xref: /titanic_51/usr/src/uts/common/fs/smbsrv/smb_lock.c (revision 68c47f65208790c466e5e484f2293d3baed71c6a)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 /*
27  * This module provides range lock functionality for CIFS/SMB clients.
28  * Lock range service functions process SMB lock and and unlock
29  * requests for a file by applying lock rules and marks file range
30  * as locked if the lock is successful otherwise return proper
31  * error code.
32  */
33 
34 #include <smbsrv/smb_kproto.h>
35 #include <smbsrv/smb_fsops.h>
36 #include <sys/nbmlock.h>
37 #include <sys/param.h>
38 
39 extern caller_context_t smb_ct;
40 
41 static void smb_lock_posix_unlock(smb_node_t *, smb_lock_t *, cred_t *);
42 static boolean_t smb_is_range_unlocked(uint64_t, uint64_t, uint32_t,
43     smb_llist_t *, uint64_t *);
44 static int smb_lock_range_overlap(smb_lock_t *, uint64_t, uint64_t);
45 static uint32_t smb_lock_range_lckrules(smb_request_t *, smb_ofile_t *,
46     smb_node_t *, smb_lock_t *, smb_lock_t **);
47 static clock_t smb_lock_wait(smb_request_t *, smb_lock_t *, smb_lock_t *);
48 static uint32_t smb_lock_range_ulckrules(smb_request_t *, smb_node_t *,
49     uint64_t, uint64_t, smb_lock_t **nodelock);
50 static smb_lock_t *smb_lock_create(smb_request_t *, uint64_t, uint64_t,
51     uint32_t, uint32_t);
52 static void smb_lock_destroy(smb_lock_t *);
53 static void smb_lock_free(smb_lock_t *);
54 
55 /*
56  * Return the number of range locks on the specified node.
57  */
58 uint32_t
59 smb_lock_get_lock_count(smb_node_t *node)
60 {
61 	uint32_t	count;
62 
63 	SMB_NODE_VALID(node);
64 
65 	smb_llist_enter(&node->n_lock_list, RW_READER);
66 	count = smb_llist_get_count(&node->n_ofile_list);
67 	smb_llist_exit(&node->n_lock_list);
68 
69 	return (count);
70 }
71 
72 /*
73  * smb_unlock_range
74  *
75  * locates lock range performed for corresponding to unlock request.
76  *
77  * NT_STATUS_SUCCESS - Lock range performed successfully.
78  * !NT_STATUS_SUCCESS - Error in unlock range operation.
79  */
80 uint32_t
81 smb_unlock_range(
82     smb_request_t	*sr,
83     smb_node_t		*node,
84     uint64_t		start,
85     uint64_t		length)
86 {
87 	smb_lock_t	*lock = NULL;
88 	uint32_t	status;
89 
90 	/* Apply unlocking rules */
91 	smb_llist_enter(&node->n_lock_list, RW_WRITER);
92 	status = smb_lock_range_ulckrules(sr, node, start, length, &lock);
93 	if (status != NT_STATUS_SUCCESS) {
94 		/*
95 		 * If lock range is not matching in the list
96 		 * return error.
97 		 */
98 		ASSERT(lock == NULL);
99 		smb_llist_exit(&node->n_lock_list);
100 		return (status);
101 	}
102 
103 	smb_llist_remove(&node->n_lock_list, lock);
104 	smb_lock_posix_unlock(node, lock, sr->user_cr);
105 	smb_llist_exit(&node->n_lock_list);
106 	smb_lock_destroy(lock);
107 
108 	return (status);
109 }
110 
111 /*
112  * smb_lock_range
113  *
114  * checks for integrity of file lock operation for the given range of file data.
115  * This is performed by applying lock rules with all the elements of the node
116  * lock list.
117  *
118  * The function returns with new lock added if lock request is non-conflicting
119  * with existing range lock for the file. Otherwise smb request is filed
120  * without returning.
