14945c132SAlfred Perlstein /* $NetBSD: lockd_lock.c,v 1.5 2000/11/21 03:47:41 enami Exp $ */ 24945c132SAlfred Perlstein 34945c132SAlfred Perlstein /* 44945c132SAlfred Perlstein * Copyright (c) 2001 Andrew P. Lentvorski, Jr. 54945c132SAlfred Perlstein * Copyright (c) 2000 Manuel Bouyer. 64945c132SAlfred Perlstein * 74945c132SAlfred Perlstein * Redistribution and use in source and binary forms, with or without 84945c132SAlfred Perlstein * modification, are permitted provided that the following conditions 94945c132SAlfred Perlstein * are met: 104945c132SAlfred Perlstein * 1. Redistributions of source code must retain the above copyright 114945c132SAlfred Perlstein * notice, this list of conditions and the following disclaimer. 124945c132SAlfred Perlstein * 2. Redistributions in binary form must reproduce the above copyright 134945c132SAlfred Perlstein * notice, this list of conditions and the following disclaimer in the 144945c132SAlfred Perlstein * documentation and/or other materials provided with the distribution. 154945c132SAlfred Perlstein * 3. All advertising materials mentioning features or use of this software 164945c132SAlfred Perlstein * must display the following acknowledgement: 174945c132SAlfred Perlstein * This product includes software developed by the University of 184945c132SAlfred Perlstein * California, Berkeley and its contributors. 194945c132SAlfred Perlstein * 4. Neither the name of the University nor the names of its contributors 204945c132SAlfred Perlstein * may be used to endorse or promote products derived from this software 214945c132SAlfred Perlstein * without specific prior written permission. 224945c132SAlfred Perlstein * 234945c132SAlfred Perlstein * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 244945c132SAlfred Perlstein * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 254945c132SAlfred Perlstein * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 264945c132SAlfred Perlstein * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 274945c132SAlfred Perlstein * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 284945c132SAlfred Perlstein * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 294945c132SAlfred Perlstein * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 304945c132SAlfred Perlstein * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 314945c132SAlfred Perlstein * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 324945c132SAlfred Perlstein * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 334945c132SAlfred Perlstein * SUCH DAMAGE. 344945c132SAlfred Perlstein * 354945c132SAlfred Perlstein */ 364945c132SAlfred Perlstein 377838f9ddSPhilippe Charnier #include <sys/cdefs.h> 387838f9ddSPhilippe Charnier __FBSDID("$FreeBSD$"); 397838f9ddSPhilippe Charnier 40b6dc41baSAlfred Perlstein #define LOCKD_DEBUG 414945c132SAlfred Perlstein 424945c132SAlfred Perlstein #include <stdio.h> 43b6dc41baSAlfred Perlstein #ifdef LOCKD_DEBUG 444945c132SAlfred Perlstein #include <stdarg.h> 454945c132SAlfred Perlstein #endif 464945c132SAlfred Perlstein #include <stdlib.h> 474945c132SAlfred Perlstein #include <unistd.h> 484945c132SAlfred Perlstein #include <fcntl.h> 494945c132SAlfred Perlstein #include <syslog.h> 504945c132SAlfred Perlstein #include <errno.h> 514945c132SAlfred Perlstein #include <string.h> 524945c132SAlfred Perlstein #include <signal.h> 534945c132SAlfred Perlstein #include <rpc/rpc.h> 544945c132SAlfred Perlstein #include <sys/types.h> 554945c132SAlfred Perlstein #include <sys/stat.h> 564945c132SAlfred Perlstein #include <sys/socket.h> 574945c132SAlfred Perlstein #include <sys/param.h> 584945c132SAlfred Perlstein #include <sys/mount.h> 594945c132SAlfred Perlstein #include <sys/wait.h> 604945c132SAlfred Perlstein #include <rpcsvc/sm_inter.h> 614945c132SAlfred Perlstein #include <rpcsvc/nlm_prot.h> 624945c132SAlfred Perlstein #include "lockd_lock.h" 634945c132SAlfred Perlstein #include "lockd.h" 644945c132SAlfred Perlstein 654945c132SAlfred Perlstein #define MAXOBJECTSIZE 64 664945c132SAlfred Perlstein #define MAXBUFFERSIZE 1024 674945c132SAlfred Perlstein 684945c132SAlfred Perlstein /* 694945c132SAlfred Perlstein * A set of utilities for managing file locking 704945c132SAlfred Perlstein * 714945c132SAlfred Perlstein * XXX: All locks are in a linked list, a better structure should be used 724945c132SAlfred Perlstein * to improve search/access effeciency. 734945c132SAlfred Perlstein */ 744945c132SAlfred Perlstein 754945c132SAlfred Perlstein /* struct describing a lock */ 764945c132SAlfred Perlstein struct file_lock { 774945c132SAlfred Perlstein LIST_ENTRY(file_lock) nfslocklist; 784945c132SAlfred Perlstein fhandle_t filehandle; /* NFS filehandle */ 794945c132SAlfred Perlstein struct sockaddr *addr; 804945c132SAlfred Perlstein struct nlm4_holder client; /* lock holder */ 815f07c7b2SAlfred Perlstein /* XXX: client_cookie used *only* in send_granted */ 824945c132SAlfred Perlstein netobj client_cookie; /* cookie sent by the client */ 834945c132SAlfred Perlstein int nsm_status; /* status from the remote lock manager */ 844945c132SAlfred Perlstein int status; /* lock status, see below */ 854945c132SAlfred Perlstein int flags; /* lock flags, see lockd_lock.h */ 867e589b0bSAlfred Perlstein int blocking; /* blocking lock or not */ 873d81d1adSMichael Reifenberger char client_name[SM_MAXSTRLEN]; /* client_name is really variable 883d81d1adSMichael Reifenberger length and must be last! */ 894945c132SAlfred Perlstein }; 904945c132SAlfred Perlstein 917e589b0bSAlfred Perlstein LIST_HEAD(nfslocklist_head, file_lock); 927e589b0bSAlfred Perlstein struct nfslocklist_head nfslocklist_head = LIST_HEAD_INITIALIZER(nfslocklist_head); 937e589b0bSAlfred Perlstein 947e589b0bSAlfred Perlstein LIST_HEAD(blockedlocklist_head, file_lock); 957e589b0bSAlfred Perlstein struct blockedlocklist_head blockedlocklist_head = LIST_HEAD_INITIALIZER(blockedlocklist_head); 967e589b0bSAlfred Perlstein 974945c132SAlfred Perlstein /* lock status */ 984945c132SAlfred Perlstein #define LKST_LOCKED 1 /* lock is locked */ 994945c132SAlfred Perlstein /* XXX: Is this flag file specific or lock specific? */ 1004945c132SAlfred Perlstein #define LKST_WAITING 2 /* file is already locked by another host */ 1014945c132SAlfred Perlstein #define LKST_PROCESSING 3 /* child is trying to aquire the lock */ 1024945c132SAlfred Perlstein #define LKST_DYING 4 /* must dies when we get news from the child */ 1034945c132SAlfred Perlstein 1047e589b0bSAlfred Perlstein /* struct describing a monitored host */ 1054945c132SAlfred Perlstein struct host { 1064945c132SAlfred Perlstein LIST_ENTRY(host) hostlst; 1074945c132SAlfred Perlstein int refcnt; 1083d81d1adSMichael Reifenberger char name[SM_MAXSTRLEN]; /* name is really variable length and 1093d81d1adSMichael Reifenberger must be last! */ 1104945c132SAlfred Perlstein }; 1117e589b0bSAlfred Perlstein /* list of hosts we monitor */ 1127e589b0bSAlfred Perlstein LIST_HEAD(hostlst_head, host); 1137e589b0bSAlfred Perlstein struct hostlst_head hostlst_head = LIST_HEAD_INITIALIZER(hostlst_head); 1147e589b0bSAlfred Perlstein 1157e589b0bSAlfred Perlstein /* 1167e589b0bSAlfred Perlstein * File monitoring handlers 1177e589b0bSAlfred Perlstein * XXX: These might be able to be removed when kevent support 1187e589b0bSAlfred Perlstein * is placed into the hardware lock/unlock routines. (ie. 1197e589b0bSAlfred Perlstein * let the kernel do all the file monitoring) 1207e589b0bSAlfred Perlstein */ 1217e589b0bSAlfred Perlstein 1227e589b0bSAlfred Perlstein /* Struct describing a monitored file */ 1237e589b0bSAlfred Perlstein struct monfile { 1247e589b0bSAlfred Perlstein LIST_ENTRY(monfile) monfilelist; 1257e589b0bSAlfred Perlstein fhandle_t filehandle; /* Local access filehandle */ 1267e589b0bSAlfred Perlstein int fd; /* file descriptor: remains open until unlock! */ 1277e589b0bSAlfred Perlstein int refcount; 1287e589b0bSAlfred Perlstein int exclusive; 1297e589b0bSAlfred Perlstein }; 1307e589b0bSAlfred Perlstein 1317e589b0bSAlfred Perlstein /* List of files we monitor */ 1327e589b0bSAlfred Perlstein LIST_HEAD(monfilelist_head, monfile); 1337e589b0bSAlfred Perlstein struct monfilelist_head monfilelist_head = LIST_HEAD_INITIALIZER(monfilelist_head); 1344945c132SAlfred Perlstein 1354945c132SAlfred Perlstein static int debugdelay = 0; 1364945c132SAlfred Perlstein 1377e589b0bSAlfred Perlstein enum nfslock_status { NFS_GRANTED = 0, NFS_GRANTED_DUPLICATE, 1387e589b0bSAlfred Perlstein NFS_DENIED, NFS_DENIED_NOLOCK, 1397e589b0bSAlfred Perlstein NFS_RESERR }; 1407e589b0bSAlfred Perlstein 1417e589b0bSAlfred Perlstein enum hwlock_status { HW_GRANTED = 0, HW_GRANTED_DUPLICATE, 1427e589b0bSAlfred Perlstein HW_DENIED, HW_DENIED_NOLOCK, 1437e589b0bSAlfred Perlstein HW_STALEFH, HW_READONLY, HW_RESERR }; 1444945c132SAlfred Perlstein 1454945c132SAlfred Perlstein enum partialfilelock_status { PFL_GRANTED=0, PFL_GRANTED_DUPLICATE, PFL_DENIED, 1467e589b0bSAlfred Perlstein PFL_NFSDENIED, PFL_NFSBLOCKED, PFL_NFSDENIED_NOLOCK, PFL_NFSRESERR, 1477e589b0bSAlfred Perlstein PFL_HWDENIED, PFL_HWBLOCKED, PFL_HWDENIED_NOLOCK, PFL_HWRESERR}; 1484945c132SAlfred Perlstein 1495f07c7b2SAlfred Perlstein enum LFLAGS {LEDGE_LEFT, LEDGE_LBOUNDARY, LEDGE_INSIDE, LEDGE_RBOUNDARY, LEDGE_RIGHT}; 1505f07c7b2SAlfred Perlstein enum RFLAGS {REDGE_LEFT, REDGE_LBOUNDARY, REDGE_INSIDE, REDGE_RBOUNDARY, REDGE_RIGHT}; 1515f07c7b2SAlfred Perlstein /* XXX: WARNING! I HAVE OVERLOADED THIS STATUS ENUM! SPLIT IT APART INTO TWO */ 1525f07c7b2SAlfred Perlstein enum split_status {SPL_DISJOINT=0, SPL_LOCK1=1, SPL_LOCK2=2, SPL_CONTAINED=4, SPL_RESERR=8}; 1535f07c7b2SAlfred Perlstein 1547e589b0bSAlfred Perlstein enum partialfilelock_status lock_partialfilelock(struct file_lock *fl); 1557e589b0bSAlfred Perlstein 1567e589b0bSAlfred Perlstein void send_granted(struct file_lock *fl, int opcode); 1574945c132SAlfred Perlstein void siglock(void); 1584945c132SAlfred Perlstein void sigunlock(void); 159a4a8a04dSAlfred Perlstein void monitor_lock_host(const char *hostname); 16075e40e46SPeter Wemm void unmonitor_lock_host(char *hostname); 1614945c132SAlfred Perlstein 162b6dc41baSAlfred Perlstein void copy_nlm4_lock_to_nlm4_holder(const struct nlm4_lock *src, 163b6dc41baSAlfred Perlstein const bool_t exclusive, struct nlm4_holder *dest); 164815ac496SAlfred Perlstein struct file_lock * allocate_file_lock(const netobj *lockowner, 1653d81d1adSMichael Reifenberger const netobj *matchcookie, 1663d81d1adSMichael Reifenberger const struct sockaddr *addr, 1673d81d1adSMichael Reifenberger const char *caller_name); 168b6dc41baSAlfred Perlstein void deallocate_file_lock(struct file_lock *fl); 169815ac496SAlfred Perlstein void fill_file_lock(struct file_lock *fl, const fhandle_t *fh, 1703d81d1adSMichael Reifenberger const bool_t exclusive, const int32_t svid, 1713d81d1adSMichael Reifenberger const u_int64_t offset, const u_int64_t len, 172815ac496SAlfred Perlstein const int state, const int status, const int flags, const int blocking); 173b6dc41baSAlfred Perlstein int regions_overlap(const u_int64_t start1, const u_int64_t len1, 174a7526044SStefan Farfeleder const u_int64_t start2, const u_int64_t len2); 1755f07c7b2SAlfred Perlstein enum split_status region_compare(const u_int64_t starte, const u_int64_t lene, 1765f07c7b2SAlfred Perlstein const u_int64_t startu, const u_int64_t lenu, 1775f07c7b2SAlfred Perlstein u_int64_t *start1, u_int64_t *len1, u_int64_t *start2, u_int64_t *len2); 178b6dc41baSAlfred Perlstein int same_netobj(const netobj *n0, const netobj *n1); 179b6dc41baSAlfred Perlstein int same_filelock_identity(const struct file_lock *fl0, 180b6dc41baSAlfred Perlstein const struct file_lock *fl2); 181b6dc41baSAlfred Perlstein 182b6dc41baSAlfred Perlstein static void debuglog(char const *fmt, ...); 183b6dc41baSAlfred Perlstein void dump_static_object(const unsigned char* object, const int sizeof_object, 184b6dc41baSAlfred Perlstein unsigned char* hbuff, const int sizeof_hbuff, 185b6dc41baSAlfred Perlstein unsigned char* cbuff, const int sizeof_cbuff); 186b6dc41baSAlfred Perlstein void dump_netobj(const struct netobj *nobj); 187b6dc41baSAlfred Perlstein void dump_filelock(const struct file_lock *fl); 188b6dc41baSAlfred Perlstein struct file_lock * get_lock_matching_unlock(const struct file_lock *fl); 189b6dc41baSAlfred Perlstein enum nfslock_status test_nfslock(const struct file_lock *fl, 190b6dc41baSAlfred Perlstein struct file_lock **conflicting_fl); 191b6dc41baSAlfred Perlstein enum nfslock_status lock_nfslock(struct file_lock *fl); 192b6dc41baSAlfred Perlstein enum nfslock_status delete_nfslock(struct file_lock *fl); 193b6dc41baSAlfred Perlstein enum nfslock_status unlock_nfslock(const struct file_lock *fl, 1945f07c7b2SAlfred Perlstein struct file_lock **released_lock, struct file_lock **left_lock, 1955f07c7b2SAlfred Perlstein struct file_lock **right_lock); 196b6dc41baSAlfred Perlstein enum hwlock_status lock_hwlock(struct file_lock *fl); 197b6dc41baSAlfred Perlstein enum split_status split_nfslock(const struct file_lock *exist_lock, 1985f07c7b2SAlfred Perlstein const struct file_lock *unlock_lock, struct file_lock **left_lock, 1995f07c7b2SAlfred Perlstein struct file_lock **right_lock); 200b6dc41baSAlfred Perlstein void add_blockingfilelock(struct file_lock *fl); 201b6dc41baSAlfred Perlstein enum hwlock_status unlock_hwlock(const struct file_lock *fl); 202b6dc41baSAlfred Perlstein enum hwlock_status test_hwlock(const struct file_lock *fl, 203b6dc41baSAlfred Perlstein struct file_lock **conflicting_fl); 204b6dc41baSAlfred Perlstein void remove_blockingfilelock(struct file_lock *fl); 205b6dc41baSAlfred Perlstein void clear_blockingfilelock(const char *hostname); 206b6dc41baSAlfred Perlstein void retry_blockingfilelocklist(void); 207b6dc41baSAlfred Perlstein enum partialfilelock_status unlock_partialfilelock( 208b6dc41baSAlfred Perlstein const struct file_lock *fl); 209b6dc41baSAlfred Perlstein void clear_partialfilelock(const char *hostname); 210b6dc41baSAlfred Perlstein enum partialfilelock_status test_partialfilelock( 211b6dc41baSAlfred Perlstein const struct file_lock *fl, struct file_lock **conflicting_fl); 212b6dc41baSAlfred Perlstein enum nlm_stats do_test(struct file_lock *fl, 213b6dc41baSAlfred Perlstein struct file_lock **conflicting_fl); 214b6dc41baSAlfred Perlstein enum nlm_stats do_unlock(struct file_lock *fl); 215b6dc41baSAlfred Perlstein enum nlm_stats do_lock(struct file_lock *fl); 216b6dc41baSAlfred Perlstein void do_clear(const char *hostname); 2177838f9ddSPhilippe Charnier size_t strnlen(const char *, size_t); 218b6dc41baSAlfred Perlstein 2194945c132SAlfred Perlstein void 2204945c132SAlfred Perlstein debuglog(char const *fmt, ...) 2214945c132SAlfred Perlstein { 2224945c132SAlfred Perlstein va_list ap; 2234945c132SAlfred Perlstein 2247e589b0bSAlfred Perlstein if (debug_level < 1) { 2254945c132SAlfred Perlstein return; 2267e589b0bSAlfred Perlstein } 2274945c132SAlfred Perlstein 2284945c132SAlfred Perlstein sleep(debugdelay); 2294945c132SAlfred Perlstein 2304945c132SAlfred Perlstein va_start(ap, fmt); 2314945c132SAlfred Perlstein vsyslog(LOG_DEBUG, fmt, ap); 2324945c132SAlfred Perlstein va_end(ap); 2334945c132SAlfred Perlstein } 2344945c132SAlfred Perlstein 235b6dc41baSAlfred Perlstein void 236b6dc41baSAlfred Perlstein dump_static_object(object, size_object, hbuff, size_hbuff, cbuff, size_cbuff) 237b6dc41baSAlfred Perlstein const unsigned char *object; 238b6dc41baSAlfred Perlstein const int size_object; 239b6dc41baSAlfred Perlstein unsigned char *hbuff; 240b6dc41baSAlfred Perlstein const int size_hbuff; 241b6dc41baSAlfred Perlstein unsigned char *cbuff; 242b6dc41baSAlfred Perlstein const int size_cbuff; 2434945c132SAlfred Perlstein { 2444945c132SAlfred Perlstein int i, objectsize; 2454945c132SAlfred Perlstein 2467e589b0bSAlfred Perlstein if (debug_level < 2) { 2474945c132SAlfred Perlstein return; 2484945c132SAlfred Perlstein } 2494945c132SAlfred Perlstein 250b6dc41baSAlfred Perlstein objectsize = size_object; 2517e589b0bSAlfred Perlstein 2527e589b0bSAlfred Perlstein if (objectsize == 0) { 2537e589b0bSAlfred Perlstein debuglog("object is size 0\n"); 2547e589b0bSAlfred Perlstein } else { 2554945c132SAlfred Perlstein if (objectsize > MAXOBJECTSIZE) { 2564945c132SAlfred Perlstein debuglog("Object of size %d being clamped" 2574945c132SAlfred Perlstein "to size %d\n", objectsize, MAXOBJECTSIZE); 2584945c132SAlfred Perlstein objectsize = MAXOBJECTSIZE; 2594945c132SAlfred Perlstein } 2604945c132SAlfred Perlstein 2614945c132SAlfred Perlstein if (hbuff != NULL) { 262b6dc41baSAlfred Perlstein if (size_hbuff < objectsize*2+1) { 2637e589b0bSAlfred Perlstein debuglog("Hbuff not large enough." 