xref: /freebsd/usr.sbin/rpc.lockd/kern.c (revision d32c3b7dcefa78525e7253f78c754f99bb06f411)
1603c8667SAlfred Perlstein /*-
2603c8667SAlfred Perlstein  * Copyright (c) 1997 Berkeley Software Design, Inc. All rights reserved.
3603c8667SAlfred Perlstein  *
4603c8667SAlfred Perlstein  * Redistribution and use in source and binary forms, with or without
5603c8667SAlfred Perlstein  * modification, are permitted provided that the following conditions
6603c8667SAlfred Perlstein  * are met:
7603c8667SAlfred Perlstein  * 1. Redistributions of source code must retain the above copyright
8603c8667SAlfred Perlstein  *    notice, this list of conditions and the following disclaimer.
9603c8667SAlfred Perlstein  * 2. Redistributions in binary form must reproduce the above copyright
10603c8667SAlfred Perlstein  *    notice, this list of conditions and the following disclaimer in the
11603c8667SAlfred Perlstein  *    documentation and/or other materials provided with the distribution.
12603c8667SAlfred Perlstein  * 3. Berkeley Software Design Inc's name may not be used to endorse or
13603c8667SAlfred Perlstein  *    promote products derived from this software without specific prior
14603c8667SAlfred Perlstein  *    written permission.
15603c8667SAlfred Perlstein  *
16603c8667SAlfred Perlstein  * THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN INC ``AS IS'' AND
17603c8667SAlfred Perlstein  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18603c8667SAlfred Perlstein  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19603c8667SAlfred Perlstein  * ARE DISCLAIMED.  IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN INC BE LIABLE
20603c8667SAlfred Perlstein  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21603c8667SAlfred Perlstein  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22603c8667SAlfred Perlstein  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23603c8667SAlfred Perlstein  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24603c8667SAlfred Perlstein  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25603c8667SAlfred Perlstein  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26603c8667SAlfred Perlstein  * SUCH DAMAGE.
27603c8667SAlfred Perlstein  *
28603c8667SAlfred Perlstein  *      from BSDI kern.c,v 1.2 1998/11/25 22:38:27 don Exp
29603c8667SAlfred Perlstein  * $FreeBSD$
30603c8667SAlfred Perlstein  */
31603c8667SAlfred Perlstein 
32603c8667SAlfred Perlstein #include <sys/param.h>
33603c8667SAlfred Perlstein #include <sys/mount.h>
34603c8667SAlfred Perlstein #include <sys/queue.h>
35603c8667SAlfred Perlstein #include <sys/socket.h>
36603c8667SAlfred Perlstein #include <sys/stat.h>
37603c8667SAlfred Perlstein 
38755f5b77SAlfred Perlstein #include <netinet/in.h>
39755f5b77SAlfred Perlstein #include <arpa/inet.h>
40755f5b77SAlfred Perlstein 
41603c8667SAlfred Perlstein #include <err.h>
42603c8667SAlfred Perlstein #include <errno.h>
43603c8667SAlfred Perlstein #include <fcntl.h>
440cbf6231SPoul-Henning Kamp #include <paths.h>
4532e9a249SAlfred Perlstein #include <pwd.h>
46603c8667SAlfred Perlstein #include <stdio.h>
47603c8667SAlfred Perlstein #include <stdlib.h>
48603c8667SAlfred Perlstein #include <string.h>
49603c8667SAlfred Perlstein #include <syslog.h>
50603c8667SAlfred Perlstein #include <unistd.h>
5109ce4f7aSAlfred Perlstein #include <netdb.h>
52603c8667SAlfred Perlstein 
53603c8667SAlfred Perlstein #include "nlm_prot.h"
5491196234SPeter Wemm #include <nfs/rpcv2.h>
5591196234SPeter Wemm #include <nfs/nfsproto.h>
5691196234SPeter Wemm #include <nfsclient/nfs_lock.h>
57603c8667SAlfred Perlstein 
58603c8667SAlfred Perlstein #include "lockd.h"
59603c8667SAlfred Perlstein #include "lockd_lock.h"
6091196234SPeter Wemm #include <nfsclient/nfs.h>
61603c8667SAlfred Perlstein 
6232e9a249SAlfred Perlstein #define DAEMON_USERNAME	"daemon"
6332e9a249SAlfred Perlstein 
64603c8667SAlfred Perlstein /* Lock request owner. */
65603c8667SAlfred Perlstein typedef struct __owner {
66603c8667SAlfred Perlstein 	pid_t	 pid;				/* Process ID. */
67603c8667SAlfred Perlstein 	time_t	 tod;				/* Time-of-day. */
68603c8667SAlfred Perlstein } OWNER;
69603c8667SAlfred Perlstein static OWNER owner;
70603c8667SAlfred Perlstein 
71603c8667SAlfred Perlstein static char hostname[MAXHOSTNAMELEN + 1];	/* Hostname. */
72603c8667SAlfred Perlstein 
73755f5b77SAlfred Perlstein static void	client_cleanup(void);
74f898f7c5SAlfred Perlstein static void	set_auth(CLIENT *cl, struct xucred *ucred);
75603c8667SAlfred Perlstein int	lock_request(LOCKD_MSG *);
76603c8667SAlfred Perlstein int	test_request(LOCKD_MSG *);
77603c8667SAlfred Perlstein void	show(LOCKD_MSG *);
78603c8667SAlfred Perlstein int	unlock_request(LOCKD_MSG *);
790cbf6231SPoul-Henning Kamp static	int	devfd;
800cbf6231SPoul-Henning Kamp 
810cbf6231SPoul-Henning Kamp static int