121  *
122  * NT_STATUS_SUCCESS - Lock range performed successfully.
123  * !NT_STATUS_SUCCESS - Error in lock range operation.
124  */
125 uint32_t
126 smb_lock_range(
127     smb_request_t	*sr,
128     uint64_t		start,
129     uint64_t		length,
130     uint32_t		timeout,
131     uint32_t		locktype)
132 {
133 	smb_ofile_t	*file = sr->fid_ofile;
134 	smb_node_t	*node = file->f_node;
135 	smb_lock_t	*lock;
136 	smb_lock_t	*clock = NULL;
137 	uint32_t	result = NT_STATUS_SUCCESS;
138 	boolean_t	lock_has_timeout = (timeout != 0);
139 
140 	lock = smb_lock_create(sr, start, length, locktype, timeout);
141 
142 	smb_llist_enter(&node->n_lock_list, RW_WRITER);
143 	for (;;) {
144 		clock_t	rc;
145 
146 		/* Apply locking rules */
147 		result = smb_lock_range_lckrules(sr, file, node, lock, &clock);
148 
149 		if ((result == NT_STATUS_CANCELLED) ||
150 		    (result == NT_STATUS_SUCCESS) ||
151 		    (result == NT_STATUS_RANGE_NOT_LOCKED)) {
152 			ASSERT(clock == NULL);
153 			break;
154 		} else if (timeout == 0) {
155 			break;
156 		}
157 
158 		ASSERT(result == NT_STATUS_LOCK_NOT_GRANTED);
159 		ASSERT(clock);
160 		/*
161 		 * Call smb_lock_wait holding write lock for
162 		 * node lock list.  smb_lock_wait will release
163 		 * this lock if it blocks.
164 		 */
165 		ASSERT(node == clock->l_file->f_node);
166 
167 		rc = smb_lock_wait(sr, lock, clock);
168 		if (rc == 0) {
169 			result = NT_STATUS_CANCELLED;
170 			break;
171 		}
172 		if (rc == -1)
173 			timeout = 0;
174 
175 		clock = NULL;
176 	}
177 
178 	lock->l_blocked_by = NULL;
179 
180 	if (result != NT_STATUS_SUCCESS) {
181 		/*
182 		 * Under certain conditions NT_STATUS_FILE_LOCK_CONFLICT
183 		 * should be returned instead of NT_STATUS_LOCK_NOT_GRANTED.
184 		 */
185 		if (result == NT_STATUS_LOCK_NOT_GRANTED) {
186 			/*
187 			 * Locks with timeouts always return
188 			 * NT_STATUS_FILE_LOCK_CONFLICT
189 			 */
190 			if (lock_has_timeout)
191 				result = NT_STATUS_FILE_LOCK_CONFLICT;
192 
193 			/*
194 			 * Locks starting higher than 0xef000000 that do not
195 			 * have the MSB set always return
196 			 * NT_STATUS_FILE_LOCK_CONFLICT
197 			 */
198 			if ((lock->l_start >= 0xef000000) &&
199 			    !(lock->l_start & (1ULL << 63))) {
200 				result = NT_STATUS_FILE_LOCK_CONFLICT;
201 			}
202 
203 			/*
204 			 * If the last lock attempt to fail on this file handle
205 			 * started at the same offset as this one then return
206 			 * NT_STATUS_FILE_LOCK_CONFLICT
207 			 */
208 			mutex_enter(&file->f_mutex);
209 			if ((file->f_flags & SMB_OFLAGS_LLF_POS_VALID) &&
210 			    (lock->l_start == file->f_llf_pos)) {
211 				result = NT_STATUS_FILE_LOCK_CONFLICT;
212 			}
213 			mutex_exit(&file->f_mutex);
214 		}
215 
216 		/* Update last lock failed offset */
217 		mutex_enter(&file->f_mutex);
218 		file->f_llf_pos = lock->l_start;
219 		file->f_flags |= SMB_OFLAGS_LLF_POS_VALID;
220 		mutex_exit(&file->f_mutex);
221 
222 		smb_lock_free(lock);
223 	} else {
224 		/*
225 		 * don't insert into the CIFS lock list unless the
226 		 * posix lock worked
227 		 */
228 		if (smb_fsop_frlock(node, lock, B_FALSE, sr->user_cr))
229 			result = NT_STATUS_FILE_LOCK_CONFLICT;
230 		else
231 			smb_llist_insert_tail(&node->n_lock_list, lock);
232 	}
233 	smb_llist_exit(&node->n_lock_list);
234 
235 	return (result);
236 }
237 
238 
239 /*
240  * smb_lock_range_access
241  *
242  * scans node lock list
243  * to check if there is any overlapping lock. Overlapping
244  * lock is allowed only under same session and client pid.