2647e589b0bSAlfred Perlstein " Increase size\n"); 2654945c132SAlfred Perlstein } else { 2664945c132SAlfred Perlstein for(i=0;i<objectsize;i++) { 2674945c132SAlfred Perlstein sprintf(hbuff+i*2,"%02x",*(object+i)); 2684945c132SAlfred Perlstein } 2694945c132SAlfred Perlstein *(hbuff+i*2) = '\0'; 2704945c132SAlfred Perlstein } 2714945c132SAlfred Perlstein } 2724945c132SAlfred Perlstein 2734945c132SAlfred Perlstein if (cbuff != NULL) { 274b6dc41baSAlfred Perlstein if (size_cbuff < objectsize+1) { 2754945c132SAlfred Perlstein debuglog("Cbuff not large enough." 2764945c132SAlfred Perlstein " Increase Size\n"); 2774945c132SAlfred Perlstein } 2784945c132SAlfred Perlstein 2794945c132SAlfred Perlstein for(i=0;i<objectsize;i++) { 2804945c132SAlfred Perlstein if (*(object+i) >= 32 && *(object+i) <= 127) { 2814945c132SAlfred Perlstein *(cbuff+i) = *(object+i); 2824945c132SAlfred Perlstein } else { 2834945c132SAlfred Perlstein *(cbuff+i) = '.'; 2844945c132SAlfred Perlstein } 2854945c132SAlfred Perlstein } 2864945c132SAlfred Perlstein *(cbuff+i) = '\0'; 2874945c132SAlfred Perlstein } 2884945c132SAlfred Perlstein } 2897e589b0bSAlfred Perlstein } 2904945c132SAlfred Perlstein 291b6dc41baSAlfred Perlstein void 292b6dc41baSAlfred Perlstein dump_netobj(const struct netobj *nobj) 2934945c132SAlfred Perlstein { 2944945c132SAlfred Perlstein char hbuff[MAXBUFFERSIZE*2]; 2954945c132SAlfred Perlstein char cbuff[MAXBUFFERSIZE]; 2964945c132SAlfred Perlstein 2977e589b0bSAlfred Perlstein if (debug_level < 2) { 2984945c132SAlfred Perlstein return; 2997e589b0bSAlfred Perlstein } 3004945c132SAlfred Perlstein 3014945c132SAlfred Perlstein if (nobj == NULL) { 3024945c132SAlfred Perlstein debuglog("Null netobj pointer\n"); 3037e589b0bSAlfred Perlstein } 3047e589b0bSAlfred Perlstein else if (nobj->n_len == 0) { 3054945c132SAlfred Perlstein debuglog("Size zero netobj\n"); 3064945c132SAlfred Perlstein } else { 3074945c132SAlfred Perlstein dump_static_object(nobj->n_bytes, nobj->n_len, 3084945c132SAlfred Perlstein hbuff, sizeof(hbuff), cbuff, sizeof(cbuff)); 3094945c132SAlfred Perlstein debuglog("netobj: len: %d data: %s ::: %s\n", 3104945c132SAlfred Perlstein nobj->n_len, hbuff, cbuff); 3114945c132SAlfred Perlstein } 3124945c132SAlfred Perlstein } 3134945c132SAlfred Perlstein 314c4bc47baSAlfred Perlstein /* #define DUMP_FILELOCK_VERBOSE */ 315b6dc41baSAlfred Perlstein void 316b6dc41baSAlfred Perlstein dump_filelock(const struct file_lock *fl) 3174945c132SAlfred Perlstein { 318c4bc47baSAlfred Perlstein #ifdef DUMP_FILELOCK_VERBOSE 3194945c132SAlfred Perlstein char hbuff[MAXBUFFERSIZE*2]; 3204945c132SAlfred Perlstein char cbuff[MAXBUFFERSIZE]; 321c4bc47baSAlfred Perlstein #endif 3224945c132SAlfred Perlstein 3237e589b0bSAlfred Perlstein if (debug_level < 2) { 3244945c132SAlfred Perlstein return; 3254945c132SAlfred Perlstein } 3264945c132SAlfred Perlstein 3277e589b0bSAlfred Perlstein if (fl != NULL) { 3285f07c7b2SAlfred Perlstein debuglog("Dumping file lock structure @ %p\n", fl); 3294945c132SAlfred Perlstein 330c4bc47baSAlfred Perlstein #ifdef DUMP_FILELOCK_VERBOSE 3314945c132SAlfred Perlstein dump_static_object((unsigned char *)&fl->filehandle, 3324945c132SAlfred Perlstein sizeof(fl->filehandle), hbuff, sizeof(hbuff), 3334945c132SAlfred Perlstein cbuff, sizeof(cbuff)); 3344945c132SAlfred Perlstein debuglog("Filehandle: %8s ::: %8s\n", hbuff, cbuff); 335c4bc47baSAlfred Perlstein #endif 3364945c132SAlfred Perlstein 337b6dc41baSAlfred Perlstein debuglog("Dumping nlm4_holder:\n" 338b6dc41baSAlfred Perlstein "exc: %x svid: %x offset:len %llx:%llx\n", 3394945c132SAlfred Perlstein fl->client.exclusive, fl->client.svid, 3404945c132SAlfred Perlstein fl->client.l_offset, fl->client.l_len); 3414945c132SAlfred Perlstein 342c4bc47baSAlfred Perlstein #ifdef DUMP_FILELOCK_VERBOSE 3434945c132SAlfred Perlstein debuglog("Dumping client identity:\n"); 3444945c132SAlfred Perlstein dump_netobj(&fl->client.oh); 3454945c132SAlfred Perlstein 3464945c132SAlfred Perlstein debuglog("Dumping client cookie:\n"); 3474945c132SAlfred Perlstein dump_netobj(&fl->client_cookie); 3484945c132SAlfred Perlstein 349856f34f9SJun Kuriyama debuglog("nsm: %d status: %d flags: %d svid: %x" 350856f34f9SJun Kuriyama " client_name: %s\n", fl->nsm_status, fl->status, 351856f34f9SJun Kuriyama fl->flags, fl->client.svid, fl->client_name); 352c4bc47baSAlfred Perlstein #endif 3537e589b0bSAlfred Perlstein } else { 3547e589b0bSAlfred Perlstein debuglog("NULL file lock structure\n"); 3557e589b0bSAlfred Perlstein } 3567e589b0bSAlfred Perlstein } 3577e589b0bSAlfred Perlstein 3584945c132SAlfred Perlstein void 359b6dc41baSAlfred Perlstein copy_nlm4_lock_to_nlm4_holder(src, exclusive, dest) 360b6dc41baSAlfred Perlstein const struct nlm4_lock *src; 361b6dc41baSAlfred Perlstein const bool_t exclusive; 362b6dc41baSAlfred Perlstein struct nlm4_holder *dest; 3634945c132SAlfred Perlstein { 364b6dc41baSAlfred Perlstein 3654945c132SAlfred Perlstein dest->exclusive = exclusive; 3664945c132SAlfred Perlstein dest->oh.n_len = src->oh.n_len; 3674945c132SAlfred Perlstein dest->oh.n_bytes = src->oh.n_bytes; 3684945c132SAlfred Perlstein dest->svid = src->svid; 3694945c132SAlfred Perlstein dest->l_offset = src->l_offset; 3704945c132SAlfred Perlstein dest->l_len = src->l_len; 3714945c132SAlfred Perlstein } 3724945c132SAlfred Perlstein 3735f07c7b2SAlfred Perlstein 3743d81d1adSMichael Reifenberger size_t 3753d81d1adSMichael Reifenberger strnlen(const char *s, size_t len) 3763d81d1adSMichael Reifenberger { 3773d81d1adSMichael Reifenberger size_t n; 3783d81d1adSMichael Reifenberger 3793d81d1adSMichael Reifenberger for (n = 0; s[n] != 0 && n < len; n++) 3803d81d1adSMichael Reifenberger ; 3813d81d1adSMichael Reifenberger return n; 3823d81d1adSMichael Reifenberger } 3833d81d1adSMichael Reifenberger 3845f07c7b2SAlfred Perlstein /* 3855f07c7b2SAlfred Perlstein * allocate_file_lock: Create a lock with the given parameters 3865f07c7b2SAlfred Perlstein */ 3875f07c7b2SAlfred Perlstein 3885f07c7b2SAlfred Perlstein struct file_lock * 3893d81d1adSMichael Reifenberger allocate_file_lock(const netobj *lockowner, const netobj *matchcookie, 3903d81d1adSMichael Reifenberger const struct sockaddr *addr, const char *caller_name) 3915f07c7b2SAlfred Perlstein { 3925f07c7b2SAlfred Perlstein struct file_lock *newfl; 3933d81d1adSMichael Reifenberger size_t n; 3945f07c7b2SAlfred Perlstein 3953d81d1adSMichael Reifenberger /* Beware of rubbish input! */ 3963d81d1adSMichael Reifenberger n = strnlen(caller_name, SM_MAXSTRLEN); 3973d81d1adSMichael Reifenberger if (n == SM_MAXSTRLEN) { 3983d81d1adSMichael Reifenberger return NULL; 3993d81d1adSMichael Reifenberger } 4003d81d1adSMichael Reifenberger 4013d81d1adSMichael Reifenberger newfl = malloc(sizeof(*newfl) - sizeof(newfl->client_name) + n + 1); 4025f07c7b2SAlfred Perlstein if (newfl == NULL) { 4035f07c7b2SAlfred Perlstein return NULL; 4045f07c7b2SAlfred Perlstein } 4053d81d1adSMichael Reifenberger bzero(newfl, sizeof(*newfl) - sizeof(newfl->client_name)); 4063d81d1adSMichael Reifenberger memcpy(newfl->client_name, caller_name, n); 4073d81d1adSMichael Reifenberger newfl->client_name[n] = 0; 4085f07c7b2SAlfred Perlstein 4095f07c7b2SAlfred Perlstein newfl->client.oh.n_bytes = malloc(lockowner->n_len); 4105f07c7b2SAlfred Perlstein if (newfl->client.oh.n_bytes == NULL) { 4115f07c7b2SAlfred Perlstein free(newfl); 4125f07c7b2SAlfred Perlstein return NULL; 4135f07c7b2SAlfred Perlstein } 4145f07c7b2SAlfred Perlstein newfl->client.oh.n_len = lockowner->n_len; 4155f07c7b2SAlfred Perlstein bcopy(lockowner->n_bytes, newfl->client.oh.n_bytes, lockowner->n_len); 4165f07c7b2SAlfred Perlstein 4175f07c7b2SAlfred Perlstein newfl->client_cookie.n_bytes = malloc(matchcookie->n_len); 4185f07c7b2SAlfred Perlstein if (newfl->client_cookie.n_bytes == NULL) { 4195f07c7b2SAlfred Perlstein free(newfl->client.oh.n_bytes); 4205f07c7b2SAlfred Perlstein free(newfl); 4215f07c7b2SAlfred Perlstein return NULL; 4225f07c7b2SAlfred Perlstein } 4235f07c7b2SAlfred Perlstein newfl->client_cookie.n_len = matchcookie->n_len; 4245f07c7b2SAlfred Perlstein bcopy(matchcookie->n_bytes, newfl->client_cookie.n_bytes, matchcookie->n_len); 4255f07c7b2SAlfred Perlstein 4263d81d1adSMichael Reifenberger newfl->addr = malloc(addr->sa_len); 4273d81d1adSMichael Reifenberger if (newfl->addr == NULL) { 4283d81d1adSMichael Reifenberger free(newfl->client_cookie.n_bytes); 4293d81d1adSMichael Reifenberger free(newfl->client.oh.n_bytes); 4303d81d1adSMichael Reifenberger free(newfl); 4313d81d1adSMichael Reifenberger return NULL; 4323d81d1adSMichael Reifenberger } 4333d81d1adSMichael Reifenberger memcpy(newfl->addr, addr, addr->sa_len); 4343d81d1adSMichael Reifenberger 4355f07c7b2SAlfred Perlstein return newfl; 4365f07c7b2SAlfred Perlstein } 4375f07c7b2SAlfred Perlstein 4385f07c7b2SAlfred Perlstein /* 4395f07c7b2SAlfred Perlstein * file_file_lock: Force creation of a valid file lock 4405f07c7b2SAlfred Perlstein */ 4415f07c7b2SAlfred Perlstein void 442815ac496SAlfred Perlstein fill_file_lock(struct file_lock *fl, const fhandle_t *fh, 4433d81d1adSMichael Reifenberger const bool_t exclusive, const int32_t svid, 4443d81d1adSMichael Reifenberger const u_int64_t offset, const u_int64_t len, 445815ac496SAlfred Perlstein const int state, const int status, const int flags, const int blocking) 4465f07c7b2SAlfred Perlstein { 4475f07c7b2SAlfred Perlstein bcopy(fh, &fl->filehandle, sizeof(fhandle_t)); 4485f07c7b2SAlfred Perlstein 4495f07c7b2SAlfred Perlstein fl->client.exclusive = exclusive; 4505f07c7b2SAlfred Perlstein fl->client.svid = svid; 4515f07c7b2SAlfred Perlstein fl->client.l_offset = offset; 4525f07c7b2SAlfred Perlstein fl->client.l_len = len; 4535f07c7b2SAlfred Perlstein 4545f07c7b2SAlfred Perlstein fl->nsm_status = state; 4555f07c7b2SAlfred Perlstein fl->status = status; 4565f07c7b2SAlfred Perlstein fl->flags = flags; 4575f07c7b2SAlfred Perlstein fl->blocking = blocking; 4585f07c7b2SAlfred Perlstein } 4595f07c7b2SAlfred Perlstein 4604945c132SAlfred Perlstein /* 4614945c132SAlfred Perlstein * deallocate_file_lock: Free all storage associated with a file lock 4624945c132SAlfred Perlstein */ 4634945c132SAlfred Perlstein void 4644945c132SAlfred Perlstein deallocate_file_lock(struct file_lock *fl) 4654945c132SAlfred Perlstein { 4663d81d1adSMichael Reifenberger free(fl->addr); 4674945c132SAlfred Perlstein free(fl->client.oh.n_bytes); 4684945c132SAlfred Perlstein free(fl->client_cookie.n_bytes); 4694945c132SAlfred Perlstein free(fl); 4704945c132SAlfred Perlstein } 4714945c132SAlfred Perlstein 4724945c132SAlfred Perlstein /* 4734945c132SAlfred Perlstein * regions_overlap(): This function examines the two provided regions for 4745f07c7b2SAlfred Perlstein * overlap. 4754945c132SAlfred Perlstein */ 4764945c132SAlfred Perlstein int 477b6dc41baSAlfred Perlstein regions_overlap(start1, len1, start2, len2) 478b6dc41baSAlfred Perlstein const u_int64_t start1, len1, start2, len2; 4794945c132SAlfred Perlstein { 4805f07c7b2SAlfred Perlstein u_int64_t d1,d2,d3,d4; 4815f07c7b2SAlfred Perlstein enum split_status result; 4827e589b0bSAlfred Perlstein 4834945c132SAlfred Perlstein debuglog("Entering region overlap with vals: %llu:%llu--%llu:%llu\n", 4844945c132SAlfred Perlstein start1, len1, start2, len2); 4854945c132SAlfred Perlstein 4865f07c7b2SAlfred Perlstein result = region_compare(start1, len1, start2, len2, 4875f07c7b2SAlfred Perlstein &d1, &d2, &d3, &d4); 4884945c132SAlfred Perlstein 4897e589b0bSAlfred Perlstein debuglog("Exiting region overlap with val: %d\n",result); 4907e589b0bSAlfred Perlstein 4915f07c7b2SAlfred Perlstein if (result == SPL_DISJOINT) { 4925f07c7b2SAlfred Perlstein return 0; 4935f07c7b2SAlfred Perlstein } else { 4945f07c7b2SAlfred Perlstein return 1; 4955f07c7b2SAlfred Perlstein } 4965f07c7b2SAlfred Perlstein 4977e589b0bSAlfred Perlstein return (result); 4987e589b0bSAlfred Perlstein } 4997e589b0bSAlfred Perlstein 5004945c132SAlfred Perlstein /* 5015f07c7b2SAlfred Perlstein * region_compare(): Examine lock regions and split appropriately 5025f07c7b2SAlfred Perlstein * 5035f07c7b2SAlfred Perlstein * XXX: Fix 64 bit overflow problems 5045f07c7b2SAlfred Perlstein * XXX: Check to make sure I got *ALL* the cases. 5055f07c7b2SAlfred Perlstein * XXX: This DESPERATELY needs a regression test. 5065f07c7b2SAlfred Perlstein */ 5075f07c7b2SAlfred Perlstein enum split_status 5085f07c7b2SAlfred Perlstein region_compare(starte, lene, startu, lenu, 5095f07c7b2SAlfred Perlstein start1, len1, start2, len2) 5105f07c7b2SAlfred Perlstein const u_int64_t starte, lene, startu, lenu; 5115f07c7b2SAlfred Perlstein u_int64_t *start1, *len1, *start2, *len2; 5125f07c7b2SAlfred Perlstein { 5135f07c7b2SAlfred Perlstein /* 5145f07c7b2SAlfred Perlstein * Please pay attention to the sequential exclusions 5155f07c7b2SAlfred Perlstein * of the if statements!!! 