820cbf6231SPoul-Henning Kamp nfslockdans(int vers, struct lockd_ans *ansp)
830cbf6231SPoul-Henning Kamp {
840cbf6231SPoul-Henning Kamp 
850cbf6231SPoul-Henning Kamp 	ansp->la_vers = vers;
86d32c3b7dSOlivier Houchard 	return (write(devfd, ansp, sizeof *ansp) <= 0);
870cbf6231SPoul-Henning Kamp }
88603c8667SAlfred Perlstein 
89603c8667SAlfred Perlstein /*
90603c8667SAlfred Perlstein  * will break because fifo needs to be repopened when EOF'd
91603c8667SAlfred Perlstein  */
92603c8667SAlfred Perlstein #define lockd_seteuid(uid)	seteuid(uid)
93603c8667SAlfred Perlstein 
945f8568ecSAlfred Perlstein #define d_calls (debug_level > 1)
955f8568ecSAlfred Perlstein #define d_args (debug_level > 2)
965f8568ecSAlfred Perlstein 
9709ce4f7aSAlfred Perlstein static const char *
9809ce4f7aSAlfred Perlstein from_addr(saddr)
9909ce4f7aSAlfred Perlstein 	struct sockaddr *saddr;
10009ce4f7aSAlfred Perlstein {
10109ce4f7aSAlfred Perlstein 	static char inet_buf[INET6_ADDRSTRLEN];
10209ce4f7aSAlfred Perlstein 
10309ce4f7aSAlfred Perlstein 	if (getnameinfo(saddr, saddr->sa_len, inet_buf, sizeof(inet_buf),
10409ce4f7aSAlfred Perlstein 			NULL, 0, NI_NUMERICHOST) == 0)
10509ce4f7aSAlfred Perlstein 		return inet_buf;
10609ce4f7aSAlfred Perlstein 	return "???";
10709ce4f7aSAlfred Perlstein }
108603c8667SAlfred Perlstein 
109603c8667SAlfred Perlstein void
110755f5b77SAlfred Perlstein client_cleanup(void)
111603c8667SAlfred Perlstein {
112603c8667SAlfred Perlstein 	(void)lockd_seteuid(0);
113603c8667SAlfred Perlstein 	exit(-1);
114603c8667SAlfred Perlstein }
115603c8667SAlfred Perlstein 
116603c8667SAlfred Perlstein /*
117603c8667SAlfred Perlstein  * client_request --
118603c8667SAlfred Perlstein  *	Loop around messages from the kernel, forwarding them off to
119603c8667SAlfred Perlstein  *	NLM servers.
120603c8667SAlfred Perlstein  */
121603c8667SAlfred Perlstein pid_t
122603c8667SAlfred Perlstein client_request(void)
123603c8667SAlfred Perlstein {
124603c8667SAlfred Perlstein 	LOCKD_MSG msg;
125603c8667SAlfred Perlstein 	fd_set rdset;
1260cbf6231SPoul-Henning Kamp 	int nr, ret;
127603c8667SAlfred Perlstein 	pid_t child;
12832e9a249SAlfred Perlstein 	uid_t daemon_uid;
12932e9a249SAlfred Perlstein 	mode_t old_umask;
13032e9a249SAlfred Perlstein 	struct passwd *pw;
131603c8667SAlfred Perlstein 
1320cbf6231SPoul-Henning Kamp 	/* Open the dev . */
1330cbf6231SPoul-Henning Kamp 	devfd = open(_PATH_DEV _PATH_NFSLCKDEV, O_RDWR | O_NONBLOCK);
1340cbf6231SPoul-Henning Kamp 	if (devfd < 0) {
1350cbf6231SPoul-Henning Kamp 		syslog(LOG_ERR, "open: %s: %m", _PATH_NFSLCKDEV);
1360cbf6231SPoul-Henning Kamp 		goto err;
137603c8667SAlfred Perlstein 	}
138603c8667SAlfred Perlstein 	/*
139603c8667SAlfred Perlstein 	 * Create a separate process, the client code is really a separate
140603c8667SAlfred Perlstein 	 * daemon that shares a lot of code.
141603c8667SAlfred Perlstein 	 */
142603c8667SAlfred Perlstein 	switch (child = fork()) {
143603c8667SAlfred Perlstein 	case -1:
144603c8667SAlfred Perlstein 		err(1, "fork");
145603c8667SAlfred Perlstein 	case 0:
146603c8667SAlfred Perlstein 		break;
147603c8667SAlfred Perlstein 	default:
148603c8667SAlfred Perlstein 		return (child);
149603c8667SAlfred Perlstein 	}
150603c8667SAlfred Perlstein 
151755f5b77SAlfred Perlstein 	signal(SIGHUP, (sig_t)client_cleanup);
152755f5b77SAlfred Perlstein 	signal(SIGTERM, (sig_t)client_cleanup);
153603c8667SAlfred Perlstein 
154603c8667SAlfred Perlstein 	/* Setup. */
155603c8667SAlfred Perlstein 	(void)time(&owner.tod);
156603c8667SAlfred Perlstein 	owner.pid = getpid();
157603c8667SAlfred Perlstein 	(void)gethostname(hostname, sizeof(hostname) - 1);
158603c8667SAlfred Perlstein 
15932e9a249SAlfred Perlstein 	pw = getpwnam(DAEMON_USERNAME);
16032e9a249SAlfred Perlstein 	if (pw == NULL) {
16132e9a249SAlfred Perlstein 		syslog(LOG_ERR, "getpwnam: %s: %m", DAEMON_USERNAME);
16232e9a249SAlfred Perlstein 		goto err;
16332e9a249SAlfred Perlstein 	}
16432e9a249SAlfred Perlstein 	daemon_uid = pw->pw_uid;
165603c8667SAlfred Perlstein 	/* drop our root priviledges */
166603c8667SAlfred Perlstein 	(void)lockd_seteuid(daemon_uid);
167603c8667SAlfred Perlstein 
168603c8667SAlfred Perlstein 	for (;;) {
169603c8667SAlfred Perlstein 		/* Read the fixed length message. */
1700cbf6231SPoul-Henning Kamp 		if ((nr = read(devfd, &msg, sizeof(msg))) == sizeof(msg)) {
171603c8667SAlfred Perlstein 			if (d_args)
172603c8667SAlfred Perlstein 				show(&msg);
173603c8667SAlfred Perlstein 
174603c8667SAlfred Perlstein 			if (msg.lm_version != LOCKD_MSG_VERSION) {
175603c8667SAlfred Perlstein 				syslog(LOG_ERR,
176603c8667SAlfred Perlstein 				    "unknown msg type: %d", msg.lm_version);
177603c8667SAlfred Perlstein 			}
178603c8667SAlfred Perlstein 			/*
179603c8667SAlfred Perlstein 			 * Send it to the NLM server and don't grant the lock
180603c8667SAlfred Perlstein 			 * if we fail for any reason.