245  *
246  * Return values
247  *	NT_STATUS_SUCCESS		lock access granted.
248  *	NT_STATUS_FILE_LOCK_CONFLICT 	access denied due to lock conflict.
249  */
250 int
251 smb_lock_range_access(
252     smb_request_t	*sr,
253     smb_node_t		*node,
254     uint64_t		start,
255     uint64_t		length,
256     boolean_t		will_write)
257 {
258 	smb_lock_t	*lock;
259 	smb_llist_t	*llist;
260 	int		status = NT_STATUS_SUCCESS;
261 
262 	llist = &node->n_lock_list;
263 	smb_llist_enter(llist, RW_READER);
264 	/* Search for any applicable lock */
265 	for (lock = smb_llist_head(llist);
266 	    lock != NULL;
267 	    lock = smb_llist_next(llist, lock)) {
268 
269 		if (!smb_lock_range_overlap(lock, start, length))
270 			/* Lock does not overlap */
271 			continue;
272 
273 		if (lock->l_type == SMB_LOCK_TYPE_READONLY && !will_write)
274 			continue;
275 
276 		if (lock->l_type == SMB_LOCK_TYPE_READWRITE &&
277 		    lock->l_session_kid == sr->session->s_kid &&
278 		    lock->l_pid == sr->smb_pid)
279 			continue;
280 
281 		status = NT_STATUS_FILE_LOCK_CONFLICT;
282 		break;
283 	}
284 	smb_llist_exit(llist);
285 	return (status);
286 }
287 
288 void
289 smb_node_destroy_lock_by_ofile(smb_node_t *node, smb_ofile_t *file)
290 {
291 	smb_lock_t	*lock;
292 	smb_lock_t	*nxtl;
293 	list_t		destroy_list;
294 
295 	SMB_NODE_VALID(node);
296 	ASSERT(node->n_refcnt);
297 
298 	/*
299 	 * Move locks matching the specified file from the node->n_lock_list
300 	 * to a temporary list (holding the lock the entire time) then
301 	 * destroy all the matching locks.  We can't call smb_lock_destroy
302 	 * while we are holding the lock for node->n_lock_list because we will
303 	 * deadlock and we can't drop the lock because the list contents might
304 	 * change (for example nxtl might get removed on another thread).
305 	 */
306 	list_create(&destroy_list, sizeof (smb_lock_t),
307 	    offsetof(smb_lock_t, l_lnd));
308 
309 	smb_llist_enter(&node->n_lock_list, RW_WRITER);
310 	lock = smb_llist_head(&node->n_lock_list);
311 	while (lock) {
312 		nxtl = smb_llist_next(&node->n_lock_list, lock);
313 		if (lock->l_file == file) {
314 			smb_llist_remove(&node->n_lock_list, lock);
315 			smb_lock_posix_unlock(node, lock, file->f_user->u_cred);
316 			list_insert_tail(&destroy_list, lock);
317 		}
318 		lock = nxtl;
319 	}
320 	smb_llist_exit(&node->n_lock_list);
321 
322 	lock = list_head(&destroy_list);
323 	while (lock) {
324 		nxtl = list_next(&destroy_list, lock);
325 		list_remove(&destroy_list, lock);
326 		smb_lock_destroy(lock);
327 		lock = nxtl;
328 	}
329 
330 	list_destroy(&destroy_list);
331 }
332 
333 void
334 smb_lock_range_error(smb_request_t *sr, uint32_t status32)
335 {
336 	uint16_t errcode;
337 
338 	if (status32 == NT_STATUS_CANCELLED)
339 		errcode = ERROR_OPERATION_ABORTED;
340 	else
341 		errcode = ERRlock;
342 
343 	smbsr_error(sr, status32, ERRDOS, errcode);
344 }
345 
346 /*
347  * smb_range_check()
348  *
349  * Perform range checking.  First check for internal CIFS range conflicts
350  * and then check for external conflicts, for example, with NFS or local
351  * access.