5165f07c7b2SAlfred Perlstein */ 5175f07c7b2SAlfred Perlstein enum LFLAGS lflags; 5185f07c7b2SAlfred Perlstein enum RFLAGS rflags; 5195f07c7b2SAlfred Perlstein enum split_status retval; 5205f07c7b2SAlfred Perlstein 5215f07c7b2SAlfred Perlstein retval = SPL_DISJOINT; 5225f07c7b2SAlfred Perlstein 5235f07c7b2SAlfred Perlstein if (lene == 0 && lenu == 0) { 5245f07c7b2SAlfred Perlstein /* Examine left edge of locker */ 5257838f9ddSPhilippe Charnier lflags = LEDGE_INSIDE; 5265f07c7b2SAlfred Perlstein if (startu < starte) { 5275f07c7b2SAlfred Perlstein lflags = LEDGE_LEFT; 5285f07c7b2SAlfred Perlstein } else if (startu == starte) { 5295f07c7b2SAlfred Perlstein lflags = LEDGE_LBOUNDARY; 5305f07c7b2SAlfred Perlstein } 5315f07c7b2SAlfred Perlstein 5325f07c7b2SAlfred Perlstein rflags = REDGE_RBOUNDARY; /* Both are infiinite */ 5335f07c7b2SAlfred Perlstein 5345f07c7b2SAlfred Perlstein if (lflags == LEDGE_INSIDE) { 5355f07c7b2SAlfred Perlstein *start1 = starte; 5365f07c7b2SAlfred Perlstein *len1 = startu - starte; 5375f07c7b2SAlfred Perlstein } 5385f07c7b2SAlfred Perlstein 5395f07c7b2SAlfred Perlstein if (lflags == LEDGE_LEFT || lflags == LEDGE_LBOUNDARY) { 5405f07c7b2SAlfred Perlstein retval = SPL_CONTAINED; 5415f07c7b2SAlfred Perlstein } else { 5425f07c7b2SAlfred Perlstein retval = SPL_LOCK1; 5435f07c7b2SAlfred Perlstein } 5445f07c7b2SAlfred Perlstein } else if (lene == 0 && lenu != 0) { 5455f07c7b2SAlfred Perlstein /* Established lock is infinite */ 5465f07c7b2SAlfred Perlstein /* Examine left edge of unlocker */ 5477838f9ddSPhilippe Charnier lflags = LEDGE_INSIDE; 5485f07c7b2SAlfred Perlstein if (startu < starte) { 5495f07c7b2SAlfred Perlstein lflags = LEDGE_LEFT; 5505f07c7b2SAlfred Perlstein } else if (startu == starte) { 5515f07c7b2SAlfred Perlstein lflags = LEDGE_LBOUNDARY; 5525f07c7b2SAlfred Perlstein } 5535f07c7b2SAlfred Perlstein 5545f07c7b2SAlfred Perlstein /* Examine right edge of unlocker */ 5555f07c7b2SAlfred Perlstein if (startu + lenu < starte) { 5565f07c7b2SAlfred Perlstein /* Right edge of unlocker left of established lock */ 5575f07c7b2SAlfred Perlstein rflags = REDGE_LEFT; 5585f07c7b2SAlfred Perlstein return SPL_DISJOINT; 5595f07c7b2SAlfred Perlstein } else if (startu + lenu == starte) { 5605f07c7b2SAlfred Perlstein /* Right edge of unlocker on start of established lock */ 5615f07c7b2SAlfred Perlstein rflags = REDGE_LBOUNDARY; 5625f07c7b2SAlfred Perlstein return SPL_DISJOINT; 5635f07c7b2SAlfred Perlstein } else { /* Infinifty is right of finity */ 5645f07c7b2SAlfred Perlstein /* Right edge of unlocker inside established lock */ 5655f07c7b2SAlfred Perlstein rflags = REDGE_INSIDE; 5665f07c7b2SAlfred Perlstein } 5675f07c7b2SAlfred Perlstein 5685f07c7b2SAlfred Perlstein if (lflags == LEDGE_INSIDE) { 5695f07c7b2SAlfred Perlstein *start1 = starte; 5705f07c7b2SAlfred Perlstein *len1 = startu - starte; 5715f07c7b2SAlfred Perlstein retval |= SPL_LOCK1; 5725f07c7b2SAlfred Perlstein } 5735f07c7b2SAlfred Perlstein 5745f07c7b2SAlfred Perlstein if (rflags == REDGE_INSIDE) { 5755f07c7b2SAlfred Perlstein /* Create right lock */ 5765f07c7b2SAlfred Perlstein *start2 = startu+lenu; 5775f07c7b2SAlfred Perlstein *len2 = 0; 5785f07c7b2SAlfred Perlstein retval |= SPL_LOCK2; 5795f07c7b2SAlfred Perlstein } 5805f07c7b2SAlfred Perlstein } else if (lene != 0 && lenu == 0) { 5815f07c7b2SAlfred Perlstein /* Unlocker is infinite */ 5825f07c7b2SAlfred Perlstein /* Examine left edge of unlocker */ 5837838f9ddSPhilippe Charnier lflags = LEDGE_RIGHT; 5845f07c7b2SAlfred Perlstein if (startu < starte) { 5855f07c7b2SAlfred Perlstein lflags = LEDGE_LEFT; 5865f07c7b2SAlfred Perlstein retval = SPL_CONTAINED; 5875f07c7b2SAlfred Perlstein return retval; 5885f07c7b2SAlfred Perlstein } else if (startu == starte) { 5895f07c7b2SAlfred Perlstein lflags = LEDGE_LBOUNDARY; 5905f07c7b2SAlfred Perlstein retval = SPL_CONTAINED; 5915f07c7b2SAlfred Perlstein return retval; 5925f07c7b2SAlfred Perlstein } else if ((startu > starte) && (startu < starte + lene - 1)) { 5935f07c7b2SAlfred Perlstein lflags = LEDGE_INSIDE; 5945f07c7b2SAlfred Perlstein } else if (startu == starte + lene - 1) { 5955f07c7b2SAlfred Perlstein lflags = LEDGE_RBOUNDARY; 5965f07c7b2SAlfred Perlstein } else { /* startu > starte + lene -1 */ 5975f07c7b2SAlfred Perlstein lflags = LEDGE_RIGHT; 5985f07c7b2SAlfred Perlstein return SPL_DISJOINT; 5995f07c7b2SAlfred Perlstein } 6005f07c7b2SAlfred Perlstein 6015f07c7b2SAlfred Perlstein rflags = REDGE_RIGHT; /* Infinity is right of finity */ 6025f07c7b2SAlfred Perlstein 6035f07c7b2SAlfred Perlstein if (lflags == LEDGE_INSIDE || lflags == LEDGE_RBOUNDARY) { 6045f07c7b2SAlfred Perlstein *start1 = starte; 6055f07c7b2SAlfred Perlstein *len1 = startu - starte; 6065f07c7b2SAlfred Perlstein retval |= SPL_LOCK1; 6075f07c7b2SAlfred Perlstein return retval; 6085f07c7b2SAlfred Perlstein } 6095f07c7b2SAlfred Perlstein } else { 6105f07c7b2SAlfred Perlstein /* Both locks are finite */ 6115f07c7b2SAlfred Perlstein 6125f07c7b2SAlfred Perlstein /* Examine left edge of unlocker */ 6137838f9ddSPhilippe Charnier lflags = LEDGE_RIGHT; 6145f07c7b2SAlfred Perlstein if (startu < starte) { 6155f07c7b2SAlfred Perlstein lflags = LEDGE_LEFT; 6165f07c7b2SAlfred Perlstein } else if (startu == starte) { 6175f07c7b2SAlfred Perlstein lflags = LEDGE_LBOUNDARY; 6185f07c7b2SAlfred Perlstein } else if ((startu > starte) && (startu < starte + lene - 1)) { 6195f07c7b2SAlfred Perlstein lflags = LEDGE_INSIDE; 6205f07c7b2SAlfred Perlstein } else if (startu == starte + lene - 1) { 6215f07c7b2SAlfred Perlstein lflags = LEDGE_RBOUNDARY; 6225f07c7b2SAlfred Perlstein } else { /* startu > starte + lene -1 */ 6235f07c7b2SAlfred Perlstein lflags = LEDGE_RIGHT; 6245f07c7b2SAlfred Perlstein return SPL_DISJOINT; 6255f07c7b2SAlfred Perlstein } 6265f07c7b2SAlfred Perlstein 6275f07c7b2SAlfred Perlstein /* Examine right edge of unlocker */ 6285f07c7b2SAlfred Perlstein if (startu + lenu < starte) { 6295f07c7b2SAlfred Perlstein /* Right edge of unlocker left of established lock */ 6305f07c7b2SAlfred Perlstein rflags = REDGE_LEFT; 6315f07c7b2SAlfred Perlstein return SPL_DISJOINT; 6325f07c7b2SAlfred Perlstein } else if (startu + lenu == starte) { 6335f07c7b2SAlfred Perlstein /* Right edge of unlocker on start of established lock */ 6345f07c7b2SAlfred Perlstein rflags = REDGE_LBOUNDARY; 6355f07c7b2SAlfred Perlstein return SPL_DISJOINT; 6365f07c7b2SAlfred Perlstein } else if (startu + lenu < starte + lene) { 6375f07c7b2SAlfred Perlstein /* Right edge of unlocker inside established lock */ 6385f07c7b2SAlfred Perlstein rflags = REDGE_INSIDE; 6395f07c7b2SAlfred Perlstein } else if (startu + lenu == starte + lene) { 6405f07c7b2SAlfred Perlstein /* Right edge of unlocker on right edge of established lock */ 6415f07c7b2SAlfred Perlstein rflags = REDGE_RBOUNDARY; 6425f07c7b2SAlfred Perlstein } else { /* startu + lenu > starte + lene */ 6435f07c7b2SAlfred Perlstein /* Right edge of unlocker is right of established lock */ 6445f07c7b2SAlfred Perlstein rflags = REDGE_RIGHT; 6455f07c7b2SAlfred Perlstein } 6465f07c7b2SAlfred Perlstein 6475f07c7b2SAlfred Perlstein if (lflags == LEDGE_INSIDE || lflags == LEDGE_RBOUNDARY) { 6485f07c7b2SAlfred Perlstein /* Create left lock */ 6495f07c7b2SAlfred Perlstein *start1 = starte; 6505f07c7b2SAlfred Perlstein *len1 = (startu - starte); 6515f07c7b2SAlfred Perlstein retval |= SPL_LOCK1; 6525f07c7b2SAlfred Perlstein } 6535f07c7b2SAlfred Perlstein 6545f07c7b2SAlfred Perlstein if (rflags == REDGE_INSIDE) { 6555f07c7b2SAlfred Perlstein /* Create right lock */ 6565f07c7b2SAlfred Perlstein *start2 = startu+lenu; 6575f07c7b2SAlfred Perlstein *len2 = starte+lene-(startu+lenu); 6585f07c7b2SAlfred Perlstein retval |= SPL_LOCK2; 6595f07c7b2SAlfred Perlstein } 6605f07c7b2SAlfred Perlstein 6615f07c7b2SAlfred Perlstein if ((lflags == LEDGE_LEFT || lflags == LEDGE_LBOUNDARY) && 6625f07c7b2SAlfred Perlstein (rflags == REDGE_RBOUNDARY || rflags == REDGE_RIGHT)) { 6635f07c7b2SAlfred Perlstein retval = SPL_CONTAINED; 6645f07c7b2SAlfred Perlstein } 6655f07c7b2SAlfred Perlstein } 6665f07c7b2SAlfred Perlstein return retval; 6675f07c7b2SAlfred Perlstein } 6685f07c7b2SAlfred Perlstein 6695f07c7b2SAlfred Perlstein /* 6704945c132SAlfred Perlstein * same_netobj: Compares the apprpriate bits of a netobj for identity 6714945c132SAlfred Perlstein */ 6724945c132SAlfred Perlstein int 6734945c132SAlfred Perlstein same_netobj(const netobj *n0, const netobj *n1) 6744945c132SAlfred Perlstein { 6754945c132SAlfred Perlstein int retval; 6764945c132SAlfred Perlstein 6774945c132SAlfred Perlstein retval = 0; 6784945c132SAlfred Perlstein 6794945c132SAlfred Perlstein debuglog("Entering netobj identity check\n"); 6804945c132SAlfred Perlstein 6814945c132SAlfred Perlstein if (n0->n_len == n1->n_len) { 6824945c132SAlfred Perlstein debuglog("Preliminary length check passed\n"); 683b6dc41baSAlfred Perlstein retval = !bcmp(n0->n_bytes, n1->n_bytes, n0->n_len); 684b6dc41baSAlfred Perlstein debuglog("netobj %smatch\n", retval ? "" : "mis"); 6854945c132SAlfred Perlstein } 6864945c132SAlfred Perlstein 687b6dc41baSAlfred Perlstein return (retval); 6884945c132SAlfred Perlstein } 6894945c132SAlfred Perlstein 6904945c132SAlfred Perlstein /* 6914945c132SAlfred Perlstein * same_filelock_identity: Compares the appropriate bits of a file_lock 6924945c132SAlfred Perlstein */ 6934945c132SAlfred Perlstein int 694b6dc41baSAlfred Perlstein same_filelock_identity(fl0, fl1) 695b6dc41baSAlfred Perlstein const struct file_lock *fl0, *fl1; 6964945c132SAlfred Perlstein { 6974945c132SAlfred Perlstein int retval; 6984945c132SAlfred Perlstein 6994945c132SAlfred Perlstein retval = 0; 7004945c132SAlfred Perlstein 7014945c132SAlfred Perlstein debuglog("Checking filelock identity\n"); 7024945c132SAlfred Perlstein 703b6dc41baSAlfred Perlstein /* 704b6dc41baSAlfred Perlstein * Check process ids and host information. 705b6dc41baSAlfred Perlstein */ 706b6dc41baSAlfred Perlstein retval = (fl0->client.svid == fl1->client.svid && 707b6dc41baSAlfred Perlstein same_netobj(&(fl0->client.oh), &(fl1->client.oh))); 7084945c132SAlfred Perlstein 7094945c132SAlfred Perlstein debuglog("Exiting checking filelock identity: retval: %d\n",retval); 7104945c132SAlfred Perlstein 711b6dc41baSAlfred Perlstein return (retval); 7124945c132SAlfred Perlstein } 7134945c132SAlfred Perlstein 7144945c132SAlfred Perlstein /* 7154945c132SAlfred Perlstein * Below here are routines associated with manipulating the NFS 7164945c132SAlfred Perlstein * lock list. 7174945c132SAlfred Perlstein */ 7184945c132SAlfred Perlstein 7194945c132SAlfred Perlstein /* 7204945c132SAlfred Perlstein * get_lock_matching_unlock: Return a lock which matches the given unlock lock 7214945c132SAlfred Perlstein * or NULL otehrwise 722b6dc41baSAlfred Perlstein * XXX: It is a shame that this duplicates so much code from test_nfslock. 7234945c132SAlfred Perlstein */ 7244945c132SAlfred Perlstein struct file_lock * 7254945c132SAlfred Perlstein get_lock_matching_unlock(const struct file_lock *fl) 7264945c132SAlfred Perlstein { 7274945c132SAlfred Perlstein struct file_lock *ifl; /* Iterator */ 7284945c132SAlfred Perlstein 729856f34f9SJun Kuriyama debuglog("Entering get_lock_matching_unlock\n"); 7304945c132SAlfred Perlstein debuglog("********Dump of fl*****************\n"); 7314945c132SAlfred Perlstein dump_filelock(fl); 7324945c132SAlfred Perlstein 733b6dc41baSAlfred Perlstein LIST_FOREACH(ifl, &nfslocklist_head, nfslocklist) { 7344945c132SAlfred Perlstein debuglog("Pointer to file lock: %p\n",ifl); 7354945c132SAlfred Perlstein 7364945c132SAlfred Perlstein debuglog("****Dump of ifl****\n"); 7374945c132SAlfred Perlstein dump_filelock(ifl); 7384945c132SAlfred Perlstein debuglog("*******************\n"); 7394945c132SAlfred Perlstein 7404945c132SAlfred Perlstein /* 7414945c132SAlfred Perlstein * XXX: It is conceivable that someone could use the NLM RPC 7424945c132SAlfred Perlstein * system to directly access filehandles. This may be a 7434945c132SAlfred Perlstein * security hazard as the filehandle code may bypass normal 7444945c132SAlfred Perlstein * file access controls 7454945c132SAlfred Perlstein */ 746b6dc41baSAlfred Perlstein if (bcmp(&fl->filehandle, &ifl->filehandle, sizeof(fhandle_t))) 747b6dc41baSAlfred Perlstein continue; 748b6dc41baSAlfred Perlstein 749856f34f9SJun Kuriyama debuglog("get_lock_matching_unlock: Filehandles match, " 750b6dc41baSAlfred Perlstein "checking regions\n"); 7514945c132SAlfred Perlstein 7524945c132SAlfred Perlstein /* Filehandles match, check for region overlap */ 753b6dc41baSAlfred Perlstein if (!regions_overlap(fl->client.l_offset, fl->client.l_len, 754b6dc41baSAlfred Perlstein ifl->client.l_offset, ifl->client.l_len)) 755b6dc41baSAlfred Perlstein continue; 756b6dc41baSAlfred Perlstein 757856f34f9SJun Kuriyama debuglog("get_lock_matching_unlock: Region overlap" 7584945c132SAlfred Perlstein " found %llu : %llu -- %llu : %llu\n", 7594945c132SAlfred Perlstein fl->client.l_offset,fl->client.l_len, 7604945c132SAlfred Perlstein ifl->client.l_offset,ifl->client.l_len); 7614945c132SAlfred Perlstein 7624945c132SAlfred Perlstein /* Regions overlap, check the identity */ 763b6dc41baSAlfred Perlstein if (!same_filelock_identity(fl,ifl)) 764b6dc41baSAlfred Perlstein continue; 765b6dc41baSAlfred Perlstein 766856f34f9SJun Kuriyama debuglog("get_lock_matching_unlock: Duplicate lock id. Granting\n"); 767b6dc41baSAlfred Perlstein return (ifl); 7684945c132SAlfred Perlstein } 7694945c132SAlfred Perlstein 770856f34f9SJun Kuriyama debuglog("Exiting bet_lock_matching_unlock\n"); 7714945c132SAlfred Perlstein 772b6dc41baSAlfred Perlstein return (NULL); 7734945c132SAlfred Perlstein } 7744945c132SAlfred Perlstein 7754945c132SAlfred Perlstein /* 7764945c132SAlfred Perlstein * test_nfslock: check for NFS lock in lock list 7774945c132SAlfred Perlstein * 7784945c132SAlfred Perlstein * This routine makes the following assumptions: 7794945c132SAlfred Perlstein * 1) Nothing will adjust the lock list during a lookup 7804945c132SAlfred Perlstein * 7814945c132SAlfred Perlstein * This routine has an intersting quirk which bit me hard. 7824945c132SAlfred Perlstein * The conflicting_fl is the pointer to the conflicting lock. 7834945c132SAlfred Perlstein * However, to modify the "*pointer* to the conflicting lock" rather 7844945c132SAlfred Perlstein * that the "conflicting lock itself" one must pass in a "pointer to 7854945c132SAlfred Perlstein * the pointer of the conflicting lock". Gross. 7864945c132SAlfred Perlstein */ 7874945c132SAlfred Perlstein 7884945c132SAlfred Perlstein enum nfslock_status 7894945c132SAlfred Perlstein test_nfslock(const struct file_lock *fl, struct file_lock **conflicting_fl) 7904945c132SAlfred Perlstein { 7914945c132SAlfred Perlstein struct file_lock *ifl; /* Iterator */ 7924945c132SAlfred Perlstein enum nfslock_status retval; 7934945c132SAlfred Perlstein 7947e589b0bSAlfred Perlstein debuglog("Entering test_nfslock\n"); 7954945c132SAlfred Perlstein 7964945c132SAlfred Perlstein retval = NFS_GRANTED; 7974945c132SAlfred Perlstein (*conflicting_fl) = NULL; 7984945c132SAlfred Perlstein 7994945c132SAlfred Perlstein debuglog("Entering lock search loop\n"); 8004945c132SAlfred Perlstein 8014945c132SAlfred Perlstein debuglog("***********************************\n"); 8024945c132SAlfred Perlstein debuglog("Dumping match filelock\n"); 8034945c132SAlfred Perlstein debuglog("***********************************\n"); 8044945c132SAlfred Perlstein dump_filelock(fl); 8054945c132SAlfred Perlstein debuglog("***********************************\n"); 8064945c132SAlfred Perlstein 807b6dc41baSAlfred Perlstein LIST_FOREACH(ifl, &nfslocklist_head, nfslocklist) { 808b6dc41baSAlfred Perlstein if (retval == NFS_DENIED) 809b6dc41baSAlfred Perlstein break; 810b6dc41baSAlfred Perlstein 8114945c132SAlfred Perlstein debuglog("Top of lock loop\n"); 8124945c132SAlfred Perlstein debuglog("Pointer to file lock: %p\n",ifl); 8134945c132SAlfred Perlstein 8144945c132SAlfred Perlstein debuglog("***********************************\n"); 8154945c132SAlfred Perlstein debuglog("Dumping test filelock\n"); 8164945c132SAlfred Perlstein debuglog("***********************************\n"); 8174945c132SAlfred Perlstein dump_filelock(ifl); 8184945c132SAlfred Perlstein debuglog("***********************************\n"); 8194945c132SAlfred Perlstein 8204945c132SAlfred Perlstein /* 8214945c132SAlfred Perlstein * XXX: It is conceivable that someone could use the NLM RPC 8224945c132SAlfred Perlstein * system to directly access filehandles. This may be a 8234945c132SAlfred Perlstein * security hazard as the filehandle code may bypass normal 8244945c132SAlfred Perlstein * file access controls 8254945c132SAlfred Perlstein */ 826b6dc41baSAlfred Perlstein if (bcmp(&fl->filehandle, &ifl->filehandle, sizeof(fhandle_t))) 827b6dc41baSAlfred Perlstein continue; 828b6dc41baSAlfred Perlstein 8294945c132SAlfred Perlstein debuglog("test_nfslock: filehandle match found\n"); 8304945c132SAlfred Perlstein 8314945c132SAlfred Perlstein /* Filehandles match, check for region overlap */ 832b6dc41baSAlfred Perlstein if (!regions_overlap(fl->client.l_offset, fl->client.l_len, 833b6dc41baSAlfred Perlstein ifl->client.l_offset, ifl->client.l_len)) 834b6dc41baSAlfred Perlstein continue; 835b6dc41baSAlfred Perlstein 8364945c132SAlfred Perlstein debuglog("test_nfslock: Region overlap found" 8374945c132SAlfred Perlstein " %llu : %llu -- %llu : %llu\n", 8384945c132SAlfred Perlstein fl->client.l_offset,fl->client.l_len, 8394945c132SAlfred Perlstein ifl->client.l_offset,ifl->client.l_len); 8404945c132SAlfred Perlstein 8414945c132SAlfred Perlstein /* Regions overlap, check the exclusivity */ 842b6dc41baSAlfred Perlstein if (!