181603c8667SAlfred Perlstein 			 */
182603c8667SAlfred Perlstein 			switch (msg.lm_fl.l_type) {
183603c8667SAlfred Perlstein 			case F_RDLCK:
184603c8667SAlfred Perlstein 			case F_WRLCK:
185603c8667SAlfred Perlstein 				if (msg.lm_getlk)
186603c8667SAlfred Perlstein 					ret = test_request(&msg);
187603c8667SAlfred Perlstein 				else
188603c8667SAlfred Perlstein 					ret = lock_request(&msg);
189603c8667SAlfred Perlstein 				break;
190603c8667SAlfred Perlstein 			case F_UNLCK:
191603c8667SAlfred Perlstein 				ret = unlock_request(&msg);
192603c8667SAlfred Perlstein 				break;
193603c8667SAlfred Perlstein 			default:
194603c8667SAlfred Perlstein 				ret = 1;
195603c8667SAlfred Perlstein 				syslog(LOG_ERR,
196603c8667SAlfred Perlstein 				    "unknown lock type: %d", msg.lm_fl.l_type);
197603c8667SAlfred Perlstein 				break;
198603c8667SAlfred Perlstein 			}
199603c8667SAlfred Perlstein 			if (ret) {
200603c8667SAlfred Perlstein 				struct lockd_ans ans;
201603c8667SAlfred Perlstein 
202603c8667SAlfred Perlstein 				ans.la_msg_ident = msg.lm_msg_ident;
203603c8667SAlfred Perlstein 				ans.la_errno = EHOSTUNREACH;
204603c8667SAlfred Perlstein 
205603c8667SAlfred Perlstein 				if (nfslockdans(LOCKD_ANS_VERSION, &ans)) {
206603c8667SAlfred Perlstein 					syslog((errno == EPIPE ? LOG_INFO :
207603c8667SAlfred Perlstein 						LOG_ERR), "process %lu: %m",
208603c8667SAlfred Perlstein 						(u_long)msg.lm_msg_ident.pid);
209603c8667SAlfred Perlstein 				}
210603c8667SAlfred Perlstein 			}
211603c8667SAlfred Perlstein 		} else if (nr == -1) {
212603c8667SAlfred Perlstein 			if (errno != EAGAIN) {
2130cbf6231SPoul-Henning Kamp 				syslog(LOG_ERR, "read: %s: %m", _PATH_NFSLCKDEV);
214603c8667SAlfred Perlstein 				goto err;
215603c8667SAlfred Perlstein 			}
216603c8667SAlfred Perlstein 		} else if (nr != 0) {
217603c8667SAlfred Perlstein 			syslog(LOG_ERR,
2180cbf6231SPoul-Henning Kamp 			    "%s: discard %d bytes", _PATH_NFSLCKDEV, nr);
219603c8667SAlfred Perlstein 		}
220603c8667SAlfred Perlstein 	}
221603c8667SAlfred Perlstein 
222603c8667SAlfred Perlstein 	/* Reached only on error. */
223603c8667SAlfred Perlstein err:
224603c8667SAlfred Perlstein 	(void)lockd_seteuid(0);
225603c8667SAlfred Perlstein 	_exit (1);
226603c8667SAlfred Perlstein }
227603c8667SAlfred Perlstein 
228603c8667SAlfred Perlstein void
229f898f7c5SAlfred Perlstein set_auth(cl, xucred)
230955e1056SAlfred Perlstein 	CLIENT *cl;
231f898f7c5SAlfred Perlstein 	struct xucred *xucred;
232603c8667SAlfred Perlstein {
233603c8667SAlfred Perlstein         if (cl->cl_auth != NULL)
234603c8667SAlfred Perlstein                 cl->cl_auth->ah_ops->ah_destroy(cl->cl_auth);
235603c8667SAlfred Perlstein         cl->cl_auth = authunix_create(hostname,
236f898f7c5SAlfred Perlstein                         xucred->cr_uid,
237f898f7c5SAlfred Perlstein                         xucred->cr_groups[0],
238f898f7c5SAlfred Perlstein                         xucred->cr_ngroups - 1,
239f898f7c5SAlfred Perlstein                         &xucred->cr_groups[1]);
240603c8667SAlfred Perlstein }
241603c8667SAlfred Perlstein 
242603c8667SAlfred Perlstein 
243603c8667SAlfred Perlstein /*
244603c8667SAlfred Perlstein  * test_request --
245603c8667SAlfred Perlstein  *	Convert a lock LOCKD_MSG into an NLM request, and send it off.