352  *
353  * If nbmand is enabled, this function must be called from within an nbmand
354  * critical region
355  */
356 
357 DWORD
358 smb_range_check(smb_request_t *sr, smb_node_t *node, uint64_t start,
359     uint64_t length, boolean_t will_write)
360 {
361 	smb_error_t smberr;
362 	int svmand;
363 	int nbl_op;
364 	int rc;
365 
366 	SMB_NODE_VALID(node);
367 
368 	ASSERT(smb_node_in_crit(node));
369 
370 	if (smb_node_is_dir(node))
371 		return (NT_STATUS_SUCCESS);
372 
373 	rc = smb_lock_range_access(sr, node, start, length, will_write);
374 	if (rc)
375 		return (NT_STATUS_FILE_LOCK_CONFLICT);
376 
377 	if ((rc = nbl_svmand(node->vp, kcred, &svmand)) != 0) {
378 		smbsr_map_errno(rc, &smberr);
379 		return (smberr.status);
380 	}
381 
382 	nbl_op = (will_write) ? NBL_WRITE : NBL_READ;
383 
384 	if (nbl_lock_conflict(node->vp, nbl_op, start, length, svmand, &smb_ct))
385 		return (NT_STATUS_FILE_LOCK_CONFLICT);
386 
387 	return (NT_STATUS_SUCCESS);
388 }
389 
390 /*
391  * smb_lock_posix_unlock
392  *
393  * checks if the current unlock request is in another lock and repeatedly calls
394  * smb_is_range_unlocked on a sliding basis to unlock all bits of the lock
395  * that are not in other locks
396  *
397  */
398 static void
399 smb_lock_posix_unlock(smb_node_t *node, smb_lock_t *lock, cred_t *cr)
400 {
401 	uint64_t	new_mark;
402 	uint64_t	unlock_start;
403 	uint64_t	unlock_end;
404 	smb_lock_t	new_unlock;
405 	smb_llist_t	*llist;
406 	boolean_t	can_unlock;
407 
408 	new_mark = 0;
409 	unlock_start = lock->l_start;
410 	unlock_end = unlock_start + lock->l_length;
411 	llist = &node->n_lock_list;
412 
413 	for (;;) {
414 		can_unlock = smb_is_range_unlocked(unlock_start, unlock_end,
415 		    lock->l_file->f_uniqid, llist, &new_mark);
416 		if (can_unlock) {
417 			if (new_mark) {
418 				new_unlock = *lock;
419 				new_unlock.l_start = unlock_start;
420 				new_unlock.l_length = new_mark - unlock_start;
421 				(void) smb_fsop_frlock(node, &new_unlock,
422 				    B_TRUE, cr);
423 				unlock_start = new_mark;
424 			} else {
425 				new_unlock = *lock;
426 				new_unlock.l_start = unlock_start;
427 				new_unlock.l_length = unlock_end - unlock_start;
428 				(void) smb_fsop_frlock(node, &new_unlock,
429 				    B_TRUE, cr);
430 				break;
431 			}
432 		} else if (new_mark) {
433 			unlock_start = new_mark;
434 		} else {
435 			break;
436 		}
437 	}
438 }
439 
440 /*
441  * smb_lock_range_overlap
442  *
443  * Checks if lock range(start, length) overlaps range in lock structure.