(fl->client.exclusive || ifl->client.exclusive)) 843b6dc41baSAlfred Perlstein continue; 844b6dc41baSAlfred Perlstein 845b6dc41baSAlfred Perlstein debuglog("test_nfslock: Exclusivity failure: %d %d\n", 8464945c132SAlfred Perlstein fl->client.exclusive, 8474945c132SAlfred Perlstein ifl->client.exclusive); 8484945c132SAlfred Perlstein 8494945c132SAlfred Perlstein if (same_filelock_identity(fl,ifl)) { 850b6dc41baSAlfred Perlstein debuglog("test_nfslock: Duplicate id. Granting\n"); 8514945c132SAlfred Perlstein (*conflicting_fl) = ifl; 8524945c132SAlfred Perlstein retval = NFS_GRANTED_DUPLICATE; 8534945c132SAlfred Perlstein } else { 8544945c132SAlfred Perlstein /* locking attempt fails */ 855b6dc41baSAlfred Perlstein debuglog("test_nfslock: Lock attempt failed\n"); 8564945c132SAlfred Perlstein debuglog("Desired lock\n"); 8574945c132SAlfred Perlstein dump_filelock(fl); 8584945c132SAlfred Perlstein debuglog("Conflicting lock\n"); 8594945c132SAlfred Perlstein dump_filelock(ifl); 8604945c132SAlfred Perlstein (*conflicting_fl) = ifl; 8614945c132SAlfred Perlstein retval = NFS_DENIED; 8624945c132SAlfred Perlstein } 8634945c132SAlfred Perlstein } 8644945c132SAlfred Perlstein 8654945c132SAlfred Perlstein debuglog("Dumping file locks\n"); 8664945c132SAlfred Perlstein debuglog("Exiting test_nfslock\n"); 8674945c132SAlfred Perlstein 868b6dc41baSAlfred Perlstein return (retval); 8694945c132SAlfred Perlstein } 8704945c132SAlfred Perlstein 8714945c132SAlfred Perlstein /* 8724945c132SAlfred Perlstein * lock_nfslock: attempt to create a lock in the NFS lock list 8734945c132SAlfred Perlstein * 8744945c132SAlfred Perlstein * This routine tests whether the lock will be granted and then adds 8754945c132SAlfred Perlstein * the entry to the lock list if so. 8764945c132SAlfred Perlstein * 8774945c132SAlfred Perlstein * Argument fl gets modified as its list housekeeping entries get modified 8784945c132SAlfred Perlstein * upon insertion into the NFS lock list 8794945c132SAlfred Perlstein * 8804945c132SAlfred Perlstein * This routine makes several assumptions: 8814945c132SAlfred Perlstein * 1) It is perfectly happy to grant a duplicate lock from the same pid. 8824945c132SAlfred Perlstein * While this seems to be intuitively wrong, it is required for proper 8834945c132SAlfred Perlstein * Posix semantics during unlock. It is absolutely imperative to not 8844945c132SAlfred Perlstein * unlock the main lock before the two child locks are established. Thus, 8854945c132SAlfred Perlstein * one has be be able to create duplicate locks over an existing lock 8864945c132SAlfred Perlstein * 2) It currently accepts duplicate locks from the same id,pid 8874945c132SAlfred Perlstein */ 8884945c132SAlfred Perlstein 8894945c132SAlfred Perlstein enum nfslock_status 8904945c132SAlfred Perlstein lock_nfslock(struct file_lock *fl) 8914945c132SAlfred Perlstein { 8924945c132SAlfred Perlstein enum nfslock_status retval; 8934945c132SAlfred Perlstein struct file_lock *dummy_fl; 8944945c132SAlfred Perlstein 8954945c132SAlfred Perlstein dummy_fl = NULL; 8964945c132SAlfred Perlstein 8974945c132SAlfred Perlstein debuglog("Entering lock_nfslock...\n"); 8984945c132SAlfred Perlstein 8994945c132SAlfred Perlstein retval = test_nfslock(fl,&dummy_fl); 9004945c132SAlfred Perlstein 9014945c132SAlfred Perlstein if (retval == NFS_GRANTED || retval == NFS_GRANTED_DUPLICATE) { 9024945c132SAlfred Perlstein debuglog("Inserting lock...\n"); 9034945c132SAlfred Perlstein dump_filelock(fl); 9044945c132SAlfred Perlstein LIST_INSERT_HEAD(&nfslocklist_head, fl, nfslocklist); 9054945c132SAlfred Perlstein } 9064945c132SAlfred Perlstein 9074945c132SAlfred Perlstein debuglog("Exiting lock_nfslock...\n"); 9084945c132SAlfred Perlstein 909b6dc41baSAlfred Perlstein return (retval); 9104945c132SAlfred Perlstein } 9114945c132SAlfred Perlstein 9124945c132SAlfred Perlstein /* 9134945c132SAlfred Perlstein * delete_nfslock: delete an NFS lock list entry 9144945c132SAlfred Perlstein * 9154945c132SAlfred Perlstein * This routine is used to delete a lock out of the NFS lock list 9164945c132SAlfred Perlstein * without regard to status, underlying locks, regions or anything else 9174945c132SAlfred Perlstein * 9187e589b0bSAlfred Perlstein * Note that this routine *does not deallocate memory* of the lock. 9197e589b0bSAlfred Perlstein * It just disconnects it from the list. The lock can then be used 9207e589b0bSAlfred Perlstein * by other routines without fear of trashing the list. 9214945c132SAlfred Perlstein */ 9224945c132SAlfred Perlstein 9234945c132SAlfred Perlstein enum nfslock_status 9247e589b0bSAlfred Perlstein delete_nfslock(struct file_lock *fl) 9254945c132SAlfred Perlstein { 926b6dc41baSAlfred Perlstein 9277e589b0bSAlfred Perlstein LIST_REMOVE(fl, nfslocklist); 9287e589b0bSAlfred Perlstein 929b6dc41baSAlfred Perlstein return (NFS_GRANTED); 9304945c132SAlfred Perlstein } 9314945c132SAlfred Perlstein 9324945c132SAlfred Perlstein enum split_status 9335f07c7b2SAlfred Perlstein split_nfslock(exist_lock, unlock_lock, left_lock, right_lock) 9345f07c7b2SAlfred Perlstein const struct file_lock *exist_lock, *unlock_lock; 9355f07c7b2SAlfred Perlstein struct file_lock **left_lock, **right_lock; 9364945c132SAlfred Perlstein { 9375f07c7b2SAlfred Perlstein u_int64_t start1, len1, start2, len2; 9385f07c7b2SAlfred Perlstein enum split_status spstatus; 939b6dc41baSAlfred Perlstein 9405f07c7b2SAlfred Perlstein spstatus = region_compare(exist_lock->client.l_offset, exist_lock->client.l_len, 9415f07c7b2SAlfred Perlstein unlock_lock->client.l_offset, unlock_lock->client.l_len, 9425f07c7b2SAlfred Perlstein &start1, &len1, &start2, &len2); 9435f07c7b2SAlfred Perlstein 9445f07c7b2SAlfred Perlstein if ((spstatus & SPL_LOCK1) != 0) { 9453d81d1adSMichael Reifenberger *left_lock = allocate_file_lock(&exist_lock->client.oh, &exist_lock->client_cookie, exist_lock->addr, exist_lock->client_name); 9465f07c7b2SAlfred Perlstein if (*left_lock == NULL) { 9475f07c7b2SAlfred Perlstein debuglog("Unable to allocate resource for split 1\n"); 9485f07c7b2SAlfred Perlstein return SPL_RESERR; 9495f07c7b2SAlfred Perlstein } 9505f07c7b2SAlfred Perlstein 951815ac496SAlfred Perlstein fill_file_lock(*left_lock, &exist_lock->filehandle, 9525f07c7b2SAlfred Perlstein exist_lock->client.exclusive, exist_lock->client.svid, 9535f07c7b2SAlfred Perlstein start1, len1, 9543d81d1adSMichael Reifenberger exist_lock->nsm_status, 9555f07c7b2SAlfred Perlstein exist_lock->status, exist_lock->flags, exist_lock->blocking); 9565f07c7b2SAlfred Perlstein } 9575f07c7b2SAlfred Perlstein 9585f07c7b2SAlfred Perlstein if ((spstatus & SPL_LOCK2) != 0) { 9593d81d1adSMichael Reifenberger *right_lock = allocate_file_lock(&exist_lock->client.oh, &exist_lock->client_cookie, exist_lock->addr, exist_lock->client_name); 9605f07c7b2SAlfred Perlstein if (*right_lock == NULL) { 9615f07c7b2SAlfred Perlstein debuglog("Unable to allocate resource for split 1\n"); 9625f07c7b2SAlfred Perlstein if (*left_lock != NULL) { 9635f07c7b2SAlfred Perlstein deallocate_file_lock(*left_lock); 9645f07c7b2SAlfred Perlstein } 9655f07c7b2SAlfred Perlstein return SPL_RESERR; 9665f07c7b2SAlfred Perlstein } 9675f07c7b2SAlfred Perlstein 968815ac496SAlfred Perlstein fill_file_lock(*right_lock, &exist_lock->filehandle, 9695f07c7b2SAlfred Perlstein exist_lock->client.exclusive, exist_lock->client.svid, 9705f07c7b2SAlfred Perlstein start2, len2, 9713d81d1adSMichael Reifenberger exist_lock->nsm_status, 9725f07c7b2SAlfred Perlstein exist_lock->status, exist_lock->flags, exist_lock->blocking); 9735f07c7b2SAlfred Perlstein } 9745f07c7b2SAlfred Perlstein 9755f07c7b2SAlfred Perlstein return spstatus; 9764945c132SAlfred Perlstein } 9774945c132SAlfred Perlstein 9784945c132SAlfred Perlstein enum nfslock_status 979b6dc41baSAlfred Perlstein unlock_nfslock(fl, released_lock, left_lock, right_lock) 980b6dc41baSAlfred Perlstein const struct file_lock *fl; 981b6dc41baSAlfred Perlstein struct file_lock **released_lock; 9825f07c7b2SAlfred Perlstein struct file_lock **left_lock; 9835f07c7b2SAlfred Perlstein struct file_lock **right_lock; 9844945c132SAlfred Perlstein { 9854945c132SAlfred Perlstein struct file_lock *mfl; /* Matching file lock */ 9864945c132SAlfred Perlstein enum nfslock_status retval; 9875f07c7b2SAlfred Perlstein enum split_status spstatus; 9884945c132SAlfred Perlstein 9894945c132SAlfred Perlstein debuglog("Entering unlock_nfslock\n"); 9904945c132SAlfred Perlstein 9917e589b0bSAlfred Perlstein *released_lock = NULL; 9925f07c7b2SAlfred Perlstein *left_lock = NULL; 9935f07c7b2SAlfred Perlstein *right_lock = NULL; 9947e589b0bSAlfred Perlstein 9954945c132SAlfred Perlstein retval = NFS_DENIED_NOLOCK; 9964945c132SAlfred Perlstein 9973d81d1adSMichael Reifenberger debuglog("Attempting to match lock...\n"); 9984945c132SAlfred Perlstein mfl = get_lock_matching_unlock(fl); 9994945c132SAlfred Perlstein 10007e589b0bSAlfred Perlstein if (mfl != NULL) { 10015f07c7b2SAlfred Perlstein debuglog("Unlock matched. Querying for split\n"); 10025f07c7b2SAlfred Perlstein 10035f07c7b2SAlfred Perlstein spstatus = split_nfslock(mfl, fl, left_lock, right_lock); 10045f07c7b2SAlfred Perlstein 10055f07c7b2SAlfred Perlstein debuglog("Split returned %d %p %p %p %p\n",spstatus,mfl,fl,*left_lock,*right_lock); 10065f07c7b2SAlfred Perlstein debuglog("********Split dumps********"); 10075f07c7b2SAlfred Perlstein dump_filelock(mfl); 10085f07c7b2SAlfred Perlstein dump_filelock(fl); 10095f07c7b2SAlfred Perlstein dump_filelock(*left_lock); 10105f07c7b2SAlfred Perlstein dump_filelock(*right_lock); 10115f07c7b2SAlfred Perlstein debuglog("********End Split dumps********"); 10125f07c7b2SAlfred Perlstein 10135f07c7b2SAlfred Perlstein if (spstatus == SPL_RESERR) { 10145f07c7b2SAlfred Perlstein if (*left_lock != NULL) { 10155f07c7b2SAlfred Perlstein deallocate_file_lock(*left_lock); 10165f07c7b2SAlfred Perlstein *left_lock = NULL; 10175f07c7b2SAlfred Perlstein } 10185f07c7b2SAlfred Perlstein 10195f07c7b2SAlfred Perlstein if (*right_lock != NULL) { 10205f07c7b2SAlfred Perlstein deallocate_file_lock(*right_lock); 10215f07c7b2SAlfred Perlstein *right_lock = NULL; 10225f07c7b2SAlfred Perlstein } 10235f07c7b2SAlfred Perlstein 10245f07c7b2SAlfred Perlstein return NFS_RESERR; 10255f07c7b2SAlfred Perlstein } 10265f07c7b2SAlfred Perlstein 10275f07c7b2SAlfred Perlstein /* Insert new locks from split if required */ 10285f07c7b2SAlfred Perlstein if (*left_lock != NULL) { 10295f07c7b2SAlfred Perlstein debuglog("Split left activated\n"); 10305f07c7b2SAlfred Perlstein LIST_INSERT_HEAD(&nfslocklist_head, *left_lock, nfslocklist); 10315f07c7b2SAlfred Perlstein } 10325f07c7b2SAlfred Perlstein 10335f07c7b2SAlfred Perlstein if (*right_lock != NULL) { 10345f07c7b2SAlfred Perlstein debuglog("Split right activated\n"); 10355f07c7b2SAlfred Perlstein LIST_INSERT_HEAD(&nfslocklist_head, *right_lock, nfslocklist); 10365f07c7b2SAlfred Perlstein } 10375f07c7b2SAlfred Perlstein 10387e589b0bSAlfred Perlstein /* Unlock the lock since it matches identity */ 10394945c132SAlfred Perlstein LIST_REMOVE(mfl, nfslocklist); 10407e589b0bSAlfred Perlstein *released_lock = mfl; 10414945c132SAlfred Perlstein retval = NFS_GRANTED; 10424945c132SAlfred Perlstein } 10434945c132SAlfred Perlstein 10444945c132SAlfred Perlstein debuglog("Exiting unlock_nfslock\n"); 10454945c132SAlfred Perlstein 10464945c132SAlfred Perlstein return retval; 10474945c132SAlfred Perlstein } 10484945c132SAlfred Perlstein 10497e589b0bSAlfred Perlstein /* 10507e589b0bSAlfred Perlstein * Below here are the routines for manipulating the file lock directly 10517e589b0bSAlfred Perlstein * on the disk hardware itself 10527e589b0bSAlfred Perlstein */ 10537e589b0bSAlfred Perlstein enum hwlock_status 10547e589b0bSAlfred Perlstein lock_hwlock(struct file_lock *fl) 10557e589b0bSAlfred Perlstein { 10567e589b0bSAlfred Perlstein struct monfile *imf,*nmf; 10577e589b0bSAlfred Perlstein int lflags, flerror; 10587e589b0bSAlfred Perlstein 10597e589b0bSAlfred Perlstein /* Scan to see if filehandle already present */ 10607e589b0bSAlfred Perlstein LIST_FOREACH(imf, &monfilelist_head, monfilelist) { 10617e589b0bSAlfred Perlstein if (bcmp(&fl->filehandle, &imf->filehandle, 10627e589b0bSAlfred Perlstein sizeof(fl->filehandle)) == 0) { 10637e589b0bSAlfred Perlstein /* imf is the correct filehandle */ 10647e589b0bSAlfred Perlstein break; 10657e589b0bSAlfred Perlstein } 10667e589b0bSAlfred Perlstein } 10677e589b0bSAlfred Perlstein 1068b6dc41baSAlfred Perlstein /* 1069b6dc41baSAlfred Perlstein * Filehandle already exists (we control the file) 1070b6dc41baSAlfred Perlstein * *AND* NFS has already cleared the lock for availability 1071b6dc41baSAlfred Perlstein * Grant it and bump the refcount. 1072b6dc41baSAlfred Perlstein */ 1073b6dc41baSAlfred Perlstein if (imf != NULL) { 1074b6dc41baSAlfred Perlstein ++(imf->refcount); 1075b6dc41baSAlfred Perlstein return (HW_GRANTED); 1076b6dc41baSAlfred Perlstein } 1077b6dc41baSAlfred Perlstein 10787e589b0bSAlfred Perlstein /* No filehandle found, create and go */ 10797e589b0bSAlfred Perlstein nmf = malloc(sizeof(struct monfile)); 10807e589b0bSAlfred Perlstein if (nmf == NULL) { 10817e589b0bSAlfred Perlstein debuglog("hwlock resource allocation failure\n"); 1082b6dc41baSAlfred Perlstein return (HW_RESERR); 10837e589b0bSAlfred Perlstein } 10847e589b0bSAlfred Perlstein 10857e589b0bSAlfred Perlstein /* XXX: Is O_RDWR always the correct mode? */ 10867e589b0bSAlfred Perlstein nmf->fd = fhopen(&fl->filehandle, O_RDWR); 10877e589b0bSAlfred Perlstein if (nmf->fd < 0) { 10887e589b0bSAlfred Perlstein debuglog("fhopen failed (from %16s): %32s\n", 10897e589b0bSAlfred Perlstein fl->client_name, strerror(errno)); 10907e589b0bSAlfred Perlstein free(nmf); 1091b6dc41baSAlfred Perlstein switch (errno) { 1092b6dc41baSAlfred Perlstein case ESTALE: 1093b6dc41baSAlfred Perlstein return (HW_STALEFH); 1094b6dc41baSAlfred Perlstein case EROFS: 1095b6dc41baSAlfred Perlstein return (HW_READONLY); 1096b6dc41baSAlfred Perlstein default: 1097b6dc41baSAlfred Perlstein return (HW_RESERR); 1098b6dc41baSAlfred Perlstein } 1099b6dc41baSAlfred Perlstein } 1100b6dc41baSAlfred Perlstein 11017e589b0bSAlfred Perlstein /* File opened correctly, fill the monitor struct */ 11027e589b0bSAlfred Perlstein bcopy(&fl->filehandle, &nmf->filehandle, sizeof(fl->filehandle)); 11037e589b0bSAlfred Perlstein nmf->refcount = 1; 11047e589b0bSAlfred Perlstein nmf->exclusive = fl->client.exclusive; 11057e589b0bSAlfred Perlstein 11067e589b0bSAlfred Perlstein lflags = (nmf->exclusive == 1) ? 