(private_data, False, 0);
622 if (response->result != WINBINDD_OK) {
623 DEBUG(5, ("name2gid returned an error\n"));
624 cont(private_data, False, 0);
628 cont(private_data, True, response->data.gid);
630 #endif /* not used */
632 /* The following uid2sid/gid2sid functions has been contributed by
633 * Keith Reynolds <Keith.Reynolds@centrify.com> */
635 static void winbindd_uid2sid_recv(TALLOC_CTX *mem_ctx, bool success,
636 struct winbindd_response *response,
637 void *c, void *private_data)
639 void (*cont)(void *priv, bool succ, const char *sid) =
640 (void (*)(void *, bool, const char *))c;
643 DEBUG(5, ("Could not trigger uid2sid\n"));
644 cont(private_data, False, NULL);
648 if (response->result != WINBINDD_OK) {
649 DEBUG(5, ("uid2sid returned an error\n"));
650 cont(private_data, False, NULL);
654 cont(private_data, True, response->data.sid.sid);
657 void winbindd_uid2sid_async(TALLOC_CTX *mem_ctx, uid_t uid,
658 void (*cont)(void *private_data, bool success, const char *sid),
661 struct winbindd_request request;
663 ZERO_STRUCT(request);
664 request.cmd = WINBINDD_DUAL_UID2SID;
665 request.data.uid = uid;
666 do_async(mem_ctx, idmap_child(), &request, winbindd_uid2sid_recv,
667 (void *)cont, private_data);
670 enum winbindd_result winbindd_dual_uid2sid(struct winbindd_domain *domain,
671 struct winbindd_cli_state *state)
676 DEBUG(3,("[%5lu]: uid to sid %lu\n",
677 (unsigned long)state->pid,
678 (unsigned long) state->request.data.uid));
680 /* Find sid for this uid and return it, possibly ask the slow remote idmap */
681 result = idmap_uid_to_sid(&sid, state->request.data.uid);
683 if (NT_STATUS_IS_OK(result)) {
684 sid_to_string(state->response.data.sid.sid, &sid);
685 state->response.data.sid.type = SID_NAME_USER;
689 return WINBINDD_ERROR;
692 static void winbindd_gid2sid_recv(TALLOC_CTX *mem_ctx, bool success,
693 struct winbindd_response *response,
694 void *c, void *private_data)
696 void (*cont)(void *priv, bool succ, const char *sid) =
697 (void (*)(void *, bool, const char *))c;
700 DEBUG(5, ("Could not trigger gid2sid\n"));
701 cont(private_data, False, NULL);
705 if (response->result != WINBINDD_OK) {
706 DEBUG(5, ("gid2sid returned an error\n"));
707 cont(private_data, False, NULL);
711 cont(private_data, True, response->data.sid.sid);
714 void winbindd_gid2sid_async(TALLOC_CTX *mem_ctx, gid_t gid,
715 void (*cont)(void *private_data, bool success, const char *sid),
718 struct winbindd_request request;
720 ZERO_STRUCT(request);
721 request.cmd = WINBINDD_DUAL_GID2SID;
722 request.data.gid = gid;
723 do_async(mem_ctx, idmap_child(), &request, winbindd_gid2sid_recv,
724 (void *)cont, private_data);
727 enum winbindd_result winbindd_dual_gid2sid(struct winbindd_domain *domain,
728 struct winbindd_cli_state *state)
733 DEBUG(3,("[%5lu]: gid %lu to sid\n",
734 (unsigned long)state->pid,
735 (unsigned long) state->request.data.gid));
737 /* Find sid for this gid and return it, possibly ask the slow remote idmap */
738 result = idmap_gid_to_sid(&sid, state->request.data.gid);
740 if (NT_STATUS_IS_OK(result)) {
741 sid_to_string(state->response.data.sid.sid, &sid);
742 DEBUG(10, ("[%5lu]: retrieved sid: %s\n",
743 (unsigned long)state->pid,
744 state->response.data.sid.sid));
745 state->response.data.sid.type = SID_NAME_DOM_GRP;
749 return WINBINDD_ERROR;
752 static void winbindd_dump_id_maps_recv(TALLOC_CTX *mem_ctx, bool success,
753 struct winbindd_response *response,
754 void *c, void *private_data)
756 void (*cont)(void *priv, bool succ) =
757 (void (*)(void *, bool))c;
760 DEBUG(5, ("Could not trigger a map dump\n"));
761 cont(private_data, False);
765 if (response->result != WINBINDD_OK) {
766 DEBUG(5, ("idmap dump maps returned an error\n"));
767 cont(private_data, False);
771 cont(private_data, True);
774 void winbindd_dump_maps_async(TALLOC_CTX *mem_ctx, void *data, int size,
775 void (*cont)(void *private_data, bool success),
778 struct winbindd_request request;
779 ZERO_STRUCT(request);
780 request.cmd = WINBINDD_DUAL_DUMP_MAPS;
781 request.extra_data.data = (char *)data;
782 request.extra_len = size;
783 do_async(mem_ctx, idmap_child(), &request, winbindd_dump_id_maps_recv,
784 (void *)cont, private_data);
787 enum winbindd_result winbindd_dual_dump_maps(struct winbindd_domain *domain,
788 struct winbindd_cli_state *state)
790 DEBUG(3, ("[%5lu]: dual dump maps\n", (unsigned long)state->pid));
792 idmap_dump_maps((char *)state->request.extra_data.data);
797 static const struct winbindd_child_dispatch_table idmap_dispatch_table[] = {
799 { WINBINDD_DUAL_SID2UID, winbindd_dual_sid2uid, "DUAL_SID2UID" },
800 { WINBINDD_DUAL_SID2GID, winbindd_dual_sid2gid, "DUAL_SID2GID" },
801 #if 0 /* DISABLED until we fix the interface in Samba 3.0.26 --jerry */
802 { WINBINDD_DUAL_SIDS2XIDS, winbindd_dual_sids2xids, "DUAL_SIDS2XIDS" },
803 #endif /* end DISABLED */
804 { WINBINDD_DUAL_UID2SID, winbindd_dual_uid2sid, "DUAL_UID2SID" },
805 { WINBINDD_DUAL_GID2SID, winbindd_dual_gid2sid, "DUAL_GID2SID" },
806 { WINBINDD_DUAL_UID2NAME, winbindd_dual_uid2name, "DUAL_UID2NAME" },
807 { WINBINDD_DUAL_NAME2UID, winbindd_dual_name2uid, "DUAL_NAME2UID" },
808 { WINBINDD_DUAL_GID2NAME, winbindd_dual_gid2name, "DUAL_GID2NAME" },
809 { WINBINDD_DUAL_NAME2GID, winbindd_dual_name2gid, "DUAL_NAME2GID" },
810 { WINBINDD_DUAL_SET_MAPPING, winbindd_dual_set_mapping, "DUAL_SET_MAPPING" },
811 { WINBINDD_DUAL_SET_HWM, winbindd_dual_set_hwm, "DUAL_SET_HWMS" },
812 { WINBINDD_DUAL_DUMP_MAPS, winbindd_dual_dump_maps, "DUAL_DUMP_MAPS" },
813 { WINBINDD_ALLOCATE_UID, winbindd_dual_allocate_uid, "ALLOCATE_UID" },
814 { WINBINDD_ALLOCATE_GID, winbindd_dual_allocate_gid, "ALLOCATE_GID" },
817 { WINBINDD_NUM_CMDS, NULL, "NONE" }