444  *
445  * Zero-length byte range locks actually affect no single byte of the stream,
446  * meaning they can still be accessed even with such locks in place. However,
447  * they do conflict with other ranges in the following manner:
448  *  conflict will only exist if the positive-length range contains the
449  *  zero-length range's offset but doesn't start at it
450  *
451  * return values:
452  *	0 - Lock range doesn't overlap
453  *	1 - Lock range overlaps.
454  */
455 
456 #define	RANGE_NO_OVERLAP	0
457 #define	RANGE_OVERLAP		1
458 
459 static int
460 smb_lock_range_overlap(struct smb_lock *lock, uint64_t start, uint64_t length)
461 {
462 	if (length == 0) {
463 		if ((lock->l_start < start) &&
464 		    ((lock->l_start + lock->l_length) > start))
465 			return (RANGE_OVERLAP);
466 
467 		return (RANGE_NO_OVERLAP);
468 	}
469 
470 	/* The following test is intended to catch roll over locks. */
471 	if ((start == lock->l_start) && (length == lock->l_length))
472 		return (RANGE_OVERLAP);
473 
474 	if (start < lock->l_start) {
475 		if (start + length > lock->l_start)
476 			return (RANGE_OVERLAP);
477 	} else if (start < lock->l_start + lock->l_length)
478 		return (RANGE_OVERLAP);
479 
480 	return (RANGE_NO_OVERLAP);
481 }
482 
483 /*
484  * smb_lock_range_lckrules
485  *
486  * Lock range rules:
487  *	1. Overlapping read locks are allowed if the
488  *	   current locks in the region are only read locks
489  *	   irrespective of pid of smb client issuing lock request.
490  *
491  *	2. Read lock in the overlapped region of write lock
492  *	   are allowed if the pervious lock is performed by the
493  *	   same pid and connection.
494  *
495  * return status:
496  *	NT_STATUS_SUCCESS - Input lock range adapts to lock rules.
497  *	NT_STATUS_LOCK_NOT_GRANTED - Input lock conflicts lock rules.
498  *	NT_STATUS_CANCELLED - Error in processing lock rules
499  */
500 static uint32_t
501 smb_lock_range_lckrules(
502     smb_request_t	*sr,
503     smb_ofile_t		*file,
504     smb_node_t		*node,
505     smb_lock_t		*dlock,
506     smb_lock_t		**clockp)
507 {
508 	smb_lock_t	*lock;
509 	uint32_t	status = NT_STATUS_SUCCESS;
510 
511 	/* Check if file is closed */
512 	if (!smb_ofile_is_open(file)) {
513 		return (NT_STATUS_RANGE_NOT_LOCKED);
514 	}
515 
516 	/* Caller must hold lock for node->n_lock_list */
517 	for (lock = smb_llist_head(&node->n_lock_list);
518 	    lock != NULL;
519 	    lock = smb_llist_next(&node->n_lock_list, lock)) {
520 
521 		if (!smb_lock_range_overlap(lock, dlock->l_start,
522 		    dlock->l_length))
523 			continue;
524 
525 		/*
526 		 * Check to see if lock in the overlapping record
527 		 * is only read lock. Current finding is read
528 		 * locks can overlapped irrespective of pids.
529 		 */
530 		if ((lock->l_type == SMB_LOCK_TYPE_READONLY) &&
531 		    (dlock->l_type == SMB_LOCK_TYPE_READONLY)) {
532 			continue;
533 		}
534 
535 		/*
536 		 * When the read lock overlaps write lock, check if
537 		 * allowed.