11077e589b0bSAlfred Perlstein (LOCK_EX | LOCK_NB) : (LOCK_SH | LOCK_NB); 11087e589b0bSAlfred Perlstein 11097e589b0bSAlfred Perlstein flerror = flock(nmf->fd, lflags); 11107e589b0bSAlfred Perlstein 11117e589b0bSAlfred Perlstein if (flerror != 0) { 11127e589b0bSAlfred Perlstein debuglog("flock failed (from %16s): %32s\n", 11137e589b0bSAlfred Perlstein fl->client_name, strerror(errno)); 11147e589b0bSAlfred Perlstein close(nmf->fd); 11157e589b0bSAlfred Perlstein free(nmf); 1116b6dc41baSAlfred Perlstein switch (errno) { 1117b6dc41baSAlfred Perlstein case EAGAIN: 1118b6dc41baSAlfred Perlstein return (HW_DENIED); 1119b6dc41baSAlfred Perlstein case ESTALE: 1120b6dc41baSAlfred Perlstein return (HW_STALEFH); 1121b6dc41baSAlfred Perlstein case EROFS: 1122b6dc41baSAlfred Perlstein return (HW_READONLY); 1123b6dc41baSAlfred Perlstein default: 1124b6dc41baSAlfred Perlstein return (HW_RESERR); 1125b6dc41baSAlfred Perlstein break; 1126b6dc41baSAlfred Perlstein } 1127b6dc41baSAlfred Perlstein } 1128b6dc41baSAlfred Perlstein 11297e589b0bSAlfred Perlstein /* File opened and locked */ 11307e589b0bSAlfred Perlstein LIST_INSERT_HEAD(&monfilelist_head, nmf, monfilelist); 11317e589b0bSAlfred Perlstein 1132b6dc41baSAlfred Perlstein debuglog("flock succeeded (from %16s)\n", fl->client_name); 1133b6dc41baSAlfred Perlstein return (HW_GRANTED); 11347e589b0bSAlfred Perlstein } 11357e589b0bSAlfred Perlstein 11367e589b0bSAlfred Perlstein enum hwlock_status 11377e589b0bSAlfred Perlstein unlock_hwlock(const struct file_lock *fl) 11387e589b0bSAlfred Perlstein { 11397e589b0bSAlfred Perlstein struct monfile *imf; 11407e589b0bSAlfred Perlstein 11417e589b0bSAlfred Perlstein debuglog("Entering unlock_hwlock\n"); 11427e589b0bSAlfred Perlstein debuglog("Entering loop interation\n"); 11437e589b0bSAlfred Perlstein 11447e589b0bSAlfred Perlstein /* Scan to see if filehandle already present */ 11457e589b0bSAlfred Perlstein LIST_FOREACH(imf, &monfilelist_head, monfilelist) { 11467e589b0bSAlfred Perlstein if (bcmp(&fl->filehandle, &imf->filehandle, 11477e589b0bSAlfred Perlstein sizeof(fl->filehandle)) == 0) { 11487e589b0bSAlfred Perlstein /* imf is the correct filehandle */ 11497e589b0bSAlfred Perlstein break; 11507e589b0bSAlfred Perlstein } 11517e589b0bSAlfred Perlstein } 11527e589b0bSAlfred Perlstein 11537e589b0bSAlfred Perlstein debuglog("Completed iteration. Proceeding\n"); 11547e589b0bSAlfred Perlstein 11557e589b0bSAlfred Perlstein if (imf == NULL) { 11567e589b0bSAlfred Perlstein /* No lock found */ 1157b6dc41baSAlfred Perlstein debuglog("Exiting unlock_hwlock (HW_DENIED_NOLOCK)\n"); 1158b6dc41baSAlfred Perlstein return (HW_DENIED_NOLOCK); 1159b6dc41baSAlfred Perlstein } 1160b6dc41baSAlfred Perlstein 11617e589b0bSAlfred Perlstein /* Lock found */ 11627e589b0bSAlfred Perlstein --imf->refcount; 11637e589b0bSAlfred Perlstein 11647e589b0bSAlfred Perlstein if (imf->refcount < 0) { 11657e589b0bSAlfred Perlstein debuglog("Negative hardware reference count\n"); 11667e589b0bSAlfred Perlstein } 11677e589b0bSAlfred Perlstein 11687e589b0bSAlfred Perlstein if (imf->refcount <= 0) { 11697e589b0bSAlfred Perlstein close(imf->fd); 11707e589b0bSAlfred Perlstein LIST_REMOVE(imf, monfilelist); 11717e589b0bSAlfred Perlstein free(imf); 11727e589b0bSAlfred Perlstein } 1173b6dc41baSAlfred Perlstein debuglog("Exiting unlock_hwlock (HW_GRANTED)\n"); 1174b6dc41baSAlfred Perlstein return (HW_GRANTED); 11757e589b0bSAlfred Perlstein } 11767e589b0bSAlfred Perlstein 11777e589b0bSAlfred Perlstein enum hwlock_status 1178c4bc47baSAlfred Perlstein test_hwlock(fl, conflicting_fl) 1179c4bc47baSAlfred Perlstein const struct file_lock *fl __unused; 1180c4bc47baSAlfred Perlstein struct file_lock **conflicting_fl __unused; 11817e589b0bSAlfred Perlstein { 1182b6dc41baSAlfred Perlstein 11837e589b0bSAlfred Perlstein /* 11847e589b0bSAlfred Perlstein * XXX: lock tests on hardware are not required until 11857e589b0bSAlfred Perlstein * true partial file testing is done on the underlying file 11867e589b0bSAlfred Perlstein */ 1187b6dc41baSAlfred Perlstein return (HW_RESERR); 11887e589b0bSAlfred Perlstein } 11897e589b0bSAlfred Perlstein 11907e589b0bSAlfred Perlstein 11917e589b0bSAlfred Perlstein 11927e589b0bSAlfred Perlstein /* 11937e589b0bSAlfred Perlstein * Below here are routines for manipulating blocked lock requests 11947e589b0bSAlfred Perlstein * They should only be called from the XXX_partialfilelock routines 11957e589b0bSAlfred Perlstein * if at all possible 11967e589b0bSAlfred Perlstein */ 11977e589b0bSAlfred Perlstein 119896f8e17cSMatt Jacob int 119996f8e17cSMatt Jacob duplicate_block(struct file_lock *fl) 120096f8e17cSMatt Jacob { 120196f8e17cSMatt Jacob struct file_lock *ifl,*nfl; 120296f8e17cSMatt Jacob int retval = 0; 120396f8e17cSMatt Jacob 120496f8e17cSMatt Jacob debuglog("Entering duplicate_block"); 120596f8e17cSMatt Jacob 120696f8e17cSMatt Jacob /* 120796f8e17cSMatt Jacob * Is this lock request already on the blocking list? 1208fce89853SChristian Brueffer * Consider it a dupe if the file handles, offset, length, 120996f8e17cSMatt Jacob * exclusivity and client match. 121096f8e17cSMatt Jacob */ 121196f8e17cSMatt Jacob LIST_FOREACH(ifl, &blockedlocklist_head, nfslocklist) { 121296f8e17cSMatt Jacob if (!bcmp(&fl->filehandle, &ifl->filehandle, 121396f8e17cSMatt Jacob sizeof(fhandle_t)) && 121496f8e17cSMatt Jacob fl->client.exclusive == ifl->client.exclusive && 121596f8e17cSMatt Jacob fl->client.l_offset == ifl->client.l_offset && 121696f8e17cSMatt Jacob fl->client.l_len == ifl->client.l_len && 121796f8e17cSMatt Jacob same_filelock_identity(fl, ifl)) { 121896f8e17cSMatt Jacob retval = 1; 121996f8e17cSMatt Jacob break; 122096f8e17cSMatt Jacob } 122196f8e17cSMatt Jacob } 122296f8e17cSMatt Jacob 122396f8e17cSMatt Jacob debuglog("Exiting duplicate_block: %s\n", retval ? "already blocked" 122496f8e17cSMatt Jacob : "not already blocked"); 122596f8e17cSMatt Jacob return retval; 122696f8e17cSMatt Jacob } 122796f8e17cSMatt Jacob 12287e589b0bSAlfred Perlstein void 12297e589b0bSAlfred Perlstein add_blockingfilelock(struct file_lock *fl) 12307e589b0bSAlfred Perlstein { 12317e589b0bSAlfred Perlstein debuglog("Entering add_blockingfilelock\n"); 12327e589b0bSAlfred Perlstein 12337e589b0bSAlfred Perlstein /* 123496f8e17cSMatt Jacob * A blocking lock request _should_ never be duplicated as a client 123596f8e17cSMatt Jacob * that is already blocked shouldn't be able to request another 123696f8e17cSMatt Jacob * lock. Alas, there are some buggy clients that do request the same 123796f8e17cSMatt Jacob * lock repeatedly. Make sure only unique locks are on the blocked 123896f8e17cSMatt Jacob * lock list. 123996f8e17cSMatt Jacob */ 124096f8e17cSMatt Jacob if (duplicate_block(fl)) { 124196f8e17cSMatt Jacob debuglog("Exiting add_blockingfilelock: already blocked\n"); 124296f8e17cSMatt Jacob return; 124396f8e17cSMatt Jacob } 124496f8e17cSMatt Jacob 124596f8e17cSMatt Jacob /* 12467e589b0bSAlfred Perlstein * Clear the blocking flag so that it can be reused without 12477e589b0bSAlfred Perlstein * adding it to the blocking queue a second time 12487e589b0bSAlfred Perlstein */ 12497e589b0bSAlfred Perlstein 12507e589b0bSAlfred Perlstein fl->blocking = 0; 12517e589b0bSAlfred Perlstein LIST_INSERT_HEAD(&blockedlocklist_head, fl, nfslocklist); 12527e589b0bSAlfred Perlstein 125396f8e17cSMatt Jacob debuglog("Exiting add_blockingfilelock: added blocked lock\n"); 12547e589b0bSAlfred Perlstein } 12557e589b0bSAlfred Perlstein 12567e589b0bSAlfred Perlstein void 12577e589b0bSAlfred Perlstein remove_blockingfilelock(struct file_lock *fl) 12587e589b0bSAlfred Perlstein { 1259b6dc41baSAlfred Perlstein 12607e589b0bSAlfred Perlstein debuglog("Entering remove_blockingfilelock\n"); 12617e589b0bSAlfred Perlstein 12627e589b0bSAlfred Perlstein LIST_REMOVE(fl, nfslocklist); 12637e589b0bSAlfred Perlstein 12647e589b0bSAlfred Perlstein debuglog("Exiting remove_blockingfilelock\n"); 12657e589b0bSAlfred Perlstein } 12667e589b0bSAlfred Perlstein 12677e589b0bSAlfred Perlstein void 1268a4a8a04dSAlfred Perlstein clear_blockingfilelock(const char *hostname) 1269a4a8a04dSAlfred Perlstein { 1270a4a8a04dSAlfred Perlstein struct file_lock *ifl,*nfl; 1271a4a8a04dSAlfred Perlstein 1272a4a8a04dSAlfred Perlstein /* 1273a4a8a04dSAlfred Perlstein * Normally, LIST_FOREACH is called for, but since 1274a4a8a04dSAlfred Perlstein * the current element *is* the iterator, deleting it 1275a4a8a04dSAlfred Perlstein * would mess up the iteration. Thus, a next element 1276a4a8a04dSAlfred Perlstein * must be used explicitly 1277a4a8a04dSAlfred Perlstein */ 1278a4a8a04dSAlfred Perlstein 1279a4a8a04dSAlfred Perlstein ifl = LIST_FIRST(&blockedlocklist_head); 1280a4a8a04dSAlfred Perlstein 1281a4a8a04dSAlfred Perlstein while (ifl != NULL) { 1282a4a8a04dSAlfred Perlstein nfl = LIST_NEXT(ifl, nfslocklist); 1283a4a8a04dSAlfred Perlstein 1284a4a8a04dSAlfred Perlstein if (strncmp(hostname, ifl->client_name, SM_MAXSTRLEN) == 0) { 1285a4a8a04dSAlfred Perlstein remove_blockingfilelock(ifl); 1286a4a8a04dSAlfred Perlstein deallocate_file_lock(ifl); 1287a4a8a04dSAlfred Perlstein } 1288a4a8a04dSAlfred Perlstein 1289a4a8a04dSAlfred Perlstein ifl = nfl; 1290a4a8a04dSAlfred Perlstein } 1291a4a8a04dSAlfred Perlstein } 1292a4a8a04dSAlfred Perlstein 1293a4a8a04dSAlfred Perlstein void 12947e589b0bSAlfred Perlstein retry_blockingfilelocklist(void) 12957e589b0bSAlfred Perlstein { 12967e589b0bSAlfred Perlstein /* Retry all locks in the blocked list */ 12973d81d1adSMichael Reifenberger struct file_lock *ifl, *nfl; /* Iterator */ 12987e589b0bSAlfred Perlstein enum partialfilelock_status pflstatus; 12997e589b0bSAlfred Perlstein 13007e589b0bSAlfred Perlstein debuglog("Entering retry_blockingfilelocklist\n"); 13017e589b0bSAlfred Perlstein 13023d81d1adSMichael Reifenberger LIST_FOREACH_SAFE(ifl, &blockedlocklist_head, nfslocklist, nfl) { 13037e589b0bSAlfred Perlstein debuglog("Iterator choice %p\n",ifl); 13047e589b0bSAlfred Perlstein debuglog("Next iterator choice %p\n",nfl); 13057e589b0bSAlfred Perlstein 13067e589b0bSAlfred Perlstein /* 13077e589b0bSAlfred Perlstein * SUBTLE BUG: The file_lock must be removed from the 13087e589b0bSAlfred Perlstein * old list so that it's list pointers get disconnected 13097e589b0bSAlfred Perlstein * before being allowed to participate in the new list 13107e589b0bSAlfred Perlstein * which will automatically add it in if necessary. 13117e589b0bSAlfred Perlstein */ 13127e589b0bSAlfred Perlstein 13137e589b0bSAlfred Perlstein LIST_REMOVE(ifl, nfslocklist); 13147e589b0bSAlfred Perlstein pflstatus = lock_partialfilelock(ifl); 13157e589b0bSAlfred Perlstein 13167e589b0bSAlfred Perlstein if (pflstatus == PFL_GRANTED || pflstatus == PFL_GRANTED_DUPLICATE) { 13177e589b0bSAlfred Perlstein debuglog("Granted blocked lock\n"); 13187e589b0bSAlfred Perlstein /* lock granted and is now being used */ 13197e589b0bSAlfred Perlstein send_granted(ifl,0); 13207e589b0bSAlfred Perlstein } else { 13213d81d1adSMichael Reifenberger /* Reinsert lock back into blocked list */ 13227e589b0bSAlfred Perlstein debuglog("Replacing blocked lock\n"); 13234b4ec9b8SAlfred Perlstein LIST_INSERT_HEAD(&blockedlocklist_head, ifl, nfslocklist); 13247e589b0bSAlfred Perlstein } 13257e589b0bSAlfred Perlstein } 13267e589b0bSAlfred Perlstein 13277e589b0bSAlfred Perlstein debuglog("Exiting retry_blockingfilelocklist\n"); 13287e589b0bSAlfred Perlstein } 13294945c132SAlfred Perlstein 13304945c132SAlfred Perlstein /* 13314945c132SAlfred Perlstein * Below here are routines associated with manipulating all 13324945c132SAlfred Perlstein * aspects of the partial file locking system (list, hardware, etc.) 13334945c132SAlfred Perlstein */ 13344945c132SAlfred Perlstein 13354945c132SAlfred Perlstein /* 1336a4a8a04dSAlfred Perlstein * Please note that lock monitoring must be done at this level which 1337a4a8a04dSAlfred Perlstein * keeps track of *individual* lock requests on lock and unlock 1338a4a8a04dSAlfred Perlstein * 1339a4a8a04dSAlfred Perlstein * XXX: Split unlocking is going to make the unlock code miserable 1340a4a8a04dSAlfred Perlstein */ 1341a4a8a04dSAlfred Perlstein 1342a4a8a04dSAlfred Perlstein /* 13434945c132SAlfred Perlstein * lock_partialfilelock: 13444945c132SAlfred Perlstein * 13454945c132SAlfred Perlstein * Argument fl gets modified as its list housekeeping entries get modified 13464945c132SAlfred Perlstein * upon insertion into the NFS lock list 13474945c132SAlfred Perlstein * 13484945c132SAlfred Perlstein * This routine makes several assumptions: 1349a4a8a04dSAlfred Perlstein * 1) It (will) pass locks through to flock to lock the entire underlying file 1350a4a8a04dSAlfred Perlstein * and then parcel out NFS locks if it gets control of the file. 1351a4a8a04dSAlfred Perlstein * This matches the old rpc.lockd file semantics (except where it 1352a4a8a04dSAlfred Perlstein * is now more correct). It is the safe solution, but will cause 1353a4a8a04dSAlfred Perlstein * overly restrictive blocking if someone is trying to use the 1354a4a8a04dSAlfred Perlstein * underlying files without using NFS. This appears to be an 1355a4a8a04dSAlfred Perlstein * acceptable tradeoff since most people use standalone NFS servers. 1356a4a8a04dSAlfred Perlstein * XXX: The right solution is probably kevent combined with fcntl 13574945c132SAlfred Perlstein * 1358a4a8a04dSAlfred Perlstein * 2) Nothing modifies the lock lists between testing and granting 1359a4a8a04dSAlfred Perlstein * I have no idea whether this is a useful assumption or not 13604945c132SAlfred Perlstein */ 13614945c132SAlfred Perlstein 13624945c132SAlfred Perlstein enum partialfilelock_status 13634945c132SAlfred Perlstein lock_partialfilelock(struct file_lock *fl) 13644945c132SAlfred Perlstein { 13654945c132SAlfred Perlstein enum partialfilelock_status retval; 13664945c132SAlfred Perlstein enum nfslock_status lnlstatus; 13677e589b0bSAlfred Perlstein enum hwlock_status hwstatus; 13684945c132SAlfred Perlstein 13694945c132SAlfred Perlstein debuglog("Entering lock_partialfilelock\n"); 13704945c132SAlfred Perlstein 13714945c132SAlfred Perlstein retval = PFL_DENIED; 13724945c132SAlfred Perlstein 13734945c132SAlfred Perlstein /* 13744945c132SAlfred Perlstein * Execute the NFS lock first, if possible, as it is significantly 13754945c132SAlfred Perlstein * easier and less expensive to undo than the filesystem lock 13764945c132SAlfred Perlstein */ 13774945c132SAlfred Perlstein 13784945c132SAlfred Perlstein lnlstatus = lock_nfslock(fl); 13794945c132SAlfred Perlstein 13807e589b0bSAlfred Perlstein switch (lnlstatus) { 13817e589b0bSAlfred Perlstein case NFS_GRANTED: 13827e589b0bSAlfred Perlstein case NFS_GRANTED_DUPLICATE: 13837e589b0bSAlfred Perlstein /* 13847e589b0bSAlfred Perlstein * At this point, the NFS lock is allocated and active. 13857e589b0bSAlfred Perlstein * Remember to clean it up if the hardware lock fails 13867e589b0bSAlfred Perlstein */ 13877e589b0bSAlfred Perlstein hwstatus = lock_hwlock(fl); 13887e589b0bSAlfred Perlstein 13897e589b0bSAlfred Perlstein switch (hwstatus) { 13907e589b0bSAlfred Perlstein case HW_GRANTED: 13917e589b0bSAlfred Perlstein case HW_GRANTED_DUPLICATE: 13927e589b0bSAlfred Perlstein debuglog("HW GRANTED\n"); 13937e589b0bSAlfred Perlstein /* 13947e589b0bSAlfred Perlstein * XXX: Fixme: Check hwstatus for duplicate when 13957e589b0bSAlfred Perlstein * true partial file locking and accounting is 139684292608SMatt Jacob * done on the hardware. 