246603c8667SAlfred Perlstein  */
247603c8667SAlfred Perlstein int
248603c8667SAlfred Perlstein test_request(LOCKD_MSG *msg)
249603c8667SAlfred Perlstein {
250603c8667SAlfred Perlstein 	CLIENT *cli;
251603c8667SAlfred Perlstein 	struct timeval timeout = {0, 0};	/* No timeout, no response. */
252603c8667SAlfred Perlstein 	char dummy;
253603c8667SAlfred Perlstein 
254603c8667SAlfred Perlstein 	if (d_calls)
255603c8667SAlfred Perlstein 		syslog(LOG_DEBUG, "test request: %s: %s to %s",
256603c8667SAlfred Perlstein 		    msg->lm_nfsv3 ? "V4" : "V1/3",
257603c8667SAlfred Perlstein 		    msg->lm_fl.l_type == F_WRLCK ? "write" : "read",
25809ce4f7aSAlfred Perlstein 		    from_addr((struct sockaddr *)&msg->lm_addr));
259603c8667SAlfred Perlstein 
260603c8667SAlfred Perlstein 	if (msg->lm_nfsv3) {
261603c8667SAlfred Perlstein 		struct nlm4_testargs arg4;
262603c8667SAlfred Perlstein 
263603c8667SAlfred Perlstein 		arg4.cookie.n_bytes = (char *)&msg->lm_msg_ident;
264603c8667SAlfred Perlstein 		arg4.cookie.n_len = sizeof(msg->lm_msg_ident);
265603c8667SAlfred Perlstein 		arg4.exclusive = msg->lm_fl.l_type == F_WRLCK ? 1 : 0;
266603c8667SAlfred Perlstein 		arg4.alock.caller_name = hostname;
267603c8667SAlfred Perlstein 		arg4.alock.fh.n_bytes = (char *)&msg->lm_fh;
268603c8667SAlfred Perlstein 		arg4.alock.fh.n_len = msg->lm_fh_len;
269603c8667SAlfred Perlstein 		arg4.alock.oh.n_bytes = (char *)&owner;
270603c8667SAlfred Perlstein 		arg4.alock.oh.n_len = sizeof(owner);
271603c8667SAlfred Perlstein 		arg4.alock.svid = msg->lm_msg_ident.pid;
272603c8667SAlfred Perlstein 		arg4.alock.l_offset = msg->lm_fl.l_start;
273603c8667SAlfred Perlstein 		arg4.alock.l_len = msg->lm_fl.l_len;
274603c8667SAlfred Perlstein 
275603c8667SAlfred Perlstein 		if ((cli = get_client(
276603c8667SAlfred Perlstein 		    (struct sockaddr *)&msg->lm_addr,
277603c8667SAlfred Perlstein 		    NLM_VERS4)) == NULL)
278603c8667SAlfred Perlstein 			return (1);
279603c8667SAlfred Perlstein 
280603c8667SAlfred Perlstein 		set_auth(cli, &msg->lm_cred);
281603c8667SAlfred Perlstein 		(void)clnt_call(cli, NLM_TEST_MSG,
28275e40e46SPeter Wemm 		    (xdrproc_t)xdr_nlm4_testargs, &arg4,
28375e40e46SPeter Wemm 		    (xdrproc_t)xdr_void, &dummy, timeout);
284603c8667SAlfred Perlstein 	} else {
285603c8667SAlfred Perlstein 		struct nlm_testargs arg;
286603c8667SAlfred Perlstein 
287603c8667SAlfred Perlstein 		arg.cookie.n_bytes = (char *)&msg->lm_msg_ident;
288603c8667SAlfred Perlstein 		arg.cookie.n_len = sizeof(msg->lm_msg_ident);
289603c8667SAlfred Perlstein 		arg.exclusive = msg->lm_fl.l_type == F_WRLCK ? 1 : 0;
290603c8667SAlfred Perlstein 		arg.alock.caller_name = hostname;
291603c8667SAlfred Perlstein 		arg.alock.fh.n_bytes = (char *)&msg->lm_fh;
292603c8667SAlfred Perlstein 		arg.alock.fh.n_len = msg->lm_fh_len;
293603c8667SAlfred Perlstein 		arg.alock.oh.n_bytes = (char *)&owner;
294603c8667SAlfred Perlstein 		arg.alock.oh.n_len = sizeof(owner);
295603c8667SAlfred Perlstein 		arg.alock.svid = msg->lm_msg_ident.pid;
296603c8667SAlfred Perlstein 		arg.alock.l_offset = msg->lm_fl.l_start;
297603c8667SAlfred Perlstein 		arg.alock.l_len = msg->lm_fl.l_len;
298603c8667SAlfred Perlstein 
299603c8667SAlfred Perlstein 		if ((cli = get_client(
300603c8667SAlfred Perlstein 		    (struct sockaddr *)&msg->lm_addr,
301603c8667SAlfred Perlstein 		    NLM_VERS)) == NULL)
302603c8667SAlfred Perlstein 			return (1);
303603c8667SAlfred Perlstein 
304603c8667SAlfred Perlstein 		set_auth(cli, &msg->lm_cred);
305603c8667SAlfred Perlstein 		(void)clnt_call(cli, NLM_TEST_MSG,
30675e40e46SPeter Wemm 		    (xdrproc_t)xdr_nlm_testargs, &arg,
30775e40e46SPeter Wemm 		    (xdrproc_t)xdr_void, &dummy, timeout);
308603c8667SAlfred Perlstein 	}
309603c8667SAlfred Perlstein 	return (0);
310603c8667SAlfred Perlstein }
311603c8667SAlfred Perlstein 
312603c8667SAlfred Perlstein /*
313603c8667SAlfred Perlstein  * lock_request --
314603c8667SAlfred Perlstein  *	Convert a lock LOCKD_MSG into an NLM request, and send it off.