538 		 */
539 		if ((dlock->l_type == SMB_LOCK_TYPE_READONLY) &&
540 		    !(lock->l_type == SMB_LOCK_TYPE_READONLY)) {
541 			if (lock->l_file == sr->fid_ofile &&
542 			    lock->l_session_kid == sr->session->s_kid &&
543 			    lock->l_pid == sr->smb_pid &&
544 			    lock->l_uid == sr->smb_uid) {
545 				continue;
546 			}
547 		}
548 
549 		/* Conflict in overlapping lock element */
550 		*clockp = lock;
551 		status = NT_STATUS_LOCK_NOT_GRANTED;
552 		break;
553 	}
554 
555 	return (status);
556 }
557 
558 /*
559  * smb_lock_wait
560  *
561  * Wait operation for smb overlapping lock to be released.  Caller must hold
562  * write lock for node->n_lock_list so that the set of active locks can't
563  * change unexpectedly.  The lock for node->n_lock_list  will be released
564  * within this function during the sleep after the lock dependency has
565  * been recorded.
566  *
567  * return value
568  *
569  *	0	The request was canceled.
570  *	-1	The timeout was reached.
571  *	>0	Condition met.
572  */
573 static clock_t
574 smb_lock_wait(smb_request_t *sr, smb_lock_t *b_lock, smb_lock_t *c_lock)
575 {
576 	clock_t		rc;
577 
578 	ASSERT(sr->sr_awaiting == NULL);
579 
580 	mutex_enter(&sr->sr_mutex);
581 
582 	switch (sr->sr_state) {
583 	case SMB_REQ_STATE_ACTIVE:
584 		/*
585 		 * Wait up till the timeout time keeping track of actual
586 		 * time waited for possible retry failure.
587 		 */
588 		sr->sr_state = SMB_REQ_STATE_WAITING_LOCK;
589 		sr->sr_awaiting = c_lock;
590 		mutex_exit(&sr->sr_mutex);
591 
592 		mutex_enter(&c_lock->l_mutex);
593 		/*
594 		 * The conflict list (l_conflict_list) for a lock contains
595 		 * all the locks that are blocked by and in conflict with
596 		 * that lock.  Add the new lock to the conflict list for the
597 		 * active lock.
598 		 *
599 		 * l_conflict_list is currently a fancy way of representing
600 		 * the references/dependencies on a lock.  It could be
601 		 * replaced with a reference count but this approach
602 		 * has the advantage that MDB can display the lock
603 		 * dependencies at any point in time.  In the future
604 		 * we should be able to leverage the list to implement
605 		 * an asynchronous locking model.
606 		 *
607 		 * l_blocked_by is the reverse of the conflict list.  It
608 		 * points to the lock that the new lock conflicts with.
609 		 * As currently implemented this value is purely for
610 		 * debug purposes -- there are windows of time when
611 		 * l_blocked_by may be non-NULL even though there is no
612 		 * conflict list
613 		 */
614 		b_lock->l_blocked_by = c_lock;
615 		smb_slist_insert_tail(&c_lock->l_conflict_list, b_lock);
616 		smb_llist_exit(&c_lock->l_file->f_node->n_lock_list);
617 
618 		if (SMB_LOCK_INDEFINITE_WAIT(b_lock)) {
619 			cv_wait(&c_lock->l_cv, &c_lock->l_mutex);
620 		} else {
621 			rc = cv_timedwait(&c_lock->l_cv,
622 			    &c_lock->l_mutex, b_lock->l_end_time);
623 		}
624 
625 		mutex_exit(&c_lock->l_mutex);
626 
627 		smb_llist_enter(&c_lock->l_file->f_node->n_lock_list,
628 		    RW_WRITER);
629 		smb_slist_remove(&c_lock->l_conflict_list, b_lock);
630 
631 		mutex_enter(&sr->sr_mutex);
632 		sr->sr_awaiting = NULL;
633 		if (sr->sr_state == SMB_REQ_STATE_CANCELED) {
634 			rc = 0;
635 		} else {
636 			sr->sr_state = SMB_REQ_STATE_ACTIVE;
637 		}
638 		break;
639 
640 	default:
641 		ASSERT(sr->sr_state == SMB_REQ_STATE_CANCELED);
642 		rc = 0;
643 		break;
644 	}
645 	mutex_exit(&sr->sr_mutex);
646 
647 	return (rc);
648 }
649 
650 /*
651  * smb_lock_range_ulckrules
652  *
653  *	1. Unlock should be performed at exactly matching ends.