13977e589b0bSAlfred Perlstein */ 13987e589b0bSAlfred Perlstein if (lnlstatus == NFS_GRANTED_DUPLICATE) { 13997e589b0bSAlfred Perlstein retval = PFL_GRANTED_DUPLICATE; 14004945c132SAlfred Perlstein } else { 14017e589b0bSAlfred Perlstein retval = PFL_GRANTED; 14024945c132SAlfred Perlstein } 1403a4a8a04dSAlfred Perlstein monitor_lock_host(fl->client_name); 14047e589b0bSAlfred Perlstein break; 14057e589b0bSAlfred Perlstein case HW_RESERR: 14067e589b0bSAlfred Perlstein debuglog("HW RESERR\n"); 14077e589b0bSAlfred Perlstein retval = PFL_HWRESERR; 14087e589b0bSAlfred Perlstein break; 14097e589b0bSAlfred Perlstein case HW_DENIED: 14107e589b0bSAlfred Perlstein debuglog("HW DENIED\n"); 14117e589b0bSAlfred Perlstein retval = PFL_HWDENIED; 14127e589b0bSAlfred Perlstein break; 14137e589b0bSAlfred Perlstein default: 14147e589b0bSAlfred Perlstein debuglog("Unmatched hwstatus %d\n",hwstatus); 14157e589b0bSAlfred Perlstein break; 14167e589b0bSAlfred Perlstein } 14177e589b0bSAlfred Perlstein 14187e589b0bSAlfred Perlstein if (retval != PFL_GRANTED && 14197e589b0bSAlfred Perlstein retval != PFL_GRANTED_DUPLICATE) { 14207e589b0bSAlfred Perlstein /* Clean up the NFS lock */ 14217e589b0bSAlfred Perlstein debuglog("Deleting trial NFS lock\n"); 14227e589b0bSAlfred Perlstein delete_nfslock(fl); 14237e589b0bSAlfred Perlstein } 14247e589b0bSAlfred Perlstein break; 14257e589b0bSAlfred Perlstein case NFS_DENIED: 14264945c132SAlfred Perlstein retval = PFL_NFSDENIED; 14277e589b0bSAlfred Perlstein break; 14287e589b0bSAlfred Perlstein case NFS_RESERR: 14297e589b0bSAlfred Perlstein retval = PFL_NFSRESERR; 14307e589b0bSAlfred Perlstein default: 14317e589b0bSAlfred Perlstein debuglog("Unmatched lnlstatus %d\n"); 14327e589b0bSAlfred Perlstein retval = PFL_NFSDENIED_NOLOCK; 14337e589b0bSAlfred Perlstein break; 14347e589b0bSAlfred Perlstein } 14357e589b0bSAlfred Perlstein 14367e589b0bSAlfred Perlstein /* 14377e589b0bSAlfred Perlstein * By the time fl reaches here, it is completely free again on 14387e589b0bSAlfred Perlstein * failure. The NFS lock done before attempting the 14397e589b0bSAlfred Perlstein * hardware lock has been backed out 14407e589b0bSAlfred Perlstein */ 14417e589b0bSAlfred Perlstein 14427e589b0bSAlfred Perlstein if (retval == PFL_NFSDENIED || retval == PFL_HWDENIED) { 14437e589b0bSAlfred Perlstein /* Once last chance to check the lock */ 14447e589b0bSAlfred Perlstein if (fl->blocking == 1) { 144586eb7cbaSRobert Watson if (retval == PFL_NFSDENIED) { 14467e589b0bSAlfred Perlstein /* Queue the lock */ 14477e589b0bSAlfred Perlstein debuglog("BLOCKING LOCK RECEIVED\n"); 144886eb7cbaSRobert Watson retval = PFL_NFSBLOCKED; 14497e589b0bSAlfred Perlstein add_blockingfilelock(fl); 14504945c132SAlfred Perlstein dump_filelock(fl); 14517e589b0bSAlfred Perlstein } else { 145286eb7cbaSRobert Watson /* retval is okay as PFL_HWDENIED */ 145386eb7cbaSRobert Watson debuglog("BLOCKING LOCK DENIED IN HARDWARE\n"); 145486eb7cbaSRobert Watson dump_filelock(fl); 145586eb7cbaSRobert Watson } 145686eb7cbaSRobert Watson } else { 14577e589b0bSAlfred Perlstein /* Leave retval alone, it's already correct */ 14587e589b0bSAlfred Perlstein debuglog("Lock denied. Non-blocking failure\n"); 14597e589b0bSAlfred Perlstein dump_filelock(fl); 14607e589b0bSAlfred Perlstein } 14614945c132SAlfred Perlstein } 14624945c132SAlfred Perlstein 14634945c132SAlfred Perlstein debuglog("Exiting lock_partialfilelock\n"); 14644945c132SAlfred Perlstein 14654945c132SAlfred Perlstein return retval; 14664945c132SAlfred Perlstein } 14674945c132SAlfred Perlstein 14684945c132SAlfred Perlstein /* 14694945c132SAlfred Perlstein * unlock_partialfilelock: 1470a4a8a04dSAlfred Perlstein * 1471a4a8a04dSAlfred Perlstein * Given a file_lock, unlock all locks which match. 1472a4a8a04dSAlfred Perlstein * 1473a4a8a04dSAlfred Perlstein * Note that a given lock might have to unlock ITSELF! See 1474a4a8a04dSAlfred Perlstein * clear_partialfilelock for example. 14754945c132SAlfred Perlstein */ 14764945c132SAlfred Perlstein 14774945c132SAlfred Perlstein enum partialfilelock_status 14784945c132SAlfred Perlstein unlock_partialfilelock(const struct file_lock *fl) 14794945c132SAlfred Perlstein { 1480a4a8a04dSAlfred Perlstein struct file_lock *lfl,*rfl,*releasedfl,*selffl; 14814945c132SAlfred Perlstein enum partialfilelock_status retval; 14827e589b0bSAlfred Perlstein enum nfslock_status unlstatus; 14835f07c7b2SAlfred Perlstein enum hwlock_status unlhwstatus, lhwstatus; 14844945c132SAlfred Perlstein 14854945c132SAlfred Perlstein debuglog("Entering unlock_partialfilelock\n"); 14864945c132SAlfred Perlstein 1487a4a8a04dSAlfred Perlstein selffl = NULL; 14885f07c7b2SAlfred Perlstein lfl = NULL; 14895f07c7b2SAlfred Perlstein rfl = NULL; 14907e589b0bSAlfred Perlstein releasedfl = NULL; 14914945c132SAlfred Perlstein retval = PFL_DENIED; 14924945c132SAlfred Perlstein 14937e589b0bSAlfred Perlstein /* 14945f07c7b2SAlfred Perlstein * There are significant overlap and atomicity issues 14955f07c7b2SAlfred Perlstein * with partially releasing a lock. For example, releasing 14965f07c7b2SAlfred Perlstein * part of an NFS shared lock does *not* always release the 14975f07c7b2SAlfred Perlstein * corresponding part of the file since there is only one 14985f07c7b2SAlfred Perlstein * rpc.lockd UID but multiple users could be requesting it 14995f07c7b2SAlfred Perlstein * from NFS. Also, an unlock request should never allow 15005f07c7b2SAlfred Perlstein * another process to gain a lock on the remaining parts. 15015f07c7b2SAlfred Perlstein * ie. Always apply the new locks before releasing the 15025f07c7b2SAlfred Perlstein * old one 15035f07c7b2SAlfred Perlstein */ 15045f07c7b2SAlfred Perlstein 15055f07c7b2SAlfred Perlstein /* 15067e589b0bSAlfred Perlstein * Loop is required since multiple little locks 15077e589b0bSAlfred Perlstein * can be allocated and then deallocated with one 15087e589b0bSAlfred Perlstein * big unlock. 15097e589b0bSAlfred Perlstein * 15107e589b0bSAlfred Perlstein * The loop is required to be here so that the nfs & 15117e589b0bSAlfred Perlstein * hw subsystems do not need to communicate with one 15127e589b0bSAlfred Perlstein * one another 15137e589b0bSAlfred Perlstein */ 15144945c132SAlfred Perlstein 15157e589b0bSAlfred Perlstein do { 15167e589b0bSAlfred Perlstein debuglog("Value of releasedfl: %p\n",releasedfl); 15175f07c7b2SAlfred Perlstein /* lfl&rfl are created *AND* placed into the NFS lock list if required */ 15185f07c7b2SAlfred Perlstein unlstatus = unlock_nfslock(fl, &releasedfl, &lfl, &rfl); 15197e589b0bSAlfred Perlstein debuglog("Value of releasedfl: %p\n",releasedfl); 15207e589b0bSAlfred Perlstein 15215f07c7b2SAlfred Perlstein 15225f07c7b2SAlfred Perlstein /* XXX: This is grungy. It should be refactored to be cleaner */ 15235f07c7b2SAlfred Perlstein if (lfl != NULL) { 15245f07c7b2SAlfred Perlstein lhwstatus = lock_hwlock(lfl); 15255f07c7b2SAlfred Perlstein if (lhwstatus != HW_GRANTED && 15265f07c7b2SAlfred Perlstein lhwstatus != HW_GRANTED_DUPLICATE) { 15275f07c7b2SAlfred Perlstein debuglog("HW duplicate lock failure for left split\n"); 15285f07c7b2SAlfred Perlstein } 15295f07c7b2SAlfred Perlstein monitor_lock_host(lfl->client_name); 15305f07c7b2SAlfred Perlstein } 15315f07c7b2SAlfred Perlstein 15325f07c7b2SAlfred Perlstein if (rfl != NULL) { 15335f07c7b2SAlfred Perlstein lhwstatus = lock_hwlock(rfl); 15345f07c7b2SAlfred Perlstein if (lhwstatus != HW_GRANTED && 15355f07c7b2SAlfred Perlstein lhwstatus != HW_GRANTED_DUPLICATE) { 15365f07c7b2SAlfred Perlstein debuglog("HW duplicate lock failure for right split\n"); 15375f07c7b2SAlfred Perlstein } 15385f07c7b2SAlfred Perlstein monitor_lock_host(rfl->client_name); 15395f07c7b2SAlfred Perlstein } 15405f07c7b2SAlfred Perlstein 15417e589b0bSAlfred Perlstein switch (unlstatus) { 15427e589b0bSAlfred Perlstein case NFS_GRANTED: 15437e589b0bSAlfred Perlstein /* Attempt to unlock on the hardware */ 15447e589b0bSAlfred Perlstein debuglog("NFS unlock granted. Attempting hardware unlock\n"); 15457e589b0bSAlfred Perlstein 15465f07c7b2SAlfred Perlstein /* This call *MUST NOT* unlock the two newly allocated locks */ 15477e589b0bSAlfred Perlstein unlhwstatus = unlock_hwlock(fl); 15487e589b0bSAlfred Perlstein debuglog("HW unlock returned with code %d\n",unlhwstatus); 15497e589b0bSAlfred Perlstein 15507e589b0bSAlfred Perlstein switch (unlhwstatus) { 15517e589b0bSAlfred Perlstein case HW_GRANTED: 15527e589b0bSAlfred Perlstein debuglog("HW unlock granted\n"); 1553a4a8a04dSAlfred Perlstein unmonitor_lock_host(releasedfl->client_name); 15544945c132SAlfred Perlstein retval = PFL_GRANTED; 15557e589b0bSAlfred Perlstein break; 15567e589b0bSAlfred Perlstein case HW_DENIED_NOLOCK: 15577e589b0bSAlfred Perlstein /* Huh?!?! This shouldn't happen */ 15587e589b0bSAlfred Perlstein debuglog("HW unlock denied no lock\n"); 15597e589b0bSAlfred Perlstein retval = PFL_HWRESERR; 15607e589b0bSAlfred Perlstein /* Break out of do-while */ 15617e589b0bSAlfred Perlstein unlstatus = NFS_RESERR; 15627e589b0bSAlfred Perlstein break; 15637e589b0bSAlfred Perlstein default: 15647e589b0bSAlfred Perlstein debuglog("HW unlock failed\n"); 15657e589b0bSAlfred Perlstein retval = PFL_HWRESERR; 15667e589b0bSAlfred Perlstein /* Break out of do-while */ 15677e589b0bSAlfred Perlstein unlstatus = NFS_RESERR; 15687e589b0bSAlfred Perlstein break; 15694945c132SAlfred Perlstein } 15704945c132SAlfred Perlstein 15717e589b0bSAlfred Perlstein debuglog("Exiting with status retval: %d\n",retval); 15727e589b0bSAlfred Perlstein 15737e589b0bSAlfred Perlstein retry_blockingfilelocklist(); 15747e589b0bSAlfred Perlstein break; 15757e589b0bSAlfred Perlstein case NFS_DENIED_NOLOCK: 15767e589b0bSAlfred Perlstein retval = PFL_GRANTED; 15777e589b0bSAlfred Perlstein debuglog("All locks cleaned out\n"); 15787e589b0bSAlfred Perlstein break; 15797e589b0bSAlfred Perlstein default: 15807e589b0bSAlfred Perlstein retval = PFL_NFSRESERR; 15817e589b0bSAlfred Perlstein debuglog("NFS unlock failure\n"); 15827e589b0bSAlfred Perlstein dump_filelock(fl); 15837e589b0bSAlfred Perlstein break; 15847e589b0bSAlfred Perlstein } 1585a4a8a04dSAlfred Perlstein 1586a4a8a04dSAlfred Perlstein if (releasedfl != NULL) { 1587a4a8a04dSAlfred Perlstein if (fl == releasedfl) { 1588a4a8a04dSAlfred Perlstein /* 1589a4a8a04dSAlfred Perlstein * XXX: YECHHH!!! Attempt to unlock self succeeded 1590a4a8a04dSAlfred Perlstein * but we can't deallocate the space yet. This is what 1591a4a8a04dSAlfred Perlstein * happens when you don't write malloc and free together 1592a4a8a04dSAlfred Perlstein */ 1593a4a8a04dSAlfred Perlstein debuglog("Attempt to unlock self\n"); 1594a4a8a04dSAlfred Perlstein selffl = releasedfl; 1595a4a8a04dSAlfred Perlstein } else { 15965f07c7b2SAlfred Perlstein /* 15975f07c7b2SAlfred Perlstein * XXX: this deallocation *still* needs to migrate closer 15985f07c7b2SAlfred Perlstein * to the allocation code way up in get_lock or the allocation 15995f07c7b2SAlfred Perlstein * code needs to migrate down (violation of "When you write 16005f07c7b2SAlfred Perlstein * malloc you must write free") 16015f07c7b2SAlfred Perlstein */ 16025f07c7b2SAlfred Perlstein 1603a4a8a04dSAlfred Perlstein deallocate_file_lock(releasedfl); 1604a4a8a04dSAlfred Perlstein } 1605a4a8a04dSAlfred Perlstein } 1606a4a8a04dSAlfred Perlstein 16077e589b0bSAlfred Perlstein } while (unlstatus == NFS_GRANTED); 16087e589b0bSAlfred Perlstein 1609a4a8a04dSAlfred Perlstein if (selffl != NULL) { 1610a4a8a04dSAlfred Perlstein /* 1611a4a8a04dSAlfred Perlstein * This statement wipes out the incoming file lock (fl) 1612a4a8a04dSAlfred Perlstein * in spite of the fact that it is declared const 1613a4a8a04dSAlfred Perlstein */ 1614a4a8a04dSAlfred Perlstein debuglog("WARNING! Destroying incoming lock pointer\n"); 1615a4a8a04dSAlfred Perlstein deallocate_file_lock(selffl); 1616a4a8a04dSAlfred Perlstein } 1617a4a8a04dSAlfred Perlstein 16184945c132SAlfred Perlstein debuglog("Exiting unlock_partialfilelock\n"); 16194945c132SAlfred Perlstein 16204945c132SAlfred Perlstein return retval; 16214945c132SAlfred Perlstein } 16224945c132SAlfred Perlstein 16234945c132SAlfred Perlstein /* 1624a4a8a04dSAlfred Perlstein * clear_partialfilelock 1625a4a8a04dSAlfred Perlstein * 1626a4a8a04dSAlfred Perlstein * Normally called in response to statd state number change. 1627a4a8a04dSAlfred Perlstein * Wipe out all locks held by a host. As a bonus, the act of 1628a4a8a04dSAlfred Perlstein * doing so should automatically clear their statd entries and 1629a4a8a04dSAlfred Perlstein * unmonitor the host. 1630a4a8a04dSAlfred Perlstein */ 1631a4a8a04dSAlfred Perlstein 1632a4a8a04dSAlfred Perlstein void 1633a4a8a04dSAlfred Perlstein clear_partialfilelock(const char *hostname) 1634a4a8a04dSAlfred Perlstein { 1635a4a8a04dSAlfred Perlstein struct file_lock *ifl, *nfl; 1636a4a8a04dSAlfred Perlstein 1637a4a8a04dSAlfred Perlstein /* Clear blocking file lock list */ 1638a4a8a04dSAlfred Perlstein clear_blockingfilelock(hostname); 1639a4a8a04dSAlfred Perlstein 1640a4a8a04dSAlfred Perlstein /* do all required unlocks */ 1641a4a8a04dSAlfred Perlstein /* Note that unlock can smash the current pointer to a lock */ 1642a4a8a04dSAlfred Perlstein 1643a4a8a04dSAlfred Perlstein /* 1644a4a8a04dSAlfred Perlstein * Normally, LIST_FOREACH is called for, but since 1645a4a8a04dSAlfred Perlstein * the current element *is* the iterator, deleting it 1646a4a8a04dSAlfred Perlstein * would mess up the iteration. Thus, a next element 1647a4a8a04dSAlfred Perlstein * must be used explicitly 1648a4a8a04dSAlfred Perlstein */ 1649a4a8a04dSAlfred Perlstein 1650a4a8a04dSAlfred Perlstein ifl = LIST_FIRST(&nfslocklist_head); 1651a4a8a04dSAlfred Perlstein 1652a4a8a04dSAlfred Perlstein while (ifl != NULL) { 1653a4a8a04dSAlfred Perlstein nfl = LIST_NEXT(ifl, nfslocklist); 1654a4a8a04dSAlfred Perlstein 1655a4a8a04dSAlfred Perlstein if (strncmp(hostname, ifl->client_name, SM_MAXSTRLEN) == 0) { 1656a4a8a04dSAlfred Perlstein /* Unlock destroys ifl out from underneath */ 1657a4a8a04dSAlfred Perlstein unlock_partialfilelock(ifl); 1658a4a8a04dSAlfred Perlstein /* ifl is NO LONGER VALID AT THIS POINT */ 1659a4a8a04dSAlfred Perlstein } 1660a4a8a04dSAlfred Perlstein ifl = nfl; 1661a4a8a04dSAlfred Perlstein } 1662a4a8a04dSAlfred Perlstein } 1663a4a8a04dSAlfred Perlstein 1664a4a8a04dSAlfred Perlstein /* 16654945c132SAlfred Perlstein * test_partialfilelock: 16664945c132SAlfred Perlstein */ 16674945c132SAlfred Perlstein enum partialfilelock_status 16684945c132SAlfred Perlstein test_partialfilelock(const struct file_lock *fl, 16694945c132SAlfred Perlstein struct file_lock **conflicting_fl) 16704945c132SAlfred Perlstein { 16714945c132SAlfred Perlstein enum partialfilelock_status retval; 16724945c132SAlfred Perlstein enum nfslock_status teststatus; 16734945c132SAlfred Perlstein 16744945c132SAlfred Perlstein debuglog("Entering testpartialfilelock...\n"); 16754945c132SAlfred Perlstein 16764945c132SAlfred Perlstein retval = PFL_DENIED; 16774945c132SAlfred Perlstein 16784945c132SAlfred Perlstein teststatus = test_nfslock(fl, conflicting_fl); 16794945c132SAlfred Perlstein debuglog("test_partialfilelock: teststatus %d\n",teststatus); 16804945c132SAlfred Perlstein 16814945c132SAlfred Perlstein if (teststatus == NFS_GRANTED || teststatus == NFS_GRANTED_DUPLICATE) { 16824945c132SAlfred Perlstein /* XXX: Add the underlying filesystem locking code */ 16834945c132SAlfred Perlstein retval = (teststatus == NFS_GRANTED) ? 16844945c132SAlfred Perlstein PFL_GRANTED : PFL_GRANTED_DUPLICATE; 16854945c132SAlfred Perlstein debuglog("Dumping locks...\n"); 16864945c132SAlfred Perlstein dump_filelock(fl); 16874945c132SAlfred Perlstein dump_filelock(*conflicting_fl); 16884945c132SAlfred Perlstein debuglog("Done dumping locks...\n"); 16894945c132SAlfred Perlstein } else { 16904945c132SAlfred Perlstein retval = PFL_NFSDENIED; 16914945c132SAlfred Perlstein debuglog("NFS test denied.\n"); 16924945c132SAlfred Perlstein dump_filelock(fl); 16934945c132SAlfred Perlstein debuglog("Conflicting.\n"); 16944945c132SAlfred Perlstein dump_filelock(*conflicting_fl); 16954945c132SAlfred Perlstein } 16964945c132SAlfred Perlstein 16974945c132SAlfred Perlstein debuglog("Exiting testpartialfilelock...\n"); 16984945c132SAlfred Perlstein 16994945c132SAlfred Perlstein return retval; 17004945c132SAlfred Perlstein } 17014945c132SAlfred Perlstein 17024945c132SAlfred Perlstein /* 17034945c132SAlfred Perlstein * Below here are routines associated with translating the partial file locking 17044945c132SAlfred Perlstein * codes into useful codes to send back to the NFS RPC messaging system 17054945c132SAlfred Perlstein */ 17064945c132SAlfred Perlstein 17077e589b0bSAlfred Perlstein /* 17087e589b0bSAlfred Perlstein * These routines translate the (relatively) useful return codes back onto 17097e589b0bSAlfred Perlstein * the few return codes which the nlm subsystems wishes to trasmit 17107e589b0bSAlfred Perlstein */ 17117e589b0bSAlfred Perlstein 17124945c132SAlfred Perlstein enum nlm_stats 17134945c132SAlfred Perlstein do_test(struct file_lock *fl, struct file_lock **conflicting_fl) 17144945c132SAlfred Perlstein { 17154945c132SAlfred Perlstein enum partialfilelock_status pfsret; 17164945c132SAlfred Perlstein enum nlm_stats retval; 17174945c132SAlfred Perlstein 17184945c132SAlfred Perlstein debuglog("Entering do_test...