315603c8667SAlfred Perlstein  */
316603c8667SAlfred Perlstein int
317603c8667SAlfred Perlstein lock_request(LOCKD_MSG *msg)
318603c8667SAlfred Perlstein {
319603c8667SAlfred Perlstein 	CLIENT *cli;
320603c8667SAlfred Perlstein 	struct nlm4_lockargs arg4;
321603c8667SAlfred Perlstein 	struct nlm_lockargs arg;
322603c8667SAlfred Perlstein 	struct timeval timeout = {0, 0};	/* No timeout, no response. */
323603c8667SAlfred Perlstein 	char dummy;
324603c8667SAlfred Perlstein 
325603c8667SAlfred Perlstein 	if (d_calls)
326603c8667SAlfred Perlstein 		syslog(LOG_DEBUG, "lock request: %s: %s to %s",
327603c8667SAlfred Perlstein 		    msg->lm_nfsv3 ? "V4" : "V1/3",
328603c8667SAlfred Perlstein 		    msg->lm_fl.l_type == F_WRLCK ? "write" : "read",
32909ce4f7aSAlfred Perlstein 		    from_addr((struct sockaddr *)&msg->lm_addr));
330603c8667SAlfred Perlstein 
331603c8667SAlfred Perlstein 	if (msg->lm_nfsv3) {
332603c8667SAlfred Perlstein 		arg4.cookie.n_bytes = (char *)&msg->lm_msg_ident;
333603c8667SAlfred Perlstein 		arg4.cookie.n_len = sizeof(msg->lm_msg_ident);
334603c8667SAlfred Perlstein 		arg4.block = msg->lm_wait ? 1 : 0;
335603c8667SAlfred Perlstein 		arg4.exclusive = msg->lm_fl.l_type == F_WRLCK ? 1 : 0;
336603c8667SAlfred Perlstein 		arg4.alock.caller_name = hostname;
337603c8667SAlfred Perlstein 		arg4.alock.fh.n_bytes = (char *)&msg->lm_fh;
338603c8667SAlfred Perlstein 		arg4.alock.fh.n_len = msg->lm_fh_len;
339603c8667SAlfred Perlstein 		arg4.alock.oh.n_bytes = (char *)&owner;
340603c8667SAlfred Perlstein 		arg4.alock.oh.n_len = sizeof(owner);
341603c8667SAlfred Perlstein 		arg4.alock.svid = msg->lm_msg_ident.pid;
342603c8667SAlfred Perlstein 		arg4.alock.l_offset = msg->lm_fl.l_start;
343603c8667SAlfred Perlstein 		arg4.alock.l_len = msg->lm_fl.l_len;
344603c8667SAlfred Perlstein 		arg4.reclaim = 0;
345603c8667SAlfred Perlstein 		arg4.state = nsm_state;
346603c8667SAlfred Perlstein 
347603c8667SAlfred Perlstein 		if ((cli = get_client(
348603c8667SAlfred Perlstein 		    (struct sockaddr *)&msg->lm_addr,
349603c8667SAlfred Perlstein 		    NLM_VERS4)) == NULL)
350603c8667SAlfred Perlstein 			return (1);
351603c8667SAlfred Perlstein 
352603c8667SAlfred Perlstein 		set_auth(cli, &msg->lm_cred);
353603c8667SAlfred Perlstein 		(void)clnt_call(cli, NLM_LOCK_MSG,
35475e40e46SPeter Wemm 		    (xdrproc_t)xdr_nlm4_lockargs, &arg4,
35575e40e46SPeter Wemm 		    (xdrproc_t)xdr_void, &dummy, timeout);
356603c8667SAlfred Perlstein 	} else {
357603c8667SAlfred Perlstein 		arg.cookie.n_bytes = (char *)&msg->lm_msg_ident;
358603c8667SAlfred Perlstein 		arg.cookie.n_len = sizeof(msg->lm_msg_ident);
359603c8667SAlfred Perlstein 		arg.block = msg->lm_wait ? 1 : 0;
360603c8667SAlfred Perlstein 		arg.exclusive = msg->lm_fl.l_type == F_WRLCK ? 1 : 0;
361603c8667SAlfred Perlstein 		arg.alock.caller_name = hostname;
362603c8667SAlfred Perlstein 		arg.alock.fh.n_bytes = (char *)&msg->lm_fh;
363603c8667SAlfred Perlstein 		arg.alock.fh.n_len = msg->lm_fh_len;
364603c8667SAlfred Perlstein 		arg.alock.oh.n_bytes = (char *)&owner;
365603c8667SAlfred Perlstein 		arg.alock.oh.n_len = sizeof(owner);
366603c8667SAlfred Perlstein 		arg.alock.svid = msg->lm_msg_ident.pid;
367603c8667SAlfred Perlstein 		arg.alock.l_offset = msg->lm_fl.l_start;
368603c8667SAlfred Perlstein 		arg.alock.l_len = msg->lm_fl.l_len;
369603c8667SAlfred Perlstein 		arg.reclaim = 0;
370603c8667SAlfred Perlstein 		arg.state = nsm_state;
371603c8667SAlfred Perlstein 
372603c8667SAlfred Perlstein 		if ((cli = get_client(
373603c8667SAlfred Perlstein 		    (struct sockaddr *)&msg->lm_addr,
374603c8667SAlfred Perlstein 		    NLM_VERS)) == NULL)
375603c8667SAlfred Perlstein 			return (1);
376603c8667SAlfred Perlstein 
377603c8667SAlfred Perlstein 		set_auth(cli, &msg->lm_cred);
378603c8667SAlfred Perlstein 		(void)clnt_call(cli, NLM_LOCK_MSG,
37975e40e46SPeter Wemm 		    (xdrproc_t)xdr_nlm_lockargs, &arg,
38075e40e46SPeter Wemm 		    (xdrproc_t)xdr_void, &dummy, timeout);
381603c8667SAlfred Perlstein 	}
382603c8667SAlfred Perlstein 	return (0);
383603c8667SAlfred Perlstein }
384603c8667SAlfred Perlstein 
385603c8667SAlfred Perlstein /*
386603c8667SAlfred Perlstein  * unlock_request --
387603c8667SAlfred Perlstein  *	Convert an unlock LOCKD_MSG into an NLM request, and send it off.