654  *	   This has been changed because overlapping ends is
655  *	   allowed and there is no other precise way of locating
656  *	   lock entity in node lock list.
657  *
658  *	2. Unlock is failed if there is no corresponding lock exists.
659  *
660  * Return values
661  *
662  *	NT_STATUS_SUCCESS		Unlock request matches lock record
663  *					pointed by 'nodelock' lock structure.
664  *
665  *	NT_STATUS_RANGE_NOT_LOCKED	Unlock request doen't match any
666  *					of lock record in node lock request or
667  *					error in unlock range processing.
668  */
669 static uint32_t
670 smb_lock_range_ulckrules(
671     smb_request_t	*sr,
672     smb_node_t		*node,
673     uint64_t		start,
674     uint64_t		length,
675     smb_lock_t		**nodelock)
676 {
677 	smb_lock_t	*lock;
678 	uint32_t	status = NT_STATUS_RANGE_NOT_LOCKED;
679 
680 	/* Caller must hold lock for node->n_lock_list */
681 	for (lock = smb_llist_head(&node->n_lock_list);
682 	    lock != NULL;
683 	    lock = smb_llist_next(&node->n_lock_list, lock)) {
684 
685 		if ((start == lock->l_start) &&
686 		    (length == lock->l_length) &&
687 		    lock->l_file == sr->fid_ofile &&
688 		    lock->l_session_kid == sr->session->s_kid &&
689 		    lock->l_pid == sr->smb_pid &&
690 		    lock->l_uid == sr->smb_uid) {
691 			*nodelock = lock;
692 			status = NT_STATUS_SUCCESS;
693 			break;
694 		}
695 	}
696 
697 	return (status);
698 }
699 
700 static smb_lock_t *
701 smb_lock_create(
702     smb_request_t *sr,
703     uint64_t start,
704     uint64_t length,
705     uint32_t locktype,
706     uint32_t timeout)
707 {
708 	smb_lock_t *lock;
709 
710 	ASSERT(locktype == SMB_LOCK_TYPE_READWRITE ||
711 	    locktype == SMB_LOCK_TYPE_READONLY);
712 
713 	lock = kmem_zalloc(sizeof (smb_lock_t), KM_SLEEP);
714 	lock->l_magic = SMB_LOCK_MAGIC;
715 	lock->l_sr = sr; /* Invalid after lock is active */
716 	lock->l_session_kid = sr->session->s_kid;
717 	lock->l_session = sr->session;
718 	lock->l_file = sr->fid_ofile;
719 	lock->l_uid = sr->smb_uid;
720 	lock->l_pid = sr->smb_pid;
721 	lock->l_type = locktype;
722 	lock->l_start = start;
723 	lock->l_length = length;
724 	/*
725 	 * Calculate the absolute end time so that we can use it
726 	 * in cv_timedwait.
727 	 */
728 	lock->l_end_time = ddi_get_lbolt() + MSEC_TO_TICK(timeout);
729 	if (timeout == UINT_MAX)
730 		lock->l_flags |= SMB_LOCK_FLAG_INDEFINITE;
731 
732 	mutex_init(&lock->l_mutex, NULL, MUTEX_DEFAULT, NULL);
733 	cv_init(&lock->l_cv, NULL, CV_DEFAULT, NULL);
734 	smb_slist_constructor(&lock->l_conflict_list, sizeof (smb_lock_t),
735 	    offsetof(smb_lock_t, l_conflict_lnd));
736 
737 	return (lock);
738 }
739 
740 static void
741 smb_lock_free(smb_lock_t *lock)
742 {
743 	smb_slist_destructor(&lock->l_conflict_list);
744 	cv_destroy(&lock->l_cv);
745 	mutex_destroy(&lock->l_mutex);
746 
747 	kmem_free(lock, sizeof (smb_lock_t));
748 }
749 
750 /*
751  * smb_lock_destroy
752  *
753  * Caller must hold node->n_lock_list
754  */
755 static void
756 smb_lock_destroy(smb_lock_t *lock)
757 {
758 	/*
759 	 * Caller must hold node->n_lock_list lock.