\n"); 17194945c132SAlfred Perlstein 17204945c132SAlfred Perlstein pfsret = test_partialfilelock(fl,conflicting_fl); 17214945c132SAlfred Perlstein 17227e589b0bSAlfred Perlstein switch (pfsret) { 17237e589b0bSAlfred Perlstein case PFL_GRANTED: 17247e589b0bSAlfred Perlstein debuglog("PFL test lock granted\n"); 17254945c132SAlfred Perlstein dump_filelock(fl); 17264945c132SAlfred Perlstein dump_filelock(*conflicting_fl); 17274945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_granted : nlm_granted; 17287e589b0bSAlfred Perlstein break; 17297e589b0bSAlfred Perlstein case PFL_GRANTED_DUPLICATE: 17307e589b0bSAlfred Perlstein debuglog("PFL test lock granted--duplicate id detected\n"); 17314945c132SAlfred Perlstein dump_filelock(fl); 17324945c132SAlfred Perlstein dump_filelock(*conflicting_fl); 17334945c132SAlfred Perlstein debuglog("Clearing conflicting_fl for call semantics\n"); 17344945c132SAlfred Perlstein *conflicting_fl = NULL; 17354945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_granted : nlm_granted; 17367e589b0bSAlfred Perlstein break; 17377e589b0bSAlfred Perlstein case PFL_NFSDENIED: 17387e589b0bSAlfred Perlstein case PFL_HWDENIED: 17397e589b0bSAlfred Perlstein debuglog("PFL test lock denied\n"); 17404945c132SAlfred Perlstein dump_filelock(fl); 17414945c132SAlfred Perlstein dump_filelock(*conflicting_fl); 17424945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_denied : nlm_denied; 17437e589b0bSAlfred Perlstein break; 17447e589b0bSAlfred Perlstein case PFL_NFSRESERR: 17457e589b0bSAlfred Perlstein case PFL_HWRESERR: 17467e589b0bSAlfred Perlstein debuglog("PFL test lock resource fail\n"); 17477e589b0bSAlfred Perlstein dump_filelock(fl); 17487e589b0bSAlfred Perlstein dump_filelock(*conflicting_fl); 17497e589b0bSAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_denied_nolocks : nlm_denied_nolocks; 17507e589b0bSAlfred Perlstein break; 17517e589b0bSAlfred Perlstein default: 17527e589b0bSAlfred Perlstein debuglog("PFL test lock *FAILED*\n"); 17534945c132SAlfred Perlstein dump_filelock(fl); 17544945c132SAlfred Perlstein dump_filelock(*conflicting_fl); 17554945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_failed : nlm_denied; 17567e589b0bSAlfred Perlstein break; 17574945c132SAlfred Perlstein } 17584945c132SAlfred Perlstein 17594945c132SAlfred Perlstein debuglog("Exiting do_test...\n"); 17604945c132SAlfred Perlstein 17614945c132SAlfred Perlstein return retval; 17624945c132SAlfred Perlstein } 17634945c132SAlfred Perlstein 17644945c132SAlfred Perlstein /* 17654945c132SAlfred Perlstein * do_lock: Try to acquire a lock 17664945c132SAlfred Perlstein * 17674945c132SAlfred Perlstein * This routine makes a distinction between NLM versions. I am pretty 17684945c132SAlfred Perlstein * convinced that this should be abstracted out and bounced up a level 17694945c132SAlfred Perlstein */ 17704945c132SAlfred Perlstein 17714945c132SAlfred Perlstein enum nlm_stats 17724945c132SAlfred Perlstein do_lock(struct file_lock *fl) 17734945c132SAlfred Perlstein { 17744945c132SAlfred Perlstein enum partialfilelock_status pfsret; 17754945c132SAlfred Perlstein enum nlm_stats retval; 17764945c132SAlfred Perlstein 17774945c132SAlfred Perlstein debuglog("Entering do_lock...\n"); 17784945c132SAlfred Perlstein 17794945c132SAlfred Perlstein pfsret = lock_partialfilelock(fl); 17804945c132SAlfred Perlstein 17817e589b0bSAlfred Perlstein switch (pfsret) { 17827e589b0bSAlfred Perlstein case PFL_GRANTED: 17834945c132SAlfred Perlstein debuglog("PFL lock granted"); 17844945c132SAlfred Perlstein dump_filelock(fl); 17854945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_granted : nlm_granted; 17867e589b0bSAlfred Perlstein break; 17877e589b0bSAlfred Perlstein case PFL_GRANTED_DUPLICATE: 17884945c132SAlfred Perlstein debuglog("PFL lock granted--duplicate id detected"); 17894945c132SAlfred Perlstein dump_filelock(fl); 17904945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_granted : nlm_granted; 17917e589b0bSAlfred Perlstein break; 17927e589b0bSAlfred Perlstein case PFL_NFSDENIED: 17937e589b0bSAlfred Perlstein case PFL_HWDENIED: 17944945c132SAlfred Perlstein debuglog("PFL_NFS lock denied"); 17954945c132SAlfred Perlstein dump_filelock(fl); 17964945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_denied : nlm_denied; 17977e589b0bSAlfred Perlstein break; 17987e589b0bSAlfred Perlstein case PFL_NFSBLOCKED: 17997e589b0bSAlfred Perlstein case PFL_HWBLOCKED: 18007e589b0bSAlfred Perlstein debuglog("PFL_NFS blocking lock denied. Queued.\n"); 18017e589b0bSAlfred Perlstein dump_filelock(fl); 18027e589b0bSAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_blocked : nlm_blocked; 18037e589b0bSAlfred Perlstein break; 18047e589b0bSAlfred Perlstein case PFL_NFSRESERR: 18057e589b0bSAlfred Perlstein case PFL_HWRESERR: 18067e589b0bSAlfred Perlstein debuglog("PFL lock resource alocation fail\n"); 18077e589b0bSAlfred Perlstein dump_filelock(fl); 18087e589b0bSAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_denied_nolocks : nlm_denied_nolocks; 18097e589b0bSAlfred Perlstein break; 18107e589b0bSAlfred Perlstein default: 18114945c132SAlfred Perlstein debuglog("PFL lock *FAILED*"); 18124945c132SAlfred Perlstein dump_filelock(fl); 18134945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_failed : nlm_denied; 18147e589b0bSAlfred Perlstein break; 18154945c132SAlfred Perlstein } 18164945c132SAlfred Perlstein 18174945c132SAlfred Perlstein debuglog("Exiting do_lock...\n"); 18184945c132SAlfred Perlstein 18194945c132SAlfred Perlstein return retval; 18204945c132SAlfred Perlstein } 18214945c132SAlfred Perlstein 18224945c132SAlfred Perlstein enum nlm_stats 18234945c132SAlfred Perlstein do_unlock(struct file_lock *fl) 18244945c132SAlfred Perlstein { 18254945c132SAlfred Perlstein enum partialfilelock_status pfsret; 18264945c132SAlfred Perlstein enum nlm_stats retval; 18274945c132SAlfred Perlstein 18284945c132SAlfred Perlstein debuglog("Entering do_unlock...\n"); 18294945c132SAlfred Perlstein pfsret = unlock_partialfilelock(fl); 18304945c132SAlfred Perlstein 18317e589b0bSAlfred Perlstein switch (pfsret) { 18327e589b0bSAlfred Perlstein case PFL_GRANTED: 18334945c132SAlfred Perlstein debuglog("PFL unlock granted"); 18344945c132SAlfred Perlstein dump_filelock(fl); 18354945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_granted : nlm_granted; 18367e589b0bSAlfred Perlstein break; 18377e589b0bSAlfred Perlstein case PFL_NFSDENIED: 18387e589b0bSAlfred Perlstein case PFL_HWDENIED: 18394945c132SAlfred Perlstein debuglog("PFL_NFS unlock denied"); 18404945c132SAlfred Perlstein dump_filelock(fl); 18414945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_denied : nlm_denied; 18427e589b0bSAlfred Perlstein break; 18437e589b0bSAlfred Perlstein case PFL_NFSDENIED_NOLOCK: 18447e589b0bSAlfred Perlstein case PFL_HWDENIED_NOLOCK: 18454945c132SAlfred Perlstein debuglog("PFL_NFS no lock found\n"); 18464945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_granted : nlm_granted; 18477e589b0bSAlfred Perlstein break; 18487e589b0bSAlfred Perlstein case PFL_NFSRESERR: 18497e589b0bSAlfred Perlstein case PFL_HWRESERR: 18507e589b0bSAlfred Perlstein debuglog("PFL unlock resource failure"); 18517e589b0bSAlfred Perlstein dump_filelock(fl); 18527e589b0bSAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_denied_nolocks : nlm_denied_nolocks; 18537e589b0bSAlfred Perlstein break; 18547e589b0bSAlfred Perlstein default: 18554945c132SAlfred Perlstein debuglog("PFL unlock *FAILED*"); 18564945c132SAlfred Perlstein dump_filelock(fl); 18574945c132SAlfred Perlstein retval = (fl->flags & LOCK_V4) ? nlm4_failed : nlm_denied; 18587e589b0bSAlfred Perlstein break; 18594945c132SAlfred Perlstein } 18604945c132SAlfred Perlstein 18614945c132SAlfred Perlstein debuglog("Exiting do_unlock...\n"); 18624945c132SAlfred Perlstein 18634945c132SAlfred Perlstein return retval; 18644945c132SAlfred Perlstein } 18654945c132SAlfred Perlstein 18664945c132SAlfred Perlstein /* 1867a4a8a04dSAlfred Perlstein * do_clear 1868a4a8a04dSAlfred Perlstein * 1869a4a8a04dSAlfred Perlstein * This routine is non-existent because it doesn't have a return code. 1870a4a8a04dSAlfred Perlstein * It is here for completeness in case someone *does* need to do return 1871a4a8a04dSAlfred Perlstein * codes later. A decent compiler should optimize this away. 1872a4a8a04dSAlfred Perlstein */ 1873a4a8a04dSAlfred Perlstein 1874a4a8a04dSAlfred Perlstein void 1875a4a8a04dSAlfred Perlstein do_clear(const char *hostname) 1876a4a8a04dSAlfred Perlstein { 1877b6dc41baSAlfred Perlstein 1878a4a8a04dSAlfred Perlstein clear_partialfilelock(hostname); 1879a4a8a04dSAlfred Perlstein } 1880a4a8a04dSAlfred Perlstein 1881a4a8a04dSAlfred Perlstein /* 18824945c132SAlfred Perlstein * The following routines are all called from the code which the 18834945c132SAlfred Perlstein * RPC layer invokes 18844945c132SAlfred Perlstein */ 18854945c132SAlfred Perlstein 18864945c132SAlfred Perlstein /* 18874945c132SAlfred Perlstein * testlock(): inform the caller if the requested lock would be granted 18884945c132SAlfred Perlstein * 18894945c132SAlfred Perlstein * returns NULL if lock would granted 18904945c132SAlfred Perlstein * returns pointer to a conflicting nlm4_holder if not 18914945c132SAlfred Perlstein */ 18924945c132SAlfred Perlstein 18934945c132SAlfred Perlstein struct nlm4_holder * 1894c4bc47baSAlfred Perlstein testlock(struct nlm4_lock *lock, bool_t exclusive, int flags __unused) 18954945c132SAlfred Perlstein { 18964945c132SAlfred Perlstein struct file_lock test_fl, *conflicting_fl; 18974945c132SAlfred Perlstein 18984945c132SAlfred Perlstein bzero(&test_fl, sizeof(test_fl)); 18994945c132SAlfred Perlstein 19004945c132SAlfred Perlstein bcopy(lock->fh.n_bytes, &(test_fl.filehandle), sizeof(fhandle_t)); 19014945c132SAlfred Perlstein copy_nlm4_lock_to_nlm4_holder(lock, exclusive, &test_fl.client); 19024945c132SAlfred Perlstein 19034945c132SAlfred Perlstein siglock(); 19044945c132SAlfred Perlstein do_test(&test_fl, &conflicting_fl); 19054945c132SAlfred Perlstein 19064945c132SAlfred Perlstein if (conflicting_fl == NULL) { 19074945c132SAlfred Perlstein debuglog("No conflicting lock found\n"); 19084945c132SAlfred Perlstein sigunlock(); 19094945c132SAlfred Perlstein return NULL; 19104945c132SAlfred Perlstein } else { 19114945c132SAlfred Perlstein debuglog("Found conflicting lock\n"); 19124945c132SAlfred Perlstein dump_filelock(conflicting_fl); 19134945c132SAlfred Perlstein sigunlock(); 19144945c132SAlfred Perlstein return (&conflicting_fl->client); 19154945c132SAlfred Perlstein } 19164945c132SAlfred Perlstein } 19174945c132SAlfred Perlstein 19184945c132SAlfred Perlstein /* 19194945c132SAlfred Perlstein * getlock: try to aquire the lock. 19204945c132SAlfred Perlstein * If file is already locked and we can sleep, put the lock in the list with 19214945c132SAlfred Perlstein * status LKST_WAITING; it'll be processed later. 19224945c132SAlfred Perlstein * Otherwise try to lock. If we're allowed to block, fork a child which 19234945c132SAlfred Perlstein * will do the blocking lock. 19244945c132SAlfred Perlstein */ 19255f07c7b2SAlfred Perlstein 19264945c132SAlfred Perlstein enum nlm_stats 19274945c132SAlfred Perlstein getlock(nlm4_lockargs *lckarg, struct svc_req *rqstp, const int flags) 19284945c132SAlfred Perlstein { 19294945c132SAlfred Perlstein struct file_lock *newfl; 19304945c132SAlfred Perlstein enum nlm_stats retval; 19314945c132SAlfred Perlstein 19324945c132SAlfred Perlstein debuglog("Entering getlock...\n"); 19334945c132SAlfred Perlstein 19344945c132SAlfred Perlstein if (grace_expired == 0 && lckarg->reclaim == 0) 19354945c132SAlfred Perlstein return (flags & LOCK_V4) ? 19364945c132SAlfred Perlstein nlm4_denied_grace_period : nlm_denied_grace_period; 19374945c132SAlfred Perlstein 19384945c132SAlfred Perlstein /* allocate new file_lock for this request */ 19393d81d1adSMichael Reifenberger newfl = allocate_file_lock(&lckarg->alock.oh, &lckarg->cookie, 19403d81d1adSMichael Reifenberger (struct sockaddr *)svc_getrpccaller(rqstp->rq_xprt)->buf, lckarg->alock.caller_name); 19414945c132SAlfred Perlstein if (newfl == NULL) { 19425f07c7b2SAlfred Perlstein syslog(LOG_NOTICE, "lock allocate failed: %s", strerror(errno)); 19434945c132SAlfred Perlstein /* failed */ 19444945c132SAlfred Perlstein return (flags & LOCK_V4) ? 19454945c132SAlfred Perlstein nlm4_denied_nolocks : nlm_denied_nolocks; 19464945c132SAlfred Perlstein } 19474945c132SAlfred Perlstein 19484945c132SAlfred Perlstein if (lckarg->alock.fh.n_len != sizeof(fhandle_t)) { 19494945c132SAlfred Perlstein debuglog("recieved fhandle size %d, local size %d", 19504945c132SAlfred Perlstein lckarg->alock.fh.n_len, (int)sizeof(fhandle_t)); 19514945c132SAlfred Perlstein } 19524945c132SAlfred Perlstein 19535f07c7b2SAlfred Perlstein fill_file_lock(newfl, (fhandle_t *)lckarg->alock.fh.n_bytes, 1954815ac496SAlfred Perlstein lckarg->exclusive, lckarg->alock.svid, lckarg->alock.l_offset, 1955815ac496SAlfred Perlstein lckarg->alock.l_len, 19563d81d1adSMichael Reifenberger lckarg->state, 0, flags, lckarg->block); 19574945c132SAlfred Perlstein 19584945c132SAlfred Perlstein /* 19594945c132SAlfred Perlstein * newfl is now fully constructed and deallocate_file_lock 19604945c132SAlfred Perlstein * can now be used to delete it 19614945c132SAlfred Perlstein */ 19624945c132SAlfred Perlstein 19634945c132SAlfred Perlstein siglock(); 19644945c132SAlfred Perlstein debuglog("Pointer to new lock is %p\n",newfl); 19657e589b0bSAlfred Perlstein 19664945c132SAlfred Perlstein retval = do_lock(newfl); 19677e589b0bSAlfred Perlstein 19684945c132SAlfred Perlstein debuglog("Pointer to new lock is %p\n",newfl); 19694945c132SAlfred Perlstein sigunlock(); 19704945c132SAlfred Perlstein 19714945c132SAlfred Perlstein switch (retval) 19724945c132SAlfred Perlstein { 19734945c132SAlfred Perlstein case nlm4_granted: 19744945c132SAlfred Perlstein /* case nlm_granted: is the same as nlm4_granted */ 19754945c132SAlfred Perlstein /* do_mon(lckarg->alock.caller_name); */ 19764945c132SAlfred Perlstein break; 19774945c132SAlfred Perlstein case nlm4_blocked: 19784945c132SAlfred Perlstein /* case nlm_blocked: is the same as nlm4_blocked */ 19794945c132SAlfred Perlstein /* do_mon(lckarg->alock.caller_name); */ 19804945c132SAlfred Perlstein break; 19814945c132SAlfred Perlstein default: 19824945c132SAlfred Perlstein deallocate_file_lock(newfl); 19834945c132SAlfred Perlstein break; 19844945c132SAlfred Perlstein } 19854945c132SAlfred Perlstein 19864945c132SAlfred Perlstein debuglog("Exiting getlock...\n"); 19874945c132SAlfred Perlstein 19887e589b0bSAlfred Perlstein return retval; 19894945c132SAlfred Perlstein } 19904945c132SAlfred Perlstein 19914945c132SAlfred Perlstein 19924945c132SAlfred Perlstein /* unlock a filehandle */ 19934945c132SAlfred Perlstein enum nlm_stats 1994c4bc47baSAlfred Perlstein unlock(nlm4_lock *lock, const int flags __unused) 19954945c132SAlfred Perlstein { 19964945c132SAlfred Perlstein struct file_lock fl; 19974945c132SAlfred Perlstein enum nlm_stats err; 19984945c132SAlfred Perlstein 19994945c132SAlfred Perlstein siglock(); 20004945c132SAlfred Perlstein 20014945c132SAlfred Perlstein debuglog("Entering unlock...\n"); 20024945c132SAlfred Perlstein 20034945c132SAlfred Perlstein bzero(&fl,sizeof(struct file_lock)); 20044945c132SAlfred Perlstein bcopy(lock->fh.n_bytes, &fl.filehandle, sizeof(fhandle_t)); 20054945c132SAlfred Perlstein 20064945c132SAlfred Perlstein copy_nlm4_lock_to_nlm4_holder(lock, 0, &fl.client); 20074945c132SAlfred Perlstein 20084945c132SAlfred Perlstein err = do_unlock(&fl); 20094945c132SAlfred Perlstein 20104945c132SAlfred Perlstein sigunlock(); 20114945c132SAlfred Perlstein 20124945c132SAlfred Perlstein debuglog("Exiting unlock...