388603c8667SAlfred Perlstein  */
389603c8667SAlfred Perlstein int
390603c8667SAlfred Perlstein unlock_request(LOCKD_MSG *msg)
391603c8667SAlfred Perlstein {
392603c8667SAlfred Perlstein 	CLIENT *cli;
393603c8667SAlfred Perlstein 	struct nlm4_unlockargs arg4;
394603c8667SAlfred Perlstein 	struct nlm_unlockargs arg;
395603c8667SAlfred Perlstein 	struct timeval timeout = {0, 0};	/* No timeout, no response. */
396603c8667SAlfred Perlstein 	char dummy;
397603c8667SAlfred Perlstein 
398603c8667SAlfred Perlstein 	if (d_calls)
399603c8667SAlfred Perlstein 		syslog(LOG_DEBUG, "unlock request: %s: to %s",
400603c8667SAlfred Perlstein 		    msg->lm_nfsv3 ? "V4" : "V1/3",
40109ce4f7aSAlfred Perlstein 		    from_addr((struct sockaddr *)&msg->lm_addr));
402603c8667SAlfred Perlstein 
403603c8667SAlfred Perlstein 	if (msg->lm_nfsv3) {
404603c8667SAlfred Perlstein 		arg4.cookie.n_bytes = (char *)&msg->lm_msg_ident;
405603c8667SAlfred Perlstein 		arg4.cookie.n_len = sizeof(msg->lm_msg_ident);
406603c8667SAlfred Perlstein 		arg4.alock.caller_name = hostname;
407603c8667SAlfred Perlstein 		arg4.alock.fh.n_bytes = (char *)&msg->lm_fh;
408603c8667SAlfred Perlstein 		arg4.alock.fh.n_len = msg->lm_fh_len;
409603c8667SAlfred Perlstein 		arg4.alock.oh.n_bytes = (char *)&owner;
410603c8667SAlfred Perlstein 		arg4.alock.oh.n_len = sizeof(owner);
411603c8667SAlfred Perlstein 		arg4.alock.svid = msg->lm_msg_ident.pid;
412603c8667SAlfred Perlstein 		arg4.alock.l_offset = msg->lm_fl.l_start;
413603c8667SAlfred Perlstein 		arg4.alock.l_len = msg->lm_fl.l_len;
414603c8667SAlfred Perlstein 
415603c8667SAlfred Perlstein 		if ((cli = get_client(
416603c8667SAlfred Perlstein 		    (struct sockaddr *)&msg->lm_addr,
417603c8667SAlfred Perlstein 		    NLM_VERS4)) == NULL)
418603c8667SAlfred Perlstein 			return (1);
419603c8667SAlfred Perlstein 
420603c8667SAlfred Perlstein 		set_auth(cli, &msg->lm_cred);
421603c8667SAlfred Perlstein 		(void)clnt_call(cli, NLM_UNLOCK_MSG,
42275e40e46SPeter Wemm 		    (xdrproc_t)xdr_nlm4_unlockargs, &arg4,
42375e40e46SPeter Wemm 		    (xdrproc_t)xdr_void, &dummy, timeout);
424603c8667SAlfred Perlstein 	} else {
425603c8667SAlfred Perlstein 		arg.cookie.n_bytes = (char *)&msg->lm_msg_ident;
426603c8667SAlfred Perlstein 		arg.cookie.n_len = sizeof(msg->lm_msg_ident);
427603c8667SAlfred Perlstein 		arg.alock.caller_name = hostname;
428603c8667SAlfred Perlstein 		arg.alock.fh.n_bytes = (char *)&msg->lm_fh;
429603c8667SAlfred Perlstein 		arg.alock.fh.n_len = msg->lm_fh_len;
430603c8667SAlfred Perlstein 		arg.alock.oh.n_bytes = (char *)&owner;
431603c8667SAlfred Perlstein 		arg.alock.oh.n_len = sizeof(owner);
432603c8667SAlfred Perlstein 		arg.alock.svid = msg->lm_msg_ident.pid;
433603c8667SAlfred Perlstein 		arg.alock.l_offset = msg->lm_fl.l_start;
434603c8667SAlfred Perlstein 		arg.alock.l_len = msg->lm_fl.l_len;
435603c8667SAlfred Perlstein 
436603c8667SAlfred Perlstein 		if ((cli = get_client(
437603c8667SAlfred Perlstein 		    (struct sockaddr *)&msg->lm_addr,
438603c8667SAlfred Perlstein 		    NLM_VERS)) == NULL)
439603c8667SAlfred Perlstein 			return (1);
440603c8667SAlfred Perlstein 
441603c8667SAlfred Perlstein 		set_auth(cli, &msg->lm_cred);
442603c8667SAlfred Perlstein 		(void)clnt_call(cli, NLM_UNLOCK_MSG,
44375e40e46SPeter Wemm 		    (xdrproc_t)xdr_nlm_unlockargs, &arg,
44475e40e46SPeter Wemm 		    (xdrproc_t)xdr_void, &dummy, timeout);
445603c8667SAlfred Perlstein 	}
446603c8667SAlfred Perlstein 
447603c8667SAlfred Perlstein 	return (0);
448603c8667SAlfred Perlstein }
449603c8667SAlfred Perlstein 
450603c8667SAlfred Perlstein int
451603c8667SAlfred Perlstein lock_answer(int pid, netobj *netcookie, int result, int *pid_p, int version)