760 	 */
761 	mutex_enter(&lock->l_mutex);
762 	cv_broadcast(&lock->l_cv);
763 	mutex_exit(&lock->l_mutex);
764 
765 	/*
766 	 * The cv_broadcast above should wake up any locks that previous
767 	 * had conflicts with this lock.  Wait for the locking threads
768 	 * to remove their references to this lock.
769 	 */
770 	smb_slist_wait_for_empty(&lock->l_conflict_list);
771 
772 	smb_lock_free(lock);
773 }
774 
775 /*
776  * smb_is_range_unlocked
777  *
778  * Checks if the current unlock byte range request overlaps another lock
779  * This function is used to determine where POSIX unlocks should be
780  * applied.
781  *
782  * The return code and the value of new_mark must be interpreted as
783  * follows:
784  *
785  * B_TRUE and (new_mark == 0):
786  *   This is the last or only lock left to be unlocked
787  *
788  * B_TRUE and (new_mark > 0):
789  *   The range from start to new_mark can be unlocked
790  *
791  * B_FALSE and (new_mark == 0):
792  *   The unlock can't be performed and we are done
793  *
794  * B_FALSE and (new_mark > 0),
795  *   The range from start to new_mark can't be unlocked
796  *   Start should be reset to new_mark for the next pass
797  */
798 
799 static boolean_t
800 smb_is_range_unlocked(uint64_t start, uint64_t end, uint32_t uniqid,
801     smb_llist_t *llist_head, uint64_t *new_mark)
802 {
803 	struct smb_lock *lk = NULL;
804 	uint64_t low_water_mark = MAXOFFSET_T;
805 	uint64_t lk_start;
806 	uint64_t lk_end;
807 
808 	*new_mark = 0;
809 	lk = smb_llist_head(llist_head);
810 	while (lk) {
811 		if (lk->l_length == 0) {
812 			lk = smb_llist_next(llist_head, lk);
813 			continue;
814 		}
815 
816 		if (lk->l_file->f_uniqid != uniqid) {
817 			lk = smb_llist_next(llist_head, lk);
818 			continue;
819 		}
820 
821 		lk_end = lk->l_start + lk->l_length - 1;
822 		lk_start = lk->l_start;
823 
824 		/*
825 		 * there is no overlap for the first 2 cases
826 		 * check next node
827 		 */
828 		if (lk_end < start) {
829 			lk = smb_llist_next(llist_head, lk);
830 			continue;
831 		}
832 		if (lk_start > end) {
833 			lk = smb_llist_next(llist_head, lk);
834 			continue;
835 		}
836 
837 		/* this range is completely locked */
838 		if ((lk_start <= start) && (lk_end >= end)) {
839 			return (B_FALSE);
840 		}
841 
842 		/* the first part of this range is locked */
843 		if ((start >= lk_start) && (start <= lk_end)) {
844 			if (end > lk_end)
845 				*new_mark = lk_end + 1;
846 			return (B_FALSE);
847 		}
848 
849 		/* this piece is unlocked */
850 		if ((lk_start >= start) && (lk_start <= end)) {
851 			if (low_water_mark > lk_start)
852 				low_water_mark  = lk_start;
853 		}
854 
855 		lk = smb_llist_next(llist_head, lk);
856 	}
857 
858 	if (low_water_mark != MAXOFFSET_T) {
859 		*new_mark = low_water_mark;
860 		return (B_TRUE);
861 	}
862 	/* the range is completely unlocked */
863 	return (B_TRUE);
864 }
865