\n"); 20134945c132SAlfred Perlstein 20144945c132SAlfred Perlstein return err; 20154945c132SAlfred Perlstein } 20164945c132SAlfred Perlstein 20174945c132SAlfred Perlstein /* 20184945c132SAlfred Perlstein * XXX: The following monitor/unmonitor routines 2019a4a8a04dSAlfred Perlstein * have not been extensively tested (ie. no regression 2020a4a8a04dSAlfred Perlstein * script exists like for the locking sections 20214945c132SAlfred Perlstein */ 20224945c132SAlfred Perlstein 20234945c132SAlfred Perlstein /* 20244945c132SAlfred Perlstein * monitor_lock_host: monitor lock hosts locally with a ref count and 20254945c132SAlfred Perlstein * inform statd 20264945c132SAlfred Perlstein */ 20274945c132SAlfred Perlstein void 20284945c132SAlfred Perlstein monitor_lock_host(const char *hostname) 20294945c132SAlfred Perlstein { 20304945c132SAlfred Perlstein struct host *ihp, *nhp; 20314945c132SAlfred Perlstein struct mon smon; 20324945c132SAlfred Perlstein struct sm_stat_res sres; 20334945c132SAlfred Perlstein int rpcret, statflag; 20343d81d1adSMichael Reifenberger size_t n; 20354945c132SAlfred Perlstein 20364945c132SAlfred Perlstein rpcret = 0; 20374945c132SAlfred Perlstein statflag = 0; 20384945c132SAlfred Perlstein 2039b6dc41baSAlfred Perlstein LIST_FOREACH(ihp, &hostlst_head, hostlst) { 20404945c132SAlfred Perlstein if (strncmp(hostname, ihp->name, SM_MAXSTRLEN) == 0) { 20414945c132SAlfred Perlstein /* Host is already monitored, bump refcount */ 20424945c132SAlfred Perlstein ++ihp->refcnt; 20434945c132SAlfred Perlstein /* Host should only be in the monitor list once */ 2044b6dc41baSAlfred Perlstein return; 20454945c132SAlfred Perlstein } 20464945c132SAlfred Perlstein } 20474945c132SAlfred Perlstein 20484945c132SAlfred Perlstein /* Host is not yet monitored, add it */ 20493d81d1adSMichael Reifenberger n = strnlen(hostname, SM_MAXSTRLEN); 20503d81d1adSMichael Reifenberger if (n == SM_MAXSTRLEN) { 20513d81d1adSMichael Reifenberger return; 20523d81d1adSMichael Reifenberger } 20533d81d1adSMichael Reifenberger nhp = malloc(sizeof(*nhp) - sizeof(nhp->name) + n + 1); 20544945c132SAlfred Perlstein if (nhp == NULL) { 20554945c132SAlfred Perlstein debuglog("Unable to allocate entry for statd mon\n"); 2056a4a8a04dSAlfred Perlstein return; 2057b6dc41baSAlfred Perlstein } 2058b6dc41baSAlfred Perlstein 20594945c132SAlfred Perlstein /* Allocated new host entry, now fill the fields */ 20603d81d1adSMichael Reifenberger memcpy(nhp->name, hostname, n); 20613d81d1adSMichael Reifenberger nhp->name[n] = 0; 20624945c132SAlfred Perlstein nhp->refcnt = 1; 20634945c132SAlfred Perlstein debuglog("Locally Monitoring host %16s\n",hostname); 20647e589b0bSAlfred Perlstein 20654945c132SAlfred Perlstein debuglog("Attempting to tell statd\n"); 20667e589b0bSAlfred Perlstein 2067a4a8a04dSAlfred Perlstein bzero(&smon,sizeof(smon)); 20687e589b0bSAlfred Perlstein 20694945c132SAlfred Perlstein smon.mon_id.mon_name = nhp->name; 2070bc1f62deSThomas Quinot smon.mon_id.my_id.my_name = "localhost"; 20714945c132SAlfred Perlstein smon.mon_id.my_id.my_prog = NLM_PROG; 20724945c132SAlfred Perlstein smon.mon_id.my_id.my_vers = NLM_SM; 20734945c132SAlfred Perlstein smon.mon_id.my_id.my_proc = NLM_SM_NOTIFY; 20744945c132SAlfred Perlstein 207575e40e46SPeter Wemm rpcret = callrpc("localhost", SM_PROG, SM_VERS, SM_MON, 207675e40e46SPeter Wemm (xdrproc_t)xdr_mon, &smon, 207775e40e46SPeter Wemm (xdrproc_t)xdr_sm_stat_res, &sres); 20784945c132SAlfred Perlstein 2079a4a8a04dSAlfred Perlstein if (rpcret == 0) { 20804945c132SAlfred Perlstein if (sres.res_stat == stat_fail) { 20814945c132SAlfred Perlstein debuglog("Statd call failed\n"); 20824945c132SAlfred Perlstein statflag = 0; 20834945c132SAlfred Perlstein } else { 20844945c132SAlfred Perlstein statflag = 1; 20854945c132SAlfred Perlstein } 20864945c132SAlfred Perlstein } else { 2087b6dc41baSAlfred Perlstein debuglog("Rpc call to statd failed with return value: %d\n", 2088b6dc41baSAlfred Perlstein rpcret); 20894945c132SAlfred Perlstein statflag = 0; 20904945c132SAlfred Perlstein } 20914945c132SAlfred Perlstein 20924945c132SAlfred Perlstein if (statflag == 1) { 20934945c132SAlfred Perlstein LIST_INSERT_HEAD(&hostlst_head, nhp, hostlst); 20944945c132SAlfred Perlstein } else { 20954945c132SAlfred Perlstein free(nhp); 20964945c132SAlfred Perlstein } 2097b6dc41baSAlfred Perlstein 20987e589b0bSAlfred Perlstein } 20994945c132SAlfred Perlstein 21004945c132SAlfred Perlstein /* 21014945c132SAlfred Perlstein * unmonitor_lock_host: clear monitor ref counts and inform statd when gone 21024945c132SAlfred Perlstein */ 21034945c132SAlfred Perlstein void 210475e40e46SPeter Wemm unmonitor_lock_host(char *hostname) 21054945c132SAlfred Perlstein { 2106a4a8a04dSAlfred Perlstein struct host *ihp; 21074945c132SAlfred Perlstein struct mon_id smon_id; 21084945c132SAlfred Perlstein struct sm_stat smstat; 21094945c132SAlfred Perlstein int rpcret; 21104945c132SAlfred Perlstein 21114945c132SAlfred Perlstein rpcret = 0; 21124945c132SAlfred Perlstein 21137e589b0bSAlfred Perlstein for( ihp=LIST_FIRST(&hostlst_head); ihp != NULL; 21147e589b0bSAlfred Perlstein ihp=LIST_NEXT(ihp, hostlst)) { 21154945c132SAlfred Perlstein if (strncmp(hostname, ihp->name, SM_MAXSTRLEN) == 0) { 21164945c132SAlfred Perlstein /* Host is monitored, bump refcount */ 21174945c132SAlfred Perlstein --ihp->refcnt; 21184945c132SAlfred Perlstein /* Host should only be in the monitor list once */ 21194945c132SAlfred Perlstein break; 21204945c132SAlfred Perlstein } 21214945c132SAlfred Perlstein } 21224945c132SAlfred Perlstein 21234945c132SAlfred Perlstein if (ihp == NULL) { 21244945c132SAlfred Perlstein debuglog("Could not find host %16s in mon list\n", hostname); 2125b6dc41baSAlfred Perlstein return; 2126b6dc41baSAlfred Perlstein } 2127b6dc41baSAlfred Perlstein 2128b6dc41baSAlfred Perlstein if (ihp->refcnt > 0) 2129b6dc41baSAlfred Perlstein return; 2130b6dc41baSAlfred Perlstein 21317e589b0bSAlfred Perlstein if (ihp->refcnt < 0) { 21327e589b0bSAlfred Perlstein debuglog("Negative refcount!: %d\n", 21337e589b0bSAlfred Perlstein ihp->refcnt); 21344945c132SAlfred Perlstein } 21354945c132SAlfred Perlstein 2136b6dc41baSAlfred Perlstein debuglog("Attempting to unmonitor host %16s\n", hostname); 21374945c132SAlfred Perlstein 21384945c132SAlfred Perlstein bzero(&smon_id,sizeof(smon_id)); 21397e589b0bSAlfred Perlstein 21400d28a40aSAlfred Perlstein smon_id.mon_name = hostname; 21414945c132SAlfred Perlstein smon_id.my_id.my_name = "localhost"; 21424945c132SAlfred Perlstein smon_id.my_id.my_prog = NLM_PROG; 21434945c132SAlfred Perlstein smon_id.my_id.my_vers = NLM_SM; 21444945c132SAlfred Perlstein smon_id.my_id.my_proc = NLM_SM_NOTIFY; 21457e589b0bSAlfred Perlstein 214675e40e46SPeter Wemm rpcret = callrpc("localhost", SM_PROG, SM_VERS, SM_UNMON, 2147aba63820SAlfred Perlstein (xdrproc_t)xdr_mon_id, &smon_id, 2148aba63820SAlfred Perlstein (xdrproc_t)xdr_sm_stat, &smstat); 21497e589b0bSAlfred Perlstein 2150a4a8a04dSAlfred Perlstein if (rpcret != 0) { 2151b6dc41baSAlfred Perlstein debuglog("Rpc call to unmonitor statd failed with " 2152b6dc41baSAlfred Perlstein " return value: %d\n", rpcret); 21537e589b0bSAlfred Perlstein } 21547e589b0bSAlfred Perlstein 21554945c132SAlfred Perlstein LIST_REMOVE(ihp, hostlst); 21564945c132SAlfred Perlstein free(ihp); 21574945c132SAlfred Perlstein } 21584945c132SAlfred Perlstein 21594945c132SAlfred Perlstein /* 21604945c132SAlfred Perlstein * notify: Clear all locks from a host if statd complains 21614945c132SAlfred Perlstein * 2162a4a8a04dSAlfred Perlstein * XXX: This routine has not been thoroughly tested. However, neither 2163a4a8a04dSAlfred Perlstein * had the old one been. It used to compare the statd crash state counter 2164a4a8a04dSAlfred Perlstein * to the current lock state. The upshot of this was that it basically 2165a4a8a04dSAlfred Perlstein * cleared all locks from the specified host 99% of the time (with the 2166a4a8a04dSAlfred Perlstein * other 1% being a bug). Consequently, the assumption is that clearing 2167a4a8a04dSAlfred Perlstein * all locks from a host when notified by statd is acceptable. 21684945c132SAlfred Perlstein * 2169a4a8a04dSAlfred Perlstein * Please note that this routine skips the usual level of redirection 2170a4a8a04dSAlfred Perlstein * through a do_* type routine. This introduces a possible level of 2171a4a8a04dSAlfred Perlstein * error and might better be written as do_notify and take this one out. 2172a4a8a04dSAlfred Perlstein 21734945c132SAlfred Perlstein */ 21744945c132SAlfred Perlstein 21754945c132SAlfred Perlstein void 21764945c132SAlfred Perlstein notify(const char *hostname, const int state) 21774945c132SAlfred Perlstein { 21784945c132SAlfred Perlstein debuglog("notify from %s, new state %d", hostname, state); 21794945c132SAlfred Perlstein 21804945c132SAlfred Perlstein siglock(); 2181a4a8a04dSAlfred Perlstein do_clear(hostname); 21824945c132SAlfred Perlstein sigunlock(); 2183a4a8a04dSAlfred Perlstein 2184a4a8a04dSAlfred Perlstein debuglog("Leaving notify\n"); 21854945c132SAlfred Perlstein } 21864945c132SAlfred Perlstein 21874945c132SAlfred Perlstein void 21884945c132SAlfred Perlstein send_granted(fl, opcode) 21894945c132SAlfred Perlstein struct file_lock *fl; 2190c4bc47baSAlfred Perlstein int opcode __unused; 21914945c132SAlfred Perlstein { 21924945c132SAlfred Perlstein CLIENT *cli; 21934945c132SAlfred Perlstein static char dummy; 21944945c132SAlfred Perlstein struct timeval timeo; 21954945c132SAlfred Perlstein int success; 21964945c132SAlfred Perlstein static struct nlm_res retval; 21974945c132SAlfred Perlstein static struct nlm4_res retval4; 21984945c132SAlfred Perlstein 21997e589b0bSAlfred Perlstein debuglog("About to send granted on blocked lock\n"); 22007e589b0bSAlfred Perlstein 22014945c132SAlfred Perlstein cli = get_client(fl->addr, 22024945c132SAlfred Perlstein (fl->flags & LOCK_V4) ? NLM_VERS4 : NLM_VERS); 22034945c132SAlfred Perlstein if (cli == NULL) { 22044945c132SAlfred Perlstein syslog(LOG_NOTICE, "failed to get CLIENT for %s", 22054945c132SAlfred Perlstein fl->client_name); 22064945c132SAlfred Perlstein /* 22074945c132SAlfred Perlstein * We fail to notify remote that the lock has been granted. 22084945c132SAlfred Perlstein * The client will timeout and retry, the lock will be 22094945c132SAlfred Perlstein * granted at this time. 22104945c132SAlfred Perlstein */ 22114945c132SAlfred Perlstein return; 22124945c132SAlfred Perlstein } 22134945c132SAlfred Perlstein timeo.tv_sec = 0; 22144945c132SAlfred Perlstein timeo.tv_usec = (fl->flags & LOCK_ASYNC) ? 0 : 500000; /* 0.5s */ 22154945c132SAlfred Perlstein 22164945c132SAlfred Perlstein if (fl->flags & LOCK_V4) { 22174945c132SAlfred Perlstein static nlm4_testargs res; 22184945c132SAlfred Perlstein res.cookie = fl->client_cookie; 22194945c132SAlfred Perlstein res.exclusive = fl->client.exclusive; 22204945c132SAlfred Perlstein res.alock.caller_name = fl->client_name; 22214945c132SAlfred Perlstein res.alock.fh.n_len = sizeof(fhandle_t); 22224945c132SAlfred Perlstein res.alock.fh.n_bytes = (char*)&fl->filehandle; 22234945c132SAlfred Perlstein res.alock.oh = fl->client.oh; 22244945c132SAlfred Perlstein res.alock.svid = fl->client.svid; 22254945c132SAlfred Perlstein res.alock.l_offset = fl->client.l_offset; 22264945c132SAlfred Perlstein res.alock.l_len = fl->client.l_len; 22274945c132SAlfred Perlstein debuglog("sending v4 reply%s", 22284945c132SAlfred Perlstein (fl->flags & LOCK_ASYNC) ? " (async)":""); 22294945c132SAlfred Perlstein if (fl->flags & LOCK_ASYNC) { 22304945c132SAlfred Perlstein success = clnt_call(cli, NLM4_GRANTED_MSG, 223175e40e46SPeter Wemm (xdrproc_t)xdr_nlm4_testargs, &res, 223275e40e46SPeter Wemm (xdrproc_t)xdr_void, &dummy, timeo); 22334945c132SAlfred Perlstein } else { 22344945c132SAlfred Perlstein success = clnt_call(cli, NLM4_GRANTED, 223575e40e46SPeter Wemm (xdrproc_t)xdr_nlm4_testargs, &res, 223675e40e46SPeter Wemm (xdrproc_t)xdr_nlm4_res, &retval4, timeo); 22374945c132SAlfred Perlstein } 22384945c132SAlfred Perlstein } else { 22394945c132SAlfred Perlstein static nlm_testargs res; 22404945c132SAlfred Perlstein 22414945c132SAlfred Perlstein res.cookie = fl->client_cookie; 22424945c132SAlfred Perlstein res.exclusive = fl->client.exclusive; 22434945c132SAlfred Perlstein res.alock.caller_name = fl->client_name; 22444945c132SAlfred Perlstein res.alock.fh.n_len = sizeof(fhandle_t); 22454945c132SAlfred Perlstein res.alock.fh.n_bytes = (char*)&fl->filehandle; 22464945c132SAlfred Perlstein res.alock.oh = fl->client.oh; 22474945c132SAlfred Perlstein res.alock.svid = fl->client.svid; 22484945c132SAlfred Perlstein res.alock.l_offset = fl->client.l_offset; 22494945c132SAlfred Perlstein res.alock.l_len = fl->client.l_len; 22504945c132SAlfred Perlstein debuglog("sending v1 reply%s", 22514945c132SAlfred Perlstein (fl->flags & LOCK_ASYNC) ? " (async)":""); 22524945c132SAlfred Perlstein if (fl->flags & LOCK_ASYNC) { 22534945c132SAlfred Perlstein success = clnt_call(cli, NLM_GRANTED_MSG, 225475e40e46SPeter Wemm (xdrproc_t)xdr_nlm_testargs, &res, 225575e40e46SPeter Wemm (xdrproc_t)xdr_void, &dummy, timeo); 22564945c132SAlfred Perlstein } else { 22574945c132SAlfred Perlstein success = clnt_call(cli, NLM_GRANTED, 225875e40e46SPeter Wemm (xdrproc_t)xdr_nlm_testargs, &res, 225975e40e46SPeter Wemm (xdrproc_t)xdr_nlm_res, &retval, timeo); 22604945c132SAlfred Perlstein } 22614945c132SAlfred Perlstein } 22624945c132SAlfred Perlstein if (debug_level > 2) 22637e589b0bSAlfred Perlstein debuglog("clnt_call returns %d(%s) for granted", 22644945c132SAlfred Perlstein success, clnt_sperrno(success)); 22654945c132SAlfred Perlstein 22664945c132SAlfred Perlstein } 22674945c132SAlfred Perlstein 22684945c132SAlfred Perlstein /* 2269a4a8a04dSAlfred Perlstein * Routines below here have not been modified in the overhaul 2270a4a8a04dSAlfred Perlstein */ 2271a4a8a04dSAlfred Perlstein 2272a4a8a04dSAlfred Perlstein /* 22737e589b0bSAlfred Perlstein * Are these two routines still required since lockd is not spawning off 22747e589b0bSAlfred Perlstein * children to service locks anymore? Presumably they were originally 22757e589b0bSAlfred Perlstein * put in place to prevent a one child from changing the lock list out 22767e589b0bSAlfred Perlstein * from under another one. 22774945c132SAlfred Perlstein */ 22787e589b0bSAlfred Perlstein 22794945c132SAlfred Perlstein void 22804945c132SAlfred Perlstein siglock(void) 22814945c132SAlfred Perlstein { 22824945c132SAlfred Perlstein sigset_t block; 22834945c132SAlfred Perlstein 22844945c132SAlfred Perlstein sigemptyset(&block); 22854945c132SAlfred Perlstein sigaddset(&block, SIGCHLD); 22864945c132SAlfred Perlstein 22877e589b0bSAlfred Perlstein if (sigprocmask(SIG_BLOCK, &block, NULL) < 0) { 22884945c132SAlfred Perlstein syslog(LOG_WARNING, "siglock failed: %s", strerror(errno)); 22894945c132SAlfred Perlstein } 22904945c132SAlfred Perlstein } 22914945c132SAlfred Perlstein 22924945c132SAlfred Perlstein void 22934945c132SAlfred Perlstein sigunlock(void) 22944945c132SAlfred Perlstein { 22954945c132SAlfred Perlstein sigset_t block; 22964945c132SAlfred Perlstein 22974945c132SAlfred Perlstein sigemptyset(&block); 22984945c132SAlfred Perlstein sigaddset(&block, SIGCHLD); 22994945c132SAlfred Perlstein 23007e589b0bSAlfred Perlstein if (sigprocmask(SIG_UNBLOCK, &block, NULL) < 0) { 23014945c132SAlfred Perlstein syslog(LOG_WARNING, "sigunlock failed: %s", strerror(errno)); 23024945c132SAlfred Perlstein } 23034945c132SAlfred Perlstein } 2304