452603c8667SAlfred Perlstein {
453603c8667SAlfred Perlstein 	struct lockd_ans ans;
454603c8667SAlfred Perlstein 
455603c8667SAlfred Perlstein 	if (netcookie->n_len != sizeof(ans.la_msg_ident)) {
456603c8667SAlfred Perlstein 		if (pid == -1) {	/* we're screwed */
457603c8667SAlfred Perlstein 			syslog(LOG_ERR, "inedible nlm cookie");
458603c8667SAlfred Perlstein 			return -1;
459603c8667SAlfred Perlstein 		}
460603c8667SAlfred Perlstein 		ans.la_msg_ident.pid = pid;
461603c8667SAlfred Perlstein 		ans.la_msg_ident.msg_seq = -1;
462603c8667SAlfred Perlstein 	} else {
463603c8667SAlfred Perlstein 		memcpy(&ans.la_msg_ident, netcookie->n_bytes,
464603c8667SAlfred Perlstein 		    sizeof(ans.la_msg_ident));
465603c8667SAlfred Perlstein 	}
466603c8667SAlfred Perlstein 
467603c8667SAlfred Perlstein 	if (d_calls)
4685f8568ecSAlfred Perlstein 		syslog(LOG_DEBUG, "lock answer: pid %lu: %s %d",
469755f5b77SAlfred Perlstein 		    (unsigned long)ans.la_msg_ident.pid,
4705f8568ecSAlfred Perlstein 		    version == NLM_VERS4 ? "nlmv4" : "nlmv3",
4715f8568ecSAlfred Perlstein 		    result);
472603c8667SAlfred Perlstein 
473603c8667SAlfred Perlstein 	ans.la_set_getlk_pid = 0;
474603c8667SAlfred Perlstein 	if (version == NLM_VERS4)
475603c8667SAlfred Perlstein 		switch (result) {
476603c8667SAlfred Perlstein 		case nlm4_granted:
477603c8667SAlfred Perlstein 			ans.la_errno = 0;
478603c8667SAlfred Perlstein 			break;
479603c8667SAlfred Perlstein 		default:
480603c8667SAlfred Perlstein 			ans.la_errno = EACCES;
481603c8667SAlfred Perlstein 			break;
482603c8667SAlfred Perlstein 		case nlm4_denied:
483603c8667SAlfred Perlstein 			if (pid_p == NULL)
484eda8b282SRobert Watson 				ans.la_errno = EAGAIN;
485603c8667SAlfred Perlstein 			else {
486603c8667SAlfred Perlstein 				/* this is an answer to a nlm_test msg */
487603c8667SAlfred Perlstein 				ans.la_set_getlk_pid = 1;
488603c8667SAlfred Perlstein 				ans.la_getlk_pid = *pid_p;
489603c8667SAlfred Perlstein 				ans.la_errno = 0;
490603c8667SAlfred Perlstein 			}
491603c8667SAlfred Perlstein 			break;
492603c8667SAlfred Perlstein 		case nlm4_denied_nolocks:
493603c8667SAlfred Perlstein 			ans.la_errno = EAGAIN;
494603c8667SAlfred Perlstein 			break;
495603c8667SAlfred Perlstein 		case nlm4_blocked:
496603c8667SAlfred Perlstein 			return -1;
497603c8667SAlfred Perlstein 			/* NOTREACHED */
498603c8667SAlfred Perlstein 		case nlm4_denied_grace_period:
499603c8667SAlfred Perlstein 			ans.la_errno = EAGAIN;
500603c8667SAlfred Perlstein 			break;
501603c8667SAlfred Perlstein 		case nlm4_deadlck:
502603c8667SAlfred Perlstein 			ans.la_errno = EDEADLK;
503603c8667SAlfred Perlstein 			break;
504603c8667SAlfred Perlstein 		case nlm4_rofs:
505603c8667SAlfred Perlstein 			ans.la_errno = EROFS;
506603c8667SAlfred Perlstein 			break;
507603c8667SAlfred Perlstein 		case nlm4_stale_fh:
508603c8667SAlfred Perlstein 			ans.la_errno = ESTALE;
509603c8667SAlfred Perlstein 			break;
510603c8667SAlfred Perlstein 		case nlm4_fbig:
511603c8667SAlfred Perlstein 			ans.la_errno = EFBIG;
512603c8667SAlfred Perlstein 			break;
513603c8667SAlfred Perlstein 		case nlm4_failed:
514603c8667SAlfred Perlstein 			ans.la_errno = EACCES;
515603c8667SAlfred Perlstein 			break;
516603c8667SAlfred Perlstein 		}
517603c8667SAlfred Perlstein 	else
518603c8667SAlfred Perlstein 		switch (result) {
519603c8667SAlfred Perlstein 		case nlm_granted:
520603c8667SAlfred Perlstein 			ans.la_errno = 0;
521603c8667SAlfred Perlstein 			break;
522603c8667SAlfred Perlstein 		default:
523603c8667SAlfred Perlstein 			ans.la_errno = EACCES;
524603c8667SAlfred Perlstein 			break;
525603c8667SAlfred Perlstein 		case nlm_denied:
526603c8667SAlfred Perlstein 			if (pid_p == NULL)
527eda8b282SRobert Watson 				ans.la_errno = EAGAIN;
528603c8667SAlfred Perlstein 			else {
529603c8667SAlfred Perlstein 				/* this is an answer to a nlm_test msg */
530603c8667SAlfred Perlstein 				ans.la_set_getlk_pid = 1;
531603c8667SAlfred Perlstein 				ans.la_getlk_pid = *pid_p;
532603c8667SAlfred Perlstein 				ans.la_errno = 0;
533603c8667SAlfred Perlstein 			}
534603c8667SAlfred Perlstein 			break;
535603c8667SAlfred Perlstein 		case nlm_denied_nolocks:
536603c8667SAlfred Perlstein 			ans.la_errno = EAGAIN;
537603c8667SAlfred Perlstein 			break;
538603c8667SAlfred Perlstein 		case nlm_blocked:
539603c8667SAlfred Perlstein 			return -1;
540603c8667SAlfred Perlstein 			/* NOTREACHED */
541603c8667SAlfred Perlstein 		case nlm_denied_grace_period:
542603c8667SAlfred Perlstein 			ans.la_errno = EAGAIN;
543603c8667SAlfred Perlstein 			break;
544603c8667SAlfred Perlstein 		case nlm_deadlck:
545603c8667SAlfred Perlstein 			ans.la_errno = EDEADLK;
546603c8667SAlfred Perlstein 			break;
547603c8667SAlfred Perlstein 		}
548603c8667SAlfred Perlstein 
549603c8667SAlfred Perlstein 	if (nfslockdans(LOCKD_ANS_VERSION, &ans)) {
550603c8667SAlfred Perlstein 		syslog(((errno == EPIPE || errno == ESRCH) ?
551603c8667SAlfred Perlstein 			LOG_INFO : LOG_ERR),
552603c8667SAlfred Perlstein 			"process %lu: %m", (u_long)ans.la_msg_ident.pid);
553603c8667SAlfred Perlstein 		return -1;
554603c8667SAlfred Perlstein 	}
555603c8667SAlfred Perlstein 	return 0;
556603c8667SAlfred Perlstein }
557603c8667SAlfred Perlstein 
558603c8667SAlfred Perlstein /*
559603c8667SAlfred Perlstein  * show --
560603c8667SAlfred Perlstein  *	Display the contents of a kernel LOCKD_MSG structure.
561603c8667SAlfred Perlstein  */
562603c8667SAlfred Perlstein void
563603c8667SAlfred Perlstein show(LOCKD_MSG *mp)
564603c8667SAlfred Perlstein {
565603c8667SAlfred Perlstein 	static char hex[] = "0123456789abcdef";
566603c8667SAlfred Perlstein 	struct fid *fidp;
567603c8667SAlfred Perlstein 	fsid_t *fsidp;
568603c8667SAlfred Perlstein 	size_t len;
569603c8667SAlfred Perlstein 	u_int8_t *p, *t, buf[NFS_SMALLFH*3+1];
570603c8667SAlfred Perlstein 
5719529c2d9SAlfred Perlstein 	syslog(LOG_DEBUG, "process ID: %lu\n", (long)mp->lm_msg_ident.pid);
572603c8667SAlfred Perlstein 
573603c8667SAlfred Perlstein 	fsidp = (fsid_t *)&mp->lm_fh;
574603c8667SAlfred Perlstein 	fidp = (struct fid *)((u_int8_t *)&mp->lm_fh + sizeof(fsid_t));
575603c8667SAlfred Perlstein 
576603c8667SAlfred Perlstein 	for (t = buf, p = (u_int8_t *)mp->lm_fh,
577603c8667SAlfred Perlstein 	    len = mp->lm_fh_len;
578603c8667SAlfred Perlstein 	    len > 0; ++p, --len) {
579603c8667SAlfred Perlstein 		*t++ = '\\';
580603c8667SAlfred Perlstein 		*t++ = hex[(*p & 0xf0) >> 4];
581603c8667SAlfred Perlstein 		*t++ = hex[*p & 0x0f];
582603c8667SAlfred Perlstein 	}
583603c8667SAlfred Perlstein 	*t = '\0';
584603c8667SAlfred Perlstein 
58575e40e46SPeter Wemm 	syslog(LOG_DEBUG, "fh_len %d, fh %s\n", (int)mp->lm_fh_len, buf);
586603c8667SAlfred Perlstein 
587603c8667SAlfred Perlstein 	/* Show flock structure. */
5889529c2d9SAlfred Perlstein 	syslog(LOG_DEBUG, "start %qu; len %qu; pid %lu; type %d; whence %d\n",
58975e40e46SPeter Wemm 	    (unsigned long long)mp->lm_fl.l_start,
59075e40e46SPeter Wemm 	    (unsigned long long)mp->lm_fl.l_len, (u_long)mp->lm_fl.l_pid,
591603c8667SAlfred Perlstein 	    mp->lm_fl.l_type, mp->lm_fl.l_whence);
592603c8667SAlfred Perlstein 
593603c8667SAlfred Perlstein 	/* Show wait flag. */
5949529c2d9SAlfred Perlstein 	syslog(LOG_DEBUG, "wait was %s\n", mp->lm_wait ? "set" : "not set");
595603c8667SAlfred Perlstein }
596